From 0f60963143548fcee41eb369c1781a22778a2b2a Mon Sep 17 00:00:00 2001 From: Baohua Yang Date: Thu, 2 May 2019 17:30:13 +0800 Subject: [PATCH] Clean up code with more parameters --- hyperledger_fabric/latest/base-kafka.yaml | 4 +- hyperledger_fabric/latest/base-raft.yaml | 6 +- hyperledger_fabric/latest/base-solo.yaml | 2 +- .../raft/channel-artifacts/Org1MSPanchors.tx | Bin 324 -> 324 bytes .../raft/channel-artifacts/Org2MSPanchors.tx | Bin 324 -> 324 bytes .../raft/channel-artifacts/Org3MSP.json | 34 +- .../raft/channel-artifacts/businesschannel.tx | Bin 1598 -> 1598 bytes .../channel-artifacts/businesschannel.tx.json | 2 +- .../channel-artifacts/businesschannel_0.block | Bin 23947 -> 23945 bytes .../businesschannel_0.block.json | 18 +- .../channel-artifacts/businesschannel_1.block | Bin 23698 -> 23699 bytes .../businesschannel_1.block.json | 22 +- .../channel-artifacts/businesschannel_2.block | Bin 23756 -> 23757 bytes .../businesschannel_2.block.json | 22 +- .../channel-artifacts/businesschannel_3.block | Bin 4724 -> 4723 bytes .../businesschannel_3.block.json | 20 +- .../channel-artifacts/businesschannel_4.block | Bin 4723 -> 4721 bytes .../businesschannel_4.block.json | 20 +- .../channel-artifacts/businesschannel_5.block | Bin 5725 -> 5723 bytes .../businesschannel_5.block.json | 22 +- .../channel-artifacts/businesschannel_6.block | Bin 4072 -> 4074 bytes .../businesschannel_6.block.json | 20 +- .../channel-artifacts/businesschannel_7.block | Bin 4062 -> 4063 bytes .../businesschannel_7.block.json | 20 +- .../channel-artifacts/businesschannel_8.block | Bin 4062 -> 4063 bytes .../businesschannel_8.block.json | 20 +- .../channel-artifacts/businesschannel_9.block | Bin 35012 -> 34889 bytes .../businesschannel_9.block.json | 98 +- .../businesschannel_config.block | Bin 35012 -> 34889 bytes .../businesschannel_config.block.json | 22 +- .../raft/channel-artifacts/config_delta.json | 34 +- .../raft/channel-artifacts/config_delta.pb | Bin 5012 -> 4951 bytes .../channel-artifacts/config_delta_env.json | 34 +- .../channel-artifacts/config_delta_env.pb | Bin 7850 -> 7789 bytes .../orderer.genesis.updated.block.json | 743 - ...r.genesis.block => orderer0.genesis.block} | Bin 18422 -> 18422 bytes ...block.json => orderer0.genesis.block.json} | 8 +- .../orderer0.genesis_update.json | 0 ...s.updated.block => orderer1.genesis.block} | Bin 18421 -> 18422 bytes .../orderer1.genesis.block.json | 743 + .../channel-artifacts/orderer2.genesis.block | Bin 0 -> 18422 bytes .../orderer2.genesis.block.json | 743 + .../raft/channel-artifacts/original_config.pb | Bin 19604 -> 19604 bytes .../channel-artifacts/testchainid_0.block | Bin 18422 -> 18422 bytes .../testchainid_0.block.json | 8 +- .../channel-artifacts/testchainid_1.block | Bin 25839 -> 25838 bytes .../testchainid_1.block.json | 28 +- .../testchainid_config.block | Bin 18422 -> 18422 bytes .../testchainid_config.block.json | 8 +- .../channel-artifacts/updated_config.json | 34 +- .../raft/channel-artifacts/updated_config.pb | Bin 24265 -> 24204 bytes hyperledger_fabric/latest/raft/configtx.yaml | 51 + .../latest/raft/logs/dev_all.log | 61283 ++++++++-------- .../latest/raft/logs/dev_orderer.log | 15514 ++-- .../latest/raft/logs/dev_peer0.log | 40330 +++++----- hyperledger_fabric/latest/scripts/func.sh | 202 +- .../latest/scripts/gen_channelArtifacts.sh | 32 +- .../latest/scripts/init_chaincode_dev.sh | 2 +- .../latest/scripts/initialize_peer0.sh | 4 +- .../latest/scripts/test_cc_approve.sh | 2 +- .../latest/scripts/test_cc_commit.sh | 2 +- .../latest/scripts/test_cc_instantiate.sh | 4 +- .../latest/scripts/test_cc_invoke_query.sh | 6 +- .../latest/scripts/test_cc_upgrade.sh | 2 +- .../latest/scripts/test_channel_create.sh | 2 +- .../latest/scripts/test_channel_update.sh | 6 +- .../latest/scripts/test_configtxlator.sh | 14 +- .../latest/scripts/test_fetch_blocks.sh | 4 +- .../latest/scripts/test_sideDB.sh | 4 +- .../latest/scripts/test_update_anchors.sh | 4 +- .../latest/scripts/variables.sh | 34 +- 71 files changed, 59181 insertions(+), 61056 deletions(-) delete mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.updated.block.json rename hyperledger_fabric/latest/raft/channel-artifacts/{orderer.genesis.block => orderer0.genesis.block} (97%) rename hyperledger_fabric/latest/raft/channel-artifacts/{orderer.genesis.block.json => orderer0.genesis.block.json} (99%) create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/orderer0.genesis_update.json rename hyperledger_fabric/latest/raft/channel-artifacts/{orderer.genesis.updated.block => orderer1.genesis.block} (96%) create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/orderer1.genesis.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/orderer2.genesis.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/orderer2.genesis.block.json diff --git a/hyperledger_fabric/latest/base-kafka.yaml b/hyperledger_fabric/latest/base-kafka.yaml index 9bfd2ddd..a9ca9b11 100644 --- a/hyperledger_fabric/latest/base-kafka.yaml +++ b/hyperledger_fabric/latest/base-kafka.yaml @@ -64,7 +64,7 @@ services: volumes: - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls - - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block command: orderer start orderer1.example.com: # There can be multiple orderers @@ -83,7 +83,7 @@ services: volumes: - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls - - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block command: orderer start cli: diff --git a/hyperledger_fabric/latest/base-raft.yaml b/hyperledger_fabric/latest/base-raft.yaml index 3b2d7dce..005b6821 100644 --- a/hyperledger_fabric/latest/base-raft.yaml +++ b/hyperledger_fabric/latest/base-raft.yaml @@ -61,7 +61,7 @@ services: volumes: - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls - - ./raft/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./raft/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block command: orderer start orderer1.example.com: # There can be multiple orderers @@ -77,7 +77,7 @@ services: volumes: - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls - - ./raft/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./raft/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block command: orderer start orderer2.example.com: # There can be multiple orderers @@ -93,7 +93,7 @@ services: volumes: - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp:/var/hyperledger/orderer/msp - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/:/var/hyperledger/orderer/tls - - ./raft/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./raft/channel-artifacts/orderer2.genesis.block:/var/hyperledger/orderer/orderer.genesis.block command: orderer start ## following are peer nodes ## diff --git a/hyperledger_fabric/latest/base-solo.yaml b/hyperledger_fabric/latest/base-solo.yaml index dc6e9564..e1dcbce1 100644 --- a/hyperledger_fabric/latest/base-solo.yaml +++ b/hyperledger_fabric/latest/base-solo.yaml @@ -57,7 +57,7 @@ services: volumes: - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls - - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block ## following are peer nodes ## diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/Org1MSPanchors.tx b/hyperledger_fabric/latest/raft/channel-artifacts/Org1MSPanchors.tx index f4b6be7b23761a0b0b05f8ade55243072380a074..aec3cedd6b89b93652d8b8c36d4d57025834cfd7 100644 GIT binary patch delta 59 zcmX@YbcBhY>mU=CESEF~lN1}rnX9WN@<*}mU=CESEF~lN1}rx(O>M@<&bmU=CESEF~lN1}rxvQ%t@_(N!&ZsJ>#Lva;nwOGaRGgZdnpYykpvC5x JlAD=V3;=@=4;%mh delta 35 rcmX@YbcBhY>mU=CESEF~lN1}rh6yVt@_(P0YQ~|(=9rS3nO6(|rgjP^ diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/Org3MSP.json b/hyperledger_fabric/latest/raft/channel-artifacts/Org3MSP.json index b3c9214a..88cfc542 100644 --- a/hyperledger_fabric/latest/raft/channel-artifacts/Org3MSP.json +++ b/hyperledger_fabric/latest/raft/channel-artifacts/Org3MSP.json @@ -69,21 +69,7 @@ { "principal": { "msp_identifier": "Org3MSP", - "role": "ADMIN" - }, - "principal_classification": "ROLE" - }, - { - "principal": { - "msp_identifier": "Org3MSP", - "role": "PEER" - }, - "principal_classification": "ROLE" - }, - { - "principal": { - "msp_identifier": "Org3MSP", - "role": "CLIENT" + "role": "MEMBER" }, "principal_classification": "ROLE" } @@ -94,12 +80,6 @@ "rules": [ { "signed_by": 0 - }, - { - "signed_by": 1 - }, - { - "signed_by": 2 } ] } @@ -118,14 +98,7 @@ { "principal": { "msp_identifier": "Org3MSP", - "role": "ADMIN" - }, - "principal_classification": "ROLE" - }, - { - "principal": { - "msp_identifier": "Org3MSP", - "role": "CLIENT" + "role": "MEMBER" }, "principal_classification": "ROLE" } @@ -136,9 +109,6 @@ "rules": [ { "signed_by": 0 - }, - { - "signed_by": 1 } ] } diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel.tx b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel.tx index 57bb751acc321c3a5e19fc49d0e3c0887e565115..bed7c80123aad366810569318bad4fa98f3e2931 100644 GIT binary patch delta 171 zcmdnTvyX?LYc~&>@+zVsB;Np>f}SL0h1kB KJ0}aV=>P!uzA(-J delta 175 zcmdnTvyX?LYc~&^1JXE`UVFGF$i&UvHKUL8%<0!Q9=~~OG|y= z;9_xf_9+&6&LMP%WAamGv&s6*Hj}S2noOS0>^}JlOX_4P7Q4wkj2@G}FxgG!V=|lE z%49L|p26h3Oy-j#Sez#FF`7+wVRD>2i^XcP3s4y|tI*^sW)%)8Hpi6Q%)H`>E7T@; PvUW~(Wc8RV#HIrPCuuSU diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel.tx.json b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel.tx.json index e5b592da..e6830afd 100644 --- a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel.tx.json +++ b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel.tx.json @@ -217,7 +217,7 @@ "channel_id": "businesschannel", "epoch": "0", "extension": null, - "timestamp": "2019-05-02T01:30:20Z", + "timestamp": "2019-05-02T08:31:05Z", "tls_cert_hash": null, "tx_id": "", "type": 2, diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_0.block index 0a57c73fe61751070b8f54cd59208d890ae7be30..aeff71267d548077c0d433f3d586db3324eb2549 100644 GIT binary patch delta 727 zcmeC)&Dgn{(Uwa|N*igue5cf0P2`nsz0Sdv5jysc|uf+t(|sw%7(y1t8% z>oO3x0r4d^E@=)%DK?Hz?^jJe;4iWZA#G_x-h-=vHb`@okmrUin+! zZH3luZf9oXn*5p9aB>T8_GT5nTcVS1Mz~B)Q_-0`(^qBlBo#}+$tGsWlM_5tC%-p! z**x9MKydPDQx!&|$sbJ3Cx37+m^|6TZn9gL!Q}U0W|J3$drS@r^_Xn$X+HUCsO4nU zaL37fVHT5Hyv--i3bmX3JJ@padr$t!zrs}}r-yhMc3YzP=9+1W`oB(}7CXyRd9Gq-$+tW;CI!=?_*YxYB#wE7 zro^c|&)^Z4-lr$Jo0Uzfq?T#x%eI*ibBaP2^*t3ct9Ws~Tj1wBlhcCp_eYD1t~Kna zarvs9!s9uzr#D*7>Q32oW=fg1mki5{8FRKs%*@@RB7Og+kh_5^lOn@> zhrf>;x*G$vr@lG*JDEF9-el|CqX}!zE$ewb?Z4XQLM8?0RZHexd2=Q%C0OjU$etXN b2SG>Wd94-l=l!1L`(SpGffNT90|Wv9(@rAk delta 738 zcmeC&&Dg!0(Uwa|N@2B?XJ+2o54)qPtK5C#xo7g8GAf@a_1?y4&Bg1Nlv9g^Zth~_ zx(dV{KzxafOPYgGij8C6gq4#I_={`|lwp?QNRrmJ?OMdKspatAS+gqIb1K8D^pke! z3$5SW&dkU)c`tAJVK@0>nCWDzFq_GzJWVFA3Ui-)KRk6ZuaDhi{}8^(y`EN+ z|A*R5mJBtUJR#I#@2|oSfu$eX^;a&SXpfQlSoMu02v*-$A}(g7|Lp0sl~DsY@4kEuN*j37g@L;b6``2Onxvm;vXOwYX;dTn9&+MLGgP=mT%PDod2buavxwe6Tf5sTwJ zx7rEv7nSP-_;fmQTXYpOnG|w5-?JA*bI7oTIZpk}$?kAVK4x8sdgb<8;!gte&UctY zO*&xk`AoUoQmHik{Ghy#*(w$+Mb>Zp_wj4R2F~34fMqk2LMqqak4-Z@_w>hZJ$K5k czj5*EvezE23 z?^DSZoIJ@ad9sFC=H{lPkz^FBO1D_t>2M#V4M`xd6 zq30YzcQ__@dmBzR^)Z_~!;5e77auDi?J>FB(|oeDx8>w)AIHfd-WHShc$-gt;AJ=2 z(bICWx)=Xs2Va%RYdt+Cb9$Oij`p&h{Mp-S@*1Gtub!!sIsKw0@AmhYe9PCILyOHZ zB{ws#c=LAVSzMc^^R=CnV&C&cT8A)aQe({S8 zUZvCvNk5KKSpBb;Nx`k$#a3VH%(4I5`U`xux)){f*7l9&Bj@=Gnw z&){9jTyR6mSXh2ae2df?cCIPxT!LIo9E_XaN9Zz_?el-36SL)<+RUjo#y{G5*Jum< zE%o}Q5CyezSB6!wzt-lqN9G4F?dSEm_y3PKpHb(pFTE48>b~6)-o~V0^5D(f1M^HW xekLrRUJx{O=DBZt71sB5+T1KI;pWx_4i$xe3yP`OjXrY4wO=e z$V__s`&ycz+G8K%*4=U691VVIs0HtG(kt4inUctnCp3K{BiCdgKDL38>k=E6GzX&; z8^_TJD>o(@FstpfP+I+{!s>OFrBc$a6RV9+#>EQcs$9A#^mZj9*R2_h985x2W-x9} z(VfLLxy{#g^I!80(aF>OJttfEX;0p%qr#!Z=9rS3nOD4dJ9D<+WI1(}$*V+NCby}p zO|BH>oxD?B6-e`JekW=mIC-b2=Hz?oJV42m$*rQQ{6@aP0RlkBKn&2DET|zq*+AQL za;28dWJOJr$uG6sC(G%iPEOIbo7|_tH~EQ%)nq#@yU7unW|PlrT1?i^Fqq7)Wj=Y4 zw$tPY4YSF8nvRp7Xj=i*dQ9G=WyUBq`L(((*s*H5W|O;hf+i>X8BRXncYX3?KOLas zbEIL87wQq@Iw-*P9TYlDkkFZ!D6-ioz>!%(K_fEwp>GN6W#cq`?z!e~=RD7_l``*; zo7^4jHn~1Tja!MEi#;ecF(tLAcrsH+0lL`c#UcL8^;PbDju%e!%}e96=_;_lbyD?2 zxl2?^vx1PDfeVv@WgmyR$(uKh!AI8a(!TRw+$s2yZGOhZz=o98>;A3p)-ow%nQ5=$ z*Xa;=pWZyrqdWiVos#KR3qy`Z4HtvIoa&#H!G8Mc z!q4`9k}e6)O}t3H+U2p#6Km~UI^X9ZaJCq+$H zI%vHAx{#(7>!g1ZE zOEUBGgifh)FbVN;vHKUL8~O$Z2r+Rm3T;vW^Nm6LWhxtQiwaH-6*8-j;9?I-O-xBG zDi-n;at5li7ZMQS1JXhYd6q{p8Zf0Jwk}DT`cu{5v z$Yd)a1E7gILOeoT2$RA3BtdQjxe47^rpb~*)&g2k!=Roqn&_Z1*;rU+Vu=X{ObP(@ CYCvEB diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.json b/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.json index e5251b96..8b797ddb 100644 --- a/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.json +++ b/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.json @@ -166,21 +166,7 @@ { "principal": { "msp_identifier": "Org3MSP", - "role": "ADMIN" - }, - "principal_classification": "ROLE" - }, - { - "principal": { - "msp_identifier": "Org3MSP", - "role": "PEER" - }, - "principal_classification": "ROLE" - }, - { - "principal": { - "msp_identifier": "Org3MSP", - "role": "CLIENT" + "role": "MEMBER" }, "principal_classification": "ROLE" } @@ -191,12 +177,6 @@ "rules": [ { "signed_by": 0 - }, - { - "signed_by": 1 - }, - { - "signed_by": 2 } ] } @@ -215,14 +195,7 @@ { "principal": { "msp_identifier": "Org3MSP", - "role": "ADMIN" - }, - "principal_classification": "ROLE" - }, - { - "principal": { - "msp_identifier": "Org3MSP", - "role": "CLIENT" + "role": "MEMBER" }, "principal_classification": "ROLE" } @@ -233,9 +206,6 @@ "rules": [ { "signed_by": 0 - }, - { - "signed_by": 1 } ] } diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.pb b/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.pb index 085b6c3d0df1877e468ab2a736e1c528816d1597..fe1eea8d34d45708e8e97edb6fd4c22cf5146268 100644 GIT binary patch delta 419 zcmV;U0bKs7J?%UY3Zgs;_XY|Z2m%@g2&3?-u@F@Q9x{-g6%{RN8J|bb*c>av+&Qe|OeWpZ2oc}L)C!UfgWrj>yc$IVe@skj z_wY2NjO>0U@)!0cz)nQcQ!6*4kjr!j&BoIZWIV*maBdzTbIewZy7%I((+%WPYSnLZH#z# z*7c##LsPCP>XVz9w~E|V6}qL$#qC&7kdv95Sdy8aCvXuQWH~Bi;9JOg`7DUh3tg{g!q6o69)qjgJ>oxULkI{P60+#E;A|@ z=vK#++|0aUC08!?@S@BTkjYj;20)W^gm{Fw5GI55Nx~e2ZYQ!Hilm^iJOA$YvweTrJ$w`PbY*jNV`yP%ZfRsHKrt|8W-&N0HDxk4 zWi>c4Wi?@CV=`eeIbk<7HZWvkGdVdkV`VciI5K23Gh#3>GAw2>Vq-EgVr4ThW-~Q1 zW-$^P5*VP-_JL!6mji`Nr=n37I_s2mn*AfpR(r9ls0x$1AY_wLM<%m&3qci=ct=T- zLm^MIwjoO+lQ%_{lW8+5la56Ulg&k}lc7e}lXylblO7=@lfg$LlXyoYljKJd?@wKS delta 245 zcmey?&-ksMv7SpwN}*kHvV|@84Yjf;#xv|5R#UFN5M^L;S?j56Xeyq$NNk(Xk$y(5 z13$J&dUDr$wbXT8T;dTS4Kn1ASWAYPsApmzBRMP+e diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/orderer0.genesis.block.json similarity index 99% rename from hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.block.json rename to hyperledger_fabric/latest/raft/channel-artifacts/orderer0.genesis.block.json index 1cbba3a8..e30f4fce 100644 --- a/hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.block.json +++ b/hyperledger_fabric/latest/raft/channel-artifacts/orderer0.genesis.block.json @@ -711,15 +711,15 @@ "channel_id": "testchainid", "epoch": "0", "extension": null, - "timestamp": "2019-05-02T01:30:18Z", + "timestamp": "2019-05-02T08:30:59Z", "tls_cert_hash": null, - "tx_id": "cb62c9396856dd18a3dd67c3707e8a29cd0e1b9a900cf1444524dcd70fb6cffd", + "tx_id": "10ff1805e27e581e5aec2a19a7560dc3993ce3082d43b002f1bc22be30f352f1", "type": 1, "version": 1 }, "signature_header": { "creator": null, - "nonce": "Mpm6ZvDqMqxDM9Y0PqJjvOIUMqFYYVo1" + "nonce": "oNH2gWN/lwOFTKeiURY665R1mv0jzFZ7" } } }, @@ -728,7 +728,7 @@ ] }, "header": { - "data_hash": "hxmTOD0L2CZ2WgHMB0g6lNXoFQACRK1JIzE1F2miFrY=", + "data_hash": "uGNzxdLXxgveiQVZ896fDeIJFtcsFxLTnvyiZupgyvs=", "number": "0", "previous_hash": null }, diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/orderer0.genesis_update.json b/hyperledger_fabric/latest/raft/channel-artifacts/orderer0.genesis_update.json new file mode 100644 index 00000000..e69de29b diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.updated.block b/hyperledger_fabric/latest/raft/channel-artifacts/orderer1.genesis.block similarity index 96% rename from hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.updated.block rename to hyperledger_fabric/latest/raft/channel-artifacts/orderer1.genesis.block index d7917d9e584fd3ca0bbc6273e0f7b5d6ff13a05a..a9f6c99e9ef5ced7c936442484ad90f42778512f 100644 GIT binary patch delta 325 zcmey`&-ksMv7SpwN?}KG@zG1yk8$7YWR3iMZ$9rMPO`p(Fi_ zTnB)74-i*!MRPC;FiNp;9KO2h8LJX^NosLPazPD7*wiS^P)JHh zV!_34jmh=XnOl99FA5a1dOf9d)?ei_Vbwx=`xv=)_Av@=1>zPbE_VN-l+>csBB39f z>s5QWgjKjWof3g=3C^ra6%rTX<@mxpS=PXKa+!hRUgKpd6HovtpETvH~WbzRLT)a=B??q8IWT9jHO^nK&e9xfqeE>5RJpksqGt5Su; zgm^eaCZ}*4Pu{_;HhDU?;^uqY&Z3j6-IXS%EBa49;I2El(oG*M8R)J)dAVEjWG6+{ I$#dN!0er}5od5s; diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/orderer1.genesis.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/orderer1.genesis.block.json new file mode 100644 index 00000000..e30f4fce --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/orderer1.genesis.block.json @@ -0,0 +1,743 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU51a24yaHZsdHBMQkp0ZnJQVytQd0V3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRFozUTUrd1l2SlM1ejhjN3FTWUNRUTQxZi9OTUpnUTdVMlFaTE4zMjduNGhDMURFdWk5endVNwp0VHlsTnFZWXpybVlsYnlzMituWFpHdzNmZUZDMm1hamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0VFBZQ2p2NTlHSTJUdWZ0Tm8xTzJ3M1lyZUFrenpQaU43aVhyV0krVE9Vd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdIeElaOW1RUFFRWGlNTTcweTFEMnhtTGQ1REc2Mk01UDJwRnFocU14eEdFQ0lENHJXeFpFCkJYWTFGcUxqMDBDTUJPajh2V2RzU2R2VXdadEF1WGIvWDZrMgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRYVpzUDR2ZXdOYWZsQ0QvYWdmZ0NHakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURRd01UQTRNVFF3TUZvWERUSTVNRE15T1RBNE1UUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFVDV5VEhSVE1FQzhJWDFmTDNVUzRwVzFuenc3c1J5eHRibFZUSmpVb1dETW0KSWJqeVV2QVpSMlJQSzlpWUNwZ1F5K3ZEQ3djcE9od2dtTUhnZlJGQzhLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnSGdXc1VUMlRvQzlyS1krV3dDSlFkM3E0THNEaDhZVjIrM29TZnpjUEt2a3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSURSaW1pOU9ORGJOOHp2d1VXdFYzTTlDVGJBU04rZEwramtKUTNkSjlYY1VBaUF4CkpmUzVJeGRuVVp5K0xBQU1qU1cyMmxOM2FheGlsNkZ6d01KV3RRN3ltdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdPZ0F3SUJBZ0lSQU1JR1YyZFIwdXZGZ3ZOMmk5UWM0SkF3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkkrQllvRkZPQm5ZU0JIaHVvZlovd2ZxRHpoUmlObVhZbTQ1YzFDb3RzbEkKd3ppZ0RPdDJBMlhRUGhBejhQVCtjcFNSaVNSMEx4aENlRXlQanFwL2VQcWpnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUI0RnJGRTlrNkF2YXltUGxzQWlVSGQ2dUM3QTRmR0ZkdnQ2RW44M0R5cjUKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTkhBREJFQWlFQWsySDk2L2syMlN1aGYwZmU4ZjNIMjBFYmNoS0R0UC9BanVrOERYTmEvcUVDCkgyZk5PYmpyeHhGL29yRjMvYk9vK1BaL1duS01abVBWRkxnbytjTTlrcE09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-05-02T08:30:59Z", + "tls_cert_hash": null, + "tx_id": "10ff1805e27e581e5aec2a19a7560dc3993ce3082d43b002f1bc22be30f352f1", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "oNH2gWN/lwOFTKeiURY665R1mv0jzFZ7" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "uGNzxdLXxgveiQVZ896fDeIJFtcsFxLTnvyiZupgyvs=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/orderer2.genesis.block b/hyperledger_fabric/latest/raft/channel-artifacts/orderer2.genesis.block new file mode 100644 index 0000000000000000000000000000000000000000..a9f6c99e9ef5ced7c936442484ad90f42778512f GIT binary patch literal 18422 zcmeHPTa4@4S?)fU-FDoW^l(PNhm+zB`GX*s*uj-5D8 z>?DrO1E&atibQ!SLgIl-Un(KQ8!8|`2q;JhgaDyR2o+HzK!w6XQB?$0SxIJQ&z{+H z*}MCkUNkeB$;|RvwqvdD|Niy;-wJYg@Y-)X$>;v&^MCsM7e4W<@s%(9%8Oro?!BM? z;aAYV{pJ7r^yo`J_UHeL{>jhZLjDl`{2u(tkRQ2o>+Y?C+jsu>?|%JXo;`ei=_X5O zZ22>Pc<*B+Y&0qnSk=YrZj~sxRm*j7tJJXS)fzT*%8f?ZamyHi4=ZIG!|+kbc5vK= zO`~!Z{)Zl*um0*^fA!&Ly=-j#@WQu&9xI&=Z4DY zA}Q~VksDFcaCRjyW`-DgHLwO!VCRe`lEQxQSZtev@z@@aiP@_LHjZuB9P~*~>XSfJ z=};QC!+yokODSS=+RDHiOOdP$XqBmow4916sE8_jWh2-oz&0`K+;2-Qm1&D$vbz{U zjzy~97dK1}l>HSvm6}Lno12Dqxw*1*X2S+R+aGgOx(|=}Bxq>H@EDGwj{Z&= z9$*3>Ih!w4%1pP(gNe=8iIU!)YWQfG)d*z3#tFvFfN5wdON<;k-sB9`i(8uQ8v@^v z`C*Kiu^NYDlL*?Xke51|+Rvkn9>9yohzKg%hcTp6hAgHsvz-g`01UTpiSKF5{{4F~ z=`k!R!`a{&LMt^$Qr38oGATl*a2_a_3S_=W0xgA&WHATx-3jChBY3j6DaXThi6iiO z+jI-%NZI&7R#V)rsg4o5?&(WSn6w)iZlX%WxISpdL1=5!A|VeZq%%(k z8J`YEpp??S65<-NLj)ty=TUO_@hd?@1rS6wbst1lPEZC>pem!*k}SmSj!3P(yFk}e%+hBUnj5f+QGrsF!Lvz>*&a7;U1 zhHPVm1+p@!Ns`DUDedj1dUrq7VJ!4qAcB-bwg6)G0HQ2;YICKLzO%xwbGLaY6i)?dM6FPuz3zkrt3X55VPg3urAH4(vBIxC^WbVAGU^h5?AC=+tS@q*((zIs$Lw+^I~V_ z#myyIEZMBNF%ldpG`pJ!$5JZ?ojn&2Bp4A4q;U#ZM#^uWiGoc@a`y~Qk%|B*FoB?w zHI_^vI|5?IP)7h`MIdfZl(zOK=#Vhj3uJ|jS*9_mfwh%|-Dv`RMB|6G6;%h75yuYK z%NjEy%5)Z2MG&2k?Cx$b55TBH2{Jw9JyI<-C44f@Mo7r=gsnyMK{<+Pe&cuB;-qg& z>IRsr5@aMt=oj2oeVtO~g5t{6_FO63rp68Oem;{+YebnFaW9<`2^L+3u!GxR82Yp1 zu!0=@h2BG7yK@WuUi1!n8@@hu=N$)k(U(rAciZgrXjB<_r{Y>LO-#@aq3?&?4^9nx z34P)8u+xL|*k3-K^j- z7m;^I`&1hHu)DFs`PBWe6NPtwwtnzmSH?3vhaB&@c2mh3O)0u)c_WX4 z6m~XIPTt-``4ow&%s@$C0NEwWFw-ujCn@P8B+L3yvb^Ot=5fREHX6f3c?x3_vEfx< zAMw1(a*fR7`k6Tp(&L=|?)tR~0tHnPz5% zHUMJK({X$%l`U)IPit(RicNhf*RwFaG^04YLEHt)(;LLWRj0g96mAgr+*Sa^2GCbEakR~L#U)N8wCnv%G3$_ znRrGRI;#sI4;6-l0%=4n+aYI0kL1UzXk-@C(Spv$iZ6u&Bdk=N5*00zseq)p@6nwl z4)B589fO?css(4>Q~aKSwKrqRWwLItm>1pdBJfNv^-S%7^)5u?cEPKAB8lyIttrbp zUGEg01#=*`@0Y0s_bwTY`k7D5Ua4q*~x%dHY3aJ0eoMh2fBqWnZKy z>Qn-;Ih#Ou-uV8*Rri@0a-v~+5)WvS0X_pJINzuhCpg|)jYrtXB}Qc)#~9lgx9DZJ z2!hpwpa+swTrd>E<0GkK2k~aZ7NeLg7wt||=$b`+))LLI+h^NeRB*(`WG-Ho?_Y!e zZVe4oe)`UY_~h&#=H_!HniVS$6lFL=TziHjIf)2fqsCf@Mh)q2(iX!IW}j9icZ z#FfKmuHF@%+ z`R@jC+obVv6yzJky%qfTorO3QMV_rJUcL3&vmb&wEpjZN9v&j^JeGpDTJF>6 zb0-a_`W!3Muc9x(F37P`efO!8KKGD!k<-YT^sT8sw6XJghQ+C1 zuoq1umD%cg`M$_=U+=>ZpFVco3riXM)`LQF3>LitDSTmx%4SY@YZ5ym( ziTTzrv2R24fXui0_2c?HkYl6ADW3=QIyl?)A482r8OoQl^Xp#55y@!R2Z1-JZVOru z?|8Lw0wKv_ArL$Bb={POVs)Ub*cQ{PaI4tEsrUiOrc};#y=l>k>y})VvWzTNoh4O}ytCQo&NzW=ofG!DhX=mYAWLzNCs(Cp=F;MF z+^8kZv1H&9NlfP6ls0oRq6Bt1v*(4XI*1mmJ;f0TTjcf%BdQB|Fam>7J`8 zP`jjReE6GJBCNHostmbP2=h0c!DJa()nPenLbu4OHe=GW?<@T-LfEcC^du416~RuP zVW^GB88|F8>s3rth<(`ts!lX%k|tN0+Y@pPE9K5P_6*0X?TGd&I}?U`IGNRo+6iRv7$ zP8Wqne-XAWw^?jy{H)6YIc>9e9I$NNBRiYXiOr%Jmgt}nwtaGjsgg`)X`OTfzc|?F zZm&9<>$8Z`u(0kJRp_!{ky1c38slQp3I(Q*uPYmsQ1Y517M*If$SZByi|4^uTJ|5& zX7R6A0;sni_3&&|P5^(v*Jey?9irLZDl2Z}OwfvRo~s z#=6<7=7dvU^bAUtE2U9U5}Te}*KpZvOJ%%1tBk1<&8+-Jo@#Yusb*7YVHkNF8dEz< z@WO0ha%p+wvJ@U#S5g&n9h2W>RE6+ICcmZHHK<@+ZEymvu0~5KDs}L*Y{V{@i!_sg@W37FlmC%;J(R^-w0+Sl%dmf;EQ4%%Str93ERUe&DC(R+QsMWV!RMH8;*hH z%SxtbMu}at0}P`?vJ((%eVFuyYb`aGU^TFdgW3eYgsRNHe-WA{zH}S8NeXY0 z!keVeJ&^ETIpq?3 zeyjN$2`48bO2--x`a|gV!2$0(HQ+_``I7;stcVrld1f|@;=~Oh%&&VPcx%T7#_QeM zi8S;-d%XwW>OEh6{oogl^q!wPM1S%S{l;GJ*&Y1nE0bw$>*GJI_eeb=*Hk80&c=R7 zs)9M?V&dHPgtuiiDxC3mU8wh*>-g=a_nfQqT%`A$>v%1_2Tux%S|)AWc`xji3OK%s zk^zU&W?#{UnItusg)NlJd6N>LJAcFZV6EDiTcSm>TIs-ao|=Fn1+zL`xt|eaD z;;u}hk8|j6Uhf%^vzEhJG~B*ow_B_~oQ@2Sl0?_o^zsT{=EhTECs{&P@%nPNqJy7roqk9d)DKl}W(S}Rdj>Lf;He5QfwO%95 zc44JNB~>mGth8)YO`EN&9lq%f7JU5*U*BVBJ`%HDcPZT?%lL3*#PwWVH?s3f*0)3R zIR~DLRMm4G9|>jOdd=rt?czF`kI%+Ua;?}%Tx)nuDH7d4jFVn6(V{Autm-R!(VtG2 z>bR=$M4^Kv1XI!)^_lBz)-8WEvDC>Z6-|1AC{1pxmBfZdDA;WAO=>=m1DNxgj}X&l z!w8pDRo<|?>vXk>WHsYyG@zulMAap{%oJ)qCshOpm=uBg$|NtNdd=!e7Pw`dZiHPz z4b8dEkIarfVcN>vE)Bi$Td(;v!>J*zO~TGnfoSW|piyiW&IO0JMe{j_iw%FV=5wy| zwLtVXYCh)}h`B`bIoJ7Oy1K9V0B@MP^^_mYomV@?|m^?>!8Q_$-ax&yNeMa6iH ztFoNs)3UBG1B;-11oS9&VH-i7kc$zR7Q3-#Nz-6$Ea{32_8U7dD^EN*%_jsi#aqmm z7O&NE5VWXaI)MyR?-}g>g}=ffC~A5<^z@+L)Us?wZJvm2S=bk+hSCPlzxznYMZ)sw9qWk>E4dA|Abe|i* zUHXv)-{F8er~O%h2Rx2iboxTa+RwqqkoO#IAEjbj^2TJ!ZYYoaKq_E-7h@P z!5hf?c8)08f*F#PjQyF{TgEGAxr$x%F5KGt4fyr0 literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/orderer2.genesis.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/orderer2.genesis.block.json new file mode 100644 index 00000000..e30f4fce --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/orderer2.genesis.block.json @@ -0,0 +1,743 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQRENDQWVPZ0F3SUJBZ0lRVjh2a2VKdEZSUzRGeXVkYjI1SjljREFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dhVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdGNHeGxMbU52CmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJHYkgxNDNFUEpIQWtiSDc4MVdMbFUyZnR5NjgKWEZyczBHbkFaWVVURjhmY0RyeHpFQ1NyS1ViaVlJSE9RSGRyMFpyVHJtQko4akxUSXoxT1VUVnpveFdqYlRCcgpNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WSFNVRUZqQVVCZ2dyQmdFRkJRY0RBZ1lJS3dZQkJRVUhBd0V3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlZIUTRFSWdRZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGgKYjdnV3RVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURSd0F3UkFJZ05iQ0t4YkczcStsV3lJMFNnc1RVWnd1awp0MHZGZ3VJVy9LYUdZT1NwZGtRQ0lFL25hZXNUTjhoN1hMcmptYlVsLzhRWGtCY3B3WHlId2RmQTF3RGlSbTJVCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-05-02T08:30:59Z", + "tls_cert_hash": null, + "tx_id": "10ff1805e27e581e5aec2a19a7560dc3993ce3082d43b002f1bc22be30f352f1", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "oNH2gWN/lwOFTKeiURY665R1mv0jzFZ7" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "uGNzxdLXxgveiQVZ896fDeIJFtcsFxLTnvyiZupgyvs=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/original_config.pb b/hyperledger_fabric/latest/raft/channel-artifacts/original_config.pb index 0dd8f465b37451681f7b752e731edf17335968b1..85f66a2c8c510fdb4109197b85daddff244737bd 100644 GIT binary patch delta 182 zcmbO-lX1#SMjZ}jp}v`nLQjIZxE%`$ax#+>OEUBGgsud0FbZu};bQkMN;mQi4iH+d z!oj$CsP0n-WnS9?RQ&Nk~F(o%MuNbHltj!RlZ8lIF zP>024V?`dp$!lHICR-TuOfEN?y}8P@ighE~EUw8O3aXpubFC1a?Be4wd6t*z1U=&)e!o}`ily2x793V7Xg@bYPEFm7j$u5EllbeJjCf`t=J$ae3k(d^nV@hsj zUa`<-h;k#4^5v7`g_I|!2uf_!kq`tbQ=4on#54JUVCG~;6%bowbG1ql>*P}J)sw$? SHBQd(QJL(m=`s0@7Y6_hh&gWn diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block index df6fedad3a8d4a62fbf73533dad991ba6ba3d958..a9f6c99e9ef5ced7c936442484ad90f42778512f 100644 GIT binary patch delta 249 zcmV`PbY*jNV`yP%ZfRsHKrt|8W-&N0HDxk4 zWi>c4Wi?@CV=`eeIbk<7HZWvkGdVdkV`VciI5K23Gh#3>GAw2>Vq-EgVr4ThW-~Q1 zW-$^P5*VP-_JL!6mji`Nr=n37I_s2mn*AfpR(r9ls0x$1AY_wLM<%m&3qci=ct=T- zLm^MIwjoO+lQ%_{lW8+5la56Ulg&k}lc7e}lXylblO7=@lfg$LlXyoYljKJd?@wKS delta 245 zcmey?&-ksMv7SpwN}*kHvV|@84Yjf;#xv|5R#UFN5M^L;S?j56Xeyq$NNk(Xk$y(5 z13$J&dUDr$wbXT8T;dTS4Kn1ASWAYPsApmzBRMP+e diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block.json index 1cbba3a8..e30f4fce 100644 --- a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block.json +++ b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block.json @@ -711,15 +711,15 @@ "channel_id": "testchainid", "epoch": "0", "extension": null, - "timestamp": "2019-05-02T01:30:18Z", + "timestamp": "2019-05-02T08:30:59Z", "tls_cert_hash": null, - "tx_id": "cb62c9396856dd18a3dd67c3707e8a29cd0e1b9a900cf1444524dcd70fb6cffd", + "tx_id": "10ff1805e27e581e5aec2a19a7560dc3993ce3082d43b002f1bc22be30f352f1", "type": 1, "version": 1 }, "signature_header": { "creator": null, - "nonce": "Mpm6ZvDqMqxDM9Y0PqJjvOIUMqFYYVo1" + "nonce": "oNH2gWN/lwOFTKeiURY665R1mv0jzFZ7" } } }, @@ -728,7 +728,7 @@ ] }, "header": { - "data_hash": "hxmTOD0L2CZ2WgHMB0g6lNXoFQACRK1JIzE1F2miFrY=", + "data_hash": "uGNzxdLXxgveiQVZ896fDeIJFtcsFxLTnvyiZupgyvs=", "number": "0", "previous_hash": null }, diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_1.block b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_1.block index 5f291b402af58bfcdadf2ad03a6e39232b80915d..55c63285e043d24f332018324b40a5d875438b59 100644 GIT binary patch delta 1050 zcmaEVlJVV1#zZbR4n`q`37@0CrJmVf$+TLYWA6l+d)a48Zr3*)uSe+TK}N2xK)eEo&#`fdbFfIU zaeR8eYGa}fvu^u_3yhuV1`)64C9(2PJb0Pw$Ew=a6dMZ( z92Vm;`LVjro%|qR(d3iS z=98NO4JUU8X;0o1cmwFZ9BC~!$CTX6ykem?X|CN;T;D-HXM+0NHaL`7$~3V0r>b1j zzoyvEx7?p1S53B5>pc>cwMJ;)#{Oyu{z5z zkJ&J+t@m|X|E-&_dqw>7g3igRJIMfQ(EgP=uNHfUUY2g#ZxNTu?YhoS*y{gN_2^?l<+pU$ zIY0F?DP$U-z4HG#pMBk?p08V7ickBC&;9k;@u02Y=4FZV-X!u#Eo0}J#LmUf1&UKn zE@nn1W&sunR-u2J6B6Z^i&~@-?k5EOkDkxEbpPdx8)sGhQrbAJCv73r0Z)zQY9*e1 zv^eUzjey$nz~r^AS3JLFDSi$8w609%i`Ne(1^)={i3M(I8+OLHT-v_G z{0=d1*X9jm_P3oQKTY)cziUbAb0_b%x$>mCCny2N}7(1Mw;#KF7u-&cPzZ z#<6e0%8iLS%(`tE?Kz$8VRAl?Os}W(eqDWDWYyN5iFIs3S9dXTbpY`tHZExnMu?8h zyO<4_r8ttLwQai=acpWiym!{DiuRn!@GAYJUHU@nH?y!aa!s}pOrOjsXu5f!;4RU~ zyMi(%?^oB^%&%c7IN8NpW%30}m&t3q)h5rk0aie@9+Qg$geJf8Q<=;eGjZ~*pn%C;ftr)=2VS4N zDNtwfwxCj>4r#7EQe59bUSxuL(Ka}gS?bcoU5jVwF1dC;FsFX=t{1aXO4U3H6Hn|F z+COZBdLW^I~?c&4Iy=%=JYXrOZ|DZ#}uIwmEN?7T@ipXHP?&-m*mq zxf{4LDKb32X|j%^-rC^m6A2B$kH6dZP8ZbJsULOVb78yYnXTeWnH0>#d|P*&^gC#{ zq5f4|eE)TU*%7UGrsv)ay|yrXZBFBLs6pK>C#0*ix)=V;+ICE#h{f@qTkQn-i^}x^ zd^#PuExL-CObR)j@7ar@Ib_(v9H;)~WOukFAG5ARy>k04@h5?K=R3@yCLJ*Ne5PD( zsZ^SNeo)@WY!wTZBI`H)`}nnD17~i2z_OW1A(iXz$EKN{d-`Lyo;zjN-?(^n@&uLk z8I!rY`VtN-J>CK}Xtm<3Cy~z|@i9-dS2*D2`^?^TSH-DPzK80IuhglTM<^CDDcC;u znDMR7_-Ret39hvlqhgQrpW<$i=g3+axxUg+sbQbgQg*J1>|Fd@peW|#VrFDw7GRNJ z75dA@wXsl!xv*xb*2(8x{H$M!9(6e++Lnj)@94X{>FH@9Hv<Zs;A~(yl<2r4fXZ4vBcn#7|PUotWzc6Y2vWUw|?myXcuWYYb?)K`< R?@g8+d(zLv0EEak0|2R7oRk0n diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_1.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_1.block.json index d56aa13d..46cfb51c 100644 --- a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_1.block.json +++ b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_1.block.json @@ -1020,13 +1020,13 @@ }, "signatures": [ { - "signature": "MEUCIQDn2TSuCH87MNXkGCgR8fuHvZcRKLkvWsDzcYcpzLUXpQIgNhZNhbrJTsExsH/qXl+P1xCbWIXcl23ZVdahV61sgdc=", + "signature": "MEUCIQCb4fsofNyY9fjxoPrdm9+4S0o/ok1I9VOHg6mqMNllVgIgPoYHfhAHJD29EqTHrIGj4BfWEQxX3nZ85sbLhLXhD68=", "signature_header": { "creator": { "id_bytes": "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", "mspid": "Org1MSP" }, - "nonce": "cmh1A3rv2uTdJrNuuioO22Lm5VVC7QZY" + "nonce": "sjyRd0l6scNJZeRwCtnMzlyMxbCAuXXo" } } ] @@ -1036,7 +1036,7 @@ "channel_id": "businesschannel", "epoch": "0", "extension": null, - "timestamp": "2019-05-02T01:30:38Z", + "timestamp": "2019-05-02T09:20:37Z", "tls_cert_hash": null, "tx_id": "", "type": 2, @@ -1047,11 +1047,11 @@ "id_bytes": "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", "mspid": "Org1MSP" }, - "nonce": "0tG6o5otpNbfUWx/s7rommR1JkhxYci9" + "nonce": "FszPrpxwmTf245w4f4J8NTFzb950cG+T" } } }, - "signature": "MEUCIQCLRMgbeiqLoflqtsYgcgRB3kZ9kB/RIxAOLIhthC0haQIgbInvB3JbCBwGVkGV+wkHQNofXK50J3m32hfkUW7PiDc=" + "signature": "MEUCIQDZBsVqZRADFSBq2IMoF1j77DEtplQLUQBLIQCk7eOHkAIgWrr80Hwl3WOucv0x4ONjTjreeNxRTqCEgueGxOsEHCw=" } }, "header": { @@ -1059,7 +1059,7 @@ "channel_id": "businesschannel", "epoch": "0", "extension": null, - "timestamp": "2019-05-02T01:30:38Z", + "timestamp": "2019-05-02T09:20:37Z", "tls_cert_hash": null, "tx_id": "", "type": 1, @@ -1070,18 +1070,18 @@ "id_bytes": "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", "mspid": "OrdererMSP" }, - "nonce": "CGIbKz2KogiyhMO9mpp4h2x5V3ovYrov" + "nonce": "cc2ZxALbntiJcxCSfFvYSlnsQNx3rTI1" } } }, - "signature": "MEUCIQDAMPPMdx6lGmYvb1Ju8WskOARyO+xPvg8qXVGZs+AEswIgZQr98YKZSbyPXbXOyj6PgaOrY5Akh5iTC4qOYMClx4Q=" + "signature": "MEUCIQCreo/Hd2NtleSPUaqpWOgSxfTHl3ctofLoGK1Ncpj94AIgPZiCFzmCfSa1Qh2OwRes+/xu9WXsKB6ytE5vkVpmS0E=" }, "header": { "channel_header": { "channel_id": "testchainid", "epoch": "0", "extension": null, - "timestamp": "2019-05-02T01:30:38Z", + "timestamp": "2019-05-02T09:20:37Z", "tls_cert_hash": null, "tx_id": "", "type": 4, @@ -1092,22 +1092,22 @@ "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUpCRkZSREx6NlVuNy8wd0xVa0pkeE13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCSUJNaUt4bjBMV29WbEx2OFh4YlgxRDQ2ZVZMNmE4cnBWVGNkZ1BlY3E4Y0RwdE4KNE9nc2FKTmpwOTBqS0ZPcENQTzg1V0tLS0J2b2hPbytDQm9aOHBHalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJTWQ2M1M5UnZOdXkyWHZ0NkVjWW84dWtYajJVCjRXKzRGclZDSkMvY2dubU9NQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQXNHeUdKK2RFNEY1NnE4WVVlMFdMSzYKTit2c1hSSERsUnNjTUNCN3l4WGFBaUFzeUpHZDBydFhtYWU5YjNQVi9ldkpOWWVnUlFSY1B3eCtYeGpRREJ4aApRUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", "mspid": "OrdererMSP" }, - "nonce": "hmiHbImHVh5M4jXXZI31q88UqrWMkX4G" + "nonce": "M0cugFeSLVo2mulJafKmXiUYncoBpZTH" } } }, - "signature": "MEUCIQCrIZrk5+IOA5E/IMBGTeY/Rbp4ynUO4Sej1H4mN1ghcQIgPedImPZ+M+V8XsgKrdFaXcSPyguAHwhqqVmveTEigL4=" + "signature": "MEUCIQCZaIzcgbkovBVSd9xm3oaUXysrB+TFzwygimCllQX07AIgeklmTv95Vly5/bJfd4on7Dix3vqwQnntr8QwJoumhZA=" } ] }, "header": { - "data_hash": "TsIDtysNUQNPPZwflhXn/tZiJ52TuzzU5HuIzhmNwos=", + "data_hash": "YKgXPegfyLBDx2QYKZ0hEucqjYrhB91FEgftB6WxSWw=", "number": "1", - "previous_hash": "6qzC1IPW2Oc/OZ4MLO//tXtDms72MnGRVEmLp8c4PrE=" + "previous_hash": "kPNb9mXMsDkCqx8IvZAc3mvNdNnaj7u63kxLMc0oA3g=" }, "metadata": { "metadata": [ - "Cg8KABILCgkKAwECAxAEGAUS/QYKsgYKlQYKCk9yZGVyZXJNU1AShgYtLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJQ0RUQ0NBYlNnQXdJQkFnSVJBSkJGRlJETHo2VW43LzB3TFVrSmR4TXdDZ1lJS29aSXpqMEVBd0l3YVRFTApNQWtHQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHCmNtRnVZMmx6WTI4eEZEQVNCZ05WQkFvVEMyVjRZVzF3YkdVdVkyOXRNUmN3RlFZRFZRUURFdzVqWVM1bGVHRnQKY0d4bExtTnZiVEFlRncweE9UQTBNREV3T0RFME1EQmFGdzB5T1RBek1qa3dPREUwTURCYU1Ga3hDekFKQmdOVgpCQVlUQWxWVE1STXdFUVlEVlFRSUV3cERZV3hwWm05eWJtbGhNUll3RkFZRFZRUUhFdzFUWVc0Z1JuSmhibU5wCmMyTnZNUjB3R3dZRFZRUURFeFJ2Y21SbGNtVnlNQzVsZUdGdGNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUcKQ0NxR1NNNDlBd0VIQTBJQUJJQk1pS3huMExXb1ZsTHY4WHhiWDFENDZlVkw2YThycFZUY2RnUGVjcThjRHB0Tgo0T2dzYUpOanA5MGpLRk9wQ1BPODVXS0tLQnZvaE9vK0NCb1o4cEdqVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lICmdEQU1CZ05WSFJNQkFmOEVBakFBTUNzR0ExVWRJd1FrTUNLQUlNZDYzUzlSdk51eTJYdnQ2RWNZbzh1a1hqMlUKNFcrNEZyVkNKQy9jZ25tT01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBc0d5R0orZEU0RjU2cThZVWUwV0xLNgpOK3ZzWFJIRGxSc2NNQ0I3eXhYYUFpQXN5SkdkMHJ0WG1hZTliM1BWL2V2Sk5ZZWdSUVJjUHd4K1h4alFEQnhoClFRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQoSGHylKsnnig8F9HLiikBhPXdWj7iO07LlyxJGMEQCIAeTl2pYGAxZqdEKqQlmTvZGqgLORzFyRjlmxyyGic0vAiANMGfJlwp5H9CSr6ZY06Tf5Lzedr02bbd7s+80psbkjw==", + "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", "", "", "CgkKAwECAxAEGAU=" diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_config.block b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_config.block index df6fedad3a8d4a62fbf73533dad991ba6ba3d958..a9f6c99e9ef5ced7c936442484ad90f42778512f 100644 GIT binary patch delta 249 zcmV`PbY*jNV`yP%ZfRsHKrt|8W-&N0HDxk4 zWi>c4Wi?@CV=`eeIbk<7HZWvkGdVdkV`VciI5K23Gh#3>GAw2>Vq-EgVr4ThW-~Q1 zW-$^P5*VP-_JL!6mji`Nr=n37I_s2mn*AfpR(r9ls0x$1AY_wLM<%m&3qci=ct=T- zLm^MIwjoO+lQ%_{lW8+5la56Ulg&k}lc7e}lXylblO7=@lfg$LlXyoYljKJd?@wKS delta 245 zcmey?&-ksMv7SpwN}*kHvV|@84Yjf;#xv|5R#UFN5M^L;S?j56Xeyq$NNk(Xk$y(5 z13$J&dUDr$wbXT8T;dTS4Kn1ASWAYPsApmzBRMP+e diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_config.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_config.block.json index 1cbba3a8..e30f4fce 100644 --- a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_config.block.json +++ b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_config.block.json @@ -711,15 +711,15 @@ "channel_id": "testchainid", "epoch": "0", "extension": null, - "timestamp": "2019-05-02T01:30:18Z", + "timestamp": "2019-05-02T08:30:59Z", "tls_cert_hash": null, - "tx_id": "cb62c9396856dd18a3dd67c3707e8a29cd0e1b9a900cf1444524dcd70fb6cffd", + "tx_id": "10ff1805e27e581e5aec2a19a7560dc3993ce3082d43b002f1bc22be30f352f1", "type": 1, "version": 1 }, "signature_header": { "creator": null, - "nonce": "Mpm6ZvDqMqxDM9Y0PqJjvOIUMqFYYVo1" + "nonce": "oNH2gWN/lwOFTKeiURY665R1mv0jzFZ7" } } }, @@ -728,7 +728,7 @@ ] }, "header": { - "data_hash": "hxmTOD0L2CZ2WgHMB0g6lNXoFQACRK1JIzE1F2miFrY=", + "data_hash": "uGNzxdLXxgveiQVZ896fDeIJFtcsFxLTnvyiZupgyvs=", "number": "0", "previous_hash": null }, diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/updated_config.json b/hyperledger_fabric/latest/raft/channel-artifacts/updated_config.json index b0d53f20..551ee8f6 100644 --- a/hyperledger_fabric/latest/raft/channel-artifacts/updated_config.json +++ b/hyperledger_fabric/latest/raft/channel-artifacts/updated_config.json @@ -426,21 +426,7 @@ { "principal": { "msp_identifier": "Org3MSP", - "role": "ADMIN" - }, - "principal_classification": "ROLE" - }, - { - "principal": { - "msp_identifier": "Org3MSP", - "role": "PEER" - }, - "principal_classification": "ROLE" - }, - { - "principal": { - "msp_identifier": "Org3MSP", - "role": "CLIENT" + "role": "MEMBER" }, "principal_classification": "ROLE" } @@ -451,12 +437,6 @@ "rules": [ { "signed_by": 0 - }, - { - "signed_by": 1 - }, - { - "signed_by": 2 } ] } @@ -475,14 +455,7 @@ { "principal": { "msp_identifier": "Org3MSP", - "role": "ADMIN" - }, - "principal_classification": "ROLE" - }, - { - "principal": { - "msp_identifier": "Org3MSP", - "role": "CLIENT" + "role": "MEMBER" }, "principal_classification": "ROLE" } @@ -493,9 +466,6 @@ "rules": [ { "signed_by": 0 - }, - { - "signed_by": 1 } ] } diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/updated_config.pb b/hyperledger_fabric/latest/raft/channel-artifacts/updated_config.pb index db8e29d0350e7a804dc4995d7ce610be73cfee59..fd2f2d92b024b53af17334fd07f88874bf942838 100644 GIT binary patch delta 214 zcmX@Pm$7FrqYekNP}^Qcp*!VV+>QkWIho0cC7JnoLTAc37=@OraIyOrr5pMN2MEnp z;b7c+UWG?+qK?Ak?J5$J#e`HR&obkiT%xQsIn#`H@@7F*F#Qxv^KfXfIi}=h<`r+0 zHW%Xisth*C7-Z5*<;@8~qJopfg;XXNsDKPG2Wy_E%sUyRd7d)Q<`rg3StkFoR+#K* sy>_#dO@YGXJZqK7T`|Q>T5OY-#jc;M8QVNL*IIS*cWY&!8Wp&002X6MR{#J2 delta 343 zcmeC#%Xo4xqcjJz(BZv|LNhD4xE%`$ax#+>OEUBGggPrY7&p5LnG5l4QsH9vFG@G| z4Gs`mrn0$9MO1L|a%IiQ@n$^rN)cS_L8*x;sYS&?zCz9%j6(K80z!O1nu&t}h(R=y z6t56B+z0_iR4y|rmr07vF(o%MuUN^Ii#@z3vjk+am5>3@Bpo3hAufc;AbnCejb)mg zA*ibkax>6EsF7MwT4*`MM}{CD%~s)HoNOUzu~COdaPl%`t;zod1tvdGRszy?lM4im vH)oqIWtnVZy>c>-waVtZ)&&Za3uB5WhghpHYEABo?V9{11|*fk0W%!{^)Oe; diff --git a/hyperledger_fabric/latest/raft/configtx.yaml b/hyperledger_fabric/latest/raft/configtx.yaml index 6365b436..5f503708 100644 --- a/hyperledger_fabric/latest/raft/configtx.yaml +++ b/hyperledger_fabric/latest/raft/configtx.yaml @@ -212,6 +212,57 @@ Organizations: - Host: peer0.org2.example.com Port: 7051 + - &Org3 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org3MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org3MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org3Policies + Readers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org3.example.com + Port: 7051 ################################################################################ # # CAPABILITIES diff --git a/hyperledger_fabric/latest/raft/logs/dev_all.log b/hyperledger_fabric/latest/raft/logs/dev_all.log index 1a65d148..70ef4c95 100644 --- a/hyperledger_fabric/latest/raft/logs/dev_all.log +++ b/hyperledger_fabric/latest/raft/logs/dev_all.log @@ -1,340 +1,374 @@ -Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example.com, peer0.org2.example.com, orderer2.example.com, fabric-cli, orderer1.example.com, orderer0.example.com -peer0.org1.example.com | "2019-05-02 01:30:33.052 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" -peer0.org1.example.com | "2019-05-02 01:30:33.053 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" -peer0.org1.example.com | "2019-05-02 01:30:33.053 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for peer.BCCSP.Default setting to string SW" -peer0.org1.example.com | "2019-05-02 01:30:33.054 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[string]interface{} value for peer.BCCSP.SW" -peer0.org1.example.com | "2019-05-02 01:30:33.055 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" -peer0.org1.example.com | "2019-05-02 01:30:33.056 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" -peer0.org1.example.com | "2019-05-02 01:30:33.057 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 256" -peer0.org1.example.com | "2019-05-02 01:30:33.057 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for peer.BCCSP.SW.Security setting to int 256" -peer0.org1.example.com | "2019-05-02 01:30:33.058 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" -peer0.org1.example.com | "2019-05-02 01:30:33.058 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" -peer0.org1.example.com | "2019-05-02 01:30:33.058 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " -peer0.org1.example.com | "2019-05-02 01:30:33.059 UTC [viperutil] getKeysRecursively -> DEBU 00c Found map[string]interface{} value for peer.BCCSP.PKCS11" -peer0.org1.example.com | "2019-05-02 01:30:33.060 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-05-02 01:30:33.061 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Hash setting to " -peer0.org1.example.com | "2019-05-02 01:30:33.063 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-05-02 01:30:33.064 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Security setting to " -peer0.org1.example.com | "2019-05-02 01:30:33.065 UTC [viperutil] getKeysRecursively -> DEBU 011 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" -peer0.org1.example.com | "2019-05-02 01:30:33.067 UTC [viperutil] unmarshalJSON -> DEBU 012 Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-05-02 01:30:33.068 UTC [viperutil] getKeysRecursively -> DEBU 013 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " -peer0.org1.example.com | "2019-05-02 01:30:33.069 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-05-02 01:30:33.071 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for peer.BCCSP.PKCS11.Library setting to " -peer0.org1.example.com | "2019-05-02 01:30:33.071 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-05-02 01:30:33.072 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.Label setting to " -peer0.org1.example.com | "2019-05-02 01:30:33.072 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-05-02 01:30:33.074 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.PKCS11.Pin setting to " -peer0.org1.example.com | "2019-05-02 01:30:33.074 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" -peer0.org1.example.com | "2019-05-02 01:30:33.079 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" -peer0.org1.example.com | "2019-05-02 01:30:33.079 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" -peer0.org1.example.com | "2019-05-02 01:30:33.079 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" -peer0.org1.example.com | "2019-05-02 01:30:33.095 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" -peer0.org1.example.com | "2019-05-02 01:30:33.104 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" -peer0.org1.example.com | "2019-05-02 01:30:33.117 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" -peer0.org1.example.com | "2019-05-02 01:30:33.125 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" -peer0.org1.example.com | "2019-05-02 01:30:33.129 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" -peer0.org1.example.com | "2019-05-02 01:30:33.132 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" -peer0.org1.example.com | "2019-05-02 01:30:33.134 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" -peer0.org1.example.com | "2019-05-02 01:30:33.135 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" -peer0.org1.example.com | "2019-05-02 01:30:33.143 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" -peer0.org1.example.com | "2019-05-02 01:30:33.151 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" -peer0.org1.example.com | "2019-05-02 01:30:33.155 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" -peer0.org1.example.com | "2019-05-02 01:30:33.155 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" -peer0.org1.example.com | "2019-05-02 01:30:33.158 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" -peer0.org1.example.com | "2019-05-02 01:30:33.165 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" -peer0.org1.example.com | "2019-05-02 01:30:33.191 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:33.192 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:33.193 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" -peer0.org1.example.com | "2019-05-02 01:30:33.193 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:33.194 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:33.194 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:33.194 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:33.214 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." -peer0.org1.example.com | "2019-05-02 01:30:33.234 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:33.237 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" -peer0.org1.example.com | "2019-05-02 01:30:33.240 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:33.241 UTC [nodeCmd] serve -> INFO 037 Starting peer: -peer0.org1.example.com | Version: 2.0.0 -peer0.org1.example.com | Commit SHA: development build -peer0.org1.example.com | Go version: go1.12.4 -peer0.org1.example.com | OS/Arch: linux/amd64 -peer0.org1.example.com | Chaincode: -peer0.org1.example.com | Base Docker Namespace: hyperledger -peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric -peer0.org1.example.com | Docker Namespace: hyperledger" -peer0.org1.example.com | "2019-05-02 01:30:33.242 UTC [peer] getLocalAddress -> INFO 038 Auto-detected peer address: 192.168.240.7:7051" -peer0.org1.example.com | "2019-05-02 01:30:33.243 UTC [peer] getLocalAddress -> INFO 039 Returning peer0.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:33.255 UTC [msp] GetDefaultSigningIdentity -> DEBU 03a Obtaining default signing identity" -peer0.org1.example.com | "2019-05-02 01:30:33.255 UTC [msp.identity] Sign -> DEBU 03b Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " -peer0.org1.example.com | "2019-05-02 01:30:33.255 UTC [msp.identity] Sign -> DEBU 03c Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " -peer0.org1.example.com | "2019-05-02 01:30:33.284 UTC [ledgermgmt] initialize -> INFO 03d Initializing ledger mgmt" -peer0.org1.example.com | "2019-05-02 01:30:33.285 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03e CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" -peer0.org1.example.com | "2019-05-02 01:30:33.285 UTC [kvledger.util] logDirStatus -> DEBU 03f Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" -peer0.org1.example.com | "2019-05-02 01:30:33.290 UTC [kvledger.util] logDirStatus -> DEBU 040 After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" -peer0.org1.example.com | "2019-05-02 01:30:33.325 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" -peer0.org1.example.com | "2019-05-02 01:30:33.325 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" -peer0.org1.example.com | "2019-05-02 01:30:33.325 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" -peer0.org1.example.com | "2019-05-02 01:30:33.369 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" -peer0.org1.example.com | "2019-05-02 01:30:33.370 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" -peer0.org1.example.com | "2019-05-02 01:30:33.372 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" -peer0.org1.example.com | "2019-05-02 01:30:33.423 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 047 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" -peer0.org1.example.com | "2019-05-02 01:30:33.424 UTC [kvledger.util] CreateDirIfMissing -> DEBU 048 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" -peer0.org1.example.com | "2019-05-02 01:30:33.424 UTC [kvledger.util] logDirStatus -> DEBU 049 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" -peer0.org1.example.com | "2019-05-02 01:30:33.424 UTC [kvledger.util] logDirStatus -> DEBU 04a After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" -peer0.org1.example.com | "2019-05-02 01:30:33.441 UTC [confighistory] newDBProvider -> DEBU 04b Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" -peer0.org1.example.com | "2019-05-02 01:30:33.441 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" -peer0.org1.example.com | "2019-05-02 01:30:33.442 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" -peer0.org1.example.com | "2019-05-02 01:30:33.442 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" -peer0.org1.example.com | "2019-05-02 01:30:33.480 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" -peer0.org1.example.com | "2019-05-02 01:30:33.482 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" -peer0.org1.example.com | "2019-05-02 01:30:33.483 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" -peer0.org1.example.com | "2019-05-02 01:30:33.493 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 052 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" -peer0.org1.example.com | "2019-05-02 01:30:33.493 UTC [kvledger.util] CreateDirIfMissing -> DEBU 053 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" -peer0.org1.example.com | "2019-05-02 01:30:33.494 UTC [kvledger.util] logDirStatus -> DEBU 054 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" -peer0.org1.example.com | "2019-05-02 01:30:33.494 UTC [kvledger.util] logDirStatus -> DEBU 055 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" -peer0.org1.example.com | "2019-05-02 01:30:33.505 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 056 Recovering under construction ledger" -peer0.org1.example.com | "2019-05-02 01:30:33.506 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 057 No under construction ledger found. Quitting recovery" -peer0.org1.example.com | "2019-05-02 01:30:33.507 UTC [ledgermgmt] initialize -> INFO 058 ledger mgmt initialized" -peer0.org1.example.com | "2019-05-02 01:30:33.508 UTC [lifecycle] InitializeLocalChaincodes -> INFO 059 Initialized lifecycle cache with 0 already installed chaincodes" -peer0.org1.example.com | "2019-05-02 01:30:33.530 UTC [nodeCmd] serve -> INFO 05a Starting peer with TLS enabled" -peer0.org1.example.com | "2019-05-02 01:30:33.546 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05b Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" -peer0.org1.example.com | "2019-05-02 01:30:33.547 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05c Exit with ccEndpoint: peer0.org1.example.com:7052" -peer0.org1.example.com | "2019-05-02 01:30:33.560 UTC [inproccontroller] Register -> DEBU 05d Registering chaincode instance: lscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.561 UTC [sccapi] registerSysCC -> INFO 05e system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" -peer0.org1.example.com | "2019-05-02 01:30:33.562 UTC [inproccontroller] Register -> DEBU 05f Registering chaincode instance: cscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.562 UTC [sccapi] registerSysCC -> INFO 060 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" -peer0.org1.example.com | "2019-05-02 01:30:33.563 UTC [inproccontroller] Register -> DEBU 061 Registering chaincode instance: qscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.565 UTC [sccapi] registerSysCC -> INFO 062 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" -peer0.org1.example.com | "2019-05-02 01:30:33.566 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: _lifecycle:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.567 UTC [sccapi] registerSysCC -> INFO 064 system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" -peer0.org1.example.com | "2019-05-02 01:30:33.573 UTC [nodeCmd] serve -> DEBU 065 Running peer" -peer0.org1.example.com | "2019-05-02 01:30:33.574 UTC [msp] GetDefaultSigningIdentity -> DEBU 066 Obtaining default signing identity" -peer0.org1.example.com | "2019-05-02 01:30:33.575 UTC [viperutil] getKeysRecursively -> DEBU 067 Found map[string]interface{} value for peer.handlers" -peer0.org1.example.com | "2019-05-02 01:30:33.576 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[string]interface{} value for peer.handlers.validators" -peer0.org1.example.com | "2019-05-02 01:30:33.576 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for peer.handlers.validators.vscc" -peer0.org1.example.com | "2019-05-02 01:30:33.581 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" -peer0.org1.example.com | "2019-05-02 01:30:33.582 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" -peer0.org1.example.com | "2019-05-02 01:30:33.582 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-05-02 01:30:33.583 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for peer.handlers.validators.vscc.library setting to " -peer0.org1.example.com | "2019-05-02 01:30:33.584 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" -peer0.org1.example.com | "2019-05-02 01:30:33.584 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" -peer0.org1.example.com | "2019-05-02 01:30:33.585 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" -peer0.org1.example.com | "2019-05-02 01:30:33.585 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" -peer0.org1.example.com | "2019-05-02 01:30:33.586 UTC [viperutil] getKeysRecursively -> DEBU 072 Found map[string]interface{} value for peer.handlers.endorsers" -peer0.org1.example.com | "2019-05-02 01:30:33.586 UTC [viperutil] getKeysRecursively -> DEBU 073 Found map[string]interface{} value for peer.handlers.endorsers.escc" -peer0.org1.example.com | "2019-05-02 01:30:33.587 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" -peer0.org1.example.com | "2019-05-02 01:30:33.588 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" -peer0.org1.example.com | "2019-05-02 01:30:33.589 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-05-02 01:30:33.591 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for peer.handlers.endorsers.escc.library setting to " -peer0.org1.example.com | "2019-05-02 01:30:33.591 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 078 map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" -peer0.org1.example.com | "2019-05-02 01:30:33.606 UTC [gossip.service] func1 -> INFO 079 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" -peer0.org1.example.com | "2019-05-02 01:30:33.610 UTC [msp] DeserializeIdentity -> DEBU 07a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:33.611 UTC [msp.identity] newIdentity -> DEBU 07b Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:33.612 UTC [msp] Validate -> DEBU 07c MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:33.613 UTC [gossip.discovery] periodicalSendAlive -> DEBU 07d Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:30:33.613 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 07e Sleeping 25s" -peer0.org1.example.com | "2019-05-02 01:30:33.613 UTC [gossip.gossip] NewGossipService -> INFO 07f Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " -peer0.org1.example.com | "2019-05-02 01:30:33.614 UTC [msp.identity] Sign -> DEBU 080 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:30:33.614 UTC [msp.identity] Sign -> DEBU 081 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " -peer0.org1.example.com | "2019-05-02 01:30:33.614 UTC [gossip.pull] Add -> DEBU 082 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" -peer0.org1.example.com | "2019-05-02 01:30:33.614 UTC [gossip.gossip] start -> INFO 083 Gossip instance peer0.org1.example.com:7051 started" -peer0.org1.example.com | "2019-05-02 01:30:33.615 UTC [gossip.gossip] syncDiscovery -> DEBU 084 Entering discovery sync with interval 4s" -peer0.org1.example.com | "2019-05-02 01:30:33.615 UTC [msp.identity] Sign -> DEBU 085 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:30:33.615 UTC [msp.identity] Sign -> DEBU 086 Sign: digest: 87DC3B0FD0CDF32FEECEBDF17BDD8C231EEEAD76AD06D2152F80F14FACF21E24 " -peer0.org1.example.com | "2019-05-02 01:30:33.615 UTC [msp.identity] Sign -> DEBU 087 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:33.615 UTC [msp.identity] Sign -> DEBU 088 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:33.616 UTC [gossip.discovery] Connect -> DEBU 089 Skipping connecting to myself" -peer0.org1.example.com | "2019-05-02 01:30:33.617 UTC [chaincode] LaunchConfig -> DEBU 08a launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -peer0.org1.example.com | "2019-05-02 01:30:33.618 UTC [chaincode] Start -> DEBU 08b start container: lscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.618 UTC [chaincode] Start -> DEBU 08c start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -peer0.org1.example.com | "2019-05-02 01:30:33.619 UTC [chaincode] Start -> DEBU 08d start container with env: -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} -peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:2.0.0 -peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true -peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key -peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt -peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -peer0.org1.example.com | "2019-05-02 01:30:33.621 UTC [container] lockContainer -> DEBU 08e waiting for container(lscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.621 UTC [container] lockContainer -> DEBU 08f got container (lscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.622 UTC [inproccontroller] getInstance -> DEBU 090 chaincode instance created for lscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.622 UTC [inproccontroller] func2 -> DEBU 091 chaincode-support started for lscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.623 UTC [inproccontroller] func1 -> DEBU 092 chaincode started for lscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.623 UTC [chaincode] handleMessage -> DEBU 093 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -peer0.org1.example.com | "2019-05-02 01:30:33.623 UTC [chaincode] HandleRegister -> DEBU 094 Received REGISTER in state created" -peer0.org1.example.com | "2019-05-02 01:30:33.623 UTC [chaincode] Register -> DEBU 095 registered handler complete for chaincode lscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.624 UTC [chaincode] HandleRegister -> DEBU 096 Got REGISTER for chaincodeID = name:"lscc:2.0.0" , sending back REGISTERED" -peer0.org1.example.com | "2019-05-02 01:30:33.624 UTC [chaincode] HandleRegister -> DEBU 097 Changed state to established for name:"lscc:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.624 UTC [chaincode] sendReady -> DEBU 098 sending READY for chaincode name:"lscc:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.624 UTC [chaincode] sendReady -> DEBU 099 Changed to state ready for chaincode name:"lscc:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.624 UTC [chaincode] Launch -> DEBU 09a launch complete" -peer0.org1.example.com | "2019-05-02 01:30:33.624 UTC [chaincode] Execute -> DEBU 09b Entry" -peer0.org1.example.com | "2019-05-02 01:30:33.625 UTC [chaincode] handleMessage -> DEBU 09c [652f1cc0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:33.625 UTC [chaincode] Notify -> DEBU 09d [652f1cc0] notifying Txid:652f1cc0-bac7-419d-891d-111cedf29756, channelID:" -peer0.org1.example.com | "2019-05-02 01:30:33.625 UTC [chaincode] Execute -> DEBU 09e Exit" -peer0.org1.example.com | "2019-05-02 01:30:33.625 UTC [sccapi] deploySysCC -> INFO 09f system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer0.org1.example.com | "2019-05-02 01:30:33.626 UTC [chaincode] LaunchConfig -> DEBU 0a0 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -peer0.org1.example.com | "2019-05-02 01:30:33.626 UTC [chaincode] Start -> DEBU 0a1 start container: cscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.626 UTC [chaincode] Start -> DEBU 0a2 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -peer0.org1.example.com | "2019-05-02 01:30:33.626 UTC [chaincode] Start -> DEBU 0a3 start container with env: -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} -peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:2.0.0 -peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true -peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key -peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt -peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -peer0.org1.example.com | "2019-05-02 01:30:33.622 UTC [container] unlockContainer -> DEBU 0a4 container lock deleted(lscc:2.0.0)" -peer0.org1.example.com | "2019-05-02 01:30:33.627 UTC [container] lockContainer -> DEBU 0a5 waiting for container(lscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.627 UTC [container] lockContainer -> DEBU 0a6 waiting for container(cscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.627 UTC [container] lockContainer -> DEBU 0a7 got container (cscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.627 UTC [inproccontroller] getInstance -> DEBU 0a8 chaincode instance created for cscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.627 UTC [container] unlockContainer -> DEBU 0a9 container lock deleted(cscc:2.0.0)" -peer0.org1.example.com | "2019-05-02 01:30:33.628 UTC [container] lockContainer -> DEBU 0aa waiting for container(cscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.628 UTC [container] lockContainer -> DEBU 0ab got container (cscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.628 UTC [container] unlockContainer -> DEBU 0ac container lock deleted(cscc:2.0.0)" -peer0.org1.example.com | "2019-05-02 01:30:33.628 UTC [inproccontroller] func2 -> DEBU 0ad chaincode-support started for cscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.628 UTC [inproccontroller] func1 -> DEBU 0ae chaincode started for cscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.628 UTC [chaincode] handleMessage -> DEBU 0af [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -peer0.org1.example.com | "2019-05-02 01:30:33.629 UTC [chaincode] HandleRegister -> DEBU 0b0 Received REGISTER in state created" -peer0.org1.example.com | "2019-05-02 01:30:33.629 UTC [chaincode] Register -> DEBU 0b1 registered handler complete for chaincode cscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.629 UTC [chaincode] HandleRegister -> DEBU 0b2 Got REGISTER for chaincodeID = name:"cscc:2.0.0" , sending back REGISTERED" -peer0.org1.example.com | "2019-05-02 01:30:33.629 UTC [chaincode] HandleRegister -> DEBU 0b3 Changed state to established for name:"cscc:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.629 UTC [chaincode] sendReady -> DEBU 0b4 sending READY for chaincode name:"cscc:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.629 UTC [chaincode] sendReady -> DEBU 0b5 Changed to state ready for chaincode name:"cscc:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.629 UTC [chaincode] Launch -> DEBU 0b6 launch complete" -peer0.org1.example.com | "2019-05-02 01:30:33.629 UTC [chaincode] Execute -> DEBU 0b7 Entry" -peer0.org1.example.com | "2019-05-02 01:30:33.629 UTC [cscc] Init -> INFO 0b8 Init CSCC" -peer0.org1.example.com | "2019-05-02 01:30:33.630 UTC [chaincode] handleMessage -> DEBU 0b9 [bd75d9cf] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:33.630 UTC [chaincode] Notify -> DEBU 0ba [bd75d9cf] notifying Txid:bd75d9cf-62f5-4989-90ef-97287fa18c8f, channelID:" -peer0.org1.example.com | "2019-05-02 01:30:33.630 UTC [chaincode] Execute -> DEBU 0bb Exit" -peer0.org1.example.com | "2019-05-02 01:30:33.630 UTC [sccapi] deploySysCC -> INFO 0bc system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer0.org1.example.com | "2019-05-02 01:30:33.634 UTC [chaincode] LaunchConfig -> DEBU 0bd launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -peer0.org1.example.com | "2019-05-02 01:30:33.634 UTC [chaincode] Start -> DEBU 0be start container: qscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [chaincode] Start -> DEBU 0bf start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [chaincode] Start -> DEBU 0c0 start container with env: -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} -peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:2.0.0 -peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true -peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key -peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt -peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [container] lockContainer -> DEBU 0c1 waiting for container(qscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [container] lockContainer -> DEBU 0c2 got container (qscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [inproccontroller] getInstance -> DEBU 0c3 chaincode instance created for qscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [container] unlockContainer -> DEBU 0c4 container lock deleted(qscc:2.0.0)" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [container] lockContainer -> DEBU 0c5 waiting for container(qscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [container] lockContainer -> DEBU 0c6 got container (qscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [container] unlockContainer -> DEBU 0c7 container lock deleted(qscc:2.0.0)" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [inproccontroller] func2 -> DEBU 0c8 chaincode-support started for qscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [inproccontroller] func1 -> DEBU 0c9 chaincode started for qscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.635 UTC [chaincode] handleMessage -> DEBU 0ca [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -peer0.org1.example.com | "2019-05-02 01:30:33.636 UTC [chaincode] HandleRegister -> DEBU 0cb Received REGISTER in state created" -peer0.org1.example.com | "2019-05-02 01:30:33.636 UTC [chaincode] Register -> DEBU 0cc registered handler complete for chaincode qscc:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.636 UTC [chaincode] HandleRegister -> DEBU 0cd Got REGISTER for chaincodeID = name:"qscc:2.0.0" , sending back REGISTERED" -peer0.org1.example.com | "2019-05-02 01:30:33.636 UTC [chaincode] HandleRegister -> DEBU 0ce Changed state to established for name:"qscc:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.636 UTC [chaincode] sendReady -> DEBU 0cf sending READY for chaincode name:"qscc:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.636 UTC [chaincode] sendReady -> DEBU 0d0 Changed to state ready for chaincode name:"qscc:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.637 UTC [chaincode] Launch -> DEBU 0d1 launch complete" -peer0.org1.example.com | "2019-05-02 01:30:33.637 UTC [chaincode] Execute -> DEBU 0d2 Entry" -peer0.org1.example.com | "2019-05-02 01:30:33.637 UTC [qscc] Init -> INFO 0d3 Init QSCC" -peer0.org1.example.com | "2019-05-02 01:30:33.637 UTC [chaincode] handleMessage -> DEBU 0d4 [ce70f4bb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:33.637 UTC [chaincode] Notify -> DEBU 0d5 [ce70f4bb] notifying Txid:ce70f4bb-2c09-4d21-a344-8433c20e846d, channelID:" -peer0.org1.example.com | "2019-05-02 01:30:33.637 UTC [chaincode] Execute -> DEBU 0d6 Exit" -peer0.org1.example.com | "2019-05-02 01:30:33.637 UTC [sccapi] deploySysCC -> INFO 0d7 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer0.org1.example.com | "2019-05-02 01:30:33.638 UTC [chaincode] LaunchConfig -> DEBU 0d8 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -peer0.org1.example.com | "2019-05-02 01:30:33.638 UTC [chaincode] Start -> DEBU 0d9 start container: _lifecycle:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.638 UTC [chaincode] Start -> DEBU 0da start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -peer0.org1.example.com | "2019-05-02 01:30:33.638 UTC [chaincode] Start -> DEBU 0db start container with env: -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} -peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0 -peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true -peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key -peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt -peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -peer0.org1.example.com | "2019-05-02 01:30:33.639 UTC [container] lockContainer -> DEBU 0dd waiting for container(_lifecycle:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.639 UTC [container] lockContainer -> DEBU 0dc got container (lscc:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.639 UTC [container] unlockContainer -> DEBU 0de container lock deleted(lscc:2.0.0)" -peer0.org1.example.com | "2019-05-02 01:30:33.639 UTC [container] lockContainer -> DEBU 0df got container (_lifecycle:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.639 UTC [inproccontroller] getInstance -> DEBU 0e0 chaincode instance created for _lifecycle:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.640 UTC [container] unlockContainer -> DEBU 0e1 container lock deleted(_lifecycle:2.0.0)" -peer0.org1.example.com | "2019-05-02 01:30:33.640 UTC [inproccontroller] func2 -> DEBU 0e2 chaincode-support started for _lifecycle:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.640 UTC [inproccontroller] func1 -> DEBU 0e3 chaincode started for _lifecycle:2.0.0" -orderer2.example.com | 2019-05-02 01:30:30.745 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 -orderer2.example.com | "2019-05-02 01:30:30.925 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: -peer1.org2.example.com | "2019-05-02 01:30:33.569 UTC [nodeCmd] serve -> INFO 001 Starting peer: +Attaching to peer0.org2.example.com, peer0.org1.example.com, peer1.org2.example.com, peer1.org1.example.com, orderer1.example.com, fabric-cli, orderer2.example.com, orderer0.example.com +peer0.org1.example.com | "2019-05-02 09:27:08.750 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" +peer0.org1.example.com | "2019-05-02 09:27:08.752 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +peer0.org1.example.com | "2019-05-02 09:27:08.752 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for peer.BCCSP.Default setting to string SW" +peer0.org1.example.com | "2019-05-02 09:27:08.752 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[string]interface{} value for peer.BCCSP.SW" +peer0.org1.example.com | "2019-05-02 09:27:08.753 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +peer0.org1.example.com | "2019-05-02 09:27:08.753 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" +peer0.org1.example.com | "2019-05-02 09:27:08.753 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 256" +peer0.org1.example.com | "2019-05-02 09:27:08.753 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for peer.BCCSP.SW.Security setting to int 256" +peer0.org1.example.com | "2019-05-02 09:27:08.754 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" +peer0.org1.example.com | "2019-05-02 09:27:08.754 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" +peer0.org1.example.com | "2019-05-02 09:27:08.754 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " +peer0.org1.example.com | "2019-05-02 09:27:08.755 UTC [viperutil] getKeysRecursively -> DEBU 00c Found map[string]interface{} value for peer.BCCSP.PKCS11" +peer0.org1.example.com | "2019-05-02 09:27:08.756 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-05-02 09:27:08.756 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Pin setting to " +peer0.org1.example.com | "2019-05-02 09:27:08.757 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-05-02 09:27:08.758 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Hash setting to " +peer0.org1.example.com | "2019-05-02 09:27:08.758 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-05-02 09:27:08.759 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Security setting to " +peer0.org1.example.com | "2019-05-02 09:27:08.759 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" +peer0.org1.example.com | "2019-05-02 09:27:08.759 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-05-02 09:27:08.760 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " +peer0.org1.example.com | "2019-05-02 09:27:08.760 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-05-02 09:27:08.761 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.Library setting to " +peer0.org1.example.com | "2019-05-02 09:27:08.762 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-05-02 09:27:08.762 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.PKCS11.Label setting to " +peer0.org1.example.com | "2019-05-02 09:27:08.762 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" +peer0.org1.example.com | "2019-05-02 09:27:08.769 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" +peer0.org1.example.com | "2019-05-02 09:27:08.769 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" +peer0.org1.example.com | "2019-05-02 09:27:08.769 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" +peer0.org1.example.com | "2019-05-02 09:27:08.773 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-05-02 09:27:08.777 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" +peer0.org1.example.com | "2019-05-02 09:27:08.782 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-05-02 09:27:08.785 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" +peer0.org1.example.com | "2019-05-02 09:27:08.789 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" +peer0.org1.example.com | "2019-05-02 09:27:08.791 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" +peer0.org1.example.com | "2019-05-02 09:27:08.792 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" +peer0.org1.example.com | "2019-05-02 09:27:08.793 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" +peer0.org1.example.com | "2019-05-02 09:27:08.796 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-05-02 09:27:08.799 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" +peer0.org1.example.com | "2019-05-02 09:27:08.800 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" +peer0.org1.example.com | "2019-05-02 09:27:08.800 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" +peer0.org1.example.com | "2019-05-02 09:27:08.801 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" +peer0.org1.example.com | "2019-05-02 09:27:08.804 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" +peer0.org1.example.com | "2019-05-02 09:27:08.812 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:08.812 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:08.812 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" +peer0.org1.example.com | "2019-05-02 09:27:08.813 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:08.814 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer1.org1.example.com | "2019-05-02 09:27:08.841 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org1.example.com | Version: 2.0.0 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.12.4 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger" +peer1.org1.example.com | "2019-05-02 09:27:08.845 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 172.18.0.6:7051" +peer1.org1.example.com | "2019-05-02 09:27:08.845 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-05-02 09:27:08.850 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org1.example.com | "2019-05-02 09:27:09.016 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer1.org1.example.com | "2019-05-02 09:27:09.017 UTC [lifecycle] InitializeLocalChaincodes -> INFO 006 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org1.example.com | "2019-05-02 09:27:09.041 UTC [nodeCmd] serve -> INFO 007 Starting peer with TLS enabled" +peer1.org1.example.com | "2019-05-02 09:27:09.051 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 008 Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" +peer1.org1.example.com | "2019-05-02 09:27:09.052 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 009 Exit with ccEndpoint: peer1.org1.example.com:7052" +peer1.org1.example.com | "2019-05-02 09:27:09.080 UTC [sccapi] registerSysCC -> INFO 00a system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org1.example.com | "2019-05-02 09:27:09.081 UTC [sccapi] registerSysCC -> INFO 00b system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org1.example.com | "2019-05-02 09:27:09.081 UTC [sccapi] registerSysCC -> INFO 00c system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org1.example.com | "2019-05-02 09:27:09.082 UTC [sccapi] registerSysCC -> INFO 00d system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org1.example.com | "2019-05-02 09:27:09.128 UTC [gossip.service] func1 -> INFO 00e Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" +peer1.org1.example.com | "2019-05-02 09:27:09.135 UTC [gossip.gossip] NewGossipService -> INFO 00f Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: " +peer1.org1.example.com | "2019-05-02 09:27:09.139 UTC [gossip.gossip] start -> INFO 010 Gossip instance peer1.org1.example.com:7051 started" +peer1.org1.example.com | "2019-05-02 09:27:09.154 UTC [sccapi] deploySysCC -> INFO 011 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-05-02 09:27:09.168 UTC [cscc] Init -> INFO 012 Init CSCC" +peer1.org1.example.com | "2019-05-02 09:27:09.172 UTC [sccapi] deploySysCC -> INFO 013 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-05-02 09:27:09.176 UTC [qscc] Init -> INFO 014 Init QSCC" +peer1.org1.example.com | "2019-05-02 09:27:09.178 UTC [sccapi] deploySysCC -> INFO 015 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-05-02 09:27:09.179 UTC [sccapi] deploySysCC -> INFO 016 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-05-02 09:27:09.179 UTC [nodeCmd] serve -> INFO 017 Deployed system chaincodes" +peer1.org1.example.com | "2019-05-02 09:27:09.183 UTC [discovery] NewService -> INFO 018 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org1.example.com | "2019-05-02 09:27:09.183 UTC [nodeCmd] registerDiscoveryService -> INFO 019 Discovery service activated" +peer1.org1.example.com | "2019-05-02 09:27:09.184 UTC [nodeCmd] serve -> INFO 01a Starting peer with ID=[peer1.org1.example.com], network ID=[], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-05-02 09:27:09.184 UTC [nodeCmd] serve -> INFO 01b Started peer with ID=[peer1.org1.example.com], network ID=[], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-05-02 09:27:16.487 UTC [endorser] callChaincode -> INFO 01c [][f532fb0e] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-05-02 09:27:16.500 UTC [ledgermgmt] CreateLedger -> INFO 01d Creating ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-05-02 09:27:16.506 UTC [fsblkstorage] newBlockfileMgr -> INFO 01e Getting block information from block storage" +peer1.org1.example.com | "2019-05-02 09:27:16.529 UTC [kvledger] CommitWithPvtData -> INFO 01f [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=1ms block_commit=9ms state_commit=2ms)" +peer1.org1.example.com | "2019-05-02 09:27:16.531 UTC [ledgermgmt] CreateLedger -> INFO 020 Created ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-05-02 09:27:16.539 UTC [gossip.gossip] JoinChan -> INFO 021 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-05-02 09:27:16.539 UTC [gossip.gossip] learnAnchorPeers -> INFO 022 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-05-02 09:27:16.540 UTC [gossip.gossip] learnAnchorPeers -> INFO 023 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-05-02 09:27:16.567 UTC [gossip.state] NewGossipStateProvider -> INFO 024 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org1.example.com | "2019-05-02 09:27:16.570 UTC [sccapi] deploySysCC -> INFO 025 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-05-02 09:27:16.571 UTC [cscc] Init -> INFO 026 Init CSCC" +peer1.org1.example.com | "2019-05-02 09:27:16.571 UTC [sccapi] deploySysCC -> INFO 027 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-05-02 09:27:16.572 UTC [qscc] Init -> INFO 028 Init QSCC" +peer1.org1.example.com | "2019-05-02 09:27:16.572 UTC [sccapi] deploySysCC -> INFO 029 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-05-02 09:27:16.573 UTC [sccapi] deploySysCC -> INFO 02a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-05-02 09:27:16.574 UTC [endorser] callChaincode -> INFO 02b [][f532fb0e] Exit chaincode: name:"cscc" (83ms)" +peer1.org1.example.com | "2019-05-02 09:27:16.574 UTC [comm.grpc.server] 1 -> INFO 02c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55336 grpc.code=OK grpc.call_duration=88.0261ms +peer1.org1.example.com | "2019-05-02 09:27:17.674 UTC [endorser] callChaincode -> INFO 02d [][061aeb3a] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-05-02 09:27:17.675 UTC [endorser] callChaincode -> INFO 02e [][061aeb3a] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-05-02 09:27:17.676 UTC [comm.grpc.server] 1 -> INFO 02f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55344 grpc.code=OK grpc.call_duration=2.2942ms +peer1.org1.example.com | "2019-05-02 09:27:18.618 UTC [endorser] callChaincode -> INFO 030 [][1d2a8972] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-05-02 09:27:18.620 UTC [endorser] callChaincode -> INFO 031 [][1d2a8972] Exit chaincode: name:"qscc" (2ms)" +peer1.org1.example.com | "2019-05-02 09:27:18.621 UTC [comm.grpc.server] 1 -> INFO 032 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55352 grpc.code=OK grpc.call_duration=3.6828ms +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:08.815 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:08.816 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:08.819 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." +peer0.org1.example.com | "2019-05-02 09:27:08.823 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:08.824 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +peer0.org1.example.com | "2019-05-02 09:27:08.825 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:08.825 UTC [nodeCmd] serve -> INFO 037 Starting peer: +peer0.org1.example.com | Version: 2.0.0 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.12.4 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger" +peer0.org1.example.com | "2019-05-02 09:27:08.826 UTC [peer] getLocalAddress -> INFO 038 Auto-detected peer address: 172.18.0.7:7051" +peer0.org1.example.com | "2019-05-02 09:27:08.826 UTC [peer] getLocalAddress -> INFO 039 Returning peer0.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:08.841 UTC [msp] GetDefaultSigningIdentity -> DEBU 03a Obtaining default signing identity" +peer0.org1.example.com | "2019-05-02 09:27:08.842 UTC [msp.identity] Sign -> DEBU 03b Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +peer0.org1.example.com | "2019-05-02 09:27:08.842 UTC [msp.identity] Sign -> DEBU 03c Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +peer0.org1.example.com | "2019-05-02 09:27:08.844 UTC [ledgermgmt] initialize -> INFO 03d Initializing ledger mgmt" +peer1.org1.example.com | "2019-05-02 09:27:21.542 UTC [gossip.channel] reportMembershipChanges -> INFO 033 Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-05-02 09:27:22.349 UTC [gossip.election] leaderElection -> INFO 034 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" +peer1.org1.example.com | "2019-05-02 09:27:22.378 UTC [gossip.privdata] StoreBlock -> INFO 035 [businesschannel] Received block [1] from buffer" +peer1.org1.example.com | "2019-05-02 09:27:22.395 UTC [gossip.gossip] JoinChan -> INFO 036 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-05-02 09:27:22.395 UTC [gossip.gossip] learnAnchorPeers -> INFO 037 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-05-02 09:27:22.395 UTC [gossip.gossip] learnAnchorPeers -> INFO 038 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-05-02 09:27:22.396 UTC [gossip.service] updateEndpoints -> WARN 039 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-05-02 09:27:22.408 UTC [committer.txvalidator] Validate -> INFO 03a [businesschannel] Validated block [1] in 30ms" +peer1.org1.example.com | "2019-05-02 09:27:22.424 UTC [gossip.comm] func1 -> WARN 03b peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org1.example.com | "2019-05-02 09:27:22.424 UTC [gossip.discovery] expireDeadMembers -> WARN 03c Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org1.example.com | "2019-05-02 09:27:22.424 UTC [gossip.discovery] expireDeadMembers -> WARN 03d Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org1.example.com | "2019-05-02 09:27:22.424 UTC [gossip.discovery] expireDeadMembers -> WARN 03e Exiting" +peer1.org1.example.com | "2019-05-02 09:27:22.426 UTC [kvledger] CommitWithPvtData -> INFO 03f [businesschannel] Committed block [1] with 1 transaction(s) in 17ms (state_validation=1ms block_commit=11ms state_commit=2ms)" +peer1.org1.example.com | "2019-05-02 09:27:22.427 UTC [gossip.privdata] StoreBlock -> INFO 040 [businesschannel] Received block [2] from buffer" +peer1.org1.example.com | "2019-05-02 09:27:22.444 UTC [gossip.gossip] JoinChan -> INFO 041 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-05-02 09:27:22.444 UTC [gossip.gossip] learnAnchorPeers -> INFO 042 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-05-02 09:27:22.445 UTC [gossip.gossip] learnAnchorPeers -> INFO 043 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-05-02 09:27:22.445 UTC [gossip.service] updateEndpoints -> WARN 044 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-05-02 09:27:22.463 UTC [committer.txvalidator] Validate -> INFO 045 [businesschannel] Validated block [2] in 35ms" +peer1.org1.example.com | "2019-05-02 09:27:22.495 UTC [kvledger] CommitWithPvtData -> INFO 046 [businesschannel] Committed block [2] with 1 transaction(s) in 31ms (state_validation=1ms block_commit=22ms state_commit=4ms)" +peer1.org1.example.com | "2019-05-02 09:27:25.851 UTC [endorser] callChaincode -> INFO 047 [][9f77e471] Entry chaincode: name:"_lifecycle" " +peer1.org1.example.com | "2019-05-02 09:27:25.853 UTC [endorser] callChaincode -> INFO 048 [][9f77e471] Exit chaincode: name:"_lifecycle" (1ms)" +peer1.org1.example.com | "2019-05-02 09:27:25.853 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55408 grpc.code=OK grpc.call_duration=2.1499ms +peer1.org1.example.com | "2019-05-02 09:27:26.539 UTC [gossip.channel] reportMembershipChanges -> INFO 04a Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-05-02 09:27:29.026 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:31.026Z grpc.peer_address=172.18.0.5:33146 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=146.3µs +peer1.org1.example.com | "2019-05-02 09:27:30.032 UTC [gossip.privdata] StoreBlock -> INFO 04c [businesschannel] Received block [3] from buffer" +peer1.org1.example.com | "2019-05-02 09:27:30.065 UTC [committer.txvalidator] Validate -> INFO 04d [businesschannel] Validated block [3] in 32ms" +peer1.org1.example.com | "2019-05-02 09:27:30.103 UTC [gossip.privdata] StoreBlock -> INFO 04e [businesschannel] Fetched all missing collection private write sets from remote peers for block [3] (21ms)" +peer1.org1.example.com | "2019-05-02 09:27:30.105 UTC [confighistory] HandleStateUpdates -> ERRO 04f Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0034fe5c0)}" +peer1.org1.example.com | "2019-05-02 09:27:30.138 UTC [kvledger] CommitWithPvtData -> INFO 050 [businesschannel] Committed block [3] with 1 transaction(s) in 34ms (state_validation=1ms block_commit=27ms state_commit=3ms)" +peer1.org1.example.com | "2019-05-02 09:27:32.541 UTC [gossip.privdata] StoreBlock -> INFO 051 [businesschannel] Received block [4] from buffer" +peer1.org1.example.com | "2019-05-02 09:27:32.572 UTC [committer.txvalidator] Validate -> INFO 052 [businesschannel] Validated block [4] in 30ms" +peer1.org1.example.com | "2019-05-02 09:27:32.640 UTC [confighistory] HandleStateUpdates -> ERRO 053 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003632be0)}" +peer1.org1.example.com | "2019-05-02 09:27:32.680 UTC [kvledger] CommitWithPvtData -> INFO 054 [businesschannel] Committed block [4] with 1 transaction(s) in 80ms (state_validation=39ms block_commit=22ms state_commit=13ms)" +peer1.org1.example.com | "2019-05-02 09:27:36.541 UTC [gossip.channel] reportMembershipChanges -> INFO 055 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-05-02 09:27:36.833 UTC [gossip.privdata] StoreBlock -> INFO 056 [businesschannel] Received block [5] from buffer" +peer1.org1.example.com | "2019-05-02 09:27:36.851 UTC [committer.txvalidator] Validate -> INFO 057 [businesschannel] Validated block [5] in 18ms" +peer1.org1.example.com | "2019-05-02 09:27:36.881 UTC [lifecycle] update -> INFO 058 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer1.org1.example.com | "2019-05-02 09:27:36.901 UTC [lifecycle] update -> INFO 059 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org1.example.com | "2019-05-02 09:27:36.902 UTC [cceventmgmt] HandleStateUpdates -> INFO 05a Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org1.example.com | "2019-05-02 09:27:36.903 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 05b Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org1.example.com | "2019-05-02 09:27:36.904 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 05c Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org1.example.com | "2019-05-02 09:27:36.953 UTC [kvledger] CommitWithPvtData -> INFO 05d [businesschannel] Committed block [5] with 1 transaction(s) in 82ms (state_validation=41ms block_commit=28ms state_commit=10ms)" +peer1.org1.example.com | "2019-05-02 09:27:41.432 UTC [gossip.privdata] StoreBlock -> INFO 05e [businesschannel] Received block [6] from buffer" +peer1.org1.example.com | "2019-05-02 09:27:41.438 UTC [committer.txvalidator] Validate -> INFO 05f [businesschannel] Validated block [6] in 5ms" +peer1.org1.example.com | "2019-05-02 09:27:41.463 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [6] with 1 transaction(s) in 23ms (state_validation=0ms block_commit=15ms state_commit=3ms)" +peer1.org1.example.com | "2019-05-02 09:27:47.012 UTC [gossip.privdata] StoreBlock -> INFO 061 [businesschannel] Received block [7] from buffer" +peer1.org1.example.com | "2019-05-02 09:27:47.015 UTC [committer.txvalidator] Validate -> INFO 062 [businesschannel] Validated block [7] in 2ms" +peer1.org1.example.com | "2019-05-02 09:27:47.032 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [7] with 1 transaction(s) in 16ms (state_validation=0ms block_commit=10ms state_commit=2ms)" +peer1.org1.example.com | "2019-05-02 09:27:49.828 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [8] from buffer" +peer1.org1.example.com | "2019-05-02 09:27:49.833 UTC [committer.txvalidator] Validate -> INFO 065 [businesschannel] Validated block [8] in 3ms" +peer1.org1.example.com | "2019-05-02 09:27:49.857 UTC [kvledger] CommitWithPvtData -> INFO 066 [businesschannel] Committed block [8] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=14ms state_commit=4ms)" +peer1.org1.example.com | "2019-05-02 09:28:04.081 UTC [gossip.privdata] StoreBlock -> INFO 067 [businesschannel] Received block [9] from buffer" +peer1.org1.example.com | "2019-05-02 09:28:04.149 UTC [cauthdsl] deduplicate -> WARN 068 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-05-02 09:28:04.165 UTC [cauthdsl] deduplicate -> WARN 069 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-05-02 09:28:04.259 UTC [gossip.gossip] JoinChan -> INFO 06a Joining gossip network of channel businesschannel with 3 organizations" +peer1.org1.example.com | "2019-05-02 09:28:04.259 UTC [gossip.gossip] learnAnchorPeers -> INFO 06b Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-05-02 09:28:04.260 UTC [gossip.gossip] learnAnchorPeers -> INFO 06c No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-05-02 09:28:04.260 UTC [gossip.gossip] learnAnchorPeers -> INFO 06d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-05-02 09:28:04.260 UTC [gossip.service] updateEndpoints -> WARN 06e Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-05-02 09:28:04.317 UTC [committer.txvalidator] Validate -> INFO 06f [businesschannel] Validated block [9] in 235ms" +peer1.org1.example.com | "2019-05-02 09:28:04.367 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [9] with 1 transaction(s) in 45ms (state_validation=10ms block_commit=22ms state_commit=8ms)" +peer1.org1.example.com | "2019-05-02 09:28:04.476 UTC [comm.grpc.server] 1 -> INFO 071 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.475Z grpc.peer_address=172.18.0.7:52992 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=421.1µs +peer1.org1.example.com | "2019-05-02 09:28:04.504 UTC [gossip.comm] func1 -> WARN 072 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org1.example.com | "2019-05-02 09:28:04.505 UTC [gossip.discovery] expireDeadMembers -> WARN 073 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org1.example.com | "2019-05-02 09:28:04.505 UTC [gossip.discovery] expireDeadMembers -> WARN 074 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org1.example.com | "2019-05-02 09:28:04.506 UTC [gossip.discovery] expireDeadMembers -> WARN 075 Exiting" +peer1.org1.example.com | "2019-05-02 09:28:04.558 UTC [comm.grpc.server] 1 -> INFO 076 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.558Z grpc.peer_address=172.18.0.9:36456 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.7µs +peer1.org1.example.com | "2019-05-02 09:28:18.402 UTC [endorser] callChaincode -> INFO 077 [][d54146cd] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-05-02 09:28:18.403 UTC [endorser] callChaincode -> INFO 078 [][d54146cd] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-05-02 09:28:18.404 UTC [comm.grpc.server] 1 -> INFO 079 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55626 grpc.code=OK grpc.call_duration=2.6411ms +peer1.org1.example.com | "2019-05-02 09:28:19.633 UTC [endorser] callChaincode -> INFO 07a [][a0a21417] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-05-02 09:28:19.638 UTC [endorser] callChaincode -> INFO 07b [][a0a21417] Exit chaincode: name:"qscc" (4ms)" +peer1.org1.example.com | "2019-05-02 09:28:19.638 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:55634 grpc.code=OK grpc.call_duration=5.6728ms +peer0.org1.example.com | "2019-05-02 09:27:08.844 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03e CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" +peer0.org1.example.com | "2019-05-02 09:27:08.844 UTC [kvledger.util] logDirStatus -> DEBU 03f Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" +peer0.org1.example.com | "2019-05-02 09:27:08.844 UTC [kvledger.util] logDirStatus -> DEBU 040 After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" +peer0.org1.example.com | "2019-05-02 09:27:08.882 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" +peer0.org1.example.com | "2019-05-02 09:27:08.882 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" +peer0.org1.example.com | "2019-05-02 09:27:08.883 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" +peer0.org1.example.com | "2019-05-02 09:27:08.899 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" +peer0.org1.example.com | "2019-05-02 09:27:08.901 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" +peer0.org1.example.com | "2019-05-02 09:27:08.901 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" +peer0.org1.example.com | "2019-05-02 09:27:08.924 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 047 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" +peer0.org1.example.com | "2019-05-02 09:27:08.924 UTC [kvledger.util] CreateDirIfMissing -> DEBU 048 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" +peer0.org2.example.com | "2019-05-02 09:27:08.930 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org2.example.com | Version: 2.0.0 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.12.4 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger" +peer0.org2.example.com | "2019-05-02 09:27:08.930 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 172.18.0.9:7051" +peer0.org2.example.com | "2019-05-02 09:27:08.930 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-05-02 09:27:08.936 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer0.org2.example.com | "2019-05-02 09:27:09.121 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer0.org2.example.com | "2019-05-02 09:27:09.125 UTC [lifecycle] InitializeLocalChaincodes -> INFO 006 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org2.example.com | "2019-05-02 09:27:09.151 UTC [nodeCmd] serve -> INFO 007 Starting peer with TLS enabled" +peer0.org2.example.com | "2019-05-02 09:27:09.159 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 008 Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" +peer0.org2.example.com | "2019-05-02 09:27:09.159 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 009 Exit with ccEndpoint: peer0.org2.example.com:7052" +peer0.org2.example.com | "2019-05-02 09:27:09.182 UTC [sccapi] registerSysCC -> INFO 00a system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-05-02 09:27:09.184 UTC [sccapi] registerSysCC -> INFO 00b system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org2.example.com | "2019-05-02 09:27:09.185 UTC [sccapi] registerSysCC -> INFO 00c system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org2.example.com | "2019-05-02 09:27:09.186 UTC [sccapi] registerSysCC -> INFO 00d system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org2.example.com | "2019-05-02 09:27:09.201 UTC [gossip.service] func1 -> INFO 00e Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-05-02 09:27:09.214 UTC [gossip.gossip] NewGossipService -> INFO 00f Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org2.example.com | "2019-05-02 09:27:09.215 UTC [gossip.gossip] start -> INFO 010 Gossip instance peer0.org2.example.com:7051 started" +peer0.org2.example.com | "2019-05-02 09:27:09.217 UTC [sccapi] deploySysCC -> INFO 011 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-05-02 09:27:09.219 UTC [cscc] Init -> INFO 012 Init CSCC" +peer0.org2.example.com | "2019-05-02 09:27:09.219 UTC [sccapi] deploySysCC -> INFO 013 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-05-02 09:27:09.221 UTC [qscc] Init -> INFO 014 Init QSCC" +peer0.org2.example.com | "2019-05-02 09:27:09.221 UTC [sccapi] deploySysCC -> INFO 015 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-05-02 09:27:09.222 UTC [sccapi] deploySysCC -> INFO 016 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org2.example.com | "2019-05-02 09:27:09.223 UTC [nodeCmd] serve -> INFO 017 Deployed system chaincodes" +peer0.org2.example.com | "2019-05-02 09:27:09.224 UTC [discovery] NewService -> INFO 018 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org2.example.com | "2019-05-02 09:27:09.224 UTC [nodeCmd] registerDiscoveryService -> INFO 019 Discovery service activated" +peer0.org2.example.com | "2019-05-02 09:27:09.224 UTC [nodeCmd] serve -> INFO 01a Starting peer with ID=[peer0.org2.example.com], network ID=[], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-05-02 09:27:09.224 UTC [nodeCmd] serve -> INFO 01b Started peer with ID=[peer0.org2.example.com], network ID=[], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-05-02 09:27:16.739 UTC [endorser] callChaincode -> INFO 01c [][9da8f6fe] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-05-02 09:27:16.745 UTC [ledgermgmt] CreateLedger -> INFO 01d Creating ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-05-02 09:27:16.749 UTC [fsblkstorage] newBlockfileMgr -> INFO 01e Getting block information from block storage" +peer0.org2.example.com | "2019-05-02 09:27:16.774 UTC [kvledger] CommitWithPvtData -> INFO 01f [businesschannel] Committed block [0] with 1 transaction(s) in 17ms (state_validation=1ms block_commit=9ms state_commit=3ms)" +peer0.org2.example.com | "2019-05-02 09:27:16.776 UTC [ledgermgmt] CreateLedger -> INFO 020 Created ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-05-02 09:27:16.786 UTC [gossip.gossip] JoinChan -> INFO 021 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-05-02 09:27:16.786 UTC [gossip.gossip] learnAnchorPeers -> INFO 022 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-05-02 09:27:16.786 UTC [gossip.gossip] learnAnchorPeers -> INFO 023 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-05-02 09:27:16.811 UTC [gossip.state] NewGossipStateProvider -> INFO 024 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org2.example.com | "2019-05-02 09:27:16.813 UTC [sccapi] deploySysCC -> INFO 025 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-05-02 09:27:16.813 UTC [cscc] Init -> INFO 026 Init CSCC" +peer0.org2.example.com | "2019-05-02 09:27:16.813 UTC [sccapi] deploySysCC -> INFO 027 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-05-02 09:27:16.814 UTC [qscc] Init -> INFO 028 Init QSCC" +peer0.org2.example.com | "2019-05-02 09:27:16.814 UTC [sccapi] deploySysCC -> INFO 029 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-05-02 09:27:16.815 UTC [sccapi] deploySysCC -> INFO 02a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-05-02 09:27:08.924 UTC [kvledger.util] logDirStatus -> DEBU 049 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" +peer0.org1.example.com | "2019-05-02 09:27:08.925 UTC [kvledger.util] logDirStatus -> DEBU 04a After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" +peer0.org1.example.com | "2019-05-02 09:27:08.953 UTC [confighistory] newDBProvider -> DEBU 04b Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" +peer0.org1.example.com | "2019-05-02 09:27:08.953 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" +peer0.org1.example.com | "2019-05-02 09:27:08.953 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" +peer0.org1.example.com | "2019-05-02 09:27:08.953 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" +peer0.org1.example.com | "2019-05-02 09:27:08.966 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" +peer0.org1.example.com | "2019-05-02 09:27:08.966 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" +peer0.org1.example.com | "2019-05-02 09:27:08.967 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" +peer0.org1.example.com | "2019-05-02 09:27:08.979 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 052 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" +peer0.org1.example.com | "2019-05-02 09:27:08.979 UTC [kvledger.util] CreateDirIfMissing -> DEBU 053 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" +peer0.org1.example.com | "2019-05-02 09:27:08.979 UTC [kvledger.util] logDirStatus -> DEBU 054 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" +peer0.org1.example.com | "2019-05-02 09:27:08.979 UTC [kvledger.util] logDirStatus -> DEBU 055 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" +peer0.org1.example.com | "2019-05-02 09:27:08.994 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 056 Recovering under construction ledger" +peer0.org1.example.com | "2019-05-02 09:27:08.994 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 057 No under construction ledger found. Quitting recovery" +peer0.org1.example.com | "2019-05-02 09:27:08.995 UTC [ledgermgmt] initialize -> INFO 058 ledger mgmt initialized" +peer0.org1.example.com | "2019-05-02 09:27:08.995 UTC [lifecycle] InitializeLocalChaincodes -> INFO 059 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org1.example.com | "2019-05-02 09:27:09.018 UTC [nodeCmd] serve -> INFO 05a Starting peer with TLS enabled" +peer0.org1.example.com | "2019-05-02 09:27:09.027 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05b Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +peer0.org1.example.com | "2019-05-02 09:27:09.027 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05c Exit with ccEndpoint: peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-05-02 09:27:09.050 UTC [inproccontroller] Register -> DEBU 05d Registering chaincode instance: lscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.050 UTC [sccapi] registerSysCC -> INFO 05e system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org1.example.com | "2019-05-02 09:27:09.050 UTC [inproccontroller] Register -> DEBU 05f Registering chaincode instance: cscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.050 UTC [sccapi] registerSysCC -> INFO 060 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org1.example.com | "2019-05-02 09:27:09.052 UTC [inproccontroller] Register -> DEBU 061 Registering chaincode instance: qscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.052 UTC [sccapi] registerSysCC -> INFO 062 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org1.example.com | "2019-05-02 09:27:09.052 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: _lifecycle:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.053 UTC [sccapi] registerSysCC -> INFO 064 system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org1.example.com | "2019-05-02 09:27:09.053 UTC [nodeCmd] serve -> DEBU 065 Running peer" +peer0.org1.example.com | "2019-05-02 09:27:09.054 UTC [msp] GetDefaultSigningIdentity -> DEBU 066 Obtaining default signing identity" +peer0.org1.example.com | "2019-05-02 09:27:09.054 UTC [viperutil] getKeysRecursively -> DEBU 067 Found map[string]interface{} value for peer.handlers" +peer0.org1.example.com | "2019-05-02 09:27:09.055 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[string]interface{} value for peer.handlers.validators" +peer0.org1.example.com | "2019-05-02 09:27:09.055 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for peer.handlers.validators.vscc" +peer0.org1.example.com | "2019-05-02 09:27:09.057 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +peer0.org1.example.com | "2019-05-02 09:27:09.058 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" +peer0.org1.example.com | "2019-05-02 09:27:09.058 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-05-02 09:27:09.058 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for peer.handlers.validators.vscc.library setting to " +peer0.org1.example.com | "2019-05-02 09:27:09.059 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" +peer0.org1.example.com | "2019-05-02 09:27:09.059 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" +peer0.org1.example.com | "2019-05-02 09:27:09.060 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" +peer0.org1.example.com | "2019-05-02 09:27:09.061 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" +peer0.org1.example.com | "2019-05-02 09:27:09.061 UTC [viperutil] getKeysRecursively -> DEBU 072 Found map[string]interface{} value for peer.handlers.endorsers" +peer0.org1.example.com | "2019-05-02 09:27:09.061 UTC [viperutil] getKeysRecursively -> DEBU 073 Found map[string]interface{} value for peer.handlers.endorsers.escc" +peer0.org1.example.com | "2019-05-02 09:27:09.062 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +peer0.org1.example.com | "2019-05-02 09:27:09.062 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" +peer0.org1.example.com | "2019-05-02 09:27:09.063 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: " +peer0.org2.example.com | "2019-05-02 09:27:16.815 UTC [endorser] callChaincode -> INFO 02b [][9da8f6fe] Exit chaincode: name:"cscc" (76ms)" +peer0.org2.example.com | "2019-05-02 09:27:16.816 UTC [comm.grpc.server] 1 -> INFO 02c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59834 grpc.code=OK grpc.call_duration=77.929ms +peer0.org2.example.com | "2019-05-02 09:27:17.823 UTC [endorser] callChaincode -> INFO 02d [][4e36756d] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-05-02 09:27:17.824 UTC [endorser] callChaincode -> INFO 02e [][4e36756d] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-05-02 09:27:17.824 UTC [comm.grpc.server] 1 -> INFO 02f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59842 grpc.code=OK grpc.call_duration=2.246ms +peer0.org2.example.com | "2019-05-02 09:27:18.801 UTC [endorser] callChaincode -> INFO 030 [][d706e86c] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-05-02 09:27:18.803 UTC [endorser] callChaincode -> INFO 031 [][d706e86c] Exit chaincode: name:"qscc" (2ms)" +peer0.org2.example.com | "2019-05-02 09:27:18.804 UTC [comm.grpc.server] 1 -> INFO 032 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59850 grpc.code=OK grpc.call_duration=3.9ms +peer1.org2.example.com | "2019-05-02 09:27:08.527 UTC [nodeCmd] serve -> INFO 001 Starting peer: peer1.org2.example.com | Version: 2.0.0 peer1.org2.example.com | Commit SHA: development build peer1.org2.example.com | Go version: go1.12.4 @@ -343,929 +377,1373 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. peer1.org2.example.com | Base Docker Namespace: hyperledger peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric peer1.org2.example.com | Docker Namespace: hyperledger" -peer1.org2.example.com | "2019-05-02 01:30:33.570 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.240.8:7051" -peer1.org2.example.com | "2019-05-02 01:30:33.570 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org2.example.com:7051" -peer1.org2.example.com | "2019-05-02 01:30:33.594 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" -peer1.org2.example.com | "2019-05-02 01:30:33.691 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" -peer1.org2.example.com | "2019-05-02 01:30:33.691 UTC [lifecycle] InitializeLocalChaincodes -> INFO 006 Initialized lifecycle cache with 0 already installed chaincodes" -peer1.org2.example.com | "2019-05-02 01:30:33.701 UTC [nodeCmd] serve -> INFO 007 Starting peer with TLS enabled" -peer1.org2.example.com | "2019-05-02 01:30:33.709 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 008 Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" -peer1.org2.example.com | "2019-05-02 01:30:33.709 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 009 Exit with ccEndpoint: peer1.org2.example.com:7052" -peer1.org2.example.com | "2019-05-02 01:30:33.723 UTC [sccapi] registerSysCC -> INFO 00a system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" -peer1.org2.example.com | "2019-05-02 01:30:33.723 UTC [sccapi] registerSysCC -> INFO 00b system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" -peer1.org2.example.com | "2019-05-02 01:30:33.724 UTC [sccapi] registerSysCC -> INFO 00c system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" -peer1.org2.example.com | "2019-05-02 01:30:33.724 UTC [sccapi] registerSysCC -> INFO 00d system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" -peer1.org2.example.com | "2019-05-02 01:30:33.742 UTC [gossip.service] func1 -> INFO 00e Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051]" -peer1.org2.example.com | "2019-05-02 01:30:33.753 UTC [gossip.gossip] NewGossipService -> INFO 00f Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " -peer1.org2.example.com | "2019-05-02 01:30:33.754 UTC [gossip.gossip] start -> INFO 010 Gossip instance peer1.org2.example.com:7051 started" -peer1.org2.example.com | "2019-05-02 01:30:33.757 UTC [sccapi] deploySysCC -> INFO 011 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer1.org2.example.com | "2019-05-02 01:30:33.758 UTC [cscc] Init -> INFO 012 Init CSCC" -peer1.org2.example.com | "2019-05-02 01:30:33.759 UTC [sccapi] deploySysCC -> INFO 013 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer1.org2.example.com | "2019-05-02 01:30:33.760 UTC [qscc] Init -> INFO 014 Init QSCC" -peer1.org2.example.com | "2019-05-02 01:30:33.760 UTC [sccapi] deploySysCC -> INFO 015 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer1.org2.example.com | "2019-05-02 01:30:33.762 UTC [sccapi] deploySysCC -> INFO 016 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" -peer1.org2.example.com | "2019-05-02 01:30:33.762 UTC [nodeCmd] serve -> INFO 017 Deployed system chaincodes" -peer1.org2.example.com | "2019-05-02 01:30:33.764 UTC [discovery] NewService -> INFO 018 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" -peer1.org2.example.com | "2019-05-02 01:30:33.764 UTC [nodeCmd] registerDiscoveryService -> INFO 019 Discovery service activated" -peer1.org2.example.com | "2019-05-02 01:30:33.764 UTC [nodeCmd] serve -> INFO 01a Starting peer with ID=[peer1.org2.example.com], network ID=[], address=[peer1.org2.example.com:7051]" -peer1.org2.example.com | "2019-05-02 01:30:33.764 UTC [nodeCmd] serve -> INFO 01b Started peer with ID=[peer1.org2.example.com], network ID=[], address=[peer1.org2.example.com:7051]" -peer1.org2.example.com | "2019-05-02 01:30:41.556 UTC [endorser] callChaincode -> INFO 01c [][6deca29a] Entry chaincode: name:"cscc" " -peer1.org2.example.com | "2019-05-02 01:30:41.563 UTC [ledgermgmt] CreateLedger -> INFO 01d Creating ledger [businesschannel] with genesis block" -peer1.org2.example.com | "2019-05-02 01:30:41.567 UTC [fsblkstorage] newBlockfileMgr -> INFO 01e Getting block information from block storage" -peer1.org2.example.com | "2019-05-02 01:30:41.599 UTC [kvledger] CommitWithPvtData -> INFO 01f [businesschannel] Committed block [0] with 1 transaction(s) in 23ms (state_validation=1ms block_commit=15ms state_commit=4ms)" -peer1.org2.example.com | "2019-05-02 01:30:41.603 UTC [ledgermgmt] CreateLedger -> INFO 020 Created ledger [businesschannel] with genesis block" -peer1.org2.example.com | "2019-05-02 01:30:41.610 UTC [gossip.gossip] JoinChan -> INFO 021 Joining gossip network of channel businesschannel with 2 organizations" -peer1.org2.example.com | "2019-05-02 01:30:41.610 UTC [gossip.gossip] learnAnchorPeers -> INFO 022 No configured anchor peers of Org1MSP for channel businesschannel to learn about" -peer1.org2.example.com | "2019-05-02 01:30:41.610 UTC [gossip.gossip] learnAnchorPeers -> INFO 023 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer1.org2.example.com | "2019-05-02 01:30:41.641 UTC [gossip.state] NewGossipStateProvider -> INFO 024 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" -peer1.org2.example.com | "2019-05-02 01:30:41.644 UTC [sccapi] deploySysCC -> INFO 025 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer1.org2.example.com | "2019-05-02 01:30:41.644 UTC [cscc] Init -> INFO 026 Init CSCC" -peer1.org1.example.com | "2019-05-02 01:30:33.055 UTC [nodeCmd] serve -> INFO 001 Starting peer: -peer1.org1.example.com | Version: 2.0.0 -peer1.org1.example.com | Commit SHA: development build -peer1.org1.example.com | Go version: go1.12.4 -peer1.org1.example.com | OS/Arch: linux/amd64 -peer1.org1.example.com | Chaincode: -peer1.org1.example.com | Base Docker Namespace: hyperledger -peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric -peer1.org1.example.com | Docker Namespace: hyperledger" -peer1.org1.example.com | "2019-05-02 01:30:33.057 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.240.6:7051" -peer1.org1.example.com | "2019-05-02 01:30:33.057 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org1.example.com:7051" -peer1.org1.example.com | "2019-05-02 01:30:33.100 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" -peer1.org1.example.com | "2019-05-02 01:30:33.315 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" -peer1.org1.example.com | "2019-05-02 01:30:33.316 UTC [lifecycle] InitializeLocalChaincodes -> INFO 006 Initialized lifecycle cache with 0 already installed chaincodes" -peer1.org1.example.com | "2019-05-02 01:30:33.356 UTC [nodeCmd] serve -> INFO 007 Starting peer with TLS enabled" -peer1.org1.example.com | "2019-05-02 01:30:33.371 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 008 Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" -peer1.org1.example.com | "2019-05-02 01:30:33.371 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 009 Exit with ccEndpoint: peer1.org1.example.com:7052" -peer1.org1.example.com | "2019-05-02 01:30:33.388 UTC [sccapi] registerSysCC -> INFO 00a system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" -peer1.org1.example.com | "2019-05-02 01:30:33.388 UTC [sccapi] registerSysCC -> INFO 00b system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" -peer1.org1.example.com | "2019-05-02 01:30:33.388 UTC [sccapi] registerSysCC -> INFO 00c system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" -peer1.org1.example.com | "2019-05-02 01:30:33.393 UTC [sccapi] registerSysCC -> INFO 00d system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" -peer1.org1.example.com | "2019-05-02 01:30:33.423 UTC [gossip.service] func1 -> INFO 00e Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" -peer1.org1.example.com | "2019-05-02 01:30:33.448 UTC [gossip.gossip] NewGossipService -> INFO 00f Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: " -peer1.org1.example.com | "2019-05-02 01:30:33.450 UTC [gossip.gossip] start -> INFO 010 Gossip instance peer1.org1.example.com:7051 started" -peer1.org1.example.com | "2019-05-02 01:30:33.452 UTC [sccapi] deploySysCC -> INFO 011 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer1.org1.example.com | "2019-05-02 01:30:33.459 UTC [cscc] Init -> INFO 012 Init CSCC" -peer1.org1.example.com | "2019-05-02 01:30:33.462 UTC [sccapi] deploySysCC -> INFO 013 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer1.org1.example.com | "2019-05-02 01:30:33.468 UTC [qscc] Init -> INFO 014 Init QSCC" -peer1.org1.example.com | "2019-05-02 01:30:33.468 UTC [sccapi] deploySysCC -> INFO 015 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer1.org1.example.com | "2019-05-02 01:30:33.473 UTC [sccapi] deploySysCC -> INFO 016 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" -peer1.org1.example.com | "2019-05-02 01:30:33.473 UTC [nodeCmd] serve -> INFO 017 Deployed system chaincodes" -peer1.org1.example.com | "2019-05-02 01:30:33.476 UTC [discovery] NewService -> INFO 018 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" -peer1.org1.example.com | "2019-05-02 01:30:33.476 UTC [nodeCmd] registerDiscoveryService -> INFO 019 Discovery service activated" -peer1.org1.example.com | "2019-05-02 01:30:33.477 UTC [nodeCmd] serve -> INFO 01a Starting peer with ID=[peer1.org1.example.com], network ID=[], address=[peer1.org1.example.com:7051]" -peer1.org1.example.com | "2019-05-02 01:30:33.477 UTC [nodeCmd] serve -> INFO 01b Started peer with ID=[peer1.org1.example.com], network ID=[], address=[peer1.org1.example.com:7051]" -peer1.org1.example.com | "2019-05-02 01:30:41.069 UTC [endorser] callChaincode -> INFO 01c [][2deb5aa2] Entry chaincode: name:"cscc" " -peer1.org1.example.com | "2019-05-02 01:30:41.075 UTC [ledgermgmt] CreateLedger -> INFO 01d Creating ledger [businesschannel] with genesis block" -peer1.org1.example.com | "2019-05-02 01:30:41.084 UTC [fsblkstorage] newBlockfileMgr -> INFO 01e Getting block information from block storage" -peer1.org1.example.com | "2019-05-02 01:30:41.111 UTC [kvledger] CommitWithPvtData -> INFO 01f [businesschannel] Committed block [0] with 1 transaction(s) in 17ms (state_validation=1ms block_commit=7ms state_commit=6ms)" -peer1.org1.example.com | "2019-05-02 01:30:41.115 UTC [ledgermgmt] CreateLedger -> INFO 020 Created ledger [businesschannel] with genesis block" -peer1.org1.example.com | "2019-05-02 01:30:41.122 UTC [gossip.gossip] JoinChan -> INFO 021 Joining gossip network of channel businesschannel with 2 organizations" -peer1.org1.example.com | "2019-05-02 01:30:41.123 UTC [gossip.gossip] learnAnchorPeers -> INFO 022 No configured anchor peers of Org1MSP for channel businesschannel to learn about" -peer1.org1.example.com | "2019-05-02 01:30:41.123 UTC [gossip.gossip] learnAnchorPeers -> INFO 023 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer1.org1.example.com | "2019-05-02 01:30:41.150 UTC [gossip.state] NewGossipStateProvider -> INFO 024 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" -peer1.org1.example.com | "2019-05-02 01:30:41.152 UTC [sccapi] deploySysCC -> INFO 025 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer1.org1.example.com | "2019-05-02 01:30:41.152 UTC [cscc] Init -> INFO 026 Init CSCC" -peer1.org1.example.com | "2019-05-02 01:30:41.152 UTC [sccapi] deploySysCC -> INFO 027 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer1.org1.example.com | "2019-05-02 01:30:41.153 UTC [qscc] Init -> INFO 028 Init QSCC" -peer1.org1.example.com | "2019-05-02 01:30:41.154 UTC [sccapi] deploySysCC -> INFO 029 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer1.org1.example.com | "2019-05-02 01:30:41.154 UTC [sccapi] deploySysCC -> INFO 02a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" -peer1.org1.example.com | "2019-05-02 01:30:41.155 UTC [endorser] callChaincode -> INFO 02b [][2deb5aa2] Exit chaincode: name:"cscc" (86ms)" -peer1.org1.example.com | "2019-05-02 01:30:41.156 UTC [comm.grpc.server] 1 -> INFO 02c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:52332 grpc.code=OK grpc.call_duration=88.3164ms -peer1.org1.example.com | "2019-05-02 01:30:42.274 UTC [endorser] callChaincode -> INFO 02d [][37a49cd7] Entry chaincode: name:"cscc" " -peer1.org1.example.com | "2019-05-02 01:30:42.275 UTC [endorser] callChaincode -> INFO 02e [][37a49cd7] Exit chaincode: name:"cscc" (1ms)" -peer1.org1.example.com | "2019-05-02 01:30:42.275 UTC [comm.grpc.server] 1 -> INFO 02f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:52340 grpc.code=OK grpc.call_duration=2.4123ms -peer1.org1.example.com | "2019-05-02 01:30:43.175 UTC [endorser] callChaincode -> INFO 030 [][612db56a] Entry chaincode: name:"qscc" " -orderer2.example.com | General.LedgerType = "file" -orderer2.example.com | General.ListenAddress = "0.0.0.0" -orderer2.example.com | General.ListenPort = 7050 -orderer2.example.com | General.TLS.Enabled = true -orderer2.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" -orderer2.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" -orderer2.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] -orderer2.example.com | General.TLS.ClientAuthRequired = false -orderer2.example.com | General.TLS.ClientRootCAs = [] -orderer2.example.com | General.Cluster.ListenAddress = "" -orderer2.example.com | General.Cluster.ListenPort = 0 -orderer2.example.com | General.Cluster.ServerCertificate = "" -orderer2.example.com | General.Cluster.ServerPrivateKey = "" -orderer2.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" -orderer2.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" -orderer2.example.com | General.Cluster.RootCAs = [] -orderer2.example.com | General.Cluster.DialTimeout = 5s -orderer2.example.com | General.Cluster.RPCTimeout = 7s -orderer2.example.com | General.Cluster.ReplicationBufferSize = 20971520 -orderer2.example.com | General.Cluster.ReplicationPullTimeout = 5s -orderer2.example.com | General.Cluster.ReplicationRetryTimeout = 5s -orderer2.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s -orderer2.example.com | General.Cluster.ReplicationMaxRetries = 12 -orderer2.example.com | General.Cluster.SendBufferSize = 10 -orderer2.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s -orderer2.example.com | General.Keepalive.ServerMinInterval = 1m0s -orderer2.example.com | General.Keepalive.ServerInterval = 2h0m0s -orderer2.example.com | General.Keepalive.ServerTimeout = 20s -orderer2.example.com | General.GenesisMethod = "file" -orderer2.example.com | General.GenesisProfile = "SampleInsecureSolo" -orderer2.example.com | General.SystemChannel = "test-system-channel-name" -orderer2.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" -orderer2.example.com | General.Profile.Enabled = false -orderer2.example.com | General.Profile.Address = "0.0.0.0:6060" -orderer2.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" -orderer2.example.com | General.LocalMSPID = "OrdererMSP" -orderer2.example.com | General.BCCSP.ProviderName = "SW" -orderer2.example.com | General.BCCSP.SwOpts.SecLevel = 256 -orderer2.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" -orderer2.example.com | General.BCCSP.SwOpts.Ephemeral = false -orderer2.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" -orderer2.example.com | General.BCCSP.SwOpts.DummyKeystore = -orderer2.example.com | General.BCCSP.SwOpts.InmemKeystore = -orderer2.example.com | General.BCCSP.PluginOpts = -orderer2.example.com | General.Authentication.TimeWindow = 15m0s -orderer2.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" -peer1.org2.example.com | "2019-05-02 01:30:41.645 UTC [sccapi] deploySysCC -> INFO 027 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer1.org2.example.com | "2019-05-02 01:30:41.645 UTC [qscc] Init -> INFO 028 Init QSCC" -peer1.org2.example.com | "2019-05-02 01:30:41.646 UTC [sccapi] deploySysCC -> INFO 029 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer1.org2.example.com | "2019-05-02 01:30:41.647 UTC [sccapi] deploySysCC -> INFO 02a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" -peer1.org2.example.com | "2019-05-02 01:30:41.647 UTC [endorser] callChaincode -> INFO 02b [][6deca29a] Exit chaincode: name:"cscc" (92ms)" -peer1.org1.example.com | "2019-05-02 01:30:43.178 UTC [endorser] callChaincode -> INFO 031 [][612db56a] Exit chaincode: name:"qscc" (3ms)" -peer1.org1.example.com | "2019-05-02 01:30:43.178 UTC [comm.grpc.server] 1 -> INFO 032 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:52348 grpc.code=OK grpc.call_duration=4.3926ms -peer1.org1.example.com | "2019-05-02 01:30:46.125 UTC [gossip.channel] reportMembershipChanges -> INFO 033 Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" -peer1.org1.example.com | "2019-05-02 01:30:46.915 UTC [gossip.election] leaderElection -> INFO 034 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" -peer1.org1.example.com | "2019-05-02 01:30:46.946 UTC [gossip.privdata] StoreBlock -> INFO 035 [businesschannel] Received block [1] from buffer" -peer1.org1.example.com | "2019-05-02 01:30:46.963 UTC [gossip.gossip] JoinChan -> INFO 036 Joining gossip network of channel businesschannel with 2 organizations" -peer1.org1.example.com | "2019-05-02 01:30:46.963 UTC [gossip.gossip] learnAnchorPeers -> INFO 037 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org1.example.com | "2019-05-02 01:30:46.963 UTC [gossip.gossip] learnAnchorPeers -> INFO 038 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer1.org1.example.com | "2019-05-02 01:30:46.964 UTC [gossip.service] updateEndpoints -> WARN 039 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" -peer1.org1.example.com | "2019-05-02 01:30:46.987 UTC [committer.txvalidator] Validate -> INFO 03a [businesschannel] Validated block [1] in 40ms" -peer1.org1.example.com | "2019-05-02 01:30:47.013 UTC [kvledger] CommitWithPvtData -> INFO 03b [businesschannel] Committed block [1] with 1 transaction(s) in 25ms (state_validation=1ms block_commit=14ms state_commit=3ms)" -peer1.org1.example.com | "2019-05-02 01:30:47.030 UTC [comm.grpc.server] 1 -> INFO 03c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.029Z grpc.peer_address=192.168.240.7:44822 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=132.2µs -peer1.org1.example.com | "2019-05-02 01:30:47.600 UTC [gossip.privdata] StoreBlock -> INFO 03d [businesschannel] Received block [2] from buffer" -peer1.org1.example.com | "2019-05-02 01:30:47.643 UTC [gossip.gossip] JoinChan -> INFO 03e Joining gossip network of channel businesschannel with 2 organizations" -peer1.org1.example.com | "2019-05-02 01:30:47.643 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer1.org1.example.com | "2019-05-02 01:30:47.644 UTC [gossip.gossip] learnAnchorPeers -> INFO 040 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org1.example.com | "2019-05-02 01:30:47.644 UTC [gossip.service] updateEndpoints -> WARN 041 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" -peer1.org1.example.com | "2019-05-02 01:30:47.749 UTC [committer.txvalidator] Validate -> INFO 042 [businesschannel] Validated block [2] in 148ms" -peer1.org1.example.com | "2019-05-02 01:30:47.798 UTC [kvledger] CommitWithPvtData -> INFO 043 [businesschannel] Committed block [2] with 1 transaction(s) in 47ms (state_validation=17ms block_commit=17ms state_commit=5ms)" -peer1.org1.example.com | "2019-05-02 01:30:47.810 UTC [comm.grpc.server] 1 -> INFO 044 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.7:44822 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=777.1391ms -peer1.org1.example.com | "2019-05-02 01:30:51.124 UTC [gossip.channel] reportMembershipChanges -> INFO 045 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]]" -peer1.org1.example.com | "2019-05-02 01:30:51.966 UTC [endorser] callChaincode -> INFO 046 [][f3e15831] Entry chaincode: name:"_lifecycle" " -peer1.org1.example.com | "2019-05-02 01:30:51.970 UTC [endorser] callChaincode -> INFO 047 [][f3e15831] Exit chaincode: name:"_lifecycle" (3ms)" -peer1.org1.example.com | "2019-05-02 01:30:51.970 UTC [comm.grpc.server] 1 -> INFO 048 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:52408 grpc.code=OK grpc.call_duration=5.726ms -peer1.org1.example.com | "2019-05-02 01:30:53.526 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:55.525Z grpc.peer_address=192.168.240.8:50756 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=199.7µs -peer1.org1.example.com | "2019-05-02 01:30:57.836 UTC [gossip.privdata] StoreBlock -> INFO 04a [businesschannel] Received block [3] from buffer" -peer1.org1.example.com | "2019-05-02 01:30:57.909 UTC [committer.txvalidator] Validate -> INFO 04b [businesschannel] Validated block [3] in 72ms" -peer1.org1.example.com | "2019-05-02 01:30:58.130 UTC [gossip.privdata] StoreBlock -> INFO 04c [businesschannel] Fetched all missing collection private write sets from remote peers for block [3] (208ms)" -peer1.org1.example.com | "2019-05-02 01:30:58.132 UTC [confighistory] HandleStateUpdates -> ERRO 04d Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003572560)}" -peer1.org1.example.com | "2019-05-02 01:30:58.234 UTC [kvledger] CommitWithPvtData -> INFO 04e [businesschannel] Committed block [3] with 1 transaction(s) in 138ms (state_validation=1ms block_commit=21ms state_commit=103ms)" -peer1.org1.example.com | "2019-05-02 01:31:01.089 UTC [gossip.channel] reportMembershipChanges -> INFO 04f Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" -peer1.org1.example.com | "2019-05-02 01:31:01.681 UTC [gossip.privdata] StoreBlock -> INFO 050 [businesschannel] Received block [4] from buffer" -peer1.org1.example.com | "2019-05-02 01:31:01.702 UTC [committer.txvalidator] Validate -> INFO 051 [businesschannel] Validated block [4] in 20ms" -peer1.org1.example.com | "2019-05-02 01:31:01.715 UTC [confighistory] HandleStateUpdates -> ERRO 052 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0037b9720)}" -peer1.org1.example.com | "2019-05-02 01:31:01.749 UTC [kvledger] CommitWithPvtData -> INFO 053 [businesschannel] Committed block [4] with 1 transaction(s) in 41ms (state_validation=7ms block_commit=20ms state_commit=8ms)" -peer1.org1.example.com | "2019-05-02 01:31:05.940 UTC [gossip.privdata] StoreBlock -> INFO 054 [businesschannel] Received block [5] from buffer" -peer1.org1.example.com | "2019-05-02 01:31:05.942 UTC [committer.txvalidator] Validate -> INFO 055 [businesschannel] Validated block [5] in 2ms" -peer1.org1.example.com | "2019-05-02 01:31:05.943 UTC [lifecycle] update -> INFO 056 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" -peer1.org1.example.com | "2019-05-02 01:31:05.944 UTC [lifecycle] update -> INFO 057 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" -peer1.org1.example.com | "2019-05-02 01:31:05.944 UTC [cceventmgmt] HandleStateUpdates -> INFO 058 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" -peer0.org2.example.com | "2019-05-02 01:30:33.101 UTC [nodeCmd] serve -> INFO 001 Starting peer: -peer0.org2.example.com | Version: 2.0.0 -peer0.org2.example.com | Commit SHA: development build -peer0.org2.example.com | Go version: go1.12.4 -peer0.org2.example.com | OS/Arch: linux/amd64 -peer0.org2.example.com | Chaincode: -peer0.org2.example.com | Base Docker Namespace: hyperledger -peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric -peer0.org2.example.com | Docker Namespace: hyperledger" -peer0.org2.example.com | "2019-05-02 01:30:33.101 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.240.5:7051" -peer0.org2.example.com | "2019-05-02 01:30:33.102 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org2.example.com:7051" -peer0.org2.example.com | "2019-05-02 01:30:33.138 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" -peer0.org2.example.com | "2019-05-02 01:30:33.419 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" -peer0.org2.example.com | "2019-05-02 01:30:33.420 UTC [lifecycle] InitializeLocalChaincodes -> INFO 006 Initialized lifecycle cache with 0 already installed chaincodes" -peer0.org2.example.com | "2019-05-02 01:30:33.435 UTC [nodeCmd] serve -> INFO 007 Starting peer with TLS enabled" -peer0.org2.example.com | "2019-05-02 01:30:33.447 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 008 Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" -peer0.org2.example.com | "2019-05-02 01:30:33.447 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 009 Exit with ccEndpoint: peer0.org2.example.com:7052" -peer0.org2.example.com | "2019-05-02 01:30:33.466 UTC [sccapi] registerSysCC -> INFO 00a system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" -peer0.org2.example.com | "2019-05-02 01:30:33.466 UTC [sccapi] registerSysCC -> INFO 00b system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" -peer0.org2.example.com | "2019-05-02 01:30:33.467 UTC [sccapi] registerSysCC -> INFO 00c system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" -peer0.org2.example.com | "2019-05-02 01:30:33.469 UTC [sccapi] registerSysCC -> INFO 00d system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" -peer0.org2.example.com | "2019-05-02 01:30:33.486 UTC [gossip.service] func1 -> INFO 00e Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" -peer0.org2.example.com | "2019-05-02 01:30:33.528 UTC [gossip.gossip] NewGossipService -> INFO 00f Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " -peer0.org2.example.com | "2019-05-02 01:30:33.531 UTC [gossip.gossip] start -> INFO 010 Gossip instance peer0.org2.example.com:7051 started" -peer0.org2.example.com | "2019-05-02 01:30:33.540 UTC [sccapi] deploySysCC -> INFO 011 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer0.org2.example.com | "2019-05-02 01:30:33.544 UTC [cscc] Init -> INFO 012 Init CSCC" -peer0.org2.example.com | "2019-05-02 01:30:33.545 UTC [sccapi] deploySysCC -> INFO 013 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer0.org2.example.com | "2019-05-02 01:30:33.549 UTC [qscc] Init -> INFO 014 Init QSCC" -peer0.org2.example.com | "2019-05-02 01:30:33.550 UTC [sccapi] deploySysCC -> INFO 015 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer0.org2.example.com | "2019-05-02 01:30:33.564 UTC [sccapi] deploySysCC -> INFO 016 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" -peer0.org2.example.com | "2019-05-02 01:30:33.564 UTC [nodeCmd] serve -> INFO 017 Deployed system chaincodes" -peer0.org2.example.com | "2019-05-02 01:30:33.566 UTC [discovery] NewService -> INFO 018 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" -peer0.org2.example.com | "2019-05-02 01:30:33.567 UTC [nodeCmd] registerDiscoveryService -> INFO 019 Discovery service activated" -peer0.org2.example.com | "2019-05-02 01:30:33.568 UTC [nodeCmd] serve -> INFO 01a Starting peer with ID=[peer0.org2.example.com], network ID=[], address=[peer0.org2.example.com:7051]" -peer0.org2.example.com | "2019-05-02 01:30:33.568 UTC [nodeCmd] serve -> INFO 01b Started peer with ID=[peer0.org2.example.com], network ID=[], address=[peer0.org2.example.com:7051]" -peer0.org2.example.com | "2019-05-02 01:30:41.298 UTC [endorser] callChaincode -> INFO 01c [][6b4a718a] Entry chaincode: name:"cscc" " -peer0.org2.example.com | "2019-05-02 01:30:41.305 UTC [ledgermgmt] CreateLedger -> INFO 01d Creating ledger [businesschannel] with genesis block" -peer0.org2.example.com | "2019-05-02 01:30:41.309 UTC [fsblkstorage] newBlockfileMgr -> INFO 01e Getting block information from block storage" -peer0.org2.example.com | "2019-05-02 01:30:41.338 UTC [kvledger] CommitWithPvtData -> INFO 01f [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=1ms block_commit=9ms state_commit=3ms)" -peer0.org2.example.com | "2019-05-02 01:30:41.341 UTC [ledgermgmt] CreateLedger -> INFO 020 Created ledger [businesschannel] with genesis block" -orderer2.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" -orderer2.example.com | RAMLedger.HistorySize = 1000 -orderer2.example.com | Kafka.Retry.ShortInterval = 5s -orderer2.example.com | Kafka.Retry.ShortTotal = 10m0s -orderer2.example.com | Kafka.Retry.LongInterval = 5m0s -orderer2.example.com | Kafka.Retry.LongTotal = 12h0m0s -orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s -orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s -orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s -orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3 -orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms -orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3 -orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms -orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s -orderer2.example.com | Kafka.Verbose = false -orderer2.example.com | Kafka.Version = 0.10.2.0 -orderer2.example.com | Kafka.TLS.Enabled = false -orderer2.example.com | Kafka.TLS.PrivateKey = "" -orderer2.example.com | Kafka.TLS.Certificate = "" -orderer2.example.com | Kafka.TLS.RootCAs = [] -orderer2.example.com | Kafka.TLS.ClientAuthRequired = false -orderer2.example.com | Kafka.TLS.ClientRootCAs = [] -orderer2.example.com | Kafka.SASLPlain.Enabled = false -orderer2.example.com | Kafka.SASLPlain.User = "" -orderer2.example.com | Kafka.SASLPlain.Password = "" -orderer2.example.com | Kafka.Topic.ReplicationFactor = 3 -orderer2.example.com | Debug.BroadcastTraceDir = "" -orderer2.example.com | Debug.DeliverTraceDir = "" -orderer2.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] -orderer2.example.com | Operations.ListenAddress = "0.0.0.0:8443" -orderer2.example.com | Operations.TLS.Enabled = false -orderer2.example.com | Operations.TLS.PrivateKey = "" -peer0.org1.example.com | "2019-05-02 01:30:33.640 UTC [chaincode] handleMessage -> DEBU 0e4 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -peer0.org1.example.com | "2019-05-02 01:30:33.640 UTC [chaincode] HandleRegister -> DEBU 0e5 Received REGISTER in state created" -peer0.org1.example.com | "2019-05-02 01:30:33.641 UTC [chaincode] Register -> DEBU 0e6 registered handler complete for chaincode _lifecycle:2.0.0" -peer0.org1.example.com | "2019-05-02 01:30:33.641 UTC [chaincode] HandleRegister -> DEBU 0e7 Got REGISTER for chaincodeID = name:"_lifecycle:2.0.0" , sending back REGISTERED" -peer0.org1.example.com | "2019-05-02 01:30:33.641 UTC [chaincode] HandleRegister -> DEBU 0e8 Changed state to established for name:"_lifecycle:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.641 UTC [chaincode] sendReady -> DEBU 0e9 sending READY for chaincode name:"_lifecycle:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.641 UTC [chaincode] sendReady -> DEBU 0ea Changed to state ready for chaincode name:"_lifecycle:2.0.0" " -peer0.org1.example.com | "2019-05-02 01:30:33.642 UTC [chaincode] Launch -> DEBU 0eb launch complete" -peer0.org1.example.com | "2019-05-02 01:30:33.642 UTC [chaincode] Execute -> DEBU 0ec Entry" -peer0.org1.example.com | "2019-05-02 01:30:33.642 UTC [chaincode] handleMessage -> DEBU 0ed [76024bed] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:33.642 UTC [chaincode] Notify -> DEBU 0ee [76024bed] notifying Txid:76024bed-1439-46b7-b2b4-32506b4d7ff3, channelID:" -peer0.org1.example.com | "2019-05-02 01:30:33.642 UTC [chaincode] Execute -> DEBU 0ef Exit" -peer0.org1.example.com | "2019-05-02 01:30:33.643 UTC [sccapi] deploySysCC -> INFO 0f0 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" -peer0.org1.example.com | "2019-05-02 01:30:33.643 UTC [nodeCmd] serve -> INFO 0f1 Deployed system chaincodes" -peer0.org1.example.com | "2019-05-02 01:30:33.643 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0f2 Returning []" -peer0.org1.example.com | "2019-05-02 01:30:33.645 UTC [discovery] NewService -> INFO 0f3 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" -peer0.org1.example.com | "2019-05-02 01:30:33.645 UTC [nodeCmd] registerDiscoveryService -> INFO 0f4 Discovery service activated" -peer0.org1.example.com | "2019-05-02 01:30:33.645 UTC [nodeCmd] serve -> INFO 0f5 Starting peer with ID=[peer0.org1.example.com], network ID=[], address=[peer0.org1.example.com:7051]" -peer0.org1.example.com | "2019-05-02 01:30:33.645 UTC [nodeCmd] serve -> INFO 0f6 Started peer with ID=[peer0.org1.example.com], network ID=[], address=[peer0.org1.example.com:7051]" -peer0.org1.example.com | "2019-05-02 01:30:33.640 UTC [container] lockContainer -> DEBU 0f7 waiting for container(_lifecycle:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.645 UTC [container] lockContainer -> DEBU 0f8 got container (_lifecycle:2.0.0) lock" -peer0.org1.example.com | "2019-05-02 01:30:33.645 UTC [container] unlockContainer -> DEBU 0f9 container lock deleted(_lifecycle:2.0.0)" -peer0.org1.example.com | "2019-05-02 01:30:34.466 UTC [comm.grpc.server] 1 -> INFO 0fa unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:36.466Z grpc.peer_address=192.168.240.6:44892 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147µs -peer0.org1.example.com | "2019-05-02 01:30:34.471 UTC [msp.identity] Sign -> DEBU 0fb Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:34.471 UTC [msp.identity] Sign -> DEBU 0fc Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:34.472 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0fd Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.6:44892" -peer1.org2.example.com | "2019-05-02 01:30:41.648 UTC [comm.grpc.server] 1 -> INFO 02c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:35866 grpc.code=OK grpc.call_duration=93.5069ms -peer1.org2.example.com | "2019-05-02 01:30:42.572 UTC [endorser] callChaincode -> INFO 02d [][bdfe52bd] Entry chaincode: name:"cscc" " -peer1.org2.example.com | "2019-05-02 01:30:42.574 UTC [endorser] callChaincode -> INFO 02e [][bdfe52bd] Exit chaincode: name:"cscc" (1ms)" -peer1.org2.example.com | "2019-05-02 01:30:42.574 UTC [comm.grpc.server] 1 -> INFO 02f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:35874 grpc.code=OK grpc.call_duration=2.3668ms -peer1.org2.example.com | "2019-05-02 01:30:43.475 UTC [endorser] callChaincode -> INFO 030 [][79e6316e] Entry chaincode: name:"qscc" " -peer1.org2.example.com | "2019-05-02 01:30:43.479 UTC [endorser] callChaincode -> INFO 031 [][79e6316e] Exit chaincode: name:"qscc" (3ms)" -peer1.org2.example.com | "2019-05-02 01:30:43.479 UTC [comm.grpc.server] 1 -> INFO 032 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:35882 grpc.code=OK grpc.call_duration=5.0957ms -peer1.org2.example.com | "2019-05-02 01:30:47.647 UTC [gossip.election] beLeader -> INFO 033 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Becoming a leader" -peer1.org2.example.com | "2019-05-02 01:30:47.648 UTC [gossip.service] func1 -> INFO 034 Elected as a leader, starting delivery service for channel businesschannel" -peer1.org2.example.com | "2019-05-02 01:30:47.693 UTC [gossip.privdata] StoreBlock -> INFO 035 [businesschannel] Received block [1] from buffer" -peer1.org2.example.com | "2019-05-02 01:30:47.721 UTC [gossip.gossip] JoinChan -> INFO 036 Joining gossip network of channel businesschannel with 2 organizations" -peer1.org2.example.com | "2019-05-02 01:30:47.728 UTC [gossip.gossip] learnAnchorPeers -> INFO 037 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer1.org2.example.com | "2019-05-02 01:30:47.728 UTC [gossip.gossip] learnAnchorPeers -> INFO 038 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org2.example.com | "2019-05-02 01:30:47.743 UTC [committer.txvalidator] Validate -> INFO 039 [businesschannel] Validated block [1] in 49ms" -peer1.org2.example.com | "2019-05-02 01:30:47.770 UTC [kvledger] CommitWithPvtData -> INFO 03a [businesschannel] Committed block [1] with 1 transaction(s) in 25ms (state_validation=1ms block_commit=18ms state_commit=2ms)" -peer1.org2.example.com | "2019-05-02 01:30:47.771 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [2] from buffer" -peer1.org2.example.com | "2019-05-02 01:30:47.807 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations" -peer1.org2.example.com | "2019-05-02 01:30:47.814 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer1.org2.example.com | "2019-05-02 01:30:47.814 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org2.example.com | "2019-05-02 01:30:47.848 UTC [committer.txvalidator] Validate -> INFO 03f [businesschannel] Validated block [2] in 77ms" -peer1.org2.example.com | "2019-05-02 01:30:47.882 UTC [kvledger] CommitWithPvtData -> INFO 040 [businesschannel] Committed block [2] with 1 transaction(s) in 33ms (state_validation=3ms block_commit=14ms state_commit=7ms)" -peer1.org2.example.com | "2019-05-02 01:30:48.489 UTC [comm.grpc.server] 1 -> INFO 041 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:50.488Z grpc.peer_address=192.168.240.7:33812 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=130.4µs -peer1.org2.example.com | "2019-05-02 01:30:49.144 UTC [gossip.gossip] validateMsg -> WARN 042 StateInfo message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760647798862400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found" -peer1.org2.example.com | "2019-05-02 01:30:49.144 UTC [gossip.gossip] handleMessage -> WARN 043 Message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760647798862400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes isn't valid" -peer1.org2.example.com | "2019-05-02 01:30:51.611 UTC [gossip.channel] reportMembershipChanges -> INFO 044 Membership view has changed. peers went online: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" -peer1.org2.example.com | "2019-05-02 01:30:52.388 UTC [gossip.election] stopBeingLeader -> INFO 045 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd Stopped being a leader" -peer1.org2.example.com | "2019-05-02 01:30:52.389 UTC [gossip.service] func1 -> INFO 046 Renounced leadership, stopping delivery service for channel businesschannel" -peer1.org2.example.com | "2019-05-02 01:30:52.389 UTC [deliveryClient] try -> WARN 047 Got error: rpc error: code = Canceled desc = grpc: the client connection is closing , at 1 attempt. Retrying in 1s" -peer1.org2.example.com | "2019-05-02 01:30:52.389 UTC [blocksProvider] DeliverBlocks -> WARN 048 [businesschannel] Receive error: client is closing" -peer1.org2.example.com | "2019-05-02 01:30:54.336 UTC [endorser] callChaincode -> INFO 049 [][c29ebe97] Entry chaincode: name:"_lifecycle" " -peer1.org2.example.com | "2019-05-02 01:30:54.338 UTC [endorser] callChaincode -> INFO 04a [][c29ebe97] Exit chaincode: name:"_lifecycle" (2ms)" -peer1.org2.example.com | "2019-05-02 01:30:54.339 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:35948 grpc.code=OK grpc.call_duration=3.4069ms -peer1.org2.example.com | "2019-05-02 01:30:56.614 UTC [gossip.channel] reportMembershipChanges -> INFO 04c Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" -orderer2.example.com | Operations.TLS.Certificate = "" -orderer2.example.com | Operations.TLS.RootCAs = [] -orderer2.example.com | Operations.TLS.ClientAuthRequired = false -orderer2.example.com | Operations.TLS.ClientRootCAs = [] -orderer2.example.com | Metrics.Provider = "prometheus" -orderer2.example.com | Metrics.Statsd.Network = "udp" -orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" -orderer2.example.com | Metrics.Statsd.WriteInterval = 30s -orderer2.example.com | Metrics.Statsd.Prefix = """ -orderer2.example.com | "2019-05-02 01:30:30.957 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing chains" -orderer2.example.com | "2019-05-02 01:30:31.005 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" -orderer2.example.com | "2019-05-02 01:30:31.007 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" -orderer2.example.com | "2019-05-02 01:30:31.014 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" -orderer2.example.com | "2019-05-02 01:30:31.050 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" -orderer2.example.com | "2019-05-02 01:30:31.050 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:31.074 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash eaacc2d483d6d8e73f399e0c2cefffb57b439acef632719154498ba7c7383eb1 and orderer type etcdraft" -orderer2.example.com | "2019-05-02 01:30:31.075 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:31.075 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, -orderer2.example.com | Endpoint: orderer0.example.com:7050, -orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer2.example.com | -----END CERTIFICATE----- -orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer1.example.com | 2019-05-02 01:30:29.925 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 -orderer1.example.com | "2019-05-02 01:30:30.019 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: -orderer1.example.com | General.LedgerType = "file" -orderer1.example.com | General.ListenAddress = "0.0.0.0" -orderer1.example.com | General.ListenPort = 7050 -orderer1.example.com | General.TLS.Enabled = true -orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" -orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" -orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] -orderer1.example.com | General.TLS.ClientAuthRequired = false -orderer1.example.com | General.TLS.ClientRootCAs = [] -orderer1.example.com | General.Cluster.ListenAddress = "" -orderer1.example.com | General.Cluster.ListenPort = 0 -orderer1.example.com | General.Cluster.ServerCertificate = "" -orderer1.example.com | General.Cluster.ServerPrivateKey = "" -orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" -orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" -orderer1.example.com | General.Cluster.RootCAs = [] -orderer1.example.com | General.Cluster.DialTimeout = 5s -orderer1.example.com | General.Cluster.RPCTimeout = 7s -orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 -orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s -orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s -orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s -orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 -orderer1.example.com | General.Cluster.SendBufferSize = 10 -orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s -orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s -orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s -orderer1.example.com | General.Keepalive.ServerTimeout = 20s -orderer1.example.com | General.GenesisMethod = "file" -orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" -orderer1.example.com | General.SystemChannel = "test-system-channel-name" -orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" -orderer1.example.com | General.Profile.Enabled = false -orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" -orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" -orderer1.example.com | General.LocalMSPID = "OrdererMSP" -orderer1.example.com | General.BCCSP.ProviderName = "SW" -orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 -orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" -orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false -orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" -orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = -orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = -orderer1.example.com | General.BCCSP.PluginOpts = -orderer1.example.com | General.Authentication.TimeWindow = 15m0s -orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" -orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" -orderer1.example.com | RAMLedger.HistorySize = 1000 -peer0.org1.example.com | "2019-05-02 01:30:34.476 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0fe Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:44892" -peer0.org1.example.com | "2019-05-02 01:30:34.476 UTC [msp] DeserializeIdentity -> DEBU 0ff Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:34.477 UTC [msp.identity] newIdentity -> DEBU 100 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:34.478 UTC [msp] Validate -> DEBU 101 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:34.479 UTC [grpc] infof -> DEBU 102 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:34.481 UTC [msp.identity] Verify -> DEBU 103 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-05-02 01:30:34.482 UTC [msp.identity] Verify -> DEBU 104 Verify: sig = 00000000 30 45 02 21 00 da c1 32 b7 6c 99 9e f0 f4 e1 0e |0E.!...2.l......| -peer0.org1.example.com | 00000010 ef 7c 8b 4a 6d 60 59 ee b1 56 e4 14 f2 c7 d2 f3 |.|.Jm`Y..V......| -peer0.org1.example.com | 00000020 40 db 97 78 77 02 20 1c 54 4c 65 e9 7d 56 b8 22 |@..xw. .TLe.}V."| -peer0.org1.example.com | 00000030 00 5a 0d f6 83 e9 72 65 d5 7a 68 b1 42 2a 2b 7d |.Z....re.zh.B*+}| -peer0.org1.example.com | 00000040 3c fc be b4 42 90 ec |<...B..|" -peer0.org1.example.com | "2019-05-02 01:30:34.482 UTC [gossip.comm] authenticateRemotePeer -> DEBU 105 Authenticated 192.168.240.6:44892" -peer0.org1.example.com | "2019-05-02 01:30:34.482 UTC [gossip.comm] GossipStream -> DEBU 106 Servicing 192.168.240.6:44892" -peer0.org1.example.com | "2019-05-02 01:30:34.483 UTC [gossip.comm] readFromStream -> DEBU 107 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-05-02 01:30:34.483 UTC [gossip.comm] func2 -> DEBU 108 Client 192.168.240.6:44892 disconnected" -peer0.org1.example.com | "2019-05-02 01:30:34.483 UTC [comm.grpc.server] 1 -> INFO 109 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:44.47Z grpc.peer_address=192.168.240.6:44892 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.3636ms -peer0.org1.example.com | "2019-05-02 01:30:34.484 UTC [gossip.comm] writeToStream -> DEBU 10a Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:30:34.486 UTC [comm.grpc.server] 1 -> INFO 10b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:36.486Z grpc.peer_address=192.168.240.6:44894 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.9µs -peer0.org1.example.com | "2019-05-02 01:30:34.489 UTC [msp.identity] Sign -> DEBU 10c Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:34.489 UTC [msp.identity] Sign -> DEBU 10d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:34.490 UTC [gossip.comm] authenticateRemotePeer -> DEBU 10e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.6:44894" -peer0.org2.example.com | "2019-05-02 01:30:41.348 UTC [gossip.gossip] JoinChan -> INFO 021 Joining gossip network of channel businesschannel with 2 organizations" -peer0.org2.example.com | "2019-05-02 01:30:41.348 UTC [gossip.gossip] learnAnchorPeers -> INFO 022 No configured anchor peers of Org1MSP for channel businesschannel to learn about" -peer0.org2.example.com | "2019-05-02 01:30:41.348 UTC [gossip.gossip] learnAnchorPeers -> INFO 023 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer0.org2.example.com | "2019-05-02 01:30:41.374 UTC [gossip.state] NewGossipStateProvider -> INFO 024 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" -peer0.org2.example.com | "2019-05-02 01:30:41.376 UTC [sccapi] deploySysCC -> INFO 025 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer0.org2.example.com | "2019-05-02 01:30:41.377 UTC [cscc] Init -> INFO 026 Init CSCC" -peer0.org2.example.com | "2019-05-02 01:30:41.377 UTC [sccapi] deploySysCC -> INFO 027 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer0.org2.example.com | "2019-05-02 01:30:41.378 UTC [qscc] Init -> INFO 028 Init QSCC" -peer0.org2.example.com | "2019-05-02 01:30:41.378 UTC [sccapi] deploySysCC -> INFO 029 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer0.org2.example.com | "2019-05-02 01:30:41.379 UTC [sccapi] deploySysCC -> INFO 02a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" -peer0.org2.example.com | "2019-05-02 01:30:41.380 UTC [endorser] callChaincode -> INFO 02b [][6b4a718a] Exit chaincode: name:"cscc" (81ms)" -peer0.org2.example.com | "2019-05-02 01:30:41.380 UTC [comm.grpc.server] 1 -> INFO 02c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49476 grpc.code=OK grpc.call_duration=83.1756ms -peer0.org2.example.com | "2019-05-02 01:30:42.428 UTC [endorser] callChaincode -> INFO 02d [][d231ac64] Entry chaincode: name:"cscc" " -peer0.org2.example.com | "2019-05-02 01:30:42.429 UTC [endorser] callChaincode -> INFO 02e [][d231ac64] Exit chaincode: name:"cscc" (1ms)" -peer0.org2.example.com | "2019-05-02 01:30:42.429 UTC [comm.grpc.server] 1 -> INFO 02f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49484 grpc.code=OK grpc.call_duration=2.6469ms -peer0.org2.example.com | "2019-05-02 01:30:43.315 UTC [endorser] callChaincode -> INFO 030 [][093a8fa3] Entry chaincode: name:"qscc" " -peer0.org2.example.com | "2019-05-02 01:30:43.317 UTC [endorser] callChaincode -> INFO 031 [][093a8fa3] Exit chaincode: name:"qscc" (2ms)" -peer0.org2.example.com | "2019-05-02 01:30:43.318 UTC [comm.grpc.server] 1 -> INFO 032 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49492 grpc.code=OK grpc.call_duration=3.546ms -peer0.org2.example.com | "2019-05-02 01:30:47.378 UTC [gossip.election] beLeader -> INFO 033 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader" -peer0.org2.example.com | "2019-05-02 01:30:47.378 UTC [gossip.service] func1 -> INFO 034 Elected as a leader, starting delivery service for channel businesschannel" -peer0.org2.example.com | "2019-05-02 01:30:47.449 UTC [gossip.privdata] StoreBlock -> INFO 035 [businesschannel] Received block [1] from buffer" -peer0.org2.example.com | "2019-05-02 01:30:47.460 UTC [gossip.gossip] JoinChan -> INFO 036 Joining gossip network of channel businesschannel with 2 organizations" -peer0.org2.example.com | "2019-05-02 01:30:47.461 UTC [gossip.gossip] learnAnchorPeers -> INFO 037 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org2.example.com | "2019-05-02 01:30:47.461 UTC [gossip.gossip] learnAnchorPeers -> INFO 038 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer0.org2.example.com | "2019-05-02 01:30:47.488 UTC [committer.txvalidator] Validate -> INFO 039 [businesschannel] Validated block [1] in 38ms" -peer0.org2.example.com | "2019-05-02 01:30:47.552 UTC [kvledger] CommitWithPvtData -> INFO 03a [businesschannel] Committed block [1] with 1 transaction(s) in 61ms (state_validation=31ms block_commit=23ms state_commit=4ms)" -peer0.org2.example.com | "2019-05-02 01:30:47.561 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [2] from buffer" -peer0.org2.example.com | "2019-05-02 01:30:47.589 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations" -peer0.org2.example.com | "2019-05-02 01:30:47.589 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer0.org2.example.com | "2019-05-02 01:30:47.589 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Anchor peer with same endpoint, skipping connecting to myself" -peer0.org2.example.com | "2019-05-02 01:30:47.589 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org2.example.com | "2019-05-02 01:30:47.606 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [2] in 44ms" -peer0.org2.example.com | "2019-05-02 01:30:47.645 UTC [kvledger] CommitWithPvtData -> INFO 041 [businesschannel] Committed block [2] with 1 transaction(s) in 33ms (state_validation=9ms block_commit=18ms state_commit=2ms)" -peer0.org2.example.com | "2019-05-02 01:30:47.696 UTC [comm.grpc.server] 1 -> INFO 042 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.695Z grpc.peer_address=192.168.240.6:56012 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=137.1µs -peer0.org2.example.com | "2019-05-02 01:30:47.717 UTC [comm.grpc.server] 1 -> INFO 043 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.697Z grpc.peer_address=192.168.240.6:56012 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.4772ms -peer0.org2.example.com | "2019-05-02 01:30:47.751 UTC [comm.grpc.server] 1 -> INFO 044 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.751Z grpc.peer_address=192.168.240.6:56018 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=137.5µs -peer0.org2.example.com | "2019-05-02 01:30:47.854 UTC [comm.grpc.server] 1 -> INFO 045 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.854Z grpc.peer_address=192.168.240.8:58112 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=217.4µs -peer0.org2.example.com | "2019-05-02 01:30:47.874 UTC [comm.grpc.server] 1 -> INFO 046 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.872Z grpc.peer_address=192.168.240.7:45766 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=250.1µs -peer0.org2.example.com | "2019-05-02 01:30:47.874 UTC [comm.grpc.server] 1 -> INFO 047 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.873Z grpc.peer_address=192.168.240.7:45760 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=335.3µs -peer1.org1.example.com | "2019-05-02 01:31:05.944 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 059 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" -peer1.org1.example.com | "2019-05-02 01:31:05.944 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 05a Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" -peer1.org1.example.com | "2019-05-02 01:31:06.001 UTC [kvledger] CommitWithPvtData -> INFO 05b [businesschannel] Committed block [5] with 1 transaction(s) in 57ms (state_validation=13ms block_commit=33ms state_commit=4ms)" -peer1.org1.example.com | "2019-05-02 01:31:11.457 UTC [gossip.privdata] StoreBlock -> INFO 05c [businesschannel] Received block [6] from buffer" -peer1.org1.example.com | "2019-05-02 01:31:11.461 UTC [committer.txvalidator] Validate -> INFO 05d [businesschannel] Validated block [6] in 3ms" -peer1.org1.example.com | "2019-05-02 01:31:11.487 UTC [kvledger] CommitWithPvtData -> INFO 05e [businesschannel] Committed block [6] with 1 transaction(s) in 25ms (state_validation=0ms block_commit=18ms state_commit=3ms)" -peer1.org1.example.com | "2019-05-02 01:31:16.915 UTC [gossip.privdata] StoreBlock -> INFO 05f [businesschannel] Received block [7] from buffer" -peer1.org1.example.com | "2019-05-02 01:31:16.919 UTC [committer.txvalidator] Validate -> INFO 060 [businesschannel] Validated block [7] in 3ms" -peer1.org1.example.com | "2019-05-02 01:31:16.940 UTC [kvledger] CommitWithPvtData -> INFO 061 [businesschannel] Committed block [7] with 1 transaction(s) in 19ms (state_validation=1ms block_commit=11ms state_commit=2ms)" -peer1.org1.example.com | "2019-05-02 01:31:19.715 UTC [gossip.privdata] StoreBlock -> INFO 062 [businesschannel] Received block [8] from buffer" -peer1.org1.example.com | "2019-05-02 01:31:19.717 UTC [committer.txvalidator] Validate -> INFO 063 [businesschannel] Validated block [8] in 1ms" -peer1.org1.example.com | "2019-05-02 01:31:19.738 UTC [kvledger] CommitWithPvtData -> INFO 064 [businesschannel] Committed block [8] with 1 transaction(s) in 20ms (state_validation=0ms block_commit=12ms state_commit=3ms)" -peer1.org1.example.com | "2019-05-02 01:31:35.150 UTC [gossip.privdata] StoreBlock -> INFO 065 [businesschannel] Received block [9] from buffer" -peer1.org1.example.com | "2019-05-02 01:31:35.155 UTC [cauthdsl] deduplicate -> WARN 066 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer1.org1.example.com | "2019-05-02 01:31:35.158 UTC [cauthdsl] deduplicate -> WARN 067 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer1.org1.example.com | "2019-05-02 01:31:35.222 UTC [gossip.gossip] JoinChan -> INFO 068 Joining gossip network of channel businesschannel with 3 organizations" -peer1.org1.example.com | "2019-05-02 01:31:35.222 UTC [gossip.gossip] learnAnchorPeers -> INFO 069 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org1.example.com | "2019-05-02 01:31:35.225 UTC [gossip.gossip] learnAnchorPeers -> INFO 06a Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer1.org1.example.com | "2019-05-02 01:31:35.226 UTC [gossip.gossip] learnAnchorPeers -> INFO 06b No configured anchor peers of Org3MSP for channel businesschannel to learn about" -peer1.org1.example.com | "2019-05-02 01:31:35.226 UTC [gossip.service] updateEndpoints -> WARN 06c Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" -peer1.org1.example.com | "2019-05-02 01:31:35.242 UTC [committer.txvalidator] Validate -> INFO 06d [businesschannel] Validated block [9] in 91ms" -peer1.org1.example.com | "2019-05-02 01:31:35.275 UTC [kvledger] CommitWithPvtData -> INFO 06e [businesschannel] Committed block [9] with 1 transaction(s) in 30ms (state_validation=1ms block_commit=22ms state_commit=3ms)" -peer1.org1.example.com | "2019-05-02 01:31:35.293 UTC [gossip.comm] func1 -> WARN 06f peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" -peer1.org1.example.com | "2019-05-02 01:31:35.294 UTC [gossip.discovery] expireDeadMembers -> WARN 070 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" -peer1.org1.example.com | "2019-05-02 01:31:35.299 UTC [gossip.discovery] expireDeadMembers -> WARN 071 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " -peer1.org1.example.com | "2019-05-02 01:31:35.301 UTC [gossip.discovery] expireDeadMembers -> WARN 072 Exiting" -peer1.org1.example.com | "2019-05-02 01:31:36.048 UTC [gossip.channel] reportMembershipChanges -> INFO 073 Membership view has changed. peers went offline: [[peer0.org1.example.com:7051]] , current view: [[peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ]]" -peer1.org1.example.com | "2019-05-02 01:31:36.807 UTC [comm.grpc.server] 1 -> INFO 074 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:38.806Z grpc.peer_address=192.168.240.7:45042 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=150.7µs -peer1.org1.example.com | "2019-05-02 01:31:36.838 UTC [gossip.comm] func1 -> WARN 075 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" -peer1.org1.example.com | "2019-05-02 01:31:36.838 UTC [gossip.discovery] expireDeadMembers -> WARN 076 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" -peer1.org1.example.com | "2019-05-02 01:31:36.838 UTC [gossip.discovery] expireDeadMembers -> WARN 077 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " -peer1.org1.example.com | "2019-05-02 01:31:36.839 UTC [gossip.discovery] expireDeadMembers -> WARN 078 Exiting" -peer1.org1.example.com | "2019-05-02 01:31:36.842 UTC [comm.grpc.server] 1 -> INFO 079 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:38.84Z grpc.peer_address=192.168.240.5:50332 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=428.1µs -peer1.org1.example.com | "2019-05-02 01:31:41.049 UTC [gossip.channel] reportMembershipChanges -> INFO 07a Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" -peer1.org1.example.com | "2019-05-02 01:31:51.652 UTC [endorser] callChaincode -> INFO 07b [][4cefa837] Entry chaincode: name:"cscc" " -peer1.org1.example.com | "2019-05-02 01:31:51.654 UTC [endorser] callChaincode -> INFO 07c [][4cefa837] Exit chaincode: name:"cscc" (1ms)" -peer1.org1.example.com | "2019-05-02 01:31:51.654 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:52626 grpc.code=OK grpc.call_duration=2.7151ms -peer1.org1.example.com | "2019-05-02 01:31:52.521 UTC [endorser] callChaincode -> INFO 07e [][d1a71c5c] Entry chaincode: name:"qscc" " -peer1.org1.example.com | "2019-05-02 01:31:52.524 UTC [endorser] callChaincode -> INFO 07f [][d1a71c5c] Exit chaincode: name:"qscc" (2ms)" -peer1.org1.example.com | "2019-05-02 01:31:52.524 UTC [comm.grpc.server] 1 -> INFO 080 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:52634 grpc.code=OK grpc.call_duration=4.4522ms -orderer0.example.com | 2019-05-02 01:30:30.336 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for general -orderer0.example.com | 2019-05-02 01:30:30.337 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') -orderer0.example.com | 2019-05-02 01:30:30.337 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for general.GenesisMethod setting to string file -orderer0.example.com | 2019-05-02 01:30:30.337 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer1.example.com | Kafka.Retry.ShortInterval = 5s -orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s -orderer1.example.com | Kafka.Retry.LongInterval = 5m0s -orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s -orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s -orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s -orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s -orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 -orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms -orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 -orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms -orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s -orderer1.example.com | Kafka.Verbose = false -orderer1.example.com | Kafka.Version = 0.10.2.0 -orderer1.example.com | Kafka.TLS.Enabled = false -orderer1.example.com | Kafka.TLS.PrivateKey = "" -orderer1.example.com | Kafka.TLS.Certificate = "" -orderer1.example.com | Kafka.TLS.RootCAs = [] -orderer1.example.com | Kafka.TLS.ClientAuthRequired = false -orderer1.example.com | Kafka.TLS.ClientRootCAs = [] -orderer1.example.com | Kafka.SASLPlain.Enabled = false -orderer1.example.com | Kafka.SASLPlain.User = "" -orderer1.example.com | Kafka.SASLPlain.Password = "" -orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 -orderer1.example.com | Debug.BroadcastTraceDir = "" -orderer1.example.com | Debug.DeliverTraceDir = "" -orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] -orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" -orderer1.example.com | Operations.TLS.Enabled = false -orderer1.example.com | Operations.TLS.PrivateKey = "" -orderer1.example.com | Operations.TLS.Certificate = "" -orderer1.example.com | Operations.TLS.RootCAs = [] -orderer1.example.com | Operations.TLS.ClientAuthRequired = false -orderer1.example.com | Operations.TLS.ClientRootCAs = [] -orderer1.example.com | Metrics.Provider = "prometheus" -orderer1.example.com | Metrics.Statsd.Network = "udp" -orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" -orderer1.example.com | Metrics.Statsd.WriteInterval = 30s -orderer1.example.com | Metrics.Statsd.Prefix = """ -orderer1.example.com | "2019-05-02 01:30:30.052 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing chains" -orderer1.example.com | "2019-05-02 01:30:30.106 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" -orderer1.example.com | "2019-05-02 01:30:30.107 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" -orderer1.example.com | "2019-05-02 01:30:30.115 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" -orderer1.example.com | "2019-05-02 01:30:30.141 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" -orderer1.example.com | "2019-05-02 01:30:30.145 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:30.174 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash eaacc2d483d6d8e73f399e0c2cefffb57b439acef632719154498ba7c7383eb1 and orderer type etcdraft" -orderer1.example.com | "2019-05-02 01:30:30.174 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:30.175 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, -orderer1.example.com | Endpoint: orderer0.example.com:7050, -orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer2.example.com | -----END CERTIFICATE----- -orderer2.example.com | ID: 2, -orderer2.example.com | Endpoint: orderer1.example.com:7050, -orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer2.example.com | -----END CERTIFICATE----- -orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer2.example.com | -----END CERTIFICATE----- -orderer2.example.com | ]" -orderer2.example.com | "2019-05-02 01:30:31.075 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" -peer0.org1.example.com | "2019-05-02 01:30:34.490 UTC [gossip.comm] authenticateRemotePeer -> DEBU 10f Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:44894" -peer0.org1.example.com | "2019-05-02 01:30:34.495 UTC [msp.identity] Verify -> DEBU 110 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-05-02 01:30:34.496 UTC [msp.identity] Verify -> DEBU 111 Verify: sig = 00000000 30 44 02 20 75 9d 1b 6b 5d 0b 5a 70 8c 6d 7b 31 |0D. u..k].Zp.m{1| -peer0.org1.example.com | 00000010 d0 1c ab 59 f8 a1 ce 91 16 af dc 6b f2 83 a2 f6 |...Y.......k....| -peer0.org1.example.com | 00000020 ec cb f2 c5 02 20 61 1d 47 e5 a0 8c 0a a8 b1 b5 |..... a.G.......| -peer0.org1.example.com | 00000030 76 25 b5 66 49 46 b4 f8 18 9c 52 ab 17 ac ee 4f |v%.fIF....R....O| -peer0.org1.example.com | 00000040 8a b6 64 b6 e2 e1 |..d...|" -peer0.org1.example.com | "2019-05-02 01:30:34.497 UTC [gossip.comm] authenticateRemotePeer -> DEBU 112 Authenticated 192.168.240.6:44894" -peer0.org1.example.com | "2019-05-02 01:30:34.497 UTC [gossip.comm] GossipStream -> DEBU 113 Servicing 192.168.240.6:44894" -orderer0.example.com | 2019-05-02 01:30:30.337 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp -orderer0.example.com | 2019-05-02 01:30:30.338 UTC [viperutil] unmarshalJSON -> DEBU 006 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.338 UTC [viperutil] getKeysRecursively -> DEBU 007 Found real value for general.GenesisProfile setting to string SampleInsecureSolo -orderer0.example.com | 2019-05-02 01:30:30.338 UTC [viperutil] getKeysRecursively -> DEBU 008 Found map[string]interface{} value for general.Profile -orderer0.example.com | 2019-05-02 01:30:30.362 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.362 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for general.Profile.Address setting to string 0.0.0.0:6060 -orderer0.example.com | 2019-05-02 01:30:30.364 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: false -orderer0.example.com | 2019-05-02 01:30:30.364 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for general.Profile.Enabled setting to bool false -orderer0.example.com | 2019-05-02 01:30:30.364 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') -orderer0.example.com | 2019-05-02 01:30:30.364 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for general.LedgerType setting to string file -orderer0.example.com | 2019-05-02 01:30:30.365 UTC [viperutil] getKeysRecursively -> DEBU 00f Found map[string]interface{} value for general.BCCSP -orderer0.example.com | 2019-05-02 01:30:30.365 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.365 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for general.BCCSP.Default setting to string SW -orderer0.example.com | 2019-05-02 01:30:30.366 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[string]interface{} value for general.BCCSP.SW -orderer0.example.com | 2019-05-02 01:30:30.373 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore -orderer0.example.com | 2019-05-02 01:30:30.385 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.388 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to -orderer0.example.com | 2019-05-02 01:30:30.388 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.388 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for general.BCCSP.SW.Hash setting to string SHA2 -orderer0.example.com | 2019-05-02 01:30:30.389 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: 256 -orderer0.example.com | 2019-05-02 01:30:30.389 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for general.BCCSP.SW.Security setting to int 256 -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for general.ListenAddress setting to string 0.0.0.0 -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for general.ListenPort setting to string 7050 -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 01e Found map[string]interface{} value for general.Keepalive -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 01f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 020 Found real value for general.Keepalive.ServerMinInterval setting to string 60s -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for general.Keepalive.ServerInterval setting to string 7200s -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.Keepalive.ServerTimeout setting to string 20s -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 025 Found map[string]interface{} value for general.Authentication -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 026 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 027 Found real value for general.Authentication.TimeWindow setting to string 15m -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 028 Found map[string]interface{} value for general.TLS -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 029 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 02a Found real value for general.TLS.Enabled setting to string true -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 02b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 02c Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value is not a string: false -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for general.TLS.ClientAuthRequired setting to bool false -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 033 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 034 Found real value for general.TLS.ClientRootCAs setting to -orderer0.example.com | 2019-05-02 01:30:30.396 UTC [viperutil] unmarshalJSON -> DEBU 035 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.396 UTC [viperutil] getKeysRecursively -> DEBU 036 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block -orderer0.example.com | 2019-05-02 01:30:30.396 UTC [viperutil] unmarshalJSON -> DEBU 037 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.396 UTC [viperutil] getKeysRecursively -> DEBU 038 Found real value for general.LocalMSPID setting to string OrdererMSP -orderer0.example.com | 2019-05-02 01:30:30.396 UTC [viperutil] getKeysRecursively -> DEBU 039 Found map[string]interface{} value for general.Cluster -orderer0.example.com | 2019-05-02 01:30:30.396 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.396 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.Cluster.ServerCertificate setting to -orderer0.example.com | 2019-05-02 01:30:30.397 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.397 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.Cluster.ServerPrivateKey setting to -orderer0.example.com | 2019-05-02 01:30:30.397 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value is not a string: 10 -orderer0.example.com | 2019-05-02 01:30:30.397 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for general.Cluster.SendBufferSize setting to int 10 -orderer0.example.com | 2019-05-02 01:30:30.397 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.397 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt -orderer0.example.com | 2019-05-02 01:30:30.397 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.397 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key -orderer0.example.com | 2019-05-02 01:30:30.397 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.397 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for general.Cluster.ListenPort setting to -orderer0.example.com | 2019-05-02 01:30:30.398 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.398 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.Cluster.ListenAddress setting to -orderer0.example.com | 2019-05-02 01:30:30.398 UTC [viperutil] getKeysRecursively -> DEBU 048 Found map[interface{}]interface{} value for fileledger -orderer0.example.com | 2019-05-02 01:30:30.398 UTC [viperutil] unmarshalJSON -> DEBU 049 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.398 UTC [viperutil] getKeysRecursively -> DEBU 04a Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer -orderer0.example.com | 2019-05-02 01:30:30.398 UTC [viperutil] unmarshalJSON -> DEBU 04b Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.398 UTC [viperutil] getKeysRecursively -> DEBU 04c Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger -orderer0.example.com | 2019-05-02 01:30:30.409 UTC [viperutil] getKeysRecursively -> DEBU 04d Found map[interface{}]interface{} value for ramledger -orderer0.example.com | 2019-05-02 01:30:30.410 UTC [viperutil] unmarshalJSON -> DEBU 04e Unmarshal JSON: value is not a string: 1000 -peer1.org2.example.com | "2019-05-02 01:30:57.886 UTC [gossip.privdata] StoreBlock -> INFO 04d [businesschannel] Received block [3] from buffer" -peer1.org2.example.com | "2019-05-02 01:30:57.930 UTC [committer.txvalidator] Validate -> INFO 04e [businesschannel] Validated block [3] in 10ms" -peer1.org2.example.com | "2019-05-02 01:30:57.934 UTC [confighistory] HandleStateUpdates -> ERRO 04f Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc002fb8500)}" -peer1.org2.example.com | "2019-05-02 01:30:58.019 UTC [kvledger] CommitWithPvtData -> INFO 050 [businesschannel] Committed block [3] with 1 transaction(s) in 86ms (state_validation=2ms block_commit=76ms state_commit=3ms)" -peer1.org2.example.com | "2019-05-02 01:31:01.646 UTC [gossip.privdata] StoreBlock -> INFO 051 [businesschannel] Received block [4] from buffer" -peer1.org2.example.com | "2019-05-02 01:31:01.655 UTC [committer.txvalidator] Validate -> INFO 052 [businesschannel] Validated block [4] in 9ms" -peer1.org2.example.com | "2019-05-02 01:31:01.694 UTC [gossip.privdata] StoreBlock -> INFO 053 [businesschannel] Fetched all missing collection private write sets from remote peers for block [4] (35ms)" -peer1.org2.example.com | "2019-05-02 01:31:01.695 UTC [confighistory] HandleStateUpdates -> ERRO 054 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc002ef4aa0)}" -peer1.org2.example.com | "2019-05-02 01:31:01.736 UTC [kvledger] CommitWithPvtData -> INFO 055 [businesschannel] Committed block [4] with 1 transaction(s) in 42ms (state_validation=2ms block_commit=26ms state_commit=7ms)" -peer1.org2.example.com | "2019-05-02 01:31:05.908 UTC [gossip.privdata] StoreBlock -> INFO 056 [businesschannel] Received block [5] from buffer" -peer1.org2.example.com | "2019-05-02 01:31:05.936 UTC [committer.txvalidator] Validate -> INFO 057 [businesschannel] Validated block [5] in 26ms" -peer1.org2.example.com | "2019-05-02 01:31:05.947 UTC [lifecycle] update -> INFO 058 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" -peer1.org2.example.com | "2019-05-02 01:31:05.953 UTC [lifecycle] update -> INFO 059 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" -peer1.org2.example.com | "2019-05-02 01:31:05.960 UTC [cceventmgmt] HandleStateUpdates -> INFO 05a Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" -peer1.org2.example.com | "2019-05-02 01:31:05.961 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 05b Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" -peer1.org2.example.com | "2019-05-02 01:31:05.963 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 05c Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" -peer1.org2.example.com | "2019-05-02 01:31:06.016 UTC [kvledger] CommitWithPvtData -> INFO 05d [businesschannel] Committed block [5] with 1 transaction(s) in 70ms (state_validation=34ms block_commit=27ms state_commit=4ms)" -peer1.org2.example.com | "2019-05-02 01:31:11.431 UTC [gossip.privdata] StoreBlock -> INFO 05e [businesschannel] Received block [6] from buffer" -peer1.org2.example.com | "2019-05-02 01:31:11.437 UTC [committer.txvalidator] Validate -> INFO 05f [businesschannel] Validated block [6] in 6ms" -peer1.org2.example.com | "2019-05-02 01:31:11.478 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [6] with 1 transaction(s) in 39ms (state_validation=0ms block_commit=25ms state_commit=6ms)" -peer1.org2.example.com | "2019-05-02 01:31:16.863 UTC [gossip.privdata] StoreBlock -> INFO 061 [businesschannel] Received block [7] from buffer" -peer1.org2.example.com | "2019-05-02 01:31:16.866 UTC [committer.txvalidator] Validate -> INFO 062 [businesschannel] Validated block [7] in 2ms" -peer1.org2.example.com | "2019-05-02 01:31:16.909 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [7] with 1 transaction(s) in 27ms (state_validation=0ms block_commit=21ms state_commit=2ms)" -peer1.org2.example.com | "2019-05-02 01:31:19.685 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [8] from buffer" -peer1.org2.example.com | "2019-05-02 01:31:19.687 UTC [committer.txvalidator] Validate -> INFO 065 [businesschannel] Validated block [8] in 2ms" -peer1.org2.example.com | "2019-05-02 01:31:19.715 UTC [kvledger] CommitWithPvtData -> INFO 066 [businesschannel] Committed block [8] with 1 transaction(s) in 26ms (state_validation=0ms block_commit=15ms state_commit=3ms)" -peer1.org2.example.com | "2019-05-02 01:31:35.187 UTC [gossip.privdata] StoreBlock -> INFO 067 [businesschannel] Received block [9] from buffer" -peer1.org2.example.com | "2019-05-02 01:31:35.192 UTC [cauthdsl] deduplicate -> WARN 068 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer1.org2.example.com | "2019-05-02 01:31:35.193 UTC [cauthdsl] deduplicate -> WARN 069 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer1.org2.example.com | "2019-05-02 01:31:35.215 UTC [gossip.gossip] JoinChan -> INFO 06a Joining gossip network of channel businesschannel with 3 organizations" -peer1.org2.example.com | "2019-05-02 01:31:35.215 UTC [gossip.gossip] learnAnchorPeers -> INFO 06b Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer1.org2.example.com | "2019-05-02 01:31:35.301 UTC [gossip.gossip] learnAnchorPeers -> INFO 06c No configured anchor peers of Org3MSP for channel businesschannel to learn about" -peer1.org2.example.com | "2019-05-02 01:31:35.301 UTC [gossip.gossip] learnAnchorPeers -> INFO 06d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org2.example.com | "2019-05-02 01:31:35.303 UTC [gossip.service] updateEndpoints -> WARN 06e Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" -peer1.org2.example.com | "2019-05-02 01:31:35.402 UTC [committer.txvalidator] Validate -> INFO 06f [businesschannel] Validated block [9] in 214ms" -peer1.org2.example.com | "2019-05-02 01:31:35.461 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [9] with 1 transaction(s) in 58ms (state_validation=9ms block_commit=34ms state_commit=9ms)" -peer1.org2.example.com | "2019-05-02 01:31:35.522 UTC [comm.grpc.server] 1 -> INFO 071 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.7:33812 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=47.107528s -peer1.org2.example.com | "2019-05-02 01:31:35.563 UTC [comm.grpc.server] 1 -> INFO 072 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.562Z grpc.peer_address=192.168.240.7:33990 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=520.9µs -peer1.org2.example.com | "2019-05-02 01:31:36.827 UTC [gossip.comm] func1 -> WARN 073 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" -peer1.org2.example.com | "2019-05-02 01:31:36.832 UTC [gossip.discovery] expireDeadMembers -> WARN 074 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" -peer1.org2.example.com | "2019-05-02 01:31:36.833 UTC [gossip.discovery] expireDeadMembers -> WARN 075 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " -peer1.org2.example.com | "2019-05-02 01:31:36.834 UTC [gossip.discovery] expireDeadMembers -> WARN 076 Exiting" -peer1.org2.example.com | "2019-05-02 01:31:36.843 UTC [comm.grpc.server] 1 -> INFO 077 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:38.843Z grpc.peer_address=192.168.240.5:36692 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.3µs -peer1.org2.example.com | "2019-05-02 01:31:51.915 UTC [endorser] callChaincode -> INFO 078 [][d00450f4] Entry chaincode: name:"cscc" " -peer1.org2.example.com | "2019-05-02 01:31:51.917 UTC [endorser] callChaincode -> INFO 079 [][d00450f4] Exit chaincode: name:"cscc" (1ms)" -peer1.org2.example.com | "2019-05-02 01:31:51.917 UTC [comm.grpc.server] 1 -> INFO 07a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:36160 grpc.code=OK grpc.call_duration=3.1572ms -peer1.org2.example.com | "2019-05-02 01:31:52.846 UTC [endorser] callChaincode -> INFO 07b [][d8388a91] Entry chaincode: name:"qscc" " -peer1.org2.example.com | "2019-05-02 01:31:52.848 UTC [endorser] callChaincode -> INFO 07c [][d8388a91] Exit chaincode: name:"qscc" (2ms)" -peer1.org2.example.com | "2019-05-02 01:31:52.849 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:36168 grpc.code=OK grpc.call_duration=4.0105ms -orderer0.example.com | 2019-05-02 01:30:30.410 UTC [viperutil] getKeysRecursively -> DEBU 04f Found real value for ramledger.HistorySize setting to int 1000 -orderer0.example.com | 2019-05-02 01:30:30.410 UTC [viperutil] getKeysRecursively -> DEBU 050 Found map[interface{}]interface{} value for kafka -orderer0.example.com | 2019-05-02 01:30:30.410 UTC [viperutil] getKeysRecursively -> DEBU 051 Found map[string]interface{} value for kafka.Topic -orderer0.example.com | 2019-05-02 01:30:30.410 UTC [viperutil] unmarshalJSON -> DEBU 052 Unmarshal JSON: value is not a string: 3 -orderer0.example.com | 2019-05-02 01:30:30.410 UTC [viperutil] getKeysRecursively -> DEBU 053 Found real value for kafka.Topic.ReplicationFactor setting to int 3 -orderer0.example.com | 2019-05-02 01:30:30.410 UTC [viperutil] unmarshalJSON -> DEBU 054 Unmarshal JSON: value is not a string: false -orderer0.example.com | 2019-05-02 01:30:30.410 UTC [viperutil] getKeysRecursively -> DEBU 055 Found real value for kafka.Verbose setting to bool false -orderer0.example.com | 2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 056 Found map[string]interface{} value for kafka.TLS -orderer0.example.com | 2019-05-02 01:30:30.411 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value is not a string: false -orderer0.example.com | 2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for kafka.TLS.Enabled setting to bool false -orderer0.example.com | 2019-05-02 01:30:30.411 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for kafka.TLS.PrivateKey setting to -orderer0.example.com | 2019-05-02 01:30:30.411 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for kafka.TLS.Certificate setting to -orderer0.example.com | 2019-05-02 01:30:30.411 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for kafka.TLS.RootCAs setting to -orderer0.example.com | 2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 05f Found map[string]interface{} value for kafka.SASLPlain -orderer0.example.com | 2019-05-02 01:30:30.412 UTC [viperutil] unmarshalJSON -> DEBU 060 Unmarshal JSON: value is not a string: false -orderer0.example.com | 2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 061 Found real value for kafka.SASLPlain.Enabled setting to bool false -orderer0.example.com | 2019-05-02 01:30:30.412 UTC [viperutil] unmarshalJSON -> DEBU 062 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 063 Found real value for kafka.SASLPlain.User setting to -orderer0.example.com | 2019-05-02 01:30:30.412 UTC [viperutil] unmarshalJSON -> DEBU 064 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 065 Found real value for kafka.SASLPlain.Password setting to -orderer0.example.com | 2019-05-02 01:30:30.412 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for kafka.Version setting to -orderer0.example.com | 2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[string]interface{} value for kafka.Retry -orderer0.example.com | 2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for kafka.Retry.Consumer -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for kafka.Retry.ShortInterval setting to string 5s -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for kafka.Retry.ShortTotal setting to string 10m -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for kafka.Retry.LongInterval setting to string 5m -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for kafka.Retry.LongTotal setting to string 12h -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 074 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts -orderer0.example.com | 2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.414 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s -orderer0.example.com | 2019-05-02 01:30:30.419 UTC [viperutil] unmarshalJSON -> DEBU 077 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.420 UTC [viperutil] getKeysRecursively -> DEBU 078 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s -orderer0.example.com | 2019-05-02 01:30:30.420 UTC [viperutil] unmarshalJSON -> DEBU 079 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.421 UTC [viperutil] getKeysRecursively -> DEBU 07a Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s -orderer0.example.com | 2019-05-02 01:30:30.421 UTC [viperutil] getKeysRecursively -> DEBU 07b Found map[string]interface{} value for kafka.Retry.Metadata -orderer2.example.com | "2019-05-02 01:30:31.075 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" -orderer2.example.com | "2019-05-02 01:30:31.075 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" -orderer2.example.com | "2019-05-02 01:30:31.075 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" -orderer2.example.com | "2019-05-02 01:30:31.076 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation" -peer0.org1.example.com | "2019-05-02 01:30:34.498 UTC [gossip.gossip] handleMessage -> DEBU 114 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 7184683292863464581, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1109 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:34.499 UTC [gossip.gossip] handleMessage -> DEBU 115 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:34.500 UTC [gossip.discovery] handleMsgFromComm -> DEBU 116 Got message: GossipMessage: Channel: , nonce: 7184683292863464581, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org2.example.com | "2019-05-02 01:30:47.893 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.885Z grpc.peer_address=192.168.240.7:45766 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=7.335ms -peer0.org2.example.com | "2019-05-02 01:30:47.893 UTC [comm.grpc.server] 1 -> INFO 049 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.7:45760 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=7.9357ms -peer0.org2.example.com | "2019-05-02 01:30:47.896 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.87Z grpc.peer_address=192.168.240.8:58112 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.263ms -peer0.org2.example.com | "2019-05-02 01:30:47.911 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.911Z grpc.peer_address=192.168.240.8:58122 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=123.7µs -peer0.org2.example.com | "2019-05-02 01:30:47.959 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.959Z grpc.peer_address=192.168.240.7:45770 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=139.6µs -peer0.org2.example.com | "2019-05-02 01:30:51.349 UTC [gossip.channel] reportMembershipChanges -> INFO 04d Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ] [peer1.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ] [peer1.org2.example.com:7051]]" -peer0.org2.example.com | "2019-05-02 01:30:52.848 UTC [endorser] callChaincode -> INFO 04e [][b130bb38] Entry chaincode: name:"_lifecycle" " -peer0.org2.example.com | "2019-05-02 01:30:52.849 UTC [endorser] callChaincode -> INFO 04f [][b130bb38] Exit chaincode: name:"_lifecycle" (1ms)" -peer0.org2.example.com | "2019-05-02 01:30:52.850 UTC [comm.grpc.server] 1 -> INFO 050 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49554 grpc.code=OK grpc.call_duration=3.08ms -peer0.org2.example.com | "2019-05-02 01:30:57.751 UTC [gossip.privdata] StoreBlock -> INFO 051 [businesschannel] Received block [3] from buffer" -peer0.org2.example.com | "2019-05-02 01:30:57.771 UTC [committer.txvalidator] Validate -> INFO 052 [businesschannel] Validated block [3] in 19ms" -orderer0.example.com | 2019-05-02 01:30:30.422 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.422 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms -orderer0.example.com | 2019-05-02 01:30:30.422 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value is not a string: 3 -orderer0.example.com | 2019-05-02 01:30:30.422 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 -orderer0.example.com | 2019-05-02 01:30:30.422 UTC [viperutil] getKeysRecursively -> DEBU 080 Found map[string]interface{} value for kafka.Retry.Producer -orderer0.example.com | 2019-05-02 01:30:30.422 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.422 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms -orderer0.example.com | 2019-05-02 01:30:30.423 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value is not a string: 3 -orderer0.example.com | 2019-05-02 01:30:30.423 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 -orderer0.example.com | 2019-05-02 01:30:30.423 UTC [viperutil] getKeysRecursively -> DEBU 085 Found map[interface{}]interface{} value for debug -orderer0.example.com | 2019-05-02 01:30:30.423 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.423 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for debug.DeliverTraceDir setting to -orderer0.example.com | 2019-05-02 01:30:30.423 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.424 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for debug.BroadcastTraceDir setting to -orderer0.example.com | 2019-05-02 01:30:30.424 UTC [viperutil] getKeysRecursively -> DEBU 08a Found map[interface{}]interface{} value for operations -orderer0.example.com | 2019-05-02 01:30:30.433 UTC [viperutil] unmarshalJSON -> DEBU 08b Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.433 UTC [viperutil] getKeysRecursively -> DEBU 08c Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 -orderer0.example.com | 2019-05-02 01:30:30.434 UTC [viperutil] getKeysRecursively -> DEBU 08d Found map[string]interface{} value for operations.TLS -orderer0.example.com | 2019-05-02 01:30:30.434 UTC [viperutil] unmarshalJSON -> DEBU 08e Unmarshal JSON: value is not a string: false -orderer0.example.com | 2019-05-02 01:30:30.434 UTC [viperutil] getKeysRecursively -> DEBU 08f Found real value for operations.TLS.ClientAuthRequired setting to bool false -orderer0.example.com | 2019-05-02 01:30:30.434 UTC [viperutil] unmarshalJSON -> DEBU 090 Unmarshal JSON: value is not a string: [] -orderer0.example.com | 2019-05-02 01:30:30.434 UTC [viperutil] getKeysRecursively -> DEBU 091 Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] -orderer0.example.com | 2019-05-02 01:30:30.434 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value is not a string: false -orderer0.example.com | 2019-05-02 01:30:30.435 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for operations.TLS.Enabled setting to bool false -orderer0.example.com | 2019-05-02 01:30:30.435 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.435 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for operations.TLS.Certificate setting to -orderer0.example.com | 2019-05-02 01:30:30.435 UTC [viperutil] unmarshalJSON -> DEBU 096 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.435 UTC [viperutil] getKeysRecursively -> DEBU 097 Found real value for operations.TLS.PrivateKey setting to -orderer0.example.com | 2019-05-02 01:30:30.435 UTC [viperutil] getKeysRecursively -> DEBU 098 Found map[interface{}]interface{} value for metrics -orderer0.example.com | 2019-05-02 01:30:30.435 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.435 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for metrics.Provider setting to string prometheus -orderer0.example.com | 2019-05-02 01:30:30.436 UTC [viperutil] getKeysRecursively -> DEBU 09b Found map[string]interface{} value for metrics.Statsd -orderer0.example.com | 2019-05-02 01:30:30.436 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.436 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for metrics.Statsd.Network setting to string udp -orderer0.example.com | 2019-05-02 01:30:30.436 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer0.example.com | 2019-05-02 01:30:30.436 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 -orderer0.example.com | 2019-05-02 01:30:30.436 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer0.example.com | 2019-05-02 01:30:30.436 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for metrics.Statsd.WriteInterval setting to string 30s -orderer0.example.com | 2019-05-02 01:30:30.437 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-05-02 01:30:30.437 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for metrics.Statsd.Prefix setting to -orderer0.example.com | 2019-05-02 01:30:30.437 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found map[interface{}]interface{} value for consensus -orderer0.example.com | 2019-05-02 01:30:30.437 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.437 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal -orderer0.example.com | 2019-05-02 01:30:30.437 UTC [viperutil] unmarshalJSON -> DEBU 0a7 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-05-02 01:30:30.437 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot -orderer0.example.com | 2019-05-02 01:30:30.438 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0a9 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key ListenAddress: ListenPort: SendBufferSize:10 ServerCertificate: ServerPrivateKey:] GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey:]] ramledger:map[HistorySize:1000]] -orderer0.example.com | 2019-05-02 01:30:30.441 UTC [localconfig] completeInitialization -> INFO 0aa Kafka.Version unset, setting to 0.10.2.0 -orderer0.example.com | "2019-05-02 01:30:30.494 UTC [bccsp_sw] openKeyStore -> DEBU 0ab KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" -orderer0.example.com | "2019-05-02 01:30:30.494 UTC [bccsp] initBCCSP -> DEBU 0ac Initialize BCCSP [SW]" -orderer0.example.com | "2019-05-02 01:30:30.494 UTC [msp] getPemMaterialFromDir -> DEBU 0ad Reading directory /var/hyperledger/orderer/msp/signcerts" -orderer0.example.com | "2019-05-02 01:30:30.546 UTC [msp] getPemMaterialFromDir -> DEBU 0ae Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" -orderer0.example.com | "2019-05-02 01:30:30.552 UTC [msp] getPemMaterialFromDir -> DEBU 0af Reading directory /var/hyperledger/orderer/msp/cacerts" -orderer0.example.com | "2019-05-02 01:30:30.562 UTC [msp] getPemMaterialFromDir -> DEBU 0b0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" -orderer0.example.com | "2019-05-02 01:30:30.568 UTC [msp] getPemMaterialFromDir -> DEBU 0b1 Reading directory /var/hyperledger/orderer/msp/admincerts" -orderer0.example.com | "2019-05-02 01:30:30.571 UTC [msp] getPemMaterialFromDir -> DEBU 0b2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" -orderer0.example.com | "2019-05-02 01:30:30.576 UTC [msp] getPemMaterialFromDir -> DEBU 0b3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" -orderer0.example.com | "2019-05-02 01:30:30.577 UTC [msp] getMspConfig -> DEBU 0b4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" -orderer0.example.com | "2019-05-02 01:30:30.577 UTC [msp] getPemMaterialFromDir -> DEBU 0b5 Reading directory /var/hyperledger/orderer/msp/tlscacerts" -orderer0.example.com | "2019-05-02 01:30:30.581 UTC [msp] getPemMaterialFromDir -> DEBU 0b6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" -orderer0.example.com | "2019-05-02 01:30:30.588 UTC [msp] getPemMaterialFromDir -> DEBU 0b7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" -orderer0.example.com | "2019-05-02 01:30:30.589 UTC [msp] getMspConfig -> DEBU 0b8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" -orderer0.example.com | "2019-05-02 01:30:30.589 UTC [msp] getPemMaterialFromDir -> DEBU 0b9 Reading directory /var/hyperledger/orderer/msp/crls" -orderer0.example.com | "2019-05-02 01:30:30.590 UTC [msp] getMspConfig -> DEBU 0ba crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" -orderer0.example.com | "2019-05-02 01:30:30.590 UTC [msp] getMspConfig -> DEBU 0bb MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" -orderer0.example.com | "2019-05-02 01:30:30.590 UTC [msp] newBccspMsp -> DEBU 0bc Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.590 UTC [msp] New -> DEBU 0bd Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.590 UTC [msp] loadLocaMSP -> DEBU 0be Created new local MSP" -orderer0.example.com | "2019-05-02 01:30:30.590 UTC [msp] Setup -> DEBU 0bf Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:30.591 UTC [msp.identity] newIdentity -> DEBU 0c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | "2019-05-02 09:27:08.527 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 172.18.0.5:7051" +peer1.org2.example.com | "2019-05-02 09:27:08.527 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-05-02 09:27:08.532 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org2.example.com | "2019-05-02 09:27:08.678 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer1.org2.example.com | "2019-05-02 09:27:08.679 UTC [lifecycle] InitializeLocalChaincodes -> INFO 006 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org2.example.com | "2019-05-02 09:27:08.711 UTC [nodeCmd] serve -> INFO 007 Starting peer with TLS enabled" +peer1.org2.example.com | "2019-05-02 09:27:08.724 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 008 Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" +peer1.org2.example.com | "2019-05-02 09:27:08.724 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 009 Exit with ccEndpoint: peer1.org2.example.com:7052" +peer1.org2.example.com | "2019-05-02 09:27:08.760 UTC [sccapi] registerSysCC -> INFO 00a system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org2.example.com | "2019-05-02 09:27:08.762 UTC [sccapi] registerSysCC -> INFO 00b system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org2.example.com | "2019-05-02 09:27:08.764 UTC [sccapi] registerSysCC -> INFO 00c system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org2.example.com | "2019-05-02 09:27:08.767 UTC [sccapi] registerSysCC -> INFO 00d system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org2.example.com | "2019-05-02 09:27:08.843 UTC [gossip.service] func1 -> INFO 00e Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-05-02 09:27:08.856 UTC [gossip.gossip] NewGossipService -> INFO 00f Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " +peer1.org2.example.com | "2019-05-02 09:27:08.870 UTC [gossip.gossip] start -> INFO 010 Gossip instance peer1.org2.example.com:7051 started" +peer1.org2.example.com | "2019-05-02 09:27:08.872 UTC [sccapi] deploySysCC -> INFO 011 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-05-02 09:27:08.874 UTC [cscc] Init -> INFO 012 Init CSCC" +peer1.org2.example.com | "2019-05-02 09:27:08.875 UTC [sccapi] deploySysCC -> INFO 013 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-05-02 09:27:08.880 UTC [qscc] Init -> INFO 014 Init QSCC" +peer1.org2.example.com | "2019-05-02 09:27:08.881 UTC [sccapi] deploySysCC -> INFO 015 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-05-02 09:27:08.886 UTC [sccapi] deploySysCC -> INFO 016 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-05-02 09:27:08.886 UTC [nodeCmd] serve -> INFO 017 Deployed system chaincodes" +peer1.org2.example.com | "2019-05-02 09:27:08.889 UTC [discovery] NewService -> INFO 018 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org2.example.com | "2019-05-02 09:27:08.890 UTC [nodeCmd] registerDiscoveryService -> INFO 019 Discovery service activated" +peer1.org2.example.com | "2019-05-02 09:27:08.890 UTC [nodeCmd] serve -> INFO 01a Starting peer with ID=[peer1.org2.example.com], network ID=[], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-05-02 09:27:08.895 UTC [nodeCmd] serve -> INFO 01b Started peer with ID=[peer1.org2.example.com], network ID=[], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-05-02 09:27:16.963 UTC [endorser] callChaincode -> INFO 01c [][9abb0a6c] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-05-02 09:27:16.969 UTC [ledgermgmt] CreateLedger -> INFO 01d Creating ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-05-02 09:27:16.972 UTC [fsblkstorage] newBlockfileMgr -> INFO 01e Getting block information from block storage" +peer1.org2.example.com | "2019-05-02 09:27:17.004 UTC [kvledger] CommitWithPvtData -> INFO 01f [businesschannel] Committed block [0] with 1 transaction(s) in 26ms (state_validation=1ms block_commit=11ms state_commit=11ms)" +peer1.org2.example.com | "2019-05-02 09:27:17.008 UTC [ledgermgmt] CreateLedger -> INFO 020 Created ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-05-02 09:27:17.015 UTC [gossip.gossip] JoinChan -> INFO 021 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-05-02 09:27:17.015 UTC [gossip.gossip] learnAnchorPeers -> INFO 022 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-05-02 09:27:17.015 UTC [gossip.gossip] learnAnchorPeers -> INFO 023 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-05-02 09:27:17.041 UTC [gossip.state] NewGossipStateProvider -> INFO 024 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org2.example.com | "2019-05-02 09:27:17.043 UTC [sccapi] deploySysCC -> INFO 025 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-05-02 09:27:17.044 UTC [cscc] Init -> INFO 026 Init CSCC" +peer1.org2.example.com | "2019-05-02 09:27:17.044 UTC [sccapi] deploySysCC -> INFO 027 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-05-02 09:27:17.045 UTC [qscc] Init -> INFO 028 Init QSCC" +peer1.org2.example.com | "2019-05-02 09:27:17.046 UTC [sccapi] deploySysCC -> INFO 029 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-05-02 09:27:17.046 UTC [sccapi] deploySysCC -> INFO 02a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-05-02 09:27:09.064 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for peer.handlers.endorsers.escc.library setting to " +peer0.org1.example.com | "2019-05-02 09:27:09.068 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 078 map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" +peer0.org1.example.com | "2019-05-02 09:27:09.080 UTC [gossip.service] func1 -> INFO 079 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +peer0.org1.example.com | "2019-05-02 09:27:09.086 UTC [msp] DeserializeIdentity -> DEBU 07a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:09.087 UTC [msp.identity] newIdentity -> DEBU 07b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:09.088 UTC [msp] Validate -> DEBU 07c MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:09.089 UTC [gossip.discovery] periodicalSendAlive -> DEBU 07d Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:09.089 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 07e Sleeping 25s" +peer0.org1.example.com | "2019-05-02 09:27:09.090 UTC [gossip.gossip] NewGossipService -> INFO 07f Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer0.org1.example.com | "2019-05-02 09:27:09.092 UTC [msp.identity] Sign -> DEBU 080 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:09.092 UTC [msp.identity] Sign -> DEBU 081 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " +peer0.org1.example.com | "2019-05-02 09:27:09.094 UTC [gossip.pull] Add -> DEBU 082 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" +peer0.org1.example.com | "2019-05-02 09:27:09.095 UTC [gossip.gossip] start -> INFO 083 Gossip instance peer0.org1.example.com:7051 started" +peer0.org1.example.com | "2019-05-02 09:27:09.095 UTC [gossip.gossip] syncDiscovery -> DEBU 084 Entering discovery sync with interval 4s" +peer0.org1.example.com | "2019-05-02 09:27:09.095 UTC [msp.identity] Sign -> DEBU 085 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:09.095 UTC [msp.identity] Sign -> DEBU 086 Sign: digest: 27FF9427800FE3DD452432775CD6BAEFC9CEBA33A76F5BBE04EC5B74295D5EDF " +peer0.org1.example.com | "2019-05-02 09:27:09.096 UTC [msp.identity] Sign -> DEBU 087 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:09.096 UTC [msp.identity] Sign -> DEBU 088 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:09.096 UTC [gossip.discovery] Connect -> DEBU 089 Skipping connecting to myself" +peer0.org1.example.com | "2019-05-02 09:27:09.098 UTC [chaincode] LaunchConfig -> DEBU 08a launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-05-02 09:27:09.098 UTC [chaincode] Start -> DEBU 08b start container: lscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.098 UTC [chaincode] Start -> DEBU 08c start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-05-02 09:27:09.098 UTC [chaincode] Start -> DEBU 08d start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:2.0.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-05-02 09:27:09.098 UTC [container] lockContainer -> DEBU 08e waiting for container(lscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.099 UTC [container] lockContainer -> DEBU 08f got container (lscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.099 UTC [inproccontroller] getInstance -> DEBU 090 chaincode instance created for lscc:2.0.0" +peer0.org2.example.com | "2019-05-02 09:27:22.471 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.47Z grpc.peer_address=172.18.0.6:47148 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141µs +peer0.org2.example.com | "2019-05-02 09:27:22.486 UTC [comm.grpc.server] 1 -> INFO 034 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.474Z grpc.peer_address=172.18.0.6:47148 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.0091ms +peer0.org2.example.com | "2019-05-02 09:27:22.499 UTC [comm.grpc.server] 1 -> INFO 035 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.498Z grpc.peer_address=172.18.0.6:47152 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=353.6µs +peer0.org2.example.com | "2019-05-02 09:27:22.606 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.605Z grpc.peer_address=172.18.0.7:51472 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=319.1µs +peer0.org2.example.com | "2019-05-02 09:27:22.645 UTC [comm.grpc.server] 1 -> INFO 037 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.61Z grpc.peer_address=172.18.0.7:51472 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.0366ms +peer0.org2.example.com | "2019-05-02 09:27:22.652 UTC [comm.grpc.server] 1 -> INFO 038 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.651Z grpc.peer_address=172.18.0.7:51474 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=368.1µs +peer0.org2.example.com | "2019-05-02 09:27:22.814 UTC [gossip.election] beLeader -> INFO 039 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader" +peer0.org2.example.com | "2019-05-02 09:27:22.814 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +peer0.org2.example.com | "2019-05-02 09:27:22.828 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [1] from buffer" +peer0.org2.example.com | "2019-05-02 09:27:22.838 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-05-02 09:27:22.839 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-05-02 09:27:22.842 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-05-02 09:27:22.874 UTC [committer.txvalidator] Validate -> INFO 03f [businesschannel] Validated block [1] in 45ms" +peer0.org2.example.com | "2019-05-02 09:27:22.895 UTC [comm.grpc.server] 1 -> INFO 040 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:51474 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=241.6951ms +peer0.org2.example.com | "2019-05-02 09:27:22.897 UTC [kvledger] CommitWithPvtData -> INFO 041 [businesschannel] Committed block [1] with 1 transaction(s) in 22ms (state_validation=1ms block_commit=10ms state_commit=8ms)" +peer0.org2.example.com | "2019-05-02 09:27:22.898 UTC [gossip.privdata] StoreBlock -> INFO 042 [businesschannel] Received block [2] from buffer" +peer0.org2.example.com | "2019-05-02 09:27:22.909 UTC [gossip.gossip] JoinChan -> INFO 043 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-05-02 09:27:22.909 UTC [gossip.gossip] learnAnchorPeers -> INFO 044 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-05-02 09:27:22.910 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-05-02 09:27:22.914 UTC [gossip.gossip] learnAnchorPeers -> INFO 046 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-05-02 09:27:22.948 UTC [committer.txvalidator] Validate -> INFO 047 [businesschannel] Validated block [2] in 49ms" +peer0.org2.example.com | "2019-05-02 09:27:22.988 UTC [kvledger] CommitWithPvtData -> INFO 048 [businesschannel] Committed block [2] with 1 transaction(s) in 37ms (state_validation=2ms block_commit=28ms state_commit=4ms)" +peer0.org2.example.com | "2019-05-02 09:27:23.241 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.24Z grpc.peer_address=172.18.0.5:35766 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=119µs +peer0.org2.example.com | "2019-05-02 09:27:23.265 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:33.248Z grpc.peer_address=172.18.0.5:35766 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.9332ms +peer0.org2.example.com | "2019-05-02 09:27:23.271 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.27Z grpc.peer_address=172.18.0.5:35768 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=155.8µs +peer0.org2.example.com | "2019-05-02 09:27:26.569 UTC [endorser] callChaincode -> INFO 04c [][3bf6ebb7] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-05-02 09:27:26.571 UTC [endorser] callChaincode -> INFO 04d [][3bf6ebb7] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org2.example.com | "2019-05-02 09:27:26.571 UTC [comm.grpc.server] 1 -> INFO 04e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59908 grpc.code=OK grpc.call_duration=3.4753ms +peer0.org2.example.com | "2019-05-02 09:27:26.787 UTC [gossip.channel] reportMembershipChanges -> INFO 04f Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051]] , current view: [[peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051]]" +peer0.org2.example.com | "2019-05-02 09:27:29.998 UTC [gossip.privdata] StoreBlock -> INFO 050 [businesschannel] Received block [3] from buffer" +peer0.org2.example.com | "2019-05-02 09:27:30.049 UTC [committer.txvalidator] Validate -> INFO 051 [businesschannel] Validated block [3] in 51ms" +peer0.org2.example.com | "2019-05-02 09:27:30.068 UTC [confighistory] HandleStateUpdates -> ERRO 052 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0035409a0)}" +peer0.org2.example.com | "2019-05-02 09:27:30.107 UTC [kvledger] CommitWithPvtData -> INFO 053 [businesschannel] Committed block [3] with 1 transaction(s) in 39ms (state_validation=2ms block_commit=27ms state_commit=6ms)" +peer0.org2.example.com | "2019-05-02 09:27:30.270 UTC [endorser] callChaincode -> INFO 054 [][57c125d3] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-05-02 09:27:30.271 UTC [endorser] callChaincode -> INFO 055 [][57c125d3] Exit chaincode: name:"_lifecycle" (1ms)" +orderer1.example.com | 2019-05-02 09:27:06.067 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer1.example.com | "2019-05-02 09:27:06.214 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer1.example.com | General.LedgerType = "file" +orderer1.example.com | General.ListenAddress = "0.0.0.0" +orderer1.example.com | General.ListenPort = 7050 +orderer1.example.com | General.TLS.Enabled = true +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.TLS.ClientAuthRequired = false +orderer1.example.com | General.TLS.ClientRootCAs = [] +orderer1.example.com | General.Cluster.ListenAddress = "" +orderer1.example.com | General.Cluster.ListenPort = 0 +orderer1.example.com | General.Cluster.ServerCertificate = "" +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.Cluster.RootCAs = [] +orderer1.example.com | General.Cluster.DialTimeout = 5s +orderer1.example.com | General.Cluster.RPCTimeout = 7s +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer1.example.com | General.Cluster.SendBufferSize = 10 +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +orderer1.example.com | General.GenesisMethod = "file" +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +orderer1.example.com | General.BCCSP.ProviderName = "SW" +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer1.example.com | General.BCCSP.PluginOpts = +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer1.example.com | RAMLedger.HistorySize = 1000 +orderer1.example.com | Kafka.Retry.ShortInterval = 5s +orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = false +orderer1.example.com | Kafka.Version = 0.10.2.0 +orderer1.example.com | Kafka.TLS.Enabled = false +orderer1.example.com | Kafka.TLS.PrivateKey = "" +orderer1.example.com | Kafka.TLS.Certificate = "" +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +peer1.org2.example.com | "2019-05-02 09:27:17.048 UTC [endorser] callChaincode -> INFO 02b [][9abb0a6c] Exit chaincode: name:"cscc" (85ms)" +peer1.org2.example.com | "2019-05-02 09:27:17.048 UTC [comm.grpc.server] 1 -> INFO 02c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41164 grpc.code=OK grpc.call_duration=86.6211ms +peer1.org2.example.com | "2019-05-02 09:27:17.983 UTC [endorser] callChaincode -> INFO 02d [][ac14b48a] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-05-02 09:27:17.984 UTC [endorser] callChaincode -> INFO 02e [][ac14b48a] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-05-02 09:27:17.984 UTC [comm.grpc.server] 1 -> INFO 02f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41172 grpc.code=OK grpc.call_duration=2.167ms +peer1.org2.example.com | "2019-05-02 09:27:18.967 UTC [endorser] callChaincode -> INFO 030 [][b7b05fb2] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-05-02 09:27:18.969 UTC [endorser] callChaincode -> INFO 031 [][b7b05fb2] Exit chaincode: name:"qscc" (1ms)" +peer1.org2.example.com | "2019-05-02 09:27:18.969 UTC [comm.grpc.server] 1 -> INFO 032 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41180 grpc.code=OK grpc.call_duration=3.0639ms +peer1.org2.example.com | "2019-05-02 09:27:23.045 UTC [gossip.election] beLeader -> INFO 033 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Becoming a leader" +peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [container] unlockContainer -> DEBU 091 container lock deleted(lscc:2.0.0)" +peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [container] lockContainer -> DEBU 094 waiting for container(lscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [inproccontroller] func2 -> DEBU 092 chaincode-support started for lscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [inproccontroller] func1 -> DEBU 093 chaincode started for lscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [chaincode] handleMessage -> DEBU 095 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-05-02 09:27:09.101 UTC [chaincode] HandleRegister -> DEBU 096 Received REGISTER in state created" +peer0.org1.example.com | "2019-05-02 09:27:09.101 UTC [chaincode] Register -> DEBU 097 registered handler complete for chaincode lscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.101 UTC [chaincode] HandleRegister -> DEBU 098 Got REGISTER for chaincodeID = name:"lscc:2.0.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-05-02 09:27:09.101 UTC [chaincode] HandleRegister -> DEBU 099 Changed state to established for name:"lscc:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.101 UTC [chaincode] sendReady -> DEBU 09a sending READY for chaincode name:"lscc:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.102 UTC [chaincode] sendReady -> DEBU 09b Changed to state ready for chaincode name:"lscc:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.102 UTC [chaincode] Launch -> DEBU 09c launch complete" +peer0.org1.example.com | "2019-05-02 09:27:09.102 UTC [chaincode] Execute -> DEBU 09d Entry" +peer0.org1.example.com | "2019-05-02 09:27:09.102 UTC [chaincode] handleMessage -> DEBU 09e [f4841619] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:09.102 UTC [chaincode] Notify -> DEBU 09f [f4841619] notifying Txid:f4841619-3456-4681-80e9-bff70932f74d, channelID:" +peer0.org1.example.com | "2019-05-02 09:27:09.105 UTC [chaincode] Execute -> DEBU 0a0 Exit" +peer0.org1.example.com | "2019-05-02 09:27:09.105 UTC [sccapi] deploySysCC -> INFO 0a1 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-05-02 09:27:09.106 UTC [chaincode] LaunchConfig -> DEBU 0a2 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [chaincode] Start -> DEBU 0a3 start container: cscc:2.0.0" +peer0.org2.example.com | "2019-05-02 09:27:30.272 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59928 grpc.code=OK grpc.call_duration=2.9733ms +peer0.org2.example.com | "2019-05-02 09:27:30.447 UTC [endorser] callChaincode -> INFO 057 [businesschannel][fd8294ef] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-05-02 09:27:30.451 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 058 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-05-02 09:27:30.451 UTC [endorser] callChaincode -> INFO 059 [businesschannel][fd8294ef] Exit chaincode: name:"_lifecycle" (3ms)" +peer0.org2.example.com | "2019-05-02 09:27:30.459 UTC [comm.grpc.server] 1 -> INFO 05a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59932 grpc.code=OK grpc.call_duration=13.6998ms +peer0.org2.example.com | "2019-05-02 09:27:32.509 UTC [gossip.privdata] StoreBlock -> INFO 05b [businesschannel] Received block [4] from buffer" +peer0.org2.example.com | "2019-05-02 09:27:32.521 UTC [committer.txvalidator] Validate -> INFO 05c [businesschannel] Validated block [4] in 9ms" +peer0.org2.example.com | "2019-05-02 09:27:32.527 UTC [confighistory] HandleStateUpdates -> ERRO 05d Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00374a060)}" +peer0.org2.example.com | "2019-05-02 09:27:32.553 UTC [kvledger] CommitWithPvtData -> INFO 05e [businesschannel] Committed block [4] with 1 transaction(s) in 26ms (state_validation=4ms block_commit=12ms state_commit=5ms)" +peer0.org2.example.com | "2019-05-02 09:27:32.562 UTC [comm.grpc.server] 1 -> INFO 05f streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T09:28:00.462Z grpc.peer_address=172.18.0.8:59934 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.0997432s +peer0.org2.example.com | "2019-05-02 09:27:33.523 UTC [endorser] callChaincode -> INFO 060 [businesschannel][43825449] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-05-02 09:27:33.527 UTC [lifecycle] QueryApprovalStatus -> INFO 061 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-05-02 09:27:33.528 UTC [endorser] callChaincode -> INFO 062 [businesschannel][43825449] Exit chaincode: name:"_lifecycle" (5ms)" +peer0.org2.example.com | "2019-05-02 09:27:33.529 UTC [comm.grpc.server] 1 -> INFO 063 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59942 grpc.code=OK grpc.call_duration=7.3406ms +peer0.org2.example.com | "2019-05-02 09:27:34.454 UTC [endorser] callChaincode -> INFO 064 [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-05-02 09:27:34.458 UTC [lifecycle] QueryApprovalStatus -> INFO 065 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-05-02 09:27:34.460 UTC [lifecycle] CommitChaincodeDefinition -> INFO 066 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-05-02 09:27:34.461 UTC [endorser] callChaincode -> INFO 067 [businesschannel][f6f68e79] Exit chaincode: name:"_lifecycle" (7ms)" +peer0.org2.example.com | "2019-05-02 09:27:34.462 UTC [comm.grpc.server] 1 -> INFO 068 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59954 grpc.code=OK grpc.call_duration=9.2268ms +peer0.org2.example.com | "2019-05-02 09:27:36.880 UTC [gossip.privdata] StoreBlock -> INFO 069 [businesschannel] Received block [5] from buffer" +peer0.org2.example.com | "2019-05-02 09:27:36.882 UTC [committer.txvalidator] Validate -> INFO 06a [businesschannel] Validated block [5] in 2ms" +peer0.org2.example.com | "2019-05-02 09:27:36.885 UTC [lifecycle] update -> INFO 06b Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-05-02 09:27:36.886 UTC [lifecycle] update -> INFO 06c Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org2.example.com | "2019-05-02 09:27:36.887 UTC [cceventmgmt] HandleStateUpdates -> INFO 06d Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org2.example.com | "2019-05-02 09:27:36.888 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 06e Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org2.example.com | "2019-05-02 09:27:36.888 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 06f Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org2.example.com | "2019-05-02 09:27:36.919 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [5] with 1 transaction(s) in 35ms (state_validation=10ms block_commit=14ms state_commit=6ms)" +peer0.org2.example.com | "2019-05-02 09:27:36.928 UTC [comm.grpc.server] 1 -> INFO 071 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T09:28:04.466Z grpc.peer_address=172.18.0.8:59956 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.4623976s +peer0.org2.example.com | "2019-05-02 09:27:37.694 UTC [endorser] callChaincode -> INFO 072 [businesschannel][efe63c7a] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-05-02 09:27:37.697 UTC [lifecycle] QueryChaincodeDefinition -> INFO 073 successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org2.example.com | "2019-05-02 09:27:37.697 UTC [endorser] callChaincode -> INFO 074 [businesschannel][efe63c7a] Exit chaincode: name:"_lifecycle" (3ms)" +peer0.org2.example.com | "2019-05-02 09:27:37.698 UTC [comm.grpc.server] 1 -> INFO 075 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:59964 grpc.code=OK grpc.call_duration=4.4357ms +peer0.org2.example.com | "2019-05-02 09:27:41.447 UTC [gossip.privdata] StoreBlock -> INFO 076 [businesschannel] Received block [6] from buffer" +peer0.org2.example.com | "2019-05-02 09:27:41.450 UTC [committer.txvalidator] Validate -> INFO 077 [businesschannel] Validated block [6] in 2ms" +peer0.org2.example.com | "2019-05-02 09:27:41.477 UTC [kvledger] CommitWithPvtData -> INFO 078 [businesschannel] Committed block [6] with 1 transaction(s) in 24ms (state_validation=5ms block_commit=12ms state_commit=3ms)" +peer0.org2.example.com | "2019-05-02 09:27:47.023 UTC [gossip.privdata] StoreBlock -> INFO 079 [businesschannel] Received block [7] from buffer" +peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [chaincode] Start -> DEBU 0a4 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [chaincode] Start -> DEBU 0a5 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:2.0.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [container] lockContainer -> DEBU 0a6 waiting for container(cscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [container] lockContainer -> DEBU 0a7 got container (cscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [inproccontroller] getInstance -> DEBU 0a8 chaincode instance created for cscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [container] unlockContainer -> DEBU 0a9 container lock deleted(cscc:2.0.0)" +peer0.org1.example.com | "2019-05-02 09:27:09.107 UTC [container] lockContainer -> DEBU 0aa waiting for container(cscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.108 UTC [container] lockContainer -> DEBU 0ab got container (cscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.108 UTC [container] unlockContainer -> DEBU 0ac container lock deleted(cscc:2.0.0)" +peer0.org1.example.com | "2019-05-02 09:27:09.109 UTC [inproccontroller] func2 -> DEBU 0ad chaincode-support started for cscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.109 UTC [inproccontroller] func1 -> DEBU 0ae chaincode started for cscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.109 UTC [chaincode] handleMessage -> DEBU 0af [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-05-02 09:27:09.110 UTC [chaincode] HandleRegister -> DEBU 0b0 Received REGISTER in state created" +peer0.org1.example.com | "2019-05-02 09:27:09.110 UTC [chaincode] Register -> DEBU 0b1 registered handler complete for chaincode cscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.110 UTC [chaincode] HandleRegister -> DEBU 0b2 Got REGISTER for chaincodeID = name:"cscc:2.0.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-05-02 09:27:09.110 UTC [chaincode] HandleRegister -> DEBU 0b3 Changed state to established for name:"cscc:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.111 UTC [chaincode] sendReady -> DEBU 0b4 sending READY for chaincode name:"cscc:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] sendReady -> DEBU 0b5 Changed to state ready for chaincode name:"cscc:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] Launch -> DEBU 0b6 launch complete" +peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] Execute -> DEBU 0b7 Entry" +peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [cscc] Init -> INFO 0b8 Init CSCC" +peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] handleMessage -> DEBU 0b9 [93019833] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] Notify -> DEBU 0ba [93019833] notifying Txid:93019833-420f-4a87-a3e6-963973a4d596, channelID:" +peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [chaincode] Execute -> DEBU 0bb Exit" +peer0.org1.example.com | "2019-05-02 09:27:09.114 UTC [sccapi] deploySysCC -> INFO 0bc system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-05-02 09:27:09.100 UTC [container] lockContainer -> DEBU 0bd got container (lscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.115 UTC [container] unlockContainer -> DEBU 0be container lock deleted(lscc:2.0.0)" +peer0.org1.example.com | "2019-05-02 09:27:09.117 UTC [chaincode] LaunchConfig -> DEBU 0bf launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-05-02 09:27:09.117 UTC [chaincode] Start -> DEBU 0c0 start container: qscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.117 UTC [chaincode] Start -> DEBU 0c1 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-05-02 09:27:09.118 UTC [chaincode] Start -> DEBU 0c2 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:2.0.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-05-02 09:27:09.118 UTC [container] lockContainer -> DEBU 0c3 waiting for container(qscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.118 UTC [container] lockContainer -> DEBU 0c4 got container (qscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.118 UTC [inproccontroller] getInstance -> DEBU 0c5 chaincode instance created for qscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.119 UTC [inproccontroller] func2 -> DEBU 0c6 chaincode-support started for qscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [inproccontroller] func1 -> DEBU 0c7 chaincode started for qscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] handleMessage -> DEBU 0c8 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] HandleRegister -> DEBU 0c9 Received REGISTER in state created" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] Register -> DEBU 0ca registered handler complete for chaincode qscc:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] HandleRegister -> DEBU 0cb Got REGISTER for chaincodeID = name:"qscc:2.0.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] HandleRegister -> DEBU 0cc Changed state to established for name:"qscc:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] sendReady -> DEBU 0cd sending READY for chaincode name:"qscc:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] sendReady -> DEBU 0ce Changed to state ready for chaincode name:"qscc:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] Launch -> DEBU 0cf launch complete" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] Execute -> DEBU 0d0 Entry" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [qscc] Init -> INFO 0d1 Init QSCC" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] handleMessage -> DEBU 0d2 [fd716703] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] Notify -> DEBU 0d3 [fd716703] notifying Txid:fd716703-bf83-4d5f-9759-1f3a73295ec2, channelID:" +peer0.org1.example.com | "2019-05-02 09:27:09.131 UTC [chaincode] Execute -> DEBU 0d4 Exit" +peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [sccapi] deploySysCC -> INFO 0d5 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +orderer2.example.com | 2019-05-02 09:27:05.534 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +peer1.org2.example.com | "2019-05-02 09:27:23.046 UTC [gossip.service] func1 -> INFO 034 Elected as a leader, starting delivery service for channel businesschannel" +peer1.org2.example.com | "2019-05-02 09:27:23.086 UTC [gossip.privdata] StoreBlock -> INFO 035 [businesschannel] Received block [1] from buffer" +peer1.org2.example.com | "2019-05-02 09:27:23.103 UTC [gossip.gossip] JoinChan -> INFO 036 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-05-02 09:27:23.103 UTC [gossip.gossip] learnAnchorPeers -> INFO 037 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-05-02 09:27:23.103 UTC [gossip.gossip] learnAnchorPeers -> INFO 038 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-05-02 09:27:23.144 UTC [committer.txvalidator] Validate -> INFO 039 [businesschannel] Validated block [1] in 57ms" +peer1.org2.example.com | "2019-05-02 09:27:23.189 UTC [kvledger] CommitWithPvtData -> INFO 03a [businesschannel] Committed block [1] with 1 transaction(s) in 36ms (state_validation=5ms block_commit=14ms state_commit=5ms)" +peer1.org2.example.com | "2019-05-02 09:27:23.190 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [2] from buffer" +peer1.org2.example.com | "2019-05-02 09:27:23.219 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-05-02 09:27:23.220 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-05-02 09:27:23.220 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-05-02 09:27:23.235 UTC [committer.txvalidator] Validate -> INFO 03f [businesschannel] Validated block [2] in 44ms" +peer1.org2.example.com | "2019-05-02 09:27:23.257 UTC [gossip.comm] func1 -> WARN 040 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org2.example.com | "2019-05-02 09:27:23.258 UTC [gossip.discovery] expireDeadMembers -> WARN 041 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org2.example.com | "2019-05-02 09:27:23.258 UTC [gossip.discovery] expireDeadMembers -> WARN 042 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org2.example.com | "2019-05-02 09:27:23.258 UTC [gossip.discovery] expireDeadMembers -> WARN 043 Exiting" +peer1.org2.example.com | "2019-05-02 09:27:23.280 UTC [kvledger] CommitWithPvtData -> INFO 044 [businesschannel] Committed block [2] with 1 transaction(s) in 44ms (state_validation=20ms block_commit=16ms state_commit=4ms)" +peer1.org2.example.com | "2019-05-02 09:27:23.885 UTC [comm.grpc.server] 1 -> INFO 045 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.885Z grpc.peer_address=172.18.0.7:37050 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.3µs +peer1.org2.example.com | "2019-05-02 09:27:24.560 UTC [gossip.gossip] validateMsg -> WARN 046 StateInfo message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789242496119500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found" +peer1.org2.example.com | "2019-05-02 09:27:24.560 UTC [gossip.gossip] handleMessage -> WARN 047 Message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789242496119500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes isn't valid" +peer1.org2.example.com | "2019-05-02 09:27:27.015 UTC [gossip.channel] reportMembershipChanges -> INFO 048 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]]" +peer1.org2.example.com | "2019-05-02 09:27:27.252 UTC [endorser] callChaincode -> INFO 049 [][35ec9214] Entry chaincode: name:"_lifecycle" " +peer1.org2.example.com | "2019-05-02 09:27:27.254 UTC [endorser] callChaincode -> INFO 04a [][35ec9214] Exit chaincode: name:"_lifecycle" (1ms)" +peer1.org2.example.com | "2019-05-02 09:27:27.255 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41240 grpc.code=OK grpc.call_duration=3.1298ms +peer1.org2.example.com | "2019-05-02 09:27:27.823 UTC [gossip.election] stopBeingLeader -> INFO 04c 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd Stopped being a leader" +peer1.org2.example.com | "2019-05-02 09:27:27.823 UTC [gossip.service] func1 -> INFO 04d Renounced leadership, stopping delivery service for channel businesschannel" +peer1.org2.example.com | "2019-05-02 09:27:27.824 UTC [deliveryClient] try -> WARN 04e Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s" +peer1.org2.example.com | "2019-05-02 09:27:27.827 UTC [blocksProvider] DeliverBlocks -> WARN 04f [businesschannel] Receive error: client is closing" +peer1.org2.example.com | "2019-05-02 09:27:30.007 UTC [gossip.privdata] StoreBlock -> INFO 050 [businesschannel] Received block [3] from buffer" +peer1.org2.example.com | "2019-05-02 09:27:30.010 UTC [committer.txvalidator] Validate -> INFO 051 [businesschannel] Validated block [3] in 2ms" +peer1.org2.example.com | "2019-05-02 09:27:30.020 UTC [confighistory] HandleStateUpdates -> ERRO 052 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0033e8a00)}" +peer1.org2.example.com | "2019-05-02 09:27:30.102 UTC [kvledger] CommitWithPvtData -> INFO 053 [businesschannel] Committed block [3] with 1 transaction(s) in 83ms (state_validation=0ms block_commit=58ms state_commit=11ms)" +peer1.org2.example.com | "2019-05-02 09:27:32.016 UTC [gossip.channel] reportMembershipChanges -> INFO 054 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-05-02 09:27:32.516 UTC [gossip.privdata] StoreBlock -> INFO 055 [businesschannel] Received block [4] from buffer" +peer1.org2.example.com | "2019-05-02 09:27:32.527 UTC [committer.txvalidator] Validate -> INFO 056 [businesschannel] Validated block [4] in 11ms" +peer1.org2.example.com | "2019-05-02 09:27:32.581 UTC [gossip.privdata] StoreBlock -> INFO 057 [businesschannel] Fetched all missing collection private write sets from remote peers for block [4] (18ms)" +peer0.org2.example.com | "2019-05-02 09:27:47.027 UTC [committer.txvalidator] Validate -> INFO 07a [businesschannel] Validated block [7] in 3ms" +peer0.org2.example.com | "2019-05-02 09:27:47.062 UTC [kvledger] CommitWithPvtData -> INFO 07b [businesschannel] Committed block [7] with 1 transaction(s) in 33ms (state_validation=0ms block_commit=25ms state_commit=4ms)" +peer0.org2.example.com | "2019-05-02 09:27:49.806 UTC [gossip.privdata] StoreBlock -> INFO 07c [businesschannel] Received block [8] from buffer" +peer0.org2.example.com | "2019-05-02 09:27:49.816 UTC [committer.txvalidator] Validate -> INFO 07d [businesschannel] Validated block [8] in 9ms" +peer0.org2.example.com | "2019-05-02 09:27:49.839 UTC [kvledger] CommitWithPvtData -> INFO 07e [businesschannel] Committed block [8] with 1 transaction(s) in 22ms (state_validation=1ms block_commit=13ms state_commit=2ms)" +peer0.org2.example.com | "2019-05-02 09:28:04.070 UTC [gossip.privdata] StoreBlock -> INFO 07f [businesschannel] Received block [9] from buffer" +peer0.org2.example.com | "2019-05-02 09:28:04.115 UTC [cauthdsl] deduplicate -> WARN 080 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-05-02 09:28:04.116 UTC [cauthdsl] deduplicate -> WARN 081 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-05-02 09:28:04.206 UTC [comm.grpc.server] 1 -> INFO 082 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.196Z grpc.peer_address=172.18.0.5:35936 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=277.8µs +peer0.org2.example.com | "2019-05-02 09:28:04.228 UTC [comm.grpc.server] 1 -> INFO 083 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:35768 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=40.9924319s +peer0.org2.example.com | "2019-05-02 09:28:04.234 UTC [comm.grpc.server] 1 -> INFO 084 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.216Z grpc.peer_address=172.18.0.5:35936 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=16.5782ms +peer0.org2.example.com | "2019-05-02 09:28:04.274 UTC [comm.grpc.server] 1 -> INFO 085 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.272Z grpc.peer_address=172.18.0.7:51664 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=126.6µs +peer0.org2.example.com | "2019-05-02 09:28:04.286 UTC [gossip.gossip] JoinChan -> INFO 086 Joining gossip network of channel businesschannel with 3 organizations" +peer0.org2.example.com | "2019-05-02 09:28:04.290 UTC [gossip.gossip] learnAnchorPeers -> INFO 087 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-05-02 09:28:04.292 UTC [gossip.gossip] learnAnchorPeers -> INFO 088 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-05-02 09:28:04.294 UTC [gossip.gossip] learnAnchorPeers -> INFO 089 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-05-02 09:28:04.295 UTC [gossip.gossip] learnAnchorPeers -> INFO 08a Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-05-02 09:28:04.318 UTC [committer.txvalidator] Validate -> INFO 08b [businesschannel] Validated block [9] in 248ms" +peer0.org2.example.com | "2019-05-02 09:28:04.319 UTC [comm.grpc.server] 1 -> INFO 08c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.318Z grpc.peer_address=172.18.0.6:47352 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=146.7µs +peer0.org2.example.com | "2019-05-02 09:28:04.352 UTC [kvledger] CommitWithPvtData -> INFO 08d [businesschannel] Committed block [9] with 1 transaction(s) in 33ms (state_validation=2ms block_commit=19ms state_commit=6ms)" +peer0.org2.example.com | "2019-05-02 09:28:04.357 UTC [comm.grpc.server] 1 -> INFO 08e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.33Z grpc.peer_address=172.18.0.6:47352 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=26.6297ms +peer0.org2.example.com | "2019-05-02 09:28:04.356 UTC [comm.grpc.server] 1 -> INFO 08f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:47152 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=41.88781s +peer0.org2.example.com | "2019-05-02 09:28:04.407 UTC [comm.grpc.server] 1 -> INFO 090 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.406Z grpc.peer_address=172.18.0.7:51672 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=142.2µs +peer0.org2.example.com | "2019-05-02 09:28:04.417 UTC [comm.grpc.server] 1 -> INFO 091 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.28Z grpc.peer_address=172.18.0.7:51664 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=136.8887ms +peer0.org2.example.com | "2019-05-02 09:28:18.574 UTC [endorser] callChaincode -> INFO 092 [][fbe1b497] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-05-02 09:28:18.575 UTC [endorser] callChaincode -> INFO 093 [][fbe1b497] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-05-02 09:28:18.576 UTC [comm.grpc.server] 1 -> INFO 094 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:60124 grpc.code=OK grpc.call_duration=2.4152ms +peer0.org2.example.com | "2019-05-02 09:28:19.797 UTC [endorser] callChaincode -> INFO 095 [][0790d864] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-05-02 09:28:19.800 UTC [endorser] callChaincode -> INFO 096 [][0790d864] Exit chaincode: name:"qscc" (2ms)" +peer0.org2.example.com | "2019-05-02 09:28:19.800 UTC [comm.grpc.server] 1 -> INFO 097 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:60132 grpc.code=OK grpc.call_duration=3.55ms +peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [chaincode] LaunchConfig -> DEBU 0d6 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [chaincode] Start -> DEBU 0d7 start container: _lifecycle:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [chaincode] Start -> DEBU 0d8 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [chaincode] Start -> DEBU 0d9 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-05-02 09:27:09.119 UTC [container] unlockContainer -> DEBU 0da container lock deleted(qscc:2.0.0)" +peer0.org1.example.com | "2019-05-02 09:27:09.132 UTC [container] lockContainer -> DEBU 0db waiting for container(qscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0dc got container (qscc:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] unlockContainer -> DEBU 0dd container lock deleted(qscc:2.0.0)" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0de waiting for container(_lifecycle:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0df got container (_lifecycle:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [inproccontroller] getInstance -> DEBU 0e0 chaincode instance created for _lifecycle:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] unlockContainer -> DEBU 0e1 container lock deleted(_lifecycle:2.0.0)" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0e2 waiting for container(_lifecycle:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0e3 got container (_lifecycle:2.0.0) lock" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [container] unlockContainer -> DEBU 0e4 container lock deleted(_lifecycle:2.0.0)" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [inproccontroller] func2 -> DEBU 0e5 chaincode-support started for _lifecycle:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [inproccontroller] func1 -> DEBU 0e6 chaincode started for _lifecycle:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] handleMessage -> DEBU 0e7 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] HandleRegister -> DEBU 0e8 Received REGISTER in state created" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] Register -> DEBU 0e9 registered handler complete for chaincode _lifecycle:2.0.0" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] HandleRegister -> DEBU 0ea Got REGISTER for chaincodeID = name:"_lifecycle:2.0.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] HandleRegister -> DEBU 0eb Changed state to established for name:"_lifecycle:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] sendReady -> DEBU 0ec sending READY for chaincode name:"_lifecycle:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.133 UTC [chaincode] sendReady -> DEBU 0ed Changed to state ready for chaincode name:"_lifecycle:2.0.0" " +peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [chaincode] Launch -> DEBU 0ee launch complete" +peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [chaincode] Execute -> DEBU 0ef Entry" +peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [chaincode] handleMessage -> DEBU 0f0 [408a31a2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [chaincode] Notify -> DEBU 0f1 [408a31a2] notifying Txid:408a31a2-2689-4f2c-a170-7afbe11d589d, channelID:" +peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [chaincode] Execute -> DEBU 0f2 Exit" +peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [sccapi] deploySysCC -> INFO 0f3 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [nodeCmd] serve -> INFO 0f4 Deployed system chaincodes" +peer0.org1.example.com | "2019-05-02 09:27:09.134 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0f5 Returning []" +peer0.org1.example.com | "2019-05-02 09:27:09.135 UTC [discovery] NewService -> INFO 0f6 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org1.example.com | "2019-05-02 09:27:09.135 UTC [nodeCmd] registerDiscoveryService -> INFO 0f7 Discovery service activated" +peer0.org1.example.com | "2019-05-02 09:27:09.135 UTC [nodeCmd] serve -> INFO 0f8 Starting peer with ID=[peer0.org1.example.com], network ID=[], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-05-02 09:27:09.135 UTC [nodeCmd] serve -> INFO 0f9 Started peer with ID=[peer0.org1.example.com], network ID=[], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-05-02 09:27:09.158 UTC [comm.grpc.server] 1 -> INFO 0fa unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:11.156Z grpc.peer_address=172.18.0.6:53162 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=359.2µs +peer0.org1.example.com | "2019-05-02 09:27:09.161 UTC [msp.identity] Sign -> DEBU 0fb Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:09.162 UTC [msp.identity] Sign -> DEBU 0fc Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:09.162 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0fd Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53162" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2019-05-02 09:27:06.279 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing chains" +orderer1.example.com | "2019-05-02 09:27:06.322 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer1.example.com | "2019-05-02 09:27:06.322 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer1.example.com | "2019-05-02 09:27:06.327 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" +orderer1.example.com | "2019-05-02 09:27:06.423 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-05-02 09:27:06.423 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:06.462 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 90f35bf665ccb03902ab1f08bd901cde6bcd74d9da8fbbbade4c4b31cd280378 and orderer type etcdraft" +orderer1.example.com | "2019-05-02 09:27:06.462 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:06.462 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | "2019-05-02 09:27:05.594 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer2.example.com | General.LedgerType = "file" +orderer2.example.com | General.ListenAddress = "0.0.0.0" +orderer2.example.com | General.ListenPort = 7050 +orderer2.example.com | General.TLS.Enabled = true +orderer2.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.TLS.ClientAuthRequired = false +orderer2.example.com | General.TLS.ClientRootCAs = [] +orderer2.example.com | General.Cluster.ListenAddress = "" +orderer2.example.com | General.Cluster.ListenPort = 0 +orderer2.example.com | General.Cluster.ServerCertificate = "" +orderer2.example.com | General.Cluster.ServerPrivateKey = "" +orderer2.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.Cluster.RootCAs = [] +orderer2.example.com | General.Cluster.DialTimeout = 5s +orderer2.example.com | General.Cluster.RPCTimeout = 7s +orderer2.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer2.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer2.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer2.example.com | General.Cluster.SendBufferSize = 10 +orderer2.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer2.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer2.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer2.example.com | General.Keepalive.ServerTimeout = 20s +orderer2.example.com | General.GenesisMethod = "file" +orderer2.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer2.example.com | General.SystemChannel = "test-system-channel-name" +orderer2.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer2.example.com | General.Profile.Enabled = false +orderer2.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer2.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer2.example.com | General.LocalMSPID = "OrdererMSP" +orderer2.example.com | General.BCCSP.ProviderName = "SW" +orderer2.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer2.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer2.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer2.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer2.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer2.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer2.example.com | General.BCCSP.PluginOpts = +orderer2.example.com | General.Authentication.TimeWindow = 15m0s +orderer2.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer2.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +peer1.org2.example.com | "2019-05-02 09:27:32.584 UTC [confighistory] HandleStateUpdates -> ERRO 058 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0034daba0)}" +peer1.org2.example.com | "2019-05-02 09:27:32.609 UTC [kvledger] CommitWithPvtData -> INFO 059 [businesschannel] Committed block [4] with 1 transaction(s) in 27ms (state_validation=2ms block_commit=19ms state_commit=3ms)" +peer1.org2.example.com | "2019-05-02 09:27:36.885 UTC [gossip.privdata] StoreBlock -> INFO 05a [businesschannel] Received block [5] from buffer" +peer1.org2.example.com | "2019-05-02 09:27:36.890 UTC [committer.txvalidator] Validate -> INFO 05b [businesschannel] Validated block [5] in 4ms" +peer1.org2.example.com | "2019-05-02 09:27:36.901 UTC [lifecycle] update -> INFO 05c Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer1.org2.example.com | "2019-05-02 09:27:36.902 UTC [lifecycle] update -> INFO 05d Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org2.example.com | "2019-05-02 09:27:36.902 UTC [cceventmgmt] HandleStateUpdates -> INFO 05e Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org2.example.com | "2019-05-02 09:27:36.902 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 05f Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org2.example.com | "2019-05-02 09:27:36.903 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 060 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org2.example.com | "2019-05-02 09:27:36.931 UTC [kvledger] CommitWithPvtData -> INFO 061 [businesschannel] Committed block [5] with 1 transaction(s) in 31ms (state_validation=6ms block_commit=16ms state_commit=4ms)" +peer1.org2.example.com | "2019-05-02 09:27:41.450 UTC [gossip.privdata] StoreBlock -> INFO 062 [businesschannel] Received block [6] from buffer" +peer1.org2.example.com | "2019-05-02 09:27:41.453 UTC [committer.txvalidator] Validate -> INFO 063 [businesschannel] Validated block [6] in 3ms" +peer1.org2.example.com | "2019-05-02 09:27:41.481 UTC [kvledger] CommitWithPvtData -> INFO 064 [businesschannel] Committed block [6] with 1 transaction(s) in 25ms (state_validation=0ms block_commit=16ms state_commit=5ms)" +peer1.org2.example.com | "2019-05-02 09:27:47.035 UTC [gossip.privdata] StoreBlock -> INFO 065 [businesschannel] Received block [7] from buffer" +peer1.org2.example.com | "2019-05-02 09:27:47.038 UTC [committer.txvalidator] Validate -> INFO 066 [businesschannel] Validated block [7] in 3ms" +peer1.org2.example.com | "2019-05-02 09:27:47.059 UTC [kvledger] CommitWithPvtData -> INFO 067 [businesschannel] Committed block [7] with 1 transaction(s) in 19ms (state_validation=0ms block_commit=12ms state_commit=3ms)" +peer1.org2.example.com | "2019-05-02 09:27:49.828 UTC [gossip.privdata] StoreBlock -> INFO 068 [businesschannel] Received block [8] from buffer" +peer1.org2.example.com | "2019-05-02 09:27:49.838 UTC [committer.txvalidator] Validate -> INFO 069 [businesschannel] Validated block [8] in 8ms" +peer1.org2.example.com | "2019-05-02 09:27:49.859 UTC [kvledger] CommitWithPvtData -> INFO 06a [businesschannel] Committed block [8] with 1 transaction(s) in 20ms (state_validation=0ms block_commit=15ms state_commit=2ms)" +peer1.org2.example.com | "2019-05-02 09:28:04.085 UTC [gossip.privdata] StoreBlock -> INFO 06b [businesschannel] Received block [9] from buffer" +peer1.org2.example.com | "2019-05-02 09:28:04.087 UTC [cauthdsl] deduplicate -> WARN 06c De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-05-02 09:28:04.088 UTC [cauthdsl] deduplicate -> WARN 06d De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-05-02 09:28:04.130 UTC [gossip.gossip] JoinChan -> INFO 06e Joining gossip network of channel businesschannel with 3 organizations" +peer1.org2.example.com | "2019-05-02 09:28:04.130 UTC [gossip.gossip] learnAnchorPeers -> INFO 06f No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-05-02 09:28:04.130 UTC [gossip.gossip] learnAnchorPeers -> INFO 070 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-05-02 09:28:04.136 UTC [gossip.gossip] learnAnchorPeers -> INFO 071 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-05-02 09:28:04.136 UTC [gossip.service] updateEndpoints -> WARN 072 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-05-02 09:28:04.161 UTC [committer.txvalidator] Validate -> INFO 073 [businesschannel] Validated block [9] in 76ms" +peer1.org2.example.com | "2019-05-02 09:28:04.199 UTC [kvledger] CommitWithPvtData -> INFO 074 [businesschannel] Committed block [9] with 1 transaction(s) in 37ms (state_validation=1ms block_commit=26ms state_commit=5ms)" +peer1.org2.example.com | "2019-05-02 09:28:04.437 UTC [comm.grpc.server] 1 -> INFO 075 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:37050 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=40.5856739s +peer1.org2.example.com | "2019-05-02 09:28:04.448 UTC [comm.grpc.server] 1 -> INFO 076 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.447Z grpc.peer_address=172.18.0.7:37228 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=118µs +peer1.org2.example.com | "2019-05-02 09:28:04.519 UTC [gossip.comm] func1 -> WARN 077 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org2.example.com | "2019-05-02 09:28:04.519 UTC [gossip.discovery] expireDeadMembers -> WARN 078 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org2.example.com | "2019-05-02 09:28:04.520 UTC [gossip.discovery] expireDeadMembers -> WARN 079 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org2.example.com | "2019-05-02 09:28:04.520 UTC [gossip.discovery] expireDeadMembers -> WARN 07a Exiting" +peer1.org2.example.com | "2019-05-02 09:28:04.557 UTC [comm.grpc.server] 1 -> INFO 07b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.557Z grpc.peer_address=172.18.0.9:40678 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=160.3µs +peer1.org2.example.com | "2019-05-02 09:28:18.755 UTC [endorser] callChaincode -> INFO 07c [][f175b5d1] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-05-02 09:28:18.757 UTC [endorser] callChaincode -> INFO 07d [][f175b5d1] Exit chaincode: name:"cscc" (2ms)" +peer1.org2.example.com | "2019-05-02 09:28:18.757 UTC [comm.grpc.server] 1 -> INFO 07e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41454 grpc.code=OK grpc.call_duration=3.7607ms +peer1.org2.example.com | "2019-05-02 09:28:19.991 UTC [endorser] callChaincode -> INFO 07f [][6b2b9aca] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-05-02 09:28:19.994 UTC [endorser] callChaincode -> INFO 080 [][6b2b9aca] Exit chaincode: name:"qscc" (2ms)" +peer1.org2.example.com | "2019-05-02 09:28:19.994 UTC [comm.grpc.server] 1 -> INFO 081 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:41462 grpc.code=OK grpc.call_duration=3.5867ms +peer0.org1.example.com | "2019-05-02 09:27:09.163 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0fe Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53162" +peer0.org1.example.com | "2019-05-02 09:27:09.163 UTC [msp] DeserializeIdentity -> DEBU 0ff Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:09.165 UTC [msp.identity] newIdentity -> DEBU 100 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:09.166 UTC [msp] Validate -> DEBU 101 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:09.169 UTC [msp.identity] Verify -> DEBU 102 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-05-02 09:27:09.170 UTC [msp.identity] Verify -> DEBU 103 Verify: sig = 00000000 30 44 02 20 2f 10 db 70 91 60 35 8b 4e 58 4a e5 |0D. /..p.`5.NXJ.| +peer0.org1.example.com | 00000010 90 69 22 ed 77 7a 7e 5d 36 3b c6 ec b9 31 47 41 |.i".wz~]6;...1GA| +peer0.org1.example.com | 00000020 0f a8 00 41 02 20 13 db 80 56 45 9d 59 80 4c 67 |...A. ...VE.Y.Lg| +peer0.org1.example.com | 00000030 37 52 0e 54 7d b7 70 c5 22 f4 db 8a 54 18 e4 b9 |7R.T}.p."...T...| +peer0.org1.example.com | 00000040 c1 e7 5d fe e7 dd |..]...|" +peer0.org1.example.com | "2019-05-02 09:27:09.171 UTC [gossip.comm] authenticateRemotePeer -> DEBU 104 Authenticated 172.18.0.6:53162" +peer0.org1.example.com | "2019-05-02 09:27:09.172 UTC [gossip.comm] GossipStream -> DEBU 105 Servicing 172.18.0.6:53162" +peer0.org1.example.com | "2019-05-02 09:27:09.174 UTC [gossip.comm] readFromStream -> DEBU 106 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-05-02 09:27:09.174 UTC [gossip.comm] func2 -> DEBU 107 Client 172.18.0.6:53162 disconnected" +peer0.org1.example.com | "2019-05-02 09:27:09.174 UTC [comm.grpc.server] 1 -> INFO 108 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:19.161Z grpc.peer_address=172.18.0.6:53162 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.0584ms +peer0.org1.example.com | "2019-05-02 09:27:09.175 UTC [gossip.comm] writeToStream -> DEBU 109 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:27:09.177 UTC [grpc] infof -> DEBU 10a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:09.190 UTC [comm.grpc.server] 1 -> INFO 10b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:11.19Z grpc.peer_address=172.18.0.6:53164 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=131.7µs +peer0.org1.example.com | "2019-05-02 09:27:09.192 UTC [msp.identity] Sign -> DEBU 10c Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:09.192 UTC [msp.identity] Sign -> DEBU 10d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:09.193 UTC [gossip.comm] authenticateRemotePeer -> DEBU 10e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:53164" +peer0.org1.example.com | "2019-05-02 09:27:09.194 UTC [gossip.comm] authenticateRemotePeer -> DEBU 10f Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53164" +peer0.org1.example.com | "2019-05-02 09:27:09.195 UTC [msp.identity] Verify -> DEBU 110 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-05-02 09:27:09.195 UTC [msp.identity] Verify -> DEBU 111 Verify: sig = 00000000 30 45 02 21 00 f4 4d be bf 97 d6 a3 ee c0 c3 d5 |0E.!..M.........| +peer0.org1.example.com | 00000010 26 4d 50 d1 6c 15 49 87 b3 e3 fb f8 2a 4e 9b d2 |&MP.l.I.....*N..| +peer0.org1.example.com | 00000020 2c 29 6e 12 fd 02 20 04 2e 24 e6 ff 7d a8 7d ef |,)n... ..$..}.}.| +peer0.org1.example.com | 00000030 f6 a3 2e f5 f7 88 73 ee c9 03 17 0f ec 5a 20 67 |......s......Z g| +peer0.org1.example.com | 00000040 e2 4e 65 97 86 59 e9 |.Ne..Y.|" +peer0.org1.example.com | "2019-05-02 09:27:09.196 UTC [gossip.comm] authenticateRemotePeer -> DEBU 112 Authenticated 172.18.0.6:53164" +peer0.org1.example.com | "2019-05-02 09:27:09.196 UTC [gossip.comm] GossipStream -> DEBU 113 Servicing 172.18.0.6:53164" +orderer2.example.com | RAMLedger.HistorySize = 1000 +orderer2.example.com | Kafka.Retry.ShortInterval = 5s +orderer2.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer2.example.com | Kafka.Retry.LongInterval = 5m0s +orderer2.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer2.example.com | Kafka.Verbose = false +orderer2.example.com | Kafka.Version = 0.10.2.0 +orderer2.example.com | Kafka.TLS.Enabled = false +orderer2.example.com | Kafka.TLS.PrivateKey = "" +orderer2.example.com | Kafka.TLS.Certificate = "" +orderer2.example.com | Kafka.TLS.RootCAs = [] +orderer2.example.com | Kafka.TLS.ClientAuthRequired = false +orderer2.example.com | Kafka.TLS.ClientRootCAs = [] +orderer2.example.com | Kafka.SASLPlain.Enabled = false +orderer2.example.com | Kafka.SASLPlain.User = "" +orderer2.example.com | Kafka.SASLPlain.Password = "" +orderer2.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer2.example.com | Debug.BroadcastTraceDir = "" +orderer2.example.com | Debug.DeliverTraceDir = "" +orderer2.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer2.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer2.example.com | Operations.TLS.Enabled = false +orderer2.example.com | Operations.TLS.PrivateKey = "" +orderer2.example.com | Operations.TLS.Certificate = "" +orderer2.example.com | Operations.TLS.RootCAs = [] +orderer2.example.com | Operations.TLS.ClientAuthRequired = false +orderer2.example.com | Operations.TLS.ClientRootCAs = [] +orderer2.example.com | Metrics.Provider = "prometheus" +orderer2.example.com | Metrics.Statsd.Network = "udp" +orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer2.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer2.example.com | Metrics.Statsd.Prefix = """ +orderer2.example.com | "2019-05-02 09:27:05.624 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing chains" +orderer2.example.com | "2019-05-02 09:27:05.663 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer2.example.com | "2019-05-02 09:27:05.664 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer2.example.com | "2019-05-02 09:27:05.667 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" +orderer2.example.com | "2019-05-02 09:27:05.720 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2019-05-02 09:27:05.721 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:05.741 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 90f35bf665ccb03902ab1f08bd901cde6bcd74d9da8fbbbade4c4b31cd280378 and orderer type etcdraft" +orderer2.example.com | "2019-05-02 09:27:05.741 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:05.741 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2019-05-02 09:27:05.741 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-05-02 09:27:05.741 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" +orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 3 became follower at term 0" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:05.742 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 3 became follower at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:05.743 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: +orderer2.example.com | Version: 2.0.0 +orderer2.example.com | Commit SHA: development build +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-05-02 09:27:06.462 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-05-02 09:27:06.463 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-05-02 09:27:06.463 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-05-02 09:27:06.463 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-05-02 09:27:06.484 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-05-02 09:27:06.484 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-05-02 09:27:06.484 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" +orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 2 became follower at term 0" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 2 became follower at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: +orderer1.example.com | Version: 2.0.0 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.12.4 +orderer1.example.com | OS/Arch: linux/amd64" +orderer1.example.com | "2019-05-02 09:27:06.485 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" +orderer1.example.com | "2019-05-02 09:27:06.492 UTC [orderer.consensus.etcdraft] apply -> INFO 019 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 +peer0.org1.example.com | "2019-05-02 09:27:09.200 UTC [gossip.gossip] handleMessage -> DEBU 114 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1109 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:09.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 115 Got message: GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1109 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:09.200 UTC [gossip.gossip] handleMessage -> DEBU 116 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:09.202 UTC [msp.identity] Verify -> DEBU 117 Verify: digest = 00000000 c9 f0 7e c3 11 0e 51 a1 50 82 0d 6c 29 57 ab 41 |..~...Q.P..l)W.A| +peer0.org1.example.com | 00000010 27 de 01 d4 b2 04 63 b5 94 ff d0 99 fe 20 4b 6d |'.....c...... Km|" +peer0.org1.example.com | "2019-05-02 09:27:09.202 UTC [msp.identity] Verify -> DEBU 118 Verify: sig = 00000000 30 44 02 20 03 e4 68 96 38 3b fa 14 de ac 73 11 |0D. ..h.8;....s.| +peer0.org1.example.com | 00000010 ff cb 36 26 cb f1 55 b9 0b 12 a4 f1 d1 cb 36 e8 |..6&..U.......6.| +peer0.org1.example.com | 00000020 20 ff dc 72 02 20 25 6e ac 7a 5c 78 45 fd c6 b8 | ..r. %n.z\xE...| +peer0.org1.example.com | 00000030 94 02 b5 ea da 7f c9 23 2a 48 81 10 a3 2e 75 ec |.......#*H....u.| +peer0.org1.example.com | 00000040 6d 48 39 8f c9 2d |mH9..-|" +peer0.org1.example.com | "2019-05-02 09:27:09.203 UTC [msp.identity] Verify -> DEBU 119 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:09.203 UTC [msp.identity] Verify -> DEBU 11a Verify: sig = 00000000 30 45 02 21 00 83 e8 b0 ba d6 d1 78 86 78 ba 69 |0E.!.......x.x.i| +peer0.org1.example.com | 00000010 53 41 10 2a e4 5f b8 d7 9b 5b 30 a8 47 57 82 e0 |SA.*._...[0.GW..| +peer0.org1.example.com | 00000020 b0 67 97 d1 98 02 20 13 35 0e cb 19 d0 b9 de 1e |.g.... .5.......| +peer0.org1.example.com | 00000030 6f 77 81 2d 29 ef b8 9a 24 1f 8c c1 0e 4e 16 09 |ow.-)...$....N..| +peer0.org1.example.com | 00000040 0d 1e 76 0c 8b 3c 55 |..v.. DEBU 11b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +orderer2.example.com | Go version: go1.12.4 +orderer2.example.com | OS/Arch: linux/amd64" +orderer2.example.com | "2019-05-02 09:27:05.743 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" +orderer2.example.com | "2019-05-02 09:27:05.743 UTC [orderer.consensus.etcdraft] run -> INFO 019 This node is picked to start campaign" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:05.747 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:05.747 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:05.747 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:06.743 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 3 is starting a new election at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:06.743 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01e 3 became pre-candidate at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:06.743 UTC [orderer.consensus.etcdraft] poll -> INFO 01f 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:06.744 UTC [orderer.consensus.etcdraft] campaign -> INFO 020 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:06.744 UTC [orderer.consensus.etcdraft] campaign -> INFO 021 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:06.744 UTC [orderer.consensus.etcdraft] logSendFailure -> ERRO 022 Failed to send StepRequest to 1, because: rpc error: code = Unavailable desc = all SubConns are in TransientFailure, latest connection error: connection error: desc = "transport: Error while dialing dial tcp 172.18.0.2:7050: connect: connection refused"" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:06.744 UTC [orderer.consensus.etcdraft] logSendFailure -> ERRO 023 Failed to send StepRequest to 2, because: rpc error: code = Unavailable desc = all SubConns are in TransientFailure, latest connection error: connection error: desc = "transport: Error while dialing dial tcp 172.18.0.4:7050: connect: connection refused"" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.743 UTC [orderer.consensus.etcdraft] Step -> INFO 024 3 is starting a new election at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.743 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 025 3 became pre-candidate at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.743 UTC [orderer.consensus.etcdraft] poll -> INFO 026 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.743 UTC [orderer.consensus.etcdraft] campaign -> INFO 027 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.743 UTC [orderer.consensus.etcdraft] campaign -> INFO 028 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.744 UTC [orderer.consensus.etcdraft] send -> INFO 029 Successfully sent StepRequest to 1 after failed attempt(s)" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.744 UTC [orderer.consensus.etcdraft] send -> INFO 02a Successfully sent StepRequest to 2 after failed attempt(s)" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] poll -> INFO 02b 3 received MsgPreVoteResp from 2 at term 1" channel=testchainid node=3 +orderer0.example.com | 2019-05-02 09:27:05.875 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for metrics +orderer0.example.com | 2019-05-02 09:27:05.875 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for metrics.Statsd +orderer0.example.com | 2019-05-02 09:27:05.877 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value is not a string: +orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 02c 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 02d 3 became candidate at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] poll -> INFO 02e 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] campaign -> INFO 02f 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.748 UTC [orderer.consensus.etcdraft] campaign -> INFO 030 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.753 UTC [orderer.consensus.etcdraft] poll -> INFO 031 3 received MsgVoteResp from 1 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.754 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 032 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.754 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 033 3 became leader at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.754 UTC [orderer.consensus.etcdraft] run -> INFO 034 raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.755 UTC [orderer.consensus.etcdraft] run -> INFO 035 Leader 3 is present, quit campaign" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.755 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 036 Raft leader changed: 0 -> 3" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:07.761 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 037 Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:14.313 UTC [orderer.consensus.etcdraft] propose -> INFO 038 Created block [1], there are 0 blocks in flight" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:14.313 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 039 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:14.324 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03a Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 +orderer2.example.com | "2019-05-02 09:27:14.367 UTC [fsblkstorage] newBlockfileMgr -> INFO 03b Getting block information from block storage" +orderer2.example.com | "2019-05-02 09:27:14.383 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 03c EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2019-05-02 09:27:14.385 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 03d No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:14.414 UTC [orderer.commmon.multichannel] newChain -> INFO 03e Created and starting new chain businesschannel" +orderer2.example.com | "2019-05-02 09:27:14.414 UTC [orderer.consensus.etcdraft] Start -> INFO 03f Starting Raft node" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:14.414 UTC [orderer.common.cluster] Configure -> INFO 040 Entering, channel: businesschannel, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | 2019-05-02 09:27:05.878 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for metrics.Statsd.Prefix setting to +orderer0.example.com | 2019-05-02 09:27:05.878 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.878 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for metrics.Statsd.Network setting to string udp +orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for metrics.Statsd.WriteInterval setting to string 30s +orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for metrics.Provider setting to string prometheus +orderer0.example.com | 2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 00d Found map[interface{}]interface{} value for consensus +orderer0.example.com | 2019-05-02 09:27:05.880 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.880 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +orderer0.example.com | 2019-05-02 09:27:05.881 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.881 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +orderer0.example.com | 2019-05-02 09:27:05.889 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[interface{}]interface{} value for general +orderer0.example.com | 2019-05-02 09:27:05.898 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for general.Cluster +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for general.Cluster.ServerPrivateKey setting to +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: 10 +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for general.Cluster.SendBufferSize setting to int 10 +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for general.Cluster.ListenPort setting to +orderer0.example.com | 2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for general.Cluster.ListenAddress setting to +orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 020 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 021 Found real value for general.Cluster.ServerCertificate setting to +orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 022 Found map[string]interface{} value for general.Profile +orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.Profile.Enabled setting to bool false +orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.LocalMSPID setting to string OrdererMSP +orderer0.example.com | 2019-05-02 09:27:05.901 UTC [viperutil] getKeysRecursively -> DEBU 029 Found map[string]interface{} value for general.BCCSP +orderer0.example.com | 2019-05-02 09:27:05.901 UTC [viperutil] getKeysRecursively -> DEBU 02a Found map[string]interface{} value for general.BCCSP.SW +orderer0.example.com | 2019-05-02 09:27:05.901 UTC [viperutil] unmarshalJSON -> DEBU 02b Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.901 UTC [viperutil] getKeysRecursively -> DEBU 02c Found real value for general.BCCSP.SW.Hash setting to string SHA2 +orderer0.example.com | 2019-05-02 09:27:05.902 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value is not a string: 256 +orderer0.example.com | 2019-05-02 09:27:05.904 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.BCCSP.SW.Security setting to int 256 +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 02f Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 030 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 031 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.BCCSP.Default setting to string SW +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.LedgerType setting to string file +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +orderer1.example.com | "2019-05-02 09:27:06.492 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:06.492 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:07.745 UTC [orderer.consensus.etcdraft] Step -> INFO 01c 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:07.751 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:07.751 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01e 2 became follower at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:07.751 UTC [orderer.consensus.etcdraft] Step -> INFO 01f 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:07.756 UTC [orderer.consensus.etcdraft] run -> INFO 020 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:07.758 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 021 Raft leader changed: 0 -> 3" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:14.327 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 022 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 +orderer1.example.com | "2019-05-02 09:27:14.374 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +orderer1.example.com | "2019-05-02 09:27:14.395 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 024 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-05-02 09:27:14.395 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 025 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:14.449 UTC [orderer.commmon.multichannel] newChain -> INFO 026 Created and starting new chain businesschannel" +orderer1.example.com | "2019-05-02 09:27:14.449 UTC [orderer.consensus.etcdraft] Start -> INFO 027 Starting Raft node" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:14.449 UTC [orderer.common.cluster] Configure -> INFO 028 Entering, channel: businesschannel, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2019-05-02 09:27:14.415 UTC [orderer.common.cluster] updateStubInMapping -> INFO 041 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer2.example.com | "2019-05-02 09:27:14.415 UTC [orderer.common.cluster] updateStubInMapping -> INFO 042 Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:09.203 UTC [gossip.discovery] learnNewMembers -> DEBU 11c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-05-02 09:27:09.204 UTC [gossip.discovery] learnNewMembers -> DEBU 11d Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.ListenPort setting to string 7050 +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 03e Found map[string]interface{} value for general.Authentication +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 03f Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 040 Found real value for general.Authentication.TimeWindow setting to string 15m +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 041 Found map[string]interface{} value for general.TLS +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.TLS.Enabled setting to string true +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2019-05-02 09:27:05.907 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.907 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2019-05-02 09:27:05.907 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.907 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2019-05-02 09:27:05.908 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-05-02 09:27:05.908 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2019-05-02 09:27:05.909 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.909 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for general.TLS.ClientRootCAs setting to +orderer0.example.com | 2019-05-02 09:27:05.910 UTC [viperutil] getKeysRecursively -> DEBU 04e Found map[string]interface{} value for general.Keepalive +orderer0.example.com | 2019-05-02 09:27:05.910 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.914 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.Keepalive.ServerMinInterval setting to string 60s +orderer0.example.com | 2019-05-02 09:27:05.915 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.916 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for general.Keepalive.ServerInterval setting to string 7200s +orderer0.example.com | 2019-05-02 09:27:05.919 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.Keepalive.ServerTimeout setting to string 20s +orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.GenesisMethod setting to string file +orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +orderer0.example.com | 2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 059 Found map[interface{}]interface{} value for fileledger +orderer0.example.com | 2019-05-02 09:27:05.933 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.933 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +orderer0.example.com | 2019-05-02 09:27:05.934 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +orderer0.example.com | 2019-05-02 09:27:05.934 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +orderer0.example.com | 2019-05-02 09:27:05.939 UTC [viperutil] getKeysRecursively -> DEBU 05e Found map[interface{}]interface{} value for ramledger +orderer0.example.com | 2019-05-02 09:27:05.940 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value is not a string: 1000 +orderer0.example.com | 2019-05-02 09:27:05.940 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for ramledger.HistorySize setting to int 1000 +orderer0.example.com | 2019-05-02 09:27:05.940 UTC [viperutil] getKeysRecursively -> DEBU 061 Found map[interface{}]interface{} value for kafka +orderer0.example.com | 2019-05-02 09:27:05.941 UTC [viperutil] getKeysRecursively -> DEBU 062 Found map[string]interface{} value for kafka.Topic +orderer0.example.com | 2019-05-02 09:27:05.941 UTC [viperutil] unmarshalJSON -> DEBU 063 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-05-02 09:27:05.941 UTC [viperutil] getKeysRecursively -> DEBU 064 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +orderer0.example.com | 2019-05-02 09:27:05.942 UTC [viperutil] unmarshalJSON -> DEBU 065 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-05-02 09:27:05.944 UTC [viperutil] getKeysRecursively -> DEBU 066 Found real value for kafka.Verbose setting to bool false +orderer0.example.com | 2019-05-02 09:27:05.947 UTC [viperutil] getKeysRecursively -> DEBU 067 Found map[string]interface{} value for kafka.TLS +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:09.204 UTC [gossip.discovery] learnNewMembers -> DEBU 11e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:09.204 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:09.204 UTC [gossip.discovery] handleMsgFromComm -> DEBU 120 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:09.205 UTC [gossip.discovery] sendMemResponse -> DEBU 121 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 122 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 123 Sign: digest: 294D679F4B8DA423A9752C47753FA557B8520BC698D992FDDE58602EF4E23EDE " +peer0.org1.example.com | "2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 124 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 125 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:09.206 UTC [gossip.comm] Send -> DEBU 126 Entering, sending GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2198 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:09.207 UTC [gossip.comm] sendToEndpoint -> DEBU 127 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2198 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:09.207 UTC [gossip.comm] sendToEndpoint -> DEBU 128 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:09.208 UTC [gossip.discovery] sendMemResponse -> DEBU 129 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:13.092 UTC [gossip.pull] Hello -> DEBU 12a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:13.093 UTC [gossip.comm] Send -> DEBU 12b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:13.094 UTC [gossip.comm] sendToEndpoint -> DEBU 12c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.094 UTC [gossip.comm] sendToEndpoint -> DEBU 12d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.096 UTC [gossip.gossip] handleMessage -> DEBU 12e Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.096 UTC [gossip.pull] HandleMessage -> DEBU 12f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.096 UTC [gossip.gossip] handleMessage -> DEBU 130 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 131 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 132 Sign: digest: 1D328FAFAE76FEBA6036434DB4200718BB99346BAE4F5605AC555F446D3BCBF6 " +peer0.org1.example.com | "2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 133 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 134 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:13.098 UTC [gossip.comm] Send -> DEBU 135 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.common.cluster] updateStubInMapping -> INFO 043 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.common.cluster] updateStubInMapping -> INFO 044 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 045 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 046 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.common.cluster] Configure -> INFO 047 Exiting" +orderer2.example.com | "2019-05-02 09:27:14.417 UTC [orderer.consensus.etcdraft] start -> INFO 048 Starting raft node as part of a new channel" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:14.418 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 049 3 became follower at term 0" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:14.418 UTC [orderer.consensus.etcdraft] newRaft -> INFO 04a newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:14.418 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 04b 3 became follower at term 1" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:14.426 UTC [orderer.consensus.etcdraft] apply -> INFO 04c Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:14.426 UTC [orderer.consensus.etcdraft] apply -> INFO 04d Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:14.426 UTC [orderer.consensus.etcdraft] apply -> INFO 04e Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:15.501 UTC [orderer.consensus.etcdraft] Step -> INFO 04f 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:15.508 UTC [orderer.consensus.etcdraft] Step -> INFO 050 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:15.508 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 051 3 became follower at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:15.508 UTC [orderer.consensus.etcdraft] Step -> INFO 052 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:15.518 UTC [orderer.consensus.etcdraft] run -> INFO 053 raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:15.521 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 054 Raft leader changed: 0 -> 1" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:19.580 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 055 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:21.841 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 056 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:29.986 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 057 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:32.497 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 058 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:36.867 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 059 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:41.419 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 05a Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:46.972 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 05b Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:27:49.796 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 05c Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:28:03.993 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 05d Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-05-02 09:28:03.996 UTC [cauthdsl] deduplicate -> WARN 05e De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer2.example.com | "2019-05-02 09:28:03.997 UTC [cauthdsl] deduplicate -> WARN 05f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | 2019-05-02 09:27:05.947 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-05-02 09:27:05.947 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for kafka.TLS.Enabled setting to bool false +orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for kafka.TLS.PrivateKey setting to +orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for kafka.TLS.Certificate setting to +orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.948 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for kafka.TLS.RootCAs setting to +orderer0.example.com | 2019-05-02 09:27:05.963 UTC [viperutil] getKeysRecursively -> DEBU 070 Found map[string]interface{} value for kafka.SASLPlain +orderer0.example.com | 2019-05-02 09:27:05.964 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.965 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for kafka.SASLPlain.Password setting to +orderer0.example.com | 2019-05-02 09:27:05.965 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-05-02 09:27:05.966 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for kafka.SASLPlain.Enabled setting to bool false +orderer0.example.com | 2019-05-02 09:27:05.966 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.967 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for kafka.SASLPlain.User setting to +orderer0.example.com | 2019-05-02 09:27:05.967 UTC [viperutil] unmarshalJSON -> DEBU 077 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.968 UTC [viperutil] getKeysRecursively -> DEBU 078 Found real value for kafka.Version setting to +orderer0.example.com | 2019-05-02 09:27:05.968 UTC [viperutil] getKeysRecursively -> DEBU 079 Found map[string]interface{} value for kafka.Retry +orderer0.example.com | 2019-05-02 09:27:05.969 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.969 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for kafka.Retry.ShortTotal setting to string 10m +orderer0.example.com | 2019-05-02 09:27:05.969 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.970 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for kafka.Retry.LongInterval setting to string 5m +orderer0.example.com | 2019-05-02 09:27:05.970 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.974 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for kafka.Retry.LongTotal setting to string 12h +orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] getKeysRecursively -> DEBU 080 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +orderer0.example.com | 2019-05-02 09:27:05.975 UTC [viperutil] unmarshalJSON -> DEBU 085 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 086 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 087 Found map[string]interface{} value for kafka.Retry.Metadata +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 08c Found map[string]interface{} value for kafka.Retry.Producer +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 091 Found map[string]interface{} value for kafka.Retry.Consumer +orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for kafka.Retry.ShortInterval setting to string 5s +orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 096 Found map[interface{}]interface{} value for debug +orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for debug.DeliverTraceDir setting to +orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for debug.BroadcastTraceDir setting to +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 09b Found map[interface{}]interface{} value for operations +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 09e Found map[string]interface{} value for operations.TLS +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 09f Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a0 Found real value for operations.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a1 Unmarshal JSON: value is not a string: [] +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for operations.TLS.Enabled setting to bool false +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for operations.TLS.Certificate setting to +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a7 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found real value for operations.TLS.PrivateKey setting to +orderer0.example.com | 2019-05-02 09:27:05.979 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0a9 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key ListenAddress: ListenPort: SendBufferSize:10 ServerCertificate: ServerPrivateKey:] GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey:]] ramledger:map[HistorySize:1000]] +orderer0.example.com | 2019-05-02 09:27:05.980 UTC [localconfig] completeInitialization -> INFO 0aa Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2019-05-02 09:27:06.034 UTC [bccsp_sw] openKeyStore -> DEBU 0ab KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-05-02 09:27:14.450 UTC [orderer.common.cluster] updateStubInMapping -> INFO 029 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02a Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02b Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02c Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.common.cluster] Configure -> INFO 02f Exiting" +orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.consensus.etcdraft] start -> INFO 030 Starting raft node as part of a new channel" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:14.453 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 031 2 became follower at term 0" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:14.454 UTC [orderer.consensus.etcdraft] newRaft -> INFO 032 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:14.454 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 033 2 became follower at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:14.457 UTC [orderer.consensus.etcdraft] apply -> INFO 034 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:14.457 UTC [orderer.consensus.etcdraft] apply -> INFO 035 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:14.457 UTC [orderer.consensus.etcdraft] apply -> INFO 036 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:15.496 UTC [orderer.consensus.etcdraft] Step -> INFO 037 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:15.507 UTC [orderer.consensus.etcdraft] Step -> INFO 038 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:15.508 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 039 2 became follower at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:15.510 UTC [orderer.consensus.etcdraft] Step -> INFO 03a 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:15.517 UTC [orderer.consensus.etcdraft] run -> INFO 03b raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:15.520 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 03c Raft leader changed: 0 -> 1" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:19.581 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03d Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:21.840 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:29.985 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03f Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:32.499 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 040 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:36.810 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:41.414 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:46.974 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 043 Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:27:49.799 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 044 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:28:04.002 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 045 Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-05-02 09:28:04.005 UTC [cauthdsl] deduplicate -> WARN 046 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer1.example.com | "2019-05-02 09:28:04.006 UTC [cauthdsl] deduplicate -> WARN 047 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-05-02 09:27:06.051 UTC [bccsp] initBCCSP -> DEBU 0ac Initialize BCCSP [SW]" +orderer0.example.com | "2019-05-02 09:27:06.051 UTC [msp] getPemMaterialFromDir -> DEBU 0ad Reading directory /var/hyperledger/orderer/msp/signcerts" +orderer0.example.com | "2019-05-02 09:27:06.059 UTC [msp] getPemMaterialFromDir -> DEBU 0ae Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +orderer0.example.com | "2019-05-02 09:27:06.080 UTC [msp] getPemMaterialFromDir -> DEBU 0af Reading directory /var/hyperledger/orderer/msp/cacerts" +orderer0.example.com | "2019-05-02 09:27:06.106 UTC [msp] getPemMaterialFromDir -> DEBU 0b0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +orderer0.example.com | "2019-05-02 09:27:06.111 UTC [msp] getPemMaterialFromDir -> DEBU 0b1 Reading directory /var/hyperledger/orderer/msp/admincerts" +orderer0.example.com | "2019-05-02 09:27:06.120 UTC [msp] getPemMaterialFromDir -> DEBU 0b2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +orderer0.example.com | "2019-05-02 09:27:06.128 UTC [msp] getPemMaterialFromDir -> DEBU 0b3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +orderer0.example.com | "2019-05-02 09:27:06.130 UTC [msp] getMspConfig -> DEBU 0b4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +orderer0.example.com | "2019-05-02 09:27:06.130 UTC [msp] getPemMaterialFromDir -> DEBU 0b5 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +orderer0.example.com | "2019-05-02 09:27:06.135 UTC [msp] getPemMaterialFromDir -> DEBU 0b6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +orderer0.example.com | "2019-05-02 09:27:06.139 UTC [msp] getPemMaterialFromDir -> DEBU 0b7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +orderer0.example.com | "2019-05-02 09:27:06.141 UTC [msp] getMspConfig -> DEBU 0b8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +orderer0.example.com | "2019-05-02 09:27:06.141 UTC [msp] getPemMaterialFromDir -> DEBU 0b9 Reading directory /var/hyperledger/orderer/msp/crls" +orderer0.example.com | "2019-05-02 09:27:06.142 UTC [msp] getMspConfig -> DEBU 0ba crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +orderer0.example.com | "2019-05-02 09:27:06.144 UTC [msp] getMspConfig -> DEBU 0bb MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +orderer0.example.com | "2019-05-02 09:27:06.144 UTC [msp] newBccspMsp -> DEBU 0bc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.144 UTC [msp] New -> DEBU 0bd Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.144 UTC [msp] loadLocaMSP -> DEBU 0be Created new local MSP" +orderer0.example.com | "2019-05-02 09:27:06.144 UTC [msp] Setup -> DEBU 0bf Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:06.145 UTC [msp.identity] newIdentity -> DEBU 0c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1277,125 +1755,36 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | ID: 3, -orderer1.example.com | Endpoint: orderer2.example.com:7050, -orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | ]" -orderer1.example.com | "2019-05-02 01:30:30.175 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" -orderer1.example.com | "2019-05-02 01:30:30.175 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" -orderer1.example.com | "2019-05-02 01:30:30.177 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" -orderer1.example.com | "2019-05-02 01:30:30.177 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" -orderer1.example.com | "2019-05-02 01:30:30.178 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer1.example.com | "2019-05-02 01:30:30.179 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 3 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer1.example.com | "2019-05-02 01:30:30.179 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" -orderer1.example.com | "2019-05-02 01:30:30.179 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:30.179 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 2 became follower at term 0" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:30.179 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:30.179 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 2 became follower at term 1" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:30.179 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: -orderer1.example.com | Version: 2.0.0 -orderer1.example.com | Commit SHA: development build -orderer1.example.com | Go version: go1.12.4 -orderer1.example.com | OS/Arch: linux/amd64" -orderer1.example.com | "2019-05-02 01:30:30.180 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" -orderer1.example.com | "2019-05-02 01:30:30.183 UTC [orderer.consensus.etcdraft] apply -> INFO 019 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:30.183 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:30.183 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:32.079 UTC [orderer.consensus.etcdraft] Step -> INFO 01c 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:32.084 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:32.084 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01e 2 became follower at term 2" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:32.084 UTC [orderer.consensus.etcdraft] Step -> INFO 01f 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:32.090 UTC [orderer.consensus.etcdraft] run -> INFO 020 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 -orderer2.example.com | "2019-05-02 01:30:31.076 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 2 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer2.example.com | "2019-05-02 01:30:31.076 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1109 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:34.502 UTC [msp.identity] Verify -> DEBU 117 Verify: digest = 00000000 76 aa 3a d7 1b 70 c1 94 48 8b fe f4 63 17 f9 39 |v.:..p..H...c..9| -peer0.org1.example.com | 00000010 a7 97 5e 21 21 6a 9c 40 1e 65 9a 95 a6 f1 96 16 |..^!!j.@.e......|" -peer0.org1.example.com | "2019-05-02 01:30:34.502 UTC [msp.identity] Verify -> DEBU 118 Verify: sig = 00000000 30 45 02 21 00 86 80 88 74 ec c2 79 6c 3e 02 51 |0E.!....t..yl>.Q| -peer0.org1.example.com | 00000010 4a 49 9b 51 2c 95 c1 3f 88 3f 2f 55 b9 22 00 15 |JI.Q,..?.?/U."..| -peer0.org1.example.com | 00000020 2d 4b 54 87 b4 02 20 5a 4e aa dc 2b bd 23 3d b1 |-KT... ZN..+.#=.| -peer0.org2.example.com | "2019-05-02 01:30:57.773 UTC [confighistory] HandleStateUpdates -> ERRO 053 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0039fa0a0)}" -peer0.org2.example.com | "2019-05-02 01:30:57.980 UTC [kvledger] CommitWithPvtData -> INFO 054 [businesschannel] Committed block [3] with 1 transaction(s) in 208ms (state_validation=48ms block_commit=56ms state_commit=8ms)" -peer0.org2.example.com | "2019-05-02 01:30:58.918 UTC [endorser] callChaincode -> INFO 055 [][f3b80447] Entry chaincode: name:"_lifecycle" " -peer0.org2.example.com | "2019-05-02 01:30:58.922 UTC [endorser] callChaincode -> INFO 056 [][f3b80447] Exit chaincode: name:"_lifecycle" (3ms)" -peer0.org2.example.com | "2019-05-02 01:30:58.923 UTC [comm.grpc.server] 1 -> INFO 057 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49574 grpc.code=OK grpc.call_duration=6.2638ms -peer0.org2.example.com | "2019-05-02 01:30:59.524 UTC [endorser] callChaincode -> INFO 058 [][96d614c3] Entry chaincode: name:"cscc" " -peer0.org2.example.com | "2019-05-02 01:30:59.528 UTC [endorser] callChaincode -> INFO 059 [][96d614c3] Exit chaincode: name:"cscc" (4ms)" -peer0.org2.example.com | "2019-05-02 01:30:59.528 UTC [comm.grpc.server] 1 -> INFO 05a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49578 grpc.code=OK grpc.call_duration=5.9091ms -peer0.org2.example.com | "2019-05-02 01:30:59.578 UTC [endorser] callChaincode -> INFO 05b [businesschannel][cbe958b7] Entry chaincode: name:"_lifecycle" " -peer0.org2.example.com | "2019-05-02 01:30:59.582 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 05c successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" -peer0.org2.example.com | "2019-05-02 01:30:59.582 UTC [endorser] callChaincode -> INFO 05d [businesschannel][cbe958b7] Exit chaincode: name:"_lifecycle" (4ms)" -peer0.org2.example.com | "2019-05-02 01:30:59.589 UTC [comm.grpc.server] 1 -> INFO 05e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49578 grpc.code=OK grpc.call_duration=11.8375ms -peer0.org2.example.com | "2019-05-02 01:31:01.635 UTC [gossip.privdata] StoreBlock -> INFO 05f [businesschannel] Received block [4] from buffer" -peer0.org2.example.com | "2019-05-02 01:31:01.642 UTC [committer.txvalidator] Validate -> INFO 060 [businesschannel] Validated block [4] in 6ms" -peer0.org2.example.com | "2019-05-02 01:31:01.654 UTC [confighistory] HandleStateUpdates -> ERRO 061 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc002ae11c0)}" -peer0.org2.example.com | "2019-05-02 01:31:01.681 UTC [kvledger] CommitWithPvtData -> INFO 062 [businesschannel] Committed block [4] with 1 transaction(s) in 29ms (state_validation=3ms block_commit=17ms state_commit=4ms)" -peer0.org2.example.com | "2019-05-02 01:31:01.693 UTC [comm.grpc.server] 1 -> INFO 063 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T01:31:29.593Z grpc.peer_address=192.168.240.9:49580 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.0982157s -peer0.org2.example.com | "2019-05-02 01:31:02.636 UTC [endorser] callChaincode -> INFO 064 [businesschannel][7e3cca8b] Entry chaincode: name:"_lifecycle" " -peer0.org2.example.com | "2019-05-02 01:31:02.640 UTC [lifecycle] QueryApprovalStatus -> INFO 065 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" -peer0.org2.example.com | "2019-05-02 01:31:02.640 UTC [endorser] callChaincode -> INFO 066 [businesschannel][7e3cca8b] Exit chaincode: name:"_lifecycle" (4ms)" -peer0.org2.example.com | "2019-05-02 01:31:02.641 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49588 grpc.code=OK grpc.call_duration=5.7308ms -peer0.org2.example.com | "2019-05-02 01:31:03.686 UTC [endorser] callChaincode -> INFO 068 [businesschannel][c9936150] Entry chaincode: name:"_lifecycle" " -peer0.org2.example.com | "2019-05-02 01:31:03.703 UTC [lifecycle] QueryApprovalStatus -> INFO 069 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" -peer0.org2.example.com | "2019-05-02 01:31:03.704 UTC [lifecycle] CommitChaincodeDefinition -> INFO 06a successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" -peer0.org2.example.com | "2019-05-02 01:31:03.705 UTC [endorser] callChaincode -> INFO 06b [businesschannel][c9936150] Exit chaincode: name:"_lifecycle" (18ms)" -peer0.org2.example.com | "2019-05-02 01:31:03.705 UTC [comm.grpc.server] 1 -> INFO 06c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49600 grpc.code=OK grpc.call_duration=20.2257ms -peer0.org2.example.com | "2019-05-02 01:31:05.893 UTC [gossip.privdata] StoreBlock -> INFO 06d [businesschannel] Received block [5] from buffer" -peer0.org2.example.com | "2019-05-02 01:31:05.896 UTC [committer.txvalidator] Validate -> INFO 06e [businesschannel] Validated block [5] in 2ms" -peer0.org2.example.com | "2019-05-02 01:31:05.899 UTC [lifecycle] update -> INFO 06f Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" -peer0.org2.example.com | "2019-05-02 01:31:05.902 UTC [lifecycle] update -> INFO 070 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" -peer0.org2.example.com | "2019-05-02 01:31:05.903 UTC [cceventmgmt] HandleStateUpdates -> INFO 071 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" -peer0.org2.example.com | "2019-05-02 01:31:05.904 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 072 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" -peer0.org2.example.com | "2019-05-02 01:31:05.904 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 073 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" -peer0.org2.example.com | "2019-05-02 01:31:05.949 UTC [kvledger] CommitWithPvtData -> INFO 074 [businesschannel] Committed block [5] with 1 transaction(s) in 52ms (state_validation=14ms block_commit=15ms state_commit=8ms)" -peer0.org2.example.com | "2019-05-02 01:31:06.110 UTC [comm.grpc.server] 1 -> INFO 075 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T01:31:33.71Z grpc.peer_address=192.168.240.9:49602 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.3925375s -peer0.org2.example.com | "2019-05-02 01:31:07.091 UTC [endorser] callChaincode -> INFO 076 [businesschannel][2e762513] Entry chaincode: name:"_lifecycle" " orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.591 UTC [msp.identity] newIdentity -> DEBU 0c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:13.098 UTC [gossip.comm] sendToEndpoint -> DEBU 136 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1094 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.099 UTC [gossip.comm] sendToEndpoint -> DEBU 137 Exiting" +orderer0.example.com | "2019-05-02 09:27:06.145 UTC [msp.identity] newIdentity -> DEBU 0c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1408,7 +1797,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.600 UTC [msp.identity] newIdentity -> DEBU 0c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.154 UTC [msp.identity] newIdentity -> DEBU 0c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -1422,8 +1811,8 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh orderer0.example.com | QQ== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.620 UTC [bccsp_sw] loadPrivateKey -> DEBU 0c3 Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." -orderer0.example.com | "2019-05-02 01:30:30.631 UTC [msp.identity] newIdentity -> DEBU 0c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.165 UTC [bccsp_sw] loadPrivateKey -> DEBU 0c3 Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." +orderer0.example.com | "2019-05-02 09:27:06.171 UTC [msp.identity] newIdentity -> DEBU 0c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -1437,46 +1826,9 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh orderer0.example.com | QQ== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.631 UTC [msp] setupSigningIdentity -> DEBU 0c5 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" -peer0.org2.example.com | "2019-05-02 01:31:07.095 UTC [lifecycle] QueryChaincodeDefinition -> INFO 077 successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" -peer0.org2.example.com | "2019-05-02 01:31:07.096 UTC [endorser] callChaincode -> INFO 078 [businesschannel][2e762513] Exit chaincode: name:"_lifecycle" (5ms)" -peer0.org2.example.com | "2019-05-02 01:31:07.099 UTC [comm.grpc.server] 1 -> INFO 079 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49610 grpc.code=OK grpc.call_duration=9.1197ms -peer0.org2.example.com | "2019-05-02 01:31:11.423 UTC [gossip.privdata] StoreBlock -> INFO 07a [businesschannel] Received block [6] from buffer" -peer0.org2.example.com | "2019-05-02 01:31:11.438 UTC [committer.txvalidator] Validate -> INFO 07b [businesschannel] Validated block [6] in 14ms" -peer0.org2.example.com | "2019-05-02 01:31:11.473 UTC [kvledger] CommitWithPvtData -> INFO 07c [businesschannel] Committed block [6] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=23ms state_commit=7ms)" -peer0.org2.example.com | "2019-05-02 01:31:16.855 UTC [gossip.privdata] StoreBlock -> INFO 07d [businesschannel] Received block [7] from buffer" -peer0.org2.example.com | "2019-05-02 01:31:16.859 UTC [committer.txvalidator] Validate -> INFO 07e [businesschannel] Validated block [7] in 3ms" -peer0.org2.example.com | "2019-05-02 01:31:16.876 UTC [kvledger] CommitWithPvtData -> INFO 07f [businesschannel] Committed block [7] with 1 transaction(s) in 16ms (state_validation=0ms block_commit=11ms state_commit=2ms)" -peer0.org2.example.com | "2019-05-02 01:31:19.672 UTC [gossip.privdata] StoreBlock -> INFO 080 [businesschannel] Received block [8] from buffer" -peer0.org2.example.com | "2019-05-02 01:31:19.674 UTC [committer.txvalidator] Validate -> INFO 081 [businesschannel] Validated block [8] in 1ms" -peer0.org2.example.com | "2019-05-02 01:31:19.698 UTC [kvledger] CommitWithPvtData -> INFO 082 [businesschannel] Committed block [8] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=16ms state_commit=3ms)" -peer0.org2.example.com | "2019-05-02 01:31:35.178 UTC [gossip.privdata] StoreBlock -> INFO 083 [businesschannel] Received block [9] from buffer" -peer0.org2.example.com | "2019-05-02 01:31:35.183 UTC [cauthdsl] deduplicate -> WARN 084 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer0.org2.example.com | "2019-05-02 01:31:35.184 UTC [cauthdsl] deduplicate -> WARN 085 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer0.org2.example.com | "2019-05-02 01:31:35.243 UTC [comm.grpc.server] 1 -> INFO 086 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.242Z grpc.peer_address=192.168.240.8:58294 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=357.8µs -peer0.org2.example.com | "2019-05-02 01:31:35.249 UTC [comm.grpc.server] 1 -> INFO 087 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.8:58122 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=47.4100519s -peer0.org2.example.com | "2019-05-02 01:31:35.250 UTC [comm.grpc.server] 1 -> INFO 088 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:31:45.248Z grpc.peer_address=192.168.240.8:58294 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.0383ms -peer0.org2.example.com | "2019-05-02 01:31:35.249 UTC [gossip.gossip] JoinChan -> INFO 089 Joining gossip network of channel businesschannel with 3 organizations" -peer0.org2.example.com | "2019-05-02 01:31:35.254 UTC [gossip.gossip] learnAnchorPeers -> INFO 08a No configured anchor peers of Org3MSP for channel businesschannel to learn about" -peer0.org2.example.com | "2019-05-02 01:31:35.254 UTC [gossip.gossip] learnAnchorPeers -> INFO 08b Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org2.example.com | "2019-05-02 01:31:35.254 UTC [gossip.gossip] learnAnchorPeers -> INFO 08c Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer0.org2.example.com | "2019-05-02 01:31:35.254 UTC [gossip.gossip] learnAnchorPeers -> INFO 08d Anchor peer with same endpoint, skipping connecting to myself" -peer0.org2.example.com | "2019-05-02 01:31:35.306 UTC [committer.txvalidator] Validate -> INFO 08e [businesschannel] Validated block [9] in 126ms" -peer0.org2.example.com | "2019-05-02 01:31:35.306 UTC [comm.grpc.server] 1 -> INFO 08f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.302Z grpc.peer_address=192.168.240.6:56206 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.592ms -peer0.org2.example.com | "2019-05-02 01:31:35.339 UTC [comm.grpc.server] 1 -> INFO 090 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.6:56018 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=47.6591209s -peer0.org2.example.com | "2019-05-02 01:31:35.346 UTC [comm.grpc.server] 1 -> INFO 091 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:31:45.317Z grpc.peer_address=192.168.240.6:56206 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=28.4498ms -peer0.org2.example.com | "2019-05-02 01:31:35.394 UTC [kvledger] CommitWithPvtData -> INFO 092 [businesschannel] Committed block [9] with 1 transaction(s) in 55ms (state_validation=18ms block_commit=29ms state_commit=5ms)" -peer0.org2.example.com | "2019-05-02 01:31:35.422 UTC [comm.grpc.server] 1 -> INFO 093 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.41Z grpc.peer_address=192.168.240.7:45948 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=158.9µs -peer0.org2.example.com | "2019-05-02 01:31:35.439 UTC [comm.grpc.server] 1 -> INFO 094 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.7:45770 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=47.5534648s -peer0.org2.example.com | "2019-05-02 01:31:35.440 UTC [comm.grpc.server] 1 -> INFO 095 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:31:45.437Z grpc.peer_address=192.168.240.7:45948 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.9493ms -peer0.org2.example.com | "2019-05-02 01:31:35.519 UTC [comm.grpc.server] 1 -> INFO 096 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.518Z grpc.peer_address=192.168.240.7:45950 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.6µs -peer0.org2.example.com | "2019-05-02 01:31:51.779 UTC [endorser] callChaincode -> INFO 097 [][738aaaee] Entry chaincode: name:"cscc" " -peer0.org2.example.com | "2019-05-02 01:31:51.781 UTC [endorser] callChaincode -> INFO 098 [][738aaaee] Exit chaincode: name:"cscc" (1ms)" -peer0.org2.example.com | "2019-05-02 01:31:51.781 UTC [comm.grpc.server] 1 -> INFO 099 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49770 grpc.code=OK grpc.call_duration=2.5292ms -peer0.org2.example.com | "2019-05-02 01:31:52.660 UTC [endorser] callChaincode -> INFO 09a [][5f869925] Entry chaincode: name:"qscc" " -peer0.org2.example.com | "2019-05-02 01:31:52.662 UTC [endorser] callChaincode -> INFO 09b [][5f869925] Exit chaincode: name:"qscc" (2ms)" -orderer0.example.com | "2019-05-02 01:30:30.632 UTC [msp] Validate -> DEBU 0c6 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.634 UTC [orderer.common.server] prettyPrintStruct -> INFO 0c7 Orderer config values: +orderer0.example.com | "2019-05-02 09:27:06.171 UTC [msp] setupSigningIdentity -> DEBU 0c5 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +orderer0.example.com | "2019-05-02 09:27:06.171 UTC [msp] Validate -> DEBU 0c6 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.171 UTC [orderer.common.server] prettyPrintStruct -> INFO 0c7 Orderer config values: orderer0.example.com | General.LedgerType = "file" orderer0.example.com | General.ListenAddress = "0.0.0.0" orderer0.example.com | General.ListenPort = 7050 @@ -1531,252 +1883,77 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s -peer0.org2.example.com | "2019-05-02 01:31:52.663 UTC [comm.grpc.server] 1 -> INFO 09c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:49778 grpc.code=OK grpc.call_duration=3.5285ms -peer0.org1.example.com | 00000030 b3 ab 7e b3 e9 2d 97 4f 7c 4a e5 23 1b 92 e1 5b |..~..-.O|J.#...[| -peer0.org1.example.com | 00000040 74 f3 3f 28 72 55 0b |t.?(rU.|" -peer0.org1.example.com | "2019-05-02 01:30:34.503 UTC [msp.identity] Verify -> DEBU 119 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:34.504 UTC [msp.identity] Verify -> DEBU 11a Verify: sig = 00000000 30 45 02 21 00 ed ef 42 24 1d a2 b2 80 df 09 af |0E.!...B$.......| -peer0.org1.example.com | 00000010 f5 1e 41 8e 6c 1c 05 55 46 95 ab f6 9b 87 70 f8 |..A.l..UF.....p.| -peer0.org1.example.com | 00000020 a8 fa 7f 66 87 02 20 3e 7b 2d a7 59 82 a9 1b 8e |...f.. >{-.Y....| -peer0.org1.example.com | 00000030 4d 9c a4 2f 52 17 c6 d2 68 2a de 6c 81 01 e5 99 |M../R...h*.l....| -peer0.org1.example.com | 00000040 bf a8 6f ca 92 4c 11 |..o..L.|" -peer0.org1.example.com | "2019-05-02 01:30:34.505 UTC [gossip.discovery] handleAliveMessage -> DEBU 11b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:34.506 UTC [gossip.discovery] learnNewMembers -> DEBU 11c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]}" -peer0.org1.example.com | "2019-05-02 01:30:34.507 UTC [gossip.discovery] learnNewMembers -> DEBU 11d Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:34.507 UTC [gossip.discovery] learnNewMembers -> DEBU 11e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:34.508 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:34.508 UTC [gossip.discovery] handleMsgFromComm -> DEBU 120 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:34.508 UTC [gossip.discovery] sendMemResponse -> DEBU 121 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:34.509 UTC [msp.identity] Sign -> DEBU 122 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:30:34.509 UTC [msp.identity] Sign -> DEBU 123 Sign: digest: 7EF9B1AE0898C9E6446F72B5F382146C63647A74C0CAEC1ED6AC1E0E59C923BE " -peer0.org1.example.com | "2019-05-02 01:30:34.510 UTC [msp.identity] Sign -> DEBU 124 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:34.510 UTC [msp.identity] Sign -> DEBU 125 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:34.511 UTC [gossip.comm] Send -> DEBU 126 Entering, sending GossipMessage: Channel: , nonce: 7184683292863464581, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2199 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:34.512 UTC [gossip.comm] sendToEndpoint -> DEBU 127 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7184683292863464581, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2199 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:34.513 UTC [gossip.comm] sendToEndpoint -> DEBU 128 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:34.512 UTC [gossip.discovery] sendMemResponse -> DEBU 129 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:37.454 UTC [gossip.gossip] handleMessage -> DEBU 12a Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1098 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.454 UTC [gossip.gossip] handleMessage -> DEBU 12b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.454 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1098 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.455 UTC [msp.identity] Verify -> DEBU 12d Verify: digest = 00000000 cf 06 6c 72 13 08 0f 2a ba c6 45 4b 69 d7 f3 4e |..lr...*..EKi..N| -peer0.org1.example.com | 00000010 05 d7 75 f1 c4 e2 eb ce 89 ab 14 76 b5 45 5c 74 |..u........v.E\t|" -peer0.org1.example.com | "2019-05-02 01:30:37.455 UTC [msp.identity] Verify -> DEBU 12e Verify: sig = 00000000 30 45 02 21 00 83 07 7d 3f 09 a7 22 6d 38 6f 71 |0E.!...}?.."m8oq| -peer0.org1.example.com | 00000010 56 b7 71 29 69 51 b8 c4 df cc f2 55 c3 7a b7 1c |V.q)iQ.....U.z..| -peer0.org1.example.com | 00000020 7e bd cb 1a 91 02 20 7d 81 4d e4 4e 72 8e d3 a8 |~..... }.M.Nr...| -peer0.org1.example.com | 00000030 a0 64 f2 d1 86 69 65 74 40 ca 76 1f f4 c5 cf 7b |.d...iet@.v....{| -peer0.org1.example.com | 00000040 ac d5 23 d8 6e a6 57 |..#.n.W|" -peer0.org1.example.com | "2019-05-02 01:30:37.455 UTC [msp.identity] Verify -> DEBU 12f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:37.456 UTC [msp.identity] Verify -> DEBU 130 Verify: sig = 00000000 30 44 02 20 5c 40 4f 9a f5 65 46 c2 a6 58 9f 3f |0D. \@O..eF..X.?| -peer0.org1.example.com | 00000010 bd 96 bc 89 dd 63 f3 d9 cb 8c da c8 34 f4 92 00 |.....c......4...| -peer0.org1.example.com | 00000020 27 84 f4 ed 02 20 47 92 dd 1d c1 77 a6 21 08 e5 |'.... G....w.!..| -peer0.org1.example.com | 00000030 a0 18 30 ab 07 54 fe 61 a4 22 1a a2 11 d5 48 b3 |..0..T.a."....H.| -peer0.org1.example.com | 00000040 90 40 9e d3 0d 5e |.@...^|" -peer0.org1.example.com | "2019-05-02 01:30:37.456 UTC [gossip.discovery] handleAliveMessage -> DEBU 131 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -orderer2.example.com | "2019-05-02 01:30:31.076 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:31.076 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 3 became follower at term 0" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:31.076 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:31.076 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 3 became follower at term 1" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:31.076 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: -orderer2.example.com | Version: 2.0.0 -orderer2.example.com | Commit SHA: development build -orderer2.example.com | Go version: go1.12.4 -orderer2.example.com | OS/Arch: linux/amd64" -orderer2.example.com | "2019-05-02 01:30:31.076 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" -orderer2.example.com | "2019-05-02 01:30:31.076 UTC [orderer.consensus.etcdraft] run -> INFO 019 This node is picked to start campaign" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:31.081 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:31.081 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:31.081 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.077 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 3 is starting a new election at term 1" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.077 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01e 3 became pre-candidate at term 1" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.077 UTC [orderer.consensus.etcdraft] poll -> INFO 01f 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.077 UTC [orderer.consensus.etcdraft] campaign -> INFO 020 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.077 UTC [orderer.consensus.etcdraft] campaign -> INFO 021 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.080 UTC [orderer.consensus.etcdraft] poll -> INFO 022 3 received MsgPreVoteResp from 1 at term 1" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.080 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 023 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.080 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 024 3 became candidate at term 2" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.080 UTC [orderer.consensus.etcdraft] poll -> INFO 025 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.080 UTC [orderer.consensus.etcdraft] campaign -> INFO 026 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.080 UTC [orderer.consensus.etcdraft] campaign -> INFO 027 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.086 UTC [orderer.consensus.etcdraft] poll -> INFO 028 3 received MsgVoteResp from 2 at term 2" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.086 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 029 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.086 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 02a 3 became leader at term 2" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.087 UTC [orderer.consensus.etcdraft] run -> INFO 02b raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.089 UTC [orderer.consensus.etcdraft] run -> INFO 02c Leader 3 is present, quit campaign" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.089 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02d Raft leader changed: 0 -> 3" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:32.094 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02e Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:38.925 UTC [orderer.consensus.etcdraft] propose -> INFO 02f Created block [1], there are 0 blocks in flight" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:38.926 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 030 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:38.942 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 031 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 -orderer2.example.com | "2019-05-02 01:30:39.007 UTC [fsblkstorage] newBlockfileMgr -> INFO 032 Getting block information from block storage" -orderer2.example.com | "2019-05-02 01:30:39.035 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 033 EvictionSuspicion not set, defaulting to 10m0s" -orderer2.example.com | "2019-05-02 01:30:39.038 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 034 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:39.061 UTC [orderer.commmon.multichannel] newChain -> INFO 035 Created and starting new chain businesschannel" -orderer2.example.com | "2019-05-02 01:30:39.061 UTC [orderer.consensus.etcdraft] Start -> INFO 036 Starting Raft node" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:39.069 UTC [orderer.common.cluster] Configure -> INFO 037 Entering, channel: businesschannel, nodes: [ID: 1, -orderer2.example.com | Endpoint: orderer0.example.com:7050, -orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -orderer1.example.com | "2019-05-02 01:30:32.091 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 021 Raft leader changed: 0 -> 3" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:38.945 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 022 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 -orderer1.example.com | "2019-05-02 01:30:38.982 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" -orderer1.example.com | "2019-05-02 01:30:39.001 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 024 EvictionSuspicion not set, defaulting to 10m0s" -orderer1.example.com | "2019-05-02 01:30:39.001 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 025 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:39.039 UTC [orderer.commmon.multichannel] newChain -> INFO 026 Created and starting new chain businesschannel" -orderer1.example.com | "2019-05-02 01:30:39.040 UTC [orderer.consensus.etcdraft] Start -> INFO 027 Starting Raft node" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:39.041 UTC [orderer.common.cluster] Configure -> INFO 028 Entering, channel: businesschannel, nodes: [ID: 1, -orderer1.example.com | Endpoint: orderer0.example.com:7050, -orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | ID: 3, -orderer1.example.com | Endpoint: orderer2.example.com:7050, -orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer2.example.com | -----END CERTIFICATE----- -orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +peer0.org1.example.com | "2019-05-02 09:27:13.101 UTC [gossip.gossip] handleMessage -> DEBU 138 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.101 UTC [gossip.gossip] handleMessage -> DEBU 139 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.101 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13b Verify: digest = 00000000 1d 32 8f af ae 76 fe ba 60 36 43 4d b4 20 07 18 |.2...v..`6CM. ..| +peer0.org1.example.com | 00000010 bb 99 34 6b ae 4f 56 05 ac 55 5f 44 6d 3b cb f6 |..4k.OV..U_Dm;..|" +peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13c Verify: sig = 00000000 30 45 02 21 00 c0 a4 06 5c 49 75 2a 3f 49 23 0e |0E.!....\Iu*?I#.| +peer0.org1.example.com | 00000010 f3 1c 69 28 e7 98 dc b7 28 1c f2 3c f5 26 f9 1b |..i(....(..<.&..| +peer0.org1.example.com | 00000020 00 78 c5 e5 89 02 20 50 03 2c bd 98 41 09 0f 9d |.x.... P.,..A...| +peer0.org1.example.com | 00000030 2f 8b 36 18 40 57 1d 45 23 0f ad 35 9f 8e 53 61 |/.6.@W.E#..5..Sa| +peer0.org1.example.com | 00000040 87 4e 3e eb 57 d8 94 |.N>.W..|" +peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13d Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13e Verify: sig = 00000000 30 44 02 20 5e 66 33 ce 48 06 7b e0 5e 34 05 79 |0D. ^f3.H.{.^4.y| +peer0.org1.example.com | 00000010 8f ab 5f 83 0f bd 42 0f bc 0d 84 94 a7 7b c2 8e |.._...B......{..| +peer0.org1.example.com | 00000020 94 70 cd 8f 02 20 58 39 3d a6 8b a9 ff c7 f1 9a |.p... X9=.......| +peer0.org1.example.com | 00000030 3d ad 67 70 3c 0d c1 59 b1 f2 f3 a8 f4 88 3f d1 |=.gp<..Y......?.| +peer0.org1.example.com | 00000040 bc 1c 17 25 af 47 |...%.G|" +peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [gossip.discovery] isSentByMe -> DEBU 140 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.102 UTC [gossip.discovery] handleAliveMessage -> DEBU 141 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 142 Verify: digest = 00000000 f2 9f d6 4e 51 d8 70 03 8b cc ce 6d 34 37 3e 54 |...NQ.p....m47>T| +peer0.org1.example.com | 00000010 5b 9e 4c b0 f2 73 5e 0c 82 03 26 96 7d a1 22 cf |[.L..s^...&.}.".|" +peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 143 Verify: sig = 00000000 30 44 02 20 4b 9f 93 fc 8c 14 0f a1 28 76 bd 93 |0D. K.......(v..| +peer0.org1.example.com | 00000010 ea 2a a9 58 fb 5a d5 52 3d d8 49 7f fe de 6b 58 |.*.X.Z.R=.I...kX| +peer0.org1.example.com | 00000020 5e f9 14 9c 02 20 5a 54 97 83 c5 8f 84 2b e7 9c |^.... ZT.....+..| +peer0.org1.example.com | 00000030 c9 d4 31 36 8b 35 55 11 33 0a f4 62 2e 7f 44 80 |..16.5U.3..b..D.| +peer0.org1.example.com | 00000040 62 ad d8 07 51 10 |b...Q.|" +peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 144 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 145 Verify: sig = 00000000 30 44 02 20 71 a4 01 5f 21 3c f0 31 f8 c0 ae 0b |0D. q.._!<.1....| +peer0.org1.example.com | 00000010 ce e6 75 07 f0 c6 e4 e4 40 47 67 1a 0d 85 b1 0e |..u.....@Gg.....| +peer0.org1.example.com | 00000020 1f 7d 2b a7 02 20 69 67 89 56 35 11 a5 81 1c 5c |.}+.. ig.V5....\| +peer0.org1.example.com | 00000030 10 5b 6d 56 2f f4 b3 de e5 7e 17 7c e3 db 2d ba |.[mV/....~.|..-.| +peer0.org1.example.com | 00000040 66 e4 a1 bf 30 9d |f...0.|" +peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 146 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s orderer0.example.com | Kafka.Verbose = false @@ -1806,315 +1983,28 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" orderer0.example.com | Metrics.Statsd.WriteInterval = 30s orderer0.example.com | Metrics.Statsd.Prefix = """ -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] NewStandardValues -> DEBU 0c8 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0c9 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ca Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cb Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cc Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cd Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] NewStandardValues -> DEBU 0ce Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cf Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d0 Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d1 Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d2 Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d3 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d4 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.659 UTC [common.channelconfig] NewStandardValues -> DEBU 0d5 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:30.659 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d6 Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:30.659 UTC [common.channelconfig] NewStandardValues -> DEBU 0d7 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 132 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:37.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 133 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:4 " -peer0.org1.example.com | "2019-05-02 01:30:37.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 134 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:4 " -peer0.org1.example.com | "2019-05-02 01:30:37.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 135 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:37.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 136 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.458 UTC [gossip.discovery] handleAliveMessage -> DEBU 137 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.458 UTC [gossip.discovery] handleMsgFromComm -> DEBU 138 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.458 UTC [gossip.discovery] sendMemResponse -> DEBU 139 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:37.458 UTC [msp.identity] Sign -> DEBU 13a Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:30:37.459 UTC [msp.identity] Sign -> DEBU 13b Sign: digest: 8BE3C0D36A6C1511098EDB4E3059DF11BCD2C0435DF2B1AEEEB679536358345F " -peer0.org1.example.com | "2019-05-02 01:30:37.459 UTC [msp.identity] Sign -> DEBU 13c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:37.459 UTC [msp.identity] Sign -> DEBU 13d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:37.460 UTC [gossip.comm] Send -> DEBU 13e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:37.460 UTC [gossip.discovery] sendMemResponse -> DEBU 13f Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:37.460 UTC [gossip.comm] sendToEndpoint -> DEBU 140 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.461 UTC [gossip.comm] sendToEndpoint -> DEBU 141 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.462 UTC [gossip.gossip] handleMessage -> DEBU 142 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.462 UTC [gossip.pull] HandleMessage -> DEBU 143 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | ]" -orderer1.example.com | "2019-05-02 01:30:39.041 UTC [orderer.common.cluster] updateStubInMapping -> INFO 029 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" -orderer1.example.com | "2019-05-02 01:30:39.041 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02a Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" -orderer1.example.com | "2019-05-02 01:30:39.047 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02b Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" -orderer1.example.com | "2019-05-02 01:30:39.047 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02c Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" -orderer1.example.com | "2019-05-02 01:30:39.047 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer1.example.com | "2019-05-02 01:30:39.047 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer1.example.com | "2019-05-02 01:30:39.047 UTC [orderer.common.cluster] Configure -> INFO 02f Exiting" -orderer1.example.com | "2019-05-02 01:30:39.047 UTC [orderer.consensus.etcdraft] start -> INFO 030 Starting raft node as part of a new channel" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:39.047 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 031 2 became follower at term 0" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:39.047 UTC [orderer.consensus.etcdraft] newRaft -> INFO 032 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:39.048 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 033 2 became follower at term 1" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:39.064 UTC [orderer.consensus.etcdraft] apply -> INFO 034 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:39.065 UTC [orderer.consensus.etcdraft] apply -> INFO 035 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:39.068 UTC [orderer.consensus.etcdraft] apply -> INFO 036 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:40.084 UTC [orderer.consensus.etcdraft] Step -> INFO 037 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:40.092 UTC [orderer.consensus.etcdraft] Step -> INFO 038 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:40.093 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 039 2 became follower at term 2" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:40.093 UTC [orderer.consensus.etcdraft] Step -> INFO 03a 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:40.102 UTC [orderer.consensus.etcdraft] run -> INFO 03b raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:40.104 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 03c Raft leader changed: 0 -> 1" channel=businesschannel node=2 -peer0.org1.example.com | "2019-05-02 01:30:37.462 UTC [gossip.pull] SendDigest -> DEBU 144 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:37.463 UTC [gossip.gossip] handleMessage -> DEBU 145 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.615 UTC [gossip.pull] Hello -> DEBU 146 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:37.615 UTC [gossip.comm] Send -> DEBU 147 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:37.615 UTC [gossip.comm] sendToEndpoint -> DEBU 148 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.615 UTC [gossip.comm] sendToEndpoint -> DEBU 149 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.616 UTC [msp.identity] Sign -> DEBU 14a Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:30:37.617 UTC [msp.identity] Sign -> DEBU 14b Sign: digest: 5141F5D8F50842FC3127408EBEBE6E2EA2D3E417ADB090C629001EB4EC9D5395 " -peer0.org1.example.com | "2019-05-02 01:30:37.618 UTC [msp.identity] Sign -> DEBU 14c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:37.618 UTC [msp.identity] Sign -> DEBU 14d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:37.619 UTC [gossip.comm] Send -> DEBU 14e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633613118000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:37.619 UTC [gossip.gossip] handleMessage -> DEBU 14f Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9065475227465345842 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.620 UTC [gossip.pull] HandleMessage -> DEBU 151 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9065475227465345842 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.620 UTC [gossip.gossip] handleMessage -> DEBU 152 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.619 UTC [gossip.comm] sendToEndpoint -> DEBU 150 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633613118000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.621 UTC [gossip.comm] sendToEndpoint -> DEBU 153 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.625 UTC [gossip.gossip] handleMessage -> DEBU 154 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.625 UTC [gossip.gossip] handleMessage -> DEBU 155 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.626 UTC [msp.identity] Verify -> DEBU 157 Verify: digest = 00000000 51 41 f5 d8 f5 08 42 fc 31 27 40 8e be be 6e 2e |QA....B.1'@...n.| -peer0.org1.example.com | 00000010 a2 d3 e4 17 ad b0 90 c6 29 00 1e b4 ec 9d 53 95 |........).....S.|" -peer0.org1.example.com | "2019-05-02 01:30:37.626 UTC [msp.identity] Verify -> DEBU 158 Verify: sig = 00000000 30 44 02 20 67 26 a0 05 88 fa 35 57 06 3d d1 b4 |0D. g&....5W.=..| -peer0.org1.example.com | 00000010 90 5d 62 6d a6 95 4b ca a2 a4 67 76 f7 3e 0d 49 |.]bm..K...gv.>.I| -peer0.org1.example.com | 00000020 79 da f5 92 02 20 7c c3 8a ff e5 94 62 de 36 f3 |y.... |.....b.6.| -peer0.org1.example.com | 00000030 7c 89 74 bd 66 50 fa aa b8 04 d0 d1 e9 62 41 d7 ||.t.fP.......bA.| -peer0.org1.example.com | 00000040 7f 06 66 df 45 37 |..f.E7|" -peer0.org1.example.com | "2019-05-02 01:30:37.627 UTC [msp.identity] Verify -> DEBU 159 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:30:37.627 UTC [msp.identity] Verify -> DEBU 15a Verify: sig = 00000000 30 45 02 21 00 c0 c9 7e 46 23 9c a6 5d d2 a2 2e |0E.!...~F#..]...| -peer0.org1.example.com | 00000010 d2 31 81 ba 47 a3 3e c6 0b 5b 42 cf 94 a3 b4 83 |.1..G.>..[B.....| -peer0.org1.example.com | 00000020 e6 34 40 19 4e 02 20 1e f1 97 23 91 96 0e b2 9a |.4@.N. ...#.....| -peer0.org1.example.com | 00000030 6c a2 9e c0 94 26 11 7f 4a c5 55 9d 6a df 0d 7d |l....&..J.U.j..}| -peer0.org1.example.com | 00000040 e1 ca af 05 07 86 3c |......<|" -peer0.org1.example.com | "2019-05-02 01:30:37.627 UTC [gossip.discovery] handleAliveMessage -> DEBU 15b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633613118000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.627 UTC [gossip.discovery] isSentByMe -> DEBU 15c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -orderer1.example.com | "2019-05-02 01:30:45.069 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03d Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:47.337 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:30:57.644 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03f Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:31:01.623 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 040 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:31:05.879 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:31:11.387 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:31:16.833 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 043 Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:31:19.652 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 044 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:31:34.970 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 045 Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-05-02 01:31:34.998 UTC [cauthdsl] deduplicate -> WARN 046 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer1.example.com | "2019-05-02 01:31:35.019 UTC [cauthdsl] deduplicate -> WARN 047 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer2.example.com | -----END CERTIFICATE----- -orderer2.example.com | ID: 2, -orderer2.example.com | Endpoint: orderer1.example.com:7050, -orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer2.example.com | -----END CERTIFICATE----- -orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer2.example.com | -----END CERTIFICATE----- -orderer2.example.com | ]" -orderer2.example.com | "2019-05-02 01:30:39.069 UTC [orderer.common.cluster] updateStubInMapping -> INFO 038 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" -orderer2.example.com | "2019-05-02 01:30:39.072 UTC [orderer.common.cluster] updateStubInMapping -> INFO 039 Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" -orderer2.example.com | "2019-05-02 01:30:39.078 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03a Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" -orderer2.example.com | "2019-05-02 01:30:39.078 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03b Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" -orderer2.example.com | "2019-05-02 01:30:39.078 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03c 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer2.example.com | "2019-05-02 01:30:39.078 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03d 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer2.example.com | "2019-05-02 01:30:39.078 UTC [orderer.common.cluster] Configure -> INFO 03e Exiting" -orderer2.example.com | "2019-05-02 01:30:39.078 UTC [orderer.consensus.etcdraft] start -> INFO 03f Starting raft node as part of a new channel" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:39.078 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 040 3 became follower at term 0" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:39.078 UTC [orderer.consensus.etcdraft] newRaft -> INFO 041 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:39.078 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 042 3 became follower at term 1" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:39.080 UTC [orderer.consensus.etcdraft] apply -> INFO 043 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:39.081 UTC [orderer.consensus.etcdraft] apply -> INFO 044 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:39.081 UTC [orderer.consensus.etcdraft] apply -> INFO 045 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:40.082 UTC [orderer.consensus.etcdraft] Step -> INFO 046 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:40.093 UTC [orderer.consensus.etcdraft] Step -> INFO 047 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:40.093 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 048 3 became follower at term 2" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:40.093 UTC [orderer.consensus.etcdraft] Step -> INFO 049 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:40.105 UTC [orderer.consensus.etcdraft] run -> INFO 04a raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:40.106 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 04b Raft leader changed: 0 -> 1" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:45.069 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04c Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:47.354 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04d Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:30:57.645 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04e Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:31:01.620 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04f Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:31:05.879 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 050 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:31:11.395 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 051 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:31:16.841 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 052 Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:31:19.652 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 053 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:31:34.980 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 054 Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=3 -orderer2.example.com | "2019-05-02 01:31:35.011 UTC [cauthdsl] deduplicate -> WARN 055 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer2.example.com | "2019-05-02 01:31:35.029 UTC [cauthdsl] deduplicate -> WARN 056 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer0.example.com | "2019-05-02 01:30:30.659 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d8 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.659 UTC [common.channelconfig] validateMSP -> DEBU 0d9 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.659 UTC [msp] newBccspMsp -> DEBU 0da Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.659 UTC [msp] New -> DEBU 0db Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.659 UTC [msp] Setup -> DEBU 0dc Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:30.659 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.188 UTC [common.channelconfig] NewStandardValues -> DEBU 0c8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0c9 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ca Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cb Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cc Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cd Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] NewStandardValues -> DEBU 0ce Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cf Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d0 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d1 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d2 Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d3 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d4 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] NewStandardValues -> DEBU 0d5 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d6 Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] NewStandardValues -> DEBU 0d7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d8 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [common.channelconfig] validateMSP -> DEBU 0d9 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [msp] newBccspMsp -> DEBU 0da Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.189 UTC [msp] New -> DEBU 0db Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp] Setup -> DEBU 0dc Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2128,7 +2018,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.659 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2141,16 +2031,16 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [msp] Validate -> DEBU 0df MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [common.channelconfig] NewStandardValues -> DEBU 0e0 Initializing protos for *channelconfig.ConsortiumProtos" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e1 Processing field: ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [common.channelconfig] NewStandardValues -> DEBU 0e2 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e3 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [common.channelconfig] validateMSP -> DEBU 0e4 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [msp] newBccspMsp -> DEBU 0e5 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [msp] New -> DEBU 0e6 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [msp] Setup -> DEBU 0e7 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [msp.identity] newIdentity -> DEBU 0e8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp] Validate -> DEBU 0df MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [common.channelconfig] NewStandardValues -> DEBU 0e0 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e1 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [common.channelconfig] NewStandardValues -> DEBU 0e2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e3 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [common.channelconfig] validateMSP -> DEBU 0e4 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp] newBccspMsp -> DEBU 0e5 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.190 UTC [msp] New -> DEBU 0e6 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.192 UTC [msp] Setup -> DEBU 0e7 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.193 UTC [msp.identity] newIdentity -> DEBU 0e8 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2165,7 +2055,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.660 UTC [msp.identity] newIdentity -> DEBU 0e9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.193 UTC [msp.identity] newIdentity -> DEBU 0e9 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2179,80 +2069,18 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.661 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0ea Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633613118000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.627 UTC [gossip.discovery] handleAliveMessage -> DEBU 15d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.628 UTC [msp.identity] Verify -> DEBU 15e Verify: digest = 00000000 b6 df f4 ff 4b 2d 6b 6b 19 f1 a6 b0 93 56 a9 36 |....K-kk.....V.6| -peer0.org1.example.com | 00000010 30 f0 0b b5 b4 42 d3 62 d7 85 71 39 e5 61 4c ba |0....B.b..q9.aL.|" -peer0.org1.example.com | "2019-05-02 01:30:37.628 UTC [msp.identity] Verify -> DEBU 15f Verify: sig = 00000000 30 44 02 20 07 d7 de cf 20 49 d7 56 bf 96 cd d4 |0D. .... I.V....| -peer0.org1.example.com | 00000010 58 28 79 db d5 04 62 d1 ad 29 f0 6b 50 eb 49 13 |X(y...b..).kP.I.| -peer0.org1.example.com | 00000020 54 4f 68 b6 02 20 5c 83 f1 ae 69 92 09 ee e9 25 |TOh.. \...i....%| -peer0.org1.example.com | 00000030 55 0a 28 ce e2 9b 60 15 a2 8c 6b d8 d1 e4 68 5d |U.(...`...k...h]| -peer0.org1.example.com | 00000040 ad 34 49 7f 2b c2 |.4I.+.|" -peer0.org1.example.com | "2019-05-02 01:30:37.628 UTC [msp.identity] Verify -> DEBU 160 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:37.628 UTC [msp.identity] Verify -> DEBU 161 Verify: sig = 00000000 30 45 02 21 00 f6 36 fa 89 36 6c e5 7b 22 2e 3b |0E.!..6..6l.{".;| -peer0.org1.example.com | 00000010 70 82 53 49 59 61 19 7f e4 1e 4d f9 a4 59 e6 ca |p.SIYa....M..Y..| -peer0.org1.example.com | 00000020 2c d4 22 01 8b 02 20 39 31 68 c5 e5 8b 32 d4 1b |,."... 91h...2..| -peer0.org1.example.com | 00000030 f9 7a 16 91 36 32 53 4a c7 28 2c 8f 47 88 1d b0 |.z..62SJ.(,.G...| -peer0.org1.example.com | 00000040 7b dc 5f 5c 19 0e 1e |{._\...|" -peer0.org1.example.com | "2019-05-02 01:30:37.629 UTC [gossip.discovery] handleAliveMessage -> DEBU 162 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:37.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 163 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:37.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 164 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:5 " -orderer0.example.com | "2019-05-02 01:30:30.661 UTC [msp] Validate -> DEBU 0eb MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.661 UTC [msp] getCertificationChain -> DEBU 0ec MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.661 UTC [msp] hasOURole -> DEBU 0ed MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:30.662 UTC [msp] getCertificationChain -> DEBU 0ee MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.662 UTC [common.channelconfig] NewStandardValues -> DEBU 0ef Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.662 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.662 UTC [common.channelconfig] validateMSP -> DEBU 0f1 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.662 UTC [msp] newBccspMsp -> DEBU 0f2 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.662 UTC [msp] New -> DEBU 0f3 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.662 UTC [msp] Setup -> DEBU 0f4 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.662 UTC [msp.identity] newIdentity -> DEBU 0f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.193 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0ea Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.194 UTC [msp] Validate -> DEBU 0eb MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.194 UTC [msp] getCertificationChain -> DEBU 0ec MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.194 UTC [msp] hasOURole -> DEBU 0ed MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:06.194 UTC [msp] getCertificationChain -> DEBU 0ee MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.195 UTC [common.channelconfig] NewStandardValues -> DEBU 0ef Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.195 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.195 UTC [common.channelconfig] validateMSP -> DEBU 0f1 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.195 UTC [msp] newBccspMsp -> DEBU 0f2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.195 UTC [msp] New -> DEBU 0f3 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.195 UTC [msp] Setup -> DEBU 0f4 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.201 UTC [msp.identity] newIdentity -> DEBU 0f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2267,7 +2095,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.662 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.201 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2281,234 +2109,185 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.663 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0f7 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.663 UTC [msp] Validate -> DEBU 0f8 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.663 UTC [msp] getCertificationChain -> DEBU 0f9 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [msp] hasOURole -> DEBU 0fa MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [msp] getCertificationChain -> DEBU 0fb MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [msp] Setup -> DEBU 0fc Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [msp] Setup -> DEBU 0fd MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 0fe Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 0ff Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 100 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 101 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 102 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 103 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 104 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 105 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 106 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 107 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 108 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 109 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 10a Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 10b Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [policies] NewManagerImpl -> DEBU 10c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [policies] NewManagerImpl -> DEBU 10d Proposed new policy Admins for Channel/Consortiums" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [policies] GetPolicy -> DEBU 10e Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [policies] NewManagerImpl -> DEBU 10f Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [policies] GetPolicy -> DEBU 110 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [policies] NewManagerImpl -> DEBU 111 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 113 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 114 Adding to config map: [Group] /Channel/Consortiums" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 115 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 116 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 117 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 118 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 119 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 11a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 11b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 11c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 11d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 11e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 11f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 120 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 121 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 122 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 123 Adding to config map: [Policy] /Channel/Consortiums/Admins" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 124 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 125 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 126 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [orderer.common.server] createLedgerFactory -> DEBU 13a Ledger dir: /var/hyperledger/production/orderer" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [kvledger.util] CreateDirIfMissing -> DEBU 13b CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" -orderer0.example.com | "2019-05-02 01:30:30.667 UTC [kvledger.util] logDirStatus -> DEBU 13c Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" -orderer0.example.com | "2019-05-02 01:30:30.668 UTC [kvledger.util] logDirStatus -> DEBU 13d After creating dir - [/var/hyperledger/production/orderer/index/] exists" -orderer0.example.com | "2019-05-02 01:30:30.692 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 13e Bootstrapping because no existing chains" -orderer0.example.com | "2019-05-02 01:30:30.692 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 13f Selected bootstrap block, because system channel last config block is nil" -orderer0.example.com | "2019-05-02 01:30:30.693 UTC [common.channelconfig] NewStandardValues -> DEBU 140 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:30.693 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:30.693 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:30.693 UTC [common.channelconfig] initializeProtosStruct -> DEBU 143 Processing field: OrdererAddresses" -peer0.org1.example.com | "2019-05-02 01:30:37.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 165 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:5 " -peer0.org1.example.com | "2019-05-02 01:30:37.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 166 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:37.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 167 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.629 UTC [gossip.discovery] handleAliveMessage -> DEBU 168 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:37.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU 169 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:38.455 UTC [gossip.gossip] handleMessage -> DEBU 16a Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10671959488972110286 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:38.455 UTC [gossip.pull] HandleMessage -> DEBU 16b GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10671959488972110286 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:38.455 UTC [gossip.gossip] handleMessage -> DEBU 16c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:38.455 UTC [gossip.pull] SendRes -> DEBU 16d Sending 1 IDENTITY_MSG items to 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:38.459 UTC [gossip.gossip] handleMessage -> DEBU 16e Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:38.459 UTC [gossip.gossip] handleMessage -> DEBU 16f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:38.459 UTC [gossip.discovery] handleMsgFromComm -> DEBU 170 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:38.460 UTC [msp.identity] Verify -> DEBU 171 Verify: digest = 00000000 a6 61 86 87 ab 47 e1 f8 2f 5a da 75 53 13 d3 44 |.a...G../Z.uS..D| -peer0.org1.example.com | 00000010 24 88 9f a8 5e 0e af 8e a1 30 2b 60 e3 8f 60 03 |$...^....0+`..`.|" -peer0.org1.example.com | "2019-05-02 01:30:38.460 UTC [msp.identity] Verify -> DEBU 172 Verify: sig = 00000000 30 44 02 20 52 37 47 aa 1d 60 b2 59 8a 96 65 b9 |0D. R7G..`.Y..e.| -peer0.org1.example.com | 00000010 7b 15 c7 4f 75 34 7b 68 ee b1 5e e0 69 6b 01 b2 |{..Ou4{h..^.ik..| -peer0.org1.example.com | 00000020 3e 1a 03 64 02 20 51 d6 c2 6a 7e 6e db 92 ce b4 |>..d. Q..j~n....| -peer0.org1.example.com | 00000030 f0 a1 cb fe 02 63 01 a7 4a a2 d3 c6 89 1e 55 2f |.....c..J.....U/| -peer0.org1.example.com | 00000040 56 52 0f e2 79 8b |VR..y.|" -peer0.org1.example.com | "2019-05-02 01:30:38.460 UTC [msp.identity] Verify -> DEBU 173 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:38.460 UTC [msp.identity] Verify -> DEBU 174 Verify: sig = 00000000 30 45 02 21 00 f8 34 f1 cd db ca cc ab 41 35 0b |0E.!..4......A5.| -peer0.org1.example.com | 00000010 8c 9c aa 35 fd 45 8a fc ad 07 53 e0 bd ca 31 eb |...5.E....S...1.| -peer0.org1.example.com | 00000020 3d 01 f3 fa bd 02 20 0b 8f bc 7e 55 0e bf bf 08 |=..... ...~U....| -peer0.org1.example.com | 00000030 ec ae e1 28 47 54 95 b8 11 be b4 04 71 25 0a ba |...(GT......q%..| -peer0.org1.example.com | 00000040 7f 7b 62 4a a0 ae 66 |.{bJ..f|" -peer0.org1.example.com | "2019-05-02 01:30:38.461 UTC [gossip.discovery] handleAliveMessage -> DEBU 175 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:38.461 UTC [gossip.discovery] learnExistingMembers -> DEBU 176 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:38.461 UTC [gossip.discovery] learnExistingMembers -> DEBU 177 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:6 " -peer0.org1.example.com | "2019-05-02 01:30:38.461 UTC [gossip.discovery] learnExistingMembers -> DEBU 178 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 144 Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 145 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] NewStandardValues -> DEBU 146 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 147 Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 148 Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 149 Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14a Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14b Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14c Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] NewStandardValues -> DEBU 14d Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] NewStandardValues -> DEBU 14f Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 150 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [common.channelconfig] validateMSP -> DEBU 151 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [msp] newBccspMsp -> DEBU 152 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [msp] New -> DEBU 153 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [msp] Setup -> DEBU 154 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:30.694 UTC [msp.identity] newIdentity -> DEBU 155 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0f7 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] Validate -> DEBU 0f8 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] getCertificationChain -> DEBU 0f9 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] hasOURole -> DEBU 0fa MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] getCertificationChain -> DEBU 0fb MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] Setup -> DEBU 0fc Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [msp] Setup -> DEBU 0fd MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 0fe Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 0ff Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 147 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 148 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:4 " +peer0.org1.example.com | "2019-05-02 09:27:13.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 149 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:4 " +peer0.org1.example.com | "2019-05-02 09:27:13.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:13.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 14b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.104 UTC [gossip.discovery] handleAliveMessage -> DEBU 14c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.141 UTC [gossip.gossip] handleMessage -> DEBU 14e Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.141 UTC [gossip.pull] HandleMessage -> DEBU 14f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.141 UTC [gossip.pull] SendDigest -> DEBU 150 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:13.141 UTC [gossip.gossip] handleMessage -> DEBU 151 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.143 UTC [gossip.gossip] handleMessage -> DEBU 152 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 100 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 101 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 102 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 103 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 104 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 105 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 106 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 107 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 108 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 109 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10a Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10b Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10c Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10d Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10e Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] GetPolicy -> DEBU 10f Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 110 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] GetPolicy -> DEBU 111 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 113 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 114 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 115 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 116 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 117 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 118 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 119 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 11f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 120 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 121 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 122 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 123 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 124 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 125 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 126 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:06.205 UTC [orderer.common.server] createLedgerFactory -> DEBU 13a Ledger dir: /var/hyperledger/production/orderer" +orderer0.example.com | "2019-05-02 09:27:06.205 UTC [kvledger.util] CreateDirIfMissing -> DEBU 13b CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +orderer0.example.com | "2019-05-02 09:27:06.205 UTC [kvledger.util] logDirStatus -> DEBU 13c Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +orderer0.example.com | "2019-05-02 09:27:06.205 UTC [kvledger.util] logDirStatus -> DEBU 13d After creating dir - [/var/hyperledger/production/orderer/index/] exists" +orderer0.example.com | "2019-05-02 09:27:06.231 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 13e Bootstrapping because no existing chains" +orderer0.example.com | "2019-05-02 09:27:06.232 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 13f Selected bootstrap block, because system channel last config block is nil" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 140 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 143 Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 144 Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 145 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 146 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 147 Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 148 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 149 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14a Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14b Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14c Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 14d Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 14f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.236 UTC [common.channelconfig] initializeProtosStruct -> DEBU 150 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.237 UTC [common.channelconfig] validateMSP -> DEBU 151 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.237 UTC [msp] newBccspMsp -> DEBU 152 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.237 UTC [msp] New -> DEBU 153 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.237 UTC [msp] Setup -> DEBU 154 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:06.238 UTC [msp.identity] newIdentity -> DEBU 155 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2522,7 +2301,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.695 UTC [msp.identity] newIdentity -> DEBU 156 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.238 UTC [msp.identity] newIdentity -> DEBU 156 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2535,16 +2314,16 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.695 UTC [msp] Validate -> DEBU 157 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.695 UTC [common.channelconfig] NewStandardValues -> DEBU 158 Initializing protos for *channelconfig.ConsortiumProtos" -orderer0.example.com | "2019-05-02 01:30:30.695 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159 Processing field: ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:30.695 UTC [common.channelconfig] NewStandardValues -> DEBU 15a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.695 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.695 UTC [common.channelconfig] validateMSP -> DEBU 15c Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.695 UTC [msp] newBccspMsp -> DEBU 15d Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.695 UTC [msp] New -> DEBU 15e Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.695 UTC [msp] Setup -> DEBU 15f Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.696 UTC [msp.identity] newIdentity -> DEBU 160 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.239 UTC [msp] Validate -> DEBU 157 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.239 UTC [common.channelconfig] NewStandardValues -> DEBU 158 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-05-02 09:27:06.239 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:06.239 UTC [common.channelconfig] NewStandardValues -> DEBU 15a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.239 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.239 UTC [common.channelconfig] validateMSP -> DEBU 15c Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.239 UTC [msp] newBccspMsp -> DEBU 15d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.239 UTC [msp] New -> DEBU 15e Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.239 UTC [msp] Setup -> DEBU 15f Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.240 UTC [msp.identity] newIdentity -> DEBU 160 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2559,7 +2338,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.696 UTC [msp.identity] newIdentity -> DEBU 161 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.240 UTC [msp.identity] newIdentity -> DEBU 161 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2573,98 +2352,21 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.696 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 162 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.696 UTC [msp] Validate -> DEBU 163 MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.696 UTC [msp] getCertificationChain -> DEBU 164 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.696 UTC [msp] hasOURole -> DEBU 165 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:30.696 UTC [msp] getCertificationChain -> DEBU 166 MSP Org1MSP getting certification chain" -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:6 " -peer0.org1.example.com | "2019-05-02 01:30:38.461 UTC [gossip.discovery] learnExistingMembers -> DEBU 179 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:38.461 UTC [gossip.discovery] learnExistingMembers -> DEBU 17a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:38.461 UTC [gossip.discovery] handleAliveMessage -> DEBU 17b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:38.461 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:38.613 UTC [msp.identity] Sign -> DEBU 17d Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:30:38.614 UTC [msp.identity] Sign -> DEBU 17e Sign: digest: E0014447DAB4F1831CCC952DC5F61D59C1D33398B9933D534A2FC89B90F9276E " -peer0.org1.example.com | "2019-05-02 01:30:38.614 UTC [msp.identity] Sign -> DEBU 17f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:38.614 UTC [msp.identity] Sign -> DEBU 180 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:38.614 UTC [gossip.discovery] periodicalSendAlive -> DEBU 181 Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:30:38.616 UTC [gossip.comm] Send -> DEBU 182 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633613118000 seq_num:6 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:38.616 UTC [gossip.comm] sendToEndpoint -> DEBU 183 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633613118000 seq_num:6 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:38.616 UTC [gossip.comm] sendToEndpoint -> DEBU 184 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:38.616 UTC [gossip.pull] SendReq -> DEBU 185 Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:38.617 UTC [gossip.comm] Send -> DEBU 186 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 9065475227465345842 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:38.618 UTC [gossip.comm] sendToEndpoint -> DEBU 187 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 9065475227465345842 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:38.618 UTC [gossip.comm] sendToEndpoint -> DEBU 188 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:38.620 UTC [gossip.gossip] handleMessage -> DEBU 189 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 9065475227465345842, Envelope: 960 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:38.620 UTC [msp.identity] Verify -> DEBU 18a Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| -peer0.org1.example.com | 00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|" -peer0.org1.example.com | "2019-05-02 01:30:38.620 UTC [msp.identity] Verify -> DEBU 18b Verify: sig = 00000000 30 44 02 20 14 32 fb 10 5c 7b f4 1f 9b 72 7c f5 |0D. .2..\{...r|.| -peer0.org1.example.com | 00000010 cc 48 ca 41 76 e9 9c cb d3 9b d2 17 34 88 fb 59 |.H.Av.......4..Y| -peer0.org1.example.com | 00000020 17 62 a0 0a 02 20 6e 1d 72 bd 9c e0 55 17 3a 5e |.b... n.r...U.:^| -peer0.org1.example.com | 00000030 be 65 94 35 38 3c 50 8d 63 1a 0b eb e6 8b 9a bf |.e.58 DEBU 18c GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 9065475227465345842, Envelope: 960 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:38.621 UTC [gossip.gossip] func2 -> DEBU 18d Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -peer0.org1.example.com | "2019-05-02 01:30:38.621 UTC [gossip.pull] HandleMessage -> DEBU 18e Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" -peer0.org1.example.com | "2019-05-02 01:30:38.621 UTC [gossip.gossip] handleMessage -> DEBU 18f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:40.731 UTC [endorser] ProcessProposal -> DEBU 190 Entering: request from 192.168.240.9:41182" -orderer0.example.com | "2019-05-02 01:30:30.697 UTC [common.channelconfig] NewStandardValues -> DEBU 167 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.697 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.697 UTC [common.channelconfig] validateMSP -> DEBU 169 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.697 UTC [msp] newBccspMsp -> DEBU 16a Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.697 UTC [msp] New -> DEBU 16b Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.697 UTC [msp] Setup -> DEBU 16c Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.697 UTC [msp.identity] newIdentity -> DEBU 16d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.259 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 162 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.259 UTC [msp] Validate -> DEBU 163 MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.261 UTC [msp] getCertificationChain -> DEBU 164 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.261 UTC [msp] hasOURole -> DEBU 165 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:06.261 UTC [msp] getCertificationChain -> DEBU 166 MSP Org1MSP getting certification chain" +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +orderer0.example.com | "2019-05-02 09:27:06.263 UTC [common.channelconfig] NewStandardValues -> DEBU 167 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +orderer0.example.com | "2019-05-02 09:27:06.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: MSP" +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | "2019-05-02 09:27:06.263 UTC [common.channelconfig] validateMSP -> DEBU 169 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.263 UTC [msp] newBccspMsp -> DEBU 16a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.263 UTC [msp] New -> DEBU 16b Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.263 UTC [msp] Setup -> DEBU 16c Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.264 UTC [msp.identity] newIdentity -> DEBU 16d Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2679,7 +2381,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.697 UTC [msp.identity] newIdentity -> DEBU 16e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.264 UTC [msp.identity] newIdentity -> DEBU 16e Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2693,195 +2395,197 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16f Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [msp] Validate -> DEBU 170 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [msp] getCertificationChain -> DEBU 171 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [msp] hasOURole -> DEBU 172 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [msp] getCertificationChain -> DEBU 173 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [msp] Setup -> DEBU 174 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [msp] Setup -> DEBU 175 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 176 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 177 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 178 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 179 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 17a Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 17b Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 17c Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 17d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 181 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 183 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 185 Proposed new policy Admins for Channel/Consortiums" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 186 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] GetPolicy -> DEBU 187 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 188 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] GetPolicy -> DEBU 189 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [common.configtx] addToMap -> DEBU 18b Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:30.699 UTC [common.configtx] addToMap -> DEBU 18c Adding to config map: [Group] /Channel/Consortiums" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 18d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 18e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 18f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 190 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 191 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 192 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Policy] /Channel/Consortiums/Admins" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:30.701 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b2 Obtaining default signing identity" -orderer0.example.com | "2019-05-02 01:30:30.714 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1b3 Booted with a genesis block, replication isn't an option" -orderer0.example.com | "2019-05-02 01:30:30.732 UTC [orderer.common.server] initializeServerConfig -> INFO 1b4 Starting orderer with TLS enabled" -orderer0.example.com | "2019-05-02 01:30:30.733 UTC [orderer.common.server] configureClusterListener -> INFO 1b5 Cluster listener is not configured, defaulting to use the general listener on port 7050" -orderer0.example.com | "2019-05-02 01:30:30.736 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1b6 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " -orderer0.example.com | "2019-05-02 01:30:30.736 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1b7 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" -orderer0.example.com | "2019-05-02 01:30:30.736 UTC [kvledger.util] logDirStatus -> DEBU 1b8 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" -orderer0.example.com | "2019-05-02 01:30:30.736 UTC [kvledger.util] logDirStatus -> DEBU 1b9 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" -orderer0.example.com | "2019-05-02 01:30:30.736 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ba Getting block information from block storage" -orderer0.example.com | "2019-05-02 01:30:30.736 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bb Retrieving checkpoint info from block files" -orderer0.example.com | "2019-05-02 01:30:30.737 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bc retrieveLastFileSuffix()" -orderer0.example.com | "2019-05-02 01:30:30.737 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bd retrieveLastFileSuffix() - biggestFileNum = -1" -orderer0.example.com | "2019-05-02 01:30:30.737 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1be Last file number found = -1" -orderer0.example.com | "2019-05-02 01:30:30.737 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bf No block file found" -orderer0.example.com | "2019-05-02 01:30:30.737 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1c0 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0003c4ba0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -orderer0.example.com | "2019-05-02 01:30:30.742 UTC [fsblkstorage] newBlockIndex -> DEBU 1c1 newBlockIndex() - indexItems:[[BlockNum]]" -orderer0.example.com | "2019-05-02 01:30:30.748 UTC [fsblkstorage] indexBlock -> DEBU 1c2 Indexing block [blockNum=0, blockHash=[]byte{0xea, 0xac, 0xc2, 0xd4, 0x83, 0xd6, 0xd8, 0xe7, 0x3f, 0x39, 0x9e, 0xc, 0x2c, 0xef, 0xff, 0xb5, 0x7b, 0x43, 0x9a, 0xce, 0xf6, 0x32, 0x71, 0x91, 0x54, 0x49, 0x8b, 0xa7, 0xc7, 0x38, 0x3e, 0xb1} txOffsets= -orderer0.example.com | txId=cb62c9396856dd18a3dd67c3707e8a29cd0e1b9a900cf1444524dcd70fb6cffd locPointer=offset=39, bytesLength=18371 +orderer0.example.com | "2019-05-02 09:27:06.265 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16f Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.265 UTC [msp] Validate -> DEBU 170 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.265 UTC [msp] getCertificationChain -> DEBU 171 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.266 UTC [msp] hasOURole -> DEBU 172 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:06.270 UTC [msp] getCertificationChain -> DEBU 173 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.271 UTC [msp] Setup -> DEBU 174 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:06.271 UTC [msp] Setup -> DEBU 175 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:06.271 UTC [policies] NewManagerImpl -> DEBU 176 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.273 UTC [policies] NewManagerImpl -> DEBU 177 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.275 UTC [policies] NewManagerImpl -> DEBU 178 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 179 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 181 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 183 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 185 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] GetPolicy -> DEBU 186 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:06.277 UTC [policies] GetPolicy -> DEBU 188 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18b Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18c Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.143 UTC [gossip.gossip] handleMessage -> DEBU 153 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU 154 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 155 Verify: digest = 00000000 4f 61 18 9a 46 50 55 1f 38 af 18 76 5f 38 f5 78 |Oa..FPU.8..v_8.x| +peer0.org1.example.com | 00000010 eb b8 ab 55 16 51 25 db b9 14 fe db 42 d0 c8 c9 |...U.Q%.....B...|" +peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 156 Verify: sig = 00000000 30 44 02 20 0a c2 bb 53 a0 6e 65 aa cc da 79 c4 |0D. ...S.ne...y.| +peer0.org1.example.com | 00000010 1e 77 55 82 bd 1f 4c 33 01 29 c3 42 ee a9 45 f5 |.wU...L3.).B..E.| +peer0.org1.example.com | 00000020 d9 99 72 9c 02 20 1c 85 a4 5c af 94 66 a5 95 b8 |..r.. ...\..f...| +peer0.org1.example.com | 00000030 19 2b 24 f1 13 66 98 dd d3 87 74 cb 3e 5b c5 f1 |.+$..f....t.>[..| +peer0.org1.example.com | 00000040 48 b4 9b 10 c4 dd |H.....|" +peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 157 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 158 Verify: sig = 00000000 30 45 02 21 00 d7 82 7f 5d c0 1e 8d 93 95 50 45 |0E.!....].....PE| +peer0.org1.example.com | 00000010 4a 09 a7 2b 4b 3b ba 73 98 09 78 78 37 36 c2 86 |J..+K;.s..xx76..| +peer0.org1.example.com | 00000020 b9 0a af 95 2d 02 20 50 4b dc c2 36 24 eb 50 7d |....-. PK..6$.P}| +peer0.org1.example.com | 00000030 7d d2 36 23 48 71 f0 8a 02 ad 47 a1 f6 25 00 7a |}.6#Hq....G..%.z| +peer0.org1.example.com | 00000040 79 98 36 30 e9 eb 1c |y.60...|" +peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [gossip.discovery] handleAliveMessage -> DEBU 159 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 15a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 15b updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 " +peer0.org1.example.com | "2019-05-02 09:27:13.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 15c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 190 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 191 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 192 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:06.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b2 Obtaining default signing identity" +orderer0.example.com | "2019-05-02 09:27:06.295 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1b3 Booted with a genesis block, replication isn't an option" +orderer0.example.com | "2019-05-02 09:27:06.312 UTC [orderer.common.server] initializeServerConfig -> INFO 1b4 Starting orderer with TLS enabled" +orderer0.example.com | "2019-05-02 09:27:06.313 UTC [orderer.common.server] configureClusterListener -> INFO 1b5 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1b6 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +orderer0.example.com | "2019-05-02 09:27:06.316 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1b7 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +orderer0.example.com | "2019-05-02 09:27:06.316 UTC [kvledger.util] logDirStatus -> DEBU 1b8 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +orderer0.example.com | "2019-05-02 09:27:06.316 UTC [kvledger.util] logDirStatus -> DEBU 1b9 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ba Getting block information from block storage" +orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bb Retrieving checkpoint info from block files" +orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bc retrieveLastFileSuffix()" +orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bd retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-05-02 09:27:06.316 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1be Last file number found = -1" +orderer0.example.com | "2019-05-02 09:27:06.317 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bf No block file found" +orderer0.example.com | "2019-05-02 09:27:06.317 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1c0 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0003f28a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-05-02 09:27:06.322 UTC [fsblkstorage] newBlockIndex -> DEBU 1c1 newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-05-02 09:27:06.327 UTC [fsblkstorage] indexBlock -> DEBU 1c2 Indexing block [blockNum=0, blockHash=[]byte{0x90, 0xf3, 0x5b, 0xf6, 0x65, 0xcc, 0xb0, 0x39, 0x2, 0xab, 0x1f, 0x8, 0xbd, 0x90, 0x1c, 0xde, 0x6b, 0xcd, 0x74, 0xd9, 0xda, 0x8f, 0xbb, 0xba, 0xde, 0x4c, 0x4b, 0x31, 0xcd, 0x28, 0x3, 0x78} txOffsets= +orderer0.example.com | txId=10ff1805e27e581e5aec2a19a7560dc3993ce3082d43b002f1bc22be30f352f1 locPointer=offset=39, bytesLength=18371 orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:30:30.751 UTC [fsblkstorage] updateCheckpoint -> DEBU 1c3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18415], isChainEmpty=[false], lastBlockNumber=[0]" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] NewStandardValues -> DEBU 1c4 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: HashingAlgorithm" -peer0.org1.example.com | "2019-05-02 01:30:40.731 UTC [protoutils] ValidateProposalMessage -> DEBU 191 ValidateProposalMessage starts for signed proposal 0xc002311590" -peer0.org1.example.com | "2019-05-02 01:30:40.731 UTC [protoutils] validateChannelHeader -> DEBU 192 validateChannelHeader info: header type 1" -peer0.org1.example.com | "2019-05-02 01:30:40.732 UTC [protoutils] checkSignatureFromCreator -> DEBU 193 begin" -peer0.org1.example.com | "2019-05-02 01:30:40.732 UTC [msp] DeserializeIdentity -> DEBU 194 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:40.732 UTC [msp.identity] newIdentity -> DEBU 195 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.733 UTC [protoutils] checkSignatureFromCreator -> DEBU 196 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:30:40.733 UTC [msp] Validate -> DEBU 197 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:40.734 UTC [protoutils] checkSignatureFromCreator -> DEBU 198 creator is valid" -peer0.org1.example.com | "2019-05-02 01:30:40.734 UTC [msp.identity] Verify -> DEBU 199 Verify: digest = 00000000 6f 78 a3 d9 de ea c6 08 34 f4 b1 d7 a1 ca db 13 |ox......4.......| -peer0.org1.example.com | 00000010 ff c4 ac ff c2 f0 b8 ca dc da 80 6d 63 81 a2 72 |...........mc..r|" -peer0.org1.example.com | "2019-05-02 01:30:40.735 UTC [msp.identity] Verify -> DEBU 19a Verify: sig = 00000000 30 45 02 21 00 df 83 90 76 d2 20 1b 8e 8a 24 cc |0E.!....v. ...$.| -peer0.org1.example.com | 00000010 f0 d4 f9 77 b3 ba e5 12 df a3 85 71 53 c9 2d 02 |...w.......qS.-.| -peer0.org1.example.com | 00000020 95 b4 bd 22 90 02 20 30 28 68 bf 64 12 48 65 52 |...".. 0(h.d.HeR| -peer0.org1.example.com | 00000030 04 d2 aa 54 ac 6c 68 c2 ac 77 ad bb d6 12 26 dd |...T.lh..w....&.| -peer0.org1.example.com | 00000040 c8 7e 9a 42 f6 d3 89 |.~.B...|" -peer0.org1.example.com | "2019-05-02 01:30:40.735 UTC [protoutils] checkSignatureFromCreator -> DEBU 19b exits successfully" -peer0.org1.example.com | "2019-05-02 01:30:40.735 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19c validateChaincodeProposalMessage starts for proposal 0xc000429ab0, header 0xc002311ea0" -peer0.org1.example.com | "2019-05-02 01:30:40.735 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19d validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:30:40.736 UTC [endorser] preProcess -> DEBU 19e [][dd1fa066] processing txid: dd1fa066e4336fdb8c0bfafb034fe06984b31b027331fc8a6f9955ca29e6dce8" -peer0.org1.example.com | "2019-05-02 01:30:40.736 UTC [endorser] SimulateProposal -> DEBU 19f [][dd1fa066] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:30:40.737 UTC [endorser] callChaincode -> INFO 1a0 [][dd1fa066] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:30:40.737 UTC [chaincode] Execute -> DEBU 1a1 Entry" -peer0.org1.example.com | "2019-05-02 01:30:40.737 UTC [cscc] Invoke -> DEBU 1a2 Invoke function: JoinChain" -peer0.org1.example.com | "2019-05-02 01:30:40.738 UTC [common.channelconfig] NewStandardValues -> DEBU 1a3 Initializing protos for *channelconfig.ChannelProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a4 Processing field: HashingAlgorithm" -peer0.org1.example.com | "2019-05-02 01:30:40.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a5 Processing field: BlockDataHashingStructure" -peer0.org1.example.com | "2019-05-02 01:30:40.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a6 Processing field: OrdererAddresses" -peer0.org1.example.com | "2019-05-02 01:30:40.739 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a7 Processing field: Consortium" -peer0.org1.example.com | "2019-05-02 01:30:40.739 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a8 Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:40.739 UTC [common.channelconfig] NewStandardValues -> DEBU 1a9 Initializing protos for *channelconfig.ApplicationProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.739 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1aa Processing field: ACLs" -peer0.org1.example.com | "2019-05-02 01:30:40.739 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ab Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 1ac Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ad Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 1ae Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1af Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.740 UTC [common.channelconfig] Validate -> DEBU 1b0 Anchor peers for org Org1MSP are " -peer0.org1.example.com | "2019-05-02 01:30:40.740 UTC [common.channelconfig] validateMSP -> DEBU 1b1 Setting up MSP for org Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.741 UTC [msp] newBccspMsp -> DEBU 1b2 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.741 UTC [msp] New -> DEBU 1b3 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.741 UTC [msp] Setup -> DEBU 1b4 Setting up MSP instance Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.742 UTC [msp.identity] newIdentity -> DEBU 1b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.743 UTC [msp.identity] newIdentity -> DEBU 1b6 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c8 Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] NewStandardValues -> DEBU 1ca Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:30.752 UTC [common.channelconfig] NewStandardValues -> DEBU 1d3 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.753 UTC [common.channelconfig] validateMSP -> DEBU 1d5 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.753 UTC [msp] newBccspMsp -> DEBU 1d6 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.753 UTC [msp] New -> DEBU 1d7 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.753 UTC [msp] Setup -> DEBU 1d8 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:30.753 UTC [msp.identity] newIdentity -> DEBU 1d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.331 UTC [fsblkstorage] updateCheckpoint -> DEBU 1c3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18415], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] NewStandardValues -> DEBU 1c4 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c8 Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] NewStandardValues -> DEBU 1ca Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.333 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:06.333 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:06.333 UTC [common.channelconfig] NewStandardValues -> DEBU 1d3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.333 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.333 UTC [common.channelconfig] validateMSP -> DEBU 1d5 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.334 UTC [msp] newBccspMsp -> DEBU 1d6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.334 UTC [msp] New -> DEBU 1d7 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.334 UTC [msp] Setup -> DEBU 1d8 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:06.335 UTC [msp.identity] newIdentity -> DEBU 1d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2895,7 +2599,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.754 UTC [msp.identity] newIdentity -> DEBU 1da Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.335 UTC [msp.identity] newIdentity -> DEBU 1da Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2908,16 +2612,16 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.754 UTC [msp] Validate -> DEBU 1db MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.754 UTC [common.channelconfig] NewStandardValues -> DEBU 1dc Initializing protos for *channelconfig.ConsortiumProtos" -orderer0.example.com | "2019-05-02 01:30:30.755 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:30.755 UTC [common.channelconfig] NewStandardValues -> DEBU 1de Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.755 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1df Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.755 UTC [common.channelconfig] validateMSP -> DEBU 1e0 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.755 UTC [msp] newBccspMsp -> DEBU 1e1 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.755 UTC [msp] New -> DEBU 1e2 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.755 UTC [msp] Setup -> DEBU 1e3 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.756 UTC [msp.identity] newIdentity -> DEBU 1e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.335 UTC [msp] Validate -> DEBU 1db MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.335 UTC [common.channelconfig] NewStandardValues -> DEBU 1dc Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-05-02 09:27:06.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:06.335 UTC [common.channelconfig] NewStandardValues -> DEBU 1de Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1df Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.336 UTC [common.channelconfig] validateMSP -> DEBU 1e0 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp] newBccspMsp -> DEBU 1e1 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp] New -> DEBU 1e2 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp] Setup -> DEBU 1e3 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp.identity] newIdentity -> DEBU 1e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2932,7 +2636,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.757 UTC [msp.identity] newIdentity -> DEBU 1e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp.identity] newIdentity -> DEBU 1e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2946,18 +2650,461 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.758 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e6 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.758 UTC [msp] Validate -> DEBU 1e7 MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.758 UTC [msp] getCertificationChain -> DEBU 1e8 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.758 UTC [msp] hasOURole -> DEBU 1e9 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:30.758 UTC [msp] getCertificationChain -> DEBU 1ea MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.759 UTC [common.channelconfig] NewStandardValues -> DEBU 1eb Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.759 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ec Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.759 UTC [common.channelconfig] validateMSP -> DEBU 1ed Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.759 UTC [msp] newBccspMsp -> DEBU 1ee Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.759 UTC [msp] New -> DEBU 1ef Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.759 UTC [msp] Setup -> DEBU 1f0 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.759 UTC [msp.identity] newIdentity -> DEBU 1f1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e6 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.336 UTC [msp] Validate -> DEBU 1e7 MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] getCertificationChain -> DEBU 1e8 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] hasOURole -> DEBU 1e9 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] getCertificationChain -> DEBU 1ea MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.337 UTC [common.channelconfig] NewStandardValues -> DEBU 1eb Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.337 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ec Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.337 UTC [common.channelconfig] validateMSP -> DEBU 1ed Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] newBccspMsp -> DEBU 1ee Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] New -> DEBU 1ef Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp] Setup -> DEBU 1f0 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.337 UTC [msp.identity] newIdentity -> DEBU 1f1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 " +peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.discovery] handleAliveMessage -> DEBU 15f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.discovery] handleMsgFromComm -> DEBU 160 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.discovery] sendMemResponse -> DEBU 161 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 162 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 163 Sign: digest: 72A9295ADCC55E1ADAF8686ABEC8A9762EEF9ABBF0F0BF0809368B567368C629 " +peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 164 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 165 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:13.145 UTC [gossip.comm] Send -> DEBU 166 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:13.146 UTC [gossip.comm] sendToEndpoint -> DEBU 167 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:13.146 UTC [gossip.comm] sendToEndpoint -> DEBU 168 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:13.146 UTC [gossip.discovery] sendMemResponse -> DEBU 169 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:14.059 UTC [msp.identity] Sign -> DEBU 16a Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:14.060 UTC [msp.identity] Sign -> DEBU 16b Sign: digest: 89C366B5701489D679D2777974B03C747D0B532CCABE350CD605CEEE397A95D8 " +peer0.org1.example.com | "2019-05-02 09:27:14.061 UTC [msp.identity] Sign -> DEBU 16c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:14.061 UTC [msp.identity] Sign -> DEBU 16d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:14.061 UTC [gossip.discovery] periodicalSendAlive -> DEBU 16e Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:14.064 UTC [gossip.pull] SendReq -> DEBU 16f Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:14.064 UTC [gossip.comm] Send -> DEBU 170 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:14.064 UTC [gossip.comm] sendToEndpoint -> DEBU 171 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:14.064 UTC [gossip.comm] sendToEndpoint -> DEBU 172 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:14.066 UTC [gossip.gossip] handleMessage -> DEBU 173 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8171991975260542063, Envelope: 960 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:14.066 UTC [msp.identity] Verify -> DEBU 174 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| +peer0.org1.example.com | 00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|" +peer0.org1.example.com | "2019-05-02 09:27:14.067 UTC [msp.identity] Verify -> DEBU 175 Verify: sig = 00000000 30 44 02 20 47 67 e7 6b 08 b7 e8 66 20 94 39 a3 |0D. Gg.k...f .9.| +peer0.org1.example.com | 00000010 f4 f9 e3 c7 9e 9a 6f 94 6b 49 25 8e 5c 91 a8 c1 |......o.kI%.\...| +peer0.org1.example.com | 00000020 86 69 ca b6 02 20 56 6e 45 f4 4e 9a a8 e1 b1 a7 |.i... VnE.N.....| +peer0.org1.example.com | 00000030 a5 73 b7 d1 a6 5f 6d 59 d4 9a a5 ef 5b 6a 60 e1 |.s..._mY....[j`.| +peer0.org1.example.com | 00000040 15 38 16 55 9a ef |.8.U..|" +peer0.org1.example.com | "2019-05-02 09:27:14.067 UTC [gossip.pull] HandleMessage -> DEBU 176 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8171991975260542063, Envelope: 960 bytes, Signature: 0 bytes" +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp.identity] newIdentity -> DEBU 1f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1f3 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp] Validate -> DEBU 1f4 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp] getCertificationChain -> DEBU 1f5 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp] hasOURole -> DEBU 1f6 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:06.338 UTC [msp] getCertificationChain -> DEBU 1f7 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [msp] Setup -> DEBU 1f8 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [msp] Setup -> DEBU 1f9 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 205 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 206 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 208 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 209 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 20a Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] GetPolicy -> DEBU 20b Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 20c Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] GetPolicy -> DEBU 20d Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 20e Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:14.068 UTC [gossip.gossip] func2 -> DEBU 177 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-05-02 09:27:14.068 UTC [gossip.pull] HandleMessage -> DEBU 178 Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" +peer0.org1.example.com | "2019-05-02 09:27:14.069 UTC [gossip.gossip] handleMessage -> DEBU 179 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:14.070 UTC [gossip.comm] Send -> DEBU 17a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:6 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:14.071 UTC [gossip.comm] sendToEndpoint -> DEBU 17b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:6 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:14.071 UTC [gossip.comm] sendToEndpoint -> DEBU 17c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:14.112 UTC [gossip.gossip] handleMessage -> DEBU 17d Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 17703106220587596212 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:14.112 UTC [gossip.pull] HandleMessage -> DEBU 17e GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 17703106220587596212 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:14.113 UTC [gossip.gossip] handleMessage -> DEBU 17f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:14.113 UTC [gossip.pull] SendRes -> DEBU 180 Sending 1 IDENTITY_MSG items to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:14.114 UTC [gossip.gossip] handleMessage -> DEBU 181 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +orderer0.example.com | "2019-05-02 09:27:06.340 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.350 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:27:06.350 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:06.350 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:14.115 UTC [gossip.gossip] handleMessage -> DEBU 182 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:14.115 UTC [gossip.discovery] handleMsgFromComm -> DEBU 183 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 184 Verify: digest = 00000000 98 97 02 8b 69 77 28 e9 ad bb 36 09 85 63 3b 96 |....iw(...6..c;.| +peer0.org1.example.com | 00000010 ae d1 54 0d e4 9e 03 e8 9e cb c4 70 61 db a5 f4 |..T........pa...|" +peer0.org1.example.com | "2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 185 Verify: sig = 00000000 30 45 02 21 00 cb 78 f9 34 bb 57 41 89 ec a0 c1 |0E.!..x.4.WA....| +peer0.org1.example.com | 00000010 67 af c4 27 e9 34 0c 85 b2 cf a8 39 88 a5 4b 7b |g..'.4.....9..K{| +peer0.org1.example.com | 00000020 80 27 ad 21 da 02 20 47 8e 9f bf 19 b7 0b 94 5e |.'.!.. G.......^| +peer0.org1.example.com | 00000030 a2 d6 55 ac 59 0c ef db 53 07 3e 15 19 b2 6d 1b |..U.Y...S.>...m.| +peer0.org1.example.com | 00000040 cd 74 d4 8d 5b ab d1 |.t..[..|" +peer0.org1.example.com | "2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 186 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 187 Verify: sig = 00000000 30 44 02 20 4f 0c 0a f4 94 25 f3 90 b4 7a dc 2e |0D. O....%...z..| +peer0.org1.example.com | 00000010 9f 53 fb ae 8e 66 fd 3c 02 2c 2d d9 91 05 0c cf |.S...f.<.,-.....| +peer0.org1.example.com | 00000020 77 3a f9 5c 02 20 41 5f 73 66 aa 59 93 99 ac 7e |w:.\. A_sf.Y...~| +peer0.org1.example.com | 00000030 82 0e 4e 8c 06 54 fc f4 dc 80 09 92 c4 31 eb 9c |..N..T.......1..| +peer0.org1.example.com | 00000040 73 c7 3d 39 ba 8f |s.=9..|" +peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 188 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 189 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 " +peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 " +peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | "2019-05-02 09:27:06.352 UTC [fsblkstorage] Next -> DEBU 236 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] newBlockfileStream -> DEBU 237 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 238 Remaining bytes=[18415], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 239 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23a blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] Next -> DEBU 23b Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] newBlockfileStream -> DEBU 23c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23d Remaining bytes=[18415], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23e Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23f blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: Consortium" +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:14.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:14.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:16.160 UTC [endorser] ProcessProposal -> DEBU 190 Entering: request from 172.18.0.8:57196" +peer0.org1.example.com | "2019-05-02 09:27:16.160 UTC [protoutils] ValidateProposalMessage -> DEBU 191 ValidateProposalMessage starts for signed proposal 0xc0023f2e60" +peer0.org1.example.com | "2019-05-02 09:27:16.160 UTC [protoutils] validateChannelHeader -> DEBU 192 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-05-02 09:27:16.161 UTC [protoutils] checkSignatureFromCreator -> DEBU 193 begin" +peer0.org1.example.com | "2019-05-02 09:27:16.161 UTC [msp] DeserializeIdentity -> DEBU 194 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:16.162 UTC [msp.identity] newIdentity -> DEBU 195 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.162 UTC [protoutils] checkSignatureFromCreator -> DEBU 196 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:16.163 UTC [msp] Validate -> DEBU 197 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:16.163 UTC [protoutils] checkSignatureFromCreator -> DEBU 198 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:16.163 UTC [msp.identity] Verify -> DEBU 199 Verify: digest = 00000000 ec 95 8a 08 31 e6 41 a0 74 24 3f ae b5 e8 13 99 |....1.A.t$?.....| +peer0.org1.example.com | 00000010 02 70 34 54 3f 92 81 6c d9 45 e0 57 5a 56 6e 7f |.p4T?..l.E.WZVn.|" +peer0.org1.example.com | "2019-05-02 09:27:16.163 UTC [msp.identity] Verify -> DEBU 19a Verify: sig = 00000000 30 44 02 20 11 a5 9e 50 29 82 a9 26 de 9a 9b 76 |0D. ...P)..&...v| +peer0.org1.example.com | 00000010 39 e2 b6 d9 c1 69 06 11 e1 eb 9d c7 fb 54 4e 85 |9....i.......TN.| +peer0.org1.example.com | 00000020 8c 2f 75 82 02 20 0c 25 dc a4 03 c2 b2 34 f6 92 |./u.. .%.....4..| +peer0.org1.example.com | 00000030 d7 fb 22 69 54 60 33 35 ec 14 8e c0 cd 47 1e 68 |.."iT`35.....G.h| +peer0.org1.example.com | 00000040 2b e7 48 0c fc 0f |+.H...|" +peer0.org1.example.com | "2019-05-02 09:27:16.164 UTC [protoutils] checkSignatureFromCreator -> DEBU 19b exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:16.164 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19c validateChaincodeProposalMessage starts for proposal 0xc0024b6690, header 0xc0023f3770" +peer0.org1.example.com | "2019-05-02 09:27:16.165 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19d validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:16.165 UTC [endorser] preProcess -> DEBU 19e [][dbf7024a] processing txid: dbf7024a20c887786328981f5471b882c076486d1171040f17166c48d15b8a84" +peer0.org1.example.com | "2019-05-02 09:27:16.165 UTC [endorser] SimulateProposal -> DEBU 19f [][dbf7024a] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:16.165 UTC [endorser] callChaincode -> INFO 1a0 [][dbf7024a] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:16.166 UTC [chaincode] Execute -> DEBU 1a1 Entry" +peer0.org1.example.com | "2019-05-02 09:27:16.166 UTC [cscc] Invoke -> DEBU 1a2 Invoke function: JoinChain" +peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] NewStandardValues -> DEBU 1a3 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a4 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a5 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a6 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a7 Processing field: Consortium" +peer0.org1.example.com | "2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a8 Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] NewStandardValues -> DEBU 1a9 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1aa Processing field: ConsensusType" +peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ab Processing field: BatchSize" +peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ac Processing field: BatchTimeout" +peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ad Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ae Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-05-02 09:27:16.169 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1af Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:16.170 UTC [common.channelconfig] NewStandardValues -> DEBU 1b0 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b1 Processing field: Endpoints" +peer0.org1.example.com | "2019-05-02 09:27:16.170 UTC [common.channelconfig] NewStandardValues -> DEBU 1b2 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b3 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.171 UTC [common.channelconfig] validateMSP -> DEBU 1b4 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:16.171 UTC [msp] newBccspMsp -> DEBU 1b5 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.171 UTC [msp] New -> DEBU 1b6 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.171 UTC [msp] Setup -> DEBU 1b7 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-05-02 09:27:16.172 UTC [msp.identity] newIdentity -> DEBU 1b8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24c Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] NewStandardValues -> DEBU 24f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [common.channelconfig] validateMSP -> DEBU 251 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [msp] newBccspMsp -> DEBU 252 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [msp] New -> DEBU 253 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [msp] Setup -> DEBU 254 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [msp.identity] newIdentity -> DEBU 255 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:06.354 UTC [msp.identity] newIdentity -> DEBU 256 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:06.363 UTC [msp] Validate -> DEBU 257 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.363 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-05-02 09:27:06.363 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:06.363 UTC [common.channelconfig] NewStandardValues -> DEBU 25a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.363 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.363 UTC [common.channelconfig] validateMSP -> DEBU 25c Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.363 UTC [msp] newBccspMsp -> DEBU 25d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.364 UTC [msp] New -> DEBU 25e Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.364 UTC [msp] Setup -> DEBU 25f Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.364 UTC [msp.identity] newIdentity -> DEBU 260 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2972,7 +3119,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.760 UTC [msp.identity] newIdentity -> DEBU 1f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.364 UTC [msp.identity] newIdentity -> DEBU 261 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2985,280 +3132,109 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.744 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1b7 Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.745 UTC [msp] Validate -> DEBU 1b8 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:40.745 UTC [msp] getCertificationChain -> DEBU 1b9 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:40.746 UTC [msp] hasOURole -> DEBU 1ba MSP Org1MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:30:40.746 UTC [msp] getCertificationChain -> DEBU 1bb MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:40.746 UTC [common.channelconfig] NewStandardValues -> DEBU 1bc Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.746 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bd Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:40.746 UTC [common.channelconfig] NewStandardValues -> DEBU 1be Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.747 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bf Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.747 UTC [common.channelconfig] Validate -> DEBU 1c0 Anchor peers for org Org2MSP are " -peer0.org1.example.com | "2019-05-02 01:30:40.748 UTC [common.channelconfig] validateMSP -> DEBU 1c1 Setting up MSP for org Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.748 UTC [msp] newBccspMsp -> DEBU 1c2 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.748 UTC [msp] New -> DEBU 1c3 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.749 UTC [msp] Setup -> DEBU 1c4 Setting up MSP instance Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.749 UTC [msp.identity] newIdentity -> DEBU 1c5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.750 UTC [msp.identity] newIdentity -> DEBU 1c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.754 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c7 Checking if identity satisfies role [CLIENT] for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.755 UTC [msp] Validate -> DEBU 1c8 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:40.756 UTC [msp] getCertificationChain -> DEBU 1c9 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:40.757 UTC [msp] hasOURole -> DEBU 1ca MSP Org2MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:30:40.757 UTC [msp] getCertificationChain -> DEBU 1cb MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:40.758 UTC [common.channelconfig] NewStandardValues -> DEBU 1cc Initializing protos for *channelconfig.OrdererProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.758 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: ConsensusType" -peer0.org1.example.com | "2019-05-02 01:30:40.759 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: BatchSize" -peer0.org1.example.com | "2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: BatchTimeout" -peer0.org1.example.com | "2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: KafkaBrokers" -peer0.org1.example.com | "2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d1 Processing field: ChannelRestrictions" -peer0.org1.example.com | "2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:40.760 UTC [common.channelconfig] NewStandardValues -> DEBU 1d3 Initializing protos for *channelconfig.OrdererOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: Endpoints" -peer0.org1.example.com | "2019-05-02 01:30:40.760 UTC [common.channelconfig] NewStandardValues -> DEBU 1d5 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6 Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.761 UTC [common.channelconfig] validateMSP -> DEBU 1d7 Setting up MSP for org OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:40.761 UTC [msp] newBccspMsp -> DEBU 1d8 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.761 UTC [msp] New -> DEBU 1d9 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.761 UTC [msp] Setup -> DEBU 1da Setting up MSP instance OrdererMSP" -peer0.org1.example.com | "2019-05-02 01:30:40.761 UTC [msp.identity] newIdentity -> DEBU 1db Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.762 UTC [msp.identity] newIdentity -> DEBU 1dc Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.760 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1f3 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.760 UTC [msp] Validate -> DEBU 1f4 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.761 UTC [msp] getCertificationChain -> DEBU 1f5 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.761 UTC [msp] hasOURole -> DEBU 1f6 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:30.761 UTC [msp] getCertificationChain -> DEBU 1f7 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.761 UTC [msp] Setup -> DEBU 1f8 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:30.761 UTC [msp] Setup -> DEBU 1f9 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:30.761 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.761 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.761 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 205 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 206 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 208 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 209 Proposed new policy Admins for Channel/Consortiums" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] GetPolicy -> DEBU 20a Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 20b Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 20c Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] GetPolicy -> DEBU 20d Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -orderer0.example.com | "2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 20e Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Group] /Channel/Consortiums" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Consortiums/Admins" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:30.767 UTC [fsblkstorage] Next -> DEBU 236 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-05-02 01:30:30.767 UTC [fsblkstorage] newBlockfileStream -> DEBU 237 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:30:30.767 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 238 Remaining bytes=[18415], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:30.767 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 239 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:30:30.767 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23a blockbytes [18412] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:30.768 UTC [fsblkstorage] Next -> DEBU 23b Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-05-02 01:30:30.768 UTC [fsblkstorage] newBlockfileStream -> DEBU 23c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:30:30.768 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23d Remaining bytes=[18415], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:30.768 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23e Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:30:30.768 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23f blockbytes [18412] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:30.768 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:30.768 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:30.768 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:30.768 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: KafkaBrokers" -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.763 UTC [msp] Validate -> DEBU 1dd MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:40.763 UTC [msp] Setup -> DEBU 1de Setting up the MSP manager (3 msps)" -peer0.org1.example.com | "2019-05-02 01:30:40.763 UTC [msp] Setup -> DEBU 1df MSP manager setup complete, setup 3 msps" -peer0.org1.example.com | "2019-05-02 01:30:40.764 UTC [common.capabilities] Supported -> DEBU 1e0 Channel capability V2_0 is supported and is enabled" -peer0.org1.example.com | "2019-05-02 01:30:40.764 UTC [common.capabilities] Supported -> DEBU 1e1 Application capability V2_0 is supported and is enabled" -peer0.org1.example.com | "2019-05-02 01:30:40.764 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e2 Checking if identity satisfies ADMIN role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.764 UTC [msp.identity] Verify -> DEBU 1e3 Verify: digest = 00000000 6f 78 a3 d9 de ea c6 08 34 f4 b1 d7 a1 ca db 13 |ox......4.......| -peer0.org1.example.com | 00000010 ff c4 ac ff c2 f0 b8 ca dc da 80 6d 63 81 a2 72 |...........mc..r|" -peer0.org1.example.com | "2019-05-02 01:30:40.764 UTC [msp.identity] Verify -> DEBU 1e4 Verify: sig = 00000000 30 45 02 21 00 df 83 90 76 d2 20 1b 8e 8a 24 cc |0E.!....v. ...$.| -peer0.org1.example.com | 00000010 f0 d4 f9 77 b3 ba e5 12 df a3 85 71 53 c9 2d 02 |...w.......qS.-.| -peer0.org1.example.com | 00000020 95 b4 bd 22 90 02 20 30 28 68 bf 64 12 48 65 52 |...".. 0(h.d.HeR| -peer0.org1.example.com | 00000030 04 d2 aa 54 ac 6c 68 c2 ac 77 ad bb d6 12 26 dd |...T.lh..w....&.| -peer0.org1.example.com | 00000040 c8 7e 9a 42 f6 d3 89 |.~.B...|" -peer0.org1.example.com | "2019-05-02 01:30:40.765 UTC [ledgermgmt] CreateLedger -> INFO 1e5 Creating ledger [businesschannel] with genesis block" -peer0.org1.example.com | "2019-05-02 01:30:40.778 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1e6 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " -peer0.org1.example.com | "2019-05-02 01:30:40.778 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1e7 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" -peer0.org1.example.com | "2019-05-02 01:30:40.778 UTC [kvledger.util] logDirStatus -> DEBU 1e8 Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" -peer0.org1.example.com | "2019-05-02 01:30:40.780 UTC [kvledger.util] logDirStatus -> DEBU 1e9 After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" -peer0.org1.example.com | "2019-05-02 01:30:40.781 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ea Getting block information from block storage" -peer0.org1.example.com | "2019-05-02 01:30:40.781 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1eb Retrieving checkpoint info from block files" -peer0.org1.example.com | "2019-05-02 01:30:40.781 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ec retrieveLastFileSuffix()" -peer0.org1.example.com | "2019-05-02 01:30:40.781 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ed retrieveLastFileSuffix() - biggestFileNum = -1" -peer0.org1.example.com | "2019-05-02 01:30:40.781 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ee Last file number found = -1" -peer0.org1.example.com | "2019-05-02 01:30:40.781 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ef No block file found" -peer0.org1.example.com | "2019-05-02 01:30:40.781 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1f0 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0025a53c0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [fsblkstorage] newBlockIndex -> DEBU 1f1 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [pvtdatastorage] OpenStore -> DEBU 1f2 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [leveldbhelper] GetIterator -> DEBU 1f3 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f4 Starting to process collection eligibility events" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [kvledger] newKVLedger -> DEBU 1f5 Creating KVLedger ledgerID=businesschannel: " -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [leveldbhelper] GetIterator -> DEBU 1f6 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [kvledger] newKVLedger -> DEBU 1f7 Register state db for chaincode lifecycle events: false" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f8 Converted [0] inelligible mising data entries to elligible" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [pvtdatastorage] func1 -> DEBU 1f9 Waiting for collection eligibility event" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1fa constructing new query executor txid = []" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [leveldbhelper] GetIterator -> DEBU 1fb Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x7f}]" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [lockbasedtxmgr] Done -> DEBU 1fc Done with transaction simulation / query execution []" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [kvledger] recoverDBs -> DEBU 1fd Entering recoverDB()" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1fe Block storage is empty." -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24c Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] NewStandardValues -> DEBU 24f Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.769 UTC [common.channelconfig] validateMSP -> DEBU 251 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.770 UTC [msp] newBccspMsp -> DEBU 252 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.770 UTC [msp] New -> DEBU 253 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.770 UTC [msp] Setup -> DEBU 254 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:30.770 UTC [msp.identity] newIdentity -> DEBU 255 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.770 UTC [msp.identity] newIdentity -> DEBU 256 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.785 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ff Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:30:40.786 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 200 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" -peer0.org1.example.com | "2019-05-02 01:30:40.786 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 201 Constructing unique pvtData by removing duplicate entries" -peer0.org1.example.com | "2019-05-02 01:30:40.789 UTC [kvledger] CommitWithPvtData -> DEBU 202 [businesschannel] Validating state for block [0]" -peer0.org1.example.com | "2019-05-02 01:30:40.789 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 203 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:30:40.789 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 204 lock acquired on oldBlockCommit for validating read set version against the committed version" -orderer0.example.com | "2019-05-02 01:30:30.771 UTC [msp] Validate -> DEBU 257 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.771 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.ConsortiumProtos" -orderer0.example.com | "2019-05-02 01:30:30.771 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:30.771 UTC [common.channelconfig] NewStandardValues -> DEBU 25a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.771 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.771 UTC [common.channelconfig] validateMSP -> DEBU 25c Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.771 UTC [msp] newBccspMsp -> DEBU 25d Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.771 UTC [msp] New -> DEBU 25e Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.772 UTC [msp] Setup -> DEBU 25f Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.772 UTC [msp.identity] newIdentity -> DEBU 260 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 262 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] Validate -> DEBU 263 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] getCertificationChain -> DEBU 264 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] hasOURole -> DEBU 265 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] getCertificationChain -> DEBU 266 MSP Org2MSP getting certification chain" +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.173 UTC [msp.identity] newIdentity -> DEBU 1b9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.174 UTC [msp] Validate -> DEBU 1ba MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:16.175 UTC [common.channelconfig] NewStandardValues -> DEBU 1bb Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.175 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bc Processing field: ACLs" +peer0.org1.example.com | "2019-05-02 09:27:16.175 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bd Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:16.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1be Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bf Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:16.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1c0 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.177 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c1 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.177 UTC [common.channelconfig] Validate -> DEBU 1c2 Anchor peers for org Org1MSP are " +peer0.org1.example.com | "2019-05-02 09:27:16.177 UTC [common.channelconfig] validateMSP -> DEBU 1c3 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.177 UTC [msp] newBccspMsp -> DEBU 1c4 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.177 UTC [msp] New -> DEBU 1c5 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.178 UTC [msp] Setup -> DEBU 1c6 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.178 UTC [msp.identity] newIdentity -> DEBU 1c7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.179 UTC [msp.identity] newIdentity -> DEBU 1c8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.181 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c9 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.181 UTC [msp] Validate -> DEBU 1ca MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:16.181 UTC [msp] getCertificationChain -> DEBU 1cb MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:16.182 UTC [msp] hasOURole -> DEBU 1cc MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-05-02 09:27:16.182 UTC [msp] getCertificationChain -> DEBU 1cd MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:16.182 UTC [common.channelconfig] NewStandardValues -> DEBU 1ce Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.183 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:16.183 UTC [common.channelconfig] NewStandardValues -> DEBU 1d0 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.183 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d1 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.183 UTC [common.channelconfig] Validate -> DEBU 1d2 Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-05-02 09:27:16.184 UTC [common.channelconfig] validateMSP -> DEBU 1d3 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.184 UTC [msp] newBccspMsp -> DEBU 1d4 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.184 UTC [msp] New -> DEBU 1d5 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.185 UTC [msp] Setup -> DEBU 1d6 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.186 UTC [msp.identity] newIdentity -> DEBU 1d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | "2019-05-02 09:27:06.365 UTC [common.channelconfig] NewStandardValues -> DEBU 267 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:06.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU 268 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:06.365 UTC [common.channelconfig] validateMSP -> DEBU 269 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] newBccspMsp -> DEBU 26a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.365 UTC [msp] New -> DEBU 26b Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:06.366 UTC [msp] Setup -> DEBU 26c Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.366 UTC [msp.identity] newIdentity -> DEBU 26d Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3273,7 +3249,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.772 UTC [msp.identity] newIdentity -> DEBU 261 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.366 UTC [msp.identity] newIdentity -> DEBU 26e Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3287,169 +3263,178 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.773 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 262 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.773 UTC [msp] Validate -> DEBU 263 MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:30.773 UTC [msp] getCertificationChain -> DEBU 264 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.773 UTC [msp] hasOURole -> DEBU 265 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:30.773 UTC [msp] getCertificationChain -> DEBU 266 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.774 UTC [common.channelconfig] NewStandardValues -> DEBU 267 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:30.774 UTC [common.channelconfig] initializeProtosStruct -> DEBU 268 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:30.774 UTC [common.channelconfig] validateMSP -> DEBU 269 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.774 UTC [msp] newBccspMsp -> DEBU 26a Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.774 UTC [msp] New -> DEBU 26b Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:30.774 UTC [msp] Setup -> DEBU 26c Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.774 UTC [msp.identity] newIdentity -> DEBU 26d Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.774 UTC [msp.identity] newIdentity -> DEBU 26e Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:30.775 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 26f Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.775 UTC [msp] Validate -> DEBU 270 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:40.790 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 205 Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-05-02 01:30:40.790 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 206 ValidateAndPrepareBatch() for block number = [0]" -peer0.org1.example.com | "2019-05-02 01:30:40.790 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 207 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:30:40.790 UTC [valimpl] preprocessProtoBlock -> DEBU 208 txType=CONFIG" -peer0.org1.example.com | "2019-05-02 01:30:40.790 UTC [valimpl] processNonEndorserTx -> DEBU 209 Performing custom processing for transaction [txid=], [txType=CONFIG]" -peer0.org1.example.com | "2019-05-02 01:30:40.790 UTC [valimpl] processNonEndorserTx -> DEBU 20a Processor for custom tx processing:&peer.configtxProcessor{}" -peer0.org1.example.com | "2019-05-02 01:30:40.790 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 20b constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:30:40.790 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 20c constructing new tx simulator txid = []" -peer0.org1.example.com | "2019-05-02 01:30:40.791 UTC [peer] GenerateSimulationResults -> DEBU 20d Processing CONFIG" -orderer0.example.com | "2019-05-02 01:30:30.775 UTC [msp] getCertificationChain -> DEBU 271 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.775 UTC [msp] hasOURole -> DEBU 272 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:30.775 UTC [msp] getCertificationChain -> DEBU 273 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [msp] Setup -> DEBU 274 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [msp] Setup -> DEBU 275 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 285 Proposed new policy Admins for Channel/Consortiums" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] GetPolicy -> DEBU 286 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -orderer0.example.com | "2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 287 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [policies] GetPolicy -> DEBU 289 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [policies] NewManagerImpl -> DEBU 28a Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Group] /Channel/Consortiums" -orderer0.example.com | "2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Consortiums/Admins" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b2 As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b3 As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b4 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b5 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b6 Manager Channel has managers Consortiums" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b7 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b8 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b9 Manager Channel has managers Consortiums" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2ba Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2bb Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [common.capabilities] Supported -> DEBU 2bd Orderer capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [common.capabilities] Supported -> DEBU 2be Channel capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:30.779 UTC [orderer.common.server] func1 -> DEBU 2bf Executing callback to update root CAs" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c0 updating root CAs for channel [testchainid]" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c1 adding app root CAs for MSP [Org1MSP]" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c2 adding app root CAs for MSP [Org2MSP]" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c3 adding orderer root CAs for MSP [OrdererMSP]" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [fsblkstorage] Next -> DEBU 2c4 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 Remaining bytes=[18415], Going to peek [8] bytes" -peer0.org1.example.com | "2019-05-02 01:30:40.792 UTC [peer] processChannelConfigTx -> DEBU 20e channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -peer0.org1.example.com | "2019-05-02 01:30:40.792 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 20f Simulation completed, getting simulation results" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c7 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c8 blockbytes [18412] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2c9 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" -orderer0.example.com | "2019-05-02 01:30:30.780 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2ca EvictionSuspicion not set, defaulting to 10m0s" -orderer0.example.com | "2019-05-02 01:30:30.781 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cb No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.781 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2cc No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.808 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2cd Loading WAL at Term 0 and Index 0" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.812 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ce Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.812 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cf Appending 0 entries to memory storage" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.813 UTC [fsblkstorage] Next -> DEBU 2d0 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-05-02 01:30:30.813 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:30:30.813 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d2 Remaining bytes=[18415], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:30.813 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d3 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:30:30.814 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d4 blockbytes [18412] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:30.814 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2d5 [channel: testchainid] Done creating channel support resources" -orderer0.example.com | "2019-05-02 01:30:30.815 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2d6 Creating system channel msg processor for channel testchainid" -orderer0.example.com | "2019-05-02 01:30:30.815 UTC [fsblkstorage] Next -> DEBU 2d7 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-05-02 01:30:30.816 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:30:30.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d9 Remaining bytes=[18415], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:30.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2da Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:30:30.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2db blockbytes [18412] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:30.816 UTC [orderer.commmon.multichannel] Initialize -> INFO 2dc Starting system channel 'testchainid' with genesis block hash eaacc2d483d6d8e73f399e0c2cefffb57b439acef632719154498ba7c7383eb1 and orderer type etcdraft" -orderer0.example.com | "2019-05-02 01:30:30.816 UTC [orderer.consensus.etcdraft] Start -> INFO 2dd Starting Raft node" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.816 UTC [orderer.common.cluster] Configure -> INFO 2de Entering, channel: testchainid, nodes: [ID: 2, +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 26f Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] Validate -> DEBU 270 MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] getCertificationChain -> DEBU 271 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] hasOURole -> DEBU 272 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] getCertificationChain -> DEBU 273 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] Setup -> DEBU 274 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [msp] Setup -> DEBU 275 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 285 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 286 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] GetPolicy -> DEBU 287 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] GetPolicy -> DEBU 289 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 28a Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:06.368 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b2 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b3 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b4 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b5 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b6 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b7 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b8 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b9 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2ba Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2bb Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.capabilities] Supported -> DEBU 2bd Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [common.capabilities] Supported -> DEBU 2be Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [orderer.common.server] func1 -> DEBU 2bf Executing callback to update root CAs" +orderer0.example.com | "2019-05-02 09:27:06.377 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c0 updating root CAs for channel [testchainid]" +orderer0.example.com | "2019-05-02 09:27:06.378 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c1 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-05-02 09:27:06.378 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c2 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-05-02 09:27:06.378 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c3 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-05-02 09:27:06.378 UTC [fsblkstorage] Next -> DEBU 2c4 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-05-02 09:27:06.378 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:06.378 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 Remaining bytes=[18415], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:06.378 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c7 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:06.378 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c8 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:06.379 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2c9 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +orderer0.example.com | "2019-05-02 09:27:06.379 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2ca EvictionSuspicion not set, defaulting to 10m0s" +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.186 UTC [msp.identity] newIdentity -> DEBU 1d8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.188 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1d9 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.188 UTC [msp] Validate -> DEBU 1da MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:16.188 UTC [msp] getCertificationChain -> DEBU 1db MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp] hasOURole -> DEBU 1dc MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp] getCertificationChain -> DEBU 1dd MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp] Setup -> DEBU 1de Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp] Setup -> DEBU 1df MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [common.capabilities] Supported -> DEBU 1e0 Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [common.capabilities] Supported -> DEBU 1e1 Application capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e2 Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp.identity] Verify -> DEBU 1e3 Verify: digest = 00000000 ec 95 8a 08 31 e6 41 a0 74 24 3f ae b5 e8 13 99 |....1.A.t$?.....| +peer0.org1.example.com | 00000010 02 70 34 54 3f 92 81 6c d9 45 e0 57 5a 56 6e 7f |.p4T?..l.E.WZVn.|" +peer0.org1.example.com | "2019-05-02 09:27:16.189 UTC [msp.identity] Verify -> DEBU 1e4 Verify: sig = 00000000 30 44 02 20 11 a5 9e 50 29 82 a9 26 de 9a 9b 76 |0D. ...P)..&...v| +peer0.org1.example.com | 00000010 39 e2 b6 d9 c1 69 06 11 e1 eb 9d c7 fb 54 4e 85 |9....i.......TN.| +peer0.org1.example.com | 00000020 8c 2f 75 82 02 20 0c 25 dc a4 03 c2 b2 34 f6 92 |./u.. .%.....4..| +peer0.org1.example.com | 00000030 d7 fb 22 69 54 60 33 35 ec 14 8e c0 cd 47 1e 68 |.."iT`35.....G.h| +peer0.org1.example.com | 00000040 2b e7 48 0c fc 0f |+.H...|" +peer0.org1.example.com | "2019-05-02 09:27:16.191 UTC [ledgermgmt] CreateLedger -> INFO 1e5 Creating ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-05-02 09:27:16.195 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1e6 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +peer0.org1.example.com | "2019-05-02 09:27:16.195 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1e7 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" +peer0.org1.example.com | "2019-05-02 09:27:16.195 UTC [kvledger.util] logDirStatus -> DEBU 1e8 Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" +peer0.org1.example.com | "2019-05-02 09:27:16.195 UTC [kvledger.util] logDirStatus -> DEBU 1e9 After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" +peer0.org1.example.com | "2019-05-02 09:27:16.196 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ea Getting block information from block storage" +peer0.org1.example.com | "2019-05-02 09:27:16.197 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1eb Retrieving checkpoint info from block files" +peer0.org1.example.com | "2019-05-02 09:27:16.197 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ec retrieveLastFileSuffix()" +peer0.org1.example.com | "2019-05-02 09:27:16.197 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ed retrieveLastFileSuffix() - biggestFileNum = -1" +peer0.org1.example.com | "2019-05-02 09:27:16.198 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ee Last file number found = -1" +peer0.org1.example.com | "2019-05-02 09:27:16.198 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ef No block file found" +peer0.org1.example.com | "2019-05-02 09:27:16.198 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1f0 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0025cc7c0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +peer0.org1.example.com | "2019-05-02 09:27:16.202 UTC [fsblkstorage] newBlockIndex -> DEBU 1f1 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" +peer0.org1.example.com | "2019-05-02 09:27:16.203 UTC [pvtdatastorage] OpenStore -> DEBU 1f2 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" +peer0.org1.example.com | "2019-05-02 09:27:16.203 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f3 Starting to process collection eligibility events" +peer0.org1.example.com | "2019-05-02 09:27:16.203 UTC [leveldbhelper] GetIterator -> DEBU 1f4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" +peer0.org1.example.com | "2019-05-02 09:27:16.203 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f5 Converted [0] inelligible mising data entries to elligible" +peer0.org1.example.com | "2019-05-02 09:27:16.204 UTC [pvtdatastorage] func1 -> DEBU 1f6 Waiting for collection eligibility event" +peer0.org1.example.com | "2019-05-02 09:27:16.204 UTC [leveldbhelper] GetIterator -> DEBU 1f7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" +peer0.org1.example.com | "2019-05-02 09:27:16.204 UTC [kvledger] newKVLedger -> DEBU 1f8 Creating KVLedger ledgerID=businesschannel: " +peer0.org1.example.com | "2019-05-02 09:27:16.204 UTC [kvledger] newKVLedger -> DEBU 1f9 Register state db for chaincode lifecycle events: false" +peer0.org1.example.com | "2019-05-02 09:27:16.205 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1fa constructing new query executor txid = []" +peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [leveldbhelper] GetIterator -> DEBU 1fb Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x7f}]" +peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [lockbasedtxmgr] Done -> DEBU 1fc Done with transaction simulation / query execution []" +orderer0.example.com | "2019-05-02 09:27:06.379 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cb No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.379 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2cc No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.396 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2cd Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.397 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ce Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.397 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cf Appending 0 entries to memory storage" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.397 UTC [fsblkstorage] Next -> DEBU 2d0 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-05-02 09:27:06.397 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:06.397 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d2 Remaining bytes=[18415], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:06.397 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d3 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:06.397 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d4 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:06.397 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2d5 [channel: testchainid] Done creating channel support resources" +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2d6 Creating system channel msg processor for channel testchainid" +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [fsblkstorage] Next -> DEBU 2d7 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d9 Remaining bytes=[18415], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2da Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2db blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.commmon.multichannel] Initialize -> INFO 2dc Starting system channel 'testchainid' with genesis block hash 90f35bf665ccb03902ab1f08bd901cde6bcd74d9da8fbbbade4c4b31cd280378 and orderer type etcdraft" +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.consensus.etcdraft] Start -> INFO 2dd Starting Raft node" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.common.cluster] Configure -> INFO 2de Entering, channel: testchainid, nodes: [ID: 2, orderer0.example.com | Endpoint: orderer1.example.com:7050, orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL @@ -3458,53 +3443,6 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -peer0.org1.example.com | "2019-05-02 01:30:40.792 UTC [lockbasedtxmgr] Done -> DEBU 210 Done with transaction simulation / query execution []" -peer0.org1.example.com | "2019-05-02 01:30:40.792 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 211 Block [0] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" -peer0.org1.example.com | "2019-05-02 01:30:40.792 UTC [valinternal] ApplyWriteSet -> DEBU 212 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0025c1100)}" -peer0.org1.example.com | "2019-05-02 01:30:40.792 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 213 validating rwset..." -peer0.org1.example.com | "2019-05-02 01:30:40.792 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 214 postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:30:40.792 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 215 ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-05-02 01:30:40.792 UTC [kvledger] CommitWithPvtData -> DEBU 216 [businesschannel] Committing block [0] to storage" -peer0.org1.example.com | "2019-05-02 01:30:40.792 UTC [ledgerstorage] CommitWithPvtData -> DEBU 217 Writing block [0] to pvt block store" -peer0.org1.example.com | "2019-05-02 01:30:40.795 UTC [pvtdatastorage] Prepare -> DEBU 218 Saved 0 private data write sets for block [0]" -peer0.org1.example.com | "2019-05-02 01:30:40.799 UTC [fsblkstorage] indexBlock -> DEBU 219 Indexing block [blockNum=0, blockHash=[]byte{0xad, 0x7c, 0xdc, 0x87, 0x83, 0xa5, 0x2c, 0x74, 0x62, 0x49, 0x6a, 0xb, 0xdd, 0xfc, 0x97, 0xee, 0x22, 0x89, 0x41, 0x3b, 0xf7, 0xba, 0x29, 0xe, 0xd2, 0xf8, 0x28, 0x95, 0x25, 0x2d, 0x23, 0x51} txOffsets= -peer0.org1.example.com | txId= locPointer=offset=39, bytesLength=23896 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-05-02 01:30:40.799 UTC [fsblkstorage] indexBlock -> DEBU 21a Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23896] for tx ID: [] to txid-index" -peer0.org1.example.com | "2019-05-02 01:30:40.799 UTC [fsblkstorage] indexBlock -> DEBU 21b Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23896] for tx number:[0] ID: [] to blockNumTranNum index" -peer0.org1.example.com | "2019-05-02 01:30:40.802 UTC [fsblkstorage] updateCheckpoint -> DEBU 21c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23941], isChainEmpty=[false], lastBlockNumber=[0]" -peer0.org1.example.com | "2019-05-02 01:30:40.802 UTC [pvtdatastorage] Commit -> DEBU 21d Committing private data for block [0]" -peer0.org1.example.com | "2019-05-02 01:30:40.805 UTC [pvtdatastorage] Commit -> DEBU 21e Committed private data for block [0]" -peer0.org1.example.com | "2019-05-02 01:30:40.805 UTC [kvledger] CommitWithPvtData -> DEBU 21f [businesschannel] Committing block [0] transactions to state database" -peer0.org1.example.com | "2019-05-02 01:30:40.805 UTC [pvtdatastorage] func1 -> DEBU 220 Purger started: Purging expired private data till block number [0]" -peer0.org1.example.com | "2019-05-02 01:30:40.805 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 221 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" -peer0.org1.example.com | "2019-05-02 01:30:40.805 UTC [lockbasedtxmgr] Commit -> DEBU 222 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:40.805 UTC [leveldbhelper] GetIterator -> DEBU 223 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:30:40.806 UTC [pvtdatastorage] func1 -> DEBU 224 Purger finished" -peer0.org1.example.com | "2019-05-02 01:30:40.806 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 225 Preparing potential purge list working-set for expiringAtBlk [0]" -peer0.org1.example.com | "2019-05-02 01:30:40.806 UTC [leveldbhelper] GetIterator -> DEBU 226 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:30:40.806 UTC [lockbasedtxmgr] Commit -> DEBU 227 Committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:40.806 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 228 No expiry entry found for expiringAtBlk [0]" -peer0.org1.example.com | "2019-05-02 01:30:40.806 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 229 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-05-02 01:30:40.806 UTC [lockbasedtxmgr] Commit -> DEBU 22a Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:40.806 UTC [stateleveldb] ApplyUpdates -> DEBU 22b Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -peer0.org1.example.com | "2019-05-02 01:30:40.809 UTC [lockbasedtxmgr] Commit -> DEBU 22c Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-05-02 01:30:40.809 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 22d Preparing potential purge list working-set for expiringAtBlk [1]" -peer0.org1.example.com | "2019-05-02 01:30:40.809 UTC [leveldbhelper] GetIterator -> DEBU 22e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:30:40.809 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 22f No expiry entry found for expiringAtBlk [1]" -peer0.org1.example.com | "2019-05-02 01:30:40.809 UTC [lockbasedtxmgr] func1 -> DEBU 230 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-05-02 01:30:40.809 UTC [kvledger] CommitWithPvtData -> DEBU 231 [businesschannel] Committing block [0] transactions to history database" -peer0.org1.example.com | "2019-05-02 01:30:40.809 UTC [historyleveldb] Commit -> DEBU 232 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" -peer0.org1.example.com | "2019-05-02 01:30:40.809 UTC [historyleveldb] Commit -> DEBU 233 Skipping transaction [0] since it is not an endorsement transaction" -peer0.org1.example.com | "2019-05-02 01:30:40.812 UTC [historyleveldb] Commit -> DEBU 234 Channel [businesschannel]: Updates committed to history database for blockNo [0]" -peer0.org1.example.com | "2019-05-02 01:30:40.812 UTC [kvledger] CommitWithPvtData -> INFO 235 [businesschannel] Committed block [0] with 1 transaction(s) in 22ms (state_validation=2ms block_commit=12ms state_commit=4ms)" -peer0.org1.example.com | "2019-05-02 01:30:40.815 UTC [ledgermgmt] CreateLedger -> INFO 236 Created ledger [businesschannel] with genesis block" -peer0.org1.example.com | "2019-05-02 01:30:40.815 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 237 constructing new query executor txid = [bca46409-a767-4df7-a709-b1fca8800cf3]" -peer0.org1.example.com | "2019-05-02 01:30:40.815 UTC [stateleveldb] GetState -> DEBU 238 GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" -peer0.org1.example.com | "2019-05-02 01:30:40.815 UTC [lockbasedtxmgr] Done -> DEBU 239 Done with transaction simulation / query execution [bca46409-a767-4df7-a709-b1fca8800cf3]" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] NewStandardValues -> DEBU 23a Initializing protos for *channelconfig.ChannelProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: HashingAlgorithm" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: BlockDataHashingStructure" orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E @@ -3561,9 +3499,26 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= orderer0.example.com | -----END CERTIFICATE----- orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:30:30.816 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2df Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" -orderer0.example.com | "2019-05-02 01:30:30.817 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e0 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" -orderer0.example.com | "2019-05-02 01:30:30.817 UTC [orderer.common.cluster] func1 -> DEBU 2e1 Connecting to ID: 2, +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2df Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e0 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [kvledger] recoverDBs -> DEBU 1fd Entering recoverDB()" +peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1fe Block storage is empty." +peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ff Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:27:16.206 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 200 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" +peer0.org1.example.com | "2019-05-02 09:27:16.207 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 201 Constructing unique pvtData by removing duplicate entries" +peer0.org1.example.com | "2019-05-02 09:27:16.210 UTC [kvledger] CommitWithPvtData -> DEBU 202 [businesschannel] Validating state for block [0]" +peer0.org1.example.com | "2019-05-02 09:27:16.210 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 203 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:27:16.210 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 204 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-05-02 09:27:16.210 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 205 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-05-02 09:27:16.210 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 206 ValidateAndPrepareBatch() for block number = [0]" +peer0.org1.example.com | "2019-05-02 09:27:16.211 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 207 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:16.211 UTC [valimpl] preprocessProtoBlock -> DEBU 208 txType=CONFIG" +peer0.org1.example.com | "2019-05-02 09:27:16.211 UTC [valimpl] processNonEndorserTx -> DEBU 209 Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-05-02 09:27:16.211 UTC [valimpl] processNonEndorserTx -> DEBU 20a Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-05-02 09:27:16.212 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 20b constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:16.212 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 20c constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-05-02 09:27:16.212 UTC [peer] GenerateSimulationResults -> DEBU 20d Processing CONFIG" +orderer0.example.com | "2019-05-02 09:27:06.398 UTC [orderer.common.cluster] func1 -> DEBU 2e1 Connecting to ID: 2, orderer0.example.com | Endpoint: orderer1.example.com:7050, orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL @@ -3575,62 +3530,6 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: OrdererAddresses" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: Consortium" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.OrdererProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: ConsensusType" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BatchSize" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: BatchTimeout" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: KafkaBrokers" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: ChannelRestrictions" -peer0.org1.example.com | "2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:40.817 UTC [common.channelconfig] NewStandardValues -> DEBU 247 Initializing protos for *channelconfig.OrdererOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: Endpoints" -peer0.org1.example.com | "2019-05-02 01:30:40.817 UTC [common.channelconfig] NewStandardValues -> DEBU 249 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.817 UTC [common.channelconfig] validateMSP -> DEBU 24b Setting up MSP for org OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:40.817 UTC [msp] newBccspMsp -> DEBU 24c Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.817 UTC [msp] New -> DEBU 24d Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.817 UTC [msp] Setup -> DEBU 24e Setting up MSP instance OrdererMSP" -peer0.org1.example.com | "2019-05-02 01:30:40.817 UTC [msp.identity] newIdentity -> DEBU 24f Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.817 UTC [msp.identity] newIdentity -> DEBU 250 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.818 UTC [msp] Validate -> DEBU 251 MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:40.818 UTC [common.channelconfig] NewStandardValues -> DEBU 252 Initializing protos for *channelconfig.ApplicationProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 253 Processing field: ACLs" -peer0.org1.example.com | "2019-05-02 01:30:40.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 254 Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:40.818 UTC [common.channelconfig] NewStandardValues -> DEBU 255 Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 256 Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:40.818 UTC [common.channelconfig] NewStandardValues -> DEBU 257 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 258 Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.818 UTC [common.channelconfig] Validate -> DEBU 259 Anchor peers for org Org1MSP are " -peer0.org1.example.com | "2019-05-02 01:30:40.818 UTC [common.channelconfig] validateMSP -> DEBU 25a Setting up MSP for org Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.819 UTC [msp] newBccspMsp -> DEBU 25b Creating BCCSP-based MSP instance" orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC @@ -3652,13 +3551,13 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= orderer0.example.com | -----END CERTIFICATE----- orderer0.example.com | for channel testchainid" -orderer0.example.com | "2019-05-02 01:30:30.817 UTC [grpc] DialContext -> DEBU 2e2 parsed scheme: """ -orderer0.example.com | "2019-05-02 01:30:30.817 UTC [grpc] DialContext -> DEBU 2e3 scheme "" not registered, fallback to default scheme" -orderer0.example.com | "2019-05-02 01:30:30.817 UTC [grpc] UpdateState -> DEBU 2e4 ccResolverWrapper: sending update to cc: {[{orderer1.example.com:7050 0 }] }" -orderer0.example.com | "2019-05-02 01:30:30.817 UTC [grpc] switchBalancer -> DEBU 2e5 ClientConn switching balancer to "pick_first"" -orderer0.example.com | "2019-05-02 01:30:30.818 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e6 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" -orderer0.example.com | "2019-05-02 01:30:30.818 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e7 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" -orderer0.example.com | "2019-05-02 01:30:30.818 UTC [orderer.common.cluster] func1 -> DEBU 2e8 Connecting to ID: 3, +orderer0.example.com | "2019-05-02 09:27:06.399 UTC [grpc] DialContext -> DEBU 2e2 parsed scheme: """ +orderer0.example.com | "2019-05-02 09:27:06.399 UTC [grpc] DialContext -> DEBU 2e3 scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2019-05-02 09:27:06.399 UTC [grpc] UpdateState -> DEBU 2e4 ccResolverWrapper: sending update to cc: {[{orderer1.example.com:7050 0 }] }" +orderer0.example.com | "2019-05-02 09:27:06.399 UTC [grpc] switchBalancer -> DEBU 2e5 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2019-05-02 09:27:06.399 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e6 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer0.example.com | "2019-05-02 09:27:06.399 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e7 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-05-02 09:27:06.399 UTC [orderer.common.cluster] func1 -> DEBU 2e8 Connecting to ID: 3, orderer0.example.com | Endpoint: orderer2.example.com:7050, orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL @@ -3691,341 +3590,251 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= orderer0.example.com | -----END CERTIFICATE----- orderer0.example.com | for channel testchainid" -orderer0.example.com | "2019-05-02 01:30:30.819 UTC [grpc] DialContext -> DEBU 2e9 parsed scheme: """ -orderer0.example.com | "2019-05-02 01:30:30.820 UTC [grpc] DialContext -> DEBU 2ea scheme "" not registered, fallback to default scheme" -orderer0.example.com | "2019-05-02 01:30:30.822 UTC [grpc] UpdateState -> DEBU 2eb ccResolverWrapper: sending update to cc: {[{orderer2.example.com:7050 0 }] }" -orderer0.example.com | "2019-05-02 01:30:30.822 UTC [grpc] switchBalancer -> DEBU 2ec ClientConn switching balancer to "pick_first"" -orderer0.example.com | "2019-05-02 01:30:30.822 UTC [grpc] HandleSubConnStateChange -> DEBU 2ed pickfirstBalancer: HandleSubConnStateChange: 0xc000286010, CONNECTING" -orderer0.example.com | "2019-05-02 01:30:30.822 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ee 2 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer0.example.com | "2019-05-02 01:30:30.823 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ef 3 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer0.example.com | "2019-05-02 01:30:30.823 UTC [orderer.common.cluster] Configure -> INFO 2f0 Exiting" -orderer0.example.com | "2019-05-02 01:30:30.823 UTC [orderer.consensus.etcdraft] start -> DEBU 2f1 Starting raft node: #peers: 3" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.823 UTC [orderer.consensus.etcdraft] start -> INFO 2f2 Starting raft node as part of a new channel" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.823 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f3 1 became follower at term 0" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.824 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2f4 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.824 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f5 1 became follower at term 1" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.824 UTC [orderer.common.server] Start -> INFO 2f6 Starting orderer: +orderer0.example.com | "2019-05-02 09:27:06.400 UTC [grpc] DialContext -> DEBU 2e9 parsed scheme: """ +orderer0.example.com | "2019-05-02 09:27:06.400 UTC [grpc] DialContext -> DEBU 2ea scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2019-05-02 09:27:06.400 UTC [grpc] UpdateState -> DEBU 2eb ccResolverWrapper: sending update to cc: {[{orderer2.example.com:7050 0 }] }" +orderer0.example.com | "2019-05-02 09:27:06.400 UTC [grpc] switchBalancer -> DEBU 2ec ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2019-05-02 09:27:06.400 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ed 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2019-05-02 09:27:06.400 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ee 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2019-05-02 09:27:06.400 UTC [orderer.common.cluster] Configure -> INFO 2ef Exiting" +orderer0.example.com | "2019-05-02 09:27:06.406 UTC [grpc] HandleSubConnStateChange -> DEBU 2f0 pickfirstBalancer: HandleSubConnStateChange: 0xc000380030, CONNECTING" +orderer0.example.com | "2019-05-02 09:27:06.400 UTC [orderer.consensus.etcdraft] start -> DEBU 2f1 Starting raft node: #peers: 3" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] start -> INFO 2f2 Starting raft node as part of a new channel" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f3 1 became follower at term 0" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2f4 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f5 1 became follower at term 1" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.common.server] Start -> INFO 2f6 Starting orderer: orderer0.example.com | Version: 2.0.0 orderer0.example.com | Commit SHA: development build orderer0.example.com | Go version: go1.12.4 orderer0.example.com | OS/Arch: linux/amd64" -orderer0.example.com | "2019-05-02 01:30:30.825 UTC [orderer.common.server] Start -> INFO 2f7 Beginning to serve requests" -orderer0.example.com | "2019-05-02 01:30:30.826 UTC [grpc] HandleSubConnStateChange -> DEBU 2f8 pickfirstBalancer: HandleSubConnStateChange: 0xc00004f470, CONNECTING" -orderer0.example.com | "2019-05-02 01:30:30.829 UTC [orderer.consensus.etcdraft] apply -> INFO 2f9 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.829 UTC [orderer.consensus.etcdraft] apply -> INFO 2fa Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.830 UTC [orderer.consensus.etcdraft] apply -> INFO 2fb Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:30.849 UTC [grpc] createTransport -> DEBU 2fc grpc: addrConn.createTransport failed to connect to {orderer2.example.com:7050 0 }. Err :connection error: desc = "transport: Error while dialing dial tcp 192.168.240.4:7050: connect: connection refused". Reconnecting..." -orderer0.example.com | "2019-05-02 01:30:30.849 UTC [grpc] HandleSubConnStateChange -> DEBU 2fd pickfirstBalancer: HandleSubConnStateChange: 0xc00004f470, TRANSIENT_FAILURE" -orderer0.example.com | "2019-05-02 01:30:30.852 UTC [grpc] HandleSubConnStateChange -> DEBU 2fe pickfirstBalancer: HandleSubConnStateChange: 0xc000286010, READY" -peer0.org1.example.com | "2019-05-02 01:30:40.819 UTC [msp] New -> DEBU 25c Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.819 UTC [msp] Setup -> DEBU 25d Setting up MSP instance Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.822 UTC [msp.identity] newIdentity -> DEBU 25e Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.823 UTC [msp.identity] newIdentity -> DEBU 25f Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:31.851 UTC [grpc] HandleSubConnStateChange -> DEBU 2ff pickfirstBalancer: HandleSubConnStateChange: 0xc00004f470, CONNECTING" -orderer0.example.com | "2019-05-02 01:30:31.855 UTC [grpc] HandleSubConnStateChange -> DEBU 300 pickfirstBalancer: HandleSubConnStateChange: 0xc00004f470, READY" -orderer0.example.com | "2019-05-02 01:30:32.078 UTC [orderer.common.cluster] Step -> DEBU 301 Connection from orderer2.example.com(192.168.240.4:47814)" -orderer0.example.com | "2019-05-02 01:30:32.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 302 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:32.079 UTC [orderer.consensus.etcdraft] Step -> INFO 303 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:32.079 UTC [orderer.common.cluster] NewStream -> DEBU 304 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" -orderer0.example.com | "2019-05-02 01:30:32.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 305 Sending msg of 28 bytes to 3 on channel testchainid took 82.9µs" -orderer0.example.com | "2019-05-02 01:30:32.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 306 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.4µs " -orderer0.example.com | "2019-05-02 01:30:32.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 307 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:32.084 UTC [orderer.consensus.etcdraft] Step -> INFO 308 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:32.085 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 309 1 became follower at term 2" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:32.085 UTC [orderer.consensus.etcdraft] Step -> INFO 30a 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:32.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30b Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" -orderer0.example.com | "2019-05-02 01:30:32.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " -orderer0.example.com | "2019-05-02 01:30:32.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 36" -orderer0.example.com | "2019-05-02 01:30:32.093 UTC [orderer.consensus.etcdraft] run -> INFO 30e raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:32.096 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 30f Raft leader changed: 0 -> 3" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:32.095 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 310 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" -orderer0.example.com | "2019-05-02 01:30:32.096 UTC [orderer.common.cluster.step] sendMessage -> DEBU 311 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.4µs " -orderer0.example.com | "2019-05-02 01:30:32.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 312 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:32.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 313 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" -orderer0.example.com | "2019-05-02 01:30:32.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 314 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.5µs " -orderer0.example.com | "2019-05-02 01:30:32.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 315 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:32.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 316 Sending msg of 28 bytes to 3 on channel testchainid took 83.4µs" -orderer0.example.com | "2019-05-02 01:30:32.578 UTC [orderer.common.cluster.step] sendMessage -> DEBU 317 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.6µs " -orderer0.example.com | "2019-05-02 01:30:33.081 UTC [orderer.common.cluster.step] handleMessage -> DEBU 318 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:33.081 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 319 Sending msg of 28 bytes to 3 on channel testchainid took 16.2µs" -orderer0.example.com | "2019-05-02 01:30:33.084 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.0682ms " -orderer0.example.com | "2019-05-02 01:30:33.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:33.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31c Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" -orderer0.example.com | "2019-05-02 01:30:33.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 609.6µs " -orderer0.example.com | "2019-05-02 01:30:34.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:34.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31f Sending msg of 28 bytes to 3 on channel testchainid took 23.5µs" -orderer0.example.com | "2019-05-02 01:30:34.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 320 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.9µs " -orderer0.example.com | "2019-05-02 01:30:34.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 321 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -peer0.org1.example.com | "2019-05-02 01:30:40.824 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 260 Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.824 UTC [msp] Validate -> DEBU 261 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:40.825 UTC [msp] getCertificationChain -> DEBU 262 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:40.826 UTC [msp] hasOURole -> DEBU 263 MSP Org1MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:30:40.826 UTC [msp] getCertificationChain -> DEBU 264 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:40.827 UTC [common.channelconfig] NewStandardValues -> DEBU 265 Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.827 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:40.827 UTC [common.channelconfig] NewStandardValues -> DEBU 267 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:40.827 UTC [common.channelconfig] initializeProtosStruct -> DEBU 268 Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.828 UTC [common.channelconfig] Validate -> DEBU 269 Anchor peers for org Org2MSP are " -peer0.org1.example.com | "2019-05-02 01:30:40.828 UTC [common.channelconfig] validateMSP -> DEBU 26a Setting up MSP for org Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.829 UTC [msp] newBccspMsp -> DEBU 26b Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.829 UTC [msp] New -> DEBU 26c Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:40.829 UTC [msp] Setup -> DEBU 26d Setting up MSP instance Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.829 UTC [msp.identity] newIdentity -> DEBU 26e Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.830 UTC [msp.identity] newIdentity -> DEBU 26f Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:40.832 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 270 Checking if identity satisfies role [CLIENT] for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.832 UTC [msp] Validate -> DEBU 271 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:40.832 UTC [msp] getCertificationChain -> DEBU 272 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:40.833 UTC [msp] hasOURole -> DEBU 273 MSP Org2MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:30:40.833 UTC [msp] getCertificationChain -> DEBU 274 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:40.834 UTC [msp] Setup -> DEBU 275 Setting up the MSP manager (3 msps)" -peer0.org1.example.com | "2019-05-02 01:30:40.834 UTC [msp] Setup -> DEBU 276 MSP manager setup complete, setup 3 msps" -peer0.org1.example.com | "2019-05-02 01:30:40.834 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:40.834 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:40.834 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:40.835 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Admins for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:40.835 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:40.835 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Readers for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:40.836 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy Writers for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:40.836 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.836 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Endorsement for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.836 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Readers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.836 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Writers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.837 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Endorsement for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.837 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Readers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.837 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Writers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.838 UTC [policies] NewManagerImpl -> DEBU 285 Proposed new policy Admins for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.838 UTC [policies] NewManagerImpl -> DEBU 286 Proposed new policy Writers for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:40.838 UTC [policies] NewManagerImpl -> DEBU 287 Proposed new policy Admins for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:40.838 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy LifecycleEndorsement for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:40.839 UTC [policies] NewManagerImpl -> DEBU 289 Proposed new policy Endorsement for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:40.839 UTC [policies] NewManagerImpl -> DEBU 28a Proposed new policy Readers for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:40.839 UTC [policies] NewManagerImpl -> DEBU 28b Proposed new policy Admins for Channel" -peer0.org1.example.com | "2019-05-02 01:30:40.839 UTC [policies] NewManagerImpl -> DEBU 28c Proposed new policy Readers for Channel" -peer0.org1.example.com | "2019-05-02 01:30:40.839 UTC [policies] NewManagerImpl -> DEBU 28d Proposed new policy Writers for Channel" -peer0.org1.example.com | "2019-05-02 01:30:40.840 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-05-02 01:30:40.840 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Group] /Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:40.841 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:40.841 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.841 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:30:40.842 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -peer0.org1.example.com | "2019-05-02 01:30:40.842 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-05-02 01:30:40.842 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -peer0.org1.example.com | "2019-05-02 01:30:40.843 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:40.843 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -peer0.org1.example.com | "2019-05-02 01:30:40.843 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Value] /Channel/Orderer/BatchSize" -peer0.org1.example.com | "2019-05-02 01:30:40.843 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -peer0.org1.example.com | "2019-05-02 01:30:40.844 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers" -peer0.org1.example.com | "2019-05-02 01:30:40.844 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Orderer/Writers" -peer0.org1.example.com | "2019-05-02 01:30:40.844 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Orderer/Admins" -peer0.org1.example.com | "2019-05-02 01:30:40.845 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:30:40.845 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:40.845 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.845 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.846 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:40.846 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:40.847 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:40.847 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:40.847 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.848 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.848 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:40.849 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:40.849 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:40.850 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:40.850 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-05-02 01:30:40.850 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:40.850 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:30:40.851 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-05-02 01:30:40.851 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-05-02 01:30:40.851 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:40.851 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:40.851 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Value] /Channel/Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:40.852 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Value] /Channel/Consortium" -peer0.org1.example.com | "2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Value] /Channel/HashingAlgorithm" -peer0.org1.example.com | "2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -peer0.org1.example.com | "2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Value] /Channel/OrdererAddresses" -peer0.org1.example.com | "2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Policy] /Channel/Readers" -peer0.org1.example.com | "2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Policy] /Channel/Writers" -peer0.org1.example.com | "2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:34.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 322 Sending msg of 28 bytes to 3 on channel testchainid took 37µs" -orderer0.example.com | "2019-05-02 01:30:34.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU 323 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0976ms " -orderer0.example.com | "2019-05-02 01:30:35.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 324 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:35.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 325 Sending msg of 28 bytes to 3 on channel testchainid took 152.4µs" -orderer0.example.com | "2019-05-02 01:30:35.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 326 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 302.2µs " -orderer0.example.com | "2019-05-02 01:30:35.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 327 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:35.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 328 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" -orderer0.example.com | "2019-05-02 01:30:35.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU 329 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 212.9µs " -orderer0.example.com | "2019-05-02 01:30:36.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:36.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " -orderer0.example.com | "2019-05-02 01:30:36.081 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32c Sending msg of 28 bytes to 3 on channel testchainid took 18.9µs" -orderer0.example.com | "2019-05-02 01:30:36.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:36.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" -orderer0.example.com | "2019-05-02 01:30:36.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.5µs " -orderer0.example.com | "2019-05-02 01:30:37.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:37.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 24.3µs" -orderer0.example.com | "2019-05-02 01:30:37.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " -orderer0.example.com | "2019-05-02 01:30:37.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:37.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" -orderer0.example.com | "2019-05-02 01:30:37.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 387.5µs " -orderer0.example.com | "2019-05-02 01:30:38.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 336 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:38.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 337 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" -orderer0.example.com | "2019-05-02 01:30:38.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 338 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126µs " -orderer0.example.com | "2019-05-02 01:30:38.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU 339 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:38.588 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33a Sending msg of 28 bytes to 3 on channel testchainid took 29µs" -orderer0.example.com | "2019-05-02 01:30:38.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130µs " -orderer0.example.com | "2019-05-02 01:30:38.774 UTC [orderer.common.server] Deliver -> DEBU 33c Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:38.775 UTC [common.deliver] Handle -> DEBU 33d Starting new deliver loop for 192.168.240.9:47266" -orderer0.example.com | "2019-05-02 01:30:38.776 UTC [common.deliver] Handle -> DEBU 33e Attempting to read seek info message from 192.168.240.9:47266" -orderer0.example.com | "2019-05-02 01:30:38.785 UTC [orderer.common.server] Broadcast -> DEBU 33f Starting new Broadcast handler" -orderer0.example.com | "2019-05-02 01:30:38.785 UTC [orderer.common.broadcast] Handle -> DEBU 340 Starting new broadcast loop for 192.168.240.9:47268" -orderer0.example.com | "2019-05-02 01:30:38.786 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 341 [channel: businesschannel] Broadcast is processing config update message from 192.168.240.9:47268" -orderer0.example.com | "2019-05-02 01:30:38.786 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 342 Processing config update tx with system channel message processor for channel ID businesschannel" -orderer0.example.com | "2019-05-02 01:30:38.786 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 343 Processing channel create tx for channel businesschannel on system channel testchainid" -orderer0.example.com | "2019-05-02 01:30:38.786 UTC [common.channelconfig] NewStandardValues -> DEBU 344 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:38.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 345 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:38.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 346 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:38.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 347 Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:38.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 348 Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:38.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 349 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.788 UTC [common.channelconfig] NewStandardValues -> DEBU 34a Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:38.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34b Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:38.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34c Processing field: BatchSize" -peer0.org1.example.com | "2019-05-02 01:30:40.853 UTC [common.capabilities] Supported -> DEBU 2ba Application capability V2_0 is supported and is enabled" -peer0.org1.example.com | "2019-05-02 01:30:40.854 UTC [common.capabilities] Supported -> DEBU 2bb Channel capability V2_0 is supported and is enabled" -peer0.org1.example.com | "2019-05-02 01:30:40.854 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bc As expected, current configuration has policy '/Channel/Readers'" -peer0.org1.example.com | "2019-05-02 01:30:40.854 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bd As expected, current configuration has policy '/Channel/Writers'" -peer0.org1.example.com | "2019-05-02 01:30:40.854 UTC [policies] Manager -> DEBU 2be Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-05-02 01:30:40.855 UTC [policies] Manager -> DEBU 2bf Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:30:40.855 UTC [policies] Manager -> DEBU 2c0 Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:30:40.855 UTC [policies] Manager -> DEBU 2c1 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-05-02 01:30:40.855 UTC [policies] Manager -> DEBU 2c2 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.856 UTC [policies] Manager -> DEBU 2c3 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:40.856 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c4 As expected, current configuration has policy '/Channel/Application/Readers'" -peer0.org1.example.com | "2019-05-02 01:30:40.856 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c5 As expected, current configuration has policy '/Channel/Application/Writers'" -peer0.org1.example.com | "2019-05-02 01:30:40.856 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c6 As expected, current configuration has policy '/Channel/Application/Admins'" -peer0.org1.example.com | "2019-05-02 01:30:40.856 UTC [policies] Manager -> DEBU 2c7 Manager Channel looking up path [Orderer]" -peer0.org1.example.com | "2019-05-02 01:30:40.857 UTC [policies] Manager -> DEBU 2c8 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:30:40.857 UTC [policies] Manager -> DEBU 2c9 Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:30:40.858 UTC [policies] Manager -> DEBU 2ca Manager Channel/Orderer looking up path []" -peer0.org1.example.com | "2019-05-02 01:30:40.858 UTC [policies] Manager -> DEBU 2cb Manager Channel/Orderer has managers OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:40.858 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -peer0.org1.example.com | "2019-05-02 01:30:40.858 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2cd Processing new config for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.859 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2ce Calling out because config was updated for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.859 UTC [gossip.service] updateAnchors -> DEBU 2cf Org1MSP anchor peers: []" -peer0.org1.example.com | "2019-05-02 01:30:40.861 UTC [gossip.service] updateAnchors -> DEBU 2d0 Org2MSP anchor peers: []" -peer0.org1.example.com | "2019-05-02 01:30:40.861 UTC [gossip.service] updateAnchors -> DEBU 2d1 Creating state provider for chainID businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.861 UTC [gossip.gossip] JoinChan -> INFO 2d2 Joining gossip network of channel businesschannel with 2 organizations" -peer0.org1.example.com | "2019-05-02 01:30:40.861 UTC [gossip.gossip] learnAnchorPeers -> INFO 2d3 No configured anchor peers of Org1MSP for channel businesschannel to learn about" -peer0.org1.example.com | "2019-05-02 01:30:40.861 UTC [gossip.gossip] learnAnchorPeers -> INFO 2d4 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer0.org1.example.com | "2019-05-02 01:30:40.862 UTC [peer] updateTrustedRoots -> DEBU 2d5 Updating trusted root authorities for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.875 UTC [peer] buildTrustedRootsForChain -> DEBU 2d6 updating root CAs for channel [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:40.875 UTC [peer] buildTrustedRootsForChain -> DEBU 2d7 adding orderer root CAs for MSP [OrdererMSP]" -peer0.org1.example.com | "2019-05-02 01:30:40.875 UTC [peer] buildTrustedRootsForChain -> DEBU 2d8 adding app root CAs for MSP [Org1MSP]" -peer0.org1.example.com | "2019-05-02 01:30:40.875 UTC [peer] buildTrustedRootsForChain -> DEBU 2d9 adding app root CAs for MSP [Org2MSP]" -peer0.org1.example.com | "2019-05-02 01:30:40.876 UTC [kvledger.util] CreateDirIfMissing -> DEBU 2da CreateDirIfMissing [/var/hyperledger/production/transientStore/]" -peer0.org1.example.com | "2019-05-02 01:30:40.876 UTC [kvledger.util] logDirStatus -> DEBU 2db Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" -peer0.org1.example.com | "2019-05-02 01:30:40.877 UTC [kvledger.util] logDirStatus -> DEBU 2dc After creating dir - [/var/hyperledger/production/transientStore/] exists" -peer0.org1.example.com | "2019-05-02 01:30:40.887 UTC [gossip.service] InitializeChannel -> DEBU 2dd Creating state provider for chainID businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.889 UTC [msp.identity] Sign -> DEBU 2de Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " -peer0.org1.example.com | "2019-05-02 01:30:40.889 UTC [msp.identity] Sign -> DEBU 2df Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " -peer0.org1.example.com | "2019-05-02 01:30:40.890 UTC [gossip.privdata] NewReconciler -> DEBU 2e0 Private data reconciliation is enabled" -peer0.org1.example.com | "2019-05-02 01:30:40.895 UTC [gossip.state] NewGossipStateProvider -> INFO 2e1 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" -peer0.org1.example.com | "2019-05-02 01:30:40.895 UTC [gossip.state] NewGossipStateProvider -> DEBU 2e2 Updating gossip ledger height to 1" -peer0.org1.example.com | "2019-05-02 01:30:40.895 UTC [msp.identity] Sign -> DEBU 2e3 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020801 " -peer0.org1.example.com | "2019-05-02 01:30:40.895 UTC [msp.identity] Sign -> DEBU 2e4 Sign: digest: 5D5E8594944356B7F43B3555131CB08ECE5F4E5C0A4549E5569888902FBF67FF " -peer0.org1.example.com | "2019-05-02 01:30:40.896 UTC [gossip.service] InitializeChannel -> DEBU 2e5 Delivery uses dynamic leader election mechanism, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.897 UTC [peer] InitChain -> DEBU 2e6 Initializing channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.897 UTC [nodeCmd] func6 -> DEBU 2e7 Deploying system CC, for channel " -peer0.org1.example.com | "2019-05-02 01:30:40.897 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2e8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:30:40.897 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e9 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:30:40.897 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2ea constructing new tx simulator txid = [0931a319-abc8-40da-854d-d3d92c0fd340]" -peer0.org1.example.com | "2019-05-02 01:30:40.897 UTC [gossip.election] handleMessages -> DEBU 2eb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:30:40.897 UTC [chaincode] Execute -> DEBU 2ec Entry" -peer0.org1.example.com | "2019-05-02 01:30:40.897 UTC [chaincode] handleMessage -> DEBU 2ed [0931a319] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:40.898 UTC [chaincode] Notify -> DEBU 2ee [0931a319] notifying Txid:0931a319-abc8-40da-854d-d3d92c0fd340, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.898 UTC [chaincode] Execute -> DEBU 2ef Exit" -peer0.org1.example.com | "2019-05-02 01:30:40.898 UTC [sccapi] deploySysCC -> INFO 2f0 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer0.org1.example.com | "2019-05-02 01:30:40.898 UTC [lockbasedtxmgr] Done -> DEBU 2f1 Done with transaction simulation / query execution [0931a319-abc8-40da-854d-d3d92c0fd340]" -peer0.org1.example.com | "2019-05-02 01:30:40.899 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2f2 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:30:40.899 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2f3 constructing new tx simulator txid = [0026da2f-47a1-4c54-8463-5813051fa044]" -peer0.org1.example.com | "2019-05-02 01:30:40.899 UTC [chaincode] Execute -> DEBU 2f4 Entry" -peer0.org1.example.com | "2019-05-02 01:30:40.900 UTC [cscc] Init -> INFO 2f5 Init CSCC" -peer0.org1.example.com | "2019-05-02 01:30:40.900 UTC [chaincode] handleMessage -> DEBU 2f6 [0026da2f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:40.900 UTC [chaincode] Notify -> DEBU 2f7 [0026da2f] notifying Txid:0026da2f-47a1-4c54-8463-5813051fa044, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.901 UTC [chaincode] Execute -> DEBU 2f8 Exit" -peer0.org1.example.com | "2019-05-02 01:30:40.901 UTC [sccapi] deploySysCC -> INFO 2f9 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer0.org1.example.com | "2019-05-02 01:30:40.902 UTC [lockbasedtxmgr] Done -> DEBU 2fa Done with transaction simulation / query execution [0026da2f-47a1-4c54-8463-5813051fa044]" -peer0.org1.example.com | "2019-05-02 01:30:40.902 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2fb constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:30:40.902 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2fc constructing new tx simulator txid = [159c8873-a021-4e94-8343-dd2844c25760]" -peer0.org1.example.com | "2019-05-02 01:30:40.902 UTC [chaincode] Execute -> DEBU 2fd Entry" -peer0.org1.example.com | "2019-05-02 01:30:40.903 UTC [qscc] Init -> INFO 2fe Init QSCC" -peer0.org1.example.com | "2019-05-02 01:30:40.903 UTC [chaincode] handleMessage -> DEBU 2ff [159c8873] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -orderer0.example.com | "2019-05-02 01:30:38.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34d Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:38.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34e Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:38.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34f Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:38.790 UTC [common.channelconfig] initializeProtosStruct -> DEBU 350 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.790 UTC [common.channelconfig] NewStandardValues -> DEBU 351 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.790 UTC [common.channelconfig] initializeProtosStruct -> DEBU 352 Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:38.790 UTC [common.channelconfig] NewStandardValues -> DEBU 353 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.791 UTC [common.channelconfig] initializeProtosStruct -> DEBU 354 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.791 UTC [common.channelconfig] validateMSP -> DEBU 355 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.791 UTC [msp] newBccspMsp -> DEBU 356 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.791 UTC [msp] New -> DEBU 357 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.791 UTC [msp] Setup -> DEBU 358 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:38.793 UTC [msp.identity] newIdentity -> DEBU 359 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:06.406 UTC [orderer.common.server] Start -> INFO 2f7 Beginning to serve requests" +peer0.org1.example.com | "2019-05-02 09:27:16.216 UTC [peer] processChannelConfigTx -> DEBU 20e channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-05-02 09:27:16.216 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 20f Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:16.217 UTC [lockbasedtxmgr] Done -> DEBU 210 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-05-02 09:27:16.217 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 211 Block [0] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +peer0.org1.example.com | "2019-05-02 09:27:16.217 UTC [valinternal] ApplyWriteSet -> DEBU 212 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0025df140)}" +peer0.org1.example.com | "2019-05-02 09:27:16.217 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 213 validating rwset..." +peer0.org1.example.com | "2019-05-02 09:27:16.218 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 214 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:16.218 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 215 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-05-02 09:27:16.218 UTC [kvledger] CommitWithPvtData -> DEBU 216 [businesschannel] Committing block [0] to storage" +orderer0.example.com | "2019-05-02 09:27:06.407 UTC [grpc] HandleSubConnStateChange -> DEBU 2f8 pickfirstBalancer: HandleSubConnStateChange: 0xc000380350, CONNECTING" +orderer0.example.com | "2019-05-02 09:27:06.417 UTC [orderer.consensus.etcdraft] apply -> INFO 2f9 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.417 UTC [orderer.consensus.etcdraft] apply -> INFO 2fa Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.417 UTC [orderer.consensus.etcdraft] apply -> INFO 2fb Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:06.422 UTC [grpc] HandleSubConnStateChange -> DEBU 2fc pickfirstBalancer: HandleSubConnStateChange: 0xc000380350, READY" +orderer0.example.com | "2019-05-02 09:27:06.493 UTC [grpc] HandleSubConnStateChange -> DEBU 2fd pickfirstBalancer: HandleSubConnStateChange: 0xc000380030, READY" +orderer0.example.com | "2019-05-02 09:27:07.746 UTC [orderer.common.cluster] Step -> DEBU 2fe Connection from orderer2.example.com(172.18.0.3:56182)" +orderer0.example.com | "2019-05-02 09:27:07.746 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2ff Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:07.747 UTC [orderer.consensus.etcdraft] Step -> INFO 300 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:07.747 UTC [orderer.common.cluster] NewStream -> DEBU 301 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-05-02 09:27:07.747 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 302 Sending msg of 28 bytes to 3 on channel testchainid took 114.2µs" +orderer0.example.com | "2019-05-02 09:27:07.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU 303 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130µs " +orderer0.example.com | "2019-05-02 09:27:07.752 UTC [orderer.common.cluster.step] handleMessage -> DEBU 304 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:07.752 UTC [orderer.consensus.etcdraft] Step -> INFO 305 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:07.752 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 306 1 became follower at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:07.752 UTC [orderer.consensus.etcdraft] Step -> INFO 307 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:07.753 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 308 Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +orderer0.example.com | "2019-05-02 09:27:07.753 UTC [orderer.common.cluster.step] sendMessage -> DEBU 309 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +orderer0.example.com | "2019-05-02 09:27:07.756 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 36" +orderer0.example.com | "2019-05-02 09:27:07.756 UTC [orderer.consensus.etcdraft] run -> INFO 30b raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:07.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30c Sending msg of 28 bytes to 3 on channel testchainid took 29.3µs" +orderer0.example.com | "2019-05-02 09:27:07.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs " +orderer0.example.com | "2019-05-02 09:27:07.759 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 30e Raft leader changed: 0 -> 3" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:07.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:07.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 310 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +orderer0.example.com | "2019-05-02 09:27:07.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 311 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131µs " +orderer0.example.com | "2019-05-02 09:27:08.244 UTC [orderer.common.cluster.step] handleMessage -> DEBU 312 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:08.244 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 313 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +orderer0.example.com | "2019-05-02 09:27:08.244 UTC [orderer.common.cluster.step] sendMessage -> DEBU 314 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs " +orderer0.example.com | "2019-05-02 09:27:08.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU 315 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:08.748 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 316 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +orderer0.example.com | "2019-05-02 09:27:08.748 UTC [orderer.common.cluster.step] sendMessage -> DEBU 317 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.9µs " +orderer0.example.com | "2019-05-02 09:27:09.245 UTC [orderer.common.cluster.step] handleMessage -> DEBU 318 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:09.247 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 319 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2019-05-02 09:27:09.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 411µs " +orderer0.example.com | "2019-05-02 09:27:09.746 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:09.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31c Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +orderer0.example.com | "2019-05-02 09:27:09.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.6µs " +orderer0.example.com | "2019-05-02 09:27:10.245 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:10.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31f Sending msg of 28 bytes to 3 on channel testchainid took 28.7µs" +orderer0.example.com | "2019-05-02 09:27:10.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU 320 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 445.4µs " +orderer0.example.com | "2019-05-02 09:27:10.744 UTC [orderer.common.cluster.step] handleMessage -> DEBU 321 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:10.744 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 322 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +orderer0.example.com | "2019-05-02 09:27:10.744 UTC [orderer.common.cluster.step] sendMessage -> DEBU 323 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.1µs " +orderer0.example.com | "2019-05-02 09:27:11.244 UTC [orderer.common.cluster.step] handleMessage -> DEBU 324 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:11.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 325 Sending msg of 28 bytes to 3 on channel testchainid took 71.5µs" +orderer0.example.com | "2019-05-02 09:27:11.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU 326 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 409.4µs " +orderer0.example.com | "2019-05-02 09:27:11.745 UTC [orderer.common.cluster.step] handleMessage -> DEBU 327 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:11.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 328 Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs" +orderer0.example.com | "2019-05-02 09:27:11.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 329 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.2µs " +orderer0.example.com | "2019-05-02 09:27:12.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:12.247 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32b Sending msg of 28 bytes to 3 on channel testchainid took 30µs" +orderer0.example.com | "2019-05-02 09:27:12.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +orderer0.example.com | "2019-05-02 09:27:12.745 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:12.748 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 28.9µs" +orderer0.example.com | "2019-05-02 09:27:12.750 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 475.2µs " +orderer0.example.com | "2019-05-02 09:27:13.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:13.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" +orderer0.example.com | "2019-05-02 09:27:13.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 936µs " +orderer0.example.com | "2019-05-02 09:27:13.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:13.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +orderer0.example.com | "2019-05-02 09:27:13.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.7µs " +orderer0.example.com | "2019-05-02 09:27:14.124 UTC [orderer.common.server] Deliver -> DEBU 336 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:14.124 UTC [common.deliver] Handle -> DEBU 337 Starting new deliver loop for 172.18.0.8:57138" +orderer0.example.com | "2019-05-02 09:27:14.124 UTC [common.deliver] Handle -> DEBU 338 Attempting to read seek info message from 172.18.0.8:57138" +orderer0.example.com | "2019-05-02 09:27:14.153 UTC [orderer.common.server] Broadcast -> DEBU 339 Starting new Broadcast handler" +orderer0.example.com | "2019-05-02 09:27:14.153 UTC [orderer.common.broadcast] Handle -> DEBU 33a Starting new broadcast loop for 172.18.0.8:57140" +orderer0.example.com | "2019-05-02 09:27:14.154 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 33b [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57140" +orderer0.example.com | "2019-05-02 09:27:14.154 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 33c Processing config update tx with system channel message processor for channel ID businesschannel" +orderer0.example.com | "2019-05-02 09:27:14.154 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 33d Processing channel create tx for channel businesschannel on system channel testchainid" +orderer0.example.com | "2019-05-02 09:27:14.156 UTC [common.channelconfig] NewStandardValues -> DEBU 33e Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:14.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33f Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 340 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 341 Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 342 Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 343 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.158 UTC [common.channelconfig] NewStandardValues -> DEBU 344 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:14.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 345 Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:14.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 346 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:14.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 347 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:14.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 348 Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:14.161 UTC [common.channelconfig] initializeProtosStruct -> DEBU 349 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:14.162 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34a Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.162 UTC [common.channelconfig] NewStandardValues -> DEBU 34b Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.162 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34c Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:14.162 UTC [common.channelconfig] NewStandardValues -> DEBU 34d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.163 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34e Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.163 UTC [common.channelconfig] validateMSP -> DEBU 34f Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.164 UTC [msp] newBccspMsp -> DEBU 350 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.164 UTC [msp] New -> DEBU 351 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.164 UTC [msp] Setup -> DEBU 352 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:14.166 UTC [msp.identity] newIdentity -> DEBU 353 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | "2019-05-02 09:27:16.218 UTC [ledgerstorage] CommitWithPvtData -> DEBU 217 Writing block [0] to pvt block store" +peer0.org1.example.com | "2019-05-02 09:27:16.221 UTC [pvtdatastorage] Prepare -> DEBU 218 Saved 0 private data write sets for block [0]" +peer0.org1.example.com | "2019-05-02 09:27:16.225 UTC [fsblkstorage] indexBlock -> DEBU 219 Indexing block [blockNum=0, blockHash=[]byte{0x26, 0xf2, 0x93, 0x1, 0xed, 0x1c, 0x73, 0x48, 0xfc, 0x20, 0x75, 0x55, 0x5, 0x51, 0x67, 0x25, 0xf3, 0x5a, 0xec, 0x82, 0x34, 0x6d, 0xbc, 0x24, 0xb7, 0xb3, 0xb4, 0x5c, 0xd0, 0xdf, 0x9, 0xb3} txOffsets= +peer0.org1.example.com | txId= locPointer=offset=39, bytesLength=23894 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-05-02 09:27:16.225 UTC [fsblkstorage] indexBlock -> DEBU 21a Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23894] for tx ID: [] to txid-index" +peer0.org1.example.com | "2019-05-02 09:27:16.225 UTC [fsblkstorage] indexBlock -> DEBU 21b Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23894] for tx number:[0] ID: [] to blockNumTranNum index" +peer0.org1.example.com | "2019-05-02 09:27:16.228 UTC [fsblkstorage] updateCheckpoint -> DEBU 21c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23939], isChainEmpty=[false], lastBlockNumber=[0]" +peer0.org1.example.com | "2019-05-02 09:27:16.229 UTC [pvtdatastorage] Commit -> DEBU 21d Committing private data for block [0]" +peer0.org1.example.com | "2019-05-02 09:27:16.231 UTC [pvtdatastorage] Commit -> DEBU 21e Committed private data for block [0]" +peer0.org1.example.com | "2019-05-02 09:27:16.231 UTC [pvtdatastorage] func1 -> DEBU 21f Purger started: Purging expired private data till block number [0]" +peer0.org1.example.com | "2019-05-02 09:27:16.231 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 220 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" +peer0.org1.example.com | "2019-05-02 09:27:16.232 UTC [leveldbhelper] GetIterator -> DEBU 221 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:16.232 UTC [pvtdatastorage] func1 -> DEBU 222 Purger finished" +peer0.org1.example.com | "2019-05-02 09:27:16.231 UTC [kvledger] CommitWithPvtData -> DEBU 223 [businesschannel] Committing block [0] transactions to state database" +peer0.org1.example.com | "2019-05-02 09:27:16.232 UTC [lockbasedtxmgr] Commit -> DEBU 224 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:16.232 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 225 Preparing potential purge list working-set for expiringAtBlk [0]" +peer0.org1.example.com | "2019-05-02 09:27:16.232 UTC [leveldbhelper] GetIterator -> DEBU 226 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:16.233 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 227 No expiry entry found for expiringAtBlk [0]" +peer0.org1.example.com | "2019-05-02 09:27:16.233 UTC [lockbasedtxmgr] Commit -> DEBU 228 Committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:16.233 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 229 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-05-02 09:27:16.233 UTC [lockbasedtxmgr] Commit -> DEBU 22a Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:16.233 UTC [stateleveldb] ApplyUpdates -> DEBU 22b Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-05-02 09:27:16.236 UTC [lockbasedtxmgr] Commit -> DEBU 22c Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-05-02 09:27:16.236 UTC [lockbasedtxmgr] func1 -> DEBU 22d launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-05-02 09:27:16.236 UTC [kvledger] CommitWithPvtData -> DEBU 22e [businesschannel] Committing block [0] transactions to history database" +peer0.org1.example.com | "2019-05-02 09:27:16.237 UTC [historyleveldb] Commit -> DEBU 22f Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" +peer0.org1.example.com | "2019-05-02 09:27:16.237 UTC [historyleveldb] Commit -> DEBU 230 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-05-02 09:27:16.236 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 231 Preparing potential purge list working-set for expiringAtBlk [1]" +peer0.org1.example.com | "2019-05-02 09:27:16.238 UTC [leveldbhelper] GetIterator -> DEBU 232 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:16.238 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 233 No expiry entry found for expiringAtBlk [1]" +peer0.org1.example.com | "2019-05-02 09:27:16.240 UTC [historyleveldb] Commit -> DEBU 234 Channel [businesschannel]: Updates committed to history database for blockNo [0]" +peer0.org1.example.com | "2019-05-02 09:27:16.240 UTC [kvledger] CommitWithPvtData -> INFO 235 [businesschannel] Committed block [0] with 1 transaction(s) in 30ms (state_validation=8ms block_commit=12ms state_commit=5ms)" +peer0.org1.example.com | "2019-05-02 09:27:16.244 UTC [ledgermgmt] CreateLedger -> INFO 236 Created ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-05-02 09:27:16.244 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 237 constructing new query executor txid = [3c4bb870-9db6-45fa-a5ec-324bd6705f2e]" +peer0.org1.example.com | "2019-05-02 09:27:16.244 UTC [stateleveldb] GetState -> DEBU 238 GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" +peer0.org1.example.com | "2019-05-02 09:27:16.245 UTC [lockbasedtxmgr] Done -> DEBU 239 Done with transaction simulation / query execution [3c4bb870-9db6-45fa-a5ec-324bd6705f2e]" +peer0.org1.example.com | "2019-05-02 09:27:16.245 UTC [common.channelconfig] NewStandardValues -> DEBU 23a Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: Consortium" +peer0.org1.example.com | "2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: ConsensusType" +peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BatchSize" +peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:16.248 UTC [common.channelconfig] NewStandardValues -> DEBU 247 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: Endpoints" +peer0.org1.example.com | "2019-05-02 09:27:16.248 UTC [common.channelconfig] NewStandardValues -> DEBU 249 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.248 UTC [common.channelconfig] validateMSP -> DEBU 24b Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:16.249 UTC [msp] newBccspMsp -> DEBU 24c Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.249 UTC [msp] New -> DEBU 24d Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.249 UTC [msp] Setup -> DEBU 24e Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-05-02 09:27:16.250 UTC [msp.identity] newIdentity -> DEBU 24f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.251 UTC [msp.identity] newIdentity -> DEBU 250 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [msp] Validate -> DEBU 251 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [common.channelconfig] NewStandardValues -> DEBU 252 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [common.channelconfig] initializeProtosStruct -> DEBU 253 Processing field: ACLs" +peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [common.channelconfig] initializeProtosStruct -> DEBU 254 Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [common.channelconfig] NewStandardValues -> DEBU 255 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.252 UTC [common.channelconfig] initializeProtosStruct -> DEBU 256 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:16.253 UTC [common.channelconfig] NewStandardValues -> DEBU 257 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 258 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.253 UTC [common.channelconfig] Validate -> DEBU 259 Anchor peers for org Org1MSP are " +peer0.org1.example.com | "2019-05-02 09:27:16.253 UTC [common.channelconfig] validateMSP -> DEBU 25a Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.253 UTC [msp] newBccspMsp -> DEBU 25b Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.254 UTC [msp] New -> DEBU 25c Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.254 UTC [msp] Setup -> DEBU 25d Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.254 UTC [msp.identity] newIdentity -> DEBU 25e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.255 UTC [msp.identity] newIdentity -> DEBU 25f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -4039,7 +3848,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.795 UTC [msp.identity] newIdentity -> DEBU 35a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.168 UTC [msp.identity] newIdentity -> DEBU 354 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -4052,130 +3861,20 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.796 UTC [msp] Validate -> DEBU 35b MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.797 UTC [common.channelconfig] NewStandardValues -> DEBU 35c Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-05-02 01:30:38.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35d Processing field: ACLs" -orderer0.example.com | "2019-05-02 01:30:38.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35e Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.797 UTC [common.channelconfig] NewStandardValues -> DEBU 35f Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.798 UTC [common.channelconfig] initializeProtosStruct -> DEBU 360 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:38.798 UTC [common.channelconfig] NewStandardValues -> DEBU 361 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.798 UTC [common.channelconfig] initializeProtosStruct -> DEBU 362 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.799 UTC [common.channelconfig] Validate -> DEBU 363 Anchor peers for org Org1MSP are " -orderer0.example.com | "2019-05-02 01:30:38.799 UTC [common.channelconfig] validateMSP -> DEBU 364 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.799 UTC [msp] newBccspMsp -> DEBU 365 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.799 UTC [msp] New -> DEBU 366 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.799 UTC [msp] Setup -> DEBU 367 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.801 UTC [msp.identity] newIdentity -> DEBU 368 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.801 UTC [msp.identity] newIdentity -> DEBU 369 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.803 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 36a Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.803 UTC [msp] Validate -> DEBU 36b MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.804 UTC [msp] getCertificationChain -> DEBU 36c MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:40.903 UTC [chaincode] Notify -> DEBU 300 [159c8873] notifying Txid:159c8873-a021-4e94-8343-dd2844c25760, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.904 UTC [chaincode] Execute -> DEBU 301 Exit" -peer0.org1.example.com | "2019-05-02 01:30:40.904 UTC [sccapi] deploySysCC -> INFO 302 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer0.org1.example.com | "2019-05-02 01:30:40.905 UTC [lockbasedtxmgr] Done -> DEBU 303 Done with transaction simulation / query execution [159c8873-a021-4e94-8343-dd2844c25760]" -peer0.org1.example.com | "2019-05-02 01:30:40.905 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 304 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:30:40.905 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 305 constructing new tx simulator txid = [ffda1102-2ccc-4d41-9fad-c4bb2d002d42]" -peer0.org1.example.com | "2019-05-02 01:30:40.906 UTC [chaincode] Execute -> DEBU 306 Entry" -peer0.org1.example.com | "2019-05-02 01:30:40.906 UTC [chaincode] handleMessage -> DEBU 307 [ffda1102] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:40.906 UTC [chaincode] Notify -> DEBU 308 [ffda1102] notifying Txid:ffda1102-2ccc-4d41-9fad-c4bb2d002d42, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:40.907 UTC [chaincode] Execute -> DEBU 309 Exit" -peer0.org1.example.com | "2019-05-02 01:30:40.907 UTC [sccapi] deploySysCC -> INFO 30a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" -peer0.org1.example.com | "2019-05-02 01:30:40.907 UTC [lockbasedtxmgr] Done -> DEBU 30b Done with transaction simulation / query execution [ffda1102-2ccc-4d41-9fad-c4bb2d002d42]" -peer0.org1.example.com | "2019-05-02 01:30:40.908 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 30c constructing new query executor txid = [feef2973-cb24-4032-b31c-0795ecb63453]" -peer0.org1.example.com | "2019-05-02 01:30:40.908 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 30d Returning []" -peer0.org1.example.com | "2019-05-02 01:30:40.908 UTC [lockbasedtxmgr] Done -> DEBU 30e Done with transaction simulation / query execution [feef2973-cb24-4032-b31c-0795ecb63453]" -peer0.org1.example.com | "2019-05-02 01:30:40.909 UTC [msp.identity] Sign -> DEBU 30f Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020801 " -peer0.org1.example.com | "2019-05-02 01:30:40.909 UTC [msp.identity] Sign -> DEBU 310 Sign: digest: CF013B4EFDFB559B5B6EB630DCF76F66C1C7F8CC88B6AD4A12C21380798AFA4C " -peer0.org1.example.com | "2019-05-02 01:30:40.910 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 311 Listeners for channel businesschannel invoked" -peer0.org1.example.com | "2019-05-02 01:30:40.910 UTC [chaincode] handleMessage -> DEBU 312 [dd1fa066] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:40.910 UTC [chaincode] Notify -> DEBU 313 [dd1fa066] notifying Txid:dd1fa066e4336fdb8c0bfafb034fe06984b31b027331fc8a6f9955ca29e6dce8, channelID:" -peer0.org1.example.com | "2019-05-02 01:30:40.910 UTC [chaincode] Execute -> DEBU 314 Exit" -peer0.org1.example.com | "2019-05-02 01:30:40.911 UTC [endorser] callChaincode -> INFO 315 [][dd1fa066] Exit chaincode: name:"cscc" (174ms)" -peer0.org1.example.com | "2019-05-02 01:30:40.911 UTC [endorser] SimulateProposal -> DEBU 316 [][dd1fa066] Exit" -peer0.org1.example.com | "2019-05-02 01:30:40.911 UTC [endorser] func1 -> DEBU 317 Exit: request from 192.168.240.9:41182" -peer0.org1.example.com | "2019-05-02 01:30:40.911 UTC [comm.grpc.server] 1 -> INFO 318 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41182 grpc.code=OK grpc.call_duration=181.0442ms -peer0.org1.example.com | "2019-05-02 01:30:40.917 UTC [grpc] infof -> DEBU 319 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:41.454 UTC [gossip.gossip] handleMessage -> DEBU 31a Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.454 UTC [gossip.gossip] handleMessage -> DEBU 31b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.455 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.456 UTC [msp.identity] Verify -> DEBU 31d Verify: digest = 00000000 86 1a 48 7f c7 74 8c 19 08 12 9d 48 5e 7c 7b fb |..H..t.....H^|{.| -peer0.org1.example.com | 00000010 61 2f 71 21 f1 9b f0 fe 2f 07 e2 9b 36 d4 cf 55 |a/q!..../...6..U|" -peer0.org1.example.com | "2019-05-02 01:30:41.456 UTC [msp.identity] Verify -> DEBU 31e Verify: sig = 00000000 30 44 02 20 58 0c a2 6c 0e 3c 4f 26 19 6c 8d 90 |0D. X..l. DEBU 31f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:41.457 UTC [msp.identity] Verify -> DEBU 320 Verify: sig = 00000000 30 45 02 21 00 ff 76 bf a6 d4 77 88 66 ae 16 78 |0E.!..v...w.f..x| -orderer0.example.com | "2019-05-02 01:30:38.805 UTC [msp] hasOURole -> DEBU 36d MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:38.805 UTC [msp] getCertificationChain -> DEBU 36e MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.805 UTC [common.channelconfig] NewStandardValues -> DEBU 36f Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.805 UTC [common.channelconfig] initializeProtosStruct -> DEBU 370 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:38.805 UTC [common.channelconfig] NewStandardValues -> DEBU 371 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.806 UTC [common.channelconfig] initializeProtosStruct -> DEBU 372 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.806 UTC [common.channelconfig] Validate -> DEBU 373 Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-05-02 01:30:38.807 UTC [common.channelconfig] validateMSP -> DEBU 374 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.807 UTC [msp] newBccspMsp -> DEBU 375 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.807 UTC [msp] New -> DEBU 376 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.807 UTC [msp] Setup -> DEBU 377 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.808 UTC [msp.identity] newIdentity -> DEBU 378 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.169 UTC [msp] Validate -> DEBU 355 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.169 UTC [common.channelconfig] NewStandardValues -> DEBU 356 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-05-02 09:27:14.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 357 Processing field: ACLs" +orderer0.example.com | "2019-05-02 09:27:14.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 358 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.171 UTC [common.channelconfig] NewStandardValues -> DEBU 359 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.171 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35a Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:14.171 UTC [common.channelconfig] NewStandardValues -> DEBU 35b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.172 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35c Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.172 UTC [common.channelconfig] Validate -> DEBU 35d Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-05-02 09:27:14.173 UTC [common.channelconfig] validateMSP -> DEBU 35e Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.173 UTC [msp] newBccspMsp -> DEBU 35f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.173 UTC [msp] New -> DEBU 360 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.174 UTC [msp] Setup -> DEBU 361 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.175 UTC [msp.identity] newIdentity -> DEBU 362 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -4190,7 +3889,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.809 UTC [msp.identity] newIdentity -> DEBU 379 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.176 UTC [msp.identity] newIdentity -> DEBU 363 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -4204,197 +3903,113 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.810 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 37a Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.810 UTC [msp] Validate -> DEBU 37b MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.811 UTC [msp] getCertificationChain -> DEBU 37c MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.811 UTC [msp] hasOURole -> DEBU 37d MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:38.811 UTC [msp] getCertificationChain -> DEBU 37e MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.812 UTC [msp] Setup -> DEBU 37f Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:38.812 UTC [msp] Setup -> DEBU 380 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:38.812 UTC [policies] NewManagerImpl -> DEBU 381 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.812 UTC [policies] NewManagerImpl -> DEBU 382 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.813 UTC [policies] NewManagerImpl -> DEBU 383 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.813 UTC [policies] NewManagerImpl -> DEBU 384 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.814 UTC [policies] NewManagerImpl -> DEBU 385 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.814 UTC [policies] NewManagerImpl -> DEBU 386 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.814 UTC [policies] NewManagerImpl -> DEBU 387 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.814 UTC [policies] NewManagerImpl -> DEBU 388 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.815 UTC [policies] NewManagerImpl -> DEBU 389 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.815 UTC [policies] NewManagerImpl -> DEBU 38a Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 38b Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 38c Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 38d Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 38e Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 38f Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 390 Proposed new policy ChannelCreationPolicy for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.817 UTC [policies] GetPolicy -> DEBU 391 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:38.817 UTC [policies] NewManagerImpl -> DEBU 392 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:38.817 UTC [policies] GetPolicy -> DEBU 393 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:38.817 UTC [policies] NewManagerImpl -> DEBU 394 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:38.818 UTC [policies] GetPolicy -> DEBU 395 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:38.818 UTC [policies] NewManagerImpl -> DEBU 396 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:38.819 UTC [common.configtx] addToMap -> DEBU 397 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:38.819 UTC [common.configtx] addToMap -> DEBU 398 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.819 UTC [common.configtx] addToMap -> DEBU 399 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.819 UTC [common.configtx] addToMap -> DEBU 39a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -peer0.org1.example.com | 00000010 c5 96 e7 1d d8 bf 56 04 9f a9 0c 6a ba 1a 6c bb |......V....j..l.| -peer0.org1.example.com | 00000020 c5 6b 1c ab 12 02 20 63 02 c6 b3 5d de e2 f5 c4 |.k.... c...]....| -peer0.org1.example.com | 00000030 9d c9 0d 89 19 ae a8 34 1f 56 76 b7 2d 5e 23 b2 |.......4.Vv.-^#.| -peer0.org1.example.com | 00000040 a1 ff 39 df f2 d3 25 |..9...%|" -peer0.org1.example.com | "2019-05-02 01:30:41.458 UTC [gossip.discovery] handleAliveMessage -> DEBU 321 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 322 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:41.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 323 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:7 " -peer0.org1.example.com | "2019-05-02 01:30:41.459 UTC [gossip.discovery] learnExistingMembers -> DEBU 324 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -orderer0.example.com | "2019-05-02 01:30:38.820 UTC [common.configtx] addToMap -> DEBU 39b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:38.820 UTC [common.configtx] addToMap -> DEBU 39c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:38.820 UTC [common.configtx] addToMap -> DEBU 39d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:38.820 UTC [common.configtx] addToMap -> DEBU 39e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:38.821 UTC [common.configtx] addToMap -> DEBU 39f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:38.821 UTC [common.configtx] addToMap -> DEBU 3a0 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.821 UTC [common.configtx] addToMap -> DEBU 3a1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:38.821 UTC [common.configtx] addToMap -> DEBU 3a2 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:38.822 UTC [common.configtx] addToMap -> DEBU 3a3 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:38.822 UTC [common.configtx] addToMap -> DEBU 3a4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:38.822 UTC [common.configtx] addToMap -> DEBU 3a5 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:38.822 UTC [common.configtx] addToMap -> DEBU 3a6 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:38.822 UTC [common.configtx] addToMap -> DEBU 3a7 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.823 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.824 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:38.824 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.824 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.825 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:38.825 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:38.825 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.825 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:38.826 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:38.826 UTC [common.configtx] addToMap -> DEBU 3b1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.826 UTC [common.configtx] addToMap -> DEBU 3b2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.826 UTC [common.configtx] addToMap -> DEBU 3b3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:38.826 UTC [common.configtx] addToMap -> DEBU 3b4 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:38.827 UTC [common.configtx] addToMap -> DEBU 3b5 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:38.827 UTC [common.configtx] addToMap -> DEBU 3b6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:38.827 UTC [common.configtx] addToMap -> DEBU 3b7 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:38.828 UTC [common.configtx] addToMap -> DEBU 3b8 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.828 UTC [common.configtx] addToMap -> DEBU 3b9 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:38.828 UTC [common.configtx] addToMap -> DEBU 3ba Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:38.828 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:38.829 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:38.829 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:38.829 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.829 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.829 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.830 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:38.830 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:38.830 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.831 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.831 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.831 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:30:38.831 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.832 UTC [common.configtx] addToMap -> DEBU 3c8 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:38.832 UTC [common.configtx] addToMap -> DEBU 3c9 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:38.832 UTC [common.configtx] addToMap -> DEBU 3ca Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:30:38.833 UTC [common.configtx] addToMap -> DEBU 3cb Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.833 UTC [common.configtx] addToMap -> DEBU 3cc Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:38.833 UTC [common.configtx] addToMap -> DEBU 3cd Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:38.834 UTC [common.configtx] verifyDeltaSet -> DEBU 3ce Processing change to key: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:38.834 UTC [common.configtx] verifyDeltaSet -> DEBU 3cf Processing change to key: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:30:38.834 UTC [common.configtx] verifyDeltaSet -> DEBU 3d0 Processing change to key: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.835 UTC [common.configtx] verifyDeltaSet -> DEBU 3d1 Processing change to key: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:38.835 UTC [common.configtx] verifyDeltaSet -> DEBU 3d2 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:7 " -peer0.org1.example.com | "2019-05-02 01:30:41.460 UTC [gossip.discovery] learnExistingMembers -> DEBU 325 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:41.460 UTC [gossip.discovery] learnExistingMembers -> DEBU 326 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.460 UTC [gossip.discovery] handleAliveMessage -> DEBU 327 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.460 UTC [gossip.discovery] handleMsgFromComm -> DEBU 328 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.460 UTC [gossip.discovery] sendMemResponse -> DEBU 329 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:41.460 UTC [gossip.comm] Send -> DEBU 32a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:41.460 UTC [gossip.discovery] sendMemResponse -> DEBU 32b Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:41.460 UTC [gossip.comm] sendToEndpoint -> DEBU 32c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-05-02 01:30:38.835 UTC [common.configtx] verifyDeltaSet -> DEBU 3d3 Processing change to key: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.836 UTC [common.configtx] policyForItem -> DEBU 3d4 Getting policy for item Application with mod_policy ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:38.836 UTC [policies] Manager -> DEBU 3d5 Manager Channel looking up path []" -orderer0.example.com | "2019-05-02 01:30:38.836 UTC [policies] Manager -> DEBU 3d6 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:38.836 UTC [policies] Manager -> DEBU 3d7 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:38.836 UTC [policies] Manager -> DEBU 3d8 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:38.837 UTC [policies] Manager -> DEBU 3d9 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:38.837 UTC [policies] Manager -> DEBU 3da Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:38.837 UTC [policies] Manager -> DEBU 3db Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:38.837 UTC [policies] Manager -> DEBU 3dc Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.838 UTC [policies] Manager -> DEBU 3dd Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.838 UTC [policies] Evaluate -> DEBU 3de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" -orderer0.example.com | "2019-05-02 01:30:38.838 UTC [policies] Evaluate -> DEBU 3df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:38.839 UTC [policies] Evaluate -> DEBU 3e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:30:38.839 UTC [msp] DeserializeIdentity -> DEBU 3e1 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:38.840 UTC [msp.identity] newIdentity -> DEBU 3e2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.177 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 364 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.177 UTC [msp] Validate -> DEBU 365 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.178 UTC [msp] getCertificationChain -> DEBU 366 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.179 UTC [msp] hasOURole -> DEBU 367 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:14.179 UTC [msp] getCertificationChain -> DEBU 368 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.179 UTC [common.channelconfig] NewStandardValues -> DEBU 369 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.179 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36a Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:14.179 UTC [common.channelconfig] NewStandardValues -> DEBU 36b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.179 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36c Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.180 UTC [common.channelconfig] Validate -> DEBU 36d Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-05-02 09:27:14.181 UTC [common.channelconfig] validateMSP -> DEBU 36e Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.181 UTC [msp] newBccspMsp -> DEBU 36f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.181 UTC [msp] New -> DEBU 370 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.181 UTC [msp] Setup -> DEBU 371 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.182 UTC [msp.identity] newIdentity -> DEBU 372 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.256 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 260 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.256 UTC [msp] Validate -> DEBU 261 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:16.256 UTC [msp] getCertificationChain -> DEBU 262 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:16.256 UTC [msp] hasOURole -> DEBU 263 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-05-02 09:27:16.257 UTC [msp] getCertificationChain -> DEBU 264 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:16.257 UTC [common.channelconfig] NewStandardValues -> DEBU 265 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.257 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:16.257 UTC [common.channelconfig] NewStandardValues -> DEBU 267 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:16.257 UTC [common.channelconfig] initializeProtosStruct -> DEBU 268 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.258 UTC [common.channelconfig] Validate -> DEBU 269 Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-05-02 09:27:16.258 UTC [common.channelconfig] validateMSP -> DEBU 26a Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.258 UTC [msp] newBccspMsp -> DEBU 26b Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.258 UTC [msp] New -> DEBU 26c Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:16.258 UTC [msp] Setup -> DEBU 26d Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.259 UTC [msp.identity] newIdentity -> DEBU 26e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.260 UTC [msp.identity] newIdentity -> DEBU 26f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:16.261 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 270 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.261 UTC [msp] Validate -> DEBU 271 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:16.262 UTC [msp] getCertificationChain -> DEBU 272 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:16.262 UTC [msp] hasOURole -> DEBU 273 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-05-02 09:27:16.262 UTC [msp] getCertificationChain -> DEBU 274 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:16.263 UTC [msp] Setup -> DEBU 275 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-05-02 09:27:16.263 UTC [msp] Setup -> DEBU 276 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-05-02 09:27:16.263 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:16.263 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:16.264 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:16.264 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.266 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.266 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.266 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 285 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 286 Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 287 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 289 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 28a Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [policies] NewManagerImpl -> DEBU 28b Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [policies] NewManagerImpl -> DEBU 28c Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [policies] NewManagerImpl -> DEBU 28d Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:14.183 UTC [msp.identity] newIdentity -> DEBU 373 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -4408,128 +4023,366 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.841 UTC [cauthdsl] func1 -> DEBU 3e3 0xc000b76b40 gate 1556760638841030200 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:38.841 UTC [cauthdsl] func2 -> DEBU 3e4 0xc000b76b40 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:38.841 UTC [cauthdsl] func2 -> DEBU 3e5 0xc000b76b40 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:38.841 UTC [cauthdsl] func2 -> DEBU 3e6 0xc000b76b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:30:41.460 UTC [gossip.comm] sendToEndpoint -> DEBU 32d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.464 UTC [gossip.gossip] handleMessage -> DEBU 32e Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.464 UTC [gossip.pull] HandleMessage -> DEBU 32f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.465 UTC [gossip.pull] SendDigest -> DEBU 330 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:41.465 UTC [gossip.gossip] handleMessage -> DEBU 331 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.616 UTC [gossip.pull] Hello -> DEBU 332 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:41.616 UTC [gossip.comm] Send -> DEBU 333 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:41.616 UTC [gossip.comm] sendToEndpoint -> DEBU 334 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.616 UTC [gossip.comm] sendToEndpoint -> DEBU 335 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.617 UTC [gossip.gossip] handleMessage -> DEBU 336 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9140029366054201217 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.617 UTC [gossip.pull] HandleMessage -> DEBU 337 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9140029366054201217 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.617 UTC [gossip.gossip] handleMessage -> DEBU 338 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.619 UTC [msp.identity] Sign -> DEBU 339 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:30:41.619 UTC [msp.identity] Sign -> DEBU 33a Sign: digest: 5DDB1D1C795F4637858A27C6EDD85874DB28E9A4319A0631BF524ABCFF7FE38B " -peer0.org1.example.com | "2019-05-02 01:30:41.619 UTC [msp.identity] Sign -> DEBU 33b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:41.619 UTC [msp.identity] Sign -> DEBU 33c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:41.620 UTC [gossip.comm] Send -> DEBU 33d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633613118000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:41.620 UTC [gossip.comm] sendToEndpoint -> DEBU 33e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | "2019-05-02 01:30:38.841 UTC [cauthdsl] func2 -> DEBU 3e7 0xc000b76b40 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:30:38.841 UTC [cauthdsl] func1 -> DEBU 3e8 0xc000b76b40 gate 1556760638841030200 evaluation fails" -orderer0.example.com | "2019-05-02 01:30:38.841 UTC [policies] Evaluate -> DEBU 3e9 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.842 UTC [policies] Evaluate -> DEBU 3ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.842 UTC [policies] Evaluate -> DEBU 3eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:30:38.843 UTC [cauthdsl] func1 -> DEBU 3ec 0xc000b77cc0 gate 1556760638843281500 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:38.843 UTC [cauthdsl] func2 -> DEBU 3ed 0xc000b77cc0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:38.843 UTC [cauthdsl] func2 -> DEBU 3ee 0xc000b77cc0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:38.843 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3ef Checking if identity satisfies ADMIN role for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.844 UTC [cauthdsl] func2 -> DEBU 3f0 0xc000b77cc0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:38.844 UTC [msp.identity] Verify -> DEBU 3f1 Verify: digest = 00000000 89 c5 30 09 2f 42 58 54 bf b0 28 d6 86 d6 13 e4 |..0./BXT..(.....| -orderer0.example.com | 00000010 9b 54 6d d0 1e a8 cf b7 98 c0 12 76 b9 bb 1c 36 |.Tm........v...6|" -orderer0.example.com | "2019-05-02 01:30:38.844 UTC [msp.identity] Verify -> DEBU 3f2 Verify: sig = 00000000 30 45 02 21 00 e7 d9 34 ae 08 7f 3b 30 d5 e4 18 |0E.!...4...;0...| -orderer0.example.com | 00000010 28 11 f1 fb 87 bd 97 11 28 b9 2f 5a c0 f3 71 87 |(.......(./Z..q.| -orderer0.example.com | 00000020 29 cc b5 17 a5 02 20 36 16 4d 85 ba c9 4e c1 31 |)..... 6.M...N.1| -orderer0.example.com | 00000030 b0 7f ea 5e 5f 8f d7 10 9b 58 85 dc 97 6d d9 55 |...^_....X...m.U| -orderer0.example.com | 00000040 d6 a1 57 ad 6c 81 d7 |..W.l..|" -orderer0.example.com | "2019-05-02 01:30:38.845 UTC [cauthdsl] func2 -> DEBU 3f3 0xc000b77cc0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:38.845 UTC [cauthdsl] func1 -> DEBU 3f4 0xc000b77cc0 gate 1556760638843281500 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:38.845 UTC [policies] Evaluate -> DEBU 3f5 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.845 UTC [policies] Evaluate -> DEBU 3f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.846 UTC [policies] Evaluate -> DEBU 3f7 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:38.846 UTC [policies] Evaluate -> DEBU 3f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:38.847 UTC [common.configtx] verifyDeltaSet -> DEBU 3f9 Processing change to key: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:38.847 UTC [common.configtx] verifyDeltaSet -> DEBU 3fa Processing change to key: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.848 UTC [common.configtx] recurseConfigMap -> DEBU 3fb Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.848 UTC [common.configtx] recurseConfigMap -> DEBU 3fc Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.848 UTC [common.configtx] recurseConfigMap -> DEBU 3fd Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.848 UTC [common.configtx] recurseConfigMap -> DEBU 3fe Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633613118000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.620 UTC [gossip.comm] sendToEndpoint -> DEBU 33f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.625 UTC [gossip.gossip] handleMessage -> DEBU 340 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.625 UTC [gossip.gossip] handleMessage -> DEBU 341 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 342 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.626 UTC [msp.identity] Verify -> DEBU 343 Verify: digest = 00000000 5d db 1d 1c 79 5f 46 37 85 8a 27 c6 ed d8 58 74 |]...y_F7..'...Xt| -peer0.org1.example.com | 00000010 db 28 e9 a4 31 9a 06 31 bf 52 4a bc ff 7f e3 8b |.(..1..1.RJ.....|" -peer0.org1.example.com | "2019-05-02 01:30:41.626 UTC [msp.identity] Verify -> DEBU 344 Verify: sig = 00000000 30 45 02 21 00 da a2 f4 f7 44 65 da 4e b1 27 48 |0E.!.....De.N.'H| -peer0.org1.example.com | 00000010 b6 87 cf 1b b3 4f 8a fc 6b b6 64 d4 88 55 77 e7 |.....O..k.d..Uw.| -peer0.org1.example.com | 00000020 3b 8f 58 40 e8 02 20 10 91 ce b0 e7 c3 53 c4 66 |;.X@.. ......S.f| -peer0.org1.example.com | 00000030 57 fa 30 79 74 7c bb a4 44 22 1c c7 fa 71 84 f0 |W.0yt|..D"...q..| -peer0.org1.example.com | 00000040 db 23 a6 a7 41 51 83 |.#..AQ.|" -peer0.org1.example.com | "2019-05-02 01:30:41.626 UTC [msp.identity] Verify -> DEBU 345 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -orderer0.example.com | "2019-05-02 01:30:38.848 UTC [common.configtx] recurseConfigMap -> DEBU 3ff Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.849 UTC [common.configtx] recurseConfigMap -> DEBU 400 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.849 UTC [common.configtx] recurseConfigMap -> DEBU 401 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.849 UTC [common.configtx] recurseConfigMap -> DEBU 402 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.850 UTC [common.configtx] recurseConfigMap -> DEBU 403 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.850 UTC [common.configtx] recurseConfigMap -> DEBU 404 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.850 UTC [common.configtx] recurseConfigMap -> DEBU 405 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.850 UTC [common.configtx] recurseConfigMap -> DEBU 406 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.850 UTC [common.configtx] recurseConfigMap -> DEBU 407 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 408 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 409 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 40a Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 40b Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 40c Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 40d Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 40e Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.852 UTC [common.configtx] recurseConfigMap -> DEBU 40f Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.852 UTC [common.configtx] recurseConfigMap -> DEBU 410 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.852 UTC [common.configtx] recurseConfigMap -> DEBU 411 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.852 UTC [msp.identity] Sign -> DEBU 412 Sign: plaintext: 0AD2060A1B08011A0608BE90A9E60522...DA1F5CAE742779B7DA17E4516ECF8837 " -orderer0.example.com | "2019-05-02 01:30:38.852 UTC [msp.identity] Sign -> DEBU 413 Sign: digest: 6A42C159969B17B1522DAE7FF5D8D2B33EBD5DC1015536A055610E81743EF170 " -orderer0.example.com | "2019-05-02 01:30:38.852 UTC [msp.identity] Sign -> DEBU 414 Sign: plaintext: 0ACE060A1708041A0608BE90A9E60522...A3AB6390248798930B8A8E60C0A5C784 " -orderer0.example.com | "2019-05-02 01:30:38.855 UTC [msp.identity] Sign -> DEBU 415 Sign: digest: 7E60CFE7D46FCF699105ED094C0C812DF783F802D50422E2D417091EE1E0D445 " -orderer0.example.com | "2019-05-02 01:30:38.855 UTC [policies] Evaluate -> DEBU 416 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:30:38.855 UTC [policies] Evaluate -> DEBU 417 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:38.855 UTC [policies] Evaluate -> DEBU 418 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-05-02 01:30:38.855 UTC [policies] Evaluate -> DEBU 419 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:38.856 UTC [policies] Evaluate -> DEBU 41a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-05-02 01:30:38.856 UTC [msp] DeserializeIdentity -> DEBU 41b Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:38.856 UTC [msp.identity] newIdentity -> DEBU 41c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.185 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 374 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.185 UTC [msp] Validate -> DEBU 375 MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.186 UTC [msp] getCertificationChain -> DEBU 376 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.186 UTC [msp] hasOURole -> DEBU 377 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:14.186 UTC [msp] getCertificationChain -> DEBU 378 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.187 UTC [msp] Setup -> DEBU 379 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:14.187 UTC [msp] Setup -> DEBU 37a MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:14.187 UTC [policies] NewManagerImpl -> DEBU 37b Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37c Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37d Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37e Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37f Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 380 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 381 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 382 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 383 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 384 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 385 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 386 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 387 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 388 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 389 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.191 UTC [policies] NewManagerImpl -> DEBU 38a Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.191 UTC [policies] GetPolicy -> DEBU 38b Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:14.192 UTC [policies] NewManagerImpl -> DEBU 38c Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:14.192 UTC [policies] GetPolicy -> DEBU 38d Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:14.192 UTC [policies] NewManagerImpl -> DEBU 38e Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:14.192 UTC [policies] GetPolicy -> DEBU 38f Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:14.192 UTC [policies] NewManagerImpl -> DEBU 390 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:14.193 UTC [common.configtx] addToMap -> DEBU 391 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:14.193 UTC [common.configtx] addToMap -> DEBU 392 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.193 UTC [common.configtx] addToMap -> DEBU 393 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.194 UTC [common.configtx] addToMap -> DEBU 394 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:27:14.194 UTC [common.configtx] addToMap -> DEBU 395 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:14.194 UTC [common.configtx] addToMap -> DEBU 396 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 397 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 398 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 399 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 39a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 39b Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:14.196 UTC [common.configtx] addToMap -> DEBU 39c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:14.196 UTC [common.configtx] addToMap -> DEBU 39d Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:14.196 UTC [common.configtx] addToMap -> DEBU 39e Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:14.197 UTC [common.configtx] addToMap -> DEBU 39f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:14.197 UTC [common.configtx] addToMap -> DEBU 3a0 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:14.197 UTC [common.configtx] addToMap -> DEBU 3a1 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.198 UTC [common.configtx] addToMap -> DEBU 3a2 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.198 UTC [common.configtx] addToMap -> DEBU 3a3 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:14.198 UTC [common.configtx] addToMap -> DEBU 3a4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:14.199 UTC [common.configtx] addToMap -> DEBU 3a5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:14.199 UTC [common.configtx] addToMap -> DEBU 3a6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:14.201 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.201 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b1 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b2 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b3 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b4 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b5 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b6 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:14.204 UTC [common.configtx] addToMap -> DEBU 3b7 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:14.204 UTC [common.configtx] addToMap -> DEBU 3b8 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3b9 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3ba Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.207 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:14.207 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:14.207 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:27:14.208 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.208 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:14.208 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:14.209 UTC [common.configtx] verifyDeltaSet -> DEBU 3c8 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.209 UTC [common.configtx] policyForItem -> DEBU 3c9 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:14.209 UTC [policies] Manager -> DEBU 3ca Manager Channel looking up path []" +orderer0.example.com | "2019-05-02 09:27:14.209 UTC [policies] Manager -> DEBU 3cb Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:14.209 UTC [policies] Manager -> DEBU 3cc Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3cd Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3ce Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3cf Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3d0 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3d1 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3d2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.211 UTC [policies] Evaluate -> DEBU 3d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2019-05-02 09:27:14.211 UTC [policies] Evaluate -> DEBU 3d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:14.211 UTC [policies] Evaluate -> DEBU 3d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:27:14.212 UTC [msp] DeserializeIdentity -> DEBU 3d6 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:14.212 UTC [msp.identity] newIdentity -> DEBU 3d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | "2019-05-02 09:27:16.268 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-05-02 09:27:16.270 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-05-02 09:27:16.270 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-05-02 09:27:16.270 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:16.273 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:16.273 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:16.273 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:16.276 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:16.276 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:16.276 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-05-02 09:27:16.278 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-05-02 09:27:16.278 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-05-02 09:27:16.278 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-05-02 09:27:16.278 UTC [common.capabilities] Supported -> DEBU 2ba Application capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [common.capabilities] Supported -> DEBU 2bb Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bc As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bd As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2be Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2bf Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2c0 Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2c1 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-05-02 09:27:16.280 UTC [policies] Manager -> DEBU 2c2 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.280 UTC [policies] Manager -> DEBU 2c3 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:16.280 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c4 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-05-02 09:27:16.280 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c5 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-05-02 09:27:16.280 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c6 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2c7 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2c8 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2c9 Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2ca Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2cb Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:16.282 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-05-02 09:27:16.282 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2cd Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.282 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2ce Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.282 UTC [gossip.service] updateAnchors -> DEBU 2cf Org1MSP anchor peers: []" +peer0.org1.example.com | "2019-05-02 09:27:16.283 UTC [gossip.service] updateAnchors -> DEBU 2d0 Org2MSP anchor peers: []" +peer0.org1.example.com | "2019-05-02 09:27:16.283 UTC [gossip.service] updateAnchors -> DEBU 2d1 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.283 UTC [gossip.gossip] JoinChan -> INFO 2d2 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-05-02 09:27:16.283 UTC [gossip.gossip] learnAnchorPeers -> INFO 2d3 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-05-02 09:27:16.284 UTC [gossip.gossip] learnAnchorPeers -> INFO 2d4 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-05-02 09:27:16.284 UTC [peer] updateTrustedRoots -> DEBU 2d5 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d6 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d7 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d8 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d9 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-05-02 09:27:16.299 UTC [kvledger.util] CreateDirIfMissing -> DEBU 2da CreateDirIfMissing [/var/hyperledger/production/transientStore/]" +peer0.org1.example.com | "2019-05-02 09:27:16.299 UTC [kvledger.util] logDirStatus -> DEBU 2db Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" +peer0.org1.example.com | "2019-05-02 09:27:16.299 UTC [kvledger.util] logDirStatus -> DEBU 2dc After creating dir - [/var/hyperledger/production/transientStore/] exists" +peer0.org1.example.com | "2019-05-02 09:27:16.312 UTC [gossip.service] InitializeChannel -> DEBU 2dd Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.314 UTC [msp.identity] Sign -> DEBU 2de Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +peer0.org1.example.com | "2019-05-02 09:27:16.314 UTC [msp.identity] Sign -> DEBU 2df Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +peer0.org1.example.com | "2019-05-02 09:27:16.315 UTC [gossip.privdata] NewReconciler -> DEBU 2e0 Private data reconciliation is enabled" +peer0.org1.example.com | "2019-05-02 09:27:16.319 UTC [gossip.state] NewGossipStateProvider -> INFO 2e1 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org1.example.com | "2019-05-02 09:27:16.319 UTC [gossip.state] NewGossipStateProvider -> DEBU 2e2 Updating gossip ledger height to 1" +peer0.org1.example.com | "2019-05-02 09:27:16.319 UTC [msp.identity] Sign -> DEBU 2e3 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020801 " +peer0.org1.example.com | "2019-05-02 09:27:16.319 UTC [msp.identity] Sign -> DEBU 2e4 Sign: digest: 8B78C9A6480A8CF41DAD7D6C38347BBE000B4649C45AD2CBB13B3B21E63B0471 " +peer0.org1.example.com | "2019-05-02 09:27:16.320 UTC [gossip.service] InitializeChannel -> DEBU 2e5 Delivery uses dynamic leader election mechanism, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.321 UTC [peer] InitChain -> DEBU 2e6 Initializing channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.322 UTC [nodeCmd] func6 -> DEBU 2e9 Deploying system CC, for channel " +peer0.org1.example.com | "2019-05-02 09:27:16.321 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2e7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:16.322 UTC [gossip.election] handleMessages -> DEBU 2e8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2ea constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2eb constructing new tx simulator txid = [2d70ce9e-c497-49ba-98e6-086bbe3a68c0]" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] Execute -> DEBU 2ec Entry" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] handleMessage -> DEBU 2ed [2d70ce9e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] Notify -> DEBU 2ee [2d70ce9e] notifying Txid:2d70ce9e-c497-49ba-98e6-086bbe3a68c0, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] Execute -> DEBU 2ef Exit" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [sccapi] deploySysCC -> INFO 2f0 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] Done -> DEBU 2f1 Done with transaction simulation / query execution [2d70ce9e-c497-49ba-98e6-086bbe3a68c0]" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2f2 constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2f3 constructing new tx simulator txid = [aaa0bcce-8228-4523-9513-7572889c7e8a]" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] Execute -> DEBU 2f4 Entry" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [cscc] Init -> INFO 2f5 Init CSCC" +peer0.org1.example.com | "2019-05-02 09:27:16.323 UTC [chaincode] handleMessage -> DEBU 2f6 [aaa0bcce] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] Notify -> DEBU 2f7 [aaa0bcce] notifying Txid:aaa0bcce-8228-4523-9513-7572889c7e8a, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] Execute -> DEBU 2f8 Exit" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [sccapi] deploySysCC -> INFO 2f9 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] Done -> DEBU 2fa Done with transaction simulation / query execution [aaa0bcce-8228-4523-9513-7572889c7e8a]" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2fb constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2fc constructing new tx simulator txid = [4eccbbcc-0bc1-47ee-9bf9-ad847826e38f]" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] Execute -> DEBU 2fd Entry" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [qscc] Init -> INFO 2fe Init QSCC" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] handleMessage -> DEBU 2ff [4eccbbcc] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:14.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3d8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:14.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3d9 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2019-05-02 09:27:14.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3da Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +orderer0.example.com | "2019-05-02 09:27:14.216 UTC [cauthdsl] func1 -> DEBU 3db 0xc0008b6530 gate 1556789234216356100 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:14.216 UTC [cauthdsl] func2 -> DEBU 3dc 0xc0008b6530 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:14.216 UTC [cauthdsl] func2 -> DEBU 3dd 0xc0008b6530 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:14.217 UTC [cauthdsl] func2 -> DEBU 3de 0xc0008b6530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-05-02 09:27:14.217 UTC [cauthdsl] func2 -> DEBU 3df 0xc0008b6530 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:14.217 UTC [cauthdsl] func1 -> DEBU 3e0 0xc0008b6530 gate 1556789234216356100 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:14.217 UTC [policies] Evaluate -> DEBU 3e1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.218 UTC [policies] Evaluate -> DEBU 3e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.218 UTC [policies] Evaluate -> DEBU 3e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:27:14.219 UTC [cauthdsl] func1 -> DEBU 3e4 0xc0008b76b0 gate 1556789234218928400 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:14.219 UTC [cauthdsl] func2 -> DEBU 3e5 0xc0008b76b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:14.219 UTC [cauthdsl] func2 -> DEBU 3e6 0xc0008b76b0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:14.219 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3e7 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.220 UTC [cauthdsl] func2 -> DEBU 3e8 0xc0008b76b0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:14.223 UTC [msp.identity] Verify -> DEBU 3e9 Verify: digest = 00000000 be 65 ff 94 74 b5 dd 0a 8b e0 fb 53 1f bc cb 53 |.e..t......S...S| +orderer0.example.com | 00000010 2c 56 9e 6a cc 84 33 2f a0 93 1f 86 d6 33 5e 45 |,V.j..3/.....3^E|" +orderer0.example.com | "2019-05-02 09:27:14.223 UTC [msp.identity] Verify -> DEBU 3ea Verify: sig = 00000000 30 44 02 20 5c 06 73 4e 5f 4a a6 b1 a0 36 db 18 |0D. \.sN_J...6..| +orderer0.example.com | 00000010 83 d9 ac 96 21 2f fa cb cb 16 cd 0c 79 ce 78 b9 |....!/......y.x.| +orderer0.example.com | 00000020 74 f6 6e 26 02 20 35 72 5f ea b5 76 18 c6 4a 55 |t.n&. 5r_..v..JU| +orderer0.example.com | 00000030 64 5e 26 e7 68 0c 17 1b be 2e 15 bb 05 06 1a 74 |d^&.h..........t| +orderer0.example.com | 00000040 7d 02 b5 e9 86 99 |}.....|" +orderer0.example.com | "2019-05-02 09:27:14.225 UTC [cauthdsl] func2 -> DEBU 3eb 0xc0008b76b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:14.225 UTC [cauthdsl] func1 -> DEBU 3ec 0xc0008b76b0 gate 1556789234218928400 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:14.225 UTC [policies] Evaluate -> DEBU 3ed Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.225 UTC [policies] Evaluate -> DEBU 3ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.225 UTC [policies] Evaluate -> DEBU 3ef Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:14.226 UTC [policies] Evaluate -> DEBU 3f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:14.226 UTC [common.configtx] verifyDeltaSet -> DEBU 3f1 Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3f2 Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f3 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f4 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f5 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f6 Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f7 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.230 UTC [common.configtx] recurseConfigMap -> DEBU 3f8 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.230 UTC [common.configtx] recurseConfigMap -> DEBU 3f9 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.231 UTC [common.configtx] recurseConfigMap -> DEBU 3fa Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.231 UTC [common.configtx] recurseConfigMap -> DEBU 3fb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3fc Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3fd Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3fe Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3ff Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.233 UTC [common.configtx] recurseConfigMap -> DEBU 400 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 401 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 402 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] Notify -> DEBU 300 [4eccbbcc] notifying Txid:4eccbbcc-0bc1-47ee-9bf9-ad847826e38f, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [chaincode] Execute -> DEBU 301 Exit" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [sccapi] deploySysCC -> INFO 302 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] Done -> DEBU 303 Done with transaction simulation / query execution [4eccbbcc-0bc1-47ee-9bf9-ad847826e38f]" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 304 constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 305 constructing new tx simulator txid = [d66845b9-8103-46a2-ad5d-eccb84f8e2e1]" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [chaincode] Execute -> DEBU 306 Entry" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [chaincode] handleMessage -> DEBU 307 [d66845b9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [chaincode] Notify -> DEBU 308 [d66845b9] notifying Txid:d66845b9-8103-46a2-ad5d-eccb84f8e2e1, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [chaincode] Execute -> DEBU 309 Exit" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [sccapi] deploySysCC -> INFO 30a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] Done -> DEBU 30b Done with transaction simulation / query execution [d66845b9-8103-46a2-ad5d-eccb84f8e2e1]" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 30c constructing new query executor txid = [3859875e-d985-49dd-a968-59cd4a08ce53]" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 30d Returning []" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] Done -> DEBU 30e Done with transaction simulation / query execution [3859875e-d985-49dd-a968-59cd4a08ce53]" +peer0.org1.example.com | "2019-05-02 09:27:16.325 UTC [msp.identity] Sign -> DEBU 30f Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020801 " +peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [msp.identity] Sign -> DEBU 310 Sign: digest: FA734A64D20B4ADC12D7D68112DB4CE8D3BFB6E481C65D686855FEEBA9B327D3 " +peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 311 Listeners for channel businesschannel invoked" +peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [chaincode] handleMessage -> DEBU 312 [dbf7024a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [chaincode] Notify -> DEBU 313 [dbf7024a] notifying Txid:dbf7024a20c887786328981f5471b882c076486d1171040f17166c48d15b8a84, channelID:" +peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [chaincode] Execute -> DEBU 314 Exit" +peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [endorser] callChaincode -> INFO 315 [][dbf7024a] Exit chaincode: name:"cscc" (160ms)" +peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [endorser] SimulateProposal -> DEBU 316 [][dbf7024a] Exit" +peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [endorser] func1 -> DEBU 317 Exit: request from 172.18.0.8:57196" +peer0.org1.example.com | "2019-05-02 09:27:16.326 UTC [comm.grpc.server] 1 -> INFO 318 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57196 grpc.code=OK grpc.call_duration=166.7647ms +peer0.org1.example.com | "2019-05-02 09:27:16.331 UTC [grpc] warningf -> DEBU 319 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.8:57196: read: connection reset by peer" +peer0.org1.example.com | "2019-05-02 09:27:16.331 UTC [grpc] infof -> DEBU 31a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:17.068 UTC [gossip.pull] Hello -> DEBU 31b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:17.068 UTC [gossip.comm] Send -> DEBU 31c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:17.068 UTC [gossip.comm] sendToEndpoint -> DEBU 31d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.068 UTC [gossip.comm] sendToEndpoint -> DEBU 31e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.068 UTC [msp.identity] Sign -> DEBU 31f Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [msp.identity] Sign -> DEBU 320 Sign: digest: 6E6BFE1B00C82FA9E2C4DD1D85FC07A35A386C6C84DE322084C7EA918F28FD50 " +peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [msp.identity] Sign -> DEBU 321 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [msp.identity] Sign -> DEBU 322 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [gossip.comm] Send -> DEBU 323 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [gossip.comm] sendToEndpoint -> DEBU 324 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 403 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 404 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.235 UTC [common.configtx] recurseConfigMap -> DEBU 405 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.235 UTC [common.configtx] recurseConfigMap -> DEBU 406 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 407 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 408 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 409 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40a Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.237 UTC [common.configtx] recurseConfigMap -> DEBU 40e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.237 UTC [msp.identity] Sign -> DEBU 40f Sign: plaintext: 0AD2060A1B08011A0608F2EFAAE60522...2B4A1C0498989CB418996DBC241BDFD9 " +orderer0.example.com | "2019-05-02 09:27:14.237 UTC [msp.identity] Sign -> DEBU 410 Sign: digest: DC2D9F9564EAF37BA9F69AAE8C22B42AB99D6A9EE3A09446DAF53F04513B57FB " +orderer0.example.com | "2019-05-02 09:27:14.238 UTC [msp.identity] Sign -> DEBU 411 Sign: plaintext: 0ACE060A1708041A0608F2EFAAE60522...E052C51F0D3B206F9EFB9A4DE09B6230 " +orderer0.example.com | "2019-05-02 09:27:14.238 UTC [msp.identity] Sign -> DEBU 412 Sign: digest: 12FAEDAB443FA508631D7D64AA5E3CDFC584DEA945117649CD4FE37A9F0EEA29 " +orderer0.example.com | "2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 413 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 414 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 415 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 416 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 417 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-05-02 09:27:14.239 UTC [msp] DeserializeIdentity -> DEBU 418 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:14.240 UTC [msp.identity] newIdentity -> DEBU 419 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -4540,191 +4393,52 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -peer0.org1.example.com | "2019-05-02 01:30:41.626 UTC [msp.identity] Verify -> DEBU 346 Verify: sig = 00000000 30 45 02 21 00 de b1 6d b1 4d cd f0 7c 75 f7 11 |0E.!...m.M..|u..| orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -peer0.org1.example.com | 00000010 1c 46 3b 83 a9 43 ac 51 f1 3c 14 d4 88 e7 5f fa |.F;..C.Q.<...._.| -peer0.org1.example.com | 00000020 09 2a 45 28 0f 02 20 02 87 4e 65 55 3a 0e 21 8a |.*E(.. ..NeU:.!.| orderer0.example.com | QQ== -peer0.org1.example.com | 00000030 0e d6 d5 d1 40 ed 58 0c 5f cb 6d 4d 70 75 82 71 |....@.X._.mMpu.q| -peer0.org1.example.com | 00000040 f4 2c f9 83 db 4b 26 |.,...K&|" -peer0.org1.example.com | "2019-05-02 01:30:41.626 UTC [gossip.discovery] handleAliveMessage -> DEBU 347 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw orderer0.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | "2019-05-02 01:30:38.856 UTC [cauthdsl] func1 -> DEBU 41d 0xc000232b80 gate 1556760638856352100 evaluation starts" -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | "2019-05-02 01:30:38.856 UTC [cauthdsl] func2 -> DEBU 41e 0xc000232b80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | "2019-05-02 01:30:38.856 UTC [cauthdsl] func2 -> DEBU 41f 0xc000232b80 processing identity 0 with bytes of efef60" -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -orderer0.example.com | "2019-05-02 01:30:38.856 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 420 Checking if identity satisfies MEMBER role for OrdererMSP" -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633613118000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.626 UTC [gossip.discovery] isSentByMe -> DEBU 348 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633613118000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:41.626 UTC [gossip.discovery] handleAliveMessage -> DEBU 349 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.626 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.898 UTC [gossip.election] waitForMembershipStabilization -> DEBU 34b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" -peer0.org1.example.com | "2019-05-02 01:30:41.899 UTC [gossip.election] leaderElection -> DEBU 34c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:30:41.899 UTC [gossip.election] propose -> DEBU 34d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:30:41.899 UTC [gossip.election] propose -> DEBU 34e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:30:41.899 UTC [msp.identity] Sign -> DEBU 34f Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08B0E7B8C7E0B1AECD151001 " -peer0.org1.example.com | "2019-05-02 01:30:41.900 UTC [msp.identity] Sign -> DEBU 350 Sign: digest: 6224A9EAAB37F6EB1B1B021BD3F8B4212403417B11B3A7ED26C078ABDEDD660C " -orderer0.example.com | "2019-05-02 01:30:38.856 UTC [msp] Validate -> DEBU 421 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.856 UTC [cauthdsl] func2 -> DEBU 422 0xc000232b80 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:41.900 UTC [gossip.election] waitForInterrupt -> DEBU 351 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -orderer0.example.com | "2019-05-02 01:30:38.857 UTC [msp.identity] Verify -> DEBU 423 Verify: digest = 00000000 7e 60 cf e7 d4 6f cf 69 91 05 ed 09 4c 0c 81 2d |~`...o.i....L..-| -peer0.org1.example.com | "2019-05-02 01:30:42.098 UTC [endorser] ProcessProposal -> DEBU 352 Entering: request from 192.168.240.9:41190" -peer0.org1.example.com | "2019-05-02 01:30:42.099 UTC [protoutils] ValidateProposalMessage -> DEBU 353 ValidateProposalMessage starts for signed proposal 0xc002d2ae10" -peer0.org1.example.com | "2019-05-02 01:30:42.099 UTC [protoutils] validateChannelHeader -> DEBU 354 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:30:42.100 UTC [protoutils] checkSignatureFromCreator -> DEBU 355 begin" -peer0.org1.example.com | "2019-05-02 01:30:42.101 UTC [protoutils] checkSignatureFromCreator -> DEBU 356 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -orderer0.example.com | 00000010 f7 83 f8 02 d5 04 22 e2 d4 17 09 1e e1 e0 d4 45 |......"........E|" -peer0.org1.example.com | "2019-05-02 01:30:42.101 UTC [protoutils] checkSignatureFromCreator -> DEBU 357 creator is valid" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [msp.identity] Verify -> DEBU 424 Verify: sig = 00000000 30 45 02 21 00 ab 21 9a e4 e7 e2 0e 03 91 3f 20 |0E.!..!.......? | -peer0.org1.example.com | "2019-05-02 01:30:42.102 UTC [msp.identity] Verify -> DEBU 358 Verify: digest = 00000000 1c 6b 39 0d ed 65 86 ef 11 ff d6 34 b4 ed c7 7d |.k9..e.....4...}| -orderer0.example.com | 00000010 c0 46 4d e6 3f 45 ba 78 ca 75 0e e1 27 a3 d4 7e |.FM.?E.x.u..'..~| -orderer0.example.com | 00000020 26 37 58 21 71 02 20 3d e7 48 98 f6 7e 33 e5 7c |&7X!q. =.H..~3.|| -orderer0.example.com | 00000030 5e c8 0a ad d1 5a 5d c4 8f ca 0b 80 1f 08 6a a9 |^....Z].......j.| -peer0.org1.example.com | 00000010 4d c9 b2 dd 63 a5 3c 01 3f da 92 75 3d d4 35 80 |M...c.<.?..u=.5.|" -peer0.org1.example.com | "2019-05-02 01:30:42.102 UTC [msp.identity] Verify -> DEBU 359 Verify: sig = 00000000 30 45 02 21 00 d9 9e d4 0a 03 5a 47 74 10 36 2c |0E.!......ZGt.6,| -orderer0.example.com | 00000040 59 af 79 31 22 80 be |Y.y1"..|" -peer0.org1.example.com | 00000010 15 0d 8c 46 3b b4 85 73 58 ee 25 86 c8 cb b8 51 |...F;..sX.%....Q| -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [cauthdsl] func2 -> DEBU 425 0xc000232b80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | 00000020 f5 dc e2 99 25 02 20 66 60 16 10 ba 27 fa 0c 58 |....%. f`...'..X| -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [cauthdsl] func1 -> DEBU 426 0xc000232b80 gate 1556760638856352100 evaluation succeeds" -peer0.org1.example.com | 00000030 8d 54 26 04 ba 81 33 33 ed e7 82 b1 8b 82 9c a6 |.T&...33........| -peer0.org1.example.com | 00000040 2c 96 0f 1f 82 a4 04 |,......|" -peer0.org1.example.com | "2019-05-02 01:30:42.103 UTC [protoutils] checkSignatureFromCreator -> DEBU 35a exits successfully" -peer0.org1.example.com | "2019-05-02 01:30:42.103 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 35b validateChaincodeProposalMessage starts for proposal 0xc002d6c3f0, header 0xc002d2b220" -peer0.org1.example.com | "2019-05-02 01:30:42.104 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 35c validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:30:42.104 UTC [endorser] preProcess -> DEBU 35d [][5a020f8d] processing txid: 5a020f8d9c1069f5a1d64576c680cbea19aa64863a542b252cbeb36b01b2dc29" -peer0.org1.example.com | "2019-05-02 01:30:42.104 UTC [endorser] SimulateProposal -> DEBU 35e [][5a020f8d] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:30:42.105 UTC [endorser] callChaincode -> INFO 35f [][5a020f8d] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:30:42.105 UTC [chaincode] Execute -> DEBU 360 Entry" -peer0.org1.example.com | "2019-05-02 01:30:42.106 UTC [cscc] Invoke -> DEBU 361 Invoke function: GetChannels" -peer0.org1.example.com | "2019-05-02 01:30:42.106 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 362 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:42.106 UTC [msp] Validate -> DEBU 363 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:42.107 UTC [msp.identity] Verify -> DEBU 364 Verify: digest = 00000000 1c 6b 39 0d ed 65 86 ef 11 ff d6 34 b4 ed c7 7d |.k9..e.....4...}| -peer0.org1.example.com | 00000010 4d c9 b2 dd 63 a5 3c 01 3f da 92 75 3d d4 35 80 |M...c.<.?..u=.5.|" -peer0.org1.example.com | "2019-05-02 01:30:42.107 UTC [msp.identity] Verify -> DEBU 365 Verify: sig = 00000000 30 45 02 21 00 d9 9e d4 0a 03 5a 47 74 10 36 2c |0E.!......ZGt.6,| -peer0.org1.example.com | 00000010 15 0d 8c 46 3b b4 85 73 58 ee 25 86 c8 cb b8 51 |...F;..sX.%....Q| -peer0.org1.example.com | 00000020 f5 dc e2 99 25 02 20 66 60 16 10 ba 27 fa 0c 58 |....%. f`...'..X| -peer0.org1.example.com | 00000030 8d 54 26 04 ba 81 33 33 ed e7 82 b1 8b 82 9c a6 |.T&...33........| -peer0.org1.example.com | 00000040 2c 96 0f 1f 82 a4 04 |,......|" -peer0.org1.example.com | "2019-05-02 01:30:42.107 UTC [chaincode] handleMessage -> DEBU 366 [5a020f8d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:42.108 UTC [chaincode] Notify -> DEBU 367 [5a020f8d] notifying Txid:5a020f8d9c1069f5a1d64576c680cbea19aa64863a542b252cbeb36b01b2dc29, channelID:" -peer0.org1.example.com | "2019-05-02 01:30:42.108 UTC [chaincode] Execute -> DEBU 368 Exit" -peer0.org1.example.com | "2019-05-02 01:30:42.109 UTC [endorser] callChaincode -> INFO 369 [][5a020f8d] Exit chaincode: name:"cscc" (3ms)" -peer0.org1.example.com | "2019-05-02 01:30:42.109 UTC [endorser] SimulateProposal -> DEBU 36a [][5a020f8d] Exit" -peer0.org1.example.com | "2019-05-02 01:30:42.110 UTC [endorser] func1 -> DEBU 36b Exit: request from 192.168.240.9:41190" -peer0.org1.example.com | "2019-05-02 01:30:42.110 UTC [comm.grpc.server] 1 -> INFO 36c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41190 grpc.code=OK grpc.call_duration=13.1791ms -peer0.org1.example.com | "2019-05-02 01:30:42.115 UTC [grpc] warningf -> DEBU 36d transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41190: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:30:42.116 UTC [grpc] infof -> DEBU 36e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:43.024 UTC [endorser] ProcessProposal -> DEBU 36f Entering: request from 192.168.240.9:41198" -peer0.org1.example.com | "2019-05-02 01:30:43.025 UTC [protoutils] ValidateProposalMessage -> DEBU 370 ValidateProposalMessage starts for signed proposal 0xc002dd60a0" -peer0.org1.example.com | "2019-05-02 01:30:43.025 UTC [protoutils] validateChannelHeader -> DEBU 371 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:30:43.025 UTC [protoutils] checkSignatureFromCreator -> DEBU 372 begin" -peer0.org1.example.com | "2019-05-02 01:30:43.025 UTC [protoutils] checkSignatureFromCreator -> DEBU 373 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:30:43.025 UTC [protoutils] checkSignatureFromCreator -> DEBU 374 creator is valid" -peer0.org1.example.com | "2019-05-02 01:30:43.025 UTC [msp.identity] Verify -> DEBU 375 Verify: digest = 00000000 f0 5c 4f 14 e3 5f f7 68 88 ab c5 05 35 9e 4d 07 |.\O.._.h....5.M.| -peer0.org1.example.com | 00000010 02 1a cf dc 40 66 5c 88 69 c0 c9 ea 15 01 f1 e9 |....@f\.i.......|" -peer0.org1.example.com | "2019-05-02 01:30:43.025 UTC [msp.identity] Verify -> DEBU 376 Verify: sig = 00000000 30 44 02 20 6f 0e 57 d0 37 a9 71 a2 ab 01 6b b2 |0D. o.W.7.q...k.| -peer0.org1.example.com | 00000010 1a c8 0c 53 fc 95 df db 7f 80 23 f8 95 bc 9f fb |...S......#.....| -peer0.org1.example.com | 00000020 f1 18 94 67 02 20 7f 5d e9 03 ad ce 26 16 e5 19 |...g. .]....&...| -peer0.org1.example.com | 00000030 4a 11 3f df 98 33 0d c4 18 02 16 26 25 fa da 56 |J.?..3.....&%..V| -peer0.org1.example.com | 00000040 92 ec ce 76 29 b8 |...v).|" -peer0.org1.example.com | "2019-05-02 01:30:43.026 UTC [protoutils] checkSignatureFromCreator -> DEBU 377 exits successfully" -peer0.org1.example.com | "2019-05-02 01:30:43.026 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 378 validateChaincodeProposalMessage starts for proposal 0xc002d6caf0, header 0xc002dd64b0" -peer0.org1.example.com | "2019-05-02 01:30:43.026 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 379 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:30:43.026 UTC [endorser] preProcess -> DEBU 37a [][472b2b8a] processing txid: 472b2b8acdb6f31dbcede8e00eb9b0112e9374c6cfb2f7aef5ddeecff988a0e0" -peer0.org1.example.com | "2019-05-02 01:30:43.027 UTC [endorser] SimulateProposal -> DEBU 37b [][472b2b8a] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:30:43.027 UTC [endorser] callChaincode -> INFO 37c [][472b2b8a] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:30:43.027 UTC [chaincode] Execute -> DEBU 37d Entry" -peer0.org1.example.com | "2019-05-02 01:30:43.028 UTC [qscc] Invoke -> DEBU 37e Invoke function: GetChainInfo on chain: businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:43.028 UTC [aclmgmt] CheckACL -> DEBU 37f acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -peer0.org1.example.com | "2019-05-02 01:30:43.028 UTC [aclmgmt] CheckACL -> DEBU 380 acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-05-02 01:30:43.028 UTC [policies] Evaluate -> DEBU 381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:43.028 UTC [policies] Evaluate -> DEBU 382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:43.029 UTC [policies] Evaluate -> DEBU 383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:43.029 UTC [msp] DeserializeIdentity -> DEBU 384 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:43.029 UTC [msp.identity] newIdentity -> DEBU 385 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:43.030 UTC [cauthdsl] func1 -> DEBU 386 0xc002dea280 gate 1556760643030244600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:43.030 UTC [cauthdsl] func2 -> DEBU 387 0xc002dea280 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:43.030 UTC [cauthdsl] func2 -> DEBU 388 0xc002dea280 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:43.030 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 389 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:43.030 UTC [msp] Validate -> DEBU 38a MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:43.031 UTC [msp] getCertificationChain -> DEBU 38b MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:43.032 UTC [cauthdsl] func2 -> DEBU 38c 0xc002dea280 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:43.032 UTC [msp.identity] Verify -> DEBU 38d Verify: digest = 00000000 f0 5c 4f 14 e3 5f f7 68 88 ab c5 05 35 9e 4d 07 |.\O.._.h....5.M.| -peer0.org1.example.com | 00000010 02 1a cf dc 40 66 5c 88 69 c0 c9 ea 15 01 f1 e9 |....@f\.i.......|" -peer0.org1.example.com | "2019-05-02 01:30:43.032 UTC [msp.identity] Verify -> DEBU 38e Verify: sig = 00000000 30 44 02 20 6f 0e 57 d0 37 a9 71 a2 ab 01 6b b2 |0D. o.W.7.q...k.| -peer0.org1.example.com | 00000010 1a c8 0c 53 fc 95 df db 7f 80 23 f8 95 bc 9f fb |...S......#.....| -peer0.org1.example.com | 00000020 f1 18 94 67 02 20 7f 5d e9 03 ad ce 26 16 e5 19 |...g. .]....&...| -peer0.org1.example.com | 00000030 4a 11 3f df 98 33 0d c4 18 02 16 26 25 fa da 56 |J.?..3.....&%..V| -peer0.org1.example.com | 00000040 92 ec ce 76 29 b8 |...v).|" -peer0.org1.example.com | "2019-05-02 01:30:43.033 UTC [cauthdsl] func2 -> DEBU 38f 0xc002dea280 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 427 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 428 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 429 Signature set satisfies policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 42a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 42b Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 42c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [common.channelconfig] NewStandardValues -> DEBU 42d Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42e Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42f Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 430 Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 431 Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 432 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [common.channelconfig] NewStandardValues -> DEBU 433 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 434 Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 435 Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 436 Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [common.channelconfig] initializeProtosStruct -> DEBU 437 Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [common.channelconfig] initializeProtosStruct -> DEBU 438 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [common.channelconfig] initializeProtosStruct -> DEBU 439 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [common.channelconfig] NewStandardValues -> DEBU 43a Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43b Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [common.channelconfig] NewStandardValues -> DEBU 43c Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43d Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [common.channelconfig] validateMSP -> DEBU 43e Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [msp] newBccspMsp -> DEBU 43f Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [msp] New -> DEBU 440 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [msp] Setup -> DEBU 441 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [msp.identity] newIdentity -> DEBU 442 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.240 UTC [cauthdsl] func1 -> DEBU 41a 0xc00091e3e0 gate 1556789234240548300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:14.241 UTC [cauthdsl] func2 -> DEBU 41b 0xc00091e3e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:14.241 UTC [cauthdsl] func2 -> DEBU 41c 0xc00091e3e0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:14.241 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 41d Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:14.242 UTC [msp] Validate -> DEBU 41e MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.242 UTC [cauthdsl] func2 -> DEBU 41f 0xc00091e3e0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:14.242 UTC [msp.identity] Verify -> DEBU 420 Verify: digest = 00000000 12 fa ed ab 44 3f a5 08 63 1d 7d 64 aa 5e 3c df |....D?..c.}d.^<.| +orderer0.example.com | 00000010 c5 84 de a9 45 11 76 49 cd 4f e3 7a 9f 0e ea 29 |....E.vI.O.z...)|" +orderer0.example.com | "2019-05-02 09:27:14.242 UTC [msp.identity] Verify -> DEBU 421 Verify: sig = 00000000 30 45 02 21 00 bf a9 2c ea a3 4b d3 1b 86 bf 38 |0E.!...,..K....8| +orderer0.example.com | 00000010 5e 65 0b 45 ae 4e 13 3a ff e5 27 5b c6 12 77 da |^e.E.N.:..'[..w.| +orderer0.example.com | 00000020 2c 07 09 f2 8f 02 20 69 33 cd d4 ff e7 0e 3f 7e |,..... i3.....?~| +orderer0.example.com | 00000030 b2 8c f5 b5 44 73 cb 4f 17 9d fa f3 41 c1 3d 31 |....Ds.O....A.=1| +orderer0.example.com | 00000040 b3 a6 61 9e ec 61 0e |..a..a.|" +orderer0.example.com | "2019-05-02 09:27:14.244 UTC [cauthdsl] func2 -> DEBU 422 0xc00091e3e0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:14.244 UTC [cauthdsl] func1 -> DEBU 423 0xc00091e3e0 gate 1556789234240548300 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:14.244 UTC [policies] Evaluate -> DEBU 424 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:14.244 UTC [policies] Evaluate -> DEBU 425 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:14.244 UTC [policies] Evaluate -> DEBU 426 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:14.245 UTC [policies] Evaluate -> DEBU 427 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:14.245 UTC [policies] Evaluate -> DEBU 428 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:14.246 UTC [policies] Evaluate -> DEBU 429 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:14.246 UTC [common.channelconfig] NewStandardValues -> DEBU 42a Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:14.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42b Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:14.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42c Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:14.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42d Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:14.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42e Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:14.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42f Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.248 UTC [common.channelconfig] NewStandardValues -> DEBU 430 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:14.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 431 Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:14.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 432 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:14.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 433 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 434 Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 435 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 436 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] NewStandardValues -> DEBU 437 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 438 Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] NewStandardValues -> DEBU 439 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43a Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.250 UTC [common.channelconfig] validateMSP -> DEBU 43b Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.250 UTC [msp] newBccspMsp -> DEBU 43c Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.250 UTC [msp] New -> DEBU 43d Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.250 UTC [msp] Setup -> DEBU 43e Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:14.251 UTC [msp.identity] newIdentity -> DEBU 43f Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -4738,7 +4452,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [msp.identity] newIdentity -> DEBU 443 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.252 UTC [msp.identity] newIdentity -> DEBU 440 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -4751,177 +4465,20 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.859 UTC [msp] Validate -> DEBU 444 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [common.channelconfig] NewStandardValues -> DEBU 445 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [common.channelconfig] initializeProtosStruct -> DEBU 446 Processing field: ACLs" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [common.channelconfig] initializeProtosStruct -> DEBU 447 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [common.channelconfig] NewStandardValues -> DEBU 448 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [common.channelconfig] initializeProtosStruct -> DEBU 449 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [common.channelconfig] NewStandardValues -> DEBU 44a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44b Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [common.channelconfig] Validate -> DEBU 44c Anchor peers for org Org1MSP are " -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [common.channelconfig] validateMSP -> DEBU 44d Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [msp] newBccspMsp -> DEBU 44e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [msp] New -> DEBU 44f Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [msp] Setup -> DEBU 450 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [msp.identity] newIdentity -> DEBU 451 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | "2019-05-02 01:30:43.033 UTC [cauthdsl] func1 -> DEBU 390 0xc002dea280 gate 1556760643030244600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:43.033 UTC [policies] Evaluate -> DEBU 391 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:43.033 UTC [policies] Evaluate -> DEBU 392 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:43.034 UTC [policies] Evaluate -> DEBU 393 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:43.034 UTC [policies] Evaluate -> DEBU 394 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:43.034 UTC [chaincode] handleMessage -> DEBU 395 [472b2b8a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:43.034 UTC [chaincode] Notify -> DEBU 396 [472b2b8a] notifying Txid:472b2b8acdb6f31dbcede8e00eb9b0112e9374c6cfb2f7aef5ddeecff988a0e0, channelID:" -peer0.org1.example.com | "2019-05-02 01:30:43.034 UTC [chaincode] Execute -> DEBU 397 Exit" -peer0.org1.example.com | "2019-05-02 01:30:43.035 UTC [endorser] callChaincode -> INFO 398 [][472b2b8a] Exit chaincode: name:"qscc" (7ms)" -peer0.org1.example.com | "2019-05-02 01:30:43.035 UTC [endorser] SimulateProposal -> DEBU 399 [][472b2b8a] Exit" -peer0.org1.example.com | "2019-05-02 01:30:43.035 UTC [endorser] func1 -> DEBU 39a Exit: request from 192.168.240.9:41198" -peer0.org1.example.com | "2019-05-02 01:30:43.035 UTC [comm.grpc.server] 1 -> INFO 39b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41198 grpc.code=OK grpc.call_duration=11.0597ms -peer0.org1.example.com | "2019-05-02 01:30:43.041 UTC [grpc] infof -> DEBU 39c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:43.461 UTC [gossip.gossip] handleMessage -> DEBU 39d Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:43.461 UTC [gossip.gossip] handleMessage -> DEBU 39e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:43.462 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:43.462 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:43.463 UTC [msp.identity] Verify -> DEBU 3a1 Verify: digest = 00000000 e2 4d de 95 45 ee b5 dd 0e 2e b3 02 0e db 4a 00 |.M..E.........J.| -peer0.org1.example.com | 00000010 35 0f 6f 3e 25 23 b5 b0 8e 01 c5 cd 29 7d fe 5b |5.o>%#......)}.[|" -peer0.org1.example.com | "2019-05-02 01:30:43.463 UTC [msp.identity] Verify -> DEBU 3a2 Verify: sig = 00000000 30 44 02 20 3b 47 63 6b ff d1 1b 99 aa 51 8b 23 |0D. ;Gck.....Q.#| -peer0.org1.example.com | 00000010 83 89 b9 bf 86 b1 f5 02 cc 9d d3 e5 ab 0d eb f3 |................| -peer0.org1.example.com | 00000020 34 38 5f 97 02 20 57 77 0c a6 34 75 9c c6 a3 3c |48_.. Ww..4u...<| -peer0.org1.example.com | 00000030 7e 2b 1b a7 85 09 dd dd ac db 5b cf b7 7e 62 77 |~+........[..~bw| -peer0.org1.example.com | 00000040 0a 73 93 31 29 ee |.s.1).|" -peer0.org1.example.com | "2019-05-02 01:30:43.464 UTC [msp.identity] Verify -> DEBU 3a3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:43.464 UTC [msp.identity] Verify -> DEBU 3a4 Verify: sig = 00000000 30 45 02 21 00 c7 f7 17 3d 57 35 cb 5a 9c 01 57 |0E.!....=W5.Z..W| -peer0.org1.example.com | 00000010 d6 22 32 2c 92 c6 75 ae 0d e1 2e e4 d3 35 3f 0c |."2,..u......5?.| -peer0.org1.example.com | 00000020 db e2 ca b3 f9 02 20 7b 30 12 62 a5 ae c0 cd 47 |...... {0.b....G| -peer0.org1.example.com | 00000030 75 79 0e 1a 55 d4 81 37 32 92 96 68 e5 dd a5 30 |uy..U..72..h...0| -peer0.org1.example.com | 00000040 40 99 55 90 72 2f ea |@.U.r/.|" -peer0.org1.example.com | "2019-05-02 01:30:43.464 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:43.465 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:43.465 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a7 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 " -peer0.org1.example.com | "2019-05-02 01:30:43.465 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 " -peer0.org1.example.com | "2019-05-02 01:30:43.466 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | Timestamp:inc_num:1556760633448248700 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:43.467 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aa Exiting" -peer0.org1.example.com | "2019-05-02 01:30:43.467 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ab Exiting" -peer0.org1.example.com | "2019-05-02 01:30:43.467 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ac Exiting" -peer0.org1.example.com | "2019-05-02 01:30:43.615 UTC [msp.identity] Sign -> DEBU 3ad Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151008 " -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | "2019-05-02 01:30:43.615 UTC [msp.identity] Sign -> DEBU 3ae Sign: digest: DF90D1173360E38AE18519664A3E99B041F98F5955F6B239F6CD49BB47B839BA " -peer0.org1.example.com | "2019-05-02 01:30:43.616 UTC [msp.identity] Sign -> DEBU 3af Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:43.616 UTC [msp.identity] Sign -> DEBU 3b0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:43.616 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3b1 Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:30:43.623 UTC [gossip.comm] Send -> DEBU 3b2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:43.623 UTC [gossip.comm] sendToEndpoint -> DEBU 3b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:43.624 UTC [gossip.comm] sendToEndpoint -> DEBU 3b4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:44.862 UTC [gossip.comm] Send -> DEBU 3b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:44.862 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:44.862 UTC [gossip.comm] sendToEndpoint -> DEBU 3b7 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:44.864 UTC [gossip.gossip] handleMessage -> DEBU 3b8 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:44.865 UTC [msp.identity] Verify -> DEBU 3b9 Verify: digest = 00000000 64 b8 f5 fc bc 41 9d c3 23 39 08 c8 d5 68 b5 5f |d....A..#9...h._| -peer0.org1.example.com | 00000010 cb 60 03 12 f4 56 5f 02 2c cb 7b ec 0c ec e7 f3 |.`...V_.,.{.....|" -peer0.org1.example.com | "2019-05-02 01:30:44.865 UTC [msp.identity] Verify -> DEBU 3ba Verify: sig = 00000000 30 45 02 21 00 8d e0 ab 12 85 44 66 c1 8b 8d dc |0E.!......Df....| -peer0.org1.example.com | 00000010 51 43 a8 33 77 2b f7 6f 71 2f 33 f0 a3 f9 30 e6 |QC.3w+.oq/3...0.| -peer0.org1.example.com | 00000020 a4 d6 0c 08 30 02 20 02 6e 63 0c 91 c6 6e 86 31 |....0. .nc...n.1| -peer0.org1.example.com | 00000030 d8 28 5e 48 90 45 48 1d c0 4f 20 99 6b c8 54 11 |.(^H.EH..O .k.T.| -peer0.org1.example.com | 00000040 af 82 d0 06 25 10 d2 |....%..|" -peer0.org1.example.com | "2019-05-02 01:30:44.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:44.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:44.866 UTC [policies] Evaluate -> DEBU 3bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:44.866 UTC [policies] Evaluate -> DEBU 3be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:44.866 UTC [policies] Evaluate -> DEBU 3bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:44.867 UTC [msp] DeserializeIdentity -> DEBU 3c0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:44.867 UTC [msp.identity] newIdentity -> DEBU 3c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:44.868 UTC [cauthdsl] func1 -> DEBU 3c2 0xc002e19160 gate 1556760644868912600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:44.869 UTC [cauthdsl] func2 -> DEBU 3c3 0xc002e19160 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:44.869 UTC [cauthdsl] func2 -> DEBU 3c4 0xc002e19160 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:44.869 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3c5 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:44.870 UTC [msp] Validate -> DEBU 3c6 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:44.871 UTC [msp] getCertificationChain -> DEBU 3c7 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:44.871 UTC [cauthdsl] func2 -> DEBU 3c8 0xc002e19160 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:44.871 UTC [msp.identity] Verify -> DEBU 3c9 Verify: digest = 00000000 64 b8 f5 fc bc 41 9d c3 23 39 08 c8 d5 68 b5 5f |d....A..#9...h._| -peer0.org1.example.com | 00000010 cb 60 03 12 f4 56 5f 02 2c cb 7b ec 0c ec e7 f3 |.`...V_.,.{.....|" -peer0.org1.example.com | "2019-05-02 01:30:44.871 UTC [msp.identity] Verify -> DEBU 3ca Verify: sig = 00000000 30 45 02 21 00 8d e0 ab 12 85 44 66 c1 8b 8d dc |0E.!......Df....| -peer0.org1.example.com | 00000010 51 43 a8 33 77 2b f7 6f 71 2f 33 f0 a3 f9 30 e6 |QC.3w+.oq/3...0.| -peer0.org1.example.com | 00000020 a4 d6 0c 08 30 02 20 02 6e 63 0c 91 c6 6e 86 31 |....0. .nc...n.1| -peer0.org1.example.com | 00000030 d8 28 5e 48 90 45 48 1d c0 4f 20 99 6b c8 54 11 |.(^H.EH..O .k.T.| -peer0.org1.example.com | 00000040 af 82 d0 06 25 10 d2 |....%..|" -peer0.org1.example.com | "2019-05-02 01:30:44.872 UTC [cauthdsl] func2 -> DEBU 3cb 0xc002e19160 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:44.872 UTC [cauthdsl] func1 -> DEBU 3cc 0xc002e19160 gate 1556760644868912600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:44.872 UTC [policies] Evaluate -> DEBU 3cd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:44.872 UTC [policies] Evaluate -> DEBU 3ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:44.872 UTC [policies] Evaluate -> DEBU 3cf Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:44.872 UTC [policies] Evaluate -> DEBU 3d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:44.872 UTC [gossip.gossip] handleMessage -> DEBU 3d1 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:44.873 UTC [gossip.pull] Hello -> DEBU 3d2 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.860 UTC [msp.identity] newIdentity -> DEBU 452 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.861 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 453 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.861 UTC [msp] Validate -> DEBU 454 MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.861 UTC [msp] getCertificationChain -> DEBU 455 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.861 UTC [msp] hasOURole -> DEBU 456 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:38.861 UTC [msp] getCertificationChain -> DEBU 457 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.861 UTC [common.channelconfig] NewStandardValues -> DEBU 458 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.861 UTC [common.channelconfig] initializeProtosStruct -> DEBU 459 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:38.862 UTC [common.channelconfig] NewStandardValues -> DEBU 45a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.862 UTC [common.channelconfig] initializeProtosStruct -> DEBU 45b Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.863 UTC [common.channelconfig] Validate -> DEBU 45c Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-05-02 01:30:38.863 UTC [common.channelconfig] validateMSP -> DEBU 45d Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.864 UTC [msp] newBccspMsp -> DEBU 45e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.864 UTC [msp] New -> DEBU 45f Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.865 UTC [msp] Setup -> DEBU 460 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.866 UTC [msp.identity] newIdentity -> DEBU 461 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [msp] Validate -> DEBU 441 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] NewStandardValues -> DEBU 442 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 443 Processing field: ACLs" +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 444 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] NewStandardValues -> DEBU 445 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 446 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] NewStandardValues -> DEBU 447 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 448 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] Validate -> DEBU 449 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [common.channelconfig] validateMSP -> DEBU 44a Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [msp] newBccspMsp -> DEBU 44b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.253 UTC [msp] New -> DEBU 44c Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.254 UTC [msp] Setup -> DEBU 44d Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.255 UTC [msp.identity] newIdentity -> DEBU 44e Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -4929,6 +4486,61 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.069 UTC [gossip.comm] sendToEndpoint -> DEBU 325 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.074 UTC [gossip.gossip] handleMessage -> DEBU 326 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6173781539121442575 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.076 UTC [gossip.pull] HandleMessage -> DEBU 327 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6173781539121442575 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.076 UTC [gossip.gossip] handleMessage -> DEBU 328 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.077 UTC [gossip.gossip] handleMessage -> DEBU 329 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.077 UTC [gossip.gossip] handleMessage -> DEBU 32a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.077 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32c Verify: digest = 00000000 6e 6b fe 1b 00 c8 2f a9 e2 c4 dd 1d 85 fc 07 a3 |nk..../.........| +peer0.org1.example.com | 00000010 5a 38 6c 6c 84 de 32 20 84 c7 ea 91 8f 28 fd 50 |Z8ll..2 .....(.P|" +peer0.org1.example.com | "2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32d Verify: sig = 00000000 30 45 02 21 00 ef 55 3c db c8 8d 10 b7 f6 bc c3 |0E.!..U<........| +peer0.org1.example.com | 00000010 3e ca 32 24 25 58 31 a1 ba d2 53 bf f4 60 36 f1 |>.2$%X1...S..`6.| +peer0.org1.example.com | 00000020 af 1d d0 34 fb 02 20 77 78 16 b2 2a d8 1f b4 15 |...4.. wx..*....| +peer0.org1.example.com | 00000030 8d a2 00 d4 e1 54 35 23 2a 8d d5 80 1a 38 63 06 |.....T5#*....8c.| +peer0.org1.example.com | 00000040 9b 89 af e8 2d 54 3e |....-T>|" +peer0.org1.example.com | "2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32f Verify: sig = 00000000 30 45 02 21 00 95 ca 6f 83 1a ed 86 98 57 ad 1b |0E.!...o.....W..| +peer0.org1.example.com | 00000010 ba 05 27 96 d4 8d be a5 3b 2c eb 55 a2 2b fc d9 |..'.....;,.U.+..| +peer0.org1.example.com | 00000020 65 9c 37 13 15 02 20 71 10 c2 cd 18 91 db 75 18 |e.7... q......u.| +peer0.org1.example.com | 00000030 7a c3 34 51 58 91 89 a8 a2 00 b5 4b 6e c7 81 e2 |z.4QX......Kn...| +peer0.org1.example.com | 00000040 a0 ba ab 6d 5d 9d 38 |...m].8|" +peer0.org1.example.com | "2019-05-02 09:27:17.079 UTC [gossip.discovery] handleAliveMessage -> DEBU 330 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.079 UTC [gossip.discovery] isSentByMe -> DEBU 331 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.079 UTC [gossip.discovery] handleAliveMessage -> DEBU 332 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.080 UTC [gossip.discovery] handleMsgFromComm -> DEBU 333 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.114 UTC [gossip.gossip] handleMessage -> DEBU 334 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg @@ -4936,7 +4548,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.866 UTC [msp.identity] newIdentity -> DEBU 462 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.255 UTC [msp.identity] newIdentity -> DEBU 44f Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -4949,593 +4561,166 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | "2019-05-02 09:27:17.115 UTC [gossip.pull] HandleMessage -> DEBU 335 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.115 UTC [gossip.pull] SendDigest -> DEBU 336 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:17.115 UTC [gossip.gossip] handleMessage -> DEBU 337 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.117 UTC [gossip.gossip] handleMessage -> DEBU 338 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1099 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 339 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1099 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.118 UTC [msp.identity] Verify -> DEBU 33a Verify: digest = 00000000 5e 21 fd c3 3f 6b bf 46 7d ad 72 6a a3 9b eb df |^!..?k.F}.rj....| +peer0.org1.example.com | 00000010 94 bf 54 d0 c0 a5 d1 69 35 6a f8 7f ab 9f 80 bb |..T....i5j......|" +peer0.org1.example.com | "2019-05-02 09:27:17.118 UTC [msp.identity] Verify -> DEBU 33b Verify: sig = 00000000 30 45 02 21 00 b8 44 6c c1 b1 87 c8 b1 3d a5 9c |0E.!..Dl.....=..| +peer0.org1.example.com | 00000010 96 34 88 3e 19 72 cc 99 f1 a2 76 b2 d9 05 26 94 |.4.>.r....v...&.| +peer0.org1.example.com | 00000020 d6 1e 97 c1 35 02 20 44 31 23 1d 1c dd cb 6a 76 |....5. D1#....jv| +peer0.org1.example.com | 00000030 95 bb c4 88 ce 5f 94 a9 95 26 b5 5e b9 dd 85 5b |....._...&.^...[| +peer0.org1.example.com | 00000040 b5 e5 5c d4 29 4c f6 |..\.)L.|" +peer0.org1.example.com | "2019-05-02 09:27:17.119 UTC [msp.identity] Verify -> DEBU 33c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:17.119 UTC [msp.identity] Verify -> DEBU 33d Verify: sig = 00000000 30 45 02 21 00 f3 ca ca ef 97 c0 e8 29 a2 23 c4 |0E.!........).#.| +peer0.org1.example.com | 00000010 fb d2 50 11 be 9b 7a 4e 4b 7d 70 87 22 f0 d4 64 |..P...zNK}p."..d| +peer0.org1.example.com | 00000020 7b fb 91 82 32 02 20 49 7b 56 2d c4 03 d5 51 4c |{...2. I{V-...QL| +peer0.org1.example.com | 00000030 68 8a 8c 6f 38 c5 ee 5d 6b 7d bf 30 20 04 00 5b |h..o8..]k}.0 ..[| +peer0.org1.example.com | 00000040 af ac 81 20 6f 36 cd |... o6.|" +peer0.org1.example.com | "2019-05-02 09:27:17.122 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:17.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 340 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 " +peer0.org1.example.com | "2019-05-02 09:27:17.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 341 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 " +peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.discovery] learnExistingMembers -> DEBU 342 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.discovery] learnExistingMembers -> DEBU 343 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.discovery] handleAliveMessage -> DEBU 344 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 345 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.discovery] sendMemResponse -> DEBU 346 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:17.123 UTC [gossip.comm] Send -> DEBU 347 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:17.124 UTC [gossip.discovery] sendMemResponse -> DEBU 348 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:17.124 UTC [gossip.comm] sendToEndpoint -> DEBU 349 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:17.124 UTC [gossip.comm] sendToEndpoint -> DEBU 34a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.117 UTC [gossip.gossip] handleMessage -> DEBU 34b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.323 UTC [gossip.election] waitForMembershipStabilization -> DEBU 34c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" +peer0.org1.example.com | "2019-05-02 09:27:17.323 UTC [gossip.election] leaderElection -> DEBU 34d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:17.323 UTC [gossip.election] propose -> DEBU 34e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:17.323 UTC [gossip.election] propose -> DEBU 34f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:27:17.324 UTC [msp.identity] Sign -> DEBU 350 Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08BCA7ABE8FEF1B4CD151001 " +peer0.org1.example.com | "2019-05-02 09:27:17.324 UTC [msp.identity] Sign -> DEBU 351 Sign: digest: 5CF0E972D4F2A13EEB0551D5D89C9BCC32A7CFC77553710AEE74BA7D35FC5DEC " +peer0.org1.example.com | "2019-05-02 09:27:17.326 UTC [gossip.election] waitForInterrupt -> DEBU 352 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:17.518 UTC [endorser] ProcessProposal -> DEBU 353 Entering: request from 172.18.0.8:57204" +peer0.org1.example.com | "2019-05-02 09:27:17.518 UTC [protoutils] ValidateProposalMessage -> DEBU 354 ValidateProposalMessage starts for signed proposal 0xc002d6f090" +peer0.org1.example.com | "2019-05-02 09:27:17.518 UTC [protoutils] validateChannelHeader -> DEBU 355 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:17.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 356 begin" +peer0.org1.example.com | "2019-05-02 09:27:17.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 357 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:17.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 358 creator is valid" orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.868 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 463 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.868 UTC [msp] Validate -> DEBU 464 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.868 UTC [msp] getCertificationChain -> DEBU 465 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.869 UTC [msp] hasOURole -> DEBU 466 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:38.869 UTC [msp] getCertificationChain -> DEBU 467 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.869 UTC [msp] Setup -> DEBU 468 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:38.870 UTC [msp] Setup -> DEBU 469 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:38.870 UTC [policies] NewManagerImpl -> DEBU 46a Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.871 UTC [policies] NewManagerImpl -> DEBU 46b Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.871 UTC [policies] NewManagerImpl -> DEBU 46c Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.871 UTC [policies] NewManagerImpl -> DEBU 46d Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.872 UTC [policies] NewManagerImpl -> DEBU 46e Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:44.874 UTC [gossip.comm] Send -> DEBU 3d3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760640909059700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:44.874 UTC [gossip.comm] sendToEndpoint -> DEBU 3d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760640909059700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:44.875 UTC [gossip.comm] sendToEndpoint -> DEBU 3d5 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:44.878 UTC [gossip.comm] Send -> DEBU 3d6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:44.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3d7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:44.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.127 UTC [gossip.gossip] handleMessage -> DEBU 3d9 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.129 UTC [gossip.gossip] handleMessage -> DEBU 3da Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.135 UTC [gossip.gossip] handleMessage -> DEBU 3db Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.136 UTC [gossip.pull] HandleMessage -> DEBU 3dc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.137 UTC [gossip.gossip] handleMessage -> DEBU 3dd Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.137 UTC [gossip.gossip] handleMessage -> DEBU 3de Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760641155345900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.140 UTC [msp.identity] Verify -> DEBU 3df Verify: digest = 00000000 64 b8 f5 fc bc 41 9d c3 23 39 08 c8 d5 68 b5 5f |d....A..#9...h._| -peer0.org1.example.com | 00000010 cb 60 03 12 f4 56 5f 02 2c cb 7b ec 0c ec e7 f3 |.`...V_.,.{.....|" -peer0.org1.example.com | "2019-05-02 01:30:45.140 UTC [msp.identity] Verify -> DEBU 3e0 Verify: sig = 00000000 30 45 02 21 00 8d e0 ab 12 85 44 66 c1 8b 8d dc |0E.!......Df....| -peer0.org1.example.com | 00000010 51 43 a8 33 77 2b f7 6f 71 2f 33 f0 a3 f9 30 e6 |QC.3w+.oq/3...0.| -peer0.org1.example.com | 00000020 a4 d6 0c 08 30 02 20 02 6e 63 0c 91 c6 6e 86 31 |....0. .nc...n.1| -peer0.org1.example.com | 00000030 d8 28 5e 48 90 45 48 1d c0 4f 20 99 6b c8 54 11 |.(^H.EH..O .k.T.| -peer0.org1.example.com | 00000040 af 82 d0 06 25 10 d2 |....%..|" -peer0.org1.example.com | "2019-05-02 01:30:45.142 UTC [gossip.gossip] handleMessage -> DEBU 3e1 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.457 UTC [gossip.gossip] handleMessage -> DEBU 3e2 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.457 UTC [gossip.pull] HandleMessage -> DEBU 3e3 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.458 UTC [gossip.pull] SendDigest -> DEBU 3e4 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:45.459 UTC [gossip.gossip] handleMessage -> DEBU 3e5 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.459 UTC [gossip.gossip] handleMessage -> DEBU 3e6 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.460 UTC [gossip.gossip] handleMessage -> DEBU 3e7 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.460 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.460 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e9 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:45.461 UTC [msp.identity] Verify -> DEBU 3ea Verify: digest = 00000000 2e 8c 68 23 b6 59 99 ab 05 d8 d7 3d 12 98 00 84 |..h#.Y.....=....| -peer0.org1.example.com | 00000010 f0 60 49 b0 be ac 01 7c a3 35 03 e1 6b 4c c2 c0 |.`I....|.5..kL..|" -peer0.org1.example.com | "2019-05-02 01:30:45.461 UTC [msp.identity] Verify -> DEBU 3eb Verify: sig = 00000000 30 44 02 20 2b 9b 4d a1 c6 8f b2 99 63 7e 7a a9 |0D. +.M.....c~z.| -peer0.org1.example.com | 00000010 fc 48 e2 00 6e d5 94 b6 22 97 88 98 85 82 89 04 |.H..n...".......| -peer0.org1.example.com | 00000020 2e a4 d6 bf 02 20 33 bd 0a 60 58 81 8d 23 21 71 |..... 3..`X..#!q| -peer0.org1.example.com | 00000030 34 79 9a 55 19 2d bf fb 61 81 a0 08 65 1e 06 15 |4y.U.-..a...e...| -peer0.org1.example.com | 00000040 b2 9a dd e4 88 a7 |......|" -peer0.org1.example.com | "2019-05-02 01:30:45.461 UTC [msp.identity] Verify -> DEBU 3ec Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:45.461 UTC [msp.identity] Verify -> DEBU 3ed Verify: sig = 00000000 30 45 02 21 00 fb 9e 94 b5 af 91 e4 bd cf 4b 05 |0E.!..........K.| -peer0.org1.example.com | 00000010 b8 d2 10 d4 6a 63 51 23 bd 80 b4 a6 e8 d2 cd 79 |....jcQ#.......y| -peer0.org1.example.com | 00000020 c2 90 f3 d0 5c 02 20 54 6a b6 69 89 89 e1 ee 2e |....\. Tj.i.....| -orderer0.example.com | "2019-05-02 01:30:38.872 UTC [policies] NewManagerImpl -> DEBU 46f Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.872 UTC [policies] NewManagerImpl -> DEBU 470 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.873 UTC [policies] NewManagerImpl -> DEBU 471 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.873 UTC [policies] NewManagerImpl -> DEBU 472 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.874 UTC [policies] NewManagerImpl -> DEBU 473 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.874 UTC [policies] NewManagerImpl -> DEBU 474 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.874 UTC [policies] NewManagerImpl -> DEBU 475 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.875 UTC [policies] NewManagerImpl -> DEBU 476 Proposed new policy Readers for Channel/Application/Org2MSP" -peer0.org1.example.com | 00000030 08 6b 68 e0 07 5f 8c 78 9d 5e 57 da b8 8b 01 56 |.kh.._.x.^W....V| -peer0.org1.example.com | 00000040 04 16 96 fd 07 ae 83 |.......|" -peer0.org1.example.com | "2019-05-02 01:30:45.462 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ee Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ef Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:45.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f0 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 " -peer0.org1.example.com | "2019-05-02 01:30:45.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 " -peer0.org1.example.com | "2019-05-02 01:30:45.463 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:45.463 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.463 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.463 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f5 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.463 UTC [gossip.discovery] sendMemResponse -> DEBU 3f6 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:45.464 UTC [gossip.comm] Send -> DEBU 3f7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:45.464 UTC [gossip.discovery] sendMemResponse -> DEBU 3f8 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:45.464 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.464 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.617 UTC [gossip.pull] Hello -> DEBU 3fb Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:45.617 UTC [gossip.comm] Send -> DEBU 3fc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:45.617 UTC [gossip.comm] sendToEndpoint -> DEBU 3fd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.617 UTC [gossip.comm] sendToEndpoint -> DEBU 3fe Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.618 UTC [gossip.gossip] handleMessage -> DEBU 3ff Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7342555231517954143 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.618 UTC [gossip.pull] HandleMessage -> DEBU 400 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7342555231517954143 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.618 UTC [gossip.gossip] handleMessage -> DEBU 401 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.621 UTC [msp.identity] Sign -> DEBU 402 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151009 " -peer0.org1.example.com | "2019-05-02 01:30:45.621 UTC [msp.identity] Sign -> DEBU 403 Sign: digest: 17C272D0B1B95EA74D202C4FAF26DB44D06F2521E28F3123903C2D7E21EABA54 " -peer0.org1.example.com | "2019-05-02 01:30:45.621 UTC [msp.identity] Sign -> DEBU 404 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:45.621 UTC [msp.identity] Sign -> DEBU 405 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:45.621 UTC [gossip.comm] Send -> DEBU 406 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:45.621 UTC [gossip.comm] sendToEndpoint -> DEBU 407 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.621 UTC [gossip.comm] sendToEndpoint -> DEBU 408 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.624 UTC [gossip.gossip] handleMessage -> DEBU 409 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.624 UTC [gossip.gossip] handleMessage -> DEBU 40a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.624 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.624 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 40c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:45.624 UTC [msp.identity] Verify -> DEBU 40d Verify: digest = 00000000 17 c2 72 d0 b1 b9 5e a7 4d 20 2c 4f af 26 db 44 |..r...^.M ,O.&.D| -peer0.org1.example.com | 00000010 d0 6f 25 21 e2 8f 31 23 90 3c 2d 7e 21 ea ba 54 |.o%!..1#.<-~!..T|" -peer0.org1.example.com | "2019-05-02 01:30:45.624 UTC [msp.identity] Verify -> DEBU 40e Verify: sig = 00000000 30 45 02 21 00 f0 c0 8e 38 9a b0 25 b0 b4 0a f7 |0E.!....8..%....| -peer0.org1.example.com | 00000010 b3 22 bb b5 44 61 4c 9b 92 d0 0f 69 1f a1 74 d6 |."..DaL....i..t.| -peer0.org1.example.com | 00000020 55 80 84 d0 a0 02 20 44 76 aa 62 36 eb 04 af 61 |U..... Dv.b6...a| -peer0.org1.example.com | 00000030 08 5d d5 3c 1a 32 74 3d b2 ae cd d8 31 b3 64 f3 |.].<.2t=....1.d.| -peer0.org1.example.com | 00000040 1a a3 86 fc 98 9e af |.......|" -peer0.org1.example.com | "2019-05-02 01:30:45.625 UTC [msp.identity] Verify -> DEBU 40f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:30:45.625 UTC [msp.identity] Verify -> DEBU 410 Verify: sig = 00000000 30 44 02 20 19 b8 16 61 44 b6 3d ae 9e 7f 53 bc |0D. ...aD.=...S.| -peer0.org1.example.com | 00000010 61 c9 99 ef 93 bd 33 81 ee ff 23 a6 29 cb 05 df |a.....3...#.)...| -peer0.org1.example.com | 00000020 12 a6 e3 2e 02 20 40 f0 ba bf b3 53 2d 8a 24 b2 |..... @....S-.$.| -peer0.org1.example.com | 00000030 68 69 19 20 22 b6 fa fb d2 52 38 3f d7 90 c0 f1 |hi. "....R8?....| -orderer0.example.com | "2019-05-02 01:30:38.876 UTC [policies] NewManagerImpl -> DEBU 477 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.876 UTC [policies] NewManagerImpl -> DEBU 478 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.876 UTC [policies] NewManagerImpl -> DEBU 479 Proposed new policy ChannelCreationPolicy for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.877 UTC [policies] GetPolicy -> DEBU 47a Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:38.877 UTC [policies] NewManagerImpl -> DEBU 47b Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:38.877 UTC [policies] GetPolicy -> DEBU 47c Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:38.878 UTC [policies] NewManagerImpl -> DEBU 47d Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:38.878 UTC [policies] GetPolicy -> DEBU 47e Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [policies] NewManagerImpl -> DEBU 47f Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 480 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 481 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 483 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 484 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 485 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 486 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 487 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 491 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 492 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 493 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 494 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 495 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 496 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 497 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 498 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 499 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49d Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49e Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -peer0.org1.example.com | 00000040 69 45 1d 11 89 c7 |iE....|" -peer0.org1.example.com | "2019-05-02 01:30:45.625 UTC [gossip.discovery] handleAliveMessage -> DEBU 411 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.625 UTC [gossip.discovery] isSentByMe -> DEBU 412 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:45.625 UTC [gossip.discovery] handleAliveMessage -> DEBU 413 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 414 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:45.864 UTC [gossip.channel] reportMembershipChanges -> INFO 415 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" -peer0.org1.example.com | "2019-05-02 01:30:46.902 UTC [gossip.election] waitForInterrupt -> DEBU 416 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:30:46.903 UTC [gossip.election] beLeader -> INFO 417 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" -peer0.org1.example.com | "2019-05-02 01:30:46.903 UTC [gossip.service] func1 -> INFO 418 Elected as a leader, starting delivery service for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:46.905 UTC [deliveryClient] StartDeliverForChannel -> DEBU 419 This peer will pass blocks from orderer service to other peers for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:46.906 UTC [gossip.election] leaderElection -> DEBU 41a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:30:46.907 UTC [ConnProducer] NewConnection -> DEBU 41b Creating a new connection" -peer0.org1.example.com | "2019-05-02 01:30:46.908 UTC [gossip.election] IsLeader -> DEBU 41c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:30:46.909 UTC [msp.identity] Sign -> DEBU 41d Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510021801 " -peer0.org1.example.com | "2019-05-02 01:30:46.909 UTC [msp.identity] Sign -> DEBU 41e Sign: digest: 8B6F697684C215A73D24832DE95F115158D05764162D7564445E92AC4BF4B6F7 " -peer0.org1.example.com | "2019-05-02 01:30:46.910 UTC [gossip.election] waitForInterrupt -> DEBU 41f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:30:46.911 UTC [grpc] DialContext -> DEBU 420 parsed scheme: """ -peer0.org1.example.com | "2019-05-02 01:30:46.911 UTC [grpc] DialContext -> DEBU 421 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-05-02 01:30:46.911 UTC [grpc] UpdateState -> DEBU 422 ccResolverWrapper: sending update to cc: {[{orderer1.example.com:7050 0 }] }" -peer0.org1.example.com | "2019-05-02 01:30:46.911 UTC [grpc] switchBalancer -> DEBU 423 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-05-02 01:30:46.912 UTC [grpc] HandleSubConnStateChange -> DEBU 424 pickfirstBalancer: HandleSubConnStateChange: 0xc002eb66d0, CONNECTING" -peer0.org1.example.com | "2019-05-02 01:30:46.913 UTC [gossip.comm] Send -> DEBU 425 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:46.913 UTC [gossip.comm] sendToEndpoint -> DEBU 426 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:46.914 UTC [gossip.comm] sendToEndpoint -> DEBU 427 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:46.918 UTC [grpc] HandleSubConnStateChange -> DEBU 428 pickfirstBalancer: HandleSubConnStateChange: 0xc002eb66d0, READY" -peer0.org1.example.com | "2019-05-02 01:30:46.918 UTC [ConnProducer] NewConnection -> DEBU 429 Connected to orderer1.example.com:7050" -peer0.org1.example.com | "2019-05-02 01:30:46.919 UTC [deliveryClient] connect -> DEBU 42a Connected to orderer1.example.com:7050" -peer0.org1.example.com | "2019-05-02 01:30:46.919 UTC [deliveryClient] connect -> DEBU 42b Establishing gRPC stream with orderer1.example.com:7050 ..." -peer0.org1.example.com | "2019-05-02 01:30:46.919 UTC [deliveryClient] afterConnect -> DEBU 42c Entering" -peer0.org1.example.com | "2019-05-02 01:30:46.920 UTC [deliveryClient] RequestBlocks -> DEBU 42d Starting deliver with block [1] for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:46.920 UTC [msp.identity] Sign -> DEBU 42e Sign: plaintext: 0A91070A3D08051A0608C690A9E60522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " -peer0.org1.example.com | "2019-05-02 01:30:46.921 UTC [msp.identity] Sign -> DEBU 42f Sign: digest: 413DC8997F20A32C9CBF7533B5F548E5788336132435B6A50FE828E63AD3D42F " -peer0.org1.example.com | "2019-05-02 01:30:46.921 UTC [deliveryClient] afterConnect -> DEBU 430 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:46.925 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 431 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:46.925 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 432 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:46.925 UTC [policies] Evaluate -> DEBU 433 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-05-02 01:30:46.925 UTC [policies] Evaluate -> DEBU 434 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:46.926 UTC [policies] Evaluate -> DEBU 435 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-05-02 01:30:46.926 UTC [msp] DeserializeIdentity -> DEBU 436 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:46.926 UTC [msp.identity] newIdentity -> DEBU 437 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI -peer0.org1.example.com | KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA -peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM -peer0.org1.example.com | SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q -peer0.org1.example.com | 1A== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:46.927 UTC [cauthdsl] func1 -> DEBU 438 0xc002e8d990 gate 1556760646927402700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:46.927 UTC [cauthdsl] func2 -> DEBU 439 0xc002e8d990 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:46.927 UTC [cauthdsl] func2 -> DEBU 43a 0xc002e8d990 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:46.927 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 43b Checking if identity satisfies MEMBER role for OrdererMSP" -peer0.org1.example.com | "2019-05-02 01:30:46.927 UTC [msp] Validate -> DEBU 43c MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:46.928 UTC [cauthdsl] func2 -> DEBU 43d 0xc002e8d990 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:46.928 UTC [msp.identity] Verify -> DEBU 43e Verify: digest = 00000000 ca 8e 2c fd 4b f0 b4 69 5d 28 73 09 26 8e 92 fd |..,.K..i](s.&...| -peer0.org1.example.com | 00000010 d5 42 95 74 d4 18 25 3b df 62 96 36 31 b3 95 ac |.B.t..%;.b.61...|" -peer0.org1.example.com | "2019-05-02 01:30:46.928 UTC [msp.identity] Verify -> DEBU 43f Verify: sig = 00000000 30 45 02 21 00 9c b6 07 f6 98 0a b2 e2 6d 6b 19 |0E.!.........mk.| -peer0.org1.example.com | 00000010 9d c7 dd 47 ec e3 09 09 34 6e 2e 5c 57 df cf 39 |...G....4n.\W..9| -peer0.org1.example.com | 00000020 a6 56 0d 15 05 02 20 21 61 db 9c 4b 5d d0 71 18 |.V.... !a..K].q.| -peer0.org1.example.com | 00000030 d9 a8 2f 89 0a 50 a6 c6 96 32 3f c3 91 bd dc 97 |../..P...2?.....| -peer0.org1.example.com | 00000040 c0 9f 98 81 77 fc 4c |....w.L|" -peer0.org1.example.com | "2019-05-02 01:30:46.929 UTC [cauthdsl] func2 -> DEBU 440 0xc002e8d990 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:46.929 UTC [cauthdsl] func1 -> DEBU 441 0xc002e8d990 gate 1556760646927402700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:46.929 UTC [policies] Evaluate -> DEBU 442 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:30:46.929 UTC [policies] Evaluate -> DEBU 443 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:30:46.929 UTC [policies] Evaluate -> DEBU 444 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:30:46.930 UTC [policies] Evaluate -> DEBU 445 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:30:46.930 UTC [blocksProvider] DeliverBlocks -> DEBU 446 [businesschannel] Adding payload to local buffer, blockNum = [1]" -peer0.org1.example.com | "2019-05-02 01:30:46.931 UTC [gossip.state] addPayload -> DEBU 447 [businesschannel] Adding payload to local buffer, blockNum = [1]" -peer0.org1.example.com | "2019-05-02 01:30:46.931 UTC [gossip.state] addPayload -> DEBU 448 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-05-02 01:30:46.931 UTC [gossip.state] deliverPayloads -> DEBU 449 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" -peer0.org1.example.com | "2019-05-02 01:30:46.931 UTC [blocksProvider] DeliverBlocks -> DEBU 44a [businesschannel] Gossiping block [1], peers number [1]" -peer0.org1.example.com | "2019-05-02 01:30:46.931 UTC [gossip.state] deliverPayloads -> DEBU 44b [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-05-02 01:30:46.932 UTC [gossip.privdata] StoreBlock -> INFO 44c [businesschannel] Received block [1] from buffer" -peer0.org1.example.com | "2019-05-02 01:30:46.932 UTC [gossip.privdata] StoreBlock -> DEBU 44d [businesschannel] Validating block [1]" -peer0.org1.example.com | "2019-05-02 01:30:46.932 UTC [committer.txvalidator] Validate -> DEBU 44e [businesschannel] START Block Validation for block [1]" -peer0.org1.example.com | "2019-05-02 01:30:46.933 UTC [committer.txvalidator] Validate -> DEBU 44f expecting 1 block validation responses" -peer0.org1.example.com | "2019-05-02 01:30:46.932 UTC [gossip.channel] AddToMsgStore -> DEBU 450 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-05-02 01:30:46.933 UTC [committer.txvalidator] validateTx -> DEBU 451 [businesschannel] validateTx starts for block 0xc002d99d80 env 0xc002efe190 txn 0" -peer0.org1.example.com | "2019-05-02 01:30:46.933 UTC [protoutils] ValidateTransaction -> DEBU 452 ValidateTransactionEnvelope starts for envelope 0xc002efe190" -peer0.org1.example.com | "2019-05-02 01:30:46.934 UTC [gossip.pull] Add -> DEBU 453 Added 1, total items: 1" -peer0.org1.example.com | "2019-05-02 01:30:46.934 UTC [protoutils] ValidateTransaction -> DEBU 454 Header is channel_header:"\010\001\032\006\010\305\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\2718\"\253\342x:\353j9\"b\272\310\2533\311^]\020m$\322\321" " -peer0.org1.example.com | "2019-05-02 01:30:46.934 UTC [protoutils] validateChannelHeader -> DEBU 455 validateChannelHeader info: header type 1" -peer0.org1.example.com | "2019-05-02 01:30:46.934 UTC [protoutils] checkSignatureFromCreator -> DEBU 456 begin" -peer0.org1.example.com | "2019-05-02 01:30:46.934 UTC [msp] GetManagerForChain -> DEBU 457 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:30:46.935 UTC [msp] DeserializeIdentity -> DEBU 458 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:46.935 UTC [msp.identity] newIdentity -> DEBU 459 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -peer0.org1.example.com | QQ== -peer0.org1.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b4 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b5 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b6 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] verifyDeltaSet -> DEBU 4b7 Processing change to key: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] verifyDeltaSet -> DEBU 4b8 Processing change to key: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] verifyDeltaSet -> DEBU 4b9 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] verifyDeltaSet -> DEBU 4ba Processing change to key: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] verifyDeltaSet -> DEBU 4bb Processing change to key: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [common.configtx] policyForItem -> DEBU 4bc Getting policy for item Application with mod_policy ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4bd Manager Channel looking up path []" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4be Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4bf Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c0 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c1 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c2 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c3 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c4 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c5 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Evaluate -> DEBU 4c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Evaluate -> DEBU 4c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [policies] Evaluate -> DEBU 4c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:30:38.881 UTC [msp] DeserializeIdentity -> DEBU 4c9 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:38.882 UTC [msp.identity] newIdentity -> DEBU 4ca Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.882 UTC [cauthdsl] func1 -> DEBU 4cb 0xc000b18c10 gate 1556760638882240600 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:38.882 UTC [cauthdsl] func2 -> DEBU 4cc 0xc000b18c10 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:38.882 UTC [cauthdsl] func2 -> DEBU 4cd 0xc000b18c10 processing identity 0 with bytes of efef60" -peer0.org1.example.com | "2019-05-02 01:30:46.936 UTC [protoutils] checkSignatureFromCreator -> DEBU 45a creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -orderer0.example.com | "2019-05-02 01:30:38.882 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4ce Checking if identity satisfies ADMIN role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.936 UTC [msp] Validate -> DEBU 45b MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.882 UTC [cauthdsl] func2 -> DEBU 4cf 0xc000b18c10 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:46.936 UTC [protoutils] checkSignatureFromCreator -> DEBU 45c creator is valid" -orderer0.example.com | "2019-05-02 01:30:38.882 UTC [msp.identity] Verify -> DEBU 4d0 Verify: digest = 00000000 89 c5 30 09 2f 42 58 54 bf b0 28 d6 86 d6 13 e4 |..0./BXT..(.....| -peer0.org1.example.com | "2019-05-02 01:30:46.937 UTC [msp.identity] Verify -> DEBU 45d Verify: digest = 00000000 a7 1b a8 9c 30 04 3a 2d 9a ba be 84 ac 4a 84 7b |....0.:-.....J.{| -orderer0.example.com | 00000010 9b 54 6d d0 1e a8 cf b7 98 c0 12 76 b9 bb 1c 36 |.Tm........v...6|" -peer0.org1.example.com | 00000010 35 a7 b4 84 00 7d 16 79 14 eb af a3 3d 59 bf 32 |5....}.y....=Y.2|" -orderer0.example.com | "2019-05-02 01:30:38.882 UTC [msp.identity] Verify -> DEBU 4d1 Verify: sig = 00000000 30 45 02 21 00 e7 d9 34 ae 08 7f 3b 30 d5 e4 18 |0E.!...4...;0...| -peer0.org1.example.com | "2019-05-02 01:30:46.937 UTC [msp.identity] Verify -> DEBU 45e Verify: sig = 00000000 30 45 02 21 00 b6 5f 7a 53 df 5f 76 85 dd 0b ea |0E.!.._zS._v....| -orderer0.example.com | 00000010 28 11 f1 fb 87 bd 97 11 28 b9 2f 5a c0 f3 71 87 |(.......(./Z..q.| -peer0.org1.example.com | 00000010 9f 26 c6 a9 8e 06 6a 34 37 3d f3 15 28 17 9a 74 |.&....j47=..(..t| -peer0.org1.example.com | 00000020 31 28 76 c8 a6 02 20 2b b0 d1 53 f4 ca 8f 92 68 |1(v... +..S....h| -peer0.org1.example.com | 00000030 07 cb d5 a1 f3 3f fc 62 d2 13 9d 61 d0 30 18 b0 |.....?.b...a.0..| -peer0.org1.example.com | 00000040 6a e8 85 0e 1c 91 43 |j.....C|" -peer0.org1.example.com | "2019-05-02 01:30:46.937 UTC [protoutils] checkSignatureFromCreator -> DEBU 45f exits successfully" -peer0.org1.example.com | "2019-05-02 01:30:46.938 UTC [protoutils] validateConfigTransaction -> DEBU 460 validateConfigTransaction starts for data 0xc002f6e000, header channel_header:"\010\001\032\006\010\305\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\2718\"\253\342x:\353j9\"b\272\310\2533\311^]\020m$\322\321" " -peer0.org1.example.com | "2019-05-02 01:30:46.938 UTC [committer.txvalidator] validateTx -> DEBU 461 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:46.938 UTC [common.configtx] addToMap -> DEBU 462 Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-05-02 01:30:46.938 UTC [common.configtx] addToMap -> DEBU 463 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:46.939 UTC [common.configtx] addToMap -> DEBU 464 Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.939 UTC [common.configtx] addToMap -> DEBU 465 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.939 UTC [common.configtx] addToMap -> DEBU 466 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:46.939 UTC [common.configtx] addToMap -> DEBU 467 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:46.940 UTC [gossip.comm] Send -> DEBU 468 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:46.940 UTC [common.configtx] addToMap -> DEBU 469 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:46.941 UTC [common.configtx] addToMap -> DEBU 46b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:46.941 UTC [common.configtx] addToMap -> DEBU 46c Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-05-02 01:30:46.941 UTC [common.configtx] addToMap -> DEBU 46d Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:46.941 UTC [common.configtx] addToMap -> DEBU 46e Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.941 UTC [common.configtx] addToMap -> DEBU 46f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:46.940 UTC [gossip.comm] sendToEndpoint -> DEBU 46a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:46.942 UTC [gossip.comm] sendToEndpoint -> DEBU 471 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:46.942 UTC [common.configtx] addToMap -> DEBU 470 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.951 UTC [common.configtx] addToMap -> DEBU 472 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:46.952 UTC [common.configtx] addToMap -> DEBU 473 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:46.952 UTC [common.configtx] addToMap -> DEBU 474 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:46.952 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:46.953 UTC [common.configtx] verifyDeltaSet -> DEBU 476 Processing change to key: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.953 UTC [common.configtx] policyForItem -> DEBU 477 Getting policy for item Org1MSP with mod_policy Admins" -peer0.org1.example.com | "2019-05-02 01:30:46.954 UTC [policies] Manager -> DEBU 478 Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-05-02 01:30:46.954 UTC [policies] Manager -> DEBU 479 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:30:46.954 UTC [policies] Manager -> DEBU 47a Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:30:46.955 UTC [policies] Manager -> DEBU 47b Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-05-02 01:30:46.955 UTC [policies] Manager -> DEBU 47c Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.956 UTC [policies] Manager -> DEBU 47d Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.956 UTC [policies] Manager -> DEBU 47e Manager Channel/Application looking up path [Org1MSP]" -peer0.org1.example.com | "2019-05-02 01:30:46.956 UTC [policies] Manager -> DEBU 47f Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.957 UTC [policies] Manager -> DEBU 480 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.957 UTC [policies] Manager -> DEBU 481 Manager Channel/Application/Org1MSP looking up path []" -peer0.org1.example.com | "2019-05-02 01:30:46.957 UTC [policies] Evaluate -> DEBU 482 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -peer0.org1.example.com | "2019-05-02 01:30:46.958 UTC [cauthdsl] func1 -> DEBU 483 0xc002fcea40 gate 1556760646958344200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:46.958 UTC [cauthdsl] func2 -> DEBU 484 0xc002fcea40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:46.958 UTC [cauthdsl] func2 -> DEBU 485 0xc002fcea40 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:46.959 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 486 Checking if identity satisfies ADMIN role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:46.960 UTC [cauthdsl] func2 -> DEBU 487 0xc002fcea40 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:46.960 UTC [msp.identity] Verify -> DEBU 488 Verify: digest = 00000000 7e e0 d8 d0 d7 b3 a3 c0 01 cb 90 33 37 60 be ef |~..........37`..| -orderer0.example.com | 00000020 29 cc b5 17 a5 02 20 36 16 4d 85 ba c9 4e c1 31 |)..... 6.M...N.1| -orderer0.example.com | 00000030 b0 7f ea 5e 5f 8f d7 10 9b 58 85 dc 97 6d d9 55 |...^_....X...m.U| -orderer0.example.com | 00000040 d6 a1 57 ad 6c 81 d7 |..W.l..|" -orderer0.example.com | "2019-05-02 01:30:38.884 UTC [cauthdsl] func2 -> DEBU 4d2 0xc000b18c10 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:38.884 UTC [cauthdsl] func1 -> DEBU 4d3 0xc000b18c10 gate 1556760638882240600 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:38.884 UTC [policies] Evaluate -> DEBU 4d4 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.884 UTC [policies] Evaluate -> DEBU 4d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.884 UTC [policies] Evaluate -> DEBU 4d6 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:38.884 UTC [policies] Evaluate -> DEBU 4d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-05-02 01:30:38.884 UTC [common.configtx] verifyDeltaSet -> DEBU 4d8 Processing change to key: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.884 UTC [common.configtx] verifyDeltaSet -> DEBU 4d9 Processing change to key: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.884 UTC [common.configtx] verifyDeltaSet -> DEBU 4da Processing change to key: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4db Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4dc Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | 00000010 83 04 8b cc e0 6f 0e 3f 09 4a b5 dc 79 83 5e 60 |.....o.?.J..y.^`|" -peer0.org1.example.com | "2019-05-02 01:30:46.961 UTC [msp.identity] Verify -> DEBU 489 Verify: sig = 00000000 30 44 02 20 39 8e 08 37 34 ec ec 41 53 c4 ad ba |0D. 9..74..AS...| -peer0.org1.example.com | 00000010 2b dc ff 17 42 53 d2 3d 6f 68 d1 51 80 64 85 d7 |+...BS.=oh.Q.d..| -peer0.org1.example.com | 00000020 4f 85 ee ad 02 20 6a 36 2b aa 0f 2c 88 10 ef 67 |O.... j6+..,...g| -peer0.org1.example.com | 00000030 83 9e 48 8b 6f d5 dc 74 97 3a a1 54 c5 58 6e c1 |..H.o..t.:.T.Xn.| -peer0.org1.example.com | 00000040 78 e3 76 0b 0d 01 |x.v...|" -peer0.org1.example.com | "2019-05-02 01:30:46.962 UTC [cauthdsl] func2 -> DEBU 48a 0xc002fcea40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:46.962 UTC [cauthdsl] func1 -> DEBU 48b 0xc002fcea40 gate 1556760646958344200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:46.963 UTC [policies] Evaluate -> DEBU 48c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:46.963 UTC [policies] Evaluate -> DEBU 48d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:46.969 UTC [common.configtx] verifyDeltaSet -> DEBU 48e Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:46.970 UTC [common.configtx] recurseConfigMap -> DEBU 48f Setting policy for key Endorsement to " -peer0.org1.example.com | "2019-05-02 01:30:46.972 UTC [common.configtx] recurseConfigMap -> DEBU 490 Setting policy for key Readers to " -peer0.org1.example.com | "2019-05-02 01:30:46.973 UTC [common.configtx] recurseConfigMap -> DEBU 491 Setting policy for key Writers to " -peer0.org1.example.com | "2019-05-02 01:30:46.973 UTC [common.configtx] recurseConfigMap -> DEBU 492 Setting policy for key Admins to " -peer0.org1.example.com | "2019-05-02 01:30:46.974 UTC [common.configtx] recurseConfigMap -> DEBU 493 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.975 UTC [common.configtx] recurseConfigMap -> DEBU 494 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.975 UTC [common.configtx] recurseConfigMap -> DEBU 495 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.975 UTC [common.configtx] recurseConfigMap -> DEBU 496 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.975 UTC [common.configtx] recurseConfigMap -> DEBU 497 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.976 UTC [common.configtx] recurseConfigMap -> DEBU 498 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.976 UTC [common.configtx] recurseConfigMap -> DEBU 499 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.976 UTC [common.configtx] recurseConfigMap -> DEBU 49a Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.976 UTC [common.configtx] recurseConfigMap -> DEBU 49b Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.976 UTC [common.configtx] recurseConfigMap -> DEBU 49c Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.977 UTC [common.configtx] recurseConfigMap -> DEBU 49e Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.977 UTC [common.configtx] recurseConfigMap -> DEBU 49f Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.978 UTC [common.configtx] recurseConfigMap -> DEBU 4a0 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.978 UTC [common.configtx] recurseConfigMap -> DEBU 4a1 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.978 UTC [common.configtx] recurseConfigMap -> DEBU 4a2 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.978 UTC [common.configtx] recurseConfigMap -> DEBU 4a3 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.979 UTC [common.configtx] recurseConfigMap -> DEBU 4a4 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.979 UTC [common.configtx] recurseConfigMap -> DEBU 4a5 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 4a6 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:46.976 UTC [comm.grpc.server] 1 -> INFO 49d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:48.975Z grpc.peer_address=192.168.240.6:44942 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=455.4µs -peer0.org1.example.com | "2019-05-02 01:30:46.981 UTC [common.channelconfig] NewStandardValues -> DEBU 4a7 Initializing protos for *channelconfig.ChannelProtos" -peer0.org1.example.com | "2019-05-02 01:30:46.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a8 Processing field: HashingAlgorithm" -peer0.org1.example.com | "2019-05-02 01:30:46.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a9 Processing field: BlockDataHashingStructure" -peer0.org1.example.com | "2019-05-02 01:30:46.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4aa Processing field: OrdererAddresses" -peer0.org1.example.com | "2019-05-02 01:30:46.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ab Processing field: Consortium" -peer0.org1.example.com | "2019-05-02 01:30:46.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ac Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:46.984 UTC [common.channelconfig] NewStandardValues -> DEBU 4ad Initializing protos for *channelconfig.OrdererProtos" -peer0.org1.example.com | "2019-05-02 01:30:46.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ae Processing field: ConsensusType" -peer0.org1.example.com | "2019-05-02 01:30:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b0 Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4dd Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4de Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4df Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e0 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e1 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e2 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e4 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e5 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.886 UTC [common.configtx] recurseConfigMap -> DEBU 4e6 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.886 UTC [common.configtx] recurseConfigMap -> DEBU 4e7 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.887 UTC [common.configtx] recurseConfigMap -> DEBU 4e8 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.887 UTC [common.configtx] recurseConfigMap -> DEBU 4e9 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.888 UTC [common.configtx] recurseConfigMap -> DEBU 4ea Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.888 UTC [common.configtx] recurseConfigMap -> DEBU 4eb Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.888 UTC [common.configtx] recurseConfigMap -> DEBU 4ec Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.889 UTC [common.configtx] recurseConfigMap -> DEBU 4ed Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.889 UTC [common.configtx] recurseConfigMap -> DEBU 4ee Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.890 UTC [common.configtx] recurseConfigMap -> DEBU 4ef Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.890 UTC [common.configtx] recurseConfigMap -> DEBU 4f0 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.890 UTC [common.configtx] recurseConfigMap -> DEBU 4f1 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:38.891 UTC [common.channelconfig] NewStandardValues -> DEBU 4f2 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:38.891 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f3 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:38.892 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f4 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:38.892 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f5 Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:38.893 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f6 Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:38.893 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f7 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.894 UTC [common.channelconfig] NewStandardValues -> DEBU 4f8 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:38.894 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f9 Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fa Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fb Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fc Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fe Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [common.channelconfig] NewStandardValues -> DEBU 4ff Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 500 Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [common.channelconfig] NewStandardValues -> DEBU 501 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 502 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [common.channelconfig] validateMSP -> DEBU 503 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [msp] newBccspMsp -> DEBU 504 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b1 Processing field: BatchTimeout" -peer0.org1.example.com | "2019-05-02 01:30:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b2 Processing field: KafkaBrokers" -peer0.org1.example.com | "2019-05-02 01:30:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b3 Processing field: ChannelRestrictions" -peer0.org1.example.com | "2019-05-02 01:30:46.985 UTC [msp.identity] Sign -> DEBU 4af Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [msp] New -> DEBU 505 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.895 UTC [msp] Setup -> DEBU 506 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:38.896 UTC [msp.identity] newIdentity -> DEBU 507 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.896 UTC [msp.identity] newIdentity -> DEBU 508 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.896 UTC [msp] Validate -> DEBU 509 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.896 UTC [common.channelconfig] NewStandardValues -> DEBU 50a Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-05-02 01:30:38.896 UTC [common.channelconfig] initializeProtosStruct -> DEBU 50b Processing field: ACLs" -orderer0.example.com | "2019-05-02 01:30:38.896 UTC [common.channelconfig] initializeProtosStruct -> DEBU 50c Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.897 UTC [common.channelconfig] NewStandardValues -> DEBU 50d Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.898 UTC [common.channelconfig] initializeProtosStruct -> DEBU 50e Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:38.899 UTC [common.channelconfig] NewStandardValues -> DEBU 50f Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b4 Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:46.986 UTC [msp.identity] Sign -> DEBU 4b5 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:46.988 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4b6 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.6:44942" -peer0.org1.example.com | "2019-05-02 01:30:46.988 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4b7 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:44942" -peer0.org1.example.com | "2019-05-02 01:30:46.989 UTC [msp.identity] Verify -> DEBU 4b8 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-05-02 01:30:46.989 UTC [msp.identity] Verify -> DEBU 4b9 Verify: sig = 00000000 30 45 02 21 00 ce b0 4a 1f 9e b4 38 b2 67 4d 6c |0E.!...J...8.gMl| -peer0.org1.example.com | 00000010 97 5e b7 4d e5 22 5e 91 34 c6 7f fe bc d9 82 38 |.^.M."^.4......8| -peer0.org1.example.com | 00000020 93 25 2b 93 21 02 20 3b ea 5c 1f dd 60 64 8b 87 |.%+.!. ;.\..`d..| -peer0.org1.example.com | 00000030 53 0e d2 40 ed 07 2f 1e 97 48 b0 2c 5b 7f 91 ac |S..@../..H.,[...| -peer0.org1.example.com | 00000040 a5 58 51 aa 7b 37 79 |.XQ.{7y|" -peer0.org1.example.com | "2019-05-02 01:30:46.987 UTC [common.channelconfig] NewStandardValues -> DEBU 4ba Initializing protos for *channelconfig.OrdererOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:46.990 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4bb Authenticated 192.168.240.6:44942" -peer0.org1.example.com | "2019-05-02 01:30:46.997 UTC [gossip.comm] GossipStream -> DEBU 4bf Servicing 192.168.240.6:44942" -peer0.org1.example.com | "2019-05-02 01:30:46.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bc Processing field: Endpoints" -peer0.org1.example.com | "2019-05-02 01:30:46.996 UTC [grpc] infof -> DEBU 4bd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:46.997 UTC [gossip.gossip] handleMessage -> DEBU 4be Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 15663384753221398544, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 283 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:46.998 UTC [common.channelconfig] NewStandardValues -> DEBU 4c0 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.000 UTC [gossip.comm] writeToStream -> DEBU 4c1 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:30:47.001 UTC [gossip.gossip] handleMessage -> DEBU 4c2 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c3 Got message: GossipMessage: Channel: , nonce: 15663384753221398544, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 283 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.000 UTC [gossip.comm] readFromStream -> DEBU 4c4 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-05-02 01:30:47.001 UTC [gossip.comm] func2 -> DEBU 4c5 Client 192.168.240.6:44942 disconnected" -peer0.org1.example.com | "2019-05-02 01:30:47.002 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.003 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:47.004 UTC [comm.grpc.server] 1 -> INFO 4c8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:56.984Z grpc.peer_address=192.168.240.6:44942 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.5633ms -peer0.org1.example.com | "2019-05-02 01:30:47.004 UTC [gossip.comm] writeToStream -> DEBU 4c9 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:30:47.004 UTC [common.channelconfig] validateMSP -> DEBU 4ca Setting up MSP for org OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.005 UTC [msp.identity] Verify -> DEBU 4cb Verify: digest = 00000000 cf 2e 34 c0 36 28 d6 b0 5d c4 c0 30 f2 06 02 55 |..4.6(..]..0...U| -peer0.org1.example.com | 00000010 db d3 07 1e 50 a9 4b c1 c7 6d d8 e3 4d 39 c6 b5 |....P.K..m..M9..|" -peer0.org1.example.com | "2019-05-02 01:30:47.002 UTC [gossip.comm] serviceConnection -> DEBU 4cc Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:30:47.007 UTC [msp] newBccspMsp -> DEBU 4cd Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.007 UTC [msp.identity] Verify -> DEBU 4ce Verify: sig = 00000000 30 45 02 21 00 c4 13 1f 85 07 cf d0 37 b7 c1 e7 |0E.!........7...| -peer0.org1.example.com | 00000010 8f e3 38 04 85 0b a3 8a 7d 44 b6 84 8a e3 28 00 |..8.....}D....(.| -peer0.org1.example.com | 00000020 c6 e3 8b c8 04 02 20 31 37 a5 30 90 5f 4c 0f 94 |...... 17.0._L..| -peer0.org1.example.com | 00000030 05 b4 5f 1b 8a 58 69 50 14 a6 a3 8a 87 0d 5f b0 |.._..XiP......_.| -peer0.org1.example.com | 00000040 f7 8a b4 6a 87 b2 09 |...j...|" -peer0.org1.example.com | "2019-05-02 01:30:47.008 UTC [gossip.comm] func2 -> DEBU 4cf Client 192.168.240.6:44894 disconnected" -peer0.org1.example.com | "2019-05-02 01:30:47.008 UTC [msp] New -> DEBU 4d0 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.011 UTC [comm.grpc.server] 1 -> INFO 4d1 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.6:44894 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.5227729s -peer0.org1.example.com | "2019-05-02 01:30:47.012 UTC [msp] Setup -> DEBU 4d3 Setting up MSP instance OrdererMSP" -peer0.org1.example.com | "2019-05-02 01:30:47.012 UTC [gossip.comm] readFromStream -> DEBU 4d4 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -peer0.org1.example.com | "2019-05-02 01:30:47.011 UTC [msp.identity] Verify -> DEBU 4d2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:47.014 UTC [msp.identity] Verify -> DEBU 4d5 Verify: sig = 00000000 30 45 02 21 00 d3 6b 57 d5 04 a0 37 e6 cc fb 80 |0E.!..kW...7....| -peer0.org1.example.com | 00000010 e8 2b 59 fd d3 4e 23 e4 13 7a 53 54 cc 5b 21 ba |.+Y..N#..zST.[!.| -peer0.org1.example.com | 00000020 78 74 10 b1 5b 02 20 2a 6f ce b6 0a c9 82 f1 f0 |xt..[. *o.......| -peer0.org1.example.com | 00000030 23 61 ec 7e 9f 3e 32 6c 04 30 23 c7 88 d8 a9 23 |#a.~.>2l.0#....#| -peer0.org1.example.com | 00000040 89 b0 dc a0 bb 08 8d |.......|" -peer0.org1.example.com | "2019-05-02 01:30:47.014 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.014 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:47.014 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d8 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 " -peer0.org1.example.com | "2019-05-02 01:30:47.015 UTC [msp.identity] newIdentity -> DEBU 4d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.015 UTC [msp.identity] newIdentity -> DEBU 4da Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | "2019-05-02 01:30:38.899 UTC [common.channelconfig] initializeProtosStruct -> DEBU 510 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.900 UTC [common.channelconfig] Validate -> DEBU 511 Anchor peers for org Org1MSP are " -orderer0.example.com | "2019-05-02 01:30:38.900 UTC [common.channelconfig] validateMSP -> DEBU 512 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.900 UTC [msp] newBccspMsp -> DEBU 513 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.900 UTC [msp] New -> DEBU 514 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.901 UTC [msp] Setup -> DEBU 515 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.902 UTC [msp.identity] newIdentity -> DEBU 516 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.257 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 450 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.257 UTC [msp] Validate -> DEBU 451 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.257 UTC [msp] getCertificationChain -> DEBU 452 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.257 UTC [msp] hasOURole -> DEBU 453 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:14.258 UTC [msp] getCertificationChain -> DEBU 454 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.258 UTC [common.channelconfig] NewStandardValues -> DEBU 455 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.258 UTC [common.channelconfig] initializeProtosStruct -> DEBU 456 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:14.258 UTC [common.channelconfig] NewStandardValues -> DEBU 457 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.258 UTC [common.channelconfig] initializeProtosStruct -> DEBU 458 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.261 UTC [common.channelconfig] Validate -> DEBU 459 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-05-02 09:27:14.261 UTC [common.channelconfig] validateMSP -> DEBU 45a Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.261 UTC [msp] newBccspMsp -> DEBU 45b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.261 UTC [msp] New -> DEBU 45c Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.261 UTC [msp] Setup -> DEBU 45d Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.262 UTC [msp.identity] newIdentity -> DEBU 45e Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -5550,7 +4735,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.902 UTC [msp.identity] newIdentity -> DEBU 517 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.263 UTC [msp.identity] newIdentity -> DEBU 45f Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -5561,480 +4746,518 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.015 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 " -peer0.org1.example.com | "2019-05-02 01:30:47.016 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:47.016 UTC [msp] Validate -> DEBU 4dd MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.016 UTC [common.channelconfig] NewStandardValues -> DEBU 4de Initializing protos for *channelconfig.ApplicationProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.017 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4df Processing field: ACLs" -peer0.org1.example.com | "2019-05-02 01:30:47.016 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e0 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.017 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e1 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.017 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4e2 Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:47.017 UTC [common.channelconfig] NewStandardValues -> DEBU 4e3 Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.017 UTC [gossip.discovery] sendMemResponse -> DEBU 4e5 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:47.017 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4e6 Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:47.018 UTC [gossip.comm] Send -> DEBU 4e7 Entering, sending GossipMessage: Channel: , nonce: 15663384753221398544, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:47.018 UTC [gossip.discovery] sendMemResponse -> DEBU 4e8 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:47.018 UTC [common.channelconfig] NewStandardValues -> DEBU 4e9 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.018 UTC [gossip.comm] sendToEndpoint -> DEBU 4ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15663384753221398544, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.018 UTC [gossip.comm] createConnection -> DEBU 4ec Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:47.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4eb Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.019 UTC [common.channelconfig] Validate -> DEBU 4ed Anchor peers for org Org1MSP are anchor_peers: " -peer0.org1.example.com | "2019-05-02 01:30:47.019 UTC [common.channelconfig] validateMSP -> DEBU 4ee Setting up MSP for org Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.019 UTC [msp] newBccspMsp -> DEBU 4ef Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.019 UTC [msp] New -> DEBU 4f0 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.020 UTC [msp] Setup -> DEBU 4f1 Setting up MSP instance Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.020 UTC [msp.identity] newIdentity -> DEBU 4f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.021 UTC [msp.identity] newIdentity -> DEBU 4f3 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.022 UTC [grpc] DialContext -> DEBU 4f4 parsed scheme: """ -peer0.org1.example.com | "2019-05-02 01:30:47.022 UTC [grpc] DialContext -> DEBU 4f5 scheme "" not registered, fallback to default scheme" orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.904 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 518 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.904 UTC [msp] Validate -> DEBU 519 MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.904 UTC [msp] getCertificationChain -> DEBU 51a MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.905 UTC [msp] hasOURole -> DEBU 51b MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:38.905 UTC [msp] getCertificationChain -> DEBU 51c MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.906 UTC [common.channelconfig] NewStandardValues -> DEBU 51d Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.906 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51e Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:38.906 UTC [common.channelconfig] NewStandardValues -> DEBU 51f Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.906 UTC [common.channelconfig] initializeProtosStruct -> DEBU 520 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.907 UTC [common.channelconfig] Validate -> DEBU 521 Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-05-02 01:30:38.907 UTC [common.channelconfig] validateMSP -> DEBU 522 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.907 UTC [msp] newBccspMsp -> DEBU 523 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.908 UTC [msp] New -> DEBU 524 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.908 UTC [msp] Setup -> DEBU 525 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.909 UTC [msp.identity] newIdentity -> DEBU 526 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | "2019-05-02 09:27:14.264 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 460 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.264 UTC [msp] Validate -> DEBU 461 MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.265 UTC [msp] getCertificationChain -> DEBU 462 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.265 UTC [msp] hasOURole -> DEBU 463 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:14.265 UTC [msp] getCertificationChain -> DEBU 464 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.266 UTC [msp] Setup -> DEBU 465 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:14.266 UTC [msp] Setup -> DEBU 466 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 467 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 468 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 469 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46a Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46b Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46c Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46d Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 46e Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 46f Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 470 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 471 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 472 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 473 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 474 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 475 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 476 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] GetPolicy -> DEBU 477 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 478 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:14.268 UTC [policies] GetPolicy -> DEBU 479 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:14.269 UTC [policies] NewManagerImpl -> DEBU 47a Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:14.269 UTC [policies] GetPolicy -> DEBU 47b Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:14.270 UTC [policies] NewManagerImpl -> DEBU 47c Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:14.270 UTC [common.configtx] addToMap -> DEBU 47d Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:27:17.519 UTC [msp.identity] Verify -> DEBU 359 Verify: digest = 00000000 75 74 78 92 3d 9e 73 60 a5 3f 5c a3 2b 59 86 09 |utx.=.s`.?\.+Y..| +peer0.org1.example.com | 00000010 24 a0 a7 62 ee b1 0c f7 d5 3e 8e eb 89 e6 83 09 |$..b.....>......|" +peer0.org1.example.com | "2019-05-02 09:27:17.519 UTC [msp.identity] Verify -> DEBU 35a Verify: sig = 00000000 30 44 02 20 38 35 59 ca 73 12 a4 c6 82 fc 4e d9 |0D. 85Y.s.....N.| +peer0.org1.example.com | 00000010 f8 07 99 4c c8 d9 82 91 f7 e4 74 52 3c 48 21 72 |...L......tR DEBU 35b exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:17.520 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 35c validateChaincodeProposalMessage starts for proposal 0xc002643a40, header 0xc002d6f4a0" +peer0.org1.example.com | "2019-05-02 09:27:17.521 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 35d validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:17.521 UTC [endorser] preProcess -> DEBU 35e [][023c903b] processing txid: 023c903b0cd2c18d664179b0f27558b6de8975a98a972a42bc4850ea7327665c" +peer0.org1.example.com | "2019-05-02 09:27:17.521 UTC [endorser] SimulateProposal -> DEBU 35f [][023c903b] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:17.521 UTC [endorser] callChaincode -> INFO 360 [][023c903b] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:17.522 UTC [chaincode] Execute -> DEBU 361 Entry" +peer0.org1.example.com | "2019-05-02 09:27:17.522 UTC [cscc] Invoke -> DEBU 362 Invoke function: GetChannels" +peer0.org1.example.com | "2019-05-02 09:27:17.522 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 363 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:17.523 UTC [msp] Validate -> DEBU 364 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:17.524 UTC [msp.identity] Verify -> DEBU 365 Verify: digest = 00000000 75 74 78 92 3d 9e 73 60 a5 3f 5c a3 2b 59 86 09 |utx.=.s`.?\.+Y..| +peer0.org1.example.com | 00000010 24 a0 a7 62 ee b1 0c f7 d5 3e 8e eb 89 e6 83 09 |$..b.....>......|" +peer0.org1.example.com | "2019-05-02 09:27:17.524 UTC [msp.identity] Verify -> DEBU 366 Verify: sig = 00000000 30 44 02 20 38 35 59 ca 73 12 a4 c6 82 fc 4e d9 |0D. 85Y.s.....N.| +peer0.org1.example.com | 00000010 f8 07 99 4c c8 d9 82 91 f7 e4 74 52 3c 48 21 72 |...L......tR DEBU 367 [023c903b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:17.525 UTC [chaincode] Notify -> DEBU 368 [023c903b] notifying Txid:023c903b0cd2c18d664179b0f27558b6de8975a98a972a42bc4850ea7327665c, channelID:" +peer0.org1.example.com | "2019-05-02 09:27:17.526 UTC [chaincode] Execute -> DEBU 369 Exit" +peer0.org1.example.com | "2019-05-02 09:27:17.526 UTC [endorser] callChaincode -> INFO 36a [][023c903b] Exit chaincode: name:"cscc" (4ms)" +peer0.org1.example.com | "2019-05-02 09:27:17.526 UTC [endorser] SimulateProposal -> DEBU 36b [][023c903b] Exit" +peer0.org1.example.com | "2019-05-02 09:27:17.526 UTC [endorser] func1 -> DEBU 36c Exit: request from 172.18.0.8:57204" +peer0.org1.example.com | "2019-05-02 09:27:17.527 UTC [comm.grpc.server] 1 -> INFO 36d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57204 grpc.code=OK grpc.call_duration=8.4436ms +peer0.org1.example.com | "2019-05-02 09:27:17.530 UTC [grpc] infof -> DEBU 36e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [endorser] ProcessProposal -> DEBU 36f Entering: request from 172.18.0.8:57212" +peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [protoutils] ValidateProposalMessage -> DEBU 370 ValidateProposalMessage starts for signed proposal 0xc002d41a40" +peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [protoutils] validateChannelHeader -> DEBU 371 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [protoutils] checkSignatureFromCreator -> DEBU 372 begin" +peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [protoutils] checkSignatureFromCreator -> DEBU 373 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:18.451 UTC [protoutils] checkSignatureFromCreator -> DEBU 374 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:18.452 UTC [msp.identity] Verify -> DEBU 375 Verify: digest = 00000000 3a 0f 30 69 d6 29 d5 3b 03 24 d6 0d 03 6c 03 47 |:.0i.).;.$...l.G| +peer0.org1.example.com | 00000010 ed c1 2d 17 78 98 a9 2b b3 e2 2d 64 e4 1c d1 24 |..-.x..+..-d...$|" +peer0.org1.example.com | "2019-05-02 09:27:18.452 UTC [msp.identity] Verify -> DEBU 376 Verify: sig = 00000000 30 44 02 20 09 f7 93 b0 ec 7e 9d bd 6a 1c de e7 |0D. .....~..j...| +peer0.org1.example.com | 00000010 3b 66 da 09 67 7e 52 02 46 38 b6 dd 09 5c f6 b4 |;f..g~R.F8...\..| +peer0.org1.example.com | 00000020 27 86 52 a0 02 20 05 27 37 a4 af cd 3f 86 14 08 |'.R.. .'7...?...| +peer0.org1.example.com | 00000030 4d cb e6 c0 8f 60 33 8c 5d 72 27 6d d5 e1 22 3a |M....`3.]r'm..":| +peer0.org1.example.com | 00000040 63 8c 2f 4a b4 09 |c./J..|" +peer0.org1.example.com | "2019-05-02 09:27:18.452 UTC [protoutils] checkSignatureFromCreator -> DEBU 377 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:18.452 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 378 validateChaincodeProposalMessage starts for proposal 0xc002cdce00, header 0xc002d41e50" +peer0.org1.example.com | "2019-05-02 09:27:18.453 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 379 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:18.453 UTC [endorser] preProcess -> DEBU 37a [][716a73c1] processing txid: 716a73c130bfb25dd8bcba33e06ba94e3532aafe9f6f842a99d19cb09b6e5234" +peer0.org1.example.com | "2019-05-02 09:27:18.453 UTC [endorser] SimulateProposal -> DEBU 37b [][716a73c1] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:18.453 UTC [endorser] callChaincode -> INFO 37c [][716a73c1] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:18.453 UTC [chaincode] Execute -> DEBU 37d Entry" +peer0.org1.example.com | "2019-05-02 09:27:18.454 UTC [qscc] Invoke -> DEBU 37e Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:18.454 UTC [aclmgmt] CheckACL -> DEBU 37f acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-05-02 09:27:18.454 UTC [aclmgmt] CheckACL -> DEBU 380 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-05-02 09:27:18.455 UTC [policies] Evaluate -> DEBU 381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:18.455 UTC [policies] Evaluate -> DEBU 382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:18.455 UTC [policies] Evaluate -> DEBU 383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:18.455 UTC [msp] DeserializeIdentity -> DEBU 384 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:18.456 UTC [msp.identity] newIdentity -> DEBU 385 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:18.458 UTC [cauthdsl] func1 -> DEBU 386 0xc002e019d0 gate 1556789238458692400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:18.458 UTC [cauthdsl] func2 -> DEBU 387 0xc002e019d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:18.459 UTC [cauthdsl] func2 -> DEBU 388 0xc002e019d0 processing identity 0 with bytes of 10fffc0" +orderer0.example.com | "2019-05-02 09:27:14.270 UTC [common.configtx] addToMap -> DEBU 47e Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 47f Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 480 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 481 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 483 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 484 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 485 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 486 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 487 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:14.274 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.274 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.274 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:27:14.275 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:14.275 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:14.275 UTC [common.configtx] addToMap -> DEBU 491 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 492 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 493 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 494 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 495 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 496 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 497 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 498 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 499 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49a Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49b Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49d Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 49e Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:14.280 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:14.280 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:27:14.281 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.281 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:14.281 UTC [common.configtx] verifyDeltaSet -> DEBU 4b4 Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:14.281 UTC [common.configtx] verifyDeltaSet -> DEBU 4b5 Processing change to key: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:18.459 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 389 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:18.459 UTC [msp] Validate -> DEBU 38a MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:18.460 UTC [msp] getCertificationChain -> DEBU 38b MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:18.461 UTC [cauthdsl] func2 -> DEBU 38c 0xc002e019d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:18.461 UTC [msp.identity] Verify -> DEBU 38d Verify: digest = 00000000 3a 0f 30 69 d6 29 d5 3b 03 24 d6 0d 03 6c 03 47 |:.0i.).;.$...l.G| +peer0.org1.example.com | 00000010 ed c1 2d 17 78 98 a9 2b b3 e2 2d 64 e4 1c d1 24 |..-.x..+..-d...$|" +peer0.org1.example.com | "2019-05-02 09:27:18.461 UTC [msp.identity] Verify -> DEBU 38e Verify: sig = 00000000 30 44 02 20 09 f7 93 b0 ec 7e 9d bd 6a 1c de e7 |0D. .....~..j...| +peer0.org1.example.com | 00000010 3b 66 da 09 67 7e 52 02 46 38 b6 dd 09 5c f6 b4 |;f..g~R.F8...\..| +peer0.org1.example.com | 00000020 27 86 52 a0 02 20 05 27 37 a4 af cd 3f 86 14 08 |'.R.. .'7...?...| +peer0.org1.example.com | 00000030 4d cb e6 c0 8f 60 33 8c 5d 72 27 6d d5 e1 22 3a |M....`3.]r'm..":| +peer0.org1.example.com | 00000040 63 8c 2f 4a b4 09 |c./J..|" +peer0.org1.example.com | "2019-05-02 09:27:18.462 UTC [cauthdsl] func2 -> DEBU 38f 0xc002e019d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:18.463 UTC [cauthdsl] func1 -> DEBU 390 0xc002e019d0 gate 1556789238458692400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 391 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 392 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 393 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 394 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:18.464 UTC [chaincode] handleMessage -> DEBU 395 [716a73c1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:18.464 UTC [chaincode] Notify -> DEBU 396 [716a73c1] notifying Txid:716a73c130bfb25dd8bcba33e06ba94e3532aafe9f6f842a99d19cb09b6e5234, channelID:" +peer0.org1.example.com | "2019-05-02 09:27:18.464 UTC [chaincode] Execute -> DEBU 397 Exit" +peer0.org1.example.com | "2019-05-02 09:27:18.464 UTC [endorser] callChaincode -> INFO 398 [][716a73c1] Exit chaincode: name:"qscc" (11ms)" +peer0.org1.example.com | "2019-05-02 09:27:18.464 UTC [endorser] SimulateProposal -> DEBU 399 [][716a73c1] Exit" +peer0.org1.example.com | "2019-05-02 09:27:18.465 UTC [endorser] func1 -> DEBU 39a Exit: request from 172.18.0.8:57212" +peer0.org1.example.com | "2019-05-02 09:27:18.465 UTC [comm.grpc.server] 1 -> INFO 39b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57212 grpc.code=OK grpc.call_duration=14.4182ms +peer0.org1.example.com | "2019-05-02 09:27:18.469 UTC [grpc] infof -> DEBU 39c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 39d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151008 " +peer0.org1.example.com | "2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 39e Sign: digest: EF09E2D58682A805749A98A96E2B543A0C3248E6F007BFAD30F068D012DEB0FD " +peer0.org1.example.com | "2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 39f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 3a0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:19.063 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3a1 Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:19.073 UTC [gossip.comm] Send -> DEBU 3a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:19.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:19.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3a4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:19.116 UTC [gossip.gossip] handleMessage -> DEBU 3a5 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:19.116 UTC [gossip.gossip] handleMessage -> DEBU 3a6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:19.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:19.117 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a8 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:19.117 UTC [msp.identity] Verify -> DEBU 3a9 Verify: digest = 00000000 ed 47 db 57 06 c0 5e 0d e1 8c 81 a0 02 35 2f 1a |.G.W..^......5/.| +peer0.org1.example.com | 00000010 94 23 9a 81 4e 5b 68 32 3c e0 b3 4f 76 60 72 95 |.#..N[h2<..Ov`r.|" +peer0.org1.example.com | "2019-05-02 09:27:19.117 UTC [msp.identity] Verify -> DEBU 3aa Verify: sig = 00000000 30 44 02 20 31 b9 af 62 ef d4 94 05 d7 2d d8 61 |0D. 1..b.....-.a| +peer0.org1.example.com | 00000010 41 6f 0e c1 5d 1f ff ed d6 5b f5 55 e3 5a b5 18 |Ao..]....[.U.Z..| +peer0.org1.example.com | 00000020 bb 50 fd 15 02 20 51 de 62 25 cb 58 6a 8e 04 42 |.P... Q.b%.Xj..B| +peer0.org1.example.com | 00000030 c0 98 cc 3f 02 75 fb de 0c 81 3d 46 96 19 3c 11 |...?.u....=F..<.| +peer0.org1.example.com | 00000040 83 8a a5 e8 02 f6 |......|" +peer0.org1.example.com | "2019-05-02 09:27:19.117 UTC [msp.identity] Verify -> DEBU 3ab Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [msp.identity] Verify -> DEBU 3ac Verify: sig = 00000000 30 45 02 21 00 9c a1 11 d3 49 e8 bc 1c 50 d3 4c |0E.!.....I...P.L| +peer0.org1.example.com | 00000010 d1 c8 73 f4 b3 77 ff 2d de a7 b9 b3 51 a6 69 35 |..s..w.-....Q.i5| +peer0.org1.example.com | 00000020 6e db 41 3a 23 02 20 1f a1 d1 b3 ec 4b 5f ef 62 |n.A:#. .....K_.b| +peer0.org1.example.com | 00000030 ed e1 84 09 ac e9 47 df e9 f7 e3 c4 f6 67 c0 7f |......G......g..| +peer0.org1.example.com | 00000040 b2 ee bb ce 57 6c 24 |....Wl$|" +peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ad Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ae Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3af updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 " +peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 " +peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:19.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:20.283 UTC [gossip.comm] Send -> DEBU 3b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:20.284 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:20.285 UTC [gossip.comm] sendToEndpoint -> DEBU 3b7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:20.287 UTC [gossip.gossip] handleMessage -> DEBU 3b8 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:20.287 UTC [msp.identity] Verify -> DEBU 3b9 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h| +peer0.org1.example.com | 00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y DEBU 3ba Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....| +peer0.org1.example.com | 00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b| +peer0.org1.example.com | 00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..| +peer0.org1.example.com | 00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.| +peer0.org1.example.com | 00000040 89 bc 81 84 80 a7 |......|" +peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [policies] Evaluate -> DEBU 3bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [policies] Evaluate -> DEBU 3be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [policies] Evaluate -> DEBU 3bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [msp] DeserializeIdentity -> DEBU 3c0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [msp.identity] newIdentity -> DEBU 3c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b6 Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b7 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b8 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b9 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4ba Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.283 UTC [common.configtx] policyForItem -> DEBU 4bb Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4bc Manager Channel looking up path []" +orderer0.example.com | "2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4bd Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4be Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4bf Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4c0 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c1 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c2 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c3 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c4 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Evaluate -> DEBU 4c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2019-05-02 09:27:14.284 UTC [policies] Evaluate -> DEBU 4c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:14.285 UTC [policies] Evaluate -> DEBU 4c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:27:14.285 UTC [msp] DeserializeIdentity -> DEBU 4c8 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:14.286 UTC [msp.identity] newIdentity -> DEBU 4c9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.909 UTC [msp.identity] newIdentity -> DEBU 527 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | "2019-05-02 01:30:47.022 UTC [grpc] UpdateState -> DEBU 4f6 ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 }] }" -peer0.org1.example.com | "2019-05-02 01:30:47.023 UTC [grpc] switchBalancer -> DEBU 4f7 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-05-02 01:30:47.023 UTC [grpc] HandleSubConnStateChange -> DEBU 4f8 pickfirstBalancer: HandleSubConnStateChange: 0xc0030de480, CONNECTING" -peer0.org1.example.com | "2019-05-02 01:30:47.017 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.028 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f9 Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.029 UTC [grpc] HandleSubConnStateChange -> DEBU 4fa pickfirstBalancer: HandleSubConnStateChange: 0xc0030de480, READY" -peer0.org1.example.com | "2019-05-02 01:30:47.028 UTC [msp] Validate -> DEBU 4fb MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.031 UTC [msp.identity] Sign -> DEBU 4fc Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.031 UTC [msp.identity] Sign -> DEBU 4fd Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.032 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4fe Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.6:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.033 UTC [msp] getCertificationChain -> DEBU 4ff MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.034 UTC [gossip.comm] authenticateRemotePeer -> DEBU 500 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.034 UTC [msp] hasOURole -> DEBU 501 MSP Org1MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:30:47.035 UTC [msp] getCertificationChain -> DEBU 502 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.036 UTC [common.channelconfig] NewStandardValues -> DEBU 503 Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.036 UTC [common.channelconfig] initializeProtosStruct -> DEBU 504 Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:47.036 UTC [msp.identity] Verify -> DEBU 505 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-05-02 01:30:47.036 UTC [msp.identity] Verify -> DEBU 506 Verify: sig = 00000000 30 44 02 20 46 01 ab 1a cc 2d 08 ce be a8 e2 de |0D. F....-......| -peer0.org1.example.com | 00000010 9d 0d 8a 99 a1 7c 82 e9 79 3d b1 a1 a9 ae aa 69 |.....|..y=.....i| -peer0.org1.example.com | 00000020 fa 51 56 a9 02 20 54 7f 9a a8 d8 f4 31 1f 41 98 |.QV.. T.....1.A.| -peer0.org1.example.com | 00000030 a2 18 3b 34 33 0a 46 44 d3 63 14 5e 44 48 65 b5 |..;43.FD.c.^DHe.| -peer0.org1.example.com | 00000040 be 84 94 f9 1c d3 |......|" -peer0.org1.example.com | "2019-05-02 01:30:47.036 UTC [common.channelconfig] NewStandardValues -> DEBU 507 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 508 Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.037 UTC [common.channelconfig] Validate -> DEBU 509 Anchor peers for org Org2MSP are " -peer0.org1.example.com | "2019-05-02 01:30:47.038 UTC [common.channelconfig] validateMSP -> DEBU 50a Setting up MSP for org Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.038 UTC [msp] newBccspMsp -> DEBU 50c Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.039 UTC [msp] New -> DEBU 50e Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.039 UTC [msp] Setup -> DEBU 50f Setting up MSP instance Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.038 UTC [grpc] infof -> DEBU 50d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.037 UTC [gossip.comm] authenticateRemotePeer -> DEBU 50b Authenticated 192.168.240.6:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.040 UTC [gossip.comm] createConnection -> DEBU 510 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.040 UTC [gossip.comm] sendToEndpoint -> DEBU 511 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.041 UTC [msp.identity] newIdentity -> DEBU 512 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.042 UTC [msp.identity] newIdentity -> DEBU 513 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.043 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 514 Checking if identity satisfies role [CLIENT] for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.044 UTC [msp] Validate -> DEBU 515 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.044 UTC [msp] getCertificationChain -> DEBU 516 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.045 UTC [msp] hasOURole -> DEBU 517 MSP Org2MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:30:47.045 UTC [msp] getCertificationChain -> DEBU 518 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.046 UTC [msp] Setup -> DEBU 519 Setting up the MSP manager (3 msps)" -peer0.org1.example.com | "2019-05-02 01:30:47.046 UTC [msp] Setup -> DEBU 51a MSP manager setup complete, setup 3 msps" -peer0.org1.example.com | "2019-05-02 01:30:47.047 UTC [policies] NewManagerImpl -> DEBU 51b Proposed new policy Readers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.047 UTC [policies] NewManagerImpl -> DEBU 51c Proposed new policy Writers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.047 UTC [policies] NewManagerImpl -> DEBU 51d Proposed new policy Admins for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.048 UTC [policies] NewManagerImpl -> DEBU 51e Proposed new policy Writers for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.048 UTC [policies] NewManagerImpl -> DEBU 51f Proposed new policy Admins for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.049 UTC [policies] NewManagerImpl -> DEBU 520 Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.049 UTC [policies] NewManagerImpl -> DEBU 521 Proposed new policy Readers for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.050 UTC [policies] NewManagerImpl -> DEBU 522 Proposed new policy Admins for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.051 UTC [policies] NewManagerImpl -> DEBU 523 Proposed new policy Endorsement for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.051 UTC [policies] NewManagerImpl -> DEBU 524 Proposed new policy Readers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.051 UTC [policies] NewManagerImpl -> DEBU 525 Proposed new policy Writers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.052 UTC [policies] NewManagerImpl -> DEBU 526 Proposed new policy Admins for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.052 UTC [policies] NewManagerImpl -> DEBU 527 Proposed new policy Endorsement for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.052 UTC [policies] NewManagerImpl -> DEBU 528 Proposed new policy Readers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.052 UTC [policies] NewManagerImpl -> DEBU 529 Proposed new policy Writers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.053 UTC [policies] NewManagerImpl -> DEBU 52a Proposed new policy Writers for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.053 UTC [policies] NewManagerImpl -> DEBU 52b Proposed new policy Admins for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.053 UTC [policies] NewManagerImpl -> DEBU 52c Proposed new policy LifecycleEndorsement for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.054 UTC [policies] NewManagerImpl -> DEBU 52d Proposed new policy Endorsement for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.054 UTC [policies] NewManagerImpl -> DEBU 52e Proposed new policy Readers for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.054 UTC [policies] NewManagerImpl -> DEBU 52f Proposed new policy Admins for Channel" -peer0.org1.example.com | "2019-05-02 01:30:47.054 UTC [policies] NewManagerImpl -> DEBU 530 Proposed new policy Readers for Channel" -peer0.org1.example.com | "2019-05-02 01:30:47.054 UTC [policies] NewManagerImpl -> DEBU 531 Proposed new policy Writers for Channel" -peer0.org1.example.com | "2019-05-02 01:30:47.055 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-05-02 01:30:47.055 UTC [common.configtx] addToMap -> DEBU 533 Adding to config map: [Group] /Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.055 UTC [common.configtx] addToMap -> DEBU 534 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.055 UTC [common.configtx] addToMap -> DEBU 535 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.055 UTC [common.configtx] addToMap -> DEBU 536 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.056 UTC [common.configtx] addToMap -> DEBU 537 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.911 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 528 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.911 UTC [msp] Validate -> DEBU 529 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.912 UTC [msp] getCertificationChain -> DEBU 52a MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.912 UTC [msp] hasOURole -> DEBU 52b MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:38.912 UTC [msp] getCertificationChain -> DEBU 52c MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.912 UTC [msp] Setup -> DEBU 52d Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:38.912 UTC [msp] Setup -> DEBU 52e MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:38.912 UTC [policies] NewManagerImpl -> DEBU 52f Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.912 UTC [policies] NewManagerImpl -> DEBU 530 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.912 UTC [policies] NewManagerImpl -> DEBU 531 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.912 UTC [policies] NewManagerImpl -> DEBU 532 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 533 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 534 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 535 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 536 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 537 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 538 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 539 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53a Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53b Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53c Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53d Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53e Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53f Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 540 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 541 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.914 UTC [policies] NewManagerImpl -> DEBU 542 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.914 UTC [policies] NewManagerImpl -> DEBU 543 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:38.915 UTC [policies] NewManagerImpl -> DEBU 544 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:38.915 UTC [policies] NewManagerImpl -> DEBU 545 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:38.916 UTC [common.configtx] addToMap -> DEBU 546 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:38.916 UTC [common.configtx] addToMap -> DEBU 547 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.916 UTC [common.configtx] addToMap -> DEBU 548 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.916 UTC [common.configtx] addToMap -> DEBU 549 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:38.919 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:38.919 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.056 UTC [common.configtx] addToMap -> DEBU 538 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.056 UTC [common.configtx] addToMap -> DEBU 539 Adding to config map: [Value] /Channel/Orderer/BatchSize" -peer0.org1.example.com | "2019-05-02 01:30:47.056 UTC [common.configtx] addToMap -> DEBU 53a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -peer0.org1.example.com | "2019-05-02 01:30:47.056 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -peer0.org1.example.com | "2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 53c Adding to config map: [Value] /Channel/Orderer/Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Value] /Channel/Orderer/ConsensusType" -peer0.org1.example.com | "2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Policy] /Channel/Orderer/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Policy] /Channel/Orderer/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Policy] /Channel/Orderer/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 542 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 543 Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 544 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 545 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 546 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 547 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.059 UTC [common.configtx] addToMap -> DEBU 548 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:47.059 UTC [common.configtx] addToMap -> DEBU 549 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.059 UTC [common.configtx] addToMap -> DEBU 54a Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.060 UTC [common.configtx] addToMap -> DEBU 54b Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.060 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.060 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:47.060 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.062 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.062 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-05-02 01:30:47.062 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Value] /Channel/HashingAlgorithm" -peer0.org1.example.com | "2019-05-02 01:30:47.062 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -peer0.org1.example.com | "2019-05-02 01:30:47.063 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Value] /Channel/OrdererAddresses" -peer0.org1.example.com | "2019-05-02 01:30:47.063 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Value] /Channel/Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:47.063 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Value] /Channel/Consortium" -peer0.org1.example.com | "2019-05-02 01:30:47.064 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Policy] /Channel/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.064 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Policy] /Channel/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.064 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Policy] /Channel/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.064 UTC [common.channelconfig] LogSanityChecks -> DEBU 55f As expected, current configuration has policy '/Channel/Readers'" -peer0.org1.example.com | "2019-05-02 01:30:47.064 UTC [common.channelconfig] LogSanityChecks -> DEBU 560 As expected, current configuration has policy '/Channel/Writers'" -peer0.org1.example.com | "2019-05-02 01:30:47.064 UTC [policies] Manager -> DEBU 561 Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 562 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 563 Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 564 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 565 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 566 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [common.channelconfig] LogSanityChecks -> DEBU 567 As expected, current configuration has policy '/Channel/Application/Readers'" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [common.channelconfig] LogSanityChecks -> DEBU 568 As expected, current configuration has policy '/Channel/Application/Writers'" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [common.channelconfig] LogSanityChecks -> DEBU 569 As expected, current configuration has policy '/Channel/Application/Admins'" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 56a Manager Channel looking up path [Orderer]" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 56b Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 56c Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 56d Manager Channel/Orderer looking up path []" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 56e Manager Channel/Orderer has managers OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [common.channelconfig] LogSanityChecks -> DEBU 56f As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55f Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 560 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 561 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 562 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 563 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 564 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 565 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 566 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 567 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 568 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 569 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56a Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56b Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56c Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56d Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.capabilities] Supported -> DEBU 572 Orderer capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [common.capabilities] Supported -> DEBU 573 Channel capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [orderer.common.cluster] NewStream -> DEBU 574 Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 575 Sending msg of 24746 bytes to 3 on channel testchainid took 119.2µs" -orderer0.example.com | "2019-05-02 01:30:38.922 UTC [orderer.common.cluster.step] sendMessage -> DEBU 576 Send of SubmitRequest for channel testchainid with payload of size 24746 to orderer2.example.com(orderer2.example.com:7050) took 151.1µs " -orderer0.example.com | "2019-05-02 01:30:38.921 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 577 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.240.9:47268" -orderer0.example.com | "2019-05-02 01:30:38.936 UTC [common.deliver] deliverBlocks -> DEBU 578 Rejecting deliver for 192.168.240.9:47266 because channel businesschannel not found" -orderer0.example.com | "2019-05-02 01:30:38.938 UTC [orderer.common.server] func1 -> DEBU 579 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:30:38.938 UTC [comm.grpc.server] 1 -> INFO 57a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47266 grpc.code=OK grpc.call_duration=164.2238ms -orderer0.example.com | "2019-05-02 01:30:38.949 UTC [orderer.common.broadcast] Handle -> DEBU 57b Received EOF from 192.168.240.9:47268, hangup" -orderer0.example.com | "2019-05-02 01:30:38.949 UTC [orderer.common.server] func1 -> DEBU 57c Closing Broadcast stream" -orderer0.example.com | "2019-05-02 01:30:38.949 UTC [comm.grpc.server] 1 -> INFO 57d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47268 grpc.code=OK grpc.call_duration=164.0902ms -orderer0.example.com | "2019-05-02 01:30:38.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU 57e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 24955" -orderer0.example.com | "2019-05-02 01:30:38.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 57f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:38.956 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 580 Sending msg of 28 bytes to 3 on channel testchainid took 65.4µs" -orderer0.example.com | "2019-05-02 01:30:38.956 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 581 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" -orderer0.example.com | "2019-05-02 01:30:38.956 UTC [orderer.common.cluster.step] sendMessage -> DEBU 582 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 307.2µs " -orderer0.example.com | "2019-05-02 01:30:38.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU 583 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 277.8µs " -orderer0.example.com | "2019-05-02 01:30:38.960 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 584 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 -orderer0.example.com | "2019-05-02 01:30:38.961 UTC [common.channelconfig] NewStandardValues -> DEBU 585 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:38.961 UTC [common.channelconfig] initializeProtosStruct -> DEBU 586 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:38.961 UTC [common.channelconfig] initializeProtosStruct -> DEBU 587 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:38.961 UTC [common.channelconfig] initializeProtosStruct -> DEBU 588 Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:38.961 UTC [common.channelconfig] initializeProtosStruct -> DEBU 589 Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:38.961 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58a Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.962 UTC [common.channelconfig] NewStandardValues -> DEBU 58b Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:38.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58c Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:38.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58d Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:38.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58e Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:38.963 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58f Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:38.963 UTC [common.channelconfig] initializeProtosStruct -> DEBU 590 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:38.963 UTC [common.channelconfig] initializeProtosStruct -> DEBU 591 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.963 UTC [common.channelconfig] NewStandardValues -> DEBU 592 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.963 UTC [common.channelconfig] initializeProtosStruct -> DEBU 593 Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:38.963 UTC [common.channelconfig] NewStandardValues -> DEBU 594 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.964 UTC [common.channelconfig] initializeProtosStruct -> DEBU 595 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.964 UTC [common.channelconfig] validateMSP -> DEBU 596 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.964 UTC [msp] newBccspMsp -> DEBU 597 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.964 UTC [msp] New -> DEBU 598 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.965 UTC [msp] Setup -> DEBU 599 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:38.965 UTC [msp.identity] newIdentity -> DEBU 59a Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.966 UTC [msp.identity] newIdentity -> DEBU 59b Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.966 UTC [msp] Validate -> DEBU 59c MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.966 UTC [common.channelconfig] NewStandardValues -> DEBU 59d Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-05-02 01:30:38.966 UTC [common.channelconfig] initializeProtosStruct -> DEBU 59e Processing field: ACLs" -orderer0.example.com | "2019-05-02 01:30:38.967 UTC [common.channelconfig] initializeProtosStruct -> DEBU 59f Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.967 UTC [common.channelconfig] NewStandardValues -> DEBU 5a0 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.967 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a1 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:38.967 UTC [common.channelconfig] NewStandardValues -> DEBU 5a2 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.967 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a3 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.967 UTC [common.channelconfig] Validate -> DEBU 5a4 Anchor peers for org Org1MSP are " -orderer0.example.com | "2019-05-02 01:30:38.967 UTC [common.channelconfig] validateMSP -> DEBU 5a5 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.967 UTC [msp] newBccspMsp -> DEBU 5a6 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [common.capabilities] Supported -> DEBU 570 Application capability V2_0 is supported and is enabled" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [common.capabilities] Supported -> DEBU 571 Channel capability V2_0 is supported and is enabled" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [gossip.service] ProcessConfigUpdate -> DEBU 572 Processing new config for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [gossip.service] ProcessConfigUpdate -> DEBU 573 Calling out because config was updated for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [gossip.service] updateAnchors -> DEBU 574 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [gossip.service] updateAnchors -> DEBU 575 Org2MSP anchor peers: []" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [gossip.service] updateAnchors -> DEBU 576 Creating state provider for chainID businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 577 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 578 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 579 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 57a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 57b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [cauthdsl] func1 -> DEBU 57c 0xc0031a08c0 gate 1556760647066147200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [cauthdsl] func2 -> DEBU 57d 0xc0031a08c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [cauthdsl] func2 -> DEBU 57e 0xc0031a08c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [cauthdsl] func2 -> DEBU 57f 0xc0031a08c0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [msp.identity] Verify -> DEBU 580 Verify: digest = 00000000 64 b8 f5 fc bc 41 9d c3 23 39 08 c8 d5 68 b5 5f |d....A..#9...h._| -peer0.org1.example.com | 00000010 cb 60 03 12 f4 56 5f 02 2c cb 7b ec 0c ec e7 f3 |.`...V_.,.{.....|" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [msp.identity] Verify -> DEBU 581 Verify: sig = 00000000 30 45 02 21 00 8d e0 ab 12 85 44 66 c1 8b 8d dc |0E.!......Df....| -peer0.org1.example.com | 00000010 51 43 a8 33 77 2b f7 6f 71 2f 33 f0 a3 f9 30 e6 |QC.3w+.oq/3...0.| -peer0.org1.example.com | 00000020 a4 d6 0c 08 30 02 20 02 6e 63 0c 91 c6 6e 86 31 |....0. .nc...n.1| -peer0.org1.example.com | 00000030 d8 28 5e 48 90 45 48 1d c0 4f 20 99 6b c8 54 11 |.(^H.EH..O .k.T.| -peer0.org1.example.com | 00000040 af 82 d0 06 25 10 d2 |....%..|" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [cauthdsl] func2 -> DEBU 582 0xc0031a08c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [cauthdsl] func1 -> DEBU 583 0xc0031a08c0 gate 1556760647066147200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 584 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 585 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 586 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 587 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [gossip.gossip] JoinChan -> INFO 588 Joining gossip network of channel businesschannel with 2 organizations" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [gossip.gossip] learnAnchorPeers -> INFO 589 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [gossip.gossip] learnAnchorPeers -> INFO 58a Anchor peer with same endpoint, skipping connecting to myself" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [gossip.gossip] learnAnchorPeers -> INFO 58b No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer0.org1.example.com | "2019-05-02 01:30:47.066 UTC [gossip.service] updateEndpoints -> DEBU 58c Updating endpoints for chainID%!(EXTRA string=businesschannel)" -peer0.org1.example.com | "2019-05-02 01:30:47.067 UTC [peer] updateTrustedRoots -> DEBU 58d Updating trusted root authorities for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.091 UTC [peer] buildTrustedRootsForChain -> DEBU 58e updating root CAs for channel [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.092 UTC [peer] buildTrustedRootsForChain -> DEBU 58f adding app root CAs for MSP [Org2MSP]" -peer0.org1.example.com | "2019-05-02 01:30:47.093 UTC [peer] buildTrustedRootsForChain -> DEBU 590 adding orderer root CAs for MSP [OrdererMSP]" -peer0.org1.example.com | "2019-05-02 01:30:47.093 UTC [peer] buildTrustedRootsForChain -> DEBU 591 adding app root CAs for MSP [Org1MSP]" -peer0.org1.example.com | "2019-05-02 01:30:47.094 UTC [committer.txvalidator] validateTx -> DEBU 592 config transaction received for chain businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.095 UTC [committer.txvalidator] validateTx -> DEBU 593 [businesschannel] validateTx completes for block 0xc002d99d80 env 0xc002efe190 txn 0" -peer0.org1.example.com | "2019-05-02 01:30:47.095 UTC [committer.txvalidator] Validate -> DEBU 594 got result for idx 0, code 0" -peer0.org1.example.com | "2019-05-02 01:30:47.095 UTC [committer.txvalidator] Validate -> INFO 595 [businesschannel] Validated block [1] in 163ms" -peer0.org1.example.com | "2019-05-02 01:30:47.096 UTC [gossip.privdata] listMissingPrivateData -> DEBU 596 Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-05-02 01:30:47.096 UTC [gossip.privdata] StoreBlock -> DEBU 597 [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-05-02 01:30:47.096 UTC [committer] preCommit -> DEBU 598 Received configuration update, calling CSCC ConfigUpdate" -peer0.org1.example.com | "2019-05-02 01:30:47.097 UTC [kvledger] CommitWithPvtData -> DEBU 599 [businesschannel] Validating state for block [1]" -peer0.org1.example.com | "2019-05-02 01:30:47.097 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 59a Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:30:47.097 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 59b lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-05-02 01:30:47.097 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 59c Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-05-02 01:30:47.097 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59d ValidateAndPrepareBatch() for block number = [1]" -peer0.org1.example.com | "2019-05-02 01:30:47.097 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59e preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:30:47.098 UTC [valimpl] preprocessProtoBlock -> DEBU 59f txType=CONFIG" -peer0.org1.example.com | "2019-05-02 01:30:47.098 UTC [valimpl] processNonEndorserTx -> DEBU 5a0 Performing custom processing for transaction [txid=], [txType=CONFIG]" -peer0.org1.example.com | "2019-05-02 01:30:47.098 UTC [valimpl] processNonEndorserTx -> DEBU 5a1 Processor for custom tx processing:&peer.configtxProcessor{}" -peer0.org1.example.com | "2019-05-02 01:30:47.099 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5a2 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:30:47.099 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5a3 constructing new tx simulator txid = []" -peer0.org1.example.com | "2019-05-02 01:30:47.099 UTC [peer] GenerateSimulationResults -> DEBU 5a4 Processing CONFIG" -orderer0.example.com | "2019-05-02 01:30:38.967 UTC [msp] New -> DEBU 5a7 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.968 UTC [msp] Setup -> DEBU 5a8 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.968 UTC [msp.identity] newIdentity -> DEBU 5a9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func1 -> DEBU 4ca 0xc000b52160 gate 1556789234287363800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4cb 0xc000b52160 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4cc 0xc000b52160 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4cd 0xc000b52160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4ce 0xc000b52160 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:14.287 UTC [cauthdsl] func1 -> DEBU 4cf 0xc000b52160 gate 1556789234287363800 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:14.287 UTC [policies] Evaluate -> DEBU 4d0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.288 UTC [policies] Evaluate -> DEBU 4d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.288 UTC [policies] Evaluate -> DEBU 4d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:27:14.288 UTC [cauthdsl] func1 -> DEBU 4d3 0xc000b532e0 gate 1556789234288629900 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4d4 0xc000b532e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4d5 0xc000b532e0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4d6 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4d7 0xc000b532e0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [msp.identity] Verify -> DEBU 4d8 Verify: digest = 00000000 be 65 ff 94 74 b5 dd 0a 8b e0 fb 53 1f bc cb 53 |.e..t......S...S| +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | 00000010 2c 56 9e 6a cc 84 33 2f a0 93 1f 86 d6 33 5e 45 |,V.j..3/.....3^E|" +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [msp.identity] Verify -> DEBU 4d9 Verify: sig = 00000000 30 44 02 20 5c 06 73 4e 5f 4a a6 b1 a0 36 db 18 |0D. \.sN_J...6..| +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | 00000010 83 d9 ac 96 21 2f fa cb cb 16 cd 0c 79 ce 78 b9 |....!/......y.x.| +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | 00000020 74 f6 6e 26 02 20 35 72 5f ea b5 76 18 c6 4a 55 |t.n&. 5r_..v..JU| +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +orderer0.example.com | 00000030 64 5e 26 e7 68 0c 17 1b be 2e 15 bb 05 06 1a 74 |d^&.h..........t| +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +orderer0.example.com | 00000040 7d 02 b5 e9 86 99 |}.....|" +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4da 0xc000b532e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [cauthdsl] func1 -> DEBU 4db 0xc000b532e0 gate 1556789234288629900 evaluation succeeds" +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:20.288 UTC [cauthdsl] func1 -> DEBU 3c2 0xc002e58140 gate 1556789240288894500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:20.289 UTC [cauthdsl] func2 -> DEBU 3c3 0xc002e58140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:20.289 UTC [cauthdsl] func2 -> DEBU 3c4 0xc002e58140 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:20.289 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3c5 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:20.289 UTC [msp] Validate -> DEBU 3c6 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [msp] getCertificationChain -> DEBU 3c7 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [cauthdsl] func2 -> DEBU 3c8 0xc002e58140 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [msp.identity] Verify -> DEBU 3c9 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h| +peer0.org1.example.com | 00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y DEBU 3ca Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....| +peer0.org1.example.com | 00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b| +peer0.org1.example.com | 00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..| +peer0.org1.example.com | 00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.| +peer0.org1.example.com | 00000040 89 bc 81 84 80 a7 |......|" +peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [cauthdsl] func2 -> DEBU 3cb 0xc002e58140 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [cauthdsl] func1 -> DEBU 3cc 0xc002e58140 gate 1556789240288894500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [policies] Evaluate -> DEBU 3cd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [policies] Evaluate -> DEBU 3ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:20.290 UTC [policies] Evaluate -> DEBU 3cf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:20.291 UTC [policies] Evaluate -> DEBU 3d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:20.291 UTC [gossip.gossip] handleMessage -> DEBU 3d1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:20.295 UTC [gossip.comm] Send -> DEBU 3d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789236325947800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:20.295 UTC [gossip.comm] sendToEndpoint -> DEBU 3d3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789236325947800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:20.295 UTC [gossip.comm] sendToEndpoint -> DEBU 3d4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:20.542 UTC [gossip.gossip] handleMessage -> DEBU 3d5 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:20.543 UTC [gossip.gossip] handleMessage -> DEBU 3d6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:20.543 UTC [gossip.gossip] handleMessage -> DEBU 3d7 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:20.545 UTC [gossip.pull] HandleMessage -> DEBU 3d8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:20.545 UTC [gossip.gossip] handleMessage -> DEBU 3d9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:20.547 UTC [gossip.gossip] handleMessage -> DEBU 3da Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789236573790800 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:20.548 UTC [msp.identity] Verify -> DEBU 3db Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h| +peer0.org1.example.com | 00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y DEBU 3dc Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....| +peer0.org1.example.com | 00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b| +peer0.org1.example.com | 00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..| +peer0.org1.example.com | 00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.| +peer0.org1.example.com | 00000040 89 bc 81 84 80 a7 |......|" +peer0.org1.example.com | "2019-05-02 09:27:20.549 UTC [gossip.gossip] handleMessage -> DEBU 3dd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.070 UTC [gossip.pull] Hello -> DEBU 3de Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:21.070 UTC [msp.identity] Sign -> DEBU 3df Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151009 " +peer0.org1.example.com | "2019-05-02 09:27:21.071 UTC [msp.identity] Sign -> DEBU 3e0 Sign: digest: 0E943797D8D439F6639B66FD538EC511BE9DB7FCC43AA95E3077CB08A6CCE129 " +peer0.org1.example.com | "2019-05-02 09:27:21.071 UTC [msp.identity] Sign -> DEBU 3e1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:21.071 UTC [msp.identity] Sign -> DEBU 3e2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:21.072 UTC [gossip.comm] Send -> DEBU 3e3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:21.072 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.072 UTC [gossip.comm] sendToEndpoint -> DEBU 3e5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.073 UTC [gossip.comm] Send -> DEBU 3e6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:21.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3e7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3e9 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3ea Exiting" +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [policies] Evaluate -> DEBU 4dc Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [policies] Evaluate -> DEBU 4dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.289 UTC [policies] Evaluate -> DEBU 4de Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:14.290 UTC [policies] Evaluate -> DEBU 4df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-05-02 09:27:14.290 UTC [common.configtx] verifyDeltaSet -> DEBU 4e0 Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:14.290 UTC [common.configtx] recurseConfigMap -> DEBU 4e1 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e2 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e3 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3eb Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 785619318732718520 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.pull] HandleMessage -> DEBU 3ec GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 785619318732718520 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3ed Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:21.076 UTC [msp.identity] Verify -> DEBU 3f0 Verify: digest = 00000000 0e 94 37 97 d8 d4 39 f6 63 9b 66 fd 53 8e c5 11 |..7...9.c.f.S...| +peer0.org1.example.com | 00000010 be 9d b7 fc c4 3a a9 5e 30 77 cb 08 a6 cc e1 29 |.....:.^0w.....)|" +peer0.org1.example.com | "2019-05-02 09:27:21.077 UTC [msp.identity] Verify -> DEBU 3f1 Verify: sig = 00000000 30 44 02 20 3c 60 f3 75 6c c8 c4 74 dd c8 61 b7 |0D. <`.ul..t..a.| +peer0.org1.example.com | 00000010 a3 9b 28 51 86 57 e0 e9 9f f8 af 37 14 41 61 62 |..(Q.W.....7.Aab| +peer0.org1.example.com | 00000020 e0 e6 42 d6 02 20 4b 7f c3 5e 82 f7 53 19 e9 1d |..B.. K..^..S...| +peer0.org1.example.com | 00000030 f3 85 00 23 ca 69 71 21 5f 74 28 da 36 65 41 9c |...#.iq!_t(.6eA.| +peer0.org1.example.com | 00000040 d6 e6 0a 68 db 24 |...h.$|" +peer0.org1.example.com | "2019-05-02 09:27:21.077 UTC [msp.identity] Verify -> DEBU 3f2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:21.078 UTC [msp.identity] Verify -> DEBU 3f3 Verify: sig = 00000000 30 45 02 21 00 e7 53 0a 9a 72 26 2a b8 18 0f e4 |0E.!..S..r&*....| +peer0.org1.example.com | 00000010 51 be 3c 11 c6 70 fd 36 a1 7a ae f6 a8 97 c9 55 |Q.<..p.6.z.....U| +peer0.org1.example.com | 00000020 16 4f ef 17 7b 02 20 5b bf ca 5c 5a 34 da 75 8b |.O..{. [..\Z4.u.| +peer0.org1.example.com | 00000030 36 92 ff 1a 2c b5 19 c8 e6 0e 9e 79 a0 fb 49 04 |6...,......y..I.| +peer0.org1.example.com | 00000040 d7 99 5c 67 50 01 93 |..\gP..|" +peer0.org1.example.com | "2019-05-02 09:27:21.078 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.080 UTC [gossip.discovery] isSentByMe -> DEBU 3f5 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.081 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.115 UTC [gossip.gossip] handleMessage -> DEBU 3f8 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.116 UTC [gossip.pull] HandleMessage -> DEBU 3f9 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.116 UTC [gossip.pull] SendDigest -> DEBU 3fa Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:21.116 UTC [gossip.gossip] handleMessage -> DEBU 3fb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.119 UTC [gossip.gossip] handleMessage -> DEBU 3fc Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fe Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:21.120 UTC [msp.identity] Verify -> DEBU 3ff Verify: digest = 00000000 3c d2 ae 36 98 38 d6 fb 44 e5 ff 16 21 78 36 7c |<..6.8..D...!x6|| +peer0.org1.example.com | 00000010 91 7a b7 92 d5 93 28 23 98 f8 70 a5 44 73 c8 20 |.z....(#..p.Ds. |" +peer0.org1.example.com | "2019-05-02 09:27:21.120 UTC [msp.identity] Verify -> DEBU 400 Verify: sig = 00000000 30 44 02 20 19 cd 84 14 7c 45 5e 5f 42 0e fc 7a |0D. ....|E^_B..z| +peer0.org1.example.com | 00000010 de 0c 36 fb 21 e1 2c 87 80 82 4f 5b c3 00 62 26 |..6.!.,...O[..b&| +peer0.org1.example.com | 00000020 37 18 b5 f1 02 20 39 00 da 84 4b b9 8a 1d 90 6c |7.... 9...K....l| +peer0.org1.example.com | 00000030 4f 37 4b 30 99 44 56 b8 ef 72 01 43 b5 d3 c8 e9 |O7K0.DV..r.C....| +peer0.org1.example.com | 00000040 ec 5f a3 34 fa 3c |._.4.<|" +peer0.org1.example.com | "2019-05-02 09:27:21.120 UTC [msp.identity] Verify -> DEBU 401 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:21.121 UTC [msp.identity] Verify -> DEBU 402 Verify: sig = 00000000 30 45 02 21 00 c2 1d 04 10 d6 df 07 2a 8a 67 66 |0E.!........*.gf| +peer0.org1.example.com | 00000010 2f 24 20 3e d5 7c 5e 31 93 1b 25 4a 71 99 10 2d |/$ >.|^1..%Jq..-| +peer0.org1.example.com | 00000020 21 c0 56 be 83 02 20 2f c8 13 bb 2b 84 1f dd 9a |!.V... /...+....| +peer0.org1.example.com | 00000030 c5 b0 04 af 8e 26 09 e2 d0 22 1d 64 e1 e5 b2 2e |.....&...".d....| +peer0.org1.example.com | 00000040 c7 ab ff 9f f0 11 bc |.......|" +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e4 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e5 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e9 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ea Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4eb Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ec Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ed Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ee Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ef Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4f0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f2 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f4 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f5 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] NewStandardValues -> DEBU 4f8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f9 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fa Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fb Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fc Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] NewStandardValues -> DEBU 4fe Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ff Processing field: ACLs" +orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 500 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] NewStandardValues -> DEBU 501 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 502 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] NewStandardValues -> DEBU 503 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 504 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] Validate -> DEBU 505 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-05-02 09:27:14.293 UTC [common.channelconfig] validateMSP -> DEBU 506 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.294 UTC [msp] newBccspMsp -> DEBU 507 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.294 UTC [msp] New -> DEBU 508 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.294 UTC [msp] Setup -> DEBU 509 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:21.121 UTC [gossip.discovery] handleAliveMessage -> DEBU 403 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 404 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:21.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 405 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 " +peer0.org1.example.com | "2019-05-02 09:27:21.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 406 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 " +peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 407 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 408 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] handleAliveMessage -> DEBU 409 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] sendMemResponse -> DEBU 40b Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.comm] Send -> DEBU 40c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.discovery] sendMemResponse -> DEBU 40d Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.comm] sendToEndpoint -> DEBU 40e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:21.122 UTC [gossip.comm] sendToEndpoint -> DEBU 40f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.119 UTC [gossip.gossip] handleMessage -> DEBU 410 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:21.284 UTC [gossip.channel] reportMembershipChanges -> INFO 411 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-05-02 09:27:22.328 UTC [gossip.election] waitForInterrupt -> DEBU 412 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.329 UTC [gossip.election] beLeader -> INFO 413 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +peer0.org1.example.com | "2019-05-02 09:27:22.329 UTC [gossip.service] func1 -> INFO 414 Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.331 UTC [deliveryClient] StartDeliverForChannel -> DEBU 415 This peer will pass blocks from orderer service to other peers for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.332 UTC [gossip.election] leaderElection -> DEBU 416 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.332 UTC [ConnProducer] NewConnection -> DEBU 417 Creating a new connection" +peer0.org1.example.com | "2019-05-02 09:27:22.334 UTC [grpc] DialContext -> DEBU 418 parsed scheme: """ +peer0.org1.example.com | "2019-05-02 09:27:22.334 UTC [grpc] DialContext -> DEBU 419 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-05-02 09:27:22.335 UTC [grpc] UpdateState -> DEBU 41a ccResolverWrapper: sending update to cc: {[{orderer1.example.com:7050 0 }] }" +peer0.org1.example.com | "2019-05-02 09:27:22.335 UTC [grpc] switchBalancer -> DEBU 41b ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-05-02 09:27:22.335 UTC [grpc] HandleSubConnStateChange -> DEBU 41c pickfirstBalancer: HandleSubConnStateChange: 0xc002eec260, CONNECTING" +peer0.org1.example.com | "2019-05-02 09:27:22.332 UTC [gossip.election] IsLeader -> DEBU 41d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:27:22.338 UTC [msp.identity] Sign -> DEBU 41e Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510021801 " +peer0.org1.example.com | "2019-05-02 09:27:22.339 UTC [msp.identity] Sign -> DEBU 41f Sign: digest: 60FC0EDC70A832CF6DF96F5563D02DBB555FDCF61BF2B6A8AF9231771DFA2140 " +peer0.org1.example.com | "2019-05-02 09:27:22.339 UTC [gossip.election] waitForInterrupt -> DEBU 420 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:22.342 UTC [grpc] HandleSubConnStateChange -> DEBU 421 pickfirstBalancer: HandleSubConnStateChange: 0xc002eec260, READY" +peer0.org1.example.com | "2019-05-02 09:27:22.342 UTC [gossip.comm] Send -> DEBU 422 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:22.343 UTC [gossip.comm] sendToEndpoint -> DEBU 423 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.343 UTC [gossip.comm] sendToEndpoint -> DEBU 425 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.343 UTC [ConnProducer] NewConnection -> DEBU 424 Connected to orderer1.example.com:7050" +peer0.org1.example.com | "2019-05-02 09:27:22.343 UTC [deliveryClient] connect -> DEBU 426 Connected to orderer1.example.com:7050" +peer0.org1.example.com | "2019-05-02 09:27:22.344 UTC [deliveryClient] connect -> DEBU 427 Establishing gRPC stream with orderer1.example.com:7050 ..." +peer0.org1.example.com | "2019-05-02 09:27:22.344 UTC [deliveryClient] afterConnect -> DEBU 428 Entering" +peer0.org1.example.com | "2019-05-02 09:27:22.344 UTC [deliveryClient] RequestBlocks -> DEBU 429 Starting deliver with block [1] for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.344 UTC [msp.identity] Sign -> DEBU 42a Sign: plaintext: 0A91070A3D08051A0608FAEFAAE60522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " +peer0.org1.example.com | "2019-05-02 09:27:22.344 UTC [msp.identity] Sign -> DEBU 42b Sign: digest: E5C7564D501A5B1C04CAF6AD5E5AE6F2DAB2D795A5C6261A95AD6BDB3D38E8AB " +peer0.org1.example.com | "2019-05-02 09:27:22.345 UTC [deliveryClient] afterConnect -> DEBU 42c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.350 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 42d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.351 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 42e Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.351 UTC [policies] Evaluate -> DEBU 42f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +orderer0.example.com | "2019-05-02 09:27:14.294 UTC [msp.identity] newIdentity -> DEBU 50a Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -6049,7 +5272,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.968 UTC [msp.identity] newIdentity -> DEBU 5aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.295 UTC [msp.identity] newIdentity -> DEBU 50b Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -6063,24 +5286,530 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.969 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5ab Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.974 UTC [msp] Validate -> DEBU 5ac MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.975 UTC [msp] getCertificationChain -> DEBU 5ad MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.975 UTC [msp] hasOURole -> DEBU 5ae MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:38.975 UTC [msp] getCertificationChain -> DEBU 5af MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.976 UTC [common.channelconfig] NewStandardValues -> DEBU 5b0 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:38.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b1 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:38.976 UTC [common.channelconfig] NewStandardValues -> DEBU 5b2 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:38.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b3 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:38.976 UTC [common.channelconfig] Validate -> DEBU 5b4 Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-05-02 01:30:38.976 UTC [common.channelconfig] validateMSP -> DEBU 5b5 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.976 UTC [msp] newBccspMsp -> DEBU 5b6 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.976 UTC [msp] New -> DEBU 5b7 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:38.977 UTC [msp] Setup -> DEBU 5b8 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.982 UTC [orderer.common.server] Deliver -> DEBU 5b9 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:38.982 UTC [common.deliver] Handle -> DEBU 5ba Starting new deliver loop for 192.168.240.9:47270" -orderer0.example.com | "2019-05-02 01:30:38.982 UTC [common.deliver] Handle -> DEBU 5bb Attempting to read seek info message from 192.168.240.9:47270" -orderer0.example.com | "2019-05-02 01:30:38.983 UTC [msp.identity] newIdentity -> DEBU 5bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.296 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 50c Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.296 UTC [msp] Validate -> DEBU 50d MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.296 UTC [msp] getCertificationChain -> DEBU 50e MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.296 UTC [msp] hasOURole -> DEBU 50f MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:14.296 UTC [msp] getCertificationChain -> DEBU 510 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] NewStandardValues -> DEBU 511 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 512 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] NewStandardValues -> DEBU 513 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 514 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] Validate -> DEBU 515 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-05-02 09:27:14.297 UTC [common.channelconfig] validateMSP -> DEBU 516 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.297 UTC [msp] newBccspMsp -> DEBU 517 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.297 UTC [msp] New -> DEBU 518 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.297 UTC [msp] Setup -> DEBU 519 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.298 UTC [msp.identity] newIdentity -> DEBU 51a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | "2019-05-02 09:27:22.352 UTC [policies] Evaluate -> DEBU 430 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.352 UTC [policies] Evaluate -> DEBU 431 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.352 UTC [msp] DeserializeIdentity -> DEBU 432 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.353 UTC [msp.identity] newIdentity -> DEBU 433 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO +peer0.org1.example.com | CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM +peer0.org1.example.com | SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q +peer0.org1.example.com | 1A== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.353 UTC [cauthdsl] func1 -> DEBU 434 0xc002f26f50 gate 1556789242353952600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.354 UTC [cauthdsl] func2 -> DEBU 435 0xc002f26f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.354 UTC [cauthdsl] func2 -> DEBU 436 0xc002f26f50 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.354 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 437 Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-05-02 09:27:22.355 UTC [msp] Validate -> DEBU 438 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.355 UTC [cauthdsl] func2 -> DEBU 439 0xc002f26f50 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.356 UTC [msp.identity] Verify -> DEBU 43a Verify: digest = 00000000 56 2e 33 96 85 a9 52 2d c2 1a a7 20 42 3a b0 10 |V.3...R-... B:..| +peer0.org1.example.com | 00000010 ec d7 75 f9 75 94 ee 5d 14 d1 ee bc 56 2b fa 37 |..u.u..]....V+.7|" +peer0.org1.example.com | "2019-05-02 09:27:22.357 UTC [msp.identity] Verify -> DEBU 43b Verify: sig = 00000000 30 44 02 20 3d f7 5b a0 eb 92 62 41 d4 01 2b e4 |0D. =.[...bA..+.| +peer0.org1.example.com | 00000010 90 4e 76 27 54 d2 a8 28 18 32 87 13 a7 84 83 58 |.Nv'T..(.2.....X| +peer0.org1.example.com | 00000020 53 34 90 f8 02 20 2c a7 c8 04 84 af 33 47 ac c9 |S4... ,.....3G..| +peer0.org1.example.com | 00000030 32 af 26 5b a6 ea c1 f4 12 7a 24 21 9e dc 4b aa |2.&[.....z$!..K.| +peer0.org1.example.com | 00000040 c7 a8 6a d4 17 c4 |..j...|" +peer0.org1.example.com | "2019-05-02 09:27:22.357 UTC [cauthdsl] func2 -> DEBU 43c 0xc002f26f50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.358 UTC [cauthdsl] func1 -> DEBU 43d 0xc002f26f50 gate 1556789242353952600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.358 UTC [policies] Evaluate -> DEBU 43e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.358 UTC [policies] Evaluate -> DEBU 43f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.359 UTC [policies] Evaluate -> DEBU 440 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:22.359 UTC [policies] Evaluate -> DEBU 441 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:22.359 UTC [blocksProvider] DeliverBlocks -> DEBU 442 [businesschannel] Adding payload to local buffer, blockNum = [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.359 UTC [gossip.state] addPayload -> DEBU 443 [businesschannel] Adding payload to local buffer, blockNum = [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.360 UTC [gossip.state] addPayload -> DEBU 444 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-05-02 09:27:22.360 UTC [gossip.state] deliverPayloads -> DEBU 445 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.360 UTC [gossip.state] deliverPayloads -> DEBU 447 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [gossip.privdata] StoreBlock -> INFO 448 [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [gossip.privdata] StoreBlock -> DEBU 449 [businesschannel] Validating block [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [committer.txvalidator] Validate -> DEBU 44a [businesschannel] START Block Validation for block [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [committer.txvalidator] Validate -> DEBU 44b expecting 1 block validation responses" +peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [committer.txvalidator] validateTx -> DEBU 44c [businesschannel] validateTx starts for block 0xc002e28c00 env 0xc002ef2af0 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [protoutils] ValidateTransaction -> DEBU 44d ValidateTransactionEnvelope starts for envelope 0xc002ef2af0" +peer0.org1.example.com | "2019-05-02 09:27:22.361 UTC [protoutils] ValidateTransaction -> DEBU 44e Header is channel_header:"\010\001\032\006\010\367\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\353\031M\307+7i\210 \336\250\362\037\274\227\000\362\323Sb\230>\236\200" " +peer0.org1.example.com | "2019-05-02 09:27:22.362 UTC [protoutils] validateChannelHeader -> DEBU 44f validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-05-02 09:27:22.362 UTC [protoutils] checkSignatureFromCreator -> DEBU 450 begin" +peer0.org1.example.com | "2019-05-02 09:27:22.360 UTC [blocksProvider] DeliverBlocks -> DEBU 446 [businesschannel] Gossiping block [1], peers number [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.363 UTC [msp] GetManagerForChain -> DEBU 451 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:22.363 UTC [msp] DeserializeIdentity -> DEBU 453 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.363 UTC [msp.identity] newIdentity -> DEBU 454 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:14.298 UTC [msp.identity] newIdentity -> DEBU 51b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:14.299 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 51c Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.299 UTC [msp] Validate -> DEBU 51d MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.300 UTC [msp] getCertificationChain -> DEBU 51e MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.300 UTC [msp] hasOURole -> DEBU 51f MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:14.300 UTC [msp] getCertificationChain -> DEBU 520 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] NewStandardValues -> DEBU 521 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 522 Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 523 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 524 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 525 Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 526 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 527 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.302 UTC [common.channelconfig] NewStandardValues -> DEBU 528 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.302 UTC [common.channelconfig] initializeProtosStruct -> DEBU 529 Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:14.302 UTC [common.channelconfig] NewStandardValues -> DEBU 52a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.302 UTC [common.channelconfig] initializeProtosStruct -> DEBU 52b Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.302 UTC [common.channelconfig] validateMSP -> DEBU 52c Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.302 UTC [msp] newBccspMsp -> DEBU 52d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.303 UTC [msp] New -> DEBU 52e Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.303 UTC [msp] Setup -> DEBU 52f Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:14.303 UTC [msp.identity] newIdentity -> DEBU 530 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:14.304 UTC [msp.identity] newIdentity -> DEBU 531 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:14.304 UTC [msp] Validate -> DEBU 532 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [msp] Setup -> DEBU 533 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [msp] Setup -> DEBU 534 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 535 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 536 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 537 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 538 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 539 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53a Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53b Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53c Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53d Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53e Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 53f Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 540 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 541 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 542 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 543 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 544 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 545 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 546 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 547 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 548 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [policies] NewManagerImpl -> DEBU 549 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [policies] NewManagerImpl -> DEBU 54a Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [policies] NewManagerImpl -> DEBU 54b Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55f Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 560 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 561 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 562 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 563 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.363 UTC [protoutils] checkSignatureFromCreator -> DEBU 455 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-05-02 09:27:22.364 UTC [msp] Validate -> DEBU 456 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.364 UTC [protoutils] checkSignatureFromCreator -> DEBU 457 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:22.364 UTC [msp.identity] Verify -> DEBU 458 Verify: digest = 00000000 5e b9 01 7e 36 42 6b 31 24 71 39 4d e5 b1 6c ca |^..~6Bk1$q9M..l.| +peer0.org1.example.com | 00000010 ce 27 7c 4e 33 ef a0 be 53 be 4c 1e f1 cb 95 1d |.'|N3...S.L.....|" +peer0.org1.example.com | "2019-05-02 09:27:22.364 UTC [msp.identity] Verify -> DEBU 459 Verify: sig = 00000000 30 45 02 21 00 be 47 8b ce db 26 57 b4 11 11 08 |0E.!..G...&W....| +peer0.org1.example.com | 00000010 f9 be 3d 46 9f b5 2d f9 46 64 13 a9 79 52 08 4c |..=F..-.Fd..yR.L| +peer0.org1.example.com | 00000020 e0 55 30 75 29 02 20 3f 14 58 43 89 87 f7 bf 90 |.U0u). ?.XC.....| +peer0.org1.example.com | 00000030 9e 87 74 e9 8f 2a 1f a5 38 cf 98 0d a9 03 70 d8 |..t..*..8.....p.| +peer0.org1.example.com | 00000040 1a 33 13 1f 94 5f 84 |.3..._.|" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [protoutils] checkSignatureFromCreator -> DEBU 45a exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:22.363 UTC [gossip.channel] AddToMsgStore -> DEBU 452 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [gossip.pull] Add -> DEBU 45b Added 1, total items: 1" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [protoutils] validateConfigTransaction -> DEBU 45c validateConfigTransaction starts for data 0xc002f98000, header channel_header:"\010\001\032\006\010\367\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030\353\031M\307+7i\210 \336\250\362\037\274\227\000\362\323Sb\230>\236\200" " +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [committer.txvalidator] validateTx -> DEBU 45d Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 45e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 45f Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 460 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 461 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 462 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [policies] Evaluate -> DEBU 463 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 464 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.365 UTC [policies] Evaluate -> DEBU 465 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 466 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 467 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 468 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 469 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func1 -> DEBU 46a 0xc002f84fb0 gate 1556789242366080600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 46b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 46c 0xc002f84fb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 46d Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 46e 0xc002f84fb0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 46f Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 470 0xc002f84fb0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 471 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [msp.identity] Verify -> DEBU 472 Verify: digest = 00000000 24 2f 50 1d 36 ee 86 46 81 38 f5 a7 f3 b1 12 09 |$/P.6..F.8......| +peer0.org1.example.com | 00000010 e6 b4 df ef e6 de ed 34 9a 91 5c e0 f0 75 a8 4b |.......4..\..u.K|" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 473 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [msp.identity] Verify -> DEBU 474 Verify: sig = 00000000 30 45 02 21 00 86 af 4e 12 bd d7 84 85 43 85 8a |0E.!...N.....C..| +peer0.org1.example.com | 00000010 c4 f3 fb 2b 06 92 44 1f 82 96 dd 9a 9e f0 cf d9 |...+..D.........| +peer0.org1.example.com | 00000020 19 33 c0 99 ef 02 20 26 fd 78 05 2e 72 8f 1b d7 |.3.... &.x..r...| +peer0.org1.example.com | 00000030 30 ee bf b3 95 48 b9 16 15 ba cd d3 ec aa 24 2d |0....H........$-| +peer0.org1.example.com | 00000040 1f 08 b8 c8 d1 f5 7f |.......|" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 476 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 477 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 478 0xc002f84fb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 479 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [cauthdsl] func1 -> DEBU 47a 0xc002f84fb0 gate 1556789242366080600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 47b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 47c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 564 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 565 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 566 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 567 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 568 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 569 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56a Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56b Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56c Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56d Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 572 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 573 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 574 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 575 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 576 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 577 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:14.311 UTC [common.capabilities] Supported -> DEBU 578 Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:14.311 UTC [common.capabilities] Supported -> DEBU 579 Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:14.312 UTC [orderer.common.cluster] NewStream -> DEBU 57a Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +orderer0.example.com | "2019-05-02 09:27:14.312 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 57b Sending msg of 24744 bytes to 3 on channel testchainid took 863.7µs" +orderer0.example.com | "2019-05-02 09:27:14.312 UTC [orderer.common.cluster.step] sendMessage -> DEBU 57c Send of SubmitRequest for channel testchainid with payload of size 24744 to orderer2.example.com(orderer2.example.com:7050) took 160.9µs " +orderer0.example.com | "2019-05-02 09:27:14.314 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 57d [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57140" +orderer0.example.com | "2019-05-02 09:27:14.317 UTC [orderer.common.broadcast] Handle -> DEBU 57e Received EOF from 172.18.0.8:57140, hangup" +orderer0.example.com | "2019-05-02 09:27:14.317 UTC [orderer.common.server] func1 -> DEBU 57f Closing Broadcast stream" +orderer0.example.com | "2019-05-02 09:27:14.317 UTC [comm.grpc.server] 1 -> INFO 580 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57140 grpc.code=OK grpc.call_duration=164.0761ms +orderer0.example.com | "2019-05-02 09:27:14.318 UTC [common.deliver] deliverBlocks -> DEBU 581 Rejecting deliver for 172.18.0.8:57138 because channel businesschannel not found" +orderer0.example.com | "2019-05-02 09:27:14.318 UTC [orderer.common.server] func1 -> DEBU 582 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:14.318 UTC [comm.grpc.server] 1 -> INFO 583 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57138 grpc.code=OK grpc.call_duration=193.6519ms +orderer0.example.com | "2019-05-02 09:27:14.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 584 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 24953" +orderer0.example.com | "2019-05-02 09:27:14.344 UTC [orderer.common.cluster.step] handleMessage -> DEBU 585 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:14.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 586 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +orderer0.example.com | "2019-05-02 09:27:14.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 587 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.1µs " +orderer0.example.com | "2019-05-02 09:27:14.351 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 588 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +orderer0.example.com | "2019-05-02 09:27:14.352 UTC [orderer.common.cluster.step] sendMessage -> DEBU 589 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.5µs " +orderer0.example.com | "2019-05-02 09:27:14.352 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 58a Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +orderer0.example.com | "2019-05-02 09:27:14.353 UTC [common.channelconfig] NewStandardValues -> DEBU 58b Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:14.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58c Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:14.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58d Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:14.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58e Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:14.355 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58f Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:14.356 UTC [common.channelconfig] initializeProtosStruct -> DEBU 590 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.356 UTC [common.channelconfig] NewStandardValues -> DEBU 591 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:14.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 592 Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:14.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 593 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:14.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 594 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:14.358 UTC [common.channelconfig] initializeProtosStruct -> DEBU 596 Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:14.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 597 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:14.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 598 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.360 UTC [common.channelconfig] NewStandardValues -> DEBU 599 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.358 UTC [orderer.common.server] Deliver -> DEBU 595 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:14.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 59a Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:14.362 UTC [common.channelconfig] NewStandardValues -> DEBU 59b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.361 UTC [common.deliver] Handle -> DEBU 59c Starting new deliver loop for 172.18.0.8:57142" +orderer0.example.com | "2019-05-02 09:27:14.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 59d Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.363 UTC [common.channelconfig] validateMSP -> DEBU 59e Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.364 UTC [msp] newBccspMsp -> DEBU 5a0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.364 UTC [msp] New -> DEBU 5a1 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.362 UTC [common.deliver] Handle -> DEBU 59f Attempting to read seek info message from 172.18.0.8:57142" +orderer0.example.com | "2019-05-02 09:27:14.365 UTC [msp] Setup -> DEBU 5a2 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:14.366 UTC [msp.identity] newIdentity -> DEBU 5a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 47d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] verifyDeltaSet -> DEBU 47e Processing change to key: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 47f Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [common.configtx] policyForItem -> DEBU 480 Getting policy for item Org1MSP with mod_policy Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 481 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 482 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 483 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [blocksProvider] DeliverBlocks -> DEBU 484 [businesschannel] Adding payload to local buffer, blockNum = [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 485 Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [gossip.state] addPayload -> DEBU 486 [businesschannel] Adding payload to local buffer, blockNum = [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 487 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 488 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [gossip.state] addPayload -> DEBU 489 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48a Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [blocksProvider] DeliverBlocks -> DEBU 48b [businesschannel] Gossiping block [2], peers number [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48c Manager Channel/Application looking up path [Org1MSP]" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48d Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48e Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48f Manager Channel/Application/Org1MSP looking up path []" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [gossip.channel] AddToMsgStore -> DEBU 490 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 491 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | "2019-05-02 09:27:22.366 UTC [gossip.pull] Add -> DEBU 492 Added 2, total items: 2" +peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func1 -> DEBU 493 0xc003007140 gate 1556789242367018200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 494 0xc003007140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 495 0xc003007140 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 496 Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 497 0xc003007140 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [msp.identity] Verify -> DEBU 498 Verify: digest = 00000000 1e 4a 2b e5 03 f9 6c c3 23 48 0d a8 83 20 ef f2 |.J+...l.#H... ..| +peer0.org1.example.com | 00000010 7a e8 18 fd 74 24 f2 e6 41 72 f3 5d d7 16 16 71 |z...t$..Ar.]...q|" +peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [msp.identity] Verify -> DEBU 499 Verify: sig = 00000000 30 44 02 20 7c b2 f7 03 cd 4f 8e cd 30 a1 37 b6 |0D. |....O..0.7.| +peer0.org1.example.com | 00000010 7e b2 75 32 5d 38 f1 78 91 c4 b9 3a c8 50 d7 24 |~.u2]8.x...:.P.$| +peer0.org1.example.com | 00000020 86 46 58 89 02 20 01 29 a4 4f 1b da f4 cd 41 1a |.FX.. .).O....A.| +peer0.org1.example.com | 00000030 ea 42 9b bf da 05 a0 92 ff 30 14 2e a4 22 c8 09 |.B.......0..."..| +peer0.org1.example.com | 00000040 d0 64 c5 30 31 53 |.d.01S|" +peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 49a 0xc003007140 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [cauthdsl] func1 -> DEBU 49b 0xc003007140 gate 1556789242367018200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.367 UTC [policies] Evaluate -> DEBU 49c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.368 UTC [policies] Evaluate -> DEBU 49d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.368 UTC [common.configtx] verifyDeltaSet -> DEBU 49e Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 49f Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 4a0 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 4a1 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 4a2 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a3 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a4 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a5 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a6 Setting policy for key Readers to " +peer0.org1.example.com | "2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a7 Setting policy for key Writers to " +peer0.org1.example.com | "2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4a8 Setting policy for key Admins to " +peer0.org1.example.com | "2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4a9 Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4aa Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4ab Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4ac Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.372 UTC [common.configtx] recurseConfigMap -> DEBU 4ad Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [gossip.comm] Send -> DEBU 4ae Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4af Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [gossip.comm] Send -> DEBU 4b0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b2 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [gossip.comm] sendToEndpoint -> DEBU 4b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [gossip.comm] sendToEndpoint -> DEBU 4b4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b5 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b6 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.374 UTC [gossip.comm] sendToEndpoint -> DEBU 4b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.374 UTC [gossip.comm] sendToEndpoint -> DEBU 4b8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b9 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.377 UTC [common.configtx] recurseConfigMap -> DEBU 4ba Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.377 UTC [common.configtx] recurseConfigMap -> DEBU 4bb Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.378 UTC [common.channelconfig] NewStandardValues -> DEBU 4bc Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.378 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bd Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-05-02 09:27:22.379 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4be Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-05-02 09:27:22.379 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bf Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-05-02 09:27:22.379 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c0 Processing field: Consortium" +peer0.org1.example.com | "2019-05-02 09:27:22.380 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c1 Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.380 UTC [common.channelconfig] NewStandardValues -> DEBU 4c2 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.380 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c3 Processing field: ACLs" +peer0.org1.example.com | "2019-05-02 09:27:22.381 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c4 Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.382 UTC [common.channelconfig] NewStandardValues -> DEBU 4c5 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.383 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.384 UTC [common.channelconfig] NewStandardValues -> DEBU 4c7 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.384 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c8 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.385 UTC [common.channelconfig] Validate -> DEBU 4c9 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-05-02 09:27:22.385 UTC [common.channelconfig] validateMSP -> DEBU 4ca Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.386 UTC [msp] newBccspMsp -> DEBU 4cb Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.386 UTC [msp] New -> DEBU 4cc Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.387 UTC [msp] Setup -> DEBU 4cd Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.387 UTC [msp.identity] newIdentity -> DEBU 4ce Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.389 UTC [msp.identity] newIdentity -> DEBU 4cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:14.367 UTC [msp.identity] newIdentity -> DEBU 5a4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:14.368 UTC [msp] Validate -> DEBU 5a5 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.369 UTC [common.channelconfig] NewStandardValues -> DEBU 5a6 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-05-02 09:27:14.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a7 Processing field: ACLs" +orderer0.example.com | "2019-05-02 09:27:14.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a8 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.370 UTC [common.channelconfig] NewStandardValues -> DEBU 5a9 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:14.370 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5aa Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:14.374 UTC [common.channelconfig] NewStandardValues -> DEBU 5ab Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ac Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.377 UTC [common.channelconfig] Validate -> DEBU 5ad Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-05-02 09:27:14.378 UTC [common.channelconfig] validateMSP -> DEBU 5ae Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.380 UTC [msp] newBccspMsp -> DEBU 5af Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.380 UTC [msp] New -> DEBU 5b0 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.380 UTC [msp] Setup -> DEBU 5b1 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.381 UTC [msp.identity] newIdentity -> DEBU 5b2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:14.384 UTC [msp.identity] newIdentity -> DEBU 5b3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:14.385 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5b4 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.386 UTC [msp] Validate -> DEBU 5b5 MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.386 UTC [msp] getCertificationChain -> DEBU 5b6 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.387 UTC [msp] hasOURole -> DEBU 5b7 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:14.387 UTC [msp] getCertificationChain -> DEBU 5b8 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.387 UTC [common.channelconfig] NewStandardValues -> DEBU 5b9 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.391 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4d0 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.391 UTC [msp] Validate -> DEBU 4d1 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.391 UTC [msp] getCertificationChain -> DEBU 4d2 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.392 UTC [msp] hasOURole -> DEBU 4d3 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:14.387 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ba Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:14.387 UTC [common.channelconfig] NewStandardValues -> DEBU 5bb Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:14.388 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bc Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:14.388 UTC [common.channelconfig] Validate -> DEBU 5bd Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-05-02 09:27:14.388 UTC [common.channelconfig] validateMSP -> DEBU 5be Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.388 UTC [msp] newBccspMsp -> DEBU 5bf Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.388 UTC [msp] New -> DEBU 5c0 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:14.388 UTC [msp] Setup -> DEBU 5c1 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.388 UTC [msp.identity] newIdentity -> DEBU 5c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -6095,7 +5824,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.983 UTC [msp.identity] newIdentity -> DEBU 5bd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.388 UTC [msp.identity] newIdentity -> DEBU 5c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -6109,239 +5838,269 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:38.986 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5be Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.986 UTC [msp] Validate -> DEBU 5bf MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:38.986 UTC [msp] getCertificationChain -> DEBU 5c0 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.986 UTC [msp] hasOURole -> DEBU 5c1 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:38.986 UTC [msp] getCertificationChain -> DEBU 5c2 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:38.986 UTC [msp] Setup -> DEBU 5c3 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:38.986 UTC [msp] Setup -> DEBU 5c4 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5c5 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5c6 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5c7 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5c8 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5c9 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5ca Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5cb Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5cc Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5cd Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5ce Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5cf Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5d0 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.988 UTC [policies] NewManagerImpl -> DEBU 5d1 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.988 UTC [policies] NewManagerImpl -> DEBU 5d2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.988 UTC [policies] NewManagerImpl -> DEBU 5d3 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.989 UTC [policies] NewManagerImpl -> DEBU 5d4 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.989 UTC [policies] NewManagerImpl -> DEBU 5d5 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.989 UTC [policies] NewManagerImpl -> DEBU 5d6 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.989 UTC [policies] NewManagerImpl -> DEBU 5d7 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.989 UTC [policies] NewManagerImpl -> DEBU 5d8 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [policies] NewManagerImpl -> DEBU 5d9 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [policies] NewManagerImpl -> DEBU 5da Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [policies] NewManagerImpl -> DEBU 5db Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5dc Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5dd Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5de Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5df Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5e0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5e1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5e2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5e3 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:38.996 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:38.996 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:38.996 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:38.998 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:38.998 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5ea Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5eb Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5ec Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5ed Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:30:39.000 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:30:39.000 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:39.000 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 5ff Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 600 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:39.003 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:39.003 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:39.003 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:39.003 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:39.004 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:39.004 UTC [common.channelconfig] LogSanityChecks -> DEBU 608 As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-05-02 01:30:39.005 UTC [common.channelconfig] LogSanityChecks -> DEBU 609 As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-05-02 01:30:39.005 UTC [policies] Manager -> DEBU 60a Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:39.005 UTC [policies] Manager -> DEBU 60b Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:30:47.100 UTC [peer] processChannelConfigTx -> DEBU 5a5 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -peer0.org1.example.com | "2019-05-02 01:30:47.100 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5a6 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:30:47.101 UTC [lockbasedtxmgr] Done -> DEBU 5a7 Done with transaction simulation / query execution []" -peer0.org1.example.com | "2019-05-02 01:30:47.101 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 5a8 Block [1] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.101 UTC [valinternal] ApplyWriteSet -> DEBU 5a9 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003232240)}" -peer0.org1.example.com | "2019-05-02 01:30:47.102 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5aa validating rwset..." -peer0.org1.example.com | "2019-05-02 01:30:47.102 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5ab postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:30:47.102 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5ac ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-05-02 01:30:47.103 UTC [kvledger] CommitWithPvtData -> DEBU 5ad [businesschannel] Committing block [1] to storage" -peer0.org1.example.com | "2019-05-02 01:30:47.103 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5ae Writing block [1] to pvt block store" -peer0.org1.example.com | "2019-05-02 01:30:47.107 UTC [pvtdatastorage] Prepare -> DEBU 5af Saved 0 private data write sets for block [1]" -peer0.org1.example.com | "2019-05-02 01:30:47.111 UTC [fsblkstorage] indexBlock -> DEBU 5b0 Indexing block [blockNum=1, blockHash=[]byte{0xff, 0x3a, 0xf4, 0xf2, 0x7d, 0x57, 0xed, 0xa3, 0xbb, 0xd3, 0xc3, 0x89, 0xf0, 0x76, 0xc5, 0xde, 0x51, 0x48, 0x5f, 0xa5, 0xe0, 0xf9, 0x5f, 0xe5, 0xee, 0x96, 0x4e, 0xe6, 0xcd, 0x8c, 0x8d, 0x72} txOffsets= -peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=22678 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-05-02 01:30:47.112 UTC [fsblkstorage] indexBlock -> DEBU 5b1 txid [] is a duplicate of a previous tx. Not indexing in txid-index" -peer0.org1.example.com | "2019-05-02 01:30:47.112 UTC [fsblkstorage] indexBlock -> DEBU 5b2 Adding txLoc [fileSuffixNum=0, offset=24012, bytesLength=22678] for tx number:[0] ID: [] to blockNumTranNum index" -peer0.org1.example.com | "2019-05-02 01:30:47.115 UTC [fsblkstorage] updateCheckpoint -> DEBU 5b3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47628], isChainEmpty=[false], lastBlockNumber=[1]" -peer0.org1.example.com | "2019-05-02 01:30:47.115 UTC [pvtdatastorage] Commit -> DEBU 5b4 Committing private data for block [1]" -peer0.org1.example.com | "2019-05-02 01:30:47.119 UTC [pvtdatastorage] Commit -> DEBU 5b5 Committed private data for block [1]" -peer0.org1.example.com | "2019-05-02 01:30:47.119 UTC [kvledger] CommitWithPvtData -> DEBU 5b6 [businesschannel] Committing block [1] transactions to state database" -peer0.org1.example.com | "2019-05-02 01:30:47.120 UTC [lockbasedtxmgr] Commit -> DEBU 5b7 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:47.120 UTC [lockbasedtxmgr] Commit -> DEBU 5b8 Committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:47.120 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5b9 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-05-02 01:30:47.120 UTC [lockbasedtxmgr] Commit -> DEBU 5ba Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:47.121 UTC [stateleveldb] ApplyUpdates -> DEBU 5bb Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -peer0.org1.example.com | "2019-05-02 01:30:47.125 UTC [lockbasedtxmgr] Commit -> DEBU 5bc Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-05-02 01:30:47.126 UTC [lockbasedtxmgr] func1 -> DEBU 5bd launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-05-02 01:30:47.126 UTC [kvledger] CommitWithPvtData -> DEBU 5bf [businesschannel] Committing block [1] transactions to history database" -peer0.org1.example.com | "2019-05-02 01:30:47.126 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5be Preparing potential purge list working-set for expiringAtBlk [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.126 UTC [historyleveldb] Commit -> DEBU 5c0 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" -peer0.org1.example.com | "2019-05-02 01:30:47.127 UTC [historyleveldb] Commit -> DEBU 5c2 Skipping transaction [0] since it is not an endorsement transaction" -peer0.org1.example.com | "2019-05-02 01:30:47.126 UTC [leveldbhelper] GetIterator -> DEBU 5c1 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:30:47.127 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5c3 No expiry entry found for expiringAtBlk [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.130 UTC [historyleveldb] Commit -> DEBU 5c4 Channel [businesschannel]: Updates committed to history database for blockNo [1]" -peer0.org1.example.com | "2019-05-02 01:30:47.130 UTC [kvledger] CommitWithPvtData -> INFO 5c5 [businesschannel] Committed block [1] with 1 transaction(s) in 33ms (state_validation=5ms block_commit=16ms state_commit=6ms)" -peer0.org1.example.com | "2019-05-02 01:30:47.131 UTC [msp.identity] Sign -> DEBU 5c6 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020802 " -peer0.org1.example.com | "2019-05-02 01:30:47.131 UTC [msp.identity] Sign -> DEBU 5c7 Sign: digest: 3E6306466F7189ED67DF73929522511CEF79C91E89AFF29EBF683A97BC28E3B9 " -peer0.org1.example.com | "2019-05-02 01:30:47.131 UTC [gossip.state] commitBlock -> DEBU 5c8 [businesschannel] Committed block [1] with 1 transaction(s)" -peer0.org1.example.com | "2019-05-02 01:30:47.471 UTC [comm.grpc.server] 1 -> INFO 5c9 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.469Z grpc.peer_address=192.168.240.5:55178 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=230.9µs -peer0.org1.example.com | "2019-05-02 01:30:47.474 UTC [msp.identity] Sign -> DEBU 5ca Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.475 UTC [msp.identity] Sign -> DEBU 5cb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.475 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5cc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.5:55178" -peer0.org1.example.com | "2019-05-02 01:30:47.476 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5cd Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:55178" -orderer0.example.com | "2019-05-02 01:30:39.005 UTC [policies] Manager -> DEBU 60c Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:39.005 UTC [policies] Manager -> DEBU 60d Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:39.006 UTC [policies] Manager -> DEBU 60e Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:39.006 UTC [policies] Manager -> DEBU 60f Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:39.006 UTC [common.channelconfig] LogSanityChecks -> DEBU 610 As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-05-02 01:30:39.007 UTC [common.channelconfig] LogSanityChecks -> DEBU 611 As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-05-02 01:30:39.007 UTC [common.channelconfig] LogSanityChecks -> DEBU 612 As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [policies] Manager -> DEBU 613 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [policies] Manager -> DEBU 614 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [policies] Manager -> DEBU 615 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [policies] Manager -> DEBU 616 Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [policies] Manager -> DEBU 617 Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [common.channelconfig] LogSanityChecks -> DEBU 618 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [common.capabilities] Supported -> DEBU 619 Orderer capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [common.capabilities] Supported -> DEBU 61a Channel capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [fsblkstorage] newBlockfileMgr -> DEBU 61b newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [kvledger.util] CreateDirIfMissing -> DEBU 61c CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" -orderer0.example.com | "2019-05-02 01:30:39.008 UTC [kvledger.util] logDirStatus -> DEBU 61d Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" -orderer0.example.com | "2019-05-02 01:30:39.009 UTC [kvledger.util] logDirStatus -> DEBU 61e After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" -orderer0.example.com | "2019-05-02 01:30:39.009 UTC [fsblkstorage] newBlockfileMgr -> INFO 61f Getting block information from block storage" -orderer0.example.com | "2019-05-02 01:30:39.009 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 620 Retrieving checkpoint info from block files" -orderer0.example.com | "2019-05-02 01:30:39.009 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 621 retrieveLastFileSuffix()" -orderer0.example.com | "2019-05-02 01:30:39.010 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 622 retrieveLastFileSuffix() - biggestFileNum = -1" -orderer0.example.com | "2019-05-02 01:30:39.010 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 623 Last file number found = -1" -orderer0.example.com | "2019-05-02 01:30:39.010 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 624 No block file found" -orderer0.example.com | "2019-05-02 01:30:39.010 UTC [fsblkstorage] newBlockfileMgr -> DEBU 625 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000c4f440)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -orderer0.example.com | "2019-05-02 01:30:39.018 UTC [fsblkstorage] newBlockIndex -> DEBU 626 newBlockIndex() - indexItems:[[BlockNum]]" -orderer0.example.com | "2019-05-02 01:30:39.018 UTC [orderer.common.server] func1 -> DEBU 627 Executing callback to update root CAs" -orderer0.example.com | "2019-05-02 01:30:39.018 UTC [orderer.common.server] updateTrustedRoots -> DEBU 628 updating root CAs for channel [businesschannel]" -orderer0.example.com | "2019-05-02 01:30:39.018 UTC [orderer.common.server] updateTrustedRoots -> DEBU 629 adding orderer root CAs for MSP [OrdererMSP]" -orderer0.example.com | "2019-05-02 01:30:39.018 UTC [orderer.common.server] updateTrustedRoots -> DEBU 62a adding app root CAs for MSP [Org1MSP]" -orderer0.example.com | "2019-05-02 01:30:39.018 UTC [orderer.common.server] updateTrustedRoots -> DEBU 62b adding app root CAs for MSP [Org2MSP]" -orderer0.example.com | "2019-05-02 01:30:39.027 UTC [fsblkstorage] indexBlock -> DEBU 62c Indexing block [blockNum=0, blockHash=[]byte{0xad, 0x7c, 0xdc, 0x87, 0x83, 0xa5, 0x2c, 0x74, 0x62, 0x49, 0x6a, 0xb, 0xdd, 0xfc, 0x97, 0xee, 0x22, 0x89, 0x41, 0x3b, 0xf7, 0xba, 0x29, 0xe, 0xd2, 0xf8, 0x28, 0x95, 0x25, 0x2d, 0x23, 0x51} txOffsets= -orderer0.example.com | txId= locPointer=offset=39, bytesLength=23896 +orderer0.example.com | "2019-05-02 09:27:14.389 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5c4 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.389 UTC [msp] Validate -> DEBU 5c5 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:14.389 UTC [msp] getCertificationChain -> DEBU 5c6 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.389 UTC [msp] hasOURole -> DEBU 5c7 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:14.389 UTC [msp] getCertificationChain -> DEBU 5c8 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:14.390 UTC [msp] Setup -> DEBU 5c9 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:14.390 UTC [msp] Setup -> DEBU 5ca MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:14.390 UTC [policies] NewManagerImpl -> DEBU 5cb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.390 UTC [policies] NewManagerImpl -> DEBU 5cc Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.390 UTC [policies] NewManagerImpl -> DEBU 5cd Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5ce Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5cf Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5d0 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5d1 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.394 UTC [policies] NewManagerImpl -> DEBU 5d2 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d3 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d4 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d5 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d6 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5d7 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5d8 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5d9 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5da Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5db Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5dc Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5dd Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5de Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5df Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:14.400 UTC [policies] NewManagerImpl -> DEBU 5e0 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [policies] NewManagerImpl -> DEBU 5e1 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e2 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e3 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.392 UTC [msp] getCertificationChain -> DEBU 4d4 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.393 UTC [common.channelconfig] NewStandardValues -> DEBU 4d5 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.393 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d6 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.393 UTC [common.channelconfig] NewStandardValues -> DEBU 4d7 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.394 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d8 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.394 UTC [common.channelconfig] Validate -> DEBU 4d9 Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-05-02 09:27:22.394 UTC [common.channelconfig] validateMSP -> DEBU 4da Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.395 UTC [msp] newBccspMsp -> DEBU 4db Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.395 UTC [msp] New -> DEBU 4dc Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.407 UTC [msp] Setup -> DEBU 4dd Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.408 UTC [comm.grpc.server] 1 -> INFO 4de unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.408Z grpc.peer_address=172.18.0.6:53216 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=124.6µs +peer0.org1.example.com | "2019-05-02 09:27:22.409 UTC [msp.identity] newIdentity -> DEBU 4df Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.411 UTC [msp.identity] Sign -> DEBU 4e0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:22.412 UTC [msp.identity] Sign -> DEBU 4e1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:22.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4e2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53216" +peer0.org1.example.com | "2019-05-02 09:27:22.414 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4e3 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53216" +peer0.org1.example.com | "2019-05-02 09:27:22.416 UTC [msp.identity] Verify -> DEBU 4e4 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-05-02 09:27:22.417 UTC [msp.identity] Verify -> DEBU 4e5 Verify: sig = 00000000 30 44 02 20 01 3a fc 5f 3d 11 c1 39 9c 3f 62 dc |0D. .:._=..9.?b.| +peer0.org1.example.com | 00000010 34 d7 79 8e ec 78 df 57 4b 3c ab ec 2d 9b 93 b4 |4.y..x.WK<..-...| +peer0.org1.example.com | 00000020 21 fa 7d 9b 02 20 65 c0 70 63 b0 34 15 dc b9 94 |!.}.. e.pc.4....| +peer0.org1.example.com | 00000030 3d fb 65 34 11 09 7e a4 c3 d8 83 cf 58 73 03 d0 |=.e4..~.....Xs..| +peer0.org1.example.com | 00000040 7a e3 37 96 05 04 |z.7...|" +peer0.org1.example.com | "2019-05-02 09:27:22.419 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4e6 Authenticated 172.18.0.6:53216" +peer0.org1.example.com | "2019-05-02 09:27:22.419 UTC [gossip.comm] GossipStream -> DEBU 4e7 Servicing 172.18.0.6:53216" +peer0.org1.example.com | "2019-05-02 09:27:22.420 UTC [gossip.comm] serviceConnection -> DEBU 4e8 Closing reading from stream" +peer0.org1.example.com | "2019-05-02 09:27:22.420 UTC [gossip.comm] func2 -> DEBU 4e9 Client 172.18.0.6:53164 disconnected" +peer0.org1.example.com | "2019-05-02 09:27:22.420 UTC [comm.grpc.server] 1 -> INFO 4ea streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:53164 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=13.2584929s +peer0.org1.example.com | "2019-05-02 09:27:22.421 UTC [gossip.comm] writeToStream -> DEBU 4eb Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:27:22.421 UTC [gossip.comm] serviceConnection -> DEBU 4ec Closing reading from stream" +peer0.org1.example.com | "2019-05-02 09:27:22.421 UTC [gossip.comm] func2 -> DEBU 4ed Client 172.18.0.6:53216 disconnected" +peer0.org1.example.com | "2019-05-02 09:27:22.421 UTC [comm.grpc.server] 1 -> INFO 4ee streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.411Z grpc.peer_address=172.18.0.6:53216 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.9769ms +peer0.org1.example.com | "2019-05-02 09:27:22.421 UTC [msp.identity] newIdentity -> DEBU 4ef Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ea Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5eb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ec Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ed Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:14.402 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:14.402 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:14.411 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.412 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:14.413 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:14.415 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:14.415 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 5ff Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 600 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 608 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 609 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60a Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60d Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:14.430 UTC [common.channelconfig] LogSanityChecks -> DEBU 60e As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-05-02 09:27:14.433 UTC [common.channelconfig] LogSanityChecks -> DEBU 60f As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-05-02 09:27:14.434 UTC [policies] Manager -> DEBU 610 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:14.435 UTC [policies] Manager -> DEBU 611 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:14.435 UTC [policies] Manager -> DEBU 612 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:14.436 UTC [policies] Manager -> DEBU 613 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:14.436 UTC [policies] Manager -> DEBU 614 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:14.437 UTC [policies] Manager -> DEBU 615 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:14.437 UTC [common.channelconfig] LogSanityChecks -> DEBU 616 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-05-02 09:27:14.437 UTC [common.channelconfig] LogSanityChecks -> DEBU 617 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-05-02 09:27:14.438 UTC [common.channelconfig] LogSanityChecks -> DEBU 618 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-05-02 09:27:14.438 UTC [policies] Manager -> DEBU 619 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-05-02 09:27:14.439 UTC [policies] Manager -> DEBU 61a Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:14.441 UTC [policies] Manager -> DEBU 61b Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:14.441 UTC [policies] Manager -> DEBU 61c Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-05-02 09:27:14.442 UTC [policies] Manager -> DEBU 61d Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.442 UTC [common.channelconfig] LogSanityChecks -> DEBU 61e As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-05-02 09:27:14.442 UTC [common.capabilities] Supported -> DEBU 61f Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:14.443 UTC [common.capabilities] Supported -> DEBU 620 Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:14.443 UTC [fsblkstorage] newBlockfileMgr -> DEBU 621 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.422 UTC [gossip.comm] writeToStream -> DEBU 4f0 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:27:22.422 UTC [gossip.comm] readFromStream -> DEBU 4f1 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-05-02 09:27:22.425 UTC [grpc] infof -> DEBU 4f2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:22.426 UTC [grpc] infof -> DEBU 4f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:22.426 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f4 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.426 UTC [msp] Validate -> DEBU 4f5 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] getCertificationChain -> DEBU 4f6 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] hasOURole -> DEBU 4f7 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] getCertificationChain -> DEBU 4f8 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] NewStandardValues -> DEBU 4f9 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fa Processing field: ConsensusType" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fb Processing field: BatchSize" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fc Processing field: BatchTimeout" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fe Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ff Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] NewStandardValues -> DEBU 500 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 501 Processing field: Endpoints" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] NewStandardValues -> DEBU 502 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 503 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [common.channelconfig] validateMSP -> DEBU 504 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] newBccspMsp -> DEBU 505 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] New -> DEBU 506 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.427 UTC [msp] Setup -> DEBU 507 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [msp.identity] newIdentity -> DEBU 508 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [msp.identity] newIdentity -> DEBU 509 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [msp] Validate -> DEBU 50a MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [msp] Setup -> DEBU 50b Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [msp] Setup -> DEBU 50c MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 50d Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 50e Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 50f Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 510 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 511 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 512 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 513 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 514 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 515 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 516 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 517 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 518 Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 519 Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:14.444 UTC [kvledger.util] CreateDirIfMissing -> DEBU 622 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +orderer0.example.com | "2019-05-02 09:27:14.444 UTC [kvledger.util] logDirStatus -> DEBU 623 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +orderer0.example.com | "2019-05-02 09:27:14.445 UTC [kvledger.util] logDirStatus -> DEBU 624 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +orderer0.example.com | "2019-05-02 09:27:14.445 UTC [fsblkstorage] newBlockfileMgr -> INFO 625 Getting block information from block storage" +orderer0.example.com | "2019-05-02 09:27:14.445 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 626 Retrieving checkpoint info from block files" +orderer0.example.com | "2019-05-02 09:27:14.446 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 627 retrieveLastFileSuffix()" +orderer0.example.com | "2019-05-02 09:27:14.446 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 628 retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-05-02 09:27:14.447 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 629 Last file number found = -1" +orderer0.example.com | "2019-05-02 09:27:14.447 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 62a No block file found" +orderer0.example.com | "2019-05-02 09:27:14.447 UTC [fsblkstorage] newBlockfileMgr -> DEBU 62b Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc00040b220)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-05-02 09:27:14.450 UTC [fsblkstorage] newBlockIndex -> DEBU 62c newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-05-02 09:27:14.451 UTC [orderer.common.server] func1 -> DEBU 62d Executing callback to update root CAs" +orderer0.example.com | "2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 62e updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 62f adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 630 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 631 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-05-02 09:27:14.457 UTC [fsblkstorage] indexBlock -> DEBU 632 Indexing block [blockNum=0, blockHash=[]byte{0x26, 0xf2, 0x93, 0x1, 0xed, 0x1c, 0x73, 0x48, 0xfc, 0x20, 0x75, 0x55, 0x5, 0x51, 0x67, 0x25, 0xf3, 0x5a, 0xec, 0x82, 0x34, 0x6d, 0xbc, 0x24, 0xb7, 0xb3, 0xb4, 0x5c, 0xd0, 0xdf, 0x9, 0xb3} txOffsets= +orderer0.example.com | txId= locPointer=offset=39, bytesLength=23894 orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:30:39.031 UTC [fsblkstorage] updateCheckpoint -> DEBU 62d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23940], isChainEmpty=[false], lastBlockNumber=[0]" -orderer0.example.com | "2019-05-02 01:30:39.031 UTC [fsblkstorage] Next -> DEBU 62e Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-05-02 01:30:39.031 UTC [fsblkstorage] newBlockfileStream -> DEBU 62f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:30:39.031 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 630 Remaining bytes=[23940], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:39.031 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 631 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:30:39.032 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 632 blockbytes [23937] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:39.032 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 633 [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" -orderer0.example.com | "2019-05-02 01:30:39.032 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 634 EvictionSuspicion not set, defaulting to 10m0s" -orderer0.example.com | "2019-05-02 01:30:39.034 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 635 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.034 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 636 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.050 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 637 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.062 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 638 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.062 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 639 Appending 0 entries to memory storage" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.066 UTC [fsblkstorage] Next -> DEBU 63a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-05-02 01:30:39.066 UTC [fsblkstorage] newBlockfileStream -> DEBU 63b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:30:39.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 63c Remaining bytes=[23940], Going to peek [8] bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.476 UTC [msp] DeserializeIdentity -> DEBU 5ce Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.476 UTC [msp] DeserializeIdentity -> DEBU 5cf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.477 UTC [msp.identity] newIdentity -> DEBU 5d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.477 UTC [msp] Validate -> DEBU 5d1 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.478 UTC [msp] getCertificationChain -> DEBU 5d2 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.479 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5d3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.479 UTC [msp] DeserializeIdentity -> DEBU 5d4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.480 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.480 UTC [msp] DeserializeIdentity -> DEBU 5d6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.482 UTC [msp] DeserializeIdentity -> DEBU 5d7 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:39.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 63d Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:30:39.067 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 63e blockbytes [23937] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:39.068 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 63f [channel: businesschannel] Done creating channel support resources" -orderer0.example.com | "2019-05-02 01:30:39.068 UTC [orderer.commmon.multichannel] newChain -> INFO 640 Created and starting new chain businesschannel" -orderer0.example.com | "2019-05-02 01:30:39.068 UTC [orderer.consensus.etcdraft] Start -> INFO 641 Starting Raft node" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.069 UTC [orderer.common.cluster] Configure -> INFO 642 Entering, channel: businesschannel, nodes: [ID: 2, -orderer0.example.com | Endpoint: orderer1.example.com:7050, -orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | ID: 3, +orderer0.example.com | "2019-05-02 09:27:14.461 UTC [fsblkstorage] updateCheckpoint -> DEBU 633 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23938], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-05-02 09:27:14.462 UTC [fsblkstorage] Next -> DEBU 634 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-05-02 09:27:14.463 UTC [fsblkstorage] newBlockfileStream -> DEBU 635 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:14.463 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 636 Remaining bytes=[23938], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:14.463 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 637 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:14.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 638 blockbytes [23935] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:14.464 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 639 [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +orderer0.example.com | "2019-05-02 09:27:14.465 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 63a EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2019-05-02 09:27:14.465 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63b No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.465 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 63c No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.472 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 63d Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.473 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63e Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.473 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63f Appending 0 entries to memory storage" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.474 UTC [fsblkstorage] Next -> DEBU 640 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-05-02 09:27:14.474 UTC [fsblkstorage] newBlockfileStream -> DEBU 641 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:14.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 642 Remaining bytes=[23938], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:14.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 643 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:14.476 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 644 blockbytes [23935] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:14.477 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 645 [channel: businesschannel] Done creating channel support resources" +orderer0.example.com | "2019-05-02 09:27:14.478 UTC [orderer.commmon.multichannel] newChain -> INFO 646 Created and starting new chain businesschannel" +orderer0.example.com | "2019-05-02 09:27:14.478 UTC [orderer.consensus.etcdraft] Start -> INFO 647 Starting Raft node" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.479 UTC [orderer.common.cluster] Configure -> INFO 648 Entering, channel: businesschannel, nodes: [ID: 3, orderer0.example.com | Endpoint: orderer2.example.com:7050, orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL @@ -6362,6 +6121,62 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51d Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51e Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51f Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 520 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 521 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 522 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 523 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 524 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 525 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 526 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 527 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 528 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 529 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 52a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52d Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 530 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 531 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 533 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 534 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 535 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 536 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 537 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 538 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 539 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53a Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 542 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 543 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 544 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 545 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 546 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 547 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 548 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 549 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54a Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54b Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.channelconfig] LogSanityChecks -> DEBU 551 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [common.channelconfig] LogSanityChecks -> DEBU 552 As expected, current configuration has policy '/Channel/Writers'" orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 @@ -6373,166 +6188,8 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:30:39.072 UTC [orderer.common.cluster] updateStubInMapping -> INFO 643 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" -orderer0.example.com | "2019-05-02 01:30:39.072 UTC [orderer.common.cluster] updateStubInMapping -> INFO 644 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" -orderer0.example.com | "2019-05-02 01:30:39.072 UTC [orderer.common.cluster] func1 -> DEBU 645 Connecting to ID: 2, +orderer0.example.com | ID: 2, orderer0.example.com | Endpoint: orderer1.example.com:7050, -peer0.org1.example.com | "2019-05-02 01:30:47.484 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5d8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5d9 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5da Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.489 UTC [policies] Evaluate -> DEBU 5db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.494 UTC [policies] Evaluate -> DEBU 5dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.495 UTC [policies] Evaluate -> DEBU 5dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.498 UTC [cauthdsl] func1 -> DEBU 5de 0xc0033005b0 gate 1556760647498656500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.498 UTC [cauthdsl] func2 -> DEBU 5df 0xc0033005b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.498 UTC [cauthdsl] func2 -> DEBU 5e0 0xc0033005b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.498 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5e1 Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.498 UTC [msp] Validate -> DEBU 5e2 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.498 UTC [msp] getCertificationChain -> DEBU 5e3 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [cauthdsl] func2 -> DEBU 5e4 0xc0033005b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [msp.identity] Verify -> DEBU 5e5 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [msp.identity] Verify -> DEBU 5e6 Verify: sig = 00000000 30 45 02 21 00 c9 2d 64 80 b0 04 84 fa 94 bb d0 |0E.!..-d........| -peer0.org1.example.com | 00000010 20 33 25 bc 96 51 ad 83 96 19 15 4c f1 d1 d3 81 | 3%..Q.....L....| -peer0.org1.example.com | 00000020 a3 12 f8 e7 9b 02 20 28 c0 fb 1c 11 9e 7b 56 e0 |...... (.....{V.| -peer0.org1.example.com | 00000030 54 64 09 ee 7f 15 0e 5f cf a4 8d f2 ef 3e 35 08 |Td....._.....>5.| -peer0.org1.example.com | 00000040 2c 89 c7 53 b7 6a ee |,..S.j.|" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [cauthdsl] func2 -> DEBU 5e7 0xc0033005b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [cauthdsl] func1 -> DEBU 5e8 0xc0033005b0 gate 1556760647498656500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [policies] Evaluate -> DEBU 5e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [policies] Evaluate -> DEBU 5ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [policies] Evaluate -> DEBU 5eb Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [policies] Evaluate -> DEBU 5ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ed Authenticated 192.168.240.5:55178" -peer0.org1.example.com | "2019-05-02 01:30:47.499 UTC [gossip.comm] GossipStream -> DEBU 5ee Servicing 192.168.240.5:55178" -peer0.org1.example.com | "2019-05-02 01:30:47.528 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5ef Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.529 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5f0 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.529 UTC [policies] Evaluate -> DEBU 5f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-05-02 01:30:47.529 UTC [policies] Evaluate -> DEBU 5f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.529 UTC [policies] Evaluate -> DEBU 5f3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.530 UTC [msp] DeserializeIdentity -> DEBU 5f4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.531 UTC [msp.identity] newIdentity -> DEBU 5f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI -peer0.org1.example.com | KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO -peer0.org1.example.com | CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA -peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM -peer0.org1.example.com | SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q -peer0.org1.example.com | 1A== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.531 UTC [cauthdsl] func1 -> DEBU 5f6 0xc003145b30 gate 1556760647531940300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.532 UTC [cauthdsl] func2 -> DEBU 5fa 0xc003145b30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.533 UTC [cauthdsl] func2 -> DEBU 5fb 0xc003145b30 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.532 UTC [gossip.comm] readFromStream -> DEBU 5f7 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-05-02 01:30:47.532 UTC [gossip.comm] func2 -> DEBU 5f8 Client 192.168.240.5:55178 disconnected" -peer0.org1.example.com | "2019-05-02 01:30:47.536 UTC [comm.grpc.server] 1 -> INFO 5fc streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.474Z grpc.peer_address=192.168.240.5:55178 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=61.902ms -peer0.org1.example.com | "2019-05-02 01:30:47.532 UTC [grpc] infof -> DEBU 5f9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.537 UTC [gossip.comm] writeToStream -> DEBU 5fd Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:30:47.538 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5fe Checking if identity satisfies MEMBER role for OrdererMSP" -peer0.org1.example.com | "2019-05-02 01:30:47.540 UTC [msp] Validate -> DEBU 5ff MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.540 UTC [cauthdsl] func2 -> DEBU 600 0xc003145b30 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.540 UTC [msp.identity] Verify -> DEBU 601 Verify: digest = 00000000 a0 63 37 55 8b 40 75 fb 71 6a c8 2e aa ea 87 3d |.c7U.@u.qj.....=| -peer0.org1.example.com | 00000010 42 53 60 e7 41 23 c8 72 ad b9 02 5d b9 85 a0 2b |BS`.A#.r...]...+|" -peer0.org1.example.com | "2019-05-02 01:30:47.541 UTC [msp.identity] Verify -> DEBU 602 Verify: sig = 00000000 30 45 02 21 00 da ec 2d 6a b7 74 dd 66 0b d6 9d |0E.!...-j.t.f...| -peer0.org1.example.com | 00000010 7a 02 7b 9d 88 b9 4a 5b 91 27 be d9 f6 f4 e9 9e |z.{...J[.'......| -peer0.org1.example.com | 00000020 43 35 ce 9e 60 02 20 7c 35 ac c7 af 58 ca 57 a8 |C5..`. |5...X.W.| -peer0.org1.example.com | 00000030 3e 97 66 b7 f8 de a4 bf 70 c7 bc b6 c8 41 04 fd |>.f.....p....A..| -peer0.org1.example.com | 00000040 fa db 5c 9c bb f6 ff |..\....|" -peer0.org1.example.com | "2019-05-02 01:30:47.549 UTC [comm.grpc.server] 1 -> INFO 603 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.541Z grpc.peer_address=192.168.240.5:55180 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.5612ms -peer0.org1.example.com | "2019-05-02 01:30:47.551 UTC [cauthdsl] func2 -> DEBU 604 0xc003145b30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.552 UTC [cauthdsl] func1 -> DEBU 605 0xc003145b30 gate 1556760647531940300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.553 UTC [policies] Evaluate -> DEBU 606 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.553 UTC [policies] Evaluate -> DEBU 607 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.557 UTC [policies] Evaluate -> DEBU 608 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:30:47.558 UTC [policies] Evaluate -> DEBU 609 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:30:47.558 UTC [blocksProvider] DeliverBlocks -> DEBU 60a [businesschannel] Adding payload to local buffer, blockNum = [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.559 UTC [gossip.state] addPayload -> DEBU 60b [businesschannel] Adding payload to local buffer, blockNum = [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.559 UTC [gossip.state] addPayload -> DEBU 60c Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-05-02 01:30:47.560 UTC [blocksProvider] DeliverBlocks -> DEBU 60d [businesschannel] Gossiping block [2], peers number [1]" -peer0.org1.example.com | "2019-05-02 01:30:47.560 UTC [gossip.channel] AddToMsgStore -> DEBU 60e Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23756 bytes, seq: 2}, Envelope: 23789 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-05-02 01:30:47.562 UTC [gossip.pull] Add -> DEBU 611 Added 2, total items: 2" -peer0.org1.example.com | "2019-05-02 01:30:47.561 UTC [gossip.state] deliverPayloads -> DEBU 60f [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.563 UTC [gossip.state] deliverPayloads -> DEBU 612 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-05-02 01:30:47.563 UTC [gossip.privdata] StoreBlock -> INFO 613 [businesschannel] Received block [2] from buffer" -peer0.org1.example.com | "2019-05-02 01:30:47.564 UTC [gossip.privdata] StoreBlock -> DEBU 614 [businesschannel] Validating block [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.564 UTC [committer.txvalidator] Validate -> DEBU 615 [businesschannel] START Block Validation for block [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.564 UTC [committer.txvalidator] Validate -> DEBU 616 expecting 1 block validation responses" -peer0.org1.example.com | "2019-05-02 01:30:47.565 UTC [committer.txvalidator] validateTx -> DEBU 617 [businesschannel] validateTx starts for block 0xc00312f340 env 0xc0031490e0 txn 0" -peer0.org1.example.com | "2019-05-02 01:30:47.565 UTC [protoutils] ValidateTransaction -> DEBU 618 ValidateTransactionEnvelope starts for envelope 0xc0031490e0" -peer0.org1.example.com | "2019-05-02 01:30:47.566 UTC [protoutils] ValidateTransaction -> DEBU 619 Header is channel_header:"\010\001\032\006\010\307\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\022\351\317\224\344K\254\270\031\247\202s\313\323o\034E\377\377:\265\311\rd" " -peer0.org1.example.com | "2019-05-02 01:30:47.566 UTC [protoutils] validateChannelHeader -> DEBU 61a validateChannelHeader info: header type 1" -peer0.org1.example.com | "2019-05-02 01:30:47.567 UTC [protoutils] checkSignatureFromCreator -> DEBU 61b begin" -peer0.org1.example.com | "2019-05-02 01:30:47.567 UTC [msp] GetManagerForChain -> DEBU 61c Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:30:47.562 UTC [msp.identity] Sign -> DEBU 610 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.568 UTC [msp] DeserializeIdentity -> DEBU 61d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.569 UTC [msp.identity] newIdentity -> DEBU 61f Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -peer0.org1.example.com | QQ== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.570 UTC [protoutils] checkSignatureFromCreator -> DEBU 620 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -peer0.org1.example.com | "2019-05-02 01:30:47.571 UTC [msp] Validate -> DEBU 621 MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.572 UTC [protoutils] checkSignatureFromCreator -> DEBU 622 creator is valid" -peer0.org1.example.com | "2019-05-02 01:30:47.573 UTC [msp.identity] Verify -> DEBU 623 Verify: digest = 00000000 21 4f fb 0b 5f ab 9a c4 67 22 08 66 81 b5 b4 cf |!O.._...g".f....| -peer0.org1.example.com | 00000010 2e 2c 23 f4 80 33 e2 a8 1f 04 b0 58 3c 43 28 f3 |.,#..3.....X DEBU 624 Verify: sig = 00000000 30 45 02 21 00 86 fb 9c 76 cb 8b 44 af f4 0f 00 |0E.!....v..D....| -peer0.org1.example.com | 00000010 6e e3 d1 6b 41 41 f8 4f c3 17 a3 44 ca c9 5f 0a |n..kAA.O...D.._.| -peer0.org1.example.com | 00000020 81 7e ce 61 81 02 20 50 e7 08 a1 de af f0 a0 ab |.~.a.. P........| -peer0.org1.example.com | 00000030 8d 52 b4 19 b0 21 33 09 ea d4 9f ad 17 d6 94 e3 |.R...!3.........| -peer0.org1.example.com | 00000040 85 6c 7e 6e e3 72 97 |.l~n.r.|" -peer0.org1.example.com | "2019-05-02 01:30:47.574 UTC [protoutils] checkSignatureFromCreator -> DEBU 625 exits successfully" -peer0.org1.example.com | "2019-05-02 01:30:47.568 UTC [msp.identity] Sign -> DEBU 61e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.575 UTC [protoutils] validateConfigTransaction -> DEBU 626 validateConfigTransaction starts for data 0xc0033a4000, header channel_header:"\010\001\032\006\010\307\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\022\351\317\224\344K\254\270\031\247\202s\313\323o\034E\377\377:\265\311\rd" " -peer0.org1.example.com | "2019-05-02 01:30:47.581 UTC [gossip.comm] authenticateRemotePeer -> DEBU 627 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.5:55180" -peer0.org1.example.com | "2019-05-02 01:30:47.583 UTC [gossip.comm] authenticateRemotePeer -> DEBU 629 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:55180" -peer0.org1.example.com | "2019-05-02 01:30:47.583 UTC [msp] DeserializeIdentity -> DEBU 62a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.584 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.584 UTC [msp] DeserializeIdentity -> DEBU 62c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.586 UTC [msp] DeserializeIdentity -> DEBU 62e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.587 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 630 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 631 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.588 UTC [policies] Evaluate -> DEBU 632 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.588 UTC [policies] Evaluate -> DEBU 633 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.588 UTC [policies] Evaluate -> DEBU 634 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.589 UTC [cauthdsl] func1 -> DEBU 635 0xc0033bf2d0 gate 1556760647589013500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.590 UTC [cauthdsl] func2 -> DEBU 636 0xc0033bf2d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.590 UTC [cauthdsl] func2 -> DEBU 637 0xc0033bf2d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.581 UTC [committer.txvalidator] validateTx -> DEBU 628 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.591 UTC [cauthdsl] func2 -> DEBU 638 0xc0033bf2d0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.592 UTC [msp.identity] Verify -> DEBU 63a Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-05-02 01:30:47.592 UTC [msp.identity] Verify -> DEBU 63b Verify: sig = 00000000 30 45 02 21 00 9a 04 67 89 50 f5 22 12 f0 b8 10 |0E.!...g.P."....| -peer0.org1.example.com | 00000010 ed 32 3d 12 ad 0d 47 ce 80 50 5c c4 f6 08 c0 b0 |.2=...G..P\.....| -peer0.org1.example.com | 00000020 d2 d2 50 4e 91 02 20 60 7f bb 47 f2 90 cb af 5c |..PN.. `..G....\| -peer0.org1.example.com | 00000030 f5 74 84 1d ae 5b 86 67 0b a4 a6 0a 9e 47 d3 d3 |.t...[.g.....G..| -peer0.org1.example.com | 00000040 9e fe 10 b1 4a c1 d2 |....J..|" -peer0.org1.example.com | "2019-05-02 01:30:47.594 UTC [cauthdsl] func2 -> DEBU 63c 0xc0033bf2d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.594 UTC [gossip.comm] Send -> DEBU 63d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23756 bytes, seq: 2}, Envelope: 23789 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:47.595 UTC [gossip.comm] sendToEndpoint -> DEBU 63f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23756 bytes, seq: 2}, Envelope: 23789 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.595 UTC [gossip.comm] sendToEndpoint -> DEBU 640 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.594 UTC [cauthdsl] func1 -> DEBU 63e 0xc0033bf2d0 gate 1556760647589013500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.591 UTC [common.configtx] addToMap -> DEBU 639 Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-05-02 01:30:47.607 UTC [policies] Evaluate -> DEBU 641 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.607 UTC [policies] Evaluate -> DEBU 643 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.607 UTC [policies] Evaluate -> DEBU 644 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.608 UTC [policies] Evaluate -> DEBU 645 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG @@ -6563,56 +6220,10 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | for channel businesschannel" -orderer0.example.com | "2019-05-02 01:30:39.072 UTC [orderer.common.cluster] updateStubInMapping -> INFO 646 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" -orderer0.example.com | "2019-05-02 01:30:39.072 UTC [orderer.common.cluster] updateStubInMapping -> INFO 647 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" -peer0.org1.example.com | "2019-05-02 01:30:47.608 UTC [gossip.comm] authenticateRemotePeer -> DEBU 646 Authenticated 192.168.240.5:55180" -peer0.org1.example.com | "2019-05-02 01:30:47.608 UTC [gossip.comm] GossipStream -> DEBU 647 Servicing 192.168.240.5:55180" -peer0.org1.example.com | "2019-05-02 01:30:47.607 UTC [common.configtx] addToMap -> DEBU 642 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.609 UTC [common.configtx] addToMap -> DEBU 648 Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.609 UTC [common.configtx] addToMap -> DEBU 649 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.611 UTC [common.configtx] addToMap -> DEBU 64a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.612 UTC [common.configtx] addToMap -> DEBU 64b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:47.612 UTC [common.configtx] addToMap -> DEBU 64c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.612 UTC [common.configtx] addToMap -> DEBU 64d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.612 UTC [common.configtx] addToMap -> DEBU 64e Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-05-02 01:30:47.613 UTC [common.configtx] addToMap -> DEBU 64f Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.613 UTC [common.configtx] addToMap -> DEBU 650 Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.613 UTC [common.configtx] addToMap -> DEBU 651 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:47.614 UTC [common.configtx] addToMap -> DEBU 653 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.614 UTC [common.configtx] addToMap -> DEBU 654 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:47.614 UTC [common.configtx] addToMap -> DEBU 655 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.614 UTC [gossip.gossip] handleMessage -> DEBU 652 Entering, 192.168.240.5:55180 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 10824040122491647565, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.615 UTC [gossip.gossip] handleMessage -> DEBU 657 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 658 Got message: GossipMessage: Channel: , nonce: 10824040122491647565, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.615 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 659 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:47.616 UTC [msp] DeserializeIdentity -> DEBU 65a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.616 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 65b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 65c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 65d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.617 UTC [policies] Evaluate -> DEBU 65e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.617 UTC [policies] Evaluate -> DEBU 65f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.617 UTC [policies] Evaluate -> DEBU 660 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.618 UTC [cauthdsl] func1 -> DEBU 661 0xc003414ce0 gate 1556760647618131600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.618 UTC [cauthdsl] func2 -> DEBU 662 0xc003414ce0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.618 UTC [cauthdsl] func2 -> DEBU 663 0xc003414ce0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.618 UTC [cauthdsl] func2 -> DEBU 664 0xc003414ce0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.618 UTC [msp.identity] Verify -> DEBU 665 Verify: digest = 00000000 32 3d 9b d7 ca 81 cb 3a 10 7e 65 1f 7e 39 06 2e |2=.....:.~e.~9..| -peer0.org1.example.com | 00000010 82 b2 fb fe d4 cc ef 41 53 e4 9a b2 e4 8f 6a 46 |.......AS.....jF|" -peer0.org1.example.com | "2019-05-02 01:30:47.618 UTC [msp.identity] Verify -> DEBU 666 Verify: sig = 00000000 30 45 02 21 00 a6 12 8a 7f 4e ec a1 a1 26 08 2f |0E.!.....N...&./| -peer0.org1.example.com | 00000010 f9 b9 6a 9b 3c fd b2 4a b4 56 ce ab 2f a8 c5 8b |..j.<..J.V../...| -peer0.org1.example.com | 00000020 da ea bb dd b8 02 20 4c 3a b6 39 05 30 6f 3b 71 |...... L:.9.0o;q| -peer0.org1.example.com | 00000030 51 27 65 f1 38 31 a4 22 a2 26 b0 57 7b f5 70 ad |Q'e.81.".&.W{.p.| -peer0.org1.example.com | 00000040 fd fe 4e 79 dc 52 ac |..Ny.R.|" -peer0.org1.example.com | "2019-05-02 01:30:47.619 UTC [cauthdsl] func2 -> DEBU 667 0xc003414ce0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.621 UTC [cauthdsl] func1 -> DEBU 668 0xc003414ce0 gate 1556760647618131600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.614 UTC [common.configtx] addToMap -> DEBU 656 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.621 UTC [common.configtx] addToMap -> DEBU 669 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.622 UTC [common.configtx] verifyDeltaSet -> DEBU 66a Processing change to key: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.621 UTC [policies] Evaluate -> DEBU 66b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.622 UTC [policies] Evaluate -> DEBU 66d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.622 UTC [policies] Evaluate -> DEBU 66e Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:39.073 UTC [orderer.common.cluster] func1 -> DEBU 648 Connecting to ID: 3, +orderer0.example.com | ]" +orderer0.example.com | "2019-05-02 09:27:14.479 UTC [orderer.common.cluster] updateStubInMapping -> INFO 649 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-05-02 09:27:14.480 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64a Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-05-02 09:27:14.481 UTC [orderer.common.cluster] func1 -> DEBU 64b Connecting to ID: 3, orderer0.example.com | Endpoint: orderer2.example.com:7050, orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL @@ -6645,301 +6256,225 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= orderer0.example.com | -----END CERTIFICATE----- orderer0.example.com | for channel businesschannel" -orderer0.example.com | "2019-05-02 01:30:39.073 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 649 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer0.example.com | "2019-05-02 01:30:39.073 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 64a 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer0.example.com | "2019-05-02 01:30:39.073 UTC [orderer.common.cluster] Configure -> INFO 64b Exiting" -orderer0.example.com | "2019-05-02 01:30:39.073 UTC [orderer.consensus.etcdraft] start -> DEBU 64c Starting raft node: #peers: 3" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.073 UTC [orderer.consensus.etcdraft] start -> INFO 64d Starting raft node as part of a new channel" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.073 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 64e 1 became follower at term 0" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.073 UTC [orderer.consensus.etcdraft] newRaft -> INFO 64f newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.074 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 650 1 became follower at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.074 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 651 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" -orderer0.example.com | "2019-05-02 01:30:39.074 UTC [msp.identity] Sign -> DEBU 652 Sign: plaintext: 0A00120B0A090A03010203100418050A...D662279D93BB3CD4E47B88CE198DC28B " -orderer0.example.com | "2019-05-02 01:30:39.074 UTC [msp.identity] Sign -> DEBU 653 Sign: digest: 22BF79C30380EA3B7B42E153624298C7927E5A779512302423C782A14F03681C " -orderer0.example.com | "2019-05-02 01:30:39.074 UTC [orderer.consensus.etcdraft] run -> INFO 654 This node is picked to start campaign" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 655 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -peer0.org1.example.com | "2019-05-02 01:30:47.622 UTC [policies] Evaluate -> DEBU 66f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.623 UTC [gossip.discovery] handleAliveMessage -> DEBU 670 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.623 UTC [gossip.discovery] learnNewMembers -> DEBU 671 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}" -peer0.org1.example.com | "2019-05-02 01:30:47.623 UTC [gossip.discovery] learnNewMembers -> DEBU 672 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.623 UTC [gossip.discovery] learnNewMembers -> DEBU 673 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.623 UTC [gossip.discovery] handleAliveMessage -> DEBU 674 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 675 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.623 UTC [gossip.discovery] sendMemResponse -> DEBU 676 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:47.623 UTC [msp] DeserializeIdentity -> DEBU 677 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.624 UTC [msp] DeserializeIdentity -> DEBU 678 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.624 UTC [gossip.comm] Send -> DEBU 679 Entering, sending GossipMessage: Channel: , nonce: 10824040122491647565, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:47.624 UTC [gossip.discovery] sendMemResponse -> DEBU 67a Exiting, replying with MembershipResponse with Alive: 3, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:47.624 UTC [gossip.comm] sendToEndpoint -> DEBU 67b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 10824040122491647565, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.624 UTC [gossip.comm] sendToEndpoint -> DEBU 67c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.622 UTC [common.configtx] policyForItem -> DEBU 66c Getting policy for item Org2MSP with mod_policy Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.625 UTC [policies] Manager -> DEBU 67d Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-05-02 01:30:47.626 UTC [policies] Manager -> DEBU 67e Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.636 UTC [policies] Manager -> DEBU 67f Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:30:47.637 UTC [policies] Manager -> DEBU 680 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-05-02 01:30:47.640 UTC [policies] Manager -> DEBU 681 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.641 UTC [policies] Manager -> DEBU 682 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.641 UTC [policies] Manager -> DEBU 683 Manager Channel/Application looking up path [Org2MSP]" -peer0.org1.example.com | "2019-05-02 01:30:47.641 UTC [policies] Manager -> DEBU 684 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.641 UTC [policies] Manager -> DEBU 685 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.657 UTC [policies] Manager -> DEBU 686 Manager Channel/Application/Org2MSP looking up path []" -peer0.org1.example.com | "2019-05-02 01:30:47.657 UTC [policies] Evaluate -> DEBU 687 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -peer0.org1.example.com | "2019-05-02 01:30:47.657 UTC [msp] DeserializeIdentity -> DEBU 688 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.657 UTC [comm.grpc.server] 1 -> INFO 689 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.656Z grpc.peer_address=192.168.240.5:55182 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.2979ms -peer0.org1.example.com | "2019-05-02 01:30:47.660 UTC [msp.identity] newIdentity -> DEBU 68a Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.671 UTC [cauthdsl] func1 -> DEBU 68b 0xc00342d200 gate 1556760647662980100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.671 UTC [cauthdsl] func2 -> DEBU 68c 0xc00342d200 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.673 UTC [cauthdsl] func2 -> DEBU 68d 0xc00342d200 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.674 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 68e Checking if identity satisfies ADMIN role for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:39.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 656 Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" -orderer0.example.com | "2019-05-02 01:30:39.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 657 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.5µs " -orderer0.example.com | "2019-05-02 01:30:39.082 UTC [fsblkstorage] indexBlock -> DEBU 658 Indexing block [blockNum=1, blockHash=[]byte{0xf1, 0xe3, 0xf3, 0xe0, 0xc, 0xc2, 0xac, 0xa3, 0x12, 0x9, 0x74, 0xc0, 0xe1, 0x24, 0x28, 0x3e, 0x31, 0x17, 0x71, 0xb4, 0xe9, 0x1c, 0x85, 0x80, 0xee, 0x78, 0x5f, 0x57, 0xd9, 0x1e, 0xe5, 0x9} txOffsets= -orderer0.example.com | txId= locPointer=offset=71, bytesLength=24826 +orderer0.example.com | "2019-05-02 09:27:14.482 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64c Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-05-02 09:27:14.482 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64d Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-05-02 09:27:14.483 UTC [orderer.common.cluster] func1 -> DEBU 64e Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 553 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 554 Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 555 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 556 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 557 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 558 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [common.channelconfig] LogSanityChecks -> DEBU 559 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [common.channelconfig] LogSanityChecks -> DEBU 55a As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [common.channelconfig] LogSanityChecks -> DEBU 55b As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55c Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55d Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55e Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55f Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [policies] Manager -> DEBU 560 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [common.channelconfig] LogSanityChecks -> DEBU 561 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [common.capabilities] Supported -> DEBU 562 Application capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [common.capabilities] Supported -> DEBU 563 Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [gossip.service] ProcessConfigUpdate -> DEBU 564 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [gossip.service] ProcessConfigUpdate -> DEBU 565 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [gossip.service] updateAnchors -> DEBU 566 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [gossip.service] updateAnchors -> DEBU 567 Org2MSP anchor peers: []" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [gossip.service] updateAnchors -> DEBU 568 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 569 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [policies] Evaluate -> DEBU 56b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [policies] Evaluate -> DEBU 56c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [policies] Evaluate -> DEBU 56d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [cauthdsl] func1 -> DEBU 56e 0xc00317e000 gate 1556789242437610900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 56f 0xc00317e000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 570 0xc00317e000 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 571 0xc00317e000 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [msp.identity] Verify -> DEBU 572 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h| +peer0.org1.example.com | 00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y DEBU 573 Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....| +peer0.org1.example.com | 00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b| +peer0.org1.example.com | 00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..| +peer0.org1.example.com | 00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.| +peer0.org1.example.com | 00000040 89 bc 81 84 80 a7 |......|" +peer0.org1.example.com | "2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 574 0xc00317e000 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [cauthdsl] func1 -> DEBU 575 0xc00317e000 gate 1556789242437610900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 576 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 577 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 578 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 579 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [gossip.gossip] JoinChan -> INFO 57a Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [gossip.gossip] learnAnchorPeers -> INFO 57b Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [gossip.gossip] learnAnchorPeers -> INFO 57c Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [gossip.gossip] learnAnchorPeers -> INFO 57d No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [gossip.service] updateEndpoints -> DEBU 57e Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-05-02 09:27:22.438 UTC [peer] updateTrustedRoots -> DEBU 57f Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.461 UTC [peer] buildTrustedRootsForChain -> DEBU 580 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.462 UTC [peer] buildTrustedRootsForChain -> DEBU 581 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-05-02 09:27:22.462 UTC [peer] buildTrustedRootsForChain -> DEBU 582 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-05-02 09:27:22.462 UTC [peer] buildTrustedRootsForChain -> DEBU 583 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-05-02 09:27:22.463 UTC [committer.txvalidator] validateTx -> DEBU 584 config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.466 UTC [committer.txvalidator] Validate -> DEBU 585 got result for idx 0, code 0" +peer0.org1.example.com | "2019-05-02 09:27:22.468 UTC [committer.txvalidator] Validate -> INFO 586 [businesschannel] Validated block [1] in 107ms" +peer0.org1.example.com | "2019-05-02 09:27:22.469 UTC [gossip.privdata] listMissingPrivateData -> DEBU 587 Retrieving private write sets for 0 transactions from transient store" +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.469 UTC [gossip.privdata] StoreBlock -> DEBU 588 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-05-02 09:27:22.469 UTC [committer] preCommit -> DEBU 589 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-05-02 09:27:22.470 UTC [kvledger] CommitWithPvtData -> DEBU 58b [businesschannel] Validating state for block [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.471 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58c Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:27:22.465 UTC [committer.txvalidator] validateTx -> DEBU 58a [businesschannel] validateTx completes for block 0xc002e28c00 env 0xc002ef2af0 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:22.471 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58d lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-05-02 09:27:22.472 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58e Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.472 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 58f ValidateAndPrepareBatch() for block number = [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.473 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 590 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:22.473 UTC [valimpl] preprocessProtoBlock -> DEBU 591 txType=CONFIG" +peer0.org1.example.com | "2019-05-02 09:27:22.473 UTC [valimpl] processNonEndorserTx -> DEBU 592 Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-05-02 09:27:22.474 UTC [valimpl] processNonEndorserTx -> DEBU 593 Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-05-02 09:27:22.474 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 594 constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:22.479 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 596 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-05-02 09:27:22.480 UTC [peer] GenerateSimulationResults -> DEBU 597 Processing CONFIG" +peer0.org1.example.com | "2019-05-02 09:27:22.479 UTC [comm.grpc.server] 1 -> INFO 595 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.478Z grpc.peer_address=172.18.0.6:53220 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=144.5µs +orderer0.example.com | "2019-05-02 09:27:14.484 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 64f 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2019-05-02 09:27:14.485 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 650 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2019-05-02 09:27:14.485 UTC [orderer.common.cluster] Configure -> INFO 651 Exiting" +orderer0.example.com | "2019-05-02 09:27:14.485 UTC [orderer.consensus.etcdraft] start -> DEBU 652 Starting raft node: #peers: 3" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] start -> INFO 653 Starting raft node as part of a new channel" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 654 1 became follower at term 0" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] newRaft -> INFO 655 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 656 1 became follower at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] run -> INFO 657 This node is picked to start campaign" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.486 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 658 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +orderer0.example.com | "2019-05-02 09:27:14.486 UTC [msp.identity] Sign -> DEBU 659 Sign: plaintext: 0A00120B0A090A03010203100418050A...EC9F6749FC7E927080D6D099F3419E8C " +orderer0.example.com | "2019-05-02 09:27:14.486 UTC [msp.identity] Sign -> DEBU 65a Sign: digest: 68557D82A654C101CD7E3C9A16564FC0776386EE1C49877DE775BE6229627D91 " +orderer0.example.com | "2019-05-02 09:27:14.490 UTC [orderer.consensus.etcdraft] apply -> INFO 65b Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.490 UTC [orderer.consensus.etcdraft] apply -> INFO 65c Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.491 UTC [orderer.consensus.etcdraft] apply -> INFO 65d Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:14.493 UTC [fsblkstorage] indexBlock -> DEBU 65e Indexing block [blockNum=1, blockHash=[]byte{0x90, 0x42, 0xb2, 0x46, 0xc4, 0xef, 0xd2, 0xf1, 0xe5, 0x46, 0xcb, 0x7a, 0xee, 0xd9, 0x2e, 0x77, 0xf, 0x7a, 0xe4, 0x58, 0xf1, 0x9e, 0x66, 0x4b, 0x8d, 0xb8, 0x2d, 0x23, 0xd8, 0xf7, 0x76, 0x5d} txOffsets= +orderer0.example.com | txId= locPointer=offset=71, bytesLength=24824 orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:30:39.083 UTC [orderer.consensus.etcdraft] apply -> INFO 659 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.084 UTC [orderer.consensus.etcdraft] apply -> INFO 65a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.084 UTC [orderer.consensus.etcdraft] apply -> INFO 65b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:39.087 UTC [fsblkstorage] updateCheckpoint -> DEBU 65c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44242], isChainEmpty=[false], lastBlockNumber=[1]" -orderer0.example.com | "2019-05-02 01:30:39.088 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 65d [channel: testchainid] Wrote block [1]" -orderer0.example.com | "2019-05-02 01:30:39.186 UTC [common.deliver] deliverBlocks -> WARN 65e [channel: businesschannel] Rejecting deliver request for 192.168.240.9:47270 because of consenter error" -orderer0.example.com | "2019-05-02 01:30:39.187 UTC [orderer.common.server] func1 -> DEBU 65f Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:30:39.187 UTC [comm.grpc.server] 1 -> INFO 660 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47270 grpc.code=OK grpc.call_duration=205.2366ms -orderer0.example.com | "2019-05-02 01:30:39.204 UTC [orderer.common.server] Deliver -> DEBU 661 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:39.204 UTC [common.deliver] Handle -> DEBU 662 Starting new deliver loop for 192.168.240.9:47272" -orderer0.example.com | "2019-05-02 01:30:39.205 UTC [common.deliver] Handle -> DEBU 663 Attempting to read seek info message from 192.168.240.9:47272" -orderer0.example.com | "2019-05-02 01:30:39.406 UTC [common.deliver] deliverBlocks -> WARN 664 [channel: businesschannel] Rejecting deliver request for 192.168.240.9:47272 because of consenter error" -orderer0.example.com | "2019-05-02 01:30:39.407 UTC [orderer.common.server] func1 -> DEBU 665 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:30:39.407 UTC [comm.grpc.server] 1 -> INFO 666 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47272 grpc.code=OK grpc.call_duration=203.7027ms -orderer0.example.com | "2019-05-02 01:30:39.422 UTC [orderer.common.server] Deliver -> DEBU 667 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:39.422 UTC [common.deliver] Handle -> DEBU 668 Starting new deliver loop for 192.168.240.9:47274" -orderer0.example.com | "2019-05-02 01:30:39.422 UTC [common.deliver] Handle -> DEBU 669 Attempting to read seek info message from 192.168.240.9:47274" -orderer0.example.com | "2019-05-02 01:30:39.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 66a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:39.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 66b Sending msg of 28 bytes to 3 on channel testchainid took 64.7µs" -orderer0.example.com | "2019-05-02 01:30:39.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 66c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 348.3µs " -orderer0.example.com | "2019-05-02 01:30:39.622 UTC [common.deliver] deliverBlocks -> WARN 66d [channel: businesschannel] Rejecting deliver request for 192.168.240.9:47274 because of consenter error" -orderer0.example.com | "2019-05-02 01:30:39.623 UTC [orderer.common.server] func1 -> DEBU 66e Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:30:39.624 UTC [comm.grpc.server] 1 -> INFO 66f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47274 grpc.code=OK grpc.call_duration=201.654ms -orderer0.example.com | "2019-05-02 01:30:39.639 UTC [orderer.common.server] Deliver -> DEBU 670 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:39.639 UTC [common.deliver] Handle -> DEBU 671 Starting new deliver loop for 192.168.240.9:47276" -orderer0.example.com | "2019-05-02 01:30:39.639 UTC [common.deliver] Handle -> DEBU 672 Attempting to read seek info message from 192.168.240.9:47276" -orderer0.example.com | "2019-05-02 01:30:39.843 UTC [common.deliver] deliverBlocks -> WARN 673 [channel: businesschannel] Rejecting deliver request for 192.168.240.9:47276 because of consenter error" -orderer0.example.com | "2019-05-02 01:30:39.844 UTC [orderer.common.server] func1 -> DEBU 674 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:30:39.844 UTC [comm.grpc.server] 1 -> INFO 675 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47276 grpc.code=OK grpc.call_duration=205.3417ms -orderer0.example.com | "2019-05-02 01:30:39.856 UTC [orderer.common.server] Deliver -> DEBU 676 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:39.856 UTC [common.deliver] Handle -> DEBU 677 Starting new deliver loop for 192.168.240.9:47278" -orderer0.example.com | "2019-05-02 01:30:39.856 UTC [common.deliver] Handle -> DEBU 678 Attempting to read seek info message from 192.168.240.9:47278" -peer0.org1.example.com | "2019-05-02 01:30:47.675 UTC [cauthdsl] func2 -> DEBU 68f 0xc00342d200 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.675 UTC [msp.identity] Verify -> DEBU 690 Verify: digest = 00000000 94 91 3a 9b 42 3e cb f7 04 35 a7 fe 6e 63 d5 7c |..:.B>...5..nc.|| -peer0.org1.example.com | 00000010 7c 24 53 70 15 d2 b1 1a 57 a8 f8 c6 bb 05 dc 1f ||$Sp....W.......|" -peer0.org1.example.com | "2019-05-02 01:30:47.677 UTC [msp.identity] Verify -> DEBU 691 Verify: sig = 00000000 30 44 02 20 2a 4c 37 99 83 06 3b 26 bc cd 68 87 |0D. *L7...;&..h.| -peer0.org1.example.com | 00000010 b4 dc 8d 15 40 47 d5 be ff cd 6a b3 4e fb 5a 82 |....@G....j.N.Z.| -peer0.org1.example.com | 00000020 06 7e 76 b6 02 20 04 f7 43 d0 0a f5 49 8b 53 76 |.~v.. ..C...I.Sv| -peer0.org1.example.com | 00000030 e9 cd a4 0c 01 31 38 3b 3f 69 a2 6e 25 1c d8 26 |.....18;?i.n%..&| -peer0.org1.example.com | 00000040 b9 56 9b 7e 5e 90 |.V.~^.|" -peer0.org1.example.com | "2019-05-02 01:30:47.677 UTC [cauthdsl] func2 -> DEBU 692 0xc00342d200 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.677 UTC [cauthdsl] func1 -> DEBU 693 0xc00342d200 gate 1556760647662980100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.678 UTC [policies] Evaluate -> DEBU 694 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.678 UTC [policies] Evaluate -> DEBU 695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.679 UTC [common.configtx] verifyDeltaSet -> DEBU 696 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:47.680 UTC [common.configtx] recurseConfigMap -> DEBU 697 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.680 UTC [common.configtx] recurseConfigMap -> DEBU 698 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.682 UTC [common.configtx] recurseConfigMap -> DEBU 699 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.683 UTC [common.configtx] recurseConfigMap -> DEBU 69a Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.683 UTC [common.configtx] recurseConfigMap -> DEBU 69b Setting policy for key Readers to " -peer0.org1.example.com | "2019-05-02 01:30:47.684 UTC [common.configtx] recurseConfigMap -> DEBU 69c Setting policy for key Writers to " -peer0.org1.example.com | "2019-05-02 01:30:47.685 UTC [common.configtx] recurseConfigMap -> DEBU 69d Setting policy for key Admins to " -peer0.org1.example.com | "2019-05-02 01:30:47.685 UTC [common.configtx] recurseConfigMap -> DEBU 69e Setting policy for key Endorsement to " -peer0.org1.example.com | "2019-05-02 01:30:47.685 UTC [common.configtx] recurseConfigMap -> DEBU 69f Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.686 UTC [common.configtx] recurseConfigMap -> DEBU 6a0 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.686 UTC [common.configtx] recurseConfigMap -> DEBU 6a1 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.686 UTC [common.configtx] recurseConfigMap -> DEBU 6a2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.687 UTC [common.configtx] recurseConfigMap -> DEBU 6a3 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.688 UTC [common.configtx] recurseConfigMap -> DEBU 6a4 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.688 UTC [common.configtx] recurseConfigMap -> DEBU 6a5 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.688 UTC [common.configtx] recurseConfigMap -> DEBU 6a6 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.689 UTC [common.configtx] recurseConfigMap -> DEBU 6a7 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.689 UTC [common.configtx] recurseConfigMap -> DEBU 6a8 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.689 UTC [common.configtx] recurseConfigMap -> DEBU 6a9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.690 UTC [common.configtx] recurseConfigMap -> DEBU 6aa Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.690 UTC [common.configtx] recurseConfigMap -> DEBU 6ab Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.690 UTC [common.configtx] recurseConfigMap -> DEBU 6ac Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.691 UTC [common.configtx] recurseConfigMap -> DEBU 6ad Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:47.692 UTC [common.channelconfig] NewStandardValues -> DEBU 6ae Initializing protos for *channelconfig.ChannelProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.692 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6af Processing field: HashingAlgorithm" -peer0.org1.example.com | "2019-05-02 01:30:47.693 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b0 Processing field: BlockDataHashingStructure" -peer0.org1.example.com | "2019-05-02 01:30:47.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b1 Processing field: OrdererAddresses" -peer0.org1.example.com | "2019-05-02 01:30:47.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b2 Processing field: Consortium" -peer0.org1.example.com | "2019-05-02 01:30:47.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b3 Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:47.703 UTC [common.channelconfig] NewStandardValues -> DEBU 6b4 Initializing protos for *channelconfig.OrdererProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b5 Processing field: ConsensusType" -peer0.org1.example.com | "2019-05-02 01:30:47.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b6 Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:40.058 UTC [common.deliver] deliverBlocks -> WARN 679 [channel: businesschannel] Rejecting deliver request for 192.168.240.9:47278 because of consenter error" -peer0.org1.example.com | "2019-05-02 01:30:47.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b7 Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:40.060 UTC [orderer.common.server] func1 -> DEBU 67a Closing Deliver stream" -peer0.org1.example.com | "2019-05-02 01:30:47.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b8 Processing field: KafkaBrokers" -peer0.org1.example.com | "2019-05-02 01:30:47.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b9 Processing field: ChannelRestrictions" -peer0.org1.example.com | "2019-05-02 01:30:47.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6ba Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:47.705 UTC [common.channelconfig] NewStandardValues -> DEBU 6bb Initializing protos for *channelconfig.OrdererOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6bc Processing field: Endpoints" -peer0.org1.example.com | "2019-05-02 01:30:47.705 UTC [common.channelconfig] NewStandardValues -> DEBU 6bd Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6be Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.706 UTC [common.channelconfig] validateMSP -> DEBU 6bf Setting up MSP for org OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.706 UTC [msp] newBccspMsp -> DEBU 6c0 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.706 UTC [msp] New -> DEBU 6c1 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.706 UTC [msp] Setup -> DEBU 6c2 Setting up MSP instance OrdererMSP" -peer0.org1.example.com | "2019-05-02 01:30:47.707 UTC [msp.identity] newIdentity -> DEBU 6c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.707 UTC [msp.identity] newIdentity -> DEBU 6c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.708 UTC [msp] Validate -> DEBU 6c5 MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.709 UTC [common.channelconfig] NewStandardValues -> DEBU 6c6 Initializing protos for *channelconfig.ApplicationProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.709 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6c7 Processing field: ACLs" -peer0.org1.example.com | "2019-05-02 01:30:47.709 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6c8 Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:47.709 UTC [common.channelconfig] NewStandardValues -> DEBU 6c9 Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6ca Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:47.710 UTC [common.channelconfig] NewStandardValues -> DEBU 6cb Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6cc Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.710 UTC [common.channelconfig] Validate -> DEBU 6cd Anchor peers for org Org1MSP are anchor_peers: " -peer0.org1.example.com | "2019-05-02 01:30:47.710 UTC [common.channelconfig] validateMSP -> DEBU 6ce Setting up MSP for org Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.710 UTC [msp] newBccspMsp -> DEBU 6cf Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.710 UTC [msp] New -> DEBU 6d0 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.711 UTC [msp] Setup -> DEBU 6d1 Setting up MSP instance Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.712 UTC [msp.identity] newIdentity -> DEBU 6d2 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | "2019-05-02 01:30:40.061 UTC [comm.grpc.server] 1 -> INFO 67b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47278 grpc.code=OK grpc.call_duration=204.7017ms -orderer0.example.com | "2019-05-02 01:30:40.074 UTC [orderer.common.server] Deliver -> DEBU 67c Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:40.074 UTC [common.deliver] Handle -> DEBU 67d Starting new deliver loop for 192.168.240.9:47280" -orderer0.example.com | "2019-05-02 01:30:40.074 UTC [common.deliver] Handle -> DEBU 67e Attempting to read seek info message from 192.168.240.9:47280" -orderer0.example.com | "2019-05-02 01:30:40.075 UTC [orderer.consensus.etcdraft] Step -> INFO 67f 1 is starting a new election at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.075 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 680 1 became pre-candidate at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.076 UTC [orderer.consensus.etcdraft] poll -> INFO 681 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.076 UTC [orderer.consensus.etcdraft] campaign -> INFO 682 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.076 UTC [orderer.consensus.etcdraft] campaign -> INFO 683 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.077 UTC [orderer.common.cluster] NewStream -> DEBU 684 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" -orderer0.example.com | "2019-05-02 01:30:40.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 686 Sending msg of 28 bytes to 3 on channel businesschannel took 2.2948ms" -orderer0.example.com | "2019-05-02 01:30:40.080 UTC [orderer.common.cluster] NewStream -> DEBU 687 Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" -orderer0.example.com | "2019-05-02 01:30:40.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 688 Sending msg of 28 bytes to 2 on channel businesschannel took 249.5µs" -orderer0.example.com | "2019-05-02 01:30:40.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 689 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 954.5µs " -orderer0.example.com | "2019-05-02 01:30:40.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 685 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.082 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68a Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" -orderer0.example.com | "2019-05-02 01:30:40.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.192ms " -orderer0.example.com | "2019-05-02 01:30:40.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 343.8µs " -orderer0.example.com | "2019-05-02 01:30:40.084 UTC [orderer.common.cluster] Step -> DEBU 68d Connection from orderer2.example.com(192.168.240.4:47814)" -orderer0.example.com | "2019-05-02 01:30:40.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 68f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.085 UTC [orderer.common.cluster] Step -> DEBU 68e Connection from orderer1.example.com(192.168.240.3:58762)" -orderer0.example.com | "2019-05-02 01:30:40.086 UTC [orderer.consensus.etcdraft] poll -> INFO 690 1 received MsgPreVoteResp from 3 at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.087 UTC [orderer.common.cluster.step] handleMessage -> DEBU 691 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.087 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 692 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.087 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 693 1 became candidate at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.088 UTC [orderer.consensus.etcdraft] poll -> INFO 694 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.088 UTC [orderer.consensus.etcdraft] campaign -> INFO 695 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.088 UTC [orderer.consensus.etcdraft] campaign -> INFO 696 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.091 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 697 Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.713 UTC [msp.identity] newIdentity -> DEBU 6d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.714 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6d4 Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.714 UTC [msp] Validate -> DEBU 6d5 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.718 UTC [msp] getCertificationChain -> DEBU 6d6 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.718 UTC [msp] hasOURole -> DEBU 6d7 MSP Org1MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:30:47.718 UTC [msp] getCertificationChain -> DEBU 6d8 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.721 UTC [common.channelconfig] NewStandardValues -> DEBU 6d9 Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.722 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6db Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:47.722 UTC [common.channelconfig] NewStandardValues -> DEBU 6dc Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:30:47.722 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6dd Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.723 UTC [common.channelconfig] Validate -> DEBU 6de Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:30:40.091 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 698 Sending msg of 28 bytes to 3 on channel businesschannel took 184.1µs" -orderer0.example.com | "2019-05-02 01:30:40.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 699 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 330µs " -orderer0.example.com | "2019-05-02 01:30:40.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 211.9µs " -orderer0.example.com | "2019-05-02 01:30:40.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.097 UTC [orderer.consensus.etcdraft] poll -> INFO 69c 1 received MsgVoteResp from 3 at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69d Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.098 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 69e 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.098 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 69f 1 became leader at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.099 UTC [orderer.consensus.etcdraft] run -> INFO 6a0 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.100 UTC [orderer.consensus.etcdraft] run -> INFO 6a1 Leader 1 is present, quit campaign" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.101 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6a2 Raft leader changed: 0 -> 1" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.101 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6a3 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.101 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a4 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 118.2µs " -orderer0.example.com | "2019-05-02 01:30:40.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a5 Sending msg of 36 bytes to 2 on channel businesschannel took 27.2µs" -orderer0.example.com | "2019-05-02 01:30:40.104 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a6 Sending msg of 36 bytes to 3 on channel businesschannel took 54.7µs" -orderer0.example.com | "2019-05-02 01:30:40.104 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a7 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 184.6µs " -orderer0.example.com | "2019-05-02 01:30:40.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a9 Sending msg of 28 bytes to 2 on channel businesschannel took 86.8µs" -orderer0.example.com | "2019-05-02 01:30:40.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.5µs " -orderer0.example.com | "2019-05-02 01:30:40.107 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6ab Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:40.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ac Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ad Sending msg of 28 bytes to 3 on channel businesschannel took 113.2µs" -orderer0.example.com | "2019-05-02 01:30:40.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.7µs " -orderer0.example.com | "2019-05-02 01:30:40.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6af Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.111 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.275 UTC [policies] Evaluate -> DEBU 6b1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:30:40.275 UTC [policies] Evaluate -> DEBU 6b2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:40.275 UTC [policies] Evaluate -> DEBU 6b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-05-02 01:30:40.275 UTC [policies] Evaluate -> DEBU 6b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:40.275 UTC [policies] Evaluate -> DEBU 6b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-05-02 01:30:40.275 UTC [msp] DeserializeIdentity -> DEBU 6b6 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:40.275 UTC [msp.identity] newIdentity -> DEBU 6b7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:14.496 UTC [fsblkstorage] updateCheckpoint -> DEBU 65f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44241], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-05-02 09:27:14.497 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 660 [channel: testchainid] Wrote block [1]" +orderer0.example.com | "2019-05-02 09:27:14.560 UTC [common.deliver] deliverBlocks -> WARN 661 [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57142 because of consenter error" +orderer0.example.com | "2019-05-02 09:27:14.560 UTC [orderer.common.server] func1 -> DEBU 662 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:14.561 UTC [comm.grpc.server] 1 -> INFO 663 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57142 grpc.code=OK grpc.call_duration=203.5441ms +orderer0.example.com | "2019-05-02 09:27:14.577 UTC [orderer.common.server] Deliver -> DEBU 664 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:14.578 UTC [common.deliver] Handle -> DEBU 665 Starting new deliver loop for 172.18.0.8:57144" +orderer0.example.com | "2019-05-02 09:27:14.578 UTC [common.deliver] Handle -> DEBU 666 Attempting to read seek info message from 172.18.0.8:57144" +orderer0.example.com | "2019-05-02 09:27:14.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 667 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:14.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 668 Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +orderer0.example.com | "2019-05-02 09:27:14.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU 669 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs " +orderer0.example.com | "2019-05-02 09:27:14.778 UTC [common.deliver] deliverBlocks -> WARN 66a [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57144 because of consenter error" +orderer0.example.com | "2019-05-02 09:27:14.779 UTC [orderer.common.server] func1 -> DEBU 66b Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:14.779 UTC [comm.grpc.server] 1 -> INFO 66c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57144 grpc.code=OK grpc.call_duration=201.4329ms +orderer0.example.com | "2019-05-02 09:27:14.797 UTC [orderer.common.server] Deliver -> DEBU 66d Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:14.798 UTC [common.deliver] Handle -> DEBU 66e Starting new deliver loop for 172.18.0.8:57146" +orderer0.example.com | "2019-05-02 09:27:14.798 UTC [common.deliver] Handle -> DEBU 66f Attempting to read seek info message from 172.18.0.8:57146" +orderer0.example.com | "2019-05-02 09:27:14.997 UTC [common.deliver] deliverBlocks -> WARN 670 [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57146 because of consenter error" +orderer0.example.com | "2019-05-02 09:27:14.998 UTC [orderer.common.server] func1 -> DEBU 671 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:15.000 UTC [comm.grpc.server] 1 -> INFO 672 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57146 grpc.code=OK grpc.call_duration=202.9803ms +orderer0.example.com | "2019-05-02 09:27:15.019 UTC [orderer.common.server] Deliver -> DEBU 673 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:15.019 UTC [common.deliver] Handle -> DEBU 674 Starting new deliver loop for 172.18.0.8:57148" +orderer0.example.com | "2019-05-02 09:27:15.019 UTC [common.deliver] Handle -> DEBU 675 Attempting to read seek info message from 172.18.0.8:57148" +orderer0.example.com | "2019-05-02 09:27:15.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 676 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 677 Sending msg of 28 bytes to 3 on channel testchainid took 34.7µs" +orderer0.example.com | "2019-05-02 09:27:15.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU 678 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.2µs " +orderer0.example.com | "2019-05-02 09:27:15.220 UTC [common.deliver] deliverBlocks -> WARN 679 [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57148 because of consenter error" +orderer0.example.com | "2019-05-02 09:27:15.220 UTC [orderer.common.server] func1 -> DEBU 67a Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:15.220 UTC [comm.grpc.server] 1 -> INFO 67b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57148 grpc.code=OK grpc.call_duration=201.4772ms +orderer0.example.com | "2019-05-02 09:27:15.238 UTC [orderer.common.server] Deliver -> DEBU 67c Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:15.238 UTC [common.deliver] Handle -> DEBU 67d Starting new deliver loop for 172.18.0.8:57150" +orderer0.example.com | "2019-05-02 09:27:15.238 UTC [common.deliver] Handle -> DEBU 67e Attempting to read seek info message from 172.18.0.8:57150" +orderer0.example.com | "2019-05-02 09:27:15.442 UTC [common.deliver] deliverBlocks -> WARN 67f [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57150 because of consenter error" +orderer0.example.com | "2019-05-02 09:27:15.443 UTC [orderer.common.server] func1 -> DEBU 680 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:15.443 UTC [comm.grpc.server] 1 -> INFO 681 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57150 grpc.code=OK grpc.call_duration=206.8682ms +orderer0.example.com | "2019-05-02 09:27:15.463 UTC [orderer.common.server] Deliver -> DEBU 682 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:15.464 UTC [common.deliver] Handle -> DEBU 683 Starting new deliver loop for 172.18.0.8:57152" +orderer0.example.com | "2019-05-02 09:27:15.465 UTC [common.deliver] Handle -> DEBU 684 Attempting to read seek info message from 172.18.0.8:57152" +orderer0.example.com | "2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] Step -> INFO 685 1 is starting a new election at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 686 1 became pre-candidate at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] poll -> INFO 687 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] campaign -> INFO 688 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] campaign -> INFO 689 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.488 UTC [orderer.common.cluster] NewStream -> DEBU 68a Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-05-02 09:27:15.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68b Sending msg of 28 bytes to 2 on channel businesschannel took 357.3µs" +orderer0.example.com | "2019-05-02 09:27:15.489 UTC [orderer.common.cluster] NewStream -> DEBU 68c Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-05-02 09:27:15.490 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68d Sending msg of 28 bytes to 3 on channel businesschannel took 821.6µs" +orderer0.example.com | "2019-05-02 09:27:15.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 964.2µs " +orderer0.example.com | "2019-05-02 09:27:15.500 UTC [orderer.common.cluster] Step -> DEBU 690 Connection from orderer1.example.com(172.18.0.4:44256)" +orderer0.example.com | "2019-05-02 09:27:15.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 691 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.501 UTC [orderer.consensus.etcdraft] poll -> INFO 692 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.501 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 693 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.502 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 694 1 became candidate at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.502 UTC [orderer.consensus.etcdraft] poll -> INFO 695 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.502 UTC [orderer.consensus.etcdraft] campaign -> INFO 696 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.503 UTC [orderer.consensus.etcdraft] campaign -> INFO 697 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.197ms " +orderer0.example.com | "2019-05-02 09:27:15.504 UTC [orderer.common.cluster] Step -> DEBU 698 Connection from orderer2.example.com(172.18.0.3:56182)" +orderer0.example.com | "2019-05-02 09:27:15.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 699 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69a Sending msg of 28 bytes to 3 on channel businesschannel took 96.6µs" +orderer0.example.com | "2019-05-02 09:27:15.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69b Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +orderer0.example.com | "2019-05-02 09:27:15.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 152.1µs " +orderer0.example.com | "2019-05-02 09:27:15.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.3µs " +orderer0.example.com | "2019-05-02 09:27:15.511 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] poll -> INFO 69f 1 received MsgVoteResp from 3 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6a0 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6a1 1 became leader at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] run -> INFO 6a2 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.514 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.514 UTC [orderer.consensus.etcdraft] run -> INFO 6a4 Leader 1 is present, quit campaign" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.514 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a5 Sending msg of 36 bytes to 3 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-05-02 09:27:15.515 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a6 Sending msg of 36 bytes to 2 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-05-02 09:27:15.515 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a7 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 416.5µs " +orderer0.example.com | "2019-05-02 09:27:15.516 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6a8 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.516 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6a9 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.516 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6aa Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " +orderer0.example.com | "2019-05-02 09:27:15.522 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ab Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.522 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ac Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +orderer0.example.com | "2019-05-02 09:27:15.523 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214.9µs " +orderer0.example.com | "2019-05-02 09:27:15.524 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6ae Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:15.524 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6af Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.524 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b0 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +orderer0.example.com | "2019-05-02 09:27:15.525 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.3µs " +orderer0.example.com | "2019-05-02 09:27:15.526 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.662 UTC [policies] Evaluate -> DEBU 6b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:15.663 UTC [policies] Evaluate -> DEBU 6b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:15.664 UTC [policies] Evaluate -> DEBU 6b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:15.664 UTC [policies] Evaluate -> DEBU 6b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:15.664 UTC [policies] Evaluate -> DEBU 6b8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:15.665 UTC [msp] DeserializeIdentity -> DEBU 6b9 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:15.665 UTC [msp.identity] newIdentity -> DEBU 6ba Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -6953,544 +6488,495 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:40.275 UTC [cauthdsl] func1 -> DEBU 6b8 0xc00046c450 gate 1556760640275935400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.723 UTC [common.channelconfig] validateMSP -> DEBU 6df Setting up MSP for org Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.723 UTC [msp] newBccspMsp -> DEBU 6e0 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.723 UTC [msp] New -> DEBU 6e1 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.723 UTC [msp] Setup -> DEBU 6e2 Setting up MSP instance Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.722 UTC [msp.identity] Sign -> DEBU 6da Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.725 UTC [msp.identity] newIdentity -> DEBU 6e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.728 UTC [msp.identity] newIdentity -> DEBU 6e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.729 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6e5 Checking if identity satisfies role [CLIENT] for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.729 UTC [msp] Validate -> DEBU 6e6 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.730 UTC [msp] getCertificationChain -> DEBU 6e7 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.730 UTC [msp] hasOURole -> DEBU 6e8 MSP Org2MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:30:47.731 UTC [msp] getCertificationChain -> DEBU 6e9 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.731 UTC [msp] Setup -> DEBU 6ea Setting up the MSP manager (3 msps)" -peer0.org1.example.com | "2019-05-02 01:30:47.732 UTC [msp] Setup -> DEBU 6eb MSP manager setup complete, setup 3 msps" -peer0.org1.example.com | "2019-05-02 01:30:47.732 UTC [policies] NewManagerImpl -> DEBU 6ec Proposed new policy Readers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.733 UTC [policies] NewManagerImpl -> DEBU 6ed Proposed new policy Writers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.733 UTC [policies] NewManagerImpl -> DEBU 6ee Proposed new policy Admins for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.734 UTC [policies] NewManagerImpl -> DEBU 6ef Proposed new policy Writers for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.734 UTC [policies] NewManagerImpl -> DEBU 6f0 Proposed new policy Admins for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.734 UTC [policies] NewManagerImpl -> DEBU 6f1 Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.734 UTC [policies] NewManagerImpl -> DEBU 6f2 Proposed new policy Readers for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.735 UTC [policies] NewManagerImpl -> DEBU 6f3 Proposed new policy Readers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.735 UTC [policies] NewManagerImpl -> DEBU 6f4 Proposed new policy Writers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.736 UTC [policies] NewManagerImpl -> DEBU 6f5 Proposed new policy Admins for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.736 UTC [policies] NewManagerImpl -> DEBU 6f6 Proposed new policy Endorsement for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.737 UTC [policies] NewManagerImpl -> DEBU 6f7 Proposed new policy Admins for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.737 UTC [policies] NewManagerImpl -> DEBU 6f8 Proposed new policy Endorsement for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.738 UTC [policies] NewManagerImpl -> DEBU 6f9 Proposed new policy Readers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.738 UTC [policies] NewManagerImpl -> DEBU 6fa Proposed new policy Writers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.724 UTC [msp.identity] Sign -> DEBU 6fb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.738 UTC [policies] NewManagerImpl -> DEBU 6fc Proposed new policy LifecycleEndorsement for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.740 UTC [policies] NewManagerImpl -> DEBU 6fd Proposed new policy Endorsement for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.740 UTC [policies] NewManagerImpl -> DEBU 6ff Proposed new policy Readers for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.750 UTC [comm.grpc.server] 1 -> INFO 700 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.749Z grpc.peer_address=192.168.240.6:44962 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=169.4µs -peer0.org1.example.com | "2019-05-02 01:30:47.741 UTC [policies] NewManagerImpl -> DEBU 701 Proposed new policy Writers for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.755 UTC [policies] NewManagerImpl -> DEBU 702 Proposed new policy Admins for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.759 UTC [policies] NewManagerImpl -> DEBU 703 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [cauthdsl] func2 -> DEBU 6b9 0xc00046c450 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [cauthdsl] func2 -> DEBU 6ba 0xc00046c450 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6bb Checking if identity satisfies MEMBER role for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [msp] Validate -> DEBU 6bc MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [msp] getCertificationChain -> DEBU 6bd MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [cauthdsl] func2 -> DEBU 6be 0xc00046c450 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [msp.identity] Verify -> DEBU 6bf Verify: digest = 00000000 7b e2 92 6d e7 8f c0 c2 9f f6 10 cf d8 dd b9 58 |{..m...........X| -orderer0.example.com | 00000010 82 34 14 3a 64 6e a1 95 12 c7 a7 fa 46 28 9f b4 |.4.:dn......F(..|" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [msp.identity] Verify -> DEBU 6c0 Verify: sig = 00000000 30 44 02 20 3d 47 97 c1 98 02 8c ed 91 b4 21 da |0D. =G........!.| -orderer0.example.com | 00000010 e6 02 07 ff 1a 84 4b fa 0e a3 5b d0 e4 f8 7e 1a |......K...[...~.| -orderer0.example.com | 00000020 20 87 40 46 02 20 21 65 a8 1e 11 07 8a da 3e 09 | .@F. !e......>.| -orderer0.example.com | 00000030 cc 99 00 06 f2 4e f6 34 86 67 46 f7 a2 da ea 06 |.....N.4.gF.....| -orderer0.example.com | 00000040 8f 85 14 d7 67 9e |....g.|" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [cauthdsl] func2 -> DEBU 6c1 0xc00046c450 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [cauthdsl] func1 -> DEBU 6c2 0xc00046c450 gate 1556760640275935400 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c3 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c5 Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c7 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:40.277 UTC [common.deliver] deliverBlocks -> DEBU 6c9 [channel: businesschannel] Received seekInfo (0xc000c891c0) start: > stop: > from 192.168.240.9:47280" -orderer0.example.com | "2019-05-02 01:30:40.277 UTC [fsblkstorage] Next -> DEBU 6ca Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-05-02 01:30:40.277 UTC [fsblkstorage] newBlockfileStream -> DEBU 6cb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:30:40.277 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6cc Remaining bytes=[23940], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:40.277 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6cd Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:30:40.277 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6ce blockbytes [23937] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:40.277 UTC [common.deliver] deliverBlocks -> DEBU 6cf [channel: businesschannel] Delivering block [0] for (0xc000c891c0) for 192.168.240.9:47280" -orderer0.example.com | "2019-05-02 01:30:40.277 UTC [common.deliver] deliverBlocks -> DEBU 6d0 [channel: businesschannel] Done delivering to 192.168.240.9:47280 for (0xc000c891c0)" -orderer0.example.com | "2019-05-02 01:30:40.277 UTC [common.deliver] Handle -> DEBU 6d1 Waiting for new SeekInfo from 192.168.240.9:47280" -orderer0.example.com | "2019-05-02 01:30:40.277 UTC [common.deliver] Handle -> DEBU 6d2 Attempting to read seek info message from 192.168.240.9:47280" -orderer0.example.com | "2019-05-02 01:30:40.281 UTC [grpc] infof -> DEBU 6d3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:40.281 UTC [grpc] infof -> DEBU 6d4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:40.281 UTC [grpc] infof -> DEBU 6d5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:40.281 UTC [common.deliver] Handle -> WARN 6d6 Error reading from 192.168.240.9:47280: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:30:40.281 UTC [orderer.common.server] func1 -> DEBU 6d7 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:30:40.281 UTC [comm.grpc.server] 1 -> INFO 6d8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47280 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=207.853ms -orderer0.example.com | "2019-05-02 01:30:40.281 UTC [grpc] infof -> DEBU 6d9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:40.282 UTC [grpc] infof -> DEBU 6da transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.759 UTC [policies] NewManagerImpl -> DEBU 704 Proposed new policy Writers for Channel" -peer0.org1.example.com | "2019-05-02 01:30:47.759 UTC [policies] NewManagerImpl -> DEBU 705 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:40.282 UTC [grpc] infof -> DEBU 6db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:40.282 UTC [grpc] infof -> DEBU 6dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:40.282 UTC [grpc] infof -> DEBU 6dd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:40.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6de Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" -orderer0.example.com | "2019-05-02 01:30:40.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6df Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" -orderer0.example.com | "2019-05-02 01:30:40.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.1µs " -orderer0.example.com | "2019-05-02 01:30:40.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.5µs " -orderer0.example.com | "2019-05-02 01:30:40.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.577 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.577 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:40.577 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e5 Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" -orderer0.example.com | "2019-05-02 01:30:40.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " -orderer0.example.com | "2019-05-02 01:30:40.768 UTC [orderer.common.server] replicateDisabledChains -> DEBU 6e7 No inactive chains to try to replicate" -orderer0.example.com | "2019-05-02 01:30:41.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e8 Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" -orderer0.example.com | "2019-05-02 01:30:41.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e9 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" -orderer0.example.com | "2019-05-02 01:30:41.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 207.5µs " -orderer0.example.com | "2019-05-02 01:30:41.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176µs " -peer0.org1.example.com | "2019-05-02 01:30:47.739 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6fe Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:55182" -peer0.org1.example.com | "2019-05-02 01:30:47.760 UTC [gossip.comm] authenticateRemotePeer -> DEBU 706 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:55182" -peer0.org1.example.com | "2019-05-02 01:30:47.761 UTC [msp] DeserializeIdentity -> DEBU 707 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.762 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.762 UTC [msp] DeserializeIdentity -> DEBU 709 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.764 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.764 UTC [msp] DeserializeIdentity -> DEBU 70b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.770 UTC [common.configtx] addToMap -> DEBU 70c Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-05-02 01:30:47.780 UTC [common.configtx] addToMap -> DEBU 70e Adding to config map: [Group] /Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.782 UTC [comm.grpc.server] 1 -> INFO 70f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.781Z grpc.peer_address=192.168.240.8:38802 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=167.6µs -peer0.org1.example.com | "2019-05-02 01:30:47.782 UTC [common.configtx] addToMap -> DEBU 710 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.783 UTC [common.configtx] addToMap -> DEBU 711 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.783 UTC [common.configtx] addToMap -> DEBU 712 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.783 UTC [common.configtx] addToMap -> DEBU 713 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.783 UTC [common.configtx] addToMap -> DEBU 714 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.785 UTC [common.configtx] addToMap -> DEBU 715 Adding to config map: [Value] /Channel/Orderer/BatchSize" -peer0.org1.example.com | "2019-05-02 01:30:47.785 UTC [common.configtx] addToMap -> DEBU 716 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -peer0.org1.example.com | "2019-05-02 01:30:47.786 UTC [common.configtx] addToMap -> DEBU 717 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -peer0.org1.example.com | "2019-05-02 01:30:47.786 UTC [common.configtx] addToMap -> DEBU 718 Adding to config map: [Value] /Channel/Orderer/Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:47.787 UTC [gossip.gossip] handleMessage -> DEBU 71a Entering, 192.168.240.5:55180 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.787 UTC [gossip.gossip] handleMessage -> DEBU 71b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.786 UTC [common.configtx] addToMap -> DEBU 719 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -peer0.org1.example.com | "2019-05-02 01:30:47.787 UTC [common.configtx] addToMap -> DEBU 71c Adding to config map: [Policy] /Channel/Orderer/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.787 UTC [common.configtx] addToMap -> DEBU 71d Adding to config map: [Policy] /Channel/Orderer/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.787 UTC [common.configtx] addToMap -> DEBU 71e Adding to config map: [Policy] /Channel/Orderer/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.787 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71f Got message: GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.787 UTC [common.configtx] addToMap -> DEBU 720 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:30:47.788 UTC [common.configtx] addToMap -> DEBU 721 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:30:47.789 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 722 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:47.788 UTC [common.configtx] addToMap -> DEBU 723 Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.790 UTC [msp] DeserializeIdentity -> DEBU 724 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.791 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 725 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.791 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 726 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.797 UTC [grpc] infof -> DEBU 728 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.791 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 727 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.798 UTC [policies] Evaluate -> DEBU 729 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.799 UTC [msp.identity] Sign -> DEBU 72a Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.799 UTC [msp.identity] Sign -> DEBU 72b Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.798 UTC [policies] Evaluate -> DEBU 72c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.799 UTC [policies] Evaluate -> DEBU 72d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.799 UTC [cauthdsl] func1 -> DEBU 72e 0xc00038f8a0 gate 1556760647799780200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.799 UTC [cauthdsl] func2 -> DEBU 72f 0xc00038f8a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.800 UTC [gossip.comm] authenticateRemotePeer -> DEBU 730 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.8:38802" -peer0.org1.example.com | "2019-05-02 01:30:47.800 UTC [cauthdsl] func2 -> DEBU 731 0xc00038f8a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.800 UTC [cauthdsl] func2 -> DEBU 732 0xc00038f8a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.800 UTC [msp.identity] Verify -> DEBU 733 Verify: digest = 00000000 9c 5f 7e 58 f0 34 09 00 93 ae 5d 98 6e 54 8a 6e |._~X.4....].nT.n| -peer0.org1.example.com | 00000010 de ff f9 17 16 3d a3 41 76 58 1e ab 6a 7f 94 a6 |.....=.AvX..j...|" -peer0.org1.example.com | "2019-05-02 01:30:47.800 UTC [msp.identity] Verify -> DEBU 734 Verify: sig = 00000000 30 44 02 20 41 09 0b c1 19 17 1a 22 88 8f 4c d7 |0D. A......"..L.| -peer0.org1.example.com | 00000010 37 48 5c a3 b2 27 57 d3 63 39 1d 05 c4 c1 87 1e |7H\..'W.c9......| -peer0.org1.example.com | 00000020 36 95 16 6f 02 20 60 5e cf 5a 46 d9 46 53 85 83 |6..o. `^.ZF.FS..| -peer0.org1.example.com | 00000030 91 8d 9b 85 c2 e3 e9 e7 7f 64 9e 91 c7 61 5e fe |.........d...a^.| -peer0.org1.example.com | 00000040 a3 3a 48 b5 bc 58 |.:H..X|" -orderer0.example.com | "2019-05-02 01:30:41.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ec Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:41.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ed Sending msg of 28 bytes to 3 on channel testchainid took 11.5µs" -orderer0.example.com | "2019-05-02 01:30:41.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ee Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " -peer0.org1.example.com | "2019-05-02 01:30:47.801 UTC [gossip.comm] authenticateRemotePeer -> DEBU 735 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:38802" -peer0.org1.example.com | "2019-05-02 01:30:47.801 UTC [msp] DeserializeIdentity -> DEBU 736 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:41.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ef Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:41.084 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:41.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:41.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f2 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" -orderer0.example.com | "2019-05-02 01:30:41.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.2µs " -orderer0.example.com | "2019-05-02 01:30:41.582 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f4 Sending msg of 28 bytes to 2 on channel businesschannel took 891.3µs" -orderer0.example.com | "2019-05-02 01:30:41.583 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f5 Sending msg of 28 bytes to 3 on channel businesschannel took 25.2µs" -orderer0.example.com | "2019-05-02 01:30:41.584 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.4µs " -orderer0.example.com | "2019-05-02 01:30:41.584 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.4µs " -orderer0.example.com | "2019-05-02 01:30:41.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:41.587 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:42.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fa Sending msg of 28 bytes to 3 on channel businesschannel took 52.4µs" -orderer0.example.com | "2019-05-02 01:30:42.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fb Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" -orderer0.example.com | "2019-05-02 01:30:42.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.3µs " -orderer0.example.com | "2019-05-02 01:30:42.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.3µs " -orderer0.example.com | "2019-05-02 01:30:42.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6fe Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:42.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ff Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:42.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 700 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:42.084 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 701 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" -orderer0.example.com | "2019-05-02 01:30:42.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU 702 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 729.8µs " -orderer0.example.com | "2019-05-02 01:30:42.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 703 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.2µs " -orderer0.example.com | "2019-05-02 01:30:42.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 704 Sending msg of 28 bytes to 2 on channel businesschannel took 103.7µs" -orderer0.example.com | "2019-05-02 01:30:42.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 705 Sending msg of 28 bytes to 3 on channel businesschannel took 43.7µs" -orderer0.example.com | "2019-05-02 01:30:42.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 706 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 148.2µs " -orderer0.example.com | "2019-05-02 01:30:42.577 UTC [orderer.common.cluster.step] handleMessage -> DEBU 707 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:42.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 708 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:42.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 709 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:42.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70a Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" -orderer0.example.com | "2019-05-02 01:30:42.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " -orderer0.example.com | "2019-05-02 01:30:43.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70c Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" -orderer0.example.com | "2019-05-02 01:30:43.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 177.6µs " -orderer0.example.com | "2019-05-02 01:30:43.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70e Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" -orderer0.example.com | "2019-05-02 01:30:43.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4599ms " -orderer0.example.com | "2019-05-02 01:30:43.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 710 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:43.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 711 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" -orderer0.example.com | "2019-05-02 01:30:43.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 712 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " -orderer0.example.com | "2019-05-02 01:30:43.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 713 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:43.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 714 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:43.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 715 Sending msg of 28 bytes to 2 on channel businesschannel took 61.1µs" -orderer0.example.com | "2019-05-02 01:30:43.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 716 Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" -orderer0.example.com | "2019-05-02 01:30:43.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 717 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.2µs " -orderer0.example.com | "2019-05-02 01:30:43.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 718 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.8µs " -orderer0.example.com | "2019-05-02 01:30:43.577 UTC [orderer.common.cluster.step] handleMessage -> DEBU 719 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:43.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71a Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:43.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:43.581 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71c Sending msg of 28 bytes to 3 on channel testchainid took 109.7µs" -orderer0.example.com | "2019-05-02 01:30:43.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122µs " -orderer0.example.com | "2019-05-02 01:30:44.698 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71e Sending msg of 28 bytes to 2 on channel businesschannel took 28.2µs" -orderer0.example.com | "2019-05-02 01:30:44.698 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71f Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" -orderer0.example.com | "2019-05-02 01:30:44.699 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.6µs " -orderer0.example.com | "2019-05-02 01:30:44.699 UTC [orderer.common.cluster.step] sendMessage -> DEBU 721 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.2µs " -orderer0.example.com | "2019-05-02 01:30:44.702 UTC [orderer.common.cluster.step] handleMessage -> DEBU 722 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:44.703 UTC [orderer.common.cluster.step] handleMessage -> DEBU 723 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:44.703 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 724 Sending msg of 28 bytes to 3 on channel testchainid took 57.6µs" -orderer0.example.com | "2019-05-02 01:30:44.703 UTC [orderer.common.cluster.step] sendMessage -> DEBU 725 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.8µs " -orderer0.example.com | "2019-05-02 01:30:44.704 UTC [orderer.common.cluster.step] handleMessage -> DEBU 726 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:44.998 UTC [orderer.common.server] Deliver -> DEBU 727 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:44.998 UTC [common.deliver] Handle -> DEBU 728 Starting new deliver loop for 192.168.240.9:47306" -orderer0.example.com | "2019-05-02 01:30:44.998 UTC [common.deliver] Handle -> DEBU 729 Attempting to read seek info message from 192.168.240.9:47306" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [orderer.common.server] Broadcast -> DEBU 72a Starting new Broadcast handler" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [orderer.common.broadcast] Handle -> DEBU 72b Starting new broadcast loop for 192.168.240.9:47308" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 72c [channel: businesschannel] Broadcast is processing config update message from 192.168.240.9:47308" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 72d Processing config update message for channel businesschannel" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 72e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 72f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 730 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 731 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 732 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [cauthdsl] func1 -> DEBU 733 0xc00018f9c0 gate 1556760645012703400 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [cauthdsl] func2 -> DEBU 734 0xc00018f9c0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [cauthdsl] func2 -> DEBU 735 0xc00018f9c0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [cauthdsl] func2 -> DEBU 736 0xc00018f9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [cauthdsl] func2 -> DEBU 737 0xc00018f9c0 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [cauthdsl] func1 -> DEBU 738 0xc00018f9c0 gate 1556760645012703400 evaluation fails" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 739 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 73a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 73b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [cauthdsl] func1 -> DEBU 73c 0xc00026c330 gate 1556760645013048100 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [cauthdsl] func2 -> DEBU 73d 0xc00026c330 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.801 UTC [msp] DeserializeIdentity -> DEBU 737 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.802 UTC [msp.identity] Sign -> DEBU 738 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.802 UTC [msp.identity] Sign -> DEBU 739 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.802 UTC [gossip.comm] authenticateRemotePeer -> DEBU 73a Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.6:44962" -peer0.org1.example.com | "2019-05-02 01:30:47.802 UTC [gossip.comm] authenticateRemotePeer -> DEBU 73b Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:44962" -peer0.org1.example.com | "2019-05-02 01:30:47.803 UTC [msp.identity] Verify -> DEBU 73c Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-05-02 01:30:47.803 UTC [msp.identity] Verify -> DEBU 73d Verify: sig = 00000000 30 45 02 21 00 b8 61 dd b0 2e 79 7c 48 07 ce 5b |0E.!..a...y|H..[| -peer0.org1.example.com | 00000010 65 f9 d9 24 87 c9 5c 8f 13 63 2a e9 ab a0 e1 18 |e..$..\..c*.....| -peer0.org1.example.com | 00000020 b8 a4 9f 27 f8 02 20 2e 4e 3e 2a 34 fa 2e fe e7 |...'.. .N>*4....| -peer0.org1.example.com | 00000030 0c 30 9f d7 ea 64 52 3a 5a 98 6d 38 0f bc 84 84 |.0...dR:Z.m8....| -peer0.org1.example.com | 00000040 b9 36 f0 f1 63 a1 da |.6..c..|" -peer0.org1.example.com | "2019-05-02 01:30:47.803 UTC [gossip.comm] authenticateRemotePeer -> DEBU 73e Authenticated 192.168.240.6:44962" -peer0.org1.example.com | "2019-05-02 01:30:47.803 UTC [gossip.comm] GossipStream -> DEBU 73f Servicing 192.168.240.6:44962" -peer0.org1.example.com | "2019-05-02 01:30:47.803 UTC [gossip.comm] serviceConnection -> DEBU 740 Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:30:47.804 UTC [gossip.comm] writeToStream -> DEBU 741 Closing writing to stream" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [cauthdsl] func2 -> DEBU 73e 0xc00026c330 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [cauthdsl] func2 -> DEBU 73f 0xc00026c330 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [msp.identity] Verify -> DEBU 740 Verify: digest = 00000000 60 8d 00 21 bb e7 5c c0 ce ba 59 a4 d3 76 5b 12 |`..!..\...Y..v[.| -orderer0.example.com | 00000010 c5 72 d9 ff 23 36 0e c9 19 9b 14 c6 28 45 fb fc |.r..#6......(E..|" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [msp.identity] Verify -> DEBU 741 Verify: sig = 00000000 30 44 02 20 56 c5 45 81 8b 36 5a ba ff 92 00 29 |0D. V.E..6Z....)| -orderer0.example.com | 00000010 3d f0 9b 9d 31 64 22 91 24 ba 63 23 0d d4 04 20 |=...1d".$.c#... | -orderer0.example.com | 00000020 bb 58 60 25 02 20 74 1f f6 5e d9 fe f6 84 c2 6a |.X`%. t..^.....j| -orderer0.example.com | 00000030 39 8a a1 23 fc 6f 62 7b 10 7b 89 dc a3 3b 09 63 |9..#.ob{.{...;.c| -orderer0.example.com | 00000040 fa 57 c8 6c b4 0a |.W.l..|" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [cauthdsl] func2 -> DEBU 742 0xc00026c330 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [cauthdsl] func1 -> DEBU 743 0xc00026c330 gate 1556760645013048100 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 744 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 745 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 746 Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 747 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 748 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 749 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [common.configtx] addToMap -> DEBU 74a Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [common.configtx] addToMap -> DEBU 74b Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [common.configtx] addToMap -> DEBU 74c Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [common.configtx] addToMap -> DEBU 74d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:45.013 UTC [common.configtx] addToMap -> DEBU 74e Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 74f Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 750 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 751 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 752 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 753 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 754 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 755 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 756 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 757 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 758 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 759 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 75a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] verifyDeltaSet -> DEBU 75b Processing change to key: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [common.configtx] policyForItem -> DEBU 75c Getting policy for item Org1MSP with mod_policy Admins" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 75d Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 75e Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 75f Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 760 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 761 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 762 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 763 Manager Channel/Application looking up path [Org1MSP]" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 764 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 765 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 766 Manager Channel/Application/Org1MSP looking up path []" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [policies] Evaluate -> DEBU 767 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [cauthdsl] func1 -> DEBU 768 0xc0002eb3e0 gate 1556760645014939100 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:45.014 UTC [cauthdsl] func2 -> DEBU 769 0xc0002eb3e0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [cauthdsl] func2 -> DEBU 76a 0xc0002eb3e0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 76b Checking if identity satisfies ADMIN role for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [cauthdsl] func2 -> DEBU 76c 0xc0002eb3e0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [msp.identity] Verify -> DEBU 76d Verify: digest = 00000000 7e e0 d8 d0 d7 b3 a3 c0 01 cb 90 33 37 60 be ef |~..........37`..| -orderer0.example.com | 00000010 83 04 8b cc e0 6f 0e 3f 09 4a b5 dc 79 83 5e 60 |.....o.?.J..y.^`|" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [msp.identity] Verify -> DEBU 76e Verify: sig = 00000000 30 44 02 20 39 8e 08 37 34 ec ec 41 53 c4 ad ba |0D. 9..74..AS...| -orderer0.example.com | 00000010 2b dc ff 17 42 53 d2 3d 6f 68 d1 51 80 64 85 d7 |+...BS.=oh.Q.d..| -peer0.org1.example.com | "2019-05-02 01:30:47.773 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 742 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 743 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.804 UTC [policies] Evaluate -> DEBU 744 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.804 UTC [policies] Evaluate -> DEBU 745 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.804 UTC [policies] Evaluate -> DEBU 746 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.804 UTC [cauthdsl] func1 -> DEBU 747 0xc0003b1e90 gate 1556760647804862000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.805 UTC [cauthdsl] func2 -> DEBU 748 0xc0003b1e90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.805 UTC [cauthdsl] func2 -> DEBU 749 0xc0003b1e90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.805 UTC [cauthdsl] func2 -> DEBU 74a 0xc0003b1e90 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.805 UTC [msp.identity] Verify -> DEBU 74b Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-05-02 01:30:47.805 UTC [msp.identity] Verify -> DEBU 74c Verify: sig = 00000000 30 45 02 21 00 a2 44 13 2b 23 ad 6f 95 10 ff f5 |0E.!..D.+#.o....| -peer0.org1.example.com | 00000010 d8 cf 2a 0e 6c 5e ff b4 d4 7e a1 df ea 03 8d 5c |..*.l^...~.....\| -peer0.org1.example.com | 00000020 bb 02 97 4a be 02 20 02 77 8a 8c b1 0e 4a 41 bc |...J.. .w....JA.| -peer0.org1.example.com | 00000030 e6 d4 30 e4 2d 11 fa 53 a6 1f 53 2e 16 64 20 c3 |..0.-..S..S..d .| -peer0.org1.example.com | 00000040 16 26 3d f2 87 7f 49 |.&=...I|" -peer0.org1.example.com | "2019-05-02 01:30:47.805 UTC [cauthdsl] func2 -> DEBU 74d 0xc0003b1e90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.805 UTC [cauthdsl] func1 -> DEBU 74e 0xc0003b1e90 gate 1556760647804862000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.805 UTC [policies] Evaluate -> DEBU 74f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.805 UTC [policies] Evaluate -> DEBU 750 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.805 UTC [policies] Evaluate -> DEBU 751 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.806 UTC [policies] Evaluate -> DEBU 752 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.806 UTC [gossip.comm] authenticateRemotePeer -> DEBU 753 Authenticated 192.168.240.5:55182" -peer0.org1.example.com | "2019-05-02 01:30:47.806 UTC [gossip.comm] GossipStream -> DEBU 754 Servicing 192.168.240.5:55182" -peer0.org1.example.com | "2019-05-02 01:30:47.807 UTC [gossip.comm] readFromStream -> DEBU 755 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -peer0.org1.example.com | "2019-05-02 01:30:47.807 UTC [gossip.comm] writeToStream -> DEBU 756 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:30:47.807 UTC [gossip.comm] serviceConnection -> DEBU 757 Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:30:47.808 UTC [gossip.comm] func2 -> DEBU 758 Client 192.168.240.5:55180 disconnected" -peer0.org1.example.com | "2019-05-02 01:30:47.808 UTC [comm.grpc.server] 1 -> INFO 759 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.5:55180 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=246.1729ms -peer0.org1.example.com | "2019-05-02 01:30:47.808 UTC [gossip.comm] serviceConnection -> DEBU 75a Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:30:47.808 UTC [gossip.comm] func2 -> DEBU 75b Client 192.168.240.5:55182 disconnected" -peer0.org1.example.com | "2019-05-02 01:30:47.808 UTC [comm.grpc.server] 1 -> INFO 75c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.721Z grpc.peer_address=192.168.240.5:55182 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=86.56ms -peer0.org1.example.com | "2019-05-02 01:30:47.809 UTC [msp.identity] newIdentity -> DEBU 75d Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c -peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv -peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr -peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.809 UTC [grpc] infof -> DEBU 762 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.810 UTC [gossip.comm] readFromStream -> DEBU 763 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-05-02 01:30:47.810 UTC [gossip.comm] func2 -> DEBU 764 Client 192.168.240.6:44962 disconnected" -peer0.org1.example.com | "2019-05-02 01:30:47.810 UTC [comm.grpc.server] 1 -> INFO 765 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.801Z grpc.peer_address=192.168.240.6:44962 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.9452ms -orderer0.example.com | 00000020 4f 85 ee ad 02 20 6a 36 2b aa 0f 2c 88 10 ef 67 |O.... j6+..,...g| -orderer0.example.com | 00000030 83 9e 48 8b 6f d5 dc 74 97 3a a1 54 c5 58 6e c1 |..H.o..t.:.T.Xn.| -orderer0.example.com | 00000040 78 e3 76 0b 0d 01 |x.v...|" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [cauthdsl] func2 -> DEBU 76f 0xc0002eb3e0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [cauthdsl] func1 -> DEBU 770 0xc0002eb3e0 gate 1556760645014939100 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [policies] Evaluate -> DEBU 771 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.811 UTC [gossip.comm] writeToStream -> DEBU 766 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:30:47.790 UTC [common.configtx] addToMap -> DEBU 767 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:47.811 UTC [common.configtx] addToMap -> DEBU 768 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.811 UTC [common.configtx] addToMap -> DEBU 769 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:47.811 UTC [common.configtx] addToMap -> DEBU 76a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.811 UTC [common.configtx] addToMap -> DEBU 76b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.811 UTC [common.configtx] addToMap -> DEBU 76c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.812 UTC [common.configtx] addToMap -> DEBU 76d Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.812 UTC [common.configtx] addToMap -> DEBU 76e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:47.812 UTC [common.configtx] addToMap -> DEBU 76f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.809 UTC [gossip.comm] readFromStream -> DEBU 75e 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -peer0.org1.example.com | "2019-05-02 01:30:47.809 UTC [gossip.comm] writeToStream -> DEBU 75f Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:30:47.809 UTC [cauthdsl] func2 -> DEBU 760 0xc00038f8a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.809 UTC [grpc] infof -> DEBU 761 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.812 UTC [common.configtx] addToMap -> DEBU 770 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.813 UTC [common.configtx] addToMap -> DEBU 773 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.813 UTC [common.configtx] addToMap -> DEBU 774 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.814 UTC [common.configtx] addToMap -> DEBU 775 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:47.815 UTC [common.configtx] addToMap -> DEBU 776 Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-05-02 01:30:47.815 UTC [common.configtx] addToMap -> DEBU 777 Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:47.812 UTC [cauthdsl] func1 -> DEBU 771 0xc00038f8a0 gate 1556760647799780200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.813 UTC [msp] Validate -> DEBU 772 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.816 UTC [common.configtx] addToMap -> DEBU 778 Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.817 UTC [policies] Evaluate -> DEBU 779 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.818 UTC [common.configtx] addToMap -> DEBU 77a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-05-02 01:30:47.820 UTC [common.configtx] addToMap -> DEBU 77c Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:47.821 UTC [common.configtx] addToMap -> DEBU 77d Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.821 UTC [common.configtx] addToMap -> DEBU 77e Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.822 UTC [common.configtx] addToMap -> DEBU 77f Adding to config map: [Value] /Channel/OrdererAddresses" -peer0.org1.example.com | "2019-05-02 01:30:47.823 UTC [common.configtx] addToMap -> DEBU 780 Adding to config map: [Value] /Channel/Capabilities" -peer0.org1.example.com | "2019-05-02 01:30:47.824 UTC [common.configtx] addToMap -> DEBU 781 Adding to config map: [Value] /Channel/Consortium" -peer0.org1.example.com | "2019-05-02 01:30:47.825 UTC [common.configtx] addToMap -> DEBU 782 Adding to config map: [Value] /Channel/HashingAlgorithm" -peer0.org1.example.com | "2019-05-02 01:30:47.825 UTC [common.configtx] addToMap -> DEBU 783 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -peer0.org1.example.com | "2019-05-02 01:30:47.826 UTC [common.configtx] addToMap -> DEBU 784 Adding to config map: [Policy] /Channel/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.826 UTC [common.configtx] addToMap -> DEBU 785 Adding to config map: [Policy] /Channel/Writers" -peer0.org1.example.com | "2019-05-02 01:30:47.826 UTC [common.configtx] addToMap -> DEBU 786 Adding to config map: [Policy] /Channel/Admins" -peer0.org1.example.com | "2019-05-02 01:30:47.827 UTC [common.channelconfig] LogSanityChecks -> DEBU 787 As expected, current configuration has policy '/Channel/Readers'" -peer0.org1.example.com | "2019-05-02 01:30:47.827 UTC [common.channelconfig] LogSanityChecks -> DEBU 788 As expected, current configuration has policy '/Channel/Writers'" -peer0.org1.example.com | "2019-05-02 01:30:47.827 UTC [policies] Manager -> DEBU 78a Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-05-02 01:30:47.827 UTC [policies] Manager -> DEBU 78b Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:30:47.827 UTC [policies] Manager -> DEBU 78c Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.818 UTC [msp] getCertificationChain -> DEBU 789 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [policies] Evaluate -> DEBU 772 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [common.configtx] verifyDeltaSet -> DEBU 773 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [common.configtx] recurseConfigMap -> DEBU 774 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.015 UTC [common.configtx] recurseConfigMap -> DEBU 775 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.016 UTC [common.configtx] recurseConfigMap -> DEBU 776 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.016 UTC [common.configtx] recurseConfigMap -> DEBU 777 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.016 UTC [common.configtx] recurseConfigMap -> DEBU 778 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.017 UTC [common.configtx] recurseConfigMap -> DEBU 779 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.017 UTC [common.configtx] recurseConfigMap -> DEBU 77a Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.017 UTC [common.configtx] recurseConfigMap -> DEBU 77b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.017 UTC [common.configtx] recurseConfigMap -> DEBU 77c Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.018 UTC [common.configtx] recurseConfigMap -> DEBU 77d Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.018 UTC [common.configtx] recurseConfigMap -> DEBU 77e Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.018 UTC [common.configtx] recurseConfigMap -> DEBU 77f Setting policy for key Writers to " -orderer0.example.com | "2019-05-02 01:30:45.019 UTC [common.configtx] recurseConfigMap -> DEBU 780 Setting policy for key Admins to " -orderer0.example.com | "2019-05-02 01:30:45.019 UTC [common.configtx] recurseConfigMap -> DEBU 781 Setting policy for key Endorsement to " -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 782 Setting policy for key Readers to " -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 783 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 784 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 785 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 786 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 787 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 788 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 789 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 78a Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] NewStandardValues -> DEBU 78b Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78c Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78d Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78e Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78f Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 790 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] NewStandardValues -> DEBU 791 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 792 Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 793 Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 794 Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 795 Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 796 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 797 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [common.channelconfig] NewStandardValues -> DEBU 798 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [common.channelconfig] initializeProtosStruct -> DEBU 799 Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [common.channelconfig] NewStandardValues -> DEBU 79a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79b Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [common.channelconfig] validateMSP -> DEBU 79c Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [msp] newBccspMsp -> DEBU 79d Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [msp] New -> DEBU 79e Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [msp] Setup -> DEBU 79f Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [msp.identity] newIdentity -> DEBU 7a0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | "2019-05-02 01:30:47.828 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 78d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.828 UTC [msp] DeserializeIdentity -> DEBU 78e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.828 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 78f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.828 UTC [msp] DeserializeIdentity -> DEBU 790 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.829 UTC [msp] DeserializeIdentity -> DEBU 791 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.829 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 792 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.829 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 793 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.829 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 794 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.829 UTC [policies] Evaluate -> DEBU 795 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.829 UTC [policies] Evaluate -> DEBU 796 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.827 UTC [policies] Manager -> DEBU 797 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-05-02 01:30:47.829 UTC [policies] Manager -> DEBU 798 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.829 UTC [policies] Manager -> DEBU 799 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.830 UTC [policies] Evaluate -> DEBU 79b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.830 UTC [cauthdsl] func1 -> DEBU 79c 0xc00017ca00 gate 1556760647830175600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.830 UTC [cauthdsl] func2 -> DEBU 79d 0xc00017ca00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.830 UTC [common.channelconfig] LogSanityChecks -> DEBU 79a As expected, current configuration has policy '/Channel/Application/Readers'" -peer0.org1.example.com | "2019-05-02 01:30:47.830 UTC [common.channelconfig] LogSanityChecks -> DEBU 79e As expected, current configuration has policy '/Channel/Application/Writers'" -peer0.org1.example.com | "2019-05-02 01:30:47.830 UTC [common.channelconfig] LogSanityChecks -> DEBU 79f As expected, current configuration has policy '/Channel/Application/Admins'" -peer0.org1.example.com | "2019-05-02 01:30:47.830 UTC [cauthdsl] func2 -> DEBU 7a0 0xc00017ca00 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.830 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7a1 Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [msp.identity] newIdentity -> DEBU 7a1 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.021 UTC [msp] Validate -> DEBU 7a2 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [common.channelconfig] NewStandardValues -> DEBU 7a3 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a4 Processing field: ACLs" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a5 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [common.channelconfig] NewStandardValues -> DEBU 7a6 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a7 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [common.channelconfig] NewStandardValues -> DEBU 7a8 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a9 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [common.channelconfig] Validate -> DEBU 7aa Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [common.channelconfig] validateMSP -> DEBU 7ab Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [msp] newBccspMsp -> DEBU 7ac Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [msp] New -> DEBU 7ad Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [msp] Setup -> DEBU 7ae Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.022 UTC [msp.identity] newIdentity -> DEBU 7af Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:15.666 UTC [cauthdsl] func1 -> DEBU 6bb 0xc0008a3f80 gate 1556789235666884700 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6bc 0xc0008a3f80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6bd 0xc0008a3f80 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6be 0xc0008a3f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6bf 0xc0008a3f80 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:15.668 UTC [cauthdsl] func1 -> DEBU 6c0 0xc0008a3f80 gate 1556789235666884700 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c1 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:15.668 UTC [policies] func1 -> DEBU 6c3 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c4 Signature set did not satisfy policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:15.669 UTC [policies] Evaluate -> DEBU 6c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:15.669 UTC [policies] Evaluate -> DEBU 6c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:15.669 UTC [policies] Evaluate -> DEBU 6c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:15.670 UTC [cauthdsl] func1 -> DEBU 6c9 0xc0009315b0 gate 1556789235670009000 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:15.670 UTC [cauthdsl] func2 -> DEBU 6ca 0xc0009315b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:15.670 UTC [cauthdsl] func2 -> DEBU 6cb 0xc0009315b0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:15.671 UTC [cauthdsl] func2 -> DEBU 6cc 0xc0009315b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-05-02 09:27:15.671 UTC [cauthdsl] func2 -> DEBU 6cd 0xc0009315b0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:15.671 UTC [cauthdsl] func1 -> DEBU 6ce 0xc0009315b0 gate 1556789235670009000 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:15.672 UTC [policies] Evaluate -> DEBU 6cf Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:15.672 UTC [policies] Evaluate -> DEBU 6d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:15.672 UTC [policies] Evaluate -> DEBU 6d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:15.672 UTC [cauthdsl] func1 -> DEBU 6d2 0xc000931e10 gate 1556789235672729900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.484 UTC [peer] processChannelConfigTx -> DEBU 598 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-05-02 09:27:22.485 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 599 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:22.486 UTC [lockbasedtxmgr] Done -> DEBU 59a Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-05-02 09:27:22.498 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 59c Block [1] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.499 UTC [valinternal] ApplyWriteSet -> DEBU 59d txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0030e3940)}" +peer0.org1.example.com | "2019-05-02 09:27:22.498 UTC [msp.identity] Sign -> DEBU 59b Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:22.499 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59e validating rwset..." +peer0.org1.example.com | "2019-05-02 09:27:22.500 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5a0 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:22.500 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5a1 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-05-02 09:27:22.501 UTC [kvledger] CommitWithPvtData -> DEBU 5a2 [businesschannel] Committing block [1] to storage" +peer0.org1.example.com | "2019-05-02 09:27:22.500 UTC [msp.identity] Sign -> DEBU 59f Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:22.501 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5a3 Writing block [1] to pvt block store" +peer0.org1.example.com | "2019-05-02 09:27:22.502 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5a4 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53220" +peer0.org1.example.com | "2019-05-02 09:27:22.505 UTC [pvtdatastorage] Prepare -> DEBU 5a5 Saved 0 private data write sets for block [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.508 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5a6 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53220" +peer0.org1.example.com | "2019-05-02 09:27:22.509 UTC [msp.identity] Verify -> DEBU 5a7 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-05-02 09:27:22.510 UTC [fsblkstorage] indexBlock -> DEBU 5a8 Indexing block [blockNum=1, blockHash=[]byte{0x3d, 0xc8, 0x17, 0xef, 0x7d, 0xc5, 0xdd, 0xc, 0x94, 0x3f, 0xe9, 0xfc, 0x37, 0xb1, 0xef, 0xbb, 0xc6, 0x3e, 0x6a, 0xed, 0x5c, 0x37, 0xe9, 0x5f, 0x75, 0xea, 0xfa, 0x1d, 0xbf, 0x69, 0x5, 0x4a} txOffsets= +peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=22679 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-05-02 09:27:22.514 UTC [fsblkstorage] indexBlock -> DEBU 5aa txid [] is a duplicate of a previous tx. Not indexing in txid-index" +peer0.org1.example.com | "2019-05-02 09:27:22.514 UTC [fsblkstorage] indexBlock -> DEBU 5ab Adding txLoc [fileSuffixNum=0, offset=24010, bytesLength=22679] for tx number:[0] ID: [] to blockNumTranNum index" +peer0.org1.example.com | "2019-05-02 09:27:22.515 UTC [msp.identity] Verify -> DEBU 5ac Verify: sig = 00000000 30 44 02 20 6a 2f b1 fd 86 2d 6e f1 4f d9 e2 09 |0D. j/...-n.O...| +peer0.org1.example.com | 00000010 ac 77 7b be 04 18 8d bd 5d b7 26 b7 e4 80 63 7a |.w{.....].&...cz| +peer0.org1.example.com | 00000020 10 83 3d 19 02 20 4d 28 09 f2 b5 79 24 95 e1 e8 |..=.. M(...y$...| +peer0.org1.example.com | 00000030 7b 20 a8 e1 bc 49 f4 98 96 7c 1a e7 a7 9e 69 09 |{ ...I...|....i.| +peer0.org1.example.com | 00000040 d6 37 43 cd 2b 6e |.7C.+n|" +peer0.org1.example.com | "2019-05-02 09:27:22.518 UTC [fsblkstorage] updateCheckpoint -> DEBU 5ad Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47626], isChainEmpty=[false], lastBlockNumber=[1]" +peer0.org1.example.com | "2019-05-02 09:27:22.518 UTC [pvtdatastorage] Commit -> DEBU 5ae Committing private data for block [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.519 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5af Authenticated 172.18.0.6:53220" +peer0.org1.example.com | "2019-05-02 09:27:22.520 UTC [gossip.comm] GossipStream -> DEBU 5b0 Servicing 172.18.0.6:53220" +peer0.org1.example.com | "2019-05-02 09:27:22.521 UTC [gossip.comm] readFromStream -> DEBU 5b1 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-05-02 09:27:22.521 UTC [gossip.comm] func2 -> DEBU 5b2 Client 172.18.0.6:53220 disconnected" +peer0.org1.example.com | "2019-05-02 09:27:22.521 UTC [comm.grpc.server] 1 -> INFO 5b3 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.497Z grpc.peer_address=172.18.0.6:53220 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.0959ms +peer0.org1.example.com | "2019-05-02 09:27:22.522 UTC [gossip.comm] writeToStream -> DEBU 5b4 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:27:22.514 UTC [grpc] infof -> DEBU 5a9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [pvtdatastorage] Commit -> DEBU 5b5 Committed private data for block [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [kvledger] CommitWithPvtData -> DEBU 5b6 [businesschannel] Committing block [1] transactions to state database" +peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [lockbasedtxmgr] Commit -> DEBU 5b7 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [lockbasedtxmgr] Commit -> DEBU 5b8 Committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5b9 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [lockbasedtxmgr] Commit -> DEBU 5ba Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:22.523 UTC [stateleveldb] ApplyUpdates -> DEBU 5bb Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-05-02 09:27:22.527 UTC [lockbasedtxmgr] Commit -> DEBU 5bc Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-05-02 09:27:22.527 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5bd Preparing potential purge list working-set for expiringAtBlk [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.527 UTC [lockbasedtxmgr] func1 -> DEBU 5be launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-05-02 09:27:22.527 UTC [kvledger] CommitWithPvtData -> DEBU 5bf [businesschannel] Committing block [1] transactions to history database" +peer0.org1.example.com | "2019-05-02 09:27:22.528 UTC [historyleveldb] Commit -> DEBU 5c0 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" +peer0.org1.example.com | "2019-05-02 09:27:22.528 UTC [historyleveldb] Commit -> DEBU 5c1 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-05-02 09:27:22.527 UTC [leveldbhelper] GetIterator -> DEBU 5c2 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:22.529 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5c3 No expiry entry found for expiringAtBlk [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.533 UTC [historyleveldb] Commit -> DEBU 5c4 Channel [businesschannel]: Updates committed to history database for blockNo [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.533 UTC [kvledger] CommitWithPvtData -> INFO 5c5 [businesschannel] Committed block [1] with 1 transaction(s) in 62ms (state_validation=30ms block_commit=22ms state_commit=4ms)" +peer0.org1.example.com | "2019-05-02 09:27:22.533 UTC [msp.identity] Sign -> DEBU 5c6 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020802 " +peer0.org1.example.com | "2019-05-02 09:27:22.533 UTC [msp.identity] Sign -> DEBU 5c7 Sign: digest: AAE95B93C2C6B23F762A87C4C48D3503B8487313D8F657F7F2C6091DFBA174C6 " +peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [gossip.state] commitBlock -> DEBU 5c8 [businesschannel] Committed block [1] with 1 transaction(s)" +peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [gossip.state] deliverPayloads -> DEBU 5c9 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [gossip.privdata] StoreBlock -> INFO 5ca [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [gossip.privdata] StoreBlock -> DEBU 5cb [businesschannel] Validating block [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [committer.txvalidator] Validate -> DEBU 5cc [businesschannel] START Block Validation for block [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [committer.txvalidator] Validate -> DEBU 5cd expecting 1 block validation responses" +peer0.org1.example.com | "2019-05-02 09:27:22.534 UTC [committer.txvalidator] validateTx -> DEBU 5ce [businesschannel] validateTx starts for block 0xc0030e3d40 env 0xc0032a2e10 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:22.535 UTC [protoutils] ValidateTransaction -> DEBU 5cf ValidateTransactionEnvelope starts for envelope 0xc0032a2e10" +peer0.org1.example.com | "2019-05-02 09:27:22.535 UTC [protoutils] ValidateTransaction -> DEBU 5d0 Header is channel_header:"\010\001\032\006\010\371\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030i\205}\0100\335\357\252\362O\251\262 \234\345\000:\254\0339n\311\010\373" " +peer0.org1.example.com | "2019-05-02 09:27:22.535 UTC [protoutils] validateChannelHeader -> DEBU 5d1 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-05-02 09:27:22.535 UTC [protoutils] checkSignatureFromCreator -> DEBU 5d2 begin" +peer0.org1.example.com | "2019-05-02 09:27:22.535 UTC [msp] GetManagerForChain -> DEBU 5d3 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:22.536 UTC [msp] DeserializeIdentity -> DEBU 5d4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.536 UTC [msp.identity] newIdentity -> DEBU 5d5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.537 UTC [protoutils] checkSignatureFromCreator -> DEBU 5d6 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-05-02 09:27:22.537 UTC [msp] Validate -> DEBU 5d7 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.537 UTC [protoutils] checkSignatureFromCreator -> DEBU 5d8 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:22.537 UTC [msp.identity] Verify -> DEBU 5d9 Verify: digest = 00000000 28 be 1e af ac 51 ab 90 a5 a6 6d 74 57 c1 0e d8 |(....Q....mtW...| +peer0.org1.example.com | 00000010 71 9a 11 dc 49 20 a7 1d e7 40 5f 6d cc 0e a5 68 |q...I ...@_m...h|" +peer0.org1.example.com | "2019-05-02 09:27:22.537 UTC [msp.identity] Verify -> DEBU 5da Verify: sig = 00000000 30 44 02 20 3e bf 95 0c a9 21 62 de ef 7e a5 ef |0D. >....!b..~..| +peer0.org1.example.com | 00000010 63 5c 98 e1 bd c7 36 04 00 18 3d 1d 07 ee 99 4e |c\....6...=....N| +peer0.org1.example.com | 00000020 ce 31 f7 f9 02 20 6e 36 96 aa ea c8 84 49 93 f8 |.1... n6.....I..| +peer0.org1.example.com | 00000030 ee bb 98 2d 71 5e af d9 92 ee 7a 05 0c 7d 37 8b |...-q^....z..}7.| +peer0.org1.example.com | 00000040 69 13 32 1f 05 3e |i.2..>|" +peer0.org1.example.com | "2019-05-02 09:27:22.538 UTC [protoutils] checkSignatureFromCreator -> DEBU 5db exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:22.538 UTC [protoutils] validateConfigTransaction -> DEBU 5dc validateConfigTransaction starts for data 0xc003324000, header channel_header:"\010\001\032\006\010\371\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030i\205}\0100\335\357\252\362O\251\262 \234\345\000:\254\0339n\311\010\373" " +peer0.org1.example.com | "2019-05-02 09:27:22.539 UTC [committer.txvalidator] validateTx -> DEBU 5dd Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.540 UTC [comm.grpc.server] 1 -> INFO 5de unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.539Z grpc.peer_address=172.18.0.6:53224 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=137.1µs +peer0.org1.example.com | "2019-05-02 09:27:22.539 UTC [common.configtx] addToMap -> DEBU 5df Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.540 UTC [common.configtx] addToMap -> DEBU 5e0 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.540 UTC [common.configtx] addToMap -> DEBU 5e1 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.540 UTC [common.configtx] addToMap -> DEBU 5e2 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.542 UTC [msp.identity] Sign -> DEBU 5ea Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:22.543 UTC [msp.identity] Sign -> DEBU 5eb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:22.543 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ec Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:53224" +orderer0.example.com | "2019-05-02 09:27:15.672 UTC [cauthdsl] func2 -> DEBU 6d3 0xc000931e10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:15.673 UTC [cauthdsl] func2 -> DEBU 6d4 0xc000931e10 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:15.673 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6d5 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:15.673 UTC [msp] Validate -> DEBU 6d6 MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:15.674 UTC [msp] getCertificationChain -> DEBU 6d7 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:15.674 UTC [cauthdsl] func2 -> DEBU 6d8 0xc000931e10 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:15.674 UTC [msp.identity] Verify -> DEBU 6d9 Verify: digest = 00000000 5d de 64 d6 6d 2f 41 35 99 2f 7a e1 d4 24 25 52 |].d.m/A5./z..$%R| +orderer0.example.com | 00000010 d3 0d 9f f2 6c be 2b 2e 5e d9 bc 21 66 c6 c6 e5 |....l.+.^..!f...|" +orderer0.example.com | "2019-05-02 09:27:15.675 UTC [msp.identity] Verify -> DEBU 6da Verify: sig = 00000000 30 44 02 20 69 2e 43 52 f9 a2 4c ed 63 1d e2 b8 |0D. i.CR..L.c...| +orderer0.example.com | 00000010 09 85 66 2f fc ae 45 72 b1 71 08 6a 24 65 ed 70 |..f/..Er.q.j$e.p| +orderer0.example.com | 00000020 22 82 96 57 02 20 2c 5c 91 98 de 14 55 f8 b3 f7 |"..W. ,\....U...| +orderer0.example.com | 00000030 eb 53 a5 2b ed 05 06 f5 eb 15 04 bc 36 73 ab eb |.S.+........6s..| +orderer0.example.com | 00000040 0b ca 35 3e 0e be |..5>..|" +orderer0.example.com | "2019-05-02 09:27:15.675 UTC [cauthdsl] func2 -> DEBU 6db 0xc000931e10 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:15.675 UTC [cauthdsl] func1 -> DEBU 6dc 0xc000931e10 gate 1556789235672729900 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:15.675 UTC [policies] Evaluate -> DEBU 6dd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6df Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6e1 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:15.677 UTC [common.deliver] deliverBlocks -> DEBU 6e3 [channel: businesschannel] Received seekInfo (0xc000b6c180) start: > stop: > from 172.18.0.8:57152" +orderer0.example.com | "2019-05-02 09:27:15.677 UTC [fsblkstorage] Next -> DEBU 6e4 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-05-02 09:27:15.677 UTC [fsblkstorage] newBlockfileStream -> DEBU 6e5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:15.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6e6 Remaining bytes=[23938], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:15.678 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6e7 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:15.678 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6e8 blockbytes [23935] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:15.678 UTC [common.deliver] deliverBlocks -> DEBU 6e9 [channel: businesschannel] Delivering block [0] for (0xc000b6c180) for 172.18.0.8:57152" +orderer0.example.com | "2019-05-02 09:27:15.679 UTC [common.deliver] deliverBlocks -> DEBU 6ea [channel: businesschannel] Done delivering to 172.18.0.8:57152 for (0xc000b6c180)" +orderer0.example.com | "2019-05-02 09:27:15.679 UTC [common.deliver] Handle -> DEBU 6eb Waiting for new SeekInfo from 172.18.0.8:57152" +orderer0.example.com | "2019-05-02 09:27:15.679 UTC [common.deliver] Handle -> DEBU 6ec Attempting to read seek info message from 172.18.0.8:57152" +orderer0.example.com | "2019-05-02 09:27:15.682 UTC [common.deliver] Handle -> DEBU 6ed Received EOF from 172.18.0.8:57152, hangup" +orderer0.example.com | "2019-05-02 09:27:15.682 UTC [orderer.common.server] func1 -> DEBU 6ee Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:15.682 UTC [comm.grpc.server] 1 -> INFO 6ef streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57152 grpc.code=OK grpc.call_duration=219.6995ms +orderer0.example.com | "2019-05-02 09:27:15.685 UTC [grpc] warningf -> DEBU 6f0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.8:57152: read: connection reset by peer" +orderer0.example.com | "2019-05-02 09:27:15.685 UTC [grpc] infof -> DEBU 6f1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:15.688 UTC [grpc] infof -> DEBU 6f2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:15.689 UTC [grpc] infof -> DEBU 6f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:15.690 UTC [grpc] infof -> DEBU 6f4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:15.690 UTC [grpc] infof -> DEBU 6f5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:15.690 UTC [grpc] infof -> DEBU 6f6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:15.691 UTC [grpc] infof -> DEBU 6f7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:15.691 UTC [grpc] infof -> DEBU 6f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:15.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fa Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2019-05-02 09:27:15.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +orderer0.example.com | "2019-05-02 09:27:15.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fc Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +orderer0.example.com | "2019-05-02 09:27:15.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fd Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2019-05-02 09:27:15.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.1µs " +orderer0.example.com | "2019-05-02 09:27:15.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.4µs " +orderer0.example.com | "2019-05-02 09:27:15.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 700 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:15.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 701 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:16.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 702 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:16.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 703 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2019-05-02 09:27:16.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 704 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs " +orderer0.example.com | "2019-05-02 09:27:16.325 UTC [orderer.common.server] replicateDisabledChains -> DEBU 705 No inactive chains to try to replicate" +orderer0.example.com | "2019-05-02 09:27:16.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 706 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-05-02 09:27:16.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 707 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-05-02 09:27:16.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 708 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.4µs " +orderer0.example.com | "2019-05-02 09:27:16.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 709 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.3µs " +orderer0.example.com | "2019-05-02 09:27:16.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:16.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:16.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:16.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70d Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +orderer0.example.com | "2019-05-02 09:27:16.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 179.8µs " +orderer0.example.com | "2019-05-02 09:27:16.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70f Sending msg of 28 bytes to 2 on channel businesschannel took 65.5µs" +orderer0.example.com | "2019-05-02 09:27:16.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 710 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-05-02 09:27:16.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 711 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 235.6µs " +orderer0.example.com | "2019-05-02 09:27:16.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 712 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 625.1µs " +orderer0.example.com | "2019-05-02 09:27:16.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 713 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:16.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 714 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:17.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 715 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:17.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 716 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +orderer0.example.com | "2019-05-02 09:27:17.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 717 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +orderer0.example.com | "2019-05-02 09:27:17.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 718 Sending msg of 28 bytes to 2 on channel businesschannel took 68.5µs" +orderer0.example.com | "2019-05-02 09:27:17.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 719 Sending msg of 28 bytes to 3 on channel businesschannel took 25.1µs" +orderer0.example.com | "2019-05-02 09:27:17.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 364.3µs " +orderer0.example.com | "2019-05-02 09:27:17.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 860.4µs " +orderer0.example.com | "2019-05-02 09:27:17.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:17.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:17.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:17.714 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71f Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +orderer0.example.com | "2019-05-02 09:27:17.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395.7µs " +orderer0.example.com | "2019-05-02 09:27:17.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 721 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +orderer0.example.com | "2019-05-02 09:27:17.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 722 Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-05-02 09:27:17.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 723 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.2µs " +orderer0.example.com | "2019-05-02 09:27:17.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 724 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +orderer0.example.com | "2019-05-02 09:27:17.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 725 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:17.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 726 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:22.544 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ed Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53224" +peer0.org1.example.com | "2019-05-02 09:27:22.544 UTC [msp.identity] Verify -> DEBU 5ee Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [msp.identity] Verify -> DEBU 5ef Verify: sig = 00000000 30 45 02 21 00 97 35 d5 cf 34 fa e6 3a 73 bf c5 |0E.!..5..4..:s..| +peer0.org1.example.com | 00000010 db 67 96 6f f8 83 09 ca 90 e4 fb f3 51 bd 4e f2 |.g.o........Q.N.| +peer0.org1.example.com | 00000020 ef 5a 18 e4 5e 02 20 63 8f 02 15 e2 48 e3 94 39 |.Z..^. c....H..9| +peer0.org1.example.com | 00000030 88 b3 43 15 b5 3d 56 ce b8 64 df 14 24 d7 2a 46 |..C..=V..d..$.*F| +peer0.org1.example.com | 00000040 0a ba a5 ee ef 51 1b |.....Q.|" +peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5f0 Authenticated 172.18.0.6:53224" +peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [gossip.comm] GossipStream -> DEBU 5f1 Servicing 172.18.0.6:53224" +peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [gossip.gossip] handleMessage -> DEBU 5f2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [gossip.gossip] handleMessage -> DEBU 5f3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.545 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f4 Got message: GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.546 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.546 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5f6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:22.546 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.546 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.546 UTC [msp.identity] Verify -> DEBU 5f9 Verify: digest = 00000000 37 72 e6 74 46 b4 11 7d 5e a5 ea 1b 6d 00 8a c8 |7r.tF..}^...m...| +peer0.org1.example.com | 00000010 83 ff 07 59 44 a2 84 8c 23 81 7c 6e 6f a0 c5 82 |...YD...#.|no...|" +peer0.org1.example.com | "2019-05-02 09:27:22.547 UTC [msp.identity] Verify -> DEBU 5fb Verify: sig = 00000000 30 45 02 21 00 a2 4e 55 7b b6 c4 b6 75 ed b1 4f |0E.!..NU{...u..O| +peer0.org1.example.com | 00000010 8c c7 7a 40 4b d5 5b bd 36 c1 64 78 b0 73 07 91 |..z@K.[.6.dx.s..| +peer0.org1.example.com | 00000020 e5 ba d6 e3 c5 02 20 4a 8b e3 63 85 4d c7 68 4c |...... J..c.M.hL| +peer0.org1.example.com | 00000030 c1 08 75 c9 ec fb 0a 07 f7 57 f9 62 5f 42 1f 63 |..u......W.b_B.c| +peer0.org1.example.com | 00000040 45 46 49 2c b2 92 d4 |EFI,...|" +peer0.org1.example.com | "2019-05-02 09:27:22.547 UTC [msp.identity] Verify -> DEBU 5fc Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:22.547 UTC [msp.identity] Verify -> DEBU 5fd Verify: sig = 00000000 30 44 02 20 3d 9c 91 b3 48 ee 0a 55 9c 03 f2 f3 |0D. =...H..U....| +peer0.org1.example.com | 00000010 60 93 76 94 d5 c5 bc c6 0a 5c ca ce 16 66 eb d8 |`.v......\...f..| +peer0.org1.example.com | 00000020 8a 17 73 73 02 20 6b b6 ff e4 d3 99 80 3f a7 c9 |..ss. k......?..| +peer0.org1.example.com | 00000030 cf a6 b2 0c de 4d 7a f7 ae 8d 3b 7a c1 85 ad 3f |.....Mz...;z...?| +peer0.org1.example.com | 00000040 da 33 90 96 41 41 |.3..AA|" +peer0.org1.example.com | "2019-05-02 09:27:22.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 5fe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ff Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:22.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 600 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 " +peer0.org1.example.com | "2019-05-02 09:27:22.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 601 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 " +peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 602 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 603 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] handleAliveMessage -> DEBU 604 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 605 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] sendMemResponse -> DEBU 606 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.comm] Send -> DEBU 607 Entering, sending GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.discovery] sendMemResponse -> DEBU 608 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.comm] sendToEndpoint -> DEBU 609 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.549 UTC [gossip.comm] sendToEndpoint -> DEBU 60a Exiting" +orderer0.example.com | "2019-05-02 09:27:18.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 727 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:18.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 728 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-05-02 09:27:18.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 729 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.2µs " +orderer0.example.com | "2019-05-02 09:27:18.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72a Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +orderer0.example.com | "2019-05-02 09:27:18.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72b Sending msg of 28 bytes to 3 on channel businesschannel took 9.9µs" +orderer0.example.com | "2019-05-02 09:27:18.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 72c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76µs " +orderer0.example.com | "2019-05-02 09:27:18.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 72d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 699.2µs " +orderer0.example.com | "2019-05-02 09:27:18.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:18.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:18.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 730 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:18.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 731 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +orderer0.example.com | "2019-05-02 09:27:18.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 732 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.4µs " +orderer0.example.com | "2019-05-02 09:27:18.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 733 Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs" +orderer0.example.com | "2019-05-02 09:27:18.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 734 Sending msg of 28 bytes to 3 on channel businesschannel took 27.5µs" +orderer0.example.com | "2019-05-02 09:27:18.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU 735 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.9941ms " +orderer0.example.com | "2019-05-02 09:27:18.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU 736 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.4172ms " +orderer0.example.com | "2019-05-02 09:27:18.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 737 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:18.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 738 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:19.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 739 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:19.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73a Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2019-05-02 09:27:19.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " +orderer0.example.com | "2019-05-02 09:27:19.476 UTC [orderer.common.server] Deliver -> DEBU 73c Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:19.480 UTC [common.deliver] Handle -> DEBU 73d Starting new deliver loop for 172.18.0.8:57178" +orderer0.example.com | "2019-05-02 09:27:19.481 UTC [common.deliver] Handle -> DEBU 73e Attempting to read seek info message from 172.18.0.8:57178" +orderer0.example.com | "2019-05-02 09:27:19.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73f Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +orderer0.example.com | "2019-05-02 09:27:19.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 740 Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-05-02 09:27:19.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 741 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 439.3µs " +orderer0.example.com | "2019-05-02 09:27:19.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 742 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.3µs " +orderer0.example.com | "2019-05-02 09:27:19.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 743 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:19.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 744 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:19.503 UTC [orderer.common.server] Broadcast -> DEBU 745 Starting new Broadcast handler" +orderer0.example.com | "2019-05-02 09:27:19.503 UTC [orderer.common.broadcast] Handle -> DEBU 746 Starting new broadcast loop for 172.18.0.8:57180" +orderer0.example.com | "2019-05-02 09:27:19.504 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 747 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57180" +orderer0.example.com | "2019-05-02 09:27:19.504 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 748 Processing config update message for channel businesschannel" +orderer0.example.com | "2019-05-02 09:27:19.505 UTC [policies] Evaluate -> DEBU 749 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:19.505 UTC [policies] Evaluate -> DEBU 74a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:19.505 UTC [policies] Evaluate -> DEBU 74b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-05-02 09:27:19.506 UTC [policies] Evaluate -> DEBU 74c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:19.506 UTC [policies] Evaluate -> DEBU 74d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-05-02 09:27:19.506 UTC [cauthdsl] func1 -> DEBU 74e 0xc000889c20 gate 1556789239506818300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:19.507 UTC [cauthdsl] func2 -> DEBU 74f 0xc000889c20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:19.507 UTC [cauthdsl] func2 -> DEBU 750 0xc000889c20 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:19.507 UTC [cauthdsl] func2 -> DEBU 751 0xc000889c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2019-05-02 09:27:19.508 UTC [cauthdsl] func2 -> DEBU 752 0xc000889c20 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:19.508 UTC [cauthdsl] func1 -> DEBU 753 0xc000889c20 gate 1556789239506818300 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:19.508 UTC [policies] Evaluate -> DEBU 754 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:19.509 UTC [policies] Evaluate -> DEBU 755 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:19.509 UTC [policies] func1 -> DEBU 756 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2019-05-02 09:27:19.510 UTC [policies] Evaluate -> DEBU 757 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:19.510 UTC [policies] Evaluate -> DEBU 758 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:19.510 UTC [policies] Evaluate -> DEBU 759 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:27:19.511 UTC [policies] Evaluate -> DEBU 75a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:19.511 UTC [policies] Evaluate -> DEBU 75b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:19.511 UTC [cauthdsl] func1 -> DEBU 75c 0xc000c1e9a0 gate 1556789239511792800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:19.512 UTC [cauthdsl] func2 -> DEBU 75d 0xc000c1e9a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:19.512 UTC [cauthdsl] func2 -> DEBU 75e 0xc000c1e9a0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:19.512 UTC [cauthdsl] func2 -> DEBU 75f 0xc000c1e9a0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:19.513 UTC [msp.identity] Verify -> DEBU 760 Verify: digest = 00000000 2d 24 ae af 2b ab cf a4 1b 31 20 53 db 1d e7 59 |-$..+....1 S...Y| +orderer0.example.com | 00000010 93 1c 74 0e af 14 c2 23 6a 79 e1 94 8c 28 23 44 |..t....#jy...(#D|" +orderer0.example.com | "2019-05-02 09:27:19.513 UTC [msp.identity] Verify -> DEBU 761 Verify: sig = 00000000 30 45 02 21 00 f1 15 94 c7 e6 9e a3 48 5c b6 ac |0E.!........H\..| +orderer0.example.com | 00000010 c5 6f d4 68 62 76 0f 4e 5f a2 30 ea 64 12 1b e3 |.o.hbv.N_.0.d...| +orderer0.example.com | 00000020 5a 20 ab fe 8d 02 20 46 77 44 3d 2f 1a cc c6 ff |Z .... FwD=/....| +orderer0.example.com | 00000030 b6 8f 70 4d 2a 8b a2 6a 0d 7e 4c b7 28 f9 1f d5 |..pM*..j.~L.(...| +orderer0.example.com | 00000040 b1 62 49 3c d7 2f 05 |.bI<./.|" +orderer0.example.com | "2019-05-02 09:27:19.514 UTC [cauthdsl] func2 -> DEBU 762 0xc000c1e9a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:19.514 UTC [cauthdsl] func1 -> DEBU 763 0xc000c1e9a0 gate 1556789239511792800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 764 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 765 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 766 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 767 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 768 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 769 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76c Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76e Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 770 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 771 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 772 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 773 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 774 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 775 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 776 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 777 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] addToMap -> DEBU 778 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] addToMap -> DEBU 779 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] addToMap -> DEBU 77a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] verifyDeltaSet -> DEBU 77b Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] verifyDeltaSet -> DEBU 77c Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.518 UTC [common.configtx] policyForItem -> DEBU 77d Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-05-02 09:27:19.518 UTC [policies] Manager -> DEBU 77e Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:19.518 UTC [policies] Manager -> DEBU 77f Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 780 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 781 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 782 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 783 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 784 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-05-02 09:27:19.520 UTC [policies] Manager -> DEBU 785 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.520 UTC [policies] Manager -> DEBU 786 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.520 UTC [policies] Manager -> DEBU 787 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-05-02 09:27:19.520 UTC [policies] Evaluate -> DEBU 788 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:27:19.520 UTC [cauthdsl] func1 -> DEBU 789 0xc000b87b00 gate 1556789239520652300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:19.520 UTC [cauthdsl] func2 -> DEBU 78a 0xc000b87b00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:19.521 UTC [cauthdsl] func2 -> DEBU 78b 0xc000b87b00 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:19.521 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 78c Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.521 UTC [cauthdsl] func2 -> DEBU 78d 0xc000b87b00 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:19.521 UTC [msp.identity] Verify -> DEBU 78e Verify: digest = 00000000 1e 4a 2b e5 03 f9 6c c3 23 48 0d a8 83 20 ef f2 |.J+...l.#H... ..| +orderer0.example.com | 00000010 7a e8 18 fd 74 24 f2 e6 41 72 f3 5d d7 16 16 71 |z...t$..Ar.]...q|" +orderer0.example.com | "2019-05-02 09:27:19.521 UTC [msp.identity] Verify -> DEBU 78f Verify: sig = 00000000 30 44 02 20 7c b2 f7 03 cd 4f 8e cd 30 a1 37 b6 |0D. |....O..0.7.| +orderer0.example.com | 00000010 7e b2 75 32 5d 38 f1 78 91 c4 b9 3a c8 50 d7 24 |~.u2]8.x...:.P.$| +orderer0.example.com | 00000020 86 46 58 89 02 20 01 29 a4 4f 1b da f4 cd 41 1a |.FX.. .).O....A.| +orderer0.example.com | 00000030 ea 42 9b bf da 05 a0 92 ff 30 14 2e a4 22 c8 09 |.B.......0..."..| +orderer0.example.com | 00000040 d0 64 c5 30 31 53 |.d.01S|" +orderer0.example.com | "2019-05-02 09:27:19.522 UTC [cauthdsl] func2 -> DEBU 790 0xc000b87b00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:19.522 UTC [cauthdsl] func1 -> DEBU 791 0xc000b87b00 gate 1556789239520652300 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:19.522 UTC [policies] Evaluate -> DEBU 792 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.522 UTC [policies] Evaluate -> DEBU 793 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.522 UTC [common.configtx] recurseConfigMap -> DEBU 794 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.522 UTC [common.configtx] recurseConfigMap -> DEBU 795 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 796 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 797 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 798 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 799 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79b Setting policy for key Readers to " +orderer0.example.com | "2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79c Setting policy for key Writers to " +orderer0.example.com | "2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79d Setting policy for key Admins to " +orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 79e Setting policy for key Endorsement to " +orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 79f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a1 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a2 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a4 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a7 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a8 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a9 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.configtx] recurseConfigMap -> DEBU 7aa Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] NewStandardValues -> DEBU 7ab Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ac Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ad Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ae Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7af Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b0 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.527 UTC [common.channelconfig] NewStandardValues -> DEBU 7b1 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b2 Processing field: ACLs" +orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b3 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] NewStandardValues -> DEBU 7b4 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.547 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.550 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.550 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.550 UTC [common.configtx] verifyDeltaSet -> DEBU 60d Processing change to key: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.550 UTC [common.configtx] policyForItem -> DEBU 60e Getting policy for item Org2MSP with mod_policy Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.550 UTC [policies] Manager -> DEBU 60f Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 610 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 611 Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 612 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 613 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 614 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 615 Manager Channel/Application looking up path [Org2MSP]" +peer0.org1.example.com | "2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 616 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.552 UTC [policies] Manager -> DEBU 617 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.552 UTC [policies] Manager -> DEBU 618 Manager Channel/Application/Org2MSP looking up path []" +peer0.org1.example.com | "2019-05-02 09:27:22.552 UTC [policies] Evaluate -> DEBU 619 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-05-02 09:27:22.552 UTC [msp] DeserializeIdentity -> DEBU 61a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.554 UTC [msp.identity] newIdentity -> DEBU 61b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.554 UTC [cauthdsl] func1 -> DEBU 61c 0xc003390d80 gate 1556789242554648600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.554 UTC [cauthdsl] func2 -> DEBU 61d 0xc003390d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.554 UTC [cauthdsl] func2 -> DEBU 61e 0xc003390d80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.555 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 61f Checking if identity satisfies ADMIN role for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.555 UTC [cauthdsl] func2 -> DEBU 620 0xc003390d80 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.555 UTC [msp.identity] Verify -> DEBU 621 Verify: digest = 00000000 30 66 a6 63 f0 f2 5c 8b cc 30 97 57 cc 96 e6 ed |0f.c..\..0.W....| +peer0.org1.example.com | 00000010 ee 9d 29 cb 9e b5 de 97 29 52 7a 5e 61 16 79 e8 |..).....)Rz^a.y.|" +peer0.org1.example.com | "2019-05-02 09:27:22.555 UTC [msp.identity] Verify -> DEBU 622 Verify: sig = 00000000 30 45 02 21 00 a7 41 a5 d2 f7 c5 ff ec 5e 7f 6c |0E.!..A......^.l| +peer0.org1.example.com | 00000010 71 c9 ae 59 aa ec 85 dd 94 0c 54 cf 58 8b 8e 8c |q..Y......T.X...| +peer0.org1.example.com | 00000020 3a b9 3d 56 43 02 20 01 e7 16 fb f9 76 cf ae de |:.=VC. .....v...| +peer0.org1.example.com | 00000030 49 88 9b 17 52 e6 8f c3 fa dc 64 50 b3 87 99 97 |I...R.....dP....| +peer0.org1.example.com | 00000040 11 08 49 2b 8c 95 fc |..I+...|" +peer0.org1.example.com | "2019-05-02 09:27:22.556 UTC [cauthdsl] func2 -> DEBU 623 0xc003390d80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.556 UTC [cauthdsl] func1 -> DEBU 624 0xc003390d80 gate 1556789242554648600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.556 UTC [policies] Evaluate -> DEBU 625 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.556 UTC [policies] Evaluate -> DEBU 626 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.556 UTC [common.configtx] verifyDeltaSet -> DEBU 627 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 628 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 629 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62a Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62b Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62c Setting policy for key Admins to " +peer0.org1.example.com | "2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62d Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 62e Setting policy for key Readers to " +peer0.org1.example.com | "2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 62f Setting policy for key Writers to " +peer0.org1.example.com | "2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 630 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 631 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 632 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 633 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 634 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b5 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] NewStandardValues -> DEBU 7b6 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b7 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:19.528 UTC [common.channelconfig] Validate -> DEBU 7b8 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-05-02 09:27:19.529 UTC [common.channelconfig] validateMSP -> DEBU 7b9 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.529 UTC [msp] newBccspMsp -> DEBU 7ba Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.529 UTC [msp] New -> DEBU 7bb Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.529 UTC [msp] Setup -> DEBU 7bc Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.530 UTC [msp.identity] newIdentity -> DEBU 7bd Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7505,7 +6991,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.023 UTC [msp.identity] newIdentity -> DEBU 7b0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:19.531 UTC [msp.identity] newIdentity -> DEBU 7be Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7519,21 +7005,21 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.023 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7b1 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.023 UTC [msp] Validate -> DEBU 7b2 MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:45.024 UTC [msp] getCertificationChain -> DEBU 7b3 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.024 UTC [msp] hasOURole -> DEBU 7b4 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:45.024 UTC [msp] getCertificationChain -> DEBU 7b5 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.025 UTC [common.channelconfig] NewStandardValues -> DEBU 7b6 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:45.025 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b7 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:45.025 UTC [common.channelconfig] NewStandardValues -> DEBU 7b8 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:45.025 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b9 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:45.025 UTC [common.channelconfig] Validate -> DEBU 7ba Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-05-02 01:30:45.025 UTC [common.channelconfig] validateMSP -> DEBU 7bb Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.026 UTC [msp] newBccspMsp -> DEBU 7bc Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.026 UTC [msp] New -> DEBU 7bd Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.026 UTC [msp] Setup -> DEBU 7be Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.026 UTC [msp.identity] newIdentity -> DEBU 7bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:19.532 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7bf Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.532 UTC [msp] Validate -> DEBU 7c0 MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:19.532 UTC [msp] getCertificationChain -> DEBU 7c1 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:19.532 UTC [msp] hasOURole -> DEBU 7c2 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:19.532 UTC [msp] getCertificationChain -> DEBU 7c3 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] NewStandardValues -> DEBU 7c4 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c5 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] NewStandardValues -> DEBU 7c6 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c7 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] Validate -> DEBU 7c8 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-05-02 09:27:19.533 UTC [common.channelconfig] validateMSP -> DEBU 7c9 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.533 UTC [msp] newBccspMsp -> DEBU 7ca Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.533 UTC [msp] New -> DEBU 7cb Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.534 UTC [msp] Setup -> DEBU 7cc Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.534 UTC [msp.identity] newIdentity -> DEBU 7cd Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7545,118 +7031,10 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | "2019-05-02 01:30:47.830 UTC [msp] Validate -> DEBU 7a2 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.831 UTC [msp] getCertificationChain -> DEBU 7a4 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.830 UTC [policies] Manager -> DEBU 7a3 Manager Channel looking up path [Orderer]" -peer0.org1.example.com | "2019-05-02 01:30:47.831 UTC [policies] Manager -> DEBU 7a5 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:30:47.831 UTC [policies] Manager -> DEBU 7a6 Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:30:47.831 UTC [policies] Manager -> DEBU 7a7 Manager Channel/Orderer looking up path []" -peer0.org1.example.com | "2019-05-02 01:30:47.831 UTC [policies] Manager -> DEBU 7a8 Manager Channel/Orderer has managers OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:47.831 UTC [common.channelconfig] LogSanityChecks -> DEBU 7a9 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -peer0.org1.example.com | "2019-05-02 01:30:47.832 UTC [common.capabilities] Supported -> DEBU 7aa Application capability V2_0 is supported and is enabled" -peer0.org1.example.com | "2019-05-02 01:30:47.832 UTC [common.capabilities] Supported -> DEBU 7ab Channel capability V2_0 is supported and is enabled" -peer0.org1.example.com | "2019-05-02 01:30:47.832 UTC [cauthdsl] func2 -> DEBU 7ac 0xc00017ca00 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.832 UTC [msp.identity] Verify -> DEBU 7ae Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-05-02 01:30:47.832 UTC [msp.identity] Verify -> DEBU 7af Verify: sig = 00000000 30 44 02 20 67 69 77 ef 45 f0 7d e7 37 7a 82 b8 |0D. giw.E.}.7z..| -peer0.org1.example.com | 00000010 11 89 66 4f 31 cd 76 f3 99 ed e0 80 0b ed aa ea |..fO1.v.........| -peer0.org1.example.com | 00000020 2e 70 8d 6e 02 20 7d 27 5f 9c 2c 35 54 6b 93 87 |.p.n. }'_.,5Tk..| -peer0.org1.example.com | 00000030 23 3b b1 93 4b 96 7f 14 19 eb e8 d4 47 38 a7 9e |#;..K.......G8..| -peer0.org1.example.com | 00000040 31 d5 25 c1 34 d9 |1.%.4.|" -peer0.org1.example.com | "2019-05-02 01:30:47.832 UTC [gossip.service] ProcessConfigUpdate -> DEBU 7ad Processing new config for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.832 UTC [gossip.service] ProcessConfigUpdate -> DEBU 7b0 Calling out because config was updated for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.832 UTC [gossip.service] updateAnchors -> DEBU 7b1 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -peer0.org1.example.com | "2019-05-02 01:30:47.833 UTC [gossip.service] updateAnchors -> DEBU 7b2 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" -peer0.org1.example.com | "2019-05-02 01:30:47.833 UTC [gossip.service] updateAnchors -> DEBU 7b4 Creating state provider for chainID businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.833 UTC [cauthdsl] func2 -> DEBU 7b3 0xc00017ca00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.834 UTC [cauthdsl] func1 -> DEBU 7b7 0xc00017ca00 gate 1556760647830175600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.834 UTC [policies] Evaluate -> DEBU 7b8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.834 UTC [policies] Evaluate -> DEBU 7b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.834 UTC [policies] Evaluate -> DEBU 7ba Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.834 UTC [policies] Evaluate -> DEBU 7bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.834 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7bd Authenticated 192.168.240.8:38802" -peer0.org1.example.com | "2019-05-02 01:30:47.834 UTC [gossip.comm] GossipStream -> DEBU 7be Servicing 192.168.240.8:38802" -peer0.org1.example.com | "2019-05-02 01:30:47.834 UTC [policies] Evaluate -> DEBU 7bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.835 UTC [policies] Evaluate -> DEBU 7bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.835 UTC [policies] Evaluate -> DEBU 7c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.835 UTC [msp] DeserializeIdentity -> DEBU 7c1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.820 UTC [policies] Evaluate -> DEBU 77b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.836 UTC [msp.identity] newIdentity -> DEBU 7c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.836 UTC [cauthdsl] func1 -> DEBU 7c4 0xc0002a03b0 gate 1556760647836519100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.836 UTC [cauthdsl] func2 -> DEBU 7c5 0xc0002a03b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.836 UTC [cauthdsl] func2 -> DEBU 7c6 0xc0002a03b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.836 UTC [cauthdsl] func2 -> DEBU 7c7 0xc0002a03b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:30:47.836 UTC [cauthdsl] func2 -> DEBU 7c8 0xc0002a03b0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:47.836 UTC [policies] Evaluate -> DEBU 7c3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.836 UTC [policies] Evaluate -> DEBU 7c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.836 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ca Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 7cb Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:47.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 7cc updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 " -peer0.org1.example.com | "2019-05-02 01:30:47.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 7cd Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 " -peer0.org1.example.com | "2019-05-02 01:30:47.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 7ce Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:47.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 7cf Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.837 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d0 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.837 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7d1 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.836 UTC [cauthdsl] func1 -> DEBU 7d2 0xc0002a03b0 gate 1556760647836519100 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [policies] Evaluate -> DEBU 7d3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [policies] Evaluate -> DEBU 7d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [policies] Evaluate -> DEBU 7d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [cauthdsl] func1 -> DEBU 7d6 0xc0002a1700 gate 1556760647838309800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [cauthdsl] func2 -> DEBU 7d7 0xc0002a1700 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [cauthdsl] func2 -> DEBU 7d8 0xc0002a1700 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7d9 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [msp] Validate -> DEBU 7da MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [msp] getCertificationChain -> DEBU 7db MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [cauthdsl] func2 -> DEBU 7dc 0xc0002a1700 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [msp.identity] Verify -> DEBU 7dd Verify: digest = 00000000 64 b8 f5 fc bc 41 9d c3 23 39 08 c8 d5 68 b5 5f |d....A..#9...h._| -peer0.org1.example.com | 00000010 cb 60 03 12 f4 56 5f 02 2c cb 7b ec 0c ec e7 f3 |.`...V_.,.{.....|" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [msp.identity] Verify -> DEBU 7de Verify: sig = 00000000 30 45 02 21 00 8d e0 ab 12 85 44 66 c1 8b 8d dc |0E.!......Df....| -peer0.org1.example.com | 00000010 51 43 a8 33 77 2b f7 6f 71 2f 33 f0 a3 f9 30 e6 |QC.3w+.oq/3...0.| -peer0.org1.example.com | 00000020 a4 d6 0c 08 30 02 20 02 6e 63 0c 91 c6 6e 86 31 |....0. .nc...n.1| -peer0.org1.example.com | 00000030 d8 28 5e 48 90 45 48 1d c0 4f 20 99 6b c8 54 11 |.(^H.EH..O .k.T.| -peer0.org1.example.com | 00000040 af 82 d0 06 25 10 d2 |....%..|" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [cauthdsl] func2 -> DEBU 7df 0xc0002a1700 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [cauthdsl] func1 -> DEBU 7e0 0xc0002a1700 gate 1556760647838309800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [policies] Evaluate -> DEBU 7e1 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [policies] Evaluate -> DEBU 7e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [policies] Evaluate -> DEBU 7e3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [policies] Evaluate -> DEBU 7e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [gossip.gossip] JoinChan -> INFO 7e5 Joining gossip network of channel businesschannel with 2 organizations" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [gossip.gossip] learnAnchorPeers -> INFO 7e6 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [gossip.gossip] learnAnchorPeers -> INFO 7e7 Anchor peer with same endpoint, skipping connecting to myself" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [gossip.gossip] learnAnchorPeers -> INFO 7e8 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [gossip.discovery] Connect -> DEBU 7e9 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [gossip.discovery] Connect -> DEBU 7ea Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [gossip.service] updateEndpoints -> DEBU 7eb Updating endpoints for chainID%!(EXTRA string=businesschannel)" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [msp] DeserializeIdentity -> DEBU 7ec Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.838 UTC [gossip.discovery] sendMemResponse -> DEBU 7ed Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:47.839 UTC [msp] DeserializeIdentity -> DEBU 7ee Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.840 UTC [msp] DeserializeIdentity -> DEBU 7ef Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.840 UTC [gossip.comm] Send -> DEBU 7f0 Entering, sending GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:47.840 UTC [gossip.discovery] sendMemResponse -> DEBU 7f1 Exiting, replying with MembershipResponse with Alive: 3, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 7f2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.840 UTC [gossip.comm] createConnection -> DEBU 7f3 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:47.841 UTC [grpc] DialContext -> DEBU 7f4 parsed scheme: """ -peer0.org1.example.com | "2019-05-02 01:30:47.841 UTC [grpc] DialContext -> DEBU 7f5 scheme "" not registered, fallback to default scheme" orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.027 UTC [msp.identity] newIdentity -> DEBU 7c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:19.535 UTC [msp.identity] newIdentity -> DEBU 7ce Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7670,149 +7048,431 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.027 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7c1 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.027 UTC [msp] Validate -> DEBU 7c2 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:45.027 UTC [msp] getCertificationChain -> DEBU 7c3 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.028 UTC [msp] hasOURole -> DEBU 7c4 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:45.028 UTC [msp] getCertificationChain -> DEBU 7c5 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.028 UTC [msp] Setup -> DEBU 7c6 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:45.029 UTC [msp] Setup -> DEBU 7c7 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:45.029 UTC [policies] NewManagerImpl -> DEBU 7c8 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.029 UTC [policies] NewManagerImpl -> DEBU 7c9 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.029 UTC [policies] NewManagerImpl -> DEBU 7ca Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.030 UTC [policies] NewManagerImpl -> DEBU 7cb Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:45.031 UTC [policies] NewManagerImpl -> DEBU 7cc Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:45.031 UTC [policies] NewManagerImpl -> DEBU 7cd Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:45.032 UTC [policies] NewManagerImpl -> DEBU 7ce Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:45.032 UTC [policies] NewManagerImpl -> DEBU 7cf Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.032 UTC [policies] NewManagerImpl -> DEBU 7d0 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.032 UTC [policies] NewManagerImpl -> DEBU 7d1 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.032 UTC [policies] NewManagerImpl -> DEBU 7d2 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d3 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d4 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d5 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d6 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d7 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d8 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7d9 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7da Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7db Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7dc Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7dd Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7de Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7df Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7e0 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7e1 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7e2 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7e3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7e4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:45.036 UTC [common.configtx] addToMap -> DEBU 7e5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:45.036 UTC [common.configtx] addToMap -> DEBU 7e6 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:45.036 UTC [common.configtx] addToMap -> DEBU 7e7 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:45.036 UTC [common.configtx] addToMap -> DEBU 7e8 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:45.036 UTC [common.configtx] addToMap -> DEBU 7e9 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.037 UTC [common.configtx] addToMap -> DEBU 7ea Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:45.037 UTC [common.configtx] addToMap -> DEBU 7eb Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:45.037 UTC [common.configtx] addToMap -> DEBU 7ec Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:45.037 UTC [common.configtx] addToMap -> DEBU 7ed Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:45.038 UTC [common.configtx] addToMap -> DEBU 7ee Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:45.038 UTC [common.configtx] addToMap -> DEBU 7ef Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.038 UTC [common.configtx] addToMap -> DEBU 7f0 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.038 UTC [common.configtx] addToMap -> DEBU 7f1 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:45.039 UTC [common.configtx] addToMap -> DEBU 7f2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:45.039 UTC [common.configtx] addToMap -> DEBU 7f3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:45.039 UTC [common.configtx] addToMap -> DEBU 7f4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:45.039 UTC [common.configtx] addToMap -> DEBU 7f5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7f7 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7f8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7f9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7fa Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7fd Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 7fe Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 7ff Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 800 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 801 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 802 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 803 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 804 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 805 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 806 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 807 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 808 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 809 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 80a Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:45.042 UTC [common.configtx] addToMap -> DEBU 80b Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:45.042 UTC [common.channelconfig] LogSanityChecks -> DEBU 80c As expected, current configuration has policy '/Channel/Readers'" -peer0.org1.example.com | "2019-05-02 01:30:47.841 UTC [grpc] UpdateState -> DEBU 7f6 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" -peer0.org1.example.com | "2019-05-02 01:30:47.841 UTC [grpc] switchBalancer -> DEBU 7f7 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-05-02 01:30:47.842 UTC [grpc] HandleSubConnStateChange -> DEBU 7f8 pickfirstBalancer: HandleSubConnStateChange: 0xc0002af2e0, CONNECTING" -peer0.org1.example.com | "2019-05-02 01:30:47.841 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.842 UTC [msp] DeserializeIdentity -> DEBU 7fa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.842 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.843 UTC [peer] updateTrustedRoots -> DEBU 7fc Updating trusted root authorities for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.846 UTC [grpc] DialContext -> DEBU 7fd parsed scheme: """ -peer0.org1.example.com | "2019-05-02 01:30:47.846 UTC [grpc] DialContext -> DEBU 7fe scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-05-02 01:30:47.846 UTC [grpc] UpdateState -> DEBU 7ff ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" -peer0.org1.example.com | "2019-05-02 01:30:47.846 UTC [grpc] switchBalancer -> DEBU 800 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-05-02 01:30:47.846 UTC [grpc] HandleSubConnStateChange -> DEBU 801 pickfirstBalancer: HandleSubConnStateChange: 0xc0021873a0, CONNECTING" -peer0.org1.example.com | "2019-05-02 01:30:47.849 UTC [grpc] infof -> DEBU 802 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.850 UTC [gossip.comm] readFromStream -> DEBU 803 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-05-02 01:30:47.850 UTC [gossip.comm] func2 -> DEBU 804 Client 192.168.240.8:38802 disconnected" -peer0.org1.example.com | "2019-05-02 01:30:47.850 UTC [comm.grpc.server] 1 -> INFO 805 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.797Z grpc.peer_address=192.168.240.8:38802 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.03ms -peer0.org1.example.com | "2019-05-02 01:30:47.850 UTC [gossip.comm] writeToStream -> DEBU 806 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:30:47.867 UTC [grpc] HandleSubConnStateChange -> DEBU 807 pickfirstBalancer: HandleSubConnStateChange: 0xc0021873a0, READY" -peer0.org1.example.com | "2019-05-02 01:30:47.869 UTC [grpc] HandleSubConnStateChange -> DEBU 808 pickfirstBalancer: HandleSubConnStateChange: 0xc0002af2e0, READY" -peer0.org1.example.com | "2019-05-02 01:30:47.871 UTC [comm.grpc.server] 1 -> INFO 809 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.869Z grpc.peer_address=192.168.240.8:38810 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=126.6µs -peer0.org1.example.com | "2019-05-02 01:30:47.881 UTC [msp.identity] Sign -> DEBU 80a Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.881 UTC [msp.identity] Sign -> DEBU 80b Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.884 UTC [gossip.comm] authenticateRemotePeer -> DEBU 80d Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.883 UTC [peer] buildTrustedRootsForChain -> DEBU 80c updating root CAs for channel [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.884 UTC [peer] buildTrustedRootsForChain -> DEBU 80e adding app root CAs for MSP [Org1MSP]" -peer0.org1.example.com | "2019-05-02 01:30:47.885 UTC [peer] buildTrustedRootsForChain -> DEBU 810 adding app root CAs for MSP [Org2MSP]" -peer0.org1.example.com | "2019-05-02 01:30:47.886 UTC [peer] buildTrustedRootsForChain -> DEBU 811 adding orderer root CAs for MSP [OrdererMSP]" -peer0.org1.example.com | "2019-05-02 01:30:47.887 UTC [committer.txvalidator] validateTx -> DEBU 812 config transaction received for chain businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:47.885 UTC [msp.identity] Sign -> DEBU 80f Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.887 UTC [msp.identity] Sign -> DEBU 813 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.887 UTC [committer.txvalidator] validateTx -> DEBU 814 [businesschannel] validateTx completes for block 0xc00312f340 env 0xc0031490e0 txn 0" -peer0.org1.example.com | "2019-05-02 01:30:47.888 UTC [gossip.comm] authenticateRemotePeer -> DEBU 815 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.888 UTC [committer.txvalidator] Validate -> DEBU 816 got result for idx 0, code 0" -peer0.org1.example.com | "2019-05-02 01:30:47.888 UTC [committer.txvalidator] Validate -> INFO 817 [businesschannel] Validated block [2] in 324ms" -peer0.org1.example.com | "2019-05-02 01:30:47.891 UTC [gossip.privdata] listMissingPrivateData -> DEBU 818 Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-05-02 01:30:47.891 UTC [gossip.privdata] StoreBlock -> DEBU 819 [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-05-02 01:30:47.891 UTC [gossip.comm] authenticateRemotePeer -> DEBU 81b Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.891 UTC [msp] DeserializeIdentity -> DEBU 81d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.892 UTC [msp] DeserializeIdentity -> DEBU 81e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.892 UTC [msp.identity] newIdentity -> DEBU 81f Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | "2019-05-02 01:30:45.042 UTC [common.channelconfig] LogSanityChecks -> DEBU 80d As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 80e Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 80f Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 810 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 811 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 812 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 813 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.043 UTC [common.channelconfig] LogSanityChecks -> DEBU 814 As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [common.channelconfig] LogSanityChecks -> DEBU 815 As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [common.channelconfig] LogSanityChecks -> DEBU 816 As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [policies] Manager -> DEBU 817 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [policies] Manager -> DEBU 818 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [policies] Manager -> DEBU 819 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [policies] Manager -> DEBU 81a Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [policies] Manager -> DEBU 81b Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [common.channelconfig] LogSanityChecks -> DEBU 81c As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [common.capabilities] Supported -> DEBU 81d Orderer capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [common.capabilities] Supported -> DEBU 81e Channel capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [msp.identity] Sign -> DEBU 81f Sign: plaintext: 0AD2060A1B08011A0608C590A9E60522...627B107B89DCA33B0963FA57C86CB40A " -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [msp.identity] Sign -> DEBU 820 Sign: digest: A71BA89C30043A2D9ABABE84AC4A847B35A7B484007D167914EBAFA33D59BF32 " -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [policies] Evaluate -> DEBU 821 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [policies] Evaluate -> DEBU 822 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [policies] Evaluate -> DEBU 823 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [policies] Evaluate -> DEBU 824 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:45.044 UTC [policies] Evaluate -> DEBU 825 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [msp] DeserializeIdentity -> DEBU 826 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [msp.identity] newIdentity -> DEBU 827 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:19.536 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7cf Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.536 UTC [msp] Validate -> DEBU 7d0 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:19.536 UTC [msp] getCertificationChain -> DEBU 7d1 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:19.536 UTC [msp] hasOURole -> DEBU 7d2 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:19.536 UTC [msp] getCertificationChain -> DEBU 7d3 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] NewStandardValues -> DEBU 7d4 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d5 Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d6 Processing field: BatchSize" +peer0.org1.example.com | "2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 635 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 636 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 637 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 638 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 639 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 63a Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 63b Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.561 UTC [common.configtx] recurseConfigMap -> DEBU 63c Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.561 UTC [common.configtx] recurseConfigMap -> DEBU 63d Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.561 UTC [common.configtx] recurseConfigMap -> DEBU 63e Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.561 UTC [common.channelconfig] NewStandardValues -> DEBU 63f Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.561 UTC [common.channelconfig] initializeProtosStruct -> DEBU 640 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 641 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 642 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 643 Processing field: Consortium" +peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 644 Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] NewStandardValues -> DEBU 645 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 646 Processing field: ACLs" +peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 647 Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] NewStandardValues -> DEBU 648 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 649 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] NewStandardValues -> DEBU 64a Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64b Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] Validate -> DEBU 64c Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [common.channelconfig] validateMSP -> DEBU 64d Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.563 UTC [msp] newBccspMsp -> DEBU 64e Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.564 UTC [msp] New -> DEBU 64f Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.564 UTC [msp] Setup -> DEBU 650 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.564 UTC [msp.identity] newIdentity -> DEBU 651 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.565 UTC [msp.identity] newIdentity -> DEBU 652 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.566 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 653 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.566 UTC [msp] Validate -> DEBU 654 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.566 UTC [msp] getCertificationChain -> DEBU 655 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.566 UTC [msp] hasOURole -> DEBU 656 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-05-02 09:27:22.567 UTC [msp] getCertificationChain -> DEBU 657 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.567 UTC [common.channelconfig] NewStandardValues -> DEBU 658 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.567 UTC [common.channelconfig] initializeProtosStruct -> DEBU 659 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.567 UTC [common.channelconfig] NewStandardValues -> DEBU 65a Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.567 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65b Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [common.channelconfig] Validate -> DEBU 65c Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [common.channelconfig] validateMSP -> DEBU 65d Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [msp] newBccspMsp -> DEBU 65e Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [msp] New -> DEBU 65f Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [msp] Setup -> DEBU 660 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.568 UTC [msp.identity] newIdentity -> DEBU 661 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.569 UTC [msp.identity] newIdentity -> DEBU 662 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.570 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 663 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.570 UTC [msp] Validate -> DEBU 664 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.570 UTC [msp] getCertificationChain -> DEBU 665 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.570 UTC [msp] hasOURole -> DEBU 666 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-05-02 09:27:22.570 UTC [msp] getCertificationChain -> DEBU 667 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] NewStandardValues -> DEBU 668 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 669 Processing field: ConsensusType" +peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66a Processing field: BatchSize" +peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66b Processing field: BatchTimeout" +peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66c Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66d Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66e Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.571 UTC [common.channelconfig] NewStandardValues -> DEBU 66f Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [common.channelconfig] initializeProtosStruct -> DEBU 670 Processing field: Endpoints" +peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [common.channelconfig] NewStandardValues -> DEBU 671 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [common.channelconfig] initializeProtosStruct -> DEBU 672 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [common.channelconfig] validateMSP -> DEBU 673 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [msp] newBccspMsp -> DEBU 674 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [msp] New -> DEBU 675 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d7 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d8 Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d9 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7da Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.538 UTC [common.channelconfig] NewStandardValues -> DEBU 7db Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:19.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7dc Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:19.538 UTC [common.channelconfig] NewStandardValues -> DEBU 7dd Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:19.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7de Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:19.538 UTC [common.channelconfig] validateMSP -> DEBU 7df Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.538 UTC [msp] newBccspMsp -> DEBU 7e0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.538 UTC [msp] New -> DEBU 7e1 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.539 UTC [msp] Setup -> DEBU 7e2 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:19.539 UTC [msp.identity] newIdentity -> DEBU 7e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:19.540 UTC [msp.identity] newIdentity -> DEBU 7e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:19.541 UTC [msp] Validate -> DEBU 7e5 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:19.541 UTC [msp] Setup -> DEBU 7e6 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:19.541 UTC [msp] Setup -> DEBU 7e7 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:19.541 UTC [policies] NewManagerImpl -> DEBU 7e8 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.541 UTC [policies] NewManagerImpl -> DEBU 7e9 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ea Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7eb Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ec Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ed Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ee Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ef Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f0 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f1 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f2 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f3 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f4 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7f7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7f8 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7f9 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fa Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fb Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fc Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fd Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:19.545 UTC [policies] NewManagerImpl -> DEBU 7fe Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 7ff Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 800 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 801 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 802 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 803 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 804 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 805 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.572 UTC [msp] Setup -> DEBU 676 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-05-02 09:27:22.573 UTC [msp.identity] newIdentity -> DEBU 677 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.574 UTC [msp.identity] newIdentity -> DEBU 678 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.574 UTC [msp] Validate -> DEBU 679 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [msp] Setup -> DEBU 67a Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [msp] Setup -> DEBU 67b MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67e Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67f Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 680 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 681 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 806 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 807 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 808 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 809 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 80a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 80b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80e Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80f Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 810 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 811 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 812 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 813 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 814 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 815 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 816 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 817 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 818 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 819 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 81a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 81b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81e Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.channelconfig] LogSanityChecks -> DEBU 82c As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-05-02 09:27:19.551 UTC [common.channelconfig] LogSanityChecks -> DEBU 82d As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-05-02 09:27:19.551 UTC [policies] Manager -> DEBU 82e Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:19.551 UTC [policies] Manager -> DEBU 82f Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 830 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 831 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 832 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 833 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.552 UTC [common.channelconfig] LogSanityChecks -> DEBU 834 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-05-02 09:27:19.552 UTC [common.channelconfig] LogSanityChecks -> DEBU 835 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-05-02 09:27:19.552 UTC [common.channelconfig] LogSanityChecks -> DEBU 836 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 837 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 838 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 839 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 83a Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 83b Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.553 UTC [common.channelconfig] LogSanityChecks -> DEBU 83c As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-05-02 09:27:19.553 UTC [common.capabilities] Supported -> DEBU 83d Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:19.553 UTC [common.capabilities] Supported -> DEBU 83e Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 682 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 683 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 684 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 685 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 686 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 687 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 688 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 689 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68a Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68b Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68c Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68d Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 68e Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 68f Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 690 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 691 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 692 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 693 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 694 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 695 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 696 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 697 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 698 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 699 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69c Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69d Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6b1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b5 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b6 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b7 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6b9 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6ba Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6bb Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6bc Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6bd Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6be Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [common.configtx] addToMap -> DEBU 6bf Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [common.configtx] addToMap -> DEBU 6c0 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c1 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c2 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [policies] Manager -> DEBU 6c3 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [policies] Manager -> DEBU 6c4 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.586 UTC [policies] Manager -> DEBU 6c5 Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6c6 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6c7 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6c8 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c9 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [common.channelconfig] LogSanityChecks -> DEBU 6ca As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [common.channelconfig] LogSanityChecks -> DEBU 6cb As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6cc Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6cd Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6ce Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6cf Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6d0 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [common.channelconfig] LogSanityChecks -> DEBU 6d1 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-05-02 09:27:22.588 UTC [common.capabilities] Supported -> DEBU 6d2 Application capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:27:22.589 UTC [common.capabilities] Supported -> DEBU 6d3 Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:27:22.589 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6d4 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.589 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6d5 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [gossip.service] updateAnchors -> DEBU 6d6 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [gossip.service] updateAnchors -> DEBU 6d7 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [gossip.service] updateAnchors -> DEBU 6d8 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6da Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [policies] Evaluate -> DEBU 6db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [policies] Evaluate -> DEBU 6dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.590 UTC [policies] Evaluate -> DEBU 6dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.591 UTC [msp] DeserializeIdentity -> DEBU 6de Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.591 UTC [msp.identity] newIdentity -> DEBU 6df Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.591 UTC [cauthdsl] func1 -> DEBU 6e0 0xc00347a750 gate 1556789242591792300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.592 UTC [cauthdsl] func2 -> DEBU 6e1 0xc00347a750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.592 UTC [cauthdsl] func2 -> DEBU 6e2 0xc00347a750 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.592 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6e3 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.593 UTC [msp] Validate -> DEBU 6e4 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.593 UTC [msp] getCertificationChain -> DEBU 6e5 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.594 UTC [cauthdsl] func2 -> DEBU 6e6 0xc00347a750 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.594 UTC [msp.identity] Verify -> DEBU 6e7 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h| +peer0.org1.example.com | 00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y DEBU 6e8 Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....| +peer0.org1.example.com | 00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b| +peer0.org1.example.com | 00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..| +peer0.org1.example.com | 00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.| +peer0.org1.example.com | 00000040 89 bc 81 84 80 a7 |......|" +peer0.org1.example.com | "2019-05-02 09:27:22.594 UTC [cauthdsl] func2 -> DEBU 6e9 0xc00347a750 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.594 UTC [cauthdsl] func1 -> DEBU 6ea 0xc00347a750 gate 1556789242591792300 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:19.554 UTC [msp.identity] Sign -> DEBU 83f Sign: plaintext: 0AD2060A1B08011A0608F7EFAAE60522...6A0D7E4CB728F91FD5B162493CD72F05 " +orderer0.example.com | "2019-05-02 09:27:19.554 UTC [msp.identity] Sign -> DEBU 840 Sign: digest: 5EB9017E36426B312471394DE5B16CCACE277C4E33EFA0BE53BE4C1EF1CB951D " +orderer0.example.com | "2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 841 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 842 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 843 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 844 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 845 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-05-02 09:27:19.555 UTC [msp] DeserializeIdentity -> DEBU 846 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:19.556 UTC [msp.identity] newIdentity -> DEBU 847 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -7826,291 +7486,194 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh orderer0.example.com | QQ== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func1 -> DEBU 828 0xc000c958f0 gate 1556760645045308800 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 829 0xc000c958f0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 82a 0xc000c958f0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 82b 0xc000c958f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 82c 0xc000c958f0 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func1 -> DEBU 82d 0xc000c958f0 gate 1556760645045308800 evaluation fails" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [policies] Evaluate -> DEBU 82e Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [policies] Evaluate -> DEBU 82f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [policies] Evaluate -> DEBU 830 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func1 -> DEBU 831 0xc000ca2a30 gate 1556760645045680700 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 832 0xc000ca2a30 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 833 0xc000ca2a30 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 834 0xc000ca2a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 835 0xc000ca2a30 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [cauthdsl] func1 -> DEBU 836 0xc000ca2a30 gate 1556760645045680700 evaluation fails" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [policies] Evaluate -> DEBU 837 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [policies] Evaluate -> DEBU 838 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.045 UTC [policies] func1 -> DEBU 839 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 83a Signature set did not satisfy policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 83b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 83c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 83d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 83e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [cauthdsl] func1 -> DEBU 83f 0xc000ca3740 gate 1556760645046191300 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [cauthdsl] func2 -> DEBU 840 0xc000ca3740 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [cauthdsl] func2 -> DEBU 841 0xc000ca3740 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 842 Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [msp] Validate -> DEBU 843 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [cauthdsl] func2 -> DEBU 844 0xc000ca3740 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [msp.identity] Verify -> DEBU 845 Verify: digest = 00000000 a7 1b a8 9c 30 04 3a 2d 9a ba be 84 ac 4a 84 7b |....0.:-.....J.{| -orderer0.example.com | 00000010 35 a7 b4 84 00 7d 16 79 14 eb af a3 3d 59 bf 32 |5....}.y....=Y.2|" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [msp.identity] Verify -> DEBU 846 Verify: sig = 00000000 30 45 02 21 00 b6 5f 7a 53 df 5f 76 85 dd 0b ea |0E.!.._zS._v....| -orderer0.example.com | 00000010 9f 26 c6 a9 8e 06 6a 34 37 3d f3 15 28 17 9a 74 |.&....j47=..(..t| -orderer0.example.com | 00000020 31 28 76 c8 a6 02 20 2b b0 d1 53 f4 ca 8f 92 68 |1(v... +..S....h| -orderer0.example.com | 00000030 07 cb d5 a1 f3 3f fc 62 d2 13 9d 61 d0 30 18 b0 |.....?.b...a.0..| -orderer0.example.com | 00000040 6a e8 85 0e 1c 91 43 |j.....C|" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [cauthdsl] func2 -> DEBU 847 0xc000ca3740 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [cauthdsl] func1 -> DEBU 848 0xc000ca3740 gate 1556760645046191300 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 849 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 84a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 84b Signature set satisfies policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 84c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 84d Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:45.047 UTC [policies] Evaluate -> DEBU 84e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:45.049 UTC [orderer.consensus.etcdraft] propose -> INFO 84f Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:45.049 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 850 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.240.9:47308" -orderer0.example.com | "2019-05-02 01:30:45.049 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 851 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:45.050 UTC [orderer.consensus.etcdraft] 2 -> DEBU 852 Proposed block [1] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:45.056 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 853 Sending msg of 22807 bytes to 2 on channel businesschannel took 31.5µs" -orderer0.example.com | "2019-05-02 01:30:45.056 UTC [orderer.common.broadcast] Handle -> WARN 856 Error reading from 192.168.240.9:47308: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:30:45.056 UTC [orderer.common.server] func1 -> DEBU 858 Closing Broadcast stream" -orderer0.example.com | "2019-05-02 01:30:45.056 UTC [comm.grpc.server] 1 -> INFO 859 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47308 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=44.917ms -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.894 UTC [msp] Validate -> DEBU 820 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.894 UTC [grpc] infof -> DEBU 821 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.894 UTC [comm.grpc.server] 1 -> INFO 822 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.894Z grpc.peer_address=192.168.240.8:38808 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=127.8µs -peer0.org1.example.com | "2019-05-02 01:30:47.891 UTC [committer] preCommit -> DEBU 81c Received configuration update, calling CSCC ConfigUpdate" -peer0.org1.example.com | "2019-05-02 01:30:47.896 UTC [msp.identity] Sign -> DEBU 824 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.896 UTC [msp.identity] Sign -> DEBU 825 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.896 UTC [kvledger] CommitWithPvtData -> DEBU 826 [businesschannel] Validating state for block [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.897 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 827 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:30:47.897 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 828 lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-05-02 01:30:47.897 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 829 Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-05-02 01:30:47.897 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 82a ValidateAndPrepareBatch() for block number = [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.898 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 82b preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:30:47.898 UTC [gossip.comm] authenticateRemotePeer -> DEBU 82d Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.8:38810" -peer0.org1.example.com | "2019-05-02 01:30:47.898 UTC [valimpl] preprocessProtoBlock -> DEBU 82c txType=CONFIG" -peer0.org1.example.com | "2019-05-02 01:30:47.898 UTC [valimpl] processNonEndorserTx -> DEBU 82e Performing custom processing for transaction [txid=], [txType=CONFIG]" -peer0.org1.example.com | "2019-05-02 01:30:47.899 UTC [valimpl] processNonEndorserTx -> DEBU 82f Processor for custom tx processing:&peer.configtxProcessor{}" -peer0.org1.example.com | "2019-05-02 01:30:47.899 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 830 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:30:47.899 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 831 constructing new tx simulator txid = []" -peer0.org1.example.com | "2019-05-02 01:30:47.899 UTC [peer] GenerateSimulationResults -> DEBU 832 Processing CONFIG" -orderer0.example.com | "2019-05-02 01:30:45.057 UTC [grpc] infof -> DEBU 85a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:45.056 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 857 Sending msg of 22807 bytes to 3 on channel businesschannel took 17.2µs" -orderer0.example.com | "2019-05-02 01:30:45.056 UTC [grpc] infof -> DEBU 855 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:45.057 UTC [orderer.common.cluster.step] sendMessage -> DEBU 85b Send of ConsensusRequest for channel businesschannel with payload of size 22807 to orderer2.example.com(orderer2.example.com:7050) took 99.8µs " -orderer0.example.com | "2019-05-02 01:30:45.056 UTC [common.deliver] Handle -> WARN 854 Error reading from 192.168.240.9:47306: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:30:45.057 UTC [orderer.common.server] func1 -> DEBU 85c Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:30:45.057 UTC [orderer.common.cluster.step] sendMessage -> DEBU 85d Send of ConsensusRequest for channel businesschannel with payload of size 22807 to orderer1.example.com(orderer1.example.com:7050) took 91.7µs " -orderer0.example.com | "2019-05-02 01:30:45.057 UTC [comm.grpc.server] 1 -> INFO 85e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47306 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=62.9723ms -orderer0.example.com | "2019-05-02 01:30:45.066 UTC [orderer.common.cluster.step] handleMessage -> DEBU 85f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:45.067 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 860 Sending msg of 28 bytes to 2 on channel businesschannel took 10.9µs" -orderer0.example.com | "2019-05-02 01:30:45.067 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 861 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" -orderer0.example.com | "2019-05-02 01:30:45.068 UTC [orderer.common.cluster.step] sendMessage -> DEBU 865 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " -orderer0.example.com | "2019-05-02 01:30:45.068 UTC [orderer.common.cluster.step] handleMessage -> DEBU 862 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:45.068 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 863 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:45.080 UTC [common.configtx] addToMap -> DEBU 866 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:45.091 UTC [common.configtx] addToMap -> DEBU 86b Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.084 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 867 Sending msg of 28 bytes to 2 on channel businesschannel took 713.8µs" -orderer0.example.com | "2019-05-02 01:30:45.068 UTC [orderer.common.cluster.step] sendMessage -> DEBU 864 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.4µs " -orderer0.example.com | "2019-05-02 01:30:45.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 868 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:45.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 869 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:45.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 86a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:45.093 UTC [common.configtx] addToMap -> DEBU 86c Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.094 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 86d Sending msg of 28 bytes to 3 on channel businesschannel took 29.2µs" -orderer0.example.com | "2019-05-02 01:30:45.094 UTC [orderer.common.cluster.step] sendMessage -> DEBU 86e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.9µs " -orderer0.example.com | "2019-05-02 01:30:45.096 UTC [orderer.common.cluster.step] sendMessage -> DEBU 86f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137µs " -orderer0.example.com | "2019-05-02 01:30:45.097 UTC [common.configtx] addToMap -> DEBU 870 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:45.099 UTC [common.configtx] addToMap -> DEBU 871 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.099 UTC [common.configtx] addToMap -> DEBU 872 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.099 UTC [common.configtx] addToMap -> DEBU 873 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:45.099 UTC [common.configtx] addToMap -> DEBU 874 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:45.099 UTC [common.configtx] addToMap -> DEBU 875 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 876 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 877 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 878 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 879 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 87a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 87b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.101 UTC [common.configtx] addToMap -> DEBU 87c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:45.101 UTC [common.configtx] addToMap -> DEBU 87d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:45.101 UTC [common.configtx] verifyDeltaSet -> DEBU 87e Processing change to key: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.101 UTC [common.configtx] policyForItem -> DEBU 87f Getting policy for item Org1MSP with mod_policy Admins" -orderer0.example.com | "2019-05-02 01:30:45.101 UTC [policies] Manager -> DEBU 880 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:45.101 UTC [policies] Manager -> DEBU 881 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:45.101 UTC [policies] Manager -> DEBU 882 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:45.102 UTC [policies] Manager -> DEBU 883 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:45.102 UTC [policies] Manager -> DEBU 884 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.103 UTC [policies] Manager -> DEBU 885 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.103 UTC [policies] Manager -> DEBU 887 Manager Channel/Application looking up path [Org1MSP]" -orderer0.example.com | "2019-05-02 01:30:45.103 UTC [policies] Manager -> DEBU 888 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.103 UTC [policies] Manager -> DEBU 889 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.103 UTC [policies] Manager -> DEBU 88a Manager Channel/Application/Org1MSP looking up path []" -orderer0.example.com | "2019-05-02 01:30:45.103 UTC [policies] Evaluate -> DEBU 88b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:30:45.104 UTC [cauthdsl] func1 -> DEBU 88c 0xc000dc99f0 gate 1556760645104137000 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:45.104 UTC [cauthdsl] func2 -> DEBU 88d 0xc000dc99f0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:45.105 UTC [cauthdsl] func2 -> DEBU 88e 0xc000dc99f0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:45.105 UTC [cauthdsl] func2 -> DEBU 88f 0xc000dc99f0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:45.105 UTC [msp.identity] Verify -> DEBU 890 Verify: digest = 00000000 7e e0 d8 d0 d7 b3 a3 c0 01 cb 90 33 37 60 be ef |~..........37`..| -orderer0.example.com | 00000010 83 04 8b cc e0 6f 0e 3f 09 4a b5 dc 79 83 5e 60 |.....o.?.J..y.^`|" -orderer0.example.com | "2019-05-02 01:30:45.105 UTC [msp.identity] Verify -> DEBU 891 Verify: sig = 00000000 30 44 02 20 39 8e 08 37 34 ec ec 41 53 c4 ad ba |0D. 9..74..AS...| -orderer0.example.com | 00000010 2b dc ff 17 42 53 d2 3d 6f 68 d1 51 80 64 85 d7 |+...BS.=oh.Q.d..| -orderer0.example.com | 00000020 4f 85 ee ad 02 20 6a 36 2b aa 0f 2c 88 10 ef 67 |O.... j6+..,...g| -orderer0.example.com | 00000030 83 9e 48 8b 6f d5 dc 74 97 3a a1 54 c5 58 6e c1 |..H.o..t.:.T.Xn.| -orderer0.example.com | 00000040 78 e3 76 0b 0d 01 |x.v...|" -orderer0.example.com | "2019-05-02 01:30:45.106 UTC [cauthdsl] func2 -> DEBU 893 0xc000dc99f0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:45.106 UTC [cauthdsl] func1 -> DEBU 894 0xc000dc99f0 gate 1556760645104137000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.900 UTC [peer] processChannelConfigTx -> DEBU 833 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -peer0.org1.example.com | "2019-05-02 01:30:47.901 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 834 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:30:47.902 UTC [lockbasedtxmgr] Done -> DEBU 835 Done with transaction simulation / query execution []" -peer0.org1.example.com | "2019-05-02 01:30:47.895 UTC [msp] getCertificationChain -> DEBU 823 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.891 UTC [gossip.comm] authenticateRemotePeer -> DEBU 81a Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.902 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 836 Block [2] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.903 UTC [valinternal] ApplyWriteSet -> DEBU 839 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002275480)}" -peer0.org1.example.com | "2019-05-02 01:30:47.903 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 83a validating rwset..." -peer0.org1.example.com | "2019-05-02 01:30:47.902 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 837 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.903 UTC [msp] DeserializeIdentity -> DEBU 838 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.904 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 83b postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:30:47.905 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 83e ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-05-02 01:30:47.904 UTC [msp] DeserializeIdentity -> DEBU 83c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.905 UTC [kvledger] CommitWithPvtData -> DEBU 83f [businesschannel] Committing block [2] to storage" -peer0.org1.example.com | "2019-05-02 01:30:47.906 UTC [ledgerstorage] CommitWithPvtData -> DEBU 841 Writing block [2] to pvt block store" -orderer0.example.com | "2019-05-02 01:30:45.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 886 Sending msg of 28 bytes to 3 on channel testchainid took 445µs" -orderer0.example.com | "2019-05-02 01:30:45.106 UTC [policies] Evaluate -> DEBU 895 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.108 UTC [policies] Evaluate -> DEBU 896 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.108 UTC [common.configtx] verifyDeltaSet -> DEBU 897 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:45.109 UTC [common.configtx] recurseConfigMap -> DEBU 898 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 892 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.7067ms " -orderer0.example.com | "2019-05-02 01:30:45.109 UTC [common.configtx] recurseConfigMap -> DEBU 899 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.109 UTC [common.configtx] recurseConfigMap -> DEBU 89a Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.109 UTC [common.configtx] recurseConfigMap -> DEBU 89b Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.110 UTC [common.configtx] recurseConfigMap -> DEBU 89c Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.110 UTC [common.configtx] recurseConfigMap -> DEBU 89d Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.110 UTC [common.configtx] recurseConfigMap -> DEBU 89e Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 89f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:45.111 UTC [common.configtx] recurseConfigMap -> DEBU 8a0 Setting policy for key Readers to " -orderer0.example.com | "2019-05-02 01:30:45.111 UTC [common.configtx] recurseConfigMap -> DEBU 8a1 Setting policy for key Writers to " -orderer0.example.com | "2019-05-02 01:30:45.111 UTC [common.configtx] recurseConfigMap -> DEBU 8a2 Setting policy for key Admins to " -orderer0.example.com | "2019-05-02 01:30:45.111 UTC [common.configtx] recurseConfigMap -> DEBU 8a3 Setting policy for key Endorsement to " -orderer0.example.com | "2019-05-02 01:30:45.111 UTC [common.configtx] recurseConfigMap -> DEBU 8a4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.112 UTC [common.configtx] recurseConfigMap -> DEBU 8a5 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.113 UTC [common.configtx] recurseConfigMap -> DEBU 8a7 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.113 UTC [common.configtx] recurseConfigMap -> DEBU 8a8 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.114 UTC [common.configtx] recurseConfigMap -> DEBU 8a9 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.114 UTC [common.configtx] recurseConfigMap -> DEBU 8aa Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.114 UTC [common.configtx] recurseConfigMap -> DEBU 8ab Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.114 UTC [common.configtx] recurseConfigMap -> DEBU 8ac Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.114 UTC [common.configtx] recurseConfigMap -> DEBU 8ad Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.115 UTC [common.configtx] recurseConfigMap -> DEBU 8ae Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.115 UTC [common.configtx] recurseConfigMap -> DEBU 8af Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.115 UTC [common.configtx] recurseConfigMap -> DEBU 8b0 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:45.116 UTC [common.channelconfig] NewStandardValues -> DEBU 8b1 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:45.113 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8a6 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:45.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b2 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:45.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b3 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:45.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b4 Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:45.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b5 Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:45.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b6 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.118 UTC [common.channelconfig] NewStandardValues -> DEBU 8b7 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:45.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b8 Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:45.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b9 Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:45.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ba Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:45.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bb Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:45.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bc Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:45.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bd Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.121 UTC [common.channelconfig] NewStandardValues -> DEBU 8be Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:45.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bf Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:45.121 UTC [common.channelconfig] NewStandardValues -> DEBU 8c0 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:45.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c1 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:45.122 UTC [common.channelconfig] validateMSP -> DEBU 8c2 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.122 UTC [msp] newBccspMsp -> DEBU 8c3 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:47.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 840 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.906 UTC [msp] DeserializeIdentity -> DEBU 842 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.906 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 843 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 844 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.907 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 845 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.907 UTC [policies] Evaluate -> DEBU 846 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.907 UTC [policies] Evaluate -> DEBU 847 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.907 UTC [policies] Evaluate -> DEBU 848 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.908 UTC [cauthdsl] func1 -> DEBU 849 0xc00234c8e0 gate 1556760647908482100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.910 UTC [cauthdsl] func2 -> DEBU 84c 0xc00234c8e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.909 UTC [pvtdatastorage] Prepare -> DEBU 84a Saved 0 private data write sets for block [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 83d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.909 UTC [msp.identity] Sign -> DEBU 84b Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.910 UTC [cauthdsl] func2 -> DEBU 84d 0xc00234c8e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.911 UTC [msp] DeserializeIdentity -> DEBU 84e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.912 UTC [msp.identity] Sign -> DEBU 84f Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.913 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 850 Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.130 UTC [msp] New -> DEBU 8c4 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.135 UTC [msp] Setup -> DEBU 8c5 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:45.137 UTC [msp.identity] newIdentity -> DEBU 8c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.140 UTC [msp.identity] newIdentity -> DEBU 8c7 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.143 UTC [msp] Validate -> DEBU 8c8 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:45.144 UTC [common.channelconfig] NewStandardValues -> DEBU 8c9 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-05-02 01:30:45.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ca Processing field: ACLs" -orderer0.example.com | "2019-05-02 01:30:45.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cb Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.144 UTC [common.channelconfig] NewStandardValues -> DEBU 8cc Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:45.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cd Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:30:47.913 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 851 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.914 UTC [gossip.comm] authenticateRemotePeer -> DEBU 852 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.8:38808" -peer0.org1.example.com | "2019-05-02 01:30:47.917 UTC [fsblkstorage] indexBlock -> DEBU 853 Indexing block [blockNum=2, blockHash=[]byte{0x10, 0xa6, 0x73, 0x2, 0x98, 0xd8, 0x5d, 0x96, 0xae, 0x3a, 0x57, 0x2b, 0xde, 0xb5, 0xd3, 0x7f, 0x2e, 0x75, 0xc3, 0x9b, 0xc3, 0x8a, 0xd3, 0xa3, 0x6d, 0xe6, 0x7c, 0xa8, 0x8e, 0x95, 0x7a, 0xb} txOffsets= -peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=22736 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-05-02 01:30:47.917 UTC [gossip.comm] authenticateRemotePeer -> DEBU 854 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:38810" -peer0.org1.example.com | "2019-05-02 01:30:47.917 UTC [msp] Validate -> DEBU 855 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.918 UTC [msp] DeserializeIdentity -> DEBU 856 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.918 UTC [fsblkstorage] indexBlock -> DEBU 857 txid [] is a duplicate of a previous tx. Not indexing in txid-index" -peer0.org1.example.com | "2019-05-02 01:30:47.919 UTC [msp] DeserializeIdentity -> DEBU 858 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.919 UTC [gossip.comm] authenticateRemotePeer -> DEBU 859 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:38808" -peer0.org1.example.com | "2019-05-02 01:30:47.919 UTC [msp] getCertificationChain -> DEBU 85a MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.145 UTC [common.channelconfig] NewStandardValues -> DEBU 8ce Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:45.145 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cf Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:45.145 UTC [common.channelconfig] Validate -> DEBU 8d0 Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:30:45.145 UTC [common.channelconfig] validateMSP -> DEBU 8d1 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.145 UTC [msp] newBccspMsp -> DEBU 8d2 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.145 UTC [msp] New -> DEBU 8d3 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.145 UTC [msp] Setup -> DEBU 8d4 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.146 UTC [msp.identity] newIdentity -> DEBU 8d5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:19.556 UTC [cauthdsl] func1 -> DEBU 848 0xc000847e50 gate 1556789239556730800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:19.556 UTC [cauthdsl] func2 -> DEBU 849 0xc000847e50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:19.556 UTC [cauthdsl] func2 -> DEBU 84a 0xc000847e50 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:19.556 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 84b Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:19.557 UTC [msp] Validate -> DEBU 84c MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:19.557 UTC [cauthdsl] func2 -> DEBU 84d 0xc000847e50 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:19.557 UTC [msp.identity] Verify -> DEBU 84e Verify: digest = 00000000 5e b9 01 7e 36 42 6b 31 24 71 39 4d e5 b1 6c ca |^..~6Bk1$q9M..l.| +orderer0.example.com | 00000010 ce 27 7c 4e 33 ef a0 be 53 be 4c 1e f1 cb 95 1d |.'|N3...S.L.....|" +orderer0.example.com | "2019-05-02 09:27:19.557 UTC [msp.identity] Verify -> DEBU 84f Verify: sig = 00000000 30 45 02 21 00 be 47 8b ce db 26 57 b4 11 11 08 |0E.!..G...&W....| +orderer0.example.com | 00000010 f9 be 3d 46 9f b5 2d f9 46 64 13 a9 79 52 08 4c |..=F..-.Fd..yR.L| +orderer0.example.com | 00000020 e0 55 30 75 29 02 20 3f 14 58 43 89 87 f7 bf 90 |.U0u). ?.XC.....| +orderer0.example.com | 00000030 9e 87 74 e9 8f 2a 1f a5 38 cf 98 0d a9 03 70 d8 |..t..*..8.....p.| +orderer0.example.com | 00000040 1a 33 13 1f 94 5f 84 |.3..._.|" +orderer0.example.com | "2019-05-02 09:27:19.558 UTC [cauthdsl] func2 -> DEBU 850 0xc000847e50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:19.558 UTC [cauthdsl] func1 -> DEBU 851 0xc000847e50 gate 1556789239556730800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 852 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 853 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 854 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 855 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 856 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 857 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:19.559 UTC [orderer.consensus.etcdraft] propose -> INFO 858 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:19.559 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 859 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:19.559 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 85a [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57180" +orderer0.example.com | "2019-05-02 09:27:19.563 UTC [orderer.consensus.etcdraft] 2 -> DEBU 85b Proposed block [1] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:19.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 85c Sending msg of 22808 bytes to 2 on channel businesschannel took 22.3µs" +orderer0.example.com | "2019-05-02 09:27:19.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 85d Send of ConsensusRequest for channel businesschannel with payload of size 22808 to orderer1.example.com(orderer1.example.com:7050) took 108.3µs " +orderer0.example.com | "2019-05-02 09:27:19.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 85e Sending msg of 22808 bytes to 3 on channel businesschannel took 696.7µs" +orderer0.example.com | "2019-05-02 09:27:19.565 UTC [orderer.common.broadcast] Handle -> WARN 85f Error reading from 172.18.0.8:57180: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:19.565 UTC [orderer.common.server] func1 -> DEBU 861 Closing Broadcast stream" +orderer0.example.com | "2019-05-02 09:27:19.572 UTC [orderer.common.cluster.step] handleMessage -> DEBU 865 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 866 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 867 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 868 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 869 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86c Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6eb Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6ed Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.595 UTC [gossip.gossip] JoinChan -> INFO 6ef Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-05-02 09:27:22.596 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f0 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-05-02 09:27:22.596 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f1 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-05-02 09:27:22.596 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f2 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-05-02 09:27:22.596 UTC [gossip.discovery] Connect -> DEBU 6f3 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +peer0.org1.example.com | "2019-05-02 09:27:22.596 UTC [gossip.discovery] Connect -> DEBU 6f4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.597 UTC [gossip.service] updateEndpoints -> DEBU 6f5 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-05-02 09:27:22.597 UTC [peer] updateTrustedRoots -> DEBU 6f6 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.598 UTC [grpc] DialContext -> DEBU 6f7 parsed scheme: """ +peer0.org1.example.com | "2019-05-02 09:27:22.598 UTC [grpc] DialContext -> DEBU 6f8 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-05-02 09:27:22.598 UTC [grpc] UpdateState -> DEBU 6f9 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" +peer0.org1.example.com | "2019-05-02 09:27:22.598 UTC [grpc] switchBalancer -> DEBU 6fa ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-05-02 09:27:22.598 UTC [grpc] HandleSubConnStateChange -> DEBU 6fb pickfirstBalancer: HandleSubConnStateChange: 0xc0034ab9b0, CONNECTING" +peer0.org1.example.com | "2019-05-02 09:27:22.604 UTC [grpc] HandleSubConnStateChange -> DEBU 6fc pickfirstBalancer: HandleSubConnStateChange: 0xc0034ab9b0, READY" +peer0.org1.example.com | "2019-05-02 09:27:22.607 UTC [msp.identity] Sign -> DEBU 6fd Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:22.608 UTC [msp.identity] Sign -> DEBU 6fe Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:22.609 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6ff Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:27:22.616 UTC [gossip.comm] authenticateRemotePeer -> DEBU 700 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:27:22.617 UTC [msp] DeserializeIdentity -> DEBU 701 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.617 UTC [msp] DeserializeIdentity -> DEBU 702 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.618 UTC [msp.identity] newIdentity -> DEBU 703 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.620 UTC [msp] Validate -> DEBU 704 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.620 UTC [msp] getCertificationChain -> DEBU 705 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 870 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 871 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 872 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 873 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 874 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 875 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 876 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 877 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 878 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 879 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 87a Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] verifyDeltaSet -> DEBU 87b Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [common.configtx] policyForItem -> DEBU 87c Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 87d Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 87e Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 87f Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 880 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 881 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 882 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 883 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 884 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 885 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 886 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [policies] Evaluate -> DEBU 887 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [cauthdsl] func1 -> DEBU 888 0xc000931580 gate 1556789239574831400 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [cauthdsl] func2 -> DEBU 889 0xc000931580 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [cauthdsl] func2 -> DEBU 88a 0xc000931580 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:19.574 UTC [cauthdsl] func2 -> DEBU 88b 0xc000931580 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:19.575 UTC [msp.identity] Verify -> DEBU 88c Verify: digest = 00000000 1e 4a 2b e5 03 f9 6c c3 23 48 0d a8 83 20 ef f2 |.J+...l.#H... ..| +orderer0.example.com | 00000010 7a e8 18 fd 74 24 f2 e6 41 72 f3 5d d7 16 16 71 |z...t$..Ar.]...q|" +orderer0.example.com | "2019-05-02 09:27:19.575 UTC [msp.identity] Verify -> DEBU 88d Verify: sig = 00000000 30 44 02 20 7c b2 f7 03 cd 4f 8e cd 30 a1 37 b6 |0D. |....O..0.7.| +orderer0.example.com | 00000010 7e b2 75 32 5d 38 f1 78 91 c4 b9 3a c8 50 d7 24 |~.u2]8.x...:.P.$| +orderer0.example.com | 00000020 86 46 58 89 02 20 01 29 a4 4f 1b da f4 cd 41 1a |.FX.. .).O....A.| +orderer0.example.com | 00000030 ea 42 9b bf da 05 a0 92 ff 30 14 2e a4 22 c8 09 |.B.......0..."..| +orderer0.example.com | 00000040 d0 64 c5 30 31 53 |.d.01S|" +orderer0.example.com | "2019-05-02 09:27:19.568 UTC [comm.grpc.server] 1 -> INFO 88e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57180 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=65.0375ms +orderer0.example.com | "2019-05-02 09:27:19.566 UTC [common.deliver] Handle -> WARN 862 Error reading from 172.18.0.8:57178: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:19.579 UTC [orderer.common.server] func1 -> DEBU 88f Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:19.579 UTC [comm.grpc.server] 1 -> INFO 890 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57178 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.2523ms +orderer0.example.com | "2019-05-02 09:27:19.566 UTC [grpc] infof -> DEBU 863 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:19.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU 864 Send of ConsensusRequest for channel businesschannel with payload of size 22808 to orderer2.example.com(orderer2.example.com:7050) took 235µs " +orderer0.example.com | "2019-05-02 09:27:19.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 891 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +orderer0.example.com | "2019-05-02 09:27:19.565 UTC [grpc] infof -> DEBU 860 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:19.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 892 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:19.590 UTC [orderer.common.cluster.step] handleMessage -> DEBU 893 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:19.592 UTC [cauthdsl] func2 -> DEBU 894 0xc000931580 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:19.593 UTC [orderer.common.cluster.step] handleMessage -> DEBU 895 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:19.594 UTC [cauthdsl] func1 -> DEBU 896 0xc000931580 gate 1556789239574831400 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:19.595 UTC [policies] Evaluate -> DEBU 897 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.595 UTC [policies] Evaluate -> DEBU 898 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.596 UTC [common.configtx] verifyDeltaSet -> DEBU 899 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:27:22.621 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 706 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.621 UTC [msp] DeserializeIdentity -> DEBU 707 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.622 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.622 UTC [msp] DeserializeIdentity -> DEBU 709 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.623 UTC [msp] DeserializeIdentity -> DEBU 70b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.623 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.624 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.622 UTC [peer] buildTrustedRootsForChain -> DEBU 70a updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.624 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.624 UTC [policies] Evaluate -> DEBU 710 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.625 UTC [policies] Evaluate -> DEBU 711 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.625 UTC [policies] Evaluate -> DEBU 712 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.625 UTC [cauthdsl] func1 -> DEBU 713 0xc00352b4e0 gate 1556789242625572000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.624 UTC [peer] buildTrustedRootsForChain -> DEBU 70f adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-05-02 09:27:19.599 UTC [common.configtx] recurseConfigMap -> DEBU 89a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.599 UTC [common.configtx] recurseConfigMap -> DEBU 89b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.599 UTC [common.configtx] recurseConfigMap -> DEBU 89c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.600 UTC [common.configtx] recurseConfigMap -> DEBU 89d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.601 UTC [common.configtx] recurseConfigMap -> DEBU 89e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.601 UTC [common.configtx] recurseConfigMap -> DEBU 89f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.601 UTC [common.configtx] recurseConfigMap -> DEBU 8a0 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.602 UTC [common.configtx] recurseConfigMap -> DEBU 8a1 Setting policy for key Admins to " +orderer0.example.com | "2019-05-02 09:27:19.602 UTC [common.configtx] recurseConfigMap -> DEBU 8a2 Setting policy for key Endorsement to " +orderer0.example.com | "2019-05-02 09:27:19.604 UTC [common.configtx] recurseConfigMap -> DEBU 8a3 Setting policy for key Readers to " +orderer0.example.com | "2019-05-02 09:27:19.604 UTC [common.configtx] recurseConfigMap -> DEBU 8a4 Setting policy for key Writers to " +orderer0.example.com | "2019-05-02 09:27:19.606 UTC [common.configtx] recurseConfigMap -> DEBU 8a5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.607 UTC [common.configtx] recurseConfigMap -> DEBU 8a6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.607 UTC [common.configtx] recurseConfigMap -> DEBU 8a7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.608 UTC [common.configtx] recurseConfigMap -> DEBU 8a8 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.608 UTC [common.configtx] recurseConfigMap -> DEBU 8a9 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.609 UTC [common.configtx] recurseConfigMap -> DEBU 8aa Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.609 UTC [common.configtx] recurseConfigMap -> DEBU 8ab Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.609 UTC [common.configtx] recurseConfigMap -> DEBU 8ac Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.610 UTC [common.configtx] recurseConfigMap -> DEBU 8ad Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.611 UTC [common.configtx] recurseConfigMap -> DEBU 8ae Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.611 UTC [common.configtx] recurseConfigMap -> DEBU 8af Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.611 UTC [common.configtx] recurseConfigMap -> DEBU 8b0 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:19.614 UTC [common.channelconfig] NewStandardValues -> DEBU 8b1 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:19.614 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b2 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:19.614 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b3 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:19.615 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b4 Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:19.615 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b5 Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:19.615 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b6 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.615 UTC [common.channelconfig] NewStandardValues -> DEBU 8b7 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-05-02 09:27:19.616 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b8 Processing field: ACLs" +orderer0.example.com | "2019-05-02 09:27:19.616 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b9 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.618 UTC [common.channelconfig] NewStandardValues -> DEBU 8ba Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:19.618 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bb Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:19.619 UTC [common.channelconfig] NewStandardValues -> DEBU 8bc Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:19.619 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bd Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:19.619 UTC [common.channelconfig] Validate -> DEBU 8be Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-05-02 09:27:19.619 UTC [common.channelconfig] validateMSP -> DEBU 8bf Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.620 UTC [msp] newBccspMsp -> DEBU 8c0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.620 UTC [msp] New -> DEBU 8c1 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.620 UTC [msp] Setup -> DEBU 8c2 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.621 UTC [msp.identity] newIdentity -> DEBU 8c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -8125,8 +7688,60 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.146 UTC [msp.identity] newIdentity -> DEBU 8d6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:19.623 UTC [msp.identity] newIdentity -> DEBU 8c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | "2019-05-02 09:27:22.626 UTC [cauthdsl] func2 -> DEBU 714 0xc00352b4e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.627 UTC [cauthdsl] func2 -> DEBU 716 0xc00352b4e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.627 UTC [cauthdsl] func2 -> DEBU 717 0xc00352b4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:22.627 UTC [cauthdsl] func2 -> DEBU 718 0xc00352b4e0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.626 UTC [peer] buildTrustedRootsForChain -> DEBU 715 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-05-02 09:27:22.628 UTC [peer] buildTrustedRootsForChain -> DEBU 71a adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-05-02 09:27:22.627 UTC [cauthdsl] func1 -> DEBU 719 0xc00352b4e0 gate 1556789242625572000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.628 UTC [policies] Evaluate -> DEBU 71b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.628 UTC [policies] Evaluate -> DEBU 71c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.629 UTC [policies] Evaluate -> DEBU 71e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.629 UTC [committer.txvalidator] validateTx -> DEBU 71d config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:22.629 UTC [cauthdsl] func1 -> DEBU 71f 0xc00352be30 gate 1556789242629620200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.630 UTC [committer.txvalidator] Validate -> DEBU 721 got result for idx 0, code 0" +peer0.org1.example.com | "2019-05-02 09:27:22.630 UTC [committer.txvalidator] Validate -> INFO 722 [businesschannel] Validated block [2] in 95ms" +peer0.org1.example.com | "2019-05-02 09:27:22.629 UTC [committer.txvalidator] validateTx -> DEBU 720 [businesschannel] validateTx completes for block 0xc0030e3d40 env 0xc0032a2e10 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:22.630 UTC [cauthdsl] func2 -> DEBU 723 0xc00352be30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.631 UTC [cauthdsl] func2 -> DEBU 725 0xc00352be30 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.630 UTC [gossip.privdata] listMissingPrivateData -> DEBU 724 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-05-02 09:27:22.631 UTC [gossip.privdata] StoreBlock -> DEBU 726 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-05-02 09:27:22.631 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 727 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.631 UTC [committer] preCommit -> DEBU 728 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-05-02 09:27:22.632 UTC [kvledger] CommitWithPvtData -> DEBU 729 [businesschannel] Validating state for block [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.631 UTC [msp] Validate -> DEBU 72a MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.632 UTC [msp] getCertificationChain -> DEBU 72c MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.633 UTC [cauthdsl] func2 -> DEBU 72d 0xc00352be30 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.633 UTC [msp.identity] Verify -> DEBU 72e Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-05-02 09:27:22.633 UTC [msp.identity] Verify -> DEBU 72f Verify: sig = 00000000 30 44 02 20 46 36 3c 9c 63 4e 98 06 45 41 b5 ff |0D. F6<.cN..EA..| +peer0.org1.example.com | 00000010 4e 14 48 c7 8a a7 13 94 df 63 a0 0f c9 54 77 20 |N.H......c...Tw | +peer0.org1.example.com | 00000020 aa 84 66 18 02 20 43 89 90 3d bb ea d8 eb b0 69 |..f.. C..=.....i| +peer0.org1.example.com | 00000030 a9 f6 22 a3 db 6e 0f a6 ea e0 07 fa 10 02 ba 42 |.."..n.........B| +peer0.org1.example.com | 00000040 4b 5d ee a7 42 7a |K]..Bz|" +peer0.org1.example.com | "2019-05-02 09:27:22.632 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 72b Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:27:22.634 UTC [cauthdsl] func2 -> DEBU 730 0xc00352be30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.634 UTC [cauthdsl] func1 -> DEBU 732 0xc00352be30 gate 1556789242629620200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.635 UTC [policies] Evaluate -> DEBU 733 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.635 UTC [policies] Evaluate -> DEBU 734 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.634 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 731 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 735 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 736 ValidateAndPrepareBatch() for block number = [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 738 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [valimpl] preprocessProtoBlock -> DEBU 739 txType=CONFIG" +peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [valimpl] processNonEndorserTx -> DEBU 73a Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [valimpl] processNonEndorserTx -> DEBU 73b Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 73c constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 73d constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [peer] GenerateSimulationResults -> DEBU 73e Processing CONFIG" +peer0.org1.example.com | "2019-05-02 09:27:22.636 UTC [policies] Evaluate -> DEBU 737 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.637 UTC [policies] Evaluate -> DEBU 73f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.637 UTC [gossip.comm] authenticateRemotePeer -> DEBU 740 Authenticated 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:27:22.637 UTC [msp] DeserializeIdentity -> DEBU 742 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.637 UTC [msp] DeserializeIdentity -> DEBU 743 Obtaining identity" orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw @@ -8139,72 +7754,21 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.147 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8d7 Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.920 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 85b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.920 UTC [fsblkstorage] indexBlock -> DEBU 85c Adding txLoc [fileSuffixNum=0, offset=47699, bytesLength=22736] for tx number:[0] ID: [] to blockNumTranNum index" -peer0.org1.example.com | "2019-05-02 01:30:47.921 UTC [msp] DeserializeIdentity -> DEBU 85d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.921 UTC [cauthdsl] func2 -> DEBU 85e 0xc00234c8e0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 85f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.920 UTC [msp] DeserializeIdentity -> DEBU 860 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.922 UTC [msp] DeserializeIdentity -> DEBU 861 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.922 UTC [msp.identity] Verify -> DEBU 862 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-05-02 01:30:47.923 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 863 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.924 UTC [msp.identity] newIdentity -> DEBU 864 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c -peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv -peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr -peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.924 UTC [msp.identity] newIdentity -> DEBU 865 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c -peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv -peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr -peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:47.925 UTC [fsblkstorage] updateCheckpoint -> DEBU 866 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71373], isChainEmpty=[false], lastBlockNumber=[2]" -peer0.org1.example.com | "2019-05-02 01:30:47.925 UTC [policies] Evaluate -> DEBU 868 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.926 UTC [msp] Validate -> DEBU 869 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.929 UTC [msp] Validate -> DEBU 86a MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.929 UTC [pvtdatastorage] Commit -> DEBU 86b Committing private data for block [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.929 UTC [policies] Evaluate -> DEBU 86c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.925 UTC [msp.identity] Verify -> DEBU 867 Verify: sig = 00000000 30 44 02 20 40 12 db f1 ce 22 c2 1c 13 25 3f b3 |0D. @...."...%?.| -peer0.org1.example.com | 00000010 bc f0 02 3b 5d 31 e5 06 39 ab ae ec f2 d5 3b 55 |...;]1..9.....;U| -peer0.org1.example.com | 00000020 d2 ec 80 46 02 20 1d a3 c0 50 a6 80 2c 47 67 0c |...F. ...P..,Gg.| -peer0.org1.example.com | 00000030 06 14 26 63 d3 08 4e 42 d6 66 5a 9d 76 b5 52 56 |..&c..NB.fZ.v.RV| -peer0.org1.example.com | 00000040 ef 09 70 f6 fa ed |..p...|" -peer0.org1.example.com | "2019-05-02 01:30:47.930 UTC [msp] getCertificationChain -> DEBU 86d MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.930 UTC [msp] getCertificationChain -> DEBU 86e MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.147 UTC [msp] Validate -> DEBU 8d8 MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:45.147 UTC [msp] getCertificationChain -> DEBU 8d9 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.148 UTC [msp] hasOURole -> DEBU 8da MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:45.148 UTC [msp] getCertificationChain -> DEBU 8db MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.148 UTC [common.channelconfig] NewStandardValues -> DEBU 8dc Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:45.148 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dd Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:45.148 UTC [common.channelconfig] NewStandardValues -> DEBU 8de Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:45.148 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8df Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:45.149 UTC [common.channelconfig] Validate -> DEBU 8e0 Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-05-02 01:30:45.149 UTC [common.channelconfig] validateMSP -> DEBU 8e1 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.149 UTC [msp] newBccspMsp -> DEBU 8e2 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.149 UTC [msp] New -> DEBU 8e3 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:45.149 UTC [msp] Setup -> DEBU 8e4 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.150 UTC [msp.identity] newIdentity -> DEBU 8e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:19.625 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8c5 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.626 UTC [msp] Validate -> DEBU 8c6 MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:19.630 UTC [msp] getCertificationChain -> DEBU 8c7 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:19.631 UTC [msp] hasOURole -> DEBU 8c8 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:19.631 UTC [msp] getCertificationChain -> DEBU 8c9 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:19.632 UTC [common.channelconfig] NewStandardValues -> DEBU 8ca Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:19.632 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cb Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:19.632 UTC [common.channelconfig] NewStandardValues -> DEBU 8cc Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:19.633 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cd Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:19.633 UTC [common.channelconfig] Validate -> DEBU 8ce Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-05-02 09:27:19.633 UTC [common.channelconfig] validateMSP -> DEBU 8cf Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.633 UTC [msp] newBccspMsp -> DEBU 8d0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.633 UTC [msp] New -> DEBU 8d1 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.634 UTC [msp] Setup -> DEBU 8d2 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.636 UTC [msp.identity] newIdentity -> DEBU 8d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -8219,7 +7783,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.151 UTC [msp.identity] newIdentity -> DEBU 8e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:19.638 UTC [msp.identity] newIdentity -> DEBU 8d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -8233,341 +7797,402 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:45.151 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8e7 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.151 UTC [msp] Validate -> DEBU 8e8 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:45.152 UTC [msp] getCertificationChain -> DEBU 8e9 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.152 UTC [msp] hasOURole -> DEBU 8ea MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:45.152 UTC [msp] getCertificationChain -> DEBU 8eb MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:45.152 UTC [msp] Setup -> DEBU 8ec Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:45.153 UTC [msp] Setup -> DEBU 8ed MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:45.153 UTC [policies] NewManagerImpl -> DEBU 8ee Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.153 UTC [policies] NewManagerImpl -> DEBU 8ef Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.153 UTC [policies] NewManagerImpl -> DEBU 8f0 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.153 UTC [policies] NewManagerImpl -> DEBU 8f1 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:45.153 UTC [policies] NewManagerImpl -> DEBU 8f2 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:45.154 UTC [policies] NewManagerImpl -> DEBU 8f3 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:45.154 UTC [policies] NewManagerImpl -> DEBU 8f4 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:45.154 UTC [policies] NewManagerImpl -> DEBU 8f5 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.154 UTC [policies] NewManagerImpl -> DEBU 8f6 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.155 UTC [policies] NewManagerImpl -> DEBU 8f7 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.155 UTC [policies] NewManagerImpl -> DEBU 8f8 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.155 UTC [policies] NewManagerImpl -> DEBU 8f9 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.155 UTC [policies] NewManagerImpl -> DEBU 8fa Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.155 UTC [policies] NewManagerImpl -> DEBU 8fb Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 8fc Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 8fd Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 8fe Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 8ff Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 900 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 901 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 902 Proposed new policy Readers for Channel" -peer0.org1.example.com | "2019-05-02 01:30:47.930 UTC [grpc] infof -> DEBU 86f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.931 UTC [policies] Evaluate -> DEBU 870 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.932 UTC [cauthdsl] func2 -> DEBU 871 0xc00234c8e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.932 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 872 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.932 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 873 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.933 UTC [cauthdsl] func1 -> DEBU 874 0xc00252e040 gate 1556760647933243700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.933 UTC [cauthdsl] func1 -> DEBU 875 0xc00234c8e0 gate 1556760647908482100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.934 UTC [policies] Evaluate -> DEBU 879 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.934 UTC [policies] Evaluate -> DEBU 87a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.935 UTC [policies] Evaluate -> DEBU 87b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.935 UTC [policies] Evaluate -> DEBU 87c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.935 UTC [gossip.comm] authenticateRemotePeer -> DEBU 87d Authenticated 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.935 UTC [msp] DeserializeIdentity -> DEBU 87e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.933 UTC [msp] DeserializeIdentity -> DEBU 876 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 880 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [msp] DeserializeIdentity -> DEBU 882 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 883 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 884 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 885 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [policies] Evaluate -> DEBU 886 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [policies] Evaluate -> DEBU 887 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [policies] Evaluate -> DEBU 888 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [cauthdsl] func1 -> DEBU 889 0xc0025b4180 gate 1556760647936887100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [cauthdsl] func2 -> DEBU 88a 0xc0025b4180 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [cauthdsl] func2 -> DEBU 88b 0xc0025b4180 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 88c Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [msp] Validate -> DEBU 88d MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [msp] getCertificationChain -> DEBU 88e MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [cauthdsl] func2 -> DEBU 88f 0xc0025b4180 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [msp.identity] Verify -> DEBU 890 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [msp.identity] Verify -> DEBU 891 Verify: sig = 00000000 30 44 02 20 2e 49 72 b7 ea 20 f0 df 2a 76 01 0d |0D. .Ir.. ..*v..| -peer0.org1.example.com | 00000010 6b bc e9 c8 7d 54 c1 a6 1e ca 89 77 5d d1 ec d1 |k...}T.....w]...| -peer0.org1.example.com | 00000020 a3 0e 09 1d 02 20 52 25 8d 91 44 84 12 c4 88 53 |..... R%..D....S| -peer0.org1.example.com | 00000030 bd e3 24 41 0f a8 54 50 f3 0f 59 13 69 fd 4d 2c |..$A..TP..Y.i.M,| -peer0.org1.example.com | 00000040 32 9f 9c 5c 73 62 |2..\sb|" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [cauthdsl] func2 -> DEBU 892 0xc0025b4180 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [cauthdsl] func1 -> DEBU 893 0xc0025b4180 gate 1556760647936887100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [policies] Evaluate -> DEBU 894 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [policies] Evaluate -> DEBU 895 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [policies] Evaluate -> DEBU 896 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [policies] Evaluate -> DEBU 897 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [gossip.comm] authenticateRemotePeer -> DEBU 898 Authenticated 192.168.240.8:38810" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [gossip.comm] GossipStream -> DEBU 899 Servicing 192.168.240.8:38810" -peer0.org1.example.com | "2019-05-02 01:30:47.934 UTC [msp] DeserializeIdentity -> DEBU 877 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:45.157 UTC [policies] NewManagerImpl -> DEBU 903 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:45.157 UTC [policies] NewManagerImpl -> DEBU 904 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:45.157 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:45.157 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:45.157 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.157 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:45.159 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.159 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:45.159 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:45.159 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:45.159 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 917 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 918 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 919 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.161 UTC [common.configtx] addToMap -> DEBU 91a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.161 UTC [common.configtx] addToMap -> DEBU 91b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:45.161 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:45.161 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.161 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 925 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 926 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 89a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [msp] DeserializeIdentity -> DEBU 89b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 89c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 89d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 89e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 89f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 8a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 8a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [cauthdsl] func1 -> DEBU 8a2 0xc0025f6430 gate 1556760647938411200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [cauthdsl] func2 -> DEBU 8a3 0xc0025f6430 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [cauthdsl] func2 -> DEBU 8a4 0xc0025f6430 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [cauthdsl] func2 -> DEBU 8a5 0xc0025f6430 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [msp.identity] Verify -> DEBU 8a6 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [msp.identity] Verify -> DEBU 8a7 Verify: sig = 00000000 30 44 02 20 3f 56 e7 d1 97 98 b5 84 41 ab 9f bc |0D. ?V......A...| -peer0.org1.example.com | 00000010 71 51 fb 0c 33 fb 6c 2c 0c 3b ec b8 21 9d a2 a9 |qQ..3.l,.;..!...| -peer0.org1.example.com | 00000020 7d 99 c9 b0 02 20 06 e0 bc 14 d6 b5 3b 3d cd c8 |}.... ......;=..| -peer0.org1.example.com | 00000030 3a 2e 42 0c 68 a5 89 02 b9 ca 79 19 5b 98 c1 da |:.B.h.....y.[...| -peer0.org1.example.com | 00000040 79 92 e0 71 07 b3 |y..q..|" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [cauthdsl] func2 -> DEBU 8a8 0xc0025f6430 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [cauthdsl] func1 -> DEBU 8a9 0xc0025f6430 gate 1556760647938411200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 8aa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 8ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 8ac Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.939 UTC [policies] Evaluate -> DEBU 8ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.939 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ae Authenticated 192.168.240.8:38808" -peer0.org1.example.com | "2019-05-02 01:30:47.939 UTC [gossip.comm] GossipStream -> DEBU 8af Servicing 192.168.240.8:38808" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [pvtdatastorage] Commit -> DEBU 87f Committed private data for block [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.939 UTC [kvledger] CommitWithPvtData -> DEBU 8b0 [businesschannel] Committing block [2] transactions to state database" -peer0.org1.example.com | "2019-05-02 01:30:47.939 UTC [lockbasedtxmgr] Commit -> DEBU 8b1 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:47.939 UTC [lockbasedtxmgr] Commit -> DEBU 8b2 Committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:47.939 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 8b3 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-05-02 01:30:47.939 UTC [lockbasedtxmgr] Commit -> DEBU 8b4 Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:47.939 UTC [stateleveldb] ApplyUpdates -> DEBU 8b5 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -peer0.org1.example.com | "2019-05-02 01:30:47.937 UTC [grpc] infof -> DEBU 8b6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.936 UTC [msp.identity] Sign -> DEBU 881 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15100F " -peer0.org1.example.com | "2019-05-02 01:30:47.941 UTC [msp.identity] Sign -> DEBU 8b7 Sign: digest: 207DA0F07A70D8B2B062620EA4897C486DEE1EFBCB48FBEE32884411E9530286 " -peer0.org1.example.com | "2019-05-02 01:30:47.943 UTC [msp.identity] Sign -> DEBU 8b8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:47.944 UTC [msp.identity] Sign -> DEBU 8b9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:47.945 UTC [msp] DeserializeIdentity -> DEBU 8ba Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.945 UTC [gossip.comm] Send -> DEBU 8bb Entering, sending GossipMessage: Channel: , nonce: 1904573150992454915, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:15 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:47.946 UTC [gossip.comm] sendToEndpoint -> DEBU 8bc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1904573150992454915, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:15 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.946 UTC [gossip.comm] serviceConnection -> DEBU 8bd Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:30:47.946 UTC [gossip.comm] func2 -> DEBU 8be Client 192.168.240.8:38810 disconnected" -peer0.org1.example.com | "2019-05-02 01:30:47.946 UTC [lockbasedtxmgr] Commit -> DEBU 8bf Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-05-02 01:30:47.946 UTC [comm.grpc.server] 1 -> INFO 8c0 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.8:38810 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=50.429ms -peer0.org1.example.com | "2019-05-02 01:30:47.946 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 8c1 Preparing potential purge list working-set for expiringAtBlk [3]" -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [leveldbhelper] GetIterator -> DEBU 8c2 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 8c3 No expiry entry found for expiringAtBlk [3]" -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [lockbasedtxmgr] func1 -> DEBU 8c4 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [gossip.comm] writeToStream -> DEBU 8c5 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [gossip.comm] serviceConnection -> DEBU 8c6 Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [kvledger] CommitWithPvtData -> DEBU 8c7 [businesschannel] Committing block [2] transactions to history database" -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [gossip.comm] func2 -> DEBU 8c8 Client 192.168.240.8:38808 disconnected" -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [historyleveldb] Commit -> DEBU 8c9 Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [comm.grpc.server] 1 -> INFO 8ca streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.909Z grpc.peer_address=192.168.240.8:38808 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=37.48ms -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [historyleveldb] Commit -> DEBU 8cb Skipping transaction [0] since it is not an endorsement transaction" -peer0.org1.example.com | "2019-05-02 01:30:47.947 UTC [gossip.comm] writeToStream -> DEBU 8cc Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:30:47.934 UTC [cauthdsl] func2 -> DEBU 878 0xc00252e040 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [cauthdsl] func2 -> DEBU 8cd 0xc00252e040 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [cauthdsl] func2 -> DEBU 8ce 0xc00252e040 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 92b Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 92c Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 92d Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 92e Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 92f Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 930 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 931 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:45.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 932 As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-05-02 01:30:45.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 933 As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-05-02 01:30:45.165 UTC [policies] Manager -> DEBU 934 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:45.165 UTC [policies] Manager -> DEBU 935 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:45.165 UTC [policies] Manager -> DEBU 936 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 937 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 938 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 939 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:45.166 UTC [common.channelconfig] LogSanityChecks -> DEBU 93a As expected, current configuration has policy '/Channel/Application/Readers'" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [msp.identity] Verify -> DEBU 8cf Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [msp.identity] Verify -> DEBU 8d0 Verify: sig = 00000000 30 44 02 20 62 6f e5 0d e9 66 a3 42 0b 39 54 ec |0D. bo...f.B.9T.| -peer0.org1.example.com | 00000010 5b 4d b9 5c 0c 92 37 83 bf a4 a3 86 8d 7e 07 f9 |[M.\..7......~..| -peer0.org1.example.com | 00000020 4e 1e ea c7 02 20 1e 1b 3a 94 b3 58 65 dc 68 9f |N.... ..:..Xe.h.| -peer0.org1.example.com | 00000030 b7 14 42 65 91 60 53 8a f9 e5 a1 f2 90 42 68 d2 |..Be.`S......Bh.| -peer0.org1.example.com | 00000040 c1 ac 6f 2c d1 cd |..o,..|" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [cauthdsl] func2 -> DEBU 8d1 0xc00252e040 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [cauthdsl] func1 -> DEBU 8d2 0xc00252e040 gate 1556760647933243700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [policies] Evaluate -> DEBU 8d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [policies] Evaluate -> DEBU 8d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [policies] Evaluate -> DEBU 8d5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [policies] Evaluate -> DEBU 8d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d7 Authenticated 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.948 UTC [gossip.comm] createConnection -> DEBU 8d8 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.949 UTC [gossip.comm] sendToEndpoint -> DEBU 8d9 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.949 UTC [gossip.comm] func1 -> WARN 8da peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" -peer0.org1.example.com | "2019-05-02 01:30:47.949 UTC [gossip.comm] createConnection -> DEBU 8db Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [grpc] DialContext -> DEBU 8dc parsed scheme: """ -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [grpc] DialContext -> DEBU 8dd scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [grpc] UpdateState -> DEBU 8de ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [grpc] switchBalancer -> DEBU 8df ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [grpc] HandleSubConnStateChange -> DEBU 8e0 pickfirstBalancer: HandleSubConnStateChange: 0xc0027b66d0, CONNECTING" -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [gossip.discovery] expireDeadMembers -> WARN 8e1 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" -orderer0.example.com | "2019-05-02 01:30:45.166 UTC [common.channelconfig] LogSanityChecks -> DEBU 93b As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-05-02 01:30:45.166 UTC [common.channelconfig] LogSanityChecks -> DEBU 93c As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 93d Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 93e Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 93f Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:45.167 UTC [policies] Manager -> DEBU 940 Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-05-02 01:30:45.167 UTC [policies] Manager -> DEBU 941 Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:45.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 942 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-05-02 01:30:45.167 UTC [common.capabilities] Supported -> DEBU 943 Orderer capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:45.167 UTC [common.capabilities] Supported -> DEBU 944 Channel capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:45.167 UTC [orderer.common.server] func1 -> DEBU 945 Executing callback to update root CAs" -orderer0.example.com | "2019-05-02 01:30:45.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 946 updating root CAs for channel [businesschannel]" -orderer0.example.com | "2019-05-02 01:30:45.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 947 adding app root CAs for MSP [Org1MSP]" -orderer0.example.com | "2019-05-02 01:30:45.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 948 adding app root CAs for MSP [Org2MSP]" -orderer0.example.com | "2019-05-02 01:30:45.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 949 adding orderer root CAs for MSP [OrdererMSP]" -orderer0.example.com | "2019-05-02 01:30:45.168 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 94a [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" -orderer0.example.com | "2019-05-02 01:30:45.169 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 94b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" -orderer0.example.com | "2019-05-02 01:30:45.169 UTC [msp.identity] Sign -> DEBU 94c Sign: plaintext: 0A020801120B0A090A03010203100418...4130F9282653BA422E72B1296461086E " -orderer0.example.com | "2019-05-02 01:30:45.169 UTC [msp.identity] Sign -> DEBU 94d Sign: digest: 55A33B1FD2A405943E06CE6DBCCA10DFBAC94E9C621E409964FC262923739AC7 " -orderer0.example.com | "2019-05-02 01:30:45.172 UTC [fsblkstorage] indexBlock -> DEBU 94e Indexing block [blockNum=1, blockHash=[]byte{0xff, 0x3a, 0xf4, 0xf2, 0x7d, 0x57, 0xed, 0xa3, 0xbb, 0xd3, 0xc3, 0x89, 0xf0, 0x76, 0xc5, 0xde, 0x51, 0x48, 0x5f, 0xa5, 0xe0, 0xf9, 0x5f, 0xe5, 0xee, 0x96, 0x4e, 0xe6, 0xcd, 0x8c, 0x8d, 0x72} txOffsets= -orderer0.example.com | txId= locPointer=offset=71, bytesLength=22678 +orderer0.example.com | "2019-05-02 09:27:19.640 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8d5 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.640 UTC [msp] Validate -> DEBU 8d6 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:19.640 UTC [msp] getCertificationChain -> DEBU 8d7 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:19.641 UTC [msp] hasOURole -> DEBU 8d8 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:19.641 UTC [msp] getCertificationChain -> DEBU 8d9 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:19.641 UTC [common.channelconfig] NewStandardValues -> DEBU 8da Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:19.641 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8db Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:19.641 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dc Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:19.641 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dd Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8de Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8df Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e0 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.642 UTC [common.channelconfig] NewStandardValues -> DEBU 8e1 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e2 Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:19.643 UTC [common.channelconfig] NewStandardValues -> DEBU 8e3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:19.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e4 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:19.643 UTC [common.channelconfig] validateMSP -> DEBU 8e5 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.643 UTC [msp] newBccspMsp -> DEBU 8e6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.643 UTC [msp] New -> DEBU 8e7 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:19.644 UTC [msp] Setup -> DEBU 8e8 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:19.644 UTC [msp.identity] newIdentity -> DEBU 8e9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:19.645 UTC [msp.identity] newIdentity -> DEBU 8ea Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:19.646 UTC [msp] Validate -> DEBU 8eb MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:19.646 UTC [msp] Setup -> DEBU 8ec Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:19.646 UTC [msp] Setup -> DEBU 8ed MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:19.646 UTC [policies] NewManagerImpl -> DEBU 8ee Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8ef Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f0 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f1 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f2 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f3 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.648 UTC [policies] NewManagerImpl -> DEBU 8f4 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.648 UTC [policies] NewManagerImpl -> DEBU 8f5 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.648 UTC [policies] NewManagerImpl -> DEBU 8f6 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.649 UTC [policies] NewManagerImpl -> DEBU 8f7 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.649 UTC [policies] NewManagerImpl -> DEBU 8f8 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.649 UTC [policies] NewManagerImpl -> DEBU 8f9 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fa Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fb Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fc Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fd Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fe Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8ff Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 900 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 901 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 902 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 903 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 904 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.654 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:19.654 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.655 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:19.655 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:19.655 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 917 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 918 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 919 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 91a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91b Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:27:22.637 UTC [peer] processChannelConfigTx -> DEBU 741 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 744 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [lockbasedtxmgr] Done -> DEBU 745 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 746 Block [2] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [valinternal] ApplyWriteSet -> DEBU 749 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0035c0700)}" +peer0.org1.example.com | "2019-05-02 09:27:22.639 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74a validating rwset..." +peer0.org1.example.com | "2019-05-02 09:27:22.639 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74b postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:22.639 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74c ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-05-02 09:27:22.639 UTC [kvledger] CommitWithPvtData -> DEBU 74d [businesschannel] Committing block [2] to storage" +peer0.org1.example.com | "2019-05-02 09:27:22.639 UTC [ledgerstorage] CommitWithPvtData -> DEBU 74e Writing block [2] to pvt block store" +peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [msp.identity] newIdentity -> DEBU 747 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 74f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15100F " +peer0.org1.example.com | "2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 750 Sign: digest: 1C9F0D7EF98B17E45B15C5CD54742784DD5E737AEDA124D37E38F589075E5CF6 " +peer0.org1.example.com | "2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 751 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 752 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:22.642 UTC [msp] DeserializeIdentity -> DEBU 753 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.642 UTC [gossip.comm] Send -> DEBU 754 Entering, sending GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:22.643 UTC [gossip.comm] sendToEndpoint -> DEBU 755 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.643 UTC [gossip.comm] createConnection -> DEBU 756 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:22.644 UTC [grpc] DialContext -> DEBU 757 parsed scheme: """ +peer0.org1.example.com | "2019-05-02 09:27:22.644 UTC [grpc] DialContext -> DEBU 758 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-05-02 09:27:22.644 UTC [grpc] UpdateState -> DEBU 759 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" +peer0.org1.example.com | "2019-05-02 09:27:22.644 UTC [grpc] switchBalancer -> DEBU 75a ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-05-02 09:27:22.645 UTC [grpc] HandleSubConnStateChange -> DEBU 75b pickfirstBalancer: HandleSubConnStateChange: 0xc003621c50, CONNECTING" +peer0.org1.example.com | "2019-05-02 09:27:22.638 UTC [grpc] infof -> DEBU 748 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:22.648 UTC [pvtdatastorage] Prepare -> DEBU 75c Saved 0 private data write sets for block [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.650 UTC [grpc] HandleSubConnStateChange -> DEBU 75d pickfirstBalancer: HandleSubConnStateChange: 0xc003621c50, READY" +peer0.org1.example.com | "2019-05-02 09:27:22.651 UTC [fsblkstorage] indexBlock -> DEBU 75e Indexing block [blockNum=2, blockHash=[]byte{0x77, 0xce, 0x8d, 0x7, 0x90, 0xe, 0xa5, 0xa9, 0x76, 0x46, 0x90, 0x13, 0x95, 0x91, 0x37, 0xc8, 0x4d, 0x7f, 0xdd, 0xf1, 0x19, 0xb8, 0x8a, 0xad, 0x5f, 0xdd, 0xe8, 0x55, 0x7b, 0xa1, 0x6e, 0x5a} txOffsets= +peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=22737 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-05-02 09:27:22.652 UTC [fsblkstorage] indexBlock -> DEBU 75f txid [] is a duplicate of a previous tx. Not indexing in txid-index" +peer0.org1.example.com | "2019-05-02 09:27:22.652 UTC [fsblkstorage] indexBlock -> DEBU 760 Adding txLoc [fileSuffixNum=0, offset=47697, bytesLength=22737] for tx number:[0] ID: [] to blockNumTranNum index" +peer0.org1.example.com | "2019-05-02 09:27:22.653 UTC [msp.identity] Sign -> DEBU 761 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:22.653 UTC [msp.identity] Sign -> DEBU 762 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:22.653 UTC [gossip.comm] authenticateRemotePeer -> DEBU 763 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:27:22.657 UTC [fsblkstorage] updateCheckpoint -> DEBU 764 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71372], isChainEmpty=[false], lastBlockNumber=[2]" +peer0.org1.example.com | "2019-05-02 09:27:22.657 UTC [pvtdatastorage] Commit -> DEBU 765 Committing private data for block [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.658 UTC [gossip.comm] authenticateRemotePeer -> DEBU 766 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:27:22.658 UTC [msp] DeserializeIdentity -> DEBU 767 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.659 UTC [msp] Validate -> DEBU 768 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.659 UTC [pvtdatastorage] Commit -> DEBU 769 Committed private data for block [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [kvledger] CommitWithPvtData -> DEBU 76a [businesschannel] Committing block [2] transactions to state database" +peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [lockbasedtxmgr] Commit -> DEBU 76b lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [lockbasedtxmgr] Commit -> DEBU 76c Committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 76d Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [lockbasedtxmgr] Commit -> DEBU 76e Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:22.660 UTC [stateleveldb] ApplyUpdates -> DEBU 76f Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-05-02 09:27:22.661 UTC [msp] getCertificationChain -> DEBU 770 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.661 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 771 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.661 UTC [msp] DeserializeIdentity -> DEBU 772 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.661 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 773 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [msp] DeserializeIdentity -> DEBU 774 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 775 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 776 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 777 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [policies] Evaluate -> DEBU 778 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [policies] Evaluate -> DEBU 779 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [policies] Evaluate -> DEBU 77a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [cauthdsl] func1 -> DEBU 77b 0xc0036aac60 gate 1556789242662578600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [cauthdsl] func2 -> DEBU 77c 0xc0036aac60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [cauthdsl] func2 -> DEBU 77d 0xc0036aac60 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.662 UTC [cauthdsl] func2 -> DEBU 77e 0xc0036aac60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:22.663 UTC [cauthdsl] func2 -> DEBU 77f 0xc0036aac60 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.664 UTC [cauthdsl] func1 -> DEBU 780 0xc0036aac60 gate 1556789242662578600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.664 UTC [policies] Evaluate -> DEBU 781 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.664 UTC [policies] Evaluate -> DEBU 782 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.664 UTC [policies] Evaluate -> DEBU 783 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.665 UTC [cauthdsl] func1 -> DEBU 784 0xc0036ab4c0 gate 1556789242665023100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.665 UTC [cauthdsl] func2 -> DEBU 785 0xc0036ab4c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.665 UTC [cauthdsl] func2 -> DEBU 786 0xc0036ab4c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.665 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 787 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:22.665 UTC [msp] Validate -> DEBU 788 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:22.666 UTC [msp] getCertificationChain -> DEBU 789 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:22.667 UTC [lockbasedtxmgr] Commit -> DEBU 78a Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-05-02 09:27:22.667 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 78b Preparing potential purge list working-set for expiringAtBlk [3]" +peer0.org1.example.com | "2019-05-02 09:27:22.667 UTC [leveldbhelper] GetIterator -> DEBU 78c Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:22.667 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 78d No expiry entry found for expiringAtBlk [3]" +peer0.org1.example.com | "2019-05-02 09:27:22.668 UTC [lockbasedtxmgr] func1 -> DEBU 78e launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-05-02 09:27:22.668 UTC [kvledger] CommitWithPvtData -> DEBU 78f [businesschannel] Committing block [2] transactions to history database" +peer0.org1.example.com | "2019-05-02 09:27:22.668 UTC [historyleveldb] Commit -> DEBU 790 Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" +peer0.org1.example.com | "2019-05-02 09:27:22.668 UTC [historyleveldb] Commit -> DEBU 791 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-05-02 09:27:22.669 UTC [cauthdsl] func2 -> DEBU 792 0xc0036ab4c0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.669 UTC [msp.identity] Verify -> DEBU 793 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [msp.identity] Verify -> DEBU 794 Verify: sig = 00000000 30 45 02 21 00 ab 62 8d ce e2 3e 89 f0 9f d4 05 |0E.!..b...>.....| +peer0.org1.example.com | 00000010 a0 e4 b0 bd ba df 3b 90 60 6f 6e 2c e5 45 a9 36 |......;.`on,.E.6| +peer0.org1.example.com | 00000020 c3 7b 22 44 0c 02 20 05 52 39 fe 47 57 e5 d1 94 |.{"D.. .R9.GW...| +peer0.org1.example.com | 00000030 49 bf d0 a6 18 a6 f9 16 0d 0c 8b dd 22 99 a6 3f |I..........."..?| +peer0.org1.example.com | 00000040 e1 ab 82 b0 48 3a 73 |....H:s|" +peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [cauthdsl] func2 -> DEBU 795 0xc0036ab4c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [cauthdsl] func1 -> DEBU 796 0xc0036ab4c0 gate 1556789242665023100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 797 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 798 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 799 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 79a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [gossip.comm] authenticateRemotePeer -> DEBU 79b Authenticated 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [gossip.comm] createConnection -> DEBU 79c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.670 UTC [gossip.comm] sendToEndpoint -> DEBU 79d Exiting" +orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:19.660 UTC [common.configtx] addToMap -> DEBU 925 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:19.660 UTC [common.configtx] addToMap -> DEBU 926 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:19.660 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92b Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92d Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 92e Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 92f Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 930 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 931 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:19.662 UTC [common.channelconfig] LogSanityChecks -> DEBU 932 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 933 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 934 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 935 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 936 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 937 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 938 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 939 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 93a As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 93b As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 93c As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 93d Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 93e Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 93f Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 940 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [policies] Manager -> DEBU 941 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [common.channelconfig] LogSanityChecks -> DEBU 942 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [common.capabilities] Supported -> DEBU 943 Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [common.capabilities] Supported -> DEBU 944 Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.common.server] func1 -> DEBU 945 Executing callback to update root CAs" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 946 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 947 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 948 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 949 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 94a [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 94b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [msp.identity] Sign -> DEBU 94c Sign: plaintext: 0A020801120B0A090A03010203100418...683F1999831A1C0CDF0D984CFEC05FF5 " +orderer0.example.com | "2019-05-02 09:27:19.664 UTC [msp.identity] Sign -> DEBU 94d Sign: digest: 344DC25EA27E63D9B62219B26D45D3F996010DBE9F55CAC16F8C5001BA77DBAC " +orderer0.example.com | "2019-05-02 09:27:19.667 UTC [fsblkstorage] indexBlock -> DEBU 94e Indexing block [blockNum=1, blockHash=[]byte{0x3d, 0xc8, 0x17, 0xef, 0x7d, 0xc5, 0xdd, 0xc, 0x94, 0x3f, 0xe9, 0xfc, 0x37, 0xb1, 0xef, 0xbb, 0xc6, 0x3e, 0x6a, 0xed, 0x5c, 0x37, 0xe9, 0x5f, 0x75, 0xea, 0xfa, 0x1d, 0xbf, 0x69, 0x5, 0x4a} txOffsets= +orderer0.example.com | txId= locPointer=offset=71, bytesLength=22679 orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:30:45.175 UTC [fsblkstorage] updateCheckpoint -> DEBU 94f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47626], isChainEmpty=[false], lastBlockNumber=[1]" -orderer0.example.com | "2019-05-02 01:30:45.175 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 950 [channel: businesschannel] Wrote block [1]" -orderer0.example.com | "2019-05-02 01:30:45.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 951 Sending msg of 28 bytes to 2 on channel businesschannel took 31.3µs" -orderer0.example.com | "2019-05-02 01:30:45.577 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 952 Sending msg of 28 bytes to 3 on channel businesschannel took 23.5µs" -orderer0.example.com | "2019-05-02 01:30:45.578 UTC [orderer.common.cluster.step] sendMessage -> DEBU 953 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.7µs " -orderer0.example.com | "2019-05-02 01:30:45.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 954 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:45.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 955 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" -orderer0.example.com | "2019-05-02 01:30:45.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU 956 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 202.8µs " -orderer0.example.com | "2019-05-02 01:30:45.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU 957 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:45.582 UTC [orderer.common.cluster.step] sendMessage -> DEBU 958 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.4113ms " -orderer0.example.com | "2019-05-02 01:30:45.584 UTC [orderer.common.cluster.step] handleMessage -> DEBU 959 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:46.078 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95a Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" -orderer0.example.com | "2019-05-02 01:30:46.078 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95b Sending msg of 28 bytes to 3 on channel businesschannel took 87.5µs" -orderer0.example.com | "2019-05-02 01:30:46.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.2µs " -orderer0.example.com | "2019-05-02 01:30:46.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 642.1µs " -orderer0.example.com | "2019-05-02 01:30:46.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:46.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:46.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 960 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:46.084 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 961 Sending msg of 28 bytes to 3 on channel testchainid took 10.1µs" -orderer0.example.com | "2019-05-02 01:30:46.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU 962 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.7µs " -orderer0.example.com | "2019-05-02 01:30:46.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 963 Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" -orderer0.example.com | "2019-05-02 01:30:46.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 964 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 508.6µs " -orderer0.example.com | "2019-05-02 01:30:46.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 966 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.2µs " -orderer0.example.com | "2019-05-02 01:30:46.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 965 Sending msg of 28 bytes to 3 on channel businesschannel took 30.4µs" -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [gossip.discovery] expireDeadMembers -> WARN 8e2 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [gossip.comm] CloseConn -> DEBU 8e3 Closing connection for , PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [gossip.discovery] expireDeadMembers -> WARN 8e4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [gossip.comm] serviceConnection -> DEBU 8e5 Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:30:47.950 UTC [grpc] infof -> DEBU 8e6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:47.953 UTC [historyleveldb] Commit -> DEBU 8e7 Channel [businesschannel]: Updates committed to history database for blockNo [2]" -peer0.org1.example.com | "2019-05-02 01:30:47.954 UTC [kvledger] CommitWithPvtData -> INFO 8e8 [businesschannel] Committed block [2] with 1 transaction(s) in 57ms (state_validation=9ms block_commit=33ms state_commit=7ms)" -peer0.org1.example.com | "2019-05-02 01:30:47.954 UTC [msp.identity] Sign -> DEBU 8e9 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020803 " -peer0.org1.example.com | "2019-05-02 01:30:47.954 UTC [msp.identity] Sign -> DEBU 8ea Sign: digest: 1CEE98790D2D6AD18385C2F67EDA914EC24C20FF0DB39710106BFEE68F86848E " -peer0.org1.example.com | "2019-05-02 01:30:47.955 UTC [gossip.state] commitBlock -> DEBU 8eb [businesschannel] Committed block [2] with 1 transaction(s)" -peer0.org1.example.com | "2019-05-02 01:30:47.958 UTC [grpc] HandleSubConnStateChange -> DEBU 8ec pickfirstBalancer: HandleSubConnStateChange: 0xc0027b66d0, READY" -peer0.org1.example.com | "2019-05-02 01:30:47.960 UTC [msp.identity] Sign -> DEBU 8ed Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:47.961 UTC [msp.identity] Sign -> DEBU 8ee Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:47.961 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ef Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.963 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8f0 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.964 UTC [msp] DeserializeIdentity -> DEBU 8f1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.964 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.964 UTC [msp] DeserializeIdentity -> DEBU 8f3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.965 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.965 UTC [msp] DeserializeIdentity -> DEBU 8f5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.966 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.966 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8f7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.966 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8f8 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.966 UTC [policies] Evaluate -> DEBU 8f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.966 UTC [policies] Evaluate -> DEBU 8fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.967 UTC [policies] Evaluate -> DEBU 8fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.967 UTC [cauthdsl] func1 -> DEBU 8fc 0xc0027faec0 gate 1556760647967440400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.967 UTC [cauthdsl] func2 -> DEBU 8fd 0xc0027faec0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.967 UTC [cauthdsl] func2 -> DEBU 8fe 0xc0027faec0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.968 UTC [cauthdsl] func2 -> DEBU 8ff 0xc0027faec0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.968 UTC [msp.identity] Verify -> DEBU 900 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-05-02 01:30:47.968 UTC [msp.identity] Verify -> DEBU 901 Verify: sig = 00000000 30 45 02 21 00 92 cb 48 51 95 f4 f3 5f b7 cb 48 |0E.!...HQ..._..H| -peer0.org1.example.com | 00000010 d8 ed 93 44 71 ca 55 41 0e 9f 9f c3 a7 2b 68 02 |...Dq.UA.....+h.| -peer0.org1.example.com | 00000020 1a 99 33 9f 39 02 20 14 02 58 a2 14 1c a6 06 cc |..3.9. ..X......| -peer0.org1.example.com | 00000030 90 a2 99 03 6f 15 37 98 aa ef c9 28 dd e7 e6 db |....o.7....(....| -peer0.org1.example.com | 00000040 f8 bc 21 5c 63 a9 d5 |..!\c..|" -peer0.org1.example.com | "2019-05-02 01:30:47.969 UTC [cauthdsl] func2 -> DEBU 902 0xc0027faec0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.969 UTC [cauthdsl] func1 -> DEBU 903 0xc0027faec0 gate 1556760647967440400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.969 UTC [policies] Evaluate -> DEBU 904 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.969 UTC [policies] Evaluate -> DEBU 905 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.969 UTC [policies] Evaluate -> DEBU 906 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.970 UTC [policies] Evaluate -> DEBU 907 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.970 UTC [gossip.comm] authenticateRemotePeer -> DEBU 908 Authenticated 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:30:47.970 UTC [gossip.comm] createConnection -> DEBU 909 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.970 UTC [gossip.comm] sendToEndpoint -> DEBU 90a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.973 UTC [gossip.comm] func1 -> DEBU 90b Got message: GossipMessage: Channel: , nonce: 1904573150992454915, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-05-02 01:30:46.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 967 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:46.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU 968 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:46.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU 969 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:46.583 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96a Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" -orderer0.example.com | "2019-05-02 01:30:46.583 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 329.8µs " -orderer0.example.com | "2019-05-02 01:30:47.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96c Sending msg of 28 bytes to 3 on channel businesschannel took 21.3µs" -orderer0.example.com | "2019-05-02 01:30:47.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96d Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" -orderer0.example.com | "2019-05-02 01:30:47.075 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.8µs " -orderer0.example.com | "2019-05-02 01:30:47.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 253.6µs " -orderer0.example.com | "2019-05-02 01:30:47.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 970 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:47.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 971 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:47.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 972 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:47.082 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 973 Sending msg of 28 bytes to 3 on channel testchainid took 19.8µs" -orderer0.example.com | "2019-05-02 01:30:47.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU 974 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 632.9µs " -orderer0.example.com | "2019-05-02 01:30:47.242 UTC [orderer.common.server] Deliver -> DEBU 975 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:47.242 UTC [common.deliver] Handle -> DEBU 976 Starting new deliver loop for 192.168.240.9:47316" -orderer0.example.com | "2019-05-02 01:30:47.243 UTC [common.deliver] Handle -> DEBU 977 Attempting to read seek info message from 192.168.240.9:47316" -orderer0.example.com | "2019-05-02 01:30:47.256 UTC [orderer.common.server] Broadcast -> DEBU 978 Starting new Broadcast handler" -orderer0.example.com | "2019-05-02 01:30:47.256 UTC [orderer.common.broadcast] Handle -> DEBU 979 Starting new broadcast loop for 192.168.240.9:47318" -orderer0.example.com | "2019-05-02 01:30:47.257 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 97a [channel: businesschannel] Broadcast is processing config update message from 192.168.240.9:47318" -orderer0.example.com | "2019-05-02 01:30:47.257 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 97b Processing config update message for channel businesschannel" -orderer0.example.com | "2019-05-02 01:30:47.258 UTC [policies] Evaluate -> DEBU 97c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:30:47.258 UTC [policies] Evaluate -> DEBU 97d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.258 UTC [policies] Evaluate -> DEBU 97e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-05-02 01:30:47.259 UTC [policies] Evaluate -> DEBU 97f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.259 UTC [policies] Evaluate -> DEBU 980 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-05-02 01:30:47.259 UTC [msp] DeserializeIdentity -> DEBU 981 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.260 UTC [msp.identity] newIdentity -> DEBU 982 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:19.670 UTC [fsblkstorage] updateCheckpoint -> DEBU 94f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47625], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-05-02 09:27:19.670 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 950 [channel: businesschannel] Wrote block [1]" +peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [gossip.comm] func1 -> DEBU 79e Got message: GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [gossip.gossip] handleMessage -> DEBU 79f Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [gossip.gossip] handleMessage -> DEBU 7a0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7a1 Got message: GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a2 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:22.675 UTC [msp.identity] Verify -> DEBU 7a3 Verify: digest = 00000000 3b 8b fe b5 67 e7 b7 5f 1e 0d b2 9d eb 20 ed 14 |;...g.._..... ..| +peer0.org1.example.com | 00000010 02 ff 66 cd 4f c7 16 7c 04 31 5d 70 96 2c fe 42 |..f.O..|.1]p.,.B|" +peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [msp.identity] Verify -> DEBU 7a4 Verify: sig = 00000000 30 44 02 20 41 71 ce b9 93 60 a2 97 82 35 e8 86 |0D. Aq...`...5..| +peer0.org1.example.com | 00000010 a8 ef 6c 1e 44 4f 13 a9 dc 4f 2b 82 f8 95 7d 80 |..l.DO...O+...}.| +peer0.org1.example.com | 00000020 f0 40 bc 6b 02 20 74 8a 58 4d ba 7e 10 de e5 35 |.@.k. t.XM.~...5| +peer0.org1.example.com | 00000030 7e 39 05 53 0a 15 70 18 73 53 24 0c c6 c9 e6 fd |~9.S..p.sS$.....| +peer0.org1.example.com | 00000040 c8 d0 bc 01 d2 fb |......|" +peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a6 got old alive message about alive peer Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 lastAliveTS: 1556789229135374800, 19 but got ts: inc_num:1556789229135374800 seq_num:18 " +peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a8 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:22.676 UTC [msp.identity] Verify -> DEBU 7a9 Verify: digest = 00000000 1c 9f 0d 7e f9 8b 17 e4 5b 15 c5 cd 54 74 27 84 |...~....[...Tt'.| +peer0.org1.example.com | 00000010 dd 5e 73 7a ed a1 24 d3 7e 38 f5 89 07 5e 5c f6 |.^sz..$.~8...^\.|" +peer0.org1.example.com | "2019-05-02 09:27:22.677 UTC [msp.identity] Verify -> DEBU 7aa Verify: sig = 00000000 30 45 02 21 00 da 21 68 1c 3b 3f 24 7b aa 1e 84 |0E.!..!h.;?${...| +peer0.org1.example.com | 00000010 79 a0 af 8c 08 c9 fc 78 6a a4 73 e5 0e c3 07 a9 |y......xj.s.....| +peer0.org1.example.com | 00000020 7b 3c 8b 43 97 02 20 46 bb 25 39 92 ed 83 f7 70 |{<.C.. F.%9....p| +peer0.org1.example.com | 00000030 7f 59 f5 33 e1 49 fb ff 76 fb 24 0e d6 19 e9 a9 |.Y.3.I..v.$.....| +peer0.org1.example.com | 00000040 51 a0 89 cf cc 9b f1 |Q......|" +peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ab Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [gossip.discovery] isSentByMe -> DEBU 7ac Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ad Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7ae Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [historyleveldb] Commit -> DEBU 7af Channel [businesschannel]: Updates committed to history database for blockNo [2]" +peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [kvledger] CommitWithPvtData -> INFO 7b0 [businesschannel] Committed block [2] with 1 transaction(s) in 46ms (state_validation=7ms block_commit=20ms state_commit=8ms)" +peer0.org1.example.com | "2019-05-02 09:27:22.678 UTC [msp] DeserializeIdentity -> DEBU 7b1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.679 UTC [msp.identity] Sign -> DEBU 7b2 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020803 " +peer0.org1.example.com | "2019-05-02 09:27:22.679 UTC [msp.identity] Sign -> DEBU 7b3 Sign: digest: 3811DE16E7CAE6E4D211B6AA1B4BFDD46D07171C5DDD92B8D5C1F5664EDB62AD " +peer0.org1.example.com | "2019-05-02 09:27:22.680 UTC [gossip.state] commitBlock -> DEBU 7b4 [businesschannel] Committed block [2] with 1 transaction(s)" +orderer0.example.com | "2019-05-02 09:27:19.716 UTC [orderer.common.cluster.step] handleMessage -> DEBU 951 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:19.717 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 952 Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +orderer0.example.com | "2019-05-02 09:27:19.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU 953 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180µs " +orderer0.example.com | "2019-05-02 09:27:19.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 954 Sending msg of 28 bytes to 2 on channel businesschannel took 53.6µs" +orderer0.example.com | "2019-05-02 09:27:19.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 955 Sending msg of 28 bytes to 3 on channel businesschannel took 62.9µs" +orderer0.example.com | "2019-05-02 09:27:19.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 956 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.3µs " +orderer0.example.com | "2019-05-02 09:27:19.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 957 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.4µs " +orderer0.example.com | "2019-05-02 09:27:19.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 958 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:19.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 959 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:20.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:20.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95b Sending msg of 28 bytes to 3 on channel testchainid took 167.1µs" +orderer0.example.com | "2019-05-02 09:27:20.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 323.4µs " +orderer0.example.com | "2019-05-02 09:27:20.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95d Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs" +orderer0.example.com | "2019-05-02 09:27:20.491 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95e Sending msg of 28 bytes to 3 on channel businesschannel took 42.4µs" +orderer0.example.com | "2019-05-02 09:27:20.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.1µs " +orderer0.example.com | "2019-05-02 09:27:20.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 960 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.9664ms " +orderer0.example.com | "2019-05-02 09:27:20.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU 961 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:20.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU 962 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:20.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 963 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:20.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 964 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +orderer0.example.com | "2019-05-02 09:27:20.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 965 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +orderer0.example.com | "2019-05-02 09:27:20.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 966 Sending msg of 28 bytes to 2 on channel businesschannel took 383.9µs" +orderer0.example.com | "2019-05-02 09:27:20.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 968 Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +orderer0.example.com | "2019-05-02 09:27:20.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 967 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.3µs " +orderer0.example.com | "2019-05-02 09:27:20.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 969 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 476.7µs " +orderer0.example.com | "2019-05-02 09:27:20.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:20.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:21.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:21.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96d Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +orderer0.example.com | "2019-05-02 09:27:21.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 429.5µs " +orderer0.example.com | "2019-05-02 09:27:21.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96f Sending msg of 28 bytes to 2 on channel businesschannel took 38.5µs" +orderer0.example.com | "2019-05-02 09:27:21.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 970 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 578.8µs " +orderer0.example.com | "2019-05-02 09:27:21.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 971 Sending msg of 28 bytes to 3 on channel businesschannel took 33.6µs" +orderer0.example.com | "2019-05-02 09:27:21.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 972 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.6µs " +orderer0.example.com | "2019-05-02 09:27:21.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 973 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:21.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 974 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:21.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 975 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:21.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 976 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +peer0.org1.example.com | "2019-05-02 09:27:22.680 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.680 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.681 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.681 UTC [policies] Evaluate -> DEBU 7b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.681 UTC [policies] Evaluate -> DEBU 7b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.681 UTC [policies] Evaluate -> DEBU 7ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.681 UTC [cauthdsl] func1 -> DEBU 7bb 0xc0036def40 gate 1556789242681876900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7bc 0xc0036def40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7bd 0xc0036def40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7be 0xc0036def40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7bf 0xc0036def40 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.682 UTC [cauthdsl] func1 -> DEBU 7c0 0xc0036def40 gate 1556789242681876900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [policies] Evaluate -> DEBU 7c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [policies] Evaluate -> DEBU 7c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [policies] Evaluate -> DEBU 7c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [cauthdsl] func1 -> DEBU 7c4 0xc0036df780 gate 1556789242683458700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [cauthdsl] func2 -> DEBU 7c5 0xc0036df780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [cauthdsl] func2 -> DEBU 7c6 0xc0036df780 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [cauthdsl] func2 -> DEBU 7c7 0xc0036df780 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.683 UTC [msp.identity] Verify -> DEBU 7c8 Verify: digest = 00000000 14 41 ad e5 11 61 77 f1 7c 69 d6 60 27 6f 11 2a |.A...aw.|i.`'o.*| +peer0.org1.example.com | 00000010 9d 8a 5f f1 c4 6d a7 50 72 ea a6 70 3e 70 f9 12 |.._..m.Pr..p>p..|" +peer0.org1.example.com | "2019-05-02 09:27:22.684 UTC [msp.identity] Verify -> DEBU 7c9 Verify: sig = 00000000 30 44 02 20 2d f7 2b 2f 8f dd 00 67 4d 49 02 10 |0D. -.+/...gMI..| +peer0.org1.example.com | 00000010 b4 5b 34 d9 5d ff 55 09 4a de 66 69 b1 53 44 0b |.[4.].U.J.fi.SD.| +peer0.org1.example.com | 00000020 f5 19 40 5b 02 20 67 ee 0f ad 63 d0 76 53 87 cd |..@[. g...c.vS..| +peer0.org1.example.com | 00000030 50 6f 20 bd 6e 5b 64 2a 6d 05 70 d4 a6 79 73 a7 |Po .n[d*m.p..ys.| +peer0.org1.example.com | 00000040 2e 6b ce 70 79 db |.k.py.|" +peer0.org1.example.com | "2019-05-02 09:27:22.684 UTC [cauthdsl] func2 -> DEBU 7ca 0xc0036df780 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [cauthdsl] func1 -> DEBU 7cb 0xc0036df780 gate 1556789242683458700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7ce Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.685 UTC [gossip.discovery] learnNewMembers -> DEBU 7d1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-05-02 09:27:22.686 UTC [gossip.discovery] learnNewMembers -> DEBU 7d2 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.686 UTC [gossip.discovery] learnNewMembers -> DEBU 7d3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.686 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7d5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.847 UTC [comm.grpc.server] 1 -> INFO 7d6 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.846Z grpc.peer_address=172.18.0.9:42014 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.8µs +peer0.org1.example.com | "2019-05-02 09:27:22.850 UTC [msp.identity] Sign -> DEBU 7d7 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:22.850 UTC [msp.identity] Sign -> DEBU 7d8 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:22.851 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d9 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:42014" +peer0.org1.example.com | "2019-05-02 09:27:22.852 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7da Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42014" +peer0.org1.example.com | "2019-05-02 09:27:22.852 UTC [msp] DeserializeIdentity -> DEBU 7db Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.853 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.853 UTC [msp] DeserializeIdentity -> DEBU 7dd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.854 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.854 UTC [msp] DeserializeIdentity -> DEBU 7df Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:21.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU 977 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 251.5µs " +orderer0.example.com | "2019-05-02 09:27:21.737 UTC [orderer.common.server] Deliver -> DEBU 978 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:21.738 UTC [common.deliver] Handle -> DEBU 979 Starting new deliver loop for 172.18.0.8:57182" +orderer0.example.com | "2019-05-02 09:27:21.739 UTC [common.deliver] Handle -> DEBU 97a Attempting to read seek info message from 172.18.0.8:57182" +orderer0.example.com | "2019-05-02 09:27:21.754 UTC [orderer.common.server] Broadcast -> DEBU 97b Starting new Broadcast handler" +orderer0.example.com | "2019-05-02 09:27:21.755 UTC [orderer.common.broadcast] Handle -> DEBU 97c Starting new broadcast loop for 172.18.0.8:57184" +orderer0.example.com | "2019-05-02 09:27:21.755 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 97d [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57184" +orderer0.example.com | "2019-05-02 09:27:21.756 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 97e Processing config update message for channel businesschannel" +orderer0.example.com | "2019-05-02 09:27:21.756 UTC [policies] Evaluate -> DEBU 97f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:21.757 UTC [policies] Evaluate -> DEBU 980 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:21.757 UTC [policies] Evaluate -> DEBU 981 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:27:21.758 UTC [policies] Evaluate -> DEBU 982 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:21.758 UTC [policies] Evaluate -> DEBU 983 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:21.759 UTC [msp] DeserializeIdentity -> DEBU 984 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:21.759 UTC [msp.identity] newIdentity -> DEBU 985 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -8581,278 +8206,219 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.261 UTC [cauthdsl] func1 -> DEBU 983 0xc00107c9d0 gate 1556760647261516500 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.261 UTC [cauthdsl] func2 -> DEBU 984 0xc00107c9d0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.261 UTC [cauthdsl] func2 -> DEBU 985 0xc00107c9d0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.261 UTC [cauthdsl] func2 -> DEBU 986 0xc00107c9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -orderer0.example.com | "2019-05-02 01:30:47.262 UTC [cauthdsl] func2 -> DEBU 987 0xc00107c9d0 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:30:47.262 UTC [cauthdsl] func1 -> DEBU 988 0xc00107c9d0 gate 1556760647261516500 evaluation fails" -orderer0.example.com | "2019-05-02 01:30:47.262 UTC [policies] Evaluate -> DEBU 989 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:47.262 UTC [policies] Evaluate -> DEBU 98a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:47.263 UTC [policies] func1 -> DEBU 98b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -orderer0.example.com | "2019-05-02 01:30:47.264 UTC [policies] Evaluate -> DEBU 98c Signature set did not satisfy policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:47.264 UTC [policies] Evaluate -> DEBU 98d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:47.264 UTC [policies] Evaluate -> DEBU 98e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:30:47.264 UTC [policies] Evaluate -> DEBU 98f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.974 UTC [gossip.gossip] handleMessage -> DEBU 90c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 1904573150992454915, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.974 UTC [gossip.gossip] handleMessage -> DEBU 90d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 90e Got message: GossipMessage: Channel: , nonce: 1904573150992454915, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 90f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:47.975 UTC [msp.identity] Verify -> DEBU 910 Verify: digest = 00000000 20 7d a0 f0 7a 70 d8 b2 b0 62 62 0e a4 89 7c 48 | }..zp...bb...|H| -peer0.org1.example.com | 00000010 6d ee 1e fb cb 48 fb ee 32 88 44 11 e9 53 02 86 |m....H..2.D..S..|" -peer0.org1.example.com | "2019-05-02 01:30:47.975 UTC [msp.identity] Verify -> DEBU 911 Verify: sig = 00000000 30 44 02 20 73 ea bc 2e e2 33 cc 17 2a 05 2c e7 |0D. s....3..*.,.| -peer0.org1.example.com | 00000010 6f 37 c5 07 5a a6 0d a3 86 66 ef 22 92 cf d4 c8 |o7..Z....f."....| -peer0.org1.example.com | 00000020 a1 9f db a1 02 20 18 08 88 c4 56 59 2e 9d 22 96 |..... ....VY..".| -peer0.org1.example.com | 00000030 93 40 da 6d 0f 2e 4e ff dd c7 b3 77 f6 2f 4e b1 |.@.m..N....w./N.| -peer0.org1.example.com | 00000040 62 75 e3 d1 aa 49 |bu...I|" -peer0.org1.example.com | "2019-05-02 01:30:47.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 912 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:15 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.976 UTC [gossip.discovery] isSentByMe -> DEBU 913 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:15 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 914 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.976 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 915 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:47.977 UTC [msp.identity] Verify -> DEBU 916 Verify: digest = 00000000 55 13 64 07 c3 c2 9b 1d 08 56 6f f3 ff 9d 41 67 |U.d......Vo...Ag| -peer0.org1.example.com | 00000010 77 7c be 85 23 78 cf fd 59 1b 9c ce 64 e8 02 fc |w|..#x..Y...d...|" -peer0.org1.example.com | "2019-05-02 01:30:47.977 UTC [msp.identity] Verify -> DEBU 917 Verify: sig = 00000000 30 44 02 20 03 98 23 eb 8c 42 0b 68 d2 38 99 aa |0D. ..#..B.h.8..| -peer0.org1.example.com | 00000010 05 4a dd 56 0e 82 35 0f b3 39 19 b3 12 83 75 7b |.J.V..5..9....u{| -peer0.org1.example.com | 00000020 35 f2 90 56 02 20 5b a2 f3 e5 1f 6c e2 48 c1 7f |5..V. [....l.H..| -peer0.org1.example.com | 00000030 50 c7 d2 51 86 99 fb 30 d6 ef 0d c9 c9 4f 56 fc |P..Q...0.....OV.| -peer0.org1.example.com | 00000040 2d d5 e9 38 46 90 |-..8F.|" -peer0.org1.example.com | "2019-05-02 01:30:47.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 918 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 919 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:47.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 91a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:18 " -peer0.org1.example.com | "2019-05-02 01:30:47.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 91b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:18 " -peer0.org1.example.com | "2019-05-02 01:30:47.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 91c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:47.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 91d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 91e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.979 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 91f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:30:47.979 UTC [msp] DeserializeIdentity -> DEBU 920 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.264 UTC [policies] Evaluate -> DEBU 990 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:30:47.265 UTC [cauthdsl] func1 -> DEBU 991 0xc0010a6000 gate 1556760647265136700 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.265 UTC [cauthdsl] func2 -> DEBU 992 0xc0010a6000 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.265 UTC [cauthdsl] func2 -> DEBU 993 0xc0010a6000 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.265 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 994 Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.265 UTC [msp] Validate -> DEBU 995 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.266 UTC [msp] getCertificationChain -> DEBU 996 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.267 UTC [cauthdsl] func2 -> DEBU 997 0xc0010a6000 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:47.267 UTC [msp.identity] Verify -> DEBU 998 Verify: digest = 00000000 fa 56 9b 68 0f f0 0b 27 52 f9 72 03 bb d9 e7 c8 |.V.h...'R.r.....| -orderer0.example.com | 00000010 67 25 c1 32 45 5e d9 2e 10 06 48 e5 76 5f 4f 2f |g%.2E^....H.v_O/|" -orderer0.example.com | "2019-05-02 01:30:47.268 UTC [msp.identity] Verify -> DEBU 999 Verify: sig = 00000000 30 44 02 20 13 91 18 f3 9c f5 ab d2 e9 cf 79 8f |0D. ..........y.| -orderer0.example.com | 00000010 50 f6 c1 24 7b 7c 6c 1c dc c5 c9 49 67 8d 2c 64 |P..${|l....Ig.,d| -orderer0.example.com | 00000020 4c f3 74 d1 02 20 3e 71 3d e9 4b 2a 4e e1 bd 4b |L.t.. >q=.K*N..K| -orderer0.example.com | 00000030 ea 4d 36 20 93 f7 6d 92 a4 d7 4d 7d 9f 14 aa 08 |.M6 ..m...M}....| -orderer0.example.com | 00000040 b8 78 3f fe 75 91 |.x?.u.|" -orderer0.example.com | "2019-05-02 01:30:47.268 UTC [cauthdsl] func2 -> DEBU 99a 0xc0010a6000 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:47.269 UTC [cauthdsl] func1 -> DEBU 99b 0xc0010a6000 gate 1556760647265136700 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:47.269 UTC [policies] Evaluate -> DEBU 99c Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:47.269 UTC [policies] Evaluate -> DEBU 99d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:47.270 UTC [policies] Evaluate -> DEBU 99e Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:47.270 UTC [policies] Evaluate -> DEBU 99f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:47.271 UTC [policies] Evaluate -> DEBU 9a0 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:47.271 UTC [policies] Evaluate -> DEBU 9a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:47.272 UTC [common.configtx] addToMap -> DEBU 9a2 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:47.272 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.273 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.273 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:47.274 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:47.274 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.274 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:47.274 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.275 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:47.275 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.275 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.276 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:47.276 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.276 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:47.276 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.277 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:47.277 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.277 UTC [common.configtx] verifyDeltaSet -> DEBU 9b3 Processing change to key: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.278 UTC [common.configtx] policyForItem -> DEBU 9b4 Getting policy for item Org2MSP with mod_policy Admins" -orderer0.example.com | "2019-05-02 01:30:47.278 UTC [policies] Manager -> DEBU 9b5 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:47.278 UTC [policies] Manager -> DEBU 9b6 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9b7 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9b8 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9b9 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9ba Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9bb Manager Channel/Application looking up path [Org2MSP]" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9bc Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9bd Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9be Manager Channel/Application/Org2MSP looking up path []" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [policies] Evaluate -> DEBU 9bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [cauthdsl] func1 -> DEBU 9c0 0xc0010b0f80 gate 1556760647279433600 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [cauthdsl] func2 -> DEBU 9c1 0xc0010b0f80 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [cauthdsl] func2 -> DEBU 9c2 0xc0010b0f80 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9c3 Checking if identity satisfies ADMIN role for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [cauthdsl] func2 -> DEBU 9c4 0xc0010b0f80 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [msp.identity] Verify -> DEBU 9c5 Verify: digest = 00000000 94 91 3a 9b 42 3e cb f7 04 35 a7 fe 6e 63 d5 7c |..:.B>...5..nc.|| -orderer0.example.com | 00000010 7c 24 53 70 15 d2 b1 1a 57 a8 f8 c6 bb 05 dc 1f ||$Sp....W.......|" -peer0.org1.example.com | "2019-05-02 01:30:47.980 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 921 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 922 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 923 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.980 UTC [policies] Evaluate -> DEBU 924 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.980 UTC [policies] Evaluate -> DEBU 925 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.981 UTC [policies] Evaluate -> DEBU 926 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.981 UTC [cauthdsl] func1 -> DEBU 927 0xc002c2bd30 gate 1556760647981271500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.981 UTC [cauthdsl] func2 -> DEBU 928 0xc002c2bd30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.981 UTC [cauthdsl] func2 -> DEBU 929 0xc002c2bd30 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.981 UTC [cauthdsl] func2 -> DEBU 92a 0xc002c2bd30 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.982 UTC [msp.identity] Verify -> DEBU 92b Verify: digest = 00000000 59 12 61 c3 97 a1 f4 57 cd aa 79 70 6f 8f 71 5c |Y.a....W..ypo.q\| -peer0.org1.example.com | 00000010 79 5e 5b 4a 02 e3 2c ec 23 65 3f 1f 44 fc 8c 7a |y^[J..,.#e?.D..z|" -peer0.org1.example.com | "2019-05-02 01:30:47.982 UTC [msp.identity] Verify -> DEBU 92c Verify: sig = 00000000 30 45 02 21 00 e5 8c ff 82 06 43 9d 0d b4 96 fa |0E.!......C.....| -peer0.org1.example.com | 00000010 c4 96 b3 ee 6c f6 69 5b 2e b8 6e 7c 08 a7 a5 0f |....l.i[..n|....| -peer0.org1.example.com | 00000020 e6 8f 3d 40 c0 02 20 4f 5a 42 c0 13 2f 65 7b 98 |..=@.. OZB../e{.| -peer0.org1.example.com | 00000030 28 ce a0 23 66 51 77 88 e7 d1 e2 79 1f a7 68 2e |(..#fQw....y..h.| -peer0.org1.example.com | 00000040 c2 1a 73 ec 85 7f 6d |..s...m|" -peer0.org1.example.com | "2019-05-02 01:30:47.982 UTC [cauthdsl] func2 -> DEBU 92d 0xc002c2bd30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.983 UTC [cauthdsl] func1 -> DEBU 92e 0xc002c2bd30 gate 1556760647981271500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.983 UTC [policies] Evaluate -> DEBU 92f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.983 UTC [policies] Evaluate -> DEBU 930 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.984 UTC [policies] Evaluate -> DEBU 931 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.984 UTC [policies] Evaluate -> DEBU 932 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.985 UTC [gossip.discovery] handleAliveMessage -> DEBU 933 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.985 UTC [gossip.discovery] learnNewMembers -> DEBU 934 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}" -peer0.org1.example.com | "2019-05-02 01:30:47.985 UTC [gossip.discovery] learnNewMembers -> DEBU 935 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.985 UTC [gossip.discovery] learnNewMembers -> DEBU 936 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.986 UTC [gossip.discovery] handleAliveMessage -> DEBU 937 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.986 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 938 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:47.986 UTC [msp] DeserializeIdentity -> DEBU 939 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:47.987 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 93a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:47.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 93b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 93c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:47.987 UTC [policies] Evaluate -> DEBU 93d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [msp.identity] Verify -> DEBU 9c6 Verify: sig = 00000000 30 44 02 20 2a 4c 37 99 83 06 3b 26 bc cd 68 87 |0D. *L7...;&..h.| -orderer0.example.com | 00000010 b4 dc 8d 15 40 47 d5 be ff cd 6a b3 4e fb 5a 82 |....@G....j.N.Z.| -orderer0.example.com | 00000020 06 7e 76 b6 02 20 04 f7 43 d0 0a f5 49 8b 53 76 |.~v.. ..C...I.Sv| -orderer0.example.com | 00000030 e9 cd a4 0c 01 31 38 3b 3f 69 a2 6e 25 1c d8 26 |.....18;?i.n%..&| -orderer0.example.com | 00000040 b9 56 9b 7e 5e 90 |.V.~^.|" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [cauthdsl] func2 -> DEBU 9c7 0xc0010b0f80 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:47.279 UTC [cauthdsl] func1 -> DEBU 9c8 0xc0010b0f80 gate 1556760647279433600 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [policies] Evaluate -> DEBU 9c9 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [policies] Evaluate -> DEBU 9ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] verifyDeltaSet -> DEBU 9cb Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9cc Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9cd Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9ce Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9cf Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d0 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d1 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d2 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d3 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d5 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d6 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d7 Setting policy for key Endorsement to " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d8 Setting policy for key Readers to " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d9 Setting policy for key Writers to " -orderer0.example.com | "2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9da Setting policy for key Admins to " -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9db Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9dc Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9dd Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9de Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9df Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9e0 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9e1 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9e2 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] NewStandardValues -> DEBU 9e3 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e4 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e5 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e6 Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e7 Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e8 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] NewStandardValues -> DEBU 9e9 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ea Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9eb Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ec Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ed Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:47.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ee Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:47.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ef Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.283 UTC [common.channelconfig] NewStandardValues -> DEBU 9f0 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:47.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f1 Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:47.284 UTC [common.channelconfig] NewStandardValues -> DEBU 9f2 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:47.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f3 Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:30:47.987 UTC [policies] Evaluate -> DEBU 93e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:47.988 UTC [policies] Evaluate -> DEBU 93f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:47.988 UTC [cauthdsl] func1 -> DEBU 940 0xc002c57b40 gate 1556760647988423200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:47.988 UTC [cauthdsl] func2 -> DEBU 941 0xc002c57b40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:47.988 UTC [cauthdsl] func2 -> DEBU 942 0xc002c57b40 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:47.989 UTC [cauthdsl] func2 -> DEBU 943 0xc002c57b40 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.989 UTC [msp.identity] Verify -> DEBU 944 Verify: digest = 00000000 84 64 45 99 78 3d f9 90 03 20 36 7e 27 2b e1 be |.dE.x=... 6~'+..| -peer0.org1.example.com | 00000010 73 f7 11 75 ab 9c 5e e9 fa 27 65 cb e5 bd 83 fe |s..u..^..'e.....|" -peer0.org1.example.com | "2019-05-02 01:30:47.989 UTC [msp.identity] Verify -> DEBU 945 Verify: sig = 00000000 30 45 02 21 00 80 c2 2d 65 49 aa 1b 00 27 bb f6 |0E.!...-eI...'..| -peer0.org1.example.com | 00000010 35 78 f5 02 a1 da fc 2f aa 30 b1 91 18 65 25 63 |5x...../.0...e%c| -peer0.org1.example.com | 00000020 d4 63 f1 8d db 02 20 3f b4 2c d2 77 86 ee b2 b5 |.c.... ?.,.w....| -peer0.org1.example.com | 00000030 cc 87 d2 81 60 9b 14 be 96 7d e8 b5 1a 7d 15 26 |....`....}...}.&| -peer0.org1.example.com | 00000040 c1 c3 95 57 fb c6 60 |...W..`|" -peer0.org1.example.com | "2019-05-02 01:30:47.990 UTC [cauthdsl] func2 -> DEBU 946 0xc002c57b40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:47.990 UTC [cauthdsl] func1 -> DEBU 947 0xc002c57b40 gate 1556760647988423200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:47.990 UTC [policies] Evaluate -> DEBU 948 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.990 UTC [policies] Evaluate -> DEBU 949 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.991 UTC [policies] Evaluate -> DEBU 94a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.991 UTC [policies] Evaluate -> DEBU 94b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:47.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 94c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:6 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:47.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 94d got old alive message about dead peer Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 lastDeadTS: 1556760633527025900, 16 but got ts: inc_num:1556760633527025900 seq_num:6 " -peer0.org1.example.com | "2019-05-02 01:30:47.992 UTC [gossip.discovery] handleAliveMessage -> DEBU 94e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:47.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 94f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.463 UTC [comm.grpc.server] 1 -> INFO 950 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:50.462Z grpc.peer_address=192.168.240.6:44982 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.8µs -peer0.org1.example.com | "2019-05-02 01:30:48.464 UTC [msp.identity] Sign -> DEBU 951 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:48.464 UTC [msp.identity] Sign -> DEBU 952 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:48.465 UTC [gossip.comm] authenticateRemotePeer -> DEBU 953 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.6:44982" -peer0.org1.example.com | "2019-05-02 01:30:48.466 UTC [gossip.comm] authenticateRemotePeer -> DEBU 954 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:44982" -peer0.org1.example.com | "2019-05-02 01:30:48.467 UTC [msp.identity] Verify -> DEBU 955 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-05-02 01:30:48.467 UTC [msp.identity] Verify -> DEBU 956 Verify: sig = 00000000 30 45 02 21 00 93 9f bb c3 94 0d 2b 22 14 ff 02 |0E.!.......+"...| -peer0.org1.example.com | 00000010 27 d7 fd f0 f4 9a 7b 5c df 9c b7 0d f9 c0 20 68 |'.....{\...... h| -peer0.org1.example.com | 00000020 4c 0d 92 89 e4 02 20 76 1c 02 e7 6e 97 e1 b6 37 |L..... v...n...7| -peer0.org1.example.com | 00000030 54 75 51 f0 52 1d 6c 29 fa 0c 1b 22 99 aa 9b 6b |TuQ.R.l)..."...k| -peer0.org1.example.com | 00000040 6b 18 4d cd 74 78 11 |k.M.tx.|" -peer0.org1.example.com | "2019-05-02 01:30:48.468 UTC [gossip.comm] authenticateRemotePeer -> DEBU 957 Authenticated 192.168.240.6:44982" -peer0.org1.example.com | "2019-05-02 01:30:48.468 UTC [gossip.comm] GossipStream -> DEBU 958 Servicing 192.168.240.6:44982" -peer0.org1.example.com | "2019-05-02 01:30:48.471 UTC [gossip.gossip] handleMessage -> DEBU 959 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.471 UTC [gossip.gossip] handleMessage -> DEBU 95a Exiting" -orderer0.example.com | "2019-05-02 01:30:47.285 UTC [common.channelconfig] validateMSP -> DEBU 9f4 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:47.285 UTC [msp] newBccspMsp -> DEBU 9f5 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.285 UTC [msp] New -> DEBU 9f6 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.286 UTC [msp] Setup -> DEBU 9f7 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:47.286 UTC [msp.identity] newIdentity -> DEBU 9f8 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.287 UTC [msp.identity] newIdentity -> DEBU 9f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.288 UTC [msp] Validate -> DEBU 9fa MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.289 UTC [common.channelconfig] NewStandardValues -> DEBU 9fb Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-05-02 01:30:47.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9fc Processing field: ACLs" -orderer0.example.com | "2019-05-02 01:30:47.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9fd Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.289 UTC [common.channelconfig] NewStandardValues -> DEBU 9fe Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:47.290 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ff Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.290 UTC [common.channelconfig] NewStandardValues -> DEBU a00 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:47.290 UTC [common.channelconfig] initializeProtosStruct -> DEBU a01 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:47.290 UTC [common.channelconfig] Validate -> DEBU a02 Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:30:47.290 UTC [common.channelconfig] validateMSP -> DEBU a03 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.291 UTC [msp] newBccspMsp -> DEBU a04 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.291 UTC [msp] New -> DEBU a05 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.291 UTC [msp] Setup -> DEBU a06 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.291 UTC [msp.identity] newIdentity -> DEBU a07 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:21.761 UTC [cauthdsl] func1 -> DEBU 986 0xc000970f30 gate 1556789241761270700 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:21.761 UTC [cauthdsl] func2 -> DEBU 987 0xc000970f30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:21.762 UTC [cauthdsl] func2 -> DEBU 988 0xc000970f30 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:21.762 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 989 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.762 UTC [msp] Validate -> DEBU 98a MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:21.763 UTC [msp] getCertificationChain -> DEBU 98b MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:21.764 UTC [cauthdsl] func2 -> DEBU 98c 0xc000970f30 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:21.765 UTC [msp.identity] Verify -> DEBU 98d Verify: digest = 00000000 e4 18 59 98 0d 3b a7 30 be cc 46 08 ec 74 fd f2 |..Y..;.0..F..t..| +orderer0.example.com | 00000010 89 8b c4 f0 ec d1 42 e7 29 be db 21 86 0a 03 30 |......B.)..!...0|" +orderer0.example.com | "2019-05-02 09:27:21.765 UTC [msp.identity] Verify -> DEBU 98e Verify: sig = 00000000 30 45 02 21 00 d3 77 a5 76 87 7d ad 38 c8 e3 87 |0E.!..w.v.}.8...| +orderer0.example.com | 00000010 ac b0 f9 03 ba af b9 cc 72 47 5e 58 24 aa 04 4c |........rG^X$..L| +orderer0.example.com | 00000020 2e e6 c9 13 03 02 20 16 a7 9b 44 cc 32 92 1d a7 |...... ...D.2...| +orderer0.example.com | 00000030 93 3c ca cf 44 03 c3 03 99 d4 ff 75 03 df c0 51 |.<..D......u...Q| +orderer0.example.com | 00000040 9a 6f 3e fa e0 10 c9 |.o>....|" +orderer0.example.com | "2019-05-02 09:27:21.766 UTC [cauthdsl] func2 -> DEBU 98f 0xc000970f30 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:21.766 UTC [cauthdsl] func1 -> DEBU 990 0xc000970f30 gate 1556789241761270700 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:21.766 UTC [policies] Evaluate -> DEBU 991 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.767 UTC [policies] Evaluate -> DEBU 992 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.767 UTC [policies] Evaluate -> DEBU 993 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:21.767 UTC [policies] Evaluate -> DEBU 994 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:21.768 UTC [policies] Evaluate -> DEBU 995 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:21.768 UTC [policies] Evaluate -> DEBU 996 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:21.769 UTC [common.configtx] addToMap -> DEBU 997 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:21.769 UTC [common.configtx] addToMap -> DEBU 998 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.769 UTC [common.configtx] addToMap -> DEBU 999 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.770 UTC [common.configtx] addToMap -> DEBU 99a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:21.770 UTC [common.configtx] addToMap -> DEBU 99b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:21.770 UTC [common.configtx] addToMap -> DEBU 99c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:21.771 UTC [common.configtx] addToMap -> DEBU 99d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.771 UTC [common.configtx] addToMap -> DEBU 99e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.771 UTC [common.configtx] addToMap -> DEBU 99f Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:21.772 UTC [common.configtx] addToMap -> DEBU 9a0 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.772 UTC [common.configtx] addToMap -> DEBU 9a1 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.772 UTC [common.configtx] addToMap -> DEBU 9a2 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.773 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:21.773 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:21.773 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.854 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.855 UTC [policies] Evaluate -> DEBU 7e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.855 UTC [policies] Evaluate -> DEBU 7e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.856 UTC [policies] Evaluate -> DEBU 7e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.856 UTC [cauthdsl] func1 -> DEBU 7e6 0xc003750000 gate 1556789242856527700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.856 UTC [cauthdsl] func2 -> DEBU 7e7 0xc003750000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.857 UTC [cauthdsl] func2 -> DEBU 7e8 0xc003750000 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.857 UTC [cauthdsl] func2 -> DEBU 7e9 0xc003750000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:22.857 UTC [cauthdsl] func2 -> DEBU 7ea 0xc003750000 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.857 UTC [cauthdsl] func1 -> DEBU 7eb 0xc003750000 gate 1556789242856527700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.858 UTC [policies] Evaluate -> DEBU 7ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.858 UTC [policies] Evaluate -> DEBU 7ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.858 UTC [policies] Evaluate -> DEBU 7ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.859 UTC [cauthdsl] func1 -> DEBU 7ef 0xc003750840 gate 1556789242859150900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.859 UTC [cauthdsl] func2 -> DEBU 7f0 0xc003750840 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.859 UTC [cauthdsl] func2 -> DEBU 7f1 0xc003750840 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.860 UTC [cauthdsl] func2 -> DEBU 7f2 0xc003750840 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.860 UTC [msp.identity] Verify -> DEBU 7f3 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-05-02 09:27:22.860 UTC [msp.identity] Verify -> DEBU 7f4 Verify: sig = 00000000 30 45 02 21 00 d9 f3 24 4b 1f 2b 0d 86 c7 ff 75 |0E.!...$K.+....u| +peer0.org1.example.com | 00000010 d4 c2 df 10 b1 88 fe e2 9a f1 dc 01 22 09 b3 02 |............"...| +peer0.org1.example.com | 00000020 10 7f 07 b5 3d 02 20 1c 1a c6 fd 84 ba ee 71 63 |....=. .......qc| +peer0.org1.example.com | 00000030 51 8b 19 3c 7f 4d d6 b8 f3 bf 8f 1c 6b 64 a5 7d |Q..<.M......kd.}| +peer0.org1.example.com | 00000040 d9 b5 47 f2 fd 7f ab |..G....|" +peer0.org1.example.com | "2019-05-02 09:27:22.861 UTC [cauthdsl] func2 -> DEBU 7f5 0xc003750840 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.861 UTC [cauthdsl] func1 -> DEBU 7f7 0xc003750840 gate 1556789242859150900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.861 UTC [grpc] infof -> DEBU 7f6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:22.864 UTC [gossip.comm] func1 -> DEBU 7f8 Got message: GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.865 UTC [gossip.gossip] handleMessage -> DEBU 7f9 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.866 UTC [gossip.gossip] handleMessage -> DEBU 7fa Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7fb Got message: GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.867 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7fc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:22.867 UTC [msp] DeserializeIdentity -> DEBU 7fd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.868 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.869 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7ff Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.869 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 800 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.870 UTC [policies] Evaluate -> DEBU 801 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.871 UTC [policies] Evaluate -> DEBU 802 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.872 UTC [policies] Evaluate -> DEBU 803 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.872 UTC [cauthdsl] func1 -> DEBU 804 0xc003768970 gate 1556789242872413800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.872 UTC [cauthdsl] func2 -> DEBU 805 0xc003768970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.873 UTC [cauthdsl] func2 -> DEBU 806 0xc003768970 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.874 UTC [cauthdsl] func2 -> DEBU 807 0xc003768970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:22.874 UTC [cauthdsl] func2 -> DEBU 808 0xc003768970 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.874 UTC [cauthdsl] func1 -> DEBU 809 0xc003768970 gate 1556789242872413800 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.875 UTC [policies] Evaluate -> DEBU 80a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.875 UTC [policies] Evaluate -> DEBU 80b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.875 UTC [policies] Evaluate -> DEBU 80c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.875 UTC [cauthdsl] func1 -> DEBU 80d 0xc0037691b0 gate 1556789242875929300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.875 UTC [cauthdsl] func2 -> DEBU 80e 0xc0037691b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [cauthdsl] func2 -> DEBU 80f 0xc0037691b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [cauthdsl] func2 -> DEBU 810 0xc0037691b0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [msp.identity] Verify -> DEBU 811 Verify: digest = 00000000 19 53 48 52 4d 2a 2d 46 cf 02 5d 8f c4 06 81 99 |.SHRM*-F..].....| +peer0.org1.example.com | 00000010 d1 b6 eb 51 e5 93 32 c8 db 0a d1 4f 3d 43 ba 1c |...Q..2....O=C..|" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [msp.identity] Verify -> DEBU 812 Verify: sig = 00000000 30 45 02 21 00 e3 e7 2e ba d7 30 6c 06 6d ba 8d |0E.!......0l.m..| +peer0.org1.example.com | 00000010 7c 44 88 d7 e8 e3 be 77 e8 91 16 a9 bf af ff ff ||D.....w........| +peer0.org1.example.com | 00000020 e3 f7 8c aa d2 02 20 5f f8 9d 5b ec 92 ab 90 15 |...... _..[.....| +peer0.org1.example.com | 00000030 14 cc 8c a8 2a a2 95 6f 6e 3e 42 29 79 b1 43 a8 |....*..on>B)y.C.| +peer0.org1.example.com | 00000040 a2 d7 b2 83 29 ec b6 |....)..|" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [cauthdsl] func2 -> DEBU 813 0xc0037691b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [cauthdsl] func1 -> DEBU 814 0xc0037691b0 gate 1556789242875929300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 815 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 816 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 817 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 818 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 819 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-05-02 09:27:21.774 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.774 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.775 UTC [common.configtx] verifyDeltaSet -> DEBU 9a8 Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.775 UTC [common.configtx] policyForItem -> DEBU 9a9 Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-05-02 09:27:21.776 UTC [policies] Manager -> DEBU 9aa Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:21.776 UTC [policies] Manager -> DEBU 9ab Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:21.776 UTC [policies] Manager -> DEBU 9ac Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9ad Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9ae Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9af Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b0 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b1 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b3 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-05-02 09:27:21.777 UTC [policies] Evaluate -> DEBU 9b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:27:21.777 UTC [cauthdsl] func1 -> DEBU 9b5 0xc000cd87d0 gate 1556789241777974000 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9b6 0xc000cd87d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9b7 0xc000cd87d0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9b8 Checking if identity satisfies ADMIN role for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9b9 0xc000cd87d0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [msp.identity] Verify -> DEBU 9ba Verify: digest = 00000000 30 66 a6 63 f0 f2 5c 8b cc 30 97 57 cc 96 e6 ed |0f.c..\..0.W....| +orderer0.example.com | 00000010 ee 9d 29 cb 9e b5 de 97 29 52 7a 5e 61 16 79 e8 |..).....)Rz^a.y.|" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [msp.identity] Verify -> DEBU 9bb Verify: sig = 00000000 30 45 02 21 00 a7 41 a5 d2 f7 c5 ff ec 5e 7f 6c |0E.!..A......^.l| +orderer0.example.com | 00000010 71 c9 ae 59 aa ec 85 dd 94 0c 54 cf 58 8b 8e 8c |q..Y......T.X...| +orderer0.example.com | 00000020 3a b9 3d 56 43 02 20 01 e7 16 fb f9 76 cf ae de |:.=VC. .....v...| +orderer0.example.com | 00000030 49 88 9b 17 52 e6 8f c3 fa dc 64 50 b3 87 99 97 |I...R.....dP....| +orderer0.example.com | 00000040 11 08 49 2b 8c 95 fc |..I+...|" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9bc 0xc000cd87d0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [cauthdsl] func1 -> DEBU 9bd 0xc000cd87d0 gate 1556789241777974000 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [policies] Evaluate -> DEBU 9be Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [policies] Evaluate -> DEBU 9bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] verifyDeltaSet -> DEBU 9c0 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c3 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c4 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c5 Setting policy for key Admins to " +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c6 Setting policy for key Endorsement to " +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c7 Setting policy for key Readers to " +orderer0.example.com | "2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c8 Setting policy for key Writers to " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9c9 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9ca Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cb Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cc Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cd Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9ce Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cf Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d0 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d1 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d2 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d3 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d4 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 81a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 81b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 " +peer0.org1.example.com | "2019-05-02 09:27:22.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 81c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 " +peer0.org1.example.com | "2019-05-02 09:27:22.880 UTC [gossip.discovery] learnExistingMembers -> DEBU 81d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:22.881 UTC [gossip.discovery] learnExistingMembers -> DEBU 81e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 81f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 820 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.882 UTC [gossip.discovery] sendMemResponse -> DEBU 821 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:22.883 UTC [msp] DeserializeIdentity -> DEBU 822 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.884 UTC [msp] DeserializeIdentity -> DEBU 823 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.886 UTC [gossip.comm] Send -> DEBU 824 Entering, sending GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:22.887 UTC [gossip.discovery] sendMemResponse -> DEBU 825 Exiting, replying with MembershipResponse with Alive: 3, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:22.887 UTC [gossip.comm] sendToEndpoint -> DEBU 826 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.887 UTC [gossip.comm] sendToEndpoint -> DEBU 827 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.864 UTC [policies] Evaluate -> DEBU 828 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.890 UTC [policies] Evaluate -> DEBU 829 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.890 UTC [policies] Evaluate -> DEBU 82a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.891 UTC [policies] Evaluate -> DEBU 82b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.891 UTC [gossip.comm] authenticateRemotePeer -> DEBU 82c Authenticated 172.18.0.9:42014" +peer0.org1.example.com | "2019-05-02 09:27:22.891 UTC [gossip.comm] GossipStream -> DEBU 82d Servicing 172.18.0.9:42014" +peer0.org1.example.com | "2019-05-02 09:27:22.891 UTC [gossip.comm] serviceConnection -> DEBU 82e Closing reading from stream" +peer0.org1.example.com | "2019-05-02 09:27:22.891 UTC [gossip.comm] writeToStream -> DEBU 82f Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:27:22.892 UTC [gossip.comm] readFromStream -> DEBU 830 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-05-02 09:27:22.892 UTC [grpc] infof -> DEBU 831 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:22.893 UTC [gossip.comm] readFromStream -> DEBU 832 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-05-02 09:27:22.893 UTC [gossip.comm] func2 -> DEBU 833 Client 172.18.0.9:42014 disconnected" +peer0.org1.example.com | "2019-05-02 09:27:22.894 UTC [comm.grpc.server] 1 -> INFO 834 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.849Z grpc.peer_address=172.18.0.9:42014 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=44.5551ms +peer0.org1.example.com | "2019-05-02 09:27:22.895 UTC [gossip.comm] writeToStream -> DEBU 835 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:27:22.916 UTC [comm.grpc.server] 1 -> INFO 836 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.916Z grpc.peer_address=172.18.0.9:42016 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=119.9µs +peer0.org1.example.com | "2019-05-02 09:27:22.919 UTC [msp.identity] Sign -> DEBU 837 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:22.921 UTC [msp.identity] Sign -> DEBU 838 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:22.922 UTC [gossip.comm] authenticateRemotePeer -> DEBU 839 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:42016" +peer0.org1.example.com | "2019-05-02 09:27:22.923 UTC [gossip.comm] authenticateRemotePeer -> DEBU 83a Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42016" +peer0.org1.example.com | "2019-05-02 09:27:22.923 UTC [msp] DeserializeIdentity -> DEBU 83b Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d5 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d6 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d7 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] NewStandardValues -> DEBU 9d8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d9 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9da Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9db Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9dc Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9dd Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] NewStandardValues -> DEBU 9de Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9df Processing field: ACLs" +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e0 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] NewStandardValues -> DEBU 9e1 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e2 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] NewStandardValues -> DEBU 9e3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e4 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] Validate -> DEBU 9e5 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [common.channelconfig] validateMSP -> DEBU 9e6 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [msp] newBccspMsp -> DEBU 9e7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [msp] New -> DEBU 9e8 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [msp] Setup -> DEBU 9e9 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [msp.identity] newIdentity -> DEBU 9ea Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -8867,62 +8433,12 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.292 UTC [msp.identity] newIdentity -> DEBU a08 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:21.780 UTC [msp.identity] newIdentity -> DEBU 9eb Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | "2019-05-02 01:30:48.471 UTC [gossip.discovery] handleMsgFromComm -> DEBU 95b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.471 UTC [gossip.comm] func1 -> DEBU 95c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.472 UTC [gossip.gossip] handleMessage -> DEBU 95d Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.473 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 95e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:48.475 UTC [msp.identity] Verify -> DEBU 95f Verify: digest = 00000000 ee 1b 92 60 96 30 bc 79 a7 2c 86 4e 3f d3 2c aa |...`.0.y.,.N?.,.| -peer0.org1.example.com | 00000010 c6 9e 44 e1 2c 1d 86 15 08 e6 e7 c4 21 c1 12 dd |..D.,.......!...|" -peer0.org1.example.com | "2019-05-02 01:30:48.475 UTC [msp.identity] Verify -> DEBU 960 Verify: sig = 00000000 30 44 02 20 54 c2 dc 7c f0 53 e9 6e 79 56 c8 cc |0D. T..|.S.nyV..| -peer0.org1.example.com | 00000010 03 b5 0e 95 47 a8 ff 2d 05 83 74 fd 0e ea 7c 7d |....G..-..t...|}| -peer0.org1.example.com | 00000020 bb 20 33 08 02 20 02 d0 77 89 13 5e 75 60 71 c3 |. 3.. ..w..^u`q.| -peer0.org1.example.com | 00000030 e9 bb 94 fc 55 2a 59 8d 9f 43 95 cc 01 1b 7e d7 |....U*Y..C....~.| -peer0.org1.example.com | 00000040 08 d4 ee 5f be 56 |..._.V|" -peer0.org1.example.com | "2019-05-02 01:30:48.478 UTC [msp.identity] Verify -> DEBU 961 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:48.478 UTC [msp.identity] Verify -> DEBU 962 Verify: sig = 00000000 30 45 02 21 00 9b 10 96 ba ca 61 1a 2e 1e 89 1c |0E.!......a.....| -peer0.org1.example.com | 00000010 8d aa d6 9b c0 54 b2 6d bf a2 85 af 8c b3 4e 3d |.....T.m......N=| -peer0.org1.example.com | 00000020 ba a6 5e 1c 5a 02 20 73 c0 d5 fe 1b a4 93 f7 ae |..^.Z. s........| -peer0.org1.example.com | 00000030 50 79 43 75 ad 6d 34 e7 98 81 04 12 92 d2 df 51 |PyCu.m4........Q| -peer0.org1.example.com | 00000040 9c 9e d5 51 59 bb e1 |...QY..|" -peer0.org1.example.com | "2019-05-02 01:30:48.478 UTC [gossip.discovery] handleAliveMessage -> DEBU 963 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.478 UTC [gossip.discovery] learnExistingMembers -> DEBU 964 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:48.478 UTC [gossip.discovery] learnExistingMembers -> DEBU 965 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 " -peer0.org1.example.com | "2019-05-02 01:30:48.479 UTC [gossip.discovery] learnExistingMembers -> DEBU 966 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 " -peer0.org1.example.com | "2019-05-02 01:30:48.479 UTC [gossip.discovery] learnExistingMembers -> DEBU 967 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:48.479 UTC [gossip.discovery] learnExistingMembers -> DEBU 968 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.479 UTC [gossip.discovery] handleAliveMessage -> DEBU 969 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 96a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 96b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 96c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.480 UTC [gossip.gossip] handleMessage -> DEBU 96d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.481 UTC [msp] DeserializeIdentity -> DEBU 96e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.481 UTC [msp] DeserializeIdentity -> DEBU 96f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.481 UTC [gossip.comm] Send -> DEBU 970 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.481 UTC [gossip.comm] sendToEndpoint -> DEBU 971 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.482 UTC [gossip.comm] createConnection -> DEBU 972 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:30:48.483 UTC [grpc] DialContext -> DEBU 973 parsed scheme: """ -peer0.org1.example.com | "2019-05-02 01:30:48.483 UTC [grpc] DialContext -> DEBU 974 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-05-02 01:30:48.483 UTC [grpc] UpdateState -> DEBU 975 ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 }] }" -peer0.org1.example.com | "2019-05-02 01:30:48.483 UTC [grpc] switchBalancer -> DEBU 976 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-05-02 01:30:48.484 UTC [grpc] HandleSubConnStateChange -> DEBU 977 pickfirstBalancer: HandleSubConnStateChange: 0xc002e18400, CONNECTING" -peer0.org1.example.com | "2019-05-02 01:30:48.487 UTC [grpc] HandleSubConnStateChange -> DEBU 978 pickfirstBalancer: HandleSubConnStateChange: 0xc002e18400, READY" -peer0.org1.example.com | "2019-05-02 01:30:48.490 UTC [msp.identity] Sign -> DEBU 979 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:30:48.492 UTC [msp.identity] Sign -> DEBU 97a Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:30:48.492 UTC [gossip.comm] authenticateRemotePeer -> DEBU 97b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.8:7051" -peer0.org1.example.com | "2019-05-02 01:30:48.495 UTC [gossip.comm] authenticateRemotePeer -> DEBU 97c Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:7051" -peer0.org1.example.com | "2019-05-02 01:30:48.495 UTC [msp] DeserializeIdentity -> DEBU 97d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.495 UTC [grpc] infof -> DEBU 97e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:48.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 97f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:48.496 UTC [msp] DeserializeIdentity -> DEBU 980 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 981 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:48.497 UTC [msp] DeserializeIdentity -> DEBU 982 Obtaining identity" orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ @@ -8931,53 +8447,21 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.293 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a09 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.293 UTC [msp] Validate -> DEBU a0a MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.294 UTC [msp] getCertificationChain -> DEBU a0b MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.294 UTC [msp] hasOURole -> DEBU a0c MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:47.295 UTC [msp] getCertificationChain -> DEBU a0d MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.295 UTC [common.channelconfig] NewStandardValues -> DEBU a0e Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:47.295 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0f Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.296 UTC [common.channelconfig] NewStandardValues -> DEBU a10 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:47.296 UTC [common.channelconfig] initializeProtosStruct -> DEBU a11 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:47.296 UTC [common.channelconfig] Validate -> DEBU a12 Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:30:47.296 UTC [common.channelconfig] validateMSP -> DEBU a13 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.296 UTC [msp] newBccspMsp -> DEBU a14 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.297 UTC [msp] New -> DEBU a15 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:30:48.497 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 983 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:48.498 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 984 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.498 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 985 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.498 UTC [policies] Evaluate -> DEBU 986 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.498 UTC [policies] Evaluate -> DEBU 987 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:48.498 UTC [policies] Evaluate -> DEBU 988 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.498 UTC [cauthdsl] func1 -> DEBU 989 0xc002e35500 gate 1556760648498863600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:48.499 UTC [cauthdsl] func2 -> DEBU 98a 0xc002e35500 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:48.499 UTC [cauthdsl] func2 -> DEBU 98b 0xc002e35500 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:48.499 UTC [cauthdsl] func2 -> DEBU 98c 0xc002e35500 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.499 UTC [msp.identity] Verify -> DEBU 98d Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-05-02 01:30:48.500 UTC [msp.identity] Verify -> DEBU 98e Verify: sig = 00000000 30 44 02 20 5b a7 bb 5d 23 3d ef 6c b0 6a 3a 3d |0D. [..]#=.l.j:=| -peer0.org1.example.com | 00000010 b9 7c 3a 32 ef 32 d2 37 3b f1 ed 38 c8 b9 ff d1 |.|:2.2.7;..8....| -peer0.org1.example.com | 00000020 0c 0f 7f fd 02 20 2a 8c 01 4f 33 a0 93 6d 9c f6 |..... *..O3..m..| -peer0.org1.example.com | 00000030 8d 42 22 fb 47 a5 ca e1 c0 50 fd d7 88 38 01 1c |.B".G....P...8..| -peer0.org1.example.com | 00000040 76 e4 f0 d4 19 2b |v....+|" -peer0.org1.example.com | "2019-05-02 01:30:48.500 UTC [cauthdsl] func2 -> DEBU 98f 0xc002e35500 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.500 UTC [cauthdsl] func1 -> DEBU 990 0xc002e35500 gate 1556760648498863600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:48.501 UTC [policies] Evaluate -> DEBU 991 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.501 UTC [policies] Evaluate -> DEBU 992 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.501 UTC [policies] Evaluate -> DEBU 993 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.501 UTC [policies] Evaluate -> DEBU 994 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.501 UTC [gossip.comm] authenticateRemotePeer -> DEBU 995 Authenticated 192.168.240.8:7051" -peer0.org1.example.com | "2019-05-02 01:30:48.501 UTC [gossip.comm] createConnection -> DEBU 996 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.502 UTC [gossip.comm] sendToEndpoint -> DEBU 997 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.538 UTC [gossip.comm] func1 -> DEBU 998 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.538 UTC [gossip.gossip] handleMessage -> DEBU 999 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.538 UTC [gossip.gossip] handleMessage -> DEBU 99a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.538 UTC [gossip.discovery] handleMsgFromComm -> DEBU 99b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.538 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 99c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:48.538 UTC [msp] DeserializeIdentity -> DEBU 99d Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.297 UTC [msp] Setup -> DEBU a16 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.297 UTC [msp.identity] newIdentity -> DEBU a17 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:21.781 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9ec Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.784 UTC [msp] Validate -> DEBU 9ed MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:21.785 UTC [msp] getCertificationChain -> DEBU 9ee MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:21.785 UTC [msp] hasOURole -> DEBU 9ef MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:21.786 UTC [msp] getCertificationChain -> DEBU 9f0 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:21.787 UTC [common.channelconfig] NewStandardValues -> DEBU 9f1 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:21.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f2 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.787 UTC [common.channelconfig] NewStandardValues -> DEBU 9f3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:21.788 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f4 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:21.788 UTC [common.channelconfig] Validate -> DEBU 9f5 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-05-02 09:27:21.788 UTC [common.channelconfig] validateMSP -> DEBU 9f6 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.789 UTC [msp] newBccspMsp -> DEBU 9f7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.789 UTC [msp] New -> DEBU 9f8 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.789 UTC [msp] Setup -> DEBU 9f9 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.790 UTC [msp.identity] newIdentity -> DEBU 9fa Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -8992,7 +8476,25 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.298 UTC [msp.identity] newIdentity -> DEBU a18 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | "2019-05-02 09:27:22.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 83c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.924 UTC [msp] DeserializeIdentity -> DEBU 83d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 83e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.925 UTC [msp] DeserializeIdentity -> DEBU 83f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.925 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 840 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 841 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 842 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.926 UTC [policies] Evaluate -> DEBU 843 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.927 UTC [policies] Evaluate -> DEBU 844 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.927 UTC [policies] Evaluate -> DEBU 845 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.927 UTC [cauthdsl] func1 -> DEBU 846 0xc0037d4250 gate 1556789242927718400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.927 UTC [cauthdsl] func2 -> DEBU 847 0xc0037d4250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.928 UTC [cauthdsl] func2 -> DEBU 848 0xc0037d4250 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.928 UTC [cauthdsl] func2 -> DEBU 849 0xc0037d4250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:22.928 UTC [cauthdsl] func2 -> DEBU 84a 0xc0037d4250 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.929 UTC [cauthdsl] func1 -> DEBU 84b 0xc0037d4250 gate 1556789242927718400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.929 UTC [policies] Evaluate -> DEBU 84c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.929 UTC [policies] Evaluate -> DEBU 84d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:21.791 UTC [msp.identity] newIdentity -> DEBU 9fb Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -9006,872 +8508,632 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.299 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a19 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.300 UTC [msp] Validate -> DEBU a1a MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.300 UTC [msp] getCertificationChain -> DEBU a1b MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.300 UTC [msp] hasOURole -> DEBU a1c MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:47.301 UTC [msp] getCertificationChain -> DEBU a1d MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.301 UTC [msp] Setup -> DEBU a1e Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:47.301 UTC [msp] Setup -> DEBU a1f MSP manager setup complete, setup 3 msps" -peer0.org1.example.com | "2019-05-02 01:30:48.539 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 99e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:48.539 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 99f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.539 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9a0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.539 UTC [policies] Evaluate -> DEBU 9a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.539 UTC [policies] Evaluate -> DEBU 9a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:48.539 UTC [policies] Evaluate -> DEBU 9a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.540 UTC [cauthdsl] func1 -> DEBU 9a4 0xc002e19950 gate 1556760648539947400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:48.540 UTC [cauthdsl] func2 -> DEBU 9a5 0xc002e19950 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:48.540 UTC [cauthdsl] func2 -> DEBU 9a6 0xc002e19950 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:48.540 UTC [cauthdsl] func2 -> DEBU 9a7 0xc002e19950 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.540 UTC [msp.identity] Verify -> DEBU 9a8 Verify: digest = 00000000 45 e7 da 83 a9 da 8a ea b5 f4 bd 7b b3 88 d9 38 |E..........{...8| -peer0.org1.example.com | 00000010 d4 f6 fe 77 ba 22 26 55 ea 5f 53 43 32 dd 10 7b |...w."&U._SC2..{|" -peer0.org1.example.com | "2019-05-02 01:30:48.540 UTC [msp.identity] Verify -> DEBU 9a9 Verify: sig = 00000000 30 44 02 20 04 7b a9 a5 4d 1b fe 59 18 19 22 23 |0D. .{..M..Y.."#| -peer0.org1.example.com | 00000010 71 0b f7 05 38 7e d9 64 82 1b b1 1b f9 ea 01 cd |q...8~.d........| -peer0.org1.example.com | 00000020 63 8b 13 b6 02 20 39 5d c1 dc ab 0e d9 18 89 b1 |c.... 9]........| -peer0.org1.example.com | 00000030 79 a2 81 67 3a 6a 7a 12 cd ce 11 74 d9 ba b3 fb |y..g:jz....t....| -peer0.org1.example.com | 00000040 74 3c ad b6 d8 37 |t<...7|" -peer0.org1.example.com | "2019-05-02 01:30:48.541 UTC [cauthdsl] func2 -> DEBU 9aa 0xc002e19950 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.541 UTC [cauthdsl] func1 -> DEBU 9ab 0xc002e19950 gate 1556760648539947400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:48.542 UTC [policies] Evaluate -> DEBU 9ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.542 UTC [policies] Evaluate -> DEBU 9ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.542 UTC [policies] Evaluate -> DEBU 9ae Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.542 UTC [policies] Evaluate -> DEBU 9af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.542 UTC [gossip.discovery] handleAliveMessage -> DEBU 9b0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.542 UTC [gossip.discovery] resurrectMember -> DEBU 9b1 Entering, AliveMessage: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes t: {1556760633527025900 17 {} [] 0}" -peer0.org1.example.com | "2019-05-02 01:30:48.542 UTC [gossip.discovery] resurrectMember -> DEBU 9b2 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.543 UTC [gossip.discovery] handleAliveMessage -> DEBU 9b3 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9b4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.546 UTC [msp] DeserializeIdentity -> DEBU 9b5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.546 UTC [msp] DeserializeIdentity -> DEBU 9b6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.547 UTC [msp] DeserializeIdentity -> DEBU 9b7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.547 UTC [msp] DeserializeIdentity -> DEBU 9b8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.547 UTC [msp] DeserializeIdentity -> DEBU 9b9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.548 UTC [msp] DeserializeIdentity -> DEBU 9ba Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.548 UTC [msp] DeserializeIdentity -> DEBU 9bb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.549 UTC [gossip.comm] Send -> DEBU 9bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.549 UTC [msp] DeserializeIdentity -> DEBU 9bd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.549 UTC [gossip.comm] sendToEndpoint -> DEBU 9be Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.549 UTC [gossip.comm] sendToEndpoint -> DEBU 9bf Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.550 UTC [gossip.comm] Send -> DEBU 9c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.551 UTC [gossip.comm] sendToEndpoint -> DEBU 9c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.551 UTC [gossip.comm] sendToEndpoint -> DEBU 9c2 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.553 UTC [gossip.gossip] handleMessage -> DEBU 9c3 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.553 UTC [gossip.gossip] handleMessage -> DEBU 9c4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9c5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9c6 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.616 UTC [msp.identity] Sign -> DEBU 9c7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151010 " -peer0.org1.example.com | "2019-05-02 01:30:48.617 UTC [msp.identity] Sign -> DEBU 9c8 Sign: digest: 160F5EEBA4FDCF335D1CAB5F3FB3EDFB1E37B7B50B975717033A33F471E55ABE " -peer0.org1.example.com | "2019-05-02 01:30:48.617 UTC [msp.identity] Sign -> DEBU 9c9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:48.617 UTC [msp.identity] Sign -> DEBU 9ca Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:48.618 UTC [gossip.discovery] periodicalSendAlive -> DEBU 9cb Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:30:48.628 UTC [msp] DeserializeIdentity -> DEBU 9cc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.628 UTC [msp] DeserializeIdentity -> DEBU 9cd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.630 UTC [gossip.comm] Send -> DEBU 9ce Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.631 UTC [gossip.comm] sendToEndpoint -> DEBU 9cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.631 UTC [gossip.comm] sendToEndpoint -> DEBU 9d0 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.633 UTC [msp] DeserializeIdentity -> DEBU 9d1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.633 UTC [gossip.comm] Send -> DEBU 9d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.634 UTC [gossip.comm] sendToEndpoint -> DEBU 9d3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.634 UTC [gossip.comm] sendToEndpoint -> DEBU 9d4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.636 UTC [msp] DeserializeIdentity -> DEBU 9d5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.636 UTC [gossip.comm] Send -> DEBU 9d6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.637 UTC [gossip.comm] sendToEndpoint -> DEBU 9d7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.637 UTC [gossip.comm] sendToEndpoint -> DEBU 9d8 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.759 UTC [gossip.comm] func1 -> DEBU 9d9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.760 UTC [gossip.gossip] handleMessage -> DEBU 9da Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.760 UTC [gossip.gossip] handleMessage -> DEBU 9db Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.760 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9dd Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:30:48.760 UTC [msp] DeserializeIdentity -> DEBU 9de Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.301 UTC [policies] NewManagerImpl -> DEBU a20 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a21 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a22 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a23 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a24 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a25 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a26 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.303 UTC [policies] NewManagerImpl -> DEBU a27 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.303 UTC [policies] NewManagerImpl -> DEBU a28 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.303 UTC [policies] NewManagerImpl -> DEBU a29 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.304 UTC [policies] NewManagerImpl -> DEBU a2a Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.304 UTC [policies] NewManagerImpl -> DEBU a2b Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.304 UTC [policies] NewManagerImpl -> DEBU a2c Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.304 UTC [policies] NewManagerImpl -> DEBU a2d Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:47.304 UTC [policies] NewManagerImpl -> DEBU a2e Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:47.305 UTC [policies] NewManagerImpl -> DEBU a2f Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:47.305 UTC [policies] NewManagerImpl -> DEBU a30 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:47.305 UTC [policies] NewManagerImpl -> DEBU a31 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:47.305 UTC [policies] NewManagerImpl -> DEBU a32 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:47.305 UTC [policies] NewManagerImpl -> DEBU a33 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:47.306 UTC [policies] NewManagerImpl -> DEBU a34 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:47.306 UTC [policies] NewManagerImpl -> DEBU a35 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:47.306 UTC [policies] NewManagerImpl -> DEBU a36 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:47.306 UTC [common.configtx] addToMap -> DEBU a37 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:47.307 UTC [common.configtx] addToMap -> DEBU a38 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:47.307 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:47.307 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:47.307 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:47.308 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:47.308 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:47.308 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:47.308 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Policy] /Channel/Orderer/Writers" -peer0.org1.example.com | "2019-05-02 01:30:48.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:48.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9e0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9e1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.761 UTC [policies] Evaluate -> DEBU 9e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.761 UTC [policies] Evaluate -> DEBU 9e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:48.762 UTC [policies] Evaluate -> DEBU 9e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.762 UTC [cauthdsl] func1 -> DEBU 9e5 0xc002eac930 gate 1556760648762270900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:48.762 UTC [cauthdsl] func2 -> DEBU 9e6 0xc002eac930 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:48.762 UTC [cauthdsl] func2 -> DEBU 9e7 0xc002eac930 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:48.762 UTC [cauthdsl] func2 -> DEBU 9e8 0xc002eac930 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.762 UTC [msp.identity] Verify -> DEBU 9e9 Verify: digest = 00000000 cb 70 69 4a 3d 3b 44 29 3c a1 3b 11 d2 87 56 57 |.piJ=;D)<.;...VW| -peer0.org1.example.com | 00000010 f1 60 c3 07 f8 18 fe da 91 da f7 26 2c a5 75 55 |.`.........&,.uU|" -peer0.org1.example.com | "2019-05-02 01:30:48.763 UTC [msp.identity] Verify -> DEBU 9ea Verify: sig = 00000000 30 45 02 21 00 a6 e3 6e 87 a5 0f 1c e8 87 d5 e2 |0E.!...n........| -peer0.org1.example.com | 00000010 2d c7 2a c2 d1 5d 71 7a c2 25 c7 e5 3d b1 1f fb |-.*..]qz.%..=...| -peer0.org1.example.com | 00000020 80 f4 dc 42 ec 02 20 17 26 c8 9b 3e f2 da 78 ac |...B.. .&..>..x.| -peer0.org1.example.com | 00000030 09 a4 56 4a fa 50 d5 9d 18 71 44 b9 72 d0 b3 64 |..VJ.P...qD.r..d| -peer0.org1.example.com | 00000040 59 94 24 62 04 d4 44 |Y.$b..D|" -peer0.org1.example.com | "2019-05-02 01:30:48.763 UTC [cauthdsl] func2 -> DEBU 9eb 0xc002eac930 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.763 UTC [cauthdsl] func1 -> DEBU 9ec 0xc002eac930 gate 1556760648762270900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:48.763 UTC [policies] Evaluate -> DEBU 9ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.763 UTC [policies] Evaluate -> DEBU 9ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.764 UTC [policies] Evaluate -> DEBU 9ef Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.764 UTC [policies] Evaluate -> DEBU 9f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.764 UTC [gossip.discovery] handleAliveMessage -> DEBU 9f1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.764 UTC [gossip.discovery] learnExistingMembers -> DEBU 9f2 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:48.764 UTC [gossip.discovery] learnExistingMembers -> DEBU 9f3 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 " -peer0.org1.example.com | "2019-05-02 01:30:48.765 UTC [gossip.discovery] learnExistingMembers -> DEBU 9f4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 " -peer0.org1.example.com | "2019-05-02 01:30:48.765 UTC [gossip.discovery] learnExistingMembers -> DEBU 9f5 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:48.765 UTC [gossip.discovery] learnExistingMembers -> DEBU 9f6 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.765 UTC [gossip.discovery] handleAliveMessage -> DEBU 9f7 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.765 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9f8 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.768 UTC [msp] DeserializeIdentity -> DEBU 9f9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.768 UTC [msp] DeserializeIdentity -> DEBU 9fa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.768 UTC [msp] DeserializeIdentity -> DEBU 9fb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.768 UTC [msp] DeserializeIdentity -> DEBU 9fc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.768 UTC [msp] DeserializeIdentity -> DEBU 9fd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.769 UTC [msp] DeserializeIdentity -> DEBU 9fe Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.769 UTC [msp] DeserializeIdentity -> DEBU 9ff Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.769 UTC [gossip.comm] Send -> DEBU a00 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.769 UTC [msp] DeserializeIdentity -> DEBU a01 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.770 UTC [gossip.comm] Send -> DEBU a02 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.770 UTC [gossip.comm] sendToEndpoint -> DEBU a03 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.770 UTC [gossip.comm] sendToEndpoint -> DEBU a04 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.771 UTC [gossip.comm] func1 -> DEBU a05 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.771 UTC [gossip.gossip] handleMessage -> DEBU a06 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.772 UTC [gossip.gossip] handleMessage -> DEBU a07 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU a08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU a09 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.773 UTC [gossip.comm] sendToEndpoint -> DEBU a0a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.773 UTC [gossip.comm] sendToEndpoint -> DEBU a0b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.861 UTC [msp] DeserializeIdentity -> DEBU a0c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.862 UTC [msp] DeserializeIdentity -> DEBU a0d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.862 UTC [gossip.comm] Send -> DEBU a0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.863 UTC [gossip.comm] sendToEndpoint -> DEBU a0f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.863 UTC [gossip.comm] sendToEndpoint -> DEBU a11 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.863 UTC [gossip.comm] sendToEndpoint -> DEBU a12 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.864 UTC [gossip.comm] sendToEndpoint -> DEBU a13 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.863 UTC [gossip.comm] sendToEndpoint -> DEBU a10 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.865 UTC [gossip.comm] sendToEndpoint -> DEBU a14 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.866 UTC [msp] DeserializeIdentity -> DEBU a15 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.866 UTC [msp] DeserializeIdentity -> DEBU a16 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.867 UTC [gossip.comm] Send -> DEBU a17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760647954638000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.867 UTC [msp] DeserializeIdentity -> DEBU a18 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.868 UTC [msp] DeserializeIdentity -> DEBU a19 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.868 UTC [gossip.gossip] handleMessage -> DEBU a1a Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.868 UTC [gossip.comm] sendToEndpoint -> DEBU a1b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760647954638000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.869 UTC [gossip.comm] sendToEndpoint -> DEBU a1c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.869 UTC [gossip.comm] sendToEndpoint -> DEBU a1d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760647954638000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.870 UTC [gossip.comm] sendToEndpoint -> DEBU a1e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.870 UTC [gossip.comm] sendToEndpoint -> DEBU a1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760647954638000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.871 UTC [gossip.comm] sendToEndpoint -> DEBU a21 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.870 UTC [msp.identity] Verify -> DEBU a20 Verify: digest = 00000000 cf 01 3b 4e fd fb 55 9b 5b 6e b6 30 dc f7 6f 66 |..;N..U.[n.0..of| -peer0.org1.example.com | 00000010 c1 c7 f8 cc 88 b6 ad 4a 12 c2 13 80 79 8a fa 4c |.......J....y..L|" -peer0.org1.example.com | "2019-05-02 01:30:48.875 UTC [msp.identity] Verify -> DEBU a22 Verify: sig = 00000000 30 44 02 20 0b 26 e6 42 ad 46 0f a8 fd fd 22 95 |0D. .&.B.F....".| -peer0.org1.example.com | 00000010 a2 39 04 d3 09 f3 b7 6c 9f 34 d2 39 a3 89 61 53 |.9.....l.4.9..aS| -peer0.org1.example.com | 00000020 15 81 43 e7 02 20 01 f8 5b 0f b0 c1 e0 c1 29 b9 |..C.. ..[.....).| -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5a Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5b Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5c Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5d Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5e Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5f Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a60 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a61 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a62 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a63 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a64 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.channelconfig] LogSanityChecks -> DEBU a65 As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.channelconfig] LogSanityChecks -> DEBU a66 As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a67 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a68 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a69 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a6a Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a6b Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a6c Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.310 UTC [common.channelconfig] LogSanityChecks -> DEBU a6d As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-05-02 01:30:47.311 UTC [common.channelconfig] LogSanityChecks -> DEBU a6e As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-05-02 01:30:47.311 UTC [common.channelconfig] LogSanityChecks -> DEBU a6f As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-05-02 01:30:47.311 UTC [policies] Manager -> DEBU a70 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-05-02 01:30:47.311 UTC [policies] Manager -> DEBU a71 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:47.311 UTC [policies] Manager -> DEBU a72 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:47.311 UTC [policies] Manager -> DEBU a73 Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-05-02 01:30:47.311 UTC [policies] Manager -> DEBU a74 Manager Channel/Orderer has managers OrdererOrg" -peer0.org1.example.com | 00000030 b6 21 e1 28 dd 3a 50 52 e2 98 3f 3e a6 80 88 51 |.!.(.:PR..?>...Q| -peer0.org1.example.com | 00000040 c2 9a 74 94 9f aa |..t...|" -peer0.org1.example.com | "2019-05-02 01:30:48.876 UTC [msp.identity] Verify -> DEBU a23 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:30:48.877 UTC [msp.identity] Verify -> DEBU a24 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:30:48.877 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a25 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.882 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a26 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.883 UTC [policies] Evaluate -> DEBU a27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.883 UTC [gossip.comm] func1 -> DEBU a28 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.884 UTC [gossip.pull] Hello -> DEBU a29 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:48.884 UTC [gossip.comm] Send -> DEBU a2a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:48.885 UTC [gossip.comm] sendToEndpoint -> DEBU a2b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.885 UTC [gossip.comm] sendToEndpoint -> DEBU a2c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.883 UTC [policies] Evaluate -> DEBU a2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:48.888 UTC [gossip.comm] func1 -> DEBU a2e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.891 UTC [policies] Evaluate -> DEBU a2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.893 UTC [msp] DeserializeIdentity -> DEBU a30 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.893 UTC [msp.identity] newIdentity -> DEBU a31 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:48.895 UTC [cauthdsl] func1 -> DEBU a32 0xc003022130 gate 1556760648895014300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:48.895 UTC [cauthdsl] func2 -> DEBU a33 0xc003022130 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:48.895 UTC [cauthdsl] func2 -> DEBU a34 0xc003022130 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:48.896 UTC [cauthdsl] func2 -> DEBU a35 0xc003022130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:30:48.896 UTC [cauthdsl] func2 -> DEBU a36 0xc003022130 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:48.897 UTC [cauthdsl] func1 -> DEBU a37 0xc003022130 gate 1556760648895014300 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:48.897 UTC [policies] Evaluate -> DEBU a38 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.897 UTC [policies] Evaluate -> DEBU a39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.898 UTC [policies] Evaluate -> DEBU a3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.901 UTC [cauthdsl] func1 -> DEBU a3b 0xc0030232b0 gate 1556760648898818900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:48.901 UTC [cauthdsl] func2 -> DEBU a3c 0xc0030232b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:48.901 UTC [cauthdsl] func2 -> DEBU a3d 0xc0030232b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:48.901 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a3e Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:48.902 UTC [msp] Validate -> DEBU a3f MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.311 UTC [common.channelconfig] LogSanityChecks -> DEBU a75 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-05-02 01:30:47.311 UTC [common.capabilities] Supported -> DEBU a76 Orderer capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:47.311 UTC [common.capabilities] Supported -> DEBU a77 Channel capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:47.314 UTC [msp.identity] Sign -> DEBU a78 Sign: plaintext: 0AD2060A1B08011A0608C790A9E60522...6D92A4D74D7D9F14AA08B8783FFE7591 " -orderer0.example.com | "2019-05-02 01:30:47.314 UTC [msp.identity] Sign -> DEBU a79 Sign: digest: 214FFB0B5FAB9AC46722086681B5B4CF2E2C23F48033E2A81F04B0583C4328F3 " -orderer0.example.com | "2019-05-02 01:30:47.314 UTC [policies] Evaluate -> DEBU a7a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:30:47.315 UTC [policies] Evaluate -> DEBU a7b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.315 UTC [policies] Evaluate -> DEBU a7c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-05-02 01:30:47.315 UTC [policies] Evaluate -> DEBU a7d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.315 UTC [policies] Evaluate -> DEBU a7e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-05-02 01:30:47.315 UTC [msp] DeserializeIdentity -> DEBU a7f Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.315 UTC [msp.identity] newIdentity -> DEBU a80 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:21.792 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9fc Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.792 UTC [msp] Validate -> DEBU 9fd MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:21.793 UTC [msp] getCertificationChain -> DEBU 9fe MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:21.793 UTC [msp] hasOURole -> DEBU 9ff MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:21.793 UTC [msp] getCertificationChain -> DEBU a00 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:21.794 UTC [common.channelconfig] NewStandardValues -> DEBU a01 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:21.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU a02 Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:21.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU a03 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:21.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU a04 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:21.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU a05 Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:21.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU a06 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:21.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU a07 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.796 UTC [common.channelconfig] NewStandardValues -> DEBU a08 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:21.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU a09 Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:21.797 UTC [common.channelconfig] NewStandardValues -> DEBU a0a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:21.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0b Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:21.797 UTC [common.channelconfig] validateMSP -> DEBU a0c Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.797 UTC [msp] newBccspMsp -> DEBU a0d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.797 UTC [msp] New -> DEBU a0e Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.798 UTC [msp] Setup -> DEBU a0f Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:21.798 UTC [msp.identity] newIdentity -> DEBU a10 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:21.798 UTC [msp.identity] newIdentity -> DEBU a11 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | "2019-05-02 09:27:22.930 UTC [policies] Evaluate -> DEBU 84e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.931 UTC [cauthdsl] func1 -> DEBU 84f 0xc0037d4a90 gate 1556789242931216300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.931 UTC [cauthdsl] func2 -> DEBU 850 0xc0037d4a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.932 UTC [cauthdsl] func2 -> DEBU 851 0xc0037d4a90 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.932 UTC [cauthdsl] func2 -> DEBU 852 0xc0037d4a90 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.934 UTC [grpc] infof -> DEBU 853 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:22.934 UTC [msp.identity] Verify -> DEBU 854 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-05-02 09:27:22.936 UTC [msp.identity] Verify -> DEBU 855 Verify: sig = 00000000 30 44 02 20 32 8d c7 f6 55 11 1e 4e d4 0c 84 34 |0D. 2...U..N...4| +peer0.org1.example.com | 00000010 d6 46 44 f0 f8 59 72 96 fd 04 c5 e7 92 54 01 bc |.FD..Yr......T..| +peer0.org1.example.com | 00000020 3d 36 5b 60 02 20 07 02 fa a4 60 3f 54 5d 02 bb |=6[`. ....`?T]..| +peer0.org1.example.com | 00000030 9e 62 be 74 95 4e 28 3b 72 6c 22 1c bc ee b5 15 |.b.t.N(;rl".....| +peer0.org1.example.com | 00000040 65 e6 32 15 75 be |e.2.u.|" +peer0.org1.example.com | "2019-05-02 09:27:22.938 UTC [cauthdsl] func2 -> DEBU 856 0xc0037d4a90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.939 UTC [cauthdsl] func1 -> DEBU 857 0xc0037d4a90 gate 1556789242931216300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.940 UTC [policies] Evaluate -> DEBU 858 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.941 UTC [policies] Evaluate -> DEBU 859 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.942 UTC [policies] Evaluate -> DEBU 85a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.943 UTC [policies] Evaluate -> DEBU 85b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.944 UTC [gossip.comm] authenticateRemotePeer -> DEBU 85c Authenticated 172.18.0.9:42016" +peer0.org1.example.com | "2019-05-02 09:27:22.944 UTC [gossip.comm] GossipStream -> DEBU 85d Servicing 172.18.0.9:42016" +peer0.org1.example.com | "2019-05-02 09:27:22.945 UTC [gossip.comm] readFromStream -> DEBU 85e Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-05-02 09:27:22.945 UTC [gossip.comm] func2 -> DEBU 85f Client 172.18.0.9:42016 disconnected" +peer0.org1.example.com | "2019-05-02 09:27:22.946 UTC [gossip.comm] writeToStream -> DEBU 860 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:27:22.946 UTC [comm.grpc.server] 1 -> INFO 861 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.918Z grpc.peer_address=172.18.0.9:42016 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.2379ms +peer0.org1.example.com | "2019-05-02 09:27:22.958 UTC [comm.grpc.server] 1 -> INFO 862 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.957Z grpc.peer_address=172.18.0.9:42018 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=179.4µs +peer0.org1.example.com | "2019-05-02 09:27:22.960 UTC [msp.identity] Sign -> DEBU 863 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:22.960 UTC [msp.identity] Sign -> DEBU 864 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:22.960 UTC [gossip.comm] authenticateRemotePeer -> DEBU 865 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:42018" +peer0.org1.example.com | "2019-05-02 09:27:22.961 UTC [gossip.comm] authenticateRemotePeer -> DEBU 866 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42018" +peer0.org1.example.com | "2019-05-02 09:27:22.961 UTC [msp] DeserializeIdentity -> DEBU 867 Obtaining identity" +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:21.799 UTC [msp] Validate -> DEBU a12 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:21.799 UTC [msp] Setup -> DEBU a13 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:21.799 UTC [msp] Setup -> DEBU a14 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a15 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a16 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a17 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a18 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a19 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1a Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1b Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1c Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1d Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1e Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1f Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a20 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a21 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a22 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a23 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:27:22.961 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 868 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.961 UTC [msp] DeserializeIdentity -> DEBU 869 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [msp] DeserializeIdentity -> DEBU 86b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 86d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 86e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.962 UTC [policies] Evaluate -> DEBU 86f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.963 UTC [policies] Evaluate -> DEBU 870 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.963 UTC [policies] Evaluate -> DEBU 871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.963 UTC [cauthdsl] func1 -> DEBU 872 0xc003807ad0 gate 1556789242963441400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.963 UTC [cauthdsl] func2 -> DEBU 873 0xc003807ad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.963 UTC [cauthdsl] func2 -> DEBU 874 0xc003807ad0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 875 0xc003807ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 876 0xc003807ad0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func1 -> DEBU 877 0xc003807ad0 gate 1556789242963441400 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a24 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a25 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a26 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a27 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a28 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a29 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a2a Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a2b Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:21.801 UTC [common.configtx] addToMap -> DEBU a2c Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a2d Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a2e Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a2f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a30 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a31 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a32 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a33 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a34 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a35 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a36 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a37 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a38 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.channelconfig] LogSanityChecks -> DEBU a5a As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [common.channelconfig] LogSanityChecks -> DEBU a5b As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5c Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [policies] Evaluate -> DEBU 878 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [policies] Evaluate -> DEBU 879 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [policies] Evaluate -> DEBU 87a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func1 -> DEBU 87b 0xc003828310 gate 1556789242964710200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 87c 0xc003828310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 87d 0xc003828310 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 87e 0xc003828310 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.964 UTC [msp.identity] Verify -> DEBU 87f Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-05-02 09:27:22.965 UTC [msp.identity] Verify -> DEBU 880 Verify: sig = 00000000 30 44 02 20 1c 49 9b 3f 31 5b f2 93 84 1b 20 9b |0D. .I.?1[.... .| +peer0.org1.example.com | 00000010 1b a4 7f 89 fc f6 c3 f7 b0 6c 0a 3a cb 12 5d 32 |.........l.:..]2| +peer0.org1.example.com | 00000020 0f 6b e2 3f 02 20 23 1d cc b6 fc 5b 32 0f c0 9a |.k.?. #....[2...| +peer0.org1.example.com | 00000030 9b 4c 46 01 3d 9a 97 5f 77 9e e6 af a9 a7 52 96 |.LF.=.._w.....R.| +peer0.org1.example.com | 00000040 0e 79 6f d8 44 e7 |.yo.D.|" +peer0.org1.example.com | "2019-05-02 09:27:22.965 UTC [cauthdsl] func2 -> DEBU 881 0xc003828310 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.965 UTC [cauthdsl] func1 -> DEBU 882 0xc003828310 gate 1556789242964710200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.965 UTC [policies] Evaluate -> DEBU 883 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.966 UTC [policies] Evaluate -> DEBU 884 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.966 UTC [policies] Evaluate -> DEBU 885 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.967 UTC [policies] Evaluate -> DEBU 886 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.967 UTC [gossip.comm] authenticateRemotePeer -> DEBU 887 Authenticated 172.18.0.9:42018" +peer0.org1.example.com | "2019-05-02 09:27:22.967 UTC [gossip.comm] GossipStream -> DEBU 888 Servicing 172.18.0.9:42018" +peer0.org1.example.com | "2019-05-02 09:27:22.970 UTC [gossip.gossip] handleMessage -> DEBU 889 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.971 UTC [gossip.gossip] handleMessage -> DEBU 88a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 88b Got message: GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 88c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:22.974 UTC [msp] DeserializeIdentity -> DEBU 88d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.974 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 88e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:22.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 88f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 890 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:22.976 UTC [policies] Evaluate -> DEBU 891 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.976 UTC [policies] Evaluate -> DEBU 892 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:22.977 UTC [policies] Evaluate -> DEBU 893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.977 UTC [cauthdsl] func1 -> DEBU 894 0xc003832a50 gate 1556789242977465500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.978 UTC [cauthdsl] func2 -> DEBU 895 0xc003832a50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.979 UTC [cauthdsl] func2 -> DEBU 896 0xc003832a50 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.979 UTC [cauthdsl] func2 -> DEBU 897 0xc003832a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:22.980 UTC [cauthdsl] func2 -> DEBU 898 0xc003832a50 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.981 UTC [cauthdsl] func1 -> DEBU 899 0xc003832a50 gate 1556789242977465500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:22.981 UTC [policies] Evaluate -> DEBU 89a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.981 UTC [policies] Evaluate -> DEBU 89b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.982 UTC [policies] Evaluate -> DEBU 89c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:22.982 UTC [cauthdsl] func1 -> DEBU 89d 0xc003833290 gate 1556789242982602400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:22.983 UTC [cauthdsl] func2 -> DEBU 89e 0xc003833290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:22.983 UTC [cauthdsl] func2 -> DEBU 89f 0xc003833290 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:22.984 UTC [cauthdsl] func2 -> DEBU 8a0 0xc003833290 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.984 UTC [msp.identity] Verify -> DEBU 8a1 Verify: digest = 00000000 fd 11 4d ee 68 00 e9 ca 1b 49 f9 92 f3 2d 42 8b |..M.h....I...-B.| +peer0.org1.example.com | 00000010 54 d9 e0 01 fb 83 45 c8 78 fd d1 40 90 fa 21 49 |T.....E.x..@..!I|" +peer0.org1.example.com | "2019-05-02 09:27:22.985 UTC [msp.identity] Verify -> DEBU 8a2 Verify: sig = 00000000 30 44 02 20 34 65 8c a6 3a 82 ef 99 4d 5d 73 05 |0D. 4e..:...M]s.| +peer0.org1.example.com | 00000010 46 93 df 67 10 73 3d 57 d5 07 92 bc 12 03 fd 2f |F..g.s=W......./| +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5d Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5e Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5f Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a60 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a61 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a62 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a63 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a64 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a65 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a66 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a67 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a68 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a69 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a6a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.capabilities] Supported -> DEBU a6b Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [common.capabilities] Supported -> DEBU a6c Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [msp.identity] Sign -> DEBU a6d Sign: plaintext: 0AD2060A1B08011A0608F9EFAAE60522...0399D4FF7503DFC0519A6F3EFAE010C9 " +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [msp.identity] Sign -> DEBU a6e Sign: digest: 28BE1EAFAC51AB90A5A66D7457C10ED8719A11DC4920A71DE7405F6DCC0EA568 " +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:21.805 UTC [policies] Evaluate -> DEBU a73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:21.806 UTC [msp] DeserializeIdentity -> DEBU a74 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:21.807 UTC [msp.identity] newIdentity -> DEBU a75 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | 00000020 b1 4c 5c 5f 02 20 1e 0d 35 99 e9 f5 ab d2 5d fa |.L\_. ..5.....].| +peer0.org1.example.com | 00000030 df eb 24 a3 d2 1c 30 f3 b7 94 f4 23 01 a8 f3 8e |..$...0....#....| +peer0.org1.example.com | 00000040 83 02 6a 68 9a f0 |..jh..|" +peer0.org1.example.com | "2019-05-02 09:27:22.986 UTC [cauthdsl] func2 -> DEBU 8a3 0xc003833290 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:22.994 UTC [cauthdsl] func1 -> DEBU 8a4 0xc003833290 gate 1556789242982602400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:22.994 UTC [policies] Evaluate -> DEBU 8a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.994 UTC [policies] Evaluate -> DEBU 8a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.995 UTC [policies] Evaluate -> DEBU 8a7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.995 UTC [policies] Evaluate -> DEBU 8a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:22.995 UTC [gossip.discovery] handleAliveMessage -> DEBU 8a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:22.996 UTC [gossip.discovery] learnExistingMembers -> DEBU 8aa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:22.996 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ab updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 " +peer0.org1.example.com | "2019-05-02 09:27:22.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ac Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 " +peer0.org1.example.com | "2019-05-02 09:27:22.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ad Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:22.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ae Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.997 UTC [gossip.discovery] handleAliveMessage -> DEBU 8af Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 8b0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:22.998 UTC [gossip.discovery] sendMemResponse -> DEBU 8b1 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:22.999 UTC [msp] DeserializeIdentity -> DEBU 8b2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.999 UTC [msp] DeserializeIdentity -> DEBU 8b3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:22.999 UTC [gossip.comm] Send -> DEBU 8b4 Entering, sending GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:23.000 UTC [gossip.comm] sendToEndpoint -> DEBU 8b5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.000 UTC [gossip.comm] sendToEndpoint -> DEBU 8b6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.000 UTC [gossip.discovery] sendMemResponse -> DEBU 8b7 Exiting, replying with MembershipResponse with Alive: 3, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:23.111 UTC [comm.grpc.server] 1 -> INFO 8b8 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.11Z grpc.peer_address=172.18.0.5:56894 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=201µs +peer0.org1.example.com | "2019-05-02 09:27:23.113 UTC [msp.identity] Sign -> DEBU 8b9 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:23.113 UTC [msp.identity] Sign -> DEBU 8ba Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:23.113 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8bb Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:56894" orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -peer0.org1.example.com | "2019-05-02 01:30:48.902 UTC [msp] getCertificationChain -> DEBU a40 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:48.903 UTC [cauthdsl] func2 -> DEBU a41 0xc0030232b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.904 UTC [msp.identity] Verify -> DEBU a42 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:30:48.904 UTC [msp.identity] Verify -> DEBU a43 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:30:48.905 UTC [cauthdsl] func2 -> DEBU a44 0xc0030232b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.905 UTC [cauthdsl] func1 -> DEBU a45 0xc0030232b0 gate 1556760648898818900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:48.905 UTC [policies] Evaluate -> DEBU a46 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.906 UTC [policies] Evaluate -> DEBU a47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.906 UTC [policies] Evaluate -> DEBU a48 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.906 UTC [policies] Evaluate -> DEBU a49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.907 UTC [gossip.gossip] handleMessage -> DEBU a4a Exiting" orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh orderer0.example.com | QQ== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.315 UTC [cauthdsl] func1 -> DEBU a81 0xc0011a4940 gate 1556760647315838700 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.315 UTC [cauthdsl] func2 -> DEBU a82 0xc0011a4940 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.315 UTC [cauthdsl] func2 -> DEBU a83 0xc0011a4940 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.316 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a84 Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:47.316 UTC [msp] Validate -> DEBU a85 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.316 UTC [cauthdsl] func2 -> DEBU a86 0xc0011a4940 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:47.316 UTC [msp.identity] Verify -> DEBU a87 Verify: digest = 00000000 21 4f fb 0b 5f ab 9a c4 67 22 08 66 81 b5 b4 cf |!O.._...g".f....| -orderer0.example.com | 00000010 2e 2c 23 f4 80 33 e2 a8 1f 04 b0 58 3c 43 28 f3 |.,#..3.....X DEBU a88 Verify: sig = 00000000 30 45 02 21 00 86 fb 9c 76 cb 8b 44 af f4 0f 00 |0E.!....v..D....| -orderer0.example.com | 00000010 6e e3 d1 6b 41 41 f8 4f c3 17 a3 44 ca c9 5f 0a |n..kAA.O...D.._.| -orderer0.example.com | 00000020 81 7e ce 61 81 02 20 50 e7 08 a1 de af f0 a0 ab |.~.a.. P........| -orderer0.example.com | 00000030 8d 52 b4 19 b0 21 33 09 ea d4 9f ad 17 d6 94 e3 |.R...!3.........| -orderer0.example.com | 00000040 85 6c 7e 6e e3 72 97 |.l~n.r.|" -orderer0.example.com | "2019-05-02 01:30:47.316 UTC [cauthdsl] func2 -> DEBU a89 0xc0011a4940 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:47.316 UTC [cauthdsl] func1 -> DEBU a8a 0xc0011a4940 gate 1556760647315838700 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:47.316 UTC [policies] Evaluate -> DEBU a8b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:47.316 UTC [policies] Evaluate -> DEBU a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:47.317 UTC [policies] Evaluate -> DEBU a8d Signature set satisfies policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:47.317 UTC [policies] Evaluate -> DEBU a8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:47.317 UTC [policies] Evaluate -> DEBU a8f Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:47.317 UTC [policies] Evaluate -> DEBU a90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:47.318 UTC [orderer.consensus.etcdraft] propose -> INFO a91 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:47.318 UTC [orderer.consensus.etcdraft] serveRequest -> INFO a92 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:47.320 UTC [orderer.consensus.etcdraft] 2 -> DEBU a93 Proposed block [2] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:47.323 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a94 Sending msg of 22865 bytes to 2 on channel businesschannel took 21.9µs" -orderer0.example.com | "2019-05-02 01:30:47.324 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a95 Sending msg of 22865 bytes to 3 on channel businesschannel took 23.9µs" -orderer0.example.com | "2019-05-02 01:30:47.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU a96 Send of ConsensusRequest for channel businesschannel with payload of size 22865 to orderer2.example.com(orderer2.example.com:7050) took 573.1µs " -orderer0.example.com | "2019-05-02 01:30:47.319 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a97 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.240.9:47318" -orderer0.example.com | "2019-05-02 01:30:47.325 UTC [orderer.common.cluster.step] sendMessage -> DEBU a98 Send of ConsensusRequest for channel businesschannel with payload of size 22865 to orderer1.example.com(orderer1.example.com:7050) took 106.8µs " -orderer0.example.com | "2019-05-02 01:30:47.333 UTC [orderer.common.cluster.step] handleMessage -> DEBU a99 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:47.333 UTC [orderer.common.broadcast] Handle -> WARN a9b Error reading from 192.168.240.9:47318: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:30:47.333 UTC [orderer.common.server] func1 -> DEBU a9d Closing Broadcast stream" -orderer0.example.com | "2019-05-02 01:30:47.333 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a9c Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" -orderer0.example.com | "2019-05-02 01:30:47.334 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a9e Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" -orderer0.example.com | "2019-05-02 01:30:47.334 UTC [grpc] infof -> DEBU aa0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:47.334 UTC [comm.grpc.server] 1 -> INFO a9f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47318 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=78.2588ms -orderer0.example.com | "2019-05-02 01:30:47.333 UTC [orderer.common.cluster.step] handleMessage -> DEBU a9a Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:47.335 UTC [orderer.consensus.etcdraft] writeBlock -> INFO aa1 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:47.335 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 301.5µs " -orderer0.example.com | "2019-05-02 01:30:47.335 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.2µs " -peer0.org1.example.com | "2019-05-02 01:30:48.907 UTC [gossip.gossip] handleMessage -> DEBU a4b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.908 UTC [msp] DeserializeIdentity -> DEBU a4c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.908 UTC [msp] DeserializeIdentity -> DEBU a4d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.908 UTC [msp] DeserializeIdentity -> DEBU a4e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.909 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a4f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:48.910 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a50 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.910 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a51 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.910 UTC [policies] Evaluate -> DEBU a52 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.911 UTC [policies] Evaluate -> DEBU a53 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:48.911 UTC [policies] Evaluate -> DEBU a54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.912 UTC [cauthdsl] func1 -> DEBU a55 0xc003045160 gate 1556760648912087200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:48.912 UTC [cauthdsl] func2 -> DEBU a56 0xc003045160 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:48.912 UTC [cauthdsl] func2 -> DEBU a57 0xc003045160 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:48.913 UTC [cauthdsl] func2 -> DEBU a58 0xc003045160 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.913 UTC [msp.identity] Verify -> DEBU a59 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -peer0.org1.example.com | 00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -peer0.org1.example.com | "2019-05-02 01:30:48.914 UTC [msp.identity] Verify -> DEBU a5a Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -peer0.org1.example.com | 00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -peer0.org1.example.com | 00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -peer0.org1.example.com | 00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -peer0.org1.example.com | 00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -peer0.org1.example.com | "2019-05-02 01:30:48.914 UTC [cauthdsl] func2 -> DEBU a5b 0xc003045160 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.915 UTC [cauthdsl] func1 -> DEBU a5c 0xc003045160 gate 1556760648912087200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:48.915 UTC [policies] Evaluate -> DEBU a5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.916 UTC [policies] Evaluate -> DEBU a5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.916 UTC [policies] Evaluate -> DEBU a5f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.916 UTC [policies] Evaluate -> DEBU a60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.917 UTC [msp] DeserializeIdentity -> DEBU a61 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a62 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a63 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.918 UTC [policies] Evaluate -> DEBU a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.918 UTC [policies] Evaluate -> DEBU a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:48.918 UTC [policies] Evaluate -> DEBU a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.919 UTC [cauthdsl] func1 -> DEBU a67 0xc003052260 gate 1556760648919127100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:48.919 UTC [cauthdsl] func2 -> DEBU a68 0xc003052260 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:48.919 UTC [cauthdsl] func2 -> DEBU a69 0xc003052260 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:48.919 UTC [cauthdsl] func2 -> DEBU a6a 0xc003052260 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.920 UTC [msp.identity] Verify -> DEBU a6b Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -peer0.org1.example.com | 00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -peer0.org1.example.com | "2019-05-02 01:30:48.921 UTC [msp.identity] Verify -> DEBU a6c Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -peer0.org1.example.com | 00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -orderer0.example.com | "2019-05-02 01:30:47.336 UTC [common.configtx] addToMap -> DEBU aa4 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:47.336 UTC [common.configtx] addToMap -> DEBU aa5 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.336 UTC [common.configtx] addToMap -> DEBU aa6 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.338 UTC [common.configtx] addToMap -> DEBU aa7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:47.340 UTC [common.configtx] addToMap -> DEBU aa8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.341 UTC [common.configtx] addToMap -> DEBU aa9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:47.341 UTC [common.configtx] addToMap -> DEBU aaa Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.343 UTC [common.configtx] addToMap -> DEBU aab Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:47.344 UTC [common.configtx] addToMap -> DEBU aac Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:47.344 UTC [common.configtx] addToMap -> DEBU aad Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.345 UTC [common.configtx] addToMap -> DEBU aae Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.346 UTC [common.configtx] addToMap -> DEBU aaf Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.347 UTC [common.configtx] addToMap -> DEBU ab0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:47.347 UTC [common.configtx] addToMap -> DEBU ab1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:47.348 UTC [common.configtx] addToMap -> DEBU ab2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.348 UTC [common.configtx] addToMap -> DEBU ab3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:47.348 UTC [common.configtx] addToMap -> DEBU ab4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.349 UTC [common.configtx] verifyDeltaSet -> DEBU ab5 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.349 UTC [common.configtx] verifyDeltaSet -> DEBU ab6 Processing change to key: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.350 UTC [common.configtx] policyForItem -> DEBU ab7 Getting policy for item Org2MSP with mod_policy Admins" -orderer0.example.com | "2019-05-02 01:30:47.350 UTC [policies] Manager -> DEBU ab8 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:47.351 UTC [policies] Manager -> DEBU ab9 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:47.352 UTC [policies] Manager -> DEBU aba Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:47.352 UTC [policies] Manager -> DEBU abb Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:47.353 UTC [policies] Manager -> DEBU abc Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.353 UTC [policies] Manager -> DEBU abd Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.353 UTC [policies] Manager -> DEBU abe Manager Channel/Application looking up path [Org2MSP]" -orderer0.example.com | "2019-05-02 01:30:47.354 UTC [policies] Manager -> DEBU abf Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.354 UTC [policies] Manager -> DEBU ac0 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.354 UTC [policies] Manager -> DEBU ac1 Manager Channel/Application/Org2MSP looking up path []" -orderer0.example.com | "2019-05-02 01:30:47.355 UTC [policies] Evaluate -> DEBU ac2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:30:47.355 UTC [cauthdsl] func1 -> DEBU ac3 0xc000c8d580 gate 1556760647355108500 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.355 UTC [cauthdsl] func2 -> DEBU ac4 0xc000c8d580 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.355 UTC [cauthdsl] func2 -> DEBU ac5 0xc000c8d580 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.355 UTC [common.deliver] Handle -> WARN ac6 Error reading from 192.168.240.9:47316: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:30:47.356 UTC [orderer.common.server] func1 -> DEBU ac7 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:30:47.356 UTC [comm.grpc.server] 1 -> INFO ac8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47316 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=113.7487ms -orderer0.example.com | "2019-05-02 01:30:47.356 UTC [grpc] infof -> DEBU ac9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:47.356 UTC [cauthdsl] func2 -> DEBU aca 0xc000c8d580 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:47.357 UTC [msp.identity] Verify -> DEBU acb Verify: digest = 00000000 94 91 3a 9b 42 3e cb f7 04 35 a7 fe 6e 63 d5 7c |..:.B>...5..nc.|| -orderer0.example.com | 00000010 7c 24 53 70 15 d2 b1 1a 57 a8 f8 c6 bb 05 dc 1f ||$Sp....W.......|" -orderer0.example.com | "2019-05-02 01:30:47.357 UTC [msp.identity] Verify -> DEBU acc Verify: sig = 00000000 30 44 02 20 2a 4c 37 99 83 06 3b 26 bc cd 68 87 |0D. *L7...;&..h.| -orderer0.example.com | 00000010 b4 dc 8d 15 40 47 d5 be ff cd 6a b3 4e fb 5a 82 |....@G....j.N.Z.| -peer0.org1.example.com | 00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -peer0.org1.example.com | 00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -peer0.org1.example.com | 00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -peer0.org1.example.com | "2019-05-02 01:30:48.921 UTC [cauthdsl] func2 -> DEBU a6d 0xc003052260 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.921 UTC [cauthdsl] func1 -> DEBU a6e 0xc003052260 gate 1556760648919127100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:48.922 UTC [policies] Evaluate -> DEBU a6f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.922 UTC [policies] Evaluate -> DEBU a70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.922 UTC [policies] Evaluate -> DEBU a71 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.923 UTC [policies] Evaluate -> DEBU a72 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.923 UTC [gossip.gossip] handleMessage -> DEBU a73 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.924 UTC [gossip.gossip] handleMessage -> DEBU a74 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1487012987430762022 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.924 UTC [gossip.pull] HandleMessage -> DEBU a75 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1487012987430762022 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.925 UTC [gossip.gossip] handleMessage -> DEBU a76 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:48.925 UTC [gossip.gossip] handleMessage -> DEBU a77 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:48.925 UTC [msp] DeserializeIdentity -> DEBU a78 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.926 UTC [msp] DeserializeIdentity -> DEBU a79 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.926 UTC [msp] DeserializeIdentity -> DEBU a7a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.927 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:48.928 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a7c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.928 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a7d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.929 UTC [policies] Evaluate -> DEBU a7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.929 UTC [policies] Evaluate -> DEBU a7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:48.929 UTC [policies] Evaluate -> DEBU a80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.929 UTC [cauthdsl] func1 -> DEBU a81 0xc003078290 gate 1556760648929892100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:48.930 UTC [cauthdsl] func2 -> DEBU a82 0xc003078290 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:48.931 UTC [cauthdsl] func2 -> DEBU a83 0xc003078290 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:48.931 UTC [cauthdsl] func2 -> DEBU a84 0xc003078290 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.931 UTC [msp.identity] Verify -> DEBU a85 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:30:48.932 UTC [msp.identity] Verify -> DEBU a86 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU a87 0xc003078290 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.933 UTC [cauthdsl] func1 -> DEBU a88 0xc003078290 gate 1556760648929892100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:48.933 UTC [policies] Evaluate -> DEBU a89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.933 UTC [policies] Evaluate -> DEBU a8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.934 UTC [policies] Evaluate -> DEBU a8b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.934 UTC [policies] Evaluate -> DEBU a8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | 00000020 06 7e 76 b6 02 20 04 f7 43 d0 0a f5 49 8b 53 76 |.~v.. ..C...I.Sv| -orderer0.example.com | 00000030 e9 cd a4 0c 01 31 38 3b 3f 69 a2 6e 25 1c d8 26 |.....18;?i.n%..&| -orderer0.example.com | 00000040 b9 56 9b 7e 5e 90 |.V.~^.|" -orderer0.example.com | "2019-05-02 01:30:47.358 UTC [cauthdsl] func2 -> DEBU acd 0xc000c8d580 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:47.358 UTC [cauthdsl] func1 -> DEBU ace 0xc000c8d580 gate 1556760647355108500 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:47.358 UTC [policies] Evaluate -> DEBU acf Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.359 UTC [policies] Evaluate -> DEBU ad0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.359 UTC [common.configtx] recurseConfigMap -> DEBU ad1 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.359 UTC [common.configtx] recurseConfigMap -> DEBU ad2 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.360 UTC [common.configtx] recurseConfigMap -> DEBU ad3 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.360 UTC [common.configtx] recurseConfigMap -> DEBU ad4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.360 UTC [common.configtx] recurseConfigMap -> DEBU ad5 Setting policy for key Endorsement to " -peer0.org1.example.com | "2019-05-02 01:30:48.935 UTC [msp] DeserializeIdentity -> DEBU a8d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:48.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:48.936 UTC [policies] Evaluate -> DEBU a90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.936 UTC [policies] Evaluate -> DEBU a91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:48.937 UTC [policies] Evaluate -> DEBU a92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:48.937 UTC [cauthdsl] func1 -> DEBU a93 0xc0030795a0 gate 1556760648937920600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:48.938 UTC [cauthdsl] func2 -> DEBU a94 0xc0030795a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:48.938 UTC [cauthdsl] func2 -> DEBU a95 0xc0030795a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:48.939 UTC [cauthdsl] func2 -> DEBU a96 0xc0030795a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.939 UTC [msp.identity] Verify -> DEBU a97 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:30:48.939 UTC [msp.identity] Verify -> DEBU a98 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU a99 0xc0030795a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:48.941 UTC [cauthdsl] func1 -> DEBU a9a 0xc0030795a0 gate 1556760648937920600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:48.941 UTC [policies] Evaluate -> DEBU a9b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.941 UTC [policies] Evaluate -> DEBU a9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.942 UTC [policies] Evaluate -> DEBU a9d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.942 UTC [policies] Evaluate -> DEBU a9e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:48.943 UTC [gossip.gossip] handleMessage -> DEBU a9f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.124 UTC [gossip.gossip] handleMessage -> DEBU aa0 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.124 UTC [msp] DeserializeIdentity -> DEBU aa1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.125 UTC [msp] DeserializeIdentity -> DEBU aa2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.125 UTC [gossip.gossip] handleMessage -> DEBU aa3 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.130 UTC [gossip.gossip] handleMessage -> DEBU aa4 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.131 UTC [gossip.pull] HandleMessage -> DEBU aa5 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.131 UTC [gossip.pull] SendDigest -> DEBU aa6 Sending BLOCK_MSG digest: [1 2] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:49.132 UTC [gossip.gossip] handleMessage -> DEBU aa7 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.137 UTC [gossip.gossip] handleMessage -> DEBU aa8 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760647798862400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.138 UTC [msp.identity] Verify -> DEBU aa9 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:30:49.139 UTC [msp.identity] Verify -> DEBU aaa Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:30:49.139 UTC [gossip.gossip] handleMessage -> DEBU aab Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.143 UTC [gossip.comm] func1 -> DEBU aac Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760647798862400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.144 UTC [gossip.gossip] handleMessage -> DEBU aad Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760647798862400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.145 UTC [msp.identity] Verify -> DEBU aae Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:30:49.146 UTC [msp.identity] Verify -> DEBU aaf Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:30:49.146 UTC [msp] DeserializeIdentity -> DEBU ab0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.147 UTC [gossip.gossip] handleMessage -> DEBU ab1 Exiting" -orderer0.example.com | "2019-05-02 01:30:47.361 UTC [common.configtx] recurseConfigMap -> DEBU ad6 Setting policy for key Readers to " -orderer0.example.com | "2019-05-02 01:30:47.361 UTC [common.configtx] recurseConfigMap -> DEBU ad7 Setting policy for key Writers to " -orderer0.example.com | "2019-05-02 01:30:47.362 UTC [common.configtx] recurseConfigMap -> DEBU ad8 Setting policy for key Admins to " -orderer0.example.com | "2019-05-02 01:30:47.362 UTC [common.configtx] recurseConfigMap -> DEBU ad9 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.362 UTC [common.configtx] recurseConfigMap -> DEBU ada Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.362 UTC [common.configtx] recurseConfigMap -> DEBU adb Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU adc Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU add Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU ade Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU adf Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU ae0 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU ae1 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae2 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae3 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae4 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae5 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae6 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae7 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:30:47.365 UTC [common.channelconfig] NewStandardValues -> DEBU ae8 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:30:47.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU ae9 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:47.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU aea Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:47.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU aeb Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:47.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU aec Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:30:47.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU aed Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.366 UTC [common.channelconfig] NewStandardValues -> DEBU aee Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-05-02 01:30:47.366 UTC [common.channelconfig] initializeProtosStruct -> DEBU aef Processing field: ACLs" -orderer0.example.com | "2019-05-02 01:30:47.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU af0 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.367 UTC [common.channelconfig] NewStandardValues -> DEBU af1 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:47.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU af2 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.368 UTC [common.channelconfig] NewStandardValues -> DEBU af3 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:47.368 UTC [common.channelconfig] initializeProtosStruct -> DEBU af4 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:47.368 UTC [common.channelconfig] Validate -> DEBU af5 Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:30:47.369 UTC [common.channelconfig] validateMSP -> DEBU af6 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.369 UTC [msp] newBccspMsp -> DEBU af7 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.370 UTC [msp] New -> DEBU afa Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.370 UTC [orderer.common.cluster.step] handleMessage -> DEBU af8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:47.370 UTC [orderer.common.cluster.step] handleMessage -> DEBU af9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:47.372 UTC [msp] Setup -> DEBU afb Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.373 UTC [msp.identity] newIdentity -> DEBU afc Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | "2019-05-02 01:30:49.362 UTC [gossip.comm] func1 -> DEBU ab2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.362 UTC [gossip.gossip] handleMessage -> DEBU ab3 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.362 UTC [msp] DeserializeIdentity -> DEBU ab4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.362 UTC [msp] DeserializeIdentity -> DEBU ab5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.362 UTC [msp] DeserializeIdentity -> DEBU ab6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.362 UTC [gossip.gossip] handleMessage -> DEBU ab7 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.375 UTC [gossip.comm] func1 -> DEBU ab8 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760647645718100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.376 UTC [gossip.gossip] handleMessage -> DEBU ab9 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760647645718100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.376 UTC [msp] DeserializeIdentity -> DEBU aba Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.376 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU abb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:49.376 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU abc Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.376 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU abd Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.376 UTC [policies] Evaluate -> DEBU abe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.376 UTC [policies] Evaluate -> DEBU abf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:49.376 UTC [policies] Evaluate -> DEBU ac0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [cauthdsl] func1 -> DEBU ac1 0xc0030b5980 gate 1556760649377055800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [cauthdsl] func2 -> DEBU ac2 0xc0030b5980 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [cauthdsl] func2 -> DEBU ac3 0xc0030b5980 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [cauthdsl] func2 -> DEBU ac4 0xc0030b5980 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [msp.identity] Verify -> DEBU ac5 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [msp.identity] Verify -> DEBU ac6 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU ac7 0xc0030b5980 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [cauthdsl] func1 -> DEBU ac8 0xc0030b5980 gate 1556760649377055800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [policies] Evaluate -> DEBU ac9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [policies] Evaluate -> DEBU aca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [policies] Evaluate -> DEBU acb Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [policies] Evaluate -> DEBU acc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.377 UTC [msp] DeserializeIdentity -> DEBU acd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.378 UTC [gossip.gossip] handleMessage -> DEBU ace Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.382 UTC [gossip.comm] func1 -> DEBU acf Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760647645718100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.382 UTC [gossip.gossip] handleMessage -> DEBU ad0 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760647645718100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.382 UTC [msp] DeserializeIdentity -> DEBU ad1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.382 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ad2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:49.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ad3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ad4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.382 UTC [policies] Evaluate -> DEBU ad5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.382 UTC [policies] Evaluate -> DEBU ad6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:49.383 UTC [policies] Evaluate -> DEBU ad7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.383 UTC [cauthdsl] func1 -> DEBU ad8 0xc003093c20 gate 1556760649383127400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:49.383 UTC [cauthdsl] func2 -> DEBU ad9 0xc003093c20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:49.383 UTC [cauthdsl] func2 -> DEBU ada 0xc003093c20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:49.383 UTC [cauthdsl] func2 -> DEBU adb 0xc003093c20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.383 UTC [msp.identity] Verify -> DEBU adc Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:30:49.383 UTC [msp.identity] Verify -> DEBU add Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU ade 0xc003093c20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.383 UTC [cauthdsl] func1 -> DEBU adf 0xc003093c20 gate 1556760649383127400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:49.383 UTC [policies] Evaluate -> DEBU ae0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.383 UTC [policies] Evaluate -> DEBU ae1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.384 UTC [policies] Evaluate -> DEBU ae2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.384 UTC [policies] Evaluate -> DEBU ae3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.384 UTC [msp] DeserializeIdentity -> DEBU ae4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.384 UTC [gossip.gossip] handleMessage -> DEBU ae5 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.459 UTC [gossip.gossip] handleMessage -> DEBU ae6 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.459 UTC [gossip.pull] HandleMessage -> DEBU ae7 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.459 UTC [gossip.pull] SendDigest -> DEBU ae8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:49.459 UTC [gossip.gossip] handleMessage -> DEBU ae9 Exiting" -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.374 UTC [msp.identity] newIdentity -> DEBU afd Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | "2019-05-02 01:30:49.460 UTC [gossip.gossip] handleMessage -> DEBU aea Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.460 UTC [gossip.gossip] handleMessage -> DEBU aeb Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.460 UTC [gossip.discovery] handleMsgFromComm -> DEBU aec Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.461 UTC [gossip.gossip] ValidateAliveMsg -> DEBU aed Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:49.461 UTC [msp.identity] Verify -> DEBU aee Verify: digest = 00000000 ce 7f 0e 3b 0c 4e d5 14 5e b2 1b 39 4e 7a d1 5a |...;.N..^..9Nz.Z| -peer0.org1.example.com | 00000010 bb 65 54 1b 08 35 3f 61 39 7d e0 ef b4 ea 07 da |.eT..5?a9}......|" -peer0.org1.example.com | "2019-05-02 01:30:49.461 UTC [msp.identity] Verify -> DEBU aef Verify: sig = 00000000 30 44 02 20 17 71 33 ee 63 80 6c a0 1e a4 16 7c |0D. .q3.c.l....|| -peer0.org1.example.com | 00000010 07 95 98 db 11 4a fd 91 8f e8 eb 62 c0 e4 c9 04 |.....J.....b....| -peer0.org1.example.com | 00000020 c8 d2 29 2b 02 20 79 99 52 cf 5d af b4 48 f8 38 |..)+. y.R.]..H.8| -peer0.org1.example.com | 00000030 57 0a 3b 14 71 1c ef b8 87 72 67 56 f3 0c 1f 56 |W.;.q....rgV...V| -peer0.org1.example.com | 00000040 14 52 01 9d 9f 49 |.R...I|" -peer0.org1.example.com | "2019-05-02 01:30:49.461 UTC [msp.identity] Verify -> DEBU af0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:49.461 UTC [msp.identity] Verify -> DEBU af1 Verify: sig = 00000000 30 45 02 21 00 ad 39 6f 4d 72 05 03 5a 42 c5 3b |0E.!..9oMr..ZB.;| -peer0.org1.example.com | 00000010 70 a8 4b 2c 25 be 5f 1c ba ba 18 eb c6 c5 b7 a1 |p.K,%._.........| -peer0.org1.example.com | 00000020 0b 01 76 86 b4 02 20 4a 85 33 39 3d 1c 68 88 f5 |..v... J.39=.h..| -peer0.org1.example.com | 00000030 e7 a1 4f 96 14 db 97 93 98 7f 28 07 dc f3 5d aa |..O.......(...].| -peer0.org1.example.com | 00000040 e6 78 8e a1 9a 53 30 |.x...S0|" -peer0.org1.example.com | "2019-05-02 01:30:49.461 UTC [gossip.discovery] handleAliveMessage -> DEBU af2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.461 UTC [gossip.discovery] learnExistingMembers -> DEBU af3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU af4 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 " -peer0.org1.example.com | "2019-05-02 01:30:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU af5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 " -peer0.org1.example.com | "2019-05-02 01:30:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU af6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU af7 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.462 UTC [gossip.discovery] handleAliveMessage -> DEBU af8 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.462 UTC [gossip.discovery] handleMsgFromComm -> DEBU af9 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.462 UTC [gossip.discovery] sendMemResponse -> DEBU afa Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:49.463 UTC [msp] DeserializeIdentity -> DEBU afb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.463 UTC [msp] DeserializeIdentity -> DEBU afc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.464 UTC [gossip.comm] Send -> DEBU afd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:49.464 UTC [gossip.discovery] sendMemResponse -> DEBU afe Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:49.464 UTC [gossip.comm] sendToEndpoint -> DEBU aff Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.464 UTC [gossip.comm] sendToEndpoint -> DEBU b00 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.534 UTC [gossip.comm] func1 -> DEBU b01 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.534 UTC [gossip.gossip] handleMessage -> DEBU b02 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.534 UTC [gossip.pull] HandleMessage -> DEBU b03 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.534 UTC [msp] DeserializeIdentity -> DEBU b04 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.534 UTC [msp] DeserializeIdentity -> DEBU b05 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.535 UTC [gossip.pull] SendDigest -> DEBU b06 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:49.535 UTC [gossip.gossip] handleMessage -> DEBU b07 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.553 UTC [gossip.comm] func1 -> DEBU b08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.553 UTC [gossip.gossip] handleMessage -> DEBU b09 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.553 UTC [gossip.gossip] handleMessage -> DEBU b0a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.553 UTC [gossip.discovery] handleMsgFromComm -> DEBU b0b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.553 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b0c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:49.553 UTC [msp] DeserializeIdentity -> DEBU b0d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.554 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:49.554 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b0f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.554 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b10 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.554 UTC [policies] Evaluate -> DEBU b11 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.554 UTC [policies] Evaluate -> DEBU b12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:49.555 UTC [policies] Evaluate -> DEBU b13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.556 UTC [cauthdsl] func1 -> DEBU b14 0xc0030e8c60 gate 1556760649556157800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:49.651 UTC [gossip.comm] func1 -> DEBU b15 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.651 UTC [gossip.gossip] handleMessage -> DEBU b16 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.651 UTC [msp] DeserializeIdentity -> DEBU b17 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.652 UTC [msp] DeserializeIdentity -> DEBU b18 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.652 UTC [msp] DeserializeIdentity -> DEBU b19 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.657 UTC [gossip.gossip] handleMessage -> DEBU b1a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.695 UTC [msp.identity] Sign -> DEBU b1b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151011 " -peer0.org1.example.com | "2019-05-02 01:30:49.696 UTC [msp.identity] Sign -> DEBU b1c Sign: digest: 3DEA49CE3AFE6C43362B27543B03F45FBFB459261ACF32CD874F78B0D407E096 " -peer0.org1.example.com | "2019-05-02 01:30:49.697 UTC [msp.identity] Sign -> DEBU b1d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:49.697 UTC [msp.identity] Sign -> DEBU b1e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:49.708 UTC [gossip.pull] Hello -> DEBU b20 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:49.713 UTC [gossip.comm] Send -> DEBU b21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:49.713 UTC [gossip.pull] Hello -> DEBU b22 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:49.715 UTC [gossip.comm] Send -> DEBU b23 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:49.715 UTC [gossip.pull] Hello -> DEBU b24 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:49.718 UTC [gossip.comm] Send -> DEBU b25 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:49.719 UTC [gossip.comm] sendToEndpoint -> DEBU b26 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.719 UTC [gossip.comm] sendToEndpoint -> DEBU b27 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.720 UTC [gossip.comm] sendToEndpoint -> DEBU b28 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.720 UTC [gossip.comm] sendToEndpoint -> DEBU b29 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.720 UTC [gossip.comm] sendToEndpoint -> DEBU b2a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.720 UTC [gossip.comm] sendToEndpoint -> DEBU b2b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.720 UTC [gossip.comm] func1 -> DEBU b2c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760647882998300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.720 UTC [gossip.gossip] handleMessage -> DEBU b2d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760647882998300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.720 UTC [msp] DeserializeIdentity -> DEBU b2e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b2f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:49.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b30 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b31 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.727 UTC [policies] Evaluate -> DEBU b32 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.727 UTC [policies] Evaluate -> DEBU b33 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:49.728 UTC [policies] Evaluate -> DEBU b34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.729 UTC [cauthdsl] func1 -> DEBU b35 0xc00316b6a0 gate 1556760649729179300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:49.730 UTC [cauthdsl] func2 -> DEBU b36 0xc00316b6a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:49.730 UTC [cauthdsl] func2 -> DEBU b37 0xc00316b6a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:49.730 UTC [cauthdsl] func2 -> DEBU b38 0xc00316b6a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.731 UTC [msp.identity] Verify -> DEBU b39 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -peer0.org1.example.com | 00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -peer0.org1.example.com | "2019-05-02 01:30:49.731 UTC [msp.identity] Verify -> DEBU b3a Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -peer0.org1.example.com | 00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -peer0.org1.example.com | 00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -peer0.org1.example.com | 00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -peer0.org1.example.com | 00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -peer0.org1.example.com | "2019-05-02 01:30:49.732 UTC [cauthdsl] func2 -> DEBU b3b 0xc00316b6a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.733 UTC [cauthdsl] func1 -> DEBU b3c 0xc00316b6a0 gate 1556760649729179300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:49.733 UTC [policies] Evaluate -> DEBU b3d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.733 UTC [policies] Evaluate -> DEBU b3e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.734 UTC [policies] Evaluate -> DEBU b3f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.734 UTC [policies] Evaluate -> DEBU b40 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.735 UTC [msp] DeserializeIdentity -> DEBU b41 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.735 UTC [gossip.gossip] handleMessage -> DEBU b42 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.707 UTC [gossip.comm] Send -> DEBU b1f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:49.736 UTC [msp] DeserializeIdentity -> DEBU b43 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.736 UTC [gossip.comm] Send -> DEBU b44 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:49.737 UTC [msp] DeserializeIdentity -> DEBU b45 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.737 UTC [gossip.comm] Send -> DEBU b46 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:49.738 UTC [gossip.comm] sendToEndpoint -> DEBU b47 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.738 UTC [gossip.comm] sendToEndpoint -> DEBU b48 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.738 UTC [gossip.comm] sendToEndpoint -> DEBU b49 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.738 UTC [gossip.comm] sendToEndpoint -> DEBU b4a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.739 UTC [gossip.comm] sendToEndpoint -> DEBU b4b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.739 UTC [gossip.comm] sendToEndpoint -> DEBU b4c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.744 UTC [gossip.gossip] handleMessage -> DEBU b4d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13587717929261904434 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.744 UTC [gossip.pull] HandleMessage -> DEBU b4e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13587717929261904434 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.744 UTC [gossip.gossip] handleMessage -> DEBU b4f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.744 UTC [gossip.gossip] handleMessage -> DEBU b50 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.745 UTC [gossip.comm] func1 -> DEBU b51 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13121253355825226892 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.745 UTC [gossip.comm] func1 -> DEBU b52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.752 UTC [cauthdsl] func2 -> DEBU b53 0xc0030e8c60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:49.752 UTC [cauthdsl] func2 -> DEBU b54 0xc0030e8c60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:49.752 UTC [cauthdsl] func2 -> DEBU b55 0xc0030e8c60 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.753 UTC [msp.identity] Verify -> DEBU b56 Verify: digest = 00000000 fc 3b 4f 07 ee 02 6e 6d 28 dd 29 36 16 e5 38 9b |.;O...nm(.)6..8.| -peer0.org1.example.com | 00000010 59 12 bd 4a 3a f4 ca 66 a0 81 63 b4 ad 75 53 96 |Y..J:..f..c..uS.|" -peer0.org1.example.com | "2019-05-02 01:30:49.754 UTC [msp.identity] Verify -> DEBU b57 Verify: sig = 00000000 30 45 02 21 00 84 bd 8b 1b ab 55 39 60 42 e3 b1 |0E.!......U9`B..| -peer0.org1.example.com | 00000010 00 86 57 a7 76 5b 90 19 81 3c 48 f8 a2 f6 73 25 |..W.v[... DEBU b58 0xc0030e8c60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.755 UTC [cauthdsl] func1 -> DEBU b59 0xc0030e8c60 gate 1556760649556157800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:49.755 UTC [policies] Evaluate -> DEBU b5a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.755 UTC [policies] Evaluate -> DEBU b5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.756 UTC [policies] Evaluate -> DEBU b5c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.756 UTC [policies] Evaluate -> DEBU b5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.756 UTC [gossip.discovery] handleAliveMessage -> DEBU b5e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.757 UTC [gossip.discovery] learnExistingMembers -> DEBU b5f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:49.757 UTC [gossip.discovery] learnExistingMembers -> DEBU b60 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 " -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.377 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU afe Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.377 UTC [msp] Validate -> DEBU aff MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.385 UTC [msp] getCertificationChain -> DEBU b00 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.386 UTC [msp] hasOURole -> DEBU b01 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:47.386 UTC [msp] getCertificationChain -> DEBU b02 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.389 UTC [common.channelconfig] NewStandardValues -> DEBU b03 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:30:47.389 UTC [common.channelconfig] initializeProtosStruct -> DEBU b04 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.389 UTC [common.channelconfig] NewStandardValues -> DEBU b05 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:47.393 UTC [common.channelconfig] initializeProtosStruct -> DEBU b07 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:47.392 UTC [orderer.common.server] Deliver -> DEBU b06 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:47.393 UTC [common.deliver] Handle -> DEBU b08 Starting new deliver loop for 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:30:47.394 UTC [common.deliver] Handle -> DEBU b09 Attempting to read seek info message from 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:30:47.394 UTC [common.channelconfig] Validate -> DEBU b0a Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:30:47.395 UTC [policies] Evaluate -> DEBU b0b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.395 UTC [policies] Evaluate -> DEBU b0c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.395 UTC [policies] Evaluate -> DEBU b0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.394 UTC [common.channelconfig] validateMSP -> DEBU b0e Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.396 UTC [msp] newBccspMsp -> DEBU b10 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.395 UTC [policies] Evaluate -> DEBU b0f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.396 UTC [msp] New -> DEBU b11 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.396 UTC [policies] Evaluate -> DEBU b12 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.397 UTC [msp] DeserializeIdentity -> DEBU b13 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.397 UTC [msp] Setup -> DEBU b14 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.398 UTC [msp.identity] newIdentity -> DEBU b15 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.399 UTC [msp.identity] newIdentity -> DEBU b16 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:21.808 UTC [cauthdsl] func1 -> DEBU a76 0xc000f4a170 gate 1556789241808157000 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:21.809 UTC [cauthdsl] func2 -> DEBU a77 0xc000f4a170 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:21.809 UTC [cauthdsl] func2 -> DEBU a78 0xc000f4a170 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:21.809 UTC [cauthdsl] func2 -> DEBU a79 0xc000f4a170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:21.810 UTC [cauthdsl] func2 -> DEBU a7a 0xc000f4a170 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:21.810 UTC [cauthdsl] func1 -> DEBU a7b 0xc000f4a170 gate 1556789241808157000 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:21.810 UTC [policies] Evaluate -> DEBU a7c Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.811 UTC [policies] Evaluate -> DEBU a7d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.811 UTC [policies] Evaluate -> DEBU a7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:21.811 UTC [cauthdsl] func1 -> DEBU a7f 0xc000f4b2b0 gate 1556789241811771100 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:21.812 UTC [cauthdsl] func2 -> DEBU a80 0xc000f4b2b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:21.812 UTC [cauthdsl] func2 -> DEBU a81 0xc000f4b2b0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:21.812 UTC [cauthdsl] func2 -> DEBU a82 0xc000f4b2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:21.813 UTC [cauthdsl] func2 -> DEBU a83 0xc000f4b2b0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:21.813 UTC [cauthdsl] func1 -> DEBU a84 0xc000f4b2b0 gate 1556789241811771100 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:21.813 UTC [policies] Evaluate -> DEBU a85 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.814 UTC [policies] Evaluate -> DEBU a86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.814 UTC [policies] func1 -> DEBU a87 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Writers Org1MSP/Writers ]" +orderer0.example.com | "2019-05-02 09:27:21.814 UTC [policies] Evaluate -> DEBU a88 Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:21.815 UTC [policies] Evaluate -> DEBU a89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:21.815 UTC [policies] Evaluate -> DEBU a8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.114 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8bc Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:56894" +peer0.org1.example.com | "2019-05-02 09:27:23.114 UTC [msp] DeserializeIdentity -> DEBU 8bd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.115 UTC [msp] DeserializeIdentity -> DEBU 8be Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.115 UTC [msp.identity] newIdentity -> DEBU 8bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:23.116 UTC [msp] Validate -> DEBU 8c0 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:23.116 UTC [msp] getCertificationChain -> DEBU 8c1 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:23.117 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.117 UTC [msp] DeserializeIdentity -> DEBU 8c3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.117 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.118 UTC [msp] DeserializeIdentity -> DEBU 8c5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.118 UTC [msp] DeserializeIdentity -> DEBU 8c6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.119 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.119 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8c8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.119 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8c9 Got reader policy for channel [businesschannel] with flag [true]" +orderer0.example.com | "2019-05-02 09:27:21.815 UTC [policies] Evaluate -> DEBU a8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:21.816 UTC [policies] Evaluate -> DEBU a8c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-05-02 09:27:21.816 UTC [cauthdsl] func1 -> DEBU a8d 0xc000f4bfc0 gate 1556789241816623000 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:21.816 UTC [cauthdsl] func2 -> DEBU a8e 0xc000f4bfc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.119 UTC [policies] Evaluate -> DEBU 8ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.120 UTC [policies] Evaluate -> DEBU 8cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:23.120 UTC [policies] Evaluate -> DEBU 8cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.120 UTC [cauthdsl] func1 -> DEBU 8cd 0xc003899540 gate 1556789243120806800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.120 UTC [cauthdsl] func2 -> DEBU 8ce 0xc003899540 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.121 UTC [cauthdsl] func2 -> DEBU 8cf 0xc003899540 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.121 UTC [cauthdsl] func2 -> DEBU 8d0 0xc003899540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:23.121 UTC [cauthdsl] func2 -> DEBU 8d1 0xc003899540 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.122 UTC [cauthdsl] func1 -> DEBU 8d2 0xc003899540 gate 1556789243120806800 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.122 UTC [policies] Evaluate -> DEBU 8d3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.122 UTC [policies] Evaluate -> DEBU 8d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.122 UTC [policies] Evaluate -> DEBU 8d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.123 UTC [cauthdsl] func1 -> DEBU 8d6 0xc003899da0 gate 1556789243123168200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.123 UTC [cauthdsl] func2 -> DEBU 8d7 0xc003899da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.123 UTC [cauthdsl] func2 -> DEBU 8d8 0xc003899da0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.123 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8d9 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:23.126 UTC [msp] Validate -> DEBU 8da MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:23.126 UTC [msp] getCertificationChain -> DEBU 8db MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:23.126 UTC [cauthdsl] func2 -> DEBU 8dc 0xc003899da0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.127 UTC [msp.identity] Verify -> DEBU 8dd Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-05-02 09:27:23.127 UTC [msp.identity] Verify -> DEBU 8de Verify: sig = 00000000 30 44 02 20 3d 95 d0 1f 80 8f c6 4a dc 3e 2f aa |0D. =......J.>/.| +peer0.org1.example.com | 00000010 eb f9 5a aa 8a bc 21 20 51 8b d2 3c 15 fa d4 a8 |..Z...! Q..<....| +peer0.org1.example.com | 00000020 11 43 dd 1a 02 20 69 6a 4a 6a 7f fe 0c c6 15 03 |.C... ijJj......| +peer0.org1.example.com | 00000030 0a 4d 73 c3 ba d6 0c ae da 5b 95 a7 fb 60 35 0e |.Ms......[...`5.| +peer0.org1.example.com | 00000040 b6 85 9a bc f2 b5 |......|" +peer0.org1.example.com | "2019-05-02 09:27:23.127 UTC [cauthdsl] func2 -> DEBU 8df 0xc003899da0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.128 UTC [cauthdsl] func1 -> DEBU 8e0 0xc003899da0 gate 1556789243123168200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:23.128 UTC [policies] Evaluate -> DEBU 8e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.128 UTC [policies] Evaluate -> DEBU 8e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.129 UTC [policies] Evaluate -> DEBU 8e3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.131 UTC [policies] Evaluate -> DEBU 8e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.131 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8e5 Authenticated 172.18.0.5:56894" +peer0.org1.example.com | "2019-05-02 09:27:23.132 UTC [gossip.comm] GossipStream -> DEBU 8e6 Servicing 172.18.0.5:56894" +peer0.org1.example.com | "2019-05-02 09:27:23.142 UTC [gossip.comm] readFromStream -> DEBU 8e7 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-05-02 09:27:23.142 UTC [gossip.comm] func2 -> DEBU 8e8 Client 172.18.0.5:56894 disconnected" +peer0.org1.example.com | "2019-05-02 09:27:23.142 UTC [comm.grpc.server] 1 -> INFO 8e9 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:33.112Z grpc.peer_address=172.18.0.5:56894 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.4386ms +peer0.org1.example.com | "2019-05-02 09:27:23.143 UTC [gossip.comm] writeToStream -> DEBU 8ea Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:27:23.143 UTC [grpc] infof -> DEBU 8eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:23.150 UTC [comm.grpc.server] 1 -> INFO 8ec unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.15Z grpc.peer_address=172.18.0.5:56896 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=568.2µs +peer0.org1.example.com | "2019-05-02 09:27:23.152 UTC [msp.identity] Sign -> DEBU 8ed Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:23.153 UTC [msp.identity] Sign -> DEBU 8ee Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:23.153 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ef Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:56896" +peer0.org1.example.com | "2019-05-02 09:27:23.154 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8f0 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:56896" +peer0.org1.example.com | "2019-05-02 09:27:23.154 UTC [msp] DeserializeIdentity -> DEBU 8f1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.154 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.155 UTC [msp] DeserializeIdentity -> DEBU 8f3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.155 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.155 UTC [msp] DeserializeIdentity -> DEBU 8f5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.156 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8f7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8f8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.157 UTC [policies] Evaluate -> DEBU 8f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.157 UTC [policies] Evaluate -> DEBU 8fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:23.158 UTC [policies] Evaluate -> DEBU 8fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.158 UTC [cauthdsl] func1 -> DEBU 8fc 0xc0039027d0 gate 1556789243158295500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.158 UTC [cauthdsl] func2 -> DEBU 8fd 0xc0039027d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.160 UTC [cauthdsl] func2 -> DEBU 8fe 0xc0039027d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.161 UTC [cauthdsl] func2 -> DEBU 8ff 0xc0039027d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:23.161 UTC [cauthdsl] func2 -> DEBU 900 0xc0039027d0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.162 UTC [cauthdsl] func1 -> DEBU 901 0xc0039027d0 gate 1556789243158295500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.162 UTC [policies] Evaluate -> DEBU 902 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.162 UTC [policies] Evaluate -> DEBU 903 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.163 UTC [policies] Evaluate -> DEBU 904 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.164 UTC [cauthdsl] func1 -> DEBU 905 0xc0038af780 gate 1556789243164671300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.165 UTC [cauthdsl] func2 -> DEBU 906 0xc0038af780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.165 UTC [cauthdsl] func2 -> DEBU 907 0xc0038af780 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.165 UTC [cauthdsl] func2 -> DEBU 908 0xc0038af780 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.165 UTC [msp.identity] Verify -> DEBU 909 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-05-02 09:27:23.165 UTC [msp.identity] Verify -> DEBU 90a Verify: sig = 00000000 30 44 02 20 59 45 5d e8 5d 24 f9 9d b3 3b 40 ba |0D. YE].]$...;@.| +peer0.org1.example.com | 00000010 48 31 87 a6 31 59 7a 8b be 27 c3 f3 37 94 6c 20 |H1..1Yz..'..7.l | +peer0.org1.example.com | 00000020 9d e3 a0 fe 02 20 74 98 51 b1 87 d2 78 d7 aa e6 |..... t.Q...x...| +peer0.org1.example.com | 00000030 7e b2 38 4e 93 1d 61 9f 10 f8 8c 3d 00 e6 76 50 |~.8N..a....=..vP| +peer0.org1.example.com | 00000040 82 ac 8f 61 a4 97 |...a..|" +peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [cauthdsl] func2 -> DEBU 90b 0xc0038af780 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [cauthdsl] func1 -> DEBU 90c 0xc0038af780 gate 1556789243164671300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 90d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 90e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 90f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 910 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.166 UTC [gossip.comm] authenticateRemotePeer -> DEBU 911 Authenticated 172.18.0.5:56896" +orderer0.example.com | "2019-05-02 09:27:21.817 UTC [cauthdsl] func2 -> DEBU a8f 0xc000f4bfc0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:21.817 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a90 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:21.817 UTC [msp] Validate -> DEBU a91 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:21.818 UTC [cauthdsl] func2 -> DEBU a92 0xc000f4bfc0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:21.819 UTC [msp.identity] Verify -> DEBU a93 Verify: digest = 00000000 28 be 1e af ac 51 ab 90 a5 a6 6d 74 57 c1 0e d8 |(....Q....mtW...| +orderer0.example.com | 00000010 71 9a 11 dc 49 20 a7 1d e7 40 5f 6d cc 0e a5 68 |q...I ...@_m...h|" +orderer0.example.com | "2019-05-02 09:27:21.819 UTC [msp.identity] Verify -> DEBU a94 Verify: sig = 00000000 30 44 02 20 3e bf 95 0c a9 21 62 de ef 7e a5 ef |0D. >....!b..~..| +orderer0.example.com | 00000010 63 5c 98 e1 bd c7 36 04 00 18 3d 1d 07 ee 99 4e |c\....6...=....N| +orderer0.example.com | 00000020 ce 31 f7 f9 02 20 6e 36 96 aa ea c8 84 49 93 f8 |.1... n6.....I..| +orderer0.example.com | 00000030 ee bb 98 2d 71 5e af d9 92 ee 7a 05 0c 7d 37 8b |...-q^....z..}7.| +orderer0.example.com | 00000040 69 13 32 1f 05 3e |i.2..>|" +orderer0.example.com | "2019-05-02 09:27:21.820 UTC [cauthdsl] func2 -> DEBU a95 0xc000f4bfc0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:21.820 UTC [cauthdsl] func1 -> DEBU a96 0xc000f4bfc0 gate 1556789241816623000 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a97 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a98 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a99 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a9b Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:21.821 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a9d [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57184" +orderer0.example.com | "2019-05-02 09:27:21.822 UTC [orderer.consensus.etcdraft] propose -> INFO a9e Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:21.824 UTC [orderer.consensus.etcdraft] serveRequest -> INFO a9f Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:21.824 UTC [common.deliver] Handle -> WARN aa0 Error reading from 172.18.0.8:57182: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:21.825 UTC [orderer.common.server] func1 -> DEBU aa4 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:21.827 UTC [comm.grpc.server] 1 -> INFO aa5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57182 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=90.0028ms +orderer0.example.com | "2019-05-02 09:27:21.825 UTC [grpc] infof -> DEBU aa1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:21.825 UTC [orderer.common.broadcast] Handle -> WARN aa2 Error reading from 172.18.0.8:57184: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:21.830 UTC [orderer.common.server] func1 -> DEBU aa9 Closing Broadcast stream" +orderer0.example.com | "2019-05-02 09:27:21.830 UTC [comm.grpc.server] 1 -> INFO aaa streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57184 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=76.6966ms +orderer0.example.com | "2019-05-02 09:27:21.825 UTC [grpc] infof -> DEBU aa3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:21.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa6 Sending msg of 22866 bytes to 2 on channel businesschannel took 24.1µs" +orderer0.example.com | "2019-05-02 09:27:21.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aab Sending msg of 22866 bytes to 3 on channel businesschannel took 19.7µs" +orderer0.example.com | "2019-05-02 09:27:21.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa7 Send of ConsensusRequest for channel businesschannel with payload of size 22866 to orderer1.example.com(orderer1.example.com:7050) took 118.3µs " +orderer0.example.com | "2019-05-02 09:27:21.830 UTC [orderer.consensus.etcdraft] 2 -> DEBU aa8 Proposed block [2] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:21.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU aac Send of ConsensusRequest for channel businesschannel with payload of size 22866 to orderer2.example.com(orderer2.example.com:7050) took 129.1µs " +orderer0.example.com | "2019-05-02 09:27:21.836 UTC [orderer.common.cluster.step] handleMessage -> DEBU aad Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:21.837 UTC [orderer.common.cluster.step] handleMessage -> DEBU aae Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:21.837 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aaf Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-05-02 09:27:21.837 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ab0 Sending msg of 28 bytes to 3 on channel businesschannel took 7.2µs" +orderer0.example.com | "2019-05-02 09:27:21.838 UTC [orderer.common.cluster.step] sendMessage -> DEBU ab1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.2µs " +orderer0.example.com | "2019-05-02 09:27:21.838 UTC [orderer.consensus.etcdraft] writeBlock -> INFO ab2 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:21.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU ab3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.2µs " +orderer0.example.com | "2019-05-02 09:27:21.848 UTC [orderer.common.cluster.step] handleMessage -> DEBU ab4 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:21.859 UTC [orderer.common.cluster.step] handleMessage -> DEBU ab5 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:21.839 UTC [common.configtx] addToMap -> DEBU ab6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU ab7 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU ab8 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU ab9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU aba Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.171 UTC [gossip.comm] GossipStream -> DEBU 912 Servicing 172.18.0.5:56896" +peer0.org1.example.com | "2019-05-02 09:27:23.177 UTC [gossip.gossip] handleMessage -> DEBU 913 Entering, 172.18.0.5:56896 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.177 UTC [gossip.gossip] handleMessage -> DEBU 914 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.178 UTC [gossip.discovery] handleMsgFromComm -> DEBU 915 Got message: GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.178 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 916 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:23.178 UTC [msp] DeserializeIdentity -> DEBU 917 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.179 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 918 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 919 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 91a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.179 UTC [policies] Evaluate -> DEBU 91b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.179 UTC [policies] Evaluate -> DEBU 91c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:23.180 UTC [policies] Evaluate -> DEBU 91d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.180 UTC [cauthdsl] func1 -> DEBU 91e 0xc003911640 gate 1556789243180251700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.180 UTC [cauthdsl] func2 -> DEBU 91f 0xc003911640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.180 UTC [cauthdsl] func2 -> DEBU 920 0xc003911640 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.181 UTC [cauthdsl] func2 -> DEBU 921 0xc003911640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:23.181 UTC [cauthdsl] func2 -> DEBU 922 0xc003911640 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.181 UTC [cauthdsl] func1 -> DEBU 923 0xc003911640 gate 1556789243180251700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.181 UTC [policies] Evaluate -> DEBU 924 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.182 UTC [policies] Evaluate -> DEBU 925 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.182 UTC [policies] Evaluate -> DEBU 926 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.182 UTC [cauthdsl] func1 -> DEBU 927 0xc003911e80 gate 1556789243182363400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.182 UTC [cauthdsl] func2 -> DEBU 928 0xc003911e80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.182 UTC [cauthdsl] func2 -> DEBU 929 0xc003911e80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.183 UTC [cauthdsl] func2 -> DEBU 92a 0xc003911e80 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.183 UTC [msp.identity] Verify -> DEBU 92b Verify: digest = 00000000 18 43 a4 a2 92 99 84 99 c1 e5 db 1c cc e5 ba 99 |.C..............| +peer0.org1.example.com | 00000010 70 13 a6 19 5f ce a4 93 ee b0 cc 56 01 24 0e 5f |p..._......V.$._|" +peer0.org1.example.com | "2019-05-02 09:27:23.183 UTC [msp.identity] Verify -> DEBU 92c Verify: sig = 00000000 30 45 02 21 00 d3 cf 39 98 e5 fd 5c 23 9a e6 78 |0E.!...9...\#..x| +peer0.org1.example.com | 00000010 c4 d4 d3 54 63 fb dc 8d b1 06 10 80 da 9e f9 f3 |...Tc...........| +peer0.org1.example.com | 00000020 c0 ae c2 d5 0d 02 20 4d b0 64 ec 8b ec 11 4c 28 |...... M.d....L(| +peer0.org1.example.com | 00000030 25 b8 3c ab 18 5f e5 a7 2b 53 88 82 89 6a fd 6e |%.<.._..+S...j.n| +peer0.org1.example.com | 00000040 c6 81 84 3e 98 26 fb |...>.&.|" +peer0.org1.example.com | "2019-05-02 09:27:23.183 UTC [cauthdsl] func2 -> DEBU 92d 0xc003911e80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [cauthdsl] func1 -> DEBU 92e 0xc003911e80 gate 1556789243182363400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 92f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:21.860 UTC [common.configtx] addToMap -> DEBU abb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.860 UTC [common.configtx] addToMap -> DEBU abc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.866 UTC [common.configtx] addToMap -> DEBU abd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU abe Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU abf Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac0 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac1 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac2 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.868 UTC [common.configtx] verifyDeltaSet -> DEBU ac7 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.868 UTC [common.configtx] verifyDeltaSet -> DEBU ac8 Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.868 UTC [common.configtx] policyForItem -> DEBU ac9 Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU aca Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acb Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acc Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acd Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU ace Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acf Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU ad0 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-05-02 09:27:21.869 UTC [policies] Manager -> DEBU ad1 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.869 UTC [policies] Manager -> DEBU ad2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.869 UTC [policies] Manager -> DEBU ad3 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-05-02 09:27:21.869 UTC [policies] Evaluate -> DEBU ad4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:27:21.869 UTC [cauthdsl] func1 -> DEBU ad5 0xc00104c7f0 gate 1556789241869584500 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:21.869 UTC [cauthdsl] func2 -> DEBU ad6 0xc00104c7f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:21.869 UTC [cauthdsl] func2 -> DEBU ad7 0xc00104c7f0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:21.869 UTC [cauthdsl] func2 -> DEBU ad8 0xc00104c7f0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:21.869 UTC [msp.identity] Verify -> DEBU ad9 Verify: digest = 00000000 30 66 a6 63 f0 f2 5c 8b cc 30 97 57 cc 96 e6 ed |0f.c..\..0.W....| +orderer0.example.com | 00000010 ee 9d 29 cb 9e b5 de 97 29 52 7a 5e 61 16 79 e8 |..).....)Rz^a.y.|" +orderer0.example.com | "2019-05-02 09:27:21.870 UTC [msp.identity] Verify -> DEBU ada Verify: sig = 00000000 30 45 02 21 00 a7 41 a5 d2 f7 c5 ff ec 5e 7f 6c |0E.!..A......^.l| +orderer0.example.com | 00000010 71 c9 ae 59 aa ec 85 dd 94 0c 54 cf 58 8b 8e 8c |q..Y......T.X...| +orderer0.example.com | 00000020 3a b9 3d 56 43 02 20 01 e7 16 fb f9 76 cf ae de |:.=VC. .....v...| +orderer0.example.com | 00000030 49 88 9b 17 52 e6 8f c3 fa dc 64 50 b3 87 99 97 |I...R.....dP....| +orderer0.example.com | 00000040 11 08 49 2b 8c 95 fc |..I+...|" +orderer0.example.com | "2019-05-02 09:27:21.871 UTC [cauthdsl] func2 -> DEBU adb 0xc00104c7f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:21.871 UTC [cauthdsl] func1 -> DEBU adc 0xc00104c7f0 gate 1556789241869584500 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:21.871 UTC [policies] Evaluate -> DEBU add Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.871 UTC [policies] Evaluate -> DEBU ade == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.873 UTC [common.configtx] recurseConfigMap -> DEBU adf Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae1 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae2 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae3 Setting policy for key Readers to " +orderer0.example.com | "2019-05-02 09:27:21.877 UTC [common.configtx] recurseConfigMap -> DEBU ae4 Setting policy for key Writers to " +orderer0.example.com | "2019-05-02 09:27:21.878 UTC [common.configtx] recurseConfigMap -> DEBU ae5 Setting policy for key Admins to " +orderer0.example.com | "2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae6 Setting policy for key Endorsement to " +orderer0.example.com | "2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae7 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae8 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae9 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU aea Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.883 UTC [common.configtx] recurseConfigMap -> DEBU aeb Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 930 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 931 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 932 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 933 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.185 UTC [gossip.discovery] learnNewMembers -> DEBU 934 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-05-02 09:27:23.186 UTC [gossip.discovery] learnNewMembers -> DEBU 935 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.186 UTC [gossip.discovery] learnNewMembers -> DEBU 936 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 937 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 938 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.188 UTC [gossip.discovery] sendMemResponse -> DEBU 939 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:23.189 UTC [msp] DeserializeIdentity -> DEBU 93a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.189 UTC [msp] DeserializeIdentity -> DEBU 93b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.189 UTC [msp] DeserializeIdentity -> DEBU 93c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.190 UTC [gossip.comm] Send -> DEBU 93d Entering, sending GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:23.190 UTC [gossip.discovery] sendMemResponse -> DEBU 93e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:23.191 UTC [gossip.comm] sendToEndpoint -> DEBU 93f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.192 UTC [gossip.comm] sendToEndpoint -> DEBU 940 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.234 UTC [comm.grpc.server] 1 -> INFO 941 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.234Z grpc.peer_address=172.18.0.5:56898 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=184.2µs +peer0.org1.example.com | "2019-05-02 09:27:23.237 UTC [msp.identity] Sign -> DEBU 942 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:23.237 UTC [msp.identity] Sign -> DEBU 943 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:23.238 UTC [gossip.comm] authenticateRemotePeer -> DEBU 944 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:56898" +peer0.org1.example.com | "2019-05-02 09:27:23.239 UTC [gossip.comm] authenticateRemotePeer -> DEBU 945 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:56898" +peer0.org1.example.com | "2019-05-02 09:27:23.239 UTC [msp] DeserializeIdentity -> DEBU 946 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.240 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 947 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.240 UTC [msp] DeserializeIdentity -> DEBU 948 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.241 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 949 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.242 UTC [msp] DeserializeIdentity -> DEBU 94a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.242 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 94b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.243 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 94c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.243 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 94d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.244 UTC [policies] Evaluate -> DEBU 94e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.244 UTC [policies] Evaluate -> DEBU 94f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:23.244 UTC [policies] Evaluate -> DEBU 950 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.245 UTC [cauthdsl] func1 -> DEBU 951 0xc00046b810 gate 1556789243245330300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.245 UTC [cauthdsl] func2 -> DEBU 952 0xc00046b810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.246 UTC [cauthdsl] func2 -> DEBU 953 0xc00046b810 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.246 UTC [cauthdsl] func2 -> DEBU 954 0xc00046b810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:23.246 UTC [cauthdsl] func2 -> DEBU 955 0xc00046b810 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [cauthdsl] func1 -> DEBU 956 0xc00046b810 gate 1556789243245330300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [policies] Evaluate -> DEBU 957 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:21.884 UTC [common.configtx] recurseConfigMap -> DEBU aec Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.884 UTC [common.configtx] recurseConfigMap -> DEBU aed Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU aee Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU aef Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU af0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU af1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.886 UTC [common.configtx] recurseConfigMap -> DEBU af2 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.887 UTC [common.configtx] recurseConfigMap -> DEBU af3 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.888 UTC [common.configtx] recurseConfigMap -> DEBU af4 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.888 UTC [common.configtx] recurseConfigMap -> DEBU af5 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:27:21.889 UTC [common.channelconfig] NewStandardValues -> DEBU af6 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:27:21.889 UTC [common.channelconfig] initializeProtosStruct -> DEBU af7 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:21.889 UTC [common.channelconfig] initializeProtosStruct -> DEBU af8 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU af9 Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afa Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afb Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] NewStandardValues -> DEBU afc Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afd Processing field: ACLs" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afe Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] NewStandardValues -> DEBU aff Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU b00 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] NewStandardValues -> DEBU b01 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU b02 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] Validate -> DEBU b03 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-05-02 09:27:21.890 UTC [common.channelconfig] validateMSP -> DEBU b04 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.891 UTC [msp] newBccspMsp -> DEBU b05 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.891 UTC [msp] New -> DEBU b06 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.891 UTC [msp] Setup -> DEBU b07 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.891 UTC [msp.identity] newIdentity -> DEBU b08 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -9886,7 +9148,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.400 UTC [msp.identity] newIdentity -> DEBU b17 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:21.892 UTC [msp.identity] newIdentity -> DEBU b09 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -9900,136 +9162,108 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.402 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b18 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.401 UTC [cauthdsl] func1 -> DEBU b19 0xc000bf13a0 gate 1556760647401225100 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.404 UTC [cauthdsl] func2 -> DEBU b1a 0xc000bf13a0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.404 UTC [cauthdsl] func2 -> DEBU b1b 0xc000bf13a0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.404 UTC [cauthdsl] func2 -> DEBU b1c 0xc000bf13a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -orderer0.example.com | "2019-05-02 01:30:47.403 UTC [msp] Validate -> DEBU b1d MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.406 UTC [cauthdsl] func2 -> DEBU b1e 0xc000bf13a0 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:30:47.406 UTC [cauthdsl] func1 -> DEBU b1f 0xc000bf13a0 gate 1556760647401225100 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:49.759 UTC [gossip.discovery] learnExistingMembers -> DEBU b61 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 " -peer0.org1.example.com | "2019-05-02 01:30:49.759 UTC [gossip.discovery] learnExistingMembers -> DEBU b62 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:49.759 UTC [gossip.discovery] learnExistingMembers -> DEBU b63 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.760 UTC [gossip.discovery] handleAliveMessage -> DEBU b64 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU b65 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU b66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.761 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b67 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:49.764 UTC [msp.identity] Verify -> DEBU b6a Verify: digest = 00000000 3d ea 49 ce 3a fe 6c 43 36 2b 27 54 3b 03 f4 5f |=.I.:.lC6+'T;.._| -peer0.org1.example.com | 00000010 bf b4 59 26 1a cf 32 cd 87 4f 78 b0 d4 07 e0 96 |..Y&..2..Ox.....|" -peer0.org1.example.com | "2019-05-02 01:30:49.764 UTC [msp.identity] Verify -> DEBU b6b Verify: sig = 00000000 30 44 02 20 3e 4c f9 fc d3 81 ec 13 a3 04 1c 01 |0D. >L..........| -peer0.org1.example.com | 00000010 a5 48 7c d3 e2 2d b9 88 48 60 c0 e7 20 43 3b b6 |.H|..-..H`.. C;.| -peer0.org1.example.com | 00000020 92 f6 7a e3 02 20 56 a2 8b 18 a1 04 73 cb 2b 3e |..z.. V.....s.+>| -peer0.org1.example.com | 00000030 e1 f6 52 5b 77 c8 42 59 c4 6f 3a e7 66 c5 41 28 |..R[w.BY.o:.f.A(| -peer0.org1.example.com | 00000040 7f d4 13 16 84 69 |.....i|" -peer0.org1.example.com | "2019-05-02 01:30:49.765 UTC [msp.identity] Verify -> DEBU b6c Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:30:49.763 UTC [gossip.gossip] handleMessage -> DEBU b68 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.763 UTC [gossip.discovery] sendMemResponse -> DEBU b69 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:49.766 UTC [msp.identity] Verify -> DEBU b6d Verify: sig = 00000000 30 45 02 21 00 96 2a c1 1a 1f dc b6 d3 91 88 44 |0E.!..*........D| -peer0.org1.example.com | 00000010 b3 21 5c 2c 32 81 7f b3 53 62 21 3b ae d4 0a 38 |.!\,2...Sb!;...8| -peer0.org1.example.com | 00000020 4d a7 2f 32 d8 02 20 19 d0 60 13 4c fd 2f b4 0f |M./2.. ..`.L./..| -peer0.org1.example.com | 00000030 dc a9 40 33 7c a1 ad c8 d9 00 db 4a 57 8e 54 e6 |..@3|......JW.T.| -peer0.org1.example.com | 00000040 cf 45 2f c1 1a bc 67 |.E/...g|" -peer0.org1.example.com | "2019-05-02 01:30:49.767 UTC [gossip.discovery] handleAliveMessage -> DEBU b70 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.767 UTC [gossip.discovery] isSentByMe -> DEBU b71 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.767 UTC [gossip.discovery] handleAliveMessage -> DEBU b72 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU b73 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.766 UTC [gossip.gossip] handleMessage -> DEBU b6e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13121253355825226892 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.767 UTC [gossip.pull] HandleMessage -> DEBU b74 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13121253355825226892 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.767 UTC [gossip.gossip] handleMessage -> DEBU b75 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.767 UTC [gossip.gossip] handleMessage -> DEBU b76 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.767 UTC [gossip.gossip] handleMessage -> DEBU b77 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU b78 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.767 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b79 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:49.768 UTC [msp.identity] Verify -> DEBU b7a Verify: digest = 00000000 3d ea 49 ce 3a fe 6c 43 36 2b 27 54 3b 03 f4 5f |=.I.:.lC6+'T;.._| -peer0.org1.example.com | 00000010 bf b4 59 26 1a cf 32 cd 87 4f 78 b0 d4 07 e0 96 |..Y&..2..Ox.....|" -peer0.org1.example.com | "2019-05-02 01:30:49.768 UTC [msp.identity] Verify -> DEBU b7b Verify: sig = 00000000 30 44 02 20 3e 4c f9 fc d3 81 ec 13 a3 04 1c 01 |0D. >L..........| -peer0.org1.example.com | 00000010 a5 48 7c d3 e2 2d b9 88 48 60 c0 e7 20 43 3b b6 |.H|..-..H`.. C;.| -peer0.org1.example.com | 00000020 92 f6 7a e3 02 20 56 a2 8b 18 a1 04 73 cb 2b 3e |..z.. V.....s.+>| -peer0.org1.example.com | 00000030 e1 f6 52 5b 77 c8 42 59 c4 6f 3a e7 66 c5 41 28 |..R[w.BY.o:.f.A(| -peer0.org1.example.com | 00000040 7f d4 13 16 84 69 |.....i|" -peer0.org1.example.com | "2019-05-02 01:30:49.768 UTC [gossip.discovery] handleAliveMessage -> DEBU b7c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.768 UTC [gossip.discovery] isSentByMe -> DEBU b7d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.768 UTC [gossip.discovery] handleAliveMessage -> DEBU b7e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.768 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b7f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -orderer0.example.com | "2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b21 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b22 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:47.407 UTC [policies] func1 -> DEBU b23 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -peer0.org1.example.com | "2019-05-02 01:30:49.768 UTC [msp.identity] Verify -> DEBU b80 Verify: digest = 00000000 ce 7f 0e 3b 0c 4e d5 14 5e b2 1b 39 4e 7a d1 5a |...;.N..^..9Nz.Z| -peer0.org1.example.com | 00000010 bb 65 54 1b 08 35 3f 61 39 7d e0 ef b4 ea 07 da |.eT..5?a9}......|" -peer0.org1.example.com | "2019-05-02 01:30:49.768 UTC [msp.identity] Verify -> DEBU b81 Verify: sig = 00000000 30 44 02 20 17 71 33 ee 63 80 6c a0 1e a4 16 7c |0D. .q3.c.l....|| -peer0.org1.example.com | 00000010 07 95 98 db 11 4a fd 91 8f e8 eb 62 c0 e4 c9 04 |.....J.....b....| -peer0.org1.example.com | 00000020 c8 d2 29 2b 02 20 79 99 52 cf 5d af b4 48 f8 38 |..)+. y.R.]..H.8| -peer0.org1.example.com | 00000030 57 0a 3b 14 71 1c ef b8 87 72 67 56 f3 0c 1f 56 |W.;.q....rgV...V| -peer0.org1.example.com | 00000040 14 52 01 9d 9f 49 |.R...I|" -peer0.org1.example.com | "2019-05-02 01:30:49.768 UTC [gossip.discovery] handleAliveMessage -> DEBU b82 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.766 UTC [msp] DeserializeIdentity -> DEBU b6f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.774 UTC [msp] DeserializeIdentity -> DEBU b83 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.774 UTC [msp] DeserializeIdentity -> DEBU b84 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.775 UTC [gossip.comm] Send -> DEBU b85 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:49.776 UTC [gossip.discovery] sendMemResponse -> DEBU b86 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:49.776 UTC [gossip.comm] sendToEndpoint -> DEBU b87 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.777 UTC [gossip.comm] sendToEndpoint -> DEBU b88 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.769 UTC [gossip.discovery] handleAliveMessage -> DEBU b89 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.779 UTC [gossip.discovery] handleMsgFromComm -> DEBU b8a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.784 UTC [gossip.comm] func1 -> DEBU b8b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17096223391310539901 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.784 UTC [gossip.comm] func1 -> DEBU b8c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.785 UTC [gossip.comm] func1 -> DEBU b8d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.785 UTC [gossip.gossip] handleMessage -> DEBU b8e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17096223391310539901 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.786 UTC [gossip.pull] HandleMessage -> DEBU b8f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17096223391310539901 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.786 UTC [gossip.gossip] handleMessage -> DEBU b90 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.786 UTC [gossip.gossip] handleMessage -> DEBU b91 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.787 UTC [gossip.pull] HandleMessage -> DEBU b92 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.787 UTC [msp] DeserializeIdentity -> DEBU b93 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.788 UTC [msp] DeserializeIdentity -> DEBU b94 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.788 UTC [gossip.pull] SendDigest -> DEBU b95 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:30:49.788 UTC [gossip.gossip] handleMessage -> DEBU b96 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.789 UTC [gossip.gossip] handleMessage -> DEBU b97 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.789 UTC [gossip.gossip] handleMessage -> DEBU b98 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.789 UTC [gossip.discovery] handleMsgFromComm -> DEBU b99 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.790 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b9a Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:49.790 UTC [msp] DeserializeIdentity -> DEBU b9b Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b24 Signature set did not satisfy policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b25 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b26 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b27 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b28 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.407 UTC [cauthdsl] func1 -> DEBU b29 0xc0009229d0 gate 1556760647407944500 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.408 UTC [cauthdsl] func2 -> DEBU b2a 0xc0009229d0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.408 UTC [cauthdsl] func2 -> DEBU b2b 0xc0009229d0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.408 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b2c Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.407 UTC [msp] getCertificationChain -> DEBU b20 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.409 UTC [msp] hasOURole -> DEBU b2e MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:30:47.409 UTC [msp] getCertificationChain -> DEBU b2f MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.410 UTC [common.channelconfig] NewStandardValues -> DEBU b30 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:30:47.408 UTC [msp] Validate -> DEBU b2d MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.416 UTC [msp] getCertificationChain -> DEBU b31 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.420 UTC [cauthdsl] func2 -> DEBU b32 0xc0009229d0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:47.420 UTC [msp.identity] Verify -> DEBU b33 Verify: digest = 00000000 7c 7a ed 35 86 0f 34 87 51 98 60 f1 d9 93 38 6f ||z.5..4.Q.`...8o| -orderer0.example.com | 00000010 9f 37 a4 52 89 2b f2 79 8a c9 80 63 e2 73 5f 82 |.7.R.+.y...c.s_.|" -orderer0.example.com | "2019-05-02 01:30:47.420 UTC [msp.identity] Verify -> DEBU b34 Verify: sig = 00000000 30 44 02 20 00 b9 4b ec d5 9c bb 15 46 17 08 94 |0D. ..K.....F...| -orderer0.example.com | 00000010 16 69 a1 e9 ce 7d ed 29 d3 72 2e de 98 9a ff a5 |.i...}.).r......| -orderer0.example.com | 00000020 ce 04 5e 8d 02 20 04 31 6b d0 ef 45 61 23 82 ce |..^.. .1k..Ea#..| -orderer0.example.com | 00000030 47 e2 a7 ec 34 90 1b f7 bf 91 86 e3 73 93 bf 0f |G...4.......s...| -orderer0.example.com | 00000040 69 ad df e2 47 71 |i...Gq|" -orderer0.example.com | "2019-05-02 01:30:47.421 UTC [cauthdsl] func2 -> DEBU b35 0xc0009229d0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:47.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU b36 Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:30:47.423 UTC [common.channelconfig] initializeProtosStruct -> DEBU b37 Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:30:47.424 UTC [common.channelconfig] initializeProtosStruct -> DEBU b38 Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:47.425 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3a Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:30:47.425 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3b Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:47.425 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3c Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.425 UTC [common.channelconfig] NewStandardValues -> DEBU b3d Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:30:47.425 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3e Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:30:47.426 UTC [common.channelconfig] NewStandardValues -> DEBU b3f Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:30:47.426 UTC [common.channelconfig] initializeProtosStruct -> DEBU b40 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:30:47.427 UTC [common.channelconfig] validateMSP -> DEBU b41 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:47.421 UTC [cauthdsl] func1 -> DEBU b39 0xc0009229d0 gate 1556760647407944500 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:47.427 UTC [msp] newBccspMsp -> DEBU b42 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.428 UTC [msp] New -> DEBU b44 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:30:47.428 UTC [msp] Setup -> DEBU b45 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:30:47.428 UTC [msp.identity] newIdentity -> DEBU b46 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:21.893 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b0a Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.893 UTC [msp] Validate -> DEBU b0b MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:21.893 UTC [msp] getCertificationChain -> DEBU b0c MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:21.894 UTC [msp] hasOURole -> DEBU b0d MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:21.894 UTC [msp] getCertificationChain -> DEBU b0e MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:21.894 UTC [common.channelconfig] NewStandardValues -> DEBU b0f Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:27:21.894 UTC [common.channelconfig] initializeProtosStruct -> DEBU b10 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.894 UTC [common.channelconfig] NewStandardValues -> DEBU b11 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:21.894 UTC [common.channelconfig] initializeProtosStruct -> DEBU b12 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:21.895 UTC [common.channelconfig] Validate -> DEBU b13 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-05-02 09:27:21.895 UTC [common.channelconfig] validateMSP -> DEBU b14 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.895 UTC [msp] newBccspMsp -> DEBU b15 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [policies] Evaluate -> DEBU 958 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [policies] Evaluate -> DEBU 959 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [cauthdsl] func1 -> DEBU 95a 0xc0004380d0 gate 1556789243247680500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.247 UTC [cauthdsl] func2 -> DEBU 95b 0xc0004380d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.248 UTC [cauthdsl] func2 -> DEBU 95c 0xc0004380d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.248 UTC [cauthdsl] func2 -> DEBU 95d 0xc0004380d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.248 UTC [msp.identity] Verify -> DEBU 95e Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-05-02 09:27:23.248 UTC [msp.identity] Verify -> DEBU 95f Verify: sig = 00000000 30 44 02 20 6c 28 c2 10 7e 10 c4 a0 a0 9f e9 3f |0D. l(..~......?| +peer0.org1.example.com | 00000010 44 d8 cf 24 c8 fd 6a 7e 75 f0 ac 18 76 18 2f 52 |D..$..j~u...v./R| +peer0.org1.example.com | 00000020 6b ca 05 e2 02 20 62 ed 9e 52 e4 f7 97 c1 43 a1 |k.... b..R....C.| +peer0.org1.example.com | 00000030 30 41 52 28 85 e8 dc da c4 71 90 1f c8 e3 db 58 |0AR(.....q.....X| +peer0.org1.example.com | 00000040 4e d6 fe 85 06 de |N.....|" +peer0.org1.example.com | "2019-05-02 09:27:23.249 UTC [cauthdsl] func2 -> DEBU 960 0xc0004380d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.249 UTC [cauthdsl] func1 -> DEBU 961 0xc0004380d0 gate 1556789243247680500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:23.249 UTC [policies] Evaluate -> DEBU 962 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.250 UTC [policies] Evaluate -> DEBU 963 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.250 UTC [policies] Evaluate -> DEBU 964 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.250 UTC [policies] Evaluate -> DEBU 965 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.250 UTC [gossip.comm] authenticateRemotePeer -> DEBU 966 Authenticated 172.18.0.5:56898" +peer0.org1.example.com | "2019-05-02 09:27:23.251 UTC [gossip.comm] GossipStream -> DEBU 967 Servicing 172.18.0.5:56898" +peer0.org1.example.com | "2019-05-02 09:27:23.251 UTC [gossip.comm] serviceConnection -> DEBU 968 Closing reading from stream" +peer0.org1.example.com | "2019-05-02 09:27:23.252 UTC [gossip.comm] func2 -> DEBU 969 Client 172.18.0.5:56896 disconnected" +peer0.org1.example.com | "2019-05-02 09:27:23.252 UTC [comm.grpc.server] 1 -> INFO 96a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:56896 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=99.9432ms +peer0.org1.example.com | "2019-05-02 09:27:23.252 UTC [gossip.comm] serviceConnection -> DEBU 96c Closing reading from stream" +peer0.org1.example.com | "2019-05-02 09:27:23.253 UTC [gossip.comm] func2 -> DEBU 96d Client 172.18.0.5:56898 disconnected" +peer0.org1.example.com | "2019-05-02 09:27:23.253 UTC [comm.grpc.server] 1 -> INFO 96e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:33.236Z grpc.peer_address=172.18.0.5:56898 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=16.8045ms +peer0.org1.example.com | "2019-05-02 09:27:23.253 UTC [gossip.comm] readFromStream -> DEBU 96f 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +peer0.org1.example.com | "2019-05-02 09:27:23.252 UTC [gossip.comm] writeToStream -> DEBU 96b Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:27:23.254 UTC [gossip.comm] writeToStream -> DEBU 970 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:27:23.254 UTC [gossip.comm] readFromStream -> DEBU 971 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +peer0.org1.example.com | "2019-05-02 09:27:23.259 UTC [grpc] infof -> DEBU 972 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:23.259 UTC [grpc] infof -> DEBU 973 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:23.855 UTC [gossip.gossip] handleMessage -> DEBU 974 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.855 UTC [gossip.gossip] handleMessage -> DEBU 975 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 976 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.856 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 977 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:23.856 UTC [msp] DeserializeIdentity -> DEBU 978 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:21.895 UTC [msp] New -> DEBU b16 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.895 UTC [msp] Setup -> DEBU b17 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.895 UTC [msp.identity] newIdentity -> DEBU b18 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:21.896 UTC [msp.identity] newIdentity -> DEBU b19 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:27:21.896 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b1a Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.896 UTC [msp] Validate -> DEBU b1b MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:21.896 UTC [msp] getCertificationChain -> DEBU b1c MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:21.897 UTC [msp] hasOURole -> DEBU b1d MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:27:21.897 UTC [msp] getCertificationChain -> DEBU b1e MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] NewStandardValues -> DEBU b1f Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b20 Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b21 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b22 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b23 Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b24 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b25 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.897 UTC [common.channelconfig] NewStandardValues -> DEBU b26 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:27:21.898 UTC [common.channelconfig] initializeProtosStruct -> DEBU b27 Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:27:21.898 UTC [common.channelconfig] NewStandardValues -> DEBU b28 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:27:21.898 UTC [common.channelconfig] initializeProtosStruct -> DEBU b29 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:27:21.898 UTC [common.channelconfig] validateMSP -> DEBU b2a Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.898 UTC [msp] newBccspMsp -> DEBU b2b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.898 UTC [msp] New -> DEBU b2c Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:27:21.898 UTC [msp] Setup -> DEBU b2d Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:21.898 UTC [msp.identity] newIdentity -> DEBU b2e Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -10043,8 +9277,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.427 UTC [policies] Evaluate -> DEBU b43 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.429 UTC [msp.identity] newIdentity -> DEBU b47 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:21.899 UTC [msp.identity] newIdentity -> DEBU b2f Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -10057,367 +9290,278 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.430 UTC [msp] Validate -> DEBU b49 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.429 UTC [policies] Evaluate -> DEBU b48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.433 UTC [msp] Setup -> DEBU b4a Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-05-02 01:30:47.434 UTC [msp] Setup -> DEBU b4b MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-05-02 01:30:47.434 UTC [policies] NewManagerImpl -> DEBU b4c Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:47.434 UTC [policies] NewManagerImpl -> DEBU b4d Proposed new policy Readers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:30:49.790 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b9c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:49.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b9d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.791 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b9e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.791 UTC [policies] Evaluate -> DEBU b9f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.791 UTC [policies] Evaluate -> DEBU ba0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:49.791 UTC [policies] Evaluate -> DEBU ba1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.791 UTC [cauthdsl] func1 -> DEBU ba2 0xc0033000d0 gate 1556760649791877900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:49.793 UTC [cauthdsl] func2 -> DEBU ba3 0xc0033000d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:49.793 UTC [cauthdsl] func2 -> DEBU ba4 0xc0033000d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:49.794 UTC [cauthdsl] func2 -> DEBU ba5 0xc0033000d0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.794 UTC [msp.identity] Verify -> DEBU ba6 Verify: digest = 00000000 fc 3b 4f 07 ee 02 6e 6d 28 dd 29 36 16 e5 38 9b |.;O...nm(.)6..8.| -peer0.org1.example.com | 00000010 59 12 bd 4a 3a f4 ca 66 a0 81 63 b4 ad 75 53 96 |Y..J:..f..c..uS.|" -peer0.org1.example.com | "2019-05-02 01:30:49.794 UTC [msp.identity] Verify -> DEBU ba7 Verify: sig = 00000000 30 45 02 21 00 84 bd 8b 1b ab 55 39 60 42 e3 b1 |0E.!......U9`B..| -peer0.org1.example.com | 00000010 00 86 57 a7 76 5b 90 19 81 3c 48 f8 a2 f6 73 25 |..W.v[... DEBU ba8 0xc0033000d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.795 UTC [cauthdsl] func1 -> DEBU ba9 0xc0033000d0 gate 1556760649791877900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:49.795 UTC [policies] Evaluate -> DEBU baa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.797 UTC [policies] Evaluate -> DEBU bab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.798 UTC [policies] Evaluate -> DEBU bac Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.798 UTC [policies] Evaluate -> DEBU bad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.798 UTC [gossip.discovery] handleAliveMessage -> DEBU bae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.799 UTC [gossip.discovery] handleAliveMessage -> DEBU baf Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.800 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bb0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:49.803 UTC [msp.identity] Verify -> DEBU bb1 Verify: digest = 00000000 3d ea 49 ce 3a fe 6c 43 36 2b 27 54 3b 03 f4 5f |=.I.:.lC6+'T;.._| -peer0.org1.example.com | 00000010 bf b4 59 26 1a cf 32 cd 87 4f 78 b0 d4 07 e0 96 |..Y&..2..Ox.....|" -peer0.org1.example.com | "2019-05-02 01:30:49.804 UTC [msp.identity] Verify -> DEBU bb2 Verify: sig = 00000000 30 44 02 20 3e 4c f9 fc d3 81 ec 13 a3 04 1c 01 |0D. >L..........| -peer0.org1.example.com | 00000010 a5 48 7c d3 e2 2d b9 88 48 60 c0 e7 20 43 3b b6 |.H|..-..H`.. C;.| -peer0.org1.example.com | 00000020 92 f6 7a e3 02 20 56 a2 8b 18 a1 04 73 cb 2b 3e |..z.. V.....s.+>| -peer0.org1.example.com | 00000030 e1 f6 52 5b 77 c8 42 59 c4 6f 3a e7 66 c5 41 28 |..R[w.BY.o:.f.A(| -peer0.org1.example.com | 00000040 7f d4 13 16 84 69 |.....i|" -peer0.org1.example.com | "2019-05-02 01:30:49.805 UTC [gossip.discovery] handleAliveMessage -> DEBU bb3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.805 UTC [gossip.discovery] isSentByMe -> DEBU bb4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.806 UTC [gossip.discovery] handleAliveMessage -> DEBU bb5 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.806 UTC [gossip.discovery] handleMsgFromComm -> DEBU bb6 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.814 UTC [gossip.comm] func1 -> DEBU bb7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.814 UTC [gossip.gossip] handleMessage -> DEBU bb8 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.815 UTC [gossip.gossip] handleMessage -> DEBU bb9 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.815 UTC [gossip.discovery] handleMsgFromComm -> DEBU bba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.816 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bbb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:30:49.816 UTC [msp] DeserializeIdentity -> DEBU bbc Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.433 UTC [policies] Evaluate -> DEBU b4e Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:47.438 UTC [policies] Evaluate -> DEBU b4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:47.437 UTC [policies] NewManagerImpl -> DEBU b50 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:47.441 UTC [policies] NewManagerImpl -> DEBU b51 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:47.441 UTC [policies] NewManagerImpl -> DEBU b52 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:47.442 UTC [policies] NewManagerImpl -> DEBU b53 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:47.442 UTC [policies] NewManagerImpl -> DEBU b55 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:47.441 UTC [policies] Evaluate -> DEBU b54 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:47.443 UTC [policies] Evaluate -> DEBU b57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:47.443 UTC [common.deliver] deliverBlocks -> DEBU b58 [channel: businesschannel] Received seekInfo (0xc0008bfb80) start: > stop: > from 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:30:47.443 UTC [fsblkstorage] Next -> DEBU b59 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:30:47.443 UTC [fsblkstorage] newBlockfileStream -> DEBU b5a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" -orderer0.example.com | "2019-05-02 01:30:47.444 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU b5b Remaining bytes=[23686], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:47.444 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU b5c Returning blockbytes - length=[23683], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" -orderer0.example.com | "2019-05-02 01:30:47.444 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU b5d blockbytes [23683] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:47.444 UTC [common.deliver] deliverBlocks -> DEBU b5e [channel: businesschannel] Delivering block [1] for (0xc0008bfb80) for 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:30:47.442 UTC [policies] NewManagerImpl -> DEBU b56 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.445 UTC [policies] NewManagerImpl -> DEBU b5f Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.445 UTC [policies] NewManagerImpl -> DEBU b60 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.445 UTC [policies] NewManagerImpl -> DEBU b61 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.445 UTC [policies] NewManagerImpl -> DEBU b62 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.446 UTC [policies] NewManagerImpl -> DEBU b63 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.446 UTC [policies] NewManagerImpl -> DEBU b64 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.446 UTC [policies] NewManagerImpl -> DEBU b65 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.446 UTC [policies] NewManagerImpl -> DEBU b67 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.461 UTC [policies] NewManagerImpl -> DEBU b68 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.446 UTC [fsblkstorage] waitForBlock -> DEBU b66 Going to wait for newer blocks. maxAvailaBlockNumber=[1], waitForBlockNum=[2]" -orderer0.example.com | "2019-05-02 01:30:47.462 UTC [policies] NewManagerImpl -> DEBU b69 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.463 UTC [policies] NewManagerImpl -> DEBU b6a Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.468 UTC [policies] NewManagerImpl -> DEBU b6b Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.469 UTC [policies] NewManagerImpl -> DEBU b6c Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:30:47.469 UTC [policies] NewManagerImpl -> DEBU b6d Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:30:47.469 UTC [policies] NewManagerImpl -> DEBU b6e Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b6f Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b70 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b71 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b72 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b73 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b74 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:47.488 UTC [common.configtx] addToMap -> DEBU b75 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.489 UTC [common.configtx] addToMap -> DEBU b76 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:47.496 UTC [common.configtx] addToMap -> DEBU b77 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.498 UTC [common.configtx] addToMap -> DEBU b78 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.499 UTC [common.configtx] addToMap -> DEBU b79 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:30:47.500 UTC [common.configtx] addToMap -> DEBU b7a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:30:47.500 UTC [common.configtx] addToMap -> DEBU b7b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:47.503 UTC [common.configtx] addToMap -> DEBU b7c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:30:47.503 UTC [common.configtx] addToMap -> DEBU b7d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:30:47.504 UTC [common.configtx] addToMap -> DEBU b7e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.504 UTC [common.configtx] addToMap -> DEBU b7f Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:30:47.505 UTC [common.configtx] addToMap -> DEBU b80 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.505 UTC [common.configtx] addToMap -> DEBU b81 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:30:47.509 UTC [common.configtx] addToMap -> DEBU b82 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:30:47.510 UTC [common.configtx] addToMap -> DEBU b83 Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:49.817 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bbd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:49.817 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bbe Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.817 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bbf Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:49.817 UTC [policies] Evaluate -> DEBU bc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.817 UTC [policies] Evaluate -> DEBU bc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:49.818 UTC [policies] Evaluate -> DEBU bc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:49.818 UTC [cauthdsl] func1 -> DEBU bc3 0xc003342f00 gate 1556760649818292400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:49.818 UTC [cauthdsl] func2 -> DEBU bc4 0xc003342f00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:49.818 UTC [cauthdsl] func2 -> DEBU bc5 0xc003342f00 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:49.818 UTC [cauthdsl] func2 -> DEBU bc6 0xc003342f00 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.819 UTC [msp.identity] Verify -> DEBU bc7 Verify: digest = 00000000 97 9f 5f 46 d8 5e e1 9e 97 d2 5b 9f cc be 2e 45 |.._F.^....[....E| -peer0.org1.example.com | 00000010 11 e7 35 4d dd 77 5b df 72 5c f2 2d b5 b9 d2 0e |..5M.w[.r\.-....|" -peer0.org1.example.com | "2019-05-02 01:30:49.819 UTC [msp.identity] Verify -> DEBU bc8 Verify: sig = 00000000 30 45 02 21 00 91 91 e2 0a b0 06 af d2 75 ee 90 |0E.!.........u..| -peer0.org1.example.com | 00000010 ad f4 d4 f0 f8 88 65 ea 10 b7 50 92 39 9c c5 e1 |......e...P.9...| -peer0.org1.example.com | 00000020 32 88 af de a5 02 20 0e 8c 65 b2 37 e8 33 a2 02 |2..... ..e.7.3..| -peer0.org1.example.com | 00000030 ce 04 00 3a a8 65 c5 a6 03 6d 45 97 1f 96 25 90 |...:.e...mE...%.| -peer0.org1.example.com | 00000040 70 fb 20 28 44 4e 5e |p. (DN^|" -peer0.org1.example.com | "2019-05-02 01:30:49.819 UTC [cauthdsl] func2 -> DEBU bc9 0xc003342f00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:49.819 UTC [cauthdsl] func1 -> DEBU bca 0xc003342f00 gate 1556760649818292400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:49.819 UTC [policies] Evaluate -> DEBU bcb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.819 UTC [policies] Evaluate -> DEBU bcc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.820 UTC [policies] Evaluate -> DEBU bcd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.820 UTC [policies] Evaluate -> DEBU bce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:49.820 UTC [gossip.discovery] handleAliveMessage -> DEBU bcf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.820 UTC [gossip.discovery] learnExistingMembers -> DEBU bd0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:49.820 UTC [gossip.discovery] learnExistingMembers -> DEBU bd1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 " -peer0.org1.example.com | "2019-05-02 01:30:49.820 UTC [gossip.discovery] learnExistingMembers -> DEBU bd2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 " -peer0.org1.example.com | "2019-05-02 01:30:49.821 UTC [gossip.discovery] learnExistingMembers -> DEBU bd3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:49.821 UTC [gossip.discovery] learnExistingMembers -> DEBU bd4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.821 UTC [gossip.discovery] handleAliveMessage -> DEBU bd5 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU bd6 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:49.822 UTC [gossip.discovery] sendMemResponse -> DEBU bd7 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:30:49.822 UTC [msp] DeserializeIdentity -> DEBU bd8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.822 UTC [msp] DeserializeIdentity -> DEBU bd9 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.510 UTC [common.configtx] addToMap -> DEBU b84 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:47.510 UTC [common.configtx] addToMap -> DEBU b85 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:47.511 UTC [common.configtx] addToMap -> DEBU b86 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:30:47.512 UTC [common.configtx] addToMap -> DEBU b87 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:47.512 UTC [common.configtx] addToMap -> DEBU b88 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:30:47.512 UTC [common.configtx] addToMap -> DEBU b89 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:30:47.512 UTC [common.configtx] addToMap -> DEBU b8a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:30:47.512 UTC [common.configtx] addToMap -> DEBU b8b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:47.513 UTC [common.configtx] addToMap -> DEBU b8c Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:30:47.513 UTC [common.configtx] addToMap -> DEBU b8d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:30:47.513 UTC [common.configtx] addToMap -> DEBU b8e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:30:47.513 UTC [common.configtx] addToMap -> DEBU b8f Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.514 UTC [common.configtx] addToMap -> DEBU b90 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:30:47.514 UTC [common.configtx] addToMap -> DEBU b91 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:47.514 UTC [common.configtx] addToMap -> DEBU b92 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:30:47.514 UTC [common.configtx] addToMap -> DEBU b93 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:30:47.515 UTC [common.configtx] addToMap -> DEBU b94 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:30:47.515 UTC [common.configtx] addToMap -> DEBU b95 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:30:47.515 UTC [common.configtx] addToMap -> DEBU b96 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:30:47.515 UTC [common.configtx] addToMap -> DEBU b97 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:30:47.516 UTC [common.configtx] addToMap -> DEBU b98 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:30:47.516 UTC [common.configtx] addToMap -> DEBU b99 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:30:47.516 UTC [common.configtx] addToMap -> DEBU b9a Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:47.516 UTC [common.configtx] addToMap -> DEBU b9b Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:30:47.516 UTC [common.configtx] addToMap -> DEBU b9c Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:47.517 UTC [common.channelconfig] LogSanityChecks -> DEBU b9d As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-05-02 01:30:47.517 UTC [common.channelconfig] LogSanityChecks -> DEBU b9e As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-05-02 01:30:47.517 UTC [policies] Manager -> DEBU b9f Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:30:47.517 UTC [policies] Manager -> DEBU ba0 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:47.517 UTC [policies] Manager -> DEBU ba1 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:47.518 UTC [policies] Manager -> DEBU ba2 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:30:47.518 UTC [policies] Manager -> DEBU ba3 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.518 UTC [policies] Manager -> DEBU ba4 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:30:47.518 UTC [common.channelconfig] LogSanityChecks -> DEBU ba5 As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-05-02 01:30:47.518 UTC [common.channelconfig] LogSanityChecks -> DEBU ba6 As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-05-02 01:30:47.519 UTC [common.channelconfig] LogSanityChecks -> DEBU ba7 As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-05-02 01:30:47.519 UTC [policies] Manager -> DEBU ba8 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-05-02 01:30:47.519 UTC [policies] Manager -> DEBU ba9 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:30:47.519 UTC [policies] Manager -> DEBU baa Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:30:47.519 UTC [policies] Manager -> DEBU bab Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-05-02 01:30:47.520 UTC [policies] Manager -> DEBU bac Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-05-02 01:30:47.520 UTC [common.channelconfig] LogSanityChecks -> DEBU bad As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-05-02 01:30:47.520 UTC [common.capabilities] Supported -> DEBU bae Orderer capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:47.520 UTC [common.capabilities] Supported -> DEBU baf Channel capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:30:47.520 UTC [orderer.common.server] func1 -> DEBU bb0 Executing callback to update root CAs" -orderer0.example.com | "2019-05-02 01:30:47.520 UTC [orderer.common.server] updateTrustedRoots -> DEBU bb1 updating root CAs for channel [businesschannel]" -orderer0.example.com | "2019-05-02 01:30:47.520 UTC [orderer.common.server] updateTrustedRoots -> DEBU bb2 adding app root CAs for MSP [Org2MSP]" -orderer0.example.com | "2019-05-02 01:30:47.521 UTC [orderer.common.server] updateTrustedRoots -> DEBU bb3 adding app root CAs for MSP [Org1MSP]" -orderer0.example.com | "2019-05-02 01:30:47.522 UTC [orderer.common.server] updateTrustedRoots -> DEBU bb4 adding orderer root CAs for MSP [OrdererMSP]" -orderer0.example.com | "2019-05-02 01:30:47.523 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU bb5 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" -orderer0.example.com | "2019-05-02 01:30:47.524 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU bb6 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-05-02 01:30:47.524 UTC [msp.identity] Sign -> DEBU bb7 Sign: plaintext: 0A020802120B0A090A03010203100418...5DEE28494FB27FD0EAD443509103CCCC " -orderer0.example.com | "2019-05-02 01:30:47.524 UTC [msp.identity] Sign -> DEBU bb8 Sign: digest: BB436F1B1B45FEF3826B4DCC777220AC1DF298A84C2BE2EF7E46175E4C597CA3 " -orderer0.example.com | "2019-05-02 01:30:47.534 UTC [fsblkstorage] indexBlock -> DEBU bb9 Indexing block [blockNum=2, blockHash=[]byte{0x10, 0xa6, 0x73, 0x2, 0x98, 0xd8, 0x5d, 0x96, 0xae, 0x3a, 0x57, 0x2b, 0xde, 0xb5, 0xd3, 0x7f, 0x2e, 0x75, 0xc3, 0x9b, 0xc3, 0x8a, 0xd3, 0xa3, 0x6d, 0xe6, 0x7c, 0xa8, 0x8e, 0x95, 0x7a, 0xb} txOffsets= -orderer0.example.com | txId= locPointer=offset=71, bytesLength=22736 +orderer0.example.com | "2019-05-02 09:27:21.899 UTC [msp] Validate -> DEBU b30 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:21.899 UTC [msp] Setup -> DEBU b31 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-05-02 09:27:21.899 UTC [msp] Setup -> DEBU b32 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b33 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:23.856 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 979 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.856 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 97a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.856 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 97b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [policies] Evaluate -> DEBU 97c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [policies] Evaluate -> DEBU 97d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [policies] Evaluate -> DEBU 97e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [cauthdsl] func1 -> DEBU 97f 0xc0003ce500 gate 1556789243857472100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [cauthdsl] func2 -> DEBU 980 0xc0003ce500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.857 UTC [cauthdsl] func2 -> DEBU 981 0xc0003ce500 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [cauthdsl] func2 -> DEBU 982 0xc0003ce500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [cauthdsl] func2 -> DEBU 983 0xc0003ce500 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [cauthdsl] func1 -> DEBU 984 0xc0003ce500 gate 1556789243857472100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [policies] Evaluate -> DEBU 985 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [policies] Evaluate -> DEBU 986 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.858 UTC [policies] Evaluate -> DEBU 987 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [cauthdsl] func1 -> DEBU 988 0xc0003ced40 gate 1556789243859073700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 989 0xc0003ced40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 98a 0xc0003ced40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 98b 0xc0003ced40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [msp.identity] Verify -> DEBU 98c Verify: digest = 00000000 8a 79 7c 8e a1 c8 89 ff a0 4b 14 35 bc 6c 14 0f |.y|......K.5.l..| +peer0.org1.example.com | 00000010 49 fb 7a 9e 00 8d 11 dc 98 96 4e 83 ca 3a 6e 9b |I.z.......N..:n.|" +peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [msp.identity] Verify -> DEBU 98d Verify: sig = 00000000 30 44 02 20 78 01 c2 18 17 34 61 86 50 7a 0a 67 |0D. x....4a.Pz.g| +peer0.org1.example.com | 00000010 7c 4b 3d 16 bf 38 d3 96 de 88 b4 48 1d f5 45 a0 ||K=..8.....H..E.| +peer0.org1.example.com | 00000020 d3 b7 6c 84 02 20 22 89 26 af b8 91 6a 54 ed 8f |..l.. ".&...jT..| +peer0.org1.example.com | 00000030 23 a7 a0 af 9c 2e 72 ba 43 e0 4d 9b c5 7c da 67 |#.....r.C.M..|.g| +peer0.org1.example.com | 00000040 1f f8 a9 d1 e6 5a |.....Z|" +peer0.org1.example.com | "2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 98e 0xc0003ced40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.860 UTC [cauthdsl] func1 -> DEBU 98f 0xc0003ced40 gate 1556789243859073700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 990 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 992 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 993 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] handleAliveMessage -> DEBU 994 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 995 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 996 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 " +peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 997 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 " +peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 998 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 999 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 99a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 99b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.864 UTC [msp] DeserializeIdentity -> DEBU 99c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.866 UTC [msp] DeserializeIdentity -> DEBU 99d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.866 UTC [msp] DeserializeIdentity -> DEBU 99e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.869 UTC [msp] DeserializeIdentity -> DEBU 99f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.870 UTC [gossip.comm] Send -> DEBU 9a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a3 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b34 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b35 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b36 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b37 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b38 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b39 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b3a Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b3b Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b3c Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b3d Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b3e Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b3f Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b40 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b41 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b42 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b43 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b44 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b45 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b46 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b47 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:27:21.902 UTC [policies] NewManagerImpl -> DEBU b48 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:27:21.902 UTC [policies] NewManagerImpl -> DEBU b49 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4c Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4d Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4f Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b50 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b51 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b52 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b53 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b54 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b55 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b56 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b57 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b58 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b59 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b5a Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5b Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5c Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5d Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5e Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5f Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b60 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b61 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b62 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b63 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b64 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b65 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b66 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b67 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b68 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.871 UTC [gossip.comm] Send -> DEBU 9a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:23.871 UTC [gossip.comm] sendToEndpoint -> DEBU 9a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.871 UTC [gossip.comm] createConnection -> DEBU 9a7 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [grpc] DialContext -> DEBU 9a8 parsed scheme: """ +peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [grpc] DialContext -> DEBU 9a9 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [grpc] UpdateState -> DEBU 9aa ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 }] }" +peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [grpc] switchBalancer -> DEBU 9ab ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [grpc] HandleSubConnStateChange -> DEBU 9ac pickfirstBalancer: HandleSubConnStateChange: 0xc0001e3880, CONNECTING" +peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [gossip.comm] sendToEndpoint -> DEBU 9ad Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:23.872 UTC [gossip.comm] sendToEndpoint -> DEBU 9ae Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.884 UTC [grpc] HandleSubConnStateChange -> DEBU 9af pickfirstBalancer: HandleSubConnStateChange: 0xc0001e3880, READY" +peer0.org1.example.com | "2019-05-02 09:27:23.887 UTC [msp.identity] Sign -> DEBU 9b0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:27:23.887 UTC [msp.identity] Sign -> DEBU 9b1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:27:23.887 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9b2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:7051" +peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9b3 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:7051" +peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [msp] DeserializeIdentity -> DEBU 9b4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [msp] DeserializeIdentity -> DEBU 9b6 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b69 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6a Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6b Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6c Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6e Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6f Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b70 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b71 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b72 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b73 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b74 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b75 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b76 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b77 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.channelconfig] LogSanityChecks -> DEBU b78 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [common.channelconfig] LogSanityChecks -> DEBU b79 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [policies] Manager -> DEBU b7a Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [policies] Manager -> DEBU b7b Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:21.906 UTC [policies] Manager -> DEBU b7c Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b7d Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b7e Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b7f Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b80 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b81 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b82 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b83 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b84 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b85 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b86 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b87 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b88 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-05-02 09:27:21.907 UTC [common.capabilities] Supported -> DEBU b89 Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:21.908 UTC [common.capabilities] Supported -> DEBU b8a Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.common.server] func1 -> DEBU b8b Executing callback to update root CAs" +orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8c updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8d adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8e adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8f adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU b90 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +orderer0.example.com | "2019-05-02 09:27:21.908 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU b91 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-05-02 09:27:21.909 UTC [msp.identity] Sign -> DEBU b92 Sign: plaintext: 0A020802120B0A090A03010203100418...5682C079B401AF95A9AC4327AD694339 " +orderer0.example.com | "2019-05-02 09:27:21.909 UTC [msp.identity] Sign -> DEBU b93 Sign: digest: 69665648D66422A078E26752B27D981A4623B89C9AED8F569755B04E66FFB50F " +orderer0.example.com | "2019-05-02 09:27:21.911 UTC [fsblkstorage] indexBlock -> DEBU b94 Indexing block [blockNum=2, blockHash=[]byte{0x77, 0xce, 0x8d, 0x7, 0x90, 0xe, 0xa5, 0xa9, 0x76, 0x46, 0x90, 0x13, 0x95, 0x91, 0x37, 0xc8, 0x4d, 0x7f, 0xdd, 0xf1, 0x19, 0xb8, 0x8a, 0xad, 0x5f, 0xdd, 0xe8, 0x55, 0x7b, 0xa1, 0x6e, 0x5a} txOffsets= +orderer0.example.com | txId= locPointer=offset=71, bytesLength=22737 orderer0.example.com | ]" -peer0.org1.example.com | "2019-05-02 01:30:49.823 UTC [msp] DeserializeIdentity -> DEBU bda Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:49.823 UTC [gossip.comm] Send -> DEBU bdb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:49.823 UTC [gossip.discovery] sendMemResponse -> DEBU bdc Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:49.824 UTC [gossip.comm] sendToEndpoint -> DEBU bdd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:49.824 UTC [gossip.comm] sendToEndpoint -> DEBU bde Exiting" -peer0.org1.example.com | "2019-05-02 01:30:50.535 UTC [gossip.comm] func1 -> DEBU bdf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 7472938214036638091 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.535 UTC [gossip.gossip] handleMessage -> DEBU be0 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 7472938214036638091 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.537 UTC [gossip.pull] HandleMessage -> DEBU be1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 7472938214036638091 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.538 UTC [msp] DeserializeIdentity -> DEBU be2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.539 UTC [msp] DeserializeIdentity -> DEBU be3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.541 UTC [gossip.pull] SendRes -> DEBU be5 Sending 2 IDENTITY_MSG items to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:50.540 UTC [gossip.gossip] handleMessage -> DEBU be4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:50.719 UTC [gossip.pull] SendReq -> DEBU be6 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:50.720 UTC [gossip.comm] Send -> DEBU be7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13121253355825226892 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:50.721 UTC [gossip.pull] SendReq -> DEBU be8 Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:50.721 UTC [gossip.comm] Send -> DEBU be9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 17096223391310539901 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 51 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:50.722 UTC [gossip.comm] sendToEndpoint -> DEBU beb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 17096223391310539901 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.722 UTC [gossip.comm] sendToEndpoint -> DEBU bec Exiting" -peer0.org1.example.com | "2019-05-02 01:30:50.721 UTC [gossip.comm] sendToEndpoint -> DEBU bea Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13121253355825226892 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.723 UTC [gossip.comm] sendToEndpoint -> DEBU bed Exiting" -peer0.org1.example.com | "2019-05-02 01:30:50.725 UTC [gossip.comm] func1 -> DEBU bee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13121253355825226892, Envelope: 958 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.726 UTC [gossip.gossip] handleMessage -> DEBU bef Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13121253355825226892, Envelope: 958 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.727 UTC [msp] DeserializeIdentity -> DEBU bf0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.727 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:50.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bf2 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:50.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bf3 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:50.729 UTC [policies] Evaluate -> DEBU bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:50.729 UTC [policies] Evaluate -> DEBU bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:50.731 UTC [policies] Evaluate -> DEBU bf6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:50.731 UTC [cauthdsl] func1 -> DEBU bf7 0xc003414510 gate 1556760650731583800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:50.731 UTC [cauthdsl] func2 -> DEBU bf8 0xc003414510 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:50.732 UTC [cauthdsl] func2 -> DEBU bf9 0xc003414510 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:50.732 UTC [cauthdsl] func2 -> DEBU bfa 0xc003414510 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:50.732 UTC [msp.identity] Verify -> DEBU bfb Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| -peer0.org1.example.com | 00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" -peer0.org1.example.com | "2019-05-02 01:30:50.734 UTC [msp.identity] Verify -> DEBU bfc Verify: sig = 00000000 30 45 02 21 00 a8 d1 ad ba a6 49 20 ec bc 04 6e |0E.!......I ...n| -peer0.org1.example.com | 00000010 be 4e 25 2c 27 b4 9a cc 8a 7b c5 ff 32 32 c1 59 |.N%,'....{..22.Y| -peer0.org1.example.com | 00000020 75 fe d8 33 2c 02 20 3d 0a 92 26 8b 93 60 c1 60 |u..3,. =..&..`.`| -peer0.org1.example.com | 00000030 c8 8f cb 23 d3 02 c6 bb e1 91 e1 d1 38 25 a0 e2 |...#........8%..| -peer0.org1.example.com | 00000040 ad 5d 42 66 73 64 fd |.]Bfsd.|" -peer0.org1.example.com | "2019-05-02 01:30:50.736 UTC [cauthdsl] func2 -> DEBU bfd 0xc003414510 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:50.737 UTC [cauthdsl] func1 -> DEBU bfe 0xc003414510 gate 1556760650731583800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:50.740 UTC [policies] Evaluate -> DEBU bff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:50.740 UTC [policies] Evaluate -> DEBU c00 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:50.742 UTC [policies] Evaluate -> DEBU c01 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:50.743 UTC [policies] Evaluate -> DEBU c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:50.745 UTC [gossip.comm] func1 -> DEBU c04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17096223391310539901, Envelope: 958 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.743 UTC [msp] DeserializeIdentity -> DEBU c03 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.749 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:50.749 UTC [gossip.pull] HandleMessage -> DEBU c06 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13121253355825226892, Envelope: 958 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.750 UTC [msp] DeserializeIdentity -> DEBU c07 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.538 UTC [fsblkstorage] updateCheckpoint -> DEBU bba Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71370], isChainEmpty=[false], lastBlockNumber=[2]" -orderer0.example.com | "2019-05-02 01:30:47.539 UTC [orderer.commmon.multichannel] commitBlock -> DEBU bbb [channel: businesschannel] Wrote block [2]" -orderer0.example.com | "2019-05-02 01:30:47.539 UTC [fsblkstorage] waitForBlock -> DEBU bbc Came out of wait. maxAvailaBlockNumber=[2]" -orderer0.example.com | "2019-05-02 01:30:47.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bbd Remaining bytes=[23744], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:47.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bbe Returning blockbytes - length=[23741], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" -orderer0.example.com | "2019-05-02 01:30:47.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bbf blockbytes [23741] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:47.542 UTC [policies] Evaluate -> DEBU bc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.543 UTC [policies] Evaluate -> DEBU bc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.543 UTC [policies] Evaluate -> DEBU bc2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.543 UTC [policies] Evaluate -> DEBU bc3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.543 UTC [policies] Evaluate -> DEBU bc4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.544 UTC [msp] DeserializeIdentity -> DEBU bc5 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.544 UTC [msp.identity] newIdentity -> DEBU bc6 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.545 UTC [cauthdsl] func1 -> DEBU bc7 0xc00004fcd0 gate 1556760647545331400 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.545 UTC [cauthdsl] func2 -> DEBU bc8 0xc00004fcd0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.546 UTC [cauthdsl] func2 -> DEBU bc9 0xc00004fcd0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.546 UTC [cauthdsl] func2 -> DEBU bca 0xc00004fcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -orderer0.example.com | "2019-05-02 01:30:47.546 UTC [cauthdsl] func2 -> DEBU bcb 0xc00004fcd0 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:30:47.547 UTC [cauthdsl] func1 -> DEBU bcc 0xc00004fcd0 gate 1556760647545331400 evaluation fails" -orderer0.example.com | "2019-05-02 01:30:47.547 UTC [policies] Evaluate -> DEBU bcd Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:47.547 UTC [policies] Evaluate -> DEBU bce == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:47.547 UTC [policies] func1 -> DEBU bcf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -orderer0.example.com | "2019-05-02 01:30:47.548 UTC [policies] Evaluate -> DEBU bd0 Signature set did not satisfy policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:47.549 UTC [policies] Evaluate -> DEBU bd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:47.551 UTC [policies] Evaluate -> DEBU bd2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.551 UTC [policies] Evaluate -> DEBU bd3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.553 UTC [policies] Evaluate -> DEBU bd4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.553 UTC [cauthdsl] func1 -> DEBU bd5 0xc0003bb3a0 gate 1556760647553899400 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.554 UTC [cauthdsl] func2 -> DEBU bd6 0xc0003bb3a0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.554 UTC [cauthdsl] func2 -> DEBU bd7 0xc0003bb3a0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.554 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bd8 Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.554 UTC [msp] Validate -> DEBU bd9 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.554 UTC [msp] getCertificationChain -> DEBU bda MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.555 UTC [cauthdsl] func2 -> DEBU bdb 0xc0003bb3a0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:47.555 UTC [msp.identity] Verify -> DEBU bdc Verify: digest = 00000000 7c 7a ed 35 86 0f 34 87 51 98 60 f1 d9 93 38 6f ||z.5..4.Q.`...8o| -orderer0.example.com | 00000010 9f 37 a4 52 89 2b f2 79 8a c9 80 63 e2 73 5f 82 |.7.R.+.y...c.s_.|" -orderer0.example.com | "2019-05-02 01:30:47.555 UTC [msp.identity] Verify -> DEBU bdd Verify: sig = 00000000 30 44 02 20 00 b9 4b ec d5 9c bb 15 46 17 08 94 |0D. ..K.....F...| -orderer0.example.com | 00000010 16 69 a1 e9 ce 7d ed 29 d3 72 2e de 98 9a ff a5 |.i...}.).r......| -orderer0.example.com | 00000020 ce 04 5e 8d 02 20 04 31 6b d0 ef 45 61 23 82 ce |..^.. .1k..Ea#..| -orderer0.example.com | 00000030 47 e2 a7 ec 34 90 1b f7 bf 91 86 e3 73 93 bf 0f |G...4.......s...| -orderer0.example.com | 00000040 69 ad df e2 47 71 |i...Gq|" -orderer0.example.com | "2019-05-02 01:30:47.555 UTC [cauthdsl] func2 -> DEBU bde 0xc0003bb3a0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:47.555 UTC [cauthdsl] func1 -> DEBU bdf 0xc0003bb3a0 gate 1556760647553899400 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:47.555 UTC [policies] Evaluate -> DEBU be0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.556 UTC [policies] Evaluate -> DEBU be1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.556 UTC [policies] Evaluate -> DEBU be2 Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:47.556 UTC [policies] Evaluate -> DEBU be3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:47.556 UTC [policies] Evaluate -> DEBU be4 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:47.556 UTC [policies] Evaluate -> DEBU be5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:47.556 UTC [common.deliver] deliverBlocks -> DEBU be6 [channel: businesschannel] Delivering block [2] for (0xc0008bfb80) for 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:30:47.557 UTC [fsblkstorage] waitForBlock -> DEBU be7 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -peer0.org1.example.com | "2019-05-02 01:30:50.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c08 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:50.751 UTC [msp] DeserializeIdentity -> DEBU c09 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.752 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:50.752 UTC [gossip.gossip] func2 -> DEBU c0b Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -peer0.org1.example.com | "2019-05-02 01:30:50.752 UTC [gossip.pull] HandleMessage -> DEBU c0c Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 3" -peer0.org1.example.com | "2019-05-02 01:30:50.755 UTC [gossip.gossip] handleMessage -> DEBU c0d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:50.756 UTC [gossip.gossip] handleMessage -> DEBU c0e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17096223391310539901, Envelope: 958 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.757 UTC [msp] DeserializeIdentity -> DEBU c0f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.758 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c10 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:50.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c11 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:50.760 UTC [gossip.comm] func1 -> DEBU c12 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13431760505888185262 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c13 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:50.763 UTC [policies] Evaluate -> DEBU c14 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:50.764 UTC [policies] Evaluate -> DEBU c15 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:50.765 UTC [policies] Evaluate -> DEBU c16 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:50.767 UTC [cauthdsl] func1 -> DEBU c17 0xc003414f70 gate 1556760650767156600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:50.767 UTC [cauthdsl] func2 -> DEBU c18 0xc003414f70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:50.767 UTC [cauthdsl] func2 -> DEBU c19 0xc003414f70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:50.768 UTC [cauthdsl] func2 -> DEBU c1a 0xc003414f70 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:50.768 UTC [msp.identity] Verify -> DEBU c1b Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| -peer0.org1.example.com | 00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" -peer0.org1.example.com | "2019-05-02 01:30:50.769 UTC [msp.identity] Verify -> DEBU c1c Verify: sig = 00000000 30 45 02 21 00 98 b4 4c 59 b8 81 56 8e 5f c7 3f |0E.!...LY..V._.?| -peer0.org1.example.com | 00000010 ff 58 a1 b2 bb 3a 91 31 a4 a4 6c 66 ff d1 45 34 |.X...:.1..lf..E4| -peer0.org1.example.com | 00000020 af 45 9f e1 d3 02 20 48 02 9f e4 07 b6 5e a6 8d |.E.... H.....^..| -peer0.org1.example.com | 00000030 4e d0 9a f9 35 71 28 41 2d 1e 24 a3 35 e0 c8 31 |N...5q(A-.$.5..1| -peer0.org1.example.com | 00000040 fa b1 e6 b3 57 cb 53 |....W.S|" -peer0.org1.example.com | "2019-05-02 01:30:50.769 UTC [cauthdsl] func2 -> DEBU c1d 0xc003414f70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:50.769 UTC [cauthdsl] func1 -> DEBU c1e 0xc003414f70 gate 1556760650767156600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:50.770 UTC [policies] Evaluate -> DEBU c1f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:50.770 UTC [policies] Evaluate -> DEBU c20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:50.771 UTC [policies] Evaluate -> DEBU c21 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:50.771 UTC [policies] Evaluate -> DEBU c22 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:50.771 UTC [msp] DeserializeIdentity -> DEBU c23 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.772 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -orderer0.example.com | "2019-05-02 01:30:47.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be8 Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" -orderer0.example.com | "2019-05-02 01:30:47.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be9 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" -orderer0.example.com | "2019-05-02 01:30:47.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU bea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 418.2µs " -orderer0.example.com | "2019-05-02 01:30:47.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU beb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.1µs " -orderer0.example.com | "2019-05-02 01:30:47.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU bec Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:47.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bef Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" -orderer0.example.com | "2019-05-02 01:30:47.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU bed Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:47.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU bee Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:47.583 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.3355ms " -orderer0.example.com | "2019-05-02 01:30:47.658 UTC [orderer.common.server] Deliver -> DEBU bf1 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:30:47.659 UTC [common.deliver] Handle -> DEBU bf2 Starting new deliver loop for 192.168.240.8:40188" -orderer0.example.com | "2019-05-02 01:30:47.659 UTC [common.deliver] Handle -> DEBU bf3 Attempting to read seek info message from 192.168.240.8:40188" -orderer0.example.com | "2019-05-02 01:30:47.660 UTC [policies] Evaluate -> DEBU bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.660 UTC [policies] Evaluate -> DEBU bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.660 UTC [policies] Evaluate -> DEBU bf6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.660 UTC [policies] Evaluate -> DEBU bf7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.661 UTC [policies] Evaluate -> DEBU bf8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.661 UTC [msp] DeserializeIdentity -> DEBU bf9 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:47.663 UTC [msp.identity] newIdentity -> DEBU bfa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:21.913 UTC [fsblkstorage] updateCheckpoint -> DEBU b95 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71370], isChainEmpty=[false], lastBlockNumber=[2]" +orderer0.example.com | "2019-05-02 09:27:21.913 UTC [orderer.commmon.multichannel] commitBlock -> DEBU b96 [channel: businesschannel] Wrote block [2]" +orderer0.example.com | "2019-05-02 09:27:21.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b97 Sending msg of 28 bytes to 2 on channel businesschannel took 43.2µs" +orderer0.example.com | "2019-05-02 09:27:21.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b98 Sending msg of 28 bytes to 3 on channel businesschannel took 62.1µs" +orderer0.example.com | "2019-05-02 09:27:21.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU b99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 686.1µs " +orderer0.example.com | "2019-05-02 09:27:21.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU b9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 388µs " +orderer0.example.com | "2019-05-02 09:27:21.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU b9b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.892 UTC [msp] DeserializeIdentity -> DEBU 9b8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9ba Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9bb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [policies] Evaluate -> DEBU 9bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [policies] Evaluate -> DEBU 9bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [policies] Evaluate -> DEBU 9be == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.893 UTC [cauthdsl] func1 -> DEBU 9bf 0xc0003a4250 gate 1556789243893451600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c0 0xc0003a4250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c1 0xc0003a4250 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c2 0xc0003a4250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c3 0xc0003a4250 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [cauthdsl] func1 -> DEBU 9c4 0xc0003a4250 gate 1556789243893451600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:23.894 UTC [policies] Evaluate -> DEBU 9c5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func1 -> DEBU 9c8 0xc0003a4b10 gate 1556789243895108800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9c9 0xc0003a4b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9ca 0xc0003a4b10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9cb 0xc0003a4b10 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [msp.identity] Verify -> DEBU 9cc Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [msp.identity] Verify -> DEBU 9cd Verify: sig = 00000000 30 45 02 21 00 e8 c6 fe a6 9b 44 d0 c5 36 c3 f7 |0E.!......D..6..| +peer0.org1.example.com | 00000010 55 da b7 8d 34 d5 ec 51 dd a7 2a b0 00 62 79 0d |U...4..Q..*..by.| +peer0.org1.example.com | 00000020 de 82 36 e8 a1 02 20 51 7b 6a 66 c1 9f 16 b8 cb |..6... Q{jf.....| +peer0.org1.example.com | 00000030 1b 72 78 c6 4d 7e 74 00 7d 9c ec 81 f3 6d 43 d8 |.rx.M~t.}....mC.| +peer0.org1.example.com | 00000040 de cd d2 57 8b b7 18 |...W...|" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9ce 0xc0003a4b10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [cauthdsl] func1 -> DEBU 9cf 0xc0003a4b10 gate 1556789243895108800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.896 UTC [policies] Evaluate -> DEBU 9d2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.896 UTC [policies] Evaluate -> DEBU 9d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:23.896 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9d4 Authenticated 172.18.0.5:7051" +peer0.org1.example.com | "2019-05-02 09:27:23.896 UTC [gossip.comm] createConnection -> DEBU 9d5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:23.896 UTC [gossip.comm] sendToEndpoint -> DEBU 9d6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.065 UTC [msp.identity] Sign -> DEBU 9d7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151010 " +peer0.org1.example.com | "2019-05-02 09:27:24.066 UTC [msp.identity] Sign -> DEBU 9d8 Sign: digest: D6BF6E0695D3ECF37A1BBAC784B9F14817C6B21C238B9D8ED8EF86DE7BFF3851 " +peer0.org1.example.com | "2019-05-02 09:27:24.068 UTC [msp.identity] Sign -> DEBU 9d9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:24.068 UTC [msp.identity] Sign -> DEBU 9da Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:24.068 UTC [gossip.discovery] periodicalSendAlive -> DEBU 9db Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:24.069 UTC [msp] DeserializeIdentity -> DEBU 9dc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.070 UTC [msp] DeserializeIdentity -> DEBU 9dd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.072 UTC [msp] DeserializeIdentity -> DEBU 9de Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.074 UTC [gossip.comm] Send -> DEBU 9df Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.079 UTC [gossip.comm] sendToEndpoint -> DEBU 9e0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.079 UTC [gossip.comm] sendToEndpoint -> DEBU 9e1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.075 UTC [msp] DeserializeIdentity -> DEBU 9e2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.086 UTC [gossip.comm] Send -> DEBU 9e3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.086 UTC [gossip.comm] sendToEndpoint -> DEBU 9e4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.086 UTC [gossip.comm] sendToEndpoint -> DEBU 9e5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.093 UTC [gossip.comm] Send -> DEBU 9e6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.093 UTC [gossip.comm] sendToEndpoint -> DEBU 9e7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.094 UTC [gossip.comm] sendToEndpoint -> DEBU 9e8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.096 UTC [gossip.gossip] handleMessage -> DEBU 9e9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.097 UTC [gossip.gossip] handleMessage -> DEBU 9ea Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.097 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9eb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.097 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9ec Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:24.097 UTC [msp.identity] Verify -> DEBU 9ed Verify: digest = 00000000 d6 bf 6e 06 95 d3 ec f3 7a 1b ba c7 84 b9 f1 48 |..n.....z......H| +peer0.org1.example.com | 00000010 17 c6 b2 1c 23 8b 9d 8e d8 ef 86 de 7b ff 38 51 |....#.......{.8Q|" +peer0.org1.example.com | "2019-05-02 09:27:24.097 UTC [msp.identity] Verify -> DEBU 9ee Verify: sig = 00000000 30 45 02 21 00 b3 86 b6 ba 47 97 70 46 a4 5b 1a |0E.!.....G.pF.[.| +peer0.org1.example.com | 00000010 c6 08 d9 cd a1 da 36 6a a4 eb c3 7a 11 80 08 a4 |......6j...z....| +peer0.org1.example.com | 00000020 3c 5c f8 b4 f6 02 20 12 1f df 46 28 bd b8 31 fa |<\.... ...F(..1.| +peer0.org1.example.com | 00000030 97 6e 51 bc 0b 41 91 9e 3e 95 b9 a5 52 17 36 67 |.nQ..A..>...R.6g| +peer0.org1.example.com | 00000040 4b 6c a9 1f 1c ec 5c |Kl....\|" +orderer0.example.com | "2019-05-02 09:27:21.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU b9c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:22.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU b9d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:22.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b9e Sending msg of 28 bytes to 3 on channel testchainid took 35µs" +orderer0.example.com | "2019-05-02 09:27:22.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU b9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 977.7µs " +orderer0.example.com | "2019-05-02 09:27:22.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba0 Sending msg of 28 bytes to 2 on channel businesschannel took 35.6µs" +orderer0.example.com | "2019-05-02 09:27:22.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba1 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +orderer0.example.com | "2019-05-02 09:27:22.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.2µs " +orderer0.example.com | "2019-05-02 09:27:22.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.2µs " +orderer0.example.com | "2019-05-02 09:27:22.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:22.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:22.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:22.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba7 Sending msg of 28 bytes to 3 on channel testchainid took 128.1µs" +orderer0.example.com | "2019-05-02 09:27:22.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 272.9µs " +orderer0.example.com | "2019-05-02 09:27:22.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba9 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-05-02 09:27:22.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU baa Sending msg of 28 bytes to 3 on channel businesschannel took 39.8µs" +orderer0.example.com | "2019-05-02 09:27:22.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU bab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 266µs " +orderer0.example.com | "2019-05-02 09:27:22.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU bac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.3µs " +orderer0.example.com | "2019-05-02 09:27:22.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU bad Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:22.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU bae Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:23.055 UTC [orderer.common.server] Deliver -> DEBU baf Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:23.055 UTC [common.deliver] Handle -> DEBU bb0 Starting new deliver loop for 172.18.0.5:42818" +orderer0.example.com | "2019-05-02 09:27:23.055 UTC [common.deliver] Handle -> DEBU bb1 Attempting to read seek info message from 172.18.0.5:42818" +orderer0.example.com | "2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:23.057 UTC [policies] Evaluate -> DEBU bb6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:23.057 UTC [msp] DeserializeIdentity -> DEBU bb7 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:23.058 UTC [msp.identity] newIdentity -> DEBU bb8 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -10431,317 +9575,408 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr orderer0.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:47.663 UTC [cauthdsl] func1 -> DEBU bfb 0xc000b76460 gate 1556760647663649400 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.663 UTC [cauthdsl] func2 -> DEBU bfc 0xc000b76460 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.663 UTC [cauthdsl] func2 -> DEBU bfd 0xc000b76460 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.663 UTC [cauthdsl] func2 -> DEBU bfe 0xc000b76460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -orderer0.example.com | "2019-05-02 01:30:47.664 UTC [cauthdsl] func2 -> DEBU bff 0xc000b76460 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:30:47.664 UTC [cauthdsl] func1 -> DEBU c00 0xc000b76460 gate 1556760647663649400 evaluation fails" -orderer0.example.com | "2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c01 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c02 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:30:47.665 UTC [policies] func1 -> DEBU c03 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -orderer0.example.com | "2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c04 Signature set did not satisfy policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c05 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:47.666 UTC [policies] Evaluate -> DEBU c08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-05-02 01:30:47.666 UTC [cauthdsl] func1 -> DEBU c09 0xc000b77aa0 gate 1556760647666180400 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:47.666 UTC [cauthdsl] func2 -> DEBU c0a 0xc000b77aa0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:47.666 UTC [cauthdsl] func2 -> DEBU c0b 0xc000b77aa0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:47.666 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c0c Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:47.666 UTC [msp] Validate -> DEBU c0d MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:47.667 UTC [msp] getCertificationChain -> DEBU c0e MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:47.667 UTC [cauthdsl] func2 -> DEBU c0f 0xc000b77aa0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:47.667 UTC [msp.identity] Verify -> DEBU c10 Verify: digest = 00000000 d0 c0 26 cc 59 50 3b e3 c2 02 6d ae 79 dd 85 e1 |..&.YP;...m.y...| -orderer0.example.com | 00000010 91 f2 a2 ff 76 16 1d dd ec 4f 58 14 8d 6a 36 45 |....v....OX..j6E|" -orderer0.example.com | "2019-05-02 01:30:47.667 UTC [msp.identity] Verify -> DEBU c11 Verify: sig = 00000000 30 45 02 21 00 de 41 6b 84 df 28 46 47 e8 96 92 |0E.!..Ak..(FG...| -orderer0.example.com | 00000010 e5 4b 51 5f c2 ee 26 90 62 b2 d6 0f 6c 4f f0 e3 |.KQ_..&.b...lO..| -orderer0.example.com | 00000020 ba 60 29 98 ce 02 20 32 75 85 c3 78 d2 06 bf de |.`)... 2u..x....| -orderer0.example.com | 00000030 1e 2c 41 be e8 4a fb 24 11 d7 d7 83 a6 a4 c1 c8 |.,A..J.$........| -orderer0.example.com | 00000040 7e 1b 7d 31 bf a5 58 |~.}1..X|" -orderer0.example.com | "2019-05-02 01:30:47.668 UTC [cauthdsl] func2 -> DEBU c12 0xc000b77aa0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:47.668 UTC [cauthdsl] func1 -> DEBU c13 0xc000b77aa0 gate 1556760647666180400 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:47.668 UTC [policies] Evaluate -> DEBU c14 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:50.772 UTC [gossip.pull] HandleMessage -> DEBU c25 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17096223391310539901, Envelope: 958 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.773 UTC [msp] DeserializeIdentity -> DEBU c26 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.774 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c27 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:50.774 UTC [msp] DeserializeIdentity -> DEBU c28 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.776 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:50.776 UTC [gossip.gossip] func2 -> DEBU c2a Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -peer0.org1.example.com | "2019-05-02 01:30:50.777 UTC [gossip.pull] HandleMessage -> DEBU c2b Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 4" -peer0.org1.example.com | "2019-05-02 01:30:50.777 UTC [gossip.gossip] handleMessage -> DEBU c2c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:50.778 UTC [gossip.gossip] handleMessage -> DEBU c2d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13431760505888185262 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-05-02 01:30:47.668 UTC [policies] Evaluate -> DEBU c15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:30:47.668 UTC [policies] Evaluate -> DEBU c16 Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:47.668 UTC [policies] Evaluate -> DEBU c17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:30:47.669 UTC [policies] Evaluate -> DEBU c18 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:47.669 UTC [policies] Evaluate -> DEBU c19 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:30:47.669 UTC [common.deliver] deliverBlocks -> DEBU c1a [channel: businesschannel] Received seekInfo (0xc0003c9bc0) start: > stop: > from 192.168.240.8:40188" -orderer0.example.com | "2019-05-02 01:30:47.670 UTC [fsblkstorage] Next -> DEBU c1b Initializing block stream for iterator. itr.maxBlockNumAvailable=2" -orderer0.example.com | "2019-05-02 01:30:47.670 UTC [fsblkstorage] newBlockfileStream -> DEBU c1c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" -orderer0.example.com | "2019-05-02 01:30:47.671 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c1d Remaining bytes=[47430], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:47.672 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c1e Returning blockbytes - length=[23683], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" -orderer0.example.com | "2019-05-02 01:30:47.672 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c1f blockbytes [23683] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:47.673 UTC [common.deliver] deliverBlocks -> DEBU c20 [channel: businesschannel] Delivering block [1] for (0xc0003c9bc0) for 192.168.240.8:40188" -orderer0.example.com | "2019-05-02 01:30:47.678 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c21 Remaining bytes=[23744], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:47.679 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c22 Returning blockbytes - length=[23741], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" -orderer0.example.com | "2019-05-02 01:30:47.679 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c23 blockbytes [23741] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:47.681 UTC [common.deliver] deliverBlocks -> DEBU c24 [channel: businesschannel] Delivering block [2] for (0xc0003c9bc0) for 192.168.240.8:40188" -orderer0.example.com | "2019-05-02 01:30:47.682 UTC [fsblkstorage] waitForBlock -> DEBU c25 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -orderer0.example.com | "2019-05-02 01:30:48.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c26 Sending msg of 28 bytes to 2 on channel businesschannel took 35.1µs" -orderer0.example.com | "2019-05-02 01:30:48.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c27 Sending msg of 28 bytes to 3 on channel businesschannel took 28.8µs" -orderer0.example.com | "2019-05-02 01:30:48.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU c28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 676.7µs " -orderer0.example.com | "2019-05-02 01:30:48.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU c29 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:48.078 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2a Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" -orderer0.example.com | "2019-05-02 01:30:48.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " -orderer0.example.com | "2019-05-02 01:30:48.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.9032ms " -orderer0.example.com | "2019-05-02 01:30:48.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:48.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:48.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2f Sending msg of 28 bytes to 2 on channel businesschannel took 36.5µs" -orderer0.example.com | "2019-05-02 01:30:48.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c30 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" -orderer0.example.com | "2019-05-02 01:30:48.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU c31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 467.9µs " -orderer0.example.com | "2019-05-02 01:30:48.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU c32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1476ms " -orderer0.example.com | "2019-05-02 01:30:48.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU c33 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:48.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU c34 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:48.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c35 Sending msg of 28 bytes to 3 on channel testchainid took 34.8µs" -orderer0.example.com | "2019-05-02 01:30:48.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU c36 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:48.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU c37 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.8µs " -orderer0.example.com | "2019-05-02 01:30:49.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c38 Sending msg of 28 bytes to 2 on channel businesschannel took 46.1µs" -orderer0.example.com | "2019-05-02 01:30:49.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c39 Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" -orderer0.example.com | "2019-05-02 01:30:49.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 396µs " -orderer0.example.com | "2019-05-02 01:30:49.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 296.4µs " -orderer0.example.com | "2019-05-02 01:30:49.081 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:49.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3d Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:49.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:49.083 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c3f Sending msg of 28 bytes to 3 on channel testchainid took 30.3µs" -orderer0.example.com | "2019-05-02 01:30:49.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU c40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 750.9µs " -orderer0.example.com | "2019-05-02 01:30:49.596 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c41 Sending msg of 28 bytes to 2 on channel businesschannel took 146µs" -orderer0.example.com | "2019-05-02 01:30:49.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c42 Sending msg of 28 bytes to 3 on channel businesschannel took 78.1µs" -orderer0.example.com | "2019-05-02 01:30:49.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU c43 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.4µs " -orderer0.example.com | "2019-05-02 01:30:49.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU c44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 877.3µs " -orderer0.example.com | "2019-05-02 01:30:49.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU c45 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:49.641 UTC [orderer.common.cluster.step] handleMessage -> DEBU c46 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:49.641 UTC [orderer.common.cluster.step] handleMessage -> DEBU c47 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:49.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c48 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" -orderer0.example.com | "2019-05-02 01:30:49.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU c49 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.7µs " -orderer0.example.com | "2019-05-02 01:30:50.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4a Sending msg of 28 bytes to 2 on channel businesschannel took 53.1µs" -orderer0.example.com | "2019-05-02 01:30:50.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4b Sending msg of 28 bytes to 3 on channel businesschannel took 37.6µs" -orderer0.example.com | "2019-05-02 01:30:50.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 220.9µs " -orderer0.example.com | "2019-05-02 01:30:50.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 285.3µs " -orderer0.example.com | "2019-05-02 01:30:50.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:50.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:50.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c50 Sending msg of 28 bytes to 3 on channel testchainid took 31.1µs" -orderer0.example.com | "2019-05-02 01:30:50.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU c51 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.6µs " -orderer0.example.com | "2019-05-02 01:30:50.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c52 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:50.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c53 Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" -orderer0.example.com | "2019-05-02 01:30:50.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c54 Sending msg of 28 bytes to 3 on channel businesschannel took 32.7µs" -orderer0.example.com | "2019-05-02 01:30:50.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU c55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 463.2µs " -orderer0.example.com | "2019-05-02 01:30:50.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU c56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.5636ms " -orderer0.example.com | "2019-05-02 01:30:50.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU c57 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:50.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU c58 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:50.584 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c59 Sending msg of 28 bytes to 3 on channel testchainid took 27µs" -orderer0.example.com | "2019-05-02 01:30:50.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:50.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5816ms " -orderer0.example.com | "2019-05-02 01:30:51.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5c Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" -orderer0.example.com | "2019-05-02 01:30:51.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5d Sending msg of 28 bytes to 3 on channel businesschannel took 196.4µs" -orderer0.example.com | "2019-05-02 01:30:51.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 888.2µs " -orderer0.example.com | "2019-05-02 01:30:51.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.2µs " -orderer0.example.com | "2019-05-02 01:30:51.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU c60 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:51.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c61 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:51.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c62 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:51.085 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c63 Sending msg of 28 bytes to 3 on channel testchainid took 59.1µs" -orderer0.example.com | "2019-05-02 01:30:51.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU c64 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.2µs " -orderer0.example.com | "2019-05-02 01:30:51.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c65 Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" -orderer0.example.com | "2019-05-02 01:30:51.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU c66 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 176.3µs " -peer0.org1.example.com | "2019-05-02 01:30:50.778 UTC [gossip.pull] HandleMessage -> DEBU c2e GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13431760505888185262 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:50.779 UTC [msp] DeserializeIdentity -> DEBU c2f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.780 UTC [msp] DeserializeIdentity -> DEBU c30 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:50.781 UTC [gossip.pull] SendRes -> DEBU c31 Sending 2 IDENTITY_MSG items to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:30:50.782 UTC [gossip.gossip] handleMessage -> DEBU c32 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:50.864 UTC [gossip.channel] reportMembershipChanges -> INFO c33 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ]]" -peer0.org1.example.com | "2019-05-02 01:30:51.051 UTC [endorser] ProcessProposal -> DEBU c34 Entering: request from 192.168.240.9:41256" -peer0.org1.example.com | "2019-05-02 01:30:51.051 UTC [protoutils] ValidateProposalMessage -> DEBU c35 ValidateProposalMessage starts for signed proposal 0xc002efe5a0" -peer0.org1.example.com | "2019-05-02 01:30:51.052 UTC [protoutils] validateChannelHeader -> DEBU c36 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:30:51.052 UTC [protoutils] checkSignatureFromCreator -> DEBU c37 begin" -peer0.org1.example.com | "2019-05-02 01:30:51.052 UTC [protoutils] checkSignatureFromCreator -> DEBU c38 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:30:51.052 UTC [protoutils] checkSignatureFromCreator -> DEBU c39 creator is valid" -peer0.org1.example.com | "2019-05-02 01:30:51.053 UTC [msp.identity] Verify -> DEBU c3a Verify: digest = 00000000 af f5 74 43 4c cd 0c 7b 49 1d 4f ee 31 d6 78 8e |..tCL..{I.O.1.x.| -peer0.org1.example.com | 00000010 8c 3a 53 81 a5 19 81 b5 a6 ae 60 66 b6 38 19 83 |.:S.......`f.8..|" -peer0.org1.example.com | "2019-05-02 01:30:51.053 UTC [msp.identity] Verify -> DEBU c3b Verify: sig = 00000000 30 45 02 21 00 80 36 aa b4 96 2a 30 d5 7d 98 00 |0E.!..6...*0.}..| -peer0.org1.example.com | 00000010 11 1a 8b 1f 1a 54 95 23 e5 ed a0 96 85 ed e9 7f |.....T.#........| -peer0.org1.example.com | 00000020 f1 27 07 21 b3 02 20 0c aa 54 db 35 e3 2d 19 a1 |.'.!.. ..T.5.-..| -peer0.org1.example.com | 00000030 1d d8 8e 9c 75 52 a0 45 dc 14 0a 29 ce ab 59 c0 |....uR.E...)..Y.| -peer0.org1.example.com | 00000040 b8 5d 99 23 d2 0f 61 |.].#..a|" -peer0.org1.example.com | "2019-05-02 01:30:51.054 UTC [protoutils] checkSignatureFromCreator -> DEBU c3c exits successfully" -peer0.org1.example.com | "2019-05-02 01:30:51.054 UTC [protoutils] validateChaincodeProposalMessage -> DEBU c3d validateChaincodeProposalMessage starts for proposal 0xc0002fce00, header 0xc002eff090" -peer0.org1.example.com | "2019-05-02 01:30:51.054 UTC [protoutils] validateChaincodeProposalMessage -> DEBU c3e validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:30:51.054 UTC [endorser] preProcess -> DEBU c3f [][7e041be8] processing txid: 7e041be856e54d4aa6ccadbf030ba839af91127da8b87ab4873fa31aa019a1e5" -peer0.org1.example.com | "2019-05-02 01:30:51.055 UTC [endorser] SimulateProposal -> DEBU c40 [][7e041be8] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:30:51.055 UTC [endorser] callChaincode -> INFO c41 [][7e041be8] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:30:51.056 UTC [chaincode] Execute -> DEBU c42 Entry" -peer0.org1.example.com | "2019-05-02 01:30:51.057 UTC [msp.identity] Verify -> DEBU c43 Verify: digest = 00000000 af f5 74 43 4c cd 0c 7b 49 1d 4f ee 31 d6 78 8e |..tCL..{I.O.1.x.| -peer0.org1.example.com | 00000010 8c 3a 53 81 a5 19 81 b5 a6 ae 60 66 b6 38 19 83 |.:S.......`f.8..|" -peer0.org1.example.com | "2019-05-02 01:30:51.057 UTC [msp.identity] Verify -> DEBU c44 Verify: sig = 00000000 30 45 02 21 00 80 36 aa b4 96 2a 30 d5 7d 98 00 |0E.!..6...*0.}..| -peer0.org1.example.com | 00000010 11 1a 8b 1f 1a 54 95 23 e5 ed a0 96 85 ed e9 7f |.....T.#........| -peer0.org1.example.com | 00000020 f1 27 07 21 b3 02 20 0c aa 54 db 35 e3 2d 19 a1 |.'.!.. ..T.5.-..| -peer0.org1.example.com | 00000030 1d d8 8e 9c 75 52 a0 45 dc 14 0a 29 ce ab 59 c0 |....uR.E...)..Y.| -peer0.org1.example.com | 00000040 b8 5d 99 23 d2 0f 61 |.].#..a|" -peer0.org1.example.com | "2019-05-02 01:30:51.058 UTC [lifecycle] InstallChaincode -> DEBU c45 received invocation of InstallChaincode for install package 1f8b08000000000000ffecd66750d3d9fa07f08044a58a59a40882040129920412a46b..." -peer0.org1.example.com | "2019-05-02 01:30:51.059 UTC [chaincode] handleMessage -> DEBU c46 [7e041be8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:51.059 UTC [chaincode] Notify -> DEBU c47 [7e041be8] notifying Txid:7e041be856e54d4aa6ccadbf030ba839af91127da8b87ab4873fa31aa019a1e5, channelID:" -peer0.org1.example.com | "2019-05-02 01:30:51.060 UTC [chaincode] Execute -> DEBU c48 Exit" -peer0.org1.example.com | "2019-05-02 01:30:51.060 UTC [endorser] callChaincode -> INFO c49 [][7e041be8] Exit chaincode: name:"_lifecycle" (4ms)" -peer0.org1.example.com | "2019-05-02 01:30:51.060 UTC [endorser] SimulateProposal -> DEBU c4a [][7e041be8] Exit" -peer0.org1.example.com | "2019-05-02 01:30:51.061 UTC [endorser] func1 -> DEBU c4b Exit: request from 192.168.240.9:41256" -peer0.org1.example.com | "2019-05-02 01:30:51.061 UTC [comm.grpc.server] 1 -> INFO c4c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41256 grpc.code=OK grpc.call_duration=11.4817ms -peer0.org1.example.com | "2019-05-02 01:30:51.067 UTC [grpc] infof -> DEBU c4d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:51.068 UTC [grpc] infof -> DEBU c4e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:51.911 UTC [gossip.election] waitForInterrupt -> DEBU c4f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:30:51.911 UTC [gossip.election] IsLeader -> DEBU c50 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:30:51.911 UTC [msp.identity] Sign -> DEBU c51 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510031801 " -peer0.org1.example.com | "2019-05-02 01:30:51.912 UTC [msp.identity] Sign -> DEBU c52 Sign: digest: 4F8D1DDF3C4A17DFBFD76A1C3290003DEF7190C62A1CBE275E37692BCE1AE513 " -peer0.org1.example.com | "2019-05-02 01:30:51.912 UTC [gossip.election] waitForInterrupt -> DEBU c53 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:30:51.921 UTC [msp] DeserializeIdentity -> DEBU c54 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:51.922 UTC [msp] DeserializeIdentity -> DEBU c55 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:51.922 UTC [msp] DeserializeIdentity -> DEBU c56 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:51.923 UTC [msp] DeserializeIdentity -> DEBU c57 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:51.923 UTC [gossip.comm] Send -> DEBU c58 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:51.923 UTC [msp] DeserializeIdentity -> DEBU c59 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:51.924 UTC [msp] DeserializeIdentity -> DEBU c5a Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:51.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU c67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 988.4µs " -orderer0.example.com | "2019-05-02 01:30:51.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU c68 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:51.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU c69 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:51.582 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6a Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" -orderer0.example.com | "2019-05-02 01:30:51.582 UTC [orderer.common.cluster.step] sendMessage -> DEBU c6b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " -orderer0.example.com | "2019-05-02 01:30:51.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6c Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" -orderer0.example.com | "2019-05-02 01:30:51.584 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:52.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6e Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" -orderer0.example.com | "2019-05-02 01:30:52.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6f Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" -orderer0.example.com | "2019-05-02 01:30:52.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU c70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 204.3µs " -orderer0.example.com | "2019-05-02 01:30:52.077 UTC [orderer.common.cluster.step] handleMessage -> DEBU c71 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:52.078 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c72 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" -orderer0.example.com | "2019-05-02 01:30:52.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU c73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.2µs " -orderer0.example.com | "2019-05-02 01:30:52.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU c74 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:52.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU c75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.5368ms " -orderer0.example.com | "2019-05-02 01:30:52.081 UTC [orderer.common.cluster.step] handleMessage -> DEBU c76 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:52.390 UTC [common.deliver] deliverBlocks -> DEBU c77 Context canceled, aborting wait for next block" -orderer0.example.com | "2019-05-02 01:30:52.390 UTC [grpc] infof -> DEBU c78 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:52.390 UTC [orderer.common.server] func1 -> DEBU c79 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:30:52.391 UTC [comm.grpc.server] 1 -> INFO c7b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.8:40188 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.7323204s -orderer0.example.com | "2019-05-02 01:30:52.390 UTC [fsblkstorage] waitForBlock -> DEBU c7a Came out of wait. maxAvailaBlockNumber=[2]" -orderer0.example.com | "2019-05-02 01:30:52.391 UTC [fsblkstorage] waitForBlock -> DEBU c7c Came out of wait. maxAvailaBlockNumber=[2]" -orderer0.example.com | "2019-05-02 01:30:52.391 UTC [fsblkstorage] waitForBlock -> DEBU c7d Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -orderer0.example.com | "2019-05-02 01:30:52.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7e Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" -orderer0.example.com | "2019-05-02 01:30:52.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7f Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" -orderer0.example.com | "2019-05-02 01:30:52.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU c80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134µs " -orderer0.example.com | "2019-05-02 01:30:52.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU c81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.6µs " -orderer0.example.com | "2019-05-02 01:30:52.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU c82 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:52.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU c83 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:52.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c84 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" -orderer0.example.com | "2019-05-02 01:30:52.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU c85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.9µs " -orderer0.example.com | "2019-05-02 01:30:52.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU c86 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:53.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU c87 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:53.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c88 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" -orderer0.example.com | "2019-05-02 01:30:53.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU c89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 204µs " -peer0.org1.example.com | "2019-05-02 01:30:51.924 UTC [gossip.comm] sendToEndpoint -> DEBU c5b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:51.924 UTC [gossip.comm] sendToEndpoint -> DEBU c5c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:52.861 UTC [msp] DeserializeIdentity -> DEBU c5d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.862 UTC [msp] DeserializeIdentity -> DEBU c5e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.862 UTC [gossip.comm] Send -> DEBU c5f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:30:52.862 UTC [gossip.comm] sendToEndpoint -> DEBU c60 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.863 UTC [gossip.comm] sendToEndpoint -> DEBU c61 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:52.863 UTC [gossip.comm] sendToEndpoint -> DEBU c62 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.863 UTC [gossip.comm] sendToEndpoint -> DEBU c63 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:52.863 UTC [gossip.comm] sendToEndpoint -> DEBU c64 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.864 UTC [gossip.comm] sendToEndpoint -> DEBU c65 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:52.866 UTC [gossip.gossip] handleMessage -> DEBU c66 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.866 UTC [msp.identity] Verify -> DEBU c67 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:30:52.867 UTC [msp.identity] Verify -> DEBU c68 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:30:52.867 UTC [msp.identity] Verify -> DEBU c69 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -peer0.org1.example.com | 00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -peer0.org1.example.com | "2019-05-02 01:30:52.867 UTC [msp.identity] Verify -> DEBU c6a Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -peer0.org1.example.com | 00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -peer0.org1.example.com | 00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -peer0.org1.example.com | 00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -peer0.org1.example.com | 00000040 63 c4 de 4c 07 05 |c..L..|" -peer0.org1.example.com | "2019-05-02 01:30:52.868 UTC [msp] DeserializeIdentity -> DEBU c6b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.868 UTC [msp] DeserializeIdentity -> DEBU c6c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.869 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c6d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:52.869 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c6e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:52.869 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c6f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:52.869 UTC [policies] Evaluate -> DEBU c70 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:52.869 UTC [policies] Evaluate -> DEBU c71 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:52.870 UTC [policies] Evaluate -> DEBU c72 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:52.870 UTC [cauthdsl] func1 -> DEBU c73 0xc0027e3680 gate 1556760652870165400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:52.870 UTC [cauthdsl] func2 -> DEBU c74 0xc0027e3680 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:52.870 UTC [cauthdsl] func2 -> DEBU c75 0xc0027e3680 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:52.871 UTC [cauthdsl] func2 -> DEBU c76 0xc0027e3680 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:53.137 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8a Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" -orderer0.example.com | "2019-05-02 01:30:53.137 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8b Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" -orderer0.example.com | "2019-05-02 01:30:53.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 374µs " -orderer0.example.com | "2019-05-02 01:30:53.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 632.6µs " -orderer0.example.com | "2019-05-02 01:30:53.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:53.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:53.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c90 Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" -orderer0.example.com | "2019-05-02 01:30:53.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c91 Sending msg of 28 bytes to 3 on channel businesschannel took 28.8µs" -orderer0.example.com | "2019-05-02 01:30:53.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU c92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2343ms " -orderer0.example.com | "2019-05-02 01:30:53.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU c93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 683.9µs " -orderer0.example.com | "2019-05-02 01:30:53.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU c94 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:53.582 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c95 Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" -orderer0.example.com | "2019-05-02 01:30:53.583 UTC [orderer.common.cluster.step] sendMessage -> DEBU c96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 679.4µs " -orderer0.example.com | "2019-05-02 01:30:53.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU c97 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:53.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU c98 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:54.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c99 Sending msg of 28 bytes to 2 on channel businesschannel took 27.6µs" -orderer0.example.com | "2019-05-02 01:30:54.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9a Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" -orderer0.example.com | "2019-05-02 01:30:54.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.9µs " -orderer0.example.com | "2019-05-02 01:30:54.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5437ms " -orderer0.example.com | "2019-05-02 01:30:54.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9d Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:54.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:54.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:54.084 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca0 Sending msg of 28 bytes to 3 on channel testchainid took 29.1µs" -orderer0.example.com | "2019-05-02 01:30:54.084 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.8µs " -orderer0.example.com | "2019-05-02 01:30:54.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca2 Sending msg of 28 bytes to 2 on channel businesschannel took 30.5µs" -orderer0.example.com | "2019-05-02 01:30:54.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca3 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" -orderer0.example.com | "2019-05-02 01:30:54.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 202.7µs " -orderer0.example.com | "2019-05-02 01:30:54.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.3µs " -orderer0.example.com | "2019-05-02 01:30:54.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca6 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:54.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:54.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca8 Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs" -orderer0.example.com | "2019-05-02 01:30:54.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101µs " -orderer0.example.com | "2019-05-02 01:30:54.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU caa Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:55.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cab Sending msg of 28 bytes to 3 on channel businesschannel took 67.7µs" -orderer0.example.com | "2019-05-02 01:30:55.077 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cac Sending msg of 28 bytes to 2 on channel businesschannel took 38µs" -orderer0.example.com | "2019-05-02 01:30:55.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU cad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0152ms " -orderer0.example.com | "2019-05-02 01:30:55.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU cae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.2µs " -orderer0.example.com | "2019-05-02 01:30:55.081 UTC [orderer.common.cluster.step] handleMessage -> DEBU caf Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:55.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:55.109 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb1 Sending msg of 28 bytes to 3 on channel testchainid took 177µs" -orderer0.example.com | "2019-05-02 01:30:55.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 283.5µs " -orderer0.example.com | "2019-05-02 01:30:55.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb3 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:55.571 UTC [orderer.common.server] Broadcast -> DEBU cb4 Starting new Broadcast handler" -orderer0.example.com | "2019-05-02 01:30:55.572 UTC [orderer.common.broadcast] Handle -> DEBU cb5 Starting new broadcast loop for 192.168.240.9:47382" -orderer0.example.com | "2019-05-02 01:30:55.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb6 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" -orderer0.example.com | "2019-05-02 01:30:55.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb8 Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" -orderer0.example.com | "2019-05-02 01:30:55.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.7µs " -orderer0.example.com | "2019-05-02 01:30:55.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.1µs " -orderer0.example.com | "2019-05-02 01:30:55.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU cba Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:55.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:55.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cbd Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" -orderer0.example.com | "2019-05-02 01:30:55.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbc Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:55.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.7µs " -orderer0.example.com | "2019-05-02 01:30:55.592 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cbf [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47382 with txid '48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a' of type ENDORSER_TRANSACTION" -orderer0.example.com | "2019-05-02 01:30:55.593 UTC [policies] Evaluate -> DEBU cc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:30:55.594 UTC [policies] Evaluate -> DEBU cc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:55.594 UTC [policies] Evaluate -> DEBU cc2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:30:55.595 UTC [policies] Evaluate -> DEBU cc3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:55.595 UTC [policies] Evaluate -> DEBU cc4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:30:55.595 UTC [msp] DeserializeIdentity -> DEBU cc5 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:55.596 UTC [msp.identity] newIdentity -> DEBU cc6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:23.058 UTC [cauthdsl] func1 -> DEBU bb9 0xc001159a70 gate 1556789243058667500 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:23.060 UTC [cauthdsl] func2 -> DEBU bba 0xc001159a70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:23.060 UTC [cauthdsl] func2 -> DEBU bbb 0xc001159a70 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:23.060 UTC [cauthdsl] func2 -> DEBU bbc 0xc001159a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-05-02 09:27:23.061 UTC [cauthdsl] func2 -> DEBU bbd 0xc001159a70 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:23.061 UTC [cauthdsl] func1 -> DEBU bbe 0xc001159a70 gate 1556789243058667500 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:23.061 UTC [policies] Evaluate -> DEBU bbf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:23.062 UTC [policies] Evaluate -> DEBU bc0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:23.062 UTC [policies] Evaluate -> DEBU bc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:23.063 UTC [cauthdsl] func1 -> DEBU bc2 0xc00118ec10 gate 1556789243063652700 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:23.064 UTC [cauthdsl] func2 -> DEBU bc3 0xc00118ec10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:23.069 UTC [cauthdsl] func2 -> DEBU bc4 0xc00118ec10 processing identity 0 with bytes of efef60" +peer0.org1.example.com | "2019-05-02 09:27:24.098 UTC [gossip.discovery] isSentByMe -> DEBU 9ef Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9f0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.118 UTC [gossip.gossip] handleMessage -> DEBU 9f1 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.118 UTC [gossip.gossip] handleMessage -> DEBU 9f2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9f3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9f4 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f5 Verify: digest = 00000000 19 34 b5 65 b4 96 3c c4 b7 33 51 9b 88 09 01 ad |.4.e..<..3Q.....| +peer0.org1.example.com | 00000010 81 36 7a 4c e6 01 ae 0a fc 19 6f c2 62 b7 94 84 |.6zL......o.b...|" +peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f6 Verify: sig = 00000000 30 45 02 21 00 a0 ce 24 96 83 db ae 98 4c d4 99 |0E.!...$.....L..| +peer0.org1.example.com | 00000010 4f eb f2 2b 58 5c a0 51 5c b5 1c 50 63 ba a6 3c |O..+X\.Q\..Pc..<| +peer0.org1.example.com | 00000020 cc ea e6 6a a3 02 20 30 d0 04 1b 14 43 8a 95 3a |...j.. 0....C..:| +peer0.org1.example.com | 00000030 0d 1a 02 b7 1a 4f 16 cf c9 74 af f1 98 a4 8a ba |.....O...t......| +peer0.org1.example.com | 00000040 a0 99 f6 5e 28 4f f0 |...^(O.|" +peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f7 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f8 Verify: sig = 00000000 30 45 02 21 00 d8 bf c3 11 5e bf 60 92 2d 9c e6 |0E.!.....^.`.-..| +peer0.org1.example.com | 00000010 b7 e1 ef fe 6a 49 5d 48 3f d5 8b c5 d9 ed d0 b1 |....jI]H?.......| +peer0.org1.example.com | 00000020 8d 1e 92 36 ef 02 20 66 b7 9a 8e fd 5e 8d a9 fb |...6.. f....^...| +peer0.org1.example.com | 00000030 17 2f 1d 7c d5 89 4e f6 9c 42 10 c9 50 1b e5 08 |./.|..N..B..P...| +peer0.org1.example.com | 00000040 f9 1e c3 fd a5 78 11 |.....x.|" +peer0.org1.example.com | "2019-05-02 09:27:24.127 UTC [gossip.gossip] handleMessage -> DEBU 9f9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.129 UTC [gossip.discovery] handleAliveMessage -> DEBU 9fa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fb Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:24.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fc updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 " +peer0.org1.example.com | "2019-05-02 09:27:24.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fd Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 " +peer0.org1.example.com | "2019-05-02 09:27:24.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fe Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:24.133 UTC [gossip.discovery] learnExistingMembers -> DEBU 9ff Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.133 UTC [gossip.discovery] handleAliveMessage -> DEBU a00 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.134 UTC [gossip.discovery] handleMsgFromComm -> DEBU a01 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.135 UTC [gossip.gossip] handleMessage -> DEBU a02 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.135 UTC [gossip.discovery] handleMsgFromComm -> DEBU a03 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.135 UTC [gossip.discovery] handleMsgFromComm -> DEBU a04 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a05 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a06 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a07 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.136 UTC [gossip.comm] Send -> DEBU a08 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a09 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.137 UTC [gossip.comm] Send -> DEBU a0a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.137 UTC [gossip.comm] sendToEndpoint -> DEBU a0b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-05-02 09:27:23.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bc5 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:23.070 UTC [msp] Validate -> DEBU bc6 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:23.071 UTC [msp] getCertificationChain -> DEBU bc7 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:23.072 UTC [cauthdsl] func2 -> DEBU bc8 0xc00118ec10 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:23.073 UTC [msp.identity] Verify -> DEBU bc9 Verify: digest = 00000000 38 a0 81 24 8f 33 ab 73 3d 14 8c ac 62 ab 1a 32 |8..$.3.s=...b..2| +orderer0.example.com | 00000010 27 4d a0 4b c7 b6 15 68 3a d1 42 b8 e9 5d 33 fe |'M.K...h:.B..]3.|" +orderer0.example.com | "2019-05-02 09:27:23.073 UTC [msp.identity] Verify -> DEBU bca Verify: sig = 00000000 30 45 02 21 00 94 7f d4 b1 c0 40 9d 9c b3 db 14 |0E.!......@.....| +orderer0.example.com | 00000010 d1 39 25 3c 44 80 e6 de dc d0 a6 46 60 63 67 58 |.9% DEBU bcb 0xc00118ec10 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:23.079 UTC [cauthdsl] func1 -> DEBU bcc 0xc00118ec10 gate 1556789243063652700 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:23.079 UTC [policies] Evaluate -> DEBU bcd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:23.079 UTC [policies] Evaluate -> DEBU bce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bcf Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bd0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bd1 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bd2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:23.081 UTC [common.deliver] deliverBlocks -> DEBU bd3 [channel: businesschannel] Received seekInfo (0xc0010cfe40) start: > stop: > from 172.18.0.5:42818" +orderer0.example.com | "2019-05-02 09:27:23.081 UTC [fsblkstorage] Next -> DEBU bd4 Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +orderer0.example.com | "2019-05-02 09:27:23.082 UTC [fsblkstorage] newBlockfileStream -> DEBU bd5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23938]" +orderer0.example.com | "2019-05-02 09:27:23.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bd6 Remaining bytes=[47432], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:23.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bd7 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23938], bytesOffset=[23941]}" +orderer0.example.com | "2019-05-02 09:27:23.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bd8 blockbytes [23684] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:23.083 UTC [common.deliver] deliverBlocks -> DEBU bd9 [channel: businesschannel] Delivering block [1] for (0xc0010cfe40) for 172.18.0.5:42818" +orderer0.example.com | "2019-05-02 09:27:23.094 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bda Remaining bytes=[23745], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:23.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bdb Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}" +orderer0.example.com | "2019-05-02 09:27:23.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bdc blockbytes [23742] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:23.095 UTC [common.deliver] deliverBlocks -> DEBU bdd [channel: businesschannel] Delivering block [2] for (0xc0010cfe40) for 172.18.0.5:42818" +orderer0.example.com | "2019-05-02 09:27:23.096 UTC [fsblkstorage] waitForBlock -> DEBU bde Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +orderer0.example.com | "2019-05-02 09:27:23.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU bdf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:23.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be0 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +orderer0.example.com | "2019-05-02 09:27:23.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU be1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 384.5µs " +orderer0.example.com | "2019-05-02 09:27:23.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be2 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" +orderer0.example.com | "2019-05-02 09:27:23.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be3 Sending msg of 28 bytes to 3 on channel businesschannel took 27.2µs" +orderer0.example.com | "2019-05-02 09:27:23.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU be4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.1µs " +orderer0.example.com | "2019-05-02 09:27:23.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU be5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.1µs " +orderer0.example.com | "2019-05-02 09:27:23.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU be6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:23.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU be7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:23.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU be8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:23.719 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be9 Sending msg of 28 bytes to 3 on channel testchainid took 152.4µs" +orderer0.example.com | "2019-05-02 09:27:23.720 UTC [orderer.common.cluster.step] sendMessage -> DEBU bea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.4µs " +orderer0.example.com | "2019-05-02 09:27:23.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU beb Sending msg of 28 bytes to 2 on channel businesschannel took 65.3µs" +orderer0.example.com | "2019-05-02 09:27:23.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bec Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +peer0.org1.example.com | "2019-05-02 09:27:24.137 UTC [gossip.comm] sendToEndpoint -> DEBU a0c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.138 UTC [gossip.comm] sendToEndpoint -> DEBU a0d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.138 UTC [gossip.comm] sendToEndpoint -> DEBU a0e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.192 UTC [gossip.gossip] handleMessage -> DEBU a0f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.192 UTC [gossip.gossip] handleMessage -> DEBU a10 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.192 UTC [gossip.discovery] handleMsgFromComm -> DEBU a11 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.192 UTC [gossip.gossip] ValidateAliveMsg -> DEBU a12 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [msp] DeserializeIdentity -> DEBU a13 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a15 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a16 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func1 -> DEBU a1a 0xc0020a2400 gate 1556789244193759600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1b 0xc0020a2400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1c 0xc0020a2400 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1d 0xc0020a2400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1e 0xc0020a2400 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [cauthdsl] func1 -> DEBU a1f 0xc0020a2400 gate 1556789244193759600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a20 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func1 -> DEBU a23 0xc0020a2c40 gate 1556789244194121800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a24 0xc0020a2c40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a25 0xc0020a2c40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a26 0xc0020a2c40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [msp.identity] Verify -> DEBU a27 Verify: digest = 00000000 21 7c a4 01 64 7f ac 24 67 d5 7f 09 18 6e 42 62 |!|..d..$g....nBb| +peer0.org1.example.com | 00000010 91 de 4f 39 92 30 18 8e 97 8a ed 79 34 b7 ee 58 |..O9.0.....y4..X|" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [msp.identity] Verify -> DEBU a28 Verify: sig = 00000000 30 45 02 21 00 fb 9f f0 d2 14 3e 21 69 d6 a1 2f |0E.!......>!i../| +peer0.org1.example.com | 00000010 f8 05 3e 45 15 f0 33 af d8 54 96 31 a2 73 8f cb |..>E..3..T.1.s..| +peer0.org1.example.com | 00000020 5f d1 ae 8f ac 02 20 6f 37 67 40 2a b8 e3 d4 7c |_..... o7g@*...|| +peer0.org1.example.com | 00000030 c0 70 2a a6 99 df 60 61 17 19 d9 3f bd fd 39 03 |.p*...`a...?..9.| +peer0.org1.example.com | 00000040 1c 59 97 54 d3 a1 47 |.Y.T..G|" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a29 0xc0020a2c40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:23.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU bed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.4µs " +orderer0.example.com | "2019-05-02 09:27:23.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU bee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 163.2µs " +orderer0.example.com | "2019-05-02 09:27:23.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU bef Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:23.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:24.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:24.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf2 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-05-02 09:27:24.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +orderer0.example.com | "2019-05-02 09:27:24.491 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf4 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +orderer0.example.com | "2019-05-02 09:27:24.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf5 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +orderer0.example.com | "2019-05-02 09:27:24.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 360.9µs " +orderer0.example.com | "2019-05-02 09:27:24.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.1µs " +orderer0.example.com | "2019-05-02 09:27:24.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:24.495 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:24.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU bfa Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:24.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfb Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2019-05-02 09:27:24.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU bfc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.2µs " +orderer0.example.com | "2019-05-02 09:27:24.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfd Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +orderer0.example.com | "2019-05-02 09:27:24.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfe Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2019-05-02 09:27:24.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU bff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs " +orderer0.example.com | "2019-05-02 09:27:24.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 193.4µs " +orderer0.example.com | "2019-05-02 09:27:24.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c01 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:24.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c02 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:25.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU c03 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:25.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c04 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +orderer0.example.com | "2019-05-02 09:27:25.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.5µs " +orderer0.example.com | "2019-05-02 09:27:25.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c06 Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +orderer0.example.com | "2019-05-02 09:27:25.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c08 Sending msg of 28 bytes to 3 on channel businesschannel took 18.7µs" +orderer0.example.com | "2019-05-02 09:27:25.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.5µs " +orderer0.example.com | "2019-05-02 09:27:25.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU c09 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:25.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU c0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2669ms " +orderer0.example.com | "2019-05-02 09:27:25.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c0b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:25.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU c0c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:25.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c0d Sending msg of 28 bytes to 3 on channel testchainid took 43.9µs" +orderer0.example.com | "2019-05-02 09:27:25.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU c0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " +orderer0.example.com | "2019-05-02 09:27:25.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c0f Sending msg of 28 bytes to 2 on channel businesschannel took 111.8µs" +orderer0.example.com | "2019-05-02 09:27:25.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c10 Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +orderer0.example.com | "2019-05-02 09:27:25.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU c11 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.4µs " +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [cauthdsl] func1 -> DEBU a2a 0xc0020a2c40 gate 1556789244194121800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] handleAliveMessage -> DEBU a2f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a30 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a31 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 " +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a32 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 " +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a33 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a34 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.195 UTC [gossip.discovery] handleAliveMessage -> DEBU a35 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.195 UTC [gossip.discovery] handleMsgFromComm -> DEBU a36 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.209 UTC [msp] DeserializeIdentity -> DEBU a37 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.209 UTC [msp] DeserializeIdentity -> DEBU a38 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.209 UTC [msp] DeserializeIdentity -> DEBU a39 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.210 UTC [msp] DeserializeIdentity -> DEBU a3a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.211 UTC [msp] DeserializeIdentity -> DEBU a3b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.211 UTC [msp] DeserializeIdentity -> DEBU a3c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.211 UTC [gossip.comm] Send -> DEBU a3d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.211 UTC [msp] DeserializeIdentity -> DEBU a3e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [msp] DeserializeIdentity -> DEBU a3f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [gossip.comm] Send -> DEBU a40 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a41 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a42 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a43 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a44 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.214 UTC [gossip.gossip] handleMessage -> DEBU a45 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.218 UTC [gossip.gossip] handleMessage -> DEBU a46 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU a47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.219 UTC [gossip.comm] func1 -> DEBU a48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.219 UTC [gossip.gossip] handleMessage -> DEBU a49 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU a4a Exiting" +orderer0.example.com | "2019-05-02 09:27:25.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72µs " +orderer0.example.com | "2019-05-02 09:27:25.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU c13 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:25.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c14 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:26.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU c15 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:26.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c16 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2019-05-02 09:27:26.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs " +orderer0.example.com | "2019-05-02 09:27:26.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c18 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +orderer0.example.com | "2019-05-02 09:27:26.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c19 Sending msg of 28 bytes to 3 on channel businesschannel took 10.3µs" +orderer0.example.com | "2019-05-02 09:27:26.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 363.6µs " +orderer0.example.com | "2019-05-02 09:27:26.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 297.6µs " +orderer0.example.com | "2019-05-02 09:27:26.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:26.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:26.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:26.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c1f Sending msg of 28 bytes to 3 on channel testchainid took 27.9µs" +orderer0.example.com | "2019-05-02 09:27:26.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU c20 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.3µs " +orderer0.example.com | "2019-05-02 09:27:26.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c21 Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-05-02 09:27:26.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c22 Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +orderer0.example.com | "2019-05-02 09:27:26.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.5µs " +orderer0.example.com | "2019-05-02 09:27:26.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.5µs " +orderer0.example.com | "2019-05-02 09:27:26.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c25 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:26.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c26 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:27.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU c27 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:27.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c28 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-05-02 09:27:27.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.4µs " +orderer0.example.com | "2019-05-02 09:27:27.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2a Sending msg of 28 bytes to 2 on channel businesschannel took 89.5µs" +orderer0.example.com | "2019-05-02 09:27:27.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2b Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +orderer0.example.com | "2019-05-02 09:27:27.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.2µs " +orderer0.example.com | "2019-05-02 09:27:27.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 567µs " +orderer0.example.com | "2019-05-02 09:27:27.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:27.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:27.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU c30 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:27.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c31 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +orderer0.example.com | "2019-05-02 09:27:27.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU c32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1744ms " +orderer0.example.com | "2019-05-02 09:27:27.825 UTC [grpc] infof -> DEBU c33 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:27.825 UTC [common.deliver] deliverBlocks -> DEBU c34 Context canceled, aborting wait for next block" +orderer0.example.com | "2019-05-02 09:27:27.826 UTC [orderer.common.server] func1 -> DEBU c35 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:27.826 UTC [comm.grpc.server] 1 -> INFO c36 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:42818 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.7707471s +peer0.org1.example.com | "2019-05-02 09:27:24.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU a4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.222 UTC [gossip.discovery] handleMsgFromComm -> DEBU a4c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.222 UTC [gossip.gossip] handleMessage -> DEBU a4d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [msp] DeserializeIdentity -> DEBU a4e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [msp] DeserializeIdentity -> DEBU a4f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] Send -> DEBU a50 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a51 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a52 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a54 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a55 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a56 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.291 UTC [msp] DeserializeIdentity -> DEBU a57 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.291 UTC [msp] DeserializeIdentity -> DEBU a58 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.295 UTC [gossip.comm] Send -> DEBU a59 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.295 UTC [msp] DeserializeIdentity -> DEBU a5a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.295 UTC [msp] DeserializeIdentity -> DEBU a5b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU a60 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU a61 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.297 UTC [gossip.gossip] handleMessage -> DEBU a62 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.297 UTC [msp] DeserializeIdentity -> DEBU a63 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.297 UTC [msp] DeserializeIdentity -> DEBU a64 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [msp] DeserializeIdentity -> DEBU a65 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a67 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a68 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [policies] Evaluate -> DEBU a69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [policies] Evaluate -> DEBU a6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [policies] Evaluate -> DEBU a6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.298 UTC [cauthdsl] func1 -> DEBU a6c 0xc0020c2240 gate 1556789244298951400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.300 UTC [cauthdsl] func2 -> DEBU a6d 0xc0020c2240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [cauthdsl] func2 -> DEBU a6e 0xc0020c2240 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [cauthdsl] func2 -> DEBU a6f 0xc0020c2240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [cauthdsl] func2 -> DEBU a70 0xc0020c2240 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [cauthdsl] func1 -> DEBU a71 0xc0020c2240 gate 1556789244298951400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [policies] Evaluate -> DEBU a72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [policies] Evaluate -> DEBU a73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.301 UTC [policies] Evaluate -> DEBU a74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [cauthdsl] func1 -> DEBU a75 0xc002152500 gate 1556789244302086000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [cauthdsl] func2 -> DEBU a76 0xc002152500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [cauthdsl] func2 -> DEBU a77 0xc002152500 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [cauthdsl] func2 -> DEBU a78 0xc002152500 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [msp.identity] Verify -> DEBU a79 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +peer0.org1.example.com | "2019-05-02 09:27:24.302 UTC [msp.identity] Verify -> DEBU a7a Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +peer0.org1.example.com | "2019-05-02 09:27:24.303 UTC [cauthdsl] func2 -> DEBU a7b 0xc002152500 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.303 UTC [cauthdsl] func1 -> DEBU a7c 0xc002152500 gate 1556789244302086000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:24.303 UTC [gossip.comm] func1 -> DEBU a7d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.303 UTC [policies] Evaluate -> DEBU a7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.303 UTC [policies] Evaluate -> DEBU a7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.304 UTC [policies] Evaluate -> DEBU a81 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.308 UTC [policies] Evaluate -> DEBU a82 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.304 UTC [gossip.pull] Hello -> DEBU a80 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:24.308 UTC [msp] DeserializeIdentity -> DEBU a83 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a85 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a86 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [policies] Evaluate -> DEBU a87 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [policies] Evaluate -> DEBU a88 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [policies] Evaluate -> DEBU a89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [cauthdsl] func1 -> DEBU a8a 0xc0021535e0 gate 1556789244309579200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.308 UTC [gossip.comm] Send -> DEBU a84 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [cauthdsl] func2 -> DEBU a8b 0xc0021535e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.310 UTC [cauthdsl] func2 -> DEBU a8d 0xc0021535e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.311 UTC [cauthdsl] func2 -> DEBU a8e 0xc0021535e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:24.309 UTC [gossip.comm] sendToEndpoint -> DEBU a8c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.311 UTC [cauthdsl] func2 -> DEBU a8f 0xc0021535e0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.312 UTC [cauthdsl] func1 -> DEBU a91 0xc0021535e0 gate 1556789244309579200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.311 UTC [gossip.comm] sendToEndpoint -> DEBU a90 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.313 UTC [policies] Evaluate -> DEBU a92 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.314 UTC [policies] Evaluate -> DEBU a93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.315 UTC [policies] Evaluate -> DEBU a94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.316 UTC [cauthdsl] func1 -> DEBU a95 0xc0020c2bb0 gate 1556789244316374500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.316 UTC [cauthdsl] func2 -> DEBU a96 0xc0020c2bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.317 UTC [cauthdsl] func2 -> DEBU a97 0xc0020c2bb0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.317 UTC [cauthdsl] func2 -> DEBU a98 0xc0020c2bb0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.317 UTC [msp.identity] Verify -> DEBU a99 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +peer0.org1.example.com | "2019-05-02 09:27:24.318 UTC [msp.identity] Verify -> DEBU a9a Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +peer0.org1.example.com | "2019-05-02 09:27:24.320 UTC [cauthdsl] func2 -> DEBU a9b 0xc0020c2bb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.320 UTC [cauthdsl] func1 -> DEBU a9c 0xc0020c2bb0 gate 1556789244316374500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:24.321 UTC [policies] Evaluate -> DEBU a9d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.321 UTC [policies] Evaluate -> DEBU a9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.321 UTC [policies] Evaluate -> DEBU a9f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.322 UTC [policies] Evaluate -> DEBU aa0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.322 UTC [gossip.gossip] handleMessage -> DEBU aa1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.322 UTC [gossip.gossip] handleMessage -> DEBU aa2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.323 UTC [msp.identity] Verify -> DEBU aa3 Verify: digest = 00000000 fa 73 4a 64 d2 0b 4a dc 12 d7 d6 81 12 db 4c e8 |.sJd..J.......L.| +peer0.org1.example.com | 00000010 d3 bf b6 e4 81 c6 5d 68 68 55 fe eb a9 b3 27 d3 |......]hhU....'.|" +peer0.org1.example.com | "2019-05-02 09:27:24.324 UTC [msp.identity] Verify -> DEBU aa4 Verify: sig = 00000000 30 45 02 21 00 ff dc b6 59 78 ea e1 49 ee a6 88 |0E.!....Yx..I...| +peer0.org1.example.com | 00000010 0e 33 c7 06 51 f4 b4 84 39 aa 2a 91 66 5f f3 b6 |.3..Q...9.*.f_..| +peer0.org1.example.com | 00000020 90 35 28 c5 07 02 20 26 56 78 3e 99 16 97 0f 46 |.5(... &Vx>....F| +peer0.org1.example.com | 00000030 5a 97 9c 37 07 27 e2 0d 94 24 33 3b fe 00 ad 48 |Z..7.'...$3;...H| +peer0.org1.example.com | 00000040 0b 52 3b 94 1c c8 d7 |.R;....|" +peer0.org1.example.com | "2019-05-02 09:27:24.324 UTC [msp.identity] Verify -> DEBU aa5 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +peer0.org1.example.com | "2019-05-02 09:27:24.325 UTC [msp.identity] Verify -> DEBU aa6 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU aa7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU aa8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.330 UTC [policies] Evaluate -> DEBU aa9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.331 UTC [policies] Evaluate -> DEBU aaa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:24.331 UTC [policies] Evaluate -> DEBU aab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.331 UTC [msp] DeserializeIdentity -> DEBU aac Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.332 UTC [msp.identity] newIdentity -> DEBU aad Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:24.333 UTC [cauthdsl] func1 -> DEBU aae 0xc002164ef0 gate 1556789244333225600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.333 UTC [cauthdsl] func2 -> DEBU aaf 0xc002164ef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.333 UTC [cauthdsl] func2 -> DEBU ab0 0xc002164ef0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.334 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ab1 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:24.334 UTC [msp] Validate -> DEBU ab2 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:24.334 UTC [msp] getCertificationChain -> DEBU ab3 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:24.335 UTC [cauthdsl] func2 -> DEBU ab4 0xc002164ef0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.335 UTC [msp.identity] Verify -> DEBU ab5 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +orderer0.example.com | "2019-05-02 09:27:27.826 UTC [fsblkstorage] waitForBlock -> DEBU c37 Came out of wait. maxAvailaBlockNumber=[2]" +orderer0.example.com | "2019-05-02 09:27:27.920 UTC [orderer.common.server] Broadcast -> DEBU c38 Starting new Broadcast handler" +orderer0.example.com | "2019-05-02 09:27:27.920 UTC [orderer.common.broadcast] Handle -> DEBU c39 Starting new broadcast loop for 172.18.0.8:57248" +orderer0.example.com | "2019-05-02 09:27:27.956 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c3a [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57248 with txid 'fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-05-02 09:27:27.956 UTC [policies] Evaluate -> DEBU c3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:27.957 UTC [policies] Evaluate -> DEBU c3c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:27.957 UTC [policies] Evaluate -> DEBU c3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:27:27.957 UTC [policies] Evaluate -> DEBU c3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:27.958 UTC [policies] Evaluate -> DEBU c3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:27.958 UTC [msp] DeserializeIdentity -> DEBU c40 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:27.959 UTC [msp.identity] newIdentity -> DEBU c41 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | "2019-05-02 09:27:24.336 UTC [msp.identity] Verify -> DEBU ab6 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU ab7 0xc002164ef0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.337 UTC [cauthdsl] func1 -> DEBU ab8 0xc002164ef0 gate 1556789244333225600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:24.337 UTC [policies] Evaluate -> DEBU ab9 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.337 UTC [policies] Evaluate -> DEBU aba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.337 UTC [policies] Evaluate -> DEBU abb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.338 UTC [policies] Evaluate -> DEBU abc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.338 UTC [gossip.gossip] handleMessage -> DEBU abd Exiting" orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -10755,282 +9990,239 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:55.600 UTC [cauthdsl] func1 -> DEBU cc7 0xc000f93470 gate 1556760655600741700 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:55.601 UTC [cauthdsl] func2 -> DEBU cc8 0xc000f93470 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:55.602 UTC [cauthdsl] func2 -> DEBU cc9 0xc000f93470 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:55.603 UTC [cauthdsl] func2 -> DEBU cca 0xc000f93470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-05-02 01:30:55.603 UTC [cauthdsl] func2 -> DEBU ccb 0xc000f93470 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:30:55.604 UTC [cauthdsl] func1 -> DEBU ccc 0xc000f93470 gate 1556760655600741700 evaluation fails" -orderer0.example.com | "2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU ccd Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU cce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU ccf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:30:55.605 UTC [cauthdsl] func1 -> DEBU cd0 0xc000fae5f0 gate 1556760655605125000 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:55.605 UTC [cauthdsl] func2 -> DEBU cd1 0xc000fae5f0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:55.605 UTC [cauthdsl] func2 -> DEBU cd2 0xc000fae5f0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:55.605 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cd3 Checking if identity satisfies MEMBER role for Org1MSP" -orderer0.example.com | "2019-05-02 01:30:55.605 UTC [msp] Validate -> DEBU cd4 MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:55.605 UTC [msp] getCertificationChain -> DEBU cd5 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:55.606 UTC [cauthdsl] func2 -> DEBU cd6 0xc000fae5f0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:55.606 UTC [msp.identity] Verify -> DEBU cd7 Verify: digest = 00000000 30 2b 78 82 93 28 6b 8b c3 cf 7e 75 7b a0 56 aa |0+x..(k...~u{.V.| -orderer0.example.com | 00000010 06 be 8a 3a cd 72 e3 7f 56 3a 6a 93 12 cc ee 11 |...:.r..V:j.....|" -orderer0.example.com | "2019-05-02 01:30:55.607 UTC [msp.identity] Verify -> DEBU cd8 Verify: sig = 00000000 30 45 02 21 00 87 4b 3f 3c 2d 2e a3 58 0d 8b 10 |0E.!..K?<-..X...| -orderer0.example.com | 00000010 3f c6 c2 a1 6b 5a b2 25 2a 4a 96 1c 46 b8 2d 0b |?...kZ.%*J..F.-.| -orderer0.example.com | 00000020 e4 a9 39 92 37 02 20 67 ff 3a 3f 62 cd c9 90 e7 |..9.7. g.:?b....| -peer0.org1.example.com | "2019-05-02 01:30:52.871 UTC [msp.identity] Verify -> DEBU c77 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:30:52.871 UTC [msp.identity] Verify -> DEBU c78 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU c79 0xc0027e3680 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:52.872 UTC [cauthdsl] func1 -> DEBU c7a 0xc0027e3680 gate 1556760652870165400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:52.872 UTC [policies] Evaluate -> DEBU c7b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.872 UTC [policies] Evaluate -> DEBU c7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.872 UTC [policies] Evaluate -> DEBU c7d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.872 UTC [policies] Evaluate -> DEBU c7e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.872 UTC [gossip.gossip] handleMessage -> DEBU c7f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:52.873 UTC [gossip.comm] func1 -> DEBU c80 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.873 UTC [gossip.gossip] handleMessage -> DEBU c81 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.873 UTC [msp] DeserializeIdentity -> DEBU c82 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.873 UTC [msp] DeserializeIdentity -> DEBU c83 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.873 UTC [msp] DeserializeIdentity -> DEBU c84 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.874 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:52.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c86 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:52.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c87 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:52.875 UTC [policies] Evaluate -> DEBU c88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:52.875 UTC [policies] Evaluate -> DEBU c89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:52.875 UTC [policies] Evaluate -> DEBU c8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:52.875 UTC [cauthdsl] func1 -> DEBU c8b 0xc002d092f0 gate 1556760652875885300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:52.876 UTC [cauthdsl] func2 -> DEBU c8c 0xc002d092f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:52.876 UTC [cauthdsl] func2 -> DEBU c8d 0xc002d092f0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:52.876 UTC [cauthdsl] func2 -> DEBU c8e 0xc002d092f0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:52.877 UTC [msp.identity] Verify -> DEBU c8f Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:30:52.877 UTC [msp.identity] Verify -> DEBU c90 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU c91 0xc002d092f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:52.878 UTC [cauthdsl] func1 -> DEBU c92 0xc002d092f0 gate 1556760652875885300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:52.878 UTC [policies] Evaluate -> DEBU c93 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.878 UTC [policies] Evaluate -> DEBU c94 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.878 UTC [policies] Evaluate -> DEBU c95 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.879 UTC [policies] Evaluate -> DEBU c96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | 00000030 69 ed cb e1 7b d4 6d df b5 a5 8d 8f 8a 9c 01 b5 |i...{.m.........| -orderer0.example.com | 00000040 d1 e8 59 34 d4 0a f2 |..Y4...|" -orderer0.example.com | "2019-05-02 01:30:55.607 UTC [cauthdsl] func2 -> DEBU cd9 0xc000fae5f0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:55.607 UTC [cauthdsl] func1 -> DEBU cda 0xc000fae5f0 gate 1556760655605125000 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU cdb Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU cdc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU cdd Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU cde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU cdf Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU ce0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:55.609 UTC [orderer.common.blockcutter] Ordered -> DEBU ce1 Enqueuing message into batch" -orderer0.example.com | "2019-05-02 01:30:55.610 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ce2 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47382" -orderer0.example.com | "2019-05-02 01:30:56.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs" -orderer0.example.com | "2019-05-02 01:30:56.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce4 Sending msg of 28 bytes to 3 on channel businesschannel took 126.4µs" -orderer0.example.com | "2019-05-02 01:30:56.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242µs " -orderer0.example.com | "2019-05-02 01:30:56.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 391µs " -orderer0.example.com | "2019-05-02 01:30:56.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:56.081 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce8 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:56.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:56.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cea Sending msg of 28 bytes to 3 on channel testchainid took 33.4µs" -orderer0.example.com | "2019-05-02 01:30:56.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU ceb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 569.8µs " -orderer0.example.com | "2019-05-02 01:30:56.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 2 on channel businesschannel took 27.6µs" -orderer0.example.com | "2019-05-02 01:30:56.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ced Sending msg of 28 bytes to 3 on channel businesschannel took 23.9µs" -orderer0.example.com | "2019-05-02 01:30:56.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU cee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.1µs " -orderer0.example.com | "2019-05-02 01:30:56.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU cef Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:56.579 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf0 Sending msg of 28 bytes to 3 on channel testchainid took 119.2µs" -orderer0.example.com | "2019-05-02 01:30:56.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305µs " -orderer0.example.com | "2019-05-02 01:30:56.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.9783ms " -orderer0.example.com | "2019-05-02 01:30:56.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:56.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" -orderer0.example.com | "2019-05-02 01:30:57.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf6 Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" -orderer0.example.com | "2019-05-02 01:30:57.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 244.2µs " -orderer0.example.com | "2019-05-02 01:30:57.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.7µs " -peer0.org1.example.com | "2019-05-02 01:30:52.879 UTC [msp.identity] Verify -> DEBU c97 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -peer0.org1.example.com | 00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -peer0.org1.example.com | "2019-05-02 01:30:52.881 UTC [msp.identity] Verify -> DEBU c98 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -peer0.org1.example.com | 00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -peer0.org1.example.com | 00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -peer0.org1.example.com | 00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -peer0.org1.example.com | 00000040 63 c4 de 4c 07 05 |c..L..|" -peer0.org1.example.com | "2019-05-02 01:30:52.882 UTC [gossip.comm] func1 -> DEBU c99 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.883 UTC [msp.identity] Verify -> DEBU c9a Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:30:52.884 UTC [msp.identity] Verify -> DEBU c9b Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:30:52.885 UTC [msp] DeserializeIdentity -> DEBU c9c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.885 UTC [msp] DeserializeIdentity -> DEBU c9d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.885 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:52.885 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c9f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:52.885 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ca0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:52.886 UTC [policies] Evaluate -> DEBU ca1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:52.887 UTC [msp] DeserializeIdentity -> DEBU ca2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.887 UTC [msp] DeserializeIdentity -> DEBU ca3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.887 UTC [gossip.pull] Hello -> DEBU ca4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:52.888 UTC [msp] DeserializeIdentity -> DEBU ca5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.888 UTC [msp] DeserializeIdentity -> DEBU ca6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.889 UTC [gossip.comm] Send -> DEBU ca7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:52.890 UTC [gossip.comm] sendToEndpoint -> DEBU ca8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.890 UTC [gossip.comm] sendToEndpoint -> DEBU ca9 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:52.887 UTC [policies] Evaluate -> DEBU caa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:52.893 UTC [policies] Evaluate -> DEBU cab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:52.893 UTC [cauthdsl] func1 -> DEBU cac 0xc002e51900 gate 1556760652893660500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:52.893 UTC [cauthdsl] func2 -> DEBU cad 0xc002e51900 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:52.894 UTC [cauthdsl] func2 -> DEBU cae 0xc002e51900 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:52.895 UTC [cauthdsl] func2 -> DEBU caf 0xc002e51900 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:52.895 UTC [msp.identity] Verify -> DEBU cb0 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -peer0.org1.example.com | 00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -peer0.org1.example.com | "2019-05-02 01:30:52.895 UTC [msp.identity] Verify -> DEBU cb1 Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -peer0.org1.example.com | 00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -peer0.org1.example.com | 00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -peer0.org1.example.com | 00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -peer0.org1.example.com | 00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -peer0.org1.example.com | "2019-05-02 01:30:52.896 UTC [cauthdsl] func2 -> DEBU cb2 0xc002e51900 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:52.896 UTC [cauthdsl] func1 -> DEBU cb3 0xc002e51900 gate 1556760652893660500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:52.897 UTC [policies] Evaluate -> DEBU cb4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.897 UTC [policies] Evaluate -> DEBU cb5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.897 UTC [policies] Evaluate -> DEBU cb6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.897 UTC [policies] Evaluate -> DEBU cb7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.898 UTC [gossip.gossip] handleMessage -> DEBU cb8 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:52.898 UTC [gossip.gossip] handleMessage -> DEBU cb9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.898 UTC [msp] DeserializeIdentity -> DEBU cba Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.899 UTC [msp] DeserializeIdentity -> DEBU cbb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.900 UTC [msp] DeserializeIdentity -> DEBU cbc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.901 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cbd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:52.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cbe Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:52.902 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cbf Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:52.902 UTC [policies] Evaluate -> DEBU cc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:52.903 UTC [policies] Evaluate -> DEBU cc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:52.903 UTC [policies] Evaluate -> DEBU cc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:52.903 UTC [cauthdsl] func1 -> DEBU cc3 0xc0024a3410 gate 1556760652903805400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:52.904 UTC [cauthdsl] func2 -> DEBU cc4 0xc0024a3410 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:52.904 UTC [cauthdsl] func2 -> DEBU cc5 0xc0024a3410 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:52.904 UTC [cauthdsl] func2 -> DEBU cc6 0xc0024a3410 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:52.904 UTC [msp.identity] Verify -> DEBU cc7 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -peer0.org1.example.com | 00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -peer0.org1.example.com | "2019-05-02 01:30:52.904 UTC [msp.identity] Verify -> DEBU cc8 Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -peer0.org1.example.com | 00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -peer0.org1.example.com | 00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -peer0.org1.example.com | 00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -peer0.org1.example.com | 00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -peer0.org1.example.com | "2019-05-02 01:30:52.905 UTC [cauthdsl] func2 -> DEBU cc9 0xc0024a3410 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:52.905 UTC [cauthdsl] func1 -> DEBU cca 0xc0024a3410 gate 1556760652903805400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:52.905 UTC [policies] Evaluate -> DEBU ccb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.905 UTC [policies] Evaluate -> DEBU ccc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.905 UTC [policies] Evaluate -> DEBU ccd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.905 UTC [policies] Evaluate -> DEBU cce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.906 UTC [msp.identity] Verify -> DEBU ccf Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -peer0.org1.example.com | 00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -peer0.org1.example.com | "2019-05-02 01:30:52.906 UTC [msp.identity] Verify -> DEBU cd0 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -peer0.org1.example.com | 00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -peer0.org1.example.com | 00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -peer0.org1.example.com | 00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -peer0.org1.example.com | 00000040 63 c4 de 4c 07 05 |c..L..|" -peer0.org1.example.com | "2019-05-02 01:30:52.906 UTC [msp] DeserializeIdentity -> DEBU cd1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:52.907 UTC [msp] DeserializeIdentity -> DEBU cd2 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:57.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfa Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.092 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfb Sending msg of 28 bytes to 3 on channel testchainid took 877.9µs" -orderer0.example.com | "2019-05-02 01:30:57.093 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481.7µs " -orderer0.example.com | "2019-05-02 01:30:57.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfe Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" -orderer0.example.com | "2019-05-02 01:30:57.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cff Sending msg of 28 bytes to 3 on channel businesschannel took 26.2µs" -orderer0.example.com | "2019-05-02 01:30:57.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU d00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 351.7µs " -orderer0.example.com | "2019-05-02 01:30:57.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU d01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 917.1µs " -orderer0.example.com | "2019-05-02 01:30:57.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU d02 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU d03 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.584 UTC [orderer.common.cluster.step] sendMessage -> DEBU d05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs " -orderer0.example.com | "2019-05-02 01:30:57.584 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d06 Sending msg of 28 bytes to 3 on channel testchainid took 381.9µs" -orderer0.example.com | "2019-05-02 01:30:57.610 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d07 Batch timer expired, creating block" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:57.611 UTC [orderer.consensus.etcdraft] propose -> INFO d08 Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:57.613 UTC [orderer.consensus.etcdraft] 2 -> DEBU d09 Proposed block [3] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:57.617 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 3831 bytes to 2 on channel businesschannel took 29.7µs" -orderer0.example.com | "2019-05-02 01:30:57.618 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0b Sending msg of 3831 bytes to 3 on channel businesschannel took 79.7µs" -orderer0.example.com | "2019-05-02 01:30:57.619 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 3831 to orderer1.example.com(orderer1.example.com:7050) took 145.6µs " -orderer0.example.com | "2019-05-02 01:30:57.619 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0d Send of ConsensusRequest for channel businesschannel with payload of size 3831 to orderer2.example.com(orderer2.example.com:7050) took 1.0783ms " -orderer0.example.com | "2019-05-02 01:30:57.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0f Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" -orderer0.example.com | "2019-05-02 01:30:57.631 UTC [orderer.consensus.etcdraft] writeBlock -> INFO d10 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:30:57.631 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU d11 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-05-02 01:30:57.631 UTC [msp.identity] Sign -> DEBU d12 Sign: plaintext: 0A020802120B0A090A03010203100418...BB09D4280BADE8B7D8379BF419E7E687 " -orderer0.example.com | "2019-05-02 01:30:57.631 UTC [msp.identity] Sign -> DEBU d13 Sign: digest: C974EB1B312C4AB4F01370E131F82477FA39FDAC9005435B9F99F01CD94E6202 " -orderer0.example.com | "2019-05-02 01:30:57.630 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d14 Sending msg of 28 bytes to 3 on channel businesschannel took 80.9µs" -orderer0.example.com | "2019-05-02 01:30:57.635 UTC [fsblkstorage] indexBlock -> DEBU d15 Indexing block [blockNum=3, blockHash=[]byte{0xa8, 0xe, 0x22, 0x69, 0x53, 0xd1, 0x69, 0x7c, 0x0, 0x47, 0xba, 0xba, 0x55, 0xac, 0x35, 0x1e, 0xd5, 0x4c, 0xc4, 0x47, 0x90, 0xfc, 0xed, 0x3d, 0xc9, 0x7c, 0xf5, 0x2f, 0xee, 0xe9, 0x79, 0xd} txOffsets= -orderer0.example.com | txId=48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a locPointer=offset=70, bytesLength=3705 +orderer0.example.com | "2019-05-02 09:27:27.960 UTC [cauthdsl] func1 -> DEBU c42 0xc0008a61a0 gate 1556789247960911800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:27.961 UTC [cauthdsl] func2 -> DEBU c43 0xc0008a61a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:27.961 UTC [cauthdsl] func2 -> DEBU c44 0xc0008a61a0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:27.962 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c45 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-05-02 09:27:27.963 UTC [msp] Validate -> DEBU c46 MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:27.963 UTC [msp] getCertificationChain -> DEBU c47 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:27.964 UTC [cauthdsl] func2 -> DEBU c48 0xc0008a61a0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:27.965 UTC [msp.identity] Verify -> DEBU c49 Verify: digest = 00000000 4d e3 34 38 46 86 b5 a2 c5 08 2a 3d 74 f1 7b 3d |M.48F.....*=t.{=| +orderer0.example.com | 00000010 ca d3 8e 76 16 ce 7f b2 7b 9b 62 8e 0f 55 ae ee |...v....{.b..U..|" +orderer0.example.com | "2019-05-02 09:27:27.965 UTC [msp.identity] Verify -> DEBU c4a Verify: sig = 00000000 30 45 02 21 00 84 a6 c2 9c 60 54 00 ed 04 97 bd |0E.!.....`T.....| +orderer0.example.com | 00000010 e7 ef 54 53 c3 59 d9 32 03 66 c2 4e f0 dc 25 6e |..TS.Y.2.f.N..%n| +orderer0.example.com | 00000020 46 06 2e 6b 5e 02 20 34 53 a9 96 44 6f f9 5d 5e |F..k^. 4S..Do.]^| +orderer0.example.com | 00000030 5f cc e9 c0 33 db 1b 44 95 d1 cd 17 d4 7d a0 a3 |_...3..D.....}..| +orderer0.example.com | 00000040 fa b9 0d de c0 80 62 |......b|" +orderer0.example.com | "2019-05-02 09:27:27.966 UTC [cauthdsl] func2 -> DEBU c4b 0xc0008a61a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:27.966 UTC [cauthdsl] func1 -> DEBU c4c 0xc0008a61a0 gate 1556789247960911800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:27.967 UTC [policies] Evaluate -> DEBU c4d Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:27.968 UTC [policies] Evaluate -> DEBU c4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:27.968 UTC [policies] Evaluate -> DEBU c4f Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:27.968 UTC [policies] Evaluate -> DEBU c50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:27.969 UTC [policies] Evaluate -> DEBU c51 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:27.969 UTC [policies] Evaluate -> DEBU c52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:27.970 UTC [orderer.common.blockcutter] Ordered -> DEBU c53 Enqueuing message into batch" +orderer0.example.com | "2019-05-02 09:27:27.970 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c54 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57248" +orderer0.example.com | "2019-05-02 09:27:27.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c55 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +orderer0.example.com | "2019-05-02 09:27:27.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c56 Sending msg of 28 bytes to 3 on channel businesschannel took 173.3µs" +orderer0.example.com | "2019-05-02 09:27:27.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.7µs " +orderer0.example.com | "2019-05-02 09:27:27.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 161.9µs " +orderer0.example.com | "2019-05-02 09:27:28.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c59 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs" +orderer0.example.com | "2019-05-02 09:27:28.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5a Sending msg of 28 bytes to 3 on channel businesschannel took 171.9µs" +orderer0.example.com | "2019-05-02 09:27:28.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.8µs " +orderer0.example.com | "2019-05-02 09:27:28.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262µs " +orderer0.example.com | "2019-05-02 09:27:28.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:28.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:24.339 UTC [gossip.gossip] handleMessage -> DEBU abe Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.339 UTC [msp] DeserializeIdentity -> DEBU abf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.340 UTC [msp] DeserializeIdentity -> DEBU ac0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.341 UTC [msp] DeserializeIdentity -> DEBU ac1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.341 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ac2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:24.342 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ac3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.342 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ac4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.343 UTC [policies] Evaluate -> DEBU ac5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.344 UTC [policies] Evaluate -> DEBU ac6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:24.344 UTC [policies] Evaluate -> DEBU ac7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.345 UTC [cauthdsl] func1 -> DEBU ac8 0xc002177c60 gate 1556789244345261300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.345 UTC [cauthdsl] func2 -> DEBU ac9 0xc002177c60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.346 UTC [cauthdsl] func2 -> DEBU aca 0xc002177c60 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.346 UTC [cauthdsl] func2 -> DEBU acb 0xc002177c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:24.347 UTC [cauthdsl] func2 -> DEBU acc 0xc002177c60 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.347 UTC [cauthdsl] func1 -> DEBU acd 0xc002177c60 gate 1556789244345261300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.347 UTC [policies] Evaluate -> DEBU ace Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.348 UTC [policies] Evaluate -> DEBU acf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.348 UTC [policies] Evaluate -> DEBU ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.348 UTC [cauthdsl] func1 -> DEBU ad1 0xc00218a4f0 gate 1556789244348793700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.350 UTC [cauthdsl] func2 -> DEBU ad2 0xc00218a4f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.351 UTC [cauthdsl] func2 -> DEBU ad3 0xc00218a4f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.351 UTC [cauthdsl] func2 -> DEBU ad4 0xc00218a4f0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.351 UTC [msp.identity] Verify -> DEBU ad5 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +peer0.org1.example.com | "2019-05-02 09:27:24.352 UTC [msp.identity] Verify -> DEBU ad6 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|" +peer0.org1.example.com | "2019-05-02 09:27:24.352 UTC [cauthdsl] func2 -> DEBU ad7 0xc00218a4f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.353 UTC [cauthdsl] func1 -> DEBU ad8 0xc00218a4f0 gate 1556789244348793700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:24.353 UTC [policies] Evaluate -> DEBU ad9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.353 UTC [policies] Evaluate -> DEBU ada == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.353 UTC [policies] Evaluate -> DEBU adb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.354 UTC [policies] Evaluate -> DEBU adc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.354 UTC [msp] DeserializeIdentity -> DEBU add Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.354 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ade Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.355 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU adf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.355 UTC [policies] Evaluate -> DEBU ae0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.355 UTC [policies] Evaluate -> DEBU ae1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:24.356 UTC [policies] Evaluate -> DEBU ae2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.356 UTC [cauthdsl] func1 -> DEBU ae3 0xc00218b5d0 gate 1556789244356351400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.356 UTC [cauthdsl] func2 -> DEBU ae4 0xc00218b5d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.356 UTC [cauthdsl] func2 -> DEBU ae5 0xc00218b5d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.357 UTC [cauthdsl] func2 -> DEBU ae6 0xc00218b5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:24.357 UTC [cauthdsl] func2 -> DEBU ae7 0xc00218b5d0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.358 UTC [cauthdsl] func1 -> DEBU ae8 0xc00218b5d0 gate 1556789244356351400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.358 UTC [policies] Evaluate -> DEBU ae9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.358 UTC [policies] Evaluate -> DEBU aea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.358 UTC [policies] Evaluate -> DEBU aeb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.359 UTC [cauthdsl] func1 -> DEBU aec 0xc00218be70 gate 1556789244359183700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.359 UTC [cauthdsl] func2 -> DEBU aed 0xc00218be70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.359 UTC [cauthdsl] func2 -> DEBU aee 0xc00218be70 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [cauthdsl] func2 -> DEBU aef 0xc00218be70 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [msp.identity] Verify -> DEBU af0 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [msp.identity] Verify -> DEBU af1 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [cauthdsl] func2 -> DEBU af2 0xc00218be70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [cauthdsl] func1 -> DEBU af3 0xc00218be70 gate 1556789244359183700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [gossip.gossip] handleMessage -> DEBU af8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [gossip.gossip] handleMessage -> DEBU af9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15805491442320967247 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [gossip.pull] HandleMessage -> DEBU afa GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15805491442320967247 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.360 UTC [gossip.gossip] handleMessage -> DEBU afb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.540 UTC [gossip.gossip] handleMessage -> DEBU afc Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.541 UTC [msp] DeserializeIdentity -> DEBU afd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.541 UTC [msp] DeserializeIdentity -> DEBU afe Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.542 UTC [gossip.gossip] handleMessage -> DEBU aff Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.542 UTC [gossip.gossip] handleMessage -> DEBU b00 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.543 UTC [gossip.pull] HandleMessage -> DEBU b01 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.544 UTC [gossip.pull] SendDigest -> DEBU b02 Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:24.544 UTC [gossip.gossip] handleMessage -> DEBU b03 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.550 UTC [gossip.gossip] handleMessage -> DEBU b04 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789242496119500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.550 UTC [msp.identity] Verify -> DEBU b05 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +peer0.org1.example.com | "2019-05-02 09:27:24.551 UTC [msp.identity] Verify -> DEBU b06 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU b07 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.561 UTC [gossip.gossip] handleMessage -> DEBU b08 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789242496119500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +orderer0.example.com | "2019-05-02 09:27:28.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:28.990 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c60 Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-05-02 09:27:28.990 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c61 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +orderer0.example.com | "2019-05-02 09:27:28.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU c62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +orderer0.example.com | "2019-05-02 09:27:28.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU c63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.3µs " +orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c64 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c65 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c66 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c67 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU c68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " +orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c69 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +orderer0.example.com | "2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU c6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs " +orderer0.example.com | "2019-05-02 09:27:28.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:28.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6e Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2019-05-02 09:27:29.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU c6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.6µs " +orderer0.example.com | "2019-05-02 09:27:29.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c70 Sending msg of 28 bytes to 3 on channel businesschannel took 40.9µs" +orderer0.example.com | "2019-05-02 09:27:29.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU c71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 171.1µs " +orderer0.example.com | "2019-05-02 09:27:29.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU c72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.2µs " +orderer0.example.com | "2019-05-02 09:27:29.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU c74 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c73 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +orderer0.example.com | "2019-05-02 09:27:29.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU c75 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU c76 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c77 Sending msg of 28 bytes to 3 on channel testchainid took 28.9µs" +orderer0.example.com | "2019-05-02 09:27:29.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU c78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 244.1µs " +orderer0.example.com | "2019-05-02 09:27:29.971 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU c79 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:29.971 UTC [orderer.consensus.etcdraft] propose -> INFO c7a Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:29.972 UTC [orderer.consensus.etcdraft] 2 -> DEBU c7b Proposed block [3] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:29.976 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7c Sending msg of 3831 bytes to 3 on channel businesschannel took 18.1µs" +orderer0.example.com | "2019-05-02 09:27:29.977 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7d Sending msg of 3831 bytes to 2 on channel businesschannel took 203.1µs" +orderer0.example.com | "2019-05-02 09:27:29.977 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7e Send of ConsensusRequest for channel businesschannel with payload of size 3831 to orderer2.example.com(orderer2.example.com:7050) took 190.4µs " +orderer0.example.com | "2019-05-02 09:27:29.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7f Send of ConsensusRequest for channel businesschannel with payload of size 3831 to orderer1.example.com(orderer1.example.com:7050) took 121.5µs " +orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU c81 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c82 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c83 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.common.cluster.step] sendMessage -> DEBU c84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.consensus.etcdraft] writeBlock -> INFO c85 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:29.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU c86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.4µs " +peer0.org1.example.com | "2019-05-02 09:27:24.561 UTC [msp.identity] Verify -> DEBU b09 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +peer0.org1.example.com | "2019-05-02 09:27:24.562 UTC [msp.identity] Verify -> DEBU b0a Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU b0b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.562 UTC [gossip.gossip] handleMessage -> DEBU b0c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.788 UTC [gossip.gossip] handleMessage -> DEBU b0d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.790 UTC [msp] DeserializeIdentity -> DEBU b0e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.791 UTC [msp] DeserializeIdentity -> DEBU b0f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.791 UTC [msp] DeserializeIdentity -> DEBU b10 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.795 UTC [gossip.gossip] handleMessage -> DEBU b11 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.796 UTC [gossip.gossip] handleMessage -> DEBU b12 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789242989438000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.796 UTC [msp] DeserializeIdentity -> DEBU b13 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.797 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:24.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b15 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.798 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b16 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.798 UTC [policies] Evaluate -> DEBU b17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.799 UTC [policies] Evaluate -> DEBU b18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:24.801 UTC [policies] Evaluate -> DEBU b19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.801 UTC [cauthdsl] func1 -> DEBU b1a 0xc002216700 gate 1556789244801894700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.803 UTC [gossip.comm] func1 -> DEBU b1b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789242989438000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.802 UTC [cauthdsl] func2 -> DEBU b1c 0xc002216700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.804 UTC [cauthdsl] func2 -> DEBU b1d 0xc002216700 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.804 UTC [cauthdsl] func2 -> DEBU b1e 0xc002216700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:24.805 UTC [cauthdsl] func2 -> DEBU b1f 0xc002216700 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.805 UTC [cauthdsl] func1 -> DEBU b20 0xc002216700 gate 1556789244801894700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.808 UTC [policies] Evaluate -> DEBU b21 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.809 UTC [policies] Evaluate -> DEBU b22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.809 UTC [policies] Evaluate -> DEBU b23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.810 UTC [cauthdsl] func1 -> DEBU b24 0xc002216f40 gate 1556789244810380700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.810 UTC [cauthdsl] func2 -> DEBU b25 0xc002216f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.811 UTC [cauthdsl] func2 -> DEBU b26 0xc002216f40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.811 UTC [cauthdsl] func2 -> DEBU b27 0xc002216f40 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:29.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU c80 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.984 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c87 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-05-02 09:27:29.984 UTC [msp.identity] Sign -> DEBU c88 Sign: plaintext: 0A020802120B0A090A03010203100418...F97EED81623BCA86C8D9743A6BD37848 " +orderer0.example.com | "2019-05-02 09:27:29.984 UTC [msp.identity] Sign -> DEBU c89 Sign: digest: 3A61CB55F205B840086B7312602C27B1721649382796FD94F5CA81888B1EDCF3 " +orderer0.example.com | "2019-05-02 09:27:29.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8c Sending msg of 28 bytes to 2 on channel businesschannel took 22.7µs" +orderer0.example.com | "2019-05-02 09:27:29.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8d Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs" +orderer0.example.com | "2019-05-02 09:27:29.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 179.6µs " +orderer0.example.com | "2019-05-02 09:27:29.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.4µs " +orderer0.example.com | "2019-05-02 09:27:29.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c90 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c91 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:29.991 UTC [fsblkstorage] indexBlock -> DEBU c92 Indexing block [blockNum=3, blockHash=[]byte{0x19, 0xcd, 0xcd, 0x5c, 0x29, 0x4b, 0x7c, 0x44, 0xae, 0x5, 0xb7, 0xcb, 0x3a, 0xbf, 0xcb, 0xc3, 0xf2, 0xcc, 0x3c, 0xa9, 0x83, 0x39, 0x7c, 0x8f, 0x82, 0x59, 0xb5, 0x99, 0xa7, 0x3d, 0xe9, 0x5e} txOffsets= +orderer0.example.com | txId=fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 locPointer=offset=70, bytesLength=3705 orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:30:57.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU d17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.6µs " -orderer0.example.com | "2019-05-02 01:30:57.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU d18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " -orderer0.example.com | "2019-05-02 01:30:57.636 UTC [orderer.common.cluster.step] handleMessage -> DEBU d16 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.649 UTC [orderer.common.cluster.step] handleMessage -> DEBU d19 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.650 UTC [fsblkstorage] updateCheckpoint -> DEBU d1a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76082], isChainEmpty=[false], lastBlockNumber=[3]" -orderer0.example.com | "2019-05-02 01:30:57.652 UTC [orderer.commmon.multichannel] commitBlock -> DEBU d1c [channel: businesschannel] Wrote block [3]" -orderer0.example.com | "2019-05-02 01:30:57.650 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:57.652 UTC [fsblkstorage] waitForBlock -> DEBU d1d Came out of wait. maxAvailaBlockNumber=[3]" -orderer0.example.com | "2019-05-02 01:30:57.660 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d1e Remaining bytes=[4712], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:30:57.661 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d1f Returning blockbytes - length=[4710], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}" -orderer0.example.com | "2019-05-02 01:30:57.661 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d20 blockbytes [4710] read from file [0]" -orderer0.example.com | "2019-05-02 01:30:57.697 UTC [common.deliver] deliverBlocks -> DEBU d21 [channel: businesschannel] Delivering block [3] for (0xc0008bfb80) for 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:30:57.701 UTC [fsblkstorage] waitForBlock -> DEBU d22 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" -orderer0.example.com | "2019-05-02 01:30:58.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d23 Sending msg of 28 bytes to 2 on channel businesschannel took 31.7µs" -orderer0.example.com | "2019-05-02 01:30:58.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d24 Sending msg of 28 bytes to 3 on channel businesschannel took 31µs" -orderer0.example.com | "2019-05-02 01:30:58.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU d25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.4µs " -orderer0.example.com | "2019-05-02 01:30:58.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU d26 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:58.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d28 Sending msg of 28 bytes to 3 on channel testchainid took 200.5µs" -orderer0.example.com | "2019-05-02 01:30:58.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU d29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.8µs " -orderer0.example.com | "2019-05-02 01:30:58.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU d27 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:58.103 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 26.4428ms " -orderer0.example.com | "2019-05-02 01:30:58.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:58.150 UTC [grpc] infof -> DEBU d2c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:30:58.149 UTC [orderer.common.broadcast] Handle -> WARN d2d Error reading from 192.168.240.9:47382: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:30:58.157 UTC [orderer.common.server] func1 -> DEBU d2e Closing Broadcast stream" -orderer0.example.com | "2019-05-02 01:30:58.158 UTC [comm.grpc.server] 1 -> INFO d2f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47382 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.5866356s -orderer0.example.com | "2019-05-02 01:30:58.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d30 Sending msg of 28 bytes to 3 on channel businesschannel took 31.5µs" -orderer0.example.com | "2019-05-02 01:30:58.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d31 Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" -orderer0.example.com | "2019-05-02 01:30:58.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU d32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 438µs " -orderer0.example.com | "2019-05-02 01:30:58.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU d33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.1µs " -orderer0.example.com | "2019-05-02 01:30:58.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU d34 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:58.550 UTC [orderer.common.cluster.step] handleMessage -> DEBU d35 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:58.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU d36 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:58.553 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d37 Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs" -orderer0.example.com | "2019-05-02 01:30:58.554 UTC [orderer.common.cluster.step] sendMessage -> DEBU d38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192µs " -orderer0.example.com | "2019-05-02 01:30:59.043 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d39 Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" -orderer0.example.com | "2019-05-02 01:30:59.043 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3a Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" -orderer0.example.com | "2019-05-02 01:30:59.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 391.9µs " -orderer0.example.com | "2019-05-02 01:30:59.047 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 278.1µs " -orderer0.example.com | "2019-05-02 01:30:59.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:59.065 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:59.066 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:59.068 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d40 Sending msg of 28 bytes to 3 on channel testchainid took 64.8µs" -orderer0.example.com | "2019-05-02 01:30:59.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU d41 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.9µs " -orderer0.example.com | "2019-05-02 01:30:59.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU d42 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:59.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d43 Sending msg of 28 bytes to 3 on channel testchainid took 36.9µs" -orderer0.example.com | "2019-05-02 01:30:59.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.8µs " -orderer0.example.com | "2019-05-02 01:30:59.548 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d45 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" -orderer0.example.com | "2019-05-02 01:30:59.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d46 Sending msg of 28 bytes to 3 on channel businesschannel took 21.6µs" -orderer0.example.com | "2019-05-02 01:30:59.549 UTC [orderer.common.cluster.step] sendMessage -> DEBU d47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.3µs " -orderer0.example.com | "2019-05-02 01:30:59.551 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6928ms " -orderer0.example.com | "2019-05-02 01:30:59.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU d49 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:59.554 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:30:59.575 UTC [orderer.common.server] Broadcast -> DEBU d4b Starting new Broadcast handler" -orderer0.example.com | "2019-05-02 01:30:59.575 UTC [orderer.common.broadcast] Handle -> DEBU d4c Starting new broadcast loop for 192.168.240.9:47392" -orderer0.example.com | "2019-05-02 01:30:59.591 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d4d [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47392 with txid 'cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885' of type ENDORSER_TRANSACTION" -orderer0.example.com | "2019-05-02 01:30:59.592 UTC [policies] Evaluate -> DEBU d4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:30:59.592 UTC [policies] Evaluate -> DEBU d4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:59.593 UTC [policies] Evaluate -> DEBU d50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:30:59.593 UTC [policies] Evaluate -> DEBU d51 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:30:59.594 UTC [policies] Evaluate -> DEBU d52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:30:59.594 UTC [msp] DeserializeIdentity -> DEBU d53 Obtaining identity" -orderer0.example.com | "2019-05-02 01:30:59.595 UTC [msp.identity] newIdentity -> DEBU d54 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:29.999 UTC [fsblkstorage] updateCheckpoint -> DEBU c93 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76081], isChainEmpty=[false], lastBlockNumber=[3]" +orderer0.example.com | "2019-05-02 09:27:30.001 UTC [orderer.commmon.multichannel] commitBlock -> DEBU c94 [channel: businesschannel] Wrote block [3]" +orderer0.example.com | "2019-05-02 09:27:30.053 UTC [grpc] infof -> DEBU c95 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:30.053 UTC [orderer.common.broadcast] Handle -> WARN c96 Error reading from 172.18.0.8:57248: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:30.055 UTC [orderer.common.server] func1 -> DEBU c97 Closing Broadcast stream" +orderer0.example.com | "2019-05-02 09:27:30.056 UTC [comm.grpc.server] 1 -> INFO c98 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57248 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.137027s +orderer0.example.com | "2019-05-02 09:27:30.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU c99 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:30.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " +orderer0.example.com | "2019-05-02 09:27:30.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9b Sending msg of 28 bytes to 3 on channel testchainid took 38.2µs" +orderer0.example.com | "2019-05-02 09:27:30.452 UTC [orderer.common.server] Broadcast -> DEBU c9c Starting new Broadcast handler" +orderer0.example.com | "2019-05-02 09:27:30.452 UTC [orderer.common.broadcast] Handle -> DEBU c9d Starting new broadcast loop for 172.18.0.8:57260" +orderer0.example.com | "2019-05-02 09:27:30.462 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c9e [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57260 with txid 'fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-05-02 09:27:30.463 UTC [policies] Evaluate -> DEBU c9f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:30.464 UTC [policies] Evaluate -> DEBU ca0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:30.464 UTC [policies] Evaluate -> DEBU ca1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:27:30.464 UTC [policies] Evaluate -> DEBU ca2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:30.465 UTC [policies] Evaluate -> DEBU ca3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:30.465 UTC [msp] DeserializeIdentity -> DEBU ca4 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:30.466 UTC [msp.identity] newIdentity -> DEBU ca5 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -11044,1250 +10236,1540 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:30:59.595 UTC [cauthdsl] func1 -> DEBU d55 0xc00107dbb0 gate 1556760659595780200 evaluation starts" -orderer0.example.com | "2019-05-02 01:30:59.595 UTC [cauthdsl] func2 -> DEBU d56 0xc00107dbb0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:30:59.596 UTC [cauthdsl] func2 -> DEBU d57 0xc00107dbb0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:30:59.596 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d58 Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-05-02 01:30:59.597 UTC [msp] Validate -> DEBU d59 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:30:59.597 UTC [msp] getCertificationChain -> DEBU d5a MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:30:59.598 UTC [cauthdsl] func2 -> DEBU d5b 0xc00107dbb0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:30:59.599 UTC [msp.identity] Verify -> DEBU d5c Verify: digest = 00000000 18 89 da 7d ee 2f fa 9d b7 31 99 e7 69 5c 72 c4 |...}./...1..i\r.| -orderer0.example.com | 00000010 32 53 fe b4 21 0f b5 62 f1 8f 2f de 95 92 26 b2 |2S..!..b../...&.|" -orderer0.example.com | "2019-05-02 01:30:59.599 UTC [msp.identity] Verify -> DEBU d5d Verify: sig = 00000000 30 45 02 21 00 f7 20 96 b5 eb 51 76 b8 c6 3d b1 |0E.!.. ...Qv..=.| -orderer0.example.com | 00000010 4b 39 4a 1d 0b 7d 98 44 2c 4e 65 87 2a 1c e4 48 |K9J..}.D,Ne.*..H| -orderer0.example.com | 00000020 c4 14 e8 db 07 02 20 4e 2c ea b1 fc 8f f9 f3 13 |...... N,.......| -orderer0.example.com | 00000030 4a 95 7e 34 07 e1 af 27 36 33 64 f0 c5 79 a9 02 |J.~4...'63d..y..| -orderer0.example.com | 00000040 e4 c9 83 73 4f bc 7d |...sO.}|" -orderer0.example.com | "2019-05-02 01:30:59.600 UTC [cauthdsl] func2 -> DEBU d5e 0xc00107dbb0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:30:59.600 UTC [cauthdsl] func1 -> DEBU d5f 0xc00107dbb0 gate 1556760659595780200 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:30:59.600 UTC [policies] Evaluate -> DEBU d60 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:59.601 UTC [policies] Evaluate -> DEBU d61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:30:59.601 UTC [policies] Evaluate -> DEBU d62 Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:59.602 UTC [policies] Evaluate -> DEBU d63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:30:59.603 UTC [policies] Evaluate -> DEBU d64 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:59.603 UTC [policies] Evaluate -> DEBU d65 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:30:59.604 UTC [orderer.common.blockcutter] Ordered -> DEBU d66 Enqueuing message into batch" -orderer0.example.com | "2019-05-02 01:30:59.604 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d67 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47392" -orderer0.example.com | "2019-05-02 01:31:00.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d68 Sending msg of 28 bytes to 2 on channel businesschannel took 103.9µs" -orderer0.example.com | "2019-05-02 01:31:00.044 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d69 Sending msg of 28 bytes to 3 on channel businesschannel took 107.8µs" -orderer0.example.com | "2019-05-02 01:31:00.049 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 335µs " -orderer0.example.com | "2019-05-02 01:31:00.050 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 522.8µs " -orderer0.example.com | "2019-05-02 01:31:00.055 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:00.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:00.060 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6e Sending msg of 28 bytes to 3 on channel testchainid took 38.8µs" -orderer0.example.com | "2019-05-02 01:31:00.061 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182.7µs " -peer0.org1.example.com | "2019-05-02 01:30:52.907 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cd3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:52.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cd4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:52.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cd5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:52.908 UTC [policies] Evaluate -> DEBU cd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:52.908 UTC [policies] Evaluate -> DEBU cd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:52.908 UTC [policies] Evaluate -> DEBU cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:52.909 UTC [cauthdsl] func1 -> DEBU cd9 0xc002621300 gate 1556760652909100500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:52.909 UTC [cauthdsl] func2 -> DEBU cda 0xc002621300 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:52.909 UTC [cauthdsl] func2 -> DEBU cdb 0xc002621300 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:52.910 UTC [cauthdsl] func2 -> DEBU cdc 0xc002621300 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:52.910 UTC [msp.identity] Verify -> DEBU cdd Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:30:52.911 UTC [msp.identity] Verify -> DEBU cde Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU cdf 0xc002621300 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:52.912 UTC [cauthdsl] func1 -> DEBU ce0 0xc002621300 gate 1556760652909100500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:52.912 UTC [policies] Evaluate -> DEBU ce1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.913 UTC [policies] Evaluate -> DEBU ce2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.913 UTC [policies] Evaluate -> DEBU ce3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.913 UTC [policies] Evaluate -> DEBU ce4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:52.914 UTC [gossip.gossip] handleMessage -> DEBU ce5 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:52.914 UTC [gossip.gossip] handleMessage -> DEBU ce6 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17816125704214259142 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.914 UTC [gossip.pull] HandleMessage -> DEBU ce7 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17816125704214259142 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:52.915 UTC [gossip.gossip] handleMessage -> DEBU ce8 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.125 UTC [gossip.gossip] handleMessage -> DEBU ce9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.125 UTC [msp] DeserializeIdentity -> DEBU cea Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.126 UTC [msp] DeserializeIdentity -> DEBU ceb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.126 UTC [gossip.gossip] handleMessage -> DEBU cec Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.132 UTC [gossip.gossip] handleMessage -> DEBU ced Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.133 UTC [gossip.pull] HandleMessage -> DEBU cee GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.133 UTC [gossip.pull] SendDigest -> DEBU cef Sending BLOCK_MSG digest: [1 2] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:53.134 UTC [gossip.gossip] handleMessage -> DEBU cf0 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.363 UTC [gossip.comm] func1 -> DEBU cf1 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-05-02 01:31:00.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d70 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:00.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 2 on channel businesschannel took 37.8µs" -orderer0.example.com | "2019-05-02 01:31:00.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d73 Sending msg of 28 bytes to 3 on channel businesschannel took 54.6µs" -orderer0.example.com | "2019-05-02 01:31:00.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 286.6µs " -orderer0.example.com | "2019-05-02 01:31:00.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU d74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.8µs " -orderer0.example.com | "2019-05-02 01:31:00.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU d75 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:00.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU d76 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:00.548 UTC [orderer.common.cluster.step] handleMessage -> DEBU d77 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:00.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d78 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" -orderer0.example.com | "2019-05-02 01:31:00.549 UTC [orderer.common.cluster.step] sendMessage -> DEBU d79 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.3µs " -orderer0.example.com | "2019-05-02 01:31:00.734 UTC [orderer.common.server] replicateDisabledChains -> DEBU d7a No inactive chains to try to replicate" -orderer0.example.com | "2019-05-02 01:31:01.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7b Sending msg of 28 bytes to 2 on channel businesschannel took 39.4µs" -orderer0.example.com | "2019-05-02 01:31:01.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7c Sending msg of 28 bytes to 3 on channel businesschannel took 26.3µs" -orderer0.example.com | "2019-05-02 01:31:01.044 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.5µs " -orderer0.example.com | "2019-05-02 01:31:01.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:01.045 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7f Sending msg of 28 bytes to 3 on channel testchainid took 28.7µs" -orderer0.example.com | "2019-05-02 01:31:01.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU d81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.1µs " -orderer0.example.com | "2019-05-02 01:31:01.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU d80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 855.5µs " -orderer0.example.com | "2019-05-02 01:31:01.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU d82 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:01.048 UTC [orderer.common.cluster.step] handleMessage -> DEBU d83 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:01.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.4µs " -orderer0.example.com | "2019-05-02 01:31:01.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d85 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" -orderer0.example.com | "2019-05-02 01:31:01.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d86 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" -orderer0.example.com | "2019-05-02 01:31:01.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192.6µs " -orderer0.example.com | "2019-05-02 01:31:01.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU d88 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:01.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU d89 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:01.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8a Sending msg of 28 bytes to 3 on channel testchainid took 546.8µs" -orderer0.example.com | "2019-05-02 01:31:01.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:01.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 227.5µs " -orderer0.example.com | "2019-05-02 01:31:01.606 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d8d Batch timer expired, creating block" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:01.607 UTC [orderer.consensus.etcdraft] propose -> INFO d8e Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:01.608 UTC [orderer.consensus.etcdraft] 2 -> DEBU d8f Proposed block [4] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:01.611 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d90 Sending msg of 3830 bytes to 3 on channel businesschannel took 17.4µs" -orderer0.example.com | "2019-05-02 01:31:01.611 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d91 Sending msg of 3830 bytes to 2 on channel businesschannel took 9.9µs" -orderer0.example.com | "2019-05-02 01:31:01.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU d92 Send of ConsensusRequest for channel businesschannel with payload of size 3830 to orderer2.example.com(orderer2.example.com:7050) took 257.2µs " -orderer0.example.com | "2019-05-02 01:31:01.612 UTC [orderer.common.cluster.step] sendMessage -> DEBU d93 Send of ConsensusRequest for channel businesschannel with payload of size 3830 to orderer1.example.com(orderer1.example.com:7050) took 583.4µs " -orderer0.example.com | "2019-05-02 01:31:01.617 UTC [orderer.common.cluster.step] handleMessage -> DEBU d94 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:01.617 UTC [orderer.common.cluster.step] handleMessage -> DEBU d95 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:01.617 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d96 Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" -orderer0.example.com | "2019-05-02 01:31:01.618 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d97 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" -orderer0.example.com | "2019-05-02 01:31:01.618 UTC [orderer.common.cluster.step] sendMessage -> DEBU d98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 729.7µs " -orderer0.example.com | "2019-05-02 01:31:01.618 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 345.3µs " -orderer0.example.com | "2019-05-02 01:31:01.619 UTC [orderer.consensus.etcdraft] writeBlock -> INFO d9a Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:01.619 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU d9b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-05-02 01:31:01.620 UTC [msp.identity] Sign -> DEBU d9c Sign: plaintext: 0A020802120B0A090A03010203100418...9BE696F5C828F8957916E872A6B976DF " -orderer0.example.com | "2019-05-02 01:31:01.620 UTC [msp.identity] Sign -> DEBU d9d Sign: digest: 0B08D20E0E46085B67CA3888DA384E32446C1B0E25B5119CA851F1DEF393BF4F " -orderer0.example.com | "2019-05-02 01:31:01.622 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:01.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:01.628 UTC [fsblkstorage] indexBlock -> DEBU da0 Indexing block [blockNum=4, blockHash=[]byte{0xf8, 0xa9, 0x4a, 0x62, 0xdc, 0x56, 0x89, 0xf, 0xb2, 0x6c, 0xee, 0x66, 0x95, 0x3d, 0x66, 0xa0, 0xae, 0x6d, 0x16, 0xd3, 0x60, 0x8f, 0x39, 0x0, 0x9b, 0xa7, 0xeb, 0x99, 0xf4, 0xfb, 0x35, 0xcf} txOffsets= -orderer0.example.com | txId=cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885 locPointer=offset=70, bytesLength=3704 +orderer0.example.com | "2019-05-02 09:27:30.467 UTC [cauthdsl] func1 -> DEBU ca6 0xc00026d9b0 gate 1556789250467801700 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:30.468 UTC [cauthdsl] func2 -> DEBU ca7 0xc00026d9b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:30.468 UTC [cauthdsl] func2 -> DEBU ca8 0xc00026d9b0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:30.469 UTC [cauthdsl] func2 -> DEBU ca9 0xc00026d9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-05-02 09:27:30.469 UTC [cauthdsl] func2 -> DEBU caa 0xc00026d9b0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:30.469 UTC [cauthdsl] func1 -> DEBU cab 0xc00026d9b0 gate 1556789250467801700 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:30.470 UTC [policies] Evaluate -> DEBU cac Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:24.811 UTC [msp.identity] Verify -> DEBU b28 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +peer0.org1.example.com | "2019-05-02 09:27:24.812 UTC [msp.identity] Verify -> DEBU b29 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +peer0.org1.example.com | "2019-05-02 09:27:24.812 UTC [cauthdsl] func2 -> DEBU b2a 0xc002216f40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.813 UTC [cauthdsl] func1 -> DEBU b2b 0xc002216f40 gate 1556789244810380700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:24.813 UTC [policies] Evaluate -> DEBU b2c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.813 UTC [policies] Evaluate -> DEBU b2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.813 UTC [policies] Evaluate -> DEBU b2e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.814 UTC [policies] Evaluate -> DEBU b2f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.814 UTC [msp] DeserializeIdentity -> DEBU b30 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.814 UTC [gossip.gossip] handleMessage -> DEBU b31 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.815 UTC [gossip.gossip] handleMessage -> DEBU b32 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789242989438000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.815 UTC [msp] DeserializeIdentity -> DEBU b33 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.816 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b34 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:24.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b35 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b36 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.817 UTC [policies] Evaluate -> DEBU b37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.817 UTC [policies] Evaluate -> DEBU b38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:24.817 UTC [policies] Evaluate -> DEBU b39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.817 UTC [cauthdsl] func1 -> DEBU b3a 0xc002238bb0 gate 1556789244817836900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.818 UTC [cauthdsl] func2 -> DEBU b3b 0xc002238bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.818 UTC [cauthdsl] func2 -> DEBU b3c 0xc002238bb0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.818 UTC [cauthdsl] func2 -> DEBU b3d 0xc002238bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:24.819 UTC [cauthdsl] func2 -> DEBU b3e 0xc002238bb0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.819 UTC [cauthdsl] func1 -> DEBU b3f 0xc002238bb0 gate 1556789244817836900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.819 UTC [policies] Evaluate -> DEBU b40 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.819 UTC [policies] Evaluate -> DEBU b41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.820 UTC [policies] Evaluate -> DEBU b42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.820 UTC [cauthdsl] func1 -> DEBU b43 0xc002239400 gate 1556789244820399100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.820 UTC [cauthdsl] func2 -> DEBU b44 0xc002239400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.820 UTC [cauthdsl] func2 -> DEBU b45 0xc002239400 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.821 UTC [cauthdsl] func2 -> DEBU b46 0xc002239400 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.821 UTC [msp.identity] Verify -> DEBU b47 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +peer0.org1.example.com | "2019-05-02 09:27:24.822 UTC [msp.identity] Verify -> DEBU b48 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +orderer0.example.com | "2019-05-02 09:27:30.471 UTC [policies] Evaluate -> DEBU cad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:30.471 UTC [policies] Evaluate -> DEBU cae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:30.471 UTC [cauthdsl] func1 -> DEBU caf 0xc000280da0 gate 1556789250471780600 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:30.472 UTC [cauthdsl] func2 -> DEBU cb0 0xc000280da0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:30.472 UTC [cauthdsl] func2 -> DEBU cb1 0xc000280da0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:30.472 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cb2 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-05-02 09:27:30.473 UTC [msp] Validate -> DEBU cb3 MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:27:30.474 UTC [msp] getCertificationChain -> DEBU cb4 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:27:30.474 UTC [cauthdsl] func2 -> DEBU cb5 0xc000280da0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:30.475 UTC [msp.identity] Verify -> DEBU cb6 Verify: digest = 00000000 5f f7 a9 77 bb 08 23 e9 79 a3 1a 5a 4b df bf 14 |_..w..#.y..ZK...| +orderer0.example.com | 00000010 0b ee 78 cb 24 b7 9b 4f 26 45 ee c7 3a c5 0a 72 |..x.$..O&E..:..r|" +orderer0.example.com | "2019-05-02 09:27:30.475 UTC [msp.identity] Verify -> DEBU cb7 Verify: sig = 00000000 30 44 02 20 42 94 36 89 e4 a8 e8 1f d1 03 2c 54 |0D. B.6.......,T| +orderer0.example.com | 00000010 08 33 49 2c a0 e6 9d e2 4e 10 2f f4 03 8f 1f 07 |.3I,....N./.....| +orderer0.example.com | 00000020 ef 9a af 12 02 20 29 ad 5f 1b 8d e8 b0 33 a5 20 |..... )._....3. | +orderer0.example.com | 00000030 ae 2d 97 79 ba c1 a3 a1 b6 f2 f7 62 cc b3 74 f4 |.-.y.......b..t.| +orderer0.example.com | 00000040 91 85 a0 fa 29 4d |....)M|" +orderer0.example.com | "2019-05-02 09:27:30.476 UTC [cauthdsl] func2 -> DEBU cb8 0xc000280da0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:30.477 UTC [cauthdsl] func1 -> DEBU cb9 0xc000280da0 gate 1556789250471780600 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:30.477 UTC [policies] Evaluate -> DEBU cba Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:30.477 UTC [policies] Evaluate -> DEBU cbb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:30.478 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:30.478 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:30.478 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:30.479 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:30.479 UTC [orderer.common.blockcutter] Ordered -> DEBU cc0 Enqueuing message into batch" +orderer0.example.com | "2019-05-02 09:27:30.479 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cc1 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57260" +orderer0.example.com | "2019-05-02 09:27:30.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc2 Sending msg of 28 bytes to 2 on channel businesschannel took 92.8µs" +orderer0.example.com | "2019-05-02 09:27:30.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc3 Sending msg of 28 bytes to 3 on channel businesschannel took 83.4µs" +orderer0.example.com | "2019-05-02 09:27:30.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 284.8µs " +orderer0.example.com | "2019-05-02 09:27:30.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.7µs " +orderer0.example.com | "2019-05-02 09:27:30.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:30.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:30.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:30.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc9 Sending msg of 28 bytes to 3 on channel testchainid took 28.4µs" +orderer0.example.com | "2019-05-02 09:27:30.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU cca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.3µs " +orderer0.example.com | "2019-05-02 09:27:30.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccb Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-05-02 09:27:30.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccc Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs" +orderer0.example.com | "2019-05-02 09:27:30.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172µs " +orderer0.example.com | "2019-05-02 09:27:30.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU cce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6002ms " +orderer0.example.com | "2019-05-02 09:27:30.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:30.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:31.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:31.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd2 Sending msg of 28 bytes to 3 on channel testchainid took 55.9µs" +orderer0.example.com | "2019-05-02 09:27:31.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs " +orderer0.example.com | "2019-05-02 09:27:31.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd4 Sending msg of 28 bytes to 2 on channel businesschannel took 42.8µs" +orderer0.example.com | "2019-05-02 09:27:31.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd5 Sending msg of 28 bytes to 3 on channel businesschannel took 31.6µs" +orderer0.example.com | "2019-05-02 09:27:31.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 213.9µs " +orderer0.example.com | "2019-05-02 09:27:31.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5292ms " +peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +peer0.org1.example.com | "2019-05-02 09:27:24.822 UTC [cauthdsl] func2 -> DEBU b49 0xc002239400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.823 UTC [cauthdsl] func1 -> DEBU b4a 0xc002239400 gate 1556789244820399100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:24.823 UTC [policies] Evaluate -> DEBU b4b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.823 UTC [policies] Evaluate -> DEBU b4c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.824 UTC [policies] Evaluate -> DEBU b4d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.824 UTC [policies] Evaluate -> DEBU b4e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.825 UTC [msp] DeserializeIdentity -> DEBU b4f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.825 UTC [gossip.gossip] handleMessage -> DEBU b50 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.830 UTC [gossip.comm] func1 -> DEBU b51 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.831 UTC [gossip.gossip] handleMessage -> DEBU b52 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.831 UTC [gossip.pull] HandleMessage -> DEBU b53 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.832 UTC [msp] DeserializeIdentity -> DEBU b54 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.832 UTC [msp] DeserializeIdentity -> DEBU b55 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.832 UTC [gossip.pull] SendDigest -> DEBU b56 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:24.833 UTC [gossip.gossip] handleMessage -> DEBU b57 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.847 UTC [gossip.comm] func1 -> DEBU b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.847 UTC [gossip.gossip] handleMessage -> DEBU b59 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.847 UTC [gossip.gossip] handleMessage -> DEBU b5a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU b5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b5c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:24.851 UTC [msp] DeserializeIdentity -> DEBU b5d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.852 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b5e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:24.852 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b5f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.853 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b60 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:24.853 UTC [policies] Evaluate -> DEBU b61 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.853 UTC [policies] Evaluate -> DEBU b62 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:31.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:31.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:31.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU cda Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:31.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdb Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +orderer0.example.com | "2019-05-02 09:27:31.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 340.2µs " +orderer0.example.com | "2019-05-02 09:27:31.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.1µs " +orderer0.example.com | "2019-05-02 09:27:31.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cde Sending msg of 28 bytes to 2 on channel businesschannel took 36.6µs" +orderer0.example.com | "2019-05-02 09:27:31.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdf Sending msg of 28 bytes to 3 on channel businesschannel took 25.2µs" +orderer0.example.com | "2019-05-02 09:27:31.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +orderer0.example.com | "2019-05-02 09:27:31.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:31.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:32.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:32.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce4 Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" +orderer0.example.com | "2019-05-02 09:27:32.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 309.9µs " +orderer0.example.com | "2019-05-02 09:27:32.481 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU ce6 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:32.481 UTC [orderer.consensus.etcdraft] propose -> INFO ce7 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:32.481 UTC [orderer.consensus.etcdraft] 2 -> DEBU ce8 Proposed block [4] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:32.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce9 Sending msg of 3829 bytes to 2 on channel businesschannel took 22.4µs" +orderer0.example.com | "2019-05-02 09:27:32.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cea Sending msg of 3829 bytes to 3 on channel businesschannel took 19.4µs" +orderer0.example.com | "2019-05-02 09:27:32.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU ceb Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs " +orderer0.example.com | "2019-05-02 09:27:32.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU cec Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer1.example.com(orderer1.example.com:7050) took 321µs " +orderer0.example.com | "2019-05-02 09:27:32.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ced Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs" +orderer0.example.com | "2019-05-02 09:27:32.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cee Sending msg of 28 bytes to 3 on channel businesschannel took 155.4µs" +orderer0.example.com | "2019-05-02 09:27:32.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU cef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2069ms " +orderer0.example.com | "2019-05-02 09:27:32.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.9µs " +orderer0.example.com | "2019-05-02 09:27:32.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:32.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:32.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:32.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf4 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +orderer0.example.com | "2019-05-02 09:27:32.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 3 on channel businesschannel took 99.1µs" +orderer0.example.com | "2019-05-02 09:27:32.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " +orderer0.example.com | "2019-05-02 09:27:32.494 UTC [orderer.consensus.etcdraft] writeBlock -> INFO cf7 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:32.495 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cf8 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-05-02 09:27:32.495 UTC [msp.identity] Sign -> DEBU cf9 Sign: plaintext: 0A020802120B0A090A03010203100418...E02EDFA4D45B9D6BFDE5AB324DC39AA4 " +orderer0.example.com | "2019-05-02 09:27:32.495 UTC [msp.identity] Sign -> DEBU cfa Sign: digest: 09950A335BFF8CDB28DBD69079831BFC246A8BDC8347AB8D99A66E1A279D884C " +orderer0.example.com | "2019-05-02 09:27:32.496 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.6µs " +orderer0.example.com | "2019-05-02 09:27:32.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:32.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:32.501 UTC [fsblkstorage] indexBlock -> DEBU cfe Indexing block [blockNum=4, blockHash=[]byte{0x3f, 0x8b, 0xa1, 0x1f, 0x8f, 0x88, 0xc1, 0xba, 0x58, 0x69, 0x5b, 0x7b, 0xae, 0x78, 0x89, 0x9c, 0xeb, 0xc3, 0x4b, 0xbf, 0x99, 0xfe, 0xf3, 0x9e, 0xef, 0xe7, 0xb4, 0x8a, 0xe5, 0xe4, 0xa4, 0x51} txOffsets= +peer0.org1.example.com | "2019-05-02 09:27:24.854 UTC [policies] Evaluate -> DEBU b63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.855 UTC [cauthdsl] func1 -> DEBU b64 0xc002255bc0 gate 1556789244855458800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.855 UTC [cauthdsl] func2 -> DEBU b65 0xc002255bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.856 UTC [cauthdsl] func2 -> DEBU b66 0xc002255bc0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.856 UTC [cauthdsl] func2 -> DEBU b67 0xc002255bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:24.856 UTC [cauthdsl] func2 -> DEBU b68 0xc002255bc0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.856 UTC [cauthdsl] func1 -> DEBU b69 0xc002255bc0 gate 1556789244855458800 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [policies] Evaluate -> DEBU b6a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [policies] Evaluate -> DEBU b6b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [policies] Evaluate -> DEBU b6c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [cauthdsl] func1 -> DEBU b6d 0xc0022ab3a0 gate 1556789244857139100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [cauthdsl] func2 -> DEBU b6e 0xc0022ab3a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [cauthdsl] func2 -> DEBU b6f 0xc0022ab3a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [cauthdsl] func2 -> DEBU b70 0xc0022ab3a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.857 UTC [msp.identity] Verify -> DEBU b71 Verify: digest = 00000000 60 aa 71 04 ab 45 98 fb 6b 87 6e 67 16 55 ae dc |`.q..E..k.ng.U..| +peer0.org1.example.com | 00000010 0f 96 44 41 8a 33 d1 0e 05 83 37 05 bb 02 51 24 |..DA.3....7...Q$|" +peer0.org1.example.com | "2019-05-02 09:27:24.866 UTC [msp.identity] Verify -> DEBU b72 Verify: sig = 00000000 30 44 02 20 0e e0 44 83 d8 00 43 6d 24 fe e5 21 |0D. ..D...Cm$..!| +peer0.org1.example.com | 00000010 5d 5d a6 72 e5 7f 6c 83 73 7f a7 4e e5 50 d7 13 |]].r..l.s..N.P..| +peer0.org1.example.com | 00000020 2d 80 1f 3f 02 20 31 ab db 4e 63 bf 89 c2 c2 79 |-..?. 1..Nc....y| +peer0.org1.example.com | 00000030 f4 15 3f 8e 3d 02 b8 6a fb 3e d4 62 16 61 cf ab |..?.=..j.>.b.a..| +peer0.org1.example.com | 00000040 42 30 64 b5 7c 5a |B0d.|Z|" +peer0.org1.example.com | "2019-05-02 09:27:24.866 UTC [cauthdsl] func2 -> DEBU b73 0xc0022ab3a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:24.866 UTC [cauthdsl] func1 -> DEBU b74 0xc0022ab3a0 gate 1556789244857139100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b75 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b76 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b77 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b78 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [gossip.discovery] handleAliveMessage -> DEBU b79 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [gossip.discovery] learnExistingMembers -> DEBU b7a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:24.867 UTC [gossip.discovery] learnExistingMembers -> DEBU b7b updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 " +peer0.org1.example.com | "2019-05-02 09:27:24.868 UTC [gossip.discovery] learnExistingMembers -> DEBU b7c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 " +peer0.org1.example.com | "2019-05-02 09:27:24.868 UTC [gossip.discovery] learnExistingMembers -> DEBU b7d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:24.868 UTC [gossip.discovery] learnExistingMembers -> DEBU b7e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.868 UTC [gossip.discovery] handleAliveMessage -> DEBU b7f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU b80 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:24.869 UTC [gossip.discovery] sendMemResponse -> DEBU b81 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:24.869 UTC [msp] DeserializeIdentity -> DEBU b82 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.869 UTC [msp] DeserializeIdentity -> DEBU b83 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.870 UTC [msp] DeserializeIdentity -> DEBU b84 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:24.870 UTC [gossip.comm] Send -> DEBU b85 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:24.870 UTC [gossip.discovery] sendMemResponse -> DEBU b86 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:24.870 UTC [gossip.comm] sendToEndpoint -> DEBU b87 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:24.871 UTC [gossip.comm] sendToEndpoint -> DEBU b88 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.016 UTC [gossip.comm] func1 -> DEBU b89 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.016 UTC [gossip.gossip] handleMessage -> DEBU b8a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.016 UTC [msp] DeserializeIdentity -> DEBU b8b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.017 UTC [msp] DeserializeIdentity -> DEBU b8c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.017 UTC [msp] DeserializeIdentity -> DEBU b8d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.017 UTC [gossip.gossip] handleMessage -> DEBU b8e Exiting" +orderer0.example.com | txId=fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd locPointer=offset=70, bytesLength=3703 orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:31:01.631 UTC [fsblkstorage] updateCheckpoint -> DEBU da1 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80793], isChainEmpty=[false], lastBlockNumber=[4]" -orderer0.example.com | "2019-05-02 01:31:01.631 UTC [fsblkstorage] waitForBlock -> DEBU da2 Came out of wait. maxAvailaBlockNumber=[4]" -orderer0.example.com | "2019-05-02 01:31:01.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU da3 Remaining bytes=[4711], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:01.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU da4 Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" -orderer0.example.com | "2019-05-02 01:31:01.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU da5 blockbytes [4709] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:01.633 UTC [common.deliver] deliverBlocks -> DEBU da6 [channel: businesschannel] Delivering block [4] for (0xc0008bfb80) for 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:31:01.634 UTC [fsblkstorage] waitForBlock -> DEBU da7 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" -orderer0.example.com | "2019-05-02 01:31:01.631 UTC [orderer.commmon.multichannel] commitBlock -> DEBU da8 [channel: businesschannel] Wrote block [4]" -orderer0.example.com | "2019-05-02 01:31:01.689 UTC [grpc] infof -> DEBU da9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:01.690 UTC [orderer.common.broadcast] Handle -> WARN daa Error reading from 192.168.240.9:47392: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:01.690 UTC [orderer.common.server] func1 -> DEBU dab Closing Broadcast stream" -orderer0.example.com | "2019-05-02 01:31:01.690 UTC [comm.grpc.server] 1 -> INFO dac streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47392 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1151715s -orderer0.example.com | "2019-05-02 01:31:02.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dad Sending msg of 28 bytes to 2 on channel businesschannel took 71.7µs" -orderer0.example.com | "2019-05-02 01:31:02.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dae Sending msg of 28 bytes to 3 on channel businesschannel took 29.1µs" -orderer0.example.com | "2019-05-02 01:31:02.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU daf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 233.3µs " -orderer0.example.com | "2019-05-02 01:31:02.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU db0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.1µs " -orderer0.example.com | "2019-05-02 01:31:02.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU db1 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:02.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU db2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:02.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU db3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -peer0.org1.example.com | "2019-05-02 01:30:53.363 UTC [gossip.gossip] handleMessage -> DEBU cf2 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.363 UTC [msp] DeserializeIdentity -> DEBU cf3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.363 UTC [msp] DeserializeIdentity -> DEBU cf4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.364 UTC [msp] DeserializeIdentity -> DEBU cf5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.364 UTC [gossip.gossip] handleMessage -> DEBU cf6 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.475 UTC [gossip.gossip] handleMessage -> DEBU cf7 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.475 UTC [gossip.pull] HandleMessage -> DEBU cf8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.476 UTC [gossip.pull] SendDigest -> DEBU cf9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:53.476 UTC [gossip.gossip] handleMessage -> DEBU cfa Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.476 UTC [gossip.gossip] handleMessage -> DEBU cfb Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.476 UTC [gossip.gossip] handleMessage -> DEBU cfc Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.477 UTC [gossip.gossip] handleMessage -> DEBU cfd Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.477 UTC [gossip.discovery] handleMsgFromComm -> DEBU cfe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.477 UTC [gossip.gossip] ValidateAliveMsg -> DEBU cff Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:53.478 UTC [msp.identity] Verify -> DEBU d00 Verify: digest = 00000000 f9 f2 78 69 52 44 10 3e 3f 80 96 bb 88 64 e6 e3 |..xiRD.>?....d..| -peer0.org1.example.com | 00000010 78 8d b4 bb a2 9a dd 5f fe f1 d7 3e c7 15 bf 87 |x......_...>....|" -peer0.org1.example.com | "2019-05-02 01:30:53.478 UTC [msp.identity] Verify -> DEBU d01 Verify: sig = 00000000 30 44 02 20 08 9d ee 3b 10 06 ba 32 1b 49 6f 85 |0D. ...;...2.Io.| -peer0.org1.example.com | 00000010 11 84 9e e0 f8 61 96 72 b8 80 c1 61 19 26 29 07 |.....a.r...a.&).| -peer0.org1.example.com | 00000020 e0 0d 00 93 02 20 57 11 04 53 89 24 38 e8 e3 f7 |..... W..S.$8...| -peer0.org1.example.com | 00000030 8f 60 9f ef 93 d7 87 a3 4d 3e 6d c5 04 b2 dc 00 |.`......M>m.....| -peer0.org1.example.com | 00000040 81 95 5d ad 84 b0 |..]...|" -peer0.org1.example.com | "2019-05-02 01:30:53.481 UTC [msp.identity] Verify -> DEBU d02 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:53.481 UTC [msp.identity] Verify -> DEBU d03 Verify: sig = 00000000 30 45 02 21 00 d5 04 b8 d5 db 6d 0f 97 78 5b 70 |0E.!......m..x[p| -peer0.org1.example.com | 00000010 a2 d8 91 98 77 67 4e c2 49 bb 2a aa 48 20 ac b1 |....wgN.I.*.H ..| -peer0.org1.example.com | 00000020 c8 bf 28 85 57 02 20 1f 0d 63 fc 7f ea b1 f1 1c |..(.W. ..c......| -peer0.org1.example.com | 00000030 26 81 de e1 28 9c 0c c7 dc 5c 4e 9d 47 5c f6 e8 |&...(....\N.G\..| -peer0.org1.example.com | 00000040 f1 39 5f 74 89 4e eb |.9_t.N.|" -peer0.org1.example.com | "2019-05-02 01:30:53.482 UTC [gossip.discovery] handleAliveMessage -> DEBU d04 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.482 UTC [gossip.discovery] learnExistingMembers -> DEBU d05 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:53.484 UTC [gossip.discovery] learnExistingMembers -> DEBU d06 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 " -peer0.org1.example.com | "2019-05-02 01:30:53.488 UTC [gossip.discovery] learnExistingMembers -> DEBU d07 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 " -peer0.org1.example.com | "2019-05-02 01:30:53.488 UTC [gossip.discovery] learnExistingMembers -> DEBU d08 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:53.489 UTC [gossip.discovery] learnExistingMembers -> DEBU d09 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.489 UTC [gossip.discovery] handleAliveMessage -> DEBU d0a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.490 UTC [gossip.discovery] handleMsgFromComm -> DEBU d0b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU d0c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -orderer0.example.com | "2019-05-02 01:31:02.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db4 Sending msg of 28 bytes to 3 on channel testchainid took 26.7µs" -orderer0.example.com | "2019-05-02 01:31:02.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU db5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.5µs " -orderer0.example.com | "2019-05-02 01:31:02.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db6 Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" -orderer0.example.com | "2019-05-02 01:31:02.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db7 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" -orderer0.example.com | "2019-05-02 01:31:02.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU db9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.2µs " -orderer0.example.com | "2019-05-02 01:31:02.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU db8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 302.2µs " -orderer0.example.com | "2019-05-02 01:31:02.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU dba Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:02.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbb Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:02.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbc Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:02.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbd Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" -peer0.org1.example.com | "2019-05-02 01:30:53.491 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d0d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:53.492 UTC [msp.identity] Verify -> DEBU d0e Verify: digest = 00000000 65 e8 1b 99 e9 bb a2 eb 7b 7f c0 41 e9 73 48 cb |e.......{..A.sH.| -peer0.org1.example.com | 00000010 c2 10 5f 27 86 84 63 26 cc 38 00 31 ba e5 71 41 |.._'..c&.8.1..qA|" -peer0.org1.example.com | "2019-05-02 01:30:53.493 UTC [gossip.gossip] handleMessage -> DEBU d0f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.493 UTC [msp.identity] Verify -> DEBU d10 Verify: sig = 00000000 30 45 02 21 00 af 10 6c e9 76 9b dc 98 a5 7c e7 |0E.!...l.v....|.| -peer0.org1.example.com | 00000010 1f 29 df 34 50 a0 d0 6f c9 ba f2 01 2d 2b 33 8c |.).4P..o....-+3.| -peer0.org1.example.com | 00000020 34 0c b2 f0 69 02 20 26 e4 ff b4 38 ff 76 e2 d9 |4...i. &...8.v..| -peer0.org1.example.com | 00000030 85 4a 34 cd bb b1 84 50 75 a3 23 07 62 d8 e6 2f |.J4....Pu.#.b../| -peer0.org1.example.com | 00000040 e0 70 44 af de 4f b7 |.pD..O.|" -peer0.org1.example.com | "2019-05-02 01:30:53.495 UTC [msp.identity] Verify -> DEBU d11 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:53.495 UTC [msp.identity] Verify -> DEBU d12 Verify: sig = 00000000 30 45 02 21 00 96 80 f2 b0 b1 f2 c8 67 cc 54 84 |0E.!........g.T.| -peer0.org1.example.com | 00000010 c6 25 0c f2 09 8c 69 af 56 ba 9f 8b 3e 45 89 c4 |.%....i.V...>E..| -peer0.org1.example.com | 00000020 05 a5 32 e1 85 02 20 2b eb 1a b6 92 ec bb 55 6b |..2... +......Uk| -peer0.org1.example.com | 00000030 25 33 54 92 ca c2 43 a9 6a 67 e7 18 77 b6 cf 8f |%3T...C.jg..w...| -peer0.org1.example.com | 00000040 31 d3 74 4f a6 d3 35 |1.tO..5|" -peer0.org1.example.com | "2019-05-02 01:30:53.496 UTC [gossip.discovery] handleAliveMessage -> DEBU d13 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.497 UTC [gossip.discovery] handleAliveMessage -> DEBU d14 got old alive message about alive peer Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 lastAliveTS: 1556760633448248700, 23 but got ts: inc_num:1556760633448248700 seq_num:22 " -peer0.org1.example.com | "2019-05-02 01:30:53.497 UTC [gossip.discovery] handleAliveMessage -> DEBU d15 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.497 UTC [gossip.discovery] handleMsgFromComm -> DEBU d16 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.494 UTC [gossip.discovery] sendMemResponse -> DEBU d17 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:53.499 UTC [msp] DeserializeIdentity -> DEBU d18 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.500 UTC [gossip.comm] func1 -> DEBU d19 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.500 UTC [gossip.gossip] handleMessage -> DEBU d1a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.501 UTC [gossip.gossip] handleMessage -> DEBU d1b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.502 UTC [gossip.discovery] handleMsgFromComm -> DEBU d1c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.502 UTC [gossip.discovery] handleMsgFromComm -> DEBU d1d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.504 UTC [gossip.comm] func1 -> DEBU d1e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.504 UTC [gossip.gossip] handleMessage -> DEBU d1f Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.505 UTC [gossip.gossip] handleMessage -> DEBU d20 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.506 UTC [gossip.discovery] handleMsgFromComm -> DEBU d21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.507 UTC [gossip.discovery] handleMsgFromComm -> DEBU d22 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.508 UTC [msp] DeserializeIdentity -> DEBU d23 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.508 UTC [msp] DeserializeIdentity -> DEBU d24 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.509 UTC [msp] DeserializeIdentity -> DEBU d25 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.510 UTC [msp] DeserializeIdentity -> DEBU d26 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.510 UTC [gossip.comm] Send -> DEBU d27 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.510 UTC [msp] DeserializeIdentity -> DEBU d28 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.509 UTC [gossip.comm] Send -> DEBU d29 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.511 UTC [gossip.discovery] sendMemResponse -> DEBU d2c Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:53.512 UTC [gossip.comm] sendToEndpoint -> DEBU d2d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.511 UTC [gossip.comm] sendToEndpoint -> DEBU d2b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.512 UTC [gossip.comm] sendToEndpoint -> DEBU d2e Exiting" -orderer0.example.com | "2019-05-02 01:31:02.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.9µs " -orderer0.example.com | "2019-05-02 01:31:03.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbf Sending msg of 28 bytes to 3 on channel businesschannel took 32.6µs" -orderer0.example.com | "2019-05-02 01:31:03.046 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:03.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 822.5µs " -orderer0.example.com | "2019-05-02 01:31:03.046 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:03.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc3 Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" -orderer0.example.com | "2019-05-02 01:31:03.047 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.3µs " -orderer0.example.com | "2019-05-02 01:31:03.048 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc5 Sending msg of 28 bytes to 3 on channel testchainid took 26.7µs" -orderer0.example.com | "2019-05-02 01:31:03.049 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 818.3µs " -orderer0.example.com | "2019-05-02 01:31:03.050 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc7 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:03.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc8 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" -orderer0.example.com | "2019-05-02 01:31:03.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc9 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" -orderer0.example.com | "2019-05-02 01:31:03.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU dca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 284.4µs " -orderer0.example.com | "2019-05-02 01:31:03.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 454.5µs " -orderer0.example.com | "2019-05-02 01:31:03.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcc Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:03.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcd Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:03.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:03.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcf Sending msg of 28 bytes to 3 on channel testchainid took 99µs" -orderer0.example.com | "2019-05-02 01:31:03.555 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.8868ms " -orderer0.example.com | "2019-05-02 01:31:03.654 UTC [orderer.common.server] Broadcast -> DEBU dd1 Starting new Broadcast handler" -orderer0.example.com | "2019-05-02 01:31:03.654 UTC [orderer.common.broadcast] Handle -> DEBU dd2 Starting new broadcast loop for 192.168.240.9:47414" -orderer0.example.com | "2019-05-02 01:31:03.708 UTC [orderer.common.broadcast] ProcessMessage -> DEBU dd3 [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47414 with txid 'c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf' of type ENDORSER_TRANSACTION" -orderer0.example.com | "2019-05-02 01:31:03.709 UTC [policies] Evaluate -> DEBU dd4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:31:03.709 UTC [policies] Evaluate -> DEBU dd5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:03.710 UTC [policies] Evaluate -> DEBU dd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:31:03.710 UTC [policies] Evaluate -> DEBU dd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:03.710 UTC [policies] Evaluate -> DEBU dd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:03.711 UTC [cauthdsl] func1 -> DEBU dd9 0xc000b99a40 gate 1556760663711080500 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:03.711 UTC [cauthdsl] func2 -> DEBU dda 0xc000b99a40 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:03.711 UTC [cauthdsl] func2 -> DEBU ddb 0xc000b99a40 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:03.712 UTC [cauthdsl] func2 -> DEBU ddc 0xc000b99a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-05-02 01:31:03.712 UTC [cauthdsl] func2 -> DEBU ddd 0xc000b99a40 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:03.712 UTC [cauthdsl] func1 -> DEBU dde 0xc000b99a40 gate 1556760663711080500 evaluation fails" -orderer0.example.com | "2019-05-02 01:31:03.713 UTC [policies] Evaluate -> DEBU ddf Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:03.713 UTC [policies] Evaluate -> DEBU de0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:03.713 UTC [policies] Evaluate -> DEBU de1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:03.714 UTC [cauthdsl] func1 -> DEBU de2 0xc000caa280 gate 1556760663714312200 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:03.714 UTC [cauthdsl] func2 -> DEBU de3 0xc000caa280 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:03.714 UTC [cauthdsl] func2 -> DEBU de4 0xc000caa280 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:03.715 UTC [cauthdsl] func2 -> DEBU de5 0xc000caa280 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:03.715 UTC [msp.identity] Verify -> DEBU de6 Verify: digest = 00000000 03 14 9e 71 a1 36 1e 2d 0f 44 72 fa 0c 27 8f 81 |...q.6.-.Dr..'..| -orderer0.example.com | 00000010 23 a1 3c e5 44 3d ed 70 77 c3 f9 01 7c 4d 36 5b |#.<.D=.pw...|M6[|" -orderer0.example.com | "2019-05-02 01:31:03.716 UTC [msp.identity] Verify -> DEBU de7 Verify: sig = 00000000 30 44 02 20 7d 9e 40 85 03 46 bf 49 0c 16 c7 f4 |0D. }.@..F.I....| -orderer0.example.com | 00000010 2d 15 37 bc 11 7e 31 6d 41 0b a4 02 37 c3 4d 4e |-.7..~1mA...7.MN| -orderer0.example.com | 00000020 67 3a 24 43 02 20 27 53 1c 1b e1 0c ef ef 89 d0 |g:$C. 'S........| -orderer0.example.com | 00000030 b0 27 77 60 0b a1 dd 73 6a a9 68 6a b4 b8 47 af |.'w`...sj.hj..G.| -orderer0.example.com | 00000040 a2 10 d6 ec 0e 1d |......|" -orderer0.example.com | "2019-05-02 01:31:03.716 UTC [cauthdsl] func2 -> DEBU de8 0xc000caa280 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:03.717 UTC [cauthdsl] func1 -> DEBU de9 0xc000caa280 gate 1556760663714312200 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:03.717 UTC [policies] Evaluate -> DEBU dea Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:03.717 UTC [policies] Evaluate -> DEBU deb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:53.549 UTC [gossip.comm] func1 -> DEBU d30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.550 UTC [gossip.gossip] handleMessage -> DEBU d31 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.551 UTC [gossip.gossip] handleMessage -> DEBU d32 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.551 UTC [gossip.discovery] handleMsgFromComm -> DEBU d33 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.552 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d34 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:53.556 UTC [msp] DeserializeIdentity -> DEBU d35 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d36 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:53.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d37 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.558 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d38 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.558 UTC [policies] Evaluate -> DEBU d39 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.559 UTC [policies] Evaluate -> DEBU d3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:53.559 UTC [policies] Evaluate -> DEBU d3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.560 UTC [cauthdsl] func1 -> DEBU d3c 0xc002c47150 gate 1556760653559991100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:53.560 UTC [cauthdsl] func2 -> DEBU d3d 0xc002c47150 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:53.560 UTC [cauthdsl] func2 -> DEBU d3e 0xc002c47150 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:53.561 UTC [cauthdsl] func2 -> DEBU d3f 0xc002c47150 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.561 UTC [msp.identity] Verify -> DEBU d40 Verify: digest = 00000000 e1 5b 31 ff a7 46 db 1c 87 66 a0 13 f9 f9 f5 0a |.[1..F...f......| -peer0.org1.example.com | 00000010 ef 52 2c 7f a6 c7 90 d1 b7 04 2d bf 33 c4 34 60 |.R,.......-.3.4`|" -peer0.org1.example.com | "2019-05-02 01:30:53.562 UTC [msp.identity] Verify -> DEBU d41 Verify: sig = 00000000 30 44 02 20 2d 51 fe 04 e3 e9 22 12 a2 14 10 80 |0D. -Q....".....| -peer0.org1.example.com | 00000010 b3 20 83 c8 36 39 20 cf d2 1c e6 62 a8 68 f5 ee |. ..69 ....b.h..| -peer0.org1.example.com | 00000020 c5 e2 f9 15 02 20 1d 68 92 a6 02 ea 7a d4 1f b1 |..... .h....z...| -peer0.org1.example.com | 00000030 f4 b5 2d a4 e4 2e bd e4 99 09 fc 07 0c 59 5b dd |..-..........Y[.| -peer0.org1.example.com | 00000040 6e 6b e3 e2 9f 00 |nk....|" -peer0.org1.example.com | "2019-05-02 01:30:53.563 UTC [cauthdsl] func2 -> DEBU d42 0xc002c47150 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:03.717 UTC [policies] Evaluate -> DEBU dec Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:03.718 UTC [policies] Evaluate -> DEBU ded == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:03.718 UTC [policies] Evaluate -> DEBU dee Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:03.718 UTC [policies] Evaluate -> DEBU def == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:03.719 UTC [orderer.common.blockcutter] Ordered -> DEBU df0 Enqueuing message into batch" -orderer0.example.com | "2019-05-02 01:31:03.719 UTC [orderer.common.broadcast] ProcessMessage -> DEBU df1 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47414" -orderer0.example.com | "2019-05-02 01:31:04.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df2 Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" -orderer0.example.com | "2019-05-02 01:31:04.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df3 Sending msg of 28 bytes to 3 on channel businesschannel took 321.1µs" -orderer0.example.com | "2019-05-02 01:31:04.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU df4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 360.7µs " -orderer0.example.com | "2019-05-02 01:31:04.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU df5 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:04.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df9 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" -orderer0.example.com | "2019-05-02 01:31:04.050 UTC [orderer.common.cluster.step] handleMessage -> DEBU df6 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:04.050 UTC [orderer.common.cluster.step] handleMessage -> DEBU df7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:04.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU df8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.1339ms " -orderer0.example.com | "2019-05-02 01:31:04.057 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.8128ms " -orderer0.example.com | "2019-05-02 01:31:04.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfb Sending msg of 28 bytes to 2 on channel businesschannel took 34.6µs" -orderer0.example.com | "2019-05-02 01:31:04.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfc Sending msg of 28 bytes to 3 on channel businesschannel took 119.4µs" -orderer0.example.com | "2019-05-02 01:31:04.548 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 689.6µs " -orderer0.example.com | "2019-05-02 01:31:04.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfe Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:04.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dff Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" -orderer0.example.com | "2019-05-02 01:31:04.550 UTC [orderer.common.cluster.step] sendMessage -> DEBU e00 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.3µs " -orderer0.example.com | "2019-05-02 01:31:04.550 UTC [orderer.common.cluster.step] handleMessage -> DEBU e01 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:04.551 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 7.7646ms " -orderer0.example.com | "2019-05-02 01:31:04.557 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e04 Sending msg of 28 bytes to 3 on channel businesschannel took 27.2µs" -orderer0.example.com | "2019-05-02 01:31:05.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU e05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 307.7µs " -orderer0.example.com | "2019-05-02 01:31:05.042 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.044 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 2 on channel businesschannel took 2.8148ms" -orderer0.example.com | "2019-05-02 01:31:05.044 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.7µs " -orderer0.example.com | "2019-05-02 01:31:05.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU e09 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.046 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.047 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0b Sending msg of 28 bytes to 3 on channel testchainid took 43.3µs" -orderer0.example.com | "2019-05-02 01:31:05.048 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.7µs " -orderer0.example.com | "2019-05-02 01:31:05.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0d Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" -orderer0.example.com | "2019-05-02 01:31:05.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0e Sending msg of 28 bytes to 3 on channel businesschannel took 31µs" -orderer0.example.com | "2019-05-02 01:31:05.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.557ms " -orderer0.example.com | "2019-05-02 01:31:05.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU e10 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.548 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" -peer0.org1.example.com | "2019-05-02 01:30:53.570 UTC [cauthdsl] func1 -> DEBU d43 0xc002c47150 gate 1556760653559991100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:53.571 UTC [policies] Evaluate -> DEBU d44 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.572 UTC [policies] Evaluate -> DEBU d47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.513 UTC [gossip.comm] sendToEndpoint -> DEBU d2f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.571 UTC [gossip.gossip] handleMessage -> DEBU d45 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.511 UTC [gossip.comm] Send -> DEBU d2a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -orderer0.example.com | "2019-05-02 01:31:05.550 UTC [orderer.common.cluster.step] sendMessage -> DEBU e12 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7526ms " -orderer0.example.com | "2019-05-02 01:31:05.550 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.9252ms " -orderer0.example.com | "2019-05-02 01:31:05.553 UTC [orderer.common.cluster.step] handleMessage -> DEBU e14 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.553 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.722 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU e16 Batch timer expired, creating block" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:05.727 UTC [orderer.consensus.etcdraft] propose -> INFO e17 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:05.735 UTC [orderer.consensus.etcdraft] 2 -> DEBU e18 Proposed block [5] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:05.869 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 4832 bytes to 2 on channel businesschannel took 24.6µs" -orderer0.example.com | "2019-05-02 01:31:05.870 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1a Send of ConsensusRequest for channel businesschannel with payload of size 4832 to orderer1.example.com(orderer1.example.com:7050) took 204.3µs " -orderer0.example.com | "2019-05-02 01:31:05.870 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 4832 bytes to 3 on channel businesschannel took 407.7µs" -orderer0.example.com | "2019-05-02 01:31:05.871 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 4832 to orderer2.example.com(orderer2.example.com:7050) took 102.6µs " -orderer0.example.com | "2019-05-02 01:31:05.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1f Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" -orderer0.example.com | "2019-05-02 01:31:05.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" -orderer0.example.com | "2019-05-02 01:31:05.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.7µs " -orderer0.example.com | "2019-05-02 01:31:05.876 UTC [orderer.consensus.etcdraft] writeBlock -> INFO e20 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:05.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.4µs " -orderer0.example.com | "2019-05-02 01:31:05.877 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU e24 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-05-02 01:31:05.878 UTC [msp.identity] Sign -> DEBU e25 Sign: plaintext: 0A020802120B0A090A03010203100418...7933038FF5973B2516EC8E44CFBB6CC1 " -orderer0.example.com | "2019-05-02 01:31:05.878 UTC [msp.identity] Sign -> DEBU e26 Sign: digest: 2D583A5B27164B164D8E8932C8E253B612B40369B9BE0A5B59B088934CD7D0D2 " -orderer0.example.com | "2019-05-02 01:31:05.881 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.882 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:05.883 UTC [fsblkstorage] indexBlock -> DEBU e29 Indexing block [blockNum=5, blockHash=[]byte{0x11, 0xe8, 0x9b, 0x88, 0x21, 0x80, 0x3, 0xc4, 0xce, 0x32, 0x91, 0xc, 0x63, 0x34, 0x40, 0x39, 0xf7, 0xd7, 0x36, 0x66, 0x25, 0x30, 0x1a, 0x98, 0xf5, 0x12, 0x6d, 0x91, 0x34, 0x40, 0x38, 0xa8} txOffsets= -orderer0.example.com | txId=c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf locPointer=offset=70, bytesLength=4706 +orderer0.example.com | "2019-05-02 09:27:32.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU cff Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:32.505 UTC [fsblkstorage] updateCheckpoint -> DEBU d00 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80790], isChainEmpty=[false], lastBlockNumber=[4]" +orderer0.example.com | "2019-05-02 09:27:32.505 UTC [orderer.commmon.multichannel] commitBlock -> DEBU d01 [channel: businesschannel] Wrote block [4]" +orderer0.example.com | "2019-05-02 09:27:32.559 UTC [orderer.common.broadcast] Handle -> WARN d02 Error reading from 172.18.0.8:57260: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:32.560 UTC [orderer.common.server] func1 -> DEBU d03 Closing Broadcast stream" +orderer0.example.com | "2019-05-02 09:27:32.561 UTC [comm.grpc.server] 1 -> INFO d04 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57260 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1085268s +orderer0.example.com | "2019-05-02 09:27:32.564 UTC [grpc] infof -> DEBU d05 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:32.716 UTC [orderer.common.cluster.step] handleMessage -> DEBU d06 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:32.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +orderer0.example.com | "2019-05-02 09:27:32.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 7.7923ms " +orderer0.example.com | "2019-05-02 09:27:32.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-05-02 09:27:32.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 28 bytes to 3 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-05-02 09:27:32.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 289.6µs " +orderer0.example.com | "2019-05-02 09:27:32.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 607.2µs " +orderer0.example.com | "2019-05-02 09:27:32.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:32.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:33.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:33.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d10 Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" +orderer0.example.com | "2019-05-02 09:27:33.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU d11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.7µs " +orderer0.example.com | "2019-05-02 09:27:33.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 2 on channel businesschannel took 36.6µs" +orderer0.example.com | "2019-05-02 09:27:33.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d13 Sending msg of 28 bytes to 3 on channel businesschannel took 25.1µs" +orderer0.example.com | "2019-05-02 09:27:33.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 665.1µs " +orderer0.example.com | "2019-05-02 09:27:33.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU d16 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:33.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 816.2µs " +orderer0.example.com | "2019-05-02 09:27:33.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:33.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU d18 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:33.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d19 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +orderer0.example.com | "2019-05-02 09:27:33.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.9µs " +orderer0.example.com | "2019-05-02 09:27:33.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1b Sending msg of 28 bytes to 2 on channel businesschannel took 23.8µs" +orderer0.example.com | "2019-05-02 09:27:33.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1c Sending msg of 28 bytes to 3 on channel businesschannel took 21µs" +orderer0.example.com | "2019-05-02 09:27:33.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs " +orderer0.example.com | "2019-05-02 09:27:33.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.9µs " +orderer0.example.com | "2019-05-02 09:27:33.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:33.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:34.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d21 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:34.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d22 Sending msg of 28 bytes to 3 on channel testchainid took 33.6µs" +orderer0.example.com | "2019-05-02 09:27:34.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU d23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.2µs " +orderer0.example.com | "2019-05-02 09:27:34.412 UTC [orderer.common.server] Broadcast -> DEBU d24 Starting new Broadcast handler" +orderer0.example.com | "2019-05-02 09:27:34.413 UTC [orderer.common.broadcast] Handle -> DEBU d25 Starting new broadcast loop for 172.18.0.8:57282" +peer0.org1.example.com | "2019-05-02 09:27:25.025 UTC [gossip.comm] func1 -> DEBU b8f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789243280579200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.025 UTC [gossip.gossip] handleMessage -> DEBU b90 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789243280579200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.025 UTC [msp] DeserializeIdentity -> DEBU b91 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b92 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b93 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b94 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [policies] Evaluate -> DEBU b95 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [policies] Evaluate -> DEBU b96 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [policies] Evaluate -> DEBU b97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func1 -> DEBU b98 0xc00236b0f0 gate 1556789245026754100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b99 0xc00236b0f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b9a 0xc00236b0f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b9b 0xc00236b0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b9c 0xc00236b0f0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:25.026 UTC [cauthdsl] func1 -> DEBU b9d 0xc00236b0f0 gate 1556789245026754100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU b9e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU b9f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU ba0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func1 -> DEBU ba1 0xc00236b930 gate 1556789245027113000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba2 0xc00236b930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba3 0xc00236b930 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba4 0xc00236b930 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [msp.identity] Verify -> DEBU ba5 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [msp.identity] Verify -> DEBU ba6 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba7 0xc00236b930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [cauthdsl] func1 -> DEBU ba8 0xc00236b930 gate 1556789245027113000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU ba9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU baa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU bab Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU bac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [msp] DeserializeIdentity -> DEBU bad Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.027 UTC [gossip.gossip] handleMessage -> DEBU bae Exiting" +orderer0.example.com | "2019-05-02 09:27:34.470 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d26 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57282 with txid 'f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d29 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d2a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:34.472 UTC [policies] Evaluate -> DEBU d2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:34.472 UTC [cauthdsl] func1 -> DEBU d2c 0xc00084c660 gate 1556789254472084400 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:34.472 UTC [cauthdsl] func2 -> DEBU d2d 0xc00084c660 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:34.472 UTC [cauthdsl] func2 -> DEBU d2e 0xc00084c660 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:34.472 UTC [cauthdsl] func2 -> DEBU d2f 0xc00084c660 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:34.472 UTC [msp.identity] Verify -> DEBU d30 Verify: digest = 00000000 e1 bc 9e ea 26 2e 53 22 7f 18 0b b0 a0 87 2f b7 |....&.S"....../.| +orderer0.example.com | 00000010 7d d4 55 a3 5c 3e 56 1a 13 08 07 eb 68 19 cc 23 |}.U.\>V.....h..#|" +orderer0.example.com | "2019-05-02 09:27:34.472 UTC [msp.identity] Verify -> DEBU d31 Verify: sig = 00000000 30 44 02 20 5f 33 fb e6 a2 75 d0 8e db 9b 31 61 |0D. _3...u....1a| +orderer0.example.com | 00000010 af 03 73 4c 80 1b 5e 9a de a3 10 4c eb 80 6a 29 |..sL..^....L..j)| +orderer0.example.com | 00000020 90 1a 05 86 02 20 6c 70 70 d5 9b d0 9c 08 df ab |..... lpp.......| +orderer0.example.com | 00000030 8f fb 97 db 2e 62 f8 57 e7 41 2c 2e a6 81 56 32 |.....b.W.A,...V2| +orderer0.example.com | 00000040 e6 e4 37 e8 a5 f7 |..7...|" +orderer0.example.com | "2019-05-02 09:27:34.473 UTC [cauthdsl] func2 -> DEBU d32 0xc00084c660 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:34.473 UTC [cauthdsl] func1 -> DEBU d33 0xc00084c660 gate 1556789254472084400 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:34.473 UTC [policies] Evaluate -> DEBU d34 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:34.473 UTC [policies] Evaluate -> DEBU d35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d36 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d38 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:34.474 UTC [orderer.common.blockcutter] Ordered -> DEBU d3a Enqueuing message into batch" +orderer0.example.com | "2019-05-02 09:27:34.475 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d3b [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57282" +orderer0.example.com | "2019-05-02 09:27:34.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3c Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +orderer0.example.com | "2019-05-02 09:27:34.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3d Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs" +orderer0.example.com | "2019-05-02 09:27:34.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278.8µs " +orderer0.example.com | "2019-05-02 09:27:34.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116µs " +orderer0.example.com | "2019-05-02 09:27:34.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU d40 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:34.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU d41 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:34.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU d42 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:34.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d43 Sending msg of 28 bytes to 3 on channel testchainid took 128.4µs" +orderer0.example.com | "2019-05-02 09:27:34.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 398.5µs " +orderer0.example.com | "2019-05-02 09:27:34.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d45 Sending msg of 28 bytes to 2 on channel businesschannel took 93µs" +orderer0.example.com | "2019-05-02 09:27:34.990 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d46 Sending msg of 28 bytes to 3 on channel businesschannel took 30.1µs" +peer0.org1.example.com | "2019-05-02 09:27:25.072 UTC [msp.identity] Sign -> DEBU baf Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151011 " +peer0.org1.example.com | "2019-05-02 09:27:25.073 UTC [msp.identity] Sign -> DEBU bb0 Sign: digest: F4D1C49B625AE5B24AE96451DB264D062B621D6054CBE6DC551BD8EFB9703AD5 " +peer0.org1.example.com | "2019-05-02 09:27:25.073 UTC [msp.identity] Sign -> DEBU bb1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:25.073 UTC [msp.identity] Sign -> DEBU bb2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:25.074 UTC [gossip.comm] Send -> DEBU bb3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:25.074 UTC [msp] DeserializeIdentity -> DEBU bb4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.074 UTC [gossip.pull] Hello -> DEBU bb5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:25.075 UTC [gossip.comm] sendToEndpoint -> DEBU bb7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.075 UTC [gossip.comm] sendToEndpoint -> DEBU bb8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.076 UTC [gossip.comm] Send -> DEBU bb9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:25.076 UTC [gossip.pull] Hello -> DEBU bba Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:25.076 UTC [gossip.comm] Send -> DEBU bbb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:25.077 UTC [gossip.pull] Hello -> DEBU bbc Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:25.077 UTC [gossip.comm] Send -> DEBU bbd Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:25.078 UTC [gossip.comm] sendToEndpoint -> DEBU bbe Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.078 UTC [gossip.comm] sendToEndpoint -> DEBU bbf Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.075 UTC [gossip.comm] Send -> DEBU bb6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:25.078 UTC [msp] DeserializeIdentity -> DEBU bc0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.079 UTC [gossip.comm] Send -> DEBU bc1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:25.079 UTC [gossip.comm] sendToEndpoint -> DEBU bc2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.079 UTC [gossip.comm] sendToEndpoint -> DEBU bc3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.080 UTC [gossip.comm] sendToEndpoint -> DEBU bc4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.080 UTC [gossip.comm] sendToEndpoint -> DEBU bc5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.081 UTC [gossip.comm] sendToEndpoint -> DEBU bc6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.082 UTC [gossip.comm] sendToEndpoint -> DEBU bc7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.084 UTC [gossip.comm] sendToEndpoint -> DEBU bc8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.084 UTC [gossip.comm] sendToEndpoint -> DEBU bc9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.084 UTC [gossip.gossip] handleMessage -> DEBU bca Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.085 UTC [gossip.comm] func1 -> DEBU bcb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.085 UTC [gossip.comm] func1 -> DEBU bcc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.084 UTC [gossip.pull] HandleMessage -> DEBU bcd GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bce Exiting" +orderer0.example.com | "2019-05-02 09:27:34.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU d47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 514.3µs " +orderer0.example.com | "2019-05-02 09:27:34.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.5µs " +orderer0.example.com | "2019-05-02 09:27:34.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU d49 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:34.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:35.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:35.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4c Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +orderer0.example.com | "2019-05-02 09:27:35.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.6µs " +orderer0.example.com | "2019-05-02 09:27:35.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4e Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" +orderer0.example.com | "2019-05-02 09:27:35.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4f Sending msg of 28 bytes to 3 on channel businesschannel took 46.8µs" +orderer0.example.com | "2019-05-02 09:27:35.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 553.5µs " +orderer0.example.com | "2019-05-02 09:27:35.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3489ms " +orderer0.example.com | "2019-05-02 09:27:35.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU d52 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:35.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU d53 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:35.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU d54 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:35.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d55 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +orderer0.example.com | "2019-05-02 09:27:35.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 284.7µs " +orderer0.example.com | "2019-05-02 09:27:35.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d57 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs" +orderer0.example.com | "2019-05-02 09:27:35.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d58 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" +orderer0.example.com | "2019-05-02 09:27:35.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU d59 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.1µs " +orderer0.example.com | "2019-05-02 09:27:35.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 393.1µs " +orderer0.example.com | "2019-05-02 09:27:35.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:35.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:36.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:36.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5e Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" +orderer0.example.com | "2019-05-02 09:27:36.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.8µs " +orderer0.example.com | "2019-05-02 09:27:36.326 UTC [orderer.common.server] replicateDisabledChains -> DEBU d60 No inactive chains to try to replicate" +orderer0.example.com | "2019-05-02 09:27:36.477 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d61 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:36.478 UTC [orderer.consensus.etcdraft] propose -> INFO d62 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:36.486 UTC [orderer.consensus.etcdraft] 2 -> DEBU d63 Proposed block [5] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:36.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU d64 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:36.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d65 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +orderer0.example.com | "2019-05-02 09:27:36.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU d66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.6µs " +orderer0.example.com | "2019-05-02 09:27:36.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d67 Sending msg of 4831 bytes to 2 on channel businesschannel took 24.8µs" +orderer0.example.com | "2019-05-02 09:27:36.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d68 Sending msg of 4831 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-05-02 09:27:36.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU d69 Send of ConsensusRequest for channel businesschannel with payload of size 4831 to orderer2.example.com(orderer2.example.com:7050) took 361.7µs " +orderer0.example.com | "2019-05-02 09:27:36.800 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6a Sending msg of 28 bytes to 2 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-05-02 09:27:36.800 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6b Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs" +orderer0.example.com | "2019-05-02 09:27:36.801 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6c Send of ConsensusRequest for channel businesschannel with payload of size 4831 to orderer1.example.com(orderer1.example.com:7050) took 149.2µs " +orderer0.example.com | "2019-05-02 09:27:36.801 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 807.2µs " +peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bcf Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.pull] HandleMessage -> DEBU bd0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bd1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bd2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bd3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.089 UTC [gossip.gossip] handleMessage -> DEBU bd4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU bd5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.089 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bd6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:25.089 UTC [msp.identity] Verify -> DEBU bd7 Verify: digest = 00000000 f4 d1 c4 9b 62 5a e5 b2 4a e9 64 51 db 26 4d 06 |....bZ..J.dQ.&M.| +peer0.org1.example.com | 00000010 2b 62 1d 60 54 cb e6 dc 55 1b d8 ef b9 70 3a d5 |+b.`T...U....p:.|" +peer0.org1.example.com | "2019-05-02 09:27:25.090 UTC [msp.identity] Verify -> DEBU bd8 Verify: sig = 00000000 30 45 02 21 00 c2 05 82 c1 0f 60 99 10 15 45 60 |0E.!......`...E`| +peer0.org1.example.com | 00000010 7a 6c 49 ef 90 f1 62 f2 f5 68 0c 84 eb e5 ef 65 |zlI...b..h.....e| +peer0.org1.example.com | 00000020 d3 cf 2a 9c 32 02 20 7d 78 8d d5 9d 83 c8 5c 50 |..*.2. }x.....\P| +peer0.org1.example.com | 00000030 f0 9e 54 72 8b 47 bc 56 16 d6 9d d2 28 86 38 6f |..Tr.G.V....(.8o| +peer0.org1.example.com | 00000040 d1 14 f2 43 d3 72 89 |...C.r.|" +peer0.org1.example.com | "2019-05-02 09:27:25.090 UTC [gossip.discovery] handleAliveMessage -> DEBU bd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.090 UTC [gossip.discovery] isSentByMe -> DEBU bda Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.090 UTC [gossip.discovery] handleAliveMessage -> DEBU bdb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.090 UTC [gossip.discovery] handleMsgFromComm -> DEBU bdc Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.091 UTC [gossip.discovery] handleMsgFromComm -> DEBU bdd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.091 UTC [gossip.gossip] handleMessage -> DEBU bde Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.091 UTC [gossip.gossip] handleMessage -> DEBU bdf Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1956372221717732963 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [gossip.pull] HandleMessage -> DEBU be0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1956372221717732963 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [gossip.gossip] handleMessage -> DEBU be1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [gossip.gossip] handleMessage -> DEBU be2 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [gossip.gossip] ValidateAliveMsg -> DEBU be3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [msp.identity] Verify -> DEBU be4 Verify: digest = 00000000 f4 d1 c4 9b 62 5a e5 b2 4a e9 64 51 db 26 4d 06 |....bZ..J.dQ.&M.| +peer0.org1.example.com | 00000010 2b 62 1d 60 54 cb e6 dc 55 1b d8 ef b9 70 3a d5 |+b.`T...U....p:.|" +peer0.org1.example.com | "2019-05-02 09:27:25.092 UTC [msp.identity] Verify -> DEBU be5 Verify: sig = 00000000 30 45 02 21 00 c2 05 82 c1 0f 60 99 10 15 45 60 |0E.!......`...E`| +peer0.org1.example.com | 00000010 7a 6c 49 ef 90 f1 62 f2 f5 68 0c 84 eb e5 ef 65 |zlI...b..h.....e| +peer0.org1.example.com | 00000020 d3 cf 2a 9c 32 02 20 7d 78 8d d5 9d 83 c8 5c 50 |..*.2. }x.....\P| +peer0.org1.example.com | 00000030 f0 9e 54 72 8b 47 bc 56 16 d6 9d d2 28 86 38 6f |..Tr.G.V....(.8o| +peer0.org1.example.com | 00000040 d1 14 f2 43 d3 72 89 |...C.r.|" +peer0.org1.example.com | "2019-05-02 09:27:25.094 UTC [msp.identity] Verify -> DEBU be6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:25.094 UTC [msp.identity] Verify -> DEBU be7 Verify: sig = 00000000 30 44 02 20 70 c4 3a 23 15 fc 4b 10 a0 4c 7d b2 |0D. p.:#..K..L}.| +peer0.org1.example.com | 00000010 19 14 29 64 0d 7b 0c c1 73 da 27 45 dd 1a df 44 |..)d.{..s.'E...D| +peer0.org1.example.com | 00000020 6a 67 e9 6a 02 20 2b fc d2 18 77 ae 37 01 3a e2 |jg.j. +...w.7.:.| +peer0.org1.example.com | 00000030 97 51 92 20 82 5e 7c 52 fd f3 2c 27 1e d8 9c 5a |.Q. .^|R..,'...Z| +peer0.org1.example.com | 00000040 a6 df 5f 3a 2c ee |.._:,.|" +peer0.org1.example.com | "2019-05-02 09:27:25.094 UTC [gossip.discovery] handleAliveMessage -> DEBU be8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.094 UTC [gossip.discovery] isSentByMe -> DEBU be9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.095 UTC [gossip.discovery] handleAliveMessage -> DEBU bea Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.095 UTC [gossip.discovery] handleMsgFromComm -> DEBU beb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.095 UTC [gossip.gossip] handleMessage -> DEBU bec Exiting" +orderer0.example.com | "2019-05-02 09:27:36.802 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0942ms " +orderer0.example.com | "2019-05-02 09:27:36.807 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:36.808 UTC [orderer.common.cluster.step] handleMessage -> DEBU d70 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:36.808 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-05-02 09:27:36.808 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d73 Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +orderer0.example.com | "2019-05-02 09:27:36.809 UTC [orderer.common.cluster.step] sendMessage -> DEBU d74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262µs " +orderer0.example.com | "2019-05-02 09:27:36.808 UTC [orderer.consensus.etcdraft] writeBlock -> INFO d72 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:36.809 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU d76 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-05-02 09:27:36.810 UTC [msp.identity] Sign -> DEBU d77 Sign: plaintext: 0A020802120B0A090A03010203100418...8D87BD4412B1A81CC613E34DE8F22984 " +orderer0.example.com | "2019-05-02 09:27:36.810 UTC [msp.identity] Sign -> DEBU d78 Sign: digest: 6035AB39F3AF415B7E1B9C43BA898201E49D40DA63DC7DCEA85B2B1DD927BA29 " +orderer0.example.com | "2019-05-02 09:27:36.809 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs " +orderer0.example.com | "2019-05-02 09:27:36.811 UTC [orderer.common.cluster.step] handleMessage -> DEBU d79 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:36.815 UTC [fsblkstorage] indexBlock -> DEBU d7a Indexing block [blockNum=5, blockHash=[]byte{0x5f, 0x54, 0x4d, 0xff, 0x12, 0x65, 0x12, 0xe, 0xc5, 0x7f, 0x48, 0x3d, 0x97, 0x19, 0x5b, 0xa3, 0xda, 0x2c, 0x78, 0xea, 0x37, 0x3d, 0x8f, 0xde, 0xaf, 0x84, 0x17, 0xbc, 0xfa, 0xa4, 0xf2, 0xd1} txOffsets= +orderer0.example.com | txId=f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1 locPointer=offset=70, bytesLength=4705 orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:31:05.888 UTC [fsblkstorage] updateCheckpoint -> DEBU e2a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86506], isChainEmpty=[false], lastBlockNumber=[5]" -orderer0.example.com | "2019-05-02 01:31:05.889 UTC [orderer.commmon.multichannel] commitBlock -> DEBU e2b [channel: businesschannel] Wrote block [5]" -orderer0.example.com | "2019-05-02 01:31:05.889 UTC [fsblkstorage] waitForBlock -> DEBU e2c Came out of wait. maxAvailaBlockNumber=[5]" -orderer0.example.com | "2019-05-02 01:31:05.889 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e2d Remaining bytes=[5713], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:05.889 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e2e Returning blockbytes - length=[5711], placementInfo={fileNum=[0], startOffset=[80793], bytesOffset=[80795]}" -orderer0.example.com | "2019-05-02 01:31:05.889 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e2f blockbytes [5711] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:05.889 UTC [common.deliver] deliverBlocks -> DEBU e30 [channel: businesschannel] Delivering block [5] for (0xc0008bfb80) for 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:31:05.889 UTC [fsblkstorage] waitForBlock -> DEBU e31 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-05-02 01:31:06.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e32 Sending msg of 28 bytes to 2 on channel businesschannel took 33µs" -orderer0.example.com | "2019-05-02 01:31:06.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU e33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.8762ms " -orderer0.example.com | "2019-05-02 01:31:06.048 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel businesschannel took 83.3µs" -orderer0.example.com | "2019-05-02 01:31:06.049 UTC [orderer.common.cluster.step] handleMessage -> DEBU e35 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:06.051 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.4526ms " -orderer0.example.com | "2019-05-02 01:31:06.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel testchainid took 60.8µs" -orderer0.example.com | "2019-05-02 01:31:06.054 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:06.055 UTC [orderer.common.cluster.step] sendMessage -> DEBU e39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4711ms " -peer0.org1.example.com | "2019-05-02 01:30:53.572 UTC [gossip.comm] func1 -> DEBU d46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.574 UTC [gossip.comm] sendToEndpoint -> DEBU d48 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.575 UTC [gossip.comm] sendToEndpoint -> DEBU d4a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.574 UTC [gossip.comm] func1 -> DEBU d49 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.577 UTC [gossip.comm] func1 -> DEBU d4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.573 UTC [policies] Evaluate -> DEBU d4c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.583 UTC [policies] Evaluate -> DEBU d4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.586 UTC [gossip.discovery] handleAliveMessage -> DEBU d4e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.588 UTC [gossip.discovery] learnExistingMembers -> DEBU d4f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:53.588 UTC [gossip.discovery] learnExistingMembers -> DEBU d50 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 " -peer0.org1.example.com | "2019-05-02 01:30:53.589 UTC [gossip.discovery] learnExistingMembers -> DEBU d51 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 " -peer0.org1.example.com | "2019-05-02 01:30:53.589 UTC [gossip.discovery] learnExistingMembers -> DEBU d52 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:53.590 UTC [gossip.discovery] learnExistingMembers -> DEBU d53 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.590 UTC [gossip.discovery] handleAliveMessage -> DEBU d54 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU d55 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU d56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.592 UTC [gossip.discovery] handleMsgFromComm -> DEBU d58 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.592 UTC [gossip.gossip] handleMessage -> DEBU d57 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.593 UTC [gossip.gossip] handleMessage -> DEBU d59 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.593 UTC [gossip.gossip] handleMessage -> DEBU d5a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.594 UTC [gossip.gossip] handleMessage -> DEBU d5c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU d5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.595 UTC [gossip.pull] HandleMessage -> DEBU d5d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.596 UTC [msp] DeserializeIdentity -> DEBU d60 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.596 UTC [msp] DeserializeIdentity -> DEBU d61 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.595 UTC [gossip.discovery] handleMsgFromComm -> DEBU d5e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.596 UTC [msp] DeserializeIdentity -> DEBU d5f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.598 UTC [msp] DeserializeIdentity -> DEBU d63 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.599 UTC [msp] DeserializeIdentity -> DEBU d64 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.597 UTC [msp] DeserializeIdentity -> DEBU d62 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.600 UTC [msp] DeserializeIdentity -> DEBU d65 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.601 UTC [msp] DeserializeIdentity -> DEBU d66 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.601 UTC [msp] DeserializeIdentity -> DEBU d67 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.601 UTC [msp] DeserializeIdentity -> DEBU d68 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.601 UTC [msp] DeserializeIdentity -> DEBU d69 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.602 UTC [gossip.comm] Send -> DEBU d6a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.602 UTC [msp] DeserializeIdentity -> DEBU d6b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.602 UTC [msp] DeserializeIdentity -> DEBU d6c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.603 UTC [msp] DeserializeIdentity -> DEBU d6f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.604 UTC [gossip.pull] SendDigest -> DEBU d70 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:53.602 UTC [gossip.comm] Send -> DEBU d6d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.604 UTC [gossip.gossip] handleMessage -> DEBU d71 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.605 UTC [gossip.gossip] handleMessage -> DEBU d72 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.606 UTC [gossip.gossip] handleMessage -> DEBU d73 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.613 UTC [gossip.discovery] handleMsgFromComm -> DEBU d74 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.626 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d76 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:53.626 UTC [msp] DeserializeIdentity -> DEBU d77 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.627 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d78 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:53.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d79 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d7a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.626 UTC [gossip.comm] sendToEndpoint -> DEBU d75 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.603 UTC [gossip.comm] sendToEndpoint -> DEBU d6e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.665 UTC [msp.identity] Sign -> DEBU d7b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151012 " -peer0.org1.example.com | "2019-05-02 01:30:53.665 UTC [gossip.comm] func1 -> DEBU d7c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.678 UTC [policies] Evaluate -> DEBU d7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.679 UTC [gossip.comm] sendToEndpoint -> DEBU d7e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.683 UTC [gossip.comm] sendToEndpoint -> DEBU d7f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.689 UTC [msp.identity] Sign -> DEBU d80 Sign: digest: C44C2B02FA80C8CC73DEE6461A942E57496B04C7A5FBB285A08C18C33693E39F " -peer0.org1.example.com | "2019-05-02 01:30:53.690 UTC [gossip.gossip] handleMessage -> DEBU d81 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.691 UTC [policies] Evaluate -> DEBU d82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:53.693 UTC [msp.identity] Sign -> DEBU d83 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:53.694 UTC [msp] DeserializeIdentity -> DEBU d84 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.694 UTC [policies] Evaluate -> DEBU d85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-05-02 01:31:06.056 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:06.106 UTC [grpc] infof -> DEBU e3b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:06.108 UTC [orderer.common.broadcast] Handle -> WARN e3c Error reading from 192.168.240.9:47414: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:06.108 UTC [orderer.common.server] func1 -> DEBU e3d Closing Broadcast stream" -orderer0.example.com | "2019-05-02 01:31:06.108 UTC [comm.grpc.server] 1 -> INFO e3e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47414 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.4542422s -orderer0.example.com | "2019-05-02 01:31:06.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 2 on channel businesschannel took 27.5µs" -orderer0.example.com | "2019-05-02 01:31:06.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262.5µs " -orderer0.example.com | "2019-05-02 01:31:06.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e41 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" -orderer0.example.com | "2019-05-02 01:31:06.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU e42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.6µs " -orderer0.example.com | "2019-05-02 01:31:06.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:06.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:06.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU e45 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:06.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 3 on channel testchainid took 10.5µs" -orderer0.example.com | "2019-05-02 01:31:06.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 254.8µs " -orderer0.example.com | "2019-05-02 01:31:07.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 3 on channel businesschannel took 28.2µs" -orderer0.example.com | "2019-05-02 01:31:07.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" -orderer0.example.com | "2019-05-02 01:31:07.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.6µs " -orderer0.example.com | "2019-05-02 01:31:07.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 245.5µs " -orderer0.example.com | "2019-05-02 01:31:07.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:07.043 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4d Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" -orderer0.example.com | "2019-05-02 01:31:07.044 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.2µs " -orderer0.example.com | "2019-05-02 01:31:07.046 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:07.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU e50 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:07.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 2 on channel businesschannel took 51.6µs" -orderer0.example.com | "2019-05-02 01:31:07.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e53 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" -orderer0.example.com | "2019-05-02 01:31:07.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU e54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.8µs " -orderer0.example.com | "2019-05-02 01:31:07.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.3µs " -orderer0.example.com | "2019-05-02 01:31:07.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:07.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:07.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU e57 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:07.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e58 Sending msg of 28 bytes to 3 on channel testchainid took 341.3µs" -orderer0.example.com | "2019-05-02 01:31:07.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e59 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.8µs " -orderer0.example.com | "2019-05-02 01:31:07.953 UTC [orderer.common.server] Broadcast -> DEBU e5a Starting new Broadcast handler" -orderer0.example.com | "2019-05-02 01:31:07.955 UTC [orderer.common.broadcast] Handle -> DEBU e5b Starting new broadcast loop for 192.168.240.9:47428" -orderer0.example.com | "2019-05-02 01:31:08.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5c Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" -orderer0.example.com | "2019-05-02 01:31:08.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5d Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" -orderer0.example.com | "2019-05-02 01:31:08.040 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.2µs " -orderer0.example.com | "2019-05-02 01:31:08.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " -orderer0.example.com | "2019-05-02 01:31:08.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU e60 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -peer0.org1.example.com | "2019-05-02 01:30:53.696 UTC [msp] DeserializeIdentity -> DEBU d86 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.698 UTC [cauthdsl] func1 -> DEBU d87 0xc00323e400 gate 1556760653698638100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:53.699 UTC [cauthdsl] func2 -> DEBU d89 0xc00323e400 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:53.700 UTC [cauthdsl] func2 -> DEBU d8a 0xc00323e400 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:53.701 UTC [cauthdsl] func2 -> DEBU d8b 0xc00323e400 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.704 UTC [msp.identity] Verify -> DEBU d8c Verify: digest = 00000000 9e a8 02 93 d9 c8 ee 82 bc e5 8c 9a 3a 05 e6 17 |............:...| -peer0.org1.example.com | 00000010 5f 78 b5 67 7b 15 be 31 41 8c b8 22 19 ff 99 6e |_x.g{..1A.."...n|" -peer0.org1.example.com | "2019-05-02 01:30:53.705 UTC [msp.identity] Verify -> DEBU d8d Verify: sig = 00000000 30 44 02 20 18 b1 12 0f 69 f0 92 7a 32 47 92 fe |0D. ....i..z2G..| -peer0.org1.example.com | 00000010 99 2a b6 46 31 04 07 c0 30 1f 06 bf a2 43 8e d8 |.*.F1...0....C..| -peer0.org1.example.com | 00000020 94 a3 2c a5 02 20 06 7e dc 67 1b de a9 a3 a3 1b |..,.. .~.g......| -peer0.org1.example.com | 00000030 c1 90 db e9 26 25 06 22 62 6f d0 4b 1e 09 2a b6 |....&%."bo.K..*.| -peer0.org1.example.com | 00000040 f5 2b e8 30 66 47 |.+.0fG|" -peer0.org1.example.com | "2019-05-02 01:30:53.707 UTC [cauthdsl] func2 -> DEBU d8e 0xc00323e400 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.707 UTC [cauthdsl] func1 -> DEBU d8f 0xc00323e400 gate 1556760653698638100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:53.708 UTC [policies] Evaluate -> DEBU d90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.708 UTC [policies] Evaluate -> DEBU d91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.708 UTC [policies] Evaluate -> DEBU d92 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.709 UTC [policies] Evaluate -> DEBU d93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.710 UTC [gossip.discovery] handleAliveMessage -> DEBU d94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.710 UTC [gossip.discovery] learnExistingMembers -> DEBU d95 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:53.711 UTC [gossip.discovery] learnExistingMembers -> DEBU d96 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 " -peer0.org1.example.com | "2019-05-02 01:30:53.711 UTC [gossip.discovery] learnExistingMembers -> DEBU d97 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 " -peer0.org1.example.com | "2019-05-02 01:30:53.712 UTC [gossip.discovery] learnExistingMembers -> DEBU d98 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:53.712 UTC [gossip.discovery] learnExistingMembers -> DEBU d99 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.713 UTC [gossip.discovery] handleAliveMessage -> DEBU d9a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU d9b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.714 UTC [gossip.discovery] sendMemResponse -> DEBU d9c Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:53.715 UTC [msp] DeserializeIdentity -> DEBU d9d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.715 UTC [msp] DeserializeIdentity -> DEBU d9e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.716 UTC [msp] DeserializeIdentity -> DEBU d9f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.717 UTC [gossip.comm] Send -> DEBU da0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.718 UTC [gossip.discovery] sendMemResponse -> DEBU da1 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:53.719 UTC [gossip.comm] sendToEndpoint -> DEBU da2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.720 UTC [gossip.comm] sendToEndpoint -> DEBU da3 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.699 UTC [msp] DeserializeIdentity -> DEBU d88 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.722 UTC [msp.identity] Sign -> DEBU da4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:53.724 UTC [gossip.discovery] periodicalSendAlive -> DEBU da6 Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:30:53.722 UTC [gossip.pull] Hello -> DEBU da5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:53.726 UTC [gossip.comm] Send -> DEBU da7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.726 UTC [gossip.pull] Hello -> DEBU da8 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:53.727 UTC [gossip.comm] Send -> DEBU da9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.727 UTC [gossip.pull] Hello -> DEBU daa Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:53.727 UTC [gossip.comm] Send -> DEBU dab Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.728 UTC [gossip.comm] sendToEndpoint -> DEBU dac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.728 UTC [gossip.comm] sendToEndpoint -> DEBU dad Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.729 UTC [gossip.comm] sendToEndpoint -> DEBU dae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-05-02 01:31:08.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU e61 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:08.043 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e62 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" -orderer0.example.com | "2019-05-02 01:31:08.043 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.3µs " -orderer0.example.com | "2019-05-02 01:31:08.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU e64 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:08.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e65 Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" -orderer0.example.com | "2019-05-02 01:31:08.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e66 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" -orderer0.example.com | "2019-05-02 01:31:08.540 UTC [orderer.common.cluster.step] sendMessage -> DEBU e67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131µs " -orderer0.example.com | "2019-05-02 01:31:08.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU e68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.9µs " -orderer0.example.com | "2019-05-02 01:31:08.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU e69 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:08.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6a Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:08.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:08.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" -orderer0.example.com | "2019-05-02 01:31:08.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.2µs " -orderer0.example.com | "2019-05-02 01:31:09.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6e Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" -orderer0.example.com | "2019-05-02 01:31:09.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6f Sending msg of 28 bytes to 3 on channel businesschannel took 68.7µs" -orderer0.example.com | "2019-05-02 01:31:09.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU e70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 346.6µs " -orderer0.example.com | "2019-05-02 01:31:09.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU e72 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:09.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU e73 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:09.045 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" -orderer0.example.com | "2019-05-02 01:31:09.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.7µs " -orderer0.example.com | "2019-05-02 01:31:09.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU e71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.8µs " -orderer0.example.com | "2019-05-02 01:31:09.049 UTC [orderer.common.cluster.step] handleMessage -> DEBU e76 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:09.358 UTC [orderer.common.broadcast] ProcessMessage -> DEBU e77 [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47428 with txid '13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa' of type ENDORSER_TRANSACTION" -orderer0.example.com | "2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU e78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU e79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU e7a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU e7b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:09.361 UTC [policies] Evaluate -> DEBU e7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:09.361 UTC [cauthdsl] func1 -> DEBU e7d 0xc0010dac60 gate 1556760669361075100 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:09.362 UTC [cauthdsl] func2 -> DEBU e7e 0xc0010dac60 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:09.362 UTC [cauthdsl] func2 -> DEBU e7f 0xc0010dac60 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:09.363 UTC [cauthdsl] func2 -> DEBU e80 0xc0010dac60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-05-02 01:31:09.363 UTC [cauthdsl] func2 -> DEBU e81 0xc0010dac60 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:09.363 UTC [cauthdsl] func1 -> DEBU e82 0xc0010dac60 gate 1556760669361075100 evaluation fails" -orderer0.example.com | "2019-05-02 01:31:09.364 UTC [policies] Evaluate -> DEBU e83 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:09.364 UTC [policies] Evaluate -> DEBU e84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:09.364 UTC [policies] Evaluate -> DEBU e85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:09.364 UTC [cauthdsl] func1 -> DEBU e86 0xc0010db4a0 gate 1556760669364177100 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:09.364 UTC [cauthdsl] func2 -> DEBU e87 0xc0010db4a0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:09.364 UTC [cauthdsl] func2 -> DEBU e88 0xc0010db4a0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:09.364 UTC [cauthdsl] func2 -> DEBU e89 0xc0010db4a0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:09.364 UTC [msp.identity] Verify -> DEBU e8a Verify: digest = 00000000 cc 3a cf e1 4b 35 9d 17 a9 e6 85 2b 0b 68 18 e9 |.:..K5.....+.h..| -orderer0.example.com | 00000010 77 c3 fe 6e 06 78 10 0b 0b f4 fd 12 77 69 d9 e1 |w..n.x......wi..|" -orderer0.example.com | "2019-05-02 01:31:09.364 UTC [msp.identity] Verify -> DEBU e8b Verify: sig = 00000000 30 44 02 20 67 6f e6 58 06 60 f9 c7 a9 d4 28 51 |0D. go.X.`....(Q| -peer0.org1.example.com | "2019-05-02 01:30:53.729 UTC [gossip.comm] sendToEndpoint -> DEBU daf Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.730 UTC [gossip.comm] sendToEndpoint -> DEBU db0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.731 UTC [gossip.comm] sendToEndpoint -> DEBU db1 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.732 UTC [gossip.gossip] handleMessage -> DEBU db2 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.735 UTC [msp] DeserializeIdentity -> DEBU db3 Obtaining identity" -orderer0.example.com | 00000010 88 dc d4 b0 e9 12 85 b4 cf 09 57 11 7b 67 b9 a1 |..........W.{g..| -orderer0.example.com | 00000020 9e 18 f6 d1 02 20 33 cd ba ab b8 32 12 20 20 1a |..... 3....2. .| -orderer0.example.com | 00000030 02 ac 0c 82 b0 2a 5d d6 aa 02 45 f8 5e 92 62 d2 |.....*]...E.^.b.| -orderer0.example.com | 00000040 82 9a c0 c8 2a 6d |....*m|" -orderer0.example.com | "2019-05-02 01:31:09.365 UTC [cauthdsl] func2 -> DEBU e8c 0xc0010db4a0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:09.365 UTC [cauthdsl] func1 -> DEBU e8d 0xc0010db4a0 gate 1556760669364177100 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:09.365 UTC [policies] Evaluate -> DEBU e8e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:09.365 UTC [policies] Evaluate -> DEBU e8f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:09.365 UTC [policies] Evaluate -> DEBU e90 Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:09.365 UTC [policies] Evaluate -> DEBU e91 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:09.366 UTC [policies] Evaluate -> DEBU e92 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:09.366 UTC [policies] Evaluate -> DEBU e93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:09.366 UTC [orderer.common.blockcutter] Ordered -> DEBU e94 Enqueuing message into batch" -orderer0.example.com | "2019-05-02 01:31:09.366 UTC [orderer.common.broadcast] ProcessMessage -> DEBU e95 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47428" -orderer0.example.com | "2019-05-02 01:31:09.376 UTC [orderer.common.broadcast] Handle -> WARN e96 Error reading from 192.168.240.9:47428: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:09.376 UTC [orderer.common.server] func1 -> DEBU e97 Closing Broadcast stream" -orderer0.example.com | "2019-05-02 01:31:09.377 UTC [comm.grpc.server] 1 -> INFO e98 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47428 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1.4237134s -orderer0.example.com | "2019-05-02 01:31:09.377 UTC [grpc] infof -> DEBU e99 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:09.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9a Sending msg of 28 bytes to 3 on channel businesschannel took 28µs" -orderer0.example.com | "2019-05-02 01:31:09.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9b Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" -orderer0.example.com | "2019-05-02 01:31:09.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262µs " -orderer0.example.com | "2019-05-02 01:31:09.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.3µs " -orderer0.example.com | "2019-05-02 01:31:09.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:09.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:09.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 3 on channel testchainid took 28.9µs" -orderer0.example.com | "2019-05-02 01:31:09.550 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 269µs " -orderer0.example.com | "2019-05-02 01:31:09.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:10.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:10.055 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea4 Sending msg of 28 bytes to 3 on channel testchainid took 66.5µs" -orderer0.example.com | "2019-05-02 01:31:10.056 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 948.2µs " -orderer0.example.com | "2019-05-02 01:31:10.057 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea6 Sending msg of 28 bytes to 2 on channel businesschannel took 30.2µs" -orderer0.example.com | "2019-05-02 01:31:10.057 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea7 Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" -orderer0.example.com | "2019-05-02 01:31:10.057 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126µs " -orderer0.example.com | "2019-05-02 01:31:10.057 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.7µs " -orderer0.example.com | "2019-05-02 01:31:10.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaa Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:10.068 UTC [orderer.common.cluster.step] handleMessage -> DEBU eab Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:10.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" -orderer0.example.com | "2019-05-02 01:31:10.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ead Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" -orderer0.example.com | "2019-05-02 01:31:10.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU eae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.1µs " -orderer0.example.com | "2019-05-02 01:31:10.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU eaf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.485ms " -orderer0.example.com | "2019-05-02 01:31:10.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:10.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:10.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:10.547 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" -peer0.org1.example.com | "2019-05-02 01:30:53.735 UTC [msp] DeserializeIdentity -> DEBU db4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.837 UTC [msp] DeserializeIdentity -> DEBU db8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.845 UTC [gossip.comm] Send -> DEBU db9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.834 UTC [msp.identity] Sign -> DEBU dba Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151013 " -peer0.org1.example.com | "2019-05-02 01:30:53.856 UTC [msp.identity] Sign -> DEBU dbb Sign: digest: 4651E7C76BEDCC55070799B055940580EA09D1CEE589877A84F9ABBA0482B953 " -peer0.org1.example.com | "2019-05-02 01:30:53.749 UTC [gossip.comm] func1 -> DEBU db5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3942773947184320849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.809 UTC [gossip.gossip] handleMessage -> DEBU db6 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13500321336765044630 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 119 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.811 UTC [gossip.comm] func1 -> DEBU db7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5645752682005893664 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.855 UTC [msp] DeserializeIdentity -> DEBU dbc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.857 UTC [msp.identity] Sign -> DEBU dbd Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:53.858 UTC [gossip.comm] func1 -> DEBU dbe Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.869 UTC [gossip.pull] HandleMessage -> DEBU dbf GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13500321336765044630 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 119 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.887 UTC [gossip.comm] Send -> DEBU dc0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.888 UTC [gossip.comm] Send -> DEBU dc3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.889 UTC [gossip.comm] sendToEndpoint -> DEBU dc4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.889 UTC [gossip.comm] sendToEndpoint -> DEBU dc5 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.888 UTC [msp.identity] Sign -> DEBU dc1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:53.890 UTC [gossip.comm] Send -> DEBU dc6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.891 UTC [msp] DeserializeIdentity -> DEBU dc7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.891 UTC [gossip.comm] Send -> DEBU dc8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.891 UTC [msp] DeserializeIdentity -> DEBU dc9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.891 UTC [gossip.comm] Send -> DEBU dca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.892 UTC [gossip.comm] sendToEndpoint -> DEBU dcb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.892 UTC [gossip.comm] sendToEndpoint -> DEBU dcc Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.892 UTC [gossip.comm] sendToEndpoint -> DEBU dcd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.892 UTC [gossip.comm] sendToEndpoint -> DEBU dce Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.888 UTC [gossip.gossip] handleMessage -> DEBU dc2 Exiting" -orderer0.example.com | "2019-05-02 01:31:10.547 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.2µs " -orderer0.example.com | "2019-05-02 01:31:11.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel businesschannel took 31.4µs" -orderer0.example.com | "2019-05-02 01:31:11.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb6 Sending msg of 28 bytes to 2 on channel businesschannel took 229µs" -orderer0.example.com | "2019-05-02 01:31:11.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203µs " -orderer0.example.com | "2019-05-02 01:31:11.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 936.8µs " -orderer0.example.com | "2019-05-02 01:31:11.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:11.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU eba Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:11.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:11.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebc Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" -orderer0.example.com | "2019-05-02 01:31:11.048 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 650.5µs " -orderer0.example.com | "2019-05-02 01:31:11.367 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU ebe Batch timer expired, creating block" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:11.367 UTC [orderer.consensus.etcdraft] propose -> INFO ebf Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:11.368 UTC [orderer.consensus.etcdraft] 2 -> DEBU ec0 Proposed block [6] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:11.372 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec1 Send of ConsensusRequest for channel businesschannel with payload of size 3179 to orderer1.example.com(orderer1.example.com:7050) took 94.8µs " -orderer0.example.com | "2019-05-02 01:31:11.372 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec2 Sending msg of 3179 bytes to 2 on channel businesschannel took 24.2µs" -orderer0.example.com | "2019-05-02 01:31:11.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec3 Sending msg of 3179 bytes to 3 on channel businesschannel took 58µs" -orderer0.example.com | "2019-05-02 01:31:11.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec4 Send of ConsensusRequest for channel businesschannel with payload of size 3179 to orderer2.example.com(orderer2.example.com:7050) took 277.8µs " -orderer0.example.com | "2019-05-02 01:31:11.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec5 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:11.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec6 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" -orderer0.example.com | "2019-05-02 01:31:11.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec9 Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" -orderer0.example.com | "2019-05-02 01:31:11.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU eca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.8µs " -orderer0.example.com | "2019-05-02 01:31:11.382 UTC [orderer.consensus.etcdraft] writeBlock -> INFO ec8 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:11.384 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU ecc [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-05-02 01:31:11.382 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:11.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 214.6µs " -orderer0.example.com | "2019-05-02 01:31:11.384 UTC [msp.identity] Sign -> DEBU ecd Sign: plaintext: 0A020802120B0A090A03010203100418...852B43AF71C442B6CFD54BBC64C93509 " -orderer0.example.com | "2019-05-02 01:31:11.386 UTC [msp.identity] Sign -> DEBU ece Sign: digest: BE7CE61251F3D1B38FBBD66B52CD85C3FDBD35BFB532E3B5214288FB120B63E9 " -orderer0.example.com | "2019-05-02 01:31:11.389 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecf Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:11.392 UTC [fsblkstorage] indexBlock -> DEBU ed0 Indexing block [blockNum=6, blockHash=[]byte{0x49, 0xe, 0xd3, 0x82, 0x36, 0xc9, 0x80, 0xf6, 0xc4, 0xf3, 0x7b, 0x6f, 0x90, 0xf7, 0xc6, 0xcb, 0x46, 0xe1, 0xdb, 0xf2, 0x2, 0x21, 0xed, 0x35, 0x8f, 0x6e, 0xd0, 0x6c, 0xf4, 0x4, 0xb9, 0xfd} txOffsets= -orderer0.example.com | txId=13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa locPointer=offset=70, bytesLength=3053 +orderer0.example.com | "2019-05-02 09:27:36.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:36.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:36.819 UTC [fsblkstorage] updateCheckpoint -> DEBU d7d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86501], isChainEmpty=[false], lastBlockNumber=[5]" +orderer0.example.com | "2019-05-02 09:27:36.819 UTC [orderer.commmon.multichannel] commitBlock -> DEBU d7e [channel: businesschannel] Wrote block [5]" +orderer0.example.com | "2019-05-02 09:27:36.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:36.923 UTC [grpc] infof -> DEBU d80 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:36.925 UTC [orderer.common.broadcast] Handle -> WARN d81 Error reading from 172.18.0.8:57282: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:36.934 UTC [orderer.common.server] func1 -> DEBU d82 Closing Broadcast stream" +orderer0.example.com | "2019-05-02 09:27:36.938 UTC [comm.grpc.server] 1 -> INFO d83 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57282 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.5251949s +orderer0.example.com | "2019-05-02 09:27:36.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d84 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +orderer0.example.com | "2019-05-02 09:27:36.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d85 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2019-05-02 09:27:36.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +orderer0.example.com | "2019-05-02 09:27:36.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.2µs " +orderer0.example.com | "2019-05-02 09:27:36.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU d88 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:36.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU d89 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:37.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:37.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8b Sending msg of 28 bytes to 3 on channel testchainid took 49.6µs" +orderer0.example.com | "2019-05-02 09:27:37.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.5µs " +orderer0.example.com | "2019-05-02 09:27:37.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8d Sending msg of 28 bytes to 2 on channel businesschannel took 83.6µs" +orderer0.example.com | "2019-05-02 09:27:37.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8e Sending msg of 28 bytes to 3 on channel businesschannel took 30.7µs" +orderer0.example.com | "2019-05-02 09:27:37.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.7µs " +orderer0.example.com | "2019-05-02 09:27:37.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 273.8µs " +orderer0.example.com | "2019-05-02 09:27:37.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU d92 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:37.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU d91 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:37.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU d93 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:25.095 UTC [gossip.discovery] handleMsgFromComm -> DEBU bed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.095 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bee Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:25.096 UTC [msp.identity] Verify -> DEBU bef Verify: digest = 00000000 f4 d1 c4 9b 62 5a e5 b2 4a e9 64 51 db 26 4d 06 |....bZ..J.dQ.&M.| +peer0.org1.example.com | 00000010 2b 62 1d 60 54 cb e6 dc 55 1b d8 ef b9 70 3a d5 |+b.`T...U....p:.|" +peer0.org1.example.com | "2019-05-02 09:27:25.096 UTC [msp.identity] Verify -> DEBU bf0 Verify: sig = 00000000 30 45 02 21 00 c2 05 82 c1 0f 60 99 10 15 45 60 |0E.!......`...E`| +peer0.org1.example.com | 00000010 7a 6c 49 ef 90 f1 62 f2 f5 68 0c 84 eb e5 ef 65 |zlI...b..h.....e| +peer0.org1.example.com | 00000020 d3 cf 2a 9c 32 02 20 7d 78 8d d5 9d 83 c8 5c 50 |..*.2. }x.....\P| +peer0.org1.example.com | 00000030 f0 9e 54 72 8b 47 bc 56 16 d6 9d d2 28 86 38 6f |..Tr.G.V....(.8o| +peer0.org1.example.com | 00000040 d1 14 f2 43 d3 72 89 |...C.r.|" +peer0.org1.example.com | "2019-05-02 09:27:25.098 UTC [gossip.discovery] handleAliveMessage -> DEBU bf1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.098 UTC [gossip.discovery] isSentByMe -> DEBU bf2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.098 UTC [gossip.discovery] handleAliveMessage -> DEBU bf3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bf4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:25.099 UTC [msp] DeserializeIdentity -> DEBU bf5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.099 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:25.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bf7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:25.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bf8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:25.100 UTC [policies] Evaluate -> DEBU bf9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:25.100 UTC [policies] Evaluate -> DEBU bfa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:25.100 UTC [policies] Evaluate -> DEBU bfb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func1 -> DEBU bfc 0xc00254c000 gate 1556789245101163900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU bfd 0xc00254c000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU bfe 0xc00254c000 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU bff 0xc00254c000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU c00 0xc00254c000 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:25.101 UTC [cauthdsl] func1 -> DEBU c01 0xc00254c000 gate 1556789245101163900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:25.102 UTC [policies] Evaluate -> DEBU c02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.102 UTC [policies] Evaluate -> DEBU c03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.102 UTC [policies] Evaluate -> DEBU c04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:25.103 UTC [cauthdsl] func1 -> DEBU c05 0xc00254c860 gate 1556789245103217900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:25.103 UTC [cauthdsl] func2 -> DEBU c06 0xc00254c860 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:25.103 UTC [cauthdsl] func2 -> DEBU c07 0xc00254c860 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:25.103 UTC [cauthdsl] func2 -> DEBU c08 0xc00254c860 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:25.104 UTC [msp.identity] Verify -> DEBU c09 Verify: digest = 00000000 60 aa 71 04 ab 45 98 fb 6b 87 6e 67 16 55 ae dc |`.q..E..k.ng.U..| +peer0.org1.example.com | 00000010 0f 96 44 41 8a 33 d1 0e 05 83 37 05 bb 02 51 24 |..DA.3....7...Q$|" +orderer0.example.com | "2019-05-02 09:27:37.718 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 3 on channel testchainid took 28µs" +orderer0.example.com | "2019-05-02 09:27:37.718 UTC [orderer.common.cluster.step] sendMessage -> DEBU d95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 373µs " +orderer0.example.com | "2019-05-02 09:27:37.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d96 Sending msg of 28 bytes to 2 on channel businesschannel took 48.9µs" +orderer0.example.com | "2019-05-02 09:27:37.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d97 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +orderer0.example.com | "2019-05-02 09:27:37.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU d98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 496.9µs " +orderer0.example.com | "2019-05-02 09:27:37.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 653.2µs " +orderer0.example.com | "2019-05-02 09:27:37.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:37.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:38.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:38.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +orderer0.example.com | "2019-05-02 09:27:38.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.9µs " +orderer0.example.com | "2019-05-02 09:27:38.286 UTC [orderer.common.server] Broadcast -> DEBU d9f Starting new Broadcast handler" +orderer0.example.com | "2019-05-02 09:27:38.286 UTC [orderer.common.broadcast] Handle -> DEBU da0 Starting new broadcast loop for 172.18.0.8:57296" +orderer0.example.com | "2019-05-02 09:27:38.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 3 on channel businesschannel took 78.4µs" +orderer0.example.com | "2019-05-02 09:27:38.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da2 Sending msg of 28 bytes to 2 on channel businesschannel took 13.8µs" +orderer0.example.com | "2019-05-02 09:27:38.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU da3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.9µs " +orderer0.example.com | "2019-05-02 09:27:38.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU da4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +orderer0.example.com | "2019-05-02 09:27:38.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU da5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:38.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU da6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:38.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU da7 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:38.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da8 Sending msg of 28 bytes to 3 on channel testchainid took 41.2µs" +orderer0.example.com | "2019-05-02 09:27:38.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU da9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.2µs " +orderer0.example.com | "2019-05-02 09:27:38.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daa Sending msg of 28 bytes to 2 on channel businesschannel took 28.7µs" +orderer0.example.com | "2019-05-02 09:27:38.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dab Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-05-02 09:27:38.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU dac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.7µs " +orderer0.example.com | "2019-05-02 09:27:38.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU dad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.9µs " +orderer0.example.com | "2019-05-02 09:27:38.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU dae Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:38.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU daf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:39.220 UTC [orderer.common.cluster.step] handleMessage -> DEBU db0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:39.220 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db1 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +orderer0.example.com | "2019-05-02 09:27:39.220 UTC [orderer.common.cluster.step] sendMessage -> DEBU db2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.7µs " +orderer0.example.com | "2019-05-02 09:27:39.323 UTC [orderer.common.broadcast] ProcessMessage -> DEBU db3 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57296 with txid '592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-05-02 09:27:39.324 UTC [policies] Evaluate -> DEBU db4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:39.324 UTC [policies] Evaluate -> DEBU db5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:39.324 UTC [policies] Evaluate -> DEBU db6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:27:39.325 UTC [policies] Evaluate -> DEBU db7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:39.325 UTC [policies] Evaluate -> DEBU db8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:39.326 UTC [cauthdsl] func1 -> DEBU db9 0xc000888f30 gate 1556789259325922700 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:39.326 UTC [cauthdsl] func2 -> DEBU dba 0xc000888f30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:39.326 UTC [cauthdsl] func2 -> DEBU dbb 0xc000888f30 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:39.327 UTC [cauthdsl] func2 -> DEBU dbc 0xc000888f30 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:39.327 UTC [msp.identity] Verify -> DEBU dbd Verify: digest = 00000000 ee 3b ed f0 66 6a 84 41 a3 33 12 fd f6 cb eb d8 |.;..fj.A.3......| +peer0.org1.example.com | "2019-05-02 09:27:25.105 UTC [msp.identity] Verify -> DEBU c0a Verify: sig = 00000000 30 44 02 20 0e e0 44 83 d8 00 43 6d 24 fe e5 21 |0D. ..D...Cm$..!| +peer0.org1.example.com | 00000010 5d 5d a6 72 e5 7f 6c 83 73 7f a7 4e e5 50 d7 13 |]].r..l.s..N.P..| +peer0.org1.example.com | 00000020 2d 80 1f 3f 02 20 31 ab db 4e 63 bf 89 c2 c2 79 |-..?. 1..Nc....y| +peer0.org1.example.com | 00000030 f4 15 3f 8e 3d 02 b8 6a fb 3e d4 62 16 61 cf ab |..?.=..j.>.b.a..| +peer0.org1.example.com | 00000040 42 30 64 b5 7c 5a |B0d.|Z|" +peer0.org1.example.com | "2019-05-02 09:27:25.105 UTC [cauthdsl] func2 -> DEBU c0b 0xc00254c860 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:25.105 UTC [cauthdsl] func1 -> DEBU c0c 0xc00254c860 gate 1556789245103217900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:25.106 UTC [policies] Evaluate -> DEBU c0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.106 UTC [policies] Evaluate -> DEBU c0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.107 UTC [policies] Evaluate -> DEBU c0f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.107 UTC [policies] Evaluate -> DEBU c10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.108 UTC [gossip.discovery] handleAliveMessage -> DEBU c11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.108 UTC [gossip.discovery] handleAliveMessage -> DEBU c12 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.108 UTC [gossip.discovery] handleMsgFromComm -> DEBU c13 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.117 UTC [gossip.gossip] handleMessage -> DEBU c14 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.118 UTC [gossip.pull] HandleMessage -> DEBU c15 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.118 UTC [gossip.pull] SendDigest -> DEBU c16 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:25.119 UTC [gossip.gossip] handleMessage -> DEBU c17 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.126 UTC [gossip.gossip] handleMessage -> DEBU c18 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.126 UTC [gossip.gossip] handleMessage -> DEBU c19 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU c1a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.128 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c1b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:25.130 UTC [msp.identity] Verify -> DEBU c1c Verify: digest = 00000000 6a 35 aa 85 56 51 fd f7 1f 00 32 55 34 a9 78 1f |j5..VQ....2U4.x.| +peer0.org1.example.com | 00000010 ef 9f 3b 40 9e 42 79 88 1a 5f f4 3b 06 8f 7d 30 |..;@.By.._.;..}0|" +peer0.org1.example.com | "2019-05-02 09:27:25.130 UTC [msp.identity] Verify -> DEBU c1d Verify: sig = 00000000 30 45 02 21 00 84 5c ed 29 6d 83 2f ef 24 3d 58 |0E.!..\.)m./.$=X| +peer0.org1.example.com | 00000010 bb 10 72 1c f2 93 4a 83 84 67 bd d2 47 59 eb 99 |..r...J..g..GY..| +peer0.org1.example.com | 00000020 ca 45 0b 83 94 02 20 10 cf 2a cd e1 fd 86 c8 45 |.E.... ..*.....E| +peer0.org1.example.com | 00000030 a8 91 8b e9 d3 b9 3e e6 0b cb 13 10 94 b4 d7 60 |......>........`| +peer0.org1.example.com | 00000040 fb 75 1c 24 de 0f eb |.u.$...|" +peer0.org1.example.com | "2019-05-02 09:27:25.131 UTC [msp.identity] Verify -> DEBU c1e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:25.131 UTC [msp.identity] Verify -> DEBU c1f Verify: sig = 00000000 30 45 02 21 00 c6 56 1a 7b c1 b9 02 fc 93 14 71 |0E.!..V.{......q| +peer0.org1.example.com | 00000010 63 35 4c 96 b6 f7 bf 3d dd 13 0e 35 e9 e9 fe 1d |c5L....=...5....| +peer0.org1.example.com | 00000020 00 94 91 44 79 02 20 4a dd ed 07 ad 12 4b b6 1b |...Dy. J.....K..| +peer0.org1.example.com | 00000030 24 4a 8b 92 bf 0d 42 b0 0e 2e 62 32 ad 14 42 32 |$J....B...b2..B2| +peer0.org1.example.com | 00000040 47 f3 51 d5 0d 5c 0f |G.Q..\.|" +peer0.org1.example.com | "2019-05-02 09:27:25.132 UTC [gossip.discovery] handleAliveMessage -> DEBU c20 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.132 UTC [gossip.discovery] learnExistingMembers -> DEBU c21 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:25.132 UTC [gossip.discovery] learnExistingMembers -> DEBU c22 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 " +peer0.org1.example.com | "2019-05-02 09:27:25.132 UTC [gossip.discovery] learnExistingMembers -> DEBU c23 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 " +peer0.org1.example.com | "2019-05-02 09:27:25.133 UTC [gossip.discovery] learnExistingMembers -> DEBU c24 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:25.133 UTC [gossip.discovery] learnExistingMembers -> DEBU c25 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.133 UTC [gossip.discovery] handleAliveMessage -> DEBU c26 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.134 UTC [gossip.discovery] handleMsgFromComm -> DEBU c27 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.134 UTC [gossip.discovery] sendMemResponse -> DEBU c28 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:25.136 UTC [msp] DeserializeIdentity -> DEBU c29 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.138 UTC [msp] DeserializeIdentity -> DEBU c2a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.140 UTC [gossip.comm] Send -> DEBU c2b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:25.141 UTC [gossip.comm] sendToEndpoint -> DEBU c2d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.141 UTC [gossip.comm] sendToEndpoint -> DEBU c2e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.141 UTC [gossip.discovery] sendMemResponse -> DEBU c2c Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:25.172 UTC [endorser] ProcessProposal -> DEBU c2f Entering: request from 172.18.0.8:57266" +peer0.org1.example.com | "2019-05-02 09:27:25.172 UTC [protoutils] ValidateProposalMessage -> DEBU c30 ValidateProposalMessage starts for signed proposal 0xc00232c0f0" +peer0.org1.example.com | "2019-05-02 09:27:25.173 UTC [protoutils] validateChannelHeader -> DEBU c31 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:25.173 UTC [protoutils] checkSignatureFromCreator -> DEBU c32 begin" +peer0.org1.example.com | "2019-05-02 09:27:25.173 UTC [protoutils] checkSignatureFromCreator -> DEBU c33 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:25.174 UTC [protoutils] checkSignatureFromCreator -> DEBU c34 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:25.174 UTC [msp.identity] Verify -> DEBU c35 Verify: digest = 00000000 32 9f 5c 0f 1a d0 23 a5 16 ab 89 b9 d1 eb ca e8 |2.\...#.........| +peer0.org1.example.com | 00000010 8c 6c 83 85 c9 a4 ce 25 df 0b ae 72 f1 c0 59 bb |.l.....%...r..Y.|" +peer0.org1.example.com | "2019-05-02 09:27:25.175 UTC [msp.identity] Verify -> DEBU c36 Verify: sig = 00000000 30 44 02 20 74 43 4c 83 cd 87 51 e6 cb 3d 56 3b |0D. tCL...Q..=V;| +peer0.org1.example.com | 00000010 1c c1 c3 b1 da 70 5a f0 9d 2f bc f6 ed 3a 8b 36 |.....pZ../...:.6| +peer0.org1.example.com | 00000020 77 1c ff c3 02 20 3d 28 85 83 0c d8 2a 83 e3 1c |w.... =(....*...| +peer0.org1.example.com | 00000030 04 1b 27 65 a1 c7 24 0c b3 3c 22 60 e6 79 f2 e3 |..'e..$..<"`.y..| +peer0.org1.example.com | 00000040 ac 58 cf 50 f8 bd |.X.P..|" +peer0.org1.example.com | "2019-05-02 09:27:25.175 UTC [protoutils] checkSignatureFromCreator -> DEBU c37 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:25.175 UTC [protoutils] validateChaincodeProposalMessage -> DEBU c38 validateChaincodeProposalMessage starts for proposal 0xc00017eee0, header 0xc00232c500" +peer0.org1.example.com | "2019-05-02 09:27:25.176 UTC [protoutils] validateChaincodeProposalMessage -> DEBU c39 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:25.176 UTC [endorser] preProcess -> DEBU c3a [][19510801] processing txid: 195108018679eee4043cc567ba2e40314729bf4e7ddd4caa43cf2e515c015814" +peer0.org1.example.com | "2019-05-02 09:27:25.177 UTC [endorser] SimulateProposal -> DEBU c3b [][19510801] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:25.177 UTC [endorser] callChaincode -> INFO c3c [][19510801] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:25.177 UTC [chaincode] Execute -> DEBU c3d Entry" +peer0.org1.example.com | "2019-05-02 09:27:25.178 UTC [msp.identity] Verify -> DEBU c3e Verify: digest = 00000000 32 9f 5c 0f 1a d0 23 a5 16 ab 89 b9 d1 eb ca e8 |2.\...#.........| +peer0.org1.example.com | 00000010 8c 6c 83 85 c9 a4 ce 25 df 0b ae 72 f1 c0 59 bb |.l.....%...r..Y.|" +peer0.org1.example.com | "2019-05-02 09:27:25.178 UTC [msp.identity] Verify -> DEBU c3f Verify: sig = 00000000 30 44 02 20 74 43 4c 83 cd 87 51 e6 cb 3d 56 3b |0D. tCL...Q..=V;| +peer0.org1.example.com | 00000010 1c c1 c3 b1 da 70 5a f0 9d 2f bc f6 ed 3a 8b 36 |.....pZ../...:.6| +peer0.org1.example.com | 00000020 77 1c ff c3 02 20 3d 28 85 83 0c d8 2a 83 e3 1c |w.... =(....*...| +peer0.org1.example.com | 00000030 04 1b 27 65 a1 c7 24 0c b3 3c 22 60 e6 79 f2 e3 |..'e..$..<"`.y..| +peer0.org1.example.com | 00000040 ac 58 cf 50 f8 bd |.X.P..|" +peer0.org1.example.com | "2019-05-02 09:27:25.179 UTC [lifecycle] InstallChaincode -> DEBU c40 received invocation of InstallChaincode for install package 1f8b08000000000000ffecd66750d3d9fa07f08044a58a59a40882040129920412a46b..." +peer0.org1.example.com | "2019-05-02 09:27:25.180 UTC [chaincode] handleMessage -> DEBU c41 [19510801] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:25.180 UTC [chaincode] Notify -> DEBU c42 [19510801] notifying Txid:195108018679eee4043cc567ba2e40314729bf4e7ddd4caa43cf2e515c015814, channelID:" +peer0.org1.example.com | "2019-05-02 09:27:25.180 UTC [chaincode] Execute -> DEBU c43 Exit" +peer0.org1.example.com | "2019-05-02 09:27:25.181 UTC [endorser] callChaincode -> INFO c44 [][19510801] Exit chaincode: name:"_lifecycle" (3ms)" +peer0.org1.example.com | "2019-05-02 09:27:25.181 UTC [endorser] SimulateProposal -> DEBU c45 [][19510801] Exit" +peer0.org1.example.com | "2019-05-02 09:27:25.181 UTC [endorser] func1 -> DEBU c46 Exit: request from 172.18.0.8:57266" +peer0.org1.example.com | "2019-05-02 09:27:25.181 UTC [comm.grpc.server] 1 -> INFO c47 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57266 grpc.code=OK grpc.call_duration=9.3992ms +peer0.org1.example.com | "2019-05-02 09:27:25.187 UTC [grpc] infof -> DEBU c48 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:25.187 UTC [grpc] infof -> DEBU c49 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:25.194 UTC [gossip.gossip] handleMessage -> DEBU c4a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.195 UTC [gossip.pull] HandleMessage -> DEBU c4b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.196 UTC [msp] DeserializeIdentity -> DEBU c4c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.196 UTC [msp] DeserializeIdentity -> DEBU c4d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.197 UTC [gossip.pull] SendDigest -> DEBU c4e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:25.198 UTC [gossip.gossip] handleMessage -> DEBU c4f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.203 UTC [gossip.gossip] handleMessage -> DEBU c50 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.203 UTC [gossip.gossip] handleMessage -> DEBU c51 Exiting" +orderer0.example.com | 00000010 14 22 98 43 7a 96 c1 8d 99 84 14 e1 47 90 8f fd |.".Cz.......G...|" +orderer0.example.com | "2019-05-02 09:27:39.327 UTC [msp.identity] Verify -> DEBU dbe Verify: sig = 00000000 30 45 02 21 00 bd 46 9a fc 92 4f d4 7e 59 1b dc |0E.!..F...O.~Y..| +orderer0.example.com | 00000010 63 67 6c d1 a6 7a 05 97 e6 5a 66 bd a1 3b 6a 8e |cgl..z...Zf..;j.| +orderer0.example.com | 00000020 a0 dd 62 9d ed 02 20 0d 44 82 59 1d 36 d1 fe 40 |..b... .D.Y.6..@| +orderer0.example.com | 00000030 b7 a5 b2 72 f7 51 72 9f c8 89 8b 76 9f 45 9e 8d |...r.Qr....v.E..| +orderer0.example.com | 00000040 ef 22 01 d3 23 c9 7c |."..#.||" +orderer0.example.com | "2019-05-02 09:27:39.328 UTC [cauthdsl] func2 -> DEBU dbf 0xc000888f30 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:39.328 UTC [cauthdsl] func1 -> DEBU dc0 0xc000888f30 gate 1556789259325922700 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc1 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc3 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc5 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:39.328 UTC [orderer.common.blockcutter] Ordered -> DEBU dc7 Enqueuing message into batch" +orderer0.example.com | "2019-05-02 09:27:39.328 UTC [orderer.common.broadcast] ProcessMessage -> DEBU dc8 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57296" +orderer0.example.com | "2019-05-02 09:27:39.332 UTC [orderer.common.broadcast] Handle -> WARN dc9 Error reading from 172.18.0.8:57296: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:39.334 UTC [orderer.common.server] func1 -> DEBU dca Closing Broadcast stream" +orderer0.example.com | "2019-05-02 09:27:39.335 UTC [comm.grpc.server] 1 -> INFO dcb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57296 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1.0490441s +orderer0.example.com | "2019-05-02 09:27:39.333 UTC [grpc] infof -> DEBU dcc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:39.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcd Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +orderer0.example.com | "2019-05-02 09:27:39.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU dce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 563µs " +orderer0.example.com | "2019-05-02 09:27:39.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcf Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-05-02 09:27:39.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.7µs " +orderer0.example.com | "2019-05-02 09:27:39.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:39.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:39.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:39.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 3 on channel testchainid took 30.3µs" +orderer0.example.com | "2019-05-02 09:27:39.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.4µs " +orderer0.example.com | "2019-05-02 09:27:39.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd6 Sending msg of 28 bytes to 2 on channel businesschannel took 37.6µs" +orderer0.example.com | "2019-05-02 09:27:39.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 206.4µs " +orderer0.example.com | "2019-05-02 09:27:39.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd9 Sending msg of 28 bytes to 3 on channel businesschannel took 34.3µs" +orderer0.example.com | "2019-05-02 09:27:39.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210.5µs " +orderer0.example.com | "2019-05-02 09:27:39.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU dda Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:39.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddb Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:40.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddc Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:40.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddd Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" +orderer0.example.com | "2019-05-02 09:27:40.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.6µs " +orderer0.example.com | "2019-05-02 09:27:40.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddf Sending msg of 28 bytes to 2 on channel businesschannel took 36.2µs" +orderer0.example.com | "2019-05-02 09:27:40.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de0 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-05-02 09:27:40.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU de1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 236.7µs " +orderer0.example.com | "2019-05-02 09:27:40.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU de2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.2045ms " +orderer0.example.com | "2019-05-02 09:27:40.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU de3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:40.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU de4 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:25.203 UTC [gossip.discovery] handleMsgFromComm -> DEBU c52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.204 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c53 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:25.204 UTC [msp] DeserializeIdentity -> DEBU c54 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.205 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c55 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:25.205 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c56 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:25.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c57 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:25.206 UTC [policies] Evaluate -> DEBU c58 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:25.206 UTC [policies] Evaluate -> DEBU c59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [policies] Evaluate -> DEBU c5a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func1 -> DEBU c5b 0xc0026153e0 gate 1556789245207239700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5c 0xc0026153e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5d 0xc0026153e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5e 0xc0026153e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5f 0xc0026153e0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:25.207 UTC [cauthdsl] func1 -> DEBU c60 0xc0026153e0 gate 1556789245207239700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [policies] Evaluate -> DEBU c61 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [policies] Evaluate -> DEBU c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [policies] Evaluate -> DEBU c63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [cauthdsl] func1 -> DEBU c64 0xc002615c20 gate 1556789245208489100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [cauthdsl] func2 -> DEBU c65 0xc002615c20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [cauthdsl] func2 -> DEBU c66 0xc002615c20 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:25.208 UTC [cauthdsl] func2 -> DEBU c67 0xc002615c20 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:25.209 UTC [msp.identity] Verify -> DEBU c68 Verify: digest = 00000000 00 2d 21 a4 e9 07 af 9a 18 22 d6 3e 35 56 dc 6f |.-!......".>5V.o| +peer0.org1.example.com | 00000010 dc 3e 6f dc 68 0e ed 14 86 5d 97 ac bb a1 5e 28 |.>o.h....]....^(|" +peer0.org1.example.com | "2019-05-02 09:27:25.209 UTC [msp.identity] Verify -> DEBU c69 Verify: sig = 00000000 30 44 02 20 74 71 fe 1b 28 ab dd ac 6c 08 0c 62 |0D. tq..(...l..b| +peer0.org1.example.com | 00000010 2c c9 7f ff bf 1c fd e1 e4 6f af 15 b6 6d b9 e7 |,........o...m..| +peer0.org1.example.com | 00000020 06 0a f0 1d 02 20 5b 3d f8 66 0f 05 a2 23 a5 ab |..... [=.f...#..| +peer0.org1.example.com | 00000030 d6 bf ad 8e 62 d1 14 91 48 24 a3 89 ff 23 94 dc |....b...H$...#..| +peer0.org1.example.com | 00000040 23 a8 ae ee 39 1f |#...9.|" +peer0.org1.example.com | "2019-05-02 09:27:25.209 UTC [cauthdsl] func2 -> DEBU c6a 0xc002615c20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:25.209 UTC [cauthdsl] func1 -> DEBU c6b 0xc002615c20 gate 1556789245208489100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:25.210 UTC [policies] Evaluate -> DEBU c6c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.211 UTC [policies] Evaluate -> DEBU c6d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.211 UTC [policies] Evaluate -> DEBU c6e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.211 UTC [policies] Evaluate -> DEBU c6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:25.212 UTC [gossip.discovery] handleAliveMessage -> DEBU c70 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.212 UTC [gossip.discovery] learnExistingMembers -> DEBU c71 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:25.212 UTC [gossip.discovery] learnExistingMembers -> DEBU c72 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 " +peer0.org1.example.com | "2019-05-02 09:27:25.212 UTC [gossip.discovery] learnExistingMembers -> DEBU c73 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 " +peer0.org1.example.com | "2019-05-02 09:27:25.213 UTC [gossip.discovery] learnExistingMembers -> DEBU c74 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:25.216 UTC [gossip.discovery] learnExistingMembers -> DEBU c75 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.217 UTC [gossip.discovery] handleAliveMessage -> DEBU c76 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.218 UTC [gossip.discovery] sendMemResponse -> DEBU c77 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:25.218 UTC [msp] DeserializeIdentity -> DEBU c78 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.219 UTC [msp] DeserializeIdentity -> DEBU c79 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.219 UTC [msp] DeserializeIdentity -> DEBU c7a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.219 UTC [gossip.comm] Send -> DEBU c7b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:25.220 UTC [gossip.discovery] sendMemResponse -> DEBU c7c Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:25.220 UTC [gossip.comm] sendToEndpoint -> DEBU c7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.220 UTC [gossip.comm] sendToEndpoint -> DEBU c7e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU c7f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.831 UTC [gossip.comm] func1 -> DEBU c80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12496793612494837772 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.831 UTC [gossip.gossip] handleMessage -> DEBU c81 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12496793612494837772 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.832 UTC [gossip.pull] HandleMessage -> DEBU c82 GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12496793612494837772 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:25.832 UTC [msp] DeserializeIdentity -> DEBU c83 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.832 UTC [msp] DeserializeIdentity -> DEBU c84 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:25.832 UTC [gossip.gossip] handleMessage -> DEBU c85 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:25.832 UTC [gossip.pull] SendRes -> DEBU c86 Sending 2 IDENTITY_MSG items to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:26.078 UTC [gossip.pull] SendReq -> DEBU c87 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:26.078 UTC [gossip.comm] Send -> DEBU c88 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:26.079 UTC [gossip.comm] sendToEndpoint -> DEBU c89 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:26.079 UTC [gossip.comm] sendToEndpoint -> DEBU c8a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:26.078 UTC [gossip.pull] SendReq -> DEBU c8b Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:26.079 UTC [gossip.comm] Send -> DEBU c8c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:26.080 UTC [gossip.comm] sendToEndpoint -> DEBU c8d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:26.080 UTC [gossip.comm] sendToEndpoint -> DEBU c8e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:26.081 UTC [gossip.gossip] handleMessage -> DEBU c8f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10100156514667359141, Envelope: 958 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:26.081 UTC [msp] DeserializeIdentity -> DEBU c90 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c92 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c93 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [policies] Evaluate -> DEBU c94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [policies] Evaluate -> DEBU c95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:26.083 UTC [policies] Evaluate -> DEBU c96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:26.084 UTC [cauthdsl] func1 -> DEBU c97 0xc0028083e0 gate 1556789246083989400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:26.084 UTC [cauthdsl] func2 -> DEBU c98 0xc0028083e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:26.084 UTC [cauthdsl] func2 -> DEBU c99 0xc0028083e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:26.085 UTC [cauthdsl] func2 -> DEBU c9a 0xc0028083e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:26.085 UTC [cauthdsl] func2 -> DEBU c9b 0xc0028083e0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:26.085 UTC [cauthdsl] func1 -> DEBU c9c 0xc0028083e0 gate 1556789246083989400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:26.085 UTC [policies] Evaluate -> DEBU c9d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.086 UTC [policies] Evaluate -> DEBU c9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.086 UTC [policies] Evaluate -> DEBU c9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:26.086 UTC [cauthdsl] func1 -> DEBU ca0 0xc002808c20 gate 1556789246086477200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:26.086 UTC [cauthdsl] func2 -> DEBU ca1 0xc002808c20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:26.086 UTC [cauthdsl] func2 -> DEBU ca2 0xc002808c20 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:26.087 UTC [gossip.comm] func1 -> DEBU ca3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4191687957081881326, Envelope: 956 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:26.087 UTC [cauthdsl] func2 -> DEBU ca4 0xc002808c20 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:26.089 UTC [msp.identity] Verify -> DEBU ca5 Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| +peer0.org1.example.com | 00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" +peer0.org1.example.com | "2019-05-02 09:27:26.089 UTC [msp.identity] Verify -> DEBU ca6 Verify: sig = 00000000 30 45 02 21 00 aa 60 a8 92 c2 2e b3 38 2f f5 c7 |0E.!..`.....8/..| +peer0.org1.example.com | 00000010 7f 31 7c 67 57 c2 f5 44 17 6e 47 86 88 c0 8d 17 |.1|gW..D.nG.....| +peer0.org1.example.com | 00000020 8b a6 f1 0d cc 02 20 67 22 c6 13 53 4e 49 aa 82 |...... g"..SNI..| +peer0.org1.example.com | 00000030 d7 f7 1c 94 93 95 0d 78 e7 99 b9 45 cd 10 02 3e |.......x...E...>| +peer0.org1.example.com | 00000040 a5 67 8e 47 21 e0 6a |.g.G!.j|" +peer0.org1.example.com | "2019-05-02 09:27:26.089 UTC [cauthdsl] func2 -> DEBU ca7 0xc002808c20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:26.090 UTC [cauthdsl] func1 -> DEBU ca8 0xc002808c20 gate 1556789246086477200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:26.090 UTC [policies] Evaluate -> DEBU ca9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.090 UTC [policies] Evaluate -> DEBU caa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.090 UTC [policies] Evaluate -> DEBU cab Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.091 UTC [policies] Evaluate -> DEBU cac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.091 UTC [msp] DeserializeIdentity -> DEBU cad Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:40.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU de5 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:40.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.8µs " +orderer0.example.com | "2019-05-02 09:27:40.717 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de7 Sending msg of 28 bytes to 3 on channel testchainid took 31.3µs" +orderer0.example.com | "2019-05-02 09:27:40.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de8 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +orderer0.example.com | "2019-05-02 09:27:40.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de9 Sending msg of 28 bytes to 3 on channel businesschannel took 41µs" +orderer0.example.com | "2019-05-02 09:27:40.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU dea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 285.5µs " +orderer0.example.com | "2019-05-02 09:27:40.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU deb Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:40.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU dec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.8003ms " +orderer0.example.com | "2019-05-02 09:27:40.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU ded Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:41.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU dee Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:41.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU def Sending msg of 28 bytes to 3 on channel testchainid took 20.3µs" +orderer0.example.com | "2019-05-02 09:27:41.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 218.6µs " +orderer0.example.com | "2019-05-02 09:27:41.331 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU df1 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:41.332 UTC [orderer.consensus.etcdraft] propose -> INFO df2 Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:41.333 UTC [orderer.consensus.etcdraft] 2 -> DEBU df3 Proposed block [6] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:41.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df4 Sending msg of 3181 bytes to 2 on channel businesschannel took 39.5µs" +peer0.org1.example.com | "2019-05-02 09:27:26.091 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:26.092 UTC [gossip.pull] HandleMessage -> DEBU caf GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10100156514667359141, Envelope: 958 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:26.092 UTC [msp] DeserializeIdentity -> DEBU cb0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:26.092 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cb1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:26.093 UTC [msp] DeserializeIdentity -> DEBU cb2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:26.093 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cb3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:26.093 UTC [gossip.gossip] func2 -> DEBU cb4 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-05-02 09:27:26.094 UTC [gossip.pull] HandleMessage -> DEBU cb5 Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 3" +peer0.org1.example.com | "2019-05-02 09:27:26.094 UTC [gossip.gossip] handleMessage -> DEBU cb6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:26.094 UTC [gossip.gossip] handleMessage -> DEBU cb7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4191687957081881326, Envelope: 956 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:26.094 UTC [msp] DeserializeIdentity -> DEBU cb8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:26.095 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cb9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:26.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cba Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:26.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cbb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:26.095 UTC [policies] Evaluate -> DEBU cbc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:26.096 UTC [policies] Evaluate -> DEBU cbd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:26.096 UTC [policies] Evaluate -> DEBU cbe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:26.096 UTC [cauthdsl] func1 -> DEBU cbf 0xc002c42080 gate 1556789246096704600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc0 0xc002c42080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc1 0xc002c42080 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc2 0xc002c42080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc3 0xc002c42080 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:26.098 UTC [cauthdsl] func1 -> DEBU cc4 0xc002c42080 gate 1556789246096704600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:26.098 UTC [policies] Evaluate -> DEBU cc5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.098 UTC [policies] Evaluate -> DEBU cc6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.098 UTC [policies] Evaluate -> DEBU cc7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:26.099 UTC [cauthdsl] func1 -> DEBU cc8 0xc002c428c0 gate 1556789246099359600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:26.099 UTC [cauthdsl] func2 -> DEBU cc9 0xc002c428c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:26.099 UTC [cauthdsl] func2 -> DEBU cca 0xc002c428c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:26.100 UTC [cauthdsl] func2 -> DEBU ccb 0xc002c428c0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:26.100 UTC [msp.identity] Verify -> DEBU ccc Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| +peer0.org1.example.com | 00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" +peer0.org1.example.com | "2019-05-02 09:27:26.100 UTC [msp.identity] Verify -> DEBU ccd Verify: sig = 00000000 30 44 02 20 12 0d 5c d7 38 c9 55 c5 70 5c bc 7c |0D. ..\.8.U.p\.|| +peer0.org1.example.com | 00000010 4b c8 e7 16 65 68 98 43 4f 52 9f f9 a1 7c 0d 32 |K...eh.COR...|.2| +peer0.org1.example.com | 00000020 65 d8 d6 0d 02 20 54 40 e0 e2 9d e8 e1 b6 a9 d7 |e.... T@........| +peer0.org1.example.com | 00000030 80 f4 1c 5b e0 b5 88 54 d2 45 20 68 52 8a de e6 |...[...T.E hR...| +peer0.org1.example.com | 00000040 26 d9 9d 93 d8 7e |&....~|" +peer0.org1.example.com | "2019-05-02 09:27:26.100 UTC [cauthdsl] func2 -> DEBU cce 0xc002c428c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [cauthdsl] func1 -> DEBU ccf 0xc002c428c0 gate 1556789246099359600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:41.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 3181 bytes to 3 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-05-02 09:27:41.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU df6 Send of ConsensusRequest for channel businesschannel with payload of size 3181 to orderer1.example.com(orderer1.example.com:7050) took 100.1µs " +orderer0.example.com | "2019-05-02 09:27:41.403 UTC [orderer.common.cluster.step] sendMessage -> DEBU df7 Send of ConsensusRequest for channel businesschannel with payload of size 3181 to orderer2.example.com(orderer2.example.com:7050) took 561µs " +orderer0.example.com | "2019-05-02 09:27:41.407 UTC [orderer.common.cluster.step] handleMessage -> DEBU df8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:41.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df9 Sending msg of 28 bytes to 2 on channel businesschannel took 265.5µs" +orderer0.example.com | "2019-05-02 09:27:41.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfa Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2019-05-02 09:27:41.408 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 384.8µs " +orderer0.example.com | "2019-05-02 09:27:41.409 UTC [orderer.consensus.etcdraft] writeBlock -> INFO dfc Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:41.409 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU dfd [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-05-02 09:27:41.409 UTC [msp.identity] Sign -> DEBU dfe Sign: plaintext: 0A020802120B0A090A03010203100418...D151EC9BF7DFDE5658923E26A8AEB4BD " +orderer0.example.com | "2019-05-02 09:27:41.410 UTC [msp.identity] Sign -> DEBU dff Sign: digest: 0929A37CDAAD05CF07385DEFE3C8BEB23C7FF4732E3F4F0D02A6404DFB92BAEA " +orderer0.example.com | "2019-05-02 09:27:41.411 UTC [orderer.common.cluster.step] handleMessage -> DEBU e00 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:41.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 216.5µs " +orderer0.example.com | "2019-05-02 09:27:41.412 UTC [fsblkstorage] indexBlock -> DEBU e02 Indexing block [blockNum=6, blockHash=[]byte{0x13, 0xd2, 0x4, 0x27, 0x55, 0xc2, 0x5f, 0x7c, 0x72, 0x4d, 0x56, 0xe4, 0x30, 0x48, 0x7e, 0xa, 0x6b, 0x2c, 0x6b, 0x68, 0x24, 0x9, 0x99, 0xcd, 0x22, 0x6, 0xb1, 0x32, 0xe5, 0x65, 0x92, 0x6c} txOffsets= +orderer0.example.com | txId=592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9 locPointer=offset=70, bytesLength=3055 orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:31:11.398 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:11.412 UTC [fsblkstorage] updateCheckpoint -> DEBU ed2 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90566], isChainEmpty=[false], lastBlockNumber=[6]" -orderer0.example.com | "2019-05-02 01:31:11.414 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ed3 [channel: businesschannel] Wrote block [6]" -orderer0.example.com | "2019-05-02 01:31:11.414 UTC [fsblkstorage] waitForBlock -> DEBU ed4 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-05-02 01:31:11.415 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ed5 Remaining bytes=[4060], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:11.417 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ed6 Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86506], bytesOffset=[86508]}" -orderer0.example.com | "2019-05-02 01:31:11.418 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ed7 blockbytes [4058] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:11.419 UTC [common.deliver] deliverBlocks -> DEBU ed8 [channel: businesschannel] Delivering block [6] for (0xc0008bfb80) for 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:31:11.421 UTC [fsblkstorage] waitForBlock -> DEBU ed9 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-05-02 01:31:11.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 2 on channel businesschannel took 34.4µs" -orderer0.example.com | "2019-05-02 01:31:11.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edb Sending msg of 28 bytes to 3 on channel businesschannel took 28.4µs" -peer0.org1.example.com | "2019-05-02 01:30:53.893 UTC [gossip.gossip] handleMessage -> DEBU dcf Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3942773947184320849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.893 UTC [gossip.pull] HandleMessage -> DEBU dd0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3942773947184320849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.893 UTC [gossip.gossip] handleMessage -> DEBU dd1 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.894 UTC [gossip.gossip] handleMessage -> DEBU dd2 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5645752682005893664 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.894 UTC [gossip.pull] HandleMessage -> DEBU dd3 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5645752682005893664 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.894 UTC [gossip.gossip] handleMessage -> DEBU dd4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.894 UTC [gossip.gossip] handleMessage -> DEBU dd5 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.895 UTC [gossip.pull] HandleMessage -> DEBU dd6 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.895 UTC [msp] DeserializeIdentity -> DEBU dd7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.895 UTC [msp] DeserializeIdentity -> DEBU dd8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.896 UTC [msp] DeserializeIdentity -> DEBU dd9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.896 UTC [msp] DeserializeIdentity -> DEBU dda Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.896 UTC [msp] DeserializeIdentity -> DEBU ddb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.898 UTC [msp] DeserializeIdentity -> DEBU ddc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.899 UTC [gossip.pull] SendDigest -> DEBU ddd Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:30:53.900 UTC [gossip.gossip] handleMessage -> DEBU dde Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.900 UTC [gossip.comm] sendToEndpoint -> DEBU ddf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.901 UTC [gossip.comm] sendToEndpoint -> DEBU de0 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.903 UTC [gossip.comm] sendToEndpoint -> DEBU de1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.904 UTC [gossip.comm] sendToEndpoint -> DEBU de2 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.905 UTC [gossip.comm] sendToEndpoint -> DEBU de3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.905 UTC [gossip.comm] sendToEndpoint -> DEBU de4 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.905 UTC [gossip.comm] func1 -> DEBU de5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-05-02 01:31:11.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU edc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178µs " -orderer0.example.com | "2019-05-02 01:31:11.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU edd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 453.8µs " -orderer0.example.com | "2019-05-02 01:31:11.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU ede Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:11.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU edf Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:11.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee1 Sending msg of 28 bytes to 3 on channel testchainid took 42.9µs" -orderer0.example.com | "2019-05-02 01:31:11.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.2µs " -orderer0.example.com | "2019-05-02 01:31:11.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:12.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee3 Sending msg of 28 bytes to 2 on channel businesschannel took 38.1µs" -orderer0.example.com | "2019-05-02 01:31:12.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee4 Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" -orderer0.example.com | "2019-05-02 01:31:12.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 254.3µs " -orderer0.example.com | "2019-05-02 01:31:12.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.3µs " -orderer0.example.com | "2019-05-02 01:31:12.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee7 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:12.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:12.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:12.045 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eea Sending msg of 28 bytes to 3 on channel testchainid took 10.7µs" -orderer0.example.com | "2019-05-02 01:31:12.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU eeb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " -orderer0.example.com | "2019-05-02 01:31:12.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eec Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" -orderer0.example.com | "2019-05-02 01:31:12.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eee Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" -orderer0.example.com | "2019-05-02 01:31:12.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU eef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.4µs " -orderer0.example.com | "2019-05-02 01:31:12.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU eed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.2µs " -orderer0.example.com | "2019-05-02 01:31:12.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:12.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:12.544 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 3 on channel testchainid took 71.1µs" -orderer0.example.com | "2019-05-02 01:31:12.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " -orderer0.example.com | "2019-05-02 01:31:12.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef4 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:13.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 2 on channel businesschannel took 24.7µs" -orderer0.example.com | "2019-05-02 01:31:13.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef6 Sending msg of 28 bytes to 3 on channel businesschannel took 38µs" -orderer0.example.com | "2019-05-02 01:31:13.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.8µs " -orderer0.example.com | "2019-05-02 01:31:13.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1702ms " -orderer0.example.com | "2019-05-02 01:31:13.042 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:13.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU efa Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:13.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU efb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:13.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efc Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" -orderer0.example.com | "2019-05-02 01:31:13.047 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163µs " -orderer0.example.com | "2019-05-02 01:31:13.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efe Sending msg of 28 bytes to 2 on channel businesschannel took 42.3µs" -orderer0.example.com | "2019-05-02 01:31:13.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f00 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" -orderer0.example.com | "2019-05-02 01:31:13.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.2µs " -orderer0.example.com | "2019-05-02 01:31:13.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU eff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.3µs " -orderer0.example.com | "2019-05-02 01:31:13.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU f02 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:13.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU f03 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:13.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU f04 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:13.550 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f05 Sending msg of 28 bytes to 3 on channel testchainid took 59.7µs" -orderer0.example.com | "2019-05-02 01:31:13.551 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 605.8µs " -orderer0.example.com | "2019-05-02 01:31:14.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f07 Sending msg of 28 bytes to 3 on channel businesschannel took 43.1µs" -orderer0.example.com | "2019-05-02 01:31:14.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f09 Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" -orderer0.example.com | "2019-05-02 01:31:14.049 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 835.8µs " -orderer0.example.com | "2019-05-02 01:31:14.043 UTC [orderer.common.cluster.step] sendMessage -> DEBU f08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471µs " -orderer0.example.com | "2019-05-02 01:31:14.055 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:14.067 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:14.072 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:14.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0e Sending msg of 28 bytes to 3 on channel testchainid took 311.4µs" -peer0.org1.example.com | "2019-05-02 01:30:53.906 UTC [gossip.comm] func1 -> DEBU de6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.906 UTC [gossip.gossip] handleMessage -> DEBU de7 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.906 UTC [gossip.gossip] handleMessage -> DEBU de8 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.906 UTC [gossip.gossip] handleMessage -> DEBU de9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.907 UTC [gossip.discovery] handleMsgFromComm -> DEBU dea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU deb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:30:53.907 UTC [msp] DeserializeIdentity -> DEBU dec Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.908 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ded Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:53.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU dee Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU def Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.908 UTC [policies] Evaluate -> DEBU df0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.909 UTC [policies] Evaluate -> DEBU df1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:53.909 UTC [policies] Evaluate -> DEBU df2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.909 UTC [cauthdsl] func1 -> DEBU df3 0xc002dcb290 gate 1556760653909692500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:53.909 UTC [cauthdsl] func2 -> DEBU df4 0xc002dcb290 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:53.910 UTC [cauthdsl] func2 -> DEBU df5 0xc002dcb290 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:53.910 UTC [cauthdsl] func2 -> DEBU df6 0xc002dcb290 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.910 UTC [msp.identity] Verify -> DEBU df7 Verify: digest = 00000000 da 3f 62 6d e3 0a 94 fd 68 71 cf e1 e7 4d 6d 88 |.?bm....hq...Mm.| -peer0.org1.example.com | 00000010 36 db 5a 5d 3c e7 80 c0 ab 42 15 b2 73 ad ab f3 |6.Z]<....B..s...|" -peer0.org1.example.com | "2019-05-02 01:30:53.910 UTC [msp.identity] Verify -> DEBU df8 Verify: sig = 00000000 30 44 02 20 02 72 db 39 13 d1 76 ba a8 87 64 f5 |0D. .r.9..v...d.| -peer0.org1.example.com | 00000010 43 84 b0 dd cb 42 e3 ff bb 05 d4 38 79 87 7f 0c |C....B.....8y...| -peer0.org1.example.com | 00000020 8b 5a 19 35 02 20 10 b3 0f 14 56 82 12 80 72 b4 |.Z.5. ....V...r.| -peer0.org1.example.com | 00000030 f5 89 33 b7 ef 0d e6 fa 3c 3a 4f f4 9d 95 cc 1b |..3.....<:O.....| -peer0.org1.example.com | 00000040 42 a5 8a ff a9 3f |B....?|" -peer0.org1.example.com | "2019-05-02 01:30:53.911 UTC [cauthdsl] func2 -> DEBU df9 0xc002dcb290 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.911 UTC [cauthdsl] func1 -> DEBU dfa 0xc002dcb290 gate 1556760653909692500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:53.911 UTC [policies] Evaluate -> DEBU dfb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.911 UTC [policies] Evaluate -> DEBU dfc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.911 UTC [policies] Evaluate -> DEBU dfd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.912 UTC [policies] Evaluate -> DEBU dfe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.912 UTC [gossip.discovery] handleAliveMessage -> DEBU dff Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -orderer0.example.com | "2019-05-02 01:31:14.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2359ms " -orderer0.example.com | "2019-05-02 01:31:14.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f10 Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" -orderer0.example.com | "2019-05-02 01:31:14.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f11 Sending msg of 28 bytes to 3 on channel businesschannel took 18.7µs" -orderer0.example.com | "2019-05-02 01:31:14.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU f12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.4µs " -orderer0.example.com | "2019-05-02 01:31:14.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU f13 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:14.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f14 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" -orderer0.example.com | "2019-05-02 01:31:14.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU f15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.2607ms " -orderer0.example.com | "2019-05-02 01:31:14.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU f16 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:14.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU f17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 486.5µs " -orderer0.example.com | "2019-05-02 01:31:14.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU f18 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:14.781 UTC [orderer.common.server] Broadcast -> DEBU f19 Starting new Broadcast handler" -orderer0.example.com | "2019-05-02 01:31:14.781 UTC [orderer.common.broadcast] Handle -> DEBU f1a Starting new broadcast loop for 192.168.240.9:47440" -orderer0.example.com | "2019-05-02 01:31:14.808 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f1b [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47440 with txid '1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183' of type ENDORSER_TRANSACTION" -orderer0.example.com | "2019-05-02 01:31:14.809 UTC [policies] Evaluate -> DEBU f1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:31:14.809 UTC [policies] Evaluate -> DEBU f1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:14.810 UTC [policies] Evaluate -> DEBU f1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:31:14.810 UTC [policies] Evaluate -> DEBU f1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:14.810 UTC [policies] Evaluate -> DEBU f20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:14.811 UTC [cauthdsl] func1 -> DEBU f21 0xc001236880 gate 1556760674811134400 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:14.811 UTC [cauthdsl] func2 -> DEBU f22 0xc001236880 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:14.811 UTC [cauthdsl] func2 -> DEBU f23 0xc001236880 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:14.812 UTC [cauthdsl] func2 -> DEBU f24 0xc001236880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-05-02 01:31:14.812 UTC [cauthdsl] func2 -> DEBU f25 0xc001236880 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:14.813 UTC [cauthdsl] func1 -> DEBU f26 0xc001236880 gate 1556760674811134400 evaluation fails" -orderer0.example.com | "2019-05-02 01:31:14.813 UTC [policies] Evaluate -> DEBU f27 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:14.814 UTC [policies] Evaluate -> DEBU f28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:14.814 UTC [policies] Evaluate -> DEBU f29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:14.814 UTC [cauthdsl] func1 -> DEBU f2a 0xc0012370c0 gate 1556760674814945400 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:14.815 UTC [cauthdsl] func2 -> DEBU f2b 0xc0012370c0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:14.815 UTC [cauthdsl] func2 -> DEBU f2c 0xc0012370c0 processing identity 0 with bytes of efef60" -peer0.org1.example.com | "2019-05-02 01:30:53.912 UTC [gossip.discovery] learnExistingMembers -> DEBU e00 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:53.913 UTC [gossip.discovery] learnExistingMembers -> DEBU e01 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 " -peer0.org1.example.com | "2019-05-02 01:30:53.913 UTC [gossip.discovery] learnExistingMembers -> DEBU e02 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 " -peer0.org1.example.com | "2019-05-02 01:30:53.913 UTC [gossip.discovery] learnExistingMembers -> DEBU e03 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:53.914 UTC [gossip.discovery] learnExistingMembers -> DEBU e04 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.914 UTC [gossip.discovery] handleAliveMessage -> DEBU e05 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU e06 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU e07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e08 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:30:53.916 UTC [msp] DeserializeIdentity -> DEBU e09 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.916 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:53.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e0b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e0c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.917 UTC [policies] Evaluate -> DEBU e0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.917 UTC [policies] Evaluate -> DEBU e0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:53.917 UTC [policies] Evaluate -> DEBU e0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.917 UTC [cauthdsl] func1 -> DEBU e10 0xc002f45500 gate 1556760653917813300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:53.918 UTC [cauthdsl] func2 -> DEBU e11 0xc002f45500 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:53.918 UTC [cauthdsl] func2 -> DEBU e12 0xc002f45500 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:53.918 UTC [cauthdsl] func2 -> DEBU e13 0xc002f45500 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.918 UTC [msp.identity] Verify -> DEBU e14 Verify: digest = 00000000 bd f5 92 e9 8d ef fb a6 d2 14 f9 c8 b7 06 58 92 |..............X.| -peer0.org1.example.com | 00000010 7e d8 16 0f a8 a5 d9 d5 6f 36 ec d7 38 0e 2c f5 |~.......o6..8.,.|" -peer0.org1.example.com | "2019-05-02 01:30:53.918 UTC [msp.identity] Verify -> DEBU e15 Verify: sig = 00000000 30 45 02 21 00 b1 db e9 cc 5a 28 d4 24 8e 74 e7 |0E.!.....Z(.$.t.| -peer0.org1.example.com | 00000010 de 27 cb 76 37 2d 37 ca e4 e2 6b e9 bd 11 2a 9f |.'.v7-7...k...*.| -peer0.org1.example.com | 00000020 6c 45 20 7e f0 02 20 5b 98 21 93 c1 12 d6 7e d4 |lE ~.. [.!....~.| -peer0.org1.example.com | 00000030 48 c9 29 6c ed b9 20 76 88 93 ce 28 59 8d 02 86 |H.)l.. v...(Y...| -peer0.org1.example.com | 00000040 f5 9b 96 9f 24 ed 35 |....$.5|" -peer0.org1.example.com | "2019-05-02 01:30:53.919 UTC [cauthdsl] func2 -> DEBU e16 0xc002f45500 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.919 UTC [cauthdsl] func1 -> DEBU e17 0xc002f45500 gate 1556760653917813300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:53.919 UTC [policies] Evaluate -> DEBU e18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.919 UTC [policies] Evaluate -> DEBU e19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.920 UTC [policies] Evaluate -> DEBU e1a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.920 UTC [policies] Evaluate -> DEBU e1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:14.816 UTC [cauthdsl] func2 -> DEBU f2d 0xc0012370c0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:14.816 UTC [msp.identity] Verify -> DEBU f2e Verify: digest = 00000000 ae 68 b2 66 52 f0 23 85 03 d1 e6 d7 a5 7a e1 b1 |.h.fR.#......z..| -orderer0.example.com | 00000010 c9 9e 4a 42 17 65 4d 07 2c 58 78 00 bb 50 3b d1 |..JB.eM.,Xx..P;.|" -orderer0.example.com | "2019-05-02 01:31:14.816 UTC [msp.identity] Verify -> DEBU f2f Verify: sig = 00000000 30 45 02 21 00 de e4 42 2b 7e c5 77 9f 6f 46 48 |0E.!...B+~.w.oFH| -orderer0.example.com | 00000010 81 4a aa d6 c3 23 79 c6 9a f9 43 c1 7c 47 0a 1d |.J...#y...C.|G..| -orderer0.example.com | 00000020 3b ab f7 cc ec 02 20 7d be 8f 68 b0 dc 63 ed 2b |;..... }..h..c.+| -orderer0.example.com | 00000030 fa 38 90 fb c4 6a 77 16 1d 4a 82 fc ef c9 ec 9c |.8...jw..J......| -orderer0.example.com | 00000040 a1 3e fb a4 7a 34 d4 |.>..z4.|" -orderer0.example.com | "2019-05-02 01:31:14.817 UTC [cauthdsl] func2 -> DEBU f30 0xc0012370c0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:14.817 UTC [cauthdsl] func1 -> DEBU f31 0xc0012370c0 gate 1556760674814945400 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:14.817 UTC [policies] Evaluate -> DEBU f32 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:14.818 UTC [policies] Evaluate -> DEBU f33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:14.818 UTC [policies] Evaluate -> DEBU f34 Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:14.818 UTC [policies] Evaluate -> DEBU f35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:14.819 UTC [policies] Evaluate -> DEBU f36 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:14.819 UTC [policies] Evaluate -> DEBU f37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:14.819 UTC [orderer.common.blockcutter] Ordered -> DEBU f38 Enqueuing message into batch" -orderer0.example.com | "2019-05-02 01:31:14.819 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f39 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47440" -orderer0.example.com | "2019-05-02 01:31:14.823 UTC [grpc] infof -> DEBU f3a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:14.823 UTC [orderer.common.broadcast] Handle -> WARN f3b Error reading from 192.168.240.9:47440: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:14.824 UTC [orderer.common.server] func1 -> DEBU f3c Closing Broadcast stream" -orderer0.example.com | "2019-05-02 01:31:14.824 UTC [comm.grpc.server] 1 -> INFO f3d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47440 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.7662ms -orderer0.example.com | "2019-05-02 01:31:15.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3e Sending msg of 28 bytes to 2 on channel businesschannel took 127.3µs" -orderer0.example.com | "2019-05-02 01:31:15.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 415.4µs " -orderer0.example.com | "2019-05-02 01:31:15.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f40 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" -orderer0.example.com | "2019-05-02 01:31:15.043 UTC [orderer.common.cluster.step] sendMessage -> DEBU f41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.4µs " -orderer0.example.com | "2019-05-02 01:31:15.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:15.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU f43 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:15.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU f44 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:15.049 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f45 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" -orderer0.example.com | "2019-05-02 01:31:15.049 UTC [orderer.common.cluster.step] sendMessage -> DEBU f46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.7µs " -orderer0.example.com | "2019-05-02 01:31:15.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f47 Sending msg of 28 bytes to 2 on channel businesschannel took 42µs" -orderer0.example.com | "2019-05-02 01:31:15.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f48 Sending msg of 28 bytes to 3 on channel businesschannel took 39.1µs" -orderer0.example.com | "2019-05-02 01:31:15.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU f49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 179.9µs " -orderer0.example.com | "2019-05-02 01:31:15.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.7µs " -orderer0.example.com | "2019-05-02 01:31:15.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:15.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:15.544 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4d Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" -orderer0.example.com | "2019-05-02 01:31:15.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.2µs " -orderer0.example.com | "2019-05-02 01:31:15.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f50 Sending msg of 28 bytes to 2 on channel businesschannel took 38.3µs" -orderer0.example.com | "2019-05-02 01:31:16.043 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f51 Sending msg of 28 bytes to 3 on channel businesschannel took 83µs" -orderer0.example.com | "2019-05-02 01:31:16.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU f52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182.3µs " -orderer0.example.com | "2019-05-02 01:31:16.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU f53 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU f54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.2µs " -orderer0.example.com | "2019-05-02 01:31:16.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel testchainid took 143.9µs" -peer0.org1.example.com | "2019-05-02 01:30:53.920 UTC [gossip.discovery] handleAliveMessage -> DEBU e1c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.921 UTC [gossip.discovery] handleAliveMessage -> DEBU e1d got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1556760633753242000, 22 but got ts: inc_num:1556760633753242000 seq_num:21 " -peer0.org1.example.com | "2019-05-02 01:30:53.921 UTC [gossip.discovery] handleAliveMessage -> DEBU e1e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU e1f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.922 UTC [gossip.gossip] handleMessage -> DEBU e20 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.922 UTC [gossip.discovery] sendMemResponse -> DEBU e21 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:30:53.922 UTC [msp] DeserializeIdentity -> DEBU e22 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.923 UTC [msp] DeserializeIdentity -> DEBU e23 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.923 UTC [msp] DeserializeIdentity -> DEBU e24 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.923 UTC [gossip.comm] Send -> DEBU e25 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:53.923 UTC [gossip.discovery] sendMemResponse -> DEBU e26 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:53.923 UTC [gossip.comm] sendToEndpoint -> DEBU e27 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.923 UTC [gossip.comm] sendToEndpoint -> DEBU e28 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.924 UTC [gossip.comm] func1 -> DEBU e29 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.924 UTC [gossip.gossip] handleMessage -> DEBU e2a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.925 UTC [gossip.gossip] handleMessage -> DEBU e2b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU e2c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU e2d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.926 UTC [gossip.gossip] handleMessage -> DEBU e2e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.926 UTC [gossip.gossip] handleMessage -> DEBU e2f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU e30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU e31 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.963 UTC [msp] DeserializeIdentity -> DEBU e32 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.972 UTC [gossip.comm] func1 -> DEBU e33 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.973 UTC [gossip.gossip] handleMessage -> DEBU e34 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.973 UTC [gossip.gossip] handleMessage -> DEBU e35 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.973 UTC [gossip.discovery] handleMsgFromComm -> DEBU e36 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.974 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e37 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:53.974 UTC [msp.identity] Verify -> DEBU e38 Verify: digest = 00000000 46 51 e7 c7 6b ed cc 55 07 07 99 b0 55 94 05 80 |FQ..k..U....U...| -peer0.org1.example.com | 00000010 ea 09 d1 ce e5 89 87 7a 84 f9 ab ba 04 82 b9 53 |.......z.......S|" -peer0.org1.example.com | "2019-05-02 01:30:53.974 UTC [msp.identity] Verify -> DEBU e39 Verify: sig = 00000000 30 45 02 21 00 d4 12 f7 c1 39 cf af 37 5f ed b5 |0E.!.....9..7_..| -peer0.org1.example.com | 00000010 9b e4 46 ab e4 83 c5 78 04 70 bb fc 62 d9 13 66 |..F....x.p..b..f| -peer0.org1.example.com | 00000020 13 94 9b dc a9 02 20 2e 7c 31 1b b9 c5 d0 da 68 |...... .|1.....h| -peer0.org1.example.com | 00000030 cd d4 38 83 ea 16 6a 64 28 45 c5 95 11 c2 43 c7 |..8...jd(E....C.| -peer0.org1.example.com | 00000040 2b e4 cd 57 32 45 94 |+..W2E.|" -peer0.org1.example.com | "2019-05-02 01:30:53.975 UTC [gossip.discovery] handleAliveMessage -> DEBU e3a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.975 UTC [gossip.discovery] isSentByMe -> DEBU e3b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.975 UTC [gossip.discovery] handleAliveMessage -> DEBU e3c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e3d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:53.976 UTC [msp.identity] Verify -> DEBU e3e Verify: digest = 00000000 f9 f2 78 69 52 44 10 3e 3f 80 96 bb 88 64 e6 e3 |..xiRD.>?....d..| -peer0.org1.example.com | 00000010 78 8d b4 bb a2 9a dd 5f fe f1 d7 3e c7 15 bf 87 |x......_...>....|" -orderer0.example.com | "2019-05-02 01:31:16.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU f56 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.048 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 680.8µs " -orderer0.example.com | "2019-05-02 01:31:16.048 UTC [orderer.common.cluster.step] handleMessage -> DEBU f58 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f59 Sending msg of 28 bytes to 2 on channel businesschannel took 34.6µs" -orderer0.example.com | "2019-05-02 01:31:16.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5b Sending msg of 28 bytes to 3 on channel businesschannel took 18.3µs" -orderer0.example.com | "2019-05-02 01:31:16.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " -orderer0.example.com | "2019-05-02 01:31:16.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 292.7µs " -orderer0.example.com | "2019-05-02 01:31:16.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" -orderer0.example.com | "2019-05-02 01:31:16.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.8µs " -orderer0.example.com | "2019-05-02 01:31:16.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU f60 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU f61 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.820 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU f62 Batch timer expired, creating block" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:16.821 UTC [orderer.consensus.etcdraft] propose -> INFO f63 Created block [7], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:16.822 UTC [orderer.consensus.etcdraft] 2 -> DEBU f64 Proposed block [7] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:16.826 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f65 Sending msg of 3170 bytes to 2 on channel businesschannel took 23.4µs" -orderer0.example.com | "2019-05-02 01:31:16.826 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 3170 bytes to 3 on channel businesschannel took 25.1µs" -orderer0.example.com | "2019-05-02 01:31:16.826 UTC [orderer.common.cluster.step] sendMessage -> DEBU f66 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 218.8µs " -orderer0.example.com | "2019-05-02 01:31:16.827 UTC [orderer.common.cluster.step] sendMessage -> DEBU f68 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 101.5µs " -orderer0.example.com | "2019-05-02 01:31:16.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU f69 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.831 UTC [orderer.consensus.etcdraft] writeBlock -> INFO f6a Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:16.834 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU f6e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-05-02 01:31:16.835 UTC [msp.identity] Sign -> DEBU f6f Sign: plaintext: 0A020802120B0A090A03010203100418...959938B4CEB1403A1CD112F66273DB37 " -orderer0.example.com | "2019-05-02 01:31:16.835 UTC [msp.identity] Sign -> DEBU f70 Sign: digest: 60FE5FC4683DA8F8D104F2DF88E5B60C917F14C9146CC12BE895B761939AF825 " -orderer0.example.com | "2019-05-02 01:31:16.831 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6c Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" -orderer0.example.com | "2019-05-02 01:31:16.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88µs " -orderer0.example.com | "2019-05-02 01:31:16.836 UTC [orderer.common.cluster.step] handleMessage -> DEBU f71 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.836 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f72 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" -orderer0.example.com | "2019-05-02 01:31:16.837 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 447.2µs " -orderer0.example.com | "2019-05-02 01:31:16.840 UTC [fsblkstorage] indexBlock -> DEBU f74 Indexing block [blockNum=7, blockHash=[]byte{0xbc, 0xfa, 0x3c, 0x5a, 0xf3, 0x9f, 0x56, 0x93, 0x3b, 0x6f, 0xab, 0xd3, 0xf7, 0xd1, 0x48, 0x7b, 0xa0, 0x71, 0x3f, 0x9, 0x7d, 0xfc, 0x8, 0x82, 0xd0, 0xc4, 0xc7, 0x31, 0xfc, 0x30, 0x55, 0x44} txOffsets= -orderer0.example.com | txId=1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183 locPointer=offset=70, bytesLength=3044 +orderer0.example.com | "2019-05-02 09:27:41.414 UTC [fsblkstorage] updateCheckpoint -> DEBU e03 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90563], isChainEmpty=[false], lastBlockNumber=[6]" +orderer0.example.com | "2019-05-02 09:27:41.414 UTC [orderer.commmon.multichannel] commitBlock -> DEBU e04 [channel: businesschannel] Wrote block [6]" +orderer0.example.com | "2019-05-02 09:27:41.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:41.433 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:41.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel businesschannel took 180.2µs" +orderer0.example.com | "2019-05-02 09:27:41.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e08 Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +orderer0.example.com | "2019-05-02 09:27:41.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU e09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 381.6µs " +orderer0.example.com | "2019-05-02 09:27:41.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.7µs " +orderer0.example.com | "2019-05-02 09:27:41.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [msp] DeserializeIdentity -> DEBU cd4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cd5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [gossip.pull] HandleMessage -> DEBU cd6 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4191687957081881326, Envelope: 956 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [msp] DeserializeIdentity -> DEBU cd7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cd8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [msp] DeserializeIdentity -> DEBU cd9 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:41.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:41.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:41.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0e Sending msg of 28 bytes to 3 on channel testchainid took 57.7µs" +orderer0.example.com | "2019-05-02 09:27:41.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.7µs " +orderer0.example.com | "2019-05-02 09:27:41.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 2 on channel businesschannel took 44.6µs" +orderer0.example.com | "2019-05-02 09:27:41.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-05-02 09:27:41.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.4µs " +orderer0.example.com | "2019-05-02 09:27:41.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91µs " +orderer0.example.com | "2019-05-02 09:27:41.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU e14 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:41.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:42.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:42.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e17 Sending msg of 28 bytes to 3 on channel testchainid took 10.3µs" +orderer0.example.com | "2019-05-02 09:27:42.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU e18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +orderer0.example.com | "2019-05-02 09:27:42.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU e19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs " +orderer0.example.com | "2019-05-02 09:27:42.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-05-02 09:27:42.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" +orderer0.example.com | "2019-05-02 09:27:42.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 451.5µs " +orderer0.example.com | "2019-05-02 09:27:42.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:42.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:42.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:42.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e20 Sending msg of 28 bytes to 3 on channel testchainid took 31.6µs" +orderer0.example.com | "2019-05-02 09:27:42.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 552.2µs " +orderer0.example.com | "2019-05-02 09:27:42.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel businesschannel took 63.8µs" +orderer0.example.com | "2019-05-02 09:27:42.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.5µs " +orderer0.example.com | "2019-05-02 09:27:42.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 2 on channel businesschannel took 28.7µs" +orderer0.example.com | "2019-05-02 09:27:42.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU e25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 461.7µs " +orderer0.example.com | "2019-05-02 09:27:42.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU e26 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:42.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:43.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:43.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e29 Sending msg of 28 bytes to 3 on channel testchainid took 52.2µs" +orderer0.example.com | "2019-05-02 09:27:43.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.2µs " +orderer0.example.com | "2019-05-02 09:27:43.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 2 on channel businesschannel took 49.4µs" +orderer0.example.com | "2019-05-02 09:27:43.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 3 on channel businesschannel took 27.8µs" +orderer0.example.com | "2019-05-02 09:27:43.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 515.7µs " +orderer0.example.com | "2019-05-02 09:27:43.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5106ms " +orderer0.example.com | "2019-05-02 09:27:43.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:43.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:43.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cda Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [gossip.gossip] func2 -> DEBU cdb Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [gossip.pull] HandleMessage -> DEBU cdc Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 4" +peer0.org1.example.com | "2019-05-02 09:27:26.101 UTC [gossip.gossip] handleMessage -> DEBU cdd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:26.194 UTC [gossip.gossip] handleMessage -> DEBU cde Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13530515940468942437 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:26.194 UTC [gossip.pull] HandleMessage -> DEBU cdf GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13530515940468942437 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:26.194 UTC [msp] DeserializeIdentity -> DEBU ce0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:26.194 UTC [gossip.gossip] handleMessage -> DEBU ce1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:26.194 UTC [gossip.pull] SendRes -> DEBU ce2 Sending 1 IDENTITY_MSG items to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:26.284 UTC [gossip.channel] reportMembershipChanges -> INFO ce3 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-05-02 09:27:27.340 UTC [gossip.election] waitForInterrupt -> DEBU ce4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:27:27.340 UTC [gossip.election] IsLeader -> DEBU ce5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:27:27.340 UTC [msp.identity] Sign -> DEBU ce6 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510031801 " +peer0.org1.example.com | "2019-05-02 09:27:27.340 UTC [msp.identity] Sign -> DEBU ce7 Sign: digest: 2FD57F641333F770D98B5F06B717144D825CB541233AB40BA3CA975EAE26E353 " +peer0.org1.example.com | "2019-05-02 09:27:27.340 UTC [gossip.election] waitForInterrupt -> DEBU ce8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU ce9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU cea Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU ceb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU cec Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:27.341 UTC [gossip.comm] Send -> DEBU ced Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:27.342 UTC [msp] DeserializeIdentity -> DEBU cee Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:27.342 UTC [msp] DeserializeIdentity -> DEBU cef Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:27.342 UTC [gossip.comm] sendToEndpoint -> DEBU cf0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:27.342 UTC [gossip.comm] sendToEndpoint -> DEBU cf1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [endorser] ProcessProposal -> DEBU cf2 Entering: request from 172.18.0.8:57282" +peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [protoutils] ValidateProposalMessage -> DEBU cf3 ValidateProposalMessage starts for signed proposal 0xc0023a8000" +peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [protoutils] validateChannelHeader -> DEBU cf4 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [protoutils] checkSignatureFromCreator -> DEBU cf5 begin" +peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [protoutils] checkSignatureFromCreator -> DEBU cf6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:27.732 UTC [protoutils] checkSignatureFromCreator -> DEBU cf7 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:27.733 UTC [msp.identity] Verify -> DEBU cf8 Verify: digest = 00000000 6a a5 8a ce 8c 28 73 88 7a 8f 7f 2a 53 1f 44 e6 |j....(s.z..*S.D.| +peer0.org1.example.com | 00000010 f1 37 ba a4 1b 4f 20 47 33 6a 91 77 18 f3 87 fc |.7...O G3j.w....|" +peer0.org1.example.com | "2019-05-02 09:27:27.733 UTC [msp.identity] Verify -> DEBU cf9 Verify: sig = 00000000 30 45 02 21 00 c3 37 52 59 50 82 19 de 9a 21 e3 |0E.!..7RYP....!.| +peer0.org1.example.com | 00000010 13 22 b2 ec e6 36 9c ab a9 f7 7a 35 19 ec 43 2d |."...6....z5..C-| +peer0.org1.example.com | 00000020 35 55 e1 3f 78 02 20 50 b7 10 b1 9b 3d 87 5d 92 |5U.?x. P....=.].| +peer0.org1.example.com | 00000030 0a bb 63 7c a7 cf 01 dc 84 3a 98 d8 75 ce ea e6 |..c|.....:..u...| +peer0.org1.example.com | 00000040 b9 f5 68 c6 9b a4 94 |..h....|" +peer0.org1.example.com | "2019-05-02 09:27:27.733 UTC [protoutils] checkSignatureFromCreator -> DEBU cfa exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:27.733 UTC [protoutils] validateChaincodeProposalMessage -> DEBU cfb validateChaincodeProposalMessage starts for proposal 0xc00039ed90, header 0xc0023a8410" +peer0.org1.example.com | "2019-05-02 09:27:27.733 UTC [protoutils] validateChaincodeProposalMessage -> DEBU cfc validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:27.734 UTC [endorser] preProcess -> DEBU cfd [][3c8f6041] processing txid: 3c8f604153da77dec4f675be776b65094edad18e5a0fe1be93aefcf8a0748892" +peer0.org1.example.com | "2019-05-02 09:27:27.734 UTC [endorser] SimulateProposal -> DEBU cfe [][3c8f6041] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:27.734 UTC [endorser] callChaincode -> INFO cff [][3c8f6041] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:27.734 UTC [chaincode] Execute -> DEBU d00 Entry" +peer0.org1.example.com | "2019-05-02 09:27:27.735 UTC [msp.identity] Verify -> DEBU d01 Verify: digest = 00000000 6a a5 8a ce 8c 28 73 88 7a 8f 7f 2a 53 1f 44 e6 |j....(s.z..*S.D.| +peer0.org1.example.com | 00000010 f1 37 ba a4 1b 4f 20 47 33 6a 91 77 18 f3 87 fc |.7...O G3j.w....|" +peer0.org1.example.com | "2019-05-02 09:27:27.735 UTC [msp.identity] Verify -> DEBU d02 Verify: sig = 00000000 30 45 02 21 00 c3 37 52 59 50 82 19 de 9a 21 e3 |0E.!..7RYP....!.| +peer0.org1.example.com | 00000010 13 22 b2 ec e6 36 9c ab a9 f7 7a 35 19 ec 43 2d |."...6....z5..C-| +peer0.org1.example.com | 00000020 35 55 e1 3f 78 02 20 50 b7 10 b1 9b 3d 87 5d 92 |5U.?x. P....=.].| +peer0.org1.example.com | 00000030 0a bb 63 7c a7 cf 01 dc 84 3a 98 d8 75 ce ea e6 |..c|.....:..u...| +peer0.org1.example.com | 00000040 b9 f5 68 c6 9b a4 94 |..h....|" +peer0.org1.example.com | "2019-05-02 09:27:27.735 UTC [lifecycle] QueryInstalledChaincodes -> DEBU d03 received invocation of QueryInstalledChaincodes" +peer0.org1.example.com | "2019-05-02 09:27:27.736 UTC [chaincode] handleMessage -> DEBU d04 [3c8f6041] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.736 UTC [chaincode] Notify -> DEBU d05 [3c8f6041] notifying Txid:3c8f604153da77dec4f675be776b65094edad18e5a0fe1be93aefcf8a0748892, channelID:" +peer0.org1.example.com | "2019-05-02 09:27:27.736 UTC [chaincode] Execute -> DEBU d06 Exit" +peer0.org1.example.com | "2019-05-02 09:27:27.736 UTC [endorser] callChaincode -> INFO d07 [][3c8f6041] Exit chaincode: name:"_lifecycle" (2ms)" +peer0.org1.example.com | "2019-05-02 09:27:27.737 UTC [endorser] SimulateProposal -> DEBU d08 [][3c8f6041] Exit" +peer0.org1.example.com | "2019-05-02 09:27:27.737 UTC [endorser] func1 -> DEBU d09 Exit: request from 172.18.0.8:57282" +peer0.org1.example.com | "2019-05-02 09:27:27.737 UTC [comm.grpc.server] 1 -> INFO d0a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57282 grpc.code=OK grpc.call_duration=5.0127ms +peer0.org1.example.com | "2019-05-02 09:27:27.741 UTC [grpc] infof -> DEBU d0c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:27.741 UTC [grpc] infof -> DEBU d0b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:27.922 UTC [endorser] ProcessProposal -> DEBU d0d Entering: request from 172.18.0.8:57286" +peer0.org1.example.com | "2019-05-02 09:27:27.922 UTC [protoutils] ValidateProposalMessage -> DEBU d0e ValidateProposalMessage starts for signed proposal 0xc0023a90e0" +peer0.org1.example.com | "2019-05-02 09:27:27.923 UTC [protoutils] validateChannelHeader -> DEBU d0f validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:27.923 UTC [protoutils] checkSignatureFromCreator -> DEBU d10 begin" +peer0.org1.example.com | "2019-05-02 09:27:27.923 UTC [msp] GetManagerForChain -> DEBU d11 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:27.924 UTC [msp] DeserializeIdentity -> DEBU d12 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:27.924 UTC [msp.identity] newIdentity -> DEBU d13 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:27.925 UTC [protoutils] checkSignatureFromCreator -> DEBU d14 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:27.925 UTC [msp] Validate -> DEBU d15 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:27.926 UTC [msp] getCertificationChain -> DEBU d16 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:27.926 UTC [protoutils] checkSignatureFromCreator -> DEBU d17 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:27.927 UTC [msp.identity] Verify -> DEBU d18 Verify: digest = 00000000 e4 3e fe cb a2 3d 1b 8a de c1 e4 0a a1 c7 84 10 |.>...=..........| +peer0.org1.example.com | 00000010 c6 81 84 91 e5 cb 0f 9a 62 c2 07 e1 8b 5a d6 6b |........b....Z.k|" +peer0.org1.example.com | "2019-05-02 09:27:27.927 UTC [msp.identity] Verify -> DEBU d19 Verify: sig = 00000000 30 44 02 20 52 c1 2a 1d b7 99 9e 59 aa 99 47 4a |0D. R.*....Y..GJ| +peer0.org1.example.com | 00000010 d0 bf 6b 76 86 d5 b9 dc 23 e5 8a bf cd fc 99 64 |..kv....#......d| +peer0.org1.example.com | 00000020 98 17 49 47 02 20 0a fc cc 30 f7 eb 39 b8 35 20 |..IG. ...0..9.5 | +orderer0.example.com | "2019-05-02 09:27:43.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU e32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.2µs " +orderer0.example.com | "2019-05-02 09:27:43.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e33 Sending msg of 28 bytes to 3 on channel testchainid took 183.5µs" +orderer0.example.com | "2019-05-02 09:27:43.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +orderer0.example.com | "2019-05-02 09:27:43.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +orderer0.example.com | "2019-05-02 09:27:43.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 397.2µs " +orderer0.example.com | "2019-05-02 09:27:43.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7465ms " +orderer0.example.com | "2019-05-02 09:27:43.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:43.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:44.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:44.183 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 467.6µs " +orderer0.example.com | "2019-05-02 09:27:44.182 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3c Sending msg of 28 bytes to 3 on channel testchainid took 67.9µs" +orderer0.example.com | "2019-05-02 09:27:44.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +orderer0.example.com | "2019-05-02 09:27:44.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-05-02 09:27:44.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.8µs " +orderer0.example.com | "2019-05-02 09:27:44.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.8µs " +orderer0.example.com | "2019-05-02 09:27:44.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU e41 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:44.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:44.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:44.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e44 Sending msg of 28 bytes to 3 on channel testchainid took 44.7µs" +orderer0.example.com | "2019-05-02 09:27:44.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU e45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2039ms " +orderer0.example.com | "2019-05-02 09:27:44.932 UTC [orderer.common.server] Broadcast -> DEBU e46 Starting new Broadcast handler" +orderer0.example.com | "2019-05-02 09:27:44.932 UTC [orderer.common.broadcast] Handle -> DEBU e47 Starting new broadcast loop for 172.18.0.8:57308" +orderer0.example.com | "2019-05-02 09:27:44.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-05-02 09:27:44.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +orderer0.example.com | "2019-05-02 09:27:44.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.9µs " +orderer0.example.com | "2019-05-02 09:27:44.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.2µs " +orderer0.example.com | "2019-05-02 09:27:44.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:44.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:44.956 UTC [orderer.common.broadcast] ProcessMessage -> DEBU e4e [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57308 with txid '91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e4f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e50 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e51 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e52 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:44.957 UTC [cauthdsl] func1 -> DEBU e54 0xc0010e3a80 gate 1556789264957658800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:44.957 UTC [cauthdsl] func2 -> DEBU e55 0xc0010e3a80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:44.957 UTC [cauthdsl] func2 -> DEBU e56 0xc0010e3a80 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:44.958 UTC [cauthdsl] func2 -> DEBU e57 0xc0010e3a80 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:44.958 UTC [msp.identity] Verify -> DEBU e58 Verify: digest = 00000000 4b 54 f8 96 1e 46 32 1a 3e 10 d7 c7 2f 4b 4e af |KT...F2.>.../KN.| +orderer0.example.com | 00000010 64 13 11 09 83 a2 1e 74 33 1e 72 d2 2d 1e 49 33 |d......t3.r.-.I3|" +orderer0.example.com | "2019-05-02 09:27:44.958 UTC [msp.identity] Verify -> DEBU e59 Verify: sig = 00000000 30 45 02 21 00 9a 74 50 45 f1 33 ed 80 bc 70 62 |0E.!..tPE.3...pb| +orderer0.example.com | 00000010 a6 3b 96 31 9d 46 f9 6f cb c3 bf 48 3c 00 f1 ff |.;.1.F.o...H<...| +orderer0.example.com | 00000020 0e ef 32 4e a2 02 20 6f f9 b6 f8 46 5b ad 9b 89 |..2N.. o...F[...| +orderer0.example.com | 00000030 9f 71 ee 1f 7e b2 2f e3 88 bf f4 76 96 0a a8 04 |.q..~./....v....| +orderer0.example.com | 00000040 fe 64 c2 00 aa 35 b0 |.d...5.|" +peer0.org1.example.com | 00000030 4e b5 5f 5b 73 71 b4 d9 23 87 14 a2 7a 5f d9 60 |N._[sq..#...z_.`| +peer0.org1.example.com | 00000040 42 93 a3 05 09 51 |B....Q|" +peer0.org1.example.com | "2019-05-02 09:27:27.928 UTC [protoutils] checkSignatureFromCreator -> DEBU d1a exits successfully" +orderer0.example.com | "2019-05-02 09:27:44.958 UTC [cauthdsl] func2 -> DEBU e5a 0xc0010e3a80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:44.958 UTC [cauthdsl] func1 -> DEBU e5b 0xc0010e3a80 gate 1556789264957658800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5e Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:44.959 UTC [policies] Evaluate -> DEBU e60 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:44.959 UTC [policies] Evaluate -> DEBU e61 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:44.959 UTC [orderer.common.blockcutter] Ordered -> DEBU e62 Enqueuing message into batch" +orderer0.example.com | "2019-05-02 09:27:44.959 UTC [orderer.common.broadcast] ProcessMessage -> DEBU e63 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57308" +orderer0.example.com | "2019-05-02 09:27:44.963 UTC [grpc] infof -> DEBU e65 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:44.963 UTC [orderer.common.broadcast] Handle -> WARN e64 Error reading from 172.18.0.8:57308: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:44.963 UTC [orderer.common.server] func1 -> DEBU e66 Closing Broadcast stream" +orderer0.example.com | "2019-05-02 09:27:44.963 UTC [comm.grpc.server] 1 -> INFO e67 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57308 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.1271ms +orderer0.example.com | "2019-05-02 09:27:45.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:45.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e69 Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs" +orderer0.example.com | "2019-05-02 09:27:45.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.7µs " +orderer0.example.com | "2019-05-02 09:27:45.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 2 on channel businesschannel took 40.5µs" +orderer0.example.com | "2019-05-02 09:27:45.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 3 on channel businesschannel took 36.2µs" +orderer0.example.com | "2019-05-02 09:27:45.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 365µs " +orderer0.example.com | "2019-05-02 09:27:45.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 204.2µs " +orderer0.example.com | "2019-05-02 09:27:45.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:45.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:45.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:45.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e72 Sending msg of 28 bytes to 3 on channel testchainid took 113.1µs" +orderer0.example.com | "2019-05-02 09:27:45.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU e73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.8µs " +orderer0.example.com | "2019-05-02 09:27:45.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 2 on channel businesschannel took 88.9µs" +orderer0.example.com | "2019-05-02 09:27:45.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e75 Sending msg of 28 bytes to 3 on channel businesschannel took 29µs" +orderer0.example.com | "2019-05-02 09:27:45.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.9µs " +orderer0.example.com | "2019-05-02 09:27:45.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.7µs " +orderer0.example.com | "2019-05-02 09:27:45.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:45.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:46.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:46.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7b Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs" +orderer0.example.com | "2019-05-02 09:27:46.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.7µs " +orderer0.example.com | "2019-05-02 09:27:46.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 2 on channel businesschannel took 35.2µs" +orderer0.example.com | "2019-05-02 09:27:46.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7e Sending msg of 28 bytes to 3 on channel businesschannel took 30.5µs" +orderer0.example.com | "2019-05-02 09:27:46.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.8µs " +orderer0.example.com | "2019-05-02 09:27:46.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.1µs " +orderer0.example.com | "2019-05-02 09:27:46.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:46.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:27.928 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d1b validateChaincodeProposalMessage starts for proposal 0xc00039f8f0, header 0xc0023a9540" +peer0.org1.example.com | "2019-05-02 09:27:27.929 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d1c validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:27.929 UTC [endorser] preProcess -> DEBU d1d [businesschannel][fd30334a] processing txid: fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940" +peer0.org1.example.com | "2019-05-02 09:27:27.929 UTC [fsblkstorage] retrieveTransactionByID -> DEBU d1e retrieveTransactionByID() - txId = [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +peer0.org1.example.com | "2019-05-02 09:27:27.930 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU d1f constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:27.930 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU d20 constructing new tx simulator txid = [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +peer0.org1.example.com | "2019-05-02 09:27:27.931 UTC [endorser] SimulateProposal -> DEBU d21 [businesschannel][fd30334a] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:27.931 UTC [endorser] callChaincode -> INFO d22 [businesschannel][fd30334a] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:27.932 UTC [chaincode] Execute -> DEBU d23 Entry" +peer0.org1.example.com | "2019-05-02 09:27:27.932 UTC [msp.identity] Verify -> DEBU d24 Verify: digest = 00000000 e4 3e fe cb a2 3d 1b 8a de c1 e4 0a a1 c7 84 10 |.>...=..........| +peer0.org1.example.com | 00000010 c6 81 84 91 e5 cb 0f 9a 62 c2 07 e1 8b 5a d6 6b |........b....Z.k|" +peer0.org1.example.com | "2019-05-02 09:27:27.932 UTC [msp.identity] Verify -> DEBU d25 Verify: sig = 00000000 30 44 02 20 52 c1 2a 1d b7 99 9e 59 aa 99 47 4a |0D. R.*....Y..GJ| +peer0.org1.example.com | 00000010 d0 bf 6b 76 86 d5 b9 dc 23 e5 8a bf cd fc 99 64 |..kv....#......d| +peer0.org1.example.com | 00000020 98 17 49 47 02 20 0a fc cc 30 f7 eb 39 b8 35 20 |..IG. ...0..9.5 | +peer0.org1.example.com | 00000030 4e b5 5f 5b 73 71 b4 d9 23 87 14 a2 7a 5f d9 60 |N._[sq..#...z_.`| +peer0.org1.example.com | 00000040 42 93 a3 05 09 51 |B....Q|" +peer0.org1.example.com | "2019-05-02 09:27:27.933 UTC [lifecycle] ApproveChaincodeDefinitionForMyOrg -> DEBU d26 received invocation of ApproveChaincodeDefinitionForMyOrg on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] handleMessage -> DEBU d27 [fd30334a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleTransaction -> DEBU d28 [fd30334a] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleGetState -> DEBU d29 [fd30334a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [stateleveldb] GetState -> DEBU d2a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleGetState -> DEBU d2b [fd30334a] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleTransaction -> DEBU d2c [fd30334a] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] handleMessage -> DEBU d2d [fd30334a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleTransaction -> DEBU d2e [fd30334a] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [chaincode] HandleGetState -> DEBU d2f [fd30334a] getting state for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [msp] GetManagerForChain -> DEBU d30 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU d31 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:27.934 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU d32 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [stateleveldb] GetState -> DEBU d33 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=namespaces/metadata/exp02#1" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [stateleveldb] GetState -> DEBU d34 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleGetState -> DEBU d35 [fd30334a] No state associated with key: namespaces/metadata/exp02#1. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d36 [fd30334a] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d37 [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d38 [fd30334a] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d39 [fd30334a] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d3a [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3b [fd30334a] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3c [fd30334a] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d3d [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3e [fd30334a] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3f [fd30334a] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d40 [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d41 [fd30334a] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d42 [fd30334a] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] handleMessage -> DEBU d43 [fd30334a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d44 [fd30334a] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleGetState -> DEBU d45 [fd30334a] getting state for chaincode _lifecycle, key chaincode-sources/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [stateleveldb] GetState -> DEBU d46 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=chaincode-sources/metadata/exp02#1" +orderer0.example.com | "2019-05-02 09:27:46.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:46.682 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e84 Sending msg of 28 bytes to 3 on channel testchainid took 8.9µs" +orderer0.example.com | "2019-05-02 09:27:46.682 UTC [orderer.common.cluster.step] sendMessage -> DEBU e85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs " +orderer0.example.com | "2019-05-02 09:27:46.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 2 on channel businesschannel took 48.1µs" +orderer0.example.com | "2019-05-02 09:27:46.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +orderer0.example.com | "2019-05-02 09:27:46.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.8µs " +orderer0.example.com | "2019-05-02 09:27:46.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 920µs " +orderer0.example.com | "2019-05-02 09:27:46.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:46.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:46.960 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU e8c Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:46.961 UTC [orderer.consensus.etcdraft] propose -> INFO e8d Created block [7], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:46.961 UTC [orderer.consensus.etcdraft] 2 -> DEBU e8e Proposed block [7] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:46.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 3170 bytes to 2 on channel businesschannel took 21.8µs" +orderer0.example.com | "2019-05-02 09:27:46.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e90 Sending msg of 3170 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2019-05-02 09:27:46.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 390.1µs " +orderer0.example.com | "2019-05-02 09:27:46.965 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 196.6µs " +orderer0.example.com | "2019-05-02 09:27:46.967 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:46.968 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e94 Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +orderer0.example.com | "2019-05-02 09:27:46.968 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e95 Sending msg of 28 bytes to 3 on channel businesschannel took 93.2µs" +orderer0.example.com | "2019-05-02 09:27:46.968 UTC [orderer.common.cluster.step] sendMessage -> DEBU e96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " +orderer0.example.com | "2019-05-02 09:27:46.969 UTC [orderer.consensus.etcdraft] writeBlock -> INFO e97 Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:46.969 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU e98 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-05-02 09:27:46.969 UTC [msp.identity] Sign -> DEBU e99 Sign: plaintext: 0A020802120B0A090A03010203100418...DAA07E5AE5AA5E062D063F7B0FFC2EE0 " +orderer0.example.com | "2019-05-02 09:27:46.970 UTC [msp.identity] Sign -> DEBU e9a Sign: digest: 22E126E3A2EFA139FCCC3372D510C3F1A0191C4EC46B4CA19541E6F8ECCB3EA4 " +orderer0.example.com | "2019-05-02 09:27:46.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:46.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.6µs " +orderer0.example.com | "2019-05-02 09:27:46.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:46.976 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:46.980 UTC [fsblkstorage] indexBlock -> DEBU e9f Indexing block [blockNum=7, blockHash=[]byte{0x30, 0xa6, 0xff, 0xc, 0x32, 0x27, 0x9e, 0xbc, 0xbb, 0x79, 0xcc, 0xe2, 0x1a, 0x7f, 0x74, 0x43, 0x84, 0x98, 0x45, 0x15, 0x41, 0x88, 0x33, 0xee, 0x2a, 0x32, 0x97, 0xdb, 0xcf, 0x57, 0x3f, 0x8c} txOffsets= +orderer0.example.com | txId=91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0 locPointer=offset=70, bytesLength=3044 orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:31:16.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU f75 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:16.847 UTC [fsblkstorage] updateCheckpoint -> DEBU f76 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94616], isChainEmpty=[false], lastBlockNumber=[7]" -orderer0.example.com | "2019-05-02 01:31:16.848 UTC [orderer.commmon.multichannel] commitBlock -> DEBU f77 [channel: businesschannel] Wrote block [7]" -orderer0.example.com | "2019-05-02 01:31:16.849 UTC [fsblkstorage] waitForBlock -> DEBU f78 Came out of wait. maxAvailaBlockNumber=[7]" -orderer0.example.com | "2019-05-02 01:31:16.849 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f79 Remaining bytes=[4050], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:16.850 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f7a Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90566], bytesOffset=[90568]}" -orderer0.example.com | "2019-05-02 01:31:16.850 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f7b blockbytes [4048] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:16.852 UTC [common.deliver] deliverBlocks -> DEBU f7c [channel: businesschannel] Delivering block [7] for (0xc0008bfb80) for 192.168.240.5:58984" -peer0.org1.example.com | "2019-05-02 01:30:53.977 UTC [msp.identity] Verify -> DEBU e3f Verify: sig = 00000000 30 44 02 20 08 9d ee 3b 10 06 ba 32 1b 49 6f 85 |0D. ...;...2.Io.| -peer0.org1.example.com | 00000010 11 84 9e e0 f8 61 96 72 b8 80 c1 61 19 26 29 07 |.....a.r...a.&).| -peer0.org1.example.com | 00000020 e0 0d 00 93 02 20 57 11 04 53 89 24 38 e8 e3 f7 |..... W..S.$8...| -peer0.org1.example.com | 00000030 8f 60 9f ef 93 d7 87 a3 4d 3e 6d c5 04 b2 dc 00 |.`......M>m.....| -peer0.org1.example.com | 00000040 81 95 5d ad 84 b0 |..]...|" -peer0.org1.example.com | "2019-05-02 01:30:53.977 UTC [gossip.discovery] handleAliveMessage -> DEBU e40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.965 UTC [msp] DeserializeIdentity -> DEBU e41 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.978 UTC [gossip.discovery] handleAliveMessage -> DEBU e42 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.979 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e43 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:30:53.979 UTC [msp] DeserializeIdentity -> DEBU e44 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.980 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:53.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e46 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e47 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.980 UTC [policies] Evaluate -> DEBU e48 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.981 UTC [policies] Evaluate -> DEBU e49 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:53.981 UTC [policies] Evaluate -> DEBU e4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.981 UTC [cauthdsl] func1 -> DEBU e4b 0xc0025782a0 gate 1556760653981516800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:53.981 UTC [cauthdsl] func2 -> DEBU e4c 0xc0025782a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:53.982 UTC [cauthdsl] func2 -> DEBU e4d 0xc0025782a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:53.982 UTC [cauthdsl] func2 -> DEBU e4e 0xc0025782a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.982 UTC [msp.identity] Verify -> DEBU e4f Verify: digest = 00000000 da 3f 62 6d e3 0a 94 fd 68 71 cf e1 e7 4d 6d 88 |.?bm....hq...Mm.| -peer0.org1.example.com | 00000010 36 db 5a 5d 3c e7 80 c0 ab 42 15 b2 73 ad ab f3 |6.Z]<....B..s...|" -peer0.org1.example.com | "2019-05-02 01:30:53.982 UTC [msp.identity] Verify -> DEBU e50 Verify: sig = 00000000 30 44 02 20 02 72 db 39 13 d1 76 ba a8 87 64 f5 |0D. .r.9..v...d.| -peer0.org1.example.com | 00000010 43 84 b0 dd cb 42 e3 ff bb 05 d4 38 79 87 7f 0c |C....B.....8y...| -peer0.org1.example.com | 00000020 8b 5a 19 35 02 20 10 b3 0f 14 56 82 12 80 72 b4 |.Z.5. ....V...r.| -peer0.org1.example.com | 00000030 f5 89 33 b7 ef 0d e6 fa 3c 3a 4f f4 9d 95 cc 1b |..3.....<:O.....| -peer0.org1.example.com | 00000040 42 a5 8a ff a9 3f |B....?|" -peer0.org1.example.com | "2019-05-02 01:30:53.982 UTC [cauthdsl] func2 -> DEBU e51 0xc0025782a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.983 UTC [cauthdsl] func1 -> DEBU e52 0xc0025782a0 gate 1556760653981516800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:53.980 UTC [msp] DeserializeIdentity -> DEBU e53 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.983 UTC [policies] Evaluate -> DEBU e54 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.984 UTC [policies] Evaluate -> DEBU e55 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.985 UTC [policies] Evaluate -> DEBU e56 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.985 UTC [policies] Evaluate -> DEBU e57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:53.986 UTC [gossip.discovery] handleAliveMessage -> DEBU e58 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.986 UTC [gossip.discovery] handleAliveMessage -> DEBU e59 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU e5a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.987 UTC [gossip.comm] func1 -> DEBU e5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-05-02 01:31:16.853 UTC [fsblkstorage] waitForBlock -> DEBU f7d Going to wait for newer blocks. maxAvailaBlockNumber=[7], waitForBlockNum=[8]" -orderer0.example.com | "2019-05-02 01:31:17.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7e Sending msg of 28 bytes to 2 on channel businesschannel took 21.5µs" -orderer0.example.com | "2019-05-02 01:31:17.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7f Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" -orderer0.example.com | "2019-05-02 01:31:17.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU f80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.8µs " -orderer0.example.com | "2019-05-02 01:31:17.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU f81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.21ms " -orderer0.example.com | "2019-05-02 01:31:17.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU f82 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:17.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU f83 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:17.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU f84 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:17.045 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f85 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" -orderer0.example.com | "2019-05-02 01:31:17.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU f86 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.2µs " -orderer0.example.com | "2019-05-02 01:31:17.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f87 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" -orderer0.example.com | "2019-05-02 01:31:17.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f88 Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" -orderer0.example.com | "2019-05-02 01:31:17.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU f89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.8µs " -orderer0.example.com | "2019-05-02 01:31:17.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.9µs " -orderer0.example.com | "2019-05-02 01:31:17.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:17.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8c Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:17.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:17.546 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8e Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" -orderer0.example.com | "2019-05-02 01:31:17.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.7µs " -orderer0.example.com | "2019-05-02 01:31:17.561 UTC [orderer.common.server] Broadcast -> DEBU f90 Starting new Broadcast handler" -orderer0.example.com | "2019-05-02 01:31:17.561 UTC [orderer.common.broadcast] Handle -> DEBU f91 Starting new broadcast loop for 192.168.240.9:47454" -orderer0.example.com | "2019-05-02 01:31:17.623 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f92 [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47454 with txid 'ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b' of type ENDORSER_TRANSACTION" -orderer0.example.com | "2019-05-02 01:31:17.624 UTC [policies] Evaluate -> DEBU f93 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:31:17.625 UTC [policies] Evaluate -> DEBU f94 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:17.625 UTC [policies] Evaluate -> DEBU f95 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:31:17.625 UTC [policies] Evaluate -> DEBU f96 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:17.625 UTC [policies] Evaluate -> DEBU f97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:17.625 UTC [cauthdsl] func1 -> DEBU f98 0xc001287800 gate 1556760677625271200 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:17.625 UTC [cauthdsl] func2 -> DEBU f99 0xc001287800 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:17.625 UTC [cauthdsl] func2 -> DEBU f9a 0xc001287800 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:17.625 UTC [cauthdsl] func2 -> DEBU f9b 0xc001287800 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:17.626 UTC [msp.identity] Verify -> DEBU f9c Verify: digest = 00000000 66 e4 f2 de d2 a6 a0 d5 b6 09 1c 1e bd d8 2c fa |f.............,.| -orderer0.example.com | 00000010 93 b6 be a4 e5 76 0e 42 ca 72 e6 17 85 c4 ea 76 |.....v.B.r.....v|" -orderer0.example.com | "2019-05-02 01:31:17.626 UTC [msp.identity] Verify -> DEBU f9d Verify: sig = 00000000 30 44 02 20 78 b3 37 1d ca ba c7 c9 5d 36 6d 83 |0D. x.7.....]6m.| -orderer0.example.com | 00000010 42 de 4a 72 50 d3 54 e1 f1 dc 3e e7 99 fb f5 c0 |B.JrP.T...>.....| -orderer0.example.com | 00000020 2a c9 95 0a 02 20 20 f0 1d d8 94 c2 2e d9 22 69 |*.... ......."i| -orderer0.example.com | 00000030 48 80 cc 13 de 39 9d 40 97 56 24 68 5a c9 8f 6f |H....9.@.V$hZ..o| -orderer0.example.com | 00000040 89 51 23 9f 67 ae |.Q#.g.|" -orderer0.example.com | "2019-05-02 01:31:17.627 UTC [cauthdsl] func2 -> DEBU f9e 0xc001287800 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:17.627 UTC [cauthdsl] func1 -> DEBU f9f 0xc001287800 gate 1556760677625271200 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:17.627 UTC [policies] Evaluate -> DEBU fa0 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:17.627 UTC [policies] Evaluate -> DEBU fa1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:17.627 UTC [policies] Evaluate -> DEBU fa2 Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:17.627 UTC [policies] Evaluate -> DEBU fa3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:17.628 UTC [policies] Evaluate -> DEBU fa4 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:17.628 UTC [policies] Evaluate -> DEBU fa5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:17.629 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fa6 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47454" -orderer0.example.com | "2019-05-02 01:31:17.629 UTC [orderer.common.blockcutter] Ordered -> DEBU fa7 Enqueuing message into batch" -orderer0.example.com | "2019-05-02 01:31:17.636 UTC [grpc] infof -> DEBU fa8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:17.637 UTC [orderer.common.broadcast] Handle -> WARN fa9 Error reading from 192.168.240.9:47454: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:17.637 UTC [orderer.common.server] func1 -> DEBU faa Closing Broadcast stream" -orderer0.example.com | "2019-05-02 01:31:17.637 UTC [comm.grpc.server] 1 -> INFO fab streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47454 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=76.5719ms -orderer0.example.com | "2019-05-02 01:31:18.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fac Sending msg of 28 bytes to 2 on channel businesschannel took 35µs" -orderer0.example.com | "2019-05-02 01:31:18.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fad Sending msg of 28 bytes to 3 on channel businesschannel took 28.7µs" -orderer0.example.com | "2019-05-02 01:31:18.043 UTC [orderer.common.cluster.step] sendMessage -> DEBU fae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 298.6µs " -orderer0.example.com | "2019-05-02 01:31:18.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU faf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 230.2µs " -orderer0.example.com | "2019-05-02 01:31:18.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:18.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb1 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:18.046 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:18.047 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb3 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" -orderer0.example.com | "2019-05-02 01:31:18.048 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 404.2µs " -orderer0.example.com | "2019-05-02 01:31:18.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb5 Sending msg of 28 bytes to 3 on channel businesschannel took 23.1µs" -orderer0.example.com | "2019-05-02 01:31:18.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb6 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" -orderer0.example.com | "2019-05-02 01:31:18.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 268.6µs " -orderer0.example.com | "2019-05-02 01:31:18.540 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.6µs " -orderer0.example.com | "2019-05-02 01:31:18.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:18.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU fba Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:18.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:18.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbc Sending msg of 28 bytes to 3 on channel testchainid took 59µs" -orderer0.example.com | "2019-05-02 01:31:18.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " -orderer0.example.com | "2019-05-02 01:31:19.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbe Sending msg of 28 bytes to 2 on channel businesschannel took 37.2µs" -orderer0.example.com | "2019-05-02 01:31:19.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbf Sending msg of 28 bytes to 3 on channel businesschannel took 70.2µs" -orderer0.example.com | "2019-05-02 01:31:19.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.1µs " -orderer0.example.com | "2019-05-02 01:31:19.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 199µs " -orderer0.example.com | "2019-05-02 01:31:19.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:19.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:19.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:19.047 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc5 Sending msg of 28 bytes to 3 on channel testchainid took 49.2µs" -orderer0.example.com | "2019-05-02 01:31:19.048 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 286.5µs " -orderer0.example.com | "2019-05-02 01:31:19.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc7 Sending msg of 28 bytes to 3 on channel businesschannel took 32.9µs" -orderer0.example.com | "2019-05-02 01:31:19.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc8 Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" -orderer0.example.com | "2019-05-02 01:31:19.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 226.7µs " -orderer0.example.com | "2019-05-02 01:31:19.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU fca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.1µs " -orderer0.example.com | "2019-05-02 01:31:19.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcb Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:19.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcc Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:19.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcd Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:19.548 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fce Sending msg of 28 bytes to 3 on channel testchainid took 66.3µs" -orderer0.example.com | "2019-05-02 01:31:19.548 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.2µs " -orderer0.example.com | "2019-05-02 01:31:19.637 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU fd0 Batch timer expired, creating block" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:19.638 UTC [orderer.consensus.etcdraft] propose -> INFO fd1 Created block [8], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:19.638 UTC [orderer.consensus.etcdraft] 2 -> DEBU fd2 Proposed block [8] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:19.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd3 Sending msg of 3170 bytes to 2 on channel businesschannel took 31µs" -orderer0.example.com | "2019-05-02 01:31:19.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd4 Sending msg of 3170 bytes to 3 on channel businesschannel took 115.4µs" -orderer0.example.com | "2019-05-02 01:31:19.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 296.1µs " -orderer0.example.com | "2019-05-02 01:31:19.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd6 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 192.1µs " -orderer0.example.com | "2019-05-02 01:31:19.648 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd7 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:19.648 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd8 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:19.649 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd9 Sending msg of 28 bytes to 2 on channel businesschannel took 71.9µs" -orderer0.example.com | "2019-05-02 01:31:19.649 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fda Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" -orderer0.example.com | "2019-05-02 01:31:19.650 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481.5µs " -orderer0.example.com | "2019-05-02 01:31:19.651 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 303.1µs " -orderer0.example.com | "2019-05-02 01:31:19.650 UTC [orderer.consensus.etcdraft] writeBlock -> INFO fdd Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:19.654 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU fde [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-05-02 01:31:19.654 UTC [msp.identity] Sign -> DEBU fdf Sign: plaintext: 0A020802120B0A090A03010203100418...96D5DE151ED094B63E0191F6F0A5035A " -orderer0.example.com | "2019-05-02 01:31:19.654 UTC [msp.identity] Sign -> DEBU fe0 Sign: digest: 88D28832267011D22D6A63318239160ED42B75F445EEBA327A76376257FD0051 " -orderer0.example.com | "2019-05-02 01:31:19.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:19.662 UTC [fsblkstorage] indexBlock -> DEBU fe2 Indexing block [blockNum=8, blockHash=[]byte{0xec, 0x7a, 0xf9, 0x87, 0x2a, 0xf6, 0xf9, 0xf3, 0x9d, 0x8, 0x72, 0xc7, 0xa9, 0xe8, 0x8f, 0xb7, 0xe, 0x92, 0xd, 0x6d, 0x8e, 0xab, 0xc4, 0xfc, 0xd4, 0x86, 0x3b, 0x46, 0x29, 0x92, 0x30, 0x8d} txOffsets= -orderer0.example.com | txId=ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b locPointer=offset=70, bytesLength=3044 +orderer0.example.com | "2019-05-02 09:27:46.985 UTC [fsblkstorage] updateCheckpoint -> DEBU ea0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94614], isChainEmpty=[false], lastBlockNumber=[7]" +orderer0.example.com | "2019-05-02 09:27:46.986 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ea1 [channel: businesschannel] Wrote block [7]" +orderer0.example.com | "2019-05-02 09:27:47.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:47.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +orderer0.example.com | "2019-05-02 09:27:47.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.4µs " +orderer0.example.com | "2019-05-02 09:27:47.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea5 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +orderer0.example.com | "2019-05-02 09:27:47.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2019-05-02 09:27:47.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 196.2µs " +orderer0.example.com | "2019-05-02 09:27:47.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 334.7µs " +orderer0.example.com | "2019-05-02 09:27:47.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [stateleveldb] GetState -> DEBU d47 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleGetState -> DEBU d48 [fd30334a] No state associated with key: chaincode-sources/metadata/exp02#1. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d49 [fd30334a] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] handleMessage -> DEBU d4a [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4b [fd30334a] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4c [fd30334a] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] handleMessage -> DEBU d4d [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4e [fd30334a] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4f [fd30334a] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO d50 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [chaincode] handleMessage -> DEBU d51 [fd30334a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [chaincode] Notify -> DEBU d52 [fd30334a] notifying Txid:fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [chaincode] Execute -> DEBU d53 Exit" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [endorser] callChaincode -> INFO d54 [businesschannel][fd30334a] Exit chaincode: name:"_lifecycle" (5ms)" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU d55 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [lockbasedtxmgr] Done -> DEBU d56 Done with transaction simulation / query execution [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [msp] GetManagerForChain -> DEBU d57 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [cauthdsl] func1 -> DEBU d58 0xc002e16210 gate 1556789247937724200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [cauthdsl] func2 -> DEBU d59 0xc002e16210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [cauthdsl] func2 -> DEBU d5a 0xc002e16210 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [cauthdsl] func2 -> DEBU d5b 0xc002e16210 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [msp.identity] Verify -> DEBU d5c Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +peer0.org1.example.com | "2019-05-02 09:27:27.937 UTC [msp.identity] Verify -> DEBU d5d Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU d5e 0xc002e16210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d5f 0xc002e16210 gate 1556789247937724200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d60 0xc002e16990 gate 1556789247938177800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d61 0xc002e16990 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d62 0xc002e16990 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d63 0xc002e16990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d64 0xc002e16990 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d65 0xc002e16990 gate 1556789247938177800 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d66 0xc002e16f00 gate 1556789247938430000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d67 0xc002e16f00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d68 0xc002e16f00 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d69 0xc002e16f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d6a 0xc002e16f00 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d6b 0xc002e16f00 gate 1556789247938430000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:27.938 UTC [transientstore] PersistWithConfig -> DEBU d6c Persisting private data to transient store for txid [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] at block height [3]" +peer0.org1.example.com | "2019-05-02 09:27:27.946 UTC [lockbasedtxmgr] Done -> DEBU d6d Done with transaction simulation / query execution [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +peer0.org1.example.com | "2019-05-02 09:27:27.947 UTC [endorser] SimulateProposal -> DEBU d6e [businesschannel][fd30334a] Exit" +peer0.org1.example.com | "2019-05-02 09:27:27.948 UTC [endorser] endorseProposal -> DEBU d6f [businesschannel][fd30334a] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:27.948 UTC [endorser] endorseProposal -> DEBU d70 [businesschannel][fd30334a] escc for chaincode name:"_lifecycle" is escc" +peer0.org1.example.com | "2019-05-02 09:27:27.948 UTC [endorser] EndorseWithPlugin -> DEBU d71 Entering endorsement for {plugin: escc, channel: businesschannel, tx: fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-05-02 09:27:27.949 UTC [msp.identity] Sign -> DEBU d72 Sign: plaintext: 0A20C4CE59135220423148E679B71478...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:27.950 UTC [msp.identity] Sign -> DEBU d73 Sign: digest: F6BAD1C1E9AE67521A19DE1116714EEE2CA67C454E4BEB9CC41B909165FE73D4 " +peer0.org1.example.com | "2019-05-02 09:27:27.951 UTC [endorser] EndorseWithPlugin -> DEBU d74 Exiting {plugin: escc, channel: businesschannel, tx: fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-05-02 09:27:27.951 UTC [endorser] endorseProposal -> DEBU d75 [businesschannel][fd30334a] Exit" +peer0.org1.example.com | "2019-05-02 09:27:27.952 UTC [lockbasedtxmgr] Done -> DEBU d76 Done with transaction simulation / query execution [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +orderer0.example.com | "2019-05-02 09:27:47.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaa Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:47.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU eab Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:47.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-05-02 09:27:47.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU ead Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191.4µs " +orderer0.example.com | "2019-05-02 09:27:47.735 UTC [orderer.common.server] Broadcast -> DEBU eae Starting new Broadcast handler" +orderer0.example.com | "2019-05-02 09:27:47.735 UTC [orderer.common.broadcast] Handle -> DEBU eaf Starting new broadcast loop for 172.18.0.8:57322" +orderer0.example.com | "2019-05-02 09:27:47.765 UTC [orderer.common.broadcast] ProcessMessage -> DEBU eb0 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57322 with txid 'f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-05-02 09:27:47.766 UTC [policies] Evaluate -> DEBU eb1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:27:47.766 UTC [policies] Evaluate -> DEBU eb2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:47.766 UTC [policies] Evaluate -> DEBU eb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:27:47.767 UTC [policies] Evaluate -> DEBU eb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:47.767 UTC [policies] Evaluate -> DEBU eb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:47.768 UTC [cauthdsl] func1 -> DEBU eb6 0xc001129c30 gate 1556789267767870500 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:47.768 UTC [cauthdsl] func2 -> DEBU eb7 0xc001129c30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:47.768 UTC [cauthdsl] func2 -> DEBU eb8 0xc001129c30 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:47.769 UTC [cauthdsl] func2 -> DEBU eb9 0xc001129c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-05-02 09:27:47.769 UTC [cauthdsl] func2 -> DEBU eba 0xc001129c30 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:47.769 UTC [cauthdsl] func1 -> DEBU ebb 0xc001129c30 gate 1556789267767870500 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:47.770 UTC [policies] Evaluate -> DEBU ebc Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:47.770 UTC [policies] Evaluate -> DEBU ebd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:47.770 UTC [policies] Evaluate -> DEBU ebe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:27:47.771 UTC [cauthdsl] func1 -> DEBU ebf 0xc00118f090 gate 1556789267771324800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:47.771 UTC [cauthdsl] func2 -> DEBU ec0 0xc00118f090 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:47.772 UTC [cauthdsl] func2 -> DEBU ec1 0xc00118f090 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:47.772 UTC [cauthdsl] func2 -> DEBU ec2 0xc00118f090 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:47.773 UTC [msp.identity] Verify -> DEBU ec3 Verify: digest = 00000000 9d 1a 32 6d 5f bc 13 f8 45 b8 60 0f 16 f8 bd cf |..2m_...E.`.....| +orderer0.example.com | 00000010 c4 1a 80 39 8d 13 0e de 7d 1f 66 83 ff 2d da be |...9....}.f..-..|" +orderer0.example.com | "2019-05-02 09:27:47.773 UTC [msp.identity] Verify -> DEBU ec4 Verify: sig = 00000000 30 44 02 20 13 0a fa 13 d5 6c 5e 7f b5 37 72 79 |0D. .....l^..7ry| +orderer0.example.com | 00000010 2d 47 b9 8d aa ba ae 33 ba 66 86 a4 f4 55 83 9d |-G.....3.f...U..| +orderer0.example.com | 00000020 8a 12 53 97 02 20 63 42 a9 84 5f 26 98 76 1f b4 |..S.. cB.._&.v..| +orderer0.example.com | 00000030 48 24 eb b5 bc 89 71 b6 f1 f0 97 16 ba 96 06 64 |H$....q........d| +orderer0.example.com | 00000040 4f b1 ca 9f 55 1a |O...U.|" +orderer0.example.com | "2019-05-02 09:27:47.774 UTC [cauthdsl] func2 -> DEBU ec5 0xc00118f090 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:47.774 UTC [cauthdsl] func1 -> DEBU ec6 0xc00118f090 gate 1556789267771324800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:47.774 UTC [policies] Evaluate -> DEBU ec7 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:47.775 UTC [policies] Evaluate -> DEBU ec8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:27:47.775 UTC [policies] Evaluate -> DEBU ec9 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:47.775 UTC [policies] Evaluate -> DEBU eca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:27:47.776 UTC [policies] Evaluate -> DEBU ecb Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:47.776 UTC [policies] Evaluate -> DEBU ecc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:27:47.777 UTC [orderer.common.blockcutter] Ordered -> DEBU ecd Enqueuing message into batch" +orderer0.example.com | "2019-05-02 09:27:47.777 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ece [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57322" +orderer0.example.com | "2019-05-02 09:27:47.780 UTC [grpc] infof -> DEBU ecf transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:47.780 UTC [orderer.common.broadcast] Handle -> WARN ed0 Error reading from 172.18.0.8:57322: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:47.781 UTC [orderer.common.server] func1 -> DEBU ed1 Closing Broadcast stream" +orderer0.example.com | "2019-05-02 09:27:47.781 UTC [comm.grpc.server] 1 -> INFO ed2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57322 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=46.2738ms +orderer0.example.com | "2019-05-02 09:27:47.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed3 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +orderer0.example.com | "2019-05-02 09:27:47.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 3 on channel businesschannel took 139µs" +orderer0.example.com | "2019-05-02 09:27:47.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.6µs " +orderer0.example.com | "2019-05-02 09:27:47.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.8µs " +orderer0.example.com | "2019-05-02 09:27:47.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed7 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:27.952 UTC [endorser] func1 -> DEBU d77 Exit: request from 172.18.0.8:57286" +peer0.org1.example.com | "2019-05-02 09:27:27.953 UTC [comm.grpc.server] 1 -> INFO d78 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57286 grpc.code=OK grpc.call_duration=31.6105ms +peer0.org1.example.com | "2019-05-02 09:27:28.980 UTC [gossip.comm] func1 -> DEBU d79 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.980 UTC [gossip.comm] func1 -> DEBU d7a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.980 UTC [gossip.comm] func1 -> DEBU d7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.980 UTC [gossip.gossip] handleMessage -> DEBU d7c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.pull] HandleMessage -> DEBU d7d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d7e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d7f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d80 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d81 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d82 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d83 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.pull] SendDigest -> DEBU d84 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d85 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d86 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d87 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d88 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU d89 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d8a Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [msp] DeserializeIdentity -> DEBU d8b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d8d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d8e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:47.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:48.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:48.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 3 on channel testchainid took 31.9µs" +orderer0.example.com | "2019-05-02 09:27:48.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.5µs " +orderer0.example.com | "2019-05-02 09:27:48.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edc Sending msg of 28 bytes to 2 on channel businesschannel took 49.2µs" +orderer0.example.com | "2019-05-02 09:27:48.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edd Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-05-02 09:27:48.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ede Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.1µs " +orderer0.example.com | "2019-05-02 09:27:48.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU edf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4521ms " +orderer0.example.com | "2019-05-02 09:27:48.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:48.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:48.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:48.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee3 Sending msg of 28 bytes to 3 on channel testchainid took 23.2µs" +orderer0.example.com | "2019-05-02 09:27:48.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.2µs " +orderer0.example.com | "2019-05-02 09:27:48.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee5 Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" +orderer0.example.com | "2019-05-02 09:27:48.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 3 on channel businesschannel took 21.8µs" +orderer0.example.com | "2019-05-02 09:27:48.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.4µs " +orderer0.example.com | "2019-05-02 09:27:48.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:48.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.4µs " +orderer0.example.com | "2019-05-02 09:27:48.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU eea Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:49.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU eeb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:49.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eec Sending msg of 28 bytes to 3 on channel testchainid took 754.8µs" +orderer0.example.com | "2019-05-02 09:27:49.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU eed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +orderer0.example.com | "2019-05-02 09:27:49.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eee Sending msg of 28 bytes to 2 on channel businesschannel took 39.1µs" +orderer0.example.com | "2019-05-02 09:27:49.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eef Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-05-02 09:27:49.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258.8µs " +orderer0.example.com | "2019-05-02 09:27:49.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.5µs " +orderer0.example.com | "2019-05-02 09:27:49.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:49.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:49.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:49.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 3 on channel testchainid took 28.5µs" +orderer0.example.com | "2019-05-02 09:27:49.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.8µs " +orderer0.example.com | "2019-05-02 09:27:49.779 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU ef7 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:49.779 UTC [orderer.consensus.etcdraft] propose -> INFO ef8 Created block [8], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:49.781 UTC [orderer.consensus.etcdraft] 2 -> DEBU ef9 Proposed block [8] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:49.784 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efa Sending msg of 3170 bytes to 2 on channel businesschannel took 29.5µs" +orderer0.example.com | "2019-05-02 09:27:49.784 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 3170 bytes to 3 on channel businesschannel took 17.3µs" +orderer0.example.com | "2019-05-02 09:27:49.785 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +orderer0.example.com | "2019-05-02 09:27:49.785 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 265.5µs " +orderer0.example.com | "2019-05-02 09:27:49.790 UTC [orderer.common.cluster.step] handleMessage -> DEBU efe Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func1 -> DEBU d92 0xc002e58630 gate 1556789248982502500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d93 0xc002e58630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d94 0xc002e58630 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d95 0xc002e58630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d96 0xc002e58630 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func1 -> DEBU d97 0xc002e58630 gate 1556789248982502500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func1 -> DEBU d9b 0xc002e58e70 gate 1556789248982885700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d9c 0xc002e58e70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d9d 0xc002e58e70 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [cauthdsl] func2 -> DEBU d9e 0xc002e58e70 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [msp.identity] Verify -> DEBU d9f Verify: digest = 00000000 19 46 e5 90 dc 7f 40 95 cb 72 1f 3c 26 75 f6 60 |.F....@..r.<&u.`| +peer0.org1.example.com | 00000010 00 a1 a9 b6 fd 31 32 4d 4b 83 4b f7 b4 46 fc c5 |.....12MK.K..F..|" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [msp.identity] Verify -> DEBU da0 Verify: sig = 00000000 30 44 02 20 2d 8b be 90 15 09 01 ee e8 04 0d 69 |0D. -..........i| +peer0.org1.example.com | 00000010 fe 09 69 d2 61 5c 3e 1a 1c 5a 21 6a 08 fc db ff |..i.a\>..Z!j....| +peer0.org1.example.com | 00000020 02 a1 fd 48 02 20 6a 97 93 fe 9c b3 ab 87 e6 e6 |...H. j.........| +peer0.org1.example.com | 00000030 19 16 b4 82 eb 29 1e e6 4f ad 1a 6a f6 cf d9 b5 |.....)..O..j....| +peer0.org1.example.com | 00000040 b9 ae 06 2f 1a ae |.../..|" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [cauthdsl] func2 -> DEBU da1 0xc002e58e70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [cauthdsl] func1 -> DEBU da2 0xc002e58e70 gate 1556789248982885700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] handleAliveMessage -> DEBU da7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU da8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU da9 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 " +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU daa Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 " +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU dab Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU dac Exiting" +peer0.org1.example.com | "2019-05-02 09:27:28.983 UTC [gossip.discovery] handleAliveMessage -> DEBU dad Exiting" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [gossip.discovery] handleMsgFromComm -> DEBU dae Exiting" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [gossip.discovery] handleMsgFromComm -> DEBU daf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [gossip.gossip] ValidateAliveMsg -> DEBU db0 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [msp] DeserializeIdentity -> DEBU db1 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:49.790 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eff Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-05-02 09:27:49.791 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f00 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-05-02 09:27:49.791 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.7µs " +orderer0.example.com | "2019-05-02 09:27:49.792 UTC [orderer.consensus.etcdraft] writeBlock -> INFO f02 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:27:49.792 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU f03 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-05-02 09:27:49.792 UTC [msp.identity] Sign -> DEBU f04 Sign: plaintext: 0A020802120B0A090A03010203100418...514B52B5CEA2B0457AF4595D7D94A4BF " +orderer0.example.com | "2019-05-02 09:27:49.792 UTC [msp.identity] Sign -> DEBU f05 Sign: digest: 45CDD9EC16838AE18F87E5441ED922AFDC76B0374E84CAD29B729FE2FE40C24E " +orderer0.example.com | "2019-05-02 09:27:49.793 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.8µs " +orderer0.example.com | "2019-05-02 09:27:49.793 UTC [orderer.common.cluster.step] handleMessage -> DEBU f07 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:49.798 UTC [fsblkstorage] indexBlock -> DEBU f08 Indexing block [blockNum=8, blockHash=[]byte{0x2, 0x24, 0xe7, 0x4a, 0x9c, 0xc4, 0xcd, 0x6e, 0x9e, 0x50, 0x85, 0x1e, 0xb1, 0x9f, 0xf0, 0x6f, 0xcf, 0x12, 0x7a, 0xf4, 0xce, 0xb7, 0xdf, 0x24, 0x6e, 0x20, 0x2e, 0xb6, 0x60, 0x3f, 0x17, 0xec} txOffsets= +orderer0.example.com | txId=f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176 locPointer=offset=70, bytesLength=3044 orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:31:19.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe3 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:19.666 UTC [fsblkstorage] updateCheckpoint -> DEBU fe4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98666], isChainEmpty=[false], lastBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:19.667 UTC [orderer.commmon.multichannel] commitBlock -> DEBU fe5 [channel: businesschannel] Wrote block [8]" -orderer0.example.com | "2019-05-02 01:31:19.667 UTC [fsblkstorage] waitForBlock -> DEBU fe6 Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:19.668 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe7 Remaining bytes=[4050], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:19.668 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe8 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[94616], bytesOffset=[94618]}" -orderer0.example.com | "2019-05-02 01:31:19.668 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe9 blockbytes [4048] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:19.669 UTC [common.deliver] deliverBlocks -> DEBU fea [channel: businesschannel] Delivering block [8] for (0xc0008bfb80) for 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:31:19.669 UTC [fsblkstorage] waitForBlock -> DEBU feb Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:20.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fec Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" -orderer0.example.com | "2019-05-02 01:31:20.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fed Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" -orderer0.example.com | "2019-05-02 01:31:20.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU fee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 382.7µs " -orderer0.example.com | "2019-05-02 01:31:20.042 UTC [orderer.common.cluster.step] handleMessage -> DEBU fef Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:20.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:20.044 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.9µs " -orderer0.example.com | "2019-05-02 01:31:20.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:20.047 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff3 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" -orderer0.example.com | "2019-05-02 01:31:20.049 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 669.6µs " -orderer0.example.com | "2019-05-02 01:31:20.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff5 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" -orderer0.example.com | "2019-05-02 01:31:20.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff7 Sending msg of 28 bytes to 3 on channel businesschannel took 44.9µs" -orderer0.example.com | "2019-05-02 01:31:20.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.4µs " -orderer0.example.com | "2019-05-02 01:31:20.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.4µs " -orderer0.example.com | "2019-05-02 01:31:20.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:20.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffa Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:20.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffc Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" -orderer0.example.com | "2019-05-02 01:31:20.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.8µs " -orderer0.example.com | "2019-05-02 01:31:20.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:21.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffe Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs" -peer0.org1.example.com | "2019-05-02 01:30:53.987 UTC [gossip.gossip] handleMessage -> DEBU e5c Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.987 UTC [gossip.gossip] handleMessage -> DEBU e5d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:53.987 UTC [gossip.discovery] handleMsgFromComm -> DEBU e5e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:53.987 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e5f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:53.988 UTC [msp] DeserializeIdentity -> DEBU e60 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:53.989 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e61 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:53.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e62 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e63 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:53.989 UTC [policies] Evaluate -> DEBU e64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.989 UTC [policies] Evaluate -> DEBU e65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:53.989 UTC [policies] Evaluate -> DEBU e66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:53.990 UTC [cauthdsl] func1 -> DEBU e67 0xc00258a280 gate 1556760653990045200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:53.990 UTC [cauthdsl] func2 -> DEBU e68 0xc00258a280 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:53.990 UTC [cauthdsl] func2 -> DEBU e69 0xc00258a280 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:53.990 UTC [cauthdsl] func2 -> DEBU e6a 0xc00258a280 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.990 UTC [msp.identity] Verify -> DEBU e6b Verify: digest = 00000000 9e a8 02 93 d9 c8 ee 82 bc e5 8c 9a 3a 05 e6 17 |............:...| -peer0.org1.example.com | 00000010 5f 78 b5 67 7b 15 be 31 41 8c b8 22 19 ff 99 6e |_x.g{..1A.."...n|" -peer0.org1.example.com | "2019-05-02 01:30:53.991 UTC [msp.identity] Verify -> DEBU e6c Verify: sig = 00000000 30 44 02 20 18 b1 12 0f 69 f0 92 7a 32 47 92 fe |0D. ....i..z2G..| -peer0.org1.example.com | 00000010 99 2a b6 46 31 04 07 c0 30 1f 06 bf a2 43 8e d8 |.*.F1...0....C..| -peer0.org1.example.com | 00000020 94 a3 2c a5 02 20 06 7e dc 67 1b de a9 a3 a3 1b |..,.. .~.g......| -peer0.org1.example.com | 00000030 c1 90 db e9 26 25 06 22 62 6f d0 4b 1e 09 2a b6 |....&%."bo.K..*.| -peer0.org1.example.com | 00000040 f5 2b e8 30 66 47 |.+.0fG|" -peer0.org1.example.com | "2019-05-02 01:30:53.992 UTC [cauthdsl] func2 -> DEBU e6d 0xc00258a280 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:53.995 UTC [cauthdsl] func1 -> DEBU e6e 0xc00258a280 gate 1556760653990045200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:54.001 UTC [policies] Evaluate -> DEBU e70 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:54.001 UTC [policies] Evaluate -> DEBU e71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:54.001 UTC [policies] Evaluate -> DEBU e72 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:54.001 UTC [policies] Evaluate -> DEBU e73 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:54.002 UTC [gossip.discovery] handleAliveMessage -> DEBU e74 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:54.002 UTC [gossip.discovery] handleAliveMessage -> DEBU e75 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:54.002 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e76 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:54.002 UTC [msp.identity] Verify -> DEBU e77 Verify: digest = 00000000 46 51 e7 c7 6b ed cc 55 07 07 99 b0 55 94 05 80 |FQ..k..U....U...| -peer0.org1.example.com | 00000010 ea 09 d1 ce e5 89 87 7a 84 f9 ab ba 04 82 b9 53 |.......z.......S|" -peer0.org1.example.com | "2019-05-02 01:30:54.003 UTC [msp.identity] Verify -> DEBU e78 Verify: sig = 00000000 30 45 02 21 00 d4 12 f7 c1 39 cf af 37 5f ed b5 |0E.!.....9..7_..| -peer0.org1.example.com | 00000010 9b e4 46 ab e4 83 c5 78 04 70 bb fc 62 d9 13 66 |..F....x.p..b..f| -peer0.org1.example.com | 00000020 13 94 9b dc a9 02 20 2e 7c 31 1b b9 c5 d0 da 68 |...... .|1.....h| -peer0.org1.example.com | 00000030 cd d4 38 83 ea 16 6a 64 28 45 c5 95 11 c2 43 c7 |..8...jd(E....C.| -peer0.org1.example.com | 00000040 2b e4 cd 57 32 45 94 |+..W2E.|" -orderer0.example.com | "2019-05-02 01:31:21.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU fff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.1µs " -orderer0.example.com | "2019-05-02 01:31:21.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1000 Sending msg of 28 bytes to 3 on channel businesschannel took 30.8µs" -orderer0.example.com | "2019-05-02 01:31:21.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1001 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 199.7µs " -orderer0.example.com | "2019-05-02 01:31:21.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1002 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:21.053 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1003 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:21.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1004 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" -orderer0.example.com | "2019-05-02 01:31:21.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1005 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.6µs " -orderer0.example.com | "2019-05-02 01:31:21.054 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1006 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:21.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1007 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" -orderer0.example.com | "2019-05-02 01:31:21.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100b Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" -orderer0.example.com | "2019-05-02 01:31:21.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 525.1µs " -orderer0.example.com | "2019-05-02 01:31:21.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1008 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.4µs " -orderer0.example.com | "2019-05-02 01:31:21.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1009 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:21.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:21.544 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100d Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" -orderer0.example.com | "2019-05-02 01:31:21.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.4µs " -orderer0.example.com | "2019-05-02 01:31:21.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:22.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1010 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" -orderer0.example.com | "2019-05-02 01:31:22.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1011 Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" -orderer0.example.com | "2019-05-02 01:31:22.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1012 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.3µs " -orderer0.example.com | "2019-05-02 01:31:22.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1013 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.9µs " -orderer0.example.com | "2019-05-02 01:31:22.042 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1014 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:22.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1015 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:22.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1016 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:22.045 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1017 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" -orderer0.example.com | "2019-05-02 01:31:22.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1018 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " -orderer0.example.com | "2019-05-02 01:31:22.427 UTC [orderer.common.server] Deliver -> DEBU 1019 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:22.427 UTC [common.deliver] Handle -> DEBU 101a Starting new deliver loop for 192.168.240.9:47484" -orderer0.example.com | "2019-05-02 01:31:22.428 UTC [common.deliver] Handle -> DEBU 101b Attempting to read seek info message from 192.168.240.9:47484" -orderer0.example.com | "2019-05-02 01:31:22.431 UTC [policies] Evaluate -> DEBU 101c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:22.431 UTC [policies] Evaluate -> DEBU 101d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:22.431 UTC [policies] Evaluate -> DEBU 101e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:22.431 UTC [policies] Evaluate -> DEBU 101f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:22.432 UTC [policies] Evaluate -> DEBU 1020 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:22.433 UTC [msp] DeserializeIdentity -> DEBU 1021 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:22.435 UTC [msp.identity] newIdentity -> DEBU 1022 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:49.801 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:49.804 UTC [fsblkstorage] updateCheckpoint -> DEBU f0a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98665], isChainEmpty=[false], lastBlockNumber=[8]" +orderer0.example.com | "2019-05-02 09:27:49.805 UTC [orderer.commmon.multichannel] commitBlock -> DEBU f0b [channel: businesschannel] Wrote block [8]" +orderer0.example.com | "2019-05-02 09:27:49.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:49.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-05-02 09:27:49.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0e Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +orderer0.example.com | "2019-05-02 09:27:49.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.5µs " +orderer0.example.com | "2019-05-02 09:27:49.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 787.1µs " +orderer0.example.com | "2019-05-02 09:27:49.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:49.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:50.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU f13 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:50.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f14 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +orderer0.example.com | "2019-05-02 09:27:50.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU f15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 920.9µs " +orderer0.example.com | "2019-05-02 09:27:50.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs" +orderer0.example.com | "2019-05-02 09:27:50.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 3 on channel businesschannel took 27µs" +orderer0.example.com | "2019-05-02 09:27:50.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.9µs " +orderer0.example.com | "2019-05-02 09:27:50.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.9µs " +orderer0.example.com | "2019-05-02 09:27:50.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:50.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:50.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:50.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1d Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +orderer0.example.com | "2019-05-02 09:27:50.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5813ms " +orderer0.example.com | "2019-05-02 09:27:50.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 2 on channel businesschannel took 31.1µs" +orderer0.example.com | "2019-05-02 09:27:50.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f20 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2019-05-02 09:27:50.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.7µs " +orderer0.example.com | "2019-05-02 09:27:50.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f22 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:50.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU f23 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU db2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [policies] Evaluate -> DEBU db5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [policies] Evaluate -> DEBU db6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [policies] Evaluate -> DEBU db7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [cauthdsl] func1 -> DEBU db8 0xc002e8f1a0 gate 1556789248984776100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [cauthdsl] func2 -> DEBU db9 0xc002e8f1a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:28.985 UTC [common.deliverevents] DeliverFiltered -> DEBU dba Starting new DeliverFiltered handler" +peer0.org1.example.com | "2019-05-02 09:27:28.985 UTC [common.deliver] Handle -> DEBU dbb Starting new deliver loop for 172.18.0.8:57288" +peer0.org1.example.com | "2019-05-02 09:27:28.985 UTC [common.deliver] Handle -> DEBU dbc Attempting to read seek info message from 172.18.0.8:57288" +peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [aclmgmt] CheckACL -> DEBU dbd acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" +peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [aclmgmt] CheckACL -> DEBU dbe acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [policies] Evaluate -> DEBU dbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [policies] Evaluate -> DEBU dc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [policies] Evaluate -> DEBU dc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:28.986 UTC [cauthdsl] func1 -> DEBU dc2 0xc002cdb5d0 gate 1556789248986928000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:28.987 UTC [cauthdsl] func2 -> DEBU dc3 0xc002cdb5d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:28.987 UTC [cauthdsl] func2 -> DEBU dc4 0xc002cdb5d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:28.987 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU dc5 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:28.987 UTC [msp] Validate -> DEBU dc6 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:28.987 UTC [msp] getCertificationChain -> DEBU dc7 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:28.988 UTC [cauthdsl] func2 -> DEBU dc8 0xc002cdb5d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:28.988 UTC [msp.identity] Verify -> DEBU dc9 Verify: digest = 00000000 e2 18 1f 42 c4 7c d6 61 4c 45 4b 09 23 ae 1c bc |...B.|.aLEK.#...| +peer0.org1.example.com | 00000010 72 b2 ea 02 59 1f 65 2c 98 c2 d7 38 ea 8c 99 20 |r...Y.e,...8... |" +peer0.org1.example.com | "2019-05-02 09:27:28.988 UTC [msp.identity] Verify -> DEBU dca Verify: sig = 00000000 30 45 02 21 00 df 8b 16 53 3b 96 ed 61 32 25 bb |0E.!....S;..a2%.| +peer0.org1.example.com | 00000010 3b 51 f9 eb 1c 95 10 8d 30 51 4e e9 7e a4 03 4a |;Q......0QN.~..J| +peer0.org1.example.com | 00000020 bb c8 52 4f bd 02 20 25 a9 c7 ba bd f1 1b ca c3 |..RO.. %........| +peer0.org1.example.com | 00000030 e5 ab 33 9e 50 3e 62 d6 05 3f 4e 20 03 6f 87 b5 |..3.P>b..?N .o..| +peer0.org1.example.com | 00000040 37 24 4f 9a 29 8f 9f |7$O.)..|" +peer0.org1.example.com | "2019-05-02 09:27:28.988 UTC [cauthdsl] func2 -> DEBU dcb 0xc002cdb5d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:28.988 UTC [cauthdsl] func1 -> DEBU dcc 0xc002cdb5d0 gate 1556789248986928000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dcd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dcf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dd0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [common.deliver] deliverBlocks -> DEBU dd1 [channel: businesschannel] Received seekInfo (0xc002548140) start: > stop: > from 172.18.0.8:57288" +peer0.org1.example.com | "2019-05-02 09:27:28.989 UTC [fsblkstorage] Next -> DEBU dd2 Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +peer0.org1.example.com | "2019-05-02 09:27:28.990 UTC [fsblkstorage] newBlockfileStream -> DEBU dd3 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47626]" +peer0.org1.example.com | "2019-05-02 09:27:28.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dd4 Remaining bytes=[23746], Going to peek [8] bytes" +peer0.org1.example.com | "2019-05-02 09:27:28.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dd5 Returning blockbytes - length=[23743], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" +peer0.org1.example.com | "2019-05-02 09:27:28.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dd6 blockbytes [23743] read from file [0]" +peer0.org1.example.com | "2019-05-02 09:27:28.990 UTC [common.deliver] deliverBlocks -> DEBU dd7 [channel: businesschannel] Delivering block [2] for (0xc002548140) for 172.18.0.8:57288" +peer0.org1.example.com | "2019-05-02 09:27:28.991 UTC [fsblkstorage] waitForBlock -> DEBU dd8 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +peer0.org1.example.com | "2019-05-02 09:27:28.999 UTC [msp] DeserializeIdentity -> DEBU dd9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:28.999 UTC [msp] DeserializeIdentity -> DEBU dda Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU ddb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU ddc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU ddd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU dde Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:50.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU f24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.997ms " +orderer0.example.com | "2019-05-02 09:27:51.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:51.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f26 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +orderer0.example.com | "2019-05-02 09:27:51.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU f27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.2µs " +orderer0.example.com | "2019-05-02 09:27:51.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 2 on channel businesschannel took 86.5µs" +orderer0.example.com | "2019-05-02 09:27:51.458 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 5.1044ms " +orderer0.example.com | "2019-05-02 09:27:51.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:51.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs " +orderer0.example.com | "2019-05-02 09:27:51.464 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:51.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2d Sending msg of 28 bytes to 3 on channel businesschannel took 116.5µs" +orderer0.example.com | "2019-05-02 09:27:51.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:51.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.7µs " +orderer0.example.com | "2019-05-02 09:27:51.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f30 Sending msg of 28 bytes to 3 on channel testchainid took 174.8µs" +orderer0.example.com | "2019-05-02 09:27:51.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-05-02 09:27:51.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f32 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +orderer0.example.com | "2019-05-02 09:27:51.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.2µs " +orderer0.example.com | "2019-05-02 09:27:51.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.7µs " +orderer0.example.com | "2019-05-02 09:27:51.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:51.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:52.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:52.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f38 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +orderer0.example.com | "2019-05-02 09:27:52.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU f39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96µs " +orderer0.example.com | "2019-05-02 09:27:52.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +orderer0.example.com | "2019-05-02 09:27:52.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3b Sending msg of 28 bytes to 2 on channel businesschannel took 8.3µs" +orderer0.example.com | "2019-05-02 09:27:52.450 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 423µs " +orderer0.example.com | "2019-05-02 09:27:52.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.6µs " +orderer0.example.com | "2019-05-02 09:27:52.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:52.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:52.488 UTC [orderer.common.server] Deliver -> DEBU f40 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:52.488 UTC [common.deliver] Handle -> DEBU f41 Starting new deliver loop for 172.18.0.8:57352" +orderer0.example.com | "2019-05-02 09:27:52.488 UTC [common.deliver] Handle -> DEBU f42 Attempting to read seek info message from 172.18.0.8:57352" +orderer0.example.com | "2019-05-02 09:27:52.489 UTC [policies] Evaluate -> DEBU f43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.489 UTC [policies] Evaluate -> DEBU f44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:52.489 UTC [policies] Evaluate -> DEBU f45 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.490 UTC [policies] Evaluate -> DEBU f46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:52.490 UTC [policies] Evaluate -> DEBU f47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.490 UTC [msp] DeserializeIdentity -> DEBU f48 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:52.491 UTC [msp.identity] newIdentity -> DEBU f49 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -12300,1391 +11782,1689 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:22.436 UTC [cauthdsl] func1 -> DEBU 1023 0xc000f93400 gate 1556760682436111100 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:22.436 UTC [cauthdsl] func2 -> DEBU 1024 0xc000f93400 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:22.436 UTC [cauthdsl] func2 -> DEBU 1025 0xc000f93400 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:22.437 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1026 Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-05-02 01:31:22.437 UTC [msp] Validate -> DEBU 1027 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:31:22.437 UTC [cauthdsl] func2 -> DEBU 1028 0xc000f93400 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:22.438 UTC [msp.identity] Verify -> DEBU 1029 Verify: digest = 00000000 38 94 53 91 c4 13 ca e8 34 76 e4 ff 37 87 d3 6b |8.S.....4v..7..k| -orderer0.example.com | 00000010 65 65 2d a3 d5 0e b4 ba 0a bd 4a 27 5c 5d 04 1d |ee-.......J'\]..|" -orderer0.example.com | "2019-05-02 01:31:22.438 UTC [msp.identity] Verify -> DEBU 102a Verify: sig = 00000000 30 44 02 20 05 a4 05 bb 89 86 b6 72 1a 1d 8f 70 |0D. .......r...p| -orderer0.example.com | 00000010 c7 3f c3 fb 8a 3f ff 80 bf b1 29 ad cd 2a d6 5d |.?...?....)..*.]| -orderer0.example.com | 00000020 33 7e fe 2b 02 20 5f 0f bc 8e 0c 30 e3 e0 29 35 |3~.+. _....0..)5| -orderer0.example.com | 00000030 f7 95 bf 31 a4 c2 87 c4 8c a8 1a c7 75 1d e7 2b |...1........u..+| -orderer0.example.com | 00000040 ea 5d 11 8d 63 78 |.]..cx|" -orderer0.example.com | "2019-05-02 01:31:22.439 UTC [cauthdsl] func2 -> DEBU 102b 0xc000f93400 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:22.439 UTC [cauthdsl] func1 -> DEBU 102c 0xc000f93400 gate 1556760682436111100 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:22.439 UTC [policies] Evaluate -> DEBU 102d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:22.439 UTC [policies] Evaluate -> DEBU 102e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:22.439 UTC [policies] Evaluate -> DEBU 102f Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:22.439 UTC [policies] Evaluate -> DEBU 1030 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:22.440 UTC [policies] Evaluate -> DEBU 1031 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:22.440 UTC [policies] Evaluate -> DEBU 1032 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:22.440 UTC [common.deliver] deliverBlocks -> DEBU 1033 [channel: businesschannel] Received seekInfo (0xc00106cd40) start: > stop: > from 192.168.240.9:47484" -orderer0.example.com | "2019-05-02 01:31:22.440 UTC [fsblkstorage] Next -> DEBU 1034 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:22.441 UTC [fsblkstorage] newBlockfileStream -> DEBU 1035 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94616]" -orderer0.example.com | "2019-05-02 01:31:22.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1036 Remaining bytes=[4050], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:22.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1037 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[94616], bytesOffset=[94618]}" -orderer0.example.com | "2019-05-02 01:31:22.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1038 blockbytes [4048] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:22.442 UTC [common.deliver] deliverBlocks -> DEBU 1039 [channel: businesschannel] Delivering block [8] for (0xc00106cd40) for 192.168.240.9:47484" -orderer0.example.com | "2019-05-02 01:31:22.444 UTC [common.deliver] deliverBlocks -> DEBU 103a [channel: businesschannel] Done delivering to 192.168.240.9:47484 for (0xc00106cd40)" -orderer0.example.com | "2019-05-02 01:31:22.445 UTC [fsblkstorage] waitForBlock -> DEBU 103b Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:22.445 UTC [fsblkstorage] waitForBlock -> DEBU 103c Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:22.446 UTC [common.deliver] Handle -> DEBU 103d Waiting for new SeekInfo from 192.168.240.9:47484" -orderer0.example.com | "2019-05-02 01:31:22.446 UTC [common.deliver] Handle -> DEBU 103e Attempting to read seek info message from 192.168.240.9:47484" -peer0.org1.example.com | "2019-05-02 01:30:54.004 UTC [gossip.discovery] handleAliveMessage -> DEBU e79 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:54.005 UTC [gossip.discovery] isSentByMe -> DEBU e7a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:54.005 UTC [gossip.discovery] handleAliveMessage -> DEBU e7b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:54.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU e7d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:54.005 UTC [gossip.gossip] handleMessage -> DEBU e7c Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:54.000 UTC [msp] DeserializeIdentity -> DEBU e6f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:54.007 UTC [gossip.gossip] handleMessage -> DEBU e7e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:54.008 UTC [gossip.discovery] handleMsgFromComm -> DEBU e7f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:54.010 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e81 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:54.010 UTC [msp.identity] Verify -> DEBU e82 Verify: digest = 00000000 46 51 e7 c7 6b ed cc 55 07 07 99 b0 55 94 05 80 |FQ..k..U....U...| -peer0.org1.example.com | 00000010 ea 09 d1 ce e5 89 87 7a 84 f9 ab ba 04 82 b9 53 |.......z.......S|" -peer0.org1.example.com | "2019-05-02 01:30:54.011 UTC [msp.identity] Verify -> DEBU e83 Verify: sig = 00000000 30 45 02 21 00 d4 12 f7 c1 39 cf af 37 5f ed b5 |0E.!.....9..7_..| -peer0.org1.example.com | 00000010 9b e4 46 ab e4 83 c5 78 04 70 bb fc 62 d9 13 66 |..F....x.p..b..f| -peer0.org1.example.com | 00000020 13 94 9b dc a9 02 20 2e 7c 31 1b b9 c5 d0 da 68 |...... .|1.....h| -peer0.org1.example.com | 00000030 cd d4 38 83 ea 16 6a 64 28 45 c5 95 11 c2 43 c7 |..8...jd(E....C.| -peer0.org1.example.com | 00000040 2b e4 cd 57 32 45 94 |+..W2E.|" -peer0.org1.example.com | "2019-05-02 01:30:54.012 UTC [msp.identity] Verify -> DEBU e84 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:30:54.013 UTC [msp.identity] Verify -> DEBU e85 Verify: sig = 00000000 30 44 02 20 10 fa bf 72 0b ff 50 f7 61 be 6b fa |0D. ...r..P.a.k.| -peer0.org1.example.com | 00000010 5d 7e 4f f8 a9 88 ff 5b d3 e7 7c f0 2b aa fe 17 |]~O....[..|.+...| -peer0.org1.example.com | 00000020 23 01 42 4f 02 20 57 88 2c 15 ba 65 2b 41 92 f9 |#.BO. W.,..e+A..| -peer0.org1.example.com | 00000030 db 51 0e 44 c9 14 a8 a2 6f c3 8c ae d4 db fd 43 |.Q.D....o......C| -peer0.org1.example.com | 00000040 eb 64 64 b0 00 7a |.dd..z|" -peer0.org1.example.com | "2019-05-02 01:30:54.008 UTC [msp] DeserializeIdentity -> DEBU e80 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:54.013 UTC [gossip.discovery] handleAliveMessage -> DEBU e86 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:54.014 UTC [gossip.discovery] isSentByMe -> DEBU e88 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:54.014 UTC [gossip.discovery] handleAliveMessage -> DEBU e89 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:54.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU e8a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:54.013 UTC [msp] DeserializeIdentity -> DEBU e87 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:54.014 UTC [gossip.comm] Send -> DEBU e8b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:54.015 UTC [msp] DeserializeIdentity -> DEBU e8c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:54.015 UTC [msp] DeserializeIdentity -> DEBU e8d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:54.015 UTC [gossip.comm] Send -> DEBU e8e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:54.015 UTC [gossip.comm] sendToEndpoint -> DEBU e8f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:54.016 UTC [gossip.comm] sendToEndpoint -> DEBU e90 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:54.019 UTC [gossip.comm] sendToEndpoint -> DEBU e91 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:54.019 UTC [gossip.comm] sendToEndpoint -> DEBU e92 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:54.877 UTC [endorser] ProcessProposal -> DEBU e93 Entering: request from 192.168.240.9:41274" -peer0.org1.example.com | "2019-05-02 01:30:54.878 UTC [protoutils] ValidateProposalMessage -> DEBU e94 ValidateProposalMessage starts for signed proposal 0xc0032ded20" -peer0.org1.example.com | "2019-05-02 01:30:54.878 UTC [protoutils] validateChannelHeader -> DEBU e95 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:30:54.879 UTC [protoutils] checkSignatureFromCreator -> DEBU e96 begin" -peer0.org1.example.com | "2019-05-02 01:30:54.879 UTC [protoutils] checkSignatureFromCreator -> DEBU e97 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:30:54.879 UTC [protoutils] checkSignatureFromCreator -> DEBU e98 creator is valid" -peer0.org1.example.com | "2019-05-02 01:30:54.879 UTC [msp.identity] Verify -> DEBU e99 Verify: digest = 00000000 45 61 8f 10 a2 ff 7a a9 61 96 37 b8 8b b2 95 cf |Ea....z.a.7.....| -peer0.org1.example.com | 00000010 e3 10 0b bf 9b c1 02 e4 67 e9 43 0d 7c 13 52 26 |........g.C.|.R&|" -peer0.org1.example.com | "2019-05-02 01:30:54.880 UTC [msp.identity] Verify -> DEBU e9a Verify: sig = 00000000 30 45 02 21 00 e7 58 21 84 cf bc 7f f9 55 e1 97 |0E.!..X!.....U..| -peer0.org1.example.com | 00000010 61 b1 1e 52 65 a5 d9 c8 f1 65 c6 83 e9 a2 fd 17 |a..Re....e......| -peer0.org1.example.com | 00000020 e6 d3 bd e8 82 02 20 45 66 a2 f5 f9 51 65 2a 61 |...... Ef...Qe*a| -peer0.org1.example.com | 00000030 8f 60 ee a7 c1 3e 58 25 4a ca 47 75 9b 91 30 54 |.`...>X%J.Gu..0T| -peer0.org1.example.com | 00000040 8c 78 93 67 7a 4b 3c |.x.gzK<|" -orderer0.example.com | "2019-05-02 01:31:22.450 UTC [grpc] warningf -> DEBU 103f transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.2:7050->192.168.240.9:47484: read: connection reset by peer" -orderer0.example.com | "2019-05-02 01:31:22.450 UTC [common.deliver] Handle -> WARN 1040 Error reading from 192.168.240.9:47484: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:22.451 UTC [orderer.common.server] func1 -> DEBU 1042 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:22.451 UTC [comm.grpc.server] 1 -> INFO 1043 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47484 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.5225ms -peer0.org1.example.com | "2019-05-02 01:30:54.880 UTC [protoutils] checkSignatureFromCreator -> DEBU e9b exits successfully" -peer0.org1.example.com | "2019-05-02 01:30:54.880 UTC [protoutils] validateChaincodeProposalMessage -> DEBU e9c validateChaincodeProposalMessage starts for proposal 0xc0002fdc00, header 0xc0032df180" -peer0.org1.example.com | "2019-05-02 01:30:54.880 UTC [protoutils] validateChaincodeProposalMessage -> DEBU e9d validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:30:54.881 UTC [endorser] preProcess -> DEBU e9e [][9312f22c] processing txid: 9312f22c468dcecaf07742e9c76b3c26e413c4fb8f4b51f5493ca430d619574c" -peer0.org1.example.com | "2019-05-02 01:30:54.881 UTC [endorser] SimulateProposal -> DEBU e9f [][9312f22c] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:30:54.881 UTC [endorser] callChaincode -> INFO ea0 [][9312f22c] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:30:54.881 UTC [chaincode] Execute -> DEBU ea1 Entry" -peer0.org1.example.com | "2019-05-02 01:30:54.882 UTC [msp.identity] Verify -> DEBU ea2 Verify: digest = 00000000 45 61 8f 10 a2 ff 7a a9 61 96 37 b8 8b b2 95 cf |Ea....z.a.7.....| -peer0.org1.example.com | 00000010 e3 10 0b bf 9b c1 02 e4 67 e9 43 0d 7c 13 52 26 |........g.C.|.R&|" -peer0.org1.example.com | "2019-05-02 01:30:54.882 UTC [msp.identity] Verify -> DEBU ea3 Verify: sig = 00000000 30 45 02 21 00 e7 58 21 84 cf bc 7f f9 55 e1 97 |0E.!..X!.....U..| -peer0.org1.example.com | 00000010 61 b1 1e 52 65 a5 d9 c8 f1 65 c6 83 e9 a2 fd 17 |a..Re....e......| -peer0.org1.example.com | 00000020 e6 d3 bd e8 82 02 20 45 66 a2 f5 f9 51 65 2a 61 |...... Ef...Qe*a| -peer0.org1.example.com | 00000030 8f 60 ee a7 c1 3e 58 25 4a ca 47 75 9b 91 30 54 |.`...>X%J.Gu..0T| -peer0.org1.example.com | 00000040 8c 78 93 67 7a 4b 3c |.x.gzK<|" -peer0.org1.example.com | "2019-05-02 01:30:54.882 UTC [lifecycle] QueryInstalledChaincodes -> DEBU ea4 received invocation of QueryInstalledChaincodes" -peer0.org1.example.com | "2019-05-02 01:30:54.883 UTC [chaincode] handleMessage -> DEBU ea5 [9312f22c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:54.883 UTC [chaincode] Notify -> DEBU ea6 [9312f22c] notifying Txid:9312f22c468dcecaf07742e9c76b3c26e413c4fb8f4b51f5493ca430d619574c, channelID:" -peer0.org1.example.com | "2019-05-02 01:30:54.884 UTC [chaincode] Execute -> DEBU ea7 Exit" -peer0.org1.example.com | "2019-05-02 01:30:54.884 UTC [endorser] callChaincode -> INFO ea8 [][9312f22c] Exit chaincode: name:"_lifecycle" (3ms)" -peer0.org1.example.com | "2019-05-02 01:30:54.884 UTC [endorser] SimulateProposal -> DEBU ea9 [][9312f22c] Exit" -peer0.org1.example.com | "2019-05-02 01:30:54.885 UTC [endorser] func1 -> DEBU eaa Exit: request from 192.168.240.9:41274" -peer0.org1.example.com | "2019-05-02 01:30:54.885 UTC [comm.grpc.server] 1 -> INFO eab unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41274 grpc.code=OK grpc.call_duration=7.7394ms -peer0.org1.example.com | "2019-05-02 01:30:54.891 UTC [grpc] infof -> DEBU eac transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:54.891 UTC [grpc] warningf -> DEBU ead transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41274: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:30:54.892 UTC [grpc] infof -> DEBU eae transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:55.315 UTC [endorser] ProcessProposal -> DEBU eaf Entering: request from 192.168.240.9:41278" -peer0.org1.example.com | "2019-05-02 01:30:55.315 UTC [protoutils] ValidateProposalMessage -> DEBU eb0 ValidateProposalMessage starts for signed proposal 0xc0031d2820" -peer0.org1.example.com | "2019-05-02 01:30:55.315 UTC [protoutils] validateChannelHeader -> DEBU eb1 validateChannelHeader info: header type 1" -peer0.org1.example.com | "2019-05-02 01:30:55.315 UTC [protoutils] checkSignatureFromCreator -> DEBU eb2 begin" -peer0.org1.example.com | "2019-05-02 01:30:55.316 UTC [protoutils] checkSignatureFromCreator -> DEBU eb3 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:30:55.316 UTC [protoutils] checkSignatureFromCreator -> DEBU eb4 creator is valid" -peer0.org1.example.com | "2019-05-02 01:30:55.316 UTC [msp.identity] Verify -> DEBU eb5 Verify: digest = 00000000 aa d1 8c c7 15 10 71 e4 82 31 25 f0 77 cd 0e 8f |......q..1%.w...| -peer0.org1.example.com | 00000010 0c ef 27 1a 06 47 f0 8e 4f 58 3b 7c 0e 79 7c be |..'..G..OX;|.y|.|" -peer0.org1.example.com | "2019-05-02 01:30:55.316 UTC [msp.identity] Verify -> DEBU eb6 Verify: sig = 00000000 30 45 02 21 00 ab 10 c5 ad aa 1f 84 04 4d 7b 3b |0E.!.........M{;| -peer0.org1.example.com | 00000010 6e 3e 20 97 6c a8 33 66 52 02 21 de be 05 3e 23 |n> .l.3fR.!...>#| -peer0.org1.example.com | 00000020 2f af 24 47 cf 02 20 1e bc 6d 1f fe ec b7 ca 6c |/.$G.. ..m.....l| -peer0.org1.example.com | 00000030 db f1 89 a0 b5 94 cf 6c 30 bc 5c 32 41 39 80 36 |.......l0.\2A9.6| -peer0.org1.example.com | 00000040 e8 34 b8 67 5b 00 36 |.4.g[.6|" -peer0.org1.example.com | "2019-05-02 01:30:55.317 UTC [protoutils] checkSignatureFromCreator -> DEBU eb7 exits successfully" -peer0.org1.example.com | "2019-05-02 01:30:55.317 UTC [protoutils] validateChaincodeProposalMessage -> DEBU eb8 validateChaincodeProposalMessage starts for proposal 0xc000166000, header 0xc0031d2c30" -peer0.org1.example.com | "2019-05-02 01:30:55.317 UTC [protoutils] validateChaincodeProposalMessage -> DEBU eb9 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:30:55.317 UTC [endorser] preProcess -> DEBU eba [][9ff6c9fe] processing txid: 9ff6c9fe74f692b6f4c3577e434897ca5e12c9946a3a4f71cfa3e57d842bd19c" -peer0.org1.example.com | "2019-05-02 01:30:55.318 UTC [endorser] SimulateProposal -> DEBU ebb [][9ff6c9fe] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:30:55.318 UTC [endorser] callChaincode -> INFO ebc [][9ff6c9fe] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:30:55.319 UTC [chaincode] Execute -> DEBU ebd Entry" -peer0.org1.example.com | "2019-05-02 01:30:55.320 UTC [cscc] Invoke -> DEBU ebe Invoke function: GetConfigBlock" -peer0.org1.example.com | "2019-05-02 01:30:55.321 UTC [aclmgmt] CheckACL -> DEBU ebf acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" -peer0.org1.example.com | "2019-05-02 01:30:55.321 UTC [aclmgmt] CheckACL -> DEBU ec0 acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-05-02 01:30:55.322 UTC [policies] Evaluate -> DEBU ec1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:55.322 UTC [policies] Evaluate -> DEBU ec2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:55.323 UTC [policies] Evaluate -> DEBU ec3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:55.324 UTC [msp] DeserializeIdentity -> DEBU ec4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:55.325 UTC [msp.identity] newIdentity -> DEBU ec5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | "2019-05-02 01:31:22.451 UTC [grpc] infof -> DEBU 1041 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | "2019-05-02 01:31:22.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1044 Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | "2019-05-02 01:31:22.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1045 Sending msg of 28 bytes to 3 on channel businesschannel took 29.9µs" -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | "2019-05-02 01:31:22.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1046 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 536.6µs " -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | "2019-05-02 01:31:22.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1047 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 696.8µs " -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | "2019-05-02 01:31:22.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1048 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:22.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1049 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:22.544 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104a Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | "2019-05-02 01:31:22.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.7µs " -orderer0.example.com | "2019-05-02 01:31:22.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:22.825 UTC [orderer.common.server] Deliver -> DEBU 104d Starting new Deliver handler" -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | "2019-05-02 01:31:22.826 UTC [common.deliver] Handle -> DEBU 104e Starting new deliver loop for 192.168.240.9:47486" -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:22.826 UTC [common.deliver] Handle -> DEBU 104f Attempting to read seek info message from 192.168.240.9:47486" -peer0.org1.example.com | "2019-05-02 01:30:55.326 UTC [cauthdsl] func1 -> DEBU ec6 0xc0031fe690 gate 1556760655326471700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:55.326 UTC [cauthdsl] func2 -> DEBU ec7 0xc0031fe690 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:55.327 UTC [cauthdsl] func2 -> DEBU ec8 0xc0031fe690 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:55.327 UTC [cauthdsl] func2 -> DEBU ec9 0xc0031fe690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:30:55.327 UTC [cauthdsl] func2 -> DEBU eca 0xc0031fe690 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:55.331 UTC [cauthdsl] func1 -> DEBU ecb 0xc0031fe690 gate 1556760655326471700 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:55.346 UTC [policies] Evaluate -> DEBU ecc Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.346 UTC [policies] Evaluate -> DEBU ecd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.347 UTC [policies] Evaluate -> DEBU ece == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:55.347 UTC [cauthdsl] func1 -> DEBU ecf 0xc0031ff810 gate 1556760655347447700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:55.347 UTC [cauthdsl] func2 -> DEBU ed0 0xc0031ff810 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:55.347 UTC [cauthdsl] func2 -> DEBU ed1 0xc0031ff810 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:55.348 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ed2 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:55.348 UTC [msp] Validate -> DEBU ed3 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:55.428 UTC [msp] getCertificationChain -> DEBU ed4 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:55.431 UTC [cauthdsl] func2 -> DEBU ed5 0xc0031ff810 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:55.432 UTC [msp.identity] Verify -> DEBU ed6 Verify: digest = 00000000 aa d1 8c c7 15 10 71 e4 82 31 25 f0 77 cd 0e 8f |......q..1%.w...| -peer0.org1.example.com | 00000010 0c ef 27 1a 06 47 f0 8e 4f 58 3b 7c 0e 79 7c be |..'..G..OX;|.y|.|" -peer0.org1.example.com | "2019-05-02 01:30:55.432 UTC [msp.identity] Verify -> DEBU ed7 Verify: sig = 00000000 30 45 02 21 00 ab 10 c5 ad aa 1f 84 04 4d 7b 3b |0E.!.........M{;| -peer0.org1.example.com | 00000010 6e 3e 20 97 6c a8 33 66 52 02 21 de be 05 3e 23 |n> .l.3fR.!...>#| -peer0.org1.example.com | 00000020 2f af 24 47 cf 02 20 1e bc 6d 1f fe ec b7 ca 6c |/.$G.. ..m.....l| -peer0.org1.example.com | 00000030 db f1 89 a0 b5 94 cf 6c 30 bc 5c 32 41 39 80 36 |.......l0.\2A9.6| -peer0.org1.example.com | 00000040 e8 34 b8 67 5b 00 36 |.4.g[.6|" -peer0.org1.example.com | "2019-05-02 01:30:55.433 UTC [cauthdsl] func2 -> DEBU ed8 0xc0031ff810 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:55.433 UTC [cauthdsl] func1 -> DEBU ed9 0xc0031ff810 gate 1556760655347447700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:55.433 UTC [policies] Evaluate -> DEBU eda Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.433 UTC [policies] Evaluate -> DEBU edb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.434 UTC [policies] Evaluate -> DEBU edc Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.434 UTC [policies] Evaluate -> DEBU edd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.434 UTC [chaincode] handleMessage -> DEBU ede [9ff6c9fe] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.434 UTC [chaincode] Notify -> DEBU edf [9ff6c9fe] notifying Txid:9ff6c9fe74f692b6f4c3577e434897ca5e12c9946a3a4f71cfa3e57d842bd19c, channelID:" -peer0.org1.example.com | "2019-05-02 01:30:55.434 UTC [chaincode] Execute -> DEBU ee0 Exit" -peer0.org1.example.com | "2019-05-02 01:30:55.435 UTC [endorser] callChaincode -> INFO ee1 [][9ff6c9fe] Exit chaincode: name:"cscc" (116ms)" -peer0.org1.example.com | "2019-05-02 01:30:55.435 UTC [endorser] SimulateProposal -> DEBU ee2 [][9ff6c9fe] Exit" -peer0.org1.example.com | "2019-05-02 01:30:55.451 UTC [endorser] func1 -> DEBU ee3 Exit: request from 192.168.240.9:41278" -peer0.org1.example.com | "2019-05-02 01:30:55.451 UTC [comm.grpc.server] 1 -> INFO ee4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41278 grpc.code=OK grpc.call_duration=137.2116ms -peer0.org1.example.com | "2019-05-02 01:30:55.522 UTC [endorser] ProcessProposal -> DEBU ee5 Entering: request from 192.168.240.9:41278" -peer0.org1.example.com | "2019-05-02 01:30:55.523 UTC [protoutils] ValidateProposalMessage -> DEBU ee6 ValidateProposalMessage starts for signed proposal 0xc0033c8c80" -peer0.org1.example.com | "2019-05-02 01:30:55.523 UTC [protoutils] validateChannelHeader -> DEBU ee7 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:30:55.524 UTC [protoutils] checkSignatureFromCreator -> DEBU ee8 begin" -peer0.org1.example.com | "2019-05-02 01:30:55.524 UTC [msp] GetManagerForChain -> DEBU ee9 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:30:55.524 UTC [protoutils] checkSignatureFromCreator -> DEBU eea creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:30:55.525 UTC [msp] Validate -> DEBU eeb MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:55.525 UTC [msp] getCertificationChain -> DEBU eec MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:55.526 UTC [protoutils] checkSignatureFromCreator -> DEBU eed creator is valid" -peer0.org1.example.com | "2019-05-02 01:30:55.526 UTC [msp.identity] Verify -> DEBU eee Verify: digest = 00000000 44 20 85 f5 46 36 fe 93 0b 6c a8 fd 08 39 92 35 |D ..F6...l...9.5| -peer0.org1.example.com | 00000010 cf 49 ad b3 b9 00 0a ad 07 5c 1d 0c fe 38 2a 10 |.I.......\...8*.|" -peer0.org1.example.com | "2019-05-02 01:30:55.527 UTC [msp.identity] Verify -> DEBU eef Verify: sig = 00000000 30 44 02 20 16 27 39 b2 85 af 31 53 00 e4 3d 59 |0D. .'9...1S..=Y| -peer0.org1.example.com | 00000010 c0 0d ce 47 6a 6b a3 cd 4d d0 28 4c 8d b9 11 55 |...Gjk..M.(L...U| -peer0.org1.example.com | 00000020 b5 ea e7 78 02 20 65 91 aa 93 bb b2 84 58 d1 5d |...x. e......X.]| -peer0.org1.example.com | 00000030 ce 12 14 9a ee 75 6d 9c b8 e2 1e 07 60 a4 4e 01 |.....um.....`.N.| -peer0.org1.example.com | 00000040 6b 95 26 f2 69 df |k.&.i.|" -peer0.org1.example.com | "2019-05-02 01:30:55.532 UTC [protoutils] checkSignatureFromCreator -> DEBU ef0 exits successfully" -peer0.org1.example.com | "2019-05-02 01:30:55.533 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ef1 validateChaincodeProposalMessage starts for proposal 0xc00045f810, header 0xc0034f5180" -peer0.org1.example.com | "2019-05-02 01:30:55.533 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ef2 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:30:55.533 UTC [endorser] preProcess -> DEBU ef3 [businesschannel][48f5b1b7] processing txid: 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a" -peer0.org1.example.com | "2019-05-02 01:30:55.534 UTC [fsblkstorage] retrieveTransactionByID -> DEBU ef4 retrieveTransactionByID() - txId = [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -peer0.org1.example.com | "2019-05-02 01:30:55.534 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU ef5 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:30:55.534 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU ef6 constructing new tx simulator txid = [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -orderer0.example.com | "2019-05-02 01:31:22.827 UTC [policies] Evaluate -> DEBU 1050 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:22.827 UTC [policies] Evaluate -> DEBU 1051 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:22.828 UTC [policies] Evaluate -> DEBU 1052 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:22.828 UTC [policies] Evaluate -> DEBU 1053 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:22.829 UTC [policies] Evaluate -> DEBU 1054 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:22.830 UTC [cauthdsl] func1 -> DEBU 1055 0xc000df4e20 gate 1556760682830203700 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:22.830 UTC [cauthdsl] func2 -> DEBU 1056 0xc000df4e20 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:22.830 UTC [cauthdsl] func2 -> DEBU 1057 0xc000df4e20 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:22.831 UTC [cauthdsl] func2 -> DEBU 1058 0xc000df4e20 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:22.831 UTC [msp.identity] Verify -> DEBU 1059 Verify: digest = 00000000 56 2b f5 0a ce 7d 2f 70 b2 c0 1d 3c ad 8e 51 c7 |V+...}/p...<..Q.| -orderer0.example.com | 00000010 88 ca ff cf 79 bc 13 a1 a3 03 bf 16 47 5d e6 a4 |....y.......G]..|" -orderer0.example.com | "2019-05-02 01:31:22.831 UTC [msp.identity] Verify -> DEBU 105a Verify: sig = 00000000 30 44 02 20 2f db 1e 46 17 aa 8c 7e 73 db 62 3b |0D. /..F...~s.b;| -orderer0.example.com | 00000010 85 43 90 a4 98 4b f8 15 31 da a6 3c 74 e4 a3 50 |.C...K..1..u.. 6{..J..=g.| -orderer0.example.com | 00000030 aa 71 26 88 39 af ee 6e b6 76 34 c7 55 ba f1 c0 |.q&.9..n.v4.U...| -orderer0.example.com | 00000040 eb 06 9f 62 37 eb |...b7.|" -orderer0.example.com | "2019-05-02 01:31:22.832 UTC [cauthdsl] func2 -> DEBU 105b 0xc000df4e20 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:22.832 UTC [cauthdsl] func1 -> DEBU 105c 0xc000df4e20 gate 1556760682830203700 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:22.833 UTC [policies] Evaluate -> DEBU 105d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:22.833 UTC [policies] Evaluate -> DEBU 105e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:22.834 UTC [policies] Evaluate -> DEBU 105f Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:22.834 UTC [policies] Evaluate -> DEBU 1060 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:22.834 UTC [policies] Evaluate -> DEBU 1061 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:22.835 UTC [policies] Evaluate -> DEBU 1062 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:22.835 UTC [common.deliver] deliverBlocks -> DEBU 1063 [channel: businesschannel] Received seekInfo (0xc000baa0c0) start: > stop: > from 192.168.240.9:47486" -orderer0.example.com | "2019-05-02 01:31:22.836 UTC [fsblkstorage] Next -> DEBU 1064 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:22.836 UTC [fsblkstorage] newBlockfileStream -> DEBU 1065 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94616]" -orderer0.example.com | "2019-05-02 01:31:22.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1066 Remaining bytes=[4050], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:22.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1067 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[94616], bytesOffset=[94618]}" -orderer0.example.com | "2019-05-02 01:31:22.838 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1068 blockbytes [4048] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:22.838 UTC [common.deliver] deliverBlocks -> DEBU 1069 [channel: businesschannel] Delivering block [8] for (0xc000baa0c0) for 192.168.240.9:47486" -orderer0.example.com | "2019-05-02 01:31:22.839 UTC [common.deliver] deliverBlocks -> DEBU 106a [channel: businesschannel] Done delivering to 192.168.240.9:47486 for (0xc000baa0c0)" -orderer0.example.com | "2019-05-02 01:31:22.844 UTC [common.deliver] Handle -> DEBU 106b Waiting for new SeekInfo from 192.168.240.9:47486" -orderer0.example.com | "2019-05-02 01:31:22.844 UTC [fsblkstorage] waitForBlock -> DEBU 106c Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:22.845 UTC [fsblkstorage] waitForBlock -> DEBU 106e Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:22.845 UTC [common.deliver] Handle -> DEBU 106d Attempting to read seek info message from 192.168.240.9:47486" -orderer0.example.com | "2019-05-02 01:31:22.847 UTC [policies] Evaluate -> DEBU 106f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:22.847 UTC [policies] Evaluate -> DEBU 1070 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:55.535 UTC [endorser] SimulateProposal -> DEBU ef7 [businesschannel][48f5b1b7] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:30:55.535 UTC [endorser] callChaincode -> INFO ef8 [businesschannel][48f5b1b7] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:30:55.535 UTC [chaincode] Execute -> DEBU ef9 Entry" -peer0.org1.example.com | "2019-05-02 01:30:55.535 UTC [msp.identity] Verify -> DEBU efa Verify: digest = 00000000 44 20 85 f5 46 36 fe 93 0b 6c a8 fd 08 39 92 35 |D ..F6...l...9.5| -peer0.org1.example.com | 00000010 cf 49 ad b3 b9 00 0a ad 07 5c 1d 0c fe 38 2a 10 |.I.......\...8*.|" -peer0.org1.example.com | "2019-05-02 01:30:55.536 UTC [msp.identity] Verify -> DEBU efb Verify: sig = 00000000 30 44 02 20 16 27 39 b2 85 af 31 53 00 e4 3d 59 |0D. .'9...1S..=Y| -peer0.org1.example.com | 00000010 c0 0d ce 47 6a 6b a3 cd 4d d0 28 4c 8d b9 11 55 |...Gjk..M.(L...U| -peer0.org1.example.com | 00000020 b5 ea e7 78 02 20 65 91 aa 93 bb b2 84 58 d1 5d |...x. e......X.]| -peer0.org1.example.com | 00000030 ce 12 14 9a ee 75 6d 9c b8 e2 1e 07 60 a4 4e 01 |.....um.....`.N.| -peer0.org1.example.com | 00000040 6b 95 26 f2 69 df |k.&.i.|" -peer0.org1.example.com | "2019-05-02 01:30:55.537 UTC [lifecycle] ApproveChaincodeDefinitionForMyOrg -> DEBU efc received invocation of ApproveChaincodeDefinitionForMyOrg on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" -peer0.org1.example.com | "2019-05-02 01:30:55.537 UTC [chaincode] handleMessage -> DEBU efd [48f5b1b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.537 UTC [chaincode] HandleTransaction -> DEBU efe [48f5b1b7] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:30:55.538 UTC [chaincode] HandleGetState -> DEBU eff [48f5b1b7] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:55.539 UTC [stateleveldb] GetState -> DEBU f00 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:30:55.540 UTC [chaincode] HandleGetState -> DEBU f01 [48f5b1b7] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" -peer0.org1.example.com | "2019-05-02 01:30:55.547 UTC [chaincode] HandleTransaction -> DEBU f02 [48f5b1b7] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:30:55.547 UTC [chaincode] handleMessage -> DEBU f03 [48f5b1b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.547 UTC [chaincode] HandleTransaction -> DEBU f04 [48f5b1b7] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:30:55.547 UTC [chaincode] HandleGetState -> DEBU f05 [48f5b1b7] getting state for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:55.548 UTC [msp] GetManagerForChain -> DEBU f06 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:30:55.548 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU f07 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:30:55.548 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU f08 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:30:55.548 UTC [stateleveldb] GetState -> DEBU f09 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=namespaces/metadata/exp02#1" -peer0.org1.example.com | "2019-05-02 01:30:55.548 UTC [stateleveldb] GetState -> DEBU f0a GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -peer0.org1.example.com | "2019-05-02 01:30:55.548 UTC [chaincode] HandleGetState -> DEBU f0b [48f5b1b7] No state associated with key: namespaces/metadata/exp02#1. Sending RESPONSE with an empty payload" -peer0.org1.example.com | "2019-05-02 01:30:55.548 UTC [chaincode] HandleTransaction -> DEBU f0c [48f5b1b7] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:30:55.550 UTC [chaincode] handleMessage -> DEBU f0d [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.550 UTC [chaincode] HandleTransaction -> DEBU f0e [48f5b1b7] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:30:55.550 UTC [chaincode] HandleTransaction -> DEBU f0f [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:30:55.551 UTC [chaincode] handleMessage -> DEBU f10 [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.551 UTC [chaincode] HandleTransaction -> DEBU f11 [48f5b1b7] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:30:55.552 UTC [chaincode] HandleTransaction -> DEBU f12 [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:30:55.552 UTC [chaincode] handleMessage -> DEBU f13 [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.552 UTC [chaincode] HandleTransaction -> DEBU f14 [48f5b1b7] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:30:55.553 UTC [chaincode] HandleTransaction -> DEBU f15 [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:30:55.553 UTC [chaincode] handleMessage -> DEBU f16 [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.554 UTC [chaincode] HandleTransaction -> DEBU f17 [48f5b1b7] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:30:55.554 UTC [chaincode] HandleTransaction -> DEBU f18 [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:30:55.554 UTC [chaincode] handleMessage -> DEBU f19 [48f5b1b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.555 UTC [chaincode] HandleTransaction -> DEBU f1a [48f5b1b7] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:30:55.555 UTC [chaincode] HandleGetState -> DEBU f1b [48f5b1b7] getting state for chaincode _lifecycle, key chaincode-sources/metadata/exp02#1, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:55.555 UTC [stateleveldb] GetState -> DEBU f1c GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=chaincode-sources/metadata/exp02#1" -peer0.org1.example.com | "2019-05-02 01:30:55.555 UTC [stateleveldb] GetState -> DEBU f1d GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" -peer0.org1.example.com | "2019-05-02 01:30:55.555 UTC [chaincode] HandleGetState -> DEBU f1e [48f5b1b7] No state associated with key: chaincode-sources/metadata/exp02#1. Sending RESPONSE with an empty payload" -peer0.org1.example.com | "2019-05-02 01:30:55.556 UTC [chaincode] HandleTransaction -> DEBU f1f [48f5b1b7] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:30:55.556 UTC [chaincode] handleMessage -> DEBU f20 [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.556 UTC [chaincode] HandleTransaction -> DEBU f21 [48f5b1b7] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:30:55.557 UTC [chaincode] HandleTransaction -> DEBU f22 [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:30:55.558 UTC [chaincode] handleMessage -> DEBU f23 [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.558 UTC [chaincode] HandleTransaction -> DEBU f24 [48f5b1b7] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:30:55.559 UTC [chaincode] HandleTransaction -> DEBU f25 [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:30:55.559 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO f26 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:30:55.559 UTC [chaincode] handleMessage -> DEBU f27 [48f5b1b7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:30:55.560 UTC [chaincode] Notify -> DEBU f28 [48f5b1b7] notifying Txid:48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:55.560 UTC [chaincode] Execute -> DEBU f29 Exit" -peer0.org1.example.com | "2019-05-02 01:30:55.560 UTC [endorser] callChaincode -> INFO f2a [businesschannel][48f5b1b7] Exit chaincode: name:"_lifecycle" (25ms)" -peer0.org1.example.com | "2019-05-02 01:30:55.560 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU f2b Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:30:55.561 UTC [lockbasedtxmgr] Done -> DEBU f2c Done with transaction simulation / query execution [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -peer0.org1.example.com | "2019-05-02 01:30:55.561 UTC [msp] GetManagerForChain -> DEBU f2d Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:30:55.562 UTC [cauthdsl] func1 -> DEBU f2e 0xc00251f740 gate 1556760655562250500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:55.562 UTC [cauthdsl] func2 -> DEBU f2f 0xc00251f740 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:55.562 UTC [cauthdsl] func2 -> DEBU f30 0xc00251f740 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:55.562 UTC [cauthdsl] func2 -> DEBU f31 0xc00251f740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:30:55.563 UTC [cauthdsl] func2 -> DEBU f32 0xc00251f740 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:55.563 UTC [cauthdsl] func1 -> DEBU f33 0xc00251f740 gate 1556760655562250500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:55.563 UTC [cauthdsl] func1 -> DEBU f34 0xc00251fcd0 gate 1556760655563712600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:55.564 UTC [cauthdsl] func2 -> DEBU f35 0xc00251fcd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:55.564 UTC [cauthdsl] func2 -> DEBU f36 0xc00251fcd0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:55.564 UTC [cauthdsl] func2 -> DEBU f37 0xc00251fcd0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:55.565 UTC [msp.identity] Verify -> DEBU f38 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:30:55.565 UTC [msp.identity] Verify -> DEBU f39 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:30:55.566 UTC [cauthdsl] func2 -> DEBU f3a 0xc00251fcd0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:55.566 UTC [cauthdsl] func1 -> DEBU f3b 0xc00251fcd0 gate 1556760655563712600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:55.567 UTC [cauthdsl] func1 -> DEBU f3c 0xc0025ce450 gate 1556760655567153700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:55.567 UTC [cauthdsl] func2 -> DEBU f3d 0xc0025ce450 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:55.568 UTC [cauthdsl] func2 -> DEBU f3e 0xc0025ce450 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:55.569 UTC [cauthdsl] func2 -> DEBU f3f 0xc0025ce450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -orderer0.example.com | "2019-05-02 01:31:22.847 UTC [policies] Evaluate -> DEBU 1071 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:22.847 UTC [policies] Evaluate -> DEBU 1072 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:22.847 UTC [policies] Evaluate -> DEBU 1073 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:22.848 UTC [cauthdsl] func1 -> DEBU 1074 0xc000c94f00 gate 1556760682848145600 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:22.848 UTC [cauthdsl] func2 -> DEBU 1075 0xc000c94f00 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:22.848 UTC [cauthdsl] func2 -> DEBU 1076 0xc000c94f00 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:22.849 UTC [cauthdsl] func2 -> DEBU 1077 0xc000c94f00 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:22.849 UTC [msp.identity] Verify -> DEBU 1078 Verify: digest = 00000000 3f 7c 55 25 e0 fc df 7b e4 1a 90 06 24 23 39 be |?|U%...{....$#9.| -orderer0.example.com | 00000010 44 86 3e 2d e3 53 ce f4 80 e5 50 a2 3c 6b 1b de |D.>-.S....P. DEBU 1079 Verify: sig = 00000000 30 45 02 21 00 88 a0 35 5a 09 ff 1d e0 ed 7f 70 |0E.!...5Z......p| -orderer0.example.com | 00000010 24 d6 1e 1c 68 bb 1f dc cd df 3c ca 58 73 06 9c |$...h.....<.Xs..| -orderer0.example.com | 00000020 6c 66 cd 38 1f 02 20 22 1b 19 ee d2 7f ce 63 ec |lf.8.. "......c.| -orderer0.example.com | 00000030 0d 30 65 c8 c7 0b a6 77 4d 4c b6 1c ad 9e 6b 0e |.0e....wML....k.| -orderer0.example.com | 00000040 3b 44 6a a0 3c 03 3d |;Dj.<.=|" -orderer0.example.com | "2019-05-02 01:31:22.851 UTC [cauthdsl] func2 -> DEBU 107a 0xc000c94f00 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:22.851 UTC [cauthdsl] func1 -> DEBU 107b 0xc000c94f00 gate 1556760682848145600 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:22.851 UTC [policies] Evaluate -> DEBU 107c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:22.852 UTC [policies] Evaluate -> DEBU 107d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:22.852 UTC [policies] Evaluate -> DEBU 107e Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:22.852 UTC [policies] Evaluate -> DEBU 107f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:22.853 UTC [policies] Evaluate -> DEBU 1080 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:22.853 UTC [policies] Evaluate -> DEBU 1081 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:22.853 UTC [common.deliver] deliverBlocks -> DEBU 1082 [channel: businesschannel] Received seekInfo (0xc000baa8c0) start: > stop: > from 192.168.240.9:47486" -orderer0.example.com | "2019-05-02 01:31:22.854 UTC [fsblkstorage] Next -> DEBU 1083 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:22.854 UTC [fsblkstorage] newBlockfileStream -> DEBU 1084 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47626]" -orderer0.example.com | "2019-05-02 01:31:22.854 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1085 Remaining bytes=[51040], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:22.854 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1086 Returning blockbytes - length=[23741], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" -orderer0.example.com | "2019-05-02 01:31:22.855 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1087 blockbytes [23741] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:22.855 UTC [common.deliver] deliverBlocks -> DEBU 1088 [channel: businesschannel] Delivering block [2] for (0xc000baa8c0) for 192.168.240.9:47486" -orderer0.example.com | "2019-05-02 01:31:22.855 UTC [common.deliver] deliverBlocks -> DEBU 1089 [channel: businesschannel] Done delivering to 192.168.240.9:47486 for (0xc000baa8c0)" -orderer0.example.com | "2019-05-02 01:31:22.855 UTC [common.deliver] Handle -> DEBU 108a Waiting for new SeekInfo from 192.168.240.9:47486" -orderer0.example.com | "2019-05-02 01:31:22.856 UTC [common.deliver] Handle -> DEBU 108b Attempting to read seek info message from 192.168.240.9:47486" -orderer0.example.com | "2019-05-02 01:31:22.856 UTC [fsblkstorage] waitForBlock -> DEBU 108c Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:22.856 UTC [fsblkstorage] waitForBlock -> DEBU 108d Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:22.866 UTC [common.deliver] Handle -> WARN 108e Error reading from 192.168.240.9:47486: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:22.866 UTC [orderer.common.server] func1 -> DEBU 1090 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:22.866 UTC [grpc] infof -> DEBU 108f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:22.866 UTC [comm.grpc.server] 1 -> INFO 1091 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47486 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=41.323ms -orderer0.example.com | "2019-05-02 01:31:23.023 UTC [orderer.common.server] Deliver -> DEBU 1092 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:23.024 UTC [common.deliver] Handle -> DEBU 1093 Starting new deliver loop for 192.168.240.9:47488" -orderer0.example.com | "2019-05-02 01:31:23.024 UTC [common.deliver] Handle -> DEBU 1094 Attempting to read seek info message from 192.168.240.9:47488" -orderer0.example.com | "2019-05-02 01:31:23.025 UTC [policies] Evaluate -> DEBU 1095 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.025 UTC [policies] Evaluate -> DEBU 1096 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:23.026 UTC [policies] Evaluate -> DEBU 1097 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.026 UTC [policies] Evaluate -> DEBU 1098 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:23.026 UTC [policies] Evaluate -> DEBU 1099 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.027 UTC [cauthdsl] func1 -> DEBU 109a 0xc000badb80 gate 1556760683027181200 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:23.027 UTC [cauthdsl] func2 -> DEBU 109b 0xc000badb80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:55.569 UTC [cauthdsl] func2 -> DEBU f40 0xc0025ce450 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:55.569 UTC [cauthdsl] func1 -> DEBU f41 0xc0025ce450 gate 1556760655567153700 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:55.569 UTC [transientstore] PersistWithConfig -> DEBU f42 Persisting private data to transient store for txid [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a] at block height [3]" -peer0.org1.example.com | "2019-05-02 01:30:55.574 UTC [lockbasedtxmgr] Done -> DEBU f43 Done with transaction simulation / query execution [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -peer0.org1.example.com | "2019-05-02 01:30:55.577 UTC [endorser] SimulateProposal -> DEBU f44 [businesschannel][48f5b1b7] Exit" -peer0.org1.example.com | "2019-05-02 01:30:55.577 UTC [endorser] endorseProposal -> DEBU f45 [businesschannel][48f5b1b7] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:30:55.581 UTC [endorser] endorseProposal -> DEBU f46 [businesschannel][48f5b1b7] escc for chaincode name:"_lifecycle" is escc" -peer0.org1.example.com | "2019-05-02 01:30:55.582 UTC [endorser] EndorseWithPlugin -> DEBU f47 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a, chaincode: _lifecycle}" -peer0.org1.example.com | "2019-05-02 01:30:55.583 UTC [msp.identity] Sign -> DEBU f48 Sign: plaintext: 0A20F119EED4D26C9BFEB772BBD660A7...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:30:55.583 UTC [msp.identity] Sign -> DEBU f49 Sign: digest: 4ACD6B268F2DE270D119D6B8FED7EA5626F0B7659DF2BD04511DD4D573BFB4DB " -peer0.org1.example.com | "2019-05-02 01:30:55.584 UTC [endorser] EndorseWithPlugin -> DEBU f4a Exiting {plugin: escc, channel: businesschannel, tx: 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a, chaincode: _lifecycle}" -peer0.org1.example.com | "2019-05-02 01:30:55.584 UTC [endorser] endorseProposal -> DEBU f4b [businesschannel][48f5b1b7] Exit" -peer0.org1.example.com | "2019-05-02 01:30:55.584 UTC [lockbasedtxmgr] Done -> DEBU f4c Done with transaction simulation / query execution [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -peer0.org1.example.com | "2019-05-02 01:30:55.584 UTC [endorser] func1 -> DEBU f4d Exit: request from 192.168.240.9:41278" -peer0.org1.example.com | "2019-05-02 01:30:55.584 UTC [comm.grpc.server] 1 -> INFO f4e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41278 grpc.code=OK grpc.call_duration=62.2793ms -peer0.org1.example.com | "2019-05-02 01:30:55.586 UTC [common.deliverevents] DeliverFiltered -> DEBU f4f Starting new DeliverFiltered handler" -peer0.org1.example.com | "2019-05-02 01:30:55.588 UTC [common.deliver] Handle -> DEBU f50 Starting new deliver loop for 192.168.240.9:41280" -peer0.org1.example.com | "2019-05-02 01:30:55.589 UTC [common.deliver] Handle -> DEBU f51 Attempting to read seek info message from 192.168.240.9:41280" -peer0.org1.example.com | "2019-05-02 01:30:55.590 UTC [aclmgmt] CheckACL -> DEBU f52 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" -peer0.org1.example.com | "2019-05-02 01:30:55.593 UTC [aclmgmt] CheckACL -> DEBU f53 acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-05-02 01:30:55.593 UTC [policies] Evaluate -> DEBU f54 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:55.595 UTC [policies] Evaluate -> DEBU f55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:55.599 UTC [policies] Evaluate -> DEBU f56 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:55.599 UTC [cauthdsl] func1 -> DEBU f57 0xc003220900 gate 1556760655599948000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:55.600 UTC [cauthdsl] func2 -> DEBU f58 0xc003220900 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:55.600 UTC [cauthdsl] func2 -> DEBU f59 0xc003220900 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:55.600 UTC [cauthdsl] func2 -> DEBU f5a 0xc003220900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:30:55.603 UTC [cauthdsl] func2 -> DEBU f5b 0xc003220900 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:55.604 UTC [cauthdsl] func1 -> DEBU f5c 0xc003220900 gate 1556760655599948000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU f5d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU f5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU f5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:55.604 UTC [cauthdsl] func1 -> DEBU f60 0xc003221140 gate 1556760655604367100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:55.604 UTC [cauthdsl] func2 -> DEBU f61 0xc003221140 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:55.604 UTC [cauthdsl] func2 -> DEBU f62 0xc003221140 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:55.604 UTC [cauthdsl] func2 -> DEBU f63 0xc003221140 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:55.604 UTC [msp.identity] Verify -> DEBU f64 Verify: digest = 00000000 7b 0b 19 cc 2d b4 bf 01 2d 4e 85 56 c1 c7 1e 7c |{...-...-N.V...|| -peer0.org1.example.com | 00000010 bc da 3e 24 f2 ae b0 b7 a7 4f 72 83 00 35 be f7 |..>$.....Or..5..|" -peer0.org1.example.com | "2019-05-02 01:30:55.604 UTC [msp.identity] Verify -> DEBU f65 Verify: sig = 00000000 30 44 02 20 78 cb f2 27 2b 9e 9a 21 27 b9 8e bc |0D. x..'+..!'...| -peer0.org1.example.com | 00000010 b8 86 a4 22 ee 6c f7 93 0b 1f e2 a1 28 87 10 4b |...".l......(..K| -peer0.org1.example.com | 00000020 13 75 6a d3 02 20 44 db b5 4d 91 ec b3 e0 a0 08 |.uj.. D..M......| -peer0.org1.example.com | 00000030 f9 d6 a2 71 45 22 03 ca 7f 76 86 e7 8a 5c c5 a8 |...qE"...v...\..| -peer0.org1.example.com | 00000040 35 28 9d 54 89 fa |5(.T..|" -peer0.org1.example.com | "2019-05-02 01:30:55.605 UTC [cauthdsl] func2 -> DEBU f66 0xc003221140 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:55.605 UTC [cauthdsl] func1 -> DEBU f67 0xc003221140 gate 1556760655604367100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:55.605 UTC [policies] Evaluate -> DEBU f68 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.605 UTC [policies] Evaluate -> DEBU f69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.605 UTC [policies] Evaluate -> DEBU f6a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.605 UTC [policies] Evaluate -> DEBU f6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:55.605 UTC [common.deliver] deliverBlocks -> DEBU f6c [channel: businesschannel] Received seekInfo (0xc002e7d500) start: > stop: > from 192.168.240.9:41280" -orderer0.example.com | "2019-05-02 01:31:23.027 UTC [cauthdsl] func2 -> DEBU 109c 0xc000badb80 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:23.028 UTC [cauthdsl] func2 -> DEBU 109d 0xc000badb80 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:23.028 UTC [msp.identity] Verify -> DEBU 109e Verify: digest = 00000000 2b 1c f5 79 de e2 a6 f1 2e a9 1e 19 a8 a6 10 a7 |+..y............| -orderer0.example.com | 00000010 e6 ce b6 60 b5 97 6c c4 57 e9 83 8b cd a5 db 19 |...`..l.W.......|" -orderer0.example.com | "2019-05-02 01:31:23.029 UTC [msp.identity] Verify -> DEBU 109f Verify: sig = 00000000 30 45 02 21 00 b7 77 0a 5f 1a e0 2c 51 2d 6e 7e |0E.!..w._..,Q-n~| -orderer0.example.com | 00000010 1b a2 57 7d 1f f7 40 75 44 19 01 f8 e3 08 33 d1 |..W}..@uD.....3.| -orderer0.example.com | 00000020 3d 11 d4 76 bf 02 20 56 6e 26 95 eb c9 91 0f db |=..v.. Vn&......| -orderer0.example.com | 00000030 3e c0 46 a9 70 5e 81 31 02 7b 98 7d bd b1 07 6d |>.F.p^.1.{.}...m| -orderer0.example.com | 00000040 7e 00 1d 59 02 c1 1a |~..Y...|" -orderer0.example.com | "2019-05-02 01:31:23.029 UTC [cauthdsl] func2 -> DEBU 10a0 0xc000badb80 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:23.029 UTC [cauthdsl] func1 -> DEBU 10a1 0xc000badb80 gate 1556760683027181200 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:23.030 UTC [policies] Evaluate -> DEBU 10a2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:23.030 UTC [policies] Evaluate -> DEBU 10a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:23.030 UTC [policies] Evaluate -> DEBU 10a4 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:23.030 UTC [policies] Evaluate -> DEBU 10a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:23.031 UTC [policies] Evaluate -> DEBU 10a6 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:23.031 UTC [policies] Evaluate -> DEBU 10a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:23.031 UTC [common.deliver] deliverBlocks -> DEBU 10a8 [channel: businesschannel] Received seekInfo (0xc000bab240) start: > stop: > from 192.168.240.9:47488" -orderer0.example.com | "2019-05-02 01:31:23.032 UTC [fsblkstorage] Next -> DEBU 10a9 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:23.033 UTC [fsblkstorage] newBlockfileStream -> DEBU 10aa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:31:23.033 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ab Remaining bytes=[98666], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:23.033 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ac Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:31:23.034 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ad blockbytes [23937] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:23.034 UTC [common.deliver] deliverBlocks -> DEBU 10ae [channel: businesschannel] Delivering block [0] for (0xc000bab240) for 192.168.240.9:47488" -orderer0.example.com | "2019-05-02 01:31:23.034 UTC [common.deliver] deliverBlocks -> DEBU 10af [channel: businesschannel] Done delivering to 192.168.240.9:47488 for (0xc000bab240)" -orderer0.example.com | "2019-05-02 01:31:23.035 UTC [common.deliver] Handle -> DEBU 10b0 Waiting for new SeekInfo from 192.168.240.9:47488" -orderer0.example.com | "2019-05-02 01:31:23.035 UTC [common.deliver] Handle -> DEBU 10b1 Attempting to read seek info message from 192.168.240.9:47488" -orderer0.example.com | "2019-05-02 01:31:23.035 UTC [fsblkstorage] waitForBlock -> DEBU 10b2 Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:23.036 UTC [fsblkstorage] waitForBlock -> DEBU 10b3 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:23.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b4 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" -orderer0.example.com | "2019-05-02 01:31:23.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b5 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" -orderer0.example.com | "2019-05-02 01:31:23.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 245.4µs " -orderer0.example.com | "2019-05-02 01:31:23.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.2µs " -orderer0.example.com | "2019-05-02 01:31:23.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:23.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:23.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bb Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" -orderer0.example.com | "2019-05-02 01:31:23.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ba Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:23.047 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.7µs " -orderer0.example.com | "2019-05-02 01:31:23.051 UTC [grpc] infof -> DEBU 10be transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:23.051 UTC [common.deliver] Handle -> WARN 10bd Error reading from 192.168.240.9:47488: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:23.051 UTC [orderer.common.server] func1 -> DEBU 10bf Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:23.052 UTC [comm.grpc.server] 1 -> INFO 10c0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47488 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.855ms -orderer0.example.com | "2019-05-02 01:31:23.248 UTC [orderer.common.server] Deliver -> DEBU 10c1 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:23.248 UTC [common.deliver] Handle -> DEBU 10c2 Starting new deliver loop for 192.168.240.9:47490" -orderer0.example.com | "2019-05-02 01:31:23.248 UTC [common.deliver] Handle -> DEBU 10c3 Attempting to read seek info message from 192.168.240.9:47490" -orderer0.example.com | "2019-05-02 01:31:23.250 UTC [policies] Evaluate -> DEBU 10c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.250 UTC [policies] Evaluate -> DEBU 10c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:55.606 UTC [fsblkstorage] Next -> DEBU f6d Initializing block stream for iterator. itr.maxBlockNumAvailable=2" -peer0.org1.example.com | "2019-05-02 01:30:55.606 UTC [fsblkstorage] newBlockfileStream -> DEBU f6e newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47628]" -peer0.org1.example.com | "2019-05-02 01:30:55.607 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f6f Remaining bytes=[23745], Going to peek [8] bytes" -peer0.org1.example.com | "2019-05-02 01:30:55.607 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f70 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47628], bytesOffset=[47631]}" -peer0.org1.example.com | "2019-05-02 01:30:55.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f71 blockbytes [23742] read from file [0]" -peer0.org1.example.com | "2019-05-02 01:30:55.608 UTC [common.deliver] deliverBlocks -> DEBU f72 [channel: businesschannel] Delivering block [2] for (0xc002e7d500) for 192.168.240.9:41280" -peer0.org1.example.com | "2019-05-02 01:30:55.614 UTC [fsblkstorage] waitForBlock -> DEBU f73 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -peer0.org1.example.com | "2019-05-02 01:30:56.862 UTC [msp] DeserializeIdentity -> DEBU f74 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.862 UTC [msp] DeserializeIdentity -> DEBU f75 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.863 UTC [gossip.comm] Send -> DEBU f76 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:30:56.863 UTC [gossip.comm] sendToEndpoint -> DEBU f77 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:56.863 UTC [gossip.comm] sendToEndpoint -> DEBU f78 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:56.864 UTC [gossip.comm] sendToEndpoint -> DEBU f79 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:56.864 UTC [gossip.comm] sendToEndpoint -> DEBU f7b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:56.864 UTC [gossip.comm] sendToEndpoint -> DEBU f7a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:56.864 UTC [gossip.comm] sendToEndpoint -> DEBU f7c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:56.866 UTC [gossip.comm] func1 -> DEBU f7d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:56.867 UTC [gossip.gossip] handleMessage -> DEBU f7e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:56.867 UTC [msp] DeserializeIdentity -> DEBU f7f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.868 UTC [msp] DeserializeIdentity -> DEBU f80 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.869 UTC [msp] DeserializeIdentity -> DEBU f82 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:23.250 UTC [policies] Evaluate -> DEBU 10c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.250 UTC [policies] Evaluate -> DEBU 10c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:23.251 UTC [policies] Evaluate -> DEBU 10c8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.870 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f83 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:56.868 UTC [gossip.comm] func1 -> DEBU f81 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:56.870 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f84 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:56.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f85 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:56.871 UTC [policies] Evaluate -> DEBU f86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.872 UTC [policies] Evaluate -> DEBU f87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:56.872 UTC [policies] Evaluate -> DEBU f88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.872 UTC [cauthdsl] func1 -> DEBU f89 0xc0020e1ef0 gate 1556760656872910100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:56.873 UTC [cauthdsl] func2 -> DEBU f8a 0xc0020e1ef0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:56.873 UTC [cauthdsl] func2 -> DEBU f8b 0xc0020e1ef0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:56.873 UTC [cauthdsl] func2 -> DEBU f8c 0xc0020e1ef0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:56.873 UTC [msp.identity] Verify -> DEBU f8d Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:30:56.873 UTC [msp.identity] Verify -> DEBU f8e Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU f8f 0xc0020e1ef0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:56.874 UTC [cauthdsl] func1 -> DEBU f90 0xc0020e1ef0 gate 1556760656872910100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:56.874 UTC [policies] Evaluate -> DEBU f91 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.874 UTC [policies] Evaluate -> DEBU f92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.875 UTC [policies] Evaluate -> DEBU f93 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.875 UTC [policies] Evaluate -> DEBU f94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.875 UTC [msp.identity] Verify -> DEBU f95 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -peer0.org1.example.com | 00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -peer0.org1.example.com | "2019-05-02 01:30:56.875 UTC [msp.identity] Verify -> DEBU f96 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -peer0.org1.example.com | 00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -peer0.org1.example.com | 00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -peer0.org1.example.com | 00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -peer0.org1.example.com | 00000040 63 c4 de 4c 07 05 |c..L..|" -peer0.org1.example.com | "2019-05-02 01:30:56.877 UTC [msp.identity] Verify -> DEBU f97 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:30:56.877 UTC [msp.identity] Verify -> DEBU f98 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:30:56.878 UTC [msp] DeserializeIdentity -> DEBU f99 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.878 UTC [msp] DeserializeIdentity -> DEBU f9a Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:23.251 UTC [cauthdsl] func1 -> DEBU 10c9 0xc000382eb0 gate 1556760683251360100 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:23.251 UTC [cauthdsl] func2 -> DEBU 10ca 0xc000382eb0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:23.251 UTC [cauthdsl] func2 -> DEBU 10cb 0xc000382eb0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:23.252 UTC [cauthdsl] func2 -> DEBU 10cc 0xc000382eb0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:23.252 UTC [msp.identity] Verify -> DEBU 10cd Verify: digest = 00000000 f6 33 b2 df c5 92 66 40 85 b2 87 d6 f1 21 da 93 |.3....f@.....!..| -orderer0.example.com | 00000010 8c b2 85 e4 47 1b 8d 8a b0 28 95 30 fd e8 09 13 |....G....(.0....|" -orderer0.example.com | "2019-05-02 01:31:23.252 UTC [msp.identity] Verify -> DEBU 10ce Verify: sig = 00000000 30 44 02 20 29 de e4 6e 52 31 46 6c ed 5e db 6f |0D. )..nR1Fl.^.o| -orderer0.example.com | 00000010 43 cc 4c 00 77 ac d8 7d ec 5d cd 76 dc 9a ec fd |C.L.w..}.].v....| -orderer0.example.com | 00000020 7f 61 a3 86 02 20 13 94 d6 59 1a 16 d6 1a 84 ae |.a... ...Y......| -orderer0.example.com | 00000030 5d 3d e9 39 c8 fd 23 f1 d4 03 7a b1 e5 d6 03 a5 |]=.9..#...z.....| -orderer0.example.com | 00000040 f7 bb 33 ab d7 a2 |..3...|" -orderer0.example.com | "2019-05-02 01:31:23.253 UTC [cauthdsl] func2 -> DEBU 10cf 0xc000382eb0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:23.253 UTC [cauthdsl] func1 -> DEBU 10d0 0xc000382eb0 gate 1556760683251360100 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:23.253 UTC [policies] Evaluate -> DEBU 10d1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:23.254 UTC [policies] Evaluate -> DEBU 10d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:23.254 UTC [policies] Evaluate -> DEBU 10d3 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:23.255 UTC [policies] Evaluate -> DEBU 10d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:23.255 UTC [policies] Evaluate -> DEBU 10d5 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:23.255 UTC [policies] Evaluate -> DEBU 10d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:23.256 UTC [common.deliver] deliverBlocks -> DEBU 10d7 [channel: businesschannel] Received seekInfo (0xc000bab8c0) start: > stop: > from 192.168.240.9:47490" -orderer0.example.com | "2019-05-02 01:31:23.256 UTC [fsblkstorage] Next -> DEBU 10d8 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:23.256 UTC [fsblkstorage] newBlockfileStream -> DEBU 10d9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" -orderer0.example.com | "2019-05-02 01:31:23.256 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10da Remaining bytes=[74726], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:23.257 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10db Returning blockbytes - length=[23683], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" -orderer0.example.com | "2019-05-02 01:31:23.257 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10dc blockbytes [23683] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:23.258 UTC [common.deliver] deliverBlocks -> DEBU 10dd [channel: businesschannel] Delivering block [1] for (0xc000bab8c0) for 192.168.240.9:47490" -orderer0.example.com | "2019-05-02 01:31:23.258 UTC [common.deliver] deliverBlocks -> DEBU 10de [channel: businesschannel] Done delivering to 192.168.240.9:47490 for (0xc000bab8c0)" -orderer0.example.com | "2019-05-02 01:31:23.259 UTC [common.deliver] Handle -> DEBU 10df Waiting for new SeekInfo from 192.168.240.9:47490" -orderer0.example.com | "2019-05-02 01:31:23.259 UTC [common.deliver] Handle -> DEBU 10e0 Attempting to read seek info message from 192.168.240.9:47490" -orderer0.example.com | "2019-05-02 01:31:23.259 UTC [fsblkstorage] waitForBlock -> DEBU 10e1 Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:23.259 UTC [fsblkstorage] waitForBlock -> DEBU 10e2 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:23.273 UTC [common.deliver] Handle -> WARN 10e3 Error reading from 192.168.240.9:47490: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:23.276 UTC [orderer.common.server] func1 -> DEBU 10e4 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:23.277 UTC [comm.grpc.server] 1 -> INFO 10e5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47490 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.1633ms -orderer0.example.com | "2019-05-02 01:31:23.277 UTC [grpc] infof -> DEBU 10e6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:23.491 UTC [orderer.common.server] Deliver -> DEBU 10e7 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:23.491 UTC [common.deliver] Handle -> DEBU 10e8 Starting new deliver loop for 192.168.240.9:47492" -orderer0.example.com | "2019-05-02 01:31:23.492 UTC [common.deliver] Handle -> DEBU 10e9 Attempting to read seek info message from 192.168.240.9:47492" -orderer0.example.com | "2019-05-02 01:31:23.492 UTC [policies] Evaluate -> DEBU 10ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.493 UTC [policies] Evaluate -> DEBU 10eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:23.493 UTC [policies] Evaluate -> DEBU 10ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.493 UTC [policies] Evaluate -> DEBU 10ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:23.493 UTC [policies] Evaluate -> DEBU 10ee == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.494 UTC [cauthdsl] func1 -> DEBU 10ef 0xc0003ba250 gate 1556760683494370500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:56.879 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:56.879 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f9c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:56.879 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f9d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:56.879 UTC [policies] Evaluate -> DEBU f9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.879 UTC [policies] Evaluate -> DEBU f9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:56.880 UTC [policies] Evaluate -> DEBU fa0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.880 UTC [cauthdsl] func1 -> DEBU fa1 0xc00274e500 gate 1556760656880352500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:56.880 UTC [cauthdsl] func2 -> DEBU fa2 0xc00274e500 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:56.880 UTC [cauthdsl] func2 -> DEBU fa3 0xc00274e500 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [cauthdsl] func2 -> DEBU fa4 0xc00274e500 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [msp.identity] Verify -> DEBU fa5 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -peer0.org1.example.com | 00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [msp.identity] Verify -> DEBU fa6 Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -peer0.org1.example.com | 00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -peer0.org1.example.com | 00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -peer0.org1.example.com | 00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -peer0.org1.example.com | 00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [cauthdsl] func2 -> DEBU fa7 0xc00274e500 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [cauthdsl] func1 -> DEBU fa8 0xc00274e500 gate 1556760656880352500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [policies] Evaluate -> DEBU fa9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [policies] Evaluate -> DEBU faa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [policies] Evaluate -> DEBU fab Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [policies] Evaluate -> DEBU fac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [gossip.gossip] handleMessage -> DEBU fad Exiting" -peer0.org1.example.com | "2019-05-02 01:30:56.881 UTC [gossip.gossip] handleMessage -> DEBU fae Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:56.883 UTC [msp.identity] Verify -> DEBU faf Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:30:56.884 UTC [msp.identity] Verify -> DEBU fb0 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:30:56.888 UTC [msp.identity] Verify -> DEBU fb1 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -peer0.org1.example.com | 00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -peer0.org1.example.com | "2019-05-02 01:30:56.888 UTC [msp.identity] Verify -> DEBU fb2 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -peer0.org1.example.com | 00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -peer0.org1.example.com | 00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -peer0.org1.example.com | 00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -peer0.org1.example.com | 00000040 63 c4 de 4c 07 05 |c..L..|" -peer0.org1.example.com | "2019-05-02 01:30:56.889 UTC [msp] DeserializeIdentity -> DEBU fb3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.889 UTC [msp] DeserializeIdentity -> DEBU fb4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.890 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fb5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:56.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fb6 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:56.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fb7 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:56.893 UTC [msp] DeserializeIdentity -> DEBU fb9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.895 UTC [policies] Evaluate -> DEBU fb8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.900 UTC [policies] Evaluate -> DEBU fba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:56.901 UTC [policies] Evaluate -> DEBU fbb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.901 UTC [cauthdsl] func1 -> DEBU fbc 0xc0023d2d50 gate 1556760656901587600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:56.897 UTC [msp] DeserializeIdentity -> DEBU fbd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.902 UTC [gossip.pull] Hello -> DEBU fbf Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -orderer0.example.com | "2019-05-02 01:31:23.494 UTC [cauthdsl] func2 -> DEBU 10f0 0xc0003ba250 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:56.901 UTC [cauthdsl] func2 -> DEBU fbe 0xc0023d2d50 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:23.495 UTC [cauthdsl] func2 -> DEBU 10f1 0xc0003ba250 processing identity 0 with bytes of efef60" -peer0.org1.example.com | "2019-05-02 01:30:56.903 UTC [msp] DeserializeIdentity -> DEBU fc0 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:23.495 UTC [cauthdsl] func2 -> DEBU 10f2 0xc0003ba250 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:56.903 UTC [cauthdsl] func2 -> DEBU fc1 0xc0023d2d50 processing identity 0 with bytes of 10fffc0" -orderer0.example.com | "2019-05-02 01:31:23.495 UTC [msp.identity] Verify -> DEBU 10f3 Verify: digest = 00000000 b6 f8 e5 6d 8c 8f 41 c7 98 98 63 d8 06 d3 37 5b |...m..A...c...7[| -peer0.org1.example.com | "2019-05-02 01:30:56.904 UTC [msp] DeserializeIdentity -> DEBU fc2 Obtaining identity" -orderer0.example.com | 00000010 be 9b fb 49 a7 c9 77 5d 9a 6c ee e4 eb 2a 6d eb |...I..w].l...*m.|" -peer0.org1.example.com | "2019-05-02 01:30:56.904 UTC [cauthdsl] func2 -> DEBU fc3 0xc0023d2d50 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:23.496 UTC [msp.identity] Verify -> DEBU 10f4 Verify: sig = 00000000 30 45 02 21 00 aa 42 58 f1 ab e6 bd 7d 48 79 4c |0E.!..BX....}HyL| -peer0.org1.example.com | "2019-05-02 01:30:56.906 UTC [msp.identity] Verify -> DEBU fc4 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -orderer0.example.com | 00000010 c6 ad b6 0f 53 8a 96 fe 43 81 3d 72 8e 6d c2 62 |....S...C.=r.m.b| -peer0.org1.example.com | "2019-05-02 01:30:56.906 UTC [msp.identity] Verify -> DEBU fc5 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU 10f5 0xc0003ba250 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:23.496 UTC [cauthdsl] func1 -> DEBU 10f6 0xc0003ba250 gate 1556760683494370500 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:23.497 UTC [policies] Evaluate -> DEBU 10f7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:23.497 UTC [policies] Evaluate -> DEBU 10f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:23.497 UTC [policies] Evaluate -> DEBU 10f9 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:23.498 UTC [policies] Evaluate -> DEBU 10fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:23.498 UTC [policies] Evaluate -> DEBU 10fb Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:23.499 UTC [policies] Evaluate -> DEBU 10fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:23.500 UTC [common.deliver] deliverBlocks -> DEBU 10fd [channel: businesschannel] Received seekInfo (0xc000babe80) start: > stop: > from 192.168.240.9:47492" -orderer0.example.com | "2019-05-02 01:31:23.500 UTC [fsblkstorage] Next -> DEBU 10fe Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:23.501 UTC [fsblkstorage] newBlockfileStream -> DEBU 10ff newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47626]" -orderer0.example.com | "2019-05-02 01:31:23.501 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1100 Remaining bytes=[51040], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:23.502 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1101 Returning blockbytes - length=[23741], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" -orderer0.example.com | "2019-05-02 01:31:23.502 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1102 blockbytes [23741] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:23.503 UTC [common.deliver] deliverBlocks -> DEBU 1103 [channel: businesschannel] Delivering block [2] for (0xc000babe80) for 192.168.240.9:47492" -orderer0.example.com | "2019-05-02 01:31:23.504 UTC [common.deliver] deliverBlocks -> DEBU 1104 [channel: businesschannel] Done delivering to 192.168.240.9:47492 for (0xc000babe80)" -orderer0.example.com | "2019-05-02 01:31:23.506 UTC [fsblkstorage] waitForBlock -> DEBU 1105 Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:23.506 UTC [fsblkstorage] waitForBlock -> DEBU 1106 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:23.507 UTC [common.deliver] Handle -> DEBU 1107 Waiting for new SeekInfo from 192.168.240.9:47492" -orderer0.example.com | "2019-05-02 01:31:23.507 UTC [common.deliver] Handle -> DEBU 1108 Attempting to read seek info message from 192.168.240.9:47492" -orderer0.example.com | "2019-05-02 01:31:23.538 UTC [common.deliver] Handle -> WARN 1109 Error reading from 192.168.240.9:47492: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:23.539 UTC [grpc] infof -> DEBU 110a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:23.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110b Sending msg of 28 bytes to 3 on channel businesschannel took 33.6µs" -orderer0.example.com | "2019-05-02 01:31:23.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110c Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" -orderer0.example.com | "2019-05-02 01:31:23.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.9µs " -orderer0.example.com | "2019-05-02 01:31:23.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 333.7µs " -orderer0.example.com | "2019-05-02 01:31:23.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:23.546 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 3 on channel testchainid took 30.5µs" -orderer0.example.com | "2019-05-02 01:31:23.548 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1111 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 611.9µs " -orderer0.example.com | "2019-05-02 01:31:23.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1112 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:23.550 UTC [orderer.common.server] func1 -> DEBU 1113 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:23.553 UTC [comm.grpc.server] 1 -> INFO 1114 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47492 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=62.9149ms -orderer0.example.com | "2019-05-02 01:31:23.555 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1115 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:23.796 UTC [orderer.common.server] Deliver -> DEBU 1116 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:23.796 UTC [common.deliver] Handle -> DEBU 1117 Starting new deliver loop for 192.168.240.9:47494" -orderer0.example.com | "2019-05-02 01:31:23.797 UTC [common.deliver] Handle -> DEBU 1118 Attempting to read seek info message from 192.168.240.9:47494" -orderer0.example.com | "2019-05-02 01:31:23.798 UTC [policies] Evaluate -> DEBU 1119 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.798 UTC [policies] Evaluate -> DEBU 111a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:23.798 UTC [policies] Evaluate -> DEBU 111b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.799 UTC [policies] Evaluate -> DEBU 111c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:23.799 UTC [policies] Evaluate -> DEBU 111d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:23.800 UTC [cauthdsl] func1 -> DEBU 111e 0xc000439030 gate 1556760683800107900 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:23.800 UTC [cauthdsl] func2 -> DEBU 111f 0xc000439030 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:23.800 UTC [cauthdsl] func2 -> DEBU 1120 0xc000439030 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:23.801 UTC [cauthdsl] func2 -> DEBU 1121 0xc000439030 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:23.801 UTC [msp.identity] Verify -> DEBU 1122 Verify: digest = 00000000 d0 dd 1d ee 72 88 5c 90 dc 14 e1 dd 56 03 b9 49 |....r.\.....V..I| -orderer0.example.com | 00000010 2a 2e 5d 57 bc a0 8b d2 8a 00 3b 87 c2 45 b5 ec |*.]W......;..E..|" -orderer0.example.com | "2019-05-02 01:31:23.801 UTC [msp.identity] Verify -> DEBU 1123 Verify: sig = 00000000 30 45 02 21 00 c7 b2 54 67 bf f6 48 65 80 a3 36 |0E.!...Tg..He..6| -orderer0.example.com | 00000010 7c 41 aa 3f 85 c8 fc 3f 7c 62 02 e7 27 67 60 f5 ||A.?...?|b..'g`.| -orderer0.example.com | 00000020 de 5e 89 a6 b6 02 20 4e b5 77 03 5e 04 d0 68 c8 |.^.... N.w.^..h.| -orderer0.example.com | 00000030 af 0c 6b 0c e9 50 df b6 0d 34 41 c3 08 6b 7a cc |..k..P...4A..kz.| -orderer0.example.com | 00000040 0b 94 be 3b 37 32 4f |...;72O|" -orderer0.example.com | "2019-05-02 01:31:23.802 UTC [cauthdsl] func2 -> DEBU 1124 0xc000439030 principal evaluation succeeds for identity 0" -peer0.org1.example.com | 00000020 72 01 32 2c 02 20 3a f8 7f e6 64 1d fb 09 68 48 |r.2,. :...d...hH| -peer0.org1.example.com | 00000030 b0 31 b6 bc 3a dc 5e 11 ee c8 62 0d 92 dc 8b 94 |.1..:.^...b.....| -peer0.org1.example.com | 00000040 f4 17 ef 6a 98 db |...j..|" -peer0.org1.example.com | "2019-05-02 01:30:56.909 UTC [cauthdsl] func2 -> DEBU fc6 0xc0023d2d50 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:56.909 UTC [cauthdsl] func1 -> DEBU fc7 0xc0023d2d50 gate 1556760656901587600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:56.923 UTC [policies] Evaluate -> DEBU fc8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.924 UTC [policies] Evaluate -> DEBU fc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.925 UTC [gossip.election] waitForInterrupt -> DEBU fcb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:30:56.925 UTC [gossip.election] IsLeader -> DEBU fcc c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:30:56.925 UTC [msp.identity] Sign -> DEBU fcd Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510041801 " -peer0.org1.example.com | "2019-05-02 01:30:56.925 UTC [policies] Evaluate -> DEBU fce Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.928 UTC [policies] Evaluate -> DEBU fd0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.925 UTC [msp.identity] Sign -> DEBU fcf Sign: digest: 0E334A361C588116715A750E6C4F834469221B2623F6061BB956EB057D4E97AD " -peer0.org1.example.com | "2019-05-02 01:30:56.924 UTC [gossip.comm] Send -> DEBU fca Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:56.929 UTC [gossip.gossip] handleMessage -> DEBU fd1 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:56.930 UTC [gossip.election] waitForInterrupt -> DEBU fd2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:30:56.931 UTC [gossip.comm] sendToEndpoint -> DEBU fd3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:56.932 UTC [gossip.gossip] handleMessage -> DEBU fd4 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:56.932 UTC [msp] DeserializeIdentity -> DEBU fd6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.936 UTC [msp] DeserializeIdentity -> DEBU fd7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.932 UTC [gossip.comm] sendToEndpoint -> DEBU fd5 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:56.936 UTC [msp] DeserializeIdentity -> DEBU fd8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.942 UTC [msp] DeserializeIdentity -> DEBU fd9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.946 UTC [msp] DeserializeIdentity -> DEBU fda Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.946 UTC [msp] DeserializeIdentity -> DEBU fdb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.946 UTC [gossip.comm] Send -> DEBU fdc Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:56.947 UTC [msp] DeserializeIdentity -> DEBU fdd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.947 UTC [msp] DeserializeIdentity -> DEBU fde Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:23.802 UTC [cauthdsl] func1 -> DEBU 1125 0xc000439030 gate 1556760683800107900 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:23.803 UTC [policies] Evaluate -> DEBU 1126 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:23.803 UTC [policies] Evaluate -> DEBU 1127 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:23.804 UTC [policies] Evaluate -> DEBU 1128 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:23.804 UTC [policies] Evaluate -> DEBU 1129 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:23.804 UTC [policies] Evaluate -> DEBU 112a Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:23.805 UTC [policies] Evaluate -> DEBU 112b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:23.806 UTC [common.deliver] deliverBlocks -> DEBU 112c [channel: businesschannel] Received seekInfo (0xc00110bbc0) start: > stop: > from 192.168.240.9:47494" -orderer0.example.com | "2019-05-02 01:31:23.806 UTC [fsblkstorage] Next -> DEBU 112d Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:23.807 UTC [fsblkstorage] newBlockfileStream -> DEBU 112e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71370]" -orderer0.example.com | "2019-05-02 01:31:23.807 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 112f Remaining bytes=[27296], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:23.807 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1130 Returning blockbytes - length=[4710], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}" -orderer0.example.com | "2019-05-02 01:31:23.808 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1131 blockbytes [4710] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:23.809 UTC [common.deliver] deliverBlocks -> DEBU 1132 [channel: businesschannel] Delivering block [3] for (0xc00110bbc0) for 192.168.240.9:47494" -orderer0.example.com | "2019-05-02 01:31:23.810 UTC [common.deliver] deliverBlocks -> DEBU 1133 [channel: businesschannel] Done delivering to 192.168.240.9:47494 for (0xc00110bbc0)" -orderer0.example.com | "2019-05-02 01:31:23.810 UTC [common.deliver] Handle -> DEBU 1134 Waiting for new SeekInfo from 192.168.240.9:47494" -orderer0.example.com | "2019-05-02 01:31:23.811 UTC [common.deliver] Handle -> DEBU 1135 Attempting to read seek info message from 192.168.240.9:47494" -orderer0.example.com | "2019-05-02 01:31:23.811 UTC [fsblkstorage] waitForBlock -> DEBU 1136 Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:23.812 UTC [fsblkstorage] waitForBlock -> DEBU 1137 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:23.818 UTC [common.deliver] Handle -> WARN 1138 Error reading from 192.168.240.9:47494: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:23.818 UTC [orderer.common.server] func1 -> DEBU 1139 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:23.819 UTC [comm.grpc.server] 1 -> INFO 113a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47494 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.6575ms -orderer0.example.com | "2019-05-02 01:31:23.819 UTC [grpc] infof -> DEBU 113b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:24.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113c Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" -orderer0.example.com | "2019-05-02 01:31:24.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" -orderer0.example.com | "2019-05-02 01:31:24.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.2µs " -orderer0.example.com | "2019-05-02 01:31:24.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 233.4µs " -orderer0.example.com | "2019-05-02 01:31:24.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1140 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:24.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1141 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:24.048 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1142 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:24.056 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1143 Sending msg of 28 bytes to 3 on channel testchainid took 1.1526ms" -orderer0.example.com | "2019-05-02 01:31:24.058 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1144 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5317ms " -orderer0.example.com | "2019-05-02 01:31:24.077 UTC [orderer.common.server] Deliver -> DEBU 1145 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:24.078 UTC [common.deliver] Handle -> DEBU 1146 Starting new deliver loop for 192.168.240.9:47496" -orderer0.example.com | "2019-05-02 01:31:24.078 UTC [common.deliver] Handle -> DEBU 1147 Attempting to read seek info message from 192.168.240.9:47496" -orderer0.example.com | "2019-05-02 01:31:24.079 UTC [policies] Evaluate -> DEBU 1148 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:24.080 UTC [policies] Evaluate -> DEBU 1149 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:24.080 UTC [policies] Evaluate -> DEBU 114a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:24.081 UTC [policies] Evaluate -> DEBU 114b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:24.081 UTC [policies] Evaluate -> DEBU 114c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:24.082 UTC [cauthdsl] func1 -> DEBU 114d 0xc00018f7a0 gate 1556760684082032700 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:24.082 UTC [cauthdsl] func2 -> DEBU 114e 0xc00018f7a0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:24.083 UTC [cauthdsl] func2 -> DEBU 114f 0xc00018f7a0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:24.083 UTC [cauthdsl] func2 -> DEBU 1150 0xc00018f7a0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:24.084 UTC [msp.identity] Verify -> DEBU 1151 Verify: digest = 00000000 7a c5 f8 91 de 79 ce a6 18 95 b8 1c 71 f8 3e f6 |z....y......q.>.| -orderer0.example.com | 00000010 db 76 35 4f e3 de b5 1f ca c2 89 0b ea 91 c7 08 |.v5O............|" -orderer0.example.com | "2019-05-02 01:31:24.084 UTC [msp.identity] Verify -> DEBU 1152 Verify: sig = 00000000 30 44 02 20 64 0e 03 49 9f 89 0e 1e 0b d4 7b 89 |0D. d..I......{.| -orderer0.example.com | 00000010 24 aa 78 bd 48 b4 eb 6e ce 19 55 83 93 bc e0 b2 |$.x.H..n..U.....| -orderer0.example.com | 00000020 b3 20 f5 89 02 20 50 d5 61 10 8c df 95 62 47 28 |. ... P.a....bG(| -peer0.org1.example.com | "2019-05-02 01:30:56.947 UTC [gossip.comm] sendToEndpoint -> DEBU fdf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:56.947 UTC [gossip.comm] sendToEndpoint -> DEBU fe0 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:56.956 UTC [msp] DeserializeIdentity -> DEBU fe1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fe2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [policies] Evaluate -> DEBU fe6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [policies] Evaluate -> DEBU fe7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [cauthdsl] func1 -> DEBU fe8 0xc0027170a0 gate 1556760656960585000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [cauthdsl] func2 -> DEBU fe9 0xc0027170a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [cauthdsl] func2 -> DEBU fea 0xc0027170a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [cauthdsl] func2 -> DEBU feb 0xc0027170a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [msp.identity] Verify -> DEBU fec Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -peer0.org1.example.com | 00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -peer0.org1.example.com | "2019-05-02 01:30:56.960 UTC [msp.identity] Verify -> DEBU fed Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -peer0.org1.example.com | 00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -peer0.org1.example.com | 00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -peer0.org1.example.com | 00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -peer0.org1.example.com | 00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -peer0.org1.example.com | "2019-05-02 01:30:56.961 UTC [cauthdsl] func2 -> DEBU fee 0xc0027170a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:56.961 UTC [cauthdsl] func1 -> DEBU fef 0xc0027170a0 gate 1556760656960585000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:56.968 UTC [policies] Evaluate -> DEBU ff0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.969 UTC [policies] Evaluate -> DEBU ff1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.969 UTC [policies] Evaluate -> DEBU ff2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.969 UTC [policies] Evaluate -> DEBU ff3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:56.978 UTC [msp.identity] Verify -> DEBU ff4 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -peer0.org1.example.com | 00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -peer0.org1.example.com | "2019-05-02 01:30:56.979 UTC [msp.identity] Verify -> DEBU ff5 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -peer0.org1.example.com | 00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -peer0.org1.example.com | 00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -peer0.org1.example.com | 00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -peer0.org1.example.com | 00000040 63 c4 de 4c 07 05 |c..L..|" -peer0.org1.example.com | "2019-05-02 01:30:56.980 UTC [msp] DeserializeIdentity -> DEBU ff6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:56.981 UTC [msp] DeserializeIdentity -> DEBU ff7 Obtaining identity" -orderer0.example.com | 00000030 24 ca 90 f3 78 d5 25 62 b8 a4 50 82 da 44 fc 41 |$...x.%b..P..D.A| -orderer0.example.com | 00000040 02 f4 e0 0c f5 0c |......|" -orderer0.example.com | "2019-05-02 01:31:24.085 UTC [cauthdsl] func2 -> DEBU 1153 0xc00018f7a0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:24.085 UTC [cauthdsl] func1 -> DEBU 1154 0xc00018f7a0 gate 1556760684082032700 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:24.086 UTC [policies] Evaluate -> DEBU 1155 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:24.086 UTC [policies] Evaluate -> DEBU 1156 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:24.087 UTC [policies] Evaluate -> DEBU 1157 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:24.087 UTC [policies] Evaluate -> DEBU 1158 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:24.088 UTC [policies] Evaluate -> DEBU 1159 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:24.090 UTC [policies] Evaluate -> DEBU 115a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:24.092 UTC [common.deliver] deliverBlocks -> DEBU 115b [channel: businesschannel] Received seekInfo (0xc00019b580) start: > stop: > from 192.168.240.9:47496" -orderer0.example.com | "2019-05-02 01:31:24.093 UTC [fsblkstorage] Next -> DEBU 115c Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:24.093 UTC [fsblkstorage] newBlockfileStream -> DEBU 115d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76082]" -orderer0.example.com | "2019-05-02 01:31:24.094 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 115e Remaining bytes=[22584], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:24.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 115f Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" -orderer0.example.com | "2019-05-02 01:31:24.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1160 blockbytes [4709] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:24.096 UTC [common.deliver] deliverBlocks -> DEBU 1161 [channel: businesschannel] Delivering block [4] for (0xc00019b580) for 192.168.240.9:47496" -orderer0.example.com | "2019-05-02 01:31:24.096 UTC [common.deliver] deliverBlocks -> DEBU 1162 [channel: businesschannel] Done delivering to 192.168.240.9:47496 for (0xc00019b580)" -orderer0.example.com | "2019-05-02 01:31:24.097 UTC [common.deliver] Handle -> DEBU 1163 Waiting for new SeekInfo from 192.168.240.9:47496" -orderer0.example.com | "2019-05-02 01:31:24.097 UTC [common.deliver] Handle -> DEBU 1164 Attempting to read seek info message from 192.168.240.9:47496" -orderer0.example.com | "2019-05-02 01:31:24.097 UTC [fsblkstorage] waitForBlock -> DEBU 1165 Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:24.097 UTC [fsblkstorage] waitForBlock -> DEBU 1166 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:24.106 UTC [common.deliver] Handle -> WARN 1167 Error reading from 192.168.240.9:47496: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:24.106 UTC [orderer.common.server] func1 -> DEBU 1168 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:24.107 UTC [comm.grpc.server] 1 -> INFO 1169 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47496 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.3572ms -orderer0.example.com | "2019-05-02 01:31:24.108 UTC [grpc] infof -> DEBU 116a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:24.410 UTC [orderer.common.server] Deliver -> DEBU 116b Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:24.410 UTC [common.deliver] Handle -> DEBU 116c Starting new deliver loop for 192.168.240.9:47498" -orderer0.example.com | "2019-05-02 01:31:24.411 UTC [common.deliver] Handle -> DEBU 116d Attempting to read seek info message from 192.168.240.9:47498" -orderer0.example.com | "2019-05-02 01:31:24.412 UTC [policies] Evaluate -> DEBU 116e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:24.412 UTC [policies] Evaluate -> DEBU 116f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:24.412 UTC [policies] Evaluate -> DEBU 1170 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:24.413 UTC [policies] Evaluate -> DEBU 1171 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:24.413 UTC [policies] Evaluate -> DEBU 1172 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:24.414 UTC [cauthdsl] func1 -> DEBU 1173 0xc00048dca0 gate 1556760684414286600 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:24.414 UTC [cauthdsl] func2 -> DEBU 1174 0xc00048dca0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:24.415 UTC [cauthdsl] func2 -> DEBU 1175 0xc00048dca0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:24.415 UTC [cauthdsl] func2 -> DEBU 1176 0xc00048dca0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:24.416 UTC [msp.identity] Verify -> DEBU 1177 Verify: digest = 00000000 d7 c4 1d e1 47 b2 88 b2 50 f2 73 3a a8 d0 f1 50 |....G...P.s:...P| -orderer0.example.com | 00000010 c5 91 31 98 31 34 48 be a8 87 e2 5d 9b 83 03 e3 |..1.14H....]....|" -orderer0.example.com | "2019-05-02 01:31:24.416 UTC [msp.identity] Verify -> DEBU 1178 Verify: sig = 00000000 30 44 02 20 37 44 24 e5 7c e2 3d c9 9a aa a7 ec |0D. 7D$.|.=.....| -orderer0.example.com | 00000010 99 b1 68 36 b8 b2 cd 9a fb b4 ec d8 75 47 64 a5 |..h6........uGd.| -orderer0.example.com | 00000020 64 de 53 ff 02 20 26 7c b8 7a b9 f6 3c 6c ff af |d.S.. &|.z.. DEBU ff8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:56.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ff9 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:56.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ffa Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:56.983 UTC [policies] Evaluate -> DEBU ffb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.983 UTC [policies] Evaluate -> DEBU ffc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:56.983 UTC [policies] Evaluate -> DEBU ffd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:56.984 UTC [cauthdsl] func1 -> DEBU ffe 0xc00268cf90 gate 1556760656984020500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:56.984 UTC [cauthdsl] func2 -> DEBU fff 0xc00268cf90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:56.984 UTC [cauthdsl] func2 -> DEBU 1000 0xc00268cf90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:56.984 UTC [cauthdsl] func2 -> DEBU 1001 0xc00268cf90 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:56.984 UTC [msp.identity] Verify -> DEBU 1002 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:30:57.013 UTC [msp.identity] Verify -> DEBU 1003 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU 1004 0xc00268cf90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:57.015 UTC [cauthdsl] func1 -> DEBU 1005 0xc00268cf90 gate 1556760656984020500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:57.016 UTC [policies] Evaluate -> DEBU 1006 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.016 UTC [policies] Evaluate -> DEBU 1007 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.016 UTC [policies] Evaluate -> DEBU 1008 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.017 UTC [policies] Evaluate -> DEBU 1009 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.039 UTC [msp.identity] Verify -> DEBU 100a Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:30:57.039 UTC [msp.identity] Verify -> DEBU 100b Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:30:57.040 UTC [gossip.gossip] handleMessage -> DEBU 100c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.040 UTC [gossip.gossip] handleMessage -> DEBU 100d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8267777015481731873 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.041 UTC [gossip.pull] HandleMessage -> DEBU 100e GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8267777015481731873 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.044 UTC [gossip.gossip] handleMessage -> DEBU 100f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.141 UTC [gossip.gossip] handleMessage -> DEBU 1010 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.165 UTC [msp] DeserializeIdentity -> DEBU 1011 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.167 UTC [msp] DeserializeIdentity -> DEBU 1012 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.173 UTC [gossip.gossip] handleMessage -> DEBU 1013 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.179 UTC [gossip.gossip] handleMessage -> DEBU 1014 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.202 UTC [gossip.pull] HandleMessage -> DEBU 1015 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.204 UTC [gossip.pull] SendDigest -> DEBU 1016 Sending BLOCK_MSG digest: [1 2] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:57.204 UTC [gossip.gossip] handleMessage -> DEBU 1017 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.352 UTC [gossip.comm] func1 -> DEBU 1018 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -orderer0.example.com | 00000040 fb ef 44 f1 a9 dd |..D...|" -orderer0.example.com | "2019-05-02 01:31:24.417 UTC [cauthdsl] func2 -> DEBU 1179 0xc00048dca0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:24.417 UTC [cauthdsl] func1 -> DEBU 117a 0xc00048dca0 gate 1556760684414286600 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:24.418 UTC [policies] Evaluate -> DEBU 117b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:24.419 UTC [policies] Evaluate -> DEBU 117c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:24.419 UTC [policies] Evaluate -> DEBU 117d Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:24.420 UTC [policies] Evaluate -> DEBU 117e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:24.420 UTC [policies] Evaluate -> DEBU 117f Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:24.421 UTC [policies] Evaluate -> DEBU 1180 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:24.421 UTC [common.deliver] deliverBlocks -> DEBU 1181 [channel: businesschannel] Received seekInfo (0xc00019bac0) start: > stop: > from 192.168.240.9:47498" -orderer0.example.com | "2019-05-02 01:31:24.422 UTC [fsblkstorage] Next -> DEBU 1182 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -peer0.org1.example.com | "2019-05-02 01:30:57.353 UTC [gossip.gossip] handleMessage -> DEBU 1019 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.354 UTC [msp] DeserializeIdentity -> DEBU 101a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.360 UTC [msp] DeserializeIdentity -> DEBU 101b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.361 UTC [msp] DeserializeIdentity -> DEBU 101c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.362 UTC [gossip.gossip] handleMessage -> DEBU 101d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.460 UTC [gossip.gossip] handleMessage -> DEBU 101e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.461 UTC [gossip.pull] HandleMessage -> DEBU 101f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.461 UTC [gossip.pull] SendDigest -> DEBU 1020 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:57.462 UTC [gossip.gossip] handleMessage -> DEBU 1021 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.469 UTC [gossip.gossip] handleMessage -> DEBU 1022 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.469 UTC [gossip.gossip] handleMessage -> DEBU 1023 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.469 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1024 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.469 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1025 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:57.470 UTC [msp.identity] Verify -> DEBU 1026 Verify: digest = 00000000 da 55 14 00 20 42 c4 58 73 9d a9 8e 9f 1d de 82 |.U.. B.Xs.......| -peer0.org1.example.com | 00000010 91 6d cd 5f 01 a6 0b a0 96 34 fb a5 70 bd f6 b2 |.m._.....4..p...|" -peer0.org1.example.com | "2019-05-02 01:30:57.470 UTC [msp.identity] Verify -> DEBU 1027 Verify: sig = 00000000 30 44 02 20 40 1f 8f 17 bb 76 b9 eb 71 88 f6 6c |0D. @....v..q..l| -peer0.org1.example.com | 00000010 a6 33 92 9c d9 02 11 e6 e6 47 1a 88 ea 7d 44 ae |.3.......G...}D.| -peer0.org1.example.com | 00000020 c5 23 56 97 02 20 75 09 64 6c 25 4f 9b 38 36 72 |.#V.. u.dl%O.86r| -peer0.org1.example.com | 00000030 a9 9c 24 da c6 00 dd 65 5e ae 42 fa 79 da 6e cc |..$....e^.B.y.n.| -peer0.org1.example.com | 00000040 ca 11 05 e1 91 22 |....."|" -peer0.org1.example.com | "2019-05-02 01:30:57.470 UTC [msp.identity] Verify -> DEBU 1028 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:57.470 UTC [msp.identity] Verify -> DEBU 1029 Verify: sig = 00000000 30 44 02 20 5b b5 81 e2 65 75 01 fa 6c 52 6d 00 |0D. [...eu..lRm.| -peer0.org1.example.com | 00000010 ad ad c1 30 26 5d b7 e0 eb 1f 16 58 22 3e 58 a4 |...0&].....X">X.| -peer0.org1.example.com | 00000020 26 2a 7b aa 02 20 5e e8 2d 80 b5 ba d2 05 92 3c |&*{.. ^.-......<| -peer0.org1.example.com | 00000030 9f 99 2b cb 56 23 50 18 f8 52 53 fe 7d aa 9b 24 |..+.V#P..RS.}..$| -peer0.org1.example.com | 00000040 b6 f0 1b d7 12 5f |....._|" -peer0.org1.example.com | "2019-05-02 01:30:57.471 UTC [gossip.discovery] handleAliveMessage -> DEBU 102a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.471 UTC [gossip.discovery] learnExistingMembers -> DEBU 102b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:57.471 UTC [gossip.discovery] learnExistingMembers -> DEBU 102c updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 " -peer0.org1.example.com | "2019-05-02 01:30:57.471 UTC [gossip.discovery] learnExistingMembers -> DEBU 102d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 " -peer0.org1.example.com | "2019-05-02 01:30:57.471 UTC [gossip.discovery] learnExistingMembers -> DEBU 102e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:57.471 UTC [gossip.discovery] learnExistingMembers -> DEBU 102f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.472 UTC [gossip.discovery] handleAliveMessage -> DEBU 1030 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.472 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1031 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.472 UTC [gossip.discovery] sendMemResponse -> DEBU 1032 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:30:57.472 UTC [msp] DeserializeIdentity -> DEBU 1033 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.472 UTC [msp] DeserializeIdentity -> DEBU 1034 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.472 UTC [gossip.comm] Send -> DEBU 1035 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:57.473 UTC [gossip.discovery] sendMemResponse -> DEBU 1036 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:57.473 UTC [gossip.comm] sendToEndpoint -> DEBU 1037 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.473 UTC [gossip.comm] sendToEndpoint -> DEBU 1038 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.541 UTC [gossip.comm] func1 -> DEBU 1039 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.542 UTC [gossip.gossip] handleMessage -> DEBU 103a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.542 UTC [gossip.pull] HandleMessage -> DEBU 103b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.543 UTC [msp] DeserializeIdentity -> DEBU 103c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.543 UTC [msp] DeserializeIdentity -> DEBU 103d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.544 UTC [msp] DeserializeIdentity -> DEBU 103e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.544 UTC [msp] DeserializeIdentity -> DEBU 103f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.545 UTC [msp] DeserializeIdentity -> DEBU 1040 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.545 UTC [msp] DeserializeIdentity -> DEBU 1041 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.545 UTC [gossip.pull] SendDigest -> DEBU 1042 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:57.546 UTC [gossip.gossip] handleMessage -> DEBU 1043 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.549 UTC [gossip.comm] func1 -> DEBU 1044 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.549 UTC [gossip.gossip] handleMessage -> DEBU 1045 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.549 UTC [gossip.gossip] handleMessage -> DEBU 1046 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1047 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.549 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1048 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:57.551 UTC [msp] DeserializeIdentity -> DEBU 1049 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.552 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 104a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:57.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 104b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:57.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 104c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:57.552 UTC [policies] Evaluate -> DEBU 104d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:57.552 UTC [policies] Evaluate -> DEBU 104e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:57.552 UTC [policies] Evaluate -> DEBU 104f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:57.552 UTC [cauthdsl] func1 -> DEBU 1050 0xc0002cce80 gate 1556760657552572400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:57.552 UTC [cauthdsl] func2 -> DEBU 1051 0xc0002cce80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:57.552 UTC [cauthdsl] func2 -> DEBU 1052 0xc0002cce80 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:57.553 UTC [cauthdsl] func2 -> DEBU 1053 0xc0002cce80 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:24.422 UTC [fsblkstorage] newBlockfileStream -> DEBU 1183 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80793]" -orderer0.example.com | "2019-05-02 01:31:24.423 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1184 Remaining bytes=[17873], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:24.423 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1185 Returning blockbytes - length=[5711], placementInfo={fileNum=[0], startOffset=[80793], bytesOffset=[80795]}" -orderer0.example.com | "2019-05-02 01:31:24.424 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1186 blockbytes [5711] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:24.425 UTC [common.deliver] deliverBlocks -> DEBU 1187 [channel: businesschannel] Delivering block [5] for (0xc00019bac0) for 192.168.240.9:47498" -orderer0.example.com | "2019-05-02 01:31:24.426 UTC [common.deliver] deliverBlocks -> DEBU 1188 [channel: businesschannel] Done delivering to 192.168.240.9:47498 for (0xc00019bac0)" -orderer0.example.com | "2019-05-02 01:31:24.427 UTC [fsblkstorage] waitForBlock -> DEBU 1189 Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:24.428 UTC [fsblkstorage] waitForBlock -> DEBU 118a Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:24.429 UTC [common.deliver] Handle -> DEBU 118b Waiting for new SeekInfo from 192.168.240.9:47498" -orderer0.example.com | "2019-05-02 01:31:24.431 UTC [common.deliver] Handle -> DEBU 118c Attempting to read seek info message from 192.168.240.9:47498" -orderer0.example.com | "2019-05-02 01:31:24.439 UTC [common.deliver] Handle -> WARN 118d Error reading from 192.168.240.9:47498: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:24.439 UTC [orderer.common.server] func1 -> DEBU 118e Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:24.440 UTC [comm.grpc.server] 1 -> INFO 118f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47498 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.7036ms -orderer0.example.com | "2019-05-02 01:31:24.441 UTC [grpc] infof -> DEBU 1190 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:24.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1191 Sending msg of 28 bytes to 2 on channel businesschannel took 38µs" -orderer0.example.com | "2019-05-02 01:31:24.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1192 Sending msg of 28 bytes to 3 on channel businesschannel took 38.1µs" -orderer0.example.com | "2019-05-02 01:31:24.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1193 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 693µs " -orderer0.example.com | "2019-05-02 01:31:24.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1194 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:24.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1195 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 826.1µs " -orderer0.example.com | "2019-05-02 01:31:24.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1196 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:24.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1197 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:24.548 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1198 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.2µs " -orderer0.example.com | "2019-05-02 01:31:24.546 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1199 Sending msg of 28 bytes to 3 on channel testchainid took 147.6µs" -orderer0.example.com | "2019-05-02 01:31:24.807 UTC [orderer.common.server] Deliver -> DEBU 119a Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:24.808 UTC [common.deliver] Handle -> DEBU 119b Starting new deliver loop for 192.168.240.9:47500" -orderer0.example.com | "2019-05-02 01:31:24.810 UTC [common.deliver] Handle -> DEBU 119c Attempting to read seek info message from 192.168.240.9:47500" -orderer0.example.com | "2019-05-02 01:31:24.812 UTC [policies] Evaluate -> DEBU 119d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:24.812 UTC [policies] Evaluate -> DEBU 119e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:24.812 UTC [policies] Evaluate -> DEBU 119f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:24.813 UTC [policies] Evaluate -> DEBU 11a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:24.813 UTC [policies] Evaluate -> DEBU 11a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:24.813 UTC [cauthdsl] func1 -> DEBU 11a2 0xc0002ebc80 gate 1556760684813147400 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:24.813 UTC [cauthdsl] func2 -> DEBU 11a3 0xc0002ebc80 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:24.813 UTC [cauthdsl] func2 -> DEBU 11a4 0xc0002ebc80 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:24.813 UTC [cauthdsl] func2 -> DEBU 11a5 0xc0002ebc80 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:24.813 UTC [msp.identity] Verify -> DEBU 11a6 Verify: digest = 00000000 a0 73 bf e9 71 11 16 54 9d 4c 6f 5d a1 41 5b c5 |.s..q..T.Lo].A[.| -orderer0.example.com | 00000010 5a 78 23 76 ea c2 f0 ad 43 6a e4 97 b0 e5 20 2d |Zx#v....Cj.... -|" -orderer0.example.com | "2019-05-02 01:31:24.814 UTC [msp.identity] Verify -> DEBU 11a7 Verify: sig = 00000000 30 44 02 20 4e 55 15 0f fe 8b 32 3c e4 91 74 c3 |0D. NU....2<..t.| -orderer0.example.com | 00000010 bf 6c 3f 48 f1 50 7d af db d3 ef bf f3 10 37 c2 |.l?H.P}.......7.| -orderer0.example.com | 00000020 d5 ae 54 41 02 20 0c 5b 94 3e 97 fa 21 19 05 5a |..TA. .[.>..!..Z| -orderer0.example.com | 00000030 fb ef 38 49 51 3e f6 0f 35 9d b9 f8 8b 2a 53 5f |..8IQ>..5....*S_| -peer0.org1.example.com | "2019-05-02 01:30:57.553 UTC [msp.identity] Verify -> DEBU 1054 Verify: digest = 00000000 51 d7 73 b6 db 19 35 79 ed 87 bd be be f7 98 cb |Q.s...5y........| -peer0.org1.example.com | 00000010 2c 3b ba 6e e2 d9 a1 90 72 bf 71 60 11 40 69 29 |,;.n....r.q`.@i)|" -peer0.org1.example.com | "2019-05-02 01:30:57.553 UTC [msp.identity] Verify -> DEBU 1055 Verify: sig = 00000000 30 44 02 20 09 cf 7b 66 db 8b d0 58 96 f9 ee 90 |0D. ..{f...X....| -peer0.org1.example.com | 00000010 09 16 06 26 84 18 b0 d2 1e 31 84 ed ee 30 28 8c |...&.....1...0(.| -peer0.org1.example.com | 00000020 78 d3 c4 00 02 20 13 30 2e 85 0c 47 95 e5 38 d5 |x.... .0...G..8.| -peer0.org1.example.com | 00000030 d8 94 59 50 fa 97 ef 7c 22 28 d7 5f ee af 87 c4 |..YP...|"(._....| -peer0.org1.example.com | 00000040 43 a7 2c 00 e9 3a |C.,..:|" -peer0.org1.example.com | "2019-05-02 01:30:57.553 UTC [cauthdsl] func2 -> DEBU 1056 0xc0002cce80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:57.553 UTC [cauthdsl] func1 -> DEBU 1057 0xc0002cce80 gate 1556760657552572400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:57.553 UTC [policies] Evaluate -> DEBU 1058 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.553 UTC [policies] Evaluate -> DEBU 1059 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.553 UTC [policies] Evaluate -> DEBU 105a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.553 UTC [policies] Evaluate -> DEBU 105b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 105c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 105d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:57.555 UTC [gossip.discovery] learnExistingMembers -> DEBU 105e updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 " -peer0.org1.example.com | "2019-05-02 01:30:57.555 UTC [gossip.discovery] learnExistingMembers -> DEBU 105f Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 " -peer0.org1.example.com | "2019-05-02 01:30:57.556 UTC [gossip.discovery] learnExistingMembers -> DEBU 1060 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:57.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 1061 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.564 UTC [gossip.discovery] handleAliveMessage -> DEBU 1062 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1063 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.564 UTC [gossip.discovery] sendMemResponse -> DEBU 1064 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:30:57.565 UTC [msp] DeserializeIdentity -> DEBU 1065 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.565 UTC [msp] DeserializeIdentity -> DEBU 1066 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.565 UTC [msp] DeserializeIdentity -> DEBU 1067 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.565 UTC [gossip.comm] Send -> DEBU 1068 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:57.566 UTC [gossip.discovery] sendMemResponse -> DEBU 1069 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:57.566 UTC [gossip.comm] sendToEndpoint -> DEBU 106a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.566 UTC [gossip.comm] sendToEndpoint -> DEBU 106b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.617 UTC [gossip.comm] func1 -> DEBU 106c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.619 UTC [gossip.gossip] handleMessage -> DEBU 106d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.625 UTC [msp] DeserializeIdentity -> DEBU 106e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.630 UTC [msp] DeserializeIdentity -> DEBU 106f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.635 UTC [msp] DeserializeIdentity -> DEBU 1070 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.638 UTC [gossip.gossip] handleMessage -> DEBU 1071 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.684 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1072 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:57.684 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1073 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:57.684 UTC [policies] Evaluate -> DEBU 1074 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-05-02 01:30:57.684 UTC [policies] Evaluate -> DEBU 1075 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:57.685 UTC [policies] Evaluate -> DEBU 1076 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-05-02 01:30:57.685 UTC [msp] DeserializeIdentity -> DEBU 1077 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.685 UTC [msp.identity] newIdentity -> DEBU 1078 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI -peer0.org1.example.com | KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO -peer0.org1.example.com | CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA -peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM -peer0.org1.example.com | SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q -peer0.org1.example.com | 1A== -peer0.org1.example.com | -----END CERTIFICATE-----" -orderer0.example.com | 00000040 3c b1 dc d0 23 c8 |<...#.|" -orderer0.example.com | "2019-05-02 01:31:24.814 UTC [cauthdsl] func2 -> DEBU 11a8 0xc0002ebc80 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:24.814 UTC [cauthdsl] func1 -> DEBU 11a9 0xc0002ebc80 gate 1556760684813147400 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:24.814 UTC [policies] Evaluate -> DEBU 11aa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:24.814 UTC [policies] Evaluate -> DEBU 11ab == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:24.814 UTC [policies] Evaluate -> DEBU 11ac Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:24.814 UTC [policies] Evaluate -> DEBU 11ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:24.815 UTC [policies] Evaluate -> DEBU 11ae Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:24.815 UTC [policies] Evaluate -> DEBU 11af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:24.815 UTC [common.deliver] deliverBlocks -> DEBU 11b0 [channel: businesschannel] Received seekInfo (0xc00016f440) start: > stop: > from 192.168.240.9:47500" -orderer0.example.com | "2019-05-02 01:31:24.815 UTC [fsblkstorage] Next -> DEBU 11b1 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:24.815 UTC [fsblkstorage] newBlockfileStream -> DEBU 11b2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86506]" -orderer0.example.com | "2019-05-02 01:31:24.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b3 Remaining bytes=[12160], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:24.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b4 Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86506], bytesOffset=[86508]}" -orderer0.example.com | "2019-05-02 01:31:24.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b5 blockbytes [4058] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:24.816 UTC [common.deliver] deliverBlocks -> DEBU 11b6 [channel: businesschannel] Delivering block [6] for (0xc00016f440) for 192.168.240.9:47500" -orderer0.example.com | "2019-05-02 01:31:24.817 UTC [common.deliver] deliverBlocks -> DEBU 11b7 [channel: businesschannel] Done delivering to 192.168.240.9:47500 for (0xc00016f440)" -orderer0.example.com | "2019-05-02 01:31:24.817 UTC [common.deliver] Handle -> DEBU 11b8 Waiting for new SeekInfo from 192.168.240.9:47500" -orderer0.example.com | "2019-05-02 01:31:24.817 UTC [common.deliver] Handle -> DEBU 11b9 Attempting to read seek info message from 192.168.240.9:47500" -orderer0.example.com | "2019-05-02 01:31:24.817 UTC [fsblkstorage] waitForBlock -> DEBU 11ba Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:24.817 UTC [fsblkstorage] waitForBlock -> DEBU 11bb Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:24.825 UTC [common.deliver] Handle -> WARN 11bc Error reading from 192.168.240.9:47500: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:24.826 UTC [orderer.common.server] func1 -> DEBU 11bd Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:24.826 UTC [comm.grpc.server] 1 -> INFO 11be streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47500 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.6365ms -orderer0.example.com | "2019-05-02 01:31:24.829 UTC [grpc] infof -> DEBU 11bf transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:25.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c0 Sending msg of 28 bytes to 2 on channel businesschannel took 30.8µs" -orderer0.example.com | "2019-05-02 01:31:25.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c1 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" -orderer0.example.com | "2019-05-02 01:31:25.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471.1µs " -orderer0.example.com | "2019-05-02 01:31:25.043 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7171ms " -orderer0.example.com | "2019-05-02 01:31:25.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:25.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c5 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:25.050 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c7 Sending msg of 28 bytes to 3 on channel testchainid took 39.5µs" -orderer0.example.com | "2019-05-02 01:31:25.051 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 337.7µs " -orderer0.example.com | "2019-05-02 01:31:25.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c6 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:25.117 UTC [orderer.common.server] Deliver -> DEBU 11c9 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:25.118 UTC [common.deliver] Handle -> DEBU 11ca Starting new deliver loop for 192.168.240.9:47502" -orderer0.example.com | "2019-05-02 01:31:25.118 UTC [common.deliver] Handle -> DEBU 11cb Attempting to read seek info message from 192.168.240.9:47502" -orderer0.example.com | "2019-05-02 01:31:25.119 UTC [policies] Evaluate -> DEBU 11cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:25.120 UTC [policies] Evaluate -> DEBU 11cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:25.122 UTC [policies] Evaluate -> DEBU 11ce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:25.122 UTC [policies] Evaluate -> DEBU 11cf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:25.122 UTC [policies] Evaluate -> DEBU 11d0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:25.123 UTC [cauthdsl] func1 -> DEBU 11d1 0xc000981320 gate 1556760685123286900 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:25.124 UTC [cauthdsl] func2 -> DEBU 11d2 0xc000981320 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:25.124 UTC [cauthdsl] func2 -> DEBU 11d3 0xc000981320 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:25.125 UTC [cauthdsl] func2 -> DEBU 11d4 0xc000981320 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:25.129 UTC [msp.identity] Verify -> DEBU 11d5 Verify: digest = 00000000 f0 8a 65 bb 4f 5e e4 f9 eb d1 26 0f 9c d6 e4 6f |..e.O^....&....o| -orderer0.example.com | 00000010 a3 be 10 d9 88 d7 90 ed 3d 16 47 9e 5f 82 05 87 |........=.G._...|" -orderer0.example.com | "2019-05-02 01:31:25.131 UTC [msp.identity] Verify -> DEBU 11d6 Verify: sig = 00000000 30 44 02 20 45 0c e1 20 bd 90 6a f0 3b 2b ef 46 |0D. E.. ..j.;+.F| -orderer0.example.com | 00000010 72 a3 f2 5d 87 9a ac 8e 9e bb cf 5e be b9 ae 31 |r..].......^...1| -orderer0.example.com | 00000020 a0 ad 51 7f 02 20 5a 19 03 a8 51 97 0d d7 a7 88 |..Q.. Z...Q.....| -orderer0.example.com | 00000030 2d 25 2f ba ee c5 aa cd 87 9a 6a e5 0e a5 cf 1c |-%/.......j.....| -orderer0.example.com | 00000040 c0 2b 0c f5 93 54 |.+...T|" -orderer0.example.com | "2019-05-02 01:31:25.140 UTC [cauthdsl] func2 -> DEBU 11d7 0xc000981320 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:25.140 UTC [cauthdsl] func1 -> DEBU 11d8 0xc000981320 gate 1556760685123286900 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:25.141 UTC [policies] Evaluate -> DEBU 11d9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:25.142 UTC [policies] Evaluate -> DEBU 11da == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:25.143 UTC [policies] Evaluate -> DEBU 11db Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:25.144 UTC [policies] Evaluate -> DEBU 11dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:25.144 UTC [policies] Evaluate -> DEBU 11dd Signature set satisfies policy /Channel/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.685 UTC [cauthdsl] func1 -> DEBU 1079 0xc00272fdb0 gate 1556760657685651100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:57.685 UTC [cauthdsl] func2 -> DEBU 107a 0xc00272fdb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:57.685 UTC [cauthdsl] func2 -> DEBU 107b 0xc00272fdb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:57.685 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 107c Checking if identity satisfies MEMBER role for OrdererMSP" -peer0.org1.example.com | "2019-05-02 01:30:57.685 UTC [msp] Validate -> DEBU 107d MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [cauthdsl] func2 -> DEBU 107e 0xc00272fdb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [msp.identity] Verify -> DEBU 107f Verify: digest = 00000000 e4 64 c7 67 87 0e 5a c2 e1 cf 3f d7 ed a6 a2 d3 |.d.g..Z...?.....| -peer0.org1.example.com | 00000010 31 87 c0 8e a4 57 3f 9e 96 45 a7 79 2d 33 fe bd |1....W?..E.y-3..|" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [msp.identity] Verify -> DEBU 1080 Verify: sig = 00000000 30 45 02 21 00 a2 cd 09 83 ec 66 64 99 ae da 92 |0E.!......fd....| -peer0.org1.example.com | 00000010 f4 e6 be cf c1 13 f4 46 75 48 93 ff 38 04 e5 e6 |.......FuH..8...| -peer0.org1.example.com | 00000020 59 76 0a b9 74 02 20 08 ae 5e c1 49 59 fc 57 df |Yv..t. ..^.IY.W.| -peer0.org1.example.com | 00000030 ac 57 a9 ba 4e 42 57 1d 08 64 eb 93 c0 7b 18 01 |.W..NBW..d...{..| -peer0.org1.example.com | 00000040 01 7c 69 55 c0 10 e0 |.|iU...|" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [cauthdsl] func2 -> DEBU 1081 0xc00272fdb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [cauthdsl] func1 -> DEBU 1082 0xc00272fdb0 gate 1556760657685651100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [policies] Evaluate -> DEBU 1083 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [policies] Evaluate -> DEBU 1084 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [policies] Evaluate -> DEBU 1085 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [policies] Evaluate -> DEBU 1086 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [blocksProvider] DeliverBlocks -> DEBU 1087 [businesschannel] Adding payload to local buffer, blockNum = [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.686 UTC [gossip.state] addPayload -> DEBU 1088 [businesschannel] Adding payload to local buffer, blockNum = [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.687 UTC [gossip.state] addPayload -> DEBU 1089 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-05-02 01:30:57.687 UTC [blocksProvider] DeliverBlocks -> DEBU 108a [businesschannel] Gossiping block [3], peers number [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.687 UTC [gossip.channel] AddToMsgStore -> DEBU 108b Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4724 bytes, seq: 3}, Envelope: 4754 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-05-02 01:30:57.687 UTC [gossip.pull] Add -> DEBU 108c Added 3, total items: 3" -peer0.org1.example.com | "2019-05-02 01:30:57.687 UTC [gossip.state] deliverPayloads -> DEBU 108d [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.687 UTC [gossip.state] deliverPayloads -> DEBU 108e [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-05-02 01:30:57.687 UTC [gossip.privdata] StoreBlock -> INFO 108f [businesschannel] Received block [3] from buffer" -peer0.org1.example.com | "2019-05-02 01:30:57.687 UTC [gossip.privdata] StoreBlock -> DEBU 1090 [businesschannel] Validating block [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.687 UTC [committer.txvalidator] Validate -> DEBU 1091 [businesschannel] START Block Validation for block [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.687 UTC [committer.txvalidator] Validate -> DEBU 1092 expecting 1 block validation responses" -peer0.org1.example.com | "2019-05-02 01:30:57.690 UTC [committer.txvalidator] validateTx -> DEBU 1093 [businesschannel] validateTx starts for block 0xc002f8f240 env 0xc002759cc0 txn 0" -peer0.org1.example.com | "2019-05-02 01:30:57.690 UTC [protoutils] ValidateTransaction -> DEBU 1094 ValidateTransactionEnvelope starts for envelope 0xc002759cc0" -peer0.org1.example.com | "2019-05-02 01:30:57.691 UTC [protoutils] ValidateTransaction -> DEBU 1095 Header is channel_header:"\010\003\032\014\010\317\220\251\346\005\020\300\201\222\370\001\"\017businesschannel*@48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\305'\350\322\200\365\337\227\274\345\207\266\273\335\365\301l\024\321\244\226\224\302\320" " -peer0.org1.example.com | "2019-05-02 01:30:57.720 UTC [protoutils] validateChannelHeader -> DEBU 1096 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:30:57.729 UTC [protoutils] checkSignatureFromCreator -> DEBU 1097 begin" -peer0.org1.example.com | "2019-05-02 01:30:57.729 UTC [msp] GetManagerForChain -> DEBU 1098 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:30:57.729 UTC [protoutils] checkSignatureFromCreator -> DEBU 1099 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:30:57.729 UTC [protoutils] checkSignatureFromCreator -> DEBU 109a creator is valid" -peer0.org1.example.com | "2019-05-02 01:30:57.730 UTC [msp.identity] Verify -> DEBU 109b Verify: digest = 00000000 30 2b 78 82 93 28 6b 8b c3 cf 7e 75 7b a0 56 aa |0+x..(k...~u{.V.| -peer0.org1.example.com | 00000010 06 be 8a 3a cd 72 e3 7f 56 3a 6a 93 12 cc ee 11 |...:.r..V:j.....|" -peer0.org1.example.com | "2019-05-02 01:30:57.730 UTC [msp.identity] Verify -> DEBU 109c Verify: sig = 00000000 30 45 02 21 00 87 4b 3f 3c 2d 2e a3 58 0d 8b 10 |0E.!..K?<-..X...| -peer0.org1.example.com | 00000010 3f c6 c2 a1 6b 5a b2 25 2a 4a 96 1c 46 b8 2d 0b |?...kZ.%*J..F.-.| -peer0.org1.example.com | 00000020 e4 a9 39 92 37 02 20 67 ff 3a 3f 62 cd c9 90 e7 |..9.7. g.:?b....| -peer0.org1.example.com | 00000030 69 ed cb e1 7b d4 6d df b5 a5 8d 8f 8a 9c 01 b5 |i...{.m.........| -peer0.org1.example.com | 00000040 d1 e8 59 34 d4 0a f2 |..Y4...|" -peer0.org1.example.com | "2019-05-02 01:30:57.731 UTC [protoutils] checkSignatureFromCreator -> DEBU 109d exits successfully" -orderer0.example.com | "2019-05-02 01:31:25.145 UTC [policies] Evaluate -> DEBU 11de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:25.145 UTC [common.deliver] deliverBlocks -> DEBU 11df [channel: businesschannel] Received seekInfo (0xc00017e400) start: > stop: > from 192.168.240.9:47502" -orderer0.example.com | "2019-05-02 01:31:25.146 UTC [fsblkstorage] Next -> DEBU 11e0 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:25.146 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90566]" -orderer0.example.com | "2019-05-02 01:31:25.147 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e2 Remaining bytes=[8100], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:25.148 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e3 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90566], bytesOffset=[90568]}" -orderer0.example.com | "2019-05-02 01:31:25.148 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e4 blockbytes [4048] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:25.149 UTC [common.deliver] deliverBlocks -> DEBU 11e5 [channel: businesschannel] Delivering block [7] for (0xc00017e400) for 192.168.240.9:47502" -orderer0.example.com | "2019-05-02 01:31:25.150 UTC [common.deliver] deliverBlocks -> DEBU 11e6 [channel: businesschannel] Done delivering to 192.168.240.9:47502 for (0xc00017e400)" -orderer0.example.com | "2019-05-02 01:31:25.150 UTC [fsblkstorage] waitForBlock -> DEBU 11e7 Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:25.151 UTC [fsblkstorage] waitForBlock -> DEBU 11e8 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:25.153 UTC [common.deliver] Handle -> DEBU 11e9 Waiting for new SeekInfo from 192.168.240.9:47502" -orderer0.example.com | "2019-05-02 01:31:25.159 UTC [common.deliver] Handle -> DEBU 11ea Attempting to read seek info message from 192.168.240.9:47502" -orderer0.example.com | "2019-05-02 01:31:25.161 UTC [grpc] warningf -> DEBU 11eb transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.2:7050->192.168.240.9:47502: read: connection reset by peer" -orderer0.example.com | "2019-05-02 01:31:25.163 UTC [common.deliver] Handle -> WARN 11ec Error reading from 192.168.240.9:47502: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:25.163 UTC [orderer.common.server] func1 -> DEBU 11ed Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:25.163 UTC [comm.grpc.server] 1 -> INFO 11ee streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47502 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=46.8627ms -orderer0.example.com | "2019-05-02 01:31:25.164 UTC [grpc] infof -> DEBU 11ef transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:25.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f0 Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" -orderer0.example.com | "2019-05-02 01:31:25.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82µs " -orderer0.example.com | "2019-05-02 01:31:25.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:25.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:25.547 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f4 Sending msg of 28 bytes to 3 on channel testchainid took 19µs" -orderer0.example.com | "2019-05-02 01:31:25.547 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114µs " -orderer0.example.com | "2019-05-02 01:31:25.549 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 587.4µs " -orderer0.example.com | "2019-05-02 01:31:25.554 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:25.555 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f8 Sending msg of 28 bytes to 3 on channel businesschannel took 6.5538ms" -orderer0.example.com | "2019-05-02 01:31:25.600 UTC [orderer.common.server] Deliver -> DEBU 11f9 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:25.601 UTC [common.deliver] Handle -> DEBU 11fa Starting new deliver loop for 192.168.240.9:47504" -orderer0.example.com | "2019-05-02 01:31:25.602 UTC [common.deliver] Handle -> DEBU 11fb Attempting to read seek info message from 192.168.240.9:47504" -orderer0.example.com | "2019-05-02 01:31:25.611 UTC [policies] Evaluate -> DEBU 11fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:25.612 UTC [policies] Evaluate -> DEBU 11fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:25.612 UTC [policies] Evaluate -> DEBU 11fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:25.613 UTC [policies] Evaluate -> DEBU 11ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:25.614 UTC [policies] Evaluate -> DEBU 1200 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:25.614 UTC [cauthdsl] func1 -> DEBU 1201 0xc000bf0920 gate 1556760685614674700 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:25.615 UTC [cauthdsl] func2 -> DEBU 1202 0xc000bf0920 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:25.615 UTC [cauthdsl] func2 -> DEBU 1203 0xc000bf0920 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:25.616 UTC [cauthdsl] func2 -> DEBU 1204 0xc000bf0920 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:25.616 UTC [msp.identity] Verify -> DEBU 1205 Verify: digest = 00000000 32 62 9b 7e 14 ea 59 00 b8 da d3 7f 1c 68 25 66 |2b.~..Y......h%f| -orderer0.example.com | 00000010 60 35 6d 30 4e c1 88 e5 3c aa 64 e6 3c b6 1b 92 |`5m0N...<.d.<...|" -orderer0.example.com | "2019-05-02 01:31:25.617 UTC [msp.identity] Verify -> DEBU 1206 Verify: sig = 00000000 30 44 02 20 48 df c8 cf 66 1d 4b dd 3c c8 16 27 |0D. H...f.K.<..'| -orderer0.example.com | 00000010 6d 3d 96 b0 18 52 a8 8f e6 39 27 b3 3d 09 84 47 |m=...R...9'.=..G| -orderer0.example.com | 00000020 a1 5b 6a 6a 02 20 49 24 80 be dc c7 3a cb 1a 64 |.[jj. I$....:..d| -orderer0.example.com | 00000030 f1 3b bf e1 17 e7 2c 20 e5 e2 f2 06 17 e5 4c d4 |.;...., ......L.| -orderer0.example.com | 00000040 0e 2b b6 cb 97 57 |.+...W|" -orderer0.example.com | "2019-05-02 01:31:25.618 UTC [cauthdsl] func2 -> DEBU 1207 0xc000bf0920 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:25.621 UTC [cauthdsl] func1 -> DEBU 1208 0xc000bf0920 gate 1556760685614674700 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:25.626 UTC [policies] Evaluate -> DEBU 1209 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.731 UTC [protoutils] validateEndorserTransaction -> DEBU 109e validateEndorserTransaction starts for data 0xc0024e4a80, header channel_header:"\010\003\032\014\010\317\220\251\346\005\020\300\201\222\370\001\"\017businesschannel*@48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\305'\350\322\200\365\337\227\274\345\207\266\273\335\365\301l\024\321\244\226\224\302\320" " -peer0.org1.example.com | "2019-05-02 01:30:57.731 UTC [protoutils] validateEndorserTransaction -> DEBU 109f validateEndorserTransaction info: there are 1 actions" -peer0.org1.example.com | "2019-05-02 01:30:57.732 UTC [protoutils] validateEndorserTransaction -> DEBU 10a0 validateEndorserTransaction info: signature header is valid" -peer0.org1.example.com | "2019-05-02 01:30:57.732 UTC [protoutils] ValidateTransaction -> DEBU 10a1 ValidateTransactionEnvelope returns err %!s()" -peer0.org1.example.com | "2019-05-02 01:30:57.732 UTC [committer.txvalidator] validateTx -> DEBU 10a2 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:30:57.732 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 10a3 retrieveTransactionByID() - txId = [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -peer0.org1.example.com | "2019-05-02 01:30:57.732 UTC [committer.txvalidator] validateTx -> DEBU 10a4 Validating transaction with plugins" -peer0.org1.example.com | "2019-05-02 01:30:57.732 UTC [committer.txvalidator] Dispatch -> DEBU 10a5 [businesschannel] Dispatch starts for bytes 0xc0024e7000" -peer0.org1.example.com | "2019-05-02 01:30:57.733 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10a6 constructing new query executor txid = [fc9ceeca-e279-4291-8758-91189b55aa5c]" -peer0.org1.example.com | "2019-05-02 01:30:57.744 UTC [lockbasedtxmgr] Done -> DEBU 10a7 Done with transaction simulation / query execution [fc9ceeca-e279-4291-8758-91189b55aa5c]" -peer0.org1.example.com | "2019-05-02 01:30:57.745 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 10a8 Validating Tx 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" -peer0.org1.example.com | "2019-05-02 01:30:57.746 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10a9 constructing new query executor txid = [16b7dad7-4dc3-45a4-b784-a097ca37e27f]" -peer0.org1.example.com | "2019-05-02 01:30:57.746 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10aa retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:30:57.746 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10ab retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:30:57.746 UTC [lockbasedtxmgr] Done -> DEBU 10ac Done with transaction simulation / query execution [16b7dad7-4dc3-45a4-b784-a097ca37e27f]" -peer0.org1.example.com | "2019-05-02 01:30:57.747 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10ad constructing new query executor txid = [2ca05bb8-7138-47db-8b8c-11c85f209186]" -peer0.org1.example.com | "2019-05-02 01:30:57.748 UTC [lockbasedtxmgr] Done -> DEBU 10ae Done with transaction simulation / query execution [2ca05bb8-7138-47db-8b8c-11c85f209186]" -peer0.org1.example.com | "2019-05-02 01:30:57.748 UTC [policies] Evaluate -> DEBU 10af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" -peer0.org1.example.com | "2019-05-02 01:30:57.748 UTC [msp] DeserializeIdentity -> DEBU 10b0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.751 UTC [msp.identity] newIdentity -> DEBU 10b1 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:30:57.751 UTC [cauthdsl] func1 -> DEBU 10b2 0xc002505cc0 gate 1556760657751922300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:57.752 UTC [cauthdsl] func2 -> DEBU 10b3 0xc002505cc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:57.752 UTC [cauthdsl] func2 -> DEBU 10b4 0xc002505cc0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:57.752 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 10b5 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:30:57.752 UTC [msp] Validate -> DEBU 10b6 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:30:57.752 UTC [msp] getCertificationChain -> DEBU 10b7 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:30:57.752 UTC [cauthdsl] func2 -> DEBU 10b8 0xc002505cc0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:57.752 UTC [msp.identity] Verify -> DEBU 10b9 Verify: digest = 00000000 4a cd 6b 26 8f 2d e2 70 d1 19 d6 b8 fe d7 ea 56 |J.k&.-.p.......V| -peer0.org1.example.com | 00000010 26 f0 b7 65 9d f2 bd 04 51 1d d4 d5 73 bf b4 db |&..e....Q...s...|" -peer0.org1.example.com | "2019-05-02 01:30:57.752 UTC [msp.identity] Verify -> DEBU 10ba Verify: sig = 00000000 30 45 02 21 00 9d 68 5c ad f9 f4 78 69 0e 1f 5b |0E.!..h\...xi..[| -peer0.org1.example.com | 00000010 53 a8 3e 01 03 3a c6 cb 9e a1 fc 18 a2 ef 63 c5 |S.>..:........c.| -peer0.org1.example.com | 00000020 85 5d 17 ff e6 02 20 31 d4 dd 9c 26 b8 92 b9 bf |.].... 1...&....| -peer0.org1.example.com | 00000030 85 00 66 92 5f 15 d1 59 b4 d7 cb fc 5f 87 a1 94 |..f._..Y...._...| -orderer0.example.com | "2019-05-02 01:31:25.627 UTC [policies] Evaluate -> DEBU 120a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:25.627 UTC [policies] Evaluate -> DEBU 120b Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:25.628 UTC [policies] Evaluate -> DEBU 120c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:25.629 UTC [policies] Evaluate -> DEBU 120d Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:25.630 UTC [policies] Evaluate -> DEBU 120e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:25.630 UTC [common.deliver] deliverBlocks -> DEBU 120f [channel: businesschannel] Received seekInfo (0xc00017ef40) start: > stop: > from 192.168.240.9:47504" -orderer0.example.com | "2019-05-02 01:31:25.631 UTC [fsblkstorage] Next -> DEBU 1210 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -orderer0.example.com | "2019-05-02 01:31:25.632 UTC [fsblkstorage] newBlockfileStream -> DEBU 1211 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94616]" -orderer0.example.com | "2019-05-02 01:31:25.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1212 Remaining bytes=[4050], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:25.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1213 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[94616], bytesOffset=[94618]}" -orderer0.example.com | "2019-05-02 01:31:25.633 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1214 blockbytes [4048] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:25.633 UTC [common.deliver] deliverBlocks -> DEBU 1215 [channel: businesschannel] Delivering block [8] for (0xc00017ef40) for 192.168.240.9:47504" -orderer0.example.com | "2019-05-02 01:31:25.634 UTC [common.deliver] deliverBlocks -> DEBU 1216 [channel: businesschannel] Done delivering to 192.168.240.9:47504 for (0xc00017ef40)" -orderer0.example.com | "2019-05-02 01:31:25.635 UTC [fsblkstorage] waitForBlock -> DEBU 1217 Came out of wait. maxAvailaBlockNumber=[8]" -orderer0.example.com | "2019-05-02 01:31:25.635 UTC [fsblkstorage] waitForBlock -> DEBU 1218 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -orderer0.example.com | "2019-05-02 01:31:25.636 UTC [common.deliver] Handle -> DEBU 1219 Waiting for new SeekInfo from 192.168.240.9:47504" -orderer0.example.com | "2019-05-02 01:31:25.645 UTC [common.deliver] Handle -> DEBU 121b Attempting to read seek info message from 192.168.240.9:47504" -orderer0.example.com | "2019-05-02 01:31:25.643 UTC [grpc] infof -> DEBU 121a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:25.647 UTC [common.deliver] Handle -> WARN 121c Error reading from 192.168.240.9:47504: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:25.648 UTC [orderer.common.server] func1 -> DEBU 121d Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:25.649 UTC [comm.grpc.server] 1 -> INFO 121e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47504 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=49.2001ms -orderer0.example.com | "2019-05-02 01:31:26.048 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 121f Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs" -orderer0.example.com | "2019-05-02 01:31:26.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1220 Sending msg of 28 bytes to 3 on channel businesschannel took 354.5µs" -orderer0.example.com | "2019-05-02 01:31:26.056 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1221 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1873ms " -orderer0.example.com | "2019-05-02 01:31:26.058 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1222 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 510.3µs " -orderer0.example.com | "2019-05-02 01:31:26.059 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1223 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:26.171 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1225 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:26.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1224 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:26.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1226 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" -orderer0.example.com | "2019-05-02 01:31:26.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1227 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.8µs " -orderer0.example.com | "2019-05-02 01:31:26.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1228 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:26.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1229 Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs" -orderer0.example.com | "2019-05-02 01:31:26.547 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191µs " -orderer0.example.com | "2019-05-02 01:31:26.551 UTC [orderer.common.server] Deliver -> DEBU 122b Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:26.552 UTC [common.deliver] Handle -> DEBU 122c Starting new deliver loop for 192.168.240.9:47506" -orderer0.example.com | "2019-05-02 01:31:26.553 UTC [common.deliver] Handle -> DEBU 122d Attempting to read seek info message from 192.168.240.9:47506" -orderer0.example.com | "2019-05-02 01:31:26.557 UTC [policies] Evaluate -> DEBU 122e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:26.559 UTC [policies] Evaluate -> DEBU 122f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:26.561 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" -orderer0.example.com | "2019-05-02 01:31:26.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1231 Sending msg of 28 bytes to 3 on channel businesschannel took 47µs" -orderer0.example.com | "2019-05-02 01:31:26.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1232 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3874ms " -orderer0.example.com | "2019-05-02 01:31:26.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1233 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.2µs " -orderer0.example.com | "2019-05-02 01:31:26.560 UTC [policies] Evaluate -> DEBU 1234 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:26.573 UTC [policies] Evaluate -> DEBU 1235 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:26.573 UTC [policies] Evaluate -> DEBU 1236 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -peer0.org1.example.com | 00000040 ce d3 41 72 f2 0a 69 |..Ar..i|" -peer0.org1.example.com | "2019-05-02 01:30:57.752 UTC [cauthdsl] func2 -> DEBU 10bb 0xc002505cc0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:57.753 UTC [cauthdsl] func1 -> DEBU 10bc 0xc002505cc0 gate 1556760657751922300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:57.753 UTC [policies] Evaluate -> DEBU 10bd Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:57.753 UTC [policies] Evaluate -> DEBU 10be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10bf constructing new query executor txid = [59808426-849f-42d5-a53e-74bc93d1f6de]" -peer0.org1.example.com | "2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c0 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c1 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] Done -> DEBU 10c2 Done with transaction simulation / query execution [59808426-849f-42d5-a53e-74bc93d1f6de]" -peer0.org1.example.com | "2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10c3 constructing new query executor txid = [107ff958-d74b-4821-a477-cb2dffc6e3c5]" -peer0.org1.example.com | "2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c4 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c5 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] Done -> DEBU 10c6 Done with transaction simulation / query execution [107ff958-d74b-4821-a477-cb2dffc6e3c5]" -peer0.org1.example.com | "2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10c7 constructing new query executor txid = [f588474e-ffb2-458f-8d4f-4bddbcb462f6]" -peer0.org1.example.com | "2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c8 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c9 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] Done -> DEBU 10ca Done with transaction simulation / query execution [f588474e-ffb2-458f-8d4f-4bddbcb462f6]" -peer0.org1.example.com | "2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10cb constructing new query executor txid = [5a45630f-6eb2-4bba-a394-f525d55e9821]" -peer0.org1.example.com | "2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10cc retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10cd retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] Done -> DEBU 10ce Done with transaction simulation / query execution [5a45630f-6eb2-4bba-a394-f525d55e9821]" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10cf constructing new query executor txid = [8cc13e79-a77b-49f3-ac16-a26deac5a1fa]" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10d0 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10d1 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] Done -> DEBU 10d2 Done with transaction simulation / query execution [8cc13e79-a77b-49f3-ac16-a26deac5a1fa]" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [vscc] Validate -> DEBU 10d3 block 3, namespace: _lifecycle, tx 0 validation results is: " -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 10d4 Transaction 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a appears to be valid" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [committer.txvalidator] Dispatch -> DEBU 10d5 [businesschannel] Dispatch completes env bytes 0xc0024e7000" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [committer.txvalidator] validateTx -> DEBU 10d6 [businesschannel] validateTx completes for block 0xc002f8f240 env 0xc002759cc0 txn 0" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [committer.txvalidator] Validate -> DEBU 10d7 got result for idx 0, code 0" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [committer.txvalidator] Validate -> INFO 10d8 [businesschannel] Validated block [3] in 67ms" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10d9 constructing new query executor txid = [1da88cc2-95a1-4b84-a626-40feada40649]" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] Done -> DEBU 10da Done with transaction simulation / query execution [1da88cc2-95a1-4b84-a626-40feada40649]" -peer0.org1.example.com | "2019-05-02 01:30:57.755 UTC [msp] GetManagerForChain -> DEBU 10db Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [cauthdsl] func1 -> DEBU 10dc 0xc002670fe0 gate 1556760657755994800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [cauthdsl] func2 -> DEBU 10dd 0xc002670fe0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [cauthdsl] func2 -> DEBU 10de 0xc002670fe0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [cauthdsl] func2 -> DEBU 10df 0xc002670fe0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [msp.identity] Verify -> DEBU 10e0 Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... | -orderer0.example.com | "2019-05-02 01:31:26.573 UTC [msp] DeserializeIdentity -> DEBU 1237 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:26.575 UTC [msp.identity] newIdentity -> DEBU 1238 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [gossip.comm] Send -> DEBU ddf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU de0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU de1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.000 UTC [gossip.comm] Send -> DEBU de2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU de3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU de4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [msp] DeserializeIdentity -> DEBU de6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [msp] DeserializeIdentity -> DEBU de7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [gossip.comm] Send -> DEBU de8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU de9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU dea Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU deb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU dec Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [gossip.pull] Hello -> DEBU ded Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU dee Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU def Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [gossip.comm] Send -> DEBU df0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.002 UTC [gossip.comm] sendToEndpoint -> DEBU df1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:28.984 UTC [cauthdsl] func2 -> DEBU de5 0xc002e8f1a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU df9 0xc002e8f1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU dfa 0xc002e8f1a0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func1 -> DEBU dfb 0xc002e8f1a0 gate 1556789248984776100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU dfc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU dfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func1 -> DEBU dff 0xc002ee18e0 gate 1556789249006327800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e00 0xc002ee18e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e01 0xc002ee18e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e02 0xc002ee18e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [msp.identity] Verify -> DEBU e03 Verify: digest = 00000000 d8 f9 0e bd 68 6e 1a 4a 12 ec 46 67 33 c4 7a 02 |....hn.J..Fg3.z.| +peer0.org1.example.com | 00000010 d0 0a 4f a1 03 5c 97 07 b9 09 62 9a fd a8 c7 1c |..O..\....b.....|" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [msp.identity] Verify -> DEBU e04 Verify: sig = 00000000 30 45 02 21 00 c8 30 00 df a5 c2 f9 ca a5 83 8e |0E.!..0.........| +peer0.org1.example.com | 00000010 66 8e 1f 1e 74 e6 b1 d9 33 a2 b1 8f 58 fc eb 27 |f...t...3...X..'| +peer0.org1.example.com | 00000020 48 46 e0 63 9c 02 20 29 e3 b8 08 f6 9f ea f0 00 |HF.c.. )........| +peer0.org1.example.com | 00000030 e2 15 27 ef 93 0d 0a 20 18 d8 47 bf 54 fc 59 1f |..'.... ..G.T.Y.| +peer0.org1.example.com | 00000040 79 3a eb 38 d5 32 d6 |y:.8.2.|" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [gossip.gossip] handleMessage -> DEBU e05 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e06 0xc002ee18e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [cauthdsl] func1 -> DEBU e07 0xc002ee18e0 gate 1556789249006327800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e0b Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:52.491 UTC [cauthdsl] func1 -> DEBU f4a 0xc000c5d630 gate 1556789272491766100 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:52.492 UTC [cauthdsl] func2 -> DEBU f4b 0xc000c5d630 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:52.492 UTC [cauthdsl] func2 -> DEBU f4c 0xc000c5d630 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:52.493 UTC [cauthdsl] func2 -> DEBU f4d 0xc000c5d630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:52.493 UTC [cauthdsl] func2 -> DEBU f4e 0xc000c5d630 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.494 UTC [cauthdsl] func1 -> DEBU f4f 0xc000c5d630 gate 1556789272491766100 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.494 UTC [policies] Evaluate -> DEBU f50 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.494 UTC [policies] Evaluate -> DEBU f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.494 UTC [policies] Evaluate -> DEBU f52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.495 UTC [cauthdsl] func1 -> DEBU f53 0xc000b88770 gate 1556789272495359700 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:52.495 UTC [cauthdsl] func2 -> DEBU f54 0xc000b88770 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:52.495 UTC [cauthdsl] func2 -> DEBU f55 0xc000b88770 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:52.496 UTC [cauthdsl] func2 -> DEBU f56 0xc000b88770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:52.496 UTC [cauthdsl] func2 -> DEBU f57 0xc000b88770 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.496 UTC [cauthdsl] func1 -> DEBU f58 0xc000b88770 gate 1556789272495359700 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.497 UTC [policies] Evaluate -> DEBU f59 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.497 UTC [policies] Evaluate -> DEBU f5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.498 UTC [policies] func1 -> DEBU f5b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:52.499 UTC [policies] Evaluate -> DEBU f5c Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:52.499 UTC [policies] Evaluate -> DEBU f5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:52.499 UTC [policies] Evaluate -> DEBU f5e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.500 UTC [policies] Evaluate -> DEBU f5f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:52.500 UTC [policies] Evaluate -> DEBU f60 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.501 UTC [cauthdsl] func1 -> DEBU f61 0xc000b89480 gate 1556789272500902900 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:52.501 UTC [cauthdsl] func2 -> DEBU f62 0xc000b89480 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:52.501 UTC [cauthdsl] func2 -> DEBU f63 0xc000b89480 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:52.501 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU f64 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:52.501 UTC [msp] Validate -> DEBU f65 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:52.502 UTC [cauthdsl] func2 -> DEBU f66 0xc000b89480 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:52.502 UTC [msp.identity] Verify -> DEBU f67 Verify: digest = 00000000 aa 2a aa ac 5f 58 db 10 7a 6b fc 41 0c a7 56 fb |.*.._X..zk.A..V.| +orderer0.example.com | 00000010 c6 ae 5c cc 06 8c 4d 21 df 90 b4 b1 59 5b 03 64 |..\...M!....Y[.d|" +orderer0.example.com | "2019-05-02 09:27:52.502 UTC [msp.identity] Verify -> DEBU f68 Verify: sig = 00000000 30 44 02 20 56 3e 60 41 52 6c e3 38 cc 81 e4 fc |0D. V>`ARl.8....| +orderer0.example.com | 00000010 6b 85 79 6f e2 ea df f2 38 5e 44 22 6b cc ca 09 |k.yo....8^D"k...| +orderer0.example.com | 00000020 e3 a3 09 6e 02 20 7a 91 90 c9 79 b5 e7 1b 0e 15 |...n. z...y.....| +orderer0.example.com | 00000030 88 bf c1 4e 3f da 66 b6 7c 82 16 4a d7 fd 08 d8 |...N?.f.|..J....| +orderer0.example.com | 00000040 9d 6e 2f 73 05 68 |.n/s.h|" +orderer0.example.com | "2019-05-02 09:27:52.509 UTC [cauthdsl] func2 -> DEBU f69 0xc000b89480 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:52.509 UTC [cauthdsl] func1 -> DEBU f6a 0xc000b89480 gate 1556789272500902900 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:52.509 UTC [policies] Evaluate -> DEBU f6b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:52.510 UTC [policies] Evaluate -> DEBU f6c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:52.510 UTC [policies] Evaluate -> DEBU f6d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:52.511 UTC [policies] Evaluate -> DEBU f6e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:52.511 UTC [policies] Evaluate -> DEBU f6f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:52.511 UTC [policies] Evaluate -> DEBU f70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:52.512 UTC [common.deliver] deliverBlocks -> DEBU f71 [channel: businesschannel] Received seekInfo (0xc00102bac0) start: > stop: > from 172.18.0.8:57352" +orderer0.example.com | "2019-05-02 09:27:52.513 UTC [fsblkstorage] Next -> DEBU f72 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:52.513 UTC [fsblkstorage] newBlockfileStream -> DEBU f73 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]" +orderer0.example.com | "2019-05-02 09:27:52.514 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f74 Remaining bytes=[4051], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:52.514 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f75 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}" +orderer0.example.com | "2019-05-02 09:27:52.514 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f76 blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:52.515 UTC [common.deliver] deliverBlocks -> DEBU f77 [channel: businesschannel] Delivering block [8] for (0xc00102bac0) for 172.18.0.8:57352" +orderer0.example.com | "2019-05-02 09:27:52.533 UTC [common.deliver] deliverBlocks -> DEBU f78 [channel: businesschannel] Done delivering to 172.18.0.8:57352 for (0xc00102bac0)" +orderer0.example.com | "2019-05-02 09:27:52.534 UTC [common.deliver] Handle -> DEBU f79 Waiting for new SeekInfo from 172.18.0.8:57352" +orderer0.example.com | "2019-05-02 09:27:52.534 UTC [common.deliver] Handle -> DEBU f7a Attempting to read seek info message from 172.18.0.8:57352" +orderer0.example.com | "2019-05-02 09:27:52.538 UTC [common.deliver] Handle -> WARN f7b Error reading from 172.18.0.8:57352: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:52.538 UTC [orderer.common.server] func1 -> DEBU f7c Closing Deliver stream" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e0c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [gossip.discovery] handleAliveMessage -> DEBU e0d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [gossip.gossip] handleMessage -> DEBU e0a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.006 UTC [gossip.discovery] learnExistingMembers -> DEBU e0e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e0f updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 " +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e10 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 " +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e11 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e12 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] handleAliveMessage -> DEBU e13 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU e14 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e15 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] sendMemResponse -> DEBU e16 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e17 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e18 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e19 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e1a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.comm] Send -> DEBU e1b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.discovery] sendMemResponse -> DEBU e1c Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.comm] sendToEndpoint -> DEBU e1d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [gossip.comm] sendToEndpoint -> DEBU e1e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e1f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.008 UTC [gossip.gossip] handleMessage -> DEBU e20 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.012 UTC [gossip.comm] func1 -> DEBU e21 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.009 UTC [gossip.gossip] handleMessage -> DEBU e22 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.013 UTC [gossip.gossip] handleMessage -> DEBU e23 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.013 UTC [gossip.gossip] handleMessage -> DEBU e24 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.013 UTC [gossip.discovery] handleMsgFromComm -> DEBU e25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU e26 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.014 UTC [msp] DeserializeIdentity -> DEBU e27 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.014 UTC [msp] DeserializeIdentity -> DEBU e28 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.014 UTC [gossip.gossip] handleMessage -> DEBU e29 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.014 UTC [gossip.gossip] handleMessage -> DEBU e2a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [gossip.comm] func1 -> DEBU e2b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [gossip.pull] HandleMessage -> DEBU e2c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [gossip.pull] SendDigest -> DEBU e2d Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [gossip.gossip] handleMessage -> DEBU e2e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [gossip.gossip] handleMessage -> DEBU e2f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [msp] DeserializeIdentity -> DEBU e30 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.020 UTC [msp] DeserializeIdentity -> DEBU e31 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.021 UTC [msp] DeserializeIdentity -> DEBU e32 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:52.538 UTC [comm.grpc.server] 1 -> INFO f7d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57352 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=50.4727ms +orderer0.example.com | "2019-05-02 09:27:52.539 UTC [grpc] infof -> DEBU f7e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:52.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:52.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f80 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +orderer0.example.com | "2019-05-02 09:27:52.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU f81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 715.1µs " +orderer0.example.com | "2019-05-02 09:27:52.746 UTC [orderer.common.server] Deliver -> DEBU f82 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:52.746 UTC [common.deliver] Handle -> DEBU f83 Starting new deliver loop for 172.18.0.8:57354" +orderer0.example.com | "2019-05-02 09:27:52.746 UTC [common.deliver] Handle -> DEBU f84 Attempting to read seek info message from 172.18.0.8:57354" +orderer0.example.com | "2019-05-02 09:27:52.749 UTC [policies] Evaluate -> DEBU f85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.749 UTC [policies] Evaluate -> DEBU f86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:52.749 UTC [policies] Evaluate -> DEBU f87 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.754 UTC [policies] Evaluate -> DEBU f88 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:52.755 UTC [policies] Evaluate -> DEBU f89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.756 UTC [cauthdsl] func1 -> DEBU f8a 0xc000b937b0 gate 1556789272756392300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:52.757 UTC [cauthdsl] func2 -> DEBU f8b 0xc000b937b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:52.757 UTC [cauthdsl] func2 -> DEBU f8c 0xc000b937b0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:52.758 UTC [cauthdsl] func2 -> DEBU f8d 0xc000b937b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:52.758 UTC [cauthdsl] func2 -> DEBU f8e 0xc000b937b0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.759 UTC [cauthdsl] func1 -> DEBU f8f 0xc000b937b0 gate 1556789272756392300 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.760 UTC [policies] Evaluate -> DEBU f90 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.760 UTC [policies] Evaluate -> DEBU f91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.761 UTC [policies] Evaluate -> DEBU f92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.761 UTC [cauthdsl] func1 -> DEBU f93 0xc000b93ff0 gate 1556789272761807700 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:52.763 UTC [cauthdsl] func2 -> DEBU f94 0xc000b93ff0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:52.765 UTC [cauthdsl] func2 -> DEBU f95 0xc000b93ff0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:52.767 UTC [cauthdsl] func2 -> DEBU f96 0xc000b93ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:52.768 UTC [cauthdsl] func2 -> DEBU f97 0xc000b93ff0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.770 UTC [cauthdsl] func1 -> DEBU f98 0xc000b93ff0 gate 1556789272761807700 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.774 UTC [policies] Evaluate -> DEBU f99 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.775 UTC [policies] Evaluate -> DEBU f9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.776 UTC [policies] func1 -> DEBU f9b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU f9c Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:52.778 UTC [policies] Evaluate -> DEBU f9d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:52.778 UTC [policies] Evaluate -> DEBU f9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.779 UTC [policies] Evaluate -> DEBU f9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:52.779 UTC [policies] Evaluate -> DEBU fa0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.779 UTC [cauthdsl] func1 -> DEBU fa1 0xc0008aece0 gate 1556789272779495000 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:52.779 UTC [cauthdsl] func2 -> DEBU fa2 0xc0008aece0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:52.780 UTC [cauthdsl] func2 -> DEBU fa3 0xc0008aece0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:52.789 UTC [cauthdsl] func2 -> DEBU fa4 0xc0008aece0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:52.791 UTC [msp.identity] Verify -> DEBU fa5 Verify: digest = 00000000 51 b5 59 49 8e 88 d2 29 bb 35 a7 3a cb 1a cd 85 |Q.YI...).5.:....| +orderer0.example.com | 00000010 63 9b 8d 93 72 30 ef c3 a6 7c 09 ce 62 06 95 9b |c...r0...|..b...|" +orderer0.example.com | "2019-05-02 09:27:52.791 UTC [msp.identity] Verify -> DEBU fa6 Verify: sig = 00000000 30 44 02 20 7f 7c 8d 61 da 00 c4 15 7c e1 1e 8b |0D. .|.a....|...| +orderer0.example.com | 00000010 2e f1 c8 8a 9a 56 aa b5 bd 74 56 b9 40 96 a7 ba |.....V...tV.@...| +orderer0.example.com | 00000020 0f ba f2 6c 02 20 50 97 b2 2d 85 a0 f5 b7 ca 97 |...l. P..-......| +orderer0.example.com | 00000030 77 42 f7 33 5e 86 61 14 70 1e 47 76 51 d2 ef 68 |wB.3^.a.p.GvQ..h| +orderer0.example.com | 00000040 0a 49 7e 6f af c6 |.I~o..|" +orderer0.example.com | "2019-05-02 09:27:52.792 UTC [cauthdsl] func2 -> DEBU fa7 0xc0008aece0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:52.792 UTC [cauthdsl] func1 -> DEBU fa8 0xc0008aece0 gate 1556789272779495000 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:52.793 UTC [policies] Evaluate -> DEBU fa9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:52.793 UTC [policies] Evaluate -> DEBU faa == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:52.795 UTC [policies] Evaluate -> DEBU fab Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:52.796 UTC [policies] Evaluate -> DEBU fac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:52.796 UTC [policies] Evaluate -> DEBU fad Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:29.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e34 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e35 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.023 UTC [policies] Evaluate -> DEBU e36 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e37 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func1 -> DEBU e39 0xc002f277c0 gate 1556789249024280700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3a 0xc002f277c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3b 0xc002f277c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3c 0xc002f277c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3d 0xc002f277c0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [cauthdsl] func1 -> DEBU e3e 0xc002f277c0 gate 1556789249024280700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e3f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e40 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func1 -> DEBU e42 0xc002f84000 gate 1556789249025055600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e43 0xc002f84000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e44 0xc002f84000 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e45 0xc002f84000 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [msp.identity] Verify -> DEBU e46 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [msp.identity] Verify -> DEBU e47 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e48 0xc002f84000 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.025 UTC [cauthdsl] func1 -> DEBU e49 0xc002f84000 gate 1556789249025055600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.027 UTC [msp.identity] Verify -> DEBU e4e Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +peer0.org1.example.com | "2019-05-02 09:27:29.027 UTC [msp.identity] Verify -> DEBU e4f Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|" +peer0.org1.example.com | "2019-05-02 09:27:29.033 UTC [msp.identity] Verify -> DEBU e50 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +peer0.org1.example.com | "2019-05-02 09:27:29.033 UTC [msp.identity] Verify -> DEBU e51 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU e52 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.034 UTC [msp] DeserializeIdentity -> DEBU e53 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.034 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e54 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e55 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e56 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [policies] Evaluate -> DEBU e57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [policies] Evaluate -> DEBU e58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [policies] Evaluate -> DEBU e59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.035 UTC [cauthdsl] func1 -> DEBU e5a 0xc00301a6a0 gate 1556789249035901200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5b 0xc00301a6a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5c 0xc00301a6a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5d 0xc00301a6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5e 0xc00301a6a0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func1 -> DEBU e5f 0xc00301a6a0 gate 1556789249035901200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e60 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e62 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func1 -> DEBU e63 0xc00301aee0 gate 1556789249036422100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e64 0xc00301aee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e65 0xc00301aee0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e66 0xc00301aee0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [msp.identity] Verify -> DEBU e67 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [msp.identity] Verify -> DEBU e68 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e69 0xc00301aee0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [cauthdsl] func1 -> DEBU e6a 0xc00301aee0 gate 1556789249036422100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.036 UTC [gossip.gossip] handleMessage -> DEBU e6f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [gossip.gossip] handleMessage -> DEBU e70 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8492395987397891600 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [gossip.pull] HandleMessage -> DEBU e71 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8492395987397891600 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-05-02 09:27:52.797 UTC [policies] Evaluate -> DEBU fae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:52.797 UTC [common.deliver] deliverBlocks -> DEBU faf [channel: businesschannel] Received seekInfo (0xc0010ce040) start: > stop: > from 172.18.0.8:57354" +orderer0.example.com | "2019-05-02 09:27:52.797 UTC [fsblkstorage] Next -> DEBU fb0 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:52.798 UTC [fsblkstorage] newBlockfileStream -> DEBU fb1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]" +orderer0.example.com | "2019-05-02 09:27:52.799 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fb2 Remaining bytes=[4051], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:52.799 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fb3 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}" +orderer0.example.com | "2019-05-02 09:27:52.799 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fb4 blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:52.799 UTC [common.deliver] deliverBlocks -> DEBU fb5 [channel: businesschannel] Delivering block [8] for (0xc0010ce040) for 172.18.0.8:57354" +orderer0.example.com | "2019-05-02 09:27:52.800 UTC [common.deliver] deliverBlocks -> DEBU fb6 [channel: businesschannel] Done delivering to 172.18.0.8:57354 for (0xc0010ce040)" +orderer0.example.com | "2019-05-02 09:27:52.800 UTC [common.deliver] Handle -> DEBU fb7 Waiting for new SeekInfo from 172.18.0.8:57354" +orderer0.example.com | "2019-05-02 09:27:52.801 UTC [common.deliver] Handle -> DEBU fb8 Attempting to read seek info message from 172.18.0.8:57354" +orderer0.example.com | "2019-05-02 09:27:52.802 UTC [policies] Evaluate -> DEBU fb9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.802 UTC [policies] Evaluate -> DEBU fba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:52.802 UTC [policies] Evaluate -> DEBU fbb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.803 UTC [policies] Evaluate -> DEBU fbc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:52.803 UTC [policies] Evaluate -> DEBU fbd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.803 UTC [cauthdsl] func1 -> DEBU fbe 0xc0008c48a0 gate 1556789272803415100 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:52.803 UTC [cauthdsl] func2 -> DEBU fbf 0xc0008c48a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:52.804 UTC [cauthdsl] func2 -> DEBU fc0 0xc0008c48a0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:52.804 UTC [cauthdsl] func2 -> DEBU fc1 0xc0008c48a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:52.804 UTC [cauthdsl] func2 -> DEBU fc2 0xc0008c48a0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.804 UTC [cauthdsl] func1 -> DEBU fc3 0xc0008c48a0 gate 1556789272803415100 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.805 UTC [policies] Evaluate -> DEBU fc4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.805 UTC [policies] Evaluate -> DEBU fc5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.805 UTC [policies] Evaluate -> DEBU fc6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.805 UTC [cauthdsl] func1 -> DEBU fc7 0xc0008c50e0 gate 1556789272805692300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:52.806 UTC [cauthdsl] func2 -> DEBU fc8 0xc0008c50e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:52.806 UTC [cauthdsl] func2 -> DEBU fc9 0xc0008c50e0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:52.806 UTC [cauthdsl] func2 -> DEBU fca 0xc0008c50e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:52.807 UTC [cauthdsl] func2 -> DEBU fcb 0xc0008c50e0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.807 UTC [cauthdsl] func1 -> DEBU fcc 0xc0008c50e0 gate 1556789272805692300 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:52.807 UTC [policies] Evaluate -> DEBU fcd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.807 UTC [policies] Evaluate -> DEBU fce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:52.807 UTC [policies] func1 -> DEBU fcf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:52.807 UTC [policies] Evaluate -> DEBU fd0 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:52.808 UTC [cauthdsl] func1 -> DEBU fd5 0xc0008c5dd0 gate 1556789272808840200 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:52.809 UTC [cauthdsl] func2 -> DEBU fd6 0xc0008c5dd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:52.809 UTC [cauthdsl] func2 -> DEBU fd7 0xc0008c5dd0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:52.809 UTC [cauthdsl] func2 -> DEBU fd8 0xc0008c5dd0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:52.809 UTC [msp.identity] Verify -> DEBU fd9 Verify: digest = 00000000 b3 8e c3 82 c2 85 96 25 36 01 25 77 f2 f7 6c aa |.......%6.%w..l.| +orderer0.example.com | 00000010 1d 66 b9 19 a2 e5 14 11 b0 fa 32 48 71 83 5e b1 |.f........2Hq.^.|" +orderer0.example.com | "2019-05-02 09:27:52.810 UTC [msp.identity] Verify -> DEBU fda Verify: sig = 00000000 30 44 02 20 1b d7 ab bd 8b 3a 80 39 6f c7 b9 1c |0D. .....:.9o...| +orderer0.example.com | 00000010 7a 29 f1 10 d3 81 06 56 5c 0a 1a 42 62 d5 17 a3 |z).....V\..Bb...| +orderer0.example.com | 00000020 ef de b2 4c 02 20 37 49 8c ac a6 12 e1 46 7f 03 |...L. 7I.....F..| +orderer0.example.com | 00000030 cb f4 65 3b 55 18 c7 78 3b 21 ab d2 a6 96 e9 bc |..e;U..x;!......| +orderer0.example.com | 00000040 ef a5 0b eb c8 b7 |......|" +orderer0.example.com | "2019-05-02 09:27:52.811 UTC [cauthdsl] func2 -> DEBU fdb 0xc0008c5dd0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:52.811 UTC [cauthdsl] func1 -> DEBU fdc 0xc0008c5dd0 gate 1556789272808840200 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:52.812 UTC [policies] Evaluate -> DEBU fdd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:52.812 UTC [policies] Evaluate -> DEBU fde == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:52.812 UTC [policies] Evaluate -> DEBU fdf Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [gossip.gossip] handleMessage -> DEBU e72 Exiting" +orderer0.example.com | "2019-05-02 09:27:52.813 UTC [policies] Evaluate -> DEBU fe0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:52.813 UTC [policies] Evaluate -> DEBU fe1 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:52.813 UTC [policies] Evaluate -> DEBU fe2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:52.817 UTC [common.deliver] deliverBlocks -> DEBU fe3 [channel: businesschannel] Received seekInfo (0xc0010ce500) start: > stop: > from 172.18.0.8:57354" +orderer0.example.com | "2019-05-02 09:27:52.819 UTC [fsblkstorage] Next -> DEBU fe4 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:52.826 UTC [fsblkstorage] newBlockfileStream -> DEBU fe5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47625]" +orderer0.example.com | "2019-05-02 09:27:52.827 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe6 Remaining bytes=[51040], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:52.831 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe7 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}" +orderer0.example.com | "2019-05-02 09:27:52.831 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe8 blockbytes [23742] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:52.832 UTC [common.deliver] deliverBlocks -> DEBU fe9 [channel: businesschannel] Delivering block [2] for (0xc0010ce500) for 172.18.0.8:57354" +orderer0.example.com | "2019-05-02 09:27:52.852 UTC [common.deliver] deliverBlocks -> DEBU fea [channel: businesschannel] Done delivering to 172.18.0.8:57354 for (0xc0010ce500)" +orderer0.example.com | "2019-05-02 09:27:52.853 UTC [common.deliver] Handle -> DEBU feb Waiting for new SeekInfo from 172.18.0.8:57354" +orderer0.example.com | "2019-05-02 09:27:52.854 UTC [common.deliver] Handle -> DEBU fec Attempting to read seek info message from 172.18.0.8:57354" +orderer0.example.com | "2019-05-02 09:27:52.865 UTC [grpc] infof -> DEBU fed transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:52.864 UTC [common.deliver] Handle -> WARN fee Error reading from 172.18.0.8:57354: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:52.870 UTC [orderer.common.server] func1 -> DEBU fef Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:52.872 UTC [comm.grpc.server] 1 -> INFO ff0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57354 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=126.0907ms +orderer0.example.com | "2019-05-02 09:27:52.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff1 Sending msg of 28 bytes to 2 on channel businesschannel took 91.8µs" +orderer0.example.com | "2019-05-02 09:27:52.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff2 Sending msg of 28 bytes to 3 on channel businesschannel took 44.7µs" +orderer0.example.com | "2019-05-02 09:27:52.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.2µs " +orderer0.example.com | "2019-05-02 09:27:52.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 886µs " +orderer0.example.com | "2019-05-02 09:27:52.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:52.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:53.043 UTC [orderer.common.server] Deliver -> DEBU ff7 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:53.044 UTC [common.deliver] Handle -> DEBU ff8 Starting new deliver loop for 172.18.0.8:57356" +orderer0.example.com | "2019-05-02 09:27:53.044 UTC [common.deliver] Handle -> DEBU ff9 Attempting to read seek info message from 172.18.0.8:57356" +orderer0.example.com | "2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.046 UTC [cauthdsl] func1 -> DEBU fff 0xc000f34a30 gate 1556789273046087700 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1000 0xc000f34a30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1001 0xc000f34a30 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1002 0xc000f34a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1003 0xc000f34a30 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.047 UTC [cauthdsl] func1 -> DEBU 1004 0xc000f34a30 gate 1556789273046087700 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.047 UTC [policies] Evaluate -> DEBU 1005 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.047 UTC [policies] Evaluate -> DEBU 1006 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.047 UTC [policies] Evaluate -> DEBU 1007 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.048 UTC [cauthdsl] func1 -> DEBU 1008 0xc000f35270 gate 1556789273048284900 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.048 UTC [cauthdsl] func2 -> DEBU 1009 0xc000f35270 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.048 UTC [cauthdsl] func2 -> DEBU 100a 0xc000f35270 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.048 UTC [cauthdsl] func2 -> DEBU 100b 0xc000f35270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:53.049 UTC [cauthdsl] func2 -> DEBU 100c 0xc000f35270 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.049 UTC [cauthdsl] func1 -> DEBU 100d 0xc000f35270 gate 1556789273048284900 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.049 UTC [policies] Evaluate -> DEBU 100e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.049 UTC [policies] Evaluate -> DEBU 100f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.050 UTC [policies] func1 -> DEBU 1010 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1011 Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [gossip.gossip] handleMessage -> DEBU e73 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [msp.identity] Verify -> DEBU e74 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [msp.identity] Verify -> DEBU e75 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU e76 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +peer0.org1.example.com | "2019-05-02 09:27:29.037 UTC [msp.identity] Verify -> DEBU e77 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|" +peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [msp] DeserializeIdentity -> DEBU e78 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [msp] DeserializeIdentity -> DEBU e79 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e7a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e7b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e7c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [policies] Evaluate -> DEBU e7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [policies] Evaluate -> DEBU e7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:29.038 UTC [policies] Evaluate -> DEBU e7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.039 UTC [cauthdsl] func1 -> DEBU e80 0xc003109c10 gate 1556789249039153200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.039 UTC [cauthdsl] func2 -> DEBU e81 0xc003109c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.039 UTC [cauthdsl] func2 -> DEBU e82 0xc003109c10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.040 UTC [cauthdsl] func2 -> DEBU e83 0xc003109c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:29.040 UTC [cauthdsl] func2 -> DEBU e84 0xc003109c10 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.040 UTC [cauthdsl] func1 -> DEBU e85 0xc003109c10 gate 1556789249039153200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.041 UTC [policies] Evaluate -> DEBU e86 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.041 UTC [policies] Evaluate -> DEBU e87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.041 UTC [policies] Evaluate -> DEBU e88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.042 UTC [cauthdsl] func1 -> DEBU e89 0xc0031c24e0 gate 1556789249042060500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.042 UTC [cauthdsl] func2 -> DEBU e8a 0xc0031c24e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [cauthdsl] func2 -> DEBU e8b 0xc0031c24e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [cauthdsl] func2 -> DEBU e8c 0xc0031c24e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [msp.identity] Verify -> DEBU e8d Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [msp.identity] Verify -> DEBU e8e Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [cauthdsl] func2 -> DEBU e8f 0xc0031c24e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [cauthdsl] func1 -> DEBU e90 0xc0031c24e0 gate 1556789249042060500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:29.043 UTC [policies] Evaluate -> DEBU e91 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e93 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [gossip.gossip] handleMessage -> DEBU e95 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [gossip.gossip] handleMessage -> DEBU e96 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [msp] DeserializeIdentity -> DEBU e97 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [msp] DeserializeIdentity -> DEBU e98 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [msp] DeserializeIdentity -> DEBU e99 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e9a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e9b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e9c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func1 -> DEBU ea0 0xc0032b4000 gate 1556789249044708600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea1 0xc0032b4000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea2 0xc0032b4000 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea3 0xc0032b4000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea4 0xc0032b4000 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [cauthdsl] func1 -> DEBU ea5 0xc0032b4000 gate 1556789249044708600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU ea6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU ea7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [policies] Evaluate -> DEBU ea8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [cauthdsl] func1 -> DEBU ea9 0xc0032b4870 gate 1556789249045052000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [cauthdsl] func2 -> DEBU eaa 0xc0032b4870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [cauthdsl] func2 -> DEBU eab 0xc0032b4870 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [cauthdsl] func2 -> DEBU eac 0xc0032b4870 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [msp.identity] Verify -> DEBU ead Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +peer0.org1.example.com | "2019-05-02 09:27:29.045 UTC [msp.identity] Verify -> DEBU eae Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|" +peer0.org1.example.com | "2019-05-02 09:27:29.046 UTC [cauthdsl] func2 -> DEBU eaf 0xc0032b4870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.046 UTC [cauthdsl] func1 -> DEBU eb0 0xc0032b4870 gate 1556789249045052000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:29.046 UTC [policies] Evaluate -> DEBU eb1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.046 UTC [policies] Evaluate -> DEBU eb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1012 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1013 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1014 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.051 UTC [policies] Evaluate -> DEBU 1015 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.051 UTC [cauthdsl] func1 -> DEBU 1016 0xc000f35f60 gate 1556789273051402800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.051 UTC [cauthdsl] func2 -> DEBU 1017 0xc000f35f60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.051 UTC [cauthdsl] func2 -> DEBU 1018 0xc000f35f60 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.052 UTC [cauthdsl] func2 -> DEBU 1019 0xc000f35f60 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:53.052 UTC [msp.identity] Verify -> DEBU 101a Verify: digest = 00000000 05 ae 83 a4 44 52 d3 78 63 72 e7 59 a1 ab 53 39 |....DR.xcr.Y..S9| +orderer0.example.com | 00000010 94 48 e0 b9 cd be 47 25 75 b7 70 be ae af 93 8c |.H....G%u.p.....|" +orderer0.example.com | "2019-05-02 09:27:53.052 UTC [msp.identity] Verify -> DEBU 101b Verify: sig = 00000000 30 45 02 21 00 e6 af 39 14 fe c2 7e 6f 26 79 e8 |0E.!...9...~o&y.| +orderer0.example.com | 00000010 7b 15 37 29 fd 0f ac ac eb a8 2f ef e5 9c 3c 66 |{.7)....../... DEBU 101c 0xc000f35f60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:53.053 UTC [cauthdsl] func1 -> DEBU 101d 0xc000f35f60 gate 1556789273051402800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:53.053 UTC [policies] Evaluate -> DEBU 101e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 101f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 1020 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 1021 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 1022 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:53.055 UTC [policies] Evaluate -> DEBU 1023 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:53.055 UTC [common.deliver] deliverBlocks -> DEBU 1024 [channel: businesschannel] Received seekInfo (0xc0010566c0) start: > stop: > from 172.18.0.8:57356" +orderer0.example.com | "2019-05-02 09:27:53.056 UTC [fsblkstorage] Next -> DEBU 1025 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:53.056 UTC [fsblkstorage] newBlockfileStream -> DEBU 1026 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:53.056 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1027 Remaining bytes=[98665], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:53.056 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1028 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:53.057 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1029 blockbytes [23935] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:53.057 UTC [common.deliver] deliverBlocks -> DEBU 102a [channel: businesschannel] Delivering block [0] for (0xc0010566c0) for 172.18.0.8:57356" +orderer0.example.com | "2019-05-02 09:27:53.058 UTC [common.deliver] deliverBlocks -> DEBU 102b [channel: businesschannel] Done delivering to 172.18.0.8:57356 for (0xc0010566c0)" +orderer0.example.com | "2019-05-02 09:27:53.058 UTC [common.deliver] Handle -> DEBU 102c Waiting for new SeekInfo from 172.18.0.8:57356" +orderer0.example.com | "2019-05-02 09:27:53.058 UTC [common.deliver] Handle -> DEBU 102d Attempting to read seek info message from 172.18.0.8:57356" +orderer0.example.com | "2019-05-02 09:27:53.068 UTC [common.deliver] Handle -> WARN 102e Error reading from 172.18.0.8:57356: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:53.068 UTC [orderer.common.server] func1 -> DEBU 102f Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:53.068 UTC [comm.grpc.server] 1 -> INFO 1030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57356 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.705ms +orderer0.example.com | "2019-05-02 09:27:53.068 UTC [grpc] infof -> DEBU 1031 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:53.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1032 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:53.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1033 Sending msg of 28 bytes to 3 on channel testchainid took 165.5µs" +orderer0.example.com | "2019-05-02 09:27:53.185 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1034 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.4µs " +orderer0.example.com | "2019-05-02 09:27:53.392 UTC [orderer.common.server] Deliver -> DEBU 1035 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:53.392 UTC [common.deliver] Handle -> DEBU 1036 Starting new deliver loop for 172.18.0.8:57358" +orderer0.example.com | "2019-05-02 09:27:53.392 UTC [common.deliver] Handle -> DEBU 1037 Attempting to read seek info message from 172.18.0.8:57358" +orderer0.example.com | "2019-05-02 09:27:53.394 UTC [policies] Evaluate -> DEBU 1038 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.394 UTC [policies] Evaluate -> DEBU 1039 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.394 UTC [policies] Evaluate -> DEBU 103a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.395 UTC [policies] Evaluate -> DEBU 103b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.395 UTC [policies] Evaluate -> DEBU 103c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.396 UTC [cauthdsl] func1 -> DEBU 103d 0xc000fd9ca0 gate 1556789273396195300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.396 UTC [cauthdsl] func2 -> DEBU 103e 0xc000fd9ca0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.396 UTC [cauthdsl] func2 -> DEBU 103f 0xc000fd9ca0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.397 UTC [cauthdsl] func2 -> DEBU 1040 0xc000fd9ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:53.398 UTC [cauthdsl] func2 -> DEBU 1041 0xc000fd9ca0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.046 UTC [policies] Evaluate -> DEBU eb3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [policies] Evaluate -> DEBU eb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [msp.identity] Verify -> DEBU eb5 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [msp.identity] Verify -> DEBU eb6 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|" +peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [msp] DeserializeIdentity -> DEBU eb7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [msp] DeserializeIdentity -> DEBU eb8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU eb9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU eba Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ebb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [policies] Evaluate -> DEBU ebc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.047 UTC [policies] Evaluate -> DEBU ebd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ebe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func1 -> DEBU ebf 0xc0032f4a10 gate 1556789249048050500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec0 0xc0032f4a10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec1 0xc0032f4a10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec2 0xc0032f4a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec3 0xc0032f4a10 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func1 -> DEBU ec4 0xc0032f4a10 gate 1556789249048050500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ec5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ec6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ec7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func1 -> DEBU ec8 0xc0032f5260 gate 1556789249048554900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec9 0xc0032f5260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU eca 0xc0032f5260 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ecb 0xc0032f5260 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [msp.identity] Verify -> DEBU ecc Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [msp.identity] Verify -> DEBU ecd Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +orderer0.example.com | "2019-05-02 09:27:53.398 UTC [cauthdsl] func1 -> DEBU 1042 0xc000fd9ca0 gate 1556789273396195300 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.399 UTC [policies] Evaluate -> DEBU 1043 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.399 UTC [policies] Evaluate -> DEBU 1044 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.399 UTC [policies] Evaluate -> DEBU 1045 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.400 UTC [cauthdsl] func1 -> DEBU 1046 0xc000d0a4e0 gate 1556789273400020500 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.400 UTC [cauthdsl] func2 -> DEBU 1047 0xc000d0a4e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.400 UTC [cauthdsl] func2 -> DEBU 1048 0xc000d0a4e0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.401 UTC [cauthdsl] func2 -> DEBU 1049 0xc000d0a4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:53.401 UTC [cauthdsl] func2 -> DEBU 104a 0xc000d0a4e0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.402 UTC [cauthdsl] func1 -> DEBU 104b 0xc000d0a4e0 gate 1556789273400020500 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.402 UTC [policies] Evaluate -> DEBU 104c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.402 UTC [policies] Evaluate -> DEBU 104d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.403 UTC [policies] func1 -> DEBU 104e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:53.403 UTC [policies] Evaluate -> DEBU 104f Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:53.404 UTC [policies] Evaluate -> DEBU 1050 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:53.404 UTC [policies] Evaluate -> DEBU 1051 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.404 UTC [policies] Evaluate -> DEBU 1052 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.405 UTC [policies] Evaluate -> DEBU 1053 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.405 UTC [cauthdsl] func1 -> DEBU 1054 0xc000d0b1d0 gate 1556789273405590800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.405 UTC [cauthdsl] func2 -> DEBU 1055 0xc000d0b1d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.406 UTC [cauthdsl] func2 -> DEBU 1056 0xc000d0b1d0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.406 UTC [cauthdsl] func2 -> DEBU 1057 0xc000d0b1d0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:53.407 UTC [msp.identity] Verify -> DEBU 1058 Verify: digest = 00000000 1c f0 80 02 d2 b9 a0 65 98 ce c4 1b 06 23 58 11 |.......e.....#X.| +orderer0.example.com | 00000010 e0 4e ed 3e 58 bb 81 f7 52 8f 0f fb e5 c8 69 b8 |.N.>X...R.....i.|" +orderer0.example.com | "2019-05-02 09:27:53.407 UTC [msp.identity] Verify -> DEBU 1059 Verify: sig = 00000000 30 44 02 20 74 de 2d 01 56 d5 d9 7c 3e e9 40 46 |0D. t.-.V..|>.@F| +orderer0.example.com | 00000010 8e db 34 ce 86 bc 54 ef cb 3b 92 25 c0 41 a1 3e |..4...T..;.%.A.>| +orderer0.example.com | 00000020 4d ed 6b 49 02 20 58 91 f9 da 3b 83 16 6a db 0a |M.kI. X...;..j..| +orderer0.example.com | 00000030 37 03 18 f9 16 27 f8 85 62 e2 9f 98 8e 3a d3 53 |7....'..b....:.S| +orderer0.example.com | 00000040 fd fd f6 41 ad a6 |...A..|" +orderer0.example.com | "2019-05-02 09:27:53.408 UTC [cauthdsl] func2 -> DEBU 105a 0xc000d0b1d0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:53.408 UTC [cauthdsl] func1 -> DEBU 105b 0xc000d0b1d0 gate 1556789273405590800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:53.409 UTC [policies] Evaluate -> DEBU 105c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:53.409 UTC [policies] Evaluate -> DEBU 105d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:53.410 UTC [policies] Evaluate -> DEBU 105e Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:53.410 UTC [policies] Evaluate -> DEBU 105f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:53.411 UTC [policies] Evaluate -> DEBU 1060 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:53.411 UTC [policies] Evaluate -> DEBU 1061 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:53.411 UTC [common.deliver] deliverBlocks -> DEBU 1062 [channel: businesschannel] Received seekInfo (0xc0010cf4c0) start: > stop: > from 172.18.0.8:57358" +orderer0.example.com | "2019-05-02 09:27:53.412 UTC [fsblkstorage] Next -> DEBU 1063 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:53.412 UTC [fsblkstorage] newBlockfileStream -> DEBU 1064 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23938]" +orderer0.example.com | "2019-05-02 09:27:53.413 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1065 Remaining bytes=[74727], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:53.413 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1066 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23938], bytesOffset=[23941]}" +orderer0.example.com | "2019-05-02 09:27:53.413 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1067 blockbytes [23684] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:53.414 UTC [common.deliver] deliverBlocks -> DEBU 1068 [channel: businesschannel] Delivering block [1] for (0xc0010cf4c0) for 172.18.0.8:57358" +orderer0.example.com | "2019-05-02 09:27:53.414 UTC [common.deliver] deliverBlocks -> DEBU 1069 [channel: businesschannel] Done delivering to 172.18.0.8:57358 for (0xc0010cf4c0)" +orderer0.example.com | "2019-05-02 09:27:53.415 UTC [common.deliver] Handle -> DEBU 106a Waiting for new SeekInfo from 172.18.0.8:57358" +orderer0.example.com | "2019-05-02 09:27:53.415 UTC [common.deliver] Handle -> DEBU 106b Attempting to read seek info message from 172.18.0.8:57358" +orderer0.example.com | "2019-05-02 09:27:53.425 UTC [common.deliver] Handle -> WARN 106c Error reading from 172.18.0.8:57358: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:53.425 UTC [orderer.common.server] func1 -> DEBU 106e Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:53.425 UTC [comm.grpc.server] 1 -> INFO 106f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57358 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5595ms +orderer0.example.com | "2019-05-02 09:27:53.425 UTC [grpc] infof -> DEBU 106d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:53.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1070 Sending msg of 28 bytes to 2 on channel businesschannel took 27.2µs" +orderer0.example.com | "2019-05-02 09:27:53.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1071 Sending msg of 28 bytes to 3 on channel businesschannel took 165µs" +orderer0.example.com | "2019-05-02 09:27:53.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1072 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " +orderer0.example.com | "2019-05-02 09:27:53.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1073 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.9µs " +orderer0.example.com | "2019-05-02 09:27:53.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1074 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:53.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1075 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:53.620 UTC [orderer.common.server] Deliver -> DEBU 1076 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:53.620 UTC [common.deliver] Handle -> DEBU 1077 Starting new deliver loop for 172.18.0.8:57360" +orderer0.example.com | "2019-05-02 09:27:53.620 UTC [common.deliver] Handle -> DEBU 1078 Attempting to read seek info message from 172.18.0.8:57360" +orderer0.example.com | "2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 1079 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 107a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 107b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 107c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.622 UTC [policies] Evaluate -> DEBU 107d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.623 UTC [cauthdsl] func1 -> DEBU 107e 0xc000d08eb0 gate 1556789273623226800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.623 UTC [cauthdsl] func2 -> DEBU 107f 0xc000d08eb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.623 UTC [cauthdsl] func2 -> DEBU 1080 0xc000d08eb0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.624 UTC [cauthdsl] func2 -> DEBU 1081 0xc000d08eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:53.624 UTC [cauthdsl] func2 -> DEBU 1082 0xc000d08eb0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.625 UTC [cauthdsl] func1 -> DEBU 1083 0xc000d08eb0 gate 1556789273623226800 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.625 UTC [policies] Evaluate -> DEBU 1084 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.626 UTC [policies] Evaluate -> DEBU 1085 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.626 UTC [policies] Evaluate -> DEBU 1086 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.626 UTC [cauthdsl] func1 -> DEBU 1087 0xc000d096f0 gate 1556789273626795400 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.627 UTC [cauthdsl] func2 -> DEBU 1088 0xc000d096f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.627 UTC [cauthdsl] func2 -> DEBU 1089 0xc000d096f0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.627 UTC [cauthdsl] func2 -> DEBU 108a 0xc000d096f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:53.628 UTC [cauthdsl] func2 -> DEBU 108b 0xc000d096f0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.629 UTC [cauthdsl] func1 -> DEBU 108c 0xc000d096f0 gate 1556789273626795400 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.630 UTC [policies] Evaluate -> DEBU 108d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.630 UTC [policies] Evaluate -> DEBU 108e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.631 UTC [policies] func1 -> DEBU 108f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:53.631 UTC [policies] Evaluate -> DEBU 1090 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:53.632 UTC [policies] Evaluate -> DEBU 1091 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:53.632 UTC [policies] Evaluate -> DEBU 1092 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.633 UTC [policies] Evaluate -> DEBU 1093 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.633 UTC [policies] Evaluate -> DEBU 1094 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.634 UTC [cauthdsl] func1 -> DEBU 1095 0xc0011dc3e0 gate 1556789273634532000 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.635 UTC [cauthdsl] func2 -> DEBU 1096 0xc0011dc3e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.635 UTC [cauthdsl] func2 -> DEBU 1097 0xc0011dc3e0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.636 UTC [cauthdsl] func2 -> DEBU 1098 0xc0011dc3e0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:53.636 UTC [msp.identity] Verify -> DEBU 1099 Verify: digest = 00000000 bb a9 95 be 70 7e b2 2c 1c 35 98 4d 7c 9f fd 22 |....p~.,.5.M|.."| +peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +orderer0.example.com | 00000010 4f 67 6f 27 ca cd 6b 62 12 c8 0d 84 4b a0 63 83 |Ogo'..kb....K.c.|" +peer0.org1.example.com | "2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ece 0xc0032f5260 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:53.637 UTC [msp.identity] Verify -> DEBU 109a Verify: sig = 00000000 30 45 02 21 00 b8 53 bc c1 d6 05 f0 ac a1 07 e4 |0E.!..S.........| +peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [cauthdsl] func1 -> DEBU ecf 0xc0032f5260 gate 1556789249048554900 evaluation succeeds" +orderer0.example.com | 00000010 2b 82 23 7f 00 39 71 d1 e2 3b 90 fd 0b 15 8d 4f |+.#..9q..;.....O| +peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | 00000020 5a 7c 13 89 5a 02 20 6d c0 0c 50 ae 8e c1 6e 78 |Z|..Z. m..P...nx| +peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | 00000030 d4 8f 75 f3 5e 0e 01 ba 71 30 60 77 26 28 d9 32 |..u.^...q0`w&(.2| +peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed2 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | 00000040 92 13 f4 88 3f d9 7d |....?.}|" +peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:53.638 UTC [cauthdsl] func2 -> DEBU 109b 0xc0011dc3e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [gossip.gossip] handleMessage -> DEBU ed4 Exiting" +orderer0.example.com | "2019-05-02 09:27:53.638 UTC [cauthdsl] func1 -> DEBU 109c 0xc0011dc3e0 gate 1556789273634532000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:29.049 UTC [gossip.gossip] handleMessage -> DEBU ed5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-05-02 09:27:53.638 UTC [policies] Evaluate -> DEBU 109d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.050 UTC [msp] DeserializeIdentity -> DEBU ed6 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:53.638 UTC [policies] Evaluate -> DEBU 109e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 109f Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.050 UTC [msp] DeserializeIdentity -> DEBU ed7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.051 UTC [msp] DeserializeIdentity -> DEBU ed8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.051 UTC [gossip.gossip] handleMessage -> DEBU ed9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.069 UTC [msp.identity] Sign -> DEBU eda Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151012 " +peer0.org1.example.com | "2019-05-02 09:27:29.069 UTC [msp.identity] Sign -> DEBU edb Sign: digest: 8BD10C6FF2C774C8C48607744594E8CA643A811FD742E827D44090B22C88A914 " +peer0.org1.example.com | "2019-05-02 09:27:29.070 UTC [msp.identity] Sign -> DEBU edc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:29.070 UTC [msp.identity] Sign -> DEBU edd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:29.071 UTC [gossip.discovery] periodicalSendAlive -> DEBU ede Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:29.076 UTC [msp] DeserializeIdentity -> DEBU edf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.077 UTC [msp] DeserializeIdentity -> DEBU ee0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.077 UTC [msp] DeserializeIdentity -> DEBU ee1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.077 UTC [gossip.comm] Send -> DEBU ee2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.077 UTC [msp] DeserializeIdentity -> DEBU ee3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.078 UTC [gossip.comm] Send -> DEBU ee4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.078 UTC [gossip.pull] Hello -> DEBU ee6 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:29.079 UTC [gossip.comm] sendToEndpoint -> DEBU ee8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.079 UTC [gossip.comm] sendToEndpoint -> DEBU ee9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.080 UTC [gossip.comm] Send -> DEBU eea Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.080 UTC [gossip.pull] Hello -> DEBU eeb Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:29.081 UTC [gossip.comm] Send -> DEBU eec Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.081 UTC [gossip.pull] Hello -> DEBU eed Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU eee Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151013 " +peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU eef Sign: digest: 565CA40A80B9A349F8A0EF0879C43063F9BE80BE3F8260A0E5C5F62546CFA5EC " +peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU ef0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU ef2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [gossip.comm] Send -> DEBU ef3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [msp] DeserializeIdentity -> DEBU ef4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] Send -> DEBU ef5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [msp] DeserializeIdentity -> DEBU ef6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] Send -> DEBU ef7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU ef8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU ef9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU efa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU efb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.084 UTC [gossip.comm] sendToEndpoint -> DEBU efc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.084 UTC [gossip.comm] sendToEndpoint -> DEBU efd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.085 UTC [gossip.comm] sendToEndpoint -> DEBU efe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.085 UTC [gossip.comm] sendToEndpoint -> DEBU eff Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.086 UTC [gossip.comm] sendToEndpoint -> DEBU f00 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.086 UTC [gossip.comm] sendToEndpoint -> DEBU f01 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.089 UTC [gossip.gossip] handleMessage -> DEBU f02 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13070340137394638550 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.090 UTC [gossip.pull] HandleMessage -> DEBU f03 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13070340137394638550 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.090 UTC [gossip.comm] func1 -> DEBU f04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.082 UTC [gossip.comm] Send -> DEBU ef1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.096 UTC [gossip.gossip] handleMessage -> DEBU f05 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.097 UTC [gossip.gossip] handleMessage -> DEBU f06 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.097 UTC [gossip.gossip] handleMessage -> DEBU f07 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.078 UTC [gossip.comm] Send -> DEBU ee7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.078 UTC [gossip.comm] sendToEndpoint -> DEBU ee5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU f08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.098 UTC [gossip.comm] sendToEndpoint -> DEBU f09 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.098 UTC [gossip.gossip] handleMessage -> DEBU f0a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2438078543997422423 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.098 UTC [gossip.comm] sendToEndpoint -> DEBU f0b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [gossip.comm] sendToEndpoint -> DEBU f10 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [gossip.comm] sendToEndpoint -> DEBU f0c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f0d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [msp] DeserializeIdentity -> DEBU f11 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 10a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 10a1 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 10a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:53.640 UTC [common.deliver] deliverBlocks -> DEBU 10a3 [channel: businesschannel] Received seekInfo (0xc001057080) start: > stop: > from 172.18.0.8:57360" +orderer0.example.com | "2019-05-02 09:27:53.640 UTC [fsblkstorage] Next -> DEBU 10a4 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:53.640 UTC [fsblkstorage] newBlockfileStream -> DEBU 10a5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47625]" +orderer0.example.com | "2019-05-02 09:27:53.641 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10a6 Remaining bytes=[51040], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:53.641 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10a7 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}" +orderer0.example.com | "2019-05-02 09:27:53.642 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10a8 blockbytes [23742] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:53.642 UTC [common.deliver] deliverBlocks -> DEBU 10a9 [channel: businesschannel] Delivering block [2] for (0xc001057080) for 172.18.0.8:57360" +orderer0.example.com | "2019-05-02 09:27:53.643 UTC [common.deliver] deliverBlocks -> DEBU 10aa [channel: businesschannel] Done delivering to 172.18.0.8:57360 for (0xc001057080)" +orderer0.example.com | "2019-05-02 09:27:53.644 UTC [common.deliver] Handle -> DEBU 10ab Waiting for new SeekInfo from 172.18.0.8:57360" +orderer0.example.com | "2019-05-02 09:27:53.645 UTC [common.deliver] Handle -> DEBU 10ac Attempting to read seek info message from 172.18.0.8:57360" +orderer0.example.com | "2019-05-02 09:27:53.652 UTC [common.deliver] Handle -> WARN 10ad Error reading from 172.18.0.8:57360: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:53.653 UTC [orderer.common.server] func1 -> DEBU 10ae Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:53.653 UTC [comm.grpc.server] 1 -> INFO 10af streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57360 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.9286ms +orderer0.example.com | "2019-05-02 09:27:53.654 UTC [grpc] infof -> DEBU 10b0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:53.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:53.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b2 Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +orderer0.example.com | "2019-05-02 09:27:53.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.5µs " +orderer0.example.com | "2019-05-02 09:27:53.874 UTC [orderer.common.server] Deliver -> DEBU 10b4 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:53.874 UTC [common.deliver] Handle -> DEBU 10b5 Starting new deliver loop for 172.18.0.8:57362" +orderer0.example.com | "2019-05-02 09:27:53.874 UTC [common.deliver] Handle -> DEBU 10b6 Attempting to read seek info message from 172.18.0.8:57362" +orderer0.example.com | "2019-05-02 09:27:53.876 UTC [policies] Evaluate -> DEBU 10b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.877 UTC [policies] Evaluate -> DEBU 10b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.877 UTC [policies] Evaluate -> DEBU 10b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.878 UTC [policies] Evaluate -> DEBU 10ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.878 UTC [policies] Evaluate -> DEBU 10bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.879 UTC [cauthdsl] func1 -> DEBU 10bc 0xc00123a900 gate 1556789273878856500 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.879 UTC [cauthdsl] func2 -> DEBU 10bd 0xc00123a900 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.879 UTC [cauthdsl] func2 -> DEBU 10be 0xc00123a900 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.880 UTC [cauthdsl] func2 -> DEBU 10bf 0xc00123a900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:53.880 UTC [cauthdsl] func2 -> DEBU 10c0 0xc00123a900 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.881 UTC [cauthdsl] func1 -> DEBU 10c1 0xc00123a900 gate 1556789273878856500 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.881 UTC [policies] Evaluate -> DEBU 10c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.882 UTC [policies] Evaluate -> DEBU 10c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.882 UTC [policies] Evaluate -> DEBU 10c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.883 UTC [cauthdsl] func1 -> DEBU 10c5 0xc00123b140 gate 1556789273883168300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.884 UTC [cauthdsl] func2 -> DEBU 10c6 0xc00123b140 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.884 UTC [cauthdsl] func2 -> DEBU 10c7 0xc00123b140 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:53.885 UTC [cauthdsl] func2 -> DEBU 10c8 0xc00123b140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:53.885 UTC [cauthdsl] func2 -> DEBU 10c9 0xc00123b140 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.886 UTC [cauthdsl] func1 -> DEBU 10ca 0xc00123b140 gate 1556789273883168300 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:53.886 UTC [policies] Evaluate -> DEBU 10cb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.887 UTC [policies] Evaluate -> DEBU 10cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:53.887 UTC [policies] func1 -> DEBU 10cd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:53.887 UTC [policies] Evaluate -> DEBU 10ce Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:53.888 UTC [policies] Evaluate -> DEBU 10cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:53.888 UTC [policies] Evaluate -> DEBU 10d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.888 UTC [policies] Evaluate -> DEBU 10d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:53.889 UTC [policies] Evaluate -> DEBU 10d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:53.890 UTC [cauthdsl] func1 -> DEBU 10d3 0xc00123be30 gate 1556789273889401700 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:53.890 UTC [cauthdsl] func2 -> DEBU 10d4 0xc00123be30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:53.890 UTC [cauthdsl] func2 -> DEBU 10d5 0xc00123be30 processing identity 0 with bytes of efef60" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f12 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f13 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f14 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [policies] Evaluate -> DEBU f15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [policies] Evaluate -> DEBU f16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [policies] Evaluate -> DEBU f17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [cauthdsl] func1 -> DEBU f18 0xc0033f9a90 gate 1556789249100627400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f19 0xc0033f9a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f1a 0xc0033f9a90 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f1b 0xc0033f9a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f1c 0xc0033f9a90 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [cauthdsl] func1 -> DEBU f1d 0xc0033f9a90 gate 1556789249100627400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [policies] Evaluate -> DEBU f1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [policies] Evaluate -> DEBU f1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [policies] Evaluate -> DEBU f20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [cauthdsl] func1 -> DEBU f21 0xc0034283f0 gate 1556789249101682400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [cauthdsl] func2 -> DEBU f22 0xc0034283f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.101 UTC [cauthdsl] func2 -> DEBU f23 0xc0034283f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [cauthdsl] func2 -> DEBU f24 0xc0034283f0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [msp.identity] Verify -> DEBU f25 Verify: digest = 00000000 00 2d 21 a4 e9 07 af 9a 18 22 d6 3e 35 56 dc 6f |.-!......".>5V.o| +peer0.org1.example.com | 00000010 dc 3e 6f dc 68 0e ed 14 86 5d 97 ac bb a1 5e 28 |.>o.h....]....^(|" +peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [msp.identity] Verify -> DEBU f26 Verify: sig = 00000000 30 44 02 20 74 71 fe 1b 28 ab dd ac 6c 08 0c 62 |0D. tq..(...l..b| +peer0.org1.example.com | 00000010 2c c9 7f ff bf 1c fd e1 e4 6f af 15 b6 6d b9 e7 |,........o...m..| +peer0.org1.example.com | 00000020 06 0a f0 1d 02 20 5b 3d f8 66 0f 05 a2 23 a5 ab |..... [=.f...#..| +peer0.org1.example.com | 00000030 d6 bf ad 8e 62 d1 14 91 48 24 a3 89 ff 23 94 dc |....b...H$...#..| +peer0.org1.example.com | 00000040 23 a8 ae ee 39 1f |#...9.|" +peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [cauthdsl] func2 -> DEBU f27 0xc0034283f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [cauthdsl] func1 -> DEBU f28 0xc0034283f0 gate 1556789249101682400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:29.102 UTC [policies] Evaluate -> DEBU f29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [policies] Evaluate -> DEBU f2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [policies] Evaluate -> DEBU f2b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [policies] Evaluate -> DEBU f2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [gossip.discovery] handleAliveMessage -> DEBU f2d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [gossip.discovery] handleAliveMessage -> DEBU f2e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f2f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [msp.identity] Verify -> DEBU f30 Verify: digest = 00000000 56 5c a4 0a 80 b9 a3 49 f8 a0 ef 08 79 c4 30 63 |V\.....I....y.0c| +peer0.org1.example.com | 00000010 f9 be 80 be 3f 82 60 a0 e5 c5 f6 25 46 cf a5 ec |....?.`....%F...|" +peer0.org1.example.com | "2019-05-02 09:27:29.103 UTC [msp.identity] Verify -> DEBU f31 Verify: sig = 00000000 30 44 02 20 32 a8 48 69 ae 3f db 4f 12 05 de c2 |0D. 2.Hi.?.O....| +peer0.org1.example.com | 00000010 f7 6b 43 fb c7 35 65 c6 5b 07 fa 0e 4f ef 67 fe |.kC..5e.[...O.g.| +peer0.org1.example.com | 00000020 af 1d d2 29 02 20 41 28 15 84 a4 2b 80 d8 99 1c |...). A(...+....| +peer0.org1.example.com | 00000030 ce 95 5e ef db 3a 99 bc db 0b 5f ce 96 cf 7c 06 |..^..:...._...|.| +peer0.org1.example.com | 00000040 c9 85 c0 85 6a b2 |....j.|" +peer0.org1.example.com | "2019-05-02 09:27:29.104 UTC [gossip.discovery] handleAliveMessage -> DEBU f32 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.104 UTC [gossip.discovery] isSentByMe -> DEBU f33 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.104 UTC [gossip.discovery] handleAliveMessage -> DEBU f34 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.104 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f35 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.106 UTC [msp.identity] Verify -> DEBU f36 Verify: digest = 00000000 6a 35 aa 85 56 51 fd f7 1f 00 32 55 34 a9 78 1f |j5..VQ....2U4.x.| +peer0.org1.example.com | 00000010 ef 9f 3b 40 9e 42 79 88 1a 5f f4 3b 06 8f 7d 30 |..;@.By.._.;..}0|" +peer0.org1.example.com | "2019-05-02 09:27:29.106 UTC [msp.identity] Verify -> DEBU f37 Verify: sig = 00000000 30 45 02 21 00 84 5c ed 29 6d 83 2f ef 24 3d 58 |0E.!..\.)m./.$=X| +peer0.org1.example.com | 00000010 bb 10 72 1c f2 93 4a 83 84 67 bd d2 47 59 eb 99 |..r...J..g..GY..| +peer0.org1.example.com | 00000020 ca 45 0b 83 94 02 20 10 cf 2a cd e1 fd 86 c8 45 |.E.... ..*.....E| +peer0.org1.example.com | 00000030 a8 91 8b e9 d3 b9 3e e6 0b cb 13 10 94 b4 d7 60 |......>........`| +peer0.org1.example.com | 00000040 fb 75 1c 24 de 0f eb |.u.$...|" +peer0.org1.example.com | "2019-05-02 09:27:29.108 UTC [gossip.discovery] handleAliveMessage -> DEBU f38 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.108 UTC [gossip.discovery] handleAliveMessage -> DEBU f39 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.109 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [gossip.comm] sendToEndpoint -> DEBU f0e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.099 UTC [gossip.pull] HandleMessage -> DEBU f0f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2438078543997422423 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.109 UTC [gossip.gossip] handleMessage -> DEBU f3b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.109 UTC [gossip.gossip] handleMessage -> DEBU f3c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.110 UTC [gossip.gossip] handleMessage -> DEBU f3d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.110 UTC [gossip.gossip] handleMessage -> DEBU f3e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.110 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.110 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f40 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.111 UTC [msp.identity] Verify -> DEBU f41 Verify: digest = 00000000 56 5c a4 0a 80 b9 a3 49 f8 a0 ef 08 79 c4 30 63 |V\.....I....y.0c| +peer0.org1.example.com | 00000010 f9 be 80 be 3f 82 60 a0 e5 c5 f6 25 46 cf a5 ec |....?.`....%F...|" +peer0.org1.example.com | "2019-05-02 09:27:29.112 UTC [msp.identity] Verify -> DEBU f42 Verify: sig = 00000000 30 44 02 20 32 a8 48 69 ae 3f db 4f 12 05 de c2 |0D. 2.Hi.?.O....| +peer0.org1.example.com | 00000010 f7 6b 43 fb c7 35 65 c6 5b 07 fa 0e 4f ef 67 fe |.kC..5e.[...O.g.| +peer0.org1.example.com | 00000020 af 1d d2 29 02 20 41 28 15 84 a4 2b 80 d8 99 1c |...). A(...+....| +peer0.org1.example.com | 00000030 ce 95 5e ef db 3a 99 bc db 0b 5f ce 96 cf 7c 06 |..^..:...._...|.| +peer0.org1.example.com | 00000040 c9 85 c0 85 6a b2 |....j.|" +peer0.org1.example.com | "2019-05-02 09:27:29.112 UTC [gossip.comm] func1 -> DEBU f43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10861530303439601111 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.113 UTC [msp.identity] Verify -> DEBU f44 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:29.113 UTC [msp.identity] Verify -> DEBU f45 Verify: sig = 00000000 30 45 02 21 00 eb e2 8f e6 e3 18 d1 ac e0 0f ad |0E.!............| +peer0.org1.example.com | 00000010 ce c8 69 0b 21 67 af 38 12 df a6 75 b1 2b 74 1c |..i.!g.8...u.+t.| +peer0.org1.example.com | 00000020 c4 ac 5f 4e e9 02 20 62 77 43 75 9d 1a 47 ba 1a |.._N.. bwCu..G..| +peer0.org1.example.com | 00000030 22 8c 11 2d a4 42 31 2f af 61 3c c1 2a da cc a0 |"..-.B1/.a<.*...| +peer0.org1.example.com | 00000040 18 c2 35 37 b5 09 c0 |..57...|" +peer0.org1.example.com | "2019-05-02 09:27:29.114 UTC [gossip.discovery] handleAliveMessage -> DEBU f46 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.114 UTC [gossip.discovery] isSentByMe -> DEBU f47 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.114 UTC [gossip.discovery] handleAliveMessage -> DEBU f48 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.114 UTC [gossip.discovery] handleMsgFromComm -> DEBU f49 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.114 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.115 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f4b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.116 UTC [msp.identity] Verify -> DEBU f4c Verify: digest = 00000000 6a 35 aa 85 56 51 fd f7 1f 00 32 55 34 a9 78 1f |j5..VQ....2U4.x.| +peer0.org1.example.com | 00000010 ef 9f 3b 40 9e 42 79 88 1a 5f f4 3b 06 8f 7d 30 |..;@.By.._.;..}0|" +peer0.org1.example.com | "2019-05-02 09:27:29.117 UTC [gossip.gossip] handleMessage -> DEBU f4d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.128 UTC [gossip.gossip] handleMessage -> DEBU f4e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.116 UTC [msp.identity] Verify -> DEBU f4f Verify: sig = 00000000 30 45 02 21 00 84 5c ed 29 6d 83 2f ef 24 3d 58 |0E.!..\.)m./.$=X| +peer0.org1.example.com | 00000010 bb 10 72 1c f2 93 4a 83 84 67 bd d2 47 59 eb 99 |..r...J..g..GY..| +peer0.org1.example.com | 00000020 ca 45 0b 83 94 02 20 10 cf 2a cd e1 fd 86 c8 45 |.E.... ..*.....E| +peer0.org1.example.com | 00000030 a8 91 8b e9 d3 b9 3e e6 0b cb 13 10 94 b4 d7 60 |......>........`| +peer0.org1.example.com | 00000040 fb 75 1c 24 de 0f eb |.u.$...|" +peer0.org1.example.com | "2019-05-02 09:27:29.129 UTC [gossip.discovery] handleAliveMessage -> DEBU f50 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.130 UTC [gossip.discovery] handleAliveMessage -> DEBU f51 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.130 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f52 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.130 UTC [msp.identity] Verify -> DEBU f53 Verify: digest = 00000000 56 5c a4 0a 80 b9 a3 49 f8 a0 ef 08 79 c4 30 63 |V\.....I....y.0c| +peer0.org1.example.com | 00000010 f9 be 80 be 3f 82 60 a0 e5 c5 f6 25 46 cf a5 ec |....?.`....%F...|" +peer0.org1.example.com | "2019-05-02 09:27:29.131 UTC [msp.identity] Verify -> DEBU f54 Verify: sig = 00000000 30 44 02 20 32 a8 48 69 ae 3f db 4f 12 05 de c2 |0D. 2.Hi.?.O....| +peer0.org1.example.com | 00000010 f7 6b 43 fb c7 35 65 c6 5b 07 fa 0e 4f ef 67 fe |.kC..5e.[...O.g.| +peer0.org1.example.com | 00000020 af 1d d2 29 02 20 41 28 15 84 a4 2b 80 d8 99 1c |...). A(...+....| +peer0.org1.example.com | 00000030 ce 95 5e ef db 3a 99 bc db 0b 5f ce 96 cf 7c 06 |..^..:...._...|.| +peer0.org1.example.com | 00000040 c9 85 c0 85 6a b2 |....j.|" +peer0.org1.example.com | "2019-05-02 09:27:29.133 UTC [gossip.comm] func1 -> DEBU f55 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.134 UTC [gossip.discovery] handleAliveMessage -> DEBU f56 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.134 UTC [gossip.discovery] isSentByMe -> DEBU f57 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.135 UTC [gossip.discovery] handleAliveMessage -> DEBU f58 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.135 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f59 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.135 UTC [msp] DeserializeIdentity -> DEBU f5a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.136 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f5b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:29.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f5c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f5d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.136 UTC [policies] Evaluate -> DEBU f5e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.136 UTC [policies] Evaluate -> DEBU f5f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:29.137 UTC [policies] Evaluate -> DEBU f60 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.137 UTC [cauthdsl] func1 -> DEBU f61 0xc0035429b0 gate 1556789249137467600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.137 UTC [cauthdsl] func2 -> DEBU f62 0xc0035429b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.137 UTC [cauthdsl] func2 -> DEBU f63 0xc0035429b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.138 UTC [cauthdsl] func2 -> DEBU f64 0xc0035429b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:29.138 UTC [cauthdsl] func2 -> DEBU f65 0xc0035429b0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.138 UTC [cauthdsl] func1 -> DEBU f66 0xc0035429b0 gate 1556789249137467600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.138 UTC [policies] Evaluate -> DEBU f67 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.139 UTC [policies] Evaluate -> DEBU f68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.139 UTC [policies] Evaluate -> DEBU f69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.139 UTC [cauthdsl] func1 -> DEBU f6a 0xc0035431f0 gate 1556789249139469900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.139 UTC [cauthdsl] func2 -> DEBU f6b 0xc0035431f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.139 UTC [cauthdsl] func2 -> DEBU f6c 0xc0035431f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.140 UTC [cauthdsl] func2 -> DEBU f6d 0xc0035431f0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.140 UTC [msp.identity] Verify -> DEBU f6e Verify: digest = 00000000 d8 f9 0e bd 68 6e 1a 4a 12 ec 46 67 33 c4 7a 02 |....hn.J..Fg3.z.| +peer0.org1.example.com | 00000010 d0 0a 4f a1 03 5c 97 07 b9 09 62 9a fd a8 c7 1c |..O..\....b.....|" +peer0.org1.example.com | "2019-05-02 09:27:29.140 UTC [msp.identity] Verify -> DEBU f6f Verify: sig = 00000000 30 45 02 21 00 c8 30 00 df a5 c2 f9 ca a5 83 8e |0E.!..0.........| +peer0.org1.example.com | 00000010 66 8e 1f 1e 74 e6 b1 d9 33 a2 b1 8f 58 fc eb 27 |f...t...3...X..'| +peer0.org1.example.com | 00000020 48 46 e0 63 9c 02 20 29 e3 b8 08 f6 9f ea f0 00 |HF.c.. )........| +peer0.org1.example.com | 00000030 e2 15 27 ef 93 0d 0a 20 18 d8 47 bf 54 fc 59 1f |..'.... ..G.T.Y.| +peer0.org1.example.com | 00000040 79 3a eb 38 d5 32 d6 |y:.8.2.|" +peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [cauthdsl] func2 -> DEBU f70 0xc0035431f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [cauthdsl] func1 -> DEBU f71 0xc0035431f0 gate 1556789249139469900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f72 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f74 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f75 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [gossip.discovery] handleAliveMessage -> DEBU f76 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [gossip.discovery] handleAliveMessage -> DEBU f77 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.141 UTC [gossip.discovery] handleMsgFromComm -> DEBU f78 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU f79 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f7a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [msp.identity] Verify -> DEBU f7b Verify: digest = 00000000 8b d1 0c 6f f2 c7 74 c8 c4 86 07 74 45 94 e8 ca |...o..t....tE...| +peer0.org1.example.com | 00000010 64 3a 81 1f d7 42 e8 27 d4 40 90 b2 2c 88 a9 14 |d:...B.'.@..,...|" +peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [msp.identity] Verify -> DEBU f7c Verify: sig = 00000000 30 45 02 21 00 e5 44 62 90 98 7a bc 84 e4 95 38 |0E.!..Db..z....8| +peer0.org1.example.com | 00000010 98 43 e7 d3 d5 22 a8 d7 89 6e e2 7f 94 b8 ff 57 |.C..."...n.....W| +peer0.org1.example.com | 00000020 19 f2 e3 e0 f3 02 20 1f 05 24 cc 87 b2 50 df c2 |...... ..$...P..| +peer0.org1.example.com | 00000030 40 2c ea e5 17 22 bd 71 07 ff 77 b0 dd af ec d3 |@,...".q..w.....| +peer0.org1.example.com | 00000040 1d b3 fc 12 76 7b 14 |....v{.|" +peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [gossip.discovery] isSentByMe -> DEBU f7d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU f7e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f7f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f80 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f81 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f82 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10861530303439601111 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.pull] HandleMessage -> DEBU f83 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10861530303439601111 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f84 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f85 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.pull] HandleMessage -> DEBU f86 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.pull] SendDigest -> DEBU f87 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f88 Exiting" +orderer0.example.com | "2019-05-02 09:27:53.890 UTC [cauthdsl] func2 -> DEBU 10d6 0xc00123be30 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:53.890 UTC [msp.identity] Verify -> DEBU 10d7 Verify: digest = 00000000 26 f5 ee 4c 73 57 f9 2b 50 c9 cc 05 d8 7f 68 cf |&..LsW.+P.....h.| +orderer0.example.com | 00000010 f7 b9 a2 03 c3 02 29 de 0c e5 3c 25 e6 45 df 8d |......)...<%.E..|" +orderer0.example.com | "2019-05-02 09:27:53.890 UTC [msp.identity] Verify -> DEBU 10d8 Verify: sig = 00000000 30 45 02 21 00 eb c2 3d ad 6d e5 26 ba cf bc 0f |0E.!...=.m.&....| +orderer0.example.com | 00000010 3f 48 d3 6b 32 a7 10 54 bd 5a 6e df 8a 6c 07 93 |?H.k2..T.Zn..l..| +orderer0.example.com | 00000020 aa 8c 17 42 8e 02 20 3f d4 c5 d0 d4 50 63 4f a1 |...B.. ?....PcO.| +orderer0.example.com | 00000030 5d 10 ed 68 7d 5f 76 fb 71 ae 09 33 5b 18 07 23 |]..h}_v.q..3[..#| +orderer0.example.com | 00000040 f5 17 6c 40 a0 12 c7 |..l@...|" +orderer0.example.com | "2019-05-02 09:27:53.891 UTC [cauthdsl] func2 -> DEBU 10d9 0xc00123be30 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:53.891 UTC [cauthdsl] func1 -> DEBU 10da 0xc00123be30 gate 1556789273889401700 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:53.891 UTC [policies] Evaluate -> DEBU 10db Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10dd Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10df Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:53.893 UTC [common.deliver] deliverBlocks -> DEBU 10e1 [channel: businesschannel] Received seekInfo (0xc001057780) start: > stop: > from 172.18.0.8:57362" +orderer0.example.com | "2019-05-02 09:27:53.893 UTC [fsblkstorage] Next -> DEBU 10e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:53.894 UTC [fsblkstorage] newBlockfileStream -> DEBU 10e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71370]" +orderer0.example.com | "2019-05-02 09:27:53.894 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10e4 Remaining bytes=[27295], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:53.895 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10e5 Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}" +orderer0.example.com | "2019-05-02 09:27:53.895 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10e6 blockbytes [4709] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:53.896 UTC [common.deliver] deliverBlocks -> DEBU 10e7 [channel: businesschannel] Delivering block [3] for (0xc001057780) for 172.18.0.8:57362" +orderer0.example.com | "2019-05-02 09:27:53.896 UTC [common.deliver] deliverBlocks -> DEBU 10e8 [channel: businesschannel] Done delivering to 172.18.0.8:57362 for (0xc001057780)" +orderer0.example.com | "2019-05-02 09:27:53.896 UTC [common.deliver] Handle -> DEBU 10e9 Waiting for new SeekInfo from 172.18.0.8:57362" +orderer0.example.com | "2019-05-02 09:27:53.896 UTC [common.deliver] Handle -> DEBU 10ea Attempting to read seek info message from 172.18.0.8:57362" +orderer0.example.com | "2019-05-02 09:27:53.905 UTC [common.deliver] Handle -> WARN 10eb Error reading from 172.18.0.8:57362: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:53.905 UTC [orderer.common.server] func1 -> DEBU 10ec Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:53.905 UTC [comm.grpc.server] 1 -> INFO 10ed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57362 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.4388ms +orderer0.example.com | "2019-05-02 09:27:53.905 UTC [grpc] infof -> DEBU 10ee transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:53.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ef Sending msg of 28 bytes to 2 on channel businesschannel took 49.1µs" +orderer0.example.com | "2019-05-02 09:27:53.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f0 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" +orderer0.example.com | "2019-05-02 09:27:53.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.3µs " +orderer0.example.com | "2019-05-02 09:27:53.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 696.8µs " +orderer0.example.com | "2019-05-02 09:27:53.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:53.964 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:54.152 UTC [orderer.common.server] Deliver -> DEBU 10f5 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:54.153 UTC [common.deliver] Handle -> DEBU 10f6 Starting new deliver loop for 172.18.0.8:57364" +orderer0.example.com | "2019-05-02 09:27:54.154 UTC [common.deliver] Handle -> DEBU 10f7 Attempting to read seek info message from 172.18.0.8:57364" +orderer0.example.com | "2019-05-02 09:27:54.155 UTC [policies] Evaluate -> DEBU 10f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.155 UTC [policies] Evaluate -> DEBU 10f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.155 UTC [policies] Evaluate -> DEBU 10fa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.156 UTC [policies] Evaluate -> DEBU 10fb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.156 UTC [policies] Evaluate -> DEBU 10fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.157 UTC [cauthdsl] func1 -> DEBU 10fd 0xc0012886a0 gate 1556789274157192000 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.157 UTC [cauthdsl] func2 -> DEBU 10fe 0xc0012886a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.157 UTC [cauthdsl] func2 -> DEBU 10ff 0xc0012886a0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.158 UTC [cauthdsl] func2 -> DEBU 1100 0xc0012886a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:54.159 UTC [cauthdsl] func2 -> DEBU 1101 0xc0012886a0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.159 UTC [cauthdsl] func1 -> DEBU 1102 0xc0012886a0 gate 1556789274157192000 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.159 UTC [policies] Evaluate -> DEBU 1103 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.gossip] handleMessage -> DEBU f89 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU f8a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f8b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [msp.identity] Verify -> DEBU f8c Verify: digest = 00000000 8b d1 0c 6f f2 c7 74 c8 c4 86 07 74 45 94 e8 ca |...o..t....tE...| +peer0.org1.example.com | 00000010 64 3a 81 1f d7 42 e8 27 d4 40 90 b2 2c 88 a9 14 |d:...B.'.@..,...|" +peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [msp.identity] Verify -> DEBU f8d Verify: sig = 00000000 30 45 02 21 00 e5 44 62 90 98 7a bc 84 e4 95 38 |0E.!..Db..z....8| +peer0.org1.example.com | 00000010 98 43 e7 d3 d5 22 a8 d7 89 6e e2 7f 94 b8 ff 57 |.C..."...n.....W| +peer0.org1.example.com | 00000020 19 f2 e3 e0 f3 02 20 1f 05 24 cc 87 b2 50 df c2 |...... ..$...P..| +peer0.org1.example.com | 00000030 40 2c ea e5 17 22 bd 71 07 ff 77 b0 dd af ec d3 |@,...".q..w.....| +peer0.org1.example.com | 00000040 1d b3 fc 12 76 7b 14 |....v{.|" +peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.discovery] isSentByMe -> DEBU f8e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU f8f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU f90 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.144 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f91 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f92 Verify: digest = 00000000 7a ba 25 f8 10 d2 95 2c 49 e0 f3 79 85 d2 24 6d |z.%....,I..y..$m| +peer0.org1.example.com | 00000010 c5 80 af e6 1d 9b df 95 d0 a4 bc a1 b9 dc 64 b9 |..............d.|" +peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f93 Verify: sig = 00000000 30 44 02 20 26 27 82 df 54 8b f1 2c 3a 10 0e 27 |0D. &'..T..,:..'| +peer0.org1.example.com | 00000010 a5 1e e8 86 69 49 55 c2 53 23 57 45 91 83 09 38 |....iIU.S#WE...8| +peer0.org1.example.com | 00000020 66 ad e7 5f 02 20 04 eb 71 4b 9f 42 ee 83 1b 7f |f.._. ..qK.B....| +peer0.org1.example.com | 00000030 41 dc 6b 05 9b 02 96 5b ee bb 1a 87 96 29 21 38 |A.k....[.....)!8| +peer0.org1.example.com | 00000040 2a 0d c4 2c 77 43 |*..,wC|" +peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f94 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f96 Verify: sig = 00000000 30 44 02 20 2c f6 d7 53 a0 03 7e af bd 6c 43 3a |0D. ,..S..~..lC:| +peer0.org1.example.com | 00000010 a0 1d 3e 0b 62 93 d8 3a 82 e1 d3 d4 24 3a d8 bd |..>.b..:....$:..| +peer0.org1.example.com | 00000020 77 25 65 53 02 20 29 fa 86 50 fe 12 65 05 c6 3a |w%eS. )..P..e..:| +peer0.org1.example.com | 00000030 b3 19 38 31 8e 59 c6 3c c9 b3 9b a0 62 ff fc 76 |..81.Y.<....b..v| +peer0.org1.example.com | 00000040 5e ac ea 81 ec db |^.....|" +peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [gossip.gossip] handleMessage -> DEBU f95 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.145 UTC [gossip.gossip] handleMessage -> DEBU f97 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] handleAliveMessage -> DEBU f98 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f99 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 " +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 " +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] handleAliveMessage -> DEBU f9e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU f9f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU fa0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU fa1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.146 UTC [gossip.gossip] handleMessage -> DEBU fa2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.147 UTC [gossip.gossip] handleMessage -> DEBU fa3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.147 UTC [gossip.gossip] handleMessage -> DEBU fa4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.147 UTC [gossip.gossip] handleMessage -> DEBU fa5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +orderer0.example.com | "2019-05-02 09:27:54.160 UTC [policies] Evaluate -> DEBU 1104 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.160 UTC [policies] Evaluate -> DEBU 1105 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.161 UTC [cauthdsl] func1 -> DEBU 1106 0xc001288ee0 gate 1556789274161384200 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.161 UTC [cauthdsl] func2 -> DEBU 1107 0xc001288ee0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.161 UTC [cauthdsl] func2 -> DEBU 1108 0xc001288ee0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.162 UTC [cauthdsl] func2 -> DEBU 1109 0xc001288ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:54.163 UTC [cauthdsl] func2 -> DEBU 110a 0xc001288ee0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.164 UTC [cauthdsl] func1 -> DEBU 110b 0xc001288ee0 gate 1556789274161384200 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.164 UTC [policies] Evaluate -> DEBU 110c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.165 UTC [policies] Evaluate -> DEBU 110d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.166 UTC [policies] func1 -> DEBU 110e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:54.167 UTC [policies] Evaluate -> DEBU 110f Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:54.175 UTC [policies] Evaluate -> DEBU 1110 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:54.181 UTC [policies] Evaluate -> DEBU 1112 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.182 UTC [policies] Evaluate -> DEBU 1113 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1111 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:54.184 UTC [policies] Evaluate -> DEBU 1114 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.187 UTC [cauthdsl] func1 -> DEBU 1115 0xc001256ae0 gate 1556789274187301300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.187 UTC [cauthdsl] func2 -> DEBU 1116 0xc001256ae0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.189 UTC [cauthdsl] func2 -> DEBU 1117 0xc001256ae0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.190 UTC [cauthdsl] func2 -> DEBU 1118 0xc001256ae0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:54.192 UTC [msp.identity] Verify -> DEBU 1119 Verify: digest = 00000000 ad 0c 01 02 49 47 28 af 32 c6 d0 de c9 46 4f 0c |....IG(.2....FO.| +orderer0.example.com | 00000010 29 5d aa 7b d8 e3 34 c1 5d 25 d4 04 2c f1 65 6b |)].{..4.]%..,.ek|" +orderer0.example.com | "2019-05-02 09:27:54.193 UTC [msp.identity] Verify -> DEBU 111a Verify: sig = 00000000 30 44 02 20 3d 28 bd 57 ef b8 8c fe 5b c6 5a c3 |0D. =(.W....[.Z.| +orderer0.example.com | 00000010 b6 97 60 9b 98 91 68 72 0a 1a e9 93 dd 40 b3 8c |..`...hr.....@..| +orderer0.example.com | 00000020 71 1b 9f 9b 02 20 57 9d b8 7a 7e 90 b6 ed a6 c5 |q.... W..z~.....| +orderer0.example.com | 00000030 a5 f8 3d 6d 38 9b cc 35 bd c6 d8 f7 8e a8 48 ba |..=m8..5......H.| +orderer0.example.com | 00000040 be 7a fe 6a d3 b5 |.z.j..|" +orderer0.example.com | "2019-05-02 09:27:54.195 UTC [cauthdsl] func2 -> DEBU 111b 0xc001256ae0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:54.197 UTC [cauthdsl] func1 -> DEBU 111c 0xc001256ae0 gate 1556789274187301300 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:54.198 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111d Sending msg of 28 bytes to 3 on channel testchainid took 45.5µs" +orderer0.example.com | "2019-05-02 09:27:54.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.1µs " +orderer0.example.com | "2019-05-02 09:27:54.197 UTC [policies] Evaluate -> DEBU 111e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:54.202 UTC [policies] Evaluate -> DEBU 1120 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1121 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1122 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1123 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1124 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:54.205 UTC [common.deliver] deliverBlocks -> DEBU 1125 [channel: businesschannel] Received seekInfo (0xc0011ac140) start: > stop: > from 172.18.0.8:57364" +orderer0.example.com | "2019-05-02 09:27:54.205 UTC [fsblkstorage] Next -> DEBU 1126 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:54.205 UTC [fsblkstorage] newBlockfileStream -> DEBU 1127 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76081]" +orderer0.example.com | "2019-05-02 09:27:54.207 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1128 Remaining bytes=[22584], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:54.207 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1129 Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76081], bytesOffset=[76083]}" +orderer0.example.com | "2019-05-02 09:27:54.207 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 112a blockbytes [4707] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:54.217 UTC [common.deliver] deliverBlocks -> DEBU 112b [channel: businesschannel] Delivering block [4] for (0xc0011ac140) for 172.18.0.8:57364" +orderer0.example.com | "2019-05-02 09:27:54.217 UTC [common.deliver] deliverBlocks -> DEBU 112c [channel: businesschannel] Done delivering to 172.18.0.8:57364 for (0xc0011ac140)" +orderer0.example.com | "2019-05-02 09:27:54.217 UTC [common.deliver] Handle -> DEBU 112d Waiting for new SeekInfo from 172.18.0.8:57364" +orderer0.example.com | "2019-05-02 09:27:54.217 UTC [common.deliver] Handle -> DEBU 112e Attempting to read seek info message from 172.18.0.8:57364" +orderer0.example.com | "2019-05-02 09:27:54.227 UTC [grpc] warningf -> DEBU 112f transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.8:57364: read: connection reset by peer" +orderer0.example.com | "2019-05-02 09:27:54.238 UTC [common.deliver] Handle -> WARN 1130 Error reading from 172.18.0.8:57364: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:54.239 UTC [orderer.common.server] func1 -> DEBU 1131 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:54.239 UTC [comm.grpc.server] 1 -> INFO 1132 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57364 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=86.7309ms +orderer0.example.com | "2019-05-02 09:27:54.240 UTC [grpc] infof -> DEBU 1133 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:29.147 UTC [gossip.discovery] handleMsgFromComm -> DEBU fa6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.147 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fa7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU fa8 Verify: digest = 00000000 28 e3 c7 ef f6 39 26 c9 69 7f de f3 56 21 b3 63 |(....9&.i...V!.c| +peer0.org1.example.com | 00000010 c9 05 70 6a be ac a3 02 e6 39 c0 a6 da c2 f6 7a |..pj.....9.....z|" +peer0.org1.example.com | "2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU fa9 Verify: sig = 00000000 30 45 02 21 00 9b dc 4c 9d 3b c5 05 f5 fa a4 0c |0E.!...L.;......| +peer0.org1.example.com | 00000010 5b f8 85 2a ba 0f 5a bf e7 d2 f0 12 72 2a 5d 69 |[..*..Z.....r*]i| +peer0.org1.example.com | 00000020 3d 33 94 08 4a 02 20 2c a5 3f 2a da 8b de 2b 08 |=3..J. ,.?*...+.| +peer0.org1.example.com | 00000030 7b 5d 5a 51 c5 2d e9 44 42 47 aa e5 44 9b 1d 90 |{]ZQ.-.DBG..D...| +peer0.org1.example.com | 00000040 7e 09 8a 22 c7 ac 46 |~.."..F|" +peer0.org1.example.com | "2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU faa Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU fab Verify: sig = 00000000 30 44 02 20 3b 55 b6 1d 82 73 43 c5 67 90 16 b5 |0D. ;U...sC.g...| +peer0.org1.example.com | 00000010 67 70 18 d3 72 13 14 af 0e be 95 24 60 b3 75 11 |gp..r......$`.u.| +peer0.org1.example.com | 00000020 cd ba f7 86 02 20 2b ba cb 4b 34 7d b1 25 6d 44 |..... +..K4}.%mD| +peer0.org1.example.com | 00000030 ec 2c 9f 0e 65 f0 b4 9b 37 4c e5 e2 ae 48 e6 97 |.,..e...7L...H..| +peer0.org1.example.com | 00000040 be 7f 78 8c 66 83 |..x.f.|" +peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] handleAliveMessage -> DEBU fac Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fad Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fae updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 " +peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU faf Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 " +peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fb0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fb1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.discovery] handleAliveMessage -> DEBU fb2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.gossip] handleMessage -> DEBU fb6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.discovery] sendMemResponse -> DEBU fb7 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [msp] DeserializeIdentity -> DEBU fb8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [msp] DeserializeIdentity -> DEBU fb9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.150 UTC [gossip.comm] Send -> DEBU fba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.151 UTC [gossip.discovery] sendMemResponse -> DEBU fbb Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:29.151 UTC [gossip.comm] sendToEndpoint -> DEBU fbc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.151 UTC [gossip.comm] sendToEndpoint -> DEBU fbd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fbe Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fbf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fc0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [gossip.comm] Send -> DEBU fc1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fc2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [gossip.comm] Send -> DEBU fc3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [gossip.comm] sendToEndpoint -> DEBU fc4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [gossip.comm] sendToEndpoint -> DEBU fc5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.156 UTC [gossip.comm] sendToEndpoint -> DEBU fc6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.157 UTC [gossip.comm] sendToEndpoint -> DEBU fc7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [gossip.gossip] handleMessage -> DEBU fc8 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [gossip.gossip] handleMessage -> DEBU fc9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU fca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fcb Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [msp] DeserializeIdentity -> DEBU fcc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fcd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fce Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fcf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [policies] Evaluate -> DEBU fd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [policies] Evaluate -> DEBU fd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [policies] Evaluate -> DEBU fd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [cauthdsl] func1 -> DEBU fd3 0xc0034d1780 gate 1556789249191891900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.191 UTC [cauthdsl] func2 -> DEBU fd4 0xc0034d1780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.192 UTC [cauthdsl] func2 -> DEBU fd5 0xc0034d1780 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.193 UTC [cauthdsl] func2 -> DEBU fd6 0xc0034d1780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:29.194 UTC [cauthdsl] func2 -> DEBU fd7 0xc0034d1780 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.197 UTC [cauthdsl] func1 -> DEBU fd8 0xc0034d1780 gate 1556789249191891900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.197 UTC [policies] Evaluate -> DEBU fd9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.198 UTC [policies] Evaluate -> DEBU fda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.198 UTC [policies] Evaluate -> DEBU fdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.198 UTC [cauthdsl] func1 -> DEBU fdc 0xc0034d1fc0 gate 1556789249198663100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.198 UTC [cauthdsl] func2 -> DEBU fdd 0xc0034d1fc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [cauthdsl] func2 -> DEBU fde 0xc0034d1fc0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [cauthdsl] func2 -> DEBU fdf 0xc0034d1fc0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [msp.identity] Verify -> DEBU fe0 Verify: digest = 00000000 78 4a af f7 40 b0 72 3e df 0b 4f d9 26 5f 2a 45 |xJ..@.r>..O.&_*E| +peer0.org1.example.com | 00000010 de 4c 90 5c c8 e6 75 bd 8f 40 71 9c ea c9 95 f7 |.L.\..u..@q.....|" +peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [msp.identity] Verify -> DEBU fe1 Verify: sig = 00000000 30 45 02 21 00 9d 58 b9 d5 9c cf 2b 3b c9 a9 cb |0E.!..X....+;...| +peer0.org1.example.com | 00000010 06 bb fa d7 a0 4b 77 b0 67 31 3c 44 0c f7 18 7c |.....Kw.g1 DEBU fe2 0xc0034d1fc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [cauthdsl] func1 -> DEBU fe3 0xc0034d1fc0 gate 1556789249198663100 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:54.425 UTC [orderer.common.server] Deliver -> DEBU 1134 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:54.425 UTC [common.deliver] Handle -> DEBU 1135 Starting new deliver loop for 172.18.0.8:57366" +orderer0.example.com | "2019-05-02 09:27:54.426 UTC [common.deliver] Handle -> DEBU 1136 Attempting to read seek info message from 172.18.0.8:57366" +orderer0.example.com | "2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 1137 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 1138 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 1139 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 113a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.427 UTC [policies] Evaluate -> DEBU 113b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.427 UTC [cauthdsl] func1 -> DEBU 113c 0xc001158d60 gate 1556789274427426300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.427 UTC [cauthdsl] func2 -> DEBU 113d 0xc001158d60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.427 UTC [cauthdsl] func2 -> DEBU 113e 0xc001158d60 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.427 UTC [cauthdsl] func2 -> DEBU 113f 0xc001158d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:54.428 UTC [cauthdsl] func2 -> DEBU 1140 0xc001158d60 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.428 UTC [cauthdsl] func1 -> DEBU 1141 0xc001158d60 gate 1556789274427426300 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.428 UTC [policies] Evaluate -> DEBU 1142 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.428 UTC [policies] Evaluate -> DEBU 1143 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.428 UTC [policies] Evaluate -> DEBU 1144 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.428 UTC [cauthdsl] func1 -> DEBU 1145 0xc0011595a0 gate 1556789274428653300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.428 UTC [cauthdsl] func2 -> DEBU 1146 0xc0011595a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.429 UTC [cauthdsl] func2 -> DEBU 1147 0xc0011595a0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.429 UTC [cauthdsl] func2 -> DEBU 1148 0xc0011595a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:54.429 UTC [cauthdsl] func2 -> DEBU 1149 0xc0011595a0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.429 UTC [cauthdsl] func1 -> DEBU 114a 0xc0011595a0 gate 1556789274428653300 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.429 UTC [policies] Evaluate -> DEBU 114b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.429 UTC [policies] Evaluate -> DEBU 114c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.429 UTC [policies] func1 -> DEBU 114d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 114e Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 114f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 1150 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 1151 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 1152 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.430 UTC [cauthdsl] func1 -> DEBU 1153 0xc0011284d0 gate 1556789274430638000 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.430 UTC [cauthdsl] func2 -> DEBU 1154 0xc0011284d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.430 UTC [cauthdsl] func2 -> DEBU 1155 0xc0011284d0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.431 UTC [cauthdsl] func2 -> DEBU 1156 0xc0011284d0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:54.431 UTC [msp.identity] Verify -> DEBU 1157 Verify: digest = 00000000 fa 9f 56 4a 61 78 23 71 18 54 ca 8c d6 4b e9 48 |..VJax#q.T...K.H| +orderer0.example.com | 00000010 2f 5e 22 d0 f9 62 4c 3b 8c 9b 10 d1 33 7f 34 3a |/^"..bL;....3.4:|" +orderer0.example.com | "2019-05-02 09:27:54.431 UTC [msp.identity] Verify -> DEBU 1158 Verify: sig = 00000000 30 44 02 20 59 d9 de 5b 8f 1f 0b 38 a6 5c 63 26 |0D. Y..[...8.\c&| +orderer0.example.com | 00000010 51 62 e2 38 99 b4 3a ec 62 27 0d f4 da 24 59 c0 |Qb.8..:.b'...$Y.| +orderer0.example.com | 00000020 16 60 8a da 02 20 0a 41 34 24 b9 89 51 54 c6 e3 |.`... .A4$..QT..| +orderer0.example.com | 00000030 20 4e f8 17 97 96 bc 41 bb 68 f2 d5 05 1d 75 24 | N.....A.h....u$| +orderer0.example.com | 00000040 3f b8 bc d5 9a 20 |?.... |" +orderer0.example.com | "2019-05-02 09:27:54.432 UTC [cauthdsl] func2 -> DEBU 1159 0xc0011284d0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:54.432 UTC [cauthdsl] func1 -> DEBU 115a 0xc0011284d0 gate 1556789274430638000 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:54.432 UTC [policies] Evaluate -> DEBU 115b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 1160 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:54.433 UTC [common.deliver] deliverBlocks -> DEBU 1161 [channel: businesschannel] Received seekInfo (0xc0010ce580) start: > stop: > from 172.18.0.8:57366" +orderer0.example.com | "2019-05-02 09:27:54.434 UTC [fsblkstorage] Next -> DEBU 1162 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:54.434 UTC [fsblkstorage] newBlockfileStream -> DEBU 1163 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80790]" +orderer0.example.com | "2019-05-02 09:27:54.434 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1164 Remaining bytes=[17875], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:54.434 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1165 Returning blockbytes - length=[5709], placementInfo={fileNum=[0], startOffset=[80790], bytesOffset=[80792]}" +orderer0.example.com | "2019-05-02 09:27:54.434 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1166 blockbytes [5709] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:54.434 UTC [common.deliver] deliverBlocks -> DEBU 1167 [channel: businesschannel] Delivering block [5] for (0xc0010ce580) for 172.18.0.8:57366" +orderer0.example.com | "2019-05-02 09:27:54.435 UTC [common.deliver] deliverBlocks -> DEBU 1168 [channel: businesschannel] Done delivering to 172.18.0.8:57366 for (0xc0010ce580)" +orderer0.example.com | "2019-05-02 09:27:54.435 UTC [common.deliver] Handle -> DEBU 1169 Waiting for new SeekInfo from 172.18.0.8:57366" +orderer0.example.com | "2019-05-02 09:27:54.435 UTC [common.deliver] Handle -> DEBU 116a Attempting to read seek info message from 172.18.0.8:57366" +orderer0.example.com | "2019-05-02 09:27:54.444 UTC [grpc] infof -> DEBU 116b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:54.444 UTC [common.deliver] Handle -> WARN 116c Error reading from 172.18.0.8:57366: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:54.444 UTC [orderer.common.server] func1 -> DEBU 116d Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:54.444 UTC [comm.grpc.server] 1 -> INFO 116e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57366 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.3445ms +orderer0.example.com | "2019-05-02 09:27:54.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116f Sending msg of 28 bytes to 2 on channel businesschannel took 64.3µs" +orderer0.example.com | "2019-05-02 09:27:54.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1170 Sending msg of 28 bytes to 3 on channel businesschannel took 9.7µs" +orderer0.example.com | "2019-05-02 09:27:54.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1171 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 425.3µs " +orderer0.example.com | "2019-05-02 09:27:54.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1172 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:54.455 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1173 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.6394ms " +orderer0.example.com | "2019-05-02 09:27:54.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1174 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:54.648 UTC [orderer.common.server] Deliver -> DEBU 1175 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:54.649 UTC [common.deliver] Handle -> DEBU 1176 Starting new deliver loop for 172.18.0.8:57368" +orderer0.example.com | "2019-05-02 09:27:54.649 UTC [common.deliver] Handle -> DEBU 1177 Attempting to read seek info message from 172.18.0.8:57368" +orderer0.example.com | "2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 1178 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 1179 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 117a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 117b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 117c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.652 UTC [cauthdsl] func1 -> DEBU 117d 0xc0011171d0 gate 1556789274652048300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.652 UTC [cauthdsl] func2 -> DEBU 117e 0xc0011171d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.652 UTC [cauthdsl] func2 -> DEBU 117f 0xc0011171d0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.652 UTC [cauthdsl] func2 -> DEBU 1180 0xc0011171d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:54.653 UTC [cauthdsl] func2 -> DEBU 1181 0xc0011171d0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.653 UTC [cauthdsl] func1 -> DEBU 1182 0xc0011171d0 gate 1556789274652048300 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.653 UTC [policies] Evaluate -> DEBU 1183 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.653 UTC [policies] Evaluate -> DEBU 1184 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.653 UTC [policies] Evaluate -> DEBU 1185 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.654 UTC [cauthdsl] func1 -> DEBU 1186 0xc001117a10 gate 1556789274654438400 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.654 UTC [cauthdsl] func2 -> DEBU 1187 0xc001117a10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.654 UTC [cauthdsl] func2 -> DEBU 1188 0xc001117a10 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.655 UTC [cauthdsl] func2 -> DEBU 1189 0xc001117a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:54.656 UTC [cauthdsl] func2 -> DEBU 118a 0xc001117a10 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.656 UTC [cauthdsl] func1 -> DEBU 118b 0xc001117a10 gate 1556789274654438400 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.656 UTC [policies] Evaluate -> DEBU 118c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.657 UTC [policies] Evaluate -> DEBU 118d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.657 UTC [policies] func1 -> DEBU 118e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:54.658 UTC [policies] Evaluate -> DEBU 118f Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:54.658 UTC [policies] Evaluate -> DEBU 1190 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:54.658 UTC [policies] Evaluate -> DEBU 1191 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.659 UTC [policies] Evaluate -> DEBU 1192 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.659 UTC [policies] Evaluate -> DEBU 1193 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.660 UTC [cauthdsl] func1 -> DEBU 1194 0xc0010f4880 gate 1556789274660009600 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.660 UTC [cauthdsl] func2 -> DEBU 1195 0xc0010f4880 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.661 UTC [cauthdsl] func2 -> DEBU 1196 0xc0010f4880 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.661 UTC [cauthdsl] func2 -> DEBU 1197 0xc0010f4880 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.199 UTC [gossip.discovery] handleAliveMessage -> DEBU fe8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.200 UTC [gossip.discovery] learnExistingMembers -> DEBU fe9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [gossip.gossip] handleMessage -> DEBU fea Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [gossip.pull] HandleMessage -> DEBU feb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [msp] DeserializeIdentity -> DEBU fec Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [msp] DeserializeIdentity -> DEBU fed Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.202 UTC [gossip.discovery] learnExistingMembers -> DEBU fee updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 " +peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [gossip.discovery] learnExistingMembers -> DEBU fef Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 " +peer0.org1.example.com | "2019-05-02 09:27:29.207 UTC [gossip.discovery] learnExistingMembers -> DEBU ff0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.discovery] learnExistingMembers -> DEBU ff1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.discovery] handleAliveMessage -> DEBU ff2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.discovery] handleMsgFromComm -> DEBU ff3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.pull] SendDigest -> DEBU ff8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.gossip] handleMessage -> DEBU ff9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.gossip] handleMessage -> DEBU ffa Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.208 UTC [gossip.gossip] handleMessage -> DEBU ffb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [gossip.discovery] handleMsgFromComm -> DEBU ffc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ffd Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [msp] DeserializeIdentity -> DEBU ffe Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1000 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1001 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 1002 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 1003 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 1004 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func1 -> DEBU 1005 0xc003775070 gate 1556789249209634900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1006 0xc003775070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1007 0xc003775070 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1008 0xc003775070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1009 0xc003775070 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [cauthdsl] func1 -> DEBU 100a 0xc003775070 gate 1556789249209634900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 100b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 100c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [policies] Evaluate -> DEBU 100d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [cauthdsl] func1 -> DEBU 100e 0xc0037758d0 gate 1556789249210063700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [cauthdsl] func2 -> DEBU 100f 0xc0037758d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [cauthdsl] func2 -> DEBU 1010 0xc0037758d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [cauthdsl] func2 -> DEBU 1011 0xc0037758d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [msp.identity] Verify -> DEBU 1012 Verify: digest = 00000000 eb f5 bd ff 26 ad b2 3c 7b f7 6b 73 2a f6 0c 88 |....&..<{.ks*...| +peer0.org1.example.com | 00000010 ed 78 44 d8 65 33 ad a9 ad 21 3d f0 b8 9a dc 10 |.xD.e3...!=.....|" +peer0.org1.example.com | "2019-05-02 09:27:29.210 UTC [msp.identity] Verify -> DEBU 1013 Verify: sig = 00000000 30 45 02 21 00 e4 e0 5f e3 3d 0d 98 50 3f 8d bb |0E.!..._.=..P?..| +peer0.org1.example.com | 00000010 4c 91 91 a1 8e bf 0e bd 7c 4e c3 92 a6 dd a5 1d |L.......|N......| +peer0.org1.example.com | 00000020 f9 bf cc e0 65 02 20 70 70 88 ef 3c 74 11 6f 29 |....e. pp.. DEBU 1014 0xc0037758d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.211 UTC [cauthdsl] func1 -> DEBU 1015 0xc0037758d0 gate 1556789249210063700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:29.211 UTC [policies] Evaluate -> DEBU 1016 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.211 UTC [policies] Evaluate -> DEBU 1017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.212 UTC [policies] Evaluate -> DEBU 1018 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.212 UTC [policies] Evaluate -> DEBU 1019 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:29.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 101a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 101b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:29.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 101c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 " +peer0.org1.example.com | "2019-05-02 09:27:29.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 101d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 " +peer0.org1.example.com | "2019-05-02 09:27:29.214 UTC [gossip.discovery] learnExistingMembers -> DEBU 101e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:29.214 UTC [gossip.discovery] learnExistingMembers -> DEBU 101f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.214 UTC [gossip.discovery] handleAliveMessage -> DEBU 1020 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.215 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1021 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.215 UTC [gossip.discovery] sendMemResponse -> DEBU 1022 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:29.215 UTC [msp] DeserializeIdentity -> DEBU 1023 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.216 UTC [msp] DeserializeIdentity -> DEBU 1024 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.216 UTC [msp] DeserializeIdentity -> DEBU 1025 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.218 UTC [gossip.comm] Send -> DEBU 1026 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.218 UTC [gossip.discovery] sendMemResponse -> DEBU 1027 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:29.219 UTC [msp] DeserializeIdentity -> DEBU 1028 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.219 UTC [msp] DeserializeIdentity -> DEBU 1029 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:54.661 UTC [msp.identity] Verify -> DEBU 1198 Verify: digest = 00000000 c0 d3 e5 e2 7c 29 f6 1c f9 28 a0 eb e6 53 e5 1c |....|)...(...S..| +orderer0.example.com | 00000010 47 f3 b1 51 60 48 cb 43 a7 76 36 4a e3 b2 cf 7a |G..Q`H.C.v6J...z|" +orderer0.example.com | "2019-05-02 09:27:54.662 UTC [msp.identity] Verify -> DEBU 1199 Verify: sig = 00000000 30 44 02 20 51 63 13 2e 65 a6 20 3e b8 41 2c 04 |0D. Qc..e. >.A,.| +orderer0.example.com | 00000010 d1 01 ed ab 52 e4 3c e1 08 28 f4 22 b0 a9 b6 c1 |....R.<..(."....| +orderer0.example.com | 00000020 3d 8d a1 55 02 20 03 2e dd 55 14 c6 dd e6 97 4d |=..U. ...U.....M| +orderer0.example.com | 00000030 1a ed f8 cf ba 2b 69 b1 24 5f 53 af 2a 99 76 11 |.....+i.$_S.*.v.| +orderer0.example.com | 00000040 41 1b 72 54 51 88 |A.rTQ.|" +orderer0.example.com | "2019-05-02 09:27:54.663 UTC [cauthdsl] func2 -> DEBU 119a 0xc0010f4880 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:54.663 UTC [cauthdsl] func1 -> DEBU 119b 0xc0010f4880 gate 1556789274660009600 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:54.663 UTC [policies] Evaluate -> DEBU 119c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:54.664 UTC [policies] Evaluate -> DEBU 119d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:54.665 UTC [policies] Evaluate -> DEBU 119e Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:54.665 UTC [policies] Evaluate -> DEBU 119f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:54.666 UTC [policies] Evaluate -> DEBU 11a0 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:54.667 UTC [policies] Evaluate -> DEBU 11a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:54.668 UTC [common.deliver] deliverBlocks -> DEBU 11a2 [channel: businesschannel] Received seekInfo (0xc0010cf5c0) start: > stop: > from 172.18.0.8:57368" +orderer0.example.com | "2019-05-02 09:27:54.669 UTC [fsblkstorage] Next -> DEBU 11a3 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:54.669 UTC [fsblkstorage] newBlockfileStream -> DEBU 11a4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86501]" +orderer0.example.com | "2019-05-02 09:27:54.669 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11a5 Remaining bytes=[12164], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:54.669 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11a6 Returning blockbytes - length=[4060], placementInfo={fileNum=[0], startOffset=[86501], bytesOffset=[86503]}" +orderer0.example.com | "2019-05-02 09:27:54.669 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11a7 blockbytes [4060] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:54.670 UTC [common.deliver] deliverBlocks -> DEBU 11a8 [channel: businesschannel] Delivering block [6] for (0xc0010cf5c0) for 172.18.0.8:57368" +orderer0.example.com | "2019-05-02 09:27:54.671 UTC [common.deliver] deliverBlocks -> DEBU 11a9 [channel: businesschannel] Done delivering to 172.18.0.8:57368 for (0xc0010cf5c0)" +orderer0.example.com | "2019-05-02 09:27:54.672 UTC [common.deliver] Handle -> DEBU 11aa Waiting for new SeekInfo from 172.18.0.8:57368" +orderer0.example.com | "2019-05-02 09:27:54.673 UTC [common.deliver] Handle -> DEBU 11ab Attempting to read seek info message from 172.18.0.8:57368" +orderer0.example.com | "2019-05-02 09:27:54.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ac Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:54.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ad Sending msg of 28 bytes to 3 on channel testchainid took 134.4µs" +orderer0.example.com | "2019-05-02 09:27:54.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.1µs " +orderer0.example.com | "2019-05-02 09:27:54.682 UTC [common.deliver] Handle -> WARN 11af Error reading from 172.18.0.8:57368: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:54.682 UTC [orderer.common.server] func1 -> DEBU 11b0 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:54.682 UTC [comm.grpc.server] 1 -> INFO 11b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57368 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.6064ms +orderer0.example.com | "2019-05-02 09:27:54.681 UTC [grpc] infof -> DEBU 11b2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:54.870 UTC [orderer.common.server] Deliver -> DEBU 11b3 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:54.870 UTC [common.deliver] Handle -> DEBU 11b4 Starting new deliver loop for 172.18.0.8:57370" +orderer0.example.com | "2019-05-02 09:27:54.870 UTC [common.deliver] Handle -> DEBU 11b5 Attempting to read seek info message from 172.18.0.8:57370" +orderer0.example.com | "2019-05-02 09:27:54.871 UTC [policies] Evaluate -> DEBU 11b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.871 UTC [policies] Evaluate -> DEBU 11b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.871 UTC [policies] Evaluate -> DEBU 11b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.872 UTC [policies] Evaluate -> DEBU 11b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.872 UTC [policies] Evaluate -> DEBU 11ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.872 UTC [cauthdsl] func1 -> DEBU 11bb 0xc0010e2fc0 gate 1556789274872258100 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11bc 0xc0010e2fc0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11bd 0xc0010e2fc0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11be 0xc0010e2fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11bf 0xc0010e2fc0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func1 -> DEBU 11c0 0xc0010e2fc0 gate 1556789274872258100 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.873 UTC [policies] Evaluate -> DEBU 11c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.873 UTC [policies] Evaluate -> DEBU 11c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.873 UTC [policies] Evaluate -> DEBU 11c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func1 -> DEBU 11c4 0xc0010e3800 gate 1556789274873552600 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c5 0xc0010e3800 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c6 0xc0010e3800 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0010e3800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c8 0xc0010e3800 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.874 UTC [cauthdsl] func1 -> DEBU 11c9 0xc0010e3800 gate 1556789274873552600 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:54.874 UTC [policies] Evaluate -> DEBU 11ca Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.874 UTC [policies] Evaluate -> DEBU 11cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:54.874 UTC [policies] func1 -> DEBU 11cc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11cd Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11d1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:54.876 UTC [cauthdsl] func1 -> DEBU 11d2 0xc0010d24f0 gate 1556789274876175000 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:54.876 UTC [cauthdsl] func2 -> DEBU 11d3 0xc0010d24f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:54.876 UTC [cauthdsl] func2 -> DEBU 11d4 0xc0010d24f0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:54.876 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0010d24f0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:54.877 UTC [msp.identity] Verify -> DEBU 11d6 Verify: digest = 00000000 f9 ed 45 d2 7d dc 66 16 10 b0 82 7b 45 1a c1 90 |..E.}.f....{E...| +orderer0.example.com | 00000010 03 8c f4 ce 07 32 ad 13 37 53 e3 5f 2d 1b 23 88 |.....2..7S._-.#.|" +orderer0.example.com | "2019-05-02 09:27:54.877 UTC [msp.identity] Verify -> DEBU 11d7 Verify: sig = 00000000 30 44 02 20 34 be bb 83 0d 7c af 8d ce 15 82 4e |0D. 4....|.....N| +orderer0.example.com | 00000010 53 a7 58 f9 2e 5b c7 a4 d4 e9 33 4a 54 ee 20 84 |S.X..[....3JT. .| +orderer0.example.com | 00000020 24 8b 8d 4d 02 20 77 70 3d 6f e8 51 21 ed 20 c7 |$..M. wp=o.Q!. .| +orderer0.example.com | 00000030 2d 76 45 c7 98 41 bd cc 44 cc a3 ff b6 b1 c5 67 |-vE..A..D......g| +orderer0.example.com | 00000040 28 af 00 9e ad bc |(.....|" +orderer0.example.com | "2019-05-02 09:27:54.877 UTC [cauthdsl] func2 -> DEBU 11d8 0xc0010d24f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:54.877 UTC [cauthdsl] func1 -> DEBU 11d9 0xc0010d24f0 gate 1556789274876175000 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11da Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11db == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11dc Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11de Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:54.878 UTC [common.deliver] deliverBlocks -> DEBU 11e0 [channel: businesschannel] Received seekInfo (0xc0010cfb80) start: > stop: > from 172.18.0.8:57370" +orderer0.example.com | "2019-05-02 09:27:54.879 UTC [fsblkstorage] Next -> DEBU 11e1 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:54.879 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90563]" +orderer0.example.com | "2019-05-02 09:27:54.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e3 Remaining bytes=[8102], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:54.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e4 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[90563], bytesOffset=[90565]}" +orderer0.example.com | "2019-05-02 09:27:54.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e5 blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:54.880 UTC [common.deliver] deliverBlocks -> DEBU 11e6 [channel: businesschannel] Delivering block [7] for (0xc0010cfb80) for 172.18.0.8:57370" +orderer0.example.com | "2019-05-02 09:27:54.880 UTC [common.deliver] deliverBlocks -> DEBU 11e7 [channel: businesschannel] Done delivering to 172.18.0.8:57370 for (0xc0010cfb80)" +orderer0.example.com | "2019-05-02 09:27:54.880 UTC [common.deliver] Handle -> DEBU 11e8 Waiting for new SeekInfo from 172.18.0.8:57370" +orderer0.example.com | "2019-05-02 09:27:54.880 UTC [common.deliver] Handle -> DEBU 11e9 Attempting to read seek info message from 172.18.0.8:57370" +orderer0.example.com | "2019-05-02 09:27:54.888 UTC [grpc] infof -> DEBU 11ea transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:54.889 UTC [common.deliver] Handle -> WARN 11eb Error reading from 172.18.0.8:57370: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:54.889 UTC [orderer.common.server] func1 -> DEBU 11ec Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:54.889 UTC [comm.grpc.server] 1 -> INFO 11ed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57370 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6047ms +orderer0.example.com | "2019-05-02 09:27:54.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ee Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" +orderer0.example.com | "2019-05-02 09:27:54.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ef Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-05-02 09:27:54.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 975µs " +orderer0.example.com | "2019-05-02 09:27:54.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.8µs " +orderer0.example.com | "2019-05-02 09:27:54.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:54.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:55.073 UTC [orderer.common.server] Deliver -> DEBU 11f4 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:55.073 UTC [common.deliver] Handle -> DEBU 11f5 Starting new deliver loop for 172.18.0.8:57372" +orderer0.example.com | "2019-05-02 09:27:55.073 UTC [common.deliver] Handle -> DEBU 11f6 Attempting to read seek info message from 172.18.0.8:57372" +peer0.org1.example.com | "2019-05-02 09:27:29.219 UTC [gossip.comm] sendToEndpoint -> DEBU 102a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 102b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.220 UTC [msp] DeserializeIdentity -> DEBU 102c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.220 UTC [msp] DeserializeIdentity -> DEBU 102d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.221 UTC [msp] DeserializeIdentity -> DEBU 102f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.222 UTC [msp] DeserializeIdentity -> DEBU 1030 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.222 UTC [gossip.comm] Send -> DEBU 1031 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.222 UTC [msp] DeserializeIdentity -> DEBU 1032 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.222 UTC [msp] DeserializeIdentity -> DEBU 1033 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.222 UTC [gossip.comm] func1 -> DEBU 1034 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.223 UTC [gossip.comm] Send -> DEBU 1035 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:29.223 UTC [gossip.comm] sendToEndpoint -> DEBU 1036 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.223 UTC [gossip.comm] sendToEndpoint -> DEBU 1037 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.221 UTC [gossip.gossip] handleMessage -> DEBU 102e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.gossip] handleMessage -> DEBU 1038 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.gossip] handleMessage -> DEBU 1039 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.gossip] handleMessage -> DEBU 103e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.comm] sendToEndpoint -> DEBU 103f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:29.224 UTC [gossip.comm] sendToEndpoint -> DEBU 1040 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1041 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1042 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [policies] Evaluate -> DEBU 1043 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [policies] Evaluate -> DEBU 1044 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [policies] Evaluate -> DEBU 1045 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [msp] DeserializeIdentity -> DEBU 1046 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [msp.identity] newIdentity -> DEBU 1047 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO +peer0.org1.example.com | CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM +peer0.org1.example.com | SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q +peer0.org1.example.com | 1A== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [cauthdsl] func1 -> DEBU 1048 0xc003828ef0 gate 1556789249993801100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [cauthdsl] func2 -> DEBU 1049 0xc003828ef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [cauthdsl] func2 -> DEBU 104a 0xc003828ef0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:29.993 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 104b Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [msp] Validate -> DEBU 104c MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [cauthdsl] func2 -> DEBU 104d 0xc003828ef0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [msp.identity] Verify -> DEBU 104e Verify: digest = 00000000 c9 bd 12 d3 d2 07 29 01 a6 20 32 de 2d c6 dc f5 |......).. 2.-...| +peer0.org1.example.com | 00000010 f4 0e 6f 90 a3 69 ba 40 c6 0c 58 ee 7f ee 0d 6b |..o..i.@..X....k|" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [msp.identity] Verify -> DEBU 104f Verify: sig = 00000000 30 44 02 20 09 7d 08 a8 ac 23 13 65 98 37 14 9b |0D. .}...#.e.7..| +peer0.org1.example.com | 00000010 18 ab 5a 5c 08 57 7a ef eb cf 15 e5 3c 2c f1 d4 |..Z\.Wz.....<,..| +peer0.org1.example.com | 00000020 94 d0 b8 9e 02 20 5a b3 fb a2 36 7c 33 b6 12 3d |..... Z...6|3..=| +peer0.org1.example.com | 00000030 8d 54 03 97 19 8e d8 21 48 1e 82 bc 84 64 bf 3b |.T.....!H....d.;| +peer0.org1.example.com | 00000040 11 96 e1 22 ef 6f |...".o|" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [cauthdsl] func2 -> DEBU 1050 0xc003828ef0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [cauthdsl] func1 -> DEBU 1051 0xc003828ef0 gate 1556789249993801100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1052 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1053 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1054 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1055 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [blocksProvider] DeliverBlocks -> DEBU 1056 [businesschannel] Adding payload to local buffer, blockNum = [3]" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [gossip.state] addPayload -> DEBU 1057 [businesschannel] Adding payload to local buffer, blockNum = [3]" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [gossip.state] addPayload -> DEBU 1058 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [blocksProvider] DeliverBlocks -> DEBU 1059 [businesschannel] Gossiping block [3], peers number [3]" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [gossip.channel] AddToMsgStore -> DEBU 105a Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4723 bytes, seq: 3}, Envelope: 4753 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [gossip.pull] Add -> DEBU 105b Added 3, total items: 3" +peer0.org1.example.com | "2019-05-02 09:27:29.994 UTC [gossip.state] deliverPayloads -> DEBU 105c [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [gossip.state] deliverPayloads -> DEBU 105d [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [gossip.privdata] StoreBlock -> INFO 105e [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [gossip.privdata] StoreBlock -> DEBU 105f [businesschannel] Validating block [3]" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [committer.txvalidator] Validate -> DEBU 1060 [businesschannel] START Block Validation for block [3]" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [committer.txvalidator] Validate -> DEBU 1061 expecting 1 block validation responses" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [committer.txvalidator] validateTx -> DEBU 1062 [businesschannel] validateTx starts for block 0xc0027182c0 env 0xc002d40690 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] ValidateTransaction -> DEBU 1063 ValidateTransactionEnvelope starts for envelope 0xc002d40690" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] ValidateTransaction -> DEBU 1064 Header is channel_header:"\010\003\032\014\010\377\357\252\346\005\020\210\260\354\266\003\"\017businesschannel*@fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\232\265\007i\241\311>\021 DEBU 1065 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 1066 begin" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [msp] GetManagerForChain -> DEBU 1067 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 1068 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 1069 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [msp.identity] Verify -> DEBU 106a Verify: digest = 00000000 4d e3 34 38 46 86 b5 a2 c5 08 2a 3d 74 f1 7b 3d |M.48F.....*=t.{=| +peer0.org1.example.com | 00000010 ca d3 8e 76 16 ce 7f b2 7b 9b 62 8e 0f 55 ae ee |...v....{.b..U..|" +peer0.org1.example.com | "2019-05-02 09:27:29.995 UTC [msp.identity] Verify -> DEBU 106b Verify: sig = 00000000 30 45 02 21 00 84 a6 c2 9c 60 54 00 ed 04 97 bd |0E.!.....`T.....| +peer0.org1.example.com | 00000010 e7 ef 54 53 c3 59 d9 32 03 66 c2 4e f0 dc 25 6e |..TS.Y.2.f.N..%n| +peer0.org1.example.com | 00000020 46 06 2e 6b 5e 02 20 34 53 a9 96 44 6f f9 5d 5e |F..k^. 4S..Do.]^| +peer0.org1.example.com | 00000030 5f cc e9 c0 33 db 1b 44 95 d1 cd 17 d4 7d a0 a3 |_...3..D.....}..| +peer0.org1.example.com | 00000040 fa b9 0d de c0 80 62 |......b|" +peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [protoutils] checkSignatureFromCreator -> DEBU 106c exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [protoutils] validateEndorserTransaction -> DEBU 106d validateEndorserTransaction starts for data 0xc00217aa80, header channel_header:"\010\003\032\014\010\377\357\252\346\005\020\210\260\354\266\003\"\017businesschannel*@fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\232\265\007i\241\311>\021 DEBU 106e validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [protoutils] validateEndorserTransaction -> DEBU 106f validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [protoutils] ValidateTransaction -> DEBU 1070 ValidateTransactionEnvelope returns err %!s()" +orderer0.example.com | "2019-05-02 09:27:55.075 UTC [policies] Evaluate -> DEBU 11f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.075 UTC [policies] Evaluate -> DEBU 11f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.075 UTC [policies] Evaluate -> DEBU 11f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.076 UTC [policies] Evaluate -> DEBU 11fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.076 UTC [policies] Evaluate -> DEBU 11fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.076 UTC [cauthdsl] func1 -> DEBU 11fc 0xc0010b29d0 gate 1556789275076391100 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:55.076 UTC [cauthdsl] func2 -> DEBU 11fd 0xc0010b29d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:55.077 UTC [cauthdsl] func2 -> DEBU 11fe 0xc0010b29d0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:55.077 UTC [cauthdsl] func2 -> DEBU 11ff 0xc0010b29d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:55.077 UTC [cauthdsl] func2 -> DEBU 1200 0xc0010b29d0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:55.077 UTC [cauthdsl] func1 -> DEBU 1201 0xc0010b29d0 gate 1556789275076391100 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:55.077 UTC [policies] Evaluate -> DEBU 1202 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:55.077 UTC [policies] Evaluate -> DEBU 1203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:55.077 UTC [policies] Evaluate -> DEBU 1204 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func1 -> DEBU 1205 0xc0010b3330 gate 1556789275077999500 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1206 0xc0010b3330 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1207 0xc0010b3330 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1208 0xc0010b3330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1209 0xc0010b3330 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:27:55.078 UTC [cauthdsl] func1 -> DEBU 120a 0xc0010b3330 gate 1556789275077999500 evaluation fails" +orderer0.example.com | "2019-05-02 09:27:55.078 UTC [policies] Evaluate -> DEBU 120b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:55.078 UTC [policies] Evaluate -> DEBU 120c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:27:55.078 UTC [policies] func1 -> DEBU 120d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 120e Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 120f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 1210 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 1211 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 1212 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.079 UTC [cauthdsl] func1 -> DEBU 1213 0xc001094020 gate 1556789275079836300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:55.079 UTC [cauthdsl] func2 -> DEBU 1214 0xc001094020 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:55.080 UTC [cauthdsl] func2 -> DEBU 1215 0xc001094020 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:55.080 UTC [cauthdsl] func2 -> DEBU 1216 0xc001094020 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:55.080 UTC [msp.identity] Verify -> DEBU 1217 Verify: digest = 00000000 5d 72 74 87 aa 9b 16 3c e5 61 26 08 88 d7 3f 07 |]rt....<.a&...?.| +orderer0.example.com | 00000010 ee eb 9d be 0f a5 6b 62 55 db e9 32 06 81 59 2c |......kbU..2..Y,|" +orderer0.example.com | "2019-05-02 09:27:55.080 UTC [msp.identity] Verify -> DEBU 1218 Verify: sig = 00000000 30 45 02 21 00 b1 d8 d3 d7 0c 64 ce a2 b4 31 73 |0E.!......d...1s| +orderer0.example.com | 00000010 10 b7 ad 1a 51 97 52 0f bd f5 e1 f8 3c 46 b7 50 |....Q.R..... DEBU 1219 0xc001094020 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:55.080 UTC [cauthdsl] func1 -> DEBU 121a 0xc001094020 gate 1556789275079836300 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 1220 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.081 UTC [common.deliver] deliverBlocks -> DEBU 1221 [channel: businesschannel] Received seekInfo (0xc001190b80) start: > stop: > from 172.18.0.8:57372" +orderer0.example.com | "2019-05-02 09:27:55.082 UTC [fsblkstorage] Next -> DEBU 1222 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-05-02 09:27:55.082 UTC [fsblkstorage] newBlockfileStream -> DEBU 1223 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]" +orderer0.example.com | "2019-05-02 09:27:55.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1224 Remaining bytes=[4051], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:55.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1225 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}" +orderer0.example.com | "2019-05-02 09:27:55.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1226 blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:55.082 UTC [common.deliver] deliverBlocks -> DEBU 1227 [channel: businesschannel] Delivering block [8] for (0xc001190b80) for 172.18.0.8:57372" +peer0.org1.example.com | "2019-05-02 09:27:29.996 UTC [committer.txvalidator] validateTx -> DEBU 1071 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:29.997 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1072 retrieveTransactionByID() - txId = [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +peer0.org1.example.com | "2019-05-02 09:27:29.998 UTC [committer.txvalidator] validateTx -> DEBU 1073 Validating transaction with plugins" +peer0.org1.example.com | "2019-05-02 09:27:29.999 UTC [committer.txvalidator] Dispatch -> DEBU 1074 [businesschannel] Dispatch starts for bytes 0xc00217d000" +peer0.org1.example.com | "2019-05-02 09:27:30.001 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1075 constructing new query executor txid = [3376978c-42b4-4f4d-894e-11a19df7b970]" +peer0.org1.example.com | "2019-05-02 09:27:30.002 UTC [lockbasedtxmgr] Done -> DEBU 1076 Done with transaction simulation / query execution [3376978c-42b4-4f4d-894e-11a19df7b970]" +peer0.org1.example.com | "2019-05-02 09:27:30.002 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 1077 Validating Tx fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-05-02 09:27:30.006 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1078 constructing new query executor txid = [438fb3c7-59f2-4867-90a3-7004d636656c]" +peer0.org1.example.com | "2019-05-02 09:27:30.006 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1079 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:30.007 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 107a retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:30.008 UTC [lockbasedtxmgr] Done -> DEBU 107b Done with transaction simulation / query execution [438fb3c7-59f2-4867-90a3-7004d636656c]" +peer0.org1.example.com | "2019-05-02 09:27:30.008 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 107c constructing new query executor txid = [89a04705-8d4b-4e7e-99b1-2a54bf193f0c]" +peer0.org1.example.com | "2019-05-02 09:27:30.008 UTC [lockbasedtxmgr] Done -> DEBU 107d Done with transaction simulation / query execution [89a04705-8d4b-4e7e-99b1-2a54bf193f0c]" +peer0.org1.example.com | "2019-05-02 09:27:30.009 UTC [policies] Evaluate -> DEBU 107e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" +peer0.org1.example.com | "2019-05-02 09:27:30.010 UTC [msp] DeserializeIdentity -> DEBU 107f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:30.011 UTC [msp.identity] newIdentity -> DEBU 1080 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:30.012 UTC [cauthdsl] func1 -> DEBU 1081 0xc0038aef40 gate 1556789250012196000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:30.012 UTC [cauthdsl] func2 -> DEBU 1082 0xc0038aef40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:30.012 UTC [cauthdsl] func2 -> DEBU 1083 0xc0038aef40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:30.012 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1084 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:27:30.013 UTC [msp] Validate -> DEBU 1085 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:30.013 UTC [msp] getCertificationChain -> DEBU 1086 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:30.013 UTC [cauthdsl] func2 -> DEBU 1087 0xc0038aef40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:30.014 UTC [msp.identity] Verify -> DEBU 1088 Verify: digest = 00000000 f6 ba d1 c1 e9 ae 67 52 1a 19 de 11 16 71 4e ee |......gR.....qN.| +peer0.org1.example.com | 00000010 2c a6 7c 45 4e 4b eb 9c c4 1b 90 91 65 fe 73 d4 |,.|ENK......e.s.|" +peer0.org1.example.com | "2019-05-02 09:27:30.015 UTC [msp.identity] Verify -> DEBU 1089 Verify: sig = 00000000 30 45 02 21 00 f1 91 b5 c8 e8 ee de 4c 2a 82 b1 |0E.!........L*..| +peer0.org1.example.com | 00000010 ff 7d b5 dd c8 dd 5e e8 2d e5 b8 01 cf 99 ef aa |.}....^.-.......| +peer0.org1.example.com | 00000020 28 93 90 d8 5a 02 20 79 0c 74 7a cc 1f 09 8b 10 |(...Z. y.tz.....| +peer0.org1.example.com | 00000030 bb 87 e8 a2 f0 91 99 fd d3 77 9d 25 71 28 29 af |.........w.%q().| +peer0.org1.example.com | 00000040 a2 ef 94 af 0a ad 75 |......u|" +peer0.org1.example.com | "2019-05-02 09:27:30.015 UTC [cauthdsl] func2 -> DEBU 108a 0xc0038aef40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:30.015 UTC [cauthdsl] func1 -> DEBU 108b 0xc0038aef40 gate 1556789250012196000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:30.015 UTC [policies] Evaluate -> DEBU 108c Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:30.015 UTC [policies] Evaluate -> DEBU 108d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 108e constructing new query executor txid = [971d2601-2a1a-4acd-9c5f-01ba1856704a]" +peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 108f retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1090 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] Done -> DEBU 1091 Done with transaction simulation / query execution [971d2601-2a1a-4acd-9c5f-01ba1856704a]" +peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1092 constructing new query executor txid = [a22dcb4a-1a7e-4378-854e-b6c0ab7b0079]" +peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1093 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +orderer0.example.com | "2019-05-02 09:27:55.082 UTC [common.deliver] deliverBlocks -> DEBU 1228 [channel: businesschannel] Done delivering to 172.18.0.8:57372 for (0xc001190b80)" +orderer0.example.com | "2019-05-02 09:27:55.083 UTC [common.deliver] Handle -> DEBU 1229 Waiting for new SeekInfo from 172.18.0.8:57372" +orderer0.example.com | "2019-05-02 09:27:55.083 UTC [common.deliver] Handle -> DEBU 122a Attempting to read seek info message from 172.18.0.8:57372" +orderer0.example.com | "2019-05-02 09:27:55.090 UTC [common.deliver] Handle -> WARN 122b Error reading from 172.18.0.8:57372: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:55.091 UTC [orderer.common.server] func1 -> DEBU 122d Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:55.091 UTC [comm.grpc.server] 1 -> INFO 122e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57372 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.5619ms +orderer0.example.com | "2019-05-02 09:27:55.090 UTC [grpc] infof -> DEBU 122c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:55.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:55.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +orderer0.example.com | "2019-05-02 09:27:55.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1231 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.1µs " +orderer0.example.com | "2019-05-02 09:27:55.310 UTC [orderer.common.server] Deliver -> DEBU 1232 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:55.310 UTC [common.deliver] Handle -> DEBU 1233 Starting new deliver loop for 172.18.0.8:57374" +orderer0.example.com | "2019-05-02 09:27:55.310 UTC [common.deliver] Handle -> DEBU 1234 Attempting to read seek info message from 172.18.0.8:57374" +orderer0.example.com | "2019-05-02 09:27:55.312 UTC [policies] Evaluate -> DEBU 1235 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.312 UTC [policies] Evaluate -> DEBU 1236 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.313 UTC [policies] Evaluate -> DEBU 1237 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.313 UTC [policies] Evaluate -> DEBU 1238 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.314 UTC [policies] Evaluate -> DEBU 1239 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.315 UTC [msp] DeserializeIdentity -> DEBU 123a Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:55.316 UTC [msp.identity] newIdentity -> DEBU 123b Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -13697,981 +13477,982 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:26.577 UTC [cauthdsl] func1 -> DEBU 1239 0xc000232200 gate 1556760686577722800 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:26.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:26.578 UTC [cauthdsl] func2 -> DEBU 123a 0xc000232200 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:26.585 UTC [cauthdsl] func2 -> DEBU 123c 0xc000232200 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:26.586 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 123d Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-05-02 01:31:26.586 UTC [msp] Validate -> DEBU 123e MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:31:26.588 UTC [cauthdsl] func2 -> DEBU 123f 0xc000232200 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:26.588 UTC [msp.identity] Verify -> DEBU 1240 Verify: digest = 00000000 12 84 cc d1 3a 3a 06 a5 ff 37 27 bf f1 db 04 f7 |....::...7'.....| -orderer0.example.com | 00000010 4c 60 b0 f0 4c ad 5f c8 e9 50 6b 17 64 4a 84 f0 |L`..L._..Pk.dJ..|" -orderer0.example.com | "2019-05-02 01:31:26.588 UTC [msp.identity] Verify -> DEBU 1241 Verify: sig = 00000000 30 45 02 21 00 c1 12 09 b6 d0 52 54 04 6e de 16 |0E.!......RT.n..| -orderer0.example.com | 00000010 3d ab 6c 39 d8 fd 04 20 80 f9 7a e5 01 5f 85 d0 |=.l9... ..z.._..| -orderer0.example.com | 00000020 f4 21 8b 16 c8 02 20 13 07 ce f6 45 83 46 a7 20 |.!.... ....E.F. | -orderer0.example.com | 00000030 c9 ed 72 34 e0 41 e9 f4 5f 63 8a f1 97 65 bc ec |..r4.A.._c...e..| -orderer0.example.com | 00000040 3f 9d 69 2f 15 7c af |?.i/.|.|" -orderer0.example.com | "2019-05-02 01:31:26.590 UTC [cauthdsl] func2 -> DEBU 1242 0xc000232200 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:26.591 UTC [cauthdsl] func1 -> DEBU 1243 0xc000232200 gate 1556760686577722800 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:26.592 UTC [policies] Evaluate -> DEBU 1244 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:26.593 UTC [policies] Evaluate -> DEBU 1245 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:26.594 UTC [policies] Evaluate -> DEBU 1246 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:26.594 UTC [policies] Evaluate -> DEBU 1247 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:26.594 UTC [policies] Evaluate -> DEBU 1248 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:26.595 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1249 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:26.595 UTC [policies] Evaluate -> DEBU 124a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:26.597 UTC [common.deliver] deliverBlocks -> DEBU 124b [channel: testchainid] Received seekInfo (0xc000088fc0) start: > stop: > from 192.168.240.9:47506" -orderer0.example.com | "2019-05-02 01:31:26.597 UTC [fsblkstorage] Next -> DEBU 124c Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:31:26.598 UTC [fsblkstorage] newBlockfileStream -> DEBU 124d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -orderer0.example.com | "2019-05-02 01:31:26.598 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 124e Remaining bytes=[25827], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:26.599 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 124f Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -orderer0.example.com | "2019-05-02 01:31:26.599 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1250 blockbytes [25824] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:26.600 UTC [common.deliver] deliverBlocks -> DEBU 1251 [channel: testchainid] Delivering block [1] for (0xc000088fc0) for 192.168.240.9:47506" -orderer0.example.com | "2019-05-02 01:31:26.601 UTC [common.deliver] deliverBlocks -> DEBU 1252 [channel: testchainid] Done delivering to 192.168.240.9:47506 for (0xc000088fc0)" -orderer0.example.com | "2019-05-02 01:31:26.601 UTC [common.deliver] Handle -> DEBU 1253 Waiting for new SeekInfo from 192.168.240.9:47506" -orderer0.example.com | "2019-05-02 01:31:26.602 UTC [common.deliver] Handle -> DEBU 1254 Attempting to read seek info message from 192.168.240.9:47506" -orderer0.example.com | "2019-05-02 01:31:26.611 UTC [common.deliver] Handle -> WARN 1255 Error reading from 192.168.240.9:47506: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:26.612 UTC [grpc] infof -> DEBU 1256 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:26.611 UTC [orderer.common.server] func1 -> DEBU 1257 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:26.615 UTC [comm.grpc.server] 1 -> INFO 1258 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47506 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=64.6606ms -orderer0.example.com | "2019-05-02 01:31:26.944 UTC [orderer.common.server] Deliver -> DEBU 1259 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:26.944 UTC [common.deliver] Handle -> DEBU 125a Starting new deliver loop for 192.168.240.9:47508" -orderer0.example.com | "2019-05-02 01:31:26.945 UTC [common.deliver] Handle -> DEBU 125b Attempting to read seek info message from 192.168.240.9:47508" -orderer0.example.com | "2019-05-02 01:31:26.947 UTC [policies] Evaluate -> DEBU 125c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:26.948 UTC [policies] Evaluate -> DEBU 125d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:26.948 UTC [policies] Evaluate -> DEBU 125e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:26.948 UTC [policies] Evaluate -> DEBU 125f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:26.948 UTC [policies] Evaluate -> DEBU 1260 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:26.948 UTC [cauthdsl] func1 -> DEBU 1261 0xc0008c1940 gate 1556760686948333600 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:26.949 UTC [cauthdsl] func2 -> DEBU 1262 0xc0008c1940 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | 00000010 08 97 14 85 6e e2 33 b3 90 2a 59 1d 0d 5f 29 25 |....n.3..*Y.._)%|" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [msp.identity] Verify -> DEBU 10e1 Verify: sig = 00000000 30 44 02 20 32 dc 2b 53 10 59 c1 1e 45 a5 bb d7 |0D. 2.+S.Y..E...| -peer0.org1.example.com | 00000010 8a 93 4e b6 9d 00 50 eb 41 44 b6 55 b2 20 4a a4 |..N...P.AD.U. J.| -peer0.org1.example.com | 00000020 47 d7 b1 e1 02 20 43 a0 ab d6 42 76 52 c7 09 71 |G.... C...BvR..q| -peer0.org1.example.com | 00000030 84 83 3f 21 74 47 0e ea 44 43 21 40 c2 2b 78 74 |..?!tG..DC!@.+xt| -peer0.org1.example.com | 00000040 d2 4e 49 5b 78 75 |.NI[xu|" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [cauthdsl] func2 -> DEBU 10e2 0xc002670fe0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [cauthdsl] func1 -> DEBU 10e3 0xc002670fe0 gate 1556760657755994800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [gossip.privdata] listMissingPrivateData -> DEBU 10e4 Retrieving private write sets for 1 transactions from transient store" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [transientstore] GetTxPvtRWSetByTxid -> DEBU 10e5 Getting private data from transient store for transaction 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a" -peer0.org1.example.com | "2019-05-02 01:30:57.756 UTC [leveldbhelper] GetIterator -> DEBU 10e6 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x34, 0x38, 0x66, 0x35, 0x62, 0x31, 0x62, 0x37, 0x31, 0x34, 0x62, 0x32, 0x37, 0x39, 0x61, 0x38, 0x63, 0x62, 0x61, 0x32, 0x31, 0x39, 0x65, 0x63, 0x65, 0x32, 0x34, 0x66, 0x34, 0x38, 0x35, 0x36, 0x30, 0x39, 0x34, 0x66, 0x34, 0x32, 0x37, 0x36, 0x35, 0x66, 0x33, 0x64, 0x35, 0x66, 0x36, 0x30, 0x33, 0x32, 0x66, 0x35, 0x37, 0x64, 0x61, 0x65, 0x39, 0x33, 0x31, 0x63, 0x66, 0x33, 0x32, 0x61, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x34, 0x38, 0x66, 0x35, 0x62, 0x31, 0x62, 0x37, 0x31, 0x34, 0x62, 0x32, 0x37, 0x39, 0x61, 0x38, 0x63, 0x62, 0x61, 0x32, 0x31, 0x39, 0x65, 0x63, 0x65, 0x32, 0x34, 0x66, 0x34, 0x38, 0x35, 0x36, 0x30, 0x39, 0x34, 0x66, 0x34, 0x32, 0x37, 0x36, 0x35, 0x66, 0x33, 0x64, 0x35, 0x66, 0x36, 0x30, 0x33, 0x32, 0x66, 0x35, 0x37, 0x64, 0x61, 0x65, 0x39, 0x33, 0x31, 0x63, 0x66, 0x33, 0x32, 0x61, 0xff}]" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [gossip.privdata] StoreBlock -> DEBU 10e7 [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [gossip.privdata] StoreBlock -> DEBU 10e8 [businesschannel] Added 1 namespace private write sets for block [3], tran [0]" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [kvledger] CommitWithPvtData -> DEBU 10e9 [businesschannel] Validating state for block [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10ea Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10eb lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10ec Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10ed ValidateAndPrepareBatch() for block number = [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10ee preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [valimpl] preprocessProtoBlock -> DEBU 10ef txType=ENDORSER_TRANSACTION" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [stateleveldb] GetState -> DEBU 10f0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [statebasedval] validateKVRead -> DEBU 10f1 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [stateleveldb] GetState -> DEBU 10f2 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" -peer0.org1.example.com | "2019-05-02 01:30:57.757 UTC [stateleveldb] GetState -> DEBU 10f3 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -peer0.org1.example.com | "2019-05-02 01:30:57.758 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 10f4 Block [3] Transaction index [0] TxId [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a] marked as valid by state validator. ContainsPostOrderWrites [false]" -peer0.org1.example.com | "2019-05-02 01:30:57.758 UTC [valinternal] ApplyWriteSet -> DEBU 10f5 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc00301fc00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc00301fcc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc00301fb80), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc00301fbc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4 DEBU 10f6 validating rwset..." -peer0.org1.example.com | "2019-05-02 01:30:57.759 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10f7 postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:30:57.759 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10f8 ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-05-02 01:30:57.759 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10f9 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0002ef220 0x27475e0 0xc000010ca8}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0025c18c0 map[]})]}" -peer0.org1.example.com | "2019-05-02 01:30:57.759 UTC [cceventmgmt] HandleStateUpdates -> DEBU 10fa Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" -peer0.org1.example.com | "2019-05-02 01:30:57.760 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 10fb Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" -peer0.org1.example.com | "2019-05-02 01:30:57.760 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10fc Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0})}" -orderer0.example.com | "2019-05-02 01:31:26.952 UTC [cauthdsl] func2 -> DEBU 1263 0xc0008c1940 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:26.953 UTC [cauthdsl] func2 -> DEBU 1264 0xc0008c1940 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:26.953 UTC [msp.identity] Verify -> DEBU 1265 Verify: digest = 00000000 c8 83 56 cd 29 32 1d 84 12 b4 86 97 a3 7d ea d7 |..V.)2.......}..| -orderer0.example.com | 00000010 d0 44 2c d9 69 c6 cc 37 51 c7 7f 3d 55 ad 58 ee |.D,.i..7Q..=U.X.|" -orderer0.example.com | "2019-05-02 01:31:26.953 UTC [msp.identity] Verify -> DEBU 1266 Verify: sig = 00000000 30 45 02 21 00 bd 09 41 be fa 21 2d b3 c7 68 6c |0E.!...A..!-..hl| -orderer0.example.com | 00000010 02 d2 5a 2e 2d 2c 78 e9 64 f0 90 a4 8d d3 8a aa |..Z.-,x.d.......| -orderer0.example.com | 00000020 fe b9 6c 0b 3f 02 20 6a dd f2 46 8a da e5 4e 34 |..l.?. j..F...N4| -orderer0.example.com | 00000030 f9 86 13 57 a4 0a be 6e c2 bb 24 f3 53 5a f0 ce |...W...n..$.SZ..| -orderer0.example.com | 00000040 b3 fc aa f6 e8 cc e0 |.......|" -orderer0.example.com | "2019-05-02 01:31:26.953 UTC [cauthdsl] func2 -> DEBU 1267 0xc0008c1940 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:26.953 UTC [cauthdsl] func1 -> DEBU 1268 0xc0008c1940 gate 1556760686948333600 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:26.953 UTC [policies] Evaluate -> DEBU 1269 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:26.954 UTC [policies] Evaluate -> DEBU 126a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:26.954 UTC [policies] Evaluate -> DEBU 126b Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:26.955 UTC [policies] Evaluate -> DEBU 126c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:26.955 UTC [policies] Evaluate -> DEBU 126d Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:26.956 UTC [policies] Evaluate -> DEBU 126e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:26.957 UTC [common.deliver] deliverBlocks -> DEBU 126f [channel: testchainid] Received seekInfo (0xc000089840) start: > stop: > from 192.168.240.9:47508" -orderer0.example.com | "2019-05-02 01:31:26.960 UTC [fsblkstorage] Next -> DEBU 1270 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:31:26.961 UTC [fsblkstorage] newBlockfileStream -> DEBU 1271 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -orderer0.example.com | "2019-05-02 01:31:26.961 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1272 Remaining bytes=[25827], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:26.964 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1273 Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -orderer0.example.com | "2019-05-02 01:31:26.966 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1274 blockbytes [25824] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:26.971 UTC [common.deliver] deliverBlocks -> DEBU 1275 [channel: testchainid] Delivering block [1] for (0xc000089840) for 192.168.240.9:47508" -orderer0.example.com | "2019-05-02 01:31:26.972 UTC [common.deliver] deliverBlocks -> DEBU 1276 [channel: testchainid] Done delivering to 192.168.240.9:47508 for (0xc000089840)" -orderer0.example.com | "2019-05-02 01:31:26.983 UTC [common.deliver] Handle -> DEBU 1277 Waiting for new SeekInfo from 192.168.240.9:47508" -orderer0.example.com | "2019-05-02 01:31:26.983 UTC [common.deliver] Handle -> DEBU 1278 Attempting to read seek info message from 192.168.240.9:47508" -orderer0.example.com | "2019-05-02 01:31:27.008 UTC [policies] Evaluate -> DEBU 1279 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:27.009 UTC [policies] Evaluate -> DEBU 127a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:27.009 UTC [policies] Evaluate -> DEBU 127b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:27.010 UTC [policies] Evaluate -> DEBU 127c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:27.019 UTC [policies] Evaluate -> DEBU 127d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [cauthdsl] func1 -> DEBU 127e 0xc000c8dbe0 gate 1556760687019989000 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [cauthdsl] func2 -> DEBU 127f 0xc000c8dbe0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [cauthdsl] func2 -> DEBU 1280 0xc000c8dbe0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [cauthdsl] func2 -> DEBU 1281 0xc000c8dbe0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [msp.identity] Verify -> DEBU 1282 Verify: digest = 00000000 c6 5f 24 c6 e1 98 cb f3 b7 0a a3 6d 30 e5 54 a3 |._$........m0.T.| -orderer0.example.com | 00000010 a2 62 4d bc 27 3d b0 9e 3b 1d 2f c0 1c 5a 12 d0 |.bM.'=..;./..Z..|" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [msp.identity] Verify -> DEBU 1283 Verify: sig = 00000000 30 45 02 21 00 db 28 1e 8a 4b 5e 59 e1 40 53 2a |0E.!..(..K^Y.@S*| -orderer0.example.com | 00000010 ba 69 34 e3 e6 8a c5 66 2f 67 82 87 fa 70 a9 4f |.i4....f/g...p.O| -orderer0.example.com | 00000020 a5 ed 47 dd 72 02 20 24 ef d1 8e af 6d 30 1c d0 |..G.r. $....m0..| -orderer0.example.com | 00000030 6b 6b 77 a3 3c e2 5a 57 df 1d ed 82 cd 35 d6 24 |kkw.<.ZW.....5.$| -orderer0.example.com | 00000040 03 ce 6b ac 35 81 42 |..k.5.B|" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [cauthdsl] func2 -> DEBU 1284 0xc000c8dbe0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [cauthdsl] func1 -> DEBU 1285 0xc000c8dbe0 gate 1556760687019989000 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [policies] Evaluate -> DEBU 1286 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [policies] Evaluate -> DEBU 1287 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [policies] Evaluate -> DEBU 1288 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [policies] Evaluate -> DEBU 1289 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:27.020 UTC [policies] Evaluate -> DEBU 128a Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:27.021 UTC [policies] Evaluate -> DEBU 128b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:27.021 UTC [common.deliver] deliverBlocks -> DEBU 128c [channel: testchainid] Received seekInfo (0xc000089c80) start: > stop: > from 192.168.240.9:47508" -orderer0.example.com | "2019-05-02 01:31:27.021 UTC [fsblkstorage] Next -> DEBU 128d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:31:27.021 UTC [fsblkstorage] newBlockfileStream -> DEBU 128e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:31:27.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 128f Remaining bytes=[44242], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:27.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1290 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -peer0.org1.example.com | "2019-05-02 01:30:57.760 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10fd Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 216 129 76 241 69 60 8 51 200 236 230 104 227 112 199 189 219 19 97 23 185 229 62 48 241 59 155 78 13 25 116 13 2 32 116 67 68 156 136 155 15 173 83 249 60 180 13 82 76 31 222 21 132 92 100 178 210 6 255 132 174 31 211 118 30 104]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0025ee400 0xc00255d110 0xc0025a5580})]}" -peer0.org1.example.com | "2019-05-02 01:30:57.822 UTC [gossip.pull] Hello -> DEBU 10fe Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:57.822 UTC [msp] DeserializeIdentity -> DEBU 1100 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.823 UTC [msp] DeserializeIdentity -> DEBU 1101 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.824 UTC [msp] DeserializeIdentity -> DEBU 1102 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.824 UTC [msp] DeserializeIdentity -> DEBU 1103 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.824 UTC [gossip.comm] Send -> DEBU 1104 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4724 bytes, seq: 3}, Envelope: 4754 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:57.824 UTC [msp] DeserializeIdentity -> DEBU 1105 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.827 UTC [msp] DeserializeIdentity -> DEBU 1106 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.823 UTC [gossip.comm] Send -> DEBU 1107 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:57.829 UTC [gossip.pull] Hello -> DEBU 1108 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:57.833 UTC [gossip.comm] sendToEndpoint -> DEBU 1109 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4724 bytes, seq: 3}, Envelope: 4754 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.833 UTC [gossip.comm] sendToEndpoint -> DEBU 110a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.843 UTC [gossip.comm] sendToEndpoint -> DEBU 110b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.844 UTC [gossip.comm] sendToEndpoint -> DEBU 110c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.822 UTC [confighistory] HandleStateUpdates -> ERRO 10ff Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003294fe0)}" -peer0.org1.example.com | "2019-05-02 01:30:57.845 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 110d Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000e7c0})}" -peer0.org1.example.com | "2019-05-02 01:30:57.846 UTC [kvledger] CommitWithPvtData -> DEBU 110e [businesschannel] Committing block [3] to storage" -peer0.org1.example.com | "2019-05-02 01:30:57.851 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1110 Writing block [3] to pvt block store" -peer0.org1.example.com | "2019-05-02 01:30:57.851 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1111 constructing new query executor txid = [e24c369a-80fc-434c-ac50-f768ee356347]" -peer0.org1.example.com | "2019-05-02 01:30:57.851 UTC [lockbasedtxmgr] Done -> DEBU 1112 Done with transaction simulation / query execution [e24c369a-80fc-434c-ac50-f768ee356347]" -peer0.org1.example.com | "2019-05-02 01:30:57.850 UTC [gossip.comm] Send -> DEBU 110f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:57.852 UTC [gossip.pull] Hello -> DEBU 1113 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:30:57.852 UTC [gossip.comm] Send -> DEBU 1114 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:57.853 UTC [gossip.comm] sendToEndpoint -> DEBU 1115 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.853 UTC [gossip.comm] sendToEndpoint -> DEBU 1116 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.854 UTC [gossip.comm] sendToEndpoint -> DEBU 1117 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.854 UTC [gossip.comm] sendToEndpoint -> DEBU 1118 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.866 UTC [pvtdatastorage] Prepare -> DEBU 1119 Saved 1 private data write sets for block [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.871 UTC [fsblkstorage] indexBlock -> DEBU 111a Indexing block [blockNum=3, blockHash=[]byte{0xa8, 0xe, 0x22, 0x69, 0x53, 0xd1, 0x69, 0x7c, 0x0, 0x47, 0xba, 0xba, 0x55, 0xac, 0x35, 0x1e, 0xd5, 0x4c, 0xc4, 0x47, 0x90, 0xfc, 0xed, 0x3d, 0xc9, 0x7c, 0xf5, 0x2f, 0xee, 0xe9, 0x79, 0xd} txOffsets= -peer0.org1.example.com | txId=48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a locPointer=offset=70, bytesLength=3705 -peer0.org1.example.com | ]" -orderer0.example.com | "2019-05-02 01:31:27.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1291 blockbytes [18412] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:27.021 UTC [common.deliver] deliverBlocks -> DEBU 1292 [channel: testchainid] Delivering block [0] for (0xc000089c80) for 192.168.240.9:47508" -orderer0.example.com | "2019-05-02 01:31:27.021 UTC [common.deliver] deliverBlocks -> DEBU 1293 [channel: testchainid] Done delivering to 192.168.240.9:47508 for (0xc000089c80)" -orderer0.example.com | "2019-05-02 01:31:27.021 UTC [common.deliver] Handle -> DEBU 1294 Waiting for new SeekInfo from 192.168.240.9:47508" -orderer0.example.com | "2019-05-02 01:31:27.023 UTC [common.deliver] Handle -> DEBU 1295 Attempting to read seek info message from 192.168.240.9:47508" -orderer0.example.com | "2019-05-02 01:31:27.040 UTC [common.deliver] Handle -> WARN 1296 Error reading from 192.168.240.9:47508: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:27.041 UTC [orderer.common.server] func1 -> DEBU 1297 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:27.041 UTC [comm.grpc.server] 1 -> INFO 1298 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47508 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=97.2138ms -orderer0.example.com | "2019-05-02 01:31:27.050 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1299 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:27.047 UTC [grpc] infof -> DEBU 129a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:27.057 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129b Sending msg of 28 bytes to 2 on channel businesschannel took 51.7µs" -orderer0.example.com | "2019-05-02 01:31:27.058 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129c Sending msg of 28 bytes to 3 on channel businesschannel took 144.8µs" -orderer0.example.com | "2019-05-02 01:31:27.061 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.2µs " -orderer0.example.com | "2019-05-02 01:31:27.066 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 416.9µs " -orderer0.example.com | "2019-05-02 01:31:27.069 UTC [orderer.common.cluster.step] handleMessage -> DEBU 129f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:27.070 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:27.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a2 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" -orderer0.example.com | "2019-05-02 01:31:27.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.8419ms " -orderer0.example.com | "2019-05-02 01:31:27.251 UTC [orderer.common.server] Deliver -> DEBU 12a3 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:27.251 UTC [common.deliver] Handle -> DEBU 12a4 Starting new deliver loop for 192.168.240.9:47510" -orderer0.example.com | "2019-05-02 01:31:27.251 UTC [common.deliver] Handle -> DEBU 12a5 Attempting to read seek info message from 192.168.240.9:47510" -orderer0.example.com | "2019-05-02 01:31:27.252 UTC [policies] Evaluate -> DEBU 12a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:27.252 UTC [policies] Evaluate -> DEBU 12a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:27.252 UTC [policies] Evaluate -> DEBU 12a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:27.253 UTC [policies] Evaluate -> DEBU 12a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:27.253 UTC [policies] Evaluate -> DEBU 12aa == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:27.254 UTC [cauthdsl] func1 -> DEBU 12ab 0xc0010ff110 gate 1556760687253768700 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:27.254 UTC [cauthdsl] func2 -> DEBU 12ac 0xc0010ff110 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:27.254 UTC [cauthdsl] func2 -> DEBU 12ad 0xc0010ff110 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:27.255 UTC [cauthdsl] func2 -> DEBU 12ae 0xc0010ff110 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:27.255 UTC [msp.identity] Verify -> DEBU 12af Verify: digest = 00000000 3a e5 48 7c d4 28 be 21 91 44 4e 44 62 89 d5 43 |:.H|.(.!.DNDb..C| -orderer0.example.com | 00000010 ac b8 1f 07 82 dc 7e 6a 6e e1 ce 98 d8 ca 3f 2c |......~jn.....?,|" -orderer0.example.com | "2019-05-02 01:31:27.256 UTC [msp.identity] Verify -> DEBU 12b0 Verify: sig = 00000000 30 45 02 21 00 a1 fe d3 bd b8 26 22 25 3f 57 18 |0E.!......&"%?W.| -orderer0.example.com | 00000010 a6 cb ff 02 94 6b 74 7f fb b7 2f 7a d8 d9 50 cf |.....kt.../z..P.| -orderer0.example.com | 00000020 a6 3b 6d b3 fa 02 20 10 93 94 21 f9 64 c2 68 ae |.;m... ...!.d.h.| -orderer0.example.com | 00000030 46 be dd 6b 0c 5b 99 55 90 f1 97 f8 08 41 67 50 |F..k.[.U.....AgP| -orderer0.example.com | 00000040 8c 74 0e 3b 37 d5 24 |.t.;7.$|" -orderer0.example.com | "2019-05-02 01:31:27.256 UTC [cauthdsl] func2 -> DEBU 12b1 0xc0010ff110 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:27.256 UTC [cauthdsl] func1 -> DEBU 12b2 0xc0010ff110 gate 1556760687253768700 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:27.258 UTC [policies] Evaluate -> DEBU 12b3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:27.258 UTC [policies] Evaluate -> DEBU 12b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:27.258 UTC [policies] Evaluate -> DEBU 12b5 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:27.260 UTC [policies] Evaluate -> DEBU 12b6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:27.260 UTC [policies] Evaluate -> DEBU 12b7 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:27.261 UTC [policies] Evaluate -> DEBU 12b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:27.261 UTC [common.deliver] deliverBlocks -> DEBU 12b9 [channel: testchainid] Received seekInfo (0xc00017fd40) start: > stop: > from 192.168.240.9:47510" -orderer0.example.com | "2019-05-02 01:31:27.262 UTC [fsblkstorage] Next -> DEBU 12ba Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:31:27.262 UTC [fsblkstorage] newBlockfileStream -> DEBU 12bb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:31:27.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12bc Remaining bytes=[44242], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:27.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12bd Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -peer0.org1.example.com | "2019-05-02 01:30:57.871 UTC [fsblkstorage] indexBlock -> DEBU 111b Adding txLoc [fileSuffixNum=0, offset=71443, bytesLength=3705] for tx ID: [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a] to txid-index" -peer0.org1.example.com | "2019-05-02 01:30:57.872 UTC [fsblkstorage] indexBlock -> DEBU 111c Adding txLoc [fileSuffixNum=0, offset=71443, bytesLength=3705] for tx number:[0] ID: [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a] to blockNumTranNum index" -peer0.org1.example.com | "2019-05-02 01:30:57.873 UTC [gossip.gossip] handleMessage -> DEBU 111d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4121206921906600141 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.874 UTC [gossip.pull] HandleMessage -> DEBU 111e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4121206921906600141 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.874 UTC [gossip.gossip] handleMessage -> DEBU 111f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.877 UTC [fsblkstorage] updateCheckpoint -> DEBU 1120 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76086], isChainEmpty=[false], lastBlockNumber=[3]" -peer0.org1.example.com | "2019-05-02 01:30:57.879 UTC [fsblkstorage] waitForBlock -> DEBU 1122 Came out of wait. maxAvailaBlockNumber=[3]" -peer0.org1.example.com | "2019-05-02 01:30:57.882 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1123 Remaining bytes=[4713], Going to peek [8] bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.884 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1124 Returning blockbytes - length=[4711], placementInfo={fileNum=[0], startOffset=[71373], bytesOffset=[71375]}" -peer0.org1.example.com | "2019-05-02 01:30:57.884 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1125 blockbytes [4711] read from file [0]" -peer0.org1.example.com | "2019-05-02 01:30:57.925 UTC [msp.identity] Sign -> DEBU 1126 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151014 " -peer0.org1.example.com | "2019-05-02 01:30:57.926 UTC [msp.identity] Sign -> DEBU 1128 Sign: digest: A57DCCB1DD4C9404FAF92AA13CB491FF81A9CAEE28EC0F9DD54950D48168EE3E " -peer0.org1.example.com | "2019-05-02 01:30:57.926 UTC [msp.identity] Sign -> DEBU 1129 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:57.927 UTC [msp.identity] Sign -> DEBU 112a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:57.927 UTC [gossip.comm] Send -> DEBU 112b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:57.927 UTC [msp] DeserializeIdentity -> DEBU 112c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.927 UTC [gossip.comm] Send -> DEBU 112d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:57.928 UTC [msp] DeserializeIdentity -> DEBU 112e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.930 UTC [gossip.comm] Send -> DEBU 1131 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:57.932 UTC [gossip.comm] sendToEndpoint -> DEBU 1132 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.932 UTC [gossip.comm] sendToEndpoint -> DEBU 1133 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.930 UTC [gossip.comm] sendToEndpoint -> DEBU 112f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.932 UTC [gossip.comm] sendToEndpoint -> DEBU 1134 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.925 UTC [gossip.comm] func1 -> DEBU 1127 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4088673888927671985 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.933 UTC [gossip.gossip] handleMessage -> DEBU 1135 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4088673888927671985 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.933 UTC [gossip.pull] HandleMessage -> DEBU 1136 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4088673888927671985 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.934 UTC [gossip.gossip] handleMessage -> DEBU 1137 Exiting" -orderer0.example.com | "2019-05-02 01:31:27.264 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12be blockbytes [18412] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:27.264 UTC [common.deliver] deliverBlocks -> DEBU 12bf [channel: testchainid] Delivering block [0] for (0xc00017fd40) for 192.168.240.9:47510" -orderer0.example.com | "2019-05-02 01:31:27.264 UTC [common.deliver] deliverBlocks -> DEBU 12c0 [channel: testchainid] Done delivering to 192.168.240.9:47510 for (0xc00017fd40)" -orderer0.example.com | "2019-05-02 01:31:27.264 UTC [common.deliver] Handle -> DEBU 12c1 Waiting for new SeekInfo from 192.168.240.9:47510" -orderer0.example.com | "2019-05-02 01:31:27.264 UTC [common.deliver] Handle -> DEBU 12c2 Attempting to read seek info message from 192.168.240.9:47510" -orderer0.example.com | "2019-05-02 01:31:27.272 UTC [common.deliver] Handle -> WARN 12c3 Error reading from 192.168.240.9:47510: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:27.272 UTC [orderer.common.server] func1 -> DEBU 12c4 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:27.273 UTC [comm.grpc.server] 1 -> INFO 12c5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47510 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.5679ms -orderer0.example.com | "2019-05-02 01:31:27.273 UTC [grpc] infof -> DEBU 12c6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:27.463 UTC [orderer.common.server] Deliver -> DEBU 12c7 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:27.464 UTC [common.deliver] Handle -> DEBU 12c8 Starting new deliver loop for 192.168.240.9:47512" -orderer0.example.com | "2019-05-02 01:31:27.464 UTC [common.deliver] Handle -> DEBU 12c9 Attempting to read seek info message from 192.168.240.9:47512" -orderer0.example.com | "2019-05-02 01:31:27.465 UTC [policies] Evaluate -> DEBU 12ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:27.465 UTC [policies] Evaluate -> DEBU 12cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:27.466 UTC [policies] Evaluate -> DEBU 12cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:27.466 UTC [policies] Evaluate -> DEBU 12cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:27.466 UTC [policies] Evaluate -> DEBU 12ce == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:27.467 UTC [cauthdsl] func1 -> DEBU 12cf 0xc0012e05b0 gate 1556760687467219700 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:27.467 UTC [cauthdsl] func2 -> DEBU 12d0 0xc0012e05b0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:27.467 UTC [cauthdsl] func2 -> DEBU 12d1 0xc0012e05b0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:27.467 UTC [cauthdsl] func2 -> DEBU 12d2 0xc0012e05b0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:27.468 UTC [msp.identity] Verify -> DEBU 12d3 Verify: digest = 00000000 ba d0 61 bb fd 05 6d 75 ff d9 a3 59 98 2d 03 6f |..a...mu...Y.-.o| -orderer0.example.com | 00000010 57 ba 30 fd d7 d9 d1 d9 db c6 73 96 95 a7 c4 0a |W.0.......s.....|" -orderer0.example.com | "2019-05-02 01:31:27.468 UTC [msp.identity] Verify -> DEBU 12d4 Verify: sig = 00000000 30 45 02 21 00 90 72 bf ac 1c c7 bb f5 5d 8a e1 |0E.!..r......]..| -orderer0.example.com | 00000010 35 cf c0 2c 0f 90 57 52 ed 29 f2 3d 83 f7 69 8c |5..,..WR.).=..i.| -orderer0.example.com | 00000020 21 0d 9d c0 9a 02 20 3b 92 13 cf ef a3 5b 5f 63 |!..... ;.....[_c| -orderer0.example.com | 00000030 82 8e f3 ff 72 84 fe a4 8f 87 3d 25 f6 4d 74 bf |....r.....=%.Mt.| -orderer0.example.com | 00000040 66 07 4c b7 95 15 cc |f.L....|" -orderer0.example.com | "2019-05-02 01:31:27.469 UTC [cauthdsl] func2 -> DEBU 12d5 0xc0012e05b0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:27.469 UTC [cauthdsl] func1 -> DEBU 12d6 0xc0012e05b0 gate 1556760687467219700 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:27.470 UTC [policies] Evaluate -> DEBU 12d7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:27.470 UTC [policies] Evaluate -> DEBU 12d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:27.470 UTC [policies] Evaluate -> DEBU 12d9 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:27.471 UTC [policies] Evaluate -> DEBU 12da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:27.471 UTC [policies] Evaluate -> DEBU 12db Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:27.471 UTC [policies] Evaluate -> DEBU 12dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:27.472 UTC [common.deliver] deliverBlocks -> DEBU 12dd [channel: testchainid] Received seekInfo (0xc0003c86c0) start: > stop: > from 192.168.240.9:47512" -orderer0.example.com | "2019-05-02 01:31:27.472 UTC [fsblkstorage] Next -> DEBU 12de Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:31:27.472 UTC [fsblkstorage] newBlockfileStream -> DEBU 12df newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -orderer0.example.com | "2019-05-02 01:31:27.473 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e0 Remaining bytes=[25827], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:27.473 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e1 Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -orderer0.example.com | "2019-05-02 01:31:27.474 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e2 blockbytes [25824] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:27.474 UTC [common.deliver] deliverBlocks -> DEBU 12e3 [channel: testchainid] Delivering block [1] for (0xc0003c86c0) for 192.168.240.9:47512" -orderer0.example.com | "2019-05-02 01:31:27.475 UTC [common.deliver] deliverBlocks -> DEBU 12e4 [channel: testchainid] Done delivering to 192.168.240.9:47512 for (0xc0003c86c0)" -orderer0.example.com | "2019-05-02 01:31:27.475 UTC [common.deliver] Handle -> DEBU 12e5 Waiting for new SeekInfo from 192.168.240.9:47512" -orderer0.example.com | "2019-05-02 01:31:27.476 UTC [common.deliver] Handle -> DEBU 12e6 Attempting to read seek info message from 192.168.240.9:47512" -orderer0.example.com | "2019-05-02 01:31:27.487 UTC [common.deliver] Handle -> WARN 12e7 Error reading from 192.168.240.9:47512: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:27.488 UTC [orderer.common.server] func1 -> DEBU 12e8 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:27.488 UTC [comm.grpc.server] 1 -> INFO 12e9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47512 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.5121ms -orderer0.example.com | "2019-05-02 01:31:27.488 UTC [grpc] infof -> DEBU 12ea transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:27.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12eb Sending msg of 28 bytes to 2 on channel businesschannel took 48.7µs" -orderer0.example.com | "2019-05-02 01:31:27.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ec Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" -orderer0.example.com | "2019-05-02 01:31:27.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 424.2µs " -orderer0.example.com | "2019-05-02 01:31:27.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " -orderer0.example.com | "2019-05-02 01:31:27.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ef Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:27.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f0 Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs" -orderer0.example.com | "2019-05-02 01:31:27.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.4µs " -orderer0.example.com | "2019-05-02 01:31:27.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:27.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:28.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f4 Sending msg of 28 bytes to 2 on channel businesschannel took 26.4µs" -orderer0.example.com | "2019-05-02 01:31:28.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f5 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" -orderer0.example.com | "2019-05-02 01:31:28.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.6µs " -orderer0.example.com | "2019-05-02 01:31:28.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105µs " -orderer0.example.com | "2019-05-02 01:31:28.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:28.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:28.044 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fa Sending msg of 28 bytes to 3 on channel testchainid took 100.9µs" -orderer0.example.com | "2019-05-02 01:31:28.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:28.044 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.6µs " -orderer0.example.com | "2019-05-02 01:31:28.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fd Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" -orderer0.example.com | "2019-05-02 01:31:28.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fe Sending msg of 28 bytes to 2 on channel businesschannel took 14.9µs" -orderer0.example.com | "2019-05-02 01:31:28.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.8µs " -orderer0.example.com | "2019-05-02 01:31:28.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1300 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.9µs " -orderer0.example.com | "2019-05-02 01:31:28.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1301 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:28.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1302 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:28.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1303 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:28.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1304 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" -orderer0.example.com | "2019-05-02 01:31:28.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1305 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62µs " -orderer0.example.com | "2019-05-02 01:31:28.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1306 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" -orderer0.example.com | "2019-05-02 01:31:28.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1307 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" -orderer0.example.com | "2019-05-02 01:31:28.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1308 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.9µs " -orderer0.example.com | "2019-05-02 01:31:28.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1309 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.2µs " -orderer0.example.com | "2019-05-02 01:31:29.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:29.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:29.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:29.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130d Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" -orderer0.example.com | "2019-05-02 01:31:29.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.7µs " -orderer0.example.com | "2019-05-02 01:31:29.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130f Sending msg of 28 bytes to 2 on channel businesschannel took 51.8µs" -orderer0.example.com | "2019-05-02 01:31:29.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1310 Sending msg of 28 bytes to 3 on channel businesschannel took 40.3µs" -orderer0.example.com | "2019-05-02 01:31:29.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1311 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.4µs " -orderer0.example.com | "2019-05-02 01:31:29.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1312 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.8µs " -peer0.org1.example.com | "2019-05-02 01:30:57.930 UTC [gossip.comm] sendToEndpoint -> DEBU 1130 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1138 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.947 UTC [gossip.comm] func1 -> DEBU 1139 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4918315814409880932 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.947 UTC [gossip.gossip] handleMessage -> DEBU 113a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4918315814409880932 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.947 UTC [gossip.privdata] handleRequest -> DEBU 113b Got GossipMessage: nonce:10470113954995349282 channel:"businesschannel" tag:CHAN_ONLY privateReq: > , Envelope: 138 bytes, Signature: 0 bytes from 192.168.240.6:44982" -peer0.org1.example.com | "2019-05-02 01:30:57.947 UTC [gossip.pull] HandleMessage -> DEBU 113c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4918315814409880932 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.947 UTC [gossip.gossip] handleMessage -> DEBU 113d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.879 UTC [pvtdatastorage] Commit -> DEBU 1121 Committing private data for block [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.948 UTC [gossip.comm] func1 -> DEBU 113e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.948 UTC [gossip.comm] func1 -> DEBU 113f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.948 UTC [gossip.gossip] handleMessage -> DEBU 1140 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.951 UTC [gossip.pull] HandleMessage -> DEBU 1141 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.951 UTC [msp] DeserializeIdentity -> DEBU 1142 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.952 UTC [msp] DeserializeIdentity -> DEBU 1143 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.952 UTC [msp] DeserializeIdentity -> DEBU 1144 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.952 UTC [msp] DeserializeIdentity -> DEBU 1145 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.982 UTC [msp] DeserializeIdentity -> DEBU 1149 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.957 UTC [gossip.comm] func1 -> DEBU 1146 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.980 UTC [pvtdatastorage] Commit -> DEBU 1147 Committed private data for block [3]" -peer0.org1.example.com | "2019-05-02 01:30:57.988 UTC [kvledger] CommitWithPvtData -> DEBU 114b [businesschannel] Committing block [3] transactions to state database" -peer0.org1.example.com | "2019-05-02 01:30:57.988 UTC [lockbasedtxmgr] Commit -> DEBU 114c lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:57.988 UTC [lockbasedtxmgr] Commit -> DEBU 114d Committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 114e Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 114f Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" -peer0.org1.example.com | "2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1150 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" -peer0.org1.example.com | "2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1151 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" -peer0.org1.example.com | "2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1152 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" -peer0.org1.example.com | "2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1153 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1154 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [lockbasedtxmgr] Commit -> DEBU 1155 Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 1156 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" -orderer0.example.com | "2019-05-02 01:31:29.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1313 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:29.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1314 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:29.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1315 Sending msg of 28 bytes to 3 on channel testchainid took 33.1µs" -orderer0.example.com | "2019-05-02 01:31:29.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1316 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107µs " -orderer0.example.com | "2019-05-02 01:31:29.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1317 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:30.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1318 Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" -orderer0.example.com | "2019-05-02 01:31:30.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131a Sending msg of 28 bytes to 3 on channel businesschannel took 55.3µs" -orderer0.example.com | "2019-05-02 01:31:30.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1319 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 212.8µs " -orderer0.example.com | "2019-05-02 01:31:30.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.4µs " -orderer0.example.com | "2019-05-02 01:31:30.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:30.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131d Sending msg of 28 bytes to 3 on channel testchainid took 23.5µs" -orderer0.example.com | "2019-05-02 01:31:30.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.1µs " -orderer0.example.com | "2019-05-02 01:31:30.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:30.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1320 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:30.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1321 Sending msg of 28 bytes to 2 on channel businesschannel took 51µs" -orderer0.example.com | "2019-05-02 01:31:30.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1322 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 346.4µs " -orderer0.example.com | "2019-05-02 01:31:30.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1323 Sending msg of 28 bytes to 3 on channel businesschannel took 66.1µs" -orderer0.example.com | "2019-05-02 01:31:30.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1324 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.1µs " -orderer0.example.com | "2019-05-02 01:31:30.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1325 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:30.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1326 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:30.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1327 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:30.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1328 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" -orderer0.example.com | "2019-05-02 01:31:30.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1329 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.3µs " -orderer0.example.com | "2019-05-02 01:31:30.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132a Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" -orderer0.example.com | "2019-05-02 01:31:30.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132b Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" -orderer0.example.com | "2019-05-02 01:31:30.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.6µs " -orderer0.example.com | "2019-05-02 01:31:30.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.7µs " -orderer0.example.com | "2019-05-02 01:31:31.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:31.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:31.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1330 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:31.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1331 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" -orderer0.example.com | "2019-05-02 01:31:31.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.4µs " -orderer0.example.com | "2019-05-02 01:31:31.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1333 Sending msg of 28 bytes to 3 on channel businesschannel took 36.3µs" -orderer0.example.com | "2019-05-02 01:31:31.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1334 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" -orderer0.example.com | "2019-05-02 01:31:31.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1335 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.6µs " -orderer0.example.com | "2019-05-02 01:31:31.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1336 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.3µs " -orderer0.example.com | "2019-05-02 01:31:31.510 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1337 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:31.511 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1338 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:31.513 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1339 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:31.515 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133a Sending msg of 28 bytes to 3 on channel testchainid took 64.4µs" -orderer0.example.com | "2019-05-02 01:31:31.515 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 350.9µs " -orderer0.example.com | "2019-05-02 01:31:31.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133c Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" -orderer0.example.com | "2019-05-02 01:31:32.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133d Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" -orderer0.example.com | "2019-05-02 01:31:32.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.5µs " -orderer0.example.com | "2019-05-02 01:31:32.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.6µs " -orderer0.example.com | "2019-05-02 01:31:32.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1340 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:32.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1341 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:32.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1342 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" -orderer0.example.com | "2019-05-02 01:31:32.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1343 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.2µs " -orderer0.example.com | "2019-05-02 01:31:32.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1344 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:32.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1345 Sending msg of 28 bytes to 2 on channel businesschannel took 15.2µs" -orderer0.example.com | "2019-05-02 01:31:32.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1346 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" -orderer0.example.com | "2019-05-02 01:31:32.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1347 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs " -orderer0.example.com | "2019-05-02 01:31:32.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1348 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.8µs " -orderer0.example.com | "2019-05-02 01:31:32.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1349 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:32.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:32.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 1157 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 1158 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 1159 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/fields/exp02#1/PackageID] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x50, 0x61, 0x63, 0x6b, 0x61, 0x67, 0x65, 0x49, 0x44}]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115a Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115b Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115c Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115d Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115e Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115f Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" -peer0.org1.example.com | "2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 1160 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���R���l� DEBU 1161 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" -peer0.org1.example.com | "2019-05-02 01:30:57.981 UTC [gossip.comm] func1 -> DEBU 1148 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.983 UTC [msp] DeserializeIdentity -> DEBU 114a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.990 UTC [gossip.pull] SendDigest -> DEBU 1162 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [gossip.gossip] handleMessage -> DEBU 1163 Exiting" -orderer0.example.com | "2019-05-02 01:31:32.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134c Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" -orderer0.example.com | "2019-05-02 01:31:32.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.6µs " -orderer0.example.com | "2019-05-02 01:31:32.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134e Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" -orderer0.example.com | "2019-05-02 01:31:32.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134f Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" -orderer0.example.com | "2019-05-02 01:31:32.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1350 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.5µs " -orderer0.example.com | "2019-05-02 01:31:32.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1351 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.3µs " -orderer0.example.com | "2019-05-02 01:31:33.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1352 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:33.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1353 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:33.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1354 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:33.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1355 Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" -orderer0.example.com | "2019-05-02 01:31:33.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1356 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " -orderer0.example.com | "2019-05-02 01:31:33.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1357 Sending msg of 28 bytes to 3 on channel businesschannel took 35µs" -orderer0.example.com | "2019-05-02 01:31:33.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1358 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" -orderer0.example.com | "2019-05-02 01:31:33.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1359 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.1µs " -orderer0.example.com | "2019-05-02 01:31:33.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " -orderer0.example.com | "2019-05-02 01:31:33.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:33.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:33.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:33.513 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 135e Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [gossip.gossip] handleMessage -> DEBU 1164 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [gossip.gossip] handleMessage -> DEBU 1165 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [gossip.gossip] handleMessage -> DEBU 1166 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1167 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1168 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [msp] DeserializeIdentity -> DEBU 1169 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 116a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 116b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 116c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [policies] Evaluate -> DEBU 116d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [policies] Evaluate -> DEBU 116e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:57.991 UTC [policies] Evaluate -> DEBU 116f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:57.992 UTC [cauthdsl] func1 -> DEBU 1170 0xc0035be920 gate 1556760657992059400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:57.992 UTC [cauthdsl] func2 -> DEBU 1171 0xc0035be920 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:57.992 UTC [cauthdsl] func2 -> DEBU 1172 0xc0035be920 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:57.992 UTC [cauthdsl] func2 -> DEBU 1173 0xc0035be920 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:57.992 UTC [msp.identity] Verify -> DEBU 1174 Verify: digest = 00000000 96 5b fe 9f 00 6a 58 86 01 6d db 15 43 88 86 7a |.[...jX..m..C..z| -peer0.org1.example.com | 00000010 d7 59 06 b2 35 fe cc 66 fd 76 58 94 68 86 d1 af |.Y..5..f.vX.h...|" -peer0.org1.example.com | "2019-05-02 01:30:57.992 UTC [msp.identity] Verify -> DEBU 1175 Verify: sig = 00000000 30 44 02 20 75 aa b9 44 00 bd bd d1 61 0d ca 69 |0D. u..D....a..i| -peer0.org1.example.com | 00000010 56 d6 0c 1d 0f 21 92 7b 50 c9 5e 8f 48 5e 5c 2d |V....!.{P.^.H^\-| -peer0.org1.example.com | 00000020 f5 13 e8 d0 02 20 2d 5b 63 98 95 30 4d 2a 1a e4 |..... -[c..0M*..| -peer0.org1.example.com | 00000030 80 4d 8b 35 f7 c9 d7 c8 f6 62 a5 62 b4 ba 62 65 |.M.5.....b.b..be| -peer0.org1.example.com | 00000040 23 b7 fa 54 84 f7 |#..T..|" -peer0.org1.example.com | "2019-05-02 01:30:57.992 UTC [cauthdsl] func2 -> DEBU 1176 0xc0035be920 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [cauthdsl] func1 -> DEBU 1177 0xc0035be920 gate 1556760657992059400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [policies] Evaluate -> DEBU 1178 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [policies] Evaluate -> DEBU 1179 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [policies] Evaluate -> DEBU 117a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [policies] Evaluate -> DEBU 117b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 117c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 117d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 117e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 " -orderer0.example.com | "2019-05-02 01:31:33.513 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 528.8µs " -orderer0.example.com | "2019-05-02 01:31:33.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1360 Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" -orderer0.example.com | "2019-05-02 01:31:33.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1361 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" -orderer0.example.com | "2019-05-02 01:31:34.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1362 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 294.2µs " -orderer0.example.com | "2019-05-02 01:31:34.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1363 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.8µs " -orderer0.example.com | "2019-05-02 01:31:34.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1364 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:34.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1365 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:34.007 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1366 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:34.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1367 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" -orderer0.example.com | "2019-05-02 01:31:34.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1368 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.6µs " -orderer0.example.com | "2019-05-02 01:31:34.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1369 Sending msg of 28 bytes to 2 on channel businesschannel took 26.7µs" -orderer0.example.com | "2019-05-02 01:31:34.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136a Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" -orderer0.example.com | "2019-05-02 01:31:34.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.1µs " -orderer0.example.com | "2019-05-02 01:31:34.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.1µs " -orderer0.example.com | "2019-05-02 01:31:34.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:34.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:34.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:34.509 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1370 Sending msg of 28 bytes to 3 on channel testchainid took 42.2µs" -orderer0.example.com | "2019-05-02 01:31:34.510 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1371 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 513.6µs " -orderer0.example.com | "2019-05-02 01:31:34.788 UTC [orderer.common.server] Deliver -> DEBU 1372 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:34.788 UTC [common.deliver] Handle -> DEBU 1373 Starting new deliver loop for 192.168.240.9:47514" -orderer0.example.com | "2019-05-02 01:31:34.788 UTC [common.deliver] Handle -> DEBU 1374 Attempting to read seek info message from 192.168.240.9:47514" -orderer0.example.com | "2019-05-02 01:31:34.835 UTC [orderer.common.server] Broadcast -> DEBU 1375 Starting new Broadcast handler" -orderer0.example.com | "2019-05-02 01:31:34.835 UTC [orderer.common.broadcast] Handle -> DEBU 1376 Starting new broadcast loop for 192.168.240.9:47516" -orderer0.example.com | "2019-05-02 01:31:34.840 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1377 [channel: businesschannel] Broadcast is processing config update message from 192.168.240.9:47516" -orderer0.example.com | "2019-05-02 01:31:34.840 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1378 Processing config update message for channel businesschannel" -orderer0.example.com | "2019-05-02 01:31:34.841 UTC [policies] Evaluate -> DEBU 1379 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:31:34.841 UTC [policies] Evaluate -> DEBU 137a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:34.842 UTC [policies] Evaluate -> DEBU 137b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:31:34.842 UTC [policies] Evaluate -> DEBU 137c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:34.842 UTC [policies] Evaluate -> DEBU 137d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:34.843 UTC [cauthdsl] func1 -> DEBU 137e 0xc001162ef0 gate 1556760694843271700 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:34.843 UTC [cauthdsl] func2 -> DEBU 137f 0xc001162ef0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:34.844 UTC [cauthdsl] func2 -> DEBU 1380 0xc001162ef0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:34.844 UTC [cauthdsl] func2 -> DEBU 1381 0xc001162ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-05-02 01:31:34.845 UTC [cauthdsl] func2 -> DEBU 1382 0xc001162ef0 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:34.845 UTC [cauthdsl] func1 -> DEBU 1383 0xc001162ef0 gate 1556760694843271700 evaluation fails" -orderer0.example.com | "2019-05-02 01:31:34.846 UTC [policies] Evaluate -> DEBU 1384 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.846 UTC [policies] Evaluate -> DEBU 1385 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 117f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 " -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 1180 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 1181 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 1182 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1183 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1184 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:57.993 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1185 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:58.010 UTC [gossip.discovery] sendMemResponse -> DEBU 1186 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:30:58.011 UTC [msp] DeserializeIdentity -> DEBU 1187 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.013 UTC [msp] DeserializeIdentity -> DEBU 1188 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.015 UTC [msp] DeserializeIdentity -> DEBU 1189 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.027 UTC [gossip.comm] Send -> DEBU 118a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:58.027 UTC [gossip.discovery] sendMemResponse -> DEBU 118b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:30:58.027 UTC [gossip.comm] sendToEndpoint -> DEBU 118c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.027 UTC [gossip.comm] sendToEndpoint -> DEBU 118d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.050 UTC [msp.identity] Verify -> DEBU 118e Verify: digest = 00000000 da 55 14 00 20 42 c4 58 73 9d a9 8e 9f 1d de 82 |.U.. B.Xs.......| -peer0.org1.example.com | 00000010 91 6d cd 5f 01 a6 0b a0 96 34 fb a5 70 bd f6 b2 |.m._.....4..p...|" -peer0.org1.example.com | "2019-05-02 01:30:58.050 UTC [msp.identity] Verify -> DEBU 118f Verify: sig = 00000000 30 44 02 20 40 1f 8f 17 bb 76 b9 eb 71 88 f6 6c |0D. @....v..q..l| -peer0.org1.example.com | 00000010 a6 33 92 9c d9 02 11 e6 e6 47 1a 88 ea 7d 44 ae |.3.......G...}D.| -peer0.org1.example.com | 00000020 c5 23 56 97 02 20 75 09 64 6c 25 4f 9b 38 36 72 |.#V.. u.dl%O.86r| -peer0.org1.example.com | 00000030 a9 9c 24 da c6 00 dd 65 5e ae 42 fa 79 da 6e cc |..$....e^.B.y.n.| -peer0.org1.example.com | 00000040 ca 11 05 e1 91 22 |....."|" -peer0.org1.example.com | "2019-05-02 01:30:58.050 UTC [gossip.discovery] handleAliveMessage -> DEBU 1190 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.051 UTC [gossip.discovery] handleAliveMessage -> DEBU 1191 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.051 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1192 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:30:58.051 UTC [msp] DeserializeIdentity -> DEBU 1193 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.051 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1194 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:58.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1195 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:58.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1196 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:58.051 UTC [policies] Evaluate -> DEBU 1197 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:58.052 UTC [policies] Evaluate -> DEBU 1198 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:58.052 UTC [policies] Evaluate -> DEBU 1199 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:58.052 UTC [cauthdsl] func1 -> DEBU 119a 0xc0035abd10 gate 1556760658052126400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:58.052 UTC [cauthdsl] func2 -> DEBU 119b 0xc0035abd10 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:34.847 UTC [policies] Evaluate -> DEBU 1386 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:34.847 UTC [cauthdsl] func1 -> DEBU 1387 0xc001163730 gate 1556760694847357900 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:34.847 UTC [cauthdsl] func2 -> DEBU 1388 0xc001163730 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:34.848 UTC [cauthdsl] func2 -> DEBU 1389 0xc001163730 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:34.848 UTC [cauthdsl] func2 -> DEBU 138a 0xc001163730 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:34.849 UTC [msp.identity] Verify -> DEBU 138b Verify: digest = 00000000 24 a2 49 e2 af 42 b6 b0 2c 67 6f 9e f3 88 79 62 |$.I..B..,go...yb| -orderer0.example.com | 00000010 b2 2f de 6a 19 21 28 4d 88 da c6 8b 5c 56 b1 45 |./.j.!(M....\V.E|" -orderer0.example.com | "2019-05-02 01:31:34.849 UTC [msp.identity] Verify -> DEBU 138c Verify: sig = 00000000 30 45 02 21 00 c2 17 1f ab 59 23 92 23 f4 f3 15 |0E.!.....Y#.#...| -orderer0.example.com | 00000010 11 5c 2c f5 ad 62 eb d5 0b ce ad 52 6e 6e d2 c3 |.\,..b.....Rnn..| -orderer0.example.com | 00000020 44 3d 53 7a 2c 02 20 3f 12 d2 69 c7 98 cc a4 bb |D=Sz,. ?..i.....| -orderer0.example.com | 00000030 3f 4c 78 f2 9c a6 64 4f 94 d4 b4 ef 61 21 38 69 |?Lx...dO....a!8i| -orderer0.example.com | 00000040 8f 4f 6e e2 4f 94 d1 |.On.O..|" -orderer0.example.com | "2019-05-02 01:31:34.850 UTC [cauthdsl] func2 -> DEBU 138d 0xc001163730 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:34.850 UTC [cauthdsl] func1 -> DEBU 138e 0xc001163730 gate 1556760694847357900 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:34.851 UTC [policies] Evaluate -> DEBU 138f Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.851 UTC [policies] Evaluate -> DEBU 1390 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.851 UTC [policies] Evaluate -> DEBU 1391 Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:34.852 UTC [policies] Evaluate -> DEBU 1392 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:34.852 UTC [policies] Evaluate -> DEBU 1393 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:34.852 UTC [policies] Evaluate -> DEBU 1394 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:34.853 UTC [common.configtx] addToMap -> DEBU 1395 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:31:34.853 UTC [common.configtx] addToMap -> DEBU 1396 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:31:34.853 UTC [common.configtx] addToMap -> DEBU 1397 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.854 UTC [common.configtx] addToMap -> DEBU 1398 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.854 UTC [common.configtx] addToMap -> DEBU 1399 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:31:34.854 UTC [common.configtx] addToMap -> DEBU 139a Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:31:34.854 UTC [common.configtx] addToMap -> DEBU 139b Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:34.855 UTC [common.configtx] addToMap -> DEBU 139c Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:31:34.855 UTC [common.configtx] addToMap -> DEBU 139d Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:31:34.856 UTC [common.configtx] addToMap -> DEBU 139e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:31:34.856 UTC [common.configtx] addToMap -> DEBU 139f Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:34.856 UTC [common.configtx] addToMap -> DEBU 13a0 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:31:34.857 UTC [common.configtx] addToMap -> DEBU 13a1 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:31:34.857 UTC [common.configtx] addToMap -> DEBU 13a2 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.857 UTC [common.configtx] addToMap -> DEBU 13a3 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.858 UTC [common.configtx] addToMap -> DEBU 13a4 Adding to config map: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:34.858 UTC [common.configtx] addToMap -> DEBU 13a5 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-05-02 01:31:34.858 UTC [common.configtx] addToMap -> DEBU 13a6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13a7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13a8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13a9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13aa Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13ab Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13ac Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13ad Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:34.860 UTC [common.configtx] addToMap -> DEBU 13ae Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:34.860 UTC [common.configtx] addToMap -> DEBU 13af Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:31:34.860 UTC [common.configtx] addToMap -> DEBU 13b0 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:31:34.860 UTC [common.configtx] verifyDeltaSet -> DEBU 13b1 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:31:34.861 UTC [common.configtx] verifyDeltaSet -> DEBU 13b2 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:34.861 UTC [common.configtx] verifyDeltaSet -> DEBU 13b3 Processing change to key: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:34.861 UTC [common.configtx] verifyDeltaSet -> DEBU 13b4 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:34.861 UTC [common.configtx] verifyDeltaSet -> DEBU 13b5 Processing change to key: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:31:34.862 UTC [common.configtx] policyForItem -> DEBU 13b6 Getting policy for item Application with mod_policy Admins" -orderer0.example.com | "2019-05-02 01:31:34.862 UTC [policies] Manager -> DEBU 13b7 Manager Channel looking up path []" -orderer0.example.com | "2019-05-02 01:31:34.862 UTC [policies] Manager -> DEBU 13b8 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:31:34.862 UTC [policies] Manager -> DEBU 13b9 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:31:34.863 UTC [policies] Manager -> DEBU 13ba Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:31:34.863 UTC [policies] Manager -> DEBU 13bb Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:31:34.863 UTC [policies] Manager -> DEBU 13bc Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:31:34.864 UTC [policies] Manager -> DEBU 13bd Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:31:34.864 UTC [policies] Manager -> DEBU 13be Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.864 UTC [policies] Manager -> DEBU 13bf Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.865 UTC [policies] Evaluate -> DEBU 13c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -orderer0.example.com | "2019-05-02 01:31:34.865 UTC [policies] Evaluate -> DEBU 13c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:34.865 UTC [policies] Evaluate -> DEBU 13c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:31:34.865 UTC [cauthdsl] deduplicate -> WARN 13c3 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer0.example.com | "2019-05-02 01:31:34.866 UTC [cauthdsl] func1 -> DEBU 13c4 0xc0009443c0 gate 1556760694866009000 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:34.866 UTC [cauthdsl] func2 -> DEBU 13c5 0xc0009443c0 signed by 0 principal evaluation starts (used [false false false])" -orderer0.example.com | "2019-05-02 01:31:34.866 UTC [cauthdsl] func2 -> DEBU 13c6 0xc0009443c0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:34.867 UTC [cauthdsl] func2 -> DEBU 13c7 0xc0009443c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-05-02 01:31:34.867 UTC [cauthdsl] func2 -> DEBU 13c8 0xc0009443c0 processing identity 1 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:34.867 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13c9 Checking if identity satisfies ADMIN role for Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.867 UTC [cauthdsl] func2 -> DEBU 13ca 0xc0009443c0 principal matched by identity 1" -orderer0.example.com | "2019-05-02 01:31:34.867 UTC [msp.identity] Verify -> DEBU 13cb Verify: digest = 00000000 0a 93 54 f3 ca 50 66 cd 2e b2 91 c4 a1 99 4b fe |..T..Pf.......K.| -orderer0.example.com | 00000010 78 04 08 22 86 5c 95 44 eb 44 40 b9 7f 21 df a9 |x..".\.D.D@..!..|" -orderer0.example.com | "2019-05-02 01:31:34.868 UTC [msp.identity] Verify -> DEBU 13cc Verify: sig = 00000000 30 44 02 20 73 e6 28 8c bd 51 8c f6 e4 26 ca 3c |0D. s.(..Q...&.<| -orderer0.example.com | 00000010 a7 51 9f 0f f8 98 78 97 9a 0a 5b de 1d 2f 26 8a |.Q....x...[../&.| -orderer0.example.com | 00000020 4a bd b1 0a 02 20 7d 21 70 08 83 04 6d 41 e4 2d |J.... }!p...mA.-| -orderer0.example.com | 00000030 97 f9 e7 46 95 6f 32 34 86 6a f5 6d 90 57 38 e1 |...F.o24.j.m.W8.| -orderer0.example.com | 00000040 82 3f 3a 29 69 89 |.?:)i.|" -orderer0.example.com | "2019-05-02 01:31:34.868 UTC [cauthdsl] func2 -> DEBU 13cd 0xc0009443c0 principal evaluation succeeds for identity 1" -orderer0.example.com | "2019-05-02 01:31:34.868 UTC [cauthdsl] func1 -> DEBU 13ce 0xc0009443c0 gate 1556760694866009000 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:34.868 UTC [policies] Evaluate -> DEBU 13cf Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:34.869 UTC [policies] Evaluate -> DEBU 13d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:34.869 UTC [policies] Evaluate -> DEBU 13d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:31:34.869 UTC [cauthdsl] deduplicate -> WARN 13d2 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer0.example.com | "2019-05-02 01:31:34.869 UTC [cauthdsl] func1 -> DEBU 13d3 0xc000944ab0 gate 1556760694869603200 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:34.869 UTC [cauthdsl] func2 -> DEBU 13d4 0xc000944ab0 signed by 0 principal evaluation starts (used [false false false])" -orderer0.example.com | "2019-05-02 01:31:34.869 UTC [cauthdsl] func2 -> DEBU 13d5 0xc000944ab0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:34.870 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13d6 Checking if identity satisfies ADMIN role for Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.870 UTC [cauthdsl] func2 -> DEBU 13d7 0xc000944ab0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:34.870 UTC [msp.identity] Verify -> DEBU 13d8 Verify: digest = 00000000 96 5b d6 35 6e 24 ba 8d ea c0 f3 54 be 64 a0 8e |.[.5n$.....T.d..| -orderer0.example.com | 00000010 d7 2c 6e 83 3b c0 ba 63 fa 91 e5 8e d7 f6 d2 45 |.,n.;..c.......E|" -orderer0.example.com | "2019-05-02 01:31:34.870 UTC [msp.identity] Verify -> DEBU 13d9 Verify: sig = 00000000 30 44 02 20 06 17 d3 85 97 6c 5b f8 2b ee 4f 8b |0D. .....l[.+.O.| -orderer0.example.com | 00000010 ef 9b 4d fa 3e e1 e8 50 ac 6a 0b 7c dd d7 cd af |..M.>..P.j.|....| -orderer0.example.com | 00000020 ef 6f e1 14 02 20 7a 9c e6 c9 a1 11 d2 73 46 49 |.o... z......sFI| -orderer0.example.com | 00000030 45 b3 5c 7b 74 db 4e 00 94 b3 b0 43 5c b9 74 72 |E.\{t.N....C\.tr| -orderer0.example.com | 00000040 0b fb bb cd 10 b7 |......|" -orderer0.example.com | "2019-05-02 01:31:34.870 UTC [cauthdsl] func2 -> DEBU 13da 0xc000944ab0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:34.871 UTC [cauthdsl] func1 -> DEBU 13db 0xc000944ab0 gate 1556760694869603200 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:34.871 UTC [policies] Evaluate -> DEBU 13dc Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:34.871 UTC [policies] Evaluate -> DEBU 13dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:34.871 UTC [policies] Evaluate -> DEBU 13de Signature set satisfies policy /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:31:34.871 UTC [policies] Evaluate -> DEBU 13df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:31:34.872 UTC [common.configtx] verifyDeltaSet -> DEBU 13e0 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-05-02 01:31:34.872 UTC [common.configtx] verifyDeltaSet -> DEBU 13e1 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.872 UTC [common.configtx] recurseConfigMap -> DEBU 13e2 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.872 UTC [common.configtx] recurseConfigMap -> DEBU 13e3 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.873 UTC [common.configtx] recurseConfigMap -> DEBU 13e4 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:30:58.052 UTC [cauthdsl] func2 -> DEBU 119c 0xc0035abd10 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:58.052 UTC [cauthdsl] func2 -> DEBU 119d 0xc0035abd10 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:58.052 UTC [msp.identity] Verify -> DEBU 119e Verify: digest = 00000000 da 3f 62 6d e3 0a 94 fd 68 71 cf e1 e7 4d 6d 88 |.?bm....hq...Mm.| -peer0.org1.example.com | 00000010 36 db 5a 5d 3c e7 80 c0 ab 42 15 b2 73 ad ab f3 |6.Z]<....B..s...|" -peer0.org1.example.com | "2019-05-02 01:30:58.052 UTC [msp.identity] Verify -> DEBU 119f Verify: sig = 00000000 30 44 02 20 02 72 db 39 13 d1 76 ba a8 87 64 f5 |0D. .r.9..v...d.| -peer0.org1.example.com | 00000010 43 84 b0 dd cb 42 e3 ff bb 05 d4 38 79 87 7f 0c |C....B.....8y...| -peer0.org1.example.com | 00000020 8b 5a 19 35 02 20 10 b3 0f 14 56 82 12 80 72 b4 |.Z.5. ....V...r.| -peer0.org1.example.com | 00000030 f5 89 33 b7 ef 0d e6 fa 3c 3a 4f f4 9d 95 cc 1b |..3.....<:O.....| -peer0.org1.example.com | 00000040 42 a5 8a ff a9 3f |B....?|" -peer0.org1.example.com | "2019-05-02 01:30:58.053 UTC [cauthdsl] func2 -> DEBU 11a0 0xc0035abd10 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:58.053 UTC [cauthdsl] func1 -> DEBU 11a1 0xc0035abd10 gate 1556760658052126400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:58.053 UTC [policies] Evaluate -> DEBU 11a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.053 UTC [policies] Evaluate -> DEBU 11a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.053 UTC [policies] Evaluate -> DEBU 11a4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.053 UTC [policies] Evaluate -> DEBU 11a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 11a6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 11a7 got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1556760633753242000, 23 but got ts: inc_num:1556760633753242000 seq_num:22 " -peer0.org1.example.com | "2019-05-02 01:30:58.056 UTC [lockbasedtxmgr] Commit -> DEBU 11a8 Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-05-02 01:30:58.057 UTC [gossip.discovery] handleAliveMessage -> DEBU 11a9 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.057 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11aa Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:58.057 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 11ab Preparing potential purge list working-set for expiringAtBlk [4]" -peer0.org1.example.com | "2019-05-02 01:30:58.058 UTC [msp.identity] Verify -> DEBU 11ac Verify: digest = 00000000 a5 7d cc b1 dd 4c 94 04 fa f9 2a a1 3c b4 91 ff |.}...L....*.<...| -peer0.org1.example.com | 00000010 81 a9 ca ee 28 ec 0f 9d d5 49 50 d4 81 68 ee 3e |....(....IP..h.>|" -peer0.org1.example.com | "2019-05-02 01:30:58.058 UTC [msp.identity] Verify -> DEBU 11ad Verify: sig = 00000000 30 44 02 20 2e 94 9c 49 6e 50 ff 01 de b0 74 82 |0D. ...InP....t.| -peer0.org1.example.com | 00000010 83 5c b6 a8 c1 84 fd b2 63 bc d3 8c 88 29 ed b1 |.\......c....)..| -peer0.org1.example.com | 00000020 f9 d6 3a 0d 02 20 13 d7 4c 5a 7d 33 19 fe 67 0c |..:.. ..LZ}3..g.| -peer0.org1.example.com | 00000030 17 4c 0e fa 33 4c 43 f4 6e 41 31 89 4f c4 39 85 |.L..3LC.nA1.O.9.| -peer0.org1.example.com | 00000040 cb e5 c0 9b cf 4f |.....O|" -peer0.org1.example.com | "2019-05-02 01:30:58.059 UTC [gossip.discovery] handleAliveMessage -> DEBU 11ae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.059 UTC [gossip.discovery] isSentByMe -> DEBU 11af Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.059 UTC [gossip.discovery] handleAliveMessage -> DEBU 11b0 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.059 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11b1 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.027 UTC [gossip.gossip] handleMessage -> DEBU 11b2 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.060 UTC [gossip.gossip] handleMessage -> DEBU 11b3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.060 UTC [gossip.gossip] handleMessage -> DEBU 11b5 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.063 UTC [gossip.gossip] handleMessage -> DEBU 11b6 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.063 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.063 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11b8 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:58.063 UTC [msp] DeserializeIdentity -> DEBU 11b9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.064 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:58.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11bb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:58.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11bc Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:58.065 UTC [policies] Evaluate -> DEBU 11bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:58.065 UTC [policies] Evaluate -> DEBU 11be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:58.065 UTC [policies] Evaluate -> DEBU 11bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:58.066 UTC [cauthdsl] func1 -> DEBU 11c0 0xc0035f8ac0 gate 1556760658066004100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:58.066 UTC [cauthdsl] func2 -> DEBU 11c1 0xc0035f8ac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:58.066 UTC [cauthdsl] func2 -> DEBU 11c2 0xc0035f8ac0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:58.066 UTC [cauthdsl] func2 -> DEBU 11c3 0xc0035f8ac0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:58.066 UTC [msp.identity] Verify -> DEBU 11c4 Verify: digest = 00000000 51 d7 73 b6 db 19 35 79 ed 87 bd be be f7 98 cb |Q.s...5y........| -peer0.org1.example.com | 00000010 2c 3b ba 6e e2 d9 a1 90 72 bf 71 60 11 40 69 29 |,;.n....r.q`.@i)|" -peer0.org1.example.com | "2019-05-02 01:30:58.067 UTC [msp.identity] Verify -> DEBU 11c5 Verify: sig = 00000000 30 44 02 20 09 cf 7b 66 db 8b d0 58 96 f9 ee 90 |0D. ..{f...X....| -peer0.org1.example.com | 00000010 09 16 06 26 84 18 b0 d2 1e 31 84 ed ee 30 28 8c |...&.....1...0(.| -peer0.org1.example.com | 00000020 78 d3 c4 00 02 20 13 30 2e 85 0c 47 95 e5 38 d5 |x.... .0...G..8.| -peer0.org1.example.com | 00000030 d8 94 59 50 fa 97 ef 7c 22 28 d7 5f ee af 87 c4 |..YP...|"(._....| -peer0.org1.example.com | 00000040 43 a7 2c 00 e9 3a |C.,..:|" -peer0.org1.example.com | "2019-05-02 01:30:58.067 UTC [cauthdsl] func2 -> DEBU 11c6 0xc0035f8ac0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:58.067 UTC [cauthdsl] func1 -> DEBU 11c7 0xc0035f8ac0 gate 1556760658066004100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:58.067 UTC [policies] Evaluate -> DEBU 11c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.067 UTC [policies] Evaluate -> DEBU 11c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.068 UTC [policies] Evaluate -> DEBU 11ca Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.068 UTC [policies] Evaluate -> DEBU 11cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.068 UTC [gossip.discovery] handleAliveMessage -> DEBU 11cc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.068 UTC [gossip.discovery] handleAliveMessage -> DEBU 11cd Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.069 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11ce Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:58.069 UTC [msp.identity] Verify -> DEBU 11cf Verify: digest = 00000000 a5 7d cc b1 dd 4c 94 04 fa f9 2a a1 3c b4 91 ff |.}...L....*.<...| -peer0.org1.example.com | 00000010 81 a9 ca ee 28 ec 0f 9d d5 49 50 d4 81 68 ee 3e |....(....IP..h.>|" -peer0.org1.example.com | "2019-05-02 01:30:58.069 UTC [msp.identity] Verify -> DEBU 11d0 Verify: sig = 00000000 30 44 02 20 2e 94 9c 49 6e 50 ff 01 de b0 74 82 |0D. ...InP....t.| -peer0.org1.example.com | 00000010 83 5c b6 a8 c1 84 fd b2 63 bc d3 8c 88 29 ed b1 |.\......c....)..| -peer0.org1.example.com | 00000020 f9 d6 3a 0d 02 20 13 d7 4c 5a 7d 33 19 fe 67 0c |..:.. ..LZ}3..g.| -peer0.org1.example.com | 00000030 17 4c 0e fa 33 4c 43 f4 6e 41 31 89 4f c4 39 85 |.L..3LC.nA1.O.9.| -peer0.org1.example.com | 00000040 cb e5 c0 9b cf 4f |.....O|" -peer0.org1.example.com | "2019-05-02 01:30:58.070 UTC [gossip.discovery] handleAliveMessage -> DEBU 11d1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.070 UTC [gossip.discovery] isSentByMe -> DEBU 11d2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.071 UTC [gossip.discovery] handleAliveMessage -> DEBU 11d3 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.071 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11d4 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:58.071 UTC [msp.identity] Verify -> DEBU 11d5 Verify: digest = 00000000 da 55 14 00 20 42 c4 58 73 9d a9 8e 9f 1d de 82 |.U.. B.Xs.......| -peer0.org1.example.com | 00000010 91 6d cd 5f 01 a6 0b a0 96 34 fb a5 70 bd f6 b2 |.m._.....4..p...|" -peer0.org1.example.com | "2019-05-02 01:30:58.071 UTC [msp.identity] Verify -> DEBU 11d6 Verify: sig = 00000000 30 44 02 20 40 1f 8f 17 bb 76 b9 eb 71 88 f6 6c |0D. @....v..q..l| -peer0.org1.example.com | 00000010 a6 33 92 9c d9 02 11 e6 e6 47 1a 88 ea 7d 44 ae |.3.......G...}D.| -peer0.org1.example.com | 00000020 c5 23 56 97 02 20 75 09 64 6c 25 4f 9b 38 36 72 |.#V.. u.dl%O.86r| -peer0.org1.example.com | 00000030 a9 9c 24 da c6 00 dd 65 5e ae 42 fa 79 da 6e cc |..$....e^.B.y.n.| -peer0.org1.example.com | 00000040 ca 11 05 e1 91 22 |....."|" -peer0.org1.example.com | "2019-05-02 01:30:58.072 UTC [gossip.discovery] handleAliveMessage -> DEBU 11d7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.076 UTC [lockbasedtxmgr] func1 -> DEBU 11d8 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-05-02 01:30:58.076 UTC [kvledger] CommitWithPvtData -> DEBU 11d9 [businesschannel] Committing block [3] transactions to history database" -orderer0.example.com | "2019-05-02 01:31:34.873 UTC [common.configtx] recurseConfigMap -> DEBU 13e5 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.873 UTC [common.configtx] recurseConfigMap -> DEBU 13e6 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.873 UTC [common.configtx] recurseConfigMap -> DEBU 13e7 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.873 UTC [common.configtx] recurseConfigMap -> DEBU 13e8 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.874 UTC [common.configtx] recurseConfigMap -> DEBU 13e9 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.874 UTC [common.configtx] recurseConfigMap -> DEBU 13ea Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.874 UTC [common.configtx] recurseConfigMap -> DEBU 13eb Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.874 UTC [common.configtx] recurseConfigMap -> DEBU 13ec Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.875 UTC [common.configtx] recurseConfigMap -> DEBU 13ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.875 UTC [common.configtx] recurseConfigMap -> DEBU 13ee Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.875 UTC [common.configtx] recurseConfigMap -> DEBU 13ef Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.875 UTC [common.configtx] recurseConfigMap -> DEBU 13f0 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.875 UTC [common.configtx] recurseConfigMap -> DEBU 13f1 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.876 UTC [common.configtx] recurseConfigMap -> DEBU 13f2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.876 UTC [common.configtx] recurseConfigMap -> DEBU 13f3 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.877 UTC [common.configtx] recurseConfigMap -> DEBU 13f4 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.877 UTC [common.configtx] recurseConfigMap -> DEBU 13f5 Setting policy for key LifecycleEndorsement to " -orderer0.example.com | "2019-05-02 01:31:34.877 UTC [common.configtx] recurseConfigMap -> DEBU 13f6 Setting policy for key Readers to " -orderer0.example.com | "2019-05-02 01:31:34.877 UTC [common.configtx] recurseConfigMap -> DEBU 13f7 Setting policy for key Writers to " -orderer0.example.com | "2019-05-02 01:31:34.878 UTC [common.configtx] recurseConfigMap -> DEBU 13f8 Setting policy for key Admins to " -orderer0.example.com | "2019-05-02 01:31:34.878 UTC [common.configtx] recurseConfigMap -> DEBU 13f9 Setting policy for key Endorsement to " -orderer0.example.com | "2019-05-02 01:31:34.878 UTC [common.configtx] recurseConfigMap -> DEBU 13fa Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.878 UTC [common.configtx] recurseConfigMap -> DEBU 13fb Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.878 UTC [common.configtx] recurseConfigMap -> DEBU 13fc Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:34.878 UTC [common.channelconfig] NewStandardValues -> DEBU 13fd Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:31:34.878 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fe Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:31:34.878 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13ff Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:31:34.879 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1400 Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:31:34.879 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1401 Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:31:34.879 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1402 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:31:34.879 UTC [common.channelconfig] NewStandardValues -> DEBU 1403 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:31:34.879 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1404 Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:31:34.879 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1405 Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:31:34.880 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1406 Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:31:34.880 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1407 Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:31:34.880 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1408 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:31:34.880 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1409 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:31:34.880 UTC [common.channelconfig] NewStandardValues -> DEBU 140a Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:31:34.880 UTC [common.channelconfig] initializeProtosStruct -> DEBU 140b Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:31:34.881 UTC [common.channelconfig] NewStandardValues -> DEBU 140c Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:31:34.881 UTC [common.channelconfig] initializeProtosStruct -> DEBU 140d Processing field: MSP" -orderer0.example.com | "2019-05-02 01:31:34.881 UTC [common.channelconfig] validateMSP -> DEBU 140e Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:34.881 UTC [msp] newBccspMsp -> DEBU 140f Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:31:34.881 UTC [msp] New -> DEBU 1410 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:31:34.881 UTC [msp] Setup -> DEBU 1411 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:31:34.882 UTC [msp.identity] newIdentity -> DEBU 1412 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -peer0.org1.example.com | "2019-05-02 01:30:58.076 UTC [historyleveldb] Commit -> DEBU 11da Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" -peer0.org1.example.com | "2019-05-02 01:30:58.058 UTC [leveldbhelper] GetIterator -> DEBU 11b4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:30:58.081 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 11db No expiry entry found for expiringAtBlk [4]" -peer0.org1.example.com | "2019-05-02 01:30:58.082 UTC [historyleveldb] Commit -> DEBU 11dc Channel [businesschannel]: Updates committed to history database for blockNo [3]" -peer0.org1.example.com | "2019-05-02 01:30:58.082 UTC [kvledger] CommitWithPvtData -> INFO 11dd [businesschannel] Committed block [3] with 1 transaction(s) in 325ms (state_validation=88ms block_commit=142ms state_commit=87ms)" -peer0.org1.example.com | "2019-05-02 01:30:58.083 UTC [transientstore] PurgeByTxids -> DEBU 11de Purging private data from transient store for committed txids" -peer0.org1.example.com | "2019-05-02 01:30:58.083 UTC [leveldbhelper] GetIterator -> DEBU 11df Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x34, 0x38, 0x66, 0x35, 0x62, 0x31, 0x62, 0x37, 0x31, 0x34, 0x62, 0x32, 0x37, 0x39, 0x61, 0x38, 0x63, 0x62, 0x61, 0x32, 0x31, 0x39, 0x65, 0x63, 0x65, 0x32, 0x34, 0x66, 0x34, 0x38, 0x35, 0x36, 0x30, 0x39, 0x34, 0x66, 0x34, 0x32, 0x37, 0x36, 0x35, 0x66, 0x33, 0x64, 0x35, 0x66, 0x36, 0x30, 0x33, 0x32, 0x66, 0x35, 0x37, 0x64, 0x61, 0x65, 0x39, 0x33, 0x31, 0x63, 0x66, 0x33, 0x32, 0x61, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x34, 0x38, 0x66, 0x35, 0x62, 0x31, 0x62, 0x37, 0x31, 0x34, 0x62, 0x32, 0x37, 0x39, 0x61, 0x38, 0x63, 0x62, 0x61, 0x32, 0x31, 0x39, 0x65, 0x63, 0x65, 0x32, 0x34, 0x66, 0x34, 0x38, 0x35, 0x36, 0x30, 0x39, 0x34, 0x66, 0x34, 0x32, 0x37, 0x36, 0x35, 0x66, 0x33, 0x64, 0x35, 0x66, 0x36, 0x30, 0x33, 0x32, 0x66, 0x35, 0x37, 0x64, 0x61, 0x65, 0x39, 0x33, 0x31, 0x63, 0x66, 0x33, 0x32, 0x61, 0xff}]" -peer0.org1.example.com | "2019-05-02 01:30:58.089 UTC [pvtdatastorage] GetPvtDataByBlockNum -> DEBU 11e0 Get private data for block [3], filter=ledger.PvtNsCollFilter{"_lifecycle":ledger.PvtCollFilter{"_implicit_org_Org1MSP":true}}" -peer0.org1.example.com | "2019-05-02 01:30:58.089 UTC [pvtdatastorage] GetPvtDataByBlockNum -> DEBU 11e1 Querying private data storage for write sets using startKey=[]byte{0x2, 0x1, 0x3, 0x0}, endKey=[]byte{0x2, 0x1, 0x4, 0x0}" -peer0.org1.example.com | "2019-05-02 01:30:58.089 UTC [leveldbhelper] GetIterator -> DEBU 11e2 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x4, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:30:58.089 UTC [confighistory] mostRecentEntryBelow -> DEBU 11e3 mostRecentEntryBelow() - {lscc, _lifecycle~collection, 3}" -peer0.org1.example.com | "2019-05-02 01:30:58.090 UTC [leveldbhelper] GetIterator -> DEBU 11e4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x73, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x7e, 0x63, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x1}]" -peer0.org1.example.com | "2019-05-02 01:30:58.090 UTC [confighistory] mostRecentEntryBelow -> DEBU 11e5 Key no entry found. Returning nil" -peer0.org1.example.com | "2019-05-02 01:30:58.090 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 11e6 constructing new query executor txid = [15aff45a-adbb-42c1-9b75-cba997dac431]" -peer0.org1.example.com | "2019-05-02 01:30:58.090 UTC [lockbasedtxmgr] Done -> DEBU 11e7 Done with transaction simulation / query execution [15aff45a-adbb-42c1-9b75-cba997dac431]" -peer0.org1.example.com | "2019-05-02 01:30:58.090 UTC [gossip.privdata] filterNotEligible -> DEBU 11e8 Found 1 for TxID 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a , collection _implicit_org_Org1MSP for 192.168.240.6:44982" -peer0.org1.example.com | "2019-05-02 01:30:58.090 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 11e9 constructing new query executor txid = [839e0780-4145-4295-84c7-bc05bffd5a12]" -peer0.org1.example.com | "2019-05-02 01:30:58.090 UTC [lockbasedtxmgr] Done -> DEBU 11ea Done with transaction simulation / query execution [839e0780-4145-4295-84c7-bc05bffd5a12]" -peer0.org1.example.com | "2019-05-02 01:30:58.090 UTC [msp] GetManagerForChain -> DEBU 11eb Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:30:58.090 UTC [cauthdsl] func1 -> DEBU 11ec 0xc0035cdac0 gate 1556760658090779000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:58.110 UTC [gossip.discovery] handleAliveMessage -> DEBU 11ed Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.110 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ee Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.110 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.110 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11f0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:30:58.110 UTC [msp.identity] Verify -> DEBU 11f1 Verify: digest = 00000000 a5 7d cc b1 dd 4c 94 04 fa f9 2a a1 3c b4 91 ff |.}...L....*.<...| -peer0.org1.example.com | 00000010 81 a9 ca ee 28 ec 0f 9d d5 49 50 d4 81 68 ee 3e |....(....IP..h.>|" -peer0.org1.example.com | "2019-05-02 01:30:58.110 UTC [msp.identity] Verify -> DEBU 11f2 Verify: sig = 00000000 30 44 02 20 2e 94 9c 49 6e 50 ff 01 de b0 74 82 |0D. ...InP....t.| -peer0.org1.example.com | 00000010 83 5c b6 a8 c1 84 fd b2 63 bc d3 8c 88 29 ed b1 |.\......c....)..| -peer0.org1.example.com | 00000020 f9 d6 3a 0d 02 20 13 d7 4c 5a 7d 33 19 fe 67 0c |..:.. ..LZ}3..g.| -peer0.org1.example.com | 00000030 17 4c 0e fa 33 4c 43 f4 6e 41 31 89 4f c4 39 85 |.L..3LC.nA1.O.9.| -peer0.org1.example.com | 00000040 cb e5 c0 9b cf 4f |.....O|" -peer0.org1.example.com | "2019-05-02 01:30:58.111 UTC [msp.identity] Verify -> DEBU 11f3 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:30:58.111 UTC [msp.identity] Verify -> DEBU 11f4 Verify: sig = 00000000 30 44 02 20 72 c1 e9 cf 87 98 1d 4d 07 b7 b1 3f |0D. r......M...?| -peer0.org1.example.com | 00000010 1d e0 a8 e3 79 01 3e d4 e1 04 42 1f c4 a6 4a d7 |....y.>...B...J.| -peer0.org1.example.com | 00000020 2a 74 28 9a 02 20 0c 22 28 f3 2c 1d 92 b6 6a 05 |*t(.. ."(.,...j.| -peer0.org1.example.com | 00000030 dd 2f 07 47 e1 eb 3f 49 36 87 e9 45 99 69 27 ed |./.G..?I6..E.i'.| -peer0.org1.example.com | 00000040 de 7b 83 e8 3b 3b |.{..;;|" -peer0.org1.example.com | "2019-05-02 01:30:58.112 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -peer0.org1.example.com | "2019-05-02 01:30:58.112 UTC [gossip.discovery] isSentByMe -> DEBU 11f6 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.113 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f7 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11f8 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.113 UTC [gossip.gossip] handleMessage -> DEBU 11f9 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.114 UTC [msp.identity] Sign -> DEBU 11fa Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020804 " -peer0.org1.example.com | "2019-05-02 01:30:58.114 UTC [msp.identity] Sign -> DEBU 11fb Sign: digest: 622038E5EFA2E5F25A129C1CE0ABB820EEEFD00980938F39CD565946377AEA2C " -peer0.org1.example.com | "2019-05-02 01:30:58.114 UTC [gossip.state] commitBlock -> DEBU 11fc [businesschannel] Committed block [3] with 1 transaction(s)" -peer0.org1.example.com | "2019-05-02 01:30:58.114 UTC [common.deliver] deliverBlocks -> DEBU 11fd [channel: businesschannel] Delivering block [3] for (0xc002e7d500) for 192.168.240.9:41280" -peer0.org1.example.com | "2019-05-02 01:30:58.115 UTC [fsblkstorage] waitForBlock -> DEBU 11fe Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" -peer0.org1.example.com | "2019-05-02 01:30:58.090 UTC [cauthdsl] func2 -> DEBU 11ff 0xc0035cdac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:58.117 UTC [cauthdsl] func2 -> DEBU 1200 0xc0035cdac0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:58.117 UTC [cauthdsl] func2 -> DEBU 1201 0xc0035cdac0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:58.117 UTC [msp.identity] Verify -> DEBU 1202 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-05-02 01:30:58.117 UTC [msp.identity] Verify -> DEBU 1203 Verify: sig = 00000000 30 45 02 21 00 93 9f bb c3 94 0d 2b 22 14 ff 02 |0E.!.......+"...| -peer0.org1.example.com | 00000010 27 d7 fd f0 f4 9a 7b 5c df 9c b7 0d f9 c0 20 68 |'.....{\...... h| -peer0.org1.example.com | 00000020 4c 0d 92 89 e4 02 20 76 1c 02 e7 6e 97 e1 b6 37 |L..... v...n...7| -peer0.org1.example.com | 00000030 54 75 51 f0 52 1d 6c 29 fa 0c 1b 22 99 aa 9b 6b |TuQ.R.l)..."...k| -peer0.org1.example.com | 00000040 6b 18 4d cd 74 78 11 |k.M.tx.|" -peer0.org1.example.com | "2019-05-02 01:30:58.117 UTC [cauthdsl] func2 -> DEBU 1204 0xc0035cdac0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:58.117 UTC [cauthdsl] func1 -> DEBU 1205 0xc0035cdac0 gate 1556760658090779000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:58.117 UTC [gossip.privdata] func1 -> DEBU 1206 Returning 192.168.240.6:44982 1 elements" -peer0.org1.example.com | "2019-05-02 01:30:58.149 UTC [common.deliver] deliverBlocks -> DEBU 1207 Context canceled, aborting wait for next block" -peer0.org1.example.com | "2019-05-02 01:30:58.149 UTC [common.deliverevents] func1 -> DEBU 1208 Closing Deliver stream" -peer0.org1.example.com | "2019-05-02 01:30:58.149 UTC [comm.grpc.server] 1 -> INFO 1209 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T01:31:25.586Z grpc.peer_address=192.168.240.9:41280 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.5627539s -peer0.org1.example.com | "2019-05-02 01:30:58.149 UTC [grpc] infof -> DEBU 120a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:58.149 UTC [fsblkstorage] waitForBlock -> DEBU 120b Came out of wait. maxAvailaBlockNumber=[3]" -peer0.org1.example.com | "2019-05-02 01:30:58.150 UTC [grpc] infof -> DEBU 120c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:30:58.433 UTC [gossip.gossip] handleMessage -> DEBU 120d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.433 UTC [gossip.gossip] handleMessage -> DEBU 120e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.433 UTC [gossip.discovery] handleMsgFromComm -> DEBU 120f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.433 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1210 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:58.434 UTC [msp.identity] Verify -> DEBU 1211 Verify: digest = 00000000 93 7d 5a 3c 90 f1 43 b7 07 36 40 e3 97 32 d6 f0 |.}Z<..C..6@..2..| -peer0.org1.example.com | 00000010 ed cf e2 04 7d 36 15 ff 66 cb 3b 1e 18 ec 27 6a |....}6..f.;...'j|" -peer0.org1.example.com | "2019-05-02 01:30:58.434 UTC [msp.identity] Verify -> DEBU 1212 Verify: sig = 00000000 30 45 02 21 00 a9 e0 a2 d4 bc e1 1d c3 41 c3 d1 |0E.!.........A..| -peer0.org1.example.com | 00000010 92 8e 3c a4 3b 56 c7 6c 79 8b 66 96 bb 3d 49 e3 |..<.;V.ly.f..=I.| -peer0.org1.example.com | 00000020 00 8f 35 71 93 02 20 38 2e 82 15 5a 0c 87 cf 3f |..5q.. 8...Z...?| -peer0.org1.example.com | 00000030 d4 54 25 0e cd bb 5c 27 11 a0 cb 07 7b 50 f8 3c |.T%...\'....{P.<| -peer0.org1.example.com | 00000040 97 7c 77 7d 9c f6 c7 |.|w}...|" -peer0.org1.example.com | "2019-05-02 01:30:58.434 UTC [msp.identity] Verify -> DEBU 1213 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:30:58.434 UTC [msp.identity] Verify -> DEBU 1214 Verify: sig = 00000000 30 45 02 21 00 9a d1 53 a2 5d 53 15 93 7f 0e 7e |0E.!...S.]S....~| -peer0.org1.example.com | 00000010 6c 1f 1e 83 60 fe 10 9b 34 d9 cf da c2 5e b1 c0 |l...`...4....^..| -peer0.org1.example.com | 00000020 1f a2 e3 35 c5 02 20 3f a2 2f 97 cd 30 95 87 fd |...5.. ?./..0...| -peer0.org1.example.com | 00000030 58 11 56 c3 b9 42 86 51 0c eb 7c c2 9d 58 71 4c |X.V..B.Q..|..XqL| -peer0.org1.example.com | 00000040 76 50 e3 c1 37 34 a5 |vP..74.|" -peer0.org1.example.com | "2019-05-02 01:30:58.434 UTC [gossip.discovery] handleAliveMessage -> DEBU 1215 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 1216 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:58.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 1217 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 " -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:34.882 UTC [msp.identity] newIdentity -> DEBU 1413 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:34.884 UTC [msp] Validate -> DEBU 1414 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:31:34.884 UTC [common.channelconfig] NewStandardValues -> DEBU 1415 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-05-02 01:31:34.884 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1416 Processing field: ACLs" -orderer0.example.com | "2019-05-02 01:31:34.884 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1417 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:31:34.885 UTC [common.channelconfig] NewStandardValues -> DEBU 1418 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:31:34.885 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1419 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:31:34.885 UTC [common.channelconfig] NewStandardValues -> DEBU 141a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:31:34.885 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141b Processing field: MSP" -orderer0.example.com | "2019-05-02 01:31:34.885 UTC [common.channelconfig] Validate -> DEBU 141c Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:31:34.886 UTC [common.channelconfig] validateMSP -> DEBU 141d Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.886 UTC [msp] newBccspMsp -> DEBU 141e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:31:34.886 UTC [msp] New -> DEBU 141f Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:31:34.886 UTC [msp] Setup -> DEBU 1420 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.891 UTC [msp.identity] newIdentity -> DEBU 1421 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:34.895 UTC [msp.identity] newIdentity -> DEBU 1422 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:34.895 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1423 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.895 UTC [msp] Validate -> DEBU 1424 MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:31:34.895 UTC [msp] getCertificationChain -> DEBU 1425 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:34.895 UTC [msp] hasOURole -> DEBU 1426 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [msp] getCertificationChain -> DEBU 1427 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [common.channelconfig] NewStandardValues -> DEBU 1428 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1429 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [common.channelconfig] NewStandardValues -> DEBU 142a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142b Processing field: MSP" -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [common.channelconfig] Validate -> DEBU 142c Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [common.channelconfig] validateMSP -> DEBU 142d Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [msp] newBccspMsp -> DEBU 142e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [msp] New -> DEBU 142f Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [msp] Setup -> DEBU 1430 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.896 UTC [msp.identity] newIdentity -> DEBU 1431 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:27:55.317 UTC [cauthdsl] func1 -> DEBU 123c 0xc00105e8a0 gate 1556789275317530800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:55.317 UTC [cauthdsl] func2 -> DEBU 123d 0xc00105e8a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:55.318 UTC [cauthdsl] func2 -> DEBU 123e 0xc00105e8a0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:55.319 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 123f Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-05-02 09:27:55.319 UTC [msp] Validate -> DEBU 1240 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:27:55.320 UTC [cauthdsl] func2 -> DEBU 1241 0xc00105e8a0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:55.321 UTC [msp.identity] Verify -> DEBU 1242 Verify: digest = 00000000 18 93 3a f3 8f 51 4c 97 83 64 25 4a 0f 9d 16 75 |..:..QL..d%J...u| +orderer0.example.com | 00000010 06 bd 69 8c fa 3b 9a ab aa 6b 17 3d f2 6b a8 e7 |..i..;...k.=.k..|" +orderer0.example.com | "2019-05-02 09:27:55.321 UTC [msp.identity] Verify -> DEBU 1243 Verify: sig = 00000000 30 44 02 20 78 46 3b a9 fa 0a d8 f0 11 ff e2 0b |0D. xF;.........| +orderer0.example.com | 00000010 71 dd 3e ff 70 97 a3 aa 7a 0c 5d 32 3c 22 db c2 |q.>.p...z.]2<"..| +orderer0.example.com | 00000020 9b 03 8e b3 02 20 27 95 5c 39 bc af 69 cb 45 11 |..... '.\9..i.E.| +orderer0.example.com | 00000030 ff 6e d7 40 9d 7f 34 e9 d4 de 10 3a 86 b9 b1 4d |.n.@..4....:...M| +orderer0.example.com | 00000040 3c 9d e4 3c 0c 6c |<..<.l|" +orderer0.example.com | "2019-05-02 09:27:55.322 UTC [cauthdsl] func2 -> DEBU 1244 0xc00105e8a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:55.322 UTC [cauthdsl] func1 -> DEBU 1245 0xc00105e8a0 gate 1556789275317530800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:55.323 UTC [policies] Evaluate -> DEBU 1246 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.323 UTC [policies] Evaluate -> DEBU 1247 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.324 UTC [policies] Evaluate -> DEBU 1248 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.324 UTC [policies] Evaluate -> DEBU 1249 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.325 UTC [policies] Evaluate -> DEBU 124a Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.325 UTC [policies] Evaluate -> DEBU 124b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.326 UTC [common.deliver] deliverBlocks -> DEBU 124c [channel: testchainid] Received seekInfo (0xc001191300) start: > stop: > from 172.18.0.8:57374" +orderer0.example.com | "2019-05-02 09:27:55.327 UTC [fsblkstorage] Next -> DEBU 124d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-05-02 09:27:55.327 UTC [fsblkstorage] newBlockfileStream -> DEBU 124e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-05-02 09:27:55.327 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 124f Remaining bytes=[25826], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:55.327 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1250 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-05-02 09:27:55.328 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1251 blockbytes [25823] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:55.328 UTC [common.deliver] deliverBlocks -> DEBU 1252 [channel: testchainid] Delivering block [1] for (0xc001191300) for 172.18.0.8:57374" +orderer0.example.com | "2019-05-02 09:27:55.329 UTC [common.deliver] deliverBlocks -> DEBU 1253 [channel: testchainid] Done delivering to 172.18.0.8:57374 for (0xc001191300)" +peer0.org1.example.com | "2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1094 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] Done -> DEBU 1095 Done with transaction simulation / query execution [a22dcb4a-1a7e-4378-854e-b6c0ab7b0079]" +peer0.org1.example.com | "2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1096 constructing new query executor txid = [2420b70c-c870-4439-b6f4-e5060665642d]" +peer0.org1.example.com | "2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1097 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1098 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] Done -> DEBU 1099 Done with transaction simulation / query execution [2420b70c-c870-4439-b6f4-e5060665642d]" +peer0.org1.example.com | "2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 109a constructing new query executor txid = [cf54879c-c9b1-4ef0-a9c4-c5f32c74725e]" +peer0.org1.example.com | "2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 109b retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 109c retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] Done -> DEBU 109d Done with transaction simulation / query execution [cf54879c-c9b1-4ef0-a9c4-c5f32c74725e]" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 109e constructing new query executor txid = [0a8ed1bf-3673-44d9-980a-c1a3d8a59d0d]" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 109f retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10a0 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] Done -> DEBU 10a1 Done with transaction simulation / query execution [0a8ed1bf-3673-44d9-980a-c1a3d8a59d0d]" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [vscc] Validate -> DEBU 10a2 block 3, namespace: _lifecycle, tx 0 validation results is: " +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 10a3 Transaction fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 appears to be valid" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [committer.txvalidator] Dispatch -> DEBU 10a4 [businesschannel] Dispatch completes env bytes 0xc00217d000" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [committer.txvalidator] validateTx -> DEBU 10a5 [businesschannel] validateTx completes for block 0xc0027182c0 env 0xc002d40690 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [committer.txvalidator] Validate -> DEBU 10a6 got result for idx 0, code 0" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [committer.txvalidator] Validate -> INFO 10a7 [businesschannel] Validated block [3] in 24ms" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10a8 constructing new query executor txid = [e6ada518-a977-452b-8e53-fe283617feed]" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] Done -> DEBU 10a9 Done with transaction simulation / query execution [e6ada518-a977-452b-8e53-fe283617feed]" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [msp] GetManagerForChain -> DEBU 10aa Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [cauthdsl] func1 -> DEBU 10ab 0xc0039104b0 gate 1556789250019687700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [cauthdsl] func2 -> DEBU 10ac 0xc0039104b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [cauthdsl] func2 -> DEBU 10ad 0xc0039104b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [cauthdsl] func2 -> DEBU 10ae 0xc0039104b0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [msp.identity] Verify -> DEBU 10af Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... | +peer0.org1.example.com | 00000010 08 97 14 85 6e e2 33 b3 90 2a 59 1d 0d 5f 29 25 |....n.3..*Y.._)%|" +peer0.org1.example.com | "2019-05-02 09:27:30.019 UTC [msp.identity] Verify -> DEBU 10b0 Verify: sig = 00000000 30 44 02 20 48 9c ca c4 a4 a8 2d 4c 45 08 31 b8 |0D. H.....-LE.1.| +peer0.org1.example.com | 00000010 a6 12 3b ce 60 ea 4a 53 9d 05 ba fd e2 01 8d 3f |..;.`.JS.......?| +peer0.org1.example.com | 00000020 7f 77 15 88 02 20 3f ca a9 21 29 53 d0 5b 09 e5 |.w... ?..!)S.[..| +peer0.org1.example.com | 00000030 2b e3 68 49 77 5d 19 ed cb 2c 61 13 02 4d 19 25 |+.hIw]...,a..M.%| +peer0.org1.example.com | 00000040 c9 c5 ee c0 b5 da |......|" +peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [cauthdsl] func2 -> DEBU 10b1 0xc0039104b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [cauthdsl] func1 -> DEBU 10b2 0xc0039104b0 gate 1556789250019687700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [gossip.privdata] listMissingPrivateData -> DEBU 10b3 Retrieving private write sets for 1 transactions from transient store" +peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [transientstore] GetTxPvtRWSetByTxid -> DEBU 10b4 Getting private data from transient store for transaction fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940" +peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [leveldbhelper] GetIterator -> DEBU 10b5 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0xff}]" +peer0.org1.example.com | "2019-05-02 09:27:30.020 UTC [gossip.privdata] StoreBlock -> DEBU 10b6 [businesschannel] No missing collection private write sets to fetch from remote peers" +orderer0.example.com | "2019-05-02 09:27:55.330 UTC [common.deliver] Handle -> DEBU 1254 Waiting for new SeekInfo from 172.18.0.8:57374" +orderer0.example.com | "2019-05-02 09:27:55.330 UTC [common.deliver] Handle -> DEBU 1255 Attempting to read seek info message from 172.18.0.8:57374" +orderer0.example.com | "2019-05-02 09:27:55.336 UTC [grpc] infof -> DEBU 1256 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:55.337 UTC [common.deliver] Handle -> WARN 1257 Error reading from 172.18.0.8:57374: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:55.339 UTC [orderer.common.server] func1 -> DEBU 1258 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:55.339 UTC [comm.grpc.server] 1 -> INFO 1259 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57374 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.0399ms +orderer0.example.com | "2019-05-02 09:27:55.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 125a Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs" +orderer0.example.com | "2019-05-02 09:27:55.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 125b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.3µs " +orderer0.example.com | "2019-05-02 09:27:55.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 125c Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +orderer0.example.com | "2019-05-02 09:27:55.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 125d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2124ms " +orderer0.example.com | "2019-05-02 09:27:55.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:55.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:55.540 UTC [orderer.common.server] Deliver -> DEBU 1260 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:55.541 UTC [common.deliver] Handle -> DEBU 1261 Starting new deliver loop for 172.18.0.8:57376" +orderer0.example.com | "2019-05-02 09:27:55.542 UTC [common.deliver] Handle -> DEBU 1262 Attempting to read seek info message from 172.18.0.8:57376" +orderer0.example.com | "2019-05-02 09:27:55.544 UTC [policies] Evaluate -> DEBU 1263 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.544 UTC [policies] Evaluate -> DEBU 1264 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.544 UTC [policies] Evaluate -> DEBU 1265 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.545 UTC [policies] Evaluate -> DEBU 1266 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.545 UTC [policies] Evaluate -> DEBU 1267 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.545 UTC [cauthdsl] func1 -> DEBU 1268 0xc000889fe0 gate 1556789275545604100 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:55.545 UTC [cauthdsl] func2 -> DEBU 1269 0xc000889fe0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:55.546 UTC [cauthdsl] func2 -> DEBU 126a 0xc000889fe0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:55.546 UTC [cauthdsl] func2 -> DEBU 126b 0xc000889fe0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:55.546 UTC [msp.identity] Verify -> DEBU 126c Verify: digest = 00000000 a0 af 2e 60 21 b7 2c f5 ab 6b 2a ee 36 6d 79 28 |...`!.,..k*.6my(| +orderer0.example.com | 00000010 ea 79 cc af 36 3f 28 0c df 01 1c b4 4e 9a 79 1b |.y..6?(.....N.y.|" +orderer0.example.com | "2019-05-02 09:27:55.546 UTC [msp.identity] Verify -> DEBU 126d Verify: sig = 00000000 30 44 02 20 08 92 4a 66 a0 24 ef 6a 54 42 f3 55 |0D. ..Jf.$.jTB.U| +orderer0.example.com | 00000010 71 8d 3e 52 25 6e 65 12 04 93 98 10 30 38 11 fa |q.>R%ne.....08..| +orderer0.example.com | 00000020 be 20 8b ab 02 20 0b d8 24 00 d5 44 3f f1 dc be |. ... ..$..D?...| +orderer0.example.com | 00000030 ed 70 bc 36 c2 bb 4a d9 a7 57 6a 30 33 9d 00 60 |.p.6..J..Wj03..`| +orderer0.example.com | 00000040 70 b2 44 d9 06 3a |p.D..:|" +orderer0.example.com | "2019-05-02 09:27:55.546 UTC [cauthdsl] func2 -> DEBU 126e 0xc000889fe0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:55.547 UTC [cauthdsl] func1 -> DEBU 126f 0xc000889fe0 gate 1556789275545604100 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:55.547 UTC [policies] Evaluate -> DEBU 1270 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1271 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1272 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1273 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1274 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1275 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.548 UTC [common.deliver] deliverBlocks -> DEBU 1276 [channel: testchainid] Received seekInfo (0xc001191cc0) start: > stop: > from 172.18.0.8:57376" +orderer0.example.com | "2019-05-02 09:27:55.549 UTC [fsblkstorage] Next -> DEBU 1277 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-05-02 09:27:55.549 UTC [fsblkstorage] newBlockfileStream -> DEBU 1278 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-05-02 09:27:55.549 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1279 Remaining bytes=[25826], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:55.550 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 127a Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-05-02 09:27:55.550 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 127b blockbytes [25823] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:55.550 UTC [common.deliver] deliverBlocks -> DEBU 127c [channel: testchainid] Delivering block [1] for (0xc001191cc0) for 172.18.0.8:57376" +orderer0.example.com | "2019-05-02 09:27:55.550 UTC [common.deliver] deliverBlocks -> DEBU 127d [channel: testchainid] Done delivering to 172.18.0.8:57376 for (0xc001191cc0)" +orderer0.example.com | "2019-05-02 09:27:55.551 UTC [common.deliver] Handle -> DEBU 127e Waiting for new SeekInfo from 172.18.0.8:57376" +orderer0.example.com | "2019-05-02 09:27:55.551 UTC [common.deliver] Handle -> DEBU 127f Attempting to read seek info message from 172.18.0.8:57376" +orderer0.example.com | "2019-05-02 09:27:55.555 UTC [policies] Evaluate -> DEBU 1280 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.555 UTC [policies] Evaluate -> DEBU 1281 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.556 UTC [policies] Evaluate -> DEBU 1282 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.556 UTC [policies] Evaluate -> DEBU 1283 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.556 UTC [policies] Evaluate -> DEBU 1284 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.557 UTC [cauthdsl] func1 -> DEBU 1285 0xc0010794b0 gate 1556789275557087800 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:55.558 UTC [cauthdsl] func2 -> DEBU 1286 0xc0010794b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:55.558 UTC [cauthdsl] func2 -> DEBU 1287 0xc0010794b0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:55.558 UTC [cauthdsl] func2 -> DEBU 1288 0xc0010794b0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:55.559 UTC [msp.identity] Verify -> DEBU 1289 Verify: digest = 00000000 bd a8 93 90 1e c8 e2 03 73 08 f8 f9 a5 26 e6 74 |........s....&.t| +orderer0.example.com | 00000010 9e bb a8 9d 61 dc 00 cc 8f f7 d9 fe 93 30 e9 10 |....a........0..|" +orderer0.example.com | "2019-05-02 09:27:55.559 UTC [msp.identity] Verify -> DEBU 128a Verify: sig = 00000000 30 45 02 21 00 82 16 17 fe f9 8e b4 3b dc 79 32 |0E.!........;.y2| +orderer0.example.com | 00000010 55 12 fb a2 4e 83 d3 43 28 c3 52 52 4f d0 84 26 |U...N..C(.RRO..&| +orderer0.example.com | 00000020 26 55 3f c5 6c 02 20 3f 88 34 6a ca ec 6f db 6e |&U?.l. ?.4j..o.n| +orderer0.example.com | 00000030 19 bc 01 d4 aa e9 bb da 42 ea aa 5a 4b 22 88 e9 |........B..ZK"..| +orderer0.example.com | 00000040 d7 ab b5 44 13 9d 3c |...D..<|" +orderer0.example.com | "2019-05-02 09:27:55.560 UTC [cauthdsl] func2 -> DEBU 128b 0xc0010794b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:55.561 UTC [cauthdsl] func1 -> DEBU 128c 0xc0010794b0 gate 1556789275557087800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:55.561 UTC [policies] Evaluate -> DEBU 128d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.562 UTC [policies] Evaluate -> DEBU 128e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.563 UTC [policies] Evaluate -> DEBU 128f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.564 UTC [policies] Evaluate -> DEBU 1290 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.564 UTC [policies] Evaluate -> DEBU 1291 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.565 UTC [policies] Evaluate -> DEBU 1292 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.566 UTC [common.deliver] deliverBlocks -> DEBU 1293 [channel: testchainid] Received seekInfo (0xc001056240) start: > stop: > from 172.18.0.8:57376" +orderer0.example.com | "2019-05-02 09:27:55.567 UTC [fsblkstorage] Next -> DEBU 1294 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-05-02 09:27:55.567 UTC [fsblkstorage] newBlockfileStream -> DEBU 1295 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:55.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1296 Remaining bytes=[44241], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:55.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1297 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:55.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1298 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:55.569 UTC [common.deliver] deliverBlocks -> DEBU 1299 [channel: testchainid] Delivering block [0] for (0xc001056240) for 172.18.0.8:57376" +orderer0.example.com | "2019-05-02 09:27:55.569 UTC [common.deliver] deliverBlocks -> DEBU 129a [channel: testchainid] Done delivering to 172.18.0.8:57376 for (0xc001056240)" +orderer0.example.com | "2019-05-02 09:27:55.570 UTC [common.deliver] Handle -> DEBU 129b Waiting for new SeekInfo from 172.18.0.8:57376" +orderer0.example.com | "2019-05-02 09:27:55.570 UTC [common.deliver] Handle -> DEBU 129c Attempting to read seek info message from 172.18.0.8:57376" +orderer0.example.com | "2019-05-02 09:27:55.579 UTC [common.deliver] Handle -> WARN 129d Error reading from 172.18.0.8:57376: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:55.580 UTC [orderer.common.server] func1 -> DEBU 129e Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:55.580 UTC [comm.grpc.server] 1 -> INFO 129f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57376 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.7269ms +orderer0.example.com | "2019-05-02 09:27:55.580 UTC [grpc] infof -> DEBU 12a0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:55.687 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:55.688 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a2 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" +orderer0.example.com | "2019-05-02 09:27:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 485.3µs " +orderer0.example.com | "2019-05-02 09:27:55.728 UTC [orderer.common.server] Deliver -> DEBU 12a4 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:55.728 UTC [common.deliver] Handle -> DEBU 12a5 Starting new deliver loop for 172.18.0.8:57378" +orderer0.example.com | "2019-05-02 09:27:55.728 UTC [common.deliver] Handle -> DEBU 12a6 Attempting to read seek info message from 172.18.0.8:57378" +orderer0.example.com | "2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12ab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.729 UTC [cauthdsl] func1 -> DEBU 12ac 0xc00091eb70 gate 1556789275729816600 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:55.730 UTC [cauthdsl] func2 -> DEBU 12ad 0xc00091eb70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:55.730 UTC [cauthdsl] func2 -> DEBU 12ae 0xc00091eb70 processing identity 0 with bytes of efef60" +peer0.org1.example.com | "2019-05-02 09:27:30.021 UTC [gossip.privdata] StoreBlock -> DEBU 10b7 [businesschannel] Added 1 namespace private write sets for block [3], tran [0]" +peer0.org1.example.com | "2019-05-02 09:27:30.021 UTC [kvledger] CommitWithPvtData -> DEBU 10b8 [businesschannel] Validating state for block [3]" +peer0.org1.example.com | "2019-05-02 09:27:30.021 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10b9 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:27:30.021 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10ba lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10bb Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10bc ValidateAndPrepareBatch() for block number = [3]" +peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10bd preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [valimpl] preprocessProtoBlock -> DEBU 10be txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [stateleveldb] GetState -> DEBU 10bf GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:30.022 UTC [statebasedval] validateKVRead -> DEBU 10c0 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-05-02 09:27:30.023 UTC [stateleveldb] GetState -> DEBU 10c1 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +peer0.org1.example.com | "2019-05-02 09:27:30.023 UTC [stateleveldb] GetState -> DEBU 10c2 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-05-02 09:27:30.023 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 10c3 Block [3] Transaction index [0] TxId [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] marked as valid by state validator. ContainsPostOrderWrites [false]" +peer0.org1.example.com | "2019-05-02 09:27:30.023 UTC [valinternal] ApplyWriteSet -> DEBU 10c4 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc002792740), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc002792800), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0027926c0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc002792700), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4 DEBU 10c5 validating rwset..." +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10c6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10c7 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10c8 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10c9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10ca Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0004446c0 0x27475e0 0xc000011220}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0022c0dc0 map[]})]}" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10cb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [cceventmgmt] HandleStateUpdates -> DEBU 10cc Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10cd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 10ce Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10cf Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0})}" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [gossip.comm] Send -> DEBU 10d0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4723 bytes, seq: 3}, Envelope: 4753 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10d1 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:55.730 UTC [cauthdsl] func2 -> DEBU 12af 0xc00091eb70 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:55.730 UTC [msp.identity] Verify -> DEBU 12b0 Verify: digest = 00000000 59 89 45 0a 74 27 16 b8 95 50 7f 23 45 7e 8b 73 |Y.E.t'...P.#E~.s| +orderer0.example.com | 00000010 77 f1 10 45 23 34 42 49 ea f8 f1 0f 18 67 f0 57 |w..E#4BI.....g.W|" +orderer0.example.com | "2019-05-02 09:27:55.730 UTC [msp.identity] Verify -> DEBU 12b1 Verify: sig = 00000000 30 44 02 20 46 81 8b 21 76 d6 1b b5 bb 7a 70 83 |0D. F..!v....zp.| +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10d2 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 184 141 138 176 125 192 58 83 1 250 26 202 161 54 104 45 229 195 166 43 96 100 9 159 109 154 254 234 147 189 33 229 2 32 120 2 28 36 139 185 5 29 110 69 153 220 53 183 5 154 146 86 140 197 1 134 231 194 84 112 80 242 124 44 67 58]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002604a00 0xc002598700 0xc0025cc980})]}" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10d3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [confighistory] HandleStateUpdates -> ERRO 10d4 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0037d7120)}" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10d5 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000ebc0})}" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [gossip.comm] sendToEndpoint -> DEBU 10d6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4723 bytes, seq: 3}, Envelope: 4753 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [gossip.comm] sendToEndpoint -> DEBU 10d7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [kvledger] CommitWithPvtData -> DEBU 10d8 [businesschannel] Committing block [3] to storage" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [ledgerstorage] CommitWithPvtData -> DEBU 10d9 Writing block [3] to pvt block store" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10da constructing new query executor txid = [b4299b97-7794-4ce4-bab0-f3cdb7de5da3]" +peer0.org1.example.com | "2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] Done -> DEBU 10db Done with transaction simulation / query execution [b4299b97-7794-4ce4-bab0-f3cdb7de5da3]" +peer0.org1.example.com | "2019-05-02 09:27:30.027 UTC [pvtdatastorage] Prepare -> DEBU 10dc Saved 1 private data write sets for block [3]" +peer0.org1.example.com | "2019-05-02 09:27:30.030 UTC [fsblkstorage] indexBlock -> DEBU 10dd Indexing block [blockNum=3, blockHash=[]byte{0x19, 0xcd, 0xcd, 0x5c, 0x29, 0x4b, 0x7c, 0x44, 0xae, 0x5, 0xb7, 0xcb, 0x3a, 0xbf, 0xcb, 0xc3, 0xf2, 0xcc, 0x3c, 0xa9, 0x83, 0x39, 0x7c, 0x8f, 0x82, 0x59, 0xb5, 0x99, 0xa7, 0x3d, 0xe9, 0x5e} txOffsets= +peer0.org1.example.com | txId=fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 locPointer=offset=70, bytesLength=3705 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-05-02 09:27:30.030 UTC [fsblkstorage] indexBlock -> DEBU 10de Adding txLoc [fileSuffixNum=0, offset=71442, bytesLength=3705] for tx ID: [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] to txid-index" +peer0.org1.example.com | "2019-05-02 09:27:30.031 UTC [fsblkstorage] indexBlock -> DEBU 10df Adding txLoc [fileSuffixNum=0, offset=71442, bytesLength=3705] for tx number:[0] ID: [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] to blockNumTranNum index" +peer0.org1.example.com | "2019-05-02 09:27:30.034 UTC [fsblkstorage] updateCheckpoint -> DEBU 10e0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76084], isChainEmpty=[false], lastBlockNumber=[3]" +peer0.org1.example.com | "2019-05-02 09:27:30.034 UTC [pvtdatastorage] Commit -> DEBU 10e1 Committing private data for block [3]" +peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [pvtdatastorage] Commit -> DEBU 10e2 Committed private data for block [3]" +peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [kvledger] CommitWithPvtData -> DEBU 10e3 [businesschannel] Committing block [3] transactions to state database" +peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [lockbasedtxmgr] Commit -> DEBU 10e4 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [lockbasedtxmgr] Commit -> DEBU 10e5 Committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e6 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e7 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" +peer0.org1.example.com | "2019-05-02 09:27:30.036 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e8 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" +peer0.org1.example.com | "2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e9 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" +peer0.org1.example.com | "2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10ea Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" +peer0.org1.example.com | "2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10eb Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" +peer0.org1.example.com | "2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10ec Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" +peer0.org1.example.com | "2019-05-02 09:27:30.037 UTC [lockbasedtxmgr] Commit -> DEBU 10ed Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10ee Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" +peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10ef Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" +orderer0.example.com | 00000010 52 36 bd 38 52 32 57 4e 88 0a 74 47 a0 0a 61 e6 |R6.8R2WN..tG..a.| +orderer0.example.com | 00000020 c3 95 b9 31 02 20 05 d4 65 c5 16 8a 7a 3e 55 8f |...1. ..e...z>U.| +orderer0.example.com | 00000030 fd 65 c6 81 bc 79 94 af 7d 6a cb 64 39 0d 4e 54 |.e...y..}j.d9.NT| +orderer0.example.com | 00000040 6d 3e 93 3e ab e3 |m>.>..|" +orderer0.example.com | "2019-05-02 09:27:55.731 UTC [cauthdsl] func2 -> DEBU 12b2 0xc00091eb70 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:55.731 UTC [cauthdsl] func1 -> DEBU 12b3 0xc00091eb70 gate 1556789275729816600 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:55.731 UTC [policies] Evaluate -> DEBU 12b4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.731 UTC [policies] Evaluate -> DEBU 12b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b6 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b8 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.733 UTC [common.deliver] deliverBlocks -> DEBU 12ba [channel: testchainid] Received seekInfo (0xc00102af40) start: > stop: > from 172.18.0.8:57378" +orderer0.example.com | "2019-05-02 09:27:55.735 UTC [fsblkstorage] Next -> DEBU 12bb Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-05-02 09:27:55.735 UTC [fsblkstorage] newBlockfileStream -> DEBU 12bc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:27:55.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12bd Remaining bytes=[44241], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:55.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12be Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:27:55.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12bf blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:55.736 UTC [common.deliver] deliverBlocks -> DEBU 12c0 [channel: testchainid] Delivering block [0] for (0xc00102af40) for 172.18.0.8:57378" +orderer0.example.com | "2019-05-02 09:27:55.737 UTC [common.deliver] deliverBlocks -> DEBU 12c1 [channel: testchainid] Done delivering to 172.18.0.8:57378 for (0xc00102af40)" +orderer0.example.com | "2019-05-02 09:27:55.737 UTC [common.deliver] Handle -> DEBU 12c2 Waiting for new SeekInfo from 172.18.0.8:57378" +orderer0.example.com | "2019-05-02 09:27:55.738 UTC [common.deliver] Handle -> DEBU 12c3 Attempting to read seek info message from 172.18.0.8:57378" +orderer0.example.com | "2019-05-02 09:27:55.745 UTC [common.deliver] Handle -> WARN 12c4 Error reading from 172.18.0.8:57378: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:55.745 UTC [orderer.common.server] func1 -> DEBU 12c5 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:55.745 UTC [comm.grpc.server] 1 -> INFO 12c6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57378 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.7529ms +orderer0.example.com | "2019-05-02 09:27:55.746 UTC [grpc] infof -> DEBU 12c7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:55.940 UTC [orderer.common.server] Deliver -> DEBU 12c8 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:27:55.940 UTC [common.deliver] Handle -> DEBU 12c9 Starting new deliver loop for 172.18.0.8:57380" +orderer0.example.com | "2019-05-02 09:27:55.940 UTC [common.deliver] Handle -> DEBU 12ca Attempting to read seek info message from 172.18.0.8:57380" +orderer0.example.com | "2019-05-02 09:27:55.941 UTC [policies] Evaluate -> DEBU 12cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.941 UTC [policies] Evaluate -> DEBU 12cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.942 UTC [policies] Evaluate -> DEBU 12cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.942 UTC [policies] Evaluate -> DEBU 12ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:27:55.942 UTC [policies] Evaluate -> DEBU 12cf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:27:55.943 UTC [cauthdsl] func1 -> DEBU 12d0 0xc000b87db0 gate 1556789275943020300 evaluation starts" +orderer0.example.com | "2019-05-02 09:27:55.943 UTC [cauthdsl] func2 -> DEBU 12d1 0xc000b87db0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:27:55.943 UTC [cauthdsl] func2 -> DEBU 12d2 0xc000b87db0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:27:55.944 UTC [cauthdsl] func2 -> DEBU 12d3 0xc000b87db0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:27:55.945 UTC [msp.identity] Verify -> DEBU 12d4 Verify: digest = 00000000 9e 90 26 06 26 20 25 09 b4 7f 89 a8 15 11 81 39 |..&.& %........9| +orderer0.example.com | 00000010 4d d9 b9 8f 11 37 bd 83 ed 6a 90 6d 00 0e ff bf |M....7...j.m....|" +orderer0.example.com | "2019-05-02 09:27:55.945 UTC [msp.identity] Verify -> DEBU 12d5 Verify: sig = 00000000 30 44 02 20 63 51 3b 4a 31 d6 b6 90 85 73 6b 3e |0D. cQ;J1....sk>| +orderer0.example.com | 00000010 fe e7 8a 5c 25 ae 26 bb 82 73 79 6e de f8 44 fe |...\%.&..syn..D.| +orderer0.example.com | 00000020 ef e8 b5 f3 02 20 13 c1 4a 09 47 d1 bf 05 d4 f4 |..... ..J.G.....| +orderer0.example.com | 00000030 60 ce 6d 02 61 05 4c 02 5d 0b 7c 2b 12 f2 e3 d3 |`.m.a.L.].|+....| +orderer0.example.com | 00000040 7b 38 20 ef c1 43 |{8 ..C|" +orderer0.example.com | "2019-05-02 09:27:55.946 UTC [cauthdsl] func2 -> DEBU 12d6 0xc000b87db0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:27:55.946 UTC [cauthdsl] func1 -> DEBU 12d7 0xc000b87db0 gate 1556789275943020300 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:27:55.947 UTC [policies] Evaluate -> DEBU 12d8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.947 UTC [policies] Evaluate -> DEBU 12d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:27:55.948 UTC [policies] Evaluate -> DEBU 12da Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.949 UTC [policies] Evaluate -> DEBU 12db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:27:55.949 UTC [policies] Evaluate -> DEBU 12dc Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.949 UTC [policies] Evaluate -> DEBU 12dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:27:55.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12de Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +orderer0.example.com | "2019-05-02 09:27:55.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12df Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +orderer0.example.com | "2019-05-02 09:27:55.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 458.2µs " +peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f0 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" +peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f1 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" +peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f2 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/fields/exp02#1/PackageID] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x50, 0x61, 0x63, 0x6b, 0x61, 0x67, 0x65, 0x49, 0x44}]" +peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f3 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" +peer0.org1.example.com | "2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f4 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���R���l� DEBU 10f5 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" +peer0.org1.example.com | "2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f6 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" +peer0.org1.example.com | "2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f7 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" +peer0.org1.example.com | "2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f8 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" +peer0.org1.example.com | "2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f9 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" +peer0.org1.example.com | "2019-05-02 09:27:30.042 UTC [fsblkstorage] waitForBlock -> DEBU 10fa Came out of wait. maxAvailaBlockNumber=[3]" +peer0.org1.example.com | "2019-05-02 09:27:30.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10fb Remaining bytes=[4712], Going to peek [8] bytes" +peer0.org1.example.com | "2019-05-02 09:27:30.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10fc Returning blockbytes - length=[4710], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}" +peer0.org1.example.com | "2019-05-02 09:27:30.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10fd blockbytes [4710] read from file [0]" +peer0.org1.example.com | "2019-05-02 09:27:30.043 UTC [lockbasedtxmgr] Commit -> DEBU 10fe Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-05-02 09:27:30.043 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 10ff Preparing potential purge list working-set for expiringAtBlk [4]" +peer0.org1.example.com | "2019-05-02 09:27:30.043 UTC [leveldbhelper] GetIterator -> DEBU 1100 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:30.043 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1101 No expiry entry found for expiringAtBlk [4]" +peer0.org1.example.com | "2019-05-02 09:27:30.044 UTC [lockbasedtxmgr] func1 -> DEBU 1102 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-05-02 09:27:30.044 UTC [kvledger] CommitWithPvtData -> DEBU 1103 [businesschannel] Committing block [3] transactions to history database" +orderer0.example.com | "2019-05-02 09:27:55.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.2µs " +orderer0.example.com | "2019-05-02 09:27:55.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:55.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:55.953 UTC [common.deliver] deliverBlocks -> DEBU 12e4 [channel: testchainid] Received seekInfo (0xc001056840) start: > stop: > from 172.18.0.8:57380" +orderer0.example.com | "2019-05-02 09:27:55.955 UTC [fsblkstorage] Next -> DEBU 12e5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-05-02 09:27:55.955 UTC [fsblkstorage] newBlockfileStream -> DEBU 12e6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-05-02 09:27:55.956 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e7 Remaining bytes=[25826], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:27:55.956 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e8 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-05-02 09:27:55.957 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e9 blockbytes [25823] read from file [0]" +orderer0.example.com | "2019-05-02 09:27:55.957 UTC [common.deliver] deliverBlocks -> DEBU 12ea [channel: testchainid] Delivering block [1] for (0xc001056840) for 172.18.0.8:57380" +orderer0.example.com | "2019-05-02 09:27:55.958 UTC [common.deliver] deliverBlocks -> DEBU 12eb [channel: testchainid] Done delivering to 172.18.0.8:57380 for (0xc001056840)" +orderer0.example.com | "2019-05-02 09:27:55.959 UTC [common.deliver] Handle -> DEBU 12ec Waiting for new SeekInfo from 172.18.0.8:57380" +orderer0.example.com | "2019-05-02 09:27:55.960 UTC [common.deliver] Handle -> DEBU 12ed Attempting to read seek info message from 172.18.0.8:57380" +orderer0.example.com | "2019-05-02 09:27:55.967 UTC [common.deliver] Handle -> WARN 12ee Error reading from 172.18.0.8:57380: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:27:55.967 UTC [orderer.common.server] func1 -> DEBU 12ef Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:27:55.967 UTC [comm.grpc.server] 1 -> INFO 12f0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57380 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.582ms +orderer0.example.com | "2019-05-02 09:27:55.968 UTC [grpc] infof -> DEBU 12f1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:27:56.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:56.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f3 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +orderer0.example.com | "2019-05-02 09:27:56.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs " +orderer0.example.com | "2019-05-02 09:27:56.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f5 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +orderer0.example.com | "2019-05-02 09:27:56.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +orderer0.example.com | "2019-05-02 09:27:56.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118.9µs " +orderer0.example.com | "2019-05-02 09:27:56.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.8µs " +orderer0.example.com | "2019-05-02 09:27:56.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:56.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fa Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:56.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:56.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fc Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2019-05-02 09:27:56.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " +orderer0.example.com | "2019-05-02 09:27:56.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fe Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-05-02 09:27:56.962 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146µs " +orderer0.example.com | "2019-05-02 09:27:56.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1300 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-05-02 09:27:56.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1301 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:56.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1302 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5618ms " +orderer0.example.com | "2019-05-02 09:27:56.966 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1303 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:57.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1304 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:57.182 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1305 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2019-05-02 09:27:57.182 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1306 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.2µs " +orderer0.example.com | "2019-05-02 09:27:57.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1307 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +orderer0.example.com | "2019-05-02 09:27:57.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1308 Sending msg of 28 bytes to 3 on channel businesschannel took 9.9µs" +orderer0.example.com | "2019-05-02 09:27:57.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1309 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.4µs " +orderer0.example.com | "2019-05-02 09:27:57.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.8µs " +orderer0.example.com | "2019-05-02 09:27:57.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:57.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:57.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:57.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130e Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs" +orderer0.example.com | "2019-05-02 09:27:57.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.8µs " +orderer0.example.com | "2019-05-02 09:27:57.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1310 Sending msg of 28 bytes to 2 on channel businesschannel took 88.6µs" +orderer0.example.com | "2019-05-02 09:27:57.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1311 Sending msg of 28 bytes to 3 on channel businesschannel took 123.4µs" +orderer0.example.com | "2019-05-02 09:27:57.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1312 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.4µs " +orderer0.example.com | "2019-05-02 09:27:57.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1313 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.4µs " +orderer0.example.com | "2019-05-02 09:27:57.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1314 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:57.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1315 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:58.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1316 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:58.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1317 Sending msg of 28 bytes to 3 on channel testchainid took 41.8µs" +orderer0.example.com | "2019-05-02 09:27:58.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1318 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.6µs " +orderer0.example.com | "2019-05-02 09:27:58.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1319 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs" +orderer0.example.com | "2019-05-02 09:27:58.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131a Sending msg of 28 bytes to 3 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-05-02 09:27:58.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.4µs " +orderer0.example.com | "2019-05-02 09:27:58.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.1µs " +orderer0.example.com | "2019-05-02 09:27:58.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:58.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:58.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:58.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1320 Sending msg of 28 bytes to 3 on channel testchainid took 653.6µs" +orderer0.example.com | "2019-05-02 09:27:58.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 466µs " +orderer0.example.com | "2019-05-02 09:27:58.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1322 Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs" +orderer0.example.com | "2019-05-02 09:27:58.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1323 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +orderer0.example.com | "2019-05-02 09:27:58.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1324 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 635.7µs " +orderer0.example.com | "2019-05-02 09:27:58.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1325 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 238.9µs " +orderer0.example.com | "2019-05-02 09:27:58.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1326 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:30.044 UTC [historyleveldb] Commit -> DEBU 1104 Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" +peer0.org1.example.com | "2019-05-02 09:27:30.046 UTC [historyleveldb] Commit -> DEBU 1105 Channel [businesschannel]: Updates committed to history database for blockNo [3]" +peer0.org1.example.com | "2019-05-02 09:27:30.046 UTC [kvledger] CommitWithPvtData -> INFO 1106 [businesschannel] Committed block [3] with 1 transaction(s) in 25ms (state_validation=3ms block_commit=11ms state_commit=7ms)" +peer0.org1.example.com | "2019-05-02 09:27:30.046 UTC [transientstore] PurgeByTxids -> DEBU 1107 Purging private data from transient store for committed txids" +peer0.org1.example.com | "2019-05-02 09:27:30.046 UTC [leveldbhelper] GetIterator -> DEBU 1108 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0xff}]" +peer0.org1.example.com | "2019-05-02 09:27:30.047 UTC [common.deliver] deliverBlocks -> DEBU 1109 [channel: businesschannel] Delivering block [3] for (0xc002548140) for 172.18.0.8:57288" +peer0.org1.example.com | "2019-05-02 09:27:30.048 UTC [fsblkstorage] waitForBlock -> DEBU 110a Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +peer0.org1.example.com | "2019-05-02 09:27:30.049 UTC [msp.identity] Sign -> DEBU 110b Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020804 " +peer0.org1.example.com | "2019-05-02 09:27:30.051 UTC [msp.identity] Sign -> DEBU 110c Sign: digest: 555DD175376C5C862F5FCE28E73AB6235A6633F5F8516C9D10D185C54EC327CF " +peer0.org1.example.com | "2019-05-02 09:27:30.055 UTC [grpc] infof -> DEBU 110d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:30.055 UTC [common.deliver] deliverBlocks -> DEBU 110e Context canceled, aborting wait for next block" +peer0.org1.example.com | "2019-05-02 09:27:30.061 UTC [common.deliverevents] func1 -> DEBU 1110 Closing Deliver stream" +peer0.org1.example.com | "2019-05-02 09:27:30.061 UTC [comm.grpc.server] 1 -> INFO 1111 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T09:27:58.984Z grpc.peer_address=172.18.0.8:57288 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=1.0762516s +peer0.org1.example.com | "2019-05-02 09:27:30.056 UTC [grpc] infof -> DEBU 110f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:30.063 UTC [fsblkstorage] waitForBlock -> DEBU 1112 Came out of wait. maxAvailaBlockNumber=[3]" +peer0.org1.example.com | "2019-05-02 09:27:30.064 UTC [gossip.state] commitBlock -> DEBU 1113 [businesschannel] Committed block [3] with 1 transaction(s)" +peer0.org1.example.com | "2019-05-02 09:27:30.087 UTC [gossip.privdata] handleRequest -> DEBU 1114 Got GossipMessage: nonce:15262395124521686410 channel:"businesschannel" tag:CHAN_ONLY privateReq: > , Envelope: 138 bytes, Signature: 0 bytes from 172.18.0.6:53224" +peer0.org1.example.com | "2019-05-02 09:27:30.088 UTC [pvtdatastorage] GetPvtDataByBlockNum -> DEBU 1115 Get private data for block [3], filter=ledger.PvtNsCollFilter{"_lifecycle":ledger.PvtCollFilter{"_implicit_org_Org1MSP":true}}" +peer0.org1.example.com | "2019-05-02 09:27:30.089 UTC [pvtdatastorage] GetPvtDataByBlockNum -> DEBU 1116 Querying private data storage for write sets using startKey=[]byte{0x2, 0x1, 0x3, 0x0}, endKey=[]byte{0x2, 0x1, 0x4, 0x0}" +peer0.org1.example.com | "2019-05-02 09:27:30.089 UTC [leveldbhelper] GetIterator -> DEBU 1117 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x4, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:30.089 UTC [confighistory] mostRecentEntryBelow -> DEBU 1118 mostRecentEntryBelow() - {lscc, _lifecycle~collection, 3}" +peer0.org1.example.com | "2019-05-02 09:27:30.089 UTC [leveldbhelper] GetIterator -> DEBU 1119 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x73, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x7e, 0x63, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x1}]" +peer0.org1.example.com | "2019-05-02 09:27:30.089 UTC [confighistory] mostRecentEntryBelow -> DEBU 111a Key no entry found. Returning nil" +peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 111b constructing new query executor txid = [25e191a2-dd7b-4485-b7d0-66e54c985427]" +peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] Done -> DEBU 111c Done with transaction simulation / query execution [25e191a2-dd7b-4485-b7d0-66e54c985427]" +peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [gossip.privdata] filterNotEligible -> DEBU 111d Found 1 for TxID fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 , collection _implicit_org_Org1MSP for 172.18.0.6:53224" +peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 111e constructing new query executor txid = [17b6749c-5c34-4adf-afe1-15daa1971483]" +peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] Done -> DEBU 111f Done with transaction simulation / query execution [17b6749c-5c34-4adf-afe1-15daa1971483]" +peer0.org1.example.com | "2019-05-02 09:27:30.090 UTC [msp] GetManagerForChain -> DEBU 1120 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:30.091 UTC [cauthdsl] func1 -> DEBU 1121 0xc002d97230 gate 1556789250091035300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:30.092 UTC [cauthdsl] func2 -> DEBU 1122 0xc002d97230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:30.092 UTC [cauthdsl] func2 -> DEBU 1123 0xc002d97230 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:30.092 UTC [cauthdsl] func2 -> DEBU 1124 0xc002d97230 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:30.092 UTC [msp.identity] Verify -> DEBU 1125 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-05-02 09:27:30.092 UTC [msp.identity] Verify -> DEBU 1126 Verify: sig = 00000000 30 45 02 21 00 97 35 d5 cf 34 fa e6 3a 73 bf c5 |0E.!..5..4..:s..| +peer0.org1.example.com | 00000010 db 67 96 6f f8 83 09 ca 90 e4 fb f3 51 bd 4e f2 |.g.o........Q.N.| +peer0.org1.example.com | 00000020 ef 5a 18 e4 5e 02 20 63 8f 02 15 e2 48 e3 94 39 |.Z..^. c....H..9| +peer0.org1.example.com | 00000030 88 b3 43 15 b5 3d 56 ce b8 64 df 14 24 d7 2a 46 |..C..=V..d..$.*F| +peer0.org1.example.com | 00000040 0a ba a5 ee ef 51 1b |.....Q.|" +peer0.org1.example.com | "2019-05-02 09:27:30.093 UTC [cauthdsl] func2 -> DEBU 1127 0xc002d97230 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:30.095 UTC [cauthdsl] func1 -> DEBU 1128 0xc002d97230 gate 1556789250091035300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:30.095 UTC [gossip.privdata] func1 -> DEBU 1129 Returning 172.18.0.6:53224 1 elements" +peer0.org1.example.com | "2019-05-02 09:27:32.285 UTC [msp] DeserializeIdentity -> DEBU 112a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.285 UTC [msp] DeserializeIdentity -> DEBU 112b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.286 UTC [gossip.comm] Send -> DEBU 112c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 112e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 112f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 112d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1131 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.288 UTC [gossip.gossip] handleMessage -> DEBU 1132 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1130 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1133 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.289 UTC [msp.identity] Verify -> DEBU 1134 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +peer0.org1.example.com | "2019-05-02 09:27:32.289 UTC [gossip.comm] func1 -> DEBU 1135 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.289 UTC [msp.identity] Verify -> DEBU 1136 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|" +peer0.org1.example.com | "2019-05-02 09:27:32.290 UTC [msp] DeserializeIdentity -> DEBU 1137 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.291 UTC [msp] DeserializeIdentity -> DEBU 1138 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.291 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1139 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:32.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 113a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 113b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [policies] Evaluate -> DEBU 113c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [policies] Evaluate -> DEBU 113d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [policies] Evaluate -> DEBU 113e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [cauthdsl] func1 -> DEBU 113f 0xc002e334d0 gate 1556789252292600400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [cauthdsl] func2 -> DEBU 1140 0xc002e334d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [msp] DeserializeIdentity -> DEBU 1141 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [msp] DeserializeIdentity -> DEBU 1143 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [gossip.comm] Send -> DEBU 1144 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [msp] DeserializeIdentity -> DEBU 1145 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [msp] DeserializeIdentity -> DEBU 1146 Obtaining identity" +orderer0.example.com | "2019-05-02 09:27:58.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1327 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:59.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1328 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:59.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1329 Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +orderer0.example.com | "2019-05-02 09:27:59.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130µs " +orderer0.example.com | "2019-05-02 09:27:59.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132b Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs" +orderer0.example.com | "2019-05-02 09:27:59.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 364.2µs " +orderer0.example.com | "2019-05-02 09:27:59.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.1µs " +orderer0.example.com | "2019-05-02 09:27:59.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:59.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132f Sending msg of 28 bytes to 3 on channel businesschannel took 65.4µs" +orderer0.example.com | "2019-05-02 09:27:59.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1330 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:59.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1331 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:59.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1332 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2019-05-02 09:27:59.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1333 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 552.8µs " +orderer0.example.com | "2019-05-02 09:27:59.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1334 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-05-02 09:27:59.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1335 Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs" +orderer0.example.com | "2019-05-02 09:27:59.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1336 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.2µs " +orderer0.example.com | "2019-05-02 09:27:59.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1337 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " +orderer0.example.com | "2019-05-02 09:27:59.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1338 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:27:59.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1339 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:00.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:00.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133b Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" +orderer0.example.com | "2019-05-02 09:28:00.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.4µs " +orderer0.example.com | "2019-05-02 09:28:00.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133d Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-05-02 09:28:00.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 199.7µs " +orderer0.example.com | "2019-05-02 09:28:00.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:00.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1340 Sending msg of 28 bytes to 3 on channel businesschannel took 2.1559ms" +orderer0.example.com | "2019-05-02 09:28:00.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1341 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 490.8µs " +orderer0.example.com | "2019-05-02 09:28:00.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1342 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:01.609 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1343 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +orderer0.example.com | "2019-05-02 09:28:01.610 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1344 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2019-05-02 09:28:01.612 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1345 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4561ms " +orderer0.example.com | "2019-05-02 09:28:01.621 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1346 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 7.3567ms " +orderer0.example.com | "2019-05-02 09:28:01.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1347 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:01.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1348 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:01.628 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1349 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +orderer0.example.com | "2019-05-02 09:28:01.628 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.6µs " +orderer0.example.com | "2019-05-02 09:28:01.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:01.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1147 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1148 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.292 UTC [cauthdsl] func2 -> DEBU 1142 0xc002e334d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [cauthdsl] func2 -> DEBU 1149 0xc002e334d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [cauthdsl] func2 -> DEBU 114a 0xc002e334d0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.293 UTC [cauthdsl] func1 -> DEBU 114b 0xc002e334d0 gate 1556789252292600400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 114c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 114d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 114e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func1 -> DEBU 114f 0xc002e68b30 gate 1556789252294173000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1150 0xc002e68b30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1151 0xc002e68b30 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1152 0xc002e68b30 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [msp.identity] Verify -> DEBU 1153 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [msp.identity] Verify -> DEBU 1154 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1155 0xc002e68b30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [cauthdsl] func1 -> DEBU 1156 0xc002e68b30 gate 1556789252294173000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 1157 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 1158 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 1159 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 115a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 115b Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.| +peer0.org1.example.com | 00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 115c Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a| +peer0.org1.example.com | 00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~| +peer0.org1.example.com | 00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...| +peer0.org1.example.com | 00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......| +peer0.org1.example.com | 00000040 32 7c 48 bd 9e 05 6c |2|H...l|" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 115d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 115e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [policies] Evaluate -> DEBU 115f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [policies] Evaluate -> DEBU 1160 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [policies] Evaluate -> DEBU 1161 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [cauthdsl] func1 -> DEBU 1162 0xc002f52230 gate 1556789252295636200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [cauthdsl] func2 -> DEBU 1163 0xc002f52230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [cauthdsl] func2 -> DEBU 1164 0xc002f52230 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [cauthdsl] func2 -> DEBU 1165 0xc002f52230 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 1166 Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.| +peer0.org1.example.com | 00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|" +peer0.org1.example.com | "2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 1167 Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a| +peer0.org1.example.com | 00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~| +peer0.org1.example.com | 00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...| +peer0.org1.example.com | 00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......| +peer0.org1.example.com | 00000040 32 7c 48 bd 9e 05 6c |2|H...l|" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [cauthdsl] func2 -> DEBU 1168 0xc002f52230 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [cauthdsl] func1 -> DEBU 1169 0xc002f52230 gate 1556789252295636200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [gossip.gossip] handleMessage -> DEBU 116e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [gossip.gossip] handleMessage -> DEBU 116f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [msp] DeserializeIdentity -> DEBU 1170 Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:01.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134d Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +orderer0.example.com | "2019-05-02 09:28:01.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +orderer0.example.com | "2019-05-02 09:28:01.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134f Sending msg of 28 bytes to 2 on channel businesschannel took 155.4µs" +orderer0.example.com | "2019-05-02 09:28:01.953 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1350 Sending msg of 28 bytes to 3 on channel businesschannel took 27.9µs" +orderer0.example.com | "2019-05-02 09:28:01.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1351 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.5µs " +orderer0.example.com | "2019-05-02 09:28:01.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1352 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.2µs " +orderer0.example.com | "2019-05-02 09:28:01.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1353 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:01.958 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1354 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:02.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1355 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:02.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1356 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +orderer0.example.com | "2019-05-02 09:28:02.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1357 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.9µs " +orderer0.example.com | "2019-05-02 09:28:02.459 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1358 Sending msg of 28 bytes to 2 on channel businesschannel took 30.5µs" +orderer0.example.com | "2019-05-02 09:28:02.459 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1359 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2019-05-02 09:28:02.460 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.1µs " +orderer0.example.com | "2019-05-02 09:28:02.460 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.1µs " +orderer0.example.com | "2019-05-02 09:28:02.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:02.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:02.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:02.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 135f Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +orderer0.example.com | "2019-05-02 09:28:02.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1360 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.7µs " +orderer0.example.com | "2019-05-02 09:28:02.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1361 Sending msg of 28 bytes to 2 on channel businesschannel took 37.7µs" +orderer0.example.com | "2019-05-02 09:28:02.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1362 Sending msg of 28 bytes to 3 on channel businesschannel took 25.7µs" +orderer0.example.com | "2019-05-02 09:28:02.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1363 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.4µs " +orderer0.example.com | "2019-05-02 09:28:02.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1364 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.2µs " +orderer0.example.com | "2019-05-02 09:28:02.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1365 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:02.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1366 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:03.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1367 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:03.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1368 Sending msg of 28 bytes to 3 on channel testchainid took 20.1µs" +orderer0.example.com | "2019-05-02 09:28:03.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1369 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " +orderer0.example.com | "2019-05-02 09:28:03.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136a Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs" +orderer0.example.com | "2019-05-02 09:28:03.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136b Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-05-02 09:28:03.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 490.6µs " +orderer0.example.com | "2019-05-02 09:28:03.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 447.8µs " +orderer0.example.com | "2019-05-02 09:28:03.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:03.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:03.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1370 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:03.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1371 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" +orderer0.example.com | "2019-05-02 09:28:03.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1372 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 272.8µs " +orderer0.example.com | "2019-05-02 09:28:03.880 UTC [orderer.common.server] Deliver -> DEBU 1373 Starting new Deliver handler" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [msp.identity] Verify -> DEBU 1171 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +peer0.org1.example.com | "2019-05-02 09:27:32.296 UTC [msp.identity] Verify -> DEBU 1172 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|" +peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [msp] DeserializeIdentity -> DEBU 1173 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [msp] DeserializeIdentity -> DEBU 1174 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1175 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1176 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1177 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [policies] Evaluate -> DEBU 1178 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.297 UTC [policies] Evaluate -> DEBU 1179 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.298 UTC [policies] Evaluate -> DEBU 117a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.298 UTC [cauthdsl] func1 -> DEBU 117b 0xc003564460 gate 1556789252298199700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.298 UTC [cauthdsl] func2 -> DEBU 117c 0xc003564460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.298 UTC [cauthdsl] func2 -> DEBU 117d 0xc003564460 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.298 UTC [cauthdsl] func2 -> DEBU 117e 0xc003564460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [cauthdsl] func2 -> DEBU 117f 0xc003564460 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [cauthdsl] func1 -> DEBU 1180 0xc003564460 gate 1556789252298199700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [policies] Evaluate -> DEBU 1181 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [policies] Evaluate -> DEBU 1182 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [policies] Evaluate -> DEBU 1183 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [cauthdsl] func1 -> DEBU 1184 0xc003564ca0 gate 1556789252299791900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.299 UTC [cauthdsl] func2 -> DEBU 1185 0xc003564ca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [cauthdsl] func2 -> DEBU 1186 0xc003564ca0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [cauthdsl] func2 -> DEBU 1187 0xc003564ca0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [msp.identity] Verify -> DEBU 1188 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +peer0.org1.example.com | 00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [msp.identity] Verify -> DEBU 1189 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +peer0.org1.example.com | 00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +peer0.org1.example.com | 00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +peer0.org1.example.com | 00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +peer0.org1.example.com | 00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [gossip.comm] sendToEndpoint -> DEBU 118a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [gossip.comm] sendToEndpoint -> DEBU 118b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [cauthdsl] func2 -> DEBU 118c 0xc003564ca0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [cauthdsl] func1 -> DEBU 118d 0xc003564ca0 gate 1556789252299791900 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:03.880 UTC [common.deliver] Handle -> DEBU 1374 Starting new deliver loop for 172.18.0.8:57382" +orderer0.example.com | "2019-05-02 09:28:03.880 UTC [common.deliver] Handle -> DEBU 1375 Attempting to read seek info message from 172.18.0.8:57382" +orderer0.example.com | "2019-05-02 09:28:03.895 UTC [orderer.common.server] Broadcast -> DEBU 1376 Starting new Broadcast handler" +orderer0.example.com | "2019-05-02 09:28:03.895 UTC [orderer.common.broadcast] Handle -> DEBU 1377 Starting new broadcast loop for 172.18.0.8:57384" +orderer0.example.com | "2019-05-02 09:28:03.895 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1378 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57384" +orderer0.example.com | "2019-05-02 09:28:03.895 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1379 Processing config update message for channel businesschannel" +orderer0.example.com | "2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:28:03.896 UTC [cauthdsl] func1 -> DEBU 137f 0xc000380670 gate 1556789283896336900 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:03.896 UTC [cauthdsl] func2 -> DEBU 1380 0xc000380670 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:03.896 UTC [cauthdsl] func2 -> DEBU 1381 0xc000380670 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:03.896 UTC [cauthdsl] func2 -> DEBU 1382 0xc000380670 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:03.897 UTC [msp.identity] Verify -> DEBU 1383 Verify: digest = 00000000 95 cd 8f e5 ed ef 6d d2 0f be f9 0d 55 50 9b 77 |......m.....UP.w| +orderer0.example.com | 00000010 1d d8 d3 ab 72 85 c8 22 da d0 40 e6 35 b4 0f 72 |....r.."..@.5..r|" +orderer0.example.com | "2019-05-02 09:28:03.897 UTC [msp.identity] Verify -> DEBU 1384 Verify: sig = 00000000 30 44 02 20 2f ce f2 5a 3e 0c cf 74 8a 09 d9 a0 |0D. /..Z>..t....| +orderer0.example.com | 00000010 6b d5 9d b9 da 2b 99 1d f0 fd f8 d0 4c 7e 9d e6 |k....+......L~..| +orderer0.example.com | 00000020 20 17 7a 2c 02 20 6e 4a e3 b8 a6 ec bd 29 dc c7 | .z,. nJ.....)..| +orderer0.example.com | 00000030 49 c1 7e 43 5c 97 8e 99 e3 05 70 0b c6 9b 95 a3 |I.~C\.....p.....| +orderer0.example.com | 00000040 c8 33 4c 0e 94 c6 |.3L...|" +orderer0.example.com | "2019-05-02 09:28:03.897 UTC [cauthdsl] func2 -> DEBU 1385 0xc000380670 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:03.898 UTC [cauthdsl] func1 -> DEBU 1386 0xc000380670 gate 1556789283896336900 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 1387 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 1388 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 1389 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 138a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:28:03.900 UTC [policies] Evaluate -> DEBU 138b Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:28:03.900 UTC [policies] Evaluate -> DEBU 138c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 138d Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 138e Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 138f Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 1390 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 1391 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 1392 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1393 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1394 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1395 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1396 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:03.903 UTC [common.configtx] addToMap -> DEBU 1397 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:28:03.903 UTC [common.configtx] addToMap -> DEBU 1398 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:28:03.903 UTC [common.configtx] addToMap -> DEBU 1399 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:28:03.904 UTC [common.configtx] addToMap -> DEBU 139a Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.904 UTC [common.configtx] addToMap -> DEBU 139b Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.904 UTC [common.configtx] addToMap -> DEBU 139c Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.905 UTC [common.configtx] addToMap -> DEBU 139d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-05-02 09:28:03.905 UTC [common.configtx] addToMap -> DEBU 139e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 139f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 13a0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 13a1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 13a2 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:28:03.907 UTC [common.configtx] addToMap -> DEBU 13a3 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:28:03.907 UTC [common.configtx] addToMap -> DEBU 13a4 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:28:03.907 UTC [common.configtx] addToMap -> DEBU 13a5 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:28:03.908 UTC [common.configtx] addToMap -> DEBU 13a6 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:28:03.908 UTC [common.configtx] addToMap -> DEBU 13a7 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-05-02 09:27:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 118e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 118f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.300 UTC [policies] Evaluate -> DEBU 1190 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.305 UTC [policies] Evaluate -> DEBU 1191 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.305 UTC [policies] Evaluate -> DEBU 1192 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.306 UTC [policies] Evaluate -> DEBU 1193 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.306 UTC [msp.identity] Verify -> DEBU 1194 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +peer0.org1.example.com | "2019-05-02 09:27:32.307 UTC [msp.identity] Verify -> DEBU 1195 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU 1196 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.307 UTC [msp] DeserializeIdentity -> DEBU 1197 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.308 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1198 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:32.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1199 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.312 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.312 UTC [policies] Evaluate -> DEBU 119b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.312 UTC [policies] Evaluate -> DEBU 119c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.312 UTC [policies] Evaluate -> DEBU 119d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.313 UTC [cauthdsl] func1 -> DEBU 119e 0xc00362eb90 gate 1556789252312968100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.313 UTC [cauthdsl] func2 -> DEBU 119f 0xc00362eb90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.313 UTC [cauthdsl] func2 -> DEBU 11a0 0xc00362eb90 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.313 UTC [cauthdsl] func2 -> DEBU 11a1 0xc00362eb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.314 UTC [cauthdsl] func2 -> DEBU 11a2 0xc00362eb90 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.314 UTC [cauthdsl] func1 -> DEBU 11a3 0xc00362eb90 gate 1556789252312968100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.314 UTC [policies] Evaluate -> DEBU 11a4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.315 UTC [policies] Evaluate -> DEBU 11a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.315 UTC [policies] Evaluate -> DEBU 11a6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.315 UTC [cauthdsl] func1 -> DEBU 11a7 0xc00362f3d0 gate 1556789252315430500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.315 UTC [cauthdsl] func2 -> DEBU 11a8 0xc00362f3d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.315 UTC [cauthdsl] func2 -> DEBU 11a9 0xc00362f3d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.316 UTC [cauthdsl] func2 -> DEBU 11aa 0xc00362f3d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.316 UTC [msp.identity] Verify -> DEBU 11ab Verify: digest = 00000000 fe 15 c7 21 03 e4 15 f3 43 0e 25 df d1 10 e3 d8 |...!....C.%.....| +peer0.org1.example.com | 00000010 c2 75 19 37 0c ee 1a a8 fa b2 f0 63 15 47 4e c2 |.u.7.......c.GN.|" +peer0.org1.example.com | "2019-05-02 09:27:32.316 UTC [msp.identity] Verify -> DEBU 11ac Verify: sig = 00000000 30 45 02 21 00 f9 1a c0 c8 76 26 f9 fe e4 d7 1b |0E.!.....v&.....| +peer0.org1.example.com | 00000010 30 47 6e 1e f5 e1 40 6f c8 67 90 11 cf 35 c8 9d |0Gn...@o.g...5..| +peer0.org1.example.com | 00000020 51 c8 9a 15 c0 02 20 0a 34 5a 37 26 ea 1a ea aa |Q..... .4Z7&....| +peer0.org1.example.com | 00000030 66 87 e0 70 4d 6c e2 c0 b6 4d 4c c7 3a 22 72 10 |f..pMl...ML.:"r.| +peer0.org1.example.com | 00000040 2f a1 74 57 4c d1 ef |/.tWL..|" +peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [cauthdsl] func2 -> DEBU 11ad 0xc00362f3d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [cauthdsl] func1 -> DEBU 11ae 0xc00362f3d0 gate 1556789252315430500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11af Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11b1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [msp] DeserializeIdentity -> DEBU 11b3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11b4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11b5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func1 -> DEBU 11b9 0xc00378c4b0 gate 1556789252318517200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11ba 0xc00378c4b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11bb 0xc00378c4b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11bc 0xc00378c4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11bd 0xc00378c4b0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func1 -> DEBU 11be 0xc00378c4b0 gate 1556789252318517200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11bf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func1 -> DEBU 11c2 0xc00378ccf0 gate 1556789252318839500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11c3 0xc00378ccf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [cauthdsl] func2 -> DEBU 11c4 0xc00378ccf0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [cauthdsl] func2 -> DEBU 11c5 0xc00378ccf0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [msp.identity] Verify -> DEBU 11c6 Verify: digest = 00000000 fe 15 c7 21 03 e4 15 f3 43 0e 25 df d1 10 e3 d8 |...!....C.%.....| +peer0.org1.example.com | 00000010 c2 75 19 37 0c ee 1a a8 fa b2 f0 63 15 47 4e c2 |.u.7.......c.GN.|" +peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [msp.identity] Verify -> DEBU 11c7 Verify: sig = 00000000 30 45 02 21 00 f9 1a c0 c8 76 26 f9 fe e4 d7 1b |0E.!.....v&.....| +peer0.org1.example.com | 00000010 30 47 6e 1e f5 e1 40 6f c8 67 90 11 cf 35 c8 9d |0Gn...@o.g...5..| +peer0.org1.example.com | 00000020 51 c8 9a 15 c0 02 20 0a 34 5a 37 26 ea 1a ea aa |Q..... .4Z7&....| +peer0.org1.example.com | 00000030 66 87 e0 70 4d 6c e2 c0 b6 4d 4c c7 3a 22 72 10 |f..pMl...ML.:"r.| +peer0.org1.example.com | 00000040 2f a1 74 57 4c d1 ef |/.tWL..|" +peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [cauthdsl] func2 -> DEBU 11c8 0xc00378ccf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [cauthdsl] func1 -> DEBU 11c9 0xc00378ccf0 gate 1556789252318839500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [policies] Evaluate -> DEBU 11ca Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [policies] Evaluate -> DEBU 11cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.319 UTC [policies] Evaluate -> DEBU 11cc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [policies] Evaluate -> DEBU 11cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [gossip.gossip] handleMessage -> DEBU 11ce Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [gossip.gossip] handleMessage -> DEBU 11cf Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [msp] DeserializeIdentity -> DEBU 11d0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d1 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +peer0.org1.example.com | 00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d2 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +peer0.org1.example.com | 00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +peer0.org1.example.com | 00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +peer0.org1.example.com | 00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +peer0.org1.example.com | 00000040 c2 37 e5 9d c4 7b |.7...{|" +peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d3 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +peer0.org1.example.com | 00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +peer0.org1.example.com | "2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d4 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +peer0.org1.example.com | 00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +peer0.org1.example.com | 00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +peer0.org1.example.com | 00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU 11d5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.321 UTC [msp] DeserializeIdentity -> DEBU 11d6 Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:03.909 UTC [common.configtx] addToMap -> DEBU 13a8 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:03.909 UTC [common.configtx] verifyDeltaSet -> DEBU 13a9 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-05-02 09:28:03.910 UTC [common.configtx] verifyDeltaSet -> DEBU 13aa Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.910 UTC [common.configtx] verifyDeltaSet -> DEBU 13ab Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:28:03.910 UTC [common.configtx] policyForItem -> DEBU 13ac Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-05-02 09:28:03.910 UTC [policies] Manager -> DEBU 13ad Manager Channel looking up path []" +orderer0.example.com | "2019-05-02 09:28:03.910 UTC [policies] Manager -> DEBU 13ae Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:28:03.910 UTC [policies] Manager -> DEBU 13af Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b0 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b1 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b2 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b3 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b4 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b5 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.912 UTC [policies] Evaluate -> DEBU 13b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-05-02 09:28:03.912 UTC [policies] Evaluate -> DEBU 13b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:03.912 UTC [policies] Evaluate -> DEBU 13b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:28:03.912 UTC [cauthdsl] deduplicate -> WARN 13b9 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-05-02 09:28:03.912 UTC [cauthdsl] func1 -> DEBU 13ba 0xc0004038f0 gate 1556789283912816400 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13bb 0xc0004038f0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13bc 0xc0004038f0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13bd 0xc0004038f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13be 0xc0004038f0 processing identity 1 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:03.913 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13bf Checking if identity satisfies ADMIN role for Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.914 UTC [cauthdsl] func2 -> DEBU 13c0 0xc0004038f0 principal matched by identity 1" +orderer0.example.com | "2019-05-02 09:28:03.914 UTC [msp.identity] Verify -> DEBU 13c1 Verify: digest = 00000000 70 27 54 c7 10 65 06 23 74 50 fc 01 20 7a 9f 22 |p'T..e.#tP.. z."| +orderer0.example.com | 00000010 df 75 70 9a b8 8e 15 04 cc 2d a3 ad 5e 15 ee 89 |.up......-..^...|" +orderer0.example.com | "2019-05-02 09:28:03.914 UTC [msp.identity] Verify -> DEBU 13c2 Verify: sig = 00000000 30 44 02 20 3e 34 30 a7 7a 34 94 d8 b3 73 97 db |0D. >40.z4...s..| +orderer0.example.com | 00000010 96 da 10 13 46 64 57 5e af 8c ec ad 13 2e 72 23 |....FdW^......r#| +orderer0.example.com | 00000020 12 36 e1 a7 02 20 67 6b 69 65 0e 27 d7 39 1b e1 |.6... gkie.'.9..| +orderer0.example.com | 00000030 07 2a cf 5f b4 cf 8d 8d 2e 70 bf ed ec 66 7c 6b |.*._.....p...f|k| +orderer0.example.com | 00000040 a3 af 89 d2 b2 af |......|" +orderer0.example.com | "2019-05-02 09:28:03.915 UTC [cauthdsl] func2 -> DEBU 13c3 0xc0004038f0 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-05-02 09:28:03.915 UTC [cauthdsl] func1 -> DEBU 13c4 0xc0004038f0 gate 1556789283912816400 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:03.915 UTC [policies] Evaluate -> DEBU 13c5 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:03.915 UTC [policies] Evaluate -> DEBU 13c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:03.915 UTC [policies] Evaluate -> DEBU 13c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:28:03.915 UTC [cauthdsl] deduplicate -> WARN 13c8 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-05-02 09:28:03.916 UTC [cauthdsl] func1 -> DEBU 13c9 0xc00041cd20 gate 1556789283915990600 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:03.916 UTC [cauthdsl] func2 -> DEBU 13ca 0xc00041cd20 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-05-02 09:28:03.916 UTC [cauthdsl] func2 -> DEBU 13cb 0xc00041cd20 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:03.916 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13cc Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.916 UTC [cauthdsl] func2 -> DEBU 13cd 0xc00041cd20 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:03.917 UTC [msp.identity] Verify -> DEBU 13ce Verify: digest = 00000000 55 f0 c2 94 3a 37 23 eb d0 1b da 18 4a 66 45 b5 |U...:7#.....JfE.| +orderer0.example.com | 00000010 54 12 61 d1 4b ae fe 57 e9 51 94 57 aa af 68 17 |T.a.K..W.Q.W..h.|" +orderer0.example.com | "2019-05-02 09:28:03.917 UTC [msp.identity] Verify -> DEBU 13cf Verify: sig = 00000000 30 45 02 21 00 ef 26 69 f6 43 cc ea 70 a5 61 8d |0E.!..&i.C..p.a.| +orderer0.example.com | 00000010 ff a4 ff 24 9b 2c 47 7c 14 f4 82 75 2d 27 b6 b0 |...$.,G|...u-'..| +orderer0.example.com | 00000020 a2 6a 68 25 32 02 20 23 80 40 b2 b7 b1 c9 60 08 |.jh%2. #.@....`.| +orderer0.example.com | 00000030 cd 4e 09 a9 3c 63 75 29 2f 85 61 35 08 11 df c6 |.N.. DEBU 13d0 0xc00041cd20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:03.917 UTC [cauthdsl] func1 -> DEBU 13d1 0xc00041cd20 gate 1556789283915990600 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d2 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d4 Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:28:03.918 UTC [common.configtx] verifyDeltaSet -> DEBU 13d6 Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.919 UTC [common.configtx] verifyDeltaSet -> DEBU 13d7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:28:03.919 UTC [common.configtx] verifyDeltaSet -> DEBU 13d8 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:03.919 UTC [common.configtx] verifyDeltaSet -> DEBU 13d9 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13da Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13db Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13dc Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13dd Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13de Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.921 UTC [common.configtx] recurseConfigMap -> DEBU 13df Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.921 UTC [common.configtx] recurseConfigMap -> DEBU 13e0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.921 UTC [common.configtx] recurseConfigMap -> DEBU 13e1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e2 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e4 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e6 Setting policy for key Endorsement to " +orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e7 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e8 Setting policy for key Readers to " +orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13e9 Setting policy for key Writers to " +orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ea Setting policy for key Admins to " +orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13eb Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ec Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ed Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ee Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ef Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f0 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f1 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f2 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f3 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f4 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:03.925 UTC [common.channelconfig] NewStandardValues -> DEBU 13f5 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:28:03.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f6 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:28:03.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f7 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:28:03.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f8 Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f9 Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fa Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:28:03.926 UTC [common.channelconfig] NewStandardValues -> DEBU 13fb Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fc Processing field: ACLs" +orderer0.example.com | "2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fd Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] NewStandardValues -> DEBU 13fe Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13ff Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] NewStandardValues -> DEBU 1400 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1401 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] Validate -> DEBU 1402 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-05-02 09:28:03.927 UTC [common.channelconfig] validateMSP -> DEBU 1403 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.928 UTC [msp] newBccspMsp -> DEBU 1404 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:27:32.321 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11d7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:32.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11d8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11d9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.322 UTC [policies] Evaluate -> DEBU 11da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.322 UTC [policies] Evaluate -> DEBU 11db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.323 UTC [policies] Evaluate -> DEBU 11dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.323 UTC [cauthdsl] func1 -> DEBU 11dd 0xc003887640 gate 1556789252323396900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.323 UTC [cauthdsl] func2 -> DEBU 11de 0xc003887640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.323 UTC [cauthdsl] func2 -> DEBU 11df 0xc003887640 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.324 UTC [cauthdsl] func2 -> DEBU 11e0 0xc003887640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.324 UTC [cauthdsl] func2 -> DEBU 11e1 0xc003887640 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.324 UTC [cauthdsl] func1 -> DEBU 11e2 0xc003887640 gate 1556789252323396900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.324 UTC [policies] Evaluate -> DEBU 11e3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.324 UTC [policies] Evaluate -> DEBU 11e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func1 -> DEBU 11e6 0xc003887e80 gate 1556789252325216600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11e7 0xc003887e80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11e8 0xc003887e80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11e9 0xc003887e80 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [msp.identity] Verify -> DEBU 11ea Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +peer0.org1.example.com | 00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [msp.identity] Verify -> DEBU 11eb Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +peer0.org1.example.com | 00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +peer0.org1.example.com | 00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +peer0.org1.example.com | 00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +peer0.org1.example.com | 00000040 83 2b b4 bb 36 ef |.+..6.|" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11ec 0xc003887e80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [cauthdsl] func1 -> DEBU 11ed 0xc003887e80 gate 1556789252325216600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11ee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11f0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [msp] DeserializeIdentity -> DEBU 11f2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [msp] DeserializeIdentity -> DEBU 11f3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11f5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11f6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 11f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 11f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 11f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func1 -> DEBU 11fa 0xc000449650 gate 1556789252326582400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fb 0xc000449650 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fc 0xc000449650 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fd 0xc000449650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fe 0xc000449650 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [cauthdsl] func1 -> DEBU 11ff 0xc000449650 gate 1556789252326582400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 1200 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 1201 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 1202 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func1 -> DEBU 1203 0xc000449e90 gate 1556789252327069100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1204 0xc000449e90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1205 0xc000449e90 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1206 0xc000449e90 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [msp.identity] Verify -> DEBU 1207 Verify: digest = 00000000 03 99 07 bb b6 24 89 e1 32 94 ab ee 96 a3 53 b3 |.....$..2.....S.| +peer0.org1.example.com | 00000010 35 7e 51 3a 77 d4 07 ef b1 5a 6e ef 7d c4 af 10 |5~Q:w....Zn.}...|" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [msp.identity] Verify -> DEBU 1208 Verify: sig = 00000000 30 44 02 20 77 ab 2a 8b bf 4e 23 48 40 76 28 09 |0D. w.*..N#H@v(.| +peer0.org1.example.com | 00000010 bf f6 7d f0 16 4d c0 c1 16 d1 d5 99 a4 a2 70 ae |..}..M........p.| +peer0.org1.example.com | 00000020 44 19 ed 9b 02 20 7c de 8a 80 41 3d f5 65 7e 03 |D.... |...A=.e~.| +peer0.org1.example.com | 00000030 80 a0 7e 30 9b 3b 2a b4 08 da 64 28 a8 36 09 ba |..~0.;*...d(.6..| +peer0.org1.example.com | 00000040 1b 29 54 54 6f c7 |.)TTo.|" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1209 0xc000449e90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [cauthdsl] func1 -> DEBU 120a 0xc000449e90 gate 1556789252327069100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.327 UTC [msp] DeserializeIdentity -> DEBU 120f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1210 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1211 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 1212 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 1213 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 1214 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func1 -> DEBU 1215 0xc002292f70 gate 1556789252328448600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1216 0xc002292f70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1217 0xc002292f70 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1218 0xc002292f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1219 0xc002292f70 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [cauthdsl] func1 -> DEBU 121a 0xc002292f70 gate 1556789252328448600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 121b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 121c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 121d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func1 -> DEBU 121e 0xc0022937b0 gate 1556789252329126400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 121f 0xc0022937b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 1220 0xc0022937b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 1221 0xc0022937b0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [msp.identity] Verify -> DEBU 1222 Verify: digest = 00000000 03 99 07 bb b6 24 89 e1 32 94 ab ee 96 a3 53 b3 |.....$..2.....S.| +orderer0.example.com | "2019-05-02 09:28:03.928 UTC [msp] New -> DEBU 1405 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:28:03.928 UTC [msp] Setup -> DEBU 1406 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.929 UTC [msp.identity] newIdentity -> DEBU 1407 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -14686,40 +14467,9 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:34.897 UTC [msp.identity] newIdentity -> DEBU 1432 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:28:03.930 UTC [msp.identity] newIdentity -> DEBU 1408 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | "2019-05-02 01:30:58.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 1218 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 " -peer0.org1.example.com | "2019-05-02 01:30:58.435 UTC [gossip.discovery] learnExistingMembers -> DEBU 1219 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:58.435 UTC [gossip.discovery] learnExistingMembers -> DEBU 121a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.435 UTC [gossip.discovery] handleAliveMessage -> DEBU 121b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.435 UTC [gossip.discovery] handleMsgFromComm -> DEBU 121c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.435 UTC [msp] DeserializeIdentity -> DEBU 121d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.435 UTC [msp] DeserializeIdentity -> DEBU 121e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.435 UTC [msp] DeserializeIdentity -> DEBU 121f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.439 UTC [gossip.comm] Send -> DEBU 1220 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:58.439 UTC [msp] DeserializeIdentity -> DEBU 1221 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.439 UTC [gossip.comm] Send -> DEBU 1222 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:58.439 UTC [gossip.comm] sendToEndpoint -> DEBU 1223 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.439 UTC [gossip.comm] sendToEndpoint -> DEBU 1224 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.442 UTC [gossip.comm] sendToEndpoint -> DEBU 1225 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.473 UTC [gossip.comm] func1 -> DEBU 1226 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.473 UTC [gossip.gossip] handleMessage -> DEBU 1227 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.483 UTC [gossip.comm] sendToEndpoint -> DEBU 1228 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.485 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1229 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.486 UTC [gossip.discovery] handleMsgFromComm -> DEBU 122a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.473 UTC [gossip.gossip] handleMessage -> DEBU 122b Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.487 UTC [gossip.comm] func1 -> DEBU 122c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.487 UTC [gossip.gossip] handleMessage -> DEBU 122d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.487 UTC [gossip.gossip] handleMessage -> DEBU 122e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.487 UTC [gossip.discovery] handleMsgFromComm -> DEBU 122f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.487 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1230 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.512 UTC [gossip.comm] func1 -> DEBU 1231 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.512 UTC [gossip.gossip] handleMessage -> DEBU 1232 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.512 UTC [gossip.gossip] handleMessage -> DEBU 1233 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.512 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1234 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.512 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1235 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:30:58.512 UTC [msp] DeserializeIdentity -> DEBU 1236 Obtaining identity" orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN @@ -14731,21 +14481,21 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:34.897 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1433 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.897 UTC [msp] Validate -> DEBU 1434 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:31:34.898 UTC [msp] getCertificationChain -> DEBU 1435 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:34.899 UTC [msp] hasOURole -> DEBU 1436 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:31:34.899 UTC [msp] getCertificationChain -> DEBU 1437 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:34.900 UTC [common.channelconfig] NewStandardValues -> DEBU 1438 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:31:34.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1439 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:31:34.900 UTC [common.channelconfig] NewStandardValues -> DEBU 143a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:31:34.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 143b Processing field: MSP" -orderer0.example.com | "2019-05-02 01:31:34.900 UTC [common.channelconfig] Validate -> DEBU 143c Anchor peers for org Org3MSP are " -orderer0.example.com | "2019-05-02 01:31:34.900 UTC [common.channelconfig] validateMSP -> DEBU 143d Setting up MSP for org Org3MSP" -orderer0.example.com | "2019-05-02 01:31:34.901 UTC [msp] newBccspMsp -> DEBU 143e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:31:34.901 UTC [msp] New -> DEBU 143f Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:31:34.901 UTC [msp] Setup -> DEBU 1440 Setting up MSP instance Org3MSP" -orderer0.example.com | "2019-05-02 01:31:34.901 UTC [msp.identity] newIdentity -> DEBU 1441 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:28:03.931 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1409 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.931 UTC [msp] Validate -> DEBU 140a MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:28:03.931 UTC [msp] getCertificationChain -> DEBU 140b MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:03.932 UTC [msp] hasOURole -> DEBU 140c MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:28:03.932 UTC [msp] getCertificationChain -> DEBU 140d MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:03.932 UTC [common.channelconfig] NewStandardValues -> DEBU 140e Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:28:03.932 UTC [common.channelconfig] initializeProtosStruct -> DEBU 140f Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:28:03.932 UTC [common.channelconfig] NewStandardValues -> DEBU 1410 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:28:03.932 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1411 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:28:03.933 UTC [common.channelconfig] Validate -> DEBU 1412 Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-05-02 09:28:03.933 UTC [common.channelconfig] validateMSP -> DEBU 1413 Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.933 UTC [msp] newBccspMsp -> DEBU 1414 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:28:03.933 UTC [msp] New -> DEBU 1415 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:28:03.933 UTC [msp] Setup -> DEBU 1416 Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.934 UTC [msp.identity] newIdentity -> DEBU 1417 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -14760,7 +14510,7 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:34.902 UTC [msp.identity] newIdentity -> DEBU 1442 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:28:03.934 UTC [msp.identity] newIdentity -> DEBU 1418 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -14774,307 +14524,405 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:34.904 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1443 Checking if identity satisfies role [CLIENT] for Org3MSP" -orderer0.example.com | "2019-05-02 01:31:34.904 UTC [msp] Validate -> DEBU 1444 MSP Org3MSP validating identity" -orderer0.example.com | "2019-05-02 01:31:34.904 UTC [msp] getCertificationChain -> DEBU 1445 MSP Org3MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:34.904 UTC [msp] hasOURole -> DEBU 1446 MSP Org3MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:31:34.905 UTC [msp] getCertificationChain -> DEBU 1447 MSP Org3MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:34.905 UTC [msp] Setup -> DEBU 1448 Setting up the MSP manager (4 msps)" -orderer0.example.com | "2019-05-02 01:31:34.905 UTC [msp] Setup -> DEBU 1449 MSP manager setup complete, setup 4 msps" -orderer0.example.com | "2019-05-02 01:31:34.905 UTC [policies] NewManagerImpl -> DEBU 144a Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:34.905 UTC [policies] NewManagerImpl -> DEBU 144b Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:34.905 UTC [policies] NewManagerImpl -> DEBU 144c Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:34.906 UTC [policies] NewManagerImpl -> DEBU 144d Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:31:34.906 UTC [policies] NewManagerImpl -> DEBU 144e Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:31:34.906 UTC [policies] NewManagerImpl -> DEBU 144f Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:30:58.513 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1237 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:58.513 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1238 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:58.513 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1239 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:58.513 UTC [policies] Evaluate -> DEBU 123a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:58.513 UTC [policies] Evaluate -> DEBU 123b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:58.513 UTC [policies] Evaluate -> DEBU 123c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [cauthdsl] func1 -> DEBU 123d 0xc003670800 gate 1556760658514029100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [cauthdsl] func2 -> DEBU 123e 0xc003670800 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [cauthdsl] func2 -> DEBU 123f 0xc003670800 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [cauthdsl] func2 -> DEBU 1240 0xc003670800 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [msp.identity] Verify -> DEBU 1241 Verify: digest = 00000000 75 83 ce 99 6f 38 5e d3 47 de 28 5a b4 ba 4d 0e |u...o8^.G.(Z..M.| -peer0.org1.example.com | 00000010 87 b0 0f db 4b 9e 88 1a 92 92 e3 c2 8d 01 bf 6c |....K..........l|" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [msp.identity] Verify -> DEBU 1242 Verify: sig = 00000000 30 44 02 20 73 3b 44 84 70 18 d8 df 40 bd 9e 0e |0D. s;D.p...@...| -peer0.org1.example.com | 00000010 9d c3 15 e2 1a a7 35 2a 3d aa 69 47 24 8c 90 77 |......5*=.iG$..w| -peer0.org1.example.com | 00000020 cc 65 cc e8 02 20 1a e0 d5 9f 7c 30 e5 ee 35 5d |.e... ....|0..5]| -peer0.org1.example.com | 00000030 6c c1 77 12 a5 a9 23 d9 88 a2 28 39 43 22 00 81 |l.w...#...(9C"..| -peer0.org1.example.com | 00000040 f2 e3 f4 d5 5c 89 |....\.|" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [cauthdsl] func2 -> DEBU 1243 0xc003670800 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [cauthdsl] func1 -> DEBU 1244 0xc003670800 gate 1556760658514029100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [policies] Evaluate -> DEBU 1245 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [policies] Evaluate -> DEBU 1246 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [policies] Evaluate -> DEBU 1247 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.514 UTC [policies] Evaluate -> DEBU 1248 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.515 UTC [gossip.discovery] handleAliveMessage -> DEBU 1249 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 124a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 124b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 " -peer0.org1.example.com | "2019-05-02 01:30:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 124c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 " -peer0.org1.example.com | "2019-05-02 01:30:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 124d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 124e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.515 UTC [gossip.discovery] handleAliveMessage -> DEBU 124f Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.515 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1250 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1251 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1252 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1253 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1254 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1255 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1256 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1257 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:34.906 UTC [policies] NewManagerImpl -> DEBU 1450 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:31:34.907 UTC [policies] NewManagerImpl -> DEBU 1451 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.907 UTC [policies] NewManagerImpl -> DEBU 1452 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.907 UTC [policies] NewManagerImpl -> DEBU 1453 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.907 UTC [policies] NewManagerImpl -> DEBU 1454 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.907 UTC [policies] NewManagerImpl -> DEBU 1455 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.908 UTC [policies] NewManagerImpl -> DEBU 1456 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.908 UTC [policies] NewManagerImpl -> DEBU 1457 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.909 UTC [policies] NewManagerImpl -> DEBU 1458 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.909 UTC [policies] NewManagerImpl -> DEBU 1459 Proposed new policy Endorsement for Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:34.909 UTC [policies] NewManagerImpl -> DEBU 145a Proposed new policy Readers for Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:34.909 UTC [policies] NewManagerImpl -> DEBU 145b Proposed new policy Writers for Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-05-02 01:30:58.523 UTC [gossip.comm] Send -> DEBU 1258 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:58.523 UTC [msp] DeserializeIdentity -> DEBU 1259 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.523 UTC [gossip.comm] Send -> DEBU 125a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:58.523 UTC [gossip.comm] sendToEndpoint -> DEBU 125b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.523 UTC [gossip.comm] sendToEndpoint -> DEBU 125c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.523 UTC [gossip.comm] sendToEndpoint -> DEBU 125d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.523 UTC [gossip.comm] sendToEndpoint -> DEBU 125e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.531 UTC [gossip.gossip] handleMessage -> DEBU 125f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.531 UTC [gossip.gossip] handleMessage -> DEBU 1260 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1261 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1262 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.534 UTC [gossip.comm] func1 -> DEBU 1263 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.534 UTC [gossip.gossip] handleMessage -> DEBU 1264 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.534 UTC [gossip.gossip] handleMessage -> DEBU 1265 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1266 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1267 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.582 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 1268 Sleeping 25s" -peer0.org1.example.com | "2019-05-02 01:30:58.715 UTC [msp.identity] Sign -> DEBU 1269 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151015 " -peer0.org1.example.com | "2019-05-02 01:30:58.715 UTC [msp.identity] Sign -> DEBU 126a Sign: digest: FBB40AE9052DB3078C05BDCD3237D00ED50861CC80B119F920BC17C3415FB165 " -peer0.org1.example.com | "2019-05-02 01:30:58.716 UTC [msp.identity] Sign -> DEBU 126b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:30:58.716 UTC [msp.identity] Sign -> DEBU 126c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:30:58.716 UTC [gossip.discovery] periodicalSendAlive -> DEBU 126d Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:30:58.716 UTC [msp] DeserializeIdentity -> DEBU 126e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.716 UTC [msp] DeserializeIdentity -> DEBU 126f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.717 UTC [gossip.comm] Send -> DEBU 1270 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:58.717 UTC [msp] DeserializeIdentity -> DEBU 1271 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.717 UTC [gossip.comm] Send -> DEBU 1272 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:58.718 UTC [msp] DeserializeIdentity -> DEBU 1273 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.718 UTC [gossip.comm] Send -> DEBU 1274 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:58.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1275 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1276 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1277 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1278 Exiting" -orderer0.example.com | "2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 145c Proposed new policy Admins for Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 145d Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 145e Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 145f Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 1460 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 1461 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-05-02 01:31:34.911 UTC [policies] NewManagerImpl -> DEBU 1462 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:31:34.911 UTC [policies] NewManagerImpl -> DEBU 1463 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:31:34.911 UTC [policies] NewManagerImpl -> DEBU 1464 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 1465 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 1466 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 1467 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 1468 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 1469 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 146a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 146b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 146c Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 146d Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 146e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 146f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 1470 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1471 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1472 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1473 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1474 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1475 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1476 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1477 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1478 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1479 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147d Adding to config map: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147e Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1480 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1481 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1482 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1483 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1484 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1485 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1486 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1487 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1488 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1489 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148a Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148b Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148c Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148d Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148e Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1490 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1491 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1492 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1493 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1494 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1495 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1496 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1497 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1498 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.channelconfig] LogSanityChecks -> DEBU 1499 As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [common.channelconfig] LogSanityChecks -> DEBU 149a As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [policies] Manager -> DEBU 149b Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [policies] Manager -> DEBU 149c Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:31:34.915 UTC [policies] Manager -> DEBU 149d Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 149e Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 149f Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a0 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a1 Manager Channel/Application has managers Org3MSP" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a2 As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a3 As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a4 As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a5 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a6 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a7 Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:30:58.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1279 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.719 UTC [gossip.comm] sendToEndpoint -> DEBU 127a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.843 UTC [gossip.comm] func1 -> DEBU 127b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.844 UTC [gossip.gossip] handleMessage -> DEBU 127c Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.844 UTC [gossip.gossip] handleMessage -> DEBU 127d Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.845 UTC [gossip.discovery] handleMsgFromComm -> DEBU 127e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 127f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:30:58.846 UTC [msp] DeserializeIdentity -> DEBU 1280 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.847 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1281 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:30:58.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1282 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:58.848 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1283 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:30:58.849 UTC [policies] Evaluate -> DEBU 1284 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:58.849 UTC [policies] Evaluate -> DEBU 1285 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:30:58.850 UTC [policies] Evaluate -> DEBU 1286 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:30:58.851 UTC [cauthdsl] func1 -> DEBU 1287 0xc0036b0e60 gate 1556760658851152300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:30:58.851 UTC [cauthdsl] func2 -> DEBU 1288 0xc0036b0e60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:30:58.855 UTC [cauthdsl] func2 -> DEBU 1289 0xc0036b0e60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:30:58.855 UTC [cauthdsl] func2 -> DEBU 128a 0xc0036b0e60 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:30:58.855 UTC [msp.identity] Verify -> DEBU 128b Verify: digest = 00000000 e4 69 48 ff 45 bd 93 f0 f6 bb 83 48 31 d5 b5 17 |.iH.E......H1...| -peer0.org1.example.com | 00000010 c6 7d 70 8d 1a c4 69 53 38 11 e7 94 93 26 1b ff |.}p...iS8....&..|" -peer0.org1.example.com | "2019-05-02 01:30:58.855 UTC [msp.identity] Verify -> DEBU 128c Verify: sig = 00000000 30 44 02 20 06 16 12 62 24 cd b4 de d7 74 ad e3 |0D. ...b$....t..| -peer0.org1.example.com | 00000010 ed f7 35 82 09 d9 0d 8e 39 41 62 5c c6 24 29 0b |..5.....9Ab\.$).| -peer0.org1.example.com | 00000020 65 da 79 1c 02 20 0e b2 e6 1d de 81 7f cc 85 2e |e.y.. ..........| -peer0.org1.example.com | 00000030 62 c7 f7 18 f9 51 1f 6d 0f 31 76 ab 66 c7 a7 19 |b....Q.m.1v.f...| -peer0.org1.example.com | 00000040 6f d5 0a 36 6e 82 |o..6n.|" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [cauthdsl] func2 -> DEBU 128d 0xc0036b0e60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [cauthdsl] func1 -> DEBU 128e 0xc0036b0e60 gate 1556760658851152300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [policies] Evaluate -> DEBU 128f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [policies] Evaluate -> DEBU 1290 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [policies] Evaluate -> DEBU 1291 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [policies] Evaluate -> DEBU 1292 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 1293 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [gossip.discovery] learnExistingMembers -> DEBU 1294 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [gossip.discovery] learnExistingMembers -> DEBU 1295 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 " -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [gossip.discovery] learnExistingMembers -> DEBU 1296 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 " -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [gossip.discovery] learnExistingMembers -> DEBU 1297 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [gossip.discovery] learnExistingMembers -> DEBU 1298 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 1299 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 129a Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.858 UTC [gossip.gossip] handleMessage -> DEBU 129b Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.858 UTC [gossip.gossip] handleMessage -> DEBU 129c Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 129d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 129e Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.863 UTC [gossip.comm] func1 -> DEBU 129f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.863 UTC [gossip.gossip] handleMessage -> DEBU 12a0 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.863 UTC [gossip.gossip] handleMessage -> DEBU 12a1 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.863 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12a3 Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.867 UTC [msp] DeserializeIdentity -> DEBU 12a4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.867 UTC [msp] DeserializeIdentity -> DEBU 12a5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.867 UTC [msp] DeserializeIdentity -> DEBU 12a6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.867 UTC [msp] DeserializeIdentity -> DEBU 12a7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.869 UTC [msp] DeserializeIdentity -> DEBU 12a8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.871 UTC [msp] DeserializeIdentity -> DEBU 12a9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.872 UTC [msp] DeserializeIdentity -> DEBU 12aa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.877 UTC [gossip.comm] Send -> DEBU 12ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:58.878 UTC [gossip.comm] sendToEndpoint -> DEBU 12ac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.878 UTC [gossip.comm] sendToEndpoint -> DEBU 12ad Exiting" -peer0.org1.example.com | "2019-05-02 01:30:58.877 UTC [msp] DeserializeIdentity -> DEBU 12ae Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:30:58.880 UTC [gossip.comm] Send -> DEBU 12af Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:30:58.880 UTC [gossip.comm] sendToEndpoint -> DEBU 12b0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:30:58.881 UTC [gossip.comm] sendToEndpoint -> DEBU 12b1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.827 UTC [msp] DeserializeIdentity -> DEBU 12b2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.827 UTC [msp] DeserializeIdentity -> DEBU 12b3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.827 UTC [gossip.comm] Send -> DEBU 12b4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:00.828 UTC [gossip.comm] sendToEndpoint -> DEBU 12b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.828 UTC [gossip.comm] sendToEndpoint -> DEBU 12b6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.828 UTC [gossip.comm] sendToEndpoint -> DEBU 12b7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.828 UTC [gossip.comm] sendToEndpoint -> DEBU 12b8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.828 UTC [gossip.comm] sendToEndpoint -> DEBU 12b9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.829 UTC [gossip.comm] sendToEndpoint -> DEBU 12ba Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.830 UTC [gossip.comm] func1 -> DEBU 12bb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.831 UTC [gossip.gossip] handleMessage -> DEBU 12bc Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.831 UTC [msp] DeserializeIdentity -> DEBU 12bd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.832 UTC [gossip.comm] func1 -> DEBU 12be Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.833 UTC [msp.identity] Verify -> DEBU 12bf Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -peer0.org1.example.com | 00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -peer0.org1.example.com | "2019-05-02 01:31:00.833 UTC [msp.identity] Verify -> DEBU 12c0 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -peer0.org1.example.com | 00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -peer0.org1.example.com | 00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -peer0.org1.example.com | 00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -peer0.org1.example.com | 00000040 63 c4 de 4c 07 05 |c..L..|" -peer0.org1.example.com | "2019-05-02 01:31:00.835 UTC [msp] DeserializeIdentity -> DEBU 12c1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.836 UTC [msp] DeserializeIdentity -> DEBU 12c2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.837 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:00.837 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.837 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.837 UTC [policies] Evaluate -> DEBU 12c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.837 UTC [policies] Evaluate -> DEBU 12c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:00.838 UTC [policies] Evaluate -> DEBU 12c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.838 UTC [cauthdsl] func1 -> DEBU 12c9 0xc0036e5660 gate 1556760660838440200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:00.838 UTC [cauthdsl] func2 -> DEBU 12ca 0xc0036e5660 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:00.839 UTC [cauthdsl] func2 -> DEBU 12cb 0xc0036e5660 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:00.839 UTC [cauthdsl] func2 -> DEBU 12cc 0xc0036e5660 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.840 UTC [msp.identity] Verify -> DEBU 12cd Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:31:00.840 UTC [msp.identity] Verify -> DEBU 12ce Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU 12cf 0xc0036e5660 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.841 UTC [cauthdsl] func1 -> DEBU 12d0 0xc0036e5660 gate 1556760660838440200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:00.841 UTC [policies] Evaluate -> DEBU 12d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.841 UTC [policies] Evaluate -> DEBU 12d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.841 UTC [policies] Evaluate -> DEBU 12d3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.842 UTC [policies] Evaluate -> DEBU 12d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.843 UTC [msp.identity] Verify -> DEBU 12d5 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a8 Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a9 Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [common.channelconfig] LogSanityChecks -> DEBU 14aa As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [common.capabilities] Supported -> DEBU 14ab Orderer capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [common.capabilities] Supported -> DEBU 14ac Channel capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [msp.identity] Sign -> DEBU 14ad Sign: plaintext: 0AD2060A1B08011A0608F690A9E60522...4F94D4B4EF612138698F4F6EE24F94D1 " -orderer0.example.com | "2019-05-02 01:31:34.916 UTC [msp.identity] Sign -> DEBU 14ae Sign: digest: 7B27D98EC5A9C138DB989B54C4347266FE0D3D0F4A95B099269B68BCCF585B53 " -orderer0.example.com | "2019-05-02 01:31:34.917 UTC [policies] Evaluate -> DEBU 14af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-05-02 01:31:34.917 UTC [policies] Evaluate -> DEBU 14b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:34.917 UTC [policies] Evaluate -> DEBU 14b1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-05-02 01:31:34.917 UTC [policies] Evaluate -> DEBU 14b2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:34.917 UTC [policies] Evaluate -> DEBU 14b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:34.917 UTC [msp] DeserializeIdentity -> DEBU 14b4 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:34.918 UTC [msp.identity] newIdentity -> DEBU 14b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:28:03.935 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1419 Checking if identity satisfies role [CLIENT] for Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.935 UTC [msp] Validate -> DEBU 141a MSP Org3MSP validating identity" +orderer0.example.com | "2019-05-02 09:28:03.936 UTC [msp] getCertificationChain -> DEBU 141b MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:03.936 UTC [msp] hasOURole -> DEBU 141c MSP Org3MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:28:03.936 UTC [msp] getCertificationChain -> DEBU 141d MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:03.936 UTC [common.channelconfig] NewStandardValues -> DEBU 141e Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:28:03.937 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141f Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:28:03.937 UTC [common.channelconfig] NewStandardValues -> DEBU 1420 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:28:03.937 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1421 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:28:03.937 UTC [common.channelconfig] Validate -> DEBU 1422 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-05-02 09:28:03.937 UTC [common.channelconfig] validateMSP -> DEBU 1423 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.937 UTC [msp] newBccspMsp -> DEBU 1424 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:28:03.937 UTC [msp] New -> DEBU 1425 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:28:03.938 UTC [msp] Setup -> DEBU 1426 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.938 UTC [msp.identity] newIdentity -> DEBU 1427 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:28:03.939 UTC [msp.identity] newIdentity -> DEBU 1428 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:28:03.940 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1429 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.940 UTC [msp] Validate -> DEBU 142a MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:28:03.941 UTC [msp] getCertificationChain -> DEBU 142b MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:03.941 UTC [msp] hasOURole -> DEBU 142c MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:28:03.941 UTC [msp] getCertificationChain -> DEBU 142d MSP Org1MSP getting certification chain" +peer0.org1.example.com | 00000010 35 7e 51 3a 77 d4 07 ef b1 5a 6e ef 7d c4 af 10 |5~Q:w....Zn.}...|" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [msp.identity] Verify -> DEBU 1223 Verify: sig = 00000000 30 44 02 20 77 ab 2a 8b bf 4e 23 48 40 76 28 09 |0D. w.*..N#H@v(.| +peer0.org1.example.com | 00000010 bf f6 7d f0 16 4d c0 c1 16 d1 d5 99 a4 a2 70 ae |..}..M........p.| +peer0.org1.example.com | 00000020 44 19 ed 9b 02 20 7c de 8a 80 41 3d f5 65 7e 03 |D.... |...A=.e~.| +peer0.org1.example.com | 00000030 80 a0 7e 30 9b 3b 2a b4 08 da 64 28 a8 36 09 ba |..~0.;*...d(.6..| +peer0.org1.example.com | 00000040 1b 29 54 54 6f c7 |.)TTo.|" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 1224 0xc0022937b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [cauthdsl] func1 -> DEBU 1225 0xc0022937b0 gate 1556789252329126400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1226 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1227 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1228 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1229 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.330 UTC [gossip.gossip] handleMessage -> DEBU 122a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.341 UTC [gossip.election] waitForInterrupt -> DEBU 122b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.341 UTC [gossip.election] IsLeader -> DEBU 122c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:27:32.341 UTC [msp.identity] Sign -> DEBU 122d Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510041801 " +peer0.org1.example.com | "2019-05-02 09:27:32.341 UTC [msp.identity] Sign -> DEBU 122e Sign: digest: 864F29BEC3ACAE39E159EED5D13065DB3737E923A6DDBF2781A5C0282EDBEEEE " +peer0.org1.example.com | "2019-05-02 09:27:32.341 UTC [gossip.election] waitForInterrupt -> DEBU 122f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1230 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1231 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1232 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1233 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.352 UTC [gossip.comm] Send -> DEBU 1234 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:32.352 UTC [msp] DeserializeIdentity -> DEBU 1235 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.352 UTC [msp] DeserializeIdentity -> DEBU 1236 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.352 UTC [gossip.comm] sendToEndpoint -> DEBU 1237 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.352 UTC [gossip.comm] sendToEndpoint -> DEBU 1238 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.509 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1239 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 123a Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [policies] Evaluate -> DEBU 123b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [policies] Evaluate -> DEBU 123c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [policies] Evaluate -> DEBU 123d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [cauthdsl] func1 -> DEBU 123e 0xc0025772a0 gate 1556789252510380400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.510 UTC [cauthdsl] func2 -> DEBU 123f 0xc0025772a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.511 UTC [cauthdsl] func2 -> DEBU 1240 0xc0025772a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.511 UTC [cauthdsl] func2 -> DEBU 1241 0xc0025772a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.511 UTC [msp.identity] Verify -> DEBU 1242 Verify: digest = 00000000 68 4c fb e1 65 a3 a9 50 e0 5d 39 be 9c a3 ed 6f |hL..e..P.]9....o| +peer0.org1.example.com | 00000010 e5 d2 ba 78 c7 6e 22 41 c7 4f 22 6e 0c 7a e2 a3 |...x.n"A.O"n.z..|" +peer0.org1.example.com | "2019-05-02 09:27:32.511 UTC [msp.identity] Verify -> DEBU 1243 Verify: sig = 00000000 30 44 02 20 69 4d 83 33 12 ee 44 57 8a ac ff 0b |0D. iM.3..DW....| +peer0.org1.example.com | 00000010 20 7d 03 9c 5b fe b9 35 b1 92 87 47 be ca 4a 0d | }..[..5...G..J.| +peer0.org1.example.com | 00000020 53 09 41 d9 02 20 45 70 ec 86 66 80 d9 cc de af |S.A.. Ep..f.....| +peer0.org1.example.com | 00000030 42 90 b9 18 dd 19 6c 1f 0f d3 da 9a 72 87 c0 aa |B.....l.....r...| +peer0.org1.example.com | 00000040 40 bd e4 c9 1d 66 |@....f|" +peer0.org1.example.com | "2019-05-02 09:27:32.512 UTC [cauthdsl] func2 -> DEBU 1244 0xc0025772a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.512 UTC [cauthdsl] func1 -> DEBU 1245 0xc0025772a0 gate 1556789252510380400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.512 UTC [policies] Evaluate -> DEBU 1246 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:32.514 UTC [policies] Evaluate -> DEBU 1247 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:32.514 UTC [policies] Evaluate -> DEBU 1248 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:32.514 UTC [policies] Evaluate -> DEBU 1249 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:32.516 UTC [blocksProvider] DeliverBlocks -> DEBU 124a [businesschannel] Adding payload to local buffer, blockNum = [4]" +peer0.org1.example.com | "2019-05-02 09:27:32.517 UTC [gossip.state] addPayload -> DEBU 124b [businesschannel] Adding payload to local buffer, blockNum = [4]" +peer0.org1.example.com | "2019-05-02 09:27:32.517 UTC [gossip.state] addPayload -> DEBU 124c Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-05-02 09:27:32.517 UTC [blocksProvider] DeliverBlocks -> DEBU 124d [businesschannel] Gossiping block [4], peers number [3]" +peer0.org1.example.com | "2019-05-02 09:27:32.517 UTC [gossip.channel] AddToMsgStore -> DEBU 124e Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-05-02 09:27:32.517 UTC [gossip.pull] Add -> DEBU 124f Added 4, total items: 4" +peer0.org1.example.com | "2019-05-02 09:27:32.518 UTC [gossip.state] deliverPayloads -> DEBU 1250 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" +orderer0.example.com | "2019-05-02 09:28:03.941 UTC [common.channelconfig] NewStandardValues -> DEBU 142e Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:28:03.941 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142f Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:28:03.941 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1430 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:28:03.941 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1431 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1432 Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1433 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1434 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] NewStandardValues -> DEBU 1435 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1436 Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] NewStandardValues -> DEBU 1437 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1438 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:28:03.943 UTC [common.channelconfig] validateMSP -> DEBU 1439 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:03.943 UTC [msp] newBccspMsp -> DEBU 143a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:28:03.943 UTC [msp] New -> DEBU 143b Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:28:03.944 UTC [msp] Setup -> DEBU 143c Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:28:03.944 UTC [msp.identity] newIdentity -> DEBU 143d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:28:03.945 UTC [msp.identity] newIdentity -> DEBU 143e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:28:03.946 UTC [msp] Validate -> DEBU 143f MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:28:03.946 UTC [msp] Setup -> DEBU 1440 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-05-02 09:28:03.946 UTC [msp] Setup -> DEBU 1441 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-05-02 09:28:03.946 UTC [policies] NewManagerImpl -> DEBU 1442 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.946 UTC [policies] NewManagerImpl -> DEBU 1443 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.946 UTC [policies] NewManagerImpl -> DEBU 1444 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1445 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1446 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1447 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1448 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 1449 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144a Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144b Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144c Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144d Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 144e Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 144f Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 1450 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 1451 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 1452 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-05-02 09:28:03.950 UTC [policies] NewManagerImpl -> DEBU 1453 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:03.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1454 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs" +orderer0.example.com | "2019-05-02 09:28:03.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1455 Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1456 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.9µs " +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1457 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.7µs " +orderer0.example.com | "2019-05-02 09:28:03.950 UTC [policies] NewManagerImpl -> DEBU 1458 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 1459 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145d Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145e Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145f Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 1460 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [common.configtx] addToMap -> DEBU 1461 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:28:03.951 UTC [common.configtx] addToMap -> DEBU 1462 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1463 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1464 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1465 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1466 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1467 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1468 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1469 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146b Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146c Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146d Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146e Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146f Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1470 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1471 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1472 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1473 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1474 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1475 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1476 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1477 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1478 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1479 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-05-02 09:27:32.518 UTC [gossip.state] deliverPayloads -> DEBU 1251 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-05-02 09:27:32.518 UTC [gossip.privdata] StoreBlock -> INFO 1252 [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | "2019-05-02 09:27:32.518 UTC [gossip.privdata] StoreBlock -> DEBU 1253 [businesschannel] Validating block [4]" +peer0.org1.example.com | "2019-05-02 09:27:32.519 UTC [committer.txvalidator] Validate -> DEBU 1254 [businesschannel] START Block Validation for block [4]" +peer0.org1.example.com | "2019-05-02 09:27:32.519 UTC [committer.txvalidator] Validate -> DEBU 1255 expecting 1 block validation responses" +peer0.org1.example.com | "2019-05-02 09:27:32.519 UTC [committer.txvalidator] validateTx -> DEBU 1256 [businesschannel] validateTx starts for block 0xc0030e2340 env 0xc002e393b0 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:32.519 UTC [protoutils] ValidateTransaction -> DEBU 1257 ValidateTransactionEnvelope starts for envelope 0xc002e393b0" +peer0.org1.example.com | "2019-05-02 09:27:32.521 UTC [protoutils] ValidateTransaction -> DEBU 1258 Header is channel_header:"\010\003\032\014\010\202\360\252\346\005\020\330\222\201\324\001\"\017businesschannel*@fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\240\274\353\251\345HY\035\373[\177M\244i/\263LJu\341\014\023!\257" " +peer0.org1.example.com | "2019-05-02 09:27:32.521 UTC [protoutils] validateChannelHeader -> DEBU 1259 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:32.521 UTC [protoutils] checkSignatureFromCreator -> DEBU 125a begin" +peer0.org1.example.com | "2019-05-02 09:27:32.522 UTC [msp] GetManagerForChain -> DEBU 125b Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:32.522 UTC [msp] DeserializeIdentity -> DEBU 125c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.522 UTC [msp.identity] newIdentity -> DEBU 125d Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:27:32.523 UTC [protoutils] checkSignatureFromCreator -> DEBU 125e creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-05-02 09:27:32.523 UTC [msp] Validate -> DEBU 125f MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:32.523 UTC [msp] getCertificationChain -> DEBU 1260 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:32.524 UTC [protoutils] checkSignatureFromCreator -> DEBU 1261 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:32.524 UTC [msp.identity] Verify -> DEBU 1262 Verify: digest = 00000000 5f f7 a9 77 bb 08 23 e9 79 a3 1a 5a 4b df bf 14 |_..w..#.y..ZK...| +peer0.org1.example.com | 00000010 0b ee 78 cb 24 b7 9b 4f 26 45 ee c7 3a c5 0a 72 |..x.$..O&E..:..r|" +peer0.org1.example.com | "2019-05-02 09:27:32.524 UTC [msp.identity] Verify -> DEBU 1263 Verify: sig = 00000000 30 44 02 20 42 94 36 89 e4 a8 e8 1f d1 03 2c 54 |0D. B.6.......,T| +peer0.org1.example.com | 00000010 08 33 49 2c a0 e6 9d e2 4e 10 2f f4 03 8f 1f 07 |.3I,....N./.....| +peer0.org1.example.com | 00000020 ef 9a af 12 02 20 29 ad 5f 1b 8d e8 b0 33 a5 20 |..... )._....3. | +peer0.org1.example.com | 00000030 ae 2d 97 79 ba c1 a3 a1 b6 f2 f7 62 cc b3 74 f4 |.-.y.......b..t.| +peer0.org1.example.com | 00000040 91 85 a0 fa 29 4d |....)M|" +peer0.org1.example.com | "2019-05-02 09:27:32.524 UTC [protoutils] checkSignatureFromCreator -> DEBU 1264 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:32.525 UTC [protoutils] validateEndorserTransaction -> DEBU 1265 validateEndorserTransaction starts for data 0xc002ea0000, header channel_header:"\010\003\032\014\010\202\360\252\346\005\020\330\222\201\324\001\"\017businesschannel*@fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\240\274\353\251\345HY\035\373[\177M\244i/\263LJu\341\014\023!\257" " +peer0.org1.example.com | "2019-05-02 09:27:32.525 UTC [protoutils] validateEndorserTransaction -> DEBU 1266 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-05-02 09:27:32.525 UTC [protoutils] validateEndorserTransaction -> DEBU 1267 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-05-02 09:27:32.526 UTC [protoutils] ValidateTransaction -> DEBU 1268 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-05-02 09:27:32.526 UTC [committer.txvalidator] validateTx -> DEBU 1269 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:32.526 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 126a retrieveTransactionByID() - txId = [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd]" +peer0.org1.example.com | "2019-05-02 09:27:32.526 UTC [committer.txvalidator] validateTx -> DEBU 126b Validating transaction with plugins" +peer0.org1.example.com | "2019-05-02 09:27:32.528 UTC [committer.txvalidator] Dispatch -> DEBU 126c [businesschannel] Dispatch starts for bytes 0xc002e14000" +peer0.org1.example.com | "2019-05-02 09:27:32.528 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 126d constructing new query executor txid = [39a75287-65c7-4891-a529-ad2e91f2f4cf]" +peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] Done -> DEBU 126e Done with transaction simulation / query execution [39a75287-65c7-4891-a529-ad2e91f2f4cf]" +peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 126f Validating Tx fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 147a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 147b Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147c Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147d Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147e Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1270 constructing new query executor txid = [6d641d1e-f39e-4b7a-ab54-09ac2b80c369]" +peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1271 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1272 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] Done -> DEBU 1273 Done with transaction simulation / query execution [6d641d1e-f39e-4b7a-ab54-09ac2b80c369]" +peer0.org1.example.com | "2019-05-02 09:27:32.530 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1274 constructing new query executor txid = [5c072d0a-d7ec-4837-96e8-ef7bf252489d]" +peer0.org1.example.com | "2019-05-02 09:27:32.530 UTC [lockbasedtxmgr] Done -> DEBU 1275 Done with transaction simulation / query execution [5c072d0a-d7ec-4837-96e8-ef7bf252489d]" +peer0.org1.example.com | "2019-05-02 09:27:32.530 UTC [policies] Evaluate -> DEBU 1276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" +peer0.org1.example.com | "2019-05-02 09:27:32.530 UTC [cauthdsl] func1 -> DEBU 1277 0xc00313e930 gate 1556789252530857800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.531 UTC [cauthdsl] func2 -> DEBU 1278 0xc00313e930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.531 UTC [cauthdsl] func2 -> DEBU 1279 0xc00313e930 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.531 UTC [cauthdsl] func2 -> DEBU 127a 0xc00313e930 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.531 UTC [msp.identity] Verify -> DEBU 127b Verify: digest = 00000000 59 27 5d c2 6d 27 9c 6b f4 ca 4f 2d 33 7a b3 b2 |Y'].m'.k..O-3z..| +peer0.org1.example.com | 00000010 1d 44 cb 41 64 c9 b1 4b 4e ff 37 82 e8 5a 8b 47 |.D.Ad..KN.7..Z.G|" +peer0.org1.example.com | "2019-05-02 09:27:32.531 UTC [msp.identity] Verify -> DEBU 127c Verify: sig = 00000000 30 44 02 20 53 34 c0 6c e1 74 af 1f 73 8d 3d c8 |0D. S4.l.t..s.=.| +peer0.org1.example.com | 00000010 5d 09 a9 19 d1 b3 ca 3e d2 23 15 63 01 2f d3 2c |]......>.#.c./.,| +peer0.org1.example.com | 00000020 96 da 17 3c 02 20 71 7b ee a2 39 c5 b0 78 71 c3 |...<. q{..9..xq.| +peer0.org1.example.com | 00000030 3d 35 05 fc 45 d3 49 9b a6 29 4a 0b 9a 93 d6 21 |=5..E.I..)J....!| +peer0.org1.example.com | 00000040 fc 6a 01 f5 6d d6 |.j..m.|" +peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [cauthdsl] func2 -> DEBU 127d 0xc00313e930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [cauthdsl] func1 -> DEBU 127e 0xc00313e930 gate 1556789252530857800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [policies] Evaluate -> DEBU 127f Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [policies] Evaluate -> DEBU 1280 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1281 constructing new query executor txid = [c2f77205-d7b6-4f22-8985-c5b15a1f8384]" +peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1282 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1283 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] Done -> DEBU 1284 Done with transaction simulation / query execution [c2f77205-d7b6-4f22-8985-c5b15a1f8384]" +peer0.org1.example.com | "2019-05-02 09:27:32.533 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1285 constructing new query executor txid = [3e7b4ad6-eed9-45d9-9625-04ef9a0b29d5]" +peer0.org1.example.com | "2019-05-02 09:27:32.533 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1286 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:32.533 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1287 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:32.534 UTC [lockbasedtxmgr] Done -> DEBU 1288 Done with transaction simulation / query execution [3e7b4ad6-eed9-45d9-9625-04ef9a0b29d5]" +peer0.org1.example.com | "2019-05-02 09:27:32.534 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1289 constructing new query executor txid = [12b0d5ea-e63f-4a2b-b063-7eb3486a2798]" +peer0.org1.example.com | "2019-05-02 09:27:32.535 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 128a retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [gossip.comm] Send -> DEBU 128f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 1290 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 1291 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [gossip.comm] sendToEndpoint -> DEBU 1292 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.536 UTC [gossip.comm] sendToEndpoint -> DEBU 1293 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.535 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1294 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:32.538 UTC [lockbasedtxmgr] Done -> DEBU 1295 Done with transaction simulation / query execution [12b0d5ea-e63f-4a2b-b063-7eb3486a2798]" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147f Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1480 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1481 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1482 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1483 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1484 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1485 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1486 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1487 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1488 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1489 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 148a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 148b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 148c Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 148d Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 148e Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 148f Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 1490 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:28:03.955 UTC [common.configtx] addToMap -> DEBU 1491 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:28:03.955 UTC [common.configtx] addToMap -> DEBU 1492 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:28:03.955 UTC [common.configtx] addToMap -> DEBU 1493 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:28:03.956 UTC [common.configtx] addToMap -> DEBU 1494 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:28:03.956 UTC [common.configtx] addToMap -> DEBU 1495 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:03.956 UTC [common.configtx] addToMap -> DEBU 1496 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:28:03.957 UTC [common.channelconfig] LogSanityChecks -> DEBU 1497 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-05-02 09:28:03.957 UTC [common.channelconfig] LogSanityChecks -> DEBU 1498 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-05-02 09:28:03.957 UTC [policies] Manager -> DEBU 1499 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:28:03.957 UTC [policies] Manager -> DEBU 149a Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149b Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149c Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149d Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149e Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-05-02 09:28:03.959 UTC [policies] Manager -> DEBU 149f Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:28:03.959 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a0 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-05-02 09:28:03.959 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a1 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-05-02 09:28:03.959 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a2 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-05-02 09:28:03.960 UTC [policies] Manager -> DEBU 14a3 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-05-02 09:28:03.960 UTC [policies] Manager -> DEBU 14a4 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:28:03.961 UTC [policies] Manager -> DEBU 14a5 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:28:03.961 UTC [policies] Manager -> DEBU 14a6 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-05-02 09:28:03.961 UTC [policies] Manager -> DEBU 14a7 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:03.961 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a8 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-05-02 09:28:03.962 UTC [common.capabilities] Supported -> DEBU 14a9 Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:28:03.962 UTC [common.capabilities] Supported -> DEBU 14aa Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:28:03.962 UTC [msp.identity] Sign -> DEBU 14ab Sign: plaintext: 0AD2060A1B08011A0608A3F0AAE60522...8E99E305700BC69B95A3C8334C0E94C6 " +orderer0.example.com | "2019-05-02 09:28:03.962 UTC [msp.identity] Sign -> DEBU 14ac Sign: digest: EE16CDA5D421246768817D036E9C38EFE9007FA05B3109E4F22AC3F48C3F33F6 " +orderer0.example.com | "2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:28:03.963 UTC [msp] DeserializeIdentity -> DEBU 14b2 Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:03.963 UTC [msp.identity] newIdentity -> DEBU 14b3 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | "2019-05-02 09:27:32.538 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1296 constructing new query executor txid = [e47bebb9-396b-47ba-8ea5-a374711bdc94]" +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1297 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1298 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] Done -> DEBU 1299 Done with transaction simulation / query execution [e47bebb9-396b-47ba-8ea5-a374711bdc94]" +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 129a constructing new query executor txid = [acc501dc-251f-4568-ad6e-1ffa097d3d4c]" +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 129b retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 129c retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] Done -> DEBU 129d Done with transaction simulation / query execution [acc501dc-251f-4568-ad6e-1ffa097d3d4c]" +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [vscc] Validate -> DEBU 129e block 4, namespace: _lifecycle, tx 0 validation results is: " +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 129f Transaction fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd appears to be valid" +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [committer.txvalidator] Dispatch -> DEBU 12a0 [businesschannel] Dispatch completes env bytes 0xc002e14000" +peer0.org1.example.com | "2019-05-02 09:27:32.540 UTC [committer.txvalidator] Validate -> DEBU 12a1 got result for idx 0, code 0" +peer0.org1.example.com | "2019-05-02 09:27:32.540 UTC [committer.txvalidator] Validate -> INFO 12a2 [businesschannel] Validated block [4] in 21ms" +peer0.org1.example.com | "2019-05-02 09:27:32.540 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 12a3 constructing new query executor txid = [d87541d3-71c5-4730-a0e1-4fa2a30eb11f]" +peer0.org1.example.com | "2019-05-02 09:27:32.540 UTC [lockbasedtxmgr] Done -> DEBU 12a4 Done with transaction simulation / query execution [d87541d3-71c5-4730-a0e1-4fa2a30eb11f]" +peer0.org1.example.com | "2019-05-02 09:27:32.541 UTC [msp] GetManagerForChain -> DEBU 12a5 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:32.541 UTC [cauthdsl] func1 -> DEBU 12a6 0xc002e138c0 gate 1556789252541101200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.542 UTC [cauthdsl] func2 -> DEBU 12a7 0xc002e138c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.542 UTC [cauthdsl] func2 -> DEBU 12a8 0xc002e138c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.542 UTC [cauthdsl] func2 -> DEBU 12a9 0xc002e138c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.543 UTC [cauthdsl] func2 -> DEBU 12aa 0xc002e138c0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.543 UTC [cauthdsl] func1 -> DEBU 12ab 0xc002e138c0 gate 1556789252541101200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.543 UTC [gossip.privdata] isEligible -> DEBU 12ac Skipping namespace _lifecycle collection _implicit_org_Org2MSP because we're not eligible for the private data" +peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [gossip.privdata] inspectTransaction -> DEBU 12ad Peer is not eligible for collection, channel [businesschannel], chaincode [_lifecycle], collection name [_implicit_org_Org2MSP], txID [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] the policy is [&privdata.SimpleCollection{name:"_implicit_org_Org2MSP", accessPolicy:(*cauthdsl.policy)(0xc002e11da0), memberOrgs:[]string{"Org2MSP"}, conf:common.StaticCollectionConfig{Name:"_implicit_org_Org2MSP", MemberOrgsPolicy:(*common.CollectionPolicyConfig)(0xc0034acdb0), RequiredPeerCount:0, MaximumPeerCount:0, BlockToLive:0x0, MemberOnlyRead:false, MemberOnlyWrite:false, XXX_NoUnkeyedLiteral:struct {}{}, XXX_unrecognized:[]uint8(nil), XXX_sizecache:0}}]. Skipping." +peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [gossip.privdata] listMissingPrivateData -> DEBU 12ae Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [gossip.privdata] StoreBlock -> DEBU 12af [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [kvledger] CommitWithPvtData -> DEBU 12b0 [businesschannel] Validating state for block [4]" +peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12b1 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12b2 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12b3 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b4 ValidateAndPrepareBatch() for block number = [4]" +peer0.org1.example.com | "2019-05-02 09:27:32.545 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b5 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [valimpl] preprocessProtoBlock -> DEBU 12b6 txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [stateleveldb] GetState -> DEBU 12b7 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [statebasedval] validateKVRead -> DEBU 12b8 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [stateleveldb] GetState -> DEBU 12b9 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [stateleveldb] GetState -> DEBU 12ba GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 12bb Block [4] Transaction index [0] TxId [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] marked as valid by state validator. ContainsPostOrderWrites [false]" orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U @@ -15082,608 +14930,229 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh orderer0.example.com | QQ== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:34.919 UTC [cauthdsl] func1 -> DEBU 14b6 0xc0009b1d60 gate 1556760694919762500 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:34.920 UTC [cauthdsl] func2 -> DEBU 14b7 0xc0009b1d60 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:34.920 UTC [cauthdsl] func2 -> DEBU 14b8 0xc0009b1d60 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:34.920 UTC [cauthdsl] func2 -> DEBU 14b9 0xc0009b1d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-05-02 01:31:34.921 UTC [cauthdsl] func2 -> DEBU 14ba 0xc0009b1d60 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:34.921 UTC [cauthdsl] func1 -> DEBU 14bb 0xc0009b1d60 gate 1556760694919762500 evaluation fails" -orderer0.example.com | "2019-05-02 01:31:34.921 UTC [policies] Evaluate -> DEBU 14bc Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.921 UTC [policies] Evaluate -> DEBU 14bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.922 UTC [policies] Evaluate -> DEBU 14be == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-05-02 01:31:34.922 UTC [cauthdsl] func1 -> DEBU 14bf 0xc000996f20 gate 1556760694922466800 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:34.922 UTC [cauthdsl] func2 -> DEBU 14c0 0xc000996f20 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:34.923 UTC [cauthdsl] func2 -> DEBU 14c1 0xc000996f20 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:34.923 UTC [cauthdsl] func2 -> DEBU 14c2 0xc000996f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-05-02 01:31:34.923 UTC [cauthdsl] func2 -> DEBU 14c3 0xc000996f20 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:34.923 UTC [cauthdsl] func1 -> DEBU 14c4 0xc000996f20 gate 1556760694922466800 evaluation fails" -orderer0.example.com | "2019-05-02 01:31:34.923 UTC [policies] Evaluate -> DEBU 14c5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:00.843 UTC [msp.identity] Verify -> DEBU 12d6 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:31:00.843 UTC [msp] DeserializeIdentity -> DEBU 12d7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.844 UTC [msp] DeserializeIdentity -> DEBU 12d8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12d9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:00.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12da Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12db Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.844 UTC [policies] Evaluate -> DEBU 12dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.845 UTC [policies] Evaluate -> DEBU 12dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:00.845 UTC [policies] Evaluate -> DEBU 12de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.845 UTC [cauthdsl] func1 -> DEBU 12df 0xc0036fd550 gate 1556760660845788100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:00.846 UTC [msp] DeserializeIdentity -> DEBU 12e0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.846 UTC [msp] DeserializeIdentity -> DEBU 12e1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.847 UTC [gossip.comm] Send -> DEBU 12e2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760658114316700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:00.847 UTC [msp] DeserializeIdentity -> DEBU 12e3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.848 UTC [msp] DeserializeIdentity -> DEBU 12e4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.848 UTC [gossip.comm] sendToEndpoint -> DEBU 12e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760658114316700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.848 UTC [gossip.comm] sendToEndpoint -> DEBU 12e6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.849 UTC [gossip.comm] sendToEndpoint -> DEBU 12e7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760658114316700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.849 UTC [gossip.comm] sendToEndpoint -> DEBU 12e8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.850 UTC [gossip.comm] sendToEndpoint -> DEBU 12e9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760658114316700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.850 UTC [gossip.comm] sendToEndpoint -> DEBU 12ea Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.845 UTC [cauthdsl] func2 -> DEBU 12eb 0xc0036fd550 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:00.854 UTC [cauthdsl] func2 -> DEBU 12ec 0xc0036fd550 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:00.855 UTC [cauthdsl] func2 -> DEBU 12ed 0xc0036fd550 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.855 UTC [msp.identity] Verify -> DEBU 12ee Verify: digest = 00000000 9d e9 47 45 58 55 ba 08 a7 c1 57 d6 e2 0b 98 a9 |..GEXU....W.....| -peer0.org1.example.com | 00000010 70 2e 25 cd 61 06 ef 5c 24 6d 52 07 20 12 c0 72 |p.%.a..\$mR. ..r|" -peer0.org1.example.com | "2019-05-02 01:31:00.855 UTC [msp.identity] Verify -> DEBU 12ef Verify: sig = 00000000 30 44 02 20 21 fa 63 73 4d 87 7b 3d 61 8c bb 6c |0D. !.csM.{=a..l| -peer0.org1.example.com | 00000010 4a f2 88 4d 2f d6 9f e4 01 31 93 ed c5 62 ee 74 |J..M/....1...b.t| -peer0.org1.example.com | 00000020 e2 e6 3f f9 02 20 7a 8b de 81 f5 fc 73 7c b1 01 |..?.. z.....s|..| -peer0.org1.example.com | 00000030 27 44 48 aa a2 df 3a e3 d8 45 54 3d 5e a5 25 33 |'DH...:..ET=^.%3| -peer0.org1.example.com | 00000040 a7 5c 29 e1 73 d4 |.\).s.|" -peer0.org1.example.com | "2019-05-02 01:31:00.860 UTC [cauthdsl] func2 -> DEBU 12f0 0xc0036fd550 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:34.923 UTC [policies] Evaluate -> DEBU 14c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:34.923 UTC [policies] func1 -> DEBU 14c7 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" -orderer0.example.com | "2019-05-02 01:31:34.923 UTC [policies] Evaluate -> DEBU 14c8 Signature set did not satisfy policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:34.924 UTC [policies] Evaluate -> DEBU 14c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:34.924 UTC [policies] Evaluate -> DEBU 14ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-05-02 01:31:34.924 UTC [policies] Evaluate -> DEBU 14cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:34.924 UTC [policies] Evaluate -> DEBU 14cc == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-05-02 01:31:34.924 UTC [cauthdsl] func1 -> DEBU 14cd 0xc000997e90 gate 1556760694924135100 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:34.924 UTC [cauthdsl] func2 -> DEBU 14ce 0xc000997e90 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:34.924 UTC [cauthdsl] func2 -> DEBU 14cf 0xc000997e90 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:34.924 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14d0 Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-05-02 01:31:34.924 UTC [msp] Validate -> DEBU 14d1 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:31:34.925 UTC [cauthdsl] func2 -> DEBU 14d2 0xc000997e90 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:34.925 UTC [msp.identity] Verify -> DEBU 14d3 Verify: digest = 00000000 7b 27 d9 8e c5 a9 c1 38 db 98 9b 54 c4 34 72 66 |{'.....8...T.4rf| -orderer0.example.com | 00000010 fe 0d 3d 0f 4a 95 b0 99 26 9b 68 bc cf 58 5b 53 |..=.J...&.h..X[S|" -orderer0.example.com | "2019-05-02 01:31:34.925 UTC [msp.identity] Verify -> DEBU 14d4 Verify: sig = 00000000 30 44 02 20 17 fb 96 95 cf 78 11 ee f6 f6 bf 00 |0D. .....x......| -orderer0.example.com | 00000010 86 65 7e 97 5b 5f 51 43 e4 6a fa 3e d0 8f 80 95 |.e~.[_QC.j.>....| -orderer0.example.com | 00000020 5c 30 f3 79 02 20 31 03 e1 81 80 b3 8e 6d 77 9c |\0.y. 1......mw.| -orderer0.example.com | 00000030 df 06 16 94 09 13 bc 5f 75 84 4c 0a d7 71 fa 74 |......._u.L..q.t| -orderer0.example.com | 00000040 df de 6e 9d 1c cb |..n...|" -orderer0.example.com | "2019-05-02 01:31:34.925 UTC [cauthdsl] func2 -> DEBU 14d5 0xc000997e90 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:34.925 UTC [cauthdsl] func1 -> DEBU 14d6 0xc000997e90 gate 1556760694924135100 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14d7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14d9 Signature set satisfies policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14db Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:34.927 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 14dd [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.240.9:47516" -orderer0.example.com | "2019-05-02 01:31:34.927 UTC [orderer.consensus.etcdraft] propose -> INFO 14de Created block [9], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:34.928 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 14df Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:34.928 UTC [orderer.consensus.etcdraft] 2 -> DEBU 14e0 Proposed block [9] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:34.933 UTC [grpc] warningf -> DEBU 14e1 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.2:7050->192.168.240.9:47516: read: connection reset by peer" -orderer0.example.com | "2019-05-02 01:31:34.939 UTC [orderer.common.broadcast] Handle -> WARN 14e2 Error reading from 192.168.240.9:47516: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:34.939 UTC [orderer.common.server] func1 -> DEBU 14e3 Closing Broadcast stream" -orderer0.example.com | "2019-05-02 01:31:34.939 UTC [comm.grpc.server] 1 -> INFO 14e4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47516 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=104.2258ms -orderer0.example.com | "2019-05-02 01:31:34.939 UTC [grpc] infof -> DEBU 14e5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:34.940 UTC [common.deliver] Handle -> WARN 14e6 Error reading from 192.168.240.9:47514: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:34.940 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e7 Sending msg of 34121 bytes to 2 on channel businesschannel took 29.2µs" -orderer0.example.com | "2019-05-02 01:31:34.941 UTC [grpc] infof -> DEBU 14e9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:34.941 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ea Sending msg of 34121 bytes to 3 on channel businesschannel took 22.1µs" -orderer0.example.com | "2019-05-02 01:31:34.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14eb Send of ConsensusRequest for channel businesschannel with payload of size 34121 to orderer1.example.com(orderer1.example.com:7050) took 101.7µs " -orderer0.example.com | "2019-05-02 01:31:34.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ec Send of ConsensusRequest for channel businesschannel with payload of size 34121 to orderer2.example.com(orderer2.example.com:7050) took 197.1µs " -orderer0.example.com | "2019-05-02 01:31:34.941 UTC [orderer.common.server] func1 -> DEBU 14e8 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:34.941 UTC [comm.grpc.server] 1 -> INFO 14ed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47514 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=153.5911ms -orderer0.example.com | "2019-05-02 01:31:34.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ee Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:34.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f0 Sending msg of 28 bytes to 2 on channel businesschannel took 102.7µs" -orderer0.example.com | "2019-05-02 01:31:34.962 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f1 Sending msg of 28 bytes to 3 on channel businesschannel took 578.5µs" -orderer0.example.com | "2019-05-02 01:31:34.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ef Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -peer0.org1.example.com | "2019-05-02 01:31:00.860 UTC [cauthdsl] func1 -> DEBU 12f1 0xc0036fd550 gate 1556760660845788100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:00.861 UTC [policies] Evaluate -> DEBU 12f2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.861 UTC [policies] Evaluate -> DEBU 12f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.861 UTC [policies] Evaluate -> DEBU 12f4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.861 UTC [policies] Evaluate -> DEBU 12f5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.862 UTC [msp] DeserializeIdentity -> DEBU 12f6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.863 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12f7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.863 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12f8 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.863 UTC [policies] Evaluate -> DEBU 12f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.863 UTC [policies] Evaluate -> DEBU 12fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:00.864 UTC [policies] Evaluate -> DEBU 12fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.864 UTC [cauthdsl] func1 -> DEBU 12fc 0xc003726630 gate 1556760660864125500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:00.864 UTC [cauthdsl] func2 -> DEBU 12fd 0xc003726630 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:00.864 UTC [cauthdsl] func2 -> DEBU 12fe 0xc003726630 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:00.865 UTC [cauthdsl] func2 -> DEBU 12ff 0xc003726630 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.865 UTC [msp.identity] Verify -> DEBU 1300 Verify: digest = 00000000 9d e9 47 45 58 55 ba 08 a7 c1 57 d6 e2 0b 98 a9 |..GEXU....W.....| -peer0.org1.example.com | 00000010 70 2e 25 cd 61 06 ef 5c 24 6d 52 07 20 12 c0 72 |p.%.a..\$mR. ..r|" -peer0.org1.example.com | "2019-05-02 01:31:00.865 UTC [msp.identity] Verify -> DEBU 1301 Verify: sig = 00000000 30 44 02 20 21 fa 63 73 4d 87 7b 3d 61 8c bb 6c |0D. !.csM.{=a..l| -peer0.org1.example.com | 00000010 4a f2 88 4d 2f d6 9f e4 01 31 93 ed c5 62 ee 74 |J..M/....1...b.t| -peer0.org1.example.com | 00000020 e2 e6 3f f9 02 20 7a 8b de 81 f5 fc 73 7c b1 01 |..?.. z.....s|..| -peer0.org1.example.com | 00000030 27 44 48 aa a2 df 3a e3 d8 45 54 3d 5e a5 25 33 |'DH...:..ET=^.%3| -peer0.org1.example.com | 00000040 a7 5c 29 e1 73 d4 |.\).s.|" -peer0.org1.example.com | "2019-05-02 01:31:00.866 UTC [cauthdsl] func2 -> DEBU 1302 0xc003726630 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.866 UTC [cauthdsl] func1 -> DEBU 1303 0xc003726630 gate 1556760660864125500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:00.866 UTC [policies] Evaluate -> DEBU 1304 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.869 UTC [policies] Evaluate -> DEBU 1305 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.870 UTC [policies] Evaluate -> DEBU 1306 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.870 UTC [policies] Evaluate -> DEBU 1307 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.870 UTC [gossip.gossip] handleMessage -> DEBU 1308 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.871 UTC [gossip.gossip] handleMessage -> DEBU 1309 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.871 UTC [msp] DeserializeIdentity -> DEBU 130a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.872 UTC [msp.identity] Verify -> DEBU 130b Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -peer0.org1.example.com | 00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -peer0.org1.example.com | "2019-05-02 01:31:00.872 UTC [msp.identity] Verify -> DEBU 130c Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -peer0.org1.example.com | 00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -peer0.org1.example.com | 00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -peer0.org1.example.com | 00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -peer0.org1.example.com | 00000040 63 c4 de 4c 07 05 |c..L..|" -peer0.org1.example.com | "2019-05-02 01:31:00.873 UTC [msp.identity] Verify -> DEBU 130d Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -peer0.org1.example.com | 00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -peer0.org1.example.com | "2019-05-02 01:31:00.873 UTC [msp.identity] Verify -> DEBU 130e Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -peer0.org1.example.com | 00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -peer0.org1.example.com | 00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -peer0.org1.example.com | 00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -peer0.org1.example.com | 00000040 ca 2c e1 44 69 07 |.,.Di.|" -peer0.org1.example.com | "2019-05-02 01:31:00.874 UTC [msp] DeserializeIdentity -> DEBU 130f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.875 UTC [msp] DeserializeIdentity -> DEBU 1310 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:34.963 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 716.1µs " -orderer0.example.com | "2019-05-02 01:31:34.963 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 14f3 Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-05-02 01:31:34.966 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 430.5µs " -orderer0.example.com | "2019-05-02 01:31:34.974 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f5 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:34.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f6 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:34.994 UTC [common.configtx] addToMap -> DEBU 14f7 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:31:34.995 UTC [common.configtx] addToMap -> DEBU 14f8 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:31:35.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fa Sending msg of 28 bytes to 2 on channel businesschannel took 72.5µs" -orderer0.example.com | "2019-05-02 01:31:35.000 UTC [common.configtx] addToMap -> DEBU 14f9 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 799.3µs " -orderer0.example.com | "2019-05-02 01:31:35.004 UTC [common.configtx] addToMap -> DEBU 14fc Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.007 UTC [common.configtx] addToMap -> DEBU 14fe Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:31:35.007 UTC [common.configtx] addToMap -> DEBU 14ff Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:31:35.008 UTC [common.configtx] addToMap -> DEBU 1500 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:31:35.009 UTC [common.configtx] addToMap -> DEBU 1501 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:31:35.009 UTC [common.configtx] addToMap -> DEBU 1502 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:31:35.009 UTC [common.configtx] addToMap -> DEBU 1503 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:35.010 UTC [common.configtx] addToMap -> DEBU 1504 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:35.012 UTC [common.configtx] addToMap -> DEBU 1505 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:31:35.012 UTC [common.configtx] addToMap -> DEBU 1506 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:31:35.013 UTC [common.configtx] addToMap -> DEBU 1507 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.013 UTC [common.configtx] addToMap -> DEBU 1508 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.013 UTC [common.configtx] addToMap -> DEBU 1509 Adding to config map: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.014 UTC [common.configtx] addToMap -> DEBU 150a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-05-02 01:31:35.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fd Sending msg of 28 bytes to 3 on channel businesschannel took 96.4µs" -orderer0.example.com | "2019-05-02 01:31:35.016 UTC [orderer.common.cluster.step] handleMessage -> DEBU 150b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:35.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150c Sending msg of 28 bytes to 3 on channel testchainid took 21µs" -orderer0.example.com | "2019-05-02 01:31:35.013 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 7.1636ms " -orderer0.example.com | "2019-05-02 01:31:35.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 377µs " -orderer0.example.com | "2019-05-02 01:31:35.014 UTC [common.configtx] addToMap -> DEBU 150f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:31:35.018 UTC [common.configtx] addToMap -> DEBU 1510 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.019 UTC [common.configtx] addToMap -> DEBU 1511 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:35.019 UTC [common.configtx] addToMap -> DEBU 1512 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:35.020 UTC [common.configtx] addToMap -> DEBU 1513 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:31:35.022 UTC [common.configtx] addToMap -> DEBU 1514 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:31:35.023 UTC [common.configtx] addToMap -> DEBU 1515 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:31:35.024 UTC [common.configtx] addToMap -> DEBU 1516 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:31:35.024 UTC [common.configtx] addToMap -> DEBU 1517 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:31:35.024 UTC [common.configtx] addToMap -> DEBU 1518 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:35.025 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1519 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:35.025 UTC [common.configtx] addToMap -> DEBU 151a Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:35.030 UTC [common.configtx] verifyDeltaSet -> DEBU 151b Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:35.030 UTC [common.configtx] verifyDeltaSet -> DEBU 151c Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-05-02 01:31:35.030 UTC [common.configtx] verifyDeltaSet -> DEBU 151d Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.030 UTC [common.configtx] verifyDeltaSet -> DEBU 151e Processing change to key: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:31:35.031 UTC [common.configtx] policyForItem -> DEBU 151f Getting policy for item Application with mod_policy Admins" -orderer0.example.com | "2019-05-02 01:31:35.031 UTC [policies] Manager -> DEBU 1520 Manager Channel looking up path []" -orderer0.example.com | "2019-05-02 01:31:35.031 UTC [policies] Manager -> DEBU 1521 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:31:35.031 UTC [policies] Manager -> DEBU 1522 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:31:35.031 UTC [policies] Manager -> DEBU 1523 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:31:35.031 UTC [policies] Manager -> DEBU 1524 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:31:00.875 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1311 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:00.875 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1312 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.875 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1313 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.876 UTC [policies] Evaluate -> DEBU 1314 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.876 UTC [policies] Evaluate -> DEBU 1315 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:00.876 UTC [policies] Evaluate -> DEBU 1316 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.877 UTC [cauthdsl] func1 -> DEBU 1317 0xc00373cf80 gate 1556760660877228100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:00.877 UTC [cauthdsl] func2 -> DEBU 1318 0xc00373cf80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:00.877 UTC [cauthdsl] func2 -> DEBU 1319 0xc00373cf80 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:00.884 UTC [cauthdsl] func2 -> DEBU 131a 0xc00373cf80 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.884 UTC [msp.identity] Verify -> DEBU 131b Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -peer0.org1.example.com | 00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -peer0.org1.example.com | "2019-05-02 01:31:00.884 UTC [msp.identity] Verify -> DEBU 131c Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -peer0.org1.example.com | 00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -peer0.org1.example.com | 00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -peer0.org1.example.com | 00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -peer0.org1.example.com | 00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -peer0.org1.example.com | "2019-05-02 01:31:00.888 UTC [cauthdsl] func2 -> DEBU 131d 0xc00373cf80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.889 UTC [cauthdsl] func1 -> DEBU 131e 0xc00373cf80 gate 1556760660877228100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:00.889 UTC [policies] Evaluate -> DEBU 131f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.890 UTC [policies] Evaluate -> DEBU 1320 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.890 UTC [policies] Evaluate -> DEBU 1321 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.890 UTC [policies] Evaluate -> DEBU 1322 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.891 UTC [msp] DeserializeIdentity -> DEBU 1323 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.891 UTC [msp] DeserializeIdentity -> DEBU 1324 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.893 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1325 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:00.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1326 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1327 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.894 UTC [policies] Evaluate -> DEBU 1328 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.894 UTC [policies] Evaluate -> DEBU 1329 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:00.894 UTC [policies] Evaluate -> DEBU 132a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.894 UTC [cauthdsl] func1 -> DEBU 132b 0xc003756750 gate 1556760660894571000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:00.894 UTC [cauthdsl] func2 -> DEBU 132c 0xc003756750 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:00.894 UTC [cauthdsl] func2 -> DEBU 132d 0xc003756750 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:00.897 UTC [cauthdsl] func2 -> DEBU 132e 0xc003756750 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.899 UTC [msp] DeserializeIdentity -> DEBU 1330 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.899 UTC [msp] DeserializeIdentity -> DEBU 1331 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.900 UTC [gossip.pull] Hello -> DEBU 1332 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:00.901 UTC [msp] DeserializeIdentity -> DEBU 1333 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:35.032 UTC [policies] Manager -> DEBU 1525 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:31:35.032 UTC [policies] Manager -> DEBU 1526 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:31:35.032 UTC [policies] Manager -> DEBU 1527 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.032 UTC [policies] Manager -> DEBU 1528 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.032 UTC [policies] Evaluate -> DEBU 1529 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -orderer0.example.com | "2019-05-02 01:31:35.033 UTC [policies] Evaluate -> DEBU 152a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:35.033 UTC [policies] Evaluate -> DEBU 152b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:31:35.033 UTC [cauthdsl] deduplicate -> WARN 152c De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer0.example.com | "2019-05-02 01:31:35.033 UTC [cauthdsl] func1 -> DEBU 152d 0xc0009bb740 gate 1556760695033644700 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:35.034 UTC [cauthdsl] func2 -> DEBU 152e 0xc0009bb740 signed by 0 principal evaluation starts (used [false false false])" -orderer0.example.com | "2019-05-02 01:31:35.034 UTC [cauthdsl] func2 -> DEBU 152f 0xc0009bb740 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:35.034 UTC [cauthdsl] func2 -> DEBU 1530 0xc0009bb740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-05-02 01:31:35.034 UTC [cauthdsl] func2 -> DEBU 1531 0xc0009bb740 processing identity 1 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:35.034 UTC [cauthdsl] func2 -> DEBU 1532 0xc0009bb740 principal matched by identity 1" -orderer0.example.com | "2019-05-02 01:31:35.035 UTC [msp.identity] Verify -> DEBU 1534 Verify: digest = 00000000 0a 93 54 f3 ca 50 66 cd 2e b2 91 c4 a1 99 4b fe |..T..Pf.......K.| -orderer0.example.com | 00000010 78 04 08 22 86 5c 95 44 eb 44 40 b9 7f 21 df a9 |x..".\.D.D@..!..|" -orderer0.example.com | "2019-05-02 01:31:35.035 UTC [msp.identity] Verify -> DEBU 1535 Verify: sig = 00000000 30 44 02 20 73 e6 28 8c bd 51 8c f6 e4 26 ca 3c |0D. s.(..Q...&.<| -orderer0.example.com | 00000010 a7 51 9f 0f f8 98 78 97 9a 0a 5b de 1d 2f 26 8a |.Q....x...[../&.| -orderer0.example.com | 00000020 4a bd b1 0a 02 20 7d 21 70 08 83 04 6d 41 e4 2d |J.... }!p...mA.-| -orderer0.example.com | 00000030 97 f9 e7 46 95 6f 32 34 86 6a f5 6d 90 57 38 e1 |...F.o24.j.m.W8.| -orderer0.example.com | 00000040 82 3f 3a 29 69 89 |.?:)i.|" -orderer0.example.com | "2019-05-02 01:31:35.036 UTC [cauthdsl] func2 -> DEBU 1536 0xc0009bb740 principal evaluation succeeds for identity 1" -orderer0.example.com | "2019-05-02 01:31:35.036 UTC [cauthdsl] func1 -> DEBU 1537 0xc0009bb740 gate 1556760695033644700 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:35.039 UTC [policies] Evaluate -> DEBU 1538 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:35.040 UTC [policies] Evaluate -> DEBU 1539 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:35.041 UTC [policies] Evaluate -> DEBU 153a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-05-02 01:31:35.042 UTC [cauthdsl] deduplicate -> WARN 153b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer0.example.com | "2019-05-02 01:31:35.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1533 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:35.045 UTC [cauthdsl] func1 -> DEBU 153c 0xc000990300 gate 1556760695043486100 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:35.045 UTC [cauthdsl] func2 -> DEBU 153d 0xc000990300 signed by 0 principal evaluation starts (used [false false false])" -orderer0.example.com | "2019-05-02 01:31:35.046 UTC [cauthdsl] func2 -> DEBU 153e 0xc000990300 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:35.046 UTC [cauthdsl] func2 -> DEBU 153f 0xc000990300 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:35.046 UTC [msp.identity] Verify -> DEBU 1540 Verify: digest = 00000000 96 5b d6 35 6e 24 ba 8d ea c0 f3 54 be 64 a0 8e |.[.5n$.....T.d..| -orderer0.example.com | 00000010 d7 2c 6e 83 3b c0 ba 63 fa 91 e5 8e d7 f6 d2 45 |.,n.;..c.......E|" -orderer0.example.com | "2019-05-02 01:31:35.046 UTC [msp.identity] Verify -> DEBU 1541 Verify: sig = 00000000 30 44 02 20 06 17 d3 85 97 6c 5b f8 2b ee 4f 8b |0D. .....l[.+.O.| -orderer0.example.com | 00000010 ef 9b 4d fa 3e e1 e8 50 ac 6a 0b 7c dd d7 cd af |..M.>..P.j.|....| -orderer0.example.com | 00000020 ef 6f e1 14 02 20 7a 9c e6 c9 a1 11 d2 73 46 49 |.o... z......sFI| -orderer0.example.com | 00000030 45 b3 5c 7b 74 db 4e 00 94 b3 b0 43 5c b9 74 72 |E.\{t.N....C\.tr| -orderer0.example.com | 00000040 0b fb bb cd 10 b7 |......|" -orderer0.example.com | "2019-05-02 01:31:35.047 UTC [cauthdsl] func2 -> DEBU 1542 0xc000990300 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:35.047 UTC [cauthdsl] func1 -> DEBU 1543 0xc000990300 gate 1556760695043486100 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:35.048 UTC [policies] Evaluate -> DEBU 1544 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:35.051 UTC [policies] Evaluate -> DEBU 1545 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:35.051 UTC [policies] Evaluate -> DEBU 1546 Signature set satisfies policy /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:31:35.052 UTC [policies] Evaluate -> DEBU 1547 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:31:35.052 UTC [common.configtx] verifyDeltaSet -> DEBU 1548 Processing change to key: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.052 UTC [common.configtx] verifyDeltaSet -> DEBU 1549 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:35.052 UTC [common.configtx] verifyDeltaSet -> DEBU 154a Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:31:35.053 UTC [common.configtx] recurseConfigMap -> DEBU 154b Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.054 UTC [common.configtx] recurseConfigMap -> DEBU 154c Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.054 UTC [common.configtx] recurseConfigMap -> DEBU 154d Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.055 UTC [common.configtx] recurseConfigMap -> DEBU 154e Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.056 UTC [common.configtx] recurseConfigMap -> DEBU 154f Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.056 UTC [common.configtx] recurseConfigMap -> DEBU 1550 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:00.902 UTC [msp] DeserializeIdentity -> DEBU 1334 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.903 UTC [gossip.comm] Send -> DEBU 1335 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:00.904 UTC [gossip.comm] sendToEndpoint -> DEBU 1336 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.904 UTC [gossip.comm] sendToEndpoint -> DEBU 1337 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.897 UTC [msp.identity] Verify -> DEBU 132f Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -peer0.org1.example.com | 00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -peer0.org1.example.com | "2019-05-02 01:31:00.908 UTC [msp.identity] Verify -> DEBU 1338 Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -peer0.org1.example.com | 00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -peer0.org1.example.com | 00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -peer0.org1.example.com | 00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -peer0.org1.example.com | 00000040 58 07 a6 98 8c c7 |X.....|" -peer0.org1.example.com | "2019-05-02 01:31:00.910 UTC [cauthdsl] func2 -> DEBU 1339 0xc003756750 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.910 UTC [cauthdsl] func1 -> DEBU 133a 0xc003756750 gate 1556760660894571000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:00.910 UTC [policies] Evaluate -> DEBU 133b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.910 UTC [policies] Evaluate -> DEBU 133c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.911 UTC [policies] Evaluate -> DEBU 133d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.911 UTC [policies] Evaluate -> DEBU 133e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.912 UTC [msp] DeserializeIdentity -> DEBU 133f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1340 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1341 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.913 UTC [policies] Evaluate -> DEBU 1342 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.913 UTC [policies] Evaluate -> DEBU 1343 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:00.913 UTC [policies] Evaluate -> DEBU 1344 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.915 UTC [cauthdsl] func1 -> DEBU 1345 0xc003757830 gate 1556760660915032700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:00.915 UTC [cauthdsl] func2 -> DEBU 1346 0xc003757830 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:00.915 UTC [cauthdsl] func2 -> DEBU 1347 0xc003757830 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:00.916 UTC [cauthdsl] func2 -> DEBU 1348 0xc003757830 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.916 UTC [msp.identity] Verify -> DEBU 1349 Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -peer0.org1.example.com | 00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -peer0.org1.example.com | "2019-05-02 01:31:00.917 UTC [msp.identity] Verify -> DEBU 134a Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -peer0.org1.example.com | 00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -peer0.org1.example.com | 00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -peer0.org1.example.com | 00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -peer0.org1.example.com | 00000040 58 07 a6 98 8c c7 |X.....|" -peer0.org1.example.com | "2019-05-02 01:31:00.918 UTC [cauthdsl] func2 -> DEBU 134b 0xc003757830 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.918 UTC [cauthdsl] func1 -> DEBU 134c 0xc003757830 gate 1556760660915032700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:00.918 UTC [policies] Evaluate -> DEBU 134d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.919 UTC [policies] Evaluate -> DEBU 134e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.920 UTC [policies] Evaluate -> DEBU 134f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.920 UTC [policies] Evaluate -> DEBU 1350 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.920 UTC [gossip.gossip] handleMessage -> DEBU 1351 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.921 UTC [gossip.gossip] handleMessage -> DEBU 1352 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.922 UTC [msp.identity] Verify -> DEBU 1353 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -peer0.org1.example.com | 00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -peer0.org1.example.com | "2019-05-02 01:31:00.922 UTC [msp.identity] Verify -> DEBU 1354 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -peer0.org1.example.com | 00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -peer0.org1.example.com | 00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -peer0.org1.example.com | 00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -peer0.org1.example.com | 00000040 63 c4 de 4c 07 05 |c..L..|" -peer0.org1.example.com | "2019-05-02 01:31:00.923 UTC [msp] DeserializeIdentity -> DEBU 1355 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.923 UTC [msp] DeserializeIdentity -> DEBU 1356 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:35.057 UTC [common.configtx] recurseConfigMap -> DEBU 1551 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.057 UTC [common.configtx] recurseConfigMap -> DEBU 1552 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.057 UTC [common.configtx] recurseConfigMap -> DEBU 1553 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.059 UTC [common.configtx] recurseConfigMap -> DEBU 1554 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.059 UTC [common.configtx] recurseConfigMap -> DEBU 1555 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.060 UTC [common.configtx] recurseConfigMap -> DEBU 1556 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.060 UTC [common.configtx] recurseConfigMap -> DEBU 1557 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.060 UTC [common.configtx] recurseConfigMap -> DEBU 1558 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.061 UTC [common.configtx] recurseConfigMap -> DEBU 1559 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.061 UTC [common.configtx] recurseConfigMap -> DEBU 155a Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.061 UTC [common.configtx] recurseConfigMap -> DEBU 155b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.062 UTC [common.configtx] recurseConfigMap -> DEBU 155c Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.062 UTC [common.configtx] recurseConfigMap -> DEBU 155d Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.062 UTC [common.configtx] recurseConfigMap -> DEBU 155e Setting policy for key Admins to " -orderer0.example.com | "2019-05-02 01:31:35.062 UTC [common.configtx] recurseConfigMap -> DEBU 155f Setting policy for key Endorsement to " -orderer0.example.com | "2019-05-02 01:31:35.063 UTC [common.configtx] recurseConfigMap -> DEBU 1560 Setting policy for key LifecycleEndorsement to " -orderer0.example.com | "2019-05-02 01:31:35.063 UTC [common.configtx] recurseConfigMap -> DEBU 1561 Setting policy for key Readers to " -orderer0.example.com | "2019-05-02 01:31:35.063 UTC [common.configtx] recurseConfigMap -> DEBU 1562 Setting policy for key Writers to " -orderer0.example.com | "2019-05-02 01:31:35.063 UTC [common.configtx] recurseConfigMap -> DEBU 1563 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.063 UTC [common.configtx] recurseConfigMap -> DEBU 1564 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.064 UTC [common.configtx] recurseConfigMap -> DEBU 1565 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-05-02 01:31:35.064 UTC [common.channelconfig] NewStandardValues -> DEBU 1566 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-05-02 01:31:35.064 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1567 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:31:35.064 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1568 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-05-02 01:31:35.064 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1569 Processing field: OrdererAddresses" -orderer0.example.com | "2019-05-02 01:31:35.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156a Processing field: Consortium" -orderer0.example.com | "2019-05-02 01:31:35.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156b Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:31:35.065 UTC [common.channelconfig] NewStandardValues -> DEBU 156c Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-05-02 01:31:35.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156d Processing field: ConsensusType" -orderer0.example.com | "2019-05-02 01:31:35.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156e Processing field: BatchSize" -orderer0.example.com | "2019-05-02 01:31:35.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156f Processing field: BatchTimeout" -orderer0.example.com | "2019-05-02 01:31:35.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1570 Processing field: KafkaBrokers" -orderer0.example.com | "2019-05-02 01:31:35.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1571 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:31:35.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1572 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:31:35.067 UTC [common.channelconfig] NewStandardValues -> DEBU 1573 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-05-02 01:31:35.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1574 Processing field: Endpoints" -orderer0.example.com | "2019-05-02 01:31:35.067 UTC [common.channelconfig] NewStandardValues -> DEBU 1575 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:31:35.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1576 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:31:35.067 UTC [common.channelconfig] validateMSP -> DEBU 1577 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:35.068 UTC [msp] newBccspMsp -> DEBU 1578 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:31:35.068 UTC [msp] New -> DEBU 1579 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:31:35.068 UTC [msp] Setup -> DEBU 157a Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-05-02 01:31:35.069 UTC [msp.identity] newIdentity -> DEBU 157b Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | "2019-05-02 01:31:00.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1357 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:00.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1358 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1359 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.925 UTC [policies] Evaluate -> DEBU 135a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.928 UTC [policies] Evaluate -> DEBU 135b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:00.928 UTC [policies] Evaluate -> DEBU 135c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.928 UTC [cauthdsl] func1 -> DEBU 135d 0xc00376d960 gate 1556760660928827100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:00.928 UTC [cauthdsl] func2 -> DEBU 135e 0xc00376d960 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:00.929 UTC [cauthdsl] func2 -> DEBU 135f 0xc00376d960 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:00.931 UTC [cauthdsl] func2 -> DEBU 1360 0xc00376d960 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.931 UTC [msp.identity] Verify -> DEBU 1361 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -peer0.org1.example.com | 00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -peer0.org1.example.com | "2019-05-02 01:31:00.931 UTC [msp.identity] Verify -> DEBU 1362 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU 1363 0xc00376d960 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.932 UTC [cauthdsl] func1 -> DEBU 1364 0xc00376d960 gate 1556760660928827100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:00.932 UTC [policies] Evaluate -> DEBU 1365 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.932 UTC [policies] Evaluate -> DEBU 1366 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.932 UTC [policies] Evaluate -> DEBU 1367 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.932 UTC [policies] Evaluate -> DEBU 1368 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.933 UTC [msp] DeserializeIdentity -> DEBU 1369 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.933 UTC [msp] DeserializeIdentity -> DEBU 136a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:00.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 136b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:00.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 136c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 136d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.934 UTC [policies] Evaluate -> DEBU 136e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.934 UTC [policies] Evaluate -> DEBU 136f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:00.934 UTC [policies] Evaluate -> DEBU 1370 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.934 UTC [cauthdsl] func1 -> DEBU 1371 0xc003783130 gate 1556760660934665400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:00.934 UTC [cauthdsl] func2 -> DEBU 1372 0xc003783130 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:00.934 UTC [cauthdsl] func2 -> DEBU 1373 0xc003783130 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:00.935 UTC [cauthdsl] func2 -> DEBU 1374 0xc003783130 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.935 UTC [msp.identity] Verify -> DEBU 1375 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -peer0.org1.example.com | 00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -peer0.org1.example.com | "2019-05-02 01:31:00.935 UTC [msp.identity] Verify -> DEBU 1376 Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -peer0.org1.example.com | 00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -peer0.org1.example.com | 00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -peer0.org1.example.com | 00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -peer0.org1.example.com | 00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -peer0.org1.example.com | "2019-05-02 01:31:00.935 UTC [cauthdsl] func2 -> DEBU 1377 0xc003783130 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.935 UTC [cauthdsl] func1 -> DEBU 1378 0xc003783130 gate 1556760660934665400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:00.936 UTC [policies] Evaluate -> DEBU 1379 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.936 UTC [policies] Evaluate -> DEBU 137a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.936 UTC [policies] Evaluate -> DEBU 137b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.936 UTC [policies] Evaluate -> DEBU 137c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.937 UTC [msp.identity] Verify -> DEBU 137d Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -peer0.org1.example.com | 00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -peer0.org1.example.com | "2019-05-02 01:31:00.937 UTC [msp.identity] Verify -> DEBU 137e Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -peer0.org1.example.com | 00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -peer0.org1.example.com | 00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -peer0.org1.example.com | 00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -peer0.org1.example.com | 00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -peer0.org1.example.com | "2019-05-02 01:31:00.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1380 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:00.938 UTC [policies] Evaluate -> DEBU 1381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.938 UTC [policies] Evaluate -> DEBU 1382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:00.938 UTC [policies] Evaluate -> DEBU 1383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.939 UTC [cauthdsl] func1 -> DEBU 1384 0xc00379c830 gate 1556760660939036600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:00.939 UTC [cauthdsl] func2 -> DEBU 1385 0xc00379c830 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:00.939 UTC [cauthdsl] func2 -> DEBU 1386 0xc00379c830 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:00.939 UTC [cauthdsl] func2 -> DEBU 1387 0xc00379c830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:00.939 UTC [cauthdsl] func2 -> DEBU 1388 0xc00379c830 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:00.940 UTC [cauthdsl] func1 -> DEBU 1389 0xc00379c830 gate 1556760660939036600 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:00.940 UTC [policies] Evaluate -> DEBU 138a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.940 UTC [policies] Evaluate -> DEBU 138b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.940 UTC [policies] Evaluate -> DEBU 138c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:00.941 UTC [cauthdsl] func1 -> DEBU 138d 0xc00379d070 gate 1556760660940822600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:00.941 UTC [cauthdsl] func2 -> DEBU 138e 0xc00379d070 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:00.941 UTC [cauthdsl] func2 -> DEBU 138f 0xc00379d070 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:00.941 UTC [cauthdsl] func2 -> DEBU 1390 0xc00379d070 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.941 UTC [msp.identity] Verify -> DEBU 1391 Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -peer0.org1.example.com | 00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -peer0.org1.example.com | "2019-05-02 01:31:00.942 UTC [msp.identity] Verify -> DEBU 1392 Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -peer0.org1.example.com | 00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -peer0.org1.example.com | 00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -peer0.org1.example.com | 00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -peer0.org1.example.com | 00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -peer0.org1.example.com | "2019-05-02 01:31:00.942 UTC [cauthdsl] func2 -> DEBU 1393 0xc00379d070 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:00.942 UTC [cauthdsl] func1 -> DEBU 1394 0xc00379d070 gate 1556760660940822600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:00.942 UTC [policies] Evaluate -> DEBU 1395 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.942 UTC [policies] Evaluate -> DEBU 1396 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.943 UTC [policies] Evaluate -> DEBU 1397 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.943 UTC [policies] Evaluate -> DEBU 1398 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:00.943 UTC [gossip.gossip] handleMessage -> DEBU 1399 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:00.943 UTC [gossip.gossip] handleMessage -> DEBU 139a Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13024588905277607341 , Msg_type: BLOCK_MSG, digests: [3 1 2], Envelope: 43 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.943 UTC [gossip.pull] HandleMessage -> DEBU 139b GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13024588905277607341 , Msg_type: BLOCK_MSG, digests: [3 1 2], Envelope: 43 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:00.943 UTC [gossip.gossip] handleMessage -> DEBU 139c Exiting" -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:35.070 UTC [msp.identity] newIdentity -> DEBU 157c Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:35.070 UTC [msp] Validate -> DEBU 157d MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:31:35.071 UTC [common.channelconfig] NewStandardValues -> DEBU 157e Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-05-02 01:31:35.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 157f Processing field: ACLs" -orderer0.example.com | "2019-05-02 01:31:35.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1580 Processing field: Capabilities" -orderer0.example.com | "2019-05-02 01:31:35.071 UTC [common.channelconfig] NewStandardValues -> DEBU 1581 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:31:35.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1582 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:31:35.072 UTC [common.channelconfig] NewStandardValues -> DEBU 1583 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:31:35.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1584 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:31:35.072 UTC [common.channelconfig] Validate -> DEBU 1585 Anchor peers for org Org3MSP are " -orderer0.example.com | "2019-05-02 01:31:35.073 UTC [common.channelconfig] validateMSP -> DEBU 1586 Setting up MSP for org Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.073 UTC [msp] newBccspMsp -> DEBU 1587 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:31:35.073 UTC [msp] New -> DEBU 1588 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:31:35.073 UTC [msp] Setup -> DEBU 1589 Setting up MSP instance Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.074 UTC [msp.identity] newIdentity -> DEBU 158a Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB -orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc -orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:35.074 UTC [msp.identity] newIdentity -> DEBU 158b Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y -orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr -orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky -orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV -orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO -orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ -orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:35.075 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 158c Checking if identity satisfies role [CLIENT] for Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.075 UTC [msp] Validate -> DEBU 158d MSP Org3MSP validating identity" -orderer0.example.com | "2019-05-02 01:31:35.076 UTC [msp] getCertificationChain -> DEBU 158e MSP Org3MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:35.076 UTC [msp] hasOURole -> DEBU 158f MSP Org3MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:31:35.077 UTC [msp] getCertificationChain -> DEBU 1590 MSP Org3MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:35.077 UTC [common.channelconfig] NewStandardValues -> DEBU 1591 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:31:35.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1592 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:31:35.078 UTC [common.channelconfig] NewStandardValues -> DEBU 1593 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:31:35.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1594 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:31:35.078 UTC [common.channelconfig] Validate -> DEBU 1595 Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:31:35.078 UTC [common.channelconfig] validateMSP -> DEBU 1596 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.079 UTC [msp] newBccspMsp -> DEBU 1597 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:31:35.079 UTC [msp] New -> DEBU 1598 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:31:35.079 UTC [msp] Setup -> DEBU 1599 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.080 UTC [msp.identity] newIdentity -> DEBU 159a Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:35.080 UTC [msp.identity] newIdentity -> DEBU 159b Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:35.081 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 159c Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.081 UTC [msp] Validate -> DEBU 159d MSP Org1MSP validating identity" -orderer0.example.com | "2019-05-02 01:31:35.082 UTC [msp] getCertificationChain -> DEBU 159e MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:35.082 UTC [msp] hasOURole -> DEBU 159f MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:31:35.082 UTC [msp] getCertificationChain -> DEBU 15a0 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:35.083 UTC [common.channelconfig] NewStandardValues -> DEBU 15a1 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-05-02 01:31:35.083 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a2 Processing field: AnchorPeers" -orderer0.example.com | "2019-05-02 01:31:35.083 UTC [common.channelconfig] NewStandardValues -> DEBU 15a3 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-05-02 01:31:35.083 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a4 Processing field: MSP" -orderer0.example.com | "2019-05-02 01:31:35.083 UTC [common.channelconfig] Validate -> DEBU 15a5 Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-05-02 01:31:35.084 UTC [common.channelconfig] validateMSP -> DEBU 15a6 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.084 UTC [msp] newBccspMsp -> DEBU 15a7 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-05-02 01:31:35.084 UTC [msp] New -> DEBU 15a8 Creating Cache-MSP instance" -orderer0.example.com | "2019-05-02 01:31:35.084 UTC [msp] Setup -> DEBU 15a9 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.085 UTC [msp.identity] newIdentity -> DEBU 15aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:28:03.964 UTC [cauthdsl] func1 -> DEBU 14b4 0xc000d00e90 gate 1556789283964332300 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:03.964 UTC [cauthdsl] func2 -> DEBU 14b5 0xc000d00e90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:03.965 UTC [cauthdsl] func2 -> DEBU 14b6 0xc000d00e90 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:03.965 UTC [cauthdsl] func2 -> DEBU 14b7 0xc000d00e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:03.965 UTC [cauthdsl] func2 -> DEBU 14b8 0xc000d00e90 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:03.965 UTC [cauthdsl] func1 -> DEBU 14b9 0xc000d00e90 gate 1556789283964332300 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:03.965 UTC [policies] Evaluate -> DEBU 14ba Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.965 UTC [policies] Evaluate -> DEBU 14bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.966 UTC [policies] Evaluate -> DEBU 14bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-05-02 09:28:03.966 UTC [cauthdsl] func1 -> DEBU 14bd 0xc000d01fd0 gate 1556789283966118500 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:03.966 UTC [cauthdsl] func2 -> DEBU 14be 0xc000d01fd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:03.966 UTC [cauthdsl] func2 -> DEBU 14bf 0xc000d01fd0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:03.966 UTC [cauthdsl] func2 -> DEBU 14c0 0xc000d01fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:03.967 UTC [cauthdsl] func2 -> DEBU 14c1 0xc000d01fd0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:03.967 UTC [cauthdsl] func1 -> DEBU 14c2 0xc000d01fd0 gate 1556789283966118500 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] func1 -> DEBU 14c5 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c6 Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-05-02 09:28:03.968 UTC [policies] Evaluate -> DEBU 14c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:03.968 UTC [policies] Evaluate -> DEBU 14ca == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-05-02 09:28:03.968 UTC [cauthdsl] func1 -> DEBU 14cb 0xc000f40ce0 gate 1556789283968350700 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:03.968 UTC [cauthdsl] func2 -> DEBU 14cc 0xc000f40ce0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:03.968 UTC [cauthdsl] func2 -> DEBU 14cd 0xc000f40ce0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:03.968 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14ce Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-05-02 09:28:03.969 UTC [msp] Validate -> DEBU 14cf MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:28:03.969 UTC [cauthdsl] func2 -> DEBU 14d0 0xc000f40ce0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:03.969 UTC [msp.identity] Verify -> DEBU 14d1 Verify: digest = 00000000 ee 16 cd a5 d4 21 24 67 68 81 7d 03 6e 9c 38 ef |.....!$gh.}.n.8.| +orderer0.example.com | 00000010 e9 00 7f a0 5b 31 09 e4 f2 2a c3 f4 8c 3f 33 f6 |....[1...*...?3.|" +orderer0.example.com | "2019-05-02 09:28:03.970 UTC [msp.identity] Verify -> DEBU 14d2 Verify: sig = 00000000 30 45 02 21 00 b5 41 bd ed 21 97 bc c2 3a d9 a4 |0E.!..A..!...:..| +orderer0.example.com | 00000010 5d 1d 40 a2 44 9c 84 8a 70 3a 7d 04 cf 03 5f 51 |].@.D...p:}..._Q| +orderer0.example.com | 00000020 60 44 a8 fb e8 02 20 0a d3 c5 d1 4b 45 a6 76 26 |`D.... ....KE.v&| +orderer0.example.com | 00000030 f3 8a f0 be 0d 0d e8 b9 fd 97 27 13 40 da ef 59 |..........'.@..Y| +orderer0.example.com | 00000040 9b 10 bb ec fa 93 92 |.......|" +orderer0.example.com | "2019-05-02 09:28:03.970 UTC [cauthdsl] func2 -> DEBU 14d3 0xc000f40ce0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:03.971 UTC [cauthdsl] func1 -> DEBU 14d4 0xc000f40ce0 gate 1556789283968350700 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d7 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d9 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-05-02 09:28:03.972 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 14db [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57384" +orderer0.example.com | "2019-05-02 09:28:03.972 UTC [orderer.consensus.etcdraft] propose -> INFO 14dc Created block [9], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:28:03.974 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 14dd Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:28:03.974 UTC [orderer.consensus.etcdraft] 2 -> DEBU 14de Proposed block [9] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:28:03.976 UTC [orderer.common.broadcast] Handle -> WARN 14df Error reading from 172.18.0.8:57384: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:03.976 UTC [orderer.common.server] func1 -> DEBU 14e0 Closing Broadcast stream" +orderer0.example.com | "2019-05-02 09:28:03.976 UTC [comm.grpc.server] 1 -> INFO 14e1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57384 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=81.2501ms +orderer0.example.com | "2019-05-02 09:28:03.976 UTC [grpc] infof -> DEBU 14e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:03.976 UTC [common.deliver] Handle -> WARN 14e3 Error reading from 172.18.0.8:57382: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:03.976 UTC [orderer.common.server] func1 -> DEBU 14e4 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:03.976 UTC [comm.grpc.server] 1 -> INFO 14e5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57382 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=95.981ms +orderer0.example.com | "2019-05-02 09:28:03.976 UTC [grpc] infof -> DEBU 14e6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:03.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e7 Sending msg of 33999 bytes to 2 on channel businesschannel took 20.1µs" +orderer0.example.com | "2019-05-02 09:28:03.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e8 Sending msg of 33999 bytes to 3 on channel businesschannel took 23.2µs" +orderer0.example.com | "2019-05-02 09:28:03.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e9 Send of ConsensusRequest for channel businesschannel with payload of size 33999 to orderer2.example.com(orderer2.example.com:7050) took 217.2µs " +orderer0.example.com | "2019-05-02 09:28:03.979 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ea Send of ConsensusRequest for channel businesschannel with payload of size 33999 to orderer1.example.com(orderer1.example.com:7050) took 127.3µs " +orderer0.example.com | "2019-05-02 09:28:03.987 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14eb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:03.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ec Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +orderer0.example.com | "2019-05-02 09:28:03.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ed Sending msg of 28 bytes to 3 on channel businesschannel took 122µs" +orderer0.example.com | "2019-05-02 09:28:03.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +orderer0.example.com | "2019-05-02 09:28:03.989 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 14ef Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-05-02 09:28:03.990 UTC [common.configtx] addToMap -> DEBU 14f0 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:28:03.992 UTC [common.configtx] addToMap -> DEBU 14f1 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:28:03.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:03.992 UTC [common.configtx] addToMap -> DEBU 14f3 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.001 UTC [common.configtx] addToMap -> DEBU 14f5 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.001 UTC [common.configtx] addToMap -> DEBU 14f6 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:28:04.012 UTC [common.configtx] addToMap -> DEBU 14f7 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:28:04.014 UTC [common.configtx] addToMap -> DEBU 14fa Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:28:04.014 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:03.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.8µs " +orderer0.example.com | "2019-05-02 09:28:04.014 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:04.015 UTC [common.configtx] addToMap -> DEBU 14fb Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:28:04.016 UTC [common.configtx] addToMap -> DEBU 14fc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:28:04.017 UTC [common.configtx] addToMap -> DEBU 14fd Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:04.017 UTC [common.configtx] addToMap -> DEBU 14fe Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 14ff Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 1500 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 1501 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 1502 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1503 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1504 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1505 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1506 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:04.021 UTC [common.configtx] addToMap -> DEBU 1507 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [valinternal] ApplyWriteSet -> DEBU 12bc txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc0030e2d40), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc0030e2e00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0030e2cc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc0030e2d00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4 DEBU 12bd validating rwset..." +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12be postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12bf ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c0 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0004446c0 0x27475e0 0xc000011220}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0022c0dc0 map[]})]}" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [cceventmgmt] HandleStateUpdates -> DEBU 12c1 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 12c2 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c3 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0})}" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c4 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 184 141 138 176 125 192 58 83 1 250 26 202 161 54 104 45 229 195 166 43 96 100 9 159 109 154 254 234 147 189 33 229 2 32 120 2 28 36 139 185 5 29 110 69 153 220 53 183 5 154 146 86 140 197 1 134 231 194 84 112 80 242 124 44 67 58]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002604a00 0xc002598700 0xc0025cc980})]}" +peer0.org1.example.com | "2019-05-02 09:27:32.546 UTC [confighistory] HandleStateUpdates -> ERRO 12c5 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003770140)}" +peer0.org1.example.com | "2019-05-02 09:27:32.547 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c6 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000ebc0})}" +peer0.org1.example.com | "2019-05-02 09:27:32.547 UTC [kvledger] CommitWithPvtData -> DEBU 12c7 [businesschannel] Committing block [4] to storage" +peer0.org1.example.com | "2019-05-02 09:27:32.547 UTC [ledgerstorage] CommitWithPvtData -> DEBU 12c8 Writing block [4] to pvt block store" +peer0.org1.example.com | "2019-05-02 09:27:32.547 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 12c9 constructing new query executor txid = [998036b2-24f2-4003-aed9-57d7cb5f0fe7]" +peer0.org1.example.com | "2019-05-02 09:27:32.547 UTC [lockbasedtxmgr] Done -> DEBU 12ca Done with transaction simulation / query execution [998036b2-24f2-4003-aed9-57d7cb5f0fe7]" +peer0.org1.example.com | "2019-05-02 09:27:32.539 UTC [committer.txvalidator] validateTx -> DEBU 12cb [businesschannel] validateTx completes for block 0xc0030e2340 env 0xc002e393b0 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:32.550 UTC [pvtdatastorage] Prepare -> DEBU 12cc Saved 0 private data write sets for block [4]" +peer0.org1.example.com | "2019-05-02 09:27:32.555 UTC [fsblkstorage] indexBlock -> DEBU 12cd Indexing block [blockNum=4, blockHash=[]byte{0x3f, 0x8b, 0xa1, 0x1f, 0x8f, 0x88, 0xc1, 0xba, 0x58, 0x69, 0x5b, 0x7b, 0xae, 0x78, 0x89, 0x9c, 0xeb, 0xc3, 0x4b, 0xbf, 0x99, 0xfe, 0xf3, 0x9e, 0xef, 0xe7, 0xb4, 0x8a, 0xe5, 0xe4, 0xa4, 0x51} txOffsets= +peer0.org1.example.com | txId=fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd locPointer=offset=70, bytesLength=3703 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-05-02 09:27:32.555 UTC [fsblkstorage] indexBlock -> DEBU 12ce Adding txLoc [fileSuffixNum=0, offset=76154, bytesLength=3703] for tx ID: [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] to txid-index" +peer0.org1.example.com | "2019-05-02 09:27:32.555 UTC [fsblkstorage] indexBlock -> DEBU 12cf Adding txLoc [fileSuffixNum=0, offset=76154, bytesLength=3703] for tx number:[0] ID: [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] to blockNumTranNum index" +peer0.org1.example.com | "2019-05-02 09:27:32.559 UTC [fsblkstorage] updateCheckpoint -> DEBU 12d0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80794], isChainEmpty=[false], lastBlockNumber=[4]" +orderer0.example.com | "2019-05-02 09:28:04.021 UTC [common.configtx] addToMap -> DEBU 1508 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.022 UTC [common.configtx] addToMap -> DEBU 1509 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:28:04.022 UTC [common.configtx] addToMap -> DEBU 150a Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:28:04.022 UTC [common.configtx] addToMap -> DEBU 150b Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:28:04.027 UTC [common.configtx] addToMap -> DEBU 150c Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:28:04.028 UTC [common.configtx] addToMap -> DEBU 150d Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:28:04.028 UTC [common.configtx] addToMap -> DEBU 150e Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:04.029 UTC [common.configtx] addToMap -> DEBU 150f Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:28:04.029 UTC [common.configtx] verifyDeltaSet -> DEBU 1510 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-05-02 09:28:04.030 UTC [common.configtx] verifyDeltaSet -> DEBU 1511 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:04.030 UTC [common.configtx] verifyDeltaSet -> DEBU 1512 Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:04.030 UTC [common.configtx] verifyDeltaSet -> DEBU 1513 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:04.031 UTC [common.configtx] verifyDeltaSet -> DEBU 1514 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:04.031 UTC [common.configtx] verifyDeltaSet -> DEBU 1515 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:28:04.035 UTC [common.configtx] verifyDeltaSet -> DEBU 1516 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:28:04.036 UTC [common.configtx] policyForItem -> DEBU 1517 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-05-02 09:28:04.038 UTC [policies] Manager -> DEBU 1518 Manager Channel looking up path []" +orderer0.example.com | "2019-05-02 09:28:04.041 UTC [policies] Manager -> DEBU 1519 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:28:04.042 UTC [policies] Manager -> DEBU 151a Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:28:04.042 UTC [policies] Manager -> DEBU 151b Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:28:04.042 UTC [policies] Manager -> DEBU 151c Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:28:04.043 UTC [policies] Manager -> DEBU 151d Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:28:04.043 UTC [policies] Manager -> DEBU 151e Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:28:04.044 UTC [policies] Manager -> DEBU 151f Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.044 UTC [policies] Manager -> DEBU 1520 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.045 UTC [policies] Evaluate -> DEBU 1521 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-05-02 09:28:04.047 UTC [policies] Evaluate -> DEBU 1522 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:04.048 UTC [policies] Evaluate -> DEBU 1523 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:28:04.048 UTC [cauthdsl] deduplicate -> WARN 1524 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-05-02 09:28:04.056 UTC [cauthdsl] func1 -> DEBU 1525 0xc001284ab0 gate 1556789284056859400 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:04.057 UTC [cauthdsl] func2 -> DEBU 1526 0xc001284ab0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-05-02 09:28:04.057 UTC [cauthdsl] func2 -> DEBU 1527 0xc001284ab0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:04.060 UTC [cauthdsl] func2 -> DEBU 1528 0xc001284ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-05-02 09:28:04.061 UTC [cauthdsl] func2 -> DEBU 1529 0xc001284ab0 processing identity 1 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:04.061 UTC [cauthdsl] func2 -> DEBU 152a 0xc001284ab0 principal matched by identity 1" +orderer0.example.com | "2019-05-02 09:28:04.062 UTC [msp.identity] Verify -> DEBU 152b Verify: digest = 00000000 70 27 54 c7 10 65 06 23 74 50 fc 01 20 7a 9f 22 |p'T..e.#tP.. z."| +orderer0.example.com | 00000010 df 75 70 9a b8 8e 15 04 cc 2d a3 ad 5e 15 ee 89 |.up......-..^...|" +orderer0.example.com | "2019-05-02 09:28:04.065 UTC [msp.identity] Verify -> DEBU 152c Verify: sig = 00000000 30 44 02 20 3e 34 30 a7 7a 34 94 d8 b3 73 97 db |0D. >40.z4...s..| +orderer0.example.com | 00000010 96 da 10 13 46 64 57 5e af 8c ec ad 13 2e 72 23 |....FdW^......r#| +orderer0.example.com | 00000020 12 36 e1 a7 02 20 67 6b 69 65 0e 27 d7 39 1b e1 |.6... gkie.'.9..| +orderer0.example.com | 00000030 07 2a cf 5f b4 cf 8d 8d 2e 70 bf ed ec 66 7c 6b |.*._.....p...f|k| +orderer0.example.com | 00000040 a3 af 89 d2 b2 af |......|" +orderer0.example.com | "2019-05-02 09:28:04.066 UTC [cauthdsl] func2 -> DEBU 152d 0xc001284ab0 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-05-02 09:28:04.071 UTC [cauthdsl] func1 -> DEBU 152e 0xc001284ab0 gate 1556789284056859400 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:04.071 UTC [policies] Evaluate -> DEBU 152f Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:04.072 UTC [policies] Evaluate -> DEBU 1530 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:04.072 UTC [policies] Evaluate -> DEBU 1531 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-05-02 09:28:04.074 UTC [cauthdsl] deduplicate -> WARN 1532 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] func1 -> DEBU 1533 0xc0012850e0 gate 1556789284075081800 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] func2 -> DEBU 1534 0xc0012850e0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-05-02 09:28:04.076 UTC [cauthdsl] func2 -> DEBU 1535 0xc0012850e0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:04.076 UTC [cauthdsl] func2 -> DEBU 1536 0xc0012850e0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:04.079 UTC [msp.identity] Verify -> DEBU 1537 Verify: digest = 00000000 55 f0 c2 94 3a 37 23 eb d0 1b da 18 4a 66 45 b5 |U...:7#.....JfE.| +orderer0.example.com | 00000010 54 12 61 d1 4b ae fe 57 e9 51 94 57 aa af 68 17 |T.a.K..W.Q.W..h.|" +orderer0.example.com | "2019-05-02 09:28:04.079 UTC [msp.identity] Verify -> DEBU 1538 Verify: sig = 00000000 30 45 02 21 00 ef 26 69 f6 43 cc ea 70 a5 61 8d |0E.!..&i.C..p.a.| +orderer0.example.com | 00000010 ff a4 ff 24 9b 2c 47 7c 14 f4 82 75 2d 27 b6 b0 |...$.,G|...u-'..| +orderer0.example.com | 00000020 a2 6a 68 25 32 02 20 23 80 40 b2 b7 b1 c9 60 08 |.jh%2. #.@....`.| +orderer0.example.com | 00000030 cd 4e 09 a9 3c 63 75 29 2f 85 61 35 08 11 df c6 |.N.. DEBU 1539 0xc0012850e0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:04.080 UTC [cauthdsl] func1 -> DEBU 153a 0xc0012850e0 gate 1556789284075081800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:04.080 UTC [policies] Evaluate -> DEBU 153b Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:04.093 UTC [policies] Evaluate -> DEBU 153c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:04.093 UTC [policies] Evaluate -> DEBU 153d Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:28:04.093 UTC [policies] Evaluate -> DEBU 153e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:28:04.094 UTC [common.configtx] recurseConfigMap -> DEBU 153f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.094 UTC [common.configtx] recurseConfigMap -> DEBU 1540 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.095 UTC [common.configtx] recurseConfigMap -> DEBU 1541 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.096 UTC [common.configtx] recurseConfigMap -> DEBU 1542 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.096 UTC [common.configtx] recurseConfigMap -> DEBU 1543 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1544 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1545 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1546 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1547 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.099 UTC [common.configtx] recurseConfigMap -> DEBU 1548 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 1549 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 154a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 154b Setting policy for key Writers to " +orderer0.example.com | "2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 154c Setting policy for key Admins to " +orderer0.example.com | "2019-05-02 09:28:04.102 UTC [common.configtx] recurseConfigMap -> DEBU 154d Setting policy for key Endorsement to " +orderer0.example.com | "2019-05-02 09:28:04.102 UTC [common.configtx] recurseConfigMap -> DEBU 154e Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-05-02 09:28:04.102 UTC [common.configtx] recurseConfigMap -> DEBU 154f Setting policy for key Readers to " +orderer0.example.com | "2019-05-02 09:28:04.103 UTC [common.configtx] recurseConfigMap -> DEBU 1550 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.103 UTC [common.configtx] recurseConfigMap -> DEBU 1551 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.104 UTC [common.configtx] recurseConfigMap -> DEBU 1552 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1553 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1554 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1555 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1556 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1557 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.configtx] recurseConfigMap -> DEBU 1558 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.configtx] recurseConfigMap -> DEBU 1559 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.channelconfig] NewStandardValues -> DEBU 155a Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155b Processing field: HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155c Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:28:04.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155d Processing field: OrdererAddresses" +orderer0.example.com | "2019-05-02 09:28:04.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155e Processing field: Consortium" +orderer0.example.com | "2019-05-02 09:28:04.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155f Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:28:04.116 UTC [common.channelconfig] NewStandardValues -> DEBU 1560 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-05-02 09:28:04.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1561 Processing field: ACLs" +orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1562 Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] NewStandardValues -> DEBU 1563 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1564 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] NewStandardValues -> DEBU 1565 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1566 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] Validate -> DEBU 1567 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-05-02 09:28:04.117 UTC [common.channelconfig] validateMSP -> DEBU 1568 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.118 UTC [msp] newBccspMsp -> DEBU 1569 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:28:04.118 UTC [msp] New -> DEBU 156a Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:28:04.118 UTC [msp] Setup -> DEBU 156b Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.118 UTC [msp.identity] newIdentity -> DEBU 156c Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -15698,115 +15167,12 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:35.085 UTC [msp.identity] newIdentity -> DEBU 15ab Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:28:04.119 UTC [msp.identity] newIdentity -> DEBU 156d Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | "2019-05-02 01:31:01.092 UTC [gossip.gossip] handleMessage -> DEBU 139d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.092 UTC [msp] DeserializeIdentity -> DEBU 139e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.093 UTC [msp] DeserializeIdentity -> DEBU 139f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.093 UTC [gossip.gossip] handleMessage -> DEBU 13a0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.093 UTC [gossip.gossip] handleMessage -> DEBU 13a1 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760658246133000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.094 UTC [msp.identity] Verify -> DEBU 13a2 Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -peer0.org1.example.com | 00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -peer0.org1.example.com | "2019-05-02 01:31:01.094 UTC [msp.identity] Verify -> DEBU 13a3 Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -peer0.org1.example.com | 00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -peer0.org1.example.com | 00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -peer0.org1.example.com | 00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -peer0.org1.example.com | 00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -peer0.org1.example.com | "2019-05-02 01:31:01.095 UTC [gossip.gossip] handleMessage -> DEBU 13a4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.102 UTC [gossip.gossip] handleMessage -> DEBU 13a5 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.102 UTC [gossip.pull] HandleMessage -> DEBU 13a6 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.103 UTC [gossip.pull] SendDigest -> DEBU 13a7 Sending BLOCK_MSG digest: [3 1 2] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:01.103 UTC [gossip.gossip] handleMessage -> DEBU 13a8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.105 UTC [gossip.comm] func1 -> DEBU 13a9 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760658246133000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.106 UTC [gossip.gossip] handleMessage -> DEBU 13aa Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760658246133000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.106 UTC [msp.identity] Verify -> DEBU 13ab Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -peer0.org1.example.com | 00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -peer0.org1.example.com | "2019-05-02 01:31:01.107 UTC [msp.identity] Verify -> DEBU 13ac Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -peer0.org1.example.com | 00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -peer0.org1.example.com | 00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -peer0.org1.example.com | 00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -peer0.org1.example.com | 00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -peer0.org1.example.com | "2019-05-02 01:31:01.109 UTC [msp] DeserializeIdentity -> DEBU 13ad Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.109 UTC [gossip.gossip] handleMessage -> DEBU 13ae Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.113 UTC [gossip.comm] func1 -> DEBU 13af Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760658246133000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.118 UTC [gossip.gossip] handleMessage -> DEBU 13b0 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760658246133000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.120 UTC [msp.identity] Verify -> DEBU 13b1 Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -peer0.org1.example.com | 00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -peer0.org1.example.com | "2019-05-02 01:31:01.120 UTC [msp.identity] Verify -> DEBU 13b2 Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -peer0.org1.example.com | 00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -peer0.org1.example.com | 00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -peer0.org1.example.com | 00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -peer0.org1.example.com | 00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -peer0.org1.example.com | "2019-05-02 01:31:01.122 UTC [msp] DeserializeIdentity -> DEBU 13b3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.123 UTC [gossip.gossip] handleMessage -> DEBU 13b4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.317 UTC [gossip.comm] func1 -> DEBU 13b5 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.317 UTC [gossip.gossip] handleMessage -> DEBU 13b6 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.317 UTC [msp] DeserializeIdentity -> DEBU 13b7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.318 UTC [msp] DeserializeIdentity -> DEBU 13b8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.318 UTC [msp] DeserializeIdentity -> DEBU 13b9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.318 UTC [gossip.gossip] handleMessage -> DEBU 13ba Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.326 UTC [gossip.comm] func1 -> DEBU 13bb Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760657982069600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.326 UTC [gossip.gossip] handleMessage -> DEBU 13bc Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760657982069600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.327 UTC [msp] DeserializeIdentity -> DEBU 13bd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:01.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13bf Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13c0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.328 UTC [policies] Evaluate -> DEBU 13c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.328 UTC [policies] Evaluate -> DEBU 13c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:01.328 UTC [policies] Evaluate -> DEBU 13c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.328 UTC [cauthdsl] func1 -> DEBU 13c4 0xc0037cfa00 gate 1556760661328948100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:01.329 UTC [cauthdsl] func2 -> DEBU 13c5 0xc0037cfa00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.329 UTC [cauthdsl] func2 -> DEBU 13c6 0xc0037cfa00 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:01.329 UTC [cauthdsl] func2 -> DEBU 13c7 0xc0037cfa00 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.329 UTC [msp.identity] Verify -> DEBU 13c8 Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -peer0.org1.example.com | 00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -peer0.org1.example.com | "2019-05-02 01:31:01.329 UTC [msp.identity] Verify -> DEBU 13c9 Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -peer0.org1.example.com | 00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -peer0.org1.example.com | 00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -peer0.org1.example.com | 00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -peer0.org1.example.com | 00000040 58 07 a6 98 8c c7 |X.....|" -peer0.org1.example.com | "2019-05-02 01:31:01.329 UTC [cauthdsl] func2 -> DEBU 13ca 0xc0037cfa00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.330 UTC [cauthdsl] func1 -> DEBU 13cb 0xc0037cfa00 gate 1556760661328948100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:01.330 UTC [policies] Evaluate -> DEBU 13cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.330 UTC [policies] Evaluate -> DEBU 13cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.330 UTC [policies] Evaluate -> DEBU 13ce Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.330 UTC [policies] Evaluate -> DEBU 13cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.331 UTC [gossip.comm] func1 -> DEBU 13d0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760657982069600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.332 UTC [msp] DeserializeIdentity -> DEBU 13d1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.332 UTC [gossip.gossip] handleMessage -> DEBU 13d2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.333 UTC [gossip.gossip] handleMessage -> DEBU 13d3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760657982069600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.333 UTC [msp] DeserializeIdentity -> DEBU 13d4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.334 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:01.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d6 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d7 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.335 UTC [policies] Evaluate -> DEBU 13d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.335 UTC [policies] Evaluate -> DEBU 13d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:01.335 UTC [policies] Evaluate -> DEBU 13da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.338 UTC [cauthdsl] func1 -> DEBU 13db 0xc0037f3410 gate 1556760661337985700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:01.338 UTC [cauthdsl] func2 -> DEBU 13dc 0xc0037f3410 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.338 UTC [cauthdsl] func2 -> DEBU 13dd 0xc0037f3410 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:01.338 UTC [cauthdsl] func2 -> DEBU 13de 0xc0037f3410 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.338 UTC [msp.identity] Verify -> DEBU 13df Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -peer0.org1.example.com | 00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -peer0.org1.example.com | "2019-05-02 01:31:01.339 UTC [msp.identity] Verify -> DEBU 13e0 Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -peer0.org1.example.com | 00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -peer0.org1.example.com | 00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -peer0.org1.example.com | 00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -peer0.org1.example.com | 00000040 58 07 a6 98 8c c7 |X.....|" -peer0.org1.example.com | "2019-05-02 01:31:01.340 UTC [cauthdsl] func2 -> DEBU 13e1 0xc0037f3410 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.340 UTC [cauthdsl] func1 -> DEBU 13e2 0xc0037f3410 gate 1556760661337985700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:01.340 UTC [policies] Evaluate -> DEBU 13e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.340 UTC [policies] Evaluate -> DEBU 13e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.340 UTC [policies] Evaluate -> DEBU 13e5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.340 UTC [policies] Evaluate -> DEBU 13e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.341 UTC [msp] DeserializeIdentity -> DEBU 13e7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.342 UTC [gossip.gossip] handleMessage -> DEBU 13e8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.428 UTC [gossip.gossip] handleMessage -> DEBU 13e9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.428 UTC [gossip.pull] HandleMessage -> DEBU 13ea GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk @@ -15815,545 +15181,243 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:35.086 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15ac Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.086 UTC [msp] Validate -> DEBU 15ad MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:31:35.087 UTC [msp] getCertificationChain -> DEBU 15ae MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:35.087 UTC [msp] hasOURole -> DEBU 15af MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-05-02 01:31:35.087 UTC [msp] getCertificationChain -> DEBU 15b0 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:35.087 UTC [msp] Setup -> DEBU 15b1 Setting up the MSP manager (4 msps)" -orderer0.example.com | "2019-05-02 01:31:35.088 UTC [msp] Setup -> DEBU 15b2 MSP manager setup complete, setup 4 msps" -orderer0.example.com | "2019-05-02 01:31:35.088 UTC [policies] NewManagerImpl -> DEBU 15b3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:35.088 UTC [policies] NewManagerImpl -> DEBU 15b4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:35.088 UTC [policies] NewManagerImpl -> DEBU 15b5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:35.089 UTC [policies] NewManagerImpl -> DEBU 15b6 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:31:35.089 UTC [policies] NewManagerImpl -> DEBU 15b7 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:31:35.090 UTC [policies] NewManagerImpl -> DEBU 15b8 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:31:35.090 UTC [policies] NewManagerImpl -> DEBU 15b9 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-05-02 01:31:35.090 UTC [policies] NewManagerImpl -> DEBU 15ba Proposed new policy Readers for Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.090 UTC [policies] NewManagerImpl -> DEBU 15bb Proposed new policy Writers for Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.091 UTC [policies] NewManagerImpl -> DEBU 15bc Proposed new policy Admins for Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.091 UTC [policies] NewManagerImpl -> DEBU 15bd Proposed new policy Endorsement for Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.091 UTC [policies] NewManagerImpl -> DEBU 15be Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.091 UTC [policies] NewManagerImpl -> DEBU 15bf Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.092 UTC [policies] NewManagerImpl -> DEBU 15c0 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.092 UTC [policies] NewManagerImpl -> DEBU 15c1 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.092 UTC [policies] NewManagerImpl -> DEBU 15c2 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.092 UTC [policies] NewManagerImpl -> DEBU 15c3 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.092 UTC [policies] NewManagerImpl -> DEBU 15c4 Proposed new policy Readers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:01.430 UTC [gossip.pull] SendDigest -> DEBU 13eb Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:01.430 UTC [gossip.gossip] handleMessage -> DEBU 13ec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.435 UTC [gossip.gossip] handleMessage -> DEBU 13ed Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.435 UTC [gossip.gossip] handleMessage -> DEBU 13ee Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.435 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13ef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.435 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13f0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:01.436 UTC [msp.identity] Verify -> DEBU 13f1 Verify: digest = 00000000 60 c3 5c ba c3 da 37 33 42 1a 58 5d fa 58 58 87 |`.\...73B.X].XX.| -peer0.org1.example.com | 00000010 41 70 57 93 6e 37 1f f7 c5 e8 b7 de 3e 20 5c 7a |ApW.n7......> \z|" -peer0.org1.example.com | "2019-05-02 01:31:01.436 UTC [msp.identity] Verify -> DEBU 13f2 Verify: sig = 00000000 30 45 02 21 00 eb d4 b7 27 51 e9 4e 65 ce 99 ab |0E.!....'Q.Ne...| -peer0.org1.example.com | 00000010 ba ec 46 fb 8d cf 8c 6e a0 1d a4 c3 c2 5b 44 b6 |..F....n.....[D.| -peer0.org1.example.com | 00000020 6e 7d 9a 29 b4 02 20 19 51 69 59 18 1d a9 ab f4 |n}.).. .QiY.....| -peer0.org1.example.com | 00000030 6c 67 96 57 7e 89 e8 15 42 62 aa 33 08 a4 46 3b |lg.W~...Bb.3..F;| -peer0.org1.example.com | 00000040 3c 8f b7 46 61 f1 96 |<..Fa..|" -peer0.org1.example.com | "2019-05-02 01:31:01.438 UTC [msp.identity] Verify -> DEBU 13f3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:01.438 UTC [msp.identity] Verify -> DEBU 13f4 Verify: sig = 00000000 30 45 02 21 00 e9 79 54 05 c7 b5 c3 48 df 28 4a |0E.!..yT....H.(J| -peer0.org1.example.com | 00000010 3f 2b 0b ca 07 bf 5f 12 ea 9e 32 f7 03 fe af 7c |?+...._...2....|| -peer0.org1.example.com | 00000020 81 67 c2 1d 42 02 20 0c 7b af 41 fd cc 83 3f 44 |.g..B. .{.A...?D| -peer0.org1.example.com | 00000030 60 86 a2 00 00 6b 85 ba 05 cd 13 05 46 06 8c d6 |`....k......F...| -peer0.org1.example.com | 00000040 4f 80 c5 49 fd b7 c2 |O..I...|" -peer0.org1.example.com | "2019-05-02 01:31:01.439 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:01.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f7 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 " -peer0.org1.example.com | "2019-05-02 01:31:01.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 " -peer0.org1.example.com | "2019-05-02 01:31:01.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:01.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 13fa Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.440 UTC [gossip.discovery] handleAliveMessage -> DEBU 13fb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.441 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13fc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.441 UTC [gossip.discovery] sendMemResponse -> DEBU 13fd Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:01.442 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.442 UTC [msp] DeserializeIdentity -> DEBU 13ff Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.443 UTC [gossip.comm] Send -> DEBU 1400 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.443 UTC [gossip.discovery] sendMemResponse -> DEBU 1401 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:01.443 UTC [gossip.comm] sendToEndpoint -> DEBU 1402 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.443 UTC [gossip.comm] sendToEndpoint -> DEBU 1403 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.510 UTC [gossip.comm] func1 -> DEBU 1404 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.510 UTC [gossip.gossip] handleMessage -> DEBU 1405 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.510 UTC [gossip.pull] HandleMessage -> DEBU 1406 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.511 UTC [msp] DeserializeIdentity -> DEBU 1407 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.511 UTC [msp] DeserializeIdentity -> DEBU 1408 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.511 UTC [msp] DeserializeIdentity -> DEBU 1409 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.512 UTC [msp] DeserializeIdentity -> DEBU 140a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.512 UTC [msp] DeserializeIdentity -> DEBU 140b Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15c5 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15c6 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15c7 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15c8 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15c9 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15ca Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15cb Proposed new policy Admins for Channel" -orderer0.example.com | "2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15cc Proposed new policy Readers for Channel" -orderer0.example.com | "2019-05-02 01:31:35.094 UTC [policies] NewManagerImpl -> DEBU 15cd Proposed new policy Writers for Channel" -orderer0.example.com | "2019-05-02 01:31:35.094 UTC [common.configtx] addToMap -> DEBU 15ce Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-05-02 01:31:35.094 UTC [common.configtx] addToMap -> DEBU 15cf Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-05-02 01:31:35.094 UTC [common.configtx] addToMap -> DEBU 15d0 Adding to config map: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.094 UTC [common.configtx] addToMap -> DEBU 15d1 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-05-02 01:31:35.094 UTC [common.configtx] addToMap -> DEBU 15d2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d4 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d6 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d7 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15da Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15db Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15dc Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15dd Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15de Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15df Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15e0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-05-02 01:31:35.097 UTC [common.configtx] addToMap -> DEBU 15e1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.098 UTC [common.configtx] addToMap -> DEBU 15e2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-05-02 01:31:35.098 UTC [common.configtx] addToMap -> DEBU 15e3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-05-02 01:31:35.098 UTC [common.configtx] addToMap -> DEBU 15e4 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-05-02 01:31:35.098 UTC [common.configtx] addToMap -> DEBU 15e5 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-05-02 01:31:35.098 UTC [common.configtx] addToMap -> DEBU 15e6 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-05-02 01:31:35.099 UTC [common.configtx] addToMap -> DEBU 15e7 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-05-02 01:31:35.099 UTC [common.configtx] addToMap -> DEBU 15e8 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-05-02 01:31:35.099 UTC [common.configtx] addToMap -> DEBU 15e9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-05-02 01:31:35.100 UTC [common.configtx] addToMap -> DEBU 15ea Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:35.100 UTC [common.configtx] addToMap -> DEBU 15eb Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-05-02 01:31:35.100 UTC [common.configtx] addToMap -> DEBU 15ec Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:35.100 UTC [common.configtx] addToMap -> DEBU 15ed Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-05-02 01:31:35.100 UTC [common.configtx] addToMap -> DEBU 15ee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:35.101 UTC [common.configtx] addToMap -> DEBU 15ef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-05-02 01:31:35.101 UTC [common.configtx] addToMap -> DEBU 15f0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-05-02 01:31:35.101 UTC [common.configtx] addToMap -> DEBU 15f1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-05-02 01:31:35.101 UTC [common.configtx] addToMap -> DEBU 15f2 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-05-02 01:31:35.101 UTC [common.configtx] addToMap -> DEBU 15f3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-05-02 01:31:35.102 UTC [common.configtx] addToMap -> DEBU 15f4 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-05-02 01:31:35.102 UTC [common.configtx] addToMap -> DEBU 15f5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-05-02 01:31:35.102 UTC [common.configtx] addToMap -> DEBU 15f6 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-05-02 01:31:35.103 UTC [common.configtx] addToMap -> DEBU 15f7 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-05-02 01:31:35.103 UTC [common.configtx] addToMap -> DEBU 15f8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-05-02 01:31:35.103 UTC [common.configtx] addToMap -> DEBU 15f9 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:35.103 UTC [common.configtx] addToMap -> DEBU 15fa Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-05-02 01:31:35.104 UTC [common.configtx] addToMap -> DEBU 15fb Adding to config map: [Value] /Channel/BlockDataHashingStructure" -peer0.org1.example.com | "2019-05-02 01:31:01.512 UTC [msp] DeserializeIdentity -> DEBU 140c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.512 UTC [gossip.pull] SendDigest -> DEBU 140d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:01.512 UTC [gossip.gossip] handleMessage -> DEBU 140e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.517 UTC [gossip.comm] func1 -> DEBU 140f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.517 UTC [gossip.gossip] handleMessage -> DEBU 1410 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.517 UTC [gossip.gossip] handleMessage -> DEBU 1411 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.517 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1412 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.518 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1413 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:01.518 UTC [msp] DeserializeIdentity -> DEBU 1414 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.519 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1415 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:01.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1416 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1417 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.519 UTC [policies] Evaluate -> DEBU 1418 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.520 UTC [policies] Evaluate -> DEBU 1419 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:01.520 UTC [policies] Evaluate -> DEBU 141a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.522 UTC [cauthdsl] func1 -> DEBU 141b 0xc00383f490 gate 1556760661521037000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:01.522 UTC [cauthdsl] func2 -> DEBU 141c 0xc00383f490 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.522 UTC [cauthdsl] func2 -> DEBU 141d 0xc00383f490 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:01.523 UTC [cauthdsl] func2 -> DEBU 141e 0xc00383f490 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.523 UTC [msp.identity] Verify -> DEBU 141f Verify: digest = 00000000 1c 18 a8 eb ae 1c e1 1f f1 ff a2 67 7a d4 cf 47 |...........gz..G| -peer0.org1.example.com | 00000010 6e cd c0 10 f6 06 57 d2 72 ee 73 11 96 88 58 d8 |n.....W.r.s...X.|" -peer0.org1.example.com | "2019-05-02 01:31:01.524 UTC [msp.identity] Verify -> DEBU 1420 Verify: sig = 00000000 30 45 02 21 00 d3 58 da 0c c6 a3 fe af e2 0b 34 |0E.!..X........4| -peer0.org1.example.com | 00000010 4d fd c7 5b 6d 41 65 c9 06 24 17 49 76 cc c9 13 |M..[mAe..$.Iv...| -peer0.org1.example.com | 00000020 b3 0d 7a ab 68 02 20 48 73 5c c5 92 3a 1b 60 ea |..z.h. Hs\..:.`.| -peer0.org1.example.com | 00000030 94 36 48 8d 92 fc db 7a 82 73 20 1d 71 d1 73 59 |.6H....z.s .q.sY| -peer0.org1.example.com | 00000040 52 8c 3d 22 c6 34 07 |R.=".4.|" -peer0.org1.example.com | "2019-05-02 01:31:01.524 UTC [cauthdsl] func2 -> DEBU 1421 0xc00383f490 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.524 UTC [cauthdsl] func1 -> DEBU 1422 0xc00383f490 gate 1556760661521037000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:01.524 UTC [policies] Evaluate -> DEBU 1423 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.525 UTC [policies] Evaluate -> DEBU 1424 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.525 UTC [policies] Evaluate -> DEBU 1425 Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:35.104 UTC [common.configtx] addToMap -> DEBU 15fc Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-05-02 01:31:35.104 UTC [common.configtx] addToMap -> DEBU 15fd Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-05-02 01:31:35.105 UTC [common.configtx] addToMap -> DEBU 15fe Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-05-02 01:31:35.105 UTC [common.configtx] addToMap -> DEBU 15ff Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:35.105 UTC [common.configtx] addToMap -> DEBU 1600 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-05-02 01:31:35.105 UTC [common.configtx] addToMap -> DEBU 1601 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-05-02 01:31:35.105 UTC [common.channelconfig] LogSanityChecks -> DEBU 1602 As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-05-02 01:31:35.105 UTC [common.channelconfig] LogSanityChecks -> DEBU 1603 As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-05-02 01:31:35.105 UTC [policies] Manager -> DEBU 1604 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-05-02 01:31:35.105 UTC [policies] Manager -> DEBU 1605 Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1606 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1607 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1608 Manager Channel/Application has managers Org3MSP" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1609 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 160a Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [common.channelconfig] LogSanityChecks -> DEBU 160b As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [common.channelconfig] LogSanityChecks -> DEBU 160c As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [common.channelconfig] LogSanityChecks -> DEBU 160d As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 160e Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 160f Manager Channel has managers Orderer" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1610 Manager Channel has managers Application" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1611 Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1612 Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [common.channelconfig] LogSanityChecks -> DEBU 1613 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-05-02 01:31:35.106 UTC [common.capabilities] Supported -> DEBU 1614 Orderer capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:31:35.107 UTC [common.capabilities] Supported -> DEBU 1615 Channel capability V2_0 is supported and is enabled" -orderer0.example.com | "2019-05-02 01:31:35.107 UTC [orderer.common.server] func1 -> DEBU 1616 Executing callback to update root CAs" -orderer0.example.com | "2019-05-02 01:31:35.107 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1617 updating root CAs for channel [businesschannel]" -orderer0.example.com | "2019-05-02 01:31:35.107 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1618 adding orderer root CAs for MSP [OrdererMSP]" -orderer0.example.com | "2019-05-02 01:31:35.107 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1619 adding app root CAs for MSP [Org3MSP]" -orderer0.example.com | "2019-05-02 01:31:35.107 UTC [orderer.common.server] updateTrustedRoots -> DEBU 161a adding app root CAs for MSP [Org1MSP]" -orderer0.example.com | "2019-05-02 01:31:35.107 UTC [orderer.common.server] updateTrustedRoots -> DEBU 161b adding app root CAs for MSP [Org2MSP]" -orderer0.example.com | "2019-05-02 01:31:35.108 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 161c [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 9" -orderer0.example.com | "2019-05-02 01:31:35.109 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 161d [channel: businesschannel] About to write block, setting its LAST_CONFIG to 9" -orderer0.example.com | "2019-05-02 01:31:35.109 UTC [msp.identity] Sign -> DEBU 161e Sign: plaintext: 0A020809120B0A090A03010203100418...EF1CD0CD8A5A7DB4F31A36B52ABE38C7 " -orderer0.example.com | "2019-05-02 01:31:35.109 UTC [msp.identity] Sign -> DEBU 161f Sign: digest: 6F0AB425F597FDC657AB29B4870EAF3578EA57ED11030A5D5560D5F792DC1755 " -orderer0.example.com | "2019-05-02 01:31:35.115 UTC [fsblkstorage] indexBlock -> DEBU 1620 Indexing block [blockNum=9, blockHash=[]byte{0x9a, 0x83, 0x39, 0x88, 0xb6, 0x7a, 0x70, 0x8, 0xe7, 0x16, 0x79, 0x57, 0x8, 0x1e, 0x62, 0x7b, 0xd4, 0x43, 0x19, 0x39, 0xb0, 0x8, 0xfe, 0x2, 0x20, 0xae, 0x67, 0xae, 0xf2, 0x52, 0x17, 0x2b} txOffsets= -orderer0.example.com | txId= locPointer=offset=71, bytesLength=33992 -orderer0.example.com | ]" -orderer0.example.com | "2019-05-02 01:31:35.119 UTC [fsblkstorage] updateCheckpoint -> DEBU 1621 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133666], isChainEmpty=[false], lastBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:35.120 UTC [fsblkstorage] waitForBlock -> DEBU 1622 Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:35.120 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1623 Remaining bytes=[35000], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:35.121 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1624 Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -orderer0.example.com | "2019-05-02 01:31:35.121 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1625 blockbytes [34997] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:35.121 UTC [policies] Evaluate -> DEBU 1626 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.525 UTC [policies] Evaluate -> DEBU 1426 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.525 UTC [gossip.discovery] handleAliveMessage -> DEBU 1427 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.526 UTC [gossip.discovery] learnExistingMembers -> DEBU 1428 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:01.526 UTC [gossip.discovery] learnExistingMembers -> DEBU 1429 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 " -peer0.org1.example.com | "2019-05-02 01:31:01.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 142a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 " -peer0.org1.example.com | "2019-05-02 01:31:01.528 UTC [gossip.discovery] learnExistingMembers -> DEBU 142b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:01.528 UTC [gossip.discovery] learnExistingMembers -> DEBU 142c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.528 UTC [gossip.discovery] handleAliveMessage -> DEBU 142d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.528 UTC [gossip.discovery] sendMemResponse -> DEBU 142e Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:01.529 UTC [msp] DeserializeIdentity -> DEBU 1430 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 142f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.529 UTC [msp] DeserializeIdentity -> DEBU 1431 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.530 UTC [msp] DeserializeIdentity -> DEBU 1432 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.530 UTC [gossip.comm] Send -> DEBU 1433 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.530 UTC [gossip.discovery] sendMemResponse -> DEBU 1434 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:01.530 UTC [gossip.comm] sendToEndpoint -> DEBU 1435 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.531 UTC [gossip.comm] sendToEndpoint -> DEBU 1436 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.577 UTC [gossip.comm] func1 -> DEBU 1437 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.578 UTC [gossip.gossip] handleMessage -> DEBU 1438 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.578 UTC [msp] DeserializeIdentity -> DEBU 1439 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.579 UTC [msp] DeserializeIdentity -> DEBU 143a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.579 UTC [msp] DeserializeIdentity -> DEBU 143b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.582 UTC [gossip.gossip] handleMessage -> DEBU 143c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.583 UTC [gossip.comm] func1 -> DEBU 143d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760658022254500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.584 UTC [gossip.gossip] handleMessage -> DEBU 143e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760658022254500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.585 UTC [msp] DeserializeIdentity -> DEBU 143f Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:35.122 UTC [policies] Evaluate -> DEBU 1627 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:35.122 UTC [policies] Evaluate -> DEBU 1628 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:35.122 UTC [policies] Evaluate -> DEBU 1629 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:35.123 UTC [policies] Evaluate -> DEBU 162a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:35.123 UTC [msp] DeserializeIdentity -> DEBU 162b Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:35.123 UTC [msp.identity] newIdentity -> DEBU 162c Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +orderer0.example.com | "2019-05-02 09:28:04.120 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 156e Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.120 UTC [msp] Validate -> DEBU 156f MSP Org2MSP validating identity" +orderer0.example.com | "2019-05-02 09:28:04.120 UTC [msp] getCertificationChain -> DEBU 1570 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:04.121 UTC [msp] hasOURole -> DEBU 1571 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:28:04.121 UTC [msp] getCertificationChain -> DEBU 1572 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:04.126 UTC [common.channelconfig] NewStandardValues -> DEBU 1573 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:28:04.126 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1574 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:28:04.126 UTC [common.channelconfig] NewStandardValues -> DEBU 1575 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:28:04.126 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1576 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:28:04.127 UTC [common.channelconfig] Validate -> DEBU 1577 Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-05-02 09:28:04.127 UTC [common.channelconfig] validateMSP -> DEBU 1578 Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-05-02 09:28:04.129 UTC [msp] newBccspMsp -> DEBU 1579 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:28:04.129 UTC [msp] New -> DEBU 157a Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:28:04.130 UTC [msp] Setup -> DEBU 157b Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-05-02 09:28:04.135 UTC [msp.identity] newIdentity -> DEBU 157c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:35.124 UTC [cauthdsl] func1 -> DEBU 162d 0xc0011c2730 gate 1556760695124116600 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:35.124 UTC [cauthdsl] func2 -> DEBU 162e 0xc0011c2730 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:35.124 UTC [cauthdsl] func2 -> DEBU 162f 0xc0011c2730 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:35.124 UTC [cauthdsl] func2 -> DEBU 1630 0xc0011c2730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -orderer0.example.com | "2019-05-02 01:31:35.124 UTC [cauthdsl] func2 -> DEBU 1631 0xc0011c2730 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:35.126 UTC [cauthdsl] func1 -> DEBU 1632 0xc0011c2730 gate 1556760695124116600 evaluation fails" -orderer0.example.com | "2019-05-02 01:31:35.126 UTC [policies] Evaluate -> DEBU 1633 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:35.127 UTC [policies] Evaluate -> DEBU 1634 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:35.127 UTC [policies] func1 -> DEBU 1635 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -orderer0.example.com | "2019-05-02 01:31:35.127 UTC [policies] Evaluate -> DEBU 1636 Signature set did not satisfy policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:35.127 UTC [policies] Evaluate -> DEBU 1637 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:35.128 UTC [policies] Evaluate -> DEBU 1638 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-05-02 01:31:35.128 UTC [policies] Evaluate -> DEBU 1639 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:35.128 UTC [policies] Evaluate -> DEBU 163a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-05-02 01:31:35.129 UTC [cauthdsl] func1 -> DEBU 163b 0xc0011c3d60 gate 1556760695129026500 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:35.129 UTC [cauthdsl] func2 -> DEBU 163c 0xc0011c3d60 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:35.129 UTC [cauthdsl] func2 -> DEBU 163d 0xc0011c3d60 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:35.129 UTC [cauthdsl] func2 -> DEBU 163e 0xc0011c3d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -orderer0.example.com | "2019-05-02 01:31:35.130 UTC [cauthdsl] func2 -> DEBU 163f 0xc0011c3d60 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:35.131 UTC [cauthdsl] func2 -> DEBU 1640 0xc0011c3d60 signed by 1 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:35.131 UTC [cauthdsl] func2 -> DEBU 1641 0xc0011c3d60 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:35.131 UTC [cauthdsl] func2 -> DEBU 1642 0xc0011c3d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -orderer0.example.com | "2019-05-02 01:31:35.131 UTC [cauthdsl] func2 -> DEBU 1643 0xc0011c3d60 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:35.131 UTC [cauthdsl] func2 -> DEBU 1644 0xc0011c3d60 signed by 2 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:35.132 UTC [cauthdsl] func2 -> DEBU 1645 0xc0011c3d60 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:35.132 UTC [cauthdsl] func2 -> DEBU 1646 0xc0011c3d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -orderer0.example.com | "2019-05-02 01:31:35.132 UTC [cauthdsl] func2 -> DEBU 1647 0xc0011c3d60 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:35.132 UTC [cauthdsl] func1 -> DEBU 1648 0xc0011c3d60 gate 1556760695129026500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:01.586 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1440 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:01.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1441 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1442 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.587 UTC [policies] Evaluate -> DEBU 1443 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.587 UTC [policies] Evaluate -> DEBU 1444 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:01.587 UTC [policies] Evaluate -> DEBU 1445 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.588 UTC [cauthdsl] func1 -> DEBU 1446 0xc003851e30 gate 1556760661588182100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:01.588 UTC [cauthdsl] func2 -> DEBU 1447 0xc003851e30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.589 UTC [cauthdsl] func2 -> DEBU 1448 0xc003851e30 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:01.590 UTC [cauthdsl] func2 -> DEBU 1449 0xc003851e30 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.590 UTC [msp.identity] Verify -> DEBU 144a Verify: digest = 00000000 9d e9 47 45 58 55 ba 08 a7 c1 57 d6 e2 0b 98 a9 |..GEXU....W.....| -peer0.org1.example.com | 00000010 70 2e 25 cd 61 06 ef 5c 24 6d 52 07 20 12 c0 72 |p.%.a..\$mR. ..r|" -peer0.org1.example.com | "2019-05-02 01:31:01.591 UTC [msp.identity] Verify -> DEBU 144b Verify: sig = 00000000 30 44 02 20 21 fa 63 73 4d 87 7b 3d 61 8c bb 6c |0D. !.csM.{=a..l| -peer0.org1.example.com | 00000010 4a f2 88 4d 2f d6 9f e4 01 31 93 ed c5 62 ee 74 |J..M/....1...b.t| -peer0.org1.example.com | 00000020 e2 e6 3f f9 02 20 7a 8b de 81 f5 fc 73 7c b1 01 |..?.. z.....s|..| -peer0.org1.example.com | 00000030 27 44 48 aa a2 df 3a e3 d8 45 54 3d 5e a5 25 33 |'DH...:..ET=^.%3| -peer0.org1.example.com | 00000040 a7 5c 29 e1 73 d4 |.\).s.|" -peer0.org1.example.com | "2019-05-02 01:31:01.592 UTC [cauthdsl] func2 -> DEBU 144c 0xc003851e30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.592 UTC [cauthdsl] func1 -> DEBU 144d 0xc003851e30 gate 1556760661588182100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:01.592 UTC [policies] Evaluate -> DEBU 144e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.593 UTC [policies] Evaluate -> DEBU 144f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.593 UTC [policies] Evaluate -> DEBU 1450 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.593 UTC [policies] Evaluate -> DEBU 1451 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.594 UTC [msp] DeserializeIdentity -> DEBU 1452 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.594 UTC [gossip.gossip] handleMessage -> DEBU 1453 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.636 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1454 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.636 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1455 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.637 UTC [policies] Evaluate -> DEBU 1456 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-05-02 01:31:01.637 UTC [policies] Evaluate -> DEBU 1457 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:01.637 UTC [policies] Evaluate -> DEBU 1458 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.638 UTC [cauthdsl] func1 -> DEBU 1459 0xc003869020 gate 1556760661638237900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:01.638 UTC [cauthdsl] func2 -> DEBU 145a 0xc003869020 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.638 UTC [cauthdsl] func2 -> DEBU 145b 0xc003869020 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:01.639 UTC [cauthdsl] func2 -> DEBU 145c 0xc003869020 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.640 UTC [msp.identity] Verify -> DEBU 145d Verify: digest = 00000000 9d 0a 1d 67 af e5 af 3f af 84 18 aa 79 56 b8 0a |...g...?....yV..| -peer0.org1.example.com | 00000010 0f d9 c3 ad e6 de ea 14 c6 7b 01 38 66 86 92 19 |.........{.8f...|" -peer0.org1.example.com | "2019-05-02 01:31:01.640 UTC [msp.identity] Verify -> DEBU 145e Verify: sig = 00000000 30 44 02 20 5d 44 9d 02 39 0f 84 05 b5 e3 cc 42 |0D. ]D..9......B| -peer0.org1.example.com | 00000010 0a c2 72 33 05 5e da 71 32 2b 76 bd 1d e7 27 68 |..r3.^.q2+v...'h| -peer0.org1.example.com | 00000020 48 09 a9 0b 02 20 45 88 c4 8e da 24 e9 78 c6 94 |H.... E....$.x..| -peer0.org1.example.com | 00000030 20 a7 86 99 63 88 2f f2 70 75 65 a8 b7 0f 2d 8d | ...c./.pue...-.| -peer0.org1.example.com | 00000040 1c 2d 30 11 33 2d |.-0.3-|" -peer0.org1.example.com | "2019-05-02 01:31:01.640 UTC [cauthdsl] func2 -> DEBU 145f 0xc003869020 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.640 UTC [cauthdsl] func1 -> DEBU 1460 0xc003869020 gate 1556760661638237900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:01.641 UTC [policies] Evaluate -> DEBU 1461 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:01.641 UTC [policies] Evaluate -> DEBU 1462 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:01.641 UTC [policies] Evaluate -> DEBU 1463 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:01.642 UTC [policies] Evaluate -> DEBU 1464 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:01.644 UTC [blocksProvider] DeliverBlocks -> DEBU 1465 [businesschannel] Adding payload to local buffer, blockNum = [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.645 UTC [gossip.state] addPayload -> DEBU 1466 [businesschannel] Adding payload to local buffer, blockNum = [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.645 UTC [gossip.state] deliverPayloads -> DEBU 1467 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.646 UTC [gossip.state] deliverPayloads -> DEBU 1468 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-05-02 01:31:01.647 UTC [gossip.privdata] StoreBlock -> INFO 1469 [businesschannel] Received block [4] from buffer" -peer0.org1.example.com | "2019-05-02 01:31:01.648 UTC [gossip.privdata] StoreBlock -> DEBU 146a [businesschannel] Validating block [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.648 UTC [committer.txvalidator] Validate -> DEBU 146b [businesschannel] START Block Validation for block [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.648 UTC [committer.txvalidator] Validate -> DEBU 146c expecting 1 block validation responses" -peer0.org1.example.com | "2019-05-02 01:31:01.649 UTC [committer.txvalidator] validateTx -> DEBU 146d [businesschannel] validateTx starts for block 0xc0037d8440 env 0xc0037c9630 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:01.649 UTC [protoutils] ValidateTransaction -> DEBU 146e ValidateTransactionEnvelope starts for envelope 0xc0037c9630" -orderer0.example.com | "2019-05-02 01:31:35.132 UTC [policies] Evaluate -> DEBU 1649 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.132 UTC [policies] Evaluate -> DEBU 164a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.133 UTC [policies] Evaluate -> DEBU 164b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-05-02 01:31:35.133 UTC [cauthdsl] func1 -> DEBU 164c 0xc000ddad00 gate 1556760695133372200 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:35.133 UTC [cauthdsl] func2 -> DEBU 164d 0xc000ddad00 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:35.133 UTC [cauthdsl] func2 -> DEBU 164e 0xc000ddad00 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:35.134 UTC [cauthdsl] func2 -> DEBU 164f 0xc000ddad00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -orderer0.example.com | "2019-05-02 01:31:35.134 UTC [cauthdsl] func2 -> DEBU 1650 0xc000ddad00 principal evaluation fails" -orderer0.example.com | "2019-05-02 01:31:35.135 UTC [cauthdsl] func1 -> DEBU 1651 0xc000ddad00 gate 1556760695133372200 evaluation fails" -orderer0.example.com | "2019-05-02 01:31:35.135 UTC [policies] Evaluate -> DEBU 1652 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.135 UTC [policies] Evaluate -> DEBU 1653 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.135 UTC [policies] Evaluate -> DEBU 1654 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-05-02 01:31:35.135 UTC [cauthdsl] func1 -> DEBU 1655 0xc000ddb560 gate 1556760695135844400 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:35.144 UTC [cauthdsl] func2 -> DEBU 1656 0xc000ddb560 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.650 UTC [protoutils] ValidateTransaction -> DEBU 146f Header is channel_header:"\010\003\032\014\010\323\220\251\346\005\020\374\243\257\222\002\"\017businesschannel*@cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\323.\347\323\033\010\242&\027>\365\213w\331\356\013\334^\334\017Zc\241\004" " -peer0.org1.example.com | "2019-05-02 01:31:01.651 UTC [protoutils] validateChannelHeader -> DEBU 1470 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:01.651 UTC [protoutils] checkSignatureFromCreator -> DEBU 1471 begin" -peer0.org1.example.com | "2019-05-02 01:31:01.651 UTC [msp] GetManagerForChain -> DEBU 1472 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:01.652 UTC [msp] DeserializeIdentity -> DEBU 1473 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.653 UTC [msp.identity] newIdentity -> DEBU 1474 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:01.654 UTC [protoutils] checkSignatureFromCreator -> DEBU 1475 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -peer0.org1.example.com | "2019-05-02 01:31:01.655 UTC [msp] Validate -> DEBU 1476 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:01.656 UTC [msp] getCertificationChain -> DEBU 1477 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:01.660 UTC [protoutils] checkSignatureFromCreator -> DEBU 1478 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:01.661 UTC [msp.identity] Verify -> DEBU 1479 Verify: digest = 00000000 18 89 da 7d ee 2f fa 9d b7 31 99 e7 69 5c 72 c4 |...}./...1..i\r.| -peer0.org1.example.com | 00000010 32 53 fe b4 21 0f b5 62 f1 8f 2f de 95 92 26 b2 |2S..!..b../...&.|" -peer0.org1.example.com | "2019-05-02 01:31:01.661 UTC [msp.identity] Verify -> DEBU 147a Verify: sig = 00000000 30 45 02 21 00 f7 20 96 b5 eb 51 76 b8 c6 3d b1 |0E.!.. ...Qv..=.| -peer0.org1.example.com | 00000010 4b 39 4a 1d 0b 7d 98 44 2c 4e 65 87 2a 1c e4 48 |K9J..}.D,Ne.*..H| -peer0.org1.example.com | 00000020 c4 14 e8 db 07 02 20 4e 2c ea b1 fc 8f f9 f3 13 |...... N,.......| -peer0.org1.example.com | 00000030 4a 95 7e 34 07 e1 af 27 36 33 64 f0 c5 79 a9 02 |J.~4...'63d..y..| -peer0.org1.example.com | 00000040 e4 c9 83 73 4f bc 7d |...sO.}|" -peer0.org1.example.com | "2019-05-02 01:31:01.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 147b exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:01.645 UTC [gossip.state] addPayload -> DEBU 147c Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-05-02 01:31:01.665 UTC [blocksProvider] DeliverBlocks -> DEBU 147d [businesschannel] Gossiping block [4], peers number [3]" -peer0.org1.example.com | "2019-05-02 01:31:01.665 UTC [gossip.channel] AddToMsgStore -> DEBU 147e Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 4}, Envelope: 4752 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-05-02 01:31:01.665 UTC [gossip.pull] Add -> DEBU 147f Added 4, total items: 4" -peer0.org1.example.com | "2019-05-02 01:31:01.669 UTC [protoutils] validateEndorserTransaction -> DEBU 1480 validateEndorserTransaction starts for data 0xc0037eb500, header channel_header:"\010\003\032\014\010\323\220\251\346\005\020\374\243\257\222\002\"\017businesschannel*@cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\323.\347\323\033\010\242&\027>\365\213w\331\356\013\334^\334\017Zc\241\004" " -peer0.org1.example.com | "2019-05-02 01:31:01.670 UTC [protoutils] validateEndorserTransaction -> DEBU 1481 validateEndorserTransaction info: there are 1 actions" -peer0.org1.example.com | "2019-05-02 01:31:01.671 UTC [protoutils] validateEndorserTransaction -> DEBU 1482 validateEndorserTransaction info: signature header is valid" -peer0.org1.example.com | "2019-05-02 01:31:01.671 UTC [protoutils] ValidateTransaction -> DEBU 1483 ValidateTransactionEnvelope returns err %!s()" -peer0.org1.example.com | "2019-05-02 01:31:01.671 UTC [committer.txvalidator] validateTx -> DEBU 1484 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:01.671 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1485 retrieveTransactionByID() - txId = [cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885]" -peer0.org1.example.com | "2019-05-02 01:31:01.671 UTC [committer.txvalidator] validateTx -> DEBU 1486 Validating transaction with plugins" -peer0.org1.example.com | "2019-05-02 01:31:01.672 UTC [committer.txvalidator] Dispatch -> DEBU 1487 [businesschannel] Dispatch starts for bytes 0xc003886000" -peer0.org1.example.com | "2019-05-02 01:31:01.673 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1488 constructing new query executor txid = [cbd5e1ff-1872-48d9-a166-efb7ffd3dd32]" -peer0.org1.example.com | "2019-05-02 01:31:01.673 UTC [lockbasedtxmgr] Done -> DEBU 1489 Done with transaction simulation / query execution [cbd5e1ff-1872-48d9-a166-efb7ffd3dd32]" -peer0.org1.example.com | "2019-05-02 01:31:01.673 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 148a Validating Tx cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" -peer0.org1.example.com | "2019-05-02 01:31:01.675 UTC [msp] DeserializeIdentity -> DEBU 148b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.675 UTC [msp] DeserializeIdentity -> DEBU 148c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.675 UTC [msp] DeserializeIdentity -> DEBU 148d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.676 UTC [msp] DeserializeIdentity -> DEBU 148e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.676 UTC [gossip.comm] Send -> DEBU 148f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 4}, Envelope: 4752 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.677 UTC [msp] DeserializeIdentity -> DEBU 1490 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.677 UTC [msp] DeserializeIdentity -> DEBU 1491 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.677 UTC [gossip.comm] sendToEndpoint -> DEBU 1492 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 4}, Envelope: 4752 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.678 UTC [gossip.comm] sendToEndpoint -> DEBU 1493 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.703 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1494 constructing new query executor txid = [fd82a8be-48d8-472d-aa69-724bfc9c6352]" -peer0.org1.example.com | "2019-05-02 01:31:01.704 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1495 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:31:01.704 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1496 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:31:01.704 UTC [lockbasedtxmgr] Done -> DEBU 1497 Done with transaction simulation / query execution [fd82a8be-48d8-472d-aa69-724bfc9c6352]" -peer0.org1.example.com | "2019-05-02 01:31:01.704 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1498 constructing new query executor txid = [302f7812-b869-40c9-8b20-ade78323cf95]" -peer0.org1.example.com | "2019-05-02 01:31:01.704 UTC [lockbasedtxmgr] Done -> DEBU 1499 Done with transaction simulation / query execution [302f7812-b869-40c9-8b20-ade78323cf95]" -peer0.org1.example.com | "2019-05-02 01:31:01.705 UTC [policies] Evaluate -> DEBU 149a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" -peer0.org1.example.com | "2019-05-02 01:31:01.705 UTC [cauthdsl] func1 -> DEBU 149b 0xc003891c10 gate 1556760661705241500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:01.705 UTC [cauthdsl] func2 -> DEBU 149c 0xc003891c10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.705 UTC [cauthdsl] func2 -> DEBU 149d 0xc003891c10 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:01.705 UTC [cauthdsl] func2 -> DEBU 149e 0xc003891c10 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.705 UTC [msp.identity] Verify -> DEBU 149f Verify: digest = 00000000 52 20 e2 c6 21 8c 13 44 4f 28 1e 4c f0 f8 e1 d0 |R ..!..DO(.L....| -peer0.org1.example.com | 00000010 21 e3 7d bc 6e 82 76 50 f0 c4 1f aa b7 91 d9 fb |!.}.n.vP........|" -peer0.org1.example.com | "2019-05-02 01:31:01.706 UTC [msp.identity] Verify -> DEBU 14a0 Verify: sig = 00000000 30 44 02 20 54 42 8f 9e 01 11 53 f8 8d 81 32 88 |0D. TB....S...2.| -peer0.org1.example.com | 00000010 2d 55 90 f0 34 08 e7 6d c7 49 03 0a b6 ef 73 aa |-U..4..m.I....s.| -peer0.org1.example.com | 00000020 c7 fa 53 a5 02 20 5f e4 83 76 6a 9f e5 af 5b ca |..S.. _..vj...[.| -peer0.org1.example.com | 00000030 6b 12 0f bd 50 fc d8 df ba c6 59 51 2a 83 70 3b |k...P.....YQ*.p;| -peer0.org1.example.com | 00000040 89 09 b2 a3 90 1c |......|" -peer0.org1.example.com | "2019-05-02 01:31:01.707 UTC [cauthdsl] func2 -> DEBU 14a1 0xc003891c10 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.707 UTC [cauthdsl] func1 -> DEBU 14a2 0xc003891c10 gate 1556760661705241500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:01.707 UTC [policies] Evaluate -> DEBU 14a3 Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:01.709 UTC [policies] Evaluate -> DEBU 14a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14a5 constructing new query executor txid = [39d0f9b0-6afa-48bb-987b-cf32832b70c9]" -peer0.org1.example.com | "2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14a6 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14a7 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] Done -> DEBU 14a8 Done with transaction simulation / query execution [39d0f9b0-6afa-48bb-987b-cf32832b70c9]" -peer0.org1.example.com | "2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14a9 constructing new query executor txid = [c9222e57-9c29-4c31-9aaa-774b3ba1aed0]" -peer0.org1.example.com | "2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14aa retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14ab retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:31:01.711 UTC [lockbasedtxmgr] Done -> DEBU 14ac Done with transaction simulation / query execution [c9222e57-9c29-4c31-9aaa-774b3ba1aed0]" -peer0.org1.example.com | "2019-05-02 01:31:01.711 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14ad constructing new query executor txid = [57c65454-c785-43ac-9d1a-1b0d8559ebc3]" -peer0.org1.example.com | "2019-05-02 01:31:01.711 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14ae retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:31:01.711 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14af retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:31:01.712 UTC [lockbasedtxmgr] Done -> DEBU 14b0 Done with transaction simulation / query execution [57c65454-c785-43ac-9d1a-1b0d8559ebc3]" -peer0.org1.example.com | "2019-05-02 01:31:01.713 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14b1 constructing new query executor txid = [cfa234a6-0dfd-466a-bda1-1129f3763411]" -peer0.org1.example.com | "2019-05-02 01:31:01.714 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14b2 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -orderer0.example.com | "2019-05-02 01:31:35.145 UTC [cauthdsl] func2 -> DEBU 1657 0xc000ddb560 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:35.146 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1658 Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-05-02 01:31:35.147 UTC [msp] Validate -> DEBU 1659 MSP Org2MSP validating identity" -orderer0.example.com | "2019-05-02 01:31:35.148 UTC [msp] getCertificationChain -> DEBU 165a MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-05-02 01:31:35.119 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 165b [channel: businesschannel] Wrote block [9]" -orderer0.example.com | "2019-05-02 01:31:35.154 UTC [cauthdsl] func2 -> DEBU 165c 0xc000ddb560 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:35.157 UTC [msp.identity] Verify -> DEBU 165d Verify: digest = 00000000 7c 7a ed 35 86 0f 34 87 51 98 60 f1 d9 93 38 6f ||z.5..4.Q.`...8o| -orderer0.example.com | 00000010 9f 37 a4 52 89 2b f2 79 8a c9 80 63 e2 73 5f 82 |.7.R.+.y...c.s_.|" -orderer0.example.com | "2019-05-02 01:31:35.160 UTC [msp.identity] Verify -> DEBU 165e Verify: sig = 00000000 30 44 02 20 00 b9 4b ec d5 9c bb 15 46 17 08 94 |0D. ..K.....F...| -orderer0.example.com | 00000010 16 69 a1 e9 ce 7d ed 29 d3 72 2e de 98 9a ff a5 |.i...}.).r......| -orderer0.example.com | 00000020 ce 04 5e 8d 02 20 04 31 6b d0 ef 45 61 23 82 ce |..^.. .1k..Ea#..| -orderer0.example.com | 00000030 47 e2 a7 ec 34 90 1b f7 bf 91 86 e3 73 93 bf 0f |G...4.......s...| -orderer0.example.com | 00000040 69 ad df e2 47 71 |i...Gq|" -orderer0.example.com | "2019-05-02 01:31:35.161 UTC [cauthdsl] func2 -> DEBU 165f 0xc000ddb560 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:35.162 UTC [cauthdsl] func1 -> DEBU 1660 0xc000ddb560 gate 1556760695135844400 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:35.164 UTC [policies] Evaluate -> DEBU 1661 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.164 UTC [policies] Evaluate -> DEBU 1662 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-05-02 01:31:35.166 UTC [policies] Evaluate -> DEBU 1663 Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:35.166 UTC [policies] Evaluate -> DEBU 1664 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:35.167 UTC [policies] Evaluate -> DEBU 1665 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:35.171 UTC [policies] Evaluate -> DEBU 1666 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:35.171 UTC [common.deliver] deliverBlocks -> DEBU 1667 [channel: businesschannel] Delivering block [9] for (0xc0008bfb80) for 192.168.240.5:58984" -orderer0.example.com | "2019-05-02 01:31:35.172 UTC [fsblkstorage] waitForBlock -> DEBU 1668 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:35.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1669 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" -orderer0.example.com | "2019-05-02 01:31:35.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 453.2µs " -orderer0.example.com | "2019-05-02 01:31:35.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166b Sending msg of 28 bytes to 3 on channel businesschannel took 138.4µs" -orderer0.example.com | "2019-05-02 01:31:35.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 338.8µs " -orderer0.example.com | "2019-05-02 01:31:35.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 166d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:35.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166e Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" -orderer0.example.com | "2019-05-02 01:31:35.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " -orderer0.example.com | "2019-05-02 01:31:35.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1670 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:35.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1671 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:36.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1672 Sending msg of 28 bytes to 2 on channel businesschannel took 191.6µs" -orderer0.example.com | "2019-05-02 01:31:36.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1673 Sending msg of 28 bytes to 3 on channel businesschannel took 47.5µs" -orderer0.example.com | "2019-05-02 01:31:36.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1674 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84µs " -orderer0.example.com | "2019-05-02 01:31:36.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1675 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 843.5µs " -orderer0.example.com | "2019-05-02 01:31:36.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1676 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:36.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1677 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:36.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1678 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:36.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1679 Sending msg of 28 bytes to 3 on channel testchainid took 18µs" -orderer0.example.com | "2019-05-02 01:31:36.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 437.8µs " -orderer0.example.com | "2019-05-02 01:31:36.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167b Sending msg of 28 bytes to 2 on channel businesschannel took 36.6µs" -orderer0.example.com | "2019-05-02 01:31:36.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167c Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" -orderer0.example.com | "2019-05-02 01:31:36.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.5µs " -orderer0.example.com | "2019-05-02 01:31:36.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7377ms " -orderer0.example.com | "2019-05-02 01:31:36.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -peer0.org1.example.com | "2019-05-02 01:31:01.714 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14b3 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:31:01.714 UTC [lockbasedtxmgr] Done -> DEBU 14b4 Done with transaction simulation / query execution [cfa234a6-0dfd-466a-bda1-1129f3763411]" -peer0.org1.example.com | "2019-05-02 01:31:01.714 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14b5 constructing new query executor txid = [50be9d91-fe65-4a57-974c-02f02bd2217f]" -peer0.org1.example.com | "2019-05-02 01:31:01.714 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14b6 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:31:01.717 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14b7 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:31:01.717 UTC [lockbasedtxmgr] Done -> DEBU 14b8 Done with transaction simulation / query execution [50be9d91-fe65-4a57-974c-02f02bd2217f]" -peer0.org1.example.com | "2019-05-02 01:31:01.717 UTC [vscc] Validate -> DEBU 14b9 block 4, namespace: _lifecycle, tx 0 validation results is: " -peer0.org1.example.com | "2019-05-02 01:31:01.718 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 14ba Transaction cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885 appears to be valid" -peer0.org1.example.com | "2019-05-02 01:31:01.718 UTC [committer.txvalidator] Dispatch -> DEBU 14bb [businesschannel] Dispatch completes env bytes 0xc003886000" -peer0.org1.example.com | "2019-05-02 01:31:01.719 UTC [committer.txvalidator] Validate -> DEBU 14bc got result for idx 0, code 0" -peer0.org1.example.com | "2019-05-02 01:31:01.719 UTC [committer.txvalidator] Validate -> INFO 14bd [businesschannel] Validated block [4] in 71ms" -peer0.org1.example.com | "2019-05-02 01:31:01.719 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14be constructing new query executor txid = [04947745-08c8-4d12-b471-67841a4a3b42]" -peer0.org1.example.com | "2019-05-02 01:31:01.720 UTC [lockbasedtxmgr] Done -> DEBU 14bf Done with transaction simulation / query execution [04947745-08c8-4d12-b471-67841a4a3b42]" -peer0.org1.example.com | "2019-05-02 01:31:01.720 UTC [msp] GetManagerForChain -> DEBU 14c0 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:01.722 UTC [cauthdsl] func1 -> DEBU 14c1 0xc0038a1080 gate 1556760661722038900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:01.722 UTC [cauthdsl] func2 -> DEBU 14c2 0xc0038a1080 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.722 UTC [cauthdsl] func2 -> DEBU 14c3 0xc0038a1080 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:01.722 UTC [cauthdsl] func2 -> DEBU 14c4 0xc0038a1080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:01.722 UTC [cauthdsl] func2 -> DEBU 14c5 0xc0038a1080 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:01.722 UTC [cauthdsl] func1 -> DEBU 14c6 0xc0038a1080 gate 1556760661722038900 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:01.722 UTC [gossip.privdata] isEligible -> DEBU 14c7 Skipping namespace _lifecycle collection _implicit_org_Org2MSP because we're not eligible for the private data" -peer0.org1.example.com | "2019-05-02 01:31:01.722 UTC [gossip.privdata] inspectTransaction -> DEBU 14c8 Peer is not eligible for collection, channel [businesschannel], chaincode [_lifecycle], collection name [_implicit_org_Org2MSP], txID [cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885] the policy is [&privdata.SimpleCollection{name:"_implicit_org_Org2MSP", accessPolicy:(*cauthdsl.policy)(0xc0038b1040), memberOrgs:[]string{"Org2MSP"}, conf:common.StaticCollectionConfig{Name:"_implicit_org_Org2MSP", MemberOrgsPolicy:(*common.CollectionPolicyConfig)(0xc003863e90), RequiredPeerCount:0, MaximumPeerCount:0, BlockToLive:0x0, MemberOnlyRead:false, MemberOnlyWrite:false, XXX_NoUnkeyedLiteral:struct {}{}, XXX_unrecognized:[]uint8(nil), XXX_sizecache:0}}]. Skipping." -peer0.org1.example.com | "2019-05-02 01:31:01.723 UTC [gossip.privdata] listMissingPrivateData -> DEBU 14c9 Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-05-02 01:31:01.723 UTC [gossip.privdata] StoreBlock -> DEBU 14ca [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-05-02 01:31:01.723 UTC [kvledger] CommitWithPvtData -> DEBU 14cb [businesschannel] Validating state for block [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.723 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 14cc Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:31:01.723 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 14cd lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-05-02 01:31:01.723 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 14ce Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-05-02 01:31:01.723 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 14cf ValidateAndPrepareBatch() for block number = [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.723 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 14d0 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:01.723 UTC [valimpl] preprocessProtoBlock -> DEBU 14d1 txType=ENDORSER_TRANSACTION" -peer0.org1.example.com | "2019-05-02 01:31:01.723 UTC [stateleveldb] GetState -> DEBU 14d2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:01.724 UTC [statebasedval] validateKVRead -> DEBU 14d3 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -peer0.org1.example.com | "2019-05-02 01:31:01.724 UTC [stateleveldb] GetState -> DEBU 14d4 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" -peer0.org1.example.com | "2019-05-02 01:31:01.724 UTC [stateleveldb] GetState -> DEBU 14d5 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" -peer0.org1.example.com | "2019-05-02 01:31:01.724 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 14d6 Block [4] Transaction index [0] TxId [cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885] marked as valid by state validator. ContainsPostOrderWrites [false]" -orderer0.example.com | "2019-05-02 01:31:36.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1680 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:36.507 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1682 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" -orderer0.example.com | "2019-05-02 01:31:36.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1681 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:36.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1683 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.7µs " -orderer0.example.com | "2019-05-02 01:31:37.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1684 Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" -orderer0.example.com | "2019-05-02 01:31:37.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1686 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" -orderer0.example.com | "2019-05-02 01:31:37.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1687 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.4µs " -orderer0.example.com | "2019-05-02 01:31:37.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1685 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 587.1µs " -orderer0.example.com | "2019-05-02 01:31:37.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1688 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:37.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1689 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:37.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 168a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:37.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 168b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " -orderer0.example.com | "2019-05-02 01:31:37.008 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 168c Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" -orderer0.example.com | "2019-05-02 01:31:37.104 UTC [orderer.common.server] Deliver -> DEBU 168d Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:37.104 UTC [common.deliver] Handle -> DEBU 168e Starting new deliver loop for 192.168.240.9:47540" -orderer0.example.com | "2019-05-02 01:31:37.104 UTC [common.deliver] Handle -> DEBU 168f Attempting to read seek info message from 192.168.240.9:47540" -orderer0.example.com | "2019-05-02 01:31:37.105 UTC [policies] Evaluate -> DEBU 1690 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:37.105 UTC [policies] Evaluate -> DEBU 1691 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:37.105 UTC [policies] Evaluate -> DEBU 1692 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:37.106 UTC [policies] Evaluate -> DEBU 1693 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:37.106 UTC [policies] Evaluate -> DEBU 1694 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:37.106 UTC [msp] DeserializeIdentity -> DEBU 1695 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:37.106 UTC [msp.identity] newIdentity -> DEBU 1696 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-05-02 09:28:04.136 UTC [msp.identity] newIdentity -> DEBU 157d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +peer0.org1.example.com | "2019-05-02 09:27:32.568 UTC [pvtdatastorage] Commit -> DEBU 12d1 Committing private data for block [4]" +peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtdatastorage] Commit -> DEBU 12d2 Committed private data for block [4]" +peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [kvledger] CommitWithPvtData -> DEBU 12d3 [businesschannel] Committing block [4] transactions to state database" +peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [lockbasedtxmgr] Commit -> DEBU 12d4 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [lockbasedtxmgr] Commit -> DEBU 12d5 Committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d6 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d7 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" +peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d8 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" +peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d9 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" +peer0.org1.example.com | "2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12da Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" +peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12db Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" +peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12dc Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" +peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [lockbasedtxmgr] Commit -> DEBU 12dd Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12de Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" +peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12df Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" +peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12e0 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" +peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12e1 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���R���l� DEBU 12e2 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" +peer0.org1.example.com | "2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12e3 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" +peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [lockbasedtxmgr] Commit -> DEBU 12e4 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 12e5 Preparing potential purge list working-set for expiringAtBlk [5]" +peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [lockbasedtxmgr] func1 -> DEBU 12e6 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [kvledger] CommitWithPvtData -> DEBU 12e7 [businesschannel] Committing block [4] transactions to history database" +peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [historyleveldb] Commit -> DEBU 12e8 Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" +peer0.org1.example.com | "2019-05-02 09:27:32.591 UTC [leveldbhelper] GetIterator -> DEBU 12e9 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:32.592 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 12ea No expiry entry found for expiringAtBlk [5]" +peer0.org1.example.com | "2019-05-02 09:27:32.596 UTC [historyleveldb] Commit -> DEBU 12eb Channel [businesschannel]: Updates committed to history database for blockNo [4]" +peer0.org1.example.com | "2019-05-02 09:27:32.596 UTC [kvledger] CommitWithPvtData -> INFO 12ec [businesschannel] Committed block [4] with 1 transaction(s) in 50ms (state_validation=1ms block_commit=37ms state_commit=7ms)" +peer0.org1.example.com | "2019-05-02 09:27:32.596 UTC [msp.identity] Sign -> DEBU 12ed Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020805 " +peer0.org1.example.com | "2019-05-02 09:27:32.596 UTC [msp.identity] Sign -> DEBU 12ee Sign: digest: 0820A4F8A9A920346EFDE259113FB688CD3C1B3AF119364D48D5269BDEF9ED35 " +peer0.org1.example.com | "2019-05-02 09:27:32.597 UTC [gossip.state] commitBlock -> DEBU 12ef [businesschannel] Committed block [4] with 1 transaction(s)" +peer0.org1.example.com | "2019-05-02 09:27:32.609 UTC [gossip.gossip] handleMessage -> DEBU 12f0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.609 UTC [gossip.pull] HandleMessage -> DEBU 12f1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.609 UTC [gossip.pull] SendDigest -> DEBU 12f2 Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:32.609 UTC [gossip.gossip] handleMessage -> DEBU 12f3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.609 UTC [gossip.gossip] handleMessage -> DEBU 12f4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.610 UTC [msp] DeserializeIdentity -> DEBU 12f5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.610 UTC [msp] DeserializeIdentity -> DEBU 12f6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.610 UTC [gossip.gossip] handleMessage -> DEBU 12f7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.638 UTC [gossip.gossip] handleMessage -> DEBU 12f8 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.638 UTC [msp.identity] Verify -> DEBU 12f9 Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.| +peer0.org1.example.com | 00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|" +peer0.org1.example.com | "2019-05-02 09:27:32.638 UTC [msp.identity] Verify -> DEBU 12fa Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a| +peer0.org1.example.com | 00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~| +peer0.org1.example.com | 00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...| +peer0.org1.example.com | 00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......| +peer0.org1.example.com | 00000040 32 7c 48 bd 9e 05 6c |2|H...l|" +peer0.org1.example.com | "2019-05-02 09:27:32.639 UTC [msp] DeserializeIdentity -> DEBU 12fb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.639 UTC [gossip.gossip] handleMessage -> DEBU 12fc Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.646 UTC [gossip.gossip] handleMessage -> DEBU 12fd Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.646 UTC [msp.identity] Verify -> DEBU 12fe Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.| +peer0.org1.example.com | 00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|" +peer0.org1.example.com | "2019-05-02 09:27:32.646 UTC [msp.identity] Verify -> DEBU 12ff Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a| +peer0.org1.example.com | 00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~| +peer0.org1.example.com | 00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...| +peer0.org1.example.com | 00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......| +peer0.org1.example.com | 00000040 32 7c 48 bd 9e 05 6c |2|H...l|" +peer0.org1.example.com | "2019-05-02 09:27:32.646 UTC [gossip.gossip] handleMessage -> DEBU 1300 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.647 UTC [gossip.comm] func1 -> DEBU 1301 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.647 UTC [gossip.gossip] handleMessage -> DEBU 1302 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.647 UTC [msp.identity] Verify -> DEBU 1303 Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.| +peer0.org1.example.com | 00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|" +peer0.org1.example.com | "2019-05-02 09:27:32.647 UTC [msp.identity] Verify -> DEBU 1304 Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a| +peer0.org1.example.com | 00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~| +peer0.org1.example.com | 00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...| +peer0.org1.example.com | 00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......| +peer0.org1.example.com | 00000040 32 7c 48 bd 9e 05 6c |2|H...l|" +peer0.org1.example.com | "2019-05-02 09:27:32.647 UTC [msp] DeserializeIdentity -> DEBU 1305 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.648 UTC [gossip.gossip] handleMessage -> DEBU 1306 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.787 UTC [gossip.gossip] handleMessage -> DEBU 1307 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.787 UTC [msp] DeserializeIdentity -> DEBU 1308 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.787 UTC [msp] DeserializeIdentity -> DEBU 1309 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.787 UTC [msp] DeserializeIdentity -> DEBU 130a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.787 UTC [gossip.gossip] handleMessage -> DEBU 130b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.800 UTC [gossip.gossip] handleMessage -> DEBU 130c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.801 UTC [msp] DeserializeIdentity -> DEBU 130d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.806 UTC [gossip.comm] func1 -> DEBU 130e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.806 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 130f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:32.806 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1310 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1311 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 1313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 1314 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func1 -> DEBU 1315 0xc002d61f20 gate 1556789252807208600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1316 0xc002d61f20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1317 0xc002d61f20 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1318 0xc002d61f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1319 0xc002d61f20 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func1 -> DEBU 131a 0xc002d61f20 gate 1556789252807208600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 131b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 131c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 131d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func1 -> DEBU 131e 0xc0030fe760 gate 1556789252807694400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 131f 0xc0030fe760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1320 0xc0030fe760 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1321 0xc0030fe760 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [msp.identity] Verify -> DEBU 1322 Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +peer0.org1.example.com | "2019-05-02 09:27:32.807 UTC [msp.identity] Verify -> DEBU 1323 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [cauthdsl] func2 -> DEBU 1324 0xc0030fe760 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [cauthdsl] func1 -> DEBU 1325 0xc0030fe760 gate 1556789252807694400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1326 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1327 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1328 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1329 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [msp] DeserializeIdentity -> DEBU 132a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [msp] DeserializeIdentity -> DEBU 132b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 132c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 132d Got reader policy for channel [businesschannel] with flag [true]" +orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:28:04.136 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 157e Checking if identity satisfies role [CLIENT] for Org3MSP" +orderer0.example.com | "2019-05-02 09:28:04.136 UTC [msp] Validate -> DEBU 157f MSP Org3MSP validating identity" +orderer0.example.com | "2019-05-02 09:28:04.136 UTC [msp] getCertificationChain -> DEBU 1580 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [msp] hasOURole -> DEBU 1581 MSP Org3MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [msp] getCertificationChain -> DEBU 1582 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] NewStandardValues -> DEBU 1583 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1584 Processing field: AnchorPeers" +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] NewStandardValues -> DEBU 1585 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1586 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] Validate -> DEBU 1587 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [common.channelconfig] validateMSP -> DEBU 1588 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [msp] newBccspMsp -> DEBU 1589 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [msp] New -> DEBU 158a Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:28:04.137 UTC [msp] Setup -> DEBU 158b Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.138 UTC [msp.identity] newIdentity -> DEBU 158c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:28:04.138 UTC [msp.identity] newIdentity -> DEBU 158d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:28:04.139 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 158e Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.139 UTC [msp] Validate -> DEBU 158f MSP Org1MSP validating identity" +orderer0.example.com | "2019-05-02 09:28:04.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1590 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:04.185 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1591 Sending msg of 28 bytes to 3 on channel testchainid took 29.4µs" +orderer0.example.com | "2019-05-02 09:28:04.185 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1592 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.1µs " +orderer0.example.com | "2019-05-02 09:28:04.139 UTC [msp] getCertificationChain -> DEBU 1593 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:04.200 UTC [msp] hasOURole -> DEBU 1594 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-05-02 09:28:04.200 UTC [msp] getCertificationChain -> DEBU 1595 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-05-02 09:28:04.200 UTC [common.channelconfig] NewStandardValues -> DEBU 1596 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1597 Processing field: ConsensusType" +orderer0.example.com | "2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1598 Processing field: BatchSize" +orderer0.example.com | "2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1599 Processing field: BatchTimeout" +orderer0.example.com | "2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159a Processing field: KafkaBrokers" +orderer0.example.com | "2019-05-02 09:28:04.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159b Processing field: ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:28:04.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159c Processing field: Capabilities" +orderer0.example.com | "2019-05-02 09:28:04.208 UTC [common.channelconfig] NewStandardValues -> DEBU 159d Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-05-02 09:28:04.208 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159e Processing field: Endpoints" +orderer0.example.com | "2019-05-02 09:28:04.208 UTC [common.channelconfig] NewStandardValues -> DEBU 159f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-05-02 09:28:04.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a0 Processing field: MSP" +orderer0.example.com | "2019-05-02 09:28:04.209 UTC [common.channelconfig] validateMSP -> DEBU 15a1 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:04.209 UTC [msp] newBccspMsp -> DEBU 15a2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-05-02 09:28:04.209 UTC [msp] New -> DEBU 15a3 Creating Cache-MSP instance" +orderer0.example.com | "2019-05-02 09:28:04.212 UTC [msp] Setup -> DEBU 15a4 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-05-02 09:28:04.216 UTC [msp.identity] newIdentity -> DEBU 15a5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:28:04.219 UTC [msp.identity] newIdentity -> DEBU 15a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -16366,16204 +15430,15881 @@ Attaching to peer0.org1.example.com, peer1.org1.example.com, peer1.org2.example. orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-05-02 01:31:37.107 UTC [cauthdsl] func1 -> DEBU 1697 0xc000bd6aa0 gate 1556760697107065500 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:37.107 UTC [cauthdsl] func2 -> DEBU 1698 0xc000bd6aa0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:37.107 UTC [cauthdsl] func2 -> DEBU 1699 0xc000bd6aa0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:37.107 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 169a Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-05-02 01:31:37.107 UTC [msp] Validate -> DEBU 169b MSP OrdererMSP validating identity" -orderer0.example.com | "2019-05-02 01:31:37.107 UTC [cauthdsl] func2 -> DEBU 169c 0xc000bd6aa0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:37.107 UTC [msp.identity] Verify -> DEBU 169d Verify: digest = 00000000 32 e1 f7 43 ce fb e0 d5 96 00 4c 9b f4 8a 3d 21 |2..C......L...=!| -orderer0.example.com | 00000010 c2 c7 e5 92 ef 87 6c 76 66 3e b9 36 e0 49 f3 08 |......lvf>.6.I..|" -orderer0.example.com | "2019-05-02 01:31:37.108 UTC [msp.identity] Verify -> DEBU 169e Verify: sig = 00000000 30 44 02 20 7b c1 62 92 92 33 72 dd 7b d0 60 e9 |0D. {.b..3r.{.`.| -orderer0.example.com | 00000010 9a c7 86 a9 a8 e2 44 ad 5b 79 25 63 a9 08 8d 79 |......D.[y%c...y| -orderer0.example.com | 00000020 d8 b9 4a 72 02 20 07 e8 9c 08 c0 db c4 a0 b0 15 |..Jr. ..........| -orderer0.example.com | 00000030 6a d6 0c de 18 c4 79 d2 a3 1e fe a9 4d 5b 0e f6 |j.....y.....M[..| -orderer0.example.com | 00000040 e2 bd 4f ed 7a d3 |..O.z.|" -orderer0.example.com | "2019-05-02 01:31:37.108 UTC [cauthdsl] func2 -> DEBU 169f 0xc000bd6aa0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:37.108 UTC [cauthdsl] func1 -> DEBU 16a0 0xc000bd6aa0 gate 1556760697107065500 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:37.108 UTC [policies] Evaluate -> DEBU 16a1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:37.108 UTC [policies] Evaluate -> DEBU 16a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:37.109 UTC [policies] Evaluate -> DEBU 16a3 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:37.109 UTC [policies] Evaluate -> DEBU 16a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:37.109 UTC [policies] Evaluate -> DEBU 16a5 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:37.109 UTC [policies] Evaluate -> DEBU 16a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:37.109 UTC [common.deliver] deliverBlocks -> DEBU 16a7 [channel: businesschannel] Received seekInfo (0xc00110a480) start: > stop: > from 192.168.240.9:47540" -orderer0.example.com | "2019-05-02 01:31:37.109 UTC [fsblkstorage] Next -> DEBU 16a8 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -peer0.org1.example.com | "2019-05-02 01:31:01.724 UTC [valinternal] ApplyWriteSet -> DEBU 14d7 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc00382ef00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc00382efc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc00382ee80), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc00382eec0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4 DEBU 14d8 validating rwset..." -peer0.org1.example.com | "2019-05-02 01:31:01.724 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 14d9 postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:01.724 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 14da ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-05-02 01:31:01.724 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 14db Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0002ef220 0x27475e0 0xc000010ca8}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0025c18c0 map[]})]}" -peer0.org1.example.com | "2019-05-02 01:31:01.724 UTC [cceventmgmt] HandleStateUpdates -> DEBU 14dc Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" -peer0.org1.example.com | "2019-05-02 01:31:01.724 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 14dd Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" -peer0.org1.example.com | "2019-05-02 01:31:01.725 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 14de Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0})}" -peer0.org1.example.com | "2019-05-02 01:31:01.726 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 14df Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 216 129 76 241 69 60 8 51 200 236 230 104 227 112 199 189 219 19 97 23 185 229 62 48 241 59 155 78 13 25 116 13 2 32 116 67 68 156 136 155 15 173 83 249 60 180 13 82 76 31 222 21 132 92 100 178 210 6 255 132 174 31 211 118 30 104]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0025ee400 0xc00255d110 0xc0025a5580})]}" -peer0.org1.example.com | "2019-05-02 01:31:01.726 UTC [confighistory] HandleStateUpdates -> ERRO 14e0 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0038ef320)}" -peer0.org1.example.com | "2019-05-02 01:31:01.726 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 14e1 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000e7c0})}" -peer0.org1.example.com | "2019-05-02 01:31:01.731 UTC [kvledger] CommitWithPvtData -> DEBU 14e2 [businesschannel] Committing block [4] to storage" -peer0.org1.example.com | "2019-05-02 01:31:01.731 UTC [ledgerstorage] CommitWithPvtData -> DEBU 14e3 Writing block [4] to pvt block store" -peer0.org1.example.com | "2019-05-02 01:31:01.732 UTC [gossip.comm] func1 -> DEBU 14e4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.732 UTC [gossip.gossip] handleMessage -> DEBU 14e5 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.733 UTC [gossip.pull] HandleMessage -> DEBU 14e6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14e7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14e8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14e9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.732 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14ea constructing new query executor txid = [dd5f5c78-0829-4d4e-9499-33205f748246]" -peer0.org1.example.com | "2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14eb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.733 UTC [lockbasedtxmgr] Done -> DEBU 14ec Done with transaction simulation / query execution [dd5f5c78-0829-4d4e-9499-33205f748246]" -peer0.org1.example.com | "2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14ed Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14ee Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.734 UTC [gossip.pull] SendDigest -> DEBU 14ef Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:01.734 UTC [gossip.gossip] handleMessage -> DEBU 14f0 Exiting" -orderer0.example.com | "2019-05-02 01:31:37.109 UTC [fsblkstorage] newBlockfileStream -> DEBU 16a9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -orderer0.example.com | "2019-05-02 01:31:37.110 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16aa Remaining bytes=[35000], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:37.110 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16ab Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -orderer0.example.com | "2019-05-02 01:31:37.110 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16ac blockbytes [34997] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:37.110 UTC [common.deliver] deliverBlocks -> DEBU 16ad [channel: businesschannel] Delivering block [9] for (0xc00110a480) for 192.168.240.9:47540" -orderer0.example.com | "2019-05-02 01:31:37.110 UTC [common.deliver] deliverBlocks -> DEBU 16ae [channel: businesschannel] Done delivering to 192.168.240.9:47540 for (0xc00110a480)" -orderer0.example.com | "2019-05-02 01:31:37.111 UTC [fsblkstorage] waitForBlock -> DEBU 16af Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:37.111 UTC [fsblkstorage] waitForBlock -> DEBU 16b0 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:37.112 UTC [common.deliver] Handle -> DEBU 16b1 Waiting for new SeekInfo from 192.168.240.9:47540" -orderer0.example.com | "2019-05-02 01:31:37.112 UTC [common.deliver] Handle -> DEBU 16b2 Attempting to read seek info message from 192.168.240.9:47540" -orderer0.example.com | "2019-05-02 01:31:37.119 UTC [common.deliver] Handle -> WARN 16b3 Error reading from 192.168.240.9:47540: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:37.119 UTC [orderer.common.server] func1 -> DEBU 16b4 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:37.119 UTC [comm.grpc.server] 1 -> INFO 16b5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47540 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.1042ms -orderer0.example.com | "2019-05-02 01:31:37.119 UTC [grpc] infof -> DEBU 16b6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:37.232 UTC [orderer.common.server] Deliver -> DEBU 16b7 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:37.232 UTC [common.deliver] Handle -> DEBU 16b8 Starting new deliver loop for 192.168.240.9:47542" -orderer0.example.com | "2019-05-02 01:31:37.232 UTC [common.deliver] Handle -> DEBU 16b9 Attempting to read seek info message from 192.168.240.9:47542" -orderer0.example.com | "2019-05-02 01:31:37.232 UTC [policies] Evaluate -> DEBU 16ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:37.233 UTC [policies] Evaluate -> DEBU 16bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:37.233 UTC [policies] Evaluate -> DEBU 16bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:37.233 UTC [policies] Evaluate -> DEBU 16bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:37.233 UTC [policies] Evaluate -> DEBU 16be == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:37.233 UTC [cauthdsl] func1 -> DEBU 16bf 0xc000c509d0 gate 1556760697233654300 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:37.233 UTC [cauthdsl] func2 -> DEBU 16c0 0xc000c509d0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:37.234 UTC [cauthdsl] func2 -> DEBU 16c1 0xc000c509d0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:37.234 UTC [cauthdsl] func2 -> DEBU 16c2 0xc000c509d0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:37.234 UTC [msp.identity] Verify -> DEBU 16c3 Verify: digest = 00000000 b9 62 5d f9 e6 d6 c2 b6 b7 f0 3a d8 0c 0f 17 58 |.b].......:....X| -orderer0.example.com | 00000010 f3 33 35 35 75 b0 c1 53 98 b4 56 a4 95 b3 2a d7 |.355u..S..V...*.|" -orderer0.example.com | "2019-05-02 01:31:37.234 UTC [msp.identity] Verify -> DEBU 16c4 Verify: sig = 00000000 30 44 02 20 32 2c 14 4b 7f e9 fa c4 aa ec c5 f6 |0D. 2,.K........| -orderer0.example.com | 00000010 4a 21 47 9c cb 3a cb 55 53 35 51 ef 7a 79 93 ec |J!G..:.US5Q.zy..| -orderer0.example.com | 00000020 4e 1c 5b ca 02 20 56 d7 22 25 e5 0d 5f d9 ca 86 |N.[.. V."%.._...| -orderer0.example.com | 00000030 49 56 e9 ba 27 b8 d5 b0 c9 cb ca b7 91 e7 2c f1 |IV..'.........,.| -orderer0.example.com | 00000040 3b fa 9c 17 71 da |;...q.|" -orderer0.example.com | "2019-05-02 01:31:37.234 UTC [cauthdsl] func2 -> DEBU 16c5 0xc000c509d0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:37.235 UTC [cauthdsl] func1 -> DEBU 16c6 0xc000c509d0 gate 1556760697233654300 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16c7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16c9 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16cb Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:37.235 UTC [common.deliver] deliverBlocks -> DEBU 16cd [channel: businesschannel] Received seekInfo (0xc00110acc0) start: > stop: > from 192.168.240.9:47542" -orderer0.example.com | "2019-05-02 01:31:37.235 UTC [fsblkstorage] Next -> DEBU 16ce Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:37.236 UTC [fsblkstorage] newBlockfileStream -> DEBU 16cf newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -orderer0.example.com | "2019-05-02 01:31:37.236 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16d0 Remaining bytes=[35000], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:37.236 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16d1 Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -orderer0.example.com | "2019-05-02 01:31:37.236 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16d2 blockbytes [34997] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:37.236 UTC [common.deliver] deliverBlocks -> DEBU 16d3 [channel: businesschannel] Delivering block [9] for (0xc00110acc0) for 192.168.240.9:47542" -orderer0.example.com | "2019-05-02 01:31:37.237 UTC [common.deliver] deliverBlocks -> DEBU 16d4 [channel: businesschannel] Done delivering to 192.168.240.9:47542 for (0xc00110acc0)" -orderer0.example.com | "2019-05-02 01:31:37.237 UTC [fsblkstorage] waitForBlock -> DEBU 16d5 Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:37.237 UTC [fsblkstorage] waitForBlock -> DEBU 16d6 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:37.237 UTC [common.deliver] Handle -> DEBU 16d7 Waiting for new SeekInfo from 192.168.240.9:47542" -orderer0.example.com | "2019-05-02 01:31:37.238 UTC [common.deliver] Handle -> DEBU 16d8 Attempting to read seek info message from 192.168.240.9:47542" -peer0.org1.example.com | "2019-05-02 01:31:01.743 UTC [committer.txvalidator] validateTx -> DEBU 14f1 [businesschannel] validateTx completes for block 0xc0037d8440 env 0xc0037c9630 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:01.743 UTC [pvtdatastorage] Prepare -> DEBU 14f2 Saved 0 private data write sets for block [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.751 UTC [fsblkstorage] indexBlock -> DEBU 14f3 Indexing block [blockNum=4, blockHash=[]byte{0xf8, 0xa9, 0x4a, 0x62, 0xdc, 0x56, 0x89, 0xf, 0xb2, 0x6c, 0xee, 0x66, 0x95, 0x3d, 0x66, 0xa0, 0xae, 0x6d, 0x16, 0xd3, 0x60, 0x8f, 0x39, 0x0, 0x9b, 0xa7, 0xeb, 0x99, 0xf4, 0xfb, 0x35, 0xcf} txOffsets= -peer0.org1.example.com | txId=cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885 locPointer=offset=70, bytesLength=3704 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-05-02 01:31:01.751 UTC [fsblkstorage] indexBlock -> DEBU 14f4 Adding txLoc [fileSuffixNum=0, offset=76156, bytesLength=3704] for tx ID: [cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885] to txid-index" -peer0.org1.example.com | "2019-05-02 01:31:01.751 UTC [fsblkstorage] indexBlock -> DEBU 14f5 Adding txLoc [fileSuffixNum=0, offset=76156, bytesLength=3704] for tx number:[0] ID: [cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885] to blockNumTranNum index" -peer0.org1.example.com | "2019-05-02 01:31:01.756 UTC [fsblkstorage] updateCheckpoint -> DEBU 14f6 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80797], isChainEmpty=[false], lastBlockNumber=[4]" -peer0.org1.example.com | "2019-05-02 01:31:01.756 UTC [pvtdatastorage] Commit -> DEBU 14f7 Committing private data for block [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [pvtdatastorage] Commit -> DEBU 14f8 Committed private data for block [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [kvledger] CommitWithPvtData -> DEBU 14f9 [businesschannel] Committing block [4] transactions to state database" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [lockbasedtxmgr] Commit -> DEBU 14fa lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [lockbasedtxmgr] Commit -> DEBU 14fb Committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 14fc Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 14fd Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 14fe Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 14ff Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1500 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1501 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1502 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [lockbasedtxmgr] Commit -> DEBU 1503 Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [stateleveldb] ApplyUpdates -> DEBU 1504 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" -peer0.org1.example.com | "2019-05-02 01:31:01.759 UTC [stateleveldb] ApplyUpdates -> DEBU 1505 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" -peer0.org1.example.com | "2019-05-02 01:31:01.760 UTC [stateleveldb] ApplyUpdates -> DEBU 1506 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" -peer0.org1.example.com | "2019-05-02 01:31:01.760 UTC [stateleveldb] ApplyUpdates -> DEBU 1507 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���R���l� DEBU 1508 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" -peer0.org1.example.com | "2019-05-02 01:31:01.760 UTC [stateleveldb] ApplyUpdates -> DEBU 1509 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" -peer0.org1.example.com | "2019-05-02 01:31:01.763 UTC [lockbasedtxmgr] Commit -> DEBU 150a Updates committed to state database and the write lock is released" -orderer0.example.com | "2019-05-02 01:31:37.244 UTC [common.deliver] Handle -> WARN 16d9 Error reading from 192.168.240.9:47542: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:37.245 UTC [orderer.common.server] func1 -> DEBU 16da Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:37.245 UTC [comm.grpc.server] 1 -> INFO 16db streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47542 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.2598ms -orderer0.example.com | "2019-05-02 01:31:37.245 UTC [grpc] infof -> DEBU 16dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:37.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16dd Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" -orderer0.example.com | "2019-05-02 01:31:37.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16de Sending msg of 28 bytes to 3 on channel businesschannel took 26µs" -orderer0.example.com | "2019-05-02 01:31:37.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.4µs " -orderer0.example.com | "2019-05-02 01:31:37.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.7µs " -orderer0.example.com | "2019-05-02 01:31:37.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:37.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:37.508 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e3 Sending msg of 28 bytes to 3 on channel testchainid took 2.6211ms" -orderer0.example.com | "2019-05-02 01:31:37.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " -orderer0.example.com | "2019-05-02 01:31:37.509 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e5 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:37.839 UTC [orderer.common.server] Deliver -> DEBU 16e6 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:37.840 UTC [common.deliver] Handle -> DEBU 16e7 Starting new deliver loop for 192.168.240.9:47544" -orderer0.example.com | "2019-05-02 01:31:37.840 UTC [common.deliver] Handle -> DEBU 16e8 Attempting to read seek info message from 192.168.240.9:47544" -orderer0.example.com | "2019-05-02 01:31:37.841 UTC [policies] Evaluate -> DEBU 16e9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:37.841 UTC [policies] Evaluate -> DEBU 16ea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:37.841 UTC [policies] Evaluate -> DEBU 16eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:37.842 UTC [policies] Evaluate -> DEBU 16ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:37.842 UTC [policies] Evaluate -> DEBU 16ed == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:37.842 UTC [cauthdsl] func1 -> DEBU 16ee 0xc000d13380 gate 1556760697842618500 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:37.842 UTC [cauthdsl] func2 -> DEBU 16ef 0xc000d13380 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:37.843 UTC [cauthdsl] func2 -> DEBU 16f0 0xc000d13380 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:37.843 UTC [cauthdsl] func2 -> DEBU 16f1 0xc000d13380 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:37.843 UTC [msp.identity] Verify -> DEBU 16f2 Verify: digest = 00000000 3c f5 6e 5e 45 30 dd fa fa d2 8e e7 ee 05 19 0a |<.n^E0..........| -orderer0.example.com | 00000010 ce e1 e5 18 6a af 25 26 9b 62 a2 bc 54 88 e3 a2 |....j.%&.b..T...|" -orderer0.example.com | "2019-05-02 01:31:37.843 UTC [msp.identity] Verify -> DEBU 16f3 Verify: sig = 00000000 30 45 02 21 00 ba e0 0c 22 83 c8 a4 af 84 32 e3 |0E.!....".....2.| -orderer0.example.com | 00000010 da d7 a6 4c a8 98 4a 26 14 9f 04 c0 63 90 cb 01 |...L..J&....c...| -orderer0.example.com | 00000020 f4 fd 36 6a 99 02 20 41 e4 2c 38 3c f8 ee 73 76 |..6j.. A.,8<..sv| -orderer0.example.com | 00000030 db b1 99 81 29 e4 04 01 8c fa 74 a0 e9 fa b8 2a |....).....t....*| -orderer0.example.com | 00000040 ec be 75 0b af b4 58 |..u...X|" -orderer0.example.com | "2019-05-02 01:31:37.844 UTC [cauthdsl] func2 -> DEBU 16f4 0xc000d13380 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:37.844 UTC [cauthdsl] func1 -> DEBU 16f5 0xc000d13380 gate 1556760697842618500 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:37.844 UTC [policies] Evaluate -> DEBU 16f6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:37.845 UTC [policies] Evaluate -> DEBU 16f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:37.845 UTC [policies] Evaluate -> DEBU 16f8 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:37.845 UTC [policies] Evaluate -> DEBU 16f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:37.845 UTC [policies] Evaluate -> DEBU 16fa Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:37.845 UTC [policies] Evaluate -> DEBU 16fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:37.846 UTC [common.deliver] deliverBlocks -> DEBU 16fc [channel: businesschannel] Received seekInfo (0xc00110b4c0) start: > stop: > from 192.168.240.9:47544" -orderer0.example.com | "2019-05-02 01:31:37.846 UTC [fsblkstorage] Next -> DEBU 16fd Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:37.846 UTC [fsblkstorage] newBlockfileStream -> DEBU 16fe newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -orderer0.example.com | "2019-05-02 01:31:37.846 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16ff Remaining bytes=[35000], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:37.846 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1700 Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -orderer0.example.com | "2019-05-02 01:31:37.847 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1701 blockbytes [34997] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:37.847 UTC [common.deliver] deliverBlocks -> DEBU 1702 [channel: businesschannel] Delivering block [9] for (0xc00110b4c0) for 192.168.240.9:47544" -orderer0.example.com | "2019-05-02 01:31:37.848 UTC [common.deliver] deliverBlocks -> DEBU 1703 [channel: businesschannel] Done delivering to 192.168.240.9:47544 for (0xc00110b4c0)" -orderer0.example.com | "2019-05-02 01:31:37.848 UTC [common.deliver] Handle -> DEBU 1704 Waiting for new SeekInfo from 192.168.240.9:47544" -orderer0.example.com | "2019-05-02 01:31:37.849 UTC [common.deliver] Handle -> DEBU 1706 Attempting to read seek info message from 192.168.240.9:47544" -orderer0.example.com | "2019-05-02 01:31:37.849 UTC [fsblkstorage] waitForBlock -> DEBU 1705 Came out of wait. maxAvailaBlockNumber=[9]" -peer0.org1.example.com | "2019-05-02 01:31:01.763 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 150b Preparing potential purge list working-set for expiringAtBlk [5]" -peer0.org1.example.com | "2019-05-02 01:31:01.763 UTC [lockbasedtxmgr] func1 -> DEBU 150c launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-05-02 01:31:01.764 UTC [kvledger] CommitWithPvtData -> DEBU 150d [businesschannel] Committing block [4] transactions to history database" -peer0.org1.example.com | "2019-05-02 01:31:01.764 UTC [historyleveldb] Commit -> DEBU 150e Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" -peer0.org1.example.com | "2019-05-02 01:31:01.764 UTC [leveldbhelper] GetIterator -> DEBU 150f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:31:01.765 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1510 No expiry entry found for expiringAtBlk [5]" -peer0.org1.example.com | "2019-05-02 01:31:01.767 UTC [historyleveldb] Commit -> DEBU 1511 Channel [businesschannel]: Updates committed to history database for blockNo [4]" -peer0.org1.example.com | "2019-05-02 01:31:01.767 UTC [kvledger] CommitWithPvtData -> INFO 1512 [businesschannel] Committed block [4] with 1 transaction(s) in 43ms (state_validation=8ms block_commit=27ms state_commit=4ms)" -peer0.org1.example.com | "2019-05-02 01:31:01.767 UTC [msp.identity] Sign -> DEBU 1513 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020805 " -peer0.org1.example.com | "2019-05-02 01:31:01.767 UTC [msp.identity] Sign -> DEBU 1514 Sign: digest: 5165A8F53D66BD4CEAE102F75E302FA655DAAC09E916BCE3886689A2A0EA8AB9 " -peer0.org1.example.com | "2019-05-02 01:31:01.768 UTC [gossip.state] commitBlock -> DEBU 1515 [businesschannel] Committed block [4] with 1 transaction(s)" -peer0.org1.example.com | "2019-05-02 01:31:01.818 UTC [gossip.pull] Hello -> DEBU 1516 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:01.819 UTC [gossip.comm] Send -> DEBU 1517 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.819 UTC [gossip.pull] Hello -> DEBU 1518 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:01.819 UTC [gossip.comm] Send -> DEBU 1519 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.819 UTC [gossip.pull] Hello -> DEBU 151a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:01.819 UTC [gossip.comm] Send -> DEBU 151b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.819 UTC [gossip.comm] sendToEndpoint -> DEBU 151c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.819 UTC [gossip.comm] sendToEndpoint -> DEBU 151d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.819 UTC [gossip.comm] sendToEndpoint -> DEBU 151e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.819 UTC [gossip.comm] sendToEndpoint -> DEBU 151f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.820 UTC [gossip.comm] sendToEndpoint -> DEBU 1520 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.820 UTC [gossip.comm] sendToEndpoint -> DEBU 1521 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.826 UTC [gossip.comm] func1 -> DEBU 1522 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14339184248847463259 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.826 UTC [gossip.gossip] handleMessage -> DEBU 1523 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14339184248847463259 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.826 UTC [gossip.pull] HandleMessage -> DEBU 1524 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14339184248847463259 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.827 UTC [gossip.gossip] handleMessage -> DEBU 1525 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.828 UTC [gossip.gossip] handleMessage -> DEBU 1526 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7420334789798993735 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.828 UTC [gossip.pull] HandleMessage -> DEBU 1527 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7420334789798993735 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.828 UTC [gossip.gossip] handleMessage -> DEBU 1528 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.828 UTC [gossip.comm] func1 -> DEBU 1529 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10075696068903467186 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-05-02 01:31:37.849 UTC [fsblkstorage] waitForBlock -> DEBU 1707 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:37.855 UTC [common.deliver] Handle -> WARN 1708 Error reading from 192.168.240.9:47544: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:37.856 UTC [orderer.common.server] func1 -> DEBU 1709 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:37.856 UTC [comm.grpc.server] 1 -> INFO 170a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47544 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.6703ms -orderer0.example.com | "2019-05-02 01:31:37.856 UTC [grpc] infof -> DEBU 170b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:37.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 170c Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" -orderer0.example.com | "2019-05-02 01:31:38.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 170d Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" -orderer0.example.com | "2019-05-02 01:31:38.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 170e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.6µs " -orderer0.example.com | "2019-05-02 01:31:38.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 170f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.6µs " -orderer0.example.com | "2019-05-02 01:31:38.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1710 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:38.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1711 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:38.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1713 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" -orderer0.example.com | "2019-05-02 01:31:38.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1712 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:38.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1714 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.9µs " -orderer0.example.com | "2019-05-02 01:31:38.067 UTC [orderer.common.server] Deliver -> DEBU 1715 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:38.067 UTC [common.deliver] Handle -> DEBU 1716 Starting new deliver loop for 192.168.240.9:47546" -orderer0.example.com | "2019-05-02 01:31:38.067 UTC [common.deliver] Handle -> DEBU 1717 Attempting to read seek info message from 192.168.240.9:47546" -orderer0.example.com | "2019-05-02 01:31:38.068 UTC [policies] Evaluate -> DEBU 1718 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.068 UTC [policies] Evaluate -> DEBU 1719 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.068 UTC [policies] Evaluate -> DEBU 171a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.068 UTC [policies] Evaluate -> DEBU 171b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.068 UTC [policies] Evaluate -> DEBU 171c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.068 UTC [cauthdsl] func1 -> DEBU 171d 0xc000fb1e60 gate 1556760698068960300 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:38.069 UTC [cauthdsl] func2 -> DEBU 171e 0xc000fb1e60 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:38.069 UTC [cauthdsl] func2 -> DEBU 171f 0xc000fb1e60 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:38.069 UTC [cauthdsl] func2 -> DEBU 1720 0xc000fb1e60 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:38.069 UTC [msp.identity] Verify -> DEBU 1721 Verify: digest = 00000000 54 91 d3 75 c2 76 e7 e1 c6 67 24 99 67 c1 a9 b7 |T..u.v...g$.g...| -orderer0.example.com | 00000010 7c 2a 91 1f 92 87 32 3c 47 90 d7 73 76 46 f3 1d ||*....2 DEBU 1722 Verify: sig = 00000000 30 45 02 21 00 d1 d9 27 9a 19 8f 65 eb d5 5f 3d |0E.!...'...e.._=| -orderer0.example.com | 00000010 93 97 0e 65 6b 6d 0c 42 af 37 b4 b1 59 6c 1b f1 |...ekm.B.7..Yl..| -orderer0.example.com | 00000020 dd dd 92 e0 5d 02 20 2c 1b 83 40 f0 16 5d 44 ec |....]. ,..@..]D.| -orderer0.example.com | 00000030 d2 24 d2 d0 b7 40 5c 75 93 17 88 02 20 a9 77 74 |.$...@\u.... .wt| -orderer0.example.com | 00000040 2c 78 ea f5 c2 2c 68 |,x...,h|" -orderer0.example.com | "2019-05-02 01:31:38.069 UTC [cauthdsl] func2 -> DEBU 1723 0xc000fb1e60 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:38.070 UTC [cauthdsl] func1 -> DEBU 1724 0xc000fb1e60 gate 1556760698068960300 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 1725 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 1726 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 1727 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 1728 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 1729 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 172a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.070 UTC [common.deliver] deliverBlocks -> DEBU 172b [channel: businesschannel] Received seekInfo (0xc00110bb80) start: > stop: > from 192.168.240.9:47546" -orderer0.example.com | "2019-05-02 01:31:38.071 UTC [fsblkstorage] Next -> DEBU 172c Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:38.071 UTC [fsblkstorage] newBlockfileStream -> DEBU 172d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -orderer0.example.com | "2019-05-02 01:31:38.071 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 172e Remaining bytes=[35000], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:38.071 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 172f Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -orderer0.example.com | "2019-05-02 01:31:38.071 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1730 blockbytes [34997] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:38.072 UTC [common.deliver] deliverBlocks -> DEBU 1731 [channel: businesschannel] Delivering block [9] for (0xc00110bb80) for 192.168.240.9:47546" -orderer0.example.com | "2019-05-02 01:31:38.073 UTC [common.deliver] deliverBlocks -> DEBU 1732 [channel: businesschannel] Done delivering to 192.168.240.9:47546 for (0xc00110bb80)" -orderer0.example.com | "2019-05-02 01:31:38.073 UTC [fsblkstorage] waitForBlock -> DEBU 1733 Came out of wait. maxAvailaBlockNumber=[9]" -peer0.org1.example.com | "2019-05-02 01:31:01.829 UTC [gossip.gossip] handleMessage -> DEBU 152a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10075696068903467186 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.829 UTC [gossip.pull] HandleMessage -> DEBU 152b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10075696068903467186 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.830 UTC [gossip.gossip] handleMessage -> DEBU 152c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.888 UTC [gossip.comm] func1 -> DEBU 152d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.888 UTC [gossip.gossip] handleMessage -> DEBU 152e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.888 UTC [gossip.gossip] handleMessage -> DEBU 152f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.888 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1530 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.888 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1531 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:01.888 UTC [msp] DeserializeIdentity -> DEBU 1532 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.889 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1533 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:01.889 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1534 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.889 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1535 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [policies] Evaluate -> DEBU 1536 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [policies] Evaluate -> DEBU 1537 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [policies] Evaluate -> DEBU 1538 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [cauthdsl] func1 -> DEBU 1539 0xc003941500 gate 1556760661890214700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [cauthdsl] func2 -> DEBU 153a 0xc003941500 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [cauthdsl] func2 -> DEBU 153b 0xc003941500 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [cauthdsl] func2 -> DEBU 153c 0xc003941500 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [msp.identity] Verify -> DEBU 153d Verify: digest = 00000000 39 ba 15 2e 21 51 1e 04 d6 10 c1 70 5f 25 e4 4d |9...!Q.....p_%.M| -peer0.org1.example.com | 00000010 ca bd c0 c8 36 db 28 69 10 90 9d 61 eb 52 f4 7b |....6.(i...a.R.{|" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [msp.identity] Verify -> DEBU 153e Verify: sig = 00000000 30 44 02 20 33 81 67 65 ee 2b 37 4c 2f 2c 0a a0 |0D. 3.ge.+7L/,..| -peer0.org1.example.com | 00000010 54 a0 3b 21 72 03 28 57 dc b8 e0 f1 e7 d4 99 cd |T.;!r.(W........| -peer0.org1.example.com | 00000020 87 0f 3f 98 02 20 77 b9 d3 d6 d0 72 26 49 3c 87 |..?.. w....r&I<.| -peer0.org1.example.com | 00000030 2d fd 99 46 18 fa 37 74 a8 22 6a 63 3f 71 78 d3 |-..F..7t."jc?qx.| -peer0.org1.example.com | 00000040 8d 3a 03 26 2e e1 |.:.&..|" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [cauthdsl] func2 -> DEBU 153f 0xc003941500 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [cauthdsl] func1 -> DEBU 1540 0xc003941500 gate 1556760661890214700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:01.890 UTC [policies] Evaluate -> DEBU 1541 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.891 UTC [policies] Evaluate -> DEBU 1542 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.891 UTC [policies] Evaluate -> DEBU 1543 Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-05-02 01:31:38.074 UTC [fsblkstorage] waitForBlock -> DEBU 1734 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:38.074 UTC [common.deliver] Handle -> DEBU 1735 Waiting for new SeekInfo from 192.168.240.9:47546" -orderer0.example.com | "2019-05-02 01:31:38.074 UTC [common.deliver] Handle -> DEBU 1736 Attempting to read seek info message from 192.168.240.9:47546" -orderer0.example.com | "2019-05-02 01:31:38.079 UTC [policies] Evaluate -> DEBU 1737 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.079 UTC [policies] Evaluate -> DEBU 1738 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.080 UTC [policies] Evaluate -> DEBU 1739 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.080 UTC [policies] Evaluate -> DEBU 173a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.080 UTC [policies] Evaluate -> DEBU 173b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.080 UTC [cauthdsl] func1 -> DEBU 173c 0xc00113b550 gate 1556760698080648200 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:38.080 UTC [cauthdsl] func2 -> DEBU 173d 0xc00113b550 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:38.081 UTC [cauthdsl] func2 -> DEBU 173e 0xc00113b550 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:38.081 UTC [cauthdsl] func2 -> DEBU 173f 0xc00113b550 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:38.081 UTC [msp.identity] Verify -> DEBU 1740 Verify: digest = 00000000 38 35 6c bb bd 10 45 fd cb d3 86 c6 2f ae bc f6 |85l...E...../...| -orderer0.example.com | 00000010 1e e5 75 46 38 fd d6 c9 8c ae 4b ed 9b 66 ac 6d |..uF8.....K..f.m|" -orderer0.example.com | "2019-05-02 01:31:38.081 UTC [msp.identity] Verify -> DEBU 1741 Verify: sig = 00000000 30 45 02 21 00 bb c3 3a 48 9a 99 05 c1 d7 ef 4a |0E.!...:H......J| -orderer0.example.com | 00000010 94 1b 5e 2c f7 0d e6 71 4a cf 26 ef 8a 40 e4 44 |..^,...qJ.&..@.D| -orderer0.example.com | 00000020 c1 6e 04 97 cb 02 20 25 38 a7 a5 f6 b3 10 18 0b |.n.... %8.......| -orderer0.example.com | 00000030 d4 5f 33 aa 8f a4 26 8c f3 58 45 96 71 f7 55 62 |._3...&..XE.q.Ub| -orderer0.example.com | 00000040 dc a4 2a 8f 33 83 23 |..*.3.#|" -orderer0.example.com | "2019-05-02 01:31:38.082 UTC [cauthdsl] func2 -> DEBU 1742 0xc00113b550 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:38.082 UTC [cauthdsl] func1 -> DEBU 1743 0xc00113b550 gate 1556760698080648200 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:38.082 UTC [policies] Evaluate -> DEBU 1744 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.082 UTC [policies] Evaluate -> DEBU 1745 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.083 UTC [policies] Evaluate -> DEBU 1746 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.083 UTC [policies] Evaluate -> DEBU 1747 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.083 UTC [policies] Evaluate -> DEBU 1748 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.083 UTC [policies] Evaluate -> DEBU 1749 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.084 UTC [common.deliver] deliverBlocks -> DEBU 174a [channel: businesschannel] Received seekInfo (0xc000bab940) start: > stop: > from 192.168.240.9:47546" -orderer0.example.com | "2019-05-02 01:31:38.084 UTC [fsblkstorage] Next -> DEBU 174b Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:38.085 UTC [fsblkstorage] newBlockfileStream -> DEBU 174c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -orderer0.example.com | "2019-05-02 01:31:38.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 174d Remaining bytes=[35000], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:38.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 174e Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -orderer0.example.com | "2019-05-02 01:31:38.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 174f blockbytes [34997] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:38.086 UTC [common.deliver] deliverBlocks -> DEBU 1750 [channel: businesschannel] Delivering block [9] for (0xc000bab940) for 192.168.240.9:47546" -orderer0.example.com | "2019-05-02 01:31:38.087 UTC [common.deliver] deliverBlocks -> DEBU 1751 [channel: businesschannel] Done delivering to 192.168.240.9:47546 for (0xc000bab940)" -orderer0.example.com | "2019-05-02 01:31:38.088 UTC [fsblkstorage] waitForBlock -> DEBU 1752 Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:38.089 UTC [fsblkstorage] waitForBlock -> DEBU 1753 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:38.090 UTC [common.deliver] Handle -> DEBU 1754 Waiting for new SeekInfo from 192.168.240.9:47546" -orderer0.example.com | "2019-05-02 01:31:38.090 UTC [common.deliver] Handle -> DEBU 1755 Attempting to read seek info message from 192.168.240.9:47546" -orderer0.example.com | "2019-05-02 01:31:38.100 UTC [common.deliver] Handle -> WARN 1756 Error reading from 192.168.240.9:47546: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:38.101 UTC [orderer.common.server] func1 -> DEBU 1757 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:38.101 UTC [comm.grpc.server] 1 -> INFO 1758 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47546 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.6198ms -orderer0.example.com | "2019-05-02 01:31:38.103 UTC [grpc] infof -> DEBU 1759 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:38.263 UTC [orderer.common.server] Deliver -> DEBU 175a Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:38.263 UTC [common.deliver] Handle -> DEBU 175b Starting new deliver loop for 192.168.240.9:47548" -orderer0.example.com | "2019-05-02 01:31:38.263 UTC [common.deliver] Handle -> DEBU 175c Attempting to read seek info message from 192.168.240.9:47548" -orderer0.example.com | "2019-05-02 01:31:38.264 UTC [policies] Evaluate -> DEBU 175d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.264 UTC [policies] Evaluate -> DEBU 175e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.264 UTC [policies] Evaluate -> DEBU 175f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.264 UTC [policies] Evaluate -> DEBU 1760 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.264 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.265 UTC [cauthdsl] func1 -> DEBU 1762 0xc000cc9660 gate 1556760698265019000 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:38.265 UTC [cauthdsl] func2 -> DEBU 1763 0xc000cc9660 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:38.265 UTC [cauthdsl] func2 -> DEBU 1764 0xc000cc9660 processing identity 0 with bytes of efef60" -peer0.org1.example.com | "2019-05-02 01:31:01.891 UTC [policies] Evaluate -> DEBU 1544 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.891 UTC [gossip.discovery] handleAliveMessage -> DEBU 1545 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.891 UTC [gossip.discovery] learnExistingMembers -> DEBU 1546 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:01.891 UTC [gossip.discovery] learnExistingMembers -> DEBU 1547 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 " -peer0.org1.example.com | "2019-05-02 01:31:01.891 UTC [gossip.discovery] learnExistingMembers -> DEBU 1548 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 " -peer0.org1.example.com | "2019-05-02 01:31:01.891 UTC [gossip.discovery] learnExistingMembers -> DEBU 1549 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [gossip.discovery] learnExistingMembers -> DEBU 154a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 154b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [gossip.discovery] handleMsgFromComm -> DEBU 154c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [gossip.discovery] sendMemResponse -> DEBU 154d Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [msp] DeserializeIdentity -> DEBU 154e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [msp] DeserializeIdentity -> DEBU 154f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [msp] DeserializeIdentity -> DEBU 1550 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [gossip.comm] Send -> DEBU 1551 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [gossip.discovery] sendMemResponse -> DEBU 1552 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [gossip.comm] sendToEndpoint -> DEBU 1553 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.892 UTC [gossip.comm] sendToEndpoint -> DEBU 1554 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.903 UTC [msp.identity] Sign -> DEBU 1555 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151016 " -peer0.org1.example.com | "2019-05-02 01:31:01.903 UTC [msp.identity] Sign -> DEBU 1556 Sign: digest: 960814249B26FBE15EB992048586816B0FDAF1AB38137819F896C8602B7B091F " -peer0.org1.example.com | "2019-05-02 01:31:01.909 UTC [msp.identity] Sign -> DEBU 1557 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:01.909 UTC [msp.identity] Sign -> DEBU 1558 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:01.909 UTC [msp] DeserializeIdentity -> DEBU 1559 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.909 UTC [gossip.comm] Send -> DEBU 155a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.909 UTC [gossip.comm] Send -> DEBU 155b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.909 UTC [msp] DeserializeIdentity -> DEBU 155c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [gossip.comm] Send -> DEBU 155d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [gossip.comm] sendToEndpoint -> DEBU 155e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [gossip.comm] sendToEndpoint -> DEBU 155f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [gossip.election] waitForInterrupt -> DEBU 1560 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [gossip.election] IsLeader -> DEBU 1561 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [msp.identity] Sign -> DEBU 1562 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510051801 " -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [msp.identity] Sign -> DEBU 1563 Sign: digest: 62CF37588B94F90E7225DE2446BB8B95744251D5243D230FE67E761B21D4F3B3 " -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [gossip.election] waitForInterrupt -> DEBU 1564 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [gossip.comm] sendToEndpoint -> DEBU 1565 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [gossip.comm] sendToEndpoint -> DEBU 1566 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.910 UTC [gossip.comm] sendToEndpoint -> DEBU 1567 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.911 UTC [gossip.comm] sendToEndpoint -> DEBU 1568 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.928 UTC [gossip.comm] func1 -> DEBU 1569 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.929 UTC [gossip.gossip] handleMessage -> DEBU 156a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.930 UTC [gossip.gossip] handleMessage -> DEBU 156b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.930 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 156d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:01.931 UTC [msp] DeserializeIdentity -> DEBU 156e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.933 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 156f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:01.935 UTC [msp] DeserializeIdentity -> DEBU 1570 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.935 UTC [msp] DeserializeIdentity -> DEBU 1571 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.936 UTC [msp] DeserializeIdentity -> DEBU 1572 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.936 UTC [msp] DeserializeIdentity -> DEBU 1573 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.941 UTC [gossip.gossip] handleMessage -> DEBU 1576 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.942 UTC [gossip.comm] Send -> DEBU 1577 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:01.943 UTC [msp] DeserializeIdentity -> DEBU 1578 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.944 UTC [msp] DeserializeIdentity -> DEBU 1579 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.945 UTC [gossip.comm] sendToEndpoint -> DEBU 157a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.945 UTC [gossip.comm] sendToEndpoint -> DEBU 157b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.933 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1574 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.945 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.946 UTC [policies] Evaluate -> DEBU 157d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.946 UTC [policies] Evaluate -> DEBU 157e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:01.946 UTC [policies] Evaluate -> DEBU 157f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.946 UTC [cauthdsl] func1 -> DEBU 1580 0xc00398e4c0 gate 1556760661946440100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:01.946 UTC [cauthdsl] func2 -> DEBU 1581 0xc00398e4c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.946 UTC [cauthdsl] func2 -> DEBU 1582 0xc00398e4c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:01.946 UTC [cauthdsl] func2 -> DEBU 1583 0xc00398e4c0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.939 UTC [gossip.comm] func1 -> DEBU 1575 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.948 UTC [msp.identity] Verify -> DEBU 1584 Verify: digest = 00000000 1c 18 a8 eb ae 1c e1 1f f1 ff a2 67 7a d4 cf 47 |...........gz..G| -peer0.org1.example.com | 00000010 6e cd c0 10 f6 06 57 d2 72 ee 73 11 96 88 58 d8 |n.....W.r.s...X.|" -peer0.org1.example.com | "2019-05-02 01:31:01.948 UTC [msp.identity] Verify -> DEBU 1585 Verify: sig = 00000000 30 45 02 21 00 d3 58 da 0c c6 a3 fe af e2 0b 34 |0E.!..X........4| -peer0.org1.example.com | 00000010 4d fd c7 5b 6d 41 65 c9 06 24 17 49 76 cc c9 13 |M..[mAe..$.Iv...| -peer0.org1.example.com | 00000020 b3 0d 7a ab 68 02 20 48 73 5c c5 92 3a 1b 60 ea |..z.h. Hs\..:.`.| -peer0.org1.example.com | 00000030 94 36 48 8d 92 fc db 7a 82 73 20 1d 71 d1 73 59 |.6H....z.s .q.sY| -peer0.org1.example.com | 00000040 52 8c 3d 22 c6 34 07 |R.=".4.|" -peer0.org1.example.com | "2019-05-02 01:31:01.949 UTC [cauthdsl] func2 -> DEBU 1586 0xc00398e4c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.950 UTC [cauthdsl] func1 -> DEBU 1587 0xc00398e4c0 gate 1556760661946440100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:01.953 UTC [policies] Evaluate -> DEBU 1588 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.953 UTC [policies] Evaluate -> DEBU 1589 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.953 UTC [policies] Evaluate -> DEBU 158a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.954 UTC [policies] Evaluate -> DEBU 158b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 158c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 158d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 158e Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:01.955 UTC [msp.identity] Verify -> DEBU 158f Verify: digest = 00000000 96 08 14 24 9b 26 fb e1 5e b9 92 04 85 86 81 6b |...$.&..^......k| -peer0.org1.example.com | 00000010 0f da f1 ab 38 13 78 19 f8 96 c8 60 2b 7b 09 1f |....8.x....`+{..|" -peer0.org1.example.com | "2019-05-02 01:31:01.955 UTC [msp.identity] Verify -> DEBU 1590 Verify: sig = 00000000 30 45 02 21 00 d6 1b 95 79 d1 4b 95 38 5a a7 99 |0E.!....y.K.8Z..| -peer0.org1.example.com | 00000010 56 9e dd 53 78 ee fa 5e 28 8d d1 89 83 13 57 87 |V..Sx..^(.....W.| -peer0.org1.example.com | 00000020 e3 53 88 0b 5d 02 20 1e 6d ee 24 98 79 d0 35 9b |.S..]. .m.$.y.5.| -peer0.org1.example.com | 00000030 74 c0 29 1d 80 2d c0 af 00 c4 b4 64 0a c3 9f 8d |t.)..-.....d....| -peer0.org1.example.com | 00000040 74 86 66 d8 ea 79 f3 |t.f..y.|" -peer0.org1.example.com | "2019-05-02 01:31:01.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 1591 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.960 UTC [gossip.discovery] isSentByMe -> DEBU 1592 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 1593 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.962 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1594 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:01.966 UTC [msp.identity] Verify -> DEBU 1595 Verify: digest = 00000000 60 c3 5c ba c3 da 37 33 42 1a 58 5d fa 58 58 87 |`.\...73B.X].XX.| -peer0.org1.example.com | 00000010 41 70 57 93 6e 37 1f f7 c5 e8 b7 de 3e 20 5c 7a |ApW.n7......> \z|" -peer0.org1.example.com | "2019-05-02 01:31:01.966 UTC [msp.identity] Verify -> DEBU 1596 Verify: sig = 00000000 30 45 02 21 00 eb d4 b7 27 51 e9 4e 65 ce 99 ab |0E.!....'Q.Ne...| -peer0.org1.example.com | 00000010 ba ec 46 fb 8d cf 8c 6e a0 1d a4 c3 c2 5b 44 b6 |..F....n.....[D.| -peer0.org1.example.com | 00000020 6e 7d 9a 29 b4 02 20 19 51 69 59 18 1d a9 ab f4 |n}.).. .QiY.....| -peer0.org1.example.com | 00000030 6c 67 96 57 7e 89 e8 15 42 62 aa 33 08 a4 46 3b |lg.W~...Bb.3..F;| -peer0.org1.example.com | 00000040 3c 8f b7 46 61 f1 96 |<..Fa..|" -peer0.org1.example.com | "2019-05-02 01:31:01.967 UTC [gossip.discovery] handleAliveMessage -> DEBU 1597 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.967 UTC [gossip.discovery] handleAliveMessage -> DEBU 1598 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.967 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1599 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.967 UTC [gossip.discovery] handleMsgFromComm -> DEBU 159a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.967 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 159b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:01.968 UTC [msp.identity] Verify -> DEBU 159c Verify: digest = 00000000 96 08 14 24 9b 26 fb e1 5e b9 92 04 85 86 81 6b |...$.&..^......k| -peer0.org1.example.com | 00000010 0f da f1 ab 38 13 78 19 f8 96 c8 60 2b 7b 09 1f |....8.x....`+{..|" -peer0.org1.example.com | "2019-05-02 01:31:01.968 UTC [msp.identity] Verify -> DEBU 159d Verify: sig = 00000000 30 45 02 21 00 d6 1b 95 79 d1 4b 95 38 5a a7 99 |0E.!....y.K.8Z..| -peer0.org1.example.com | 00000010 56 9e dd 53 78 ee fa 5e 28 8d d1 89 83 13 57 87 |V..Sx..^(.....W.| -peer0.org1.example.com | 00000020 e3 53 88 0b 5d 02 20 1e 6d ee 24 98 79 d0 35 9b |.S..]. .m.$.y.5.| -peer0.org1.example.com | 00000030 74 c0 29 1d 80 2d c0 af 00 c4 b4 64 0a c3 9f 8d |t.)..-.....d....| -peer0.org1.example.com | 00000040 74 86 66 d8 ea 79 f3 |t.f..y.|" -peer0.org1.example.com | "2019-05-02 01:31:01.968 UTC [msp.identity] Verify -> DEBU 159e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:01.968 UTC [msp.identity] Verify -> DEBU 159f Verify: sig = 00000000 30 45 02 21 00 cc 35 63 ae 3a b5 9d ea b2 73 02 |0E.!..5c.:....s.| -peer0.org1.example.com | 00000010 45 2c c0 12 f8 18 5e 58 f4 b0 33 13 60 f6 d3 af |E,....^X..3.`...| -peer0.org1.example.com | 00000020 92 b1 4c 04 12 02 20 51 7e 0a 36 87 1a 99 92 4b |..L... Q~.6....K| -peer0.org1.example.com | 00000030 54 ab 18 bb ab 26 f6 4c 18 0e 72 59 e4 77 cb b9 |T....&.L..rY.w..| -peer0.org1.example.com | 00000040 36 d6 c2 a4 3b 64 7b |6...;d{|" -peer0.org1.example.com | "2019-05-02 01:31:01.969 UTC [gossip.discovery] handleAliveMessage -> DEBU 15a0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -orderer0.example.com | "2019-05-02 01:31:38.265 UTC [cauthdsl] func2 -> DEBU 1765 0xc000cc9660 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:38.265 UTC [msp.identity] Verify -> DEBU 1766 Verify: digest = 00000000 3c fc 63 34 24 24 68 b4 2e 46 0c 6e 18 d9 0b a8 |<.c4$$h..F.n....| -orderer0.example.com | 00000010 08 07 a7 ad ed d5 eb 06 d6 65 c8 b7 45 8a 8f bd |.........e..E...|" -orderer0.example.com | "2019-05-02 01:31:38.265 UTC [msp.identity] Verify -> DEBU 1767 Verify: sig = 00000000 30 45 02 21 00 fd 4a c1 86 76 88 01 5e b7 5d 64 |0E.!..J..v..^.]d| -orderer0.example.com | 00000010 65 70 bc ba d6 5d e8 d0 d0 eb d2 55 22 bb 03 fe |ep...].....U"...| -orderer0.example.com | 00000020 00 92 c6 6f 84 02 20 7c cb d2 d8 62 9c 14 c6 55 |...o.. |...b...U| -orderer0.example.com | 00000030 33 b7 ff 25 fd 58 47 0c 5b 35 bf b5 35 49 6e 7b |3..%.XG.[5..5In{| -orderer0.example.com | 00000040 5a 49 61 23 2c 33 65 |ZIa#,3e|" -orderer0.example.com | "2019-05-02 01:31:38.266 UTC [cauthdsl] func2 -> DEBU 1768 0xc000cc9660 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:38.266 UTC [cauthdsl] func1 -> DEBU 1769 0xc000cc9660 gate 1556760698265019000 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:38.266 UTC [policies] Evaluate -> DEBU 176a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.266 UTC [policies] Evaluate -> DEBU 176b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.266 UTC [policies] Evaluate -> DEBU 176c Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.266 UTC [policies] Evaluate -> DEBU 176d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.266 UTC [policies] Evaluate -> DEBU 176e Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.267 UTC [policies] Evaluate -> DEBU 176f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.267 UTC [common.deliver] deliverBlocks -> DEBU 1770 [channel: businesschannel] Received seekInfo (0xc000babe80) start: > stop: > from 192.168.240.9:47548" -orderer0.example.com | "2019-05-02 01:31:38.267 UTC [fsblkstorage] Next -> DEBU 1771 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:38.267 UTC [fsblkstorage] newBlockfileStream -> DEBU 1772 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:31:38.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1773 Remaining bytes=[133666], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:38.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1774 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:31:38.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1775 blockbytes [23937] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:38.268 UTC [common.deliver] deliverBlocks -> DEBU 1776 [channel: businesschannel] Delivering block [0] for (0xc000babe80) for 192.168.240.9:47548" -orderer0.example.com | "2019-05-02 01:31:38.268 UTC [common.deliver] deliverBlocks -> DEBU 1777 [channel: businesschannel] Done delivering to 192.168.240.9:47548 for (0xc000babe80)" -orderer0.example.com | "2019-05-02 01:31:38.269 UTC [common.deliver] Handle -> DEBU 1778 Waiting for new SeekInfo from 192.168.240.9:47548" -orderer0.example.com | "2019-05-02 01:31:38.269 UTC [common.deliver] Handle -> DEBU 1779 Attempting to read seek info message from 192.168.240.9:47548" -orderer0.example.com | "2019-05-02 01:31:38.269 UTC [fsblkstorage] waitForBlock -> DEBU 177a Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:38.269 UTC [fsblkstorage] waitForBlock -> DEBU 177b Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:38.276 UTC [grpc] warningf -> DEBU 177c transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.2:7050->192.168.240.9:47548: read: connection reset by peer" -orderer0.example.com | "2019-05-02 01:31:38.277 UTC [common.deliver] Handle -> WARN 177d Error reading from 192.168.240.9:47548: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:38.277 UTC [orderer.common.server] func1 -> DEBU 177e Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:38.277 UTC [comm.grpc.server] 1 -> INFO 177f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47548 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.9001ms -orderer0.example.com | "2019-05-02 01:31:38.278 UTC [grpc] infof -> DEBU 1780 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:38.472 UTC [orderer.common.server] Deliver -> DEBU 1781 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:38.472 UTC [common.deliver] Handle -> DEBU 1782 Starting new deliver loop for 192.168.240.9:47550" -orderer0.example.com | "2019-05-02 01:31:38.472 UTC [common.deliver] Handle -> DEBU 1783 Attempting to read seek info message from 192.168.240.9:47550" -orderer0.example.com | "2019-05-02 01:31:38.472 UTC [policies] Evaluate -> DEBU 1784 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.473 UTC [policies] Evaluate -> DEBU 1785 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.473 UTC [policies] Evaluate -> DEBU 1786 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.473 UTC [policies] Evaluate -> DEBU 1787 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.474 UTC [policies] Evaluate -> DEBU 1788 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.474 UTC [cauthdsl] func1 -> DEBU 1789 0xc00125cbe0 gate 1556760698474309200 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:38.474 UTC [cauthdsl] func2 -> DEBU 178a 0xc00125cbe0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:38.475 UTC [cauthdsl] func2 -> DEBU 178b 0xc00125cbe0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:38.475 UTC [cauthdsl] func2 -> DEBU 178c 0xc00125cbe0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:38.481 UTC [msp.identity] Verify -> DEBU 178d Verify: digest = 00000000 6e fd b4 a2 0e 29 84 0e 1d 2b d7 86 2c 98 7e c5 |n....)...+..,.~.| -orderer0.example.com | 00000010 92 5a fa 48 2f 32 45 df cc 95 9c c7 84 6a b1 7f |.Z.H/2E......j..|" -orderer0.example.com | "2019-05-02 01:31:38.481 UTC [msp.identity] Verify -> DEBU 178e Verify: sig = 00000000 30 44 02 20 1c 2f 0d 0c 7b 9a c2 0d 82 54 dc 4e |0D. ./..{....T.N| -orderer0.example.com | 00000010 c3 5f d7 67 38 10 18 6f 3a 44 b3 03 8b 06 6b d3 |._.g8..o:D....k.| -orderer0.example.com | 00000020 a3 36 1e cf 02 20 78 aa 68 ed 3b 66 4b 87 85 0f |.6... x.h.;fK...| -orderer0.example.com | 00000030 e0 ff 3d dd 60 e2 d2 a7 c3 8a a3 16 df 7a 32 dc |..=.`........z2.| -orderer0.example.com | 00000040 ab b0 3e fd 6d 8a |..>.m.|" -orderer0.example.com | "2019-05-02 01:31:38.482 UTC [cauthdsl] func2 -> DEBU 178f 0xc00125cbe0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:38.483 UTC [cauthdsl] func1 -> DEBU 1790 0xc00125cbe0 gate 1556760698474309200 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:38.483 UTC [policies] Evaluate -> DEBU 1791 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.484 UTC [policies] Evaluate -> DEBU 1792 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.969 UTC [gossip.discovery] isSentByMe -> DEBU 15a1 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.969 UTC [gossip.discovery] handleAliveMessage -> DEBU 15a2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.969 UTC [gossip.gossip] handleMessage -> DEBU 15a4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.969 UTC [gossip.gossip] handleMessage -> DEBU 15a5 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.970 UTC [gossip.gossip] handleMessage -> DEBU 15a6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.970 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.973 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15a8 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:01.981 UTC [msp.identity] Verify -> DEBU 15a9 Verify: digest = 00000000 96 08 14 24 9b 26 fb e1 5e b9 92 04 85 86 81 6b |...$.&..^......k| -peer0.org1.example.com | 00000010 0f da f1 ab 38 13 78 19 f8 96 c8 60 2b 7b 09 1f |....8.x....`+{..|" -peer0.org1.example.com | "2019-05-02 01:31:01.981 UTC [msp.identity] Verify -> DEBU 15aa Verify: sig = 00000000 30 45 02 21 00 d6 1b 95 79 d1 4b 95 38 5a a7 99 |0E.!....y.K.8Z..| -peer0.org1.example.com | 00000010 56 9e dd 53 78 ee fa 5e 28 8d d1 89 83 13 57 87 |V..Sx..^(.....W.| -peer0.org1.example.com | 00000020 e3 53 88 0b 5d 02 20 1e 6d ee 24 98 79 d0 35 9b |.S..]. .m.$.y.5.| -peer0.org1.example.com | 00000030 74 c0 29 1d 80 2d c0 af 00 c4 b4 64 0a c3 9f 8d |t.)..-.....d....| -peer0.org1.example.com | 00000040 74 86 66 d8 ea 79 f3 |t.f..y.|" -peer0.org1.example.com | "2019-05-02 01:31:01.982 UTC [gossip.discovery] handleAliveMessage -> DEBU 15ab Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.982 UTC [gossip.discovery] isSentByMe -> DEBU 15ac Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.982 UTC [gossip.discovery] handleAliveMessage -> DEBU 15ad Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.983 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15ae Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:01.988 UTC [msp.identity] Verify -> DEBU 15af Verify: digest = 00000000 60 c3 5c ba c3 da 37 33 42 1a 58 5d fa 58 58 87 |`.\...73B.X].XX.| -peer0.org1.example.com | 00000010 41 70 57 93 6e 37 1f f7 c5 e8 b7 de 3e 20 5c 7a |ApW.n7......> \z|" -peer0.org1.example.com | "2019-05-02 01:31:01.988 UTC [msp.identity] Verify -> DEBU 15b0 Verify: sig = 00000000 30 45 02 21 00 eb d4 b7 27 51 e9 4e 65 ce 99 ab |0E.!....'Q.Ne...| -peer0.org1.example.com | 00000010 ba ec 46 fb 8d cf 8c 6e a0 1d a4 c3 c2 5b 44 b6 |..F....n.....[D.| -peer0.org1.example.com | 00000020 6e 7d 9a 29 b4 02 20 19 51 69 59 18 1d a9 ab f4 |n}.).. .QiY.....| -peer0.org1.example.com | 00000030 6c 67 96 57 7e 89 e8 15 42 62 aa 33 08 a4 46 3b |lg.W~...Bb.3..F;| -peer0.org1.example.com | 00000040 3c 8f b7 46 61 f1 96 |<..Fa..|" -peer0.org1.example.com | "2019-05-02 01:31:01.989 UTC [gossip.discovery] handleAliveMessage -> DEBU 15b1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.989 UTC [gossip.discovery] handleAliveMessage -> DEBU 15b2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.989 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15b3 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:01.989 UTC [msp] DeserializeIdentity -> DEBU 15b4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:01.989 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:01.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15b6 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15b7 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:01.990 UTC [policies] Evaluate -> DEBU 15b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.990 UTC [policies] Evaluate -> DEBU 15b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:01.990 UTC [policies] Evaluate -> DEBU 15ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:01.990 UTC [cauthdsl] func1 -> DEBU 15bb 0xc0039cc640 gate 1556760661990289600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:01.990 UTC [cauthdsl] func2 -> DEBU 15bc 0xc0039cc640 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:01.990 UTC [cauthdsl] func2 -> DEBU 15bd 0xc0039cc640 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:01.990 UTC [cauthdsl] func2 -> DEBU 15be 0xc0039cc640 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.990 UTC [msp.identity] Verify -> DEBU 15bf Verify: digest = 00000000 39 ba 15 2e 21 51 1e 04 d6 10 c1 70 5f 25 e4 4d |9...!Q.....p_%.M| -peer0.org1.example.com | 00000010 ca bd c0 c8 36 db 28 69 10 90 9d 61 eb 52 f4 7b |....6.(i...a.R.{|" -peer0.org1.example.com | "2019-05-02 01:31:01.990 UTC [msp.identity] Verify -> DEBU 15c0 Verify: sig = 00000000 30 44 02 20 33 81 67 65 ee 2b 37 4c 2f 2c 0a a0 |0D. 3.ge.+7L/,..| -peer0.org1.example.com | 00000010 54 a0 3b 21 72 03 28 57 dc b8 e0 f1 e7 d4 99 cd |T.;!r.(W........| -peer0.org1.example.com | 00000020 87 0f 3f 98 02 20 77 b9 d3 d6 d0 72 26 49 3c 87 |..?.. w....r&I<.| -peer0.org1.example.com | 00000030 2d fd 99 46 18 fa 37 74 a8 22 6a 63 3f 71 78 d3 |-..F..7t."jc?qx.| -peer0.org1.example.com | 00000040 8d 3a 03 26 2e e1 |.:.&..|" -peer0.org1.example.com | "2019-05-02 01:31:01.991 UTC [cauthdsl] func2 -> DEBU 15c1 0xc0039cc640 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:01.991 UTC [cauthdsl] func1 -> DEBU 15c2 0xc0039cc640 gate 1556760661990289600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:01.991 UTC [policies] Evaluate -> DEBU 15c3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.991 UTC [policies] Evaluate -> DEBU 15c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.991 UTC [policies] Evaluate -> DEBU 15c5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.991 UTC [policies] Evaluate -> DEBU 15c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:01.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 15c7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:01.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 15c8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:01.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15c9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:02.289 UTC [endorser] ProcessProposal -> DEBU 15ca Entering: request from 192.168.240.9:41294" -peer0.org1.example.com | "2019-05-02 01:31:02.289 UTC [protoutils] ValidateProposalMessage -> DEBU 15cb ValidateProposalMessage starts for signed proposal 0xc003a16190" -peer0.org1.example.com | "2019-05-02 01:31:02.290 UTC [protoutils] validateChannelHeader -> DEBU 15cc validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:02.290 UTC [protoutils] checkSignatureFromCreator -> DEBU 15cd begin" -peer0.org1.example.com | "2019-05-02 01:31:02.290 UTC [msp] GetManagerForChain -> DEBU 15ce Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:02.290 UTC [protoutils] checkSignatureFromCreator -> DEBU 15cf creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:02.291 UTC [protoutils] checkSignatureFromCreator -> DEBU 15d0 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:02.292 UTC [msp.identity] Verify -> DEBU 15d1 Verify: digest = 00000000 e2 39 84 21 3c 70 b1 c5 c7 66 8c 8e 17 e9 91 19 |.9.! DEBU 15d2 Verify: sig = 00000000 30 45 02 21 00 a7 5e 04 f6 a7 ed 27 d4 4d 15 db |0E.!..^....'.M..| -peer0.org1.example.com | 00000010 b0 40 8f 08 b7 7d 76 59 35 5f f3 c3 c7 75 15 e7 |.@...}vY5_...u..| -peer0.org1.example.com | 00000020 84 c5 c6 ed e6 02 20 4d ab 59 bd 16 84 35 ba a0 |...... M.Y...5..| -peer0.org1.example.com | 00000030 d5 14 c9 8e c8 bb b6 6a 06 3b af a4 c9 cf 57 7e |.......j.;....W~| -peer0.org1.example.com | 00000040 a3 77 b0 b7 56 42 9c |.w..VB.|" -peer0.org1.example.com | "2019-05-02 01:31:02.294 UTC [protoutils] checkSignatureFromCreator -> DEBU 15d3 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:02.294 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 15d4 validateChaincodeProposalMessage starts for proposal 0xc002f7fea0, header 0xc003a165a0" -peer0.org1.example.com | "2019-05-02 01:31:02.302 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 15d5 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:02.303 UTC [endorser] preProcess -> DEBU 15d6 [businesschannel][cc8bbfcf] processing txid: cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821" -peer0.org1.example.com | "2019-05-02 01:31:02.303 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 15d7 retrieveTransactionByID() - txId = [cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821]" -peer0.org1.example.com | "2019-05-02 01:31:02.305 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 15d8 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:02.305 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 15d9 constructing new tx simulator txid = [cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821]" -peer0.org1.example.com | "2019-05-02 01:31:02.306 UTC [endorser] SimulateProposal -> DEBU 15da [businesschannel][cc8bbfcf] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:02.307 UTC [endorser] callChaincode -> INFO 15db [businesschannel][cc8bbfcf] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:02.307 UTC [chaincode] Execute -> DEBU 15dc Entry" -peer0.org1.example.com | "2019-05-02 01:31:02.309 UTC [aclmgmt] CheckACL -> DEBU 15dd acl policy not found in config for resource _lifecycle/QueryApprovalStatus" -peer0.org1.example.com | "2019-05-02 01:31:02.310 UTC [policies] Evaluate -> DEBU 15de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:02.310 UTC [policies] Evaluate -> DEBU 15df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:02.311 UTC [policies] Evaluate -> DEBU 15e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:02.312 UTC [cauthdsl] func1 -> DEBU 15e1 0xc0039cd950 gate 1556760662311774700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:02.312 UTC [cauthdsl] func2 -> DEBU 15e2 0xc0039cd950 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:02.312 UTC [cauthdsl] func2 -> DEBU 15e3 0xc0039cd950 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:02.313 UTC [cauthdsl] func2 -> DEBU 15e4 0xc0039cd950 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:02.315 UTC [msp.identity] Verify -> DEBU 15e5 Verify: digest = 00000000 e2 39 84 21 3c 70 b1 c5 c7 66 8c 8e 17 e9 91 19 |.9.! DEBU 15e6 Verify: sig = 00000000 30 45 02 21 00 a7 5e 04 f6 a7 ed 27 d4 4d 15 db |0E.!..^....'.M..| -peer0.org1.example.com | 00000010 b0 40 8f 08 b7 7d 76 59 35 5f f3 c3 c7 75 15 e7 |.@...}vY5_...u..| -peer0.org1.example.com | 00000020 84 c5 c6 ed e6 02 20 4d ab 59 bd 16 84 35 ba a0 |...... M.Y...5..| -peer0.org1.example.com | 00000030 d5 14 c9 8e c8 bb b6 6a 06 3b af a4 c9 cf 57 7e |.......j.;....W~| -peer0.org1.example.com | 00000040 a3 77 b0 b7 56 42 9c |.w..VB.|" -peer0.org1.example.com | "2019-05-02 01:31:02.318 UTC [cauthdsl] func2 -> DEBU 15e7 0xc0039cd950 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:02.318 UTC [cauthdsl] func1 -> DEBU 15e8 0xc0039cd950 gate 1556760662311774700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:02.318 UTC [policies] Evaluate -> DEBU 15e9 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:02.319 UTC [policies] Evaluate -> DEBU 15ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:02.320 UTC [policies] Evaluate -> DEBU 15eb Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:02.320 UTC [policies] Evaluate -> DEBU 15ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:02.321 UTC [lifecycle] QueryApprovalStatus -> DEBU 15ed received invocation of QueryApprovalStatus on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: false), validation info: (plugin: '', policy: ''), collections: ()'" -peer0.org1.example.com | "2019-05-02 01:31:02.321 UTC [chaincode] handleMessage -> DEBU 15ee [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:02.321 UTC [chaincode] HandleTransaction -> DEBU 15ef [cc8bbfcf] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:02.322 UTC [chaincode] HandleGetState -> DEBU 15f0 [cc8bbfcf] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:02.322 UTC [stateleveldb] GetState -> DEBU 15f1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:02.322 UTC [chaincode] HandleGetState -> DEBU 15f2 [cc8bbfcf] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" -peer0.org1.example.com | "2019-05-02 01:31:02.323 UTC [chaincode] HandleTransaction -> DEBU 15f3 [cc8bbfcf] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:02.324 UTC [chaincode] handleMessage -> DEBU 15f4 [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:02.324 UTC [chaincode] HandleTransaction -> DEBU 15f5 [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:02.325 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 15f6 [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:02.325 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 15f7 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:31:02.326 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 15f8 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:31:02.326 UTC [stateleveldb] GetState -> DEBU 15f9 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" -peer0.org1.example.com | "2019-05-02 01:31:02.326 UTC [chaincode] HandleTransaction -> DEBU 15fa [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:02.327 UTC [chaincode] handleMessage -> DEBU 15fb [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:02.327 UTC [chaincode] HandleTransaction -> DEBU 15fc [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:02.328 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 15fd [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:02.328 UTC [stateleveldb] GetState -> DEBU 15fe GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" -peer0.org1.example.com | "2019-05-02 01:31:02.328 UTC [chaincode] HandleTransaction -> DEBU 15ff [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:02.329 UTC [chaincode] handleMessage -> DEBU 1600 [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:02.329 UTC [chaincode] HandleTransaction -> DEBU 1601 [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:02.329 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1602 [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:02.330 UTC [stateleveldb] GetState -> DEBU 1603 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 1604 [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:02.331 UTC [chaincode] handleMessage -> DEBU 1605 [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:02.332 UTC [chaincode] HandleTransaction -> DEBU 1606 [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:02.337 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1607 [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:02.337 UTC [stateleveldb] GetState -> DEBU 1608 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -peer0.org1.example.com | "2019-05-02 01:31:02.342 UTC [chaincode] HandleTransaction -> DEBU 1609 [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:02.343 UTC [chaincode] handleMessage -> DEBU 160a [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:02.344 UTC [chaincode] HandleTransaction -> DEBU 160b [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:02.344 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 160c [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:02.344 UTC [stateleveldb] GetState -> DEBU 160d GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -peer0.org1.example.com | "2019-05-02 01:31:02.344 UTC [chaincode] HandleTransaction -> DEBU 160e [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:02.345 UTC [chaincode] handleMessage -> DEBU 160f [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:02.345 UTC [chaincode] HandleTransaction -> DEBU 1610 [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:02.345 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1611 [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:02.346 UTC [stateleveldb] GetState -> DEBU 1612 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" -peer0.org1.example.com | "2019-05-02 01:31:02.346 UTC [chaincode] HandleTransaction -> DEBU 1613 [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:02.346 UTC [chaincode] handleMessage -> DEBU 1614 [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:02.346 UTC [chaincode] HandleTransaction -> DEBU 1615 [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:02.346 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1616 [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:02.347 UTC [stateleveldb] GetState -> DEBU 1617 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1618 [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:02.353 UTC [chaincode] handleMessage -> DEBU 1619 [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:02.353 UTC [chaincode] HandleTransaction -> DEBU 161a [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:02.353 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 161b [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:02.354 UTC [stateleveldb] GetState -> DEBU 161c GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -peer0.org1.example.com | "2019-05-02 01:31:02.354 UTC [chaincode] HandleTransaction -> DEBU 161d [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:02.355 UTC [lifecycle] QueryApprovalStatus -> INFO 161e successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:02.355 UTC [chaincode] handleMessage -> DEBU 161f [cc8bbfcf] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:02.355 UTC [chaincode] Notify -> DEBU 1620 [cc8bbfcf] notifying Txid:cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:02.355 UTC [chaincode] Execute -> DEBU 1621 Exit" -peer0.org1.example.com | "2019-05-02 01:31:02.355 UTC [endorser] callChaincode -> INFO 1622 [businesschannel][cc8bbfcf] Exit chaincode: name:"_lifecycle" (48ms)" -peer0.org1.example.com | "2019-05-02 01:31:02.355 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1623 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:02.356 UTC [lockbasedtxmgr] Done -> DEBU 1624 Done with transaction simulation / query execution [cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821]" -peer0.org1.example.com | "2019-05-02 01:31:02.356 UTC [endorser] SimulateProposal -> DEBU 1625 [businesschannel][cc8bbfcf] Exit" -peer0.org1.example.com | "2019-05-02 01:31:02.356 UTC [endorser] endorseProposal -> DEBU 1626 [businesschannel][cc8bbfcf] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:02.356 UTC [endorser] endorseProposal -> DEBU 1627 [businesschannel][cc8bbfcf] escc for chaincode name:"_lifecycle" is escc" -peer0.org1.example.com | "2019-05-02 01:31:02.356 UTC [endorser] EndorseWithPlugin -> DEBU 1628 Entering endorsement for {plugin: escc, channel: businesschannel, tx: cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821, chaincode: _lifecycle}" -peer0.org1.example.com | "2019-05-02 01:31:02.356 UTC [msp.identity] Sign -> DEBU 1629 Sign: plaintext: 0A201E70789FDC9B699AE0ADBBC071F0...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:02.357 UTC [msp.identity] Sign -> DEBU 162a Sign: digest: AE80D4311B9B672FF8744471B32AFE812740DA6EB614EADD7C24D7F1649A3B03 " -peer0.org1.example.com | "2019-05-02 01:31:02.361 UTC [endorser] EndorseWithPlugin -> DEBU 162b Exiting {plugin: escc, channel: businesschannel, tx: cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821, chaincode: _lifecycle}" -peer0.org1.example.com | "2019-05-02 01:31:02.361 UTC [endorser] endorseProposal -> DEBU 162c [businesschannel][cc8bbfcf] Exit" -peer0.org1.example.com | "2019-05-02 01:31:02.361 UTC [lockbasedtxmgr] Done -> DEBU 162d Done with transaction simulation / query execution [cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821]" -peer0.org1.example.com | "2019-05-02 01:31:02.361 UTC [endorser] func1 -> DEBU 162e Exit: request from 192.168.240.9:41294" -peer0.org1.example.com | "2019-05-02 01:31:02.362 UTC [comm.grpc.server] 1 -> INFO 162f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41294 grpc.code=OK grpc.call_duration=73.2557ms -peer0.org1.example.com | "2019-05-02 01:31:02.381 UTC [grpc] infof -> DEBU 1630 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:02.384 UTC [grpc] infof -> DEBU 1631 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:03.293 UTC [endorser] ProcessProposal -> DEBU 1632 Entering: request from 192.168.240.9:41302" -peer0.org1.example.com | "2019-05-02 01:31:03.293 UTC [protoutils] ValidateProposalMessage -> DEBU 1633 ValidateProposalMessage starts for signed proposal 0xc003a17b80" -peer0.org1.example.com | "2019-05-02 01:31:03.293 UTC [protoutils] validateChannelHeader -> DEBU 1634 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:03.293 UTC [protoutils] checkSignatureFromCreator -> DEBU 1635 begin" -peer0.org1.example.com | "2019-05-02 01:31:03.294 UTC [protoutils] checkSignatureFromCreator -> DEBU 1636 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:03.294 UTC [protoutils] checkSignatureFromCreator -> DEBU 1637 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:03.295 UTC [msp.identity] Verify -> DEBU 1638 Verify: digest = 00000000 58 14 70 7c 6d 45 74 f1 5a 1f 96 0b 7b 8e 0f 61 |X.p|mEt.Z...{..a| -peer0.org1.example.com | 00000010 f6 22 ff f8 74 f3 88 74 65 40 93 ac 36 17 de f6 |."..t..te@..6...|" -peer0.org1.example.com | "2019-05-02 01:31:03.295 UTC [msp.identity] Verify -> DEBU 1639 Verify: sig = 00000000 30 44 02 20 79 dd 2d 8d ec 33 22 8f c4 3e 84 1a |0D. y.-..3"..>..| -peer0.org1.example.com | 00000010 c5 24 f7 e6 f3 a3 81 80 60 55 d4 11 69 bc 0f 14 |.$......`U..i...| -peer0.org1.example.com | 00000020 bb 16 a7 9e 02 20 2c ca e4 22 a5 a7 08 b7 d0 b3 |..... ,.."......| -peer0.org1.example.com | 00000030 92 2d 70 80 53 34 1f 45 8f 1c 7d 71 f6 83 bd b1 |.-p.S4.E..}q....| -peer0.org1.example.com | 00000040 f4 cb b3 20 9e e3 |... ..|" -peer0.org1.example.com | "2019-05-02 01:31:03.296 UTC [protoutils] checkSignatureFromCreator -> DEBU 163a exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:03.296 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 163b validateChaincodeProposalMessage starts for proposal 0xc00318aee0, header 0xc003a17f90" -orderer0.example.com | "2019-05-02 01:31:38.485 UTC [policies] Evaluate -> DEBU 1793 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.487 UTC [policies] Evaluate -> DEBU 1794 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.487 UTC [policies] Evaluate -> DEBU 1795 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.488 UTC [policies] Evaluate -> DEBU 1796 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.488 UTC [common.deliver] deliverBlocks -> DEBU 1797 [channel: businesschannel] Received seekInfo (0xc00106c400) start: > stop: > from 192.168.240.9:47550" -orderer0.example.com | "2019-05-02 01:31:38.489 UTC [fsblkstorage] Next -> DEBU 1798 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:38.489 UTC [fsblkstorage] newBlockfileStream -> DEBU 1799 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" -orderer0.example.com | "2019-05-02 01:31:38.490 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 179a Remaining bytes=[109726], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:38.491 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 179b Returning blockbytes - length=[23683], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" -orderer0.example.com | "2019-05-02 01:31:38.491 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 179c blockbytes [23683] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:38.492 UTC [common.deliver] deliverBlocks -> DEBU 179d [channel: businesschannel] Delivering block [1] for (0xc00106c400) for 192.168.240.9:47550" -orderer0.example.com | "2019-05-02 01:31:38.493 UTC [common.deliver] deliverBlocks -> DEBU 179e [channel: businesschannel] Done delivering to 192.168.240.9:47550 for (0xc00106c400)" -orderer0.example.com | "2019-05-02 01:31:38.494 UTC [fsblkstorage] waitForBlock -> DEBU 179f Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:38.494 UTC [fsblkstorage] waitForBlock -> DEBU 17a0 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:38.495 UTC [common.deliver] Handle -> DEBU 17a1 Waiting for new SeekInfo from 192.168.240.9:47550" -orderer0.example.com | "2019-05-02 01:31:38.495 UTC [common.deliver] Handle -> DEBU 17a2 Attempting to read seek info message from 192.168.240.9:47550" -orderer0.example.com | "2019-05-02 01:31:38.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17a3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" -orderer0.example.com | "2019-05-02 01:31:38.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17a4 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" -orderer0.example.com | "2019-05-02 01:31:38.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17a5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " -orderer0.example.com | "2019-05-02 01:31:38.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.4µs " -orderer0.example.com | "2019-05-02 01:31:38.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17a7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:38.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17a8 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" -orderer0.example.com | "2019-05-02 01:31:38.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " -orderer0.example.com | "2019-05-02 01:31:38.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17aa Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:38.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ab Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:38.524 UTC [common.deliver] Handle -> WARN 17ac Error reading from 192.168.240.9:47550: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:38.525 UTC [orderer.common.server] func1 -> DEBU 17ad Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:38.525 UTC [comm.grpc.server] 1 -> INFO 17ae streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47550 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=53.1331ms -orderer0.example.com | "2019-05-02 01:31:38.525 UTC [grpc] infof -> DEBU 17af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:38.691 UTC [orderer.common.server] Deliver -> DEBU 17b0 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:38.691 UTC [common.deliver] Handle -> DEBU 17b1 Starting new deliver loop for 192.168.240.9:47552" -orderer0.example.com | "2019-05-02 01:31:38.691 UTC [common.deliver] Handle -> DEBU 17b2 Attempting to read seek info message from 192.168.240.9:47552" -orderer0.example.com | "2019-05-02 01:31:38.692 UTC [policies] Evaluate -> DEBU 17b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.693 UTC [policies] Evaluate -> DEBU 17b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.693 UTC [policies] Evaluate -> DEBU 17b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.693 UTC [policies] Evaluate -> DEBU 17b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.694 UTC [policies] Evaluate -> DEBU 17b7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.694 UTC [cauthdsl] func1 -> DEBU 17b8 0xc001264130 gate 1556760698694256500 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:38.694 UTC [cauthdsl] func2 -> DEBU 17b9 0xc001264130 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:38.694 UTC [cauthdsl] func2 -> DEBU 17ba 0xc001264130 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:38.694 UTC [cauthdsl] func2 -> DEBU 17bb 0xc001264130 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:38.695 UTC [msp.identity] Verify -> DEBU 17bc Verify: digest = 00000000 81 22 dd ef f0 80 8c 31 a8 4f a1 e2 19 14 12 8a |.".....1.O......| -orderer0.example.com | 00000010 41 d9 78 46 29 b6 72 96 e6 bf 3b 92 3d e3 2f 80 |A.xF).r...;.=./.|" -orderer0.example.com | "2019-05-02 01:31:38.696 UTC [msp.identity] Verify -> DEBU 17bd Verify: sig = 00000000 30 45 02 21 00 d9 67 42 80 9b 8b 7c 35 f8 6f 83 |0E.!..gB...|5.o.| -orderer0.example.com | 00000010 07 a5 11 5f b7 76 0e 5e 11 aa 61 2c f1 37 0f 8e |..._.v.^..a,.7..| -orderer0.example.com | 00000020 51 f8 ea e9 92 02 20 1d d9 0a cc ae a8 4b ea f2 |Q..... ......K..| -orderer0.example.com | 00000030 87 3f 69 24 ca 9d 12 a5 57 27 af c1 0f f7 01 33 |.?i$....W'.....3| -orderer0.example.com | 00000040 8f b8 29 2b 15 25 b8 |..)+.%.|" -orderer0.example.com | "2019-05-02 01:31:38.696 UTC [cauthdsl] func2 -> DEBU 17be 0xc001264130 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:38.696 UTC [cauthdsl] func1 -> DEBU 17bf 0xc001264130 gate 1556760698694256500 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:38.697 UTC [policies] Evaluate -> DEBU 17c0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.697 UTC [policies] Evaluate -> DEBU 17c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.697 UTC [policies] Evaluate -> DEBU 17c2 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.698 UTC [policies] Evaluate -> DEBU 17c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.699 UTC [policies] Evaluate -> DEBU 17c4 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.699 UTC [policies] Evaluate -> DEBU 17c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.700 UTC [common.deliver] deliverBlocks -> DEBU 17c6 [channel: businesschannel] Received seekInfo (0xc000c892c0) start: > stop: > from 192.168.240.9:47552" -orderer0.example.com | "2019-05-02 01:31:38.701 UTC [fsblkstorage] Next -> DEBU 17c7 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:38.701 UTC [fsblkstorage] newBlockfileStream -> DEBU 17c8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47626]" -orderer0.example.com | "2019-05-02 01:31:38.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17c9 Remaining bytes=[86040], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:38.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17ca Returning blockbytes - length=[23741], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" -orderer0.example.com | "2019-05-02 01:31:38.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17cb blockbytes [23741] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:38.703 UTC [common.deliver] deliverBlocks -> DEBU 17cc [channel: businesschannel] Delivering block [2] for (0xc000c892c0) for 192.168.240.9:47552" -orderer0.example.com | "2019-05-02 01:31:38.703 UTC [common.deliver] deliverBlocks -> DEBU 17cd [channel: businesschannel] Done delivering to 192.168.240.9:47552 for (0xc000c892c0)" -orderer0.example.com | "2019-05-02 01:31:38.704 UTC [common.deliver] Handle -> DEBU 17ce Waiting for new SeekInfo from 192.168.240.9:47552" -orderer0.example.com | "2019-05-02 01:31:38.704 UTC [common.deliver] Handle -> DEBU 17d0 Attempting to read seek info message from 192.168.240.9:47552" -orderer0.example.com | "2019-05-02 01:31:38.704 UTC [fsblkstorage] waitForBlock -> DEBU 17cf Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:38.705 UTC [fsblkstorage] waitForBlock -> DEBU 17d1 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:38.723 UTC [common.deliver] Handle -> WARN 17d2 Error reading from 192.168.240.9:47552: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:38.723 UTC [orderer.common.server] func1 -> DEBU 17d3 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:38.724 UTC [comm.grpc.server] 1 -> INFO 17d4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47552 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.6509ms -orderer0.example.com | "2019-05-02 01:31:38.724 UTC [grpc] infof -> DEBU 17d5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:38.915 UTC [orderer.common.server] Deliver -> DEBU 17d6 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:38.915 UTC [common.deliver] Handle -> DEBU 17d7 Starting new deliver loop for 192.168.240.9:47554" -orderer0.example.com | "2019-05-02 01:31:38.915 UTC [common.deliver] Handle -> DEBU 17d8 Attempting to read seek info message from 192.168.240.9:47554" -orderer0.example.com | "2019-05-02 01:31:38.916 UTC [policies] Evaluate -> DEBU 17d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.916 UTC [policies] Evaluate -> DEBU 17da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.917 UTC [policies] Evaluate -> DEBU 17db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.918 UTC [policies] Evaluate -> DEBU 17dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:38.918 UTC [policies] Evaluate -> DEBU 17dd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:38.918 UTC [cauthdsl] func1 -> DEBU 17de 0xc000bb4d70 gate 1556760698918827400 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:38.919 UTC [cauthdsl] func2 -> DEBU 17df 0xc000bb4d70 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:38.919 UTC [cauthdsl] func2 -> DEBU 17e0 0xc000bb4d70 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:38.919 UTC [cauthdsl] func2 -> DEBU 17e1 0xc000bb4d70 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:38.919 UTC [msp.identity] Verify -> DEBU 17e2 Verify: digest = 00000000 9c 87 24 dc fe 8f b4 fa ee c9 eb d1 df 23 86 d9 |..$..........#..| -orderer0.example.com | 00000010 08 60 2d cd d3 de 54 09 85 e1 38 5e 2c 66 c9 a8 |.`-...T...8^,f..|" -orderer0.example.com | "2019-05-02 01:31:38.920 UTC [msp.identity] Verify -> DEBU 17e3 Verify: sig = 00000000 30 45 02 21 00 9b d5 b9 59 24 87 34 ba a2 67 7e |0E.!....Y$.4..g~| -orderer0.example.com | 00000010 68 ed 65 4f a2 e7 97 44 0c 95 43 20 34 08 b2 9d |h.eO...D..C 4...| -orderer0.example.com | 00000020 af 02 68 03 b4 02 20 4f 29 1c 38 25 44 94 fe 9e |..h... O).8%D...| -orderer0.example.com | 00000030 63 5a dd b7 24 70 b4 c3 c1 85 2c fc df dc 43 93 |cZ..$p....,...C.| -orderer0.example.com | 00000040 a4 99 3f 8a a8 b4 2d |..?...-|" -orderer0.example.com | "2019-05-02 01:31:38.921 UTC [cauthdsl] func2 -> DEBU 17e4 0xc000bb4d70 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:38.921 UTC [cauthdsl] func1 -> DEBU 17e5 0xc000bb4d70 gate 1556760698918827400 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:38.921 UTC [policies] Evaluate -> DEBU 17e6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.922 UTC [policies] Evaluate -> DEBU 17e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:38.922 UTC [policies] Evaluate -> DEBU 17e8 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.922 UTC [policies] Evaluate -> DEBU 17e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:38.923 UTC [policies] Evaluate -> DEBU 17ea Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.923 UTC [policies] Evaluate -> DEBU 17eb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:38.923 UTC [common.deliver] deliverBlocks -> DEBU 17ec [channel: businesschannel] Received seekInfo (0xc000baa780) start: > stop: > from 192.168.240.9:47554" -orderer0.example.com | "2019-05-02 01:31:38.924 UTC [fsblkstorage] Next -> DEBU 17ed Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:38.924 UTC [fsblkstorage] newBlockfileStream -> DEBU 17ee newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71370]" -orderer0.example.com | "2019-05-02 01:31:38.925 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17ef Remaining bytes=[62296], Going to peek [8] bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.298 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 163c validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -orderer0.example.com | "2019-05-02 01:31:38.925 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17f0 Returning blockbytes - length=[4710], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}" -orderer0.example.com | "2019-05-02 01:31:38.926 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17f1 blockbytes [4710] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:38.926 UTC [common.deliver] deliverBlocks -> DEBU 17f2 [channel: businesschannel] Delivering block [3] for (0xc000baa780) for 192.168.240.9:47554" -orderer0.example.com | "2019-05-02 01:31:38.927 UTC [common.deliver] deliverBlocks -> DEBU 17f3 [channel: businesschannel] Done delivering to 192.168.240.9:47554 for (0xc000baa780)" -orderer0.example.com | "2019-05-02 01:31:38.927 UTC [fsblkstorage] waitForBlock -> DEBU 17f4 Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:38.928 UTC [fsblkstorage] waitForBlock -> DEBU 17f5 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:38.928 UTC [common.deliver] Handle -> DEBU 17f6 Waiting for new SeekInfo from 192.168.240.9:47554" -orderer0.example.com | "2019-05-02 01:31:38.928 UTC [common.deliver] Handle -> DEBU 17f7 Attempting to read seek info message from 192.168.240.9:47554" -orderer0.example.com | "2019-05-02 01:31:38.939 UTC [common.deliver] Handle -> WARN 17f8 Error reading from 192.168.240.9:47554: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:38.939 UTC [orderer.common.server] func1 -> DEBU 17f9 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:38.940 UTC [comm.grpc.server] 1 -> INFO 17fa streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47554 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.4014ms -orderer0.example.com | "2019-05-02 01:31:38.941 UTC [grpc] infof -> DEBU 17fb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:38.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17fc Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" -orderer0.example.com | "2019-05-02 01:31:39.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17fd Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" -orderer0.example.com | "2019-05-02 01:31:39.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.2µs " -orderer0.example.com | "2019-05-02 01:31:39.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.4µs " -orderer0.example.com | "2019-05-02 01:31:39.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1800 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:39.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1801 Sending msg of 28 bytes to 3 on channel testchainid took 115.6µs" -orderer0.example.com | "2019-05-02 01:31:39.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1802 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141µs " -orderer0.example.com | "2019-05-02 01:31:39.007 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1803 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:39.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1804 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:39.132 UTC [orderer.common.server] Deliver -> DEBU 1805 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:39.132 UTC [common.deliver] Handle -> DEBU 1806 Starting new deliver loop for 192.168.240.9:47556" -orderer0.example.com | "2019-05-02 01:31:39.133 UTC [common.deliver] Handle -> DEBU 1807 Attempting to read seek info message from 192.168.240.9:47556" -orderer0.example.com | "2019-05-02 01:31:39.134 UTC [policies] Evaluate -> DEBU 1808 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.134 UTC [policies] Evaluate -> DEBU 1809 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:39.135 UTC [policies] Evaluate -> DEBU 180a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.135 UTC [policies] Evaluate -> DEBU 180b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:39.135 UTC [policies] Evaluate -> DEBU 180c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.135 UTC [cauthdsl] func1 -> DEBU 180d 0xc000bd7350 gate 1556760699135642600 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:39.135 UTC [cauthdsl] func2 -> DEBU 180e 0xc000bd7350 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:39.135 UTC [cauthdsl] func2 -> DEBU 180f 0xc000bd7350 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:39.136 UTC [cauthdsl] func2 -> DEBU 1810 0xc000bd7350 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:39.136 UTC [msp.identity] Verify -> DEBU 1811 Verify: digest = 00000000 2b 88 1a 3c 7f 86 ab 2f 84 bd c6 90 e8 3a 7c d5 |+..<.../.....:|.| -orderer0.example.com | 00000010 d3 ba a3 0c 90 24 e0 4c 0a 08 a8 5b c4 38 c4 76 |.....$.L...[.8.v|" -orderer0.example.com | "2019-05-02 01:31:39.136 UTC [msp.identity] Verify -> DEBU 1812 Verify: sig = 00000000 30 45 02 21 00 fe 99 4a 29 11 64 52 60 7c 60 b4 |0E.!...J).dR`|`.| -orderer0.example.com | 00000010 7b ed 70 de c0 b3 8e ec 61 2b 95 80 a1 af d4 4d |{.p.....a+.....M| -orderer0.example.com | 00000020 03 10 d4 81 0a 02 20 5f c0 32 d7 79 51 b3 10 18 |...... _.2.yQ...| -orderer0.example.com | 00000030 b9 bf 4b fb 00 5f 23 80 6e 49 db 1d 25 08 a1 ef |..K.._#.nI..%...| -orderer0.example.com | 00000040 c0 0b b7 dc d6 b3 99 |.......|" -orderer0.example.com | "2019-05-02 01:31:39.136 UTC [cauthdsl] func2 -> DEBU 1813 0xc000bd7350 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:39.136 UTC [cauthdsl] func1 -> DEBU 1814 0xc000bd7350 gate 1556760699135642600 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:39.137 UTC [policies] Evaluate -> DEBU 1815 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:39.137 UTC [policies] Evaluate -> DEBU 1816 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:39.137 UTC [policies] Evaluate -> DEBU 1817 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:39.137 UTC [policies] Evaluate -> DEBU 1818 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:39.138 UTC [policies] Evaluate -> DEBU 1819 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:39.138 UTC [policies] Evaluate -> DEBU 181a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:39.138 UTC [common.deliver] deliverBlocks -> DEBU 181b [channel: businesschannel] Received seekInfo (0xc00110a400) start: > stop: > from 192.168.240.9:47556" -orderer0.example.com | "2019-05-02 01:31:39.139 UTC [fsblkstorage] Next -> DEBU 181c Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:39.139 UTC [fsblkstorage] newBlockfileStream -> DEBU 181d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76082]" -peer0.org1.example.com | "2019-05-02 01:31:03.300 UTC [endorser] preProcess -> DEBU 163d [][eb7c25ca] processing txid: eb7c25ca3c5379120806180ea3e4b2c8d0abb612af02365b8b42e1357c79f419" -peer0.org1.example.com | "2019-05-02 01:31:03.302 UTC [endorser] SimulateProposal -> DEBU 163e [][eb7c25ca] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:03.302 UTC [endorser] callChaincode -> INFO 163f [][eb7c25ca] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:03.302 UTC [chaincode] Execute -> DEBU 1640 Entry" -peer0.org1.example.com | "2019-05-02 01:31:03.303 UTC [msp.identity] Verify -> DEBU 1641 Verify: digest = 00000000 58 14 70 7c 6d 45 74 f1 5a 1f 96 0b 7b 8e 0f 61 |X.p|mEt.Z...{..a| -peer0.org1.example.com | 00000010 f6 22 ff f8 74 f3 88 74 65 40 93 ac 36 17 de f6 |."..t..te@..6...|" -peer0.org1.example.com | "2019-05-02 01:31:03.303 UTC [msp.identity] Verify -> DEBU 1642 Verify: sig = 00000000 30 44 02 20 79 dd 2d 8d ec 33 22 8f c4 3e 84 1a |0D. y.-..3"..>..| -peer0.org1.example.com | 00000010 c5 24 f7 e6 f3 a3 81 80 60 55 d4 11 69 bc 0f 14 |.$......`U..i...| -peer0.org1.example.com | 00000020 bb 16 a7 9e 02 20 2c ca e4 22 a5 a7 08 b7 d0 b3 |..... ,.."......| -peer0.org1.example.com | 00000030 92 2d 70 80 53 34 1f 45 8f 1c 7d 71 f6 83 bd b1 |.-p.S4.E..}q....| -peer0.org1.example.com | 00000040 f4 cb b3 20 9e e3 |... ..|" -peer0.org1.example.com | "2019-05-02 01:31:03.304 UTC [lifecycle] QueryInstalledChaincodes -> DEBU 1643 received invocation of QueryInstalledChaincodes" -peer0.org1.example.com | "2019-05-02 01:31:03.305 UTC [chaincode] handleMessage -> DEBU 1644 [eb7c25ca] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.305 UTC [chaincode] Notify -> DEBU 1645 [eb7c25ca] notifying Txid:eb7c25ca3c5379120806180ea3e4b2c8d0abb612af02365b8b42e1357c79f419, channelID:" -peer0.org1.example.com | "2019-05-02 01:31:03.305 UTC [chaincode] Execute -> DEBU 1646 Exit" -peer0.org1.example.com | "2019-05-02 01:31:03.305 UTC [endorser] callChaincode -> INFO 1647 [][eb7c25ca] Exit chaincode: name:"_lifecycle" (2ms)" -peer0.org1.example.com | "2019-05-02 01:31:03.305 UTC [endorser] SimulateProposal -> DEBU 1648 [][eb7c25ca] Exit" -peer0.org1.example.com | "2019-05-02 01:31:03.305 UTC [endorser] func1 -> DEBU 1649 Exit: request from 192.168.240.9:41302" -peer0.org1.example.com | "2019-05-02 01:31:03.306 UTC [comm.grpc.server] 1 -> INFO 164a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41302 grpc.code=OK grpc.call_duration=12.7764ms -peer0.org1.example.com | "2019-05-02 01:31:03.312 UTC [grpc] warningf -> DEBU 164b transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41302: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:31:03.312 UTC [grpc] infof -> DEBU 164c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:03.313 UTC [grpc] infof -> DEBU 164d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:03.432 UTC [gossip.gossip] handleMessage -> DEBU 164e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.432 UTC [gossip.gossip] handleMessage -> DEBU 164f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.432 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1650 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.432 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1651 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:03.433 UTC [msp.identity] Verify -> DEBU 1652 Verify: digest = 00000000 35 f2 1a 6b 87 bb b9 e8 6c 6e b6 0f fc 46 af 9b |5..k....ln...F..| -peer0.org1.example.com | 00000010 78 69 33 a7 10 e7 2f 83 0d bc 21 9d 25 98 b9 8c |xi3.../...!.%...|" -peer0.org1.example.com | "2019-05-02 01:31:03.433 UTC [msp.identity] Verify -> DEBU 1653 Verify: sig = 00000000 30 45 02 21 00 b7 d3 32 7f 7d c1 4f 01 b9 10 55 |0E.!...2.}.O...U| -peer0.org1.example.com | 00000010 6f 1c 2f 5d 97 a0 f6 13 c9 5c 52 db dd 7e 9a a8 |o./].....\R..~..| -peer0.org1.example.com | 00000020 dd 1c ee 7a 5f 02 20 55 b4 e7 4a c5 eb d4 66 c5 |...z_. U..J...f.| -peer0.org1.example.com | 00000030 fb 72 91 f1 38 df 18 a7 4d 00 ed d3 bd a6 1c 7d |.r..8...M......}| -peer0.org1.example.com | 00000040 28 8f d8 7b ac a7 4a |(..{..J|" -peer0.org1.example.com | "2019-05-02 01:31:03.434 UTC [msp.identity] Verify -> DEBU 1654 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:03.434 UTC [msp.identity] Verify -> DEBU 1655 Verify: sig = 00000000 30 45 02 21 00 b7 9d b0 b4 9c f0 ec 96 0a 19 0e |0E.!............| -peer0.org1.example.com | 00000010 7e b9 27 44 8d 11 b1 e2 2d 45 fe 1a de 9e b0 96 |~.'D....-E......| -peer0.org1.example.com | 00000020 25 df f7 3e 68 02 20 3c aa 67 1d f9 f4 90 8e 82 |%..>h. <.g......| -peer0.org1.example.com | 00000030 1d 55 c0 90 75 d6 70 48 4f e1 f6 56 14 d5 89 83 |.U..u.pHO..V....| -peer0.org1.example.com | 00000040 1f 33 fb 2a 4b b7 3f |.3.*K.?|" -peer0.org1.example.com | "2019-05-02 01:31:03.435 UTC [gossip.discovery] handleAliveMessage -> DEBU 1656 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.435 UTC [gossip.discovery] learnExistingMembers -> DEBU 1657 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:03.435 UTC [gossip.discovery] learnExistingMembers -> DEBU 1658 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 " -peer0.org1.example.com | "2019-05-02 01:31:03.437 UTC [gossip.discovery] learnExistingMembers -> DEBU 1659 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 " -peer0.org1.example.com | "2019-05-02 01:31:03.437 UTC [gossip.discovery] learnExistingMembers -> DEBU 165a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:03.442 UTC [gossip.discovery] learnExistingMembers -> DEBU 165b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.449 UTC [gossip.discovery] handleAliveMessage -> DEBU 165c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.450 UTC [gossip.discovery] handleMsgFromComm -> DEBU 165d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.452 UTC [msp] DeserializeIdentity -> DEBU 165e Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:39.139 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 181e Remaining bytes=[57584], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:39.139 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 181f Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" -orderer0.example.com | "2019-05-02 01:31:39.140 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1820 blockbytes [4709] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:39.140 UTC [common.deliver] deliverBlocks -> DEBU 1821 [channel: businesschannel] Delivering block [4] for (0xc00110a400) for 192.168.240.9:47556" -orderer0.example.com | "2019-05-02 01:31:39.140 UTC [common.deliver] deliverBlocks -> DEBU 1822 [channel: businesschannel] Done delivering to 192.168.240.9:47556 for (0xc00110a400)" -orderer0.example.com | "2019-05-02 01:31:39.141 UTC [common.deliver] Handle -> DEBU 1823 Waiting for new SeekInfo from 192.168.240.9:47556" -orderer0.example.com | "2019-05-02 01:31:39.141 UTC [common.deliver] Handle -> DEBU 1825 Attempting to read seek info message from 192.168.240.9:47556" -orderer0.example.com | "2019-05-02 01:31:39.141 UTC [fsblkstorage] waitForBlock -> DEBU 1824 Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:39.142 UTC [fsblkstorage] waitForBlock -> DEBU 1826 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:39.155 UTC [common.deliver] Handle -> WARN 1827 Error reading from 192.168.240.9:47556: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:39.156 UTC [orderer.common.server] func1 -> DEBU 1829 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:39.156 UTC [comm.grpc.server] 1 -> INFO 182a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47556 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.1823ms -orderer0.example.com | "2019-05-02 01:31:39.155 UTC [grpc] infof -> DEBU 1828 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:39.311 UTC [orderer.common.server] Deliver -> DEBU 182b Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:39.312 UTC [common.deliver] Handle -> DEBU 182c Starting new deliver loop for 192.168.240.9:47558" -orderer0.example.com | "2019-05-02 01:31:39.312 UTC [common.deliver] Handle -> DEBU 182d Attempting to read seek info message from 192.168.240.9:47558" -orderer0.example.com | "2019-05-02 01:31:39.312 UTC [policies] Evaluate -> DEBU 182e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.313 UTC [policies] Evaluate -> DEBU 182f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:39.313 UTC [policies] Evaluate -> DEBU 1830 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.313 UTC [policies] Evaluate -> DEBU 1831 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:39.314 UTC [policies] Evaluate -> DEBU 1832 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.314 UTC [cauthdsl] func1 -> DEBU 1833 0xc000fae170 gate 1556760699314345500 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:39.314 UTC [cauthdsl] func2 -> DEBU 1834 0xc000fae170 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:39.314 UTC [cauthdsl] func2 -> DEBU 1835 0xc000fae170 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:39.315 UTC [cauthdsl] func2 -> DEBU 1836 0xc000fae170 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:39.315 UTC [msp.identity] Verify -> DEBU 1837 Verify: digest = 00000000 fe d1 e9 bf 20 e1 1f 4f 89 2a 31 5d bd 5f df a0 |.... ..O.*1]._..| -orderer0.example.com | 00000010 b5 c6 40 bf 94 bc 9e 34 e2 38 10 7e fe cf d2 86 |..@....4.8.~....|" -orderer0.example.com | "2019-05-02 01:31:39.315 UTC [msp.identity] Verify -> DEBU 1838 Verify: sig = 00000000 30 43 02 1f 77 a6 88 52 c1 ff c4 34 6d 65 80 39 |0C..w..R...4me.9| -orderer0.example.com | 00000010 7d 3a 73 72 53 a9 ad 11 bb f9 7e b6 b2 12 c4 94 |}:srS.....~.....| -orderer0.example.com | 00000020 5b 4c d4 02 20 19 20 04 5f cc 7e de c3 f2 84 18 |[L.. . ._.~.....| -orderer0.example.com | 00000030 e1 49 00 da 30 0f 4a 4b 77 97 69 43 d4 f6 2b df |.I..0.JKw.iC..+.| -orderer0.example.com | 00000040 03 21 8d ca aa |.!...|" -orderer0.example.com | "2019-05-02 01:31:39.316 UTC [cauthdsl] func2 -> DEBU 1839 0xc000fae170 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:39.316 UTC [cauthdsl] func1 -> DEBU 183a 0xc000fae170 gate 1556760699314345500 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:39.316 UTC [policies] Evaluate -> DEBU 183b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:39.317 UTC [policies] Evaluate -> DEBU 183c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:39.317 UTC [policies] Evaluate -> DEBU 183d Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:39.317 UTC [policies] Evaluate -> DEBU 183e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:39.317 UTC [policies] Evaluate -> DEBU 183f Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:39.318 UTC [policies] Evaluate -> DEBU 1840 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:39.318 UTC [common.deliver] deliverBlocks -> DEBU 1841 [channel: businesschannel] Received seekInfo (0xc000bab600) start: > stop: > from 192.168.240.9:47558" -orderer0.example.com | "2019-05-02 01:31:39.318 UTC [fsblkstorage] Next -> DEBU 1842 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:39.319 UTC [fsblkstorage] newBlockfileStream -> DEBU 1843 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80793]" -orderer0.example.com | "2019-05-02 01:31:39.319 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1844 Remaining bytes=[52873], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:39.320 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1845 Returning blockbytes - length=[5711], placementInfo={fileNum=[0], startOffset=[80793], bytesOffset=[80795]}" -orderer0.example.com | "2019-05-02 01:31:39.320 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1846 blockbytes [5711] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:39.320 UTC [common.deliver] deliverBlocks -> DEBU 1847 [channel: businesschannel] Delivering block [5] for (0xc000bab600) for 192.168.240.9:47558" -orderer0.example.com | "2019-05-02 01:31:39.321 UTC [common.deliver] deliverBlocks -> DEBU 1848 [channel: businesschannel] Done delivering to 192.168.240.9:47558 for (0xc000bab600)" -orderer0.example.com | "2019-05-02 01:31:39.321 UTC [fsblkstorage] waitForBlock -> DEBU 1849 Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:39.322 UTC [fsblkstorage] waitForBlock -> DEBU 184a Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:39.322 UTC [common.deliver] Handle -> DEBU 184b Waiting for new SeekInfo from 192.168.240.9:47558" -orderer0.example.com | "2019-05-02 01:31:39.323 UTC [common.deliver] Handle -> DEBU 184c Attempting to read seek info message from 192.168.240.9:47558" -orderer0.example.com | "2019-05-02 01:31:39.332 UTC [common.deliver] Handle -> WARN 184d Error reading from 192.168.240.9:47558: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:39.333 UTC [orderer.common.server] func1 -> DEBU 184e Closing Deliver stream" -peer0.org1.example.com | "2019-05-02 01:31:03.456 UTC [msp] DeserializeIdentity -> DEBU 165f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.459 UTC [gossip.comm] func1 -> DEBU 1660 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.462 UTC [msp] DeserializeIdentity -> DEBU 1661 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.459 UTC [gossip.gossip] handleMessage -> DEBU 1662 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.464 UTC [gossip.comm] Send -> DEBU 1664 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:03.464 UTC [msp] DeserializeIdentity -> DEBU 1665 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.463 UTC [gossip.gossip] handleMessage -> DEBU 1663 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.465 UTC [gossip.comm] Send -> DEBU 1666 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:03.465 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1667 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.467 UTC [gossip.discovery] handleMsgFromComm -> DEBU 166a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.466 UTC [gossip.comm] sendToEndpoint -> DEBU 1668 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.467 UTC [gossip.comm] sendToEndpoint -> DEBU 166b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.470 UTC [gossip.comm] sendToEndpoint -> DEBU 166d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.467 UTC [gossip.comm] sendToEndpoint -> DEBU 166c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.466 UTC [gossip.comm] func1 -> DEBU 1669 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.471 UTC [gossip.gossip] handleMessage -> DEBU 166e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.472 UTC [gossip.gossip] handleMessage -> DEBU 166f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.472 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1670 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.472 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1671 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.508 UTC [gossip.comm] func1 -> DEBU 1672 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.510 UTC [gossip.gossip] handleMessage -> DEBU 1673 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.510 UTC [gossip.gossip] handleMessage -> DEBU 1674 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.511 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1675 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.511 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1676 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:03.511 UTC [msp] DeserializeIdentity -> DEBU 1677 Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:39.333 UTC [comm.grpc.server] 1 -> INFO 184f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47558 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.3955ms -orderer0.example.com | "2019-05-02 01:31:39.334 UTC [grpc] infof -> DEBU 1850 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:39.488 UTC [orderer.common.server] Deliver -> DEBU 1851 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:39.488 UTC [common.deliver] Handle -> DEBU 1852 Starting new deliver loop for 192.168.240.9:47560" -orderer0.example.com | "2019-05-02 01:31:39.488 UTC [common.deliver] Handle -> DEBU 1853 Attempting to read seek info message from 192.168.240.9:47560" -orderer0.example.com | "2019-05-02 01:31:39.489 UTC [policies] Evaluate -> DEBU 1854 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.489 UTC [policies] Evaluate -> DEBU 1855 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:39.489 UTC [policies] Evaluate -> DEBU 1856 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.490 UTC [policies] Evaluate -> DEBU 1857 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:39.490 UTC [policies] Evaluate -> DEBU 1858 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.490 UTC [cauthdsl] func1 -> DEBU 1859 0xc000f7a8d0 gate 1556760699490783100 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:39.491 UTC [cauthdsl] func2 -> DEBU 185a 0xc000f7a8d0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:39.491 UTC [cauthdsl] func2 -> DEBU 185b 0xc000f7a8d0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:39.491 UTC [cauthdsl] func2 -> DEBU 185c 0xc000f7a8d0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:39.491 UTC [msp.identity] Verify -> DEBU 185d Verify: digest = 00000000 c4 53 49 90 b6 a9 6f 63 0c 2b 8f 5e 74 0b 56 62 |.SI...oc.+.^t.Vb| -orderer0.example.com | 00000010 a5 c0 da b3 2f ea d8 fc 73 9a 48 ae 35 f0 ca ea |..../...s.H.5...|" -orderer0.example.com | "2019-05-02 01:31:39.492 UTC [msp.identity] Verify -> DEBU 185e Verify: sig = 00000000 30 45 02 21 00 ba 41 d9 4f ae b1 c7 b9 38 ba cb |0E.!..A.O....8..| -orderer0.example.com | 00000010 d5 b3 f7 3d 28 ea 54 3f 51 44 bd 67 35 36 fb 45 |...=(.T?QD.g56.E| -orderer0.example.com | 00000020 36 88 34 0d 4d 02 20 4d 21 38 ed db 28 dc 1a 89 |6.4.M. M!8..(...| -orderer0.example.com | 00000030 21 c7 86 1d bb 53 01 8d 3f 46 44 51 4e bd e9 ed |!....S..?FDQN...| -orderer0.example.com | 00000040 5e fd 97 b9 8e 73 ac |^....s.|" -orderer0.example.com | "2019-05-02 01:31:39.492 UTC [cauthdsl] func2 -> DEBU 185f 0xc000f7a8d0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:39.492 UTC [cauthdsl] func1 -> DEBU 1860 0xc000f7a8d0 gate 1556760699490783100 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:39.493 UTC [policies] Evaluate -> DEBU 1861 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:39.493 UTC [policies] Evaluate -> DEBU 1862 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:39.493 UTC [policies] Evaluate -> DEBU 1863 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:39.494 UTC [policies] Evaluate -> DEBU 1864 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:39.494 UTC [policies] Evaluate -> DEBU 1865 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:39.494 UTC [policies] Evaluate -> DEBU 1866 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:39.494 UTC [common.deliver] deliverBlocks -> DEBU 1867 [channel: businesschannel] Received seekInfo (0xc000babc40) start: > stop: > from 192.168.240.9:47560" -orderer0.example.com | "2019-05-02 01:31:39.495 UTC [fsblkstorage] Next -> DEBU 1868 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:39.495 UTC [fsblkstorage] newBlockfileStream -> DEBU 1869 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86506]" -orderer0.example.com | "2019-05-02 01:31:39.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186a Remaining bytes=[47160], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:39.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186b Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86506], bytesOffset=[86508]}" -orderer0.example.com | "2019-05-02 01:31:39.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186c blockbytes [4058] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:39.496 UTC [common.deliver] deliverBlocks -> DEBU 186d [channel: businesschannel] Delivering block [6] for (0xc000babc40) for 192.168.240.9:47560" -orderer0.example.com | "2019-05-02 01:31:39.497 UTC [common.deliver] deliverBlocks -> DEBU 186e [channel: businesschannel] Done delivering to 192.168.240.9:47560 for (0xc000babc40)" -orderer0.example.com | "2019-05-02 01:31:39.498 UTC [fsblkstorage] waitForBlock -> DEBU 186f Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:39.498 UTC [fsblkstorage] waitForBlock -> DEBU 1870 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:39.498 UTC [common.deliver] Handle -> DEBU 1871 Waiting for new SeekInfo from 192.168.240.9:47560" -orderer0.example.com | "2019-05-02 01:31:39.498 UTC [common.deliver] Handle -> DEBU 1872 Attempting to read seek info message from 192.168.240.9:47560" -orderer0.example.com | "2019-05-02 01:31:39.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1873 Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" -orderer0.example.com | "2019-05-02 01:31:39.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1874 Sending msg of 28 bytes to 3 on channel businesschannel took 18.7µs" -orderer0.example.com | "2019-05-02 01:31:39.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1875 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.5µs " -orderer0.example.com | "2019-05-02 01:31:39.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1876 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.8µs " -orderer0.example.com | "2019-05-02 01:31:39.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1877 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:39.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1878 Sending msg of 28 bytes to 3 on channel testchainid took 37.3µs" -orderer0.example.com | "2019-05-02 01:31:39.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1879 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.5µs " -orderer0.example.com | "2019-05-02 01:31:39.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 187a Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:39.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 187b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -peer0.org1.example.com | "2019-05-02 01:31:03.512 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1678 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:03.512 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1679 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:03.512 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 167a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:03.512 UTC [policies] Evaluate -> DEBU 167b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.513 UTC [policies] Evaluate -> DEBU 167c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:03.513 UTC [policies] Evaluate -> DEBU 167d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.514 UTC [cauthdsl] func1 -> DEBU 167e 0xc003aeecf0 gate 1556760663514056600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:03.514 UTC [cauthdsl] func2 -> DEBU 167f 0xc003aeecf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:03.514 UTC [cauthdsl] func2 -> DEBU 1680 0xc003aeecf0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:03.515 UTC [cauthdsl] func2 -> DEBU 1681 0xc003aeecf0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:03.515 UTC [msp.identity] Verify -> DEBU 1682 Verify: digest = 00000000 78 17 5c 58 27 c9 fb 76 c4 86 d5 90 af a1 b3 e2 |x.\X'..v........| -peer0.org1.example.com | 00000010 2c 53 e5 6c a7 64 5d 72 42 80 8a 89 88 aa 3b b8 |,S.l.d]rB.....;.|" -peer0.org1.example.com | "2019-05-02 01:31:03.515 UTC [msp.identity] Verify -> DEBU 1683 Verify: sig = 00000000 30 45 02 21 00 f8 f7 e2 c5 da 62 ec 4f a0 78 61 |0E.!......b.O.xa| -peer0.org1.example.com | 00000010 ab 02 8c fc da 12 d9 2f ed 9d 27 ca f5 18 9c 3c |......./..'....<| -peer0.org1.example.com | 00000020 1b d6 8e c0 a5 02 20 54 f4 51 02 39 9b a2 3f 46 |...... T.Q.9..?F| -peer0.org1.example.com | 00000030 67 2a 1d 8b 6c c3 fe eb cf ae 59 01 94 a3 ed f4 |g*..l.....Y.....| -peer0.org1.example.com | 00000040 ef 24 e6 eb 01 06 50 |.$....P|" -peer0.org1.example.com | "2019-05-02 01:31:03.516 UTC [cauthdsl] func2 -> DEBU 1684 0xc003aeecf0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:03.517 UTC [cauthdsl] func1 -> DEBU 1685 0xc003aeecf0 gate 1556760663514056600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:03.517 UTC [policies] Evaluate -> DEBU 1686 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.518 UTC [policies] Evaluate -> DEBU 1687 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.518 UTC [policies] Evaluate -> DEBU 1688 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.518 UTC [policies] Evaluate -> DEBU 1689 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.519 UTC [gossip.discovery] handleAliveMessage -> DEBU 168a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 168b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:03.520 UTC [gossip.discovery] learnExistingMembers -> DEBU 168c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 " -peer0.org1.example.com | "2019-05-02 01:31:03.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 168d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 " -peer0.org1.example.com | "2019-05-02 01:31:03.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 168e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:03.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 168f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.522 UTC [gossip.discovery] handleAliveMessage -> DEBU 1690 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.522 UTC [gossip.gossip] handleMessage -> DEBU 1691 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1692 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.523 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1693 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.524 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1694 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.524 UTC [gossip.gossip] handleMessage -> DEBU 1695 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.524 UTC [gossip.comm] func1 -> DEBU 1696 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.526 UTC [gossip.gossip] handleMessage -> DEBU 1698 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -orderer0.example.com | "2019-05-02 01:31:39.511 UTC [common.deliver] Handle -> WARN 187c Error reading from 192.168.240.9:47560: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:39.517 UTC [grpc] infof -> DEBU 187d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:39.518 UTC [orderer.common.server] func1 -> DEBU 187e Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:39.519 UTC [comm.grpc.server] 1 -> INFO 187f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47560 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.9377ms -orderer0.example.com | "2019-05-02 01:31:39.678 UTC [orderer.common.server] Deliver -> DEBU 1880 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:39.679 UTC [common.deliver] Handle -> DEBU 1881 Starting new deliver loop for 192.168.240.9:47562" -orderer0.example.com | "2019-05-02 01:31:39.679 UTC [common.deliver] Handle -> DEBU 1882 Attempting to read seek info message from 192.168.240.9:47562" -orderer0.example.com | "2019-05-02 01:31:39.679 UTC [policies] Evaluate -> DEBU 1883 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.679 UTC [policies] Evaluate -> DEBU 1884 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:39.679 UTC [policies] Evaluate -> DEBU 1885 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.679 UTC [policies] Evaluate -> DEBU 1886 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:39.680 UTC [policies] Evaluate -> DEBU 1887 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.680 UTC [cauthdsl] func1 -> DEBU 1888 0xc000952b30 gate 1556760699680288000 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:39.680 UTC [cauthdsl] func2 -> DEBU 1889 0xc000952b30 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:39.680 UTC [cauthdsl] func2 -> DEBU 188a 0xc000952b30 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:39.680 UTC [cauthdsl] func2 -> DEBU 188b 0xc000952b30 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:39.680 UTC [msp.identity] Verify -> DEBU 188c Verify: digest = 00000000 b1 66 05 39 06 5f ff 27 59 08 02 fe d3 4d bb 45 |.f.9._.'Y....M.E| -orderer0.example.com | 00000010 cd 4a 64 bd 89 ff af 29 eb ed 0e 9b 8c 1b 52 2e |.Jd....)......R.|" -orderer0.example.com | "2019-05-02 01:31:39.681 UTC [msp.identity] Verify -> DEBU 188d Verify: sig = 00000000 30 44 02 20 4c 1d 2b 53 cd 64 8a 8b a9 26 bc 88 |0D. L.+S.d...&..| -orderer0.example.com | 00000010 8d 8e c3 8e c2 fd 11 ce 3a db 83 52 f2 35 b8 0a |........:..R.5..| -orderer0.example.com | 00000020 4c 99 fe d3 02 20 7f 26 e7 28 24 e0 77 c6 1a 80 |L.... .&.($.w...| -orderer0.example.com | 00000030 52 70 e6 09 32 c3 5e 47 3e f8 11 0f 6e d4 f2 cc |Rp..2.^G>...n...| -orderer0.example.com | 00000040 3b f2 32 24 8b f5 |;.2$..|" -orderer0.example.com | "2019-05-02 01:31:39.681 UTC [cauthdsl] func2 -> DEBU 188e 0xc000952b30 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:39.681 UTC [cauthdsl] func1 -> DEBU 188f 0xc000952b30 gate 1556760699680288000 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:39.681 UTC [policies] Evaluate -> DEBU 1890 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:39.681 UTC [policies] Evaluate -> DEBU 1891 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:39.681 UTC [policies] Evaluate -> DEBU 1892 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:39.682 UTC [policies] Evaluate -> DEBU 1893 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:39.682 UTC [policies] Evaluate -> DEBU 1894 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:39.682 UTC [policies] Evaluate -> DEBU 1895 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:39.683 UTC [common.deliver] deliverBlocks -> DEBU 1896 [channel: businesschannel] Received seekInfo (0xc00110af40) start: > stop: > from 192.168.240.9:47562" -orderer0.example.com | "2019-05-02 01:31:39.683 UTC [fsblkstorage] Next -> DEBU 1897 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:39.683 UTC [fsblkstorage] newBlockfileStream -> DEBU 1898 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90566]" -orderer0.example.com | "2019-05-02 01:31:39.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1899 Remaining bytes=[43100], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:39.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189a Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90566], bytesOffset=[90568]}" -orderer0.example.com | "2019-05-02 01:31:39.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189b blockbytes [4048] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:39.684 UTC [common.deliver] deliverBlocks -> DEBU 189c [channel: businesschannel] Delivering block [7] for (0xc00110af40) for 192.168.240.9:47562" -orderer0.example.com | "2019-05-02 01:31:39.684 UTC [common.deliver] deliverBlocks -> DEBU 189d [channel: businesschannel] Done delivering to 192.168.240.9:47562 for (0xc00110af40)" -orderer0.example.com | "2019-05-02 01:31:39.684 UTC [common.deliver] Handle -> DEBU 189e Waiting for new SeekInfo from 192.168.240.9:47562" -orderer0.example.com | "2019-05-02 01:31:39.684 UTC [common.deliver] Handle -> DEBU 189f Attempting to read seek info message from 192.168.240.9:47562" -orderer0.example.com | "2019-05-02 01:31:39.685 UTC [fsblkstorage] waitForBlock -> DEBU 18a0 Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:39.685 UTC [fsblkstorage] waitForBlock -> DEBU 18a1 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:39.692 UTC [common.deliver] Handle -> WARN 18a2 Error reading from 192.168.240.9:47562: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:39.693 UTC [orderer.common.server] func1 -> DEBU 18a3 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:39.693 UTC [comm.grpc.server] 1 -> INFO 18a4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47562 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.805ms -orderer0.example.com | "2019-05-02 01:31:39.693 UTC [grpc] infof -> DEBU 18a5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:39.868 UTC [orderer.common.server] Deliver -> DEBU 18a6 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:39.868 UTC [common.deliver] Handle -> DEBU 18a7 Starting new deliver loop for 192.168.240.9:47564" -orderer0.example.com | "2019-05-02 01:31:39.868 UTC [common.deliver] Handle -> DEBU 18a8 Attempting to read seek info message from 192.168.240.9:47564" -orderer0.example.com | "2019-05-02 01:31:39.870 UTC [policies] Evaluate -> DEBU 18a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.870 UTC [policies] Evaluate -> DEBU 18aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:39.871 UTC [policies] Evaluate -> DEBU 18ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.526 UTC [gossip.gossip] handleMessage -> DEBU 1699 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.525 UTC [msp] DeserializeIdentity -> DEBU 1697 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 169a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 169c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.528 UTC [msp] DeserializeIdentity -> DEBU 169b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.529 UTC [msp] DeserializeIdentity -> DEBU 169d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.530 UTC [msp] DeserializeIdentity -> DEBU 169e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.530 UTC [msp] DeserializeIdentity -> DEBU 169f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.531 UTC [msp] DeserializeIdentity -> DEBU 16a0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.531 UTC [gossip.comm] Send -> DEBU 16a1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:03.532 UTC [gossip.comm] sendToEndpoint -> DEBU 16a2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.532 UTC [gossip.comm] sendToEndpoint -> DEBU 16a3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.532 UTC [msp] DeserializeIdentity -> DEBU 16a4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.534 UTC [msp] DeserializeIdentity -> DEBU 16a5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.535 UTC [gossip.comm] Send -> DEBU 16a6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:03.536 UTC [gossip.comm] sendToEndpoint -> DEBU 16a7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.536 UTC [gossip.comm] sendToEndpoint -> DEBU 16a8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.644 UTC [endorser] ProcessProposal -> DEBU 16a9 Entering: request from 192.168.240.9:41306" -peer0.org1.example.com | "2019-05-02 01:31:03.644 UTC [protoutils] ValidateProposalMessage -> DEBU 16aa ValidateProposalMessage starts for signed proposal 0xc003ae6960" -peer0.org1.example.com | "2019-05-02 01:31:03.645 UTC [protoutils] validateChannelHeader -> DEBU 16ab validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:03.645 UTC [protoutils] checkSignatureFromCreator -> DEBU 16ac begin" -peer0.org1.example.com | "2019-05-02 01:31:03.645 UTC [msp] GetManagerForChain -> DEBU 16ad Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:03.646 UTC [protoutils] checkSignatureFromCreator -> DEBU 16ae creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:03.646 UTC [protoutils] checkSignatureFromCreator -> DEBU 16af creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:03.646 UTC [msp.identity] Verify -> DEBU 16b0 Verify: digest = 00000000 a0 85 57 15 74 c5 2b cf 59 9b 77 3b d4 50 51 a4 |..W.t.+.Y.w;.PQ.| -peer0.org1.example.com | 00000010 6d 45 9e b5 d0 de d5 05 92 ea e2 87 51 a1 43 6d |mE..........Q.Cm|" -peer0.org1.example.com | "2019-05-02 01:31:03.646 UTC [msp.identity] Verify -> DEBU 16b1 Verify: sig = 00000000 30 45 02 21 00 84 49 fd 99 6c ed e9 b7 63 4b 91 |0E.!..I..l...cK.| -peer0.org1.example.com | 00000010 27 d7 c5 3e 59 b8 e4 fa 58 4b 31 8f e5 b3 ce 8a |'..>Y...XK1.....| -peer0.org1.example.com | 00000020 ad ec 76 37 9b 02 20 5f 88 84 11 46 59 fa e3 fb |..v7.. _...FY...| -peer0.org1.example.com | 00000030 53 e0 fc d1 e2 25 5e 2a f0 c0 46 ed 57 b0 bd e0 |S....%^*..F.W...| -peer0.org1.example.com | 00000040 01 c6 4d 05 16 60 39 |..M..`9|" -peer0.org1.example.com | "2019-05-02 01:31:03.647 UTC [protoutils] checkSignatureFromCreator -> DEBU 16b2 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:03.647 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 16b3 validateChaincodeProposalMessage starts for proposal 0xc002e3d500, header 0xc003ae6d70" -peer0.org1.example.com | "2019-05-02 01:31:03.647 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 16b4 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:03.647 UTC [endorser] preProcess -> DEBU 16b5 [businesschannel][c9936150] processing txid: c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf" -peer0.org1.example.com | "2019-05-02 01:31:03.648 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 16b6 retrieveTransactionByID() - txId = [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf]" -peer0.org1.example.com | "2019-05-02 01:31:03.648 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 16b7 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:03.648 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 16b8 constructing new tx simulator txid = [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf]" -peer0.org1.example.com | "2019-05-02 01:31:03.648 UTC [endorser] SimulateProposal -> DEBU 16b9 [businesschannel][c9936150] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:03.649 UTC [endorser] callChaincode -> INFO 16ba [businesschannel][c9936150] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:03.649 UTC [chaincode] Execute -> DEBU 16bb Entry" -peer0.org1.example.com | "2019-05-02 01:31:03.650 UTC [aclmgmt] CheckACL -> DEBU 16bc acl policy /Channel/Application/Writers found in config for resource _lifecycle/CommitChaincodeDefinition" -peer0.org1.example.com | "2019-05-02 01:31:03.650 UTC [aclmgmt] CheckACL -> DEBU 16bd acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-05-02 01:31:03.650 UTC [policies] Evaluate -> DEBU 16be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.650 UTC [policies] Evaluate -> DEBU 16bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:03.650 UTC [policies] Evaluate -> DEBU 16c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.650 UTC [cauthdsl] func1 -> DEBU 16c1 0xc003b62230 gate 1556760663650913100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:03.651 UTC [cauthdsl] func2 -> DEBU 16c2 0xc003b62230 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:03.651 UTC [cauthdsl] func2 -> DEBU 16c3 0xc003b62230 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:03.651 UTC [cauthdsl] func2 -> DEBU 16c4 0xc003b62230 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:03.652 UTC [msp.identity] Verify -> DEBU 16c5 Verify: digest = 00000000 a0 85 57 15 74 c5 2b cf 59 9b 77 3b d4 50 51 a4 |..W.t.+.Y.w;.PQ.| -peer0.org1.example.com | 00000010 6d 45 9e b5 d0 de d5 05 92 ea e2 87 51 a1 43 6d |mE..........Q.Cm|" -peer0.org1.example.com | "2019-05-02 01:31:03.652 UTC [msp.identity] Verify -> DEBU 16c6 Verify: sig = 00000000 30 45 02 21 00 84 49 fd 99 6c ed e9 b7 63 4b 91 |0E.!..I..l...cK.| -peer0.org1.example.com | 00000010 27 d7 c5 3e 59 b8 e4 fa 58 4b 31 8f e5 b3 ce 8a |'..>Y...XK1.....| -peer0.org1.example.com | 00000020 ad ec 76 37 9b 02 20 5f 88 84 11 46 59 fa e3 fb |..v7.. _...FY...| -peer0.org1.example.com | 00000030 53 e0 fc d1 e2 25 5e 2a f0 c0 46 ed 57 b0 bd e0 |S....%^*..F.W...| -peer0.org1.example.com | 00000040 01 c6 4d 05 16 60 39 |..M..`9|" -peer0.org1.example.com | "2019-05-02 01:31:03.652 UTC [cauthdsl] func2 -> DEBU 16c7 0xc003b62230 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:03.653 UTC [cauthdsl] func1 -> DEBU 16c8 0xc003b62230 gate 1556760663650913100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:03.653 UTC [policies] Evaluate -> DEBU 16c9 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:03.653 UTC [policies] Evaluate -> DEBU 16ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:03.654 UTC [policies] Evaluate -> DEBU 16cb Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:03.654 UTC [policies] Evaluate -> DEBU 16cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:03.654 UTC [lifecycle] CommitChaincodeDefinition -> DEBU 16cd received invocation of CommitChaincodeDefinition on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" -peer0.org1.example.com | "2019-05-02 01:31:03.655 UTC [chaincode] handleMessage -> DEBU 16ce [c9936150] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.655 UTC [chaincode] HandleTransaction -> DEBU 16cf [c9936150] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.655 UTC [chaincode] HandleGetState -> DEBU 16d0 [c9936150] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.656 UTC [stateleveldb] GetState -> DEBU 16d1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:03.656 UTC [chaincode] HandleGetState -> DEBU 16d2 [c9936150] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" -peer0.org1.example.com | "2019-05-02 01:31:03.656 UTC [chaincode] HandleTransaction -> DEBU 16d3 [c9936150] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.657 UTC [chaincode] handleMessage -> DEBU 16d4 [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.657 UTC [chaincode] HandleTransaction -> DEBU 16d5 [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.658 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16d6 [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.658 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 16d7 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -peer0.org1.example.com | "2019-05-02 01:31:03.658 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 16d8 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -peer0.org1.example.com | "2019-05-02 01:31:03.659 UTC [stateleveldb] GetState -> DEBU 16d9 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -peer0.org1.example.com | "2019-05-02 01:31:03.659 UTC [chaincode] HandleTransaction -> DEBU 16da [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.659 UTC [chaincode] handleMessage -> DEBU 16db [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.660 UTC [chaincode] HandleTransaction -> DEBU 16dc [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.660 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16dd [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.660 UTC [stateleveldb] GetState -> DEBU 16de GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" -peer0.org1.example.com | "2019-05-02 01:31:03.661 UTC [chaincode] HandleTransaction -> DEBU 16df [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.661 UTC [chaincode] handleMessage -> DEBU 16e0 [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.662 UTC [chaincode] HandleTransaction -> DEBU 16e1 [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.662 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16e2 [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.662 UTC [stateleveldb] GetState -> DEBU 16e3 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 16e4 [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.663 UTC [chaincode] handleMessage -> DEBU 16e5 [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.663 UTC [chaincode] HandleTransaction -> DEBU 16e6 [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.663 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16e7 [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.664 UTC [stateleveldb] GetState -> DEBU 16e8 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -peer0.org1.example.com | "2019-05-02 01:31:03.664 UTC [chaincode] HandleTransaction -> DEBU 16e9 [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.664 UTC [chaincode] handleMessage -> DEBU 16ea [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.664 UTC [chaincode] HandleTransaction -> DEBU 16eb [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.665 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16ec [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.665 UTC [stateleveldb] GetState -> DEBU 16ed GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" -peer0.org1.example.com | "2019-05-02 01:31:03.665 UTC [chaincode] HandleTransaction -> DEBU 16ee [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -orderer0.example.com | "2019-05-02 01:31:39.871 UTC [policies] Evaluate -> DEBU 18ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:39.872 UTC [policies] Evaluate -> DEBU 18ad == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:39.872 UTC [cauthdsl] func1 -> DEBU 18ae 0xc000c955d0 gate 1556760699872409800 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:39.872 UTC [cauthdsl] func2 -> DEBU 18af 0xc000c955d0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:39.872 UTC [cauthdsl] func2 -> DEBU 18b0 0xc000c955d0 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:39.873 UTC [cauthdsl] func2 -> DEBU 18b1 0xc000c955d0 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:39.873 UTC [msp.identity] Verify -> DEBU 18b2 Verify: digest = 00000000 7e ce c7 13 b6 27 ee 22 5c c2 ed db 01 74 67 48 |~....'."\....tgH| -orderer0.example.com | 00000010 83 6c 0b 59 eb c5 ef 4e c2 6b d9 12 e5 be eb f9 |.l.Y...N.k......|" -orderer0.example.com | "2019-05-02 01:31:39.873 UTC [msp.identity] Verify -> DEBU 18b3 Verify: sig = 00000000 30 44 02 20 48 f9 f8 ac fa d4 a5 f0 ec d4 05 84 |0D. H...........| -orderer0.example.com | 00000010 5c 01 28 24 12 03 bc 48 a8 b3 e8 65 9c 67 6f 5c |\.($...H...e.go\| -orderer0.example.com | 00000020 41 27 bd e7 02 20 01 b0 f1 51 43 7a 81 53 d5 47 |A'... ...QCz.S.G| -orderer0.example.com | 00000030 5b ea 76 63 60 63 5c 44 27 45 6e a2 ed 74 47 fc |[.vc`c\D'En..tG.| -orderer0.example.com | 00000040 b5 d2 64 f8 28 a3 |..d.(.|" -orderer0.example.com | "2019-05-02 01:31:39.874 UTC [cauthdsl] func2 -> DEBU 18b4 0xc000c955d0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:39.874 UTC [cauthdsl] func1 -> DEBU 18b5 0xc000c955d0 gate 1556760699872409800 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:39.874 UTC [policies] Evaluate -> DEBU 18b6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:39.875 UTC [policies] Evaluate -> DEBU 18b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:39.875 UTC [policies] Evaluate -> DEBU 18b8 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:39.875 UTC [policies] Evaluate -> DEBU 18b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:39.876 UTC [policies] Evaluate -> DEBU 18ba Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:39.876 UTC [policies] Evaluate -> DEBU 18bb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:39.876 UTC [common.deliver] deliverBlocks -> DEBU 18bc [channel: businesschannel] Received seekInfo (0xc00110b5c0) start: > stop: > from 192.168.240.9:47564" -orderer0.example.com | "2019-05-02 01:31:39.877 UTC [fsblkstorage] Next -> DEBU 18bd Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:39.877 UTC [fsblkstorage] newBlockfileStream -> DEBU 18be newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94616]" -orderer0.example.com | "2019-05-02 01:31:39.877 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18bf Remaining bytes=[39050], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:39.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18c0 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[94616], bytesOffset=[94618]}" -orderer0.example.com | "2019-05-02 01:31:39.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18c1 blockbytes [4048] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:39.878 UTC [common.deliver] deliverBlocks -> DEBU 18c2 [channel: businesschannel] Delivering block [8] for (0xc00110b5c0) for 192.168.240.9:47564" -orderer0.example.com | "2019-05-02 01:31:39.879 UTC [common.deliver] deliverBlocks -> DEBU 18c3 [channel: businesschannel] Done delivering to 192.168.240.9:47564 for (0xc00110b5c0)" -orderer0.example.com | "2019-05-02 01:31:39.879 UTC [fsblkstorage] waitForBlock -> DEBU 18c4 Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:39.880 UTC [fsblkstorage] waitForBlock -> DEBU 18c5 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:39.880 UTC [common.deliver] Handle -> DEBU 18c6 Waiting for new SeekInfo from 192.168.240.9:47564" -orderer0.example.com | "2019-05-02 01:31:39.880 UTC [common.deliver] Handle -> DEBU 18c7 Attempting to read seek info message from 192.168.240.9:47564" -orderer0.example.com | "2019-05-02 01:31:39.887 UTC [common.deliver] Handle -> WARN 18c8 Error reading from 192.168.240.9:47564: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:39.888 UTC [orderer.common.server] func1 -> DEBU 18c9 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:39.888 UTC [comm.grpc.server] 1 -> INFO 18ca streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47564 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.1848ms -orderer0.example.com | "2019-05-02 01:31:39.888 UTC [grpc] infof -> DEBU 18cb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:39.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18cc Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs" -orderer0.example.com | "2019-05-02 01:31:40.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18cd Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" -orderer0.example.com | "2019-05-02 01:31:40.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.3µs " -orderer0.example.com | "2019-05-02 01:31:40.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.4µs " -orderer0.example.com | "2019-05-02 01:31:40.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18d0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:40.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18d1 Sending msg of 28 bytes to 3 on channel testchainid took 12.1µs" -orderer0.example.com | "2019-05-02 01:31:40.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18d2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.3µs " -orderer0.example.com | "2019-05-02 01:31:40.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18d3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:40.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18d4 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:40.055 UTC [orderer.common.server] Deliver -> DEBU 18d5 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:40.055 UTC [common.deliver] Handle -> DEBU 18d6 Starting new deliver loop for 192.168.240.9:47566" -orderer0.example.com | "2019-05-02 01:31:40.056 UTC [common.deliver] Handle -> DEBU 18d7 Attempting to read seek info message from 192.168.240.9:47566" -orderer0.example.com | "2019-05-02 01:31:40.058 UTC [policies] Evaluate -> DEBU 18d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.666 UTC [chaincode] handleMessage -> DEBU 16ef [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.666 UTC [chaincode] HandleTransaction -> DEBU 16f0 [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.666 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16f1 [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.667 UTC [stateleveldb] GetState -> DEBU 16f2 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" -peer0.org1.example.com | "2019-05-02 01:31:03.667 UTC [chaincode] HandleTransaction -> DEBU 16f3 [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.667 UTC [chaincode] handleMessage -> DEBU 16f4 [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.668 UTC [chaincode] HandleTransaction -> DEBU 16f5 [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.668 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16f6 [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.668 UTC [stateleveldb] GetState -> DEBU 16f7 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 16f8 [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.669 UTC [chaincode] handleMessage -> DEBU 16f9 [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.670 UTC [chaincode] HandleTransaction -> DEBU 16fa [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.670 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16fb [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.670 UTC [stateleveldb] GetState -> DEBU 16fc GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -peer0.org1.example.com | "2019-05-02 01:31:03.670 UTC [chaincode] HandleTransaction -> DEBU 16fd [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.671 UTC [lifecycle] QueryApprovalStatus -> INFO 16fe successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:03.671 UTC [chaincode] handleMessage -> DEBU 16ff [c9936150] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.672 UTC [chaincode] HandleTransaction -> DEBU 1700 [c9936150] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.672 UTC [chaincode] HandleGetState -> DEBU 1701 [c9936150] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.673 UTC [stateleveldb] GetState -> DEBU 1702 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -peer0.org1.example.com | "2019-05-02 01:31:03.673 UTC [chaincode] HandleGetState -> DEBU 1703 [c9936150] No state associated with key: namespaces/metadata/exp02. Sending RESPONSE with an empty payload" -peer0.org1.example.com | "2019-05-02 01:31:03.673 UTC [chaincode] HandleTransaction -> DEBU 1704 [c9936150] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.673 UTC [chaincode] handleMessage -> DEBU 1705 [c9936150] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.674 UTC [chaincode] HandleTransaction -> DEBU 1706 [c9936150] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.674 UTC [chaincode] HandleTransaction -> DEBU 1707 [c9936150] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.674 UTC [chaincode] handleMessage -> DEBU 1708 [c9936150] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.675 UTC [chaincode] HandleTransaction -> DEBU 1709 [c9936150] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.675 UTC [chaincode] HandleTransaction -> DEBU 170a [c9936150] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.675 UTC [chaincode] handleMessage -> DEBU 170b [c9936150] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.676 UTC [chaincode] HandleTransaction -> DEBU 170c [c9936150] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.676 UTC [chaincode] HandleTransaction -> DEBU 170d [c9936150] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.677 UTC [chaincode] handleMessage -> DEBU 170e [c9936150] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.677 UTC [chaincode] HandleTransaction -> DEBU 170f [c9936150] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.677 UTC [chaincode] HandleTransaction -> DEBU 1710 [c9936150] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.678 UTC [chaincode] handleMessage -> DEBU 1711 [c9936150] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.678 UTC [chaincode] HandleTransaction -> DEBU 1712 [c9936150] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:03.679 UTC [chaincode] HandleTransaction -> DEBU 1713 [c9936150] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:03.679 UTC [lifecycle] CommitChaincodeDefinition -> INFO 1714 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:03.679 UTC [chaincode] handleMessage -> DEBU 1715 [c9936150] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:03.680 UTC [chaincode] Notify -> DEBU 1716 [c9936150] notifying Txid:c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:03.680 UTC [chaincode] Execute -> DEBU 1717 Exit" -peer0.org1.example.com | "2019-05-02 01:31:03.680 UTC [endorser] callChaincode -> INFO 1718 [businesschannel][c9936150] Exit chaincode: name:"_lifecycle" (31ms)" -peer0.org1.example.com | "2019-05-02 01:31:03.680 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1719 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:03.681 UTC [lockbasedtxmgr] Done -> DEBU 171a Done with transaction simulation / query execution [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf]" -peer0.org1.example.com | "2019-05-02 01:31:03.681 UTC [endorser] SimulateProposal -> DEBU 171b [businesschannel][c9936150] Exit" -peer0.org1.example.com | "2019-05-02 01:31:03.681 UTC [endorser] endorseProposal -> DEBU 171c [businesschannel][c9936150] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:03.682 UTC [endorser] endorseProposal -> DEBU 171d [businesschannel][c9936150] escc for chaincode name:"_lifecycle" is escc" -orderer0.example.com | "2019-05-02 01:31:40.058 UTC [policies] Evaluate -> DEBU 18d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.058 UTC [policies] Evaluate -> DEBU 18da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.059 UTC [policies] Evaluate -> DEBU 18db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.059 UTC [policies] Evaluate -> DEBU 18dc == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.059 UTC [cauthdsl] func1 -> DEBU 18dd 0xc000b76260 gate 1556760700059647300 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:40.060 UTC [cauthdsl] func2 -> DEBU 18de 0xc000b76260 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:40.060 UTC [cauthdsl] func2 -> DEBU 18df 0xc000b76260 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:40.060 UTC [cauthdsl] func2 -> DEBU 18e0 0xc000b76260 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:40.061 UTC [msp.identity] Verify -> DEBU 18e1 Verify: digest = 00000000 ea 0e 51 b1 25 30 09 20 15 94 9a 26 55 2b 04 50 |..Q.%0. ...&U+.P| -orderer0.example.com | 00000010 ec ee a2 59 60 c6 1b 3d 03 23 57 ae c2 c7 4e 63 |...Y`..=.#W...Nc|" -orderer0.example.com | "2019-05-02 01:31:40.061 UTC [msp.identity] Verify -> DEBU 18e2 Verify: sig = 00000000 30 44 02 20 20 92 bf 40 c9 58 0f 6e 21 d6 97 50 |0D. ..@.X.n!..P| -orderer0.example.com | 00000010 36 29 ec 23 06 9c b3 ca 25 71 a9 48 83 2e 43 b7 |6).#....%q.H..C.| -orderer0.example.com | 00000020 f9 c4 16 dc 02 20 0f af 64 05 3c c4 a1 10 f0 46 |..... ..d.<....F| -orderer0.example.com | 00000030 9e a0 b2 53 e7 10 b6 5c 33 95 64 4d 02 01 98 c5 |...S...\3.dM....| -orderer0.example.com | 00000040 4f 06 e7 c3 ca c7 |O.....|" -orderer0.example.com | "2019-05-02 01:31:40.061 UTC [cauthdsl] func2 -> DEBU 18e3 0xc000b76260 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:40.062 UTC [cauthdsl] func1 -> DEBU 18e4 0xc000b76260 gate 1556760700059647300 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:40.062 UTC [policies] Evaluate -> DEBU 18e5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.062 UTC [policies] Evaluate -> DEBU 18e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.063 UTC [policies] Evaluate -> DEBU 18e7 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.064 UTC [policies] Evaluate -> DEBU 18e8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.064 UTC [policies] Evaluate -> DEBU 18e9 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.065 UTC [policies] Evaluate -> DEBU 18ea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.065 UTC [common.deliver] deliverBlocks -> DEBU 18eb [channel: businesschannel] Received seekInfo (0xc0001088c0) start: > stop: > from 192.168.240.9:47566" -orderer0.example.com | "2019-05-02 01:31:40.066 UTC [fsblkstorage] Next -> DEBU 18ec Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -orderer0.example.com | "2019-05-02 01:31:40.066 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ed newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -orderer0.example.com | "2019-05-02 01:31:40.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ee Remaining bytes=[35000], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:40.069 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ef Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -orderer0.example.com | "2019-05-02 01:31:40.070 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18f0 blockbytes [34997] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:40.071 UTC [common.deliver] deliverBlocks -> DEBU 18f1 [channel: businesschannel] Delivering block [9] for (0xc0001088c0) for 192.168.240.9:47566" -orderer0.example.com | "2019-05-02 01:31:40.071 UTC [common.deliver] deliverBlocks -> DEBU 18f2 [channel: businesschannel] Done delivering to 192.168.240.9:47566 for (0xc0001088c0)" -orderer0.example.com | "2019-05-02 01:31:40.072 UTC [fsblkstorage] waitForBlock -> DEBU 18f3 Came out of wait. maxAvailaBlockNumber=[9]" -orderer0.example.com | "2019-05-02 01:31:40.073 UTC [fsblkstorage] waitForBlock -> DEBU 18f4 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -orderer0.example.com | "2019-05-02 01:31:40.073 UTC [common.deliver] Handle -> DEBU 18f5 Waiting for new SeekInfo from 192.168.240.9:47566" -orderer0.example.com | "2019-05-02 01:31:40.073 UTC [common.deliver] Handle -> DEBU 18f6 Attempting to read seek info message from 192.168.240.9:47566" -orderer0.example.com | "2019-05-02 01:31:40.088 UTC [common.deliver] Handle -> WARN 18f7 Error reading from 192.168.240.9:47566: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:40.088 UTC [orderer.common.server] func1 -> DEBU 18f8 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:40.089 UTC [comm.grpc.server] 1 -> INFO 18f9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47566 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.2425ms -orderer0.example.com | "2019-05-02 01:31:40.090 UTC [grpc] infof -> DEBU 18fa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:40.276 UTC [orderer.common.server] Deliver -> DEBU 18fb Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:40.276 UTC [common.deliver] Handle -> DEBU 18fc Starting new deliver loop for 192.168.240.9:47568" -orderer0.example.com | "2019-05-02 01:31:40.276 UTC [common.deliver] Handle -> DEBU 18fd Attempting to read seek info message from 192.168.240.9:47568" -orderer0.example.com | "2019-05-02 01:31:40.277 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.277 UTC [policies] Evaluate -> DEBU 18ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.278 UTC [policies] Evaluate -> DEBU 1900 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.278 UTC [policies] Evaluate -> DEBU 1901 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.278 UTC [policies] Evaluate -> DEBU 1902 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.278 UTC [cauthdsl] func1 -> DEBU 1903 0xc00046d270 gate 1556760700278951500 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:40.279 UTC [cauthdsl] func2 -> DEBU 1904 0xc00046d270 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:40.279 UTC [cauthdsl] func2 -> DEBU 1905 0xc00046d270 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:40.279 UTC [cauthdsl] func2 -> DEBU 1906 0xc00046d270 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:40.280 UTC [msp.identity] Verify -> DEBU 1907 Verify: digest = 00000000 72 04 71 fb 77 ea 2a 61 02 39 34 49 43 f0 b9 0d |r.q.w.*a.94IC...| -orderer0.example.com | 00000010 0d ef b3 36 03 5a 1a 6d f7 88 bc ab 68 9f 0c 0f |...6.Z.m....h...|" -orderer0.example.com | "2019-05-02 01:31:40.280 UTC [msp.identity] Verify -> DEBU 1908 Verify: sig = 00000000 30 45 02 21 00 f5 5f 3a 0a d4 fc 82 20 d9 d0 6d |0E.!.._:.... ..m| -orderer0.example.com | 00000010 bd 80 c0 35 d9 cd b8 60 2e 60 72 1a ce 9b 2f c6 |...5...`.`r.../.| -peer0.org1.example.com | "2019-05-02 01:31:03.682 UTC [endorser] EndorseWithPlugin -> DEBU 171e Entering endorsement for {plugin: escc, channel: businesschannel, tx: c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, chaincode: _lifecycle}" -peer0.org1.example.com | "2019-05-02 01:31:03.682 UTC [msp.identity] Sign -> DEBU 171f Sign: plaintext: 0A20B52222B2019A87A07F56E111E11B...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:03.683 UTC [msp.identity] Sign -> DEBU 1720 Sign: digest: 57ED09C5E0F901196CCD8E7D83214FC80C989F13C0EEAC98EFE5270E3E41AD4A " -peer0.org1.example.com | "2019-05-02 01:31:03.683 UTC [endorser] EndorseWithPlugin -> DEBU 1721 Exiting {plugin: escc, channel: businesschannel, tx: c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, chaincode: _lifecycle}" -peer0.org1.example.com | "2019-05-02 01:31:03.683 UTC [endorser] endorseProposal -> DEBU 1722 [businesschannel][c9936150] Exit" -peer0.org1.example.com | "2019-05-02 01:31:03.683 UTC [lockbasedtxmgr] Done -> DEBU 1723 Done with transaction simulation / query execution [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf]" -peer0.org1.example.com | "2019-05-02 01:31:03.684 UTC [endorser] func1 -> DEBU 1724 Exit: request from 192.168.240.9:41306" -peer0.org1.example.com | "2019-05-02 01:31:03.684 UTC [comm.grpc.server] 1 -> INFO 1725 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41306 grpc.code=OK grpc.call_duration=40.2822ms -peer0.org1.example.com | "2019-05-02 01:31:03.721 UTC [common.deliverevents] DeliverFiltered -> DEBU 1726 Starting new DeliverFiltered handler" -peer0.org1.example.com | "2019-05-02 01:31:03.724 UTC [msp.identity] Sign -> DEBU 1727 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151017 " -peer0.org1.example.com | "2019-05-02 01:31:03.724 UTC [msp.identity] Sign -> DEBU 1728 Sign: digest: 3F234E161921E5608E1E06847E3667D4F5934CB32189FAE241C31E2D33141BCD " -peer0.org1.example.com | "2019-05-02 01:31:03.724 UTC [msp.identity] Sign -> DEBU 1729 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:03.724 UTC [msp.identity] Sign -> DEBU 172a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:03.726 UTC [gossip.discovery] periodicalSendAlive -> DEBU 172b Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:03.728 UTC [msp] DeserializeIdentity -> DEBU 172c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.721 UTC [common.deliver] Handle -> DEBU 172d Starting new deliver loop for 192.168.240.9:41308" -peer0.org1.example.com | "2019-05-02 01:31:03.732 UTC [common.deliver] Handle -> DEBU 172f Attempting to read seek info message from 192.168.240.9:41308" -peer0.org1.example.com | "2019-05-02 01:31:03.733 UTC [aclmgmt] CheckACL -> DEBU 1730 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" -peer0.org1.example.com | "2019-05-02 01:31:03.734 UTC [aclmgmt] CheckACL -> DEBU 1731 acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-05-02 01:31:03.730 UTC [msp] DeserializeIdentity -> DEBU 172e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.737 UTC [msp] DeserializeIdentity -> DEBU 1732 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.738 UTC [gossip.comm] Send -> DEBU 1733 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:03.738 UTC [policies] Evaluate -> DEBU 1734 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.741 UTC [policies] Evaluate -> DEBU 1735 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:03.741 UTC [policies] Evaluate -> DEBU 1736 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.742 UTC [gossip.comm] Send -> DEBU 1737 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:03.742 UTC [msp] DeserializeIdentity -> DEBU 1738 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.742 UTC [gossip.comm] Send -> DEBU 1739 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func1 -> DEBU 173a 0xc003bb2b70 gate 1556760663742017700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 173b 0xc003bb2b70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 173c 0xc003bb2b70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 173d 0xc003bb2b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 173e 0xc003bb2b70 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func1 -> DEBU 173f 0xc003bb2b70 gate 1556760663742017700 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [policies] Evaluate -> DEBU 1740 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [policies] Evaluate -> DEBU 1741 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [policies] Evaluate -> DEBU 1742 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func1 -> DEBU 1743 0xc003bb33b0 gate 1556760663743394900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 1744 0xc003bb33b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 1745 0xc003bb33b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 1746 0xc003bb33b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [msp.identity] Verify -> DEBU 1747 Verify: digest = 00000000 8e 60 8b 21 62 de f4 4e 03 c9 f6 03 61 f4 4e e8 |.`.!b..N....a.N.| -peer0.org1.example.com | 00000010 3d 67 ef b4 3c f5 17 2b 20 54 69 73 96 7f 64 70 |=g..<..+ Tis..dp|" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [msp.identity] Verify -> DEBU 1748 Verify: sig = 00000000 30 45 02 21 00 ec f0 74 71 94 af f3 50 b2 5f c0 |0E.!...tq...P._.| -peer0.org1.example.com | 00000010 5f 66 9f f6 74 f7 73 03 80 d5 17 50 6e e5 45 03 |_f..t.s....Pn.E.| -peer0.org1.example.com | 00000020 5a 9f 58 9e 57 02 20 3c dd 8b f8 eb bc 7e c5 4b |Z.X.W. <.....~.K| -peer0.org1.example.com | 00000030 b6 07 d7 91 3d f4 d3 30 58 2c 9a 0f ca af 15 1c |....=..0X,......| -peer0.org1.example.com | 00000040 8f 69 11 95 3d fa 1f |.i..=..|" -peer0.org1.example.com | "2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 1749 0xc003bb33b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [cauthdsl] func1 -> DEBU 174a 0xc003bb33b0 gate 1556760663743394900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [policies] Evaluate -> DEBU 174b Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | 00000020 56 54 82 31 16 02 20 3b ae aa 0c b8 3b cb 28 63 |VT.1.. ;....;.(c| -orderer0.example.com | 00000030 b8 ad 35 42 48 7e 84 2f ef 2a ad d1 66 5f e4 e9 |..5BH~./.*..f_..| -orderer0.example.com | 00000040 fa bc 7a a6 88 80 22 |..z..."|" -orderer0.example.com | "2019-05-02 01:31:40.281 UTC [cauthdsl] func2 -> DEBU 1909 0xc00046d270 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:40.281 UTC [cauthdsl] func1 -> DEBU 190a 0xc00046d270 gate 1556760700278951500 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:40.281 UTC [policies] Evaluate -> DEBU 190b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.282 UTC [policies] Evaluate -> DEBU 190c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.282 UTC [policies] Evaluate -> DEBU 190d Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.282 UTC [policies] Evaluate -> DEBU 190e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.282 UTC [policies] Evaluate -> DEBU 190f Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.283 UTC [policies] Evaluate -> DEBU 1910 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.283 UTC [common.deliver] deliverBlocks -> DEBU 1911 [channel: testchainid] Received seekInfo (0xc000109cc0) start: > stop: > from 192.168.240.9:47568" -orderer0.example.com | "2019-05-02 01:31:40.283 UTC [fsblkstorage] Next -> DEBU 1912 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:31:40.283 UTC [fsblkstorage] newBlockfileStream -> DEBU 1913 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -orderer0.example.com | "2019-05-02 01:31:40.284 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1914 Remaining bytes=[25827], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:40.284 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1915 Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -orderer0.example.com | "2019-05-02 01:31:40.284 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1916 blockbytes [25824] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:40.285 UTC [common.deliver] deliverBlocks -> DEBU 1917 [channel: testchainid] Delivering block [1] for (0xc000109cc0) for 192.168.240.9:47568" -orderer0.example.com | "2019-05-02 01:31:40.285 UTC [common.deliver] deliverBlocks -> DEBU 1918 [channel: testchainid] Done delivering to 192.168.240.9:47568 for (0xc000109cc0)" -orderer0.example.com | "2019-05-02 01:31:40.286 UTC [common.deliver] Handle -> DEBU 1919 Waiting for new SeekInfo from 192.168.240.9:47568" -orderer0.example.com | "2019-05-02 01:31:40.286 UTC [common.deliver] Handle -> DEBU 191a Attempting to read seek info message from 192.168.240.9:47568" -orderer0.example.com | "2019-05-02 01:31:40.292 UTC [common.deliver] Handle -> WARN 191b Error reading from 192.168.240.9:47568: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:40.292 UTC [orderer.common.server] func1 -> DEBU 191c Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:40.293 UTC [comm.grpc.server] 1 -> INFO 191d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47568 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.6285ms -orderer0.example.com | "2019-05-02 01:31:40.294 UTC [grpc] infof -> DEBU 191e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:40.456 UTC [orderer.common.server] Deliver -> DEBU 191f Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:40.456 UTC [common.deliver] Handle -> DEBU 1920 Starting new deliver loop for 192.168.240.9:47570" -orderer0.example.com | "2019-05-02 01:31:40.457 UTC [common.deliver] Handle -> DEBU 1921 Attempting to read seek info message from 192.168.240.9:47570" -orderer0.example.com | "2019-05-02 01:31:40.461 UTC [policies] Evaluate -> DEBU 1922 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.462 UTC [policies] Evaluate -> DEBU 1923 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.463 UTC [policies] Evaluate -> DEBU 1924 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.463 UTC [policies] Evaluate -> DEBU 1925 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.464 UTC [policies] Evaluate -> DEBU 1926 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.464 UTC [cauthdsl] func1 -> DEBU 1927 0xc000383c20 gate 1556760700464843500 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:40.465 UTC [cauthdsl] func2 -> DEBU 1928 0xc000383c20 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:40.465 UTC [cauthdsl] func2 -> DEBU 1929 0xc000383c20 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:40.466 UTC [cauthdsl] func2 -> DEBU 192a 0xc000383c20 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:40.466 UTC [msp.identity] Verify -> DEBU 192b Verify: digest = 00000000 99 96 2d 44 b1 b7 0c 43 63 a0 8b 82 75 a1 5c 58 |..-D...Cc...u.\X| -orderer0.example.com | 00000010 3f ca 07 3f 63 3f 99 35 2f a2 1f 56 16 7b 68 fa |?..?c?.5/..V.{h.|" -orderer0.example.com | "2019-05-02 01:31:40.467 UTC [msp.identity] Verify -> DEBU 192c Verify: sig = 00000000 30 45 02 21 00 e1 a5 83 60 b6 22 03 a6 8a cf ab |0E.!....`.".....| -orderer0.example.com | 00000010 2a a0 05 73 4f 2b 48 be fe c0 2d 55 be db b5 06 |*..sO+H...-U....| -orderer0.example.com | 00000020 2d d9 66 f7 5a 02 20 31 88 3a 72 34 48 66 37 91 |-.f.Z. 1.:r4Hf7.| -orderer0.example.com | 00000030 95 7a 53 fe 6e 1c ec 5a fe ff 27 cb e1 01 6e 51 |.zS.n..Z..'...nQ| -orderer0.example.com | 00000040 f4 37 e6 4b 64 c6 5c |.7.Kd.\|" -orderer0.example.com | "2019-05-02 01:31:40.468 UTC [cauthdsl] func2 -> DEBU 192d 0xc000383c20 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:40.468 UTC [cauthdsl] func1 -> DEBU 192e 0xc000383c20 gate 1556760700464843500 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:40.468 UTC [policies] Evaluate -> DEBU 192f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.469 UTC [policies] Evaluate -> DEBU 1930 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.469 UTC [policies] Evaluate -> DEBU 1931 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.469 UTC [policies] Evaluate -> DEBU 1932 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.469 UTC [policies] Evaluate -> DEBU 1933 Signature set satisfies policy /Channel/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [policies] Evaluate -> DEBU 174c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [policies] Evaluate -> DEBU 174d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [policies] Evaluate -> DEBU 174e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [common.deliver] deliverBlocks -> DEBU 174f [channel: businesschannel] Received seekInfo (0xc003a19f00) start: > stop: > from 192.168.240.9:41308" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [fsblkstorage] Next -> DEBU 1750 Initializing block stream for iterator. itr.maxBlockNumAvailable=4" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [fsblkstorage] newBlockfileStream -> DEBU 1751 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[76086]" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1752 Remaining bytes=[4711], Going to peek [8] bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1753 Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[76086], bytesOffset=[76088]}" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1754 blockbytes [4709] read from file [0]" -peer0.org1.example.com | "2019-05-02 01:31:03.744 UTC [common.deliver] deliverBlocks -> DEBU 1755 [channel: businesschannel] Delivering block [4] for (0xc003a19f00) for 192.168.240.9:41308" -peer0.org1.example.com | "2019-05-02 01:31:03.745 UTC [fsblkstorage] waitForBlock -> DEBU 1756 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" -peer0.org1.example.com | "2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 1757 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 1758 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 1759 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 175a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 175b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 175c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.766 UTC [gossip.comm] func1 -> DEBU 175d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.766 UTC [gossip.gossip] handleMessage -> DEBU 175e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.768 UTC [gossip.gossip] handleMessage -> DEBU 175f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.768 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1760 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.768 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1761 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:03.770 UTC [msp.identity] Verify -> DEBU 1762 Verify: digest = 00000000 3f 23 4e 16 19 21 e5 60 8e 1e 06 84 7e 36 67 d4 |?#N..!.`....~6g.| -peer0.org1.example.com | 00000010 f5 93 4c b3 21 89 fa e2 41 c3 1e 2d 33 14 1b cd |..L.!...A..-3...|" -peer0.org1.example.com | "2019-05-02 01:31:03.771 UTC [msp.identity] Verify -> DEBU 1763 Verify: sig = 00000000 30 44 02 20 5f 64 7e bd 80 78 50 42 08 0f a9 f4 |0D. _d~..xPB....| -peer0.org1.example.com | 00000010 5f 9a f2 d6 2f 03 dd fb ca 8a 91 73 29 37 b4 46 |_.../......s)7.F| -peer0.org1.example.com | 00000020 4b 6f de 70 02 20 6e 05 5f 55 21 18 84 27 07 0f |Ko.p. n._U!..'..| -peer0.org1.example.com | 00000030 ad 20 e3 d6 2b b0 89 be 62 99 40 c9 dc 4f a2 65 |. ..+...b.@..O.e| -peer0.org1.example.com | 00000040 2f 50 f6 ec 51 f2 |/P..Q.|" -peer0.org1.example.com | "2019-05-02 01:31:03.772 UTC [gossip.discovery] isSentByMe -> DEBU 1764 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1765 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.839 UTC [gossip.comm] func1 -> DEBU 1766 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.841 UTC [gossip.gossip] handleMessage -> DEBU 1767 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.842 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1768 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.842 UTC [gossip.gossip] handleMessage -> DEBU 1769 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.842 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 176a Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:03.842 UTC [msp] DeserializeIdentity -> DEBU 176b Obtaining identity" -orderer0.example.com | "2019-05-02 01:31:40.470 UTC [policies] Evaluate -> DEBU 1934 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.470 UTC [common.deliver] deliverBlocks -> DEBU 1935 [channel: testchainid] Received seekInfo (0xc00017e640) start: > stop: > from 192.168.240.9:47570" -orderer0.example.com | "2019-05-02 01:31:40.471 UTC [fsblkstorage] Next -> DEBU 1936 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:31:40.471 UTC [fsblkstorage] newBlockfileStream -> DEBU 1937 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -peer0.org1.example.com | "2019-05-02 01:31:03.843 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 176c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:03.843 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 176d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:03.843 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 176e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:03.845 UTC [policies] Evaluate -> DEBU 176f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.845 UTC [policies] Evaluate -> DEBU 1770 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:03.846 UTC [policies] Evaluate -> DEBU 1771 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:03.846 UTC [cauthdsl] func1 -> DEBU 1772 0xc003bc9860 gate 1556760663846784700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:03.850 UTC [cauthdsl] func2 -> DEBU 1774 0xc003bc9860 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:03.849 UTC [gossip.gossip] handleMessage -> DEBU 1773 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.850 UTC [cauthdsl] func2 -> DEBU 1775 0xc003bc9860 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:03.855 UTC [cauthdsl] func2 -> DEBU 1776 0xc003bc9860 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:03.856 UTC [msp.identity] Verify -> DEBU 1777 Verify: digest = 00000000 f0 38 5e 45 f9 30 3e 0f 36 45 62 d2 55 db ce b8 |.8^E.0>.6Eb.U...| -peer0.org1.example.com | 00000010 88 c9 dd a9 46 42 19 5c 8b 96 66 52 a9 98 64 07 |....FB.\..fR..d.|" -peer0.org1.example.com | "2019-05-02 01:31:03.856 UTC [msp.identity] Verify -> DEBU 1778 Verify: sig = 00000000 30 45 02 21 00 c8 d5 6d 45 fc e5 31 60 bc b3 9f |0E.!...mE..1`...| -peer0.org1.example.com | 00000010 e7 22 63 75 10 74 2b 9e 03 ed 45 5d 8d 1b 72 9e |."cu.t+...E]..r.| -peer0.org1.example.com | 00000020 e2 4c 6b a4 85 02 20 63 4e 9d 10 86 9e 97 09 45 |.Lk... cN......E| -peer0.org1.example.com | 00000030 d0 22 ef b1 80 79 d2 44 a7 7a 58 42 fc 05 3f 0d |."...y.D.zXB..?.| -peer0.org1.example.com | 00000040 77 f9 b5 c2 3d 6a 2e |w...=j.|" -peer0.org1.example.com | "2019-05-02 01:31:03.861 UTC [cauthdsl] func2 -> DEBU 1779 0xc003bc9860 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:03.862 UTC [cauthdsl] func1 -> DEBU 177a 0xc003bc9860 gate 1556760663846784700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:03.862 UTC [policies] Evaluate -> DEBU 177b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.864 UTC [policies] Evaluate -> DEBU 177c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.870 UTC [policies] Evaluate -> DEBU 177d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.871 UTC [policies] Evaluate -> DEBU 177e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:03.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 177f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 1781 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:03.873 UTC [gossip.comm] func1 -> DEBU 1780 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 1782 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 " -peer0.org1.example.com | "2019-05-02 01:31:03.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 1783 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 " -peer0.org1.example.com | "2019-05-02 01:31:03.885 UTC [gossip.discovery] learnExistingMembers -> DEBU 1784 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -orderer0.example.com | "2019-05-02 01:31:40.471 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1938 Remaining bytes=[25827], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:40.472 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1939 Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -orderer0.example.com | "2019-05-02 01:31:40.472 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 193a blockbytes [25824] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:40.473 UTC [common.deliver] deliverBlocks -> DEBU 193b [channel: testchainid] Delivering block [1] for (0xc00017e640) for 192.168.240.9:47570" -orderer0.example.com | "2019-05-02 01:31:40.473 UTC [common.deliver] deliverBlocks -> DEBU 193c [channel: testchainid] Done delivering to 192.168.240.9:47570 for (0xc00017e640)" -orderer0.example.com | "2019-05-02 01:31:40.474 UTC [common.deliver] Handle -> DEBU 193d Waiting for new SeekInfo from 192.168.240.9:47570" -orderer0.example.com | "2019-05-02 01:31:40.475 UTC [common.deliver] Handle -> DEBU 193e Attempting to read seek info message from 192.168.240.9:47570" -orderer0.example.com | "2019-05-02 01:31:40.476 UTC [policies] Evaluate -> DEBU 193f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.477 UTC [policies] Evaluate -> DEBU 1940 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.477 UTC [policies] Evaluate -> DEBU 1941 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.477 UTC [policies] Evaluate -> DEBU 1942 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.477 UTC [policies] Evaluate -> DEBU 1943 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.478 UTC [cauthdsl] func1 -> DEBU 1944 0xc000439550 gate 1556760700478059600 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:40.478 UTC [cauthdsl] func2 -> DEBU 1945 0xc000439550 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:40.478 UTC [cauthdsl] func2 -> DEBU 1946 0xc000439550 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:40.478 UTC [cauthdsl] func2 -> DEBU 1947 0xc000439550 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:40.479 UTC [msp.identity] Verify -> DEBU 1948 Verify: digest = 00000000 7b 97 5a 38 4b 9d ea a3 5e 47 45 4c 42 0e 27 2e |{.Z8K...^GELB.'.| -orderer0.example.com | 00000010 64 2c c0 d5 a9 ed fc fe 52 d3 3e 76 50 d7 38 af |d,......R.>vP.8.|" -orderer0.example.com | "2019-05-02 01:31:40.479 UTC [msp.identity] Verify -> DEBU 1949 Verify: sig = 00000000 30 44 02 20 67 d5 c5 d0 46 62 39 1d 94 a9 73 b4 |0D. g...Fb9...s.| -orderer0.example.com | 00000010 2e 82 39 09 1d aa ca 69 7d 01 f1 ee 57 32 41 97 |..9....i}...W2A.| -orderer0.example.com | 00000020 55 c4 cd 9f 02 20 57 c4 ff ec 0d d6 1a 6a ab 72 |U.... W......j.r| -orderer0.example.com | 00000030 e3 1d 93 47 16 70 5e d7 d9 63 66 51 1a 6d e8 91 |...G.p^..cfQ.m..| -orderer0.example.com | 00000040 af 2b 4e 1b 37 e0 |.+N.7.|" -orderer0.example.com | "2019-05-02 01:31:40.479 UTC [cauthdsl] func2 -> DEBU 194a 0xc000439550 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:40.479 UTC [cauthdsl] func1 -> DEBU 194b 0xc000439550 gate 1556760700478059600 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 194c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 194d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 194e Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 194f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 1950 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 1951 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.481 UTC [common.deliver] deliverBlocks -> DEBU 1952 [channel: testchainid] Received seekInfo (0xc00017eb40) start: > stop: > from 192.168.240.9:47570" -orderer0.example.com | "2019-05-02 01:31:40.481 UTC [fsblkstorage] Next -> DEBU 1953 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:31:40.481 UTC [fsblkstorage] newBlockfileStream -> DEBU 1954 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:31:40.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1955 Remaining bytes=[44242], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:40.482 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1956 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:31:40.482 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1957 blockbytes [18412] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:40.482 UTC [common.deliver] deliverBlocks -> DEBU 1958 [channel: testchainid] Delivering block [0] for (0xc00017eb40) for 192.168.240.9:47570" -orderer0.example.com | "2019-05-02 01:31:40.482 UTC [common.deliver] deliverBlocks -> DEBU 1959 [channel: testchainid] Done delivering to 192.168.240.9:47570 for (0xc00017eb40)" -orderer0.example.com | "2019-05-02 01:31:40.483 UTC [common.deliver] Handle -> DEBU 195a Waiting for new SeekInfo from 192.168.240.9:47570" -orderer0.example.com | "2019-05-02 01:31:40.483 UTC [common.deliver] Handle -> DEBU 195b Attempting to read seek info message from 192.168.240.9:47570" -orderer0.example.com | "2019-05-02 01:31:40.491 UTC [common.deliver] Handle -> WARN 195c Error reading from 192.168.240.9:47570: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:40.491 UTC [orderer.common.server] func1 -> DEBU 195d Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:40.492 UTC [comm.grpc.server] 1 -> INFO 195e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47570 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.7935ms -orderer0.example.com | "2019-05-02 01:31:40.492 UTC [grpc] infof -> DEBU 195f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:40.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1960 Sending msg of 28 bytes to 3 on channel businesschannel took 173.4µs" -orderer0.example.com | "2019-05-02 01:31:40.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1961 Sending msg of 28 bytes to 2 on channel businesschannel took 66.8µs" -orderer0.example.com | "2019-05-02 01:31:40.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1962 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.1596ms " -orderer0.example.com | "2019-05-02 01:31:40.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1965 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:40.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1966 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:40.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1963 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.3253ms " -peer0.org1.example.com | "2019-05-02 01:31:03.885 UTC [gossip.discovery] learnExistingMembers -> DEBU 1785 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.886 UTC [gossip.discovery] handleAliveMessage -> DEBU 1786 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.886 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1787 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1788 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.888 UTC [gossip.discovery] handleMsgFromComm -> DEBU 178a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.888 UTC [gossip.gossip] handleMessage -> DEBU 1789 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.888 UTC [gossip.gossip] handleMessage -> DEBU 178b Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.889 UTC [gossip.gossip] handleMessage -> DEBU 178c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.889 UTC [gossip.discovery] handleMsgFromComm -> DEBU 178d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.890 UTC [gossip.discovery] handleMsgFromComm -> DEBU 178e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.897 UTC [msp] DeserializeIdentity -> DEBU 178f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.897 UTC [msp] DeserializeIdentity -> DEBU 1790 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.898 UTC [msp] DeserializeIdentity -> DEBU 1791 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.898 UTC [msp] DeserializeIdentity -> DEBU 1792 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.899 UTC [msp] DeserializeIdentity -> DEBU 1793 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.899 UTC [msp] DeserializeIdentity -> DEBU 1794 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.899 UTC [msp] DeserializeIdentity -> DEBU 1795 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.900 UTC [gossip.comm] Send -> DEBU 1796 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:03.900 UTC [msp] DeserializeIdentity -> DEBU 1797 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:03.900 UTC [gossip.comm] Send -> DEBU 1798 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:03.900 UTC [gossip.comm] sendToEndpoint -> DEBU 1799 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.900 UTC [gossip.comm] sendToEndpoint -> DEBU 179a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:03.900 UTC [gossip.comm] sendToEndpoint -> DEBU 179b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:03.900 UTC [gossip.comm] sendToEndpoint -> DEBU 179c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.828 UTC [msp] DeserializeIdentity -> DEBU 179d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.828 UTC [msp] DeserializeIdentity -> DEBU 179e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.829 UTC [gossip.comm] Send -> DEBU 179f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:04.829 UTC [gossip.comm] sendToEndpoint -> DEBU 17a0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.830 UTC [gossip.comm] sendToEndpoint -> DEBU 17a1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.830 UTC [gossip.comm] sendToEndpoint -> DEBU 17a2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.830 UTC [gossip.comm] sendToEndpoint -> DEBU 17a3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.831 UTC [gossip.comm] sendToEndpoint -> DEBU 17a4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.831 UTC [gossip.comm] sendToEndpoint -> DEBU 17a5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.833 UTC [gossip.comm] func1 -> DEBU 17a6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.834 UTC [gossip.gossip] handleMessage -> DEBU 17a7 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.834 UTC [msp] DeserializeIdentity -> DEBU 17a8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.835 UTC [msp.identity] Verify -> DEBU 17a9 Verify: digest = 00000000 62 20 38 e5 ef a2 e5 f2 5a 12 9c 1c e0 ab b8 20 |b 8.....Z...... | -peer0.org1.example.com | 00000010 ee ef d0 09 80 93 8f 39 cd 56 59 46 37 7a ea 2c |.......9.VYF7z.,|" -peer0.org1.example.com | "2019-05-02 01:31:04.835 UTC [msp.identity] Verify -> DEBU 17aa Verify: sig = 00000000 30 45 02 21 00 a0 72 33 1f bf 7c 3f bc ad 89 09 |0E.!..r3..|?....| -peer0.org1.example.com | 00000010 4a c4 b6 ca 36 cf 5c e9 5d db 3d 4a 6b 26 e9 98 |J...6.\.].=Jk&..| -peer0.org1.example.com | 00000020 14 e5 c4 fd fc 02 20 2d 29 15 91 0c ae 2a 50 d6 |...... -)....*P.| -peer0.org1.example.com | 00000030 46 65 a1 7a 2e bf a4 c3 54 ae ad 60 6f db 12 70 |Fe.z....T..`o..p| -peer0.org1.example.com | 00000040 fe 4c a5 9a 6b 78 2b |.L..kx+|" -peer0.org1.example.com | "2019-05-02 01:31:04.836 UTC [msp.identity] Verify -> DEBU 17ab Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -peer0.org1.example.com | 00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -orderer0.example.com | "2019-05-02 01:31:40.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1964 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:40.509 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1967 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" -orderer0.example.com | "2019-05-02 01:31:40.511 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1968 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 660.8µs " -orderer0.example.com | "2019-05-02 01:31:40.639 UTC [orderer.common.server] Deliver -> DEBU 1969 Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:40.639 UTC [common.deliver] Handle -> DEBU 196a Starting new deliver loop for 192.168.240.9:47572" -orderer0.example.com | "2019-05-02 01:31:40.639 UTC [common.deliver] Handle -> DEBU 196b Attempting to read seek info message from 192.168.240.9:47572" -orderer0.example.com | "2019-05-02 01:31:40.640 UTC [policies] Evaluate -> DEBU 196c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.641 UTC [policies] Evaluate -> DEBU 196d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.641 UTC [policies] Evaluate -> DEBU 196e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.641 UTC [policies] Evaluate -> DEBU 196f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.641 UTC [policies] Evaluate -> DEBU 1970 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.641 UTC [cauthdsl] func1 -> DEBU 1971 0xc00048c170 gate 1556760700641590200 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:40.641 UTC [cauthdsl] func2 -> DEBU 1972 0xc00048c170 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:40.641 UTC [cauthdsl] func2 -> DEBU 1973 0xc00048c170 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:40.642 UTC [cauthdsl] func2 -> DEBU 1974 0xc00048c170 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:40.642 UTC [msp.identity] Verify -> DEBU 1975 Verify: digest = 00000000 52 f5 39 2f b0 39 f6 46 02 b1 bf 3a 75 b2 72 05 |R.9/.9.F...:u.r.| -orderer0.example.com | 00000010 b4 42 ce fb 81 6f ae 54 18 af 28 31 56 06 0d 3d |.B...o.T..(1V..=|" -orderer0.example.com | "2019-05-02 01:31:40.642 UTC [msp.identity] Verify -> DEBU 1976 Verify: sig = 00000000 30 44 02 20 29 e8 77 d0 78 b8 02 b3 33 df 28 34 |0D. ).w.x...3.(4| -orderer0.example.com | 00000010 c2 9f 1c 91 98 4c fb 95 9a 3f 18 72 83 16 21 48 |.....L...?.r..!H| -orderer0.example.com | 00000020 17 62 87 f0 02 20 23 37 83 d8 2c a7 73 f6 aa ad |.b... #7..,.s...| -orderer0.example.com | 00000030 54 f3 2c 09 6d 10 32 e6 9e ff 69 72 65 1e c9 13 |T.,.m.2...ire...| -orderer0.example.com | 00000040 cb 00 2c 86 81 c4 |..,...|" -orderer0.example.com | "2019-05-02 01:31:40.642 UTC [cauthdsl] func2 -> DEBU 1977 0xc00048c170 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:40.642 UTC [cauthdsl] func1 -> DEBU 1978 0xc00048c170 gate 1556760700641590200 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:40.642 UTC [policies] Evaluate -> DEBU 1979 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.642 UTC [policies] Evaluate -> DEBU 197a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.642 UTC [policies] Evaluate -> DEBU 197b Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.643 UTC [policies] Evaluate -> DEBU 197c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.643 UTC [policies] Evaluate -> DEBU 197d Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.643 UTC [policies] Evaluate -> DEBU 197e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.643 UTC [common.deliver] deliverBlocks -> DEBU 197f [channel: testchainid] Received seekInfo (0xc00017f300) start: > stop: > from 192.168.240.9:47572" -orderer0.example.com | "2019-05-02 01:31:40.643 UTC [fsblkstorage] Next -> DEBU 1980 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:31:40.643 UTC [fsblkstorage] newBlockfileStream -> DEBU 1981 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-05-02 01:31:40.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1982 Remaining bytes=[44242], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:40.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1983 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-05-02 01:31:40.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1984 blockbytes [18412] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:40.644 UTC [common.deliver] deliverBlocks -> DEBU 1985 [channel: testchainid] Delivering block [0] for (0xc00017f300) for 192.168.240.9:47572" -orderer0.example.com | "2019-05-02 01:31:40.645 UTC [common.deliver] deliverBlocks -> DEBU 1986 [channel: testchainid] Done delivering to 192.168.240.9:47572 for (0xc00017f300)" -orderer0.example.com | "2019-05-02 01:31:40.645 UTC [common.deliver] Handle -> DEBU 1987 Waiting for new SeekInfo from 192.168.240.9:47572" -orderer0.example.com | "2019-05-02 01:31:40.645 UTC [common.deliver] Handle -> DEBU 1988 Attempting to read seek info message from 192.168.240.9:47572" -orderer0.example.com | "2019-05-02 01:31:40.652 UTC [grpc] infof -> DEBU 1989 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:40.652 UTC [common.deliver] Handle -> WARN 198a Error reading from 192.168.240.9:47572: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:40.652 UTC [orderer.common.server] func1 -> DEBU 198b Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:40.653 UTC [comm.grpc.server] 1 -> INFO 198c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47572 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.9752ms -orderer0.example.com | "2019-05-02 01:31:40.693 UTC [orderer.common.server] replicateDisabledChains -> DEBU 198d No inactive chains to try to replicate" -orderer0.example.com | "2019-05-02 01:31:40.865 UTC [orderer.common.server] Deliver -> DEBU 198e Starting new Deliver handler" -orderer0.example.com | "2019-05-02 01:31:40.865 UTC [common.deliver] Handle -> DEBU 198f Starting new deliver loop for 192.168.240.9:47574" -orderer0.example.com | "2019-05-02 01:31:40.866 UTC [common.deliver] Handle -> DEBU 1990 Attempting to read seek info message from 192.168.240.9:47574" -orderer0.example.com | "2019-05-02 01:31:40.867 UTC [policies] Evaluate -> DEBU 1991 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 1992 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 1993 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 1994 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 1995 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.836 UTC [msp.identity] Verify -> DEBU 17ac Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -peer0.org1.example.com | 00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -peer0.org1.example.com | 00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -peer0.org1.example.com | 00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -peer0.org1.example.com | 00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -peer0.org1.example.com | "2019-05-02 01:31:04.837 UTC [msp] DeserializeIdentity -> DEBU 17ad Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.837 UTC [msp] DeserializeIdentity -> DEBU 17ae Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.838 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:04.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17b0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17b1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.839 UTC [policies] Evaluate -> DEBU 17b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.839 UTC [policies] Evaluate -> DEBU 17b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:04.840 UTC [policies] Evaluate -> DEBU 17b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.840 UTC [cauthdsl] func1 -> DEBU 17b6 0xc003c3c8e0 gate 1556760664840387300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:04.839 UTC [msp] DeserializeIdentity -> DEBU 17b4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.841 UTC [cauthdsl] func2 -> DEBU 17b7 0xc003c3c8e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:04.842 UTC [cauthdsl] func2 -> DEBU 17b9 0xc003c3c8e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:04.843 UTC [cauthdsl] func2 -> DEBU 17ba 0xc003c3c8e0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.843 UTC [msp.identity] Verify -> DEBU 17bb Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -peer0.org1.example.com | 00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -peer0.org1.example.com | "2019-05-02 01:31:04.843 UTC [msp.identity] Verify -> DEBU 17bc Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -peer0.org1.example.com | 00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -peer0.org1.example.com | 00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -peer0.org1.example.com | 00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -peer0.org1.example.com | 00000040 58 07 a6 98 8c c7 |X.....|" -peer0.org1.example.com | "2019-05-02 01:31:04.844 UTC [cauthdsl] func2 -> DEBU 17bd 0xc003c3c8e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.844 UTC [cauthdsl] func1 -> DEBU 17be 0xc003c3c8e0 gate 1556760664840387300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:04.845 UTC [policies] Evaluate -> DEBU 17bf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.845 UTC [policies] Evaluate -> DEBU 17c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.845 UTC [policies] Evaluate -> DEBU 17c1 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.845 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.846 UTC [msp] DeserializeIdentity -> DEBU 17c3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.846 UTC [msp] DeserializeIdentity -> DEBU 17c4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.847 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17c5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:04.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17c6 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17c7 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.847 UTC [policies] Evaluate -> DEBU 17c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.848 UTC [policies] Evaluate -> DEBU 17c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:04.848 UTC [policies] Evaluate -> DEBU 17ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.848 UTC [cauthdsl] func1 -> DEBU 17cb 0xc003c56120 gate 1556760664848473600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:04.849 UTC [cauthdsl] func2 -> DEBU 17cc 0xc003c56120 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:04.849 UTC [cauthdsl] func2 -> DEBU 17cd 0xc003c56120 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:04.842 UTC [gossip.comm] func1 -> DEBU 17b8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.855 UTC [cauthdsl] func2 -> DEBU 17ce 0xc003c56120 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.857 UTC [msp.identity] Verify -> DEBU 17cf Verify: digest = 00000000 6e b0 75 c4 51 40 0e aa 99 5b d4 4c e9 2b e8 4b |n.u.Q@...[.L.+.K| -peer0.org1.example.com | 00000010 ef 3b fb 35 be f1 cd 9c a2 03 51 d3 59 0e 44 3f |.;.5......Q.Y.D?|" -peer0.org1.example.com | "2019-05-02 01:31:04.857 UTC [msp.identity] Verify -> DEBU 17d0 Verify: sig = 00000000 30 44 02 20 03 37 d6 b4 db fc c5 c5 97 d9 b7 82 |0D. .7..........| -peer0.org1.example.com | 00000010 cb 4f 24 2e 01 c9 0e 5c d3 74 96 47 c2 70 5b 15 |.O$....\.t.G.p[.| -peer0.org1.example.com | 00000020 fb c0 c7 e5 02 20 50 5c 72 51 31 e9 74 c2 2b 1c |..... P\rQ1.t.+.| -peer0.org1.example.com | 00000030 3a 93 ab aa 2e 7a 88 04 ea b7 85 74 e0 2a 64 2d |:....z.....t.*d-| -peer0.org1.example.com | 00000040 14 3b 47 ea f2 83 |.;G...|" -peer0.org1.example.com | "2019-05-02 01:31:04.857 UTC [cauthdsl] func2 -> DEBU 17d1 0xc003c56120 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.858 UTC [cauthdsl] func1 -> DEBU 17d2 0xc003c56120 gate 1556760664848473600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:04.858 UTC [policies] Evaluate -> DEBU 17d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.858 UTC [policies] Evaluate -> DEBU 17d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.859 UTC [policies] Evaluate -> DEBU 17d5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.863 UTC [policies] Evaluate -> DEBU 17d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.865 UTC [msp] DeserializeIdentity -> DEBU 17d8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17d9 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.863 UTC [msp] DeserializeIdentity -> DEBU 17d6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17da Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.867 UTC [policies] Evaluate -> DEBU 17dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.868 UTC [policies] Evaluate -> DEBU 17dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:04.868 UTC [policies] Evaluate -> DEBU 17de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.867 UTC [gossip.comm] Send -> DEBU 17db Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:04.868 UTC [cauthdsl] func1 -> DEBU 17df 0xc003c1ac20 gate 1556760664868545200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:04.869 UTC [cauthdsl] func2 -> DEBU 17e1 0xc003c1ac20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:04.870 UTC [cauthdsl] func2 -> DEBU 17e2 0xc003c1ac20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:04.871 UTC [cauthdsl] func2 -> DEBU 17e3 0xc003c1ac20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.873 UTC [msp.identity] Verify -> DEBU 17e6 Verify: digest = 00000000 6e b0 75 c4 51 40 0e aa 99 5b d4 4c e9 2b e8 4b |n.u.Q@...[.L.+.K| -peer0.org1.example.com | 00000010 ef 3b fb 35 be f1 cd 9c a2 03 51 d3 59 0e 44 3f |.;.5......Q.Y.D?|" -peer0.org1.example.com | "2019-05-02 01:31:04.873 UTC [msp.identity] Verify -> DEBU 17e7 Verify: sig = 00000000 30 44 02 20 03 37 d6 b4 db fc c5 c5 97 d9 b7 82 |0D. .7..........| -peer0.org1.example.com | 00000010 cb 4f 24 2e 01 c9 0e 5c d3 74 96 47 c2 70 5b 15 |.O$....\.t.G.p[.| -peer0.org1.example.com | 00000020 fb c0 c7 e5 02 20 50 5c 72 51 31 e9 74 c2 2b 1c |..... P\rQ1.t.+.| -peer0.org1.example.com | 00000030 3a 93 ab aa 2e 7a 88 04 ea b7 85 74 e0 2a 64 2d |:....z.....t.*d-| -peer0.org1.example.com | 00000040 14 3b 47 ea f2 83 |.;G...|" -peer0.org1.example.com | "2019-05-02 01:31:04.871 UTC [msp] DeserializeIdentity -> DEBU 17e4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.871 UTC [gossip.comm] sendToEndpoint -> DEBU 17e5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.869 UTC [gossip.comm] sendToEndpoint -> DEBU 17e0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [cauthdsl] func1 -> DEBU 1996 0xc00018fc60 gate 1556760700868318300 evaluation starts" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [cauthdsl] func2 -> DEBU 1997 0xc00018fc60 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [cauthdsl] func2 -> DEBU 1998 0xc00018fc60 processing identity 0 with bytes of efef60" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [cauthdsl] func2 -> DEBU 1999 0xc00018fc60 principal matched by identity 0" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [msp.identity] Verify -> DEBU 199a Verify: digest = 00000000 d9 42 a7 73 b6 f2 19 dc 6d ea 2a ed 70 17 73 d1 |.B.s....m.*.p.s.| -orderer0.example.com | 00000010 d0 2e 65 f5 64 ae a7 1d eb 8f ae 34 7d ba aa 06 |..e.d......4}...|" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [msp.identity] Verify -> DEBU 199b Verify: sig = 00000000 30 45 02 21 00 9f bb 1c 54 8f 46 13 22 17 c5 d6 |0E.!....T.F."...| -orderer0.example.com | 00000010 bd a0 c5 49 46 92 fb a2 69 b2 aa d8 13 29 8d 9d |...IF...i....)..| -orderer0.example.com | 00000020 5e a9 af 3a 61 02 20 71 7a ce fe a8 0e 4d d0 de |^..:a. qz....M..| -orderer0.example.com | 00000030 c6 a4 da ac 0d a3 c9 64 5d 8b 3b 2f 1a 12 4e 9f |.......d].;/..N.| -orderer0.example.com | 00000040 b8 91 ee 34 16 0d 23 |...4..#|" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [cauthdsl] func2 -> DEBU 199c 0xc00018fc60 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [cauthdsl] func1 -> DEBU 199d 0xc00018fc60 gate 1556760700868318300 evaluation succeeds" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 199e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 199f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [policies] Evaluate -> DEBU 19a0 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [policies] Evaluate -> DEBU 19a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [policies] Evaluate -> DEBU 19a2 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [policies] Evaluate -> DEBU 19a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [common.deliver] deliverBlocks -> DEBU 19a4 [channel: testchainid] Received seekInfo (0xc000088cc0) start: > stop: > from 192.168.240.9:47574" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [fsblkstorage] Next -> DEBU 19a5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [fsblkstorage] newBlockfileStream -> DEBU 19a6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19a7 Remaining bytes=[25827], Going to peek [8] bytes" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19a8 Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19a9 blockbytes [25824] read from file [0]" -orderer0.example.com | "2019-05-02 01:31:40.869 UTC [common.deliver] deliverBlocks -> DEBU 19aa [channel: testchainid] Delivering block [1] for (0xc000088cc0) for 192.168.240.9:47574" -orderer0.example.com | "2019-05-02 01:31:40.870 UTC [common.deliver] deliverBlocks -> DEBU 19ab [channel: testchainid] Done delivering to 192.168.240.9:47574 for (0xc000088cc0)" -orderer0.example.com | "2019-05-02 01:31:40.870 UTC [common.deliver] Handle -> DEBU 19ac Waiting for new SeekInfo from 192.168.240.9:47574" -orderer0.example.com | "2019-05-02 01:31:40.870 UTC [common.deliver] Handle -> DEBU 19ad Attempting to read seek info message from 192.168.240.9:47574" -orderer0.example.com | "2019-05-02 01:31:40.881 UTC [grpc] infof -> DEBU 19ae transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-05-02 01:31:40.881 UTC [common.deliver] Handle -> WARN 19af Error reading from 192.168.240.9:47574: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-05-02 01:31:40.882 UTC [orderer.common.server] func1 -> DEBU 19b0 Closing Deliver stream" -orderer0.example.com | "2019-05-02 01:31:40.882 UTC [comm.grpc.server] 1 -> INFO 19b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47574 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.8258ms -orderer0.example.com | "2019-05-02 01:31:40.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b2 Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" -orderer0.example.com | "2019-05-02 01:31:40.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b3 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" -orderer0.example.com | "2019-05-02 01:31:41.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.9µs " -orderer0.example.com | "2019-05-02 01:31:41.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.9µs " -orderer0.example.com | "2019-05-02 01:31:41.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b6 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:41.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b7 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:41.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b8 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:41.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b9 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" -orderer0.example.com | "2019-05-02 01:31:41.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19ba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 720.3µs " -orderer0.example.com | "2019-05-02 01:31:41.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19bb Sending msg of 28 bytes to 3 on channel businesschannel took 29.1µs" -orderer0.example.com | "2019-05-02 01:31:41.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19bc Sending msg of 28 bytes to 2 on channel businesschannel took 15.9µs" -orderer0.example.com | "2019-05-02 01:31:41.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77µs " -orderer0.example.com | "2019-05-02 01:31:41.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.2µs " -orderer0.example.com | "2019-05-02 01:31:41.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19bf Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:41.511 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:41.512 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:41.512 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c2 Sending msg of 28 bytes to 3 on channel testchainid took 18µs" -orderer0.example.com | "2019-05-02 01:31:41.512 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117µs " -orderer0.example.com | "2019-05-02 01:31:41.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c4 Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" -orderer0.example.com | "2019-05-02 01:31:41.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c5 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" -orderer0.example.com | "2019-05-02 01:31:42.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.9µs " -orderer0.example.com | "2019-05-02 01:31:42.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " -orderer0.example.com | "2019-05-02 01:31:42.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:42.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:42.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ca Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:42.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19cb Sending msg of 28 bytes to 3 on channel testchainid took 25.4µs" -orderer0.example.com | "2019-05-02 01:31:42.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19cc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.7µs " -orderer0.example.com | "2019-05-02 01:31:42.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19cd Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" -orderer0.example.com | "2019-05-02 01:31:42.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ce Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" -orderer0.example.com | "2019-05-02 01:31:42.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.8µs " -orderer0.example.com | "2019-05-02 01:31:42.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.8µs " -orderer0.example.com | "2019-05-02 01:31:42.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d1 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:42.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:42.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:42.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d4 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" -orderer0.example.com | "2019-05-02 01:31:42.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.2µs " -orderer0.example.com | "2019-05-02 01:31:42.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d6 Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" -orderer0.example.com | "2019-05-02 01:31:42.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d7 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" -orderer0.example.com | "2019-05-02 01:31:42.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.8µs " -orderer0.example.com | "2019-05-02 01:31:43.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.5µs " -orderer0.example.com | "2019-05-02 01:31:43.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19da Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:43.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19db Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:43.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19dc Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:43.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dd Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" -orderer0.example.com | "2019-05-02 01:31:43.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.7µs " -orderer0.example.com | "2019-05-02 01:31:43.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19df Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" -orderer0.example.com | "2019-05-02 01:31:43.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e0 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" -orderer0.example.com | "2019-05-02 01:31:43.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.3µs " -orderer0.example.com | "2019-05-02 01:31:43.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " -orderer0.example.com | "2019-05-02 01:31:43.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e3 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:43.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:43.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e5 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:43.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e6 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" -orderer0.example.com | "2019-05-02 01:31:43.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.3µs " -orderer0.example.com | "2019-05-02 01:31:43.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e8 Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" -orderer0.example.com | "2019-05-02 01:31:43.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e9 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" -orderer0.example.com | "2019-05-02 01:31:43.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " -orderer0.example.com | "2019-05-02 01:31:43.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.2µs " -orderer0.example.com | "2019-05-02 01:31:44.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ec Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:44.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ed Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:44.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ee Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:44.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ef Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" -orderer0.example.com | "2019-05-02 01:31:44.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19f0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.4µs " -peer0.org1.example.com | "2019-05-02 01:31:04.875 UTC [gossip.comm] sendToEndpoint -> DEBU 17e8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.876 UTC [cauthdsl] func2 -> DEBU 17e9 0xc003c1ac20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.876 UTC [msp] DeserializeIdentity -> DEBU 17ea Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.877 UTC [gossip.comm] sendToEndpoint -> DEBU 17eb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.880 UTC [gossip.comm] sendToEndpoint -> DEBU 17ec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.881 UTC [gossip.comm] sendToEndpoint -> DEBU 17ed Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.882 UTC [cauthdsl] func1 -> DEBU 17ee 0xc003c1ac20 gate 1556760664868545200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:04.884 UTC [policies] Evaluate -> DEBU 17ef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.884 UTC [policies] Evaluate -> DEBU 17f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.885 UTC [policies] Evaluate -> DEBU 17f1 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.885 UTC [policies] Evaluate -> DEBU 17f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.886 UTC [gossip.gossip] handleMessage -> DEBU 17f3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.886 UTC [gossip.gossip] handleMessage -> DEBU 17f4 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.891 UTC [msp.identity] Verify -> DEBU 17f5 Verify: digest = 00000000 62 20 38 e5 ef a2 e5 f2 5a 12 9c 1c e0 ab b8 20 |b 8.....Z...... | -peer0.org1.example.com | 00000010 ee ef d0 09 80 93 8f 39 cd 56 59 46 37 7a ea 2c |.......9.VYF7z.,|" -peer0.org1.example.com | "2019-05-02 01:31:04.892 UTC [msp.identity] Verify -> DEBU 17f6 Verify: sig = 00000000 30 45 02 21 00 a0 72 33 1f bf 7c 3f bc ad 89 09 |0E.!..r3..|?....| -peer0.org1.example.com | 00000010 4a c4 b6 ca 36 cf 5c e9 5d db 3d 4a 6b 26 e9 98 |J...6.\.].=Jk&..| -peer0.org1.example.com | 00000020 14 e5 c4 fd fc 02 20 2d 29 15 91 0c ae 2a 50 d6 |...... -)....*P.| -peer0.org1.example.com | 00000030 46 65 a1 7a 2e bf a4 c3 54 ae ad 60 6f db 12 70 |Fe.z....T..`o..p| -peer0.org1.example.com | 00000040 fe 4c a5 9a 6b 78 2b |.L..kx+|" -peer0.org1.example.com | "2019-05-02 01:31:04.894 UTC [msp] DeserializeIdentity -> DEBU 17f7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.896 UTC [msp] DeserializeIdentity -> DEBU 17f8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.897 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:04.898 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17fa Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.899 UTC [gossip.comm] func1 -> DEBU 17fb Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.900 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17fc Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.902 UTC [policies] Evaluate -> DEBU 17fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.904 UTC [policies] Evaluate -> DEBU 17fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:04.905 UTC [policies] Evaluate -> DEBU 17ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.905 UTC [cauthdsl] func1 -> DEBU 1800 0xc003c6cd40 gate 1556760664905242100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:04.905 UTC [cauthdsl] func2 -> DEBU 1801 0xc003c6cd40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:04.905 UTC [cauthdsl] func2 -> DEBU 1802 0xc003c6cd40 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:04.905 UTC [cauthdsl] func2 -> DEBU 1803 0xc003c6cd40 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.905 UTC [msp.identity] Verify -> DEBU 1804 Verify: digest = 00000000 9d e9 47 45 58 55 ba 08 a7 c1 57 d6 e2 0b 98 a9 |..GEXU....W.....| -peer0.org1.example.com | 00000010 70 2e 25 cd 61 06 ef 5c 24 6d 52 07 20 12 c0 72 |p.%.a..\$mR. ..r|" -peer0.org1.example.com | "2019-05-02 01:31:04.905 UTC [msp.identity] Verify -> DEBU 1805 Verify: sig = 00000000 30 44 02 20 21 fa 63 73 4d 87 7b 3d 61 8c bb 6c |0D. !.csM.{=a..l| -peer0.org1.example.com | 00000010 4a f2 88 4d 2f d6 9f e4 01 31 93 ed c5 62 ee 74 |J..M/....1...b.t| -peer0.org1.example.com | 00000020 e2 e6 3f f9 02 20 7a 8b de 81 f5 fc 73 7c b1 01 |..?.. z.....s|..| -orderer0.example.com | "2019-05-02 01:31:44.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19f1 Sending msg of 28 bytes to 2 on channel businesschannel took 66.4µs" -orderer0.example.com | "2019-05-02 01:31:44.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19f2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" -orderer0.example.com | "2019-05-02 01:31:44.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.4µs " -orderer0.example.com | "2019-05-02 01:31:44.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0464ms " -orderer0.example.com | "2019-05-02 01:31:44.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19f5 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:44.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19f6 Sending msg of 28 bytes to 3 on channel testchainid took 183.6µs" -orderer0.example.com | "2019-05-02 01:31:44.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19f7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.8µs " -orderer0.example.com | "2019-05-02 01:31:44.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19f8 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:44.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19f9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:45.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19fa Sending msg of 28 bytes to 3 on channel businesschannel took 41.3µs" -orderer0.example.com | "2019-05-02 01:31:45.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19fb Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" -orderer0.example.com | "2019-05-02 01:31:45.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.1µs " -orderer0.example.com | "2019-05-02 01:31:45.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.9µs " -orderer0.example.com | "2019-05-02 01:31:45.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19fe Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:45.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ff Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:45.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a00 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" -orderer0.example.com | "2019-05-02 01:31:45.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a01 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " -orderer0.example.com | "2019-05-02 01:31:45.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a02 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:45.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a03 Sending msg of 28 bytes to 2 on channel businesschannel took 47.7µs" -orderer0.example.com | "2019-05-02 01:31:45.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a04 Sending msg of 28 bytes to 3 on channel businesschannel took 28.2µs" -orderer0.example.com | "2019-05-02 01:31:45.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.3µs " -orderer0.example.com | "2019-05-02 01:31:45.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167.5µs " -orderer0.example.com | "2019-05-02 01:31:45.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a07 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:45.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a08 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:45.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a09 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:45.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0a Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" -orderer0.example.com | "2019-05-02 01:31:45.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.7µs " -orderer0.example.com | "2019-05-02 01:31:45.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0c Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" -peer0.org1.example.com | 00000030 27 44 48 aa a2 df 3a e3 d8 45 54 3d 5e a5 25 33 |'DH...:..ET=^.%3| -peer0.org1.example.com | 00000040 a7 5c 29 e1 73 d4 |.\).s.|" -peer0.org1.example.com | "2019-05-02 01:31:04.906 UTC [cauthdsl] func2 -> DEBU 1806 0xc003c6cd40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.906 UTC [cauthdsl] func1 -> DEBU 1807 0xc003c6cd40 gate 1556760664905242100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:04.906 UTC [policies] Evaluate -> DEBU 1808 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.907 UTC [policies] Evaluate -> DEBU 1809 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.907 UTC [policies] Evaluate -> DEBU 180a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.907 UTC [msp] DeserializeIdentity -> DEBU 180b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.908 UTC [msp] DeserializeIdentity -> DEBU 180c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.909 UTC [gossip.pull] Hello -> DEBU 180d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:04.909 UTC [msp] DeserializeIdentity -> DEBU 180e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.909 UTC [msp] DeserializeIdentity -> DEBU 180f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.910 UTC [gossip.comm] Send -> DEBU 1810 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:04.910 UTC [gossip.comm] sendToEndpoint -> DEBU 1811 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.910 UTC [gossip.comm] sendToEndpoint -> DEBU 1812 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.907 UTC [policies] Evaluate -> DEBU 1813 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.911 UTC [msp] DeserializeIdentity -> DEBU 1814 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.911 UTC [msp] DeserializeIdentity -> DEBU 1815 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.913 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1816 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:04.914 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1817 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.915 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1818 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.915 UTC [policies] Evaluate -> DEBU 1819 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.916 UTC [policies] Evaluate -> DEBU 181a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:04.916 UTC [policies] Evaluate -> DEBU 181b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.917 UTC [cauthdsl] func1 -> DEBU 181c 0xc003c96510 gate 1556760664917569600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:04.918 UTC [cauthdsl] func2 -> DEBU 181d 0xc003c96510 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:04.918 UTC [cauthdsl] func2 -> DEBU 181e 0xc003c96510 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:04.919 UTC [cauthdsl] func2 -> DEBU 181f 0xc003c96510 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.920 UTC [msp.identity] Verify -> DEBU 1820 Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -peer0.org1.example.com | 00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -peer0.org1.example.com | "2019-05-02 01:31:04.920 UTC [msp.identity] Verify -> DEBU 1821 Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -peer0.org1.example.com | 00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -peer0.org1.example.com | 00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -peer0.org1.example.com | 00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -peer0.org1.example.com | 00000040 58 07 a6 98 8c c7 |X.....|" -peer0.org1.example.com | "2019-05-02 01:31:04.921 UTC [cauthdsl] func2 -> DEBU 1822 0xc003c96510 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.921 UTC [cauthdsl] func1 -> DEBU 1823 0xc003c96510 gate 1556760664917569600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:04.922 UTC [policies] Evaluate -> DEBU 1824 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.922 UTC [policies] Evaluate -> DEBU 1825 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.923 UTC [policies] Evaluate -> DEBU 1826 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.923 UTC [policies] Evaluate -> DEBU 1827 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.924 UTC [msp.identity] Verify -> DEBU 1828 Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -peer0.org1.example.com | 00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -peer0.org1.example.com | "2019-05-02 01:31:04.925 UTC [msp.identity] Verify -> DEBU 1829 Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -peer0.org1.example.com | 00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -peer0.org1.example.com | 00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -peer0.org1.example.com | 00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -peer0.org1.example.com | 00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -peer0.org1.example.com | "2019-05-02 01:31:04.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 182a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 182b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.927 UTC [policies] Evaluate -> DEBU 182c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.927 UTC [policies] Evaluate -> DEBU 182d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:04.928 UTC [policies] Evaluate -> DEBU 182e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.928 UTC [cauthdsl] func1 -> DEBU 182f 0xc003c97c10 gate 1556760664928842900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:04.929 UTC [cauthdsl] func2 -> DEBU 1830 0xc003c97c10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:04.930 UTC [cauthdsl] func2 -> DEBU 1831 0xc003c97c10 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:04.930 UTC [cauthdsl] func2 -> DEBU 1832 0xc003c97c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:04.930 UTC [cauthdsl] func2 -> DEBU 1833 0xc003c97c10 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:04.931 UTC [cauthdsl] func1 -> DEBU 1834 0xc003c97c10 gate 1556760664928842900 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:04.931 UTC [policies] Evaluate -> DEBU 1835 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.932 UTC [policies] Evaluate -> DEBU 1836 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.932 UTC [policies] Evaluate -> DEBU 1837 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.932 UTC [cauthdsl] func1 -> DEBU 1838 0xc003caa450 gate 1556760664932599300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:04.932 UTC [cauthdsl] func2 -> DEBU 1839 0xc003caa450 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:04.932 UTC [cauthdsl] func2 -> DEBU 183a 0xc003caa450 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:04.932 UTC [cauthdsl] func2 -> DEBU 183b 0xc003caa450 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.932 UTC [msp.identity] Verify -> DEBU 183c Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -peer0.org1.example.com | 00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -peer0.org1.example.com | "2019-05-02 01:31:04.932 UTC [msp.identity] Verify -> DEBU 183d Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -peer0.org1.example.com | 00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -peer0.org1.example.com | 00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -peer0.org1.example.com | 00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -peer0.org1.example.com | 00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -peer0.org1.example.com | "2019-05-02 01:31:04.933 UTC [cauthdsl] func2 -> DEBU 183e 0xc003caa450 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.933 UTC [cauthdsl] func1 -> DEBU 183f 0xc003caa450 gate 1556760664932599300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:04.933 UTC [policies] Evaluate -> DEBU 1840 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.933 UTC [policies] Evaluate -> DEBU 1841 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.933 UTC [policies] Evaluate -> DEBU 1842 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.933 UTC [policies] Evaluate -> DEBU 1843 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.933 UTC [gossip.gossip] handleMessage -> DEBU 1844 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.933 UTC [gossip.gossip] handleMessage -> DEBU 1845 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.933 UTC [msp] DeserializeIdentity -> DEBU 1846 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.934 UTC [msp.identity] Verify -> DEBU 1847 Verify: digest = 00000000 62 20 38 e5 ef a2 e5 f2 5a 12 9c 1c e0 ab b8 20 |b 8.....Z...... | -peer0.org1.example.com | 00000010 ee ef d0 09 80 93 8f 39 cd 56 59 46 37 7a ea 2c |.......9.VYF7z.,|" -peer0.org1.example.com | "2019-05-02 01:31:04.934 UTC [msp.identity] Verify -> DEBU 1848 Verify: sig = 00000000 30 45 02 21 00 a0 72 33 1f bf 7c 3f bc ad 89 09 |0E.!..r3..|?....| -peer0.org1.example.com | 00000010 4a c4 b6 ca 36 cf 5c e9 5d db 3d 4a 6b 26 e9 98 |J...6.\.].=Jk&..| -peer0.org1.example.com | 00000020 14 e5 c4 fd fc 02 20 2d 29 15 91 0c ae 2a 50 d6 |...... -)....*P.| -peer0.org1.example.com | 00000030 46 65 a1 7a 2e bf a4 c3 54 ae ad 60 6f db 12 70 |Fe.z....T..`o..p| -peer0.org1.example.com | 00000040 fe 4c a5 9a 6b 78 2b |.L..kx+|" -peer0.org1.example.com | "2019-05-02 01:31:04.934 UTC [msp.identity] Verify -> DEBU 1849 Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -peer0.org1.example.com | 00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -peer0.org1.example.com | "2019-05-02 01:31:04.934 UTC [msp.identity] Verify -> DEBU 184a Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -orderer0.example.com | "2019-05-02 01:31:45.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0d Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" -orderer0.example.com | "2019-05-02 01:31:45.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " -orderer0.example.com | "2019-05-02 01:31:46.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71µs " -orderer0.example.com | "2019-05-02 01:31:46.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a10 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:46.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a11 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:46.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a12 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:46.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a13 Sending msg of 28 bytes to 3 on channel testchainid took 9.2µs" -orderer0.example.com | "2019-05-02 01:31:46.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.5µs " -orderer0.example.com | "2019-05-02 01:31:46.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a15 Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" -orderer0.example.com | "2019-05-02 01:31:46.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a16 Sending msg of 28 bytes to 3 on channel businesschannel took 42.6µs" -orderer0.example.com | "2019-05-02 01:31:46.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.4µs " -orderer0.example.com | "2019-05-02 01:31:46.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.7µs " -orderer0.example.com | "2019-05-02 01:31:46.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a19 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:46.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a1a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:46.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a1b Sending msg of 28 bytes to 3 on channel testchainid took 27.6µs" -orderer0.example.com | "2019-05-02 01:31:46.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a1c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.1µs " -orderer0.example.com | "2019-05-02 01:31:46.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a1d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:46.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.6µs " -orderer0.example.com | "2019-05-02 01:31:46.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a1f Sending msg of 28 bytes to 3 on channel businesschannel took 60.1µs" -orderer0.example.com | "2019-05-02 01:31:47.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a20 Sending msg of 28 bytes to 2 on channel businesschannel took 40.8µs" -orderer0.example.com | "2019-05-02 01:31:47.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.7µs " -orderer0.example.com | "2019-05-02 01:31:47.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a22 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:47.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a23 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:47.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a24 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" -orderer0.example.com | "2019-05-02 01:31:47.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a25 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.3µs " -orderer0.example.com | "2019-05-02 01:31:47.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a26 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:47.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a27 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" -orderer0.example.com | "2019-05-02 01:31:47.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a28 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" -orderer0.example.com | "2019-05-02 01:31:47.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " -orderer0.example.com | "2019-05-02 01:31:47.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 385.9µs " -orderer0.example.com | "2019-05-02 01:31:47.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a2b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:47.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a2c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:47.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a2d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:47.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a2e Sending msg of 28 bytes to 3 on channel testchainid took 1.1871ms" -orderer0.example.com | "2019-05-02 01:31:47.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " -orderer0.example.com | "2019-05-02 01:31:47.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a30 Sending msg of 28 bytes to 3 on channel businesschannel took 26.2µs" -orderer0.example.com | "2019-05-02 01:31:47.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a31 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" -peer0.org1.example.com | 00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -peer0.org1.example.com | 00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -peer0.org1.example.com | 00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -peer0.org1.example.com | 00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [msp] DeserializeIdentity -> DEBU 184b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [msp] DeserializeIdentity -> DEBU 184c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 184d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 184e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 184f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [policies] Evaluate -> DEBU 1850 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [policies] Evaluate -> DEBU 1851 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [policies] Evaluate -> DEBU 1852 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [cauthdsl] func1 -> DEBU 1853 0xc003cc0da0 gate 1556760664935842800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [cauthdsl] func2 -> DEBU 1854 0xc003cc0da0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:04.935 UTC [cauthdsl] func2 -> DEBU 1855 0xc003cc0da0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [cauthdsl] func2 -> DEBU 1856 0xc003cc0da0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [msp.identity] Verify -> DEBU 1857 Verify: digest = 00000000 9d e9 47 45 58 55 ba 08 a7 c1 57 d6 e2 0b 98 a9 |..GEXU....W.....| -peer0.org1.example.com | 00000010 70 2e 25 cd 61 06 ef 5c 24 6d 52 07 20 12 c0 72 |p.%.a..\$mR. ..r|" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [msp.identity] Verify -> DEBU 1858 Verify: sig = 00000000 30 44 02 20 21 fa 63 73 4d 87 7b 3d 61 8c bb 6c |0D. !.csM.{=a..l| -peer0.org1.example.com | 00000010 4a f2 88 4d 2f d6 9f e4 01 31 93 ed c5 62 ee 74 |J..M/....1...b.t| -peer0.org1.example.com | 00000020 e2 e6 3f f9 02 20 7a 8b de 81 f5 fc 73 7c b1 01 |..?.. z.....s|..| -peer0.org1.example.com | 00000030 27 44 48 aa a2 df 3a e3 d8 45 54 3d 5e a5 25 33 |'DH...:..ET=^.%3| -peer0.org1.example.com | 00000040 a7 5c 29 e1 73 d4 |.\).s.|" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [cauthdsl] func2 -> DEBU 1859 0xc003cc0da0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [cauthdsl] func1 -> DEBU 185a 0xc003cc0da0 gate 1556760664935842800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [policies] Evaluate -> DEBU 185b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [policies] Evaluate -> DEBU 185c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [policies] Evaluate -> DEBU 185d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [policies] Evaluate -> DEBU 185e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [msp] DeserializeIdentity -> DEBU 185f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.936 UTC [msp] DeserializeIdentity -> DEBU 1860 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1861 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:04.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1862 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1863 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.937 UTC [policies] Evaluate -> DEBU 1864 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.937 UTC [policies] Evaluate -> DEBU 1865 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:04.937 UTC [policies] Evaluate -> DEBU 1866 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.937 UTC [cauthdsl] func1 -> DEBU 1867 0xc003cd6570 gate 1556760664937530000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:04.937 UTC [cauthdsl] func2 -> DEBU 1868 0xc003cd6570 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:04.937 UTC [cauthdsl] func2 -> DEBU 1869 0xc003cd6570 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:04.938 UTC [cauthdsl] func2 -> DEBU 186a 0xc003cd6570 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.940 UTC [msp.identity] Verify -> DEBU 186b Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -peer0.org1.example.com | 00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -peer0.org1.example.com | "2019-05-02 01:31:04.940 UTC [msp.identity] Verify -> DEBU 186c Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -peer0.org1.example.com | 00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -peer0.org1.example.com | 00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -peer0.org1.example.com | 00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -peer0.org1.example.com | 00000040 29 fe 17 41 ee e9 a4 |)..A...|" -peer0.org1.example.com | "2019-05-02 01:31:04.941 UTC [cauthdsl] func2 -> DEBU 186d 0xc003cd6570 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.942 UTC [cauthdsl] func1 -> DEBU 186e 0xc003cd6570 gate 1556760664937530000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:04.942 UTC [policies] Evaluate -> DEBU 186f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.943 UTC [policies] Evaluate -> DEBU 1870 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.943 UTC [policies] Evaluate -> DEBU 1871 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.944 UTC [policies] Evaluate -> DEBU 1872 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.944 UTC [msp] DeserializeIdentity -> DEBU 1873 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.944 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1874 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.945 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1875 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:04.945 UTC [policies] Evaluate -> DEBU 1876 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.946 UTC [policies] Evaluate -> DEBU 1877 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:04.946 UTC [policies] Evaluate -> DEBU 1878 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:04.946 UTC [cauthdsl] func1 -> DEBU 1879 0xc003cd7650 gate 1556760664946835600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:04.947 UTC [cauthdsl] func2 -> DEBU 187a 0xc003cd7650 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:04.947 UTC [cauthdsl] func2 -> DEBU 187b 0xc003cd7650 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:04.947 UTC [cauthdsl] func2 -> DEBU 187c 0xc003cd7650 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.948 UTC [msp.identity] Verify -> DEBU 187d Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -peer0.org1.example.com | 00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -peer0.org1.example.com | "2019-05-02 01:31:04.948 UTC [msp.identity] Verify -> DEBU 187e Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -peer0.org1.example.com | 00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -peer0.org1.example.com | 00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -peer0.org1.example.com | 00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -peer0.org1.example.com | 00000040 29 fe 17 41 ee e9 a4 |)..A...|" -peer0.org1.example.com | "2019-05-02 01:31:04.949 UTC [cauthdsl] func2 -> DEBU 187f 0xc003cd7650 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:04.949 UTC [cauthdsl] func1 -> DEBU 1880 0xc003cd7650 gate 1556760664946835600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:04.950 UTC [policies] Evaluate -> DEBU 1881 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.950 UTC [policies] Evaluate -> DEBU 1882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.950 UTC [policies] Evaluate -> DEBU 1883 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.950 UTC [policies] Evaluate -> DEBU 1884 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:04.950 UTC [gossip.gossip] handleMessage -> DEBU 1885 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.950 UTC [gossip.gossip] handleMessage -> DEBU 1886 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.951 UTC [msp.identity] Verify -> DEBU 1887 Verify: digest = 00000000 51 65 a8 f5 3d 66 bd 4c ea e1 02 f7 5e 30 2f a6 |Qe..=f.L....^0/.| -peer0.org1.example.com | 00000010 55 da ac 09 e9 16 bc e3 88 66 89 a2 a0 ea 8a b9 |U........f......|" -peer0.org1.example.com | "2019-05-02 01:31:04.952 UTC [msp.identity] Verify -> DEBU 1888 Verify: sig = 00000000 30 44 02 20 71 7c bf 73 a9 07 a1 55 62 45 53 17 |0D. q|.s...UbES.| -peer0.org1.example.com | 00000010 6a 2b f5 6d c7 d1 ec 07 06 c9 cb 70 67 73 a0 39 |j+.m.......pgs.9| -peer0.org1.example.com | 00000020 68 ac 47 72 02 20 78 14 ae 0d d3 31 4a f6 69 be |h.Gr. x....1J.i.| -peer0.org1.example.com | 00000030 d9 18 3c aa 9e bf 90 5b 8c 6b 73 69 80 0c dc 64 |..<....[.ksi...d| -peer0.org1.example.com | 00000040 89 a4 87 bc 1a 1d |......|" -peer0.org1.example.com | "2019-05-02 01:31:04.952 UTC [msp] DeserializeIdentity -> DEBU 1889 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:04.953 UTC [gossip.gossip] handleMessage -> DEBU 188a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:04.953 UTC [gossip.gossip] handleMessage -> DEBU 188b Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10372144665844536393 , Msg_type: BLOCK_MSG, digests: [1 2 3 4], Envelope: 46 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.954 UTC [gossip.pull] HandleMessage -> DEBU 188c GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10372144665844536393 , Msg_type: BLOCK_MSG, digests: [1 2 3 4], Envelope: 46 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:04.954 UTC [gossip.gossip] handleMessage -> DEBU 188d Exiting" -orderer0.example.com | "2019-05-02 01:31:47.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.4µs " -orderer0.example.com | "2019-05-02 01:31:47.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.7µs " -orderer0.example.com | "2019-05-02 01:31:48.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a34 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:48.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a35 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:48.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a36 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:48.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a37 Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" -orderer0.example.com | "2019-05-02 01:31:48.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.7µs " -orderer0.example.com | "2019-05-02 01:31:48.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a39 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" -orderer0.example.com | "2019-05-02 01:31:48.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3a Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" -orderer0.example.com | "2019-05-02 01:31:48.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " -orderer0.example.com | "2019-05-02 01:31:48.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.2µs " -orderer0.example.com | "2019-05-02 01:31:48.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:48.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3e Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" -orderer0.example.com | "2019-05-02 01:31:48.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:48.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " -orderer0.example.com | "2019-05-02 01:31:48.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a41 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:49.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a42 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" -orderer0.example.com | "2019-05-02 01:31:49.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a43 Sending msg of 28 bytes to 3 on channel businesschannel took 40.4µs" -orderer0.example.com | "2019-05-02 01:31:49.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs " -orderer0.example.com | "2019-05-02 01:31:49.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167.6µs " -orderer0.example.com | "2019-05-02 01:31:49.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a46 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:49.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a47 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:49.012 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a48 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" -orderer0.example.com | "2019-05-02 01:31:49.012 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a49 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.9µs " -orderer0.example.com | "2019-05-02 01:31:49.012 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a4a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:49.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a4b Sending msg of 28 bytes to 2 on channel businesschannel took 41.6µs" -orderer0.example.com | "2019-05-02 01:31:49.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a4c Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" -orderer0.example.com | "2019-05-02 01:31:49.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.9µs " -orderer0.example.com | "2019-05-02 01:31:49.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.3µs " -orderer0.example.com | "2019-05-02 01:31:49.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a4f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:49.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a50 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" -orderer0.example.com | "2019-05-02 01:31:49.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a51 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.6µs " -orderer0.example.com | "2019-05-02 01:31:49.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a52 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:49.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a53 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:49.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a54 Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" -orderer0.example.com | "2019-05-02 01:31:49.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a55 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" -orderer0.example.com | "2019-05-02 01:31:49.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " -orderer0.example.com | "2019-05-02 01:31:49.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.7µs " -orderer0.example.com | "2019-05-02 01:31:50.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a58 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:50.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a59 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:50.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a5a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:50.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a5b Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" -orderer0.example.com | "2019-05-02 01:31:50.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a5c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.8µs " -orderer0.example.com | "2019-05-02 01:31:50.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a5d Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" -orderer0.example.com | "2019-05-02 01:31:50.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a5e Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" -orderer0.example.com | "2019-05-02 01:31:50.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.1µs " -orderer0.example.com | "2019-05-02 01:31:50.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.8µs " -orderer0.example.com | "2019-05-02 01:31:50.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a61 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:50.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a62 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:50.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a63 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:50.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a64 Sending msg of 28 bytes to 3 on channel testchainid took 120.3µs" -orderer0.example.com | "2019-05-02 01:31:50.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 373.2µs " -orderer0.example.com | "2019-05-02 01:31:51.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a66 Sending msg of 28 bytes to 2 on channel businesschannel took 39µs" -orderer0.example.com | "2019-05-02 01:31:51.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a67 Sending msg of 28 bytes to 3 on channel businesschannel took 40.1µs" -orderer0.example.com | "2019-05-02 01:31:51.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 718.4µs " -orderer0.example.com | "2019-05-02 01:31:51.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5758ms " -orderer0.example.com | "2019-05-02 01:31:51.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a6a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:51.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6c Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" -orderer0.example.com | "2019-05-02 01:31:51.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.8µs " -orderer0.example.com | "2019-05-02 01:31:51.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a6b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:51.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a6e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:51.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6f Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" -orderer0.example.com | "2019-05-02 01:31:51.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a70 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" -orderer0.example.com | "2019-05-02 01:31:51.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.2µs " -orderer0.example.com | "2019-05-02 01:31:51.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " -orderer0.example.com | "2019-05-02 01:31:51.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a73 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:51.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a74 Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" -orderer0.example.com | "2019-05-02 01:31:51.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.3µs " -orderer0.example.com | "2019-05-02 01:31:51.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a76 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:51.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a77 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:51.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a78 Sending msg of 28 bytes to 3 on channel businesschannel took 34.6µs" -orderer0.example.com | "2019-05-02 01:31:51.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a79 Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" -orderer0.example.com | "2019-05-02 01:31:52.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.6µs " -orderer0.example.com | "2019-05-02 01:31:52.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.3µs " -orderer0.example.com | "2019-05-02 01:31:52.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a7c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:52.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a7d Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:52.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a7e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:52.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a7f Sending msg of 28 bytes to 3 on channel testchainid took 27.1µs" -orderer0.example.com | "2019-05-02 01:31:52.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.3µs " -orderer0.example.com | "2019-05-02 01:31:52.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a81 Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" -orderer0.example.com | "2019-05-02 01:31:52.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a82 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" -orderer0.example.com | "2019-05-02 01:31:52.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.9µs " -orderer0.example.com | "2019-05-02 01:31:52.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.9µs " -orderer0.example.com | "2019-05-02 01:31:52.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a85 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:52.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a86 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:52.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a87 Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" -orderer0.example.com | "2019-05-02 01:31:52.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a88 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.6µs " -orderer0.example.com | "2019-05-02 01:31:52.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a89 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:52.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8a Sending msg of 28 bytes to 2 on channel businesschannel took 33µs" -orderer0.example.com | "2019-05-02 01:31:53.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 236.5µs " -orderer0.example.com | "2019-05-02 01:31:53.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8c Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" -orderer0.example.com | "2019-05-02 01:31:53.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143µs " -orderer0.example.com | "2019-05-02 01:31:53.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a8e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:53.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8f Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" -orderer0.example.com | "2019-05-02 01:31:53.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a90 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:53.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a91 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.6µs " -orderer0.example.com | "2019-05-02 01:31:53.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a92 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:53.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a93 Sending msg of 28 bytes to 2 on channel businesschannel took 36.9µs" -orderer0.example.com | "2019-05-02 01:31:53.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a94 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" -orderer0.example.com | "2019-05-02 01:31:53.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93µs " -orderer0.example.com | "2019-05-02 01:31:53.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66µs " -orderer0.example.com | "2019-05-02 01:31:53.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a97 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:53.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a98 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" -orderer0.example.com | "2019-05-02 01:31:53.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " -orderer0.example.com | "2019-05-02 01:31:53.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:53.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:53.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a9c Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" -peer0.org1.example.com | "2019-05-02 01:31:05.090 UTC [gossip.gossip] handleMessage -> DEBU 188e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.092 UTC [msp] DeserializeIdentity -> DEBU 188f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.094 UTC [msp] DeserializeIdentity -> DEBU 1890 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.095 UTC [gossip.gossip] handleMessage -> DEBU 1891 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.101 UTC [gossip.gossip] handleMessage -> DEBU 1892 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760661750302400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.101 UTC [msp.identity] Verify -> DEBU 1893 Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -peer0.org1.example.com | 00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -peer0.org1.example.com | "2019-05-02 01:31:05.101 UTC [msp.identity] Verify -> DEBU 1894 Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -peer0.org1.example.com | 00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -peer0.org1.example.com | 00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -peer0.org1.example.com | 00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -peer0.org1.example.com | 00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -peer0.org1.example.com | "2019-05-02 01:31:05.102 UTC [gossip.gossip] handleMessage -> DEBU 1895 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.109 UTC [gossip.gossip] handleMessage -> DEBU 1896 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.110 UTC [gossip.pull] HandleMessage -> DEBU 1897 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.110 UTC [gossip.pull] SendDigest -> DEBU 1898 Sending BLOCK_MSG digest: [1 2 3 4] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:05.111 UTC [gossip.gossip] handleMessage -> DEBU 1899 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.126 UTC [gossip.comm] func1 -> DEBU 189a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760661750302400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.127 UTC [gossip.gossip] handleMessage -> DEBU 189b Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760661750302400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.127 UTC [msp.identity] Verify -> DEBU 189c Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -peer0.org1.example.com | 00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -peer0.org1.example.com | "2019-05-02 01:31:05.128 UTC [msp.identity] Verify -> DEBU 189d Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -peer0.org1.example.com | 00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -peer0.org1.example.com | 00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -peer0.org1.example.com | 00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -peer0.org1.example.com | 00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -peer0.org1.example.com | "2019-05-02 01:31:05.129 UTC [msp] DeserializeIdentity -> DEBU 189e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.129 UTC [gossip.gossip] handleMessage -> DEBU 189f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.142 UTC [gossip.comm] func1 -> DEBU 18a0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760661750302400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.146 UTC [gossip.gossip] handleMessage -> DEBU 18a1 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760661750302400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.147 UTC [msp.identity] Verify -> DEBU 18a2 Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -peer0.org1.example.com | 00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -peer0.org1.example.com | "2019-05-02 01:31:05.148 UTC [msp.identity] Verify -> DEBU 18a3 Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -peer0.org1.example.com | 00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -peer0.org1.example.com | 00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -peer0.org1.example.com | 00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -peer0.org1.example.com | 00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -peer0.org1.example.com | "2019-05-02 01:31:05.152 UTC [msp] DeserializeIdentity -> DEBU 18a4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.153 UTC [gossip.gossip] handleMessage -> DEBU 18a5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.320 UTC [gossip.comm] func1 -> DEBU 18a6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.321 UTC [gossip.gossip] handleMessage -> DEBU 18a7 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.323 UTC [msp] DeserializeIdentity -> DEBU 18a8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.323 UTC [msp] DeserializeIdentity -> DEBU 18a9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.324 UTC [msp] DeserializeIdentity -> DEBU 18aa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.325 UTC [gossip.gossip] handleMessage -> DEBU 18ab Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.356 UTC [gossip.comm] func1 -> DEBU 18ac Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760661686498500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" -orderer0.example.com | "2019-05-02 01:31:53.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a9d Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" -orderer0.example.com | "2019-05-02 01:31:54.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.2µs " -orderer0.example.com | "2019-05-02 01:31:54.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.6µs " -orderer0.example.com | "2019-05-02 01:31:54.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:54.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:54.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa2 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -orderer0.example.com | "2019-05-02 01:31:54.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " -orderer0.example.com | "2019-05-02 01:31:54.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:54.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa5 Sending msg of 28 bytes to 3 on channel businesschannel took 29.6µs" -orderer0.example.com | "2019-05-02 01:31:54.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa6 Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" -orderer0.example.com | "2019-05-02 01:31:54.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 360.1µs " -orderer0.example.com | "2019-05-02 01:31:54.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 383.9µs " -orderer0.example.com | "2019-05-02 01:31:54.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:54.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aaa Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:54.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aab Sending msg of 28 bytes to 3 on channel testchainid took 23.4µs" -orderer0.example.com | "2019-05-02 01:31:54.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aac Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.4µs " -orderer0.example.com | "2019-05-02 01:31:54.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aad Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:54.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aae Sending msg of 28 bytes to 2 on channel businesschannel took 31.3µs" -orderer0.example.com | "2019-05-02 01:31:55.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aaf Sending msg of 28 bytes to 3 on channel businesschannel took 31.2µs" -orderer0.example.com | "2019-05-02 01:31:55.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.6µs " -orderer0.example.com | "2019-05-02 01:31:55.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 188.4µs " -orderer0.example.com | "2019-05-02 01:31:55.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:55.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-05-02 01:31:55.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ab5 Sending msg of 28 bytes to 3 on channel testchainid took 21µs" -orderer0.example.com | "2019-05-02 01:31:55.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.3µs " -orderer0.example.com | "2019-05-02 01:31:55.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -peer0.org1.example.com | "2019-05-02 01:31:05.356 UTC [gossip.gossip] handleMessage -> DEBU 18ad Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760661686498500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.356 UTC [msp] DeserializeIdentity -> DEBU 18ae Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.356 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:05.358 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18b0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.358 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18b1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.363 UTC [policies] Evaluate -> DEBU 18b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.363 UTC [policies] Evaluate -> DEBU 18b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:05.369 UTC [gossip.comm] func1 -> DEBU 18b4 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760661686498500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.370 UTC [policies] Evaluate -> DEBU 18b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.377 UTC [cauthdsl] func1 -> DEBU 18b6 0xc003d2e090 gate 1556760665377221300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:05.379 UTC [cauthdsl] func2 -> DEBU 18b7 0xc003d2e090 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:05.379 UTC [cauthdsl] func2 -> DEBU 18b8 0xc003d2e090 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:05.385 UTC [cauthdsl] func2 -> DEBU 18b9 0xc003d2e090 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.389 UTC [msp.identity] Verify -> DEBU 18ba Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -peer0.org1.example.com | 00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -peer0.org1.example.com | "2019-05-02 01:31:05.389 UTC [msp.identity] Verify -> DEBU 18bb Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -peer0.org1.example.com | 00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -peer0.org1.example.com | 00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -peer0.org1.example.com | 00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -peer0.org1.example.com | 00000040 29 fe 17 41 ee e9 a4 |)..A...|" -peer0.org1.example.com | "2019-05-02 01:31:05.393 UTC [cauthdsl] func2 -> DEBU 18bc 0xc003d2e090 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.394 UTC [cauthdsl] func1 -> DEBU 18bd 0xc003d2e090 gate 1556760665377221300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:05.395 UTC [policies] Evaluate -> DEBU 18be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.399 UTC [policies] Evaluate -> DEBU 18bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.400 UTC [policies] Evaluate -> DEBU 18c0 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.403 UTC [policies] Evaluate -> DEBU 18c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.404 UTC [msp] DeserializeIdentity -> DEBU 18c2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.405 UTC [gossip.gossip] handleMessage -> DEBU 18c3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.405 UTC [gossip.gossip] handleMessage -> DEBU 18c4 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760661686498500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.406 UTC [msp] DeserializeIdentity -> DEBU 18c5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.407 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:05.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18c7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.410 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18c8 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.411 UTC [policies] Evaluate -> DEBU 18c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.411 UTC [policies] Evaluate -> DEBU 18ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:05.412 UTC [policies] Evaluate -> DEBU 18cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.413 UTC [cauthdsl] func1 -> DEBU 18cc 0xc003d2faa0 gate 1556760665413462000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:05.413 UTC [cauthdsl] func2 -> DEBU 18cd 0xc003d2faa0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:05.414 UTC [cauthdsl] func2 -> DEBU 18ce 0xc003d2faa0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:05.414 UTC [cauthdsl] func2 -> DEBU 18cf 0xc003d2faa0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.415 UTC [msp.identity] Verify -> DEBU 18d0 Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -peer0.org1.example.com | 00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -peer0.org1.example.com | "2019-05-02 01:31:05.415 UTC [msp.identity] Verify -> DEBU 18d1 Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -peer0.org1.example.com | 00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -peer0.org1.example.com | 00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -peer0.org1.example.com | 00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -peer0.org1.example.com | 00000040 29 fe 17 41 ee e9 a4 |)..A...|" -peer0.org1.example.com | "2019-05-02 01:31:05.416 UTC [cauthdsl] func2 -> DEBU 18d2 0xc003d2faa0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.417 UTC [cauthdsl] func1 -> DEBU 18d3 0xc003d2faa0 gate 1556760665413462000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:05.417 UTC [policies] Evaluate -> DEBU 18d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.418 UTC [policies] Evaluate -> DEBU 18d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.418 UTC [policies] Evaluate -> DEBU 18d6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.419 UTC [policies] Evaluate -> DEBU 18d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.420 UTC [msp] DeserializeIdentity -> DEBU 18d8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.420 UTC [gossip.gossip] handleMessage -> DEBU 18d9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.431 UTC [gossip.gossip] handleMessage -> DEBU 18da Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.431 UTC [gossip.pull] HandleMessage -> DEBU 18db GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.431 UTC [gossip.pull] SendDigest -> DEBU 18dc Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:05.431 UTC [gossip.gossip] handleMessage -> DEBU 18dd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.437 UTC [gossip.gossip] handleMessage -> DEBU 18de Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.437 UTC [gossip.gossip] handleMessage -> DEBU 18df Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.437 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18e0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.437 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18e1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:05.437 UTC [msp.identity] Verify -> DEBU 18e2 Verify: digest = 00000000 9c 53 05 c2 e0 ba a2 e0 51 71 27 bd c1 0d 69 87 |.S......Qq'...i.| -peer0.org1.example.com | 00000010 b2 3e 40 46 6e ad 51 68 96 50 6c 29 a9 d6 67 63 |.>@Fn.Qh.Pl)..gc|" -peer0.org1.example.com | "2019-05-02 01:31:05.438 UTC [msp.identity] Verify -> DEBU 18e3 Verify: sig = 00000000 30 45 02 21 00 cb fa c8 bf d7 cc 06 26 a7 69 91 |0E.!........&.i.| -peer0.org1.example.com | 00000010 b4 13 e8 f8 bd 4f a6 3a 32 09 ff 9d a3 f8 95 d8 |.....O.:2.......| -peer0.org1.example.com | 00000020 13 f4 69 5a f3 02 20 52 41 b8 b5 57 cf 34 5f 68 |..iZ.. RA..W.4_h| -peer0.org1.example.com | 00000030 ec b8 39 4b d5 60 09 90 b3 bf 44 37 ea e2 d9 21 |..9K.`....D7...!| -peer0.org1.example.com | 00000040 42 2d 2b 9a b8 bd 1a |B-+....|" -peer0.org1.example.com | "2019-05-02 01:31:05.438 UTC [msp.identity] Verify -> DEBU 18e4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:05.439 UTC [msp.identity] Verify -> DEBU 18e5 Verify: sig = 00000000 30 45 02 21 00 de 64 5d 3a 7b 8a 34 b1 14 ab d6 |0E.!..d]:{.4....| -peer0.org1.example.com | 00000010 4c 56 80 ad 04 85 f8 3d 78 c8 9e 2d 29 60 29 d3 |LV.....=x..-)`).| -peer0.org1.example.com | 00000020 9a f8 4d b8 7a 02 20 66 f8 e1 ea d5 8f 3e 22 2c |..M.z. f.....>",| -peer0.org1.example.com | 00000030 de 16 88 5a e6 b4 8f 71 ed 7c 14 05 55 40 40 95 |...Z...q.|..U@@.| -peer0.org1.example.com | 00000040 fb cd f6 d3 f2 98 55 |......U|" -peer0.org1.example.com | "2019-05-02 01:31:05.439 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:05.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e8 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 " -peer0.org1.example.com | "2019-05-02 01:31:05.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e9 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 " -peer0.org1.example.com | "2019-05-02 01:31:05.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 18ea Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:05.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 18eb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.440 UTC [gossip.discovery] handleAliveMessage -> DEBU 18ec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.440 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ed Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.440 UTC [gossip.discovery] sendMemResponse -> DEBU 18ee Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:05.441 UTC [msp] DeserializeIdentity -> DEBU 18ef Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.442 UTC [msp] DeserializeIdentity -> DEBU 18f0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.442 UTC [gossip.comm] Send -> DEBU 18f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:05.442 UTC [gossip.discovery] sendMemResponse -> DEBU 18f2 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:05.442 UTC [gossip.comm] sendToEndpoint -> DEBU 18f3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.447 UTC [gossip.comm] sendToEndpoint -> DEBU 18f4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.512 UTC [gossip.comm] func1 -> DEBU 18f5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.513 UTC [gossip.gossip] handleMessage -> DEBU 18f6 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.513 UTC [gossip.pull] HandleMessage -> DEBU 18f7 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.514 UTC [msp] DeserializeIdentity -> DEBU 18f8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.514 UTC [msp] DeserializeIdentity -> DEBU 18f9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.515 UTC [msp] DeserializeIdentity -> DEBU 18fa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.526 UTC [msp] DeserializeIdentity -> DEBU 18fb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.527 UTC [msp] DeserializeIdentity -> DEBU 18fc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.527 UTC [msp] DeserializeIdentity -> DEBU 18fd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.528 UTC [gossip.pull] SendDigest -> DEBU 18fe Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:05.528 UTC [gossip.gossip] handleMessage -> DEBU 18ff Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.530 UTC [gossip.comm] func1 -> DEBU 1900 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.534 UTC [gossip.gossip] handleMessage -> DEBU 1901 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.535 UTC [gossip.gossip] handleMessage -> DEBU 1902 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1903 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.536 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1904 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:05.537 UTC [msp] DeserializeIdentity -> DEBU 1905 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.538 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1906 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:05.542 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1907 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.543 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1908 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.543 UTC [policies] Evaluate -> DEBU 1909 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.543 UTC [policies] Evaluate -> DEBU 190a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:05.544 UTC [policies] Evaluate -> DEBU 190b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.545 UTC [cauthdsl] func1 -> DEBU 190c 0xc003d84940 gate 1556760665544977700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:05.546 UTC [cauthdsl] func2 -> DEBU 190d 0xc003d84940 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:05.547 UTC [cauthdsl] func2 -> DEBU 190e 0xc003d84940 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:05.549 UTC [cauthdsl] func2 -> DEBU 190f 0xc003d84940 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.550 UTC [msp.identity] Verify -> DEBU 1910 Verify: digest = 00000000 db 77 4b 12 bc 31 76 19 bb b3 97 35 bb 2f 6f ce |.wK..1v....5./o.| -peer0.org1.example.com | 00000010 c3 13 d7 e1 d1 37 77 ae 7f ea ba 96 fa 50 e1 85 |.....7w......P..|" -peer0.org1.example.com | "2019-05-02 01:31:05.550 UTC [msp.identity] Verify -> DEBU 1911 Verify: sig = 00000000 30 44 02 20 43 5a 8c 61 dc 74 c0 2d c9 80 1a cd |0D. CZ.a.t.-....| -peer0.org1.example.com | 00000010 fd a9 9a c0 07 c7 14 dd 0b cc f3 2b b9 aa 11 e5 |...........+....| -peer0.org1.example.com | 00000020 b6 12 be b6 02 20 33 a9 f0 5e a1 4d f5 41 de be |..... 3..^.M.A..| -peer0.org1.example.com | 00000030 0f 48 3a ee e9 63 ed c8 8b 82 57 cc 33 ec cf 60 |.H:..c....W.3..`| -peer0.org1.example.com | 00000040 f9 44 e0 43 f0 17 |.D.C..|" -peer0.org1.example.com | "2019-05-02 01:31:05.553 UTC [cauthdsl] func2 -> DEBU 1912 0xc003d84940 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.553 UTC [cauthdsl] func1 -> DEBU 1913 0xc003d84940 gate 1556760665544977700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:05.553 UTC [policies] Evaluate -> DEBU 1914 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.554 UTC [policies] Evaluate -> DEBU 1915 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.555 UTC [policies] Evaluate -> DEBU 1916 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.557 UTC [policies] Evaluate -> DEBU 1917 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.558 UTC [gossip.discovery] handleAliveMessage -> DEBU 1918 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1919 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:05.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 191a updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 " -peer0.org1.example.com | "2019-05-02 01:31:05.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 191b Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 " -peer0.org1.example.com | "2019-05-02 01:31:05.560 UTC [gossip.discovery] learnExistingMembers -> DEBU 191c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:05.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 191d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 191e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 191f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.562 UTC [gossip.discovery] sendMemResponse -> DEBU 1920 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:05.564 UTC [msp] DeserializeIdentity -> DEBU 1921 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.565 UTC [msp] DeserializeIdentity -> DEBU 1922 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.566 UTC [msp] DeserializeIdentity -> DEBU 1923 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.566 UTC [gossip.comm] Send -> DEBU 1924 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:05.568 UTC [gossip.comm] sendToEndpoint -> DEBU 1926 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.569 UTC [gossip.comm] sendToEndpoint -> DEBU 1927 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.567 UTC [gossip.discovery] sendMemResponse -> DEBU 1925 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:05.577 UTC [gossip.comm] func1 -> DEBU 1928 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.577 UTC [gossip.comm] func1 -> DEBU 1929 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760661744638500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.581 UTC [gossip.gossip] handleMessage -> DEBU 192a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.581 UTC [msp] DeserializeIdentity -> DEBU 192b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.582 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.582 UTC [msp] DeserializeIdentity -> DEBU 192d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.582 UTC [gossip.gossip] handleMessage -> DEBU 192e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.582 UTC [gossip.gossip] handleMessage -> DEBU 192f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760661744638500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.582 UTC [msp] DeserializeIdentity -> DEBU 1930 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.583 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1931 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:05.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1932 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1933 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.583 UTC [policies] Evaluate -> DEBU 1934 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.583 UTC [policies] Evaluate -> DEBU 1935 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:05.584 UTC [policies] Evaluate -> DEBU 1936 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.584 UTC [cauthdsl] func1 -> DEBU 1937 0xc003d95820 gate 1556760665584207800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:05.584 UTC [cauthdsl] func2 -> DEBU 1938 0xc003d95820 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:05.584 UTC [cauthdsl] func2 -> DEBU 1939 0xc003d95820 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:05.584 UTC [cauthdsl] func2 -> DEBU 193a 0xc003d95820 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.584 UTC [msp.identity] Verify -> DEBU 193b Verify: digest = 00000000 6e b0 75 c4 51 40 0e aa 99 5b d4 4c e9 2b e8 4b |n.u.Q@...[.L.+.K| -peer0.org1.example.com | 00000010 ef 3b fb 35 be f1 cd 9c a2 03 51 d3 59 0e 44 3f |.;.5......Q.Y.D?|" -peer0.org1.example.com | "2019-05-02 01:31:05.585 UTC [msp.identity] Verify -> DEBU 193c Verify: sig = 00000000 30 44 02 20 03 37 d6 b4 db fc c5 c5 97 d9 b7 82 |0D. .7..........| -peer0.org1.example.com | 00000010 cb 4f 24 2e 01 c9 0e 5c d3 74 96 47 c2 70 5b 15 |.O$....\.t.G.p[.| -peer0.org1.example.com | 00000020 fb c0 c7 e5 02 20 50 5c 72 51 31 e9 74 c2 2b 1c |..... P\rQ1.t.+.| -peer0.org1.example.com | 00000030 3a 93 ab aa 2e 7a 88 04 ea b7 85 74 e0 2a 64 2d |:....z.....t.*d-| -peer0.org1.example.com | 00000040 14 3b 47 ea f2 83 |.;G...|" -peer0.org1.example.com | "2019-05-02 01:31:05.585 UTC [cauthdsl] func2 -> DEBU 193d 0xc003d95820 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.585 UTC [cauthdsl] func1 -> DEBU 193e 0xc003d95820 gate 1556760665584207800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:05.585 UTC [policies] Evaluate -> DEBU 193f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.585 UTC [policies] Evaluate -> DEBU 1940 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.586 UTC [policies] Evaluate -> DEBU 1941 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.586 UTC [policies] Evaluate -> DEBU 1942 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.586 UTC [msp] DeserializeIdentity -> DEBU 1943 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.586 UTC [gossip.gossip] handleMessage -> DEBU 1944 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.739 UTC [gossip.comm] func1 -> DEBU 1945 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.740 UTC [gossip.gossip] handleMessage -> DEBU 1946 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.744 UTC [gossip.pull] HandleMessage -> DEBU 1947 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.744 UTC [msp] DeserializeIdentity -> DEBU 1948 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.745 UTC [msp] DeserializeIdentity -> DEBU 1949 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.745 UTC [msp] DeserializeIdentity -> DEBU 194a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.766 UTC [msp] DeserializeIdentity -> DEBU 194b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.766 UTC [msp] DeserializeIdentity -> DEBU 194c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.766 UTC [msp] DeserializeIdentity -> DEBU 194d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.767 UTC [gossip.pull] SendDigest -> DEBU 194e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:05.767 UTC [gossip.gossip] handleMessage -> DEBU 194f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.820 UTC [gossip.pull] Hello -> DEBU 1950 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:05.821 UTC [gossip.comm] Send -> DEBU 1951 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:05.822 UTC [gossip.pull] Hello -> DEBU 1952 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:05.823 UTC [gossip.comm] sendToEndpoint -> DEBU 1953 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.823 UTC [gossip.comm] sendToEndpoint -> DEBU 1954 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.823 UTC [gossip.comm] Send -> DEBU 1955 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:05.824 UTC [gossip.pull] Hello -> DEBU 1956 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:05.824 UTC [gossip.comm] sendToEndpoint -> DEBU 1957 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.824 UTC [gossip.comm] sendToEndpoint -> DEBU 1958 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.824 UTC [gossip.comm] Send -> DEBU 1959 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:05.826 UTC [gossip.comm] sendToEndpoint -> DEBU 195a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.827 UTC [gossip.comm] sendToEndpoint -> DEBU 195b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.829 UTC [gossip.comm] func1 -> DEBU 195c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12768357129974227833 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.831 UTC [gossip.gossip] handleMessage -> DEBU 195d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12768357129974227833 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.832 UTC [gossip.pull] HandleMessage -> DEBU 195e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12768357129974227833 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.833 UTC [gossip.gossip] handleMessage -> DEBU 195f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.834 UTC [gossip.gossip] handleMessage -> DEBU 1960 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18088168092701794657 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.835 UTC [gossip.pull] HandleMessage -> DEBU 1961 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18088168092701794657 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.835 UTC [gossip.gossip] handleMessage -> DEBU 1962 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.838 UTC [gossip.comm] func1 -> DEBU 1963 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5543474449212557970 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.839 UTC [gossip.gossip] handleMessage -> DEBU 1964 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5543474449212557970 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.840 UTC [gossip.pull] HandleMessage -> DEBU 1965 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5543474449212557970 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.841 UTC [gossip.gossip] handleMessage -> DEBU 1966 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.901 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1967 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.902 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1968 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.902 UTC [policies] Evaluate -> DEBU 1969 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-05-02 01:31:05.903 UTC [policies] Evaluate -> DEBU 196a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:05.903 UTC [policies] Evaluate -> DEBU 196b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.904 UTC [cauthdsl] func1 -> DEBU 196c 0xc003dc8f90 gate 1556760665904282900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:05.904 UTC [cauthdsl] func2 -> DEBU 196d 0xc003dc8f90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:05.905 UTC [cauthdsl] func2 -> DEBU 196e 0xc003dc8f90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:05.905 UTC [cauthdsl] func2 -> DEBU 196f 0xc003dc8f90 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.905 UTC [msp.identity] Verify -> DEBU 1970 Verify: digest = 00000000 c3 b0 a3 50 1c 07 20 3c 33 56 54 ff 3a 82 be 01 |...P.. <3VT.:...| -peer0.org1.example.com | 00000010 9d ae 9e b3 7c e1 6e 6d cd 86 11 80 05 3b 01 12 |....|.nm.....;..|" -peer0.org1.example.com | "2019-05-02 01:31:05.906 UTC [msp.identity] Verify -> DEBU 1971 Verify: sig = 00000000 30 45 02 21 00 96 0f 96 4e 1c cb 82 b2 a5 1b cb |0E.!....N.......| -peer0.org1.example.com | 00000010 9c 5e a9 9a da 30 45 32 39 75 4c 2d d7 03 b6 06 |.^...0E29uL-....| -peer0.org1.example.com | 00000020 d4 65 6b 34 aa 02 20 1e e1 84 4c e0 1e 67 86 64 |.ek4.. ...L..g.d| -peer0.org1.example.com | 00000030 0f 82 d6 7f be bc cb 8b fc 0e 7b 6e f4 5c 59 01 |..........{n.\Y.| -peer0.org1.example.com | 00000040 d9 e0 1b 50 6d 5b 3d |...Pm[=|" -peer0.org1.example.com | "2019-05-02 01:31:05.907 UTC [cauthdsl] func2 -> DEBU 1972 0xc003dc8f90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.911 UTC [cauthdsl] func1 -> DEBU 1973 0xc003dc8f90 gate 1556760665904282900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:05.912 UTC [policies] Evaluate -> DEBU 1974 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:05.912 UTC [policies] Evaluate -> DEBU 1975 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:05.913 UTC [policies] Evaluate -> DEBU 1976 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:05.913 UTC [policies] Evaluate -> DEBU 1977 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:05.914 UTC [blocksProvider] DeliverBlocks -> DEBU 1978 [businesschannel] Adding payload to local buffer, blockNum = [5]" -peer0.org1.example.com | "2019-05-02 01:31:05.915 UTC [gossip.state] addPayload -> DEBU 1979 [businesschannel] Adding payload to local buffer, blockNum = [5]" -peer0.org1.example.com | "2019-05-02 01:31:05.915 UTC [gossip.state] addPayload -> DEBU 197a Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-05-02 01:31:05.916 UTC [blocksProvider] DeliverBlocks -> DEBU 197b [businesschannel] Gossiping block [5], peers number [3]" -peer0.org1.example.com | "2019-05-02 01:31:05.918 UTC [gossip.channel] AddToMsgStore -> DEBU 197c Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5725 bytes, seq: 5}, Envelope: 5755 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-05-02 01:31:05.918 UTC [gossip.pull] Add -> DEBU 197d Added 5, total items: 5" -peer0.org1.example.com | "2019-05-02 01:31:05.919 UTC [gossip.state] deliverPayloads -> DEBU 197e [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" -peer0.org1.example.com | "2019-05-02 01:31:05.920 UTC [gossip.state] deliverPayloads -> DEBU 197f [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-05-02 01:31:05.923 UTC [gossip.privdata] StoreBlock -> INFO 1980 [businesschannel] Received block [5] from buffer" -peer0.org1.example.com | "2019-05-02 01:31:05.925 UTC [gossip.privdata] StoreBlock -> DEBU 1981 [businesschannel] Validating block [5]" -peer0.org1.example.com | "2019-05-02 01:31:05.926 UTC [committer.txvalidator] Validate -> DEBU 1982 [businesschannel] START Block Validation for block [5]" -peer0.org1.example.com | "2019-05-02 01:31:05.928 UTC [committer.txvalidator] Validate -> DEBU 1983 expecting 1 block validation responses" -peer0.org1.example.com | "2019-05-02 01:31:05.928 UTC [committer.txvalidator] validateTx -> DEBU 1984 [businesschannel] validateTx starts for block 0xc003b8fec0 env 0xc003dde2d0 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:05.928 UTC [protoutils] ValidateTransaction -> DEBU 1985 ValidateTransactionEnvelope starts for envelope 0xc003dde2d0" -peer0.org1.example.com | "2019-05-02 01:31:05.929 UTC [gossip.comm] func1 -> DEBU 1986 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.930 UTC [gossip.gossip] handleMessage -> DEBU 1987 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.929 UTC [protoutils] ValidateTransaction -> DEBU 1988 Header is channel_header:"\010\003\032\014\010\327\220\251\346\005\020\270\310\343\262\002\"\017businesschannel*@c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030J^\243\210y\331\303.\220\330~\t\235\330I\300\023\026\250\262\335\254\344\030" " -peer0.org1.example.com | "2019-05-02 01:31:05.930 UTC [protoutils] validateChannelHeader -> DEBU 1989 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:05.930 UTC [protoutils] checkSignatureFromCreator -> DEBU 198a begin" -peer0.org1.example.com | "2019-05-02 01:31:05.930 UTC [msp] GetManagerForChain -> DEBU 198b Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:05.930 UTC [protoutils] checkSignatureFromCreator -> DEBU 198c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:05.930 UTC [protoutils] checkSignatureFromCreator -> DEBU 198d creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:05.930 UTC [msp.identity] Verify -> DEBU 198e Verify: digest = 00000000 03 14 9e 71 a1 36 1e 2d 0f 44 72 fa 0c 27 8f 81 |...q.6.-.Dr..'..| -peer0.org1.example.com | 00000010 23 a1 3c e5 44 3d ed 70 77 c3 f9 01 7c 4d 36 5b |#.<.D=.pw...|M6[|" -peer0.org1.example.com | "2019-05-02 01:31:05.931 UTC [msp.identity] Verify -> DEBU 198f Verify: sig = 00000000 30 44 02 20 7d 9e 40 85 03 46 bf 49 0c 16 c7 f4 |0D. }.@..F.I....| -peer0.org1.example.com | 00000010 2d 15 37 bc 11 7e 31 6d 41 0b a4 02 37 c3 4d 4e |-.7..~1mA...7.MN| -peer0.org1.example.com | 00000020 67 3a 24 43 02 20 27 53 1c 1b e1 0c ef ef 89 d0 |g:$C. 'S........| -peer0.org1.example.com | 00000030 b0 27 77 60 0b a1 dd 73 6a a9 68 6a b4 b8 47 af |.'w`...sj.hj..G.| -peer0.org1.example.com | 00000040 a2 10 d6 ec 0e 1d |......|" -peer0.org1.example.com | "2019-05-02 01:31:05.930 UTC [gossip.gossip] handleMessage -> DEBU 1990 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1991 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.931 UTC [protoutils] checkSignatureFromCreator -> DEBU 1992 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:05.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1993 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:05.932 UTC [msp] DeserializeIdentity -> DEBU 1994 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.932 UTC [protoutils] validateEndorserTransaction -> DEBU 1995 validateEndorserTransaction starts for data 0xc003df4000, header channel_header:"\010\003\032\014\010\327\220\251\346\005\020\270\310\343\262\002\"\017businesschannel*@c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030J^\243\210y\331\303.\220\330~\t\235\330I\300\023\026\250\262\335\254\344\030" " -peer0.org1.example.com | "2019-05-02 01:31:05.932 UTC [protoutils] validateEndorserTransaction -> DEBU 1996 validateEndorserTransaction info: there are 1 actions" -peer0.org1.example.com | "2019-05-02 01:31:05.932 UTC [protoutils] validateEndorserTransaction -> DEBU 1997 validateEndorserTransaction info: signature header is valid" -peer0.org1.example.com | "2019-05-02 01:31:05.932 UTC [protoutils] ValidateTransaction -> DEBU 1998 ValidateTransactionEnvelope returns err %!s()" -peer0.org1.example.com | "2019-05-02 01:31:05.933 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1999 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:05.933 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 199a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.933 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 199b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:05.933 UTC [policies] Evaluate -> DEBU 199c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.933 UTC [policies] Evaluate -> DEBU 199d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:05.933 UTC [policies] Evaluate -> DEBU 199e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:05.936 UTC [msp] DeserializeIdentity -> DEBU 199f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.937 UTC [msp] DeserializeIdentity -> DEBU 19a0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.937 UTC [msp] DeserializeIdentity -> DEBU 19a1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.938 UTC [msp] DeserializeIdentity -> DEBU 19a2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.938 UTC [gossip.comm] Send -> DEBU 19a3 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5725 bytes, seq: 5}, Envelope: 5755 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:05.938 UTC [msp] DeserializeIdentity -> DEBU 19a4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.938 UTC [msp] DeserializeIdentity -> DEBU 19a5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.938 UTC [gossip.comm] sendToEndpoint -> DEBU 19a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5725 bytes, seq: 5}, Envelope: 5755 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.938 UTC [gossip.comm] sendToEndpoint -> DEBU 19a7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.933 UTC [committer.txvalidator] validateTx -> DEBU 19a8 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:05.946 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 19a9 retrieveTransactionByID() - txId = [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf]" -peer0.org1.example.com | "2019-05-02 01:31:05.946 UTC [committer.txvalidator] validateTx -> DEBU 19aa Validating transaction with plugins" -peer0.org1.example.com | "2019-05-02 01:31:05.946 UTC [committer.txvalidator] Dispatch -> DEBU 19ab [businesschannel] Dispatch starts for bytes 0xc003ddcc00" -peer0.org1.example.com | "2019-05-02 01:31:05.947 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19ac constructing new query executor txid = [23bf76f5-a78e-44e0-a620-475f4717b44d]" -peer0.org1.example.com | "2019-05-02 01:31:05.947 UTC [lockbasedtxmgr] Done -> DEBU 19ad Done with transaction simulation / query execution [23bf76f5-a78e-44e0-a620-475f4717b44d]" -peer0.org1.example.com | "2019-05-02 01:31:05.933 UTC [cauthdsl] func1 -> DEBU 19ae 0xc003dfd1f0 gate 1556760665933761900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:05.954 UTC [cauthdsl] func2 -> DEBU 19af 0xc003dfd1f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:05.955 UTC [cauthdsl] func2 -> DEBU 19b0 0xc003dfd1f0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:05.959 UTC [cauthdsl] func2 -> DEBU 19b2 0xc003dfd1f0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.959 UTC [msp.identity] Verify -> DEBU 19b3 Verify: digest = 00000000 2c 75 3e 60 39 b7 46 71 58 fc b5 58 d9 2c d8 bf |,u>`9.FqX..X.,..| -peer0.org1.example.com | 00000010 48 2b a3 11 66 57 dd 1e 5b 2e ff 62 39 d4 0e a7 |H+..fW..[..b9...|" -peer0.org1.example.com | "2019-05-02 01:31:05.962 UTC [msp.identity] Verify -> DEBU 19b4 Verify: sig = 00000000 30 45 02 21 00 e8 69 4c 1d 34 59 90 40 bf c5 bf |0E.!..iL.4Y.@...| -peer0.org1.example.com | 00000010 11 d2 02 d7 f6 94 a8 e8 79 06 04 06 6c 3b f5 65 |........y...l;.e| -peer0.org1.example.com | 00000020 68 8e 20 0b 97 02 20 52 42 5b b3 e5 19 93 ce 48 |h. ... RB[.....H| -peer0.org1.example.com | 00000030 e7 ce 6a 25 88 49 06 53 17 d0 77 ba 85 a2 ad a8 |..j%.I.S..w.....| -peer0.org1.example.com | 00000040 d2 dd bd a7 0e 3e a9 |.....>.|" -peer0.org1.example.com | "2019-05-02 01:31:05.962 UTC [cauthdsl] func2 -> DEBU 19b5 0xc003dfd1f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.962 UTC [cauthdsl] func1 -> DEBU 19b6 0xc003dfd1f0 gate 1556760665933761900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:05.962 UTC [policies] Evaluate -> DEBU 19b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.962 UTC [policies] Evaluate -> DEBU 19b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.963 UTC [policies] Evaluate -> DEBU 19b9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.964 UTC [policies] Evaluate -> DEBU 19ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:05.947 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 19bb Validating Tx c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" -peer0.org1.example.com | "2019-05-02 01:31:05.964 UTC [gossip.discovery] handleAliveMessage -> DEBU 19bc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.966 UTC [gossip.discovery] learnExistingMembers -> DEBU 19bd Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:05.966 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19be constructing new query executor txid = [49ad6e56-ea6b-44da-b158-ba33205af477]" -peer0.org1.example.com | "2019-05-02 01:31:05.966 UTC [lockbasedtxmgr] Done -> DEBU 19bf Done with transaction simulation / query execution [49ad6e56-ea6b-44da-b158-ba33205af477]" -peer0.org1.example.com | "2019-05-02 01:31:05.966 UTC [policies] Evaluate -> DEBU 19c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement ==" -peer0.org1.example.com | "2019-05-02 01:31:05.966 UTC [policies] Evaluate -> DEBU 19c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:05.966 UTC [policies] Evaluate -> DEBU 19c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" -peer0.org1.example.com | "2019-05-02 01:31:05.967 UTC [cauthdsl] func1 -> DEBU 19c3 0xc003e4a540 gate 1556760665967024600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:05.967 UTC [cauthdsl] func2 -> DEBU 19c4 0xc003e4a540 signed by 0 principal evaluation starts (used [false false])" -peer0.org1.example.com | "2019-05-02 01:31:05.957 UTC [msp.identity] Sign -> DEBU 19b1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151018 " -peer0.org1.example.com | "2019-05-02 01:31:05.972 UTC [msp.identity] Sign -> DEBU 19c5 Sign: digest: 24142A334A92D44CEF28CD02E8DD5A782BE45A54D8CF3FB587D59CFE16CEF166 " -peer0.org1.example.com | "2019-05-02 01:31:05.972 UTC [msp.identity] Sign -> DEBU 19c6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:05.972 UTC [msp.identity] Sign -> DEBU 19c7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:05.967 UTC [cauthdsl] func2 -> DEBU 19c8 0xc003e4a540 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:05.972 UTC [cauthdsl] func2 -> DEBU 19c9 0xc003e4a540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:05.972 UTC [cauthdsl] func2 -> DEBU 19ca 0xc003e4a540 processing identity 1 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:05.973 UTC [cauthdsl] func2 -> DEBU 19cb 0xc003e4a540 principal matched by identity 1" -peer0.org1.example.com | "2019-05-02 01:31:05.973 UTC [msp.identity] Verify -> DEBU 19cc Verify: digest = 00000000 aa 74 1e 98 9a 9d 50 67 ea 76 b9 2b 4d ec d7 cb |.t....Pg.v.+M...| -peer0.org1.example.com | 00000010 6d 92 c1 5c ca f5 a1 47 f9 48 45 a0 bb 1d 88 dc |m..\...G.HE.....|" -peer0.org1.example.com | "2019-05-02 01:31:05.973 UTC [msp.identity] Verify -> DEBU 19cd Verify: sig = 00000000 30 45 02 21 00 fb 93 5c 51 ff 87 c0 c5 11 8b 83 |0E.!...\Q.......| -peer0.org1.example.com | 00000010 65 e4 d7 3a b1 a7 00 89 91 03 9b 93 a9 c6 0a 68 |e..:...........h| -peer0.org1.example.com | 00000020 ae 83 12 63 a3 02 20 31 d8 39 1f c6 a1 ec 53 1f |...c.. 1.9....S.| -peer0.org1.example.com | 00000030 70 51 f7 66 90 b7 94 66 37 c3 0f 2e 5e 6b 97 da |pQ.f...f7...^k..| -peer0.org1.example.com | 00000040 e8 21 bb 95 71 8f 77 |.!..q.w|" -peer0.org1.example.com | "2019-05-02 01:31:05.971 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ce updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 " -peer0.org1.example.com | "2019-05-02 01:31:05.974 UTC [gossip.discovery] learnExistingMembers -> DEBU 19d0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 " -peer0.org1.example.com | "2019-05-02 01:31:05.974 UTC [gossip.discovery] learnExistingMembers -> DEBU 19d1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:05.974 UTC [gossip.discovery] learnExistingMembers -> DEBU 19d2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.974 UTC [gossip.discovery] handleAliveMessage -> DEBU 19d3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19d4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.975 UTC [gossip.discovery] sendMemResponse -> DEBU 19d5 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:05.975 UTC [gossip.comm] Send -> DEBU 19d6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:05.976 UTC [msp] DeserializeIdentity -> DEBU 19d7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.976 UTC [gossip.comm] Send -> DEBU 19d8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:05.977 UTC [msp] DeserializeIdentity -> DEBU 19da Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.982 UTC [gossip.comm] sendToEndpoint -> DEBU 19db Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.982 UTC [gossip.comm] sendToEndpoint -> DEBU 19dc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.974 UTC [cauthdsl] func2 -> DEBU 19cf 0xc003e4a540 principal evaluation succeeds for identity 1" -peer0.org1.example.com | "2019-05-02 01:31:05.982 UTC [cauthdsl] func1 -> DEBU 19dd 0xc003e4a540 gate 1556760665967024600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:05.983 UTC [policies] Evaluate -> DEBU 19de Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:05.983 UTC [policies] Evaluate -> DEBU 19df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:05.983 UTC [policies] Evaluate -> DEBU 19e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" -peer0.org1.example.com | "2019-05-02 01:31:05.983 UTC [cauthdsl] func1 -> DEBU 19e1 0xc003e3bca0 gate 1556760665983309300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:05.983 UTC [cauthdsl] func2 -> DEBU 19e2 0xc003e3bca0 signed by 0 principal evaluation starts (used [false false])" -peer0.org1.example.com | "2019-05-02 01:31:05.983 UTC [cauthdsl] func2 -> DEBU 19e3 0xc003e3bca0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:05.983 UTC [cauthdsl] func2 -> DEBU 19e4 0xc003e3bca0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.984 UTC [msp.identity] Verify -> DEBU 19e5 Verify: digest = 00000000 57 ed 09 c5 e0 f9 01 19 6c cd 8e 7d 83 21 4f c8 |W.......l..}.!O.| -peer0.org1.example.com | 00000010 0c 98 9f 13 c0 ee ac 98 ef e5 27 0e 3e 41 ad 4a |..........'.>A.J|" -peer0.org1.example.com | "2019-05-02 01:31:05.984 UTC [msp.identity] Verify -> DEBU 19e6 Verify: sig = 00000000 30 44 02 20 12 44 ae 72 8e 07 e1 8e 9d 5a fc b3 |0D. .D.r.....Z..| -peer0.org1.example.com | 00000010 72 2d bd 48 2d 84 a6 73 c5 f9 ce ec 61 9e e2 c9 |r-.H-..s....a...| -peer0.org1.example.com | 00000020 c1 be 3a 9e 02 20 4f e5 a0 de 61 9f 78 a7 f5 6c |..:.. O...a.x..l| -peer0.org1.example.com | 00000030 8b 9f d3 18 83 78 9d c6 f3 e4 81 f2 e0 9f d3 69 |.....x.........i| -peer0.org1.example.com | 00000040 1f f5 12 e4 42 9b |....B.|" -peer0.org1.example.com | "2019-05-02 01:31:05.985 UTC [cauthdsl] func2 -> DEBU 19e7 0xc003e3bca0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:05.985 UTC [cauthdsl] func1 -> DEBU 19e8 0xc003e3bca0 gate 1556760665983309300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:05.985 UTC [policies] Evaluate -> DEBU 19e9 Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:05.985 UTC [policies] Evaluate -> DEBU 19ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:05.985 UTC [policies] Evaluate -> DEBU 19eb Signature set satisfies policy /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-05-02 01:31:05.985 UTC [policies] Evaluate -> DEBU 19ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-05-02 01:31:05.985 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19ed constructing new query executor txid = [cad7b638-32a9-4fc6-9c45-bd451c8c922e]" -peer0.org1.example.com | "2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] Done -> DEBU 19ee Done with transaction simulation / query execution [cad7b638-32a9-4fc6-9c45-bd451c8c922e]" -peer0.org1.example.com | "2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19ef constructing new query executor txid = [1bfd5d88-4ec1-42bb-a7f5-7245cf2ee23c]" -peer0.org1.example.com | "2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] Done -> DEBU 19f0 Done with transaction simulation / query execution [1bfd5d88-4ec1-42bb-a7f5-7245cf2ee23c]" -peer0.org1.example.com | "2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19f1 constructing new query executor txid = [56222f12-3a64-4fb2-a3f8-5a52639e099d]" -peer0.org1.example.com | "2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] Done -> DEBU 19f2 Done with transaction simulation / query execution [56222f12-3a64-4fb2-a3f8-5a52639e099d]" -peer0.org1.example.com | "2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19f3 constructing new query executor txid = [239aa37a-cba1-48c8-afe1-10d71ca2ce26]" -peer0.org1.example.com | "2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] Done -> DEBU 19f4 Done with transaction simulation / query execution [239aa37a-cba1-48c8-afe1-10d71ca2ce26]" -peer0.org1.example.com | "2019-05-02 01:31:05.986 UTC [vscc] Validate -> DEBU 19f5 block 5, namespace: _lifecycle, tx 0 validation results is: " -peer0.org1.example.com | "2019-05-02 01:31:05.987 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 19f6 Transaction c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf appears to be valid" -peer0.org1.example.com | "2019-05-02 01:31:05.987 UTC [committer.txvalidator] Dispatch -> DEBU 19f7 [businesschannel] Dispatch completes env bytes 0xc003ddcc00" -peer0.org1.example.com | "2019-05-02 01:31:05.987 UTC [committer.txvalidator] validateTx -> DEBU 19f8 [businesschannel] validateTx completes for block 0xc003b8fec0 env 0xc003dde2d0 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:05.987 UTC [committer.txvalidator] Validate -> DEBU 19f9 got result for idx 0, code 0" -peer0.org1.example.com | "2019-05-02 01:31:05.987 UTC [committer.txvalidator] Validate -> INFO 19fa [businesschannel] Validated block [5] in 60ms" -peer0.org1.example.com | "2019-05-02 01:31:05.991 UTC [gossip.comm] sendToEndpoint -> DEBU 19fb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.991 UTC [gossip.comm] sendToEndpoint -> DEBU 19fc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.975 UTC [msp] DeserializeIdentity -> DEBU 19d9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.993 UTC [msp] DeserializeIdentity -> DEBU 19fd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.993 UTC [msp] DeserializeIdentity -> DEBU 19fe Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:05.993 UTC [gossip.comm] Send -> DEBU 19ff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:05.995 UTC [gossip.discovery] sendMemResponse -> DEBU 1a00 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:05.996 UTC [gossip.comm] sendToEndpoint -> DEBU 1a01 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.996 UTC [gossip.comm] sendToEndpoint -> DEBU 1a02 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:05.996 UTC [gossip.comm] Send -> DEBU 1a03 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:05.997 UTC [gossip.comm] sendToEndpoint -> DEBU 1a04 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:05.997 UTC [gossip.comm] sendToEndpoint -> DEBU 1a05 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.004 UTC [gossip.privdata] containsWrites -> DEBU 1a06 HashedRWSet of tx c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, namespace _lifecycle, collection _implicit_org_Org1MSP doesn't contain writes" -peer0.org1.example.com | "2019-05-02 01:31:06.004 UTC [gossip.privdata] containsWrites -> DEBU 1a07 HashedRWSet of tx c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, namespace _lifecycle, collection _implicit_org_Org2MSP doesn't contain writes" -peer0.org1.example.com | "2019-05-02 01:31:06.004 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1a08 Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-05-02 01:31:06.004 UTC [gossip.privdata] StoreBlock -> DEBU 1a09 [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-05-02 01:31:06.006 UTC [gossip.comm] func1 -> DEBU 1a0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.009 UTC [gossip.gossip] handleMessage -> DEBU 1a0c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.009 UTC [gossip.gossip] handleMessage -> DEBU 1a0d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.009 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a0f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:06.004 UTC [kvledger] CommitWithPvtData -> DEBU 1a0b [businesschannel] Validating state for block [5]" -peer0.org1.example.com | "2019-05-02 01:31:06.010 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1a10 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:31:06.011 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1a11 lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-05-02 01:31:06.012 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1a12 Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-05-02 01:31:06.012 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1a13 ValidateAndPrepareBatch() for block number = [5]" -peer0.org1.example.com | "2019-05-02 01:31:06.015 UTC [gossip.gossip] handleMessage -> DEBU 1a16 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.011 UTC [msp.identity] Verify -> DEBU 1a14 Verify: digest = 00000000 24 14 2a 33 4a 92 d4 4c ef 28 cd 02 e8 dd 5a 78 |$.*3J..L.(....Zx| -peer0.org1.example.com | 00000010 2b e4 5a 54 d8 cf 3f b5 87 d5 9c fe 16 ce f1 66 |+.ZT..?........f|" -peer0.org1.example.com | "2019-05-02 01:31:06.015 UTC [msp.identity] Verify -> DEBU 1a17 Verify: sig = 00000000 30 45 02 21 00 f0 69 88 0f 8e cf 0e 30 fa 2e 14 |0E.!..i.....0...| -peer0.org1.example.com | 00000010 ea 91 9a 47 3d a5 fb c4 9d 2c 73 01 02 fd b1 b1 |...G=....,s.....| -peer0.org1.example.com | 00000020 d7 6c f1 59 93 02 20 28 61 72 6e 4b df f3 bf a1 |.l.Y.. (arnK....| -peer0.org1.example.com | 00000030 a9 55 1d 3d 66 8b 8c 4b 15 8a 91 5d 95 b4 ae 08 |.U.=f..K...]....| -peer0.org1.example.com | 00000040 eb 92 cb 02 30 39 ca |....09.|" -peer0.org1.example.com | "2019-05-02 01:31:06.014 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1a15 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:06.016 UTC [valimpl] preprocessProtoBlock -> DEBU 1a18 txType=ENDORSER_TRANSACTION" -peer0.org1.example.com | "2019-05-02 01:31:06.017 UTC [stateleveldb] GetState -> DEBU 1a19 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:06.018 UTC [statebasedval] validateKVRead -> DEBU 1a1a Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -peer0.org1.example.com | "2019-05-02 01:31:06.018 UTC [stateleveldb] GetState -> DEBU 1a1b GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -peer0.org1.example.com | "2019-05-02 01:31:06.019 UTC [statebasedval] validateKVRead -> DEBU 1a1c Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -peer0.org1.example.com | "2019-05-02 01:31:06.019 UTC [stateleveldb] GetState -> DEBU 1a1e GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -peer0.org1.example.com | "2019-05-02 01:31:06.019 UTC [stateleveldb] GetState -> DEBU 1a1f GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" -peer0.org1.example.com | "2019-05-02 01:31:06.020 UTC [stateleveldb] GetState -> DEBU 1a20 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1a21 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -peer0.org1.example.com | "2019-05-02 01:31:06.020 UTC [stateleveldb] GetState -> DEBU 1a22 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -peer0.org1.example.com | "2019-05-02 01:31:06.020 UTC [stateleveldb] GetState -> DEBU 1a23 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" -peer0.org1.example.com | "2019-05-02 01:31:06.020 UTC [stateleveldb] GetState -> DEBU 1a24 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 1a25 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" -peer0.org1.example.com | "2019-05-02 01:31:06.021 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1a26 Block [5] Transaction index [0] TxId [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf] marked as valid by state validator. ContainsPostOrderWrites [false]" -peer0.org1.example.com | "2019-05-02 01:31:06.021 UTC [valinternal] ApplyWriteSet -> DEBU 1a27 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Collections"}:(*internal.keyOps)(0xc003e0d700), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/EndorsementInfo"}:(*internal.keyOps)(0xc003e0d740), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Sequence"}:(*internal.keyOps)(0xc003e0d780), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/ValidationInfo"}:(*internal.keyOps)(0xc003e0d7c0), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/metadata/exp02"}:(*internal.keyOps)(0xc003e0d800)}" -peer0.org1.example.com | "2019-05-02 01:31:06.019 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a1d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.021 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1a28 validating rwset..." -peer0.org1.example.com | "2019-05-02 01:31:06.022 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1a2a postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:06.022 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1a2b ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-05-02 01:31:06.023 UTC [lifecycle] update -> INFO 1a2c Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:06.024 UTC [stateleveldb] GetState -> DEBU 1a2d GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -peer0.org1.example.com | "2019-05-02 01:31:06.024 UTC [stateleveldb] GetState -> DEBU 1a2e GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" -peer0.org1.example.com | "2019-05-02 01:31:06.024 UTC [stateleveldb] GetState -> DEBU 1a2f GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1a30 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -peer0.org1.example.com | "2019-05-02 01:31:06.024 UTC [stateleveldb] GetState -> DEBU 1a31 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" -peer0.org1.example.com | "2019-05-02 01:31:06.025 UTC [stateleveldb] GetState -> DEBU 1a32 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=� ��=�Y\��}�J=�M#d� ���Ժ�" -peer0.org1.example.com | "2019-05-02 01:31:06.025 UTC [lifecycle] update -> INFO 1a33 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" -peer0.org1.example.com | "2019-05-02 01:31:06.025 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1a34 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[exp02:0xc003eb6120] map[4SNrˤ��s�p����oy��&��t��ZM4:exp02 ����>{"+���#b� ��T�H��Won�:exp02 � ��=�Y\��}�J=�M#d� ���Ժ�:exp02 ���R���l� DEBU 1a35 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc003e5b4a0), (*kvrwset.KVWrite)(0xc003e5b4f0), (*kvrwset.KVWrite)(0xc003e5b540), (*kvrwset.KVWrite)(0xc003e5b590), (*kvrwset.KVWrite)(0xc003e5b5e0)}}" -peer0.org1.example.com | "2019-05-02 01:31:06.026 UTC [cceventmgmt] HandleStateUpdates -> INFO 1a36 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" -peer0.org1.example.com | "2019-05-02 01:31:06.026 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 1a37 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}]]" -peer0.org1.example.com | "2019-05-02 01:31:06.027 UTC [gossip.comm] func1 -> DEBU 1a38 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.026 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 1a39 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" -peer0.org1.example.com | "2019-05-02 01:31:06.028 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 1a3a Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" -peer0.org1.example.com | "2019-05-02 01:31:06.028 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1a3b Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0})}" -peer0.org1.example.com | "2019-05-02 01:31:06.028 UTC [stateleveldb] GetState -> DEBU 1a3c GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -peer0.org1.example.com | "2019-05-02 01:31:06.022 UTC [gossip.discovery] isSentByMe -> DEBU 1a29 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.028 UTC [stateleveldb] GetState -> DEBU 1a3d GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-05-02 01:31:06.030 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1a3f Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 216 129 76 241 69 60 8 51 200 236 230 104 227 112 199 189 219 19 97 23 185 229 62 48 241 59 155 78 13 25 116 13 2 32 116 67 68 156 136 155 15 173 83 249 60 180 13 82 76 31 222 21 132 92 100 178 210 6 255 132 174 31 211 118 30 104]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0025ee400 0xc00255d110 0xc0025a5580})]}" -peer0.org1.example.com | "2019-05-02 01:31:06.030 UTC [confighistory] add -> DEBU 1a40 add() - {lscc, exp02~collection, 5}" -peer0.org1.example.com | "2019-05-02 01:31:06.029 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a3e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.031 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a41 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:06.032 UTC [msp.identity] Verify -> DEBU 1a42 Verify: digest = 00000000 9c 53 05 c2 e0 ba a2 e0 51 71 27 bd c1 0d 69 87 |.S......Qq'...i.| -peer0.org1.example.com | 00000010 b2 3e 40 46 6e ad 51 68 96 50 6c 29 a9 d6 67 63 |.>@Fn.Qh.Pl)..gc|" -peer0.org1.example.com | "2019-05-02 01:31:06.033 UTC [msp.identity] Verify -> DEBU 1a43 Verify: sig = 00000000 30 45 02 21 00 cb fa c8 bf d7 cc 06 26 a7 69 91 |0E.!........&.i.| -peer0.org1.example.com | 00000010 b4 13 e8 f8 bd 4f a6 3a 32 09 ff 9d a3 f8 95 d8 |.....O.:2.......| -peer0.org1.example.com | 00000020 13 f4 69 5a f3 02 20 52 41 b8 b5 57 cf 34 5f 68 |..iZ.. RA..W.4_h| -peer0.org1.example.com | 00000030 ec b8 39 4b d5 60 09 90 b3 bf 44 37 ea e2 d9 21 |..9K.`....D7...!| -peer0.org1.example.com | 00000040 42 2d 2b 9a b8 bd 1a |B-+....|" -peer0.org1.example.com | "2019-05-02 01:31:06.035 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a44 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a45 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.037 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a46 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:06.038 UTC [msp] DeserializeIdentity -> DEBU 1a47 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:06.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a48 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:06.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a49 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:06.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a4a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:06.060 UTC [policies] Evaluate -> DEBU 1a4b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:06.060 UTC [policies] Evaluate -> DEBU 1a4c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:06.060 UTC [policies] Evaluate -> DEBU 1a4d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:06.061 UTC [cauthdsl] func1 -> DEBU 1a4e 0xc003ed8b90 gate 1556760666061653300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:06.061 UTC [cauthdsl] func2 -> DEBU 1a4f 0xc003ed8b90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:06.061 UTC [cauthdsl] func2 -> DEBU 1a50 0xc003ed8b90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:06.062 UTC [cauthdsl] func2 -> DEBU 1a51 0xc003ed8b90 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:06.062 UTC [msp.identity] Verify -> DEBU 1a52 Verify: digest = 00000000 2c 75 3e 60 39 b7 46 71 58 fc b5 58 d9 2c d8 bf |,u>`9.FqX..X.,..| -peer0.org1.example.com | 00000010 48 2b a3 11 66 57 dd 1e 5b 2e ff 62 39 d4 0e a7 |H+..fW..[..b9...|" -peer0.org1.example.com | "2019-05-02 01:31:06.062 UTC [msp.identity] Verify -> DEBU 1a53 Verify: sig = 00000000 30 45 02 21 00 e8 69 4c 1d 34 59 90 40 bf c5 bf |0E.!..iL.4Y.@...| -peer0.org1.example.com | 00000010 11 d2 02 d7 f6 94 a8 e8 79 06 04 06 6c 3b f5 65 |........y...l;.e| -peer0.org1.example.com | 00000020 68 8e 20 0b 97 02 20 52 42 5b b3 e5 19 93 ce 48 |h. ... RB[.....H| -peer0.org1.example.com | 00000030 e7 ce 6a 25 88 49 06 53 17 d0 77 ba 85 a2 ad a8 |..j%.I.S..w.....| -peer0.org1.example.com | 00000040 d2 dd bd a7 0e 3e a9 |.....>.|" -peer0.org1.example.com | "2019-05-02 01:31:06.064 UTC [cauthdsl] func2 -> DEBU 1a54 0xc003ed8b90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:06.064 UTC [cauthdsl] func1 -> DEBU 1a55 0xc003ed8b90 gate 1556760666061653300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:06.064 UTC [policies] Evaluate -> DEBU 1a56 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.064 UTC [policies] Evaluate -> DEBU 1a57 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.064 UTC [policies] Evaluate -> DEBU 1a58 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.064 UTC [policies] Evaluate -> DEBU 1a59 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.064 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a5a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.065 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a5b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a5c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.065 UTC [gossip.gossip] handleMessage -> DEBU 1a5d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.065 UTC [gossip.gossip] handleMessage -> DEBU 1a5e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a5f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.066 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a60 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:06.067 UTC [msp.identity] Verify -> DEBU 1a61 Verify: digest = 00000000 24 14 2a 33 4a 92 d4 4c ef 28 cd 02 e8 dd 5a 78 |$.*3J..L.(....Zx| -peer0.org1.example.com | 00000010 2b e4 5a 54 d8 cf 3f b5 87 d5 9c fe 16 ce f1 66 |+.ZT..?........f|" -peer0.org1.example.com | "2019-05-02 01:31:06.068 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1a62 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000e7c0})}" -peer0.org1.example.com | "2019-05-02 01:31:06.068 UTC [kvledger] CommitWithPvtData -> DEBU 1a63 [businesschannel] Committing block [5] to storage" -peer0.org1.example.com | "2019-05-02 01:31:06.069 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1a64 Writing block [5] to pvt block store" -peer0.org1.example.com | "2019-05-02 01:31:06.067 UTC [msp.identity] Verify -> DEBU 1a65 Verify: sig = 00000000 30 45 02 21 00 f0 69 88 0f 8e cf 0e 30 fa 2e 14 |0E.!..i.....0...| -peer0.org1.example.com | 00000010 ea 91 9a 47 3d a5 fb c4 9d 2c 73 01 02 fd b1 b1 |...G=....,s.....| -peer0.org1.example.com | 00000020 d7 6c f1 59 93 02 20 28 61 72 6e 4b df f3 bf a1 |.l.Y.. (arnK....| -peer0.org1.example.com | 00000030 a9 55 1d 3d 66 8b 8c 4b 15 8a 91 5d 95 b4 ae 08 |.U.=f..K...]....| -peer0.org1.example.com | 00000040 eb 92 cb 02 30 39 ca |....09.|" -peer0.org1.example.com | "2019-05-02 01:31:06.070 UTC [msp.identity] Verify -> DEBU 1a66 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:06.070 UTC [msp.identity] Verify -> DEBU 1a67 Verify: sig = 00000000 30 44 02 20 0f da 56 98 19 d8 89 b6 7f bf ce f6 |0D. ..V.........| -peer0.org1.example.com | 00000010 d3 e8 4c 6b 2b c4 a3 d2 0d a5 26 03 0e 6e 34 ba |..Lk+.....&..n4.| -peer0.org1.example.com | 00000020 b2 84 d0 28 02 20 3e 88 68 93 b2 6d fb 4e 06 cf |...(. >.h..m.N..| -peer0.org1.example.com | 00000030 89 7a 51 44 5c 2a 41 f1 fb 87 cc 4f d3 f0 31 76 |.zQD\*A....O..1v| -peer0.org1.example.com | 00000040 d3 60 fa 82 b5 33 |.`...3|" -peer0.org1.example.com | "2019-05-02 01:31:06.071 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a68 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.071 UTC [gossip.discovery] isSentByMe -> DEBU 1a69 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.071 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a6a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.071 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a6b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.071 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a6c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.071 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a6d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:06.073 UTC [pvtdatastorage] Prepare -> DEBU 1a6e Saved 0 private data write sets for block [5]" -peer0.org1.example.com | "2019-05-02 01:31:06.073 UTC [gossip.gossip] handleMessage -> DEBU 1a6f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.074 UTC [msp.identity] Verify -> DEBU 1a70 Verify: digest = 00000000 24 14 2a 33 4a 92 d4 4c ef 28 cd 02 e8 dd 5a 78 |$.*3J..L.(....Zx| -peer0.org1.example.com | 00000010 2b e4 5a 54 d8 cf 3f b5 87 d5 9c fe 16 ce f1 66 |+.ZT..?........f|" -peer0.org1.example.com | "2019-05-02 01:31:06.075 UTC [msp.identity] Verify -> DEBU 1a71 Verify: sig = 00000000 30 45 02 21 00 f0 69 88 0f 8e cf 0e 30 fa 2e 14 |0E.!..i.....0...| -peer0.org1.example.com | 00000010 ea 91 9a 47 3d a5 fb c4 9d 2c 73 01 02 fd b1 b1 |...G=....,s.....| -peer0.org1.example.com | 00000020 d7 6c f1 59 93 02 20 28 61 72 6e 4b df f3 bf a1 |.l.Y.. (arnK....| -peer0.org1.example.com | 00000030 a9 55 1d 3d 66 8b 8c 4b 15 8a 91 5d 95 b4 ae 08 |.U.=f..K...]....| -peer0.org1.example.com | 00000040 eb 92 cb 02 30 39 ca |....09.|" -peer0.org1.example.com | "2019-05-02 01:31:06.075 UTC [fsblkstorage] indexBlock -> DEBU 1a72 Indexing block [blockNum=5, blockHash=[]byte{0x11, 0xe8, 0x9b, 0x88, 0x21, 0x80, 0x3, 0xc4, 0xce, 0x32, 0x91, 0xc, 0x63, 0x34, 0x40, 0x39, 0xf7, 0xd7, 0x36, 0x66, 0x25, 0x30, 0x1a, 0x98, 0xf5, 0x12, 0x6d, 0x91, 0x34, 0x40, 0x38, 0xa8} txOffsets= -peer0.org1.example.com | txId=c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf locPointer=offset=70, bytesLength=4706 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-05-02 01:31:06.076 UTC [fsblkstorage] indexBlock -> DEBU 1a73 Adding txLoc [fileSuffixNum=0, offset=80867, bytesLength=4706] for tx ID: [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf] to txid-index" -peer0.org1.example.com | "2019-05-02 01:31:06.076 UTC [fsblkstorage] indexBlock -> DEBU 1a74 Adding txLoc [fileSuffixNum=0, offset=80867, bytesLength=4706] for tx number:[0] ID: [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf] to blockNumTranNum index" -peer0.org1.example.com | "2019-05-02 01:31:06.076 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a75 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.077 UTC [gossip.discovery] isSentByMe -> DEBU 1a76 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.077 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a77 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.078 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a78 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:06.079 UTC [msp.identity] Verify -> DEBU 1a79 Verify: digest = 00000000 9c 53 05 c2 e0 ba a2 e0 51 71 27 bd c1 0d 69 87 |.S......Qq'...i.| -peer0.org1.example.com | 00000010 b2 3e 40 46 6e ad 51 68 96 50 6c 29 a9 d6 67 63 |.>@Fn.Qh.Pl)..gc|" -peer0.org1.example.com | "2019-05-02 01:31:06.079 UTC [msp.identity] Verify -> DEBU 1a7a Verify: sig = 00000000 30 45 02 21 00 cb fa c8 bf d7 cc 06 26 a7 69 91 |0E.!........&.i.| -peer0.org1.example.com | 00000010 b4 13 e8 f8 bd 4f a6 3a 32 09 ff 9d a3 f8 95 d8 |.....O.:2.......| -peer0.org1.example.com | 00000020 13 f4 69 5a f3 02 20 52 41 b8 b5 57 cf 34 5f 68 |..iZ.. RA..W.4_h| -peer0.org1.example.com | 00000030 ec b8 39 4b d5 60 09 90 b3 bf 44 37 ea e2 d9 21 |..9K.`....D7...!| -peer0.org1.example.com | 00000040 42 2d 2b 9a b8 bd 1a |B-+....|" -peer0.org1.example.com | "2019-05-02 01:31:06.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a7b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.081 UTC [fsblkstorage] updateCheckpoint -> DEBU 1a7c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86511], isChainEmpty=[false], lastBlockNumber=[5]" -peer0.org1.example.com | "2019-05-02 01:31:06.081 UTC [pvtdatastorage] Commit -> DEBU 1a7d Committing private data for block [5]" -peer0.org1.example.com | "2019-05-02 01:31:06.081 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a7e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.081 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a7f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:06.082 UTC [msp] DeserializeIdentity -> DEBU 1a80 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:06.082 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a81 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:06.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a82 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:06.084 UTC [pvtdatastorage] Commit -> DEBU 1a83 Committed private data for block [5]" -peer0.org1.example.com | "2019-05-02 01:31:06.084 UTC [kvledger] CommitWithPvtData -> DEBU 1a84 [businesschannel] Committing block [5] transactions to state database" -peer0.org1.example.com | "2019-05-02 01:31:06.084 UTC [lockbasedtxmgr] Commit -> DEBU 1a85 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:06.084 UTC [lockbasedtxmgr] Commit -> DEBU 1a86 Committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:06.084 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1a87 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-05-02 01:31:06.085 UTC [lockbasedtxmgr] Commit -> DEBU 1a88 Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:06.085 UTC [stateleveldb] ApplyUpdates -> DEBU 1a89 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" -peer0.org1.example.com | "2019-05-02 01:31:06.085 UTC [stateleveldb] ApplyUpdates -> DEBU 1a8a Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" -peer0.org1.example.com | "2019-05-02 01:31:06.085 UTC [stateleveldb] ApplyUpdates -> DEBU 1a8b Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Sequence] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x53, 0x65, 0x71, 0x75, 0x65, 0x6e, 0x63, 0x65}]" -peer0.org1.example.com | "2019-05-02 01:31:06.085 UTC [stateleveldb] ApplyUpdates -> DEBU 1a8c Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" -peer0.org1.example.com | "2019-05-02 01:31:06.086 UTC [stateleveldb] ApplyUpdates -> DEBU 1a8d Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/metadata/exp02] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32}]" -peer0.org1.example.com | "2019-05-02 01:31:06.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a8e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:06.087 UTC [policies] Evaluate -> DEBU 1a8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:06.087 UTC [policies] Evaluate -> DEBU 1a90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:06.088 UTC [policies] Evaluate -> DEBU 1a91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:06.088 UTC [cauthdsl] func1 -> DEBU 1a92 0xc003f03470 gate 1556760666088220900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:06.089 UTC [cauthdsl] func2 -> DEBU 1a93 0xc003f03470 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:06.089 UTC [cauthdsl] func2 -> DEBU 1a94 0xc003f03470 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:06.090 UTC [lockbasedtxmgr] Commit -> DEBU 1a95 Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-05-02 01:31:06.090 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1a96 Preparing potential purge list working-set for expiringAtBlk [6]" -peer0.org1.example.com | "2019-05-02 01:31:06.090 UTC [leveldbhelper] GetIterator -> DEBU 1a97 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:31:06.091 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1a98 No expiry entry found for expiringAtBlk [6]" -peer0.org1.example.com | "2019-05-02 01:31:06.091 UTC [lockbasedtxmgr] func1 -> DEBU 1a99 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-05-02 01:31:06.091 UTC [kvledger] CommitWithPvtData -> DEBU 1a9a [businesschannel] Committing block [5] transactions to history database" -peer0.org1.example.com | "2019-05-02 01:31:06.091 UTC [historyleveldb] Commit -> DEBU 1a9b Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" -peer0.org1.example.com | "2019-05-02 01:31:06.091 UTC [cauthdsl] func2 -> DEBU 1a9c 0xc003f03470 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:06.091 UTC [msp.identity] Verify -> DEBU 1a9d Verify: digest = 00000000 db 77 4b 12 bc 31 76 19 bb b3 97 35 bb 2f 6f ce |.wK..1v....5./o.| -peer0.org1.example.com | 00000010 c3 13 d7 e1 d1 37 77 ae 7f ea ba 96 fa 50 e1 85 |.....7w......P..|" -peer0.org1.example.com | "2019-05-02 01:31:06.092 UTC [msp.identity] Verify -> DEBU 1a9e Verify: sig = 00000000 30 44 02 20 43 5a 8c 61 dc 74 c0 2d c9 80 1a cd |0D. CZ.a.t.-....| -peer0.org1.example.com | 00000010 fd a9 9a c0 07 c7 14 dd 0b cc f3 2b b9 aa 11 e5 |...........+....| -peer0.org1.example.com | 00000020 b6 12 be b6 02 20 33 a9 f0 5e a1 4d f5 41 de be |..... 3..^.M.A..| -peer0.org1.example.com | 00000030 0f 48 3a ee e9 63 ed c8 8b 82 57 cc 33 ec cf 60 |.H:..c....W.3..`| -peer0.org1.example.com | 00000040 f9 44 e0 43 f0 17 |.D.C..|" -peer0.org1.example.com | "2019-05-02 01:31:06.092 UTC [cauthdsl] func2 -> DEBU 1a9f 0xc003f03470 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:06.092 UTC [cauthdsl] func1 -> DEBU 1aa0 0xc003f03470 gate 1556760666088220900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:06.092 UTC [policies] Evaluate -> DEBU 1aa1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.092 UTC [policies] Evaluate -> DEBU 1aa2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.092 UTC [policies] Evaluate -> DEBU 1aa3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.092 UTC [policies] Evaluate -> DEBU 1aa4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 1aa5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 1aa6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.092 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aa7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.093 UTC [fsblkstorage] waitForBlock -> DEBU 1aa8 Came out of wait. maxAvailaBlockNumber=[5]" -peer0.org1.example.com | "2019-05-02 01:31:06.093 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aa9 Remaining bytes=[5714], Going to peek [8] bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.093 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aaa Returning blockbytes - length=[5712], placementInfo={fileNum=[0], startOffset=[80797], bytesOffset=[80799]}" -peer0.org1.example.com | "2019-05-02 01:31:06.093 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aab blockbytes [5712] read from file [0]" -peer0.org1.example.com | "2019-05-02 01:31:06.094 UTC [historyleveldb] Commit -> DEBU 1aac Channel [businesschannel]: Updates committed to history database for blockNo [5]" -peer0.org1.example.com | "2019-05-02 01:31:06.095 UTC [kvledger] CommitWithPvtData -> INFO 1aad [businesschannel] Committed block [5] with 1 transaction(s) in 91ms (state_validation=64ms block_commit=15ms state_commit=7ms)" -peer0.org1.example.com | "2019-05-02 01:31:06.096 UTC [msp.identity] Sign -> DEBU 1aae Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020806 " -peer0.org1.example.com | "2019-05-02 01:31:06.096 UTC [msp.identity] Sign -> DEBU 1aaf Sign: digest: 666D35FF5BF6A248B9B221484D3A9DB4037E7422C4DB0BB3479A183A9F08BCCA " -peer0.org1.example.com | "2019-05-02 01:31:06.096 UTC [gossip.state] commitBlock -> DEBU 1ab0 [businesschannel] Committed block [5] with 1 transaction(s)" -peer0.org1.example.com | "2019-05-02 01:31:06.097 UTC [common.deliver] deliverBlocks -> DEBU 1ab1 [channel: businesschannel] Delivering block [5] for (0xc003a19f00) for 192.168.240.9:41308" -peer0.org1.example.com | "2019-05-02 01:31:06.097 UTC [fsblkstorage] waitForBlock -> DEBU 1ab2 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -peer0.org1.example.com | "2019-05-02 01:31:06.110 UTC [common.deliver] deliverBlocks -> DEBU 1ab3 Context canceled, aborting wait for next block" -peer0.org1.example.com | "2019-05-02 01:31:06.110 UTC [common.deliverevents] func1 -> DEBU 1ab4 Closing Deliver stream" -peer0.org1.example.com | "2019-05-02 01:31:06.111 UTC [comm.grpc.server] 1 -> INFO 1ab5 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T01:31:33.72Z grpc.peer_address=192.168.240.9:41308 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.389477s -peer0.org1.example.com | "2019-05-02 01:31:06.111 UTC [grpc] infof -> DEBU 1ab6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:06.111 UTC [grpc] infof -> DEBU 1ab7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:06.111 UTC [fsblkstorage] waitForBlock -> DEBU 1ab8 Came out of wait. maxAvailaBlockNumber=[5]" -peer0.org1.example.com | "2019-05-02 01:31:06.680 UTC [endorser] ProcessProposal -> DEBU 1ab9 Entering: request from 192.168.240.9:41316" -peer0.org1.example.com | "2019-05-02 01:31:06.681 UTC [protoutils] ValidateProposalMessage -> DEBU 1aba ValidateProposalMessage starts for signed proposal 0xc003e955e0" -peer0.org1.example.com | "2019-05-02 01:31:06.681 UTC [protoutils] validateChannelHeader -> DEBU 1abb validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:06.682 UTC [protoutils] checkSignatureFromCreator -> DEBU 1abc begin" -peer0.org1.example.com | "2019-05-02 01:31:06.682 UTC [msp] GetManagerForChain -> DEBU 1abd Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:06.682 UTC [protoutils] checkSignatureFromCreator -> DEBU 1abe creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:06.682 UTC [protoutils] checkSignatureFromCreator -> DEBU 1abf creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:06.683 UTC [msp.identity] Verify -> DEBU 1ac0 Verify: digest = 00000000 07 0c ca e7 9a 83 6b ec c7 ae b8 57 5a 27 f7 58 |......k....WZ'.X| -peer0.org1.example.com | 00000010 d7 f4 ae 2a f3 55 ae 99 4e 3c 51 59 1c 86 da c5 |...*.U..N DEBU 1ac1 Verify: sig = 00000000 30 45 02 21 00 c6 3b cb 0d 45 f0 5b b3 36 a9 cb |0E.!..;..E.[.6..| -peer0.org1.example.com | 00000010 fc 78 ce 2b 25 30 fe 18 76 d1 32 fb 8a 21 e4 9c |.x.+%0..v.2..!..| -peer0.org1.example.com | 00000020 0d fc a2 ce 4c 02 20 61 c7 60 8e 9e f3 f2 73 b8 |....L. a.`....s.| -peer0.org1.example.com | 00000030 f3 28 c8 ab 6e c3 a7 00 fd 00 ce b2 f6 7e 7a 5b |.(..n........~z[| -peer0.org1.example.com | 00000040 9e 29 6d f5 0b cc 92 |.)m....|" -peer0.org1.example.com | "2019-05-02 01:31:06.684 UTC [protoutils] checkSignatureFromCreator -> DEBU 1ac2 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:06.684 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1ac3 validateChaincodeProposalMessage starts for proposal 0xc003f1c230, header 0xc003e959f0" -peer0.org1.example.com | "2019-05-02 01:31:06.685 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1ac4 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:06.685 UTC [endorser] preProcess -> DEBU 1ac5 [businesschannel][2f938f63] processing txid: 2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8" -peer0.org1.example.com | "2019-05-02 01:31:06.686 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1ac6 retrieveTransactionByID() - txId = [2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8]" -peer0.org1.example.com | "2019-05-02 01:31:06.686 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1ac7 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:06.687 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1ac8 constructing new tx simulator txid = [2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8]" -peer0.org1.example.com | "2019-05-02 01:31:06.687 UTC [endorser] SimulateProposal -> DEBU 1ac9 [businesschannel][2f938f63] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:06.687 UTC [endorser] callChaincode -> INFO 1aca [businesschannel][2f938f63] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:06.688 UTC [chaincode] Execute -> DEBU 1acb Entry" -peer0.org1.example.com | "2019-05-02 01:31:06.688 UTC [aclmgmt] CheckACL -> DEBU 1acc acl policy /Channel/Application/Readers found in config for resource _lifecycle/QueryChaincodeDefinition" -peer0.org1.example.com | "2019-05-02 01:31:06.689 UTC [aclmgmt] CheckACL -> DEBU 1acd acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-05-02 01:31:06.689 UTC [policies] Evaluate -> DEBU 1ace == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:06.689 UTC [policies] Evaluate -> DEBU 1acf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:06.690 UTC [policies] Evaluate -> DEBU 1ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:06.690 UTC [cauthdsl] func1 -> DEBU 1ad1 0xc003f85110 gate 1556760666690820000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:06.691 UTC [cauthdsl] func2 -> DEBU 1ad2 0xc003f85110 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:06.691 UTC [cauthdsl] func2 -> DEBU 1ad3 0xc003f85110 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:06.692 UTC [cauthdsl] func2 -> DEBU 1ad4 0xc003f85110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:06.692 UTC [cauthdsl] func2 -> DEBU 1ad5 0xc003f85110 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:06.692 UTC [cauthdsl] func1 -> DEBU 1ad6 0xc003f85110 gate 1556760666690820000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:06.693 UTC [policies] Evaluate -> DEBU 1ad7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.693 UTC [policies] Evaluate -> DEBU 1ad8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.693 UTC [policies] Evaluate -> DEBU 1ad9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:06.694 UTC [cauthdsl] func1 -> DEBU 1ada 0xc003f85950 gate 1556760666694405300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:06.695 UTC [cauthdsl] func2 -> DEBU 1adb 0xc003f85950 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:06.695 UTC [cauthdsl] func2 -> DEBU 1adc 0xc003f85950 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:06.696 UTC [cauthdsl] func2 -> DEBU 1add 0xc003f85950 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:06.696 UTC [msp.identity] Verify -> DEBU 1ade Verify: digest = 00000000 07 0c ca e7 9a 83 6b ec c7 ae b8 57 5a 27 f7 58 |......k....WZ'.X| -peer0.org1.example.com | 00000010 d7 f4 ae 2a f3 55 ae 99 4e 3c 51 59 1c 86 da c5 |...*.U..N DEBU 1adf Verify: sig = 00000000 30 45 02 21 00 c6 3b cb 0d 45 f0 5b b3 36 a9 cb |0E.!..;..E.[.6..| -peer0.org1.example.com | 00000010 fc 78 ce 2b 25 30 fe 18 76 d1 32 fb 8a 21 e4 9c |.x.+%0..v.2..!..| -peer0.org1.example.com | 00000020 0d fc a2 ce 4c 02 20 61 c7 60 8e 9e f3 f2 73 b8 |....L. a.`....s.| -peer0.org1.example.com | 00000030 f3 28 c8 ab 6e c3 a7 00 fd 00 ce b2 f6 7e 7a 5b |.(..n........~z[| -peer0.org1.example.com | 00000040 9e 29 6d f5 0b cc 92 |.)m....|" -peer0.org1.example.com | "2019-05-02 01:31:06.697 UTC [cauthdsl] func2 -> DEBU 1ae0 0xc003f85950 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:06.697 UTC [cauthdsl] func1 -> DEBU 1ae1 0xc003f85950 gate 1556760666694405300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:06.698 UTC [policies] Evaluate -> DEBU 1ae2 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.698 UTC [policies] Evaluate -> DEBU 1ae3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.699 UTC [policies] Evaluate -> DEBU 1ae4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.699 UTC [policies] Evaluate -> DEBU 1ae5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:06.700 UTC [lifecycle] QueryChaincodeDefinition -> DEBU 1ae6 received invocation of QueryChaincodeDefinition on channel 'businesschannel' for chaincode 'exp02'" -peer0.org1.example.com | "2019-05-02 01:31:06.700 UTC [chaincode] handleMessage -> DEBU 1ae7 [2f938f63] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:06.701 UTC [chaincode] HandleTransaction -> DEBU 1ae8 [2f938f63] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:06.701 UTC [chaincode] HandleGetState -> DEBU 1ae9 [2f938f63] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:06.702 UTC [stateleveldb] GetState -> DEBU 1aea GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -peer0.org1.example.com | "2019-05-02 01:31:06.703 UTC [chaincode] HandleTransaction -> DEBU 1aeb [2f938f63] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:06.703 UTC [chaincode] handleMessage -> DEBU 1aec [2f938f63] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:06.704 UTC [chaincode] HandleTransaction -> DEBU 1aed [2f938f63] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:06.705 UTC [chaincode] HandleGetState -> DEBU 1aee [2f938f63] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:06.705 UTC [stateleveldb] GetState -> DEBU 1aef GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:06.706 UTC [chaincode] HandleTransaction -> DEBU 1af0 [2f938f63] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:06.706 UTC [chaincode] handleMessage -> DEBU 1af1 [2f938f63] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:06.707 UTC [chaincode] HandleTransaction -> DEBU 1af2 [2f938f63] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:06.707 UTC [chaincode] HandleGetState -> DEBU 1af3 [2f938f63] getting state for chaincode _lifecycle, key namespaces/fields/exp02/EndorsementInfo, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:06.708 UTC [stateleveldb] GetState -> DEBU 1af4 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" -peer0.org1.example.com | "2019-05-02 01:31:06.708 UTC [chaincode] HandleTransaction -> DEBU 1af5 [2f938f63] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:06.709 UTC [chaincode] handleMessage -> DEBU 1af6 [2f938f63] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:06.709 UTC [chaincode] HandleTransaction -> DEBU 1af7 [2f938f63] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:06.710 UTC [chaincode] HandleGetState -> DEBU 1af8 [2f938f63] getting state for chaincode _lifecycle, key namespaces/fields/exp02/ValidationInfo, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:06.711 UTC [stateleveldb] GetState -> DEBU 1af9 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" -peer0.org1.example.com | "2019-05-02 01:31:06.711 UTC [chaincode] HandleTransaction -> DEBU 1afa [2f938f63] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:06.712 UTC [chaincode] handleMessage -> DEBU 1afb [2f938f63] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:06.712 UTC [chaincode] HandleTransaction -> DEBU 1afc [2f938f63] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:06.713 UTC [chaincode] HandleGetState -> DEBU 1afd [2f938f63] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Collections, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:06.713 UTC [stateleveldb] GetState -> DEBU 1afe GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" -peer0.org1.example.com | "2019-05-02 01:31:06.714 UTC [chaincode] HandleTransaction -> DEBU 1aff [2f938f63] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:06.714 UTC [lifecycle] QueryChaincodeDefinition -> INFO 1b00 successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" -peer0.org1.example.com | "2019-05-02 01:31:06.715 UTC [chaincode] handleMessage -> DEBU 1b01 [2f938f63] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:06.715 UTC [chaincode] Notify -> DEBU 1b02 [2f938f63] notifying Txid:2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:06.715 UTC [chaincode] Execute -> DEBU 1b03 Exit" -peer0.org1.example.com | "2019-05-02 01:31:06.716 UTC [endorser] callChaincode -> INFO 1b04 [businesschannel][2f938f63] Exit chaincode: name:"_lifecycle" (28ms)" -peer0.org1.example.com | "2019-05-02 01:31:06.716 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1b05 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:06.716 UTC [lockbasedtxmgr] Done -> DEBU 1b06 Done with transaction simulation / query execution [2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8]" -peer0.org1.example.com | "2019-05-02 01:31:06.717 UTC [endorser] SimulateProposal -> DEBU 1b07 [businesschannel][2f938f63] Exit" -peer0.org1.example.com | "2019-05-02 01:31:06.717 UTC [endorser] endorseProposal -> DEBU 1b08 [businesschannel][2f938f63] Entry chaincode: name:"_lifecycle" " -peer0.org1.example.com | "2019-05-02 01:31:06.717 UTC [endorser] endorseProposal -> DEBU 1b09 [businesschannel][2f938f63] escc for chaincode name:"_lifecycle" is escc" -peer0.org1.example.com | "2019-05-02 01:31:06.718 UTC [endorser] EndorseWithPlugin -> DEBU 1b0a Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8, chaincode: _lifecycle}" -peer0.org1.example.com | "2019-05-02 01:31:06.718 UTC [msp.identity] Sign -> DEBU 1b0b Sign: plaintext: 0A2041FC13AFCBC3FF912134F2D95E66...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:06.718 UTC [msp.identity] Sign -> DEBU 1b0c Sign: digest: 0C0E4A771A0D912A9CF7D5C9EE00522DDFC5B84108DBE4A6D5034508DE502650 " -peer0.org1.example.com | "2019-05-02 01:31:06.719 UTC [endorser] EndorseWithPlugin -> DEBU 1b0d Exiting {plugin: escc, channel: businesschannel, tx: 2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8, chaincode: _lifecycle}" -peer0.org1.example.com | "2019-05-02 01:31:06.719 UTC [endorser] endorseProposal -> DEBU 1b0e [businesschannel][2f938f63] Exit" -peer0.org1.example.com | "2019-05-02 01:31:06.720 UTC [lockbasedtxmgr] Done -> DEBU 1b0f Done with transaction simulation / query execution [2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8]" -peer0.org1.example.com | "2019-05-02 01:31:06.720 UTC [endorser] func1 -> DEBU 1b10 Exit: request from 192.168.240.9:41316" -peer0.org1.example.com | "2019-05-02 01:31:06.721 UTC [comm.grpc.server] 1 -> INFO 1b11 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41316 grpc.code=OK grpc.call_duration=41.5122ms -peer0.org1.example.com | "2019-05-02 01:31:06.734 UTC [grpc] infof -> DEBU 1b12 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:06.734 UTC [grpc] warningf -> DEBU 1b13 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41316: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:31:06.735 UTC [grpc] infof -> DEBU 1b14 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:06.975 UTC [gossip.election] waitForInterrupt -> DEBU 1b15 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:06.975 UTC [gossip.election] IsLeader -> DEBU 1b16 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:06.976 UTC [msp.identity] Sign -> DEBU 1b17 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510061801 " -peer0.org1.example.com | "2019-05-02 01:31:06.976 UTC [msp.identity] Sign -> DEBU 1b18 Sign: digest: 94CA125D29A53048540746AB59638DDB4B80263E07841491CFFF703C668D39D5 " -peer0.org1.example.com | "2019-05-02 01:31:06.976 UTC [gossip.election] waitForInterrupt -> DEBU 1b19 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:06.984 UTC [msp] DeserializeIdentity -> DEBU 1b1a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:06.985 UTC [msp] DeserializeIdentity -> DEBU 1b1b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:06.986 UTC [msp] DeserializeIdentity -> DEBU 1b1c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:06.987 UTC [msp] DeserializeIdentity -> DEBU 1b1d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:06.988 UTC [gossip.comm] Send -> DEBU 1b1e Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:06.988 UTC [msp] DeserializeIdentity -> DEBU 1b1f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:06.989 UTC [msp] DeserializeIdentity -> DEBU 1b20 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:06.989 UTC [gossip.comm] sendToEndpoint -> DEBU 1b21 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:06.989 UTC [gossip.comm] sendToEndpoint -> DEBU 1b22 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:07.937 UTC [endorser] ProcessProposal -> DEBU 1b23 Entering: request from 192.168.240.9:41324" -peer0.org1.example.com | "2019-05-02 01:31:07.938 UTC [protoutils] ValidateProposalMessage -> DEBU 1b24 ValidateProposalMessage starts for signed proposal 0xc003ffe000" -peer0.org1.example.com | "2019-05-02 01:31:07.938 UTC [protoutils] validateChannelHeader -> DEBU 1b25 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:07.938 UTC [protoutils] checkSignatureFromCreator -> DEBU 1b26 begin" -peer0.org1.example.com | "2019-05-02 01:31:07.939 UTC [msp] GetManagerForChain -> DEBU 1b27 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:07.939 UTC [protoutils] checkSignatureFromCreator -> DEBU 1b28 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:07.939 UTC [protoutils] checkSignatureFromCreator -> DEBU 1b29 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:07.939 UTC [msp.identity] Verify -> DEBU 1b2a Verify: digest = 00000000 b2 be 29 7c 64 6f c7 6f 10 bc be a1 dc 5c 71 12 |..)|do.o.....\q.| -peer0.org1.example.com | 00000010 4d 49 89 14 11 bf ce c8 ac 46 20 65 63 be bc 48 |MI.......F ec..H|" -peer0.org1.example.com | "2019-05-02 01:31:07.940 UTC [msp.identity] Verify -> DEBU 1b2b Verify: sig = 00000000 30 44 02 20 39 2d 2e 62 dc 21 00 fc 54 24 ce 1f |0D. 9-.b.!..T$..| -peer0.org1.example.com | 00000010 e4 74 6f 11 77 5a 03 e8 5a 72 be 40 b7 62 d9 08 |.to.wZ..Zr.@.b..| -peer0.org1.example.com | 00000020 55 e8 c5 c0 02 20 0c ab 7c 8e f8 b0 57 32 7a 43 |U.... ..|...W2zC| -peer0.org1.example.com | 00000030 62 e0 f8 95 cb 48 99 93 15 7d 0c 5a 51 cf 71 6a |b....H...}.ZQ.qj| -peer0.org1.example.com | 00000040 3d ea e1 04 94 ae |=.....|" -peer0.org1.example.com | "2019-05-02 01:31:07.941 UTC [protoutils] checkSignatureFromCreator -> DEBU 1b2c exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:07.941 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1b2d validateChaincodeProposalMessage starts for proposal 0xc003eb8bd0, header 0xc003ffe410" -peer0.org1.example.com | "2019-05-02 01:31:07.941 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1b2e validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:07.942 UTC [endorser] preProcess -> DEBU 1b2f [businesschannel][13c934fb] processing txid: 13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa" -peer0.org1.example.com | "2019-05-02 01:31:07.942 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1b30 retrieveTransactionByID() - txId = [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa]" -peer0.org1.example.com | "2019-05-02 01:31:07.942 UTC [aclmgmt] CheckACL -> DEBU 1b31 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-05-02 01:31:07.943 UTC [aclmgmt] CheckACL -> DEBU 1b32 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-05-02 01:31:07.943 UTC [policies] Evaluate -> DEBU 1b33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:07.943 UTC [policies] Evaluate -> DEBU 1b34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:07.944 UTC [policies] Evaluate -> DEBU 1b35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:07.944 UTC [cauthdsl] func1 -> DEBU 1b36 0xc004014290 gate 1556760667944534200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:07.944 UTC [cauthdsl] func2 -> DEBU 1b37 0xc004014290 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:07.945 UTC [cauthdsl] func2 -> DEBU 1b38 0xc004014290 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:07.945 UTC [cauthdsl] func2 -> DEBU 1b39 0xc004014290 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:07.946 UTC [msp.identity] Verify -> DEBU 1b3a Verify: digest = 00000000 b2 be 29 7c 64 6f c7 6f 10 bc be a1 dc 5c 71 12 |..)|do.o.....\q.| -peer0.org1.example.com | 00000010 4d 49 89 14 11 bf ce c8 ac 46 20 65 63 be bc 48 |MI.......F ec..H|" -peer0.org1.example.com | "2019-05-02 01:31:07.946 UTC [msp.identity] Verify -> DEBU 1b3b Verify: sig = 00000000 30 44 02 20 39 2d 2e 62 dc 21 00 fc 54 24 ce 1f |0D. 9-.b.!..T$..| -peer0.org1.example.com | 00000010 e4 74 6f 11 77 5a 03 e8 5a 72 be 40 b7 62 d9 08 |.to.wZ..Zr.@.b..| -peer0.org1.example.com | 00000020 55 e8 c5 c0 02 20 0c ab 7c 8e f8 b0 57 32 7a 43 |U.... ..|...W2zC| -peer0.org1.example.com | 00000030 62 e0 f8 95 cb 48 99 93 15 7d 0c 5a 51 cf 71 6a |b....H...}.ZQ.qj| -peer0.org1.example.com | 00000040 3d ea e1 04 94 ae |=.....|" -peer0.org1.example.com | "2019-05-02 01:31:07.947 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc004014290 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:07.948 UTC [cauthdsl] func1 -> DEBU 1b3d 0xc004014290 gate 1556760667944534200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:07.948 UTC [policies] Evaluate -> DEBU 1b3e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:07.949 UTC [policies] Evaluate -> DEBU 1b3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:07.949 UTC [policies] Evaluate -> DEBU 1b40 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:07.949 UTC [policies] Evaluate -> DEBU 1b41 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:07.950 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1b42 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:07.950 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1b43 constructing new tx simulator txid = [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa]" -peer0.org1.example.com | "2019-05-02 01:31:07.950 UTC [endorser] SimulateProposal -> DEBU 1b44 [businesschannel][13c934fb] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:07.950 UTC [stateleveldb] GetState -> DEBU 1b45 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:07.950 UTC [endorser] callChaincode -> INFO 1b46 [businesschannel][13c934fb] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:07.950 UTC [stateleveldb] GetState -> DEBU 1b47 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:07.952 UTC [chaincode] LaunchConfig -> DEBU 1b48 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -peer0.org1.example.com | "2019-05-02 01:31:07.952 UTC [chaincode] Start -> DEBU 1b49 start container: exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" -peer0.org1.example.com | "2019-05-02 01:31:07.953 UTC [chaincode] Start -> DEBU 1b4a start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -peer0.org1.example.com | "2019-05-02 01:31:07.953 UTC [chaincode] Start -> DEBU 1b4b start container with env: -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} -peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true -peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key -peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt -peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -peer0.org1.example.com | "2019-05-02 01:31:07.953 UTC [container] lockContainer -> DEBU 1b4c waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" -peer0.org1.example.com | "2019-05-02 01:31:07.953 UTC [container] lockContainer -> DEBU 1b4d got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" -peer0.org1.example.com | "2019-05-02 01:31:07.953 UTC [dockercontroller] stopInternal -> DEBU 1b4e stopping container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -peer0.org1.example.com | "2019-05-02 01:31:07.955 UTC [dockercontroller] stopInternal -> DEBU 1b4f stop container result" error="Container not running: peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" -peer0.org1.example.com | "2019-05-02 01:31:07.955 UTC [dockercontroller] stopInternal -> DEBU 1b50 killing container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -peer0.org1.example.com | "2019-05-02 01:31:07.966 UTC [dockercontroller] stopInternal -> DEBU 1b51 kill container result" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error="Container not running: peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" -peer0.org1.example.com | "2019-05-02 01:31:07.966 UTC [dockercontroller] stopInternal -> DEBU 1b52 removing container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -peer0.org1.example.com | "2019-05-02 01:31:07.976 UTC [dockercontroller] stopInternal -> DEBU 1b53 remove container result" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error=null -peer0.org1.example.com | "2019-05-02 01:31:07.976 UTC [dockercontroller] createContainer -> DEBU 1b54 create container" imageID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-4acdefc66bb2a0c444e561d45c2067f024fc1e2a95e1b1ce3b104d2106958d25 containerID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -peer0.org1.example.com | "2019-05-02 01:31:08.088 UTC [dockercontroller] createContainer -> DEBU 1b55 created container" imageID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-4acdefc66bb2a0c444e561d45c2067f024fc1e2a95e1b1ce3b104d2106958d25 containerID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -peer0.org1.example.com | "2019-05-02 01:31:08.442 UTC [gossip.gossip] handleMessage -> DEBU 1b56 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.442 UTC [gossip.gossip] handleMessage -> DEBU 1b57 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.443 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.454 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b59 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:08.454 UTC [msp.identity] Verify -> DEBU 1b5a Verify: digest = 00000000 16 f7 31 4b ee fb 69 9a 17 15 7b 8f 26 7c 2e 6c |..1K..i...{.&|.l| -peer0.org1.example.com | 00000010 22 51 84 b4 fd 5c af 16 7a 96 9d 03 63 1d 88 8a |"Q...\..z...c...|" -peer0.org1.example.com | "2019-05-02 01:31:08.454 UTC [msp.identity] Verify -> DEBU 1b5b Verify: sig = 00000000 30 45 02 21 00 f8 e2 24 b5 f3 63 e0 31 a0 f5 24 |0E.!...$..c.1..$| -peer0.org1.example.com | 00000010 0e 77 75 8a b1 25 81 d4 1c 6c 1d 8d 76 2d 02 43 |.wu..%...l..v-.C| -peer0.org1.example.com | 00000020 65 b3 c9 18 c1 02 20 10 90 f1 b2 85 ba 13 54 ac |e..... .......T.| -peer0.org1.example.com | 00000030 a0 64 ca ec 46 58 0a 1f 01 c3 a3 4c 8b 89 97 67 |.d..FX.....L...g| -peer0.org1.example.com | 00000040 f0 09 2d 75 aa cf 72 |..-u..r|" -peer0.org1.example.com | "2019-05-02 01:31:08.455 UTC [msp.identity] Verify -> DEBU 1b5c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:08.455 UTC [msp.identity] Verify -> DEBU 1b5d Verify: sig = 00000000 30 45 02 21 00 af 2d 54 fa 5b d3 2b 3a e9 a0 97 |0E.!..-T.[.+:...| -peer0.org1.example.com | 00000010 1b fa 67 cf 22 3a 2a 02 ac 42 fe 4e 2b 5a e3 b6 |..g.":*..B.N+Z..| -peer0.org1.example.com | 00000020 4f e9 ad 9e dc 02 20 3f 17 31 5c 27 3d c2 2b 90 |O..... ?.1\'=.+.| -peer0.org1.example.com | 00000030 bc 1f db ad b7 a7 90 ca c8 2f f5 3b f5 7d 4f 2e |........./.;.}O.| -peer0.org1.example.com | 00000040 3e 37 6d ef d5 f1 61 |>7m...a|" -peer0.org1.example.com | "2019-05-02 01:31:08.455 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:08.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b60 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 " -peer0.org1.example.com | "2019-05-02 01:31:08.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b61 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 " -peer0.org1.example.com | "2019-05-02 01:31:08.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b62 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:08.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b63 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.456 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b64 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.456 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b65 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.454 UTC [gossip.comm] func1 -> DEBU 1b66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.457 UTC [gossip.comm] func1 -> DEBU 1b67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.457 UTC [gossip.gossip] handleMessage -> DEBU 1b68 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.457 UTC [gossip.gossip] handleMessage -> DEBU 1b69 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.457 UTC [gossip.gossip] handleMessage -> DEBU 1b6a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b6b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b6c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b6d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b6e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.457 UTC [gossip.gossip] handleMessage -> DEBU 1b6f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.465 UTC [msp] DeserializeIdentity -> DEBU 1b70 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.466 UTC [msp] DeserializeIdentity -> DEBU 1b71 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.466 UTC [msp] DeserializeIdentity -> DEBU 1b72 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.466 UTC [gossip.comm] Send -> DEBU 1b73 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.466 UTC [msp] DeserializeIdentity -> DEBU 1b74 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.466 UTC [gossip.comm] Send -> DEBU 1b75 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.466 UTC [gossip.comm] sendToEndpoint -> DEBU 1b76 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.466 UTC [gossip.comm] sendToEndpoint -> DEBU 1b77 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.466 UTC [gossip.comm] sendToEndpoint -> DEBU 1b78 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.466 UTC [gossip.comm] sendToEndpoint -> DEBU 1b79 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.501 UTC [gossip.comm] func1 -> DEBU 1b7a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.502 UTC [gossip.gossip] handleMessage -> DEBU 1b7b Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.511 UTC [gossip.gossip] handleMessage -> DEBU 1b7c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.508 UTC [gossip.comm] func1 -> DEBU 1b7d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.517 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b7e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.512 UTC [gossip.gossip] handleMessage -> DEBU 1b7f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.519 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b80 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:08.526 UTC [msp] DeserializeIdentity -> DEBU 1b81 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b82 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b83 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b84 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [policies] Evaluate -> DEBU 1b85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [policies] Evaluate -> DEBU 1b86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [policies] Evaluate -> DEBU 1b87 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [cauthdsl] func1 -> DEBU 1b88 0xc0041a8b20 gate 1556760668527427300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [cauthdsl] func2 -> DEBU 1b89 0xc0041a8b20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [cauthdsl] func2 -> DEBU 1b8a 0xc0041a8b20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [cauthdsl] func2 -> DEBU 1b8b 0xc0041a8b20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [msp.identity] Verify -> DEBU 1b8c Verify: digest = 00000000 f6 40 50 5b 45 a1 bd c3 57 9a cd 3d 38 43 7a 34 |.@P[E...W..=8Cz4| -peer0.org1.example.com | 00000010 a5 32 da b2 21 88 59 17 68 56 3d 96 06 a0 77 10 |.2..!.Y.hV=...w.|" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [msp.identity] Verify -> DEBU 1b8d Verify: sig = 00000000 30 45 02 21 00 ad e1 8a 0b b9 48 43 5e 0e 4a 71 |0E.!......HC^.Jq| -peer0.org1.example.com | 00000010 fb 5c c4 af 81 cb 8b 87 2c d4 a9 f6 b3 dc 48 b7 |.\......,.....H.| -peer0.org1.example.com | 00000020 b6 e7 e0 59 92 02 20 15 62 5b 4c 53 9f de e9 92 |...Y.. .b[LS....| -peer0.org1.example.com | 00000030 62 2e f9 db ed b3 f5 a4 28 32 f6 ed 29 aa 91 28 |b.......(2..)..(| -peer0.org1.example.com | 00000040 0d 13 27 81 a1 6d c7 |..'..m.|" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [cauthdsl] func2 -> DEBU 1b8e 0xc0041a8b20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [cauthdsl] func1 -> DEBU 1b8f 0xc0041a8b20 gate 1556760668527427300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.527 UTC [policies] Evaluate -> DEBU 1b90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.528 UTC [policies] Evaluate -> DEBU 1b91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.528 UTC [policies] Evaluate -> DEBU 1b92 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.528 UTC [policies] Evaluate -> DEBU 1b93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b95 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:08.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b96 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 " -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b97 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 " -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b98 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b99 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b9a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b9b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b9c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b9d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.gossip] handleMessage -> DEBU 1b9e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.gossip] handleMessage -> DEBU 1b9f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.gossip] handleMessage -> DEBU 1ba0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.544 UTC [msp] DeserializeIdentity -> DEBU 1ba3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.544 UTC [msp] DeserializeIdentity -> DEBU 1ba4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.547 UTC [msp] DeserializeIdentity -> DEBU 1ba5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.547 UTC [msp] DeserializeIdentity -> DEBU 1ba6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.547 UTC [msp] DeserializeIdentity -> DEBU 1ba7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.549 UTC [msp] DeserializeIdentity -> DEBU 1ba8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.550 UTC [msp] DeserializeIdentity -> DEBU 1ba9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.550 UTC [gossip.comm] Send -> DEBU 1baa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.551 UTC [msp] DeserializeIdentity -> DEBU 1bab Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.551 UTC [gossip.comm] sendToEndpoint -> DEBU 1bac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.551 UTC [gossip.comm] sendToEndpoint -> DEBU 1bad Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.551 UTC [gossip.comm] Send -> DEBU 1bae Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.552 UTC [gossip.comm] sendToEndpoint -> DEBU 1baf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.553 UTC [gossip.comm] sendToEndpoint -> DEBU 1bb0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.727 UTC [msp.identity] Sign -> DEBU 1bb1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151019 " -peer0.org1.example.com | "2019-05-02 01:31:08.727 UTC [msp.identity] Sign -> DEBU 1bb2 Sign: digest: 4D725B5A29686B698367CE4091D0D18C135BB62A9478D6E41B953D20A750E9F0 " -peer0.org1.example.com | "2019-05-02 01:31:08.727 UTC [msp.identity] Sign -> DEBU 1bb3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:08.727 UTC [msp.identity] Sign -> DEBU 1bb4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:08.727 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1bb5 Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:08.729 UTC [msp] DeserializeIdentity -> DEBU 1bb6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.729 UTC [msp] DeserializeIdentity -> DEBU 1bb7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.729 UTC [msp] DeserializeIdentity -> DEBU 1bb8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.730 UTC [gossip.comm] Send -> DEBU 1bb9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.730 UTC [gossip.comm] Send -> DEBU 1bba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.730 UTC [msp] DeserializeIdentity -> DEBU 1bbb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.730 UTC [gossip.comm] Send -> DEBU 1bbc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.730 UTC [gossip.comm] sendToEndpoint -> DEBU 1bbd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.730 UTC [gossip.comm] sendToEndpoint -> DEBU 1bbe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.730 UTC [gossip.comm] sendToEndpoint -> DEBU 1bbf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.730 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.731 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.731 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.827 UTC [msp] DeserializeIdentity -> DEBU 1bc3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.827 UTC [msp] DeserializeIdentity -> DEBU 1bc4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.827 UTC [gossip.comm] Send -> DEBU 1bc5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.827 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.827 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.827 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.827 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1bca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.830 UTC [gossip.comm] func1 -> DEBU 1bcc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.830 UTC [gossip.gossip] handleMessage -> DEBU 1bce Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.830 UTC [msp] DeserializeIdentity -> DEBU 1bcf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.832 UTC [msp.identity] Verify -> DEBU 1bd0 Verify: digest = 00000000 51 65 a8 f5 3d 66 bd 4c ea e1 02 f7 5e 30 2f a6 |Qe..=f.L....^0/.| -peer0.org1.example.com | 00000010 55 da ac 09 e9 16 bc e3 88 66 89 a2 a0 ea 8a b9 |U........f......|" -peer0.org1.example.com | "2019-05-02 01:31:08.832 UTC [msp] DeserializeIdentity -> DEBU 1bd1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.832 UTC [msp.identity] Verify -> DEBU 1bd2 Verify: sig = 00000000 30 44 02 20 71 7c bf 73 a9 07 a1 55 62 45 53 17 |0D. q|.s...UbES.| -peer0.org1.example.com | 00000010 6a 2b f5 6d c7 d1 ec 07 06 c9 cb 70 67 73 a0 39 |j+.m.......pgs.9| -peer0.org1.example.com | 00000020 68 ac 47 72 02 20 78 14 ae 0d d3 31 4a f6 69 be |h.Gr. x....1J.i.| -peer0.org1.example.com | 00000030 d9 18 3c aa 9e bf 90 5b 8c 6b 73 69 80 0c dc 64 |..<....[.ksi...d| -peer0.org1.example.com | 00000040 89 a4 87 bc 1a 1d |......|" -peer0.org1.example.com | "2019-05-02 01:31:08.832 UTC [msp] DeserializeIdentity -> DEBU 1bd3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.830 UTC [gossip.comm] func1 -> DEBU 1bcd Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.834 UTC [gossip.comm] Send -> DEBU 1bd4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760666096098000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.834 UTC [msp] DeserializeIdentity -> DEBU 1bd5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.834 UTC [msp] DeserializeIdentity -> DEBU 1bd6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1bd7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760666096098000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1bd8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1bd9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760666096098000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1bda Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.835 UTC [msp.identity] Verify -> DEBU 1bdb Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -peer0.org1.example.com | 00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -peer0.org1.example.com | "2019-05-02 01:31:08.835 UTC [msp.identity] Verify -> DEBU 1bdc Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -peer0.org1.example.com | 00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -peer0.org1.example.com | 00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -peer0.org1.example.com | 00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -peer0.org1.example.com | 00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -peer0.org1.example.com | "2019-05-02 01:31:08.835 UTC [gossip.comm] sendToEndpoint -> DEBU 1bdd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760666096098000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.836 UTC [gossip.comm] sendToEndpoint -> DEBU 1bde Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.847 UTC [msp] DeserializeIdentity -> DEBU 1bdf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.849 UTC [msp] DeserializeIdentity -> DEBU 1be1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.851 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1be2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:08.851 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.848 UTC [gossip.comm] func1 -> DEBU 1be0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.851 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.853 UTC [policies] Evaluate -> DEBU 1be5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.853 UTC [policies] Evaluate -> DEBU 1be6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.853 UTC [policies] Evaluate -> DEBU 1be7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.854 UTC [cauthdsl] func1 -> DEBU 1be8 0xc004206eb0 gate 1556760668854341600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.855 UTC [cauthdsl] func2 -> DEBU 1be9 0xc004206eb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.855 UTC [cauthdsl] func2 -> DEBU 1bea 0xc004206eb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.856 UTC [cauthdsl] func2 -> DEBU 1beb 0xc004206eb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.856 UTC [msp.identity] Verify -> DEBU 1bec Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -peer0.org1.example.com | 00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -peer0.org1.example.com | "2019-05-02 01:31:08.857 UTC [msp.identity] Verify -> DEBU 1bed Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -peer0.org1.example.com | 00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -peer0.org1.example.com | 00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -peer0.org1.example.com | 00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -peer0.org1.example.com | 00000040 29 fe 17 41 ee e9 a4 |)..A...|" -peer0.org1.example.com | "2019-05-02 01:31:08.858 UTC [cauthdsl] func2 -> DEBU 1bee 0xc004206eb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.858 UTC [cauthdsl] func1 -> DEBU 1bef 0xc004206eb0 gate 1556760668854341600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.858 UTC [policies] Evaluate -> DEBU 1bf0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.858 UTC [policies] Evaluate -> DEBU 1bf1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.860 UTC [policies] Evaluate -> DEBU 1bf2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.860 UTC [policies] Evaluate -> DEBU 1bf3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.861 UTC [msp] DeserializeIdentity -> DEBU 1bf4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.862 UTC [msp] DeserializeIdentity -> DEBU 1bf5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.863 UTC [gossip.comm] func1 -> DEBU 1bf6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.866 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bf7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:08.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bf8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bf9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.871 UTC [policies] Evaluate -> DEBU 1bfa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.875 UTC [policies] Evaluate -> DEBU 1bfb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.875 UTC [policies] Evaluate -> DEBU 1bfc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.875 UTC [cauthdsl] func1 -> DEBU 1bfd 0xc004220680 gate 1556760668875955500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.876 UTC [cauthdsl] func2 -> DEBU 1bfe 0xc004220680 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.876 UTC [cauthdsl] func2 -> DEBU 1bff 0xc004220680 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.876 UTC [cauthdsl] func2 -> DEBU 1c00 0xc004220680 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.886 UTC [msp.identity] Verify -> DEBU 1c01 Verify: digest = 00000000 f5 84 fc 53 b8 bc 29 6c 8d 44 e3 b7 42 34 00 a8 |...S..)l.D..B4..| -peer0.org1.example.com | 00000010 0c dc ce 7d c1 c2 dc 95 95 05 62 fc 36 3f c1 91 |...}......b.6?..|" -peer0.org1.example.com | "2019-05-02 01:31:08.887 UTC [msp.identity] Verify -> DEBU 1c02 Verify: sig = 00000000 30 44 02 20 1f 6f f9 d2 72 02 ca 23 0a 4d 06 bd |0D. .o..r..#.M..| -peer0.org1.example.com | 00000010 99 74 a4 2c 28 6a 0a 4e df 05 22 60 b5 09 fd 9a |.t.,(j.N.."`....| -peer0.org1.example.com | 00000020 b0 e4 7f 15 02 20 7c 49 fc d6 86 22 76 a5 d3 6f |..... |I..."v..o| -peer0.org1.example.com | 00000030 d8 74 f9 56 85 ac 3b 84 f5 c5 38 e7 da cc 12 7a |.t.V..;...8....z| -peer0.org1.example.com | 00000040 85 81 04 5d d5 23 |...].#|" -peer0.org1.example.com | "2019-05-02 01:31:08.887 UTC [cauthdsl] func2 -> DEBU 1c03 0xc004220680 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.887 UTC [cauthdsl] func1 -> DEBU 1c04 0xc004220680 gate 1556760668875955500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.887 UTC [policies] Evaluate -> DEBU 1c05 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c07 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c08 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [msp] DeserializeIdentity -> DEBU 1c09 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c0a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c0b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c0e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [cauthdsl] func1 -> DEBU 1c0f 0xc004221760 gate 1556760668888681200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.888 UTC [cauthdsl] func2 -> DEBU 1c10 0xc004221760 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.889 UTC [cauthdsl] func2 -> DEBU 1c11 0xc004221760 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.889 UTC [cauthdsl] func2 -> DEBU 1c12 0xc004221760 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.889 UTC [msp.identity] Verify -> DEBU 1c13 Verify: digest = 00000000 f5 84 fc 53 b8 bc 29 6c 8d 44 e3 b7 42 34 00 a8 |...S..)l.D..B4..| -peer0.org1.example.com | 00000010 0c dc ce 7d c1 c2 dc 95 95 05 62 fc 36 3f c1 91 |...}......b.6?..|" -peer0.org1.example.com | "2019-05-02 01:31:08.889 UTC [msp.identity] Verify -> DEBU 1c14 Verify: sig = 00000000 30 44 02 20 1f 6f f9 d2 72 02 ca 23 0a 4d 06 bd |0D. .o..r..#.M..| -peer0.org1.example.com | 00000010 99 74 a4 2c 28 6a 0a 4e df 05 22 60 b5 09 fd 9a |.t.,(j.N.."`....| -peer0.org1.example.com | 00000020 b0 e4 7f 15 02 20 7c 49 fc d6 86 22 76 a5 d3 6f |..... |I..."v..o| -peer0.org1.example.com | 00000030 d8 74 f9 56 85 ac 3b 84 f5 c5 38 e7 da cc 12 7a |.t.V..;...8....z| -peer0.org1.example.com | 00000040 85 81 04 5d d5 23 |...].#|" -peer0.org1.example.com | "2019-05-02 01:31:08.890 UTC [cauthdsl] func2 -> DEBU 1c15 0xc004221760 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.890 UTC [cauthdsl] func1 -> DEBU 1c16 0xc004221760 gate 1556760668888681200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.890 UTC [policies] Evaluate -> DEBU 1c17 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.890 UTC [policies] Evaluate -> DEBU 1c18 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.890 UTC [policies] Evaluate -> DEBU 1c19 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.891 UTC [policies] Evaluate -> DEBU 1c1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.891 UTC [gossip.gossip] handleMessage -> DEBU 1c1b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.892 UTC [gossip.gossip] handleMessage -> DEBU 1c1c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.892 UTC [msp] DeserializeIdentity -> DEBU 1c1d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.893 UTC [msp.identity] Verify -> DEBU 1c1e Verify: digest = 00000000 51 65 a8 f5 3d 66 bd 4c ea e1 02 f7 5e 30 2f a6 |Qe..=f.L....^0/.| -peer0.org1.example.com | 00000010 55 da ac 09 e9 16 bc e3 88 66 89 a2 a0 ea 8a b9 |U........f......|" -peer0.org1.example.com | "2019-05-02 01:31:08.894 UTC [msp.identity] Verify -> DEBU 1c1f Verify: sig = 00000000 30 44 02 20 71 7c bf 73 a9 07 a1 55 62 45 53 17 |0D. q|.s...UbES.| -peer0.org1.example.com | 00000010 6a 2b f5 6d c7 d1 ec 07 06 c9 cb 70 67 73 a0 39 |j+.m.......pgs.9| -peer0.org1.example.com | 00000020 68 ac 47 72 02 20 78 14 ae 0d d3 31 4a f6 69 be |h.Gr. x....1J.i.| -peer0.org1.example.com | 00000030 d9 18 3c aa 9e bf 90 5b 8c 6b 73 69 80 0c dc 64 |..<....[.ksi...d| -peer0.org1.example.com | 00000040 89 a4 87 bc 1a 1d |......|" -peer0.org1.example.com | "2019-05-02 01:31:08.900 UTC [msp.identity] Verify -> DEBU 1c20 Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -peer0.org1.example.com | 00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -peer0.org1.example.com | "2019-05-02 01:31:08.901 UTC [msp.identity] Verify -> DEBU 1c21 Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -peer0.org1.example.com | 00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -peer0.org1.example.com | 00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -peer0.org1.example.com | 00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -peer0.org1.example.com | 00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -peer0.org1.example.com | "2019-05-02 01:31:08.901 UTC [msp] DeserializeIdentity -> DEBU 1c22 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.902 UTC [msp] DeserializeIdentity -> DEBU 1c23 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.903 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:08.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c25 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c26 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.905 UTC [policies] Evaluate -> DEBU 1c27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.905 UTC [policies] Evaluate -> DEBU 1c28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.905 UTC [policies] Evaluate -> DEBU 1c29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.906 UTC [cauthdsl] func1 -> DEBU 1c2a 0xc0042540b0 gate 1556760668906033500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.906 UTC [cauthdsl] func2 -> DEBU 1c2b 0xc0042540b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.906 UTC [cauthdsl] func2 -> DEBU 1c2c 0xc0042540b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.906 UTC [cauthdsl] func2 -> DEBU 1c2d 0xc0042540b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.906 UTC [msp.identity] Verify -> DEBU 1c2e Verify: digest = 00000000 6e b0 75 c4 51 40 0e aa 99 5b d4 4c e9 2b e8 4b |n.u.Q@...[.L.+.K| -peer0.org1.example.com | 00000010 ef 3b fb 35 be f1 cd 9c a2 03 51 d3 59 0e 44 3f |.;.5......Q.Y.D?|" -peer0.org1.example.com | "2019-05-02 01:31:08.906 UTC [msp.identity] Verify -> DEBU 1c2f Verify: sig = 00000000 30 44 02 20 03 37 d6 b4 db fc c5 c5 97 d9 b7 82 |0D. .7..........| -peer0.org1.example.com | 00000010 cb 4f 24 2e 01 c9 0e 5c d3 74 96 47 c2 70 5b 15 |.O$....\.t.G.p[.| -peer0.org1.example.com | 00000020 fb c0 c7 e5 02 20 50 5c 72 51 31 e9 74 c2 2b 1c |..... P\rQ1.t.+.| -peer0.org1.example.com | 00000030 3a 93 ab aa 2e 7a 88 04 ea b7 85 74 e0 2a 64 2d |:....z.....t.*d-| -peer0.org1.example.com | 00000040 14 3b 47 ea f2 83 |.;G...|" -peer0.org1.example.com | "2019-05-02 01:31:08.908 UTC [cauthdsl] func2 -> DEBU 1c30 0xc0042540b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.908 UTC [cauthdsl] func1 -> DEBU 1c31 0xc0042540b0 gate 1556760668906033500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.908 UTC [policies] Evaluate -> DEBU 1c32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.908 UTC [policies] Evaluate -> DEBU 1c33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.908 UTC [policies] Evaluate -> DEBU 1c34 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.908 UTC [policies] Evaluate -> DEBU 1c35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.909 UTC [msp] DeserializeIdentity -> DEBU 1c36 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.909 UTC [msp] DeserializeIdentity -> DEBU 1c37 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.911 UTC [msp] DeserializeIdentity -> DEBU 1c39 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.911 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c38 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c3a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c3b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [msp] DeserializeIdentity -> DEBU 1c3c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [policies] Evaluate -> DEBU 1c3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [gossip.pull] Hello -> DEBU 1c3e Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [policies] Evaluate -> DEBU 1c3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [policies] Evaluate -> DEBU 1c40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [msp] DeserializeIdentity -> DEBU 1c41 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [cauthdsl] func1 -> DEBU 1c42 0xc004255880 gate 1556760668912727400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [cauthdsl] func2 -> DEBU 1c43 0xc004255880 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [msp] DeserializeIdentity -> DEBU 1c44 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [cauthdsl] func2 -> DEBU 1c45 0xc004255880 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [cauthdsl] func2 -> DEBU 1c46 0xc004255880 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [msp.identity] Verify -> DEBU 1c47 Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -peer0.org1.example.com | 00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -peer0.org1.example.com | "2019-05-02 01:31:08.912 UTC [gossip.comm] Send -> DEBU 1c48 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.913 UTC [msp.identity] Verify -> DEBU 1c49 Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -peer0.org1.example.com | 00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -peer0.org1.example.com | 00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -peer0.org1.example.com | 00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -peer0.org1.example.com | 00000040 9e 37 b5 08 86 fb a3 |.7.....|" -peer0.org1.example.com | "2019-05-02 01:31:08.913 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.913 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.913 UTC [cauthdsl] func2 -> DEBU 1c4c 0xc004255880 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.913 UTC [cauthdsl] func1 -> DEBU 1c4d 0xc004255880 gate 1556760668912727400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.913 UTC [policies] Evaluate -> DEBU 1c4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.913 UTC [policies] Evaluate -> DEBU 1c4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.913 UTC [policies] Evaluate -> DEBU 1c50 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.913 UTC [policies] Evaluate -> DEBU 1c51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.913 UTC [msp] DeserializeIdentity -> DEBU 1c52 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.915 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c53 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.915 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c54 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.916 UTC [policies] Evaluate -> DEBU 1c55 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.916 UTC [policies] Evaluate -> DEBU 1c56 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.916 UTC [policies] Evaluate -> DEBU 1c57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.917 UTC [cauthdsl] func1 -> DEBU 1c58 0xc004276960 gate 1556760668917180300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.917 UTC [cauthdsl] func2 -> DEBU 1c59 0xc004276960 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.917 UTC [cauthdsl] func2 -> DEBU 1c5a 0xc004276960 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.918 UTC [cauthdsl] func2 -> DEBU 1c5b 0xc004276960 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.918 UTC [msp.identity] Verify -> DEBU 1c5c Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -peer0.org1.example.com | 00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -peer0.org1.example.com | "2019-05-02 01:31:08.918 UTC [msp.identity] Verify -> DEBU 1c5d Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -peer0.org1.example.com | 00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -peer0.org1.example.com | 00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -peer0.org1.example.com | 00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -peer0.org1.example.com | 00000040 9e 37 b5 08 86 fb a3 |.7.....|" -peer0.org1.example.com | "2019-05-02 01:31:08.918 UTC [cauthdsl] func2 -> DEBU 1c5e 0xc004276960 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.919 UTC [cauthdsl] func1 -> DEBU 1c5f 0xc004276960 gate 1556760668917180300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.919 UTC [policies] Evaluate -> DEBU 1c60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.919 UTC [policies] Evaluate -> DEBU 1c61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.919 UTC [policies] Evaluate -> DEBU 1c62 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.919 UTC [policies] Evaluate -> DEBU 1c63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.919 UTC [gossip.gossip] handleMessage -> DEBU 1c64 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.919 UTC [gossip.gossip] handleMessage -> DEBU 1c65 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.920 UTC [msp.identity] Verify -> DEBU 1c66 Verify: digest = 00000000 51 65 a8 f5 3d 66 bd 4c ea e1 02 f7 5e 30 2f a6 |Qe..=f.L....^0/.| -peer0.org1.example.com | 00000010 55 da ac 09 e9 16 bc e3 88 66 89 a2 a0 ea 8a b9 |U........f......|" -peer0.org1.example.com | "2019-05-02 01:31:08.920 UTC [msp.identity] Verify -> DEBU 1c67 Verify: sig = 00000000 30 44 02 20 71 7c bf 73 a9 07 a1 55 62 45 53 17 |0D. q|.s...UbES.| -peer0.org1.example.com | 00000010 6a 2b f5 6d c7 d1 ec 07 06 c9 cb 70 67 73 a0 39 |j+.m.......pgs.9| -peer0.org1.example.com | 00000020 68 ac 47 72 02 20 78 14 ae 0d d3 31 4a f6 69 be |h.Gr. x....1J.i.| -peer0.org1.example.com | 00000030 d9 18 3c aa 9e bf 90 5b 8c 6b 73 69 80 0c dc 64 |..<....[.ksi...d| -peer0.org1.example.com | 00000040 89 a4 87 bc 1a 1d |......|" -peer0.org1.example.com | "2019-05-02 01:31:08.921 UTC [msp] DeserializeIdentity -> DEBU 1c68 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.921 UTC [msp] DeserializeIdentity -> DEBU 1c69 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.921 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:08.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c6b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c6c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.922 UTC [policies] Evaluate -> DEBU 1c6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.922 UTC [policies] Evaluate -> DEBU 1c6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.922 UTC [policies] Evaluate -> DEBU 1c6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.922 UTC [cauthdsl] func1 -> DEBU 1c70 0xc00428ca90 gate 1556760668922737500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.923 UTC [cauthdsl] func2 -> DEBU 1c71 0xc00428ca90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.923 UTC [cauthdsl] func2 -> DEBU 1c72 0xc00428ca90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.923 UTC [cauthdsl] func2 -> DEBU 1c73 0xc00428ca90 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.923 UTC [msp.identity] Verify -> DEBU 1c74 Verify: digest = 00000000 6e b0 75 c4 51 40 0e aa 99 5b d4 4c e9 2b e8 4b |n.u.Q@...[.L.+.K| -peer0.org1.example.com | 00000010 ef 3b fb 35 be f1 cd 9c a2 03 51 d3 59 0e 44 3f |.;.5......Q.Y.D?|" -peer0.org1.example.com | "2019-05-02 01:31:08.924 UTC [msp.identity] Verify -> DEBU 1c75 Verify: sig = 00000000 30 44 02 20 03 37 d6 b4 db fc c5 c5 97 d9 b7 82 |0D. .7..........| -peer0.org1.example.com | 00000010 cb 4f 24 2e 01 c9 0e 5c d3 74 96 47 c2 70 5b 15 |.O$....\.t.G.p[.| -peer0.org1.example.com | 00000020 fb c0 c7 e5 02 20 50 5c 72 51 31 e9 74 c2 2b 1c |..... P\rQ1.t.+.| -peer0.org1.example.com | 00000030 3a 93 ab aa 2e 7a 88 04 ea b7 85 74 e0 2a 64 2d |:....z.....t.*d-| -peer0.org1.example.com | 00000040 14 3b 47 ea f2 83 |.;G...|" -peer0.org1.example.com | "2019-05-02 01:31:08.924 UTC [cauthdsl] func2 -> DEBU 1c76 0xc00428ca90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.924 UTC [cauthdsl] func1 -> DEBU 1c77 0xc00428ca90 gate 1556760668922737500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.924 UTC [policies] Evaluate -> DEBU 1c78 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.924 UTC [policies] Evaluate -> DEBU 1c79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.924 UTC [policies] Evaluate -> DEBU 1c7a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.924 UTC [policies] Evaluate -> DEBU 1c7b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.925 UTC [msp] DeserializeIdentity -> DEBU 1c7c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.926 UTC [msp] DeserializeIdentity -> DEBU 1c7d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.926 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:08.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c80 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.926 UTC [policies] Evaluate -> DEBU 1c81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.927 UTC [policies] Evaluate -> DEBU 1c82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.927 UTC [policies] Evaluate -> DEBU 1c83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.927 UTC [cauthdsl] func1 -> DEBU 1c84 0xc0042a4260 gate 1556760668927282000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.927 UTC [cauthdsl] func2 -> DEBU 1c85 0xc0042a4260 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.927 UTC [cauthdsl] func2 -> DEBU 1c86 0xc0042a4260 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.927 UTC [cauthdsl] func2 -> DEBU 1c87 0xc0042a4260 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.927 UTC [msp.identity] Verify -> DEBU 1c88 Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -peer0.org1.example.com | 00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -peer0.org1.example.com | "2019-05-02 01:31:08.927 UTC [msp.identity] Verify -> DEBU 1c89 Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -peer0.org1.example.com | 00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -peer0.org1.example.com | 00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -peer0.org1.example.com | 00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -peer0.org1.example.com | 00000040 29 fe 17 41 ee e9 a4 |)..A...|" -peer0.org1.example.com | "2019-05-02 01:31:08.928 UTC [cauthdsl] func2 -> DEBU 1c8a 0xc0042a4260 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.928 UTC [cauthdsl] func1 -> DEBU 1c8b 0xc0042a4260 gate 1556760668927282000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.928 UTC [policies] Evaluate -> DEBU 1c8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.928 UTC [policies] Evaluate -> DEBU 1c8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.928 UTC [policies] Evaluate -> DEBU 1c8e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.928 UTC [policies] Evaluate -> DEBU 1c8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.930 UTC [msp.identity] Verify -> DEBU 1c90 Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -peer0.org1.example.com | 00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -peer0.org1.example.com | "2019-05-02 01:31:08.930 UTC [msp.identity] Verify -> DEBU 1c91 Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -peer0.org1.example.com | 00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -peer0.org1.example.com | 00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -peer0.org1.example.com | 00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -peer0.org1.example.com | 00000040 23 02 f1 51 98 85 fe |#..Q...|" -peer0.org1.example.com | "2019-05-02 01:31:08.932 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c92 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.932 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c93 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.932 UTC [policies] Evaluate -> DEBU 1c94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.932 UTC [policies] Evaluate -> DEBU 1c95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.932 UTC [policies] Evaluate -> DEBU 1c96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.932 UTC [cauthdsl] func1 -> DEBU 1c97 0xc0042a5960 gate 1556760668932630400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.932 UTC [cauthdsl] func2 -> DEBU 1c98 0xc0042a5960 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.933 UTC [cauthdsl] func2 -> DEBU 1c99 0xc0042a5960 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.933 UTC [cauthdsl] func2 -> DEBU 1c9a 0xc0042a5960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:08.933 UTC [cauthdsl] func2 -> DEBU 1c9b 0xc0042a5960 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:08.933 UTC [cauthdsl] func1 -> DEBU 1c9c 0xc0042a5960 gate 1556760668932630400 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:08.933 UTC [policies] Evaluate -> DEBU 1c9d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.933 UTC [policies] Evaluate -> DEBU 1c9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.933 UTC [policies] Evaluate -> DEBU 1c9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.933 UTC [cauthdsl] func1 -> DEBU 1ca0 0xc0042b41a0 gate 1556760668933720700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.934 UTC [cauthdsl] func2 -> DEBU 1ca1 0xc0042b41a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.934 UTC [cauthdsl] func2 -> DEBU 1ca2 0xc0042b41a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.934 UTC [cauthdsl] func2 -> DEBU 1ca3 0xc0042b41a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.935 UTC [msp.identity] Verify -> DEBU 1ca4 Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -peer0.org1.example.com | 00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -peer0.org1.example.com | "2019-05-02 01:31:08.935 UTC [msp.identity] Verify -> DEBU 1ca5 Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -peer0.org1.example.com | 00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -peer0.org1.example.com | 00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -peer0.org1.example.com | 00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -peer0.org1.example.com | 00000040 23 02 f1 51 98 85 fe |#..Q...|" -peer0.org1.example.com | "2019-05-02 01:31:08.935 UTC [cauthdsl] func2 -> DEBU 1ca6 0xc0042b41a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.936 UTC [cauthdsl] func1 -> DEBU 1ca7 0xc0042b41a0 gate 1556760668933720700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.936 UTC [policies] Evaluate -> DEBU 1ca8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.936 UTC [policies] Evaluate -> DEBU 1ca9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.936 UTC [policies] Evaluate -> DEBU 1caa Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.936 UTC [policies] Evaluate -> DEBU 1cab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.937 UTC [gossip.gossip] handleMessage -> DEBU 1cac Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.937 UTC [gossip.gossip] handleMessage -> DEBU 1cad Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.937 UTC [gossip.gossip] handleMessage -> DEBU 1cae Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.937 UTC [gossip.gossip] handleMessage -> DEBU 1caf Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.937 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.937 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cb1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:08.937 UTC [msp] DeserializeIdentity -> DEBU 1cb2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.938 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cb3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:08.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cb4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cb5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:08.938 UTC [policies] Evaluate -> DEBU 1cb6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.938 UTC [policies] Evaluate -> DEBU 1cb7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:08.938 UTC [policies] Evaluate -> DEBU 1cb8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:08.938 UTC [cauthdsl] func1 -> DEBU 1cb9 0xc0042b5fa0 gate 1556760668938949500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [cauthdsl] func2 -> DEBU 1cba 0xc0042b5fa0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [cauthdsl] func2 -> DEBU 1cbb 0xc0042b5fa0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [cauthdsl] func2 -> DEBU 1cbc 0xc0042b5fa0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [msp.identity] Verify -> DEBU 1cbd Verify: digest = 00000000 75 e4 dd ff eb 35 18 e7 fe 9b e4 d9 8c c9 e5 3e |u....5.........>| -peer0.org1.example.com | 00000010 f0 e3 d9 fe 1b 94 b7 94 1b a8 2d da 11 e8 eb 8e |..........-.....|" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [msp.identity] Verify -> DEBU 1cbe Verify: sig = 00000000 30 44 02 20 6d e7 a3 91 be 80 8b f7 f1 59 26 5e |0D. m........Y&^| -peer0.org1.example.com | 00000010 9f 67 e5 9a 91 a6 0f 28 47 4b 9d 99 a8 cf 4d 94 |.g.....(GK....M.| -peer0.org1.example.com | 00000020 77 b8 8c 4c 02 20 1f 9b e7 1f ff e9 1b d4 8c b0 |w..L. ..........| -peer0.org1.example.com | 00000030 5e 14 92 be 50 2b df d2 6d ff 4c b5 59 8a bf fe |^...P+..m.L.Y...| -peer0.org1.example.com | 00000040 74 97 92 9f d5 db |t.....|" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [cauthdsl] func2 -> DEBU 1cbf 0xc0042b5fa0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [cauthdsl] func1 -> DEBU 1cc0 0xc0042b5fa0 gate 1556760668938949500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [policies] Evaluate -> DEBU 1cc1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [policies] Evaluate -> DEBU 1cc2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [policies] Evaluate -> DEBU 1cc3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.939 UTC [policies] Evaluate -> DEBU 1cc4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:08.940 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cc5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.940 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cc6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:08.940 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cc7 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 " -peer0.org1.example.com | "2019-05-02 01:31:08.940 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cc8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 " -peer0.org1.example.com | "2019-05-02 01:31:08.941 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cc9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:08.942 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cca Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.942 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ccb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ccc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ccd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cce Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.942 UTC [gossip.gossip] handleMessage -> DEBU 1ccf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.943 UTC [gossip.gossip] handleMessage -> DEBU 1cd0 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.943 UTC [gossip.gossip] handleMessage -> DEBU 1cd1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.943 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cd2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.943 UTC [gossip.gossip] handleMessage -> DEBU 1cd3 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10642209730754194776 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.943 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cd4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.943 UTC [gossip.pull] HandleMessage -> DEBU 1cd5 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10642209730754194776 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.943 UTC [gossip.gossip] handleMessage -> DEBU 1cd6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.950 UTC [msp] DeserializeIdentity -> DEBU 1cd7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.950 UTC [msp] DeserializeIdentity -> DEBU 1cd8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.950 UTC [msp] DeserializeIdentity -> DEBU 1cd9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.950 UTC [msp] DeserializeIdentity -> DEBU 1cda Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.951 UTC [msp] DeserializeIdentity -> DEBU 1cdb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.951 UTC [msp] DeserializeIdentity -> DEBU 1cdc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.952 UTC [gossip.comm] Send -> DEBU 1cdd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.952 UTC [msp] DeserializeIdentity -> DEBU 1cde Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.952 UTC [msp] DeserializeIdentity -> DEBU 1cdf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:08.952 UTC [gossip.comm] Send -> DEBU 1ce0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:08.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ce1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ce2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:08.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ce3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:08.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ce4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.090 UTC [gossip.gossip] handleMessage -> DEBU 1ce5 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.091 UTC [msp] DeserializeIdentity -> DEBU 1ce6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.091 UTC [msp] DeserializeIdentity -> DEBU 1ce7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.091 UTC [gossip.gossip] handleMessage -> DEBU 1ce8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.102 UTC [gossip.gossip] handleMessage -> DEBU 1ce9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760666001912700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.106 UTC [msp.identity] Verify -> DEBU 1cea Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -peer0.org1.example.com | 00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -peer0.org1.example.com | "2019-05-02 01:31:09.108 UTC [msp.identity] Verify -> DEBU 1ceb Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -peer0.org1.example.com | 00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -peer0.org1.example.com | 00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -peer0.org1.example.com | 00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -peer0.org1.example.com | 00000040 23 02 f1 51 98 85 fe |#..Q...|" -peer0.org1.example.com | "2019-05-02 01:31:09.111 UTC [gossip.gossip] handleMessage -> DEBU 1ced Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.110 UTC [gossip.comm] func1 -> DEBU 1cec Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760666001912700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.112 UTC [gossip.gossip] handleMessage -> DEBU 1cee Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760666001912700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.112 UTC [msp.identity] Verify -> DEBU 1cef Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -peer0.org1.example.com | 00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -peer0.org1.example.com | "2019-05-02 01:31:09.112 UTC [msp.identity] Verify -> DEBU 1cf0 Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -peer0.org1.example.com | 00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -peer0.org1.example.com | 00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -peer0.org1.example.com | 00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -peer0.org1.example.com | 00000040 23 02 f1 51 98 85 fe |#..Q...|" -peer0.org1.example.com | "2019-05-02 01:31:09.113 UTC [msp] DeserializeIdentity -> DEBU 1cf1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.113 UTC [gossip.gossip] handleMessage -> DEBU 1cf2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.119 UTC [gossip.comm] func1 -> DEBU 1cf3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760666001912700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.119 UTC [gossip.gossip] handleMessage -> DEBU 1cf4 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760666001912700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.120 UTC [msp.identity] Verify -> DEBU 1cf5 Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -peer0.org1.example.com | 00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -peer0.org1.example.com | "2019-05-02 01:31:09.120 UTC [msp.identity] Verify -> DEBU 1cf6 Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -peer0.org1.example.com | 00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -peer0.org1.example.com | 00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -peer0.org1.example.com | 00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -peer0.org1.example.com | 00000040 23 02 f1 51 98 85 fe |#..Q...|" -peer0.org1.example.com | "2019-05-02 01:31:09.121 UTC [msp] DeserializeIdentity -> DEBU 1cf7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.121 UTC [gossip.gossip] handleMessage -> DEBU 1cf8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.121 UTC [gossip.gossip] handleMessage -> DEBU 1cf9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.121 UTC [gossip.pull] HandleMessage -> DEBU 1cfa GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.121 UTC [gossip.pull] SendDigest -> DEBU 1cfb Sending BLOCK_MSG digest: [5 1 2 3 4] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:09.121 UTC [gossip.gossip] handleMessage -> DEBU 1cfc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.177 UTC [dockercontroller] Start -> DEBU 1cfd Started container peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" -peer0.org1.example.com | "2019-05-02 01:31:09.179 UTC [container] unlockContainer -> DEBU 1cfe container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" -peer0.org1.example.com | "2019-05-02 01:31:09.179 UTC [container] lockContainer -> DEBU 1cff waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" -peer0.org1.example.com | "2019-05-02 01:31:09.180 UTC [container] lockContainer -> DEBU 1d00 got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" -peer0.org1.example.com | "2019-05-02 01:31:09.180 UTC [container] unlockContainer -> DEBU 1d01 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" -peer0.org1.example.com | "2019-05-02 01:31:09.310 UTC [chaincode.accesscontrol] authenticate -> DEBU 1d02 Chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b 's authentication is authorized" -peer0.org1.example.com | "2019-05-02 01:31:09.310 UTC [chaincode] handleMessage -> DEBU 1d03 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -peer0.org1.example.com | "2019-05-02 01:31:09.310 UTC [chaincode] HandleRegister -> DEBU 1d04 Received REGISTER in state created" -peer0.org1.example.com | "2019-05-02 01:31:09.310 UTC [chaincode] Register -> DEBU 1d05 registered handler complete for chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" -peer0.org1.example.com | "2019-05-02 01:31:09.311 UTC [chaincode] HandleRegister -> DEBU 1d06 Got REGISTER for chaincodeID = name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" , sending back REGISTERED" -peer0.org1.example.com | "2019-05-02 01:31:09.312 UTC [chaincode] HandleRegister -> DEBU 1d07 Changed state to established for name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " -peer0.org1.example.com | "2019-05-02 01:31:09.312 UTC [chaincode] sendReady -> DEBU 1d08 sending READY for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " -peer0.org1.example.com | "2019-05-02 01:31:09.312 UTC [chaincode] sendReady -> DEBU 1d09 Changed to state ready for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " -peer0.org1.example.com | "2019-05-02 01:31:09.318 UTC [gossip.comm] func1 -> DEBU 1d0a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.319 UTC [gossip.gossip] handleMessage -> DEBU 1d0b Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.319 UTC [msp] DeserializeIdentity -> DEBU 1d0c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.319 UTC [msp] DeserializeIdentity -> DEBU 1d0d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.320 UTC [msp] DeserializeIdentity -> DEBU 1d0e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.320 UTC [gossip.gossip] handleMessage -> DEBU 1d0f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.313 UTC [chaincode] Launch -> DEBU 1d10 launch complete" -peer0.org1.example.com | "2019-05-02 01:31:09.322 UTC [stateleveldb] GetState -> DEBU 1d11 GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:09.322 UTC [chaincode] Execute -> DEBU 1d12 Entry" -peer0.org1.example.com | "2019-05-02 01:31:09.326 UTC [gossip.comm] func1 -> DEBU 1d13 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760665949347200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.327 UTC [gossip.gossip] handleMessage -> DEBU 1d14 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760665949347200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.328 UTC [msp] DeserializeIdentity -> DEBU 1d15 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.328 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:09.329 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d17 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:09.329 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d18 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:09.329 UTC [policies] Evaluate -> DEBU 1d19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:09.329 UTC [policies] Evaluate -> DEBU 1d1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:09.329 UTC [policies] Evaluate -> DEBU 1d1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:09.329 UTC [cauthdsl] func1 -> DEBU 1d1c 0xc00434eb70 gate 1556760669329923400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:09.330 UTC [cauthdsl] func2 -> DEBU 1d1d 0xc00434eb70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:09.332 UTC [cauthdsl] func2 -> DEBU 1d1e 0xc00434eb70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:09.333 UTC [cauthdsl] func2 -> DEBU 1d1f 0xc00434eb70 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:09.334 UTC [gossip.comm] func1 -> DEBU 1d20 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760665949347200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.334 UTC [msp.identity] Verify -> DEBU 1d21 Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -peer0.org1.example.com | 00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -peer0.org1.example.com | "2019-05-02 01:31:09.336 UTC [msp.identity] Verify -> DEBU 1d22 Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -peer0.org1.example.com | 00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -peer0.org1.example.com | 00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -peer0.org1.example.com | 00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -peer0.org1.example.com | 00000040 9e 37 b5 08 86 fb a3 |.7.....|" -peer0.org1.example.com | "2019-05-02 01:31:09.337 UTC [cauthdsl] func2 -> DEBU 1d23 0xc00434eb70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:09.337 UTC [cauthdsl] func1 -> DEBU 1d24 0xc00434eb70 gate 1556760669329923400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:09.337 UTC [policies] Evaluate -> DEBU 1d25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.338 UTC [policies] Evaluate -> DEBU 1d26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.338 UTC [policies] Evaluate -> DEBU 1d27 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.338 UTC [policies] Evaluate -> DEBU 1d28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.339 UTC [chaincode] handleMessage -> DEBU 1d29 [13c934fb] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:09.339 UTC [chaincode] HandleTransaction -> DEBU 1d2a [13c934fb] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:09.340 UTC [chaincode] HandleTransaction -> DEBU 1d2b [13c934fb] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:09.338 UTC [msp] DeserializeIdentity -> DEBU 1d2c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.340 UTC [gossip.gossip] handleMessage -> DEBU 1d2d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.341 UTC [gossip.gossip] handleMessage -> DEBU 1d2e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760665949347200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.343 UTC [msp] DeserializeIdentity -> DEBU 1d30 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.344 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d31 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:09.344 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d32 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:09.344 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d33 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:09.344 UTC [policies] Evaluate -> DEBU 1d34 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:09.342 UTC [chaincode] handleMessage -> DEBU 1d2f [13c934fb] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:09.345 UTC [chaincode] HandleTransaction -> DEBU 1d36 [13c934fb] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:09.345 UTC [chaincode] HandleTransaction -> DEBU 1d37 [13c934fb] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:09.344 UTC [policies] Evaluate -> DEBU 1d35 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:09.348 UTC [chaincode] handleMessage -> DEBU 1d38 [13c934fb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:09.347 UTC [policies] Evaluate -> DEBU 1d39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:09.348 UTC [chaincode] Notify -> DEBU 1d3a [13c934fb] notifying Txid:13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:09.349 UTC [cauthdsl] func1 -> DEBU 1d3b 0xc00436a580 gate 1556760669349030300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:09.349 UTC [cauthdsl] func2 -> DEBU 1d3d 0xc00436a580 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:09.349 UTC [chaincode] Execute -> DEBU 1d3c Exit" -peer0.org1.example.com | "2019-05-02 01:31:09.350 UTC [cauthdsl] func2 -> DEBU 1d3e 0xc00436a580 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:09.350 UTC [endorser] callChaincode -> INFO 1d3f [businesschannel][13c934fb] Exit chaincode: name:"exp02" (1400ms)" -peer0.org1.example.com | "2019-05-02 01:31:09.351 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1d41 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:09.351 UTC [lockbasedtxmgr] Done -> DEBU 1d42 Done with transaction simulation / query execution [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa]" -peer0.org1.example.com | "2019-05-02 01:31:09.351 UTC [endorser] SimulateProposal -> DEBU 1d43 [businesschannel][13c934fb] Exit" -peer0.org1.example.com | "2019-05-02 01:31:09.351 UTC [endorser] endorseProposal -> DEBU 1d44 [businesschannel][13c934fb] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:09.350 UTC [cauthdsl] func2 -> DEBU 1d40 0xc00436a580 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:09.352 UTC [endorser] endorseProposal -> DEBU 1d45 [businesschannel][13c934fb] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-05-02 01:31:09.352 UTC [endorser] EndorseWithPlugin -> DEBU 1d47 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:09.353 UTC [msp.identity] Sign -> DEBU 1d48 Sign: plaintext: 0A205C50CA5E5CDB99559A71E4A14AAF...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:09.353 UTC [msp.identity] Sign -> DEBU 1d49 Sign: digest: F3D2F91D0E93EA84246A644014167A16EB81402888B457DA5587093A91D34B0B " -peer0.org1.example.com | "2019-05-02 01:31:09.353 UTC [endorser] EndorseWithPlugin -> DEBU 1d4a Exiting {plugin: escc, channel: businesschannel, tx: 13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:09.353 UTC [endorser] endorseProposal -> DEBU 1d4b [businesschannel][13c934fb] Exit" -peer0.org1.example.com | "2019-05-02 01:31:09.354 UTC [lockbasedtxmgr] Done -> DEBU 1d4c Done with transaction simulation / query execution [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa]" -peer0.org1.example.com | "2019-05-02 01:31:09.354 UTC [endorser] func1 -> DEBU 1d4d Exit: request from 192.168.240.9:41324" -peer0.org1.example.com | "2019-05-02 01:31:09.352 UTC [msp.identity] Verify -> DEBU 1d46 Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -peer0.org1.example.com | 00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -peer0.org1.example.com | "2019-05-02 01:31:09.355 UTC [comm.grpc.server] 1 -> INFO 1d4e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41324 grpc.code=OK grpc.call_duration=1.4176709s -peer0.org1.example.com | "2019-05-02 01:31:09.356 UTC [msp.identity] Verify -> DEBU 1d4f Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -peer0.org1.example.com | 00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -peer0.org1.example.com | 00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -peer0.org1.example.com | 00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -peer0.org1.example.com | 00000040 9e 37 b5 08 86 fb a3 |.7.....|" -peer0.org1.example.com | "2019-05-02 01:31:09.358 UTC [cauthdsl] func2 -> DEBU 1d50 0xc00436a580 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:09.359 UTC [cauthdsl] func1 -> DEBU 1d51 0xc00436a580 gate 1556760669349030300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU 1d52 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU 1d53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU 1d54 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.361 UTC [policies] Evaluate -> DEBU 1d55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.361 UTC [msp] DeserializeIdentity -> DEBU 1d56 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.362 UTC [gossip.gossip] handleMessage -> DEBU 1d57 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.373 UTC [grpc] infof -> DEBU 1d58 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:09.390 UTC [grpc] warningf -> DEBU 1d59 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41324: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:31:09.391 UTC [grpc] infof -> DEBU 1d5a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:09.431 UTC [gossip.gossip] handleMessage -> DEBU 1d5b Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.433 UTC [gossip.pull] HandleMessage -> DEBU 1d5c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.434 UTC [gossip.pull] SendDigest -> DEBU 1d5d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:09.436 UTC [gossip.gossip] handleMessage -> DEBU 1d5e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.443 UTC [gossip.gossip] handleMessage -> DEBU 1d5f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.445 UTC [gossip.gossip] handleMessage -> DEBU 1d60 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.445 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.446 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d62 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:09.447 UTC [msp.identity] Verify -> DEBU 1d63 Verify: digest = 00000000 b4 fb 10 b9 21 31 8a 8d a8 19 82 54 06 4c 04 70 |....!1.....T.L.p| -peer0.org1.example.com | 00000010 e3 b7 28 26 da ca a3 1e 3a a6 af 0e c5 7c 86 18 |..(&....:....|..|" -peer0.org1.example.com | "2019-05-02 01:31:09.447 UTC [msp.identity] Verify -> DEBU 1d64 Verify: sig = 00000000 30 45 02 21 00 ae 0a 11 32 1e 92 8f 4f 8a b6 ca |0E.!....2...O...| -peer0.org1.example.com | 00000010 97 65 20 fb a2 4a 6a af 7e 41 ca a8 3b 09 02 df |.e ..Jj.~A..;...| -peer0.org1.example.com | 00000020 a2 78 54 79 7a 02 20 79 1a eb db e0 ea b1 92 11 |.xTyz. y........| -peer0.org1.example.com | 00000030 7c 81 5b b7 ee 7e a8 77 16 31 32 4f 78 93 d8 c4 ||.[..~.w.12Ox...| -peer0.org1.example.com | 00000040 d7 95 ec 86 58 d8 cc |....X..|" -peer0.org1.example.com | "2019-05-02 01:31:09.448 UTC [msp.identity] Verify -> DEBU 1d65 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:09.449 UTC [msp.identity] Verify -> DEBU 1d66 Verify: sig = 00000000 30 44 02 20 49 69 bc 7a 5d 36 3d 7a 89 07 27 b7 |0D. Ii.z]6=z..'.| -peer0.org1.example.com | 00000010 81 58 4a 1d 5d ad 57 59 87 c9 08 7a 4d 20 09 40 |.XJ.].WY...zM .@| -peer0.org1.example.com | 00000020 53 b1 c3 6f 02 20 00 e5 16 2a 19 fd c7 75 a1 32 |S..o. ...*...u.2| -peer0.org1.example.com | 00000030 88 b7 0c 2d a9 3a 8b be a2 ea 23 d6 96 b9 73 9f |...-.:....#...s.| -peer0.org1.example.com | 00000040 e9 21 40 40 d1 25 |.!@@.%|" -peer0.org1.example.com | "2019-05-02 01:31:09.450 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d67 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.451 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d68 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:09.451 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d69 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 " -peer0.org1.example.com | "2019-05-02 01:31:09.452 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d6a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 " -peer0.org1.example.com | "2019-05-02 01:31:09.453 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d6b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:09.454 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d6c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.454 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d6d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.454 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d6e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.455 UTC [gossip.discovery] sendMemResponse -> DEBU 1d6f Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:09.456 UTC [msp] DeserializeIdentity -> DEBU 1d70 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.457 UTC [msp] DeserializeIdentity -> DEBU 1d71 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.457 UTC [gossip.comm] Send -> DEBU 1d72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:09.458 UTC [gossip.discovery] sendMemResponse -> DEBU 1d73 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:09.458 UTC [gossip.comm] sendToEndpoint -> DEBU 1d74 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.459 UTC [gossip.comm] sendToEndpoint -> DEBU 1d75 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.511 UTC [gossip.comm] func1 -> DEBU 1d76 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.511 UTC [gossip.gossip] handleMessage -> DEBU 1d77 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.511 UTC [gossip.pull] HandleMessage -> DEBU 1d78 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d79 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d7a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d7b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d7c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d7d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d7e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.512 UTC [gossip.pull] SendDigest -> DEBU 1d7f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:09.512 UTC [gossip.gossip] handleMessage -> DEBU 1d80 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.525 UTC [gossip.comm] func1 -> DEBU 1d81 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.526 UTC [gossip.gossip] handleMessage -> DEBU 1d82 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.526 UTC [gossip.gossip] handleMessage -> DEBU 1d83 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d84 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.527 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d85 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:09.528 UTC [msp] DeserializeIdentity -> DEBU 1d86 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.528 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d87 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:09.529 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d88 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:09.529 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d89 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:09.529 UTC [policies] Evaluate -> DEBU 1d8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:09.530 UTC [policies] Evaluate -> DEBU 1d8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:09.531 UTC [policies] Evaluate -> DEBU 1d8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:09.531 UTC [cauthdsl] func1 -> DEBU 1d8d 0xc0043bc980 gate 1556760669531699200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:09.532 UTC [cauthdsl] func2 -> DEBU 1d8e 0xc0043bc980 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:09.532 UTC [cauthdsl] func2 -> DEBU 1d8f 0xc0043bc980 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:09.533 UTC [cauthdsl] func2 -> DEBU 1d90 0xc0043bc980 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:09.533 UTC [msp.identity] Verify -> DEBU 1d91 Verify: digest = 00000000 17 b0 0d a9 2e 9b 0c a0 71 0f ec 23 35 9d 1d 42 |........q..#5..B| -peer0.org1.example.com | 00000010 d2 f4 9a 4d 99 18 9e 6e 60 55 64 78 97 c1 10 9d |...M...n`Udx....|" -peer0.org1.example.com | "2019-05-02 01:31:09.533 UTC [msp.identity] Verify -> DEBU 1d92 Verify: sig = 00000000 30 45 02 21 00 a8 1a 80 26 82 b9 7c 82 74 79 8c |0E.!....&..|.ty.| -peer0.org1.example.com | 00000010 a5 df d7 4b e2 38 5b b3 4e b7 d1 d4 52 26 1d 75 |...K.8[.N...R&.u| -peer0.org1.example.com | 00000020 2b aa d9 05 5f 02 20 0f 38 a3 36 37 73 fb 73 a5 |+..._. .8.67s.s.| -peer0.org1.example.com | 00000030 e0 52 0c 33 f2 e0 e4 bc ab 6d 28 2b 53 62 bd 20 |.R.3.....m(+Sb. | -peer0.org1.example.com | 00000040 d3 4a 7f 29 45 80 be |.J.)E..|" -peer0.org1.example.com | "2019-05-02 01:31:09.534 UTC [cauthdsl] func2 -> DEBU 1d93 0xc0043bc980 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:09.534 UTC [cauthdsl] func1 -> DEBU 1d94 0xc0043bc980 gate 1556760669531699200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:09.534 UTC [policies] Evaluate -> DEBU 1d95 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.535 UTC [policies] Evaluate -> DEBU 1d96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.535 UTC [policies] Evaluate -> DEBU 1d97 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.536 UTC [policies] Evaluate -> DEBU 1d98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.536 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d99 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d9a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:09.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d9b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 " -peer0.org1.example.com | "2019-05-02 01:31:09.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d9c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 " -peer0.org1.example.com | "2019-05-02 01:31:09.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d9d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:09.539 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d9e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.539 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d9f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.557 UTC [gossip.discovery] sendMemResponse -> DEBU 1da0 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:09.558 UTC [msp] DeserializeIdentity -> DEBU 1da1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.559 UTC [msp] DeserializeIdentity -> DEBU 1da3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.560 UTC [msp] DeserializeIdentity -> DEBU 1da4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.561 UTC [gossip.comm] Send -> DEBU 1da5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:09.561 UTC [gossip.discovery] sendMemResponse -> DEBU 1da6 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:09.562 UTC [gossip.comm] sendToEndpoint -> DEBU 1da7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.565 UTC [gossip.comm] sendToEndpoint -> DEBU 1da8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.577 UTC [gossip.comm] func1 -> DEBU 1da9 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.578 UTC [gossip.gossip] handleMessage -> DEBU 1daa Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.578 UTC [msp] DeserializeIdentity -> DEBU 1dab Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.578 UTC [msp] DeserializeIdentity -> DEBU 1dac Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.578 UTC [msp] DeserializeIdentity -> DEBU 1dad Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.578 UTC [gossip.gossip] handleMessage -> DEBU 1dae Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.592 UTC [gossip.comm] func1 -> DEBU 1daf Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760666017201100 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.593 UTC [gossip.gossip] handleMessage -> DEBU 1db0 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760666017201100 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.593 UTC [msp] DeserializeIdentity -> DEBU 1db1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.594 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1db2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:09.594 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1db3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:09.595 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1db4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:09.595 UTC [policies] Evaluate -> DEBU 1db5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:09.595 UTC [policies] Evaluate -> DEBU 1db6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:09.596 UTC [policies] Evaluate -> DEBU 1db7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:09.597 UTC [cauthdsl] func1 -> DEBU 1db8 0xc0043cf3a0 gate 1556760669597765500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:09.598 UTC [cauthdsl] func2 -> DEBU 1db9 0xc0043cf3a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:09.598 UTC [cauthdsl] func2 -> DEBU 1dba 0xc0043cf3a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:09.598 UTC [cauthdsl] func2 -> DEBU 1dbb 0xc0043cf3a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:09.599 UTC [msp.identity] Verify -> DEBU 1dbc Verify: digest = 00000000 f5 84 fc 53 b8 bc 29 6c 8d 44 e3 b7 42 34 00 a8 |...S..)l.D..B4..| -peer0.org1.example.com | 00000010 0c dc ce 7d c1 c2 dc 95 95 05 62 fc 36 3f c1 91 |...}......b.6?..|" -peer0.org1.example.com | "2019-05-02 01:31:09.599 UTC [msp.identity] Verify -> DEBU 1dbd Verify: sig = 00000000 30 44 02 20 1f 6f f9 d2 72 02 ca 23 0a 4d 06 bd |0D. .o..r..#.M..| -peer0.org1.example.com | 00000010 99 74 a4 2c 28 6a 0a 4e df 05 22 60 b5 09 fd 9a |.t.,(j.N.."`....| -peer0.org1.example.com | 00000020 b0 e4 7f 15 02 20 7c 49 fc d6 86 22 76 a5 d3 6f |..... |I..."v..o| -peer0.org1.example.com | 00000030 d8 74 f9 56 85 ac 3b 84 f5 c5 38 e7 da cc 12 7a |.t.V..;...8....z| -peer0.org1.example.com | 00000040 85 81 04 5d d5 23 |...].#|" -peer0.org1.example.com | "2019-05-02 01:31:09.600 UTC [cauthdsl] func2 -> DEBU 1dbe 0xc0043cf3a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:09.600 UTC [cauthdsl] func1 -> DEBU 1dbf 0xc0043cf3a0 gate 1556760669597765500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:09.601 UTC [policies] Evaluate -> DEBU 1dc0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.601 UTC [policies] Evaluate -> DEBU 1dc1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.601 UTC [policies] Evaluate -> DEBU 1dc2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.602 UTC [policies] Evaluate -> DEBU 1dc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.602 UTC [msp] DeserializeIdentity -> DEBU 1dc4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.603 UTC [gossip.gossip] handleMessage -> DEBU 1dc5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.741 UTC [gossip.comm] func1 -> DEBU 1dc6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.741 UTC [gossip.gossip] handleMessage -> DEBU 1dc7 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.741 UTC [gossip.pull] HandleMessage -> DEBU 1dc8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dc9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dca Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dcb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dcc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dcd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dce Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.742 UTC [gossip.pull] SendDigest -> DEBU 1dcf Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:09.742 UTC [gossip.gossip] handleMessage -> DEBU 1dd0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.827 UTC [gossip.pull] Hello -> DEBU 1dd1 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:09.827 UTC [gossip.comm] Send -> DEBU 1dd2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:09.827 UTC [gossip.pull] Hello -> DEBU 1dd3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:09.828 UTC [gossip.comm] Send -> DEBU 1dd4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:09.828 UTC [gossip.pull] Hello -> DEBU 1dd5 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:09.828 UTC [gossip.comm] Send -> DEBU 1dd6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:09.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1dda Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1ddb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1ddc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.830 UTC [gossip.comm] func1 -> DEBU 1ddd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4391479627761310920 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.830 UTC [gossip.gossip] handleMessage -> DEBU 1dde Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4391479627761310920 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.830 UTC [gossip.pull] HandleMessage -> DEBU 1ddf GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4391479627761310920 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.830 UTC [gossip.gossip] handleMessage -> DEBU 1de0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.840 UTC [gossip.comm] func1 -> DEBU 1de1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4738054507446597177 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.840 UTC [gossip.gossip] handleMessage -> DEBU 1de2 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4738054507446597177 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.840 UTC [gossip.pull] HandleMessage -> DEBU 1de3 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4738054507446597177 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.840 UTC [gossip.gossip] handleMessage -> DEBU 1de4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.841 UTC [gossip.gossip] handleMessage -> DEBU 1de5 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2600314157982669733 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.841 UTC [gossip.pull] HandleMessage -> DEBU 1de6 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2600314157982669733 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.841 UTC [gossip.gossip] handleMessage -> DEBU 1de7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.896 UTC [gossip.comm] func1 -> DEBU 1de8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.896 UTC [gossip.gossip] handleMessage -> DEBU 1de9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.896 UTC [gossip.gossip] handleMessage -> DEBU 1dea Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.896 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1deb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.896 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dec Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:09.896 UTC [msp] DeserializeIdentity -> DEBU 1ded Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.896 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1dee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:09.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1def Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:09.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1df0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1df1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1df2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1df3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [cauthdsl] func1 -> DEBU 1df4 0xc00440fb80 gate 1556760669897262400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [cauthdsl] func2 -> DEBU 1df5 0xc00440fb80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [cauthdsl] func2 -> DEBU 1df6 0xc00440fb80 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [cauthdsl] func2 -> DEBU 1df7 0xc00440fb80 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [msp.identity] Verify -> DEBU 1df8 Verify: digest = 00000000 8f bb 93 f9 cb 6e 5a 62 ac d3 9c 3d 8b e5 27 93 |.....nZb...=..'.| -peer0.org1.example.com | 00000010 a6 9a 17 d6 a9 63 f6 bc 95 92 18 ae 65 d9 5d d3 |.....c......e.].|" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [msp.identity] Verify -> DEBU 1df9 Verify: sig = 00000000 30 44 02 20 75 6a 08 32 22 53 0e 33 17 23 e0 04 |0D. uj.2"S.3.#..| -peer0.org1.example.com | 00000010 94 bb 45 d6 52 f3 e6 ea 06 57 ca f2 eb 6c 4d 04 |..E.R....W...lM.| -peer0.org1.example.com | 00000020 d4 2c c0 55 02 20 30 2d a3 c2 d2 66 89 f2 4b d4 |.,.U. 0-...f..K.| -peer0.org1.example.com | 00000030 dc 7e bc b2 f2 81 b2 3d 84 81 79 54 2f be 12 9b |.~.....=..yT/...| -peer0.org1.example.com | 00000040 c0 7c 4a 4b 2f 0f |.|JK/.|" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [cauthdsl] func2 -> DEBU 1dfa 0xc00440fb80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [cauthdsl] func1 -> DEBU 1dfb 0xc00440fb80 gate 1556760669897262400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1dfc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1dfe Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1dff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:09.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e00 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.898 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e01 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:09.898 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e02 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 " -peer0.org1.example.com | "2019-05-02 01:31:09.898 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e03 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 " -peer0.org1.example.com | "2019-05-02 01:31:09.898 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e04 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:09.898 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e05 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e06 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.899 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e07 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:09.899 UTC [gossip.discovery] sendMemResponse -> DEBU 1e08 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:09.899 UTC [msp] DeserializeIdentity -> DEBU 1e09 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.899 UTC [msp] DeserializeIdentity -> DEBU 1e0a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.899 UTC [msp] DeserializeIdentity -> DEBU 1e0b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:09.899 UTC [gossip.comm] Send -> DEBU 1e0c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:09.899 UTC [gossip.discovery] sendMemResponse -> DEBU 1e0d Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:09.899 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:09.899 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.000 UTC [msp.identity] Sign -> DEBU 1e10 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101A " -peer0.org1.example.com | "2019-05-02 01:31:10.000 UTC [msp.identity] Sign -> DEBU 1e11 Sign: digest: E883BA370082EDE773285E2D1FE1FC8D1AB9BD1780A4F7A7248D61E9B25479BA " -peer0.org1.example.com | "2019-05-02 01:31:10.000 UTC [msp.identity] Sign -> DEBU 1e12 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:10.000 UTC [msp.identity] Sign -> DEBU 1e13 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:10.002 UTC [gossip.comm] Send -> DEBU 1e14 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:10.002 UTC [msp] DeserializeIdentity -> DEBU 1e15 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:10.003 UTC [gossip.comm] Send -> DEBU 1e16 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:10.004 UTC [msp] DeserializeIdentity -> DEBU 1e17 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:10.004 UTC [gossip.comm] Send -> DEBU 1e18 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:10.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1e19 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.006 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.006 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.013 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.013 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.022 UTC [gossip.gossip] handleMessage -> DEBU 1e1f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.024 UTC [gossip.gossip] handleMessage -> DEBU 1e20 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.029 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e22 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:10.029 UTC [msp.identity] Verify -> DEBU 1e23 Verify: digest = 00000000 e8 83 ba 37 00 82 ed e7 73 28 5e 2d 1f e1 fc 8d |...7....s(^-....| -peer0.org1.example.com | 00000010 1a b9 bd 17 80 a4 f7 a7 24 8d 61 e9 b2 54 79 ba |........$.a..Ty.|" -peer0.org1.example.com | "2019-05-02 01:31:10.029 UTC [msp.identity] Verify -> DEBU 1e24 Verify: sig = 00000000 30 44 02 20 59 e7 70 b4 55 d4 ba 45 8e 23 e1 12 |0D. Y.p.U..E.#..| -peer0.org1.example.com | 00000010 28 bf cf 39 8e 95 c0 83 7a 87 e0 55 e2 17 ac 3c |(..9....z..U...<| -peer0.org1.example.com | 00000020 b8 99 c0 dd 02 20 0a 0c f2 6b 65 5c 43 3f 72 95 |..... ...ke\C?r.| -peer0.org1.example.com | 00000030 c9 f6 e0 78 02 9f a2 ca 02 f3 e9 da 6f 25 1c 64 |...x........o%.d| -peer0.org1.example.com | 00000040 4e 89 6a 80 f8 ab |N.j...|" -peer0.org1.example.com | "2019-05-02 01:31:10.030 UTC [msp.identity] Verify -> DEBU 1e25 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:10.030 UTC [msp.identity] Verify -> DEBU 1e26 Verify: sig = 00000000 30 45 02 21 00 f8 0b e7 b2 be e7 10 44 58 4e 3f |0E.!........DXN?| -peer0.org1.example.com | 00000010 68 e7 fb cb 22 bc 89 ae 2d 7e b7 12 fc 9b 7c 1b |h..."...-~....|.| -peer0.org1.example.com | 00000020 6b 5d ad 6c 85 02 20 0e 76 78 fb 05 9e 27 0d f8 |k].l.. .vx...'..| -peer0.org1.example.com | 00000030 e5 84 a9 3a 9e f7 e6 6e d8 61 42 5d 60 65 d1 78 |...:...n.aB]`e.x| -peer0.org1.example.com | 00000040 0c 32 6d 33 80 ef 75 |.2m3..u|" -peer0.org1.example.com | "2019-05-02 01:31:10.030 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e27 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.030 UTC [gossip.comm] func1 -> DEBU 1e28 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.030 UTC [gossip.discovery] isSentByMe -> DEBU 1e29 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.030 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e2a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.030 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e2b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.030 UTC [gossip.gossip] handleMessage -> DEBU 1e2c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.031 UTC [gossip.gossip] handleMessage -> DEBU 1e2d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.031 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e2e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.033 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e2f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:10.034 UTC [msp.identity] Verify -> DEBU 1e30 Verify: digest = 00000000 e8 83 ba 37 00 82 ed e7 73 28 5e 2d 1f e1 fc 8d |...7....s(^-....| -peer0.org1.example.com | 00000010 1a b9 bd 17 80 a4 f7 a7 24 8d 61 e9 b2 54 79 ba |........$.a..Ty.|" -peer0.org1.example.com | "2019-05-02 01:31:10.035 UTC [msp.identity] Verify -> DEBU 1e31 Verify: sig = 00000000 30 44 02 20 59 e7 70 b4 55 d4 ba 45 8e 23 e1 12 |0D. Y.p.U..E.#..| -peer0.org1.example.com | 00000010 28 bf cf 39 8e 95 c0 83 7a 87 e0 55 e2 17 ac 3c |(..9....z..U...<| -peer0.org1.example.com | 00000020 b8 99 c0 dd 02 20 0a 0c f2 6b 65 5c 43 3f 72 95 |..... ...ke\C?r.| -peer0.org1.example.com | 00000030 c9 f6 e0 78 02 9f a2 ca 02 f3 e9 da 6f 25 1c 64 |...x........o%.d| -peer0.org1.example.com | 00000040 4e 89 6a 80 f8 ab |N.j...|" -peer0.org1.example.com | "2019-05-02 01:31:10.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e32 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.036 UTC [gossip.discovery] isSentByMe -> DEBU 1e33 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.044 UTC [gossip.comm] func1 -> DEBU 1e34 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.045 UTC [gossip.gossip] handleMessage -> DEBU 1e35 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.044 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e36 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.046 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e37 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:10.046 UTC [msp.identity] Verify -> DEBU 1e38 Verify: digest = 00000000 b4 fb 10 b9 21 31 8a 8d a8 19 82 54 06 4c 04 70 |....!1.....T.L.p| -peer0.org1.example.com | 00000010 e3 b7 28 26 da ca a3 1e 3a a6 af 0e c5 7c 86 18 |..(&....:....|..|" -peer0.org1.example.com | "2019-05-02 01:31:10.046 UTC [msp.identity] Verify -> DEBU 1e39 Verify: sig = 00000000 30 45 02 21 00 ae 0a 11 32 1e 92 8f 4f 8a b6 ca |0E.!....2...O...| -peer0.org1.example.com | 00000010 97 65 20 fb a2 4a 6a af 7e 41 ca a8 3b 09 02 df |.e ..Jj.~A..;...| -peer0.org1.example.com | 00000020 a2 78 54 79 7a 02 20 79 1a eb db e0 ea b1 92 11 |.xTyz. y........| -peer0.org1.example.com | 00000030 7c 81 5b b7 ee 7e a8 77 16 31 32 4f 78 93 d8 c4 ||.[..~.w.12Ox...| -peer0.org1.example.com | 00000040 d7 95 ec 86 58 d8 cc |....X..|" -peer0.org1.example.com | "2019-05-02 01:31:10.047 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e3a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.047 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e3b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.047 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e3c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:10.047 UTC [msp] DeserializeIdentity -> DEBU 1e3d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:10.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e3e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:10.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e3f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:10.048 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e40 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:10.048 UTC [policies] Evaluate -> DEBU 1e41 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:10.048 UTC [policies] Evaluate -> DEBU 1e42 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:10.048 UTC [policies] Evaluate -> DEBU 1e43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:10.048 UTC [cauthdsl] func1 -> DEBU 1e44 0xc004465640 gate 1556760670048338600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:10.048 UTC [cauthdsl] func2 -> DEBU 1e45 0xc004465640 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:10.048 UTC [cauthdsl] func2 -> DEBU 1e46 0xc004465640 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:10.048 UTC [cauthdsl] func2 -> DEBU 1e47 0xc004465640 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:10.048 UTC [msp.identity] Verify -> DEBU 1e48 Verify: digest = 00000000 8f bb 93 f9 cb 6e 5a 62 ac d3 9c 3d 8b e5 27 93 |.....nZb...=..'.| -peer0.org1.example.com | 00000010 a6 9a 17 d6 a9 63 f6 bc 95 92 18 ae 65 d9 5d d3 |.....c......e.].|" -peer0.org1.example.com | "2019-05-02 01:31:10.048 UTC [msp.identity] Verify -> DEBU 1e49 Verify: sig = 00000000 30 44 02 20 75 6a 08 32 22 53 0e 33 17 23 e0 04 |0D. uj.2"S.3.#..| -peer0.org1.example.com | 00000010 94 bb 45 d6 52 f3 e6 ea 06 57 ca f2 eb 6c 4d 04 |..E.R....W...lM.| -peer0.org1.example.com | 00000020 d4 2c c0 55 02 20 30 2d a3 c2 d2 66 89 f2 4b d4 |.,.U. 0-...f..K.| -peer0.org1.example.com | 00000030 dc 7e bc b2 f2 81 b2 3d 84 81 79 54 2f be 12 9b |.~.....=..yT/...| -peer0.org1.example.com | 00000040 c0 7c 4a 4b 2f 0f |.|JK/.|" -peer0.org1.example.com | "2019-05-02 01:31:10.050 UTC [cauthdsl] func2 -> DEBU 1e4a 0xc004465640 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:10.054 UTC [cauthdsl] func1 -> DEBU 1e4b 0xc004465640 gate 1556760670048338600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:10.054 UTC [policies] Evaluate -> DEBU 1e4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:10.054 UTC [policies] Evaluate -> DEBU 1e4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:10.054 UTC [policies] Evaluate -> DEBU 1e4e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:10.054 UTC [policies] Evaluate -> DEBU 1e4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:10.055 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e50 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.055 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e51 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.055 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e52 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.055 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e53 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.063 UTC [gossip.gossip] handleMessage -> DEBU 1e54 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.055 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e55 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:10.071 UTC [msp] DeserializeIdentity -> DEBU 1e56 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e57 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e58 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e59 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [policies] Evaluate -> DEBU 1e5a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [policies] Evaluate -> DEBU 1e5b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [policies] Evaluate -> DEBU 1e5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [cauthdsl] func1 -> DEBU 1e5d 0xc0044792a0 gate 1556760670076743200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [cauthdsl] func2 -> DEBU 1e5e 0xc0044792a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [cauthdsl] func2 -> DEBU 1e5f 0xc0044792a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [cauthdsl] func2 -> DEBU 1e60 0xc0044792a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:10.076 UTC [msp.identity] Verify -> DEBU 1e61 Verify: digest = 00000000 17 b0 0d a9 2e 9b 0c a0 71 0f ec 23 35 9d 1d 42 |........q..#5..B| -peer0.org1.example.com | 00000010 d2 f4 9a 4d 99 18 9e 6e 60 55 64 78 97 c1 10 9d |...M...n`Udx....|" -peer0.org1.example.com | "2019-05-02 01:31:10.077 UTC [msp.identity] Verify -> DEBU 1e62 Verify: sig = 00000000 30 45 02 21 00 a8 1a 80 26 82 b9 7c 82 74 79 8c |0E.!....&..|.ty.| -peer0.org1.example.com | 00000010 a5 df d7 4b e2 38 5b b3 4e b7 d1 d4 52 26 1d 75 |...K.8[.N...R&.u| -peer0.org1.example.com | 00000020 2b aa d9 05 5f 02 20 0f 38 a3 36 37 73 fb 73 a5 |+..._. .8.67s.s.| -peer0.org1.example.com | 00000030 e0 52 0c 33 f2 e0 e4 bc ab 6d 28 2b 53 62 bd 20 |.R.3.....m(+Sb. | -peer0.org1.example.com | 00000040 d3 4a 7f 29 45 80 be |.J.)E..|" -peer0.org1.example.com | "2019-05-02 01:31:10.077 UTC [cauthdsl] func2 -> DEBU 1e63 0xc0044792a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:10.077 UTC [cauthdsl] func1 -> DEBU 1e64 0xc0044792a0 gate 1556760670076743200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:10.077 UTC [policies] Evaluate -> DEBU 1e65 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:10.077 UTC [policies] Evaluate -> DEBU 1e66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:10.077 UTC [policies] Evaluate -> DEBU 1e67 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:10.077 UTC [policies] Evaluate -> DEBU 1e68 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:10.077 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e69 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.077 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e6a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.077 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e6b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:10.078 UTC [msp.identity] Verify -> DEBU 1e6c Verify: digest = 00000000 e8 83 ba 37 00 82 ed e7 73 28 5e 2d 1f e1 fc 8d |...7....s(^-....| -peer0.org1.example.com | 00000010 1a b9 bd 17 80 a4 f7 a7 24 8d 61 e9 b2 54 79 ba |........$.a..Ty.|" -peer0.org1.example.com | "2019-05-02 01:31:10.078 UTC [msp.identity] Verify -> DEBU 1e6d Verify: sig = 00000000 30 44 02 20 59 e7 70 b4 55 d4 ba 45 8e 23 e1 12 |0D. Y.p.U..E.#..| -peer0.org1.example.com | 00000010 28 bf cf 39 8e 95 c0 83 7a 87 e0 55 e2 17 ac 3c |(..9....z..U...<| -peer0.org1.example.com | 00000020 b8 99 c0 dd 02 20 0a 0c f2 6b 65 5c 43 3f 72 95 |..... ...ke\C?r.| -peer0.org1.example.com | 00000030 c9 f6 e0 78 02 9f a2 ca 02 f3 e9 da 6f 25 1c 64 |...x........o%.d| -peer0.org1.example.com | 00000040 4e 89 6a 80 f8 ab |N.j...|" -peer0.org1.example.com | "2019-05-02 01:31:10.078 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e6e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.078 UTC [gossip.discovery] isSentByMe -> DEBU 1e6f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.078 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e70 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.079 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e71 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:10.079 UTC [msp.identity] Verify -> DEBU 1e72 Verify: digest = 00000000 b4 fb 10 b9 21 31 8a 8d a8 19 82 54 06 4c 04 70 |....!1.....T.L.p| -peer0.org1.example.com | 00000010 e3 b7 28 26 da ca a3 1e 3a a6 af 0e c5 7c 86 18 |..(&....:....|..|" -peer0.org1.example.com | "2019-05-02 01:31:10.080 UTC [msp.identity] Verify -> DEBU 1e73 Verify: sig = 00000000 30 45 02 21 00 ae 0a 11 32 1e 92 8f 4f 8a b6 ca |0E.!....2...O...| -peer0.org1.example.com | 00000010 97 65 20 fb a2 4a 6a af 7e 41 ca a8 3b 09 02 df |.e ..Jj.~A..;...| -peer0.org1.example.com | 00000020 a2 78 54 79 7a 02 20 79 1a eb db e0 ea b1 92 11 |.xTyz. y........| -peer0.org1.example.com | 00000030 7c 81 5b b7 ee 7e a8 77 16 31 32 4f 78 93 d8 c4 ||.[..~.w.12Ox...| -peer0.org1.example.com | 00000040 d7 95 ec 86 58 d8 cc |....X..|" -peer0.org1.example.com | "2019-05-02 01:31:10.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e74 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:10.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e75 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:10.080 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e76 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:11.402 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1e77 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:11.403 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1e78 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:11.404 UTC [policies] Evaluate -> DEBU 1e79 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-05-02 01:31:11.404 UTC [policies] Evaluate -> DEBU 1e7a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:11.404 UTC [policies] Evaluate -> DEBU 1e7b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:11.405 UTC [cauthdsl] func1 -> DEBU 1e7c 0xc0034dc550 gate 1556760671404996300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:11.405 UTC [cauthdsl] func2 -> DEBU 1e7d 0xc0034dc550 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:11.405 UTC [cauthdsl] func2 -> DEBU 1e7e 0xc0034dc550 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:11.405 UTC [cauthdsl] func2 -> DEBU 1e7f 0xc0034dc550 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:11.405 UTC [msp.identity] Verify -> DEBU 1e80 Verify: digest = 00000000 9a 02 1c 3c d1 03 4a 17 98 40 12 7e 56 f6 9a ff |...<..J..@.~V...| -peer0.org1.example.com | 00000010 64 89 f1 f3 7b 66 67 40 ab 70 e5 49 40 12 52 95 |d...{fg@.p.I@.R.|" -peer0.org1.example.com | "2019-05-02 01:31:11.406 UTC [msp.identity] Verify -> DEBU 1e81 Verify: sig = 00000000 30 44 02 20 10 96 b4 1e 64 a7 f8 70 8d 1a ab c8 |0D. ....d..p....| -peer0.org1.example.com | 00000010 54 c8 66 d1 85 a8 98 2d 93 21 5c 5d 80 07 84 6d |T.f....-.!\]...m| -peer0.org1.example.com | 00000020 ef c4 36 8f 02 20 73 2e 50 59 a6 32 f9 d9 91 65 |..6.. s.PY.2...e| -peer0.org1.example.com | 00000030 ac bc fd ce 20 54 31 cf 9b 40 a5 40 9c 1f 32 b0 |.... T1..@.@..2.| -peer0.org1.example.com | 00000040 72 8b 6c b9 18 fa |r.l...|" -peer0.org1.example.com | "2019-05-02 01:31:11.406 UTC [cauthdsl] func2 -> DEBU 1e82 0xc0034dc550 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:11.406 UTC [cauthdsl] func1 -> DEBU 1e83 0xc0034dc550 gate 1556760671404996300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:11.407 UTC [policies] Evaluate -> DEBU 1e84 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:11.407 UTC [policies] Evaluate -> DEBU 1e85 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:11.407 UTC [policies] Evaluate -> DEBU 1e86 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:11.407 UTC [policies] Evaluate -> DEBU 1e87 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:11.408 UTC [blocksProvider] DeliverBlocks -> DEBU 1e88 [businesschannel] Adding payload to local buffer, blockNum = [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.408 UTC [gossip.state] addPayload -> DEBU 1e89 [businesschannel] Adding payload to local buffer, blockNum = [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.408 UTC [gossip.state] addPayload -> DEBU 1e8a Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-05-02 01:31:11.410 UTC [blocksProvider] DeliverBlocks -> DEBU 1e8b [businesschannel] Gossiping block [6], peers number [3]" -peer0.org1.example.com | "2019-05-02 01:31:11.411 UTC [gossip.channel] AddToMsgStore -> DEBU 1e8c Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4071 bytes, seq: 6}, Envelope: 4101 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-05-02 01:31:11.411 UTC [gossip.pull] Add -> DEBU 1e8e Added 6, total items: 6" -peer0.org1.example.com | "2019-05-02 01:31:11.411 UTC [gossip.state] deliverPayloads -> DEBU 1e8d [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.413 UTC [gossip.state] deliverPayloads -> DEBU 1e8f [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-05-02 01:31:11.413 UTC [gossip.privdata] StoreBlock -> INFO 1e90 [businesschannel] Received block [6] from buffer" -peer0.org1.example.com | "2019-05-02 01:31:11.414 UTC [gossip.privdata] StoreBlock -> DEBU 1e91 [businesschannel] Validating block [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.415 UTC [committer.txvalidator] Validate -> DEBU 1e92 [businesschannel] START Block Validation for block [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.418 UTC [committer.txvalidator] validateTx -> DEBU 1e93 [businesschannel] validateTx starts for block 0xc0034b6500 env 0xc0034f40a0 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:11.419 UTC [protoutils] ValidateTransaction -> DEBU 1e94 ValidateTransactionEnvelope starts for envelope 0xc0034f40a0" -peer0.org1.example.com | "2019-05-02 01:31:11.420 UTC [protoutils] ValidateTransaction -> DEBU 1e95 Header is channel_header:"\010\003\032\014\010\333\220\251\346\005\020\320\316\333\276\003\"\017businesschannel*@13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\005\313I5T\2457\277\372\311\2513<\350R\223U\261\3237N\2774\244" " -peer0.org1.example.com | "2019-05-02 01:31:11.421 UTC [protoutils] validateChannelHeader -> DEBU 1e96 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:11.421 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e97 begin" -peer0.org1.example.com | "2019-05-02 01:31:11.422 UTC [msp] GetManagerForChain -> DEBU 1e98 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:11.429 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e99 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:11.429 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e9a creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:11.430 UTC [msp.identity] Verify -> DEBU 1e9b Verify: digest = 00000000 cc 3a cf e1 4b 35 9d 17 a9 e6 85 2b 0b 68 18 e9 |.:..K5.....+.h..| -peer0.org1.example.com | 00000010 77 c3 fe 6e 06 78 10 0b 0b f4 fd 12 77 69 d9 e1 |w..n.x......wi..|" -peer0.org1.example.com | "2019-05-02 01:31:11.430 UTC [msp.identity] Verify -> DEBU 1e9c Verify: sig = 00000000 30 44 02 20 67 6f e6 58 06 60 f9 c7 a9 d4 28 51 |0D. go.X.`....(Q| -peer0.org1.example.com | 00000010 88 dc d4 b0 e9 12 85 b4 cf 09 57 11 7b 67 b9 a1 |..........W.{g..| -peer0.org1.example.com | 00000020 9e 18 f6 d1 02 20 33 cd ba ab b8 32 12 20 20 1a |..... 3....2. .| -peer0.org1.example.com | 00000030 02 ac 0c 82 b0 2a 5d d6 aa 02 45 f8 5e 92 62 d2 |.....*]...E.^.b.| -peer0.org1.example.com | 00000040 82 9a c0 c8 2a 6d |....*m|" -peer0.org1.example.com | "2019-05-02 01:31:11.431 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e9d exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:11.431 UTC [protoutils] validateEndorserTransaction -> DEBU 1e9e validateEndorserTransaction starts for data 0xc0031ab000, header channel_header:"\010\003\032\014\010\333\220\251\346\005\020\320\316\333\276\003\"\017businesschannel*@13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\005\313I5T\2457\277\372\311\2513<\350R\223U\261\3237N\2774\244" " -peer0.org1.example.com | "2019-05-02 01:31:11.432 UTC [protoutils] validateEndorserTransaction -> DEBU 1e9f validateEndorserTransaction info: there are 1 actions" -peer0.org1.example.com | "2019-05-02 01:31:11.432 UTC [protoutils] validateEndorserTransaction -> DEBU 1ea0 validateEndorserTransaction info: signature header is valid" -peer0.org1.example.com | "2019-05-02 01:31:11.432 UTC [protoutils] ValidateTransaction -> DEBU 1ea1 ValidateTransactionEnvelope returns err %!s()" -peer0.org1.example.com | "2019-05-02 01:31:11.433 UTC [committer.txvalidator] validateTx -> DEBU 1ea2 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:11.433 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1ea3 retrieveTransactionByID() - txId = [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa]" -peer0.org1.example.com | "2019-05-02 01:31:11.434 UTC [committer.txvalidator] validateTx -> DEBU 1ea4 Validating transaction with plugins" -peer0.org1.example.com | "2019-05-02 01:31:11.434 UTC [committer.txvalidator] Dispatch -> DEBU 1ea5 [businesschannel] Dispatch starts for bytes 0xc003427000" -peer0.org1.example.com | "2019-05-02 01:31:11.435 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1ea6 constructing new query executor txid = [0125ce35-eb59-49fc-a543-0a9ef5902890]" -peer0.org1.example.com | "2019-05-02 01:31:11.435 UTC [stateleveldb] GetState -> DEBU 1ea7 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -peer0.org1.example.com | "2019-05-02 01:31:11.435 UTC [stateleveldb] GetState -> DEBU 1ea8 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:11.436 UTC [stateleveldb] GetState -> DEBU 1ea9 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" -peer0.org1.example.com | "2019-05-02 01:31:11.436 UTC [stateleveldb] GetState -> DEBU 1eaa GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" -peer0.org1.example.com | "2019-05-02 01:31:11.436 UTC [stateleveldb] GetState -> DEBU 1eab GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" -peer0.org1.example.com | "2019-05-02 01:31:11.437 UTC [lockbasedtxmgr] Done -> DEBU 1eae Done with transaction simulation / query execution [0125ce35-eb59-49fc-a543-0a9ef5902890]" -peer0.org1.example.com | "2019-05-02 01:31:11.416 UTC [committer.txvalidator] Validate -> DEBU 1eac expecting 1 block validation responses" -peer0.org1.example.com | "2019-05-02 01:31:11.437 UTC [msp] DeserializeIdentity -> DEBU 1ead Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.438 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 1eaf Validating Tx 13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa, seq 0 out of 1 in block 6 for channel businesschannel with validation plugin vscc with plugin" -peer0.org1.example.com | "2019-05-02 01:31:11.440 UTC [msp] DeserializeIdentity -> DEBU 1eb0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.441 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1eb1 constructing new query executor txid = [750afab3-4501-46e6-ac3d-87f2cda85daa]" -peer0.org1.example.com | "2019-05-02 01:31:11.447 UTC [lockbasedtxmgr] Done -> DEBU 1eb2 Done with transaction simulation / query execution [750afab3-4501-46e6-ac3d-87f2cda85daa]" -peer0.org1.example.com | "2019-05-02 01:31:11.447 UTC [cauthdsl] func1 -> DEBU 1eb3 0xc0034c4060 gate 1556760671447938300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:11.449 UTC [cauthdsl] func2 -> DEBU 1eb4 0xc0034c4060 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:11.449 UTC [msp] DeserializeIdentity -> DEBU 1eb5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.451 UTC [cauthdsl] func2 -> DEBU 1eb6 0xc0034c4060 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:11.452 UTC [msp] DeserializeIdentity -> DEBU 1eb7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.453 UTC [gossip.comm] Send -> DEBU 1eb9 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4071 bytes, seq: 6}, Envelope: 4101 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:11.453 UTC [msp] DeserializeIdentity -> DEBU 1eba Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.454 UTC [msp] DeserializeIdentity -> DEBU 1ebb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.454 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4071 bytes, seq: 6}, Envelope: 4101 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:11.454 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:11.453 UTC [cauthdsl] func2 -> DEBU 1eb8 0xc0034c4060 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:11.463 UTC [msp.identity] Verify -> DEBU 1ebe Verify: digest = 00000000 f3 d2 f9 1d 0e 93 ea 84 24 6a 64 40 14 16 7a 16 |........$jd@..z.| -peer0.org1.example.com | 00000010 eb 81 40 28 88 b4 57 da 55 87 09 3a 91 d3 4b 0b |..@(..W.U..:..K.|" -peer0.org1.example.com | "2019-05-02 01:31:11.464 UTC [msp.identity] Verify -> DEBU 1ebf Verify: sig = 00000000 30 44 02 20 6c 0b 62 14 1d 94 42 63 58 a6 9c b0 |0D. l.b...BcX...| -peer0.org1.example.com | 00000010 22 68 15 9b b2 2a ef 61 88 58 06 b4 30 1a 00 bf |"h...*.a.X..0...| -peer0.org1.example.com | 00000020 9b 75 40 ce 02 20 6e 19 70 f3 10 f3 fd 28 26 d9 |.u@.. n.p....(&.| -peer0.org1.example.com | 00000030 d1 c6 84 5b 49 45 22 86 17 af 8f 2b bd f9 fe fe |...[IE"....+....| -peer0.org1.example.com | 00000040 b6 a4 94 3f 9e e6 |...?..|" -peer0.org1.example.com | "2019-05-02 01:31:11.471 UTC [cauthdsl] func2 -> DEBU 1ec0 0xc0034c4060 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:11.477 UTC [cauthdsl] func2 -> DEBU 1ec1 0xc0034c4060 signed by 1 principal evaluation starts (used [true])" -peer0.org1.example.com | "2019-05-02 01:31:11.477 UTC [cauthdsl] func2 -> DEBU 1ec2 0xc0034c4060 skipping identity 0 because it has already been used" -peer0.org1.example.com | "2019-05-02 01:31:11.479 UTC [cauthdsl] func2 -> DEBU 1ec3 0xc0034c4060 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:11.480 UTC [cauthdsl] func1 -> DEBU 1ec4 0xc0034c4060 gate 1556760671447938300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:11.481 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1ec5 constructing new query executor txid = [65912c5a-05f9-4c9c-9dfe-5882603b986d]" -peer0.org1.example.com | "2019-05-02 01:31:11.482 UTC [lockbasedtxmgr] Done -> DEBU 1ec6 Done with transaction simulation / query execution [65912c5a-05f9-4c9c-9dfe-5882603b986d]" -peer0.org1.example.com | "2019-05-02 01:31:11.482 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1ec7 constructing new query executor txid = [86f250bd-cad1-4eda-97a9-c571aa669cf5]" -peer0.org1.example.com | "2019-05-02 01:31:11.484 UTC [lockbasedtxmgr] Done -> DEBU 1ec8 Done with transaction simulation / query execution [86f250bd-cad1-4eda-97a9-c571aa669cf5]" -peer0.org1.example.com | "2019-05-02 01:31:11.486 UTC [vscc] Validate -> DEBU 1ec9 block 6, namespace: exp02, tx 0 validation results is: " -peer0.org1.example.com | "2019-05-02 01:31:11.486 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 1eca Transaction 13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa appears to be valid" -peer0.org1.example.com | "2019-05-02 01:31:11.487 UTC [committer.txvalidator] Dispatch -> DEBU 1ecb [businesschannel] Dispatch completes env bytes 0xc003427000" -peer0.org1.example.com | "2019-05-02 01:31:11.488 UTC [committer.txvalidator] Validate -> DEBU 1ecc got result for idx 0, code 0" -peer0.org1.example.com | "2019-05-02 01:31:11.488 UTC [committer.txvalidator] Validate -> INFO 1ecd [businesschannel] Validated block [6] in 73ms" -peer0.org1.example.com | "2019-05-02 01:31:11.489 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1ece Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-05-02 01:31:11.489 UTC [gossip.privdata] StoreBlock -> DEBU 1ecf [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-05-02 01:31:11.489 UTC [kvledger] CommitWithPvtData -> DEBU 1ed0 [businesschannel] Validating state for block [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.490 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1ed1 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:31:11.490 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1ed2 lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-05-02 01:31:11.490 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1ed3 Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-05-02 01:31:11.491 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1ed4 ValidateAndPrepareBatch() for block number = [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.491 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1ed5 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:11.491 UTC [valimpl] preprocessProtoBlock -> DEBU 1ed6 txType=ENDORSER_TRANSACTION" -peer0.org1.example.com | "2019-05-02 01:31:11.492 UTC [stateleveldb] GetState -> DEBU 1ed7 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:11.492 UTC [statebasedval] validateKVRead -> DEBU 1ed8 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" -peer0.org1.example.com | "2019-05-02 01:31:11.492 UTC [stateleveldb] GetState -> DEBU 1ed9 GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:11.493 UTC [statebasedval] validateKVRead -> DEBU 1eda Comparing versions for key [􏿿initialized]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -peer0.org1.example.com | "2019-05-02 01:31:11.493 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1edb Block [6] Transaction index [0] TxId [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa] marked as valid by state validator. ContainsPostOrderWrites [false]" -peer0.org1.example.com | "2019-05-02 01:31:11.493 UTC [valinternal] ApplyWriteSet -> DEBU 1edc txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"\x00\U0010ffffinitialized"}:(*internal.keyOps)(0xc0034b6f00), internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0034b6f40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0034b6fc0)}" -peer0.org1.example.com | "2019-05-02 01:31:11.494 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1edd validating rwset..." -peer0.org1.example.com | "2019-05-02 01:31:11.496 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1ede postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:11.496 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1edf ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-05-02 01:31:11.496 UTC [kvledger] CommitWithPvtData -> DEBU 1ee0 [businesschannel] Committing block [6] to storage" -peer0.org1.example.com | "2019-05-02 01:31:11.497 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1ee1 Writing block [6] to pvt block store" -peer0.org1.example.com | "2019-05-02 01:31:11.488 UTC [committer.txvalidator] validateTx -> DEBU 1ee2 [businesschannel] validateTx completes for block 0xc0034b6500 env 0xc0034f40a0 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:11.500 UTC [pvtdatastorage] Prepare -> DEBU 1ee3 Saved 0 private data write sets for block [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.503 UTC [fsblkstorage] indexBlock -> DEBU 1ee4 Indexing block [blockNum=6, blockHash=[]byte{0x49, 0xe, 0xd3, 0x82, 0x36, 0xc9, 0x80, 0xf6, 0xc4, 0xf3, 0x7b, 0x6f, 0x90, 0xf7, 0xc6, 0xcb, 0x46, 0xe1, 0xdb, 0xf2, 0x2, 0x21, 0xed, 0x35, 0x8f, 0x6e, 0xd0, 0x6c, 0xf4, 0x4, 0xb9, 0xfd} txOffsets= -peer0.org1.example.com | txId=13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa locPointer=offset=70, bytesLength=3053 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-05-02 01:31:11.503 UTC [fsblkstorage] indexBlock -> DEBU 1ee5 Adding txLoc [fileSuffixNum=0, offset=86581, bytesLength=3053] for tx ID: [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa] to txid-index" -peer0.org1.example.com | "2019-05-02 01:31:11.504 UTC [fsblkstorage] indexBlock -> DEBU 1ee6 Adding txLoc [fileSuffixNum=0, offset=86581, bytesLength=3053] for tx number:[0] ID: [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa] to blockNumTranNum index" -peer0.org1.example.com | "2019-05-02 01:31:11.512 UTC [fsblkstorage] updateCheckpoint -> DEBU 1ee7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90571], isChainEmpty=[false], lastBlockNumber=[6]" -peer0.org1.example.com | "2019-05-02 01:31:11.516 UTC [pvtdatastorage] Commit -> DEBU 1ee8 Committing private data for block [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.523 UTC [pvtdatastorage] Commit -> DEBU 1ee9 Committed private data for block [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.523 UTC [kvledger] CommitWithPvtData -> DEBU 1eea [businesschannel] Committing block [6] transactions to state database" -peer0.org1.example.com | "2019-05-02 01:31:11.523 UTC [lockbasedtxmgr] Commit -> DEBU 1eeb lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:11.524 UTC [lockbasedtxmgr] Commit -> DEBU 1eec Committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:11.524 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1eed Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-05-02 01:31:11.524 UTC [lockbasedtxmgr] Commit -> DEBU 1eee Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:11.525 UTC [stateleveldb] ApplyUpdates -> DEBU 1eef Channel [businesschannel]: Applying key(string)=[exp02􏿿initialized] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x0, 0xf4, 0x8f, 0xbf, 0xbf, 0x69, 0x6e, 0x69, 0x74, 0x69, 0x61, 0x6c, 0x69, 0x7a, 0x65, 0x64}]" -peer0.org1.example.com | "2019-05-02 01:31:11.525 UTC [stateleveldb] ApplyUpdates -> DEBU 1ef0 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -peer0.org1.example.com | "2019-05-02 01:31:11.526 UTC [stateleveldb] ApplyUpdates -> DEBU 1ef1 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -peer0.org1.example.com | "2019-05-02 01:31:11.539 UTC [lockbasedtxmgr] Commit -> DEBU 1ef2 Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-05-02 01:31:11.555 UTC [lockbasedtxmgr] func1 -> DEBU 1ef3 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-05-02 01:31:11.555 UTC [kvledger] CommitWithPvtData -> DEBU 1ef4 [businesschannel] Committing block [6] transactions to history database" -peer0.org1.example.com | "2019-05-02 01:31:11.555 UTC [historyleveldb] Commit -> DEBU 1ef5 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" -peer0.org1.example.com | "2019-05-02 01:31:11.556 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1ef6 Preparing potential purge list working-set for expiringAtBlk [7]" -peer0.org1.example.com | "2019-05-02 01:31:11.556 UTC [leveldbhelper] GetIterator -> DEBU 1ef7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:31:11.559 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1ef8 No expiry entry found for expiringAtBlk [7]" -peer0.org1.example.com | "2019-05-02 01:31:11.560 UTC [historyleveldb] Commit -> DEBU 1ef9 Channel [businesschannel]: Updates committed to history database for blockNo [6]" -peer0.org1.example.com | "2019-05-02 01:31:11.560 UTC [kvledger] CommitWithPvtData -> INFO 1efa [businesschannel] Committed block [6] with 1 transaction(s) in 70ms (state_validation=6ms block_commit=26ms state_commit=32ms)" -peer0.org1.example.com | "2019-05-02 01:31:11.563 UTC [msp.identity] Sign -> DEBU 1efb Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020807 " -peer0.org1.example.com | "2019-05-02 01:31:11.568 UTC [msp.identity] Sign -> DEBU 1efc Sign: digest: FCFF3904735FF2E7228C8D034380103939DE511A504B655FCAE28F95ABB26A11 " -peer0.org1.example.com | "2019-05-02 01:31:11.568 UTC [gossip.state] commitBlock -> DEBU 1efd [businesschannel] Committed block [6] with 1 transaction(s)" -peer0.org1.example.com | "2019-05-02 01:31:11.978 UTC [gossip.election] waitForInterrupt -> DEBU 1efe c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:11.978 UTC [gossip.election] IsLeader -> DEBU 1eff c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:11.979 UTC [msp.identity] Sign -> DEBU 1f00 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510071801 " -peer0.org1.example.com | "2019-05-02 01:31:11.979 UTC [msp.identity] Sign -> DEBU 1f01 Sign: digest: F9CC7595471B44E9D136E3434754233495AAB757151956447E44A7F7F3EE19ED " -peer0.org1.example.com | "2019-05-02 01:31:11.979 UTC [gossip.election] waitForInterrupt -> DEBU 1f02 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f03 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f04 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f05 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f06 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.982 UTC [gossip.comm] Send -> DEBU 1f07 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f08 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f09 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:11.982 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:11.983 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.829 UTC [msp] DeserializeIdentity -> DEBU 1f0c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.829 UTC [msp] DeserializeIdentity -> DEBU 1f0d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.829 UTC [gossip.comm] Send -> DEBU 1f0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:12.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1f10 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1f11 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1f12 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1f13 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1f14 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.832 UTC [gossip.gossip] handleMessage -> DEBU 1f15 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.833 UTC [msp.identity] Verify -> DEBU 1f16 Verify: digest = 00000000 66 6d 35 ff 5b f6 a2 48 b9 b2 21 48 4d 3a 9d b4 |fm5.[..H..!HM:..| -peer0.org1.example.com | 00000010 03 7e 74 22 c4 db 0b b3 47 9a 18 3a 9f 08 bc ca |.~t"....G..:....|" -peer0.org1.example.com | "2019-05-02 01:31:12.833 UTC [msp.identity] Verify -> DEBU 1f17 Verify: sig = 00000000 30 45 02 21 00 ef 77 a7 42 2b 29 06 d4 8d ea 3b |0E.!..w.B+)....;| -peer0.org1.example.com | 00000010 3a ca 6f 56 44 0c 1c 67 9f 1d e1 d8 53 2e 31 10 |:.oVD..g....S.1.| -peer0.org1.example.com | 00000020 fb 6f b4 0b e5 02 20 60 d0 d3 06 93 7e 55 aa 38 |.o.... `....~U.8| -peer0.org1.example.com | 00000030 b3 a4 13 35 0f b7 5d 97 cc a8 8f 1b 46 15 4f 0c |...5..].....F.O.| -peer0.org1.example.com | 00000040 0d f0 9d 93 08 97 3b |......;|" -peer0.org1.example.com | "2019-05-02 01:31:12.833 UTC [msp] DeserializeIdentity -> DEBU 1f18 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.834 UTC [msp] DeserializeIdentity -> DEBU 1f19 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.834 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f1a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:12.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f1b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f1c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.835 UTC [policies] Evaluate -> DEBU 1f1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.835 UTC [policies] Evaluate -> DEBU 1f1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:12.836 UTC [policies] Evaluate -> DEBU 1f20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.834 UTC [msp] DeserializeIdentity -> DEBU 1f1d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.836 UTC [cauthdsl] func1 -> DEBU 1f21 0xc003343750 gate 1556760672836589900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:12.836 UTC [cauthdsl] func2 -> DEBU 1f22 0xc003343750 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:12.837 UTC [cauthdsl] func2 -> DEBU 1f23 0xc003343750 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:12.837 UTC [cauthdsl] func2 -> DEBU 1f24 0xc003343750 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.837 UTC [msp.identity] Verify -> DEBU 1f25 Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -peer0.org1.example.com | 00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -peer0.org1.example.com | "2019-05-02 01:31:12.837 UTC [msp.identity] Verify -> DEBU 1f26 Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -peer0.org1.example.com | 00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -peer0.org1.example.com | 00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -peer0.org1.example.com | 00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -peer0.org1.example.com | 00000040 9e 37 b5 08 86 fb a3 |.7.....|" -peer0.org1.example.com | "2019-05-02 01:31:12.838 UTC [msp] DeserializeIdentity -> DEBU 1f27 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.838 UTC [cauthdsl] func2 -> DEBU 1f28 0xc003343750 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.839 UTC [cauthdsl] func1 -> DEBU 1f2a 0xc003343750 gate 1556760672836589900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:12.839 UTC [gossip.comm] func1 -> DEBU 1f2b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.839 UTC [policies] Evaluate -> DEBU 1f2c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.839 UTC [gossip.comm] func1 -> DEBU 1f2d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.839 UTC [policies] Evaluate -> DEBU 1f2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.839 UTC [policies] Evaluate -> DEBU 1f2f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.839 UTC [policies] Evaluate -> DEBU 1f30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.839 UTC [msp] DeserializeIdentity -> DEBU 1f31 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.840 UTC [msp] DeserializeIdentity -> DEBU 1f32 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.839 UTC [gossip.comm] Send -> DEBU 1f29 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:12.840 UTC [msp] DeserializeIdentity -> DEBU 1f34 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.840 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:12.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f35 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.840 UTC [msp] DeserializeIdentity -> DEBU 1f36 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f37 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f38 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [policies] Evaluate -> DEBU 1f39 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f3a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [policies] Evaluate -> DEBU 1f3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f3c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [policies] Evaluate -> DEBU 1f3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f3e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f3f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f40 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [cauthdsl] func1 -> DEBU 1f41 0xc003300f30 gate 1556760672841304900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [cauthdsl] func2 -> DEBU 1f42 0xc003300f30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [cauthdsl] func2 -> DEBU 1f43 0xc003300f30 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:12.841 UTC [cauthdsl] func2 -> DEBU 1f44 0xc003300f30 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.844 UTC [msp.identity] Verify -> DEBU 1f45 Verify: digest = 00000000 f5 84 fc 53 b8 bc 29 6c 8d 44 e3 b7 42 34 00 a8 |...S..)l.D..B4..| -peer0.org1.example.com | 00000010 0c dc ce 7d c1 c2 dc 95 95 05 62 fc 36 3f c1 91 |...}......b.6?..|" -peer0.org1.example.com | "2019-05-02 01:31:12.844 UTC [msp.identity] Verify -> DEBU 1f46 Verify: sig = 00000000 30 44 02 20 1f 6f f9 d2 72 02 ca 23 0a 4d 06 bd |0D. .o..r..#.M..| -peer0.org1.example.com | 00000010 99 74 a4 2c 28 6a 0a 4e df 05 22 60 b5 09 fd 9a |.t.,(j.N.."`....| -peer0.org1.example.com | 00000020 b0 e4 7f 15 02 20 7c 49 fc d6 86 22 76 a5 d3 6f |..... |I..."v..o| -peer0.org1.example.com | 00000030 d8 74 f9 56 85 ac 3b 84 f5 c5 38 e7 da cc 12 7a |.t.V..;...8....z| -peer0.org1.example.com | 00000040 85 81 04 5d d5 23 |...].#|" -peer0.org1.example.com | "2019-05-02 01:31:12.844 UTC [cauthdsl] func2 -> DEBU 1f47 0xc003300f30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.844 UTC [cauthdsl] func1 -> DEBU 1f48 0xc003300f30 gate 1556760672841304900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:12.845 UTC [policies] Evaluate -> DEBU 1f49 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.845 UTC [policies] Evaluate -> DEBU 1f4a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.845 UTC [policies] Evaluate -> DEBU 1f4b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.845 UTC [policies] Evaluate -> DEBU 1f4c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.846 UTC [msp.identity] Verify -> DEBU 1f4d Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -peer0.org1.example.com | 00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -peer0.org1.example.com | "2019-05-02 01:31:12.846 UTC [msp.identity] Verify -> DEBU 1f4e Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -peer0.org1.example.com | 00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -peer0.org1.example.com | 00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -peer0.org1.example.com | 00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -peer0.org1.example.com | 00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -peer0.org1.example.com | "2019-05-02 01:31:12.846 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f4f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.846 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f50 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.846 UTC [policies] Evaluate -> DEBU 1f51 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.846 UTC [policies] Evaluate -> DEBU 1f52 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:12.846 UTC [policies] Evaluate -> DEBU 1f53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.846 UTC [cauthdsl] func1 -> DEBU 1f54 0xc003272660 gate 1556760672846861500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:12.846 UTC [cauthdsl] func2 -> DEBU 1f55 0xc003272660 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:12.847 UTC [cauthdsl] func2 -> DEBU 1f56 0xc003272660 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:12.847 UTC [cauthdsl] func2 -> DEBU 1f57 0xc003272660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:12.847 UTC [cauthdsl] func2 -> DEBU 1f58 0xc003272660 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:12.847 UTC [cauthdsl] func1 -> DEBU 1f59 0xc003272660 gate 1556760672846861500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:12.847 UTC [policies] Evaluate -> DEBU 1f5a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.847 UTC [policies] Evaluate -> DEBU 1f5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.847 UTC [policies] Evaluate -> DEBU 1f5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.847 UTC [cauthdsl] func1 -> DEBU 1f5d 0xc003272ea0 gate 1556760672847755600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:12.847 UTC [cauthdsl] func2 -> DEBU 1f5e 0xc003272ea0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:12.847 UTC [cauthdsl] func2 -> DEBU 1f5f 0xc003272ea0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:12.848 UTC [cauthdsl] func2 -> DEBU 1f60 0xc003272ea0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.848 UTC [msp.identity] Verify -> DEBU 1f61 Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -peer0.org1.example.com | 00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -peer0.org1.example.com | "2019-05-02 01:31:12.848 UTC [msp.identity] Verify -> DEBU 1f62 Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -peer0.org1.example.com | 00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -peer0.org1.example.com | 00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -peer0.org1.example.com | 00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -peer0.org1.example.com | 00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -peer0.org1.example.com | "2019-05-02 01:31:12.848 UTC [cauthdsl] func2 -> DEBU 1f63 0xc003272ea0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.848 UTC [cauthdsl] func1 -> DEBU 1f64 0xc003272ea0 gate 1556760672847755600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:12.848 UTC [policies] Evaluate -> DEBU 1f65 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.848 UTC [policies] Evaluate -> DEBU 1f66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.848 UTC [policies] Evaluate -> DEBU 1f67 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.848 UTC [policies] Evaluate -> DEBU 1f68 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.849 UTC [gossip.gossip] handleMessage -> DEBU 1f69 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.850 UTC [gossip.gossip] handleMessage -> DEBU 1f6a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.850 UTC [msp] DeserializeIdentity -> DEBU 1f6b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.853 UTC [msp.identity] Verify -> DEBU 1f6c Verify: digest = 00000000 66 6d 35 ff 5b f6 a2 48 b9 b2 21 48 4d 3a 9d b4 |fm5.[..H..!HM:..| -peer0.org1.example.com | 00000010 03 7e 74 22 c4 db 0b b3 47 9a 18 3a 9f 08 bc ca |.~t"....G..:....|" -peer0.org1.example.com | "2019-05-02 01:31:12.853 UTC [msp.identity] Verify -> DEBU 1f6d Verify: sig = 00000000 30 45 02 21 00 ef 77 a7 42 2b 29 06 d4 8d ea 3b |0E.!..w.B+)....;| -peer0.org1.example.com | 00000010 3a ca 6f 56 44 0c 1c 67 9f 1d e1 d8 53 2e 31 10 |:.oVD..g....S.1.| -peer0.org1.example.com | 00000020 fb 6f b4 0b e5 02 20 60 d0 d3 06 93 7e 55 aa 38 |.o.... `....~U.8| -peer0.org1.example.com | 00000030 b3 a4 13 35 0f b7 5d 97 cc a8 8f 1b 46 15 4f 0c |...5..].....F.O.| -peer0.org1.example.com | 00000040 0d f0 9d 93 08 97 3b |......;|" -peer0.org1.example.com | "2019-05-02 01:31:12.854 UTC [msp.identity] Verify -> DEBU 1f6e Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -peer0.org1.example.com | 00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -peer0.org1.example.com | "2019-05-02 01:31:12.854 UTC [msp.identity] Verify -> DEBU 1f6f Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -peer0.org1.example.com | 00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -peer0.org1.example.com | 00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -peer0.org1.example.com | 00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -peer0.org1.example.com | 00000040 23 02 f1 51 98 85 fe |#..Q...|" -peer0.org1.example.com | "2019-05-02 01:31:12.854 UTC [msp] DeserializeIdentity -> DEBU 1f70 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [msp] DeserializeIdentity -> DEBU 1f71 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f73 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f74 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [policies] Evaluate -> DEBU 1f75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [policies] Evaluate -> DEBU 1f76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [policies] Evaluate -> DEBU 1f77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [cauthdsl] func1 -> DEBU 1f78 0xc0031db940 gate 1556760672855532600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [cauthdsl] func2 -> DEBU 1f79 0xc0031db940 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [cauthdsl] func2 -> DEBU 1f7a 0xc0031db940 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:12.855 UTC [cauthdsl] func2 -> DEBU 1f7b 0xc0031db940 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.856 UTC [msp.identity] Verify -> DEBU 1f7c Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -peer0.org1.example.com | 00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -peer0.org1.example.com | "2019-05-02 01:31:12.856 UTC [msp.identity] Verify -> DEBU 1f7d Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -peer0.org1.example.com | 00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -peer0.org1.example.com | 00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -peer0.org1.example.com | 00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -peer0.org1.example.com | 00000040 9e 37 b5 08 86 fb a3 |.7.....|" -peer0.org1.example.com | "2019-05-02 01:31:12.856 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc0031db940 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.856 UTC [cauthdsl] func1 -> DEBU 1f7f 0xc0031db940 gate 1556760672855532600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:12.856 UTC [policies] Evaluate -> DEBU 1f80 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.856 UTC [policies] Evaluate -> DEBU 1f81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.856 UTC [policies] Evaluate -> DEBU 1f82 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.856 UTC [policies] Evaluate -> DEBU 1f83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.856 UTC [msp] DeserializeIdentity -> DEBU 1f84 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.856 UTC [msp] DeserializeIdentity -> DEBU 1f85 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.857 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f86 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:12.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f87 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f88 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f89 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f8a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [cauthdsl] func1 -> DEBU 1f8c 0xc0030df110 gate 1556760672858158300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [cauthdsl] func2 -> DEBU 1f8d 0xc0030df110 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [cauthdsl] func2 -> DEBU 1f8e 0xc0030df110 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [cauthdsl] func2 -> DEBU 1f8f 0xc0030df110 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [msp.identity] Verify -> DEBU 1f90 Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -peer0.org1.example.com | 00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [msp.identity] Verify -> DEBU 1f91 Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -peer0.org1.example.com | 00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -peer0.org1.example.com | 00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -peer0.org1.example.com | 00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -peer0.org1.example.com | 00000040 d4 55 93 6a 4b 9f |.U.jK.|" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [cauthdsl] func2 -> DEBU 1f92 0xc0030df110 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [cauthdsl] func1 -> DEBU 1f93 0xc0030df110 gate 1556760672858158300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f96 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.859 UTC [msp] DeserializeIdentity -> DEBU 1f98 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.860 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f99 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.860 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f9a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.860 UTC [policies] Evaluate -> DEBU 1f9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.860 UTC [policies] Evaluate -> DEBU 1f9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:12.860 UTC [policies] Evaluate -> DEBU 1f9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.860 UTC [cauthdsl] func1 -> DEBU 1f9e 0xc003052200 gate 1556760672860628900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:12.860 UTC [cauthdsl] func2 -> DEBU 1f9f 0xc003052200 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:12.860 UTC [cauthdsl] func2 -> DEBU 1fa0 0xc003052200 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [cauthdsl] func2 -> DEBU 1fa1 0xc003052200 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [msp.identity] Verify -> DEBU 1fa2 Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -peer0.org1.example.com | 00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [msp.identity] Verify -> DEBU 1fa3 Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -peer0.org1.example.com | 00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -peer0.org1.example.com | 00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -peer0.org1.example.com | 00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -peer0.org1.example.com | 00000040 d4 55 93 6a 4b 9f |.U.jK.|" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [cauthdsl] func2 -> DEBU 1fa4 0xc003052200 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [cauthdsl] func1 -> DEBU 1fa5 0xc003052200 gate 1556760672860628900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [policies] Evaluate -> DEBU 1fa6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [policies] Evaluate -> DEBU 1fa7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [policies] Evaluate -> DEBU 1fa8 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [policies] Evaluate -> DEBU 1fa9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [gossip.gossip] handleMessage -> DEBU 1faa Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [gossip.gossip] handleMessage -> DEBU 1fab Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.861 UTC [msp] DeserializeIdentity -> DEBU 1fac Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.862 UTC [msp.identity] Verify -> DEBU 1fad Verify: digest = 00000000 66 6d 35 ff 5b f6 a2 48 b9 b2 21 48 4d 3a 9d b4 |fm5.[..H..!HM:..| -peer0.org1.example.com | 00000010 03 7e 74 22 c4 db 0b b3 47 9a 18 3a 9f 08 bc ca |.~t"....G..:....|" -peer0.org1.example.com | "2019-05-02 01:31:12.862 UTC [msp.identity] Verify -> DEBU 1fae Verify: sig = 00000000 30 45 02 21 00 ef 77 a7 42 2b 29 06 d4 8d ea 3b |0E.!..w.B+)....;| -peer0.org1.example.com | 00000010 3a ca 6f 56 44 0c 1c 67 9f 1d e1 d8 53 2e 31 10 |:.oVD..g....S.1.| -peer0.org1.example.com | 00000020 fb 6f b4 0b e5 02 20 60 d0 d3 06 93 7e 55 aa 38 |.o.... `....~U.8| -peer0.org1.example.com | 00000030 b3 a4 13 35 0f b7 5d 97 cc a8 8f 1b 46 15 4f 0c |...5..].....F.O.| -peer0.org1.example.com | 00000040 0d f0 9d 93 08 97 3b |......;|" -peer0.org1.example.com | "2019-05-02 01:31:12.863 UTC [msp.identity] Verify -> DEBU 1faf Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -peer0.org1.example.com | 00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -peer0.org1.example.com | "2019-05-02 01:31:12.864 UTC [gossip.comm] func1 -> DEBU 1fb0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.865 UTC [msp.identity] Verify -> DEBU 1fb1 Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -peer0.org1.example.com | 00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -peer0.org1.example.com | 00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -peer0.org1.example.com | 00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -peer0.org1.example.com | 00000040 23 02 f1 51 98 85 fe |#..Q...|" -peer0.org1.example.com | "2019-05-02 01:31:12.866 UTC [msp] DeserializeIdentity -> DEBU 1fb2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.866 UTC [msp] DeserializeIdentity -> DEBU 1fb3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.866 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fb4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:12.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.866 UTC [policies] Evaluate -> DEBU 1fb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.867 UTC [policies] Evaluate -> DEBU 1fb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:12.867 UTC [policies] Evaluate -> DEBU 1fb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.867 UTC [cauthdsl] func1 -> DEBU 1fba 0xc003044c20 gate 1556760672867748900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:12.867 UTC [cauthdsl] func2 -> DEBU 1fbb 0xc003044c20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:12.867 UTC [cauthdsl] func2 -> DEBU 1fbc 0xc003044c20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:12.868 UTC [cauthdsl] func2 -> DEBU 1fbd 0xc003044c20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.868 UTC [msp.identity] Verify -> DEBU 1fbe Verify: digest = 00000000 f5 84 fc 53 b8 bc 29 6c 8d 44 e3 b7 42 34 00 a8 |...S..)l.D..B4..| -peer0.org1.example.com | 00000010 0c dc ce 7d c1 c2 dc 95 95 05 62 fc 36 3f c1 91 |...}......b.6?..|" -peer0.org1.example.com | "2019-05-02 01:31:12.868 UTC [msp.identity] Verify -> DEBU 1fbf Verify: sig = 00000000 30 44 02 20 1f 6f f9 d2 72 02 ca 23 0a 4d 06 bd |0D. .o..r..#.M..| -peer0.org1.example.com | 00000010 99 74 a4 2c 28 6a 0a 4e df 05 22 60 b5 09 fd 9a |.t.,(j.N.."`....| -peer0.org1.example.com | 00000020 b0 e4 7f 15 02 20 7c 49 fc d6 86 22 76 a5 d3 6f |..... |I..."v..o| -peer0.org1.example.com | 00000030 d8 74 f9 56 85 ac 3b 84 f5 c5 38 e7 da cc 12 7a |.t.V..;...8....z| -peer0.org1.example.com | 00000040 85 81 04 5d d5 23 |...].#|" -peer0.org1.example.com | "2019-05-02 01:31:12.869 UTC [cauthdsl] func2 -> DEBU 1fc0 0xc003044c20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.869 UTC [cauthdsl] func1 -> DEBU 1fc1 0xc003044c20 gate 1556760672867748900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:12.869 UTC [policies] Evaluate -> DEBU 1fc2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.869 UTC [policies] Evaluate -> DEBU 1fc3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.869 UTC [policies] Evaluate -> DEBU 1fc4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.870 UTC [policies] Evaluate -> DEBU 1fc5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.870 UTC [msp] DeserializeIdentity -> DEBU 1fc6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.871 UTC [msp] DeserializeIdentity -> DEBU 1fc7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fc8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:12.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fc9 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fca Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.872 UTC [policies] Evaluate -> DEBU 1fcb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.872 UTC [policies] Evaluate -> DEBU 1fcc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:12.873 UTC [policies] Evaluate -> DEBU 1fcd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.873 UTC [cauthdsl] func1 -> DEBU 1fce 0xc003022410 gate 1556760672873286200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:12.873 UTC [cauthdsl] func2 -> DEBU 1fcf 0xc003022410 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:12.873 UTC [cauthdsl] func2 -> DEBU 1fd0 0xc003022410 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:12.874 UTC [cauthdsl] func2 -> DEBU 1fd1 0xc003022410 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.874 UTC [msp.identity] Verify -> DEBU 1fd2 Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -peer0.org1.example.com | 00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -peer0.org1.example.com | "2019-05-02 01:31:12.874 UTC [msp.identity] Verify -> DEBU 1fd3 Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -peer0.org1.example.com | 00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -peer0.org1.example.com | 00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -peer0.org1.example.com | 00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -peer0.org1.example.com | 00000040 f7 8f 39 95 02 eb |..9...|" -peer0.org1.example.com | "2019-05-02 01:31:12.875 UTC [cauthdsl] func2 -> DEBU 1fd4 0xc003022410 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.875 UTC [cauthdsl] func1 -> DEBU 1fd5 0xc003022410 gate 1556760672873286200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:12.875 UTC [policies] Evaluate -> DEBU 1fd6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.875 UTC [policies] Evaluate -> DEBU 1fd7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.876 UTC [policies] Evaluate -> DEBU 1fd8 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.876 UTC [policies] Evaluate -> DEBU 1fd9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.876 UTC [msp] DeserializeIdentity -> DEBU 1fda Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.876 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fdb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.876 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fdc Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:12.876 UTC [policies] Evaluate -> DEBU 1fdd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.877 UTC [policies] Evaluate -> DEBU 1fde This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:12.877 UTC [policies] Evaluate -> DEBU 1fdf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:12.877 UTC [cauthdsl] func1 -> DEBU 1fe0 0xc003023610 gate 1556760672877326400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:12.877 UTC [cauthdsl] func2 -> DEBU 1fe1 0xc003023610 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:12.877 UTC [cauthdsl] func2 -> DEBU 1fe2 0xc003023610 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:12.877 UTC [cauthdsl] func2 -> DEBU 1fe3 0xc003023610 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.877 UTC [msp.identity] Verify -> DEBU 1fe4 Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -peer0.org1.example.com | 00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -peer0.org1.example.com | "2019-05-02 01:31:12.877 UTC [msp.identity] Verify -> DEBU 1fe5 Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -peer0.org1.example.com | 00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -peer0.org1.example.com | 00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -peer0.org1.example.com | 00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -peer0.org1.example.com | 00000040 f7 8f 39 95 02 eb |..9...|" -peer0.org1.example.com | "2019-05-02 01:31:12.878 UTC [cauthdsl] func2 -> DEBU 1fe6 0xc003023610 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:12.878 UTC [cauthdsl] func1 -> DEBU 1fe7 0xc003023610 gate 1556760672877326400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:12.878 UTC [policies] Evaluate -> DEBU 1fe8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.878 UTC [policies] Evaluate -> DEBU 1fe9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.879 UTC [policies] Evaluate -> DEBU 1fea Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.879 UTC [policies] Evaluate -> DEBU 1feb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:12.879 UTC [gossip.gossip] handleMessage -> DEBU 1fec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.879 UTC [gossip.gossip] handleMessage -> DEBU 1fed Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.879 UTC [msp.identity] Verify -> DEBU 1fee Verify: digest = 00000000 fc ff 39 04 73 5f f2 e7 22 8c 8d 03 43 80 10 39 |..9.s_.."...C..9| -peer0.org1.example.com | 00000010 39 de 51 1a 50 4b 65 5f ca e2 8f 95 ab b2 6a 11 |9.Q.PKe_......j.|" -peer0.org1.example.com | "2019-05-02 01:31:12.880 UTC [msp.identity] Verify -> DEBU 1fef Verify: sig = 00000000 30 44 02 20 31 63 e7 d7 ca 29 06 4b 0c b8 2f d3 |0D. 1c...).K../.| -peer0.org1.example.com | 00000010 cf 33 24 de af a1 d9 80 f5 d6 88 2b be 6e 9b d6 |.3$........+.n..| -peer0.org1.example.com | 00000020 02 56 c7 d3 02 20 37 96 4f d3 5d 67 35 f9 62 31 |.V... 7.O.]g5.b1| -peer0.org1.example.com | 00000030 4e a5 a9 f8 41 75 9e 28 28 65 7f 20 73 9f 6e ce |N...Au.((e. s.n.| -peer0.org1.example.com | 00000040 89 1e b4 1b 9d da |......|" -peer0.org1.example.com | "2019-05-02 01:31:12.881 UTC [msp] DeserializeIdentity -> DEBU 1ff0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.881 UTC [gossip.gossip] handleMessage -> DEBU 1ff1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.914 UTC [msp] DeserializeIdentity -> DEBU 1ff2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.915 UTC [msp] DeserializeIdentity -> DEBU 1ff3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.915 UTC [gossip.pull] Hello -> DEBU 1ff4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:12.916 UTC [msp] DeserializeIdentity -> DEBU 1ff5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.917 UTC [msp] DeserializeIdentity -> DEBU 1ff6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:12.917 UTC [gossip.comm] Send -> DEBU 1ff7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:12.918 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.918 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:12.920 UTC [gossip.gossip] handleMessage -> DEBU 1ffa Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10850537468822102772 , Msg_type: BLOCK_MSG, digests: [4 5 6 1 2 3], Envelope: 52 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.920 UTC [gossip.pull] HandleMessage -> DEBU 1ffb GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10850537468822102772 , Msg_type: BLOCK_MSG, digests: [4 5 6 1 2 3], Envelope: 52 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:12.920 UTC [gossip.gossip] handleMessage -> DEBU 1ffc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.097 UTC [gossip.gossip] handleMessage -> DEBU 1ffd Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.098 UTC [msp] DeserializeIdentity -> DEBU 1ffe Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.098 UTC [msp] DeserializeIdentity -> DEBU 1fff Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.098 UTC [gossip.gossip] handleMessage -> DEBU 2000 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.098 UTC [gossip.gossip] handleMessage -> DEBU 2001 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760671488233600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.098 UTC [msp.identity] Verify -> DEBU 2002 Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -peer0.org1.example.com | 00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -peer0.org1.example.com | "2019-05-02 01:31:13.098 UTC [msp.identity] Verify -> DEBU 2003 Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -peer0.org1.example.com | 00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -peer0.org1.example.com | 00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -peer0.org1.example.com | 00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -peer0.org1.example.com | 00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -peer0.org1.example.com | "2019-05-02 01:31:13.099 UTC [gossip.gossip] handleMessage -> DEBU 2004 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.106 UTC [gossip.comm] func1 -> DEBU 2005 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760671488233600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.107 UTC [gossip.gossip] handleMessage -> DEBU 2007 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760671488233600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.106 UTC [gossip.comm] func1 -> DEBU 2006 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760671488233600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.109 UTC [msp.identity] Verify -> DEBU 2008 Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -peer0.org1.example.com | 00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -peer0.org1.example.com | "2019-05-02 01:31:13.112 UTC [msp.identity] Verify -> DEBU 2009 Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -peer0.org1.example.com | 00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -peer0.org1.example.com | 00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -peer0.org1.example.com | 00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -peer0.org1.example.com | 00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -peer0.org1.example.com | "2019-05-02 01:31:13.112 UTC [msp] DeserializeIdentity -> DEBU 200a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.113 UTC [gossip.gossip] handleMessage -> DEBU 200b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.113 UTC [gossip.gossip] handleMessage -> DEBU 200c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760671488233600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.114 UTC [msp.identity] Verify -> DEBU 200d Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -peer0.org1.example.com | 00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -peer0.org1.example.com | "2019-05-02 01:31:13.114 UTC [msp.identity] Verify -> DEBU 200e Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -peer0.org1.example.com | 00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -peer0.org1.example.com | 00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -peer0.org1.example.com | 00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -peer0.org1.example.com | 00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -peer0.org1.example.com | "2019-05-02 01:31:13.115 UTC [msp] DeserializeIdentity -> DEBU 200f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.115 UTC [gossip.gossip] handleMessage -> DEBU 2010 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.117 UTC [gossip.gossip] handleMessage -> DEBU 2011 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.118 UTC [gossip.pull] HandleMessage -> DEBU 2012 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.118 UTC [gossip.pull] SendDigest -> DEBU 2013 Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:13.118 UTC [gossip.gossip] handleMessage -> DEBU 2014 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.320 UTC [gossip.comm] func1 -> DEBU 2015 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.320 UTC [gossip.gossip] handleMessage -> DEBU 2016 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.320 UTC [msp] DeserializeIdentity -> DEBU 2017 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.321 UTC [msp] DeserializeIdentity -> DEBU 2018 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.321 UTC [msp] DeserializeIdentity -> DEBU 2019 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.321 UTC [gossip.gossip] handleMessage -> DEBU 201a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.322 UTC [gossip.comm] func1 -> DEBU 201b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760671474447300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.322 UTC [gossip.gossip] handleMessage -> DEBU 201c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760671474447300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.323 UTC [msp] DeserializeIdentity -> DEBU 201d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.323 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 201e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:13.323 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.324 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2020 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.324 UTC [policies] Evaluate -> DEBU 2021 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.324 UTC [policies] Evaluate -> DEBU 2022 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:13.324 UTC [policies] Evaluate -> DEBU 2023 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.325 UTC [cauthdsl] func1 -> DEBU 2024 0xc002e8c090 gate 1556760673325100000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:13.325 UTC [cauthdsl] func2 -> DEBU 2025 0xc002e8c090 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:13.325 UTC [cauthdsl] func2 -> DEBU 2026 0xc002e8c090 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:13.325 UTC [cauthdsl] func2 -> DEBU 2027 0xc002e8c090 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.326 UTC [msp.identity] Verify -> DEBU 2028 Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -peer0.org1.example.com | 00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -peer0.org1.example.com | "2019-05-02 01:31:13.326 UTC [msp.identity] Verify -> DEBU 2029 Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -peer0.org1.example.com | 00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -peer0.org1.example.com | 00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -peer0.org1.example.com | 00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -peer0.org1.example.com | 00000040 f7 8f 39 95 02 eb |..9...|" -peer0.org1.example.com | "2019-05-02 01:31:13.327 UTC [cauthdsl] func2 -> DEBU 202a 0xc002e8c090 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.327 UTC [cauthdsl] func1 -> DEBU 202b 0xc002e8c090 gate 1556760673325100000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:13.328 UTC [policies] Evaluate -> DEBU 202c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.328 UTC [policies] Evaluate -> DEBU 202d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.328 UTC [policies] Evaluate -> DEBU 202e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.328 UTC [policies] Evaluate -> DEBU 202f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.329 UTC [msp] DeserializeIdentity -> DEBU 2030 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.329 UTC [gossip.gossip] handleMessage -> DEBU 2031 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.331 UTC [gossip.comm] func1 -> DEBU 2032 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760671474447300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.332 UTC [gossip.gossip] handleMessage -> DEBU 2033 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760671474447300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.332 UTC [msp] DeserializeIdentity -> DEBU 2034 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2035 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2036 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2037 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2038 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2039 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 203a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [cauthdsl] func1 -> DEBU 203b 0xc002e8dcb0 gate 1556760673333332600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [cauthdsl] func2 -> DEBU 203c 0xc002e8dcb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [cauthdsl] func2 -> DEBU 203d 0xc002e8dcb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [cauthdsl] func2 -> DEBU 203e 0xc002e8dcb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [msp.identity] Verify -> DEBU 203f Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -peer0.org1.example.com | 00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [msp.identity] Verify -> DEBU 2040 Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -peer0.org1.example.com | 00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -peer0.org1.example.com | 00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -peer0.org1.example.com | 00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -peer0.org1.example.com | 00000040 f7 8f 39 95 02 eb |..9...|" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [cauthdsl] func2 -> DEBU 2041 0xc002e8dcb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [cauthdsl] func1 -> DEBU 2042 0xc002e8dcb0 gate 1556760673333332600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2043 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2044 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2045 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2046 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [msp] DeserializeIdentity -> DEBU 2047 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.333 UTC [gossip.gossip] handleMessage -> DEBU 2048 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.433 UTC [gossip.gossip] handleMessage -> DEBU 2049 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.433 UTC [gossip.pull] HandleMessage -> DEBU 204a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.433 UTC [gossip.pull] SendDigest -> DEBU 204b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:13.434 UTC [gossip.gossip] handleMessage -> DEBU 204c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.440 UTC [gossip.gossip] handleMessage -> DEBU 204d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.445 UTC [gossip.gossip] handleMessage -> DEBU 204e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.445 UTC [gossip.discovery] handleMsgFromComm -> DEBU 204f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.445 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2050 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:13.445 UTC [gossip.gossip] handleMessage -> DEBU 2051 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.446 UTC [msp.identity] Verify -> DEBU 2052 Verify: digest = 00000000 06 d9 05 cb ce 01 38 8c 0d 46 49 1d 16 e0 00 be |......8..FI.....| -peer0.org1.example.com | 00000010 6e a4 dc aa 90 02 a2 e2 3e df 43 7e e2 9f 57 34 |n.......>.C~..W4|" -peer0.org1.example.com | "2019-05-02 01:31:13.446 UTC [msp.identity] Verify -> DEBU 2053 Verify: sig = 00000000 30 44 02 20 62 37 8f 99 35 96 16 a4 4d 21 d7 0b |0D. b7..5...M!..| -peer0.org1.example.com | 00000010 f9 2e 19 cd 16 de c2 ce b0 38 34 20 6e 80 a8 3b |.........84 n..;| -peer0.org1.example.com | 00000020 fa fe 10 ce 02 20 77 1c 74 82 e5 0c 78 91 d4 64 |..... w.t...x..d| -peer0.org1.example.com | 00000030 d7 cc cd bd 87 2a 4c f4 22 cc 40 0d f4 42 da 3d |.....*L.".@..B.=| -peer0.org1.example.com | 00000040 7a 25 08 c2 40 06 |z%..@.|" -peer0.org1.example.com | "2019-05-02 01:31:13.447 UTC [msp.identity] Verify -> DEBU 2054 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:13.447 UTC [msp.identity] Verify -> DEBU 2055 Verify: sig = 00000000 30 45 02 21 00 bc df a2 79 3c 55 97 c7 64 d3 06 |0E.!....y DEBU 2056 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.448 UTC [gossip.discovery] learnExistingMembers -> DEBU 2057 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:13.449 UTC [gossip.comm] func1 -> DEBU 2059 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 2058 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 " -peer0.org1.example.com | "2019-05-02 01:31:13.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 205a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 " -peer0.org1.example.com | "2019-05-02 01:31:13.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 205b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:13.450 UTC [gossip.discovery] learnExistingMembers -> DEBU 205c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.450 UTC [gossip.discovery] handleAliveMessage -> DEBU 205d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.450 UTC [gossip.discovery] handleMsgFromComm -> DEBU 205e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 205f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.451 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2061 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:13.451 UTC [gossip.gossip] handleMessage -> DEBU 2060 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.452 UTC [gossip.gossip] handleMessage -> DEBU 2063 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.452 UTC [msp.identity] Verify -> DEBU 2062 Verify: digest = 00000000 2a d2 6f 73 5c ab 32 00 41 1b 66 19 ac c9 8f 19 |*.os\.2.A.f.....| -peer0.org1.example.com | 00000010 29 a6 06 4f b7 3f 4a f6 3a 85 f9 ed 1b e5 dc 75 |)..O.?J.:......u|" -peer0.org1.example.com | "2019-05-02 01:31:13.452 UTC [msp.identity] Verify -> DEBU 2064 Verify: sig = 00000000 30 44 02 20 41 b3 28 68 52 5d fc da c2 cf 60 25 |0D. A.(hR]....`%| -peer0.org1.example.com | 00000010 6a 93 c3 63 6b f0 f8 16 f5 53 85 5e 79 3f 53 28 |j..ck....S.^y?S(| -peer0.org1.example.com | 00000020 90 ef 82 9a 02 20 6a e8 b9 cf 84 b5 1f 58 f8 15 |..... j......X..| -peer0.org1.example.com | 00000030 0d 10 12 c6 fb ea ca f0 b0 51 a0 db 5f 6e 94 47 |.........Q.._n.G| -peer0.org1.example.com | 00000040 14 38 d2 00 7f 3b |.8...;|" -peer0.org1.example.com | "2019-05-02 01:31:13.452 UTC [msp.identity] Verify -> DEBU 2065 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:13.452 UTC [msp.identity] Verify -> DEBU 2066 Verify: sig = 00000000 30 45 02 21 00 9e 28 8b 0f 39 cf af 10 8d 10 ec |0E.!..(..9......| -peer0.org1.example.com | 00000010 ca f3 c9 dc 21 05 7c bb 1c 1a 15 c4 c1 0a 0d 6b |....!.|........k| -peer0.org1.example.com | 00000020 a5 af 0c f5 34 02 20 6f 83 29 12 c9 17 81 cf 1d |....4. o.)......| -peer0.org1.example.com | 00000030 e8 d7 2b e4 c8 03 ea 1d 74 55 38 fa ad e4 06 f1 |..+.....tU8.....| -peer0.org1.example.com | 00000040 01 2c 3a 1c d8 f7 32 |.,:...2|" -peer0.org1.example.com | "2019-05-02 01:31:13.453 UTC [gossip.discovery] handleAliveMessage -> DEBU 2067 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.453 UTC [gossip.discovery] learnExistingMembers -> DEBU 2068 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:13.453 UTC [gossip.discovery] learnExistingMembers -> DEBU 2069 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 " -peer0.org1.example.com | "2019-05-02 01:31:13.453 UTC [gossip.discovery] learnExistingMembers -> DEBU 206a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 " -peer0.org1.example.com | "2019-05-02 01:31:13.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 206b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:13.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 206c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.456 UTC [gossip.discovery] handleAliveMessage -> DEBU 206d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.456 UTC [gossip.discovery] handleMsgFromComm -> DEBU 206e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.456 UTC [gossip.discovery] handleMsgFromComm -> DEBU 206f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2070 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.457 UTC [gossip.gossip] handleMessage -> DEBU 2071 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.457 UTC [gossip.discovery] sendMemResponse -> DEBU 2072 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:13.457 UTC [msp] DeserializeIdentity -> DEBU 2073 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.457 UTC [msp] DeserializeIdentity -> DEBU 2074 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.457 UTC [gossip.comm] Send -> DEBU 2075 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.457 UTC [gossip.discovery] sendMemResponse -> DEBU 2077 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:13.457 UTC [gossip.comm] sendToEndpoint -> DEBU 2078 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.457 UTC [gossip.comm] sendToEndpoint -> DEBU 2079 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.457 UTC [msp] DeserializeIdentity -> DEBU 2076 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.458 UTC [msp] DeserializeIdentity -> DEBU 207a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.459 UTC [msp] DeserializeIdentity -> DEBU 207b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.459 UTC [gossip.comm] Send -> DEBU 207c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.460 UTC [msp] DeserializeIdentity -> DEBU 207d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.460 UTC [gossip.comm] Send -> DEBU 207f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.461 UTC [gossip.comm] sendToEndpoint -> DEBU 2080 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.460 UTC [gossip.comm] sendToEndpoint -> DEBU 207e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.461 UTC [gossip.comm] func1 -> DEBU 2081 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.462 UTC [gossip.comm] sendToEndpoint -> DEBU 2082 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.463 UTC [gossip.gossip] handleMessage -> DEBU 2083 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.463 UTC [gossip.gossip] handleMessage -> DEBU 2084 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.463 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2085 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.463 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2086 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.463 UTC [gossip.comm] sendToEndpoint -> DEBU 2087 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.506 UTC [gossip.comm] func1 -> DEBU 2088 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.506 UTC [gossip.gossip] handleMessage -> DEBU 2089 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.506 UTC [gossip.gossip] handleMessage -> DEBU 208a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.507 UTC [gossip.discovery] handleMsgFromComm -> DEBU 208b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.507 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 208c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:13.507 UTC [msp] DeserializeIdentity -> DEBU 208d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.507 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 208e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:13.507 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2090 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.508 UTC [policies] Evaluate -> DEBU 2091 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.508 UTC [policies] Evaluate -> DEBU 2092 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:13.508 UTC [policies] Evaluate -> DEBU 2093 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.508 UTC [cauthdsl] func1 -> DEBU 2094 0xc002db5270 gate 1556760673508763300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:13.509 UTC [cauthdsl] func2 -> DEBU 2095 0xc002db5270 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:13.509 UTC [cauthdsl] func2 -> DEBU 2096 0xc002db5270 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:13.509 UTC [cauthdsl] func2 -> DEBU 2097 0xc002db5270 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.509 UTC [msp.identity] Verify -> DEBU 2098 Verify: digest = 00000000 50 31 ac 81 57 53 76 08 44 15 f5 c3 2b d3 d0 14 |P1..WSv.D...+...| -peer0.org1.example.com | 00000010 7f 57 d7 e6 42 61 13 32 25 ab ed 0b f0 b0 63 c9 |.W..Ba.2%.....c.|" -peer0.org1.example.com | "2019-05-02 01:31:13.509 UTC [msp.identity] Verify -> DEBU 2099 Verify: sig = 00000000 30 45 02 21 00 d7 18 17 3d 90 54 d3 07 98 47 cd |0E.!....=.T...G.| -peer0.org1.example.com | 00000010 2d 33 2b f4 67 3e ac 9e 99 b6 1d 88 4b 5e 91 9b |-3+.g>......K^..| -peer0.org1.example.com | 00000020 4c 66 9b 73 25 02 20 0a 44 79 f6 24 ac 41 f7 62 |Lf.s%. .Dy.$.A.b| -peer0.org1.example.com | 00000030 12 50 3d 0c 78 42 3c 81 87 5e 73 58 29 c9 7a fa |.P=.xB<..^sX).z.| -peer0.org1.example.com | 00000040 34 5d 76 ae e6 b3 cd |4]v....|" -peer0.org1.example.com | "2019-05-02 01:31:13.509 UTC [cauthdsl] func2 -> DEBU 209a 0xc002db5270 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.509 UTC [cauthdsl] func1 -> DEBU 209b 0xc002db5270 gate 1556760673508763300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:13.509 UTC [policies] Evaluate -> DEBU 209c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.509 UTC [policies] Evaluate -> DEBU 209d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.510 UTC [policies] Evaluate -> DEBU 209e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.510 UTC [policies] Evaluate -> DEBU 209f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.510 UTC [gossip.discovery] handleAliveMessage -> DEBU 20a0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.510 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:13.510 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a2 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 " -peer0.org1.example.com | "2019-05-02 01:31:13.510 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a3 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 " -peer0.org1.example.com | "2019-05-02 01:31:13.510 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:13.510 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.511 UTC [gossip.discovery] handleAliveMessage -> DEBU 20a6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.511 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20a7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.513 UTC [gossip.comm] func1 -> DEBU 20a8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.513 UTC [gossip.gossip] handleMessage -> DEBU 20a9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.513 UTC [gossip.gossip] handleMessage -> DEBU 20aa Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.515 UTC [gossip.gossip] handleMessage -> DEBU 20ab Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.513 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ad Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20af Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.516 UTC [gossip.gossip] handleMessage -> DEBU 20b0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.517 UTC [gossip.comm] func1 -> DEBU 20b1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.517 UTC [gossip.gossip] handleMessage -> DEBU 20b2 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.517 UTC [gossip.pull] HandleMessage -> DEBU 20b3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.517 UTC [msp] DeserializeIdentity -> DEBU 20b4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.518 UTC [msp] DeserializeIdentity -> DEBU 20b5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.518 UTC [msp] DeserializeIdentity -> DEBU 20b6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.518 UTC [msp] DeserializeIdentity -> DEBU 20b7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.518 UTC [msp] DeserializeIdentity -> DEBU 20b8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.518 UTC [msp] DeserializeIdentity -> DEBU 20b9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.518 UTC [gossip.pull] SendDigest -> DEBU 20ba Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:13.518 UTC [gossip.gossip] handleMessage -> DEBU 20bb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.519 UTC [msp] DeserializeIdentity -> DEBU 20bc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.519 UTC [msp] DeserializeIdentity -> DEBU 20bd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.519 UTC [msp] DeserializeIdentity -> DEBU 20be Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.519 UTC [msp] DeserializeIdentity -> DEBU 20bf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.520 UTC [msp] DeserializeIdentity -> DEBU 20c0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.520 UTC [msp] DeserializeIdentity -> DEBU 20c1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.520 UTC [msp] DeserializeIdentity -> DEBU 20c2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.520 UTC [gossip.comm] Send -> DEBU 20c3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.520 UTC [msp] DeserializeIdentity -> DEBU 20c4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.520 UTC [gossip.comm] Send -> DEBU 20c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.520 UTC [gossip.comm] sendToEndpoint -> DEBU 20c6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.520 UTC [gossip.comm] sendToEndpoint -> DEBU 20c7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.521 UTC [gossip.comm] sendToEndpoint -> DEBU 20c8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.521 UTC [gossip.comm] sendToEndpoint -> DEBU 20c9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.525 UTC [gossip.comm] func1 -> DEBU 20ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.525 UTC [gossip.gossip] handleMessage -> DEBU 20cb Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.526 UTC [gossip.gossip] handleMessage -> DEBU 20cc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20cd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.527 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20ce Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:13.527 UTC [msp] DeserializeIdentity -> DEBU 20cf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20d0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:13.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20d1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20d2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.529 UTC [policies] Evaluate -> DEBU 20d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.529 UTC [policies] Evaluate -> DEBU 20d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:13.530 UTC [policies] Evaluate -> DEBU 20d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.530 UTC [cauthdsl] func1 -> DEBU 20d6 0xc002deb930 gate 1556760673530685400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:13.531 UTC [cauthdsl] func2 -> DEBU 20d7 0xc002deb930 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:13.531 UTC [cauthdsl] func2 -> DEBU 20d8 0xc002deb930 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:13.532 UTC [cauthdsl] func2 -> DEBU 20d9 0xc002deb930 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.533 UTC [msp.identity] Verify -> DEBU 20da Verify: digest = 00000000 9c 7c a2 be 2f cf 37 34 98 b4 48 ca 47 25 b4 ab |.|../.74..H.G%..| -peer0.org1.example.com | 00000010 9f a6 ca db ae 91 58 d6 72 5f bc 3f eb 73 32 44 |......X.r_.?.s2D|" -peer0.org1.example.com | "2019-05-02 01:31:13.533 UTC [msp.identity] Verify -> DEBU 20db Verify: sig = 00000000 30 44 02 20 72 12 e4 3a 8a 16 21 98 0c 7e f8 8d |0D. r..:..!..~..| -peer0.org1.example.com | 00000010 75 54 51 c6 b2 cc 13 1a ba bf c2 7c 87 db b8 98 |uTQ........|....| -peer0.org1.example.com | 00000020 17 78 3a 9c 02 20 2b 75 1a b2 7f 3b 75 ad 4f e5 |.x:.. +u...;u.O.| -peer0.org1.example.com | 00000030 4d 21 c1 19 fd e6 d9 69 e3 c9 f6 0d 0e eb 1a c0 |M!.....i........| -peer0.org1.example.com | 00000040 b1 86 44 8b 96 ff |..D...|" -peer0.org1.example.com | "2019-05-02 01:31:13.534 UTC [cauthdsl] func2 -> DEBU 20dc 0xc002deb930 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.534 UTC [cauthdsl] func1 -> DEBU 20dd 0xc002deb930 gate 1556760673530685400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:13.535 UTC [policies] Evaluate -> DEBU 20de Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.535 UTC [policies] Evaluate -> DEBU 20df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.536 UTC [policies] Evaluate -> DEBU 20e0 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.536 UTC [policies] Evaluate -> DEBU 20e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.537 UTC [gossip.discovery] handleAliveMessage -> DEBU 20e2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:13.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e4 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 " -peer0.org1.example.com | "2019-05-02 01:31:13.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e5 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 " -peer0.org1.example.com | "2019-05-02 01:31:13.539 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:13.539 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 20e8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20e9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.554 UTC [gossip.discovery] sendMemResponse -> DEBU 20ea Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:13.558 UTC [msp] DeserializeIdentity -> DEBU 20eb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.559 UTC [msp] DeserializeIdentity -> DEBU 20ec Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.561 UTC [msp] DeserializeIdentity -> DEBU 20ed Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.568 UTC [gossip.comm] Send -> DEBU 20ee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.569 UTC [gossip.comm] sendToEndpoint -> DEBU 20ef Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.569 UTC [gossip.discovery] sendMemResponse -> DEBU 20f0 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:13.569 UTC [gossip.comm] sendToEndpoint -> DEBU 20f1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.587 UTC [gossip.comm] func1 -> DEBU 20f2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.587 UTC [gossip.gossip] handleMessage -> DEBU 20f3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.587 UTC [msp] DeserializeIdentity -> DEBU 20f4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.587 UTC [msp] DeserializeIdentity -> DEBU 20f5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.587 UTC [msp] DeserializeIdentity -> DEBU 20f6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.588 UTC [gossip.gossip] handleMessage -> DEBU 20f7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.592 UTC [gossip.comm] func1 -> DEBU 20f8 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760671478384500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.593 UTC [gossip.gossip] handleMessage -> DEBU 20f9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760671478384500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.593 UTC [msp] DeserializeIdentity -> DEBU 20fa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.593 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:13.593 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20fc Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.593 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20fd Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.593 UTC [policies] Evaluate -> DEBU 20fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.593 UTC [policies] Evaluate -> DEBU 20ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:13.593 UTC [policies] Evaluate -> DEBU 2100 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.594 UTC [cauthdsl] func1 -> DEBU 2101 0xc002d5fcf0 gate 1556760673594144300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:13.594 UTC [cauthdsl] func2 -> DEBU 2102 0xc002d5fcf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:13.594 UTC [cauthdsl] func2 -> DEBU 2103 0xc002d5fcf0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:13.594 UTC [cauthdsl] func2 -> DEBU 2104 0xc002d5fcf0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.594 UTC [msp.identity] Verify -> DEBU 2105 Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -peer0.org1.example.com | 00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -peer0.org1.example.com | "2019-05-02 01:31:13.594 UTC [msp.identity] Verify -> DEBU 2106 Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -peer0.org1.example.com | 00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -peer0.org1.example.com | 00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -peer0.org1.example.com | 00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -peer0.org1.example.com | 00000040 d4 55 93 6a 4b 9f |.U.jK.|" -peer0.org1.example.com | "2019-05-02 01:31:13.595 UTC [cauthdsl] func2 -> DEBU 2107 0xc002d5fcf0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.595 UTC [cauthdsl] func1 -> DEBU 2108 0xc002d5fcf0 gate 1556760673594144300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:13.595 UTC [policies] Evaluate -> DEBU 2109 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.595 UTC [policies] Evaluate -> DEBU 210a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.595 UTC [policies] Evaluate -> DEBU 210b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.595 UTC [policies] Evaluate -> DEBU 210c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.596 UTC [msp] DeserializeIdentity -> DEBU 210d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.596 UTC [gossip.gossip] handleMessage -> DEBU 210e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.729 UTC [msp.identity] Sign -> DEBU 210f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101B " -peer0.org1.example.com | "2019-05-02 01:31:13.729 UTC [msp.identity] Sign -> DEBU 2110 Sign: digest: ED8B2481CE0E3FEE8FBB86954F3472213DDB93EF26483ABEE42B0E3263065672 " -peer0.org1.example.com | "2019-05-02 01:31:13.729 UTC [msp.identity] Sign -> DEBU 2111 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:13.730 UTC [msp.identity] Sign -> DEBU 2112 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:13.730 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2113 Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:13.740 UTC [msp] DeserializeIdentity -> DEBU 2114 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.740 UTC [msp] DeserializeIdentity -> DEBU 2115 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.742 UTC [gossip.comm] Send -> DEBU 2116 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.743 UTC [msp] DeserializeIdentity -> DEBU 2117 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.743 UTC [gossip.comm] Send -> DEBU 2118 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.743 UTC [msp] DeserializeIdentity -> DEBU 2119 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.743 UTC [gossip.comm] Send -> DEBU 211a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.743 UTC [gossip.comm] sendToEndpoint -> DEBU 211b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 211c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 211d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 211e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 211f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.746 UTC [gossip.comm] sendToEndpoint -> DEBU 2120 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.746 UTC [gossip.comm] func1 -> DEBU 2121 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.747 UTC [gossip.gossip] handleMessage -> DEBU 2122 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.747 UTC [gossip.pull] HandleMessage -> DEBU 2123 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.748 UTC [msp] DeserializeIdentity -> DEBU 2124 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.748 UTC [msp] DeserializeIdentity -> DEBU 2125 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.748 UTC [msp] DeserializeIdentity -> DEBU 2126 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.749 UTC [msp] DeserializeIdentity -> DEBU 2127 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.750 UTC [msp] DeserializeIdentity -> DEBU 2128 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.750 UTC [msp] DeserializeIdentity -> DEBU 2129 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.750 UTC [gossip.pull] SendDigest -> DEBU 212a Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:13.751 UTC [gossip.gossip] handleMessage -> DEBU 212b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.829 UTC [gossip.pull] Hello -> DEBU 212c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:13.829 UTC [gossip.comm] Send -> DEBU 212d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.830 UTC [gossip.pull] Hello -> DEBU 212e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:13.830 UTC [gossip.comm] Send -> DEBU 212f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.830 UTC [gossip.pull] Hello -> DEBU 2130 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:13.830 UTC [gossip.comm] Send -> DEBU 2131 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2134 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2135 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2132 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2136 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.832 UTC [gossip.gossip] handleMessage -> DEBU 2137 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9726439635389445848 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.832 UTC [gossip.pull] HandleMessage -> DEBU 2138 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9726439635389445848 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.832 UTC [gossip.gossip] handleMessage -> DEBU 2139 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2133 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.833 UTC [gossip.comm] sendToEndpoint -> DEBU 213a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.834 UTC [gossip.comm] func1 -> DEBU 213b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2805342653033849200 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.834 UTC [gossip.gossip] handleMessage -> DEBU 213c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2805342653033849200 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.835 UTC [gossip.pull] HandleMessage -> DEBU 213d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2805342653033849200 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.835 UTC [gossip.gossip] handleMessage -> DEBU 213e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.839 UTC [gossip.comm] func1 -> DEBU 213f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.839 UTC [gossip.gossip] handleMessage -> DEBU 2140 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.841 UTC [gossip.gossip] handleMessage -> DEBU 2141 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.841 UTC [gossip.gossip] handleMessage -> DEBU 2142 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.841 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2143 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.841 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2144 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:13.841 UTC [msp] DeserializeIdentity -> DEBU 2145 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.842 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2146 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:13.842 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2147 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.842 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2148 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.842 UTC [policies] Evaluate -> DEBU 2149 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.842 UTC [policies] Evaluate -> DEBU 214a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:13.842 UTC [policies] Evaluate -> DEBU 214b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.843 UTC [cauthdsl] func1 -> DEBU 214c 0xc002c2aa20 gate 1556760673843089800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:13.843 UTC [cauthdsl] func2 -> DEBU 214d 0xc002c2aa20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:13.843 UTC [cauthdsl] func2 -> DEBU 214e 0xc002c2aa20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:13.843 UTC [cauthdsl] func2 -> DEBU 214f 0xc002c2aa20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.844 UTC [msp.identity] Verify -> DEBU 2150 Verify: digest = 00000000 51 78 c6 fe d5 05 8a 46 cf 1b b2 b3 c2 6b 3b 51 |Qx.....F.....k;Q| -peer0.org1.example.com | 00000010 15 d6 b3 6e f6 56 76 d5 c4 53 f7 55 8e 64 d4 c8 |...n.Vv..S.U.d..|" -peer0.org1.example.com | "2019-05-02 01:31:13.844 UTC [msp.identity] Verify -> DEBU 2151 Verify: sig = 00000000 30 44 02 20 1a 80 6e 71 86 f8 27 e7 0f de b4 2c |0D. ..nq..'....,| -peer0.org1.example.com | 00000010 c6 ae 12 20 97 e1 9f 7d 8a d5 49 ce 65 64 aa 07 |... ...}..I.ed..| -peer0.org1.example.com | 00000020 eb 6f 28 73 02 20 1f b1 87 cc d5 ba 88 e4 da 92 |.o(s. ..........| -peer0.org1.example.com | 00000030 1e af f8 0f a5 4d 7a a6 ed 74 d9 cd 27 e7 0d 2c |.....Mz..t..'..,| -peer0.org1.example.com | 00000040 7a a7 31 66 66 0c |z.1ff.|" -peer0.org1.example.com | "2019-05-02 01:31:13.845 UTC [gossip.comm] func1 -> DEBU 2152 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6596337255433348617 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.845 UTC [cauthdsl] func2 -> DEBU 2153 0xc002c2aa20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.846 UTC [cauthdsl] func1 -> DEBU 2154 0xc002c2aa20 gate 1556760673843089800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:13.846 UTC [policies] Evaluate -> DEBU 2155 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.846 UTC [policies] Evaluate -> DEBU 2156 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.846 UTC [policies] Evaluate -> DEBU 2157 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.847 UTC [policies] Evaluate -> DEBU 2158 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 2159 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.847 UTC [gossip.discovery] learnExistingMembers -> DEBU 215a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:13.847 UTC [gossip.discovery] learnExistingMembers -> DEBU 215b updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 " -peer0.org1.example.com | "2019-05-02 01:31:13.848 UTC [gossip.discovery] learnExistingMembers -> DEBU 215c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 " -peer0.org1.example.com | "2019-05-02 01:31:13.848 UTC [gossip.discovery] learnExistingMembers -> DEBU 215d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:13.848 UTC [gossip.discovery] learnExistingMembers -> DEBU 215e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.849 UTC [gossip.discovery] handleAliveMessage -> DEBU 215f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2160 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2161 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2162 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.849 UTC [gossip.gossip] handleMessage -> DEBU 2163 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.850 UTC [gossip.gossip] handleMessage -> DEBU 2164 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6596337255433348617 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.850 UTC [gossip.pull] HandleMessage -> DEBU 2165 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6596337255433348617 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.850 UTC [gossip.gossip] handleMessage -> DEBU 2166 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.851 UTC [msp] DeserializeIdentity -> DEBU 2167 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.851 UTC [msp] DeserializeIdentity -> DEBU 2168 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.852 UTC [msp] DeserializeIdentity -> DEBU 2169 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.852 UTC [msp] DeserializeIdentity -> DEBU 216a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.852 UTC [msp] DeserializeIdentity -> DEBU 216b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.853 UTC [msp] DeserializeIdentity -> DEBU 216c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.853 UTC [msp] DeserializeIdentity -> DEBU 216d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.854 UTC [gossip.comm] Send -> DEBU 216e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.854 UTC [msp] DeserializeIdentity -> DEBU 216f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.854 UTC [gossip.comm] sendToEndpoint -> DEBU 2170 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.854 UTC [gossip.comm] sendToEndpoint -> DEBU 2171 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.855 UTC [gossip.comm] Send -> DEBU 2172 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.855 UTC [gossip.comm] sendToEndpoint -> DEBU 2173 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.855 UTC [gossip.comm] sendToEndpoint -> DEBU 2174 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.857 UTC [gossip.comm] func1 -> DEBU 2175 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.858 UTC [gossip.gossip] handleMessage -> DEBU 2176 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.858 UTC [gossip.gossip] handleMessage -> DEBU 2177 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2178 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2179 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [gossip.comm] func1 -> DEBU 217a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [gossip.gossip] handleMessage -> DEBU 217b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [gossip.gossip] handleMessage -> DEBU 217c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 217d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 217e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [msp] DeserializeIdentity -> DEBU 217f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2180 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2181 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2182 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [policies] Evaluate -> DEBU 2183 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.898 UTC [policies] Evaluate -> DEBU 2184 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [policies] Evaluate -> DEBU 2185 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [cauthdsl] func1 -> DEBU 2186 0xc0027ed100 gate 1556760673899066900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [cauthdsl] func2 -> DEBU 2187 0xc0027ed100 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [cauthdsl] func2 -> DEBU 2188 0xc0027ed100 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [cauthdsl] func2 -> DEBU 2189 0xc0027ed100 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [msp.identity] Verify -> DEBU 218a Verify: digest = 00000000 c8 5f 9e 2c e9 fd 7e af b0 f2 ea 78 d4 7d ca 0f |._.,..~....x.}..| -peer0.org1.example.com | 00000010 b2 ba 71 2f 39 1b 46 b3 ec 92 a3 a0 ac 56 4d c1 |..q/9.F......VM.|" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [msp.identity] Verify -> DEBU 218b Verify: sig = 00000000 30 44 02 20 0a 80 a0 a8 de b6 72 d6 a6 41 b5 c5 |0D. ......r..A..| -peer0.org1.example.com | 00000010 ea d9 bb 83 c7 85 a0 d9 e4 80 fd a5 a3 06 74 7d |..............t}| -peer0.org1.example.com | 00000020 35 55 d4 92 02 20 1c ca 29 2d e4 47 cb 3f 29 67 |5U... ..)-.G.?)g| -peer0.org1.example.com | 00000030 1c ee 8f c2 4d a6 7d 99 66 43 f3 fa 43 c1 7a f5 |....M.}.fC..C.z.| -peer0.org1.example.com | 00000040 40 96 fb 0f 24 7e |@...$~|" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [cauthdsl] func2 -> DEBU 218c 0xc0027ed100 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [cauthdsl] func1 -> DEBU 218d 0xc0027ed100 gate 1556760673899066900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [policies] Evaluate -> DEBU 218e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [policies] Evaluate -> DEBU 218f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [policies] Evaluate -> DEBU 2190 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [policies] Evaluate -> DEBU 2191 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [gossip.discovery] handleAliveMessage -> DEBU 2192 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [gossip.discovery] learnExistingMembers -> DEBU 2193 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [gossip.discovery] learnExistingMembers -> DEBU 2194 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 " -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [gossip.discovery] learnExistingMembers -> DEBU 2195 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 " -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [gossip.discovery] learnExistingMembers -> DEBU 2196 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:13.899 UTC [gossip.discovery] learnExistingMembers -> DEBU 2197 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 2198 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2199 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:13.900 UTC [gossip.discovery] sendMemResponse -> DEBU 219a Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:13.900 UTC [msp] DeserializeIdentity -> DEBU 219b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.900 UTC [msp] DeserializeIdentity -> DEBU 219c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.900 UTC [msp] DeserializeIdentity -> DEBU 219d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:13.900 UTC [gossip.comm] Send -> DEBU 219e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:13.900 UTC [gossip.discovery] sendMemResponse -> DEBU 219f Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:13.900 UTC [gossip.comm] sendToEndpoint -> DEBU 21a0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:13.900 UTC [gossip.comm] sendToEndpoint -> DEBU 21a1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.005 UTC [msp.identity] Sign -> DEBU 21a2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101C " -peer0.org1.example.com | "2019-05-02 01:31:14.010 UTC [msp.identity] Sign -> DEBU 21a3 Sign: digest: AA04C2178E15855EA12B2D64FD3B7EF23AF3553EA0037A583DAACC34BEE3DD0B " -peer0.org1.example.com | "2019-05-02 01:31:14.017 UTC [msp.identity] Sign -> DEBU 21a4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:14.018 UTC [msp.identity] Sign -> DEBU 21a5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:14.020 UTC [gossip.comm] Send -> DEBU 21a6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:14.025 UTC [msp] DeserializeIdentity -> DEBU 21a7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:14.028 UTC [gossip.comm] Send -> DEBU 21a8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:14.029 UTC [msp] DeserializeIdentity -> DEBU 21a9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:14.030 UTC [gossip.comm] sendToEndpoint -> DEBU 21ab Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.030 UTC [gossip.comm] sendToEndpoint -> DEBU 21ac Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 21aa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.031 UTC [gossip.comm] sendToEndpoint -> DEBU 21ad Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.034 UTC [gossip.gossip] handleMessage -> DEBU 21ae Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.034 UTC [gossip.gossip] handleMessage -> DEBU 21af Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.034 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21b1 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:14.036 UTC [msp.identity] Verify -> DEBU 21b2 Verify: digest = 00000000 aa 04 c2 17 8e 15 85 5e a1 2b 2d 64 fd 3b 7e f2 |.......^.+-d.;~.| -peer0.org1.example.com | 00000010 3a f3 55 3e a0 03 7a 58 3d aa cc 34 be e3 dd 0b |:.U>..zX=..4....|" -peer0.org1.example.com | "2019-05-02 01:31:14.037 UTC [msp.identity] Verify -> DEBU 21b3 Verify: sig = 00000000 30 45 02 21 00 cf 12 ae 0c 78 4f 13 2b d9 9a 3f |0E.!.....xO.+..?| -peer0.org1.example.com | 00000010 77 e9 33 b3 33 10 37 3f bd 61 02 4e 14 4e b2 87 |w.3.3.7?.a.N.N..| -peer0.org1.example.com | 00000020 4c 21 96 c3 8a 02 20 22 95 60 f5 87 ed 45 75 87 |L!.... ".`...Eu.| -peer0.org1.example.com | 00000030 12 15 98 13 ef b2 6c 17 0b d1 4f c9 7a 96 c9 0d |......l...O.z...| -peer0.org1.example.com | 00000040 5c 43 92 ff 84 c8 a7 |\C.....|" -peer0.org1.example.com | "2019-05-02 01:31:14.038 UTC [msp.identity] Verify -> DEBU 21b4 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:14.038 UTC [msp.identity] Verify -> DEBU 21b5 Verify: sig = 00000000 30 44 02 20 17 07 5c dc 74 e7 68 d6 31 3b 47 af |0D. ..\.t.h.1;G.| -peer0.org1.example.com | 00000010 48 a1 2f fb e8 c1 9f 54 79 e6 3a fd ef c3 2c 80 |H./....Ty.:...,.| -peer0.org1.example.com | 00000020 40 91 21 9e 02 20 62 e6 c7 19 bf b4 36 26 45 4c |@.!.. b.....6&EL| -peer0.org1.example.com | 00000030 7e f0 e1 d6 20 7b a3 3a 01 64 8d 12 80 74 75 f5 |~... {.:.d...tu.| -peer0.org1.example.com | 00000040 53 79 03 3a 01 ff |Sy.:..|" -peer0.org1.example.com | "2019-05-02 01:31:14.042 UTC [gossip.comm] Send -> DEBU 21b6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:14.061 UTC [gossip.discovery] handleAliveMessage -> DEBU 21b7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.061 UTC [gossip.discovery] isSentByMe -> DEBU 21b8 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.061 UTC [gossip.discovery] handleAliveMessage -> DEBU 21b9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.065 UTC [gossip.comm] sendToEndpoint -> DEBU 21ba Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.065 UTC [gossip.comm] sendToEndpoint -> DEBU 21bb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.066 UTC [gossip.comm] func1 -> DEBU 21bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.066 UTC [gossip.gossip] handleMessage -> DEBU 21bd Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.073 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21be Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.078 UTC [gossip.gossip] handleMessage -> DEBU 21bf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.078 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.082 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21c1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:14.082 UTC [msp] DeserializeIdentity -> DEBU 21c2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:14.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:14.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:14.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:14.083 UTC [policies] Evaluate -> DEBU 21c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:14.084 UTC [policies] Evaluate -> DEBU 21c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:14.084 UTC [policies] Evaluate -> DEBU 21c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:14.084 UTC [cauthdsl] func1 -> DEBU 21c9 0xc0026ce2d0 gate 1556760674084398700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:14.084 UTC [cauthdsl] func2 -> DEBU 21ca 0xc0026ce2d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:14.084 UTC [cauthdsl] func2 -> DEBU 21cb 0xc0026ce2d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:14.084 UTC [cauthdsl] func2 -> DEBU 21cc 0xc0026ce2d0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:14.085 UTC [msp.identity] Verify -> DEBU 21cd Verify: digest = 00000000 9c 7c a2 be 2f cf 37 34 98 b4 48 ca 47 25 b4 ab |.|../.74..H.G%..| -peer0.org1.example.com | 00000010 9f a6 ca db ae 91 58 d6 72 5f bc 3f eb 73 32 44 |......X.r_.?.s2D|" -peer0.org1.example.com | "2019-05-02 01:31:14.085 UTC [msp.identity] Verify -> DEBU 21ce Verify: sig = 00000000 30 44 02 20 72 12 e4 3a 8a 16 21 98 0c 7e f8 8d |0D. r..:..!..~..| -peer0.org1.example.com | 00000010 75 54 51 c6 b2 cc 13 1a ba bf c2 7c 87 db b8 98 |uTQ........|....| -peer0.org1.example.com | 00000020 17 78 3a 9c 02 20 2b 75 1a b2 7f 3b 75 ad 4f e5 |.x:.. +u...;u.O.| -peer0.org1.example.com | 00000030 4d 21 c1 19 fd e6 d9 69 e3 c9 f6 0d 0e eb 1a c0 |M!.....i........| -peer0.org1.example.com | 00000040 b1 86 44 8b 96 ff |..D...|" -peer0.org1.example.com | "2019-05-02 01:31:14.085 UTC [cauthdsl] func2 -> DEBU 21cf 0xc0026ce2d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:14.085 UTC [cauthdsl] func1 -> DEBU 21d0 0xc0026ce2d0 gate 1556760674084398700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:14.085 UTC [policies] Evaluate -> DEBU 21d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:14.086 UTC [policies] Evaluate -> DEBU 21d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:14.086 UTC [policies] Evaluate -> DEBU 21d3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:14.086 UTC [policies] Evaluate -> DEBU 21d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:14.086 UTC [gossip.discovery] handleAliveMessage -> DEBU 21d5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.087 UTC [gossip.discovery] handleAliveMessage -> DEBU 21d6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.087 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21d7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:14.087 UTC [msp.identity] Verify -> DEBU 21d8 Verify: digest = 00000000 aa 04 c2 17 8e 15 85 5e a1 2b 2d 64 fd 3b 7e f2 |.......^.+-d.;~.| -peer0.org1.example.com | 00000010 3a f3 55 3e a0 03 7a 58 3d aa cc 34 be e3 dd 0b |:.U>..zX=..4....|" -peer0.org1.example.com | "2019-05-02 01:31:14.087 UTC [msp.identity] Verify -> DEBU 21d9 Verify: sig = 00000000 30 45 02 21 00 cf 12 ae 0c 78 4f 13 2b d9 9a 3f |0E.!.....xO.+..?| -peer0.org1.example.com | 00000010 77 e9 33 b3 33 10 37 3f bd 61 02 4e 14 4e b2 87 |w.3.3.7?.a.N.N..| -peer0.org1.example.com | 00000020 4c 21 96 c3 8a 02 20 22 95 60 f5 87 ed 45 75 87 |L!.... ".`...Eu.| -peer0.org1.example.com | 00000030 12 15 98 13 ef b2 6c 17 0b d1 4f c9 7a 96 c9 0d |......l...O.z...| -peer0.org1.example.com | 00000040 5c 43 92 ff 84 c8 a7 |\C.....|" -peer0.org1.example.com | "2019-05-02 01:31:14.103 UTC [gossip.comm] func1 -> DEBU 21da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 21db Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.104 UTC [gossip.discovery] isSentByMe -> DEBU 21dc Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.105 UTC [gossip.discovery] handleAliveMessage -> DEBU 21dd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.104 UTC [gossip.gossip] handleMessage -> DEBU 21de Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.105 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21df Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:14.106 UTC [msp.identity] Verify -> DEBU 21e0 Verify: digest = 00000000 2a d2 6f 73 5c ab 32 00 41 1b 66 19 ac c9 8f 19 |*.os\.2.A.f.....| -peer0.org1.example.com | 00000010 29 a6 06 4f b7 3f 4a f6 3a 85 f9 ed 1b e5 dc 75 |)..O.?J.:......u|" -peer0.org1.example.com | "2019-05-02 01:31:14.106 UTC [msp.identity] Verify -> DEBU 21e1 Verify: sig = 00000000 30 44 02 20 41 b3 28 68 52 5d fc da c2 cf 60 25 |0D. A.(hR]....`%| -peer0.org1.example.com | 00000010 6a 93 c3 63 6b f0 f8 16 f5 53 85 5e 79 3f 53 28 |j..ck....S.^y?S(| -peer0.org1.example.com | 00000020 90 ef 82 9a 02 20 6a e8 b9 cf 84 b5 1f 58 f8 15 |..... j......X..| -peer0.org1.example.com | 00000030 0d 10 12 c6 fb ea ca f0 b0 51 a0 db 5f 6e 94 47 |.........Q.._n.G| -peer0.org1.example.com | 00000040 14 38 d2 00 7f 3b |.8...;|" -peer0.org1.example.com | "2019-05-02 01:31:14.106 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.106 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21e4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.106 UTC [gossip.gossip] handleMessage -> DEBU 21e6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.107 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21e7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:14.107 UTC [msp.identity] Verify -> DEBU 21e8 Verify: digest = 00000000 aa 04 c2 17 8e 15 85 5e a1 2b 2d 64 fd 3b 7e f2 |.......^.+-d.;~.| -peer0.org1.example.com | 00000010 3a f3 55 3e a0 03 7a 58 3d aa cc 34 be e3 dd 0b |:.U>..zX=..4....|" -peer0.org1.example.com | "2019-05-02 01:31:14.107 UTC [msp.identity] Verify -> DEBU 21e9 Verify: sig = 00000000 30 45 02 21 00 cf 12 ae 0c 78 4f 13 2b d9 9a 3f |0E.!.....xO.+..?| -peer0.org1.example.com | 00000010 77 e9 33 b3 33 10 37 3f bd 61 02 4e 14 4e b2 87 |w.3.3.7?.a.N.N..| -peer0.org1.example.com | 00000020 4c 21 96 c3 8a 02 20 22 95 60 f5 87 ed 45 75 87 |L!.... ".`...Eu.| -peer0.org1.example.com | 00000030 12 15 98 13 ef b2 6c 17 0b d1 4f c9 7a 96 c9 0d |......l...O.z...| -peer0.org1.example.com | 00000040 5c 43 92 ff 84 c8 a7 |\C.....|" -peer0.org1.example.com | "2019-05-02 01:31:14.107 UTC [gossip.discovery] handleAliveMessage -> DEBU 21ea Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.107 UTC [gossip.discovery] isSentByMe -> DEBU 21eb Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.108 UTC [gossip.discovery] handleAliveMessage -> DEBU 21ec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.108 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21ed Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:14.108 UTC [msp.identity] Verify -> DEBU 21ee Verify: digest = 00000000 2a d2 6f 73 5c ab 32 00 41 1b 66 19 ac c9 8f 19 |*.os\.2.A.f.....| -peer0.org1.example.com | 00000010 29 a6 06 4f b7 3f 4a f6 3a 85 f9 ed 1b e5 dc 75 |)..O.?J.:......u|" -peer0.org1.example.com | "2019-05-02 01:31:14.109 UTC [msp.identity] Verify -> DEBU 21ef Verify: sig = 00000000 30 44 02 20 41 b3 28 68 52 5d fc da c2 cf 60 25 |0D. A.(hR]....`%| -peer0.org1.example.com | 00000010 6a 93 c3 63 6b f0 f8 16 f5 53 85 5e 79 3f 53 28 |j..ck....S.^y?S(| -peer0.org1.example.com | 00000020 90 ef 82 9a 02 20 6a e8 b9 cf 84 b5 1f 58 f8 15 |..... j......X..| -peer0.org1.example.com | 00000030 0d 10 12 c6 fb ea ca f0 b0 51 a0 db 5f 6e 94 47 |.........Q.._n.G| -peer0.org1.example.com | 00000040 14 38 d2 00 7f 3b |.8...;|" -peer0.org1.example.com | "2019-05-02 01:31:14.110 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.110 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.110 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21f2 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:14.110 UTC [msp] DeserializeIdentity -> DEBU 21f3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:14.110 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:14.110 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21f5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:14.110 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21f6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:14.110 UTC [policies] Evaluate -> DEBU 21f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:14.110 UTC [policies] Evaluate -> DEBU 21f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:14.110 UTC [policies] Evaluate -> DEBU 21f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:14.111 UTC [cauthdsl] func1 -> DEBU 21fa 0xc0025f6e20 gate 1556760674111101700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:14.111 UTC [cauthdsl] func2 -> DEBU 21fb 0xc0025f6e20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:14.111 UTC [cauthdsl] func2 -> DEBU 21fc 0xc0025f6e20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:14.111 UTC [cauthdsl] func2 -> DEBU 21fd 0xc0025f6e20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:14.111 UTC [msp.identity] Verify -> DEBU 21fe Verify: digest = 00000000 c8 5f 9e 2c e9 fd 7e af b0 f2 ea 78 d4 7d ca 0f |._.,..~....x.}..| -peer0.org1.example.com | 00000010 b2 ba 71 2f 39 1b 46 b3 ec 92 a3 a0 ac 56 4d c1 |..q/9.F......VM.|" -peer0.org1.example.com | "2019-05-02 01:31:14.111 UTC [msp.identity] Verify -> DEBU 21ff Verify: sig = 00000000 30 44 02 20 0a 80 a0 a8 de b6 72 d6 a6 41 b5 c5 |0D. ......r..A..| -peer0.org1.example.com | 00000010 ea d9 bb 83 c7 85 a0 d9 e4 80 fd a5 a3 06 74 7d |..............t}| -peer0.org1.example.com | 00000020 35 55 d4 92 02 20 1c ca 29 2d e4 47 cb 3f 29 67 |5U... ..)-.G.?)g| -peer0.org1.example.com | 00000030 1c ee 8f c2 4d a6 7d 99 66 43 f3 fa 43 c1 7a f5 |....M.}.fC..C.z.| -peer0.org1.example.com | 00000040 40 96 fb 0f 24 7e |@...$~|" -peer0.org1.example.com | "2019-05-02 01:31:14.112 UTC [cauthdsl] func2 -> DEBU 2200 0xc0025f6e20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:14.112 UTC [cauthdsl] func1 -> DEBU 2201 0xc0025f6e20 gate 1556760674111101700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:14.112 UTC [policies] Evaluate -> DEBU 2202 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:14.112 UTC [policies] Evaluate -> DEBU 2203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:14.112 UTC [policies] Evaluate -> DEBU 2204 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:14.112 UTC [policies] Evaluate -> DEBU 2205 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:14.112 UTC [gossip.discovery] handleAliveMessage -> DEBU 2206 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:14.113 UTC [gossip.discovery] handleAliveMessage -> DEBU 2207 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2208 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:14.562 UTC [endorser] ProcessProposal -> DEBU 2209 Entering: request from 192.168.240.9:41332" -peer0.org1.example.com | "2019-05-02 01:31:14.562 UTC [protoutils] ValidateProposalMessage -> DEBU 220a ValidateProposalMessage starts for signed proposal 0xc002e1c140" -peer0.org1.example.com | "2019-05-02 01:31:14.563 UTC [protoutils] validateChannelHeader -> DEBU 220b validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:14.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 220c begin" -peer0.org1.example.com | "2019-05-02 01:31:14.564 UTC [msp] GetManagerForChain -> DEBU 220d Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:14.565 UTC [protoutils] checkSignatureFromCreator -> DEBU 220e creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:14.566 UTC [protoutils] checkSignatureFromCreator -> DEBU 220f creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:14.566 UTC [msp.identity] Verify -> DEBU 2210 Verify: digest = 00000000 2f 61 4c b0 fe 03 3b de b8 4c b2 d3 01 e6 c6 e1 |/aL...;..L......| -peer0.org1.example.com | 00000010 c1 74 34 fb 36 e8 0d d7 f6 9e 98 da 78 26 5e cd |.t4.6.......x&^.|" -peer0.org1.example.com | "2019-05-02 01:31:14.566 UTC [msp.identity] Verify -> DEBU 2211 Verify: sig = 00000000 30 45 02 21 00 9a ca 3b 87 8c 24 0c 5b 0a 28 c5 |0E.!...;..$.[.(.| -peer0.org1.example.com | 00000010 17 86 52 df 45 74 d7 fe d6 71 98 29 ed d8 d3 f7 |..R.Et...q.)....| -peer0.org1.example.com | 00000020 83 5b f9 33 6d 02 20 1f af 1c 86 f8 f1 24 6f 3e |.[.3m. ......$o>| -peer0.org1.example.com | 00000030 64 fc e0 56 c8 83 39 17 4a 64 67 cb ae f5 9b 5f |d..V..9.Jdg...._| -peer0.org1.example.com | 00000040 21 47 3e b6 16 94 7a |!G>...z|" -peer0.org1.example.com | "2019-05-02 01:31:14.567 UTC [protoutils] checkSignatureFromCreator -> DEBU 2212 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:14.567 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2213 validateChaincodeProposalMessage starts for proposal 0xc003402cb0, header 0xc002e1c550" -peer0.org1.example.com | "2019-05-02 01:31:14.568 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2214 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:14.569 UTC [endorser] preProcess -> DEBU 2215 [businesschannel][6c1f5828] processing txid: 6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e" -peer0.org1.example.com | "2019-05-02 01:31:14.569 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2216 retrieveTransactionByID() - txId = [6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e]" -peer0.org1.example.com | "2019-05-02 01:31:14.570 UTC [aclmgmt] CheckACL -> DEBU 2217 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-05-02 01:31:14.570 UTC [aclmgmt] CheckACL -> DEBU 2218 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-05-02 01:31:14.570 UTC [policies] Evaluate -> DEBU 2219 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:14.571 UTC [policies] Evaluate -> DEBU 221a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:14.571 UTC [policies] Evaluate -> DEBU 221b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:14.572 UTC [cauthdsl] func1 -> DEBU 221c 0xc0025b5740 gate 1556760674572063200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:14.572 UTC [cauthdsl] func2 -> DEBU 221d 0xc0025b5740 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:14.572 UTC [cauthdsl] func2 -> DEBU 221e 0xc0025b5740 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:14.573 UTC [cauthdsl] func2 -> DEBU 221f 0xc0025b5740 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:14.573 UTC [msp.identity] Verify -> DEBU 2220 Verify: digest = 00000000 2f 61 4c b0 fe 03 3b de b8 4c b2 d3 01 e6 c6 e1 |/aL...;..L......| -peer0.org1.example.com | 00000010 c1 74 34 fb 36 e8 0d d7 f6 9e 98 da 78 26 5e cd |.t4.6.......x&^.|" -peer0.org1.example.com | "2019-05-02 01:31:14.574 UTC [msp.identity] Verify -> DEBU 2221 Verify: sig = 00000000 30 45 02 21 00 9a ca 3b 87 8c 24 0c 5b 0a 28 c5 |0E.!...;..$.[.(.| -peer0.org1.example.com | 00000010 17 86 52 df 45 74 d7 fe d6 71 98 29 ed d8 d3 f7 |..R.Et...q.)....| -peer0.org1.example.com | 00000020 83 5b f9 33 6d 02 20 1f af 1c 86 f8 f1 24 6f 3e |.[.3m. ......$o>| -peer0.org1.example.com | 00000030 64 fc e0 56 c8 83 39 17 4a 64 67 cb ae f5 9b 5f |d..V..9.Jdg...._| -peer0.org1.example.com | 00000040 21 47 3e b6 16 94 7a |!G>...z|" -peer0.org1.example.com | "2019-05-02 01:31:14.575 UTC [cauthdsl] func2 -> DEBU 2222 0xc0025b5740 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:14.575 UTC [cauthdsl] func1 -> DEBU 2223 0xc0025b5740 gate 1556760674572063200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:14.575 UTC [policies] Evaluate -> DEBU 2224 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:14.575 UTC [policies] Evaluate -> DEBU 2225 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:14.576 UTC [policies] Evaluate -> DEBU 2226 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:14.576 UTC [policies] Evaluate -> DEBU 2227 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:14.576 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2228 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:14.576 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2229 constructing new tx simulator txid = [6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e]" -peer0.org1.example.com | "2019-05-02 01:31:14.576 UTC [endorser] SimulateProposal -> DEBU 222a [businesschannel][6c1f5828] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:14.577 UTC [stateleveldb] GetState -> DEBU 222b GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:14.577 UTC [endorser] callChaincode -> INFO 222c [businesschannel][6c1f5828] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:14.577 UTC [stateleveldb] GetState -> DEBU 222d GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:14.577 UTC [stateleveldb] GetState -> DEBU 222e GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:14.577 UTC [chaincode] Execute -> DEBU 222f Entry" -peer0.org1.example.com | "2019-05-02 01:31:14.579 UTC [chaincode] handleMessage -> DEBU 2230 [6c1f5828] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:14.580 UTC [chaincode] HandleTransaction -> DEBU 2231 [6c1f5828] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:14.580 UTC [chaincode] HandleGetState -> DEBU 2232 [6c1f5828] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:14.581 UTC [stateleveldb] GetState -> DEBU 2233 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-05-02 01:31:14.581 UTC [chaincode] HandleTransaction -> DEBU 2234 [6c1f5828] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:14.583 UTC [chaincode] handleMessage -> DEBU 2235 [6c1f5828] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:14.583 UTC [chaincode] Notify -> DEBU 2236 [6c1f5828] notifying Txid:6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:14.584 UTC [chaincode] Execute -> DEBU 2237 Exit" -peer0.org1.example.com | "2019-05-02 01:31:14.584 UTC [endorser] callChaincode -> INFO 2238 [businesschannel][6c1f5828] Exit chaincode: name:"exp02" (7ms)" -peer0.org1.example.com | "2019-05-02 01:31:14.584 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2239 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:14.584 UTC [lockbasedtxmgr] Done -> DEBU 223a Done with transaction simulation / query execution [6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e]" -peer0.org1.example.com | "2019-05-02 01:31:14.584 UTC [endorser] SimulateProposal -> DEBU 223b [businesschannel][6c1f5828] Exit" -peer0.org1.example.com | "2019-05-02 01:31:14.584 UTC [endorser] endorseProposal -> DEBU 223c [businesschannel][6c1f5828] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:14.584 UTC [endorser] endorseProposal -> DEBU 223d [businesschannel][6c1f5828] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-05-02 01:31:14.584 UTC [endorser] EndorseWithPlugin -> DEBU 223e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:14.585 UTC [msp.identity] Sign -> DEBU 223f Sign: plaintext: 0A20C114D184D1DE162D02FF79D4024A...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:14.585 UTC [msp.identity] Sign -> DEBU 2240 Sign: digest: 5C8F5B7F7303DF365557DE18624F2FC13894E4E07CBE202C2CA5C1B710978F8D " -peer0.org1.example.com | "2019-05-02 01:31:14.585 UTC [endorser] EndorseWithPlugin -> DEBU 2241 Exiting {plugin: escc, channel: businesschannel, tx: 6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:14.585 UTC [endorser] endorseProposal -> DEBU 2242 [businesschannel][6c1f5828] Exit" -peer0.org1.example.com | "2019-05-02 01:31:14.585 UTC [lockbasedtxmgr] Done -> DEBU 2243 Done with transaction simulation / query execution [6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e]" -peer0.org1.example.com | "2019-05-02 01:31:14.585 UTC [endorser] func1 -> DEBU 2244 Exit: request from 192.168.240.9:41332" -peer0.org1.example.com | "2019-05-02 01:31:14.585 UTC [comm.grpc.server] 1 -> INFO 2245 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41332 grpc.code=OK grpc.call_duration=23.9744ms -peer0.org1.example.com | "2019-05-02 01:31:14.589 UTC [grpc] infof -> DEBU 2246 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:14.590 UTC [grpc] infof -> DEBU 2247 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:14.780 UTC [endorser] ProcessProposal -> DEBU 2248 Entering: request from 192.168.240.9:41336" -peer0.org1.example.com | "2019-05-02 01:31:14.782 UTC [protoutils] ValidateProposalMessage -> DEBU 2249 ValidateProposalMessage starts for signed proposal 0xc002e1cf00" -peer0.org1.example.com | "2019-05-02 01:31:14.782 UTC [protoutils] validateChannelHeader -> DEBU 224a validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:14.783 UTC [protoutils] checkSignatureFromCreator -> DEBU 224b begin" -peer0.org1.example.com | "2019-05-02 01:31:14.783 UTC [msp] GetManagerForChain -> DEBU 224c Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:14.784 UTC [protoutils] checkSignatureFromCreator -> DEBU 224d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:14.784 UTC [protoutils] checkSignatureFromCreator -> DEBU 224e creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:14.785 UTC [msp.identity] Verify -> DEBU 224f Verify: digest = 00000000 f0 7d b7 90 b8 01 5b 6e c2 61 bd bb 4a 59 24 ce |.}....[n.a..JY$.| -peer0.org1.example.com | 00000010 81 0f 58 64 1a 4f 26 0f 94 d5 e9 c2 51 3f ef 3d |..Xd.O&.....Q?.=|" -peer0.org1.example.com | "2019-05-02 01:31:14.785 UTC [msp.identity] Verify -> DEBU 2250 Verify: sig = 00000000 30 45 02 21 00 fa 04 3b 0d 37 b4 4a 8a 9b 7b f0 |0E.!...;.7.J..{.| -peer0.org1.example.com | 00000010 a8 e4 b3 31 58 90 6d b3 7b 0b ba 3e d9 18 1d e6 |...1X.m.{..>....| -peer0.org1.example.com | 00000020 f8 59 f6 19 0a 02 20 26 06 3e cb eb 37 00 cd 51 |.Y.... &.>..7..Q| -peer0.org1.example.com | 00000030 67 f9 88 0b d3 20 2e 2c 66 2e 25 0b c5 e3 cb c1 |g.... .,f.%.....| -peer0.org1.example.com | 00000040 bf 93 1b 4b fb f9 f3 |...K...|" -peer0.org1.example.com | "2019-05-02 01:31:14.786 UTC [protoutils] checkSignatureFromCreator -> DEBU 2251 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:14.786 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2252 validateChaincodeProposalMessage starts for proposal 0xc003403180, header 0xc002e1d310" -peer0.org1.example.com | "2019-05-02 01:31:14.787 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2253 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:14.787 UTC [endorser] preProcess -> DEBU 2254 [businesschannel][1a343f6c] processing txid: 1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183" -peer0.org1.example.com | "2019-05-02 01:31:14.788 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2255 retrieveTransactionByID() - txId = [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183]" -peer0.org1.example.com | "2019-05-02 01:31:14.788 UTC [aclmgmt] CheckACL -> DEBU 2256 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-05-02 01:31:14.789 UTC [aclmgmt] CheckACL -> DEBU 2257 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-05-02 01:31:14.789 UTC [policies] Evaluate -> DEBU 2258 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:14.789 UTC [policies] Evaluate -> DEBU 2259 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:14.790 UTC [policies] Evaluate -> DEBU 225a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:14.790 UTC [cauthdsl] func1 -> DEBU 225b 0xc0024329e0 gate 1556760674790744100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:14.791 UTC [cauthdsl] func2 -> DEBU 225c 0xc0024329e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:14.791 UTC [cauthdsl] func2 -> DEBU 225d 0xc0024329e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:14.792 UTC [cauthdsl] func2 -> DEBU 225e 0xc0024329e0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:14.792 UTC [msp.identity] Verify -> DEBU 225f Verify: digest = 00000000 f0 7d b7 90 b8 01 5b 6e c2 61 bd bb 4a 59 24 ce |.}....[n.a..JY$.| -peer0.org1.example.com | 00000010 81 0f 58 64 1a 4f 26 0f 94 d5 e9 c2 51 3f ef 3d |..Xd.O&.....Q?.=|" -peer0.org1.example.com | "2019-05-02 01:31:14.793 UTC [msp.identity] Verify -> DEBU 2260 Verify: sig = 00000000 30 45 02 21 00 fa 04 3b 0d 37 b4 4a 8a 9b 7b f0 |0E.!...;.7.J..{.| -peer0.org1.example.com | 00000010 a8 e4 b3 31 58 90 6d b3 7b 0b ba 3e d9 18 1d e6 |...1X.m.{..>....| -peer0.org1.example.com | 00000020 f8 59 f6 19 0a 02 20 26 06 3e cb eb 37 00 cd 51 |.Y.... &.>..7..Q| -peer0.org1.example.com | 00000030 67 f9 88 0b d3 20 2e 2c 66 2e 25 0b c5 e3 cb c1 |g.... .,f.%.....| -peer0.org1.example.com | 00000040 bf 93 1b 4b fb f9 f3 |...K...|" -peer0.org1.example.com | "2019-05-02 01:31:14.794 UTC [cauthdsl] func2 -> DEBU 2261 0xc0024329e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:14.794 UTC [cauthdsl] func1 -> DEBU 2262 0xc0024329e0 gate 1556760674790744100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:14.794 UTC [policies] Evaluate -> DEBU 2263 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:14.795 UTC [policies] Evaluate -> DEBU 2264 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:14.795 UTC [policies] Evaluate -> DEBU 2265 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:14.796 UTC [policies] Evaluate -> DEBU 2266 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:14.796 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2267 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:14.796 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2268 constructing new tx simulator txid = [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183]" -peer0.org1.example.com | "2019-05-02 01:31:14.796 UTC [endorser] SimulateProposal -> DEBU 2269 [businesschannel][1a343f6c] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:14.796 UTC [stateleveldb] GetState -> DEBU 226a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:14.796 UTC [endorser] callChaincode -> INFO 226b [businesschannel][1a343f6c] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:14.796 UTC [stateleveldb] GetState -> DEBU 226c GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:14.796 UTC [stateleveldb] GetState -> DEBU 226d GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:14.796 UTC [chaincode] Execute -> DEBU 226e Entry" -peer0.org1.example.com | "2019-05-02 01:31:14.798 UTC [chaincode] handleMessage -> DEBU 226f [1a343f6c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:14.798 UTC [chaincode] HandleTransaction -> DEBU 2270 [1a343f6c] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:14.798 UTC [chaincode] HandleGetState -> DEBU 2271 [1a343f6c] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:14.798 UTC [stateleveldb] GetState -> DEBU 2272 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-05-02 01:31:14.798 UTC [chaincode] HandleTransaction -> DEBU 2273 [1a343f6c] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:14.799 UTC [chaincode] handleMessage -> DEBU 2274 [1a343f6c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:14.800 UTC [chaincode] HandleTransaction -> DEBU 2275 [1a343f6c] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:14.800 UTC [chaincode] HandleGetState -> DEBU 2276 [1a343f6c] getting state for chaincode exp02, key b, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:14.800 UTC [stateleveldb] GetState -> DEBU 2277 GetState(). ns=exp02, key=b" -peer0.org1.example.com | "2019-05-02 01:31:14.800 UTC [chaincode] HandleTransaction -> DEBU 2278 [1a343f6c] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:14.801 UTC [chaincode] handleMessage -> DEBU 2279 [1a343f6c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:14.802 UTC [chaincode] HandleTransaction -> DEBU 227a [1a343f6c] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:14.802 UTC [chaincode] HandleTransaction -> DEBU 227b [1a343f6c] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:14.803 UTC [chaincode] handleMessage -> DEBU 227c [1a343f6c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:14.803 UTC [chaincode] HandleTransaction -> DEBU 227d [1a343f6c] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:14.804 UTC [chaincode] HandleTransaction -> DEBU 227e [1a343f6c] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:14.804 UTC [chaincode] handleMessage -> DEBU 227f [1a343f6c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:14.805 UTC [chaincode] Notify -> DEBU 2280 [1a343f6c] notifying Txid:1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:14.805 UTC [chaincode] Execute -> DEBU 2281 Exit" -peer0.org1.example.com | "2019-05-02 01:31:14.805 UTC [endorser] callChaincode -> INFO 2282 [businesschannel][1a343f6c] Exit chaincode: name:"exp02" (9ms)" -peer0.org1.example.com | "2019-05-02 01:31:14.805 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2283 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:14.805 UTC [lockbasedtxmgr] Done -> DEBU 2284 Done with transaction simulation / query execution [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183]" -peer0.org1.example.com | "2019-05-02 01:31:14.805 UTC [endorser] SimulateProposal -> DEBU 2285 [businesschannel][1a343f6c] Exit" -peer0.org1.example.com | "2019-05-02 01:31:14.805 UTC [endorser] endorseProposal -> DEBU 2286 [businesschannel][1a343f6c] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:14.806 UTC [endorser] endorseProposal -> DEBU 2287 [businesschannel][1a343f6c] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-05-02 01:31:14.806 UTC [endorser] EndorseWithPlugin -> DEBU 2288 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:14.806 UTC [msp.identity] Sign -> DEBU 2289 Sign: plaintext: 0A202DACF24DAAAF456C723EB1231EB4...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:14.806 UTC [msp.identity] Sign -> DEBU 228a Sign: digest: ED448A5D28E727D28642A006FE24675225A0358AF52CA4CD2AA3D7C5839E53E6 " -peer0.org1.example.com | "2019-05-02 01:31:14.806 UTC [endorser] EndorseWithPlugin -> DEBU 228b Exiting {plugin: escc, channel: businesschannel, tx: 1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:14.806 UTC [endorser] endorseProposal -> DEBU 228c [businesschannel][1a343f6c] Exit" -peer0.org1.example.com | "2019-05-02 01:31:14.806 UTC [lockbasedtxmgr] Done -> DEBU 228d Done with transaction simulation / query execution [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183]" -peer0.org1.example.com | "2019-05-02 01:31:14.806 UTC [endorser] func1 -> DEBU 228e Exit: request from 192.168.240.9:41336" -peer0.org1.example.com | "2019-05-02 01:31:14.806 UTC [comm.grpc.server] 1 -> INFO 228f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41336 grpc.code=OK grpc.call_duration=26.9028ms -peer0.org1.example.com | "2019-05-02 01:31:14.824 UTC [grpc] warningf -> DEBU 2290 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41336: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:31:14.825 UTC [grpc] infof -> DEBU 2291 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:14.826 UTC [grpc] infof -> DEBU 2292 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:14.998 UTC [endorser] ProcessProposal -> DEBU 2293 Entering: request from 192.168.240.9:41342" -peer0.org1.example.com | "2019-05-02 01:31:14.999 UTC [protoutils] ValidateProposalMessage -> DEBU 2294 ValidateProposalMessage starts for signed proposal 0xc002e1de00" -peer0.org1.example.com | "2019-05-02 01:31:14.999 UTC [protoutils] validateChannelHeader -> DEBU 2295 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:14.999 UTC [protoutils] checkSignatureFromCreator -> DEBU 2296 begin" -peer0.org1.example.com | "2019-05-02 01:31:15.000 UTC [msp] GetManagerForChain -> DEBU 2297 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:15.001 UTC [protoutils] checkSignatureFromCreator -> DEBU 2298 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -peer0.org1.example.com | "2019-05-02 01:31:15.002 UTC [protoutils] checkSignatureFromCreator -> DEBU 2299 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:15.002 UTC [msp.identity] Verify -> DEBU 229a Verify: digest = 00000000 01 3a 0c b9 5d 4f 99 a1 f9 16 df 58 96 d7 bd a0 |.:..]O.....X....| -peer0.org1.example.com | 00000010 27 01 9e 2e fb 9b 87 96 56 56 40 aa d2 00 0a 50 |'.......VV@....P|" -peer0.org1.example.com | "2019-05-02 01:31:15.003 UTC [msp.identity] Verify -> DEBU 229b Verify: sig = 00000000 30 44 02 20 6c 49 ce d6 60 5e aa 57 41 25 74 65 |0D. lI..`^.WA%te| -peer0.org1.example.com | 00000010 0b 76 09 e5 1b ce 86 fe 0e e8 56 ff ef f2 03 78 |.v........V....x| -peer0.org1.example.com | 00000020 fa 95 a0 ed 02 20 18 26 64 4f b7 7b d9 1e 47 70 |..... .&dO.{..Gp| -peer0.org1.example.com | 00000030 73 b9 c3 ce 1e ba 6e 4f fb 2f 9c 82 34 7d 55 3d |s.....nO./..4}U=| -peer0.org1.example.com | 00000040 27 b9 c3 63 f9 e6 |'..c..|" -peer0.org1.example.com | "2019-05-02 01:31:15.003 UTC [protoutils] checkSignatureFromCreator -> DEBU 229c exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:15.004 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 229d validateChaincodeProposalMessage starts for proposal 0xc003146af0, header 0xc002dd6cd0" -peer0.org1.example.com | "2019-05-02 01:31:15.004 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 229e validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:15.005 UTC [endorser] preProcess -> DEBU 229f [businesschannel][6a139eca] processing txid: 6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e" -peer0.org1.example.com | "2019-05-02 01:31:15.005 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 22a0 retrieveTransactionByID() - txId = [6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e]" -peer0.org1.example.com | "2019-05-02 01:31:15.005 UTC [aclmgmt] CheckACL -> DEBU 22a1 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-05-02 01:31:15.006 UTC [aclmgmt] CheckACL -> DEBU 22a2 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-05-02 01:31:15.006 UTC [policies] Evaluate -> DEBU 22a3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:15.007 UTC [policies] Evaluate -> DEBU 22a4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:15.007 UTC [policies] Evaluate -> DEBU 22a5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:15.007 UTC [cauthdsl] func1 -> DEBU 22a6 0xc0022ce510 gate 1556760675007801500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:15.008 UTC [cauthdsl] func2 -> DEBU 22a7 0xc0022ce510 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:15.008 UTC [cauthdsl] func2 -> DEBU 22a8 0xc0022ce510 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:15.009 UTC [cauthdsl] func2 -> DEBU 22a9 0xc0022ce510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:15.009 UTC [cauthdsl] func2 -> DEBU 22aa 0xc0022ce510 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:15.009 UTC [cauthdsl] func1 -> DEBU 22ab 0xc0022ce510 gate 1556760675007801500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:15.010 UTC [policies] Evaluate -> DEBU 22ac Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:15.010 UTC [policies] Evaluate -> DEBU 22ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:15.010 UTC [policies] Evaluate -> DEBU 22ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:15.010 UTC [cauthdsl] func1 -> DEBU 22af 0xc0022ced70 gate 1556760675010522200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:15.010 UTC [cauthdsl] func2 -> DEBU 22b0 0xc0022ced70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:15.010 UTC [cauthdsl] func2 -> DEBU 22b1 0xc0022ced70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:15.010 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 22b2 Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:15.010 UTC [msp] Validate -> DEBU 22b3 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:15.010 UTC [msp] getCertificationChain -> DEBU 22b4 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [cauthdsl] func2 -> DEBU 22b5 0xc0022ced70 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [msp.identity] Verify -> DEBU 22b6 Verify: digest = 00000000 01 3a 0c b9 5d 4f 99 a1 f9 16 df 58 96 d7 bd a0 |.:..]O.....X....| -peer0.org1.example.com | 00000010 27 01 9e 2e fb 9b 87 96 56 56 40 aa d2 00 0a 50 |'.......VV@....P|" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [msp.identity] Verify -> DEBU 22b7 Verify: sig = 00000000 30 44 02 20 6c 49 ce d6 60 5e aa 57 41 25 74 65 |0D. lI..`^.WA%te| -peer0.org1.example.com | 00000010 0b 76 09 e5 1b ce 86 fe 0e e8 56 ff ef f2 03 78 |.v........V....x| -peer0.org1.example.com | 00000020 fa 95 a0 ed 02 20 18 26 64 4f b7 7b d9 1e 47 70 |..... .&dO.{..Gp| -peer0.org1.example.com | 00000030 73 b9 c3 ce 1e ba 6e 4f fb 2f 9c 82 34 7d 55 3d |s.....nO./..4}U=| -peer0.org1.example.com | 00000040 27 b9 c3 63 f9 e6 |'..c..|" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [cauthdsl] func2 -> DEBU 22b8 0xc0022ced70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [cauthdsl] func1 -> DEBU 22b9 0xc0022ced70 gate 1556760675010522200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [policies] Evaluate -> DEBU 22ba Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [policies] Evaluate -> DEBU 22bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [policies] Evaluate -> DEBU 22bc Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [policies] Evaluate -> DEBU 22bd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 22be constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 22bf constructing new tx simulator txid = [6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e]" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [endorser] SimulateProposal -> DEBU 22c0 [businesschannel][6a139eca] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [stateleveldb] GetState -> DEBU 22c1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [endorser] callChaincode -> INFO 22c2 [businesschannel][6a139eca] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:15.011 UTC [stateleveldb] GetState -> DEBU 22c3 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:15.012 UTC [stateleveldb] GetState -> DEBU 22c4 GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:15.012 UTC [chaincode] Execute -> DEBU 22c5 Entry" -peer0.org1.example.com | "2019-05-02 01:31:15.015 UTC [chaincode] handleMessage -> DEBU 22c6 [6a139eca] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:15.015 UTC [chaincode] HandleTransaction -> DEBU 22c7 [6a139eca] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:15.015 UTC [chaincode] HandleGetState -> DEBU 22c8 [6a139eca] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:15.015 UTC [stateleveldb] GetState -> DEBU 22c9 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-05-02 01:31:15.015 UTC [chaincode] HandleTransaction -> DEBU 22ca [6a139eca] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:15.017 UTC [chaincode] handleMessage -> DEBU 22cb [6a139eca] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:15.017 UTC [chaincode] Notify -> DEBU 22cc [6a139eca] notifying Txid:6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:15.017 UTC [chaincode] Execute -> DEBU 22cd Exit" -peer0.org1.example.com | "2019-05-02 01:31:15.017 UTC [endorser] callChaincode -> INFO 22ce [businesschannel][6a139eca] Exit chaincode: name:"exp02" (6ms)" -peer0.org1.example.com | "2019-05-02 01:31:15.018 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 22cf Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:15.018 UTC [lockbasedtxmgr] Done -> DEBU 22d0 Done with transaction simulation / query execution [6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e]" -peer0.org1.example.com | "2019-05-02 01:31:15.018 UTC [endorser] SimulateProposal -> DEBU 22d1 [businesschannel][6a139eca] Exit" -peer0.org1.example.com | "2019-05-02 01:31:15.018 UTC [endorser] endorseProposal -> DEBU 22d2 [businesschannel][6a139eca] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:15.018 UTC [endorser] endorseProposal -> DEBU 22d3 [businesschannel][6a139eca] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-05-02 01:31:15.018 UTC [endorser] EndorseWithPlugin -> DEBU 22d4 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:15.018 UTC [msp.identity] Sign -> DEBU 22d5 Sign: plaintext: 0A2044CCCA3C95BA399CD36E668C1DC1...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:15.019 UTC [msp.identity] Sign -> DEBU 22d6 Sign: digest: 0ACCA8F61B914450B551A4961A353EBBD56D887A0D4CD8E05A24E807660BC241 " -peer0.org1.example.com | "2019-05-02 01:31:15.019 UTC [endorser] EndorseWithPlugin -> DEBU 22d7 Exiting {plugin: escc, channel: businesschannel, tx: 6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:15.019 UTC [endorser] endorseProposal -> DEBU 22d8 [businesschannel][6a139eca] Exit" -peer0.org1.example.com | "2019-05-02 01:31:15.019 UTC [lockbasedtxmgr] Done -> DEBU 22d9 Done with transaction simulation / query execution [6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e]" -peer0.org1.example.com | "2019-05-02 01:31:15.019 UTC [endorser] func1 -> DEBU 22da Exit: request from 192.168.240.9:41342" -peer0.org1.example.com | "2019-05-02 01:31:15.019 UTC [comm.grpc.server] 1 -> INFO 22db unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41342 grpc.code=OK grpc.call_duration=21.6484ms -peer0.org1.example.com | "2019-05-02 01:31:15.024 UTC [grpc] infof -> DEBU 22dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:15.025 UTC [grpc] infof -> DEBU 22dd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:16.829 UTC [msp] DeserializeIdentity -> DEBU 22de Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.829 UTC [msp] DeserializeIdentity -> DEBU 22df Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.832 UTC [gossip.comm] Send -> DEBU 22e0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:16.832 UTC [gossip.comm] sendToEndpoint -> DEBU 22e1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.832 UTC [gossip.comm] sendToEndpoint -> DEBU 22e2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:16.840 UTC [gossip.comm] func1 -> DEBU 22e3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.841 UTC [gossip.comm] sendToEndpoint -> DEBU 22e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.844 UTC [gossip.comm] sendToEndpoint -> DEBU 22e5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:16.844 UTC [gossip.gossip] handleMessage -> DEBU 22e6 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.846 UTC [msp] DeserializeIdentity -> DEBU 22e9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.847 UTC [msp] DeserializeIdentity -> DEBU 22ea Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.844 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 22e7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.845 UTC [gossip.comm] sendToEndpoint -> DEBU 22e8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.849 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 22eb Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.851 UTC [msp] DeserializeIdentity -> DEBU 22ed Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.853 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:16.854 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.855 UTC [policies] Evaluate -> DEBU 22f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.856 UTC [policies] Evaluate -> DEBU 22f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:16.856 UTC [policies] Evaluate -> DEBU 22f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.857 UTC [cauthdsl] func1 -> DEBU 22f5 0xc002214200 gate 1556760676857092300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:16.857 UTC [cauthdsl] func2 -> DEBU 22f6 0xc002214200 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:16.857 UTC [cauthdsl] func2 -> DEBU 22f7 0xc002214200 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:16.858 UTC [cauthdsl] func2 -> DEBU 22f8 0xc002214200 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.858 UTC [msp.identity] Verify -> DEBU 22f9 Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -peer0.org1.example.com | 00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -peer0.org1.example.com | "2019-05-02 01:31:16.859 UTC [msp.identity] Verify -> DEBU 22fa Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -peer0.org1.example.com | 00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -peer0.org1.example.com | 00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -peer0.org1.example.com | 00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -peer0.org1.example.com | 00000040 f7 8f 39 95 02 eb |..9...|" -peer0.org1.example.com | "2019-05-02 01:31:16.859 UTC [cauthdsl] func2 -> DEBU 22fb 0xc002214200 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.860 UTC [cauthdsl] func1 -> DEBU 22fc 0xc002214200 gate 1556760676857092300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:16.860 UTC [policies] Evaluate -> DEBU 22fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.861 UTC [policies] Evaluate -> DEBU 22fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.861 UTC [policies] Evaluate -> DEBU 22ff Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.861 UTC [policies] Evaluate -> DEBU 2300 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.850 UTC [gossip.comm] sendToEndpoint -> DEBU 22ec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:16.852 UTC [policies] Evaluate -> DEBU 22ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-05-02 01:31:16.868 UTC [policies] Evaluate -> DEBU 2301 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:16.869 UTC [policies] Evaluate -> DEBU 2302 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.869 UTC [cauthdsl] func1 -> DEBU 2303 0xc002220910 gate 1556760676869899600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:16.870 UTC [cauthdsl] func2 -> DEBU 2304 0xc002220910 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:16.870 UTC [cauthdsl] func2 -> DEBU 2305 0xc002220910 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:16.871 UTC [cauthdsl] func2 -> DEBU 2306 0xc002220910 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.872 UTC [msp.identity] Verify -> DEBU 2307 Verify: digest = 00000000 11 b5 43 c6 fd 00 94 9c 15 b7 d8 66 dd 99 db b6 |..C........f....| -peer0.org1.example.com | 00000010 39 bf f0 a7 8a 3d 06 4e 81 dd 9a 8a dc 4c 2e 06 |9....=.N.....L..|" -peer0.org1.example.com | "2019-05-02 01:31:16.872 UTC [msp.identity] Verify -> DEBU 2308 Verify: sig = 00000000 30 44 02 20 3c 1f c5 52 b4 ad cf 84 0f 0b 05 fc |0D. <..R........| -peer0.org1.example.com | 00000010 da bc 01 bb 04 95 61 0f 95 04 22 bc 4d 40 c5 80 |......a...".M@..| -peer0.org1.example.com | 00000020 df 12 e9 8b 02 20 67 60 25 b4 95 c0 98 95 9d 78 |..... g`%......x| -peer0.org1.example.com | 00000030 ac 3e 54 fc 8e 18 e7 a7 73 c5 a3 ff cc a1 4e 85 |.>T.....s.....N.| -peer0.org1.example.com | 00000040 b0 26 5f fe 7f ab |.&_...|" -peer0.org1.example.com | "2019-05-02 01:31:16.873 UTC [cauthdsl] func2 -> DEBU 2309 0xc002220910 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.873 UTC [cauthdsl] func1 -> DEBU 230a 0xc002220910 gate 1556760676869899600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:16.874 UTC [policies] Evaluate -> DEBU 230b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:16.876 UTC [policies] Evaluate -> DEBU 230c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:16.876 UTC [policies] Evaluate -> DEBU 230d Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:16.877 UTC [policies] Evaluate -> DEBU 230e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:16.877 UTC [blocksProvider] DeliverBlocks -> DEBU 230f [businesschannel] Adding payload to local buffer, blockNum = [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.877 UTC [gossip.state] addPayload -> DEBU 2310 [businesschannel] Adding payload to local buffer, blockNum = [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.878 UTC [gossip.state] addPayload -> DEBU 2311 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-05-02 01:31:16.878 UTC [blocksProvider] DeliverBlocks -> DEBU 2312 [businesschannel] Gossiping block [7], peers number [3]" -peer0.org1.example.com | "2019-05-02 01:31:16.878 UTC [gossip.channel] AddToMsgStore -> DEBU 2313 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-05-02 01:31:16.879 UTC [gossip.pull] Add -> DEBU 2314 Added 7, total items: 7" -peer0.org1.example.com | "2019-05-02 01:31:16.879 UTC [gossip.state] deliverPayloads -> DEBU 2315 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.879 UTC [gossip.state] deliverPayloads -> DEBU 2316 [businesschannel] Transferring block [7] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-05-02 01:31:16.880 UTC [gossip.privdata] StoreBlock -> INFO 2317 [businesschannel] Received block [7] from buffer" -peer0.org1.example.com | "2019-05-02 01:31:16.880 UTC [gossip.privdata] StoreBlock -> DEBU 2318 [businesschannel] Validating block [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.880 UTC [committer.txvalidator] Validate -> DEBU 2319 [businesschannel] START Block Validation for block [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.881 UTC [committer.txvalidator] Validate -> DEBU 231c expecting 1 block validation responses" -peer0.org1.example.com | "2019-05-02 01:31:16.881 UTC [msp.identity] Verify -> DEBU 231a Verify: digest = 00000000 fc ff 39 04 73 5f f2 e7 22 8c 8d 03 43 80 10 39 |..9.s_.."...C..9| -peer0.org1.example.com | 00000010 39 de 51 1a 50 4b 65 5f ca e2 8f 95 ab b2 6a 11 |9.Q.PKe_......j.|" -peer0.org1.example.com | "2019-05-02 01:31:16.883 UTC [msp.identity] Verify -> DEBU 231e Verify: sig = 00000000 30 44 02 20 31 63 e7 d7 ca 29 06 4b 0c b8 2f d3 |0D. 1c...).K../.| -peer0.org1.example.com | 00000010 cf 33 24 de af a1 d9 80 f5 d6 88 2b be 6e 9b d6 |.3$........+.n..| -peer0.org1.example.com | 00000020 02 56 c7 d3 02 20 37 96 4f d3 5d 67 35 f9 62 31 |.V... 7.O.]g5.b1| -peer0.org1.example.com | 00000030 4e a5 a9 f8 41 75 9e 28 28 65 7f 20 73 9f 6e ce |N...Au.((e. s.n.| -peer0.org1.example.com | 00000040 89 1e b4 1b 9d da |......|" -peer0.org1.example.com | "2019-05-02 01:31:16.881 UTC [gossip.comm] func1 -> DEBU 231b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.881 UTC [committer.txvalidator] validateTx -> DEBU 231d [businesschannel] validateTx starts for block 0xc0030ddfc0 env 0xc002d2a230 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:16.884 UTC [protoutils] ValidateTransaction -> DEBU 231f ValidateTransactionEnvelope starts for envelope 0xc002d2a230" -peer0.org1.example.com | "2019-05-02 01:31:16.885 UTC [protoutils] ValidateTransaction -> DEBU 2320 Header is channel_header:"\010\003\032\014\010\342\220\251\346\005\020\234\223\310\363\002\"\017businesschannel*@1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\246EoS\362g\377\022\267\335\2744f~e\033\217\2667\230\274\357\241\317" " -peer0.org1.example.com | "2019-05-02 01:31:16.885 UTC [protoutils] validateChannelHeader -> DEBU 2321 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:16.885 UTC [protoutils] checkSignatureFromCreator -> DEBU 2322 begin" -peer0.org1.example.com | "2019-05-02 01:31:16.885 UTC [msp] GetManagerForChain -> DEBU 2323 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:16.885 UTC [protoutils] checkSignatureFromCreator -> DEBU 2324 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:16.885 UTC [protoutils] checkSignatureFromCreator -> DEBU 2325 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:16.885 UTC [msp.identity] Verify -> DEBU 2326 Verify: digest = 00000000 ae 68 b2 66 52 f0 23 85 03 d1 e6 d7 a5 7a e1 b1 |.h.fR.#......z..| -peer0.org1.example.com | 00000010 c9 9e 4a 42 17 65 4d 07 2c 58 78 00 bb 50 3b d1 |..JB.eM.,Xx..P;.|" -peer0.org1.example.com | "2019-05-02 01:31:16.885 UTC [msp.identity] Verify -> DEBU 2327 Verify: sig = 00000000 30 45 02 21 00 de e4 42 2b 7e c5 77 9f 6f 46 48 |0E.!...B+~.w.oFH| -peer0.org1.example.com | 00000010 81 4a aa d6 c3 23 79 c6 9a f9 43 c1 7c 47 0a 1d |.J...#y...C.|G..| -peer0.org1.example.com | 00000020 3b ab f7 cc ec 02 20 7d be 8f 68 b0 dc 63 ed 2b |;..... }..h..c.+| -peer0.org1.example.com | 00000030 fa 38 90 fb c4 6a 77 16 1d 4a 82 fc ef c9 ec 9c |.8...jw..J......| -peer0.org1.example.com | 00000040 a1 3e fb a4 7a 34 d4 |.>..z4.|" -peer0.org1.example.com | "2019-05-02 01:31:16.886 UTC [protoutils] checkSignatureFromCreator -> DEBU 2328 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:16.886 UTC [protoutils] validateEndorserTransaction -> DEBU 2329 validateEndorserTransaction starts for data 0xc0031dc800, header channel_header:"\010\003\032\014\010\342\220\251\346\005\020\234\223\310\363\002\"\017businesschannel*@1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\246EoS\362g\377\022\267\335\2744f~e\033\217\2667\230\274\357\241\317" " -peer0.org1.example.com | "2019-05-02 01:31:16.886 UTC [protoutils] validateEndorserTransaction -> DEBU 232a validateEndorserTransaction info: there are 1 actions" -peer0.org1.example.com | "2019-05-02 01:31:16.886 UTC [protoutils] validateEndorserTransaction -> DEBU 232b validateEndorserTransaction info: signature header is valid" -peer0.org1.example.com | "2019-05-02 01:31:16.886 UTC [protoutils] ValidateTransaction -> DEBU 232c ValidateTransactionEnvelope returns err %!s()" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [committer.txvalidator] validateTx -> DEBU 232d Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 232e retrieveTransactionByID() - txId = [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183]" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [committer.txvalidator] validateTx -> DEBU 232f Validating transaction with plugins" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [committer.txvalidator] Dispatch -> DEBU 2330 [businesschannel] Dispatch starts for bytes 0xc000333000" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [msp.identity] Verify -> DEBU 2331 Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -peer0.org1.example.com | 00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2332 constructing new query executor txid = [80629d70-6e13-4a48-ae7a-b58983117c56]" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [msp.identity] Verify -> DEBU 2333 Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -peer0.org1.example.com | 00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -peer0.org1.example.com | 00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -peer0.org1.example.com | 00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -peer0.org1.example.com | 00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [stateleveldb] GetState -> DEBU 2334 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [stateleveldb] GetState -> DEBU 2335 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [stateleveldb] GetState -> DEBU 2336 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [stateleveldb] GetState -> DEBU 2337 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" -peer0.org1.example.com | "2019-05-02 01:31:16.887 UTC [msp] DeserializeIdentity -> DEBU 2338 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [stateleveldb] GetState -> DEBU 2339 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [lockbasedtxmgr] Done -> DEBU 233a Done with transaction simulation / query execution [80629d70-6e13-4a48-ae7a-b58983117c56]" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [msp] DeserializeIdentity -> DEBU 233b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 233c Validating Tx 1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183, seq 0 out of 1 in block 7 for channel businesschannel with validation plugin vscc with plugin" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 233d constructing new query executor txid = [cb1bae8d-ee32-4b62-b605-d7d577175e0e]" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 233e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [lockbasedtxmgr] Done -> DEBU 233f Done with transaction simulation / query execution [cb1bae8d-ee32-4b62-b605-d7d577175e0e]" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2340 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2341 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [policies] Evaluate -> DEBU 2342 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func1 -> DEBU 2343 0xc0021eb220 gate 1556760676888326500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [policies] Evaluate -> DEBU 2344 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2345 0xc0021eb220 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [policies] Evaluate -> DEBU 2346 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2347 0xc0021eb220 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func1 -> DEBU 2348 0xc0021d4e20 gate 1556760676888426400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2349 0xc0021eb220 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 234a 0xc0021d4e20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [msp.identity] Verify -> DEBU 234b Verify: digest = 00000000 ed 44 8a 5d 28 e7 27 d2 86 42 a0 06 fe 24 67 52 |.D.](.'..B...$gR| -peer0.org1.example.com | 00000010 25 a0 35 8a f5 2c a4 cd 2a a3 d7 c5 83 9e 53 e6 |%.5..,..*.....S.|" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 234c 0xc0021d4e20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [msp.identity] Verify -> DEBU 234d Verify: sig = 00000000 30 44 02 20 23 47 83 1e bb 3e be 6c 3a 4a 3b 89 |0D. #G...>.l:J;.| -peer0.org1.example.com | 00000010 84 49 fe 9c af 60 2c c2 23 94 d7 07 15 16 e9 e6 |.I...`,.#.......| -peer0.org1.example.com | 00000020 20 3f ed f9 02 20 62 72 e0 db 5e 78 c4 2e 83 e7 | ?... br..^x....| -peer0.org1.example.com | 00000030 7d d3 2b b9 55 43 88 de 1c 61 3c f5 ba 07 71 a5 |}.+.UC...a<...q.| -peer0.org1.example.com | 00000040 dd 98 f6 48 0f 0f |...H..|" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 234e 0xc0021d4e20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [msp.identity] Verify -> DEBU 234f Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -peer0.org1.example.com | 00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2350 0xc0021eb220 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2351 0xc0021eb220 signed by 1 principal evaluation starts (used [true])" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2352 0xc0021eb220 skipping identity 0 because it has already been used" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2353 0xc0021eb220 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:16.889 UTC [cauthdsl] func1 -> DEBU 2354 0xc0021eb220 gate 1556760676888326500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:16.889 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2355 constructing new query executor txid = [93aebac9-04e8-426b-8fe7-460229bc2e01]" -peer0.org1.example.com | "2019-05-02 01:31:16.889 UTC [lockbasedtxmgr] Done -> DEBU 2356 Done with transaction simulation / query execution [93aebac9-04e8-426b-8fe7-460229bc2e01]" -peer0.org1.example.com | "2019-05-02 01:31:16.889 UTC [vscc] Validate -> DEBU 2357 block 7, namespace: exp02, tx 0 validation results is: " -peer0.org1.example.com | "2019-05-02 01:31:16.889 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2358 Transaction 1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183 appears to be valid" -peer0.org1.example.com | "2019-05-02 01:31:16.889 UTC [committer.txvalidator] Dispatch -> DEBU 2359 [businesschannel] Dispatch completes env bytes 0xc000333000" -peer0.org1.example.com | "2019-05-02 01:31:16.890 UTC [committer.txvalidator] validateTx -> DEBU 235a [businesschannel] validateTx completes for block 0xc0030ddfc0 env 0xc002d2a230 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:16.890 UTC [committer.txvalidator] Validate -> DEBU 235b got result for idx 0, code 0" -peer0.org1.example.com | "2019-05-02 01:31:16.890 UTC [committer.txvalidator] Validate -> INFO 235c [businesschannel] Validated block [7] in 9ms" -peer0.org1.example.com | "2019-05-02 01:31:16.890 UTC [gossip.privdata] listMissingPrivateData -> DEBU 235d Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-05-02 01:31:16.891 UTC [gossip.privdata] StoreBlock -> DEBU 235e [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-05-02 01:31:16.891 UTC [kvledger] CommitWithPvtData -> DEBU 235f [businesschannel] Validating state for block [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.891 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2360 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:31:16.891 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2361 lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-05-02 01:31:16.891 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2362 Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-05-02 01:31:16.892 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2363 ValidateAndPrepareBatch() for block number = [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.892 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2364 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:16.892 UTC [valimpl] preprocessProtoBlock -> DEBU 2365 txType=ENDORSER_TRANSACTION" -peer0.org1.example.com | "2019-05-02 01:31:16.893 UTC [stateleveldb] GetState -> DEBU 2366 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:16.893 UTC [statebasedval] validateKVRead -> DEBU 2367 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" -peer0.org1.example.com | "2019-05-02 01:31:16.893 UTC [stateleveldb] GetState -> DEBU 2368 GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:16.893 UTC [statebasedval] validateKVRead -> DEBU 2369 Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" -peer0.org1.example.com | "2019-05-02 01:31:16.893 UTC [stateleveldb] GetState -> DEBU 236a GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-05-02 01:31:16.893 UTC [statebasedval] validateKVRead -> DEBU 236b Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" -peer0.org1.example.com | "2019-05-02 01:31:16.893 UTC [stateleveldb] GetState -> DEBU 236c GetState(). ns=exp02, key=b" -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [statebasedval] validateKVRead -> DEBU 236d Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 236e Block [7] Transaction index [0] TxId [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183] marked as valid by state validator. ContainsPostOrderWrites [false]" -peer0.org1.example.com | "2019-05-02 01:31:16.888 UTC [msp.identity] Verify -> DEBU 236f Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -peer0.org1.example.com | 00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -peer0.org1.example.com | 00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -peer0.org1.example.com | 00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -peer0.org1.example.com | 00000040 d4 55 93 6a 4b 9f |.U.jK.|" -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [valinternal] ApplyWriteSet -> DEBU 2370 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002f8f240), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002f8f280)}" -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [cauthdsl] func2 -> DEBU 2371 0xc0021d4e20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2372 validating rwset..." -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [cauthdsl] func1 -> DEBU 2373 0xc0021d4e20 gate 1556760676888426400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [policies] Evaluate -> DEBU 2374 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [policies] Evaluate -> DEBU 2375 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2376 postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [policies] Evaluate -> DEBU 2377 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [policies] Evaluate -> DEBU 2378 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.894 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2379 ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-05-02 01:31:16.895 UTC [kvledger] CommitWithPvtData -> DEBU 237b [businesschannel] Committing block [7] to storage" -peer0.org1.example.com | "2019-05-02 01:31:16.895 UTC [ledgerstorage] CommitWithPvtData -> DEBU 237c Writing block [7] to pvt block store" -peer0.org1.example.com | "2019-05-02 01:31:16.895 UTC [gossip.gossip] handleMessage -> DEBU 237a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:16.895 UTC [gossip.gossip] handleMessage -> DEBU 237d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.896 UTC [msp.identity] Verify -> DEBU 237e Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -peer0.org1.example.com | 00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -peer0.org1.example.com | "2019-05-02 01:31:16.896 UTC [msp.identity] Verify -> DEBU 237f Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -peer0.org1.example.com | 00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -peer0.org1.example.com | 00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -peer0.org1.example.com | 00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -peer0.org1.example.com | 00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -peer0.org1.example.com | "2019-05-02 01:31:16.898 UTC [pvtdatastorage] Prepare -> DEBU 2380 Saved 0 private data write sets for block [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.899 UTC [msp.identity] Verify -> DEBU 2381 Verify: digest = 00000000 fc ff 39 04 73 5f f2 e7 22 8c 8d 03 43 80 10 39 |..9.s_.."...C..9| -peer0.org1.example.com | 00000010 39 de 51 1a 50 4b 65 5f ca e2 8f 95 ab b2 6a 11 |9.Q.PKe_......j.|" -peer0.org1.example.com | "2019-05-02 01:31:16.899 UTC [msp.identity] Verify -> DEBU 2382 Verify: sig = 00000000 30 44 02 20 31 63 e7 d7 ca 29 06 4b 0c b8 2f d3 |0D. 1c...).K../.| -peer0.org1.example.com | 00000010 cf 33 24 de af a1 d9 80 f5 d6 88 2b be 6e 9b d6 |.3$........+.n..| -peer0.org1.example.com | 00000020 02 56 c7 d3 02 20 37 96 4f d3 5d 67 35 f9 62 31 |.V... 7.O.]g5.b1| -peer0.org1.example.com | 00000030 4e a5 a9 f8 41 75 9e 28 28 65 7f 20 73 9f 6e ce |N...Au.((e. s.n.| -peer0.org1.example.com | 00000040 89 1e b4 1b 9d da |......|" -peer0.org1.example.com | "2019-05-02 01:31:16.899 UTC [msp] DeserializeIdentity -> DEBU 2383 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.899 UTC [msp] DeserializeIdentity -> DEBU 2384 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.899 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2385 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:16.902 UTC [fsblkstorage] indexBlock -> DEBU 2386 Indexing block [blockNum=7, blockHash=[]byte{0xbc, 0xfa, 0x3c, 0x5a, 0xf3, 0x9f, 0x56, 0x93, 0x3b, 0x6f, 0xab, 0xd3, 0xf7, 0xd1, 0x48, 0x7b, 0xa0, 0x71, 0x3f, 0x9, 0x7d, 0xfc, 0x8, 0x82, 0xd0, 0xc4, 0xc7, 0x31, 0xfc, 0x30, 0x55, 0x44} txOffsets= -peer0.org1.example.com | txId=1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183 locPointer=offset=70, bytesLength=3044 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-05-02 01:31:16.902 UTC [fsblkstorage] indexBlock -> DEBU 2387 Adding txLoc [fileSuffixNum=0, offset=90641, bytesLength=3044] for tx ID: [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183] to txid-index" -peer0.org1.example.com | "2019-05-02 01:31:16.902 UTC [fsblkstorage] indexBlock -> DEBU 2388 Adding txLoc [fileSuffixNum=0, offset=90641, bytesLength=3044] for tx number:[0] ID: [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183] to blockNumTranNum index" -peer0.org1.example.com | "2019-05-02 01:31:16.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2389 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.903 UTC [msp] DeserializeIdentity -> DEBU 238a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.905 UTC [msp] DeserializeIdentity -> DEBU 238b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.906 UTC [msp] DeserializeIdentity -> DEBU 238c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.908 UTC [msp] DeserializeIdentity -> DEBU 238d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.909 UTC [fsblkstorage] updateCheckpoint -> DEBU 238e Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94622], isChainEmpty=[false], lastBlockNumber=[7]" -peer0.org1.example.com | "2019-05-02 01:31:16.909 UTC [pvtdatastorage] Commit -> DEBU 238f Committing private data for block [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.909 UTC [gossip.comm] Send -> DEBU 2390 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:16.911 UTC [msp] DeserializeIdentity -> DEBU 2391 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.911 UTC [msp] DeserializeIdentity -> DEBU 2392 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.912 UTC [gossip.comm] sendToEndpoint -> DEBU 2393 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.913 UTC [gossip.comm] sendToEndpoint -> DEBU 2395 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:16.913 UTC [pvtdatastorage] Commit -> DEBU 2396 Committed private data for block [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.914 UTC [kvledger] CommitWithPvtData -> DEBU 2397 [businesschannel] Committing block [7] transactions to state database" -peer0.org1.example.com | "2019-05-02 01:31:16.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2394 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.914 UTC [lockbasedtxmgr] Commit -> DEBU 2398 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:16.915 UTC [lockbasedtxmgr] Commit -> DEBU 239a Committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:16.916 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 239b Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-05-02 01:31:16.915 UTC [policies] Evaluate -> DEBU 2399 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.916 UTC [lockbasedtxmgr] Commit -> DEBU 239c Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:16.917 UTC [stateleveldb] ApplyUpdates -> DEBU 239e Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -peer0.org1.example.com | "2019-05-02 01:31:16.917 UTC [stateleveldb] ApplyUpdates -> DEBU 239f Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -peer0.org1.example.com | "2019-05-02 01:31:16.917 UTC [policies] Evaluate -> DEBU 239d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:16.918 UTC [msp] DeserializeIdentity -> DEBU 23a0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.919 UTC [policies] Evaluate -> DEBU 23a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.919 UTC [cauthdsl] func1 -> DEBU 23a2 0xc00214f3f0 gate 1556760676919890500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:16.920 UTC [cauthdsl] func2 -> DEBU 23a3 0xc00214f3f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:16.920 UTC [cauthdsl] func2 -> DEBU 23a4 0xc00214f3f0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:16.920 UTC [cauthdsl] func2 -> DEBU 23a5 0xc00214f3f0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.921 UTC [msp.identity] Verify -> DEBU 23a6 Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -peer0.org1.example.com | 00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -peer0.org1.example.com | "2019-05-02 01:31:16.921 UTC [msp.identity] Verify -> DEBU 23a7 Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -peer0.org1.example.com | 00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -peer0.org1.example.com | 00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -peer0.org1.example.com | 00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -peer0.org1.example.com | 00000040 d4 55 93 6a 4b 9f |.U.jK.|" -peer0.org1.example.com | "2019-05-02 01:31:16.922 UTC [cauthdsl] func2 -> DEBU 23a8 0xc00214f3f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.922 UTC [cauthdsl] func1 -> DEBU 23a9 0xc00214f3f0 gate 1556760676919890500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:16.922 UTC [policies] Evaluate -> DEBU 23aa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.922 UTC [policies] Evaluate -> DEBU 23ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.923 UTC [policies] Evaluate -> DEBU 23ac Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.923 UTC [policies] Evaluate -> DEBU 23ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.923 UTC [msp] DeserializeIdentity -> DEBU 23ae Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.924 UTC [msp] DeserializeIdentity -> DEBU 23af Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23b0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:16.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23b1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23b2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.926 UTC [policies] Evaluate -> DEBU 23b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.926 UTC [policies] Evaluate -> DEBU 23b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:16.927 UTC [policies] Evaluate -> DEBU 23b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.927 UTC [cauthdsl] func1 -> DEBU 23b6 0xc002146fe0 gate 1556760676927709500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:16.928 UTC [cauthdsl] func2 -> DEBU 23b7 0xc002146fe0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:16.928 UTC [cauthdsl] func2 -> DEBU 23b8 0xc002146fe0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:16.928 UTC [cauthdsl] func2 -> DEBU 23b9 0xc002146fe0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.929 UTC [msp.identity] Verify -> DEBU 23ba Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -peer0.org1.example.com | 00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -peer0.org1.example.com | "2019-05-02 01:31:16.929 UTC [msp.identity] Verify -> DEBU 23bb Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -peer0.org1.example.com | 00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -peer0.org1.example.com | 00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -peer0.org1.example.com | 00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -peer0.org1.example.com | 00000040 f7 8f 39 95 02 eb |..9...|" -peer0.org1.example.com | "2019-05-02 01:31:16.930 UTC [cauthdsl] func2 -> DEBU 23bc 0xc002146fe0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.930 UTC [cauthdsl] func1 -> DEBU 23bd 0xc002146fe0 gate 1556760676927709500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:16.930 UTC [policies] Evaluate -> DEBU 23be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.931 UTC [policies] Evaluate -> DEBU 23bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.931 UTC [policies] Evaluate -> DEBU 23c0 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.931 UTC [policies] Evaluate -> DEBU 23c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.932 UTC [gossip.gossip] handleMessage -> DEBU 23c2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:16.932 UTC [gossip.gossip] handleMessage -> DEBU 23c3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.933 UTC [msp] DeserializeIdentity -> DEBU 23c4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.933 UTC [msp] DeserializeIdentity -> DEBU 23c5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.934 UTC [msp] DeserializeIdentity -> DEBU 23c6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:16.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23c9 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23ca Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.919 UTC [msp] DeserializeIdentity -> DEBU 23c8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.937 UTC [policies] Evaluate -> DEBU 23cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.938 UTC [policies] Evaluate -> DEBU 23cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:16.938 UTC [gossip.pull] Hello -> DEBU 23cc Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:16.939 UTC [policies] Evaluate -> DEBU 23ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.939 UTC [cauthdsl] func1 -> DEBU 23d1 0xc0002ae2a0 gate 1556760676939954600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:16.940 UTC [cauthdsl] func2 -> DEBU 23d2 0xc0002ae2a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:16.940 UTC [cauthdsl] func2 -> DEBU 23d3 0xc0002ae2a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:16.939 UTC [msp] DeserializeIdentity -> DEBU 23cf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.939 UTC [lockbasedtxmgr] Commit -> DEBU 23d0 Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-05-02 01:31:16.941 UTC [cauthdsl] func2 -> DEBU 23d4 0xc0002ae2a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.942 UTC [msp.identity] Verify -> DEBU 23d8 Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -peer0.org1.example.com | 00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -peer0.org1.example.com | "2019-05-02 01:31:16.942 UTC [msp.identity] Verify -> DEBU 23d9 Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -peer0.org1.example.com | 00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -peer0.org1.example.com | 00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -peer0.org1.example.com | 00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -peer0.org1.example.com | 00000040 d4 55 93 6a 4b 9f |.U.jK.|" -peer0.org1.example.com | "2019-05-02 01:31:16.941 UTC [msp] DeserializeIdentity -> DEBU 23d5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.942 UTC [cauthdsl] func2 -> DEBU 23da 0xc0002ae2a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.943 UTC [cauthdsl] func1 -> DEBU 23db 0xc0002ae2a0 gate 1556760676939954600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:16.943 UTC [gossip.comm] Send -> DEBU 23dc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:16.943 UTC [policies] Evaluate -> DEBU 23dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.944 UTC [policies] Evaluate -> DEBU 23de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.944 UTC [policies] Evaluate -> DEBU 23e0 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.944 UTC [policies] Evaluate -> DEBU 23e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.944 UTC [gossip.comm] sendToEndpoint -> DEBU 23df Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.945 UTC [gossip.comm] sendToEndpoint -> DEBU 23e2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:16.945 UTC [msp.identity] Verify -> DEBU 23e3 Verify: digest = 00000000 fc ff 39 04 73 5f f2 e7 22 8c 8d 03 43 80 10 39 |..9.s_.."...C..9| -peer0.org1.example.com | 00000010 39 de 51 1a 50 4b 65 5f ca e2 8f 95 ab b2 6a 11 |9.Q.PKe_......j.|" -peer0.org1.example.com | "2019-05-02 01:31:16.945 UTC [msp.identity] Verify -> DEBU 23e4 Verify: sig = 00000000 30 44 02 20 31 63 e7 d7 ca 29 06 4b 0c b8 2f d3 |0D. 1c...).K../.| -peer0.org1.example.com | 00000010 cf 33 24 de af a1 d9 80 f5 d6 88 2b be 6e 9b d6 |.3$........+.n..| -peer0.org1.example.com | 00000020 02 56 c7 d3 02 20 37 96 4f d3 5d 67 35 f9 62 31 |.V... 7.O.]g5.b1| -peer0.org1.example.com | 00000030 4e a5 a9 f8 41 75 9e 28 28 65 7f 20 73 9f 6e ce |N...Au.((e. s.n.| -peer0.org1.example.com | 00000040 89 1e b4 1b 9d da |......|" -peer0.org1.example.com | "2019-05-02 01:31:16.942 UTC [lockbasedtxmgr] func1 -> DEBU 23d7 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-05-02 01:31:16.942 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 23d6 Preparing potential purge list working-set for expiringAtBlk [8]" -peer0.org1.example.com | "2019-05-02 01:31:16.946 UTC [msp.identity] Verify -> DEBU 23e5 Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -peer0.org1.example.com | 00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -peer0.org1.example.com | "2019-05-02 01:31:16.947 UTC [msp.identity] Verify -> DEBU 23e8 Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -peer0.org1.example.com | 00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -peer0.org1.example.com | 00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -peer0.org1.example.com | 00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -peer0.org1.example.com | 00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -peer0.org1.example.com | "2019-05-02 01:31:16.948 UTC [msp] DeserializeIdentity -> DEBU 23e9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.948 UTC [msp] DeserializeIdentity -> DEBU 23ea Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.947 UTC [kvledger] CommitWithPvtData -> DEBU 23e6 [businesschannel] Committing block [7] transactions to history database" -peer0.org1.example.com | "2019-05-02 01:31:16.947 UTC [leveldbhelper] GetIterator -> DEBU 23e7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:31:16.949 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23eb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:16.950 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23ee Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.950 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23ef Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:16.949 UTC [historyleveldb] Commit -> DEBU 23ec Channel [businesschannel]: Updating history database for blockNo [7] with [1] transactions" -peer0.org1.example.com | "2019-05-02 01:31:16.949 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 23ed No expiry entry found for expiringAtBlk [8]" -peer0.org1.example.com | "2019-05-02 01:31:16.951 UTC [policies] Evaluate -> DEBU 23f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.951 UTC [policies] Evaluate -> DEBU 23f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:16.951 UTC [policies] Evaluate -> DEBU 23f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:16.952 UTC [cauthdsl] func1 -> DEBU 23f3 0xc0002163c0 gate 1556760676952215100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:16.952 UTC [cauthdsl] func2 -> DEBU 23f4 0xc0002163c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:16.952 UTC [cauthdsl] func2 -> DEBU 23f5 0xc0002163c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:16.952 UTC [cauthdsl] func2 -> DEBU 23f6 0xc0002163c0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.952 UTC [msp.identity] Verify -> DEBU 23f7 Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -peer0.org1.example.com | 00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -peer0.org1.example.com | "2019-05-02 01:31:16.952 UTC [msp.identity] Verify -> DEBU 23f8 Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -peer0.org1.example.com | 00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -peer0.org1.example.com | 00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -peer0.org1.example.com | 00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -peer0.org1.example.com | 00000040 f7 8f 39 95 02 eb |..9...|" -peer0.org1.example.com | "2019-05-02 01:31:16.953 UTC [cauthdsl] func2 -> DEBU 23f9 0xc0002163c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:16.953 UTC [cauthdsl] func1 -> DEBU 23fa 0xc0002163c0 gate 1556760676952215100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:16.953 UTC [policies] Evaluate -> DEBU 23fb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.954 UTC [policies] Evaluate -> DEBU 23fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.954 UTC [policies] Evaluate -> DEBU 23fd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.954 UTC [policies] Evaluate -> DEBU 23fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:16.954 UTC [gossip.gossip] handleMessage -> DEBU 23ff Exiting" -peer0.org1.example.com | "2019-05-02 01:31:16.954 UTC [gossip.gossip] handleMessage -> DEBU 2400 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3811937157707965733 , Msg_type: BLOCK_MSG, digests: [7 1 2 3 4 5 6], Envelope: 54 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.954 UTC [gossip.pull] HandleMessage -> DEBU 2401 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3811937157707965733 , Msg_type: BLOCK_MSG, digests: [7 1 2 3 4 5 6], Envelope: 54 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.954 UTC [gossip.gossip] handleMessage -> DEBU 2402 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:16.955 UTC [historyleveldb] Commit -> DEBU 2403 Channel [businesschannel]: Updates committed to history database for blockNo [7]" -peer0.org1.example.com | "2019-05-02 01:31:16.955 UTC [kvledger] CommitWithPvtData -> INFO 2404 [businesschannel] Committed block [7] with 1 transaction(s) in 64ms (state_validation=3ms block_commit=19ms state_commit=33ms)" -peer0.org1.example.com | "2019-05-02 01:31:16.956 UTC [msp.identity] Sign -> DEBU 2405 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020808 " -peer0.org1.example.com | "2019-05-02 01:31:16.957 UTC [msp.identity] Sign -> DEBU 2406 Sign: digest: C14FEDF2E855610FB923A63BF8848E89273834A9F791DA93D4A0CFCD79935565 " -peer0.org1.example.com | "2019-05-02 01:31:16.958 UTC [gossip.state] commitBlock -> DEBU 2407 [businesschannel] Committed block [7] with 1 transaction(s)" -peer0.org1.example.com | "2019-05-02 01:31:16.980 UTC [gossip.election] waitForInterrupt -> DEBU 2408 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:16.980 UTC [gossip.election] IsLeader -> DEBU 2409 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:16.981 UTC [msp.identity] Sign -> DEBU 240a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510081801 " -peer0.org1.example.com | "2019-05-02 01:31:16.981 UTC [msp.identity] Sign -> DEBU 240b Sign: digest: 0B5DD07478DE45747F36EA13C5FC8CF1D4DD2E2AA47F82AA463B4CEAD692BEC8 " -peer0.org1.example.com | "2019-05-02 01:31:16.982 UTC [gossip.election] waitForInterrupt -> DEBU 240c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:16.990 UTC [msp] DeserializeIdentity -> DEBU 240d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.990 UTC [msp] DeserializeIdentity -> DEBU 240e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.991 UTC [msp] DeserializeIdentity -> DEBU 240f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.991 UTC [msp] DeserializeIdentity -> DEBU 2410 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.991 UTC [gossip.comm] Send -> DEBU 2411 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:16.992 UTC [msp] DeserializeIdentity -> DEBU 2412 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.992 UTC [msp] DeserializeIdentity -> DEBU 2414 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:16.992 UTC [gossip.comm] sendToEndpoint -> DEBU 2413 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:16.993 UTC [gossip.comm] sendToEndpoint -> DEBU 2415 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.089 UTC [gossip.gossip] handleMessage -> DEBU 2416 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.090 UTC [msp] DeserializeIdentity -> DEBU 2417 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.090 UTC [msp] DeserializeIdentity -> DEBU 2418 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.091 UTC [gossip.gossip] handleMessage -> DEBU 2419 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.100 UTC [gossip.gossip] handleMessage -> DEBU 241a Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.100 UTC [msp.identity] Verify -> DEBU 241b Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -peer0.org1.example.com | 00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -peer0.org1.example.com | "2019-05-02 01:31:17.101 UTC [msp.identity] Verify -> DEBU 241c Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -peer0.org1.example.com | 00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -peer0.org1.example.com | 00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -peer0.org1.example.com | 00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -peer0.org1.example.com | 00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -peer0.org1.example.com | "2019-05-02 01:31:17.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 241d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 241e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.102 UTC [policies] Evaluate -> DEBU 241f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.102 UTC [policies] Evaluate -> DEBU 2420 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.102 UTC [policies] Evaluate -> DEBU 2421 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.102 UTC [cauthdsl] func1 -> DEBU 2422 0xc000421c40 gate 1556760677102942300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.103 UTC [cauthdsl] func2 -> DEBU 2423 0xc000421c40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.103 UTC [cauthdsl] func2 -> DEBU 2424 0xc000421c40 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.103 UTC [cauthdsl] func2 -> DEBU 2425 0xc000421c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:17.104 UTC [cauthdsl] func2 -> DEBU 2426 0xc000421c40 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:17.104 UTC [cauthdsl] func1 -> DEBU 2427 0xc000421c40 gate 1556760677102942300 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:17.105 UTC [policies] Evaluate -> DEBU 2428 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.105 UTC [policies] Evaluate -> DEBU 2429 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.105 UTC [policies] Evaluate -> DEBU 242a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.106 UTC [cauthdsl] func1 -> DEBU 242b 0xc000472480 gate 1556760677106078800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.106 UTC [cauthdsl] func2 -> DEBU 242c 0xc000472480 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.106 UTC [cauthdsl] func2 -> DEBU 242d 0xc000472480 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.107 UTC [cauthdsl] func2 -> DEBU 242e 0xc000472480 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.107 UTC [msp.identity] Verify -> DEBU 242f Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -peer0.org1.example.com | 00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -peer0.org1.example.com | "2019-05-02 01:31:17.107 UTC [msp.identity] Verify -> DEBU 2430 Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -peer0.org1.example.com | 00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -peer0.org1.example.com | 00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -peer0.org1.example.com | 00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -peer0.org1.example.com | 00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -peer0.org1.example.com | "2019-05-02 01:31:17.107 UTC [cauthdsl] func2 -> DEBU 2431 0xc000472480 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.108 UTC [cauthdsl] func1 -> DEBU 2432 0xc000472480 gate 1556760677106078800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.108 UTC [policies] Evaluate -> DEBU 2433 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.108 UTC [policies] Evaluate -> DEBU 2434 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.109 UTC [policies] Evaluate -> DEBU 2435 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.109 UTC [policies] Evaluate -> DEBU 2436 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.109 UTC [gossip.gossip] handleMessage -> DEBU 2437 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.111 UTC [gossip.comm] func1 -> DEBU 2438 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.114 UTC [gossip.gossip] handleMessage -> DEBU 243a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.115 UTC [msp.identity] Verify -> DEBU 243b Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -peer0.org1.example.com | 00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -peer0.org1.example.com | "2019-05-02 01:31:17.114 UTC [gossip.comm] func1 -> DEBU 2439 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.115 UTC [msp.identity] Verify -> DEBU 243c Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -peer0.org1.example.com | 00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -peer0.org1.example.com | 00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -peer0.org1.example.com | 00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -peer0.org1.example.com | 00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -peer0.org1.example.com | "2019-05-02 01:31:17.116 UTC [msp] DeserializeIdentity -> DEBU 243d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.117 UTC [gossip.gossip] handleMessage -> DEBU 243e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.117 UTC [gossip.gossip] handleMessage -> DEBU 243f Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.118 UTC [msp.identity] Verify -> DEBU 2440 Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -peer0.org1.example.com | 00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -peer0.org1.example.com | "2019-05-02 01:31:17.118 UTC [msp.identity] Verify -> DEBU 2442 Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -peer0.org1.example.com | 00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -peer0.org1.example.com | 00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -peer0.org1.example.com | 00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -peer0.org1.example.com | 00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -peer0.org1.example.com | "2019-05-02 01:31:17.118 UTC [msp] DeserializeIdentity -> DEBU 2441 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.119 UTC [msp] DeserializeIdentity -> DEBU 2443 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.119 UTC [gossip.comm] Send -> DEBU 2444 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes to 2 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.120 UTC [msp] DeserializeIdentity -> DEBU 2445 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.120 UTC [msp] DeserializeIdentity -> DEBU 2446 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.120 UTC [gossip.comm] sendToEndpoint -> DEBU 2447 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.121 UTC [gossip.comm] sendToEndpoint -> DEBU 2448 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.121 UTC [gossip.comm] sendToEndpoint -> DEBU 2449 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.121 UTC [gossip.comm] sendToEndpoint -> DEBU 244a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.126 UTC [msp] DeserializeIdentity -> DEBU 244b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.126 UTC [gossip.gossip] handleMessage -> DEBU 244c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.126 UTC [gossip.gossip] handleMessage -> DEBU 244d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.127 UTC [gossip.pull] HandleMessage -> DEBU 244e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.127 UTC [gossip.pull] SendDigest -> DEBU 244f Sending BLOCK_MSG digest: [2 3 4 5 6 7 1] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:17.128 UTC [gossip.gossip] handleMessage -> DEBU 2450 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.223 UTC [endorser] ProcessProposal -> DEBU 2451 Entering: request from 192.168.240.9:41346" -peer0.org1.example.com | "2019-05-02 01:31:17.224 UTC [protoutils] ValidateProposalMessage -> DEBU 2452 ValidateProposalMessage starts for signed proposal 0xc002ce1950" -peer0.org1.example.com | "2019-05-02 01:31:17.224 UTC [protoutils] validateChannelHeader -> DEBU 2453 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:17.224 UTC [protoutils] checkSignatureFromCreator -> DEBU 2454 begin" -peer0.org1.example.com | "2019-05-02 01:31:17.224 UTC [msp] GetManagerForChain -> DEBU 2455 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:17.225 UTC [protoutils] checkSignatureFromCreator -> DEBU 2456 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -peer0.org1.example.com | "2019-05-02 01:31:17.225 UTC [protoutils] checkSignatureFromCreator -> DEBU 2457 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:17.225 UTC [msp.identity] Verify -> DEBU 2458 Verify: digest = 00000000 81 d0 10 9c 9e 2f 71 ab 43 a1 81 a4 8f 1e 5d 24 |...../q.C.....]$| -peer0.org1.example.com | 00000010 04 55 ab a4 87 51 26 c6 44 41 c1 1b 84 ce 1a 01 |.U...Q&.DA......|" -peer0.org1.example.com | "2019-05-02 01:31:17.226 UTC [msp.identity] Verify -> DEBU 2459 Verify: sig = 00000000 30 45 02 21 00 86 24 8f f6 1e eb c9 c2 b1 17 a3 |0E.!..$.........| -peer0.org1.example.com | 00000010 d9 5d c6 c9 60 fa e4 6f 91 02 3c f0 5a 5e 68 25 |.]..`..o..<.Z^h%| -peer0.org1.example.com | 00000020 a5 c8 50 9a 72 02 20 23 a9 fb 5e f7 9f 01 e7 48 |..P.r. #..^....H| -peer0.org1.example.com | 00000030 ac 76 a6 c8 b8 bf 39 ee ba ee 47 bf 67 4f 1e 5f |.v....9...G.gO._| -peer0.org1.example.com | 00000040 a3 ed e3 13 23 93 e8 |....#..|" -peer0.org1.example.com | "2019-05-02 01:31:17.226 UTC [protoutils] checkSignatureFromCreator -> DEBU 245a exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:17.226 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 245b validateChaincodeProposalMessage starts for proposal 0xc003403a40, header 0xc002ce1d60" -peer0.org1.example.com | "2019-05-02 01:31:17.227 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 245c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.227 UTC [endorser] preProcess -> DEBU 245d [businesschannel][c59b53e2] processing txid: c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76" -peer0.org1.example.com | "2019-05-02 01:31:17.227 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 245e retrieveTransactionByID() - txId = [c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76]" -peer0.org1.example.com | "2019-05-02 01:31:17.227 UTC [aclmgmt] CheckACL -> DEBU 245f acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-05-02 01:31:17.228 UTC [aclmgmt] CheckACL -> DEBU 2460 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-05-02 01:31:17.228 UTC [policies] Evaluate -> DEBU 2461 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.229 UTC [policies] Evaluate -> DEBU 2462 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.229 UTC [policies] Evaluate -> DEBU 2463 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.229 UTC [cauthdsl] func1 -> DEBU 2464 0xc00017c700 gate 1556760677229619000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.229 UTC [cauthdsl] func2 -> DEBU 2465 0xc00017c700 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.230 UTC [cauthdsl] func2 -> DEBU 2466 0xc00017c700 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.230 UTC [cauthdsl] func2 -> DEBU 2467 0xc00017c700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:17.230 UTC [cauthdsl] func2 -> DEBU 2468 0xc00017c700 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:17.230 UTC [cauthdsl] func1 -> DEBU 2469 0xc00017c700 gate 1556760677229619000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:17.231 UTC [policies] Evaluate -> DEBU 246a Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.231 UTC [policies] Evaluate -> DEBU 246b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.231 UTC [policies] Evaluate -> DEBU 246c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.232 UTC [cauthdsl] func1 -> DEBU 246d 0xc00017d480 gate 1556760677231992600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.232 UTC [cauthdsl] func2 -> DEBU 246e 0xc00017d480 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.232 UTC [cauthdsl] func2 -> DEBU 246f 0xc00017d480 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.233 UTC [cauthdsl] func2 -> DEBU 2470 0xc00017d480 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.233 UTC [msp.identity] Verify -> DEBU 2471 Verify: digest = 00000000 81 d0 10 9c 9e 2f 71 ab 43 a1 81 a4 8f 1e 5d 24 |...../q.C.....]$| -peer0.org1.example.com | 00000010 04 55 ab a4 87 51 26 c6 44 41 c1 1b 84 ce 1a 01 |.U...Q&.DA......|" -peer0.org1.example.com | "2019-05-02 01:31:17.233 UTC [msp.identity] Verify -> DEBU 2472 Verify: sig = 00000000 30 45 02 21 00 86 24 8f f6 1e eb c9 c2 b1 17 a3 |0E.!..$.........| -peer0.org1.example.com | 00000010 d9 5d c6 c9 60 fa e4 6f 91 02 3c f0 5a 5e 68 25 |.]..`..o..<.Z^h%| -peer0.org1.example.com | 00000020 a5 c8 50 9a 72 02 20 23 a9 fb 5e f7 9f 01 e7 48 |..P.r. #..^....H| -peer0.org1.example.com | 00000030 ac 76 a6 c8 b8 bf 39 ee ba ee 47 bf 67 4f 1e 5f |.v....9...G.gO._| -peer0.org1.example.com | 00000040 a3 ed e3 13 23 93 e8 |....#..|" -peer0.org1.example.com | "2019-05-02 01:31:17.234 UTC [cauthdsl] func2 -> DEBU 2473 0xc00017d480 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.234 UTC [cauthdsl] func1 -> DEBU 2474 0xc00017d480 gate 1556760677231992600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.235 UTC [policies] Evaluate -> DEBU 2475 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.235 UTC [policies] Evaluate -> DEBU 2476 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.235 UTC [policies] Evaluate -> DEBU 2477 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.235 UTC [policies] Evaluate -> DEBU 2478 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.236 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2479 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:17.236 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 247a constructing new tx simulator txid = [c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76]" -peer0.org1.example.com | "2019-05-02 01:31:17.236 UTC [endorser] SimulateProposal -> DEBU 247b [businesschannel][c59b53e2] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.237 UTC [stateleveldb] GetState -> DEBU 247c GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:17.237 UTC [endorser] callChaincode -> INFO 247d [businesschannel][c59b53e2] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.237 UTC [stateleveldb] GetState -> DEBU 247e GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:17.238 UTC [stateleveldb] GetState -> DEBU 247f GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:17.238 UTC [chaincode] Execute -> DEBU 2480 Entry" -peer0.org1.example.com | "2019-05-02 01:31:17.240 UTC [chaincode] handleMessage -> DEBU 2481 [c59b53e2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:17.240 UTC [chaincode] HandleTransaction -> DEBU 2482 [c59b53e2] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:17.240 UTC [chaincode] HandleGetState -> DEBU 2483 [c59b53e2] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:17.240 UTC [stateleveldb] GetState -> DEBU 2484 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-05-02 01:31:17.240 UTC [chaincode] HandleTransaction -> DEBU 2485 [c59b53e2] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:17.242 UTC [chaincode] handleMessage -> DEBU 2486 [c59b53e2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:17.242 UTC [chaincode] Notify -> DEBU 2487 [c59b53e2] notifying Txid:c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:17.242 UTC [chaincode] Execute -> DEBU 2488 Exit" -peer0.org1.example.com | "2019-05-02 01:31:17.243 UTC [endorser] callChaincode -> INFO 2489 [businesschannel][c59b53e2] Exit chaincode: name:"exp02" (6ms)" -peer0.org1.example.com | "2019-05-02 01:31:17.243 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 248a Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:17.243 UTC [lockbasedtxmgr] Done -> DEBU 248b Done with transaction simulation / query execution [c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76]" -peer0.org1.example.com | "2019-05-02 01:31:17.243 UTC [endorser] SimulateProposal -> DEBU 248c [businesschannel][c59b53e2] Exit" -peer0.org1.example.com | "2019-05-02 01:31:17.243 UTC [endorser] endorseProposal -> DEBU 248d [businesschannel][c59b53e2] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.243 UTC [endorser] endorseProposal -> DEBU 248e [businesschannel][c59b53e2] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-05-02 01:31:17.244 UTC [endorser] EndorseWithPlugin -> DEBU 248f Entering endorsement for {plugin: escc, channel: businesschannel, tx: c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:17.244 UTC [msp.identity] Sign -> DEBU 2490 Sign: plaintext: 0A209765B32CA7C2347A87E5B1894AA7...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:17.244 UTC [msp.identity] Sign -> DEBU 2491 Sign: digest: D655DD2BB5305D7C2DF8138305555ADA45EBEC9DB126D2D5FAE26131E51F2A4B " -peer0.org1.example.com | "2019-05-02 01:31:17.245 UTC [endorser] EndorseWithPlugin -> DEBU 2492 Exiting {plugin: escc, channel: businesschannel, tx: c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:17.245 UTC [endorser] endorseProposal -> DEBU 2493 [businesschannel][c59b53e2] Exit" -peer0.org1.example.com | "2019-05-02 01:31:17.245 UTC [lockbasedtxmgr] Done -> DEBU 2494 Done with transaction simulation / query execution [c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76]" -peer0.org1.example.com | "2019-05-02 01:31:17.245 UTC [endorser] func1 -> DEBU 2495 Exit: request from 192.168.240.9:41346" -peer0.org1.example.com | "2019-05-02 01:31:17.245 UTC [comm.grpc.server] 1 -> INFO 2496 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41346 grpc.code=OK grpc.call_duration=22.432ms -peer0.org1.example.com | "2019-05-02 01:31:17.250 UTC [grpc] infof -> DEBU 2497 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:17.250 UTC [grpc] warningf -> DEBU 2498 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41346: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:31:17.250 UTC [grpc] infof -> DEBU 2499 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:17.315 UTC [gossip.comm] func1 -> DEBU 249a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.316 UTC [gossip.gossip] handleMessage -> DEBU 249b Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.317 UTC [msp] DeserializeIdentity -> DEBU 249c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.317 UTC [msp] DeserializeIdentity -> DEBU 249d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.318 UTC [msp] DeserializeIdentity -> DEBU 249e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.319 UTC [gossip.gossip] handleMessage -> DEBU 249f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.334 UTC [gossip.comm] func1 -> DEBU 24a0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.335 UTC [gossip.gossip] handleMessage -> DEBU 24a1 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.335 UTC [msp] DeserializeIdentity -> DEBU 24a2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.336 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24a3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:17.337 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24a4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.338 UTC [gossip.comm] func1 -> DEBU 24a5 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24a6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.339 UTC [policies] Evaluate -> DEBU 24a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.339 UTC [policies] Evaluate -> DEBU 24a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.340 UTC [policies] Evaluate -> DEBU 24a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.340 UTC [cauthdsl] func1 -> DEBU 24aa 0xc00035a410 gate 1556760677340721100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.341 UTC [cauthdsl] func2 -> DEBU 24ab 0xc00035a410 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.341 UTC [cauthdsl] func2 -> DEBU 24ac 0xc00035a410 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.341 UTC [cauthdsl] func2 -> DEBU 24ad 0xc00035a410 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.342 UTC [msp.identity] Verify -> DEBU 24ae Verify: digest = 00000000 bf 19 17 87 78 42 db f7 eb cf d0 d9 08 ee e7 15 |....xB..........| -peer0.org1.example.com | 00000010 4b cc a4 95 06 41 81 d5 eb 5f 3a 7d a9 7c 14 8c |K....A..._:}.|..|" -peer0.org1.example.com | "2019-05-02 01:31:17.342 UTC [msp.identity] Verify -> DEBU 24af Verify: sig = 00000000 30 44 02 20 25 d8 a0 a8 55 64 cf d4 22 95 b0 2b |0D. %...Ud.."..+| -peer0.org1.example.com | 00000010 9d 19 2a 2d f1 ee ab c7 40 00 b0 25 7c 8c 4e e5 |..*-....@..%|.N.| -peer0.org1.example.com | 00000020 f2 77 cf 80 02 20 10 b1 5c d3 47 5b e8 91 ee aa |.w... ..\.G[....| -peer0.org1.example.com | 00000030 61 ae d2 82 b6 50 a4 6d 3d e3 76 f7 db 98 6e 95 |a....P.m=.v...n.| -peer0.org1.example.com | 00000040 5d c2 20 53 e7 b2 |]. S..|" -peer0.org1.example.com | "2019-05-02 01:31:17.343 UTC [cauthdsl] func2 -> DEBU 24b0 0xc00035a410 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.343 UTC [cauthdsl] func1 -> DEBU 24b1 0xc00035a410 gate 1556760677340721100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.343 UTC [policies] Evaluate -> DEBU 24b2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.344 UTC [policies] Evaluate -> DEBU 24b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.344 UTC [policies] Evaluate -> DEBU 24b4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.344 UTC [policies] Evaluate -> DEBU 24b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.345 UTC [msp] DeserializeIdentity -> DEBU 24b6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.345 UTC [msp] DeserializeIdentity -> DEBU 24b7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.345 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24b8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.345 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24b9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.346 UTC [policies] Evaluate -> DEBU 24ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.346 UTC [policies] Evaluate -> DEBU 24bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.347 UTC [policies] Evaluate -> DEBU 24bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.347 UTC [cauthdsl] func1 -> DEBU 24bd 0xc00035b610 gate 1556760677347734400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.348 UTC [cauthdsl] func2 -> DEBU 24be 0xc00035b610 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.348 UTC [cauthdsl] func2 -> DEBU 24bf 0xc00035b610 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.348 UTC [cauthdsl] func2 -> DEBU 24c0 0xc00035b610 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.349 UTC [msp.identity] Verify -> DEBU 24c1 Verify: digest = 00000000 bf 19 17 87 78 42 db f7 eb cf d0 d9 08 ee e7 15 |....xB..........| -peer0.org1.example.com | 00000010 4b cc a4 95 06 41 81 d5 eb 5f 3a 7d a9 7c 14 8c |K....A..._:}.|..|" -peer0.org1.example.com | "2019-05-02 01:31:17.349 UTC [msp.identity] Verify -> DEBU 24c2 Verify: sig = 00000000 30 44 02 20 25 d8 a0 a8 55 64 cf d4 22 95 b0 2b |0D. %...Ud.."..+| -peer0.org1.example.com | 00000010 9d 19 2a 2d f1 ee ab c7 40 00 b0 25 7c 8c 4e e5 |..*-....@..%|.N.| -peer0.org1.example.com | 00000020 f2 77 cf 80 02 20 10 b1 5c d3 47 5b e8 91 ee aa |.w... ..\.G[....| -peer0.org1.example.com | 00000030 61 ae d2 82 b6 50 a4 6d 3d e3 76 f7 db 98 6e 95 |a....P.m=.v...n.| -peer0.org1.example.com | 00000040 5d c2 20 53 e7 b2 |]. S..|" -peer0.org1.example.com | "2019-05-02 01:31:17.350 UTC [cauthdsl] func2 -> DEBU 24c3 0xc00035b610 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.350 UTC [cauthdsl] func1 -> DEBU 24c4 0xc00035b610 gate 1556760677347734400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.351 UTC [policies] Evaluate -> DEBU 24c5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.351 UTC [policies] Evaluate -> DEBU 24c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.352 UTC [policies] Evaluate -> DEBU 24c7 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.352 UTC [policies] Evaluate -> DEBU 24c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.352 UTC [gossip.gossip] handleMessage -> DEBU 24c9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.353 UTC [gossip.gossip] handleMessage -> DEBU 24ca Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.353 UTC [msp] DeserializeIdentity -> DEBU 24cb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.354 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:17.355 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24cd Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.357 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24cf Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.357 UTC [policies] Evaluate -> DEBU 24d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.357 UTC [msp] DeserializeIdentity -> DEBU 24ce Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.358 UTC [policies] Evaluate -> DEBU 24d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.360 UTC [policies] Evaluate -> DEBU 24d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.360 UTC [cauthdsl] func1 -> DEBU 24d3 0xc0002a1260 gate 1556760677360840000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.361 UTC [cauthdsl] func2 -> DEBU 24d4 0xc0002a1260 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.361 UTC [cauthdsl] func2 -> DEBU 24d5 0xc0002a1260 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.361 UTC [cauthdsl] func2 -> DEBU 24d6 0xc0002a1260 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.362 UTC [msp.identity] Verify -> DEBU 24d7 Verify: digest = 00000000 bf 19 17 87 78 42 db f7 eb cf d0 d9 08 ee e7 15 |....xB..........| -peer0.org1.example.com | 00000010 4b cc a4 95 06 41 81 d5 eb 5f 3a 7d a9 7c 14 8c |K....A..._:}.|..|" -peer0.org1.example.com | "2019-05-02 01:31:17.362 UTC [msp.identity] Verify -> DEBU 24d8 Verify: sig = 00000000 30 44 02 20 25 d8 a0 a8 55 64 cf d4 22 95 b0 2b |0D. %...Ud.."..+| -peer0.org1.example.com | 00000010 9d 19 2a 2d f1 ee ab c7 40 00 b0 25 7c 8c 4e e5 |..*-....@..%|.N.| -peer0.org1.example.com | 00000020 f2 77 cf 80 02 20 10 b1 5c d3 47 5b e8 91 ee aa |.w... ..\.G[....| -peer0.org1.example.com | 00000030 61 ae d2 82 b6 50 a4 6d 3d e3 76 f7 db 98 6e 95 |a....P.m=.v...n.| -peer0.org1.example.com | 00000040 5d c2 20 53 e7 b2 |]. S..|" -peer0.org1.example.com | "2019-05-02 01:31:17.363 UTC [cauthdsl] func2 -> DEBU 24d9 0xc0002a1260 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.363 UTC [cauthdsl] func1 -> DEBU 24da 0xc0002a1260 gate 1556760677360840000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.363 UTC [policies] Evaluate -> DEBU 24db Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.364 UTC [policies] Evaluate -> DEBU 24dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.364 UTC [policies] Evaluate -> DEBU 24dd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.365 UTC [policies] Evaluate -> DEBU 24de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.365 UTC [msp] DeserializeIdentity -> DEBU 24df Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.366 UTC [gossip.gossip] handleMessage -> DEBU 24e0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.367 UTC [msp] DeserializeIdentity -> DEBU 24e1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.367 UTC [gossip.comm] Send -> DEBU 24e2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.368 UTC [gossip.comm] sendToEndpoint -> DEBU 24e3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.374 UTC [gossip.comm] sendToEndpoint -> DEBU 24e4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.376 UTC [gossip.comm] sendToEndpoint -> DEBU 24e5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.377 UTC [gossip.comm] sendToEndpoint -> DEBU 24e6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.377 UTC [msp] DeserializeIdentity -> DEBU 24e7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.378 UTC [msp] DeserializeIdentity -> DEBU 24e8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.433 UTC [gossip.gossip] handleMessage -> DEBU 24e9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.434 UTC [gossip.pull] HandleMessage -> DEBU 24ea GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.434 UTC [gossip.pull] SendDigest -> DEBU 24eb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:17.434 UTC [gossip.gossip] handleMessage -> DEBU 24ec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.444 UTC [gossip.gossip] handleMessage -> DEBU 24ed Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.444 UTC [gossip.gossip] handleMessage -> DEBU 24ee Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.445 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24ef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.445 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24f0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:17.445 UTC [msp.identity] Verify -> DEBU 24f1 Verify: digest = 00000000 74 51 fb 04 9f 73 01 c8 d2 5e 0b 04 90 10 3a ee |tQ...s...^....:.| -peer0.org1.example.com | 00000010 fc c8 fc 1b 76 8c 52 8d 2c cb 80 dd 43 54 5e 1b |....v.R.,...CT^.|" -peer0.org1.example.com | "2019-05-02 01:31:17.446 UTC [msp.identity] Verify -> DEBU 24f2 Verify: sig = 00000000 30 45 02 21 00 81 df 22 86 db ee 77 5c 55 26 98 |0E.!..."...w\U&.| -peer0.org1.example.com | 00000010 e4 ad 80 a5 ec 62 65 17 95 3a f5 a8 96 a9 51 5a |.....be..:....QZ| -peer0.org1.example.com | 00000020 5c 1d 88 de 0d 02 20 5f ed 13 93 4d e1 e2 77 ec |\..... _...M..w.| -peer0.org1.example.com | 00000030 15 3b 53 ad d1 40 66 b6 a9 24 a0 c6 a7 7e 20 6c |.;S..@f..$...~ l| -peer0.org1.example.com | 00000040 bd 4f 7e 2b f2 bb 76 |.O~+..v|" -peer0.org1.example.com | "2019-05-02 01:31:17.446 UTC [msp.identity] Verify -> DEBU 24f3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:17.447 UTC [msp.identity] Verify -> DEBU 24f4 Verify: sig = 00000000 30 44 02 20 3c 99 1a 5e a8 31 e3 65 d0 9e 44 90 |0D. <..^.1.e..D.| -peer0.org1.example.com | 00000010 a2 c9 a0 17 7f 94 55 df 0a 3c 08 02 ce 34 db 09 |......U..<...4..| -peer0.org1.example.com | 00000020 db 37 7c 59 02 20 14 6c ff 82 c2 bf 8b c3 af 1e |.7|Y. .l........| -peer0.org1.example.com | 00000030 2f 6a 6a 2c a4 e6 cb ae eb 05 e6 cd cb 04 99 47 |/jj,...........G| -peer0.org1.example.com | 00000040 d5 2f 69 76 80 9f |./iv..|" -peer0.org1.example.com | "2019-05-02 01:31:17.447 UTC [gossip.discovery] handleAliveMessage -> DEBU 24f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.448 UTC [gossip.discovery] learnExistingMembers -> DEBU 24f6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:17.448 UTC [gossip.discovery] learnExistingMembers -> DEBU 24f7 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 " -peer0.org1.example.com | "2019-05-02 01:31:17.448 UTC [gossip.discovery] learnExistingMembers -> DEBU 24f8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 " -peer0.org1.example.com | "2019-05-02 01:31:17.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 24f9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:17.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fa Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.450 UTC [gossip.discovery] handleAliveMessage -> DEBU 24fb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.452 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24fc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.454 UTC [gossip.discovery] sendMemResponse -> DEBU 24fd Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:17.454 UTC [msp] DeserializeIdentity -> DEBU 24fe Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.455 UTC [msp] DeserializeIdentity -> DEBU 24ff Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.456 UTC [gossip.comm] Send -> DEBU 2500 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.457 UTC [gossip.discovery] sendMemResponse -> DEBU 2501 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:17.458 UTC [gossip.comm] sendToEndpoint -> DEBU 2502 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.462 UTC [gossip.comm] sendToEndpoint -> DEBU 2503 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.516 UTC [gossip.comm] func1 -> DEBU 2504 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.516 UTC [gossip.gossip] handleMessage -> DEBU 2505 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.517 UTC [gossip.pull] HandleMessage -> DEBU 2506 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.517 UTC [msp] DeserializeIdentity -> DEBU 2507 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.517 UTC [msp] DeserializeIdentity -> DEBU 2508 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.518 UTC [msp] DeserializeIdentity -> DEBU 2509 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.518 UTC [msp] DeserializeIdentity -> DEBU 250a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.518 UTC [msp] DeserializeIdentity -> DEBU 250b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.519 UTC [msp] DeserializeIdentity -> DEBU 250c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.519 UTC [gossip.pull] SendDigest -> DEBU 250d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:17.519 UTC [gossip.gossip] handleMessage -> DEBU 250e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.525 UTC [gossip.comm] func1 -> DEBU 250f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.525 UTC [gossip.gossip] handleMessage -> DEBU 2510 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.525 UTC [gossip.gossip] handleMessage -> DEBU 2511 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2512 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.526 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2513 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:17.526 UTC [msp] DeserializeIdentity -> DEBU 2514 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2515 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:17.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2516 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2517 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.528 UTC [policies] Evaluate -> DEBU 2518 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.528 UTC [policies] Evaluate -> DEBU 2519 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.528 UTC [policies] Evaluate -> DEBU 251a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.529 UTC [cauthdsl] func1 -> DEBU 251b 0xc000378f80 gate 1556760677529091500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.529 UTC [cauthdsl] func2 -> DEBU 251c 0xc000378f80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.529 UTC [cauthdsl] func2 -> DEBU 251d 0xc000378f80 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.530 UTC [cauthdsl] func2 -> DEBU 251e 0xc000378f80 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.530 UTC [msp.identity] Verify -> DEBU 251f Verify: digest = 00000000 02 e5 25 46 47 91 7d 93 32 60 d6 a1 5c 19 ba 88 |..%FG.}.2`..\...| -peer0.org1.example.com | 00000010 4a 51 f7 f2 c4 aa 99 d6 4b 0c 50 e7 3c 78 62 91 |JQ......K.P. DEBU 2520 Verify: sig = 00000000 30 45 02 21 00 d5 b7 31 db 27 eb 7f 3f 30 0a bb |0E.!...1.'..?0..| -peer0.org1.example.com | 00000010 fe 1c f3 b3 48 1a cf b7 c9 45 1a ca 8f b0 7a 89 |....H....E....z.| -peer0.org1.example.com | 00000020 04 dd 4b d3 9d 02 20 67 17 25 58 1e 22 10 b0 16 |..K... g.%X."...| -peer0.org1.example.com | 00000030 ae 5c e5 4d d7 e3 c7 12 47 76 dd cd 99 b7 39 40 |.\.M....Gv....9@| -peer0.org1.example.com | 00000040 94 f6 72 01 53 3f 05 |..r.S?.|" -peer0.org1.example.com | "2019-05-02 01:31:17.531 UTC [cauthdsl] func2 -> DEBU 2521 0xc000378f80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.531 UTC [cauthdsl] func1 -> DEBU 2522 0xc000378f80 gate 1556760677529091500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.533 UTC [policies] Evaluate -> DEBU 2523 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.534 UTC [policies] Evaluate -> DEBU 2524 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.534 UTC [policies] Evaluate -> DEBU 2525 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.534 UTC [policies] Evaluate -> DEBU 2526 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 2527 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 2528 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:17.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 2529 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 " -peer0.org1.example.com | "2019-05-02 01:31:17.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 252a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 " -peer0.org1.example.com | "2019-05-02 01:31:17.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 252b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:17.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 252c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.536 UTC [gossip.discovery] handleAliveMessage -> DEBU 252d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.537 UTC [gossip.discovery] sendMemResponse -> DEBU 252e Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:17.537 UTC [msp] DeserializeIdentity -> DEBU 252f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.538 UTC [msp] DeserializeIdentity -> DEBU 2530 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.538 UTC [msp] DeserializeIdentity -> DEBU 2531 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.539 UTC [gossip.comm] Send -> DEBU 2532 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.539 UTC [gossip.discovery] sendMemResponse -> DEBU 2533 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:17.540 UTC [gossip.comm] sendToEndpoint -> DEBU 2534 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.547 UTC [gossip.comm] sendToEndpoint -> DEBU 2535 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2536 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.563 UTC [endorser] ProcessProposal -> DEBU 2537 Entering: request from 192.168.240.9:41350" -peer0.org1.example.com | "2019-05-02 01:31:17.563 UTC [protoutils] ValidateProposalMessage -> DEBU 2538 ValidateProposalMessage starts for signed proposal 0xc0025957c0" -peer0.org1.example.com | "2019-05-02 01:31:17.563 UTC [protoutils] validateChannelHeader -> DEBU 2539 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:17.563 UTC [protoutils] checkSignatureFromCreator -> DEBU 253a begin" -peer0.org1.example.com | "2019-05-02 01:31:17.564 UTC [msp] GetManagerForChain -> DEBU 253b Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:17.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 253c creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -peer0.org1.example.com | "2019-05-02 01:31:17.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 253d creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:17.565 UTC [msp.identity] Verify -> DEBU 253e Verify: digest = 00000000 28 5b 1f 97 d5 d0 80 f9 1c 27 ab 57 34 b8 6f 97 |([.......'.W4.o.| -peer0.org1.example.com | 00000010 2e d4 03 c8 10 01 1f c0 b1 14 0e 1b fa 52 74 39 |.............Rt9|" -peer0.org1.example.com | "2019-05-02 01:31:17.565 UTC [msp.identity] Verify -> DEBU 253f Verify: sig = 00000000 30 44 02 20 5e 41 7d ec 71 7a 50 88 c4 2c 48 2d |0D. ^A}.qzP..,H-| -peer0.org1.example.com | 00000010 f9 98 ba ce a6 7c d1 ad f5 1f 28 cc 45 d2 50 51 |.....|....(.E.PQ| -peer0.org1.example.com | 00000020 f2 91 f7 e5 02 20 17 1e f0 79 27 0e 76 94 23 90 |..... ...y'.v.#.| -peer0.org1.example.com | 00000030 e9 96 4a c0 40 88 70 e8 a5 5c 33 4d 05 3b bc 64 |..J.@.p..\3M.;.d| -peer0.org1.example.com | 00000040 a7 d2 bb e3 d1 3f |.....?|" -peer0.org1.example.com | "2019-05-02 01:31:17.565 UTC [protoutils] checkSignatureFromCreator -> DEBU 2540 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:17.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2541 validateChaincodeProposalMessage starts for proposal 0xc00318a1c0, header 0xc002595bd0" -peer0.org1.example.com | "2019-05-02 01:31:17.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2542 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.566 UTC [endorser] preProcess -> DEBU 2543 [businesschannel][ab1c8c2a] processing txid: ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b" -peer0.org1.example.com | "2019-05-02 01:31:17.567 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2544 retrieveTransactionByID() - txId = [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b]" -peer0.org1.example.com | "2019-05-02 01:31:17.567 UTC [aclmgmt] CheckACL -> DEBU 2545 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-05-02 01:31:17.568 UTC [aclmgmt] CheckACL -> DEBU 2546 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-05-02 01:31:17.568 UTC [policies] Evaluate -> DEBU 2547 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.569 UTC [policies] Evaluate -> DEBU 2548 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.569 UTC [policies] Evaluate -> DEBU 2549 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.570 UTC [cauthdsl] func1 -> DEBU 254a 0xc002e31c50 gate 1556760677569980000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.570 UTC [cauthdsl] func2 -> DEBU 254b 0xc002e31c50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.570 UTC [cauthdsl] func2 -> DEBU 254c 0xc002e31c50 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.571 UTC [cauthdsl] func2 -> DEBU 254d 0xc002e31c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:17.571 UTC [cauthdsl] func2 -> DEBU 254e 0xc002e31c50 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:17.572 UTC [cauthdsl] func1 -> DEBU 254f 0xc002e31c50 gate 1556760677569980000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:17.572 UTC [policies] Evaluate -> DEBU 2550 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.573 UTC [policies] Evaluate -> DEBU 2551 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.573 UTC [policies] Evaluate -> DEBU 2552 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.573 UTC [cauthdsl] func1 -> DEBU 2553 0xc002fd4490 gate 1556760677573959800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.574 UTC [cauthdsl] func2 -> DEBU 2554 0xc002fd4490 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.574 UTC [cauthdsl] func2 -> DEBU 2555 0xc002fd4490 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.575 UTC [cauthdsl] func2 -> DEBU 2556 0xc002fd4490 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.575 UTC [msp.identity] Verify -> DEBU 2557 Verify: digest = 00000000 28 5b 1f 97 d5 d0 80 f9 1c 27 ab 57 34 b8 6f 97 |([.......'.W4.o.| -peer0.org1.example.com | 00000010 2e d4 03 c8 10 01 1f c0 b1 14 0e 1b fa 52 74 39 |.............Rt9|" -peer0.org1.example.com | "2019-05-02 01:31:17.576 UTC [msp.identity] Verify -> DEBU 2558 Verify: sig = 00000000 30 44 02 20 5e 41 7d ec 71 7a 50 88 c4 2c 48 2d |0D. ^A}.qzP..,H-| -peer0.org1.example.com | 00000010 f9 98 ba ce a6 7c d1 ad f5 1f 28 cc 45 d2 50 51 |.....|....(.E.PQ| -peer0.org1.example.com | 00000020 f2 91 f7 e5 02 20 17 1e f0 79 27 0e 76 94 23 90 |..... ...y'.v.#.| -peer0.org1.example.com | 00000030 e9 96 4a c0 40 88 70 e8 a5 5c 33 4d 05 3b bc 64 |..J.@.p..\3M.;.d| -peer0.org1.example.com | 00000040 a7 d2 bb e3 d1 3f |.....?|" -peer0.org1.example.com | "2019-05-02 01:31:17.576 UTC [cauthdsl] func2 -> DEBU 2559 0xc002fd4490 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.576 UTC [cauthdsl] func1 -> DEBU 255a 0xc002fd4490 gate 1556760677573959800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.576 UTC [policies] Evaluate -> DEBU 255b Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.578 UTC [gossip.comm] func1 -> DEBU 255c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.579 UTC [gossip.gossip] handleMessage -> DEBU 255d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.580 UTC [msp] DeserializeIdentity -> DEBU 255e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.580 UTC [msp] DeserializeIdentity -> DEBU 255f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.581 UTC [msp] DeserializeIdentity -> DEBU 2560 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.581 UTC [gossip.gossip] handleMessage -> DEBU 2561 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.587 UTC [gossip.comm] func1 -> DEBU 2562 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760676910574700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.588 UTC [gossip.gossip] handleMessage -> DEBU 2563 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760676910574700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.588 UTC [msp] DeserializeIdentity -> DEBU 2564 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.589 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2565 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:17.589 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2566 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.589 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2567 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.590 UTC [policies] Evaluate -> DEBU 2568 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.590 UTC [policies] Evaluate -> DEBU 2569 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.590 UTC [policies] Evaluate -> DEBU 256a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.591 UTC [cauthdsl] func1 -> DEBU 256b 0xc002f7d110 gate 1556760677591090200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.591 UTC [cauthdsl] func2 -> DEBU 256c 0xc002f7d110 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.591 UTC [cauthdsl] func2 -> DEBU 256d 0xc002f7d110 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.591 UTC [cauthdsl] func2 -> DEBU 256e 0xc002f7d110 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.592 UTC [msp.identity] Verify -> DEBU 256f Verify: digest = 00000000 97 fb 2f 6b ab 25 80 a3 0a b1 2e d6 57 48 39 12 |../k.%......WH9.| -peer0.org1.example.com | 00000010 bf 3c ea 49 b9 6e 47 4b 75 67 cc 48 80 fe fd cd |.<.I.nGKug.H....|" -peer0.org1.example.com | "2019-05-02 01:31:17.592 UTC [msp.identity] Verify -> DEBU 2570 Verify: sig = 00000000 30 45 02 21 00 ae 33 be 2a ec cf 49 46 2d 69 50 |0E.!..3.*..IF-iP| -peer0.org1.example.com | 00000010 70 28 63 a9 89 2f 47 e3 0e 0a 5d 61 26 75 90 cc |p(c../G...]a&u..| -peer0.org1.example.com | 00000020 4a 6a a3 cb b0 02 20 59 c5 4d 33 f8 f6 cf c2 df |Jj.... Y.M3.....| -peer0.org1.example.com | 00000030 28 b4 c3 89 9a 3b 12 d0 7c be 2d a8 c8 5e 8a 87 |(....;..|.-..^..| -peer0.org1.example.com | 00000040 bd 9f 07 5f 99 39 b6 |..._.9.|" -peer0.org1.example.com | "2019-05-02 01:31:17.592 UTC [cauthdsl] func2 -> DEBU 2571 0xc002f7d110 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.593 UTC [cauthdsl] func1 -> DEBU 2572 0xc002f7d110 gate 1556760677591090200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.593 UTC [policies] Evaluate -> DEBU 2573 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.593 UTC [policies] Evaluate -> DEBU 2574 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.593 UTC [policies] Evaluate -> DEBU 2575 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.594 UTC [policies] Evaluate -> DEBU 2576 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.594 UTC [msp] DeserializeIdentity -> DEBU 2577 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.594 UTC [msp] DeserializeIdentity -> DEBU 2578 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.595 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2579 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.595 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 257a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.596 UTC [policies] Evaluate -> DEBU 257b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.600 UTC [policies] Evaluate -> DEBU 257c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.600 UTC [policies] Evaluate -> DEBU 257d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.602 UTC [cauthdsl] func1 -> DEBU 257e 0xc0022ea330 gate 1556760677602104800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.603 UTC [cauthdsl] func2 -> DEBU 2580 0xc0022ea330 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.577 UTC [policies] Evaluate -> DEBU 257f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.603 UTC [policies] Evaluate -> DEBU 2581 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.604 UTC [policies] Evaluate -> DEBU 2582 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.604 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2583 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:17.604 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2584 constructing new tx simulator txid = [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b]" -peer0.org1.example.com | "2019-05-02 01:31:17.604 UTC [endorser] SimulateProposal -> DEBU 2585 [businesschannel][ab1c8c2a] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.605 UTC [stateleveldb] GetState -> DEBU 2586 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:17.605 UTC [endorser] callChaincode -> INFO 2587 [businesschannel][ab1c8c2a] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.605 UTC [stateleveldb] GetState -> DEBU 2588 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:17.606 UTC [stateleveldb] GetState -> DEBU 2589 GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:17.606 UTC [chaincode] Execute -> DEBU 258a Entry" -peer0.org1.example.com | "2019-05-02 01:31:17.607 UTC [chaincode] handleMessage -> DEBU 258b [ab1c8c2a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:17.607 UTC [chaincode] HandleTransaction -> DEBU 258c [ab1c8c2a] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:17.608 UTC [chaincode] HandleGetState -> DEBU 258d [ab1c8c2a] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:17.608 UTC [stateleveldb] GetState -> DEBU 258e GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-05-02 01:31:17.608 UTC [chaincode] HandleTransaction -> DEBU 258f [ab1c8c2a] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:17.606 UTC [cauthdsl] func2 -> DEBU 2590 0xc0022ea330 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.609 UTC [chaincode] handleMessage -> DEBU 2591 [ab1c8c2a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:17.610 UTC [chaincode] HandleTransaction -> DEBU 2592 [ab1c8c2a] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:17.610 UTC [chaincode] HandleGetState -> DEBU 2593 [ab1c8c2a] getting state for chaincode exp02, key b, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:17.611 UTC [stateleveldb] GetState -> DEBU 2594 GetState(). ns=exp02, key=b" -peer0.org1.example.com | "2019-05-02 01:31:17.611 UTC [chaincode] HandleTransaction -> DEBU 2595 [ab1c8c2a] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:17.612 UTC [chaincode] handleMessage -> DEBU 2596 [ab1c8c2a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:17.612 UTC [cauthdsl] func2 -> DEBU 2597 0xc0022ea330 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.613 UTC [chaincode] HandleTransaction -> DEBU 2598 [ab1c8c2a] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:17.613 UTC [chaincode] HandleTransaction -> DEBU 2599 [ab1c8c2a] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:17.613 UTC [msp.identity] Verify -> DEBU 259a Verify: digest = 00000000 97 fb 2f 6b ab 25 80 a3 0a b1 2e d6 57 48 39 12 |../k.%......WH9.| -peer0.org1.example.com | 00000010 bf 3c ea 49 b9 6e 47 4b 75 67 cc 48 80 fe fd cd |.<.I.nGKug.H....|" -peer0.org1.example.com | "2019-05-02 01:31:17.614 UTC [chaincode] handleMessage -> DEBU 259c [ab1c8c2a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:17.615 UTC [chaincode] HandleTransaction -> DEBU 259d [ab1c8c2a] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:17.615 UTC [chaincode] HandleTransaction -> DEBU 259e [ab1c8c2a] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:17.614 UTC [msp.identity] Verify -> DEBU 259b Verify: sig = 00000000 30 45 02 21 00 ae 33 be 2a ec cf 49 46 2d 69 50 |0E.!..3.*..IF-iP| -peer0.org1.example.com | 00000010 70 28 63 a9 89 2f 47 e3 0e 0a 5d 61 26 75 90 cc |p(c../G...]a&u..| -peer0.org1.example.com | 00000020 4a 6a a3 cb b0 02 20 59 c5 4d 33 f8 f6 cf c2 df |Jj.... Y.M3.....| -peer0.org1.example.com | 00000030 28 b4 c3 89 9a 3b 12 d0 7c be 2d a8 c8 5e 8a 87 |(....;..|.-..^..| -peer0.org1.example.com | 00000040 bd 9f 07 5f 99 39 b6 |..._.9.|" -peer0.org1.example.com | "2019-05-02 01:31:17.616 UTC [chaincode] handleMessage -> DEBU 259f [ab1c8c2a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:17.616 UTC [chaincode] Notify -> DEBU 25a0 [ab1c8c2a] notifying Txid:ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:17.617 UTC [chaincode] Execute -> DEBU 25a1 Exit" -peer0.org1.example.com | "2019-05-02 01:31:17.617 UTC [endorser] callChaincode -> INFO 25a2 [businesschannel][ab1c8c2a] Exit chaincode: name:"exp02" (12ms)" -peer0.org1.example.com | "2019-05-02 01:31:17.617 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 25a3 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:17.617 UTC [lockbasedtxmgr] Done -> DEBU 25a4 Done with transaction simulation / query execution [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b]" -peer0.org1.example.com | "2019-05-02 01:31:17.618 UTC [endorser] SimulateProposal -> DEBU 25a5 [businesschannel][ab1c8c2a] Exit" -peer0.org1.example.com | "2019-05-02 01:31:17.618 UTC [endorser] endorseProposal -> DEBU 25a6 [businesschannel][ab1c8c2a] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.618 UTC [endorser] endorseProposal -> DEBU 25a7 [businesschannel][ab1c8c2a] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-05-02 01:31:17.618 UTC [endorser] EndorseWithPlugin -> DEBU 25a8 Entering endorsement for {plugin: escc, channel: businesschannel, tx: ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:17.619 UTC [msp.identity] Sign -> DEBU 25a9 Sign: plaintext: 0A20F42EBA8357501456F5593ADB059F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:17.619 UTC [msp.identity] Sign -> DEBU 25aa Sign: digest: CE6D7B6F05A0DE9D4213F21ECBB094F061EECCFCC11C69C6B7EF88B6FFB86B94 " -peer0.org1.example.com | "2019-05-02 01:31:17.619 UTC [endorser] EndorseWithPlugin -> DEBU 25ab Exiting {plugin: escc, channel: businesschannel, tx: ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:17.619 UTC [endorser] endorseProposal -> DEBU 25ac [businesschannel][ab1c8c2a] Exit" -peer0.org1.example.com | "2019-05-02 01:31:17.620 UTC [lockbasedtxmgr] Done -> DEBU 25ad Done with transaction simulation / query execution [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b]" -peer0.org1.example.com | "2019-05-02 01:31:17.620 UTC [endorser] func1 -> DEBU 25ae Exit: request from 192.168.240.9:41350" -peer0.org1.example.com | "2019-05-02 01:31:17.620 UTC [comm.grpc.server] 1 -> INFO 25af unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41350 grpc.code=OK grpc.call_duration=58.0725ms -peer0.org1.example.com | "2019-05-02 01:31:17.628 UTC [cauthdsl] func2 -> DEBU 25b0 0xc0022ea330 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.629 UTC [cauthdsl] func1 -> DEBU 25b1 0xc0022ea330 gate 1556760677602104800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.630 UTC [policies] Evaluate -> DEBU 25b2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.630 UTC [policies] Evaluate -> DEBU 25b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.632 UTC [policies] Evaluate -> DEBU 25b4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.633 UTC [policies] Evaluate -> DEBU 25b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.633 UTC [gossip.gossip] handleMessage -> DEBU 25b6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.639 UTC [grpc] infof -> DEBU 25b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:17.640 UTC [grpc] infof -> DEBU 25b8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:17.642 UTC [msp] DeserializeIdentity -> DEBU 25b9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.643 UTC [msp] DeserializeIdentity -> DEBU 25ba Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.644 UTC [gossip.comm] Send -> DEBU 25bb Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760676910574700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes to 2 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.645 UTC [gossip.comm] sendToEndpoint -> DEBU 25bc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760676910574700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.645 UTC [gossip.comm] sendToEndpoint -> DEBU 25bd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.645 UTC [msp] DeserializeIdentity -> DEBU 25be Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.647 UTC [msp] DeserializeIdentity -> DEBU 25bf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.647 UTC [gossip.comm] sendToEndpoint -> DEBU 25c0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760676910574700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.647 UTC [gossip.comm] sendToEndpoint -> DEBU 25c1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.743 UTC [gossip.comm] func1 -> DEBU 25c2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.744 UTC [gossip.gossip] handleMessage -> DEBU 25c3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.744 UTC [gossip.pull] HandleMessage -> DEBU 25c4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.745 UTC [msp] DeserializeIdentity -> DEBU 25c5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.745 UTC [msp] DeserializeIdentity -> DEBU 25c6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.746 UTC [msp] DeserializeIdentity -> DEBU 25c7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.747 UTC [msp] DeserializeIdentity -> DEBU 25c8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.747 UTC [gossip.comm] func1 -> DEBU 25c9 Got message: GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.747 UTC [msp] DeserializeIdentity -> DEBU 25ca Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.748 UTC [msp] DeserializeIdentity -> DEBU 25cb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.749 UTC [gossip.pull] SendDigest -> DEBU 25cc Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:17.749 UTC [gossip.gossip] handleMessage -> DEBU 25cd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.750 UTC [gossip.gossip] handleMessage -> DEBU 25ce Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.751 UTC [gossip.gossip] handleMessage -> DEBU 25cf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d0 Got message: GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.752 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25d1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:17.753 UTC [msp] DeserializeIdentity -> DEBU 25d2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.753 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25d3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:17.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25d4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25d5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.755 UTC [policies] Evaluate -> DEBU 25d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.755 UTC [policies] Evaluate -> DEBU 25d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.755 UTC [policies] Evaluate -> DEBU 25d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.756 UTC [cauthdsl] func1 -> DEBU 25d9 0xc002c83730 gate 1556760677756471100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.757 UTC [cauthdsl] func2 -> DEBU 25da 0xc002c83730 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.757 UTC [cauthdsl] func2 -> DEBU 25db 0xc002c83730 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.757 UTC [cauthdsl] func2 -> DEBU 25dc 0xc002c83730 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.758 UTC [msp.identity] Verify -> DEBU 25dd Verify: digest = 00000000 9c 5f 7e 58 f0 34 09 00 93 ae 5d 98 6e 54 8a 6e |._~X.4....].nT.n| -peer0.org1.example.com | 00000010 de ff f9 17 16 3d a3 41 76 58 1e ab 6a 7f 94 a6 |.....=.AvX..j...|" -peer0.org1.example.com | "2019-05-02 01:31:17.758 UTC [msp.identity] Verify -> DEBU 25de Verify: sig = 00000000 30 44 02 20 41 09 0b c1 19 17 1a 22 88 8f 4c d7 |0D. A......"..L.| -peer0.org1.example.com | 00000010 37 48 5c a3 b2 27 57 d3 63 39 1d 05 c4 c1 87 1e |7H\..'W.c9......| -peer0.org1.example.com | 00000020 36 95 16 6f 02 20 60 5e cf 5a 46 d9 46 53 85 83 |6..o. `^.ZF.FS..| -peer0.org1.example.com | 00000030 91 8d 9b 85 c2 e3 e9 e7 7f 64 9e 91 c7 61 5e fe |.........d...a^.| -peer0.org1.example.com | 00000040 a3 3a 48 b5 bc 58 |.:H..X|" -peer0.org1.example.com | "2019-05-02 01:31:17.762 UTC [cauthdsl] func2 -> DEBU 25df 0xc002c83730 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.764 UTC [cauthdsl] func1 -> DEBU 25e0 0xc002c83730 gate 1556760677756471100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.764 UTC [policies] Evaluate -> DEBU 25e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.764 UTC [policies] Evaluate -> DEBU 25e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.765 UTC [policies] Evaluate -> DEBU 25e3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.765 UTC [policies] Evaluate -> DEBU 25e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25e5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.767 UTC [gossip.discovery] sendMemResponse -> DEBU 25e6 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:17.768 UTC [msp] DeserializeIdentity -> DEBU 25e7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.769 UTC [msp] DeserializeIdentity -> DEBU 25e8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.769 UTC [msp] DeserializeIdentity -> DEBU 25e9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.770 UTC [gossip.comm] Send -> DEBU 25ea Entering, sending GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.771 UTC [gossip.comm] sendToEndpoint -> DEBU 25eb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.772 UTC [gossip.comm] sendToEndpoint -> DEBU 25ec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.771 UTC [gossip.discovery] sendMemResponse -> DEBU 25ed Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:17.783 UTC [gossip.gossip] handleMessage -> DEBU 25ee Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 1577923502440734265, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 282 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.786 UTC [gossip.gossip] handleMessage -> DEBU 25ef Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.787 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25f0 Got message: GossipMessage: Channel: , nonce: 1577923502440734265, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 282 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.787 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25f1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:17.788 UTC [gossip.comm] func1 -> DEBU 25f2 Got message: GossipMessage: Channel: , nonce: 11572900962055261739, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.789 UTC [gossip.gossip] handleMessage -> DEBU 25f3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 11572900962055261739, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.790 UTC [msp.identity] Verify -> DEBU 25f4 Verify: digest = 00000000 d8 50 8e e3 06 a8 9c 88 4c ed 4f cc 13 f8 27 fc |.P......L.O...'.| -peer0.org1.example.com | 00000010 a7 9a 68 b4 c3 50 a5 62 3e f4 ab ce 0f 7a 2e f7 |..h..P.b>....z..|" -peer0.org1.example.com | "2019-05-02 01:31:17.791 UTC [msp.identity] Verify -> DEBU 25f5 Verify: sig = 00000000 30 45 02 21 00 ec a2 d1 ec e6 c9 a9 59 f6 9f bf |0E.!........Y...| -peer0.org1.example.com | 00000010 d1 60 b9 41 68 a3 fe 06 94 b9 7a 1d 8c be 29 18 |.`.Ah.....z...).| -peer0.org1.example.com | 00000020 aa 0c 9e f4 61 02 20 59 49 39 6c 34 06 1d ae 68 |....a. YI9l4...h| -peer0.org1.example.com | 00000030 04 64 83 b4 22 b6 62 c8 6b 03 a2 fe 65 b6 3e b5 |.d..".b.k...e.>.| -peer0.org1.example.com | 00000040 1f 50 17 3c 77 13 1c |.P. DEBU 25f6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:17.794 UTC [msp.identity] Verify -> DEBU 25f7 Verify: sig = 00000000 30 45 02 21 00 d6 64 af a6 ce 56 c9 39 4a 44 bf |0E.!..d...V.9JD.| -peer0.org1.example.com | 00000010 77 a6 97 2f 44 3a 67 0e 50 d0 6e ec 4f 3a 84 27 |w../D:g.P.n.O:.'| -peer0.org1.example.com | 00000020 b0 85 b2 e9 8f 02 20 7a 68 2f 81 f9 cd 99 2a 2f |...... zh/....*/| -peer0.org1.example.com | 00000030 84 83 a1 ff d4 fb 46 29 b7 49 04 7e ba 9f 9b ec |......F).I.~....| -peer0.org1.example.com | 00000040 52 94 f0 d5 c5 30 f2 |R....0.|" -peer0.org1.example.com | "2019-05-02 01:31:17.796 UTC [gossip.discovery] sendMemResponse -> DEBU 25f8 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:17.796 UTC [msp] DeserializeIdentity -> DEBU 25f9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.796 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25fa Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.797 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25fc Got message: GossipMessage: Channel: , nonce: 11572900962055261739, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.797 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25fe Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:17.796 UTC [msp] DeserializeIdentity -> DEBU 25fb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.797 UTC [gossip.gossip] handleMessage -> DEBU 25fd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.798 UTC [msp] DeserializeIdentity -> DEBU 25ff Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.799 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2600 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:17.800 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2601 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.800 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2602 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.800 UTC [policies] Evaluate -> DEBU 2603 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.800 UTC [policies] Evaluate -> DEBU 2604 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.801 UTC [policies] Evaluate -> DEBU 2606 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.799 UTC [gossip.comm] Send -> DEBU 2605 Entering, sending GossipMessage: Channel: , nonce: 1577923502440734265, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.801 UTC [cauthdsl] func1 -> DEBU 2607 0xc002c95cb0 gate 1556760677801599800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.802 UTC [cauthdsl] func2 -> DEBU 2608 0xc002c95cb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.802 UTC [cauthdsl] func2 -> DEBU 2609 0xc002c95cb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.801 UTC [gossip.discovery] sendMemResponse -> DEBU 260a Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:17.802 UTC [cauthdsl] func2 -> DEBU 260b 0xc002c95cb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.802 UTC [gossip.comm] sendToEndpoint -> DEBU 260c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1577923502440734265, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.802 UTC [msp.identity] Verify -> DEBU 260d Verify: digest = 00000000 b7 e9 2e d9 2e 92 cf f4 25 43 90 4d 9a 95 eb fc |........%C.M....| -peer0.org1.example.com | 00000010 34 28 29 2c f1 a1 d3 9a b8 8d 7e a0 7c 32 72 0d |4(),......~.|2r.|" -peer0.org1.example.com | "2019-05-02 01:31:17.803 UTC [msp.identity] Verify -> DEBU 260e Verify: sig = 00000000 30 44 02 20 53 aa 1d f2 2a 11 a2 ad 69 a6 96 6a |0D. S...*...i..j| -peer0.org1.example.com | 00000010 ad 6a b4 ad a0 15 a1 ac ae 23 b1 8b 68 96 30 9d |.j.......#..h.0.| -peer0.org1.example.com | 00000020 cb f3 a1 a9 02 20 0f e8 4e 4a 32 07 39 03 ef 5f |..... ..NJ2.9.._| -peer0.org1.example.com | 00000030 78 17 ca a4 42 28 bc b7 46 a9 4e cc 69 e7 37 ec |x...B(..F.N.i.7.| -peer0.org1.example.com | 00000040 c1 e3 54 d1 81 70 |..T..p|" -peer0.org1.example.com | "2019-05-02 01:31:17.813 UTC [cauthdsl] func2 -> DEBU 2610 0xc002c95cb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.803 UTC [gossip.comm] sendToEndpoint -> DEBU 260f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.813 UTC [cauthdsl] func1 -> DEBU 2611 0xc002c95cb0 gate 1556760677801599800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.814 UTC [policies] Evaluate -> DEBU 2612 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.814 UTC [policies] Evaluate -> DEBU 2613 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.815 UTC [policies] Evaluate -> DEBU 2614 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.815 UTC [policies] Evaluate -> DEBU 2615 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.815 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2616 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.816 UTC [gossip.discovery] sendMemResponse -> DEBU 2617 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:17.817 UTC [msp] DeserializeIdentity -> DEBU 2618 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.818 UTC [msp] DeserializeIdentity -> DEBU 2619 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.819 UTC [msp] DeserializeIdentity -> DEBU 261a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.819 UTC [gossip.comm] Send -> DEBU 261b Entering, sending GossipMessage: Channel: , nonce: 11572900962055261739, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.819 UTC [gossip.discovery] sendMemResponse -> DEBU 261c Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:17.820 UTC [gossip.comm] sendToEndpoint -> DEBU 261d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11572900962055261739, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.820 UTC [gossip.comm] sendToEndpoint -> DEBU 261e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.831 UTC [gossip.pull] Hello -> DEBU 261f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:17.832 UTC [gossip.comm] Send -> DEBU 2620 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.832 UTC [gossip.pull] Hello -> DEBU 2621 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:17.833 UTC [gossip.comm] Send -> DEBU 2622 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.833 UTC [gossip.pull] Hello -> DEBU 2623 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:17.833 UTC [gossip.comm] Send -> DEBU 2624 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.834 UTC [gossip.comm] sendToEndpoint -> DEBU 2625 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.834 UTC [gossip.comm] sendToEndpoint -> DEBU 2626 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.835 UTC [gossip.comm] sendToEndpoint -> DEBU 2627 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.835 UTC [gossip.comm] sendToEndpoint -> DEBU 2628 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.835 UTC [gossip.comm] sendToEndpoint -> DEBU 2629 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.836 UTC [gossip.comm] sendToEndpoint -> DEBU 262a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.838 UTC [gossip.comm] func1 -> DEBU 262b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13468049574467298966 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.839 UTC [gossip.gossip] handleMessage -> DEBU 262c Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17447799326776230534 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.839 UTC [gossip.pull] HandleMessage -> DEBU 262d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17447799326776230534 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.839 UTC [gossip.gossip] handleMessage -> DEBU 262e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.839 UTC [gossip.comm] func1 -> DEBU 262f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9183535591814455260 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.839 UTC [gossip.gossip] handleMessage -> DEBU 2630 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13468049574467298966 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.840 UTC [gossip.pull] HandleMessage -> DEBU 2631 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13468049574467298966 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.840 UTC [gossip.gossip] handleMessage -> DEBU 2632 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.841 UTC [gossip.gossip] handleMessage -> DEBU 2633 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9183535591814455260 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.841 UTC [gossip.pull] HandleMessage -> DEBU 2634 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9183535591814455260 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.841 UTC [gossip.gossip] handleMessage -> DEBU 2635 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.863 UTC [endorser] ProcessProposal -> DEBU 2636 Entering: request from 192.168.240.9:41356" -peer0.org1.example.com | "2019-05-02 01:31:17.864 UTC [protoutils] ValidateProposalMessage -> DEBU 2637 ValidateProposalMessage starts for signed proposal 0xc00243f810" -peer0.org1.example.com | "2019-05-02 01:31:17.864 UTC [protoutils] validateChannelHeader -> DEBU 2638 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:17.864 UTC [protoutils] checkSignatureFromCreator -> DEBU 2639 begin" -peer0.org1.example.com | "2019-05-02 01:31:17.864 UTC [msp] GetManagerForChain -> DEBU 263a Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:17.864 UTC [protoutils] checkSignatureFromCreator -> DEBU 263b creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:17.864 UTC [protoutils] checkSignatureFromCreator -> DEBU 263c creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:17.865 UTC [msp.identity] Verify -> DEBU 263d Verify: digest = 00000000 ce cd 5a 65 45 48 ff bf 45 62 18 82 00 fa 52 38 |..ZeEH..Eb....R8| -peer0.org1.example.com | 00000010 e3 eb 5c c2 b0 07 dc 5e 89 d3 78 f2 10 b4 4a ab |..\....^..x...J.|" -peer0.org1.example.com | "2019-05-02 01:31:17.865 UTC [msp.identity] Verify -> DEBU 263e Verify: sig = 00000000 30 44 02 20 68 0c c6 26 a4 70 0b 98 a9 ae 87 a3 |0D. h..&.p......| -peer0.org1.example.com | 00000010 ff e3 c9 97 11 12 af 49 3c 54 2d 88 2c c8 bd 9b |.......I DEBU 263f exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:17.866 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2640 validateChaincodeProposalMessage starts for proposal 0xc003147c00, header 0xc00243fc20" -peer0.org1.example.com | "2019-05-02 01:31:17.867 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2641 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.867 UTC [endorser] preProcess -> DEBU 2642 [businesschannel][74c0f615] processing txid: 74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41" -peer0.org1.example.com | "2019-05-02 01:31:17.868 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2643 retrieveTransactionByID() - txId = [74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41]" -peer0.org1.example.com | "2019-05-02 01:31:17.868 UTC [aclmgmt] CheckACL -> DEBU 2644 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-05-02 01:31:17.868 UTC [aclmgmt] CheckACL -> DEBU 2645 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-05-02 01:31:17.869 UTC [policies] Evaluate -> DEBU 2646 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.869 UTC [policies] Evaluate -> DEBU 2647 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.869 UTC [policies] Evaluate -> DEBU 2648 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.869 UTC [cauthdsl] func1 -> DEBU 2649 0xc0002dbeb0 gate 1556760677869960000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.870 UTC [cauthdsl] func2 -> DEBU 264a 0xc0002dbeb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.870 UTC [cauthdsl] func2 -> DEBU 264b 0xc0002dbeb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.870 UTC [cauthdsl] func2 -> DEBU 264c 0xc0002dbeb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.870 UTC [msp.identity] Verify -> DEBU 264d Verify: digest = 00000000 ce cd 5a 65 45 48 ff bf 45 62 18 82 00 fa 52 38 |..ZeEH..Eb....R8| -peer0.org1.example.com | 00000010 e3 eb 5c c2 b0 07 dc 5e 89 d3 78 f2 10 b4 4a ab |..\....^..x...J.|" -peer0.org1.example.com | "2019-05-02 01:31:17.870 UTC [msp.identity] Verify -> DEBU 264e Verify: sig = 00000000 30 44 02 20 68 0c c6 26 a4 70 0b 98 a9 ae 87 a3 |0D. h..&.p......| -peer0.org1.example.com | 00000010 ff e3 c9 97 11 12 af 49 3c 54 2d 88 2c c8 bd 9b |.......I DEBU 264f 0xc0002dbeb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.871 UTC [cauthdsl] func1 -> DEBU 2650 0xc0002dbeb0 gate 1556760677869960000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.872 UTC [policies] Evaluate -> DEBU 2651 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.872 UTC [policies] Evaluate -> DEBU 2652 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.872 UTC [policies] Evaluate -> DEBU 2653 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.873 UTC [policies] Evaluate -> DEBU 2654 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:17.873 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2655 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:17.873 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2656 constructing new tx simulator txid = [74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41]" -peer0.org1.example.com | "2019-05-02 01:31:17.874 UTC [endorser] SimulateProposal -> DEBU 2657 [businesschannel][74c0f615] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.874 UTC [stateleveldb] GetState -> DEBU 2658 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:17.874 UTC [endorser] callChaincode -> INFO 2659 [businesschannel][74c0f615] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.875 UTC [stateleveldb] GetState -> DEBU 265a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:17.875 UTC [stateleveldb] GetState -> DEBU 265b GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:17.875 UTC [chaincode] Execute -> DEBU 265c Entry" -peer0.org1.example.com | "2019-05-02 01:31:17.878 UTC [chaincode] handleMessage -> DEBU 265d [74c0f615] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:17.878 UTC [chaincode] HandleTransaction -> DEBU 265e [74c0f615] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:17.878 UTC [chaincode] HandleGetState -> DEBU 265f [74c0f615] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:17.879 UTC [stateleveldb] GetState -> DEBU 2660 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-05-02 01:31:17.879 UTC [chaincode] HandleTransaction -> DEBU 2661 [74c0f615] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:17.881 UTC [chaincode] handleMessage -> DEBU 2662 [74c0f615] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:17.881 UTC [chaincode] Notify -> DEBU 2663 [74c0f615] notifying Txid:74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:17.881 UTC [chaincode] Execute -> DEBU 2664 Exit" -peer0.org1.example.com | "2019-05-02 01:31:17.882 UTC [endorser] callChaincode -> INFO 2665 [businesschannel][74c0f615] Exit chaincode: name:"exp02" (7ms)" -peer0.org1.example.com | "2019-05-02 01:31:17.882 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2666 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:17.882 UTC [lockbasedtxmgr] Done -> DEBU 2667 Done with transaction simulation / query execution [74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41]" -peer0.org1.example.com | "2019-05-02 01:31:17.882 UTC [endorser] SimulateProposal -> DEBU 2668 [businesschannel][74c0f615] Exit" -peer0.org1.example.com | "2019-05-02 01:31:17.883 UTC [endorser] endorseProposal -> DEBU 2669 [businesschannel][74c0f615] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:17.883 UTC [endorser] endorseProposal -> DEBU 266a [businesschannel][74c0f615] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-05-02 01:31:17.883 UTC [endorser] EndorseWithPlugin -> DEBU 266b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:17.884 UTC [msp.identity] Sign -> DEBU 266c Sign: plaintext: 0A20C15987C053221956486970542E0F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:17.884 UTC [msp.identity] Sign -> DEBU 266d Sign: digest: 77DAA1260EBD5F0006858951DCC4D07EE52F6EE1247373358C7F3330B3937316 " -peer0.org1.example.com | "2019-05-02 01:31:17.884 UTC [endorser] EndorseWithPlugin -> DEBU 266e Exiting {plugin: escc, channel: businesschannel, tx: 74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:17.885 UTC [endorser] endorseProposal -> DEBU 266f [businesschannel][74c0f615] Exit" -peer0.org1.example.com | "2019-05-02 01:31:17.885 UTC [lockbasedtxmgr] Done -> DEBU 2670 Done with transaction simulation / query execution [74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41]" -peer0.org1.example.com | "2019-05-02 01:31:17.885 UTC [endorser] func1 -> DEBU 2671 Exit: request from 192.168.240.9:41356" -peer0.org1.example.com | "2019-05-02 01:31:17.886 UTC [comm.grpc.server] 1 -> INFO 2672 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41356 grpc.code=OK grpc.call_duration=22.8107ms -peer0.org1.example.com | "2019-05-02 01:31:17.892 UTC [grpc] infof -> DEBU 2673 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:17.892 UTC [grpc] infof -> DEBU 2674 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:17.900 UTC [gossip.comm] func1 -> DEBU 2675 Got message: GossipMessage: Channel: , nonce: 16229593423600886718, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.900 UTC [gossip.comm] func1 -> DEBU 2676 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.901 UTC [gossip.gossip] handleMessage -> DEBU 2677 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 16229593423600886718, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.902 UTC [gossip.gossip] handleMessage -> DEBU 2678 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.903 UTC [gossip.gossip] handleMessage -> DEBU 2679 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 267a Got message: GossipMessage: Channel: , nonce: 16229593423600886718, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 267b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:17.905 UTC [msp] DeserializeIdentity -> DEBU 267c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 267d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:17.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 267e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 267f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.906 UTC [policies] Evaluate -> DEBU 2680 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.906 UTC [policies] Evaluate -> DEBU 2681 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.907 UTC [policies] Evaluate -> DEBU 2682 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.907 UTC [cauthdsl] func1 -> DEBU 2683 0xc00265ecb0 gate 1556760677907636700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.908 UTC [cauthdsl] func2 -> DEBU 2684 0xc00265ecb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.908 UTC [cauthdsl] func2 -> DEBU 2685 0xc00265ecb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.909 UTC [cauthdsl] func2 -> DEBU 2686 0xc00265ecb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.909 UTC [msp.identity] Verify -> DEBU 2687 Verify: digest = 00000000 4a 65 6d 2b 25 d7 14 a4 d7 e2 60 e4 16 dc de b5 |Jem+%.....`.....| -peer0.org1.example.com | 00000010 21 cd 45 a3 25 96 e9 b7 8f bc f4 a7 2d df 70 b3 |!.E.%.......-.p.|" -peer0.org1.example.com | "2019-05-02 01:31:17.910 UTC [msp.identity] Verify -> DEBU 2688 Verify: sig = 00000000 30 44 02 20 10 df 5f 4e 13 74 b3 6e 90 6f c9 cd |0D. .._N.t.n.o..| -peer0.org1.example.com | 00000010 68 18 45 00 78 c1 68 c8 c7 5c 95 c4 28 34 00 c9 |h.E.x.h..\..(4..| -peer0.org1.example.com | 00000020 9d ec be 13 02 20 6c 88 e8 82 d3 7f c2 44 7a 64 |..... l......Dzd| -peer0.org1.example.com | 00000030 48 91 16 dc 49 c6 ce f6 49 7c 5a 34 0d 94 f2 3e |H...I...I|Z4...>| -peer0.org1.example.com | 00000040 85 27 f7 e8 87 0d |.'....|" -peer0.org1.example.com | "2019-05-02 01:31:17.911 UTC [cauthdsl] func2 -> DEBU 2689 0xc00265ecb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.911 UTC [cauthdsl] func1 -> DEBU 268a 0xc00265ecb0 gate 1556760677907636700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.911 UTC [policies] Evaluate -> DEBU 268b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.912 UTC [policies] Evaluate -> DEBU 268c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.912 UTC [policies] Evaluate -> DEBU 268d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.912 UTC [policies] Evaluate -> DEBU 268e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.913 UTC [gossip.discovery] sendMemResponse -> DEBU 268f Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:17.914 UTC [msp] DeserializeIdentity -> DEBU 2691 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.913 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2690 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.915 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2692 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2693 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:17.916 UTC [msp] DeserializeIdentity -> DEBU 2694 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.917 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2696 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:17.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2697 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2698 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:17.919 UTC [policies] Evaluate -> DEBU 2699 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.919 UTC [policies] Evaluate -> DEBU 269a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:17.920 UTC [policies] Evaluate -> DEBU 269b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:17.921 UTC [cauthdsl] func1 -> DEBU 269c 0xc002505b50 gate 1556760677921504200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:17.921 UTC [cauthdsl] func2 -> DEBU 269d 0xc002505b50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:17.922 UTC [cauthdsl] func2 -> DEBU 269e 0xc002505b50 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:17.922 UTC [cauthdsl] func2 -> DEBU 269f 0xc002505b50 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.923 UTC [msp.identity] Verify -> DEBU 26a0 Verify: digest = 00000000 33 fe 70 ca 0d c3 77 bf 19 56 40 f5 9a 06 26 14 |3.p...w..V@...&.| -peer0.org1.example.com | 00000010 88 46 47 32 e2 04 64 05 a8 97 03 0d c0 fb 4f 50 |.FG2..d.......OP|" -peer0.org1.example.com | "2019-05-02 01:31:17.923 UTC [msp.identity] Verify -> DEBU 26a1 Verify: sig = 00000000 30 45 02 21 00 85 ea 0a 5d 68 8d 42 fb b1 54 7c |0E.!....]h.B..T|| -peer0.org1.example.com | 00000010 f2 45 9f cc 28 27 80 e6 43 46 6e 71 17 42 b3 4b |.E..('..CFnq.B.K| -peer0.org1.example.com | 00000020 7b 1f 31 47 2f 02 20 49 61 51 02 32 52 63 62 4f |{.1G/. IaQ.2RcbO| -peer0.org1.example.com | 00000030 93 8d eb 2d e4 6a 7e eb ac 4d cf 68 6a cd c1 f4 |...-.j~..M.hj...| -peer0.org1.example.com | 00000040 2e 47 0f 9c c2 69 da |.G...i.|" -peer0.org1.example.com | "2019-05-02 01:31:17.924 UTC [cauthdsl] func2 -> DEBU 26a2 0xc002505b50 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:17.925 UTC [cauthdsl] func1 -> DEBU 26a4 0xc002505b50 gate 1556760677921504200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:17.925 UTC [policies] Evaluate -> DEBU 26a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.926 UTC [policies] Evaluate -> DEBU 26a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.916 UTC [gossip.gossip] handleMessage -> DEBU 2695 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.924 UTC [msp] DeserializeIdentity -> DEBU 26a3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.926 UTC [policies] Evaluate -> DEBU 26a7 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.931 UTC [policies] Evaluate -> DEBU 26a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:17.932 UTC [msp] DeserializeIdentity -> DEBU 26a9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 26aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.932 UTC [gossip.comm] Send -> DEBU 26ab Entering, sending GossipMessage: Channel: , nonce: 16229593423600886718, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 26ad Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:17.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 26af updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 " -peer0.org1.example.com | "2019-05-02 01:31:17.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 26b0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 " -peer0.org1.example.com | "2019-05-02 01:31:17.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 26b1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:17.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 26b2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26b4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.935 UTC [gossip.discovery] sendMemResponse -> DEBU 26b5 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:17.936 UTC [msp] DeserializeIdentity -> DEBU 26b6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.937 UTC [msp] DeserializeIdentity -> DEBU 26b7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.937 UTC [msp] DeserializeIdentity -> DEBU 26b8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:17.938 UTC [gossip.comm] Send -> DEBU 26b9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:17.938 UTC [gossip.discovery] sendMemResponse -> DEBU 26ba Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:17.939 UTC [gossip.comm] sendToEndpoint -> DEBU 26bb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.939 UTC [gossip.comm] sendToEndpoint -> DEBU 26bc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.934 UTC [gossip.comm] sendToEndpoint -> DEBU 26ae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 16229593423600886718, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:17.940 UTC [gossip.comm] sendToEndpoint -> DEBU 26bd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:17.933 UTC [gossip.discovery] sendMemResponse -> DEBU 26ac Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:18.062 UTC [msp.identity] Sign -> DEBU 26be Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101D " -peer0.org1.example.com | "2019-05-02 01:31:18.063 UTC [msp.identity] Sign -> DEBU 26bf Sign: digest: 3800F25A30DF3FFDF32CBAB297D558BB3DA55C8805614119722C6428F39B2C82 " -peer0.org1.example.com | "2019-05-02 01:31:18.063 UTC [msp.identity] Sign -> DEBU 26c0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:18.064 UTC [msp.identity] Sign -> DEBU 26c1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:18.064 UTC [gossip.comm] Send -> DEBU 26c2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.064 UTC [msp] DeserializeIdentity -> DEBU 26c3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.065 UTC [gossip.comm] Send -> DEBU 26c4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.065 UTC [msp] DeserializeIdentity -> DEBU 26c5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.066 UTC [gossip.comm] Send -> DEBU 26c6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.066 UTC [gossip.comm] sendToEndpoint -> DEBU 26c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.066 UTC [gossip.comm] sendToEndpoint -> DEBU 26c8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.067 UTC [gossip.comm] sendToEndpoint -> DEBU 26c9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.067 UTC [gossip.comm] sendToEndpoint -> DEBU 26ca Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.068 UTC [gossip.comm] sendToEndpoint -> DEBU 26cb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.068 UTC [gossip.comm] sendToEndpoint -> DEBU 26cc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.071 UTC [gossip.comm] func1 -> DEBU 26cd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.072 UTC [gossip.gossip] handleMessage -> DEBU 26ce Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.072 UTC [gossip.gossip] handleMessage -> DEBU 26cf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.073 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26d0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.073 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26d1 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:18.074 UTC [msp.identity] Verify -> DEBU 26d2 Verify: digest = 00000000 38 00 f2 5a 30 df 3f fd f3 2c ba b2 97 d5 58 bb |8..Z0.?..,....X.| -peer0.org1.example.com | 00000010 3d a5 5c 88 05 61 41 19 72 2c 64 28 f3 9b 2c 82 |=.\..aA.r,d(..,.|" -peer0.org1.example.com | "2019-05-02 01:31:18.074 UTC [msp.identity] Verify -> DEBU 26d3 Verify: sig = 00000000 30 44 02 20 35 f3 d0 12 37 56 89 1e be 6d 99 3f |0D. 5...7V...m.?| -peer0.org1.example.com | 00000010 31 b1 65 26 0e cf c0 fa ab 43 00 ed 32 31 ac b5 |1.e&.....C..21..| -peer0.org1.example.com | 00000020 04 91 20 bf 02 20 1c d7 04 38 4b 1d 90 2a 99 11 |.. .. ...8K..*..| -peer0.org1.example.com | 00000030 a7 7b 85 1c 0a 8a fd 80 4d 17 68 4e 22 51 24 86 |.{......M.hN"Q$.| -peer0.org1.example.com | 00000040 34 4b e3 bb 46 72 |4K..Fr|" -peer0.org1.example.com | "2019-05-02 01:31:18.075 UTC [gossip.discovery] handleAliveMessage -> DEBU 26d4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.075 UTC [gossip.discovery] isSentByMe -> DEBU 26d5 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.075 UTC [gossip.discovery] handleAliveMessage -> DEBU 26d6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.075 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26d7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:18.076 UTC [msp.identity] Verify -> DEBU 26d8 Verify: digest = 00000000 74 51 fb 04 9f 73 01 c8 d2 5e 0b 04 90 10 3a ee |tQ...s...^....:.| -peer0.org1.example.com | 00000010 fc c8 fc 1b 76 8c 52 8d 2c cb 80 dd 43 54 5e 1b |....v.R.,...CT^.|" -peer0.org1.example.com | "2019-05-02 01:31:18.076 UTC [gossip.gossip] handleMessage -> DEBU 26d9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.076 UTC [msp.identity] Verify -> DEBU 26da Verify: sig = 00000000 30 45 02 21 00 81 df 22 86 db ee 77 5c 55 26 98 |0E.!..."...w\U&.| -peer0.org1.example.com | 00000010 e4 ad 80 a5 ec 62 65 17 95 3a f5 a8 96 a9 51 5a |.....be..:....QZ| -peer0.org1.example.com | 00000020 5c 1d 88 de 0d 02 20 5f ed 13 93 4d e1 e2 77 ec |\..... _...M..w.| -peer0.org1.example.com | 00000030 15 3b 53 ad d1 40 66 b6 a9 24 a0 c6 a7 7e 20 6c |.;S..@f..$...~ l| -peer0.org1.example.com | 00000040 bd 4f 7e 2b f2 bb 76 |.O~+..v|" -peer0.org1.example.com | "2019-05-02 01:31:18.078 UTC [gossip.discovery] handleAliveMessage -> DEBU 26db Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 26dd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.080 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26de Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:18.080 UTC [msp] DeserializeIdentity -> DEBU 26df Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.079 UTC [gossip.comm] func1 -> DEBU 26dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.081 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:18.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:18.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:18.082 UTC [policies] Evaluate -> DEBU 26e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:18.083 UTC [policies] Evaluate -> DEBU 26e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:18.083 UTC [policies] Evaluate -> DEBU 26e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:18.083 UTC [cauthdsl] func1 -> DEBU 26e6 0xc00362cde0 gate 1556760678083767400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:18.084 UTC [cauthdsl] func2 -> DEBU 26e7 0xc00362cde0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:18.084 UTC [cauthdsl] func2 -> DEBU 26e8 0xc00362cde0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:18.084 UTC [cauthdsl] func2 -> DEBU 26e9 0xc00362cde0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:18.085 UTC [msp.identity] Verify -> DEBU 26ea Verify: digest = 00000000 33 fe 70 ca 0d c3 77 bf 19 56 40 f5 9a 06 26 14 |3.p...w..V@...&.| -peer0.org1.example.com | 00000010 88 46 47 32 e2 04 64 05 a8 97 03 0d c0 fb 4f 50 |.FG2..d.......OP|" -peer0.org1.example.com | "2019-05-02 01:31:18.085 UTC [msp.identity] Verify -> DEBU 26eb Verify: sig = 00000000 30 45 02 21 00 85 ea 0a 5d 68 8d 42 fb b1 54 7c |0E.!....]h.B..T|| -peer0.org1.example.com | 00000010 f2 45 9f cc 28 27 80 e6 43 46 6e 71 17 42 b3 4b |.E..('..CFnq.B.K| -peer0.org1.example.com | 00000020 7b 1f 31 47 2f 02 20 49 61 51 02 32 52 63 62 4f |{.1G/. IaQ.2RcbO| -peer0.org1.example.com | 00000030 93 8d eb 2d e4 6a 7e eb ac 4d cf 68 6a cd c1 f4 |...-.j~..M.hj...| -peer0.org1.example.com | 00000040 2e 47 0f 9c c2 69 da |.G...i.|" -peer0.org1.example.com | "2019-05-02 01:31:18.086 UTC [cauthdsl] func2 -> DEBU 26ec 0xc00362cde0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:18.086 UTC [cauthdsl] func1 -> DEBU 26ed 0xc00362cde0 gate 1556760678083767400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:18.086 UTC [policies] Evaluate -> DEBU 26ee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.087 UTC [policies] Evaluate -> DEBU 26ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.087 UTC [policies] Evaluate -> DEBU 26f0 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.087 UTC [policies] Evaluate -> DEBU 26f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.088 UTC [gossip.discovery] handleAliveMessage -> DEBU 26f2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.088 UTC [gossip.discovery] handleAliveMessage -> DEBU 26f3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26f4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.089 UTC [gossip.gossip] handleMessage -> DEBU 26f5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.089 UTC [gossip.gossip] handleMessage -> DEBU 26f6 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26f7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.090 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26f8 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:18.091 UTC [msp.identity] Verify -> DEBU 26f9 Verify: digest = 00000000 38 00 f2 5a 30 df 3f fd f3 2c ba b2 97 d5 58 bb |8..Z0.?..,....X.| -peer0.org1.example.com | 00000010 3d a5 5c 88 05 61 41 19 72 2c 64 28 f3 9b 2c 82 |=.\..aA.r,d(..,.|" -peer0.org1.example.com | "2019-05-02 01:31:18.091 UTC [msp.identity] Verify -> DEBU 26fa Verify: sig = 00000000 30 44 02 20 35 f3 d0 12 37 56 89 1e be 6d 99 3f |0D. 5...7V...m.?| -peer0.org1.example.com | 00000010 31 b1 65 26 0e cf c0 fa ab 43 00 ed 32 31 ac b5 |1.e&.....C..21..| -peer0.org1.example.com | 00000020 04 91 20 bf 02 20 1c d7 04 38 4b 1d 90 2a 99 11 |.. .. ...8K..*..| -peer0.org1.example.com | 00000030 a7 7b 85 1c 0a 8a fd 80 4d 17 68 4e 22 51 24 86 |.{......M.hN"Q$.| -peer0.org1.example.com | 00000040 34 4b e3 bb 46 72 |4K..Fr|" -peer0.org1.example.com | "2019-05-02 01:31:18.092 UTC [msp.identity] Verify -> DEBU 26fb Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:18.092 UTC [msp.identity] Verify -> DEBU 26fc Verify: sig = 00000000 30 44 02 20 78 3a bb 85 8e 3c c5 d3 0f 5e b5 06 |0D. x:...<...^..| -peer0.org1.example.com | 00000010 01 06 50 ca d2 7e 3b ba 4c a9 38 79 9f 5c 7d f7 |..P..~;.L.8y.\}.| -peer0.org1.example.com | 00000020 33 7d 90 91 02 20 20 9d e7 c7 55 78 b2 f2 a5 21 |3}... ...Ux...!| -peer0.org1.example.com | 00000030 e1 bd 94 09 d8 0b 9e 65 a6 07 b6 13 12 94 a1 b3 |.......e........| -peer0.org1.example.com | 00000040 2c b9 31 f7 41 ff |,.1.A.|" -peer0.org1.example.com | "2019-05-02 01:31:18.093 UTC [gossip.discovery] handleAliveMessage -> DEBU 26fd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.093 UTC [gossip.discovery] isSentByMe -> DEBU 26fe Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.093 UTC [gossip.discovery] handleAliveMessage -> DEBU 26ff Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.093 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2700 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.094 UTC [gossip.gossip] handleMessage -> DEBU 2701 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.094 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2702 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.094 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2703 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:18.095 UTC [msp] DeserializeIdentity -> DEBU 2704 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.095 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2705 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:18.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2706 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:18.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2707 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:18.096 UTC [policies] Evaluate -> DEBU 2708 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:18.096 UTC [policies] Evaluate -> DEBU 2709 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:18.096 UTC [policies] Evaluate -> DEBU 270a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:18.096 UTC [cauthdsl] func1 -> DEBU 270b 0xc00380a0b0 gate 1556760678096758900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:18.097 UTC [cauthdsl] func2 -> DEBU 270c 0xc00380a0b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:18.097 UTC [cauthdsl] func2 -> DEBU 270d 0xc00380a0b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:18.097 UTC [cauthdsl] func2 -> DEBU 270e 0xc00380a0b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:18.097 UTC [msp.identity] Verify -> DEBU 270f Verify: digest = 00000000 02 e5 25 46 47 91 7d 93 32 60 d6 a1 5c 19 ba 88 |..%FG.}.2`..\...| -peer0.org1.example.com | 00000010 4a 51 f7 f2 c4 aa 99 d6 4b 0c 50 e7 3c 78 62 91 |JQ......K.P. DEBU 2710 Verify: sig = 00000000 30 45 02 21 00 d5 b7 31 db 27 eb 7f 3f 30 0a bb |0E.!...1.'..?0..| -peer0.org1.example.com | 00000010 fe 1c f3 b3 48 1a cf b7 c9 45 1a ca 8f b0 7a 89 |....H....E....z.| -peer0.org1.example.com | 00000020 04 dd 4b d3 9d 02 20 67 17 25 58 1e 22 10 b0 16 |..K... g.%X."...| -peer0.org1.example.com | 00000030 ae 5c e5 4d d7 e3 c7 12 47 76 dd cd 99 b7 39 40 |.\.M....Gv....9@| -peer0.org1.example.com | 00000040 94 f6 72 01 53 3f 05 |..r.S?.|" -peer0.org1.example.com | "2019-05-02 01:31:18.098 UTC [cauthdsl] func2 -> DEBU 2711 0xc00380a0b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:18.098 UTC [cauthdsl] func1 -> DEBU 2712 0xc00380a0b0 gate 1556760678096758900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:18.098 UTC [policies] Evaluate -> DEBU 2713 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.098 UTC [policies] Evaluate -> DEBU 2714 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.099 UTC [policies] Evaluate -> DEBU 2715 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.099 UTC [policies] Evaluate -> DEBU 2716 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.099 UTC [gossip.discovery] handleAliveMessage -> DEBU 2717 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.100 UTC [gossip.discovery] handleAliveMessage -> DEBU 2718 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.100 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2719 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:18.101 UTC [msp.identity] Verify -> DEBU 271a Verify: digest = 00000000 38 00 f2 5a 30 df 3f fd f3 2c ba b2 97 d5 58 bb |8..Z0.?..,....X.| -peer0.org1.example.com | 00000010 3d a5 5c 88 05 61 41 19 72 2c 64 28 f3 9b 2c 82 |=.\..aA.r,d(..,.|" -peer0.org1.example.com | "2019-05-02 01:31:18.101 UTC [msp.identity] Verify -> DEBU 271b Verify: sig = 00000000 30 44 02 20 35 f3 d0 12 37 56 89 1e be 6d 99 3f |0D. 5...7V...m.?| -peer0.org1.example.com | 00000010 31 b1 65 26 0e cf c0 fa ab 43 00 ed 32 31 ac b5 |1.e&.....C..21..| -peer0.org1.example.com | 00000020 04 91 20 bf 02 20 1c d7 04 38 4b 1d 90 2a 99 11 |.. .. ...8K..*..| -peer0.org1.example.com | 00000030 a7 7b 85 1c 0a 8a fd 80 4d 17 68 4e 22 51 24 86 |.{......M.hN"Q$.| -peer0.org1.example.com | 00000040 34 4b e3 bb 46 72 |4K..Fr|" -peer0.org1.example.com | "2019-05-02 01:31:18.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 271c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.101 UTC [gossip.discovery] isSentByMe -> DEBU 271d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.102 UTC [gossip.discovery] handleAliveMessage -> DEBU 271e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.102 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 271f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:18.102 UTC [msp.identity] Verify -> DEBU 2720 Verify: digest = 00000000 74 51 fb 04 9f 73 01 c8 d2 5e 0b 04 90 10 3a ee |tQ...s...^....:.| -peer0.org1.example.com | 00000010 fc c8 fc 1b 76 8c 52 8d 2c cb 80 dd 43 54 5e 1b |....v.R.,...CT^.|" -peer0.org1.example.com | "2019-05-02 01:31:18.102 UTC [msp.identity] Verify -> DEBU 2721 Verify: sig = 00000000 30 45 02 21 00 81 df 22 86 db ee 77 5c 55 26 98 |0E.!..."...w\U&.| -peer0.org1.example.com | 00000010 e4 ad 80 a5 ec 62 65 17 95 3a f5 a8 96 a9 51 5a |.....be..:....QZ| -peer0.org1.example.com | 00000020 5c 1d 88 de 0d 02 20 5f ed 13 93 4d e1 e2 77 ec |\..... _...M..w.| -peer0.org1.example.com | 00000030 15 3b 53 ad d1 40 66 b6 a9 24 a0 c6 a7 7e 20 6c |.;S..@f..$...~ l| -peer0.org1.example.com | 00000040 bd 4f 7e 2b f2 bb 76 |.O~+..v|" -peer0.org1.example.com | "2019-05-02 01:31:18.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 2722 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 2723 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.103 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2724 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.437 UTC [gossip.gossip] handleMessage -> DEBU 2725 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.438 UTC [gossip.gossip] handleMessage -> DEBU 2726 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.438 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2727 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.438 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2728 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:18.439 UTC [msp.identity] Verify -> DEBU 2729 Verify: digest = 00000000 16 35 ed 1a 10 3c 1f bd 2e 2e 4a 21 69 1a ed d2 |.5...<....J!i...| -peer0.org1.example.com | 00000010 7c f3 1c 07 77 47 72 fb a4 59 6a 54 84 5f 6c b0 ||...wGr..YjT._l.|" -peer0.org1.example.com | "2019-05-02 01:31:18.439 UTC [msp.identity] Verify -> DEBU 272a Verify: sig = 00000000 30 44 02 20 41 5f 6b 4c 45 15 42 0c 29 00 32 9d |0D. A_kLE.B.).2.| -peer0.org1.example.com | 00000010 45 6e d3 10 57 a9 bd 10 a3 59 02 d8 57 a0 a3 2a |En..W....Y..W..*| -peer0.org1.example.com | 00000020 e3 3a 24 cf 02 20 15 c7 6c 19 f0 e4 bb 6c 3b ac |.:$.. ..l....l;.| -peer0.org1.example.com | 00000030 69 c2 14 c3 19 9a 8d 63 39 ae d5 9d 43 11 2c 6d |i......c9...C.,m| -peer0.org1.example.com | 00000040 51 e5 d6 0f f0 d7 |Q.....|" -peer0.org1.example.com | "2019-05-02 01:31:18.439 UTC [msp.identity] Verify -> DEBU 272b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:18.439 UTC [msp.identity] Verify -> DEBU 272c Verify: sig = 00000000 30 45 02 21 00 a2 9f 00 31 f3 16 8c b8 8b d9 50 |0E.!....1......P| -peer0.org1.example.com | 00000010 73 81 f2 70 6b b9 83 7e 2d 6e 6f cf ca cc 22 ff |s..pk..~-no...".| -peer0.org1.example.com | 00000020 7d 9a ee 35 98 02 20 0b c0 32 1f 69 b1 3a 47 d8 |}..5.. ..2.i.:G.| -peer0.org1.example.com | 00000030 92 5b c2 ab 59 8e e6 de 68 e8 5a c1 28 85 fd 76 |.[..Y...h.Z.(..v| -peer0.org1.example.com | 00000040 8a 5e 56 8b 21 48 34 |.^V.!H4|" -peer0.org1.example.com | "2019-05-02 01:31:18.440 UTC [gossip.discovery] handleAliveMessage -> DEBU 272d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 272e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:18.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 272f updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 " -peer0.org1.example.com | "2019-05-02 01:31:18.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 2730 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 " -peer0.org1.example.com | "2019-05-02 01:31:18.442 UTC [gossip.discovery] learnExistingMembers -> DEBU 2731 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:18.442 UTC [gossip.discovery] learnExistingMembers -> DEBU 2732 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.443 UTC [gossip.discovery] handleAliveMessage -> DEBU 2733 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.443 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2734 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.445 UTC [msp] DeserializeIdentity -> DEBU 2735 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.445 UTC [msp] DeserializeIdentity -> DEBU 2736 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.446 UTC [msp] DeserializeIdentity -> DEBU 2737 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.446 UTC [gossip.comm] Send -> DEBU 2738 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.447 UTC [msp] DeserializeIdentity -> DEBU 2739 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.447 UTC [gossip.comm] sendToEndpoint -> DEBU 273a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.447 UTC [gossip.comm] Send -> DEBU 273b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.447 UTC [gossip.comm] sendToEndpoint -> DEBU 273c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.447 UTC [gossip.comm] sendToEndpoint -> DEBU 273d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.447 UTC [gossip.comm] sendToEndpoint -> DEBU 273e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.450 UTC [gossip.comm] func1 -> DEBU 273f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.450 UTC [gossip.gossip] handleMessage -> DEBU 2740 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.451 UTC [gossip.gossip] handleMessage -> DEBU 2741 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2742 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2743 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.457 UTC [gossip.comm] func1 -> DEBU 2744 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.457 UTC [gossip.gossip] handleMessage -> DEBU 2745 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.457 UTC [gossip.gossip] handleMessage -> DEBU 2746 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2747 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2748 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.506 UTC [gossip.comm] func1 -> DEBU 2749 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.506 UTC [gossip.gossip] handleMessage -> DEBU 274a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.507 UTC [gossip.gossip] handleMessage -> DEBU 274b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.507 UTC [gossip.discovery] handleMsgFromComm -> DEBU 274c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.507 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 274d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:18.507 UTC [msp] DeserializeIdentity -> DEBU 274e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.508 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 274f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:18.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2750 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:18.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2751 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:18.508 UTC [policies] Evaluate -> DEBU 2752 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:18.509 UTC [policies] Evaluate -> DEBU 2753 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:18.509 UTC [policies] Evaluate -> DEBU 2754 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:18.509 UTC [cauthdsl] func1 -> DEBU 2755 0xc003a30290 gate 1556760678509609600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:18.509 UTC [cauthdsl] func2 -> DEBU 2756 0xc003a30290 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:18.510 UTC [cauthdsl] func2 -> DEBU 2757 0xc003a30290 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:18.510 UTC [cauthdsl] func2 -> DEBU 2758 0xc003a30290 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:18.510 UTC [msp.identity] Verify -> DEBU 2759 Verify: digest = 00000000 d8 8e ef 0f eb 5a 74 90 0e 5d 83 64 f9 4c 97 ac |.....Zt..].d.L..| -peer0.org1.example.com | 00000010 72 10 76 6f e3 b3 b2 60 db dc 73 73 b2 9e ae 3d |r.vo...`..ss...=|" -peer0.org1.example.com | "2019-05-02 01:31:18.510 UTC [msp.identity] Verify -> DEBU 275a Verify: sig = 00000000 30 45 02 21 00 f0 79 43 da 3d c3 9e 22 4e bb 20 |0E.!..yC.=.."N. | -peer0.org1.example.com | 00000010 4e 72 29 bf a5 42 1e c8 34 f0 35 e3 11 42 12 80 |Nr)..B..4.5..B..| -peer0.org1.example.com | 00000020 84 bc 4f 9c 00 02 20 3f 87 4a 95 eb a9 ea 37 09 |..O... ?.J....7.| -peer0.org1.example.com | 00000030 b2 1d ca 3a bc 3e be 63 d0 9d 18 6a 65 a6 2d bd |...:.>.c...je.-.| -peer0.org1.example.com | 00000040 b0 f2 75 43 3e 9c 84 |..uC>..|" -peer0.org1.example.com | "2019-05-02 01:31:18.511 UTC [cauthdsl] func2 -> DEBU 275b 0xc003a30290 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:18.511 UTC [cauthdsl] func1 -> DEBU 275c 0xc003a30290 gate 1556760678509609600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:18.511 UTC [policies] Evaluate -> DEBU 275d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.512 UTC [policies] Evaluate -> DEBU 275e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.512 UTC [policies] Evaluate -> DEBU 275f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.516 UTC [policies] Evaluate -> DEBU 2762 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.515 UTC [gossip.comm] func1 -> DEBU 2760 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.516 UTC [gossip.gossip] handleMessage -> DEBU 2761 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.517 UTC [gossip.discovery] handleAliveMessage -> DEBU 2763 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2764 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:18.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2765 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 " -peer0.org1.example.com | "2019-05-02 01:31:18.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2766 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 " -peer0.org1.example.com | "2019-05-02 01:31:18.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2767 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:18.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2768 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.517 UTC [gossip.discovery] handleAliveMessage -> DEBU 2769 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.518 UTC [gossip.discovery] handleMsgFromComm -> DEBU 276a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.518 UTC [gossip.discovery] handleMsgFromComm -> DEBU 276b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.518 UTC [gossip.discovery] handleMsgFromComm -> DEBU 276c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.518 UTC [gossip.gossip] handleMessage -> DEBU 276d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.518 UTC [gossip.gossip] handleMessage -> DEBU 276e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.518 UTC [gossip.gossip] handleMessage -> DEBU 276f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2770 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2771 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.525 UTC [msp] DeserializeIdentity -> DEBU 2772 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.525 UTC [msp] DeserializeIdentity -> DEBU 2773 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.526 UTC [msp] DeserializeIdentity -> DEBU 2774 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.526 UTC [msp] DeserializeIdentity -> DEBU 2775 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.527 UTC [msp] DeserializeIdentity -> DEBU 2776 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.527 UTC [msp] DeserializeIdentity -> DEBU 2777 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.527 UTC [gossip.comm] Send -> DEBU 2778 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.528 UTC [msp] DeserializeIdentity -> DEBU 2779 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.528 UTC [msp] DeserializeIdentity -> DEBU 277a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.528 UTC [gossip.comm] Send -> DEBU 277b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.528 UTC [gossip.comm] sendToEndpoint -> DEBU 277c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.529 UTC [gossip.comm] sendToEndpoint -> DEBU 277d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.529 UTC [gossip.comm] sendToEndpoint -> DEBU 277e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.530 UTC [gossip.comm] sendToEndpoint -> DEBU 277f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.731 UTC [msp.identity] Sign -> DEBU 2780 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101E " -peer0.org1.example.com | "2019-05-02 01:31:18.731 UTC [msp.identity] Sign -> DEBU 2781 Sign: digest: A8BD7373C1EB38D4669746EF53EAA0285719E261922132FA8F12FBE043421EC2 " -peer0.org1.example.com | "2019-05-02 01:31:18.732 UTC [msp.identity] Sign -> DEBU 2782 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:18.732 UTC [msp.identity] Sign -> DEBU 2783 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:18.733 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2784 Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:18.742 UTC [msp] DeserializeIdentity -> DEBU 2785 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.742 UTC [msp] DeserializeIdentity -> DEBU 2786 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.743 UTC [msp] DeserializeIdentity -> DEBU 2787 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.744 UTC [gossip.comm] Send -> DEBU 2788 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.744 UTC [gossip.comm] Send -> DEBU 2789 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.744 UTC [msp] DeserializeIdentity -> DEBU 278a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.744 UTC [gossip.comm] Send -> DEBU 278b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.745 UTC [gossip.comm] sendToEndpoint -> DEBU 278c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.745 UTC [gossip.comm] sendToEndpoint -> DEBU 278d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.745 UTC [gossip.comm] sendToEndpoint -> DEBU 278e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.745 UTC [gossip.comm] sendToEndpoint -> DEBU 278f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.746 UTC [gossip.comm] sendToEndpoint -> DEBU 2790 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.746 UTC [gossip.comm] sendToEndpoint -> DEBU 2791 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.846 UTC [gossip.comm] func1 -> DEBU 2792 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.847 UTC [gossip.gossip] handleMessage -> DEBU 2793 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.847 UTC [gossip.gossip] handleMessage -> DEBU 2794 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2795 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2796 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:18.848 UTC [msp] DeserializeIdentity -> DEBU 2797 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.849 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2798 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:18.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2799 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:18.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 279a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:18.850 UTC [policies] Evaluate -> DEBU 279b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:18.850 UTC [policies] Evaluate -> DEBU 279c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:18.851 UTC [policies] Evaluate -> DEBU 279d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:18.851 UTC [cauthdsl] func1 -> DEBU 279e 0xc003dc91d0 gate 1556760678851297300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:18.851 UTC [cauthdsl] func2 -> DEBU 279f 0xc003dc91d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:18.852 UTC [cauthdsl] func2 -> DEBU 27a0 0xc003dc91d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:18.853 UTC [cauthdsl] func2 -> DEBU 27a1 0xc003dc91d0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:18.853 UTC [msp.identity] Verify -> DEBU 27a2 Verify: digest = 00000000 30 04 6d 88 f0 4d cd ac f7 c5 59 a5 ee e5 59 66 |0.m..M....Y...Yf| -peer0.org1.example.com | 00000010 2f 1f 6e 68 4b 11 0d aa bf aa e7 a5 d9 61 c0 e4 |/.nhK........a..|" -peer0.org1.example.com | "2019-05-02 01:31:18.854 UTC [msp.identity] Verify -> DEBU 27a3 Verify: sig = 00000000 30 45 02 21 00 f1 28 bd c4 85 58 e4 7b ae d4 c4 |0E.!..(...X.{...| -peer0.org1.example.com | 00000010 58 2f 31 31 77 7c 10 ff 13 db 73 f6 5b b8 6e 0d |X/11w|....s.[.n.| -peer0.org1.example.com | 00000020 13 89 ff 5e fe 02 20 43 b3 b9 36 35 29 aa cf 47 |...^.. C..65)..G| -peer0.org1.example.com | 00000030 6d 6f 91 08 5b b4 84 70 9f 4c 5f 8a 3a c8 32 c4 |mo..[..p.L_.:.2.| -peer0.org1.example.com | 00000040 ce b8 bb b8 fa d5 c5 |.......|" -peer0.org1.example.com | "2019-05-02 01:31:18.855 UTC [cauthdsl] func2 -> DEBU 27a4 0xc003dc91d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:18.855 UTC [cauthdsl] func1 -> DEBU 27a5 0xc003dc91d0 gate 1556760678851297300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:18.856 UTC [policies] Evaluate -> DEBU 27a6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.856 UTC [policies] Evaluate -> DEBU 27a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.856 UTC [policies] Evaluate -> DEBU 27a8 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.857 UTC [policies] Evaluate -> DEBU 27a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:18.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 27aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.857 UTC [gossip.discovery] learnExistingMembers -> DEBU 27ab Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:18.857 UTC [gossip.discovery] learnExistingMembers -> DEBU 27ac updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 " -peer0.org1.example.com | "2019-05-02 01:31:18.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 27ad Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 " -peer0.org1.example.com | "2019-05-02 01:31:18.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 27ae Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:18.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 27af Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 27b0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.859 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.859 UTC [gossip.comm] func1 -> DEBU 27b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.859 UTC [gossip.gossip] handleMessage -> DEBU 27b4 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.860 UTC [gossip.gossip] handleMessage -> DEBU 27b5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.859 UTC [msp] DeserializeIdentity -> DEBU 27b3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.860 UTC [msp] DeserializeIdentity -> DEBU 27b6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.860 UTC [gossip.gossip] handleMessage -> DEBU 27b7 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.860 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.861 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27ba Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.860 UTC [msp] DeserializeIdentity -> DEBU 27b8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.861 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27bb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.862 UTC [msp] DeserializeIdentity -> DEBU 27bc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.862 UTC [msp] DeserializeIdentity -> DEBU 27bd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.862 UTC [msp] DeserializeIdentity -> DEBU 27be Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.862 UTC [gossip.comm] Send -> DEBU 27bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27c0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.862 UTC [msp] DeserializeIdentity -> DEBU 27c1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.863 UTC [gossip.gossip] handleMessage -> DEBU 27c3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.863 UTC [gossip.comm] sendToEndpoint -> DEBU 27c2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.863 UTC [gossip.comm] sendToEndpoint -> DEBU 27c4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:18.863 UTC [msp] DeserializeIdentity -> DEBU 27c5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:18.864 UTC [gossip.comm] Send -> DEBU 27c6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:18.864 UTC [gossip.comm] sendToEndpoint -> DEBU 27c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:18.865 UTC [gossip.comm] sendToEndpoint -> DEBU 27c8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:19.663 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27c9 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:19.666 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27ca Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:19.666 UTC [policies] Evaluate -> DEBU 27cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-05-02 01:31:19.666 UTC [policies] Evaluate -> DEBU 27cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:19.667 UTC [policies] Evaluate -> DEBU 27cd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:19.667 UTC [cauthdsl] func1 -> DEBU 27ce 0xc003f117a0 gate 1556760679667141200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:19.667 UTC [cauthdsl] func2 -> DEBU 27cf 0xc003f117a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:19.668 UTC [cauthdsl] func2 -> DEBU 27d0 0xc003f117a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:19.668 UTC [cauthdsl] func2 -> DEBU 27d1 0xc003f117a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:19.668 UTC [msp.identity] Verify -> DEBU 27d2 Verify: digest = 00000000 c3 f9 8e b4 e1 66 3f c7 04 e2 0d b1 c3 9d 1c af |.....f?.........| -peer0.org1.example.com | 00000010 0a ee a0 68 ca 4d a7 a5 88 20 a3 38 12 a6 32 ac |...h.M... .8..2.|" -peer0.org1.example.com | "2019-05-02 01:31:19.668 UTC [msp.identity] Verify -> DEBU 27d3 Verify: sig = 00000000 30 44 02 20 0d 3f b7 9e ad 7c 2a ee 79 d7 b7 f3 |0D. .?...|*.y...| -peer0.org1.example.com | 00000010 e3 1a cb c1 31 26 90 05 47 d5 25 ef a0 fd 4d 50 |....1&..G.%...MP| -peer0.org1.example.com | 00000020 f0 a5 c1 3b 02 20 16 08 0c 87 45 36 35 4f 90 2d |...;. ....E65O.-| -peer0.org1.example.com | 00000030 5c 20 ff 19 a9 c7 3a f3 80 2b 18 8c 1a c4 17 ae |\ ....:..+......| -peer0.org1.example.com | 00000040 37 96 fa 71 1a 24 |7..q.$|" -peer0.org1.example.com | "2019-05-02 01:31:19.669 UTC [cauthdsl] func2 -> DEBU 27d4 0xc003f117a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:19.669 UTC [cauthdsl] func1 -> DEBU 27d5 0xc003f117a0 gate 1556760679667141200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:19.670 UTC [policies] Evaluate -> DEBU 27d6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:19.670 UTC [policies] Evaluate -> DEBU 27d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:19.670 UTC [policies] Evaluate -> DEBU 27d8 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:19.670 UTC [policies] Evaluate -> DEBU 27d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:19.671 UTC [blocksProvider] DeliverBlocks -> DEBU 27da [businesschannel] Adding payload to local buffer, blockNum = [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.671 UTC [gossip.state] addPayload -> DEBU 27db [businesschannel] Adding payload to local buffer, blockNum = [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.672 UTC [gossip.state] deliverPayloads -> DEBU 27dc [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.676 UTC [gossip.state] deliverPayloads -> DEBU 27dd [businesschannel] Transferring block [8] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-05-02 01:31:19.678 UTC [gossip.privdata] StoreBlock -> INFO 27de [businesschannel] Received block [8] from buffer" -peer0.org1.example.com | "2019-05-02 01:31:19.678 UTC [gossip.privdata] StoreBlock -> DEBU 27df [businesschannel] Validating block [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.679 UTC [committer.txvalidator] Validate -> DEBU 27e0 [businesschannel] START Block Validation for block [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.680 UTC [committer.txvalidator] Validate -> DEBU 27e1 expecting 1 block validation responses" -peer0.org1.example.com | "2019-05-02 01:31:19.680 UTC [committer.txvalidator] validateTx -> DEBU 27e2 [businesschannel] validateTx starts for block 0xc002d99e40 env 0xc0021829b0 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:19.690 UTC [protoutils] ValidateTransaction -> DEBU 27e3 ValidateTransactionEnvelope starts for envelope 0xc0021829b0" -peer0.org1.example.com | "2019-05-02 01:31:19.690 UTC [protoutils] ValidateTransaction -> DEBU 27e4 Header is channel_header:"\010\003\032\014\010\345\220\251\346\005\020\260\224\211\214\002\"\017businesschannel*@ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030\000 @{\234\006\n_;\331\014\371AI\342\340\253\025\177P\177\233b" " -peer0.org1.example.com | "2019-05-02 01:31:19.690 UTC [protoutils] validateChannelHeader -> DEBU 27e5 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:19.690 UTC [protoutils] checkSignatureFromCreator -> DEBU 27e6 begin" -peer0.org1.example.com | "2019-05-02 01:31:19.690 UTC [msp] GetManagerForChain -> DEBU 27e7 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:19.691 UTC [protoutils] checkSignatureFromCreator -> DEBU 27e8 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -peer0.org1.example.com | "2019-05-02 01:31:19.694 UTC [gossip.state] addPayload -> DEBU 27ea Blocks payloads buffer size for channel [businesschannel] is 0 blocks" -peer0.org1.example.com | "2019-05-02 01:31:19.693 UTC [protoutils] checkSignatureFromCreator -> DEBU 27e9 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:19.694 UTC [blocksProvider] DeliverBlocks -> DEBU 27eb [businesschannel] Gossiping block [8], peers number [3]" -peer0.org1.example.com | "2019-05-02 01:31:19.695 UTC [msp.identity] Verify -> DEBU 27ec Verify: digest = 00000000 66 e4 f2 de d2 a6 a0 d5 b6 09 1c 1e bd d8 2c fa |f.............,.| -peer0.org1.example.com | 00000010 93 b6 be a4 e5 76 0e 42 ca 72 e6 17 85 c4 ea 76 |.....v.B.r.....v|" -peer0.org1.example.com | "2019-05-02 01:31:19.700 UTC [msp.identity] Verify -> DEBU 27ed Verify: sig = 00000000 30 44 02 20 78 b3 37 1d ca ba c7 c9 5d 36 6d 83 |0D. x.7.....]6m.| -peer0.org1.example.com | 00000010 42 de 4a 72 50 d3 54 e1 f1 dc 3e e7 99 fb f5 c0 |B.JrP.T...>.....| -peer0.org1.example.com | 00000020 2a c9 95 0a 02 20 20 f0 1d d8 94 c2 2e d9 22 69 |*.... ......."i| -peer0.org1.example.com | 00000030 48 80 cc 13 de 39 9d 40 97 56 24 68 5a c9 8f 6f |H....9.@.V$hZ..o| -peer0.org1.example.com | 00000040 89 51 23 9f 67 ae |.Q#.g.|" -peer0.org1.example.com | "2019-05-02 01:31:19.697 UTC [gossip.channel] AddToMsgStore -> DEBU 27ee Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-05-02 01:31:19.701 UTC [gossip.pull] Add -> DEBU 27ef Added 8, total items: 8" -peer0.org1.example.com | "2019-05-02 01:31:19.701 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f0 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:19.703 UTC [protoutils] validateEndorserTransaction -> DEBU 27f1 validateEndorserTransaction starts for data 0xc002ecb000, header channel_header:"\010\003\032\014\010\345\220\251\346\005\020\260\224\211\214\002\"\017businesschannel*@ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030\000 @{\234\006\n_;\331\014\371AI\342\340\253\025\177P\177\233b" " -peer0.org1.example.com | "2019-05-02 01:31:19.704 UTC [protoutils] validateEndorserTransaction -> DEBU 27f2 validateEndorserTransaction info: there are 1 actions" -peer0.org1.example.com | "2019-05-02 01:31:19.704 UTC [protoutils] validateEndorserTransaction -> DEBU 27f3 validateEndorserTransaction info: signature header is valid" -peer0.org1.example.com | "2019-05-02 01:31:19.704 UTC [protoutils] ValidateTransaction -> DEBU 27f4 ValidateTransactionEnvelope returns err %!s()" -peer0.org1.example.com | "2019-05-02 01:31:19.704 UTC [committer.txvalidator] validateTx -> DEBU 27f5 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:19.705 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 27f6 retrieveTransactionByID() - txId = [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b]" -peer0.org1.example.com | "2019-05-02 01:31:19.706 UTC [committer.txvalidator] validateTx -> DEBU 27f7 Validating transaction with plugins" -peer0.org1.example.com | "2019-05-02 01:31:19.707 UTC [committer.txvalidator] Dispatch -> DEBU 27f9 [businesschannel] Dispatch starts for bytes 0xc002196000" -peer0.org1.example.com | "2019-05-02 01:31:19.708 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27fa constructing new query executor txid = [d6f06272-03dc-4ee9-9835-6a745bf5ad6b]" -peer0.org1.example.com | "2019-05-02 01:31:19.708 UTC [stateleveldb] GetState -> DEBU 27fb GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -peer0.org1.example.com | "2019-05-02 01:31:19.706 UTC [msp] DeserializeIdentity -> DEBU 27f8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:19.708 UTC [msp] DeserializeIdentity -> DEBU 27fc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:19.709 UTC [msp] DeserializeIdentity -> DEBU 27fd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:19.709 UTC [msp] DeserializeIdentity -> DEBU 27fe Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:19.709 UTC [gossip.comm] Send -> DEBU 27ff Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:19.710 UTC [msp] DeserializeIdentity -> DEBU 2800 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:19.710 UTC [msp] DeserializeIdentity -> DEBU 2802 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:19.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2803 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:19.710 UTC [stateleveldb] GetState -> DEBU 2801 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:19.712 UTC [gossip.comm] sendToEndpoint -> DEBU 2804 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:19.712 UTC [stateleveldb] GetState -> DEBU 2805 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" -peer0.org1.example.com | "2019-05-02 01:31:19.713 UTC [stateleveldb] GetState -> DEBU 2806 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" -peer0.org1.example.com | "2019-05-02 01:31:19.713 UTC [stateleveldb] GetState -> DEBU 2807 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" -peer0.org1.example.com | "2019-05-02 01:31:19.714 UTC [lockbasedtxmgr] Done -> DEBU 2808 Done with transaction simulation / query execution [d6f06272-03dc-4ee9-9835-6a745bf5ad6b]" -peer0.org1.example.com | "2019-05-02 01:31:19.714 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 2809 Validating Tx ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b, seq 0 out of 1 in block 8 for channel businesschannel with validation plugin vscc with plugin" -peer0.org1.example.com | "2019-05-02 01:31:19.714 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 280a constructing new query executor txid = [1175ab5c-27ad-406a-96f5-984d82aeb65d]" -peer0.org1.example.com | "2019-05-02 01:31:19.715 UTC [lockbasedtxmgr] Done -> DEBU 280b Done with transaction simulation / query execution [1175ab5c-27ad-406a-96f5-984d82aeb65d]" -peer0.org1.example.com | "2019-05-02 01:31:19.720 UTC [cauthdsl] func1 -> DEBU 280c 0xc003fa5180 gate 1556760679719976300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:19.720 UTC [cauthdsl] func2 -> DEBU 280d 0xc003fa5180 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:19.721 UTC [cauthdsl] func2 -> DEBU 280e 0xc003fa5180 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:19.722 UTC [cauthdsl] func2 -> DEBU 280f 0xc003fa5180 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:19.722 UTC [msp.identity] Verify -> DEBU 2810 Verify: digest = 00000000 ce 6d 7b 6f 05 a0 de 9d 42 13 f2 1e cb b0 94 f0 |.m{o....B.......| -peer0.org1.example.com | 00000010 61 ee cc fc c1 1c 69 c6 b7 ef 88 b6 ff b8 6b 94 |a.....i.......k.|" -peer0.org1.example.com | "2019-05-02 01:31:19.725 UTC [msp.identity] Verify -> DEBU 2811 Verify: sig = 00000000 30 45 02 21 00 eb 93 30 77 34 5f 07 bf 6d ff 9b |0E.!...0w4_..m..| -peer0.org1.example.com | 00000010 a7 fe a5 62 27 67 92 54 73 0c 96 06 f3 0b fc 0e |...b'g.Ts.......| -peer0.org1.example.com | 00000020 ea 40 3a a4 a1 02 20 59 dc 36 64 2d c9 4e 1b 81 |.@:... Y.6d-.N..| -peer0.org1.example.com | 00000030 86 a8 de 64 d6 15 b6 31 22 75 2d 31 e4 d5 ae 19 |...d...1"u-1....| -peer0.org1.example.com | 00000040 c2 38 5f 2e ff 9b 5c |.8_...\|" -peer0.org1.example.com | "2019-05-02 01:31:19.725 UTC [cauthdsl] func2 -> DEBU 2812 0xc003fa5180 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:19.726 UTC [cauthdsl] func2 -> DEBU 2813 0xc003fa5180 signed by 1 principal evaluation starts (used [true])" -peer0.org1.example.com | "2019-05-02 01:31:19.726 UTC [cauthdsl] func2 -> DEBU 2814 0xc003fa5180 skipping identity 0 because it has already been used" -peer0.org1.example.com | "2019-05-02 01:31:19.727 UTC [cauthdsl] func2 -> DEBU 2815 0xc003fa5180 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:19.728 UTC [cauthdsl] func1 -> DEBU 2816 0xc003fa5180 gate 1556760679719976300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:19.728 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2817 constructing new query executor txid = [fa6515ec-5d33-4b19-990d-cb8f6b8a6e9c]" -peer0.org1.example.com | "2019-05-02 01:31:19.729 UTC [lockbasedtxmgr] Done -> DEBU 2818 Done with transaction simulation / query execution [fa6515ec-5d33-4b19-990d-cb8f6b8a6e9c]" -peer0.org1.example.com | "2019-05-02 01:31:19.729 UTC [vscc] Validate -> DEBU 2819 block 8, namespace: exp02, tx 0 validation results is: " -peer0.org1.example.com | "2019-05-02 01:31:19.729 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 281a Transaction ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b appears to be valid" -peer0.org1.example.com | "2019-05-02 01:31:19.730 UTC [committer.txvalidator] Dispatch -> DEBU 281b [businesschannel] Dispatch completes env bytes 0xc002196000" -peer0.org1.example.com | "2019-05-02 01:31:19.731 UTC [committer.txvalidator] Validate -> DEBU 281c got result for idx 0, code 0" -peer0.org1.example.com | "2019-05-02 01:31:19.732 UTC [committer.txvalidator] Validate -> INFO 281d [businesschannel] Validated block [8] in 52ms" -peer0.org1.example.com | "2019-05-02 01:31:19.733 UTC [gossip.privdata] listMissingPrivateData -> DEBU 281e Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-05-02 01:31:19.734 UTC [gossip.privdata] StoreBlock -> DEBU 281f [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-05-02 01:31:19.736 UTC [kvledger] CommitWithPvtData -> DEBU 2820 [businesschannel] Validating state for block [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.736 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2821 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:31:19.736 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2822 lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-05-02 01:31:19.736 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2823 Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-05-02 01:31:19.737 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2824 ValidateAndPrepareBatch() for block number = [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.737 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2825 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:19.738 UTC [valimpl] preprocessProtoBlock -> DEBU 2827 txType=ENDORSER_TRANSACTION" -peer0.org1.example.com | "2019-05-02 01:31:19.730 UTC [committer.txvalidator] validateTx -> DEBU 2826 [businesschannel] validateTx completes for block 0xc002d99e40 env 0xc0021829b0 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:19.739 UTC [stateleveldb] GetState -> DEBU 2828 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:19.739 UTC [statebasedval] validateKVRead -> DEBU 2829 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" -peer0.org1.example.com | "2019-05-02 01:31:19.739 UTC [stateleveldb] GetState -> DEBU 282a GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:19.739 UTC [statebasedval] validateKVRead -> DEBU 282b Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" -peer0.org1.example.com | "2019-05-02 01:31:19.740 UTC [stateleveldb] GetState -> DEBU 282c GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-05-02 01:31:19.740 UTC [statebasedval] validateKVRead -> DEBU 282d Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" -peer0.org1.example.com | "2019-05-02 01:31:19.740 UTC [stateleveldb] GetState -> DEBU 282e GetState(). ns=exp02, key=b" -peer0.org1.example.com | "2019-05-02 01:31:19.740 UTC [statebasedval] validateKVRead -> DEBU 282f Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" -peer0.org1.example.com | "2019-05-02 01:31:19.741 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2830 Block [8] Transaction index [0] TxId [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b] marked as valid by state validator. ContainsPostOrderWrites [false]" -peer0.org1.example.com | "2019-05-02 01:31:19.741 UTC [valinternal] ApplyWriteSet -> DEBU 2831 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0026fe7c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0026fe800)}" -peer0.org1.example.com | "2019-05-02 01:31:19.741 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2832 validating rwset..." -peer0.org1.example.com | "2019-05-02 01:31:19.741 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2833 postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:19.742 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2834 ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-05-02 01:31:19.742 UTC [kvledger] CommitWithPvtData -> DEBU 2835 [businesschannel] Committing block [8] to storage" -peer0.org1.example.com | "2019-05-02 01:31:19.742 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2836 Writing block [8] to pvt block store" -peer0.org1.example.com | "2019-05-02 01:31:19.747 UTC [pvtdatastorage] Prepare -> DEBU 2837 Saved 0 private data write sets for block [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.751 UTC [fsblkstorage] indexBlock -> DEBU 2838 Indexing block [blockNum=8, blockHash=[]byte{0xec, 0x7a, 0xf9, 0x87, 0x2a, 0xf6, 0xf9, 0xf3, 0x9d, 0x8, 0x72, 0xc7, 0xa9, 0xe8, 0x8f, 0xb7, 0xe, 0x92, 0xd, 0x6d, 0x8e, 0xab, 0xc4, 0xfc, 0xd4, 0x86, 0x3b, 0x46, 0x29, 0x92, 0x30, 0x8d} txOffsets= -peer0.org1.example.com | txId=ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b locPointer=offset=70, bytesLength=3044 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-05-02 01:31:19.751 UTC [fsblkstorage] indexBlock -> DEBU 2839 Adding txLoc [fileSuffixNum=0, offset=94692, bytesLength=3044] for tx ID: [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b] to txid-index" -peer0.org1.example.com | "2019-05-02 01:31:19.752 UTC [fsblkstorage] indexBlock -> DEBU 283a Adding txLoc [fileSuffixNum=0, offset=94692, bytesLength=3044] for tx number:[0] ID: [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b] to blockNumTranNum index" -peer0.org1.example.com | "2019-05-02 01:31:19.755 UTC [fsblkstorage] updateCheckpoint -> DEBU 283b Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98673], isChainEmpty=[false], lastBlockNumber=[8]" -peer0.org1.example.com | "2019-05-02 01:31:19.756 UTC [pvtdatastorage] Commit -> DEBU 283c Committing private data for block [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.759 UTC [pvtdatastorage] Commit -> DEBU 283d Committed private data for block [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.760 UTC [kvledger] CommitWithPvtData -> DEBU 283e [businesschannel] Committing block [8] transactions to state database" -peer0.org1.example.com | "2019-05-02 01:31:19.760 UTC [lockbasedtxmgr] Commit -> DEBU 283f lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:19.760 UTC [lockbasedtxmgr] Commit -> DEBU 2840 Committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:19.761 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2841 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-05-02 01:31:19.761 UTC [lockbasedtxmgr] Commit -> DEBU 2842 Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:19.761 UTC [stateleveldb] ApplyUpdates -> DEBU 2843 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -peer0.org1.example.com | "2019-05-02 01:31:19.762 UTC [stateleveldb] ApplyUpdates -> DEBU 2844 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -peer0.org1.example.com | "2019-05-02 01:31:19.764 UTC [lockbasedtxmgr] Commit -> DEBU 2845 Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-05-02 01:31:19.764 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2846 Preparing potential purge list working-set for expiringAtBlk [9]" -peer0.org1.example.com | "2019-05-02 01:31:19.764 UTC [leveldbhelper] GetIterator -> DEBU 2847 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:31:19.764 UTC [lockbasedtxmgr] func1 -> DEBU 2848 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-05-02 01:31:19.765 UTC [kvledger] CommitWithPvtData -> DEBU 2849 [businesschannel] Committing block [8] transactions to history database" -peer0.org1.example.com | "2019-05-02 01:31:19.765 UTC [historyleveldb] Commit -> DEBU 284a Channel [businesschannel]: Updating history database for blockNo [8] with [1] transactions" -peer0.org1.example.com | "2019-05-02 01:31:19.764 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 284b No expiry entry found for expiringAtBlk [9]" -peer0.org1.example.com | "2019-05-02 01:31:19.767 UTC [historyleveldb] Commit -> DEBU 284c Channel [businesschannel]: Updates committed to history database for blockNo [8]" -peer0.org1.example.com | "2019-05-02 01:31:19.768 UTC [kvledger] CommitWithPvtData -> INFO 284d [businesschannel] Committed block [8] with 1 transaction(s) in 31ms (state_validation=6ms block_commit=17ms state_commit=5ms)" -peer0.org1.example.com | "2019-05-02 01:31:19.768 UTC [msp.identity] Sign -> DEBU 284e Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020809 " -peer0.org1.example.com | "2019-05-02 01:31:19.768 UTC [msp.identity] Sign -> DEBU 284f Sign: digest: 687B425FE70DFDEDD8B24639DE13E4DDEBD4234847A4678C0A12FFE8E29C7E2F " -peer0.org1.example.com | "2019-05-02 01:31:19.769 UTC [gossip.state] commitBlock -> DEBU 2850 [businesschannel] Committed block [8] with 1 transaction(s)" -peer0.org1.example.com | "2019-05-02 01:31:20.091 UTC [endorser] ProcessProposal -> DEBU 2851 Entering: request from 192.168.240.9:41360" -peer0.org1.example.com | "2019-05-02 01:31:20.091 UTC [protoutils] ValidateProposalMessage -> DEBU 2852 ValidateProposalMessage starts for signed proposal 0xc002114640" -peer0.org1.example.com | "2019-05-02 01:31:20.091 UTC [protoutils] validateChannelHeader -> DEBU 2853 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:20.091 UTC [protoutils] checkSignatureFromCreator -> DEBU 2854 begin" -peer0.org1.example.com | "2019-05-02 01:31:20.092 UTC [msp] GetManagerForChain -> DEBU 2855 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:20.092 UTC [protoutils] checkSignatureFromCreator -> DEBU 2856 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:20.092 UTC [protoutils] checkSignatureFromCreator -> DEBU 2857 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:20.093 UTC [msp.identity] Verify -> DEBU 2858 Verify: digest = 00000000 3f de 4b 46 1c 54 c3 ea ca ac 4b 08 08 f0 fe 03 |?.KF.T....K.....| -peer0.org1.example.com | 00000010 5d 7d aa 11 8f e4 0a d6 83 1f f1 da 1f 05 d0 fe |]}..............|" -peer0.org1.example.com | "2019-05-02 01:31:20.093 UTC [msp.identity] Verify -> DEBU 2859 Verify: sig = 00000000 30 45 02 21 00 fa e6 e8 27 d9 39 7d 11 ad a9 ee |0E.!....'.9}....| -peer0.org1.example.com | 00000010 aa 28 78 fa 90 f5 35 cc cb 2a 34 af 90 30 8c 89 |.(x...5..*4..0..| -peer0.org1.example.com | 00000020 b4 73 28 e2 1a 02 20 7b ea c5 41 1c 35 8f 4a c3 |.s(... {..A.5.J.| -peer0.org1.example.com | 00000030 fb 21 32 97 8a 95 9c 7b 08 93 3d 8d 43 d2 60 b4 |.!2....{..=.C.`.| -peer0.org1.example.com | 00000040 35 7b 82 e7 65 8a 17 |5{..e..|" -peer0.org1.example.com | "2019-05-02 01:31:20.094 UTC [protoutils] checkSignatureFromCreator -> DEBU 285a exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:20.094 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285b validateChaincodeProposalMessage starts for proposal 0xc002f7e770, header 0xc002114aa0" -peer0.org1.example.com | "2019-05-02 01:31:20.094 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:20.094 UTC [endorser] preProcess -> DEBU 285d [businesschannel][c48ba1de] processing txid: c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd" -peer0.org1.example.com | "2019-05-02 01:31:20.094 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 285e retrieveTransactionByID() - txId = [c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd]" -peer0.org1.example.com | "2019-05-02 01:31:20.095 UTC [aclmgmt] CheckACL -> DEBU 285f acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-05-02 01:31:20.095 UTC [aclmgmt] CheckACL -> DEBU 2860 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-05-02 01:31:20.095 UTC [policies] Evaluate -> DEBU 2861 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.095 UTC [policies] Evaluate -> DEBU 2862 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.095 UTC [policies] Evaluate -> DEBU 2863 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.095 UTC [cauthdsl] func1 -> DEBU 2864 0xc0041ba9a0 gate 1556760680095723800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.095 UTC [cauthdsl] func2 -> DEBU 2865 0xc0041ba9a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.095 UTC [cauthdsl] func2 -> DEBU 2866 0xc0041ba9a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.096 UTC [cauthdsl] func2 -> DEBU 2867 0xc0041ba9a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.096 UTC [msp.identity] Verify -> DEBU 2868 Verify: digest = 00000000 3f de 4b 46 1c 54 c3 ea ca ac 4b 08 08 f0 fe 03 |?.KF.T....K.....| -peer0.org1.example.com | 00000010 5d 7d aa 11 8f e4 0a d6 83 1f f1 da 1f 05 d0 fe |]}..............|" -peer0.org1.example.com | "2019-05-02 01:31:20.096 UTC [msp.identity] Verify -> DEBU 2869 Verify: sig = 00000000 30 45 02 21 00 fa e6 e8 27 d9 39 7d 11 ad a9 ee |0E.!....'.9}....| -peer0.org1.example.com | 00000010 aa 28 78 fa 90 f5 35 cc cb 2a 34 af 90 30 8c 89 |.(x...5..*4..0..| -peer0.org1.example.com | 00000020 b4 73 28 e2 1a 02 20 7b ea c5 41 1c 35 8f 4a c3 |.s(... {..A.5.J.| -peer0.org1.example.com | 00000030 fb 21 32 97 8a 95 9c 7b 08 93 3d 8d 43 d2 60 b4 |.!2....{..=.C.`.| -peer0.org1.example.com | 00000040 35 7b 82 e7 65 8a 17 |5{..e..|" -peer0.org1.example.com | "2019-05-02 01:31:20.096 UTC [cauthdsl] func2 -> DEBU 286a 0xc0041ba9a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.096 UTC [cauthdsl] func1 -> DEBU 286b 0xc0041ba9a0 gate 1556760680095723800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.096 UTC [policies] Evaluate -> DEBU 286c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:20.097 UTC [policies] Evaluate -> DEBU 286d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:20.097 UTC [policies] Evaluate -> DEBU 286e Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:20.097 UTC [policies] Evaluate -> DEBU 286f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:20.097 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2870 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:20.097 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2871 constructing new tx simulator txid = [c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd]" -peer0.org1.example.com | "2019-05-02 01:31:20.097 UTC [endorser] SimulateProposal -> DEBU 2872 [businesschannel][c48ba1de] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:20.097 UTC [stateleveldb] GetState -> DEBU 2873 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:20.097 UTC [endorser] callChaincode -> INFO 2874 [businesschannel][c48ba1de] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:20.098 UTC [stateleveldb] GetState -> DEBU 2875 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -peer0.org1.example.com | "2019-05-02 01:31:20.098 UTC [stateleveldb] GetState -> DEBU 2876 GetState(). ns=exp02, key=􏿿initialized" -peer0.org1.example.com | "2019-05-02 01:31:20.098 UTC [chaincode] Execute -> DEBU 2877 Entry" -peer0.org1.example.com | "2019-05-02 01:31:20.099 UTC [chaincode] handleMessage -> DEBU 2878 [c48ba1de] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-05-02 01:31:20.099 UTC [chaincode] HandleTransaction -> DEBU 2879 [c48ba1de] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-05-02 01:31:20.099 UTC [chaincode] HandleGetState -> DEBU 287a [c48ba1de] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:20.099 UTC [stateleveldb] GetState -> DEBU 287b GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-05-02 01:31:20.100 UTC [chaincode] HandleTransaction -> DEBU 287c [c48ba1de] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-05-02 01:31:20.100 UTC [chaincode] handleMessage -> DEBU 287d [c48ba1de] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:20.101 UTC [chaincode] Notify -> DEBU 287e [c48ba1de] notifying Txid:c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:20.101 UTC [chaincode] Execute -> DEBU 287f Exit" -peer0.org1.example.com | "2019-05-02 01:31:20.101 UTC [endorser] callChaincode -> INFO 2880 [businesschannel][c48ba1de] Exit chaincode: name:"exp02" (3ms)" -peer0.org1.example.com | "2019-05-02 01:31:20.101 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2881 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:20.101 UTC [lockbasedtxmgr] Done -> DEBU 2882 Done with transaction simulation / query execution [c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd]" -peer0.org1.example.com | "2019-05-02 01:31:20.101 UTC [endorser] SimulateProposal -> DEBU 2883 [businesschannel][c48ba1de] Exit" -peer0.org1.example.com | "2019-05-02 01:31:20.102 UTC [endorser] endorseProposal -> DEBU 2884 [businesschannel][c48ba1de] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-05-02 01:31:20.102 UTC [endorser] endorseProposal -> DEBU 2885 [businesschannel][c48ba1de] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-05-02 01:31:20.102 UTC [endorser] EndorseWithPlugin -> DEBU 2886 Entering endorsement for {plugin: escc, channel: businesschannel, tx: c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:20.102 UTC [msp.identity] Sign -> DEBU 2887 Sign: plaintext: 0A203EC2F07EEAF484EF40A3DA6C3239...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:20.102 UTC [msp.identity] Sign -> DEBU 2888 Sign: digest: 5FD95C4D235AD9D2A2DF6D320DF1994E4F33C7A6BB1A5E22F99AC0E4D5A16A42 " -peer0.org1.example.com | "2019-05-02 01:31:20.102 UTC [endorser] EndorseWithPlugin -> DEBU 2889 Exiting {plugin: escc, channel: businesschannel, tx: c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd, chaincode: exp02}" -peer0.org1.example.com | "2019-05-02 01:31:20.102 UTC [endorser] endorseProposal -> DEBU 288a [businesschannel][c48ba1de] Exit" -peer0.org1.example.com | "2019-05-02 01:31:20.103 UTC [lockbasedtxmgr] Done -> DEBU 288b Done with transaction simulation / query execution [c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd]" -peer0.org1.example.com | "2019-05-02 01:31:20.103 UTC [endorser] func1 -> DEBU 288c Exit: request from 192.168.240.9:41360" -peer0.org1.example.com | "2019-05-02 01:31:20.103 UTC [comm.grpc.server] 1 -> INFO 288d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41360 grpc.code=OK grpc.call_duration=12.0875ms -peer0.org1.example.com | "2019-05-02 01:31:20.108 UTC [grpc] infof -> DEBU 288e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:20.108 UTC [grpc] warningf -> DEBU 288f transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41360: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:31:20.109 UTC [grpc] infof -> DEBU 2890 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:20.621 UTC [endorser] ProcessProposal -> DEBU 2891 Entering: request from 192.168.240.9:41364" -peer0.org1.example.com | "2019-05-02 01:31:20.621 UTC [protoutils] ValidateProposalMessage -> DEBU 2892 ValidateProposalMessage starts for signed proposal 0xc00036a5a0" -peer0.org1.example.com | "2019-05-02 01:31:20.621 UTC [protoutils] validateChannelHeader -> DEBU 2893 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:20.622 UTC [protoutils] checkSignatureFromCreator -> DEBU 2894 begin" -peer0.org1.example.com | "2019-05-02 01:31:20.622 UTC [msp] GetManagerForChain -> DEBU 2895 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:20.623 UTC [protoutils] checkSignatureFromCreator -> DEBU 2896 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:20.623 UTC [protoutils] checkSignatureFromCreator -> DEBU 2897 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:20.623 UTC [msp.identity] Verify -> DEBU 2898 Verify: digest = 00000000 e5 bd 9c c0 83 82 85 d1 68 f6 e2 c1 f5 10 11 b9 |........h.......| -peer0.org1.example.com | 00000010 57 18 c8 7e 4e c5 26 ab 5e 01 bb a3 4c 1e aa 5c |W..~N.&.^...L..\|" -peer0.org1.example.com | "2019-05-02 01:31:20.623 UTC [msp.identity] Verify -> DEBU 2899 Verify: sig = 00000000 30 44 02 20 4c 29 b1 90 53 90 f5 2d 1f e5 34 3b |0D. L)..S..-..4;| -peer0.org1.example.com | 00000010 29 cf 84 3f 5b 59 b4 5a 80 79 a4 bd e2 d4 d9 e3 |)..?[Y.Z.y......| -peer0.org1.example.com | 00000020 4e 36 2c 70 02 20 0e 21 df 5f ab eb f7 83 ca 4b |N6,p. .!._.....K| -peer0.org1.example.com | 00000030 26 23 6d db d0 b1 e3 58 d3 72 52 c2 94 8e d7 39 |&#m....X.rR....9| -peer0.org1.example.com | 00000040 6c d1 9f ef 23 16 |l...#.|" -peer0.org1.example.com | "2019-05-02 01:31:20.624 UTC [protoutils] checkSignatureFromCreator -> DEBU 289a exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:20.624 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 289b validateChaincodeProposalMessage starts for proposal 0xc00318ad20, header 0xc00036aa50" -peer0.org1.example.com | "2019-05-02 01:31:20.624 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 289c validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:20.624 UTC [endorser] preProcess -> DEBU 289d [businesschannel][e64d8c1e] processing txid: e64d8c1e8d6d5e7c80060bbcf064e291d59a5beab8611fea916b1a5f5329656c" -peer0.org1.example.com | "2019-05-02 01:31:20.625 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 289e retrieveTransactionByID() - txId = [e64d8c1e8d6d5e7c80060bbcf064e291d59a5beab8611fea916b1a5f5329656c]" -peer0.org1.example.com | "2019-05-02 01:31:20.625 UTC [endorser] SimulateProposal -> DEBU 289f [businesschannel][e64d8c1e] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:20.625 UTC [endorser] callChaincode -> INFO 28a0 [businesschannel][e64d8c1e] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:20.625 UTC [chaincode] Execute -> DEBU 28a1 Entry" -peer0.org1.example.com | "2019-05-02 01:31:20.626 UTC [qscc] Invoke -> DEBU 28a2 Invoke function: GetChainInfo on chain: businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:20.626 UTC [aclmgmt] CheckACL -> DEBU 28a3 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -peer0.org1.example.com | "2019-05-02 01:31:20.626 UTC [aclmgmt] CheckACL -> DEBU 28a4 acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-05-02 01:31:20.626 UTC [policies] Evaluate -> DEBU 28a5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.626 UTC [policies] Evaluate -> DEBU 28a6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.626 UTC [policies] Evaluate -> DEBU 28a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.626 UTC [cauthdsl] func1 -> DEBU 28a8 0xc004205e70 gate 1556760680626789000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.626 UTC [cauthdsl] func2 -> DEBU 28a9 0xc004205e70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.626 UTC [cauthdsl] func2 -> DEBU 28aa 0xc004205e70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.627 UTC [cauthdsl] func2 -> DEBU 28ab 0xc004205e70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:20.627 UTC [cauthdsl] func2 -> DEBU 28ac 0xc004205e70 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:20.627 UTC [cauthdsl] func1 -> DEBU 28ad 0xc004205e70 gate 1556760680626789000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:20.627 UTC [policies] Evaluate -> DEBU 28ae Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.627 UTC [policies] Evaluate -> DEBU 28af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.627 UTC [policies] Evaluate -> DEBU 28b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.627 UTC [cauthdsl] func1 -> DEBU 28b1 0xc0042066b0 gate 1556760680627556800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.627 UTC [cauthdsl] func2 -> DEBU 28b2 0xc0042066b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.627 UTC [cauthdsl] func2 -> DEBU 28b3 0xc0042066b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.628 UTC [cauthdsl] func2 -> DEBU 28b4 0xc0042066b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.628 UTC [msp.identity] Verify -> DEBU 28b5 Verify: digest = 00000000 e5 bd 9c c0 83 82 85 d1 68 f6 e2 c1 f5 10 11 b9 |........h.......| -peer0.org1.example.com | 00000010 57 18 c8 7e 4e c5 26 ab 5e 01 bb a3 4c 1e aa 5c |W..~N.&.^...L..\|" -peer0.org1.example.com | "2019-05-02 01:31:20.628 UTC [msp.identity] Verify -> DEBU 28b6 Verify: sig = 00000000 30 44 02 20 4c 29 b1 90 53 90 f5 2d 1f e5 34 3b |0D. L)..S..-..4;| -peer0.org1.example.com | 00000010 29 cf 84 3f 5b 59 b4 5a 80 79 a4 bd e2 d4 d9 e3 |)..?[Y.Z.y......| -peer0.org1.example.com | 00000020 4e 36 2c 70 02 20 0e 21 df 5f ab eb f7 83 ca 4b |N6,p. .!._.....K| -peer0.org1.example.com | 00000030 26 23 6d db d0 b1 e3 58 d3 72 52 c2 94 8e d7 39 |&#m....X.rR....9| -peer0.org1.example.com | 00000040 6c d1 9f ef 23 16 |l...#.|" -peer0.org1.example.com | "2019-05-02 01:31:20.628 UTC [cauthdsl] func2 -> DEBU 28b7 0xc0042066b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.628 UTC [cauthdsl] func1 -> DEBU 28b8 0xc0042066b0 gate 1556760680627556800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.629 UTC [policies] Evaluate -> DEBU 28b9 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.629 UTC [policies] Evaluate -> DEBU 28ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.629 UTC [policies] Evaluate -> DEBU 28bb Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.629 UTC [policies] Evaluate -> DEBU 28bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.629 UTC [chaincode] handleMessage -> DEBU 28bd [e64d8c1e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:20.629 UTC [chaincode] Notify -> DEBU 28be [e64d8c1e] notifying Txid:e64d8c1e8d6d5e7c80060bbcf064e291d59a5beab8611fea916b1a5f5329656c, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:20.630 UTC [chaincode] Execute -> DEBU 28bf Exit" -peer0.org1.example.com | "2019-05-02 01:31:20.630 UTC [endorser] callChaincode -> INFO 28c0 [businesschannel][e64d8c1e] Exit chaincode: name:"qscc" (4ms)" -peer0.org1.example.com | "2019-05-02 01:31:20.630 UTC [endorser] SimulateProposal -> DEBU 28c1 [businesschannel][e64d8c1e] Exit" -peer0.org1.example.com | "2019-05-02 01:31:20.630 UTC [endorser] endorseProposal -> DEBU 28c2 [businesschannel][e64d8c1e] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:20.630 UTC [endorser] endorseProposal -> DEBU 28c3 [businesschannel][e64d8c1e] escc for chaincode name:"qscc" is escc" -peer0.org1.example.com | "2019-05-02 01:31:20.630 UTC [endorser] EndorseWithPlugin -> DEBU 28c4 Entering endorsement for {plugin: escc, channel: businesschannel, tx: e64d8c1e8d6d5e7c80060bbcf064e291d59a5beab8611fea916b1a5f5329656c, chaincode: qscc}" -peer0.org1.example.com | "2019-05-02 01:31:20.630 UTC [msp.identity] Sign -> DEBU 28c5 Sign: plaintext: 0A20371D8E8B24EEFE0EBA1EF0E13343...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:20.630 UTC [msp.identity] Sign -> DEBU 28c6 Sign: digest: 5F22031D3B02DB64590503AE77B3ACA4C9715C83A0E5DE0FB46B2C3D31309055 " -peer0.org1.example.com | "2019-05-02 01:31:20.631 UTC [endorser] EndorseWithPlugin -> DEBU 28c7 Exiting {plugin: escc, channel: businesschannel, tx: e64d8c1e8d6d5e7c80060bbcf064e291d59a5beab8611fea916b1a5f5329656c, chaincode: qscc}" -peer0.org1.example.com | "2019-05-02 01:31:20.631 UTC [endorser] endorseProposal -> DEBU 28c8 [businesschannel][e64d8c1e] Exit" -peer0.org1.example.com | "2019-05-02 01:31:20.631 UTC [endorser] func1 -> DEBU 28c9 Exit: request from 192.168.240.9:41364" -peer0.org1.example.com | "2019-05-02 01:31:20.631 UTC [comm.grpc.server] 1 -> INFO 28ca unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41364 grpc.code=OK grpc.call_duration=9.9846ms -peer0.org1.example.com | "2019-05-02 01:31:20.635 UTC [grpc] warningf -> DEBU 28cb transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41364: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:31:20.636 UTC [grpc] infof -> DEBU 28cc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:20.636 UTC [grpc] infof -> DEBU 28cd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:20.826 UTC [msp] DeserializeIdentity -> DEBU 28ce Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.827 UTC [msp] DeserializeIdentity -> DEBU 28cf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.827 UTC [gossip.comm] Send -> DEBU 28d0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:20.827 UTC [gossip.comm] sendToEndpoint -> DEBU 28d1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.827 UTC [gossip.comm] sendToEndpoint -> DEBU 28d2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:20.828 UTC [gossip.comm] sendToEndpoint -> DEBU 28d3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.828 UTC [gossip.comm] sendToEndpoint -> DEBU 28d4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:20.828 UTC [gossip.comm] sendToEndpoint -> DEBU 28d5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.828 UTC [gossip.comm] sendToEndpoint -> DEBU 28d6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:20.830 UTC [gossip.comm] func1 -> DEBU 28d7 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.830 UTC [gossip.gossip] handleMessage -> DEBU 28d8 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.830 UTC [msp] DeserializeIdentity -> DEBU 28d9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.831 UTC [msp.identity] Verify -> DEBU 28da Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -peer0.org1.example.com | 00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -peer0.org1.example.com | "2019-05-02 01:31:20.831 UTC [msp.identity] Verify -> DEBU 28db Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -peer0.org1.example.com | 00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -peer0.org1.example.com | 00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -peer0.org1.example.com | 00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -peer0.org1.example.com | 00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -peer0.org1.example.com | "2019-05-02 01:31:20.831 UTC [msp] DeserializeIdentity -> DEBU 28dc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.831 UTC [msp] DeserializeIdentity -> DEBU 28dd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.831 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:20.831 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28df Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.831 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28e0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.831 UTC [policies] Evaluate -> DEBU 28e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.831 UTC [policies] Evaluate -> DEBU 28e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.832 UTC [policies] Evaluate -> DEBU 28e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.832 UTC [cauthdsl] func1 -> DEBU 28e4 0xc0042c8390 gate 1556760680832041400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.832 UTC [cauthdsl] func2 -> DEBU 28e5 0xc0042c8390 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.832 UTC [cauthdsl] func2 -> DEBU 28e6 0xc0042c8390 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.832 UTC [cauthdsl] func2 -> DEBU 28e7 0xc0042c8390 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.832 UTC [msp.identity] Verify -> DEBU 28e8 Verify: digest = 00000000 97 fb 2f 6b ab 25 80 a3 0a b1 2e d6 57 48 39 12 |../k.%......WH9.| -peer0.org1.example.com | 00000010 bf 3c ea 49 b9 6e 47 4b 75 67 cc 48 80 fe fd cd |.<.I.nGKug.H....|" -peer0.org1.example.com | "2019-05-02 01:31:20.832 UTC [msp.identity] Verify -> DEBU 28e9 Verify: sig = 00000000 30 45 02 21 00 ae 33 be 2a ec cf 49 46 2d 69 50 |0E.!..3.*..IF-iP| -peer0.org1.example.com | 00000010 70 28 63 a9 89 2f 47 e3 0e 0a 5d 61 26 75 90 cc |p(c../G...]a&u..| -peer0.org1.example.com | 00000020 4a 6a a3 cb b0 02 20 59 c5 4d 33 f8 f6 cf c2 df |Jj.... Y.M3.....| -peer0.org1.example.com | 00000030 28 b4 c3 89 9a 3b 12 d0 7c be 2d a8 c8 5e 8a 87 |(....;..|.-..^..| -peer0.org1.example.com | 00000040 bd 9f 07 5f 99 39 b6 |..._.9.|" -peer0.org1.example.com | "2019-05-02 01:31:20.832 UTC [cauthdsl] func2 -> DEBU 28ea 0xc0042c8390 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.833 UTC [cauthdsl] func1 -> DEBU 28eb 0xc0042c8390 gate 1556760680832041400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.833 UTC [policies] Evaluate -> DEBU 28ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.833 UTC [policies] Evaluate -> DEBU 28ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.833 UTC [policies] Evaluate -> DEBU 28ee Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.833 UTC [policies] Evaluate -> DEBU 28ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.833 UTC [msp.identity] Verify -> DEBU 28f0 Verify: digest = 00000000 c1 4f ed f2 e8 55 61 0f b9 23 a6 3b f8 84 8e 89 |.O...Ua..#.;....| -peer0.org1.example.com | 00000010 27 38 34 a9 f7 91 da 93 d4 a0 cf cd 79 93 55 65 |'84.........y.Ue|" -peer0.org1.example.com | "2019-05-02 01:31:20.833 UTC [msp.identity] Verify -> DEBU 28f1 Verify: sig = 00000000 30 44 02 20 5b 06 57 7d 08 9b 49 f9 c0 9a be e0 |0D. [.W}..I.....| -peer0.org1.example.com | 00000010 f4 ef b9 77 01 8c ef cc 4e 0c 7f 36 c2 1b a9 a9 |...w....N..6....| -peer0.org1.example.com | 00000020 a7 17 06 95 02 20 31 6a d3 d7 7f 09 3c 15 55 a7 |..... 1j....<.U.| -peer0.org1.example.com | 00000030 f2 46 76 59 63 05 7e 8b 54 a5 56 00 78 c8 89 ab |.FvYc.~.T.V.x...| -peer0.org1.example.com | 00000040 75 39 ef fd b7 0f |u9....|" -peer0.org1.example.com | "2019-05-02 01:31:20.833 UTC [msp] DeserializeIdentity -> DEBU 28f2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.834 UTC [msp] DeserializeIdentity -> DEBU 28f3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.834 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:20.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.834 UTC [policies] Evaluate -> DEBU 28f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.835 UTC [policies] Evaluate -> DEBU 28f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.835 UTC [policies] Evaluate -> DEBU 28f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.835 UTC [cauthdsl] func1 -> DEBU 28fa 0xc0042d4290 gate 1556760680835215500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.835 UTC [cauthdsl] func2 -> DEBU 28fb 0xc0042d4290 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.835 UTC [gossip.comm] func1 -> DEBU 28fc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.835 UTC [cauthdsl] func2 -> DEBU 28fd 0xc0042d4290 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.835 UTC [cauthdsl] func2 -> DEBU 28fe 0xc0042d4290 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.836 UTC [msp.identity] Verify -> DEBU 28ff Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:20.836 UTC [msp.identity] Verify -> DEBU 2900 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:20.836 UTC [cauthdsl] func2 -> DEBU 2901 0xc0042d4290 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.837 UTC [msp] DeserializeIdentity -> DEBU 2902 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.837 UTC [msp] DeserializeIdentity -> DEBU 2903 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.838 UTC [gossip.comm] Send -> DEBU 2904 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760679768439500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:20.838 UTC [msp] DeserializeIdentity -> DEBU 2905 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.838 UTC [msp] DeserializeIdentity -> DEBU 2906 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.838 UTC [gossip.comm] sendToEndpoint -> DEBU 2907 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760679768439500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.838 UTC [gossip.comm] sendToEndpoint -> DEBU 2908 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:20.839 UTC [gossip.comm] sendToEndpoint -> DEBU 2909 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760679768439500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.839 UTC [gossip.comm] sendToEndpoint -> DEBU 290a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:20.839 UTC [gossip.comm] sendToEndpoint -> DEBU 290b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760679768439500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.839 UTC [gossip.comm] sendToEndpoint -> DEBU 290c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:20.836 UTC [cauthdsl] func1 -> DEBU 290d 0xc0042d4290 gate 1556760680835215500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.856 UTC [policies] Evaluate -> DEBU 290e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.856 UTC [policies] Evaluate -> DEBU 290f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.856 UTC [policies] Evaluate -> DEBU 2910 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.856 UTC [policies] Evaluate -> DEBU 2911 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.856 UTC [msp] DeserializeIdentity -> DEBU 2912 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.856 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2913 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2914 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.857 UTC [policies] Evaluate -> DEBU 2915 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.857 UTC [policies] Evaluate -> DEBU 2916 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.857 UTC [policies] Evaluate -> DEBU 2917 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.857 UTC [cauthdsl] func1 -> DEBU 2918 0xc0042d5370 gate 1556760680857683700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.857 UTC [cauthdsl] func2 -> DEBU 2919 0xc0042d5370 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.857 UTC [cauthdsl] func2 -> DEBU 291a 0xc0042d5370 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.857 UTC [cauthdsl] func2 -> DEBU 291b 0xc0042d5370 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.858 UTC [msp.identity] Verify -> DEBU 291c Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:20.858 UTC [msp.identity] Verify -> DEBU 291d Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:20.859 UTC [cauthdsl] func2 -> DEBU 291e 0xc0042d5370 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.859 UTC [cauthdsl] func1 -> DEBU 291f 0xc0042d5370 gate 1556760680857683700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.859 UTC [policies] Evaluate -> DEBU 2920 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.859 UTC [policies] Evaluate -> DEBU 2921 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.859 UTC [policies] Evaluate -> DEBU 2922 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.859 UTC [policies] Evaluate -> DEBU 2923 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.860 UTC [gossip.gossip] handleMessage -> DEBU 2924 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:20.860 UTC [gossip.gossip] handleMessage -> DEBU 2925 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.860 UTC [msp] DeserializeIdentity -> DEBU 2926 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.861 UTC [msp.identity] Verify -> DEBU 2927 Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -peer0.org1.example.com | 00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -peer0.org1.example.com | "2019-05-02 01:31:20.862 UTC [msp.identity] Verify -> DEBU 2928 Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -peer0.org1.example.com | 00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -peer0.org1.example.com | 00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -peer0.org1.example.com | 00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -peer0.org1.example.com | 00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -peer0.org1.example.com | "2019-05-02 01:31:20.863 UTC [msp] DeserializeIdentity -> DEBU 2929 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.863 UTC [msp] DeserializeIdentity -> DEBU 292a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.865 UTC [endorser] ProcessProposal -> DEBU 292b Entering: request from 192.168.240.9:41368" -peer0.org1.example.com | "2019-05-02 01:31:20.865 UTC [protoutils] ValidateProposalMessage -> DEBU 292c ValidateProposalMessage starts for signed proposal 0xc00036bef0" -peer0.org1.example.com | "2019-05-02 01:31:20.865 UTC [protoutils] validateChannelHeader -> DEBU 292d validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:20.865 UTC [protoutils] checkSignatureFromCreator -> DEBU 292e begin" -peer0.org1.example.com | "2019-05-02 01:31:20.866 UTC [msp] GetManagerForChain -> DEBU 292f Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:20.866 UTC [protoutils] checkSignatureFromCreator -> DEBU 2930 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:20.866 UTC [protoutils] checkSignatureFromCreator -> DEBU 2931 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:20.866 UTC [msp.identity] Verify -> DEBU 2932 Verify: digest = 00000000 2d ce 34 ae 82 77 9a f3 86 2a e0 43 3e 1c 65 f6 |-.4..w...*.C>.e.| -peer0.org1.example.com | 00000010 6a 84 7d b6 c4 13 b6 c3 b1 09 29 a2 ec f5 da 06 |j.}.......).....|" -peer0.org1.example.com | "2019-05-02 01:31:20.867 UTC [msp.identity] Verify -> DEBU 2933 Verify: sig = 00000000 30 45 02 21 00 c1 be ba ce 87 ce d1 1d a0 11 af |0E.!............| -peer0.org1.example.com | 00000010 c2 7f 4b d7 45 a4 5a 13 c2 22 5a 3b 96 63 17 8b |..K.E.Z.."Z;.c..| -peer0.org1.example.com | 00000020 56 cf a8 66 e6 02 20 40 0f 07 58 46 be e3 73 e0 |V..f.. @..XF..s.| -peer0.org1.example.com | 00000030 2d 0c ac f9 d1 14 69 60 e9 56 a3 d9 ce e6 87 25 |-.....i`.V.....%| -peer0.org1.example.com | 00000040 f7 ea 7b 56 30 61 c8 |..{V0a.|" -peer0.org1.example.com | "2019-05-02 01:31:20.867 UTC [protoutils] checkSignatureFromCreator -> DEBU 2934 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:20.867 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2935 validateChaincodeProposalMessage starts for proposal 0xc00318afc0, header 0xc00014a780" -peer0.org1.example.com | "2019-05-02 01:31:20.867 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2936 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:20.867 UTC [endorser] preProcess -> DEBU 2937 [businesschannel][babc1182] processing txid: babc1182ed73e524e4080e0f54553684fc823a0e1872f6a9d3c9f844c5ad2566" -peer0.org1.example.com | "2019-05-02 01:31:20.868 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2938 retrieveTransactionByID() - txId = [babc1182ed73e524e4080e0f54553684fc823a0e1872f6a9d3c9f844c5ad2566]" -peer0.org1.example.com | "2019-05-02 01:31:20.868 UTC [endorser] SimulateProposal -> DEBU 2939 [businesschannel][babc1182] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:20.868 UTC [endorser] callChaincode -> INFO 293a [businesschannel][babc1182] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:20.868 UTC [chaincode] Execute -> DEBU 293b Entry" -peer0.org1.example.com | "2019-05-02 01:31:20.868 UTC [qscc] Invoke -> DEBU 293c Invoke function: GetBlockByNumber on chain: businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:20.868 UTC [aclmgmt] CheckACL -> DEBU 293d acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" -peer0.org1.example.com | "2019-05-02 01:31:20.868 UTC [aclmgmt] CheckACL -> DEBU 293e acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-05-02 01:31:20.869 UTC [policies] Evaluate -> DEBU 293f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.869 UTC [policies] Evaluate -> DEBU 2940 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.869 UTC [policies] Evaluate -> DEBU 2941 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.869 UTC [cauthdsl] func1 -> DEBU 2942 0xc004340f10 gate 1556760680869245500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.869 UTC [cauthdsl] func2 -> DEBU 2943 0xc004340f10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.869 UTC [cauthdsl] func2 -> DEBU 2944 0xc004340f10 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.869 UTC [cauthdsl] func2 -> DEBU 2945 0xc004340f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:20.869 UTC [cauthdsl] func2 -> DEBU 2946 0xc004340f10 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:20.869 UTC [cauthdsl] func1 -> DEBU 2947 0xc004340f10 gate 1556760680869245500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:20.869 UTC [policies] Evaluate -> DEBU 2948 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.870 UTC [policies] Evaluate -> DEBU 2949 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.870 UTC [policies] Evaluate -> DEBU 294a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.870 UTC [cauthdsl] func1 -> DEBU 294b 0xc004341850 gate 1556760680870100000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.870 UTC [cauthdsl] func2 -> DEBU 294c 0xc004341850 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.870 UTC [cauthdsl] func2 -> DEBU 294d 0xc004341850 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.870 UTC [cauthdsl] func2 -> DEBU 294e 0xc004341850 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.870 UTC [msp.identity] Verify -> DEBU 294f Verify: digest = 00000000 2d ce 34 ae 82 77 9a f3 86 2a e0 43 3e 1c 65 f6 |-.4..w...*.C>.e.| -peer0.org1.example.com | 00000010 6a 84 7d b6 c4 13 b6 c3 b1 09 29 a2 ec f5 da 06 |j.}.......).....|" -peer0.org1.example.com | "2019-05-02 01:31:20.870 UTC [msp.identity] Verify -> DEBU 2950 Verify: sig = 00000000 30 45 02 21 00 c1 be ba ce 87 ce d1 1d a0 11 af |0E.!............| -peer0.org1.example.com | 00000010 c2 7f 4b d7 45 a4 5a 13 c2 22 5a 3b 96 63 17 8b |..K.E.Z.."Z;.c..| -peer0.org1.example.com | 00000020 56 cf a8 66 e6 02 20 40 0f 07 58 46 be e3 73 e0 |V..f.. @..XF..s.| -peer0.org1.example.com | 00000030 2d 0c ac f9 d1 14 69 60 e9 56 a3 d9 ce e6 87 25 |-.....i`.V.....%| -peer0.org1.example.com | 00000040 f7 ea 7b 56 30 61 c8 |..{V0a.|" -peer0.org1.example.com | "2019-05-02 01:31:20.871 UTC [cauthdsl] func2 -> DEBU 2951 0xc004341850 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.871 UTC [cauthdsl] func1 -> DEBU 2952 0xc004341850 gate 1556760680870100000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.871 UTC [policies] Evaluate -> DEBU 2953 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.871 UTC [policies] Evaluate -> DEBU 2954 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.871 UTC [policies] Evaluate -> DEBU 2955 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.871 UTC [policies] Evaluate -> DEBU 2956 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.871 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 2957 retrieveBlockByNumber() - blockNum = [2]" -peer0.org1.example.com | "2019-05-02 01:31:20.871 UTC [fsblkstorage] newBlockfileStream -> DEBU 2958 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47628]" -peer0.org1.example.com | "2019-05-02 01:31:20.871 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2959 Remaining bytes=[51045], Going to peek [8] bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 295a Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47628], bytesOffset=[47631]}" -peer0.org1.example.com | "2019-05-02 01:31:20.872 UTC [chaincode] handleMessage -> DEBU 295b [babc1182] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:20.873 UTC [chaincode] Notify -> DEBU 295c [babc1182] notifying Txid:babc1182ed73e524e4080e0f54553684fc823a0e1872f6a9d3c9f844c5ad2566, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:20.873 UTC [chaincode] Execute -> DEBU 295d Exit" -peer0.org1.example.com | "2019-05-02 01:31:20.873 UTC [endorser] callChaincode -> INFO 295e [businesschannel][babc1182] Exit chaincode: name:"qscc" (5ms)" -peer0.org1.example.com | "2019-05-02 01:31:20.873 UTC [endorser] SimulateProposal -> DEBU 295f [businesschannel][babc1182] Exit" -peer0.org1.example.com | "2019-05-02 01:31:20.873 UTC [endorser] endorseProposal -> DEBU 2960 [businesschannel][babc1182] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:20.873 UTC [endorser] endorseProposal -> DEBU 2961 [businesschannel][babc1182] escc for chaincode name:"qscc" is escc" -peer0.org1.example.com | "2019-05-02 01:31:20.873 UTC [endorser] EndorseWithPlugin -> DEBU 2962 Entering endorsement for {plugin: escc, channel: businesschannel, tx: babc1182ed73e524e4080e0f54553684fc823a0e1872f6a9d3c9f844c5ad2566, chaincode: qscc}" -peer0.org1.example.com | "2019-05-02 01:31:20.873 UTC [msp.identity] Sign -> DEBU 2963 Sign: plaintext: 0A2078A8CF7F2F68F899EA112B291052...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:20.874 UTC [msp.identity] Sign -> DEBU 2964 Sign: digest: 1F1DA36AE97AD61F24D4C9634C7625AE37DE1BDB56EB4926A441ECE656054EB0 " -peer0.org1.example.com | "2019-05-02 01:31:20.874 UTC [endorser] EndorseWithPlugin -> DEBU 2965 Exiting {plugin: escc, channel: businesschannel, tx: babc1182ed73e524e4080e0f54553684fc823a0e1872f6a9d3c9f844c5ad2566, chaincode: qscc}" -peer0.org1.example.com | "2019-05-02 01:31:20.874 UTC [endorser] endorseProposal -> DEBU 2966 [businesschannel][babc1182] Exit" -peer0.org1.example.com | "2019-05-02 01:31:20.874 UTC [endorser] func1 -> DEBU 2967 Exit: request from 192.168.240.9:41368" -peer0.org1.example.com | "2019-05-02 01:31:20.874 UTC [comm.grpc.server] 1 -> INFO 2968 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41368 grpc.code=OK grpc.call_duration=8.892ms -peer0.org1.example.com | "2019-05-02 01:31:20.881 UTC [grpc] warningf -> DEBU 2969 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41368: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:31:20.881 UTC [grpc] infof -> DEBU 296a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:20.881 UTC [grpc] infof -> DEBU 296b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:20.882 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 296c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:20.882 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 296d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.882 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 296e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.882 UTC [policies] Evaluate -> DEBU 296f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.882 UTC [policies] Evaluate -> DEBU 2970 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.882 UTC [policies] Evaluate -> DEBU 2971 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.882 UTC [cauthdsl] func1 -> DEBU 2972 0xc0042ef730 gate 1556760680882369000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.882 UTC [cauthdsl] func2 -> DEBU 2973 0xc0042ef730 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.882 UTC [cauthdsl] func2 -> DEBU 2974 0xc0042ef730 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.882 UTC [cauthdsl] func2 -> DEBU 2975 0xc0042ef730 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.883 UTC [msp.identity] Verify -> DEBU 2976 Verify: digest = 00000000 bf 19 17 87 78 42 db f7 eb cf d0 d9 08 ee e7 15 |....xB..........| -peer0.org1.example.com | 00000010 4b cc a4 95 06 41 81 d5 eb 5f 3a 7d a9 7c 14 8c |K....A..._:}.|..|" -peer0.org1.example.com | "2019-05-02 01:31:20.883 UTC [msp.identity] Verify -> DEBU 2977 Verify: sig = 00000000 30 44 02 20 25 d8 a0 a8 55 64 cf d4 22 95 b0 2b |0D. %...Ud.."..+| -peer0.org1.example.com | 00000010 9d 19 2a 2d f1 ee ab c7 40 00 b0 25 7c 8c 4e e5 |..*-....@..%|.N.| -peer0.org1.example.com | 00000020 f2 77 cf 80 02 20 10 b1 5c d3 47 5b e8 91 ee aa |.w... ..\.G[....| -peer0.org1.example.com | 00000030 61 ae d2 82 b6 50 a4 6d 3d e3 76 f7 db 98 6e 95 |a....P.m=.v...n.| -peer0.org1.example.com | 00000040 5d c2 20 53 e7 b2 |]. S..|" -peer0.org1.example.com | "2019-05-02 01:31:20.883 UTC [cauthdsl] func2 -> DEBU 2978 0xc0042ef730 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.883 UTC [cauthdsl] func1 -> DEBU 2979 0xc0042ef730 gate 1556760680882369000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.883 UTC [policies] Evaluate -> DEBU 297a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.883 UTC [policies] Evaluate -> DEBU 297b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.883 UTC [policies] Evaluate -> DEBU 297c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.883 UTC [policies] Evaluate -> DEBU 297d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.884 UTC [msp.identity] Verify -> DEBU 297e Verify: digest = 00000000 c1 4f ed f2 e8 55 61 0f b9 23 a6 3b f8 84 8e 89 |.O...Ua..#.;....| -peer0.org1.example.com | 00000010 27 38 34 a9 f7 91 da 93 d4 a0 cf cd 79 93 55 65 |'84.........y.Ue|" -peer0.org1.example.com | "2019-05-02 01:31:20.884 UTC [msp.identity] Verify -> DEBU 297f Verify: sig = 00000000 30 44 02 20 5b 06 57 7d 08 9b 49 f9 c0 9a be e0 |0D. [.W}..I.....| -peer0.org1.example.com | 00000010 f4 ef b9 77 01 8c ef cc 4e 0c 7f 36 c2 1b a9 a9 |...w....N..6....| -peer0.org1.example.com | 00000020 a7 17 06 95 02 20 31 6a d3 d7 7f 09 3c 15 55 a7 |..... 1j....<.U.| -peer0.org1.example.com | 00000030 f2 46 76 59 63 05 7e 8b 54 a5 56 00 78 c8 89 ab |.FvYc.~.T.V.x...| -peer0.org1.example.com | 00000040 75 39 ef fd b7 0f |u9....|" -peer0.org1.example.com | "2019-05-02 01:31:20.884 UTC [msp] DeserializeIdentity -> DEBU 2980 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.884 UTC [msp] DeserializeIdentity -> DEBU 2981 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.884 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2982 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:20.884 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2983 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.884 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2984 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.884 UTC [policies] Evaluate -> DEBU 2985 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.885 UTC [policies] Evaluate -> DEBU 2986 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.885 UTC [policies] Evaluate -> DEBU 2987 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.885 UTC [cauthdsl] func1 -> DEBU 2988 0xc0043f9630 gate 1556760680885279200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.885 UTC [cauthdsl] func2 -> DEBU 2989 0xc0043f9630 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.885 UTC [cauthdsl] func2 -> DEBU 298a 0xc0043f9630 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.885 UTC [cauthdsl] func2 -> DEBU 298b 0xc0043f9630 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.885 UTC [msp.identity] Verify -> DEBU 298c Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:20.885 UTC [msp.identity] Verify -> DEBU 298d Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:20.886 UTC [cauthdsl] func2 -> DEBU 298e 0xc0043f9630 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.886 UTC [cauthdsl] func1 -> DEBU 298f 0xc0043f9630 gate 1556760680885279200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.886 UTC [policies] Evaluate -> DEBU 2990 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.886 UTC [policies] Evaluate -> DEBU 2991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.887 UTC [policies] Evaluate -> DEBU 2992 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.887 UTC [policies] Evaluate -> DEBU 2993 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.887 UTC [msp] DeserializeIdentity -> DEBU 2994 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.887 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2995 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.887 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2996 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.887 UTC [policies] Evaluate -> DEBU 2997 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.887 UTC [policies] Evaluate -> DEBU 2998 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.887 UTC [policies] Evaluate -> DEBU 2999 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.888 UTC [cauthdsl] func1 -> DEBU 299a 0xc004422710 gate 1556760680888087700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.888 UTC [cauthdsl] func2 -> DEBU 299b 0xc004422710 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.888 UTC [cauthdsl] func2 -> DEBU 299c 0xc004422710 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.888 UTC [cauthdsl] func2 -> DEBU 299d 0xc004422710 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.888 UTC [msp.identity] Verify -> DEBU 299e Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:20.889 UTC [msp.identity] Verify -> DEBU 299f Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:20.889 UTC [cauthdsl] func2 -> DEBU 29a0 0xc004422710 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.889 UTC [cauthdsl] func1 -> DEBU 29a1 0xc004422710 gate 1556760680888087700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.889 UTC [policies] Evaluate -> DEBU 29a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.889 UTC [policies] Evaluate -> DEBU 29a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.889 UTC [policies] Evaluate -> DEBU 29a4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.889 UTC [policies] Evaluate -> DEBU 29a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.889 UTC [gossip.gossip] handleMessage -> DEBU 29a6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [gossip.gossip] handleMessage -> DEBU 29a7 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [msp] DeserializeIdentity -> DEBU 29a8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [msp] DeserializeIdentity -> DEBU 29a9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29ab Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29ac Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [policies] Evaluate -> DEBU 29ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [policies] Evaluate -> DEBU 29ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [policies] Evaluate -> DEBU 29af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [cauthdsl] func1 -> DEBU 29b0 0xc00448a130 gate 1556760680890940700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.890 UTC [cauthdsl] func2 -> DEBU 29b1 0xc00448a130 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.891 UTC [cauthdsl] func2 -> DEBU 29b2 0xc00448a130 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.891 UTC [cauthdsl] func2 -> DEBU 29b3 0xc00448a130 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.891 UTC [msp.identity] Verify -> DEBU 29b4 Verify: digest = 00000000 bf 19 17 87 78 42 db f7 eb cf d0 d9 08 ee e7 15 |....xB..........| -peer0.org1.example.com | 00000010 4b cc a4 95 06 41 81 d5 eb 5f 3a 7d a9 7c 14 8c |K....A..._:}.|..|" -peer0.org1.example.com | "2019-05-02 01:31:20.891 UTC [msp.identity] Verify -> DEBU 29b5 Verify: sig = 00000000 30 44 02 20 25 d8 a0 a8 55 64 cf d4 22 95 b0 2b |0D. %...Ud.."..+| -peer0.org1.example.com | 00000010 9d 19 2a 2d f1 ee ab c7 40 00 b0 25 7c 8c 4e e5 |..*-....@..%|.N.| -peer0.org1.example.com | 00000020 f2 77 cf 80 02 20 10 b1 5c d3 47 5b e8 91 ee aa |.w... ..\.G[....| -peer0.org1.example.com | 00000030 61 ae d2 82 b6 50 a4 6d 3d e3 76 f7 db 98 6e 95 |a....P.m=.v...n.| -peer0.org1.example.com | 00000040 5d c2 20 53 e7 b2 |]. S..|" -peer0.org1.example.com | "2019-05-02 01:31:20.891 UTC [cauthdsl] func2 -> DEBU 29b6 0xc00448a130 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.891 UTC [cauthdsl] func1 -> DEBU 29b7 0xc00448a130 gate 1556760680890940700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.891 UTC [policies] Evaluate -> DEBU 29b8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.891 UTC [policies] Evaluate -> DEBU 29b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.891 UTC [policies] Evaluate -> DEBU 29ba Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.892 UTC [policies] Evaluate -> DEBU 29bb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.892 UTC [msp] DeserializeIdentity -> DEBU 29bc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.892 UTC [msp] DeserializeIdentity -> DEBU 29bd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.892 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:20.892 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29bf Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.892 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [policies] Evaluate -> DEBU 29c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [policies] Evaluate -> DEBU 29c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [policies] Evaluate -> DEBU 29c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [cauthdsl] func1 -> DEBU 29c4 0xc002666480 gate 1556760680893261500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [cauthdsl] func2 -> DEBU 29c5 0xc002666480 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [cauthdsl] func2 -> DEBU 29c6 0xc002666480 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [cauthdsl] func2 -> DEBU 29c7 0xc002666480 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [msp.identity] Verify -> DEBU 29c8 Verify: digest = 00000000 97 fb 2f 6b ab 25 80 a3 0a b1 2e d6 57 48 39 12 |../k.%......WH9.| -peer0.org1.example.com | 00000010 bf 3c ea 49 b9 6e 47 4b 75 67 cc 48 80 fe fd cd |.<.I.nGKug.H....|" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [msp.identity] Verify -> DEBU 29c9 Verify: sig = 00000000 30 45 02 21 00 ae 33 be 2a ec cf 49 46 2d 69 50 |0E.!..3.*..IF-iP| -peer0.org1.example.com | 00000010 70 28 63 a9 89 2f 47 e3 0e 0a 5d 61 26 75 90 cc |p(c../G...]a&u..| -peer0.org1.example.com | 00000020 4a 6a a3 cb b0 02 20 59 c5 4d 33 f8 f6 cf c2 df |Jj.... Y.M3.....| -peer0.org1.example.com | 00000030 28 b4 c3 89 9a 3b 12 d0 7c be 2d a8 c8 5e 8a 87 |(....;..|.-..^..| -peer0.org1.example.com | 00000040 bd 9f 07 5f 99 39 b6 |..._.9.|" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [cauthdsl] func2 -> DEBU 29ca 0xc002666480 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [cauthdsl] func1 -> DEBU 29cb 0xc002666480 gate 1556760680893261500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.893 UTC [policies] Evaluate -> DEBU 29cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.894 UTC [policies] Evaluate -> DEBU 29cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.894 UTC [policies] Evaluate -> DEBU 29ce Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.894 UTC [policies] Evaluate -> DEBU 29cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.894 UTC [msp.identity] Verify -> DEBU 29d0 Verify: digest = 00000000 c1 4f ed f2 e8 55 61 0f b9 23 a6 3b f8 84 8e 89 |.O...Ua..#.;....| -peer0.org1.example.com | 00000010 27 38 34 a9 f7 91 da 93 d4 a0 cf cd 79 93 55 65 |'84.........y.Ue|" -peer0.org1.example.com | "2019-05-02 01:31:20.894 UTC [msp.identity] Verify -> DEBU 29d1 Verify: sig = 00000000 30 44 02 20 5b 06 57 7d 08 9b 49 f9 c0 9a be e0 |0D. [.W}..I.....| -peer0.org1.example.com | 00000010 f4 ef b9 77 01 8c ef cc 4e 0c 7f 36 c2 1b a9 a9 |...w....N..6....| -peer0.org1.example.com | 00000020 a7 17 06 95 02 20 31 6a d3 d7 7f 09 3c 15 55 a7 |..... 1j....<.U.| -peer0.org1.example.com | 00000030 f2 46 76 59 63 05 7e 8b 54 a5 56 00 78 c8 89 ab |.FvYc.~.T.V.x...| -peer0.org1.example.com | 00000040 75 39 ef fd b7 0f |u9....|" -peer0.org1.example.com | "2019-05-02 01:31:20.894 UTC [msp.identity] Verify -> DEBU 29d2 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:20.894 UTC [msp.identity] Verify -> DEBU 29d3 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29d4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29d5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func1 -> DEBU 29d9 0xc0026c82a0 gate 1556760680895251800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29da 0xc0026c82a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29db 0xc0026c82a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29dc 0xc0026c82a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29dd 0xc0026c82a0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func1 -> DEBU 29de 0xc0026c82a0 gate 1556760680895251800 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29df Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func1 -> DEBU 29e2 0xc0026c8ae0 gate 1556760680895584700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29e3 0xc0026c8ae0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29e4 0xc0026c8ae0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29e5 0xc0026c8ae0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [msp.identity] Verify -> DEBU 29e6 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [msp.identity] Verify -> DEBU 29e7 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29e8 0xc0026c8ae0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:20.895 UTC [cauthdsl] func1 -> DEBU 29e9 0xc0026c8ae0 gate 1556760680895584700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:20.896 UTC [policies] Evaluate -> DEBU 29ea Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.896 UTC [policies] Evaluate -> DEBU 29eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.896 UTC [policies] Evaluate -> DEBU 29ec Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.896 UTC [policies] Evaluate -> DEBU 29ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:20.896 UTC [gossip.gossip] handleMessage -> DEBU 29ee Exiting" -peer0.org1.example.com | "2019-05-02 01:31:20.944 UTC [msp] DeserializeIdentity -> DEBU 29ef Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.944 UTC [msp] DeserializeIdentity -> DEBU 29f0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.944 UTC [gossip.pull] Hello -> DEBU 29f1 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:20.944 UTC [msp] DeserializeIdentity -> DEBU 29f2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.944 UTC [msp] DeserializeIdentity -> DEBU 29f3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:20.944 UTC [gossip.comm] Send -> DEBU 29f4 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:20.945 UTC [gossip.comm] sendToEndpoint -> DEBU 29f5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.945 UTC [gossip.comm] sendToEndpoint -> DEBU 29f6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:20.946 UTC [gossip.gossip] handleMessage -> DEBU 29f7 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14314600018230149931 , Msg_type: BLOCK_MSG, digests: [8 1 2 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.946 UTC [gossip.pull] HandleMessage -> DEBU 29f8 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14314600018230149931 , Msg_type: BLOCK_MSG, digests: [8 1 2 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:20.946 UTC [gossip.gossip] handleMessage -> DEBU 29f9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.096 UTC [gossip.gossip] handleMessage -> DEBU 29fa Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.096 UTC [msp] DeserializeIdentity -> DEBU 29fb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.096 UTC [msp] DeserializeIdentity -> DEBU 29fc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.097 UTC [gossip.gossip] handleMessage -> DEBU 29fd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.103 UTC [gossip.comm] func1 -> DEBU 29fe Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760679738375000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.104 UTC [gossip.gossip] handleMessage -> DEBU 29ff Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760679738375000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.111 UTC [gossip.comm] func1 -> DEBU 2a00 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760679738375000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.105 UTC [msp.identity] Verify -> DEBU 2a01 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:21.116 UTC [msp.identity] Verify -> DEBU 2a02 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:21.116 UTC [msp] DeserializeIdentity -> DEBU 2a03 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.116 UTC [gossip.gossip] handleMessage -> DEBU 2a04 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.116 UTC [gossip.gossip] handleMessage -> DEBU 2a05 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760679738375000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.117 UTC [msp.identity] Verify -> DEBU 2a06 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:21.117 UTC [msp.identity] Verify -> DEBU 2a07 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:21.117 UTC [msp] DeserializeIdentity -> DEBU 2a08 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.117 UTC [gossip.gossip] handleMessage -> DEBU 2a09 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.118 UTC [gossip.gossip] handleMessage -> DEBU 2a0a Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760679738375000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.118 UTC [msp.identity] Verify -> DEBU 2a0b Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:21.118 UTC [msp.identity] Verify -> DEBU 2a0c Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:21.119 UTC [gossip.gossip] handleMessage -> DEBU 2a0d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.123 UTC [gossip.gossip] handleMessage -> DEBU 2a0e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.123 UTC [gossip.pull] HandleMessage -> DEBU 2a0f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.123 UTC [gossip.pull] SendDigest -> DEBU 2a10 Sending BLOCK_MSG digest: [5 6 7 8 1 2 3 4] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:21.124 UTC [gossip.gossip] handleMessage -> DEBU 2a11 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.316 UTC [gossip.comm] func1 -> DEBU 2a12 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.318 UTC [gossip.comm] func1 -> DEBU 2a13 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760679699759400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.318 UTC [gossip.gossip] handleMessage -> DEBU 2a14 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.318 UTC [msp] DeserializeIdentity -> DEBU 2a15 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.320 UTC [msp] DeserializeIdentity -> DEBU 2a16 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.320 UTC [msp] DeserializeIdentity -> DEBU 2a17 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.322 UTC [gossip.gossip] handleMessage -> DEBU 2a18 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.322 UTC [gossip.gossip] handleMessage -> DEBU 2a19 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760679699759400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.322 UTC [msp] DeserializeIdentity -> DEBU 2a1a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.323 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:21.323 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a1c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:21.324 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a1d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:21.324 UTC [policies] Evaluate -> DEBU 2a1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.324 UTC [policies] Evaluate -> DEBU 2a1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:21.324 UTC [policies] Evaluate -> DEBU 2a20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.325 UTC [cauthdsl] func1 -> DEBU 2a21 0xc0027c7f90 gate 1556760681325015100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:21.326 UTC [cauthdsl] func2 -> DEBU 2a22 0xc0027c7f90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:21.326 UTC [cauthdsl] func2 -> DEBU 2a23 0xc0027c7f90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:21.326 UTC [cauthdsl] func2 -> DEBU 2a24 0xc0027c7f90 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.327 UTC [msp.identity] Verify -> DEBU 2a25 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:21.327 UTC [msp.identity] Verify -> DEBU 2a26 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:21.327 UTC [cauthdsl] func2 -> DEBU 2a28 0xc0027c7f90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.328 UTC [cauthdsl] func1 -> DEBU 2a29 0xc0027c7f90 gate 1556760681325015100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:21.327 UTC [gossip.comm] func1 -> DEBU 2a27 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760679699759400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.329 UTC [policies] Evaluate -> DEBU 2a2a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.329 UTC [policies] Evaluate -> DEBU 2a2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.329 UTC [policies] Evaluate -> DEBU 2a2c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.330 UTC [policies] Evaluate -> DEBU 2a2d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.330 UTC [msp] DeserializeIdentity -> DEBU 2a2e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.330 UTC [gossip.gossip] handleMessage -> DEBU 2a2f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.331 UTC [gossip.gossip] handleMessage -> DEBU 2a30 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760679699759400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.331 UTC [msp] DeserializeIdentity -> DEBU 2a31 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.332 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a32 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:21.332 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a33 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:21.332 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a34 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:21.332 UTC [policies] Evaluate -> DEBU 2a35 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.333 UTC [policies] Evaluate -> DEBU 2a36 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:21.333 UTC [policies] Evaluate -> DEBU 2a37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.333 UTC [cauthdsl] func1 -> DEBU 2a38 0xc002fe59b0 gate 1556760681333913600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:21.334 UTC [cauthdsl] func2 -> DEBU 2a39 0xc002fe59b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:21.334 UTC [cauthdsl] func2 -> DEBU 2a3a 0xc002fe59b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:21.334 UTC [cauthdsl] func2 -> DEBU 2a3b 0xc002fe59b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.334 UTC [msp.identity] Verify -> DEBU 2a3c Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:21.335 UTC [msp.identity] Verify -> DEBU 2a3d Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:21.335 UTC [cauthdsl] func2 -> DEBU 2a3e 0xc002fe59b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.335 UTC [cauthdsl] func1 -> DEBU 2a3f 0xc002fe59b0 gate 1556760681333913600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:21.336 UTC [policies] Evaluate -> DEBU 2a40 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.336 UTC [policies] Evaluate -> DEBU 2a41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.336 UTC [policies] Evaluate -> DEBU 2a42 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.338 UTC [policies] Evaluate -> DEBU 2a43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.339 UTC [msp] DeserializeIdentity -> DEBU 2a44 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.340 UTC [gossip.gossip] handleMessage -> DEBU 2a45 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.435 UTC [gossip.gossip] handleMessage -> DEBU 2a46 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.435 UTC [gossip.pull] HandleMessage -> DEBU 2a47 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.436 UTC [gossip.pull] SendDigest -> DEBU 2a48 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:21.436 UTC [gossip.gossip] handleMessage -> DEBU 2a49 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.439 UTC [endorser] ProcessProposal -> DEBU 2a4a Entering: request from 192.168.240.9:41372" -peer0.org1.example.com | "2019-05-02 01:31:21.440 UTC [protoutils] ValidateProposalMessage -> DEBU 2a4b ValidateProposalMessage starts for signed proposal 0xc0025e4140" -peer0.org1.example.com | "2019-05-02 01:31:21.440 UTC [protoutils] validateChannelHeader -> DEBU 2a4c validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:21.440 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a4d begin" -peer0.org1.example.com | "2019-05-02 01:31:21.441 UTC [msp] GetManagerForChain -> DEBU 2a4e Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:21.441 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a4f creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:21.441 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a50 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:21.441 UTC [msp.identity] Verify -> DEBU 2a51 Verify: digest = 00000000 7a 48 2d 96 aa c8 69 22 9b 97 a6 8d 72 d9 6f 35 |zH-...i"....r.o5| -peer0.org1.example.com | 00000010 20 84 38 58 3b 1d 47 3d 9c 6d ab 28 ef f9 e3 c1 | .8X;.G=.m.(....|" -peer0.org1.example.com | "2019-05-02 01:31:21.442 UTC [msp.identity] Verify -> DEBU 2a52 Verify: sig = 00000000 30 44 02 20 57 3f 08 bd cb 24 66 a7 cc 46 8a f9 |0D. W?...$f..F..| -peer0.org1.example.com | 00000010 f1 70 a3 94 89 5a ff 78 fd cc 49 b7 ec 88 bf a2 |.p...Z.x..I.....| -peer0.org1.example.com | 00000020 25 a3 3a 97 02 20 79 ef e1 52 8b 23 81 4c 00 4c |%.:.. y..R.#.L.L| -peer0.org1.example.com | 00000030 bb 71 e2 b4 1b bb 84 b0 6c 4f ba 34 1b 65 bf 10 |.q......lO.4.e..| -peer0.org1.example.com | 00000040 5e fe 69 5d e9 83 |^.i]..|" -peer0.org1.example.com | "2019-05-02 01:31:21.442 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a53 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:21.443 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2a54 validateChaincodeProposalMessage starts for proposal 0xc002f7f1f0, header 0xc0025e4550" -peer0.org1.example.com | "2019-05-02 01:31:21.443 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2a55 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.443 UTC [endorser] preProcess -> DEBU 2a56 [businesschannel][cb915c8a] processing txid: cb915c8a1a1c299b96c98f82baec2fc213de3021d08a84dc262205b642e3155c" -peer0.org1.example.com | "2019-05-02 01:31:21.444 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2a57 retrieveTransactionByID() - txId = [cb915c8a1a1c299b96c98f82baec2fc213de3021d08a84dc262205b642e3155c]" -peer0.org1.example.com | "2019-05-02 01:31:21.444 UTC [endorser] SimulateProposal -> DEBU 2a58 [businesschannel][cb915c8a] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.445 UTC [endorser] callChaincode -> INFO 2a59 [businesschannel][cb915c8a] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.446 UTC [chaincode] Execute -> DEBU 2a5a Entry" -peer0.org1.example.com | "2019-05-02 01:31:21.446 UTC [cscc] Invoke -> DEBU 2a5b Invoke function: GetConfigBlock" -peer0.org1.example.com | "2019-05-02 01:31:21.447 UTC [aclmgmt] CheckACL -> DEBU 2a5c acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" -peer0.org1.example.com | "2019-05-02 01:31:21.452 UTC [aclmgmt] CheckACL -> DEBU 2a5e acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-05-02 01:31:21.447 UTC [gossip.gossip] handleMessage -> DEBU 2a5d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.452 UTC [policies] Evaluate -> DEBU 2a5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.453 UTC [policies] Evaluate -> DEBU 2a62 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:21.453 UTC [policies] Evaluate -> DEBU 2a63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.454 UTC [cauthdsl] func1 -> DEBU 2a64 0xc003042520 gate 1556760681453909200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:21.454 UTC [cauthdsl] func2 -> DEBU 2a65 0xc003042520 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:21.454 UTC [cauthdsl] func2 -> DEBU 2a66 0xc003042520 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:21.454 UTC [cauthdsl] func2 -> DEBU 2a67 0xc003042520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:21.453 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.453 UTC [gossip.gossip] handleMessage -> DEBU 2a60 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.455 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a69 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:21.456 UTC [msp.identity] Verify -> DEBU 2a6a Verify: digest = 00000000 32 7c 02 b3 20 b7 22 b7 bc 8f 19 5a 4a 0a 4d 7d |2|.. ."....ZJ.M}| -peer0.org1.example.com | 00000010 70 94 b3 e6 bb a8 bf 8c 10 50 b2 1d ec ad 63 2a |p........P....c*|" -peer0.org1.example.com | "2019-05-02 01:31:21.456 UTC [msp.identity] Verify -> DEBU 2a6b Verify: sig = 00000000 30 44 02 20 4c b2 0a c6 7b 9c 32 9f f9 d6 64 76 |0D. L...{.2...dv| -peer0.org1.example.com | 00000010 f4 a9 dc f1 5a 67 f6 86 54 21 05 d6 05 92 7e 25 |....Zg..T!....~%| -peer0.org1.example.com | 00000020 5b 03 d6 30 02 20 68 48 47 ea d5 b7 cd b6 79 c5 |[..0. hHG.....y.| -peer0.org1.example.com | 00000030 5d 72 10 6c 84 51 9a a5 26 b3 9b 6b 06 2a 1d 3c |]r.l.Q..&..k.*.<| -peer0.org1.example.com | 00000040 bd c9 0f 96 1c 28 |.....(|" -peer0.org1.example.com | "2019-05-02 01:31:21.457 UTC [msp.identity] Verify -> DEBU 2a6c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:21.457 UTC [msp.identity] Verify -> DEBU 2a6d Verify: sig = 00000000 30 44 02 20 3d c4 d1 89 19 f9 fb 05 17 09 e6 00 |0D. =...........| -peer0.org1.example.com | 00000010 55 30 12 ce a1 3d d6 4a 9b 17 a6 06 64 2e 39 30 |U0...=.J....d.90| -peer0.org1.example.com | 00000020 e5 ef 44 d0 02 20 17 a1 86 fb 33 f3 c7 c0 e2 33 |..D.. ....3....3| -peer0.org1.example.com | 00000030 e7 4d 05 30 ff c8 5f 67 1a 0a 16 6f b5 2a 20 c5 |.M.0.._g...o.* .| -peer0.org1.example.com | 00000040 29 fc c0 d7 4f bf |)...O.|" -peer0.org1.example.com | "2019-05-02 01:31:21.457 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a6e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a6f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:21.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a70 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 " -peer0.org1.example.com | "2019-05-02 01:31:21.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a71 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 " -peer0.org1.example.com | "2019-05-02 01:31:21.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a72 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:21.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a73 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.459 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a74 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.459 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a75 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.459 UTC [gossip.discovery] sendMemResponse -> DEBU 2a76 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:21.459 UTC [msp] DeserializeIdentity -> DEBU 2a77 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.454 UTC [cauthdsl] func2 -> DEBU 2a68 0xc003042520 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:21.460 UTC [cauthdsl] func1 -> DEBU 2a79 0xc003042520 gate 1556760681453909200 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:21.460 UTC [policies] Evaluate -> DEBU 2a7a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.460 UTC [policies] Evaluate -> DEBU 2a7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.459 UTC [msp] DeserializeIdentity -> DEBU 2a78 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.460 UTC [gossip.comm] Send -> DEBU 2a7c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:21.460 UTC [gossip.discovery] sendMemResponse -> DEBU 2a7d Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:21.460 UTC [gossip.comm] sendToEndpoint -> DEBU 2a7e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.460 UTC [policies] Evaluate -> DEBU 2a7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.461 UTC [cauthdsl] func1 -> DEBU 2a81 0xc003042d60 gate 1556760681461493200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:21.461 UTC [cauthdsl] func2 -> DEBU 2a82 0xc003042d60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:21.461 UTC [cauthdsl] func2 -> DEBU 2a83 0xc003042d60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:21.462 UTC [cauthdsl] func2 -> DEBU 2a84 0xc003042d60 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.462 UTC [msp.identity] Verify -> DEBU 2a85 Verify: digest = 00000000 7a 48 2d 96 aa c8 69 22 9b 97 a6 8d 72 d9 6f 35 |zH-...i"....r.o5| -peer0.org1.example.com | 00000010 20 84 38 58 3b 1d 47 3d 9c 6d ab 28 ef f9 e3 c1 | .8X;.G=.m.(....|" -peer0.org1.example.com | "2019-05-02 01:31:21.462 UTC [msp.identity] Verify -> DEBU 2a86 Verify: sig = 00000000 30 44 02 20 57 3f 08 bd cb 24 66 a7 cc 46 8a f9 |0D. W?...$f..F..| -peer0.org1.example.com | 00000010 f1 70 a3 94 89 5a ff 78 fd cc 49 b7 ec 88 bf a2 |.p...Z.x..I.....| -peer0.org1.example.com | 00000020 25 a3 3a 97 02 20 79 ef e1 52 8b 23 81 4c 00 4c |%.:.. y..R.#.L.L| -peer0.org1.example.com | 00000030 bb 71 e2 b4 1b bb 84 b0 6c 4f ba 34 1b 65 bf 10 |.q......lO.4.e..| -peer0.org1.example.com | 00000040 5e fe 69 5d e9 83 |^.i]..|" -peer0.org1.example.com | "2019-05-02 01:31:21.461 UTC [gossip.comm] sendToEndpoint -> DEBU 2a80 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.463 UTC [cauthdsl] func2 -> DEBU 2a87 0xc003042d60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.464 UTC [cauthdsl] func1 -> DEBU 2a88 0xc003042d60 gate 1556760681461493200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:21.465 UTC [policies] Evaluate -> DEBU 2a89 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.465 UTC [policies] Evaluate -> DEBU 2a8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.465 UTC [policies] Evaluate -> DEBU 2a8b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.465 UTC [policies] Evaluate -> DEBU 2a8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.465 UTC [chaincode] handleMessage -> DEBU 2a8d [cb915c8a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:21.465 UTC [chaincode] Notify -> DEBU 2a8e [cb915c8a] notifying Txid:cb915c8a1a1c299b96c98f82baec2fc213de3021d08a84dc262205b642e3155c, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:21.466 UTC [chaincode] Execute -> DEBU 2a8f Exit" -peer0.org1.example.com | "2019-05-02 01:31:21.466 UTC [endorser] callChaincode -> INFO 2a90 [businesschannel][cb915c8a] Exit chaincode: name:"cscc" (20ms)" -peer0.org1.example.com | "2019-05-02 01:31:21.466 UTC [endorser] SimulateProposal -> DEBU 2a91 [businesschannel][cb915c8a] Exit" -peer0.org1.example.com | "2019-05-02 01:31:21.467 UTC [endorser] endorseProposal -> DEBU 2a92 [businesschannel][cb915c8a] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.467 UTC [endorser] endorseProposal -> DEBU 2a93 [businesschannel][cb915c8a] escc for chaincode name:"cscc" is escc" -peer0.org1.example.com | "2019-05-02 01:31:21.467 UTC [endorser] EndorseWithPlugin -> DEBU 2a94 Entering endorsement for {plugin: escc, channel: businesschannel, tx: cb915c8a1a1c299b96c98f82baec2fc213de3021d08a84dc262205b642e3155c, chaincode: cscc}" -peer0.org1.example.com | "2019-05-02 01:31:21.468 UTC [msp.identity] Sign -> DEBU 2a95 Sign: plaintext: 0A20C0CA79A9E1DC9CC91BE619F31102...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:21.468 UTC [msp.identity] Sign -> DEBU 2a96 Sign: digest: 89C3F4AEF53F16E2A79F3FD138D3C70F01CE258E5C690735E2517E51A1F24F8A " -peer0.org1.example.com | "2019-05-02 01:31:21.468 UTC [endorser] EndorseWithPlugin -> DEBU 2a97 Exiting {plugin: escc, channel: businesschannel, tx: cb915c8a1a1c299b96c98f82baec2fc213de3021d08a84dc262205b642e3155c, chaincode: cscc}" -peer0.org1.example.com | "2019-05-02 01:31:21.469 UTC [endorser] endorseProposal -> DEBU 2a98 [businesschannel][cb915c8a] Exit" -peer0.org1.example.com | "2019-05-02 01:31:21.469 UTC [endorser] func1 -> DEBU 2a99 Exit: request from 192.168.240.9:41372" -peer0.org1.example.com | "2019-05-02 01:31:21.469 UTC [comm.grpc.server] 1 -> INFO 2a9a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41372 grpc.code=OK grpc.call_duration=29.8312ms -peer0.org1.example.com | "2019-05-02 01:31:21.474 UTC [grpc] infof -> DEBU 2a9b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:21.475 UTC [grpc] infof -> DEBU 2a9c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:21.516 UTC [gossip.comm] func1 -> DEBU 2a9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.519 UTC [gossip.gossip] handleMessage -> DEBU 2a9e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.519 UTC [gossip.pull] HandleMessage -> DEBU 2a9f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.520 UTC [msp] DeserializeIdentity -> DEBU 2aa0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.520 UTC [msp] DeserializeIdentity -> DEBU 2aa1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.521 UTC [msp] DeserializeIdentity -> DEBU 2aa2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.521 UTC [msp] DeserializeIdentity -> DEBU 2aa3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.522 UTC [msp] DeserializeIdentity -> DEBU 2aa4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.522 UTC [msp] DeserializeIdentity -> DEBU 2aa5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.522 UTC [gossip.pull] SendDigest -> DEBU 2aa6 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:21.523 UTC [gossip.gossip] handleMessage -> DEBU 2aa7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.527 UTC [gossip.comm] func1 -> DEBU 2aa8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.527 UTC [gossip.gossip] handleMessage -> DEBU 2aa9 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.530 UTC [gossip.gossip] handleMessage -> DEBU 2aaa Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.530 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.530 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aac Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:21.530 UTC [msp] DeserializeIdentity -> DEBU 2aad Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.531 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2aae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:21.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2aaf Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:21.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ab0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:21.532 UTC [policies] Evaluate -> DEBU 2ab1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.533 UTC [policies] Evaluate -> DEBU 2ab2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:21.533 UTC [policies] Evaluate -> DEBU 2ab3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.533 UTC [cauthdsl] func1 -> DEBU 2ab4 0xc0033a1cd0 gate 1556760681533282700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:21.533 UTC [cauthdsl] func2 -> DEBU 2ab5 0xc0033a1cd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:21.533 UTC [cauthdsl] func2 -> DEBU 2ab6 0xc0033a1cd0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:21.533 UTC [cauthdsl] func2 -> DEBU 2ab7 0xc0033a1cd0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.533 UTC [msp.identity] Verify -> DEBU 2ab8 Verify: digest = 00000000 30 c5 d1 f6 30 2f e5 19 26 51 3d 31 38 f8 e4 cf |0...0/..&Q=18...| -peer0.org1.example.com | 00000010 1e 26 99 39 cc 02 04 dc be 6b 95 33 70 3b 89 73 |.&.9.....k.3p;.s|" -peer0.org1.example.com | "2019-05-02 01:31:21.533 UTC [msp.identity] Verify -> DEBU 2ab9 Verify: sig = 00000000 30 44 02 20 58 d5 c0 5b ca a6 29 66 f9 27 d4 cd |0D. X..[..)f.'..| -peer0.org1.example.com | 00000010 b3 ff ed 4d 0c f6 01 28 cf b7 6d 4d e6 99 f1 eb |...M...(..mM....| -peer0.org1.example.com | 00000020 c2 71 e5 be 02 20 3f 4e 0a ca d0 98 f3 05 c1 2b |.q... ?N.......+| -peer0.org1.example.com | 00000030 d7 fe f1 ad 0a 54 37 10 a4 66 4f cb 4d a5 44 9a |.....T7..fO.M.D.| -peer0.org1.example.com | 00000040 33 3d 5c 6c a7 74 |3=\l.t|" -peer0.org1.example.com | "2019-05-02 01:31:21.534 UTC [cauthdsl] func2 -> DEBU 2aba 0xc0033a1cd0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.534 UTC [cauthdsl] func1 -> DEBU 2abb 0xc0033a1cd0 gate 1556760681533282700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:21.534 UTC [policies] Evaluate -> DEBU 2abc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.534 UTC [policies] Evaluate -> DEBU 2abd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.535 UTC [policies] Evaluate -> DEBU 2abe Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.535 UTC [policies] Evaluate -> DEBU 2abf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ac0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ac1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:21.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ac2 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 " -peer0.org1.example.com | "2019-05-02 01:31:21.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ac3 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 " -peer0.org1.example.com | "2019-05-02 01:31:21.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ac4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:21.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ac5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.536 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ac6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ac7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.537 UTC [gossip.discovery] sendMemResponse -> DEBU 2ac8 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:21.537 UTC [msp] DeserializeIdentity -> DEBU 2ac9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.537 UTC [msp] DeserializeIdentity -> DEBU 2aca Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.537 UTC [msp] DeserializeIdentity -> DEBU 2acb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.538 UTC [gossip.comm] Send -> DEBU 2acc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:21.538 UTC [gossip.discovery] sendMemResponse -> DEBU 2acd Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:21.538 UTC [gossip.comm] sendToEndpoint -> DEBU 2ace Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.539 UTC [gossip.comm] sendToEndpoint -> DEBU 2acf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.577 UTC [gossip.comm] func1 -> DEBU 2ad0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.578 UTC [gossip.gossip] handleMessage -> DEBU 2ad1 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.578 UTC [msp] DeserializeIdentity -> DEBU 2ad2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.579 UTC [msp] DeserializeIdentity -> DEBU 2ad3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.581 UTC [msp] DeserializeIdentity -> DEBU 2ad4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.581 UTC [gossip.gossip] handleMessage -> DEBU 2ad5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.583 UTC [gossip.comm] func1 -> DEBU 2ad6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760679716440800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.583 UTC [gossip.gossip] handleMessage -> DEBU 2ad7 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760679716440800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.585 UTC [msp] DeserializeIdentity -> DEBU 2ad8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ad9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:21.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ada Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:21.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2adb Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:21.586 UTC [policies] Evaluate -> DEBU 2adc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.586 UTC [policies] Evaluate -> DEBU 2add This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:21.587 UTC [policies] Evaluate -> DEBU 2ade == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.587 UTC [cauthdsl] func1 -> DEBU 2adf 0xc003ace040 gate 1556760681587131000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:21.587 UTC [cauthdsl] func2 -> DEBU 2ae0 0xc003ace040 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:21.587 UTC [cauthdsl] func2 -> DEBU 2ae1 0xc003ace040 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:21.587 UTC [cauthdsl] func2 -> DEBU 2ae2 0xc003ace040 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.587 UTC [msp.identity] Verify -> DEBU 2ae3 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:21.587 UTC [msp.identity] Verify -> DEBU 2ae4 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:21.588 UTC [cauthdsl] func2 -> DEBU 2ae5 0xc003ace040 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.597 UTC [cauthdsl] func1 -> DEBU 2ae6 0xc003ace040 gate 1556760681587131000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:21.597 UTC [policies] Evaluate -> DEBU 2ae7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.598 UTC [policies] Evaluate -> DEBU 2ae8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.598 UTC [policies] Evaluate -> DEBU 2ae9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.598 UTC [policies] Evaluate -> DEBU 2aea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.598 UTC [msp] DeserializeIdentity -> DEBU 2aeb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.599 UTC [gossip.gossip] handleMessage -> DEBU 2aec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.716 UTC [endorser] ProcessProposal -> DEBU 2aed Entering: request from 192.168.240.9:41376" -peer0.org1.example.com | "2019-05-02 01:31:21.716 UTC [protoutils] ValidateProposalMessage -> DEBU 2aee ValidateProposalMessage starts for signed proposal 0xc0027583c0" -peer0.org1.example.com | "2019-05-02 01:31:21.716 UTC [protoutils] validateChannelHeader -> DEBU 2aef validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:21.716 UTC [protoutils] checkSignatureFromCreator -> DEBU 2af0 begin" -peer0.org1.example.com | "2019-05-02 01:31:21.716 UTC [msp] GetManagerForChain -> DEBU 2af1 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:21.716 UTC [protoutils] checkSignatureFromCreator -> DEBU 2af2 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:21.717 UTC [protoutils] checkSignatureFromCreator -> DEBU 2af3 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:21.717 UTC [msp.identity] Verify -> DEBU 2af4 Verify: digest = 00000000 0a 70 ef e6 e5 40 95 d5 c1 ec 78 86 42 54 b7 23 |.p...@....x.BT.#| -peer0.org1.example.com | 00000010 23 69 7a a8 37 ce ad b3 87 17 0a c8 d8 4e b9 34 |#iz.7........N.4|" -peer0.org1.example.com | "2019-05-02 01:31:21.717 UTC [msp.identity] Verify -> DEBU 2af5 Verify: sig = 00000000 30 45 02 21 00 c3 c8 4e 5e 8d f8 c1 ad fd a6 e0 |0E.!...N^.......| -peer0.org1.example.com | 00000010 63 20 25 11 78 53 a8 9d 8c c0 ef 14 34 d9 93 4d |c %.xS......4..M| -peer0.org1.example.com | 00000020 8d 85 04 53 89 02 20 66 e0 c1 fe 5a 68 38 92 eb |...S.. f...Zh8..| -peer0.org1.example.com | 00000030 a1 e8 3e 40 61 48 1b ac 26 b3 2b 21 40 7a ba 8f |..>@aH..&.+!@z..| -peer0.org1.example.com | 00000040 33 d3 60 43 f2 bb e3 |3.`C...|" -peer0.org1.example.com | "2019-05-02 01:31:21.717 UTC [protoutils] checkSignatureFromCreator -> DEBU 2af6 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:21.717 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2af7 validateChaincodeProposalMessage starts for proposal 0xc002f7f570, header 0xc0027587d0" -peer0.org1.example.com | "2019-05-02 01:31:21.717 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2af8 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.717 UTC [endorser] preProcess -> DEBU 2af9 [businesschannel][d745219f] processing txid: d745219f6e4dff1e5640a303b7103cb6924243d8ef1b645c5ab2f3972b13f157" -peer0.org1.example.com | "2019-05-02 01:31:21.717 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2afa retrieveTransactionByID() - txId = [d745219f6e4dff1e5640a303b7103cb6924243d8ef1b645c5ab2f3972b13f157]" -peer0.org1.example.com | "2019-05-02 01:31:21.717 UTC [endorser] SimulateProposal -> DEBU 2afb [businesschannel][d745219f] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.718 UTC [endorser] callChaincode -> INFO 2afc [businesschannel][d745219f] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.718 UTC [chaincode] Execute -> DEBU 2afd Entry" -peer0.org1.example.com | "2019-05-02 01:31:21.718 UTC [cscc] Invoke -> DEBU 2afe Invoke function: GetChannels" -peer0.org1.example.com | "2019-05-02 01:31:21.718 UTC [msp.identity] Verify -> DEBU 2aff Verify: digest = 00000000 0a 70 ef e6 e5 40 95 d5 c1 ec 78 86 42 54 b7 23 |.p...@....x.BT.#| -peer0.org1.example.com | 00000010 23 69 7a a8 37 ce ad b3 87 17 0a c8 d8 4e b9 34 |#iz.7........N.4|" -peer0.org1.example.com | "2019-05-02 01:31:21.719 UTC [msp.identity] Verify -> DEBU 2b00 Verify: sig = 00000000 30 45 02 21 00 c3 c8 4e 5e 8d f8 c1 ad fd a6 e0 |0E.!...N^.......| -peer0.org1.example.com | 00000010 63 20 25 11 78 53 a8 9d 8c c0 ef 14 34 d9 93 4d |c %.xS......4..M| -peer0.org1.example.com | 00000020 8d 85 04 53 89 02 20 66 e0 c1 fe 5a 68 38 92 eb |...S.. f...Zh8..| -peer0.org1.example.com | 00000030 a1 e8 3e 40 61 48 1b ac 26 b3 2b 21 40 7a ba 8f |..>@aH..&.+!@z..| -peer0.org1.example.com | 00000040 33 d3 60 43 f2 bb e3 |3.`C...|" -peer0.org1.example.com | "2019-05-02 01:31:21.719 UTC [chaincode] handleMessage -> DEBU 2b01 [d745219f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:21.720 UTC [chaincode] Notify -> DEBU 2b02 [d745219f] notifying Txid:d745219f6e4dff1e5640a303b7103cb6924243d8ef1b645c5ab2f3972b13f157, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:21.720 UTC [chaincode] Execute -> DEBU 2b03 Exit" -peer0.org1.example.com | "2019-05-02 01:31:21.720 UTC [endorser] callChaincode -> INFO 2b04 [businesschannel][d745219f] Exit chaincode: name:"cscc" (2ms)" -peer0.org1.example.com | "2019-05-02 01:31:21.720 UTC [endorser] SimulateProposal -> DEBU 2b05 [businesschannel][d745219f] Exit" -peer0.org1.example.com | "2019-05-02 01:31:21.720 UTC [endorser] endorseProposal -> DEBU 2b06 [businesschannel][d745219f] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.721 UTC [endorser] endorseProposal -> DEBU 2b07 [businesschannel][d745219f] escc for chaincode name:"cscc" is escc" -peer0.org1.example.com | "2019-05-02 01:31:21.721 UTC [endorser] EndorseWithPlugin -> DEBU 2b08 Entering endorsement for {plugin: escc, channel: businesschannel, tx: d745219f6e4dff1e5640a303b7103cb6924243d8ef1b645c5ab2f3972b13f157, chaincode: cscc}" -peer0.org1.example.com | "2019-05-02 01:31:21.721 UTC [msp.identity] Sign -> DEBU 2b09 Sign: plaintext: 0A209E27AEDE38781449A9E59A7304F6...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:21.721 UTC [msp.identity] Sign -> DEBU 2b0a Sign: digest: C4A564B367240E9958534B0B0DE76E9D00055050452B30BFF1FA5BD294EF76F6 " -peer0.org1.example.com | "2019-05-02 01:31:21.721 UTC [endorser] EndorseWithPlugin -> DEBU 2b0b Exiting {plugin: escc, channel: businesschannel, tx: d745219f6e4dff1e5640a303b7103cb6924243d8ef1b645c5ab2f3972b13f157, chaincode: cscc}" -peer0.org1.example.com | "2019-05-02 01:31:21.722 UTC [endorser] endorseProposal -> DEBU 2b0c [businesschannel][d745219f] Exit" -peer0.org1.example.com | "2019-05-02 01:31:21.722 UTC [endorser] func1 -> DEBU 2b0d Exit: request from 192.168.240.9:41376" -peer0.org1.example.com | "2019-05-02 01:31:21.722 UTC [comm.grpc.server] 1 -> INFO 2b0e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41376 grpc.code=OK grpc.call_duration=6.8143ms -peer0.org1.example.com | "2019-05-02 01:31:21.726 UTC [grpc] infof -> DEBU 2b0f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:21.727 UTC [grpc] infof -> DEBU 2b10 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:21.747 UTC [gossip.comm] func1 -> DEBU 2b11 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.747 UTC [gossip.gossip] handleMessage -> DEBU 2b12 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.748 UTC [gossip.pull] HandleMessage -> DEBU 2b13 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.749 UTC [msp] DeserializeIdentity -> DEBU 2b14 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.749 UTC [msp] DeserializeIdentity -> DEBU 2b15 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.749 UTC [msp] DeserializeIdentity -> DEBU 2b16 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.750 UTC [msp] DeserializeIdentity -> DEBU 2b17 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.750 UTC [msp] DeserializeIdentity -> DEBU 2b18 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.750 UTC [msp] DeserializeIdentity -> DEBU 2b19 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.750 UTC [gossip.pull] SendDigest -> DEBU 2b1a Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:21.750 UTC [gossip.gossip] handleMessage -> DEBU 2b1b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.834 UTC [gossip.pull] Hello -> DEBU 2b1c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:21.834 UTC [gossip.comm] Send -> DEBU 2b1d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:21.835 UTC [gossip.pull] Hello -> DEBU 2b1e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:21.835 UTC [gossip.comm] Send -> DEBU 2b1f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:21.835 UTC [gossip.pull] Hello -> DEBU 2b20 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:21.835 UTC [gossip.comm] Send -> DEBU 2b21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:21.836 UTC [gossip.comm] sendToEndpoint -> DEBU 2b23 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.836 UTC [gossip.comm] sendToEndpoint -> DEBU 2b24 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.836 UTC [gossip.comm] sendToEndpoint -> DEBU 2b22 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.836 UTC [gossip.comm] sendToEndpoint -> DEBU 2b26 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.836 UTC [gossip.comm] sendToEndpoint -> DEBU 2b25 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2b27 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.838 UTC [gossip.gossip] handleMessage -> DEBU 2b28 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 685915821136162430 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.838 UTC [gossip.pull] HandleMessage -> DEBU 2b29 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 685915821136162430 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.840 UTC [gossip.gossip] handleMessage -> DEBU 2b2a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.841 UTC [gossip.comm] func1 -> DEBU 2b2b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14910239388316555611 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.841 UTC [gossip.gossip] handleMessage -> DEBU 2b2c Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14910239388316555611 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.841 UTC [gossip.comm] func1 -> DEBU 2b2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17474648981611143055 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.841 UTC [gossip.pull] HandleMessage -> DEBU 2b2e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14910239388316555611 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.842 UTC [gossip.gossip] handleMessage -> DEBU 2b2f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.842 UTC [gossip.gossip] handleMessage -> DEBU 2b30 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17474648981611143055 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.842 UTC [gossip.pull] HandleMessage -> DEBU 2b31 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17474648981611143055 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.842 UTC [gossip.gossip] handleMessage -> DEBU 2b32 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.898 UTC [gossip.comm] func1 -> DEBU 2b33 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.898 UTC [gossip.gossip] handleMessage -> DEBU 2b34 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.898 UTC [gossip.gossip] handleMessage -> DEBU 2b35 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.899 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b36 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.899 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b37 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:21.899 UTC [msp] DeserializeIdentity -> DEBU 2b38 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.900 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:21.900 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b3a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:21.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b3b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:21.901 UTC [policies] Evaluate -> DEBU 2b3c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.901 UTC [policies] Evaluate -> DEBU 2b3d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:21.902 UTC [policies] Evaluate -> DEBU 2b3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.902 UTC [cauthdsl] func1 -> DEBU 2b3f 0xc003eb50c0 gate 1556760681902518700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:21.902 UTC [cauthdsl] func2 -> DEBU 2b40 0xc003eb50c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:21.903 UTC [cauthdsl] func2 -> DEBU 2b41 0xc003eb50c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:21.906 UTC [cauthdsl] func2 -> DEBU 2b42 0xc003eb50c0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.906 UTC [msp.identity] Verify -> DEBU 2b43 Verify: digest = 00000000 b7 47 2c c4 07 9a 83 ae 21 9b d0 28 70 ef 98 a8 |.G,.....!..(p...| -peer0.org1.example.com | 00000010 92 ed a8 5a a6 4c 43 53 64 5d e7 aa 10 5d c9 ea |...Z.LCSd]...]..|" -peer0.org1.example.com | "2019-05-02 01:31:21.906 UTC [msp.identity] Verify -> DEBU 2b44 Verify: sig = 00000000 30 45 02 21 00 f9 31 6c 1a f7 00 c3 51 2a 4e 6d |0E.!..1l....Q*Nm| -peer0.org1.example.com | 00000010 5a fb 80 31 9e d1 7a 49 4b a1 47 62 7a 31 ae c7 |Z..1..zIK.Gbz1..| -peer0.org1.example.com | 00000020 7a 66 7c ea 71 02 20 27 10 40 1a 78 62 9d 91 1d |zf|.q. '.@.xb...| -peer0.org1.example.com | 00000030 4e 05 5f 11 46 d7 40 48 5d 04 dd 9f ed 9f 31 72 |N._.F.@H].....1r| -peer0.org1.example.com | 00000040 fb ce 55 cf ed dd 85 |..U....|" -peer0.org1.example.com | "2019-05-02 01:31:21.907 UTC [cauthdsl] func2 -> DEBU 2b45 0xc003eb50c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.907 UTC [cauthdsl] func1 -> DEBU 2b46 0xc003eb50c0 gate 1556760681902518700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:21.907 UTC [policies] Evaluate -> DEBU 2b47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.907 UTC [policies] Evaluate -> DEBU 2b48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.907 UTC [policies] Evaluate -> DEBU 2b49 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.908 UTC [policies] Evaluate -> DEBU 2b4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.908 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b4b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.908 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b4c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:21.908 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b4d updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 " -peer0.org1.example.com | "2019-05-02 01:31:21.908 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b4e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 " -peer0.org1.example.com | "2019-05-02 01:31:21.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b4f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:21.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b50 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b51 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.909 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b52 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.909 UTC [gossip.discovery] sendMemResponse -> DEBU 2b53 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:21.909 UTC [msp] DeserializeIdentity -> DEBU 2b54 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.910 UTC [msp] DeserializeIdentity -> DEBU 2b55 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.910 UTC [msp] DeserializeIdentity -> DEBU 2b56 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.910 UTC [gossip.comm] Send -> DEBU 2b57 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:21.910 UTC [gossip.discovery] sendMemResponse -> DEBU 2b58 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:21.910 UTC [gossip.comm] sendToEndpoint -> DEBU 2b59 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.910 UTC [gossip.comm] sendToEndpoint -> DEBU 2b5a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.947 UTC [endorser] ProcessProposal -> DEBU 2b5b Entering: request from 192.168.240.9:41380" -peer0.org1.example.com | "2019-05-02 01:31:21.947 UTC [protoutils] ValidateProposalMessage -> DEBU 2b5c ValidateProposalMessage starts for signed proposal 0xc0027599f0" -peer0.org1.example.com | "2019-05-02 01:31:21.947 UTC [protoutils] validateChannelHeader -> DEBU 2b5d validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:21.947 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b5e begin" -peer0.org1.example.com | "2019-05-02 01:31:21.948 UTC [msp] GetManagerForChain -> DEBU 2b5f Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:21.948 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b60 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:21.948 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b61 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:21.949 UTC [msp.identity] Verify -> DEBU 2b62 Verify: digest = 00000000 23 58 b7 a1 b1 89 02 0b f1 3b b7 1c 01 35 9d ab |#X.......;...5..| -peer0.org1.example.com | 00000010 52 48 50 3e fd c5 93 4c 7a 4f ba df df 7c 02 4e |RHP>...LzO...|.N|" -peer0.org1.example.com | "2019-05-02 01:31:21.949 UTC [msp.identity] Verify -> DEBU 2b63 Verify: sig = 00000000 30 45 02 21 00 a4 54 e0 60 21 3b 13 10 ab ed e3 |0E.!..T.`!;.....| -peer0.org1.example.com | 00000010 72 cb 1e b9 eb 1e b7 a7 9c e4 d8 e4 b2 f0 15 18 |r...............| -peer0.org1.example.com | 00000020 65 88 f0 b6 33 02 20 1a dc a2 60 29 19 42 b5 0d |e...3. ...`).B..| -peer0.org1.example.com | 00000030 df 5f 88 85 34 4b 7f b1 8b 8f b4 71 3b 18 68 0b |._..4K.....q;.h.| -peer0.org1.example.com | 00000040 f5 c1 c9 8e 32 c1 e5 |....2..|" -peer0.org1.example.com | "2019-05-02 01:31:21.949 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b64 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:21.949 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b65 validateChaincodeProposalMessage starts for proposal 0xc002f7f880, header 0xc002759e00" -peer0.org1.example.com | "2019-05-02 01:31:21.950 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b66 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.950 UTC [endorser] preProcess -> DEBU 2b67 [businesschannel][5ffdb7ee] processing txid: 5ffdb7ee9267a3710c8d6be8e279f4577fc825d230db5bc792c9788e0874acd5" -peer0.org1.example.com | "2019-05-02 01:31:21.950 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2b68 retrieveTransactionByID() - txId = [5ffdb7ee9267a3710c8d6be8e279f4577fc825d230db5bc792c9788e0874acd5]" -peer0.org1.example.com | "2019-05-02 01:31:21.950 UTC [endorser] SimulateProposal -> DEBU 2b69 [businesschannel][5ffdb7ee] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.950 UTC [endorser] callChaincode -> INFO 2b6a [businesschannel][5ffdb7ee] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.951 UTC [chaincode] Execute -> DEBU 2b6b Entry" -peer0.org1.example.com | "2019-05-02 01:31:21.951 UTC [cscc] Invoke -> DEBU 2b6c Invoke function: GetConfigTree" -peer0.org1.example.com | "2019-05-02 01:31:21.952 UTC [aclmgmt] CheckACL -> DEBU 2b6d acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigTree" -peer0.org1.example.com | "2019-05-02 01:31:21.953 UTC [aclmgmt] CheckACL -> DEBU 2b6e acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-05-02 01:31:21.953 UTC [policies] Evaluate -> DEBU 2b6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.953 UTC [policies] Evaluate -> DEBU 2b70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:21.953 UTC [policies] Evaluate -> DEBU 2b71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.953 UTC [cauthdsl] func1 -> DEBU 2b72 0xc0044145e0 gate 1556760681953554500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:21.953 UTC [cauthdsl] func2 -> DEBU 2b73 0xc0044145e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:21.954 UTC [cauthdsl] func2 -> DEBU 2b74 0xc0044145e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:21.954 UTC [cauthdsl] func2 -> DEBU 2b75 0xc0044145e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:21.954 UTC [cauthdsl] func2 -> DEBU 2b76 0xc0044145e0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:21.954 UTC [cauthdsl] func1 -> DEBU 2b77 0xc0044145e0 gate 1556760681953554500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:21.954 UTC [policies] Evaluate -> DEBU 2b78 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.955 UTC [policies] Evaluate -> DEBU 2b79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.955 UTC [policies] Evaluate -> DEBU 2b7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:21.956 UTC [cauthdsl] func1 -> DEBU 2b7b 0xc004414e20 gate 1556760681955910500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:21.956 UTC [cauthdsl] func2 -> DEBU 2b7c 0xc004414e20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:21.956 UTC [cauthdsl] func2 -> DEBU 2b7d 0xc004414e20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:21.956 UTC [cauthdsl] func2 -> DEBU 2b7e 0xc004414e20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.956 UTC [msp.identity] Verify -> DEBU 2b7f Verify: digest = 00000000 23 58 b7 a1 b1 89 02 0b f1 3b b7 1c 01 35 9d ab |#X.......;...5..| -peer0.org1.example.com | 00000010 52 48 50 3e fd c5 93 4c 7a 4f ba df df 7c 02 4e |RHP>...LzO...|.N|" -peer0.org1.example.com | "2019-05-02 01:31:21.956 UTC [msp.identity] Verify -> DEBU 2b80 Verify: sig = 00000000 30 45 02 21 00 a4 54 e0 60 21 3b 13 10 ab ed e3 |0E.!..T.`!;.....| -peer0.org1.example.com | 00000010 72 cb 1e b9 eb 1e b7 a7 9c e4 d8 e4 b2 f0 15 18 |r...............| -peer0.org1.example.com | 00000020 65 88 f0 b6 33 02 20 1a dc a2 60 29 19 42 b5 0d |e...3. ...`).B..| -peer0.org1.example.com | 00000030 df 5f 88 85 34 4b 7f b1 8b 8f b4 71 3b 18 68 0b |._..4K.....q;.h.| -peer0.org1.example.com | 00000040 f5 c1 c9 8e 32 c1 e5 |....2..|" -peer0.org1.example.com | "2019-05-02 01:31:21.957 UTC [cauthdsl] func2 -> DEBU 2b81 0xc004414e20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:21.957 UTC [cauthdsl] func1 -> DEBU 2b82 0xc004414e20 gate 1556760681955910500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:21.958 UTC [policies] Evaluate -> DEBU 2b83 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.958 UTC [policies] Evaluate -> DEBU 2b84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.958 UTC [policies] Evaluate -> DEBU 2b85 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.958 UTC [policies] Evaluate -> DEBU 2b86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:21.959 UTC [chaincode] handleMessage -> DEBU 2b87 [5ffdb7ee] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:21.959 UTC [chaincode] Notify -> DEBU 2b88 [5ffdb7ee] notifying Txid:5ffdb7ee9267a3710c8d6be8e279f4577fc825d230db5bc792c9788e0874acd5, channelID:businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:21.959 UTC [chaincode] Execute -> DEBU 2b89 Exit" -peer0.org1.example.com | "2019-05-02 01:31:21.959 UTC [endorser] callChaincode -> INFO 2b8a [businesschannel][5ffdb7ee] Exit chaincode: name:"cscc" (8ms)" -peer0.org1.example.com | "2019-05-02 01:31:21.959 UTC [endorser] SimulateProposal -> DEBU 2b8b [businesschannel][5ffdb7ee] Exit" -peer0.org1.example.com | "2019-05-02 01:31:21.959 UTC [endorser] endorseProposal -> DEBU 2b8c [businesschannel][5ffdb7ee] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:21.960 UTC [endorser] endorseProposal -> DEBU 2b8d [businesschannel][5ffdb7ee] escc for chaincode name:"cscc" is escc" -peer0.org1.example.com | "2019-05-02 01:31:21.960 UTC [endorser] EndorseWithPlugin -> DEBU 2b8e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 5ffdb7ee9267a3710c8d6be8e279f4577fc825d230db5bc792c9788e0874acd5, chaincode: cscc}" -peer0.org1.example.com | "2019-05-02 01:31:21.960 UTC [msp.identity] Sign -> DEBU 2b8f Sign: plaintext: 0A20E90A864FB1965C22EBDA382B7EAA...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-05-02 01:31:21.960 UTC [msp.identity] Sign -> DEBU 2b90 Sign: digest: 0C9C0682AC0077138A785598301515EB8DBDC96EFF5196D7F00BA5F2294C4EE9 " -peer0.org1.example.com | "2019-05-02 01:31:21.961 UTC [endorser] EndorseWithPlugin -> DEBU 2b91 Exiting {plugin: escc, channel: businesschannel, tx: 5ffdb7ee9267a3710c8d6be8e279f4577fc825d230db5bc792c9788e0874acd5, chaincode: cscc}" -peer0.org1.example.com | "2019-05-02 01:31:21.961 UTC [endorser] endorseProposal -> DEBU 2b92 [businesschannel][5ffdb7ee] Exit" -peer0.org1.example.com | "2019-05-02 01:31:21.961 UTC [endorser] func1 -> DEBU 2b93 Exit: request from 192.168.240.9:41380" -peer0.org1.example.com | "2019-05-02 01:31:21.961 UTC [comm.grpc.server] 1 -> INFO 2b94 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41380 grpc.code=OK grpc.call_duration=14.4058ms -peer0.org1.example.com | "2019-05-02 01:31:21.967 UTC [grpc] infof -> DEBU 2b95 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:21.967 UTC [grpc] infof -> DEBU 2b96 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:21.983 UTC [gossip.election] waitForInterrupt -> DEBU 2b97 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:21.983 UTC [gossip.election] IsLeader -> DEBU 2b98 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:21.983 UTC [msp.identity] Sign -> DEBU 2b99 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510091801 " -peer0.org1.example.com | "2019-05-02 01:31:21.983 UTC [msp.identity] Sign -> DEBU 2b9a Sign: digest: E30F48869DFE060D4EC0F2C02962365C69C96CAF42C83AC0A2554C89558D45A1 " -peer0.org1.example.com | "2019-05-02 01:31:21.983 UTC [gossip.election] waitForInterrupt -> DEBU 2b9b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:21.988 UTC [msp] DeserializeIdentity -> DEBU 2b9c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.988 UTC [msp] DeserializeIdentity -> DEBU 2b9d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.988 UTC [msp] DeserializeIdentity -> DEBU 2b9e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.988 UTC [msp] DeserializeIdentity -> DEBU 2b9f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.988 UTC [gossip.comm] Send -> DEBU 2ba0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:21.989 UTC [msp] DeserializeIdentity -> DEBU 2ba1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.989 UTC [msp] DeserializeIdentity -> DEBU 2ba2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:21.989 UTC [gossip.comm] sendToEndpoint -> DEBU 2ba3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:21.989 UTC [gossip.comm] sendToEndpoint -> DEBU 2ba4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.067 UTC [msp.identity] Sign -> DEBU 2ba5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101F " -peer0.org1.example.com | "2019-05-02 01:31:22.067 UTC [msp.identity] Sign -> DEBU 2ba6 Sign: digest: 9C87865A50B0235A7D978FF37F5BCA502998A16CB3A9C77D17E653FB020E1275 " -peer0.org1.example.com | "2019-05-02 01:31:22.067 UTC [msp.identity] Sign -> DEBU 2ba7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:22.067 UTC [msp.identity] Sign -> DEBU 2ba8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:22.068 UTC [gossip.comm] Send -> DEBU 2ba9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:22.068 UTC [msp] DeserializeIdentity -> DEBU 2baa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:22.069 UTC [gossip.comm] Send -> DEBU 2bab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:22.069 UTC [msp] DeserializeIdentity -> DEBU 2bac Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:22.069 UTC [gossip.comm] sendToEndpoint -> DEBU 2bad Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.069 UTC [gossip.comm] sendToEndpoint -> DEBU 2bae Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.069 UTC [gossip.comm] Send -> DEBU 2baf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:22.069 UTC [gossip.comm] sendToEndpoint -> DEBU 2bb0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.069 UTC [gossip.comm] sendToEndpoint -> DEBU 2bb1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.075 UTC [gossip.comm] func1 -> DEBU 2bb2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.075 UTC [gossip.gossip] handleMessage -> DEBU 2bb3 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.075 UTC [gossip.gossip] handleMessage -> DEBU 2bb4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.075 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bb5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.075 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bb6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:22.075 UTC [msp.identity] Verify -> DEBU 2bb7 Verify: digest = 00000000 32 7c 02 b3 20 b7 22 b7 bc 8f 19 5a 4a 0a 4d 7d |2|.. ."....ZJ.M}| -peer0.org1.example.com | 00000010 70 94 b3 e6 bb a8 bf 8c 10 50 b2 1d ec ad 63 2a |p........P....c*|" -peer0.org1.example.com | "2019-05-02 01:31:22.076 UTC [msp.identity] Verify -> DEBU 2bb8 Verify: sig = 00000000 30 44 02 20 4c b2 0a c6 7b 9c 32 9f f9 d6 64 76 |0D. L...{.2...dv| -peer0.org1.example.com | 00000010 f4 a9 dc f1 5a 67 f6 86 54 21 05 d6 05 92 7e 25 |....Zg..T!....~%| -peer0.org1.example.com | 00000020 5b 03 d6 30 02 20 68 48 47 ea d5 b7 cd b6 79 c5 |[..0. hHG.....y.| -peer0.org1.example.com | 00000030 5d 72 10 6c 84 51 9a a5 26 b3 9b 6b 06 2a 1d 3c |]r.l.Q..&..k.*.<| -peer0.org1.example.com | 00000040 bd c9 0f 96 1c 28 |.....(|" -peer0.org1.example.com | "2019-05-02 01:31:22.081 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bb9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.081 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bba Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.081 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bbb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:22.081 UTC [msp] DeserializeIdentity -> DEBU 2bbc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:22.082 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bbd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:22.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bbe Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:22.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bbf Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:22.082 UTC [policies] Evaluate -> DEBU 2bc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [policies] Evaluate -> DEBU 2bc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [policies] Evaluate -> DEBU 2bc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [cauthdsl] func1 -> DEBU 2bc3 0xc0026f6570 gate 1556760682083219300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [cauthdsl] func2 -> DEBU 2bc4 0xc0026f6570 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [cauthdsl] func2 -> DEBU 2bc5 0xc0026f6570 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [cauthdsl] func2 -> DEBU 2bc6 0xc0026f6570 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [msp.identity] Verify -> DEBU 2bc7 Verify: digest = 00000000 b7 47 2c c4 07 9a 83 ae 21 9b d0 28 70 ef 98 a8 |.G,.....!..(p...| -peer0.org1.example.com | 00000010 92 ed a8 5a a6 4c 43 53 64 5d e7 aa 10 5d c9 ea |...Z.LCSd]...]..|" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [msp.identity] Verify -> DEBU 2bc8 Verify: sig = 00000000 30 45 02 21 00 f9 31 6c 1a f7 00 c3 51 2a 4e 6d |0E.!..1l....Q*Nm| -peer0.org1.example.com | 00000010 5a fb 80 31 9e d1 7a 49 4b a1 47 62 7a 31 ae c7 |Z..1..zIK.Gbz1..| -peer0.org1.example.com | 00000020 7a 66 7c ea 71 02 20 27 10 40 1a 78 62 9d 91 1d |zf|.q. '.@.xb...| -peer0.org1.example.com | 00000030 4e 05 5f 11 46 d7 40 48 5d 04 dd 9f ed 9f 31 72 |N._.F.@H].....1r| -peer0.org1.example.com | 00000040 fb ce 55 cf ed dd 85 |..U....|" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [cauthdsl] func2 -> DEBU 2bc9 0xc0026f6570 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [cauthdsl] func1 -> DEBU 2bca 0xc0026f6570 gate 1556760682083219300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [policies] Evaluate -> DEBU 2bcb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:22.083 UTC [policies] Evaluate -> DEBU 2bcc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:22.084 UTC [policies] Evaluate -> DEBU 2bcd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:22.084 UTC [policies] Evaluate -> DEBU 2bce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:22.084 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bcf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.084 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bd0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.084 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bd1 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:22.084 UTC [msp.identity] Verify -> DEBU 2bd2 Verify: digest = 00000000 9c 87 86 5a 50 b0 23 5a 7d 97 8f f3 7f 5b ca 50 |...ZP.#Z}....[.P| -peer0.org1.example.com | 00000010 29 98 a1 6c b3 a9 c7 7d 17 e6 53 fb 02 0e 12 75 |)..l...}..S....u|" -peer0.org1.example.com | "2019-05-02 01:31:22.084 UTC [msp.identity] Verify -> DEBU 2bd3 Verify: sig = 00000000 30 45 02 21 00 c0 03 74 eb b2 17 1d fd 62 d4 95 |0E.!...t.....b..| -peer0.org1.example.com | 00000010 de 01 f8 2e 3c 72 f0 48 18 df 2e 30 6d 5e a5 37 |.... DEBU 2bd4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.084 UTC [gossip.discovery] isSentByMe -> DEBU 2bd5 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.084 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bd6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.084 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.085 UTC [gossip.gossip] handleMessage -> DEBU 2bd8 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.085 UTC [gossip.gossip] handleMessage -> DEBU 2bd9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.085 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bda Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.085 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bdb Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:22.085 UTC [msp.identity] Verify -> DEBU 2bdc Verify: digest = 00000000 9c 87 86 5a 50 b0 23 5a 7d 97 8f f3 7f 5b ca 50 |...ZP.#Z}....[.P| -peer0.org1.example.com | 00000010 29 98 a1 6c b3 a9 c7 7d 17 e6 53 fb 02 0e 12 75 |)..l...}..S....u|" -peer0.org1.example.com | "2019-05-02 01:31:22.085 UTC [msp.identity] Verify -> DEBU 2bdd Verify: sig = 00000000 30 45 02 21 00 c0 03 74 eb b2 17 1d fd 62 d4 95 |0E.!...t.....b..| -peer0.org1.example.com | 00000010 de 01 f8 2e 3c 72 f0 48 18 df 2e 30 6d 5e a5 37 |.... DEBU 2bde Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.089 UTC [gossip.comm] sendToEndpoint -> DEBU 2bdf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.086 UTC [msp.identity] Verify -> DEBU 2be0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:22.091 UTC [msp.identity] Verify -> DEBU 2be1 Verify: sig = 00000000 30 44 02 20 48 a5 0b ce 13 d8 fc 57 8d b6 cb 0d |0D. H......W....| -peer0.org1.example.com | 00000010 59 37 d0 f4 b7 37 89 56 22 02 41 6a 26 4c 5a f9 |Y7...7.V".Aj&LZ.| -peer0.org1.example.com | 00000020 95 82 d4 ea 02 20 09 8a 0a 10 c8 33 89 8d 0a 91 |..... .....3....| -peer0.org1.example.com | 00000030 ea ba cf 89 36 b6 b2 76 6e 1b 54 c4 f2 28 0e 2c |....6..vn.T..(.,| -peer0.org1.example.com | 00000040 1b be 36 fe 77 a3 |..6.w.|" -peer0.org1.example.com | "2019-05-02 01:31:22.093 UTC [gossip.discovery] handleAliveMessage -> DEBU 2be2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.093 UTC [gossip.discovery] isSentByMe -> DEBU 2be3 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.094 UTC [gossip.discovery] handleAliveMessage -> DEBU 2be4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.096 UTC [gossip.comm] func1 -> DEBU 2be5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.096 UTC [gossip.gossip] handleMessage -> DEBU 2be6 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.094 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2be7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.097 UTC [gossip.gossip] handleMessage -> DEBU 2be8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.097 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2be9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bea Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:22.098 UTC [msp] DeserializeIdentity -> DEBU 2beb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:22.099 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bec Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:22.099 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bed Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:22.099 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bee Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:22.100 UTC [policies] Evaluate -> DEBU 2bef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:22.100 UTC [policies] Evaluate -> DEBU 2bf0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:22.100 UTC [policies] Evaluate -> DEBU 2bf1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:22.100 UTC [cauthdsl] func1 -> DEBU 2bf2 0xc002c2c550 gate 1556760682100385200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [cauthdsl] func2 -> DEBU 2bf3 0xc002c2c550 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [cauthdsl] func2 -> DEBU 2bf4 0xc002c2c550 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [cauthdsl] func2 -> DEBU 2bf5 0xc002c2c550 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [msp.identity] Verify -> DEBU 2bf6 Verify: digest = 00000000 30 c5 d1 f6 30 2f e5 19 26 51 3d 31 38 f8 e4 cf |0...0/..&Q=18...| -peer0.org1.example.com | 00000010 1e 26 99 39 cc 02 04 dc be 6b 95 33 70 3b 89 73 |.&.9.....k.3p;.s|" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [msp.identity] Verify -> DEBU 2bf7 Verify: sig = 00000000 30 44 02 20 58 d5 c0 5b ca a6 29 66 f9 27 d4 cd |0D. X..[..)f.'..| -peer0.org1.example.com | 00000010 b3 ff ed 4d 0c f6 01 28 cf b7 6d 4d e6 99 f1 eb |...M...(..mM....| -peer0.org1.example.com | 00000020 c2 71 e5 be 02 20 3f 4e 0a ca d0 98 f3 05 c1 2b |.q... ?N.......+| -peer0.org1.example.com | 00000030 d7 fe f1 ad 0a 54 37 10 a4 66 4f cb 4d a5 44 9a |.....T7..fO.M.D.| -peer0.org1.example.com | 00000040 33 3d 5c 6c a7 74 |3=\l.t|" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [cauthdsl] func2 -> DEBU 2bf8 0xc002c2c550 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [cauthdsl] func1 -> DEBU 2bf9 0xc002c2c550 gate 1556760682100385200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [policies] Evaluate -> DEBU 2bfa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [policies] Evaluate -> DEBU 2bfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [policies] Evaluate -> DEBU 2bfc Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [policies] Evaluate -> DEBU 2bfd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bfe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bff Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.101 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c00 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:22.103 UTC [msp.identity] Verify -> DEBU 2c01 Verify: digest = 00000000 9c 87 86 5a 50 b0 23 5a 7d 97 8f f3 7f 5b ca 50 |...ZP.#Z}....[.P| -peer0.org1.example.com | 00000010 29 98 a1 6c b3 a9 c7 7d 17 e6 53 fb 02 0e 12 75 |)..l...}..S....u|" -peer0.org1.example.com | "2019-05-02 01:31:22.104 UTC [msp.identity] Verify -> DEBU 2c02 Verify: sig = 00000000 30 45 02 21 00 c0 03 74 eb b2 17 1d fd 62 d4 95 |0E.!...t.....b..| -peer0.org1.example.com | 00000010 de 01 f8 2e 3c 72 f0 48 18 df 2e 30 6d 5e a5 37 |.... DEBU 2c03 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.104 UTC [gossip.discovery] isSentByMe -> DEBU 2c04 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.104 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c05 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.105 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c06 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:22.105 UTC [msp.identity] Verify -> DEBU 2c07 Verify: digest = 00000000 32 7c 02 b3 20 b7 22 b7 bc 8f 19 5a 4a 0a 4d 7d |2|.. ."....ZJ.M}| -peer0.org1.example.com | 00000010 70 94 b3 e6 bb a8 bf 8c 10 50 b2 1d ec ad 63 2a |p........P....c*|" -peer0.org1.example.com | "2019-05-02 01:31:22.105 UTC [msp.identity] Verify -> DEBU 2c08 Verify: sig = 00000000 30 44 02 20 4c b2 0a c6 7b 9c 32 9f f9 d6 64 76 |0D. L...{.2...dv| -peer0.org1.example.com | 00000010 f4 a9 dc f1 5a 67 f6 86 54 21 05 d6 05 92 7e 25 |....Zg..T!....~%| -peer0.org1.example.com | 00000020 5b 03 d6 30 02 20 68 48 47 ea d5 b7 cd b6 79 c5 |[..0. hHG.....y.| -peer0.org1.example.com | 00000030 5d 72 10 6c 84 51 9a a5 26 b3 9b 6b 06 2a 1d 3c |]r.l.Q..&..k.*.<| -peer0.org1.example.com | 00000040 bd c9 0f 96 1c 28 |.....(|" -peer0.org1.example.com | "2019-05-02 01:31:22.106 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c09 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:22.109 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c0a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:22.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c0b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.435 UTC [gossip.gossip] handleMessage -> DEBU 2c0c Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.437 UTC [gossip.gossip] handleMessage -> DEBU 2c0d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.438 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.438 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c0f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:23.440 UTC [msp.identity] Verify -> DEBU 2c10 Verify: digest = 00000000 c0 5c ac df d1 c6 3a 05 96 30 8f 48 15 0a d4 53 |.\....:..0.H...S| -peer0.org1.example.com | 00000010 1e e3 ac df 7b b1 09 af 61 8e 30 a5 ca 56 86 83 |....{...a.0..V..|" -peer0.org1.example.com | "2019-05-02 01:31:23.440 UTC [msp.identity] Verify -> DEBU 2c11 Verify: sig = 00000000 30 45 02 21 00 d3 9b 98 2e 82 b8 ca 09 98 12 92 |0E.!............| -peer0.org1.example.com | 00000010 dc af e0 d1 af 7a 5e a8 62 b2 92 f7 2d 36 81 1e |.....z^.b...-6..| -peer0.org1.example.com | 00000020 0f 45 3f 0a 5d 02 20 13 09 88 f9 d0 cb 5b 99 67 |.E?.]. ......[.g| -peer0.org1.example.com | 00000030 2c 4e 8a 10 2f c5 d3 21 e5 36 27 3b 63 cb 11 dc |,N../..!.6';c...| -peer0.org1.example.com | 00000040 c1 f6 16 69 7f ba c1 |...i...|" -peer0.org1.example.com | "2019-05-02 01:31:23.441 UTC [gossip.comm] func1 -> DEBU 2c12 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.441 UTC [gossip.gossip] handleMessage -> DEBU 2c13 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.442 UTC [msp.identity] Verify -> DEBU 2c14 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:23.442 UTC [msp.identity] Verify -> DEBU 2c15 Verify: sig = 00000000 30 45 02 21 00 98 bf 20 4c 73 d6 bb 18 a6 ff fb |0E.!... Ls......| -peer0.org1.example.com | 00000010 22 16 57 5d 2d fd 92 d0 70 58 2d 39 0c aa ef 8d |".W]-...pX-9....| -peer0.org1.example.com | 00000020 d2 87 d3 b0 72 02 20 6a 02 0a 47 43 e8 1f e7 49 |....r. j..GC...I| -peer0.org1.example.com | 00000030 01 57 08 22 35 cf e6 46 a0 d3 60 3f 12 75 d0 21 |.W."5..F..`?.u.!| -peer0.org1.example.com | 00000040 8b 5b 35 d2 b8 fe cd |.[5....|" -peer0.org1.example.com | "2019-05-02 01:31:23.443 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c16 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.444 UTC [gossip.comm] func1 -> DEBU 2c17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.445 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c18 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:23.445 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c19 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 " -peer0.org1.example.com | "2019-05-02 01:31:23.446 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c1a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 " -peer0.org1.example.com | "2019-05-02 01:31:23.446 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c1b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:23.446 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c1c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.447 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c1d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.447 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c1e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.447 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c1f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.448 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c22 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.448 UTC [gossip.gossip] handleMessage -> DEBU 2c20 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.448 UTC [msp] DeserializeIdentity -> DEBU 2c21 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.450 UTC [msp] DeserializeIdentity -> DEBU 2c24 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.449 UTC [gossip.gossip] handleMessage -> DEBU 2c23 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.450 UTC [gossip.gossip] handleMessage -> DEBU 2c25 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c27 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.451 UTC [msp] DeserializeIdentity -> DEBU 2c28 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.452 UTC [gossip.comm] Send -> DEBU 2c29 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:23.453 UTC [gossip.comm] sendToEndpoint -> DEBU 2c2a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.453 UTC [gossip.comm] sendToEndpoint -> DEBU 2c2b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.455 UTC [msp] DeserializeIdentity -> DEBU 2c2c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.455 UTC [gossip.comm] Send -> DEBU 2c2d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:23.456 UTC [gossip.comm] sendToEndpoint -> DEBU 2c2e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.457 UTC [gossip.comm] sendToEndpoint -> DEBU 2c2f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.512 UTC [gossip.comm] func1 -> DEBU 2c30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.513 UTC [gossip.gossip] handleMessage -> DEBU 2c31 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.513 UTC [gossip.gossip] handleMessage -> DEBU 2c32 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.514 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c33 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.515 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c34 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:23.516 UTC [msp] DeserializeIdentity -> DEBU 2c35 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.519 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c36 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:23.520 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c38 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:23.521 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c39 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:23.520 UTC [gossip.gossip] handleMessage -> DEBU 2c37 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.522 UTC [policies] Evaluate -> DEBU 2c3a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:23.526 UTC [policies] Evaluate -> DEBU 2c3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:23.526 UTC [policies] Evaluate -> DEBU 2c3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:23.527 UTC [cauthdsl] func1 -> DEBU 2c3d 0xc002e52a20 gate 1556760683527208700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:23.527 UTC [cauthdsl] func2 -> DEBU 2c3e 0xc002e52a20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:23.530 UTC [cauthdsl] func2 -> DEBU 2c40 0xc002e52a20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:23.529 UTC [gossip.comm] func1 -> DEBU 2c3f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.530 UTC [cauthdsl] func2 -> DEBU 2c41 0xc002e52a20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:23.531 UTC [msp.identity] Verify -> DEBU 2c42 Verify: digest = 00000000 6e 95 b6 b0 c7 91 d7 10 c2 21 da 73 da 0d 75 d7 |n........!.s..u.| -peer0.org1.example.com | 00000010 8f d2 6e 0f a7 34 88 04 26 2d c9 a7 88 60 f6 3a |..n..4..&-...`.:|" -peer0.org1.example.com | "2019-05-02 01:31:23.531 UTC [msp.identity] Verify -> DEBU 2c43 Verify: sig = 00000000 30 44 02 20 74 26 1b 9e 5e ae 1f b2 28 23 6b 59 |0D. t&..^...(#kY| -peer0.org1.example.com | 00000010 60 69 a6 32 b9 59 8a 21 ca 55 77 03 6e cc d2 14 |`i.2.Y.!.Uw.n...| -peer0.org1.example.com | 00000020 7f 38 19 ef 02 20 03 8e 1e 07 46 3b e7 f1 7c 89 |.8... ....F;..|.| -peer0.org1.example.com | 00000030 0a 54 cc 42 5b 2e fb e8 b0 aa 33 93 e0 c8 c0 ab |.T.B[.....3.....| -peer0.org1.example.com | 00000040 b3 c5 c8 6c 0e 0f |...l..|" -peer0.org1.example.com | "2019-05-02 01:31:23.531 UTC [cauthdsl] func2 -> DEBU 2c44 0xc002e52a20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:23.531 UTC [cauthdsl] func1 -> DEBU 2c45 0xc002e52a20 gate 1556760683527208700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:23.532 UTC [policies] Evaluate -> DEBU 2c46 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:23.532 UTC [policies] Evaluate -> DEBU 2c47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:23.532 UTC [policies] Evaluate -> DEBU 2c48 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:23.532 UTC [policies] Evaluate -> DEBU 2c49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:23.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c4a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c4b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:23.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c4c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 " -peer0.org1.example.com | "2019-05-02 01:31:23.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c4d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 " -peer0.org1.example.com | "2019-05-02 01:31:23.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c4e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:23.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c4f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c50 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c51 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c53 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.534 UTC [gossip.gossip] handleMessage -> DEBU 2c54 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.534 UTC [gossip.gossip] handleMessage -> DEBU 2c55 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.534 UTC [gossip.gossip] handleMessage -> DEBU 2c56 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c57 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c58 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.552 UTC [msp] DeserializeIdentity -> DEBU 2c59 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.555 UTC [msp] DeserializeIdentity -> DEBU 2c5a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.556 UTC [msp] DeserializeIdentity -> DEBU 2c5b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.556 UTC [msp] DeserializeIdentity -> DEBU 2c5c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.558 UTC [msp] DeserializeIdentity -> DEBU 2c5d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.558 UTC [msp] DeserializeIdentity -> DEBU 2c5e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.559 UTC [gossip.comm] Send -> DEBU 2c5f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:23.559 UTC [msp] DeserializeIdentity -> DEBU 2c60 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.560 UTC [msp] DeserializeIdentity -> DEBU 2c61 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.560 UTC [gossip.comm] Send -> DEBU 2c63 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:23.560 UTC [gossip.comm] sendToEndpoint -> DEBU 2c62 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.561 UTC [gossip.comm] sendToEndpoint -> DEBU 2c64 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.561 UTC [gossip.comm] sendToEndpoint -> DEBU 2c65 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.562 UTC [gossip.comm] sendToEndpoint -> DEBU 2c66 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.584 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 2c67 Sleeping 25s" -peer0.org1.example.com | "2019-05-02 01:31:23.734 UTC [msp.identity] Sign -> DEBU 2c68 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151020 " -peer0.org1.example.com | "2019-05-02 01:31:23.735 UTC [msp.identity] Sign -> DEBU 2c69 Sign: digest: 59A9AA61B8E22D39749EF8E08079F619392C601F669D880D80EF7F75EB8852D2 " -peer0.org1.example.com | "2019-05-02 01:31:23.735 UTC [msp.identity] Sign -> DEBU 2c6a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:23.735 UTC [msp.identity] Sign -> DEBU 2c6b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:23.736 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2c6c Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:23.744 UTC [msp] DeserializeIdentity -> DEBU 2c6d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.745 UTC [msp] DeserializeIdentity -> DEBU 2c6e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.746 UTC [gossip.comm] Send -> DEBU 2c6f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:23.746 UTC [msp] DeserializeIdentity -> DEBU 2c70 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.746 UTC [gossip.comm] sendToEndpoint -> DEBU 2c71 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.746 UTC [gossip.comm] sendToEndpoint -> DEBU 2c72 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.747 UTC [gossip.comm] Send -> DEBU 2c73 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:23.749 UTC [gossip.comm] sendToEndpoint -> DEBU 2c74 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.750 UTC [gossip.comm] sendToEndpoint -> DEBU 2c75 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.750 UTC [msp] DeserializeIdentity -> DEBU 2c76 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.751 UTC [gossip.comm] Send -> DEBU 2c77 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:23.752 UTC [gossip.comm] sendToEndpoint -> DEBU 2c78 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.753 UTC [gossip.comm] sendToEndpoint -> DEBU 2c79 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.848 UTC [gossip.comm] func1 -> DEBU 2c7a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.849 UTC [gossip.gossip] handleMessage -> DEBU 2c7b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c7c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.850 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c7e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:23.851 UTC [msp] DeserializeIdentity -> DEBU 2c7f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.849 UTC [gossip.gossip] handleMessage -> DEBU 2c7d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.854 UTC [gossip.gossip] handleMessage -> DEBU 2c80 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.855 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c81 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:23.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c82 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:23.856 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c83 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:23.858 UTC [policies] Evaluate -> DEBU 2c84 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:23.859 UTC [policies] Evaluate -> DEBU 2c85 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:23.859 UTC [policies] Evaluate -> DEBU 2c86 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:23.860 UTC [cauthdsl] func1 -> DEBU 2c87 0xc003084f90 gate 1556760683860388800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:23.860 UTC [cauthdsl] func2 -> DEBU 2c88 0xc003084f90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:23.861 UTC [cauthdsl] func2 -> DEBU 2c89 0xc003084f90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:23.861 UTC [cauthdsl] func2 -> DEBU 2c8a 0xc003084f90 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:23.862 UTC [msp.identity] Verify -> DEBU 2c8b Verify: digest = 00000000 17 7b 4c e1 47 f4 a4 bd d2 66 a7 99 b1 f5 de 29 |.{L.G....f.....)| -peer0.org1.example.com | 00000010 c6 7b b4 35 5e 0f d3 c2 3f 27 7c 20 a8 40 28 75 |.{.5^...?'| .@(u|" -peer0.org1.example.com | "2019-05-02 01:31:23.862 UTC [msp.identity] Verify -> DEBU 2c8c Verify: sig = 00000000 30 45 02 21 00 93 e2 9c 38 2c 9d 96 b1 48 06 a2 |0E.!....8,...H..| -peer0.org1.example.com | 00000010 ef 07 06 89 5e d3 86 5f 1d 32 e8 64 9e d6 95 e1 |....^.._.2.d....| -peer0.org1.example.com | 00000020 dd 08 0d 22 1a 02 20 64 ec 58 71 b4 bf be 18 3f |...".. d.Xq....?| -peer0.org1.example.com | 00000030 f5 f8 90 18 62 cb 80 b0 85 82 a0 9e ae 6a 9b 6c |....b........j.l| -peer0.org1.example.com | 00000040 66 a5 67 df 79 e1 02 |f.g.y..|" -peer0.org1.example.com | "2019-05-02 01:31:23.863 UTC [cauthdsl] func2 -> DEBU 2c8d 0xc003084f90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:23.864 UTC [cauthdsl] func1 -> DEBU 2c8e 0xc003084f90 gate 1556760683860388800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:23.864 UTC [gossip.comm] func1 -> DEBU 2c8f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.865 UTC [policies] Evaluate -> DEBU 2c90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:23.866 UTC [policies] Evaluate -> DEBU 2c91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:23.866 UTC [policies] Evaluate -> DEBU 2c92 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:23.867 UTC [policies] Evaluate -> DEBU 2c93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:23.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.868 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c95 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:23.868 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c96 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 " -peer0.org1.example.com | "2019-05-02 01:31:23.869 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c97 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 " -peer0.org1.example.com | "2019-05-02 01:31:23.869 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c98 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:23.870 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c99 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.870 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c9a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.870 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c9b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c9c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c9e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.871 UTC [gossip.gossip] handleMessage -> DEBU 2c9d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.872 UTC [gossip.gossip] handleMessage -> DEBU 2c9f Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.879 UTC [gossip.gossip] handleMessage -> DEBU 2ca0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.881 UTC [msp] DeserializeIdentity -> DEBU 2ca1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.884 UTC [msp] DeserializeIdentity -> DEBU 2ca2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.886 UTC [msp] DeserializeIdentity -> DEBU 2ca3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.887 UTC [msp] DeserializeIdentity -> DEBU 2ca4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.889 UTC [msp] DeserializeIdentity -> DEBU 2ca5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.890 UTC [msp] DeserializeIdentity -> DEBU 2ca7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.889 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ca6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ca8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.893 UTC [gossip.comm] Send -> DEBU 2ca9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:23.894 UTC [msp] DeserializeIdentity -> DEBU 2caa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.896 UTC [msp] DeserializeIdentity -> DEBU 2cac Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:23.894 UTC [gossip.comm] sendToEndpoint -> DEBU 2cab Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.899 UTC [gossip.comm] sendToEndpoint -> DEBU 2cad Exiting" -peer0.org1.example.com | "2019-05-02 01:31:23.899 UTC [gossip.comm] Send -> DEBU 2cae Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:23.902 UTC [gossip.comm] sendToEndpoint -> DEBU 2caf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:23.902 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:24.827 UTC [msp] DeserializeIdentity -> DEBU 2cb1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.828 UTC [msp] DeserializeIdentity -> DEBU 2cb2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.829 UTC [gossip.comm] Send -> DEBU 2cb3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:24.829 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.830 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:24.830 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.830 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:24.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.833 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:24.833 UTC [gossip.gossip] handleMessage -> DEBU 2cba Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.836 UTC [gossip.comm] func1 -> DEBU 2cbc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.834 UTC [gossip.comm] func1 -> DEBU 2cbb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.837 UTC [msp.identity] Verify -> DEBU 2cbd Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:24.838 UTC [msp.identity] Verify -> DEBU 2cbe Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:24.840 UTC [msp.identity] Verify -> DEBU 2cbf Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:24.840 UTC [msp.identity] Verify -> DEBU 2cc0 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:24.841 UTC [msp] DeserializeIdentity -> DEBU 2cc1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.841 UTC [msp] DeserializeIdentity -> DEBU 2cc2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.842 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cc3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:24.843 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cc4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.843 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cc5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.844 UTC [policies] Evaluate -> DEBU 2cc6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.846 UTC [policies] Evaluate -> DEBU 2cc7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:24.846 UTC [policies] Evaluate -> DEBU 2cc8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.847 UTC [cauthdsl] func1 -> DEBU 2cc9 0xc0033a5390 gate 1556760684847139800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:24.847 UTC [cauthdsl] func2 -> DEBU 2cca 0xc0033a5390 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:24.848 UTC [cauthdsl] func2 -> DEBU 2ccb 0xc0033a5390 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:24.849 UTC [cauthdsl] func2 -> DEBU 2ccc 0xc0033a5390 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.850 UTC [msp.identity] Verify -> DEBU 2ccd Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:24.851 UTC [msp.identity] Verify -> DEBU 2cce Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:24.851 UTC [cauthdsl] func2 -> DEBU 2ccf 0xc0033a5390 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.852 UTC [cauthdsl] func1 -> DEBU 2cd0 0xc0033a5390 gate 1556760684847139800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:24.852 UTC [policies] Evaluate -> DEBU 2cd1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.854 UTC [policies] Evaluate -> DEBU 2cd2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.854 UTC [policies] Evaluate -> DEBU 2cd3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.855 UTC [policies] Evaluate -> DEBU 2cd4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.856 UTC [msp] DeserializeIdentity -> DEBU 2cd5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.857 UTC [msp] DeserializeIdentity -> DEBU 2cd6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.858 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cd7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:24.858 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.859 UTC [policies] Evaluate -> DEBU 2cda == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.860 UTC [policies] Evaluate -> DEBU 2cdb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:24.860 UTC [policies] Evaluate -> DEBU 2cdc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.861 UTC [cauthdsl] func1 -> DEBU 2cdd 0xc0033eeb60 gate 1556760684861516300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:24.862 UTC [cauthdsl] func2 -> DEBU 2cde 0xc0033eeb60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:24.862 UTC [cauthdsl] func2 -> DEBU 2cdf 0xc0033eeb60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:24.862 UTC [cauthdsl] func2 -> DEBU 2ce0 0xc0033eeb60 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.863 UTC [msp.identity] Verify -> DEBU 2ce1 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:24.863 UTC [msp.identity] Verify -> DEBU 2ce2 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:24.864 UTC [cauthdsl] func2 -> DEBU 2ce3 0xc0033eeb60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.865 UTC [cauthdsl] func1 -> DEBU 2ce4 0xc0033eeb60 gate 1556760684861516300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:24.865 UTC [policies] Evaluate -> DEBU 2ce5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.865 UTC [policies] Evaluate -> DEBU 2ce6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.866 UTC [policies] Evaluate -> DEBU 2ce7 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.867 UTC [policies] Evaluate -> DEBU 2ce8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.867 UTC [gossip.gossip] handleMessage -> DEBU 2ce9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:24.867 UTC [gossip.gossip] handleMessage -> DEBU 2cea Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.868 UTC [msp] DeserializeIdentity -> DEBU 2ceb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.869 UTC [msp] DeserializeIdentity -> DEBU 2cec Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.869 UTC [msp] DeserializeIdentity -> DEBU 2ced Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.870 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:24.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cef Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cf0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.873 UTC [policies] Evaluate -> DEBU 2cf1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.873 UTC [policies] Evaluate -> DEBU 2cf2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:24.874 UTC [policies] Evaluate -> DEBU 2cf3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.874 UTC [cauthdsl] func1 -> DEBU 2cf4 0xc003564670 gate 1556760684874948200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:24.875 UTC [cauthdsl] func2 -> DEBU 2cf5 0xc003564670 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:24.875 UTC [cauthdsl] func2 -> DEBU 2cf6 0xc003564670 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:24.876 UTC [cauthdsl] func2 -> DEBU 2cf7 0xc003564670 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.876 UTC [msp.identity] Verify -> DEBU 2cf8 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:24.877 UTC [msp.identity] Verify -> DEBU 2cf9 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:24.878 UTC [cauthdsl] func2 -> DEBU 2cfa 0xc003564670 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.878 UTC [cauthdsl] func1 -> DEBU 2cfb 0xc003564670 gate 1556760684874948200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:24.878 UTC [policies] Evaluate -> DEBU 2cfc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.879 UTC [policies] Evaluate -> DEBU 2cfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.880 UTC [policies] Evaluate -> DEBU 2cfe Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.880 UTC [policies] Evaluate -> DEBU 2cff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.881 UTC [msp.identity] Verify -> DEBU 2d00 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:24.881 UTC [msp.identity] Verify -> DEBU 2d01 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:24.883 UTC [msp.identity] Verify -> DEBU 2d02 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:24.883 UTC [msp.identity] Verify -> DEBU 2d03 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:24.884 UTC [msp] DeserializeIdentity -> DEBU 2d04 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.885 UTC [msp] DeserializeIdentity -> DEBU 2d05 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.886 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:24.886 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d07 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.886 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d08 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.887 UTC [policies] Evaluate -> DEBU 2d09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.887 UTC [policies] Evaluate -> DEBU 2d0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:24.888 UTC [policies] Evaluate -> DEBU 2d0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.888 UTC [cauthdsl] func1 -> DEBU 2d0c 0xc003806c80 gate 1556760684888447300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:24.888 UTC [cauthdsl] func2 -> DEBU 2d0d 0xc003806c80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:24.889 UTC [cauthdsl] func2 -> DEBU 2d0e 0xc003806c80 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:24.889 UTC [cauthdsl] func2 -> DEBU 2d0f 0xc003806c80 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.890 UTC [msp.identity] Verify -> DEBU 2d10 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:24.890 UTC [msp.identity] Verify -> DEBU 2d11 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:24.891 UTC [cauthdsl] func2 -> DEBU 2d12 0xc003806c80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.891 UTC [cauthdsl] func1 -> DEBU 2d13 0xc003806c80 gate 1556760684888447300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:24.891 UTC [policies] Evaluate -> DEBU 2d14 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.892 UTC [policies] Evaluate -> DEBU 2d15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.893 UTC [policies] Evaluate -> DEBU 2d16 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.893 UTC [policies] Evaluate -> DEBU 2d17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.894 UTC [gossip.gossip] handleMessage -> DEBU 2d18 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:24.894 UTC [gossip.gossip] handleMessage -> DEBU 2d19 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.894 UTC [msp] DeserializeIdentity -> DEBU 2d1a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.895 UTC [msp] DeserializeIdentity -> DEBU 2d1b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.895 UTC [msp] DeserializeIdentity -> DEBU 2d1c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.896 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d1d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:24.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d1e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.897 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d1f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.897 UTC [policies] Evaluate -> DEBU 2d20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.898 UTC [policies] Evaluate -> DEBU 2d21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:24.898 UTC [policies] Evaluate -> DEBU 2d22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.899 UTC [cauthdsl] func1 -> DEBU 2d23 0xc003af2790 gate 1556760684899407000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:24.899 UTC [cauthdsl] func2 -> DEBU 2d24 0xc003af2790 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:24.900 UTC [cauthdsl] func2 -> DEBU 2d25 0xc003af2790 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:24.900 UTC [cauthdsl] func2 -> DEBU 2d26 0xc003af2790 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.901 UTC [msp.identity] Verify -> DEBU 2d27 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:24.901 UTC [msp.identity] Verify -> DEBU 2d28 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:24.902 UTC [cauthdsl] func2 -> DEBU 2d29 0xc003af2790 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.902 UTC [cauthdsl] func1 -> DEBU 2d2a 0xc003af2790 gate 1556760684899407000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:24.903 UTC [policies] Evaluate -> DEBU 2d2b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.903 UTC [policies] Evaluate -> DEBU 2d2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.904 UTC [policies] Evaluate -> DEBU 2d2d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.905 UTC [policies] Evaluate -> DEBU 2d2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.905 UTC [msp.identity] Verify -> DEBU 2d2f Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:24.906 UTC [msp.identity] Verify -> DEBU 2d30 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:24.907 UTC [msp.identity] Verify -> DEBU 2d31 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:24.907 UTC [msp.identity] Verify -> DEBU 2d32 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:24.907 UTC [msp] DeserializeIdentity -> DEBU 2d33 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.908 UTC [msp] DeserializeIdentity -> DEBU 2d34 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.908 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d35 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:24.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d36 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d37 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:24.909 UTC [policies] Evaluate -> DEBU 2d38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.909 UTC [policies] Evaluate -> DEBU 2d39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:24.910 UTC [policies] Evaluate -> DEBU 2d3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:24.910 UTC [cauthdsl] func1 -> DEBU 2d3b 0xc003b06da0 gate 1556760684910711200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:24.910 UTC [cauthdsl] func2 -> DEBU 2d3c 0xc003b06da0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:24.911 UTC [cauthdsl] func2 -> DEBU 2d3d 0xc003b06da0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:24.911 UTC [cauthdsl] func2 -> DEBU 2d3e 0xc003b06da0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.911 UTC [msp.identity] Verify -> DEBU 2d3f Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:24.912 UTC [msp.identity] Verify -> DEBU 2d40 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:24.912 UTC [cauthdsl] func2 -> DEBU 2d41 0xc003b06da0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:24.913 UTC [cauthdsl] func1 -> DEBU 2d42 0xc003b06da0 gate 1556760684910711200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:24.913 UTC [policies] Evaluate -> DEBU 2d43 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.914 UTC [policies] Evaluate -> DEBU 2d44 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.914 UTC [policies] Evaluate -> DEBU 2d45 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.914 UTC [policies] Evaluate -> DEBU 2d46 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:24.914 UTC [gossip.gossip] handleMessage -> DEBU 2d47 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:24.945 UTC [msp] DeserializeIdentity -> DEBU 2d48 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.946 UTC [msp] DeserializeIdentity -> DEBU 2d49 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.947 UTC [gossip.pull] Hello -> DEBU 2d4a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:24.948 UTC [msp] DeserializeIdentity -> DEBU 2d4b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.949 UTC [msp] DeserializeIdentity -> DEBU 2d4c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:24.949 UTC [gossip.comm] Send -> DEBU 2d4d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:24.951 UTC [gossip.comm] sendToEndpoint -> DEBU 2d4e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.951 UTC [gossip.comm] sendToEndpoint -> DEBU 2d4f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:24.954 UTC [gossip.gossip] handleMessage -> DEBU 2d50 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9383867273750908648 , Msg_type: BLOCK_MSG, digests: [2 3 4 5 6 7 8 1], Envelope: 58 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.954 UTC [gossip.pull] HandleMessage -> DEBU 2d51 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9383867273750908648 , Msg_type: BLOCK_MSG, digests: [2 3 4 5 6 7 8 1], Envelope: 58 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:24.955 UTC [gossip.gossip] handleMessage -> DEBU 2d52 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.090 UTC [gossip.gossip] handleMessage -> DEBU 2d53 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.090 UTC [msp] DeserializeIdentity -> DEBU 2d54 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.090 UTC [msp] DeserializeIdentity -> DEBU 2d55 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.090 UTC [gossip.gossip] handleMessage -> DEBU 2d56 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.125 UTC [gossip.gossip] handleMessage -> DEBU 2d57 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.126 UTC [gossip.pull] HandleMessage -> DEBU 2d58 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.126 UTC [gossip.pull] SendDigest -> DEBU 2d59 Sending BLOCK_MSG digest: [8 1 2 3 4 5 6 7] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:25.126 UTC [gossip.gossip] handleMessage -> DEBU 2d5a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.356 UTC [gossip.comm] func1 -> DEBU 2d5b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.359 UTC [gossip.gossip] handleMessage -> DEBU 2d5c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.367 UTC [msp] DeserializeIdentity -> DEBU 2d5d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.368 UTC [msp] DeserializeIdentity -> DEBU 2d5e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.370 UTC [msp] DeserializeIdentity -> DEBU 2d5f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.373 UTC [gossip.gossip] handleMessage -> DEBU 2d60 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.436 UTC [gossip.gossip] handleMessage -> DEBU 2d61 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.438 UTC [gossip.pull] HandleMessage -> DEBU 2d62 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.439 UTC [gossip.pull] SendDigest -> DEBU 2d63 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:25.439 UTC [gossip.gossip] handleMessage -> DEBU 2d64 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.450 UTC [gossip.gossip] handleMessage -> DEBU 2d65 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.452 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d67 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:25.452 UTC [msp.identity] Verify -> DEBU 2d68 Verify: digest = 00000000 f4 72 c5 fd 97 6b 27 a8 b0 ab 5f 86 dd 06 ab 0f |.r...k'..._.....| -peer0.org1.example.com | 00000010 4a f0 f5 aa df bf 90 11 15 e0 6c 6f 57 1e d1 b2 |J.........loW...|" -peer0.org1.example.com | "2019-05-02 01:31:25.452 UTC [msp.identity] Verify -> DEBU 2d69 Verify: sig = 00000000 30 44 02 20 28 b0 34 fe 1b c3 1e ed d8 76 9d b4 |0D. (.4......v..| -peer0.org1.example.com | 00000010 c7 88 37 3c 2a 76 3e fa 41 aa 2a 6e 26 a7 6b 85 |..7<*v>.A.*n&.k.| -peer0.org1.example.com | 00000020 57 86 d8 46 02 20 38 6d a5 66 57 b2 80 92 99 85 |W..F. 8m.fW.....| -peer0.org1.example.com | 00000030 0b 92 b9 4e 66 b1 3a 23 02 e5 db 40 ec e5 27 e0 |...Nf.:#...@..'.| -peer0.org1.example.com | 00000040 9b 2e b9 1f 40 df |....@.|" -peer0.org1.example.com | "2019-05-02 01:31:25.454 UTC [msp.identity] Verify -> DEBU 2d6a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:25.454 UTC [msp.identity] Verify -> DEBU 2d6b Verify: sig = 00000000 30 44 02 20 6a e1 53 f5 38 07 d3 03 3d 28 a9 08 |0D. j.S.8...=(..| -peer0.org1.example.com | 00000010 b5 39 b6 00 2a 8f 91 08 d0 dc c3 52 a3 d9 9c cb |.9..*......R....| -peer0.org1.example.com | 00000020 01 73 f3 f5 02 20 1b d7 cb 27 18 c5 a7 f2 88 d1 |.s... ...'......| -peer0.org1.example.com | 00000030 f8 02 dd 10 5a 8b f6 f2 f8 f0 52 96 fc fc 73 40 |....Z.....R...s@| -peer0.org1.example.com | 00000040 4f 94 60 a7 9a 11 |O.`...|" -peer0.org1.example.com | "2019-05-02 01:31:25.455 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d6c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d6d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:25.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d6e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 " -peer0.org1.example.com | "2019-05-02 01:31:25.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d6f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 " -peer0.org1.example.com | "2019-05-02 01:31:25.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d70 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:25.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d71 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.457 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d72 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d73 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.457 UTC [gossip.discovery] sendMemResponse -> DEBU 2d74 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:25.458 UTC [msp] DeserializeIdentity -> DEBU 2d76 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.458 UTC [msp] DeserializeIdentity -> DEBU 2d77 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.458 UTC [gossip.comm] Send -> DEBU 2d78 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:25.459 UTC [gossip.discovery] sendMemResponse -> DEBU 2d79 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:25.459 UTC [gossip.comm] sendToEndpoint -> DEBU 2d7a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.459 UTC [gossip.comm] sendToEndpoint -> DEBU 2d7b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.451 UTC [gossip.gossip] handleMessage -> DEBU 2d75 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.525 UTC [gossip.comm] func1 -> DEBU 2d7c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.526 UTC [gossip.gossip] handleMessage -> DEBU 2d7d Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.526 UTC [gossip.pull] HandleMessage -> DEBU 2d7e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.527 UTC [msp] DeserializeIdentity -> DEBU 2d7f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.528 UTC [msp] DeserializeIdentity -> DEBU 2d80 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.534 UTC [msp] DeserializeIdentity -> DEBU 2d82 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.528 UTC [gossip.comm] func1 -> DEBU 2d81 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.536 UTC [msp] DeserializeIdentity -> DEBU 2d83 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.539 UTC [msp] DeserializeIdentity -> DEBU 2d84 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.561 UTC [msp] DeserializeIdentity -> DEBU 2d85 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.563 UTC [gossip.pull] SendDigest -> DEBU 2d86 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:25.564 UTC [gossip.gossip] handleMessage -> DEBU 2d87 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.566 UTC [gossip.gossip] handleMessage -> DEBU 2d88 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.566 UTC [gossip.gossip] handleMessage -> DEBU 2d89 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d8a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.566 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d8b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:25.566 UTC [msp] DeserializeIdentity -> DEBU 2d8c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.582 UTC [gossip.comm] func1 -> DEBU 2d8d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.583 UTC [gossip.gossip] handleMessage -> DEBU 2d8e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.585 UTC [msp] DeserializeIdentity -> DEBU 2d8f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.585 UTC [msp] DeserializeIdentity -> DEBU 2d90 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.586 UTC [msp] DeserializeIdentity -> DEBU 2d91 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.586 UTC [gossip.gossip] handleMessage -> DEBU 2d92 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.587 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:25.588 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d94 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:25.588 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d95 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:25.589 UTC [policies] Evaluate -> DEBU 2d96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:25.589 UTC [policies] Evaluate -> DEBU 2d97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:25.590 UTC [policies] Evaluate -> DEBU 2d98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:25.593 UTC [cauthdsl] func1 -> DEBU 2d99 0xc0042347a0 gate 1556760685593140700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:25.593 UTC [cauthdsl] func2 -> DEBU 2d9a 0xc0042347a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:25.594 UTC [cauthdsl] func2 -> DEBU 2d9b 0xc0042347a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:25.594 UTC [cauthdsl] func2 -> DEBU 2d9c 0xc0042347a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:25.595 UTC [msp.identity] Verify -> DEBU 2d9d Verify: digest = 00000000 83 14 bc c6 ce 8d 4d 4a 49 f0 0d 2c 09 90 7e a4 |......MJI..,..~.| -peer0.org1.example.com | 00000010 ab 81 58 0f 97 ca 1b 1f 97 41 59 7d 01 28 fc de |..X......AY}.(..|" -peer0.org1.example.com | "2019-05-02 01:31:25.596 UTC [msp.identity] Verify -> DEBU 2d9e Verify: sig = 00000000 30 45 02 21 00 ca 4d 36 af 1c b2 cb d8 fc 9e 09 |0E.!..M6........| -peer0.org1.example.com | 00000010 4c 78 51 24 48 18 72 6e 08 a9 cb 41 03 d8 2d 83 |LxQ$H.rn...A..-.| -peer0.org1.example.com | 00000020 f5 6e cc a4 85 02 20 33 d2 d2 a8 b6 ae 65 56 8e |.n.... 3.....eV.| -peer0.org1.example.com | 00000030 f3 43 b1 bc 44 3b dd d5 3c e9 a9 0b 07 0b ef b9 |.C..D;..<.......| -peer0.org1.example.com | 00000040 ac 91 3f f0 05 aa 2a |..?...*|" -peer0.org1.example.com | "2019-05-02 01:31:25.598 UTC [cauthdsl] func2 -> DEBU 2d9f 0xc0042347a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:25.599 UTC [cauthdsl] func1 -> DEBU 2da0 0xc0042347a0 gate 1556760685593140700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:25.603 UTC [policies] Evaluate -> DEBU 2da1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:25.604 UTC [policies] Evaluate -> DEBU 2da2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:25.608 UTC [policies] Evaluate -> DEBU 2da3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:25.609 UTC [policies] Evaluate -> DEBU 2da4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:25.618 UTC [gossip.discovery] handleAliveMessage -> DEBU 2da5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.619 UTC [gossip.discovery] learnExistingMembers -> DEBU 2da6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:25.619 UTC [gossip.discovery] learnExistingMembers -> DEBU 2da7 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 " -peer0.org1.example.com | "2019-05-02 01:31:25.619 UTC [gossip.discovery] learnExistingMembers -> DEBU 2da8 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 " -peer0.org1.example.com | "2019-05-02 01:31:25.619 UTC [gossip.discovery] learnExistingMembers -> DEBU 2da9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:25.620 UTC [gossip.discovery] learnExistingMembers -> DEBU 2daa Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 2dab Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.620 UTC [gossip.discovery] sendMemResponse -> DEBU 2dac Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:25.620 UTC [msp] DeserializeIdentity -> DEBU 2dad Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.621 UTC [msp] DeserializeIdentity -> DEBU 2dae Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.621 UTC [msp] DeserializeIdentity -> DEBU 2daf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.622 UTC [gossip.comm] Send -> DEBU 2db0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:25.622 UTC [gossip.discovery] sendMemResponse -> DEBU 2db1 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:25.622 UTC [gossip.comm] sendToEndpoint -> DEBU 2db2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.622 UTC [gossip.comm] sendToEndpoint -> DEBU 2db3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.620 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2db4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.754 UTC [gossip.comm] func1 -> DEBU 2db5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.755 UTC [gossip.gossip] handleMessage -> DEBU 2db6 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.755 UTC [gossip.pull] HandleMessage -> DEBU 2db7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.755 UTC [msp] DeserializeIdentity -> DEBU 2db8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.810 UTC [msp] DeserializeIdentity -> DEBU 2db9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.831 UTC [msp] DeserializeIdentity -> DEBU 2dba Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.831 UTC [msp] DeserializeIdentity -> DEBU 2dbb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.831 UTC [msp] DeserializeIdentity -> DEBU 2dbc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.831 UTC [msp] DeserializeIdentity -> DEBU 2dbd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.832 UTC [gossip.pull] SendDigest -> DEBU 2dbe Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:25.832 UTC [gossip.gossip] handleMessage -> DEBU 2dbf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.841 UTC [gossip.pull] Hello -> DEBU 2dc0 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:25.841 UTC [gossip.comm] Send -> DEBU 2dc1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:25.841 UTC [gossip.pull] Hello -> DEBU 2dc2 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:25.841 UTC [gossip.comm] Send -> DEBU 2dc3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:25.841 UTC [gossip.pull] Hello -> DEBU 2dc4 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:25.841 UTC [gossip.comm] Send -> DEBU 2dc5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:25.841 UTC [gossip.comm] sendToEndpoint -> DEBU 2dc6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.841 UTC [gossip.comm] sendToEndpoint -> DEBU 2dc7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.844 UTC [gossip.comm] sendToEndpoint -> DEBU 2dc8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.845 UTC [gossip.comm] sendToEndpoint -> DEBU 2dc9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.845 UTC [gossip.comm] sendToEndpoint -> DEBU 2dca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.845 UTC [gossip.comm] sendToEndpoint -> DEBU 2dcb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.858 UTC [gossip.comm] func1 -> DEBU 2dcc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 678670819967269889 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.874 UTC [gossip.gossip] handleMessage -> DEBU 2dcd Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 678670819967269889 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.898 UTC [gossip.pull] HandleMessage -> DEBU 2dce GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 678670819967269889 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.899 UTC [gossip.gossip] handleMessage -> DEBU 2dcf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.899 UTC [gossip.gossip] handleMessage -> DEBU 2dd0 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 274374443046850088 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.901 UTC [gossip.pull] HandleMessage -> DEBU 2dd1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 274374443046850088 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.901 UTC [gossip.gossip] handleMessage -> DEBU 2dd2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.907 UTC [gossip.comm] func1 -> DEBU 2dd3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3044112139728553460 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.908 UTC [gossip.gossip] handleMessage -> DEBU 2dd4 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3044112139728553460 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.908 UTC [gossip.pull] HandleMessage -> DEBU 2dd5 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3044112139728553460 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.908 UTC [gossip.gossip] handleMessage -> DEBU 2dd6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.924 UTC [gossip.comm] func1 -> DEBU 2dd7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.925 UTC [gossip.gossip] handleMessage -> DEBU 2dd8 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.929 UTC [gossip.gossip] handleMessage -> DEBU 2dd9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:25.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2dda Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:25.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ddb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:25.955 UTC [msp] DeserializeIdentity -> DEBU 2ddc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:25.955 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ddd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:25.955 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dde Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:25.955 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ddf Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:25.955 UTC [policies] Evaluate -> DEBU 2de0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:25.955 UTC [policies] Evaluate -> DEBU 2de1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:25.955 UTC [policies] Evaluate -> DEBU 2de2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:25.955 UTC [cauthdsl] func1 -> DEBU 2de3 0xc004496270 gate 1556760685955964300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:25.956 UTC [cauthdsl] func2 -> DEBU 2de4 0xc004496270 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:25.956 UTC [cauthdsl] func2 -> DEBU 2de5 0xc004496270 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:25.956 UTC [cauthdsl] func2 -> DEBU 2de6 0xc004496270 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:25.956 UTC [msp.identity] Verify -> DEBU 2de7 Verify: digest = 00000000 3e 65 b1 1f 8c 7a 6d 97 81 74 2b 57 7d 60 82 84 |>e...zm..t+W}`..| -peer0.org1.example.com | 00000010 29 e7 b4 12 2e 35 e3 16 8d c6 e2 c4 c5 04 f8 96 |)....5..........|" -peer0.org1.example.com | "2019-05-02 01:31:26.000 UTC [msp.identity] Verify -> DEBU 2de8 Verify: sig = 00000000 30 45 02 21 00 ca ec 8c db 5d b6 c2 37 15 3f c8 |0E.!.....]..7.?.| -peer0.org1.example.com | 00000010 05 6f b7 63 d9 dd 9a 33 78 30 45 e9 cc 66 5a 87 |.o.c...3x0E..fZ.| -peer0.org1.example.com | 00000020 5a 84 3b 6f f5 02 20 27 55 34 b8 9c 34 ac ec 93 |Z.;o.. 'U4..4...| -peer0.org1.example.com | 00000030 3f a9 15 e6 59 82 18 21 8b e8 b6 ad 9a 4d 24 8f |?...Y..!.....M$.| -peer0.org1.example.com | 00000040 ac 08 bf 5b d1 a0 4a |...[..J|" -peer0.org1.example.com | "2019-05-02 01:31:26.001 UTC [cauthdsl] func2 -> DEBU 2de9 0xc004496270 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:26.002 UTC [cauthdsl] func1 -> DEBU 2dea 0xc004496270 gate 1556760685955964300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:26.030 UTC [policies] Evaluate -> DEBU 2deb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.032 UTC [policies] Evaluate -> DEBU 2dec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.039 UTC [policies] Evaluate -> DEBU 2ded Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.053 UTC [policies] Evaluate -> DEBU 2dee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.058 UTC [gossip.discovery] handleAliveMessage -> DEBU 2def Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.060 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:26.119 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df2 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 " -peer0.org1.example.com | "2019-05-02 01:31:26.119 UTC [msp.identity] Sign -> DEBU 2df1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151021 " -peer0.org1.example.com | "2019-05-02 01:31:26.163 UTC [msp.identity] Sign -> DEBU 2df3 Sign: digest: 066A17F2A96462C9B7A4D765A726A2B2B254549312785C897513DCEB722F26A0 " -peer0.org1.example.com | "2019-05-02 01:31:26.165 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 " -peer0.org1.example.com | "2019-05-02 01:31:26.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df5 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:26.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.168 UTC [gossip.discovery] handleAliveMessage -> DEBU 2df7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.168 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2df8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.166 UTC [msp.identity] Sign -> DEBU 2df9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:26.169 UTC [msp.identity] Sign -> DEBU 2dfa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:26.169 UTC [gossip.discovery] sendMemResponse -> DEBU 2dfb Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:26.170 UTC [msp] DeserializeIdentity -> DEBU 2dfc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.170 UTC [msp] DeserializeIdentity -> DEBU 2dfd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.172 UTC [msp] DeserializeIdentity -> DEBU 2dfe Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.172 UTC [gossip.comm] Send -> DEBU 2dff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:26.174 UTC [gossip.discovery] sendMemResponse -> DEBU 2e00 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:26.175 UTC [gossip.comm] sendToEndpoint -> DEBU 2e01 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.177 UTC [gossip.comm] sendToEndpoint -> DEBU 2e02 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.180 UTC [msp] DeserializeIdentity -> DEBU 2e03 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.181 UTC [gossip.comm] Send -> DEBU 2e04 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:26.182 UTC [gossip.comm] Send -> DEBU 2e05 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:26.183 UTC [msp] DeserializeIdentity -> DEBU 2e06 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.185 UTC [gossip.comm] Send -> DEBU 2e09 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:26.184 UTC [gossip.comm] sendToEndpoint -> DEBU 2e07 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.184 UTC [gossip.comm] sendToEndpoint -> DEBU 2e08 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.186 UTC [gossip.comm] sendToEndpoint -> DEBU 2e0a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.188 UTC [gossip.comm] sendToEndpoint -> DEBU 2e0c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.188 UTC [gossip.comm] sendToEndpoint -> DEBU 2e0b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.189 UTC [gossip.comm] sendToEndpoint -> DEBU 2e0d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.196 UTC [gossip.comm] func1 -> DEBU 2e0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.196 UTC [gossip.gossip] handleMessage -> DEBU 2e0f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.201 UTC [gossip.gossip] handleMessage -> DEBU 2e10 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.202 UTC [gossip.gossip] handleMessage -> DEBU 2e12 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e11 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.205 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e13 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:26.207 UTC [msp.identity] Verify -> DEBU 2e14 Verify: digest = 00000000 06 6a 17 f2 a9 64 62 c9 b7 a4 d7 65 a7 26 a2 b2 |.j...db....e.&..| -peer0.org1.example.com | 00000010 b2 54 54 93 12 78 5c 89 75 13 dc eb 72 2f 26 a0 |.TT..x\.u...r/&.|" -peer0.org1.example.com | "2019-05-02 01:31:26.208 UTC [msp.identity] Verify -> DEBU 2e15 Verify: sig = 00000000 30 44 02 20 1d 29 e2 fc c6 15 ab e9 fa 01 04 c6 |0D. .)..........| -peer0.org1.example.com | 00000010 96 60 ae 40 81 cb 53 a0 a7 98 4d 7f ab 54 b9 02 |.`.@..S...M..T..| -peer0.org1.example.com | 00000020 a6 38 34 ec 02 20 65 52 f9 8e 80 8d 13 32 f5 50 |.84.. eR.....2.P| -peer0.org1.example.com | 00000030 cb 83 29 55 32 f4 14 46 aa de 42 ec 6e 82 4f 71 |..)U2..F..B.n.Oq| -peer0.org1.example.com | 00000040 36 cc 4d 37 ad 6c |6.M7.l|" -peer0.org1.example.com | "2019-05-02 01:31:26.211 UTC [msp.identity] Verify -> DEBU 2e16 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:26.213 UTC [msp.identity] Verify -> DEBU 2e17 Verify: sig = 00000000 30 45 02 21 00 e7 6a 24 d2 6d 5e 53 49 65 15 81 |0E.!..j$.m^SIe..| -peer0.org1.example.com | 00000010 cd 60 71 81 d1 c9 58 b2 e3 4a 7c 13 18 2e 08 d4 |.`q...X..J|.....| -peer0.org1.example.com | 00000020 65 a8 62 af 79 02 20 18 7c bd e0 60 a5 58 12 33 |e.b.y. .|..`.X.3| -peer0.org1.example.com | 00000030 73 ed 03 55 53 27 9c f2 ac 51 00 21 04 b6 ce 99 |s..US'...Q.!....| -peer0.org1.example.com | 00000040 40 ff bc f3 24 53 dd |@...$S.|" -peer0.org1.example.com | "2019-05-02 01:31:26.215 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e18 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.215 UTC [gossip.discovery] isSentByMe -> DEBU 2e19 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.216 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e1a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.217 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e1b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e1c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.219 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e1e Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:26.219 UTC [msp] DeserializeIdentity -> DEBU 2e1f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.218 UTC [gossip.gossip] handleMessage -> DEBU 2e1d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.220 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e20 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:26.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e21 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:26.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e22 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:26.222 UTC [policies] Evaluate -> DEBU 2e23 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:26.223 UTC [policies] Evaluate -> DEBU 2e24 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:26.223 UTC [policies] Evaluate -> DEBU 2e25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:26.223 UTC [cauthdsl] func1 -> DEBU 2e26 0xc002480630 gate 1556760686223913500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:26.224 UTC [cauthdsl] func2 -> DEBU 2e27 0xc002480630 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:26.224 UTC [cauthdsl] func2 -> DEBU 2e28 0xc002480630 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:26.225 UTC [cauthdsl] func2 -> DEBU 2e29 0xc002480630 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:26.225 UTC [msp.identity] Verify -> DEBU 2e2a Verify: digest = 00000000 83 14 bc c6 ce 8d 4d 4a 49 f0 0d 2c 09 90 7e a4 |......MJI..,..~.| -peer0.org1.example.com | 00000010 ab 81 58 0f 97 ca 1b 1f 97 41 59 7d 01 28 fc de |..X......AY}.(..|" -peer0.org1.example.com | "2019-05-02 01:31:26.226 UTC [msp.identity] Verify -> DEBU 2e2b Verify: sig = 00000000 30 45 02 21 00 ca 4d 36 af 1c b2 cb d8 fc 9e 09 |0E.!..M6........| -peer0.org1.example.com | 00000010 4c 78 51 24 48 18 72 6e 08 a9 cb 41 03 d8 2d 83 |LxQ$H.rn...A..-.| -peer0.org1.example.com | 00000020 f5 6e cc a4 85 02 20 33 d2 d2 a8 b6 ae 65 56 8e |.n.... 3.....eV.| -peer0.org1.example.com | 00000030 f3 43 b1 bc 44 3b dd d5 3c e9 a9 0b 07 0b ef b9 |.C..D;..<.......| -peer0.org1.example.com | 00000040 ac 91 3f f0 05 aa 2a |..?...*|" -peer0.org1.example.com | "2019-05-02 01:31:26.226 UTC [cauthdsl] func2 -> DEBU 2e2c 0xc002480630 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:26.227 UTC [cauthdsl] func1 -> DEBU 2e2d 0xc002480630 gate 1556760686223913500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:26.228 UTC [policies] Evaluate -> DEBU 2e2e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.228 UTC [policies] Evaluate -> DEBU 2e2f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.229 UTC [policies] Evaluate -> DEBU 2e30 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.229 UTC [policies] Evaluate -> DEBU 2e31 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.230 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e32 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.230 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e33 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.231 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e34 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:26.231 UTC [msp.identity] Verify -> DEBU 2e35 Verify: digest = 00000000 06 6a 17 f2 a9 64 62 c9 b7 a4 d7 65 a7 26 a2 b2 |.j...db....e.&..| -peer0.org1.example.com | 00000010 b2 54 54 93 12 78 5c 89 75 13 dc eb 72 2f 26 a0 |.TT..x\.u...r/&.|" -peer0.org1.example.com | "2019-05-02 01:31:26.232 UTC [msp.identity] Verify -> DEBU 2e36 Verify: sig = 00000000 30 44 02 20 1d 29 e2 fc c6 15 ab e9 fa 01 04 c6 |0D. .)..........| -peer0.org1.example.com | 00000010 96 60 ae 40 81 cb 53 a0 a7 98 4d 7f ab 54 b9 02 |.`.@..S...M..T..| -peer0.org1.example.com | 00000020 a6 38 34 ec 02 20 65 52 f9 8e 80 8d 13 32 f5 50 |.84.. eR.....2.P| -peer0.org1.example.com | 00000030 cb 83 29 55 32 f4 14 46 aa de 42 ec 6e 82 4f 71 |..)U2..F..B.n.Oq| -peer0.org1.example.com | 00000040 36 cc 4d 37 ad 6c |6.M7.l|" -peer0.org1.example.com | "2019-05-02 01:31:26.233 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e37 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.233 UTC [gossip.discovery] isSentByMe -> DEBU 2e38 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.234 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e39 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.234 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e3a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:26.235 UTC [msp.identity] Verify -> DEBU 2e3b Verify: digest = 00000000 f4 72 c5 fd 97 6b 27 a8 b0 ab 5f 86 dd 06 ab 0f |.r...k'..._.....| -peer0.org1.example.com | 00000010 4a f0 f5 aa df bf 90 11 15 e0 6c 6f 57 1e d1 b2 |J.........loW...|" -peer0.org1.example.com | "2019-05-02 01:31:26.235 UTC [msp.identity] Verify -> DEBU 2e3c Verify: sig = 00000000 30 44 02 20 28 b0 34 fe 1b c3 1e ed d8 76 9d b4 |0D. (.4......v..| -peer0.org1.example.com | 00000010 c7 88 37 3c 2a 76 3e fa 41 aa 2a 6e 26 a7 6b 85 |..7<*v>.A.*n&.k.| -peer0.org1.example.com | 00000020 57 86 d8 46 02 20 38 6d a5 66 57 b2 80 92 99 85 |W..F. 8m.fW.....| -peer0.org1.example.com | 00000030 0b 92 b9 4e 66 b1 3a 23 02 e5 db 40 ec e5 27 e0 |...Nf.:#...@..'.| -peer0.org1.example.com | 00000040 9b 2e b9 1f 40 df |....@.|" -peer0.org1.example.com | "2019-05-02 01:31:26.236 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e3d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.237 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e3e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.237 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e3f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.242 UTC [gossip.comm] func1 -> DEBU 2e40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.243 UTC [gossip.gossip] handleMessage -> DEBU 2e41 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.243 UTC [gossip.gossip] handleMessage -> DEBU 2e42 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.244 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.244 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e44 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:26.245 UTC [msp.identity] Verify -> DEBU 2e45 Verify: digest = 00000000 06 6a 17 f2 a9 64 62 c9 b7 a4 d7 65 a7 26 a2 b2 |.j...db....e.&..| -peer0.org1.example.com | 00000010 b2 54 54 93 12 78 5c 89 75 13 dc eb 72 2f 26 a0 |.TT..x\.u...r/&.|" -peer0.org1.example.com | "2019-05-02 01:31:26.245 UTC [msp.identity] Verify -> DEBU 2e46 Verify: sig = 00000000 30 44 02 20 1d 29 e2 fc c6 15 ab e9 fa 01 04 c6 |0D. .)..........| -peer0.org1.example.com | 00000010 96 60 ae 40 81 cb 53 a0 a7 98 4d 7f ab 54 b9 02 |.`.@..S...M..T..| -peer0.org1.example.com | 00000020 a6 38 34 ec 02 20 65 52 f9 8e 80 8d 13 32 f5 50 |.84.. eR.....2.P| -peer0.org1.example.com | 00000030 cb 83 29 55 32 f4 14 46 aa de 42 ec 6e 82 4f 71 |..)U2..F..B.n.Oq| -peer0.org1.example.com | 00000040 36 cc 4d 37 ad 6c |6.M7.l|" -peer0.org1.example.com | "2019-05-02 01:31:26.246 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e47 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.247 UTC [gossip.discovery] isSentByMe -> DEBU 2e48 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.247 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e49 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.249 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e4a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:26.250 UTC [msp.identity] Verify -> DEBU 2e4b Verify: digest = 00000000 f4 72 c5 fd 97 6b 27 a8 b0 ab 5f 86 dd 06 ab 0f |.r...k'..._.....| -peer0.org1.example.com | 00000010 4a f0 f5 aa df bf 90 11 15 e0 6c 6f 57 1e d1 b2 |J.........loW...|" -peer0.org1.example.com | "2019-05-02 01:31:26.250 UTC [msp.identity] Verify -> DEBU 2e4c Verify: sig = 00000000 30 44 02 20 28 b0 34 fe 1b c3 1e ed d8 76 9d b4 |0D. (.4......v..| -peer0.org1.example.com | 00000010 c7 88 37 3c 2a 76 3e fa 41 aa 2a 6e 26 a7 6b 85 |..7<*v>.A.*n&.k.| -peer0.org1.example.com | 00000020 57 86 d8 46 02 20 38 6d a5 66 57 b2 80 92 99 85 |W..F. 8m.fW.....| -peer0.org1.example.com | 00000030 0b 92 b9 4e 66 b1 3a 23 02 e5 db 40 ec e5 27 e0 |...Nf.:#...@..'.| -peer0.org1.example.com | 00000040 9b 2e b9 1f 40 df |....@.|" -peer0.org1.example.com | "2019-05-02 01:31:26.251 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e4d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.251 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e4e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.252 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e4f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:26.253 UTC [msp] DeserializeIdentity -> DEBU 2e50 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.253 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e51 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:26.254 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e52 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:26.255 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e53 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:26.255 UTC [policies] Evaluate -> DEBU 2e54 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:26.256 UTC [policies] Evaluate -> DEBU 2e55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:26.257 UTC [policies] Evaluate -> DEBU 2e56 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:26.258 UTC [cauthdsl] func1 -> DEBU 2e57 0xc002659330 gate 1556760686258164500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:26.259 UTC [cauthdsl] func2 -> DEBU 2e58 0xc002659330 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:26.260 UTC [cauthdsl] func2 -> DEBU 2e59 0xc002659330 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:26.261 UTC [cauthdsl] func2 -> DEBU 2e5a 0xc002659330 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:26.261 UTC [msp.identity] Verify -> DEBU 2e5b Verify: digest = 00000000 3e 65 b1 1f 8c 7a 6d 97 81 74 2b 57 7d 60 82 84 |>e...zm..t+W}`..| -peer0.org1.example.com | 00000010 29 e7 b4 12 2e 35 e3 16 8d c6 e2 c4 c5 04 f8 96 |)....5..........|" -peer0.org1.example.com | "2019-05-02 01:31:26.261 UTC [msp.identity] Verify -> DEBU 2e5c Verify: sig = 00000000 30 45 02 21 00 ca ec 8c db 5d b6 c2 37 15 3f c8 |0E.!.....]..7.?.| -peer0.org1.example.com | 00000010 05 6f b7 63 d9 dd 9a 33 78 30 45 e9 cc 66 5a 87 |.o.c...3x0E..fZ.| -peer0.org1.example.com | 00000020 5a 84 3b 6f f5 02 20 27 55 34 b8 9c 34 ac ec 93 |Z.;o.. 'U4..4...| -peer0.org1.example.com | 00000030 3f a9 15 e6 59 82 18 21 8b e8 b6 ad 9a 4d 24 8f |?...Y..!.....M$.| -peer0.org1.example.com | 00000040 ac 08 bf 5b d1 a0 4a |...[..J|" -peer0.org1.example.com | "2019-05-02 01:31:26.262 UTC [cauthdsl] func2 -> DEBU 2e5d 0xc002659330 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:26.262 UTC [cauthdsl] func1 -> DEBU 2e5e 0xc002659330 gate 1556760686258164500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:26.263 UTC [policies] Evaluate -> DEBU 2e5f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.263 UTC [policies] Evaluate -> DEBU 2e60 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.263 UTC [policies] Evaluate -> DEBU 2e61 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.264 UTC [policies] Evaluate -> DEBU 2e62 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:26.264 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e63 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:26.264 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e64 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.265 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e65 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.984 UTC [gossip.election] waitForInterrupt -> DEBU 2e66 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:26.984 UTC [gossip.election] IsLeader -> DEBU 2e67 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:26.986 UTC [msp.identity] Sign -> DEBU 2e68 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100A1801 " -peer0.org1.example.com | "2019-05-02 01:31:26.986 UTC [msp.identity] Sign -> DEBU 2e69 Sign: digest: D7B1144E5500999DF856CF4132130218D7E02293C37D70D262DD52B224D7EA99 " -peer0.org1.example.com | "2019-05-02 01:31:26.988 UTC [gossip.election] waitForInterrupt -> DEBU 2e6a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:26.990 UTC [msp] DeserializeIdentity -> DEBU 2e6b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.991 UTC [msp] DeserializeIdentity -> DEBU 2e6c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.992 UTC [msp] DeserializeIdentity -> DEBU 2e6d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.993 UTC [msp] DeserializeIdentity -> DEBU 2e6e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:26.996 UTC [gossip.comm] Send -> DEBU 2e6f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:27.000 UTC [gossip.comm] sendToEndpoint -> DEBU 2e70 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:27.001 UTC [gossip.comm] sendToEndpoint -> DEBU 2e71 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:27.001 UTC [msp] DeserializeIdentity -> DEBU 2e72 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:27.001 UTC [msp] DeserializeIdentity -> DEBU 2e73 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.397 UTC [gossip.gossip] handleMessage -> DEBU 2e74 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.397 UTC [gossip.gossip] handleMessage -> DEBU 2e75 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e76 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e77 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:28.397 UTC [msp.identity] Verify -> DEBU 2e78 Verify: digest = 00000000 df 1c 79 44 af e0 b1 61 26 1c d1 2e de 6e 80 94 |..yD...a&....n..| -peer0.org1.example.com | 00000010 70 0e 73 f4 04 02 19 91 e0 1c 2c e6 c4 ff 31 47 |p.s.......,...1G|" -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [msp.identity] Verify -> DEBU 2e79 Verify: sig = 00000000 30 45 02 21 00 fb 90 45 af cb 50 d2 d7 3d 78 97 |0E.!...E..P..=x.| -peer0.org1.example.com | 00000010 9a c8 f4 a8 7d 97 ab 42 ee 13 57 68 e0 8f 1c 14 |....}..B..Wh....| -peer0.org1.example.com | 00000020 8b 4a 40 23 7d 02 20 4a 7b 01 3b ee aa 08 0a 35 |.J@#}. J{.;....5| -peer0.org1.example.com | 00000030 cc bb 5b ac 12 06 4e f5 3c 7f 61 14 54 54 21 95 |..[...N.<.a.TT!.| -peer0.org1.example.com | 00000040 97 5b 87 d0 d1 b7 ff |.[.....|" -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [msp.identity] Verify -> DEBU 2e7a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [msp.identity] Verify -> DEBU 2e7b Verify: sig = 00000000 30 45 02 21 00 d2 77 3a c4 61 ee aa fc 95 b5 52 |0E.!..w:.a.....R| -peer0.org1.example.com | 00000010 07 5e ba 13 9d b3 35 21 c8 01 73 2c 73 42 18 e1 |.^....5!..s,sB..| -peer0.org1.example.com | 00000020 68 7e 03 6c 49 02 20 5f c6 b5 88 8c a0 1e 79 76 |h~.lI. _......yv| -peer0.org1.example.com | 00000030 c3 f0 d9 2d 8b 44 b6 a9 49 f7 24 7a dc 26 60 fe |...-.D..I.$z.&`.| -peer0.org1.example.com | 00000040 c2 8b 9a 2d e8 8d 8e |...-...|" -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e7c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e7d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e7e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 " -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e7f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 " -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e80 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e81 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e82 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e83 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.406 UTC [msp] DeserializeIdentity -> DEBU 2e84 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [msp] DeserializeIdentity -> DEBU 2e85 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [msp] DeserializeIdentity -> DEBU 2e86 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [gossip.comm] Send -> DEBU 2e87 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [msp] DeserializeIdentity -> DEBU 2e88 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [gossip.comm] Send -> DEBU 2e89 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [gossip.comm] sendToEndpoint -> DEBU 2e8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [gossip.comm] sendToEndpoint -> DEBU 2e8b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [gossip.comm] func1 -> DEBU 2e8c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [gossip.gossip] handleMessage -> DEBU 2e8d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [gossip.gossip] handleMessage -> DEBU 2e8e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e8f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e90 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.407 UTC [gossip.comm] sendToEndpoint -> DEBU 2e91 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.408 UTC [gossip.comm] sendToEndpoint -> DEBU 2e92 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.408 UTC [gossip.comm] func1 -> DEBU 2e93 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.409 UTC [gossip.gossip] handleMessage -> DEBU 2e94 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.409 UTC [gossip.gossip] handleMessage -> DEBU 2e95 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.409 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e96 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.409 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e97 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [gossip.comm] func1 -> DEBU 2e98 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [gossip.gossip] handleMessage -> DEBU 2e99 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [gossip.gossip] handleMessage -> DEBU 2e9a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e9b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e9c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [msp] DeserializeIdentity -> DEBU 2e9d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e9f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ea0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [policies] Evaluate -> DEBU 2ea1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [policies] Evaluate -> DEBU 2ea2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [policies] Evaluate -> DEBU 2ea3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [cauthdsl] func1 -> DEBU 2ea4 0xc00324f680 gate 1556760688473908800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:28.473 UTC [cauthdsl] func2 -> DEBU 2ea5 0xc00324f680 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:28.474 UTC [cauthdsl] func2 -> DEBU 2ea6 0xc00324f680 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:28.474 UTC [cauthdsl] func2 -> DEBU 2ea7 0xc00324f680 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.474 UTC [msp.identity] Verify -> DEBU 2ea8 Verify: digest = 00000000 70 79 b6 b0 93 d2 1d 8d f6 5d 8a 91 9a c8 37 63 |py.......]....7c| -peer0.org1.example.com | 00000010 32 05 ee ad 5c 6e 12 e4 4c 4a 2f d4 e4 cb 52 66 |2...\n..LJ/...Rf|" -peer0.org1.example.com | "2019-05-02 01:31:28.474 UTC [msp.identity] Verify -> DEBU 2ea9 Verify: sig = 00000000 30 45 02 21 00 f1 b5 f5 e8 50 6f 6f c5 41 34 6f |0E.!.....Poo.A4o| -peer0.org1.example.com | 00000010 0e 3c f5 f5 9c 03 62 16 19 39 3c c7 4e 7e dd 2e |.<....b..9<.N~..| -peer0.org1.example.com | 00000020 6f 39 8f ef b8 02 20 14 61 0a 1e 05 9e e8 ee 0b |o9.... .a.......| -peer0.org1.example.com | 00000030 34 82 00 7c 3e f2 99 23 b0 6b 25 c3 27 ce d2 0a |4..|>..#.k%.'...| -peer0.org1.example.com | 00000040 6d a5 f6 0f 80 47 72 |m....Gr|" -peer0.org1.example.com | "2019-05-02 01:31:28.474 UTC [cauthdsl] func2 -> DEBU 2eaa 0xc00324f680 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.474 UTC [cauthdsl] func1 -> DEBU 2eab 0xc00324f680 gate 1556760688473908800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:28.474 UTC [policies] Evaluate -> DEBU 2eac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.475 UTC [policies] Evaluate -> DEBU 2ead == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.475 UTC [policies] Evaluate -> DEBU 2eae Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.475 UTC [policies] Evaluate -> DEBU 2eaf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.475 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eb1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:28.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eb2 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 " -peer0.org1.example.com | "2019-05-02 01:31:28.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eb3 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 " -peer0.org1.example.com | "2019-05-02 01:31:28.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eb4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:28.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eb5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.476 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.476 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2eb7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.483 UTC [gossip.comm] func1 -> DEBU 2eb8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.483 UTC [gossip.gossip] handleMessage -> DEBU 2eb9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.483 UTC [gossip.gossip] handleMessage -> DEBU 2eba Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.483 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ebb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.483 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ebc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.483 UTC [gossip.gossip] handleMessage -> DEBU 2ebd Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.483 UTC [gossip.gossip] handleMessage -> DEBU 2ebe Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.483 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ebf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.485 UTC [msp] DeserializeIdentity -> DEBU 2ec7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.485 UTC [gossip.comm] Send -> DEBU 2ec8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.485 UTC [msp] DeserializeIdentity -> DEBU 2ec9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.485 UTC [gossip.comm] Send -> DEBU 2eca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.485 UTC [gossip.comm] sendToEndpoint -> DEBU 2ecb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.485 UTC [gossip.comm] sendToEndpoint -> DEBU 2ecc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.486 UTC [gossip.comm] sendToEndpoint -> DEBU 2ecd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.486 UTC [gossip.comm] sendToEndpoint -> DEBU 2ece Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.483 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ec0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.696 UTC [msp.identity] Sign -> DEBU 2ecf Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151022 " -peer0.org1.example.com | "2019-05-02 01:31:28.696 UTC [msp.identity] Sign -> DEBU 2ed0 Sign: digest: B1C5B6D779F889C4C5FB60FF7818CDD47F1CCAF34267F3951FACD6EAD0950661 " -peer0.org1.example.com | "2019-05-02 01:31:28.696 UTC [msp.identity] Sign -> DEBU 2ed1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:28.696 UTC [msp.identity] Sign -> DEBU 2ed2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:28.697 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2ed3 Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:28.707 UTC [msp] DeserializeIdentity -> DEBU 2ed4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.707 UTC [msp] DeserializeIdentity -> DEBU 2ed5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.707 UTC [gossip.comm] Send -> DEBU 2ed6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.708 UTC [msp] DeserializeIdentity -> DEBU 2ed7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.708 UTC [gossip.comm] Send -> DEBU 2ed8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.708 UTC [msp] DeserializeIdentity -> DEBU 2ed9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.708 UTC [gossip.comm] Send -> DEBU 2eda Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2edb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2edd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2edc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2ede Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2edf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.787 UTC [msp] DeserializeIdentity -> DEBU 2ee1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.787 UTC [msp] DeserializeIdentity -> DEBU 2ee2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.787 UTC [gossip.comm] Send -> DEBU 2ee3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.791 UTC [gossip.gossip] handleMessage -> DEBU 2eea Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.791 UTC [gossip.comm] func1 -> DEBU 2eeb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.791 UTC [msp.identity] Verify -> DEBU 2eec Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:28.792 UTC [msp.identity] Verify -> DEBU 2eed Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:28.793 UTC [msp.identity] Verify -> DEBU 2eee Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:28.793 UTC [msp.identity] Verify -> DEBU 2eef Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:28.794 UTC [msp] DeserializeIdentity -> DEBU 2ef0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.795 UTC [msp] DeserializeIdentity -> DEBU 2ef1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.795 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ef2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:28.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ef3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ef4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.799 UTC [policies] Evaluate -> DEBU 2ef5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.799 UTC [policies] Evaluate -> DEBU 2ef6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:28.799 UTC [policies] Evaluate -> DEBU 2ef7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.799 UTC [cauthdsl] func1 -> DEBU 2ef8 0xc0041d0060 gate 1556760688799459900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:28.799 UTC [cauthdsl] func2 -> DEBU 2ef9 0xc0041d0060 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:28.799 UTC [cauthdsl] func2 -> DEBU 2efa 0xc0041d0060 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:28.800 UTC [cauthdsl] func2 -> DEBU 2efb 0xc0041d0060 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.800 UTC [msp.identity] Verify -> DEBU 2efc Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:28.800 UTC [msp.identity] Verify -> DEBU 2efd Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:28.800 UTC [cauthdsl] func2 -> DEBU 2efe 0xc0041d0060 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.800 UTC [cauthdsl] func1 -> DEBU 2eff 0xc0041d0060 gate 1556760688799459900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:28.800 UTC [policies] Evaluate -> DEBU 2f00 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.800 UTC [policies] Evaluate -> DEBU 2f01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.800 UTC [policies] Evaluate -> DEBU 2f02 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.803 UTC [policies] Evaluate -> DEBU 2f03 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.803 UTC [msp] DeserializeIdentity -> DEBU 2f04 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.803 UTC [msp] DeserializeIdentity -> DEBU 2f05 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:28.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f07 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f08 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.804 UTC [policies] Evaluate -> DEBU 2f09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.805 UTC [policies] Evaluate -> DEBU 2f0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:28.805 UTC [policies] Evaluate -> DEBU 2f0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.805 UTC [cauthdsl] func1 -> DEBU 2f0c 0xc0041d1830 gate 1556760688805811700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:28.806 UTC [cauthdsl] func2 -> DEBU 2f0d 0xc0041d1830 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:28.806 UTC [cauthdsl] func2 -> DEBU 2f0e 0xc0041d1830 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:28.806 UTC [cauthdsl] func2 -> DEBU 2f0f 0xc0041d1830 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.807 UTC [msp.identity] Verify -> DEBU 2f10 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:28.807 UTC [msp.identity] Verify -> DEBU 2f11 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:28.808 UTC [cauthdsl] func2 -> DEBU 2f12 0xc0041d1830 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.808 UTC [cauthdsl] func1 -> DEBU 2f13 0xc0041d1830 gate 1556760688805811700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:28.809 UTC [policies] Evaluate -> DEBU 2f14 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.809 UTC [policies] Evaluate -> DEBU 2f15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.809 UTC [policies] Evaluate -> DEBU 2f16 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.810 UTC [policies] Evaluate -> DEBU 2f17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.810 UTC [gossip.gossip] handleMessage -> DEBU 2f18 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.811 UTC [gossip.gossip] handleMessage -> DEBU 2f19 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.811 UTC [msp] DeserializeIdentity -> DEBU 2f1a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.811 UTC [msp] DeserializeIdentity -> DEBU 2f1b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.812 UTC [msp] DeserializeIdentity -> DEBU 2f1c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.812 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f1d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:28.813 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f1e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.813 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f1f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.813 UTC [policies] Evaluate -> DEBU 2f20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.813 UTC [policies] Evaluate -> DEBU 2f21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:28.813 UTC [policies] Evaluate -> DEBU 2f22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.814 UTC [cauthdsl] func1 -> DEBU 2f23 0xc004289340 gate 1556760688814025400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:28.814 UTC [cauthdsl] func2 -> DEBU 2f24 0xc004289340 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:28.814 UTC [cauthdsl] func2 -> DEBU 2f25 0xc004289340 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:28.815 UTC [cauthdsl] func2 -> DEBU 2f26 0xc004289340 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.816 UTC [msp.identity] Verify -> DEBU 2f27 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:28.816 UTC [msp.identity] Verify -> DEBU 2f28 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:28.817 UTC [cauthdsl] func2 -> DEBU 2f29 0xc004289340 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.817 UTC [cauthdsl] func1 -> DEBU 2f2a 0xc004289340 gate 1556760688814025400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:28.817 UTC [policies] Evaluate -> DEBU 2f2b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.818 UTC [policies] Evaluate -> DEBU 2f2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.818 UTC [policies] Evaluate -> DEBU 2f2d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.818 UTC [policies] Evaluate -> DEBU 2f2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.819 UTC [msp.identity] Verify -> DEBU 2f2f Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:28.819 UTC [msp.identity] Verify -> DEBU 2f30 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:28.819 UTC [msp.identity] Verify -> DEBU 2f31 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:28.819 UTC [msp.identity] Verify -> DEBU 2f32 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:28.820 UTC [msp] DeserializeIdentity -> DEBU 2f33 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.820 UTC [msp] DeserializeIdentity -> DEBU 2f34 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.821 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f35 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:28.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f36 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f37 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.821 UTC [policies] Evaluate -> DEBU 2f38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.821 UTC [gossip.comm] func1 -> DEBU 2f39 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.821 UTC [policies] Evaluate -> DEBU 2f3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:28.822 UTC [policies] Evaluate -> DEBU 2f3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.822 UTC [cauthdsl] func1 -> DEBU 2f3c 0xc0002b5950 gate 1556760688822228700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:28.822 UTC [cauthdsl] func2 -> DEBU 2f3d 0xc0002b5950 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:28.822 UTC [cauthdsl] func2 -> DEBU 2f3e 0xc0002b5950 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:28.822 UTC [cauthdsl] func2 -> DEBU 2f3f 0xc0002b5950 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.823 UTC [msp.identity] Verify -> DEBU 2f40 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:28.823 UTC [msp.identity] Verify -> DEBU 2f41 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:28.824 UTC [cauthdsl] func2 -> DEBU 2f42 0xc0002b5950 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.824 UTC [cauthdsl] func1 -> DEBU 2f43 0xc0002b5950 gate 1556760688822228700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:28.824 UTC [policies] Evaluate -> DEBU 2f44 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.825 UTC [policies] Evaluate -> DEBU 2f45 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.825 UTC [policies] Evaluate -> DEBU 2f46 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.825 UTC [policies] Evaluate -> DEBU 2f47 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.826 UTC [gossip.gossip] handleMessage -> DEBU 2f48 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.826 UTC [gossip.gossip] handleMessage -> DEBU 2f49 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.826 UTC [gossip.gossip] handleMessage -> DEBU 2f4a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.826 UTC [gossip.gossip] handleMessage -> DEBU 2f4b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.827 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.827 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f4d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:28.827 UTC [msp] DeserializeIdentity -> DEBU 2f4f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f50 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:28.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f51 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.828 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f52 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.828 UTC [policies] Evaluate -> DEBU 2f53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.827 UTC [gossip.comm] func1 -> DEBU 2f4e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.828 UTC [policies] Evaluate -> DEBU 2f54 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:28.828 UTC [policies] Evaluate -> DEBU 2f55 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.828 UTC [cauthdsl] func1 -> DEBU 2f56 0xc002101750 gate 1556760688828809400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:28.828 UTC [cauthdsl] func2 -> DEBU 2f57 0xc002101750 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:28.829 UTC [cauthdsl] func2 -> DEBU 2f58 0xc002101750 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:28.829 UTC [cauthdsl] func2 -> DEBU 2f59 0xc002101750 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.829 UTC [msp.identity] Verify -> DEBU 2f5a Verify: digest = 00000000 35 9d 41 0c b8 45 40 24 0e 3f ce a1 5f 1d 88 c3 |5.A..E@$.?.._...| -peer0.org1.example.com | 00000010 a9 4f d8 2e a2 59 ef 10 4e b9 73 1d ae be 08 6b |.O...Y..N.s....k|" -peer0.org1.example.com | "2019-05-02 01:31:28.829 UTC [msp.identity] Verify -> DEBU 2f5b Verify: sig = 00000000 30 44 02 20 30 43 d1 53 84 58 15 99 84 cc f6 4f |0D. 0C.S.X.....O| -peer0.org1.example.com | 00000010 a6 ac e7 50 22 61 3d 1b fc 58 5b be df 9c 95 da |...P"a=..X[.....| -peer0.org1.example.com | 00000020 26 cb 0f 06 02 20 45 18 ed 08 a7 7a 2a 8b ea 10 |&.... E....z*...| -peer0.org1.example.com | 00000030 98 e2 3a 7c 05 33 37 aa 90 9d 0d 69 f2 b7 27 57 |..:|.37....i..'W| -peer0.org1.example.com | 00000040 c1 bc 90 6b 13 61 |...k.a|" -peer0.org1.example.com | "2019-05-02 01:31:28.829 UTC [cauthdsl] func2 -> DEBU 2f5c 0xc002101750 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.829 UTC [cauthdsl] func1 -> DEBU 2f5d 0xc002101750 gate 1556760688828809400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:28.830 UTC [policies] Evaluate -> DEBU 2f5e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.830 UTC [policies] Evaluate -> DEBU 2f5f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.831 UTC [policies] Evaluate -> DEBU 2f60 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.831 UTC [policies] Evaluate -> DEBU 2f61 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.831 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f62 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.832 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f63 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:28.832 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f64 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 " -peer0.org1.example.com | "2019-05-02 01:31:28.833 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f65 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 " -peer0.org1.example.com | "2019-05-02 01:31:28.833 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f66 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:28.833 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f67 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.834 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f68 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.834 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f69 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.834 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.834 UTC [gossip.gossip] handleMessage -> DEBU 2f6b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [gossip.gossip] handleMessage -> DEBU 2f6d Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [msp] DeserializeIdentity -> DEBU 2f6e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [msp] DeserializeIdentity -> DEBU 2f6f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [msp] DeserializeIdentity -> DEBU 2f70 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f71 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f72 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f73 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [policies] Evaluate -> DEBU 2f74 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [policies] Evaluate -> DEBU 2f75 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [policies] Evaluate -> DEBU 2f76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [cauthdsl] func1 -> DEBU 2f77 0xc002c5c230 gate 1556760688835741800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [cauthdsl] func2 -> DEBU 2f78 0xc002c5c230 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [cauthdsl] func2 -> DEBU 2f79 0xc002c5c230 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [cauthdsl] func2 -> DEBU 2f7a 0xc002c5c230 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [msp.identity] Verify -> DEBU 2f7b Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:28.835 UTC [msp.identity] Verify -> DEBU 2f7c Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:28.836 UTC [cauthdsl] func2 -> DEBU 2f7d 0xc002c5c230 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.836 UTC [cauthdsl] func1 -> DEBU 2f7e 0xc002c5c230 gate 1556760688835741800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:28.836 UTC [policies] Evaluate -> DEBU 2f7f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.836 UTC [policies] Evaluate -> DEBU 2f80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.836 UTC [policies] Evaluate -> DEBU 2f81 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.836 UTC [policies] Evaluate -> DEBU 2f82 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.836 UTC [msp.identity] Verify -> DEBU 2f83 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:28.836 UTC [msp.identity] Verify -> DEBU 2f84 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:28.839 UTC [msp.identity] Verify -> DEBU 2f85 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:28.839 UTC [msp.identity] Verify -> DEBU 2f86 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:28.854 UTC [msp] DeserializeIdentity -> DEBU 2f87 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.854 UTC [msp] DeserializeIdentity -> DEBU 2f88 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.854 UTC [msp] DeserializeIdentity -> DEBU 2f89 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.854 UTC [msp] DeserializeIdentity -> DEBU 2f8a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.854 UTC [msp] DeserializeIdentity -> DEBU 2f8b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.855 UTC [msp] DeserializeIdentity -> DEBU 2f8c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.855 UTC [msp] DeserializeIdentity -> DEBU 2f8d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.855 UTC [gossip.comm] Send -> DEBU 2f8e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.855 UTC [msp] DeserializeIdentity -> DEBU 2f8f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.855 UTC [msp] DeserializeIdentity -> DEBU 2f90 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.855 UTC [gossip.comm] Send -> DEBU 2f91 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.834 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.856 UTC [gossip.comm] func1 -> DEBU 2f92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.840 UTC [msp] DeserializeIdentity -> DEBU 2f93 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.857 UTC [msp] DeserializeIdentity -> DEBU 2f94 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.862 UTC [gossip.comm] sendToEndpoint -> DEBU 2f95 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.862 UTC [gossip.comm] sendToEndpoint -> DEBU 2f96 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.864 UTC [gossip.comm] sendToEndpoint -> DEBU 2f97 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.864 UTC [gossip.comm] sendToEndpoint -> DEBU 2f98 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.861 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f99 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:28.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f9a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f9b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:28.867 UTC [policies] Evaluate -> DEBU 2f9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.867 UTC [policies] Evaluate -> DEBU 2f9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:28.867 UTC [policies] Evaluate -> DEBU 2f9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:28.867 UTC [cauthdsl] func1 -> DEBU 2f9f 0xc00315e6a0 gate 1556760688867888900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:28.867 UTC [cauthdsl] func2 -> DEBU 2fa0 0xc00315e6a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:28.868 UTC [cauthdsl] func2 -> DEBU 2fa1 0xc00315e6a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:28.868 UTC [cauthdsl] func2 -> DEBU 2fa2 0xc00315e6a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.868 UTC [msp.identity] Verify -> DEBU 2fa3 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:28.868 UTC [msp.identity] Verify -> DEBU 2fa4 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:28.868 UTC [cauthdsl] func2 -> DEBU 2fa5 0xc00315e6a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:28.868 UTC [cauthdsl] func1 -> DEBU 2fa6 0xc00315e6a0 gate 1556760688867888900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:28.868 UTC [policies] Evaluate -> DEBU 2fa7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.869 UTC [policies] Evaluate -> DEBU 2fa8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.869 UTC [policies] Evaluate -> DEBU 2fa9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.869 UTC [policies] Evaluate -> DEBU 2faa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:28.869 UTC [gossip.gossip] handleMessage -> DEBU 2fab Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.871 UTC [gossip.gossip] handleMessage -> DEBU 2fac Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.871 UTC [gossip.gossip] handleMessage -> DEBU 2fad Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2faf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.910 UTC [msp] DeserializeIdentity -> DEBU 2fb0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.911 UTC [msp] DeserializeIdentity -> DEBU 2fb1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.911 UTC [gossip.pull] Hello -> DEBU 2fb2 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:28.911 UTC [msp] DeserializeIdentity -> DEBU 2fb3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.911 UTC [msp] DeserializeIdentity -> DEBU 2fb4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:28.911 UTC [gossip.comm] Send -> DEBU 2fb5 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:28.911 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.912 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:28.919 UTC [gossip.gossip] handleMessage -> DEBU 2fb8 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13619195538211538949 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.919 UTC [gossip.pull] HandleMessage -> DEBU 2fb9 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13619195538211538949 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:28.919 UTC [gossip.gossip] handleMessage -> DEBU 2fba Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.054 UTC [gossip.gossip] handleMessage -> DEBU 2fbb Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.055 UTC [msp] DeserializeIdentity -> DEBU 2fbc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.055 UTC [msp] DeserializeIdentity -> DEBU 2fbd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.056 UTC [gossip.gossip] handleMessage -> DEBU 2fbe Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.087 UTC [gossip.gossip] handleMessage -> DEBU 2fbf Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.092 UTC [gossip.pull] HandleMessage -> DEBU 2fc0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.092 UTC [gossip.pull] SendDigest -> DEBU 2fc1 Sending BLOCK_MSG digest: [3 4 5 6 7 8 1 2] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:29.093 UTC [gossip.gossip] handleMessage -> DEBU 2fc2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.287 UTC [gossip.comm] func1 -> DEBU 2fc3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.287 UTC [gossip.gossip] handleMessage -> DEBU 2fc4 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.287 UTC [msp] DeserializeIdentity -> DEBU 2fc5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.287 UTC [msp] DeserializeIdentity -> DEBU 2fc6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.288 UTC [msp] DeserializeIdentity -> DEBU 2fc7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.289 UTC [gossip.gossip] handleMessage -> DEBU 2fc8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.396 UTC [gossip.gossip] handleMessage -> DEBU 2fc9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.396 UTC [gossip.pull] HandleMessage -> DEBU 2fca GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.396 UTC [gossip.pull] SendDigest -> DEBU 2fcb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:29.398 UTC [gossip.gossip] handleMessage -> DEBU 2fcc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.412 UTC [gossip.gossip] handleMessage -> DEBU 2fcd Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.412 UTC [gossip.gossip] handleMessage -> DEBU 2fce Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.412 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.412 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fd0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:29.413 UTC [msp.identity] Verify -> DEBU 2fd1 Verify: digest = 00000000 c0 4b 1c fb 23 85 f5 10 2f 2d 51 21 8c e6 78 10 |.K..#.../-Q!..x.| -peer0.org1.example.com | 00000010 92 c9 a9 dd be 61 e3 bf 8c eb f5 c5 ef 9b b2 2e |.....a..........|" -peer0.org1.example.com | "2019-05-02 01:31:29.413 UTC [msp.identity] Verify -> DEBU 2fd2 Verify: sig = 00000000 30 45 02 21 00 fc 84 b7 78 2c fc dd 1f 45 fb 3f |0E.!....x,...E.?| -peer0.org1.example.com | 00000010 59 4e 1c cc 60 7f dc f9 d0 98 03 c1 1d 34 d3 6e |YN..`........4.n| -peer0.org1.example.com | 00000020 92 41 6c 64 64 02 20 20 75 18 f3 b4 a7 03 91 e3 |.Aldd. u.......| -peer0.org1.example.com | 00000030 ed dd 58 67 68 a3 80 0c 73 3a 79 ad 0f fb dd c8 |..Xgh...s:y.....| -peer0.org1.example.com | 00000040 3c 32 2e 79 fc 64 cd |<2.y.d.|" -peer0.org1.example.com | "2019-05-02 01:31:29.414 UTC [msp.identity] Verify -> DEBU 2fd3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:29.415 UTC [msp.identity] Verify -> DEBU 2fd4 Verify: sig = 00000000 30 44 02 20 7b 07 e8 d0 cd 9e f3 d5 e5 a6 f5 4e |0D. {..........N| -peer0.org1.example.com | 00000010 6b 21 67 05 5a 2a b3 b5 44 24 c4 50 76 5b c8 6b |k!g.Z*..D$.Pv[.k| -peer0.org1.example.com | 00000020 b0 5b 0a 49 02 20 60 45 1e b9 71 ab 93 71 19 ce |.[.I. `E..q..q..| -peer0.org1.example.com | 00000030 da 07 a9 8e b1 d6 20 8b 44 6f c4 57 ee 06 83 a0 |...... .Do.W....| -peer0.org1.example.com | 00000040 10 45 10 7e d2 44 |.E.~.D|" -peer0.org1.example.com | "2019-05-02 01:31:29.415 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fd5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.416 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fd6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:29.416 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fd7 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 " -peer0.org1.example.com | "2019-05-02 01:31:29.416 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fd8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 " -peer0.org1.example.com | "2019-05-02 01:31:29.417 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fd9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:29.417 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fda Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.421 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fdb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.421 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fdc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.421 UTC [gossip.discovery] sendMemResponse -> DEBU 2fdd Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:29.421 UTC [msp] DeserializeIdentity -> DEBU 2fde Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.427 UTC [msp] DeserializeIdentity -> DEBU 2fdf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.428 UTC [gossip.comm] Send -> DEBU 2fe0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:29.428 UTC [gossip.discovery] sendMemResponse -> DEBU 2fe1 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:29.428 UTC [gossip.comm] sendToEndpoint -> DEBU 2fe2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.429 UTC [gossip.comm] sendToEndpoint -> DEBU 2fe3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.482 UTC [gossip.comm] func1 -> DEBU 2fe4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.482 UTC [gossip.gossip] handleMessage -> DEBU 2fe5 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.482 UTC [gossip.pull] HandleMessage -> DEBU 2fe6 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.482 UTC [msp] DeserializeIdentity -> DEBU 2fe7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.482 UTC [msp] DeserializeIdentity -> DEBU 2fe8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.482 UTC [msp] DeserializeIdentity -> DEBU 2fe9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.482 UTC [msp] DeserializeIdentity -> DEBU 2fea Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.482 UTC [msp] DeserializeIdentity -> DEBU 2feb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.483 UTC [msp] DeserializeIdentity -> DEBU 2fec Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.483 UTC [gossip.pull] SendDigest -> DEBU 2fed Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:29.483 UTC [gossip.gossip] handleMessage -> DEBU 2fee Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [gossip.comm] func1 -> DEBU 2fef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [gossip.gossip] handleMessage -> DEBU 2ff0 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [gossip.gossip] handleMessage -> DEBU 2ff1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ff2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ff3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [msp] DeserializeIdentity -> DEBU 2ff4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ff5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ff6 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ff7 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [policies] Evaluate -> DEBU 2ff8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [policies] Evaluate -> DEBU 2ff9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [policies] Evaluate -> DEBU 2ffa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [cauthdsl] func1 -> DEBU 2ffb 0xc003dbc840 gate 1556760689522769700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [cauthdsl] func2 -> DEBU 2ffc 0xc003dbc840 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [cauthdsl] func2 -> DEBU 2ffd 0xc003dbc840 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [cauthdsl] func2 -> DEBU 2ffe 0xc003dbc840 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [msp.identity] Verify -> DEBU 2fff Verify: digest = 00000000 78 51 d8 3a 1e 30 1a cb 8b 90 7e a0 58 6f 3d 19 |xQ.:.0....~.Xo=.| -peer0.org1.example.com | 00000010 b2 ea 9f 8c 37 eb 6d ad dd 6e 0e 41 a0 04 1b 9c |....7.m..n.A....|" -peer0.org1.example.com | "2019-05-02 01:31:29.522 UTC [msp.identity] Verify -> DEBU 3000 Verify: sig = 00000000 30 45 02 21 00 bf 26 74 e0 a7 c5 18 d5 50 9c 79 |0E.!..&t.....P.y| -peer0.org1.example.com | 00000010 1f e0 0a 78 7a e7 6c 42 52 66 2e f8 d6 95 f1 e1 |...xz.lBRf......| -peer0.org1.example.com | 00000020 a0 90 fc 56 67 02 20 01 82 a9 5c 1f 55 e2 5a 59 |...Vg. ...\.U.ZY| -peer0.org1.example.com | 00000030 73 03 74 06 ab 3f ae 34 b1 7e 5e 5d c6 22 ee eb |s.t..?.4.~^]."..| -peer0.org1.example.com | 00000040 73 79 71 e4 22 0e 8d |syq."..|" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [cauthdsl] func2 -> DEBU 3001 0xc003dbc840 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [cauthdsl] func1 -> DEBU 3002 0xc003dbc840 gate 1556760689522769700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [policies] Evaluate -> DEBU 3003 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [policies] Evaluate -> DEBU 3004 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [policies] Evaluate -> DEBU 3005 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [policies] Evaluate -> DEBU 3006 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [gossip.discovery] handleAliveMessage -> DEBU 3007 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 3008 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 3009 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 " -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 300a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 " -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 300b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 300c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [gossip.discovery] handleAliveMessage -> DEBU 300d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.523 UTC [gossip.discovery] handleMsgFromComm -> DEBU 300e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.524 UTC [gossip.discovery] sendMemResponse -> DEBU 300f Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:29.524 UTC [msp] DeserializeIdentity -> DEBU 3010 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.524 UTC [msp] DeserializeIdentity -> DEBU 3011 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.526 UTC [msp] DeserializeIdentity -> DEBU 3012 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.536 UTC [gossip.comm] Send -> DEBU 3013 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:29.536 UTC [gossip.discovery] sendMemResponse -> DEBU 3014 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:29.536 UTC [gossip.comm] sendToEndpoint -> DEBU 3015 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.536 UTC [gossip.comm] sendToEndpoint -> DEBU 3016 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.538 UTC [gossip.comm] func1 -> DEBU 3017 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.538 UTC [gossip.gossip] handleMessage -> DEBU 3018 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.538 UTC [msp] DeserializeIdentity -> DEBU 3019 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.538 UTC [msp] DeserializeIdentity -> DEBU 301a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.539 UTC [msp] DeserializeIdentity -> DEBU 301b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.539 UTC [gossip.gossip] handleMessage -> DEBU 301c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.708 UTC [gossip.comm] func1 -> DEBU 301d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.709 UTC [gossip.gossip] handleMessage -> DEBU 301e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.711 UTC [gossip.pull] HandleMessage -> DEBU 301f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.712 UTC [msp] DeserializeIdentity -> DEBU 3020 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.712 UTC [msp] DeserializeIdentity -> DEBU 3021 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.713 UTC [msp] DeserializeIdentity -> DEBU 3022 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.714 UTC [msp] DeserializeIdentity -> DEBU 3023 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.715 UTC [msp] DeserializeIdentity -> DEBU 3024 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.715 UTC [msp] DeserializeIdentity -> DEBU 3025 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.716 UTC [gossip.pull] SendDigest -> DEBU 3026 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:29.716 UTC [gossip.gossip] handleMessage -> DEBU 3027 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.803 UTC [gossip.pull] Hello -> DEBU 3028 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:29.804 UTC [gossip.comm] Send -> DEBU 3029 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:29.804 UTC [gossip.pull] Hello -> DEBU 302a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:29.804 UTC [gossip.comm] Send -> DEBU 302b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:29.805 UTC [gossip.pull] Hello -> DEBU 302c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:29.805 UTC [gossip.comm] Send -> DEBU 302d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:29.807 UTC [gossip.comm] sendToEndpoint -> DEBU 302e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.807 UTC [gossip.comm] sendToEndpoint -> DEBU 302f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.811 UTC [gossip.comm] sendToEndpoint -> DEBU 3030 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.811 UTC [gossip.comm] sendToEndpoint -> DEBU 3031 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.813 UTC [gossip.comm] sendToEndpoint -> DEBU 3032 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.813 UTC [gossip.comm] sendToEndpoint -> DEBU 3033 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.817 UTC [gossip.comm] func1 -> DEBU 3034 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10806421602508115866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.817 UTC [gossip.gossip] handleMessage -> DEBU 3035 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13759576198104303997 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.818 UTC [gossip.pull] HandleMessage -> DEBU 3036 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13759576198104303997 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.818 UTC [gossip.gossip] handleMessage -> DEBU 3037 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.818 UTC [gossip.gossip] handleMessage -> DEBU 3038 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10806421602508115866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.819 UTC [gossip.pull] HandleMessage -> DEBU 3039 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10806421602508115866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.822 UTC [gossip.gossip] handleMessage -> DEBU 303a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.824 UTC [gossip.comm] func1 -> DEBU 303b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17858937335778240002 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.824 UTC [gossip.gossip] handleMessage -> DEBU 303c Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17858937335778240002 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.824 UTC [gossip.pull] HandleMessage -> DEBU 303d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17858937335778240002 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.825 UTC [gossip.gossip] handleMessage -> DEBU 303e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.870 UTC [gossip.comm] func1 -> DEBU 303f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.870 UTC [gossip.gossip] handleMessage -> DEBU 3040 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.871 UTC [gossip.gossip] handleMessage -> DEBU 3041 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3042 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.871 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3043 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:29.872 UTC [msp] DeserializeIdentity -> DEBU 3044 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.873 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3045 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:29.873 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3046 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:29.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3047 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:29.874 UTC [policies] Evaluate -> DEBU 3048 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:29.874 UTC [policies] Evaluate -> DEBU 3049 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:29.874 UTC [policies] Evaluate -> DEBU 304a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:29.874 UTC [cauthdsl] func1 -> DEBU 304b 0xc0031c6d40 gate 1556760689874831600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:29.874 UTC [cauthdsl] func2 -> DEBU 304c 0xc0031c6d40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:29.875 UTC [cauthdsl] func2 -> DEBU 304d 0xc0031c6d40 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:29.875 UTC [cauthdsl] func2 -> DEBU 304e 0xc0031c6d40 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:29.875 UTC [msp.identity] Verify -> DEBU 304f Verify: digest = 00000000 01 24 f0 60 c8 80 ba 3e f2 96 ea 53 e3 77 57 11 |.$.`...>...S.wW.| -peer0.org1.example.com | 00000010 c6 77 c0 14 ba 7f 2c e7 fc da 9a ac 30 a3 ed e5 |.w....,.....0...|" -peer0.org1.example.com | "2019-05-02 01:31:29.875 UTC [msp.identity] Verify -> DEBU 3050 Verify: sig = 00000000 30 45 02 21 00 ec 13 3e 3f e2 4c 73 52 66 95 35 |0E.!...>?.LsRf.5| -peer0.org1.example.com | 00000010 fe 9c d4 6c 06 49 15 5d 8a 8b 37 46 8e c9 e9 aa |...l.I.]..7F....| -peer0.org1.example.com | 00000020 b8 dd 3d 3f 7f 02 20 45 f0 24 0a bd 29 3b db 53 |..=?.. E.$..);.S| -peer0.org1.example.com | 00000030 4d 54 09 4a 78 85 dd f3 87 be 40 a1 b3 61 64 ea |MT.Jx.....@..ad.| -peer0.org1.example.com | 00000040 f3 71 d1 f2 5d b5 df |.q..]..|" -peer0.org1.example.com | "2019-05-02 01:31:29.875 UTC [cauthdsl] func2 -> DEBU 3051 0xc0031c6d40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:29.876 UTC [cauthdsl] func1 -> DEBU 3052 0xc0031c6d40 gate 1556760689874831600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:29.876 UTC [policies] Evaluate -> DEBU 3053 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:29.876 UTC [policies] Evaluate -> DEBU 3054 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:29.876 UTC [policies] Evaluate -> DEBU 3055 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:29.876 UTC [policies] Evaluate -> DEBU 3056 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:29.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 3057 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 3058 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:29.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 3059 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 " -peer0.org1.example.com | "2019-05-02 01:31:29.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 305a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 " -peer0.org1.example.com | "2019-05-02 01:31:29.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 305b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:29.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 305c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 305d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.877 UTC [gossip.discovery] handleMsgFromComm -> DEBU 305e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:29.877 UTC [gossip.discovery] sendMemResponse -> DEBU 305f Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:29.878 UTC [msp] DeserializeIdentity -> DEBU 3060 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.878 UTC [msp] DeserializeIdentity -> DEBU 3061 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.878 UTC [msp] DeserializeIdentity -> DEBU 3062 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:29.878 UTC [gossip.comm] Send -> DEBU 3063 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:29.878 UTC [gossip.discovery] sendMemResponse -> DEBU 3064 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:29.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3065 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:29.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3066 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.147 UTC [msp.identity] Sign -> DEBU 3067 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151023 " -peer0.org1.example.com | "2019-05-02 01:31:30.147 UTC [msp.identity] Sign -> DEBU 3068 Sign: digest: B7F2303B55FBF805F25A8369888F5E2ECAAA585A790C2086EE59906B9E679C70 " -peer0.org1.example.com | "2019-05-02 01:31:30.147 UTC [msp.identity] Sign -> DEBU 3069 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:30.148 UTC [msp.identity] Sign -> DEBU 306a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:30.148 UTC [gossip.comm] Send -> DEBU 306b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:30.148 UTC [msp] DeserializeIdentity -> DEBU 306c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:30.148 UTC [gossip.comm] Send -> DEBU 306d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:30.149 UTC [gossip.comm] sendToEndpoint -> DEBU 306e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.149 UTC [msp] DeserializeIdentity -> DEBU 306f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:30.149 UTC [gossip.comm] sendToEndpoint -> DEBU 3070 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.149 UTC [gossip.comm] Send -> DEBU 3071 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:30.150 UTC [gossip.comm] sendToEndpoint -> DEBU 3072 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.150 UTC [gossip.comm] sendToEndpoint -> DEBU 3073 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3074 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3075 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.156 UTC [gossip.comm] func1 -> DEBU 3076 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.156 UTC [gossip.gossip] handleMessage -> DEBU 3077 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.156 UTC [gossip.gossip] handleMessage -> DEBU 3078 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.156 UTC [gossip.gossip] handleMessage -> DEBU 3079 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 307a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.157 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 307b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:30.158 UTC [msp.identity] Verify -> DEBU 307c Verify: digest = 00000000 b7 f2 30 3b 55 fb f8 05 f2 5a 83 69 88 8f 5e 2e |..0;U....Z.i..^.| -peer0.org1.example.com | 00000010 ca aa 58 5a 79 0c 20 86 ee 59 90 6b 9e 67 9c 70 |..XZy. ..Y.k.g.p|" -peer0.org1.example.com | "2019-05-02 01:31:30.158 UTC [msp.identity] Verify -> DEBU 307d Verify: sig = 00000000 30 45 02 21 00 ac f4 43 76 3e 8a 65 77 ac 30 12 |0E.!...Cv>.ew.0.| -peer0.org1.example.com | 00000010 89 48 66 36 51 b5 3b 32 56 6f 26 cb 41 34 03 a2 |.Hf6Q.;2Vo&.A4..| -peer0.org1.example.com | 00000020 f2 9a bd 85 88 02 20 11 67 c1 ff 1f 6d 7f f7 05 |...... .g...m...| -peer0.org1.example.com | 00000030 49 92 50 a6 25 3c b1 43 4f 28 80 0b 24 00 21 03 |I.P.%<.CO(..$.!.| -peer0.org1.example.com | 00000040 0e 44 fd 62 f8 52 5c |.D.b.R\|" -peer0.org1.example.com | "2019-05-02 01:31:30.159 UTC [msp.identity] Verify -> DEBU 307e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:30.159 UTC [msp.identity] Verify -> DEBU 307f Verify: sig = 00000000 30 45 02 21 00 cd 83 bd 8c 67 31 ed b0 a3 59 fe |0E.!.....g1...Y.| -peer0.org1.example.com | 00000010 d2 26 c4 ef 86 03 f0 48 f4 ad 0e 96 a8 23 15 ce |.&.....H.....#..| -peer0.org1.example.com | 00000020 97 38 3c 20 d0 02 20 29 0c da c7 f9 3d c1 3a a7 |.8< .. )....=.:.| -peer0.org1.example.com | 00000030 11 3a 97 e3 24 b1 c2 48 6a 07 ba 41 48 57 c0 f2 |.:..$..Hj..AHW..| -peer0.org1.example.com | 00000040 7e 36 3b 37 ad b6 49 |~6;7..I|" -peer0.org1.example.com | "2019-05-02 01:31:30.159 UTC [gossip.discovery] handleAliveMessage -> DEBU 3080 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.162 UTC [gossip.discovery] isSentByMe -> DEBU 3081 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 3082 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.163 UTC [gossip.comm] func1 -> DEBU 3083 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3084 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3085 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.163 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3086 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:30.164 UTC [gossip.gossip] handleMessage -> DEBU 3087 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.164 UTC [gossip.gossip] handleMessage -> DEBU 3088 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.164 UTC [msp.identity] Verify -> DEBU 3089 Verify: digest = 00000000 b7 f2 30 3b 55 fb f8 05 f2 5a 83 69 88 8f 5e 2e |..0;U....Z.i..^.| -peer0.org1.example.com | 00000010 ca aa 58 5a 79 0c 20 86 ee 59 90 6b 9e 67 9c 70 |..XZy. ..Y.k.g.p|" -peer0.org1.example.com | "2019-05-02 01:31:30.164 UTC [msp.identity] Verify -> DEBU 308a Verify: sig = 00000000 30 45 02 21 00 ac f4 43 76 3e 8a 65 77 ac 30 12 |0E.!...Cv>.ew.0.| -peer0.org1.example.com | 00000010 89 48 66 36 51 b5 3b 32 56 6f 26 cb 41 34 03 a2 |.Hf6Q.;2Vo&.A4..| -peer0.org1.example.com | 00000020 f2 9a bd 85 88 02 20 11 67 c1 ff 1f 6d 7f f7 05 |...... .g...m...| -peer0.org1.example.com | 00000030 49 92 50 a6 25 3c b1 43 4f 28 80 0b 24 00 21 03 |I.P.%<.CO(..$.!.| -peer0.org1.example.com | 00000040 0e 44 fd 62 f8 52 5c |.D.b.R\|" -peer0.org1.example.com | "2019-05-02 01:31:30.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 308b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.166 UTC [gossip.discovery] isSentByMe -> DEBU 308c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 308d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 308e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:30.167 UTC [msp.identity] Verify -> DEBU 308f Verify: digest = 00000000 c0 4b 1c fb 23 85 f5 10 2f 2d 51 21 8c e6 78 10 |.K..#.../-Q!..x.| -peer0.org1.example.com | 00000010 92 c9 a9 dd be 61 e3 bf 8c eb f5 c5 ef 9b b2 2e |.....a..........|" -peer0.org1.example.com | "2019-05-02 01:31:30.167 UTC [msp.identity] Verify -> DEBU 3090 Verify: sig = 00000000 30 45 02 21 00 fc 84 b7 78 2c fc dd 1f 45 fb 3f |0E.!....x,...E.?| -peer0.org1.example.com | 00000010 59 4e 1c cc 60 7f dc f9 d0 98 03 c1 1d 34 d3 6e |YN..`........4.n| -peer0.org1.example.com | 00000020 92 41 6c 64 64 02 20 20 75 18 f3 b4 a7 03 91 e3 |.Aldd. u.......| -peer0.org1.example.com | 00000030 ed dd 58 67 68 a3 80 0c 73 3a 79 ad 0f fb dd c8 |..Xgh...s:y.....| -peer0.org1.example.com | 00000040 3c 32 2e 79 fc 64 cd |<2.y.d.|" -peer0.org1.example.com | "2019-05-02 01:31:30.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 3091 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 3092 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3093 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:30.168 UTC [msp] DeserializeIdentity -> DEBU 3094 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:30.168 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3095 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:30.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3096 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:30.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3097 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:30.168 UTC [policies] Evaluate -> DEBU 3098 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:30.169 UTC [policies] Evaluate -> DEBU 3099 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:30.169 UTC [policies] Evaluate -> DEBU 309a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:30.169 UTC [cauthdsl] func1 -> DEBU 309b 0xc002240370 gate 1556760690169397300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:30.169 UTC [cauthdsl] func2 -> DEBU 309c 0xc002240370 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:30.169 UTC [cauthdsl] func2 -> DEBU 309d 0xc002240370 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:30.170 UTC [cauthdsl] func2 -> DEBU 309e 0xc002240370 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:30.170 UTC [msp.identity] Verify -> DEBU 309f Verify: digest = 00000000 01 24 f0 60 c8 80 ba 3e f2 96 ea 53 e3 77 57 11 |.$.`...>...S.wW.| -peer0.org1.example.com | 00000010 c6 77 c0 14 ba 7f 2c e7 fc da 9a ac 30 a3 ed e5 |.w....,.....0...|" -peer0.org1.example.com | "2019-05-02 01:31:30.170 UTC [msp.identity] Verify -> DEBU 30a0 Verify: sig = 00000000 30 45 02 21 00 ec 13 3e 3f e2 4c 73 52 66 95 35 |0E.!...>?.LsRf.5| -peer0.org1.example.com | 00000010 fe 9c d4 6c 06 49 15 5d 8a 8b 37 46 8e c9 e9 aa |...l.I.]..7F....| -peer0.org1.example.com | 00000020 b8 dd 3d 3f 7f 02 20 45 f0 24 0a bd 29 3b db 53 |..=?.. E.$..);.S| -peer0.org1.example.com | 00000030 4d 54 09 4a 78 85 dd f3 87 be 40 a1 b3 61 64 ea |MT.Jx.....@..ad.| -peer0.org1.example.com | 00000040 f3 71 d1 f2 5d b5 df |.q..]..|" -peer0.org1.example.com | "2019-05-02 01:31:30.171 UTC [cauthdsl] func2 -> DEBU 30a1 0xc002240370 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:30.171 UTC [cauthdsl] func1 -> DEBU 30a2 0xc002240370 gate 1556760690169397300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:30.171 UTC [policies] Evaluate -> DEBU 30a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:30.171 UTC [policies] Evaluate -> DEBU 30a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:30.171 UTC [policies] Evaluate -> DEBU 30a5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:30.171 UTC [policies] Evaluate -> DEBU 30a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:30.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 30a7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 30a8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30a9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.173 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30ac Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:30.173 UTC [gossip.gossip] handleMessage -> DEBU 30ab Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.173 UTC [msp.identity] Verify -> DEBU 30ad Verify: digest = 00000000 c0 4b 1c fb 23 85 f5 10 2f 2d 51 21 8c e6 78 10 |.K..#.../-Q!..x.| -peer0.org1.example.com | 00000010 92 c9 a9 dd be 61 e3 bf 8c eb f5 c5 ef 9b b2 2e |.....a..........|" -peer0.org1.example.com | "2019-05-02 01:31:30.174 UTC [msp.identity] Verify -> DEBU 30ae Verify: sig = 00000000 30 45 02 21 00 fc 84 b7 78 2c fc dd 1f 45 fb 3f |0E.!....x,...E.?| -peer0.org1.example.com | 00000010 59 4e 1c cc 60 7f dc f9 d0 98 03 c1 1d 34 d3 6e |YN..`........4.n| -peer0.org1.example.com | 00000020 92 41 6c 64 64 02 20 20 75 18 f3 b4 a7 03 91 e3 |.Aldd. u.......| -peer0.org1.example.com | 00000030 ed dd 58 67 68 a3 80 0c 73 3a 79 ad 0f fb dd c8 |..Xgh...s:y.....| -peer0.org1.example.com | 00000040 3c 32 2e 79 fc 64 cd |<2.y.d.|" -peer0.org1.example.com | "2019-05-02 01:31:30.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 30af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 30b0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30b1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:30.175 UTC [msp] DeserializeIdentity -> DEBU 30b2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:30.175 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30b3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:30.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30b4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:30.177 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30b5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:30.177 UTC [policies] Evaluate -> DEBU 30b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:30.177 UTC [policies] Evaluate -> DEBU 30b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:30.178 UTC [policies] Evaluate -> DEBU 30b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:30.178 UTC [cauthdsl] func1 -> DEBU 30b9 0xc0022d8a50 gate 1556760690178323800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:30.178 UTC [cauthdsl] func2 -> DEBU 30ba 0xc0022d8a50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:30.179 UTC [cauthdsl] func2 -> DEBU 30bb 0xc0022d8a50 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:30.179 UTC [cauthdsl] func2 -> DEBU 30bc 0xc0022d8a50 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:30.179 UTC [msp.identity] Verify -> DEBU 30bd Verify: digest = 00000000 78 51 d8 3a 1e 30 1a cb 8b 90 7e a0 58 6f 3d 19 |xQ.:.0....~.Xo=.| -peer0.org1.example.com | 00000010 b2 ea 9f 8c 37 eb 6d ad dd 6e 0e 41 a0 04 1b 9c |....7.m..n.A....|" -peer0.org1.example.com | "2019-05-02 01:31:30.179 UTC [msp.identity] Verify -> DEBU 30be Verify: sig = 00000000 30 45 02 21 00 bf 26 74 e0 a7 c5 18 d5 50 9c 79 |0E.!..&t.....P.y| -peer0.org1.example.com | 00000010 1f e0 0a 78 7a e7 6c 42 52 66 2e f8 d6 95 f1 e1 |...xz.lBRf......| -peer0.org1.example.com | 00000020 a0 90 fc 56 67 02 20 01 82 a9 5c 1f 55 e2 5a 59 |...Vg. ...\.U.ZY| -peer0.org1.example.com | 00000030 73 03 74 06 ab 3f ae 34 b1 7e 5e 5d c6 22 ee eb |s.t..?.4.~^]."..| -peer0.org1.example.com | 00000040 73 79 71 e4 22 0e 8d |syq."..|" -peer0.org1.example.com | "2019-05-02 01:31:30.180 UTC [cauthdsl] func2 -> DEBU 30bf 0xc0022d8a50 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:30.180 UTC [cauthdsl] func1 -> DEBU 30c0 0xc0022d8a50 gate 1556760690178323800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:30.180 UTC [policies] Evaluate -> DEBU 30c1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:30.181 UTC [policies] Evaluate -> DEBU 30c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:30.181 UTC [policies] Evaluate -> DEBU 30c3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:30.182 UTC [policies] Evaluate -> DEBU 30c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:30.182 UTC [gossip.discovery] handleAliveMessage -> DEBU 30c5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.182 UTC [gossip.discovery] handleAliveMessage -> DEBU 30c6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.182 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30c7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:30.183 UTC [msp.identity] Verify -> DEBU 30c8 Verify: digest = 00000000 b7 f2 30 3b 55 fb f8 05 f2 5a 83 69 88 8f 5e 2e |..0;U....Z.i..^.| -peer0.org1.example.com | 00000010 ca aa 58 5a 79 0c 20 86 ee 59 90 6b 9e 67 9c 70 |..XZy. ..Y.k.g.p|" -peer0.org1.example.com | "2019-05-02 01:31:30.183 UTC [msp.identity] Verify -> DEBU 30c9 Verify: sig = 00000000 30 45 02 21 00 ac f4 43 76 3e 8a 65 77 ac 30 12 |0E.!...Cv>.ew.0.| -peer0.org1.example.com | 00000010 89 48 66 36 51 b5 3b 32 56 6f 26 cb 41 34 03 a2 |.Hf6Q.;2Vo&.A4..| -peer0.org1.example.com | 00000020 f2 9a bd 85 88 02 20 11 67 c1 ff 1f 6d 7f f7 05 |...... .g...m...| -peer0.org1.example.com | 00000030 49 92 50 a6 25 3c b1 43 4f 28 80 0b 24 00 21 03 |I.P.%<.CO(..$.!.| -peer0.org1.example.com | 00000040 0e 44 fd 62 f8 52 5c |.D.b.R\|" -peer0.org1.example.com | "2019-05-02 01:31:30.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ca Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.184 UTC [gossip.discovery] isSentByMe -> DEBU 30cb Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:30.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 30cc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:30.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30cd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:31.948 UTC [gossip.election] waitForInterrupt -> DEBU 30ce c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:31.948 UTC [gossip.election] IsLeader -> DEBU 30cf c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:31.948 UTC [msp.identity] Sign -> DEBU 30d0 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100B1801 " -peer0.org1.example.com | "2019-05-02 01:31:31.948 UTC [msp.identity] Sign -> DEBU 30d1 Sign: digest: A7B31CFA6076D5063CEEDA15738E21BE87A1EB8D93E662FF48E29DDDC6A2FDE1 " -peer0.org1.example.com | "2019-05-02 01:31:31.949 UTC [gossip.election] waitForInterrupt -> DEBU 30d2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:31.951 UTC [msp] DeserializeIdentity -> DEBU 30d3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:31.951 UTC [msp] DeserializeIdentity -> DEBU 30d4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:31.952 UTC [msp] DeserializeIdentity -> DEBU 30d5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:31.952 UTC [msp] DeserializeIdentity -> DEBU 30d6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:31.952 UTC [gossip.comm] Send -> DEBU 30d7 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:31.953 UTC [msp] DeserializeIdentity -> DEBU 30d8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:31.953 UTC [msp] DeserializeIdentity -> DEBU 30d9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:31.953 UTC [gossip.comm] sendToEndpoint -> DEBU 30da Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:31.953 UTC [gossip.comm] sendToEndpoint -> DEBU 30db Exiting" -peer0.org1.example.com | "2019-05-02 01:31:32.786 UTC [msp] DeserializeIdentity -> DEBU 30dc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.786 UTC [msp] DeserializeIdentity -> DEBU 30dd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.786 UTC [gossip.comm] Send -> DEBU 30de Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30df Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30e0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30e1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30e2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30e4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:32.789 UTC [gossip.comm] func1 -> DEBU 30e5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.789 UTC [gossip.gossip] handleMessage -> DEBU 30e6 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.789 UTC [msp] DeserializeIdentity -> DEBU 30e7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.790 UTC [msp] DeserializeIdentity -> DEBU 30e8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.790 UTC [msp] DeserializeIdentity -> DEBU 30e9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.790 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:32.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30eb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30ec Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [policies] Evaluate -> DEBU 30ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [policies] Evaluate -> DEBU 30ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [policies] Evaluate -> DEBU 30ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [cauthdsl] func1 -> DEBU 30f0 0xc002d7def0 gate 1556760692791281800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [cauthdsl] func2 -> DEBU 30f1 0xc002d7def0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [cauthdsl] func2 -> DEBU 30f2 0xc002d7def0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [cauthdsl] func2 -> DEBU 30f3 0xc002d7def0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [msp.identity] Verify -> DEBU 30f4 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [msp.identity] Verify -> DEBU 30f5 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [cauthdsl] func2 -> DEBU 30f6 0xc002d7def0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.791 UTC [cauthdsl] func1 -> DEBU 30f7 0xc002d7def0 gate 1556760692791281800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:32.792 UTC [policies] Evaluate -> DEBU 30f8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.792 UTC [policies] Evaluate -> DEBU 30f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.792 UTC [policies] Evaluate -> DEBU 30fa Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.792 UTC [policies] Evaluate -> DEBU 30fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.792 UTC [msp.identity] Verify -> DEBU 30fc Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:32.792 UTC [msp.identity] Verify -> DEBU 30fd Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:32.793 UTC [msp.identity] Verify -> DEBU 30fe Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:32.793 UTC [msp.identity] Verify -> DEBU 30ff Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:32.793 UTC [msp] DeserializeIdentity -> DEBU 3100 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.793 UTC [msp] DeserializeIdentity -> DEBU 3101 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.793 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3102 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3103 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3104 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [policies] Evaluate -> DEBU 3105 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [policies] Evaluate -> DEBU 3106 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [policies] Evaluate -> DEBU 3107 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [cauthdsl] func1 -> DEBU 3108 0xc00387c500 gate 1556760692794433800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [cauthdsl] func2 -> DEBU 3109 0xc00387c500 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [cauthdsl] func2 -> DEBU 310a 0xc00387c500 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [cauthdsl] func2 -> DEBU 310b 0xc00387c500 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [msp.identity] Verify -> DEBU 310c Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:32.794 UTC [msp.identity] Verify -> DEBU 310d Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:32.795 UTC [cauthdsl] func2 -> DEBU 310e 0xc00387c500 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.795 UTC [cauthdsl] func1 -> DEBU 310f 0xc00387c500 gate 1556760692794433800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:32.795 UTC [policies] Evaluate -> DEBU 3110 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.795 UTC [policies] Evaluate -> DEBU 3111 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.795 UTC [policies] Evaluate -> DEBU 3112 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.795 UTC [policies] Evaluate -> DEBU 3113 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.795 UTC [gossip.gossip] handleMessage -> DEBU 3114 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:32.795 UTC [gossip.gossip] handleMessage -> DEBU 3115 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.796 UTC [msp.identity] Verify -> DEBU 3116 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:32.796 UTC [msp.identity] Verify -> DEBU 3117 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:32.796 UTC [msp.identity] Verify -> DEBU 3118 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:32.796 UTC [msp.identity] Verify -> DEBU 3119 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:32.796 UTC [msp] DeserializeIdentity -> DEBU 311a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.796 UTC [msp] DeserializeIdentity -> DEBU 311b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.797 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 311c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:32.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 311d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 311e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.797 UTC [policies] Evaluate -> DEBU 311f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.797 UTC [policies] Evaluate -> DEBU 3120 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:32.797 UTC [policies] Evaluate -> DEBU 3121 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.798 UTC [cauthdsl] func1 -> DEBU 3122 0xc003976d80 gate 1556760692797437000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:32.798 UTC [gossip.comm] func1 -> DEBU 3123 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.798 UTC [cauthdsl] func2 -> DEBU 3124 0xc003976d80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:32.798 UTC [cauthdsl] func2 -> DEBU 3125 0xc003976d80 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:32.799 UTC [cauthdsl] func2 -> DEBU 3126 0xc003976d80 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.799 UTC [msp.identity] Verify -> DEBU 3127 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:32.799 UTC [msp.identity] Verify -> DEBU 3128 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:32.800 UTC [cauthdsl] func2 -> DEBU 3129 0xc003976d80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.801 UTC [cauthdsl] func1 -> DEBU 312a 0xc003976d80 gate 1556760692797437000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:32.801 UTC [policies] Evaluate -> DEBU 312b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.802 UTC [policies] Evaluate -> DEBU 312c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.803 UTC [policies] Evaluate -> DEBU 312d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.804 UTC [policies] Evaluate -> DEBU 312e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.804 UTC [msp] DeserializeIdentity -> DEBU 312f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.805 UTC [msp] DeserializeIdentity -> DEBU 3130 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.806 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3131 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:32.812 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3132 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.812 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3133 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.813 UTC [policies] Evaluate -> DEBU 3134 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.813 UTC [policies] Evaluate -> DEBU 3135 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:32.813 UTC [policies] Evaluate -> DEBU 3136 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.813 UTC [cauthdsl] func1 -> DEBU 3137 0xc003e46550 gate 1556760692813806700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:32.814 UTC [cauthdsl] func2 -> DEBU 3138 0xc003e46550 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:32.814 UTC [cauthdsl] func2 -> DEBU 3139 0xc003e46550 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:32.814 UTC [cauthdsl] func2 -> DEBU 313a 0xc003e46550 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.814 UTC [msp.identity] Verify -> DEBU 313b Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:32.814 UTC [msp.identity] Verify -> DEBU 313c Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:32.814 UTC [cauthdsl] func2 -> DEBU 313d 0xc003e46550 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.815 UTC [cauthdsl] func1 -> DEBU 313e 0xc003e46550 gate 1556760692813806700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:32.815 UTC [policies] Evaluate -> DEBU 313f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.815 UTC [policies] Evaluate -> DEBU 3140 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.815 UTC [policies] Evaluate -> DEBU 3141 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.815 UTC [policies] Evaluate -> DEBU 3142 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.815 UTC [gossip.gossip] handleMessage -> DEBU 3143 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:32.815 UTC [gossip.gossip] handleMessage -> DEBU 3144 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.815 UTC [msp] DeserializeIdentity -> DEBU 3145 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.815 UTC [msp] DeserializeIdentity -> DEBU 3146 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.815 UTC [msp] DeserializeIdentity -> DEBU 3147 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.816 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3148 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:32.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3149 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 314a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.816 UTC [policies] Evaluate -> DEBU 314b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.816 UTC [policies] Evaluate -> DEBU 314c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:32.816 UTC [policies] Evaluate -> DEBU 314d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.816 UTC [cauthdsl] func1 -> DEBU 314e 0xc004180060 gate 1556760692816660000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:32.816 UTC [cauthdsl] func2 -> DEBU 314f 0xc004180060 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:32.816 UTC [cauthdsl] func2 -> DEBU 3150 0xc004180060 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:32.817 UTC [cauthdsl] func2 -> DEBU 3151 0xc004180060 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.817 UTC [msp.identity] Verify -> DEBU 3152 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:32.817 UTC [msp.identity] Verify -> DEBU 3153 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:32.817 UTC [cauthdsl] func2 -> DEBU 3154 0xc004180060 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.817 UTC [cauthdsl] func1 -> DEBU 3155 0xc004180060 gate 1556760692816660000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:32.817 UTC [policies] Evaluate -> DEBU 3156 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.817 UTC [policies] Evaluate -> DEBU 3157 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.817 UTC [policies] Evaluate -> DEBU 3158 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.817 UTC [policies] Evaluate -> DEBU 3159 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.818 UTC [msp.identity] Verify -> DEBU 315a Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:32.818 UTC [msp.identity] Verify -> DEBU 315b Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:32.819 UTC [msp.identity] Verify -> DEBU 315c Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:32.819 UTC [msp.identity] Verify -> DEBU 315d Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:32.827 UTC [msp] DeserializeIdentity -> DEBU 315e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.827 UTC [msp] DeserializeIdentity -> DEBU 315f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3160 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:32.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3161 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3162 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:32.827 UTC [policies] Evaluate -> DEBU 3163 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.827 UTC [policies] Evaluate -> DEBU 3164 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [policies] Evaluate -> DEBU 3165 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [cauthdsl] func1 -> DEBU 3166 0xc00425c670 gate 1556760692828069600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [cauthdsl] func2 -> DEBU 3167 0xc00425c670 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [cauthdsl] func2 -> DEBU 3168 0xc00425c670 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [cauthdsl] func2 -> DEBU 3169 0xc00425c670 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [msp.identity] Verify -> DEBU 316a Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [msp.identity] Verify -> DEBU 316b Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [cauthdsl] func2 -> DEBU 316c 0xc00425c670 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [cauthdsl] func1 -> DEBU 316d 0xc00425c670 gate 1556760692828069600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [policies] Evaluate -> DEBU 316e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.828 UTC [policies] Evaluate -> DEBU 316f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.829 UTC [policies] Evaluate -> DEBU 3170 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.829 UTC [policies] Evaluate -> DEBU 3171 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:32.829 UTC [gossip.gossip] handleMessage -> DEBU 3172 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:32.912 UTC [msp] DeserializeIdentity -> DEBU 3173 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.912 UTC [msp] DeserializeIdentity -> DEBU 3174 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.913 UTC [gossip.pull] Hello -> DEBU 3175 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:32.913 UTC [msp] DeserializeIdentity -> DEBU 3176 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.913 UTC [msp] DeserializeIdentity -> DEBU 3177 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:32.913 UTC [gossip.comm] Send -> DEBU 3178 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:32.913 UTC [gossip.comm] sendToEndpoint -> DEBU 3179 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.913 UTC [gossip.comm] sendToEndpoint -> DEBU 317a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:32.916 UTC [gossip.gossip] handleMessage -> DEBU 317b Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1047611352146353449 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 57 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.916 UTC [gossip.pull] HandleMessage -> DEBU 317c GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1047611352146353449 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 57 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:32.916 UTC [gossip.gossip] handleMessage -> DEBU 317d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.049 UTC [gossip.gossip] handleMessage -> DEBU 317e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.050 UTC [msp] DeserializeIdentity -> DEBU 317f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.050 UTC [msp] DeserializeIdentity -> DEBU 3180 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.056 UTC [gossip.gossip] handleMessage -> DEBU 3181 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.090 UTC [gossip.gossip] handleMessage -> DEBU 3182 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.092 UTC [gossip.pull] HandleMessage -> DEBU 3183 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.095 UTC [gossip.pull] SendDigest -> DEBU 3184 Sending BLOCK_MSG digest: [1 2 3 4 5 6 7 8] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:33.095 UTC [gossip.gossip] handleMessage -> DEBU 3185 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.276 UTC [gossip.comm] func1 -> DEBU 3186 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.276 UTC [gossip.gossip] handleMessage -> DEBU 3187 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.276 UTC [msp] DeserializeIdentity -> DEBU 3188 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.276 UTC [msp] DeserializeIdentity -> DEBU 3189 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.277 UTC [msp] DeserializeIdentity -> DEBU 318a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.277 UTC [gossip.gossip] handleMessage -> DEBU 318b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.400 UTC [gossip.gossip] handleMessage -> DEBU 318c Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.401 UTC [gossip.pull] HandleMessage -> DEBU 318d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.401 UTC [gossip.pull] SendDigest -> DEBU 318e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:33.402 UTC [gossip.gossip] handleMessage -> DEBU 318f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.408 UTC [gossip.gossip] handleMessage -> DEBU 3190 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.409 UTC [gossip.gossip] handleMessage -> DEBU 3191 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.410 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3192 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.411 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3193 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:33.411 UTC [msp.identity] Verify -> DEBU 3194 Verify: digest = 00000000 66 21 6d 8a ca 7b 57 1b 78 69 c1 6a a2 c0 a5 66 |f!m..{W.xi.j...f| -peer0.org1.example.com | 00000010 b2 d7 70 56 c5 86 18 8d 93 a2 1a 6d 1a 55 36 b7 |..pV.......m.U6.|" -peer0.org1.example.com | "2019-05-02 01:31:33.411 UTC [msp.identity] Verify -> DEBU 3195 Verify: sig = 00000000 30 44 02 20 61 50 17 50 3b f1 f6 09 d2 90 5c ad |0D. aP.P;.....\.| -peer0.org1.example.com | 00000010 fd fe 48 05 04 68 31 dc 8c ba 6d e8 ab 57 0b 32 |..H..h1...m..W.2| -peer0.org1.example.com | 00000020 e1 21 ac ce 02 20 23 7c 96 3e 4d cb f0 22 ad ba |.!... #|.>M.."..| -peer0.org1.example.com | 00000030 89 3e 26 53 7a de 46 09 10 e7 3e be 5f dc 7d 3a |.>&Sz.F...>._.}:| -peer0.org1.example.com | 00000040 05 b0 81 a6 63 75 |....cu|" -peer0.org1.example.com | "2019-05-02 01:31:33.412 UTC [msp.identity] Verify -> DEBU 3196 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:33.412 UTC [msp.identity] Verify -> DEBU 3197 Verify: sig = 00000000 30 44 02 20 4f 29 e8 5a 73 f8 99 e1 a4 29 96 79 |0D. O).Zs....).y| -peer0.org1.example.com | 00000010 87 f2 1b 3f 20 45 2d aa 2e c2 c7 48 80 05 77 13 |...? E-....H..w.| -peer0.org1.example.com | 00000020 a8 fe 57 46 02 20 08 8f 58 91 c5 ec 6a c6 8d 12 |..WF. ..X...j...| -peer0.org1.example.com | 00000030 2f fe 9a fc a9 3b e1 e9 70 ac 85 9e aa 85 4e 58 |/....;..p.....NX| -peer0.org1.example.com | 00000040 e0 1d 34 de e0 fc |..4...|" -peer0.org1.example.com | "2019-05-02 01:31:33.413 UTC [gossip.discovery] handleAliveMessage -> DEBU 3198 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3199 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:33.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 319a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 " -peer0.org1.example.com | "2019-05-02 01:31:33.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 319b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 " -peer0.org1.example.com | "2019-05-02 01:31:33.414 UTC [gossip.discovery] learnExistingMembers -> DEBU 319c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:33.414 UTC [gossip.discovery] learnExistingMembers -> DEBU 319d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.414 UTC [gossip.discovery] handleAliveMessage -> DEBU 319e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.414 UTC [gossip.discovery] handleMsgFromComm -> DEBU 319f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.419 UTC [msp] DeserializeIdentity -> DEBU 31a0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.420 UTC [msp] DeserializeIdentity -> DEBU 31a1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.421 UTC [msp] DeserializeIdentity -> DEBU 31a2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.421 UTC [gossip.comm] Send -> DEBU 31a3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.421 UTC [msp] DeserializeIdentity -> DEBU 31a4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.421 UTC [gossip.comm] Send -> DEBU 31a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.421 UTC [gossip.comm] sendToEndpoint -> DEBU 31a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.421 UTC [gossip.comm] sendToEndpoint -> DEBU 31a7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.422 UTC [gossip.comm] sendToEndpoint -> DEBU 31a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.426 UTC [gossip.comm] sendToEndpoint -> DEBU 31a9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.427 UTC [gossip.gossip] handleMessage -> DEBU 31aa Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.427 UTC [gossip.gossip] handleMessage -> DEBU 31ab Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.427 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.427 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 31ad Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:33.427 UTC [msp.identity] Verify -> DEBU 31ae Verify: digest = 00000000 65 b3 a2 c8 ff 0b bd d1 f8 b2 40 8d 2e d5 fb 12 |e.........@.....| -peer0.org1.example.com | 00000010 16 0a 22 1c e0 38 36 67 4a f1 26 f3 0e 73 9c d1 |.."..86gJ.&..s..|" -peer0.org1.example.com | "2019-05-02 01:31:33.427 UTC [msp.identity] Verify -> DEBU 31af Verify: sig = 00000000 30 45 02 21 00 fb d5 8b 10 b0 47 52 48 d2 81 13 |0E.!......GRH...| -peer0.org1.example.com | 00000010 f7 83 3c d7 3b 33 a8 ee 6d ae 58 4b 56 35 11 ad |..<.;3..m.XKV5..| -peer0.org1.example.com | 00000020 01 af 8a 88 a1 02 20 48 64 6e 90 f5 06 94 67 b6 |...... Hdn....g.| -peer0.org1.example.com | 00000030 b4 cc 4e 52 66 8b 3a 9c fa 17 b4 20 7a 0e 04 50 |..NRf.:.... z..P| -peer0.org1.example.com | 00000040 72 27 19 d4 4c e4 67 |r'..L.g|" -peer0.org1.example.com | "2019-05-02 01:31:33.427 UTC [msp.identity] Verify -> DEBU 31b0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:33.427 UTC [msp.identity] Verify -> DEBU 31b1 Verify: sig = 00000000 30 45 02 21 00 b3 73 a8 fc cc 58 28 74 99 bd 07 |0E.!..s...X(t...| -peer0.org1.example.com | 00000010 28 87 b3 65 6e b3 ba 40 e1 28 e8 29 4a 29 1e dc |(..en..@.(.)J)..| -peer0.org1.example.com | 00000020 4a 22 d4 d1 40 02 20 1e 21 1b 25 17 2c 94 6f 11 |J"..@. .!.%.,.o.| -peer0.org1.example.com | 00000030 6c 41 7f 41 8f c7 3d 3b eb e0 81 1f de 5d 2c d1 |lA.A..=;.....],.| -peer0.org1.example.com | 00000040 8a 32 53 f9 03 93 e2 |.2S....|" -peer0.org1.example.com | "2019-05-02 01:31:33.432 UTC [gossip.comm] func1 -> DEBU 31b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.433 UTC [gossip.gossip] handleMessage -> DEBU 31b3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.434 UTC [gossip.discovery] handleAliveMessage -> DEBU 31b4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 31b5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:33.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 31b6 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 " -peer0.org1.example.com | "2019-05-02 01:31:33.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 31b7 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 " -peer0.org1.example.com | "2019-05-02 01:31:33.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 31b8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:33.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 31b9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.434 UTC [gossip.discovery] handleAliveMessage -> DEBU 31ba Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.434 UTC [gossip.discovery] sendMemResponse -> DEBU 31bb Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:33.435 UTC [msp] DeserializeIdentity -> DEBU 31bc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.435 UTC [msp] DeserializeIdentity -> DEBU 31bd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.436 UTC [gossip.comm] Send -> DEBU 31be Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.436 UTC [gossip.discovery] sendMemResponse -> DEBU 31bf Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:33.438 UTC [gossip.comm] sendToEndpoint -> DEBU 31c0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.438 UTC [gossip.comm] sendToEndpoint -> DEBU 31c1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.434 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.441 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.441 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.442 UTC [gossip.gossip] handleMessage -> DEBU 31c5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.452 UTC [gossip.comm] func1 -> DEBU 31c6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.452 UTC [gossip.gossip] handleMessage -> DEBU 31c7 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.452 UTC [gossip.gossip] handleMessage -> DEBU 31c8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.452 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.452 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31ca Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [gossip.comm] func1 -> DEBU 31cb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [gossip.gossip] handleMessage -> DEBU 31cc Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [gossip.gossip] handleMessage -> DEBU 31cd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31ce Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 31cf Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [msp] DeserializeIdentity -> DEBU 31d0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31d1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d2 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d3 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [policies] Evaluate -> DEBU 31d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [policies] Evaluate -> DEBU 31d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:33.475 UTC [policies] Evaluate -> DEBU 31d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [cauthdsl] func1 -> DEBU 31d7 0xc00040c2a0 gate 1556760693476001300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [cauthdsl] func2 -> DEBU 31d8 0xc00040c2a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [cauthdsl] func2 -> DEBU 31d9 0xc00040c2a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [cauthdsl] func2 -> DEBU 31da 0xc00040c2a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [msp.identity] Verify -> DEBU 31db Verify: digest = 00000000 e7 35 42 ed 6f f1 b5 be b3 6f 24 9c fa a0 11 f8 |.5B.o....o$.....| -peer0.org1.example.com | 00000010 5d 78 a4 90 e4 38 a9 b1 67 32 9f 3e 75 f2 b5 93 |]x...8..g2.>u...|" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [msp.identity] Verify -> DEBU 31dc Verify: sig = 00000000 30 45 02 21 00 c0 fe fa c5 4b 66 e5 92 74 0e be |0E.!.....Kf..t..| -peer0.org1.example.com | 00000010 6d 66 5c 5f 45 a3 b2 54 64 bc 17 d5 66 9a d0 0f |mf\_E..Td...f...| -peer0.org1.example.com | 00000020 ea c0 0d a4 37 02 20 0c da 7f 75 cb 28 6a 47 46 |....7. ...u.(jGF| -peer0.org1.example.com | 00000030 2e 70 8d 77 93 d6 8e 56 f0 8e da 27 88 77 ca 14 |.p.w...V...'.w..| -peer0.org1.example.com | 00000040 e0 ab 23 a7 ef b4 36 |..#...6|" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [cauthdsl] func2 -> DEBU 31dd 0xc00040c2a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [cauthdsl] func1 -> DEBU 31de 0xc00040c2a0 gate 1556760693476001300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [policies] Evaluate -> DEBU 31df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [policies] Evaluate -> DEBU 31e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [policies] Evaluate -> DEBU 31e1 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [policies] Evaluate -> DEBU 31e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [gossip.discovery] handleAliveMessage -> DEBU 31e3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 31e4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 31e5 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 " -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 31e6 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 " -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 31e7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 31e8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [gossip.discovery] handleAliveMessage -> DEBU 31e9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.476 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31ea Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.483 UTC [gossip.gossip] handleMessage -> DEBU 31eb Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31ec Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31ed Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31ee Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31ef Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31f0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31f1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [gossip.comm] Send -> DEBU 31f2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31f3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31f4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [gossip.comm] Send -> DEBU 31f5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [gossip.comm] sendToEndpoint -> DEBU 31f6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [gossip.comm] sendToEndpoint -> DEBU 31f7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [gossip.comm] sendToEndpoint -> DEBU 31f8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.485 UTC [gossip.comm] sendToEndpoint -> DEBU 31f9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.483 UTC [gossip.gossip] handleMessage -> DEBU 31fa Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.486 UTC [gossip.comm] func1 -> DEBU 31fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.486 UTC [gossip.gossip] handleMessage -> DEBU 31fc Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.486 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.487 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31fe Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.488 UTC [gossip.gossip] handleMessage -> DEBU 31ff Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.487 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3200 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.490 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3201 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [gossip.comm] func1 -> DEBU 3202 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [gossip.gossip] handleMessage -> DEBU 3203 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [gossip.pull] HandleMessage -> DEBU 3204 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 3205 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 3206 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 3207 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 3208 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 3209 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 320a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [gossip.pull] SendDigest -> DEBU 320b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:33.498 UTC [gossip.gossip] handleMessage -> DEBU 320c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.521 UTC [gossip.comm] func1 -> DEBU 320d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.526 UTC [gossip.gossip] handleMessage -> DEBU 320e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.526 UTC [gossip.gossip] handleMessage -> DEBU 320f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3210 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.526 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3211 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:33.526 UTC [msp] DeserializeIdentity -> DEBU 3212 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.526 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3213 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:33.526 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3214 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:33.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3215 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:33.527 UTC [policies] Evaluate -> DEBU 3216 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:33.527 UTC [policies] Evaluate -> DEBU 3217 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:33.527 UTC [policies] Evaluate -> DEBU 3218 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:33.527 UTC [cauthdsl] func1 -> DEBU 3219 0xc00020dd90 gate 1556760693527256100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:33.527 UTC [cauthdsl] func2 -> DEBU 321a 0xc00020dd90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:33.527 UTC [cauthdsl] func2 -> DEBU 321b 0xc00020dd90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:33.532 UTC [cauthdsl] func2 -> DEBU 321c 0xc00020dd90 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:33.532 UTC [msp.identity] Verify -> DEBU 321d Verify: digest = 00000000 d0 13 df ae 07 68 85 c6 f8 a1 a1 d8 19 67 3f 3c |.....h.......g?<| -peer0.org1.example.com | 00000010 8f 04 72 84 e7 35 78 e1 85 08 ab 2c 62 c9 e3 84 |..r..5x....,b...|" -peer0.org1.example.com | "2019-05-02 01:31:33.532 UTC [msp.identity] Verify -> DEBU 321e Verify: sig = 00000000 30 45 02 21 00 8d 6b 7e 52 02 e6 61 9c 20 99 b1 |0E.!..k~R..a. ..| -peer0.org1.example.com | 00000010 99 0a fd 85 2e b1 c9 31 11 f6 f1 3f f3 dc 43 c2 |.......1...?..C.| -peer0.org1.example.com | 00000020 3a 54 2b f1 a7 02 20 75 4c 1d e0 bf 90 71 86 50 |:T+... uL....q.P| -peer0.org1.example.com | 00000030 52 5f cf f9 5c a8 e7 b8 97 1d 11 90 ce 64 44 f1 |R_..\........dD.| -peer0.org1.example.com | 00000040 54 32 ad 6a 1f 93 91 |T2.j...|" -peer0.org1.example.com | "2019-05-02 01:31:33.533 UTC [cauthdsl] func2 -> DEBU 321f 0xc00020dd90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:33.533 UTC [cauthdsl] func1 -> DEBU 3220 0xc00020dd90 gate 1556760693527256100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:33.533 UTC [policies] Evaluate -> DEBU 3221 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.533 UTC [policies] Evaluate -> DEBU 3222 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.533 UTC [policies] Evaluate -> DEBU 3223 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.533 UTC [policies] Evaluate -> DEBU 3224 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 3225 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3226 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:33.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3227 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 " -peer0.org1.example.com | "2019-05-02 01:31:33.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3228 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 " -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 3229 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 322a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [gossip.discovery] handleAliveMessage -> DEBU 322b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU 322c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [gossip.discovery] sendMemResponse -> DEBU 322d Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [msp] DeserializeIdentity -> DEBU 322e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [msp] DeserializeIdentity -> DEBU 322f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [gossip.comm] func1 -> DEBU 3230 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [gossip.gossip] handleMessage -> DEBU 3231 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [msp] DeserializeIdentity -> DEBU 3232 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.537 UTC [msp] DeserializeIdentity -> DEBU 3233 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.537 UTC [msp] DeserializeIdentity -> DEBU 3234 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.537 UTC [gossip.gossip] handleMessage -> DEBU 3235 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.536 UTC [msp] DeserializeIdentity -> DEBU 3236 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.550 UTC [gossip.comm] Send -> DEBU 3237 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.550 UTC [gossip.discovery] sendMemResponse -> DEBU 3238 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:33.550 UTC [gossip.comm] sendToEndpoint -> DEBU 3239 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.550 UTC [gossip.comm] sendToEndpoint -> DEBU 323a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.697 UTC [msp.identity] Sign -> DEBU 323b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151024 " -peer0.org1.example.com | "2019-05-02 01:31:33.697 UTC [msp.identity] Sign -> DEBU 323c Sign: digest: B5DEA04106AD6530B5FE87C0106DC5543120137253C2A2038859882276691DBC " -peer0.org1.example.com | "2019-05-02 01:31:33.697 UTC [msp.identity] Sign -> DEBU 323d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:33.697 UTC [msp.identity] Sign -> DEBU 323e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:33.698 UTC [gossip.discovery] periodicalSendAlive -> DEBU 323f Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:33.704 UTC [msp] DeserializeIdentity -> DEBU 3240 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.704 UTC [msp] DeserializeIdentity -> DEBU 3241 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [msp] DeserializeIdentity -> DEBU 3242 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [gossip.comm] Send -> DEBU 3243 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [gossip.comm] Send -> DEBU 3244 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [msp] DeserializeIdentity -> DEBU 3245 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [gossip.comm] Send -> DEBU 3246 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3247 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3248 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3249 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 324a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 324b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 324c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.709 UTC [gossip.comm] func1 -> DEBU 324d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.709 UTC [gossip.gossip] handleMessage -> DEBU 324e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.710 UTC [gossip.pull] HandleMessage -> DEBU 324f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3250 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3251 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3252 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3253 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3254 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3255 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.710 UTC [gossip.pull] SendDigest -> DEBU 3256 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:33.710 UTC [gossip.gossip] handleMessage -> DEBU 3257 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.807 UTC [gossip.pull] Hello -> DEBU 3258 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:33.807 UTC [gossip.comm] Send -> DEBU 3259 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.808 UTC [gossip.pull] Hello -> DEBU 325a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:33.808 UTC [gossip.comm] Send -> DEBU 325b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.808 UTC [gossip.pull] Hello -> DEBU 325c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:33.808 UTC [gossip.comm] Send -> DEBU 325d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.808 UTC [gossip.comm] sendToEndpoint -> DEBU 325e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.809 UTC [gossip.comm] sendToEndpoint -> DEBU 325f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.809 UTC [gossip.comm] sendToEndpoint -> DEBU 3260 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.809 UTC [gossip.comm] sendToEndpoint -> DEBU 3261 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.809 UTC [gossip.comm] sendToEndpoint -> DEBU 3262 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.809 UTC [gossip.comm] sendToEndpoint -> DEBU 3263 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.811 UTC [gossip.comm] func1 -> DEBU 3264 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.811 UTC [gossip.gossip] handleMessage -> DEBU 3265 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.811 UTC [gossip.gossip] handleMessage -> DEBU 3266 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.812 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3267 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.812 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3268 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:33.812 UTC [msp] DeserializeIdentity -> DEBU 3269 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.812 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 326a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:33.812 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:33.812 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:33.813 UTC [policies] Evaluate -> DEBU 326d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:33.813 UTC [policies] Evaluate -> DEBU 326e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:33.813 UTC [policies] Evaluate -> DEBU 326f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:33.813 UTC [cauthdsl] func1 -> DEBU 3270 0xc003ea6100 gate 1556760693813666800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:33.813 UTC [cauthdsl] func2 -> DEBU 3271 0xc003ea6100 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:33.813 UTC [cauthdsl] func2 -> DEBU 3272 0xc003ea6100 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:33.814 UTC [cauthdsl] func2 -> DEBU 3273 0xc003ea6100 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:33.814 UTC [msp.identity] Verify -> DEBU 3274 Verify: digest = 00000000 90 bf 7c 39 21 fd 63 b9 e2 64 3c 36 c5 07 67 22 |..|9!.c..d<6..g"| -peer0.org1.example.com | 00000010 aa 0b b9 61 f9 37 51 0e 1f 7f d7 6f 5b 85 cb d0 |...a.7Q....o[...|" -peer0.org1.example.com | "2019-05-02 01:31:33.814 UTC [msp.identity] Verify -> DEBU 3275 Verify: sig = 00000000 30 44 02 20 4b b3 ba 9c b9 c4 8b f6 15 0d 21 3c |0D. K.........!<| -peer0.org1.example.com | 00000010 6f d1 77 75 94 4e c3 13 b4 e1 25 62 78 c4 01 65 |o.wu.N....%bx..e| -peer0.org1.example.com | 00000020 82 89 01 76 02 20 4f d7 03 1e f2 df 4e c0 e8 24 |...v. O.....N..$| -peer0.org1.example.com | 00000030 3e 72 34 94 16 c6 4d 44 8f 27 b4 9d ca 64 4a 8e |>r4...MD.'...dJ.| -peer0.org1.example.com | 00000040 33 3c a8 d1 79 ba |3<..y.|" -peer0.org1.example.com | "2019-05-02 01:31:33.814 UTC [cauthdsl] func2 -> DEBU 3276 0xc003ea6100 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:33.815 UTC [cauthdsl] func1 -> DEBU 3277 0xc003ea6100 gate 1556760693813666800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:33.815 UTC [policies] Evaluate -> DEBU 3278 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.815 UTC [policies] Evaluate -> DEBU 3279 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.815 UTC [policies] Evaluate -> DEBU 327a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.815 UTC [policies] Evaluate -> DEBU 327b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.815 UTC [gossip.discovery] handleAliveMessage -> DEBU 327c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 327d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:33.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 327e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 " -peer0.org1.example.com | "2019-05-02 01:31:33.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 327f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 " -peer0.org1.example.com | "2019-05-02 01:31:33.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 3280 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:33.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 3281 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.816 UTC [gossip.discovery] handleAliveMessage -> DEBU 3282 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.817 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3283 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.817 UTC [gossip.gossip] handleMessage -> DEBU 3284 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6263043557307600289 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.817 UTC [gossip.pull] HandleMessage -> DEBU 3285 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6263043557307600289 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.817 UTC [gossip.gossip] handleMessage -> DEBU 3286 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.819 UTC [gossip.comm] func1 -> DEBU 3287 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4251242008394749493 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.820 UTC [gossip.gossip] handleMessage -> DEBU 3288 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4251242008394749493 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.820 UTC [gossip.pull] HandleMessage -> DEBU 3289 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4251242008394749493 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.820 UTC [gossip.gossip] handleMessage -> DEBU 328a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.820 UTC [gossip.comm] func1 -> DEBU 328b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2750782800215786011 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.820 UTC [gossip.gossip] handleMessage -> DEBU 328c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2750782800215786011 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.821 UTC [gossip.pull] HandleMessage -> DEBU 328d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2750782800215786011 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.821 UTC [gossip.gossip] handleMessage -> DEBU 328e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.822 UTC [gossip.gossip] handleMessage -> DEBU 328f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.822 UTC [gossip.gossip] handleMessage -> DEBU 3290 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.822 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3291 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.822 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3292 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.823 UTC [msp] DeserializeIdentity -> DEBU 3293 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.824 UTC [msp] DeserializeIdentity -> DEBU 3294 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.825 UTC [gossip.comm] func1 -> DEBU 3295 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.825 UTC [gossip.gossip] handleMessage -> DEBU 3296 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.825 UTC [gossip.gossip] handleMessage -> DEBU 3298 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.825 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3299 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.825 UTC [gossip.discovery] handleMsgFromComm -> DEBU 329a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.825 UTC [msp] DeserializeIdentity -> DEBU 3297 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.825 UTC [msp] DeserializeIdentity -> DEBU 329b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.826 UTC [msp] DeserializeIdentity -> DEBU 329c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.826 UTC [msp] DeserializeIdentity -> DEBU 329d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.826 UTC [msp] DeserializeIdentity -> DEBU 329e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.826 UTC [gossip.comm] Send -> DEBU 329f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.826 UTC [gossip.comm] sendToEndpoint -> DEBU 32a0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.826 UTC [gossip.comm] sendToEndpoint -> DEBU 32a1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.827 UTC [msp] DeserializeIdentity -> DEBU 32a2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.827 UTC [gossip.comm] Send -> DEBU 32a3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.827 UTC [gossip.comm] sendToEndpoint -> DEBU 32a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.827 UTC [gossip.comm] sendToEndpoint -> DEBU 32a5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.868 UTC [gossip.comm] func1 -> DEBU 32a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.868 UTC [gossip.gossip] handleMessage -> DEBU 32a7 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.869 UTC [gossip.gossip] handleMessage -> DEBU 32a8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.870 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32a9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.870 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32aa Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:33.871 UTC [msp] DeserializeIdentity -> DEBU 32ab Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32ac Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:33.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32ad Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:33.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32ae Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:33.872 UTC [policies] Evaluate -> DEBU 32af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:33.875 UTC [policies] Evaluate -> DEBU 32b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:33.876 UTC [policies] Evaluate -> DEBU 32b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:33.877 UTC [cauthdsl] func1 -> DEBU 32b2 0xc003ef7a80 gate 1556760693876313000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:33.877 UTC [cauthdsl] func2 -> DEBU 32b3 0xc003ef7a80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:33.878 UTC [cauthdsl] func2 -> DEBU 32b4 0xc003ef7a80 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:33.879 UTC [cauthdsl] func2 -> DEBU 32b5 0xc003ef7a80 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:33.880 UTC [msp.identity] Verify -> DEBU 32b6 Verify: digest = 00000000 0d d2 87 9b 4e da e0 f5 f0 42 15 d0 8d 88 18 93 |....N....B......| -peer0.org1.example.com | 00000010 25 d0 95 6d a0 76 e9 e1 31 a8 0d 46 7f 3c 2b e4 |%..m.v..1..F.<+.|" -peer0.org1.example.com | "2019-05-02 01:31:33.884 UTC [msp.identity] Verify -> DEBU 32b7 Verify: sig = 00000000 30 44 02 20 7e 58 84 2c 19 12 bc c8 31 fe 59 a8 |0D. ~X.,....1.Y.| -peer0.org1.example.com | 00000010 5e 36 69 31 de 33 9a 7b 14 5a ba 19 ee eb 6c 4b |^6i1.3.{.Z....lK| -peer0.org1.example.com | 00000020 81 c0 2d 12 02 20 63 69 7a d3 14 94 95 6e 35 48 |..-.. ciz....n5H| -peer0.org1.example.com | 00000030 f0 7d 3c da f2 8a 8a 81 2d cf 40 95 93 3d 16 b2 |.}<.....-.@..=..| -peer0.org1.example.com | 00000040 99 25 1e 0b b1 db |.%....|" -peer0.org1.example.com | "2019-05-02 01:31:33.886 UTC [cauthdsl] func2 -> DEBU 32b8 0xc003ef7a80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:33.886 UTC [cauthdsl] func1 -> DEBU 32b9 0xc003ef7a80 gate 1556760693876313000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:33.887 UTC [policies] Evaluate -> DEBU 32ba Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.887 UTC [policies] Evaluate -> DEBU 32bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.888 UTC [policies] Evaluate -> DEBU 32bc Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.888 UTC [policies] Evaluate -> DEBU 32bd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:33.889 UTC [gossip.discovery] handleAliveMessage -> DEBU 32be Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.889 UTC [gossip.discovery] learnExistingMembers -> DEBU 32bf Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:33.889 UTC [gossip.discovery] learnExistingMembers -> DEBU 32c0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 " -peer0.org1.example.com | "2019-05-02 01:31:33.889 UTC [gossip.discovery] learnExistingMembers -> DEBU 32c1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 " -peer0.org1.example.com | "2019-05-02 01:31:33.890 UTC [gossip.discovery] learnExistingMembers -> DEBU 32c2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:33.890 UTC [gossip.discovery] learnExistingMembers -> DEBU 32c3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 32c4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.891 UTC [gossip.discovery] sendMemResponse -> DEBU 32c5 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:33.891 UTC [msp] DeserializeIdentity -> DEBU 32c7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.892 UTC [msp] DeserializeIdentity -> DEBU 32c8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.892 UTC [msp] DeserializeIdentity -> DEBU 32c9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:33.892 UTC [gossip.comm] Send -> DEBU 32ca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:33.892 UTC [gossip.discovery] sendMemResponse -> DEBU 32cb Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:33.892 UTC [gossip.comm] sendToEndpoint -> DEBU 32cc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:33.892 UTC [gossip.comm] sendToEndpoint -> DEBU 32cd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:33.891 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32c6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.150 UTC [msp.identity] Sign -> DEBU 32ce Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151025 " -peer0.org1.example.com | "2019-05-02 01:31:34.151 UTC [msp.identity] Sign -> DEBU 32cf Sign: digest: 5858C329ED8041900FC479312BB64E8591CA3B302BECCDD48FDA5707D62E1C53 " -peer0.org1.example.com | "2019-05-02 01:31:34.151 UTC [msp.identity] Sign -> DEBU 32d0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:34.151 UTC [msp.identity] Sign -> DEBU 32d1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:34.151 UTC [gossip.comm] Send -> DEBU 32d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:34.151 UTC [msp] DeserializeIdentity -> DEBU 32d3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:34.152 UTC [gossip.comm] Send -> DEBU 32d4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:34.152 UTC [msp] DeserializeIdentity -> DEBU 32d5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32d6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32d7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.152 UTC [gossip.comm] Send -> DEBU 32d8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32d9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32da Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32db Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32dc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.155 UTC [gossip.comm] func1 -> DEBU 32dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.155 UTC [gossip.gossip] handleMessage -> DEBU 32de Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.155 UTC [gossip.gossip] handleMessage -> DEBU 32df Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.155 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32e0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32e1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [msp] DeserializeIdentity -> DEBU 32e2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32e4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32e5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [cauthdsl] func1 -> DEBU 32e9 0xc00278cf60 gate 1556760694156419900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [cauthdsl] func2 -> DEBU 32ea 0xc00278cf60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [cauthdsl] func2 -> DEBU 32eb 0xc00278cf60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [cauthdsl] func2 -> DEBU 32ec 0xc00278cf60 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [msp.identity] Verify -> DEBU 32ed Verify: digest = 00000000 d0 13 df ae 07 68 85 c6 f8 a1 a1 d8 19 67 3f 3c |.....h.......g?<| -peer0.org1.example.com | 00000010 8f 04 72 84 e7 35 78 e1 85 08 ab 2c 62 c9 e3 84 |..r..5x....,b...|" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [msp.identity] Verify -> DEBU 32ee Verify: sig = 00000000 30 45 02 21 00 8d 6b 7e 52 02 e6 61 9c 20 99 b1 |0E.!..k~R..a. ..| -peer0.org1.example.com | 00000010 99 0a fd 85 2e b1 c9 31 11 f6 f1 3f f3 dc 43 c2 |.......1...?..C.| -peer0.org1.example.com | 00000020 3a 54 2b f1 a7 02 20 75 4c 1d e0 bf 90 71 86 50 |:T+... uL....q.P| -peer0.org1.example.com | 00000030 52 5f cf f9 5c a8 e7 b8 97 1d 11 90 ce 64 44 f1 |R_..\........dD.| -peer0.org1.example.com | 00000040 54 32 ad 6a 1f 93 91 |T2.j...|" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [cauthdsl] func2 -> DEBU 32ef 0xc00278cf60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [cauthdsl] func1 -> DEBU 32f0 0xc00278cf60 gate 1556760694156419900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32f3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:34.156 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.157 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.157 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32f7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:34.157 UTC [msp.identity] Verify -> DEBU 32f8 Verify: digest = 00000000 58 58 c3 29 ed 80 41 90 0f c4 79 31 2b b6 4e 85 |XX.)..A...y1+.N.| -peer0.org1.example.com | 00000010 91 ca 3b 30 2b ec cd d4 8f da 57 07 d6 2e 1c 53 |..;0+.....W....S|" -peer0.org1.example.com | "2019-05-02 01:31:34.157 UTC [msp.identity] Verify -> DEBU 32f9 Verify: sig = 00000000 30 44 02 20 26 b0 bb 5e e1 52 1a 36 c2 a5 e7 35 |0D. &..^.R.6...5| -peer0.org1.example.com | 00000010 a8 bb d4 c2 e5 50 ca 85 c0 ca 94 be ec ca 54 43 |.....P........TC| -peer0.org1.example.com | 00000020 4b 03 58 eb 02 20 75 60 73 b1 73 0f e0 13 05 d6 |K.X.. u`s.s.....| -peer0.org1.example.com | 00000030 41 d6 ad 0e 18 04 76 38 d6 e7 70 47 a0 c5 26 f7 |A.....v8..pG..&.| -peer0.org1.example.com | 00000040 4b 9b d7 ff 51 59 |K...QY|" -peer0.org1.example.com | "2019-05-02 01:31:34.157 UTC [gossip.discovery] handleAliveMessage -> DEBU 32fa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.157 UTC [gossip.comm] func1 -> DEBU 32fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.157 UTC [gossip.discovery] isSentByMe -> DEBU 32fc Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.157 UTC [gossip.gossip] handleMessage -> DEBU 32fd Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 32fe Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.160 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32ff Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:34.161 UTC [msp.identity] Verify -> DEBU 3300 Verify: digest = 00000000 65 b3 a2 c8 ff 0b bd d1 f8 b2 40 8d 2e d5 fb 12 |e.........@.....| -peer0.org1.example.com | 00000010 16 0a 22 1c e0 38 36 67 4a f1 26 f3 0e 73 9c d1 |.."..86gJ.&..s..|" -peer0.org1.example.com | "2019-05-02 01:31:34.161 UTC [msp.identity] Verify -> DEBU 3301 Verify: sig = 00000000 30 45 02 21 00 fb d5 8b 10 b0 47 52 48 d2 81 13 |0E.!......GRH...| -peer0.org1.example.com | 00000010 f7 83 3c d7 3b 33 a8 ee 6d ae 58 4b 56 35 11 ad |..<.;3..m.XKV5..| -peer0.org1.example.com | 00000020 01 af 8a 88 a1 02 20 48 64 6e 90 f5 06 94 67 b6 |...... Hdn....g.| -peer0.org1.example.com | 00000030 b4 cc 4e 52 66 8b 3a 9c fa 17 b4 20 7a 0e 04 50 |..NRf.:.... z..P| -peer0.org1.example.com | 00000040 72 27 19 d4 4c e4 67 |r'..L.g|" -peer0.org1.example.com | "2019-05-02 01:31:34.161 UTC [gossip.discovery] handleAliveMessage -> DEBU 3302 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.161 UTC [gossip.discovery] handleAliveMessage -> DEBU 3303 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3304 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3305 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.161 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3306 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [msp.identity] Verify -> DEBU 3307 Verify: digest = 00000000 58 58 c3 29 ed 80 41 90 0f c4 79 31 2b b6 4e 85 |XX.)..A...y1+.N.| -peer0.org1.example.com | 00000010 91 ca 3b 30 2b ec cd d4 8f da 57 07 d6 2e 1c 53 |..;0+.....W....S|" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [msp.identity] Verify -> DEBU 3308 Verify: sig = 00000000 30 44 02 20 26 b0 bb 5e e1 52 1a 36 c2 a5 e7 35 |0D. &..^.R.6...5| -peer0.org1.example.com | 00000010 a8 bb d4 c2 e5 50 ca 85 c0 ca 94 be ec ca 54 43 |.....P........TC| -peer0.org1.example.com | 00000020 4b 03 58 eb 02 20 75 60 73 b1 73 0f e0 13 05 d6 |K.X.. u`s.s.....| -peer0.org1.example.com | 00000030 41 d6 ad 0e 18 04 76 38 d6 e7 70 47 a0 c5 26 f7 |A.....v8..pG..&.| -peer0.org1.example.com | 00000040 4b 9b d7 ff 51 59 |K...QY|" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 3309 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [gossip.discovery] isSentByMe -> DEBU 330a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 330b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 330c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [msp.identity] Verify -> DEBU 330d Verify: digest = 00000000 65 b3 a2 c8 ff 0b bd d1 f8 b2 40 8d 2e d5 fb 12 |e.........@.....| -peer0.org1.example.com | 00000010 16 0a 22 1c e0 38 36 67 4a f1 26 f3 0e 73 9c d1 |.."..86gJ.&..s..|" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [msp.identity] Verify -> DEBU 330e Verify: sig = 00000000 30 45 02 21 00 fb d5 8b 10 b0 47 52 48 d2 81 13 |0E.!......GRH...| -peer0.org1.example.com | 00000010 f7 83 3c d7 3b 33 a8 ee 6d ae 58 4b 56 35 11 ad |..<.;3..m.XKV5..| -peer0.org1.example.com | 00000020 01 af 8a 88 a1 02 20 48 64 6e 90 f5 06 94 67 b6 |...... Hdn....g.| -peer0.org1.example.com | 00000030 b4 cc 4e 52 66 8b 3a 9c fa 17 b4 20 7a 0e 04 50 |..NRf.:.... z..P| -peer0.org1.example.com | 00000040 72 27 19 d4 4c e4 67 |r'..L.g|" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 330f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 3310 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3311 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:34.162 UTC [msp] DeserializeIdentity -> DEBU 3312 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3313 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3314 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3315 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3316 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3317 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3318 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [cauthdsl] func1 -> DEBU 3319 0xc00416f880 gate 1556760694163295200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [cauthdsl] func2 -> DEBU 331a 0xc00416f880 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [cauthdsl] func2 -> DEBU 331b 0xc00416f880 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [cauthdsl] func2 -> DEBU 331c 0xc00416f880 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [msp.identity] Verify -> DEBU 331d Verify: digest = 00000000 0d d2 87 9b 4e da e0 f5 f0 42 15 d0 8d 88 18 93 |....N....B......| -peer0.org1.example.com | 00000010 25 d0 95 6d a0 76 e9 e1 31 a8 0d 46 7f 3c 2b e4 |%..m.v..1..F.<+.|" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [msp.identity] Verify -> DEBU 331e Verify: sig = 00000000 30 44 02 20 7e 58 84 2c 19 12 bc c8 31 fe 59 a8 |0D. ~X.,....1.Y.| -peer0.org1.example.com | 00000010 5e 36 69 31 de 33 9a 7b 14 5a ba 19 ee eb 6c 4b |^6i1.3.{.Z....lK| -peer0.org1.example.com | 00000020 81 c0 2d 12 02 20 63 69 7a d3 14 94 95 6e 35 48 |..-.. ciz....n5H| -peer0.org1.example.com | 00000030 f0 7d 3c da f2 8a 8a 81 2d cf 40 95 93 3d 16 b2 |.}<.....-.@..=..| -peer0.org1.example.com | 00000040 99 25 1e 0b b1 db |.%....|" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [cauthdsl] func2 -> DEBU 331f 0xc00416f880 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [cauthdsl] func1 -> DEBU 3320 0xc00416f880 gate 1556760694163295200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3321 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3322 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3323 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3324 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 3325 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 3326 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3327 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [gossip.gossip] handleMessage -> DEBU 3328 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [gossip.gossip] handleMessage -> DEBU 3329 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [gossip.gossip] handleMessage -> DEBU 332a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 332b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 332c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [msp.identity] Verify -> DEBU 332d Verify: digest = 00000000 58 58 c3 29 ed 80 41 90 0f c4 79 31 2b b6 4e 85 |XX.)..A...y1+.N.| -peer0.org1.example.com | 00000010 91 ca 3b 30 2b ec cd d4 8f da 57 07 d6 2e 1c 53 |..;0+.....W....S|" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [msp.identity] Verify -> DEBU 332e Verify: sig = 00000000 30 44 02 20 26 b0 bb 5e e1 52 1a 36 c2 a5 e7 35 |0D. &..^.R.6...5| -peer0.org1.example.com | 00000010 a8 bb d4 c2 e5 50 ca 85 c0 ca 94 be ec ca 54 43 |.....P........TC| -peer0.org1.example.com | 00000020 4b 03 58 eb 02 20 75 60 73 b1 73 0f e0 13 05 d6 |K.X.. u`s.s.....| -peer0.org1.example.com | 00000030 41 d6 ad 0e 18 04 76 38 d6 e7 70 47 a0 c5 26 f7 |A.....v8..pG..&.| -peer0.org1.example.com | 00000040 4b 9b d7 ff 51 59 |K...QY|" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [msp.identity] Verify -> DEBU 332f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [msp.identity] Verify -> DEBU 3330 Verify: sig = 00000000 30 44 02 20 16 99 b6 60 b6 91 48 d8 a8 04 66 2e |0D. ...`..H...f.| -peer0.org1.example.com | 00000010 40 1f 82 48 86 99 84 4e 2f 6f 38 d9 52 94 3b b4 |@..H...N/o8.R.;.| -peer0.org1.example.com | 00000020 0f 91 6a ca 02 20 08 1d e0 54 84 be 89 38 69 18 |..j.. ...T...8i.| -peer0.org1.example.com | 00000030 aa ae cc 6a 67 9a 62 9c cc 6a 2d ec a8 b8 96 c3 |...jg.b..j-.....| -peer0.org1.example.com | 00000040 9c 7b 1b 19 e6 e4 |.{....|" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 3331 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.164 UTC [gossip.discovery] isSentByMe -> DEBU 3332 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:34.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 3333 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:34.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3334 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.136 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3335 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.137 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3336 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.137 UTC [policies] Evaluate -> DEBU 3337 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-05-02 01:31:35.137 UTC [policies] Evaluate -> DEBU 3338 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.138 UTC [policies] Evaluate -> DEBU 3339 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.139 UTC [cauthdsl] func1 -> DEBU 333a 0xc003a8c5c0 gate 1556760695138858500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.139 UTC [cauthdsl] func2 -> DEBU 333b 0xc003a8c5c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.139 UTC [cauthdsl] func2 -> DEBU 333c 0xc003a8c5c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.139 UTC [cauthdsl] func2 -> DEBU 333d 0xc003a8c5c0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.139 UTC [msp.identity] Verify -> DEBU 333e Verify: digest = 00000000 ca 3f cc 53 0d 60 63 d0 40 56 6e 78 d2 62 67 1a |.?.S.`c.@Vnx.bg.| -peer0.org1.example.com | 00000010 ba 4e 2c a2 cb 95 4d d3 7a 6a 0b 78 11 5c bc e4 |.N,...M.zj.x.\..|" -peer0.org1.example.com | "2019-05-02 01:31:35.139 UTC [msp.identity] Verify -> DEBU 333f Verify: sig = 00000000 30 45 02 21 00 d6 b8 6d b6 2c 16 d2 68 fb 8a 9b |0E.!...m.,..h...| -peer0.org1.example.com | 00000010 51 c7 63 29 9c b8 fc 3b 14 ba a2 6f ec 43 59 70 |Q.c)...;...o.CYp| -peer0.org1.example.com | 00000020 b7 37 e2 95 3e 02 20 0f 68 8e a3 43 1d 29 02 0a |.7..>. .h..C.)..| -peer0.org1.example.com | 00000030 04 e4 73 71 5c 2f d0 b7 93 0d 3e 80 59 7f b8 5c |..sq\/....>.Y..\| -peer0.org1.example.com | 00000040 3c 8e 90 5f b9 50 d0 |<.._.P.|" -peer0.org1.example.com | "2019-05-02 01:31:35.140 UTC [cauthdsl] func2 -> DEBU 3340 0xc003a8c5c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.140 UTC [cauthdsl] func1 -> DEBU 3341 0xc003a8c5c0 gate 1556760695138858500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.140 UTC [policies] Evaluate -> DEBU 3342 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.140 UTC [policies] Evaluate -> DEBU 3343 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.141 UTC [policies] Evaluate -> DEBU 3344 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:35.141 UTC [policies] Evaluate -> DEBU 3345 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:35.141 UTC [blocksProvider] DeliverBlocks -> DEBU 3346 [businesschannel] Adding payload to local buffer, blockNum = [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.141 UTC [gossip.state] addPayload -> DEBU 3347 [businesschannel] Adding payload to local buffer, blockNum = [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.142 UTC [gossip.state] addPayload -> DEBU 3348 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-05-02 01:31:35.142 UTC [blocksProvider] DeliverBlocks -> DEBU 3349 [businesschannel] Gossiping block [9], peers number [3]" -peer0.org1.example.com | "2019-05-02 01:31:35.142 UTC [gossip.channel] AddToMsgStore -> DEBU 334a Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35012 bytes, seq: 9}, Envelope: 35045 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-05-02 01:31:35.142 UTC [gossip.pull] Add -> DEBU 334b Added 9, total items: 9" -peer0.org1.example.com | "2019-05-02 01:31:35.142 UTC [gossip.state] deliverPayloads -> DEBU 334c [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.142 UTC [gossip.state] deliverPayloads -> DEBU 334d [businesschannel] Transferring block [9] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-05-02 01:31:35.143 UTC [gossip.privdata] StoreBlock -> INFO 334e [businesschannel] Received block [9] from buffer" -peer0.org1.example.com | "2019-05-02 01:31:35.143 UTC [gossip.privdata] StoreBlock -> DEBU 334f [businesschannel] Validating block [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.143 UTC [committer.txvalidator] Validate -> DEBU 3350 [businesschannel] START Block Validation for block [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [committer.txvalidator] Validate -> DEBU 3351 expecting 1 block validation responses" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [committer.txvalidator] validateTx -> DEBU 3352 [businesschannel] validateTx starts for block 0xc00382f440 env 0xc0044452c0 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [protoutils] ValidateTransaction -> DEBU 3353 ValidateTransactionEnvelope starts for envelope 0xc0044452c0" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [protoutils] ValidateTransaction -> DEBU 3354 Header is channel_header:"\010\001\032\006\010\366\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\342\231\345\226\0025\271\2400`k\010\002\376=~\236\377\001X\304\311\352J" " -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [protoutils] validateChannelHeader -> DEBU 3355 validateChannelHeader info: header type 1" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [msp] DeserializeIdentity -> DEBU 3356 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [protoutils] checkSignatureFromCreator -> DEBU 3357 begin" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [msp] GetManagerForChain -> DEBU 3358 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [msp] DeserializeIdentity -> DEBU 3359 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [msp] DeserializeIdentity -> DEBU 335a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [msp.identity] newIdentity -> DEBU 335b Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -peer0.org1.example.com | QQ== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.144 UTC [msp] DeserializeIdentity -> DEBU 335c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [msp] DeserializeIdentity -> DEBU 335d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [gossip.comm] Send -> DEBU 335e Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35012 bytes, seq: 9}, Envelope: 35045 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [protoutils] checkSignatureFromCreator -> DEBU 335f creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [msp] Validate -> DEBU 3360 MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [msp] DeserializeIdentity -> DEBU 3361 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [msp] DeserializeIdentity -> DEBU 3362 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [protoutils] checkSignatureFromCreator -> DEBU 3363 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [gossip.comm] sendToEndpoint -> DEBU 3364 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35012 bytes, seq: 9}, Envelope: 35045 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [gossip.comm] sendToEndpoint -> DEBU 3365 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [msp.identity] Verify -> DEBU 3366 Verify: digest = 00000000 7b 27 d9 8e c5 a9 c1 38 db 98 9b 54 c4 34 72 66 |{'.....8...T.4rf| -peer0.org1.example.com | 00000010 fe 0d 3d 0f 4a 95 b0 99 26 9b 68 bc cf 58 5b 53 |..=.J...&.h..X[S|" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [msp.identity] Verify -> DEBU 3367 Verify: sig = 00000000 30 44 02 20 17 fb 96 95 cf 78 11 ee f6 f6 bf 00 |0D. .....x......| -peer0.org1.example.com | 00000010 86 65 7e 97 5b 5f 51 43 e4 6a fa 3e d0 8f 80 95 |.e~.[_QC.j.>....| -peer0.org1.example.com | 00000020 5c 30 f3 79 02 20 31 03 e1 81 80 b3 8e 6d 77 9c |\0.y. 1......mw.| -peer0.org1.example.com | 00000030 df 06 16 94 09 13 bc 5f 75 84 4c 0a d7 71 fa 74 |......._u.L..q.t| -peer0.org1.example.com | 00000040 df de 6e 9d 1c cb |..n...|" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [protoutils] checkSignatureFromCreator -> DEBU 3368 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [protoutils] validateConfigTransaction -> DEBU 3369 validateConfigTransaction starts for data 0xc0026d0000, header channel_header:"\010\001\032\006\010\366\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\342\231\345\226\0025\271\2400`k\010\002\376=~\236\377\001X\304\311\352J" " -peer0.org1.example.com | "2019-05-02 01:31:35.145 UTC [committer.txvalidator] validateTx -> DEBU 336a Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:35.152 UTC [common.configtx] addToMap -> DEBU 336b Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-05-02 01:31:35.152 UTC [common.configtx] addToMap -> DEBU 336c Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:31:35.152 UTC [common.configtx] addToMap -> DEBU 336d Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 336e Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 336f Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 3370 Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 3371 Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 3372 Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 3373 Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.155 UTC [common.configtx] addToMap -> DEBU 3374 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.155 UTC [common.configtx] addToMap -> DEBU 3375 Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.155 UTC [common.configtx] addToMap -> DEBU 3376 Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-05-02 01:31:35.155 UTC [common.configtx] addToMap -> DEBU 3377 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 3378 Adding to config map: [Group] /Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 3379 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 337a Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 337b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 337c Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 337d Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 337e Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.157 UTC [common.configtx] addToMap -> DEBU 337f Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.157 UTC [common.configtx] addToMap -> DEBU 3380 Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-05-02 01:31:35.157 UTC [common.configtx] addToMap -> DEBU 3381 Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-05-02 01:31:35.158 UTC [common.configtx] addToMap -> DEBU 3382 Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.158 UTC [common.configtx] addToMap -> DEBU 3383 Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.158 UTC [common.configtx] addToMap -> DEBU 3384 Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.158 UTC [common.configtx] addToMap -> DEBU 3385 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.159 UTC [common.configtx] addToMap -> DEBU 3386 Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.160 UTC [common.configtx] verifyDeltaSet -> DEBU 3387 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.160 UTC [common.configtx] verifyDeltaSet -> DEBU 3388 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.162 UTC [common.configtx] verifyDeltaSet -> DEBU 3389 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.162 UTC [common.configtx] verifyDeltaSet -> DEBU 338a Processing change to key: [Group] /Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.162 UTC [common.configtx] verifyDeltaSet -> DEBU 338b Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.162 UTC [common.configtx] verifyDeltaSet -> DEBU 338c Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.163 UTC [common.configtx] verifyDeltaSet -> DEBU 338d Processing change to key: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:31:35.163 UTC [common.configtx] policyForItem -> DEBU 338e Getting policy for item Application with mod_policy Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.164 UTC [policies] Manager -> DEBU 338f Manager Channel looking up path []" -peer0.org1.example.com | "2019-05-02 01:31:35.164 UTC [policies] Manager -> DEBU 3390 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:31:35.164 UTC [policies] Manager -> DEBU 3391 Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:31:35.165 UTC [policies] Manager -> DEBU 3392 Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-05-02 01:31:35.165 UTC [policies] Manager -> DEBU 3393 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:31:35.165 UTC [policies] Manager -> DEBU 3394 Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:31:35.165 UTC [policies] Manager -> DEBU 3395 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-05-02 01:31:35.165 UTC [policies] Manager -> DEBU 3396 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.166 UTC [policies] Manager -> DEBU 3397 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.166 UTC [policies] Evaluate -> DEBU 3398 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -peer0.org1.example.com | "2019-05-02 01:31:35.166 UTC [policies] Evaluate -> DEBU 3399 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.167 UTC [policies] Evaluate -> DEBU 339a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -peer0.org1.example.com | "2019-05-02 01:31:35.167 UTC [cauthdsl] deduplicate -> WARN 339b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer0.org1.example.com | "2019-05-02 01:31:35.167 UTC [cauthdsl] func1 -> DEBU 339c 0xc0039cf5c0 gate 1556760695167735400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.167 UTC [cauthdsl] func2 -> DEBU 339d 0xc0039cf5c0 signed by 0 principal evaluation starts (used [false false false])" -peer0.org1.example.com | "2019-05-02 01:31:35.168 UTC [cauthdsl] func2 -> DEBU 339e 0xc0039cf5c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.170 UTC [cauthdsl] func2 -> DEBU 339f 0xc0039cf5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:35.171 UTC [cauthdsl] func2 -> DEBU 33a0 0xc0039cf5c0 processing identity 1 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.171 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 33a1 Checking if identity satisfies ADMIN role for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.171 UTC [cauthdsl] func2 -> DEBU 33a2 0xc0039cf5c0 principal matched by identity 1" -peer0.org1.example.com | "2019-05-02 01:31:35.171 UTC [msp.identity] Verify -> DEBU 33a3 Verify: digest = 00000000 0a 93 54 f3 ca 50 66 cd 2e b2 91 c4 a1 99 4b fe |..T..Pf.......K.| -peer0.org1.example.com | 00000010 78 04 08 22 86 5c 95 44 eb 44 40 b9 7f 21 df a9 |x..".\.D.D@..!..|" -peer0.org1.example.com | "2019-05-02 01:31:35.171 UTC [msp.identity] Verify -> DEBU 33a4 Verify: sig = 00000000 30 44 02 20 73 e6 28 8c bd 51 8c f6 e4 26 ca 3c |0D. s.(..Q...&.<| -peer0.org1.example.com | 00000010 a7 51 9f 0f f8 98 78 97 9a 0a 5b de 1d 2f 26 8a |.Q....x...[../&.| -peer0.org1.example.com | 00000020 4a bd b1 0a 02 20 7d 21 70 08 83 04 6d 41 e4 2d |J.... }!p...mA.-| -peer0.org1.example.com | 00000030 97 f9 e7 46 95 6f 32 34 86 6a f5 6d 90 57 38 e1 |...F.o24.j.m.W8.| -peer0.org1.example.com | 00000040 82 3f 3a 29 69 89 |.?:)i.|" -peer0.org1.example.com | "2019-05-02 01:31:35.172 UTC [cauthdsl] func2 -> DEBU 33a5 0xc0039cf5c0 principal evaluation succeeds for identity 1" -peer0.org1.example.com | "2019-05-02 01:31:35.173 UTC [cauthdsl] func1 -> DEBU 33a6 0xc0039cf5c0 gate 1556760695167735400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.173 UTC [policies] Evaluate -> DEBU 33a7 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.173 UTC [policies] Evaluate -> DEBU 33a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.173 UTC [policies] Evaluate -> DEBU 33a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -peer0.org1.example.com | "2019-05-02 01:31:35.173 UTC [cauthdsl] deduplicate -> WARN 33aa De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer0.org1.example.com | "2019-05-02 01:31:35.174 UTC [cauthdsl] func1 -> DEBU 33ab 0xc0039cfcb0 gate 1556760695174108600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.174 UTC [cauthdsl] func2 -> DEBU 33ac 0xc0039cfcb0 signed by 0 principal evaluation starts (used [false false false])" -peer0.org1.example.com | "2019-05-02 01:31:35.175 UTC [cauthdsl] func2 -> DEBU 33ad 0xc0039cfcb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.175 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 33ae Checking if identity satisfies ADMIN role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.176 UTC [cauthdsl] func2 -> DEBU 33af 0xc0039cfcb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.176 UTC [msp.identity] Verify -> DEBU 33b0 Verify: digest = 00000000 96 5b d6 35 6e 24 ba 8d ea c0 f3 54 be 64 a0 8e |.[.5n$.....T.d..| -peer0.org1.example.com | 00000010 d7 2c 6e 83 3b c0 ba 63 fa 91 e5 8e d7 f6 d2 45 |.,n.;..c.......E|" -peer0.org1.example.com | "2019-05-02 01:31:35.176 UTC [msp.identity] Verify -> DEBU 33b1 Verify: sig = 00000000 30 44 02 20 06 17 d3 85 97 6c 5b f8 2b ee 4f 8b |0D. .....l[.+.O.| -peer0.org1.example.com | 00000010 ef 9b 4d fa 3e e1 e8 50 ac 6a 0b 7c dd d7 cd af |..M.>..P.j.|....| -peer0.org1.example.com | 00000020 ef 6f e1 14 02 20 7a 9c e6 c9 a1 11 d2 73 46 49 |.o... z......sFI| -peer0.org1.example.com | 00000030 45 b3 5c 7b 74 db 4e 00 94 b3 b0 43 5c b9 74 72 |E.\{t.N....C\.tr| -peer0.org1.example.com | 00000040 0b fb bb cd 10 b7 |......|" -peer0.org1.example.com | "2019-05-02 01:31:35.177 UTC [cauthdsl] func2 -> DEBU 33b2 0xc0039cfcb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.178 UTC [cauthdsl] func1 -> DEBU 33b3 0xc0039cfcb0 gate 1556760695174108600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.178 UTC [policies] Evaluate -> DEBU 33b4 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.178 UTC [policies] Evaluate -> DEBU 33b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.179 UTC [policies] Evaluate -> DEBU 33b6 Signature set satisfies policy /Channel/Application/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.179 UTC [policies] Evaluate -> DEBU 33b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.179 UTC [common.configtx] recurseConfigMap -> DEBU 33b8 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.180 UTC [common.configtx] recurseConfigMap -> DEBU 33b9 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.188 UTC [common.configtx] recurseConfigMap -> DEBU 33ba Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.189 UTC [common.configtx] recurseConfigMap -> DEBU 33bb Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.190 UTC [common.configtx] recurseConfigMap -> DEBU 33bc Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.191 UTC [common.configtx] recurseConfigMap -> DEBU 33bd Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.193 UTC [common.configtx] recurseConfigMap -> DEBU 33be Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.195 UTC [common.configtx] recurseConfigMap -> DEBU 33bf Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.196 UTC [common.configtx] recurseConfigMap -> DEBU 33c0 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.197 UTC [common.configtx] recurseConfigMap -> DEBU 33c1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.200 UTC [common.configtx] recurseConfigMap -> DEBU 33c2 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.200 UTC [common.configtx] recurseConfigMap -> DEBU 33c3 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.201 UTC [common.configtx] recurseConfigMap -> DEBU 33c4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.201 UTC [common.configtx] recurseConfigMap -> DEBU 33c5 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.203 UTC [common.configtx] recurseConfigMap -> DEBU 33c6 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.203 UTC [common.configtx] recurseConfigMap -> DEBU 33c7 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.203 UTC [common.configtx] recurseConfigMap -> DEBU 33c8 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.204 UTC [common.configtx] recurseConfigMap -> DEBU 33c9 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.208 UTC [common.configtx] recurseConfigMap -> DEBU 33ca Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.208 UTC [common.configtx] recurseConfigMap -> DEBU 33cb Setting policy for key Admins to " -peer0.org1.example.com | "2019-05-02 01:31:35.208 UTC [common.configtx] recurseConfigMap -> DEBU 33cc Setting policy for key Endorsement to " -peer0.org1.example.com | "2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33cd Setting policy for key LifecycleEndorsement to " -peer0.org1.example.com | "2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33ce Setting policy for key Readers to " -peer0.org1.example.com | "2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33cf Setting policy for key Writers to " -peer0.org1.example.com | "2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33d0 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33d1 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33d2 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-05-02 01:31:35.210 UTC [common.channelconfig] NewStandardValues -> DEBU 33d3 Initializing protos for *channelconfig.ChannelProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.210 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d4 Processing field: HashingAlgorithm" -peer0.org1.example.com | "2019-05-02 01:31:35.210 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d5 Processing field: BlockDataHashingStructure" -peer0.org1.example.com | "2019-05-02 01:31:35.215 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d6 Processing field: OrdererAddresses" -peer0.org1.example.com | "2019-05-02 01:31:35.215 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d7 Processing field: Consortium" -peer0.org1.example.com | "2019-05-02 01:31:35.216 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d8 Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:31:35.216 UTC [common.channelconfig] NewStandardValues -> DEBU 33d9 Initializing protos for *channelconfig.OrdererProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.216 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33da Processing field: ConsensusType" -peer0.org1.example.com | "2019-05-02 01:31:35.216 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33db Processing field: BatchSize" -peer0.org1.example.com | "2019-05-02 01:31:35.216 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33dc Processing field: BatchTimeout" -peer0.org1.example.com | "2019-05-02 01:31:35.217 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33dd Processing field: KafkaBrokers" -peer0.org1.example.com | "2019-05-02 01:31:35.217 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33de Processing field: ChannelRestrictions" -peer0.org1.example.com | "2019-05-02 01:31:35.217 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33df Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:31:35.217 UTC [common.channelconfig] NewStandardValues -> DEBU 33e0 Initializing protos for *channelconfig.OrdererOrgProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.217 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33e1 Processing field: Endpoints" -peer0.org1.example.com | "2019-05-02 01:31:35.217 UTC [common.channelconfig] NewStandardValues -> DEBU 33e2 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.217 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33e3 Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.218 UTC [common.channelconfig] validateMSP -> DEBU 33e4 Setting up MSP for org OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:31:35.218 UTC [msp] newBccspMsp -> DEBU 33e5 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:31:35.218 UTC [msp] New -> DEBU 33e6 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:31:35.218 UTC [msp] Setup -> DEBU 33e7 Setting up MSP instance OrdererMSP" -peer0.org1.example.com | "2019-05-02 01:31:35.218 UTC [msp.identity] newIdentity -> DEBU 33e8 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.219 UTC [msp.identity] newIdentity -> DEBU 33e9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.219 UTC [msp] Validate -> DEBU 33ea MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:35.220 UTC [common.channelconfig] NewStandardValues -> DEBU 33eb Initializing protos for *channelconfig.ApplicationProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.220 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33ec Processing field: ACLs" -peer0.org1.example.com | "2019-05-02 01:31:35.220 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33ed Processing field: Capabilities" -peer0.org1.example.com | "2019-05-02 01:31:35.220 UTC [common.channelconfig] NewStandardValues -> DEBU 33ee Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.220 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33ef Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:31:35.220 UTC [common.channelconfig] NewStandardValues -> DEBU 33f0 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.220 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33f1 Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.221 UTC [common.channelconfig] Validate -> DEBU 33f2 Anchor peers for org Org3MSP are " -peer0.org1.example.com | "2019-05-02 01:31:35.221 UTC [common.channelconfig] validateMSP -> DEBU 33f3 Setting up MSP for org Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.222 UTC [msp] newBccspMsp -> DEBU 33f4 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:31:35.222 UTC [msp] New -> DEBU 33f5 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:31:35.223 UTC [msp] Setup -> DEBU 33f6 Setting up MSP instance Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.223 UTC [msp.identity] newIdentity -> DEBU 33f7 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB -peer0.org1.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc -peer0.org1.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.224 UTC [msp.identity] newIdentity -> DEBU 33f8 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y -peer0.org1.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr -peer0.org1.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky -peer0.org1.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV -peer0.org1.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO -peer0.org1.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ -peer0.org1.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.225 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 33f9 Checking if identity satisfies role [CLIENT] for Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.226 UTC [msp] Validate -> DEBU 33fa MSP Org3MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:35.226 UTC [msp] getCertificationChain -> DEBU 33fb MSP Org3MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:35.228 UTC [msp] hasOURole -> DEBU 33fc MSP Org3MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:31:35.228 UTC [msp] getCertificationChain -> DEBU 33fd MSP Org3MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:35.228 UTC [common.channelconfig] NewStandardValues -> DEBU 33fe Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.228 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33ff Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:31:35.229 UTC [common.channelconfig] NewStandardValues -> DEBU 3400 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.229 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3401 Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.232 UTC [common.channelconfig] Validate -> DEBU 3402 Anchor peers for org Org1MSP are anchor_peers: " -peer0.org1.example.com | "2019-05-02 01:31:35.232 UTC [common.channelconfig] validateMSP -> DEBU 3403 Setting up MSP for org Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.235 UTC [msp] newBccspMsp -> DEBU 3404 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:31:35.235 UTC [msp] New -> DEBU 3405 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:31:35.236 UTC [msp] Setup -> DEBU 3406 Setting up MSP instance Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.239 UTC [msp.identity] newIdentity -> DEBU 3407 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.239 UTC [msp.identity] newIdentity -> DEBU 3408 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.240 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3409 Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.241 UTC [msp] Validate -> DEBU 340a MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:35.242 UTC [msp] getCertificationChain -> DEBU 340b MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:35.242 UTC [msp] hasOURole -> DEBU 340c MSP Org1MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:31:35.242 UTC [msp] getCertificationChain -> DEBU 340d MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:35.243 UTC [common.channelconfig] NewStandardValues -> DEBU 340e Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.243 UTC [common.channelconfig] initializeProtosStruct -> DEBU 340f Processing field: AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:31:35.244 UTC [common.channelconfig] NewStandardValues -> DEBU 3410 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-05-02 01:31:35.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3412 Processing field: MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.246 UTC [common.channelconfig] Validate -> DEBU 3413 Anchor peers for org Org2MSP are anchor_peers: " -peer0.org1.example.com | "2019-05-02 01:31:35.247 UTC [common.channelconfig] validateMSP -> DEBU 3414 Setting up MSP for org Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.247 UTC [msp] newBccspMsp -> DEBU 3415 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-05-02 01:31:35.247 UTC [msp] New -> DEBU 3416 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-05-02 01:31:35.245 UTC [comm.grpc.server] 1 -> INFO 3411 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.245Z grpc.peer_address=192.168.240.6:45148 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=125.6µs -peer0.org1.example.com | "2019-05-02 01:31:35.247 UTC [msp] Setup -> DEBU 3417 Setting up MSP instance Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.250 UTC [msp.identity] newIdentity -> DEBU 3418 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.251 UTC [msp.identity] newIdentity -> DEBU 3419 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.251 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 341a Checking if identity satisfies role [CLIENT] for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.251 UTC [msp] Validate -> DEBU 341b MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:35.251 UTC [msp] getCertificationChain -> DEBU 341c MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:35.252 UTC [msp] hasOURole -> DEBU 341d MSP Org2MSP checking if the identity is a client" -peer0.org1.example.com | "2019-05-02 01:31:35.252 UTC [msp] getCertificationChain -> DEBU 341e MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:35.252 UTC [msp] Setup -> DEBU 341f Setting up the MSP manager (4 msps)" -peer0.org1.example.com | "2019-05-02 01:31:35.252 UTC [msp] Setup -> DEBU 3420 MSP manager setup complete, setup 4 msps" -peer0.org1.example.com | "2019-05-02 01:31:35.252 UTC [policies] NewManagerImpl -> DEBU 3421 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:31:35.253 UTC [policies] NewManagerImpl -> DEBU 3422 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:31:35.253 UTC [policies] NewManagerImpl -> DEBU 3423 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:31:35.253 UTC [policies] NewManagerImpl -> DEBU 3424 Proposed new policy Writers for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:31:35.253 UTC [policies] NewManagerImpl -> DEBU 3425 Proposed new policy Admins for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:31:35.254 UTC [policies] NewManagerImpl -> DEBU 3426 Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:31:35.254 UTC [policies] NewManagerImpl -> DEBU 3427 Proposed new policy Readers for Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:31:35.254 UTC [policies] NewManagerImpl -> DEBU 3428 Proposed new policy Endorsement for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.254 UTC [policies] NewManagerImpl -> DEBU 3429 Proposed new policy Readers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.254 UTC [policies] NewManagerImpl -> DEBU 342a Proposed new policy Writers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.255 UTC [policies] NewManagerImpl -> DEBU 342b Proposed new policy Admins for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.255 UTC [policies] NewManagerImpl -> DEBU 342c Proposed new policy Writers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.256 UTC [policies] NewManagerImpl -> DEBU 342d Proposed new policy Admins for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.256 UTC [policies] NewManagerImpl -> DEBU 342e Proposed new policy Endorsement for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.256 UTC [policies] NewManagerImpl -> DEBU 342f Proposed new policy Readers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.256 UTC [policies] NewManagerImpl -> DEBU 3430 Proposed new policy Readers for Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.256 UTC [policies] NewManagerImpl -> DEBU 3431 Proposed new policy Writers for Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.258 UTC [policies] NewManagerImpl -> DEBU 3432 Proposed new policy Admins for Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.258 UTC [policies] NewManagerImpl -> DEBU 3433 Proposed new policy Endorsement for Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.259 UTC [policies] NewManagerImpl -> DEBU 3434 Proposed new policy Writers for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:31:35.259 UTC [policies] NewManagerImpl -> DEBU 3435 Proposed new policy Admins for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:31:35.259 UTC [policies] NewManagerImpl -> DEBU 3436 Proposed new policy Endorsement for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:31:35.259 UTC [policies] NewManagerImpl -> DEBU 3437 Proposed new policy LifecycleEndorsement for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:31:35.260 UTC [policies] NewManagerImpl -> DEBU 3438 Proposed new policy Readers for Channel/Application" -peer0.org1.example.com | "2019-05-02 01:31:35.260 UTC [policies] NewManagerImpl -> DEBU 3439 Proposed new policy Admins for Channel" -peer0.org1.example.com | "2019-05-02 01:31:35.260 UTC [policies] NewManagerImpl -> DEBU 343a Proposed new policy Readers for Channel" -peer0.org1.example.com | "2019-05-02 01:31:35.261 UTC [policies] NewManagerImpl -> DEBU 343b Proposed new policy Writers for Channel" -peer0.org1.example.com | "2019-05-02 01:31:35.262 UTC [common.configtx] addToMap -> DEBU 343c Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-05-02 01:31:35.263 UTC [common.configtx] addToMap -> DEBU 343d Adding to config map: [Group] /Channel/Orderer" -peer0.org1.example.com | "2019-05-02 01:31:35.266 UTC [common.configtx] addToMap -> DEBU 343e Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:31:35.272 UTC [common.configtx] addToMap -> DEBU 343f Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.273 UTC [common.configtx] addToMap -> DEBU 3440 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.273 UTC [common.configtx] addToMap -> DEBU 3441 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.274 UTC [common.configtx] addToMap -> DEBU 3442 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.276 UTC [common.configtx] addToMap -> DEBU 3443 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -peer0.org1.example.com | "2019-05-02 01:31:35.277 UTC [common.configtx] addToMap -> DEBU 3444 Adding to config map: [Value] /Channel/Orderer/BatchSize" -peer0.org1.example.com | "2019-05-02 01:31:35.277 UTC [common.configtx] addToMap -> DEBU 3445 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -peer0.org1.example.com | "2019-05-02 01:31:35.277 UTC [msp.identity] Sign -> DEBU 3446 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:31:35.278 UTC [msp.identity] Sign -> DEBU 3447 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:31:35.278 UTC [common.configtx] addToMap -> DEBU 3448 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -peer0.org1.example.com | "2019-05-02 01:31:35.279 UTC [common.configtx] addToMap -> DEBU 3449 Adding to config map: [Value] /Channel/Orderer/Capabilities" -peer0.org1.example.com | "2019-05-02 01:31:35.279 UTC [common.configtx] addToMap -> DEBU 344b Adding to config map: [Policy] /Channel/Orderer/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.279 UTC [gossip.comm] authenticateRemotePeer -> DEBU 344a Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.6:45148" -peer0.org1.example.com | "2019-05-02 01:31:35.279 UTC [common.configtx] addToMap -> DEBU 344c Adding to config map: [Policy] /Channel/Orderer/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.280 UTC [common.configtx] addToMap -> DEBU 344d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-05-02 01:31:35.281 UTC [gossip.comm] authenticateRemotePeer -> DEBU 344e Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:45148" -peer0.org1.example.com | "2019-05-02 01:31:35.281 UTC [msp.identity] Verify -> DEBU 344f Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-05-02 01:31:35.282 UTC [msp.identity] Verify -> DEBU 3450 Verify: sig = 00000000 30 45 02 21 00 b5 8c cf 64 6a ac 61 df 29 31 19 |0E.!....dj.a.)1.| -peer0.org1.example.com | 00000010 55 1b 70 99 06 cb 8c 24 bf 9b 06 bc ee fb f9 22 |U.p....$......."| -peer0.org1.example.com | 00000020 3f 77 c2 57 32 02 20 2c 10 c6 75 b2 5e 0d 2c 8b |?w.W2. ,..u.^.,.| -peer0.org1.example.com | 00000030 da 5d d9 e1 6e e8 5f be e9 4b b0 e7 cb dc d3 8a |.]..n._..K......| -peer0.org1.example.com | 00000040 a6 ca 59 6a 10 64 2f |..Yj.d/|" -peer0.org1.example.com | "2019-05-02 01:31:35.282 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3451 Authenticated 192.168.240.6:45148" -peer0.org1.example.com | "2019-05-02 01:31:35.282 UTC [gossip.comm] GossipStream -> DEBU 3452 Servicing 192.168.240.6:45148" -peer0.org1.example.com | "2019-05-02 01:31:35.280 UTC [common.configtx] addToMap -> DEBU 3453 Adding to config map: [Policy] /Channel/Orderer/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.283 UTC [gossip.comm] serviceConnection -> DEBU 3454 Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:31:35.283 UTC [gossip.comm] func2 -> DEBU 3455 Client 192.168.240.6:44982 disconnected" -peer0.org1.example.com | "2019-05-02 01:31:35.283 UTC [comm.grpc.server] 1 -> INFO 3456 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.6:44982 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=46.8952627s -peer0.org1.example.com | "2019-05-02 01:31:35.286 UTC [common.configtx] addToMap -> DEBU 3457 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-05-02 01:31:35.286 UTC [gossip.comm] writeToStream -> DEBU 3458 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:31:35.287 UTC [gossip.comm] serviceConnection -> DEBU 3459 Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:31:35.288 UTC [gossip.comm] readFromStream -> DEBU 345b a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -peer0.org1.example.com | "2019-05-02 01:31:35.287 UTC [gossip.comm] func2 -> DEBU 345c Client 192.168.240.6:45148 disconnected" -peer0.org1.example.com | "2019-05-02 01:31:35.288 UTC [grpc] infof -> DEBU 345f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:35.289 UTC [comm.grpc.server] 1 -> INFO 3460 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:31:45.276Z grpc.peer_address=192.168.240.6:45148 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.1758ms -peer0.org1.example.com | "2019-05-02 01:31:35.288 UTC [gossip.comm] writeToStream -> DEBU 345d Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:31:35.288 UTC [gossip.comm] readFromStream -> DEBU 345e a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -peer0.org1.example.com | "2019-05-02 01:31:35.286 UTC [common.configtx] addToMap -> DEBU 345a Adding to config map: [Group] /Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.292 UTC [common.configtx] addToMap -> DEBU 3461 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.293 UTC [common.configtx] addToMap -> DEBU 3462 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.293 UTC [common.configtx] addToMap -> DEBU 3463 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.294 UTC [common.configtx] addToMap -> DEBU 3464 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.294 UTC [common.configtx] addToMap -> DEBU 3465 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.294 UTC [common.configtx] addToMap -> DEBU 3466 Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.295 UTC [common.configtx] addToMap -> DEBU 3467 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:31:35.295 UTC [common.configtx] addToMap -> DEBU 3468 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.295 UTC [common.configtx] addToMap -> DEBU 3469 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.295 UTC [common.configtx] addToMap -> DEBU 346a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.296 UTC [common.configtx] addToMap -> DEBU 346b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.296 UTC [common.configtx] addToMap -> DEBU 346c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.297 UTC [common.configtx] addToMap -> DEBU 346d Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.298 UTC [grpc] infof -> DEBU 346e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:35.298 UTC [common.configtx] addToMap -> DEBU 346f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -peer0.org1.example.com | "2019-05-02 01:31:35.299 UTC [common.configtx] addToMap -> DEBU 3470 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.299 UTC [common.configtx] addToMap -> DEBU 3471 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.299 UTC [common.configtx] addToMap -> DEBU 3472 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.299 UTC [common.configtx] addToMap -> DEBU 3473 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.300 UTC [common.configtx] addToMap -> DEBU 3474 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.300 UTC [common.configtx] addToMap -> DEBU 3475 Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-05-02 01:31:35.300 UTC [common.configtx] addToMap -> DEBU 3476 Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-05-02 01:31:35.301 UTC [common.configtx] addToMap -> DEBU 3477 Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.302 UTC [common.configtx] addToMap -> DEBU 3478 Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.302 UTC [common.configtx] addToMap -> DEBU 3479 Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.302 UTC [common.configtx] addToMap -> DEBU 347a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-05-02 01:31:35.302 UTC [common.configtx] addToMap -> DEBU 347b Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.302 UTC [common.configtx] addToMap -> DEBU 347c Adding to config map: [Value] /Channel/HashingAlgorithm" -peer0.org1.example.com | "2019-05-02 01:31:35.303 UTC [common.configtx] addToMap -> DEBU 347d Adding to config map: [Value] /Channel/BlockDataHashingStructure" -peer0.org1.example.com | "2019-05-02 01:31:35.303 UTC [common.configtx] addToMap -> DEBU 347e Adding to config map: [Value] /Channel/OrdererAddresses" -peer0.org1.example.com | "2019-05-02 01:31:35.304 UTC [common.configtx] addToMap -> DEBU 347f Adding to config map: [Value] /Channel/Capabilities" -peer0.org1.example.com | "2019-05-02 01:31:35.304 UTC [common.configtx] addToMap -> DEBU 3480 Adding to config map: [Value] /Channel/Consortium" -peer0.org1.example.com | "2019-05-02 01:31:35.304 UTC [common.configtx] addToMap -> DEBU 3481 Adding to config map: [Policy] /Channel/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.304 UTC [common.configtx] addToMap -> DEBU 3482 Adding to config map: [Policy] /Channel/Writers" -peer0.org1.example.com | "2019-05-02 01:31:35.304 UTC [common.configtx] addToMap -> DEBU 3483 Adding to config map: [Policy] /Channel/Admins" -peer0.org1.example.com | "2019-05-02 01:31:35.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 3484 As expected, current configuration has policy '/Channel/Readers'" -peer0.org1.example.com | "2019-05-02 01:31:35.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 3485 As expected, current configuration has policy '/Channel/Writers'" -peer0.org1.example.com | "2019-05-02 01:31:35.305 UTC [policies] Manager -> DEBU 3486 Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-05-02 01:31:35.307 UTC [policies] Manager -> DEBU 3487 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:31:35.307 UTC [policies] Manager -> DEBU 3488 Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:31:35.307 UTC [policies] Manager -> DEBU 3489 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-05-02 01:31:35.308 UTC [policies] Manager -> DEBU 348a Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.308 UTC [policies] Manager -> DEBU 348b Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.308 UTC [policies] Manager -> DEBU 348c Manager Channel/Application has managers Org3MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.309 UTC [common.channelconfig] LogSanityChecks -> DEBU 348d As expected, current configuration has policy '/Channel/Application/Readers'" -peer0.org1.example.com | "2019-05-02 01:31:35.309 UTC [common.channelconfig] LogSanityChecks -> DEBU 348e As expected, current configuration has policy '/Channel/Application/Writers'" -peer0.org1.example.com | "2019-05-02 01:31:35.309 UTC [common.channelconfig] LogSanityChecks -> DEBU 348f As expected, current configuration has policy '/Channel/Application/Admins'" -peer0.org1.example.com | "2019-05-02 01:31:35.310 UTC [policies] Manager -> DEBU 3490 Manager Channel looking up path [Orderer]" -peer0.org1.example.com | "2019-05-02 01:31:35.310 UTC [policies] Manager -> DEBU 3491 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-05-02 01:31:35.310 UTC [policies] Manager -> DEBU 3492 Manager Channel has managers Application" -peer0.org1.example.com | "2019-05-02 01:31:35.310 UTC [policies] Manager -> DEBU 3493 Manager Channel/Orderer looking up path []" -peer0.org1.example.com | "2019-05-02 01:31:35.311 UTC [policies] Manager -> DEBU 3494 Manager Channel/Orderer has managers OrdererOrg" -peer0.org1.example.com | "2019-05-02 01:31:35.311 UTC [common.channelconfig] LogSanityChecks -> DEBU 3495 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -peer0.org1.example.com | "2019-05-02 01:31:35.311 UTC [common.capabilities] Supported -> DEBU 3496 Application capability V2_0 is supported and is enabled" -peer0.org1.example.com | "2019-05-02 01:31:35.311 UTC [common.capabilities] Supported -> DEBU 3497 Channel capability V2_0 is supported and is enabled" -peer0.org1.example.com | "2019-05-02 01:31:35.312 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3498 Processing new config for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:35.315 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3499 Calling out because config was updated for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:35.315 UTC [gossip.service] updateAnchors -> DEBU 349a Org3MSP anchor peers: []" -peer0.org1.example.com | "2019-05-02 01:31:35.315 UTC [gossip.service] updateAnchors -> DEBU 349b Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -peer0.org1.example.com | "2019-05-02 01:31:35.316 UTC [gossip.service] updateAnchors -> DEBU 349c Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" -peer0.org1.example.com | "2019-05-02 01:31:35.316 UTC [gossip.service] updateAnchors -> DEBU 349d Creating state provider for chainID businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:35.316 UTC [msp] DeserializeIdentity -> DEBU 349e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.316 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 349f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.316 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.316 UTC [policies] Evaluate -> DEBU 34a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.320 UTC [policies] Evaluate -> DEBU 34a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.318 UTC [comm.grpc.server] 1 -> INFO 34a2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.314Z grpc.peer_address=192.168.240.5:55380 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=116.7µs -peer0.org1.example.com | "2019-05-02 01:31:35.320 UTC [policies] Evaluate -> DEBU 34a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.321 UTC [cauthdsl] func1 -> DEBU 34a5 0xc003f6d2d0 gate 1556760695321137300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.321 UTC [cauthdsl] func2 -> DEBU 34a6 0xc003f6d2d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.321 UTC [cauthdsl] func2 -> DEBU 34a7 0xc003f6d2d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.321 UTC [cauthdsl] func2 -> DEBU 34a8 0xc003f6d2d0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.321 UTC [msp.identity] Verify -> DEBU 34a9 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:35.322 UTC [msp.identity] Verify -> DEBU 34aa Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:35.322 UTC [cauthdsl] func2 -> DEBU 34ab 0xc003f6d2d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.323 UTC [cauthdsl] func1 -> DEBU 34ac 0xc003f6d2d0 gate 1556760695321137300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.323 UTC [policies] Evaluate -> DEBU 34ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.324 UTC [policies] Evaluate -> DEBU 34ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.324 UTC [policies] Evaluate -> DEBU 34af Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.324 UTC [policies] Evaluate -> DEBU 34b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.325 UTC [msp] DeserializeIdentity -> DEBU 34b1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b2 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b3 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.327 UTC [policies] Evaluate -> DEBU 34b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.327 UTC [policies] Evaluate -> DEBU 34b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.327 UTC [policies] Evaluate -> DEBU 34b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.327 UTC [cauthdsl] func1 -> DEBU 34b7 0xc00370c3b0 gate 1556760695327806100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.328 UTC [cauthdsl] func2 -> DEBU 34b8 0xc00370c3b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.328 UTC [cauthdsl] func2 -> DEBU 34b9 0xc00370c3b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.328 UTC [cauthdsl] func2 -> DEBU 34ba 0xc00370c3b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.335 UTC [msp.identity] Verify -> DEBU 34bc Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:35.331 UTC [msp.identity] Sign -> DEBU 34bb Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:31:35.336 UTC [msp.identity] Verify -> DEBU 34bd Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:35.337 UTC [cauthdsl] func2 -> DEBU 34bf 0xc00370c3b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.336 UTC [msp.identity] Sign -> DEBU 34be Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:31:35.337 UTC [cauthdsl] func1 -> DEBU 34c0 0xc00370c3b0 gate 1556760695327806100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.337 UTC [policies] Evaluate -> DEBU 34c1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.340 UTC [policies] Evaluate -> DEBU 34c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.338 UTC [gossip.comm] authenticateRemotePeer -> DEBU 34c2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:55380" -peer0.org1.example.com | "2019-05-02 01:31:35.340 UTC [gossip.comm] authenticateRemotePeer -> DEBU 34c5 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:55380" -peer0.org1.example.com | "2019-05-02 01:31:35.341 UTC [msp] DeserializeIdentity -> DEBU 34c6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.340 UTC [policies] Evaluate -> DEBU 34c4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.341 UTC [policies] Evaluate -> DEBU 34c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.341 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34c8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.342 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34ca Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.341 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.342 UTC [policies] Evaluate -> DEBU 34cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.342 UTC [policies] Evaluate -> DEBU 34cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.342 UTC [policies] Evaluate -> DEBU 34ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.342 UTC [msp] DeserializeIdentity -> DEBU 34cb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.343 UTC [cauthdsl] func1 -> DEBU 34cf 0xc00370d470 gate 1556760695342908900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.343 UTC [cauthdsl] func2 -> DEBU 34d0 0xc00370d470 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.343 UTC [cauthdsl] func2 -> DEBU 34d1 0xc00370d470 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.343 UTC [cauthdsl] func2 -> DEBU 34d3 0xc00370d470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-05-02 01:31:35.343 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.343 UTC [cauthdsl] func2 -> DEBU 34d4 0xc00370d470 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.344 UTC [cauthdsl] func1 -> DEBU 34d5 0xc00370d470 gate 1556760695342908900 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.344 UTC [policies] Evaluate -> DEBU 34d7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.344 UTC [policies] Evaluate -> DEBU 34d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.344 UTC [policies] Evaluate -> DEBU 34d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.344 UTC [cauthdsl] func1 -> DEBU 34da 0xc00370dcb0 gate 1556760695344872500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.343 UTC [msp] DeserializeIdentity -> DEBU 34d6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.345 UTC [cauthdsl] func2 -> DEBU 34db 0xc00370dcb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.345 UTC [cauthdsl] func2 -> DEBU 34dc 0xc00370dcb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.345 UTC [cauthdsl] func2 -> DEBU 34dd 0xc00370dcb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.345 UTC [msp.identity] Verify -> DEBU 34de Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:35.346 UTC [msp.identity] Verify -> DEBU 34df Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:35.346 UTC [cauthdsl] func2 -> DEBU 34e1 0xc00370dcb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.348 UTC [cauthdsl] func1 -> DEBU 34e2 0xc00370dcb0 gate 1556760695344872500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.345 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.348 UTC [policies] Evaluate -> DEBU 34e3 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.349 UTC [policies] Evaluate -> DEBU 34e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.350 UTC [policies] Evaluate -> DEBU 34e6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.352 UTC [policies] Evaluate -> DEBU 34e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.352 UTC [gossip.gossip] JoinChan -> INFO 34e8 Joining gossip network of channel businesschannel with 3 organizations" -peer0.org1.example.com | "2019-05-02 01:31:35.353 UTC [gossip.gossip] learnAnchorPeers -> INFO 34ea Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer0.org1.example.com | "2019-05-02 01:31:35.353 UTC [gossip.discovery] Connect -> DEBU 34eb Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " -peer0.org1.example.com | "2019-05-02 01:31:35.354 UTC [gossip.discovery] Connect -> DEBU 34ec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.349 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34e4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.354 UTC [gossip.gossip] learnAnchorPeers -> INFO 34ed No configured anchor peers of Org3MSP for channel businesschannel to learn about" -peer0.org1.example.com | "2019-05-02 01:31:35.354 UTC [gossip.gossip] learnAnchorPeers -> INFO 34ee Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org1.example.com | "2019-05-02 01:31:35.355 UTC [gossip.gossip] learnAnchorPeers -> INFO 34ef Anchor peer with same endpoint, skipping connecting to myself" -peer0.org1.example.com | "2019-05-02 01:31:35.355 UTC [gossip.service] updateEndpoints -> DEBU 34f0 Updating endpoints for chainID%!(EXTRA string=businesschannel)" -peer0.org1.example.com | "2019-05-02 01:31:35.354 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34f1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.355 UTC [policies] Evaluate -> DEBU 34f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.356 UTC [msp] DeserializeIdentity -> DEBU 34f3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.357 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.357 UTC [msp] DeserializeIdentity -> DEBU 34f6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.358 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34f7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.359 UTC [peer] updateTrustedRoots -> DEBU 34f8 Updating trusted root authorities for channel businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:35.367 UTC [grpc] DialContext -> DEBU 34f9 parsed scheme: """ -peer0.org1.example.com | "2019-05-02 01:31:35.367 UTC [grpc] DialContext -> DEBU 34fa scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-05-02 01:31:35.368 UTC [grpc] UpdateState -> DEBU 34fb ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" -peer0.org1.example.com | "2019-05-02 01:31:35.368 UTC [grpc] switchBalancer -> DEBU 34fc ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-05-02 01:31:35.369 UTC [grpc] HandleSubConnStateChange -> DEBU 34fd pickfirstBalancer: HandleSubConnStateChange: 0xc002fbd670, CONNECTING" -peer0.org1.example.com | "2019-05-02 01:31:35.372 UTC [gossip.comm] func1 -> DEBU 34fe Got message: GossipMessage: Channel: , nonce: 5439724871213563240, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.372 UTC [gossip.gossip] handleMessage -> DEBU 34ff Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 5439724871213563240, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.373 UTC [gossip.gossip] handleMessage -> DEBU 3500 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3501 Got message: GossipMessage: Channel: , nonce: 5439724871213563240, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.376 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3502 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:35.376 UTC [msp] DeserializeIdentity -> DEBU 3503 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.377 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3504 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3505 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3506 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.378 UTC [policies] Evaluate -> DEBU 3507 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.378 UTC [policies] Evaluate -> DEBU 3508 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.378 UTC [policies] Evaluate -> DEBU 3509 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.379 UTC [cauthdsl] func1 -> DEBU 350a 0xc003b3aba0 gate 1556760695378997800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.379 UTC [cauthdsl] func2 -> DEBU 350b 0xc003b3aba0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.379 UTC [peer] buildTrustedRootsForChain -> DEBU 350c updating root CAs for channel [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.380 UTC [peer] buildTrustedRootsForChain -> DEBU 350d adding app root CAs for MSP [Org2MSP]" -peer0.org1.example.com | "2019-05-02 01:31:35.380 UTC [peer] buildTrustedRootsForChain -> DEBU 350e adding orderer root CAs for MSP [OrdererMSP]" -peer0.org1.example.com | "2019-05-02 01:31:35.380 UTC [peer] buildTrustedRootsForChain -> DEBU 350f adding app root CAs for MSP [Org3MSP]" -peer0.org1.example.com | "2019-05-02 01:31:35.380 UTC [peer] buildTrustedRootsForChain -> DEBU 3510 adding app root CAs for MSP [Org1MSP]" -peer0.org1.example.com | "2019-05-02 01:31:35.381 UTC [cauthdsl] func2 -> DEBU 3511 0xc003b3aba0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.382 UTC [cauthdsl] func2 -> DEBU 3512 0xc003b3aba0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.383 UTC [msp.identity] Verify -> DEBU 3513 Verify: digest = 00000000 4d 41 c5 85 aa 12 fe 69 1d be d6 e8 c0 4c cd a6 |MA.....i.....L..| -peer0.org1.example.com | 00000010 03 ae 31 6a d5 4e 88 a3 79 d7 18 61 b8 b7 da bb |..1j.N..y..a....|" -peer0.org1.example.com | "2019-05-02 01:31:35.383 UTC [msp.identity] Verify -> DEBU 3514 Verify: sig = 00000000 30 45 02 21 00 d2 d8 16 13 4c 7f e3 d5 f5 c0 ae |0E.!.....L......| -peer0.org1.example.com | 00000010 f7 d3 cc 20 d0 cc 9d 4c 98 53 77 8e c6 bd 89 0b |... ...L.Sw.....| -peer0.org1.example.com | 00000020 a7 d7 41 8a 50 02 20 58 f4 b5 93 08 bd 37 e2 88 |..A.P. X.....7..| -peer0.org1.example.com | 00000030 70 6b f3 02 42 48 b5 bf f0 4a 24 32 c5 f7 38 b8 |pk..BH...J$2..8.| -peer0.org1.example.com | 00000040 4a ae 8a e7 bf bd a6 |J......|" -peer0.org1.example.com | "2019-05-02 01:31:35.384 UTC [committer.txvalidator] validateTx -> DEBU 3515 config transaction received for chain businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:35.385 UTC [committer.txvalidator] validateTx -> DEBU 3516 [businesschannel] validateTx completes for block 0xc00382f440 env 0xc0044452c0 txn 0" -peer0.org1.example.com | "2019-05-02 01:31:35.385 UTC [committer.txvalidator] Validate -> DEBU 3517 got result for idx 0, code 0" -peer0.org1.example.com | "2019-05-02 01:31:35.386 UTC [committer.txvalidator] Validate -> INFO 3518 [businesschannel] Validated block [9] in 242ms" -peer0.org1.example.com | "2019-05-02 01:31:35.388 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3519 Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-05-02 01:31:35.388 UTC [gossip.privdata] StoreBlock -> DEBU 351a [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-05-02 01:31:35.389 UTC [committer] preCommit -> DEBU 351b Received configuration update, calling CSCC ConfigUpdate" -peer0.org1.example.com | "2019-05-02 01:31:35.389 UTC [kvledger] CommitWithPvtData -> DEBU 351c [businesschannel] Validating state for block [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.390 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 351d Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-05-02 01:31:35.391 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 351e lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-05-02 01:31:35.392 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 351f Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-05-02 01:31:35.392 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3520 ValidateAndPrepareBatch() for block number = [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.393 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3521 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:35.393 UTC [grpc] infof -> DEBU 3522 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:35.395 UTC [cauthdsl] func2 -> DEBU 3523 0xc003b3aba0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.395 UTC [cauthdsl] func1 -> DEBU 3524 0xc003b3aba0 gate 1556760695378997800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.393 UTC [valimpl] preprocessProtoBlock -> DEBU 3525 txType=CONFIG" -peer0.org1.example.com | "2019-05-02 01:31:35.395 UTC [valimpl] processNonEndorserTx -> DEBU 3526 Performing custom processing for transaction [txid=], [txType=CONFIG]" -peer0.org1.example.com | "2019-05-02 01:31:35.395 UTC [valimpl] processNonEndorserTx -> DEBU 3527 Processor for custom tx processing:&peer.configtxProcessor{}" -peer0.org1.example.com | "2019-05-02 01:31:35.395 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3528 constructing new tx simulator" -peer0.org1.example.com | "2019-05-02 01:31:35.396 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3529 constructing new tx simulator txid = []" -peer0.org1.example.com | "2019-05-02 01:31:35.396 UTC [peer] GenerateSimulationResults -> DEBU 352a Processing CONFIG" -peer0.org1.example.com | "2019-05-02 01:31:35.353 UTC [comm.grpc.server] 1 -> INFO 34e9 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.351Z grpc.peer_address=192.168.240.8:38992 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.0229ms -peer0.org1.example.com | "2019-05-02 01:31:35.355 UTC [policies] Evaluate -> DEBU 34f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.398 UTC [policies] Evaluate -> DEBU 352c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.398 UTC [cauthdsl] func1 -> DEBU 352d 0xc003b3b6b0 gate 1556760695398680300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.398 UTC [cauthdsl] func2 -> DEBU 352e 0xc003b3b6b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.398 UTC [peer] processChannelConfigTx -> DEBU 352f channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -peer0.org1.example.com | "2019-05-02 01:31:35.401 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3531 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-05-02 01:31:35.401 UTC [lockbasedtxmgr] Done -> DEBU 3532 Done with transaction simulation / query execution []" -peer0.org1.example.com | "2019-05-02 01:31:35.401 UTC [grpc] HandleSubConnStateChange -> DEBU 3533 pickfirstBalancer: HandleSubConnStateChange: 0xc002fbd670, READY" -peer0.org1.example.com | "2019-05-02 01:31:35.396 UTC [policies] Evaluate -> DEBU 352b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.404 UTC [policies] Evaluate -> DEBU 3536 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.405 UTC [policies] Evaluate -> DEBU 3537 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.405 UTC [policies] Evaluate -> DEBU 3538 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 3539 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 353a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:35.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 353b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 " -peer0.org1.example.com | "2019-05-02 01:31:35.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 353c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 " -peer0.org1.example.com | "2019-05-02 01:31:35.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 353d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:35.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 353e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.407 UTC [gossip.discovery] handleAliveMessage -> DEBU 353f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.407 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3540 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.407 UTC [gossip.discovery] sendMemResponse -> DEBU 3541 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:35.407 UTC [msp] DeserializeIdentity -> DEBU 3542 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.408 UTC [msp] DeserializeIdentity -> DEBU 3543 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.408 UTC [msp.identity] newIdentity -> DEBU 3544 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.409 UTC [msp] DeserializeIdentity -> DEBU 3545 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.409 UTC [msp] DeserializeIdentity -> DEBU 3546 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.410 UTC [msp.identity] newIdentity -> DEBU 3547 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c -peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv -peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr -peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:35.410 UTC [msp] DeserializeIdentity -> DEBU 3548 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.411 UTC [gossip.comm] Send -> DEBU 3549 Entering, sending GossipMessage: Channel: , nonce: 5439724871213563240, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:35.411 UTC [gossip.discovery] sendMemResponse -> DEBU 354a Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:35.411 UTC [gossip.comm] sendToEndpoint -> DEBU 354b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5439724871213563240, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.412 UTC [gossip.comm] sendToEndpoint -> DEBU 354c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.402 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 3534 Block [9] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.413 UTC [valinternal] ApplyWriteSet -> DEBU 354d txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003f16740)}" -peer0.org1.example.com | "2019-05-02 01:31:35.413 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 354e validating rwset..." -peer0.org1.example.com | "2019-05-02 01:31:35.413 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 354f postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-05-02 01:31:35.413 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3550 ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-05-02 01:31:35.414 UTC [kvledger] CommitWithPvtData -> DEBU 3551 [businesschannel] Committing block [9] to storage" -peer0.org1.example.com | "2019-05-02 01:31:35.414 UTC [ledgerstorage] CommitWithPvtData -> DEBU 3552 Writing block [9] to pvt block store" -peer0.org1.example.com | "2019-05-02 01:31:35.398 UTC [cauthdsl] func2 -> DEBU 3530 0xc003b3b6b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.419 UTC [pvtdatastorage] Prepare -> DEBU 3553 Saved 0 private data write sets for block [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.419 UTC [cauthdsl] func2 -> DEBU 3554 0xc003b3b6b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.423 UTC [msp.identity] Verify -> DEBU 3555 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-05-02 01:31:35.425 UTC [fsblkstorage] indexBlock -> DEBU 3556 Indexing block [blockNum=9, blockHash=[]byte{0x9a, 0x83, 0x39, 0x88, 0xb6, 0x7a, 0x70, 0x8, 0xe7, 0x16, 0x79, 0x57, 0x8, 0x1e, 0x62, 0x7b, 0xd4, 0x43, 0x19, 0x39, 0xb0, 0x8, 0xfe, 0x2, 0x20, 0xae, 0x67, 0xae, 0xf2, 0x52, 0x17, 0x2b} txOffsets= -peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=33992 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-05-02 01:31:35.427 UTC [fsblkstorage] indexBlock -> DEBU 3557 txid [] is a duplicate of a previous tx. Not indexing in txid-index" -peer0.org1.example.com | "2019-05-02 01:31:35.427 UTC [fsblkstorage] indexBlock -> DEBU 3558 Adding txLoc [fileSuffixNum=0, offset=98744, bytesLength=33992] for tx number:[0] ID: [] to blockNumTranNum index" -peer0.org1.example.com | "2019-05-02 01:31:35.424 UTC [msp.identity] Verify -> DEBU 3559 Verify: sig = 00000000 30 45 02 21 00 b4 bd 8a 35 49 d6 02 87 25 a4 48 |0E.!....5I...%.H| -peer0.org1.example.com | 00000010 90 06 41 bf 25 9d bd 51 c9 94 64 20 1a 00 4f f7 |..A.%..Q..d ..O.| -peer0.org1.example.com | 00000020 aa 89 8a 0f 3f 02 20 48 89 8a 0f a4 6a f1 cd 99 |....?. H....j...| -peer0.org1.example.com | 00000030 00 b6 4f 35 e4 97 3e 88 f7 46 d9 e1 00 a8 76 d2 |..O5..>..F....v.| -peer0.org1.example.com | 00000040 fd eb 1b b9 c3 65 e5 |.....e.|" -peer0.org1.example.com | "2019-05-02 01:31:35.429 UTC [cauthdsl] func2 -> DEBU 355a 0xc003b3b6b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.429 UTC [cauthdsl] func1 -> DEBU 355b 0xc003b3b6b0 gate 1556760695398680300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.431 UTC [policies] Evaluate -> DEBU 355c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.433 UTC [policies] Evaluate -> DEBU 355d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.433 UTC [policies] Evaluate -> DEBU 355e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.433 UTC [policies] Evaluate -> DEBU 355f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.433 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3560 Authenticated 192.168.240.5:55380" -peer0.org1.example.com | "2019-05-02 01:31:35.435 UTC [gossip.comm] GossipStream -> DEBU 3562 Servicing 192.168.240.5:55380" -peer0.org1.example.com | "2019-05-02 01:31:35.435 UTC [gossip.comm] serviceConnection -> DEBU 3563 Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:31:35.435 UTC [gossip.comm] writeToStream -> DEBU 3564 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:31:35.404 UTC [msp.identity] Sign -> DEBU 3535 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:31:35.436 UTC [msp.identity] Sign -> DEBU 3565 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:31:35.436 UTC [msp.identity] Sign -> DEBU 3566 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:31:35.436 UTC [msp.identity] Sign -> DEBU 3567 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:31:35.436 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3568 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:31:35.434 UTC [fsblkstorage] updateCheckpoint -> DEBU 3561 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133674], isChainEmpty=[false], lastBlockNumber=[9]" -peer0.org1.example.com | "2019-05-02 01:31:35.440 UTC [pvtdatastorage] Commit -> DEBU 356e Committing private data for block [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.441 UTC [gossip.comm] authenticateRemotePeer -> DEBU 356f Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:31:35.443 UTC [msp] DeserializeIdentity -> DEBU 3570 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.444 UTC [msp] Validate -> DEBU 3571 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:35.444 UTC [pvtdatastorage] Commit -> DEBU 3572 Committed private data for block [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.444 UTC [kvledger] CommitWithPvtData -> DEBU 3573 [businesschannel] Committing block [9] transactions to state database" -peer0.org1.example.com | "2019-05-02 01:31:35.444 UTC [lockbasedtxmgr] Commit -> DEBU 3574 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:35.444 UTC [lockbasedtxmgr] Commit -> DEBU 3575 Committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:35.445 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 3576 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-05-02 01:31:35.445 UTC [lockbasedtxmgr] Commit -> DEBU 3577 Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-05-02 01:31:35.445 UTC [stateleveldb] ApplyUpdates -> DEBU 3578 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -peer0.org1.example.com | "2019-05-02 01:31:35.446 UTC [msp] getCertificationChain -> DEBU 3579 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:35.449 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 357a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.449 UTC [msp] DeserializeIdentity -> DEBU 357b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.452 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 357c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.453 UTC [lockbasedtxmgr] Commit -> DEBU 357d Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-05-02 01:31:35.453 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 357e Preparing potential purge list working-set for expiringAtBlk [10]" -peer0.org1.example.com | "2019-05-02 01:31:35.453 UTC [leveldbhelper] GetIterator -> DEBU 357f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xb, 0x0}]" -peer0.org1.example.com | "2019-05-02 01:31:35.453 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3580 No expiry entry found for expiringAtBlk [10]" -peer0.org1.example.com | "2019-05-02 01:31:35.453 UTC [lockbasedtxmgr] func1 -> DEBU 3581 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-05-02 01:31:35.454 UTC [kvledger] CommitWithPvtData -> DEBU 3582 [businesschannel] Committing block [9] transactions to history database" -peer0.org1.example.com | "2019-05-02 01:31:35.454 UTC [historyleveldb] Commit -> DEBU 3583 Channel [businesschannel]: Updating history database for blockNo [9] with [1] transactions" -peer0.org1.example.com | "2019-05-02 01:31:35.454 UTC [historyleveldb] Commit -> DEBU 3584 Skipping transaction [0] since it is not an endorsement transaction" -peer0.org1.example.com | "2019-05-02 01:31:35.452 UTC [msp] DeserializeIdentity -> DEBU 3585 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.458 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3586 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3587 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3588 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.459 UTC [policies] Evaluate -> DEBU 3589 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.459 UTC [policies] Evaluate -> DEBU 358a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.460 UTC [policies] Evaluate -> DEBU 358c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.461 UTC [cauthdsl] func1 -> DEBU 358d 0xc003c5b580 gate 1556760695461041100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.459 UTC [historyleveldb] Commit -> DEBU 358b Channel [businesschannel]: Updates committed to history database for blockNo [9]" -peer0.org1.example.com | "2019-05-02 01:31:35.437 UTC [gossip.comm] readFromStream -> DEBU 356a 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -peer0.org1.example.com | "2019-05-02 01:31:35.438 UTC [gossip.comm] readFromStream -> DEBU 356b Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-05-02 01:31:35.438 UTC [gossip.comm] func2 -> DEBU 356c Client 192.168.240.5:55380 disconnected" -peer0.org1.example.com | "2019-05-02 01:31:35.438 UTC [grpc] infof -> DEBU 356d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:35.437 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3569 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.8:38992" -peer0.org1.example.com | "2019-05-02 01:31:35.462 UTC [kvledger] CommitWithPvtData -> INFO 358f [businesschannel] Committed block [9] with 1 transaction(s) in 72ms (state_validation=24ms block_commit=30ms state_commit=9ms)" -peer0.org1.example.com | "2019-05-02 01:31:35.462 UTC [comm.grpc.server] 1 -> INFO 3590 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:31:45.33Z grpc.peer_address=192.168.240.5:55380 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=131.723ms -peer0.org1.example.com | "2019-05-02 01:31:35.463 UTC [gossip.comm] writeToStream -> DEBU 3591 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:31:35.464 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3592 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:38992" -peer0.org1.example.com | "2019-05-02 01:31:35.464 UTC [msp.identity] Sign -> DEBU 3593 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A02080A " -peer0.org1.example.com | "2019-05-02 01:31:35.461 UTC [cauthdsl] func2 -> DEBU 358e 0xc003c5b580 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.465 UTC [msp] DeserializeIdentity -> DEBU 3594 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.468 UTC [msp] Validate -> DEBU 3596 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:35.467 UTC [msp.identity] Sign -> DEBU 3597 Sign: digest: 66BE258928477A11D949B0D67C979B00D929BE7BDC6E1DF683571101224BD961 " -peer0.org1.example.com | "2019-05-02 01:31:35.469 UTC [gossip.state] commitBlock -> DEBU 3598 [businesschannel] Committed block [9] with 1 transaction(s)" -peer0.org1.example.com | "2019-05-02 01:31:35.469 UTC [msp] getCertificationChain -> DEBU 3599 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:35.468 UTC [cauthdsl] func2 -> DEBU 3595 0xc003c5b580 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.470 UTC [cauthdsl] func2 -> DEBU 359a 0xc003c5b580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:35.470 UTC [cauthdsl] func2 -> DEBU 359c 0xc003c5b580 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.470 UTC [cauthdsl] func1 -> DEBU 359d 0xc003c5b580 gate 1556760695461041100 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.471 UTC [policies] Evaluate -> DEBU 359e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.471 UTC [policies] Evaluate -> DEBU 359f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.471 UTC [policies] Evaluate -> DEBU 35a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.471 UTC [cauthdsl] func1 -> DEBU 35a1 0xc003c29fb0 gate 1556760695471646600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.471 UTC [cauthdsl] func2 -> DEBU 35a2 0xc003c29fb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.471 UTC [cauthdsl] func2 -> DEBU 35a3 0xc003c29fb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.472 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 35a4 Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.472 UTC [msp] Validate -> DEBU 35a5 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:35.472 UTC [msp] getCertificationChain -> DEBU 35a6 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:35.472 UTC [cauthdsl] func2 -> DEBU 35a7 0xc003c29fb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.473 UTC [msp.identity] Verify -> DEBU 35a8 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-05-02 01:31:35.473 UTC [msp.identity] Verify -> DEBU 35a9 Verify: sig = 00000000 30 45 02 21 00 e7 53 e4 11 4a ac 4c a3 33 33 e8 |0E.!..S..J.L.33.| -peer0.org1.example.com | 00000010 3a 38 43 13 8d 0e 03 1a ca ce 18 a4 ba 95 f8 ed |:8C.............| -peer0.org1.example.com | 00000020 94 24 e0 7f 84 02 20 39 af fe c4 c7 18 c8 72 cd |.$.... 9......r.| -peer0.org1.example.com | 00000030 c7 40 3c 27 cb 2f 7b 8c 01 f5 fa 88 a2 d8 18 69 |.@<'./{........i| -peer0.org1.example.com | 00000040 e6 d6 88 e0 38 4f 50 |....8OP|" -peer0.org1.example.com | "2019-05-02 01:31:35.473 UTC [cauthdsl] func2 -> DEBU 35aa 0xc003c29fb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.473 UTC [cauthdsl] func1 -> DEBU 35ab 0xc003c29fb0 gate 1556760695471646600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.473 UTC [policies] Evaluate -> DEBU 35ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.470 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 359b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.473 UTC [policies] Evaluate -> DEBU 35ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.474 UTC [policies] Evaluate -> DEBU 35ae Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.474 UTC [policies] Evaluate -> DEBU 35af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.474 UTC [msp] DeserializeIdentity -> DEBU 35b0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.475 UTC [gossip.comm] authenticateRemotePeer -> DEBU 35b1 Authenticated 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:31:35.475 UTC [msp] DeserializeIdentity -> DEBU 35b2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.475 UTC [msp.identity] Sign -> DEBU 35b3 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102A " -peer0.org1.example.com | "2019-05-02 01:31:35.475 UTC [msp.identity] Sign -> DEBU 35b4 Sign: digest: F378A7FC2FD518DA1FD4B7EF06D7648D8F0095368ED366CD5914912F1DE5C569 " -peer0.org1.example.com | "2019-05-02 01:31:35.475 UTC [msp.identity] Sign -> DEBU 35b5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:35.475 UTC [msp.identity] Sign -> DEBU 35b6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:35.476 UTC [msp] DeserializeIdentity -> DEBU 35b7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.476 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35b8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.477 UTC [gossip.comm] Send -> DEBU 35b9 Entering, sending GossipMessage: Channel: , nonce: 164773237808944302, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:35.478 UTC [gossip.comm] sendToEndpoint -> DEBU 35bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 164773237808944302, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.478 UTC [gossip.comm] createConnection -> DEBU 35bd Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:35.479 UTC [grpc] DialContext -> DEBU 35be parsed scheme: """ -peer0.org1.example.com | "2019-05-02 01:31:35.479 UTC [grpc] DialContext -> DEBU 35bf scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-05-02 01:31:35.479 UTC [grpc] UpdateState -> DEBU 35c0 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" -peer0.org1.example.com | "2019-05-02 01:31:35.478 UTC [msp] DeserializeIdentity -> DEBU 35bc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.477 UTC [grpc] infof -> DEBU 35ba transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:35.480 UTC [grpc] switchBalancer -> DEBU 35c1 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-05-02 01:31:35.480 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.481 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35c3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.481 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35c4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.482 UTC [policies] Evaluate -> DEBU 35c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.482 UTC [policies] Evaluate -> DEBU 35c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.482 UTC [policies] Evaluate -> DEBU 35c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.481 UTC [grpc] HandleSubConnStateChange -> DEBU 35c9 pickfirstBalancer: HandleSubConnStateChange: 0xc003cb0880, CONNECTING" -peer0.org1.example.com | "2019-05-02 01:31:35.482 UTC [cauthdsl] func1 -> DEBU 35c8 0xc0037483b0 gate 1556760695482766100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.483 UTC [cauthdsl] func2 -> DEBU 35ca 0xc0037483b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.483 UTC [cauthdsl] func2 -> DEBU 35cb 0xc0037483b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.484 UTC [cauthdsl] func2 -> DEBU 35cc 0xc0037483b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:35.484 UTC [cauthdsl] func2 -> DEBU 35cd 0xc0037483b0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.484 UTC [cauthdsl] func1 -> DEBU 35ce 0xc0037483b0 gate 1556760695482766100 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.485 UTC [policies] Evaluate -> DEBU 35cf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.485 UTC [policies] Evaluate -> DEBU 35d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.485 UTC [policies] Evaluate -> DEBU 35d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.485 UTC [cauthdsl] func1 -> DEBU 35d2 0xc003748c10 gate 1556760695485746500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.487 UTC [cauthdsl] func2 -> DEBU 35d3 0xc003748c10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.488 UTC [cauthdsl] func2 -> DEBU 35d4 0xc003748c10 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.489 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 35d5 Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-05-02 01:31:35.489 UTC [msp] Validate -> DEBU 35d6 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:35.495 UTC [msp] getCertificationChain -> DEBU 35d7 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:35.496 UTC [cauthdsl] func2 -> DEBU 35d8 0xc003748c10 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.496 UTC [msp.identity] Verify -> DEBU 35d9 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-05-02 01:31:35.496 UTC [msp.identity] Verify -> DEBU 35da Verify: sig = 00000000 30 45 02 21 00 ab 2c 8e 52 d8 1f 54 d3 6a c5 a4 |0E.!..,.R..T.j..| -peer0.org1.example.com | 00000010 8f 79 89 72 c8 4e ad 73 cb 74 a6 f4 b0 bc 21 f3 |.y.r.N.s.t....!.| -peer0.org1.example.com | 00000020 09 3c 70 19 ac 02 20 2c cd 14 c9 83 33 bf 4c 29 |..8\o.....| -peer0.org1.example.com | 00000040 f5 87 f4 2e 2a 38 d1 |....*8.|" -peer0.org1.example.com | "2019-05-02 01:31:35.497 UTC [cauthdsl] func2 -> DEBU 35db 0xc003748c10 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.497 UTC [cauthdsl] func1 -> DEBU 35dc 0xc003748c10 gate 1556760695485746500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.497 UTC [policies] Evaluate -> DEBU 35dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.497 UTC [policies] Evaluate -> DEBU 35de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.498 UTC [gossip.comm] func1 -> DEBU 35df Got message: GossipMessage: Channel: , nonce: 9964179666323823934, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.498 UTC [gossip.gossip] handleMessage -> DEBU 35e0 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 9964179666323823934, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.505 UTC [gossip.gossip] handleMessage -> DEBU 35e1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.505 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35e2 Got message: GossipMessage: Channel: , nonce: 9964179666323823934, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.512 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35e6 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:35.498 UTC [policies] Evaluate -> DEBU 35e3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.513 UTC [policies] Evaluate -> DEBU 35e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.513 UTC [gossip.comm] authenticateRemotePeer -> DEBU 35e8 Authenticated 192.168.240.8:38992" -peer0.org1.example.com | "2019-05-02 01:31:35.512 UTC [msp] DeserializeIdentity -> DEBU 35e9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.514 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35eb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ec Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ed Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.514 UTC [policies] Evaluate -> DEBU 35ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.514 UTC [policies] Evaluate -> DEBU 35ef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.514 UTC [policies] Evaluate -> DEBU 35f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.513 UTC [gossip.comm] GossipStream -> DEBU 35ea Servicing 192.168.240.8:38992" -peer0.org1.example.com | "2019-05-02 01:31:35.511 UTC [grpc] HandleSubConnStateChange -> DEBU 35e5 pickfirstBalancer: HandleSubConnStateChange: 0xc003cb0880, READY" -peer0.org1.example.com | "2019-05-02 01:31:35.510 UTC [grpc] infof -> DEBU 35e4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:35.515 UTC [cauthdsl] func1 -> DEBU 35f1 0xc003782c60 gate 1556760695514863800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.515 UTC [cauthdsl] func2 -> DEBU 35f3 0xc003782c60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.515 UTC [cauthdsl] func2 -> DEBU 35f4 0xc003782c60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.516 UTC [cauthdsl] func2 -> DEBU 35f5 0xc003782c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:35.516 UTC [cauthdsl] func2 -> DEBU 35f6 0xc003782c60 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.516 UTC [cauthdsl] func1 -> DEBU 35f7 0xc003782c60 gate 1556760695514863800 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.516 UTC [policies] Evaluate -> DEBU 35f8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.517 UTC [policies] Evaluate -> DEBU 35f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.517 UTC [policies] Evaluate -> DEBU 35fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.518 UTC [cauthdsl] func1 -> DEBU 35fb 0xc0037922b0 gate 1556760695518048400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.518 UTC [cauthdsl] func2 -> DEBU 35fc 0xc0037922b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.518 UTC [cauthdsl] func2 -> DEBU 35fd 0xc0037922b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.515 UTC [gossip.comm] writeToStream -> DEBU 35f2 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:31:35.519 UTC [gossip.comm] serviceConnection -> DEBU 35fe Closing reading from stream" -peer0.org1.example.com | "2019-05-02 01:31:35.520 UTC [gossip.comm] readFromStream -> DEBU 35ff 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" -peer0.org1.example.com | "2019-05-02 01:31:35.521 UTC [gossip.comm] readFromStream -> DEBU 3600 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-05-02 01:31:35.521 UTC [gossip.comm] func2 -> DEBU 3601 Client 192.168.240.8:38992 disconnected" -peer0.org1.example.com | "2019-05-02 01:31:35.521 UTC [comm.grpc.server] 1 -> INFO 3602 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:31:45.403Z grpc.peer_address=192.168.240.8:38992 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=117.348ms -peer0.org1.example.com | "2019-05-02 01:31:35.522 UTC [gossip.comm] writeToStream -> DEBU 3603 Closing writing to stream" -peer0.org1.example.com | "2019-05-02 01:31:35.522 UTC [grpc] infof -> DEBU 3604 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:35.523 UTC [msp.identity] Sign -> DEBU 3605 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:31:35.523 UTC [msp.identity] Sign -> DEBU 3606 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:31:35.524 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3607 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:31:35.527 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3608 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:31:35.527 UTC [msp] DeserializeIdentity -> DEBU 3609 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 360a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.527 UTC [msp] DeserializeIdentity -> DEBU 360b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.529 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 360c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.529 UTC [msp] DeserializeIdentity -> DEBU 360d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.530 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 360e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.530 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 360f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.530 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3610 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.530 UTC [policies] Evaluate -> DEBU 3611 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.531 UTC [policies] Evaluate -> DEBU 3612 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.531 UTC [policies] Evaluate -> DEBU 3613 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.531 UTC [cauthdsl] func1 -> DEBU 3614 0xc0040af4b0 gate 1556760695531238700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.531 UTC [cauthdsl] func2 -> DEBU 3615 0xc0040af4b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.531 UTC [cauthdsl] func2 -> DEBU 3616 0xc0040af4b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.532 UTC [cauthdsl] func2 -> DEBU 3617 0xc0040af4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:35.532 UTC [cauthdsl] func2 -> DEBU 3618 0xc0040af4b0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.532 UTC [cauthdsl] func1 -> DEBU 3619 0xc0040af4b0 gate 1556760695531238700 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.532 UTC [policies] Evaluate -> DEBU 361a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.532 UTC [policies] Evaluate -> DEBU 361b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.532 UTC [policies] Evaluate -> DEBU 361c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.533 UTC [cauthdsl] func1 -> DEBU 361d 0xc0040afcf0 gate 1556760695532944800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.533 UTC [cauthdsl] func2 -> DEBU 361e 0xc0040afcf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.533 UTC [cauthdsl] func2 -> DEBU 361f 0xc0040afcf0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.533 UTC [cauthdsl] func2 -> DEBU 3620 0xc0040afcf0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.534 UTC [msp.identity] Verify -> DEBU 3621 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-05-02 01:31:35.534 UTC [msp.identity] Verify -> DEBU 3622 Verify: sig = 00000000 30 45 02 21 00 91 c4 52 e0 a5 f3 d2 30 c2 bb 01 |0E.!...R....0...| -peer0.org1.example.com | 00000010 2d 1c e2 f8 df 33 ad 23 b8 7c 68 27 3d 9d 7c d6 |-....3.#.|h'=.|.| -peer0.org1.example.com | 00000020 9e 61 16 c7 f6 02 20 4b 4d d6 11 67 77 96 28 f0 |.a.... KM..gw.(.| -peer0.org1.example.com | 00000030 f5 02 50 b6 70 15 23 33 cf f7 59 ff 6d 33 86 43 |..P.p.#3..Y.m3.C| -peer0.org1.example.com | 00000040 90 e7 e8 35 8e c7 94 |...5...|" -peer0.org1.example.com | "2019-05-02 01:31:35.534 UTC [cauthdsl] func2 -> DEBU 3623 0xc0040afcf0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.534 UTC [cauthdsl] func1 -> DEBU 3624 0xc0040afcf0 gate 1556760695532944800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.534 UTC [policies] Evaluate -> DEBU 3625 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.535 UTC [policies] Evaluate -> DEBU 3626 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.535 UTC [policies] Evaluate -> DEBU 3627 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.518 UTC [cauthdsl] func2 -> DEBU 3628 0xc0037922b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.536 UTC [msp.identity] Verify -> DEBU 3629 Verify: digest = 00000000 b4 97 11 7b d1 be aa a3 cf a7 f5 0c 4b 63 35 35 |...{........Kc55| -peer0.org1.example.com | 00000010 67 06 7a db a2 f8 62 a0 db 90 dc a4 0b a0 25 d3 |g.z...b.......%.|" -peer0.org1.example.com | "2019-05-02 01:31:35.536 UTC [msp.identity] Verify -> DEBU 362a Verify: sig = 00000000 30 44 02 20 2f cb 05 37 97 6b 46 e2 9a 85 5d dc |0D. /..7.kF...].| -peer0.org1.example.com | 00000010 ec 10 00 26 71 9c cd b9 da 13 67 8f 6c ab ad 92 |...&q.....g.l...| -peer0.org1.example.com | 00000020 47 43 ae 5a 02 20 0e 0d 44 54 c0 51 5c 33 ec 08 |GC.Z. ..DT.Q\3..| -peer0.org1.example.com | 00000030 f0 3d 0e b0 c2 63 66 07 52 12 21 4e ce 4f 0b b9 |.=...cf.R.!N.O..| -peer0.org1.example.com | 00000040 0a 6a 14 ab 8a e9 |.j....|" -peer0.org1.example.com | "2019-05-02 01:31:35.536 UTC [cauthdsl] func2 -> DEBU 362b 0xc0037922b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.536 UTC [cauthdsl] func1 -> DEBU 362c 0xc0037922b0 gate 1556760695518048400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.536 UTC [policies] Evaluate -> DEBU 362d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.537 UTC [policies] Evaluate -> DEBU 362e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.537 UTC [policies] Evaluate -> DEBU 362f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.537 UTC [policies] Evaluate -> DEBU 3630 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.537 UTC [gossip.discovery] handleAliveMessage -> DEBU 3631 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 3632 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:35.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 3633 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 " -peer0.org1.example.com | "2019-05-02 01:31:35.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 3634 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 " -peer0.org1.example.com | "2019-05-02 01:31:35.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 3635 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:35.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 3636 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.539 UTC [gossip.discovery] handleAliveMessage -> DEBU 3637 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3638 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.539 UTC [gossip.discovery] sendMemResponse -> DEBU 3639 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:35.540 UTC [msp] DeserializeIdentity -> DEBU 363a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.535 UTC [policies] Evaluate -> DEBU 363b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.541 UTC [gossip.comm] authenticateRemotePeer -> DEBU 363c Authenticated 192.168.240.5:7051" -peer0.org1.example.com | "2019-05-02 01:31:35.541 UTC [gossip.comm] createConnection -> DEBU 363d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.541 UTC [gossip.comm] sendToEndpoint -> DEBU 363e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.540 UTC [msp] DeserializeIdentity -> DEBU 363f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.542 UTC [msp] DeserializeIdentity -> DEBU 3640 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.542 UTC [gossip.comm] Send -> DEBU 3641 Entering, sending GossipMessage: Channel: , nonce: 9964179666323823934, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:35.543 UTC [gossip.discovery] sendMemResponse -> DEBU 3642 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:35.543 UTC [gossip.comm] sendToEndpoint -> DEBU 3643 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9964179666323823934, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.543 UTC [gossip.comm] createConnection -> DEBU 3644 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:35.545 UTC [gossip.comm] func1 -> DEBU 3645 Got message: GossipMessage: Channel: , nonce: 164773237808944302, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.545 UTC [gossip.gossip] handleMessage -> DEBU 3646 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 164773237808944302, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.545 UTC [gossip.gossip] handleMessage -> DEBU 3647 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.546 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3648 Got message: GossipMessage: Channel: , nonce: 164773237808944302, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.546 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3649 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:35.546 UTC [msp.identity] Verify -> DEBU 364a Verify: digest = 00000000 f3 78 a7 fc 2f d5 18 da 1f d4 b7 ef 06 d7 64 8d |.x../.........d.| -peer0.org1.example.com | 00000010 8f 00 95 36 8e d3 66 cd 59 14 91 2f 1d e5 c5 69 |...6..f.Y../...i|" -peer0.org1.example.com | "2019-05-02 01:31:35.546 UTC [msp.identity] Verify -> DEBU 364b Verify: sig = 00000000 30 44 02 20 44 2a 5c fa 3c f6 73 2c d8 4a 6d 5a |0D. D*\.<.s,.JmZ| -peer0.org1.example.com | 00000010 4d 82 51 79 ca ef 5e 63 e0 ee 23 62 db 46 e7 81 |M.Qy..^c..#b.F..| -peer0.org1.example.com | 00000020 d1 80 10 c6 02 20 2d 16 6c 6c 09 e7 88 d5 1f 25 |..... -.ll.....%| -peer0.org1.example.com | 00000030 17 15 1d fa 16 b4 a7 05 a9 d6 ab f2 c8 34 7c d8 |.............4|.| -peer0.org1.example.com | 00000040 68 c0 97 21 42 20 |h..!B |" -peer0.org1.example.com | "2019-05-02 01:31:35.547 UTC [gossip.discovery] handleAliveMessage -> DEBU 364c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.547 UTC [gossip.discovery] isSentByMe -> DEBU 364d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 364e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.548 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 364f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:35.550 UTC [grpc] DialContext -> DEBU 3650 parsed scheme: """ -peer0.org1.example.com | "2019-05-02 01:31:35.550 UTC [grpc] DialContext -> DEBU 3651 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-05-02 01:31:35.550 UTC [msp.identity] Verify -> DEBU 3652 Verify: digest = 00000000 65 b3 a2 c8 ff 0b bd d1 f8 b2 40 8d 2e d5 fb 12 |e.........@.....| -peer0.org1.example.com | 00000010 16 0a 22 1c e0 38 36 67 4a f1 26 f3 0e 73 9c d1 |.."..86gJ.&..s..|" -peer0.org1.example.com | "2019-05-02 01:31:35.551 UTC [msp.identity] Verify -> DEBU 3653 Verify: sig = 00000000 30 45 02 21 00 fb d5 8b 10 b0 47 52 48 d2 81 13 |0E.!......GRH...| -peer0.org1.example.com | 00000010 f7 83 3c d7 3b 33 a8 ee 6d ae 58 4b 56 35 11 ad |..<.;3..m.XKV5..| -peer0.org1.example.com | 00000020 01 af 8a 88 a1 02 20 48 64 6e 90 f5 06 94 67 b6 |...... Hdn....g.| -peer0.org1.example.com | 00000030 b4 cc 4e 52 66 8b 3a 9c fa 17 b4 20 7a 0e 04 50 |..NRf.:.... z..P| -peer0.org1.example.com | 00000040 72 27 19 d4 4c e4 67 |r'..L.g|" -peer0.org1.example.com | "2019-05-02 01:31:35.551 UTC [gossip.discovery] handleAliveMessage -> DEBU 3654 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.551 UTC [gossip.discovery] handleAliveMessage -> DEBU 3655 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.551 UTC [grpc] UpdateState -> DEBU 3656 ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 }] }" -peer0.org1.example.com | "2019-05-02 01:31:35.552 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3657 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:35.552 UTC [msp] DeserializeIdentity -> DEBU 3658 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.552 UTC [grpc] switchBalancer -> DEBU 3659 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-05-02 01:31:35.553 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 365a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.553 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 365b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.553 UTC [grpc] HandleSubConnStateChange -> DEBU 365c pickfirstBalancer: HandleSubConnStateChange: 0xc0040f5d10, CONNECTING" -peer0.org1.example.com | "2019-05-02 01:31:35.553 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 365d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.554 UTC [policies] Evaluate -> DEBU 365e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.554 UTC [policies] Evaluate -> DEBU 365f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.555 UTC [policies] Evaluate -> DEBU 3660 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.555 UTC [cauthdsl] func1 -> DEBU 3661 0xc0040f92e0 gate 1556760695555623300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.556 UTC [cauthdsl] func2 -> DEBU 3662 0xc0040f92e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.556 UTC [cauthdsl] func2 -> DEBU 3663 0xc0040f92e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.556 UTC [cauthdsl] func2 -> DEBU 3664 0xc0040f92e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:35.557 UTC [cauthdsl] func2 -> DEBU 3665 0xc0040f92e0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.558 UTC [cauthdsl] func1 -> DEBU 3666 0xc0040f92e0 gate 1556760695555623300 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.558 UTC [policies] Evaluate -> DEBU 3667 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.558 UTC [policies] Evaluate -> DEBU 3668 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.558 UTC [policies] Evaluate -> DEBU 3669 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.559 UTC [cauthdsl] func1 -> DEBU 366a 0xc0040f9b20 gate 1556760695559083700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.559 UTC [cauthdsl] func2 -> DEBU 366b 0xc0040f9b20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.559 UTC [cauthdsl] func2 -> DEBU 366c 0xc0040f9b20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.559 UTC [cauthdsl] func2 -> DEBU 366d 0xc0040f9b20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.560 UTC [msp.identity] Verify -> DEBU 366e Verify: digest = 00000000 0d d2 87 9b 4e da e0 f5 f0 42 15 d0 8d 88 18 93 |....N....B......| -peer0.org1.example.com | 00000010 25 d0 95 6d a0 76 e9 e1 31 a8 0d 46 7f 3c 2b e4 |%..m.v..1..F.<+.|" -peer0.org1.example.com | "2019-05-02 01:31:35.560 UTC [msp.identity] Verify -> DEBU 366f Verify: sig = 00000000 30 44 02 20 7e 58 84 2c 19 12 bc c8 31 fe 59 a8 |0D. ~X.,....1.Y.| -peer0.org1.example.com | 00000010 5e 36 69 31 de 33 9a 7b 14 5a ba 19 ee eb 6c 4b |^6i1.3.{.Z....lK| -peer0.org1.example.com | 00000020 81 c0 2d 12 02 20 63 69 7a d3 14 94 95 6e 35 48 |..-.. ciz....n5H| -peer0.org1.example.com | 00000030 f0 7d 3c da f2 8a 8a 81 2d cf 40 95 93 3d 16 b2 |.}<.....-.@..=..| -peer0.org1.example.com | 00000040 99 25 1e 0b b1 db |.%....|" -peer0.org1.example.com | "2019-05-02 01:31:35.561 UTC [cauthdsl] func2 -> DEBU 3670 0xc0040f9b20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.561 UTC [cauthdsl] func1 -> DEBU 3671 0xc0040f9b20 gate 1556760695559083700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.561 UTC [policies] Evaluate -> DEBU 3672 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.562 UTC [policies] Evaluate -> DEBU 3673 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.562 UTC [grpc] HandleSubConnStateChange -> DEBU 3674 pickfirstBalancer: HandleSubConnStateChange: 0xc0040f5d10, READY" -peer0.org1.example.com | "2019-05-02 01:31:35.563 UTC [policies] Evaluate -> DEBU 3675 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.563 UTC [policies] Evaluate -> DEBU 3676 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3677 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:35.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3678 got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1556760633753242000, 47 but got ts: inc_num:1556760633753242000 seq_num:40 " -peer0.org1.example.com | "2019-05-02 01:31:35.564 UTC [gossip.discovery] handleAliveMessage -> DEBU 3679 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 367a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.565 UTC [msp.identity] Sign -> DEBU 367b Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:31:35.566 UTC [msp.identity] Sign -> DEBU 367c Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:31:35.566 UTC [gossip.comm] authenticateRemotePeer -> DEBU 367d Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.8:7051" -peer0.org1.example.com | "2019-05-02 01:31:35.567 UTC [gossip.comm] authenticateRemotePeer -> DEBU 367e Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:7051" -peer0.org1.example.com | "2019-05-02 01:31:35.569 UTC [msp] DeserializeIdentity -> DEBU 367f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.569 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3680 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.569 UTC [msp] DeserializeIdentity -> DEBU 3681 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.570 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3682 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.570 UTC [msp] DeserializeIdentity -> DEBU 3683 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:35.570 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3684 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:35.570 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3685 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.570 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3686 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:35.571 UTC [policies] Evaluate -> DEBU 3687 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.571 UTC [policies] Evaluate -> DEBU 3688 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:35.571 UTC [policies] Evaluate -> DEBU 3689 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.571 UTC [cauthdsl] func1 -> DEBU 368a 0xc0044b48c0 gate 1556760695571735400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.572 UTC [cauthdsl] func2 -> DEBU 368b 0xc0044b48c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.572 UTC [cauthdsl] func2 -> DEBU 368c 0xc0044b48c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.572 UTC [cauthdsl] func2 -> DEBU 368d 0xc0044b48c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:35.572 UTC [cauthdsl] func2 -> DEBU 368e 0xc0044b48c0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.572 UTC [cauthdsl] func1 -> DEBU 368f 0xc0044b48c0 gate 1556760695571735400 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:35.573 UTC [policies] Evaluate -> DEBU 3690 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.573 UTC [policies] Evaluate -> DEBU 3691 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.573 UTC [policies] Evaluate -> DEBU 3692 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:35.573 UTC [cauthdsl] func1 -> DEBU 3693 0xc0044b5100 gate 1556760695573650600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:35.573 UTC [cauthdsl] func2 -> DEBU 3694 0xc0044b5100 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:35.573 UTC [cauthdsl] func2 -> DEBU 3695 0xc0044b5100 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:35.574 UTC [cauthdsl] func2 -> DEBU 3696 0xc0044b5100 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.574 UTC [msp.identity] Verify -> DEBU 3697 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-05-02 01:31:35.574 UTC [msp.identity] Verify -> DEBU 3698 Verify: sig = 00000000 30 45 02 21 00 c8 35 08 7e dc af 5e fe 9d 49 e7 |0E.!..5.~..^..I.| -peer0.org1.example.com | 00000010 51 0c 32 e4 a0 cc 30 e3 46 e6 1d c9 72 03 62 ca |Q.2...0.F...r.b.| -peer0.org1.example.com | 00000020 fa 8a e9 bb fe 02 20 70 1f c4 af 75 5a 7e 53 0a |...... p...uZ~S.| -peer0.org1.example.com | 00000030 1a 33 cf 9b b3 c3 01 8c 36 f6 09 36 25 bf 31 45 |.3......6..6%.1E| -peer0.org1.example.com | 00000040 84 36 cf fe 6f 5a 11 |.6..oZ.|" -peer0.org1.example.com | "2019-05-02 01:31:35.574 UTC [cauthdsl] func2 -> DEBU 3699 0xc0044b5100 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:35.575 UTC [cauthdsl] func1 -> DEBU 369a 0xc0044b5100 gate 1556760695573650600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:35.575 UTC [policies] Evaluate -> DEBU 369b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.575 UTC [policies] Evaluate -> DEBU 369c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.575 UTC [policies] Evaluate -> DEBU 369d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.576 UTC [policies] Evaluate -> DEBU 369e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:35.576 UTC [gossip.comm] authenticateRemotePeer -> DEBU 369f Authenticated 192.168.240.8:7051" -peer0.org1.example.com | "2019-05-02 01:31:35.576 UTC [gossip.comm] createConnection -> DEBU 36a0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:35.576 UTC [gossip.comm] sendToEndpoint -> DEBU 36a1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.787 UTC [msp] DeserializeIdentity -> DEBU 36a2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.788 UTC [msp] DeserializeIdentity -> DEBU 36a3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.789 UTC [gossip.comm] Send -> DEBU 36a4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:36.789 UTC [gossip.comm] sendToEndpoint -> DEBU 36a5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.790 UTC [gossip.comm] sendToEndpoint -> DEBU 36a6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.790 UTC [gossip.comm] sendToEndpoint -> DEBU 36a7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.790 UTC [gossip.comm] createConnection -> DEBU 36a8 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:36.792 UTC [grpc] DialContext -> DEBU 36ab parsed scheme: """ -peer0.org1.example.com | "2019-05-02 01:31:36.790 UTC [msp] DeserializeIdentity -> DEBU 36a9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.790 UTC [gossip.comm] sendToEndpoint -> DEBU 36aa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.793 UTC [msp] DeserializeIdentity -> DEBU 36ac Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.793 UTC [gossip.comm] Send -> DEBU 36ae Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760695464671900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:36.794 UTC [msp] DeserializeIdentity -> DEBU 36af Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.794 UTC [msp] DeserializeIdentity -> DEBU 36b0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.794 UTC [gossip.comm] sendToEndpoint -> DEBU 36b1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760695464671900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.795 UTC [gossip.comm] sendToEndpoint -> DEBU 36b2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.793 UTC [gossip.comm] sendToEndpoint -> DEBU 36ad Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.795 UTC [gossip.comm] sendToEndpoint -> DEBU 36b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760695464671900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.795 UTC [gossip.comm] sendToEndpoint -> DEBU 36b4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760695464671900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.796 UTC [gossip.comm] sendToEndpoint -> DEBU 36b5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.792 UTC [grpc] DialContext -> DEBU 36b6 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-05-02 01:31:36.797 UTC [grpc] UpdateState -> DEBU 36b7 ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 }] }" -peer0.org1.example.com | "2019-05-02 01:31:36.797 UTC [grpc] switchBalancer -> DEBU 36b8 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-05-02 01:31:36.798 UTC [grpc] HandleSubConnStateChange -> DEBU 36b9 pickfirstBalancer: HandleSubConnStateChange: 0xc0044e2d60, CONNECTING" -peer0.org1.example.com | "2019-05-02 01:31:36.804 UTC [gossip.comm] func1 -> DEBU 36ba Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.805 UTC [grpc] HandleSubConnStateChange -> DEBU 36bb pickfirstBalancer: HandleSubConnStateChange: 0xc0044e2d60, READY" -peer0.org1.example.com | "2019-05-02 01:31:36.805 UTC [gossip.gossip] handleMessage -> DEBU 36bc Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.806 UTC [msp] DeserializeIdentity -> DEBU 36bd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.808 UTC [msp.identity] Sign -> DEBU 36be Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-05-02 01:31:36.808 UTC [msp.identity] Sign -> DEBU 36bf Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-05-02 01:31:36.808 UTC [msp.identity] Verify -> DEBU 36c0 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:36.808 UTC [gossip.comm] authenticateRemotePeer -> DEBU 36c1 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.6:7051" -peer0.org1.example.com | "2019-05-02 01:31:36.808 UTC [msp.identity] Verify -> DEBU 36c2 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:36.811 UTC [msp.identity] Verify -> DEBU 36c3 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:36.812 UTC [msp.identity] Verify -> DEBU 36c4 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:36.813 UTC [msp] DeserializeIdentity -> DEBU 36c5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.815 UTC [msp] DeserializeIdentity -> DEBU 36c6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.816 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:36.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36c8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36c9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.816 UTC [policies] Evaluate -> DEBU 36ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.816 UTC [policies] Evaluate -> DEBU 36cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:36.817 UTC [policies] Evaluate -> DEBU 36cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.817 UTC [cauthdsl] func1 -> DEBU 36cd 0xc00454cda0 gate 1556760696817569600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.817 UTC [cauthdsl] func2 -> DEBU 36ce 0xc00454cda0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.817 UTC [cauthdsl] func2 -> DEBU 36cf 0xc00454cda0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.818 UTC [cauthdsl] func2 -> DEBU 36d0 0xc00454cda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:36.818 UTC [cauthdsl] func2 -> DEBU 36d1 0xc00454cda0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.818 UTC [gossip.comm] authenticateRemotePeer -> DEBU 36d3 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:7051" -peer0.org1.example.com | "2019-05-02 01:31:36.818 UTC [cauthdsl] func1 -> DEBU 36d2 0xc00454cda0 gate 1556760696817569600 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.820 UTC [policies] Evaluate -> DEBU 36d4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.820 UTC [policies] Evaluate -> DEBU 36d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.820 UTC [policies] Evaluate -> DEBU 36d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.820 UTC [cauthdsl] func1 -> DEBU 36d7 0xc00454d5e0 gate 1556760696820873100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.821 UTC [cauthdsl] func2 -> DEBU 36d8 0xc00454d5e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.821 UTC [cauthdsl] func2 -> DEBU 36da 0xc00454d5e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.821 UTC [cauthdsl] func2 -> DEBU 36db 0xc00454d5e0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.823 UTC [msp.identity] Verify -> DEBU 36dc Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:36.823 UTC [msp.identity] Verify -> DEBU 36dd Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:36.823 UTC [gossip.comm] func1 -> DEBU 36de Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.824 UTC [cauthdsl] func2 -> DEBU 36df 0xc00454d5e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.821 UTC [msp.identity] Verify -> DEBU 36d9 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-05-02 01:31:36.824 UTC [cauthdsl] func1 -> DEBU 36e0 0xc00454d5e0 gate 1556760696820873100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:36.825 UTC [policies] Evaluate -> DEBU 36e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.825 UTC [policies] Evaluate -> DEBU 36e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.826 UTC [policies] Evaluate -> DEBU 36e4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.826 UTC [policies] Evaluate -> DEBU 36e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.824 UTC [msp.identity] Verify -> DEBU 36e1 Verify: sig = 00000000 30 44 02 20 65 5a f0 0f a4 96 88 00 6b 73 40 7c |0D. eZ......ks@|| -peer0.org1.example.com | 00000010 0e 23 20 fd f0 92 4a 31 28 e4 92 a0 29 d4 2c 19 |.# ...J1(...).,.| -peer0.org1.example.com | 00000020 e0 4a a6 db 02 20 49 a2 80 e1 69 2a 60 3e 9a e1 |.J... I...i*`>..| -peer0.org1.example.com | 00000030 a9 00 4e ff 89 15 84 4d 3f 88 47 60 f3 33 ef f6 |..N....M?.G`.3..| -peer0.org1.example.com | 00000040 1b 0a 02 0a 68 6c |....hl|" -peer0.org1.example.com | "2019-05-02 01:31:36.828 UTC [gossip.comm] authenticateRemotePeer -> DEBU 36e7 Authenticated 192.168.240.6:7051" -peer0.org1.example.com | "2019-05-02 01:31:36.828 UTC [gossip.comm] createConnection -> DEBU 36e8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.828 UTC [msp] DeserializeIdentity -> DEBU 36e6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.829 UTC [gossip.comm] sendToEndpoint -> DEBU 36e9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.829 UTC [msp] DeserializeIdentity -> DEBU 36ea Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.829 UTC [gossip.comm] sendToEndpoint -> DEBU 36eb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.833 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36ec Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:36.833 UTC [gossip.comm] func1 -> DEBU 36ee Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ed Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ef Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.835 UTC [policies] Evaluate -> DEBU 36f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.835 UTC [policies] Evaluate -> DEBU 36f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:36.836 UTC [policies] Evaluate -> DEBU 36f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.836 UTC [cauthdsl] func1 -> DEBU 36f3 0xc00457e5d0 gate 1556760696836274400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.836 UTC [cauthdsl] func2 -> DEBU 36f4 0xc00457e5d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.837 UTC [cauthdsl] func2 -> DEBU 36f5 0xc00457e5d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.840 UTC [cauthdsl] func2 -> DEBU 36f6 0xc00457e5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:36.841 UTC [cauthdsl] func2 -> DEBU 36f7 0xc00457e5d0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.841 UTC [cauthdsl] func1 -> DEBU 36f8 0xc00457e5d0 gate 1556760696836274400 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.842 UTC [policies] Evaluate -> DEBU 36f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.843 UTC [policies] Evaluate -> DEBU 36fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.843 UTC [policies] Evaluate -> DEBU 36fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.844 UTC [cauthdsl] func1 -> DEBU 36fc 0xc00457ee10 gate 1556760696844162700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.844 UTC [cauthdsl] func2 -> DEBU 36fd 0xc00457ee10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.845 UTC [cauthdsl] func2 -> DEBU 36fe 0xc00457ee10 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.845 UTC [cauthdsl] func2 -> DEBU 36ff 0xc00457ee10 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.846 UTC [msp.identity] Verify -> DEBU 3700 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:36.847 UTC [msp.identity] Verify -> DEBU 3701 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:36.848 UTC [cauthdsl] func2 -> DEBU 3702 0xc00457ee10 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.848 UTC [cauthdsl] func1 -> DEBU 3703 0xc00457ee10 gate 1556760696844162700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:36.848 UTC [policies] Evaluate -> DEBU 3704 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.849 UTC [policies] Evaluate -> DEBU 3705 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.849 UTC [policies] Evaluate -> DEBU 3706 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.849 UTC [policies] Evaluate -> DEBU 3707 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.850 UTC [msp] DeserializeIdentity -> DEBU 3708 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.850 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3709 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.850 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 370a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.851 UTC [policies] Evaluate -> DEBU 370b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.851 UTC [policies] Evaluate -> DEBU 370c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:36.851 UTC [policies] Evaluate -> DEBU 370d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.852 UTC [cauthdsl] func1 -> DEBU 370e 0xc00457fef0 gate 1556760696851723400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.852 UTC [cauthdsl] func2 -> DEBU 370f 0xc00457fef0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.852 UTC [cauthdsl] func2 -> DEBU 3710 0xc00457fef0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.855 UTC [cauthdsl] func2 -> DEBU 3711 0xc00457fef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:36.855 UTC [cauthdsl] func2 -> DEBU 3712 0xc00457fef0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.855 UTC [cauthdsl] func1 -> DEBU 3713 0xc00457fef0 gate 1556760696851723400 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.856 UTC [policies] Evaluate -> DEBU 3714 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.856 UTC [policies] Evaluate -> DEBU 3715 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.856 UTC [policies] Evaluate -> DEBU 3716 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.857 UTC [cauthdsl] func1 -> DEBU 3717 0xc004594730 gate 1556760696857048100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.857 UTC [cauthdsl] func2 -> DEBU 3718 0xc004594730 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.858 UTC [cauthdsl] func2 -> DEBU 3719 0xc004594730 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.858 UTC [cauthdsl] func2 -> DEBU 371a 0xc004594730 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.858 UTC [msp.identity] Verify -> DEBU 371b Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:36.859 UTC [msp.identity] Verify -> DEBU 371c Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:36.859 UTC [cauthdsl] func2 -> DEBU 371d 0xc004594730 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.859 UTC [cauthdsl] func1 -> DEBU 371e 0xc004594730 gate 1556760696857048100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:36.860 UTC [policies] Evaluate -> DEBU 371f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.860 UTC [policies] Evaluate -> DEBU 3720 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.860 UTC [policies] Evaluate -> DEBU 3721 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.860 UTC [policies] Evaluate -> DEBU 3722 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.861 UTC [gossip.gossip] handleMessage -> DEBU 3723 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.861 UTC [gossip.gossip] handleMessage -> DEBU 3724 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.861 UTC [msp] DeserializeIdentity -> DEBU 3725 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.861 UTC [msp.identity] Verify -> DEBU 3726 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:36.862 UTC [msp.identity] Verify -> DEBU 3727 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:36.863 UTC [msp.identity] Verify -> DEBU 3728 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -peer0.org1.example.com | 00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -peer0.org1.example.com | "2019-05-02 01:31:36.863 UTC [msp.identity] Verify -> DEBU 3729 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -peer0.org1.example.com | 00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -peer0.org1.example.com | 00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -peer0.org1.example.com | 00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -peer0.org1.example.com | 00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -peer0.org1.example.com | "2019-05-02 01:31:36.864 UTC [msp] DeserializeIdentity -> DEBU 372a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.864 UTC [msp] DeserializeIdentity -> DEBU 372b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.864 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 372c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:36.865 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 372d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.865 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 372e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.865 UTC [policies] Evaluate -> DEBU 372f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.866 UTC [policies] Evaluate -> DEBU 3730 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:36.866 UTC [policies] Evaluate -> DEBU 3731 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.866 UTC [cauthdsl] func1 -> DEBU 3732 0xc0045a7080 gate 1556760696866477500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.866 UTC [cauthdsl] func2 -> DEBU 3733 0xc0045a7080 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.866 UTC [cauthdsl] func2 -> DEBU 3734 0xc0045a7080 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.867 UTC [cauthdsl] func2 -> DEBU 3735 0xc0045a7080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:36.867 UTC [cauthdsl] func2 -> DEBU 3736 0xc0045a7080 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.867 UTC [cauthdsl] func1 -> DEBU 3737 0xc0045a7080 gate 1556760696866477500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.868 UTC [policies] Evaluate -> DEBU 3738 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.868 UTC [policies] Evaluate -> DEBU 3739 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.869 UTC [policies] Evaluate -> DEBU 373a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.869 UTC [cauthdsl] func1 -> DEBU 373b 0xc0045a78c0 gate 1556760696869338100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.869 UTC [cauthdsl] func2 -> DEBU 373c 0xc0045a78c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.869 UTC [cauthdsl] func2 -> DEBU 373d 0xc0045a78c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.870 UTC [cauthdsl] func2 -> DEBU 373e 0xc0045a78c0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.870 UTC [msp.identity] Verify -> DEBU 373f Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:36.870 UTC [msp.identity] Verify -> DEBU 3740 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:36.871 UTC [cauthdsl] func2 -> DEBU 3741 0xc0045a78c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.871 UTC [cauthdsl] func1 -> DEBU 3742 0xc0045a78c0 gate 1556760696869338100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:36.871 UTC [policies] Evaluate -> DEBU 3743 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.872 UTC [policies] Evaluate -> DEBU 3744 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.872 UTC [policies] Evaluate -> DEBU 3745 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.872 UTC [policies] Evaluate -> DEBU 3746 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.873 UTC [msp] DeserializeIdentity -> DEBU 3747 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.873 UTC [msp] DeserializeIdentity -> DEBU 3748 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.874 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3749 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:36.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 374a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 374b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.874 UTC [policies] Evaluate -> DEBU 374c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.875 UTC [policies] Evaluate -> DEBU 374d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:36.875 UTC [policies] Evaluate -> DEBU 374e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.875 UTC [cauthdsl] func1 -> DEBU 374f 0xc0045b9090 gate 1556760696875439500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.875 UTC [cauthdsl] func2 -> DEBU 3750 0xc0045b9090 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.876 UTC [cauthdsl] func2 -> DEBU 3751 0xc0045b9090 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.876 UTC [cauthdsl] func2 -> DEBU 3752 0xc0045b9090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:36.876 UTC [cauthdsl] func2 -> DEBU 3753 0xc0045b9090 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.876 UTC [cauthdsl] func1 -> DEBU 3754 0xc0045b9090 gate 1556760696875439500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.877 UTC [policies] Evaluate -> DEBU 3755 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.877 UTC [policies] Evaluate -> DEBU 3756 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.877 UTC [policies] Evaluate -> DEBU 3757 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.877 UTC [cauthdsl] func1 -> DEBU 3758 0xc0045b98d0 gate 1556760696877709100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.878 UTC [cauthdsl] func2 -> DEBU 3759 0xc0045b98d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.878 UTC [cauthdsl] func2 -> DEBU 375a 0xc0045b98d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.878 UTC [cauthdsl] func2 -> DEBU 375b 0xc0045b98d0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.878 UTC [msp.identity] Verify -> DEBU 375c Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:36.878 UTC [msp.identity] Verify -> DEBU 375d Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:36.879 UTC [cauthdsl] func2 -> DEBU 375e 0xc0045b98d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.879 UTC [cauthdsl] func1 -> DEBU 375f 0xc0045b98d0 gate 1556760696877709100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:36.879 UTC [policies] Evaluate -> DEBU 3760 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.879 UTC [policies] Evaluate -> DEBU 3761 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.879 UTC [policies] Evaluate -> DEBU 3762 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.880 UTC [policies] Evaluate -> DEBU 3763 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.880 UTC [msp] DeserializeIdentity -> DEBU 3764 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3765 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3766 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3767 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3768 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3769 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [cauthdsl] func1 -> DEBU 376a 0xc0045c89b0 gate 1556760696881291200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 376b 0xc0045c89b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 376c 0xc0045c89b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 376d 0xc0045c89b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 376e 0xc0045c89b0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [cauthdsl] func1 -> DEBU 376f 0xc0045c89b0 gate 1556760696881291200 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3770 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3771 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3772 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [cauthdsl] func1 -> DEBU 3773 0xc0045c91f0 gate 1556760696881653800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 3774 0xc0045c91f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 3775 0xc0045c91f0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 3776 0xc0045c91f0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [msp.identity] Verify -> DEBU 3777 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:36.881 UTC [msp.identity] Verify -> DEBU 3778 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [cauthdsl] func2 -> DEBU 3779 0xc0045c91f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [cauthdsl] func1 -> DEBU 377a 0xc0045c91f0 gate 1556760696881653800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [policies] Evaluate -> DEBU 377b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [policies] Evaluate -> DEBU 377c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [policies] Evaluate -> DEBU 377d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [policies] Evaluate -> DEBU 377e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [gossip.gossip] handleMessage -> DEBU 377f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [gossip.gossip] handleMessage -> DEBU 3780 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [msp.identity] Verify -> DEBU 3781 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -peer0.org1.example.com | 00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [msp.identity] Verify -> DEBU 3782 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -peer0.org1.example.com | 00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -peer0.org1.example.com | 00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -peer0.org1.example.com | 00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -peer0.org1.example.com | 00000040 d8 d7 e8 1b cd f3 |......|" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [msp] DeserializeIdentity -> DEBU 3783 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [msp] DeserializeIdentity -> DEBU 3784 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.882 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3785 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3786 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3787 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 3788 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 3789 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 378a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func1 -> DEBU 378b 0xc0045df320 gate 1556760696883205600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 378c 0xc0045df320 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 378d 0xc0045df320 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 378e 0xc0045df320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 378f 0xc0045df320 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func1 -> DEBU 3790 0xc0045df320 gate 1556760696883205600 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 3791 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 3792 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 3793 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func1 -> DEBU 3794 0xc0045dfb60 gate 1556760696883552200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 3795 0xc0045dfb60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 3796 0xc0045dfb60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 3797 0xc0045dfb60 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [msp.identity] Verify -> DEBU 3798 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -peer0.org1.example.com | 00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [msp.identity] Verify -> DEBU 3799 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -peer0.org1.example.com | 00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -peer0.org1.example.com | 00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -peer0.org1.example.com | 00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -peer0.org1.example.com | 00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 379a 0xc0045dfb60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.883 UTC [cauthdsl] func1 -> DEBU 379b 0xc0045dfb60 gate 1556760696883552200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:36.886 UTC [policies] Evaluate -> DEBU 379c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.886 UTC [policies] Evaluate -> DEBU 379d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.886 UTC [policies] Evaluate -> DEBU 379e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.886 UTC [policies] Evaluate -> DEBU 379f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.887 UTC [msp] DeserializeIdentity -> DEBU 37a0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.887 UTC [msp] DeserializeIdentity -> DEBU 37a1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.887 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37a2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:36.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37a3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37a4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.888 UTC [policies] Evaluate -> DEBU 37a5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.888 UTC [policies] Evaluate -> DEBU 37a6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:36.888 UTC [policies] Evaluate -> DEBU 37a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.889 UTC [cauthdsl] func1 -> DEBU 37a8 0xc0045f7330 gate 1556760696889098500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.889 UTC [cauthdsl] func2 -> DEBU 37a9 0xc0045f7330 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.889 UTC [cauthdsl] func2 -> DEBU 37aa 0xc0045f7330 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.889 UTC [cauthdsl] func2 -> DEBU 37ab 0xc0045f7330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:36.890 UTC [cauthdsl] func2 -> DEBU 37ac 0xc0045f7330 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.890 UTC [cauthdsl] func1 -> DEBU 37ad 0xc0045f7330 gate 1556760696889098500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:36.890 UTC [policies] Evaluate -> DEBU 37ae Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.890 UTC [policies] Evaluate -> DEBU 37af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.891 UTC [policies] Evaluate -> DEBU 37b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.891 UTC [cauthdsl] func1 -> DEBU 37b1 0xc0045f7b70 gate 1556760696891182200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.891 UTC [cauthdsl] func2 -> DEBU 37b2 0xc0045f7b70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.891 UTC [cauthdsl] func2 -> DEBU 37b3 0xc0045f7b70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.891 UTC [cauthdsl] func2 -> DEBU 37b4 0xc0045f7b70 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.891 UTC [msp.identity] Verify -> DEBU 37b5 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -peer0.org1.example.com | 00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -peer0.org1.example.com | "2019-05-02 01:31:36.892 UTC [msp.identity] Verify -> DEBU 37b6 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -peer0.org1.example.com | 00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -peer0.org1.example.com | 00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -peer0.org1.example.com | 00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -peer0.org1.example.com | 00000040 66 24 7c dc 78 ff |f$|.x.|" -peer0.org1.example.com | "2019-05-02 01:31:36.892 UTC [cauthdsl] func2 -> DEBU 37b7 0xc0045f7b70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.892 UTC [cauthdsl] func1 -> DEBU 37b8 0xc0045f7b70 gate 1556760696891182200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:36.892 UTC [policies] Evaluate -> DEBU 37b9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.893 UTC [policies] Evaluate -> DEBU 37ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.893 UTC [policies] Evaluate -> DEBU 37bb Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.893 UTC [policies] Evaluate -> DEBU 37bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.893 UTC [msp.identity] Verify -> DEBU 37bd Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:36.894 UTC [msp.identity] Verify -> DEBU 37be Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:36.894 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37bf Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.894 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37c0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [policies] Evaluate -> DEBU 37c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [policies] Evaluate -> DEBU 37c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [policies] Evaluate -> DEBU 37c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [msp] DeserializeIdentity -> DEBU 37c4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [msp.identity] newIdentity -> DEBU 37c5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [cauthdsl] func1 -> DEBU 37c6 0xc00460d270 gate 1556760696895586700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [cauthdsl] func2 -> DEBU 37c7 0xc00460d270 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [cauthdsl] func2 -> DEBU 37c8 0xc00460d270 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 37c9 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [msp] Validate -> DEBU 37ca MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:36.895 UTC [msp] getCertificationChain -> DEBU 37cb MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:36.896 UTC [cauthdsl] func2 -> DEBU 37cc 0xc00460d270 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.896 UTC [msp.identity] Verify -> DEBU 37cd Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:36.896 UTC [msp.identity] Verify -> DEBU 37ce Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:36.896 UTC [cauthdsl] func2 -> DEBU 37cf 0xc00460d270 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:36.896 UTC [cauthdsl] func1 -> DEBU 37d0 0xc00460d270 gate 1556760696895586700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:36.896 UTC [policies] Evaluate -> DEBU 37d1 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.896 UTC [policies] Evaluate -> DEBU 37d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.896 UTC [policies] Evaluate -> DEBU 37d3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.896 UTC [policies] Evaluate -> DEBU 37d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:36.898 UTC [gossip.gossip] handleMessage -> DEBU 37d5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.914 UTC [msp] DeserializeIdentity -> DEBU 37d6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.914 UTC [msp] DeserializeIdentity -> DEBU 37d7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.915 UTC [gossip.pull] Hello -> DEBU 37d8 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:36.915 UTC [msp] DeserializeIdentity -> DEBU 37d9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.915 UTC [msp] DeserializeIdentity -> DEBU 37da Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.915 UTC [gossip.comm] Send -> DEBU 37db Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:36.915 UTC [gossip.comm] sendToEndpoint -> DEBU 37dc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.915 UTC [gossip.comm] sendToEndpoint -> DEBU 37dd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.917 UTC [gossip.comm] func1 -> DEBU 37de Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4636327806519350883 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 5 6 8 4 7], Envelope: 60 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.917 UTC [gossip.gossip] handleMessage -> DEBU 37df Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4636327806519350883 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 5 6 8 4 7], Envelope: 60 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.917 UTC [gossip.pull] HandleMessage -> DEBU 37e0 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4636327806519350883 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 5 6 8 4 7], Envelope: 60 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.917 UTC [gossip.gossip] handleMessage -> DEBU 37e1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.949 UTC [gossip.election] waitForInterrupt -> DEBU 37e2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:36.950 UTC [gossip.election] IsLeader -> DEBU 37e3 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:36.951 UTC [msp.identity] Sign -> DEBU 37e4 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100C1801 " -peer0.org1.example.com | "2019-05-02 01:31:36.951 UTC [msp.identity] Sign -> DEBU 37e5 Sign: digest: 6A1921AF613ED453CF35773B6F6FDC7E6576801230CF4F132C579439ABCAC6E3 " -peer0.org1.example.com | "2019-05-02 01:31:36.952 UTC [gossip.election] waitForInterrupt -> DEBU 37e6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:36.955 UTC [msp] DeserializeIdentity -> DEBU 37e7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.955 UTC [msp] DeserializeIdentity -> DEBU 37e8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.956 UTC [msp] DeserializeIdentity -> DEBU 37e9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.956 UTC [msp] DeserializeIdentity -> DEBU 37ea Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.958 UTC [gossip.comm] Send -> DEBU 37eb Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:36.959 UTC [msp] DeserializeIdentity -> DEBU 37ec Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.959 UTC [msp] DeserializeIdentity -> DEBU 37ed Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:36.963 UTC [gossip.comm] sendToEndpoint -> DEBU 37ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:36.963 UTC [gossip.comm] sendToEndpoint -> DEBU 37ef Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.063 UTC [gossip.comm] func1 -> DEBU 37f0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760695275830100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.063 UTC [gossip.gossip] handleMessage -> DEBU 37f1 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760695275830100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.064 UTC [msp.identity] Verify -> DEBU 37f2 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:37.064 UTC [msp.identity] Verify -> DEBU 37f3 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:37.065 UTC [msp] DeserializeIdentity -> DEBU 37f4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.065 UTC [gossip.gossip] handleMessage -> DEBU 37f5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.274 UTC [gossip.comm] func1 -> DEBU 37f6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.275 UTC [gossip.gossip] handleMessage -> DEBU 37f7 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.276 UTC [msp] DeserializeIdentity -> DEBU 37f8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.276 UTC [msp] DeserializeIdentity -> DEBU 37f9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.277 UTC [msp] DeserializeIdentity -> DEBU 37fa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.277 UTC [gossip.gossip] handleMessage -> DEBU 37fb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.283 UTC [gossip.comm] func1 -> DEBU 37fc Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760695394641900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.285 UTC [gossip.gossip] handleMessage -> DEBU 37fd Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760695394641900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.286 UTC [msp] DeserializeIdentity -> DEBU 37fe Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37ff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:37.287 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3800 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:37.287 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3801 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:37.288 UTC [policies] Evaluate -> DEBU 3802 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.288 UTC [policies] Evaluate -> DEBU 3803 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:37.289 UTC [policies] Evaluate -> DEBU 3804 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.289 UTC [cauthdsl] func1 -> DEBU 3805 0xc00464b7f0 gate 1556760697289528500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:37.290 UTC [cauthdsl] func2 -> DEBU 3806 0xc00464b7f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:37.290 UTC [cauthdsl] func2 -> DEBU 3807 0xc00464b7f0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:37.290 UTC [cauthdsl] func2 -> DEBU 3808 0xc00464b7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:37.291 UTC [cauthdsl] func2 -> DEBU 3809 0xc00464b7f0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:37.293 UTC [cauthdsl] func1 -> DEBU 380a 0xc00464b7f0 gate 1556760697289528500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:37.293 UTC [policies] Evaluate -> DEBU 380b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.293 UTC [policies] Evaluate -> DEBU 380c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.294 UTC [policies] Evaluate -> DEBU 380d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.294 UTC [cauthdsl] func1 -> DEBU 380e 0xc00465c030 gate 1556760697294595300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:37.294 UTC [cauthdsl] func2 -> DEBU 380f 0xc00465c030 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:37.295 UTC [cauthdsl] func2 -> DEBU 3810 0xc00465c030 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:37.295 UTC [cauthdsl] func2 -> DEBU 3811 0xc00465c030 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:37.296 UTC [msp.identity] Verify -> DEBU 3812 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:37.296 UTC [msp.identity] Verify -> DEBU 3813 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:37.297 UTC [gossip.comm] func1 -> DEBU 3814 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760695394641900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.297 UTC [cauthdsl] func2 -> DEBU 3815 0xc00465c030 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:37.297 UTC [cauthdsl] func1 -> DEBU 3816 0xc00465c030 gate 1556760697294595300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:37.301 UTC [policies] Evaluate -> DEBU 3817 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.301 UTC [policies] Evaluate -> DEBU 3818 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.301 UTC [policies] Evaluate -> DEBU 3819 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.302 UTC [policies] Evaluate -> DEBU 381a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.302 UTC [msp] DeserializeIdentity -> DEBU 381b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.302 UTC [gossip.gossip] handleMessage -> DEBU 381c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.302 UTC [gossip.gossip] handleMessage -> DEBU 381d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760695394641900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.303 UTC [msp] DeserializeIdentity -> DEBU 381e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.303 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 381f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:37.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3820 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:37.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3821 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:37.304 UTC [policies] Evaluate -> DEBU 3822 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.304 UTC [policies] Evaluate -> DEBU 3823 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:37.304 UTC [policies] Evaluate -> DEBU 3824 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.304 UTC [cauthdsl] func1 -> DEBU 3825 0xc00465da40 gate 1556760697304659800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:37.304 UTC [cauthdsl] func2 -> DEBU 3826 0xc00465da40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:37.305 UTC [cauthdsl] func2 -> DEBU 3827 0xc00465da40 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:37.305 UTC [cauthdsl] func2 -> DEBU 3828 0xc00465da40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:37.305 UTC [cauthdsl] func2 -> DEBU 3829 0xc00465da40 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:37.305 UTC [cauthdsl] func1 -> DEBU 382a 0xc00465da40 gate 1556760697304659800 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:37.308 UTC [policies] Evaluate -> DEBU 382b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.308 UTC [policies] Evaluate -> DEBU 382c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.309 UTC [policies] Evaluate -> DEBU 382d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.309 UTC [cauthdsl] func1 -> DEBU 382e 0xc004670280 gate 1556760697309519400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:37.309 UTC [cauthdsl] func2 -> DEBU 382f 0xc004670280 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:37.310 UTC [cauthdsl] func2 -> DEBU 3830 0xc004670280 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:37.310 UTC [cauthdsl] func2 -> DEBU 3831 0xc004670280 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:37.310 UTC [msp.identity] Verify -> DEBU 3832 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:37.310 UTC [msp.identity] Verify -> DEBU 3833 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:37.311 UTC [cauthdsl] func2 -> DEBU 3834 0xc004670280 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:37.311 UTC [cauthdsl] func1 -> DEBU 3835 0xc004670280 gate 1556760697309519400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:37.311 UTC [policies] Evaluate -> DEBU 3836 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.312 UTC [policies] Evaluate -> DEBU 3837 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.312 UTC [policies] Evaluate -> DEBU 3838 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.312 UTC [policies] Evaluate -> DEBU 3839 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.312 UTC [msp] DeserializeIdentity -> DEBU 383a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.315 UTC [gossip.gossip] handleMessage -> DEBU 383b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.496 UTC [gossip.comm] func1 -> DEBU 383c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.497 UTC [gossip.gossip] handleMessage -> DEBU 383d Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.497 UTC [gossip.pull] HandleMessage -> DEBU 383e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.497 UTC [msp] DeserializeIdentity -> DEBU 383f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.497 UTC [msp] DeserializeIdentity -> DEBU 3840 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.497 UTC [msp] DeserializeIdentity -> DEBU 3841 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.497 UTC [msp] DeserializeIdentity -> DEBU 3842 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.498 UTC [msp] DeserializeIdentity -> DEBU 3843 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.498 UTC [msp] DeserializeIdentity -> DEBU 3844 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.498 UTC [gossip.pull] SendDigest -> DEBU 3845 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:37.498 UTC [gossip.gossip] handleMessage -> DEBU 3846 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.521 UTC [gossip.comm] func1 -> DEBU 3847 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.522 UTC [gossip.gossip] handleMessage -> DEBU 3848 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.522 UTC [gossip.gossip] handleMessage -> DEBU 3849 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.522 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 384b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:37.522 UTC [msp] DeserializeIdentity -> DEBU 384c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.522 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 384d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 384e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 384f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 3850 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 3851 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 3852 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [cauthdsl] func1 -> DEBU 3853 0xc00468ee70 gate 1556760697523340900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [cauthdsl] func2 -> DEBU 3854 0xc00468ee70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [cauthdsl] func2 -> DEBU 3855 0xc00468ee70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [cauthdsl] func2 -> DEBU 3856 0xc00468ee70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [cauthdsl] func2 -> DEBU 3857 0xc00468ee70 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [cauthdsl] func1 -> DEBU 3858 0xc00468ee70 gate 1556760697523340900 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 3859 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 385a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 385b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.523 UTC [cauthdsl] func1 -> DEBU 385c 0xc00468f6b0 gate 1556760697523938600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [cauthdsl] func2 -> DEBU 385d 0xc00468f6b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [cauthdsl] func2 -> DEBU 385e 0xc00468f6b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [cauthdsl] func2 -> DEBU 385f 0xc00468f6b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [msp.identity] Verify -> DEBU 3860 Verify: digest = 00000000 6d 36 55 e9 25 c0 f2 00 9b db 34 e9 ce 3b c3 47 |m6U.%.....4..;.G| -peer0.org1.example.com | 00000010 6d 0f d5 4f da 69 77 1c 64 79 1e a0 b6 0d 4d c4 |m..O.iw.dy....M.|" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [msp.identity] Verify -> DEBU 3861 Verify: sig = 00000000 30 45 02 21 00 a8 6c fc 99 d9 a7 78 b4 a9 c8 ab |0E.!..l....x....| -peer0.org1.example.com | 00000010 83 62 f1 6c 3f bf 8b 46 44 23 fe 8b 2d b6 bb ea |.b.l?..FD#..-...| -peer0.org1.example.com | 00000020 5b a5 2b 36 ca 02 20 2d 6f 0e 43 ac d8 e0 63 4b |[.+6.. -o.C...cK| -peer0.org1.example.com | 00000030 2e 99 9a c9 48 0d a0 d1 88 22 30 c9 8d 7d db 94 |....H...."0..}..| -peer0.org1.example.com | 00000040 cd 42 ef 95 65 df dc |.B..e..|" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [cauthdsl] func2 -> DEBU 3862 0xc00468f6b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [cauthdsl] func1 -> DEBU 3863 0xc00468f6b0 gate 1556760697523938600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [policies] Evaluate -> DEBU 3864 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [policies] Evaluate -> DEBU 3865 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [policies] Evaluate -> DEBU 3866 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.524 UTC [policies] Evaluate -> DEBU 3867 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.525 UTC [gossip.discovery] handleAliveMessage -> DEBU 3868 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.525 UTC [gossip.discovery] learnExistingMembers -> DEBU 3869 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:37.525 UTC [gossip.discovery] learnExistingMembers -> DEBU 386a updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 " -peer0.org1.example.com | "2019-05-02 01:31:37.525 UTC [gossip.discovery] learnExistingMembers -> DEBU 386b Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 " -peer0.org1.example.com | "2019-05-02 01:31:37.525 UTC [gossip.discovery] learnExistingMembers -> DEBU 386c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:37.525 UTC [gossip.discovery] learnExistingMembers -> DEBU 386d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.525 UTC [gossip.discovery] handleAliveMessage -> DEBU 386e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.525 UTC [gossip.discovery] handleMsgFromComm -> DEBU 386f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.525 UTC [gossip.discovery] sendMemResponse -> DEBU 3870 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:37.525 UTC [msp] DeserializeIdentity -> DEBU 3871 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.526 UTC [msp] DeserializeIdentity -> DEBU 3872 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.526 UTC [msp] DeserializeIdentity -> DEBU 3873 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.526 UTC [gossip.comm] Send -> DEBU 3874 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:37.526 UTC [gossip.discovery] sendMemResponse -> DEBU 3875 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:37.526 UTC [gossip.comm] sendToEndpoint -> DEBU 3876 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.526 UTC [gossip.comm] sendToEndpoint -> DEBU 3877 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.537 UTC [gossip.comm] func1 -> DEBU 3878 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.537 UTC [gossip.gossip] handleMessage -> DEBU 3879 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.538 UTC [msp] DeserializeIdentity -> DEBU 387a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.538 UTC [msp] DeserializeIdentity -> DEBU 387b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.538 UTC [msp] DeserializeIdentity -> DEBU 387c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.538 UTC [gossip.gossip] handleMessage -> DEBU 387d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.549 UTC [gossip.comm] func1 -> DEBU 387e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760695462313000 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.549 UTC [gossip.gossip] handleMessage -> DEBU 387f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760695462313000 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.549 UTC [msp] DeserializeIdentity -> DEBU 3880 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.549 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3881 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:37.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3882 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:37.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3883 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:37.549 UTC [policies] Evaluate -> DEBU 3884 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [policies] Evaluate -> DEBU 3885 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [policies] Evaluate -> DEBU 3886 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [cauthdsl] func1 -> DEBU 3887 0xc0046ba8e0 gate 1556760697550175900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 3888 0xc0046ba8e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 3889 0xc0046ba8e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 388a 0xc0046ba8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 388b 0xc0046ba8e0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [cauthdsl] func1 -> DEBU 388c 0xc0046ba8e0 gate 1556760697550175900 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [policies] Evaluate -> DEBU 388d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [policies] Evaluate -> DEBU 388e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [policies] Evaluate -> DEBU 388f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [cauthdsl] func1 -> DEBU 3890 0xc0046bb120 gate 1556760697550772700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 3891 0xc0046bb120 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 3892 0xc0046bb120 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 3893 0xc0046bb120 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:37.551 UTC [msp.identity] Verify -> DEBU 3894 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:37.551 UTC [msp.identity] Verify -> DEBU 3895 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:37.551 UTC [cauthdsl] func2 -> DEBU 3896 0xc0046bb120 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:37.551 UTC [cauthdsl] func1 -> DEBU 3897 0xc0046bb120 gate 1556760697550772700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:37.551 UTC [policies] Evaluate -> DEBU 3898 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.551 UTC [policies] Evaluate -> DEBU 3899 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.551 UTC [policies] Evaluate -> DEBU 389a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.551 UTC [policies] Evaluate -> DEBU 389b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.551 UTC [msp] DeserializeIdentity -> DEBU 389c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.551 UTC [gossip.gossip] handleMessage -> DEBU 389d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.710 UTC [gossip.comm] func1 -> DEBU 389e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.711 UTC [gossip.gossip] handleMessage -> DEBU 389f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.711 UTC [gossip.pull] HandleMessage -> DEBU 38a0 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.711 UTC [msp] DeserializeIdentity -> DEBU 38a1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.711 UTC [msp] DeserializeIdentity -> DEBU 38a2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.712 UTC [msp] DeserializeIdentity -> DEBU 38a3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.712 UTC [msp] DeserializeIdentity -> DEBU 38a4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.712 UTC [msp] DeserializeIdentity -> DEBU 38a5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.713 UTC [msp] DeserializeIdentity -> DEBU 38a6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.713 UTC [gossip.pull] SendDigest -> DEBU 38a7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:37.713 UTC [gossip.gossip] handleMessage -> DEBU 38a8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.809 UTC [gossip.pull] Hello -> DEBU 38a9 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:37.810 UTC [gossip.comm] Send -> DEBU 38aa Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:37.811 UTC [gossip.pull] Hello -> DEBU 38ab Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:37.811 UTC [gossip.comm] sendToEndpoint -> DEBU 38ac Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.812 UTC [gossip.comm] Send -> DEBU 38ad Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:37.814 UTC [gossip.pull] Hello -> DEBU 38ae Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:37.815 UTC [gossip.comm] Send -> DEBU 38b0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:37.816 UTC [gossip.comm] sendToEndpoint -> DEBU 38b2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.814 UTC [gossip.comm] sendToEndpoint -> DEBU 38af Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.816 UTC [gossip.comm] func1 -> DEBU 38b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10132650898837163274 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.817 UTC [gossip.comm] sendToEndpoint -> DEBU 38b3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.817 UTC [gossip.comm] sendToEndpoint -> DEBU 38b4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.821 UTC [gossip.gossip] handleMessage -> DEBU 38b5 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10132650898837163274 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.822 UTC [gossip.pull] HandleMessage -> DEBU 38b8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10132650898837163274 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.822 UTC [gossip.comm] sendToEndpoint -> DEBU 38b7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.822 UTC [gossip.comm] func1 -> DEBU 38b6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13601322340241378240 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.826 UTC [gossip.comm] func1 -> DEBU 38b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14678095156928737736 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.823 UTC [gossip.gossip] handleMessage -> DEBU 38ba Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.828 UTC [gossip.gossip] handleMessage -> DEBU 38bb Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13601322340241378240 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.828 UTC [gossip.pull] HandleMessage -> DEBU 38bc GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13601322340241378240 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.829 UTC [gossip.gossip] handleMessage -> DEBU 38bd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.830 UTC [gossip.gossip] handleMessage -> DEBU 38be Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14678095156928737736 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.830 UTC [gossip.pull] HandleMessage -> DEBU 38bf GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14678095156928737736 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.831 UTC [gossip.gossip] handleMessage -> DEBU 38c0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.869 UTC [gossip.comm] func1 -> DEBU 38c1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.869 UTC [gossip.gossip] handleMessage -> DEBU 38c2 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.869 UTC [gossip.gossip] handleMessage -> DEBU 38c3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38c4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.870 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38c5 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:37.870 UTC [msp] DeserializeIdentity -> DEBU 38c6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:37.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38c8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:37.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38c9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:37.871 UTC [policies] Evaluate -> DEBU 38ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.871 UTC [policies] Evaluate -> DEBU 38cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:37.872 UTC [policies] Evaluate -> DEBU 38cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.872 UTC [cauthdsl] func1 -> DEBU 38cd 0xc0046f3320 gate 1556760697872373300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:37.872 UTC [cauthdsl] func2 -> DEBU 38ce 0xc0046f3320 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:37.872 UTC [cauthdsl] func2 -> DEBU 38cf 0xc0046f3320 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:37.873 UTC [cauthdsl] func2 -> DEBU 38d0 0xc0046f3320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:37.873 UTC [cauthdsl] func2 -> DEBU 38d1 0xc0046f3320 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:37.873 UTC [cauthdsl] func1 -> DEBU 38d2 0xc0046f3320 gate 1556760697872373300 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:37.873 UTC [policies] Evaluate -> DEBU 38d3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.873 UTC [policies] Evaluate -> DEBU 38d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.873 UTC [policies] Evaluate -> DEBU 38d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:37.874 UTC [cauthdsl] func1 -> DEBU 38d6 0xc0046f3b60 gate 1556760697873899100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:37.874 UTC [cauthdsl] func2 -> DEBU 38d7 0xc0046f3b60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:37.874 UTC [cauthdsl] func2 -> DEBU 38d8 0xc0046f3b60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:37.874 UTC [cauthdsl] func2 -> DEBU 38d9 0xc0046f3b60 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:37.874 UTC [msp.identity] Verify -> DEBU 38da Verify: digest = 00000000 b4 6f 32 22 86 df bd 85 51 49 81 8f c3 24 f4 6f |.o2"....QI...$.o| -peer0.org1.example.com | 00000010 cb 57 58 e5 56 67 d2 c6 67 eb 16 af 58 99 81 95 |.WX.Vg..g...X...|" -peer0.org1.example.com | "2019-05-02 01:31:37.875 UTC [msp.identity] Verify -> DEBU 38db Verify: sig = 00000000 30 45 02 21 00 97 72 c0 95 97 1a 04 d7 83 92 e8 |0E.!..r.........| -peer0.org1.example.com | 00000010 dc 89 31 a4 64 c3 d0 d1 b0 ed 37 d5 26 3b d9 2a |..1.d.....7.&;.*| -peer0.org1.example.com | 00000020 27 3c 0e 66 b9 02 20 34 93 1c d8 0c 21 5a 97 de |'<.f.. 4....!Z..| -peer0.org1.example.com | 00000030 59 e0 bd 37 fc 65 35 ee 3f 39 70 b2 84 db 29 7a |Y..7.e5.?9p...)z| -peer0.org1.example.com | 00000040 3c 24 80 d5 e3 c7 cd |<$.....|" -peer0.org1.example.com | "2019-05-02 01:31:37.876 UTC [cauthdsl] func2 -> DEBU 38dc 0xc0046f3b60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:37.876 UTC [cauthdsl] func1 -> DEBU 38dd 0xc0046f3b60 gate 1556760697873899100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:37.877 UTC [policies] Evaluate -> DEBU 38de Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.877 UTC [policies] Evaluate -> DEBU 38df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.878 UTC [policies] Evaluate -> DEBU 38e0 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.878 UTC [policies] Evaluate -> DEBU 38e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:37.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:37.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e4 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 " -peer0.org1.example.com | "2019-05-02 01:31:37.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 " -peer0.org1.example.com | "2019-05-02 01:31:37.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:37.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.883 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.884 UTC [gossip.discovery] sendMemResponse -> DEBU 38e9 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:37.884 UTC [msp] DeserializeIdentity -> DEBU 38ea Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.886 UTC [msp] DeserializeIdentity -> DEBU 38eb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.886 UTC [msp] DeserializeIdentity -> DEBU 38ec Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:37.886 UTC [gossip.comm] Send -> DEBU 38ed Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:37.886 UTC [gossip.discovery] sendMemResponse -> DEBU 38ee Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:37.887 UTC [gossip.comm] sendToEndpoint -> DEBU 38ef Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:37.887 UTC [gossip.comm] sendToEndpoint -> DEBU 38f0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:37.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.152 UTC [msp.identity] Sign -> DEBU 38f2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102B " -peer0.org1.example.com | "2019-05-02 01:31:38.153 UTC [msp.identity] Sign -> DEBU 38f3 Sign: digest: AC143EE0F1959E3732B56563E199CCAA993DDEDEB1F691E1309C3A14F45B68BF " -peer0.org1.example.com | "2019-05-02 01:31:38.153 UTC [msp.identity] Sign -> DEBU 38f4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:38.153 UTC [msp.identity] Sign -> DEBU 38f5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:38.153 UTC [msp] DeserializeIdentity -> DEBU 38f6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.154 UTC [gossip.comm] Send -> DEBU 38f7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.154 UTC [msp] DeserializeIdentity -> DEBU 38f8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.154 UTC [gossip.comm] Send -> DEBU 38f9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.155 UTC [gossip.comm] Send -> DEBU 38fa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.156 UTC [gossip.comm] sendToEndpoint -> DEBU 38fb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.156 UTC [gossip.comm] sendToEndpoint -> DEBU 38fc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.158 UTC [gossip.comm] sendToEndpoint -> DEBU 38fd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.158 UTC [gossip.comm] sendToEndpoint -> DEBU 38fe Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.158 UTC [gossip.comm] sendToEndpoint -> DEBU 38ff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3900 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.167 UTC [gossip.comm] func1 -> DEBU 3901 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.167 UTC [gossip.gossip] handleMessage -> DEBU 3902 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.167 UTC [gossip.gossip] handleMessage -> DEBU 3903 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3904 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.168 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3905 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:38.168 UTC [msp] DeserializeIdentity -> DEBU 3906 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.169 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3907 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:38.169 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3908 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:38.169 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3909 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:38.169 UTC [policies] Evaluate -> DEBU 390a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.170 UTC [policies] Evaluate -> DEBU 390b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:38.170 UTC [policies] Evaluate -> DEBU 390c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.170 UTC [cauthdsl] func1 -> DEBU 390d 0xc004748160 gate 1556760698170470900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:38.170 UTC [cauthdsl] func2 -> DEBU 390e 0xc004748160 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:38.172 UTC [cauthdsl] func2 -> DEBU 3911 0xc004748160 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:38.173 UTC [cauthdsl] func2 -> DEBU 3912 0xc004748160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:38.173 UTC [cauthdsl] func2 -> DEBU 3913 0xc004748160 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:38.174 UTC [cauthdsl] func1 -> DEBU 3914 0xc004748160 gate 1556760698170470900 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:38.175 UTC [policies] Evaluate -> DEBU 3915 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.175 UTC [policies] Evaluate -> DEBU 3916 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.176 UTC [policies] Evaluate -> DEBU 3917 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.176 UTC [cauthdsl] func1 -> DEBU 3918 0xc0046d2130 gate 1556760698176180000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:38.176 UTC [cauthdsl] func2 -> DEBU 3919 0xc0046d2130 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:38.176 UTC [cauthdsl] func2 -> DEBU 391a 0xc0046d2130 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:38.176 UTC [cauthdsl] func2 -> DEBU 391b 0xc0046d2130 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:38.176 UTC [msp.identity] Verify -> DEBU 391c Verify: digest = 00000000 6d 36 55 e9 25 c0 f2 00 9b db 34 e9 ce 3b c3 47 |m6U.%.....4..;.G| -peer0.org1.example.com | 00000010 6d 0f d5 4f da 69 77 1c 64 79 1e a0 b6 0d 4d c4 |m..O.iw.dy....M.|" -peer0.org1.example.com | "2019-05-02 01:31:38.176 UTC [msp.identity] Verify -> DEBU 391d Verify: sig = 00000000 30 45 02 21 00 a8 6c fc 99 d9 a7 78 b4 a9 c8 ab |0E.!..l....x....| -peer0.org1.example.com | 00000010 83 62 f1 6c 3f bf 8b 46 44 23 fe 8b 2d b6 bb ea |.b.l?..FD#..-...| -peer0.org1.example.com | 00000020 5b a5 2b 36 ca 02 20 2d 6f 0e 43 ac d8 e0 63 4b |[.+6.. -o.C...cK| -peer0.org1.example.com | 00000030 2e 99 9a c9 48 0d a0 d1 88 22 30 c9 8d 7d db 94 |....H...."0..}..| -peer0.org1.example.com | 00000040 cd 42 ef 95 65 df dc |.B..e..|" -peer0.org1.example.com | "2019-05-02 01:31:38.177 UTC [cauthdsl] func2 -> DEBU 391e 0xc0046d2130 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:38.177 UTC [cauthdsl] func1 -> DEBU 391f 0xc0046d2130 gate 1556760698176180000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:38.177 UTC [policies] Evaluate -> DEBU 3920 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.177 UTC [policies] Evaluate -> DEBU 3921 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.178 UTC [policies] Evaluate -> DEBU 3922 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.171 UTC [gossip.comm] func1 -> DEBU 390f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.179 UTC [gossip.gossip] handleMessage -> DEBU 3924 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.171 UTC [gossip.comm] func1 -> DEBU 3910 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.179 UTC [policies] Evaluate -> DEBU 3923 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.180 UTC [gossip.discovery] handleAliveMessage -> DEBU 3925 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.180 UTC [gossip.discovery] handleAliveMessage -> DEBU 3926 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.181 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3927 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:38.181 UTC [msp.identity] Verify -> DEBU 3928 Verify: digest = 00000000 ac 14 3e e0 f1 95 9e 37 32 b5 65 63 e1 99 cc aa |..>....72.ec....| -peer0.org1.example.com | 00000010 99 3d de de b1 f6 91 e1 30 9c 3a 14 f4 5b 68 bf |.=......0.:..[h.|" -peer0.org1.example.com | "2019-05-02 01:31:38.182 UTC [msp.identity] Verify -> DEBU 3929 Verify: sig = 00000000 30 44 02 20 17 2a e5 b5 5f d2 6b 2f cc 0f 67 a8 |0D. .*.._.k/..g.| -peer0.org1.example.com | 00000010 d4 bf e5 03 2b cc db 41 94 50 0c b9 f2 d5 0c 98 |....+..A.P......| -peer0.org1.example.com | 00000020 36 e8 93 27 02 20 7f d2 8a 80 22 e5 85 aa cf 21 |6..'. ...."....!| -peer0.org1.example.com | 00000030 ff dc 3e 35 1b bc d4 1e 54 69 dd 4e c0 ae e8 ba |..>5....Ti.N....| -peer0.org1.example.com | 00000040 ff 5d 1a 59 c9 36 |.].Y.6|" -peer0.org1.example.com | "2019-05-02 01:31:38.182 UTC [gossip.discovery] handleAliveMessage -> DEBU 392a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.182 UTC [gossip.discovery] isSentByMe -> DEBU 392b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 392c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 392d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:38.183 UTC [msp.identity] Verify -> DEBU 392e Verify: digest = 00000000 58 c5 74 76 73 6c 98 d5 f9 fa c4 e3 d8 12 bb c5 |X.tvsl..........| -peer0.org1.example.com | 00000010 e1 c7 48 63 21 6c 67 2c 60 5c f2 5e 4f 2f e1 c1 |..Hc!lg,`\.^O/..|" -peer0.org1.example.com | "2019-05-02 01:31:38.183 UTC [msp.identity] Verify -> DEBU 392f Verify: sig = 00000000 30 45 02 21 00 ec 59 c0 69 dc 6e f8 05 3a b5 2e |0E.!..Y.i.n..:..| -peer0.org1.example.com | 00000010 1f c6 9f 71 ff 5b f7 81 7f 5e de 39 bf 65 40 f0 |...q.[...^.9.e@.| -peer0.org1.example.com | 00000020 6a 97 40 b5 dc 02 20 01 31 5c a3 a0 33 f4 a2 38 |j.@... .1\..3..8| -peer0.org1.example.com | 00000030 40 bd a1 4d 32 00 b3 47 8f 96 c6 6f 43 b7 f4 37 |@..M2..G...oC..7| -peer0.org1.example.com | 00000040 47 dc 2c ac 51 b9 6b |G.,.Q.k|" -peer0.org1.example.com | "2019-05-02 01:31:38.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 3930 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3931 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:38.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3932 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:49 " -peer0.org1.example.com | "2019-05-02 01:31:38.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3933 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:49 " -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [gossip.discovery] learnExistingMembers -> DEBU 3934 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [gossip.discovery] learnExistingMembers -> DEBU 3935 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 3936 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3937 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3938 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3939 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [msp.identity] Verify -> DEBU 393a Verify: digest = 00000000 ac 14 3e e0 f1 95 9e 37 32 b5 65 63 e1 99 cc aa |..>....72.ec....| -peer0.org1.example.com | 00000010 99 3d de de b1 f6 91 e1 30 9c 3a 14 f4 5b 68 bf |.=......0.:..[h.|" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [msp.identity] Verify -> DEBU 393b Verify: sig = 00000000 30 44 02 20 17 2a e5 b5 5f d2 6b 2f cc 0f 67 a8 |0D. .*.._.k/..g.| -peer0.org1.example.com | 00000010 d4 bf e5 03 2b cc db 41 94 50 0c b9 f2 d5 0c 98 |....+..A.P......| -peer0.org1.example.com | 00000020 36 e8 93 27 02 20 7f d2 8a 80 22 e5 85 aa cf 21 |6..'. ...."....!| -peer0.org1.example.com | 00000030 ff dc 3e 35 1b bc d4 1e 54 69 dd 4e c0 ae e8 ba |..>5....Ti.N....| -peer0.org1.example.com | 00000040 ff 5d 1a 59 c9 36 |.].Y.6|" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 393c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [gossip.discovery] isSentByMe -> DEBU 393d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 393e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 393f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [msp.identity] Verify -> DEBU 3940 Verify: digest = 00000000 65 b3 a2 c8 ff 0b bd d1 f8 b2 40 8d 2e d5 fb 12 |e.........@.....| -peer0.org1.example.com | 00000010 16 0a 22 1c e0 38 36 67 4a f1 26 f3 0e 73 9c d1 |.."..86gJ.&..s..|" -peer0.org1.example.com | "2019-05-02 01:31:38.184 UTC [msp.identity] Verify -> DEBU 3941 Verify: sig = 00000000 30 45 02 21 00 fb d5 8b 10 b0 47 52 48 d2 81 13 |0E.!......GRH...| -peer0.org1.example.com | 00000010 f7 83 3c d7 3b 33 a8 ee 6d ae 58 4b 56 35 11 ad |..<.;3..m.XKV5..| -peer0.org1.example.com | 00000020 01 af 8a 88 a1 02 20 48 64 6e 90 f5 06 94 67 b6 |...... Hdn....g.| -peer0.org1.example.com | 00000030 b4 cc 4e 52 66 8b 3a 9c fa 17 b4 20 7a 0e 04 50 |..NRf.:.... z..P| -peer0.org1.example.com | 00000040 72 27 19 d4 4c e4 67 |r'..L.g|" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 3942 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 3943 got old alive message about alive peer Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 lastAliveTS: 1556760633448248700, 49 but got ts: inc_num:1556760633448248700 seq_num:41 " -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 3944 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3945 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [msp] DeserializeIdentity -> DEBU 3946 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3947 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3948 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3949 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [policies] Evaluate -> DEBU 394a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [policies] Evaluate -> DEBU 394b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [policies] Evaluate -> DEBU 394c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.185 UTC [cauthdsl] func1 -> DEBU 394d 0xc003fc5420 gate 1556760698185956000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 394e 0xc003fc5420 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 394f 0xc003fc5420 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 3950 0xc003fc5420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 3951 0xc003fc5420 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func1 -> DEBU 3952 0xc003fc5420 gate 1556760698185956000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 3953 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 3954 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 3955 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func1 -> DEBU 3956 0xc003fc5c60 gate 1556760698186298800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 3957 0xc003fc5c60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 3958 0xc003fc5c60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 3959 0xc003fc5c60 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [msp.identity] Verify -> DEBU 395a Verify: digest = 00000000 b4 6f 32 22 86 df bd 85 51 49 81 8f c3 24 f4 6f |.o2"....QI...$.o| -peer0.org1.example.com | 00000010 cb 57 58 e5 56 67 d2 c6 67 eb 16 af 58 99 81 95 |.WX.Vg..g...X...|" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [msp.identity] Verify -> DEBU 395b Verify: sig = 00000000 30 45 02 21 00 97 72 c0 95 97 1a 04 d7 83 92 e8 |0E.!..r.........| -peer0.org1.example.com | 00000010 dc 89 31 a4 64 c3 d0 d1 b0 ed 37 d5 26 3b d9 2a |..1.d.....7.&;.*| -peer0.org1.example.com | 00000020 27 3c 0e 66 b9 02 20 34 93 1c d8 0c 21 5a 97 de |'<.f.. 4....!Z..| -peer0.org1.example.com | 00000030 59 e0 bd 37 fc 65 35 ee 3f 39 70 b2 84 db 29 7a |Y..7.e5.?9p...)z| -peer0.org1.example.com | 00000040 3c 24 80 d5 e3 c7 cd |<$.....|" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 395c 0xc003fc5c60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [cauthdsl] func1 -> DEBU 395d 0xc003fc5c60 gate 1556760698186298800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 395e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 395f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 3960 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 3961 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 3962 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 3963 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3964 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.186 UTC [gossip.gossip] handleMessage -> DEBU 3965 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [gossip.gossip] handleMessage -> DEBU 3966 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [gossip.gossip] handleMessage -> DEBU 3967 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3968 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3969 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [msp.identity] Verify -> DEBU 396a Verify: digest = 00000000 ac 14 3e e0 f1 95 9e 37 32 b5 65 63 e1 99 cc aa |..>....72.ec....| -peer0.org1.example.com | 00000010 99 3d de de b1 f6 91 e1 30 9c 3a 14 f4 5b 68 bf |.=......0.:..[h.|" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [msp.identity] Verify -> DEBU 396b Verify: sig = 00000000 30 44 02 20 17 2a e5 b5 5f d2 6b 2f cc 0f 67 a8 |0D. .*.._.k/..g.| -peer0.org1.example.com | 00000010 d4 bf e5 03 2b cc db 41 94 50 0c b9 f2 d5 0c 98 |....+..A.P......| -peer0.org1.example.com | 00000020 36 e8 93 27 02 20 7f d2 8a 80 22 e5 85 aa cf 21 |6..'. ...."....!| -peer0.org1.example.com | 00000030 ff dc 3e 35 1b bc d4 1e 54 69 dd 4e c0 ae e8 ba |..>5....Ti.N....| -peer0.org1.example.com | 00000040 ff 5d 1a 59 c9 36 |.].Y.6|" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [msp.identity] Verify -> DEBU 396c Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [msp.identity] Verify -> DEBU 396d Verify: sig = 00000000 30 44 02 20 76 4a e3 dc e4 4e 6c 17 29 be 45 12 |0D. vJ...Nl.).E.| -peer0.org1.example.com | 00000010 da 3a cb bd dc cf 3f 92 3c d6 72 21 66 c0 87 e7 |.:....?.<.r!f...| -peer0.org1.example.com | 00000020 2f 05 3a e6 02 20 5a b6 4c 88 5b f1 4a a0 95 70 |/.:.. Z.L.[.J..p| -peer0.org1.example.com | 00000030 d8 3e 4e d4 92 91 9b 5c bd bf f3 af e0 00 be 8b |.>N....\........| -peer0.org1.example.com | 00000040 e0 5d f3 85 d7 0f |.]....|" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 396e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [gossip.discovery] isSentByMe -> DEBU 396f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 3970 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3971 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.411 UTC [gossip.comm] func1 -> DEBU 3972 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.413 UTC [gossip.gossip] handleMessage -> DEBU 3973 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.414 UTC [gossip.gossip] handleMessage -> DEBU 3974 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.414 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3975 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.415 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3976 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:38.416 UTC [msp.identity] Verify -> DEBU 3977 Verify: digest = 00000000 81 ae 97 b0 b4 b1 27 e3 7f 44 c1 19 6b 5c 93 3d |......'..D..k\.=| -peer0.org1.example.com | 00000010 da 1f 19 70 b0 f3 4a 15 28 00 90 02 34 b8 bf c0 |...p..J.(...4...|" -peer0.org1.example.com | "2019-05-02 01:31:38.417 UTC [msp.identity] Verify -> DEBU 3978 Verify: sig = 00000000 30 45 02 21 00 a5 8c 38 45 f7 f2 48 04 db ac 95 |0E.!...8E..H....| -peer0.org1.example.com | 00000010 e3 c6 57 a1 01 9b c5 3c ff 38 03 45 cb d5 bb 23 |..W....<.8.E...#| -peer0.org1.example.com | 00000020 8c f9 3c 44 6c 02 20 05 2f 07 5d 49 4b 68 95 e5 |.. DEBU 3979 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.423 UTC [gossip.comm] func1 -> DEBU 397a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.423 UTC [msp.identity] Verify -> DEBU 397b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:38.424 UTC [msp.identity] Verify -> DEBU 397d Verify: sig = 00000000 30 45 02 21 00 a8 01 bf 5c 90 07 f9 e7 d3 f7 bf |0E.!....\.......| -peer0.org1.example.com | 00000010 a4 2d 7b d1 3a 05 6a 0b fb c2 d0 7a 07 14 c9 9e |.-{.:.j....z....| -peer0.org1.example.com | 00000020 74 3b 53 9d 2d 02 20 53 10 c9 37 20 07 55 d8 79 |t;S.-. S..7 .U.y| -peer0.org1.example.com | 00000030 c2 0a eb a4 64 c2 f3 f5 8b b5 fb 0d ac fa 28 8e |....d.........(.| -peer0.org1.example.com | 00000040 bd a7 c8 ab 5e 6a d6 |....^j.|" -peer0.org1.example.com | "2019-05-02 01:31:38.423 UTC [gossip.gossip] handleMessage -> DEBU 397c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.426 UTC [gossip.discovery] handleAliveMessage -> DEBU 397e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.426 UTC [gossip.discovery] learnExistingMembers -> DEBU 397f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:38.427 UTC [gossip.discovery] learnExistingMembers -> DEBU 3980 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 " -peer0.org1.example.com | "2019-05-02 01:31:38.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3981 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 " -peer0.org1.example.com | "2019-05-02 01:31:38.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3982 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:38.429 UTC [gossip.discovery] learnExistingMembers -> DEBU 3983 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.430 UTC [gossip.discovery] handleAliveMessage -> DEBU 3984 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.431 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3985 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.432 UTC [gossip.gossip] handleMessage -> DEBU 3986 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.432 UTC [gossip.gossip] handleMessage -> DEBU 3987 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.432 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3988 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.433 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3989 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.434 UTC [gossip.gossip] handleMessage -> DEBU 398a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.434 UTC [gossip.discovery] handleMsgFromComm -> DEBU 398b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.435 UTC [gossip.discovery] handleMsgFromComm -> DEBU 398c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.436 UTC [msp] DeserializeIdentity -> DEBU 398d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.437 UTC [msp] DeserializeIdentity -> DEBU 398e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.437 UTC [msp] DeserializeIdentity -> DEBU 398f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.438 UTC [gossip.comm] Send -> DEBU 3990 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.439 UTC [msp] DeserializeIdentity -> DEBU 3991 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.439 UTC [gossip.comm] sendToEndpoint -> DEBU 3992 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.440 UTC [gossip.comm] sendToEndpoint -> DEBU 3993 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.440 UTC [gossip.comm] Send -> DEBU 3994 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.444 UTC [gossip.comm] sendToEndpoint -> DEBU 3995 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.444 UTC [gossip.comm] sendToEndpoint -> DEBU 3996 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.479 UTC [gossip.comm] func1 -> DEBU 3997 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.479 UTC [gossip.gossip] handleMessage -> DEBU 3998 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.479 UTC [gossip.gossip] handleMessage -> DEBU 3999 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.479 UTC [gossip.discovery] handleMsgFromComm -> DEBU 399a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.480 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 399b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:38.480 UTC [msp] DeserializeIdentity -> DEBU 399c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.480 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 399d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:38.480 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 399e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:38.480 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 399f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:38.480 UTC [policies] Evaluate -> DEBU 39a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.480 UTC [policies] Evaluate -> DEBU 39a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:38.480 UTC [policies] Evaluate -> DEBU 39a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.481 UTC [cauthdsl] func1 -> DEBU 39a3 0xc0043401c0 gate 1556760698480996500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:38.481 UTC [cauthdsl] func2 -> DEBU 39a4 0xc0043401c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:38.482 UTC [cauthdsl] func2 -> DEBU 39a5 0xc0043401c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:38.482 UTC [cauthdsl] func2 -> DEBU 39a6 0xc0043401c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:38.482 UTC [cauthdsl] func2 -> DEBU 39a7 0xc0043401c0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:38.483 UTC [cauthdsl] func1 -> DEBU 39a8 0xc0043401c0 gate 1556760698480996500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:38.483 UTC [policies] Evaluate -> DEBU 39a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.483 UTC [policies] Evaluate -> DEBU 39aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.483 UTC [policies] Evaluate -> DEBU 39ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.483 UTC [cauthdsl] func1 -> DEBU 39ac 0xc004340ac0 gate 1556760698483415100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:38.484 UTC [cauthdsl] func2 -> DEBU 39ad 0xc004340ac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:38.484 UTC [cauthdsl] func2 -> DEBU 39ae 0xc004340ac0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:38.484 UTC [cauthdsl] func2 -> DEBU 39af 0xc004340ac0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:38.484 UTC [msp.identity] Verify -> DEBU 39b0 Verify: digest = 00000000 e5 1a e9 75 af 78 0f 4a 09 e2 fb 21 46 6a 3d 3b |...u.x.J...!Fj=;| -peer0.org1.example.com | 00000010 be c7 cc 65 26 17 15 e5 23 b4 da 79 c4 46 b8 5a |...e&...#..y.F.Z|" -peer0.org1.example.com | "2019-05-02 01:31:38.484 UTC [msp.identity] Verify -> DEBU 39b1 Verify: sig = 00000000 30 45 02 21 00 fc 71 8d 99 db 91 31 01 30 c7 d0 |0E.!..q....1.0..| -peer0.org1.example.com | 00000010 72 a9 5a ac 6e 8d 43 41 79 48 bd 4b 2a 3e c3 96 |r.Z.n.CAyH.K*>..| -peer0.org1.example.com | 00000020 9f f2 30 d4 8f 02 20 2b 70 12 b8 6e f2 81 b5 e8 |..0... +p..n....| -peer0.org1.example.com | 00000030 d2 4e 8e dc c0 81 4c 8f 69 9f 6a 26 a0 ca 1c 7f |.N....L.i.j&....| -peer0.org1.example.com | 00000040 35 23 c0 16 51 83 a7 |5#..Q..|" -peer0.org1.example.com | "2019-05-02 01:31:38.484 UTC [cauthdsl] func2 -> DEBU 39b2 0xc004340ac0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:38.488 UTC [cauthdsl] func1 -> DEBU 39b3 0xc004340ac0 gate 1556760698483415100 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:38.488 UTC [policies] Evaluate -> DEBU 39b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.489 UTC [policies] Evaluate -> DEBU 39b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.489 UTC [policies] Evaluate -> DEBU 39b6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.489 UTC [policies] Evaluate -> DEBU 39b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.490 UTC [gossip.discovery] handleAliveMessage -> DEBU 39b8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.490 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:38.490 UTC [gossip.comm] func1 -> DEBU 39ba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.490 UTC [gossip.comm] func1 -> DEBU 39bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.490 UTC [gossip.discovery] learnExistingMembers -> DEBU 39bb updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 " -peer0.org1.example.com | "2019-05-02 01:31:38.492 UTC [gossip.discovery] learnExistingMembers -> DEBU 39be Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 " -peer0.org1.example.com | "2019-05-02 01:31:38.492 UTC [gossip.discovery] learnExistingMembers -> DEBU 39bf Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:38.492 UTC [gossip.discovery] learnExistingMembers -> DEBU 39c0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.492 UTC [gossip.discovery] handleAliveMessage -> DEBU 39c1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.492 UTC [gossip.gossip] handleMessage -> DEBU 39bd Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.493 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.496 UTC [gossip.gossip] handleMessage -> DEBU 39c3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.496 UTC [gossip.gossip] handleMessage -> DEBU 39c4 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.497 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.497 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.498 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.498 UTC [gossip.gossip] handleMessage -> DEBU 39c8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.498 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.511 UTC [msp] DeserializeIdentity -> DEBU 39ca Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.513 UTC [msp] DeserializeIdentity -> DEBU 39cb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.513 UTC [msp] DeserializeIdentity -> DEBU 39cc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.514 UTC [msp] DeserializeIdentity -> DEBU 39cd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.514 UTC [msp] DeserializeIdentity -> DEBU 39ce Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.515 UTC [msp] DeserializeIdentity -> DEBU 39cf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.516 UTC [gossip.comm] Send -> DEBU 39d0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.516 UTC [msp] DeserializeIdentity -> DEBU 39d1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.516 UTC [gossip.comm] sendToEndpoint -> DEBU 39d2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.517 UTC [gossip.comm] sendToEndpoint -> DEBU 39d3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.519 UTC [msp] DeserializeIdentity -> DEBU 39d4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.520 UTC [gossip.comm] Send -> DEBU 39d5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.520 UTC [gossip.comm] sendToEndpoint -> DEBU 39d6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.521 UTC [gossip.comm] sendToEndpoint -> DEBU 39d7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.698 UTC [msp.identity] Sign -> DEBU 39d8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102C " -peer0.org1.example.com | "2019-05-02 01:31:38.698 UTC [msp.identity] Sign -> DEBU 39d9 Sign: digest: 50BA618F6337171F01B1E532D00B601A1B0BC1A5D9E841450B3FC89B50810877 " -peer0.org1.example.com | "2019-05-02 01:31:38.698 UTC [msp.identity] Sign -> DEBU 39da Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:38.699 UTC [msp.identity] Sign -> DEBU 39db Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:38.699 UTC [gossip.discovery] periodicalSendAlive -> DEBU 39dc Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:38.708 UTC [msp] DeserializeIdentity -> DEBU 39dd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.708 UTC [msp] DeserializeIdentity -> DEBU 39de Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.708 UTC [msp] DeserializeIdentity -> DEBU 39df Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.708 UTC [gossip.comm] Send -> DEBU 39e0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.708 UTC [gossip.comm] Send -> DEBU 39e1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.708 UTC [msp] DeserializeIdentity -> DEBU 39e2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.708 UTC [gossip.comm] Send -> DEBU 39e4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.708 UTC [gossip.comm] sendToEndpoint -> DEBU 39e3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.709 UTC [gossip.comm] sendToEndpoint -> DEBU 39e5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.709 UTC [gossip.comm] sendToEndpoint -> DEBU 39e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.709 UTC [gossip.comm] sendToEndpoint -> DEBU 39e7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.709 UTC [gossip.comm] sendToEndpoint -> DEBU 39e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.709 UTC [gossip.comm] sendToEndpoint -> DEBU 39e9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.816 UTC [gossip.comm] func1 -> DEBU 39ea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.817 UTC [gossip.gossip] handleMessage -> DEBU 39eb Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.818 UTC [gossip.gossip] handleMessage -> DEBU 39ec Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39ed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.819 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39ee Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:38.819 UTC [msp] DeserializeIdentity -> DEBU 39ef Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.820 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39f0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:38.820 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39f1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:38.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39f2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:38.821 UTC [policies] Evaluate -> DEBU 39f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.821 UTC [policies] Evaluate -> DEBU 39f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:38.822 UTC [policies] Evaluate -> DEBU 39f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.822 UTC [cauthdsl] func1 -> DEBU 39f6 0xc0042efcc0 gate 1556760698822581600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:38.823 UTC [cauthdsl] func2 -> DEBU 39f7 0xc0042efcc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:38.823 UTC [cauthdsl] func2 -> DEBU 39f8 0xc0042efcc0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:38.823 UTC [cauthdsl] func2 -> DEBU 39f9 0xc0042efcc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:38.824 UTC [gossip.comm] func1 -> DEBU 39fa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.825 UTC [gossip.gossip] handleMessage -> DEBU 39fb Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.824 UTC [cauthdsl] func2 -> DEBU 39fc 0xc0042efcc0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:38.827 UTC [cauthdsl] func1 -> DEBU 39fe 0xc0042efcc0 gate 1556760698822581600 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:38.826 UTC [gossip.comm] func1 -> DEBU 39fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.827 UTC [policies] Evaluate -> DEBU 39ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.828 UTC [policies] Evaluate -> DEBU 3a00 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.829 UTC [policies] Evaluate -> DEBU 3a01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:38.829 UTC [cauthdsl] func1 -> DEBU 3a02 0xc004254500 gate 1556760698829350600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:38.829 UTC [cauthdsl] func2 -> DEBU 3a03 0xc004254500 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:38.830 UTC [cauthdsl] func2 -> DEBU 3a04 0xc004254500 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:38.830 UTC [cauthdsl] func2 -> DEBU 3a05 0xc004254500 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:38.831 UTC [msp.identity] Verify -> DEBU 3a06 Verify: digest = 00000000 e5 93 b4 26 5d ba eb 35 a1 c6 82 e0 04 e8 5a f8 |...&]..5......Z.| -peer0.org1.example.com | 00000010 d7 49 8a d2 d1 60 c0 53 0b 33 1a 1c 67 ed bb f0 |.I...`.S.3..g...|" -peer0.org1.example.com | "2019-05-02 01:31:38.831 UTC [msp.identity] Verify -> DEBU 3a07 Verify: sig = 00000000 30 44 02 20 30 43 6d eb cd ae ea 7d 01 e7 b4 63 |0D. 0Cm....}...c| -peer0.org1.example.com | 00000010 9e 1d 63 14 43 d9 61 4d 98 c2 3c a8 85 c4 34 97 |..c.C.aM..<...4.| -peer0.org1.example.com | 00000020 07 fa e6 b2 02 20 1a 5d d0 68 c3 bd 39 97 04 91 |..... .].h..9...| -peer0.org1.example.com | 00000030 c1 d8 60 25 43 cc 10 61 5a cd b2 a8 b3 f6 c1 8f |..`%C..aZ.......| -peer0.org1.example.com | 00000040 3c 9a 24 60 af ca |<.$`..|" -peer0.org1.example.com | "2019-05-02 01:31:38.832 UTC [cauthdsl] func2 -> DEBU 3a08 0xc004254500 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:38.832 UTC [cauthdsl] func1 -> DEBU 3a09 0xc004254500 gate 1556760698829350600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:38.832 UTC [policies] Evaluate -> DEBU 3a0a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.832 UTC [policies] Evaluate -> DEBU 3a0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.833 UTC [policies] Evaluate -> DEBU 3a0c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.833 UTC [policies] Evaluate -> DEBU 3a0d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:38.833 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a0e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.833 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:38.833 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a10 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 " -peer0.org1.example.com | "2019-05-02 01:31:38.834 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a11 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 " -peer0.org1.example.com | "2019-05-02 01:31:38.835 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a12 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:38.835 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a13 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.836 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a14 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.836 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a15 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.837 UTC [gossip.gossip] handleMessage -> DEBU 3a16 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.837 UTC [gossip.gossip] handleMessage -> DEBU 3a18 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.837 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.838 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a19 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.839 UTC [gossip.gossip] handleMessage -> DEBU 3a1a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.839 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a1b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.840 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a1c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a1d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a1e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a1f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a20 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a21 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a22 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.844 UTC [gossip.comm] Send -> DEBU 3a23 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a24 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.845 UTC [msp] DeserializeIdentity -> DEBU 3a25 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:38.845 UTC [gossip.comm] Send -> DEBU 3a26 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:38.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3a27 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3a28 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:38.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3a29 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:38.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3a2a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:40.786 UTC [msp] DeserializeIdentity -> DEBU 3a2b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.786 UTC [msp] DeserializeIdentity -> DEBU 3a2c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.786 UTC [gossip.comm] Send -> DEBU 3a2d Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:40.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3a2e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3a2f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:40.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3a30 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3a31 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:40.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3a32 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3a33 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:40.789 UTC [gossip.comm] func1 -> DEBU 3a34 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.790 UTC [gossip.gossip] handleMessage -> DEBU 3a35 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.791 UTC [msp] DeserializeIdentity -> DEBU 3a38 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.790 UTC [gossip.comm] func1 -> DEBU 3a36 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.790 UTC [gossip.comm] func1 -> DEBU 3a37 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.792 UTC [msp] DeserializeIdentity -> DEBU 3a39 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.793 UTC [msp] DeserializeIdentity -> DEBU 3a3a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.795 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:40.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a3c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a3d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.797 UTC [policies] Evaluate -> DEBU 3a3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.798 UTC [policies] Evaluate -> DEBU 3a3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:40.799 UTC [policies] Evaluate -> DEBU 3a40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.799 UTC [cauthdsl] func1 -> DEBU 3a41 0xc003fa4520 gate 1556760700799623100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.800 UTC [cauthdsl] func2 -> DEBU 3a42 0xc003fa4520 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.800 UTC [cauthdsl] func2 -> DEBU 3a43 0xc003fa4520 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.801 UTC [cauthdsl] func2 -> DEBU 3a44 0xc003fa4520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:40.802 UTC [cauthdsl] func2 -> DEBU 3a45 0xc003fa4520 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.802 UTC [cauthdsl] func1 -> DEBU 3a46 0xc003fa4520 gate 1556760700799623100 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.802 UTC [policies] Evaluate -> DEBU 3a47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.802 UTC [policies] Evaluate -> DEBU 3a48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.802 UTC [policies] Evaluate -> DEBU 3a49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.803 UTC [cauthdsl] func1 -> DEBU 3a4a 0xc003fa4d80 gate 1556760700803020400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.803 UTC [cauthdsl] func2 -> DEBU 3a4b 0xc003fa4d80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.803 UTC [cauthdsl] func2 -> DEBU 3a4c 0xc003fa4d80 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.803 UTC [cauthdsl] func2 -> DEBU 3a4d 0xc003fa4d80 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.803 UTC [msp.identity] Verify -> DEBU 3a4e Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:40.804 UTC [msp.identity] Verify -> DEBU 3a4f Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:40.804 UTC [cauthdsl] func2 -> DEBU 3a50 0xc003fa4d80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.805 UTC [cauthdsl] func1 -> DEBU 3a51 0xc003fa4d80 gate 1556760700803020400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:40.805 UTC [policies] Evaluate -> DEBU 3a52 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.806 UTC [policies] Evaluate -> DEBU 3a53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.807 UTC [policies] Evaluate -> DEBU 3a54 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.808 UTC [policies] Evaluate -> DEBU 3a55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.813 UTC [msp.identity] Verify -> DEBU 3a56 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:40.814 UTC [msp.identity] Verify -> DEBU 3a57 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:40.815 UTC [msp.identity] Verify -> DEBU 3a58 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:40.816 UTC [msp.identity] Verify -> DEBU 3a59 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:40.816 UTC [gossip.privdata] run -> DEBU 3a5a Start reconcile missing private info" -peer0.org1.example.com | "2019-05-02 01:31:40.817 UTC [msp] DeserializeIdentity -> DEBU 3a5b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.817 UTC [msp] DeserializeIdentity -> DEBU 3a5c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.818 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a5d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:40.818 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a5e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.818 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a5f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.819 UTC [policies] Evaluate -> DEBU 3a60 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.819 UTC [policies] Evaluate -> DEBU 3a61 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:40.819 UTC [policies] Evaluate -> DEBU 3a62 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.820 UTC [cauthdsl] func1 -> DEBU 3a63 0xc003f10630 gate 1556760700820488100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.820 UTC [cauthdsl] func2 -> DEBU 3a64 0xc003f10630 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.820 UTC [cauthdsl] func2 -> DEBU 3a65 0xc003f10630 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.821 UTC [cauthdsl] func2 -> DEBU 3a66 0xc003f10630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:40.821 UTC [cauthdsl] func2 -> DEBU 3a67 0xc003f10630 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.821 UTC [cauthdsl] func1 -> DEBU 3a68 0xc003f10630 gate 1556760700820488100 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.821 UTC [policies] Evaluate -> DEBU 3a69 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.821 UTC [policies] Evaluate -> DEBU 3a6a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.821 UTC [policies] Evaluate -> DEBU 3a6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.822 UTC [cauthdsl] func1 -> DEBU 3a6c 0xc003f10e70 gate 1556760700822161200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.822 UTC [cauthdsl] func2 -> DEBU 3a6d 0xc003f10e70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.822 UTC [cauthdsl] func2 -> DEBU 3a6e 0xc003f10e70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.822 UTC [cauthdsl] func2 -> DEBU 3a6f 0xc003f10e70 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.822 UTC [msp.identity] Verify -> DEBU 3a70 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:40.822 UTC [msp.identity] Verify -> DEBU 3a71 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:40.823 UTC [cauthdsl] func2 -> DEBU 3a72 0xc003f10e70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.823 UTC [cauthdsl] func1 -> DEBU 3a73 0xc003f10e70 gate 1556760700822161200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:40.824 UTC [policies] Evaluate -> DEBU 3a74 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.824 UTC [policies] Evaluate -> DEBU 3a75 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.824 UTC [policies] Evaluate -> DEBU 3a76 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.824 UTC [policies] Evaluate -> DEBU 3a77 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.824 UTC [gossip.gossip] handleMessage -> DEBU 3a78 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:40.824 UTC [leveldbhelper] GetIterator -> DEBU 3a79 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xf6}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" -peer0.org1.example.com | "2019-05-02 01:31:40.824 UTC [gossip.gossip] handleMessage -> DEBU 3a7a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.824 UTC [gossip.privdata] reconcile -> DEBU 3a7b Reconciliation cycle finished successfully. no items to reconcile" -peer0.org1.example.com | "2019-05-02 01:31:40.824 UTC [msp] DeserializeIdentity -> DEBU 3a7c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.825 UTC [msp] DeserializeIdentity -> DEBU 3a7d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.826 UTC [msp] DeserializeIdentity -> DEBU 3a7e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a7f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:40.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a80 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a81 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.827 UTC [policies] Evaluate -> DEBU 3a82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.827 UTC [policies] Evaluate -> DEBU 3a83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [policies] Evaluate -> DEBU 3a84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [cauthdsl] func1 -> DEBU 3a85 0xc003dc89a0 gate 1556760700828120500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [cauthdsl] func2 -> DEBU 3a86 0xc003dc89a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [cauthdsl] func2 -> DEBU 3a87 0xc003dc89a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [cauthdsl] func2 -> DEBU 3a88 0xc003dc89a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [cauthdsl] func2 -> DEBU 3a89 0xc003dc89a0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [cauthdsl] func1 -> DEBU 3a8a 0xc003dc89a0 gate 1556760700828120500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [policies] Evaluate -> DEBU 3a8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [policies] Evaluate -> DEBU 3a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [policies] Evaluate -> DEBU 3a8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.828 UTC [cauthdsl] func1 -> DEBU 3a8e 0xc003dc91e0 gate 1556760700828955200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.829 UTC [cauthdsl] func2 -> DEBU 3a8f 0xc003dc91e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.829 UTC [cauthdsl] func2 -> DEBU 3a90 0xc003dc91e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.829 UTC [cauthdsl] func2 -> DEBU 3a91 0xc003dc91e0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.829 UTC [msp.identity] Verify -> DEBU 3a92 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:40.829 UTC [msp.identity] Verify -> DEBU 3a93 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:40.829 UTC [cauthdsl] func2 -> DEBU 3a94 0xc003dc91e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.829 UTC [cauthdsl] func1 -> DEBU 3a95 0xc003dc91e0 gate 1556760700828955200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:40.829 UTC [policies] Evaluate -> DEBU 3a96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.830 UTC [policies] Evaluate -> DEBU 3a97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.830 UTC [policies] Evaluate -> DEBU 3a98 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.830 UTC [policies] Evaluate -> DEBU 3a99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.831 UTC [msp.identity] Verify -> DEBU 3a9a Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:40.831 UTC [msp.identity] Verify -> DEBU 3a9b Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:40.831 UTC [msp] DeserializeIdentity -> DEBU 3a9c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.831 UTC [msp] DeserializeIdentity -> DEBU 3a9d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.831 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:40.831 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a9f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.832 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3aa0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.832 UTC [policies] Evaluate -> DEBU 3aa1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.832 UTC [policies] Evaluate -> DEBU 3aa2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:40.832 UTC [policies] Evaluate -> DEBU 3aa3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.832 UTC [cauthdsl] func1 -> DEBU 3aa4 0xc003b63140 gate 1556760700832502200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.832 UTC [cauthdsl] func2 -> DEBU 3aa5 0xc003b63140 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.832 UTC [cauthdsl] func2 -> DEBU 3aa6 0xc003b63140 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.832 UTC [cauthdsl] func2 -> DEBU 3aa7 0xc003b63140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:40.832 UTC [cauthdsl] func2 -> DEBU 3aa8 0xc003b63140 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.832 UTC [cauthdsl] func1 -> DEBU 3aa9 0xc003b63140 gate 1556760700832502200 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.833 UTC [policies] Evaluate -> DEBU 3aaa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.833 UTC [policies] Evaluate -> DEBU 3aab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.833 UTC [policies] Evaluate -> DEBU 3aac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.833 UTC [cauthdsl] func1 -> DEBU 3aad 0xc003b63980 gate 1556760700833403600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.833 UTC [cauthdsl] func2 -> DEBU 3aae 0xc003b63980 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.833 UTC [cauthdsl] func2 -> DEBU 3aaf 0xc003b63980 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.833 UTC [cauthdsl] func2 -> DEBU 3ab0 0xc003b63980 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.833 UTC [msp.identity] Verify -> DEBU 3ab1 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:40.833 UTC [msp.identity] Verify -> DEBU 3ab2 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:40.834 UTC [cauthdsl] func2 -> DEBU 3ab3 0xc003b63980 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.834 UTC [cauthdsl] func1 -> DEBU 3ab4 0xc003b63980 gate 1556760700833403600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:40.834 UTC [policies] Evaluate -> DEBU 3ab5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.834 UTC [policies] Evaluate -> DEBU 3ab6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.834 UTC [policies] Evaluate -> DEBU 3ab7 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.834 UTC [policies] Evaluate -> DEBU 3ab8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.835 UTC [msp.identity] Verify -> DEBU 3ab9 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:40.835 UTC [msp.identity] Verify -> DEBU 3aba Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:40.835 UTC [gossip.gossip] handleMessage -> DEBU 3abb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:40.836 UTC [gossip.gossip] handleMessage -> DEBU 3abc Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.837 UTC [msp.identity] Verify -> DEBU 3abd Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:40.838 UTC [msp.identity] Verify -> DEBU 3abe Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:40.838 UTC [msp.identity] Verify -> DEBU 3abf Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:40.838 UTC [msp.identity] Verify -> DEBU 3ac0 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:40.839 UTC [msp] DeserializeIdentity -> DEBU 3ac1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.839 UTC [msp] DeserializeIdentity -> DEBU 3ac2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.840 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ac3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:40.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ac4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ac5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.840 UTC [policies] Evaluate -> DEBU 3ac6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.840 UTC [policies] Evaluate -> DEBU 3ac7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:40.840 UTC [policies] Evaluate -> DEBU 3ac8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.840 UTC [cauthdsl] func1 -> DEBU 3ac9 0xc003a30a90 gate 1556760700840754700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.841 UTC [cauthdsl] func2 -> DEBU 3aca 0xc003a30a90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.841 UTC [cauthdsl] func2 -> DEBU 3acb 0xc003a30a90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.841 UTC [cauthdsl] func2 -> DEBU 3acc 0xc003a30a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:40.841 UTC [cauthdsl] func2 -> DEBU 3acd 0xc003a30a90 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.841 UTC [cauthdsl] func1 -> DEBU 3ace 0xc003a30a90 gate 1556760700840754700 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.841 UTC [policies] Evaluate -> DEBU 3acf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.842 UTC [policies] Evaluate -> DEBU 3ad0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.842 UTC [policies] Evaluate -> DEBU 3ad1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.842 UTC [cauthdsl] func1 -> DEBU 3ad2 0xc003a312d0 gate 1556760700842295800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.842 UTC [cauthdsl] func2 -> DEBU 3ad3 0xc003a312d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.842 UTC [cauthdsl] func2 -> DEBU 3ad4 0xc003a312d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.842 UTC [cauthdsl] func2 -> DEBU 3ad5 0xc003a312d0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.842 UTC [msp.identity] Verify -> DEBU 3ad6 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:40.842 UTC [msp.identity] Verify -> DEBU 3ad7 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:40.843 UTC [cauthdsl] func2 -> DEBU 3ad8 0xc003a312d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.843 UTC [cauthdsl] func1 -> DEBU 3ad9 0xc003a312d0 gate 1556760700842295800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:40.843 UTC [policies] Evaluate -> DEBU 3ada Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.843 UTC [policies] Evaluate -> DEBU 3adb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.843 UTC [policies] Evaluate -> DEBU 3adc Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.843 UTC [policies] Evaluate -> DEBU 3add == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.843 UTC [msp] DeserializeIdentity -> DEBU 3ade Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.843 UTC [msp] DeserializeIdentity -> DEBU 3adf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ae0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:40.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ae1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ae2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:40.844 UTC [policies] Evaluate -> DEBU 3ae3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.844 UTC [policies] Evaluate -> DEBU 3ae4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:40.844 UTC [policies] Evaluate -> DEBU 3ae5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.845 UTC [cauthdsl] func1 -> DEBU 3ae6 0xc0038a0ac0 gate 1556760700844940300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.845 UTC [cauthdsl] func2 -> DEBU 3ae7 0xc0038a0ac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.845 UTC [cauthdsl] func2 -> DEBU 3ae8 0xc0038a0ac0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.845 UTC [cauthdsl] func2 -> DEBU 3ae9 0xc0038a0ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:40.845 UTC [cauthdsl] func2 -> DEBU 3aea 0xc0038a0ac0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.845 UTC [cauthdsl] func1 -> DEBU 3aeb 0xc0038a0ac0 gate 1556760700844940300 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:40.845 UTC [policies] Evaluate -> DEBU 3aec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.846 UTC [policies] Evaluate -> DEBU 3aed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.846 UTC [policies] Evaluate -> DEBU 3aee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:40.846 UTC [cauthdsl] func1 -> DEBU 3aef 0xc0038a1300 gate 1556760700846128600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:40.846 UTC [cauthdsl] func2 -> DEBU 3af0 0xc0038a1300 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:40.846 UTC [cauthdsl] func2 -> DEBU 3af1 0xc0038a1300 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:40.847 UTC [cauthdsl] func2 -> DEBU 3af2 0xc0038a1300 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.847 UTC [msp.identity] Verify -> DEBU 3af3 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:40.847 UTC [msp.identity] Verify -> DEBU 3af4 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:40.848 UTC [cauthdsl] func2 -> DEBU 3af5 0xc0038a1300 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:40.848 UTC [cauthdsl] func1 -> DEBU 3af6 0xc0038a1300 gate 1556760700846128600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:40.848 UTC [policies] Evaluate -> DEBU 3af7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.848 UTC [policies] Evaluate -> DEBU 3af8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.848 UTC [policies] Evaluate -> DEBU 3af9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.849 UTC [policies] Evaluate -> DEBU 3afa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:40.849 UTC [gossip.gossip] handleMessage -> DEBU 3afb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:40.916 UTC [msp] DeserializeIdentity -> DEBU 3afc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.917 UTC [msp] DeserializeIdentity -> DEBU 3afd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.917 UTC [gossip.pull] Hello -> DEBU 3afe Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:40.917 UTC [msp] DeserializeIdentity -> DEBU 3aff Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.917 UTC [msp] DeserializeIdentity -> DEBU 3b00 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:40.918 UTC [gossip.comm] Send -> DEBU 3b01 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:40.918 UTC [gossip.comm] sendToEndpoint -> DEBU 3b02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.918 UTC [gossip.comm] sendToEndpoint -> DEBU 3b03 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:40.919 UTC [gossip.comm] func1 -> DEBU 3b04 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16780712577794422265 , Msg_type: BLOCK_MSG, digests: [4 7 5 6 8 9 1 2 3], Envelope: 61 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.920 UTC [gossip.gossip] handleMessage -> DEBU 3b05 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16780712577794422265 , Msg_type: BLOCK_MSG, digests: [4 7 5 6 8 9 1 2 3], Envelope: 61 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.921 UTC [gossip.pull] HandleMessage -> DEBU 3b06 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16780712577794422265 , Msg_type: BLOCK_MSG, digests: [4 7 5 6 8 9 1 2 3], Envelope: 61 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:40.921 UTC [gossip.gossip] handleMessage -> DEBU 3b07 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.050 UTC [gossip.comm] func1 -> DEBU 3b08 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.050 UTC [gossip.gossip] handleMessage -> DEBU 3b09 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.050 UTC [msp] DeserializeIdentity -> DEBU 3b0a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.051 UTC [msp] DeserializeIdentity -> DEBU 3b0b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.051 UTC [gossip.gossip] handleMessage -> DEBU 3b0c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.090 UTC [gossip.comm] func1 -> DEBU 3b0d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.090 UTC [gossip.gossip] handleMessage -> DEBU 3b0e Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.090 UTC [gossip.pull] HandleMessage -> DEBU 3b0f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.090 UTC [gossip.pull] SendDigest -> DEBU 3b10 Sending BLOCK_MSG digest: [3 4 2 5 6 7 8 9 1] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:41.090 UTC [gossip.gossip] handleMessage -> DEBU 3b11 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.276 UTC [gossip.comm] func1 -> DEBU 3b12 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.276 UTC [gossip.gossip] handleMessage -> DEBU 3b13 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.276 UTC [msp] DeserializeIdentity -> DEBU 3b14 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.276 UTC [msp] DeserializeIdentity -> DEBU 3b15 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.276 UTC [msp] DeserializeIdentity -> DEBU 3b16 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.276 UTC [gossip.gossip] handleMessage -> DEBU 3b17 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.402 UTC [gossip.comm] func1 -> DEBU 3b18 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.402 UTC [gossip.gossip] handleMessage -> DEBU 3b19 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.403 UTC [gossip.pull] HandleMessage -> DEBU 3b1a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.404 UTC [gossip.pull] SendDigest -> DEBU 3b1b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:41.408 UTC [gossip.gossip] handleMessage -> DEBU 3b1c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.436 UTC [gossip.comm] func1 -> DEBU 3b1d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.436 UTC [gossip.gossip] handleMessage -> DEBU 3b1e Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.436 UTC [gossip.gossip] handleMessage -> DEBU 3b1f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.436 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b20 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.436 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b21 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:41.436 UTC [msp.identity] Verify -> DEBU 3b22 Verify: digest = 00000000 82 2d ab 24 09 38 af 3d fa 5a 82 a1 df 32 fd 4b |.-.$.8.=.Z...2.K| -peer0.org1.example.com | 00000010 91 b6 3b 9f 18 0b 94 25 72 13 dc b5 51 2d 9e 7a |..;....%r...Q-.z|" -peer0.org1.example.com | "2019-05-02 01:31:41.436 UTC [msp.identity] Verify -> DEBU 3b23 Verify: sig = 00000000 30 45 02 21 00 9e c7 89 a6 55 56 d3 e3 16 4c 3a |0E.!.....UV...L:| -peer0.org1.example.com | 00000010 cb 50 51 fa c5 37 50 2d fd 95 8b b5 d0 01 47 5f |.PQ..7P-......G_| -peer0.org1.example.com | 00000020 12 28 1a 72 00 02 20 1d 45 da 54 47 84 7a 10 bb |.(.r.. .E.TG.z..| -peer0.org1.example.com | 00000030 3b 1d a6 0f d3 e8 6f 5f 6d 76 9a 8b 64 0f b3 a9 |;.....o_mv..d...| -peer0.org1.example.com | 00000040 c7 08 c2 f6 9e 2f bd |...../.|" -peer0.org1.example.com | "2019-05-02 01:31:41.436 UTC [msp.identity] Verify -> DEBU 3b24 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:41.437 UTC [msp.identity] Verify -> DEBU 3b25 Verify: sig = 00000000 30 44 02 20 66 b1 2d b6 cf e9 4b 71 ab cc 4c 46 |0D. f.-...Kq..LF| -peer0.org1.example.com | 00000010 0f 94 78 4a a4 fe 31 09 fa 24 c6 c4 2e 4f 92 83 |..xJ..1..$...O..| -peer0.org1.example.com | 00000020 2d 60 f3 0e 02 20 1f 27 cf 8e 4c 71 52 32 72 db |-`... .'..LqR2r.| -peer0.org1.example.com | 00000030 8f a7 0d 74 e1 83 36 dd 47 d1 93 cf 4d 4c 6a d8 |...t..6.G...MLj.| -peer0.org1.example.com | 00000040 b1 53 80 f1 20 60 |.S.. `|" -peer0.org1.example.com | "2019-05-02 01:31:41.437 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b26 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.437 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b27 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:41.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b28 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 " -peer0.org1.example.com | "2019-05-02 01:31:41.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b29 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 " -peer0.org1.example.com | "2019-05-02 01:31:41.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b2a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:41.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b2b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.440 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b2c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.440 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b2d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3b2e Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:41.440 UTC [msp] DeserializeIdentity -> DEBU 3b2f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.440 UTC [msp] DeserializeIdentity -> DEBU 3b30 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.440 UTC [gossip.comm] Send -> DEBU 3b31 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:41.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3b32 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:41.441 UTC [gossip.comm] sendToEndpoint -> DEBU 3b33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.441 UTC [gossip.comm] sendToEndpoint -> DEBU 3b34 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.497 UTC [gossip.comm] func1 -> DEBU 3b35 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.497 UTC [gossip.gossip] handleMessage -> DEBU 3b36 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.497 UTC [gossip.pull] HandleMessage -> DEBU 3b37 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.497 UTC [msp] DeserializeIdentity -> DEBU 3b38 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.497 UTC [msp] DeserializeIdentity -> DEBU 3b39 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.497 UTC [msp] DeserializeIdentity -> DEBU 3b3a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.497 UTC [msp] DeserializeIdentity -> DEBU 3b3b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.497 UTC [msp] DeserializeIdentity -> DEBU 3b3c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.498 UTC [msp] DeserializeIdentity -> DEBU 3b3d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.498 UTC [gossip.pull] SendDigest -> DEBU 3b3e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:41.498 UTC [gossip.gossip] handleMessage -> DEBU 3b3f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.525 UTC [gossip.comm] func1 -> DEBU 3b40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.525 UTC [gossip.gossip] handleMessage -> DEBU 3b41 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.525 UTC [gossip.gossip] handleMessage -> DEBU 3b42 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.525 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b44 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [msp] DeserializeIdentity -> DEBU 3b45 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b47 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b48 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b49 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b4a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [cauthdsl] func1 -> DEBU 3b4c 0xc0035cd280 gate 1556760701526437900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b4d 0xc0035cd280 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b4e 0xc0035cd280 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b4f 0xc0035cd280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b50 0xc0035cd280 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [cauthdsl] func1 -> DEBU 3b51 0xc0035cd280 gate 1556760701526437900 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b52 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [cauthdsl] func1 -> DEBU 3b55 0xc0035cdaf0 gate 1556760701526783300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b56 0xc0035cdaf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b57 0xc0035cdaf0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b58 0xc0035cdaf0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [msp.identity] Verify -> DEBU 3b59 Verify: digest = 00000000 69 95 5e e9 5d f4 dc 43 93 b8 7f 5d e1 69 ff 34 |i.^.]..C...].i.4| -peer0.org1.example.com | 00000010 ec fa a2 32 8b 7a 9d fd 17 60 57 8c fc 0d a2 f5 |...2.z...`W.....|" -peer0.org1.example.com | "2019-05-02 01:31:41.526 UTC [msp.identity] Verify -> DEBU 3b5a Verify: sig = 00000000 30 45 02 21 00 fe e6 eb db 19 12 e9 91 3b ea 32 |0E.!.........;.2| -peer0.org1.example.com | 00000010 3c a1 e6 6b 78 56 ee 31 ce c6 3c c0 c2 93 05 92 |<..kxV.1..<.....| -peer0.org1.example.com | 00000020 00 78 de 01 c0 02 20 6a 67 78 8b df dd 09 9c 80 |.x.... jgx......| -peer0.org1.example.com | 00000030 e6 23 9d 95 6d 76 71 b6 45 5b a2 33 f5 c0 10 87 |.#..mvq.E[.3....| -peer0.org1.example.com | 00000040 60 f8 ab f8 4e 56 ef |`...NV.|" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [cauthdsl] func2 -> DEBU 3b5b 0xc0035cdaf0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [cauthdsl] func1 -> DEBU 3b5c 0xc0035cdaf0 gate 1556760701526783300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [policies] Evaluate -> DEBU 3b5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [policies] Evaluate -> DEBU 3b5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [policies] Evaluate -> DEBU 3b5f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [policies] Evaluate -> DEBU 3b60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b61 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b62 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b63 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 " -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b64 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 " -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b65 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b66 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b67 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b68 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [gossip.discovery] sendMemResponse -> DEBU 3b69 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:41.527 UTC [msp] DeserializeIdentity -> DEBU 3b6a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.533 UTC [msp] DeserializeIdentity -> DEBU 3b6b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.533 UTC [msp] DeserializeIdentity -> DEBU 3b6c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.533 UTC [gossip.comm] Send -> DEBU 3b6d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:41.533 UTC [gossip.discovery] sendMemResponse -> DEBU 3b6e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:41.533 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.533 UTC [gossip.comm] sendToEndpoint -> DEBU 3b70 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.540 UTC [gossip.comm] func1 -> DEBU 3b71 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.541 UTC [gossip.gossip] handleMessage -> DEBU 3b72 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.542 UTC [msp] DeserializeIdentity -> DEBU 3b73 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.542 UTC [msp] DeserializeIdentity -> DEBU 3b74 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.543 UTC [msp] DeserializeIdentity -> DEBU 3b75 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.559 UTC [gossip.gossip] handleMessage -> DEBU 3b76 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [gossip.comm] func1 -> DEBU 3b77 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [gossip.gossip] handleMessage -> DEBU 3b78 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [gossip.pull] HandleMessage -> DEBU 3b79 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [gossip.pull] SendDigest -> DEBU 3b80 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:41.713 UTC [gossip.gossip] handleMessage -> DEBU 3b81 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.817 UTC [gossip.pull] Hello -> DEBU 3b82 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.comm] Send -> DEBU 3b83 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.pull] Hello -> DEBU 3b84 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.comm] Send -> DEBU 3b85 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.pull] Hello -> DEBU 3b86 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.comm] Send -> DEBU 3b87 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b88 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b89 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.821 UTC [gossip.comm] func1 -> DEBU 3b8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12624842504188450777 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.821 UTC [gossip.gossip] handleMessage -> DEBU 3b8f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12624842504188450777 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.821 UTC [gossip.pull] HandleMessage -> DEBU 3b90 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12624842504188450777 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.821 UTC [gossip.gossip] handleMessage -> DEBU 3b91 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.821 UTC [gossip.comm] func1 -> DEBU 3b92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4313158200747421519 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.821 UTC [gossip.gossip] handleMessage -> DEBU 3b93 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4313158200747421519 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.821 UTC [gossip.pull] HandleMessage -> DEBU 3b94 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4313158200747421519 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.822 UTC [gossip.gossip] handleMessage -> DEBU 3b95 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.824 UTC [gossip.comm] func1 -> DEBU 3b96 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11644631687202618761 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.825 UTC [gossip.gossip] handleMessage -> DEBU 3b97 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11644631687202618761 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.825 UTC [gossip.pull] HandleMessage -> DEBU 3b98 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11644631687202618761 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.825 UTC [gossip.gossip] handleMessage -> DEBU 3b99 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.874 UTC [gossip.comm] func1 -> DEBU 3b9a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.874 UTC [gossip.gossip] handleMessage -> DEBU 3b9b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.874 UTC [gossip.gossip] handleMessage -> DEBU 3b9c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.874 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b9d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b9e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:41.874 UTC [msp] DeserializeIdentity -> DEBU 3b9f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.874 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ba0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:41.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:41.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3ba3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3ba4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3ba5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [cauthdsl] func1 -> DEBU 3ba6 0xc0025049a0 gate 1556760701875117700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3ba7 0xc0025049a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3ba8 0xc0025049a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3ba9 0xc0025049a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3baa 0xc0025049a0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [cauthdsl] func1 -> DEBU 3bab 0xc0025049a0 gate 1556760701875117700 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3bac Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3bad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3bae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [cauthdsl] func1 -> DEBU 3baf 0xc0025051e0 gate 1556760701875463600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3bb0 0xc0025051e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3bb1 0xc0025051e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3bb2 0xc0025051e0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [msp.identity] Verify -> DEBU 3bb3 Verify: digest = 00000000 f2 99 3b 66 c5 e4 eb 9e 50 6c 98 2a 21 cb fb 0a |..;f....Pl.*!...| -peer0.org1.example.com | 00000010 e7 dc ea 95 49 40 92 9b 99 cc 9d f8 3b d6 50 88 |....I@......;.P.|" -peer0.org1.example.com | "2019-05-02 01:31:41.875 UTC [msp.identity] Verify -> DEBU 3bb4 Verify: sig = 00000000 30 44 02 20 46 11 56 a9 d9 51 9c f9 a7 ae 86 39 |0D. F.V..Q.....9| -peer0.org1.example.com | 00000010 48 9f d9 bd b1 cf 7a 2d 3e 15 7d 2b dd e9 ae e7 |H.....z->.}+....| -peer0.org1.example.com | 00000020 5f d8 b5 46 02 20 5e cf ba 7b 86 8d 6f be b1 af |_..F. ^..{..o...| -peer0.org1.example.com | 00000030 06 d0 b4 a0 c6 2d ac 8e 9b be 21 3f a0 cf bd 50 |.....-....!?...P| -peer0.org1.example.com | 00000040 f0 1f d7 e5 1b d0 |......|" -peer0.org1.example.com | "2019-05-02 01:31:41.876 UTC [cauthdsl] func2 -> DEBU 3bb5 0xc0025051e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:41.876 UTC [cauthdsl] func1 -> DEBU 3bb6 0xc0025051e0 gate 1556760701875463600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:41.876 UTC [policies] Evaluate -> DEBU 3bb7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.876 UTC [policies] Evaluate -> DEBU 3bb8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.876 UTC [policies] Evaluate -> DEBU 3bb9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.876 UTC [policies] Evaluate -> DEBU 3bba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:41.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bbb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bbc Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:41.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bbd updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 " -peer0.org1.example.com | "2019-05-02 01:31:41.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bbe Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 " -peer0.org1.example.com | "2019-05-02 01:31:41.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bbf Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:41.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bc1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.877 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bc2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.877 UTC [gossip.discovery] sendMemResponse -> DEBU 3bc3 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:41.877 UTC [msp] DeserializeIdentity -> DEBU 3bc4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.877 UTC [msp] DeserializeIdentity -> DEBU 3bc5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.877 UTC [msp] DeserializeIdentity -> DEBU 3bc6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.877 UTC [gossip.comm] Send -> DEBU 3bc7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:41.877 UTC [gossip.discovery] sendMemResponse -> DEBU 3bc8 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:41.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3bc9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3bca Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.954 UTC [gossip.election] waitForInterrupt -> DEBU 3bcb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:41.954 UTC [gossip.election] IsLeader -> DEBU 3bcc c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:41.954 UTC [msp.identity] Sign -> DEBU 3bcd Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100D1801 " -peer0.org1.example.com | "2019-05-02 01:31:41.954 UTC [msp.identity] Sign -> DEBU 3bce Sign: digest: 02D8C61AB14BE7B1E66969D7558E6636FE56D4DDF098E0BB6B2641EFBCEF7B3D " -peer0.org1.example.com | "2019-05-02 01:31:41.955 UTC [gossip.election] waitForInterrupt -> DEBU 3bcf c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:41.963 UTC [msp] DeserializeIdentity -> DEBU 3bd0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.965 UTC [msp] DeserializeIdentity -> DEBU 3bd1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.965 UTC [msp] DeserializeIdentity -> DEBU 3bd2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.967 UTC [msp] DeserializeIdentity -> DEBU 3bd3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.968 UTC [gossip.comm] Send -> DEBU 3bd4 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:41.968 UTC [msp] DeserializeIdentity -> DEBU 3bd5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.968 UTC [msp] DeserializeIdentity -> DEBU 3bd6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:41.969 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:41.969 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.156 UTC [msp.identity] Sign -> DEBU 3bd9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102D " -peer0.org1.example.com | "2019-05-02 01:31:42.156 UTC [msp.identity] Sign -> DEBU 3bda Sign: digest: EBC276C775C07EE088A85B4A5F569D1C7DB849C1C5A5C0FBDD66126CCFE4063A " -peer0.org1.example.com | "2019-05-02 01:31:42.157 UTC [msp.identity] Sign -> DEBU 3bdb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:42.157 UTC [msp.identity] Sign -> DEBU 3bdc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [gossip.comm] Send -> DEBU 3bdd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [msp] DeserializeIdentity -> DEBU 3bde Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [gossip.comm] Send -> DEBU 3bdf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [msp] DeserializeIdentity -> DEBU 3be0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [gossip.comm] Send -> DEBU 3be1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.161 UTC [gossip.comm] func1 -> DEBU 3be8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.162 UTC [gossip.gossip] handleMessage -> DEBU 3be9 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.162 UTC [gossip.gossip] handleMessage -> DEBU 3bea Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3beb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.163 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bec Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:42.163 UTC [msp.identity] Verify -> DEBU 3bed Verify: digest = 00000000 eb c2 76 c7 75 c0 7e e0 88 a8 5b 4a 5f 56 9d 1c |..v.u.~...[J_V..| -peer0.org1.example.com | 00000010 7d b8 49 c1 c5 a5 c0 fb dd 66 12 6c cf e4 06 3a |}.I......f.l...:|" -peer0.org1.example.com | "2019-05-02 01:31:42.163 UTC [msp.identity] Verify -> DEBU 3bee Verify: sig = 00000000 30 44 02 20 60 84 7a d1 11 f6 f7 78 53 fc 61 27 |0D. `.z....xS.a'| -peer0.org1.example.com | 00000010 20 59 3d 53 1b 5e 01 61 d7 3a 78 11 be ff 69 88 | Y=S.^.a.:x...i.| -peer0.org1.example.com | 00000020 4d 28 2c 8c 02 20 2b df 27 5c 6f dc cb d0 93 c5 |M(,.. +.'\o.....| -peer0.org1.example.com | 00000030 f6 b6 9f e8 10 8c 8c 61 33 44 0d af 25 64 b0 6a |.......a3D..%d.j| -peer0.org1.example.com | 00000040 d5 1d 15 ee 76 5c |....v\|" -peer0.org1.example.com | "2019-05-02 01:31:42.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bef Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.164 UTC [gossip.discovery] isSentByMe -> DEBU 3bf0 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bf1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.164 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bf2 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [msp.identity] Verify -> DEBU 3bf3 Verify: digest = 00000000 82 2d ab 24 09 38 af 3d fa 5a 82 a1 df 32 fd 4b |.-.$.8.=.Z...2.K| -peer0.org1.example.com | 00000010 91 b6 3b 9f 18 0b 94 25 72 13 dc b5 51 2d 9e 7a |..;....%r...Q-.z|" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [msp.identity] Verify -> DEBU 3bf4 Verify: sig = 00000000 30 45 02 21 00 9e c7 89 a6 55 56 d3 e3 16 4c 3a |0E.!.....UV...L:| -peer0.org1.example.com | 00000010 cb 50 51 fa c5 37 50 2d fd 95 8b b5 d0 01 47 5f |.PQ..7P-......G_| -peer0.org1.example.com | 00000020 12 28 1a 72 00 02 20 1d 45 da 54 47 84 7a 10 bb |.(.r.. .E.TG.z..| -peer0.org1.example.com | 00000030 3b 1d a6 0f d3 e8 6f 5f 6d 76 9a 8b 64 0f b3 a9 |;.....o_mv..d...| -peer0.org1.example.com | 00000040 c7 08 c2 f6 9e 2f bd |...../.|" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bf5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bf6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bf7 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [msp] DeserializeIdentity -> DEBU 3bf8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3bf9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bfa Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bfb Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [policies] Evaluate -> DEBU 3bfc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [policies] Evaluate -> DEBU 3bfd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [policies] Evaluate -> DEBU 3bfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [cauthdsl] func1 -> DEBU 3bff 0xc0020e1ae0 gate 1556760702165841000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [cauthdsl] func2 -> DEBU 3c00 0xc0020e1ae0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [cauthdsl] func2 -> DEBU 3c01 0xc0020e1ae0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:42.165 UTC [cauthdsl] func2 -> DEBU 3c02 0xc0020e1ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [cauthdsl] func2 -> DEBU 3c03 0xc0020e1ae0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [cauthdsl] func1 -> DEBU 3c04 0xc0020e1ae0 gate 1556760702165841000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [cauthdsl] func1 -> DEBU 3c08 0xc0025ce320 gate 1556760702166196400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [cauthdsl] func2 -> DEBU 3c09 0xc0025ce320 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [cauthdsl] func2 -> DEBU 3c0a 0xc0025ce320 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [cauthdsl] func2 -> DEBU 3c0b 0xc0025ce320 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [msp.identity] Verify -> DEBU 3c0c Verify: digest = 00000000 f2 99 3b 66 c5 e4 eb 9e 50 6c 98 2a 21 cb fb 0a |..;f....Pl.*!...| -peer0.org1.example.com | 00000010 e7 dc ea 95 49 40 92 9b 99 cc 9d f8 3b d6 50 88 |....I@......;.P.|" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [msp.identity] Verify -> DEBU 3c0d Verify: sig = 00000000 30 44 02 20 46 11 56 a9 d9 51 9c f9 a7 ae 86 39 |0D. F.V..Q.....9| -peer0.org1.example.com | 00000010 48 9f d9 bd b1 cf 7a 2d 3e 15 7d 2b dd e9 ae e7 |H.....z->.}+....| -peer0.org1.example.com | 00000020 5f d8 b5 46 02 20 5e cf ba 7b 86 8d 6f be b1 af |_..F. ^..{..o...| -peer0.org1.example.com | 00000030 06 d0 b4 a0 c6 2d ac 8e 9b be 21 3f a0 cf bd 50 |.....-....!?...P| -peer0.org1.example.com | 00000040 f0 1f d7 e5 1b d0 |......|" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [cauthdsl] func2 -> DEBU 3c0e 0xc0025ce320 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [cauthdsl] func1 -> DEBU 3c0f 0xc0025ce320 gate 1556760702166196400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c12 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c14 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c15 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c16 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.169 UTC [gossip.comm] func1 -> DEBU 3c17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.169 UTC [gossip.gossip] handleMessage -> DEBU 3c18 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.169 UTC [gossip.gossip] handleMessage -> DEBU 3c19 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c1a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.169 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c1b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:42.169 UTC [msp] DeserializeIdentity -> DEBU 3c1c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [cauthdsl] func1 -> DEBU 3c23 0xc00251e690 gate 1556760702170310600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c24 0xc00251e690 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c25 0xc00251e690 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c26 0xc00251e690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c27 0xc00251e690 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [cauthdsl] func1 -> DEBU 3c28 0xc00251e690 gate 1556760702170310600 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c29 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [cauthdsl] func1 -> DEBU 3c2c 0xc00251eed0 gate 1556760702170660800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c2d 0xc00251eed0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c2e 0xc00251eed0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c2f 0xc00251eed0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [msp.identity] Verify -> DEBU 3c30 Verify: digest = 00000000 69 95 5e e9 5d f4 dc 43 93 b8 7f 5d e1 69 ff 34 |i.^.]..C...].i.4| -peer0.org1.example.com | 00000010 ec fa a2 32 8b 7a 9d fd 17 60 57 8c fc 0d a2 f5 |...2.z...`W.....|" -peer0.org1.example.com | "2019-05-02 01:31:42.170 UTC [msp.identity] Verify -> DEBU 3c31 Verify: sig = 00000000 30 45 02 21 00 fe e6 eb db 19 12 e9 91 3b ea 32 |0E.!.........;.2| -peer0.org1.example.com | 00000010 3c a1 e6 6b 78 56 ee 31 ce c6 3c c0 c2 93 05 92 |<..kxV.1..<.....| -peer0.org1.example.com | 00000020 00 78 de 01 c0 02 20 6a 67 78 8b df dd 09 9c 80 |.x.... jgx......| -peer0.org1.example.com | 00000030 e6 23 9d 95 6d 76 71 b6 45 5b a2 33 f5 c0 10 87 |.#..mvq.E[.3....| -peer0.org1.example.com | 00000040 60 f8 ab f8 4e 56 ef |`...NV.|" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [cauthdsl] func2 -> DEBU 3c32 0xc00251eed0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [cauthdsl] func1 -> DEBU 3c33 0xc00251eed0 gate 1556760702170660800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [policies] Evaluate -> DEBU 3c34 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [policies] Evaluate -> DEBU 3c35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [policies] Evaluate -> DEBU 3c36 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [policies] Evaluate -> DEBU 3c37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c38 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c39 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c3a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [msp.identity] Verify -> DEBU 3c3b Verify: digest = 00000000 eb c2 76 c7 75 c0 7e e0 88 a8 5b 4a 5f 56 9d 1c |..v.u.~...[J_V..| -peer0.org1.example.com | 00000010 7d b8 49 c1 c5 a5 c0 fb dd 66 12 6c cf e4 06 3a |}.I......f.l...:|" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [msp.identity] Verify -> DEBU 3c3c Verify: sig = 00000000 30 44 02 20 60 84 7a d1 11 f6 f7 78 53 fc 61 27 |0D. `.z....xS.a'| -peer0.org1.example.com | 00000010 20 59 3d 53 1b 5e 01 61 d7 3a 78 11 be ff 69 88 | Y=S.^.a.:x...i.| -peer0.org1.example.com | 00000020 4d 28 2c 8c 02 20 2b df 27 5c 6f dc cb d0 93 c5 |M(,.. +.'\o.....| -peer0.org1.example.com | 00000030 f6 b6 9f e8 10 8c 8c 61 33 44 0d af 25 64 b0 6a |.......a3D..%d.j| -peer0.org1.example.com | 00000040 d5 1d 15 ee 76 5c |....v\|" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c3d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [gossip.discovery] isSentByMe -> DEBU 3c3e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c3f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c40 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:42.174 UTC [msp.identity] Verify -> DEBU 3c41 Verify: digest = 00000000 82 2d ab 24 09 38 af 3d fa 5a 82 a1 df 32 fd 4b |.-.$.8.=.Z...2.K| -peer0.org1.example.com | 00000010 91 b6 3b 9f 18 0b 94 25 72 13 dc b5 51 2d 9e 7a |..;....%r...Q-.z|" -peer0.org1.example.com | "2019-05-02 01:31:42.174 UTC [msp.identity] Verify -> DEBU 3c42 Verify: sig = 00000000 30 45 02 21 00 9e c7 89 a6 55 56 d3 e3 16 4c 3a |0E.!.....UV...L:| -peer0.org1.example.com | 00000010 cb 50 51 fa c5 37 50 2d fd 95 8b b5 d0 01 47 5f |.PQ..7P-......G_| -peer0.org1.example.com | 00000020 12 28 1a 72 00 02 20 1d 45 da 54 47 84 7a 10 bb |.(.r.. .E.TG.z..| -peer0.org1.example.com | 00000030 3b 1d a6 0f d3 e8 6f 5f 6d 76 9a 8b 64 0f b3 a9 |;.....o_mv..d...| -peer0.org1.example.com | 00000040 c7 08 c2 f6 9e 2f bd |...../.|" -peer0.org1.example.com | "2019-05-02 01:31:42.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c43 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c44 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c45 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.174 UTC [gossip.comm] func1 -> DEBU 3c46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [gossip.gossip] handleMessage -> DEBU 3c47 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [gossip.gossip] handleMessage -> DEBU 3c48 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c4a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [msp.identity] Verify -> DEBU 3c4b Verify: digest = 00000000 eb c2 76 c7 75 c0 7e e0 88 a8 5b 4a 5f 56 9d 1c |..v.u.~...[J_V..| -peer0.org1.example.com | 00000010 7d b8 49 c1 c5 a5 c0 fb dd 66 12 6c cf e4 06 3a |}.I......f.l...:|" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [msp.identity] Verify -> DEBU 3c4c Verify: sig = 00000000 30 44 02 20 60 84 7a d1 11 f6 f7 78 53 fc 61 27 |0D. `.z....xS.a'| -peer0.org1.example.com | 00000010 20 59 3d 53 1b 5e 01 61 d7 3a 78 11 be ff 69 88 | Y=S.^.a.:x...i.| -peer0.org1.example.com | 00000020 4d 28 2c 8c 02 20 2b df 27 5c 6f dc cb d0 93 c5 |M(,.. +.'\o.....| -peer0.org1.example.com | 00000030 f6 b6 9f e8 10 8c 8c 61 33 44 0d af 25 64 b0 6a |.......a3D..%d.j| -peer0.org1.example.com | 00000040 d5 1d 15 ee 76 5c |....v\|" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [msp.identity] Verify -> DEBU 3c4d Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [msp.identity] Verify -> DEBU 3c4e Verify: sig = 00000000 30 45 02 21 00 eb 7e 0b c7 09 d4 7d 0b ec b3 1b |0E.!..~....}....| -peer0.org1.example.com | 00000010 c2 d6 7c 23 29 59 3a 1f 4b 87 58 ec de 89 7a f9 |..|#)Y:.K.X...z.| -peer0.org1.example.com | 00000020 75 aa 2b 4e 82 02 20 53 15 ff 90 11 f8 88 70 61 |u.+N.. S......pa| -peer0.org1.example.com | 00000030 63 13 21 a8 2d 5a 1d dd ff de 3b d6 a1 c6 dd 89 |c.!.-Z....;.....| -peer0.org1.example.com | 00000040 09 76 1a dd dc 45 6e |.v...En|" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c4f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [gossip.discovery] isSentByMe -> DEBU 3c50 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c51 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:42.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c52 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.407 UTC [gossip.comm] func1 -> DEBU 3c53 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.407 UTC [gossip.gossip] handleMessage -> DEBU 3c54 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.408 UTC [gossip.gossip] handleMessage -> DEBU 3c55 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.408 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.408 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c57 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:43.408 UTC [msp.identity] Verify -> DEBU 3c58 Verify: digest = 00000000 85 74 47 e3 15 67 d7 19 29 65 ac 1a c9 f1 99 76 |.tG..g..)e.....v| -peer0.org1.example.com | 00000010 4c bc 9e 72 5e 5b da 4c 96 47 11 80 8e 23 43 b0 |L..r^[.L.G...#C.|" -peer0.org1.example.com | "2019-05-02 01:31:43.408 UTC [msp.identity] Verify -> DEBU 3c59 Verify: sig = 00000000 30 44 02 20 66 ee 9c 43 19 bd 2c c9 0f 7f fb 3c |0D. f..C..,....<| -peer0.org1.example.com | 00000010 7f 7c b0 0b a6 8a 0d 89 1b b5 3c 3c 6f 50 11 33 |.|........< DEBU 3c5a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:43.408 UTC [msp.identity] Verify -> DEBU 3c5b Verify: sig = 00000000 30 45 02 21 00 d9 74 8b fd a3 1f 4b c7 83 39 3a |0E.!..t....K..9:| -peer0.org1.example.com | 00000010 57 62 e2 5f a4 b5 7a 6b 29 86 0b e2 9d 55 96 cc |Wb._..zk)....U..| -peer0.org1.example.com | 00000020 1a e6 19 50 d1 02 20 1d f1 1a 39 9c f7 96 b1 e4 |...P.. ...9.....| -peer0.org1.example.com | 00000030 e7 43 a2 e4 de 5b bf 89 d4 03 4e 20 4d 49 5e 81 |.C...[....N MI^.| -peer0.org1.example.com | 00000040 f0 37 a8 da bc 81 5f |.7...._|" -peer0.org1.example.com | "2019-05-02 01:31:43.409 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c5c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.409 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c5d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:43.409 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c5e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 " -peer0.org1.example.com | "2019-05-02 01:31:43.409 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c5f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 " -peer0.org1.example.com | "2019-05-02 01:31:43.409 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c60 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:43.409 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c61 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.409 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c62 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.409 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c63 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.412 UTC [msp] DeserializeIdentity -> DEBU 3c64 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.412 UTC [msp] DeserializeIdentity -> DEBU 3c65 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.412 UTC [msp] DeserializeIdentity -> DEBU 3c66 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.412 UTC [gossip.comm] Send -> DEBU 3c67 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:43.412 UTC [msp] DeserializeIdentity -> DEBU 3c68 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.412 UTC [gossip.comm] Send -> DEBU 3c69 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:43.412 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.412 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.412 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.412 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.414 UTC [gossip.comm] func1 -> DEBU 3c6e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.414 UTC [gossip.gossip] handleMessage -> DEBU 3c6f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.414 UTC [gossip.gossip] handleMessage -> DEBU 3c70 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.414 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c71 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.414 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c72 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.419 UTC [gossip.comm] func1 -> DEBU 3c73 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.419 UTC [gossip.gossip] handleMessage -> DEBU 3c74 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.419 UTC [gossip.gossip] handleMessage -> DEBU 3c75 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.419 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c76 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.419 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c77 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.473 UTC [gossip.comm] func1 -> DEBU 3c78 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.473 UTC [gossip.gossip] handleMessage -> DEBU 3c79 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.473 UTC [gossip.gossip] handleMessage -> DEBU 3c7a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.473 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.473 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c7c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:43.473 UTC [msp] DeserializeIdentity -> DEBU 3c7d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.473 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:43.473 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c7f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c80 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [cauthdsl] func1 -> DEBU 3c84 0xc002f7d510 gate 1556760703474155100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c85 0xc002f7d510 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c86 0xc002f7d510 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c87 0xc002f7d510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c88 0xc002f7d510 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [cauthdsl] func1 -> DEBU 3c89 0xc002f7d510 gate 1556760703474155100 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c8a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [cauthdsl] func1 -> DEBU 3c8d 0xc002f7dd90 gate 1556760703474609500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c8e 0xc002f7dd90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c8f 0xc002f7dd90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c90 0xc002f7dd90 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [msp.identity] Verify -> DEBU 3c91 Verify: digest = 00000000 8a 92 dc 2a c0 73 01 e4 ea 32 75 b4 aa e9 db 13 |...*.s...2u.....| -peer0.org1.example.com | 00000010 a7 89 40 7e 3d 28 af ec fb 75 e5 3d 3d bf 6c 52 |..@~=(...u.==.lR|" -peer0.org1.example.com | "2019-05-02 01:31:43.474 UTC [msp.identity] Verify -> DEBU 3c92 Verify: sig = 00000000 30 44 02 20 0f 14 36 63 15 6f 93 24 bd 7c 50 d8 |0D. ..6c.o.$.|P.| -peer0.org1.example.com | 00000010 06 bc 22 1c f3 ef fc 33 7e 71 97 f6 89 5c 77 36 |.."....3~q...\w6| -peer0.org1.example.com | 00000020 9b 12 d1 f5 02 20 0b aa cd ce 4d 58 76 01 55 21 |..... ....MXv.U!| -peer0.org1.example.com | 00000030 84 7c 97 97 52 b4 19 80 92 01 1b 42 b0 98 ad 4a |.|..R......B...J| -peer0.org1.example.com | 00000040 f5 16 46 76 31 4a |..Fv1J|" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [cauthdsl] func2 -> DEBU 3c93 0xc002f7dd90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [cauthdsl] func1 -> DEBU 3c94 0xc002f7dd90 gate 1556760703474609500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [policies] Evaluate -> DEBU 3c95 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [policies] Evaluate -> DEBU 3c96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [policies] Evaluate -> DEBU 3c97 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [policies] Evaluate -> DEBU 3c98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c99 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 " -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 " -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c9f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.475 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.478 UTC [gossip.comm] Send -> DEBU 3ca8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.479 UTC [gossip.comm] Send -> DEBU 3caa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:43.479 UTC [gossip.comm] sendToEndpoint -> DEBU 3cab Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.479 UTC [gossip.comm] sendToEndpoint -> DEBU 3cac Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.479 UTC [gossip.comm] sendToEndpoint -> DEBU 3cad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.479 UTC [gossip.comm] sendToEndpoint -> DEBU 3cae Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.480 UTC [gossip.comm] func1 -> DEBU 3caf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.480 UTC [gossip.gossip] handleMessage -> DEBU 3cb0 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.480 UTC [gossip.gossip] handleMessage -> DEBU 3cb1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.485 UTC [gossip.comm] func1 -> DEBU 3cb4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.485 UTC [gossip.gossip] handleMessage -> DEBU 3cb5 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.485 UTC [gossip.gossip] handleMessage -> DEBU 3cb6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.485 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.485 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.699 UTC [msp.identity] Sign -> DEBU 3cb9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102E " -peer0.org1.example.com | "2019-05-02 01:31:43.699 UTC [msp.identity] Sign -> DEBU 3cba Sign: digest: EBAADADE9CF578AC89CBD4309DC0C142C9EDB25940F77CE7C9BB737ECB846EFD " -peer0.org1.example.com | "2019-05-02 01:31:43.700 UTC [msp.identity] Sign -> DEBU 3cbb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:43.700 UTC [msp.identity] Sign -> DEBU 3cbc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:43.700 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3cbd Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:43.708 UTC [msp] DeserializeIdentity -> DEBU 3cbe Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.708 UTC [msp] DeserializeIdentity -> DEBU 3cbf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [gossip.comm] Send -> DEBU 3cc0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [msp] DeserializeIdentity -> DEBU 3cc1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [gossip.comm] Send -> DEBU 3cc2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [msp] DeserializeIdentity -> DEBU 3cc3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [gossip.comm] Send -> DEBU 3cc4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cc5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cc6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cc7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cc8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cc9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cca Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.820 UTC [gossip.comm] func1 -> DEBU 3ccb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [gossip.gossip] handleMessage -> DEBU 3ccc Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [gossip.gossip] handleMessage -> DEBU 3ccd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cce Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ccf Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [msp] DeserializeIdentity -> DEBU 3cd0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cd1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd2 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd3 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cd4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cd5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cd6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [cauthdsl] func1 -> DEBU 3cd7 0xc002e31db0 gate 1556760703821609600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [cauthdsl] func2 -> DEBU 3cd8 0xc002e31db0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [cauthdsl] func2 -> DEBU 3cd9 0xc002e31db0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [cauthdsl] func2 -> DEBU 3cda 0xc002e31db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [cauthdsl] func2 -> DEBU 3cdb 0xc002e31db0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [cauthdsl] func1 -> DEBU 3cdc 0xc002e31db0 gate 1556760703821609600 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cdd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cde == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cdf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:43.821 UTC [cauthdsl] func1 -> DEBU 3ce0 0xc00038e740 gate 1556760703821967500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:43.822 UTC [cauthdsl] func2 -> DEBU 3ce1 0xc00038e740 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:43.822 UTC [cauthdsl] func2 -> DEBU 3ce2 0xc00038e740 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:43.822 UTC [cauthdsl] func2 -> DEBU 3ce3 0xc00038e740 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:43.822 UTC [msp.identity] Verify -> DEBU 3ce4 Verify: digest = 00000000 41 fd 78 2f b1 67 08 b2 df c9 08 ea 96 34 d8 d9 |A.x/.g.......4..| -peer0.org1.example.com | 00000010 cc a2 32 eb c7 81 d2 76 71 7b 41 50 7f 2d 5f 49 |..2....vq{AP.-_I|" -peer0.org1.example.com | "2019-05-02 01:31:43.822 UTC [msp.identity] Verify -> DEBU 3ce5 Verify: sig = 00000000 30 45 02 21 00 fc 3e 42 94 cb 3a b3 2b ec 3f 2b |0E.!..>B..:.+.?+| -peer0.org1.example.com | 00000010 55 b8 c8 a3 5c 28 60 7f 11 32 19 df 46 00 c6 d9 |U...\(`..2..F...| -peer0.org1.example.com | 00000020 d2 05 94 58 e9 02 20 11 57 c4 12 77 5f 26 0d 4a |...X.. .W..w_&.J| -peer0.org1.example.com | 00000030 0e dd 43 26 23 8e 18 0d 6a 5c ba 88 50 5c 24 0c |..C&#...j\..P\$.| -peer0.org1.example.com | 00000040 9d df 59 5e 10 26 96 |..Y^.&.|" -peer0.org1.example.com | "2019-05-02 01:31:43.822 UTC [cauthdsl] func2 -> DEBU 3ce6 0xc00038e740 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:43.824 UTC [cauthdsl] func1 -> DEBU 3ce7 0xc00038e740 gate 1556760703821967500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:43.824 UTC [policies] Evaluate -> DEBU 3ce8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.824 UTC [policies] Evaluate -> DEBU 3ce9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.824 UTC [policies] Evaluate -> DEBU 3cea Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.824 UTC [policies] Evaluate -> DEBU 3ceb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:43.824 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cec Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ced Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:43.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cee updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 " -peer0.org1.example.com | "2019-05-02 01:31:43.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cef Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 " -peer0.org1.example.com | "2019-05-02 01:31:43.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cf0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:43.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cf1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.826 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cf2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.826 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cf3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.829 UTC [msp] DeserializeIdentity -> DEBU 3cf4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cf5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cf6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cf7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cf8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cf9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.830 UTC [gossip.comm] Send -> DEBU 3cfa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cfb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cfc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:43.830 UTC [gossip.comm] Send -> DEBU 3cfd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 3cfe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 3cff Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 3d00 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 3d01 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.833 UTC [gossip.comm] func1 -> DEBU 3d02 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.833 UTC [gossip.gossip] handleMessage -> DEBU 3d03 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.833 UTC [gossip.gossip] handleMessage -> DEBU 3d04 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.833 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d05 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.833 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d06 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.835 UTC [gossip.comm] func1 -> DEBU 3d07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.836 UTC [gossip.gossip] handleMessage -> DEBU 3d08 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.836 UTC [gossip.gossip] handleMessage -> DEBU 3d09 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:43.836 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:43.837 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d0b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:44.787 UTC [msp] DeserializeIdentity -> DEBU 3d0c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.787 UTC [msp] DeserializeIdentity -> DEBU 3d0d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.787 UTC [gossip.comm] Send -> DEBU 3d0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:44.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3d0f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3d10 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:44.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3d11 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3d12 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:44.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3d13 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3d14 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:44.790 UTC [gossip.comm] func1 -> DEBU 3d15 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.790 UTC [gossip.gossip] handleMessage -> DEBU 3d16 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.791 UTC [msp.identity] Verify -> DEBU 3d17 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:44.791 UTC [msp.identity] Verify -> DEBU 3d18 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:44.792 UTC [gossip.comm] func1 -> DEBU 3d19 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.794 UTC [msp.identity] Verify -> DEBU 3d1a Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:44.795 UTC [msp.identity] Verify -> DEBU 3d1b Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:44.797 UTC [msp] DeserializeIdentity -> DEBU 3d1c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.799 UTC [msp] DeserializeIdentity -> DEBU 3d1e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.798 UTC [gossip.comm] func1 -> DEBU 3d1d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.801 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d1f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:44.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d20 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d21 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.803 UTC [policies] Evaluate -> DEBU 3d22 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.803 UTC [policies] Evaluate -> DEBU 3d23 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:44.804 UTC [policies] Evaluate -> DEBU 3d24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.804 UTC [cauthdsl] func1 -> DEBU 3d25 0xc0003b1bd0 gate 1556760704804816400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.805 UTC [cauthdsl] func2 -> DEBU 3d26 0xc0003b1bd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.805 UTC [cauthdsl] func2 -> DEBU 3d27 0xc0003b1bd0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.805 UTC [cauthdsl] func2 -> DEBU 3d28 0xc0003b1bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:44.806 UTC [cauthdsl] func2 -> DEBU 3d29 0xc0003b1bd0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.806 UTC [cauthdsl] func1 -> DEBU 3d2a 0xc0003b1bd0 gate 1556760704804816400 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.807 UTC [policies] Evaluate -> DEBU 3d2b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.807 UTC [policies] Evaluate -> DEBU 3d2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.807 UTC [policies] Evaluate -> DEBU 3d2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.808 UTC [cauthdsl] func1 -> DEBU 3d2e 0xc00035a420 gate 1556760704808154000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.808 UTC [cauthdsl] func2 -> DEBU 3d2f 0xc00035a420 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.808 UTC [cauthdsl] func2 -> DEBU 3d30 0xc00035a420 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.809 UTC [cauthdsl] func2 -> DEBU 3d31 0xc00035a420 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.809 UTC [msp.identity] Verify -> DEBU 3d32 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:44.809 UTC [msp.identity] Verify -> DEBU 3d33 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:44.810 UTC [cauthdsl] func2 -> DEBU 3d34 0xc00035a420 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.810 UTC [cauthdsl] func1 -> DEBU 3d35 0xc00035a420 gate 1556760704808154000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:44.810 UTC [policies] Evaluate -> DEBU 3d36 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.811 UTC [policies] Evaluate -> DEBU 3d37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.811 UTC [policies] Evaluate -> DEBU 3d38 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.812 UTC [policies] Evaluate -> DEBU 3d39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.812 UTC [msp] DeserializeIdentity -> DEBU 3d3a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.812 UTC [msp] DeserializeIdentity -> DEBU 3d3b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.813 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d3c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:44.813 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d3d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.813 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d3e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [cauthdsl] func1 -> DEBU 3d42 0xc00035bc70 gate 1556760704814414200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d43 0xc00035bc70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d44 0xc00035bc70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d45 0xc00035bc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d46 0xc00035bc70 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [cauthdsl] func1 -> DEBU 3d47 0xc00035bc70 gate 1556760704814414200 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d48 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [cauthdsl] func1 -> DEBU 3d4b 0xc00043c760 gate 1556760704814747500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d4c 0xc00043c760 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d4d 0xc00043c760 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d4e 0xc00043c760 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [msp.identity] Verify -> DEBU 3d4f Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:44.814 UTC [msp.identity] Verify -> DEBU 3d50 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [cauthdsl] func2 -> DEBU 3d51 0xc00043c760 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [cauthdsl] func1 -> DEBU 3d52 0xc00043c760 gate 1556760704814747500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d53 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d54 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d55 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d56 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [gossip.gossip] handleMessage -> DEBU 3d57 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [gossip.gossip] handleMessage -> DEBU 3d58 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [msp] DeserializeIdentity -> DEBU 3d59 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [msp] DeserializeIdentity -> DEBU 3d5a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [msp] DeserializeIdentity -> DEBU 3d5b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d5c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d5d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d5e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [cauthdsl] func1 -> DEBU 3d62 0xc0002e6e90 gate 1556760704815915300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.815 UTC [cauthdsl] func2 -> DEBU 3d63 0xc0002e6e90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d64 0xc0002e6e90 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d65 0xc0002e6e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d66 0xc0002e6e90 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [cauthdsl] func1 -> DEBU 3d67 0xc0002e6e90 gate 1556760704815915300 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d68 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [cauthdsl] func1 -> DEBU 3d6b 0xc0002e78d0 gate 1556760704816251500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d6c 0xc0002e78d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d6d 0xc0002e78d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d6e 0xc0002e78d0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [msp.identity] Verify -> DEBU 3d6f Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [msp.identity] Verify -> DEBU 3d70 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d71 0xc0002e78d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [cauthdsl] func1 -> DEBU 3d72 0xc0002e78d0 gate 1556760704816251500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d73 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d75 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [msp.identity] Verify -> DEBU 3d77 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:44.816 UTC [msp.identity] Verify -> DEBU 3d78 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:44.817 UTC [msp.identity] Verify -> DEBU 3d79 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:44.817 UTC [msp.identity] Verify -> DEBU 3d7a Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:44.817 UTC [msp] DeserializeIdentity -> DEBU 3d7b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.817 UTC [msp] DeserializeIdentity -> DEBU 3d7c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.817 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d7d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:44.817 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d7e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.817 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d7f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.817 UTC [policies] Evaluate -> DEBU 3d80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.817 UTC [policies] Evaluate -> DEBU 3d81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:44.817 UTC [policies] Evaluate -> DEBU 3d82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.818 UTC [cauthdsl] func1 -> DEBU 3d83 0xc0002a0510 gate 1556760704817859000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.819 UTC [cauthdsl] func2 -> DEBU 3d84 0xc0002a0510 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.819 UTC [cauthdsl] func2 -> DEBU 3d85 0xc0002a0510 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.819 UTC [cauthdsl] func2 -> DEBU 3d86 0xc0002a0510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:44.820 UTC [cauthdsl] func2 -> DEBU 3d87 0xc0002a0510 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.820 UTC [cauthdsl] func1 -> DEBU 3d88 0xc0002a0510 gate 1556760704817859000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.821 UTC [policies] Evaluate -> DEBU 3d89 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.821 UTC [policies] Evaluate -> DEBU 3d8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.821 UTC [policies] Evaluate -> DEBU 3d8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.822 UTC [cauthdsl] func1 -> DEBU 3d8c 0xc0002a0db0 gate 1556760704822064200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.822 UTC [cauthdsl] func2 -> DEBU 3d8d 0xc0002a0db0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.822 UTC [cauthdsl] func2 -> DEBU 3d8e 0xc0002a0db0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.823 UTC [cauthdsl] func2 -> DEBU 3d8f 0xc0002a0db0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.823 UTC [msp.identity] Verify -> DEBU 3d90 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:44.823 UTC [msp.identity] Verify -> DEBU 3d91 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:44.824 UTC [cauthdsl] func2 -> DEBU 3d92 0xc0002a0db0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.824 UTC [cauthdsl] func1 -> DEBU 3d93 0xc0002a0db0 gate 1556760704822064200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:44.825 UTC [policies] Evaluate -> DEBU 3d94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.825 UTC [policies] Evaluate -> DEBU 3d95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.826 UTC [policies] Evaluate -> DEBU 3d96 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.826 UTC [policies] Evaluate -> DEBU 3d97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.826 UTC [gossip.gossip] handleMessage -> DEBU 3d98 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:44.827 UTC [gossip.gossip] handleMessage -> DEBU 3d99 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.827 UTC [msp] DeserializeIdentity -> DEBU 3d9a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.827 UTC [msp] DeserializeIdentity -> DEBU 3d9b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.828 UTC [msp] DeserializeIdentity -> DEBU 3d9c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.828 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d9d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:44.829 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d9e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.829 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d9f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.829 UTC [policies] Evaluate -> DEBU 3da0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.830 UTC [policies] Evaluate -> DEBU 3da1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:44.830 UTC [policies] Evaluate -> DEBU 3da2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.831 UTC [cauthdsl] func1 -> DEBU 3da3 0xc000390a10 gate 1556760704830992300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.831 UTC [cauthdsl] func2 -> DEBU 3da4 0xc000390a10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.831 UTC [cauthdsl] func2 -> DEBU 3da5 0xc000390a10 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.832 UTC [cauthdsl] func2 -> DEBU 3da6 0xc000390a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:44.832 UTC [cauthdsl] func2 -> DEBU 3da7 0xc000390a10 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.832 UTC [cauthdsl] func1 -> DEBU 3da8 0xc000390a10 gate 1556760704830992300 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.832 UTC [policies] Evaluate -> DEBU 3da9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.833 UTC [policies] Evaluate -> DEBU 3daa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.833 UTC [policies] Evaluate -> DEBU 3dab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.834 UTC [cauthdsl] func1 -> DEBU 3dac 0xc000391250 gate 1556760704833924000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.834 UTC [cauthdsl] func2 -> DEBU 3dad 0xc000391250 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.834 UTC [cauthdsl] func2 -> DEBU 3dae 0xc000391250 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.834 UTC [cauthdsl] func2 -> DEBU 3daf 0xc000391250 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.835 UTC [msp.identity] Verify -> DEBU 3db0 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:44.835 UTC [msp.identity] Verify -> DEBU 3db1 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:44.836 UTC [cauthdsl] func2 -> DEBU 3db2 0xc000391250 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.836 UTC [cauthdsl] func1 -> DEBU 3db3 0xc000391250 gate 1556760704833924000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:44.836 UTC [policies] Evaluate -> DEBU 3db4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.836 UTC [policies] Evaluate -> DEBU 3db5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.837 UTC [policies] Evaluate -> DEBU 3db6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.837 UTC [policies] Evaluate -> DEBU 3db7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.837 UTC [msp.identity] Verify -> DEBU 3db8 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:44.837 UTC [msp.identity] Verify -> DEBU 3db9 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:44.837 UTC [msp] DeserializeIdentity -> DEBU 3dba Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.838 UTC [msp] DeserializeIdentity -> DEBU 3dbb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.838 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:44.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dbd Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.839 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dbe Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:44.839 UTC [policies] Evaluate -> DEBU 3dbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.840 UTC [policies] Evaluate -> DEBU 3dc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:44.840 UTC [policies] Evaluate -> DEBU 3dc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.840 UTC [cauthdsl] func1 -> DEBU 3dc2 0xc000473220 gate 1556760704840793000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.841 UTC [cauthdsl] func2 -> DEBU 3dc3 0xc000473220 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.841 UTC [cauthdsl] func2 -> DEBU 3dc4 0xc000473220 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.841 UTC [cauthdsl] func2 -> DEBU 3dc5 0xc000473220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [cauthdsl] func2 -> DEBU 3dc6 0xc000473220 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [cauthdsl] func1 -> DEBU 3dc7 0xc000473220 gate 1556760704840793000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [policies] Evaluate -> DEBU 3dc8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [policies] Evaluate -> DEBU 3dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [policies] Evaluate -> DEBU 3dca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [cauthdsl] func1 -> DEBU 3dcb 0xc000473a60 gate 1556760704842638200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [cauthdsl] func2 -> DEBU 3dcc 0xc000473a60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [cauthdsl] func2 -> DEBU 3dcd 0xc000473a60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [cauthdsl] func2 -> DEBU 3dce 0xc000473a60 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [msp.identity] Verify -> DEBU 3dcf Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [msp.identity] Verify -> DEBU 3dd0 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:44.842 UTC [cauthdsl] func2 -> DEBU 3dd1 0xc000473a60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:44.843 UTC [cauthdsl] func1 -> DEBU 3dd2 0xc000473a60 gate 1556760704842638200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:44.843 UTC [policies] Evaluate -> DEBU 3dd3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.843 UTC [policies] Evaluate -> DEBU 3dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.843 UTC [policies] Evaluate -> DEBU 3dd5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.843 UTC [policies] Evaluate -> DEBU 3dd6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:44.843 UTC [msp.identity] Verify -> DEBU 3dd7 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:44.843 UTC [msp.identity] Verify -> DEBU 3dd8 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:44.843 UTC [gossip.gossip] handleMessage -> DEBU 3dd9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:44.919 UTC [msp] DeserializeIdentity -> DEBU 3dda Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.919 UTC [msp] DeserializeIdentity -> DEBU 3ddb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.919 UTC [gossip.pull] Hello -> DEBU 3ddc Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:44.919 UTC [msp] DeserializeIdentity -> DEBU 3ddd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.919 UTC [msp] DeserializeIdentity -> DEBU 3dde Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:44.920 UTC [gossip.comm] Send -> DEBU 3ddf Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:44.920 UTC [gossip.comm] sendToEndpoint -> DEBU 3de0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.921 UTC [gossip.comm] sendToEndpoint -> DEBU 3de1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:44.922 UTC [gossip.comm] func1 -> DEBU 3de2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15432964767498107510 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 61 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.922 UTC [gossip.gossip] handleMessage -> DEBU 3de3 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15432964767498107510 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 61 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.922 UTC [gossip.pull] HandleMessage -> DEBU 3de4 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15432964767498107510 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 61 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:44.922 UTC [gossip.gossip] handleMessage -> DEBU 3de5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.050 UTC [gossip.comm] func1 -> DEBU 3de6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.056 UTC [gossip.gossip] handleMessage -> DEBU 3de7 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.057 UTC [msp] DeserializeIdentity -> DEBU 3de8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.058 UTC [msp] DeserializeIdentity -> DEBU 3de9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.058 UTC [gossip.gossip] handleMessage -> DEBU 3dea Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.091 UTC [gossip.comm] func1 -> DEBU 3deb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.092 UTC [gossip.gossip] handleMessage -> DEBU 3dec Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.093 UTC [gossip.pull] HandleMessage -> DEBU 3ded GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.093 UTC [gossip.pull] SendDigest -> DEBU 3dee Sending BLOCK_MSG digest: [2 3 4 9 1 5 6 7 8] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:45.093 UTC [gossip.gossip] handleMessage -> DEBU 3def Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.275 UTC [gossip.comm] func1 -> DEBU 3df0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.276 UTC [gossip.gossip] handleMessage -> DEBU 3df1 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.276 UTC [msp] DeserializeIdentity -> DEBU 3df2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.276 UTC [msp] DeserializeIdentity -> DEBU 3df3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.276 UTC [msp] DeserializeIdentity -> DEBU 3df4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.276 UTC [gossip.gossip] handleMessage -> DEBU 3df5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.400 UTC [gossip.comm] func1 -> DEBU 3df6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.400 UTC [gossip.gossip] handleMessage -> DEBU 3df7 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.401 UTC [gossip.pull] HandleMessage -> DEBU 3df8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.401 UTC [gossip.pull] SendDigest -> DEBU 3df9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:45.401 UTC [gossip.gossip] handleMessage -> DEBU 3dfa Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.438 UTC [gossip.comm] func1 -> DEBU 3dfb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.438 UTC [gossip.gossip] handleMessage -> DEBU 3dfc Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.438 UTC [gossip.gossip] handleMessage -> DEBU 3dfd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.438 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dfe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.438 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dff Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:45.438 UTC [msp.identity] Verify -> DEBU 3e00 Verify: digest = 00000000 7d 61 2e e2 87 88 f7 00 6a 24 c7 54 1f d0 29 76 |}a......j$.T..)v| -peer0.org1.example.com | 00000010 d6 b5 b9 2a f9 e3 51 30 4e d3 08 12 28 27 c2 7d |...*..Q0N...('.}|" -peer0.org1.example.com | "2019-05-02 01:31:45.439 UTC [msp.identity] Verify -> DEBU 3e01 Verify: sig = 00000000 30 45 02 21 00 a5 45 e3 19 cb 21 a9 bb 6d a2 fe |0E.!..E...!..m..| -peer0.org1.example.com | 00000010 39 40 20 69 2f dc 71 c4 38 fc 13 99 93 14 85 48 |9@ i/.q.8......H| -peer0.org1.example.com | 00000020 04 16 b9 7e 61 02 20 63 14 54 8b 12 a4 d3 1a 08 |...~a. c.T......| -peer0.org1.example.com | 00000030 5a 27 0c d7 bd 42 54 03 11 db 7a f2 80 bf 23 6e |Z'...BT...z...#n| -peer0.org1.example.com | 00000040 4f 0e 6a 25 80 9d df |O.j%...|" -peer0.org1.example.com | "2019-05-02 01:31:45.439 UTC [msp.identity] Verify -> DEBU 3e02 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:45.439 UTC [msp.identity] Verify -> DEBU 3e03 Verify: sig = 00000000 30 44 02 20 0b 54 84 99 8a b4 67 4f 74 85 e8 be |0D. .T....gOt...| -peer0.org1.example.com | 00000010 d0 87 03 5f 7f 20 a5 8e 8b bb 34 75 d7 86 08 49 |..._. ....4u...I| -peer0.org1.example.com | 00000020 aa db 0f 78 02 20 7e dd 99 78 b2 3f 28 a6 cf b4 |...x. ~..x.?(...| -peer0.org1.example.com | 00000030 d6 b3 02 b5 37 c7 e8 ae b9 a4 b7 7e 44 ff c0 ec |....7......~D...| -peer0.org1.example.com | 00000040 62 ef 9d bc 61 a8 |b...a.|" -peer0.org1.example.com | "2019-05-02 01:31:45.439 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e04 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e05 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:45.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e06 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 " -peer0.org1.example.com | "2019-05-02 01:31:45.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e07 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 " -peer0.org1.example.com | "2019-05-02 01:31:45.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e08 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:45.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e09 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.440 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e0a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.440 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e0b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3e0c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:45.440 UTC [msp] DeserializeIdentity -> DEBU 3e0d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.440 UTC [msp] DeserializeIdentity -> DEBU 3e0e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.440 UTC [gossip.comm] Send -> DEBU 3e0f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:45.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3e10 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:45.440 UTC [gossip.comm] sendToEndpoint -> DEBU 3e11 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.440 UTC [gossip.comm] sendToEndpoint -> DEBU 3e12 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.498 UTC [gossip.comm] func1 -> DEBU 3e13 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.498 UTC [gossip.gossip] handleMessage -> DEBU 3e14 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.498 UTC [gossip.pull] HandleMessage -> DEBU 3e15 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.498 UTC [msp] DeserializeIdentity -> DEBU 3e16 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.499 UTC [msp] DeserializeIdentity -> DEBU 3e17 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.499 UTC [msp] DeserializeIdentity -> DEBU 3e18 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.499 UTC [msp] DeserializeIdentity -> DEBU 3e19 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.499 UTC [msp] DeserializeIdentity -> DEBU 3e1a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.499 UTC [msp] DeserializeIdentity -> DEBU 3e1b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.499 UTC [gossip.pull] SendDigest -> DEBU 3e1c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:45.499 UTC [gossip.gossip] handleMessage -> DEBU 3e1d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.524 UTC [gossip.comm] func1 -> DEBU 3e1e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.525 UTC [gossip.gossip] handleMessage -> DEBU 3e1f Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.525 UTC [gossip.gossip] handleMessage -> DEBU 3e20 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.525 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.526 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e22 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:45.527 UTC [msp] DeserializeIdentity -> DEBU 3e23 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:45.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e25 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:45.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e26 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:45.528 UTC [policies] Evaluate -> DEBU 3e27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [policies] Evaluate -> DEBU 3e28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [policies] Evaluate -> DEBU 3e29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [cauthdsl] func1 -> DEBU 3e2a 0xc002146350 gate 1556760705529469000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e2b 0xc002146350 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e2c 0xc002146350 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e2d 0xc002146350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e2e 0xc002146350 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [cauthdsl] func1 -> DEBU 3e2f 0xc002146350 gate 1556760705529469000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [policies] Evaluate -> DEBU 3e30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [policies] Evaluate -> DEBU 3e31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [policies] Evaluate -> DEBU 3e32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [cauthdsl] func1 -> DEBU 3e33 0xc002146fb0 gate 1556760705529789500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e34 0xc002146fb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e35 0xc002146fb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e36 0xc002146fb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [msp.identity] Verify -> DEBU 3e37 Verify: digest = 00000000 a0 d1 41 53 a1 70 71 ce 68 df b7 c7 08 8c 2c 1c |..AS.pq.h.....,.| -peer0.org1.example.com | 00000010 67 61 93 06 e4 d1 f6 f3 c9 ec c9 81 97 0b 97 75 |ga.............u|" -peer0.org1.example.com | "2019-05-02 01:31:45.529 UTC [msp.identity] Verify -> DEBU 3e38 Verify: sig = 00000000 30 45 02 21 00 d8 ee 77 4d 06 d0 c7 b8 45 82 e6 |0E.!...wM....E..| -peer0.org1.example.com | 00000010 81 47 56 5b c7 5e 9b 1d 53 8e 07 4e 12 68 0f 1c |.GV[.^..S..N.h..| -peer0.org1.example.com | 00000020 40 f2 58 4c 0a 02 20 54 71 ee 2a 4e 23 7b 53 c0 |@.XL.. Tq.*N#{S.| -peer0.org1.example.com | 00000030 09 fd 27 a8 5d cb 9c 2a 1b c2 c4 7f 17 1f f9 65 |..'.]..*.......e| -peer0.org1.example.com | 00000040 26 f1 d0 4d 3e ed 4e |&..M>.N|" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [cauthdsl] func2 -> DEBU 3e39 0xc002146fb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [cauthdsl] func1 -> DEBU 3e3a 0xc002146fb0 gate 1556760705529789500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [policies] Evaluate -> DEBU 3e3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [policies] Evaluate -> DEBU 3e3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [policies] Evaluate -> DEBU 3e3d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [policies] Evaluate -> DEBU 3e3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e40 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e41 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 " -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e42 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 " -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e43 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e44 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e45 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.531 UTC [gossip.discovery] sendMemResponse -> DEBU 3e46 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:45.531 UTC [msp] DeserializeIdentity -> DEBU 3e47 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.531 UTC [msp] DeserializeIdentity -> DEBU 3e48 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.531 UTC [msp] DeserializeIdentity -> DEBU 3e49 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.531 UTC [gossip.comm] Send -> DEBU 3e4a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:45.531 UTC [gossip.discovery] sendMemResponse -> DEBU 3e4b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:45.531 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.531 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.530 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e4e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.536 UTC [gossip.comm] func1 -> DEBU 3e4f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.536 UTC [gossip.gossip] handleMessage -> DEBU 3e50 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.536 UTC [msp] DeserializeIdentity -> DEBU 3e51 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.536 UTC [msp] DeserializeIdentity -> DEBU 3e52 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.536 UTC [msp] DeserializeIdentity -> DEBU 3e53 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.537 UTC [gossip.gossip] handleMessage -> DEBU 3e54 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.712 UTC [gossip.comm] func1 -> DEBU 3e55 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.713 UTC [gossip.gossip] handleMessage -> DEBU 3e56 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.713 UTC [gossip.pull] HandleMessage -> DEBU 3e57 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e58 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e59 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e5a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e5b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e5c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e5d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.713 UTC [gossip.pull] SendDigest -> DEBU 3e5e Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:45.713 UTC [gossip.gossip] handleMessage -> DEBU 3e5f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.818 UTC [gossip.pull] Hello -> DEBU 3e60 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:45.819 UTC [gossip.comm] Send -> DEBU 3e61 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:45.819 UTC [gossip.pull] Hello -> DEBU 3e62 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:45.820 UTC [gossip.comm] Send -> DEBU 3e63 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:45.820 UTC [gossip.pull] Hello -> DEBU 3e64 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:45.820 UTC [gossip.comm] sendToEndpoint -> DEBU 3e65 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.820 UTC [gossip.comm] sendToEndpoint -> DEBU 3e66 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.820 UTC [gossip.comm] Send -> DEBU 3e67 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:45.820 UTC [gossip.comm] sendToEndpoint -> DEBU 3e68 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.820 UTC [gossip.comm] sendToEndpoint -> DEBU 3e69 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.822 UTC [gossip.comm] func1 -> DEBU 3e6a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3369004806053908598 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.822 UTC [gossip.gossip] handleMessage -> DEBU 3e6b Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3369004806053908598 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.822 UTC [gossip.pull] HandleMessage -> DEBU 3e6c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3369004806053908598 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.822 UTC [gossip.gossip] handleMessage -> DEBU 3e6d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.823 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.823 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.825 UTC [gossip.comm] func1 -> DEBU 3e70 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12841444216908479344 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.825 UTC [gossip.gossip] handleMessage -> DEBU 3e71 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12841444216908479344 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.825 UTC [gossip.pull] HandleMessage -> DEBU 3e72 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12841444216908479344 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.825 UTC [gossip.gossip] handleMessage -> DEBU 3e73 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.825 UTC [gossip.comm] func1 -> DEBU 3e74 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13095961533477278849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.825 UTC [gossip.gossip] handleMessage -> DEBU 3e75 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13095961533477278849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.825 UTC [gossip.pull] HandleMessage -> DEBU 3e76 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13095961533477278849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.825 UTC [gossip.gossip] handleMessage -> DEBU 3e77 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.878 UTC [gossip.comm] func1 -> DEBU 3e78 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.878 UTC [gossip.gossip] handleMessage -> DEBU 3e79 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.878 UTC [gossip.gossip] handleMessage -> DEBU 3e7a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.878 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.878 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e7c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:45.878 UTC [msp] DeserializeIdentity -> DEBU 3e7d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.879 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:45.879 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e80 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [cauthdsl] func1 -> DEBU 3e84 0xc0021d4860 gate 1556760705880397400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [cauthdsl] func2 -> DEBU 3e85 0xc0021d4860 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [cauthdsl] func2 -> DEBU 3e86 0xc0021d4860 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [cauthdsl] func2 -> DEBU 3e87 0xc0021d4860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [cauthdsl] func2 -> DEBU 3e88 0xc0021d4860 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [cauthdsl] func1 -> DEBU 3e89 0xc0021d4860 gate 1556760705880397400 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e8a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [cauthdsl] func1 -> DEBU 3e8d 0xc0021d50a0 gate 1556760705881064200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [cauthdsl] func2 -> DEBU 3e8e 0xc0021d50a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [cauthdsl] func2 -> DEBU 3e8f 0xc0021d50a0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [cauthdsl] func2 -> DEBU 3e90 0xc0021d50a0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [msp.identity] Verify -> DEBU 3e91 Verify: digest = 00000000 cc f0 d6 69 4c 6a 90 19 3b 3b 6f 4d 81 e9 eb b6 |...iLj..;;oM....| -peer0.org1.example.com | 00000010 58 f7 5b a0 8e e8 04 37 72 01 80 ac cb 29 6f 25 |X.[....7r....)o%|" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [msp.identity] Verify -> DEBU 3e92 Verify: sig = 00000000 30 44 02 20 12 2a 55 56 c7 d2 6e 6f 4d 77 fd 59 |0D. .*UV..noMw.Y| -peer0.org1.example.com | 00000010 47 8b 5d 71 35 4f d6 27 f0 9d fa 08 b9 78 11 4f |G.]q5O.'.....x.O| -peer0.org1.example.com | 00000020 12 8e d6 8f 02 20 5a 0b aa 25 ff e7 35 6c 60 18 |..... Z..%..5l`.| -peer0.org1.example.com | 00000030 ef 78 4e 6b e1 65 3b 8b e6 63 b3 c9 eb 9f 69 24 |.xNk.e;..c....i$| -peer0.org1.example.com | 00000040 1a d2 f6 96 b2 2b |.....+|" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [cauthdsl] func2 -> DEBU 3e93 0xc0021d50a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [cauthdsl] func1 -> DEBU 3e94 0xc0021d50a0 gate 1556760705881064200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [policies] Evaluate -> DEBU 3e95 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [policies] Evaluate -> DEBU 3e96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [policies] Evaluate -> DEBU 3e97 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [policies] Evaluate -> DEBU 3e98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e99 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.881 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9b updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 " -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 " -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e9f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ea0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [gossip.discovery] sendMemResponse -> DEBU 3ea1 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [msp] DeserializeIdentity -> DEBU 3ea2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [msp] DeserializeIdentity -> DEBU 3ea3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [msp] DeserializeIdentity -> DEBU 3ea4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [gossip.comm] Send -> DEBU 3ea5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:45.882 UTC [gossip.discovery] sendMemResponse -> DEBU 3ea6 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:45.883 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:45.883 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.159 UTC [msp.identity] Sign -> DEBU 3ea9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102F " -peer0.org1.example.com | "2019-05-02 01:31:46.159 UTC [msp.identity] Sign -> DEBU 3eaa Sign: digest: 1196203EEFC4B02BC8032A14283F35D11209D056F7480B1CEE72E827E76410C7 " -peer0.org1.example.com | "2019-05-02 01:31:46.159 UTC [msp.identity] Sign -> DEBU 3eab Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:46.159 UTC [msp.identity] Sign -> DEBU 3eac Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:46.159 UTC [gossip.comm] Send -> DEBU 3ead Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:46.159 UTC [msp] DeserializeIdentity -> DEBU 3eae Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:46.160 UTC [gossip.comm] Send -> DEBU 3eaf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:46.160 UTC [msp] DeserializeIdentity -> DEBU 3eb0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.160 UTC [gossip.comm] Send -> DEBU 3eb3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.163 UTC [gossip.comm] func1 -> DEBU 3eb8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.163 UTC [gossip.gossip] handleMessage -> DEBU 3eb9 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.163 UTC [gossip.gossip] handleMessage -> DEBU 3eba Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ebb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.163 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ebc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:46.164 UTC [msp.identity] Verify -> DEBU 3ebd Verify: digest = 00000000 11 96 20 3e ef c4 b0 2b c8 03 2a 14 28 3f 35 d1 |.. >...+..*.(?5.| -peer0.org1.example.com | 00000010 12 09 d0 56 f7 48 0b 1c ee 72 e8 27 e7 64 10 c7 |...V.H...r.'.d..|" -peer0.org1.example.com | "2019-05-02 01:31:46.164 UTC [msp.identity] Verify -> DEBU 3ebe Verify: sig = 00000000 30 44 02 20 39 0d d3 19 75 ff 16 2e 04 41 20 d8 |0D. 9...u....A .| -peer0.org1.example.com | 00000010 c7 48 ee 87 fd 72 1b 4f 4c 4b 45 b0 80 67 31 d8 |.H...r.OLKE..g1.| -peer0.org1.example.com | 00000020 3b 71 32 e3 02 20 7c de 3e 2f 13 87 7d cb 34 27 |;q2.. |.>/..}.4'| -peer0.org1.example.com | 00000030 90 38 a1 24 98 80 dd 06 f6 ca 72 23 99 ea 9d c7 |.8.$......r#....| -peer0.org1.example.com | 00000040 4a c9 13 ab 96 bf |J.....|" -peer0.org1.example.com | "2019-05-02 01:31:46.164 UTC [msp.identity] Verify -> DEBU 3ebf Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:46.164 UTC [msp.identity] Verify -> DEBU 3ec0 Verify: sig = 00000000 30 45 02 21 00 81 dc ca 08 88 3a 0a 8d 9c cd cc |0E.!......:.....| -peer0.org1.example.com | 00000010 90 9e b2 86 23 e3 c0 50 72 9a 02 e6 08 be f9 93 |....#..Pr.......| -peer0.org1.example.com | 00000020 46 1b d8 71 4d 02 20 79 9f 2c 43 62 82 f2 10 1d |F..qM. y.,Cb....| -peer0.org1.example.com | 00000030 30 a9 5c 3a 2b d1 04 cf 62 09 32 b6 fc 42 c3 70 |0.\:+...b.2..B.p| -peer0.org1.example.com | 00000040 97 43 cb d9 1e ed 2d |.C....-|" -peer0.org1.example.com | "2019-05-02 01:31:46.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ec1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.165 UTC [gossip.discovery] isSentByMe -> DEBU 3ec2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ec3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ec4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.165 UTC [gossip.comm] func1 -> DEBU 3ec5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.165 UTC [gossip.gossip] handleMessage -> DEBU 3ec6 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.165 UTC [gossip.gossip] handleMessage -> DEBU 3ec7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ec8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ec9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:46.165 UTC [msp.identity] Verify -> DEBU 3eca Verify: digest = 00000000 11 96 20 3e ef c4 b0 2b c8 03 2a 14 28 3f 35 d1 |.. >...+..*.(?5.| -peer0.org1.example.com | 00000010 12 09 d0 56 f7 48 0b 1c ee 72 e8 27 e7 64 10 c7 |...V.H...r.'.d..|" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [msp.identity] Verify -> DEBU 3ecb Verify: sig = 00000000 30 44 02 20 39 0d d3 19 75 ff 16 2e 04 41 20 d8 |0D. 9...u....A .| -peer0.org1.example.com | 00000010 c7 48 ee 87 fd 72 1b 4f 4c 4b 45 b0 80 67 31 d8 |.H...r.OLKE..g1.| -peer0.org1.example.com | 00000020 3b 71 32 e3 02 20 7c de 3e 2f 13 87 7d cb 34 27 |;q2.. |.>/..}.4'| -peer0.org1.example.com | 00000030 90 38 a1 24 98 80 dd 06 f6 ca 72 23 99 ea 9d c7 |.8.$......r#....| -peer0.org1.example.com | 00000040 4a c9 13 ab 96 bf |J.....|" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ecc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [gossip.discovery] isSentByMe -> DEBU 3ecd Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ece Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ecf Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [msp.identity] Verify -> DEBU 3ed0 Verify: digest = 00000000 7d 61 2e e2 87 88 f7 00 6a 24 c7 54 1f d0 29 76 |}a......j$.T..)v| -peer0.org1.example.com | 00000010 d6 b5 b9 2a f9 e3 51 30 4e d3 08 12 28 27 c2 7d |...*..Q0N...('.}|" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [msp.identity] Verify -> DEBU 3ed1 Verify: sig = 00000000 30 45 02 21 00 a5 45 e3 19 cb 21 a9 bb 6d a2 fe |0E.!..E...!..m..| -peer0.org1.example.com | 00000010 39 40 20 69 2f dc 71 c4 38 fc 13 99 93 14 85 48 |9@ i/.q.8......H| -peer0.org1.example.com | 00000020 04 16 b9 7e 61 02 20 63 14 54 8b 12 a4 d3 1a 08 |...~a. c.T......| -peer0.org1.example.com | 00000030 5a 27 0c d7 bd 42 54 03 11 db 7a f2 80 bf 23 6e |Z'...BT...z...#n| -peer0.org1.example.com | 00000040 4f 0e 6a 25 80 9d df |O.j%...|" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ed4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [msp] DeserializeIdentity -> DEBU 3ed5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ed6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:46.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:46.167 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed8 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:46.167 UTC [policies] Evaluate -> DEBU 3ed9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:46.167 UTC [policies] Evaluate -> DEBU 3eda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:46.167 UTC [policies] Evaluate -> DEBU 3edb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:46.167 UTC [cauthdsl] func1 -> DEBU 3edc 0xc002220da0 gate 1556760706167234700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:46.167 UTC [cauthdsl] func2 -> DEBU 3edd 0xc002220da0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:46.167 UTC [cauthdsl] func2 -> DEBU 3ede 0xc002220da0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:46.176 UTC [gossip.comm] func1 -> DEBU 3edf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.181 UTC [gossip.gossip] handleMessage -> DEBU 3ee0 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [cauthdsl] func2 -> DEBU 3ee1 0xc002220da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [cauthdsl] func2 -> DEBU 3ee2 0xc002220da0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [cauthdsl] func1 -> DEBU 3ee3 0xc002220da0 gate 1556760706167234700 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [policies] Evaluate -> DEBU 3ee4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [policies] Evaluate -> DEBU 3ee5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [policies] Evaluate -> DEBU 3ee6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [cauthdsl] func1 -> DEBU 3ee7 0xc002221650 gate 1556760706182530700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [cauthdsl] func2 -> DEBU 3ee8 0xc002221650 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [cauthdsl] func2 -> DEBU 3ee9 0xc002221650 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [cauthdsl] func2 -> DEBU 3eea 0xc002221650 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [msp.identity] Verify -> DEBU 3eeb Verify: digest = 00000000 cc f0 d6 69 4c 6a 90 19 3b 3b 6f 4d 81 e9 eb b6 |...iLj..;;oM....| -peer0.org1.example.com | 00000010 58 f7 5b a0 8e e8 04 37 72 01 80 ac cb 29 6f 25 |X.[....7r....)o%|" -peer0.org1.example.com | "2019-05-02 01:31:46.182 UTC [msp.identity] Verify -> DEBU 3eec Verify: sig = 00000000 30 44 02 20 12 2a 55 56 c7 d2 6e 6f 4d 77 fd 59 |0D. .*UV..noMw.Y| -peer0.org1.example.com | 00000010 47 8b 5d 71 35 4f d6 27 f0 9d fa 08 b9 78 11 4f |G.]q5O.'.....x.O| -peer0.org1.example.com | 00000020 12 8e d6 8f 02 20 5a 0b aa 25 ff e7 35 6c 60 18 |..... Z..%..5l`.| -peer0.org1.example.com | 00000030 ef 78 4e 6b e1 65 3b 8b e6 63 b3 c9 eb 9f 69 24 |.xNk.e;..c....i$| -peer0.org1.example.com | 00000040 1a d2 f6 96 b2 2b |.....+|" -peer0.org1.example.com | "2019-05-02 01:31:46.183 UTC [cauthdsl] func2 -> DEBU 3eed 0xc002221650 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:46.183 UTC [cauthdsl] func1 -> DEBU 3eee 0xc002221650 gate 1556760706182530700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:46.183 UTC [policies] Evaluate -> DEBU 3eef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.183 UTC [policies] Evaluate -> DEBU 3ef0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.186 UTC [policies] Evaluate -> DEBU 3ef1 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.187 UTC [policies] Evaluate -> DEBU 3ef2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ef3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ef4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ef5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ef6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:46.187 UTC [gossip.gossip] handleMessage -> DEBU 3ef8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.188 UTC [msp.identity] Verify -> DEBU 3ef9 Verify: digest = 00000000 7d 61 2e e2 87 88 f7 00 6a 24 c7 54 1f d0 29 76 |}a......j$.T..)v| -peer0.org1.example.com | 00000010 d6 b5 b9 2a f9 e3 51 30 4e d3 08 12 28 27 c2 7d |...*..Q0N...('.}|" -peer0.org1.example.com | "2019-05-02 01:31:46.188 UTC [msp.identity] Verify -> DEBU 3efa Verify: sig = 00000000 30 45 02 21 00 a5 45 e3 19 cb 21 a9 bb 6d a2 fe |0E.!..E...!..m..| -peer0.org1.example.com | 00000010 39 40 20 69 2f dc 71 c4 38 fc 13 99 93 14 85 48 |9@ i/.q.8......H| -peer0.org1.example.com | 00000020 04 16 b9 7e 61 02 20 63 14 54 8b 12 a4 d3 1a 08 |...~a. c.T......| -peer0.org1.example.com | 00000030 5a 27 0c d7 bd 42 54 03 11 db 7a f2 80 bf 23 6e |Z'...BT...z...#n| -peer0.org1.example.com | 00000040 4f 0e 6a 25 80 9d df |O.j%...|" -peer0.org1.example.com | "2019-05-02 01:31:46.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 3efb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 3efc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.188 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3efd Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:46.188 UTC [msp] DeserializeIdentity -> DEBU 3efe Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:46.190 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3eff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:46.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f00 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:46.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f01 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:46.190 UTC [policies] Evaluate -> DEBU 3f02 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:46.191 UTC [policies] Evaluate -> DEBU 3f03 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:46.191 UTC [policies] Evaluate -> DEBU 3f04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:46.191 UTC [cauthdsl] func1 -> DEBU 3f05 0xc0022a5ac0 gate 1556760706191388500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:46.191 UTC [cauthdsl] func2 -> DEBU 3f06 0xc0022a5ac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:46.191 UTC [cauthdsl] func2 -> DEBU 3f07 0xc0022a5ac0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:46.191 UTC [cauthdsl] func2 -> DEBU 3f08 0xc0022a5ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:46.192 UTC [cauthdsl] func2 -> DEBU 3f09 0xc0022a5ac0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:46.192 UTC [cauthdsl] func1 -> DEBU 3f0a 0xc0022a5ac0 gate 1556760706191388500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:46.192 UTC [policies] Evaluate -> DEBU 3f0b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.192 UTC [policies] Evaluate -> DEBU 3f0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.192 UTC [policies] Evaluate -> DEBU 3f0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:46.192 UTC [cauthdsl] func1 -> DEBU 3f0e 0xc0022ce3f0 gate 1556760706192695400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:46.192 UTC [cauthdsl] func2 -> DEBU 3f0f 0xc0022ce3f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:46.192 UTC [cauthdsl] func2 -> DEBU 3f10 0xc0022ce3f0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:46.193 UTC [cauthdsl] func2 -> DEBU 3f11 0xc0022ce3f0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:46.193 UTC [msp.identity] Verify -> DEBU 3f12 Verify: digest = 00000000 a0 d1 41 53 a1 70 71 ce 68 df b7 c7 08 8c 2c 1c |..AS.pq.h.....,.| -peer0.org1.example.com | 00000010 67 61 93 06 e4 d1 f6 f3 c9 ec c9 81 97 0b 97 75 |ga.............u|" -peer0.org1.example.com | "2019-05-02 01:31:46.193 UTC [msp.identity] Verify -> DEBU 3f13 Verify: sig = 00000000 30 45 02 21 00 d8 ee 77 4d 06 d0 c7 b8 45 82 e6 |0E.!...wM....E..| -peer0.org1.example.com | 00000010 81 47 56 5b c7 5e 9b 1d 53 8e 07 4e 12 68 0f 1c |.GV[.^..S..N.h..| -peer0.org1.example.com | 00000020 40 f2 58 4c 0a 02 20 54 71 ee 2a 4e 23 7b 53 c0 |@.XL.. Tq.*N#{S.| -peer0.org1.example.com | 00000030 09 fd 27 a8 5d cb 9c 2a 1b c2 c4 7f 17 1f f9 65 |..'.]..*.......e| -peer0.org1.example.com | 00000040 26 f1 d0 4d 3e ed 4e |&..M>.N|" -peer0.org1.example.com | "2019-05-02 01:31:46.194 UTC [cauthdsl] func2 -> DEBU 3f14 0xc0022ce3f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:46.194 UTC [cauthdsl] func1 -> DEBU 3f15 0xc0022ce3f0 gate 1556760706192695400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:46.195 UTC [policies] Evaluate -> DEBU 3f16 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.195 UTC [policies] Evaluate -> DEBU 3f17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.195 UTC [policies] Evaluate -> DEBU 3f18 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.195 UTC [policies] Evaluate -> DEBU 3f19 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:46.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f1a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f1b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f1c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:46.198 UTC [msp.identity] Verify -> DEBU 3f1d Verify: digest = 00000000 11 96 20 3e ef c4 b0 2b c8 03 2a 14 28 3f 35 d1 |.. >...+..*.(?5.| -peer0.org1.example.com | 00000010 12 09 d0 56 f7 48 0b 1c ee 72 e8 27 e7 64 10 c7 |...V.H...r.'.d..|" -peer0.org1.example.com | "2019-05-02 01:31:46.198 UTC [msp.identity] Verify -> DEBU 3f1e Verify: sig = 00000000 30 44 02 20 39 0d d3 19 75 ff 16 2e 04 41 20 d8 |0D. 9...u....A .| -peer0.org1.example.com | 00000010 c7 48 ee 87 fd 72 1b 4f 4c 4b 45 b0 80 67 31 d8 |.H...r.OLKE..g1.| -peer0.org1.example.com | 00000020 3b 71 32 e3 02 20 7c de 3e 2f 13 87 7d cb 34 27 |;q2.. |.>/..}.4'| -peer0.org1.example.com | 00000030 90 38 a1 24 98 80 dd 06 f6 ca 72 23 99 ea 9d c7 |.8.$......r#....| -peer0.org1.example.com | 00000040 4a c9 13 ab 96 bf |J.....|" -peer0.org1.example.com | "2019-05-02 01:31:46.199 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f1f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.199 UTC [gossip.discovery] isSentByMe -> DEBU 3f20 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.199 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f21 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.199 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f22 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.956 UTC [gossip.election] waitForInterrupt -> DEBU 3f23 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:46.956 UTC [gossip.election] IsLeader -> DEBU 3f24 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:46.957 UTC [msp.identity] Sign -> DEBU 3f25 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100E1801 " -peer0.org1.example.com | "2019-05-02 01:31:46.958 UTC [msp.identity] Sign -> DEBU 3f26 Sign: digest: 4F356A89DD05A251570A68D150DF421CFEF6D4606901C9BCA8CE2AE5854608E8 " -peer0.org1.example.com | "2019-05-02 01:31:46.959 UTC [gossip.election] waitForInterrupt -> DEBU 3f27 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:46.965 UTC [msp] DeserializeIdentity -> DEBU 3f28 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:46.966 UTC [msp] DeserializeIdentity -> DEBU 3f29 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:46.967 UTC [msp] DeserializeIdentity -> DEBU 3f2a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:46.967 UTC [msp] DeserializeIdentity -> DEBU 3f2b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:46.967 UTC [gossip.comm] Send -> DEBU 3f2c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:46.967 UTC [msp] DeserializeIdentity -> DEBU 3f2d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:46.967 UTC [msp] DeserializeIdentity -> DEBU 3f2e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:46.967 UTC [gossip.comm] sendToEndpoint -> DEBU 3f2f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:46.968 UTC [gossip.comm] sendToEndpoint -> DEBU 3f30 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.411 UTC [gossip.comm] func1 -> DEBU 3f31 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.412 UTC [gossip.gossip] handleMessage -> DEBU 3f32 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.412 UTC [gossip.gossip] handleMessage -> DEBU 3f33 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.412 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f34 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.412 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f35 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:48.412 UTC [msp.identity] Verify -> DEBU 3f36 Verify: digest = 00000000 e5 fa 7d c5 41 65 48 04 b6 c2 41 2b c3 d5 8a 4b |..}.AeH...A+...K| -peer0.org1.example.com | 00000010 a5 5d 54 9c 02 2c c0 35 e0 97 90 80 0a 7e d7 d3 |.]T..,.5.....~..|" -peer0.org1.example.com | "2019-05-02 01:31:48.412 UTC [msp.identity] Verify -> DEBU 3f37 Verify: sig = 00000000 30 45 02 21 00 fd da 77 b9 b5 3a 5e b2 42 4d db |0E.!...w..:^.BM.| -peer0.org1.example.com | 00000010 6a 3a 86 67 6b 57 3d 9a 93 a4 1b 2c 21 ea e7 a2 |j:.gkW=....,!...| -peer0.org1.example.com | 00000020 7d 01 cf a2 fc 02 20 46 26 91 2f 31 a4 d9 1a 1d |}..... F&./1....| -peer0.org1.example.com | 00000030 6b bc 91 19 73 23 b2 dd af e6 e1 ed 4a 4a 10 4b |k...s#......JJ.K| -peer0.org1.example.com | 00000040 9e c5 6b 75 78 08 ca |..kux..|" -peer0.org1.example.com | "2019-05-02 01:31:48.413 UTC [msp.identity] Verify -> DEBU 3f38 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:48.413 UTC [msp.identity] Verify -> DEBU 3f39 Verify: sig = 00000000 30 45 02 21 00 ac d2 3f 76 5a 8b 5b 4a 70 91 6e |0E.!...?vZ.[Jp.n| -peer0.org1.example.com | 00000010 4e d0 8c 13 85 07 ae a6 25 c8 f6 56 09 6b 4b 5a |N.......%..V.kKZ| -peer0.org1.example.com | 00000020 c8 4f 16 36 8a 02 20 1d 5a b0 e5 43 99 3b 26 85 |.O.6.. .Z..C.;&.| -peer0.org1.example.com | 00000030 c4 b7 3c 70 f6 16 30 7e ec 21 05 23 8e c4 80 b7 |.. DEBU 3f3a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:48.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3c updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 " -peer0.org1.example.com | "2019-05-02 01:31:48.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 " -peer0.org1.example.com | "2019-05-02 01:31:48.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:48.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.413 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f40 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f41 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [msp] DeserializeIdentity -> DEBU 3f42 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [msp] DeserializeIdentity -> DEBU 3f43 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [msp] DeserializeIdentity -> DEBU 3f44 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [gossip.comm] Send -> DEBU 3f45 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [gossip.comm] func1 -> DEBU 3f46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [msp] DeserializeIdentity -> DEBU 3f47 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [gossip.gossip] handleMessage -> DEBU 3f48 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [gossip.gossip] handleMessage -> DEBU 3f49 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [gossip.comm] Send -> DEBU 3f4a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.423 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.422 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f4e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.423 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.423 UTC [gossip.comm] sendToEndpoint -> DEBU 3f50 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.426 UTC [gossip.comm] func1 -> DEBU 3f51 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.427 UTC [gossip.gossip] handleMessage -> DEBU 3f52 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.427 UTC [gossip.gossip] handleMessage -> DEBU 3f53 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.427 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f54 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.427 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f55 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.475 UTC [gossip.comm] func1 -> DEBU 3f56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.475 UTC [gossip.gossip] handleMessage -> DEBU 3f57 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.475 UTC [gossip.gossip] handleMessage -> DEBU 3f58 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.475 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.475 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f5a Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:48.475 UTC [msp] DeserializeIdentity -> DEBU 3f5b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f5c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f5d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f5e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [policies] Evaluate -> DEBU 3f5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [policies] Evaluate -> DEBU 3f60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [policies] Evaluate -> DEBU 3f61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [cauthdsl] func1 -> DEBU 3f62 0xc002433400 gate 1556760708476594200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [cauthdsl] func2 -> DEBU 3f63 0xc002433400 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [cauthdsl] func2 -> DEBU 3f64 0xc002433400 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [cauthdsl] func2 -> DEBU 3f65 0xc002433400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [cauthdsl] func2 -> DEBU 3f66 0xc002433400 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [cauthdsl] func1 -> DEBU 3f67 0xc002433400 gate 1556760708476594200 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.476 UTC [policies] Evaluate -> DEBU 3f68 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.477 UTC [policies] Evaluate -> DEBU 3f69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.477 UTC [policies] Evaluate -> DEBU 3f6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.477 UTC [cauthdsl] func1 -> DEBU 3f6b 0xc002433c40 gate 1556760708477385800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [cauthdsl] func2 -> DEBU 3f6c 0xc002433c40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [cauthdsl] func2 -> DEBU 3f6d 0xc002433c40 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [cauthdsl] func2 -> DEBU 3f6e 0xc002433c40 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [msp.identity] Verify -> DEBU 3f6f Verify: digest = 00000000 2e 9a 4e 8c 1f 3a 74 37 8d f8 25 af 4d a7 7e 02 |..N..:t7..%.M.~.| -peer0.org1.example.com | 00000010 97 c4 19 51 90 b6 7a 3a ce ee 1d 5c ff f4 c9 4a |...Q..z:...\...J|" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [msp.identity] Verify -> DEBU 3f70 Verify: sig = 00000000 30 45 02 21 00 95 6e 93 88 31 48 35 db 86 15 ce |0E.!..n..1H5....| -peer0.org1.example.com | 00000010 1b 9f d2 b2 0c 03 00 30 1f d3 7f 7a 36 88 ef 59 |.......0...z6..Y| -peer0.org1.example.com | 00000020 0f 1b d2 28 60 02 20 5e cf f3 38 5d 0c 1d e0 05 |...(`. ^..8]....| -peer0.org1.example.com | 00000030 a3 34 cc 7e 1d 1f bc 16 ed 77 37 65 0b 23 ff 05 |.4.~.....w7e.#..| -peer0.org1.example.com | 00000040 31 b7 80 74 68 f4 03 |1..th..|" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [cauthdsl] func2 -> DEBU 3f71 0xc002433c40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [cauthdsl] func1 -> DEBU 3f72 0xc002433c40 gate 1556760708477385800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [policies] Evaluate -> DEBU 3f73 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [policies] Evaluate -> DEBU 3f74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [policies] Evaluate -> DEBU 3f75 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.480 UTC [policies] Evaluate -> DEBU 3f76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.481 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f77 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.481 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f78 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:48.481 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f79 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 " -peer0.org1.example.com | "2019-05-02 01:31:48.481 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f7a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 " -peer0.org1.example.com | "2019-05-02 01:31:48.481 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f7b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:48.481 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f7c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.481 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f7d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.481 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f7e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.486 UTC [gossip.comm] func1 -> DEBU 3f7f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.486 UTC [gossip.gossip] handleMessage -> DEBU 3f80 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.486 UTC [gossip.gossip] handleMessage -> DEBU 3f81 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.486 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f82 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.486 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f83 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.490 UTC [msp] DeserializeIdentity -> DEBU 3f84 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.490 UTC [msp] DeserializeIdentity -> DEBU 3f85 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f86 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f87 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f88 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.comm] func1 -> DEBU 3f89 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f8a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.gossip] handleMessage -> DEBU 3f8b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f8c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.gossip] handleMessage -> DEBU 3f8d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.comm] Send -> DEBU 3f8e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f8f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f90 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f91 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.comm] Send -> DEBU 3f92 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.comm] sendToEndpoint -> DEBU 3f93 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.comm] sendToEndpoint -> DEBU 3f94 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.comm] sendToEndpoint -> DEBU 3f95 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.491 UTC [gossip.comm] sendToEndpoint -> DEBU 3f96 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.543 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 3f97 Sleeping 25s" -peer0.org1.example.com | "2019-05-02 01:31:48.700 UTC [msp.identity] Sign -> DEBU 3f98 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151030 " -peer0.org1.example.com | "2019-05-02 01:31:48.700 UTC [msp.identity] Sign -> DEBU 3f99 Sign: digest: 688C85DD5E321C6043BC0E7C80F5322804F6223AD5D1EA345F6AFA795557A7A5 " -peer0.org1.example.com | "2019-05-02 01:31:48.701 UTC [msp.identity] Sign -> DEBU 3f9a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:48.701 UTC [msp.identity] Sign -> DEBU 3f9b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:48.702 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3f9c Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:48.709 UTC [msp] DeserializeIdentity -> DEBU 3f9d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.710 UTC [msp] DeserializeIdentity -> DEBU 3f9e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.711 UTC [msp] DeserializeIdentity -> DEBU 3f9f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.712 UTC [gossip.comm] Send -> DEBU 3fa0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.712 UTC [gossip.comm] Send -> DEBU 3fa1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.713 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.713 UTC [msp] DeserializeIdentity -> DEBU 3fa3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.713 UTC [gossip.comm] Send -> DEBU 3fa5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.713 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.786 UTC [msp] DeserializeIdentity -> DEBU 3faa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.786 UTC [msp] DeserializeIdentity -> DEBU 3fab Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.786 UTC [gossip.comm] Send -> DEBU 3fac Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fae Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3faf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.790 UTC [gossip.comm] func1 -> DEBU 3fb3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.791 UTC [gossip.gossip] handleMessage -> DEBU 3fb4 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.792 UTC [msp.identity] Verify -> DEBU 3fb5 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:48.792 UTC [msp.identity] Verify -> DEBU 3fb6 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:48.792 UTC [gossip.comm] func1 -> DEBU 3fb7 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.796 UTC [msp.identity] Verify -> DEBU 3fb8 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:48.798 UTC [msp.identity] Verify -> DEBU 3fb9 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:48.800 UTC [msp] DeserializeIdentity -> DEBU 3fba Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.801 UTC [msp] DeserializeIdentity -> DEBU 3fbb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.803 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fbd Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fbe Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.805 UTC [policies] Evaluate -> DEBU 3fbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.806 UTC [policies] Evaluate -> DEBU 3fc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:48.807 UTC [policies] Evaluate -> DEBU 3fc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.808 UTC [cauthdsl] func1 -> DEBU 3fc3 0xc0026781d0 gate 1556760708808243500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.808 UTC [cauthdsl] func2 -> DEBU 3fc4 0xc0026781d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.807 UTC [gossip.comm] func1 -> DEBU 3fc2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.810 UTC [cauthdsl] func2 -> DEBU 3fc5 0xc0026781d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.811 UTC [cauthdsl] func2 -> DEBU 3fc6 0xc0026781d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:48.811 UTC [cauthdsl] func2 -> DEBU 3fc7 0xc0026781d0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.812 UTC [cauthdsl] func1 -> DEBU 3fc8 0xc0026781d0 gate 1556760708808243500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.812 UTC [policies] Evaluate -> DEBU 3fc9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.813 UTC [policies] Evaluate -> DEBU 3fca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.818 UTC [policies] Evaluate -> DEBU 3fcc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.816 UTC [gossip.comm] func1 -> DEBU 3fcb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.822 UTC [gossip.comm] func1 -> DEBU 3fcd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.820 UTC [cauthdsl] func1 -> DEBU 3fce 0xc002678a40 gate 1556760708819805600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.826 UTC [cauthdsl] func2 -> DEBU 3fcf 0xc002678a40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.826 UTC [cauthdsl] func2 -> DEBU 3fd0 0xc002678a40 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.827 UTC [gossip.comm] func1 -> DEBU 3fd1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.828 UTC [cauthdsl] func2 -> DEBU 3fd2 0xc002678a40 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.830 UTC [msp.identity] Verify -> DEBU 3fd3 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:48.830 UTC [msp.identity] Verify -> DEBU 3fd4 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:48.831 UTC [cauthdsl] func2 -> DEBU 3fd5 0xc002678a40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.831 UTC [cauthdsl] func1 -> DEBU 3fd6 0xc002678a40 gate 1556760708819805600 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:48.831 UTC [policies] Evaluate -> DEBU 3fd7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.831 UTC [policies] Evaluate -> DEBU 3fd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.832 UTC [policies] Evaluate -> DEBU 3fd9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.832 UTC [policies] Evaluate -> DEBU 3fda == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.833 UTC [msp] DeserializeIdentity -> DEBU 3fdb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.833 UTC [msp] DeserializeIdentity -> DEBU 3fdc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.834 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fdd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:48.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fde Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fdf Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.835 UTC [policies] Evaluate -> DEBU 3fe0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.835 UTC [policies] Evaluate -> DEBU 3fe1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:48.835 UTC [policies] Evaluate -> DEBU 3fe2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.836 UTC [cauthdsl] func1 -> DEBU 3fe3 0xc0026ce3e0 gate 1556760708836242100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.836 UTC [cauthdsl] func2 -> DEBU 3fe4 0xc0026ce3e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.836 UTC [cauthdsl] func2 -> DEBU 3fe5 0xc0026ce3e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.837 UTC [cauthdsl] func2 -> DEBU 3fe6 0xc0026ce3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:48.837 UTC [cauthdsl] func2 -> DEBU 3fe7 0xc0026ce3e0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.837 UTC [cauthdsl] func1 -> DEBU 3fe8 0xc0026ce3e0 gate 1556760708836242100 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.838 UTC [policies] Evaluate -> DEBU 3fe9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.838 UTC [policies] Evaluate -> DEBU 3fea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.838 UTC [policies] Evaluate -> DEBU 3feb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.838 UTC [cauthdsl] func1 -> DEBU 3fec 0xc0026cec20 gate 1556760708838832200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.839 UTC [cauthdsl] func2 -> DEBU 3fed 0xc0026cec20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.839 UTC [cauthdsl] func2 -> DEBU 3fee 0xc0026cec20 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.839 UTC [cauthdsl] func2 -> DEBU 3fef 0xc0026cec20 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.839 UTC [msp.identity] Verify -> DEBU 3ff0 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:48.840 UTC [msp.identity] Verify -> DEBU 3ff1 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:48.840 UTC [cauthdsl] func2 -> DEBU 3ff2 0xc0026cec20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.840 UTC [cauthdsl] func1 -> DEBU 3ff3 0xc0026cec20 gate 1556760708838832200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:48.841 UTC [policies] Evaluate -> DEBU 3ff4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.841 UTC [policies] Evaluate -> DEBU 3ff5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.841 UTC [policies] Evaluate -> DEBU 3ff6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.842 UTC [policies] Evaluate -> DEBU 3ff7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.842 UTC [gossip.gossip] handleMessage -> DEBU 3ff8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.842 UTC [gossip.gossip] handleMessage -> DEBU 3ff9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.843 UTC [msp] DeserializeIdentity -> DEBU 3ffa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.843 UTC [msp] DeserializeIdentity -> DEBU 3ffb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.844 UTC [msp] DeserializeIdentity -> DEBU 3ffc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ffd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:48.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ffe Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fff Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.845 UTC [policies] Evaluate -> DEBU 4000 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.845 UTC [policies] Evaluate -> DEBU 4001 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:48.845 UTC [policies] Evaluate -> DEBU 4002 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.846 UTC [cauthdsl] func1 -> DEBU 4003 0xc0027aa730 gate 1556760708846266400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.846 UTC [cauthdsl] func2 -> DEBU 4004 0xc0027aa730 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.847 UTC [cauthdsl] func2 -> DEBU 4005 0xc0027aa730 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.847 UTC [cauthdsl] func2 -> DEBU 4006 0xc0027aa730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:48.847 UTC [cauthdsl] func2 -> DEBU 4007 0xc0027aa730 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.848 UTC [cauthdsl] func1 -> DEBU 4008 0xc0027aa730 gate 1556760708846266400 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.848 UTC [policies] Evaluate -> DEBU 4009 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.849 UTC [policies] Evaluate -> DEBU 400a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.849 UTC [policies] Evaluate -> DEBU 400b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.849 UTC [cauthdsl] func1 -> DEBU 400c 0xc0027aaf70 gate 1556760708849908900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.850 UTC [cauthdsl] func2 -> DEBU 400d 0xc0027aaf70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.850 UTC [cauthdsl] func2 -> DEBU 400e 0xc0027aaf70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.851 UTC [cauthdsl] func2 -> DEBU 400f 0xc0027aaf70 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.851 UTC [msp.identity] Verify -> DEBU 4010 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:48.852 UTC [msp.identity] Verify -> DEBU 4011 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:48.852 UTC [cauthdsl] func2 -> DEBU 4012 0xc0027aaf70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.853 UTC [cauthdsl] func1 -> DEBU 4013 0xc0027aaf70 gate 1556760708849908900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:48.853 UTC [policies] Evaluate -> DEBU 4014 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.854 UTC [policies] Evaluate -> DEBU 4015 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.854 UTC [policies] Evaluate -> DEBU 4016 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.854 UTC [policies] Evaluate -> DEBU 4017 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.855 UTC [msp.identity] Verify -> DEBU 4018 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:48.855 UTC [msp.identity] Verify -> DEBU 4019 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:48.856 UTC [msp.identity] Verify -> DEBU 401a Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:48.856 UTC [msp.identity] Verify -> DEBU 401b Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:48.857 UTC [msp] DeserializeIdentity -> DEBU 401c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.857 UTC [msp] DeserializeIdentity -> DEBU 401d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.859 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 401e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:48.860 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 401f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.861 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4020 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.861 UTC [policies] Evaluate -> DEBU 4021 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.861 UTC [policies] Evaluate -> DEBU 4022 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:48.862 UTC [policies] Evaluate -> DEBU 4023 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.862 UTC [cauthdsl] func1 -> DEBU 4024 0xc0027b76b0 gate 1556760708862827300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.863 UTC [cauthdsl] func2 -> DEBU 4025 0xc0027b76b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.863 UTC [cauthdsl] func2 -> DEBU 4026 0xc0027b76b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.863 UTC [cauthdsl] func2 -> DEBU 4027 0xc0027b76b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:48.864 UTC [cauthdsl] func2 -> DEBU 4028 0xc0027b76b0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.864 UTC [cauthdsl] func1 -> DEBU 4029 0xc0027b76b0 gate 1556760708862827300 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.864 UTC [policies] Evaluate -> DEBU 402a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.865 UTC [policies] Evaluate -> DEBU 402b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.865 UTC [policies] Evaluate -> DEBU 402c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.865 UTC [cauthdsl] func1 -> DEBU 402d 0xc0027b7ef0 gate 1556760708865647000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.865 UTC [cauthdsl] func2 -> DEBU 402e 0xc0027b7ef0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.866 UTC [cauthdsl] func2 -> DEBU 402f 0xc0027b7ef0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.866 UTC [cauthdsl] func2 -> DEBU 4030 0xc0027b7ef0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.866 UTC [msp.identity] Verify -> DEBU 4031 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:48.867 UTC [msp.identity] Verify -> DEBU 4032 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:48.867 UTC [cauthdsl] func2 -> DEBU 4033 0xc0027b7ef0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.867 UTC [cauthdsl] func1 -> DEBU 4034 0xc0027b7ef0 gate 1556760708865647000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:48.868 UTC [policies] Evaluate -> DEBU 4035 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.868 UTC [policies] Evaluate -> DEBU 4036 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.868 UTC [policies] Evaluate -> DEBU 4037 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.869 UTC [policies] Evaluate -> DEBU 4038 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.869 UTC [gossip.gossip] handleMessage -> DEBU 4039 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.869 UTC [gossip.gossip] handleMessage -> DEBU 403a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.870 UTC [msp] DeserializeIdentity -> DEBU 403b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.870 UTC [msp] DeserializeIdentity -> DEBU 403c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.871 UTC [msp] DeserializeIdentity -> DEBU 403d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 403e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:48.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 403f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4040 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.872 UTC [policies] Evaluate -> DEBU 4041 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.872 UTC [policies] Evaluate -> DEBU 4042 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:48.873 UTC [policies] Evaluate -> DEBU 4043 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.873 UTC [cauthdsl] func1 -> DEBU 4044 0xc0027eda00 gate 1556760708873382800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.873 UTC [cauthdsl] func2 -> DEBU 4045 0xc0027eda00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.873 UTC [cauthdsl] func2 -> DEBU 4046 0xc0027eda00 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.874 UTC [cauthdsl] func2 -> DEBU 4047 0xc0027eda00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:48.874 UTC [cauthdsl] func2 -> DEBU 4048 0xc0027eda00 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.875 UTC [cauthdsl] func1 -> DEBU 4049 0xc0027eda00 gate 1556760708873382800 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.875 UTC [policies] Evaluate -> DEBU 404a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.875 UTC [policies] Evaluate -> DEBU 404b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.876 UTC [policies] Evaluate -> DEBU 404c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.877 UTC [cauthdsl] func1 -> DEBU 404d 0xc0027fa280 gate 1556760708877059700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.877 UTC [cauthdsl] func2 -> DEBU 404e 0xc0027fa280 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.878 UTC [cauthdsl] func2 -> DEBU 404f 0xc0027fa280 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.878 UTC [cauthdsl] func2 -> DEBU 4050 0xc0027fa280 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.878 UTC [msp.identity] Verify -> DEBU 4051 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:48.879 UTC [msp.identity] Verify -> DEBU 4052 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:48.879 UTC [cauthdsl] func2 -> DEBU 4053 0xc0027fa280 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.879 UTC [cauthdsl] func1 -> DEBU 4054 0xc0027fa280 gate 1556760708877059700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:48.880 UTC [policies] Evaluate -> DEBU 4055 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.880 UTC [policies] Evaluate -> DEBU 4056 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.880 UTC [policies] Evaluate -> DEBU 4057 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.880 UTC [policies] Evaluate -> DEBU 4058 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.881 UTC [msp.identity] Verify -> DEBU 4059 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:48.881 UTC [msp.identity] Verify -> DEBU 405a Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:48.885 UTC [msp] DeserializeIdentity -> DEBU 405b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.885 UTC [msp] DeserializeIdentity -> DEBU 405c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.885 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 405d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:48.885 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 405e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.885 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 405f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.885 UTC [policies] Evaluate -> DEBU 4060 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [policies] Evaluate -> DEBU 4061 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [policies] Evaluate -> DEBU 4062 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [cauthdsl] func1 -> DEBU 4063 0xc002c2a1c0 gate 1556760708886105400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 4064 0xc002c2a1c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 4065 0xc002c2a1c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 4066 0xc002c2a1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 4067 0xc002c2a1c0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [cauthdsl] func1 -> DEBU 4068 0xc002c2a1c0 gate 1556760708886105400 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [policies] Evaluate -> DEBU 4069 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [policies] Evaluate -> DEBU 406a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [policies] Evaluate -> DEBU 406b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [cauthdsl] func1 -> DEBU 406c 0xc002c2aa00 gate 1556760708886547500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 406d 0xc002c2aa00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 406e 0xc002c2aa00 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 406f 0xc002c2aa00 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [msp.identity] Verify -> DEBU 4070 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:48.886 UTC [msp.identity] Verify -> DEBU 4071 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:48.887 UTC [cauthdsl] func2 -> DEBU 4072 0xc002c2aa00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.887 UTC [cauthdsl] func1 -> DEBU 4073 0xc002c2aa00 gate 1556760708886547500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:48.887 UTC [policies] Evaluate -> DEBU 4074 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.887 UTC [policies] Evaluate -> DEBU 4075 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.887 UTC [policies] Evaluate -> DEBU 4076 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.887 UTC [policies] Evaluate -> DEBU 4077 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.887 UTC [msp.identity] Verify -> DEBU 4078 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:48.887 UTC [msp.identity] Verify -> DEBU 4079 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:48.887 UTC [gossip.gossip] handleMessage -> DEBU 407a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.888 UTC [gossip.gossip] handleMessage -> DEBU 407b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.889 UTC [gossip.gossip] handleMessage -> DEBU 407c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.889 UTC [gossip.gossip] handleMessage -> DEBU 407d Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.890 UTC [gossip.discovery] handleMsgFromComm -> DEBU 407e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.890 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 407f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:48.890 UTC [msp] DeserializeIdentity -> DEBU 4080 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.890 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4081 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:48.891 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4082 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.891 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4083 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:48.891 UTC [policies] Evaluate -> DEBU 4084 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.891 UTC [policies] Evaluate -> DEBU 4085 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:48.891 UTC [policies] Evaluate -> DEBU 4086 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func1 -> DEBU 4087 0xc002c56f50 gate 1556760708892205500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4088 0xc002c56f50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4089 0xc002c56f50 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 408a 0xc002c56f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 408b 0xc002c56f50 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func1 -> DEBU 408c 0xc002c56f50 gate 1556760708892205500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [policies] Evaluate -> DEBU 408d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [policies] Evaluate -> DEBU 408e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [policies] Evaluate -> DEBU 408f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func1 -> DEBU 4090 0xc002c577b0 gate 1556760708892612900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4091 0xc002c577b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4092 0xc002c577b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4093 0xc002c577b0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [msp.identity] Verify -> DEBU 4094 Verify: digest = 00000000 5c a4 8a ca c5 3e 3e ce 0d e2 28 90 74 05 08 71 |\....>>...(.t..q| -peer0.org1.example.com | 00000010 1d 5a da 89 fe 71 f3 08 63 a2 21 32 f3 ce f0 ed |.Z...q..c.!2....|" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [msp.identity] Verify -> DEBU 4095 Verify: sig = 00000000 30 44 02 20 46 05 f9 f1 77 2b 31 e0 2b 31 38 8d |0D. F...w+1.+18.| -peer0.org1.example.com | 00000010 57 5f ff f4 d9 f7 d0 82 4a c3 4d e9 39 cb 79 b2 |W_......J.M.9.y.| -peer0.org1.example.com | 00000020 97 41 03 8d 02 20 14 41 17 8e 99 72 f8 7f 3c 10 |.A... .A...r..<.| -peer0.org1.example.com | 00000030 59 7d 8a 3e 91 44 a3 b7 40 58 e0 ae b5 c6 5f ee |Y}.>.D..@X...._.| -peer0.org1.example.com | 00000040 d9 04 9a 28 58 33 |...(X3|" -peer0.org1.example.com | "2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4096 0xc002c577b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [cauthdsl] func1 -> DEBU 4097 0xc002c577b0 gate 1556760708892612900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [policies] Evaluate -> DEBU 4098 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [policies] Evaluate -> DEBU 4099 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [policies] Evaluate -> DEBU 409a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [policies] Evaluate -> DEBU 409b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 409c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 409d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 409e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 " -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 409f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 " -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 40a2 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.gossip] handleMessage -> DEBU 40a6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [msp] DeserializeIdentity -> DEBU 40a7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.gossip] handleMessage -> DEBU 40a8 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.gossip] handleMessage -> DEBU 40a9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [msp] DeserializeIdentity -> DEBU 40aa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40ab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [msp] DeserializeIdentity -> DEBU 40ac Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40ad Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [msp] DeserializeIdentity -> DEBU 40ae Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [msp] DeserializeIdentity -> DEBU 40af Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [msp] DeserializeIdentity -> DEBU 40b0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [msp] DeserializeIdentity -> DEBU 40b1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [gossip.comm] Send -> DEBU 40b2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [msp] DeserializeIdentity -> DEBU 40b3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [gossip.comm] Send -> DEBU 40b4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [gossip.comm] sendToEndpoint -> DEBU 40b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [gossip.comm] sendToEndpoint -> DEBU 40b6 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [gossip.comm] sendToEndpoint -> DEBU 40b7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.894 UTC [gossip.comm] sendToEndpoint -> DEBU 40b8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.920 UTC [msp] DeserializeIdentity -> DEBU 40b9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.920 UTC [msp] DeserializeIdentity -> DEBU 40ba Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.920 UTC [gossip.pull] Hello -> DEBU 40bb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:48.921 UTC [msp] DeserializeIdentity -> DEBU 40bc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.921 UTC [msp] DeserializeIdentity -> DEBU 40bd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:48.921 UTC [gossip.comm] Send -> DEBU 40be Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:48.921 UTC [gossip.comm] sendToEndpoint -> DEBU 40bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.921 UTC [gossip.comm] sendToEndpoint -> DEBU 40c0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:48.922 UTC [gossip.comm] func1 -> DEBU 40c1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10457489009539221300 , Msg_type: BLOCK_MSG, digests: [7 4 2 3 5 6 8 9 1], Envelope: 61 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.922 UTC [gossip.gossip] handleMessage -> DEBU 40c2 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10457489009539221300 , Msg_type: BLOCK_MSG, digests: [7 4 2 3 5 6 8 9 1], Envelope: 61 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.922 UTC [gossip.pull] HandleMessage -> DEBU 40c3 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10457489009539221300 , Msg_type: BLOCK_MSG, digests: [7 4 2 3 5 6 8 9 1], Envelope: 61 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:48.922 UTC [gossip.gossip] handleMessage -> DEBU 40c4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.051 UTC [gossip.comm] func1 -> DEBU 40c5 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.051 UTC [gossip.gossip] handleMessage -> DEBU 40c6 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.054 UTC [msp] DeserializeIdentity -> DEBU 40c7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.054 UTC [msp] DeserializeIdentity -> DEBU 40c8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.054 UTC [gossip.gossip] handleMessage -> DEBU 40c9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.093 UTC [gossip.comm] func1 -> DEBU 40ca Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.093 UTC [gossip.gossip] handleMessage -> DEBU 40cb Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.093 UTC [gossip.pull] HandleMessage -> DEBU 40cc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.093 UTC [gossip.pull] SendDigest -> DEBU 40cd Sending BLOCK_MSG digest: [2 3 4 1 5 6 7 8 9] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:49.093 UTC [gossip.gossip] handleMessage -> DEBU 40ce Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.274 UTC [gossip.comm] func1 -> DEBU 40cf Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.274 UTC [gossip.gossip] handleMessage -> DEBU 40d0 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.274 UTC [msp] DeserializeIdentity -> DEBU 40d1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.274 UTC [msp] DeserializeIdentity -> DEBU 40d2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.274 UTC [msp] DeserializeIdentity -> DEBU 40d3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.274 UTC [gossip.gossip] handleMessage -> DEBU 40d4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.404 UTC [gossip.comm] func1 -> DEBU 40d5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.404 UTC [gossip.gossip] handleMessage -> DEBU 40d6 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.404 UTC [gossip.pull] HandleMessage -> DEBU 40d7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.405 UTC [gossip.pull] SendDigest -> DEBU 40d8 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:49.405 UTC [gossip.gossip] handleMessage -> DEBU 40d9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.460 UTC [gossip.comm] func1 -> DEBU 40da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.461 UTC [gossip.gossip] handleMessage -> DEBU 40db Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.461 UTC [gossip.gossip] handleMessage -> DEBU 40dc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.461 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.461 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 40de Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:49.461 UTC [msp.identity] Verify -> DEBU 40df Verify: digest = 00000000 1e 39 81 c1 ec ca e7 23 8e 01 5e 62 9f 7c d0 4e |.9.....#..^b.|.N| -peer0.org1.example.com | 00000010 e3 17 0a 6f a7 a7 d9 7e 59 c8 f5 dd 63 85 3d 1e |...o...~Y...c.=.|" -peer0.org1.example.com | "2019-05-02 01:31:49.461 UTC [msp.identity] Verify -> DEBU 40e0 Verify: sig = 00000000 30 44 02 20 53 2d af 96 8b 4e 76 73 31 bd eb 4e |0D. S-...Nvs1..N| -peer0.org1.example.com | 00000010 83 6a 14 c8 c7 84 3d c5 56 1e 1f 26 4a c9 4b 5a |.j....=.V..&J.KZ| -peer0.org1.example.com | 00000020 48 0f 5d 13 02 20 08 cb a3 7f 67 34 e8 2f f1 c2 |H.].. ....g4./..| -peer0.org1.example.com | 00000030 4b b4 04 df d9 62 75 c8 d1 5b d2 c9 48 05 4a 2a |K....bu..[..H.J*| -peer0.org1.example.com | 00000040 53 2b b7 f6 7b 98 |S+..{.|" -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [msp.identity] Verify -> DEBU 40e1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [msp.identity] Verify -> DEBU 40e2 Verify: sig = 00000000 30 44 02 20 42 0b 78 74 78 63 8b af 82 72 7e 38 |0D. B.xtxc...r~8| -peer0.org1.example.com | 00000010 ca c5 bd 0e 83 a2 15 0f d5 08 83 78 d8 9f a7 36 |...........x...6| -peer0.org1.example.com | 00000020 a9 2b 0a 1d 02 20 39 82 45 98 5e 83 c3 b8 7f 0c |.+... 9.E.^.....| -peer0.org1.example.com | 00000030 aa 66 6a 3f 7d 57 4d 59 34 38 bd 0d 3d ee 3d 87 |.fj?}WMY48..=.=.| -peer0.org1.example.com | 00000040 b5 8a 4d b2 0f 2d |..M..-|" -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [gossip.discovery] handleAliveMessage -> DEBU 40e3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 40e4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 40e5 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 " -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 40e6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 " -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 40e7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 40e8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [gossip.discovery] handleAliveMessage -> DEBU 40e9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40ea Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.462 UTC [gossip.discovery] sendMemResponse -> DEBU 40eb Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:49.463 UTC [msp] DeserializeIdentity -> DEBU 40ec Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.463 UTC [msp] DeserializeIdentity -> DEBU 40ed Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.463 UTC [gossip.comm] Send -> DEBU 40ee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:49.463 UTC [gossip.discovery] sendMemResponse -> DEBU 40ef Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:49.463 UTC [gossip.comm] sendToEndpoint -> DEBU 40f0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.463 UTC [gossip.comm] sendToEndpoint -> DEBU 40f1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.506 UTC [gossip.comm] func1 -> DEBU 40f2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.506 UTC [gossip.gossip] handleMessage -> DEBU 40f3 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.506 UTC [gossip.pull] HandleMessage -> DEBU 40f4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.506 UTC [msp] DeserializeIdentity -> DEBU 40f5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.507 UTC [msp] DeserializeIdentity -> DEBU 40f6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.507 UTC [msp] DeserializeIdentity -> DEBU 40f7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.507 UTC [msp] DeserializeIdentity -> DEBU 40f8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.507 UTC [msp] DeserializeIdentity -> DEBU 40f9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.508 UTC [msp] DeserializeIdentity -> DEBU 40fa Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.509 UTC [gossip.pull] SendDigest -> DEBU 40fb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:49.509 UTC [gossip.gossip] handleMessage -> DEBU 40fc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.528 UTC [gossip.comm] func1 -> DEBU 40fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [gossip.gossip] handleMessage -> DEBU 40fe Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [gossip.gossip] handleMessage -> DEBU 40ff Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4100 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4101 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [msp] DeserializeIdentity -> DEBU 4102 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4103 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4104 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4105 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [policies] Evaluate -> DEBU 4106 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [policies] Evaluate -> DEBU 4107 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [policies] Evaluate -> DEBU 4108 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [cauthdsl] func1 -> DEBU 4109 0xc002db40c0 gate 1556760709529809600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [cauthdsl] func2 -> DEBU 410a 0xc002db40c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [cauthdsl] func2 -> DEBU 410b 0xc002db40c0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:49.529 UTC [cauthdsl] func2 -> DEBU 410c 0xc002db40c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [cauthdsl] func2 -> DEBU 410d 0xc002db40c0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [cauthdsl] func1 -> DEBU 410e 0xc002db40c0 gate 1556760709529809600 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [policies] Evaluate -> DEBU 410f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [policies] Evaluate -> DEBU 4110 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [policies] Evaluate -> DEBU 4111 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [cauthdsl] func1 -> DEBU 4112 0xc002db4900 gate 1556760709530414500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [cauthdsl] func2 -> DEBU 4113 0xc002db4900 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [cauthdsl] func2 -> DEBU 4114 0xc002db4900 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [cauthdsl] func2 -> DEBU 4115 0xc002db4900 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [msp.identity] Verify -> DEBU 4116 Verify: digest = 00000000 de 09 8f 01 3a cd ca 09 fb 79 7e 27 91 89 a1 bd |....:....y~'....| -peer0.org1.example.com | 00000010 a6 35 9c de e8 1e f6 4c 74 66 22 e6 37 45 0d a3 |.5.....Ltf".7E..|" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [msp.identity] Verify -> DEBU 4117 Verify: sig = 00000000 30 44 02 20 3b fd e7 76 22 57 40 76 05 0f 95 0f |0D. ;..v"W@v....| -peer0.org1.example.com | 00000010 6e d8 80 8e 74 a2 eb 95 7e 02 75 de dc 18 73 d6 |n...t...~.u...s.| -peer0.org1.example.com | 00000020 54 07 9f bd 02 20 69 4f 8d 6f 05 09 aa 42 62 69 |T.... iO.o...Bbi| -peer0.org1.example.com | 00000030 ce cf 6f 7f 77 07 aa 85 64 fe e7 49 4e 52 cc ad |..o.w...d..INR..| -peer0.org1.example.com | 00000040 f5 cd d9 ba b4 0f |......|" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [cauthdsl] func2 -> DEBU 4118 0xc002db4900 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:49.530 UTC [cauthdsl] func1 -> DEBU 4119 0xc002db4900 gate 1556760709530414500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [policies] Evaluate -> DEBU 411a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [policies] Evaluate -> DEBU 411b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [policies] Evaluate -> DEBU 411c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [policies] Evaluate -> DEBU 411d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [gossip.discovery] handleAliveMessage -> DEBU 411e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 411f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 4120 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 " -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 4121 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 " -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 4122 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 4123 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [gossip.discovery] handleAliveMessage -> DEBU 4124 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4125 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [gossip.discovery] sendMemResponse -> DEBU 4126 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [msp] DeserializeIdentity -> DEBU 4127 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [msp] DeserializeIdentity -> DEBU 4128 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [msp] DeserializeIdentity -> DEBU 4129 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.531 UTC [gossip.comm] Send -> DEBU 412a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:49.532 UTC [gossip.discovery] sendMemResponse -> DEBU 412b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:49.532 UTC [gossip.comm] sendToEndpoint -> DEBU 412c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.532 UTC [gossip.comm] sendToEndpoint -> DEBU 412d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.537 UTC [gossip.comm] func1 -> DEBU 412e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.545 UTC [gossip.gossip] handleMessage -> DEBU 412f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.546 UTC [msp] DeserializeIdentity -> DEBU 4130 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.546 UTC [msp] DeserializeIdentity -> DEBU 4131 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.546 UTC [msp] DeserializeIdentity -> DEBU 4132 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.546 UTC [gossip.gossip] handleMessage -> DEBU 4133 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.727 UTC [gossip.comm] func1 -> DEBU 4134 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.727 UTC [gossip.gossip] handleMessage -> DEBU 4135 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.727 UTC [gossip.pull] HandleMessage -> DEBU 4136 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 4137 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 4138 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 4139 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 413a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 413b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 413c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.728 UTC [gossip.pull] SendDigest -> DEBU 413d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:49.728 UTC [gossip.gossip] handleMessage -> DEBU 413e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.822 UTC [gossip.pull] Hello -> DEBU 413f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.comm] Send -> DEBU 4140 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.pull] Hello -> DEBU 4141 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.comm] Send -> DEBU 4142 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.pull] Hello -> DEBU 4143 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.comm] Send -> DEBU 4144 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4145 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4146 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4147 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4148 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4149 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 414a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.824 UTC [gossip.comm] func1 -> DEBU 414b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4387236346447735438 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.824 UTC [gossip.gossip] handleMessage -> DEBU 414c Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4387236346447735438 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.824 UTC [gossip.pull] HandleMessage -> DEBU 414d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4387236346447735438 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.824 UTC [gossip.gossip] handleMessage -> DEBU 414e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.826 UTC [gossip.comm] func1 -> DEBU 414f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15994013751313223387 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.826 UTC [gossip.gossip] handleMessage -> DEBU 4150 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15994013751313223387 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.826 UTC [gossip.pull] HandleMessage -> DEBU 4151 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15994013751313223387 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.826 UTC [gossip.gossip] handleMessage -> DEBU 4152 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.827 UTC [gossip.comm] func1 -> DEBU 4153 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2107182319970799500 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.827 UTC [gossip.gossip] handleMessage -> DEBU 4154 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2107182319970799500 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.827 UTC [gossip.pull] HandleMessage -> DEBU 4155 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2107182319970799500 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.827 UTC [gossip.gossip] handleMessage -> DEBU 4156 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [gossip.comm] func1 -> DEBU 4157 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [gossip.gossip] handleMessage -> DEBU 4158 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [gossip.gossip] handleMessage -> DEBU 4159 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 415a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 415b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [msp] DeserializeIdentity -> DEBU 415c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 415d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 415e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 415f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [policies] Evaluate -> DEBU 4160 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [policies] Evaluate -> DEBU 4161 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [policies] Evaluate -> DEBU 4162 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [cauthdsl] func1 -> DEBU 4163 0xc002e8ce40 gate 1556760709876835800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [cauthdsl] func2 -> DEBU 4164 0xc002e8ce40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [cauthdsl] func2 -> DEBU 4165 0xc002e8ce40 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:49.876 UTC [cauthdsl] func2 -> DEBU 4166 0xc002e8ce40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:49.877 UTC [cauthdsl] func2 -> DEBU 4167 0xc002e8ce40 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:49.877 UTC [cauthdsl] func1 -> DEBU 4168 0xc002e8ce40 gate 1556760709876835800 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:49.877 UTC [policies] Evaluate -> DEBU 4169 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.877 UTC [policies] Evaluate -> DEBU 416a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.877 UTC [policies] Evaluate -> DEBU 416b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:49.877 UTC [cauthdsl] func1 -> DEBU 416c 0xc002e8d730 gate 1556760709877180400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:49.877 UTC [cauthdsl] func2 -> DEBU 416d 0xc002e8d730 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:49.877 UTC [cauthdsl] func2 -> DEBU 416e 0xc002e8d730 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:49.877 UTC [cauthdsl] func2 -> DEBU 416f 0xc002e8d730 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:49.877 UTC [msp.identity] Verify -> DEBU 4170 Verify: digest = 00000000 cc 7d 1c b7 83 49 b3 1e 12 82 b5 98 1c 78 a0 44 |.}...I.......x.D| -peer0.org1.example.com | 00000010 49 c8 a6 29 38 12 d1 0b b9 db 8a f8 41 5d 88 1b |I..)8.......A]..|" -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [msp.identity] Verify -> DEBU 4171 Verify: sig = 00000000 30 44 02 20 01 00 5c 8b 0b 5d e6 4d 9a 64 c6 59 |0D. ..\..].M.d.Y| -peer0.org1.example.com | 00000010 fe 6f 95 b8 08 18 e8 f2 0a dc 9e 67 48 b3 14 d2 |.o.........gH...| -peer0.org1.example.com | 00000020 4f 17 35 a9 02 20 38 bd e4 f0 b4 c8 c7 7c 67 a6 |O.5.. 8......|g.| -peer0.org1.example.com | 00000030 0b 4b 77 07 0e 99 97 9c cf a7 e5 eb 73 f9 7a ce |.Kw.........s.z.| -peer0.org1.example.com | 00000040 a7 ca aa 01 8b d5 |......|" -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [cauthdsl] func2 -> DEBU 4172 0xc002e8d730 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [cauthdsl] func1 -> DEBU 4173 0xc002e8d730 gate 1556760709877180400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [policies] Evaluate -> DEBU 4174 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [policies] Evaluate -> DEBU 4175 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [policies] Evaluate -> DEBU 4176 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [policies] Evaluate -> DEBU 4177 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 4178 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 4179 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 417a updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 " -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 417b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 " -peer0.org1.example.com | "2019-05-02 01:31:49.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 417c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 417d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 417e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 417f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [gossip.discovery] sendMemResponse -> DEBU 4180 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [msp] DeserializeIdentity -> DEBU 4181 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [msp] DeserializeIdentity -> DEBU 4182 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [msp] DeserializeIdentity -> DEBU 4183 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [gossip.comm] Send -> DEBU 4184 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [gossip.discovery] sendMemResponse -> DEBU 4185 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4186 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:49.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4187 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.160 UTC [msp.identity] Sign -> DEBU 4188 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151031 " -peer0.org1.example.com | "2019-05-02 01:31:50.161 UTC [msp.identity] Sign -> DEBU 4189 Sign: digest: DD14DBD5976CB835A3176C7CA3C4F19CB8296A075155C2CEE2EE70FC620FF0DB " -peer0.org1.example.com | "2019-05-02 01:31:50.161 UTC [msp.identity] Sign -> DEBU 418a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:50.161 UTC [msp.identity] Sign -> DEBU 418b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:50.161 UTC [msp] DeserializeIdentity -> DEBU 418c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:50.162 UTC [gossip.comm] Send -> DEBU 418d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:50.162 UTC [gossip.comm] Send -> DEBU 418e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:50.162 UTC [msp] DeserializeIdentity -> DEBU 418f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:50.162 UTC [gossip.comm] Send -> DEBU 4190 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4191 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4192 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4193 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4194 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4195 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4196 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.165 UTC [gossip.comm] func1 -> DEBU 4197 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.166 UTC [gossip.gossip] handleMessage -> DEBU 4198 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.166 UTC [gossip.gossip] handleMessage -> DEBU 4199 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 419a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 419b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:50.166 UTC [msp.identity] Verify -> DEBU 419c Verify: digest = 00000000 dd 14 db d5 97 6c b8 35 a3 17 6c 7c a3 c4 f1 9c |.....l.5..l|....| -peer0.org1.example.com | 00000010 b8 29 6a 07 51 55 c2 ce e2 ee 70 fc 62 0f f0 db |.)j.QU....p.b...|" -peer0.org1.example.com | "2019-05-02 01:31:50.166 UTC [msp.identity] Verify -> DEBU 419d Verify: sig = 00000000 30 45 02 21 00 ba 03 89 e3 75 f3 ad 88 45 cb a3 |0E.!.....u...E..| -peer0.org1.example.com | 00000010 f8 a4 68 e6 83 8a 05 44 41 32 d0 ab 30 07 26 a7 |..h....DA2..0.&.| -peer0.org1.example.com | 00000020 19 bc a3 c4 50 02 20 47 be 23 ab 16 1d 40 23 39 |....P. G.#...@#9| -peer0.org1.example.com | 00000030 6d 36 f6 9e db a4 f3 6b 80 58 72 b5 d8 af 32 12 |m6.....k.Xr...2.| -peer0.org1.example.com | 00000040 d1 28 ab 2f f2 2a 1b |.(./.*.|" -peer0.org1.example.com | "2019-05-02 01:31:50.166 UTC [gossip.comm] func1 -> DEBU 419e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.167 UTC [gossip.gossip] handleMessage -> DEBU 419f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.167 UTC [msp.identity] Verify -> DEBU 41a0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:50.167 UTC [msp.identity] Verify -> DEBU 41a1 Verify: sig = 00000000 30 45 02 21 00 ae 91 e7 bf ff a8 1e 8c 93 fd 5e |0E.!...........^| -peer0.org1.example.com | 00000010 c8 89 5f ba 1b 14 17 fc 5b 46 7d df 5c b2 e9 42 |.._.....[F}.\..B| -peer0.org1.example.com | 00000020 19 cb d3 92 dd 02 20 10 c4 a5 e4 3d 5e 7b f5 92 |...... ....=^{..| -peer0.org1.example.com | 00000030 6a 02 dd bd 6a fd 98 ae 76 c1 a0 37 a8 0a be 62 |j...j...v..7...b| -peer0.org1.example.com | 00000040 69 e7 5a fb 74 88 80 |i.Z.t..|" -peer0.org1.example.com | "2019-05-02 01:31:50.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 41a2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.167 UTC [gossip.discovery] isSentByMe -> DEBU 41a3 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 41a4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41a5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.172 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41a7 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:50.172 UTC [msp] DeserializeIdentity -> DEBU 41a8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41aa Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ab Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [cauthdsl] func1 -> DEBU 41af 0xc002f4d1e0 gate 1556760710173422500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41b0 0xc002f4d1e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41b1 0xc002f4d1e0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41b2 0xc002f4d1e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41b3 0xc002f4d1e0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [cauthdsl] func1 -> DEBU 41b4 0xc002f4d1e0 gate 1556760710173422500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41b5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [cauthdsl] func1 -> DEBU 41b8 0xc002f4da60 gate 1556760710173846700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41b9 0xc002f4da60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41ba 0xc002f4da60 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:50.174 UTC [cauthdsl] func2 -> DEBU 41bb 0xc002f4da60 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:50.174 UTC [msp.identity] Verify -> DEBU 41bc Verify: digest = 00000000 de 09 8f 01 3a cd ca 09 fb 79 7e 27 91 89 a1 bd |....:....y~'....| -peer0.org1.example.com | 00000010 a6 35 9c de e8 1e f6 4c 74 66 22 e6 37 45 0d a3 |.5.....Ltf".7E..|" -peer0.org1.example.com | "2019-05-02 01:31:50.174 UTC [msp.identity] Verify -> DEBU 41bd Verify: sig = 00000000 30 44 02 20 3b fd e7 76 22 57 40 76 05 0f 95 0f |0D. ;..v"W@v....| -peer0.org1.example.com | 00000010 6e d8 80 8e 74 a2 eb 95 7e 02 75 de dc 18 73 d6 |n...t...~.u...s.| -peer0.org1.example.com | 00000020 54 07 9f bd 02 20 69 4f 8d 6f 05 09 aa 42 62 69 |T.... iO.o...Bbi| -peer0.org1.example.com | 00000030 ce cf 6f 7f 77 07 aa 85 64 fe e7 49 4e 52 cc ad |..o.w...d..INR..| -peer0.org1.example.com | 00000040 f5 cd d9 ba b4 0f |......|" -peer0.org1.example.com | "2019-05-02 01:31:50.174 UTC [cauthdsl] func2 -> DEBU 41be 0xc002f4da60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:50.174 UTC [gossip.gossip] handleMessage -> DEBU 41bf Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.174 UTC [gossip.comm] func1 -> DEBU 41c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.174 UTC [gossip.gossip] handleMessage -> DEBU 41c1 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.174 UTC [cauthdsl] func1 -> DEBU 41c2 0xc002f4da60 gate 1556760710173846700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:50.175 UTC [policies] Evaluate -> DEBU 41c3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.175 UTC [policies] Evaluate -> DEBU 41c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.175 UTC [policies] Evaluate -> DEBU 41c5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.175 UTC [policies] Evaluate -> DEBU 41c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 41c7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 41c8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.176 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41c9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:50.182 UTC [msp.identity] Verify -> DEBU 41ca Verify: digest = 00000000 dd 14 db d5 97 6c b8 35 a3 17 6c 7c a3 c4 f1 9c |.....l.5..l|....| -peer0.org1.example.com | 00000010 b8 29 6a 07 51 55 c2 ce e2 ee 70 fc 62 0f f0 db |.)j.QU....p.b...|" -peer0.org1.example.com | "2019-05-02 01:31:50.182 UTC [msp.identity] Verify -> DEBU 41cb Verify: sig = 00000000 30 45 02 21 00 ba 03 89 e3 75 f3 ad 88 45 cb a3 |0E.!.....u...E..| -peer0.org1.example.com | 00000010 f8 a4 68 e6 83 8a 05 44 41 32 d0 ab 30 07 26 a7 |..h....DA2..0.&.| -peer0.org1.example.com | 00000020 19 bc a3 c4 50 02 20 47 be 23 ab 16 1d 40 23 39 |....P. G.#...@#9| -peer0.org1.example.com | 00000030 6d 36 f6 9e db a4 f3 6b 80 58 72 b5 d8 af 32 12 |m6.....k.Xr...2.| -peer0.org1.example.com | 00000040 d1 28 ab 2f f2 2a 1b |.(./.*.|" -peer0.org1.example.com | "2019-05-02 01:31:50.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 41cc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.183 UTC [gossip.discovery] isSentByMe -> DEBU 41cd Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 41ce Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41cf Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:50.183 UTC [msp.identity] Verify -> DEBU 41d0 Verify: digest = 00000000 1e 39 81 c1 ec ca e7 23 8e 01 5e 62 9f 7c d0 4e |.9.....#..^b.|.N| -peer0.org1.example.com | 00000010 e3 17 0a 6f a7 a7 d9 7e 59 c8 f5 dd 63 85 3d 1e |...o...~Y...c.=.|" -peer0.org1.example.com | "2019-05-02 01:31:50.183 UTC [msp.identity] Verify -> DEBU 41d1 Verify: sig = 00000000 30 44 02 20 53 2d af 96 8b 4e 76 73 31 bd eb 4e |0D. S-...Nvs1..N| -peer0.org1.example.com | 00000010 83 6a 14 c8 c7 84 3d c5 56 1e 1f 26 4a c9 4b 5a |.j....=.V..&J.KZ| -peer0.org1.example.com | 00000020 48 0f 5d 13 02 20 08 cb a3 7f 67 34 e8 2f f1 c2 |H.].. ....g4./..| -peer0.org1.example.com | 00000030 4b b4 04 df d9 62 75 c8 d1 5b d2 c9 48 05 4a 2a |K....bu..[..H.J*| -peer0.org1.example.com | 00000040 53 2b b7 f6 7b 98 |S+..{.|" -peer0.org1.example.com | "2019-05-02 01:31:50.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 41d2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 41d3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41d4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41d5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.184 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41d6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:50.184 UTC [gossip.gossip] handleMessage -> DEBU 41d7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.185 UTC [msp.identity] Verify -> DEBU 41d8 Verify: digest = 00000000 dd 14 db d5 97 6c b8 35 a3 17 6c 7c a3 c4 f1 9c |.....l.5..l|....| -peer0.org1.example.com | 00000010 b8 29 6a 07 51 55 c2 ce e2 ee 70 fc 62 0f f0 db |.)j.QU....p.b...|" -peer0.org1.example.com | "2019-05-02 01:31:50.185 UTC [msp.identity] Verify -> DEBU 41d9 Verify: sig = 00000000 30 45 02 21 00 ba 03 89 e3 75 f3 ad 88 45 cb a3 |0E.!.....u...E..| -peer0.org1.example.com | 00000010 f8 a4 68 e6 83 8a 05 44 41 32 d0 ab 30 07 26 a7 |..h....DA2..0.&.| -peer0.org1.example.com | 00000020 19 bc a3 c4 50 02 20 47 be 23 ab 16 1d 40 23 39 |....P. G.#...@#9| -peer0.org1.example.com | 00000030 6d 36 f6 9e db a4 f3 6b 80 58 72 b5 d8 af 32 12 |m6.....k.Xr...2.| -peer0.org1.example.com | 00000040 d1 28 ab 2f f2 2a 1b |.(./.*.|" -peer0.org1.example.com | "2019-05-02 01:31:50.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 41da Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.185 UTC [gossip.discovery] isSentByMe -> DEBU 41db Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 41dc Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.186 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41dd Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:50.186 UTC [msp.identity] Verify -> DEBU 41de Verify: digest = 00000000 1e 39 81 c1 ec ca e7 23 8e 01 5e 62 9f 7c d0 4e |.9.....#..^b.|.N| -peer0.org1.example.com | 00000010 e3 17 0a 6f a7 a7 d9 7e 59 c8 f5 dd 63 85 3d 1e |...o...~Y...c.=.|" -peer0.org1.example.com | "2019-05-02 01:31:50.186 UTC [msp.identity] Verify -> DEBU 41df Verify: sig = 00000000 30 44 02 20 53 2d af 96 8b 4e 76 73 31 bd eb 4e |0D. S-...Nvs1..N| -peer0.org1.example.com | 00000010 83 6a 14 c8 c7 84 3d c5 56 1e 1f 26 4a c9 4b 5a |.j....=.V..&J.KZ| -peer0.org1.example.com | 00000020 48 0f 5d 13 02 20 08 cb a3 7f 67 34 e8 2f f1 c2 |H.].. ....g4./..| -peer0.org1.example.com | 00000030 4b b4 04 df d9 62 75 c8 d1 5b d2 c9 48 05 4a 2a |K....bu..[..H.J*| -peer0.org1.example.com | 00000040 53 2b b7 f6 7b 98 |S+..{.|" -peer0.org1.example.com | "2019-05-02 01:31:50.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 41e0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 41e1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41e2 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:50.187 UTC [msp] DeserializeIdentity -> DEBU 41e3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:50.188 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41e4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:50.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41e5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:50.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41e6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:50.190 UTC [policies] Evaluate -> DEBU 41e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:50.190 UTC [policies] Evaluate -> DEBU 41e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:50.191 UTC [policies] Evaluate -> DEBU 41e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:50.191 UTC [cauthdsl] func1 -> DEBU 41ea 0xc0030de470 gate 1556760710191303400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:50.191 UTC [cauthdsl] func2 -> DEBU 41eb 0xc0030de470 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:50.191 UTC [cauthdsl] func2 -> DEBU 41ec 0xc0030de470 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:50.191 UTC [cauthdsl] func2 -> DEBU 41ed 0xc0030de470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:50.191 UTC [cauthdsl] func2 -> DEBU 41ee 0xc0030de470 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:50.191 UTC [cauthdsl] func1 -> DEBU 41ef 0xc0030de470 gate 1556760710191303400 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:50.192 UTC [policies] Evaluate -> DEBU 41f0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.192 UTC [policies] Evaluate -> DEBU 41f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.192 UTC [policies] Evaluate -> DEBU 41f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:50.192 UTC [cauthdsl] func1 -> DEBU 41f3 0xc0030decb0 gate 1556760710192702400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:50.193 UTC [cauthdsl] func2 -> DEBU 41f4 0xc0030decb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:50.193 UTC [cauthdsl] func2 -> DEBU 41f5 0xc0030decb0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:50.193 UTC [cauthdsl] func2 -> DEBU 41f6 0xc0030decb0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:50.194 UTC [msp.identity] Verify -> DEBU 41f7 Verify: digest = 00000000 cc 7d 1c b7 83 49 b3 1e 12 82 b5 98 1c 78 a0 44 |.}...I.......x.D| -peer0.org1.example.com | 00000010 49 c8 a6 29 38 12 d1 0b b9 db 8a f8 41 5d 88 1b |I..)8.......A]..|" -peer0.org1.example.com | "2019-05-02 01:31:50.194 UTC [msp.identity] Verify -> DEBU 41f8 Verify: sig = 00000000 30 44 02 20 01 00 5c 8b 0b 5d e6 4d 9a 64 c6 59 |0D. ..\..].M.d.Y| -peer0.org1.example.com | 00000010 fe 6f 95 b8 08 18 e8 f2 0a dc 9e 67 48 b3 14 d2 |.o.........gH...| -peer0.org1.example.com | 00000020 4f 17 35 a9 02 20 38 bd e4 f0 b4 c8 c7 7c 67 a6 |O.5.. 8......|g.| -peer0.org1.example.com | 00000030 0b 4b 77 07 0e 99 97 9c cf a7 e5 eb 73 f9 7a ce |.Kw.........s.z.| -peer0.org1.example.com | 00000040 a7 ca aa 01 8b d5 |......|" -peer0.org1.example.com | "2019-05-02 01:31:50.194 UTC [cauthdsl] func2 -> DEBU 41f9 0xc0030decb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:50.194 UTC [cauthdsl] func1 -> DEBU 41fa 0xc0030decb0 gate 1556760710192702400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:50.194 UTC [policies] Evaluate -> DEBU 41fb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.194 UTC [policies] Evaluate -> DEBU 41fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.194 UTC [policies] Evaluate -> DEBU 41fd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.194 UTC [policies] Evaluate -> DEBU 41fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:50.194 UTC [gossip.discovery] handleAliveMessage -> DEBU 41ff Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:50.194 UTC [gossip.discovery] handleAliveMessage -> DEBU 4200 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:50.196 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4201 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:51.512 UTC [endorser] ProcessProposal -> DEBU 4202 Entering: request from 192.168.240.9:41476" -peer0.org1.example.com | "2019-05-02 01:31:51.512 UTC [protoutils] ValidateProposalMessage -> DEBU 4203 ValidateProposalMessage starts for signed proposal 0xc000221a40" -peer0.org1.example.com | "2019-05-02 01:31:51.513 UTC [protoutils] validateChannelHeader -> DEBU 4204 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:51.513 UTC [protoutils] checkSignatureFromCreator -> DEBU 4205 begin" -peer0.org1.example.com | "2019-05-02 01:31:51.513 UTC [protoutils] checkSignatureFromCreator -> DEBU 4206 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:51.514 UTC [protoutils] checkSignatureFromCreator -> DEBU 4207 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:51.515 UTC [msp.identity] Verify -> DEBU 4208 Verify: digest = 00000000 ff b0 f3 3d 54 db f5 a9 d3 09 b2 d0 c1 3a 3d 10 |...=T........:=.| -peer0.org1.example.com | 00000010 1f df f6 e9 1a f1 d4 1a dd 43 b9 f0 a3 3b 03 ed |.........C...;..|" -peer0.org1.example.com | "2019-05-02 01:31:51.515 UTC [msp.identity] Verify -> DEBU 4209 Verify: sig = 00000000 30 45 02 21 00 cc 96 d9 36 e5 ec 0d bc 9b b0 6c |0E.!....6......l| -peer0.org1.example.com | 00000010 8a 01 d6 73 2f 1a d1 3b 8d ca 16 b0 c5 a2 04 f1 |...s/..;........| -peer0.org1.example.com | 00000020 37 5e fc c9 40 02 20 4b b8 c6 73 d9 5a 17 f6 28 |7^..@. K..s.Z..(| -peer0.org1.example.com | 00000030 ab 1c fc 66 1c a9 8c 63 a3 0f 6e 09 b2 0d 57 d7 |...f...c..n...W.| -peer0.org1.example.com | 00000040 04 4e f5 99 b4 0c 13 |.N.....|" -peer0.org1.example.com | "2019-05-02 01:31:51.516 UTC [protoutils] checkSignatureFromCreator -> DEBU 420a exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:51.516 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 420b validateChaincodeProposalMessage starts for proposal 0xc00250f730, header 0xc000221ef0" -peer0.org1.example.com | "2019-05-02 01:31:51.516 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 420c validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:51.517 UTC [endorser] preProcess -> DEBU 420d [][af15c022] processing txid: af15c022d4a12b6b8096b31879eaeb693027c4c8f920c7a96305b85df4ae3f8f" -peer0.org1.example.com | "2019-05-02 01:31:51.517 UTC [endorser] SimulateProposal -> DEBU 420e [][af15c022] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:51.518 UTC [endorser] callChaincode -> INFO 420f [][af15c022] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-05-02 01:31:51.518 UTC [chaincode] Execute -> DEBU 4210 Entry" -peer0.org1.example.com | "2019-05-02 01:31:51.519 UTC [cscc] Invoke -> DEBU 4211 Invoke function: GetChannels" -peer0.org1.example.com | "2019-05-02 01:31:51.519 UTC [msp.identity] Verify -> DEBU 4212 Verify: digest = 00000000 ff b0 f3 3d 54 db f5 a9 d3 09 b2 d0 c1 3a 3d 10 |...=T........:=.| -peer0.org1.example.com | 00000010 1f df f6 e9 1a f1 d4 1a dd 43 b9 f0 a3 3b 03 ed |.........C...;..|" -peer0.org1.example.com | "2019-05-02 01:31:51.519 UTC [msp.identity] Verify -> DEBU 4213 Verify: sig = 00000000 30 45 02 21 00 cc 96 d9 36 e5 ec 0d bc 9b b0 6c |0E.!....6......l| -peer0.org1.example.com | 00000010 8a 01 d6 73 2f 1a d1 3b 8d ca 16 b0 c5 a2 04 f1 |...s/..;........| -peer0.org1.example.com | 00000020 37 5e fc c9 40 02 20 4b b8 c6 73 d9 5a 17 f6 28 |7^..@. K..s.Z..(| -peer0.org1.example.com | 00000030 ab 1c fc 66 1c a9 8c 63 a3 0f 6e 09 b2 0d 57 d7 |...f...c..n...W.| -peer0.org1.example.com | 00000040 04 4e f5 99 b4 0c 13 |.N.....|" -peer0.org1.example.com | "2019-05-02 01:31:51.520 UTC [chaincode] handleMessage -> DEBU 4214 [af15c022] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:51.520 UTC [chaincode] Notify -> DEBU 4215 [af15c022] notifying Txid:af15c022d4a12b6b8096b31879eaeb693027c4c8f920c7a96305b85df4ae3f8f, channelID:" -peer0.org1.example.com | "2019-05-02 01:31:51.521 UTC [chaincode] Execute -> DEBU 4216 Exit" -peer0.org1.example.com | "2019-05-02 01:31:51.521 UTC [endorser] callChaincode -> INFO 4217 [][af15c022] Exit chaincode: name:"cscc" (3ms)" -peer0.org1.example.com | "2019-05-02 01:31:51.522 UTC [endorser] SimulateProposal -> DEBU 4218 [][af15c022] Exit" -peer0.org1.example.com | "2019-05-02 01:31:51.522 UTC [endorser] func1 -> DEBU 4219 Exit: request from 192.168.240.9:41476" -peer0.org1.example.com | "2019-05-02 01:31:51.522 UTC [comm.grpc.server] 1 -> INFO 421a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41476 grpc.code=OK grpc.call_duration=10.843ms -peer0.org1.example.com | "2019-05-02 01:31:51.527 UTC [grpc] warningf -> DEBU 421b transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41476: read: connection reset by peer" -peer0.org1.example.com | "2019-05-02 01:31:51.528 UTC [grpc] infof -> DEBU 421c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:51.960 UTC [gossip.election] waitForInterrupt -> DEBU 421d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-05-02 01:31:51.960 UTC [gossip.election] IsLeader -> DEBU 421e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-05-02 01:31:51.960 UTC [msp.identity] Sign -> DEBU 421f Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100F1801 " -peer0.org1.example.com | "2019-05-02 01:31:51.960 UTC [msp.identity] Sign -> DEBU 4220 Sign: digest: 94E39DE12A2D07B6D6FBE3153788EBF37E3CFC28735E80DE70F69E5F604A7DBC " -peer0.org1.example.com | "2019-05-02 01:31:51.960 UTC [gossip.election] waitForInterrupt -> DEBU 4221 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-05-02 01:31:51.968 UTC [msp] DeserializeIdentity -> DEBU 4222 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:51.968 UTC [msp] DeserializeIdentity -> DEBU 4223 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:51.968 UTC [msp] DeserializeIdentity -> DEBU 4224 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:51.968 UTC [msp] DeserializeIdentity -> DEBU 4225 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:51.969 UTC [gossip.comm] Send -> DEBU 4226 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:51.969 UTC [gossip.comm] sendToEndpoint -> DEBU 4227 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:51.969 UTC [gossip.comm] sendToEndpoint -> DEBU 4228 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:51.969 UTC [msp] DeserializeIdentity -> DEBU 4229 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:51.970 UTC [msp] DeserializeIdentity -> DEBU 422a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.363 UTC [endorser] ProcessProposal -> DEBU 422b Entering: request from 192.168.240.9:41484" -peer0.org1.example.com | "2019-05-02 01:31:52.364 UTC [protoutils] ValidateProposalMessage -> DEBU 422c ValidateProposalMessage starts for signed proposal 0xc0025298b0" -peer0.org1.example.com | "2019-05-02 01:31:52.364 UTC [protoutils] validateChannelHeader -> DEBU 422d validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-05-02 01:31:52.365 UTC [protoutils] checkSignatureFromCreator -> DEBU 422e begin" -peer0.org1.example.com | "2019-05-02 01:31:52.365 UTC [protoutils] checkSignatureFromCreator -> DEBU 422f creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-05-02 01:31:52.366 UTC [protoutils] checkSignatureFromCreator -> DEBU 4230 creator is valid" -peer0.org1.example.com | "2019-05-02 01:31:52.366 UTC [msp.identity] Verify -> DEBU 4231 Verify: digest = 00000000 ba b7 4a 61 a1 7b 2d aa 77 57 7a d7 29 d2 42 4d |..Ja.{-.wWz.).BM| -peer0.org1.example.com | 00000010 83 6d 33 15 6f bf d0 04 45 56 ee 8d b9 cb 0c 63 |.m3.o...EV.....c|" -peer0.org1.example.com | "2019-05-02 01:31:52.367 UTC [msp.identity] Verify -> DEBU 4232 Verify: sig = 00000000 30 45 02 21 00 a8 2e 14 c1 c8 9e 43 8b e5 52 a4 |0E.!.......C..R.| -peer0.org1.example.com | 00000010 1c 47 47 c9 b3 19 b6 90 1a 0a b7 fe cc 3a 64 9e |.GG..........:d.| -peer0.org1.example.com | 00000020 fe c5 65 6a 32 02 20 31 75 8b 98 27 94 78 e2 af |..ej2. 1u..'.x..| -peer0.org1.example.com | 00000030 6f cc 1b 78 c3 01 89 69 f7 34 53 fc a8 2c 9c 5b |o..x...i.4S..,.[| -peer0.org1.example.com | 00000040 26 c4 e7 63 07 8e 0d |&..c...|" -peer0.org1.example.com | "2019-05-02 01:31:52.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 4233 exits successfully" -peer0.org1.example.com | "2019-05-02 01:31:52.368 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4234 validateChaincodeProposalMessage starts for proposal 0xc00261a310, header 0xc002529d10" -peer0.org1.example.com | "2019-05-02 01:31:52.368 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4235 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:52.369 UTC [endorser] preProcess -> DEBU 4236 [][d840b7d0] processing txid: d840b7d0d97dc9b40ee14cf4f849c5190c9285a2da87b394cd8e371e51aad756" -peer0.org1.example.com | "2019-05-02 01:31:52.370 UTC [endorser] SimulateProposal -> DEBU 4237 [][d840b7d0] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:52.370 UTC [endorser] callChaincode -> INFO 4238 [][d840b7d0] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-05-02 01:31:52.370 UTC [chaincode] Execute -> DEBU 4239 Entry" -peer0.org1.example.com | "2019-05-02 01:31:52.371 UTC [qscc] Invoke -> DEBU 423a Invoke function: GetChainInfo on chain: businesschannel" -peer0.org1.example.com | "2019-05-02 01:31:52.371 UTC [aclmgmt] CheckACL -> DEBU 423b acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -peer0.org1.example.com | "2019-05-02 01:31:52.372 UTC [aclmgmt] CheckACL -> DEBU 423c acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-05-02 01:31:52.372 UTC [policies] Evaluate -> DEBU 423d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.372 UTC [policies] Evaluate -> DEBU 423e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:52.372 UTC [policies] Evaluate -> DEBU 423f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.373 UTC [msp] DeserializeIdentity -> DEBU 4240 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.373 UTC [msp.identity] newIdentity -> DEBU 4241 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-05-02 01:31:52.374 UTC [cauthdsl] func1 -> DEBU 4242 0xc003300da0 gate 1556760712374671300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.374 UTC [cauthdsl] func2 -> DEBU 4243 0xc003300da0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.374 UTC [cauthdsl] func2 -> DEBU 4244 0xc003300da0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.374 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4245 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-05-02 01:31:52.374 UTC [msp] Validate -> DEBU 4246 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-05-02 01:31:52.374 UTC [msp] getCertificationChain -> DEBU 4247 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [cauthdsl] func2 -> DEBU 4248 0xc003300da0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [msp.identity] Verify -> DEBU 4249 Verify: digest = 00000000 ba b7 4a 61 a1 7b 2d aa 77 57 7a d7 29 d2 42 4d |..Ja.{-.wWz.).BM| -peer0.org1.example.com | 00000010 83 6d 33 15 6f bf d0 04 45 56 ee 8d b9 cb 0c 63 |.m3.o...EV.....c|" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [msp.identity] Verify -> DEBU 424a Verify: sig = 00000000 30 45 02 21 00 a8 2e 14 c1 c8 9e 43 8b e5 52 a4 |0E.!.......C..R.| -peer0.org1.example.com | 00000010 1c 47 47 c9 b3 19 b6 90 1a 0a b7 fe cc 3a 64 9e |.GG..........:d.| -peer0.org1.example.com | 00000020 fe c5 65 6a 32 02 20 31 75 8b 98 27 94 78 e2 af |..ej2. 1u..'.x..| -peer0.org1.example.com | 00000030 6f cc 1b 78 c3 01 89 69 f7 34 53 fc a8 2c 9c 5b |o..x...i.4S..,.[| -peer0.org1.example.com | 00000040 26 c4 e7 63 07 8e 0d |&..c...|" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [cauthdsl] func2 -> DEBU 424b 0xc003300da0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [cauthdsl] func1 -> DEBU 424c 0xc003300da0 gate 1556760712374671300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [policies] Evaluate -> DEBU 424d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [policies] Evaluate -> DEBU 424e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [policies] Evaluate -> DEBU 424f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [policies] Evaluate -> DEBU 4250 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [chaincode] handleMessage -> DEBU 4251 [d840b7d0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-05-02 01:31:52.375 UTC [chaincode] Notify -> DEBU 4252 [d840b7d0] notifying Txid:d840b7d0d97dc9b40ee14cf4f849c5190c9285a2da87b394cd8e371e51aad756, channelID:" -peer0.org1.example.com | "2019-05-02 01:31:52.377 UTC [chaincode] Execute -> DEBU 4253 Exit" -peer0.org1.example.com | "2019-05-02 01:31:52.378 UTC [endorser] callChaincode -> INFO 4254 [][d840b7d0] Exit chaincode: name:"qscc" (8ms)" -peer0.org1.example.com | "2019-05-02 01:31:52.378 UTC [endorser] SimulateProposal -> DEBU 4255 [][d840b7d0] Exit" -peer0.org1.example.com | "2019-05-02 01:31:52.378 UTC [endorser] func1 -> DEBU 4256 Exit: request from 192.168.240.9:41484" -peer0.org1.example.com | "2019-05-02 01:31:52.379 UTC [comm.grpc.server] 1 -> INFO 4257 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41484 grpc.code=OK grpc.call_duration=16.3369ms -peer0.org1.example.com | "2019-05-02 01:31:52.384 UTC [grpc] infof -> DEBU 4258 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-05-02 01:31:52.786 UTC [msp] DeserializeIdentity -> DEBU 4259 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.786 UTC [msp] DeserializeIdentity -> DEBU 425a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.787 UTC [gossip.comm] Send -> DEBU 425b Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-05-02 01:31:52.787 UTC [gossip.comm] sendToEndpoint -> DEBU 425c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.788 UTC [gossip.comm] sendToEndpoint -> DEBU 425f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:52.788 UTC [gossip.comm] sendToEndpoint -> DEBU 425d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.790 UTC [gossip.comm] sendToEndpoint -> DEBU 4260 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:52.790 UTC [gossip.comm] func1 -> DEBU 4261 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.791 UTC [gossip.gossip] handleMessage -> DEBU 4262 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.788 UTC [gossip.comm] sendToEndpoint -> DEBU 425e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.793 UTC [gossip.comm] sendToEndpoint -> DEBU 4263 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:52.793 UTC [msp.identity] Verify -> DEBU 4264 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:52.795 UTC [gossip.comm] func1 -> DEBU 4265 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.795 UTC [gossip.comm] func1 -> DEBU 4266 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.796 UTC [msp.identity] Verify -> DEBU 4267 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:52.798 UTC [msp.identity] Verify -> DEBU 4268 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:52.798 UTC [msp.identity] Verify -> DEBU 4269 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:52.799 UTC [msp] DeserializeIdentity -> DEBU 426a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.800 UTC [msp] DeserializeIdentity -> DEBU 426b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.801 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 426c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:52.801 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 426d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 426e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.802 UTC [policies] Evaluate -> DEBU 426f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.803 UTC [policies] Evaluate -> DEBU 4270 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:52.803 UTC [policies] Evaluate -> DEBU 4271 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.804 UTC [cauthdsl] func1 -> DEBU 4272 0xc0033a2330 gate 1556760712804145100 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.804 UTC [cauthdsl] func2 -> DEBU 4273 0xc0033a2330 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.805 UTC [cauthdsl] func2 -> DEBU 4274 0xc0033a2330 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.805 UTC [cauthdsl] func2 -> DEBU 4275 0xc0033a2330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:52.806 UTC [cauthdsl] func2 -> DEBU 4276 0xc0033a2330 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.808 UTC [cauthdsl] func1 -> DEBU 4277 0xc0033a2330 gate 1556760712804145100 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.809 UTC [policies] Evaluate -> DEBU 4278 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.809 UTC [policies] Evaluate -> DEBU 4279 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.809 UTC [policies] Evaluate -> DEBU 427a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.809 UTC [cauthdsl] func1 -> DEBU 427b 0xc0033a2b70 gate 1556760712809832000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.810 UTC [cauthdsl] func2 -> DEBU 427c 0xc0033a2b70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.810 UTC [cauthdsl] func2 -> DEBU 427d 0xc0033a2b70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.810 UTC [cauthdsl] func2 -> DEBU 427e 0xc0033a2b70 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.810 UTC [msp.identity] Verify -> DEBU 427f Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:52.811 UTC [msp.identity] Verify -> DEBU 4280 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:52.811 UTC [cauthdsl] func2 -> DEBU 4281 0xc0033a2b70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.812 UTC [cauthdsl] func1 -> DEBU 4282 0xc0033a2b70 gate 1556760712809832000 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:52.812 UTC [policies] Evaluate -> DEBU 4283 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.812 UTC [policies] Evaluate -> DEBU 4284 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.812 UTC [policies] Evaluate -> DEBU 4285 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.813 UTC [policies] Evaluate -> DEBU 4286 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.813 UTC [msp] DeserializeIdentity -> DEBU 4287 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.813 UTC [msp] DeserializeIdentity -> DEBU 4288 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.814 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4289 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:52.814 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 428a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.814 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 428b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.815 UTC [policies] Evaluate -> DEBU 428c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.815 UTC [policies] Evaluate -> DEBU 428d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:52.815 UTC [policies] Evaluate -> DEBU 428e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.816 UTC [cauthdsl] func1 -> DEBU 428f 0xc00342c360 gate 1556760712816233000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.816 UTC [cauthdsl] func2 -> DEBU 4290 0xc00342c360 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.817 UTC [cauthdsl] func2 -> DEBU 4291 0xc00342c360 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.818 UTC [cauthdsl] func2 -> DEBU 4292 0xc00342c360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:52.819 UTC [cauthdsl] func2 -> DEBU 4293 0xc00342c360 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.821 UTC [cauthdsl] func1 -> DEBU 4294 0xc00342c360 gate 1556760712816233000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.823 UTC [policies] Evaluate -> DEBU 4295 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.823 UTC [policies] Evaluate -> DEBU 4296 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.823 UTC [policies] Evaluate -> DEBU 4297 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.824 UTC [cauthdsl] func1 -> DEBU 4298 0xc00342cba0 gate 1556760712823997800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.824 UTC [cauthdsl] func2 -> DEBU 4299 0xc00342cba0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.824 UTC [cauthdsl] func2 -> DEBU 429a 0xc00342cba0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.825 UTC [cauthdsl] func2 -> DEBU 429b 0xc00342cba0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.825 UTC [msp.identity] Verify -> DEBU 429c Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:52.825 UTC [msp.identity] Verify -> DEBU 429d Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:52.826 UTC [cauthdsl] func2 -> DEBU 429e 0xc00342cba0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.826 UTC [cauthdsl] func1 -> DEBU 429f 0xc00342cba0 gate 1556760712823997800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:52.827 UTC [policies] Evaluate -> DEBU 42a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.827 UTC [policies] Evaluate -> DEBU 42a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.828 UTC [policies] Evaluate -> DEBU 42a2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.828 UTC [policies] Evaluate -> DEBU 42a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.828 UTC [gossip.gossip] handleMessage -> DEBU 42a4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:52.829 UTC [gossip.gossip] handleMessage -> DEBU 42a5 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.829 UTC [msp] DeserializeIdentity -> DEBU 42a6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.830 UTC [msp] DeserializeIdentity -> DEBU 42a7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.832 UTC [msp] DeserializeIdentity -> DEBU 42a8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.832 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:52.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42aa Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42ab Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.834 UTC [policies] Evaluate -> DEBU 42ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.835 UTC [policies] Evaluate -> DEBU 42ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:52.835 UTC [policies] Evaluate -> DEBU 42ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.836 UTC [cauthdsl] func1 -> DEBU 42af 0xc0034b46b0 gate 1556760712835981600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.836 UTC [cauthdsl] func2 -> DEBU 42b0 0xc0034b46b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.836 UTC [cauthdsl] func2 -> DEBU 42b1 0xc0034b46b0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.836 UTC [cauthdsl] func2 -> DEBU 42b2 0xc0034b46b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:52.836 UTC [cauthdsl] func2 -> DEBU 42b3 0xc0034b46b0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.837 UTC [cauthdsl] func1 -> DEBU 42b4 0xc0034b46b0 gate 1556760712835981600 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.837 UTC [policies] Evaluate -> DEBU 42b5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.837 UTC [policies] Evaluate -> DEBU 42b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.837 UTC [policies] Evaluate -> DEBU 42b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.838 UTC [cauthdsl] func1 -> DEBU 42b8 0xc0034b4ef0 gate 1556760712838264200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.839 UTC [cauthdsl] func2 -> DEBU 42b9 0xc0034b4ef0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.839 UTC [cauthdsl] func2 -> DEBU 42ba 0xc0034b4ef0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.839 UTC [cauthdsl] func2 -> DEBU 42bb 0xc0034b4ef0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.840 UTC [msp.identity] Verify -> DEBU 42bc Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:52.841 UTC [msp.identity] Verify -> DEBU 42bd Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:52.842 UTC [cauthdsl] func2 -> DEBU 42be 0xc0034b4ef0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.842 UTC [cauthdsl] func1 -> DEBU 42bf 0xc0034b4ef0 gate 1556760712838264200 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:52.843 UTC [policies] Evaluate -> DEBU 42c0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.843 UTC [policies] Evaluate -> DEBU 42c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.843 UTC [policies] Evaluate -> DEBU 42c2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.850 UTC [policies] Evaluate -> DEBU 42c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.851 UTC [msp.identity] Verify -> DEBU 42c4 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:52.851 UTC [msp.identity] Verify -> DEBU 42c5 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:52.852 UTC [msp.identity] Verify -> DEBU 42c6 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:52.852 UTC [msp.identity] Verify -> DEBU 42c7 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:52.853 UTC [msp] DeserializeIdentity -> DEBU 42c8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.853 UTC [msp] DeserializeIdentity -> DEBU 42c9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.854 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42ca Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:52.854 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42cb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.854 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42cc Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.854 UTC [policies] Evaluate -> DEBU 42cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.854 UTC [policies] Evaluate -> DEBU 42ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:52.854 UTC [policies] Evaluate -> DEBU 42cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.855 UTC [cauthdsl] func1 -> DEBU 42d0 0xc0034dd580 gate 1556760712855331500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.856 UTC [cauthdsl] func2 -> DEBU 42d1 0xc0034dd580 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.856 UTC [cauthdsl] func2 -> DEBU 42d2 0xc0034dd580 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.857 UTC [cauthdsl] func2 -> DEBU 42d3 0xc0034dd580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:52.857 UTC [cauthdsl] func2 -> DEBU 42d4 0xc0034dd580 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.857 UTC [cauthdsl] func1 -> DEBU 42d5 0xc0034dd580 gate 1556760712855331500 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.857 UTC [policies] Evaluate -> DEBU 42d6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.857 UTC [policies] Evaluate -> DEBU 42d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.858 UTC [policies] Evaluate -> DEBU 42d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.867 UTC [cauthdsl] func1 -> DEBU 42d9 0xc0034ddde0 gate 1556760712859489800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.867 UTC [cauthdsl] func2 -> DEBU 42da 0xc0034ddde0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.867 UTC [cauthdsl] func2 -> DEBU 42db 0xc0034ddde0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.868 UTC [cauthdsl] func2 -> DEBU 42dc 0xc0034ddde0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.868 UTC [msp.identity] Verify -> DEBU 42dd Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:52.868 UTC [msp.identity] Verify -> DEBU 42de Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:52.869 UTC [cauthdsl] func2 -> DEBU 42df 0xc0034ddde0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.869 UTC [cauthdsl] func1 -> DEBU 42e0 0xc0034ddde0 gate 1556760712859489800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:52.869 UTC [policies] Evaluate -> DEBU 42e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.869 UTC [policies] Evaluate -> DEBU 42e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.870 UTC [policies] Evaluate -> DEBU 42e3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.870 UTC [policies] Evaluate -> DEBU 42e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.870 UTC [gossip.gossip] handleMessage -> DEBU 42e5 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:52.870 UTC [gossip.gossip] handleMessage -> DEBU 42e6 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.871 UTC [msp] DeserializeIdentity -> DEBU 42e7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [msp] DeserializeIdentity -> DEBU 42e8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [msp] DeserializeIdentity -> DEBU 42e9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42eb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42ec Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [policies] Evaluate -> DEBU 42ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [policies] Evaluate -> DEBU 42ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [policies] Evaluate -> DEBU 42ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [cauthdsl] func1 -> DEBU 42f0 0xc0033a1950 gate 1556760712878767400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [cauthdsl] func2 -> DEBU 42f1 0xc0033a1950 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [cauthdsl] func2 -> DEBU 42f2 0xc0033a1950 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [cauthdsl] func2 -> DEBU 42f3 0xc0033a1950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [cauthdsl] func2 -> DEBU 42f4 0xc0033a1950 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.878 UTC [cauthdsl] func1 -> DEBU 42f5 0xc0033a1950 gate 1556760712878767400 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 42f6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 42f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 42f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [cauthdsl] func1 -> DEBU 42f9 0xc004414190 gate 1556760712879172800 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [cauthdsl] func2 -> DEBU 42fa 0xc004414190 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [cauthdsl] func2 -> DEBU 42fb 0xc004414190 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [cauthdsl] func2 -> DEBU 42fc 0xc004414190 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [msp.identity] Verify -> DEBU 42fd Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -peer0.org1.example.com | 00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [msp.identity] Verify -> DEBU 42fe Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -peer0.org1.example.com | 00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -peer0.org1.example.com | 00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -peer0.org1.example.com | 00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -peer0.org1.example.com | 00000040 23 bc fd 95 3a 13 |#...:.|" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [cauthdsl] func2 -> DEBU 42ff 0xc004414190 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [cauthdsl] func1 -> DEBU 4300 0xc004414190 gate 1556760712879172800 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 4301 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 4302 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 4303 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 4304 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.880 UTC [msp.identity] Verify -> DEBU 4305 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -peer0.org1.example.com | 00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -peer0.org1.example.com | "2019-05-02 01:31:52.880 UTC [msp.identity] Verify -> DEBU 4306 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -peer0.org1.example.com | 00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -peer0.org1.example.com | 00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -peer0.org1.example.com | 00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -peer0.org1.example.com | 00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -peer0.org1.example.com | "2019-05-02 01:31:52.880 UTC [msp] DeserializeIdentity -> DEBU 4307 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.880 UTC [msp] DeserializeIdentity -> DEBU 4308 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.880 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4309 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:52.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 430a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 430b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:52.880 UTC [policies] Evaluate -> DEBU 430c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.880 UTC [policies] Evaluate -> DEBU 430d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [policies] Evaluate -> DEBU 430e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func1 -> DEBU 430f 0xc00419e0d0 gate 1556760712881057200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 4310 0xc00419e0d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 4311 0xc00419e0d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 4312 0xc00419e0d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 4313 0xc00419e0d0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func1 -> DEBU 4314 0xc00419e0d0 gate 1556760712881057200 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [policies] Evaluate -> DEBU 4315 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [policies] Evaluate -> DEBU 4316 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [policies] Evaluate -> DEBU 4317 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func1 -> DEBU 4318 0xc00419e910 gate 1556760712881448900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 4319 0xc00419e910 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 431a 0xc00419e910 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 431b 0xc00419e910 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [msp.identity] Verify -> DEBU 431c Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -peer0.org1.example.com | 00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [msp.identity] Verify -> DEBU 431d Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -peer0.org1.example.com | 00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -peer0.org1.example.com | 00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -peer0.org1.example.com | 00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -peer0.org1.example.com | 00000040 15 5e 2d 74 49 ed |.^-tI.|" -peer0.org1.example.com | "2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 431e 0xc00419e910 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:52.886 UTC [cauthdsl] func1 -> DEBU 431f 0xc00419e910 gate 1556760712881448900 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:52.887 UTC [policies] Evaluate -> DEBU 4320 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.887 UTC [policies] Evaluate -> DEBU 4321 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.887 UTC [policies] Evaluate -> DEBU 4322 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.887 UTC [policies] Evaluate -> DEBU 4323 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:52.891 UTC [msp.identity] Verify -> DEBU 4324 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -peer0.org1.example.com | 00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -peer0.org1.example.com | "2019-05-02 01:31:52.891 UTC [msp.identity] Verify -> DEBU 4325 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -peer0.org1.example.com | 00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -peer0.org1.example.com | 00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -peer0.org1.example.com | 00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -peer0.org1.example.com | 00000040 a5 88 0c d4 5a 7c |....Z||" -peer0.org1.example.com | "2019-05-02 01:31:52.891 UTC [gossip.gossip] handleMessage -> DEBU 4326 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:52.921 UTC [msp] DeserializeIdentity -> DEBU 4327 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.922 UTC [msp] DeserializeIdentity -> DEBU 4328 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.922 UTC [gossip.pull] Hello -> DEBU 4329 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:52.922 UTC [msp] DeserializeIdentity -> DEBU 432a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.922 UTC [msp] DeserializeIdentity -> DEBU 432b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:52.922 UTC [gossip.comm] Send -> DEBU 432c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:52.922 UTC [gossip.comm] sendToEndpoint -> DEBU 432d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.922 UTC [gossip.comm] sendToEndpoint -> DEBU 432e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:52.927 UTC [gossip.comm] func1 -> DEBU 432f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1224047953124857061 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 60 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.928 UTC [gossip.gossip] handleMessage -> DEBU 4330 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1224047953124857061 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 60 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.928 UTC [gossip.pull] HandleMessage -> DEBU 4331 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1224047953124857061 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 60 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:52.928 UTC [gossip.gossip] handleMessage -> DEBU 4332 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.050 UTC [gossip.comm] func1 -> DEBU 4333 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.050 UTC [gossip.gossip] handleMessage -> DEBU 4334 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.051 UTC [msp] DeserializeIdentity -> DEBU 4335 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.052 UTC [msp] DeserializeIdentity -> DEBU 4336 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.052 UTC [gossip.gossip] handleMessage -> DEBU 4337 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.095 UTC [gossip.comm] func1 -> DEBU 4338 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.096 UTC [gossip.gossip] handleMessage -> DEBU 4339 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.097 UTC [gossip.pull] HandleMessage -> DEBU 433a GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.097 UTC [gossip.pull] SendDigest -> DEBU 433b Sending BLOCK_MSG digest: [2 3 4 8 9 1 5 6 7] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:53.098 UTC [gossip.gossip] handleMessage -> DEBU 433c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.274 UTC [gossip.comm] func1 -> DEBU 433d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.274 UTC [gossip.gossip] handleMessage -> DEBU 433e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.274 UTC [msp] DeserializeIdentity -> DEBU 433f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.274 UTC [msp] DeserializeIdentity -> DEBU 4340 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.275 UTC [msp] DeserializeIdentity -> DEBU 4341 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.275 UTC [gossip.gossip] handleMessage -> DEBU 4342 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.412 UTC [gossip.comm] func1 -> DEBU 4343 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.412 UTC [gossip.comm] func1 -> DEBU 4344 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.413 UTC [gossip.gossip] handleMessage -> DEBU 4345 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.413 UTC [gossip.pull] HandleMessage -> DEBU 4346 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.413 UTC [gossip.pull] SendDigest -> DEBU 4347 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:53.413 UTC [gossip.gossip] handleMessage -> DEBU 4348 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.413 UTC [gossip.gossip] handleMessage -> DEBU 4349 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.413 UTC [gossip.gossip] handleMessage -> DEBU 434a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 434b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.413 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 434c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:53.413 UTC [msp.identity] Verify -> DEBU 434d Verify: digest = 00000000 21 5e f8 34 59 79 8e 37 7a 38 47 4b f9 ff cc 0f |!^.4Yy.7z8GK....| -peer0.org1.example.com | 00000010 91 a1 45 e0 8c 38 32 1d b2 8c c7 f4 8d 76 14 bc |..E..82......v..|" -peer0.org1.example.com | "2019-05-02 01:31:53.413 UTC [msp.identity] Verify -> DEBU 434e Verify: sig = 00000000 30 44 02 20 0e 4d e5 77 9b 92 18 59 0f a5 a3 d3 |0D. .M.w...Y....| -peer0.org1.example.com | 00000010 da 20 4b 4c 58 5e 34 77 f7 86 0a 42 6a d2 67 6e |. KLX^4w...Bj.gn| -peer0.org1.example.com | 00000020 a0 ce 52 3e 02 20 17 6c 52 55 b4 e3 77 3f b6 e6 |..R>. .lRU..w?..| -peer0.org1.example.com | 00000030 af c5 7d 04 f5 88 e3 48 36 a2 5e 0c 5a 7a f0 e9 |..}....H6.^.Zz..| -peer0.org1.example.com | 00000040 1e b6 2d 87 d6 2f |..-../|" -peer0.org1.example.com | "2019-05-02 01:31:53.414 UTC [msp.identity] Verify -> DEBU 434f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:53.414 UTC [msp.identity] Verify -> DEBU 4350 Verify: sig = 00000000 30 45 02 21 00 e6 2a eb 16 30 a0 c0 d9 b5 51 9a |0E.!..*..0....Q.| -peer0.org1.example.com | 00000010 01 2d c4 f2 85 25 4f cc 61 37 6a 9f 1e 2b 0e 1f |.-...%O.a7j..+..| -peer0.org1.example.com | 00000020 63 ae 60 f2 16 02 20 58 c9 d7 ef ac 3f 50 69 a0 |c.`... X....?Pi.| -peer0.org1.example.com | 00000030 94 c5 5e cb 3f 93 27 30 8b be e4 ac 62 49 5b 06 |..^.?.'0....bI[.| -peer0.org1.example.com | 00000040 72 db 9f 16 83 e5 84 |r......|" -peer0.org1.example.com | "2019-05-02 01:31:53.414 UTC [gossip.discovery] handleAliveMessage -> DEBU 4351 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.414 UTC [gossip.discovery] learnExistingMembers -> DEBU 4352 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:53.414 UTC [gossip.discovery] learnExistingMembers -> DEBU 4353 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 " -peer0.org1.example.com | "2019-05-02 01:31:53.414 UTC [gossip.discovery] learnExistingMembers -> DEBU 4354 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 " -peer0.org1.example.com | "2019-05-02 01:31:53.414 UTC [gossip.discovery] learnExistingMembers -> DEBU 4355 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:53.414 UTC [gossip.discovery] learnExistingMembers -> DEBU 4356 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.414 UTC [gossip.discovery] handleAliveMessage -> DEBU 4357 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.414 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4358 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.415 UTC [msp] DeserializeIdentity -> DEBU 4359 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.415 UTC [msp] DeserializeIdentity -> DEBU 435a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.415 UTC [msp] DeserializeIdentity -> DEBU 435b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.415 UTC [gossip.comm] Send -> DEBU 435c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.415 UTC [msp] DeserializeIdentity -> DEBU 435d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.415 UTC [gossip.comm] Send -> DEBU 435e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.415 UTC [gossip.comm] sendToEndpoint -> DEBU 435f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.415 UTC [gossip.comm] sendToEndpoint -> DEBU 4360 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.416 UTC [gossip.comm] sendToEndpoint -> DEBU 4361 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.416 UTC [gossip.comm] sendToEndpoint -> DEBU 4362 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.437 UTC [gossip.comm] func1 -> DEBU 4363 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.437 UTC [gossip.gossip] handleMessage -> DEBU 4364 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.437 UTC [gossip.gossip] handleMessage -> DEBU 4365 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.437 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4366 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.437 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4367 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.445 UTC [gossip.comm] func1 -> DEBU 4368 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.445 UTC [gossip.gossip] handleMessage -> DEBU 4369 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.445 UTC [gossip.gossip] handleMessage -> DEBU 436a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.445 UTC [gossip.discovery] handleMsgFromComm -> DEBU 436b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.445 UTC [gossip.discovery] handleMsgFromComm -> DEBU 436c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.455 UTC [gossip.comm] func1 -> DEBU 436d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.455 UTC [gossip.gossip] handleMessage -> DEBU 436e Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.456 UTC [gossip.gossip] handleMessage -> DEBU 436f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.456 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4370 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.456 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4371 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:53.456 UTC [msp.identity] Verify -> DEBU 4372 Verify: digest = 00000000 3f b9 47 0e 43 5d 0a 5b f9 cd 37 b9 14 06 be 3b |?.G.C].[..7....;| -peer0.org1.example.com | 00000010 3a 06 bc 32 c5 60 29 08 a3 5c 1e d2 ff ef 4f a4 |:..2.`)..\....O.|" -peer0.org1.example.com | "2019-05-02 01:31:53.456 UTC [msp.identity] Verify -> DEBU 4373 Verify: sig = 00000000 30 44 02 20 11 eb 6c 84 38 25 e2 ff b7 64 d1 8e |0D. ..l.8%...d..| -peer0.org1.example.com | 00000010 ad d5 8c af e3 e2 0e b0 dc 3a c5 21 bc f5 51 e8 |.........:.!..Q.| -peer0.org1.example.com | 00000020 77 ed f4 93 02 20 27 72 04 3c 10 a1 62 12 b1 da |w.... 'r.<..b...| -peer0.org1.example.com | 00000030 c7 cf 7c e7 93 91 a7 50 4f a0 7e b6 23 9c a9 4c |..|....PO.~.#..L| -peer0.org1.example.com | 00000040 8a e8 92 54 64 bf |...Td.|" -peer0.org1.example.com | "2019-05-02 01:31:53.456 UTC [msp.identity] Verify -> DEBU 4374 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-05-02 01:31:53.456 UTC [msp.identity] Verify -> DEBU 4375 Verify: sig = 00000000 30 44 02 20 74 b3 92 b9 13 07 d7 cf 1e 30 d7 d0 |0D. t........0..| -peer0.org1.example.com | 00000010 86 7a aa 16 22 d3 5e fc 0b 2e e8 e5 fd 0f cc 1d |.z..".^.........| -peer0.org1.example.com | 00000020 74 56 a2 a0 02 20 11 bf 7b df 9e 15 37 d2 94 96 |tV... ..{...7...| -peer0.org1.example.com | 00000030 4d ac da 84 3f c0 2b fa 9e 22 07 09 16 67 dc 4d |M...?.+.."...g.M| -peer0.org1.example.com | 00000040 17 8c c0 7b b5 04 |...{..|" -peer0.org1.example.com | "2019-05-02 01:31:53.456 UTC [gossip.discovery] handleAliveMessage -> DEBU 4376 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 4377 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:53.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 4378 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:57 " -peer0.org1.example.com | "2019-05-02 01:31:53.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 4379 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:57 " -peer0.org1.example.com | "2019-05-02 01:31:53.463 UTC [gossip.discovery] learnExistingMembers -> DEBU 437a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:53.463 UTC [gossip.discovery] learnExistingMembers -> DEBU 437b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.463 UTC [gossip.discovery] handleAliveMessage -> DEBU 437c Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.464 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.464 UTC [gossip.discovery] sendMemResponse -> DEBU 437e Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-05-02 01:31:53.464 UTC [msp] DeserializeIdentity -> DEBU 437f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.464 UTC [msp] DeserializeIdentity -> DEBU 4380 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.464 UTC [gossip.comm] Send -> DEBU 4381 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.464 UTC [gossip.discovery] sendMemResponse -> DEBU 4382 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:53.464 UTC [gossip.comm] sendToEndpoint -> DEBU 4383 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.464 UTC [gossip.comm] sendToEndpoint -> DEBU 4384 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.478 UTC [gossip.comm] func1 -> DEBU 4385 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.478 UTC [gossip.gossip] handleMessage -> DEBU 4386 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.478 UTC [gossip.gossip] handleMessage -> DEBU 4387 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.478 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4388 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.478 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4389 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:53.478 UTC [msp] DeserializeIdentity -> DEBU 438a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 438b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 438c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 438d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [policies] Evaluate -> DEBU 438e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [policies] Evaluate -> DEBU 438f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [policies] Evaluate -> DEBU 4390 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [cauthdsl] func1 -> DEBU 4391 0xc0035ada70 gate 1556760713479325600 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [cauthdsl] func2 -> DEBU 4392 0xc0035ada70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [cauthdsl] func2 -> DEBU 4393 0xc0035ada70 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [cauthdsl] func2 -> DEBU 4394 0xc0035ada70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [cauthdsl] func2 -> DEBU 4395 0xc0035ada70 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [cauthdsl] func1 -> DEBU 4396 0xc0035ada70 gate 1556760713479325600 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [policies] Evaluate -> DEBU 4397 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [policies] Evaluate -> DEBU 4398 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [policies] Evaluate -> DEBU 4399 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [cauthdsl] func1 -> DEBU 439a 0xc0027482d0 gate 1556760713479773500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [cauthdsl] func2 -> DEBU 439b 0xc0027482d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [cauthdsl] func2 -> DEBU 439c 0xc0027482d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [cauthdsl] func2 -> DEBU 439d 0xc0027482d0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:53.479 UTC [msp.identity] Verify -> DEBU 439e Verify: digest = 00000000 d6 2f 99 82 60 08 77 79 78 6a 7e 4e 79 17 40 51 |./..`.wyxj~Ny.@Q| -peer0.org1.example.com | 00000010 7d b4 16 11 0b e7 2d 17 4e 2b 65 34 32 6f 4e 3a |}.....-.N+e42oN:|" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [msp.identity] Verify -> DEBU 439f Verify: sig = 00000000 30 44 02 20 5e f3 97 53 65 d0 56 78 39 27 51 bb |0D. ^..Se.Vx9'Q.| -peer0.org1.example.com | 00000010 0b ce 8b 28 a2 26 fe d4 ff 25 ef 2a 5e c6 e8 87 |...(.&...%.*^...| -peer0.org1.example.com | 00000020 5e b2 2e ef 02 20 10 32 9c c8 a5 47 fe 48 56 03 |^.... .2...G.HV.| -peer0.org1.example.com | 00000030 b7 3f 7d 3c 6d c3 64 a8 ec d8 0b 47 a5 e8 c6 19 |.?} DEBU 43a0 0xc0027482d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [cauthdsl] func1 -> DEBU 43a1 0xc0027482d0 gate 1556760713479773500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [policies] Evaluate -> DEBU 43a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [policies] Evaluate -> DEBU 43a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [policies] Evaluate -> DEBU 43a4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [policies] Evaluate -> DEBU 43a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [gossip.discovery] handleAliveMessage -> DEBU 43a6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a8 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 " -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a9 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 " -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [gossip.discovery] learnExistingMembers -> DEBU 43aa Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [gossip.discovery] learnExistingMembers -> DEBU 43ab Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [gossip.discovery] handleAliveMessage -> DEBU 43ac Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43ad Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.485 UTC [msp] DeserializeIdentity -> DEBU 43ae Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [msp] DeserializeIdentity -> DEBU 43af Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [msp] DeserializeIdentity -> DEBU 43b0 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [msp] DeserializeIdentity -> DEBU 43b1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [msp] DeserializeIdentity -> DEBU 43b2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [msp] DeserializeIdentity -> DEBU 43b3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [gossip.comm] Send -> DEBU 43b4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [msp] DeserializeIdentity -> DEBU 43b5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [msp] DeserializeIdentity -> DEBU 43b6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [gossip.comm] Send -> DEBU 43b7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [gossip.comm] sendToEndpoint -> DEBU 43b8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [gossip.comm] sendToEndpoint -> DEBU 43b9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.488 UTC [gossip.comm] sendToEndpoint -> DEBU 43ba Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.489 UTC [gossip.comm] sendToEndpoint -> DEBU 43bb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.489 UTC [gossip.comm] func1 -> DEBU 43bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.489 UTC [gossip.gossip] handleMessage -> DEBU 43bd Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.489 UTC [gossip.gossip] handleMessage -> DEBU 43be Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.489 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43bf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.489 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43c0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.512 UTC [gossip.comm] func1 -> DEBU 43c1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.512 UTC [gossip.gossip] handleMessage -> DEBU 43c2 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.512 UTC [gossip.pull] HandleMessage -> DEBU 43c3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.512 UTC [msp] DeserializeIdentity -> DEBU 43c4 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.512 UTC [msp] DeserializeIdentity -> DEBU 43c5 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.512 UTC [msp] DeserializeIdentity -> DEBU 43c6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.512 UTC [msp] DeserializeIdentity -> DEBU 43c7 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.512 UTC [msp] DeserializeIdentity -> DEBU 43c8 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.513 UTC [msp] DeserializeIdentity -> DEBU 43c9 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.513 UTC [gossip.pull] SendDigest -> DEBU 43ca Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:53.513 UTC [gossip.gossip] handleMessage -> DEBU 43cb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.528 UTC [gossip.comm] func1 -> DEBU 43cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.528 UTC [gossip.gossip] handleMessage -> DEBU 43cd Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.528 UTC [gossip.gossip] handleMessage -> DEBU 43ce Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43d0 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.529 UTC [gossip.comm] func1 -> DEBU 43d1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.529 UTC [gossip.gossip] handleMessage -> DEBU 43d2 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.529 UTC [gossip.gossip] handleMessage -> DEBU 43d3 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43d4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.529 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43d5 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:53.529 UTC [msp] DeserializeIdentity -> DEBU 43d6 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43d7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43d8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43d9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [policies] Evaluate -> DEBU 43da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [policies] Evaluate -> DEBU 43db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [policies] Evaluate -> DEBU 43dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [cauthdsl] func1 -> DEBU 43dd 0xc0025385d0 gate 1556760713530333200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [cauthdsl] func2 -> DEBU 43de 0xc0025385d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [cauthdsl] func2 -> DEBU 43df 0xc0025385d0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [cauthdsl] func2 -> DEBU 43e0 0xc0025385d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [cauthdsl] func2 -> DEBU 43e1 0xc0025385d0 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [cauthdsl] func1 -> DEBU 43e2 0xc0025385d0 gate 1556760713530333200 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [policies] Evaluate -> DEBU 43e3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [policies] Evaluate -> DEBU 43e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [policies] Evaluate -> DEBU 43e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [cauthdsl] func1 -> DEBU 43e6 0xc002538e30 gate 1556760713530793500 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [cauthdsl] func2 -> DEBU 43e7 0xc002538e30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [cauthdsl] func2 -> DEBU 43e8 0xc002538e30 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [cauthdsl] func2 -> DEBU 43e9 0xc002538e30 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [msp.identity] Verify -> DEBU 43ea Verify: digest = 00000000 cc d4 0e 7a 85 d8 e4 a4 5c a4 1a c6 20 95 dc da |...z....\... ...| -peer0.org1.example.com | 00000010 f3 12 68 74 e7 5f ef ec e4 54 6c 11 78 02 f3 89 |..ht._...Tl.x...|" -peer0.org1.example.com | "2019-05-02 01:31:53.530 UTC [msp.identity] Verify -> DEBU 43eb Verify: sig = 00000000 30 45 02 21 00 e4 5f 47 d6 82 01 25 08 e5 bd 45 |0E.!.._G...%...E| -peer0.org1.example.com | 00000010 f2 48 d3 a9 97 0d 63 89 19 bc 29 29 6b 6d f7 67 |.H....c...))km.g| -peer0.org1.example.com | 00000020 69 8b 5f e9 83 02 20 22 b0 54 06 7c c5 9d 42 f0 |i._... ".T.|..B.| -peer0.org1.example.com | 00000030 d0 51 46 b9 72 4b 12 a7 cd 98 88 6b 8a f8 4b d9 |.QF.rK.....k..K.| -peer0.org1.example.com | 00000040 5b 16 c1 0c 77 86 e8 |[...w..|" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [cauthdsl] func2 -> DEBU 43ec 0xc002538e30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [cauthdsl] func1 -> DEBU 43ed 0xc002538e30 gate 1556760713530793500 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [policies] Evaluate -> DEBU 43ee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [policies] Evaluate -> DEBU 43ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [policies] Evaluate -> DEBU 43f0 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [policies] Evaluate -> DEBU 43f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [gossip.discovery] handleAliveMessage -> DEBU 43f2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f4 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:52 " -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f5 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:52 " -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.531 UTC [gossip.discovery] handleAliveMessage -> DEBU 43f9 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.547 UTC [gossip.comm] func1 -> DEBU 43f8 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.547 UTC [gossip.gossip] handleMessage -> DEBU 43fa Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.547 UTC [msp] DeserializeIdentity -> DEBU 43fb Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.548 UTC [msp] DeserializeIdentity -> DEBU 43fc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.548 UTC [msp] DeserializeIdentity -> DEBU 43fd Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.548 UTC [gossip.gossip] handleMessage -> DEBU 43fe Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.547 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43ff Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.548 UTC [gossip.discovery] sendMemResponse -> DEBU 4400 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-05-02 01:31:53.548 UTC [msp] DeserializeIdentity -> DEBU 4401 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.548 UTC [msp] DeserializeIdentity -> DEBU 4402 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.548 UTC [msp] DeserializeIdentity -> DEBU 4403 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.549 UTC [gossip.comm] Send -> DEBU 4404 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.549 UTC [gossip.discovery] sendMemResponse -> DEBU 4405 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:53.549 UTC [gossip.comm] sendToEndpoint -> DEBU 4406 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.549 UTC [gossip.comm] sendToEndpoint -> DEBU 4407 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.702 UTC [msp.identity] Sign -> DEBU 4408 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151032 " -peer0.org1.example.com | "2019-05-02 01:31:53.703 UTC [msp.identity] Sign -> DEBU 4409 Sign: digest: 81440E6736F3F7A4BA3463A2E3E48C8FFCBDC1861C1678CEC22B27259BE35CD2 " -peer0.org1.example.com | "2019-05-02 01:31:53.703 UTC [msp.identity] Sign -> DEBU 440a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:53.703 UTC [msp.identity] Sign -> DEBU 440b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:53.703 UTC [gossip.discovery] periodicalSendAlive -> DEBU 440c Sleeping 5s" -peer0.org1.example.com | "2019-05-02 01:31:53.703 UTC [msp] DeserializeIdentity -> DEBU 440d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.704 UTC [msp] DeserializeIdentity -> DEBU 440e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.704 UTC [msp] DeserializeIdentity -> DEBU 440f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.704 UTC [gossip.comm] Send -> DEBU 4410 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.704 UTC [msp] DeserializeIdentity -> DEBU 4411 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.704 UTC [gossip.comm] Send -> DEBU 4412 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.704 UTC [gossip.comm] sendToEndpoint -> DEBU 4413 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.704 UTC [gossip.comm] sendToEndpoint -> DEBU 4414 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.704 UTC [gossip.comm] Send -> DEBU 4415 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.705 UTC [gossip.comm] sendToEndpoint -> DEBU 4416 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.705 UTC [gossip.comm] sendToEndpoint -> DEBU 4417 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.705 UTC [gossip.comm] sendToEndpoint -> DEBU 4418 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.705 UTC [gossip.comm] sendToEndpoint -> DEBU 4419 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.722 UTC [gossip.comm] func1 -> DEBU 441a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.722 UTC [gossip.gossip] handleMessage -> DEBU 441b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.722 UTC [gossip.pull] HandleMessage -> DEBU 441c GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.722 UTC [msp] DeserializeIdentity -> DEBU 441d Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.722 UTC [msp] DeserializeIdentity -> DEBU 441e Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.723 UTC [msp] DeserializeIdentity -> DEBU 441f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.723 UTC [msp] DeserializeIdentity -> DEBU 4420 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.723 UTC [msp] DeserializeIdentity -> DEBU 4421 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.723 UTC [msp] DeserializeIdentity -> DEBU 4422 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.723 UTC [gossip.pull] SendDigest -> DEBU 4423 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:53.723 UTC [gossip.gossip] handleMessage -> DEBU 4424 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.732 UTC [gossip.comm] func1 -> DEBU 4425 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.733 UTC [gossip.gossip] handleMessage -> DEBU 4426 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.733 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4428 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.733 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4429 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:53.742 UTC [msp.identity] Verify -> DEBU 442a Verify: digest = 00000000 81 44 0e 67 36 f3 f7 a4 ba 34 63 a2 e3 e4 8c 8f |.D.g6....4c.....| -peer0.org1.example.com | 00000010 fc bd c1 86 1c 16 78 ce c2 2b 27 25 9b e3 5c d2 |......x..+'%..\.|" -peer0.org1.example.com | "2019-05-02 01:31:53.742 UTC [msp.identity] Verify -> DEBU 442b Verify: sig = 00000000 30 44 02 20 58 e3 c1 ea 05 df 64 55 70 3e 27 8d |0D. X.....dUp>'.| -peer0.org1.example.com | 00000010 b3 68 88 02 b5 56 ac 97 8f 6e 35 b2 80 aa 92 b9 |.h...V...n5.....| -peer0.org1.example.com | 00000020 92 05 5b a9 02 20 73 14 02 08 49 32 c1 78 55 ed |..[.. s...I2.xU.| -peer0.org1.example.com | 00000030 a1 c6 0a 69 e5 44 14 93 9d b4 81 f2 50 5b 40 ee |...i.D......P[@.| -peer0.org1.example.com | 00000040 d3 74 68 fc 2b 72 |.th.+r|" -peer0.org1.example.com | "2019-05-02 01:31:53.742 UTC [gossip.discovery] isSentByMe -> DEBU 442c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.742 UTC [gossip.discovery] handleMsgFromComm -> DEBU 442d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.733 UTC [gossip.gossip] handleMessage -> DEBU 4427 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.823 UTC [gossip.pull] Hello -> DEBU 442e Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:53.824 UTC [gossip.comm] Send -> DEBU 442f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.824 UTC [gossip.pull] Hello -> DEBU 4430 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:53.825 UTC [gossip.comm] Send -> DEBU 4431 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.826 UTC [gossip.pull] Hello -> DEBU 4434 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-05-02 01:31:53.827 UTC [gossip.comm] Send -> DEBU 4436 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.825 UTC [gossip.comm] func1 -> DEBU 4432 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.826 UTC [gossip.comm] sendToEndpoint -> DEBU 4433 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.826 UTC [gossip.comm] sendToEndpoint -> DEBU 4435 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.828 UTC [gossip.gossip] handleMessage -> DEBU 4437 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.829 UTC [gossip.gossip] handleMessage -> DEBU 443a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.829 UTC [gossip.discovery] handleMsgFromComm -> DEBU 443c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.829 UTC [gossip.comm] sendToEndpoint -> DEBU 443b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.829 UTC [gossip.comm] sendToEndpoint -> DEBU 443d Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.829 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 443e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:53.829 UTC [msp] DeserializeIdentity -> DEBU 443f Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.828 UTC [gossip.comm] sendToEndpoint -> DEBU 4438 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.830 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4440 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:53.830 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4441 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:53.828 UTC [gossip.comm] sendToEndpoint -> DEBU 4439 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.834 UTC [gossip.comm] func1 -> DEBU 4442 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4443 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:53.835 UTC [policies] Evaluate -> DEBU 4445 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.835 UTC [policies] Evaluate -> DEBU 4446 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:53.835 UTC [policies] Evaluate -> DEBU 4447 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.836 UTC [cauthdsl] func1 -> DEBU 4448 0xc0038eb290 gate 1556760713836068200 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:53.836 UTC [cauthdsl] func2 -> DEBU 4449 0xc0038eb290 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:53.836 UTC [cauthdsl] func2 -> DEBU 444a 0xc0038eb290 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:53.836 UTC [cauthdsl] func2 -> DEBU 444b 0xc0038eb290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:53.836 UTC [cauthdsl] func2 -> DEBU 444c 0xc0038eb290 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:53.836 UTC [cauthdsl] func1 -> DEBU 444d 0xc0038eb290 gate 1556760713836068200 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:53.836 UTC [policies] Evaluate -> DEBU 444e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.836 UTC [policies] Evaluate -> DEBU 444f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.838 UTC [policies] Evaluate -> DEBU 4450 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.840 UTC [cauthdsl] func1 -> DEBU 4451 0xc0038ebbf0 gate 1556760713840314700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:53.841 UTC [cauthdsl] func2 -> DEBU 4453 0xc0038ebbf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:53.842 UTC [cauthdsl] func2 -> DEBU 4454 0xc0038ebbf0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:53.842 UTC [cauthdsl] func2 -> DEBU 4455 0xc0038ebbf0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:53.842 UTC [msp.identity] Verify -> DEBU 4456 Verify: digest = 00000000 c5 46 83 b1 11 b2 a9 07 44 17 6b 19 26 73 44 62 |.F......D.k.&sDb| -peer0.org1.example.com | 00000010 c9 84 ae 6f c1 6d 49 6c d4 d5 19 74 6a a4 65 33 |...o.mIl...tj.e3|" -peer0.org1.example.com | "2019-05-02 01:31:53.842 UTC [msp.identity] Verify -> DEBU 4457 Verify: sig = 00000000 30 45 02 21 00 a0 f7 21 83 9c ca df bc 3f d4 3b |0E.!...!.....?.;| -peer0.org1.example.com | 00000010 f3 51 39 89 6e 8a 0f 3d 90 d9 3d df 92 60 df 07 |.Q9.n..=..=..`..| -peer0.org1.example.com | 00000020 61 65 83 36 b5 02 20 12 df d7 6f 88 d8 73 ff 48 |ae.6.. ...o..s.H| -peer0.org1.example.com | 00000030 d1 eb a0 32 69 b7 79 99 46 b5 3d 83 93 c3 17 c3 |...2i.y.F.=.....| -peer0.org1.example.com | 00000040 34 e7 c2 49 62 98 5d |4..Ib.]|" -peer0.org1.example.com | "2019-05-02 01:31:53.842 UTC [cauthdsl] func2 -> DEBU 4458 0xc0038ebbf0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:53.842 UTC [cauthdsl] func1 -> DEBU 4459 0xc0038ebbf0 gate 1556760713840314700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:53.838 UTC [gossip.comm] func1 -> DEBU 4452 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14527266273235757891 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.835 UTC [gossip.gossip] handleMessage -> DEBU 4444 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.865 UTC [gossip.comm] func1 -> DEBU 445a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.865 UTC [gossip.comm] func1 -> DEBU 445b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 82224858256998445 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.866 UTC [gossip.comm] func1 -> DEBU 445c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10237108481377129429 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.842 UTC [policies] Evaluate -> DEBU 445d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.866 UTC [policies] Evaluate -> DEBU 445e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.866 UTC [policies] Evaluate -> DEBU 445f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.866 UTC [policies] Evaluate -> DEBU 4460 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 4461 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.discovery] learnExistingMembers -> DEBU 4462 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.discovery] learnExistingMembers -> DEBU 4463 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 " -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.discovery] learnExistingMembers -> DEBU 4464 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 " -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.discovery] learnExistingMembers -> DEBU 4465 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.discovery] learnExistingMembers -> DEBU 4466 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 4467 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4468 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4469 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.discovery] handleMsgFromComm -> DEBU 446a Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.867 UTC [gossip.gossip] handleMessage -> DEBU 446b Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.868 UTC [gossip.gossip] handleMessage -> DEBU 446c Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14527266273235757891 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.868 UTC [gossip.pull] HandleMessage -> DEBU 446d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14527266273235757891 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.868 UTC [gossip.gossip] handleMessage -> DEBU 446e Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.868 UTC [gossip.gossip] handleMessage -> DEBU 446f Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.868 UTC [gossip.gossip] handleMessage -> DEBU 4470 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.875 UTC [gossip.gossip] handleMessage -> DEBU 4471 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 82224858256998445 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.885 UTC [msp] DeserializeIdentity -> DEBU 4472 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.876 UTC [gossip.pull] HandleMessage -> DEBU 4473 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 82224858256998445 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.893 UTC [msp] DeserializeIdentity -> DEBU 4474 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.894 UTC [msp] DeserializeIdentity -> DEBU 4475 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.899 UTC [msp] DeserializeIdentity -> DEBU 4476 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.902 UTC [msp] DeserializeIdentity -> DEBU 4477 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.902 UTC [msp] DeserializeIdentity -> DEBU 4478 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.902 UTC [gossip.comm] Send -> DEBU 4479 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.908 UTC [msp] DeserializeIdentity -> DEBU 447a Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.908 UTC [msp] DeserializeIdentity -> DEBU 447b Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.910 UTC [gossip.comm] Send -> DEBU 447c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.910 UTC [gossip.comm] sendToEndpoint -> DEBU 447d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 447e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.922 UTC [gossip.comm] func1 -> DEBU 447f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.920 UTC [gossip.comm] sendToEndpoint -> DEBU 4480 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.922 UTC [gossip.comm] sendToEndpoint -> DEBU 4481 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.892 UTC [gossip.gossip] handleMessage -> DEBU 4482 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.922 UTC [gossip.gossip] handleMessage -> DEBU 4483 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10237108481377129429 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.922 UTC [gossip.pull] HandleMessage -> DEBU 4484 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10237108481377129429 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4485 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.911 UTC [gossip.comm] sendToEndpoint -> DEBU 4486 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.938 UTC [gossip.gossip] handleMessage -> DEBU 4487 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.939 UTC [gossip.gossip] handleMessage -> DEBU 4488 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.939 UTC [gossip.gossip] handleMessage -> DEBU 4489 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 448a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 448b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [msp] DeserializeIdentity -> DEBU 448c Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 448d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 448e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 448f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [policies] Evaluate -> DEBU 4490 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [policies] Evaluate -> DEBU 4491 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [policies] Evaluate -> DEBU 4492 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [cauthdsl] func1 -> DEBU 4493 0xc003c29830 gate 1556760713940817300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [cauthdsl] func2 -> DEBU 4494 0xc003c29830 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:53.940 UTC [cauthdsl] func2 -> DEBU 4495 0xc003c29830 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [cauthdsl] func2 -> DEBU 4496 0xc003c29830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [cauthdsl] func2 -> DEBU 4497 0xc003c29830 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [cauthdsl] func1 -> DEBU 4498 0xc003c29830 gate 1556760713940817300 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [policies] Evaluate -> DEBU 4499 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [policies] Evaluate -> DEBU 449a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [policies] Evaluate -> DEBU 449b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [cauthdsl] func1 -> DEBU 449c 0xc003cb0080 gate 1556760713941433300 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [cauthdsl] func2 -> DEBU 449d 0xc003cb0080 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [cauthdsl] func2 -> DEBU 449e 0xc003cb0080 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [cauthdsl] func2 -> DEBU 449f 0xc003cb0080 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [msp.identity] Verify -> DEBU 44a0 Verify: digest = 00000000 bd 3c f1 5c e8 33 15 a9 5c bd 54 ee 06 41 97 02 |.<.\.3..\.T..A..| -peer0.org1.example.com | 00000010 e9 63 8b f4 4a 9d 71 4f 95 69 d7 5e e3 16 df 8a |.c..J.qO.i.^....|" -peer0.org1.example.com | "2019-05-02 01:31:53.941 UTC [msp.identity] Verify -> DEBU 44a1 Verify: sig = 00000000 30 45 02 21 00 a3 1f 3b 5b 4a 15 66 f4 43 bd f0 |0E.!...;[J.f.C..| -peer0.org1.example.com | 00000010 95 ee 13 7f 3d 80 56 c1 4b 1b 7b fe 2c c1 b6 fa |....=.V.K.{.,...| -peer0.org1.example.com | 00000020 a4 99 30 98 27 02 20 77 f2 fc 70 08 9a 21 f8 bf |..0.'. w..p..!..| -peer0.org1.example.com | 00000030 d5 ed 7a de 74 aa ce b3 9c 04 88 38 a0 ff aa c3 |..z.t......8....| -peer0.org1.example.com | 00000040 bc ed 2e 88 d6 a3 e1 |.......|" -peer0.org1.example.com | "2019-05-02 01:31:53.942 UTC [cauthdsl] func2 -> DEBU 44a2 0xc003cb0080 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:53.942 UTC [cauthdsl] func1 -> DEBU 44a3 0xc003cb0080 gate 1556760713941433300 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:53.942 UTC [policies] Evaluate -> DEBU 44a4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.942 UTC [policies] Evaluate -> DEBU 44a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.942 UTC [policies] Evaluate -> DEBU 44a6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.942 UTC [policies] Evaluate -> DEBU 44a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:53.942 UTC [gossip.discovery] handleAliveMessage -> DEBU 44a8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.942 UTC [gossip.discovery] learnExistingMembers -> DEBU 44a9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-05-02 01:31:53.942 UTC [gossip.discovery] learnExistingMembers -> DEBU 44aa updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:56 " -peer0.org1.example.com | "2019-05-02 01:31:53.942 UTC [gossip.discovery] learnExistingMembers -> DEBU 44ab Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:56 " -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 44ac Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 44ad Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [gossip.discovery] handleAliveMessage -> DEBU 44ae Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44af Exiting" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [gossip.discovery] sendMemResponse -> DEBU 44b0 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [msp] DeserializeIdentity -> DEBU 44b1 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [msp] DeserializeIdentity -> DEBU 44b2 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [msp] DeserializeIdentity -> DEBU 44b3 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [gossip.comm] Send -> DEBU 44b4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [gossip.discovery] sendMemResponse -> DEBU 44b5 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [gossip.comm] sendToEndpoint -> DEBU 44b6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:53.943 UTC [gossip.comm] sendToEndpoint -> DEBU 44b7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.163 UTC [msp.identity] Sign -> DEBU 44b8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151033 " -peer0.org1.example.com | "2019-05-02 01:31:54.163 UTC [msp.identity] Sign -> DEBU 44b9 Sign: digest: E3CEB47E95A72B03EABD9218D5083B41ECC4C7A8AA3A192B8A257FFBC2326A19 " -peer0.org1.example.com | "2019-05-02 01:31:54.163 UTC [msp.identity] Sign -> DEBU 44ba Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-05-02 01:31:54.163 UTC [msp.identity] Sign -> DEBU 44bb Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-05-02 01:31:54.163 UTC [msp] DeserializeIdentity -> DEBU 44bc Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:54.163 UTC [gossip.comm] Send -> DEBU 44bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:54.163 UTC [msp] DeserializeIdentity -> DEBU 44be Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:54.163 UTC [gossip.comm] Send -> DEBU 44bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:54.163 UTC [gossip.comm] sendToEndpoint -> DEBU 44c0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.164 UTC [gossip.comm] sendToEndpoint -> DEBU 44c1 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.163 UTC [gossip.comm] Send -> DEBU 44c2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-05-02 01:31:54.164 UTC [gossip.comm] sendToEndpoint -> DEBU 44c3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.164 UTC [gossip.comm] sendToEndpoint -> DEBU 44c4 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.166 UTC [gossip.comm] func1 -> DEBU 44c5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.166 UTC [gossip.gossip] handleMessage -> DEBU 44c6 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.166 UTC [gossip.gossip] handleMessage -> DEBU 44c7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44c9 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [msp.identity] Verify -> DEBU 44ca Verify: digest = 00000000 3f b9 47 0e 43 5d 0a 5b f9 cd 37 b9 14 06 be 3b |?.G.C].[..7....;| -peer0.org1.example.com | 00000010 3a 06 bc 32 c5 60 29 08 a3 5c 1e d2 ff ef 4f a4 |:..2.`)..\....O.|" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [msp.identity] Verify -> DEBU 44cb Verify: sig = 00000000 30 44 02 20 11 eb 6c 84 38 25 e2 ff b7 64 d1 8e |0D. ..l.8%...d..| -peer0.org1.example.com | 00000010 ad d5 8c af e3 e2 0e b0 dc 3a c5 21 bc f5 51 e8 |.........:.!..Q.| -peer0.org1.example.com | 00000020 77 ed f4 93 02 20 27 72 04 3c 10 a1 62 12 b1 da |w.... 'r.<..b...| -peer0.org1.example.com | 00000030 c7 cf 7c e7 93 91 a7 50 4f a0 7e b6 23 9c a9 4c |..|....PO.~.#..L| -peer0.org1.example.com | 00000040 8a e8 92 54 64 bf |...Td.|" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 44cc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 44cd Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44ce Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [msp] DeserializeIdentity -> DEBU 44cf Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44d0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44d1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44d2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [policies] Evaluate -> DEBU 44d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [policies] Evaluate -> DEBU 44d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:54.167 UTC [policies] Evaluate -> DEBU 44d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:54.168 UTC [cauthdsl] func1 -> DEBU 44d6 0xc003739b30 gate 1556760714168029000 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:54.168 UTC [cauthdsl] func2 -> DEBU 44d7 0xc003739b30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:54.168 UTC [cauthdsl] func2 -> DEBU 44d8 0xc003739b30 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:54.168 UTC [gossip.comm] sendToEndpoint -> DEBU 44d9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.168 UTC [gossip.comm] sendToEndpoint -> DEBU 44da Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.168 UTC [cauthdsl] func2 -> DEBU 44db 0xc003739b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:54.171 UTC [cauthdsl] func2 -> DEBU 44dc 0xc003739b30 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:54.171 UTC [cauthdsl] func1 -> DEBU 44dd 0xc003739b30 gate 1556760714168029000 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:54.171 UTC [policies] Evaluate -> DEBU 44de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.171 UTC [policies] Evaluate -> DEBU 44df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.171 UTC [policies] Evaluate -> DEBU 44e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:54.171 UTC [cauthdsl] func1 -> DEBU 44e1 0xc003782370 gate 1556760714171733400 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:54.171 UTC [cauthdsl] func2 -> DEBU 44e2 0xc003782370 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:54.171 UTC [cauthdsl] func2 -> DEBU 44e3 0xc003782370 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:54.171 UTC [cauthdsl] func2 -> DEBU 44e4 0xc003782370 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [msp.identity] Verify -> DEBU 44e5 Verify: digest = 00000000 cc d4 0e 7a 85 d8 e4 a4 5c a4 1a c6 20 95 dc da |...z....\... ...| -peer0.org1.example.com | 00000010 f3 12 68 74 e7 5f ef ec e4 54 6c 11 78 02 f3 89 |..ht._...Tl.x...|" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [msp.identity] Verify -> DEBU 44e6 Verify: sig = 00000000 30 45 02 21 00 e4 5f 47 d6 82 01 25 08 e5 bd 45 |0E.!.._G...%...E| -peer0.org1.example.com | 00000010 f2 48 d3 a9 97 0d 63 89 19 bc 29 29 6b 6d f7 67 |.H....c...))km.g| -peer0.org1.example.com | 00000020 69 8b 5f e9 83 02 20 22 b0 54 06 7c c5 9d 42 f0 |i._... ".T.|..B.| -peer0.org1.example.com | 00000030 d0 51 46 b9 72 4b 12 a7 cd 98 88 6b 8a f8 4b d9 |.QF.rK.....k..K.| -peer0.org1.example.com | 00000040 5b 16 c1 0c 77 86 e8 |[...w..|" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [cauthdsl] func2 -> DEBU 44e7 0xc003782370 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [cauthdsl] func1 -> DEBU 44e8 0xc003782370 gate 1556760714171733400 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [policies] Evaluate -> DEBU 44e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [policies] Evaluate -> DEBU 44ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [policies] Evaluate -> DEBU 44eb Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [policies] Evaluate -> DEBU 44ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 44ed Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 44ee Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.172 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44ef Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:54.173 UTC [msp.identity] Verify -> DEBU 44f0 Verify: digest = 00000000 e3 ce b4 7e 95 a7 2b 03 ea bd 92 18 d5 08 3b 41 |...~..+.......;A| -peer0.org1.example.com | 00000010 ec c4 c7 a8 aa 3a 19 2b 8a 25 7f fb c2 32 6a 19 |.....:.+.%...2j.|" -peer0.org1.example.com | "2019-05-02 01:31:54.173 UTC [msp.identity] Verify -> DEBU 44f1 Verify: sig = 00000000 30 45 02 21 00 8f 05 e2 c6 21 64 b4 a5 c5 a5 7b |0E.!.....!d....{| -peer0.org1.example.com | 00000010 f7 4f 2a ee 07 74 e6 41 32 4f cb e4 de 4e 33 cc |.O*..t.A2O...N3.| -peer0.org1.example.com | 00000020 be af 3b ec 4b 02 20 5d 34 a5 51 a1 75 06 27 90 |..;.K. ]4.Q.u.'.| -peer0.org1.example.com | 00000030 c8 4f 69 76 09 66 4a 3b 64 47 2b 71 0d 32 72 2d |.Oiv.fJ;dG+q.2r-| -peer0.org1.example.com | 00000040 a5 b4 66 17 1a 1a a9 |..f....|" -peer0.org1.example.com | "2019-05-02 01:31:54.173 UTC [gossip.comm] func1 -> DEBU 44f2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.173 UTC [gossip.gossip] handleMessage -> DEBU 44f4 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.173 UTC [gossip.comm] func1 -> DEBU 44f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.173 UTC [gossip.discovery] handleAliveMessage -> DEBU 44f3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.173 UTC [gossip.discovery] isSentByMe -> DEBU 44f6 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.173 UTC [gossip.discovery] handleAliveMessage -> DEBU 44f7 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.173 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44f8 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.173 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44fa Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:54.174 UTC [gossip.gossip] handleMessage -> DEBU 44fb Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.174 UTC [gossip.gossip] handleMessage -> DEBU 44fc Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.174 UTC [msp.identity] Verify -> DEBU 44fd Verify: digest = 00000000 e3 ce b4 7e 95 a7 2b 03 ea bd 92 18 d5 08 3b 41 |...~..+.......;A| -peer0.org1.example.com | 00000010 ec c4 c7 a8 aa 3a 19 2b 8a 25 7f fb c2 32 6a 19 |.....:.+.%...2j.|" -peer0.org1.example.com | "2019-05-02 01:31:54.174 UTC [msp.identity] Verify -> DEBU 44fe Verify: sig = 00000000 30 45 02 21 00 8f 05 e2 c6 21 64 b4 a5 c5 a5 7b |0E.!.....!d....{| -peer0.org1.example.com | 00000010 f7 4f 2a ee 07 74 e6 41 32 4f cb e4 de 4e 33 cc |.O*..t.A2O...N3.| -peer0.org1.example.com | 00000020 be af 3b ec 4b 02 20 5d 34 a5 51 a1 75 06 27 90 |..;.K. ]4.Q.u.'.| -peer0.org1.example.com | 00000030 c8 4f 69 76 09 66 4a 3b 64 47 2b 71 0d 32 72 2d |.Oiv.fJ;dG+q.2r-| -peer0.org1.example.com | 00000040 a5 b4 66 17 1a 1a a9 |..f....|" -peer0.org1.example.com | "2019-05-02 01:31:54.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 44ff Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.175 UTC [gossip.discovery] isSentByMe -> DEBU 4500 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 4501 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.175 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4502 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -peer0.org1.example.com | "2019-05-02 01:31:54.175 UTC [msp.identity] Verify -> DEBU 4503 Verify: digest = 00000000 3f b9 47 0e 43 5d 0a 5b f9 cd 37 b9 14 06 be 3b |?.G.C].[..7....;| -peer0.org1.example.com | 00000010 3a 06 bc 32 c5 60 29 08 a3 5c 1e d2 ff ef 4f a4 |:..2.`)..\....O.|" -peer0.org1.example.com | "2019-05-02 01:31:54.175 UTC [msp.identity] Verify -> DEBU 4504 Verify: sig = 00000000 30 44 02 20 11 eb 6c 84 38 25 e2 ff b7 64 d1 8e |0D. ..l.8%...d..| -peer0.org1.example.com | 00000010 ad d5 8c af e3 e2 0e b0 dc 3a c5 21 bc f5 51 e8 |.........:.!..Q.| -peer0.org1.example.com | 00000020 77 ed f4 93 02 20 27 72 04 3c 10 a1 62 12 b1 da |w.... 'r.<..b...| -peer0.org1.example.com | 00000030 c7 cf 7c e7 93 91 a7 50 4f a0 7e b6 23 9c a9 4c |..|....PO.~.#..L| -peer0.org1.example.com | 00000040 8a e8 92 54 64 bf |...Td.|" -peer0.org1.example.com | "2019-05-02 01:31:54.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 4505 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.176 UTC [gossip.discovery] handleAliveMessage -> DEBU 4506 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.176 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4507 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -peer0.org1.example.com | "2019-05-02 01:31:54.176 UTC [msp] DeserializeIdentity -> DEBU 4508 Obtaining identity" -peer0.org1.example.com | "2019-05-02 01:31:54.178 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4509 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-05-02 01:31:54.178 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 450a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:54.178 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 450b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-05-02 01:31:54.178 UTC [policies] Evaluate -> DEBU 450c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:54.178 UTC [policies] Evaluate -> DEBU 450d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-05-02 01:31:54.178 UTC [policies] Evaluate -> DEBU 450e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:54.178 UTC [cauthdsl] func1 -> DEBU 450f 0xc0040f4420 gate 1556760714178655900 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:54.178 UTC [cauthdsl] func2 -> DEBU 4510 0xc0040f4420 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:54.178 UTC [cauthdsl] func2 -> DEBU 4511 0xc0040f4420 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:54.178 UTC [cauthdsl] func2 -> DEBU 4512 0xc0040f4420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [cauthdsl] func2 -> DEBU 4513 0xc0040f4420 principal evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [cauthdsl] func1 -> DEBU 4514 0xc0040f4420 gate 1556760714178655900 evaluation fails" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [policies] Evaluate -> DEBU 4515 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [policies] Evaluate -> DEBU 4516 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [policies] Evaluate -> DEBU 4517 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [cauthdsl] func1 -> DEBU 4518 0xc0040f4ea0 gate 1556760714179366700 evaluation starts" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [cauthdsl] func2 -> DEBU 4519 0xc0040f4ea0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [cauthdsl] func2 -> DEBU 451a 0xc0040f4ea0 processing identity 0 with bytes of 10fffc0" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [cauthdsl] func2 -> DEBU 451b 0xc0040f4ea0 principal matched by identity 0" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [msp.identity] Verify -> DEBU 451c Verify: digest = 00000000 bd 3c f1 5c e8 33 15 a9 5c bd 54 ee 06 41 97 02 |.<.\.3..\.T..A..| -peer0.org1.example.com | 00000010 e9 63 8b f4 4a 9d 71 4f 95 69 d7 5e e3 16 df 8a |.c..J.qO.i.^....|" -peer0.org1.example.com | "2019-05-02 01:31:54.179 UTC [msp.identity] Verify -> DEBU 451d Verify: sig = 00000000 30 45 02 21 00 a3 1f 3b 5b 4a 15 66 f4 43 bd f0 |0E.!...;[J.f.C..| -peer0.org1.example.com | 00000010 95 ee 13 7f 3d 80 56 c1 4b 1b 7b fe 2c c1 b6 fa |....=.V.K.{.,...| -peer0.org1.example.com | 00000020 a4 99 30 98 27 02 20 77 f2 fc 70 08 9a 21 f8 bf |..0.'. w..p..!..| -peer0.org1.example.com | 00000030 d5 ed 7a de 74 aa ce b3 9c 04 88 38 a0 ff aa c3 |..z.t......8....| -peer0.org1.example.com | 00000040 bc ed 2e 88 d6 a3 e1 |.......|" -peer0.org1.example.com | "2019-05-02 01:31:54.180 UTC [cauthdsl] func2 -> DEBU 451e 0xc0040f4ea0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-05-02 01:31:54.180 UTC [cauthdsl] func1 -> DEBU 451f 0xc0040f4ea0 gate 1556760714179366700 evaluation succeeds" -peer0.org1.example.com | "2019-05-02 01:31:54.180 UTC [policies] Evaluate -> DEBU 4520 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.180 UTC [policies] Evaluate -> DEBU 4521 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.180 UTC [policies] Evaluate -> DEBU 4522 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.180 UTC [policies] Evaluate -> DEBU 4523 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-05-02 01:31:54.180 UTC [gossip.discovery] handleAliveMessage -> DEBU 4524 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.180 UTC [gossip.discovery] handleAliveMessage -> DEBU 4525 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.180 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4526 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.180 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4527 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.181 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4528 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -peer0.org1.example.com | "2019-05-02 01:31:54.181 UTC [msp.identity] Verify -> DEBU 4529 Verify: digest = 00000000 e3 ce b4 7e 95 a7 2b 03 ea bd 92 18 d5 08 3b 41 |...~..+.......;A| -peer0.org1.example.com | 00000010 ec c4 c7 a8 aa 3a 19 2b 8a 25 7f fb c2 32 6a 19 |.....:.+.%...2j.|" -peer0.org1.example.com | "2019-05-02 01:31:54.181 UTC [msp.identity] Verify -> DEBU 452a Verify: sig = 00000000 30 45 02 21 00 8f 05 e2 c6 21 64 b4 a5 c5 a5 7b |0E.!.....!d....{| -peer0.org1.example.com | 00000010 f7 4f 2a ee 07 74 e6 41 32 4f cb e4 de 4e 33 cc |.O*..t.A2O...N3.| -peer0.org1.example.com | 00000020 be af 3b ec 4b 02 20 5d 34 a5 51 a1 75 06 27 90 |..;.K. ]4.Q.u.'.| -peer0.org1.example.com | 00000030 c8 4f 69 76 09 66 4a 3b 64 47 2b 71 0d 32 72 2d |.Oiv.fJ;dG+q.2r-| -peer0.org1.example.com | 00000040 a5 b4 66 17 1a 1a a9 |..f....|" -peer0.org1.example.com | "2019-05-02 01:31:54.181 UTC [msp.identity] Verify -> DEBU 452b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-05-02 01:31:54.181 UTC [msp.identity] Verify -> DEBU 452c Verify: sig = 00000000 30 45 02 21 00 ca 15 b8 4f e8 a1 2f ec 1f 42 03 |0E.!....O../..B.| -peer0.org1.example.com | 00000010 fe b9 55 e2 62 fc 25 b4 6f 20 d1 6e 9f ea 0f 11 |..U.b.%.o .n....| -peer0.org1.example.com | 00000020 e7 c5 c9 15 86 02 20 11 1d 9f 9f 34 8e 3b 8c 17 |...... ....4.;..| -peer0.org1.example.com | 00000030 49 0c 83 80 b4 fd 8b ae 98 2c 06 51 1d c6 af cf |I........,.Q....| -peer0.org1.example.com | 00000040 b3 8f 1f 77 44 23 0f |...wD#.|" -peer0.org1.example.com | "2019-05-02 01:31:54.182 UTC [gossip.discovery] handleAliveMessage -> DEBU 452d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.182 UTC [gossip.discovery] isSentByMe -> DEBU 452e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-05-02 01:31:54.182 UTC [gossip.discovery] handleAliveMessage -> DEBU 452f Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.182 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4530 Exiting" -peer0.org1.example.com | "2019-05-02 01:31:54.182 UTC [gossip.gossip] handleMessage -> DEBU 4531 Exiting" +orderer0.example.com | "2019-05-02 09:28:04.221 UTC [msp] Validate -> DEBU 15a7 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:28:04.225 UTC [msp] Setup -> DEBU 15a8 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-05-02 09:28:04.226 UTC [msp] Setup -> DEBU 15a9 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-05-02 09:28:04.227 UTC [policies] NewManagerImpl -> DEBU 15aa Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:04.228 UTC [policies] NewManagerImpl -> DEBU 15ab Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15ac Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15ad Proposed new policy Readers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 132e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 132f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1330 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.808 UTC [cauthdsl] func1 -> DEBU 1331 0xc0030ff940 gate 1556789252808960100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1332 0xc0030ff940 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1333 0xc0030ff940 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1334 0xc0030ff940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1335 0xc0030ff940 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func1 -> DEBU 1336 0xc0030ff940 gate 1556789252808960100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [policies] Evaluate -> DEBU 1337 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [policies] Evaluate -> DEBU 1338 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [policies] Evaluate -> DEBU 1339 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func1 -> DEBU 133a 0xc00325a180 gate 1556789252809434900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 133b 0xc00325a180 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 133c 0xc00325a180 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 133d 0xc00325a180 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [msp.identity] Verify -> DEBU 133e Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [msp.identity] Verify -> DEBU 133f Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|" +peer0.org1.example.com | "2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1340 0xc00325a180 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [cauthdsl] func1 -> DEBU 1341 0xc00325a180 gate 1556789252809434900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1342 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1343 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1344 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1345 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [gossip.gossip] handleMessage -> DEBU 1346 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [gossip.gossip] handleMessage -> DEBU 1347 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [msp] DeserializeIdentity -> DEBU 1348 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.810 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1349 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:32.819 UTC [msp] DeserializeIdentity -> DEBU 134a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.819 UTC [msp] DeserializeIdentity -> DEBU 134b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.819 UTC [gossip.comm] Send -> DEBU 134c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" +peer0.org1.example.com | "2019-05-02 09:27:32.820 UTC [msp] DeserializeIdentity -> DEBU 134d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.820 UTC [msp] DeserializeIdentity -> DEBU 134e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.820 UTC [gossip.comm] sendToEndpoint -> DEBU 134f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.820 UTC [gossip.comm] sendToEndpoint -> DEBU 1350 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.821 UTC [gossip.comm] sendToEndpoint -> DEBU 1351 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.821 UTC [gossip.comm] sendToEndpoint -> DEBU 1352 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.823 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1353 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.824 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1354 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.824 UTC [policies] Evaluate -> DEBU 1355 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.824 UTC [policies] Evaluate -> DEBU 1356 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 1357 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func1 -> DEBU 1358 0xc00325baa0 gate 1556789252825268200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1359 0xc00325baa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 135a 0xc00325baa0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 135b 0xc00325baa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 135c 0xc00325baa0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func1 -> DEBU 135d 0xc00325baa0 gate 1556789252825268200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 135e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 135f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 1360 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func1 -> DEBU 1361 0xc0035ee2e0 gate 1556789252825782000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1362 0xc0035ee2e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1363 0xc0035ee2e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1364 0xc0035ee2e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [msp.identity] Verify -> DEBU 1365 Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [msp.identity] Verify -> DEBU 1366 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|" +peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [cauthdsl] func2 -> DEBU 1367 0xc0035ee2e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [cauthdsl] func1 -> DEBU 1368 0xc0035ee2e0 gate 1556789252825782000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 1369 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 136a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 136b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 136c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [msp] DeserializeIdentity -> DEBU 136d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.826 UTC [gossip.gossip] handleMessage -> DEBU 136e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.835 UTC [gossip.comm] func1 -> DEBU 136f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.835 UTC [gossip.gossip] handleMessage -> DEBU 1370 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.835 UTC [gossip.pull] HandleMessage -> DEBU 1371 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.835 UTC [msp] DeserializeIdentity -> DEBU 1372 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1373 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1374 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1375 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1376 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1377 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [gossip.pull] SendDigest -> DEBU 1378 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:32.836 UTC [gossip.gossip] handleMessage -> DEBU 1379 Exiting" +orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15ae Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15af Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b0 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b1 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b2 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b3 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.231 UTC [policies] NewManagerImpl -> DEBU 15b4 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.236 UTC [policies] NewManagerImpl -> DEBU 15b5 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.237 UTC [policies] NewManagerImpl -> DEBU 15b6 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-05-02 09:28:04.237 UTC [policies] NewManagerImpl -> DEBU 15b7 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-05-02 09:28:04.237 UTC [policies] NewManagerImpl -> DEBU 15b8 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15b9 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15ba Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15bb Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15bc Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15bd Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15be Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15bf Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c0 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c1 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c2 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c3 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c4 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [common.configtx] addToMap -> DEBU 15c5 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [common.configtx] addToMap -> DEBU 15c6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-05-02 09:28:04.239 UTC [common.configtx] addToMap -> DEBU 15c7 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15c8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15c9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15ca Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15ce Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cf Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15d0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15d1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d4 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15da Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15db Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15dc Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15dd Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15de Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15df Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-05-02 09:28:04.244 UTC [common.configtx] addToMap -> DEBU 15e0 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-05-02 09:28:04.244 UTC [common.configtx] addToMap -> DEBU 15e1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-05-02 09:28:04.244 UTC [common.configtx] addToMap -> DEBU 15e2 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-05-02 09:28:04.245 UTC [common.configtx] addToMap -> DEBU 15e3 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:04.245 UTC [common.configtx] addToMap -> DEBU 15e4 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-05-02 09:28:04.245 UTC [common.configtx] addToMap -> DEBU 15e5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e9 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-05-02 09:28:04.247 UTC [common.configtx] addToMap -> DEBU 15ea Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-05-02 09:28:04.247 UTC [common.configtx] addToMap -> DEBU 15eb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-05-02 09:28:04.249 UTC [common.configtx] addToMap -> DEBU 15ec Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-05-02 09:28:04.251 UTC [common.configtx] addToMap -> DEBU 15ed Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-05-02 09:28:04.254 UTC [common.configtx] addToMap -> DEBU 15ee Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-05-02 09:28:04.255 UTC [common.configtx] addToMap -> DEBU 15ef Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:04.255 UTC [common.configtx] addToMap -> DEBU 15f0 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-05-02 09:28:04.256 UTC [common.configtx] addToMap -> DEBU 15f1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-05-02 09:28:04.256 UTC [common.configtx] addToMap -> DEBU 15f2 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-05-02 09:28:04.257 UTC [common.configtx] addToMap -> DEBU 15f3 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-05-02 09:28:04.258 UTC [common.configtx] addToMap -> DEBU 15f4 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-05-02 09:28:04.258 UTC [common.configtx] addToMap -> DEBU 15f5 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-05-02 09:28:04.259 UTC [common.configtx] addToMap -> DEBU 15f6 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-05-02 09:28:04.259 UTC [common.configtx] addToMap -> DEBU 15f7 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:04.261 UTC [common.configtx] addToMap -> DEBU 15f8 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-05-02 09:28:04.266 UTC [common.channelconfig] LogSanityChecks -> DEBU 15f9 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-05-02 09:28:04.267 UTC [common.channelconfig] LogSanityChecks -> DEBU 15fa As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-05-02 09:28:04.269 UTC [policies] Manager -> DEBU 15fb Manager Channel looking up path [Application]" +orderer0.example.com | "2019-05-02 09:28:04.270 UTC [policies] Manager -> DEBU 15fc Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:28:04.271 UTC [policies] Manager -> DEBU 15fd Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:28:04.272 UTC [policies] Manager -> DEBU 15fe Manager Channel/Application looking up path []" +orderer0.example.com | "2019-05-02 09:28:04.274 UTC [policies] Manager -> DEBU 15ff Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-05-02 09:28:04.275 UTC [policies] Manager -> DEBU 1600 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-05-02 09:28:04.276 UTC [policies] Manager -> DEBU 1601 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-05-02 09:28:04.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1602 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-05-02 09:28:04.277 UTC [common.channelconfig] LogSanityChecks -> DEBU 1603 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-05-02 09:28:04.278 UTC [common.channelconfig] LogSanityChecks -> DEBU 1604 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-05-02 09:28:04.279 UTC [policies] Manager -> DEBU 1605 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-05-02 09:28:04.284 UTC [policies] Manager -> DEBU 1606 Manager Channel has managers Application" +orderer0.example.com | "2019-05-02 09:28:04.285 UTC [policies] Manager -> DEBU 1607 Manager Channel has managers Orderer" +orderer0.example.com | "2019-05-02 09:28:04.286 UTC [policies] Manager -> DEBU 1608 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-05-02 09:28:04.286 UTC [policies] Manager -> DEBU 1609 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-05-02 09:28:04.287 UTC [common.channelconfig] LogSanityChecks -> DEBU 160a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-05-02 09:28:04.287 UTC [common.capabilities] Supported -> DEBU 160b Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:28:04.288 UTC [common.capabilities] Supported -> DEBU 160c Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-05-02 09:28:04.288 UTC [orderer.common.server] func1 -> DEBU 160d Executing callback to update root CAs" +orderer0.example.com | "2019-05-02 09:28:04.289 UTC [orderer.common.server] updateTrustedRoots -> DEBU 160e updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-05-02 09:28:04.290 UTC [orderer.common.server] updateTrustedRoots -> DEBU 160f adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-05-02 09:28:04.290 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1610 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-05-02 09:28:04.291 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1611 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-05-02 09:28:04.292 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1612 adding app root CAs for MSP [Org3MSP]" +orderer0.example.com | "2019-05-02 09:28:04.297 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1613 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 9" +orderer0.example.com | "2019-05-02 09:28:04.298 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1614 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 9" +orderer0.example.com | "2019-05-02 09:28:04.300 UTC [msp.identity] Sign -> DEBU 1615 Sign: plaintext: 0A020809120B0A090A03010203100418...38782EB8550459A628E82A4B1424BD7B " +orderer0.example.com | "2019-05-02 09:28:04.300 UTC [msp.identity] Sign -> DEBU 1616 Sign: digest: 3F9FAB749D98D9BE91CF9BC47487CB032A854E85FED401A4872615AD0D3AA734 " +orderer0.example.com | "2019-05-02 09:28:04.304 UTC [fsblkstorage] indexBlock -> DEBU 1617 Indexing block [blockNum=9, blockHash=[]byte{0xae, 0x40, 0xdc, 0x77, 0x8f, 0x7a, 0x6, 0x29, 0xa2, 0x2c, 0x4f, 0x45, 0x7, 0xc4, 0x6e, 0xb1, 0x3c, 0xef, 0x36, 0xd4, 0x2, 0xad, 0x6a, 0x15, 0xaf, 0x8a, 0xbf, 0xad, 0xa7, 0x18, 0xe2, 0x5} txOffsets= +orderer0.example.com | txId= locPointer=offset=71, bytesLength=33870 +orderer0.example.com | ]" +orderer0.example.com | "2019-05-02 09:28:04.309 UTC [fsblkstorage] updateCheckpoint -> DEBU 1618 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133542], isChainEmpty=[false], lastBlockNumber=[9]" +orderer0.example.com | "2019-05-02 09:28:04.310 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1619 [channel: businesschannel] Wrote block [9]" +orderer0.example.com | "2019-05-02 09:28:04.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161a Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-05-02 09:28:04.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161b Sending msg of 28 bytes to 3 on channel businesschannel took 89.7µs" +orderer0.example.com | "2019-05-02 09:28:04.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.3µs " +orderer0.example.com | "2019-05-02 09:28:04.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.5µs " +orderer0.example.com | "2019-05-02 09:28:04.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 161e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:04.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 161f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:04.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1620 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:04.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1621 Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +orderer0.example.com | "2019-05-02 09:28:04.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1622 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +orderer0.example.com | "2019-05-02 09:28:04.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1623 Sending msg of 28 bytes to 2 on channel businesschannel took 38.4µs" +orderer0.example.com | "2019-05-02 09:28:04.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1624 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +orderer0.example.com | "2019-05-02 09:28:04.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1625 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.4µs " +orderer0.example.com | "2019-05-02 09:28:04.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1626 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.5µs " +orderer0.example.com | "2019-05-02 09:28:04.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1627 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:04.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1628 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:05.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1629 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:05.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162a Sending msg of 28 bytes to 3 on channel testchainid took 32µs" +orderer0.example.com | "2019-05-02 09:28:05.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.6µs " +orderer0.example.com | "2019-05-02 09:28:05.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162c Sending msg of 28 bytes to 2 on channel businesschannel took 38µs" +orderer0.example.com | "2019-05-02 09:28:05.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162d Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-05-02 09:28:05.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.5µs " +orderer0.example.com | "2019-05-02 09:28:05.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5747ms " +orderer0.example.com | "2019-05-02 09:28:05.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1630 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:05.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1631 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:05.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1632 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:05.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1633 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2019-05-02 09:28:05.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1634 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +orderer0.example.com | "2019-05-02 09:28:05.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1635 Sending msg of 28 bytes to 2 on channel businesschannel took 38.2µs" +orderer0.example.com | "2019-05-02 09:28:05.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1636 Sending msg of 28 bytes to 3 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-05-02 09:28:05.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1637 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 490.5µs " +orderer0.example.com | "2019-05-02 09:28:05.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1638 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.4µs " +orderer0.example.com | "2019-05-02 09:28:05.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1639 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:05.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:06.120 UTC [orderer.common.server] Deliver -> DEBU 163b Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:06.120 UTC [common.deliver] Handle -> DEBU 163c Starting new deliver loop for 172.18.0.8:57408" +orderer0.example.com | "2019-05-02 09:28:06.120 UTC [common.deliver] Handle -> DEBU 163d Attempting to read seek info message from 172.18.0.8:57408" +orderer0.example.com | "2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 163e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 163f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 1640 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 1641 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 1642 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.123 UTC [msp] DeserializeIdentity -> DEBU 1643 Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:06.123 UTC [msp.identity] newIdentity -> DEBU 1644 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-05-02 09:28:06.124 UTC [cauthdsl] func1 -> DEBU 1645 0xc0008a2dc0 gate 1556789286124513300 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.124 UTC [cauthdsl] func2 -> DEBU 1646 0xc0008a2dc0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.124 UTC [cauthdsl] func2 -> DEBU 1647 0xc0008a2dc0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.125 UTC [cauthdsl] func2 -> DEBU 1648 0xc0008a2dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:06.125 UTC [cauthdsl] func2 -> DEBU 1649 0xc0008a2dc0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.125 UTC [cauthdsl] func1 -> DEBU 164a 0xc0008a2dc0 gate 1556789286124513300 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.126 UTC [policies] Evaluate -> DEBU 164b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.126 UTC [policies] Evaluate -> DEBU 164c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.126 UTC [policies] Evaluate -> DEBU 164d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.126 UTC [cauthdsl] func1 -> DEBU 164e 0xc000846110 gate 1556789286126635100 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.126 UTC [cauthdsl] func2 -> DEBU 164f 0xc000846110 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.127 UTC [cauthdsl] func2 -> DEBU 1650 0xc000846110 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.127 UTC [cauthdsl] func2 -> DEBU 1651 0xc000846110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:06.127 UTC [cauthdsl] func2 -> DEBU 1652 0xc000846110 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.127 UTC [cauthdsl] func1 -> DEBU 1653 0xc000846110 gate 1556789286126635100 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.128 UTC [policies] Evaluate -> DEBU 1654 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.128 UTC [policies] Evaluate -> DEBU 1655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.129 UTC [policies] Evaluate -> DEBU 1656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.129 UTC [cauthdsl] func1 -> DEBU 1657 0xc000846a50 gate 1556789286129302600 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.129 UTC [cauthdsl] func2 -> DEBU 1658 0xc000846a50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.130 UTC [cauthdsl] func2 -> DEBU 1659 0xc000846a50 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.130 UTC [cauthdsl] func2 -> DEBU 165a 0xc000846a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:06.130 UTC [cauthdsl] func2 -> DEBU 165b 0xc000846a50 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.130 UTC [cauthdsl] func1 -> DEBU 165c 0xc000846a50 gate 1556789286129302600 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.131 UTC [policies] Evaluate -> DEBU 165d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.131 UTC [policies] Evaluate -> DEBU 165e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.131 UTC [policies] func1 -> DEBU 165f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1660 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1661 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1662 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1663 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1664 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.133 UTC [cauthdsl] func1 -> DEBU 1665 0xc0008478c0 gate 1556789286133163000 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.133 UTC [cauthdsl] func2 -> DEBU 1666 0xc0008478c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.133 UTC [cauthdsl] func2 -> DEBU 1667 0xc0008478c0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.134 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1668 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-05-02 09:28:06.134 UTC [msp] Validate -> DEBU 1669 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-05-02 09:28:06.135 UTC [cauthdsl] func2 -> DEBU 166a 0xc0008478c0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:06.135 UTC [msp.identity] Verify -> DEBU 166b Verify: digest = 00000000 15 99 02 6f 82 d1 25 07 bc ac 92 f5 dd 9c 1e 5d |...o..%........]| +orderer0.example.com | 00000010 e1 ac 31 b0 0c a6 47 06 85 5c 7e 65 9a 19 24 16 |..1...G..\~e..$.|" +orderer0.example.com | "2019-05-02 09:28:06.135 UTC [msp.identity] Verify -> DEBU 166c Verify: sig = 00000000 30 45 02 21 00 b1 5e 2a 28 81 d9 3b 83 a4 32 6d |0E.!..^*(..;..2m| +orderer0.example.com | 00000010 a1 a5 56 7d e0 b5 94 65 0f f1 c8 fa e9 2a 6b 7f |..V}...e.....*k.| +orderer0.example.com | 00000020 fa 71 fd ea d2 02 20 6d d6 0d c7 11 9d 63 94 d9 |.q.... m.....c..| +orderer0.example.com | 00000030 80 20 e7 d0 0d d9 b1 90 5a 11 15 a0 42 c9 0b bf |. ......Z...B...| +orderer0.example.com | 00000040 c7 3b be b2 a0 7a cf |.;...z.|" +orderer0.example.com | "2019-05-02 09:28:06.136 UTC [cauthdsl] func2 -> DEBU 166d 0xc0008478c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:06.136 UTC [cauthdsl] func1 -> DEBU 166e 0xc0008478c0 gate 1556789286133163000 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:06.136 UTC [policies] Evaluate -> DEBU 166f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:06.136 UTC [policies] Evaluate -> DEBU 1670 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:06.137 UTC [policies] Evaluate -> DEBU 1671 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.856 UTC [gossip.comm] func1 -> DEBU 137a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.856 UTC [gossip.gossip] handleMessage -> DEBU 137b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.856 UTC [gossip.gossip] handleMessage -> DEBU 137c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 137d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.856 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 137e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [msp] DeserializeIdentity -> DEBU 137f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1380 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1381 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1382 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 1383 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 1384 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 1385 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func1 -> DEBU 1386 0xc0038f3440 gate 1556789252857384200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 1387 0xc0038f3440 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 1388 0xc0038f3440 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 1389 0xc0038f3440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 138a 0xc0038f3440 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [cauthdsl] func1 -> DEBU 138b 0xc0038f3440 gate 1556789252857384200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 138c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 138d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 138e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func1 -> DEBU 138f 0xc0038f3c80 gate 1556789252858088600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1390 0xc0038f3c80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1391 0xc0038f3c80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1392 0xc0038f3c80 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [msp.identity] Verify -> DEBU 1393 Verify: digest = 00000000 9d 59 25 df 50 a2 aa 38 9d 0b a5 8d 90 bf 58 99 |.Y%.P..8......X.| +peer0.org1.example.com | 00000010 ac 25 ff b9 93 f4 4e 4c 0f 7b ff 98 89 d6 31 46 |.%....NL.{....1F|" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [msp.identity] Verify -> DEBU 1394 Verify: sig = 00000000 30 44 02 20 0e 22 75 2b e1 07 24 45 1f 71 fa 37 |0D. ."u+..$E.q.7| +peer0.org1.example.com | 00000010 dd 59 0b e0 63 ad 6c 70 eb 0c f5 59 00 ce c8 33 |.Y..c.lp...Y...3| +peer0.org1.example.com | 00000020 03 26 bb d2 02 20 1b 10 c6 df a0 4d e9 1d 1d 8c |.&... .....M....| +peer0.org1.example.com | 00000030 91 5f 9d 4b 16 d8 82 c6 b9 b7 b4 80 25 40 1a 1a |._.K........%@..| +peer0.org1.example.com | 00000040 ad b7 3b 70 81 a7 |..;p..|" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1395 0xc0038f3c80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [cauthdsl] func1 -> DEBU 1396 0xc0038f3c80 gate 1556789252858088600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 1397 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 1398 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 1399 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 139a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 139b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139d updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 " +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 " +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 13a0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13a2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.discovery] sendMemResponse -> DEBU 13a3 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [msp] DeserializeIdentity -> DEBU 13a4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [msp] DeserializeIdentity -> DEBU 13a5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [msp] DeserializeIdentity -> DEBU 13a6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.comm] Send -> DEBU 13a7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.discovery] sendMemResponse -> DEBU 13a8 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.comm] sendToEndpoint -> DEBU 13a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:32.859 UTC [gossip.comm] sendToEndpoint -> DEBU 13aa Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.004 UTC [msp] DeserializeIdentity -> DEBU 13ab Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.005 UTC [msp] DeserializeIdentity -> DEBU 13ac Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.007 UTC [gossip.pull] Hello -> DEBU 13ad Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:33.008 UTC [msp] DeserializeIdentity -> DEBU 13ae Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.009 UTC [msp] DeserializeIdentity -> DEBU 13af Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.009 UTC [gossip.comm] Send -> DEBU 13b0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.010 UTC [gossip.comm] sendToEndpoint -> DEBU 13b1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.010 UTC [gossip.comm] sendToEndpoint -> DEBU 13b2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.016 UTC [gossip.gossip] handleMessage -> DEBU 13b3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12447959082874087959 , Msg_type: BLOCK_MSG, digests: [1 3 4 2], Envelope: 46 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.016 UTC [gossip.pull] HandleMessage -> DEBU 13b4 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12447959082874087959 , Msg_type: BLOCK_MSG, digests: [1 3 4 2], Envelope: 46 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.016 UTC [gossip.gossip] handleMessage -> DEBU 13b5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.017 UTC [gossip.comm] func1 -> DEBU 13b6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.017 UTC [gossip.gossip] handleMessage -> DEBU 13b7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.017 UTC [msp] DeserializeIdentity -> DEBU 13b8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.018 UTC [msp] DeserializeIdentity -> DEBU 13b9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.018 UTC [msp] DeserializeIdentity -> DEBU 13ba Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.018 UTC [gossip.gossip] handleMessage -> DEBU 13bb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.033 UTC [gossip.gossip] handleMessage -> DEBU 13bc Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.034 UTC [msp] DeserializeIdentity -> DEBU 13bd Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:06.137 UTC [policies] Evaluate -> DEBU 1672 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:06.138 UTC [policies] Evaluate -> DEBU 1673 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:06.138 UTC [policies] Evaluate -> DEBU 1674 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:06.138 UTC [common.deliver] deliverBlocks -> DEBU 1675 [channel: businesschannel] Received seekInfo (0xc001190640) start: > stop: > from 172.18.0.8:57408" +orderer0.example.com | "2019-05-02 09:28:06.139 UTC [fsblkstorage] Next -> DEBU 1676 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:06.139 UTC [fsblkstorage] newBlockfileStream -> DEBU 1677 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +orderer0.example.com | "2019-05-02 09:28:06.139 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1678 Remaining bytes=[34877], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:06.139 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1679 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +orderer0.example.com | "2019-05-02 09:28:06.140 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 167a blockbytes [34874] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:06.140 UTC [common.deliver] deliverBlocks -> DEBU 167b [channel: businesschannel] Delivering block [9] for (0xc001190640) for 172.18.0.8:57408" +orderer0.example.com | "2019-05-02 09:28:06.140 UTC [common.deliver] deliverBlocks -> DEBU 167c [channel: businesschannel] Done delivering to 172.18.0.8:57408 for (0xc001190640)" +orderer0.example.com | "2019-05-02 09:28:06.141 UTC [common.deliver] Handle -> DEBU 167d Waiting for new SeekInfo from 172.18.0.8:57408" +orderer0.example.com | "2019-05-02 09:28:06.142 UTC [common.deliver] Handle -> DEBU 167e Attempting to read seek info message from 172.18.0.8:57408" +orderer0.example.com | "2019-05-02 09:28:06.146 UTC [grpc] infof -> DEBU 167f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:06.146 UTC [common.deliver] Handle -> WARN 1680 Error reading from 172.18.0.8:57408: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:06.147 UTC [orderer.common.server] func1 -> DEBU 1681 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:06.147 UTC [comm.grpc.server] 1 -> INFO 1682 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57408 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.3689ms +orderer0.example.com | "2019-05-02 09:28:06.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1683 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:06.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1684 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2019-05-02 09:28:06.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1685 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " +orderer0.example.com | "2019-05-02 09:28:06.290 UTC [orderer.common.server] Deliver -> DEBU 1686 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:06.290 UTC [common.deliver] Handle -> DEBU 1687 Starting new deliver loop for 172.18.0.8:57410" +orderer0.example.com | "2019-05-02 09:28:06.291 UTC [common.deliver] Handle -> DEBU 1688 Attempting to read seek info message from 172.18.0.8:57410" +orderer0.example.com | "2019-05-02 09:28:06.291 UTC [policies] Evaluate -> DEBU 1689 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.291 UTC [policies] Evaluate -> DEBU 168a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:06.292 UTC [policies] Evaluate -> DEBU 168b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.292 UTC [policies] Evaluate -> DEBU 168c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:06.292 UTC [policies] Evaluate -> DEBU 168d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.292 UTC [cauthdsl] func1 -> DEBU 168e 0xc000280bf0 gate 1556789286292646400 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.292 UTC [cauthdsl] func2 -> DEBU 168f 0xc000280bf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.293 UTC [cauthdsl] func2 -> DEBU 1690 0xc000280bf0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.293 UTC [cauthdsl] func2 -> DEBU 1691 0xc000280bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:06.293 UTC [cauthdsl] func2 -> DEBU 1692 0xc000280bf0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.293 UTC [cauthdsl] func1 -> DEBU 1693 0xc000280bf0 gate 1556789286292646400 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.293 UTC [policies] Evaluate -> DEBU 1694 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.293 UTC [policies] Evaluate -> DEBU 1695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.294 UTC [policies] Evaluate -> DEBU 1696 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.294 UTC [cauthdsl] func1 -> DEBU 1697 0xc0002815f0 gate 1556789286294374000 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.294 UTC [cauthdsl] func2 -> DEBU 1698 0xc0002815f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.294 UTC [cauthdsl] func2 -> DEBU 1699 0xc0002815f0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.295 UTC [cauthdsl] func2 -> DEBU 169a 0xc0002815f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:06.295 UTC [cauthdsl] func2 -> DEBU 169b 0xc0002815f0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.295 UTC [cauthdsl] func1 -> DEBU 169c 0xc0002815f0 gate 1556789286294374000 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.295 UTC [policies] Evaluate -> DEBU 169d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.295 UTC [policies] Evaluate -> DEBU 169e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.296 UTC [policies] Evaluate -> DEBU 169f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.296 UTC [cauthdsl] func1 -> DEBU 16a0 0xc000281e30 gate 1556789286296265600 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.296 UTC [cauthdsl] func2 -> DEBU 16a1 0xc000281e30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.296 UTC [cauthdsl] func2 -> DEBU 16a2 0xc000281e30 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.296 UTC [cauthdsl] func2 -> DEBU 16a3 0xc000281e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:06.297 UTC [cauthdsl] func2 -> DEBU 16a4 0xc000281e30 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.297 UTC [cauthdsl] func1 -> DEBU 16a5 0xc000281e30 gate 1556789286296265600 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.297 UTC [policies] Evaluate -> DEBU 16a6 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.297 UTC [policies] Evaluate -> DEBU 16a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.298 UTC [policies] func1 -> DEBU 16a8 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:06.298 UTC [policies] Evaluate -> DEBU 16a9 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:06.298 UTC [policies] Evaluate -> DEBU 16aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:06.299 UTC [policies] Evaluate -> DEBU 16ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.299 UTC [policies] Evaluate -> DEBU 16ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:06.299 UTC [policies] Evaluate -> DEBU 16ad == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.299 UTC [cauthdsl] func1 -> DEBU 16ae 0xc0002f6e60 gate 1556789286299774000 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.299 UTC [cauthdsl] func2 -> DEBU 16af 0xc0002f6e60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.300 UTC [cauthdsl] func2 -> DEBU 16b0 0xc0002f6e60 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.300 UTC [cauthdsl] func2 -> DEBU 16b1 0xc0002f6e60 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:06.300 UTC [msp.identity] Verify -> DEBU 16b2 Verify: digest = 00000000 e6 67 d1 c0 27 41 5d bd d7 c7 29 eb 81 a4 00 01 |.g..'A]...).....| +orderer0.example.com | 00000010 bb 77 6d 93 ac 1c aa d0 06 fe df 6f ae 0a 63 e8 |.wm........o..c.|" +orderer0.example.com | "2019-05-02 09:28:06.300 UTC [msp.identity] Verify -> DEBU 16b3 Verify: sig = 00000000 30 44 02 20 62 99 d0 52 fe be 42 f1 8a 07 7f 1e |0D. b..R..B.....| +orderer0.example.com | 00000010 2a 1e 87 aa 6a 3f 66 97 21 55 78 90 c4 6e 37 21 |*...j?f.!Ux..n7!| +orderer0.example.com | 00000020 98 66 4b 69 02 20 45 11 e1 36 06 a2 33 88 a5 2c |.fKi. E..6..3..,| +orderer0.example.com | 00000030 ff 95 17 22 b8 c3 e4 ae bd 1a e9 34 52 93 bc b7 |...".......4R...| +orderer0.example.com | 00000040 8e a5 b9 3b e1 01 |...;..|" +orderer0.example.com | "2019-05-02 09:28:06.301 UTC [cauthdsl] func2 -> DEBU 16b4 0xc0002f6e60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:06.301 UTC [cauthdsl] func1 -> DEBU 16b5 0xc0002f6e60 gate 1556789286299774000 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:06.301 UTC [policies] Evaluate -> DEBU 16b6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:06.301 UTC [policies] Evaluate -> DEBU 16b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16b8 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16ba Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16bb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:06.302 UTC [common.deliver] deliverBlocks -> DEBU 16bc [channel: businesschannel] Received seekInfo (0xc001190ec0) start: > stop: > from 172.18.0.8:57410" +orderer0.example.com | "2019-05-02 09:28:06.303 UTC [fsblkstorage] Next -> DEBU 16bd Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:06.303 UTC [fsblkstorage] newBlockfileStream -> DEBU 16be newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +orderer0.example.com | "2019-05-02 09:28:06.303 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16bf Remaining bytes=[34877], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:06.303 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16c0 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +orderer0.example.com | "2019-05-02 09:28:06.303 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16c1 blockbytes [34874] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:06.304 UTC [common.deliver] deliverBlocks -> DEBU 16c2 [channel: businesschannel] Delivering block [9] for (0xc001190ec0) for 172.18.0.8:57410" +orderer0.example.com | "2019-05-02 09:28:06.304 UTC [common.deliver] deliverBlocks -> DEBU 16c3 [channel: businesschannel] Done delivering to 172.18.0.8:57410 for (0xc001190ec0)" +orderer0.example.com | "2019-05-02 09:28:06.304 UTC [common.deliver] Handle -> DEBU 16c4 Waiting for new SeekInfo from 172.18.0.8:57410" +orderer0.example.com | "2019-05-02 09:28:06.304 UTC [common.deliver] Handle -> DEBU 16c5 Attempting to read seek info message from 172.18.0.8:57410" +orderer0.example.com | "2019-05-02 09:28:06.307 UTC [common.deliver] Handle -> WARN 16c6 Error reading from 172.18.0.8:57410: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:06.308 UTC [orderer.common.server] func1 -> DEBU 16c8 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:06.309 UTC [comm.grpc.server] 1 -> INFO 16c9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57410 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.3832ms +orderer0.example.com | "2019-05-02 09:28:06.308 UTC [grpc] infof -> DEBU 16c7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:06.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ca Sending msg of 28 bytes to 2 on channel businesschannel took 34.4µs" +orderer0.example.com | "2019-05-02 09:28:06.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16cb Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2019-05-02 09:28:06.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104µs " +orderer0.example.com | "2019-05-02 09:28:06.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs " +orderer0.example.com | "2019-05-02 09:28:06.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16ce Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:06.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16cf Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:06.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16d0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:06.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16d1 Sending msg of 28 bytes to 3 on channel testchainid took 132µs" +peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13bf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13c0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [policies] Evaluate -> DEBU 13c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [policies] Evaluate -> DEBU 13c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:33.035 UTC [policies] Evaluate -> DEBU 13c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.036 UTC [cauthdsl] func1 -> DEBU 13c4 0xc002c58190 gate 1556789253036212000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.036 UTC [cauthdsl] func2 -> DEBU 13c5 0xc002c58190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.036 UTC [cauthdsl] func2 -> DEBU 13c6 0xc002c58190 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.036 UTC [cauthdsl] func2 -> DEBU 13c7 0xc002c58190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [cauthdsl] func2 -> DEBU 13c8 0xc002c58190 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [cauthdsl] func1 -> DEBU 13c9 0xc002c58190 gate 1556789253036212000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [policies] Evaluate -> DEBU 13ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [policies] Evaluate -> DEBU 13cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [policies] Evaluate -> DEBU 13cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.037 UTC [cauthdsl] func1 -> DEBU 13cd 0xc002c589d0 gate 1556789253037762500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.038 UTC [cauthdsl] func2 -> DEBU 13ce 0xc002c589d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.038 UTC [cauthdsl] func2 -> DEBU 13cf 0xc002c589d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.038 UTC [cauthdsl] func2 -> DEBU 13d0 0xc002c589d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.038 UTC [msp.identity] Verify -> DEBU 13d1 Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +peer0.org1.example.com | "2019-05-02 09:27:33.038 UTC [msp.identity] Verify -> DEBU 13d2 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|" +peer0.org1.example.com | "2019-05-02 09:27:33.039 UTC [gossip.comm] func1 -> DEBU 13d3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.040 UTC [cauthdsl] func2 -> DEBU 13d4 0xc002c589d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.040 UTC [cauthdsl] func1 -> DEBU 13d5 0xc002c589d0 gate 1556789253037762500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:33.041 UTC [policies] Evaluate -> DEBU 13d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.041 UTC [policies] Evaluate -> DEBU 13d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.041 UTC [policies] Evaluate -> DEBU 13d8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.042 UTC [policies] Evaluate -> DEBU 13d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.043 UTC [msp] DeserializeIdentity -> DEBU 13da Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.043 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13db Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.043 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13dc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.043 UTC [policies] Evaluate -> DEBU 13dd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.046 UTC [policies] Evaluate -> DEBU 13de This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:33.046 UTC [policies] Evaluate -> DEBU 13df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.047 UTC [cauthdsl] func1 -> DEBU 13e0 0xc002c59ab0 gate 1556789253047205100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.047 UTC [cauthdsl] func2 -> DEBU 13e1 0xc002c59ab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.047 UTC [cauthdsl] func2 -> DEBU 13e2 0xc002c59ab0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.047 UTC [cauthdsl] func2 -> DEBU 13e3 0xc002c59ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:33.048 UTC [cauthdsl] func2 -> DEBU 13e4 0xc002c59ab0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.048 UTC [cauthdsl] func1 -> DEBU 13e5 0xc002c59ab0 gate 1556789253047205100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.049 UTC [policies] Evaluate -> DEBU 13e6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.049 UTC [policies] Evaluate -> DEBU 13e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.049 UTC [policies] Evaluate -> DEBU 13e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.049 UTC [cauthdsl] func1 -> DEBU 13e9 0xc002fd42f0 gate 1556789253049289000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.049 UTC [cauthdsl] func2 -> DEBU 13ea 0xc002fd42f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.050 UTC [cauthdsl] func2 -> DEBU 13eb 0xc002fd42f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.050 UTC [cauthdsl] func2 -> DEBU 13ec 0xc002fd42f0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.050 UTC [msp.identity] Verify -> DEBU 13ed Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +peer0.org1.example.com | "2019-05-02 09:27:33.051 UTC [msp.identity] Verify -> DEBU 13ee Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|" +peer0.org1.example.com | "2019-05-02 09:27:33.051 UTC [cauthdsl] func2 -> DEBU 13ef 0xc002fd42f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.054 UTC [cauthdsl] func1 -> DEBU 13f0 0xc002fd42f0 gate 1556789253049289000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.058 UTC [gossip.gossip] handleMessage -> DEBU 13f5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.059 UTC [gossip.gossip] handleMessage -> DEBU 13f6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.059 UTC [msp] DeserializeIdentity -> DEBU 13f7 Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:06.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.3µs " +orderer0.example.com | "2019-05-02 09:28:06.868 UTC [orderer.common.server] Deliver -> DEBU 16d3 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:06.868 UTC [common.deliver] Handle -> DEBU 16d4 Starting new deliver loop for 172.18.0.8:57412" +orderer0.example.com | "2019-05-02 09:28:06.868 UTC [common.deliver] Handle -> DEBU 16d5 Attempting to read seek info message from 172.18.0.8:57412" +orderer0.example.com | "2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.869 UTC [cauthdsl] func1 -> DEBU 16db 0xc00029e130 gate 1556789286869917300 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.869 UTC [cauthdsl] func2 -> DEBU 16dc 0xc00029e130 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.870 UTC [cauthdsl] func2 -> DEBU 16dd 0xc00029e130 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.870 UTC [cauthdsl] func2 -> DEBU 16de 0xc00029e130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:06.870 UTC [cauthdsl] func2 -> DEBU 16df 0xc00029e130 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.871 UTC [cauthdsl] func1 -> DEBU 16e0 0xc00029e130 gate 1556789286869917300 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.871 UTC [policies] Evaluate -> DEBU 16e1 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.871 UTC [policies] Evaluate -> DEBU 16e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.872 UTC [policies] Evaluate -> DEBU 16e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.872 UTC [cauthdsl] func1 -> DEBU 16e4 0xc00029eef0 gate 1556789286872551500 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e5 0xc00029eef0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e6 0xc00029eef0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e7 0xc00029eef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e8 0xc00029eef0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.873 UTC [cauthdsl] func1 -> DEBU 16e9 0xc00029eef0 gate 1556789286872551500 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.874 UTC [policies] Evaluate -> DEBU 16ea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.874 UTC [policies] Evaluate -> DEBU 16eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.874 UTC [policies] Evaluate -> DEBU 16ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.874 UTC [cauthdsl] func1 -> DEBU 16ed 0xc00029f740 gate 1556789286874908800 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16ee 0xc00029f740 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16ef 0xc00029f740 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16f0 0xc00029f740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16f1 0xc00029f740 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.875 UTC [cauthdsl] func1 -> DEBU 16f2 0xc00029f740 gate 1556789286874908800 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:06.875 UTC [policies] Evaluate -> DEBU 16f3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.876 UTC [policies] Evaluate -> DEBU 16f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:06.876 UTC [policies] func1 -> DEBU 16f5 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:06.876 UTC [policies] Evaluate -> DEBU 16f6 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:06.876 UTC [policies] Evaluate -> DEBU 16f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:06.877 UTC [policies] Evaluate -> DEBU 16f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.877 UTC [policies] Evaluate -> DEBU 16f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:06.877 UTC [policies] Evaluate -> DEBU 16fa == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:06.878 UTC [cauthdsl] func1 -> DEBU 16fb 0xc0000e05b0 gate 1556789286878209600 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:06.878 UTC [cauthdsl] func2 -> DEBU 16fc 0xc0000e05b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:06.878 UTC [cauthdsl] func2 -> DEBU 16fd 0xc0000e05b0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:06.879 UTC [cauthdsl] func2 -> DEBU 16fe 0xc0000e05b0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:06.879 UTC [msp.identity] Verify -> DEBU 16ff Verify: digest = 00000000 df 81 da 94 ae 24 38 32 83 21 79 12 4e 49 6d 6b |.....$82.!y.NImk| +orderer0.example.com | 00000010 d7 16 48 49 91 d7 c1 db d3 b6 ae be 50 d0 93 7c |..HI........P..||" +orderer0.example.com | "2019-05-02 09:28:06.879 UTC [msp.identity] Verify -> DEBU 1700 Verify: sig = 00000000 30 44 02 20 04 77 7f 3f a2 b2 27 58 fb 08 f2 80 |0D. .w.?..'X....| +orderer0.example.com | 00000010 a2 cc 55 9f 22 5f 77 eb 20 f2 68 9c 75 e9 9b 70 |..U."_w. .h.u..p| +orderer0.example.com | 00000020 64 3b 5a ef 02 20 66 1e c5 16 f2 1d 09 bb 6e b6 |d;Z.. f.......n.| +orderer0.example.com | 00000030 a7 af ec 49 c5 45 5c f6 56 19 66 b2 b8 a5 40 b5 |...I.E\.V.f...@.| +orderer0.example.com | 00000040 8c 8f 1c 1b 75 14 |....u.|" +orderer0.example.com | "2019-05-02 09:28:06.880 UTC [cauthdsl] func2 -> DEBU 1701 0xc0000e05b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:06.880 UTC [cauthdsl] func1 -> DEBU 1702 0xc0000e05b0 gate 1556789286878209600 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:06.880 UTC [policies] Evaluate -> DEBU 1703 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:06.880 UTC [policies] Evaluate -> DEBU 1704 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.060 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:33.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13f9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13fa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.064 UTC [msp] DeserializeIdentity -> DEBU 13fb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.064 UTC [msp] DeserializeIdentity -> DEBU 13fc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.064 UTC [gossip.comm] Send -> DEBU 13fd Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.065 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.065 UTC [msp] DeserializeIdentity -> DEBU 13ff Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.066 UTC [gossip.comm] sendToEndpoint -> DEBU 1400 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.066 UTC [gossip.comm] sendToEndpoint -> DEBU 1401 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.067 UTC [gossip.comm] sendToEndpoint -> DEBU 1402 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.067 UTC [gossip.comm] sendToEndpoint -> DEBU 1403 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.061 UTC [policies] Evaluate -> DEBU 1404 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.071 UTC [policies] Evaluate -> DEBU 1405 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:33.071 UTC [policies] Evaluate -> DEBU 1406 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.071 UTC [cauthdsl] func1 -> DEBU 1407 0xc002fd5c10 gate 1556789253071235100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.074 UTC [cauthdsl] func2 -> DEBU 1408 0xc002fd5c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.074 UTC [cauthdsl] func2 -> DEBU 1409 0xc002fd5c10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.074 UTC [cauthdsl] func2 -> DEBU 140a 0xc002fd5c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:33.075 UTC [cauthdsl] func2 -> DEBU 140b 0xc002fd5c10 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.075 UTC [cauthdsl] func1 -> DEBU 140c 0xc002fd5c10 gate 1556789253071235100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.075 UTC [policies] Evaluate -> DEBU 140d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.075 UTC [policies] Evaluate -> DEBU 140e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.075 UTC [policies] Evaluate -> DEBU 140f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [cauthdsl] func1 -> DEBU 1410 0xc00354e450 gate 1556789253076117400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [cauthdsl] func2 -> DEBU 1411 0xc00354e450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [cauthdsl] func2 -> DEBU 1412 0xc00354e450 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [cauthdsl] func2 -> DEBU 1413 0xc00354e450 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [msp.identity] Verify -> DEBU 1414 Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +peer0.org1.example.com | "2019-05-02 09:27:33.076 UTC [msp.identity] Verify -> DEBU 1415 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|" +peer0.org1.example.com | "2019-05-02 09:27:33.077 UTC [cauthdsl] func2 -> DEBU 1416 0xc00354e450 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.077 UTC [cauthdsl] func1 -> DEBU 1417 0xc00354e450 gate 1556789253076117400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:33.077 UTC [policies] Evaluate -> DEBU 1418 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.077 UTC [policies] Evaluate -> DEBU 1419 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.078 UTC [policies] Evaluate -> DEBU 141a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.078 UTC [policies] Evaluate -> DEBU 141b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.078 UTC [msp] DeserializeIdentity -> DEBU 141c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.078 UTC [gossip.gossip] handleMessage -> DEBU 141d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.083 UTC [msp.identity] Sign -> DEBU 141e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151014 " +peer0.org1.example.com | "2019-05-02 09:27:33.083 UTC [msp.identity] Sign -> DEBU 141f Sign: digest: C7341FCE558934916948EBA451F397BBCD8EB1334C90B5C2BE0FDD59FC916F20 " +peer0.org1.example.com | "2019-05-02 09:27:33.084 UTC [msp.identity] Sign -> DEBU 1420 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:33.084 UTC [msp.identity] Sign -> DEBU 1421 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:33.084 UTC [gossip.comm] Send -> DEBU 1422 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.085 UTC [msp] DeserializeIdentity -> DEBU 1423 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.085 UTC [gossip.comm] Send -> DEBU 1424 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.085 UTC [msp] DeserializeIdentity -> DEBU 1425 Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:06.881 UTC [policies] Evaluate -> DEBU 1705 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:06.881 UTC [policies] Evaluate -> DEBU 1706 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:06.881 UTC [policies] Evaluate -> DEBU 1707 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:06.882 UTC [policies] Evaluate -> DEBU 1708 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:06.882 UTC [common.deliver] deliverBlocks -> DEBU 1709 [channel: businesschannel] Received seekInfo (0xc001191500) start: > stop: > from 172.18.0.8:57412" +orderer0.example.com | "2019-05-02 09:28:06.882 UTC [fsblkstorage] Next -> DEBU 170a Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:06.883 UTC [fsblkstorage] newBlockfileStream -> DEBU 170b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +orderer0.example.com | "2019-05-02 09:28:06.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 170c Remaining bytes=[34877], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:06.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 170d Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +orderer0.example.com | "2019-05-02 09:28:06.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 170e blockbytes [34874] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:06.884 UTC [common.deliver] deliverBlocks -> DEBU 170f [channel: businesschannel] Delivering block [9] for (0xc001191500) for 172.18.0.8:57412" +orderer0.example.com | "2019-05-02 09:28:06.885 UTC [common.deliver] deliverBlocks -> DEBU 1710 [channel: businesschannel] Done delivering to 172.18.0.8:57412 for (0xc001191500)" +orderer0.example.com | "2019-05-02 09:28:06.886 UTC [common.deliver] Handle -> DEBU 1711 Waiting for new SeekInfo from 172.18.0.8:57412" +orderer0.example.com | "2019-05-02 09:28:06.886 UTC [common.deliver] Handle -> DEBU 1712 Attempting to read seek info message from 172.18.0.8:57412" +orderer0.example.com | "2019-05-02 09:28:06.891 UTC [common.deliver] Handle -> WARN 1713 Error reading from 172.18.0.8:57412: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:06.891 UTC [grpc] infof -> DEBU 1714 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:06.892 UTC [orderer.common.server] func1 -> DEBU 1715 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:06.892 UTC [comm.grpc.server] 1 -> INFO 1716 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57412 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.0172ms +orderer0.example.com | "2019-05-02 09:28:06.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1717 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-05-02 09:28:06.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1718 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" +orderer0.example.com | "2019-05-02 09:28:06.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1719 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 163µs " +orderer0.example.com | "2019-05-02 09:28:06.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 171a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.2µs " +orderer0.example.com | "2019-05-02 09:28:06.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:06.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:07.064 UTC [orderer.common.server] Deliver -> DEBU 171d Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:07.064 UTC [common.deliver] Handle -> DEBU 171e Starting new deliver loop for 172.18.0.8:57414" +orderer0.example.com | "2019-05-02 09:28:07.065 UTC [common.deliver] Handle -> DEBU 171f Attempting to read seek info message from 172.18.0.8:57414" +orderer0.example.com | "2019-05-02 09:28:07.066 UTC [policies] Evaluate -> DEBU 1720 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.066 UTC [policies] Evaluate -> DEBU 1721 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.066 UTC [policies] Evaluate -> DEBU 1722 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.067 UTC [policies] Evaluate -> DEBU 1723 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.067 UTC [policies] Evaluate -> DEBU 1724 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.067 UTC [cauthdsl] func1 -> DEBU 1725 0xc00084ce10 gate 1556789287067886600 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1726 0xc00084ce10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1727 0xc00084ce10 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1728 0xc00084ce10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1729 0xc00084ce10 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.069 UTC [cauthdsl] func1 -> DEBU 172a 0xc00084ce10 gate 1556789287067886600 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.069 UTC [policies] Evaluate -> DEBU 172b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.069 UTC [policies] Evaluate -> DEBU 172c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.069 UTC [policies] Evaluate -> DEBU 172d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.070 UTC [cauthdsl] func1 -> DEBU 172e 0xc00084d660 gate 1556789287069961300 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 172f 0xc00084d660 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 1730 0xc00084d660 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 1731 0xc00084d660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 1732 0xc00084d660 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.071 UTC [cauthdsl] func1 -> DEBU 1733 0xc00084d660 gate 1556789287069961300 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.071 UTC [policies] Evaluate -> DEBU 1734 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.071 UTC [policies] Evaluate -> DEBU 1735 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.071 UTC [policies] Evaluate -> DEBU 1736 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.085 UTC [gossip.comm] Send -> DEBU 1426 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.086 UTC [gossip.comm] sendToEndpoint -> DEBU 1427 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.086 UTC [gossip.comm] sendToEndpoint -> DEBU 1428 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.086 UTC [gossip.comm] sendToEndpoint -> DEBU 1429 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.087 UTC [gossip.comm] sendToEndpoint -> DEBU 142a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.087 UTC [gossip.comm] sendToEndpoint -> DEBU 142b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.087 UTC [gossip.comm] sendToEndpoint -> DEBU 142c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.094 UTC [gossip.gossip] handleMessage -> DEBU 142d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.094 UTC [gossip.gossip] handleMessage -> DEBU 142e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.095 UTC [gossip.discovery] handleMsgFromComm -> DEBU 142f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.095 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1430 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:33.095 UTC [msp.identity] Verify -> DEBU 1431 Verify: digest = 00000000 28 e3 c7 ef f6 39 26 c9 69 7f de f3 56 21 b3 63 |(....9&.i...V!.c| +peer0.org1.example.com | 00000010 c9 05 70 6a be ac a3 02 e6 39 c0 a6 da c2 f6 7a |..pj.....9.....z|" +peer0.org1.example.com | "2019-05-02 09:27:33.095 UTC [msp.identity] Verify -> DEBU 1432 Verify: sig = 00000000 30 45 02 21 00 9b dc 4c 9d 3b c5 05 f5 fa a4 0c |0E.!...L.;......| +peer0.org1.example.com | 00000010 5b f8 85 2a ba 0f 5a bf e7 d2 f0 12 72 2a 5d 69 |[..*..Z.....r*]i| +peer0.org1.example.com | 00000020 3d 33 94 08 4a 02 20 2c a5 3f 2a da 8b de 2b 08 |=3..J. ,.?*...+.| +peer0.org1.example.com | 00000030 7b 5d 5a 51 c5 2d e9 44 42 47 aa e5 44 9b 1d 90 |{]ZQ.-.DBG..D...| +peer0.org1.example.com | 00000040 7e 09 8a 22 c7 ac 46 |~.."..F|" +peer0.org1.example.com | "2019-05-02 09:27:33.096 UTC [gossip.discovery] handleAliveMessage -> DEBU 1433 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.096 UTC [gossip.discovery] handleAliveMessage -> DEBU 1434 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.096 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1435 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:33.097 UTC [msp.identity] Verify -> DEBU 1436 Verify: digest = 00000000 c7 34 1f ce 55 89 34 91 69 48 eb a4 51 f3 97 bb |.4..U.4.iH..Q...| +peer0.org1.example.com | 00000010 cd 8e b1 33 4c 90 b5 c2 be 0f dd 59 fc 91 6f 20 |...3L......Y..o |" +peer0.org1.example.com | "2019-05-02 09:27:33.097 UTC [msp.identity] Verify -> DEBU 1437 Verify: sig = 00000000 30 45 02 21 00 91 2d 00 1e 7a bc f6 09 62 76 14 |0E.!..-..z...bv.| +peer0.org1.example.com | 00000010 bf 6d 53 a6 8a 03 5f 1e 9c ba 63 aa 9e 34 9c 93 |.mS..._...c..4..| +peer0.org1.example.com | 00000020 14 b5 10 1e a6 02 20 13 bc b1 ee f7 e2 22 1f 39 |...... ......".9| +peer0.org1.example.com | 00000030 1f 96 a9 ae 98 d6 1a 34 de 0d 0e 69 ca d3 88 cc |.......4...i....| +peer0.org1.example.com | 00000040 34 08 a7 4b b1 c3 0d |4..K...|" +peer0.org1.example.com | "2019-05-02 09:27:33.098 UTC [gossip.discovery] handleAliveMessage -> DEBU 1438 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.098 UTC [gossip.discovery] isSentByMe -> DEBU 1439 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.098 UTC [gossip.discovery] handleAliveMessage -> DEBU 143a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.099 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 143b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:33.099 UTC [msp] DeserializeIdentity -> DEBU 143c Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:07.072 UTC [cauthdsl] func1 -> DEBU 1737 0xc00084dea0 gate 1556789287072160100 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.072 UTC [cauthdsl] func2 -> DEBU 1738 0xc00084dea0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.072 UTC [cauthdsl] func2 -> DEBU 1739 0xc00084dea0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.072 UTC [cauthdsl] func2 -> DEBU 173a 0xc00084dea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.073 UTC [cauthdsl] func2 -> DEBU 173b 0xc00084dea0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.073 UTC [cauthdsl] func1 -> DEBU 173c 0xc00084dea0 gate 1556789287072160100 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.073 UTC [policies] Evaluate -> DEBU 173d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.074 UTC [policies] Evaluate -> DEBU 173e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.074 UTC [policies] func1 -> DEBU 173f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:07.075 UTC [policies] Evaluate -> DEBU 1740 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.075 UTC [policies] Evaluate -> DEBU 1741 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.076 UTC [policies] Evaluate -> DEBU 1742 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.076 UTC [policies] Evaluate -> DEBU 1743 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.076 UTC [policies] Evaluate -> DEBU 1744 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.077 UTC [cauthdsl] func1 -> DEBU 1745 0xc0008e4cf0 gate 1556789287077290500 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.077 UTC [cauthdsl] func2 -> DEBU 1746 0xc0008e4cf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.077 UTC [cauthdsl] func2 -> DEBU 1747 0xc0008e4cf0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.078 UTC [cauthdsl] func2 -> DEBU 1748 0xc0008e4cf0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:07.078 UTC [msp.identity] Verify -> DEBU 1749 Verify: digest = 00000000 03 fc 72 46 26 c5 b9 b1 0a ad 9c ea 08 c0 4d cf |..rF&.........M.| +orderer0.example.com | 00000010 2b 2d 19 e8 2c 5a e5 d4 a9 c7 11 d2 22 88 26 71 |+-..,Z......".&q|" +orderer0.example.com | "2019-05-02 09:28:07.078 UTC [msp.identity] Verify -> DEBU 174a Verify: sig = 00000000 30 45 02 21 00 99 d2 71 1c 6f cd a6 fc 0f 1b 07 |0E.!...q.o......| +orderer0.example.com | 00000010 1a 32 df 27 10 64 ba 51 dd 7a 35 c0 02 a7 52 8e |.2.'.d.Q.z5...R.| +orderer0.example.com | 00000020 48 d3 63 b2 91 02 20 1a 15 b7 77 bc 9c 16 d7 49 |H.c... ...w....I| +orderer0.example.com | 00000030 0c 06 28 1b 6a 0c f2 41 e1 6f 9d c5 10 01 17 82 |..(.j..A.o......| +orderer0.example.com | 00000040 31 98 aa 46 d5 f4 3e |1..F..>|" +orderer0.example.com | "2019-05-02 09:28:07.079 UTC [cauthdsl] func2 -> DEBU 174b 0xc0008e4cf0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:07.079 UTC [cauthdsl] func1 -> DEBU 174c 0xc0008e4cf0 gate 1556789287077290500 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 174d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 174e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 174f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 1750 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.081 UTC [policies] Evaluate -> DEBU 1751 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.081 UTC [policies] Evaluate -> DEBU 1752 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.081 UTC [common.deliver] deliverBlocks -> DEBU 1753 [channel: businesschannel] Received seekInfo (0xc0008d0700) start: > stop: > from 172.18.0.8:57414" +orderer0.example.com | "2019-05-02 09:28:07.082 UTC [fsblkstorage] Next -> DEBU 1754 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:07.082 UTC [fsblkstorage] newBlockfileStream -> DEBU 1755 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +orderer0.example.com | "2019-05-02 09:28:07.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1756 Remaining bytes=[34877], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:07.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1757 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +orderer0.example.com | "2019-05-02 09:28:07.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1758 blockbytes [34874] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:07.084 UTC [common.deliver] deliverBlocks -> DEBU 1759 [channel: businesschannel] Delivering block [9] for (0xc0008d0700) for 172.18.0.8:57414" +orderer0.example.com | "2019-05-02 09:28:07.084 UTC [common.deliver] deliverBlocks -> DEBU 175a [channel: businesschannel] Done delivering to 172.18.0.8:57414 for (0xc0008d0700)" +orderer0.example.com | "2019-05-02 09:28:07.088 UTC [common.deliver] Handle -> DEBU 175b Waiting for new SeekInfo from 172.18.0.8:57414" +orderer0.example.com | "2019-05-02 09:28:07.089 UTC [common.deliver] Handle -> DEBU 175c Attempting to read seek info message from 172.18.0.8:57414" +orderer0.example.com | "2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 175d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 175e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 175f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 1760 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.090 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func1 -> DEBU 1762 0xc00091eec0 gate 1556789287090182300 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1763 0xc00091eec0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1764 0xc00091eec0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1765 0xc00091eec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1766 0xc00091eec0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.090 UTC [cauthdsl] func1 -> DEBU 1767 0xc00091eec0 gate 1556789287090182300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.100 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 143d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:33.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 143e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 143f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [policies] Evaluate -> DEBU 1440 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [policies] Evaluate -> DEBU 1441 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [policies] Evaluate -> DEBU 1442 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func1 -> DEBU 1443 0xc002463810 gate 1556789253101569700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1444 0xc002463810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1445 0xc002463810 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1446 0xc002463810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1447 0xc002463810 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.101 UTC [cauthdsl] func1 -> DEBU 1448 0xc002463810 gate 1556789253101569700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.102 UTC [policies] Evaluate -> DEBU 1449 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.102 UTC [policies] Evaluate -> DEBU 144a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.102 UTC [policies] Evaluate -> DEBU 144b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.102 UTC [cauthdsl] func1 -> DEBU 144c 0xc0024bc050 gate 1556789253102414900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.102 UTC [cauthdsl] func2 -> DEBU 144d 0xc0024bc050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.104 UTC [cauthdsl] func2 -> DEBU 144e 0xc0024bc050 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.104 UTC [gossip.pull] Hello -> DEBU 144f Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:33.104 UTC [gossip.comm] Send -> DEBU 1450 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.105 UTC [gossip.pull] Hello -> DEBU 1451 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:33.105 UTC [gossip.comm] Send -> DEBU 1452 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.105 UTC [gossip.pull] Hello -> DEBU 1453 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:33.105 UTC [gossip.comm] Send -> DEBU 1454 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.106 UTC [gossip.comm] sendToEndpoint -> DEBU 1455 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.106 UTC [gossip.comm] sendToEndpoint -> DEBU 1456 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.108 UTC [gossip.comm] sendToEndpoint -> DEBU 1457 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.109 UTC [gossip.comm] sendToEndpoint -> DEBU 1458 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.109 UTC [gossip.comm] sendToEndpoint -> DEBU 1459 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.109 UTC [gossip.comm] sendToEndpoint -> DEBU 145a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.110 UTC [gossip.comm] func1 -> DEBU 145b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.110 UTC [gossip.gossip] handleMessage -> DEBU 145c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.112 UTC [gossip.comm] func1 -> DEBU 145d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10440964464786897320 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.104 UTC [cauthdsl] func2 -> DEBU 145e 0xc0024bc050 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.114 UTC [msp.identity] Verify -> DEBU 145f Verify: digest = 00000000 9d 59 25 df 50 a2 aa 38 9d 0b a5 8d 90 bf 58 99 |.Y%.P..8......X.| +peer0.org1.example.com | 00000010 ac 25 ff b9 93 f4 4e 4c 0f 7b ff 98 89 d6 31 46 |.%....NL.{....1F|" +peer0.org1.example.com | "2019-05-02 09:27:33.114 UTC [msp.identity] Verify -> DEBU 1460 Verify: sig = 00000000 30 44 02 20 0e 22 75 2b e1 07 24 45 1f 71 fa 37 |0D. ."u+..$E.q.7| +peer0.org1.example.com | 00000010 dd 59 0b e0 63 ad 6c 70 eb 0c f5 59 00 ce c8 33 |.Y..c.lp...Y...3| +peer0.org1.example.com | 00000020 03 26 bb d2 02 20 1b 10 c6 df a0 4d e9 1d 1d 8c |.&... .....M....| +peer0.org1.example.com | 00000030 91 5f 9d 4b 16 d8 82 c6 b9 b7 b4 80 25 40 1a 1a |._.K........%@..| +peer0.org1.example.com | 00000040 ad b7 3b 70 81 a7 |..;p..|" +orderer0.example.com | "2019-05-02 09:28:07.091 UTC [policies] Evaluate -> DEBU 1768 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.091 UTC [policies] Evaluate -> DEBU 1769 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.091 UTC [policies] Evaluate -> DEBU 176a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.091 UTC [cauthdsl] func1 -> DEBU 176b 0xc00091f710 gate 1556789287091575100 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.091 UTC [cauthdsl] func2 -> DEBU 176c 0xc00091f710 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.091 UTC [cauthdsl] func2 -> DEBU 176d 0xc00091f710 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.092 UTC [cauthdsl] func2 -> DEBU 176e 0xc00091f710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.092 UTC [cauthdsl] func2 -> DEBU 176f 0xc00091f710 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.092 UTC [cauthdsl] func1 -> DEBU 1770 0xc00091f710 gate 1556789287091575100 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.092 UTC [policies] Evaluate -> DEBU 1771 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.093 UTC [policies] Evaluate -> DEBU 1772 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.093 UTC [policies] Evaluate -> DEBU 1773 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.093 UTC [cauthdsl] func1 -> DEBU 1774 0xc00091ff90 gate 1556789287093427700 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.093 UTC [cauthdsl] func2 -> DEBU 1775 0xc00091ff90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.093 UTC [cauthdsl] func2 -> DEBU 1776 0xc00091ff90 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.094 UTC [cauthdsl] func2 -> DEBU 1777 0xc00091ff90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.094 UTC [cauthdsl] func2 -> DEBU 1778 0xc00091ff90 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.094 UTC [cauthdsl] func1 -> DEBU 1779 0xc00091ff90 gate 1556789287093427700 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.094 UTC [policies] Evaluate -> DEBU 177a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.094 UTC [policies] Evaluate -> DEBU 177b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.095 UTC [policies] func1 -> DEBU 177c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:07.095 UTC [policies] Evaluate -> DEBU 177d Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.095 UTC [policies] Evaluate -> DEBU 177e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.095 UTC [policies] Evaluate -> DEBU 177f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.096 UTC [policies] Evaluate -> DEBU 1780 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.096 UTC [policies] Evaluate -> DEBU 1781 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.097 UTC [cauthdsl] func1 -> DEBU 1782 0xc000b86e00 gate 1556789287097171600 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.097 UTC [cauthdsl] func2 -> DEBU 1783 0xc000b86e00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.098 UTC [cauthdsl] func2 -> DEBU 1784 0xc000b86e00 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.098 UTC [cauthdsl] func2 -> DEBU 1785 0xc000b86e00 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [msp.identity] Verify -> DEBU 1786 Verify: digest = 00000000 ae 90 af dd 56 b7 e7 04 36 2d 74 52 10 c4 d2 62 |....V...6-tR...b| +orderer0.example.com | 00000010 b5 b7 65 60 d9 3c d4 af a5 d6 58 6e 6d 0c 63 36 |..e`.<....Xnm.c6|" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [msp.identity] Verify -> DEBU 1787 Verify: sig = 00000000 30 45 02 21 00 8e 33 d2 96 95 98 f0 ae b7 ad 8e |0E.!..3.........| +orderer0.example.com | 00000010 c2 3f ef 84 44 fb 98 1a 42 77 0e b8 be 48 a0 4d |.?..D...Bw...H.M| +orderer0.example.com | 00000020 87 0c 28 24 c1 02 20 6a e7 b2 d1 b6 1e b0 99 26 |..($.. j.......&| +orderer0.example.com | 00000030 80 22 50 4e 99 d2 63 1e 40 81 8f 07 7c 54 6b 3b |."PN..c.@...|Tk;| +orderer0.example.com | 00000040 6d 50 26 b6 3f 30 5f |mP&.?0_|" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [cauthdsl] func2 -> DEBU 1788 0xc000b86e00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [cauthdsl] func1 -> DEBU 1789 0xc000b86e00 gate 1556789287097171600 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178c Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178e Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.099 UTC [common.deliver] deliverBlocks -> DEBU 1790 [channel: businesschannel] Received seekInfo (0xc0008d0b40) start: > stop: > from 172.18.0.8:57414" +orderer0.example.com | "2019-05-02 09:28:07.100 UTC [fsblkstorage] Next -> DEBU 1791 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:07.100 UTC [fsblkstorage] newBlockfileStream -> DEBU 1792 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +orderer0.example.com | "2019-05-02 09:28:07.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1793 Remaining bytes=[34877], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:07.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1794 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +orderer0.example.com | "2019-05-02 09:28:07.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1795 blockbytes [34874] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:07.100 UTC [common.deliver] deliverBlocks -> DEBU 1796 [channel: businesschannel] Delivering block [9] for (0xc0008d0b40) for 172.18.0.8:57414" +orderer0.example.com | "2019-05-02 09:28:07.100 UTC [common.deliver] deliverBlocks -> DEBU 1797 [channel: businesschannel] Done delivering to 172.18.0.8:57414 for (0xc0008d0b40)" +orderer0.example.com | "2019-05-02 09:28:07.100 UTC [common.deliver] Handle -> DEBU 1798 Waiting for new SeekInfo from 172.18.0.8:57414" +orderer0.example.com | "2019-05-02 09:28:07.100 UTC [common.deliver] Handle -> DEBU 1799 Attempting to read seek info message from 172.18.0.8:57414" +orderer0.example.com | "2019-05-02 09:28:07.110 UTC [common.deliver] Handle -> WARN 179a Error reading from 172.18.0.8:57414: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:07.110 UTC [orderer.common.server] func1 -> DEBU 179b Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:07.110 UTC [comm.grpc.server] 1 -> INFO 179c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57414 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.7859ms +orderer0.example.com | "2019-05-02 09:28:07.110 UTC [grpc] infof -> DEBU 179d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:07.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 179e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:07.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 179f Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +orderer0.example.com | "2019-05-02 09:28:07.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 445.7µs " +orderer0.example.com | "2019-05-02 09:28:07.264 UTC [orderer.common.server] Deliver -> DEBU 17a1 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:07.264 UTC [common.deliver] Handle -> DEBU 17a2 Starting new deliver loop for 172.18.0.8:57416" +orderer0.example.com | "2019-05-02 09:28:07.264 UTC [common.deliver] Handle -> DEBU 17a3 Attempting to read seek info message from 172.18.0.8:57416" +orderer0.example.com | "2019-05-02 09:28:07.265 UTC [policies] Evaluate -> DEBU 17a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.265 UTC [policies] Evaluate -> DEBU 17a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.265 UTC [policies] Evaluate -> DEBU 17a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.266 UTC [policies] Evaluate -> DEBU 17a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.266 UTC [policies] Evaluate -> DEBU 17a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.267 UTC [cauthdsl] func1 -> DEBU 17a9 0xc000888e10 gate 1556789287267023600 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17aa 0xc000888e10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17ab 0xc000888e10 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17ac 0xc000888e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17ad 0xc000888e10 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.268 UTC [cauthdsl] func1 -> DEBU 17ae 0xc000888e10 gate 1556789287267023600 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.268 UTC [policies] Evaluate -> DEBU 17af Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.268 UTC [policies] Evaluate -> DEBU 17b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.269 UTC [policies] Evaluate -> DEBU 17b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.269 UTC [cauthdsl] func1 -> DEBU 17b2 0xc000889660 gate 1556789287269600400 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.269 UTC [cauthdsl] func2 -> DEBU 17b3 0xc000889660 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.269 UTC [cauthdsl] func2 -> DEBU 17b4 0xc000889660 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.270 UTC [cauthdsl] func2 -> DEBU 17b5 0xc000889660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.270 UTC [cauthdsl] func2 -> DEBU 17b6 0xc000889660 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.270 UTC [cauthdsl] func1 -> DEBU 17b7 0xc000889660 gate 1556789287269600400 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.270 UTC [policies] Evaluate -> DEBU 17b8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.271 UTC [policies] Evaluate -> DEBU 17b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.271 UTC [policies] Evaluate -> DEBU 17ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.271 UTC [cauthdsl] func1 -> DEBU 17bb 0xc000889ed0 gate 1556789287271698300 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.271 UTC [cauthdsl] func2 -> DEBU 17bc 0xc000889ed0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.271 UTC [cauthdsl] func2 -> DEBU 17bd 0xc000889ed0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.272 UTC [cauthdsl] func2 -> DEBU 17be 0xc000889ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.272 UTC [cauthdsl] func2 -> DEBU 17bf 0xc000889ed0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.272 UTC [cauthdsl] func1 -> DEBU 17c0 0xc000889ed0 gate 1556789287271698300 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.272 UTC [policies] Evaluate -> DEBU 17c1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.272 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] func1 -> DEBU 17c3 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c4 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [cauthdsl] func2 -> DEBU 1461 0xc0024bc050 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [cauthdsl] func1 -> DEBU 1462 0xc0024bc050 gate 1556789253102414900 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:07.274 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00105ebc0 gate 1556789287274469800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1463 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.274 UTC [cauthdsl] func2 -> DEBU 17ca 0xc00105ebc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1464 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.274 UTC [cauthdsl] func2 -> DEBU 17cb 0xc00105ebc0 processing identity 0 with bytes of efef60" +peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1465 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.274 UTC [cauthdsl] func2 -> DEBU 17cc 0xc00105ebc0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1466 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.274 UTC [msp.identity] Verify -> DEBU 17cd Verify: digest = 00000000 f1 7b 7b 6e 6a df d1 51 73 11 0a c3 11 00 52 37 |.{{nj..Qs.....R7| +peer0.org1.example.com | "2019-05-02 09:27:33.116 UTC [gossip.discovery] handleAliveMessage -> DEBU 1467 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" +orderer0.example.com | 00000010 07 cf 5a fb 05 39 8e 2e 4b 35 7b af 65 cf fa ba |..Z..9..K5{.e...|" +peer0.org1.example.com | "2019-05-02 09:27:33.116 UTC [gossip.discovery] handleAliveMessage -> DEBU 1468 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1469 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.117 UTC [gossip.gossip] handleMessage -> DEBU 146b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.117 UTC [gossip.gossip] handleMessage -> DEBU 146c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.117 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 146d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:33.117 UTC [msp] DeserializeIdentity -> DEBU 146e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.118 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 146f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:33.118 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1470 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.118 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1471 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.118 UTC [policies] Evaluate -> DEBU 1472 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.118 UTC [policies] Evaluate -> DEBU 1473 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:33.119 UTC [policies] Evaluate -> DEBU 1474 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.119 UTC [cauthdsl] func1 -> DEBU 1475 0xc0024bdcb0 gate 1556789253119545200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.119 UTC [cauthdsl] func2 -> DEBU 1476 0xc0024bdcb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.119 UTC [cauthdsl] func2 -> DEBU 1477 0xc0024bdcb0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.121 UTC [cauthdsl] func2 -> DEBU 1478 0xc0024bdcb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:33.121 UTC [cauthdsl] func2 -> DEBU 1479 0xc0024bdcb0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.121 UTC [cauthdsl] func1 -> DEBU 147a 0xc0024bdcb0 gate 1556789253119545200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [policies] Evaluate -> DEBU 147b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [policies] Evaluate -> DEBU 147c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [policies] Evaluate -> DEBU 147d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [cauthdsl] func1 -> DEBU 147e 0xc00262e4f0 gate 1556789253122232300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [cauthdsl] func2 -> DEBU 147f 0xc00262e4f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [cauthdsl] func2 -> DEBU 1480 0xc00262e4f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [cauthdsl] func2 -> DEBU 1481 0xc00262e4f0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.122 UTC [msp.identity] Verify -> DEBU 1482 Verify: digest = 00000000 eb f5 bd ff 26 ad b2 3c 7b f7 6b 73 2a f6 0c 88 |....&..<{.ks*...| +peer0.org1.example.com | 00000010 ed 78 44 d8 65 33 ad a9 ad 21 3d f0 b8 9a dc 10 |.xD.e3...!=.....|" +orderer0.example.com | "2019-05-02 09:28:07.275 UTC [msp.identity] Verify -> DEBU 17ce Verify: sig = 00000000 30 45 02 21 00 b5 f8 b5 9d 83 5e 31 ca cb 20 7d |0E.!......^1.. }| +orderer0.example.com | 00000010 f7 6a 8e ea 9d ab 46 15 4b aa a3 5a b5 68 dd 34 |.j....F.K..Z.h.4| +orderer0.example.com | 00000020 49 2b 51 f9 79 02 20 07 29 af 1b 43 f4 a6 a2 54 |I+Q.y. .)..C...T| +orderer0.example.com | 00000030 d2 41 ca fe 6a e1 0f ad b0 e6 19 ff 46 40 31 d2 |.A..j.......F@1.| +orderer0.example.com | 00000040 5b 3c e3 24 82 c2 5c |[<.$..\|" +orderer0.example.com | "2019-05-02 09:28:07.275 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00105ebc0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:07.276 UTC [cauthdsl] func1 -> DEBU 17d0 0xc00105ebc0 gate 1556789287274469800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d3 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.277 UTC [policies] Evaluate -> DEBU 17d5 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.277 UTC [policies] Evaluate -> DEBU 17d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.277 UTC [common.deliver] deliverBlocks -> DEBU 17d7 [channel: businesschannel] Received seekInfo (0xc001191e80) start: > stop: > from 172.18.0.8:57416" +orderer0.example.com | "2019-05-02 09:28:07.278 UTC [fsblkstorage] Next -> DEBU 17d8 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:07.278 UTC [fsblkstorage] newBlockfileStream -> DEBU 17d9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:28:07.278 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17da Remaining bytes=[133542], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:07.279 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17db Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:28:07.279 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17dc blockbytes [23935] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:07.279 UTC [common.deliver] deliverBlocks -> DEBU 17dd [channel: businesschannel] Delivering block [0] for (0xc001191e80) for 172.18.0.8:57416" +orderer0.example.com | "2019-05-02 09:28:07.280 UTC [common.deliver] deliverBlocks -> DEBU 17de [channel: businesschannel] Done delivering to 172.18.0.8:57416 for (0xc001191e80)" +orderer0.example.com | "2019-05-02 09:28:07.281 UTC [common.deliver] Handle -> DEBU 17df Waiting for new SeekInfo from 172.18.0.8:57416" +orderer0.example.com | "2019-05-02 09:28:07.281 UTC [common.deliver] Handle -> DEBU 17e0 Attempting to read seek info message from 172.18.0.8:57416" +orderer0.example.com | "2019-05-02 09:28:07.289 UTC [common.deliver] Handle -> WARN 17e1 Error reading from 172.18.0.8:57416: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:07.289 UTC [orderer.common.server] func1 -> DEBU 17e2 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:07.289 UTC [comm.grpc.server] 1 -> INFO 17e3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57416 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.1514ms +orderer0.example.com | "2019-05-02 09:28:07.290 UTC [grpc] infof -> DEBU 17e4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:07.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e5 Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs" +orderer0.example.com | "2019-05-02 09:28:07.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e6 Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs" +orderer0.example.com | "2019-05-02 09:28:07.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 453.9µs " +orderer0.example.com | "2019-05-02 09:28:07.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 346.8µs " +orderer0.example.com | "2019-05-02 09:28:07.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ea Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:07.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:07.471 UTC [orderer.common.server] Deliver -> DEBU 17eb Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:07.471 UTC [common.deliver] Handle -> DEBU 17ec Starting new deliver loop for 172.18.0.8:57418" +orderer0.example.com | "2019-05-02 09:28:07.472 UTC [common.deliver] Handle -> DEBU 17ed Attempting to read seek info message from 172.18.0.8:57418" +orderer0.example.com | "2019-05-02 09:28:07.472 UTC [policies] Evaluate -> DEBU 17ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.472 UTC [policies] Evaluate -> DEBU 17ef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.473 UTC [policies] Evaluate -> DEBU 17f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.473 UTC [policies] Evaluate -> DEBU 17f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.473 UTC [policies] Evaluate -> DEBU 17f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.473 UTC [cauthdsl] func1 -> DEBU 17f3 0xc001079af0 gate 1556789287473693100 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.473 UTC [cauthdsl] func2 -> DEBU 17f4 0xc001079af0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.474 UTC [cauthdsl] func2 -> DEBU 17f5 0xc001079af0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.474 UTC [cauthdsl] func2 -> DEBU 17f6 0xc001079af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.474 UTC [cauthdsl] func2 -> DEBU 17f7 0xc001079af0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.474 UTC [cauthdsl] func1 -> DEBU 17f8 0xc001079af0 gate 1556789287473693100 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.474 UTC [policies] Evaluate -> DEBU 17f9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.123 UTC [msp.identity] Verify -> DEBU 1483 Verify: sig = 00000000 30 45 02 21 00 e4 e0 5f e3 3d 0d 98 50 3f 8d bb |0E.!..._.=..P?..| +orderer0.example.com | "2019-05-02 09:28:07.475 UTC [policies] Evaluate -> DEBU 17fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | 00000010 4c 91 91 a1 8e bf 0e bd 7c 4e c3 92 a6 dd a5 1d |L.......|N......| +orderer0.example.com | "2019-05-02 09:28:07.475 UTC [policies] Evaluate -> DEBU 17fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | 00000020 f9 bf cc e0 65 02 20 70 70 88 ef 3c 74 11 6f 29 |....e. pp.. DEBU 1484 0xc00262e4f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.124 UTC [cauthdsl] func1 -> DEBU 1485 0xc00262e4f0 gate 1556789253122232300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1486 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1487 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1488 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1489 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 148a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 148b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.125 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 148c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:33.125 UTC [msp.identity] Verify -> DEBU 148d Verify: digest = 00000000 c7 34 1f ce 55 89 34 91 69 48 eb a4 51 f3 97 bb |.4..U.4.iH..Q...| +peer0.org1.example.com | 00000010 cd 8e b1 33 4c 90 b5 c2 be 0f dd 59 fc 91 6f 20 |...3L......Y..o |" +peer0.org1.example.com | "2019-05-02 09:27:33.125 UTC [msp.identity] Verify -> DEBU 148e Verify: sig = 00000000 30 45 02 21 00 91 2d 00 1e 7a bc f6 09 62 76 14 |0E.!..-..z...bv.| +peer0.org1.example.com | 00000010 bf 6d 53 a6 8a 03 5f 1e 9c ba 63 aa 9e 34 9c 93 |.mS..._...c..4..| +peer0.org1.example.com | 00000020 14 b5 10 1e a6 02 20 13 bc b1 ee f7 e2 22 1f 39 |...... ......".9| +peer0.org1.example.com | 00000030 1f 96 a9 ae 98 d6 1a 34 de 0d 0e 69 ca d3 88 cc |.......4...i....| +peer0.org1.example.com | 00000040 34 08 a7 4b b1 c3 0d |4..K...|" +peer0.org1.example.com | "2019-05-02 09:27:33.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 148f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.126 UTC [gossip.discovery] isSentByMe -> DEBU 1490 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 1491 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.126 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1492 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:33.126 UTC [msp.identity] Verify -> DEBU 1493 Verify: digest = 00000000 28 e3 c7 ef f6 39 26 c9 69 7f de f3 56 21 b3 63 |(....9&.i...V!.c| +peer0.org1.example.com | 00000010 c9 05 70 6a be ac a3 02 e6 39 c0 a6 da c2 f6 7a |..pj.....9.....z|" +peer0.org1.example.com | "2019-05-02 09:27:33.127 UTC [msp.identity] Verify -> DEBU 1494 Verify: sig = 00000000 30 45 02 21 00 9b dc 4c 9d 3b c5 05 f5 fa a4 0c |0E.!...L.;......| +peer0.org1.example.com | 00000010 5b f8 85 2a ba 0f 5a bf e7 d2 f0 12 72 2a 5d 69 |[..*..Z.....r*]i| +peer0.org1.example.com | 00000020 3d 33 94 08 4a 02 20 2c a5 3f 2a da 8b de 2b 08 |=3..J. ,.?*...+.| +peer0.org1.example.com | 00000030 7b 5d 5a 51 c5 2d e9 44 42 47 aa e5 44 9b 1d 90 |{]ZQ.-.DBG..D...| +peer0.org1.example.com | 00000040 7e 09 8a 22 c7 ac 46 |~.."..F|" +peer0.org1.example.com | "2019-05-02 09:27:33.127 UTC [gossip.discovery] handleAliveMessage -> DEBU 1495 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.discovery] handleAliveMessage -> DEBU 1496 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1497 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1498 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.gossip] handleMessage -> DEBU 1499 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.gossip] handleMessage -> DEBU 149a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15873546593035671781 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.129 UTC [gossip.pull] HandleMessage -> DEBU 149b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15873546593035671781 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.129 UTC [gossip.gossip] handleMessage -> DEBU 149c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.129 UTC [gossip.gossip] handleMessage -> DEBU 149d Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10440964464786897320 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.129 UTC [gossip.pull] HandleMessage -> DEBU 149e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10440964464786897320 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.129 UTC [gossip.gossip] handleMessage -> DEBU 149f Exiting" +orderer0.example.com | "2019-05-02 09:28:07.475 UTC [cauthdsl] func1 -> DEBU 17fc 0xc001094330 gate 1556789287475738900 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.476 UTC [cauthdsl] func2 -> DEBU 17fd 0xc001094330 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.476 UTC [cauthdsl] func2 -> DEBU 17fe 0xc001094330 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.476 UTC [cauthdsl] func2 -> DEBU 17ff 0xc001094330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.477 UTC [cauthdsl] func2 -> DEBU 1800 0xc001094330 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.477 UTC [cauthdsl] func1 -> DEBU 1801 0xc001094330 gate 1556789287475738900 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.477 UTC [policies] Evaluate -> DEBU 1802 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.477 UTC [policies] Evaluate -> DEBU 1803 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.478 UTC [policies] Evaluate -> DEBU 1804 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.478 UTC [cauthdsl] func1 -> DEBU 1805 0xc001094b70 gate 1556789287478306900 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.478 UTC [cauthdsl] func2 -> DEBU 1806 0xc001094b70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.478 UTC [cauthdsl] func2 -> DEBU 1807 0xc001094b70 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.478 UTC [cauthdsl] func2 -> DEBU 1808 0xc001094b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.479 UTC [cauthdsl] func2 -> DEBU 1809 0xc001094b70 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.479 UTC [cauthdsl] func1 -> DEBU 180a 0xc001094b70 gate 1556789287478306900 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.479 UTC [policies] Evaluate -> DEBU 180b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.479 UTC [policies] Evaluate -> DEBU 180c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.480 UTC [policies] func1 -> DEBU 180d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:07.480 UTC [policies] Evaluate -> DEBU 180e Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.480 UTC [policies] Evaluate -> DEBU 180f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.481 UTC [policies] Evaluate -> DEBU 1810 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.481 UTC [policies] Evaluate -> DEBU 1811 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.481 UTC [policies] Evaluate -> DEBU 1812 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.482 UTC [cauthdsl] func1 -> DEBU 1813 0xc001095860 gate 1556789287482124100 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.482 UTC [cauthdsl] func2 -> DEBU 1814 0xc001095860 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.482 UTC [cauthdsl] func2 -> DEBU 1815 0xc001095860 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.483 UTC [cauthdsl] func2 -> DEBU 1816 0xc001095860 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:07.483 UTC [msp.identity] Verify -> DEBU 1817 Verify: digest = 00000000 74 54 48 33 e7 8f c3 2c 08 ea 8e 5e 3f 4c ba 83 |tTH3...,...^?L..| +orderer0.example.com | 00000010 90 32 db 7f 94 33 ba 33 4b 37 9f 4f e7 ed e2 5e |.2...3.3K7.O...^|" +orderer0.example.com | "2019-05-02 09:28:07.483 UTC [msp.identity] Verify -> DEBU 1818 Verify: sig = 00000000 30 45 02 21 00 f1 dc 4f 4d 28 31 c5 7d 2d 29 b7 |0E.!...OM(1.}-).| +orderer0.example.com | 00000010 b8 07 06 08 f7 12 8d 8d 07 1b a4 d1 0d 6a 98 6b |.............j.k| +orderer0.example.com | 00000020 c9 73 ad a4 96 02 20 5e 3c 7b 63 ca 1b 7e 18 89 |.s.... ^<{c..~..| +orderer0.example.com | 00000030 4d 8f 2d 75 ab d4 cb c2 c1 d1 90 a3 25 b6 cf a5 |M.-u........%...| +orderer0.example.com | 00000040 c7 8a 81 a9 10 8c c2 |.......|" +orderer0.example.com | "2019-05-02 09:28:07.484 UTC [cauthdsl] func2 -> DEBU 1819 0xc001095860 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:07.484 UTC [cauthdsl] func1 -> DEBU 181a 0xc001095860 gate 1556789287482124100 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:07.485 UTC [policies] Evaluate -> DEBU 181b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.485 UTC [policies] Evaluate -> DEBU 181c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.485 UTC [policies] Evaluate -> DEBU 181d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.486 UTC [policies] Evaluate -> DEBU 181e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.486 UTC [policies] Evaluate -> DEBU 181f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.487 UTC [policies] Evaluate -> DEBU 1820 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.487 UTC [common.deliver] deliverBlocks -> DEBU 1821 [channel: businesschannel] Received seekInfo (0xc000b6d640) start: > stop: > from 172.18.0.8:57418" +orderer0.example.com | "2019-05-02 09:28:07.488 UTC [fsblkstorage] Next -> DEBU 1822 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:07.488 UTC [fsblkstorage] newBlockfileStream -> DEBU 1823 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23938]" +orderer0.example.com | "2019-05-02 09:28:07.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1824 Remaining bytes=[109604], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:07.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1825 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23938], bytesOffset=[23941]}" +orderer0.example.com | "2019-05-02 09:28:07.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1826 blockbytes [23684] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:07.490 UTC [common.deliver] deliverBlocks -> DEBU 1827 [channel: businesschannel] Delivering block [1] for (0xc000b6d640) for 172.18.0.8:57418" +orderer0.example.com | "2019-05-02 09:28:07.490 UTC [common.deliver] deliverBlocks -> DEBU 1828 [channel: businesschannel] Done delivering to 172.18.0.8:57418 for (0xc000b6d640)" +orderer0.example.com | "2019-05-02 09:28:07.491 UTC [common.deliver] Handle -> DEBU 1829 Waiting for new SeekInfo from 172.18.0.8:57418" +orderer0.example.com | "2019-05-02 09:28:07.491 UTC [common.deliver] Handle -> DEBU 182a Attempting to read seek info message from 172.18.0.8:57418" +orderer0.example.com | "2019-05-02 09:28:07.500 UTC [grpc] infof -> DEBU 182b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:07.500 UTC [common.deliver] Handle -> WARN 182c Error reading from 172.18.0.8:57418: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:07.501 UTC [orderer.common.server] func1 -> DEBU 182d Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:07.501 UTC [comm.grpc.server] 1 -> INFO 182e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57418 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.1933ms +orderer0.example.com | "2019-05-02 09:28:07.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 182f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:07.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1830 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +orderer0.example.com | "2019-05-02 09:28:07.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1831 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.4µs " +orderer0.example.com | "2019-05-02 09:28:07.698 UTC [orderer.common.server] Deliver -> DEBU 1832 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:07.698 UTC [common.deliver] Handle -> DEBU 1833 Starting new deliver loop for 172.18.0.8:57420" +orderer0.example.com | "2019-05-02 09:28:07.698 UTC [common.deliver] Handle -> DEBU 1834 Attempting to read seek info message from 172.18.0.8:57420" +orderer0.example.com | "2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1835 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1836 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1837 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1838 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1839 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.699 UTC [cauthdsl] func1 -> DEBU 183a 0xc0010d2250 gate 1556789287699654200 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.699 UTC [cauthdsl] func2 -> DEBU 183b 0xc0010d2250 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.700 UTC [cauthdsl] func2 -> DEBU 183c 0xc0010d2250 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.701 UTC [cauthdsl] func2 -> DEBU 183d 0xc0010d2250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.701 UTC [cauthdsl] func2 -> DEBU 183e 0xc0010d2250 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.701 UTC [cauthdsl] func1 -> DEBU 183f 0xc0010d2250 gate 1556789287699654200 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.701 UTC [policies] Evaluate -> DEBU 1840 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.702 UTC [policies] Evaluate -> DEBU 1841 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.702 UTC [policies] Evaluate -> DEBU 1842 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.702 UTC [cauthdsl] func1 -> DEBU 1843 0xc0010d2aa0 gate 1556789287702893400 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1844 0xc0010d2aa0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1845 0xc0010d2aa0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1846 0xc0010d2aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1847 0xc0010d2aa0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.703 UTC [cauthdsl] func1 -> DEBU 1848 0xc0010d2aa0 gate 1556789287702893400 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.703 UTC [policies] Evaluate -> DEBU 1849 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.703 UTC [policies] Evaluate -> DEBU 184a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.703 UTC [policies] Evaluate -> DEBU 184b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.704 UTC [cauthdsl] func1 -> DEBU 184c 0xc0010d32e0 gate 1556789287704310800 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.704 UTC [cauthdsl] func2 -> DEBU 184d 0xc0010d32e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.704 UTC [cauthdsl] func2 -> DEBU 184e 0xc0010d32e0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.704 UTC [cauthdsl] func2 -> DEBU 184f 0xc0010d32e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.705 UTC [cauthdsl] func2 -> DEBU 1850 0xc0010d32e0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.705 UTC [cauthdsl] func1 -> DEBU 1851 0xc0010d32e0 gate 1556789287704310800 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.705 UTC [policies] Evaluate -> DEBU 1852 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.705 UTC [policies] Evaluate -> DEBU 1853 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.706 UTC [policies] func1 -> DEBU 1854 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:07.706 UTC [policies] Evaluate -> DEBU 1855 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.706 UTC [policies] Evaluate -> DEBU 1856 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.707 UTC [policies] Evaluate -> DEBU 1857 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.707 UTC [policies] Evaluate -> DEBU 1858 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.707 UTC [policies] Evaluate -> DEBU 1859 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.707 UTC [cauthdsl] func1 -> DEBU 185a 0xc0010e2130 gate 1556789287707663400 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.707 UTC [cauthdsl] func2 -> DEBU 185b 0xc0010e2130 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.708 UTC [cauthdsl] func2 -> DEBU 185c 0xc0010e2130 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.708 UTC [cauthdsl] func2 -> DEBU 185d 0xc0010e2130 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:07.708 UTC [msp.identity] Verify -> DEBU 185e Verify: digest = 00000000 53 c4 84 a5 42 ab 50 3e 8e 0c 15 0e 81 d6 0d 08 |S...B.P>........| +orderer0.example.com | 00000010 10 de c5 dd 24 87 7d 6e 4f ab 36 e0 fd ee 1a 62 |....$.}nO.6....b|" +orderer0.example.com | "2019-05-02 09:28:07.708 UTC [msp.identity] Verify -> DEBU 185f Verify: sig = 00000000 30 45 02 21 00 90 13 e2 88 04 02 95 01 89 44 38 |0E.!..........D8| +peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.gossip] handleMessage -> DEBU 14a0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16040923857937586268 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.pull] HandleMessage -> DEBU 14a1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16040923857937586268 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.gossip] handleMessage -> DEBU 14a2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.gossip] handleMessage -> DEBU 14a3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.pull] HandleMessage -> DEBU 14a4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.130 UTC [gossip.pull] SendDigest -> DEBU 14a5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [gossip.gossip] handleMessage -> DEBU 14a6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.128 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14a7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14a8 Verify: digest = 00000000 c7 34 1f ce 55 89 34 91 69 48 eb a4 51 f3 97 bb |.4..U.4.iH..Q...| +peer0.org1.example.com | 00000010 cd 8e b1 33 4c 90 b5 c2 be 0f dd 59 fc 91 6f 20 |...3L......Y..o |" +peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14a9 Verify: sig = 00000000 30 45 02 21 00 91 2d 00 1e 7a bc f6 09 62 76 14 |0E.!..-..z...bv.| +peer0.org1.example.com | 00000010 bf 6d 53 a6 8a 03 5f 1e 9c ba 63 aa 9e 34 9c 93 |.mS..._...c..4..| +peer0.org1.example.com | 00000020 14 b5 10 1e a6 02 20 13 bc b1 ee f7 e2 22 1f 39 |...... ......".9| +peer0.org1.example.com | 00000030 1f 96 a9 ae 98 d6 1a 34 de 0d 0e 69 ca d3 88 cc |.......4...i....| +peer0.org1.example.com | 00000040 34 08 a7 4b b1 c3 0d |4..K...|" +peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14aa Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14ab Verify: sig = 00000000 30 45 02 21 00 97 91 fc 75 f8 16 ef f9 ce fd e7 |0E.!....u.......| +peer0.org1.example.com | 00000010 66 74 df 92 0a 63 f4 fe 9e c5 34 6d e0 30 75 b9 |ft...c....4m.0u.| +peer0.org1.example.com | 00000020 54 09 db df f8 02 20 09 a4 84 ef 71 1f f6 17 70 |T..... ....q...p| +peer0.org1.example.com | 00000030 6b fa 25 f0 93 3f 49 92 eb 44 be c6 74 07 f1 f5 |k.%..?I..D..t...| +peer0.org1.example.com | 00000040 2b 87 07 81 fd e4 a4 |+......|" +peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [gossip.discovery] handleAliveMessage -> DEBU 14ac Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.131 UTC [gossip.discovery] isSentByMe -> DEBU 14ad Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.132 UTC [gossip.discovery] handleAliveMessage -> DEBU 14ae Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14af Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.137 UTC [gossip.gossip] handleMessage -> DEBU 14b0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.137 UTC [gossip.gossip] handleMessage -> DEBU 14b1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.137 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.137 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14b3 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:33.138 UTC [msp.identity] Verify -> DEBU 14b4 Verify: digest = 00000000 dc cc 08 6e f3 da cf d7 32 74 c5 29 44 aa 5c 54 |...n....2t.)D.\T| +peer0.org1.example.com | 00000010 95 e7 59 02 db 07 7b ca 16 30 22 01 7b 4d 33 1d |..Y...{..0".{M3.|" +peer0.org1.example.com | "2019-05-02 09:27:33.139 UTC [msp.identity] Verify -> DEBU 14b5 Verify: sig = 00000000 30 44 02 20 75 ab 06 ef 97 ff b1 05 b5 6b a4 8d |0D. u........k..| +peer0.org1.example.com | 00000010 50 8c 5d 93 a0 b3 03 32 fe dc 72 91 7e 6d 89 c5 |P.]....2..r.~m..| +peer0.org1.example.com | 00000020 44 32 ac 41 02 20 2f 4e 5a dd 1f 68 b8 52 cf 96 |D2.A. /NZ..h.R..| +peer0.org1.example.com | 00000030 77 02 68 7a 73 82 94 98 ba b9 08 82 fa 8a 65 60 |w.hzs.........e`| +peer0.org1.example.com | 00000040 5d 6a be ee fd 51 |]j...Q|" +peer0.org1.example.com | "2019-05-02 09:27:33.139 UTC [msp.identity] Verify -> DEBU 14b6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:33.140 UTC [msp.identity] Verify -> DEBU 14b7 Verify: sig = 00000000 30 45 02 21 00 c7 0c 84 2c 0e d4 4b ce b1 ab ac |0E.!....,..K....| +peer0.org1.example.com | 00000010 26 60 88 98 a1 bd 0c 62 99 ec 3d 54 ef 0a 8a cb |&`.....b..=T....| +peer0.org1.example.com | 00000020 95 8e 09 b3 ce 02 20 55 de 36 b9 b7 44 ab fc 30 |...... U.6..D..0| +peer0.org1.example.com | 00000030 8a 8f b2 28 ed 43 e6 50 da ff f8 e8 db f3 a8 43 |...(.C.P.......C| +orderer0.example.com | 00000010 de ed 4e a5 2e e4 24 ac 0e 13 36 c8 6a bb f9 1b |..N...$...6.j...| +orderer0.example.com | 00000020 22 a4 93 3d 97 02 20 76 43 6c ca 27 c8 0a 53 b2 |"..=.. vCl.'..S.| +orderer0.example.com | 00000030 9b 73 98 04 7f 43 36 b6 98 ae 0a 56 67 34 50 5c |.s...C6....Vg4P\| +orderer0.example.com | 00000040 2e 65 f1 1a d9 f9 c7 |.e.....|" +orderer0.example.com | "2019-05-02 09:28:07.709 UTC [cauthdsl] func2 -> DEBU 1860 0xc0010e2130 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:07.709 UTC [cauthdsl] func1 -> DEBU 1861 0xc0010e2130 gate 1556789287707663400 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:07.709 UTC [policies] Evaluate -> DEBU 1862 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.709 UTC [policies] Evaluate -> DEBU 1863 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.709 UTC [policies] Evaluate -> DEBU 1864 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.710 UTC [policies] Evaluate -> DEBU 1865 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.710 UTC [policies] Evaluate -> DEBU 1866 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.710 UTC [policies] Evaluate -> DEBU 1867 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.710 UTC [common.deliver] deliverBlocks -> DEBU 1868 [channel: businesschannel] Received seekInfo (0xc000b6dc80) start: > stop: > from 172.18.0.8:57420" +orderer0.example.com | "2019-05-02 09:28:07.711 UTC [fsblkstorage] Next -> DEBU 1869 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:07.712 UTC [fsblkstorage] newBlockfileStream -> DEBU 186a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47625]" +orderer0.example.com | "2019-05-02 09:28:07.712 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186b Remaining bytes=[85917], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:07.712 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186c Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}" +orderer0.example.com | "2019-05-02 09:28:07.712 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186d blockbytes [23742] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:07.713 UTC [common.deliver] deliverBlocks -> DEBU 186e [channel: businesschannel] Delivering block [2] for (0xc000b6dc80) for 172.18.0.8:57420" +orderer0.example.com | "2019-05-02 09:28:07.713 UTC [common.deliver] deliverBlocks -> DEBU 186f [channel: businesschannel] Done delivering to 172.18.0.8:57420 for (0xc000b6dc80)" +orderer0.example.com | "2019-05-02 09:28:07.714 UTC [common.deliver] Handle -> DEBU 1870 Waiting for new SeekInfo from 172.18.0.8:57420" +orderer0.example.com | "2019-05-02 09:28:07.714 UTC [common.deliver] Handle -> DEBU 1871 Attempting to read seek info message from 172.18.0.8:57420" +orderer0.example.com | "2019-05-02 09:28:07.723 UTC [common.deliver] Handle -> WARN 1872 Error reading from 172.18.0.8:57420: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:07.724 UTC [orderer.common.server] func1 -> DEBU 1873 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:07.724 UTC [comm.grpc.server] 1 -> INFO 1874 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57420 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.4878ms +orderer0.example.com | "2019-05-02 09:28:07.725 UTC [grpc] infof -> DEBU 1875 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:07.909 UTC [orderer.common.server] Deliver -> DEBU 1876 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:07.909 UTC [common.deliver] Handle -> DEBU 1877 Starting new deliver loop for 172.18.0.8:57422" +orderer0.example.com | "2019-05-02 09:28:07.909 UTC [common.deliver] Handle -> DEBU 1878 Attempting to read seek info message from 172.18.0.8:57422" +orderer0.example.com | "2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 1879 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.911 UTC [cauthdsl] func1 -> DEBU 187e 0xc0010f43a0 gate 1556789287911213300 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 187f 0xc0010f43a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 1880 0xc0010f43a0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 1881 0xc0010f43a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 1882 0xc0010f43a0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.912 UTC [cauthdsl] func1 -> DEBU 1883 0xc0010f43a0 gate 1556789287911213300 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.912 UTC [policies] Evaluate -> DEBU 1884 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.912 UTC [policies] Evaluate -> DEBU 1885 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.912 UTC [policies] Evaluate -> DEBU 1886 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.912 UTC [cauthdsl] func1 -> DEBU 1887 0xc0010f4c20 gate 1556789287912946900 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 1888 0xc0010f4c20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 1889 0xc0010f4c20 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 188a 0xc0010f4c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 188b 0xc0010f4c20 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.913 UTC [cauthdsl] func1 -> DEBU 188c 0xc0010f4c20 gate 1556789287912946900 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.914 UTC [policies] Evaluate -> DEBU 188d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.914 UTC [policies] Evaluate -> DEBU 188e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.914 UTC [policies] Evaluate -> DEBU 188f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.914 UTC [cauthdsl] func1 -> DEBU 1890 0xc0010f5460 gate 1556789287914396400 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.914 UTC [cauthdsl] func2 -> DEBU 1891 0xc0010f5460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | 00000040 1c f4 57 57 c6 77 3c |..WW.w<|" +peer0.org1.example.com | "2019-05-02 09:27:33.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 14b8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14b9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14ba updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 " +peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14bb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 " +peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14bc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14bd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 14be Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14bf Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.141 UTC [gossip.discovery] sendMemResponse -> DEBU 14c0 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:33.142 UTC [msp] DeserializeIdentity -> DEBU 14c1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.142 UTC [msp] DeserializeIdentity -> DEBU 14c2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.142 UTC [gossip.comm] Send -> DEBU 14c3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.143 UTC [gossip.discovery] sendMemResponse -> DEBU 14c4 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:33.143 UTC [gossip.comm] sendToEndpoint -> DEBU 14c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.143 UTC [gossip.comm] sendToEndpoint -> DEBU 14c6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.196 UTC [gossip.gossip] handleMessage -> DEBU 14c7 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.196 UTC [gossip.pull] HandleMessage -> DEBU 14c8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.196 UTC [msp] DeserializeIdentity -> DEBU 14c9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.196 UTC [msp] DeserializeIdentity -> DEBU 14ca Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.196 UTC [msp] DeserializeIdentity -> DEBU 14cb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.198 UTC [msp] DeserializeIdentity -> DEBU 14cc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.198 UTC [msp] DeserializeIdentity -> DEBU 14cd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.198 UTC [msp] DeserializeIdentity -> DEBU 14ce Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.198 UTC [gossip.pull] SendDigest -> DEBU 14cf Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:33.199 UTC [gossip.gossip] handleMessage -> DEBU 14d0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.204 UTC [gossip.gossip] handleMessage -> DEBU 14d1 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.204 UTC [gossip.gossip] handleMessage -> DEBU 14d2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.206 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14d4 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:33.206 UTC [msp] DeserializeIdentity -> DEBU 14d5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.206 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:33.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14d7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14d8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.207 UTC [policies] Evaluate -> DEBU 14d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.207 UTC [policies] Evaluate -> DEBU 14da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:33.207 UTC [policies] Evaluate -> DEBU 14db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.209 UTC [cauthdsl] func1 -> DEBU 14dc 0xc003390090 gate 1556789253209170200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.210 UTC [cauthdsl] func2 -> DEBU 14dd 0xc003390090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.210 UTC [cauthdsl] func2 -> DEBU 14de 0xc003390090 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.212 UTC [cauthdsl] func2 -> DEBU 14df 0xc003390090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:33.212 UTC [cauthdsl] func2 -> DEBU 14e0 0xc003390090 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.213 UTC [cauthdsl] func1 -> DEBU 14e1 0xc003390090 gate 1556789253209170200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.213 UTC [policies] Evaluate -> DEBU 14e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.213 UTC [policies] Evaluate -> DEBU 14e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.213 UTC [policies] Evaluate -> DEBU 14e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.213 UTC [cauthdsl] func1 -> DEBU 14e5 0xc0033908d0 gate 1556789253213341000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.214 UTC [cauthdsl] func2 -> DEBU 14e6 0xc0033908d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.219 UTC [cauthdsl] func2 -> DEBU 14e7 0xc0033908d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.219 UTC [cauthdsl] func2 -> DEBU 14e8 0xc0033908d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.219 UTC [msp.identity] Verify -> DEBU 14e9 Verify: digest = 00000000 52 fe c7 74 0a 2c 61 71 73 b3 66 2e 1d af e8 7b |R..t.,aqs.f....{| +peer0.org1.example.com | 00000010 34 d7 22 72 ff 06 e7 53 ba 67 f9 88 8c a4 80 57 |4."r...S.g.....W|" +peer0.org1.example.com | "2019-05-02 09:27:33.219 UTC [msp.identity] Verify -> DEBU 14ea Verify: sig = 00000000 30 45 02 21 00 8d f1 b9 69 ea 3a 20 8c 60 d8 c6 |0E.!....i.: .`..| +peer0.org1.example.com | 00000010 25 20 4f 72 ce 0a 56 97 9e 6a 4e 61 6a 98 a0 7c |% Or..V..jNaj..|| +peer0.org1.example.com | 00000020 9e 12 bd 4d 44 02 20 04 9b a3 09 a1 44 3b 03 1d |...MD. .....D;..| +peer0.org1.example.com | 00000030 2c 39 d7 67 38 e3 26 d6 cc a8 4b 3e 88 a7 bd 7b |,9.g8.&...K>...{| +peer0.org1.example.com | 00000040 38 b3 bc 96 dc b8 0b |8......|" +peer0.org1.example.com | "2019-05-02 09:27:33.220 UTC [cauthdsl] func2 -> DEBU 14eb 0xc0033908d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.220 UTC [cauthdsl] func1 -> DEBU 14ec 0xc0033908d0 gate 1556789253213341000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:33.221 UTC [policies] Evaluate -> DEBU 14ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.221 UTC [policies] Evaluate -> DEBU 14ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.221 UTC [policies] Evaluate -> DEBU 14ef Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.222 UTC [policies] Evaluate -> DEBU 14f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.222 UTC [gossip.discovery] handleAliveMessage -> DEBU 14f1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f2 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f3 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 " +peer0.org1.example.com | "2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f4 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 " +peer0.org1.example.com | "2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f5 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:33.224 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.224 UTC [gossip.discovery] handleAliveMessage -> DEBU 14f7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.224 UTC [gossip.discovery] sendMemResponse -> DEBU 14f9 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:33.225 UTC [msp] DeserializeIdentity -> DEBU 14fa Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:07.915 UTC [cauthdsl] func2 -> DEBU 1892 0xc0010f5460 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.915 UTC [cauthdsl] func2 -> DEBU 1893 0xc0010f5460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:07.915 UTC [cauthdsl] func2 -> DEBU 1894 0xc0010f5460 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.916 UTC [cauthdsl] func1 -> DEBU 1895 0xc0010f5460 gate 1556789287914396400 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 1896 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 1897 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] func1 -> DEBU 1898 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 1899 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 189a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 189b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.917 UTC [policies] Evaluate -> DEBU 189c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:07.917 UTC [policies] Evaluate -> DEBU 189d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:07.917 UTC [cauthdsl] func1 -> DEBU 189e 0xc001116150 gate 1556789287917356800 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:07.917 UTC [cauthdsl] func2 -> DEBU 189f 0xc001116150 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:07.917 UTC [cauthdsl] func2 -> DEBU 18a0 0xc001116150 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:07.917 UTC [cauthdsl] func2 -> DEBU 18a1 0xc001116150 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:07.918 UTC [msp.identity] Verify -> DEBU 18a2 Verify: digest = 00000000 63 bd 8b 87 e9 ea d7 22 ed 74 7c ad 89 a0 b0 94 |c......".t|.....| +orderer0.example.com | 00000010 02 c1 77 50 a1 35 5b ee 67 6c 62 d8 8c 4a c4 a9 |..wP.5[.glb..J..|" +orderer0.example.com | "2019-05-02 09:28:07.918 UTC [msp.identity] Verify -> DEBU 18a3 Verify: sig = 00000000 30 45 02 21 00 8b ce df 03 a2 1a 2f 3f 8c c9 a6 |0E.!......./?...| +orderer0.example.com | 00000010 8f 5f 46 ba 1e 9a 98 b7 06 33 d6 32 ec 83 a8 d3 |._F......3.2....| +orderer0.example.com | 00000020 3d 42 b5 6e 30 02 20 02 99 21 9e 5e 01 f7 f5 d1 |=B.n0. ..!.^....| +orderer0.example.com | 00000030 62 1f 03 9d 7f 83 52 89 54 dd d6 e8 b3 af 76 58 |b.....R.T.....vX| +orderer0.example.com | 00000040 30 b4 6c f5 5f 89 df |0.l._..|" +orderer0.example.com | "2019-05-02 09:28:07.919 UTC [cauthdsl] func2 -> DEBU 18a4 0xc001116150 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:07.919 UTC [cauthdsl] func1 -> DEBU 18a5 0xc001116150 gate 1556789287917356800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:07.919 UTC [policies] Evaluate -> DEBU 18a6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.919 UTC [policies] Evaluate -> DEBU 18a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:07.919 UTC [policies] Evaluate -> DEBU 18a8 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.920 UTC [policies] Evaluate -> DEBU 18a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:07.920 UTC [policies] Evaluate -> DEBU 18aa Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.920 UTC [policies] Evaluate -> DEBU 18ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:07.921 UTC [common.deliver] deliverBlocks -> DEBU 18ac [channel: businesschannel] Received seekInfo (0xc0008d1680) start: > stop: > from 172.18.0.8:57422" +orderer0.example.com | "2019-05-02 09:28:07.921 UTC [fsblkstorage] Next -> DEBU 18ad Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:07.921 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ae newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71370]" +orderer0.example.com | "2019-05-02 09:28:07.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18af Remaining bytes=[62172], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:07.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b0 Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}" +orderer0.example.com | "2019-05-02 09:28:07.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b1 blockbytes [4709] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:07.922 UTC [common.deliver] deliverBlocks -> DEBU 18b2 [channel: businesschannel] Delivering block [3] for (0xc0008d1680) for 172.18.0.8:57422" +orderer0.example.com | "2019-05-02 09:28:07.923 UTC [common.deliver] deliverBlocks -> DEBU 18b3 [channel: businesschannel] Done delivering to 172.18.0.8:57422 for (0xc0008d1680)" +orderer0.example.com | "2019-05-02 09:28:07.924 UTC [common.deliver] Handle -> DEBU 18b4 Waiting for new SeekInfo from 172.18.0.8:57422" +orderer0.example.com | "2019-05-02 09:28:07.924 UTC [common.deliver] Handle -> DEBU 18b5 Attempting to read seek info message from 172.18.0.8:57422" +orderer0.example.com | "2019-05-02 09:28:07.932 UTC [common.deliver] Handle -> WARN 18b6 Error reading from 172.18.0.8:57422: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:07.933 UTC [orderer.common.server] func1 -> DEBU 18b7 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:07.933 UTC [comm.grpc.server] 1 -> INFO 18b8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57422 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.6875ms +orderer0.example.com | "2019-05-02 09:28:07.933 UTC [grpc] infof -> DEBU 18b9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:07.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18ba Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +orderer0.example.com | "2019-05-02 09:28:07.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18bb Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-05-02 09:28:07.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 545.3µs " +orderer0.example.com | "2019-05-02 09:28:07.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.8µs " +orderer0.example.com | "2019-05-02 09:28:07.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18be Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:07.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18bf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:08.104 UTC [orderer.common.server] Deliver -> DEBU 18c0 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:08.104 UTC [common.deliver] Handle -> DEBU 18c1 Starting new deliver loop for 172.18.0.8:57424" +orderer0.example.com | "2019-05-02 09:28:08.104 UTC [common.deliver] Handle -> DEBU 18c2 Attempting to read seek info message from 172.18.0.8:57424" +orderer0.example.com | "2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.106 UTC [cauthdsl] func1 -> DEBU 18c8 0xc0011291b0 gate 1556789288106110000 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18c9 0xc0011291b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18ca 0xc0011291b0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18cb 0xc0011291b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18cc 0xc0011291b0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.107 UTC [cauthdsl] func1 -> DEBU 18cd 0xc0011291b0 gate 1556789288106110000 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.107 UTC [policies] Evaluate -> DEBU 18ce Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.107 UTC [policies] Evaluate -> DEBU 18cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.108 UTC [policies] Evaluate -> DEBU 18d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.108 UTC [cauthdsl] func1 -> DEBU 18d1 0xc001129a00 gate 1556789288108763400 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.108 UTC [cauthdsl] func2 -> DEBU 18d2 0xc001129a00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.108 UTC [cauthdsl] func2 -> DEBU 18d3 0xc001129a00 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.109 UTC [cauthdsl] func2 -> DEBU 18d4 0xc001129a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.109 UTC [cauthdsl] func2 -> DEBU 18d5 0xc001129a00 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.109 UTC [cauthdsl] func1 -> DEBU 18d6 0xc001129a00 gate 1556789288108763400 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.109 UTC [policies] Evaluate -> DEBU 18d7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.109 UTC [policies] Evaluate -> DEBU 18d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.110 UTC [policies] Evaluate -> DEBU 18d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.110 UTC [cauthdsl] func1 -> DEBU 18da 0xc000b24240 gate 1556789288110540100 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.110 UTC [cauthdsl] func2 -> DEBU 18db 0xc000b24240 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.110 UTC [cauthdsl] func2 -> DEBU 18dc 0xc000b24240 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.111 UTC [cauthdsl] func2 -> DEBU 18dd 0xc000b24240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.111 UTC [cauthdsl] func2 -> DEBU 18de 0xc000b24240 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.111 UTC [cauthdsl] func1 -> DEBU 18df 0xc000b24240 gate 1556789288110540100 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.111 UTC [policies] func1 -> DEBU 18e2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e3 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:08.112 UTC [policies] Evaluate -> DEBU 18e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.112 UTC [policies] Evaluate -> DEBU 18e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.112 UTC [policies] Evaluate -> DEBU 18e7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.112 UTC [cauthdsl] func1 -> DEBU 18e8 0xc000b24fa0 gate 1556789288112574500 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.112 UTC [cauthdsl] func2 -> DEBU 18e9 0xc000b24fa0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.112 UTC [cauthdsl] func2 -> DEBU 18ea 0xc000b24fa0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.112 UTC [cauthdsl] func2 -> DEBU 18eb 0xc000b24fa0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:08.113 UTC [msp.identity] Verify -> DEBU 18ec Verify: digest = 00000000 c2 3a 59 e3 81 8e 03 36 c4 4b d6 0e 3c 63 f5 b5 |.:Y....6.K.. DEBU 18ed Verify: sig = 00000000 30 45 02 21 00 b7 41 33 2e 7f 02 54 33 71 dc f0 |0E.!..A3...T3q..| +orderer0.example.com | 00000010 7b 0b 3d ed e5 81 e7 9e 18 9d 4c 2b db e3 b8 7c |{.=.......L+...|| +orderer0.example.com | 00000020 59 66 16 b7 43 02 20 5b 22 8c a4 5f 2d 29 ce 2a |Yf..C. [".._-).*| +orderer0.example.com | 00000030 06 2a e7 40 11 06 2c 8a fa 8e 0f 7d 06 6d c8 6a |.*.@..,....}.m.j| +orderer0.example.com | 00000040 02 1e e9 38 eb 37 57 |...8.7W|" +orderer0.example.com | "2019-05-02 09:28:08.113 UTC [cauthdsl] func2 -> DEBU 18ee 0xc000b24fa0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:08.113 UTC [cauthdsl] func1 -> DEBU 18ef 0xc000b24fa0 gate 1556789288112574500 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:08.113 UTC [policies] Evaluate -> DEBU 18f0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:08.113 UTC [policies] Evaluate -> DEBU 18f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:08.113 UTC [policies] Evaluate -> DEBU 18f2 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.225 UTC [msp] DeserializeIdentity -> DEBU 14fb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.225 UTC [msp] DeserializeIdentity -> DEBU 14fc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.225 UTC [gossip.comm] Send -> DEBU 14fd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.226 UTC [gossip.discovery] sendMemResponse -> DEBU 14fe Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:33.226 UTC [gossip.comm] sendToEndpoint -> DEBU 14ff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.227 UTC [gossip.comm] sendToEndpoint -> DEBU 1500 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.307 UTC [endorser] ProcessProposal -> DEBU 1501 Entering: request from 172.18.0.8:57304" +peer0.org1.example.com | "2019-05-02 09:27:33.307 UTC [protoutils] ValidateProposalMessage -> DEBU 1502 ValidateProposalMessage starts for signed proposal 0xc0034f8be0" +peer0.org1.example.com | "2019-05-02 09:27:33.307 UTC [protoutils] validateChannelHeader -> DEBU 1503 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:33.307 UTC [protoutils] checkSignatureFromCreator -> DEBU 1504 begin" +peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [msp] GetManagerForChain -> DEBU 1505 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [protoutils] checkSignatureFromCreator -> DEBU 1506 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [protoutils] checkSignatureFromCreator -> DEBU 1507 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [msp.identity] Verify -> DEBU 1508 Verify: digest = 00000000 29 e0 42 1f e6 07 35 c6 3e 9a 0c db f2 1b b7 24 |).B...5.>......$| +peer0.org1.example.com | 00000010 69 91 e6 dd 29 7f f4 0a 20 6c b2 2a 4f 4a 97 bd |i...)... l.*OJ..|" +peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [msp.identity] Verify -> DEBU 1509 Verify: sig = 00000000 30 44 02 20 0c 5e fd f2 c9 17 8f 09 c2 75 7e c5 |0D. .^.......u~.| +peer0.org1.example.com | 00000010 a6 58 4c 00 e6 66 b6 0c 4a 26 c4 75 e8 b5 d7 ba |.XL..f..J&.u....| +peer0.org1.example.com | 00000020 f0 9f a8 74 02 20 17 dd 7d 09 bd 30 a2 ad 28 06 |...t. ..}..0..(.| +peer0.org1.example.com | 00000030 ac 4e f0 fb c3 62 ea d9 ed f6 f8 66 a3 c2 3a 49 |.N...b.....f..:I| +peer0.org1.example.com | 00000040 93 c4 68 25 75 40 |..h%u@|" +peer0.org1.example.com | "2019-05-02 09:27:33.308 UTC [protoutils] checkSignatureFromCreator -> DEBU 150a exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:33.309 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 150b validateChaincodeProposalMessage starts for proposal 0xc002cdc1c0, header 0xc0034f8ff0" +peer0.org1.example.com | "2019-05-02 09:27:33.309 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 150c validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:33.309 UTC [endorser] preProcess -> DEBU 150d [businesschannel][a1db414e] processing txid: a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db" +peer0.org1.example.com | "2019-05-02 09:27:33.310 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 150e retrieveTransactionByID() - txId = [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]" +peer0.org1.example.com | "2019-05-02 09:27:33.311 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 150f constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:33.311 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1510 constructing new tx simulator txid = [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]" +peer0.org1.example.com | "2019-05-02 09:27:33.311 UTC [endorser] SimulateProposal -> DEBU 1511 [businesschannel][a1db414e] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:33.312 UTC [endorser] callChaincode -> INFO 1512 [businesschannel][a1db414e] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:33.313 UTC [chaincode] Execute -> DEBU 1513 Entry" +peer0.org1.example.com | "2019-05-02 09:27:33.313 UTC [aclmgmt] CheckACL -> DEBU 1514 acl policy not found in config for resource _lifecycle/QueryApprovalStatus" +peer0.org1.example.com | "2019-05-02 09:27:33.313 UTC [policies] Evaluate -> DEBU 1515 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [policies] Evaluate -> DEBU 1516 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [policies] Evaluate -> DEBU 1517 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [cauthdsl] func1 -> DEBU 1518 0xc003285550 gate 1556789253314302900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [cauthdsl] func2 -> DEBU 1519 0xc003285550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [cauthdsl] func2 -> DEBU 151a 0xc003285550 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [cauthdsl] func2 -> DEBU 151b 0xc003285550 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.314 UTC [msp.identity] Verify -> DEBU 151c Verify: digest = 00000000 29 e0 42 1f e6 07 35 c6 3e 9a 0c db f2 1b b7 24 |).B...5.>......$| +peer0.org1.example.com | 00000010 69 91 e6 dd 29 7f f4 0a 20 6c b2 2a 4f 4a 97 bd |i...)... l.*OJ..|" +peer0.org1.example.com | "2019-05-02 09:27:33.315 UTC [msp.identity] Verify -> DEBU 151d Verify: sig = 00000000 30 44 02 20 0c 5e fd f2 c9 17 8f 09 c2 75 7e c5 |0D. .^.......u~.| +peer0.org1.example.com | 00000010 a6 58 4c 00 e6 66 b6 0c 4a 26 c4 75 e8 b5 d7 ba |.XL..f..J&.u....| +peer0.org1.example.com | 00000020 f0 9f a8 74 02 20 17 dd 7d 09 bd 30 a2 ad 28 06 |...t. ..}..0..(.| +peer0.org1.example.com | 00000030 ac 4e f0 fb c3 62 ea d9 ed f6 f8 66 a3 c2 3a 49 |.N...b.....f..:I| +peer0.org1.example.com | 00000040 93 c4 68 25 75 40 |..h%u@|" +peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [cauthdsl] func2 -> DEBU 151e 0xc003285550 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [cauthdsl] func1 -> DEBU 151f 0xc003285550 gate 1556789253314302900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1520 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1521 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1522 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1523 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:33.317 UTC [lifecycle] QueryApprovalStatus -> DEBU 1524 received invocation of QueryApprovalStatus on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: false), validation info: (plugin: '', policy: ''), collections: ()'" +peer0.org1.example.com | "2019-05-02 09:27:33.317 UTC [chaincode] handleMessage -> DEBU 1525 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:33.317 UTC [chaincode] HandleTransaction -> DEBU 1526 [a1db414e] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:33.317 UTC [chaincode] HandleGetState -> DEBU 1527 [a1db414e] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:33.318 UTC [stateleveldb] GetState -> DEBU 1528 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:33.318 UTC [chaincode] HandleGetState -> DEBU 1529 [a1db414e] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-05-02 09:27:33.318 UTC [chaincode] HandleTransaction -> DEBU 152a [a1db414e] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:33.318 UTC [chaincode] handleMessage -> DEBU 152b [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:33.318 UTC [chaincode] HandleTransaction -> DEBU 152c [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:33.319 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 152d [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:33.319 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 152e retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 152f retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [stateleveldb] GetState -> DEBU 1530 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] HandleTransaction -> DEBU 1531 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] handleMessage -> DEBU 1532 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] HandleTransaction -> DEBU 1533 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1534 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [stateleveldb] GetState -> DEBU 1535 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] HandleTransaction -> DEBU 1536 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:33.320 UTC [chaincode] handleMessage -> DEBU 1537 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:33.321 UTC [chaincode] HandleTransaction -> DEBU 1538 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:33.321 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1539 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:33.322 UTC [stateleveldb] GetState -> DEBU 153a GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 153b [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:33.322 UTC [chaincode] handleMessage -> DEBU 153c [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:33.322 UTC [chaincode] HandleTransaction -> DEBU 153d [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:33.323 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 153e [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:33.323 UTC [stateleveldb] GetState -> DEBU 153f GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-05-02 09:27:33.324 UTC [chaincode] HandleTransaction -> DEBU 1540 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:33.324 UTC [chaincode] handleMessage -> DEBU 1541 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:33.325 UTC [chaincode] HandleTransaction -> DEBU 1542 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:33.325 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1543 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:33.326 UTC [stateleveldb] GetState -> DEBU 1544 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-05-02 09:27:33.326 UTC [chaincode] HandleTransaction -> DEBU 1545 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:33.326 UTC [chaincode] handleMessage -> DEBU 1546 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleTransaction -> DEBU 1547 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1548 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [stateleveldb] GetState -> DEBU 1549 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleTransaction -> DEBU 154a [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] handleMessage -> DEBU 154b [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleTransaction -> DEBU 154c [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 154d [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:33.327 UTC [stateleveldb] GetState -> DEBU 154e GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 154f [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:33.328 UTC [chaincode] handleMessage -> DEBU 1550 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:33.328 UTC [chaincode] HandleTransaction -> DEBU 1551 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:33.328 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1552 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:33.328 UTC [stateleveldb] GetState -> DEBU 1553 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +orderer0.example.com | "2019-05-02 09:28:08.114 UTC [policies] Evaluate -> DEBU 18f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:08.114 UTC [policies] Evaluate -> DEBU 18f4 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:08.114 UTC [policies] Evaluate -> DEBU 18f5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:08.114 UTC [common.deliver] deliverBlocks -> DEBU 18f6 [channel: businesschannel] Received seekInfo (0xc000089700) start: > stop: > from 172.18.0.8:57424" +orderer0.example.com | "2019-05-02 09:28:08.115 UTC [fsblkstorage] Next -> DEBU 18f7 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:08.115 UTC [fsblkstorage] newBlockfileStream -> DEBU 18f8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76081]" +orderer0.example.com | "2019-05-02 09:28:08.115 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18f9 Remaining bytes=[57461], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:08.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18fa Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76081], bytesOffset=[76083]}" +orderer0.example.com | "2019-05-02 09:28:08.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18fb blockbytes [4707] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:08.116 UTC [common.deliver] deliverBlocks -> DEBU 18fc [channel: businesschannel] Delivering block [4] for (0xc000089700) for 172.18.0.8:57424" +orderer0.example.com | "2019-05-02 09:28:08.117 UTC [common.deliver] deliverBlocks -> DEBU 18fd [channel: businesschannel] Done delivering to 172.18.0.8:57424 for (0xc000089700)" +orderer0.example.com | "2019-05-02 09:28:08.117 UTC [common.deliver] Handle -> DEBU 18fe Waiting for new SeekInfo from 172.18.0.8:57424" +orderer0.example.com | "2019-05-02 09:28:08.118 UTC [common.deliver] Handle -> DEBU 18ff Attempting to read seek info message from 172.18.0.8:57424" +orderer0.example.com | "2019-05-02 09:28:08.124 UTC [common.deliver] Handle -> WARN 1900 Error reading from 172.18.0.8:57424: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:08.124 UTC [orderer.common.server] func1 -> DEBU 1901 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:08.124 UTC [comm.grpc.server] 1 -> INFO 1902 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57424 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6932ms +orderer0.example.com | "2019-05-02 09:28:08.124 UTC [grpc] infof -> DEBU 1903 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:08.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1904 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:08.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1905 Sending msg of 28 bytes to 3 on channel testchainid took 62.2µs" +orderer0.example.com | "2019-05-02 09:28:08.188 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1906 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.3498ms " +orderer0.example.com | "2019-05-02 09:28:08.367 UTC [orderer.common.server] Deliver -> DEBU 1907 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:08.367 UTC [common.deliver] Handle -> DEBU 1908 Starting new deliver loop for 172.18.0.8:57426" +orderer0.example.com | "2019-05-02 09:28:08.367 UTC [common.deliver] Handle -> DEBU 1909 Attempting to read seek info message from 172.18.0.8:57426" +orderer0.example.com | "2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 190e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func1 -> DEBU 190f 0xc0011490b0 gate 1556789288369082600 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1910 0xc0011490b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1911 0xc0011490b0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1912 0xc0011490b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1913 0xc0011490b0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.369 UTC [cauthdsl] func1 -> DEBU 1914 0xc0011490b0 gate 1556789288369082600 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 1915 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 1916 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 1917 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func1 -> DEBU 1918 0xc0011498f0 gate 1556789288370152600 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 1919 0xc0011498f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 191a 0xc0011498f0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 191b 0xc0011498f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 191c 0xc0011498f0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.370 UTC [cauthdsl] func1 -> DEBU 191d 0xc0011498f0 gate 1556789288370152600 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.370 UTC [policies] Evaluate -> DEBU 191e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.370 UTC [policies] Evaluate -> DEBU 191f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.371 UTC [policies] Evaluate -> DEBU 1920 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func1 -> DEBU 1921 0xc0012aa130 gate 1556789288371194200 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1922 0xc0012aa130 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1923 0xc0012aa130 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1924 0xc0012aa130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1925 0xc0012aa130 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.329 UTC [chaincode] HandleTransaction -> DEBU 1554 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:33.329 UTC [lifecycle] QueryApprovalStatus -> INFO 1555 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:33.329 UTC [chaincode] handleMessage -> DEBU 1556 [a1db414e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:33.330 UTC [chaincode] Notify -> DEBU 1557 [a1db414e] notifying Txid:a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:33.330 UTC [chaincode] Execute -> DEBU 1558 Exit" +peer0.org1.example.com | "2019-05-02 09:27:33.330 UTC [endorser] callChaincode -> INFO 1559 [businesschannel][a1db414e] Exit chaincode: name:"_lifecycle" (18ms)" +peer0.org1.example.com | "2019-05-02 09:27:33.331 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 155a Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:33.331 UTC [lockbasedtxmgr] Done -> DEBU 155b Done with transaction simulation / query execution [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]" +peer0.org1.example.com | "2019-05-02 09:27:33.331 UTC [endorser] SimulateProposal -> DEBU 155c [businesschannel][a1db414e] Exit" +peer0.org1.example.com | "2019-05-02 09:27:33.331 UTC [endorser] endorseProposal -> DEBU 155d [businesschannel][a1db414e] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:33.331 UTC [endorser] endorseProposal -> DEBU 155e [businesschannel][a1db414e] escc for chaincode name:"_lifecycle" is escc" +peer0.org1.example.com | "2019-05-02 09:27:33.332 UTC [endorser] EndorseWithPlugin -> DEBU 155f Entering endorsement for {plugin: escc, channel: businesschannel, tx: a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-05-02 09:27:33.332 UTC [msp.identity] Sign -> DEBU 1560 Sign: plaintext: 0A20FE47358EC6EE2717181BAAE7A5DD...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [msp.identity] Sign -> DEBU 1561 Sign: digest: E84B2A758A10207F6988F7971A0D08DF14F8A20D2AACD352036244DEEC74E504 " +peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [endorser] EndorseWithPlugin -> DEBU 1562 Exiting {plugin: escc, channel: businesschannel, tx: a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [endorser] endorseProposal -> DEBU 1563 [businesschannel][a1db414e] Exit" +peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [lockbasedtxmgr] Done -> DEBU 1564 Done with transaction simulation / query execution [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]" +peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [endorser] func1 -> DEBU 1565 Exit: request from 172.18.0.8:57304" +peer0.org1.example.com | "2019-05-02 09:27:33.333 UTC [comm.grpc.server] 1 -> INFO 1566 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57304 grpc.code=OK grpc.call_duration=26.7171ms +peer0.org1.example.com | "2019-05-02 09:27:33.341 UTC [grpc] infof -> DEBU 1567 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:33.341 UTC [grpc] infof -> DEBU 1568 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:33.843 UTC [gossip.comm] func1 -> DEBU 1569 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [gossip.gossip] handleMessage -> DEBU 156a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [gossip.gossip] handleMessage -> DEBU 156b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 156d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [msp] DeserializeIdentity -> DEBU 156e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 156f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1570 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1571 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:33.844 UTC [policies] Evaluate -> DEBU 1572 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 1573 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 1574 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func1 -> DEBU 1575 0xc002f68bf0 gate 1556789253845145500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1576 0xc002f68bf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1577 0xc002f68bf0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1578 0xc002f68bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1579 0xc002f68bf0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func1 -> DEBU 157a 0xc002f68bf0 gate 1556789253845145500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 157b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 157c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 157d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func1 -> DEBU 157e 0xc002f69430 gate 1556789253845739000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 157f 0xc002f69430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1580 0xc002f69430 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1581 0xc002f69430 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [msp.identity] Verify -> DEBU 1582 Verify: digest = 00000000 2b 3e bf 3c d1 b2 64 f0 70 4c f9 b0 6e ea d0 e5 |+>.<..d.pL..n...| +peer0.org1.example.com | 00000010 ff 3c 9a 63 3a ea bc f6 31 a6 95 57 dc 29 74 da |.<.c:...1..W.)t.|" +peer0.org1.example.com | "2019-05-02 09:27:33.845 UTC [msp.identity] Verify -> DEBU 1583 Verify: sig = 00000000 30 45 02 21 00 8e 4c 76 39 ba 6b f2 fd 62 b9 c6 |0E.!..Lv9.k..b..| +peer0.org1.example.com | 00000010 ba fc 1f 80 18 a5 6e 70 3f 8b a7 df cc 26 15 82 |......np?....&..| +peer0.org1.example.com | 00000020 fa 66 48 7b 5d 02 20 38 c5 34 41 a8 97 b5 b3 bc |.fH{]. 8.4A.....| +peer0.org1.example.com | 00000030 d3 02 4b c8 69 ac c2 a7 cf f0 9f d4 3e cd c3 4a |..K.i.......>..J| +peer0.org1.example.com | 00000040 12 19 e4 c7 94 1a 2b |......+|" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [cauthdsl] func2 -> DEBU 1584 0xc002f69430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [cauthdsl] func1 -> DEBU 1585 0xc002f69430 gate 1556789253845739000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1586 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1587 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1588 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1589 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 158a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 " +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 " +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 1590 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1591 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1592 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1593 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1594 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1595 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1596 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1597 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.848 UTC [gossip.comm] Send -> DEBU 1598 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.849 UTC [msp] DeserializeIdentity -> DEBU 1599 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.850 UTC [msp] DeserializeIdentity -> DEBU 159a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:33.851 UTC [gossip.comm] sendToEndpoint -> DEBU 159b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-05-02 09:28:08.371 UTC [cauthdsl] func1 -> DEBU 1926 0xc0012aa130 gate 1556789288371194200 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.371 UTC [policies] Evaluate -> DEBU 1927 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.371 UTC [policies] Evaluate -> DEBU 1928 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.371 UTC [policies] func1 -> DEBU 1929 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192a Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.372 UTC [cauthdsl] func1 -> DEBU 192f 0xc0012aae20 gate 1556789288372680300 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.372 UTC [cauthdsl] func2 -> DEBU 1930 0xc0012aae20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.372 UTC [cauthdsl] func2 -> DEBU 1931 0xc0012aae20 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.372 UTC [cauthdsl] func2 -> DEBU 1932 0xc0012aae20 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:08.373 UTC [msp.identity] Verify -> DEBU 1933 Verify: digest = 00000000 26 1a 16 4a 19 d4 86 3d 03 22 b3 a2 1f 33 e9 69 |&..J...=."...3.i| +orderer0.example.com | 00000010 fd b7 00 f1 5f 78 fa ab 4f 2e fd c2 07 76 3c 3d |...._x..O....v<=|" +orderer0.example.com | "2019-05-02 09:28:08.373 UTC [msp.identity] Verify -> DEBU 1934 Verify: sig = 00000000 30 45 02 21 00 c5 8c 3a 37 ba 81 8d b7 59 86 9a |0E.!...:7....Y..| +orderer0.example.com | 00000010 63 89 0d 6a d7 64 62 8a 3a 73 9f 9a 16 26 75 db |c..j.db.:s...&u.| +orderer0.example.com | 00000020 7a 26 ce 8d 84 02 20 11 5a ae 96 60 5b f7 42 bd |z&.... .Z..`[.B.| +orderer0.example.com | 00000030 1e 44 57 d5 1a ca 94 cb 3d 7c 4a d1 bd ad 9e 9d |.DW.....=|J.....| +orderer0.example.com | 00000040 ef 30 c6 b7 af 8b b2 |.0.....|" +orderer0.example.com | "2019-05-02 09:28:08.373 UTC [cauthdsl] func2 -> DEBU 1935 0xc0012aae20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:08.373 UTC [cauthdsl] func1 -> DEBU 1936 0xc0012aae20 gate 1556789288372680300 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:08.373 UTC [policies] Evaluate -> DEBU 1937 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 1938 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 1939 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 193a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 193b Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 193c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:08.374 UTC [common.deliver] deliverBlocks -> DEBU 193d [channel: businesschannel] Received seekInfo (0xc0002209c0) start: > stop: > from 172.18.0.8:57426" +orderer0.example.com | "2019-05-02 09:28:08.374 UTC [fsblkstorage] Next -> DEBU 193e Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:08.375 UTC [fsblkstorage] newBlockfileStream -> DEBU 193f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80790]" +orderer0.example.com | "2019-05-02 09:28:08.375 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1940 Remaining bytes=[52752], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:08.375 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1941 Returning blockbytes - length=[5709], placementInfo={fileNum=[0], startOffset=[80790], bytesOffset=[80792]}" +orderer0.example.com | "2019-05-02 09:28:08.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1942 blockbytes [5709] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:08.376 UTC [common.deliver] deliverBlocks -> DEBU 1943 [channel: businesschannel] Delivering block [5] for (0xc0002209c0) for 172.18.0.8:57426" +orderer0.example.com | "2019-05-02 09:28:08.376 UTC [common.deliver] deliverBlocks -> DEBU 1944 [channel: businesschannel] Done delivering to 172.18.0.8:57426 for (0xc0002209c0)" +orderer0.example.com | "2019-05-02 09:28:08.377 UTC [common.deliver] Handle -> DEBU 1945 Waiting for new SeekInfo from 172.18.0.8:57426" +orderer0.example.com | "2019-05-02 09:28:08.377 UTC [common.deliver] Handle -> DEBU 1946 Attempting to read seek info message from 172.18.0.8:57426" +orderer0.example.com | "2019-05-02 09:28:08.389 UTC [common.deliver] Handle -> WARN 1947 Error reading from 172.18.0.8:57426: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:08.389 UTC [orderer.common.server] func1 -> DEBU 1948 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:08.391 UTC [comm.grpc.server] 1 -> INFO 1949 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57426 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.7817ms +orderer0.example.com | "2019-05-02 09:28:08.392 UTC [grpc] infof -> DEBU 194a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:08.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 194b Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs" +orderer0.example.com | "2019-05-02 09:28:08.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 194c Sending msg of 28 bytes to 3 on channel businesschannel took 20.6µs" +orderer0.example.com | "2019-05-02 09:28:08.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 194d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 776.4µs " +orderer0.example.com | "2019-05-02 09:28:08.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 194e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.4µs " +orderer0.example.com | "2019-05-02 09:28:08.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 194f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:08.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1950 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:08.597 UTC [orderer.common.server] Deliver -> DEBU 1951 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:08.597 UTC [common.deliver] Handle -> DEBU 1952 Starting new deliver loop for 172.18.0.8:57428" +orderer0.example.com | "2019-05-02 09:28:08.597 UTC [common.deliver] Handle -> DEBU 1953 Attempting to read seek info message from 172.18.0.8:57428" +orderer0.example.com | "2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1954 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:33.851 UTC [gossip.comm] Send -> DEBU 159c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:33.851 UTC [gossip.gossip] handleMessage -> DEBU 159f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.851 UTC [gossip.comm] sendToEndpoint -> DEBU 159e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.852 UTC [gossip.gossip] handleMessage -> DEBU 15a0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.852 UTC [gossip.comm] sendToEndpoint -> DEBU 15a1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.851 UTC [gossip.comm] sendToEndpoint -> DEBU 159d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.856 UTC [gossip.gossip] handleMessage -> DEBU 15a4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.856 UTC [gossip.gossip] handleMessage -> DEBU 15a5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:33.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:33.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.060 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 15a8 Sleeping 25s" +peer0.org1.example.com | "2019-05-02 09:27:34.072 UTC [msp.identity] Sign -> DEBU 15a9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151015 " +peer0.org1.example.com | "2019-05-02 09:27:34.072 UTC [msp.identity] Sign -> DEBU 15aa Sign: digest: A904CBD01281C429B6BD28A7567973D0E1230141D1B53B01D4A9F9990D525EAF " +peer0.org1.example.com | "2019-05-02 09:27:34.072 UTC [msp.identity] Sign -> DEBU 15ab Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:34.073 UTC [msp.identity] Sign -> DEBU 15ac Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:34.073 UTC [gossip.discovery] periodicalSendAlive -> DEBU 15ad Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:34.083 UTC [msp] DeserializeIdentity -> DEBU 15ae Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.083 UTC [msp] DeserializeIdentity -> DEBU 15af Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.084 UTC [msp] DeserializeIdentity -> DEBU 15b0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.084 UTC [gossip.comm] Send -> DEBU 15b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:34.085 UTC [gossip.comm] Send -> DEBU 15b2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:34.085 UTC [msp] DeserializeIdentity -> DEBU 15b3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.086 UTC [gossip.comm] Send -> DEBU 15b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.085 UTC [gossip.comm] sendToEndpoint -> DEBU 15b4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.089 UTC [gossip.comm] sendToEndpoint -> DEBU 15ba Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.113 UTC [endorser] ProcessProposal -> DEBU 15bb Entering: request from 172.18.0.8:57312" +peer0.org1.example.com | "2019-05-02 09:27:34.113 UTC [protoutils] ValidateProposalMessage -> DEBU 15bc ValidateProposalMessage starts for signed proposal 0xc00355aaf0" +peer0.org1.example.com | "2019-05-02 09:27:34.114 UTC [protoutils] validateChannelHeader -> DEBU 15bd validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:34.114 UTC [protoutils] checkSignatureFromCreator -> DEBU 15be begin" +peer0.org1.example.com | "2019-05-02 09:27:34.114 UTC [protoutils] checkSignatureFromCreator -> DEBU 15bf creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:34.115 UTC [protoutils] checkSignatureFromCreator -> DEBU 15c0 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:34.115 UTC [msp.identity] Verify -> DEBU 15c1 Verify: digest = 00000000 e4 ce fb f7 1a 2b 3c c9 47 be 4f f4 73 9f bd fa |.....+<.G.O.s...| +peer0.org1.example.com | 00000010 66 4a b6 8f c4 0b b7 b6 da 38 fd f4 da 27 6d d3 |fJ.......8...'m.|" +peer0.org1.example.com | "2019-05-02 09:27:34.115 UTC [msp.identity] Verify -> DEBU 15c2 Verify: sig = 00000000 30 45 02 21 00 f6 b0 76 6f 65 20 95 38 c3 1c 37 |0E.!...voe .8..7| +peer0.org1.example.com | 00000010 7f 37 50 77 87 b6 cb 00 81 3d 78 7f 0d 8c 87 aa |.7Pw.....=x.....| +peer0.org1.example.com | 00000020 57 b0 34 36 cc 02 20 1a 2f 82 76 87 93 d8 33 13 |W.46.. ./.v...3.| +peer0.org1.example.com | 00000030 c3 dd 94 e7 44 3e 31 64 6a 11 01 ad d5 f3 5d b2 |....D>1dj.....].| +peer0.org1.example.com | 00000040 00 29 c4 b2 98 03 fa |.).....|" +peer0.org1.example.com | "2019-05-02 09:27:34.116 UTC [protoutils] checkSignatureFromCreator -> DEBU 15c3 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:34.116 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 15c4 validateChaincodeProposalMessage starts for proposal 0xc002e0a9a0, header 0xc00355af00" +peer0.org1.example.com | "2019-05-02 09:27:34.116 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 15c5 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:34.116 UTC [endorser] preProcess -> DEBU 15c6 [][886fbd33] processing txid: 886fbd339aae6c5ef8a6bf897111183a880f515f061050051f85053ae56d5910" +peer0.org1.example.com | "2019-05-02 09:27:34.117 UTC [endorser] SimulateProposal -> DEBU 15c7 [][886fbd33] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:34.118 UTC [endorser] callChaincode -> INFO 15c8 [][886fbd33] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:34.118 UTC [chaincode] Execute -> DEBU 15c9 Entry" +peer0.org1.example.com | "2019-05-02 09:27:34.118 UTC [msp.identity] Verify -> DEBU 15ca Verify: digest = 00000000 e4 ce fb f7 1a 2b 3c c9 47 be 4f f4 73 9f bd fa |.....+<.G.O.s...| +peer0.org1.example.com | 00000010 66 4a b6 8f c4 0b b7 b6 da 38 fd f4 da 27 6d d3 |fJ.......8...'m.|" +peer0.org1.example.com | "2019-05-02 09:27:34.119 UTC [msp.identity] Verify -> DEBU 15cb Verify: sig = 00000000 30 45 02 21 00 f6 b0 76 6f 65 20 95 38 c3 1c 37 |0E.!...voe .8..7| +peer0.org1.example.com | 00000010 7f 37 50 77 87 b6 cb 00 81 3d 78 7f 0d 8c 87 aa |.7Pw.....=x.....| +peer0.org1.example.com | 00000020 57 b0 34 36 cc 02 20 1a 2f 82 76 87 93 d8 33 13 |W.46.. ./.v...3.| +peer0.org1.example.com | 00000030 c3 dd 94 e7 44 3e 31 64 6a 11 01 ad d5 f3 5d b2 |....D>1dj.....].| +peer0.org1.example.com | 00000040 00 29 c4 b2 98 03 fa |.).....|" +peer0.org1.example.com | "2019-05-02 09:27:34.119 UTC [lifecycle] QueryInstalledChaincodes -> DEBU 15cc received invocation of QueryInstalledChaincodes" +peer0.org1.example.com | "2019-05-02 09:27:34.120 UTC [chaincode] handleMessage -> DEBU 15cd [886fbd33] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.120 UTC [chaincode] Notify -> DEBU 15ce [886fbd33] notifying Txid:886fbd339aae6c5ef8a6bf897111183a880f515f061050051f85053ae56d5910, channelID:" +peer0.org1.example.com | "2019-05-02 09:27:34.120 UTC [chaincode] Execute -> DEBU 15cf Exit" +peer0.org1.example.com | "2019-05-02 09:27:34.121 UTC [endorser] callChaincode -> INFO 15d0 [][886fbd33] Exit chaincode: name:"_lifecycle" (3ms)" +peer0.org1.example.com | "2019-05-02 09:27:34.121 UTC [endorser] SimulateProposal -> DEBU 15d1 [][886fbd33] Exit" +peer0.org1.example.com | "2019-05-02 09:27:34.121 UTC [endorser] func1 -> DEBU 15d2 Exit: request from 172.18.0.8:57312" +peer0.org1.example.com | "2019-05-02 09:27:34.122 UTC [comm.grpc.server] 1 -> INFO 15d3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57312 grpc.code=OK grpc.call_duration=9.2835ms +peer0.org1.example.com | "2019-05-02 09:27:34.129 UTC [gossip.gossip] handleMessage -> DEBU 15d4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.129 UTC [gossip.gossip] handleMessage -> DEBU 15d5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.129 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.129 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15d7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:34.130 UTC [msp.identity] Verify -> DEBU 15d8 Verify: digest = 00000000 f5 f8 70 94 92 a1 f3 96 ff 1e a3 18 d5 20 fd 6a |..p.......... .j| +peer0.org1.example.com | 00000010 44 43 32 6c 49 91 f2 95 63 12 0d 8a cd 1d c4 e5 |DC2lI...c.......|" +peer0.org1.example.com | "2019-05-02 09:27:34.130 UTC [msp.identity] Verify -> DEBU 15d9 Verify: sig = 00000000 30 44 02 20 7d 7b c1 34 9a c2 05 4d d0 99 53 e6 |0D. }{.4...M..S.| +peer0.org1.example.com | 00000010 46 d8 6f e2 20 14 a8 88 de 9d 17 a4 b0 a0 3d 85 |F.o. .........=.| +peer0.org1.example.com | 00000020 e8 5b 92 50 02 20 2f 45 e4 54 cb bb 0e dd 8c 4d |.[.P. /E.T.....M| +peer0.org1.example.com | 00000030 ba 98 8f 12 48 7c bb fc 84 98 e1 f0 26 86 d8 ff |....H|......&...| +peer0.org1.example.com | 00000040 2e 37 1f ee 0e 99 |.7....|" +peer0.org1.example.com | "2019-05-02 09:27:34.131 UTC [msp.identity] Verify -> DEBU 15da Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:34.131 UTC [msp.identity] Verify -> DEBU 15db Verify: sig = 00000000 30 45 02 21 00 d9 f4 41 57 df d3 7f 27 e4 c0 85 |0E.!...AW...'...| +peer0.org1.example.com | 00000010 c5 ae 34 6a d0 3d 15 ce f5 80 7e c6 16 27 11 b2 |..4j.=....~..'..| +peer0.org1.example.com | 00000020 c0 36 f8 07 25 02 20 31 fd 8b 18 7b 21 df ad 48 |.6..%. 1...{!..H| +peer0.org1.example.com | 00000030 23 b7 f6 7d 63 9d 2a 11 d7 1a 83 1b 69 70 ac 92 |#..}c.*.....ip..| +peer0.org1.example.com | 00000040 a7 83 1b a9 31 64 42 |....1dB|" +peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] handleAliveMessage -> DEBU 15dc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15dd Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15de updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 " +peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15df Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 " +peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.132 UTC [gossip.discovery] handleAliveMessage -> DEBU 15e2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.133 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15e3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.133 UTC [msp] DeserializeIdentity -> DEBU 15e4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.133 UTC [msp] DeserializeIdentity -> DEBU 15e5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.133 UTC [msp] DeserializeIdentity -> DEBU 15e6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.133 UTC [gossip.comm] Send -> DEBU 15e7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:34.134 UTC [msp] DeserializeIdentity -> DEBU 15e8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.134 UTC [gossip.comm] Send -> DEBU 15e9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:34.135 UTC [gossip.comm] sendToEndpoint -> DEBU 15ea Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.135 UTC [gossip.comm] sendToEndpoint -> DEBU 15eb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.136 UTC [gossip.comm] sendToEndpoint -> DEBU 15ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.136 UTC [gossip.comm] sendToEndpoint -> DEBU 15ed Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.138 UTC [gossip.comm] func1 -> DEBU 15ee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.138 UTC [gossip.gossip] handleMessage -> DEBU 15ef Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.138 UTC [gossip.gossip] handleMessage -> DEBU 15f0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.139 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.139 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.145 UTC [grpc] infof -> DEBU 15f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:34.145 UTC [gossip.gossip] handleMessage -> DEBU 15f4 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.145 UTC [gossip.gossip] handleMessage -> DEBU 15f5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.146 UTC [grpc] infof -> DEBU 15f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:34.200 UTC [gossip.gossip] handleMessage -> DEBU 15f9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.200 UTC [gossip.gossip] handleMessage -> DEBU 15fa Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.201 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15fc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:34.201 UTC [msp] DeserializeIdentity -> DEBU 15fd Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1955 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1956 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1957 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1958 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.599 UTC [cauthdsl] func1 -> DEBU 1959 0xc0011594d0 gate 1556789288599854200 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.599 UTC [cauthdsl] func2 -> DEBU 195a 0xc0011594d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.600 UTC [cauthdsl] func2 -> DEBU 195b 0xc0011594d0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.601 UTC [cauthdsl] func2 -> DEBU 195c 0xc0011594d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.601 UTC [cauthdsl] func2 -> DEBU 195d 0xc0011594d0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.601 UTC [cauthdsl] func1 -> DEBU 195e 0xc0011594d0 gate 1556789288599854200 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.601 UTC [policies] Evaluate -> DEBU 195f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.601 UTC [policies] Evaluate -> DEBU 1960 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.601 UTC [policies] Evaluate -> DEBU 1961 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func1 -> DEBU 1962 0xc001159d10 gate 1556789288602276900 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1963 0xc001159d10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1964 0xc001159d10 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1965 0xc001159d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1966 0xc001159d10 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.602 UTC [cauthdsl] func1 -> DEBU 1967 0xc001159d10 gate 1556789288602276900 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.603 UTC [policies] Evaluate -> DEBU 1968 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.603 UTC [policies] Evaluate -> DEBU 1969 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.603 UTC [policies] Evaluate -> DEBU 196a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.603 UTC [cauthdsl] func1 -> DEBU 196b 0xc001022670 gate 1556789288603411200 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.603 UTC [cauthdsl] func2 -> DEBU 196c 0xc001022670 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.603 UTC [cauthdsl] func2 -> DEBU 196d 0xc001022670 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.603 UTC [cauthdsl] func2 -> DEBU 196e 0xc001022670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.604 UTC [cauthdsl] func2 -> DEBU 196f 0xc001022670 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.604 UTC [cauthdsl] func1 -> DEBU 1970 0xc001022670 gate 1556789288603411200 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1971 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1972 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.604 UTC [policies] func1 -> DEBU 1973 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1974 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1975 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:08.605 UTC [policies] Evaluate -> DEBU 1976 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.605 UTC [policies] Evaluate -> DEBU 1977 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.605 UTC [policies] Evaluate -> DEBU 1978 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.605 UTC [cauthdsl] func1 -> DEBU 1979 0xc001023360 gate 1556789288605625800 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.605 UTC [cauthdsl] func2 -> DEBU 197a 0xc001023360 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.605 UTC [cauthdsl] func2 -> DEBU 197b 0xc001023360 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.605 UTC [cauthdsl] func2 -> DEBU 197c 0xc001023360 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:08.606 UTC [msp.identity] Verify -> DEBU 197d Verify: digest = 00000000 8b 4e c6 16 a0 ef d7 dd 19 51 2f 47 82 55 2f f8 |.N.......Q/G.U/.| +orderer0.example.com | 00000010 96 db 89 68 55 4b 6c 3f dd 3a b4 41 f4 29 d6 8e |...hUKl?.:.A.)..|" +orderer0.example.com | "2019-05-02 09:28:08.606 UTC [msp.identity] Verify -> DEBU 197e Verify: sig = 00000000 30 44 02 20 1d 83 da 52 84 8a 81 27 59 78 80 dd |0D. ...R...'Yx..| +orderer0.example.com | 00000010 d8 5e c3 49 19 39 7b 96 70 5e 6a d7 b4 26 87 6d |.^.I.9{.p^j..&.m| +orderer0.example.com | 00000020 04 f8 18 e9 02 20 31 7e 86 02 c0 e9 b5 08 f1 40 |..... 1~.......@| +orderer0.example.com | 00000030 1a 9f c3 5b 79 e0 13 79 40 00 49 47 c4 38 53 00 |...[y..y@.IG.8S.| +orderer0.example.com | 00000040 09 7a 0b 14 bc e0 |.z....|" +orderer0.example.com | "2019-05-02 09:28:08.606 UTC [cauthdsl] func2 -> DEBU 197f 0xc001023360 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:08.606 UTC [cauthdsl] func1 -> DEBU 1980 0xc001023360 gate 1556789288605625800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:08.606 UTC [policies] Evaluate -> DEBU 1981 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:08.606 UTC [policies] Evaluate -> DEBU 1982 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1983 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1984 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1985 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1986 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.201 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:34.201 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15ff Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:34.201 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1600 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [policies] Evaluate -> DEBU 1601 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [policies] Evaluate -> DEBU 1602 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [policies] Evaluate -> DEBU 1603 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [cauthdsl] func1 -> DEBU 1604 0xc0033301e0 gate 1556789254202182500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [cauthdsl] func2 -> DEBU 1605 0xc0033301e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [cauthdsl] func2 -> DEBU 1606 0xc0033301e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:34.202 UTC [cauthdsl] func2 -> DEBU 1607 0xc0033301e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:34.203 UTC [cauthdsl] func2 -> DEBU 1608 0xc0033301e0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:34.204 UTC [cauthdsl] func1 -> DEBU 1609 0xc0033301e0 gate 1556789254202182500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:34.204 UTC [policies] Evaluate -> DEBU 160a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.204 UTC [policies] Evaluate -> DEBU 160b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.206 UTC [policies] Evaluate -> DEBU 160c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:34.216 UTC [gossip.comm] func1 -> DEBU 160d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.216 UTC [gossip.gossip] handleMessage -> DEBU 160e Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.209 UTC [cauthdsl] func1 -> DEBU 160f 0xc003330a20 gate 1556789254209820800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:34.220 UTC [cauthdsl] func2 -> DEBU 1610 0xc003330a20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:34.220 UTC [cauthdsl] func2 -> DEBU 1611 0xc003330a20 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:34.221 UTC [cauthdsl] func2 -> DEBU 1612 0xc003330a20 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:34.221 UTC [msp.identity] Verify -> DEBU 1613 Verify: digest = 00000000 9d d2 f3 f0 31 89 7e 29 b8 bc 9c bf 2d 06 77 44 |....1.~)....-.wD| +peer0.org1.example.com | 00000010 1d c6 07 c1 26 85 c9 8c 17 6d 0d 10 bd 50 13 e2 |....&....m...P..|" +peer0.org1.example.com | "2019-05-02 09:27:34.221 UTC [msp.identity] Verify -> DEBU 1614 Verify: sig = 00000000 30 45 02 21 00 e0 01 43 20 01 73 83 de 1f 9c 5c |0E.!...C .s....\| +peer0.org1.example.com | 00000010 aa 34 75 d6 c1 80 39 2d a2 35 41 b1 89 7d 8a b7 |.4u...9-.5A..}..| +peer0.org1.example.com | 00000020 6c 65 3f b5 9a 02 20 4f de c9 b2 a3 e4 43 85 f6 |le?... O.....C..| +peer0.org1.example.com | 00000030 de 4b 43 51 6f 91 58 05 02 bc d7 b5 96 89 45 2d |.KCQo.X.......E-| +peer0.org1.example.com | 00000040 94 ad e4 9c cc 75 81 |.....u.|" +peer0.org1.example.com | "2019-05-02 09:27:34.222 UTC [cauthdsl] func2 -> DEBU 1615 0xc003330a20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:34.223 UTC [cauthdsl] func1 -> DEBU 1616 0xc003330a20 gate 1556789254209820800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 1617 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 1618 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 1619 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 161a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.224 UTC [gossip.discovery] handleAliveMessage -> DEBU 161b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.225 UTC [gossip.discovery] learnExistingMembers -> DEBU 161c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:34.225 UTC [gossip.discovery] learnExistingMembers -> DEBU 161d updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 " +peer0.org1.example.com | "2019-05-02 09:27:34.226 UTC [gossip.discovery] learnExistingMembers -> DEBU 161e Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 " +orderer0.example.com | "2019-05-02 09:28:08.607 UTC [common.deliver] deliverBlocks -> DEBU 1987 [channel: businesschannel] Received seekInfo (0xc000bb0100) start: > stop: > from 172.18.0.8:57428" +orderer0.example.com | "2019-05-02 09:28:08.608 UTC [fsblkstorage] Next -> DEBU 1988 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:08.608 UTC [fsblkstorage] newBlockfileStream -> DEBU 1989 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86501]" +orderer0.example.com | "2019-05-02 09:28:08.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 198a Remaining bytes=[47041], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:08.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 198b Returning blockbytes - length=[4060], placementInfo={fileNum=[0], startOffset=[86501], bytesOffset=[86503]}" +orderer0.example.com | "2019-05-02 09:28:08.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 198c blockbytes [4060] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:08.608 UTC [common.deliver] deliverBlocks -> DEBU 198d [channel: businesschannel] Delivering block [6] for (0xc000bb0100) for 172.18.0.8:57428" +orderer0.example.com | "2019-05-02 09:28:08.609 UTC [common.deliver] deliverBlocks -> DEBU 198e [channel: businesschannel] Done delivering to 172.18.0.8:57428 for (0xc000bb0100)" +orderer0.example.com | "2019-05-02 09:28:08.611 UTC [common.deliver] Handle -> DEBU 198f Waiting for new SeekInfo from 172.18.0.8:57428" +orderer0.example.com | "2019-05-02 09:28:08.611 UTC [common.deliver] Handle -> DEBU 1990 Attempting to read seek info message from 172.18.0.8:57428" +orderer0.example.com | "2019-05-02 09:28:08.617 UTC [common.deliver] Handle -> WARN 1991 Error reading from 172.18.0.8:57428: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:08.617 UTC [orderer.common.server] func1 -> DEBU 1992 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:08.617 UTC [comm.grpc.server] 1 -> INFO 1993 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57428 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0819ms +orderer0.example.com | "2019-05-02 09:28:08.617 UTC [grpc] infof -> DEBU 1994 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:08.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1995 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:08.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1996 Sending msg of 28 bytes to 3 on channel testchainid took 47.6µs" +orderer0.example.com | "2019-05-02 09:28:08.682 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1997 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1148ms " +orderer0.example.com | "2019-05-02 09:28:08.835 UTC [orderer.common.server] Deliver -> DEBU 1998 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:08.835 UTC [common.deliver] Handle -> DEBU 1999 Starting new deliver loop for 172.18.0.8:57430" +orderer0.example.com | "2019-05-02 09:28:08.835 UTC [common.deliver] Handle -> DEBU 199a Attempting to read seek info message from 172.18.0.8:57430" +orderer0.example.com | "2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func1 -> DEBU 19a0 0xc000cfe020 gate 1556789288836977200 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a1 0xc000cfe020 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a2 0xc000cfe020 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a3 0xc000cfe020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a4 0xc000cfe020 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.837 UTC [cauthdsl] func1 -> DEBU 19a5 0xc000cfe020 gate 1556789288836977200 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.837 UTC [policies] Evaluate -> DEBU 19a6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.838 UTC [policies] Evaluate -> DEBU 19a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.838 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.838 UTC [cauthdsl] func1 -> DEBU 19a9 0xc000cfe860 gate 1556789288838884000 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19aa 0xc000cfe860 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19ab 0xc000cfe860 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19ac 0xc000cfe860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000cfe860 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.839 UTC [cauthdsl] func1 -> DEBU 19ae 0xc000cfe860 gate 1556789288838884000 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.839 UTC [policies] Evaluate -> DEBU 19af Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.839 UTC [policies] Evaluate -> DEBU 19b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.839 UTC [policies] Evaluate -> DEBU 19b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.840 UTC [cauthdsl] func1 -> DEBU 19b2 0xc000cff0a0 gate 1556789288840215000 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.840 UTC [cauthdsl] func2 -> DEBU 19b3 0xc000cff0a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.840 UTC [cauthdsl] func2 -> DEBU 19b4 0xc000cff0a0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.840 UTC [cauthdsl] func2 -> DEBU 19b5 0xc000cff0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:08.841 UTC [cauthdsl] func2 -> DEBU 19b6 0xc000cff0a0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.841 UTC [cauthdsl] func1 -> DEBU 19b7 0xc000cff0a0 gate 1556789288840215000 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19b8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.226 UTC [gossip.discovery] learnExistingMembers -> DEBU 161f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.discovery] learnExistingMembers -> DEBU 1620 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.discovery] handleAliveMessage -> DEBU 1621 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1622 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.gossip] handleMessage -> DEBU 1623 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1624 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.227 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1625 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.232 UTC [msp] DeserializeIdentity -> DEBU 1626 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.232 UTC [msp] DeserializeIdentity -> DEBU 1627 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.232 UTC [msp] DeserializeIdentity -> DEBU 1628 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.233 UTC [msp] DeserializeIdentity -> DEBU 1629 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.233 UTC [msp] DeserializeIdentity -> DEBU 162a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.234 UTC [msp] DeserializeIdentity -> DEBU 162b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.241 UTC [gossip.comm] Send -> DEBU 162c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:34.241 UTC [msp] DeserializeIdentity -> DEBU 162d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.241 UTC [msp] DeserializeIdentity -> DEBU 162e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:34.241 UTC [gossip.comm] Send -> DEBU 162f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1630 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1631 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1632 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1633 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.243 UTC [gossip.gossip] handleMessage -> DEBU 1634 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.243 UTC [gossip.gossip] handleMessage -> DEBU 1635 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.244 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1636 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.244 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1637 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:34.413 UTC [endorser] ProcessProposal -> DEBU 1638 Entering: request from 172.18.0.8:57316" +peer0.org1.example.com | "2019-05-02 09:27:34.414 UTC [protoutils] ValidateProposalMessage -> DEBU 1639 ValidateProposalMessage starts for signed proposal 0xc003758870" +peer0.org1.example.com | "2019-05-02 09:27:34.414 UTC [protoutils] validateChannelHeader -> DEBU 163a validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:34.415 UTC [protoutils] checkSignatureFromCreator -> DEBU 163b begin" +peer0.org1.example.com | "2019-05-02 09:27:34.415 UTC [msp] GetManagerForChain -> DEBU 163c Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:34.415 UTC [protoutils] checkSignatureFromCreator -> DEBU 163d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:34.416 UTC [protoutils] checkSignatureFromCreator -> DEBU 163e creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:34.416 UTC [msp.identity] Verify -> DEBU 163f Verify: digest = 00000000 a4 6b 50 6e c8 73 56 22 b1 b9 51 73 a9 da c1 05 |.kPn.sV"..Qs....| +peer0.org1.example.com | 00000010 77 3d 1a 3f c7 af ce 96 76 dd 39 b9 56 ea 49 d4 |w=.?....v.9.V.I.|" +peer0.org1.example.com | "2019-05-02 09:27:34.416 UTC [msp.identity] Verify -> DEBU 1640 Verify: sig = 00000000 30 44 02 20 10 56 84 67 bb 80 4d 7d 09 37 05 0f |0D. .V.g..M}.7..| +peer0.org1.example.com | 00000010 88 31 49 ce ee 2d 7d b6 f6 49 00 86 39 1e f0 74 |.1I..-}..I..9..t| +peer0.org1.example.com | 00000020 20 e5 8e 7d 02 20 78 1b e2 4c fe 69 49 bc 35 46 | ..}. x..L.iI.5F| +peer0.org1.example.com | 00000030 ac 5f d0 fe 4c fa a5 71 b0 bb 63 e1 fc 67 ff 7c |._..L..q..c..g.|| +peer0.org1.example.com | 00000040 3f 89 3f c3 ef 3f |?.?..?|" +peer0.org1.example.com | "2019-05-02 09:27:34.417 UTC [protoutils] checkSignatureFromCreator -> DEBU 1641 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:34.417 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1642 validateChaincodeProposalMessage starts for proposal 0xc002cdccb0, header 0xc003758cd0" +peer0.org1.example.com | "2019-05-02 09:27:34.418 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1643 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:34.418 UTC [endorser] preProcess -> DEBU 1644 [businesschannel][f6f68e79] processing txid: f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1" +peer0.org1.example.com | "2019-05-02 09:27:34.418 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1645 retrieveTransactionByID() - txId = [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]" +peer0.org1.example.com | "2019-05-02 09:27:34.418 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1646 constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:34.419 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1647 constructing new tx simulator txid = [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]" +peer0.org1.example.com | "2019-05-02 09:27:34.419 UTC [endorser] SimulateProposal -> DEBU 1648 [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:34.420 UTC [endorser] callChaincode -> INFO 1649 [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:34.420 UTC [chaincode] Execute -> DEBU 164a Entry" +orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] func1 -> DEBU 19ba Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bb Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:08.842 UTC [cauthdsl] func1 -> DEBU 19c0 0xc000cffd90 gate 1556789288842186500 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:08.842 UTC [cauthdsl] func2 -> DEBU 19c1 0xc000cffd90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:08.842 UTC [cauthdsl] func2 -> DEBU 19c2 0xc000cffd90 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:08.842 UTC [cauthdsl] func2 -> DEBU 19c3 0xc000cffd90 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:08.842 UTC [msp.identity] Verify -> DEBU 19c4 Verify: digest = 00000000 e2 16 b6 ce 94 50 34 28 06 48 7a b1 5e f2 cd 8e |.....P4(.Hz.^...| +orderer0.example.com | 00000010 80 b4 3b 07 ab 70 cf 34 4e 52 0c b6 98 fb 52 a9 |..;..p.4NR....R.|" +orderer0.example.com | "2019-05-02 09:28:08.842 UTC [msp.identity] Verify -> DEBU 19c5 Verify: sig = 00000000 30 45 02 21 00 d4 74 bd 8d 7a df 79 41 c8 c5 a6 |0E.!..t..z.yA...| +orderer0.example.com | 00000010 92 b7 73 62 98 3f ec 22 40 24 b2 47 b1 b8 d4 f4 |..sb.?."@$.G....| +orderer0.example.com | 00000020 b0 08 ac bf f7 02 20 60 f4 8b 7e 8e 90 79 55 ef |...... `..~..yU.| +orderer0.example.com | 00000030 53 32 f6 34 30 4a 85 54 32 ad f6 1b 92 a8 e3 9f |S2.40J.T2.......| +orderer0.example.com | 00000040 1c 0d e4 6d b6 c5 03 |...m...|" +orderer0.example.com | "2019-05-02 09:28:08.843 UTC [cauthdsl] func2 -> DEBU 19c6 0xc000cffd90 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:08.843 UTC [cauthdsl] func1 -> DEBU 19c7 0xc000cffd90 gate 1556789288842186500 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19c8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19ca Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:08.844 UTC [policies] Evaluate -> DEBU 19cc Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:08.844 UTC [policies] Evaluate -> DEBU 19cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:08.844 UTC [common.deliver] deliverBlocks -> DEBU 19ce [channel: businesschannel] Received seekInfo (0xc000221840) start: > stop: > from 172.18.0.8:57430" +orderer0.example.com | "2019-05-02 09:28:08.844 UTC [fsblkstorage] Next -> DEBU 19cf Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:08.844 UTC [fsblkstorage] newBlockfileStream -> DEBU 19d0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90563]" +orderer0.example.com | "2019-05-02 09:28:08.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d1 Remaining bytes=[42979], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:08.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d2 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[90563], bytesOffset=[90565]}" +orderer0.example.com | "2019-05-02 09:28:08.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d3 blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:08.845 UTC [common.deliver] deliverBlocks -> DEBU 19d4 [channel: businesschannel] Delivering block [7] for (0xc000221840) for 172.18.0.8:57430" +orderer0.example.com | "2019-05-02 09:28:08.846 UTC [common.deliver] deliverBlocks -> DEBU 19d5 [channel: businesschannel] Done delivering to 172.18.0.8:57430 for (0xc000221840)" +orderer0.example.com | "2019-05-02 09:28:08.846 UTC [common.deliver] Handle -> DEBU 19d6 Waiting for new SeekInfo from 172.18.0.8:57430" +orderer0.example.com | "2019-05-02 09:28:08.846 UTC [common.deliver] Handle -> DEBU 19d7 Attempting to read seek info message from 172.18.0.8:57430" +orderer0.example.com | "2019-05-02 09:28:08.853 UTC [common.deliver] Handle -> WARN 19d8 Error reading from 172.18.0.8:57430: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:08.854 UTC [orderer.common.server] func1 -> DEBU 19d9 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:08.856 UTC [comm.grpc.server] 1 -> INFO 19da streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57430 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.8614ms +orderer0.example.com | "2019-05-02 09:28:08.856 UTC [grpc] infof -> DEBU 19db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:08.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dc Sending msg of 28 bytes to 2 on channel businesschannel took 59.5µs" +orderer0.example.com | "2019-05-02 09:28:08.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dd Sending msg of 28 bytes to 3 on channel businesschannel took 31.7µs" +orderer0.example.com | "2019-05-02 09:28:08.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19de Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 589.2µs " +orderer0.example.com | "2019-05-02 09:28:08.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 395.8µs " +orderer0.example.com | "2019-05-02 09:28:08.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:08.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:09.050 UTC [orderer.common.server] Deliver -> DEBU 19e2 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:09.050 UTC [common.deliver] Handle -> DEBU 19e3 Starting new deliver loop for 172.18.0.8:57432" +orderer0.example.com | "2019-05-02 09:28:09.050 UTC [common.deliver] Handle -> DEBU 19e4 Attempting to read seek info message from 172.18.0.8:57432" +orderer0.example.com | "2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:34.420 UTC [aclmgmt] CheckACL -> DEBU 164b acl policy /Channel/Application/Writers found in config for resource _lifecycle/CommitChaincodeDefinition" +peer0.org1.example.com | "2019-05-02 09:27:34.420 UTC [aclmgmt] CheckACL -> DEBU 164c acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-05-02 09:27:34.421 UTC [policies] Evaluate -> DEBU 164d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:34.421 UTC [policies] Evaluate -> DEBU 164e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:34.422 UTC [policies] Evaluate -> DEBU 164f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:34.422 UTC [cauthdsl] func1 -> DEBU 1650 0xc00252b340 gate 1556789254422484900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:34.422 UTC [cauthdsl] func2 -> DEBU 1651 0xc00252b340 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:34.423 UTC [cauthdsl] func2 -> DEBU 1652 0xc00252b340 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:34.423 UTC [cauthdsl] func2 -> DEBU 1653 0xc00252b340 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:34.424 UTC [msp.identity] Verify -> DEBU 1654 Verify: digest = 00000000 a4 6b 50 6e c8 73 56 22 b1 b9 51 73 a9 da c1 05 |.kPn.sV"..Qs....| +peer0.org1.example.com | 00000010 77 3d 1a 3f c7 af ce 96 76 dd 39 b9 56 ea 49 d4 |w=.?....v.9.V.I.|" +peer0.org1.example.com | "2019-05-02 09:27:34.424 UTC [msp.identity] Verify -> DEBU 1655 Verify: sig = 00000000 30 44 02 20 10 56 84 67 bb 80 4d 7d 09 37 05 0f |0D. .V.g..M}.7..| +peer0.org1.example.com | 00000010 88 31 49 ce ee 2d 7d b6 f6 49 00 86 39 1e f0 74 |.1I..-}..I..9..t| +peer0.org1.example.com | 00000020 20 e5 8e 7d 02 20 78 1b e2 4c fe 69 49 bc 35 46 | ..}. x..L.iI.5F| +peer0.org1.example.com | 00000030 ac 5f d0 fe 4c fa a5 71 b0 bb 63 e1 fc 67 ff 7c |._..L..q..c..g.|| +peer0.org1.example.com | 00000040 3f 89 3f c3 ef 3f |?.?..?|" +peer0.org1.example.com | "2019-05-02 09:27:34.425 UTC [cauthdsl] func2 -> DEBU 1656 0xc00252b340 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:34.425 UTC [cauthdsl] func1 -> DEBU 1657 0xc00252b340 gate 1556789254422484900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:34.425 UTC [policies] Evaluate -> DEBU 1658 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:34.426 UTC [policies] Evaluate -> DEBU 1659 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:34.426 UTC [policies] Evaluate -> DEBU 165a Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:34.426 UTC [policies] Evaluate -> DEBU 165b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:34.427 UTC [lifecycle] CommitChaincodeDefinition -> DEBU 165c received invocation of CommitChaincodeDefinition on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" +peer0.org1.example.com | "2019-05-02 09:27:34.427 UTC [chaincode] handleMessage -> DEBU 165d [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.427 UTC [chaincode] HandleTransaction -> DEBU 165e [f6f68e79] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleGetState -> DEBU 165f [f6f68e79] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [stateleveldb] GetState -> DEBU 1660 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleGetState -> DEBU 1661 [f6f68e79] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleTransaction -> DEBU 1662 [f6f68e79] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] handleMessage -> DEBU 1663 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleTransaction -> DEBU 1664 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1665 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1666 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1667 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [stateleveldb] GetState -> DEBU 1668 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-05-02 09:27:34.428 UTC [chaincode] HandleTransaction -> DEBU 1669 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 166a [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 166b [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 166c [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [stateleveldb] GetState -> DEBU 166d GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 166e [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 166f [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 1670 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1671 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [stateleveldb] GetState -> DEBU 1672 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1673 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 1674 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 1675 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1676 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [stateleveldb] GetState -> DEBU 1677 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 1678 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 1679 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 167a [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 167b [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [stateleveldb] GetState -> DEBU 167c GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] HandleTransaction -> DEBU 167d [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] handleMessage -> DEBU 167e [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] HandleTransaction -> DEBU 167f [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1680 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [stateleveldb] GetState -> DEBU 1681 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] HandleTransaction -> DEBU 1682 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.430 UTC [chaincode] handleMessage -> DEBU 1683 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.431 UTC [chaincode] HandleTransaction -> DEBU 1684 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.431 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1685 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.431 UTC [stateleveldb] GetState -> DEBU 1686 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 1687 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.433 UTC [chaincode] handleMessage -> DEBU 1688 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.433 UTC [chaincode] HandleTransaction -> DEBU 1689 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.434 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 168a [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.434 UTC [stateleveldb] GetState -> DEBU 168b GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-05-02 09:27:34.435 UTC [chaincode] HandleTransaction -> DEBU 168c [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.435 UTC [lifecycle] QueryApprovalStatus -> INFO 168d successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:34.436 UTC [chaincode] handleMessage -> DEBU 168e [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.436 UTC [chaincode] HandleTransaction -> DEBU 168f [f6f68e79] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.437 UTC [chaincode] HandleGetState -> DEBU 1690 [f6f68e79] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.437 UTC [stateleveldb] GetState -> DEBU 1691 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-05-02 09:27:34.438 UTC [chaincode] HandleGetState -> DEBU 1692 [f6f68e79] No state associated with key: namespaces/metadata/exp02. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-05-02 09:27:34.438 UTC [chaincode] HandleTransaction -> DEBU 1693 [f6f68e79] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.439 UTC [chaincode] handleMessage -> DEBU 1694 [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.439 UTC [chaincode] HandleTransaction -> DEBU 1695 [f6f68e79] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.440 UTC [chaincode] HandleTransaction -> DEBU 1696 [f6f68e79] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.440 UTC [chaincode] handleMessage -> DEBU 1697 [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.441 UTC [chaincode] HandleTransaction -> DEBU 1698 [f6f68e79] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.441 UTC [chaincode] HandleTransaction -> DEBU 1699 [f6f68e79] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.442 UTC [chaincode] handleMessage -> DEBU 169a [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.443 UTC [chaincode] HandleTransaction -> DEBU 169b [f6f68e79] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.443 UTC [chaincode] HandleTransaction -> DEBU 169c [f6f68e79] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.444 UTC [chaincode] handleMessage -> DEBU 169d [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.444 UTC [chaincode] HandleTransaction -> DEBU 169e [f6f68e79] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.444 UTC [chaincode] HandleTransaction -> DEBU 169f [f6f68e79] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.445 UTC [chaincode] handleMessage -> DEBU 16a0 [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.445 UTC [chaincode] HandleTransaction -> DEBU 16a1 [f6f68e79] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:34.446 UTC [chaincode] HandleTransaction -> DEBU 16a2 [f6f68e79] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:34.446 UTC [lifecycle] CommitChaincodeDefinition -> INFO 16a3 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +orderer0.example.com | "2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.051 UTC [cauthdsl] func1 -> DEBU 19ea 0xc0011ca090 gate 1556789289051899400 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.051 UTC [cauthdsl] func2 -> DEBU 19eb 0xc0011ca090 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.052 UTC [cauthdsl] func2 -> DEBU 19ec 0xc0011ca090 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.052 UTC [cauthdsl] func2 -> DEBU 19ed 0xc0011ca090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:09.052 UTC [cauthdsl] func2 -> DEBU 19ee 0xc0011ca090 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.052 UTC [cauthdsl] func1 -> DEBU 19ef 0xc0011ca090 gate 1556789289051899400 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.053 UTC [policies] Evaluate -> DEBU 19f0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.053 UTC [policies] Evaluate -> DEBU 19f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.053 UTC [policies] Evaluate -> DEBU 19f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.054 UTC [cauthdsl] func1 -> DEBU 19f3 0xc0011ca8d0 gate 1556789289054104300 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.054 UTC [cauthdsl] func2 -> DEBU 19f4 0xc0011ca8d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.056 UTC [cauthdsl] func2 -> DEBU 19f5 0xc0011ca8d0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.056 UTC [cauthdsl] func2 -> DEBU 19f6 0xc0011ca8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:09.056 UTC [cauthdsl] func2 -> DEBU 19f7 0xc0011ca8d0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.057 UTC [cauthdsl] func1 -> DEBU 19f8 0xc0011ca8d0 gate 1556789289054104300 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.057 UTC [policies] Evaluate -> DEBU 19f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.057 UTC [policies] Evaluate -> DEBU 19fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.057 UTC [policies] Evaluate -> DEBU 19fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.058 UTC [cauthdsl] func1 -> DEBU 19fc 0xc0011cb110 gate 1556789289058056700 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 19fd 0xc0011cb110 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 19fe 0xc0011cb110 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 19ff 0xc0011cb110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 1a00 0xc0011cb110 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.059 UTC [cauthdsl] func1 -> DEBU 1a01 0xc0011cb110 gate 1556789289058056700 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a02 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] func1 -> DEBU 1a04 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a05 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a07 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a08 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a09 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.059 UTC [cauthdsl] func1 -> DEBU 1a0a 0xc0011cbe00 gate 1556789289059921200 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.064 UTC [cauthdsl] func2 -> DEBU 1a0b 0xc0011cbe00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.064 UTC [cauthdsl] func2 -> DEBU 1a0c 0xc0011cbe00 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.065 UTC [cauthdsl] func2 -> DEBU 1a0d 0xc0011cbe00 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:09.065 UTC [msp.identity] Verify -> DEBU 1a0e Verify: digest = 00000000 67 7d 0f 6f 26 08 a9 e7 a0 6b 81 16 cf 2d 64 28 |g}.o&....k...-d(| +orderer0.example.com | 00000010 4c d2 f4 11 f9 8c 65 76 62 67 d2 58 81 43 be a1 |L.....evbg.X.C..|" +orderer0.example.com | "2019-05-02 09:28:09.065 UTC [msp.identity] Verify -> DEBU 1a0f Verify: sig = 00000000 30 44 02 20 11 8c bc c0 a6 5f 6d b8 ca 62 06 de |0D. ....._m..b..| +orderer0.example.com | 00000010 2c 1c d1 fc 1a 37 24 20 16 03 61 60 41 d4 15 93 |,....7$ ..a`A...| +orderer0.example.com | 00000020 34 f6 e1 53 02 20 45 f6 3e 83 9d 53 c7 5f f7 e4 |4..S. E.>..S._..| +orderer0.example.com | 00000030 78 fb 64 3d 6f c1 66 ee 5d 59 14 3e df 3d fc 42 |x.d=o.f.]Y.>.=.B| +orderer0.example.com | 00000040 07 33 26 3c b2 cf |.3&<..|" +orderer0.example.com | "2019-05-02 09:28:09.065 UTC [cauthdsl] func2 -> DEBU 1a10 0xc0011cbe00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:09.065 UTC [cauthdsl] func1 -> DEBU 1a11 0xc0011cbe00 gate 1556789289059921200 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a12 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a14 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a16 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:09.066 UTC [policies] Evaluate -> DEBU 1a17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:09.066 UTC [common.deliver] deliverBlocks -> DEBU 1a18 [channel: businesschannel] Received seekInfo (0xc000bb0840) start: > stop: > from 172.18.0.8:57432" +orderer0.example.com | "2019-05-02 09:28:09.066 UTC [fsblkstorage] Next -> DEBU 1a19 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:09.066 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a1a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]" +orderer0.example.com | "2019-05-02 09:28:09.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1b Remaining bytes=[38928], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:09.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1c Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}" +orderer0.example.com | "2019-05-02 09:28:09.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1d blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:09.067 UTC [common.deliver] deliverBlocks -> DEBU 1a1e [channel: businesschannel] Delivering block [8] for (0xc000bb0840) for 172.18.0.8:57432" +orderer0.example.com | "2019-05-02 09:28:09.067 UTC [common.deliver] deliverBlocks -> DEBU 1a1f [channel: businesschannel] Done delivering to 172.18.0.8:57432 for (0xc000bb0840)" +orderer0.example.com | "2019-05-02 09:28:09.067 UTC [common.deliver] Handle -> DEBU 1a20 Waiting for new SeekInfo from 172.18.0.8:57432" +orderer0.example.com | "2019-05-02 09:28:09.067 UTC [common.deliver] Handle -> DEBU 1a21 Attempting to read seek info message from 172.18.0.8:57432" +orderer0.example.com | "2019-05-02 09:28:09.089 UTC [common.deliver] Handle -> WARN 1a22 Error reading from 172.18.0.8:57432: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:09.090 UTC [orderer.common.server] func1 -> DEBU 1a23 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:09.090 UTC [comm.grpc.server] 1 -> INFO 1a24 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57432 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=41.0645ms +orderer0.example.com | "2019-05-02 09:28:09.092 UTC [grpc] infof -> DEBU 1a25 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:09.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a26 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:09.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a27 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-05-02 09:28:09.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a28 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81µs " +orderer0.example.com | "2019-05-02 09:28:09.302 UTC [orderer.common.server] Deliver -> DEBU 1a29 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:09.302 UTC [common.deliver] Handle -> DEBU 1a2a Starting new deliver loop for 172.18.0.8:57434" +orderer0.example.com | "2019-05-02 09:28:09.302 UTC [common.deliver] Handle -> DEBU 1a2b Attempting to read seek info message from 172.18.0.8:57434" +orderer0.example.com | "2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a30 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.303 UTC [cauthdsl] func1 -> DEBU 1a31 0xc0012046a0 gate 1556789289303922500 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a32 0xc0012046a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a33 0xc0012046a0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a34 0xc0012046a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a35 0xc0012046a0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func1 -> DEBU 1a36 0xc0012046a0 gate 1556789289303922500 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [policies] Evaluate -> DEBU 1a37 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [policies] Evaluate -> DEBU 1a38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [policies] Evaluate -> DEBU 1a39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func1 -> DEBU 1a3a 0xc001204ee0 gate 1556789289304846800 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a3b 0xc001204ee0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a3c 0xc001204ee0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a3d 0xc001204ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc001204ee0 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func1 -> DEBU 1a3f 0xc001204ee0 gate 1556789289304846800 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.305 UTC [policies] Evaluate -> DEBU 1a40 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.305 UTC [policies] Evaluate -> DEBU 1a41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.305 UTC [policies] Evaluate -> DEBU 1a42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func1 -> DEBU 1a43 0xc001205720 gate 1556789289305659700 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a44 0xc001205720 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a45 0xc001205720 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a46 0xc001205720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [cauthdsl] func2 -> DEBU 1a47 0xc001205720 principal evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [cauthdsl] func1 -> DEBU 1a48 0xc001205720 gate 1556789289305659700 evaluation fails" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a49 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] func1 -> DEBU 1a4b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4c Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:34.446 UTC [chaincode] handleMessage -> DEBU 16a4 [f6f68e79] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:34.447 UTC [chaincode] Notify -> DEBU 16a5 [f6f68e79] notifying Txid:f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:34.447 UTC [chaincode] Execute -> DEBU 16a6 Exit" +peer0.org1.example.com | "2019-05-02 09:27:34.447 UTC [endorser] callChaincode -> INFO 16a7 [businesschannel][f6f68e79] Exit chaincode: name:"_lifecycle" (27ms)" +peer0.org1.example.com | "2019-05-02 09:27:34.447 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 16a8 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:34.448 UTC [lockbasedtxmgr] Done -> DEBU 16a9 Done with transaction simulation / query execution [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]" +peer0.org1.example.com | "2019-05-02 09:27:34.448 UTC [endorser] SimulateProposal -> DEBU 16aa [businesschannel][f6f68e79] Exit" +peer0.org1.example.com | "2019-05-02 09:27:34.448 UTC [endorser] endorseProposal -> DEBU 16ab [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:34.449 UTC [endorser] endorseProposal -> DEBU 16ac [businesschannel][f6f68e79] escc for chaincode name:"_lifecycle" is escc" +peer0.org1.example.com | "2019-05-02 09:27:34.449 UTC [endorser] EndorseWithPlugin -> DEBU 16ad Entering endorsement for {plugin: escc, channel: businesschannel, tx: f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-05-02 09:27:34.449 UTC [msp.identity] Sign -> DEBU 16ae Sign: plaintext: 0A20AF1811FEBE0A7A011CB75C185DAC...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:34.450 UTC [msp.identity] Sign -> DEBU 16af Sign: digest: 64E4B5318BFE5590738A9489AEECF0B08EDE71F592071BE975069271FB0687E1 " +peer0.org1.example.com | "2019-05-02 09:27:34.450 UTC [endorser] EndorseWithPlugin -> DEBU 16b0 Exiting {plugin: escc, channel: businesschannel, tx: f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-05-02 09:27:34.450 UTC [endorser] endorseProposal -> DEBU 16b1 [businesschannel][f6f68e79] Exit" +peer0.org1.example.com | "2019-05-02 09:27:34.450 UTC [lockbasedtxmgr] Done -> DEBU 16b2 Done with transaction simulation / query execution [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]" +peer0.org1.example.com | "2019-05-02 09:27:34.451 UTC [endorser] func1 -> DEBU 16b3 Exit: request from 172.18.0.8:57316" +peer0.org1.example.com | "2019-05-02 09:27:34.451 UTC [comm.grpc.server] 1 -> INFO 16b4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57316 grpc.code=OK grpc.call_duration=38.3784ms +peer0.org1.example.com | "2019-05-02 09:27:34.469 UTC [common.deliverevents] DeliverFiltered -> DEBU 16b5 Starting new DeliverFiltered handler" +peer0.org1.example.com | "2019-05-02 09:27:34.469 UTC [common.deliver] Handle -> DEBU 16b6 Starting new deliver loop for 172.18.0.8:57318" +peer0.org1.example.com | "2019-05-02 09:27:34.469 UTC [common.deliver] Handle -> DEBU 16b7 Attempting to read seek info message from 172.18.0.8:57318" +peer0.org1.example.com | "2019-05-02 09:27:34.476 UTC [aclmgmt] CheckACL -> DEBU 16b8 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" +peer0.org1.example.com | "2019-05-02 09:27:34.476 UTC [aclmgmt] CheckACL -> DEBU 16b9 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-05-02 09:27:34.476 UTC [policies] Evaluate -> DEBU 16ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:34.476 UTC [policies] Evaluate -> DEBU 16bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:34.477 UTC [policies] Evaluate -> DEBU 16bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:34.477 UTC [cauthdsl] func1 -> DEBU 16bd 0xc003799cb0 gate 1556789254477306600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:34.477 UTC [cauthdsl] func2 -> DEBU 16be 0xc003799cb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:34.477 UTC [cauthdsl] func2 -> DEBU 16bf 0xc003799cb0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:34.477 UTC [cauthdsl] func2 -> DEBU 16c0 0xc003799cb0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [msp.identity] Verify -> DEBU 16c1 Verify: digest = 00000000 8f 3c aa 80 37 34 90 21 ef 0a fb d6 96 8e ed 14 |.<..74.!........| +peer0.org1.example.com | 00000010 c1 f6 3f 46 d9 7d 30 b2 d7 40 38 7d fd c5 38 01 |..?F.}0..@8}..8.|" +peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [msp.identity] Verify -> DEBU 16c2 Verify: sig = 00000000 30 44 02 20 37 0e 61 4c c7 88 70 67 e3 d2 b7 e8 |0D. 7.aL..pg....| +peer0.org1.example.com | 00000010 63 ef ee c9 e4 60 d0 5f 5d 69 92 02 08 9e 85 b5 |c....`._]i......| +peer0.org1.example.com | 00000020 e7 b4 fb 21 02 20 05 6a b8 6d 96 58 f2 cc b8 a1 |...!. .j.m.X....| +peer0.org1.example.com | 00000030 8a 31 49 cf ae 27 77 69 53 9e e5 ff bf 2b 68 10 |.1I..'wiS....+h.| +peer0.org1.example.com | 00000040 25 88 ab 99 0b 31 |%....1|" +peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [cauthdsl] func2 -> DEBU 16c3 0xc003799cb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [cauthdsl] func1 -> DEBU 16c4 0xc003799cb0 gate 1556789254477306600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [policies] Evaluate -> DEBU 16c5 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.478 UTC [policies] Evaluate -> DEBU 16c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.479 UTC [policies] Evaluate -> DEBU 16c7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.479 UTC [policies] Evaluate -> DEBU 16c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:34.479 UTC [common.deliver] deliverBlocks -> DEBU 16c9 [channel: businesschannel] Received seekInfo (0xc0034d26c0) start: > stop: > from 172.18.0.8:57318" +peer0.org1.example.com | "2019-05-02 09:27:34.480 UTC [fsblkstorage] Next -> DEBU 16ca Initializing block stream for iterator. itr.maxBlockNumAvailable=4" +peer0.org1.example.com | "2019-05-02 09:27:34.480 UTC [fsblkstorage] newBlockfileStream -> DEBU 16cb newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[76084]" +peer0.org1.example.com | "2019-05-02 09:27:34.480 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16cc Remaining bytes=[4710], Going to peek [8] bytes" +peer0.org1.example.com | "2019-05-02 09:27:34.480 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16cd Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[76084], bytesOffset=[76086]}" +peer0.org1.example.com | "2019-05-02 09:27:34.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16ce blockbytes [4708] read from file [0]" +peer0.org1.example.com | "2019-05-02 09:27:34.481 UTC [common.deliver] deliverBlocks -> DEBU 16cf [channel: businesschannel] Delivering block [4] for (0xc0034d26c0) for 172.18.0.8:57318" +peer0.org1.example.com | "2019-05-02 09:27:34.483 UTC [fsblkstorage] waitForBlock -> DEBU 16d0 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +peer0.org1.example.com | "2019-05-02 09:27:36.285 UTC [msp] DeserializeIdentity -> DEBU 16d1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.286 UTC [msp] DeserializeIdentity -> DEBU 16d2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.287 UTC [gossip.comm] Send -> DEBU 16d3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:36.287 UTC [gossip.comm] sendToEndpoint -> DEBU 16d4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.288 UTC [gossip.comm] sendToEndpoint -> DEBU 16d5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.288 UTC [gossip.comm] sendToEndpoint -> DEBU 16d6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.289 UTC [gossip.comm] sendToEndpoint -> DEBU 16d7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.287 UTC [gossip.comm] sendToEndpoint -> DEBU 16d8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [gossip.comm] func1 -> DEBU 16d9 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [gossip.gossip] handleMessage -> DEBU 16da Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [msp] DeserializeIdentity -> DEBU 16db Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [msp] DeserializeIdentity -> DEBU 16dd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [msp] DeserializeIdentity -> DEBU 16de Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16e0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16e1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [policies] Evaluate -> DEBU 16e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [policies] Evaluate -> DEBU 16e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [policies] Evaluate -> DEBU 16e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [cauthdsl] func1 -> DEBU 16e5 0xc00312c4c0 gate 1556789256291919500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e6 0xc00312c4c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e7 0xc00312c4c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e8 0xc00312c4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e9 0xc00312c4c0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func1 -> DEBU 16ea 0xc00312c4c0 gate 1556789256291919500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [policies] Evaluate -> DEBU 16eb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [policies] Evaluate -> DEBU 16ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [policies] Evaluate -> DEBU 16ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func1 -> DEBU 16ee 0xc00312cd00 gate 1556789256292456700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16ef 0xc00312cd00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16f0 0xc00312cd00 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16f1 0xc00312cd00 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [msp.identity] Verify -> DEBU 16f2 Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a50 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [cauthdsl] func1 -> DEBU 1a51 0xc001214410 gate 1556789289306716700 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [cauthdsl] func2 -> DEBU 1a52 0xc001214410 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.306 UTC [cauthdsl] func2 -> DEBU 1a53 0xc001214410 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.307 UTC [cauthdsl] func2 -> DEBU 1a54 0xc001214410 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:09.307 UTC [msp.identity] Verify -> DEBU 1a55 Verify: digest = 00000000 8f 16 74 7b 1e 49 2c 40 21 57 2b 1b 61 bf c7 b1 |..t{.I,@!W+.a...| +orderer0.example.com | 00000010 7c 17 e3 76 af 02 42 cf 66 69 83 5a 15 e3 3e 25 ||..v..B.fi.Z..>%|" +orderer0.example.com | "2019-05-02 09:28:09.307 UTC [msp.identity] Verify -> DEBU 1a56 Verify: sig = 00000000 30 45 02 21 00 f3 cc 57 3c b2 77 c7 79 4f 4e c7 |0E.!...W<.w.yON.| +orderer0.example.com | 00000010 f3 da 70 61 58 9c d9 68 ec a2 cd 46 05 a8 3d bd |..paX..h...F..=.| +orderer0.example.com | 00000020 a3 24 d8 68 f6 02 20 69 93 7c f3 b4 d3 18 74 c3 |.$.h.. i.|....t.| +orderer0.example.com | 00000030 92 5c 3d 60 8a 19 25 ca ff fe be 17 61 d9 a1 ee |.\=`..%.....a...| +orderer0.example.com | 00000040 74 e8 49 e0 be 0d ba |t.I....|" +orderer0.example.com | "2019-05-02 09:28:09.308 UTC [cauthdsl] func2 -> DEBU 1a57 0xc001214410 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:09.308 UTC [cauthdsl] func1 -> DEBU 1a58 0xc001214410 gate 1556789289306716700 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:09.308 UTC [policies] Evaluate -> DEBU 1a59 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5b Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5d Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:09.310 UTC [policies] Evaluate -> DEBU 1a5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:09.310 UTC [common.deliver] deliverBlocks -> DEBU 1a5f [channel: businesschannel] Received seekInfo (0xc0000c09c0) start: > stop: > from 172.18.0.8:57434" +orderer0.example.com | "2019-05-02 09:28:09.310 UTC [fsblkstorage] Next -> DEBU 1a60 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-05-02 09:28:09.310 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a61 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +orderer0.example.com | "2019-05-02 09:28:09.311 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a62 Remaining bytes=[34877], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:09.311 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a63 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +orderer0.example.com | "2019-05-02 09:28:09.311 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a64 blockbytes [34874] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:09.312 UTC [common.deliver] deliverBlocks -> DEBU 1a65 [channel: businesschannel] Delivering block [9] for (0xc0000c09c0) for 172.18.0.8:57434" +orderer0.example.com | "2019-05-02 09:28:09.312 UTC [common.deliver] deliverBlocks -> DEBU 1a66 [channel: businesschannel] Done delivering to 172.18.0.8:57434 for (0xc0000c09c0)" +orderer0.example.com | "2019-05-02 09:28:09.313 UTC [common.deliver] Handle -> DEBU 1a67 Waiting for new SeekInfo from 172.18.0.8:57434" +orderer0.example.com | "2019-05-02 09:28:09.313 UTC [common.deliver] Handle -> DEBU 1a68 Attempting to read seek info message from 172.18.0.8:57434" +orderer0.example.com | "2019-05-02 09:28:09.326 UTC [common.deliver] Handle -> WARN 1a69 Error reading from 172.18.0.8:57434: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:09.326 UTC [orderer.common.server] func1 -> DEBU 1a6a Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:09.326 UTC [comm.grpc.server] 1 -> INFO 1a6b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57434 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.0824ms +orderer0.example.com | "2019-05-02 09:28:09.326 UTC [grpc] infof -> DEBU 1a6c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:09.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6d Sending msg of 28 bytes to 2 on channel businesschannel took 22.7µs" +orderer0.example.com | "2019-05-02 09:28:09.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6e Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +orderer0.example.com | "2019-05-02 09:28:09.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " +orderer0.example.com | "2019-05-02 09:28:09.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.1µs " +orderer0.example.com | "2019-05-02 09:28:09.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a71 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:09.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a72 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:09.537 UTC [orderer.common.server] Deliver -> DEBU 1a73 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:09.537 UTC [common.deliver] Handle -> DEBU 1a74 Starting new deliver loop for 172.18.0.8:57436" +orderer0.example.com | "2019-05-02 09:28:09.537 UTC [common.deliver] Handle -> DEBU 1a75 Attempting to read seek info message from 172.18.0.8:57436" +orderer0.example.com | "2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a76 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a77 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a7a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.539 UTC [cauthdsl] func1 -> DEBU 1a7b 0xc0012314d0 gate 1556789289539922500 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc0012314d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc0012314d0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a7e 0xc0012314d0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:09.540 UTC [msp.identity] Verify -> DEBU 1a7f Verify: digest = 00000000 01 78 be 83 04 ac 35 24 c3 f0 da a0 9f 39 81 c0 |.x....5$.....9..| +orderer0.example.com | 00000010 ee 4c 56 24 fa 75 c9 2d 59 9b bf 24 b1 b7 9f 81 |.LV$.u.-Y..$....|" +orderer0.example.com | "2019-05-02 09:28:09.540 UTC [msp.identity] Verify -> DEBU 1a80 Verify: sig = 00000000 30 44 02 20 2e ac fd 06 07 30 85 57 fb 65 37 db |0D. .....0.W.e7.| +orderer0.example.com | 00000010 24 88 4a 42 cd ff 05 2a fe 95 a2 05 84 f2 af b4 |$.JB...*........| +orderer0.example.com | 00000020 2b 59 cf d1 02 20 6e 7a 19 11 8a ae 2a 0b 35 ef |+Y... nz....*.5.| +orderer0.example.com | 00000030 a1 c7 e4 d2 12 b5 c9 4f d9 12 a4 64 a4 80 0b 13 |.......O...d....| +orderer0.example.com | 00000040 81 93 8b c2 ef f9 |......|" +orderer0.example.com | "2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a81 0xc0012314d0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:09.540 UTC [cauthdsl] func1 -> DEBU 1a82 0xc0012314d0 gate 1556789289539922500 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a83 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a84 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a85 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a87 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:09.541 UTC [common.deliver] deliverBlocks -> DEBU 1a89 [channel: testchainid] Received seekInfo (0xc000bb1300) start: > stop: > from 172.18.0.8:57436" +orderer0.example.com | "2019-05-02 09:28:09.542 UTC [fsblkstorage] Next -> DEBU 1a8a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-05-02 09:28:09.542 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a8b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-05-02 09:28:09.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8c Remaining bytes=[25826], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8d Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-05-02 09:28:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8e blockbytes [25823] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:09.543 UTC [common.deliver] deliverBlocks -> DEBU 1a8f [channel: testchainid] Delivering block [1] for (0xc000bb1300) for 172.18.0.8:57436" +orderer0.example.com | "2019-05-02 09:28:09.544 UTC [common.deliver] deliverBlocks -> DEBU 1a90 [channel: testchainid] Done delivering to 172.18.0.8:57436 for (0xc000bb1300)" +orderer0.example.com | "2019-05-02 09:28:09.555 UTC [common.deliver] Handle -> DEBU 1a91 Waiting for new SeekInfo from 172.18.0.8:57436" +orderer0.example.com | "2019-05-02 09:28:09.555 UTC [common.deliver] Handle -> DEBU 1a92 Attempting to read seek info message from 172.18.0.8:57436" +orderer0.example.com | "2019-05-02 09:28:09.563 UTC [grpc] warningf -> DEBU 1a93 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.8:57436: read: connection reset by peer" +orderer0.example.com | "2019-05-02 09:28:09.567 UTC [grpc] infof -> DEBU 1a94 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:09.569 UTC [common.deliver] Handle -> WARN 1a95 Error reading from 172.18.0.8:57436: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:09.569 UTC [orderer.common.server] func1 -> DEBU 1a96 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:09.571 UTC [comm.grpc.server] 1 -> INFO 1a97 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57436 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.3748ms +orderer0.example.com | "2019-05-02 09:28:09.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a98 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:09.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a99 Sending msg of 28 bytes to 3 on channel testchainid took 31.4µs" +orderer0.example.com | "2019-05-02 09:28:09.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a9a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 771.7µs " +orderer0.example.com | "2019-05-02 09:28:09.871 UTC [orderer.common.server] Deliver -> DEBU 1a9b Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:09.871 UTC [common.deliver] Handle -> DEBU 1a9c Starting new deliver loop for 172.18.0.8:57438" +orderer0.example.com | "2019-05-02 09:28:09.871 UTC [common.deliver] Handle -> DEBU 1a9d Attempting to read seek info message from 172.18.0.8:57438" +orderer0.example.com | "2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1a9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1a9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1aa0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1aa1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.872 UTC [cauthdsl] func1 -> DEBU 1aa3 0xc000f15130 gate 1556789289872980200 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc000f15130 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa5 0xc000f15130 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000f15130 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:09.873 UTC [msp.identity] Verify -> DEBU 1aa7 Verify: digest = 00000000 40 6b e9 74 a0 9b 03 41 c9 cf b9 71 26 01 d6 0b |@k.t...A...q&...| +orderer0.example.com | 00000010 ec 2d 32 f1 91 44 03 fe b9 54 71 6e 72 75 f9 0e |.-2..D...Tqnru..|" +orderer0.example.com | "2019-05-02 09:28:09.873 UTC [msp.identity] Verify -> DEBU 1aa8 Verify: sig = 00000000 30 44 02 20 46 31 55 8d 63 df 95 3b 73 ea e6 e6 |0D. F1U.c..;s...| +orderer0.example.com | 00000010 8e f7 f4 c7 b0 38 55 9a c5 b1 19 e4 37 74 fd 85 |.....8U.....7t..| +orderer0.example.com | 00000020 42 56 b8 41 02 20 6d e1 44 36 55 f6 7e 64 64 b3 |BV.A. m.D6U.~dd.| +orderer0.example.com | 00000030 47 b9 5c d3 2c 28 10 03 72 b3 fd 98 f5 6b 89 6d |G.\.,(..r....k.m| +orderer0.example.com | 00000040 44 1a 60 99 cb bb |D.`...|" +orderer0.example.com | "2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000f15130 principal evaluation succeeds for identity 0" +peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [msp.identity] Verify -> DEBU 16f3 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|" +peer0.org1.example.com | "2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16f4 0xc00312cd00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [cauthdsl] func1 -> DEBU 16f5 0xc00312cd00 gate 1556789256292456700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [msp] DeserializeIdentity -> DEBU 16fa Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [msp] DeserializeIdentity -> DEBU 16fb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16fd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16fe Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 1700 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 1701 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.293 UTC [cauthdsl] func1 -> DEBU 1702 0xc0034e24d0 gate 1556789256293934400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1703 0xc0034e24d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1704 0xc0034e24d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1705 0xc0034e24d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1706 0xc0034e24d0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func1 -> DEBU 1707 0xc0034e24d0 gate 1556789256293934400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [policies] Evaluate -> DEBU 1708 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [policies] Evaluate -> DEBU 1709 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [policies] Evaluate -> DEBU 170a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func1 -> DEBU 170b 0xc0034e2d10 gate 1556789256294459000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 170c 0xc0034e2d10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 170d 0xc0034e2d10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 170e 0xc0034e2d10 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [msp.identity] Verify -> DEBU 170f Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [msp.identity] Verify -> DEBU 1710 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|" +peer0.org1.example.com | "2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1711 0xc0034e2d10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [cauthdsl] func1 -> DEBU 1712 0xc0034e2d10 gate 1556789256294459000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1713 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-05-02 09:28:09.874 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000f15130 gate 1556789289872980200 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aab Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aad Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:09.875 UTC [policies] Evaluate -> DEBU 1aaf Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:09.875 UTC [policies] Evaluate -> DEBU 1ab0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:09.875 UTC [common.deliver] deliverBlocks -> DEBU 1ab1 [channel: testchainid] Received seekInfo (0xc0011ac200) start: > stop: > from 172.18.0.8:57438" +orderer0.example.com | "2019-05-02 09:28:09.875 UTC [fsblkstorage] Next -> DEBU 1ab2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-05-02 09:28:09.875 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ab3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-05-02 09:28:09.876 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab4 Remaining bytes=[25826], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:09.876 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab5 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-05-02 09:28:09.876 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab6 blockbytes [25823] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:09.876 UTC [common.deliver] deliverBlocks -> DEBU 1ab7 [channel: testchainid] Delivering block [1] for (0xc0011ac200) for 172.18.0.8:57438" +orderer0.example.com | "2019-05-02 09:28:09.876 UTC [common.deliver] deliverBlocks -> DEBU 1ab8 [channel: testchainid] Done delivering to 172.18.0.8:57438 for (0xc0011ac200)" +orderer0.example.com | "2019-05-02 09:28:09.877 UTC [common.deliver] Handle -> DEBU 1ab9 Waiting for new SeekInfo from 172.18.0.8:57438" +orderer0.example.com | "2019-05-02 09:28:09.877 UTC [common.deliver] Handle -> DEBU 1aba Attempting to read seek info message from 172.18.0.8:57438" +orderer0.example.com | "2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:09.880 UTC [cauthdsl] func1 -> DEBU 1ac0 0xc000ccf160 gate 1556789289880360100 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:09.880 UTC [cauthdsl] func2 -> DEBU 1ac1 0xc000ccf160 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:09.880 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc000ccf160 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:09.880 UTC [cauthdsl] func2 -> DEBU 1ac3 0xc000ccf160 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:09.880 UTC [msp.identity] Verify -> DEBU 1ac4 Verify: digest = 00000000 8d ec 9c 50 23 08 9b f0 51 12 80 5b 56 8b 9e a0 |...P#...Q..[V...| +orderer0.example.com | 00000010 2e 5b 50 90 9d f9 ba ec 6c 75 80 fa 7d 9b 6a de |.[P.....lu..}.j.|" +orderer0.example.com | "2019-05-02 09:28:09.881 UTC [msp.identity] Verify -> DEBU 1ac5 Verify: sig = 00000000 30 45 02 21 00 f9 d7 37 4d 2a 21 b3 38 16 ec 7b |0E.!...7M*!.8..{| +orderer0.example.com | 00000010 39 c0 9d bb 29 79 e1 a0 9d 60 16 65 52 b0 15 f3 |9...)y...`.eR...| +orderer0.example.com | 00000020 a9 53 2e f7 3f 02 20 0c 55 b1 25 74 17 0d b5 88 |.S..?. .U.%t....| +orderer0.example.com | 00000030 64 39 b8 26 0d 2e f8 7f 28 26 01 d5 47 1e 3e 02 |d9.&....(&..G.>.| +orderer0.example.com | 00000040 2e f9 ba c4 42 25 e0 |....B%.|" +orderer0.example.com | "2019-05-02 09:28:09.881 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc000ccf160 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:09.881 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc000ccf160 gate 1556789289880360100 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1ac8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1aca Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1acb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1acc Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:09.882 UTC [policies] Evaluate -> DEBU 1acd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:09.882 UTC [common.deliver] deliverBlocks -> DEBU 1ace [channel: testchainid] Received seekInfo (0xc0011ac5c0) start: > stop: > from 172.18.0.8:57438" +orderer0.example.com | "2019-05-02 09:28:09.883 UTC [fsblkstorage] Next -> DEBU 1acf Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-05-02 09:28:09.883 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ad0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:28:09.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad1 Remaining bytes=[44241], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:09.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad2 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:28:09.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad3 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:09.884 UTC [common.deliver] deliverBlocks -> DEBU 1ad4 [channel: testchainid] Delivering block [0] for (0xc0011ac5c0) for 172.18.0.8:57438" +orderer0.example.com | "2019-05-02 09:28:09.884 UTC [common.deliver] deliverBlocks -> DEBU 1ad5 [channel: testchainid] Done delivering to 172.18.0.8:57438 for (0xc0011ac5c0)" +orderer0.example.com | "2019-05-02 09:28:09.884 UTC [common.deliver] Handle -> DEBU 1ad6 Waiting for new SeekInfo from 172.18.0.8:57438" +orderer0.example.com | "2019-05-02 09:28:09.884 UTC [common.deliver] Handle -> DEBU 1ad7 Attempting to read seek info message from 172.18.0.8:57438" +orderer0.example.com | "2019-05-02 09:28:09.894 UTC [common.deliver] Handle -> WARN 1ad8 Error reading from 172.18.0.8:57438: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:09.895 UTC [grpc] infof -> DEBU 1ad9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:09.895 UTC [orderer.common.server] func1 -> DEBU 1ada Closing Deliver stream" +peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1714 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1715 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1716 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 1717 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..| +peer0.org1.example.com | 00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|" +peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 1718 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v| +peer0.org1.example.com | 00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E| +peer0.org1.example.com | 00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p| +peer0.org1.example.com | 00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.| +peer0.org1.example.com | 00000040 68 f9 f0 83 f9 50 9b |h....P.|" +peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 1719 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +peer0.org1.example.com | "2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 171a Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 171b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 171c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 171d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 171e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 171f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func1 -> DEBU 1720 0xc0020fab30 gate 1556789256296272400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1721 0xc0020fab30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1722 0xc0020fab30 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1723 0xc0020fab30 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [msp.identity] Verify -> DEBU 1724 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [msp.identity] Verify -> DEBU 1725 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1726 0xc0020fab30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [cauthdsl] func1 -> DEBU 1727 0xc0020fab30 gate 1556789256296272400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 1728 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.291 UTC [gossip.comm] sendToEndpoint -> DEBU 16dc Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.298 UTC [msp] DeserializeIdentity -> DEBU 1729 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.298 UTC [msp] DeserializeIdentity -> DEBU 172a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.299 UTC [gossip.comm] Send -> DEBU 172b Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:36.300 UTC [msp] DeserializeIdentity -> DEBU 172c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.301 UTC [msp] DeserializeIdentity -> DEBU 1731 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 172d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.300 UTC [gossip.comm] sendToEndpoint -> DEBU 172f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.300 UTC [gossip.comm] sendToEndpoint -> DEBU 172e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.301 UTC [gossip.comm] sendToEndpoint -> DEBU 1730 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.301 UTC [policies] Evaluate -> DEBU 1732 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-05-02 09:28:09.900 UTC [comm.grpc.server] 1 -> INFO 1adb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57438 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.7763ms +orderer0.example.com | "2019-05-02 09:28:09.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1adc Sending msg of 28 bytes to 2 on channel businesschannel took 92µs" +orderer0.example.com | "2019-05-02 09:28:09.953 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1add Sending msg of 28 bytes to 3 on channel businesschannel took 76.9µs" +orderer0.example.com | "2019-05-02 09:28:09.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ade Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 360.2µs " +orderer0.example.com | "2019-05-02 09:28:09.955 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1adf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 902.9µs " +orderer0.example.com | "2019-05-02 09:28:09.960 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:09.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:10.044 UTC [orderer.common.server] Deliver -> DEBU 1ae2 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:10.045 UTC [common.deliver] Handle -> DEBU 1ae3 Starting new deliver loop for 172.18.0.8:57440" +orderer0.example.com | "2019-05-02 09:28:10.045 UTC [common.deliver] Handle -> DEBU 1ae4 Attempting to read seek info message from 172.18.0.8:57440" +orderer0.example.com | "2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:10.046 UTC [policies] Evaluate -> DEBU 1ae9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:10.046 UTC [cauthdsl] func1 -> DEBU 1aea 0xc000f2ffc0 gate 1556789290046501800 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:10.046 UTC [cauthdsl] func2 -> DEBU 1aeb 0xc000f2ffc0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:10.046 UTC [cauthdsl] func2 -> DEBU 1aec 0xc000f2ffc0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:10.046 UTC [cauthdsl] func2 -> DEBU 1aed 0xc000f2ffc0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:10.047 UTC [msp.identity] Verify -> DEBU 1aee Verify: digest = 00000000 e4 ef 83 3b 15 d5 45 77 3f 26 5c 0f 96 19 15 9b |...;..Ew?&\.....| +orderer0.example.com | 00000010 8b dc 6f 9c d4 94 9e 84 c7 f3 03 90 e6 89 d4 dc |..o.............|" +orderer0.example.com | "2019-05-02 09:28:10.047 UTC [msp.identity] Verify -> DEBU 1aef Verify: sig = 00000000 30 45 02 21 00 d9 99 41 8c dd 9a c5 86 23 a4 08 |0E.!...A.....#..| +orderer0.example.com | 00000010 98 85 ac 57 73 40 19 07 41 a9 e0 b3 46 b1 6a 39 |...Ws@..A...F.j9| +orderer0.example.com | 00000020 b5 0b ba b8 f0 02 20 72 ae e0 76 60 30 ce eb 85 |...... r..v`0...| +orderer0.example.com | 00000030 bd ec 9c 80 3f 9d 5b c5 86 3f d6 65 63 57 1b af |....?.[..?.ecW..| +orderer0.example.com | 00000040 31 b4 8d e7 37 31 89 |1...71.|" +orderer0.example.com | "2019-05-02 09:28:10.047 UTC [cauthdsl] func2 -> DEBU 1af0 0xc000f2ffc0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:10.047 UTC [cauthdsl] func1 -> DEBU 1af1 0xc000f2ffc0 gate 1556789290046501800 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af4 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af6 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:10.048 UTC [policies] Evaluate -> DEBU 1af7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:10.048 UTC [common.deliver] deliverBlocks -> DEBU 1af8 [channel: testchainid] Received seekInfo (0xc0003fdc40) start: > stop: > from 172.18.0.8:57440" +orderer0.example.com | "2019-05-02 09:28:10.048 UTC [fsblkstorage] Next -> DEBU 1af9 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-05-02 09:28:10.048 UTC [fsblkstorage] newBlockfileStream -> DEBU 1afa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-05-02 09:28:10.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afb Remaining bytes=[44241], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:10.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afc Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-05-02 09:28:10.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afd blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:10.048 UTC [common.deliver] deliverBlocks -> DEBU 1afe [channel: testchainid] Delivering block [0] for (0xc0003fdc40) for 172.18.0.8:57440" +orderer0.example.com | "2019-05-02 09:28:10.049 UTC [common.deliver] deliverBlocks -> DEBU 1aff [channel: testchainid] Done delivering to 172.18.0.8:57440 for (0xc0003fdc40)" +orderer0.example.com | "2019-05-02 09:28:10.049 UTC [common.deliver] Handle -> DEBU 1b00 Waiting for new SeekInfo from 172.18.0.8:57440" +orderer0.example.com | "2019-05-02 09:28:10.049 UTC [common.deliver] Handle -> DEBU 1b01 Attempting to read seek info message from 172.18.0.8:57440" +orderer0.example.com | "2019-05-02 09:28:10.057 UTC [grpc] infof -> DEBU 1b02 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:10.058 UTC [common.deliver] Handle -> WARN 1b03 Error reading from 172.18.0.8:57440: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:10.058 UTC [orderer.common.server] func1 -> DEBU 1b04 Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:10.059 UTC [comm.grpc.server] 1 -> INFO 1b05 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57440 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.1157ms +orderer0.example.com | "2019-05-02 09:28:10.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b06 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:10.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b07 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +peer0.org1.example.com | "2019-05-02 09:27:36.302 UTC [policies] Evaluate -> DEBU 1736 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.302 UTC [gossip.gossip] handleMessage -> DEBU 1737 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.303 UTC [gossip.gossip] handleMessage -> DEBU 1738 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.303 UTC [msp] DeserializeIdentity -> DEBU 1739 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1734 Exiting" +orderer0.example.com | "2019-05-02 09:28:10.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.3µs " +orderer0.example.com | "2019-05-02 09:28:10.246 UTC [orderer.common.server] Deliver -> DEBU 1b09 Starting new Deliver handler" +orderer0.example.com | "2019-05-02 09:28:10.246 UTC [common.deliver] Handle -> DEBU 1b0a Starting new deliver loop for 172.18.0.8:57442" +orderer0.example.com | "2019-05-02 09:28:10.246 UTC [common.deliver] Handle -> DEBU 1b0b Attempting to read seek info message from 172.18.0.8:57442" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b10 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [cauthdsl] func1 -> DEBU 1b11 0xc000b246b0 gate 1556789290248617400 evaluation starts" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [cauthdsl] func2 -> DEBU 1b12 0xc000b246b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [cauthdsl] func2 -> DEBU 1b13 0xc000b246b0 processing identity 0 with bytes of efef60" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [cauthdsl] func2 -> DEBU 1b14 0xc000b246b0 principal matched by identity 0" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [msp.identity] Verify -> DEBU 1b15 Verify: digest = 00000000 de d8 29 3b 93 53 04 5e 60 d9 ac 8a 09 e5 a1 1d |..);.S.^`.......| +orderer0.example.com | 00000010 07 34 ab f6 9e de e1 44 12 9a 8b bf 30 0b 80 28 |.4.....D....0..(|" +orderer0.example.com | "2019-05-02 09:28:10.248 UTC [msp.identity] Verify -> DEBU 1b16 Verify: sig = 00000000 30 44 02 20 38 21 02 ad 0e cf 99 02 73 d0 6b f5 |0D. 8!......s.k.| +orderer0.example.com | 00000010 30 b0 2a bc 27 17 19 7a 83 b1 6f da 66 b2 3a 31 |0.*.'..z..o.f.:1| +orderer0.example.com | 00000020 e9 f2 78 8d 02 20 0f f2 c2 b6 ad a9 f6 50 db dc |..x.. .......P..| +orderer0.example.com | 00000030 88 2b 74 6f 41 a8 04 d3 5b 3c 1e d0 f8 95 f8 74 |.+toA...[<.....t| +orderer0.example.com | 00000040 f1 f1 9d cf 4a 82 |....J.|" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [cauthdsl] func2 -> DEBU 1b17 0xc000b246b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [cauthdsl] func1 -> DEBU 1b18 0xc000b246b0 gate 1556789290248617400 evaluation succeeds" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b19 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1b Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1d Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [common.deliver] deliverBlocks -> DEBU 1b1f [channel: testchainid] Received seekInfo (0xc0000c10c0) start: > stop: > from 172.18.0.8:57442" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [fsblkstorage] Next -> DEBU 1b20 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b21 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b22 Remaining bytes=[25826], Going to peek [8] bytes" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b23 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-05-02 09:28:10.249 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b24 blockbytes [25823] read from file [0]" +orderer0.example.com | "2019-05-02 09:28:10.250 UTC [common.deliver] deliverBlocks -> DEBU 1b25 [channel: testchainid] Delivering block [1] for (0xc0000c10c0) for 172.18.0.8:57442" +orderer0.example.com | "2019-05-02 09:28:10.250 UTC [common.deliver] deliverBlocks -> DEBU 1b26 [channel: testchainid] Done delivering to 172.18.0.8:57442 for (0xc0000c10c0)" +orderer0.example.com | "2019-05-02 09:28:10.250 UTC [common.deliver] Handle -> DEBU 1b27 Waiting for new SeekInfo from 172.18.0.8:57442" +orderer0.example.com | "2019-05-02 09:28:10.250 UTC [common.deliver] Handle -> DEBU 1b28 Attempting to read seek info message from 172.18.0.8:57442" +orderer0.example.com | "2019-05-02 09:28:10.263 UTC [common.deliver] Handle -> WARN 1b29 Error reading from 172.18.0.8:57442: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-05-02 09:28:10.263 UTC [orderer.common.server] func1 -> DEBU 1b2a Closing Deliver stream" +orderer0.example.com | "2019-05-02 09:28:10.263 UTC [comm.grpc.server] 1 -> INFO 1b2b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57442 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.7119ms +orderer0.example.com | "2019-05-02 09:28:10.263 UTC [grpc] infof -> DEBU 1b2c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-05-02 09:28:10.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2d Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +orderer0.example.com | "2019-05-02 09:28:10.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2e Sending msg of 28 bytes to 3 on channel businesschannel took 53.8µs" +orderer0.example.com | "2019-05-02 09:28:10.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.9µs " +orderer0.example.com | "2019-05-02 09:28:10.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b30 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.2µs " +orderer0.example.com | "2019-05-02 09:28:10.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b32 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:10.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b31 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:10.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b33 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:10.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b34 Sending msg of 28 bytes to 3 on channel testchainid took 123.8µs" +orderer0.example.com | "2019-05-02 09:28:10.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b35 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.6µs " +peer0.org1.example.com | "2019-05-02 09:27:36.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1735 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.303 UTC [msp] DeserializeIdentity -> DEBU 173a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 173b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 173c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 173d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [policies] Evaluate -> DEBU 173e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [policies] Evaluate -> DEBU 173f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:36.304 UTC [policies] Evaluate -> DEBU 1740 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.305 UTC [cauthdsl] func1 -> DEBU 1741 0xc0023023d0 gate 1556789256305011400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1742 0xc0023023d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1743 0xc0023023d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1744 0xc0023023d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:36.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1733 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1745 0xc0023023d0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.308 UTC [cauthdsl] func1 -> DEBU 1746 0xc0023023d0 gate 1556789256305011400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.308 UTC [policies] Evaluate -> DEBU 1747 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.309 UTC [policies] Evaluate -> DEBU 1748 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.309 UTC [policies] Evaluate -> DEBU 1749 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.309 UTC [cauthdsl] func1 -> DEBU 174a 0xc002302c10 gate 1556789256309947000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.310 UTC [cauthdsl] func2 -> DEBU 174b 0xc002302c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.310 UTC [cauthdsl] func2 -> DEBU 174c 0xc002302c10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.311 UTC [cauthdsl] func2 -> DEBU 174d 0xc002302c10 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.311 UTC [msp.identity] Verify -> DEBU 174e Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +peer0.org1.example.com | "2019-05-02 09:27:36.312 UTC [msp.identity] Verify -> DEBU 174f Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|" +peer0.org1.example.com | "2019-05-02 09:27:36.312 UTC [cauthdsl] func2 -> DEBU 1750 0xc002302c10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.312 UTC [cauthdsl] func1 -> DEBU 1751 0xc002302c10 gate 1556789256309947000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.313 UTC [policies] Evaluate -> DEBU 1752 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.313 UTC [policies] Evaluate -> DEBU 1753 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.313 UTC [policies] Evaluate -> DEBU 1754 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.314 UTC [policies] Evaluate -> DEBU 1755 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.314 UTC [msp.identity] Verify -> DEBU 1756 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..| +peer0.org1.example.com | 00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|" +peer0.org1.example.com | "2019-05-02 09:27:36.314 UTC [msp.identity] Verify -> DEBU 1757 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v| +peer0.org1.example.com | 00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E| +peer0.org1.example.com | 00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p| +peer0.org1.example.com | 00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.| +peer0.org1.example.com | 00000040 68 f9 f0 83 f9 50 9b |h....P.|" +peer0.org1.example.com | "2019-05-02 09:27:36.315 UTC [msp.identity] Verify -> DEBU 1758 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +peer0.org1.example.com | "2019-05-02 09:27:36.315 UTC [msp.identity] Verify -> DEBU 1759 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|" +peer0.org1.example.com | "2019-05-02 09:27:36.316 UTC [msp] DeserializeIdentity -> DEBU 175a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.316 UTC [msp] DeserializeIdentity -> DEBU 175b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.317 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 175c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:36.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 175d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 175e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.318 UTC [policies] Evaluate -> DEBU 175f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.318 UTC [policies] Evaluate -> DEBU 1760 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:36.318 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.319 UTC [cauthdsl] func1 -> DEBU 1762 0xc002319220 gate 1556789256319227300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.319 UTC [cauthdsl] func2 -> DEBU 1763 0xc002319220 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.319 UTC [cauthdsl] func2 -> DEBU 1764 0xc002319220 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 1765 0xc002319220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 1766 0xc002319220 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func1 -> DEBU 1767 0xc002319220 gate 1556789256319227300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [policies] Evaluate -> DEBU 1768 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [policies] Evaluate -> DEBU 1769 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [policies] Evaluate -> DEBU 176a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func1 -> DEBU 176b 0xc002319a60 gate 1556789256320657400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 176c 0xc002319a60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 176d 0xc002319a60 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 176e 0xc002319a60 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [msp.identity] Verify -> DEBU 176f Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +peer0.org1.example.com | "2019-05-02 09:27:36.320 UTC [msp.identity] Verify -> DEBU 1770 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|" +peer0.org1.example.com | "2019-05-02 09:27:36.321 UTC [cauthdsl] func2 -> DEBU 1771 0xc002319a60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.321 UTC [cauthdsl] func1 -> DEBU 1772 0xc002319a60 gate 1556789256320657400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.321 UTC [policies] Evaluate -> DEBU 1773 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.321 UTC [policies] Evaluate -> DEBU 1774 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.321 UTC [policies] Evaluate -> DEBU 1775 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.322 UTC [policies] Evaluate -> DEBU 1776 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.323 UTC [gossip.gossip] handleMessage -> DEBU 1777 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.323 UTC [gossip.gossip] handleMessage -> DEBU 1778 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-05-02 09:28:10.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b36 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +orderer0.example.com | "2019-05-02 09:28:10.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b37 Sending msg of 28 bytes to 3 on channel businesschannel took 60.5µs" +orderer0.example.com | "2019-05-02 09:28:10.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.9µs " +orderer0.example.com | "2019-05-02 09:28:10.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.2µs " +orderer0.example.com | "2019-05-02 09:28:10.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:10.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:11.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:11.185 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3d Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +orderer0.example.com | "2019-05-02 09:28:11.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 819.4µs " +orderer0.example.com | "2019-05-02 09:28:11.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3f Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +orderer0.example.com | "2019-05-02 09:28:11.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b40 Sending msg of 28 bytes to 3 on channel businesschannel took 8µs" +orderer0.example.com | "2019-05-02 09:28:11.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.7µs " +orderer0.example.com | "2019-05-02 09:28:11.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.7µs " +orderer0.example.com | "2019-05-02 09:28:11.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b43 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:11.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b44 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:11.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b45 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:11.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b46 Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +orderer0.example.com | "2019-05-02 09:28:11.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.7µs " +orderer0.example.com | "2019-05-02 09:28:11.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b48 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-05-02 09:28:11.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b49 Sending msg of 28 bytes to 3 on channel businesschannel took 21.6µs" +orderer0.example.com | "2019-05-02 09:28:11.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs " +orderer0.example.com | "2019-05-02 09:28:11.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.4µs " +orderer0.example.com | "2019-05-02 09:28:11.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:11.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:12.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:12.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b4f Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +orderer0.example.com | "2019-05-02 09:28:12.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b50 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " +orderer0.example.com | "2019-05-02 09:28:12.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b51 Sending msg of 28 bytes to 2 on channel businesschannel took 58µs" +orderer0.example.com | "2019-05-02 09:28:12.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b52 Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +orderer0.example.com | "2019-05-02 09:28:12.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.6µs " +orderer0.example.com | "2019-05-02 09:28:12.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 224µs " +orderer0.example.com | "2019-05-02 09:28:12.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b55 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:12.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b56 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:12.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b57 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:12.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b58 Sending msg of 28 bytes to 3 on channel testchainid took 90.8µs" +orderer0.example.com | "2019-05-02 09:28:12.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b59 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +orderer0.example.com | "2019-05-02 09:28:12.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b5a Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" +orderer0.example.com | "2019-05-02 09:28:12.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b5b Sending msg of 28 bytes to 3 on channel businesschannel took 23.8µs" +orderer0.example.com | "2019-05-02 09:28:12.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b5d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.4µs " +orderer0.example.com | "2019-05-02 09:28:12.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.2µs " +orderer0.example.com | "2019-05-02 09:28:12.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:12.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:13.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b60 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:13.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b61 Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +orderer0.example.com | "2019-05-02 09:28:13.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b62 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " +orderer0.example.com | "2019-05-02 09:28:13.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b63 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +orderer0.example.com | "2019-05-02 09:28:13.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b64 Sending msg of 28 bytes to 3 on channel businesschannel took 28µs" +orderer0.example.com | "2019-05-02 09:28:13.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs " +orderer0.example.com | "2019-05-02 09:28:13.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b66 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95µs " +orderer0.example.com | "2019-05-02 09:28:13.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b67 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:13.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b68 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:13.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b69 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:13.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6a Sending msg of 28 bytes to 3 on channel testchainid took 134.8µs" +orderer0.example.com | "2019-05-02 09:28:13.646 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1925ms " +orderer0.example.com | "2019-05-02 09:28:13.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6c Sending msg of 28 bytes to 2 on channel businesschannel took 88.9µs" +orderer0.example.com | "2019-05-02 09:28:13.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6d Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-05-02 09:28:13.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.9µs " +orderer0.example.com | "2019-05-02 09:28:13.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.8µs " +orderer0.example.com | "2019-05-02 09:28:13.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b70 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:13.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b71 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:14.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b72 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:14.146 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b73 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +orderer0.example.com | "2019-05-02 09:28:14.146 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b74 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.4µs " +orderer0.example.com | "2019-05-02 09:28:15.250 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b75 Sending msg of 28 bytes to 2 on channel businesschannel took 37.9µs" +orderer0.example.com | "2019-05-02 09:28:15.251 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b78 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-05-02 09:28:15.252 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b79 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:15.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b77 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:15.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109µs " +orderer0.example.com | "2019-05-02 09:28:15.252 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs " +orderer0.example.com | "2019-05-02 09:28:15.254 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7b Sending msg of 28 bytes to 3 on channel testchainid took 448µs" +orderer0.example.com | "2019-05-02 09:28:15.255 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.5µs " +orderer0.example.com | "2019-05-02 09:28:15.256 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:15.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7e Sending msg of 28 bytes to 3 on channel businesschannel took 22.1µs" +orderer0.example.com | "2019-05-02 09:28:15.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7f Sending msg of 28 bytes to 2 on channel businesschannel took 9.5µs" +orderer0.example.com | "2019-05-02 09:28:15.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.6µs " +orderer0.example.com | "2019-05-02 09:28:15.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.6µs " +orderer0.example.com | "2019-05-02 09:28:15.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b82 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:15.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b83 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:15.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b84 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:15.644 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b85 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +orderer0.example.com | "2019-05-02 09:28:15.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b86 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.6µs " +orderer0.example.com | "2019-05-02 09:28:15.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b87 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2019-05-02 09:28:15.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b88 Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs" +orderer0.example.com | "2019-05-02 09:28:15.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.8µs " +orderer0.example.com | "2019-05-02 09:28:15.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174µs " +orderer0.example.com | "2019-05-02 09:28:15.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:15.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:16.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:16.145 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b8e Sending msg of 28 bytes to 3 on channel testchainid took 30.6µs" +orderer0.example.com | "2019-05-02 09:28:16.145 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b8f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.3µs " +orderer0.example.com | "2019-05-02 09:28:16.255 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1b90 No inactive chains to try to replicate" +orderer0.example.com | "2019-05-02 09:28:16.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b91 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-05-02 09:28:16.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.5µs " +orderer0.example.com | "2019-05-02 09:28:16.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 212.5µs " +orderer0.example.com | "2019-05-02 09:28:16.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b94 Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +orderer0.example.com | "2019-05-02 09:28:16.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b95 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:16.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b96 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:16.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b97 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:16.644 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b98 Sending msg of 28 bytes to 3 on channel testchainid took 110.8µs" +orderer0.example.com | "2019-05-02 09:28:16.645 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 596.5µs " +orderer0.example.com | "2019-05-02 09:28:16.921 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9a Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-05-02 09:28:16.921 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9b Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-05-02 09:28:16.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.9µs " +orderer0.example.com | "2019-05-02 09:28:16.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.5µs " +orderer0.example.com | "2019-05-02 09:28:16.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:16.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:17.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:17.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba1 Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +orderer0.example.com | "2019-05-02 09:28:17.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.3µs " +orderer0.example.com | "2019-05-02 09:28:17.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba3 Sending msg of 28 bytes to 3 on channel businesschannel took 38.4µs" +orderer0.example.com | "2019-05-02 09:28:17.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba4 Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" +orderer0.example.com | "2019-05-02 09:28:17.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.6µs " +orderer0.example.com | "2019-05-02 09:28:17.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.9µs " +orderer0.example.com | "2019-05-02 09:28:17.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-05-02 09:27:36.324 UTC [msp] DeserializeIdentity -> DEBU 1779 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.324 UTC [msp] DeserializeIdentity -> DEBU 177a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.324 UTC [msp] DeserializeIdentity -> DEBU 177b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.325 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 177c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:36.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 177d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 177e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.325 UTC [policies] Evaluate -> DEBU 177f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.326 UTC [policies] Evaluate -> DEBU 1780 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:36.326 UTC [policies] Evaluate -> DEBU 1781 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.326 UTC [cauthdsl] func1 -> DEBU 1782 0xc002399570 gate 1556789256326307000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.326 UTC [cauthdsl] func2 -> DEBU 1783 0xc002399570 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.326 UTC [cauthdsl] func2 -> DEBU 1784 0xc002399570 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 1785 0xc002399570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 1786 0xc002399570 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func1 -> DEBU 1787 0xc002399570 gate 1556789256326307000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1788 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1789 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 178a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func1 -> DEBU 178b 0xc002399db0 gate 1556789256327282300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 178c 0xc002399db0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 178d 0xc002399db0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 178e 0xc002399db0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [msp.identity] Verify -> DEBU 178f Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [msp.identity] Verify -> DEBU 1790 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 1791 0xc002399db0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [cauthdsl] func1 -> DEBU 1792 0xc002399db0 gate 1556789256327282300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1793 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1794 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1795 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1796 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.327 UTC [msp.identity] Verify -> DEBU 1797 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..| +peer0.org1.example.com | 00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|" +peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [msp.identity] Verify -> DEBU 1798 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v| +peer0.org1.example.com | 00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E| +peer0.org1.example.com | 00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p| +peer0.org1.example.com | 00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.| +peer0.org1.example.com | 00000040 68 f9 f0 83 f9 50 9b |h....P.|" +peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [msp] DeserializeIdentity -> DEBU 1799 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [msp] DeserializeIdentity -> DEBU 179a Obtaining identity" +orderer0.example.com | "2019-05-02 09:28:17.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:17.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:17.648 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1baa Sending msg of 28 bytes to 3 on channel testchainid took 30.3µs" +orderer0.example.com | "2019-05-02 09:28:17.649 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.4µs " +orderer0.example.com | "2019-05-02 09:28:17.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bac Sending msg of 28 bytes to 2 on channel businesschannel took 85.4µs" +orderer0.example.com | "2019-05-02 09:28:17.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bad Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +orderer0.example.com | "2019-05-02 09:28:17.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.8µs " +orderer0.example.com | "2019-05-02 09:28:17.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 387.1µs " +orderer0.example.com | "2019-05-02 09:28:17.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:17.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:18.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:18.145 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb3 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" +orderer0.example.com | "2019-05-02 09:28:18.146 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174µs " +orderer0.example.com | "2019-05-02 09:28:18.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb5 Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +orderer0.example.com | "2019-05-02 09:28:18.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +orderer0.example.com | "2019-05-02 09:28:18.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.3µs " +orderer0.example.com | "2019-05-02 09:28:18.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.8µs " +orderer0.example.com | "2019-05-02 09:28:18.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:18.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bba Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:18.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bbb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:18.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbc Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2019-05-02 09:28:18.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " +orderer0.example.com | "2019-05-02 09:28:18.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbe Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +orderer0.example.com | "2019-05-02 09:28:18.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbf Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-05-02 09:28:18.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195µs " +orderer0.example.com | "2019-05-02 09:28:18.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.9µs " +orderer0.example.com | "2019-05-02 09:28:18.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:18.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:19.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:19.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc5 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2019-05-02 09:28:19.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.4µs " +orderer0.example.com | "2019-05-02 09:28:19.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc7 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +orderer0.example.com | "2019-05-02 09:28:19.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc8 Sending msg of 28 bytes to 3 on channel businesschannel took 168.2µs" +orderer0.example.com | "2019-05-02 09:28:19.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 483.3µs " +orderer0.example.com | "2019-05-02 09:28:19.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 409.5µs " +orderer0.example.com | "2019-05-02 09:28:19.430 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcb Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:19.431 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcc Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:19.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcd Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:19.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bce Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +orderer0.example.com | "2019-05-02 09:28:19.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bcf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " +orderer0.example.com | "2019-05-02 09:28:19.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 223.1µs " +orderer0.example.com | "2019-05-02 09:28:19.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd1 Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +orderer0.example.com | "2019-05-02 09:28:19.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd2 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +orderer0.example.com | "2019-05-02 09:28:19.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.2µs " +orderer0.example.com | "2019-05-02 09:28:19.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:19.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:20.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:20.147 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd7 Sending msg of 28 bytes to 3 on channel testchainid took 98.3µs" +orderer0.example.com | "2019-05-02 09:28:20.148 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 428µs " +orderer0.example.com | "2019-05-02 09:28:20.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd9 Sending msg of 28 bytes to 2 on channel businesschannel took 58.8µs" +orderer0.example.com | "2019-05-02 09:28:20.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bda Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-05-02 09:28:20.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.6µs " +orderer0.example.com | "2019-05-02 09:28:20.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 480µs " +orderer0.example.com | "2019-05-02 09:28:20.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bdd Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:20.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bde Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:20.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bdf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:20.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be0 Sending msg of 28 bytes to 3 on channel testchainid took 49.1µs" +orderer0.example.com | "2019-05-02 09:28:20.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.4µs " +orderer0.example.com | "2019-05-02 09:28:20.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be2 Sending msg of 28 bytes to 2 on channel businesschannel took 41.4µs" +orderer0.example.com | "2019-05-02 09:28:20.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be3 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-05-02 09:28:20.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.4µs " +orderer0.example.com | "2019-05-02 09:28:20.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 226.5µs " +orderer0.example.com | "2019-05-02 09:28:20.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:20.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:21.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:21.146 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be9 Sending msg of 28 bytes to 3 on channel testchainid took 41.6µs" +orderer0.example.com | "2019-05-02 09:28:21.147 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.4µs " +orderer0.example.com | "2019-05-02 09:28:21.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1beb Sending msg of 28 bytes to 2 on channel businesschannel took 37.3µs" +orderer0.example.com | "2019-05-02 09:28:21.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bed Sending msg of 28 bytes to 3 on channel businesschannel took 28.5µs" +orderer0.example.com | "2019-05-02 09:28:21.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 431.8µs " +orderer0.example.com | "2019-05-02 09:28:21.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.5µs " +orderer0.example.com | "2019-05-02 09:28:21.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bef Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:21.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:21.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:21.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf2 Sending msg of 28 bytes to 3 on channel testchainid took 288.7µs" +orderer0.example.com | "2019-05-02 09:28:21.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.7µs " +orderer0.example.com | "2019-05-02 09:28:21.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf4 Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +orderer0.example.com | "2019-05-02 09:28:21.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf5 Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +orderer0.example.com | "2019-05-02 09:28:21.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126µs " +orderer0.example.com | "2019-05-02 09:28:21.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 212.1µs " +orderer0.example.com | "2019-05-02 09:28:21.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:21.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:22.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bfa Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-05-02 09:28:22.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bfb Sending msg of 28 bytes to 3 on channel testchainid took 239.6µs" +orderer0.example.com | "2019-05-02 09:28:22.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bfc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.8µs " +peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 179b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 179c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 179d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [policies] Evaluate -> DEBU 179e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [policies] Evaluate -> DEBU 179f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:36.328 UTC [policies] Evaluate -> DEBU 17a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.330 UTC [cauthdsl] func1 -> DEBU 17a1 0xc0023ddca0 gate 1556789256330252300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.330 UTC [cauthdsl] func2 -> DEBU 17a2 0xc0023ddca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.331 UTC [cauthdsl] func2 -> DEBU 17a3 0xc0023ddca0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.331 UTC [cauthdsl] func2 -> DEBU 17a4 0xc0023ddca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:36.332 UTC [cauthdsl] func2 -> DEBU 17a5 0xc0023ddca0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.332 UTC [cauthdsl] func1 -> DEBU 17a6 0xc0023ddca0 gate 1556789256330252300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.332 UTC [policies] Evaluate -> DEBU 17a7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.333 UTC [policies] Evaluate -> DEBU 17a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.333 UTC [policies] Evaluate -> DEBU 17a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.334 UTC [cauthdsl] func1 -> DEBU 17aa 0xc0024364e0 gate 1556789256333837100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.334 UTC [cauthdsl] func2 -> DEBU 17ab 0xc0024364e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.334 UTC [cauthdsl] func2 -> DEBU 17ac 0xc0024364e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [cauthdsl] func2 -> DEBU 17ad 0xc0024364e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17ae Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +peer0.org1.example.com | 00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17af Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +peer0.org1.example.com | 00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +peer0.org1.example.com | 00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +peer0.org1.example.com | 00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +peer0.org1.example.com | 00000040 48 a9 46 d7 ba f7 |H.F...|" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [cauthdsl] func2 -> DEBU 17b0 0xc0024364e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [cauthdsl] func1 -> DEBU 17b1 0xc0024364e0 gate 1556789256333837100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17b6 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +peer0.org1.example.com | "2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17b7 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|" +peer0.org1.example.com | "2019-05-02 09:27:36.336 UTC [gossip.gossip] handleMessage -> DEBU 17b8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.543 UTC [gossip.gossip] handleMessage -> DEBU 17b9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.543 UTC [msp] DeserializeIdentity -> DEBU 17ba Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.543 UTC [msp] DeserializeIdentity -> DEBU 17bb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.543 UTC [gossip.gossip] handleMessage -> DEBU 17bc Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.554 UTC [gossip.gossip] handleMessage -> DEBU 17bd Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789252680836200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.555 UTC [msp.identity] Verify -> DEBU 17be Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +peer0.org1.example.com | "2019-05-02 09:27:36.555 UTC [msp.identity] Verify -> DEBU 17bf Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|" +peer0.org1.example.com | "2019-05-02 09:27:36.556 UTC [gossip.gossip] handleMessage -> DEBU 17c0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.576 UTC [gossip.gossip] handleMessage -> DEBU 17c1 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.577 UTC [gossip.pull] HandleMessage -> DEBU 17c2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.577 UTC [gossip.pull] SendDigest -> DEBU 17c3 Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:36.577 UTC [gossip.gossip] handleMessage -> DEBU 17c4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.788 UTC [gossip.gossip] handleMessage -> DEBU 17c5 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.788 UTC [msp] DeserializeIdentity -> DEBU 17c6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.788 UTC [msp] DeserializeIdentity -> DEBU 17c7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.788 UTC [msp] DeserializeIdentity -> DEBU 17c8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.788 UTC [gossip.gossip] handleMessage -> DEBU 17c9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.820 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 17ca Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.820 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 17cb Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.820 UTC [policies] Evaluate -> DEBU 17cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-05-02 09:27:36.820 UTC [policies] Evaluate -> DEBU 17cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:36.820 UTC [policies] Evaluate -> DEBU 17ce == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [cauthdsl] func1 -> DEBU 17cf 0xc0035cb1e0 gate 1556789256821036100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d0 0xc0035cb1e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d1 0xc0035cb1e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d2 0xc0035cb1e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [msp.identity] Verify -> DEBU 17d3 Verify: digest = 00000000 1b 69 39 fb e0 70 73 f1 5b e0 96 30 08 b2 8d 0e |.i9..ps.[..0....| +peer0.org1.example.com | 00000010 59 cb 9c d4 09 22 a8 98 cc 9b 80 40 78 30 5d 43 |Y....".....@x0]C|" +peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [msp.identity] Verify -> DEBU 17d4 Verify: sig = 00000000 30 45 02 21 00 be 35 cb e4 db 2e 15 46 6b c8 12 |0E.!..5.....Fk..| +peer0.org1.example.com | 00000010 05 38 7c a4 fe 7c f8 24 de e6 20 f5 96 a7 a6 60 |.8|..|.$.. ....`| +peer0.org1.example.com | 00000020 2e 80 d2 03 34 02 20 19 43 c1 a8 6a bc 19 32 8a |....4. .C..j..2.| +peer0.org1.example.com | 00000030 6b fe a8 41 71 43 cd 2b 8a e9 d4 42 36 01 cc 76 |k..AqC.+...B6..v| +peer0.org1.example.com | 00000040 7b 80 5a a9 96 13 2c |{.Z...,|" +peer0.org1.example.com | "2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d5 0xc0035cb1e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [cauthdsl] func1 -> DEBU 17d6 0xc0035cb1e0 gate 1556789256821036100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17d7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17d9 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [blocksProvider] DeliverBlocks -> DEBU 17db [businesschannel] Adding payload to local buffer, blockNum = [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [gossip.state] addPayload -> DEBU 17dc [businesschannel] Adding payload to local buffer, blockNum = [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [gossip.state] addPayload -> DEBU 17dd Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [blocksProvider] DeliverBlocks -> DEBU 17de [businesschannel] Gossiping block [5], peers number [3]" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [gossip.channel] AddToMsgStore -> DEBU 17df Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5724 bytes, seq: 5}, Envelope: 5754 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-05-02 09:27:36.822 UTC [gossip.pull] Add -> DEBU 17e0 Added 5, total items: 5" +peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [gossip.state] deliverPayloads -> DEBU 17e1 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [gossip.state] deliverPayloads -> DEBU 17e2 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [gossip.privdata] StoreBlock -> INFO 17e3 [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [gossip.privdata] StoreBlock -> DEBU 17e4 [businesschannel] Validating block [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [committer.txvalidator] Validate -> DEBU 17e5 [businesschannel] START Block Validation for block [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [committer.txvalidator] Validate -> DEBU 17e6 expecting 1 block validation responses" +peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [committer.txvalidator] validateTx -> DEBU 17e7 [businesschannel] validateTx starts for block 0xc0033afec0 env 0xc003709f90 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [protoutils] ValidateTransaction -> DEBU 17e8 ValidateTransactionEnvelope starts for envelope 0xc003709f90" +peer0.org1.example.com | "2019-05-02 09:27:36.823 UTC [protoutils] ValidateTransaction -> DEBU 17e9 Header is channel_header:"\010\003\032\014\010\206\360\252\346\005\020\350\313\321\304\001\"\017businesschannel*@f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\236'#\204\334o\257\315\240#)kB\\\\\345Y\331\372\203~\003\200\322" " +peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [protoutils] validateChannelHeader -> DEBU 17ea validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [protoutils] checkSignatureFromCreator -> DEBU 17eb begin" +peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [msp] GetManagerForChain -> DEBU 17ec Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [protoutils] checkSignatureFromCreator -> DEBU 17ed creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [protoutils] checkSignatureFromCreator -> DEBU 17ee creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [msp.identity] Verify -> DEBU 17ef Verify: digest = 00000000 e1 bc 9e ea 26 2e 53 22 7f 18 0b b0 a0 87 2f b7 |....&.S"....../.| +peer0.org1.example.com | 00000010 7d d4 55 a3 5c 3e 56 1a 13 08 07 eb 68 19 cc 23 |}.U.\>V.....h..#|" +peer0.org1.example.com | "2019-05-02 09:27:36.824 UTC [msp.identity] Verify -> DEBU 17f0 Verify: sig = 00000000 30 44 02 20 5f 33 fb e6 a2 75 d0 8e db 9b 31 61 |0D. _3...u....1a| +peer0.org1.example.com | 00000010 af 03 73 4c 80 1b 5e 9a de a3 10 4c eb 80 6a 29 |..sL..^....L..j)| +peer0.org1.example.com | 00000020 90 1a 05 86 02 20 6c 70 70 d5 9b d0 9c 08 df ab |..... lpp.......| +peer0.org1.example.com | 00000030 8f fb 97 db 2e 62 f8 57 e7 41 2c 2e a6 81 56 32 |.....b.W.A,...V2| +peer0.org1.example.com | 00000040 e6 e4 37 e8 a5 f7 |..7...|" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [protoutils] checkSignatureFromCreator -> DEBU 17f1 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [protoutils] validateEndorserTransaction -> DEBU 17f2 validateEndorserTransaction starts for data 0xc0035d5000, header channel_header:"\010\003\032\014\010\206\360\252\346\005\020\350\313\321\304\001\"\017businesschannel*@f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\236'#\204\334o\257\315\240#)kB\\\\\345Y\331\372\203~\003\200\322" " +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [protoutils] validateEndorserTransaction -> DEBU 17f3 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [protoutils] validateEndorserTransaction -> DEBU 17f4 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [protoutils] ValidateTransaction -> DEBU 17f5 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [committer.txvalidator] validateTx -> DEBU 17f6 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 17f7 retrieveTransactionByID() - txId = [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [committer.txvalidator] validateTx -> DEBU 17f8 Validating transaction with plugins" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [committer.txvalidator] Dispatch -> DEBU 17f9 [businesschannel] Dispatch starts for bytes 0xc0035d7300" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 17fa constructing new query executor txid = [c1fca0ee-90d2-4a85-b1f6-f4279e627420]" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] Done -> DEBU 17fb Done with transaction simulation / query execution [c1fca0ee-90d2-4a85-b1f6-f4279e627420]" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 17fc Validating Tx f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 17fd constructing new query executor txid = [46d5b075-b956-4fa0-bab6-93512eab1493]" +peer0.org1.example.com | "2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] Done -> DEBU 17fe Done with transaction simulation / query execution [46d5b075-b956-4fa0-bab6-93512eab1493]" +peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [policies] Evaluate -> DEBU 17ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement ==" +peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [policies] Evaluate -> DEBU 1800 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [policies] Evaluate -> DEBU 1801 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" +peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [cauthdsl] func1 -> DEBU 1802 0xc00276a1a0 gate 1556789256826232100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1803 0xc00276a1a0 signed by 0 principal evaluation starts (used [false false])" +peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1804 0xc00276a1a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1805 0xc00276a1a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [msp.identity] Verify -> DEBU 1806 Verify: digest = 00000000 64 e4 b5 31 8b fe 55 90 73 8a 94 89 ae ec f0 b0 |d..1..U.s.......| +peer0.org1.example.com | 00000010 8e de 71 f5 92 07 1b e9 75 06 92 71 fb 06 87 e1 |..q.....u..q....|" +peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [msp.identity] Verify -> DEBU 1807 Verify: sig = 00000000 30 44 02 20 6e fd 30 46 b1 7d 4d d2 77 78 2c 7e |0D. n.0F.}M.wx,~| +peer0.org1.example.com | 00000010 ce 44 f3 a7 bb 07 35 51 a9 a6 95 ff db 45 e3 57 |.D....5Q.....E.W| +peer0.org1.example.com | 00000020 e0 d1 d2 59 02 20 4e b0 9f 48 c7 10 e7 38 92 e5 |...Y. N..H...8..| +peer0.org1.example.com | 00000030 76 4c ba e6 cd e1 b0 5d 91 7b c7 92 60 c9 30 44 |vL.....].{..`.0D| +peer0.org1.example.com | 00000040 83 6d 43 57 30 df |.mCW0.|" +peer0.org1.example.com | "2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1808 0xc00276a1a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [cauthdsl] func1 -> DEBU 1809 0xc00276a1a0 gate 1556789256826232100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [policies] Evaluate -> DEBU 180a Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [policies] Evaluate -> DEBU 180b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [policies] Evaluate -> DEBU 180c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" +peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [cauthdsl] func1 -> DEBU 180d 0xc00276ade0 gate 1556789256827589900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [cauthdsl] func2 -> DEBU 180e 0xc00276ade0 signed by 0 principal evaluation starts (used [false false])" +peer0.org1.example.com | "2019-05-02 09:27:36.827 UTC [cauthdsl] func2 -> DEBU 180f 0xc00276ade0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.828 UTC [cauthdsl] func2 -> DEBU 1810 0xc00276ade0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-05-02 09:27:36.828 UTC [cauthdsl] func2 -> DEBU 1811 0xc00276ade0 processing identity 1 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.828 UTC [cauthdsl] func2 -> DEBU 1812 0xc00276ade0 principal matched by identity 1" +peer0.org1.example.com | "2019-05-02 09:27:36.828 UTC [msp.identity] Verify -> DEBU 1813 Verify: digest = 00000000 63 0f 94 61 5c cf 70 eb ab 79 52 8b 39 ce b3 ea |c..a\.p..yR.9...| +peer0.org1.example.com | 00000010 87 1c 67 50 e8 02 a2 a3 64 4b 7e 76 a8 57 ea f9 |..gP....dK~v.W..|" +peer0.org1.example.com | "2019-05-02 09:27:36.828 UTC [msp.identity] Verify -> DEBU 1814 Verify: sig = 00000000 30 44 02 20 49 e8 bd 2a 99 34 6e 1a 70 a1 4d 63 |0D. I..*.4n.p.Mc| +peer0.org1.example.com | 00000010 71 7c f3 48 dd c9 09 c7 7a a6 c8 30 80 7e 26 e2 |q|.H....z..0.~&.| +peer0.org1.example.com | 00000020 d2 ef 2a 9a 02 20 21 0c 81 fa a1 82 1d 69 6e cf |..*.. !......in.| +peer0.org1.example.com | 00000030 63 6e a0 4c b3 13 14 12 1c bf 7c 5f 63 1e 38 ac |cn.L......|_c.8.| +peer0.org1.example.com | 00000040 cb 55 b5 4e 37 eb |.U.N7.|" +peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [cauthdsl] func2 -> DEBU 1815 0xc00276ade0 principal evaluation succeeds for identity 1" +peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [cauthdsl] func1 -> DEBU 1816 0xc00276ade0 gate 1556789256827589900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 1817 Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 1818 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 1819 Signature set satisfies policy /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 181a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 181b constructing new query executor txid = [8a948209-c29a-46fa-8cbb-4f01770a2ddb]" +peer0.org1.example.com | "2019-05-02 09:27:36.829 UTC [lockbasedtxmgr] Done -> DEBU 181c Done with transaction simulation / query execution [8a948209-c29a-46fa-8cbb-4f01770a2ddb]" +peer0.org1.example.com | "2019-05-02 09:27:36.830 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 181d constructing new query executor txid = [bf4839c9-b45c-4566-91e3-00afba3760eb]" +peer0.org1.example.com | "2019-05-02 09:27:36.830 UTC [lockbasedtxmgr] Done -> DEBU 181e Done with transaction simulation / query execution [bf4839c9-b45c-4566-91e3-00afba3760eb]" +peer0.org1.example.com | "2019-05-02 09:27:36.830 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.830 UTC [msp] DeserializeIdentity -> DEBU 1820 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1821 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1822 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [gossip.comm] Send -> DEBU 1823 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5724 bytes, seq: 5}, Envelope: 5754 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1824 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1825 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1826 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5724 bytes, seq: 5}, Envelope: 5754 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1827 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.830 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1828 constructing new query executor txid = [69339387-8be9-4cd8-a4bd-d90910597306]" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] Done -> DEBU 1829 Done with transaction simulation / query execution [69339387-8be9-4cd8-a4bd-d90910597306]" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 182a constructing new query executor txid = [61ed8755-2925-49e1-90c1-3ea340992ac9]" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] Done -> DEBU 182b Done with transaction simulation / query execution [61ed8755-2925-49e1-90c1-3ea340992ac9]" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [vscc] Validate -> DEBU 182c block 5, namespace: _lifecycle, tx 0 validation results is: " +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 182d Transaction f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1 appears to be valid" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [committer.txvalidator] Dispatch -> DEBU 182e [businesschannel] Dispatch completes env bytes 0xc0035d7300" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [committer.txvalidator] validateTx -> DEBU 182f [businesschannel] validateTx completes for block 0xc0033afec0 env 0xc003709f90 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [committer.txvalidator] Validate -> DEBU 1830 got result for idx 0, code 0" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [committer.txvalidator] Validate -> INFO 1831 [businesschannel] Validated block [5] in 9ms" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [gossip.privdata] containsWrites -> DEBU 1832 HashedRWSet of tx f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, namespace _lifecycle, collection _implicit_org_Org1MSP doesn't contain writes" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [gossip.privdata] containsWrites -> DEBU 1833 HashedRWSet of tx f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, namespace _lifecycle, collection _implicit_org_Org2MSP doesn't contain writes" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1834 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [gossip.privdata] StoreBlock -> DEBU 1835 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [kvledger] CommitWithPvtData -> DEBU 1836 [businesschannel] Validating state for block [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1837 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1838 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1839 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 183a ValidateAndPrepareBatch() for block number = [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 183b preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valimpl] preprocessProtoBlock -> DEBU 183c txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 183d GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [statebasedval] validateKVRead -> DEBU 183e Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 183f GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [statebasedval] validateKVRead -> DEBU 1840 Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1841 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1842 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1843 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1844 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1845 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1846 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1847 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 1848 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1849 Block [5] Transaction index [0] TxId [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1] marked as valid by state validator. ContainsPostOrderWrites [false]" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valinternal] ApplyWriteSet -> DEBU 184a txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Collections"}:(*internal.keyOps)(0xc003503a40), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/EndorsementInfo"}:(*internal.keyOps)(0xc003503a80), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Sequence"}:(*internal.keyOps)(0xc003503ac0), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/ValidationInfo"}:(*internal.keyOps)(0xc003503b40), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/metadata/exp02"}:(*internal.keyOps)(0xc003503b80)}" +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 184b validating rwset..." +peer0.org1.example.com | "2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 184c postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 184d ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [lifecycle] update -> INFO 184e Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 184f GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1850 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1851 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1852 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1853 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1854 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=� ��=�Y\��}�J=�M#d� ���Ժ�" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [lifecycle] update -> INFO 1855 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1856 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[exp02:0xc00326b290] map[4SNrˤ��s�p����oy��&��t��ZM4:exp02 ����>{"+���#b� ��T�H��Won�:exp02 � ��=�Y\��}�J=�M#d� ���Ժ�:exp02 ���R���l� DEBU 1857 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc003262f00), (*kvrwset.KVWrite)(0xc003262f50), (*kvrwset.KVWrite)(0xc003262fa0), (*kvrwset.KVWrite)(0xc003262ff0), (*kvrwset.KVWrite)(0xc003263040)}}" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [cceventmgmt] HandleStateUpdates -> INFO 1858 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 1859 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}]]" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 185a Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 185b Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 185c Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0})}" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 185d GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 185e GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-05-02 09:27:36.834 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 185f Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 184 141 138 176 125 192 58 83 1 250 26 202 161 54 104 45 229 195 166 43 96 100 9 159 109 154 254 234 147 189 33 229 2 32 120 2 28 36 139 185 5 29 110 69 153 220 53 183 5 154 146 86 140 197 1 134 231 194 84 112 80 242 124 44 67 58]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002604a00 0xc002598700 0xc0025cc980})]}" +peer0.org1.example.com | "2019-05-02 09:27:36.835 UTC [confighistory] add -> DEBU 1860 add() - {lscc, exp02~collection, 5}" +peer0.org1.example.com | "2019-05-02 09:27:36.838 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1861 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000ebc0})}" +peer0.org1.example.com | "2019-05-02 09:27:36.838 UTC [kvledger] CommitWithPvtData -> DEBU 1862 [businesschannel] Committing block [5] to storage" +peer0.org1.example.com | "2019-05-02 09:27:36.838 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1863 Writing block [5] to pvt block store" +peer0.org1.example.com | "2019-05-02 09:27:36.839 UTC [pvtdatastorage] Prepare -> DEBU 1864 Saved 0 private data write sets for block [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.842 UTC [fsblkstorage] indexBlock -> DEBU 1865 Indexing block [blockNum=5, blockHash=[]byte{0x5f, 0x54, 0x4d, 0xff, 0x12, 0x65, 0x12, 0xe, 0xc5, 0x7f, 0x48, 0x3d, 0x97, 0x19, 0x5b, 0xa3, 0xda, 0x2c, 0x78, 0xea, 0x37, 0x3d, 0x8f, 0xde, 0xaf, 0x84, 0x17, 0xbc, 0xfa, 0xa4, 0xf2, 0xd1} txOffsets= +peer0.org1.example.com | txId=f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1 locPointer=offset=70, bytesLength=4705 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-05-02 09:27:36.842 UTC [fsblkstorage] indexBlock -> DEBU 1866 Adding txLoc [fileSuffixNum=0, offset=80864, bytesLength=4705] for tx ID: [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1] to txid-index" +peer0.org1.example.com | "2019-05-02 09:27:36.842 UTC [fsblkstorage] indexBlock -> DEBU 1867 Adding txLoc [fileSuffixNum=0, offset=80864, bytesLength=4705] for tx number:[0] ID: [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1] to blockNumTranNum index" +peer0.org1.example.com | "2019-05-02 09:27:36.844 UTC [fsblkstorage] updateCheckpoint -> DEBU 1868 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86507], isChainEmpty=[false], lastBlockNumber=[5]" +peer0.org1.example.com | "2019-05-02 09:27:36.845 UTC [pvtdatastorage] Commit -> DEBU 1869 Committing private data for block [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.846 UTC [pvtdatastorage] Commit -> DEBU 186a Committed private data for block [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.847 UTC [kvledger] CommitWithPvtData -> DEBU 186b [businesschannel] Committing block [5] transactions to state database" +peer0.org1.example.com | "2019-05-02 09:27:36.847 UTC [lockbasedtxmgr] Commit -> DEBU 186c lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:36.847 UTC [lockbasedtxmgr] Commit -> DEBU 186d Committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:36.848 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 186e Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-05-02 09:27:36.848 UTC [lockbasedtxmgr] Commit -> DEBU 186f Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:36.848 UTC [stateleveldb] ApplyUpdates -> DEBU 1870 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/metadata/exp02] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32}]" +peer0.org1.example.com | "2019-05-02 09:27:36.848 UTC [stateleveldb] ApplyUpdates -> DEBU 1871 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" +peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [stateleveldb] ApplyUpdates -> DEBU 1872 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" +peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [stateleveldb] ApplyUpdates -> DEBU 1873 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Sequence] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x53, 0x65, 0x71, 0x75, 0x65, 0x6e, 0x63, 0x65}]" +peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [stateleveldb] ApplyUpdates -> DEBU 1874 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" +peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [gossip.comm] func1 -> DEBU 1875 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [gossip.gossip] handleMessage -> DEBU 1876 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [gossip.pull] HandleMessage -> DEBU 1877 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 1878 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 1879 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 187a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 187b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.850 UTC [msp] DeserializeIdentity -> DEBU 187c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.850 UTC [msp] DeserializeIdentity -> DEBU 187d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.850 UTC [gossip.pull] SendDigest -> DEBU 187e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:36.850 UTC [gossip.gossip] handleMessage -> DEBU 187f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.851 UTC [fsblkstorage] waitForBlock -> DEBU 1880 Came out of wait. maxAvailaBlockNumber=[5]" +peer0.org1.example.com | "2019-05-02 09:27:36.851 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1881 Remaining bytes=[5713], Going to peek [8] bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.854 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1882 Returning blockbytes - length=[5711], placementInfo={fileNum=[0], startOffset=[80794], bytesOffset=[80796]}" +peer0.org1.example.com | "2019-05-02 09:27:36.854 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1883 blockbytes [5711] read from file [0]" +peer0.org1.example.com | "2019-05-02 09:27:36.855 UTC [lockbasedtxmgr] Commit -> DEBU 1884 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-05-02 09:27:36.855 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1885 Preparing potential purge list working-set for expiringAtBlk [6]" +peer0.org1.example.com | "2019-05-02 09:27:36.855 UTC [lockbasedtxmgr] func1 -> DEBU 1886 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-05-02 09:27:36.856 UTC [kvledger] CommitWithPvtData -> DEBU 1887 [businesschannel] Committing block [5] transactions to history database" +peer0.org1.example.com | "2019-05-02 09:27:36.856 UTC [historyleveldb] Commit -> DEBU 1888 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" +peer0.org1.example.com | "2019-05-02 09:27:36.856 UTC [leveldbhelper] GetIterator -> DEBU 1889 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:36.857 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 188a No expiry entry found for expiringAtBlk [6]" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [gossip.comm] func1 -> DEBU 188b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [gossip.gossip] handleMessage -> DEBU 188c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [gossip.gossip] handleMessage -> DEBU 188d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 188f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [msp] DeserializeIdentity -> DEBU 1890 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1891 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1892 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1893 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [policies] Evaluate -> DEBU 1894 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [policies] Evaluate -> DEBU 1895 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [policies] Evaluate -> DEBU 1896 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.859 UTC [cauthdsl] func1 -> DEBU 1897 0xc002f8ce80 gate 1556789256859974400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 1898 0xc002f8ce80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 1899 0xc002f8ce80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 189a 0xc002f8ce80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 189b 0xc002f8ce80 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func1 -> DEBU 189c 0xc002f8ce80 gate 1556789256859974400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [policies] Evaluate -> DEBU 189d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [policies] Evaluate -> DEBU 189e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [policies] Evaluate -> DEBU 189f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func1 -> DEBU 18a0 0xc002f8d6c0 gate 1556789256860328500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 18a1 0xc002f8d6c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 18a2 0xc002f8d6c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [historyleveldb] Commit -> DEBU 18a3 Channel [businesschannel]: Updates committed to history database for blockNo [5]" +peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [kvledger] CommitWithPvtData -> INFO 18a4 [businesschannel] Committed block [5] with 1 transaction(s) in 29ms (state_validation=5ms block_commit=9ms state_commit=9ms)" +peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [msp.identity] Sign -> DEBU 18a5 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020806 " +peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [msp.identity] Sign -> DEBU 18a6 Sign: digest: 18C8659D2BDBC244829233FA82F12F4FE7D980E6B95C6E3F3A1E6BE496F5D8FF " +peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [gossip.state] commitBlock -> DEBU 18a7 [businesschannel] Committed block [5] with 1 transaction(s)" +peer0.org1.example.com | "2019-05-02 09:27:36.862 UTC [common.deliver] deliverBlocks -> DEBU 18a8 [channel: businesschannel] Delivering block [5] for (0xc0034d26c0) for 172.18.0.8:57318" +peer0.org1.example.com | "2019-05-02 09:27:36.863 UTC [fsblkstorage] waitForBlock -> DEBU 18a9 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer0.org1.example.com | "2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 18aa 0xc002f8d6c0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [msp.identity] Verify -> DEBU 18ab Verify: digest = 00000000 7e 36 2b 74 13 45 8f 14 60 07 ed 72 c2 22 cc 88 |~6+t.E..`..r."..| +peer0.org1.example.com | 00000010 aa 38 9c a9 71 2d 5a 2c 15 9d 0f 24 9c c4 67 1a |.8..q-Z,...$..g.|" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [msp.identity] Verify -> DEBU 18ac Verify: sig = 00000000 30 45 02 21 00 9c 1c 0d 70 36 3d 31 a9 cb 15 3b |0E.!....p6=1...;| +peer0.org1.example.com | 00000010 f4 55 60 0a c1 d0 74 20 11 63 79 e5 a6 2b 56 a6 |.U`...t .cy..+V.| +peer0.org1.example.com | 00000020 5d ed 9a 0e 4c 02 20 73 25 81 4a 88 30 c3 45 25 |]...L. s%.J.0.E%| +peer0.org1.example.com | 00000030 a6 38 d3 6f 43 8d 41 44 d2 06 f3 be b5 31 12 2a |.8.oC.AD.....1.*| +peer0.org1.example.com | 00000040 6b fb cf fb ee d8 97 |k......|" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [cauthdsl] func2 -> DEBU 18ad 0xc002f8d6c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [cauthdsl] func1 -> DEBU 18ae 0xc002f8d6c0 gate 1556789256860328500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18af Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18b1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 18b3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b5 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 " +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 " +peer0.org1.example.com | "2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 18b9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ba Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.discovery] sendMemResponse -> DEBU 18bb Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [msp] DeserializeIdentity -> DEBU 18bc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [msp] DeserializeIdentity -> DEBU 18bd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [msp] DeserializeIdentity -> DEBU 18be Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.comm] Send -> DEBU 18bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.discovery] sendMemResponse -> DEBU 18c0 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.comm] sendToEndpoint -> DEBU 18c1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:36.866 UTC [gossip.comm] sendToEndpoint -> DEBU 18c2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:36.924 UTC [common.deliver] deliverBlocks -> DEBU 18c3 Context canceled, aborting wait for next block" +peer0.org1.example.com | "2019-05-02 09:27:36.924 UTC [common.deliverevents] func1 -> DEBU 18c5 Closing Deliver stream" +peer0.org1.example.com | "2019-05-02 09:27:36.925 UTC [comm.grpc.server] 1 -> INFO 18c7 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T09:28:04.468Z grpc.peer_address=172.18.0.8:57318 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.4557811s +peer0.org1.example.com | "2019-05-02 09:27:36.924 UTC [grpc] infof -> DEBU 18c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:36.924 UTC [fsblkstorage] waitForBlock -> DEBU 18c6 Came out of wait. maxAvailaBlockNumber=[5]" +peer0.org1.example.com | "2019-05-02 09:27:36.932 UTC [grpc] infof -> DEBU 18c8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:37.010 UTC [msp] DeserializeIdentity -> DEBU 18c9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.010 UTC [msp] DeserializeIdentity -> DEBU 18ca Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.010 UTC [gossip.pull] Hello -> DEBU 18cb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:37.011 UTC [msp] DeserializeIdentity -> DEBU 18cc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.011 UTC [msp] DeserializeIdentity -> DEBU 18cd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.011 UTC [gossip.comm] Send -> DEBU 18ce Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.011 UTC [gossip.comm] sendToEndpoint -> DEBU 18cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.011 UTC [gossip.comm] sendToEndpoint -> DEBU 18d0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.015 UTC [gossip.gossip] handleMessage -> DEBU 18d1 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11246267138444085805 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.026 UTC [gossip.pull] HandleMessage -> DEBU 18d3 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11246267138444085805 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.026 UTC [gossip.gossip] handleMessage -> DEBU 18d4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.018 UTC [gossip.comm] func1 -> DEBU 18d2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.026 UTC [gossip.comm] func1 -> DEBU 18d5 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.026 UTC [gossip.gossip] handleMessage -> DEBU 18d6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.026 UTC [msp] DeserializeIdentity -> DEBU 18d7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [msp] DeserializeIdentity -> DEBU 18d8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [msp] DeserializeIdentity -> DEBU 18d9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [gossip.gossip] handleMessage -> DEBU 18da Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [gossip.gossip] handleMessage -> DEBU 18db Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [msp] DeserializeIdentity -> DEBU 18dc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18de Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18df Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [policies] Evaluate -> DEBU 18e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [policies] Evaluate -> DEBU 18e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:37.027 UTC [policies] Evaluate -> DEBU 18e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func1 -> DEBU 18e3 0xc0020db600 gate 1556789257028015400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e4 0xc0020db600 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e5 0xc0020db600 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e6 0xc0020db600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e7 0xc0020db600 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func1 -> DEBU 18e8 0xc0020db600 gate 1556789257028015400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [policies] Evaluate -> DEBU 18e9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [policies] Evaluate -> DEBU 18ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [policies] Evaluate -> DEBU 18eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func1 -> DEBU 18ec 0xc0020dbe40 gate 1556789257028656700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18ed 0xc0020dbe40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18ee 0xc0020dbe40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18ef 0xc0020dbe40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [msp.identity] Verify -> DEBU 18f0 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [msp.identity] Verify -> DEBU 18f1 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [cauthdsl] func2 -> DEBU 18f2 0xc0020dbe40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [cauthdsl] func1 -> DEBU 18f3 0xc0020dbe40 gate 1556789257028656700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [msp] DeserializeIdentity -> DEBU 18f8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [msp] DeserializeIdentity -> DEBU 18f9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.029 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18fa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18fb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [policies] Evaluate -> DEBU 18fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [policies] Evaluate -> DEBU 18fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [cauthdsl] func1 -> DEBU 18ff 0xc0026d1020 gate 1556789257030186500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1900 0xc0026d1020 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1901 0xc0026d1020 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1902 0xc0026d1020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1903 0xc0026d1020 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.048 UTC [cauthdsl] func1 -> DEBU 1904 0xc0026d1020 gate 1556789257030186500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.048 UTC [policies] Evaluate -> DEBU 1905 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.048 UTC [policies] Evaluate -> DEBU 1906 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [policies] Evaluate -> DEBU 1907 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [cauthdsl] func1 -> DEBU 1908 0xc0020d2920 gate 1556789257049107800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [cauthdsl] func2 -> DEBU 1909 0xc0020d2920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [cauthdsl] func2 -> DEBU 190a 0xc0020d2920 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [cauthdsl] func2 -> DEBU 190b 0xc0020d2920 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [msp.identity] Verify -> DEBU 190c Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +peer0.org1.example.com | "2019-05-02 09:27:37.049 UTC [msp.identity] Verify -> DEBU 190d Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|" +peer0.org1.example.com | "2019-05-02 09:27:37.050 UTC [cauthdsl] func2 -> DEBU 190e 0xc0020d2920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.050 UTC [cauthdsl] func1 -> DEBU 190f 0xc0020d2920 gate 1556789257049107800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:37.050 UTC [policies] Evaluate -> DEBU 1910 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.050 UTC [policies] Evaluate -> DEBU 1911 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.050 UTC [policies] Evaluate -> DEBU 1912 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.057 UTC [policies] Evaluate -> DEBU 1913 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.057 UTC [gossip.gossip] handleMessage -> DEBU 1914 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.057 UTC [gossip.gossip] handleMessage -> DEBU 1915 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.058 UTC [msp] DeserializeIdentity -> DEBU 1916 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.064 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1917 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:37.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1918 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1919 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [policies] Evaluate -> DEBU 191a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [policies] Evaluate -> DEBU 191b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [policies] Evaluate -> DEBU 191c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [cauthdsl] func1 -> DEBU 191d 0xc0026ec260 gate 1556789257073691600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [cauthdsl] func2 -> DEBU 191e 0xc0026ec260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.073 UTC [cauthdsl] func2 -> DEBU 191f 0xc0026ec260 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1920 0xc0026ec260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1921 0xc0026ec260 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func1 -> DEBU 1922 0xc0026ec260 gate 1556789257073691600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [policies] Evaluate -> DEBU 1923 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [policies] Evaluate -> DEBU 1924 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [policies] Evaluate -> DEBU 1925 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func1 -> DEBU 1926 0xc0026ecaa0 gate 1556789257074441500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1927 0xc0026ecaa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1928 0xc0026ecaa0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [cauthdsl] func2 -> DEBU 1929 0xc0026ecaa0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [msp] DeserializeIdentity -> DEBU 192a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [msp.identity] Verify -> DEBU 192b Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [msp.identity] Verify -> DEBU 192d Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|" +peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [gossip.comm] Send -> DEBU 192e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [msp] DeserializeIdentity -> DEBU 192f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.075 UTC [cauthdsl] func2 -> DEBU 1930 0xc0026ecaa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [cauthdsl] func1 -> DEBU 1931 0xc0026ecaa0 gate 1556789257074441500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [msp] DeserializeIdentity -> DEBU 1932 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1933 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1934 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1935 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1937 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [gossip.comm] sendToEndpoint -> DEBU 1936 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [msp] DeserializeIdentity -> DEBU 1938 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [gossip.comm] sendToEndpoint -> DEBU 1939 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [gossip.gossip] handleMessage -> DEBU 193a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [gossip.gossip] handleMessage -> DEBU 193b Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [msp] DeserializeIdentity -> DEBU 193c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.076 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 193d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 193e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 193f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1940 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1941 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1942 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func1 -> DEBU 1943 0xc00270a920 gate 1556789257077287400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1944 0xc00270a920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1945 0xc00270a920 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1946 0xc00270a920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1947 0xc00270a920 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func1 -> DEBU 1948 0xc00270a920 gate 1556789257077287400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1949 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 194a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 194b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func1 -> DEBU 194c 0xc00270b160 gate 1556789257077808300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 194d 0xc00270b160 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 194e 0xc00270b160 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [cauthdsl] func2 -> DEBU 194f 0xc00270b160 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [msp.identity] Verify -> DEBU 1950 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [msp.identity] Verify -> DEBU 1951 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [cauthdsl] func2 -> DEBU 1952 0xc00270b160 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [cauthdsl] func1 -> DEBU 1953 0xc00270b160 gate 1556789257077808300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1954 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1955 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1956 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1957 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [gossip.gossip] handleMessage -> DEBU 1958 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.078 UTC [gossip.comm] sendToEndpoint -> DEBU 1959 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.079 UTC [gossip.comm] sendToEndpoint -> DEBU 195a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.pull] Hello -> DEBU 195b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.comm] Send -> DEBU 195c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.pull] Hello -> DEBU 195d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.comm] Send -> DEBU 195e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.pull] Hello -> DEBU 195f Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.comm] Send -> DEBU 1960 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.comm] sendToEndpoint -> DEBU 1961 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.121 UTC [gossip.comm] sendToEndpoint -> DEBU 1962 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 1963 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151016 " +peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 1964 Sign: digest: EF7A3BC1C3331D871758D2E0BD699A5307DD180B35BEE6D3A2B817AF4CDE8DB7 " +peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 1965 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [gossip.comm] sendToEndpoint -> DEBU 1966 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [gossip.comm] sendToEndpoint -> DEBU 1967 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.124 UTC [gossip.comm] sendToEndpoint -> DEBU 1968 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.125 UTC [gossip.comm] sendToEndpoint -> DEBU 1969 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 196a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:37.136 UTC [gossip.comm] Send -> DEBU 196b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.136 UTC [msp] DeserializeIdentity -> DEBU 196c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.136 UTC [gossip.comm] Send -> DEBU 196d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.136 UTC [msp] DeserializeIdentity -> DEBU 196e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] Send -> DEBU 196f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1970 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1971 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1972 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1973 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1974 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1975 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.151 UTC [gossip.gossip] handleMessage -> DEBU 1976 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14406783678540006922 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.pull] HandleMessage -> DEBU 1977 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14406783678540006922 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.gossip] handleMessage -> DEBU 1978 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.gossip] handleMessage -> DEBU 1979 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.gossip] handleMessage -> DEBU 197a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.discovery] handleMsgFromComm -> DEBU 197b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 197c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [msp.identity] Verify -> DEBU 197d Verify: digest = 00000000 ef 7a 3b c1 c3 33 1d 87 17 58 d2 e0 bd 69 9a 53 |.z;..3...X...i.S| +peer0.org1.example.com | 00000010 07 dd 18 0b 35 be e6 d3 a2 b8 17 af 4c de 8d b7 |....5.......L...|" +peer0.org1.example.com | "2019-05-02 09:27:37.152 UTC [msp.identity] Verify -> DEBU 197e Verify: sig = 00000000 30 44 02 20 66 a7 c6 35 cd 70 66 a7 71 74 78 6d |0D. f..5.pf.qtxm| +peer0.org1.example.com | 00000010 80 73 a8 61 43 9c 2c 1c 28 13 e9 2a 16 03 02 14 |.s.aC.,.(..*....| +peer0.org1.example.com | 00000020 53 65 aa 05 02 20 4e bd b8 d6 83 1a 13 94 0a 3b |Se... N........;| +peer0.org1.example.com | 00000030 dc 72 b0 a7 64 5b d9 01 57 bf b8 76 a9 97 9b 3f |.r..d[..W..v...?| +peer0.org1.example.com | 00000040 42 a9 b1 78 48 60 |B..xH`|" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [gossip.discovery] handleAliveMessage -> DEBU 197f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [gossip.discovery] isSentByMe -> DEBU 1980 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [gossip.discovery] handleAliveMessage -> DEBU 1981 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1982 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [msp] DeserializeIdentity -> DEBU 1983 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1984 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1985 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1986 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [policies] Evaluate -> DEBU 1987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [policies] Evaluate -> DEBU 1988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:37.153 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func1 -> DEBU 198a 0xc002cafc70 gate 1556789257153991900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198b 0xc002cafc70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198c 0xc002cafc70 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198d 0xc002cafc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198e 0xc002cafc70 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func1 -> DEBU 198f 0xc002cafc70 gate 1556789257153991900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [policies] Evaluate -> DEBU 1990 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [policies] Evaluate -> DEBU 1991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [policies] Evaluate -> DEBU 1992 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func1 -> DEBU 1993 0xc0035ac4b0 gate 1556789257154617400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 1994 0xc0035ac4b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 1995 0xc0035ac4b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 1996 0xc0035ac4b0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [msp.identity] Verify -> DEBU 1997 Verify: digest = 00000000 7e 36 2b 74 13 45 8f 14 60 07 ed 72 c2 22 cc 88 |~6+t.E..`..r."..| +peer0.org1.example.com | 00000010 aa 38 9c a9 71 2d 5a 2c 15 9d 0f 24 9c c4 67 1a |.8..q-Z,...$..g.|" +peer0.org1.example.com | "2019-05-02 09:27:37.154 UTC [msp.identity] Verify -> DEBU 1998 Verify: sig = 00000000 30 45 02 21 00 9c 1c 0d 70 36 3d 31 a9 cb 15 3b |0E.!....p6=1...;| +peer0.org1.example.com | 00000010 f4 55 60 0a c1 d0 74 20 11 63 79 e5 a6 2b 56 a6 |.U`...t .cy..+V.| +peer0.org1.example.com | 00000020 5d ed 9a 0e 4c 02 20 73 25 81 4a 88 30 c3 45 25 |]...L. s%.J.0.E%| +peer0.org1.example.com | 00000030 a6 38 d3 6f 43 8d 41 44 d2 06 f3 be b5 31 12 2a |.8.oC.AD.....1.*| +peer0.org1.example.com | 00000040 6b fb cf fb ee d8 97 |k......|" +peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [cauthdsl] func2 -> DEBU 1999 0xc0035ac4b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [cauthdsl] func1 -> DEBU 199a 0xc0035ac4b0 gate 1556789257154617400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [gossip.discovery] handleAliveMessage -> DEBU 199f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [gossip.discovery] handleAliveMessage -> DEBU 19a0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.155 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19a1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:37.156 UTC [msp.identity] Verify -> DEBU 19a2 Verify: digest = 00000000 3f 8b 8c 94 3e 52 56 4b a5 07 51 1e 9f c1 a8 76 |?...>RVK..Q....v| +peer0.org1.example.com | 00000010 06 65 f8 45 39 c3 5b 0a 98 29 bc 6d b8 29 05 5e |.e.E9.[..).m.).^|" +peer0.org1.example.com | "2019-05-02 09:27:37.156 UTC [msp.identity] Verify -> DEBU 19a3 Verify: sig = 00000000 30 44 02 20 15 c8 47 f0 8d 33 9d 8f 28 c0 7b 7c |0D. ..G..3..(.{|| +peer0.org1.example.com | 00000010 7e 34 6c 16 c8 84 30 67 fd 47 e7 ff be c8 1b 97 |~4l...0g.G......| +peer0.org1.example.com | 00000020 7f d5 63 d0 02 20 0d bc 23 12 ae 36 52 86 fd d3 |..c.. ..#..6R...| +peer0.org1.example.com | 00000030 38 21 8f c3 39 61 b6 1a fe b2 34 e2 95 1e 56 dc |8!..9a....4...V.| +peer0.org1.example.com | 00000040 55 8c 8c 5e 88 d8 |U..^..|" +peer0.org1.example.com | "2019-05-02 09:27:37.167 UTC [gossip.comm] func1 -> DEBU 19a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17964909712877384058 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.167 UTC [gossip.comm] func1 -> DEBU 19a5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.167 UTC [gossip.gossip] handleMessage -> DEBU 19a6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17964909712877384058 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.168 UTC [gossip.pull] HandleMessage -> DEBU 19a7 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17964909712877384058 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.169 UTC [gossip.gossip] handleMessage -> DEBU 19a8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.170 UTC [gossip.gossip] handleMessage -> DEBU 19a9 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 19aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.172 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ab Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:37.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ac updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 " +peer0.org1.example.com | "2019-05-02 09:27:37.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ad Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 " +peer0.org1.example.com | "2019-05-02 09:27:37.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ae Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 19af Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 19b0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19b1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19b3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [msp.identity] Verify -> DEBU 19b4 Verify: digest = 00000000 ef 7a 3b c1 c3 33 1d 87 17 58 d2 e0 bd 69 9a 53 |.z;..3...X...i.S| +peer0.org1.example.com | 00000010 07 dd 18 0b 35 be e6 d3 a2 b8 17 af 4c de 8d b7 |....5.......L...|" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [msp.identity] Verify -> DEBU 19b5 Verify: sig = 00000000 30 44 02 20 66 a7 c6 35 cd 70 66 a7 71 74 78 6d |0D. f..5.pf.qtxm| +peer0.org1.example.com | 00000010 80 73 a8 61 43 9c 2c 1c 28 13 e9 2a 16 03 02 14 |.s.aC.,.(..*....| +peer0.org1.example.com | 00000020 53 65 aa 05 02 20 4e bd b8 d6 83 1a 13 94 0a 3b |Se... N........;| +peer0.org1.example.com | 00000030 dc 72 b0 a7 64 5b d9 01 57 bf b8 76 a9 97 9b 3f |.r..d[..W..v...?| +peer0.org1.example.com | 00000040 42 a9 b1 78 48 60 |B..xH`|" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 19b6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] isSentByMe -> DEBU 19b7 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 19b8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19b9 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19ba Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19bb Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17288215980809784081 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.pull] HandleMessage -> DEBU 19bc GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17288215980809784081 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19bd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19be Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.pull] HandleMessage -> DEBU 19bf GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.pull] SendDigest -> DEBU 19c0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19c1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19c2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [msp.identity] Verify -> DEBU 19c3 Verify: digest = 00000000 3f 8b 8c 94 3e 52 56 4b a5 07 51 1e 9f c1 a8 76 |?...>RVK..Q....v| +peer0.org1.example.com | 00000010 06 65 f8 45 39 c3 5b 0a 98 29 bc 6d b8 29 05 5e |.e.E9.[..).m.).^|" +peer0.org1.example.com | "2019-05-02 09:27:37.175 UTC [msp.identity] Verify -> DEBU 19c4 Verify: sig = 00000000 30 44 02 20 15 c8 47 f0 8d 33 9d 8f 28 c0 7b 7c |0D. ..G..3..(.{|| +peer0.org1.example.com | 00000010 7e 34 6c 16 c8 84 30 67 fd 47 e7 ff be c8 1b 97 |~4l...0g.G......| +peer0.org1.example.com | 00000020 7f d5 63 d0 02 20 0d bc 23 12 ae 36 52 86 fd d3 |..c.. ..#..6R...| +peer0.org1.example.com | 00000030 38 21 8f c3 39 61 b6 1a fe b2 34 e2 95 1e 56 dc |8!..9a....4...V.| +peer0.org1.example.com | 00000040 55 8c 8c 5e 88 d8 |U..^..|" +peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19c7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.gossip] handleMessage -> DEBU 19c8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.gossip] handleMessage -> DEBU 19c9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.176 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19cb Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:37.177 UTC [msp.identity] Verify -> DEBU 19cc Verify: digest = 00000000 3f 8b 8c 94 3e 52 56 4b a5 07 51 1e 9f c1 a8 76 |?...>RVK..Q....v| +peer0.org1.example.com | 00000010 06 65 f8 45 39 c3 5b 0a 98 29 bc 6d b8 29 05 5e |.e.E9.[..).m.).^|" +peer0.org1.example.com | "2019-05-02 09:27:37.177 UTC [msp.identity] Verify -> DEBU 19cd Verify: sig = 00000000 30 44 02 20 15 c8 47 f0 8d 33 9d 8f 28 c0 7b 7c |0D. ..G..3..(.{|| +peer0.org1.example.com | 00000010 7e 34 6c 16 c8 84 30 67 fd 47 e7 ff be c8 1b 97 |~4l...0g.G......| +peer0.org1.example.com | 00000020 7f d5 63 d0 02 20 0d bc 23 12 ae 36 52 86 fd d3 |..c.. ..#..6R...| +peer0.org1.example.com | 00000030 38 21 8f c3 39 61 b6 1a fe b2 34 e2 95 1e 56 dc |8!..9a....4...V.| +peer0.org1.example.com | 00000040 55 8c 8c 5e 88 d8 |U..^..|" +peer0.org1.example.com | "2019-05-02 09:27:37.178 UTC [msp.identity] Verify -> DEBU 19ce Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:37.178 UTC [msp.identity] Verify -> DEBU 19cf Verify: sig = 00000000 30 45 02 21 00 dc 48 35 01 4d 94 b3 90 84 da ab |0E.!..H5.M......| +peer0.org1.example.com | 00000010 3b 00 de 0e 9c d6 81 65 5e 5f 22 43 35 d1 17 f5 |;......e^_"C5...| +peer0.org1.example.com | 00000020 48 d6 aa ad 17 02 20 52 39 9e 4b 78 07 c5 9c e9 |H..... R9.Kx....| +peer0.org1.example.com | 00000030 98 b4 94 83 cc d3 06 8f cb 70 9b 33 69 3f 05 72 |.........p.3i?.r| +peer0.org1.example.com | 00000040 b4 41 46 6b c6 47 ca |.AFk.G.|" +peer0.org1.example.com | "2019-05-02 09:27:37.178 UTC [gossip.discovery] handleAliveMessage -> DEBU 19d0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.discovery] handleAliveMessage -> DEBU 19d1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.discovery] sendMemResponse -> DEBU 19d2 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [msp] DeserializeIdentity -> DEBU 19d3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [msp] DeserializeIdentity -> DEBU 19d4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.comm] Send -> DEBU 19d5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.discovery] sendMemResponse -> DEBU 19d6 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.comm] sendToEndpoint -> DEBU 19d7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.comm] sendToEndpoint -> DEBU 19d8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.179 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19d9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.182 UTC [gossip.gossip] handleMessage -> DEBU 19da Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.183 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19dc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:37.184 UTC [msp.identity] Verify -> DEBU 19dd Verify: digest = 00000000 ef 7a 3b c1 c3 33 1d 87 17 58 d2 e0 bd 69 9a 53 |.z;..3...X...i.S| +peer0.org1.example.com | 00000010 07 dd 18 0b 35 be e6 d3 a2 b8 17 af 4c de 8d b7 |....5.......L...|" +peer0.org1.example.com | "2019-05-02 09:27:37.185 UTC [msp.identity] Verify -> DEBU 19de Verify: sig = 00000000 30 44 02 20 66 a7 c6 35 cd 70 66 a7 71 74 78 6d |0D. f..5.pf.qtxm| +peer0.org1.example.com | 00000010 80 73 a8 61 43 9c 2c 1c 28 13 e9 2a 16 03 02 14 |.s.aC.,.(..*....| +peer0.org1.example.com | 00000020 53 65 aa 05 02 20 4e bd b8 d6 83 1a 13 94 0a 3b |Se... N........;| +peer0.org1.example.com | 00000030 dc 72 b0 a7 64 5b d9 01 57 bf b8 76 a9 97 9b 3f |.r..d[..W..v...?| +peer0.org1.example.com | 00000040 42 a9 b1 78 48 60 |B..xH`|" +peer0.org1.example.com | "2019-05-02 09:27:37.188 UTC [msp.identity] Verify -> DEBU 19df Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:37.188 UTC [msp.identity] Verify -> DEBU 19e0 Verify: sig = 00000000 30 44 02 20 03 ce cf 3f 7f 93 0c a1 a2 a6 0f bc |0D. ...?........| +peer0.org1.example.com | 00000010 be 27 78 ca 90 05 e8 98 88 4f 38 94 58 de ac ca |.'x......O8.X...| +peer0.org1.example.com | 00000020 3d a6 0d 08 02 20 41 e8 8b ca 4e 1a 73 69 b1 2e |=.... A...N.si..| +peer0.org1.example.com | 00000030 a1 d2 0b 22 af 45 fd 97 db 4b 45 78 85 e5 ba 5a |...".E...KEx...Z| +peer0.org1.example.com | 00000040 8d 90 d6 4a 60 28 |...J`(|" +peer0.org1.example.com | "2019-05-02 09:27:37.189 UTC [gossip.discovery] handleAliveMessage -> DEBU 19e1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.189 UTC [gossip.discovery] isSentByMe -> DEBU 19e2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.189 UTC [gossip.discovery] handleAliveMessage -> DEBU 19e3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19e4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.204 UTC [gossip.gossip] handleMessage -> DEBU 19e5 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.204 UTC [gossip.pull] HandleMessage -> DEBU 19e6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.204 UTC [msp] DeserializeIdentity -> DEBU 19e7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.205 UTC [msp] DeserializeIdentity -> DEBU 19e8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.205 UTC [msp] DeserializeIdentity -> DEBU 19e9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.206 UTC [msp] DeserializeIdentity -> DEBU 19ea Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.206 UTC [msp] DeserializeIdentity -> DEBU 19eb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.206 UTC [msp] DeserializeIdentity -> DEBU 19ec Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.206 UTC [gossip.pull] SendDigest -> DEBU 19ed Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:37.207 UTC [gossip.gossip] handleMessage -> DEBU 19ee Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.211 UTC [gossip.gossip] handleMessage -> DEBU 19ef Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.217 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19f0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.217 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19f1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:37.218 UTC [msp] DeserializeIdentity -> DEBU 19f2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.219 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:37.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19f4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19f5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:37.223 UTC [policies] Evaluate -> DEBU 19f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.225 UTC [policies] Evaluate -> DEBU 19f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:37.225 UTC [policies] Evaluate -> DEBU 19f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func1 -> DEBU 19fa 0xc0036a0b10 gate 1556789257225985100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fb 0xc0036a0b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fc 0xc0036a0b10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fd 0xc0036a0b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fe 0xc0036a0b10 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func1 -> DEBU 19ff 0xc0036a0b10 gate 1556789257225985100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [policies] Evaluate -> DEBU 1a00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [policies] Evaluate -> DEBU 1a01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [policies] Evaluate -> DEBU 1a02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.226 UTC [cauthdsl] func1 -> DEBU 1a03 0xc0036a1350 gate 1556789257226546100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.227 UTC [cauthdsl] func2 -> DEBU 1a04 0xc0036a1350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [cauthdsl] func2 -> DEBU 1a05 0xc0036a1350 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [cauthdsl] func2 -> DEBU 1a06 0xc0036a1350 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [msp.identity] Verify -> DEBU 1a07 Verify: digest = 00000000 4a 51 f9 d3 1d 86 6c cc 00 8a 03 00 8c 20 bb 03 |JQ....l...... ..| +peer0.org1.example.com | 00000010 56 fc b2 87 56 45 db 1c ea 71 fa fb 76 b6 10 bd |V...VE...q..v...|" +peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [msp.identity] Verify -> DEBU 1a08 Verify: sig = 00000000 30 45 02 21 00 be 43 3e be c0 b7 4f 20 bb 4a 35 |0E.!..C>...O .J5| +peer0.org1.example.com | 00000010 f8 12 79 0c 5b ce 3c a9 bf a4 49 73 50 b5 38 42 |..y.[.<...IsP.8B| +peer0.org1.example.com | 00000020 8f 37 f4 ce 57 02 20 5d d2 7b 94 28 e4 d1 9a aa |.7..W. ].{.(....| +peer0.org1.example.com | 00000030 1a 4d df 0a 9b e2 a8 81 e7 f6 d0 c0 4d 76 b2 0a |.M..........Mv..| +peer0.org1.example.com | 00000040 11 d2 26 c1 d6 2b 9c |..&..+.|" +peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [cauthdsl] func2 -> DEBU 1a09 0xc0036a1350 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [cauthdsl] func1 -> DEBU 1a0a 0xc0036a1350 gate 1556789257226546100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [policies] Evaluate -> DEBU 1a0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.228 UTC [policies] Evaluate -> DEBU 1a0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.229 UTC [policies] Evaluate -> DEBU 1a0d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.229 UTC [policies] Evaluate -> DEBU 1a0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.231 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a0f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.213 UTC [gossip.gossip] handleMessage -> DEBU 19f7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.231 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a10 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a11 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 " +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a12 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 " +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a13 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a14 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a15 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] sendMemResponse -> DEBU 1a16 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [msp] DeserializeIdentity -> DEBU 1a17 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [msp] DeserializeIdentity -> DEBU 1a18 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [msp] DeserializeIdentity -> DEBU 1a19 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.comm] Send -> DEBU 1a1a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.234 UTC [gossip.discovery] sendMemResponse -> DEBU 1a1b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:37.235 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.235 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.232 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a1e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.342 UTC [gossip.election] waitForInterrupt -> DEBU 1a1f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.342 UTC [gossip.election] IsLeader -> DEBU 1a20 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:27:37.342 UTC [msp.identity] Sign -> DEBU 1a21 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510051801 " +peer0.org1.example.com | "2019-05-02 09:27:37.343 UTC [msp.identity] Sign -> DEBU 1a22 Sign: digest: 810E30A8E997A8A9AA9C43723F5CC5F64CA5EFB1EE6590C4CC57E5051125EA97 " +peer0.org1.example.com | "2019-05-02 09:27:37.343 UTC [gossip.election] waitForInterrupt -> DEBU 1a23 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:37.346 UTC [msp] DeserializeIdentity -> DEBU 1a24 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.346 UTC [msp] DeserializeIdentity -> DEBU 1a25 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a26 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a27 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [gossip.comm] Send -> DEBU 1a28 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a29 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a2a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:37.347 UTC [gossip.comm] sendToEndpoint -> DEBU 1a2b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:37.348 UTC [gossip.comm] sendToEndpoint -> DEBU 1a2c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:37.509 UTC [endorser] ProcessProposal -> DEBU 1a2d Entering: request from 172.18.0.8:57326" +peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [protoutils] ValidateProposalMessage -> DEBU 1a2e ValidateProposalMessage starts for signed proposal 0xc002ca5900" +peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [protoutils] validateChannelHeader -> DEBU 1a2f validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a30 begin" +peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [msp] GetManagerForChain -> DEBU 1a31 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a32 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a33 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [msp.identity] Verify -> DEBU 1a34 Verify: digest = 00000000 e9 a8 68 b3 ba 7b 95 20 c7 1b 49 a8 64 ae 88 09 |..h..{. ..I.d...| +peer0.org1.example.com | 00000010 ee d8 b7 fc d0 3f 20 4f 5c 3a 86 6c 51 3b bf ea |.....? O\:.lQ;..|" +peer0.org1.example.com | "2019-05-02 09:27:37.510 UTC [msp.identity] Verify -> DEBU 1a35 Verify: sig = 00000000 30 45 02 21 00 de 51 2a 63 f5 8e 51 08 0b 32 1e |0E.!..Q*c..Q..2.| +peer0.org1.example.com | 00000010 82 b2 30 d6 a3 ca ca 51 22 a4 39 3f 54 1f bb 9a |..0....Q".9?T...| +peer0.org1.example.com | 00000020 2e 73 6b 51 00 02 20 70 30 2c b9 76 87 b6 1c db |.skQ.. p0,.v....| +peer0.org1.example.com | 00000030 8c d8 47 40 bc 39 29 92 e8 b0 52 3a 8a a1 f3 4c |..G@.9)...R:...L| +peer0.org1.example.com | 00000040 74 f2 9d 56 35 fe a7 |t..V5..|" +peer0.org1.example.com | "2019-05-02 09:27:37.511 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a36 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:37.511 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a37 validateChaincodeProposalMessage starts for proposal 0xc002f2ea80, header 0xc002ca5d10" +peer0.org1.example.com | "2019-05-02 09:27:37.511 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a38 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:37.511 UTC [endorser] preProcess -> DEBU 1a39 [businesschannel][2a51a49a] processing txid: 2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff" +peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1a3a retrieveTransactionByID() - txId = [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]" +peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1a3b constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1a3c constructing new tx simulator txid = [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]" +peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [endorser] SimulateProposal -> DEBU 1a3d [businesschannel][2a51a49a] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [endorser] callChaincode -> INFO 1a3e [businesschannel][2a51a49a] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:37.512 UTC [chaincode] Execute -> DEBU 1a3f Entry" +peer0.org1.example.com | "2019-05-02 09:27:37.513 UTC [aclmgmt] CheckACL -> DEBU 1a40 acl policy /Channel/Application/Readers found in config for resource _lifecycle/QueryChaincodeDefinition" +peer0.org1.example.com | "2019-05-02 09:27:37.513 UTC [aclmgmt] CheckACL -> DEBU 1a41 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-05-02 09:27:37.513 UTC [policies] Evaluate -> DEBU 1a42 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.513 UTC [policies] Evaluate -> DEBU 1a43 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:37.513 UTC [policies] Evaluate -> DEBU 1a44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [cauthdsl] func1 -> DEBU 1a45 0xc003222f10 gate 1556789257514105800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [cauthdsl] func2 -> DEBU 1a46 0xc003222f10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [cauthdsl] func2 -> DEBU 1a47 0xc003222f10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [cauthdsl] func2 -> DEBU 1a48 0xc003222f10 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [msp.identity] Verify -> DEBU 1a49 Verify: digest = 00000000 e9 a8 68 b3 ba 7b 95 20 c7 1b 49 a8 64 ae 88 09 |..h..{. ..I.d...| +peer0.org1.example.com | 00000010 ee d8 b7 fc d0 3f 20 4f 5c 3a 86 6c 51 3b bf ea |.....? O\:.lQ;..|" +peer0.org1.example.com | "2019-05-02 09:27:37.514 UTC [msp.identity] Verify -> DEBU 1a4a Verify: sig = 00000000 30 45 02 21 00 de 51 2a 63 f5 8e 51 08 0b 32 1e |0E.!..Q*c..Q..2.| +peer0.org1.example.com | 00000010 82 b2 30 d6 a3 ca ca 51 22 a4 39 3f 54 1f bb 9a |..0....Q".9?T...| +peer0.org1.example.com | 00000020 2e 73 6b 51 00 02 20 70 30 2c b9 76 87 b6 1c db |.skQ.. p0,.v....| +peer0.org1.example.com | 00000030 8c d8 47 40 bc 39 29 92 e8 b0 52 3a 8a a1 f3 4c |..G@.9)...R:...L| +peer0.org1.example.com | 00000040 74 f2 9d 56 35 fe a7 |t..V5..|" +peer0.org1.example.com | "2019-05-02 09:27:37.515 UTC [cauthdsl] func2 -> DEBU 1a4b 0xc003222f10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:37.515 UTC [cauthdsl] func1 -> DEBU 1a4c 0xc003222f10 gate 1556789257514105800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:37.515 UTC [policies] Evaluate -> DEBU 1a4d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.515 UTC [policies] Evaluate -> DEBU 1a4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.515 UTC [policies] Evaluate -> DEBU 1a4f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.516 UTC [policies] Evaluate -> DEBU 1a50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:37.516 UTC [lifecycle] QueryChaincodeDefinition -> DEBU 1a51 received invocation of QueryChaincodeDefinition on channel 'businesschannel' for chaincode 'exp02'" +peer0.org1.example.com | "2019-05-02 09:27:37.516 UTC [chaincode] handleMessage -> DEBU 1a52 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:37.516 UTC [chaincode] HandleTransaction -> DEBU 1a53 [2a51a49a] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:37.517 UTC [chaincode] HandleGetState -> DEBU 1a54 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:37.517 UTC [stateleveldb] GetState -> DEBU 1a55 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-05-02 09:27:37.517 UTC [chaincode] HandleTransaction -> DEBU 1a56 [2a51a49a] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:37.517 UTC [chaincode] handleMessage -> DEBU 1a57 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [chaincode] HandleTransaction -> DEBU 1a58 [2a51a49a] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [chaincode] HandleGetState -> DEBU 1a59 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [stateleveldb] GetState -> DEBU 1a5a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [chaincode] HandleTransaction -> DEBU 1a5b [2a51a49a] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [chaincode] handleMessage -> DEBU 1a5c [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:37.518 UTC [chaincode] HandleTransaction -> DEBU 1a5d [2a51a49a] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:37.519 UTC [chaincode] HandleGetState -> DEBU 1a5e [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/EndorsementInfo, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:37.519 UTC [stateleveldb] GetState -> DEBU 1a5f GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +peer0.org1.example.com | "2019-05-02 09:27:37.519 UTC [chaincode] HandleTransaction -> DEBU 1a60 [2a51a49a] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:37.520 UTC [chaincode] handleMessage -> DEBU 1a61 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:37.520 UTC [chaincode] HandleTransaction -> DEBU 1a62 [2a51a49a] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:37.520 UTC [chaincode] HandleGetState -> DEBU 1a63 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/ValidationInfo, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:37.520 UTC [stateleveldb] GetState -> DEBU 1a64 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +peer0.org1.example.com | "2019-05-02 09:27:37.520 UTC [chaincode] HandleTransaction -> DEBU 1a65 [2a51a49a] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:37.521 UTC [chaincode] handleMessage -> DEBU 1a66 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:37.521 UTC [chaincode] HandleTransaction -> DEBU 1a67 [2a51a49a] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:37.521 UTC [chaincode] HandleGetState -> DEBU 1a68 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Collections, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:37.522 UTC [stateleveldb] GetState -> DEBU 1a69 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +peer0.org1.example.com | "2019-05-02 09:27:37.522 UTC [chaincode] HandleTransaction -> DEBU 1a6a [2a51a49a] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:37.522 UTC [lifecycle] QueryChaincodeDefinition -> INFO 1a6b successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org1.example.com | "2019-05-02 09:27:37.523 UTC [chaincode] handleMessage -> DEBU 1a6c [2a51a49a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:37.523 UTC [chaincode] Notify -> DEBU 1a6d [2a51a49a] notifying Txid:2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:37.524 UTC [chaincode] Execute -> DEBU 1a6e Exit" +peer0.org1.example.com | "2019-05-02 09:27:37.524 UTC [endorser] callChaincode -> INFO 1a6f [businesschannel][2a51a49a] Exit chaincode: name:"_lifecycle" (12ms)" +peer0.org1.example.com | "2019-05-02 09:27:37.524 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1a70 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:37.525 UTC [lockbasedtxmgr] Done -> DEBU 1a71 Done with transaction simulation / query execution [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]" +peer0.org1.example.com | "2019-05-02 09:27:37.525 UTC [endorser] SimulateProposal -> DEBU 1a72 [businesschannel][2a51a49a] Exit" +peer0.org1.example.com | "2019-05-02 09:27:37.525 UTC [endorser] endorseProposal -> DEBU 1a73 [businesschannel][2a51a49a] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-05-02 09:27:37.525 UTC [endorser] endorseProposal -> DEBU 1a74 [businesschannel][2a51a49a] escc for chaincode name:"_lifecycle" is escc" +peer0.org1.example.com | "2019-05-02 09:27:37.526 UTC [endorser] EndorseWithPlugin -> DEBU 1a75 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-05-02 09:27:37.526 UTC [msp.identity] Sign -> DEBU 1a76 Sign: plaintext: 0A20B348ED120D53BACF7A3C86E9718B...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:37.526 UTC [msp.identity] Sign -> DEBU 1a77 Sign: digest: C553EED6EE12E50E703B964FE3C4765A5066983801BEF1DB8B440E28787F0154 " +peer0.org1.example.com | "2019-05-02 09:27:37.527 UTC [endorser] EndorseWithPlugin -> DEBU 1a78 Exiting {plugin: escc, channel: businesschannel, tx: 2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-05-02 09:27:37.527 UTC [endorser] endorseProposal -> DEBU 1a79 [businesschannel][2a51a49a] Exit" +peer0.org1.example.com | "2019-05-02 09:27:37.527 UTC [lockbasedtxmgr] Done -> DEBU 1a7a Done with transaction simulation / query execution [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]" +peer0.org1.example.com | "2019-05-02 09:27:37.527 UTC [endorser] func1 -> DEBU 1a7b Exit: request from 172.18.0.8:57326" +peer0.org1.example.com | "2019-05-02 09:27:37.528 UTC [comm.grpc.server] 1 -> INFO 1a7c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57326 grpc.code=OK grpc.call_duration=18.6284ms +peer0.org1.example.com | "2019-05-02 09:27:37.531 UTC [grpc] infof -> DEBU 1a7d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:37.531 UTC [grpc] warningf -> DEBU 1a7e transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.8:57326: read: connection reset by peer" +peer0.org1.example.com | "2019-05-02 09:27:37.531 UTC [grpc] infof -> DEBU 1a7f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:38.274 UTC [endorser] ProcessProposal -> DEBU 1a80 Entering: request from 172.18.0.8:57334" +peer0.org1.example.com | "2019-05-02 09:27:38.274 UTC [protoutils] ValidateProposalMessage -> DEBU 1a81 ValidateProposalMessage starts for signed proposal 0xc0036875e0" +peer0.org1.example.com | "2019-05-02 09:27:38.274 UTC [protoutils] validateChannelHeader -> DEBU 1a82 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:38.274 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a83 begin" +peer0.org1.example.com | "2019-05-02 09:27:38.274 UTC [msp] GetManagerForChain -> DEBU 1a84 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a85 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a86 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [msp.identity] Verify -> DEBU 1a87 Verify: digest = 00000000 93 da 45 8a 61 0c ee c7 d7 82 fa 30 30 e3 3e 12 |..E.a......00.>.| +peer0.org1.example.com | 00000010 7d 3d 79 a4 c0 2c 71 fe 1d 84 b6 b5 89 c0 5b 0d |}=y..,q.......[.|" +peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [msp.identity] Verify -> DEBU 1a88 Verify: sig = 00000000 30 44 02 20 57 a5 c7 ae 81 47 5f 04 e2 a0 49 22 |0D. W....G_...I"| +peer0.org1.example.com | 00000010 7a d4 57 cd 67 01 f9 ae 23 bf 4b 01 63 cb de 3c |z.W.g...#.K.c..<| +peer0.org1.example.com | 00000020 d1 c0 2b a2 02 20 04 be 2a 62 2a 04 5c a4 e2 03 |..+.. ..*b*.\...| +peer0.org1.example.com | 00000030 d0 fd fd 0d 93 d9 63 59 05 e1 a6 5b ef 0e fc 8c |......cY...[....| +peer0.org1.example.com | 00000040 7f 15 3e 12 d2 13 |..>...|" +peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a89 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:38.275 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a8a validateChaincodeProposalMessage starts for proposal 0xc002e6ce00, header 0xc0036879f0" +peer0.org1.example.com | "2019-05-02 09:27:38.276 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a8b validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:38.276 UTC [endorser] preProcess -> DEBU 1a8c [businesschannel][592858be] processing txid: 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9" +peer0.org1.example.com | "2019-05-02 09:27:38.276 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1a8d retrieveTransactionByID() - txId = [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]" +peer0.org1.example.com | "2019-05-02 09:27:38.277 UTC [aclmgmt] CheckACL -> DEBU 1a8e acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-05-02 09:27:38.277 UTC [aclmgmt] CheckACL -> DEBU 1a8f acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-05-02 09:27:38.278 UTC [policies] Evaluate -> DEBU 1a90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:38.278 UTC [policies] Evaluate -> DEBU 1a91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:38.278 UTC [policies] Evaluate -> DEBU 1a92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:38.279 UTC [cauthdsl] func1 -> DEBU 1a93 0xc00265c340 gate 1556789258278918800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:38.279 UTC [cauthdsl] func2 -> DEBU 1a94 0xc00265c340 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:38.279 UTC [cauthdsl] func2 -> DEBU 1a95 0xc00265c340 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:38.279 UTC [cauthdsl] func2 -> DEBU 1a96 0xc00265c340 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:38.280 UTC [msp.identity] Verify -> DEBU 1a97 Verify: digest = 00000000 93 da 45 8a 61 0c ee c7 d7 82 fa 30 30 e3 3e 12 |..E.a......00.>.| +peer0.org1.example.com | 00000010 7d 3d 79 a4 c0 2c 71 fe 1d 84 b6 b5 89 c0 5b 0d |}=y..,q.......[.|" +peer0.org1.example.com | "2019-05-02 09:27:38.280 UTC [msp.identity] Verify -> DEBU 1a98 Verify: sig = 00000000 30 44 02 20 57 a5 c7 ae 81 47 5f 04 e2 a0 49 22 |0D. W....G_...I"| +peer0.org1.example.com | 00000010 7a d4 57 cd 67 01 f9 ae 23 bf 4b 01 63 cb de 3c |z.W.g...#.K.c..<| +peer0.org1.example.com | 00000020 d1 c0 2b a2 02 20 04 be 2a 62 2a 04 5c a4 e2 03 |..+.. ..*b*.\...| +peer0.org1.example.com | 00000030 d0 fd fd 0d 93 d9 63 59 05 e1 a6 5b ef 0e fc 8c |......cY...[....| +peer0.org1.example.com | 00000040 7f 15 3e 12 d2 13 |..>...|" +peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [cauthdsl] func2 -> DEBU 1a99 0xc00265c340 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [cauthdsl] func1 -> DEBU 1a9a 0xc00265c340 gate 1556789258278918800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9b Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9d Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:38.282 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1a9f constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:38.282 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1aa0 constructing new tx simulator txid = [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]" +peer0.org1.example.com | "2019-05-02 09:27:38.282 UTC [endorser] SimulateProposal -> DEBU 1aa1 [businesschannel][592858be] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:38.283 UTC [stateleveldb] GetState -> DEBU 1aa2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:38.283 UTC [endorser] callChaincode -> INFO 1aa3 [businesschannel][592858be] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:38.284 UTC [stateleveldb] GetState -> DEBU 1aa4 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:38.285 UTC [chaincode] LaunchConfig -> DEBU 1aa5 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-05-02 09:27:38.285 UTC [chaincode] Start -> DEBU 1aa6 start container: exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-05-02 09:27:38.285 UTC [chaincode] Start -> DEBU 1aa7 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-05-02 09:27:38.285 UTC [chaincode] Start -> DEBU 1aa8 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-05-02 09:27:38.287 UTC [container] lockContainer -> DEBU 1aa9 waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +peer0.org1.example.com | "2019-05-02 09:27:38.287 UTC [container] lockContainer -> DEBU 1aaa got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +peer0.org1.example.com | "2019-05-02 09:27:38.287 UTC [dockercontroller] stopInternal -> DEBU 1aab stopping container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-05-02 09:27:38.291 UTC [dockercontroller] stopInternal -> DEBU 1aac stop container result" error="Container not running: peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-05-02 09:27:38.291 UTC [dockercontroller] stopInternal -> DEBU 1aad killing container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-05-02 09:27:38.292 UTC [dockercontroller] stopInternal -> DEBU 1aae kill container result" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error="Container not running: peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-05-02 09:27:38.292 UTC [dockercontroller] stopInternal -> DEBU 1aaf removing container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-05-02 09:27:38.304 UTC [dockercontroller] stopInternal -> DEBU 1ab0 remove container result" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error=null +peer0.org1.example.com | "2019-05-02 09:27:38.304 UTC [dockercontroller] createContainer -> DEBU 1ab1 create container" imageID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-4acdefc66bb2a0c444e561d45c2067f024fc1e2a95e1b1ce3b104d2106958d25 containerID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-05-02 09:27:38.442 UTC [dockercontroller] createContainer -> DEBU 1ab2 created container" imageID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-4acdefc66bb2a0c444e561d45c2067f024fc1e2a95e1b1ce3b104d2106958d25 containerID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [gossip.comm] func1 -> DEBU 1ab3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [gossip.gossip] handleMessage -> DEBU 1ab4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [gossip.gossip] handleMessage -> DEBU 1ab5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ab6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ab7 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:38.844 UTC [msp] DeserializeIdentity -> DEBU 1ab8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ab9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aba Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1abb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1abc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1abd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1abe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func1 -> DEBU 1abf 0xc003a4e2b0 gate 1556789258845498500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac0 0xc003a4e2b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac1 0xc003a4e2b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc003a4e2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [gossip.gossip] handleMessage -> DEBU 1ac3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac4 0xc003a4e2b0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func1 -> DEBU 1ac5 0xc003a4e2b0 gate 1556789258845498500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1ac6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1ac7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1ac8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func1 -> DEBU 1ac9 0xc003a4eaf0 gate 1556789258845861800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1aca 0xc003a4eaf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1acb 0xc003a4eaf0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1acc 0xc003a4eaf0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [msp.identity] Verify -> DEBU 1acd Verify: digest = 00000000 b9 e8 c8 18 6f 9d 3e 6d e4 db 40 ad 21 56 4b 3c |....o.>m..@.!VK<| +peer0.org1.example.com | 00000010 a4 86 b0 50 90 b0 e7 94 fb 55 05 d0 63 1f e9 36 |...P.....U..c..6|" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [msp.identity] Verify -> DEBU 1ace Verify: sig = 00000000 30 45 02 21 00 fd f3 f0 ec c2 b8 7f 14 9e 03 74 |0E.!...........t| +peer0.org1.example.com | 00000010 04 a9 1c e0 ed 3e a1 2f f3 8e 3e 28 fa 41 c3 51 |.....>./..>(.A.Q| +peer0.org1.example.com | 00000020 76 a2 7b bc c1 02 20 28 7d 04 5a 2c 0e f9 98 8c |v.{... (}.Z,....| +peer0.org1.example.com | 00000030 dc b5 9e 1d 1d b7 0c e3 91 cb b6 35 45 44 89 0d |...........5ED..| +peer0.org1.example.com | 00000040 54 60 40 9c ab 44 85 |T`@..D.|" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [cauthdsl] func2 -> DEBU 1acf 0xc003a4eaf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc003a4eaf0 gate 1556789258845861800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ad5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad7 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 " +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 " +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ada Exiting" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 1adb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:38.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1adc Exiting" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [gossip.gossip] handleMessage -> DEBU 1add Exiting" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ade Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1adf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [gossip.comm] Send -> DEBU 1ae5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:38.848 UTC [gossip.comm] Send -> DEBU 1ae7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1aea Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1aeb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:38.849 UTC [gossip.gossip] handleMessage -> DEBU 1aec Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:38.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:38.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aee Exiting" +peer0.org1.example.com | "2019-05-02 09:27:38.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:38.850 UTC [gossip.gossip] handleMessage -> DEBU 1af0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:38.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1af1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151017 " +peer0.org1.example.com | "2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af3 Sign: digest: 5435123D8FCA2ABD2119CACCF8DB800AFA6A0C6422688B3D59B6B1473F5FC6A3 " +peer0.org1.example.com | "2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:39.074 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1af6 Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:39.083 UTC [msp] DeserializeIdentity -> DEBU 1af7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.084 UTC [msp] DeserializeIdentity -> DEBU 1af8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.084 UTC [gossip.comm] Send -> DEBU 1af9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:39.084 UTC [msp] DeserializeIdentity -> DEBU 1afa Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] Send -> DEBU 1afb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1afc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [msp] DeserializeIdentity -> DEBU 1afd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1afe Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] Send -> DEBU 1aff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b00 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b01 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b02 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.125 UTC [gossip.gossip] handleMessage -> DEBU 1b04 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.125 UTC [gossip.gossip] handleMessage -> DEBU 1b05 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.126 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b06 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.126 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b07 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:39.126 UTC [msp.identity] Verify -> DEBU 1b08 Verify: digest = 00000000 3a 3f 38 7f fe 97 0e 19 22 b4 02 42 a6 01 d3 41 |:?8....."..B...A| +peer0.org1.example.com | 00000010 87 29 96 17 73 49 a6 63 72 48 ff 18 de d1 e7 21 |.)..sI.crH.....!|" +peer0.org1.example.com | "2019-05-02 09:27:39.127 UTC [msp.identity] Verify -> DEBU 1b09 Verify: sig = 00000000 30 45 02 21 00 f0 d1 b4 40 7a 46 03 5c 48 ac e2 |0E.!....@zF.\H..| +peer0.org1.example.com | 00000010 90 b2 ef dd f6 2a d4 83 76 77 a4 f8 95 d6 0a bd |.....*..vw......| +peer0.org1.example.com | 00000020 51 43 ec 5f 21 02 20 11 5c ab d8 ad 7c f7 fe 29 |QC._!. .\...|..)| +peer0.org1.example.com | 00000030 66 01 03 a7 3f a8 da 1f 7e 12 31 09 ed e3 ef 80 |f...?...~.1.....| +peer0.org1.example.com | 00000040 68 17 ce 97 0e 5c b2 |h....\.|" +peer0.org1.example.com | "2019-05-02 09:27:39.127 UTC [msp.identity] Verify -> DEBU 1b0a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:39.127 UTC [msp.identity] Verify -> DEBU 1b0b Verify: sig = 00000000 30 44 02 20 17 ee bc d5 e1 16 a9 bf 02 e9 cc 26 |0D. ...........&| +peer0.org1.example.com | 00000010 94 c1 26 18 fc 87 c0 a7 b5 30 2e 53 fd cb 14 b8 |..&......0.S....| +peer0.org1.example.com | 00000020 5a 6f f8 14 02 20 67 54 cf 88 86 d0 ff 0f cd c4 |Zo... gT........| +peer0.org1.example.com | 00000030 d3 e2 7e c9 34 97 3d f7 13 f4 f9 d9 da c6 6a 60 |..~.4.=.......j`| +peer0.org1.example.com | 00000040 3d 19 57 d3 2f 80 |=.W./.|" +peer0.org1.example.com | "2019-05-02 09:27:39.128 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b0c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b0d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:39.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b0e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 " +peer0.org1.example.com | "2019-05-02 09:27:39.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b0f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 " +peer0.org1.example.com | "2019-05-02 09:27:39.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b10 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:39.130 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b11 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.130 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b12 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b13 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.131 UTC [msp] DeserializeIdentity -> DEBU 1b14 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.131 UTC [msp] DeserializeIdentity -> DEBU 1b15 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.132 UTC [msp] DeserializeIdentity -> DEBU 1b16 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.132 UTC [gossip.comm] Send -> DEBU 1b17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:39.132 UTC [msp] DeserializeIdentity -> DEBU 1b18 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.133 UTC [gossip.comm] Send -> DEBU 1b19 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:39.133 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.133 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.134 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.134 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.146 UTC [gossip.gossip] handleMessage -> DEBU 1b1e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.146 UTC [gossip.gossip] handleMessage -> DEBU 1b1f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b20 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.147 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b21 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.199 UTC [gossip.gossip] handleMessage -> DEBU 1b22 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.200 UTC [gossip.gossip] handleMessage -> DEBU 1b23 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.200 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b25 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:39.201 UTC [msp] DeserializeIdentity -> DEBU 1b26 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.201 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b27 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:39.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b28 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:39.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b29 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:39.203 UTC [policies] Evaluate -> DEBU 1b2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:39.203 UTC [policies] Evaluate -> DEBU 1b2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:39.203 UTC [policies] Evaluate -> DEBU 1b2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func1 -> DEBU 1b2d 0xc003ab68a0 gate 1556789259210092600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b2e 0xc003ab68a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b2f 0xc003ab68a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b30 0xc003ab68a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b31 0xc003ab68a0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func1 -> DEBU 1b32 0xc003ab68a0 gate 1556789259210092600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [policies] Evaluate -> DEBU 1b33 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [policies] Evaluate -> DEBU 1b34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [policies] Evaluate -> DEBU 1b35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func1 -> DEBU 1b36 0xc003ab70e0 gate 1556789259210695600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b37 0xc003ab70e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b38 0xc003ab70e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b39 0xc003ab70e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [msp.identity] Verify -> DEBU 1b3a Verify: digest = 00000000 06 38 3f 95 2b 07 df 57 0c 2f c7 f2 2a 16 9c cb |.8?.+..W./..*...| +peer0.org1.example.com | 00000010 dc ec c0 38 6d e0 74 4c f1 4a 37 42 d3 31 60 dc |...8m.tL.J7B.1`.|" +peer0.org1.example.com | "2019-05-02 09:27:39.210 UTC [msp.identity] Verify -> DEBU 1b3b Verify: sig = 00000000 30 44 02 20 25 dd c0 ef 9d ef c0 b5 fa ee e4 2a |0D. %..........*| +peer0.org1.example.com | 00000010 75 c7 f5 f1 a6 ef 86 f1 20 89 0c c4 6c bf c7 66 |u....... ...l..f| +peer0.org1.example.com | 00000020 f8 9a 3d c3 02 20 49 6e bd 60 4b d3 88 72 bf 97 |..=.. In.`K..r..| +peer0.org1.example.com | 00000030 90 8f 1f fe 4a 7c a6 ca 11 43 a7 e9 d4 a7 11 50 |....J|...C.....P| +peer0.org1.example.com | 00000040 66 d6 1f bd a0 48 |f....H|" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc003ab70e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [cauthdsl] func1 -> DEBU 1b3d 0xc003ab70e0 gate 1556789259210695600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b3e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b40 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b41 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b42 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b43 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b44 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 " +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b45 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 " +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b46 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b47 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b48 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b49 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.211 UTC [msp] DeserializeIdentity -> DEBU 1b4a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [gossip.comm] Send -> DEBU 1b50 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b51 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b52 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [gossip.comm] Send -> DEBU 1b53 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [gossip.comm] sendToEndpoint -> DEBU 1b54 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.212 UTC [gossip.comm] sendToEndpoint -> DEBU 1b55 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.213 UTC [gossip.comm] sendToEndpoint -> DEBU 1b56 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.213 UTC [gossip.comm] sendToEndpoint -> DEBU 1b57 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.226 UTC [gossip.comm] func1 -> DEBU 1b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.226 UTC [gossip.gossip] handleMessage -> DEBU 1b59 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.226 UTC [gossip.gossip] handleMessage -> DEBU 1b5a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.226 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.226 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b5c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.235 UTC [gossip.gossip] handleMessage -> DEBU 1b5d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.235 UTC [gossip.gossip] handleMessage -> DEBU 1b5e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.235 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b5f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:39.235 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b60 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:39.250 UTC [dockercontroller] Start -> DEBU 1b61 Started container peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-05-02 09:27:39.250 UTC [container] unlockContainer -> DEBU 1b62 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" +peer0.org1.example.com | "2019-05-02 09:27:39.250 UTC [container] lockContainer -> DEBU 1b63 waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +peer0.org1.example.com | "2019-05-02 09:27:39.250 UTC [container] lockContainer -> DEBU 1b64 got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +peer0.org1.example.com | "2019-05-02 09:27:39.250 UTC [container] unlockContainer -> DEBU 1b65 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" +peer0.org1.example.com | "2019-05-02 09:27:39.310 UTC [chaincode.accesscontrol] authenticate -> DEBU 1b66 Chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b 's authentication is authorized" +peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] handleMessage -> DEBU 1b67 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] HandleRegister -> DEBU 1b68 Received REGISTER in state created" +peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] Register -> DEBU 1b69 registered handler complete for chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] HandleRegister -> DEBU 1b6a Got REGISTER for chaincodeID = name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" , sending back REGISTERED" +peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] HandleRegister -> DEBU 1b6b Changed state to established for name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] sendReady -> DEBU 1b6c sending READY for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +peer0.org1.example.com | "2019-05-02 09:27:39.311 UTC [chaincode] sendReady -> DEBU 1b6d Changed to state ready for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +peer0.org1.example.com | "2019-05-02 09:27:39.312 UTC [chaincode] Launch -> DEBU 1b6e launch complete" +peer0.org1.example.com | "2019-05-02 09:27:39.312 UTC [stateleveldb] GetState -> DEBU 1b6f GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:39.312 UTC [chaincode] Execute -> DEBU 1b70 Entry" +peer0.org1.example.com | "2019-05-02 09:27:39.313 UTC [chaincode] handleMessage -> DEBU 1b71 [592858be] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:39.314 UTC [chaincode] HandleTransaction -> DEBU 1b72 [592858be] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:39.314 UTC [chaincode] HandleTransaction -> DEBU 1b73 [592858be] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:39.315 UTC [chaincode] handleMessage -> DEBU 1b74 [592858be] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:39.315 UTC [chaincode] HandleTransaction -> DEBU 1b75 [592858be] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:39.315 UTC [chaincode] HandleTransaction -> DEBU 1b76 [592858be] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:39.316 UTC [chaincode] handleMessage -> DEBU 1b77 [592858be] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:39.317 UTC [chaincode] Notify -> DEBU 1b78 [592858be] notifying Txid:592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:39.317 UTC [chaincode] Execute -> DEBU 1b79 Exit" +peer0.org1.example.com | "2019-05-02 09:27:39.317 UTC [endorser] callChaincode -> INFO 1b7a [businesschannel][592858be] Exit chaincode: name:"exp02" (1034ms)" +peer0.org1.example.com | "2019-05-02 09:27:39.318 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1b7b Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:39.318 UTC [lockbasedtxmgr] Done -> DEBU 1b7c Done with transaction simulation / query execution [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]" +peer0.org1.example.com | "2019-05-02 09:27:39.318 UTC [endorser] SimulateProposal -> DEBU 1b7d [businesschannel][592858be] Exit" +peer0.org1.example.com | "2019-05-02 09:27:39.319 UTC [endorser] endorseProposal -> DEBU 1b7e [businesschannel][592858be] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:39.319 UTC [endorser] endorseProposal -> DEBU 1b7f [businesschannel][592858be] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-05-02 09:27:39.319 UTC [endorser] EndorseWithPlugin -> DEBU 1b80 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:39.320 UTC [msp.identity] Sign -> DEBU 1b81 Sign: plaintext: 0A209D4D9AFEF5B3DE6A23F5712CD2CB...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:39.320 UTC [msp.identity] Sign -> DEBU 1b82 Sign: digest: 26D8B924113487C937059D11EFBCBE441B8B07F1F20F249D8B345C4643402A34 " +peer0.org1.example.com | "2019-05-02 09:27:39.320 UTC [endorser] EndorseWithPlugin -> DEBU 1b83 Exiting {plugin: escc, channel: businesschannel, tx: 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:39.321 UTC [endorser] endorseProposal -> DEBU 1b84 [businesschannel][592858be] Exit" +peer0.org1.example.com | "2019-05-02 09:27:39.321 UTC [lockbasedtxmgr] Done -> DEBU 1b85 Done with transaction simulation / query execution [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]" +peer0.org1.example.com | "2019-05-02 09:27:39.322 UTC [endorser] func1 -> DEBU 1b86 Exit: request from 172.18.0.8:57334" +peer0.org1.example.com | "2019-05-02 09:27:39.322 UTC [comm.grpc.server] 1 -> INFO 1b87 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57334 grpc.code=OK grpc.call_duration=1.0480193s +peer0.org1.example.com | "2019-05-02 09:27:39.334 UTC [grpc] infof -> DEBU 1b88 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:39.334 UTC [grpc] infof -> DEBU 1b89 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:40.284 UTC [msp] DeserializeIdentity -> DEBU 1b8a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.285 UTC [msp] DeserializeIdentity -> DEBU 1b8b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.285 UTC [gossip.comm] Send -> DEBU 1b8c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:40.286 UTC [gossip.comm] sendToEndpoint -> DEBU 1b8d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.286 UTC [gossip.comm] sendToEndpoint -> DEBU 1b8e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.287 UTC [gossip.comm] sendToEndpoint -> DEBU 1b8f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1b90 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1b91 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1b92 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.289 UTC [gossip.gossip] handleMessage -> DEBU 1b93 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.289 UTC [msp] DeserializeIdentity -> DEBU 1b94 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.289 UTC [msp] DeserializeIdentity -> DEBU 1b95 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:40.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b97 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.290 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b98 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.290 UTC [policies] Evaluate -> DEBU 1b99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.291 UTC [policies] Evaluate -> DEBU 1b9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:40.291 UTC [policies] Evaluate -> DEBU 1b9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.291 UTC [cauthdsl] func1 -> DEBU 1b9c 0xc003b3c5e0 gate 1556789260291828700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.292 UTC [cauthdsl] func2 -> DEBU 1b9d 0xc003b3c5e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.292 UTC [cauthdsl] func2 -> DEBU 1b9e 0xc003b3c5e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.293 UTC [cauthdsl] func2 -> DEBU 1b9f 0xc003b3c5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:40.293 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc003b3c5e0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.293 UTC [cauthdsl] func1 -> DEBU 1ba1 0xc003b3c5e0 gate 1556789260291828700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.293 UTC [policies] Evaluate -> DEBU 1ba2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.293 UTC [policies] Evaluate -> DEBU 1ba3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [policies] Evaluate -> DEBU 1ba4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [cauthdsl] func1 -> DEBU 1ba5 0xc003b3ce20 gate 1556789260294068300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [cauthdsl] func2 -> DEBU 1ba6 0xc003b3ce20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [cauthdsl] func2 -> DEBU 1ba7 0xc003b3ce20 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [cauthdsl] func2 -> DEBU 1ba8 0xc003b3ce20 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [msp.identity] Verify -> DEBU 1ba9 Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +peer0.org1.example.com | 00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +peer0.org1.example.com | "2019-05-02 09:27:40.294 UTC [msp.identity] Verify -> DEBU 1baa Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +peer0.org1.example.com | 00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +peer0.org1.example.com | 00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +peer0.org1.example.com | 00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +peer0.org1.example.com | 00000040 dc 87 d7 13 63 c7 |....c.|" +peer0.org1.example.com | "2019-05-02 09:27:40.295 UTC [cauthdsl] func2 -> DEBU 1bab 0xc003b3ce20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.295 UTC [cauthdsl] func1 -> DEBU 1bac 0xc003b3ce20 gate 1556789260294068300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:40.295 UTC [policies] Evaluate -> DEBU 1bad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.295 UTC [policies] Evaluate -> DEBU 1bae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.296 UTC [policies] Evaluate -> DEBU 1baf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.296 UTC [policies] Evaluate -> DEBU 1bb0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.296 UTC [msp.identity] Verify -> DEBU 1bb1 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..| +peer0.org1.example.com | 00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|" +peer0.org1.example.com | "2019-05-02 09:27:40.296 UTC [msp.identity] Verify -> DEBU 1bb2 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v| +peer0.org1.example.com | 00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E| +peer0.org1.example.com | 00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p| +peer0.org1.example.com | 00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.| +peer0.org1.example.com | 00000040 68 f9 f0 83 f9 50 9b |h....P.|" +peer0.org1.example.com | "2019-05-02 09:27:40.297 UTC [msp.identity] Verify -> DEBU 1bb3 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +peer0.org1.example.com | "2019-05-02 09:27:40.298 UTC [msp.identity] Verify -> DEBU 1bb4 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +peer0.org1.example.com | "2019-05-02 09:27:40.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bb5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bb6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [policies] Evaluate -> DEBU 1bb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [policies] Evaluate -> DEBU 1bb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [policies] Evaluate -> DEBU 1bb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [cauthdsl] func1 -> DEBU 1bba 0xc003b52c40 gate 1556789260299564700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [cauthdsl] func2 -> DEBU 1bbb 0xc003b52c40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [cauthdsl] func2 -> DEBU 1bbc 0xc003b52c40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.300 UTC [cauthdsl] func2 -> DEBU 1bbd 0xc003b52c40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.300 UTC [msp.identity] Verify -> DEBU 1bbf Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +peer0.org1.example.com | "2019-05-02 09:27:40.300 UTC [msp.identity] Verify -> DEBU 1bc0 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +peer0.org1.example.com | "2019-05-02 09:27:40.299 UTC [gossip.comm] func1 -> DEBU 1bbe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.300 UTC [msp] DeserializeIdentity -> DEBU 1bc1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.300 UTC [msp] DeserializeIdentity -> DEBU 1bc2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.301 UTC [gossip.comm] Send -> DEBU 1bc3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:40.301 UTC [msp] DeserializeIdentity -> DEBU 1bc4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.301 UTC [msp] DeserializeIdentity -> DEBU 1bc5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.301 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.301 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.303 UTC [cauthdsl] func2 -> DEBU 1bcc 0xc003b52c40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.304 UTC [cauthdsl] func1 -> DEBU 1bcd 0xc003b52c40 gate 1556789260299564700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:40.304 UTC [policies] Evaluate -> DEBU 1bce Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.305 UTC [policies] Evaluate -> DEBU 1bcf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.305 UTC [policies] Evaluate -> DEBU 1bd0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.306 UTC [policies] Evaluate -> DEBU 1bd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.306 UTC [msp] DeserializeIdentity -> DEBU 1bd2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.307 UTC [msp] DeserializeIdentity -> DEBU 1bd3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.307 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bd4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:40.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bd5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bd6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.309 UTC [policies] Evaluate -> DEBU 1bd7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.309 UTC [policies] Evaluate -> DEBU 1bd8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:40.309 UTC [policies] Evaluate -> DEBU 1bd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.310 UTC [cauthdsl] func1 -> DEBU 1bda 0xc003b7c410 gate 1556789260310338200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.310 UTC [cauthdsl] func2 -> DEBU 1bdb 0xc003b7c410 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.311 UTC [cauthdsl] func2 -> DEBU 1bdc 0xc003b7c410 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.311 UTC [cauthdsl] func2 -> DEBU 1bdd 0xc003b7c410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:40.311 UTC [cauthdsl] func2 -> DEBU 1bde 0xc003b7c410 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.312 UTC [cauthdsl] func1 -> DEBU 1bdf 0xc003b7c410 gate 1556789260310338200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.312 UTC [policies] Evaluate -> DEBU 1be0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.313 UTC [policies] Evaluate -> DEBU 1be1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.313 UTC [policies] Evaluate -> DEBU 1be2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.313 UTC [cauthdsl] func1 -> DEBU 1be3 0xc003b7cc50 gate 1556789260313828300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.314 UTC [cauthdsl] func2 -> DEBU 1be4 0xc003b7cc50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.314 UTC [cauthdsl] func2 -> DEBU 1be5 0xc003b7cc50 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.314 UTC [cauthdsl] func2 -> DEBU 1be6 0xc003b7cc50 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.314 UTC [msp.identity] Verify -> DEBU 1be7 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +peer0.org1.example.com | "2019-05-02 09:27:40.314 UTC [msp.identity] Verify -> DEBU 1be8 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|" +peer0.org1.example.com | "2019-05-02 09:27:40.315 UTC [cauthdsl] func2 -> DEBU 1be9 0xc003b7cc50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.316 UTC [cauthdsl] func1 -> DEBU 1bea 0xc003b7cc50 gate 1556789260313828300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:40.316 UTC [policies] Evaluate -> DEBU 1beb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.316 UTC [policies] Evaluate -> DEBU 1bec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.316 UTC [policies] Evaluate -> DEBU 1bed Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.317 UTC [policies] Evaluate -> DEBU 1bee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.317 UTC [gossip.gossip] handleMessage -> DEBU 1bef Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.317 UTC [gossip.gossip] handleMessage -> DEBU 1bf0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.318 UTC [msp] DeserializeIdentity -> DEBU 1bf1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.320 UTC [msp.identity] Verify -> DEBU 1bf2 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..| +peer0.org1.example.com | 00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|" +peer0.org1.example.com | "2019-05-02 09:27:40.320 UTC [msp.identity] Verify -> DEBU 1bf3 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v| +peer0.org1.example.com | 00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E| +peer0.org1.example.com | 00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p| +peer0.org1.example.com | 00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.| +peer0.org1.example.com | 00000040 68 f9 f0 83 f9 50 9b |h....P.|" +peer0.org1.example.com | "2019-05-02 09:27:40.323 UTC [msp.identity] Verify -> DEBU 1bf4 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +peer0.org1.example.com | 00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +peer0.org1.example.com | "2019-05-02 09:27:40.323 UTC [msp.identity] Verify -> DEBU 1bf5 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +peer0.org1.example.com | 00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +peer0.org1.example.com | 00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +peer0.org1.example.com | 00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +peer0.org1.example.com | 00000040 57 6e 93 b1 86 0c |Wn....|" +peer0.org1.example.com | "2019-05-02 09:27:40.323 UTC [msp] DeserializeIdentity -> DEBU 1bf6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.324 UTC [msp] DeserializeIdentity -> DEBU 1bf7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.324 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bf8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:40.324 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bf9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.324 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bfa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.324 UTC [policies] Evaluate -> DEBU 1bfb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.325 UTC [policies] Evaluate -> DEBU 1bfc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:40.325 UTC [policies] Evaluate -> DEBU 1bfd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.325 UTC [cauthdsl] func1 -> DEBU 1bfe 0xc003b915a0 gate 1556789260325535300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.325 UTC [cauthdsl] func2 -> DEBU 1bff 0xc003b915a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.325 UTC [cauthdsl] func2 -> DEBU 1c00 0xc003b915a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c01 0xc003b915a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c02 0xc003b915a0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func1 -> DEBU 1c03 0xc003b915a0 gate 1556789260325535300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [policies] Evaluate -> DEBU 1c04 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [policies] Evaluate -> DEBU 1c05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [policies] Evaluate -> DEBU 1c06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func1 -> DEBU 1c07 0xc003b91de0 gate 1556789260326613300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c08 0xc003b91de0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c09 0xc003b91de0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [cauthdsl] func2 -> DEBU 1c0a 0xc003b91de0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [msp.identity] Verify -> DEBU 1c0b Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [msp.identity] Verify -> DEBU 1c0c Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|" +peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [cauthdsl] func2 -> DEBU 1c0d 0xc003b91de0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [cauthdsl] func1 -> DEBU 1c0e 0xc003b91de0 gate 1556789260326613300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:40.327 UTC [policies] Evaluate -> DEBU 1c0f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c11 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [msp] DeserializeIdentity -> DEBU 1c13 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c14 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c15 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c16 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c17 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:40.329 UTC [policies] Evaluate -> DEBU 1c18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.329 UTC [cauthdsl] func1 -> DEBU 1c19 0xc003ba4ec0 gate 1556789260329112500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.329 UTC [cauthdsl] func2 -> DEBU 1c1a 0xc003ba4ec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.329 UTC [cauthdsl] func2 -> DEBU 1c1b 0xc003ba4ec0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [cauthdsl] func2 -> DEBU 1c1c 0xc003ba4ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [cauthdsl] func2 -> DEBU 1c1d 0xc003ba4ec0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [cauthdsl] func1 -> DEBU 1c1e 0xc003ba4ec0 gate 1556789260329112500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [policies] Evaluate -> DEBU 1c1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [policies] Evaluate -> DEBU 1c20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [policies] Evaluate -> DEBU 1c21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.330 UTC [cauthdsl] func1 -> DEBU 1c22 0xc003ba5700 gate 1556789260330784200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.331 UTC [cauthdsl] func2 -> DEBU 1c23 0xc003ba5700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.331 UTC [cauthdsl] func2 -> DEBU 1c24 0xc003ba5700 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.331 UTC [cauthdsl] func2 -> DEBU 1c25 0xc003ba5700 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.331 UTC [msp.identity] Verify -> DEBU 1c26 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +peer0.org1.example.com | "2019-05-02 09:27:40.331 UTC [msp.identity] Verify -> DEBU 1c27 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|" +peer0.org1.example.com | "2019-05-02 09:27:40.332 UTC [cauthdsl] func2 -> DEBU 1c28 0xc003ba5700 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.332 UTC [cauthdsl] func1 -> DEBU 1c29 0xc003ba5700 gate 1556789260330784200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:40.332 UTC [policies] Evaluate -> DEBU 1c2a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.332 UTC [policies] Evaluate -> DEBU 1c2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.332 UTC [policies] Evaluate -> DEBU 1c2c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.333 UTC [policies] Evaluate -> DEBU 1c2d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.333 UTC [msp] DeserializeIdentity -> DEBU 1c2e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.333 UTC [msp] DeserializeIdentity -> DEBU 1c2f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.333 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c30 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c31 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c32 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [policies] Evaluate -> DEBU 1c33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [policies] Evaluate -> DEBU 1c34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [policies] Evaluate -> DEBU 1c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [cauthdsl] func1 -> DEBU 1c36 0xc003bb2ed0 gate 1556789260334562900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [cauthdsl] func2 -> DEBU 1c37 0xc003bb2ed0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.334 UTC [cauthdsl] func2 -> DEBU 1c38 0xc003bb2ed0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [cauthdsl] func2 -> DEBU 1c39 0xc003bb2ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [cauthdsl] func2 -> DEBU 1c3a 0xc003bb2ed0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [cauthdsl] func1 -> DEBU 1c3b 0xc003bb2ed0 gate 1556789260334562900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [policies] Evaluate -> DEBU 1c3c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [policies] Evaluate -> DEBU 1c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [policies] Evaluate -> DEBU 1c3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [cauthdsl] func1 -> DEBU 1c3f 0xc003bb3710 gate 1556789260335788700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.335 UTC [cauthdsl] func2 -> DEBU 1c40 0xc003bb3710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [cauthdsl] func2 -> DEBU 1c41 0xc003bb3710 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [cauthdsl] func2 -> DEBU 1c42 0xc003bb3710 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [msp.identity] Verify -> DEBU 1c43 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [msp.identity] Verify -> DEBU 1c44 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|" +peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [cauthdsl] func2 -> DEBU 1c45 0xc003bb3710 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [cauthdsl] func1 -> DEBU 1c46 0xc003bb3710 gate 1556789260335788700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:40.336 UTC [policies] Evaluate -> DEBU 1c47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [policies] Evaluate -> DEBU 1c48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [policies] Evaluate -> DEBU 1c49 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [policies] Evaluate -> DEBU 1c4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [gossip.gossip] handleMessage -> DEBU 1c4b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [gossip.gossip] handleMessage -> DEBU 1c4c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.337 UTC [msp] DeserializeIdentity -> DEBU 1c4d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.338 UTC [msp] DeserializeIdentity -> DEBU 1c4e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.338 UTC [msp] DeserializeIdentity -> DEBU 1c4f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.338 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c50 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:40.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c51 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c52 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [policies] Evaluate -> DEBU 1c53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [policies] Evaluate -> DEBU 1c54 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [policies] Evaluate -> DEBU 1c55 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func1 -> DEBU 1c56 0xc003bd1220 gate 1556789260339588400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c57 0xc003bd1220 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c58 0xc003bd1220 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c59 0xc003bd1220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c5a 0xc003bd1220 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.339 UTC [cauthdsl] func1 -> DEBU 1c5b 0xc003bd1220 gate 1556789260339588400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [policies] Evaluate -> DEBU 1c5c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [policies] Evaluate -> DEBU 1c5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [policies] Evaluate -> DEBU 1c5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [cauthdsl] func1 -> DEBU 1c5f 0xc003bd1a60 gate 1556789260340489500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [cauthdsl] func2 -> DEBU 1c60 0xc003bd1a60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [cauthdsl] func2 -> DEBU 1c61 0xc003bd1a60 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.340 UTC [cauthdsl] func2 -> DEBU 1c62 0xc003bd1a60 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [msp.identity] Verify -> DEBU 1c63 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [msp.identity] Verify -> DEBU 1c64 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|" +peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [cauthdsl] func2 -> DEBU 1c65 0xc003bd1a60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [cauthdsl] func1 -> DEBU 1c66 0xc003bd1a60 gate 1556789260340489500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c67 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c69 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c6a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.342 UTC [msp.identity] Verify -> DEBU 1c6b Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +peer0.org1.example.com | "2019-05-02 09:27:40.342 UTC [msp.identity] Verify -> DEBU 1c6c Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +peer0.org1.example.com | "2019-05-02 09:27:40.343 UTC [msp] DeserializeIdentity -> DEBU 1c6d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.343 UTC [msp] DeserializeIdentity -> DEBU 1c6e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.343 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:40.343 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c70 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.343 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c71 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func1 -> DEBU 1c75 0xc003bdf950 gate 1556789260344414800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c76 0xc003bdf950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c77 0xc003bdf950 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c78 0xc003bdf950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c79 0xc003bdf950 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [cauthdsl] func1 -> DEBU 1c7a 0xc003bdf950 gate 1556789260344414800 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [cauthdsl] func1 -> DEBU 1c7e 0xc003bf8190 gate 1556789260345325700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [cauthdsl] func2 -> DEBU 1c7f 0xc003bf8190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [cauthdsl] func2 -> DEBU 1c80 0xc003bf8190 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [cauthdsl] func2 -> DEBU 1c81 0xc003bf8190 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [msp.identity] Verify -> DEBU 1c82 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +peer0.org1.example.com | "2019-05-02 09:27:40.345 UTC [msp.identity] Verify -> DEBU 1c83 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|" +peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [cauthdsl] func2 -> DEBU 1c84 0xc003bf8190 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [cauthdsl] func1 -> DEBU 1c85 0xc003bf8190 gate 1556789260345325700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c88 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.347 UTC [msp.identity] Verify -> DEBU 1c8a Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O| +peer0.org1.example.com | 00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|" +peer0.org1.example.com | "2019-05-02 09:27:40.347 UTC [msp.identity] Verify -> DEBU 1c8b Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.| +peer0.org1.example.com | 00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.| +peer0.org1.example.com | 00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.| +peer0.org1.example.com | 00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.| +peer0.org1.example.com | 00000040 0a cc ed c2 59 cc c5 |....Y..|" +peer0.org1.example.com | "2019-05-02 09:27:40.347 UTC [gossip.gossip] handleMessage -> DEBU 1c8c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.542 UTC [gossip.gossip] handleMessage -> DEBU 1c8d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.542 UTC [msp] DeserializeIdentity -> DEBU 1c8e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.543 UTC [msp] DeserializeIdentity -> DEBU 1c8f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.543 UTC [gossip.gossip] handleMessage -> DEBU 1c90 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.556 UTC [gossip.gossip] handleMessage -> DEBU 1c91 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789256953821500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.557 UTC [msp.identity] Verify -> DEBU 1c92 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +peer0.org1.example.com | "2019-05-02 09:27:40.557 UTC [msp.identity] Verify -> DEBU 1c93 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +peer0.org1.example.com | "2019-05-02 09:27:40.557 UTC [gossip.gossip] handleMessage -> DEBU 1c94 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.571 UTC [gossip.gossip] handleMessage -> DEBU 1c95 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789256953821500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.572 UTC [msp.identity] Verify -> DEBU 1c96 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +peer0.org1.example.com | "2019-05-02 09:27:40.572 UTC [msp.identity] Verify -> DEBU 1c97 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +peer0.org1.example.com | "2019-05-02 09:27:40.572 UTC [msp] DeserializeIdentity -> DEBU 1c98 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.572 UTC [gossip.gossip] handleMessage -> DEBU 1c99 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.577 UTC [gossip.gossip] handleMessage -> DEBU 1c9a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.577 UTC [gossip.pull] HandleMessage -> DEBU 1c9b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.577 UTC [gossip.pull] SendDigest -> DEBU 1c9c Sending BLOCK_MSG digest: [3 4 5 1 2] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:40.578 UTC [gossip.gossip] handleMessage -> DEBU 1c9d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.789 UTC [gossip.gossip] handleMessage -> DEBU 1c9e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.790 UTC [msp] DeserializeIdentity -> DEBU 1c9f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.791 UTC [msp] DeserializeIdentity -> DEBU 1ca0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.791 UTC [msp] DeserializeIdentity -> DEBU 1ca1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.792 UTC [gossip.gossip] handleMessage -> DEBU 1ca2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.795 UTC [gossip.gossip] handleMessage -> DEBU 1ca3 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789256919750900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.795 UTC [msp] DeserializeIdentity -> DEBU 1ca4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.796 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ca5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:40.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.797 UTC [policies] Evaluate -> DEBU 1ca8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.797 UTC [policies] Evaluate -> DEBU 1ca9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:40.798 UTC [policies] Evaluate -> DEBU 1caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.798 UTC [cauthdsl] func1 -> DEBU 1cab 0xc003c0d510 gate 1556789260798747100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.799 UTC [cauthdsl] func2 -> DEBU 1cac 0xc003c0d510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.799 UTC [cauthdsl] func2 -> DEBU 1cad 0xc003c0d510 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.800 UTC [cauthdsl] func2 -> DEBU 1cae 0xc003c0d510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:40.800 UTC [cauthdsl] func2 -> DEBU 1caf 0xc003c0d510 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.800 UTC [cauthdsl] func1 -> DEBU 1cb0 0xc003c0d510 gate 1556789260798747100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.800 UTC [policies] Evaluate -> DEBU 1cb1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.801 UTC [policies] Evaluate -> DEBU 1cb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.801 UTC [policies] Evaluate -> DEBU 1cb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.802 UTC [cauthdsl] func1 -> DEBU 1cb4 0xc003c0dd50 gate 1556789260801989700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.803 UTC [cauthdsl] func2 -> DEBU 1cb5 0xc003c0dd50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.803 UTC [cauthdsl] func2 -> DEBU 1cb6 0xc003c0dd50 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.804 UTC [cauthdsl] func2 -> DEBU 1cb7 0xc003c0dd50 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.804 UTC [msp.identity] Verify -> DEBU 1cb8 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +peer0.org1.example.com | "2019-05-02 09:27:40.804 UTC [msp.identity] Verify -> DEBU 1cb9 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|" +peer0.org1.example.com | "2019-05-02 09:27:40.807 UTC [cauthdsl] func2 -> DEBU 1cba 0xc003c0dd50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.807 UTC [cauthdsl] func1 -> DEBU 1cbb 0xc003c0dd50 gate 1556789260801989700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:40.808 UTC [policies] Evaluate -> DEBU 1cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.809 UTC [policies] Evaluate -> DEBU 1cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.809 UTC [policies] Evaluate -> DEBU 1cbe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.809 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.810 UTC [msp] DeserializeIdentity -> DEBU 1cc0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.810 UTC [gossip.gossip] handleMessage -> DEBU 1cc1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.847 UTC [gossip.comm] func1 -> DEBU 1cc2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.847 UTC [gossip.gossip] handleMessage -> DEBU 1cc3 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.847 UTC [gossip.pull] HandleMessage -> DEBU 1cc4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.847 UTC [msp] DeserializeIdentity -> DEBU 1cc5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.848 UTC [msp] DeserializeIdentity -> DEBU 1cc6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.848 UTC [msp] DeserializeIdentity -> DEBU 1cc7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.848 UTC [msp] DeserializeIdentity -> DEBU 1cc8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.849 UTC [msp] DeserializeIdentity -> DEBU 1cc9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.849 UTC [msp] DeserializeIdentity -> DEBU 1cca Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.849 UTC [gossip.pull] SendDigest -> DEBU 1ccb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:40.849 UTC [gossip.gossip] handleMessage -> DEBU 1ccc Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.865 UTC [gossip.comm] func1 -> DEBU 1ccd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.865 UTC [gossip.gossip] handleMessage -> DEBU 1cce Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.865 UTC [gossip.gossip] handleMessage -> DEBU 1ccf Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cd0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cd1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [msp] DeserializeIdentity -> DEBU 1cd2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cd3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cd4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cd5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [policies] Evaluate -> DEBU 1cd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [policies] Evaluate -> DEBU 1cd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [policies] Evaluate -> DEBU 1cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [cauthdsl] func1 -> DEBU 1cd9 0xc003c17500 gate 1556789260867404700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [cauthdsl] func2 -> DEBU 1cda 0xc003c17500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.867 UTC [cauthdsl] func2 -> DEBU 1cdb 0xc003c17500 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [cauthdsl] func2 -> DEBU 1cdc 0xc003c17500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [cauthdsl] func2 -> DEBU 1cdd 0xc003c17500 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [cauthdsl] func1 -> DEBU 1cde 0xc003c17500 gate 1556789260867404700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [policies] Evaluate -> DEBU 1cdf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [policies] Evaluate -> DEBU 1ce0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.868 UTC [policies] Evaluate -> DEBU 1ce1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [cauthdsl] func1 -> DEBU 1ce2 0xc003c17d40 gate 1556789260869158300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [cauthdsl] func2 -> DEBU 1ce3 0xc003c17d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [cauthdsl] func2 -> DEBU 1ce4 0xc003c17d40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [cauthdsl] func2 -> DEBU 1ce5 0xc003c17d40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [msp.identity] Verify -> DEBU 1ce6 Verify: digest = 00000000 ab a8 42 84 20 22 cb 2f 2f 3e de d1 ff 38 90 3d |..B. ".//>...8.=| +peer0.org1.example.com | 00000010 fa ca 0c 3f 28 62 be c5 5c 86 ca 5e 04 fc 8a 4a |...?(b..\..^...J|" +peer0.org1.example.com | "2019-05-02 09:27:40.869 UTC [msp.identity] Verify -> DEBU 1ce7 Verify: sig = 00000000 30 44 02 20 57 18 ef 4f 3d 23 98 8a 52 74 e7 19 |0D. W..O=#..Rt..| +peer0.org1.example.com | 00000010 49 83 5e 2a a5 b9 69 a1 a0 73 4f 12 34 1f 5b 1d |I.^*..i..sO.4.[.| +peer0.org1.example.com | 00000020 b9 cb e8 01 02 20 3b 1a 75 cb 62 8e e1 31 de 9d |..... ;.u.b..1..| +peer0.org1.example.com | 00000030 13 81 90 93 74 df ce d5 8e 06 e2 e9 db cf 9d 8e |....t...........| +peer0.org1.example.com | 00000040 28 7e fa 04 8e 0b |(~....|" +peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [cauthdsl] func2 -> DEBU 1ce8 0xc003c17d40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [cauthdsl] func1 -> DEBU 1ce9 0xc003c17d40 gate 1556789260869158300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1cea Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1ceb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1cec Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1ced == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:40.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cee Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.871 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cef Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:40.871 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 " +peer0.org1.example.com | "2019-05-02 09:27:40.871 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 " +peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cf5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [gossip.discovery] sendMemResponse -> DEBU 1cf6 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [msp] DeserializeIdentity -> DEBU 1cf7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.872 UTC [msp] DeserializeIdentity -> DEBU 1cf8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.873 UTC [msp] DeserializeIdentity -> DEBU 1cf9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:40.873 UTC [gossip.comm] Send -> DEBU 1cfa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:40.873 UTC [gossip.discovery] sendMemResponse -> DEBU 1cfb Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:40.873 UTC [gossip.comm] sendToEndpoint -> DEBU 1cfc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:40.873 UTC [gossip.comm] sendToEndpoint -> DEBU 1cfd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.012 UTC [msp] DeserializeIdentity -> DEBU 1cfe Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.013 UTC [msp] DeserializeIdentity -> DEBU 1cff Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.014 UTC [gossip.pull] Hello -> DEBU 1d00 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:41.014 UTC [msp] DeserializeIdentity -> DEBU 1d01 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.015 UTC [msp] DeserializeIdentity -> DEBU 1d02 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.015 UTC [gossip.comm] Send -> DEBU 1d03 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:41.015 UTC [gossip.comm] sendToEndpoint -> DEBU 1d04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.015 UTC [gossip.comm] sendToEndpoint -> DEBU 1d05 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.017 UTC [gossip.gossip] handleMessage -> DEBU 1d06 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3547945905709500911 , Msg_type: BLOCK_MSG, digests: [5 2 1 3 4], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.018 UTC [gossip.pull] HandleMessage -> DEBU 1d07 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3547945905709500911 , Msg_type: BLOCK_MSG, digests: [5 2 1 3 4], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.018 UTC [gossip.gossip] handleMessage -> DEBU 1d08 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.020 UTC [gossip.comm] func1 -> DEBU 1d09 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.021 UTC [gossip.gossip] handleMessage -> DEBU 1d0a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.021 UTC [msp] DeserializeIdentity -> DEBU 1d0b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.022 UTC [msp] DeserializeIdentity -> DEBU 1d0c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.022 UTC [msp] DeserializeIdentity -> DEBU 1d0d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.023 UTC [gossip.gossip] handleMessage -> DEBU 1d0e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.122 UTC [gossip.pull] Hello -> DEBU 1d0f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:41.123 UTC [gossip.comm] Send -> DEBU 1d10 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:41.123 UTC [gossip.pull] Hello -> DEBU 1d11 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:41.124 UTC [gossip.comm] Send -> DEBU 1d12 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:41.124 UTC [gossip.pull] Hello -> DEBU 1d13 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:41.125 UTC [gossip.comm] Send -> DEBU 1d14 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:41.125 UTC [gossip.comm] sendToEndpoint -> DEBU 1d15 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.125 UTC [gossip.comm] sendToEndpoint -> DEBU 1d16 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.126 UTC [gossip.comm] sendToEndpoint -> DEBU 1d17 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.126 UTC [gossip.comm] sendToEndpoint -> DEBU 1d18 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.127 UTC [gossip.comm] sendToEndpoint -> DEBU 1d19 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.127 UTC [gossip.comm] sendToEndpoint -> DEBU 1d1a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.129 UTC [gossip.gossip] handleMessage -> DEBU 1d1b Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17711904648864407508 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.130 UTC [gossip.pull] HandleMessage -> DEBU 1d1c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17711904648864407508 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.130 UTC [gossip.gossip] handleMessage -> DEBU 1d1d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.130 UTC [gossip.comm] func1 -> DEBU 1d1e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795338519098677057 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.134 UTC [gossip.gossip] handleMessage -> DEBU 1d1f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 452822413790425751 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.136 UTC [gossip.pull] HandleMessage -> DEBU 1d20 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 452822413790425751 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.136 UTC [gossip.gossip] handleMessage -> DEBU 1d21 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.137 UTC [gossip.gossip] handleMessage -> DEBU 1d22 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.141 UTC [gossip.pull] HandleMessage -> DEBU 1d23 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.142 UTC [gossip.pull] SendDigest -> DEBU 1d24 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:41.143 UTC [gossip.gossip] handleMessage -> DEBU 1d25 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.145 UTC [msp.identity] Sign -> DEBU 1d26 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151018 " +peer0.org1.example.com | "2019-05-02 09:27:41.145 UTC [msp.identity] Sign -> DEBU 1d28 Sign: digest: FA58178E144539AB902280544495A83B2DED1A8040F6EC2200578D7FC874FDD0 " +peer0.org1.example.com | "2019-05-02 09:27:41.145 UTC [msp.identity] Sign -> DEBU 1d29 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:41.146 UTC [msp.identity] Sign -> DEBU 1d2a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:41.145 UTC [gossip.gossip] handleMessage -> DEBU 1d27 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795338519098677057 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.146 UTC [gossip.comm] Send -> DEBU 1d2b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:41.147 UTC [msp] DeserializeIdentity -> DEBU 1d2d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.147 UTC [gossip.comm] Send -> DEBU 1d2e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:41.148 UTC [msp] DeserializeIdentity -> DEBU 1d2f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.149 UTC [gossip.comm] Send -> DEBU 1d30 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:41.149 UTC [gossip.comm] sendToEndpoint -> DEBU 1d31 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.149 UTC [gossip.comm] sendToEndpoint -> DEBU 1d32 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.150 UTC [gossip.comm] sendToEndpoint -> DEBU 1d33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.151 UTC [gossip.comm] sendToEndpoint -> DEBU 1d34 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.153 UTC [gossip.comm] sendToEndpoint -> DEBU 1d35 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.154 UTC [gossip.comm] sendToEndpoint -> DEBU 1d36 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.146 UTC [gossip.pull] HandleMessage -> DEBU 1d2c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795338519098677057 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.157 UTC [gossip.gossip] handleMessage -> DEBU 1d37 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.160 UTC [gossip.gossip] handleMessage -> DEBU 1d38 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d39 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.163 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d3a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:41.164 UTC [msp.identity] Verify -> DEBU 1d3b Verify: digest = 00000000 33 4c 02 0e 3a 2f e4 72 73 44 21 6f 5f e2 24 59 |3L..:/.rsD!o_.$Y| +peer0.org1.example.com | 00000010 c3 72 95 a4 f6 79 bb 26 ab 6a be 85 cc 4b 84 a3 |.r...y.&.j...K..|" +peer0.org1.example.com | "2019-05-02 09:27:41.164 UTC [msp.identity] Verify -> DEBU 1d3c Verify: sig = 00000000 30 44 02 20 6c db fa 5a ba f6 31 dd 73 8a f1 4e |0D. l..Z..1.s..N| +peer0.org1.example.com | 00000010 56 65 5e e1 88 56 7b 4b dd a0 65 0b e6 8f 66 ec |Ve^..V{K..e...f.| +peer0.org1.example.com | 00000020 b2 23 2d 70 02 20 1d 0f 98 cb ca 2b f4 74 68 ce |.#-p. .....+.th.| +peer0.org1.example.com | 00000030 fc 9d b6 39 43 d6 fe d4 fd 54 f7 9e 56 ff 96 16 |...9C....T..V...| +peer0.org1.example.com | 00000040 ad f2 63 b2 18 8e |..c...|" +peer0.org1.example.com | "2019-05-02 09:27:41.165 UTC [msp.identity] Verify -> DEBU 1d3d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:41.166 UTC [msp.identity] Verify -> DEBU 1d3e Verify: sig = 00000000 30 44 02 20 2a 04 e7 cf b7 a3 e7 ce 8b a7 97 62 |0D. *..........b| +peer0.org1.example.com | 00000010 97 d0 40 2e cb 6f f3 1f e9 e8 a3 8b e7 da f2 13 |..@..o..........| +peer0.org1.example.com | 00000020 a6 7b 99 d1 02 20 32 fb 5d fc 5b 97 8c fb 0c a7 |.{... 2.].[.....| +peer0.org1.example.com | 00000030 cd 4b ab 37 64 7b 59 cf 93 1c 69 b9 14 59 9e 0a |.K.7d{Y...i..Y..| +peer0.org1.example.com | 00000040 e9 71 71 49 18 57 |.qqI.W|" +peer0.org1.example.com | "2019-05-02 09:27:41.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d3f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d40 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:41.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d41 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 " +peer0.org1.example.com | "2019-05-02 09:27:41.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d42 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 " +peer0.org1.example.com | "2019-05-02 09:27:41.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d43 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:41.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d44 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d45 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d46 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.161 UTC [gossip.gossip] handleMessage -> DEBU 1d47 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.172 UTC [gossip.gossip] handleMessage -> DEBU 1d4a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.171 UTC [gossip.comm] func1 -> DEBU 1d48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.171 UTC [gossip.discovery] sendMemResponse -> DEBU 1d49 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [msp] DeserializeIdentity -> DEBU 1d4b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [msp] DeserializeIdentity -> DEBU 1d4c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [gossip.comm] Send -> DEBU 1d4d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [gossip.discovery] sendMemResponse -> DEBU 1d4e Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [gossip.comm] sendToEndpoint -> DEBU 1d4f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.173 UTC [gossip.comm] sendToEndpoint -> DEBU 1d50 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.172 UTC [gossip.gossip] handleMessage -> DEBU 1d51 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.174 UTC [gossip.gossip] handleMessage -> DEBU 1d53 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.175 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d54 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:41.176 UTC [msp.identity] Verify -> DEBU 1d55 Verify: digest = 00000000 fa 58 17 8e 14 45 39 ab 90 22 80 54 44 95 a8 3b |.X...E9..".TD..;| +peer0.org1.example.com | 00000010 2d ed 1a 80 40 f6 ec 22 00 57 8d 7f c8 74 fd d0 |-...@..".W...t..|" +peer0.org1.example.com | "2019-05-02 09:27:41.176 UTC [msp.identity] Verify -> DEBU 1d56 Verify: sig = 00000000 30 44 02 20 37 dc 41 a0 f8 e7 88 a8 45 23 31 80 |0D. 7.A.....E#1.| +peer0.org1.example.com | 00000010 c8 ce 17 66 4d 7f aa 70 8e c5 9a 37 61 6d c5 a4 |...fM..p...7am..| +peer0.org1.example.com | 00000020 0d 07 0d 92 02 20 52 9a dc 53 26 85 69 cd ba 15 |..... R..S&.i...| +peer0.org1.example.com | 00000030 39 5c d6 c6 8c b2 73 a6 c2 cd bd 07 d4 8f e0 7a |9\....s........z| +peer0.org1.example.com | 00000040 e6 b7 03 76 4a 96 |...vJ.|" +peer0.org1.example.com | "2019-05-02 09:27:41.177 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d57 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.178 UTC [gossip.discovery] isSentByMe -> DEBU 1d58 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.178 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d59 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.179 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d5a Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:41.179 UTC [msp] DeserializeIdentity -> DEBU 1d5b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.180 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d5c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:41.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d5d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:41.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d5e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:41.182 UTC [policies] Evaluate -> DEBU 1d5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:41.182 UTC [policies] Evaluate -> DEBU 1d60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:41.183 UTC [policies] Evaluate -> DEBU 1d61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:41.183 UTC [cauthdsl] func1 -> DEBU 1d62 0xc003ccc3d0 gate 1556789261183711000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:41.184 UTC [cauthdsl] func2 -> DEBU 1d63 0xc003ccc3d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:41.184 UTC [cauthdsl] func2 -> DEBU 1d64 0xc003ccc3d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:41.185 UTC [cauthdsl] func2 -> DEBU 1d65 0xc003ccc3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:41.185 UTC [cauthdsl] func2 -> DEBU 1d66 0xc003ccc3d0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [cauthdsl] func1 -> DEBU 1d67 0xc003ccc3d0 gate 1556789261183711000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [policies] Evaluate -> DEBU 1d68 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [policies] Evaluate -> DEBU 1d69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [policies] Evaluate -> DEBU 1d6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [cauthdsl] func1 -> DEBU 1d6b 0xc003cccc10 gate 1556789261186702500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [cauthdsl] func2 -> DEBU 1d6c 0xc003cccc10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [cauthdsl] func2 -> DEBU 1d6d 0xc003cccc10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [cauthdsl] func2 -> DEBU 1d6e 0xc003cccc10 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [msp.identity] Verify -> DEBU 1d6f Verify: digest = 00000000 ab a8 42 84 20 22 cb 2f 2f 3e de d1 ff 38 90 3d |..B. ".//>...8.=| +peer0.org1.example.com | 00000010 fa ca 0c 3f 28 62 be c5 5c 86 ca 5e 04 fc 8a 4a |...?(b..\..^...J|" +peer0.org1.example.com | "2019-05-02 09:27:41.186 UTC [msp.identity] Verify -> DEBU 1d70 Verify: sig = 00000000 30 44 02 20 57 18 ef 4f 3d 23 98 8a 52 74 e7 19 |0D. W..O=#..Rt..| +peer0.org1.example.com | 00000010 49 83 5e 2a a5 b9 69 a1 a0 73 4f 12 34 1f 5b 1d |I.^*..i..sO.4.[.| +peer0.org1.example.com | 00000020 b9 cb e8 01 02 20 3b 1a 75 cb 62 8e e1 31 de 9d |..... ;.u.b..1..| +peer0.org1.example.com | 00000030 13 81 90 93 74 df ce d5 8e 06 e2 e9 db cf 9d 8e |....t...........| +peer0.org1.example.com | 00000040 28 7e fa 04 8e 0b |(~....|" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [cauthdsl] func2 -> DEBU 1d71 0xc003cccc10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [cauthdsl] func1 -> DEBU 1d72 0xc003cccc10 gate 1556789261186702500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d73 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d75 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d77 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d78 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d79 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [msp.identity] Verify -> DEBU 1d7a Verify: digest = 00000000 33 4c 02 0e 3a 2f e4 72 73 44 21 6f 5f e2 24 59 |3L..:/.rsD!o_.$Y| +peer0.org1.example.com | 00000010 c3 72 95 a4 f6 79 bb 26 ab 6a be 85 cc 4b 84 a3 |.r...y.&.j...K..|" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [msp.identity] Verify -> DEBU 1d7b Verify: sig = 00000000 30 44 02 20 6c db fa 5a ba f6 31 dd 73 8a f1 4e |0D. l..Z..1.s..N| +peer0.org1.example.com | 00000010 56 65 5e e1 88 56 7b 4b dd a0 65 0b e6 8f 66 ec |Ve^..V{K..e...f.| +peer0.org1.example.com | 00000020 b2 23 2d 70 02 20 1d 0f 98 cb ca 2b f4 74 68 ce |.#-p. .....+.th.| +peer0.org1.example.com | 00000030 fc 9d b6 39 43 d6 fe d4 fd 54 f7 9e 56 ff 96 16 |...9C....T..V...| +peer0.org1.example.com | 00000040 ad f2 63 b2 18 8e |..c...|" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d7c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d7d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d7e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.189 UTC [gossip.gossip] handleMessage -> DEBU 1d7f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.189 UTC [gossip.gossip] handleMessage -> DEBU 1d80 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d81 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.190 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d82 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:41.192 UTC [msp.identity] Verify -> DEBU 1d83 Verify: digest = 00000000 fa 58 17 8e 14 45 39 ab 90 22 80 54 44 95 a8 3b |.X...E9..".TD..;| +peer0.org1.example.com | 00000010 2d ed 1a 80 40 f6 ec 22 00 57 8d 7f c8 74 fd d0 |-...@..".W...t..|" +peer0.org1.example.com | "2019-05-02 09:27:41.192 UTC [msp.identity] Verify -> DEBU 1d84 Verify: sig = 00000000 30 44 02 20 37 dc 41 a0 f8 e7 88 a8 45 23 31 80 |0D. 7.A.....E#1.| +peer0.org1.example.com | 00000010 c8 ce 17 66 4d 7f aa 70 8e c5 9a 37 61 6d c5 a4 |...fM..p...7am..| +peer0.org1.example.com | 00000020 0d 07 0d 92 02 20 52 9a dc 53 26 85 69 cd ba 15 |..... R..S&.i...| +peer0.org1.example.com | 00000030 39 5c d6 c6 8c b2 73 a6 c2 cd bd 07 d4 8f e0 7a |9\....s........z| +peer0.org1.example.com | 00000040 e6 b7 03 76 4a 96 |...vJ.|" +peer0.org1.example.com | "2019-05-02 09:27:41.194 UTC [msp.identity] Verify -> DEBU 1d85 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:41.195 UTC [msp.identity] Verify -> DEBU 1d86 Verify: sig = 00000000 30 44 02 20 2a d2 c2 12 a8 13 3a 5f 16 fd c4 be |0D. *.....:_....| +peer0.org1.example.com | 00000010 0d d5 ed 0c fa b3 33 59 c3 de 7f cd 5e df 12 43 |......3Y....^..C| +peer0.org1.example.com | 00000020 96 c5 10 0f 02 20 0e eb 19 07 56 59 bd b1 ef 15 |..... ....VY....| +peer0.org1.example.com | 00000030 82 da 0b ef 5e 75 78 7f b1 74 bd 69 c1 92 98 54 |....^ux..t.i...T| +peer0.org1.example.com | 00000040 7a 4d f9 10 54 80 |zM..T.|" +peer0.org1.example.com | "2019-05-02 09:27:41.195 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.196 UTC [gossip.discovery] isSentByMe -> DEBU 1d88 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d89 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d8a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.200 UTC [gossip.gossip] handleMessage -> DEBU 1d8b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.201 UTC [gossip.gossip] handleMessage -> DEBU 1d8c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.201 UTC [gossip.pull] HandleMessage -> DEBU 1d8d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.202 UTC [msp] DeserializeIdentity -> DEBU 1d8e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.202 UTC [msp] DeserializeIdentity -> DEBU 1d8f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.203 UTC [msp] DeserializeIdentity -> DEBU 1d90 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.203 UTC [msp] DeserializeIdentity -> DEBU 1d91 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.204 UTC [msp] DeserializeIdentity -> DEBU 1d92 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.204 UTC [msp] DeserializeIdentity -> DEBU 1d93 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.205 UTC [gossip.pull] SendDigest -> DEBU 1d94 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:41.205 UTC [gossip.gossip] handleMessage -> DEBU 1d95 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.208 UTC [gossip.gossip] handleMessage -> DEBU 1d96 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d97 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.211 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d98 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:41.211 UTC [msp.identity] Verify -> DEBU 1d99 Verify: digest = 00000000 fa 58 17 8e 14 45 39 ab 90 22 80 54 44 95 a8 3b |.X...E9..".TD..;| +peer0.org1.example.com | 00000010 2d ed 1a 80 40 f6 ec 22 00 57 8d 7f c8 74 fd d0 |-...@..".W...t..|" +peer0.org1.example.com | "2019-05-02 09:27:41.211 UTC [msp.identity] Verify -> DEBU 1d9a Verify: sig = 00000000 30 44 02 20 37 dc 41 a0 f8 e7 88 a8 45 23 31 80 |0D. 7.A.....E#1.| +peer0.org1.example.com | 00000010 c8 ce 17 66 4d 7f aa 70 8e c5 9a 37 61 6d c5 a4 |...fM..p...7am..| +peer0.org1.example.com | 00000020 0d 07 0d 92 02 20 52 9a dc 53 26 85 69 cd ba 15 |..... R..S&.i...| +peer0.org1.example.com | 00000030 39 5c d6 c6 8c b2 73 a6 c2 cd bd 07 d4 8f e0 7a |9\....s........z| +peer0.org1.example.com | 00000040 e6 b7 03 76 4a 96 |...vJ.|" +peer0.org1.example.com | "2019-05-02 09:27:41.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d9b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.213 UTC [gossip.discovery] isSentByMe -> DEBU 1d9c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.216 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d9d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.217 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d9e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:41.218 UTC [msp.identity] Verify -> DEBU 1d9f Verify: digest = 00000000 33 4c 02 0e 3a 2f e4 72 73 44 21 6f 5f e2 24 59 |3L..:/.rsD!o_.$Y| +peer0.org1.example.com | 00000010 c3 72 95 a4 f6 79 bb 26 ab 6a be 85 cc 4b 84 a3 |.r...y.&.j...K..|" +peer0.org1.example.com | "2019-05-02 09:27:41.218 UTC [msp.identity] Verify -> DEBU 1da0 Verify: sig = 00000000 30 44 02 20 6c db fa 5a ba f6 31 dd 73 8a f1 4e |0D. l..Z..1.s..N| +peer0.org1.example.com | 00000010 56 65 5e e1 88 56 7b 4b dd a0 65 0b e6 8f 66 ec |Ve^..V{K..e...f.| +peer0.org1.example.com | 00000020 b2 23 2d 70 02 20 1d 0f 98 cb ca 2b f4 74 68 ce |.#-p. .....+.th.| +peer0.org1.example.com | 00000030 fc 9d b6 39 43 d6 fe d4 fd 54 f7 9e 56 ff 96 16 |...9C....T..V...| +peer0.org1.example.com | 00000040 ad f2 63 b2 18 8e |..c...|" +peer0.org1.example.com | "2019-05-02 09:27:41.219 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.220 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.220 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.221 UTC [gossip.gossip] handleMessage -> DEBU 1da4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.222 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1da6 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:41.222 UTC [msp] DeserializeIdentity -> DEBU 1da7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1da8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:41.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1da9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:41.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1daa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:41.224 UTC [policies] Evaluate -> DEBU 1dab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:41.224 UTC [policies] Evaluate -> DEBU 1dac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:41.225 UTC [policies] Evaluate -> DEBU 1dad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:41.225 UTC [cauthdsl] func1 -> DEBU 1dae 0xc003d14170 gate 1556789261225384700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:41.225 UTC [cauthdsl] func2 -> DEBU 1daf 0xc003d14170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:41.226 UTC [cauthdsl] func2 -> DEBU 1db0 0xc003d14170 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:41.226 UTC [cauthdsl] func2 -> DEBU 1db1 0xc003d14170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:41.226 UTC [cauthdsl] func2 -> DEBU 1db2 0xc003d14170 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:41.227 UTC [cauthdsl] func1 -> DEBU 1db3 0xc003d14170 gate 1556789261225384700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:41.227 UTC [policies] Evaluate -> DEBU 1db4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.227 UTC [policies] Evaluate -> DEBU 1db5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.228 UTC [policies] Evaluate -> DEBU 1db6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:41.229 UTC [cauthdsl] func1 -> DEBU 1db7 0xc003d149b0 gate 1556789261228997600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:41.229 UTC [cauthdsl] func2 -> DEBU 1db8 0xc003d149b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:41.229 UTC [cauthdsl] func2 -> DEBU 1db9 0xc003d149b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:41.229 UTC [cauthdsl] func2 -> DEBU 1dba 0xc003d149b0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:41.230 UTC [msp.identity] Verify -> DEBU 1dbb Verify: digest = 00000000 90 bf 7e ad 48 8a 1d b6 5e 7b dc 13 f8 89 be 2c |..~.H...^{.....,| +peer0.org1.example.com | 00000010 1f b7 a5 6a 3c ed 18 74 a5 d1 7d 6b 92 e9 e9 1f |...j<..t..}k....|" +peer0.org1.example.com | "2019-05-02 09:27:41.231 UTC [msp.identity] Verify -> DEBU 1dbc Verify: sig = 00000000 30 44 02 20 21 b1 f4 ee cc 7e 8c b3 81 27 eb ae |0D. !....~...'..| +peer0.org1.example.com | 00000010 28 db f4 cc ee 59 6c 92 b5 e9 cd 7a 6b e1 1e 8a |(....Yl....zk...| +peer0.org1.example.com | 00000020 44 ae 0c 86 02 20 6b 82 88 ae 32 20 46 a9 0f d4 |D.... k...2 F...| +peer0.org1.example.com | 00000030 05 5d 01 94 06 a2 a3 20 cc 1a 4b e7 d7 cd 86 c8 |.]..... ..K.....| +peer0.org1.example.com | 00000040 0b 3c 9c 95 9c 32 |.<...2|" +peer0.org1.example.com | "2019-05-02 09:27:41.231 UTC [cauthdsl] func2 -> DEBU 1dbd 0xc003d149b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:41.232 UTC [cauthdsl] func1 -> DEBU 1dbe 0xc003d149b0 gate 1556789261228997600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:41.232 UTC [policies] Evaluate -> DEBU 1dbf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.232 UTC [policies] Evaluate -> DEBU 1dc0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.233 UTC [policies] Evaluate -> DEBU 1dc1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.233 UTC [policies] Evaluate -> DEBU 1dc2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:41.234 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.234 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:41.234 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc5 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 " +peer0.org1.example.com | "2019-05-02 09:27:41.235 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc6 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 " +peer0.org1.example.com | "2019-05-02 09:27:41.235 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:41.235 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.236 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.236 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dca Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.237 UTC [gossip.discovery] sendMemResponse -> DEBU 1dcb Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:41.237 UTC [msp] DeserializeIdentity -> DEBU 1dcc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.237 UTC [msp] DeserializeIdentity -> DEBU 1dcd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.237 UTC [msp] DeserializeIdentity -> DEBU 1dce Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.238 UTC [gossip.comm] Send -> DEBU 1dcf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:41.238 UTC [gossip.discovery] sendMemResponse -> DEBU 1dd0 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:41.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1dd3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1dd4 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [policies] Evaluate -> DEBU 1dd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [policies] Evaluate -> DEBU 1dd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [policies] Evaluate -> DEBU 1dd7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [cauthdsl] func1 -> DEBU 1dd8 0xc003ce9d40 gate 1556789261422705000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [cauthdsl] func2 -> DEBU 1dd9 0xc003ce9d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [cauthdsl] func2 -> DEBU 1dda 0xc003ce9d40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:41.422 UTC [cauthdsl] func2 -> DEBU 1ddb 0xc003ce9d40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [msp.identity] Verify -> DEBU 1ddc Verify: digest = 00000000 40 a2 dd 9d 7b 76 d5 1a f2 e4 04 cb 21 91 cc 70 |@...{v......!..p| +peer0.org1.example.com | 00000010 3a 2e 15 32 2d 93 23 20 3c 39 f6 bf 8e 0c ce 7e |:..2-.# <9.....~|" +peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [msp.identity] Verify -> DEBU 1ddd Verify: sig = 00000000 30 45 02 21 00 87 e1 c1 bb cd 8b 6c 77 e4 a8 62 |0E.!.......lw..b| +peer0.org1.example.com | 00000010 56 40 c7 0b a4 57 d8 53 42 6e cc 9e f5 bd 2e b6 |V@...W.SBn......| +peer0.org1.example.com | 00000020 13 b4 c9 a5 83 02 20 32 b8 f6 ae c2 1b 1e 9e dc |...... 2........| +peer0.org1.example.com | 00000030 c9 f6 e1 a9 c2 a7 d9 52 df 7f 31 ac 35 e5 67 e4 |.......R..1.5.g.| +peer0.org1.example.com | 00000040 f1 17 a9 e7 00 15 26 |......&|" +peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [cauthdsl] func2 -> DEBU 1dde 0xc003ce9d40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [cauthdsl] func1 -> DEBU 1ddf 0xc003ce9d40 gate 1556789261422705000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [policies] Evaluate -> DEBU 1de0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [policies] Evaluate -> DEBU 1de1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:41.423 UTC [policies] Evaluate -> DEBU 1de2 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [policies] Evaluate -> DEBU 1de3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [blocksProvider] DeliverBlocks -> DEBU 1de4 [businesschannel] Adding payload to local buffer, blockNum = [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.state] addPayload -> DEBU 1de5 [businesschannel] Adding payload to local buffer, blockNum = [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.state] addPayload -> DEBU 1de6 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [blocksProvider] DeliverBlocks -> DEBU 1de7 [businesschannel] Gossiping block [6], peers number [3]" +peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.channel] AddToMsgStore -> DEBU 1de8 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4074 bytes, seq: 6}, Envelope: 4104 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.pull] Add -> DEBU 1de9 Added 6, total items: 6" +peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.state] deliverPayloads -> DEBU 1dea [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.424 UTC [gossip.state] deliverPayloads -> DEBU 1deb [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [gossip.privdata] StoreBlock -> INFO 1dec [businesschannel] Received block [6] from buffer" +peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [gossip.privdata] StoreBlock -> DEBU 1ded [businesschannel] Validating block [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [committer.txvalidator] Validate -> DEBU 1dee [businesschannel] START Block Validation for block [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [committer.txvalidator] Validate -> DEBU 1def expecting 1 block validation responses" +peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [committer.txvalidator] validateTx -> DEBU 1df0 [businesschannel] validateTx starts for block 0xc003b0d3c0 env 0xc003c4fb80 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [protoutils] ValidateTransaction -> DEBU 1df1 ValidateTransactionEnvelope starts for envelope 0xc003c4fb80" +peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [protoutils] ValidateTransaction -> DEBU 1df2 Header is channel_header:"\010\003\032\014\010\212\360\252\346\005\020\334\262\310\202\001\"\017businesschannel*@592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030/\317\236PoE\366\177\237\314e\364\275\233{P\214\325\244!M\365m " " +peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [protoutils] validateChannelHeader -> DEBU 1df3 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:41.425 UTC [protoutils] checkSignatureFromCreator -> DEBU 1df4 begin" +peer0.org1.example.com | "2019-05-02 09:27:41.426 UTC [msp] GetManagerForChain -> DEBU 1df5 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:41.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 1df6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:41.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 1df7 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:41.426 UTC [msp.identity] Verify -> DEBU 1df8 Verify: digest = 00000000 ee 3b ed f0 66 6a 84 41 a3 33 12 fd f6 cb eb d8 |.;..fj.A.3......| +peer0.org1.example.com | 00000010 14 22 98 43 7a 96 c1 8d 99 84 14 e1 47 90 8f fd |.".Cz.......G...|" +peer0.org1.example.com | "2019-05-02 09:27:41.426 UTC [msp.identity] Verify -> DEBU 1df9 Verify: sig = 00000000 30 45 02 21 00 bd 46 9a fc 92 4f d4 7e 59 1b dc |0E.!..F...O.~Y..| +peer0.org1.example.com | 00000010 63 67 6c d1 a6 7a 05 97 e6 5a 66 bd a1 3b 6a 8e |cgl..z...Zf..;j.| +peer0.org1.example.com | 00000020 a0 dd 62 9d ed 02 20 0d 44 82 59 1d 36 d1 fe 40 |..b... .D.Y.6..@| +peer0.org1.example.com | 00000030 b7 a5 b2 72 f7 51 72 9f c8 89 8b 76 9f 45 9e 8d |...r.Qr....v.E..| +peer0.org1.example.com | 00000040 ef 22 01 d3 23 c9 7c |."..#.||" +peer0.org1.example.com | "2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfa Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.428 UTC [gossip.comm] Send -> DEBU 1dfe Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4074 bytes, seq: 6}, Envelope: 4104 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:41.428 UTC [msp] DeserializeIdentity -> DEBU 1dff Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.428 UTC [msp] DeserializeIdentity -> DEBU 1e00 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:41.428 UTC [gossip.comm] sendToEndpoint -> DEBU 1e01 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4074 bytes, seq: 6}, Envelope: 4104 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:41.428 UTC [gossip.comm] sendToEndpoint -> DEBU 1e02 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:41.429 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e03 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:41.429 UTC [protoutils] validateEndorserTransaction -> DEBU 1e04 validateEndorserTransaction starts for data 0xc003051000, header channel_header:"\010\003\032\014\010\212\360\252\346\005\020\334\262\310\202\001\"\017businesschannel*@592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030/\317\236PoE\366\177\237\314e\364\275\233{P\214\325\244!M\365m " " +peer0.org1.example.com | "2019-05-02 09:27:41.430 UTC [protoutils] validateEndorserTransaction -> DEBU 1e05 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [protoutils] validateEndorserTransaction -> DEBU 1e06 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [protoutils] ValidateTransaction -> DEBU 1e07 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [committer.txvalidator] validateTx -> DEBU 1e08 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1e09 retrieveTransactionByID() - txId = [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]" +peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [committer.txvalidator] validateTx -> DEBU 1e0a Validating transaction with plugins" +peer0.org1.example.com | "2019-05-02 09:27:41.431 UTC [committer.txvalidator] Dispatch -> DEBU 1e0b [businesschannel] Dispatch starts for bytes 0xc002cc9c00" +peer0.org1.example.com | "2019-05-02 09:27:41.432 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e0c constructing new query executor txid = [82160613-2f05-4f49-9d15-830e4c48078d]" +peer0.org1.example.com | "2019-05-02 09:27:41.433 UTC [stateleveldb] GetState -> DEBU 1e0d GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-05-02 09:27:41.433 UTC [stateleveldb] GetState -> DEBU 1e0e GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:41.434 UTC [stateleveldb] GetState -> DEBU 1e0f GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +peer0.org1.example.com | "2019-05-02 09:27:41.434 UTC [stateleveldb] GetState -> DEBU 1e10 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +peer0.org1.example.com | "2019-05-02 09:27:41.434 UTC [stateleveldb] GetState -> DEBU 1e11 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +peer0.org1.example.com | "2019-05-02 09:27:41.434 UTC [lockbasedtxmgr] Done -> DEBU 1e12 Done with transaction simulation / query execution [82160613-2f05-4f49-9d15-830e4c48078d]" +peer0.org1.example.com | "2019-05-02 09:27:41.435 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 1e13 Validating Tx 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, seq 0 out of 1 in block 6 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e14 constructing new query executor txid = [1b438ed2-7905-4f7d-9358-71d56705d63a]" +peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [lockbasedtxmgr] Done -> DEBU 1e15 Done with transaction simulation / query execution [1b438ed2-7905-4f7d-9358-71d56705d63a]" +peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [cauthdsl] func1 -> DEBU 1e16 0xc003d571b0 gate 1556789261436520600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [cauthdsl] func2 -> DEBU 1e17 0xc003d571b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [cauthdsl] func2 -> DEBU 1e18 0xc003d571b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [cauthdsl] func2 -> DEBU 1e19 0xc003d571b0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:41.436 UTC [msp.identity] Verify -> DEBU 1e1a Verify: digest = 00000000 26 d8 b9 24 11 34 87 c9 37 05 9d 11 ef bc be 44 |&..$.4..7......D| +peer0.org1.example.com | 00000010 1b 8b 07 f1 f2 0f 24 9d 8b 34 5c 46 43 40 2a 34 |......$..4\FC@*4|" +peer0.org1.example.com | "2019-05-02 09:27:41.437 UTC [msp.identity] Verify -> DEBU 1e1b Verify: sig = 00000000 30 45 02 21 00 f5 68 12 4e de 79 d3 5c 88 af 65 |0E.!..h.N.y.\..e| +peer0.org1.example.com | 00000010 96 69 c0 64 55 77 fe 52 ae cd d9 59 9f 02 24 df |.i.dUw.R...Y..$.| +peer0.org1.example.com | 00000020 d7 42 62 8c 26 02 20 12 75 04 26 f2 63 ae 8d d0 |.Bb.&. .u.&.c...| +peer0.org1.example.com | 00000030 99 3e 57 a5 a3 17 0a 83 18 ef e6 a7 cc b7 34 07 |.>W...........4.| +peer0.org1.example.com | 00000040 69 16 4d 84 b8 1a 23 |i.M...#|" +peer0.org1.example.com | "2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1c 0xc003d571b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1d 0xc003d571b0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1e 0xc003d571b0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1f 0xc003d571b0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:41.439 UTC [cauthdsl] func1 -> DEBU 1e20 0xc003d571b0 gate 1556789261436520600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:41.440 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e21 constructing new query executor txid = [1e54aab3-f9ce-46e0-a0bb-d91799dc95b1]" +peer0.org1.example.com | "2019-05-02 09:27:41.440 UTC [lockbasedtxmgr] Done -> DEBU 1e22 Done with transaction simulation / query execution [1e54aab3-f9ce-46e0-a0bb-d91799dc95b1]" +peer0.org1.example.com | "2019-05-02 09:27:41.441 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e23 constructing new query executor txid = [701bf816-2815-4547-b6db-4390dc6cb179]" +peer0.org1.example.com | "2019-05-02 09:27:41.441 UTC [lockbasedtxmgr] Done -> DEBU 1e24 Done with transaction simulation / query execution [701bf816-2815-4547-b6db-4390dc6cb179]" +peer0.org1.example.com | "2019-05-02 09:27:41.441 UTC [vscc] Validate -> DEBU 1e25 block 6, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-05-02 09:27:41.441 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 1e26 Transaction 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9 appears to be valid" +peer0.org1.example.com | "2019-05-02 09:27:41.442 UTC [committer.txvalidator] Dispatch -> DEBU 1e27 [businesschannel] Dispatch completes env bytes 0xc002cc9c00" +peer0.org1.example.com | "2019-05-02 09:27:41.442 UTC [committer.txvalidator] validateTx -> DEBU 1e28 [businesschannel] validateTx completes for block 0xc003b0d3c0 env 0xc003c4fb80 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:41.442 UTC [committer.txvalidator] Validate -> DEBU 1e29 got result for idx 0, code 0" +peer0.org1.example.com | "2019-05-02 09:27:41.442 UTC [committer.txvalidator] Validate -> INFO 1e2a [businesschannel] Validated block [6] in 17ms" +peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1e2b Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [gossip.privdata] StoreBlock -> DEBU 1e2c [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [kvledger] CommitWithPvtData -> DEBU 1e2d [businesschannel] Validating state for block [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1e2e Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1e2f lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-05-02 09:27:41.443 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1e30 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-05-02 09:27:41.444 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e31 ValidateAndPrepareBatch() for block number = [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.444 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e32 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:41.444 UTC [valimpl] preprocessProtoBlock -> DEBU 1e33 txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-05-02 09:27:41.444 UTC [stateleveldb] GetState -> DEBU 1e34 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:41.444 UTC [statebasedval] validateKVRead -> DEBU 1e35 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +peer0.org1.example.com | "2019-05-02 09:27:41.445 UTC [stateleveldb] GetState -> DEBU 1e36 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:41.460 UTC [statebasedval] validateKVRead -> DEBU 1e37 Comparing versions for key [􏿿initialized]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-05-02 09:27:41.461 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1e38 Block [6] Transaction index [0] TxId [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9] marked as valid by state validator. ContainsPostOrderWrites [false]" +peer0.org1.example.com | "2019-05-02 09:27:41.461 UTC [valinternal] ApplyWriteSet -> DEBU 1e39 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"\x00\U0010ffffinitialized"}:(*internal.keyOps)(0xc003d7c2c0), internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003d7c300), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003d7c340)}" +peer0.org1.example.com | "2019-05-02 09:27:41.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e3a validating rwset..." +peer0.org1.example.com | "2019-05-02 09:27:41.462 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e3b postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:41.462 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e3c ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-05-02 09:27:41.464 UTC [kvledger] CommitWithPvtData -> DEBU 1e3d [businesschannel] Committing block [6] to storage" +peer0.org1.example.com | "2019-05-02 09:27:41.464 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1e3e Writing block [6] to pvt block store" +peer0.org1.example.com | "2019-05-02 09:27:41.467 UTC [pvtdatastorage] Prepare -> DEBU 1e3f Saved 0 private data write sets for block [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.471 UTC [fsblkstorage] indexBlock -> DEBU 1e40 Indexing block [blockNum=6, blockHash=[]byte{0x13, 0xd2, 0x4, 0x27, 0x55, 0xc2, 0x5f, 0x7c, 0x72, 0x4d, 0x56, 0xe4, 0x30, 0x48, 0x7e, 0xa, 0x6b, 0x2c, 0x6b, 0x68, 0x24, 0x9, 0x99, 0xcd, 0x22, 0x6, 0xb1, 0x32, 0xe5, 0x65, 0x92, 0x6c} txOffsets= +peer0.org1.example.com | txId=592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9 locPointer=offset=70, bytesLength=3055 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-05-02 09:27:41.471 UTC [fsblkstorage] indexBlock -> DEBU 1e41 Adding txLoc [fileSuffixNum=0, offset=86577, bytesLength=3055] for tx ID: [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9] to txid-index" +peer0.org1.example.com | "2019-05-02 09:27:41.472 UTC [fsblkstorage] indexBlock -> DEBU 1e42 Adding txLoc [fileSuffixNum=0, offset=86577, bytesLength=3055] for tx number:[0] ID: [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9] to blockNumTranNum index" +peer0.org1.example.com | "2019-05-02 09:27:41.475 UTC [fsblkstorage] updateCheckpoint -> DEBU 1e43 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90570], isChainEmpty=[false], lastBlockNumber=[6]" +peer0.org1.example.com | "2019-05-02 09:27:41.475 UTC [pvtdatastorage] Commit -> DEBU 1e44 Committing private data for block [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.479 UTC [pvtdatastorage] Commit -> DEBU 1e45 Committed private data for block [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.480 UTC [kvledger] CommitWithPvtData -> DEBU 1e46 [businesschannel] Committing block [6] transactions to state database" +peer0.org1.example.com | "2019-05-02 09:27:41.480 UTC [lockbasedtxmgr] Commit -> DEBU 1e47 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:41.480 UTC [lockbasedtxmgr] Commit -> DEBU 1e48 Committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:41.481 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1e49 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-05-02 09:27:41.481 UTC [lockbasedtxmgr] Commit -> DEBU 1e4a Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:41.481 UTC [stateleveldb] ApplyUpdates -> DEBU 1e4b Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-05-02 09:27:41.481 UTC [stateleveldb] ApplyUpdates -> DEBU 1e4c Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-05-02 09:27:41.481 UTC [stateleveldb] ApplyUpdates -> DEBU 1e4d Channel [businesschannel]: Applying key(string)=[exp02􏿿initialized] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x0, 0xf4, 0x8f, 0xbf, 0xbf, 0x69, 0x6e, 0x69, 0x74, 0x69, 0x61, 0x6c, 0x69, 0x7a, 0x65, 0x64}]" +peer0.org1.example.com | "2019-05-02 09:27:41.484 UTC [lockbasedtxmgr] Commit -> DEBU 1e4e Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-05-02 09:27:41.484 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1e4f Preparing potential purge list working-set for expiringAtBlk [7]" +peer0.org1.example.com | "2019-05-02 09:27:41.484 UTC [leveldbhelper] GetIterator -> DEBU 1e50 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:41.485 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1e51 No expiry entry found for expiringAtBlk [7]" +peer0.org1.example.com | "2019-05-02 09:27:41.485 UTC [lockbasedtxmgr] func1 -> DEBU 1e52 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-05-02 09:27:41.485 UTC [kvledger] CommitWithPvtData -> DEBU 1e53 [businesschannel] Committing block [6] transactions to history database" +peer0.org1.example.com | "2019-05-02 09:27:41.485 UTC [historyleveldb] Commit -> DEBU 1e54 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" +peer0.org1.example.com | "2019-05-02 09:27:41.487 UTC [historyleveldb] Commit -> DEBU 1e55 Channel [businesschannel]: Updates committed to history database for blockNo [6]" +peer0.org1.example.com | "2019-05-02 09:27:41.487 UTC [kvledger] CommitWithPvtData -> INFO 1e56 [businesschannel] Committed block [6] with 1 transaction(s) in 44ms (state_validation=19ms block_commit=17ms state_commit=5ms)" +peer0.org1.example.com | "2019-05-02 09:27:41.488 UTC [msp.identity] Sign -> DEBU 1e57 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020807 " +peer0.org1.example.com | "2019-05-02 09:27:41.488 UTC [msp.identity] Sign -> DEBU 1e58 Sign: digest: 68A091325825D2E9B4F1F6512D2FD9D16BA54DD8C9B8FFBB598257089B8E949A " +peer0.org1.example.com | "2019-05-02 09:27:41.488 UTC [gossip.state] commitBlock -> DEBU 1e59 [businesschannel] Committed block [6] with 1 transaction(s)" +peer0.org1.example.com | "2019-05-02 09:27:42.345 UTC [gossip.election] waitForInterrupt -> DEBU 1e5a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:27:42.346 UTC [gossip.election] IsLeader -> DEBU 1e5b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:27:42.347 UTC [msp.identity] Sign -> DEBU 1e5c Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510061801 " +peer0.org1.example.com | "2019-05-02 09:27:42.348 UTC [msp.identity] Sign -> DEBU 1e5d Sign: digest: E2F907E5E5A479A34581E8DDBBC40AFC349784B71B0DFE7B145B0B97208EB39A " +peer0.org1.example.com | "2019-05-02 09:27:42.349 UTC [gossip.election] waitForInterrupt -> DEBU 1e5e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:42.350 UTC [msp] DeserializeIdentity -> DEBU 1e5f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:42.351 UTC [msp] DeserializeIdentity -> DEBU 1e60 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:42.352 UTC [msp] DeserializeIdentity -> DEBU 1e61 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:42.352 UTC [msp] DeserializeIdentity -> DEBU 1e62 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:42.352 UTC [gossip.comm] Send -> DEBU 1e63 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:42.353 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:42.353 UTC [gossip.comm] sendToEndpoint -> DEBU 1e65 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:42.353 UTC [msp] DeserializeIdentity -> DEBU 1e66 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:42.353 UTC [gossip.comm] sendToEndpoint -> DEBU 1e67 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:43.799 UTC [gossip.comm] func1 -> DEBU 1e68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:43.799 UTC [gossip.gossip] handleMessage -> DEBU 1e69 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:43.800 UTC [gossip.gossip] handleMessage -> DEBU 1e6a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:43.800 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e6b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:43.801 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e6c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:43.801 UTC [msp] DeserializeIdentity -> DEBU 1e6d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:43.802 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:43.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e6f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:43.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e70 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:43.803 UTC [policies] Evaluate -> DEBU 1e71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:43.803 UTC [policies] Evaluate -> DEBU 1e72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:43.804 UTC [policies] Evaluate -> DEBU 1e73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:43.805 UTC [cauthdsl] func1 -> DEBU 1e74 0xc003d47d60 gate 1556789263805675500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:43.806 UTC [cauthdsl] func2 -> DEBU 1e75 0xc003d47d60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:43.806 UTC [cauthdsl] func2 -> DEBU 1e76 0xc003d47d60 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:43.806 UTC [cauthdsl] func2 -> DEBU 1e77 0xc003d47d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:43.807 UTC [cauthdsl] func2 -> DEBU 1e78 0xc003d47d60 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:43.807 UTC [cauthdsl] func1 -> DEBU 1e79 0xc003d47d60 gate 1556789263805675500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:43.807 UTC [policies] Evaluate -> DEBU 1e7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:43.809 UTC [gossip.gossip] handleMessage -> DEBU 1e7b Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:43.810 UTC [policies] Evaluate -> DEBU 1e7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:43.810 UTC [policies] Evaluate -> DEBU 1e7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:43.810 UTC [cauthdsl] func1 -> DEBU 1e7e 0xc003dbe5a0 gate 1556789263810763700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:43.810 UTC [cauthdsl] func2 -> DEBU 1e7f 0xc003dbe5a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:43.811 UTC [cauthdsl] func2 -> DEBU 1e80 0xc003dbe5a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:43.811 UTC [cauthdsl] func2 -> DEBU 1e81 0xc003dbe5a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:43.811 UTC [msp.identity] Verify -> DEBU 1e82 Verify: digest = 00000000 28 46 52 9b b2 72 1a 72 23 4c 78 9b 4e 9c 1b 2d |(FR..r.r#Lx.N..-| +peer0.org1.example.com | 00000010 e7 54 b2 af 7b e5 b8 ab f7 0f 19 46 94 fd 9c 7a |.T..{......F...z|" +peer0.org1.example.com | "2019-05-02 09:27:43.811 UTC [msp.identity] Verify -> DEBU 1e83 Verify: sig = 00000000 30 45 02 21 00 c5 90 8b 53 6b 52 f3 6f c6 89 7c |0E.!....SkR.o..|| +peer0.org1.example.com | 00000010 48 bb 08 87 bc e2 c5 8d 34 2e 34 98 20 8b b7 3d |H.......4.4. ..=| +peer0.org1.example.com | 00000020 1d 95 0d 03 6a 02 20 24 27 46 dc 7e 33 d5 04 16 |....j. $'F.~3...| +peer0.org1.example.com | 00000030 46 e4 82 b6 8f 81 37 9b ed af d3 0f 23 21 35 6d |F.....7.....#!5m| +peer0.org1.example.com | 00000040 16 5c 28 d8 35 66 b1 |.\(.5f.|" +peer0.org1.example.com | "2019-05-02 09:27:43.812 UTC [cauthdsl] func2 -> DEBU 1e84 0xc003dbe5a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:43.812 UTC [cauthdsl] func1 -> DEBU 1e85 0xc003dbe5a0 gate 1556789263810763700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:43.812 UTC [policies] Evaluate -> DEBU 1e86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:43.813 UTC [policies] Evaluate -> DEBU 1e87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:43.813 UTC [policies] Evaluate -> DEBU 1e88 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:43.813 UTC [policies] Evaluate -> DEBU 1e89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:43.813 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e8a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:43.813 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:43.814 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 " +peer0.org1.example.com | "2019-05-02 09:27:43.814 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 " +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e90 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e91 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e93 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.gossip] handleMessage -> DEBU 1e94 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.gossip] handleMessage -> DEBU 1e95 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.gossip] handleMessage -> DEBU 1e96 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e97 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e98 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:43.826 UTC [msp] DeserializeIdentity -> DEBU 1e99 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:43.827 UTC [msp] DeserializeIdentity -> DEBU 1e9a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:43.827 UTC [msp] DeserializeIdentity -> DEBU 1e9b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:43.827 UTC [msp] DeserializeIdentity -> DEBU 1e9c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:43.828 UTC [msp] DeserializeIdentity -> DEBU 1e9d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:43.828 UTC [msp] DeserializeIdentity -> DEBU 1e9e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:43.828 UTC [gossip.comm] Send -> DEBU 1e9f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:43.829 UTC [msp] DeserializeIdentity -> DEBU 1ea0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:43.829 UTC [msp] DeserializeIdentity -> DEBU 1ea1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:43.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:43.830 UTC [gossip.comm] Send -> DEBU 1ea3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:43.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:43.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.039 UTC [msp.identity] Sign -> DEBU 1ea7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151019 " +peer0.org1.example.com | "2019-05-02 09:27:44.039 UTC [msp.identity] Sign -> DEBU 1ea8 Sign: digest: 9D85DB97449275B80669AFF8894EDE65FDA6104E76700A673CB4A351732B805D " +peer0.org1.example.com | "2019-05-02 09:27:44.040 UTC [msp.identity] Sign -> DEBU 1ea9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:44.040 UTC [msp.identity] Sign -> DEBU 1eaa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:44.041 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1eab Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:44.051 UTC [msp] DeserializeIdentity -> DEBU 1eac Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.052 UTC [msp] DeserializeIdentity -> DEBU 1ead Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.052 UTC [msp] DeserializeIdentity -> DEBU 1eae Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.053 UTC [gossip.comm] Send -> DEBU 1eaf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.054 UTC [msp] DeserializeIdentity -> DEBU 1eb0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.054 UTC [gossip.comm] Send -> DEBU 1eb1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.054 UTC [gossip.comm] Send -> DEBU 1eb2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.054 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.056 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.056 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.088 UTC [gossip.gossip] handleMessage -> DEBU 1eb9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.089 UTC [gossip.gossip] handleMessage -> DEBU 1eba Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ebb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.090 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ebc Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:44.090 UTC [msp.identity] Verify -> DEBU 1ebd Verify: digest = 00000000 04 78 1d ad 0d ea 10 db 10 52 b6 42 fd bc 3d 70 |.x.......R.B..=p| +peer0.org1.example.com | 00000010 78 5f ff c6 02 c1 8b 99 9d 23 89 97 16 e1 3f b5 |x_.......#....?.|" +peer0.org1.example.com | "2019-05-02 09:27:44.090 UTC [msp.identity] Verify -> DEBU 1ebe Verify: sig = 00000000 30 44 02 20 04 55 80 4c 13 fc f2 38 1b 02 d8 b5 |0D. .U.L...8....| +peer0.org1.example.com | 00000010 ba 04 69 04 c2 e3 8a 2a c4 71 ee c2 2c 07 e9 7c |..i....*.q..,..|| +peer0.org1.example.com | 00000020 9d ac c8 02 02 20 22 a7 f1 e3 51 a6 98 8a 19 fb |..... "...Q.....| +peer0.org1.example.com | 00000030 c2 2f 0f 5a e6 31 c6 f3 92 b6 d8 75 77 e5 50 cc |./.Z.1.....uw.P.| +peer0.org1.example.com | 00000040 7b 99 ee de 4a 6d |{...Jm|" +peer0.org1.example.com | "2019-05-02 09:27:44.091 UTC [msp.identity] Verify -> DEBU 1ebf Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:44.091 UTC [msp.identity] Verify -> DEBU 1ec0 Verify: sig = 00000000 30 45 02 21 00 bc ec e2 79 4f 4e 7b 37 ec 9d 70 |0E.!....yON{7..p| +peer0.org1.example.com | 00000010 dd 72 e3 05 82 b4 4e 6c a6 81 55 b2 34 a0 d6 eb |.r....Nl..U.4...| +peer0.org1.example.com | 00000020 0a 3f 11 b7 cd 02 20 4a 53 54 e6 3a 2f 77 86 ef |.?.... JST.:/w..| +peer0.org1.example.com | 00000030 8c f8 4e 6a b5 1f bf 5e 5c 33 a7 34 2f cf 8f ad |..Nj...^\3.4/...| +peer0.org1.example.com | 00000040 10 48 65 d0 b8 54 ab |.He..T.|" +peer0.org1.example.com | "2019-05-02 09:27:44.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ec1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec2 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:44.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec3 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 " +peer0.org1.example.com | "2019-05-02 09:27:44.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 " +peer0.org1.example.com | "2019-05-02 09:27:44.093 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec5 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:44.093 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.094 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ec7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.094 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.096 UTC [msp] DeserializeIdentity -> DEBU 1ec9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.096 UTC [msp] DeserializeIdentity -> DEBU 1eca Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.096 UTC [msp] DeserializeIdentity -> DEBU 1ecb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.097 UTC [gossip.comm] Send -> DEBU 1ecc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.097 UTC [msp] DeserializeIdentity -> DEBU 1ecd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.097 UTC [gossip.comm] Send -> DEBU 1ece Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.098 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.098 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.097 UTC [gossip.comm] sendToEndpoint -> DEBU 1ecf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.099 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.101 UTC [gossip.comm] func1 -> DEBU 1ed3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.101 UTC [gossip.gossip] handleMessage -> DEBU 1ed4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.101 UTC [gossip.gossip] handleMessage -> DEBU 1ed5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ed6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ed7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.112 UTC [gossip.gossip] handleMessage -> DEBU 1ed8 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.112 UTC [gossip.gossip] handleMessage -> DEBU 1ed9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.112 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1eda Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1edb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.165 UTC [gossip.gossip] handleMessage -> DEBU 1edc Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.166 UTC [gossip.gossip] handleMessage -> DEBU 1edd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ede Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1edf Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:44.166 UTC [msp] DeserializeIdentity -> DEBU 1ee0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.167 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ee1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:44.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ee2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ee3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.168 UTC [policies] Evaluate -> DEBU 1ee4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.168 UTC [policies] Evaluate -> DEBU 1ee5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.168 UTC [policies] Evaluate -> DEBU 1ee6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.169 UTC [cauthdsl] func1 -> DEBU 1ee7 0xc003dd5f60 gate 1556789264169434100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.170 UTC [cauthdsl] func2 -> DEBU 1ee8 0xc003dd5f60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.170 UTC [cauthdsl] func2 -> DEBU 1ee9 0xc003dd5f60 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.171 UTC [cauthdsl] func2 -> DEBU 1eea 0xc003dd5f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.171 UTC [cauthdsl] func2 -> DEBU 1eeb 0xc003dd5f60 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.171 UTC [cauthdsl] func1 -> DEBU 1eec 0xc003dd5f60 gate 1556789264169434100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.172 UTC [policies] Evaluate -> DEBU 1eed Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.172 UTC [policies] Evaluate -> DEBU 1eee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.172 UTC [policies] Evaluate -> DEBU 1eef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.173 UTC [cauthdsl] func1 -> DEBU 1ef0 0xc003e1a7a0 gate 1556789264173382400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.175 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc003e1a7a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.175 UTC [cauthdsl] func2 -> DEBU 1ef2 0xc003e1a7a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.176 UTC [cauthdsl] func2 -> DEBU 1ef3 0xc003e1a7a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.176 UTC [msp.identity] Verify -> DEBU 1ef4 Verify: digest = 00000000 50 65 5b 59 6d 12 85 e2 fc 2d 5d 26 c0 09 18 27 |Pe[Ym....-]&...'| +peer0.org1.example.com | 00000010 08 52 6c 4c 25 b4 d6 91 f0 7f f0 dc 74 dd 05 28 |.RlL%.......t..(|" +peer0.org1.example.com | "2019-05-02 09:27:44.176 UTC [msp.identity] Verify -> DEBU 1ef5 Verify: sig = 00000000 30 44 02 20 79 6f fc 0c fa 91 38 79 90 03 31 74 |0D. yo....8y..1t| +peer0.org1.example.com | 00000010 a9 b0 f7 e8 85 23 c8 2a 5d 4d c2 25 80 da 30 77 |.....#.*]M.%..0w| +peer0.org1.example.com | 00000020 4d 35 46 ff 02 20 2c 58 d8 9f 04 e1 97 8b 6b 7c |M5F.. ,X......k|| +peer0.org1.example.com | 00000030 01 ec 0f 11 97 6c 00 f8 b0 39 1e f4 f1 81 81 2b |.....l...9.....+| +peer0.org1.example.com | 00000040 e0 e9 6f 89 20 49 |..o. I|" +peer0.org1.example.com | "2019-05-02 09:27:44.177 UTC [cauthdsl] func2 -> DEBU 1ef6 0xc003e1a7a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.177 UTC [cauthdsl] func1 -> DEBU 1ef7 0xc003e1a7a0 gate 1556789264173382400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.177 UTC [policies] Evaluate -> DEBU 1ef8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.178 UTC [policies] Evaluate -> DEBU 1ef9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.179 UTC [policies] Evaluate -> DEBU 1efa Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.179 UTC [policies] Evaluate -> DEBU 1efb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.182 UTC [gossip.comm] func1 -> DEBU 1efc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.183 UTC [gossip.gossip] handleMessage -> DEBU 1efd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 1efe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.185 UTC [gossip.discovery] learnExistingMembers -> DEBU 1eff Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:44.185 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f00 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 " +peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f01 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 " +peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f02 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f03 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f04 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f05 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.187 UTC [gossip.gossip] handleMessage -> DEBU 1f06 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f08 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.189 UTC [gossip.gossip] handleMessage -> DEBU 1f09 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.190 UTC [gossip.gossip] handleMessage -> DEBU 1f0a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f0b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f0c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.195 UTC [msp] DeserializeIdentity -> DEBU 1f0d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.196 UTC [msp] DeserializeIdentity -> DEBU 1f0e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.196 UTC [msp] DeserializeIdentity -> DEBU 1f0f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.196 UTC [msp] DeserializeIdentity -> DEBU 1f10 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.197 UTC [msp] DeserializeIdentity -> DEBU 1f11 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.197 UTC [msp] DeserializeIdentity -> DEBU 1f12 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.197 UTC [msp] DeserializeIdentity -> DEBU 1f13 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.197 UTC [gossip.comm] Send -> DEBU 1f14 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.198 UTC [msp] DeserializeIdentity -> DEBU 1f15 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.198 UTC [gossip.comm] Send -> DEBU 1f17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.199 UTC [gossip.comm] sendToEndpoint -> DEBU 1f18 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.198 UTC [gossip.comm] sendToEndpoint -> DEBU 1f16 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.199 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.199 UTC [gossip.comm] sendToEndpoint -> DEBU 1f19 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.247 UTC [msp] DeserializeIdentity -> DEBU 1f1b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.247 UTC [msp] DeserializeIdentity -> DEBU 1f1c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.248 UTC [gossip.comm] Send -> DEBU 1f1d Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 1f22 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1f20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 1f23 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 1f21 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.251 UTC [gossip.comm] func1 -> DEBU 1f24 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.252 UTC [gossip.gossip] handleMessage -> DEBU 1f25 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.254 UTC [msp] DeserializeIdentity -> DEBU 1f26 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.255 UTC [msp] DeserializeIdentity -> DEBU 1f27 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.256 UTC [msp] DeserializeIdentity -> DEBU 1f28 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.256 UTC [msp] DeserializeIdentity -> DEBU 1f2a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.257 UTC [gossip.comm] Send -> DEBU 1f2b Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.257 UTC [msp] DeserializeIdentity -> DEBU 1f2c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.257 UTC [msp] DeserializeIdentity -> DEBU 1f2d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f30 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.256 UTC [msp] DeserializeIdentity -> DEBU 1f29 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.260 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f32 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:44.261 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f33 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.261 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f34 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.261 UTC [policies] Evaluate -> DEBU 1f35 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.261 UTC [policies] Evaluate -> DEBU 1f36 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.262 UTC [policies] Evaluate -> DEBU 1f37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.262 UTC [cauthdsl] func1 -> DEBU 1f38 0xc003e55d90 gate 1556789264262544200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.262 UTC [cauthdsl] func2 -> DEBU 1f39 0xc003e55d90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.263 UTC [cauthdsl] func2 -> DEBU 1f3a 0xc003e55d90 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.263 UTC [cauthdsl] func2 -> DEBU 1f3b 0xc003e55d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.263 UTC [cauthdsl] func2 -> DEBU 1f3c 0xc003e55d90 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.264 UTC [cauthdsl] func1 -> DEBU 1f3d 0xc003e55d90 gate 1556789264262544200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.264 UTC [policies] Evaluate -> DEBU 1f3e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.265 UTC [policies] Evaluate -> DEBU 1f3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f40 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.265 UTC [policies] Evaluate -> DEBU 1f41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f31 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.267 UTC [gossip.comm] sendToEndpoint -> DEBU 1f42 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.266 UTC [cauthdsl] func1 -> DEBU 1f43 0xc003e34eb0 gate 1556789264266730200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.272 UTC [cauthdsl] func2 -> DEBU 1f44 0xc003e34eb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.272 UTC [cauthdsl] func2 -> DEBU 1f45 0xc003e34eb0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.272 UTC [cauthdsl] func2 -> DEBU 1f46 0xc003e34eb0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.273 UTC [msp.identity] Verify -> DEBU 1f47 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +peer0.org1.example.com | "2019-05-02 09:27:44.273 UTC [msp.identity] Verify -> DEBU 1f48 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|" +peer0.org1.example.com | "2019-05-02 09:27:44.279 UTC [gossip.comm] func1 -> DEBU 1f49 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.280 UTC [cauthdsl] func2 -> DEBU 1f4a 0xc003e34eb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.281 UTC [cauthdsl] func1 -> DEBU 1f4b 0xc003e34eb0 gate 1556789264266730200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.281 UTC [policies] Evaluate -> DEBU 1f4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.282 UTC [policies] Evaluate -> DEBU 1f4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.282 UTC [policies] Evaluate -> DEBU 1f4e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.282 UTC [policies] Evaluate -> DEBU 1f4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.283 UTC [msp.identity] Verify -> DEBU 1f50 Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O| +peer0.org1.example.com | 00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|" +peer0.org1.example.com | "2019-05-02 09:27:44.284 UTC [msp.identity] Verify -> DEBU 1f51 Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.| +peer0.org1.example.com | 00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.| +peer0.org1.example.com | 00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.| +peer0.org1.example.com | 00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.| +peer0.org1.example.com | 00000040 0a cc ed c2 59 cc c5 |....Y..|" +peer0.org1.example.com | "2019-05-02 09:27:44.285 UTC [msp.identity] Verify -> DEBU 1f52 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +peer0.org1.example.com | "2019-05-02 09:27:44.285 UTC [msp.identity] Verify -> DEBU 1f53 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +peer0.org1.example.com | "2019-05-02 09:27:44.286 UTC [msp] DeserializeIdentity -> DEBU 1f54 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.286 UTC [msp] DeserializeIdentity -> DEBU 1f55 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.287 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:44.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f57 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f58 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.289 UTC [policies] Evaluate -> DEBU 1f59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.289 UTC [policies] Evaluate -> DEBU 1f5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.290 UTC [policies] Evaluate -> DEBU 1f5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.290 UTC [cauthdsl] func1 -> DEBU 1f5c 0xc003e8b4c0 gate 1556789264290953900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.291 UTC [cauthdsl] func2 -> DEBU 1f5d 0xc003e8b4c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.291 UTC [cauthdsl] func2 -> DEBU 1f5e 0xc003e8b4c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.292 UTC [cauthdsl] func2 -> DEBU 1f5f 0xc003e8b4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.293 UTC [cauthdsl] func2 -> DEBU 1f60 0xc003e8b4c0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.293 UTC [cauthdsl] func1 -> DEBU 1f61 0xc003e8b4c0 gate 1556789264290953900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.294 UTC [policies] Evaluate -> DEBU 1f62 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.294 UTC [policies] Evaluate -> DEBU 1f63 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.295 UTC [policies] Evaluate -> DEBU 1f64 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.295 UTC [cauthdsl] func1 -> DEBU 1f65 0xc003e8bd00 gate 1556789264295698200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.296 UTC [cauthdsl] func2 -> DEBU 1f66 0xc003e8bd00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.296 UTC [cauthdsl] func2 -> DEBU 1f67 0xc003e8bd00 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.297 UTC [cauthdsl] func2 -> DEBU 1f68 0xc003e8bd00 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.297 UTC [msp.identity] Verify -> DEBU 1f69 Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +peer0.org1.example.com | "2019-05-02 09:27:44.298 UTC [msp.identity] Verify -> DEBU 1f6a Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|" +peer0.org1.example.com | "2019-05-02 09:27:44.298 UTC [cauthdsl] func2 -> DEBU 1f6b 0xc003e8bd00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.299 UTC [cauthdsl] func1 -> DEBU 1f6c 0xc003e8bd00 gate 1556789264295698200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.299 UTC [policies] Evaluate -> DEBU 1f6d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.299 UTC [policies] Evaluate -> DEBU 1f6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.300 UTC [policies] Evaluate -> DEBU 1f6f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.300 UTC [policies] Evaluate -> DEBU 1f70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.300 UTC [msp] DeserializeIdentity -> DEBU 1f71 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.301 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f72 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.301 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f73 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.301 UTC [policies] Evaluate -> DEBU 1f74 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.305 UTC [policies] Evaluate -> DEBU 1f75 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.305 UTC [policies] Evaluate -> DEBU 1f76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.306 UTC [cauthdsl] func1 -> DEBU 1f77 0xc003e9cde0 gate 1556789264306204300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.306 UTC [cauthdsl] func2 -> DEBU 1f78 0xc003e9cde0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.307 UTC [cauthdsl] func2 -> DEBU 1f79 0xc003e9cde0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.307 UTC [cauthdsl] func2 -> DEBU 1f7a 0xc003e9cde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.307 UTC [cauthdsl] func2 -> DEBU 1f7b 0xc003e9cde0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.308 UTC [cauthdsl] func1 -> DEBU 1f7c 0xc003e9cde0 gate 1556789264306204300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.308 UTC [policies] Evaluate -> DEBU 1f7d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.308 UTC [policies] Evaluate -> DEBU 1f7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.308 UTC [policies] Evaluate -> DEBU 1f7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.308 UTC [cauthdsl] func1 -> DEBU 1f80 0xc003e9d620 gate 1556789264308941300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f81 0xc003e9d620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f82 0xc003e9d620 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f83 0xc003e9d620 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [msp.identity] Verify -> DEBU 1f84 Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [msp.identity] Verify -> DEBU 1f85 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f86 0xc003e9d620 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [cauthdsl] func1 -> DEBU 1f87 0xc003e9d620 gate 1556789264308941300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f8a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [gossip.gossip] handleMessage -> DEBU 1f8c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.309 UTC [gossip.gossip] handleMessage -> DEBU 1f8d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.310 UTC [msp] DeserializeIdentity -> DEBU 1f8e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.310 UTC [msp] DeserializeIdentity -> DEBU 1f8f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.312 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f90 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:44.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f91 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f92 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.313 UTC [policies] Evaluate -> DEBU 1f93 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.313 UTC [policies] Evaluate -> DEBU 1f94 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.314 UTC [policies] Evaluate -> DEBU 1f95 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.315 UTC [cauthdsl] func1 -> DEBU 1f96 0xc003eb1030 gate 1556789264315836700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.316 UTC [cauthdsl] func2 -> DEBU 1f97 0xc003eb1030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.317 UTC [cauthdsl] func2 -> DEBU 1f98 0xc003eb1030 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.318 UTC [cauthdsl] func2 -> DEBU 1f99 0xc003eb1030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.319 UTC [cauthdsl] func2 -> DEBU 1f9a 0xc003eb1030 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.320 UTC [cauthdsl] func1 -> DEBU 1f9b 0xc003eb1030 gate 1556789264315836700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.321 UTC [policies] Evaluate -> DEBU 1f9c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.321 UTC [policies] Evaluate -> DEBU 1f9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.323 UTC [policies] Evaluate -> DEBU 1f9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.324 UTC [cauthdsl] func1 -> DEBU 1f9f 0xc003eb1870 gate 1556789264324374400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.325 UTC [cauthdsl] func2 -> DEBU 1fa0 0xc003eb1870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.326 UTC [cauthdsl] func2 -> DEBU 1fa1 0xc003eb1870 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.327 UTC [cauthdsl] func2 -> DEBU 1fa2 0xc003eb1870 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.327 UTC [msp.identity] Verify -> DEBU 1fa3 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +peer0.org1.example.com | 00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +peer0.org1.example.com | "2019-05-02 09:27:44.328 UTC [msp.identity] Verify -> DEBU 1fa4 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +peer0.org1.example.com | 00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +peer0.org1.example.com | 00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +peer0.org1.example.com | 00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +peer0.org1.example.com | 00000040 6f f6 d4 dd 46 29 |o...F)|" +peer0.org1.example.com | "2019-05-02 09:27:44.331 UTC [cauthdsl] func2 -> DEBU 1fa5 0xc003eb1870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.332 UTC [cauthdsl] func1 -> DEBU 1fa6 0xc003eb1870 gate 1556789264324374400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.332 UTC [policies] Evaluate -> DEBU 1fa7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.333 UTC [policies] Evaluate -> DEBU 1fa8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.333 UTC [policies] Evaluate -> DEBU 1fa9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.334 UTC [policies] Evaluate -> DEBU 1faa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.335 UTC [msp.identity] Verify -> DEBU 1fab Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O| +peer0.org1.example.com | 00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|" +peer0.org1.example.com | "2019-05-02 09:27:44.336 UTC [msp.identity] Verify -> DEBU 1fac Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.| +peer0.org1.example.com | 00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.| +peer0.org1.example.com | 00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.| +peer0.org1.example.com | 00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.| +peer0.org1.example.com | 00000040 0a cc ed c2 59 cc c5 |....Y..|" +peer0.org1.example.com | "2019-05-02 09:27:44.337 UTC [msp] DeserializeIdentity -> DEBU 1fad Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.338 UTC [msp] DeserializeIdentity -> DEBU 1fae Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.339 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1faf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:44.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.339 UTC [policies] Evaluate -> DEBU 1fb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.340 UTC [policies] Evaluate -> DEBU 1fb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.340 UTC [policies] Evaluate -> DEBU 1fb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.340 UTC [cauthdsl] func1 -> DEBU 1fb5 0xc003ec9760 gate 1556789264340455500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.340 UTC [cauthdsl] func2 -> DEBU 1fb6 0xc003ec9760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.341 UTC [cauthdsl] func2 -> DEBU 1fb7 0xc003ec9760 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.342 UTC [cauthdsl] func2 -> DEBU 1fb8 0xc003ec9760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.342 UTC [cauthdsl] func2 -> DEBU 1fb9 0xc003ec9760 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.343 UTC [cauthdsl] func1 -> DEBU 1fba 0xc003ec9760 gate 1556789264340455500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.343 UTC [policies] Evaluate -> DEBU 1fbb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.344 UTC [policies] Evaluate -> DEBU 1fbc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [policies] Evaluate -> DEBU 1fbd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [cauthdsl] func1 -> DEBU 1fbe 0xc003ec9fa0 gate 1556789264345678000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [cauthdsl] func2 -> DEBU 1fbf 0xc003ec9fa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [cauthdsl] func2 -> DEBU 1fc0 0xc003ec9fa0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [cauthdsl] func2 -> DEBU 1fc1 0xc003ec9fa0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.345 UTC [msp.identity] Verify -> DEBU 1fc2 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [msp.identity] Verify -> DEBU 1fc3 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|" +peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [cauthdsl] func2 -> DEBU 1fc4 0xc003ec9fa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [cauthdsl] func1 -> DEBU 1fc5 0xc003ec9fa0 gate 1556789264345678000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.346 UTC [msp.identity] Verify -> DEBU 1fca Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +peer0.org1.example.com | "2019-05-02 09:27:44.347 UTC [msp.identity] Verify -> DEBU 1fcb Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|" +peer0.org1.example.com | "2019-05-02 09:27:44.347 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fcc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.347 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fcd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func1 -> DEBU 1fd1 0xc003edf6a0 gate 1556789264348256100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd2 0xc003edf6a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd3 0xc003edf6a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd4 0xc003edf6a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [msp.identity] Verify -> DEBU 1fd5 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [msp.identity] Verify -> DEBU 1fd6 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd7 0xc003edf6a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [cauthdsl] func1 -> DEBU 1fd8 0xc003edf6a0 gate 1556789264348256100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fd9 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.349 UTC [policies] Evaluate -> DEBU 1fdb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.349 UTC [policies] Evaluate -> DEBU 1fdc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.349 UTC [gossip.gossip] handleMessage -> DEBU 1fdd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.349 UTC [gossip.gossip] handleMessage -> DEBU 1fde Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.349 UTC [msp] DeserializeIdentity -> DEBU 1fdf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.350 UTC [msp.identity] Verify -> DEBU 1fe0 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +peer0.org1.example.com | 00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +peer0.org1.example.com | "2019-05-02 09:27:44.351 UTC [msp.identity] Verify -> DEBU 1fe1 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +peer0.org1.example.com | 00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +peer0.org1.example.com | 00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +peer0.org1.example.com | 00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +peer0.org1.example.com | 00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +peer0.org1.example.com | "2019-05-02 09:27:44.352 UTC [msp] DeserializeIdentity -> DEBU 1fe2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.352 UTC [msp] DeserializeIdentity -> DEBU 1fe3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.353 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fe4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:44.353 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fe5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.354 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fe6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.354 UTC [policies] Evaluate -> DEBU 1fe7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.355 UTC [policies] Evaluate -> DEBU 1fe8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.355 UTC [policies] Evaluate -> DEBU 1fe9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.355 UTC [cauthdsl] func1 -> DEBU 1fea 0xc003eef8d0 gate 1556789264355975300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.356 UTC [cauthdsl] func2 -> DEBU 1feb 0xc003eef8d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.356 UTC [cauthdsl] func2 -> DEBU 1fec 0xc003eef8d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.357 UTC [cauthdsl] func2 -> DEBU 1fed 0xc003eef8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.357 UTC [cauthdsl] func2 -> DEBU 1fee 0xc003eef8d0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.358 UTC [cauthdsl] func1 -> DEBU 1fef 0xc003eef8d0 gate 1556789264355975300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.358 UTC [policies] Evaluate -> DEBU 1ff0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.359 UTC [policies] Evaluate -> DEBU 1ff1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.363 UTC [policies] Evaluate -> DEBU 1ff2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.365 UTC [cauthdsl] func1 -> DEBU 1ff3 0xc003f00110 gate 1556789264365401800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.366 UTC [cauthdsl] func2 -> DEBU 1ff4 0xc003f00110 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.367 UTC [cauthdsl] func2 -> DEBU 1ff5 0xc003f00110 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.369 UTC [cauthdsl] func2 -> DEBU 1ff6 0xc003f00110 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.370 UTC [msp.identity] Verify -> DEBU 1ff7 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +peer0.org1.example.com | 00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +peer0.org1.example.com | "2019-05-02 09:27:44.370 UTC [msp.identity] Verify -> DEBU 1ff8 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +peer0.org1.example.com | 00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +peer0.org1.example.com | 00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +peer0.org1.example.com | 00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +peer0.org1.example.com | 00000040 6c 9b e9 95 fc 61 |l....a|" +peer0.org1.example.com | "2019-05-02 09:27:44.371 UTC [cauthdsl] func2 -> DEBU 1ff9 0xc003f00110 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.372 UTC [cauthdsl] func1 -> DEBU 1ffa 0xc003f00110 gate 1556789264365401800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.373 UTC [policies] Evaluate -> DEBU 1ffb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.373 UTC [policies] Evaluate -> DEBU 1ffc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.373 UTC [policies] Evaluate -> DEBU 1ffd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.374 UTC [policies] Evaluate -> DEBU 1ffe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.375 UTC [msp.identity] Verify -> DEBU 1fff Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O| +peer0.org1.example.com | 00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|" +peer0.org1.example.com | "2019-05-02 09:27:44.375 UTC [msp.identity] Verify -> DEBU 2000 Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.| +peer0.org1.example.com | 00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.| +peer0.org1.example.com | 00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.| +peer0.org1.example.com | 00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.| +peer0.org1.example.com | 00000040 0a cc ed c2 59 cc c5 |....Y..|" +peer0.org1.example.com | "2019-05-02 09:27:44.376 UTC [msp] DeserializeIdentity -> DEBU 2001 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.377 UTC [msp] DeserializeIdentity -> DEBU 2002 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.377 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2003 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:44.378 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2004 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.378 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2005 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.378 UTC [policies] Evaluate -> DEBU 2006 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.379 UTC [policies] Evaluate -> DEBU 2007 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.379 UTC [policies] Evaluate -> DEBU 2008 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.379 UTC [cauthdsl] func1 -> DEBU 2009 0xc003f16000 gate 1556789264379774000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.380 UTC [cauthdsl] func2 -> DEBU 200a 0xc003f16000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.380 UTC [cauthdsl] func2 -> DEBU 200b 0xc003f16000 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.380 UTC [cauthdsl] func2 -> DEBU 200c 0xc003f16000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.381 UTC [cauthdsl] func2 -> DEBU 200d 0xc003f16000 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.381 UTC [cauthdsl] func1 -> DEBU 200e 0xc003f16000 gate 1556789264379774000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.381 UTC [policies] Evaluate -> DEBU 200f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.382 UTC [policies] Evaluate -> DEBU 2010 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.382 UTC [policies] Evaluate -> DEBU 2011 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.383 UTC [cauthdsl] func1 -> DEBU 2012 0xc003f16840 gate 1556789264383020200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.383 UTC [cauthdsl] func2 -> DEBU 2013 0xc003f16840 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.384 UTC [cauthdsl] func2 -> DEBU 2014 0xc003f16840 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.384 UTC [cauthdsl] func2 -> DEBU 2015 0xc003f16840 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.384 UTC [msp.identity] Verify -> DEBU 2016 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.| +peer0.org1.example.com | 00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|" +peer0.org1.example.com | "2019-05-02 09:27:44.385 UTC [msp.identity] Verify -> DEBU 2017 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..| +peer0.org1.example.com | 00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.| +peer0.org1.example.com | 00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{| +peer0.org1.example.com | 00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.| +peer0.org1.example.com | 00000040 a3 8e ff fc ae d2 |......|" +peer0.org1.example.com | "2019-05-02 09:27:44.386 UTC [cauthdsl] func2 -> DEBU 2018 0xc003f16840 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.386 UTC [cauthdsl] func1 -> DEBU 2019 0xc003f16840 gate 1556789264383020200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.387 UTC [msp] DeserializeIdentity -> DEBU 201e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2020 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 2021 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 2022 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 2023 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 2024 0xc003f17920 gate 1556789264388240100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2025 0xc003f17920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2026 0xc003f17920 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2027 0xc003f17920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2028 0xc003f17920 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 2029 0xc003f17920 gate 1556789264388240100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 202a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 202b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 202c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 202d 0xc003f28160 gate 1556789264388604600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 202e 0xc003f28160 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 202f 0xc003f28160 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2030 0xc003f28160 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [msp.identity] Verify -> DEBU 2031 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.| +peer0.org1.example.com | 00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [msp.identity] Verify -> DEBU 2032 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..| +peer0.org1.example.com | 00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.| +peer0.org1.example.com | 00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{| +peer0.org1.example.com | 00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.| +peer0.org1.example.com | 00000040 a3 8e ff fc ae d2 |......|" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2033 0xc003f28160 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 2034 0xc003f28160 gate 1556789264388604600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2035 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2036 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2037 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2038 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [gossip.gossip] handleMessage -> DEBU 2039 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [gossip.gossip] handleMessage -> DEBU 203a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [msp.identity] Verify -> DEBU 203b Verify: digest = 00000000 68 a0 91 32 58 25 d2 e9 b4 f1 f6 51 2d 2f d9 d1 |h..2X%.....Q-/..| +peer0.org1.example.com | 00000010 6b a5 4d d8 c9 b8 ff bb 59 82 57 08 9b 8e 94 9a |k.M.....Y.W.....|" +peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [msp.identity] Verify -> DEBU 203c Verify: sig = 00000000 30 45 02 21 00 ed 3d 05 5c 5c 47 80 b3 b3 19 40 |0E.!..=.\\G....@| +peer0.org1.example.com | 00000010 d6 c3 20 7b 98 55 5b c3 19 15 67 b4 27 d4 3e d7 |.. {.U[...g.'.>.| +peer0.org1.example.com | 00000020 16 bd 0f f5 d8 02 20 61 ec e8 6c 5f 0d 36 b4 ba |...... a..l_.6..| +peer0.org1.example.com | 00000030 ff a7 9d 63 23 55 67 1f 9e e9 41 fb 03 6e 7b d4 |...c#Ug...A..n{.| +peer0.org1.example.com | 00000040 7e b3 79 82 f0 9e c8 |~.y....|" +peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [msp] DeserializeIdentity -> DEBU 203d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.389 UTC [gossip.gossip] handleMessage -> DEBU 203e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.508 UTC [gossip.gossip] handleMessage -> DEBU 203f Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.510 UTC [msp] DeserializeIdentity -> DEBU 2040 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.512 UTC [msp] DeserializeIdentity -> DEBU 2041 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.514 UTC [gossip.gossip] handleMessage -> DEBU 2042 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.533 UTC [gossip.gossip] handleMessage -> DEBU 2043 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.534 UTC [msp.identity] Verify -> DEBU 2044 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +peer0.org1.example.com | "2019-05-02 09:27:44.534 UTC [msp.identity] Verify -> DEBU 2045 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|" +peer0.org1.example.com | "2019-05-02 09:27:44.535 UTC [gossip.gossip] handleMessage -> DEBU 2046 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.538 UTC [gossip.comm] func1 -> DEBU 2047 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.539 UTC [gossip.gossip] handleMessage -> DEBU 2048 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.542 UTC [msp.identity] Verify -> DEBU 2049 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +peer0.org1.example.com | "2019-05-02 09:27:44.543 UTC [msp.identity] Verify -> DEBU 204a Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|" +peer0.org1.example.com | "2019-05-02 09:27:44.545 UTC [msp] DeserializeIdentity -> DEBU 204b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.546 UTC [gossip.gossip] handleMessage -> DEBU 204c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.547 UTC [gossip.gossip] handleMessage -> DEBU 204d Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.550 UTC [msp.identity] Verify -> DEBU 204e Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +peer0.org1.example.com | "2019-05-02 09:27:44.554 UTC [msp.identity] Verify -> DEBU 204f Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|" +peer0.org1.example.com | "2019-05-02 09:27:44.555 UTC [msp] DeserializeIdentity -> DEBU 2050 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.557 UTC [gossip.gossip] handleMessage -> DEBU 2051 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.558 UTC [gossip.gossip] handleMessage -> DEBU 2052 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.558 UTC [gossip.pull] HandleMessage -> DEBU 2053 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.559 UTC [gossip.pull] SendDigest -> DEBU 2054 Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:44.559 UTC [gossip.gossip] handleMessage -> DEBU 2055 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.597 UTC [endorser] ProcessProposal -> DEBU 2056 Entering: request from 172.18.0.8:57342" +peer0.org1.example.com | "2019-05-02 09:27:44.598 UTC [protoutils] ValidateProposalMessage -> DEBU 2057 ValidateProposalMessage starts for signed proposal 0xc003f0f4f0" +peer0.org1.example.com | "2019-05-02 09:27:44.598 UTC [protoutils] validateChannelHeader -> DEBU 2058 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:44.599 UTC [protoutils] checkSignatureFromCreator -> DEBU 2059 begin" +peer0.org1.example.com | "2019-05-02 09:27:44.600 UTC [msp] GetManagerForChain -> DEBU 205a Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:44.600 UTC [protoutils] checkSignatureFromCreator -> DEBU 205b creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:44.600 UTC [protoutils] checkSignatureFromCreator -> DEBU 205c creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:44.601 UTC [msp.identity] Verify -> DEBU 205d Verify: digest = 00000000 05 b9 fc ac c3 ee 21 f1 43 c8 4a 05 9f 00 46 35 |......!.C.J...F5| +peer0.org1.example.com | 00000010 6d b7 f7 db a4 21 11 69 43 30 ff 70 33 d9 91 e6 |m....!.iC0.p3...|" +peer0.org1.example.com | "2019-05-02 09:27:44.601 UTC [msp.identity] Verify -> DEBU 205e Verify: sig = 00000000 30 45 02 21 00 8a 9d 4c ce e6 14 46 c2 15 1c da |0E.!...L...F....| +peer0.org1.example.com | 00000010 c3 f9 13 21 69 41 d8 e6 cf 1a 15 50 e0 79 f9 0d |...!iA.....P.y..| +peer0.org1.example.com | 00000020 9a aa 91 d5 b6 02 20 7f ba db a0 5b bd 58 9a d4 |...... ....[.X..| +peer0.org1.example.com | 00000030 85 33 96 73 93 84 07 0d f0 eb 6a 20 d5 23 6d e3 |.3.s......j .#m.| +peer0.org1.example.com | 00000040 d0 d4 38 fb 65 8a e4 |..8.e..|" +peer0.org1.example.com | "2019-05-02 09:27:44.602 UTC [protoutils] checkSignatureFromCreator -> DEBU 205f exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:44.603 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2060 validateChaincodeProposalMessage starts for proposal 0xc003169880, header 0xc003f0f900" +peer0.org1.example.com | "2019-05-02 09:27:44.603 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2061 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:44.604 UTC [endorser] preProcess -> DEBU 2062 [businesschannel][6275b52f] processing txid: 6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194" +peer0.org1.example.com | "2019-05-02 09:27:44.604 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2063 retrieveTransactionByID() - txId = [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]" +peer0.org1.example.com | "2019-05-02 09:27:44.605 UTC [aclmgmt] CheckACL -> DEBU 2064 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-05-02 09:27:44.605 UTC [aclmgmt] CheckACL -> DEBU 2065 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-05-02 09:27:44.606 UTC [policies] Evaluate -> DEBU 2066 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.606 UTC [policies] Evaluate -> DEBU 2067 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.606 UTC [policies] Evaluate -> DEBU 2068 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [cauthdsl] func1 -> DEBU 2069 0xc003faa430 gate 1556789264607014800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [cauthdsl] func2 -> DEBU 206a 0xc003faa430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [cauthdsl] func2 -> DEBU 206b 0xc003faa430 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [cauthdsl] func2 -> DEBU 206c 0xc003faa430 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [msp.identity] Verify -> DEBU 206d Verify: digest = 00000000 05 b9 fc ac c3 ee 21 f1 43 c8 4a 05 9f 00 46 35 |......!.C.J...F5| +peer0.org1.example.com | 00000010 6d b7 f7 db a4 21 11 69 43 30 ff 70 33 d9 91 e6 |m....!.iC0.p3...|" +peer0.org1.example.com | "2019-05-02 09:27:44.607 UTC [msp.identity] Verify -> DEBU 206e Verify: sig = 00000000 30 45 02 21 00 8a 9d 4c ce e6 14 46 c2 15 1c da |0E.!...L...F....| +peer0.org1.example.com | 00000010 c3 f9 13 21 69 41 d8 e6 cf 1a 15 50 e0 79 f9 0d |...!iA.....P.y..| +peer0.org1.example.com | 00000020 9a aa 91 d5 b6 02 20 7f ba db a0 5b bd 58 9a d4 |...... ....[.X..| +peer0.org1.example.com | 00000030 85 33 96 73 93 84 07 0d f0 eb 6a 20 d5 23 6d e3 |.3.s......j .#m.| +peer0.org1.example.com | 00000040 d0 d4 38 fb 65 8a e4 |..8.e..|" +peer0.org1.example.com | "2019-05-02 09:27:44.608 UTC [cauthdsl] func2 -> DEBU 206f 0xc003faa430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.608 UTC [cauthdsl] func1 -> DEBU 2070 0xc003faa430 gate 1556789264607014800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.608 UTC [policies] Evaluate -> DEBU 2071 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:44.608 UTC [policies] Evaluate -> DEBU 2072 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:44.609 UTC [policies] Evaluate -> DEBU 2073 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:44.610 UTC [policies] Evaluate -> DEBU 2074 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2075 constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2076 constructing new tx simulator txid = [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]" +peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [endorser] SimulateProposal -> DEBU 2077 [businesschannel][6275b52f] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [stateleveldb] GetState -> DEBU 2078 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [endorser] callChaincode -> INFO 2079 [businesschannel][6275b52f] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [stateleveldb] GetState -> DEBU 207a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [stateleveldb] GetState -> DEBU 207b GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:44.611 UTC [chaincode] Execute -> DEBU 207c Entry" +peer0.org1.example.com | "2019-05-02 09:27:44.614 UTC [chaincode] handleMessage -> DEBU 207d [6275b52f] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:44.614 UTC [chaincode] HandleTransaction -> DEBU 207e [6275b52f] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:44.615 UTC [chaincode] HandleGetState -> DEBU 207f [6275b52f] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:44.616 UTC [stateleveldb] GetState -> DEBU 2080 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-05-02 09:27:44.616 UTC [chaincode] HandleTransaction -> DEBU 2081 [6275b52f] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:44.618 UTC [chaincode] handleMessage -> DEBU 2082 [6275b52f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:44.618 UTC [chaincode] Notify -> DEBU 2083 [6275b52f] notifying Txid:6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:44.618 UTC [chaincode] Execute -> DEBU 2084 Exit" +peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [endorser] callChaincode -> INFO 2085 [businesschannel][6275b52f] Exit chaincode: name:"exp02" (8ms)" +peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2086 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [lockbasedtxmgr] Done -> DEBU 2087 Done with transaction simulation / query execution [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]" +peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [endorser] SimulateProposal -> DEBU 2088 [businesschannel][6275b52f] Exit" +peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [endorser] endorseProposal -> DEBU 2089 [businesschannel][6275b52f] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [endorser] endorseProposal -> DEBU 208a [businesschannel][6275b52f] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [endorser] EndorseWithPlugin -> DEBU 208b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [msp.identity] Sign -> DEBU 208c Sign: plaintext: 0A2016C9E5582572B616B57E921F3163...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:44.619 UTC [msp.identity] Sign -> DEBU 208d Sign: digest: B643F95F5B181D7978F3F4783F2442A823828DD53166EBEC9053658240DCBA96 " +peer0.org1.example.com | "2019-05-02 09:27:44.620 UTC [endorser] EndorseWithPlugin -> DEBU 208e Exiting {plugin: escc, channel: businesschannel, tx: 6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:44.620 UTC [endorser] endorseProposal -> DEBU 208f [businesschannel][6275b52f] Exit" +peer0.org1.example.com | "2019-05-02 09:27:44.620 UTC [lockbasedtxmgr] Done -> DEBU 2090 Done with transaction simulation / query execution [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]" +peer0.org1.example.com | "2019-05-02 09:27:44.620 UTC [endorser] func1 -> DEBU 2091 Exit: request from 172.18.0.8:57342" +peer0.org1.example.com | "2019-05-02 09:27:44.620 UTC [comm.grpc.server] 1 -> INFO 2092 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57342 grpc.code=OK grpc.call_duration=23.2448ms +peer0.org1.example.com | "2019-05-02 09:27:44.626 UTC [grpc] infof -> DEBU 2093 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:44.628 UTC [grpc] infof -> DEBU 2094 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:44.752 UTC [gossip.gossip] handleMessage -> DEBU 2095 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.752 UTC [msp] DeserializeIdentity -> DEBU 2096 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.752 UTC [msp] DeserializeIdentity -> DEBU 2097 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.752 UTC [msp] DeserializeIdentity -> DEBU 2098 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.752 UTC [gossip.gossip] handleMessage -> DEBU 2099 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.758 UTC [gossip.gossip] handleMessage -> DEBU 209a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789261478309200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [msp] DeserializeIdentity -> DEBU 209b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 209c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 209d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 209e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [policies] Evaluate -> DEBU 209f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [policies] Evaluate -> DEBU 20a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.759 UTC [policies] Evaluate -> DEBU 20a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func1 -> DEBU 20a2 0xc003fc1da0 gate 1556789264760273600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a3 0xc003fc1da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a4 0xc003fc1da0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a5 0xc003fc1da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a6 0xc003fc1da0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [cauthdsl] func1 -> DEBU 20a7 0xc003fc1da0 gate 1556789264760273600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [policies] Evaluate -> DEBU 20a8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [policies] Evaluate -> DEBU 20a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.760 UTC [policies] Evaluate -> DEBU 20aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func1 -> DEBU 20ab 0xc003fd85e0 gate 1556789264760892200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20ac 0xc003fd85e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20ad 0xc003fd85e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20ae 0xc003fd85e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [msp.identity] Verify -> DEBU 20af Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [msp.identity] Verify -> DEBU 20b0 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|" +peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20b1 0xc003fd85e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.761 UTC [cauthdsl] func1 -> DEBU 20b2 0xc003fd85e0 gate 1556789264760892200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [msp] DeserializeIdentity -> DEBU 20b7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.762 UTC [gossip.gossip] handleMessage -> DEBU 20b8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.778 UTC [gossip.comm] func1 -> DEBU 20b9 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789261478309200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.779 UTC [gossip.gossip] handleMessage -> DEBU 20ba Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789261478309200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.779 UTC [msp] DeserializeIdentity -> DEBU 20bb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.780 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:44.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20bd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20be Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.780 UTC [policies] Evaluate -> DEBU 20bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.781 UTC [policies] Evaluate -> DEBU 20c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.781 UTC [policies] Evaluate -> DEBU 20c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.782 UTC [cauthdsl] func1 -> DEBU 20c2 0xc003fb9500 gate 1556789264782028100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.782 UTC [cauthdsl] func2 -> DEBU 20c3 0xc003fb9500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.782 UTC [cauthdsl] func2 -> DEBU 20c4 0xc003fb9500 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.783 UTC [cauthdsl] func2 -> DEBU 20c5 0xc003fb9500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.783 UTC [cauthdsl] func2 -> DEBU 20c6 0xc003fb9500 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.784 UTC [cauthdsl] func1 -> DEBU 20c7 0xc003fb9500 gate 1556789264782028100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.784 UTC [policies] Evaluate -> DEBU 20c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.784 UTC [policies] Evaluate -> DEBU 20c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.785 UTC [policies] Evaluate -> DEBU 20ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.785 UTC [cauthdsl] func1 -> DEBU 20cb 0xc003fb9d40 gate 1556789264785304500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.785 UTC [cauthdsl] func2 -> DEBU 20cc 0xc003fb9d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.786 UTC [cauthdsl] func2 -> DEBU 20cd 0xc003fb9d40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.786 UTC [cauthdsl] func2 -> DEBU 20ce 0xc003fb9d40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.787 UTC [msp.identity] Verify -> DEBU 20cf Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +peer0.org1.example.com | "2019-05-02 09:27:44.787 UTC [msp.identity] Verify -> DEBU 20d0 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|" +peer0.org1.example.com | "2019-05-02 09:27:44.788 UTC [cauthdsl] func2 -> DEBU 20d1 0xc003fb9d40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.789 UTC [cauthdsl] func1 -> DEBU 20d2 0xc003fb9d40 gate 1556789264785304500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.790 UTC [policies] Evaluate -> DEBU 20d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.790 UTC [policies] Evaluate -> DEBU 20d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.791 UTC [policies] Evaluate -> DEBU 20d5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.791 UTC [policies] Evaluate -> DEBU 20d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.792 UTC [msp] DeserializeIdentity -> DEBU 20d7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.792 UTC [gossip.gossip] handleMessage -> DEBU 20d8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.809 UTC [gossip.comm] func1 -> DEBU 20d9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.810 UTC [gossip.gossip] handleMessage -> DEBU 20da Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.811 UTC [gossip.pull] HandleMessage -> DEBU 20db GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.812 UTC [msp] DeserializeIdentity -> DEBU 20dc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.813 UTC [msp] DeserializeIdentity -> DEBU 20dd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.813 UTC [msp] DeserializeIdentity -> DEBU 20de Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.816 UTC [msp] DeserializeIdentity -> DEBU 20df Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.820 UTC [msp] DeserializeIdentity -> DEBU 20e0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.821 UTC [msp] DeserializeIdentity -> DEBU 20e1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.822 UTC [gossip.pull] SendDigest -> DEBU 20e2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:44.828 UTC [gossip.gossip] handleMessage -> DEBU 20e3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [gossip.comm] func1 -> DEBU 20e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [gossip.gossip] handleMessage -> DEBU 20e5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [gossip.gossip] handleMessage -> DEBU 20e6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20e7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20e8 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:44.831 UTC [msp] DeserializeIdentity -> DEBU 20e9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20eb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20ec Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [policies] Evaluate -> DEBU 20ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [policies] Evaluate -> DEBU 20ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.832 UTC [policies] Evaluate -> DEBU 20ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.833 UTC [cauthdsl] func1 -> DEBU 20f0 0xc00400a640 gate 1556789264833723500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f1 0xc00400a640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f2 0xc00400a640 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f3 0xc00400a640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f4 0xc00400a640 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.835 UTC [cauthdsl] func1 -> DEBU 20f5 0xc00400a640 gate 1556789264833723500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:44.835 UTC [policies] Evaluate -> DEBU 20f6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.836 UTC [policies] Evaluate -> DEBU 20f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.836 UTC [policies] Evaluate -> DEBU 20f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.837 UTC [cauthdsl] func1 -> DEBU 20f9 0xc00400ae80 gate 1556789264837180600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.837 UTC [cauthdsl] func2 -> DEBU 20fa 0xc00400ae80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.838 UTC [cauthdsl] func2 -> DEBU 20fb 0xc00400ae80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.838 UTC [cauthdsl] func2 -> DEBU 20fc 0xc00400ae80 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.838 UTC [msp.identity] Verify -> DEBU 20fd Verify: digest = 00000000 a6 a7 92 68 5a bc 0b 59 b5 18 8f 0c 50 9b 2c 00 |...hZ..Y....P.,.| +peer0.org1.example.com | 00000010 db ed fe d4 cf 42 a0 a0 8d 67 f3 78 01 e0 b3 bf |.....B...g.x....|" +peer0.org1.example.com | "2019-05-02 09:27:44.838 UTC [msp.identity] Verify -> DEBU 20fe Verify: sig = 00000000 30 44 02 20 02 03 e4 d0 97 3c 8c bc f3 06 74 44 |0D. .....<....tD| +peer0.org1.example.com | 00000010 40 7b 3d d9 9b bf 55 e6 99 75 71 e9 c2 b2 9b fa |@{=...U..uq.....| +peer0.org1.example.com | 00000020 90 30 08 da 02 20 48 50 3e 4e 5f a5 c8 4c c0 61 |.0... HP>N_..L.a| +peer0.org1.example.com | 00000030 42 55 8b e3 28 83 0e 74 b6 02 94 1d 90 a0 6d 7c |BU..(..t......m|| +peer0.org1.example.com | 00000040 45 0c aa 29 2f 38 |E..)/8|" +peer0.org1.example.com | "2019-05-02 09:27:44.839 UTC [cauthdsl] func2 -> DEBU 20ff 0xc00400ae80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.840 UTC [cauthdsl] func1 -> DEBU 2100 0xc00400ae80 gate 1556789264837180600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.840 UTC [policies] Evaluate -> DEBU 2101 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.840 UTC [policies] Evaluate -> DEBU 2102 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.840 UTC [policies] Evaluate -> DEBU 2103 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.841 UTC [policies] Evaluate -> DEBU 2104 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:44.842 UTC [gossip.discovery] handleAliveMessage -> DEBU 2105 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.843 UTC [gossip.discovery] learnExistingMembers -> DEBU 2106 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:44.843 UTC [gossip.discovery] learnExistingMembers -> DEBU 2107 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 " +peer0.org1.example.com | "2019-05-02 09:27:44.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 2108 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 " +peer0.org1.example.com | "2019-05-02 09:27:44.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 2109 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:44.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 210a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 210b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 210c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.848 UTC [gossip.discovery] sendMemResponse -> DEBU 210d Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:44.851 UTC [msp] DeserializeIdentity -> DEBU 210e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.855 UTC [msp] DeserializeIdentity -> DEBU 210f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.859 UTC [msp] DeserializeIdentity -> DEBU 2110 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.861 UTC [gossip.comm] Send -> DEBU 2111 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.862 UTC [gossip.discovery] sendMemResponse -> DEBU 2112 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:44.863 UTC [gossip.comm] sendToEndpoint -> DEBU 2113 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.863 UTC [gossip.comm] sendToEndpoint -> DEBU 2114 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [endorser] ProcessProposal -> DEBU 2115 Entering: request from 172.18.0.8:57346" +peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [protoutils] ValidateProposalMessage -> DEBU 2116 ValidateProposalMessage starts for signed proposal 0xc003ff6a50" +peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [protoutils] validateChannelHeader -> DEBU 2117 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [protoutils] checkSignatureFromCreator -> DEBU 2118 begin" +peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [msp] GetManagerForChain -> DEBU 2119 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [protoutils] checkSignatureFromCreator -> DEBU 211a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [protoutils] checkSignatureFromCreator -> DEBU 211b creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [msp.identity] Verify -> DEBU 211c Verify: digest = 00000000 7b 47 04 43 bc 4c a1 97 74 8c 8c 95 9d 9e 84 19 |{G.C.L..t.......| +peer0.org1.example.com | 00000010 de e0 8c f1 94 9d 53 b8 60 46 13 cc c0 45 30 30 |......S.`F...E00|" +peer0.org1.example.com | "2019-05-02 09:27:44.935 UTC [msp.identity] Verify -> DEBU 211d Verify: sig = 00000000 30 44 02 20 4f 33 85 1c 6e ab 90 c1 51 95 39 6d |0D. O3..n...Q.9m| +peer0.org1.example.com | 00000010 54 d5 05 b7 37 dd a5 6d 5a b0 14 3b 5e c7 c9 90 |T...7..mZ..;^...| +peer0.org1.example.com | 00000020 eb 9b 9f 38 02 20 61 cd 39 fa 18 39 95 e9 47 1c |...8. a.9..9..G.| +peer0.org1.example.com | 00000030 64 6d 09 15 34 55 3f 4a 01 f2 06 e8 12 11 b7 f6 |dm..4U?J........| +peer0.org1.example.com | 00000040 ca 33 35 5c 97 9c |.35\..|" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [protoutils] checkSignatureFromCreator -> DEBU 211e exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 211f validateChaincodeProposalMessage starts for proposal 0xc0034600e0, header 0xc003ff6e60" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2120 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [endorser] preProcess -> DEBU 2121 [businesschannel][91a569c2] processing txid: 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2122 retrieveTransactionByID() - txId = [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [aclmgmt] CheckACL -> DEBU 2123 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [aclmgmt] CheckACL -> DEBU 2124 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [policies] Evaluate -> DEBU 2125 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [policies] Evaluate -> DEBU 2126 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [policies] Evaluate -> DEBU 2127 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [cauthdsl] func1 -> DEBU 2128 0xc00406f0c0 gate 1556789264936683300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [cauthdsl] func2 -> DEBU 2129 0xc00406f0c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [cauthdsl] func2 -> DEBU 212a 0xc00406f0c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [cauthdsl] func2 -> DEBU 212b 0xc00406f0c0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [msp.identity] Verify -> DEBU 212c Verify: digest = 00000000 7b 47 04 43 bc 4c a1 97 74 8c 8c 95 9d 9e 84 19 |{G.C.L..t.......| +peer0.org1.example.com | 00000010 de e0 8c f1 94 9d 53 b8 60 46 13 cc c0 45 30 30 |......S.`F...E00|" +peer0.org1.example.com | "2019-05-02 09:27:44.936 UTC [msp.identity] Verify -> DEBU 212d Verify: sig = 00000000 30 44 02 20 4f 33 85 1c 6e ab 90 c1 51 95 39 6d |0D. O3..n...Q.9m| +peer0.org1.example.com | 00000010 54 d5 05 b7 37 dd a5 6d 5a b0 14 3b 5e c7 c9 90 |T...7..mZ..;^...| +peer0.org1.example.com | 00000020 eb 9b 9f 38 02 20 61 cd 39 fa 18 39 95 e9 47 1c |...8. a.9..9..G.| +peer0.org1.example.com | 00000030 64 6d 09 15 34 55 3f 4a 01 f2 06 e8 12 11 b7 f6 |dm..4U?J........| +peer0.org1.example.com | 00000040 ca 33 35 5c 97 9c |.35\..|" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [cauthdsl] func2 -> DEBU 212e 0xc00406f0c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [cauthdsl] func1 -> DEBU 212f 0xc00406f0c0 gate 1556789264936683300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2130 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2131 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2132 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2133 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2134 constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2135 constructing new tx simulator txid = [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [endorser] SimulateProposal -> DEBU 2136 [businesschannel][91a569c2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [stateleveldb] GetState -> DEBU 2137 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [endorser] callChaincode -> INFO 2138 [businesschannel][91a569c2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [stateleveldb] GetState -> DEBU 2139 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:44.937 UTC [stateleveldb] GetState -> DEBU 213a GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:44.938 UTC [chaincode] Execute -> DEBU 213b Entry" +peer0.org1.example.com | "2019-05-02 09:27:44.940 UTC [chaincode] handleMessage -> DEBU 213c [91a569c2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:44.943 UTC [chaincode] HandleTransaction -> DEBU 213d [91a569c2] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:44.943 UTC [chaincode] HandleGetState -> DEBU 213e [91a569c2] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:44.943 UTC [stateleveldb] GetState -> DEBU 213f GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-05-02 09:27:44.943 UTC [chaincode] HandleTransaction -> DEBU 2140 [91a569c2] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:44.944 UTC [chaincode] handleMessage -> DEBU 2141 [91a569c2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:44.944 UTC [chaincode] HandleTransaction -> DEBU 2142 [91a569c2] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:44.945 UTC [chaincode] HandleGetState -> DEBU 2143 [91a569c2] getting state for chaincode exp02, key b, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:44.945 UTC [stateleveldb] GetState -> DEBU 2144 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-05-02 09:27:44.945 UTC [chaincode] HandleTransaction -> DEBU 2145 [91a569c2] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:44.946 UTC [chaincode] handleMessage -> DEBU 2146 [91a569c2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:44.946 UTC [chaincode] HandleTransaction -> DEBU 2147 [91a569c2] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:44.946 UTC [chaincode] HandleTransaction -> DEBU 2148 [91a569c2] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:44.947 UTC [chaincode] handleMessage -> DEBU 2149 [91a569c2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:44.948 UTC [chaincode] HandleTransaction -> DEBU 214a [91a569c2] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:44.948 UTC [chaincode] HandleTransaction -> DEBU 214b [91a569c2] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:44.953 UTC [chaincode] handleMessage -> DEBU 214c [91a569c2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:44.953 UTC [chaincode] Notify -> DEBU 214d [91a569c2] notifying Txid:91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:44.953 UTC [chaincode] Execute -> DEBU 214e Exit" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] callChaincode -> INFO 214f [businesschannel][91a569c2] Exit chaincode: name:"exp02" (16ms)" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2150 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [lockbasedtxmgr] Done -> DEBU 2151 Done with transaction simulation / query execution [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] SimulateProposal -> DEBU 2152 [businesschannel][91a569c2] Exit" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] endorseProposal -> DEBU 2153 [businesschannel][91a569c2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] endorseProposal -> DEBU 2154 [businesschannel][91a569c2] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] EndorseWithPlugin -> DEBU 2155 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [msp.identity] Sign -> DEBU 2156 Sign: plaintext: 0A20908C75852A885565668F0D75711B...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [msp.identity] Sign -> DEBU 2157 Sign: digest: 9AC01AB8D461550F6863AE2639A725BB3AE3FB9D572FCF35921F0C195B81F48D " +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] EndorseWithPlugin -> DEBU 2158 Exiting {plugin: escc, channel: businesschannel, tx: 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] endorseProposal -> DEBU 2159 [businesschannel][91a569c2] Exit" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [lockbasedtxmgr] Done -> DEBU 215a Done with transaction simulation / query execution [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [endorser] func1 -> DEBU 215b Exit: request from 172.18.0.8:57346" +peer0.org1.example.com | "2019-05-02 09:27:44.954 UTC [comm.grpc.server] 1 -> INFO 215c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57346 grpc.code=OK grpc.call_duration=19.9116ms +peer0.org1.example.com | "2019-05-02 09:27:44.963 UTC [grpc] infof -> DEBU 215d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:44.964 UTC [grpc] infof -> DEBU 215e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:44.982 UTC [gossip.comm] func1 -> DEBU 215f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.982 UTC [gossip.gossip] handleMessage -> DEBU 2160 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.982 UTC [msp] DeserializeIdentity -> DEBU 2161 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.982 UTC [msp] DeserializeIdentity -> DEBU 2162 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.982 UTC [msp] DeserializeIdentity -> DEBU 2163 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.983 UTC [gossip.gossip] handleMessage -> DEBU 2164 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2165 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2166 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.984 UTC [gossip.pull] Hello -> DEBU 2167 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2168 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2169 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.985 UTC [gossip.comm] Send -> DEBU 216a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:44.985 UTC [gossip.comm] sendToEndpoint -> DEBU 216b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.985 UTC [gossip.comm] sendToEndpoint -> DEBU 216c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.987 UTC [gossip.gossip] handleMessage -> DEBU 216d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18006043574656057052 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6], Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.988 UTC [gossip.pull] HandleMessage -> DEBU 216e GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18006043574656057052 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6], Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.990 UTC [gossip.gossip] handleMessage -> DEBU 216f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:44.991 UTC [gossip.comm] func1 -> DEBU 2170 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789261482151800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.998 UTC [gossip.gossip] handleMessage -> DEBU 2171 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789261482151800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:44.999 UTC [msp] DeserializeIdentity -> DEBU 2172 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:44.999 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2173 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:45.000 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2174 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:45.000 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2175 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:45.000 UTC [policies] Evaluate -> DEBU 2176 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.001 UTC [policies] Evaluate -> DEBU 2177 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:45.001 UTC [policies] Evaluate -> DEBU 2178 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.002 UTC [cauthdsl] func1 -> DEBU 2179 0xc0040ba360 gate 1556789265002127200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:45.002 UTC [cauthdsl] func2 -> DEBU 217a 0xc0040ba360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:45.002 UTC [cauthdsl] func2 -> DEBU 217b 0xc0040ba360 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:45.003 UTC [cauthdsl] func2 -> DEBU 217c 0xc0040ba360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:45.003 UTC [cauthdsl] func2 -> DEBU 217d 0xc0040ba360 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:45.004 UTC [cauthdsl] func1 -> DEBU 217e 0xc0040ba360 gate 1556789265002127200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:45.004 UTC [policies] Evaluate -> DEBU 217f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.005 UTC [policies] Evaluate -> DEBU 2180 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.006 UTC [policies] Evaluate -> DEBU 2181 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.006 UTC [cauthdsl] func1 -> DEBU 2182 0xc0040baba0 gate 1556789265006776800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:45.007 UTC [cauthdsl] func2 -> DEBU 2183 0xc0040baba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:45.009 UTC [cauthdsl] func2 -> DEBU 2184 0xc0040baba0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:45.010 UTC [cauthdsl] func2 -> DEBU 2185 0xc0040baba0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:45.011 UTC [msp.identity] Verify -> DEBU 2186 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.| +peer0.org1.example.com | 00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|" +peer0.org1.example.com | "2019-05-02 09:27:45.011 UTC [msp.identity] Verify -> DEBU 2187 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..| +peer0.org1.example.com | 00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.| +peer0.org1.example.com | 00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{| +peer0.org1.example.com | 00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.| +peer0.org1.example.com | 00000040 a3 8e ff fc ae d2 |......|" +peer0.org1.example.com | "2019-05-02 09:27:45.014 UTC [cauthdsl] func2 -> DEBU 2188 0xc0040baba0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:45.015 UTC [cauthdsl] func1 -> DEBU 2189 0xc0040baba0 gate 1556789265006776800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:45.015 UTC [policies] Evaluate -> DEBU 218a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.020 UTC [policies] Evaluate -> DEBU 218b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.020 UTC [policies] Evaluate -> DEBU 218c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.021 UTC [policies] Evaluate -> DEBU 218d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.021 UTC [msp] DeserializeIdentity -> DEBU 218e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.022 UTC [gossip.gossip] handleMessage -> DEBU 218f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.pull] Hello -> DEBU 2190 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.comm] Send -> DEBU 2191 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.pull] Hello -> DEBU 2192 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.comm] Send -> DEBU 2193 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.pull] Hello -> DEBU 2194 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:45.089 UTC [gossip.comm] Send -> DEBU 2195 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2196 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2197 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2198 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2199 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 219a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 219b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.092 UTC [gossip.gossip] handleMessage -> DEBU 219c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13881127896331448771 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.093 UTC [gossip.pull] HandleMessage -> DEBU 219d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13881127896331448771 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.093 UTC [gossip.gossip] handleMessage -> DEBU 219e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.094 UTC [gossip.gossip] handleMessage -> DEBU 219f Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2785192085220839402 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.pull] HandleMessage -> DEBU 21a0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2785192085220839402 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.gossip] handleMessage -> DEBU 21a1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.gossip] handleMessage -> DEBU 21a2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.pull] HandleMessage -> DEBU 21a3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.pull] SendDigest -> DEBU 21a4 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:45.098 UTC [gossip.gossip] handleMessage -> DEBU 21a5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.099 UTC [gossip.comm] func1 -> DEBU 21a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7026397414490242265 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.099 UTC [gossip.gossip] handleMessage -> DEBU 21a7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7026397414490242265 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.100 UTC [gossip.pull] HandleMessage -> DEBU 21a8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7026397414490242265 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.100 UTC [gossip.gossip] handleMessage -> DEBU 21a9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.104 UTC [gossip.gossip] handleMessage -> DEBU 21aa Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.104 UTC [gossip.gossip] handleMessage -> DEBU 21ab Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.104 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21ad Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:45.104 UTC [msp.identity] Verify -> DEBU 21ae Verify: digest = 00000000 2b b8 6b 30 a6 63 df a7 45 aa a7 ab 76 2f 06 88 |+.k0.c..E...v/..| +peer0.org1.example.com | 00000010 f6 b4 23 fe a0 90 7e 71 fd 2f 60 2b 08 df 26 ba |..#...~q./`+..&.|" +peer0.org1.example.com | "2019-05-02 09:27:45.105 UTC [msp.identity] Verify -> DEBU 21af Verify: sig = 00000000 30 45 02 21 00 ae 88 d5 57 8c 0d d3 40 50 54 8d |0E.!....W...@PT.| +peer0.org1.example.com | 00000010 87 65 bd bd 0d c9 b8 88 2c 41 ea 8f 5d 07 3a 10 |.e......,A..].:.| +peer0.org1.example.com | 00000020 3c ad bb 35 e1 02 20 78 cc a7 6e 7a ef 65 75 d3 |<..5.. x..nz.eu.| +peer0.org1.example.com | 00000030 d5 83 1b d6 9c bc 21 a1 1d ee 61 19 2e 41 4c bd |......!...a..AL.| +peer0.org1.example.com | 00000040 2b 41 be 7b 18 0d 25 |+A.{..%|" +peer0.org1.example.com | "2019-05-02 09:27:45.105 UTC [msp.identity] Verify -> DEBU 21b0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:45.105 UTC [msp.identity] Verify -> DEBU 21b1 Verify: sig = 00000000 30 45 02 21 00 a5 25 fe 94 c7 0d 11 eb ed 47 49 |0E.!..%.......GI| +peer0.org1.example.com | 00000010 88 ca a1 4f 27 aa fe 7d 11 2a 5f 1c d9 36 23 06 |...O'..}.*_..6#.| +peer0.org1.example.com | 00000020 e5 71 3c 79 30 02 20 36 75 18 6b 49 65 24 5b 60 |.q DEBU 21b2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b4 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 " +peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 " +peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.109 UTC [gossip.discovery] handleAliveMessage -> DEBU 21b8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [gossip.discovery] sendMemResponse -> DEBU 21b9 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [msp] DeserializeIdentity -> DEBU 21ba Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [msp] DeserializeIdentity -> DEBU 21bb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [gossip.comm] Send -> DEBU 21bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [gossip.discovery] sendMemResponse -> DEBU 21bd Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [gossip.comm] sendToEndpoint -> DEBU 21be Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.110 UTC [gossip.comm] sendToEndpoint -> DEBU 21bf Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.111 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21c0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101A " +peer0.org1.example.com | "2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c2 Sign: digest: 7CB586E87BFDA30C828413BD4F6FDC5D74552CD642416B1977CDB79AE5A10AD0 " +peer0.org1.example.com | "2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:45.113 UTC [gossip.comm] Send -> DEBU 21c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:45.114 UTC [msp] DeserializeIdentity -> DEBU 21c6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.114 UTC [gossip.comm] Send -> DEBU 21c7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:45.114 UTC [msp] DeserializeIdentity -> DEBU 21c8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.114 UTC [gossip.comm] Send -> DEBU 21c9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21ca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21ce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cf Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.120 UTC [gossip.gossip] handleMessage -> DEBU 21d0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.121 UTC [gossip.gossip] handleMessage -> DEBU 21d1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.121 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21d3 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [msp] DeserializeIdentity -> DEBU 21d4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21d6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21d7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [policies] Evaluate -> DEBU 21d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [policies] Evaluate -> DEBU 21d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [policies] Evaluate -> DEBU 21da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.122 UTC [cauthdsl] func1 -> DEBU 21db 0xc0041148c0 gate 1556789265122938500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21dc 0xc0041148c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21dd 0xc0041148c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21de 0xc0041148c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21df 0xc0041148c0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func1 -> DEBU 21e0 0xc0041148c0 gate 1556789265122938500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [policies] Evaluate -> DEBU 21e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [policies] Evaluate -> DEBU 21e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [policies] Evaluate -> DEBU 21e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func1 -> DEBU 21e4 0xc004115100 gate 1556789265123536700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21e5 0xc004115100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21e6 0xc004115100 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21e7 0xc004115100 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [msp.identity] Verify -> DEBU 21e8 Verify: digest = 00000000 a6 a7 92 68 5a bc 0b 59 b5 18 8f 0c 50 9b 2c 00 |...hZ..Y....P.,.| +peer0.org1.example.com | 00000010 db ed fe d4 cf 42 a0 a0 8d 67 f3 78 01 e0 b3 bf |.....B...g.x....|" +peer0.org1.example.com | "2019-05-02 09:27:45.123 UTC [msp.identity] Verify -> DEBU 21e9 Verify: sig = 00000000 30 44 02 20 02 03 e4 d0 97 3c 8c bc f3 06 74 44 |0D. .....<....tD| +peer0.org1.example.com | 00000010 40 7b 3d d9 9b bf 55 e6 99 75 71 e9 c2 b2 9b fa |@{=...U..uq.....| +peer0.org1.example.com | 00000020 90 30 08 da 02 20 48 50 3e 4e 5f a5 c8 4c c0 61 |.0... HP>N_..L.a| +peer0.org1.example.com | 00000030 42 55 8b e3 28 83 0e 74 b6 02 94 1d 90 a0 6d 7c |BU..(..t......m|| +peer0.org1.example.com | 00000040 45 0c aa 29 2f 38 |E..)/8|" +peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [cauthdsl] func2 -> DEBU 21ea 0xc004115100 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [cauthdsl] func1 -> DEBU 21eb 0xc004115100 gate 1556789265123536700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ee Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21f2 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:45.124 UTC [msp.identity] Verify -> DEBU 21f3 Verify: digest = 00000000 2b b8 6b 30 a6 63 df a7 45 aa a7 ab 76 2f 06 88 |+.k0.c..E...v/..| +peer0.org1.example.com | 00000010 f6 b4 23 fe a0 90 7e 71 fd 2f 60 2b 08 df 26 ba |..#...~q./`+..&.|" +peer0.org1.example.com | "2019-05-02 09:27:45.125 UTC [msp.identity] Verify -> DEBU 21f4 Verify: sig = 00000000 30 45 02 21 00 ae 88 d5 57 8c 0d d3 40 50 54 8d |0E.!....W...@PT.| +peer0.org1.example.com | 00000010 87 65 bd bd 0d c9 b8 88 2c 41 ea 8f 5d 07 3a 10 |.e......,A..].:.| +peer0.org1.example.com | 00000020 3c ad bb 35 e1 02 20 78 cc a7 6e 7a ef 65 75 d3 |<..5.. x..nz.eu.| +peer0.org1.example.com | 00000030 d5 83 1b d6 9c bc 21 a1 1d ee 61 19 2e 41 4c bd |......!...a..AL.| +peer0.org1.example.com | 00000040 2b 41 be 7b 18 0d 25 |+A.{..%|" +peer0.org1.example.com | "2019-05-02 09:27:45.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.125 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21f7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:45.125 UTC [msp.identity] Verify -> DEBU 21f8 Verify: digest = 00000000 7c b5 86 e8 7b fd a3 0c 82 84 13 bd 4f 6f dc 5d ||...{.......Oo.]| +peer0.org1.example.com | 00000010 74 55 2c d6 42 41 6b 19 77 cd b7 9a e5 a1 0a d0 |tU,.BAk.w.......|" +peer0.org1.example.com | "2019-05-02 09:27:45.126 UTC [msp.identity] Verify -> DEBU 21f9 Verify: sig = 00000000 30 44 02 20 38 11 34 ca ff 0c da c3 43 1d 72 0c |0D. 8.4.....C.r.| +peer0.org1.example.com | 00000010 81 4d 79 09 fd 7e 87 3f 5d 87 16 2b e9 06 e5 3a |.My..~.?]..+...:| +peer0.org1.example.com | 00000020 c5 b1 61 b4 02 20 48 2d 51 e9 e7 18 da 48 3c cd |..a.. H-Q....H<.| +peer0.org1.example.com | 00000030 e7 3e 1e 14 bc a7 e8 28 5e a1 e3 e0 c4 4c 74 b1 |.>.....(^....Lt.| +peer0.org1.example.com | 00000040 8c 40 2b c8 f5 43 |.@+..C|" +peer0.org1.example.com | "2019-05-02 09:27:45.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 21fa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.126 UTC [gossip.discovery] isSentByMe -> DEBU 21fb Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 21fc Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.126 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21fd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.137 UTC [gossip.comm] func1 -> DEBU 21fe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.137 UTC [gossip.gossip] handleMessage -> DEBU 21ff Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.137 UTC [gossip.gossip] handleMessage -> DEBU 2200 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.137 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2201 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.138 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2202 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:45.139 UTC [gossip.gossip] handleMessage -> DEBU 2203 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.138 UTC [msp.identity] Verify -> DEBU 2204 Verify: digest = 00000000 7c b5 86 e8 7b fd a3 0c 82 84 13 bd 4f 6f dc 5d ||...{.......Oo.]| +peer0.org1.example.com | 00000010 74 55 2c d6 42 41 6b 19 77 cd b7 9a e5 a1 0a d0 |tU,.BAk.w.......|" +peer0.org1.example.com | "2019-05-02 09:27:45.139 UTC [msp.identity] Verify -> DEBU 2205 Verify: sig = 00000000 30 44 02 20 38 11 34 ca ff 0c da c3 43 1d 72 0c |0D. 8.4.....C.r.| +peer0.org1.example.com | 00000010 81 4d 79 09 fd 7e 87 3f 5d 87 16 2b e9 06 e5 3a |.My..~.?]..+...:| +peer0.org1.example.com | 00000020 c5 b1 61 b4 02 20 48 2d 51 e9 e7 18 da 48 3c cd |..a.. H-Q....H<.| +peer0.org1.example.com | 00000030 e7 3e 1e 14 bc a7 e8 28 5e a1 e3 e0 c4 4c 74 b1 |.>.....(^....Lt.| +peer0.org1.example.com | 00000040 8c 40 2b c8 f5 43 |.@+..C|" +peer0.org1.example.com | "2019-05-02 09:27:45.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 2206 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.140 UTC [gossip.discovery] isSentByMe -> DEBU 2207 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 2208 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.140 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2209 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:45.141 UTC [msp.identity] Verify -> DEBU 220a Verify: digest = 00000000 2b b8 6b 30 a6 63 df a7 45 aa a7 ab 76 2f 06 88 |+.k0.c..E...v/..| +peer0.org1.example.com | 00000010 f6 b4 23 fe a0 90 7e 71 fd 2f 60 2b 08 df 26 ba |..#...~q./`+..&.|" +peer0.org1.example.com | "2019-05-02 09:27:45.141 UTC [msp.identity] Verify -> DEBU 220b Verify: sig = 00000000 30 45 02 21 00 ae 88 d5 57 8c 0d d3 40 50 54 8d |0E.!....W...@PT.| +peer0.org1.example.com | 00000010 87 65 bd bd 0d c9 b8 88 2c 41 ea 8f 5d 07 3a 10 |.e......,A..].:.| +peer0.org1.example.com | 00000020 3c ad bb 35 e1 02 20 78 cc a7 6e 7a ef 65 75 d3 |<..5.. x..nz.eu.| +peer0.org1.example.com | 00000030 d5 83 1b d6 9c bc 21 a1 1d ee 61 19 2e 41 4c bd |......!...a..AL.| +peer0.org1.example.com | 00000040 2b 41 be 7b 18 0d 25 |+A.{..%|" +peer0.org1.example.com | "2019-05-02 09:27:45.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 220c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 220d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 220e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 220f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.142 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2210 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:45.142 UTC [gossip.gossip] handleMessage -> DEBU 2211 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.142 UTC [msp.identity] Verify -> DEBU 2212 Verify: digest = 00000000 7c b5 86 e8 7b fd a3 0c 82 84 13 bd 4f 6f dc 5d ||...{.......Oo.]| +peer0.org1.example.com | 00000010 74 55 2c d6 42 41 6b 19 77 cd b7 9a e5 a1 0a d0 |tU,.BAk.w.......|" +peer0.org1.example.com | "2019-05-02 09:27:45.143 UTC [msp.identity] Verify -> DEBU 2213 Verify: sig = 00000000 30 44 02 20 38 11 34 ca ff 0c da c3 43 1d 72 0c |0D. 8.4.....C.r.| +peer0.org1.example.com | 00000010 81 4d 79 09 fd 7e 87 3f 5d 87 16 2b e9 06 e5 3a |.My..~.?]..+...:| +peer0.org1.example.com | 00000020 c5 b1 61 b4 02 20 48 2d 51 e9 e7 18 da 48 3c cd |..a.. H-Q....H<.| +peer0.org1.example.com | 00000030 e7 3e 1e 14 bc a7 e8 28 5e a1 e3 e0 c4 4c 74 b1 |.>.....(^....Lt.| +peer0.org1.example.com | 00000040 8c 40 2b c8 f5 43 |.@+..C|" +peer0.org1.example.com | "2019-05-02 09:27:45.144 UTC [msp.identity] Verify -> DEBU 2214 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:45.144 UTC [msp.identity] Verify -> DEBU 2215 Verify: sig = 00000000 30 45 02 21 00 88 e8 c9 ee a7 1d 17 02 22 75 77 |0E.!........."uw| +peer0.org1.example.com | 00000010 61 24 48 be 3f ab d6 25 c1 0f c2 b6 fb 5c ab d6 |a$H.?..%.....\..| +peer0.org1.example.com | 00000020 40 4d 99 b4 e1 02 20 50 0f b6 9f 16 0d 04 a3 49 |@M.... P.......I| +peer0.org1.example.com | 00000030 dd 0d 3c 95 76 01 6f d7 ac 6f d3 fa 1e 48 f6 52 |..<.v.o..o...H.R| +peer0.org1.example.com | 00000040 47 10 65 6d 9e cb 0f |G.em...|" +peer0.org1.example.com | "2019-05-02 09:27:45.145 UTC [gossip.discovery] handleAliveMessage -> DEBU 2216 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.145 UTC [gossip.discovery] isSentByMe -> DEBU 2217 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.146 UTC [gossip.discovery] handleAliveMessage -> DEBU 2218 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2219 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.163 UTC [gossip.gossip] handleMessage -> DEBU 221a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.163 UTC [gossip.pull] HandleMessage -> DEBU 221b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 2220 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 2221 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.165 UTC [gossip.pull] SendDigest -> DEBU 2222 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:45.165 UTC [gossip.gossip] handleMessage -> DEBU 2223 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.172 UTC [gossip.gossip] handleMessage -> DEBU 2224 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.172 UTC [gossip.gossip] handleMessage -> DEBU 2225 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2226 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2227 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [msp] DeserializeIdentity -> DEBU 2228 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2229 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 222a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 222b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [policies] Evaluate -> DEBU 222c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [policies] Evaluate -> DEBU 222d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [policies] Evaluate -> DEBU 222e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [cauthdsl] func1 -> DEBU 222f 0xc00416ae50 gate 1556789265173787200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [cauthdsl] func2 -> DEBU 2230 0xc00416ae50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [cauthdsl] func2 -> DEBU 2231 0xc00416ae50 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:45.173 UTC [cauthdsl] func2 -> DEBU 2232 0xc00416ae50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 2233 0xc00416ae50 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func1 -> DEBU 2234 0xc00416ae50 gate 1556789265173787200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [policies] Evaluate -> DEBU 2235 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [policies] Evaluate -> DEBU 2236 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [policies] Evaluate -> DEBU 2237 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func1 -> DEBU 2238 0xc00416b690 gate 1556789265174471200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 2239 0xc00416b690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 223a 0xc00416b690 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 223b 0xc00416b690 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [msp.identity] Verify -> DEBU 223c Verify: digest = 00000000 8c c9 77 5f dc 20 1e c0 75 c9 e6 c0 7e 28 ed 6f |..w_. ..u...~(.o| +peer0.org1.example.com | 00000010 8e ec 7f 13 de 3e 35 6c 7f 0d 02 ad 8c 6d ff fd |.....>5l.....m..|" +peer0.org1.example.com | "2019-05-02 09:27:45.174 UTC [msp.identity] Verify -> DEBU 223d Verify: sig = 00000000 30 44 02 20 38 86 bf 71 09 6b 99 bc 37 b1 97 7b |0D. 8..q.k..7..{| +peer0.org1.example.com | 00000010 59 63 58 fc 5b 10 a2 9d dc 10 9a 45 a5 56 8b 55 |YcX.[......E.V.U| +peer0.org1.example.com | 00000020 9b f8 fe cf 02 20 2d 89 c7 49 58 b9 1e bf ef b2 |..... -..IX.....| +peer0.org1.example.com | 00000030 05 bc 95 f2 a9 81 f2 52 03 22 10 a2 29 ee 06 97 |.......R."..)...| +peer0.org1.example.com | 00000040 9c 37 68 e1 92 b4 |.7h...|" +peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [cauthdsl] func2 -> DEBU 223e 0xc00416b690 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [cauthdsl] func1 -> DEBU 223f 0xc00416b690 gate 1556789265174471200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2240 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2241 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2242 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2243 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 2244 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2245 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2246 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 " +peer0.org1.example.com | "2019-05-02 09:27:45.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2247 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 " +peer0.org1.example.com | "2019-05-02 09:27:45.179 UTC [gossip.discovery] learnExistingMembers -> DEBU 2248 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:45.184 UTC [gossip.discovery] learnExistingMembers -> DEBU 2249 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 224a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 224b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.186 UTC [gossip.discovery] sendMemResponse -> DEBU 224c Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:45.187 UTC [msp] DeserializeIdentity -> DEBU 224d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.187 UTC [msp] DeserializeIdentity -> DEBU 224e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.188 UTC [msp] DeserializeIdentity -> DEBU 224f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:45.189 UTC [gossip.comm] Send -> DEBU 2250 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:45.189 UTC [gossip.discovery] sendMemResponse -> DEBU 2251 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:45.189 UTC [gossip.comm] sendToEndpoint -> DEBU 2252 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:45.194 UTC [gossip.comm] sendToEndpoint -> DEBU 2253 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [endorser] ProcessProposal -> DEBU 2254 Entering: request from 172.18.0.8:57352" +peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] ValidateProposalMessage -> DEBU 2255 ValidateProposalMessage starts for signed proposal 0xc004137e50" +peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] validateChannelHeader -> DEBU 2256 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 2257 begin" +peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [msp] GetManagerForChain -> DEBU 2258 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 2259 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 225a creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [msp.identity] Verify -> DEBU 225b Verify: digest = 00000000 2d e0 ff d0 2b d5 0d 85 d5 d4 af 5a 7c ad 21 b9 |-...+......Z|.!.| +peer0.org1.example.com | 00000010 24 9c 85 1c e3 b7 f5 62 28 32 08 e7 2d ba a6 0b |$......b(2..-...|" +peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [msp.identity] Verify -> DEBU 225c Verify: sig = 00000000 30 45 02 21 00 c4 3b 72 9f 30 b0 15 7c 55 11 b7 |0E.!..;r.0..|U..| +peer0.org1.example.com | 00000010 a6 74 e7 31 2b 5f 4b a0 c0 3e 78 2c 9d ff 0a 61 |.t.1+_K..>x,...a| +peer0.org1.example.com | 00000020 55 b0 8b 91 a1 02 20 01 72 3b 1d cc dc c1 68 ac |U..... .r;....h.| +peer0.org1.example.com | 00000030 c8 0d d8 67 91 7a 3b 0d 93 c7 36 0e b5 c5 4c 3f |...g.z;...6...L?| +peer0.org1.example.com | 00000040 28 5d 38 9f c0 5e 09 |(]8..^.|" +peer0.org1.example.com | "2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 225d exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 225e validateChaincodeProposalMessage starts for proposal 0xc00335c0e0, header 0xc0041d8280" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 225f validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [endorser] preProcess -> DEBU 2260 [businesschannel][de605872] processing txid: de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2261 retrieveTransactionByID() - txId = [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [aclmgmt] CheckACL -> DEBU 2262 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [aclmgmt] CheckACL -> DEBU 2263 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [policies] Evaluate -> DEBU 2264 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [policies] Evaluate -> DEBU 2265 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [policies] Evaluate -> DEBU 2266 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func1 -> DEBU 2267 0xc0041f02c0 gate 1556789265323656200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 2268 0xc0041f02c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 2269 0xc0041f02c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 226a 0xc0041f02c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 226b 0xc0041f02c0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:45.323 UTC [cauthdsl] func1 -> DEBU 226c 0xc0041f02c0 gate 1556789265323656200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [policies] Evaluate -> DEBU 226d Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [policies] Evaluate -> DEBU 226e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [policies] Evaluate -> DEBU 226f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [cauthdsl] func1 -> DEBU 2270 0xc0041f0b20 gate 1556789265324623400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [cauthdsl] func2 -> DEBU 2271 0xc0041f0b20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [cauthdsl] func2 -> DEBU 2272 0xc0041f0b20 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:45.324 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2273 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:27:45.325 UTC [msp] Validate -> DEBU 2274 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:27:45.325 UTC [msp] getCertificationChain -> DEBU 2275 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:27:45.325 UTC [cauthdsl] func2 -> DEBU 2276 0xc0041f0b20 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:45.326 UTC [msp.identity] Verify -> DEBU 2277 Verify: digest = 00000000 2d e0 ff d0 2b d5 0d 85 d5 d4 af 5a 7c ad 21 b9 |-...+......Z|.!.| +peer0.org1.example.com | 00000010 24 9c 85 1c e3 b7 f5 62 28 32 08 e7 2d ba a6 0b |$......b(2..-...|" +peer0.org1.example.com | "2019-05-02 09:27:45.326 UTC [msp.identity] Verify -> DEBU 2278 Verify: sig = 00000000 30 45 02 21 00 c4 3b 72 9f 30 b0 15 7c 55 11 b7 |0E.!..;r.0..|U..| +peer0.org1.example.com | 00000010 a6 74 e7 31 2b 5f 4b a0 c0 3e 78 2c 9d ff 0a 61 |.t.1+_K..>x,...a| +peer0.org1.example.com | 00000020 55 b0 8b 91 a1 02 20 01 72 3b 1d cc dc c1 68 ac |U..... .r;....h.| +peer0.org1.example.com | 00000030 c8 0d d8 67 91 7a 3b 0d 93 c7 36 0e b5 c5 4c 3f |...g.z;...6...L?| +peer0.org1.example.com | 00000040 28 5d 38 9f c0 5e 09 |(]8..^.|" +peer0.org1.example.com | "2019-05-02 09:27:45.327 UTC [cauthdsl] func2 -> DEBU 2279 0xc0041f0b20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:45.327 UTC [cauthdsl] func1 -> DEBU 227a 0xc0041f0b20 gate 1556789265324623400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:45.327 UTC [policies] Evaluate -> DEBU 227b Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:45.327 UTC [policies] Evaluate -> DEBU 227c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [policies] Evaluate -> DEBU 227d Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [policies] Evaluate -> DEBU 227e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 227f constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2280 constructing new tx simulator txid = [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]" +peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [endorser] SimulateProposal -> DEBU 2281 [businesschannel][de605872] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:45.328 UTC [stateleveldb] GetState -> DEBU 2282 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:45.329 UTC [endorser] callChaincode -> INFO 2283 [businesschannel][de605872] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:45.329 UTC [stateleveldb] GetState -> DEBU 2284 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:45.329 UTC [stateleveldb] GetState -> DEBU 2285 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:45.329 UTC [chaincode] Execute -> DEBU 2286 Entry" +peer0.org1.example.com | "2019-05-02 09:27:45.330 UTC [chaincode] handleMessage -> DEBU 2287 [de605872] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:45.330 UTC [chaincode] HandleTransaction -> DEBU 2288 [de605872] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:45.330 UTC [chaincode] HandleGetState -> DEBU 2289 [de605872] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:45.330 UTC [stateleveldb] GetState -> DEBU 228a GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-05-02 09:27:45.330 UTC [chaincode] HandleTransaction -> DEBU 228b [de605872] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:45.331 UTC [chaincode] handleMessage -> DEBU 228c [de605872] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:45.331 UTC [chaincode] Notify -> DEBU 228d [de605872] notifying Txid:de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [chaincode] Execute -> DEBU 228e Exit" +peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [endorser] callChaincode -> INFO 228f [businesschannel][de605872] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2290 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [lockbasedtxmgr] Done -> DEBU 2291 Done with transaction simulation / query execution [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]" +peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [endorser] SimulateProposal -> DEBU 2292 [businesschannel][de605872] Exit" +peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [endorser] endorseProposal -> DEBU 2293 [businesschannel][de605872] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [endorser] endorseProposal -> DEBU 2294 [businesschannel][de605872] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-05-02 09:27:45.332 UTC [endorser] EndorseWithPlugin -> DEBU 2295 Entering endorsement for {plugin: escc, channel: businesschannel, tx: de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [msp.identity] Sign -> DEBU 2296 Sign: plaintext: 0A20F6C623970F9D58181ED63FB6D75F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [msp.identity] Sign -> DEBU 2297 Sign: digest: 5A0D03AB58C36305ECE64C8543B56F4EE8D1F3FA8EC3D88057007C7E511C498B " +peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [endorser] EndorseWithPlugin -> DEBU 2298 Exiting {plugin: escc, channel: businesschannel, tx: de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [endorser] endorseProposal -> DEBU 2299 [businesschannel][de605872] Exit" +peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [lockbasedtxmgr] Done -> DEBU 229a Done with transaction simulation / query execution [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]" +peer0.org1.example.com | "2019-05-02 09:27:45.333 UTC [endorser] func1 -> DEBU 229b Exit: request from 172.18.0.8:57352" +peer0.org1.example.com | "2019-05-02 09:27:45.334 UTC [comm.grpc.server] 1 -> INFO 229c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57352 grpc.code=OK grpc.call_duration=12.1359ms +peer0.org1.example.com | "2019-05-02 09:27:45.337 UTC [grpc] infof -> DEBU 229d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:45.338 UTC [grpc] infof -> DEBU 229e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:46.984 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 229f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:46.984 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 22a0 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:46.985 UTC [policies] Evaluate -> DEBU 22a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-05-02 09:27:46.985 UTC [policies] Evaluate -> DEBU 22a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:46.986 UTC [policies] Evaluate -> DEBU 22a3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:46.986 UTC [cauthdsl] func1 -> DEBU 22a4 0xc0041574d0 gate 1556789266986610200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:46.987 UTC [cauthdsl] func2 -> DEBU 22a5 0xc0041574d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:46.987 UTC [cauthdsl] func2 -> DEBU 22a6 0xc0041574d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:46.987 UTC [cauthdsl] func2 -> DEBU 22a7 0xc0041574d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:46.988 UTC [msp.identity] Verify -> DEBU 22a8 Verify: digest = 00000000 d3 92 47 e6 d2 77 f0 f0 95 28 55 b9 1c 06 0b c5 |..G..w...(U.....| +peer0.org1.example.com | 00000010 f5 f3 0a 60 cb c3 a5 20 28 b7 13 7a 99 ca e9 73 |...`... (..z...s|" +peer0.org1.example.com | "2019-05-02 09:27:46.988 UTC [msp.identity] Verify -> DEBU 22a9 Verify: sig = 00000000 30 45 02 21 00 dd 9a 7a e4 73 fb d3 1b 2e 48 0e |0E.!...z.s....H.| +peer0.org1.example.com | 00000010 37 5a f8 37 28 97 67 32 cd 69 d8 31 90 8d df db |7Z.7(.g2.i.1....| +peer0.org1.example.com | 00000020 f0 de 69 e0 48 02 20 31 e7 d6 c6 97 ec d9 18 53 |..i.H. 1.......S| +peer0.org1.example.com | 00000030 0f 3f d6 b5 2a e3 61 70 a6 bd 80 93 27 3b 0e 6a |.?..*.ap....';.j| +peer0.org1.example.com | 00000040 12 3e 55 9f 88 ea 41 |.>U...A|" +peer0.org1.example.com | "2019-05-02 09:27:46.989 UTC [cauthdsl] func2 -> DEBU 22aa 0xc0041574d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:46.989 UTC [cauthdsl] func1 -> DEBU 22ab 0xc0041574d0 gate 1556789266986610200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:46.989 UTC [policies] Evaluate -> DEBU 22ac Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:46.989 UTC [policies] Evaluate -> DEBU 22ad == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:46.990 UTC [policies] Evaluate -> DEBU 22ae Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:46.990 UTC [policies] Evaluate -> DEBU 22af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:46.991 UTC [blocksProvider] DeliverBlocks -> DEBU 22b0 [businesschannel] Adding payload to local buffer, blockNum = [7]" +peer0.org1.example.com | "2019-05-02 09:27:46.991 UTC [gossip.state] addPayload -> DEBU 22b1 [businesschannel] Adding payload to local buffer, blockNum = [7]" +peer0.org1.example.com | "2019-05-02 09:27:46.992 UTC [gossip.state] deliverPayloads -> DEBU 22b2 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [7]" +peer0.org1.example.com | "2019-05-02 09:27:46.992 UTC [gossip.state] deliverPayloads -> DEBU 22b3 [businesschannel] Transferring block [7] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-05-02 09:27:46.992 UTC [gossip.privdata] StoreBlock -> INFO 22b4 [businesschannel] Received block [7] from buffer" +peer0.org1.example.com | "2019-05-02 09:27:46.992 UTC [gossip.privdata] StoreBlock -> DEBU 22b5 [businesschannel] Validating block [7]" +peer0.org1.example.com | "2019-05-02 09:27:46.993 UTC [committer.txvalidator] Validate -> DEBU 22b6 [businesschannel] START Block Validation for block [7]" +peer0.org1.example.com | "2019-05-02 09:27:46.993 UTC [committer.txvalidator] Validate -> DEBU 22b7 expecting 1 block validation responses" +peer0.org1.example.com | "2019-05-02 09:27:46.994 UTC [committer.txvalidator] validateTx -> DEBU 22b8 [businesschannel] validateTx starts for block 0xc0041d29c0 env 0xc0041d90e0 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:46.994 UTC [protoutils] ValidateTransaction -> DEBU 22b9 ValidateTransactionEnvelope starts for envelope 0xc0041d90e0" +peer0.org1.example.com | "2019-05-02 09:27:46.994 UTC [protoutils] ValidateTransaction -> DEBU 22ba Header is channel_header:"\010\003\032\014\010\220\360\252\346\005\020\334\272\367\274\003\"\017businesschannel*@91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\325\267p\330j`&s\353E#\337\215\224N\315o\354\306\363;\032\026(" " +peer0.org1.example.com | "2019-05-02 09:27:46.995 UTC [protoutils] validateChannelHeader -> DEBU 22bb validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:46.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 22bc begin" +peer0.org1.example.com | "2019-05-02 09:27:46.995 UTC [msp] GetManagerForChain -> DEBU 22bd Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:46.996 UTC [protoutils] checkSignatureFromCreator -> DEBU 22be creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:46.996 UTC [protoutils] checkSignatureFromCreator -> DEBU 22bf creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:46.996 UTC [msp.identity] Verify -> DEBU 22c0 Verify: digest = 00000000 4b 54 f8 96 1e 46 32 1a 3e 10 d7 c7 2f 4b 4e af |KT...F2.>.../KN.| +peer0.org1.example.com | 00000010 64 13 11 09 83 a2 1e 74 33 1e 72 d2 2d 1e 49 33 |d......t3.r.-.I3|" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [msp.identity] Verify -> DEBU 22c1 Verify: sig = 00000000 30 45 02 21 00 9a 74 50 45 f1 33 ed 80 bc 70 62 |0E.!..tPE.3...pb| +peer0.org1.example.com | 00000010 a6 3b 96 31 9d 46 f9 6f cb c3 bf 48 3c 00 f1 ff |.;.1.F.o...H<...| +peer0.org1.example.com | 00000020 0e ef 32 4e a2 02 20 6f f9 b6 f8 46 5b ad 9b 89 |..2N.. o...F[...| +peer0.org1.example.com | 00000030 9f 71 ee 1f 7e b2 2f e3 88 bf f4 76 96 0a a8 04 |.q..~./....v....| +peer0.org1.example.com | 00000040 fe 64 c2 00 aa 35 b0 |.d...5.|" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [protoutils] checkSignatureFromCreator -> DEBU 22c2 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [protoutils] validateEndorserTransaction -> DEBU 22c3 validateEndorserTransaction starts for data 0xc00402f800, header channel_header:"\010\003\032\014\010\220\360\252\346\005\020\334\272\367\274\003\"\017businesschannel*@91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\325\267p\330j`&s\353E#\337\215\224N\315o\354\306\363;\032\026(" " +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [protoutils] validateEndorserTransaction -> DEBU 22c4 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [protoutils] validateEndorserTransaction -> DEBU 22c5 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [protoutils] ValidateTransaction -> DEBU 22c6 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [committer.txvalidator] validateTx -> DEBU 22c7 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 22c8 retrieveTransactionByID() - txId = [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [committer.txvalidator] validateTx -> DEBU 22c9 Validating transaction with plugins" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [committer.txvalidator] Dispatch -> DEBU 22ca [businesschannel] Dispatch starts for bytes 0xc004213800" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22cb constructing new query executor txid = [5714fa25-243e-4135-82b2-fe9a41defd5b]" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22cc GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22cd GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22ce GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22cf GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +peer0.org1.example.com | "2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22d0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [lockbasedtxmgr] Done -> DEBU 22d1 Done with transaction simulation / query execution [5714fa25-243e-4135-82b2-fe9a41defd5b]" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 22d2 Validating Tx 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, seq 0 out of 1 in block 7 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22d3 constructing new query executor txid = [4eab909c-d0cf-46c5-9dd6-ffd07f73f019]" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [lockbasedtxmgr] Done -> DEBU 22d4 Done with transaction simulation / query execution [4eab909c-d0cf-46c5-9dd6-ffd07f73f019]" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func1 -> DEBU 22d5 0xc004223eb0 gate 1556789266998451400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22d6 0xc004223eb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22d7 0xc004223eb0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22d8 0xc004223eb0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [msp.identity] Verify -> DEBU 22d9 Verify: digest = 00000000 9a c0 1a b8 d4 61 55 0f 68 63 ae 26 39 a7 25 bb |.....aU.hc.&9.%.| +peer0.org1.example.com | 00000010 3a e3 fb 9d 57 2f cf 35 92 1f 0c 19 5b 81 f4 8d |:...W/.5....[...|" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [msp.identity] Verify -> DEBU 22da Verify: sig = 00000000 30 44 02 20 5a 55 d1 09 16 cf f3 36 7f 98 0c ff |0D. ZU.....6....| +peer0.org1.example.com | 00000010 af a2 95 09 ac be d0 3c cd f4 cb 98 2c 09 83 83 |.......<....,...| +peer0.org1.example.com | 00000020 5a 28 70 2f 02 20 74 cc 5c 69 b5 90 20 ba b8 b7 |Z(p/. t.\i.. ...| +peer0.org1.example.com | 00000030 6f 04 bb f6 31 b1 78 ed 2c d0 75 b9 8d de d7 e7 |o...1.x.,.u.....| +peer0.org1.example.com | 00000040 24 f4 b0 c4 23 eb |$...#.|" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22db 0xc004223eb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22dc 0xc004223eb0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22dd 0xc004223eb0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22de 0xc004223eb0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:46.998 UTC [cauthdsl] func1 -> DEBU 22df 0xc004223eb0 gate 1556789266998451400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22e0 constructing new query executor txid = [6d2656e0-315f-4b33-ac46-c67014f3b812]" +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [lockbasedtxmgr] Done -> DEBU 22e1 Done with transaction simulation / query execution [6d2656e0-315f-4b33-ac46-c67014f3b812]" +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [vscc] Validate -> DEBU 22e2 block 7, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 22e3 Transaction 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0 appears to be valid" +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [committer.txvalidator] Dispatch -> DEBU 22e4 [businesschannel] Dispatch completes env bytes 0xc004213800" +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [committer.txvalidator] validateTx -> DEBU 22e5 [businesschannel] validateTx completes for block 0xc0041d29c0 env 0xc0041d90e0 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [committer.txvalidator] Validate -> DEBU 22e6 got result for idx 0, code 0" +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [committer.txvalidator] Validate -> INFO 22e7 [businesschannel] Validated block [7] in 6ms" +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [gossip.privdata] listMissingPrivateData -> DEBU 22e8 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [gossip.privdata] StoreBlock -> DEBU 22e9 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-05-02 09:27:47.001 UTC [gossip.state] addPayload -> DEBU 22ea Blocks payloads buffer size for channel [businesschannel] is 0 blocks" +peer0.org1.example.com | "2019-05-02 09:27:47.001 UTC [blocksProvider] DeliverBlocks -> DEBU 22eb [businesschannel] Gossiping block [7], peers number [3]" +peer0.org1.example.com | "2019-05-02 09:27:47.002 UTC [gossip.channel] AddToMsgStore -> DEBU 22ec Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 7}, Envelope: 4093 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-05-02 09:27:47.002 UTC [gossip.pull] Add -> DEBU 22ee Added 7, total items: 7" +peer0.org1.example.com | "2019-05-02 09:27:46.999 UTC [kvledger] CommitWithPvtData -> DEBU 22ed [businesschannel] Validating state for block [7]" +peer0.org1.example.com | "2019-05-02 09:27:47.002 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 22ef Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:27:47.003 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 22f0 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-05-02 09:27:47.003 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 22f1 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-05-02 09:27:47.003 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 22f2 ValidateAndPrepareBatch() for block number = [7]" +peer0.org1.example.com | "2019-05-02 09:27:47.004 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 22f3 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:47.004 UTC [valimpl] preprocessProtoBlock -> DEBU 22f4 txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-05-02 09:27:47.004 UTC [stateleveldb] GetState -> DEBU 22f5 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:47.005 UTC [statebasedval] validateKVRead -> DEBU 22f6 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +peer0.org1.example.com | "2019-05-02 09:27:47.005 UTC [stateleveldb] GetState -> DEBU 22f7 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:47.005 UTC [statebasedval] validateKVRead -> DEBU 22f8 Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [stateleveldb] GetState -> DEBU 22f9 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [statebasedval] validateKVRead -> DEBU 22fa Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [stateleveldb] GetState -> DEBU 22fb GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [statebasedval] validateKVRead -> DEBU 22fc Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 22fd Block [7] Transaction index [0] TxId [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0] marked as valid by state validator. ContainsPostOrderWrites [false]" +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [valinternal] ApplyWriteSet -> DEBU 22fe txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00407d9c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00407da00)}" +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 22ff validating rwset..." +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2300 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2301 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [kvledger] CommitWithPvtData -> DEBU 2302 [businesschannel] Committing block [7] to storage" +peer0.org1.example.com | "2019-05-02 09:27:47.006 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2303 Writing block [7] to pvt block store" +peer0.org1.example.com | "2019-05-02 09:27:47.007 UTC [msp] DeserializeIdentity -> DEBU 2304 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.008 UTC [msp] DeserializeIdentity -> DEBU 2305 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.009 UTC [msp] DeserializeIdentity -> DEBU 2306 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.009 UTC [msp] DeserializeIdentity -> DEBU 2307 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.010 UTC [gossip.comm] Send -> DEBU 2308 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 7}, Envelope: 4093 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:47.010 UTC [gossip.comm] sendToEndpoint -> DEBU 2309 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 7}, Envelope: 4093 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:47.010 UTC [gossip.comm] sendToEndpoint -> DEBU 230a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:47.010 UTC [msp] DeserializeIdentity -> DEBU 230b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.017 UTC [msp] DeserializeIdentity -> DEBU 230c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.017 UTC [pvtdatastorage] Prepare -> DEBU 230d Saved 0 private data write sets for block [7]" +peer0.org1.example.com | "2019-05-02 09:27:47.020 UTC [fsblkstorage] indexBlock -> DEBU 230e Indexing block [blockNum=7, blockHash=[]byte{0x30, 0xa6, 0xff, 0xc, 0x32, 0x27, 0x9e, 0xbc, 0xbb, 0x79, 0xcc, 0xe2, 0x1a, 0x7f, 0x74, 0x43, 0x84, 0x98, 0x45, 0x15, 0x41, 0x88, 0x33, 0xee, 0x2a, 0x32, 0x97, 0xdb, 0xcf, 0x57, 0x3f, 0x8c} txOffsets= +peer0.org1.example.com | txId=91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0 locPointer=offset=70, bytesLength=3044 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-05-02 09:27:47.021 UTC [fsblkstorage] indexBlock -> DEBU 230f Adding txLoc [fileSuffixNum=0, offset=90640, bytesLength=3044] for tx ID: [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0] to txid-index" +peer0.org1.example.com | "2019-05-02 09:27:47.021 UTC [fsblkstorage] indexBlock -> DEBU 2310 Adding txLoc [fileSuffixNum=0, offset=90640, bytesLength=3044] for tx number:[0] ID: [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0] to blockNumTranNum index" +peer0.org1.example.com | "2019-05-02 09:27:47.025 UTC [fsblkstorage] updateCheckpoint -> DEBU 2311 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94622], isChainEmpty=[false], lastBlockNumber=[7]" +peer0.org1.example.com | "2019-05-02 09:27:47.026 UTC [pvtdatastorage] Commit -> DEBU 2312 Committing private data for block [7]" +peer0.org1.example.com | "2019-05-02 09:27:47.029 UTC [pvtdatastorage] Commit -> DEBU 2313 Committed private data for block [7]" +peer0.org1.example.com | "2019-05-02 09:27:47.030 UTC [kvledger] CommitWithPvtData -> DEBU 2314 [businesschannel] Committing block [7] transactions to state database" +peer0.org1.example.com | "2019-05-02 09:27:47.030 UTC [lockbasedtxmgr] Commit -> DEBU 2315 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:47.031 UTC [lockbasedtxmgr] Commit -> DEBU 2316 Committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:47.032 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2317 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-05-02 09:27:47.032 UTC [lockbasedtxmgr] Commit -> DEBU 2318 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:47.033 UTC [stateleveldb] ApplyUpdates -> DEBU 2319 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-05-02 09:27:47.033 UTC [stateleveldb] ApplyUpdates -> DEBU 231a Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-05-02 09:27:47.035 UTC [lockbasedtxmgr] Commit -> DEBU 231b Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-05-02 09:27:47.036 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 231c Preparing potential purge list working-set for expiringAtBlk [8]" +peer0.org1.example.com | "2019-05-02 09:27:47.036 UTC [leveldbhelper] GetIterator -> DEBU 231e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:47.037 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 231f No expiry entry found for expiringAtBlk [8]" +peer0.org1.example.com | "2019-05-02 09:27:47.036 UTC [lockbasedtxmgr] func1 -> DEBU 231d launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-05-02 09:27:47.037 UTC [kvledger] CommitWithPvtData -> DEBU 2320 [businesschannel] Committing block [7] transactions to history database" +peer0.org1.example.com | "2019-05-02 09:27:47.038 UTC [historyleveldb] Commit -> DEBU 2321 Channel [businesschannel]: Updating history database for blockNo [7] with [1] transactions" +peer0.org1.example.com | "2019-05-02 09:27:47.041 UTC [historyleveldb] Commit -> DEBU 2322 Channel [businesschannel]: Updates committed to history database for blockNo [7]" +peer0.org1.example.com | "2019-05-02 09:27:47.041 UTC [kvledger] CommitWithPvtData -> INFO 2323 [businesschannel] Committed block [7] with 1 transaction(s) in 42ms (state_validation=6ms block_commit=23ms state_commit=7ms)" +peer0.org1.example.com | "2019-05-02 09:27:47.042 UTC [msp.identity] Sign -> DEBU 2324 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020808 " +peer0.org1.example.com | "2019-05-02 09:27:47.043 UTC [msp.identity] Sign -> DEBU 2325 Sign: digest: E9B3E104B460C51C8CF5740CF1CC998546E1A13A65EAFD0BADB350E62062E1C4 " +peer0.org1.example.com | "2019-05-02 09:27:47.044 UTC [gossip.state] commitBlock -> DEBU 2326 [businesschannel] Committed block [7] with 1 transaction(s)" +peer0.org1.example.com | "2019-05-02 09:27:47.314 UTC [gossip.election] waitForInterrupt -> DEBU 2327 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:27:47.314 UTC [gossip.election] IsLeader -> DEBU 2328 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:27:47.314 UTC [msp.identity] Sign -> DEBU 2329 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510071801 " +peer0.org1.example.com | "2019-05-02 09:27:47.314 UTC [msp.identity] Sign -> DEBU 232a Sign: digest: 5B75D0F8E2F5C9F45C20539EC24FCC4A203E4F0CC95A479BA6304AB53F061FE2 " +peer0.org1.example.com | "2019-05-02 09:27:47.315 UTC [gossip.election] waitForInterrupt -> DEBU 232b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [gossip.comm] Send -> DEBU 2330 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 2331 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 2332 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:47.320 UTC [gossip.comm] sendToEndpoint -> DEBU 2333 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:47.320 UTC [gossip.comm] sendToEndpoint -> DEBU 2334 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:47.532 UTC [endorser] ProcessProposal -> DEBU 2335 Entering: request from 172.18.0.8:57356" +peer0.org1.example.com | "2019-05-02 09:27:47.533 UTC [protoutils] ValidateProposalMessage -> DEBU 2336 ValidateProposalMessage starts for signed proposal 0xc004239720" +peer0.org1.example.com | "2019-05-02 09:27:47.533 UTC [protoutils] validateChannelHeader -> DEBU 2337 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:47.534 UTC [protoutils] checkSignatureFromCreator -> DEBU 2338 begin" +peer0.org1.example.com | "2019-05-02 09:27:47.534 UTC [msp] GetManagerForChain -> DEBU 2339 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:47.535 UTC [protoutils] checkSignatureFromCreator -> DEBU 233a creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-05-02 09:27:47.535 UTC [protoutils] checkSignatureFromCreator -> DEBU 233b creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:47.535 UTC [msp.identity] Verify -> DEBU 233c Verify: digest = 00000000 c5 90 c5 a7 80 0c 2f 6c 8e d2 5d 91 0b 51 61 7f |....../l..]..Qa.| +peer0.org1.example.com | 00000010 2c ac 06 3c bb a0 fc 16 ba ea 52 da 02 56 fe 95 |,..<......R..V..|" +peer0.org1.example.com | "2019-05-02 09:27:47.536 UTC [msp.identity] Verify -> DEBU 233d Verify: sig = 00000000 30 44 02 20 53 d4 25 5d d0 01 2a ca 5c ca 62 af |0D. S.%]..*.\.b.| +peer0.org1.example.com | 00000010 e5 9f 87 7d 88 35 29 10 fb 1c 81 a3 31 31 f4 e5 |...}.5).....11..| +peer0.org1.example.com | 00000020 ef 30 64 bb 02 20 0d 1d a1 9c 26 0a 95 f3 90 c2 |.0d.. ....&.....| +peer0.org1.example.com | 00000030 78 81 cb 4a e7 3d c7 13 95 70 cd c1 14 e9 7b b9 |x..J.=...p....{.| +peer0.org1.example.com | 00000040 d7 bb 89 02 2a 50 |....*P|" +peer0.org1.example.com | "2019-05-02 09:27:47.536 UTC [protoutils] checkSignatureFromCreator -> DEBU 233e exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:47.537 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 233f validateChaincodeProposalMessage starts for proposal 0xc00335c930, header 0xc004239b30" +peer0.org1.example.com | "2019-05-02 09:27:47.537 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2340 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.537 UTC [endorser] preProcess -> DEBU 2341 [businesschannel][7d336586] processing txid: 7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8" +peer0.org1.example.com | "2019-05-02 09:27:47.538 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2342 retrieveTransactionByID() - txId = [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]" +peer0.org1.example.com | "2019-05-02 09:27:47.538 UTC [aclmgmt] CheckACL -> DEBU 2343 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-05-02 09:27:47.538 UTC [aclmgmt] CheckACL -> DEBU 2344 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-05-02 09:27:47.539 UTC [policies] Evaluate -> DEBU 2345 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:47.539 UTC [policies] Evaluate -> DEBU 2346 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:47.540 UTC [policies] Evaluate -> DEBU 2347 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:47.540 UTC [cauthdsl] func1 -> DEBU 2348 0xc0042cd4c0 gate 1556789267540791800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:47.541 UTC [cauthdsl] func2 -> DEBU 2349 0xc0042cd4c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:47.541 UTC [cauthdsl] func2 -> DEBU 234a 0xc0042cd4c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:47.541 UTC [cauthdsl] func2 -> DEBU 234b 0xc0042cd4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:47.542 UTC [cauthdsl] func2 -> DEBU 234c 0xc0042cd4c0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:47.542 UTC [cauthdsl] func1 -> DEBU 234d 0xc0042cd4c0 gate 1556789267540791800 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:47.542 UTC [policies] Evaluate -> DEBU 234e Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 234f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 2350 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func1 -> DEBU 2351 0xc0042cdd00 gate 1556789267543337600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2352 0xc0042cdd00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2353 0xc0042cdd00 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2354 0xc0042cdd00 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [msp.identity] Verify -> DEBU 2355 Verify: digest = 00000000 c5 90 c5 a7 80 0c 2f 6c 8e d2 5d 91 0b 51 61 7f |....../l..]..Qa.| +peer0.org1.example.com | 00000010 2c ac 06 3c bb a0 fc 16 ba ea 52 da 02 56 fe 95 |,..<......R..V..|" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [msp.identity] Verify -> DEBU 2356 Verify: sig = 00000000 30 44 02 20 53 d4 25 5d d0 01 2a ca 5c ca 62 af |0D. S.%]..*.\.b.| +peer0.org1.example.com | 00000010 e5 9f 87 7d 88 35 29 10 fb 1c 81 a3 31 31 f4 e5 |...}.5).....11..| +peer0.org1.example.com | 00000020 ef 30 64 bb 02 20 0d 1d a1 9c 26 0a 95 f3 90 c2 |.0d.. ....&.....| +peer0.org1.example.com | 00000030 78 81 cb 4a e7 3d c7 13 95 70 cd c1 14 e9 7b b9 |x..J.=...p....{.| +peer0.org1.example.com | 00000040 d7 bb 89 02 2a 50 |....*P|" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2357 0xc0042cdd00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [cauthdsl] func1 -> DEBU 2358 0xc0042cdd00 gate 1556789267543337600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 2359 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 235a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 235b Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 235c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 235d constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:47.543 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 235e constructing new tx simulator txid = [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]" +peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [endorser] SimulateProposal -> DEBU 235f [businesschannel][7d336586] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [stateleveldb] GetState -> DEBU 2360 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [endorser] callChaincode -> INFO 2361 [businesschannel][7d336586] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [stateleveldb] GetState -> DEBU 2362 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [stateleveldb] GetState -> DEBU 2363 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:47.544 UTC [chaincode] Execute -> DEBU 2364 Entry" +peer0.org1.example.com | "2019-05-02 09:27:47.546 UTC [chaincode] handleMessage -> DEBU 2365 [7d336586] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:47.546 UTC [chaincode] HandleTransaction -> DEBU 2366 [7d336586] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:47.546 UTC [chaincode] HandleGetState -> DEBU 2367 [7d336586] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:47.546 UTC [stateleveldb] GetState -> DEBU 2368 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-05-02 09:27:47.546 UTC [chaincode] HandleTransaction -> DEBU 2369 [7d336586] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:47.547 UTC [chaincode] handleMessage -> DEBU 236a [7d336586] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:47.547 UTC [chaincode] Notify -> DEBU 236b [7d336586] notifying Txid:7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:47.548 UTC [chaincode] Execute -> DEBU 236c Exit" +peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [endorser] callChaincode -> INFO 236d [businesschannel][7d336586] Exit chaincode: name:"exp02" (5ms)" +peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 236e Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [lockbasedtxmgr] Done -> DEBU 236f Done with transaction simulation / query execution [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]" +peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [endorser] SimulateProposal -> DEBU 2370 [businesschannel][7d336586] Exit" +peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [endorser] endorseProposal -> DEBU 2371 [businesschannel][7d336586] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [endorser] endorseProposal -> DEBU 2372 [businesschannel][7d336586] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [endorser] EndorseWithPlugin -> DEBU 2373 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:47.549 UTC [msp.identity] Sign -> DEBU 2374 Sign: plaintext: 0A2076AB56B6C271AF5B382DA71F12F1...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:47.550 UTC [msp.identity] Sign -> DEBU 2375 Sign: digest: CA42D06E010E44C96A19B02059A4BF578F48C24305243196437C94821E650622 " +peer0.org1.example.com | "2019-05-02 09:27:47.550 UTC [endorser] EndorseWithPlugin -> DEBU 2376 Exiting {plugin: escc, channel: businesschannel, tx: 7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:47.550 UTC [endorser] endorseProposal -> DEBU 2377 [businesschannel][7d336586] Exit" +peer0.org1.example.com | "2019-05-02 09:27:47.551 UTC [lockbasedtxmgr] Done -> DEBU 2378 Done with transaction simulation / query execution [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]" +peer0.org1.example.com | "2019-05-02 09:27:47.551 UTC [endorser] func1 -> DEBU 2379 Exit: request from 172.18.0.8:57356" +peer0.org1.example.com | "2019-05-02 09:27:47.551 UTC [comm.grpc.server] 1 -> INFO 237a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57356 grpc.code=OK grpc.call_duration=19.0782ms +peer0.org1.example.com | "2019-05-02 09:27:47.555 UTC [grpc] infof -> DEBU 237b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:47.556 UTC [grpc] infof -> DEBU 237c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:47.737 UTC [endorser] ProcessProposal -> DEBU 237d Entering: request from 172.18.0.8:57360" +peer0.org1.example.com | "2019-05-02 09:27:47.737 UTC [protoutils] ValidateProposalMessage -> DEBU 237e ValidateProposalMessage starts for signed proposal 0xc0042ee730" +peer0.org1.example.com | "2019-05-02 09:27:47.738 UTC [protoutils] validateChannelHeader -> DEBU 237f validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:47.738 UTC [protoutils] checkSignatureFromCreator -> DEBU 2380 begin" +peer0.org1.example.com | "2019-05-02 09:27:47.739 UTC [msp] GetManagerForChain -> DEBU 2381 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:47.739 UTC [protoutils] checkSignatureFromCreator -> DEBU 2382 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-05-02 09:27:47.739 UTC [protoutils] checkSignatureFromCreator -> DEBU 2383 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:47.740 UTC [msp.identity] Verify -> DEBU 2384 Verify: digest = 00000000 2b d2 66 7a fb 34 7b 93 cd 18 72 04 33 52 16 23 |+.fz.4{...r.3R.#| +peer0.org1.example.com | 00000010 b0 ed f3 27 5a db f7 da 16 86 79 74 12 9a a8 1c |...'Z.....yt....|" +peer0.org1.example.com | "2019-05-02 09:27:47.740 UTC [msp.identity] Verify -> DEBU 2385 Verify: sig = 00000000 30 45 02 21 00 a2 82 2e 09 29 4f 00 f2 6b a0 b7 |0E.!.....)O..k..| +peer0.org1.example.com | 00000010 bb 1d 0f 6c 59 06 b3 61 4d ec 7e a4 6e 0e d7 e8 |...lY..aM.~.n...| +peer0.org1.example.com | 00000020 6f 21 37 e1 d1 02 20 3a 07 37 ab 7d 9c ce 30 03 |o!7... :.7.}..0.| +peer0.org1.example.com | 00000030 97 5c fb 63 17 66 e7 34 af cf b6 af fc dc d3 97 |.\.c.f.4........| +peer0.org1.example.com | 00000040 72 3f d9 42 28 68 23 |r?.B(h#|" +peer0.org1.example.com | "2019-05-02 09:27:47.741 UTC [protoutils] checkSignatureFromCreator -> DEBU 2386 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:47.741 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2387 validateChaincodeProposalMessage starts for proposal 0xc003460a80, header 0xc0042eeb40" +peer0.org1.example.com | "2019-05-02 09:27:47.742 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2388 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.742 UTC [endorser] preProcess -> DEBU 2389 [businesschannel][f788670e] processing txid: f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176" +peer0.org1.example.com | "2019-05-02 09:27:47.743 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 238a retrieveTransactionByID() - txId = [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]" +peer0.org1.example.com | "2019-05-02 09:27:47.743 UTC [aclmgmt] CheckACL -> DEBU 238b acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-05-02 09:27:47.743 UTC [aclmgmt] CheckACL -> DEBU 238c acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-05-02 09:27:47.744 UTC [policies] Evaluate -> DEBU 238d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:47.744 UTC [policies] Evaluate -> DEBU 238e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:47.745 UTC [policies] Evaluate -> DEBU 238f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:47.745 UTC [cauthdsl] func1 -> DEBU 2390 0xc004334fc0 gate 1556789267745522300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:47.745 UTC [cauthdsl] func2 -> DEBU 2391 0xc004334fc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 2392 0xc004334fc0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 2393 0xc004334fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 2394 0xc004334fc0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func1 -> DEBU 2395 0xc004334fc0 gate 1556789267745522300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [policies] Evaluate -> DEBU 2396 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [policies] Evaluate -> DEBU 2397 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [policies] Evaluate -> DEBU 2398 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func1 -> DEBU 2399 0xc004335800 gate 1556789267746848600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 239a 0xc004335800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 239b 0xc004335800 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [cauthdsl] func2 -> DEBU 239c 0xc004335800 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [msp.identity] Verify -> DEBU 239d Verify: digest = 00000000 2b d2 66 7a fb 34 7b 93 cd 18 72 04 33 52 16 23 |+.fz.4{...r.3R.#| +peer0.org1.example.com | 00000010 b0 ed f3 27 5a db f7 da 16 86 79 74 12 9a a8 1c |...'Z.....yt....|" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [msp.identity] Verify -> DEBU 239e Verify: sig = 00000000 30 45 02 21 00 a2 82 2e 09 29 4f 00 f2 6b a0 b7 |0E.!.....)O..k..| +peer0.org1.example.com | 00000010 bb 1d 0f 6c 59 06 b3 61 4d ec 7e a4 6e 0e d7 e8 |...lY..aM.~.n...| +peer0.org1.example.com | 00000020 6f 21 37 e1 d1 02 20 3a 07 37 ab 7d 9c ce 30 03 |o!7... :.7.}..0.| +peer0.org1.example.com | 00000030 97 5c fb 63 17 66 e7 34 af cf b6 af fc dc d3 97 |.\.c.f.4........| +peer0.org1.example.com | 00000040 72 3f d9 42 28 68 23 |r?.B(h#|" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [cauthdsl] func2 -> DEBU 239f 0xc004335800 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [cauthdsl] func1 -> DEBU 23a0 0xc004335800 gate 1556789267746848600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a1 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a3 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 23a5 constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 23a6 constructing new tx simulator txid = [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [endorser] SimulateProposal -> DEBU 23a7 [businesschannel][f788670e] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [stateleveldb] GetState -> DEBU 23a8 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [endorser] callChaincode -> INFO 23a9 [businesschannel][f788670e] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [stateleveldb] GetState -> DEBU 23aa GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [stateleveldb] GetState -> DEBU 23ab GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:47.747 UTC [chaincode] Execute -> DEBU 23ac Entry" +peer0.org1.example.com | "2019-05-02 09:27:47.750 UTC [chaincode] handleMessage -> DEBU 23ad [f788670e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:47.750 UTC [chaincode] HandleTransaction -> DEBU 23ae [f788670e] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:47.750 UTC [chaincode] HandleGetState -> DEBU 23af [f788670e] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:47.750 UTC [stateleveldb] GetState -> DEBU 23b0 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-05-02 09:27:47.750 UTC [chaincode] HandleTransaction -> DEBU 23b1 [f788670e] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:47.751 UTC [chaincode] handleMessage -> DEBU 23b2 [f788670e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:47.752 UTC [chaincode] HandleTransaction -> DEBU 23b3 [f788670e] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:47.752 UTC [chaincode] HandleGetState -> DEBU 23b4 [f788670e] getting state for chaincode exp02, key b, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:47.752 UTC [stateleveldb] GetState -> DEBU 23b5 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-05-02 09:27:47.753 UTC [chaincode] HandleTransaction -> DEBU 23b6 [f788670e] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:47.754 UTC [chaincode] handleMessage -> DEBU 23b7 [f788670e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:47.755 UTC [chaincode] HandleTransaction -> DEBU 23b8 [f788670e] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:47.755 UTC [chaincode] HandleTransaction -> DEBU 23b9 [f788670e] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:47.757 UTC [chaincode] handleMessage -> DEBU 23ba [f788670e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:47.757 UTC [chaincode] HandleTransaction -> DEBU 23bb [f788670e] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:47.757 UTC [chaincode] HandleTransaction -> DEBU 23bc [f788670e] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:47.758 UTC [chaincode] handleMessage -> DEBU 23bd [f788670e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:47.759 UTC [chaincode] Notify -> DEBU 23be [f788670e] notifying Txid:f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:47.759 UTC [chaincode] Execute -> DEBU 23bf Exit" +peer0.org1.example.com | "2019-05-02 09:27:47.759 UTC [endorser] callChaincode -> INFO 23c0 [businesschannel][f788670e] Exit chaincode: name:"exp02" (12ms)" +peer0.org1.example.com | "2019-05-02 09:27:47.760 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 23c1 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:47.760 UTC [lockbasedtxmgr] Done -> DEBU 23c2 Done with transaction simulation / query execution [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]" +peer0.org1.example.com | "2019-05-02 09:27:47.761 UTC [endorser] SimulateProposal -> DEBU 23c3 [businesschannel][f788670e] Exit" +peer0.org1.example.com | "2019-05-02 09:27:47.761 UTC [endorser] endorseProposal -> DEBU 23c4 [businesschannel][f788670e] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.762 UTC [endorser] endorseProposal -> DEBU 23c5 [businesschannel][f788670e] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-05-02 09:27:47.762 UTC [endorser] EndorseWithPlugin -> DEBU 23c6 Entering endorsement for {plugin: escc, channel: businesschannel, tx: f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:47.762 UTC [msp.identity] Sign -> DEBU 23c7 Sign: plaintext: 0A2022CFDDD1D9F03FD9E872A68FBF65...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [msp.identity] Sign -> DEBU 23c8 Sign: digest: 7F4D0DB0FB16170EA99B1C9EDC7E0EE04F80FAD320C754C68742499AE98027A0 " +peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [endorser] EndorseWithPlugin -> DEBU 23c9 Exiting {plugin: escc, channel: businesschannel, tx: f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [endorser] endorseProposal -> DEBU 23ca [businesschannel][f788670e] Exit" +peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [lockbasedtxmgr] Done -> DEBU 23cb Done with transaction simulation / query execution [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]" +peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [endorser] func1 -> DEBU 23cc Exit: request from 172.18.0.8:57360" +peer0.org1.example.com | "2019-05-02 09:27:47.763 UTC [comm.grpc.server] 1 -> INFO 23cd unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57360 grpc.code=OK grpc.call_duration=26.5353ms +peer0.org1.example.com | "2019-05-02 09:27:47.781 UTC [grpc] infof -> DEBU 23ce transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:47.782 UTC [grpc] infof -> DEBU 23cf transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:47.980 UTC [endorser] ProcessProposal -> DEBU 23d0 Entering: request from 172.18.0.8:57366" +peer0.org1.example.com | "2019-05-02 09:27:47.980 UTC [protoutils] ValidateProposalMessage -> DEBU 23d1 ValidateProposalMessage starts for signed proposal 0xc0042ef450" +peer0.org1.example.com | "2019-05-02 09:27:47.980 UTC [protoutils] validateChannelHeader -> DEBU 23d2 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:47.980 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d3 begin" +peer0.org1.example.com | "2019-05-02 09:27:47.980 UTC [msp] GetManagerForChain -> DEBU 23d4 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d5 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d6 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [msp.identity] Verify -> DEBU 23d7 Verify: digest = 00000000 e0 ad ec f1 52 d0 9a e6 1d 0a f0 e0 c7 7b 0f 0f |....R........{..| +peer0.org1.example.com | 00000010 13 50 70 eb 56 c3 91 08 2f cd 88 0a cf b7 80 31 |.Pp.V.../......1|" +peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [msp.identity] Verify -> DEBU 23d8 Verify: sig = 00000000 30 45 02 21 00 a5 20 b3 ad 07 ea dd be 70 45 6f |0E.!.. ......pEo| +peer0.org1.example.com | 00000010 20 a6 03 f5 ee b4 58 45 75 80 c2 63 9a c5 ac 04 | .....XEu..c....| +peer0.org1.example.com | 00000020 d7 3f 11 20 8e 02 20 4e 2b 6a f7 f9 24 c2 24 0e |.?. .. N+j..$.$.| +peer0.org1.example.com | 00000030 a6 00 e8 66 de f1 86 65 02 e6 fa 6c c8 55 a8 7b |...f...e...l.U.{| +peer0.org1.example.com | 00000040 55 9d ee 03 a6 cc 68 |U.....h|" +peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d9 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 23da validateChaincodeProposalMessage starts for proposal 0xc003460e70, header 0xc0042ef860" +peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 23db validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.981 UTC [endorser] preProcess -> DEBU 23dc [businesschannel][530e2b52] processing txid: 530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d" +peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 23dd retrieveTransactionByID() - txId = [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]" +peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [aclmgmt] CheckACL -> DEBU 23de acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [aclmgmt] CheckACL -> DEBU 23df acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [policies] Evaluate -> DEBU 23e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [policies] Evaluate -> DEBU 23e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [policies] Evaluate -> DEBU 23e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [cauthdsl] func1 -> DEBU 23e3 0xc0043b4cc0 gate 1556789267982597500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [cauthdsl] func2 -> DEBU 23e4 0xc0043b4cc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [cauthdsl] func2 -> DEBU 23e5 0xc0043b4cc0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:47.982 UTC [cauthdsl] func2 -> DEBU 23e6 0xc0043b4cc0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:47.983 UTC [msp.identity] Verify -> DEBU 23e7 Verify: digest = 00000000 e0 ad ec f1 52 d0 9a e6 1d 0a f0 e0 c7 7b 0f 0f |....R........{..| +peer0.org1.example.com | 00000010 13 50 70 eb 56 c3 91 08 2f cd 88 0a cf b7 80 31 |.Pp.V.../......1|" +peer0.org1.example.com | "2019-05-02 09:27:47.983 UTC [msp.identity] Verify -> DEBU 23e8 Verify: sig = 00000000 30 45 02 21 00 a5 20 b3 ad 07 ea dd be 70 45 6f |0E.!.. ......pEo| +peer0.org1.example.com | 00000010 20 a6 03 f5 ee b4 58 45 75 80 c2 63 9a c5 ac 04 | .....XEu..c....| +peer0.org1.example.com | 00000020 d7 3f 11 20 8e 02 20 4e 2b 6a f7 f9 24 c2 24 0e |.?. .. N+j..$.$.| +peer0.org1.example.com | 00000030 a6 00 e8 66 de f1 86 65 02 e6 fa 6c c8 55 a8 7b |...f...e...l.U.{| +peer0.org1.example.com | 00000040 55 9d ee 03 a6 cc 68 |U.....h|" +peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [cauthdsl] func2 -> DEBU 23e9 0xc0043b4cc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [cauthdsl] func1 -> DEBU 23ea 0xc0043b4cc0 gate 1556789267982597500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23eb Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23ed Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:47.984 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 23ef constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 23f0 constructing new tx simulator txid = [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]" +peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [endorser] SimulateProposal -> DEBU 23f1 [businesschannel][530e2b52] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [stateleveldb] GetState -> DEBU 23f2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [endorser] callChaincode -> INFO 23f3 [businesschannel][530e2b52] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [stateleveldb] GetState -> DEBU 23f4 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [stateleveldb] GetState -> DEBU 23f5 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:47.985 UTC [chaincode] Execute -> DEBU 23f6 Entry" +peer0.org1.example.com | "2019-05-02 09:27:47.987 UTC [chaincode] handleMessage -> DEBU 23f7 [530e2b52] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:47.988 UTC [chaincode] HandleTransaction -> DEBU 23f8 [530e2b52] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:47.988 UTC [chaincode] HandleGetState -> DEBU 23f9 [530e2b52] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:47.988 UTC [stateleveldb] GetState -> DEBU 23fa GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-05-02 09:27:47.988 UTC [chaincode] HandleTransaction -> DEBU 23fb [530e2b52] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [chaincode] handleMessage -> DEBU 23fc [530e2b52] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [chaincode] Notify -> DEBU 23fd [530e2b52] notifying Txid:530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [chaincode] Execute -> DEBU 23fe Exit" +peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [endorser] callChaincode -> INFO 23ff [businesschannel][530e2b52] Exit chaincode: name:"exp02" (5ms)" +peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2400 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [lockbasedtxmgr] Done -> DEBU 2401 Done with transaction simulation / query execution [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]" +peer0.org1.example.com | "2019-05-02 09:27:47.990 UTC [endorser] SimulateProposal -> DEBU 2402 [businesschannel][530e2b52] Exit" +peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] endorseProposal -> DEBU 2403 [businesschannel][530e2b52] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] endorseProposal -> DEBU 2404 [businesschannel][530e2b52] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] EndorseWithPlugin -> DEBU 2405 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [msp.identity] Sign -> DEBU 2406 Sign: plaintext: 0A202175C709353540E8383BBA807F9D...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [msp.identity] Sign -> DEBU 2407 Sign: digest: 13DF92C85D3D98E9660CD59358942D66AA4BB186A238D02DE1B85C13BB2342A5 " +peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] EndorseWithPlugin -> DEBU 2408 Exiting {plugin: escc, channel: businesschannel, tx: 530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] endorseProposal -> DEBU 2409 [businesschannel][530e2b52] Exit" +peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [lockbasedtxmgr] Done -> DEBU 240a Done with transaction simulation / query execution [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]" +peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [endorser] func1 -> DEBU 240b Exit: request from 172.18.0.8:57366" +peer0.org1.example.com | "2019-05-02 09:27:47.991 UTC [comm.grpc.server] 1 -> INFO 240c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57366 grpc.code=OK grpc.call_duration=11.6036ms +peer0.org1.example.com | "2019-05-02 09:27:47.996 UTC [grpc] infof -> DEBU 240e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:47.996 UTC [grpc] infof -> DEBU 240d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [msp] DeserializeIdentity -> DEBU 240f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [msp] DeserializeIdentity -> DEBU 2410 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] Send -> DEBU 2411 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2412 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2413 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2414 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2415 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2416 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2417 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.250 UTC [gossip.gossip] handleMessage -> DEBU 2418 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.250 UTC [msp.identity] Verify -> DEBU 2419 Verify: digest = 00000000 68 a0 91 32 58 25 d2 e9 b4 f1 f6 51 2d 2f d9 d1 |h..2X%.....Q-/..| +peer0.org1.example.com | 00000010 6b a5 4d d8 c9 b8 ff bb 59 82 57 08 9b 8e 94 9a |k.M.....Y.W.....|" +peer0.org1.example.com | "2019-05-02 09:27:48.250 UTC [msp.identity] Verify -> DEBU 241a Verify: sig = 00000000 30 45 02 21 00 ed 3d 05 5c 5c 47 80 b3 b3 19 40 |0E.!..=.\\G....@| +peer0.org1.example.com | 00000010 d6 c3 20 7b 98 55 5b c3 19 15 67 b4 27 d4 3e d7 |.. {.U[...g.'.>.| +peer0.org1.example.com | 00000020 16 bd 0f f5 d8 02 20 61 ec e8 6c 5f 0d 36 b4 ba |...... a..l_.6..| +peer0.org1.example.com | 00000030 ff a7 9d 63 23 55 67 1f 9e e9 41 fb 03 6e 7b d4 |...c#Ug...A..n{.| +peer0.org1.example.com | 00000040 7e b3 79 82 f0 9e c8 |~.y....|" +peer0.org1.example.com | "2019-05-02 09:27:48.250 UTC [msp] DeserializeIdentity -> DEBU 241b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.250 UTC [msp] DeserializeIdentity -> DEBU 241c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 241d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 241e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 241f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2420 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2421 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2422 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func1 -> DEBU 2423 0xc0043f28b0 gate 1556789268251419900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2424 0xc0043f28b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2425 0xc0043f28b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2426 0xc0043f28b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2427 0xc0043f28b0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func1 -> DEBU 2428 0xc0043f28b0 gate 1556789268251419900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2429 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 242a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 242b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func1 -> DEBU 242c 0xc0043f30f0 gate 1556789268251817900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 242d 0xc0043f30f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 242e 0xc0043f30f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 242f 0xc0043f30f0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [msp.identity] Verify -> DEBU 2430 Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [msp.identity] Verify -> DEBU 2431 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [cauthdsl] func2 -> DEBU 2432 0xc0043f30f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [cauthdsl] func1 -> DEBU 2433 0xc0043f30f0 gate 1556789268251817900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2434 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2435 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2436 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2437 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [msp] DeserializeIdentity -> DEBU 2438 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [msp] DeserializeIdentity -> DEBU 2439 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 243a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 243b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 243c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 243d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 243e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 243f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func1 -> DEBU 2440 0xc0044028c0 gate 1556789268253151500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2441 0xc0044028c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2442 0xc0044028c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2443 0xc0044028c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2444 0xc0044028c0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func1 -> DEBU 2445 0xc0044028c0 gate 1556789268253151500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 2446 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 2447 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 2448 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func1 -> DEBU 2449 0xc004403100 gate 1556789268253762800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 244a 0xc004403100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 244b 0xc004403100 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 244c 0xc004403100 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.254 UTC [msp] DeserializeIdentity -> DEBU 244d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.254 UTC [msp] DeserializeIdentity -> DEBU 244e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.254 UTC [gossip.comm] Send -> DEBU 244f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:48.254 UTC [msp] DeserializeIdentity -> DEBU 2450 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [msp] DeserializeIdentity -> DEBU 2451 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2452 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2453 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2454 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2455 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2456 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2457 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.254 UTC [msp.identity] Verify -> DEBU 2458 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.| +peer0.org1.example.com | 00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|" +peer0.org1.example.com | "2019-05-02 09:27:48.256 UTC [msp.identity] Verify -> DEBU 2459 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..| +peer0.org1.example.com | 00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.| +peer0.org1.example.com | 00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{| +peer0.org1.example.com | 00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.| +peer0.org1.example.com | 00000040 a3 8e ff fc ae d2 |......|" +peer0.org1.example.com | "2019-05-02 09:27:48.256 UTC [cauthdsl] func2 -> DEBU 245a 0xc004403100 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [cauthdsl] func1 -> DEBU 245b 0xc004403100 gate 1556789268253762800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.257 UTC [msp.identity] Verify -> DEBU 2460 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [msp.identity] Verify -> DEBU 2461 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2462 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2463 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [policies] Evaluate -> DEBU 2464 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [policies] Evaluate -> DEBU 2465 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [policies] Evaluate -> DEBU 2466 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [cauthdsl] func1 -> DEBU 2467 0xc004426800 gate 1556789268258599200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [cauthdsl] func2 -> DEBU 2468 0xc004426800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [cauthdsl] func2 -> DEBU 2469 0xc004426800 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [cauthdsl] func2 -> DEBU 246a 0xc004426800 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [msp.identity] Verify -> DEBU 246b Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +peer0.org1.example.com | "2019-05-02 09:27:48.258 UTC [msp.identity] Verify -> DEBU 246c Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [cauthdsl] func2 -> DEBU 246d 0xc004426800 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [cauthdsl] func1 -> DEBU 246e 0xc004426800 gate 1556789268258599200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 246f Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 2470 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 2471 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 2472 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [gossip.gossip] handleMessage -> DEBU 2473 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [gossip.gossip] handleMessage -> DEBU 2474 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [msp] DeserializeIdentity -> DEBU 2475 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [msp.identity] Verify -> DEBU 2476 Verify: digest = 00000000 68 a0 91 32 58 25 d2 e9 b4 f1 f6 51 2d 2f d9 d1 |h..2X%.....Q-/..| +peer0.org1.example.com | 00000010 6b a5 4d d8 c9 b8 ff bb 59 82 57 08 9b 8e 94 9a |k.M.....Y.W.....|" +peer0.org1.example.com | "2019-05-02 09:27:48.259 UTC [msp.identity] Verify -> DEBU 2477 Verify: sig = 00000000 30 45 02 21 00 ed 3d 05 5c 5c 47 80 b3 b3 19 40 |0E.!..=.\\G....@| +peer0.org1.example.com | 00000010 d6 c3 20 7b 98 55 5b c3 19 15 67 b4 27 d4 3e d7 |.. {.U[...g.'.>.| +peer0.org1.example.com | 00000020 16 bd 0f f5 d8 02 20 61 ec e8 6c 5f 0d 36 b4 ba |...... a..l_.6..| +peer0.org1.example.com | 00000030 ff a7 9d 63 23 55 67 1f 9e e9 41 fb 03 6e 7b d4 |...c#Ug...A..n{.| +peer0.org1.example.com | 00000040 7e b3 79 82 f0 9e c8 |~.y....|" +peer0.org1.example.com | "2019-05-02 09:27:48.260 UTC [msp.identity] Verify -> DEBU 2478 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +peer0.org1.example.com | "2019-05-02 09:27:48.260 UTC [msp.identity] Verify -> DEBU 2479 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|" +peer0.org1.example.com | "2019-05-02 09:27:48.260 UTC [msp] DeserializeIdentity -> DEBU 247a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.261 UTC [msp] DeserializeIdentity -> DEBU 247b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.262 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 247c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.262 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 247d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.262 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 247e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.263 UTC [policies] Evaluate -> DEBU 247f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.263 UTC [policies] Evaluate -> DEBU 2480 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.264 UTC [policies] Evaluate -> DEBU 2481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.264 UTC [cauthdsl] func1 -> DEBU 2482 0xc00443f150 gate 1556789268264625900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.264 UTC [cauthdsl] func2 -> DEBU 2483 0xc00443f150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.264 UTC [cauthdsl] func2 -> DEBU 2484 0xc00443f150 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.265 UTC [cauthdsl] func2 -> DEBU 2485 0xc00443f150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.265 UTC [cauthdsl] func2 -> DEBU 2486 0xc00443f150 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.265 UTC [cauthdsl] func1 -> DEBU 2487 0xc00443f150 gate 1556789268264625900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.266 UTC [policies] Evaluate -> DEBU 2488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.266 UTC [policies] Evaluate -> DEBU 2489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.266 UTC [policies] Evaluate -> DEBU 248a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.266 UTC [cauthdsl] func1 -> DEBU 248b 0xc00443f990 gate 1556789268266903400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.267 UTC [cauthdsl] func2 -> DEBU 248c 0xc00443f990 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.267 UTC [cauthdsl] func2 -> DEBU 248d 0xc00443f990 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.267 UTC [cauthdsl] func2 -> DEBU 248e 0xc00443f990 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.268 UTC [msp.identity] Verify -> DEBU 248f Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.| +peer0.org1.example.com | 00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|" +peer0.org1.example.com | "2019-05-02 09:27:48.268 UTC [msp.identity] Verify -> DEBU 2490 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..| +peer0.org1.example.com | 00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.| +peer0.org1.example.com | 00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{| +peer0.org1.example.com | 00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.| +peer0.org1.example.com | 00000040 a3 8e ff fc ae d2 |......|" +peer0.org1.example.com | "2019-05-02 09:27:48.269 UTC [cauthdsl] func2 -> DEBU 2491 0xc00443f990 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.269 UTC [cauthdsl] func1 -> DEBU 2492 0xc00443f990 gate 1556789268266903400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.269 UTC [policies] Evaluate -> DEBU 2493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.269 UTC [policies] Evaluate -> DEBU 2494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.270 UTC [policies] Evaluate -> DEBU 2495 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.270 UTC [policies] Evaluate -> DEBU 2496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.270 UTC [msp] DeserializeIdentity -> DEBU 2497 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.271 UTC [msp] DeserializeIdentity -> DEBU 2498 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.271 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2499 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.271 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 249a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.272 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 249b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.272 UTC [policies] Evaluate -> DEBU 249c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.272 UTC [policies] Evaluate -> DEBU 249d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.272 UTC [policies] Evaluate -> DEBU 249e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.273 UTC [cauthdsl] func1 -> DEBU 249f 0xc004453160 gate 1556789268273201000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.273 UTC [cauthdsl] func2 -> DEBU 24a0 0xc004453160 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.273 UTC [cauthdsl] func2 -> DEBU 24a1 0xc004453160 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.274 UTC [cauthdsl] func2 -> DEBU 24a2 0xc004453160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.274 UTC [cauthdsl] func2 -> DEBU 24a3 0xc004453160 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.274 UTC [cauthdsl] func1 -> DEBU 24a4 0xc004453160 gate 1556789268273201000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.274 UTC [policies] Evaluate -> DEBU 24a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.275 UTC [policies] Evaluate -> DEBU 24a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.275 UTC [policies] Evaluate -> DEBU 24a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.276 UTC [cauthdsl] func1 -> DEBU 24a8 0xc0044539a0 gate 1556789268276482200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.276 UTC [cauthdsl] func2 -> DEBU 24a9 0xc0044539a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.277 UTC [cauthdsl] func2 -> DEBU 24aa 0xc0044539a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.277 UTC [cauthdsl] func2 -> DEBU 24ab 0xc0044539a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.277 UTC [msp.identity] Verify -> DEBU 24ac Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +peer0.org1.example.com | "2019-05-02 09:27:48.278 UTC [msp.identity] Verify -> DEBU 24ad Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +peer0.org1.example.com | "2019-05-02 09:27:48.279 UTC [cauthdsl] func2 -> DEBU 24ae 0xc0044539a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.279 UTC [cauthdsl] func1 -> DEBU 24af 0xc0044539a0 gate 1556789268276482200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.279 UTC [policies] Evaluate -> DEBU 24b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.279 UTC [policies] Evaluate -> DEBU 24b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.280 UTC [policies] Evaluate -> DEBU 24b2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.280 UTC [policies] Evaluate -> DEBU 24b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.280 UTC [msp] DeserializeIdentity -> DEBU 24b4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24b5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24b6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.281 UTC [policies] Evaluate -> DEBU 24b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.281 UTC [policies] Evaluate -> DEBU 24b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.282 UTC [policies] Evaluate -> DEBU 24b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.282 UTC [cauthdsl] func1 -> DEBU 24ba 0xc004464a80 gate 1556789268282587800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.282 UTC [cauthdsl] func2 -> DEBU 24bb 0xc004464a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.283 UTC [cauthdsl] func2 -> DEBU 24bc 0xc004464a80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.283 UTC [cauthdsl] func2 -> DEBU 24bd 0xc004464a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.284 UTC [cauthdsl] func2 -> DEBU 24be 0xc004464a80 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.285 UTC [cauthdsl] func1 -> DEBU 24bf 0xc004464a80 gate 1556789268282587800 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.285 UTC [policies] Evaluate -> DEBU 24c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.286 UTC [policies] Evaluate -> DEBU 24c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.286 UTC [policies] Evaluate -> DEBU 24c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.286 UTC [cauthdsl] func1 -> DEBU 24c4 0xc0044652c0 gate 1556789268286391400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.285 UTC [gossip.comm] func1 -> DEBU 24c0 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.286 UTC [cauthdsl] func2 -> DEBU 24c5 0xc0044652c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.287 UTC [cauthdsl] func2 -> DEBU 24c6 0xc0044652c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.287 UTC [cauthdsl] func2 -> DEBU 24c7 0xc0044652c0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.287 UTC [msp.identity] Verify -> DEBU 24c8 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +peer0.org1.example.com | "2019-05-02 09:27:48.288 UTC [msp.identity] Verify -> DEBU 24c9 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +peer0.org1.example.com | "2019-05-02 09:27:48.288 UTC [cauthdsl] func2 -> DEBU 24ca 0xc0044652c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.290 UTC [gossip.comm] func1 -> DEBU 24cb Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.288 UTC [cauthdsl] func1 -> DEBU 24cc 0xc0044652c0 gate 1556789268286391400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.290 UTC [policies] Evaluate -> DEBU 24cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.290 UTC [policies] Evaluate -> DEBU 24ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.291 UTC [policies] Evaluate -> DEBU 24cf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.291 UTC [policies] Evaluate -> DEBU 24d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.291 UTC [gossip.gossip] handleMessage -> DEBU 24d1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.291 UTC [gossip.gossip] handleMessage -> DEBU 24d2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.291 UTC [msp] DeserializeIdentity -> DEBU 24d3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.292 UTC [msp.identity] Verify -> DEBU 24d4 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +peer0.org1.example.com | 00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +peer0.org1.example.com | "2019-05-02 09:27:48.292 UTC [msp.identity] Verify -> DEBU 24d5 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +peer0.org1.example.com | 00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +peer0.org1.example.com | 00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +peer0.org1.example.com | 00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +peer0.org1.example.com | 00000040 fe 64 5a aa 06 63 |.dZ..c|" +peer0.org1.example.com | "2019-05-02 09:27:48.293 UTC [msp] DeserializeIdentity -> DEBU 24d6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.293 UTC [msp] DeserializeIdentity -> DEBU 24d7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.293 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24d8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24d9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24da Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [policies] Evaluate -> DEBU 24db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [policies] Evaluate -> DEBU 24dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [policies] Evaluate -> DEBU 24dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [cauthdsl] func1 -> DEBU 24de 0xc0044774f0 gate 1556789268294600500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [cauthdsl] func2 -> DEBU 24df 0xc0044774f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.294 UTC [cauthdsl] func2 -> DEBU 24e0 0xc0044774f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [cauthdsl] func2 -> DEBU 24e1 0xc0044774f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [cauthdsl] func2 -> DEBU 24e2 0xc0044774f0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [cauthdsl] func1 -> DEBU 24e3 0xc0044774f0 gate 1556789268294600500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [policies] Evaluate -> DEBU 24e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [policies] Evaluate -> DEBU 24e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [policies] Evaluate -> DEBU 24e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.295 UTC [cauthdsl] func1 -> DEBU 24e7 0xc004477d30 gate 1556789268295938500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.296 UTC [cauthdsl] func2 -> DEBU 24e8 0xc004477d30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.296 UTC [cauthdsl] func2 -> DEBU 24e9 0xc004477d30 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.296 UTC [cauthdsl] func2 -> DEBU 24ea 0xc004477d30 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.296 UTC [msp.identity] Verify -> DEBU 24eb Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +peer0.org1.example.com | 00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [msp.identity] Verify -> DEBU 24ec Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +peer0.org1.example.com | 00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +peer0.org1.example.com | 00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +peer0.org1.example.com | 00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +peer0.org1.example.com | 00000040 a3 34 89 3e 9c 04 |.4.>..|" +peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [cauthdsl] func2 -> DEBU 24ed 0xc004477d30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [cauthdsl] func1 -> DEBU 24ee 0xc004477d30 gate 1556789268295938500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [policies] Evaluate -> DEBU 24ef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [policies] Evaluate -> DEBU 24f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.297 UTC [policies] Evaluate -> DEBU 24f1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.298 UTC [policies] Evaluate -> DEBU 24f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.298 UTC [msp] DeserializeIdentity -> DEBU 24f3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.298 UTC [msp] DeserializeIdentity -> DEBU 24f4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.299 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.299 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24f6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.299 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24f7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.299 UTC [policies] Evaluate -> DEBU 24f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [policies] Evaluate -> DEBU 24f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [policies] Evaluate -> DEBU 24fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [cauthdsl] func1 -> DEBU 24fb 0xc00448f500 gate 1556789268300169100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [cauthdsl] func2 -> DEBU 24fc 0xc00448f500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [cauthdsl] func2 -> DEBU 24fd 0xc00448f500 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.300 UTC [cauthdsl] func2 -> DEBU 24fe 0xc00448f500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.301 UTC [cauthdsl] func2 -> DEBU 24ff 0xc00448f500 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.301 UTC [cauthdsl] func1 -> DEBU 2500 0xc00448f500 gate 1556789268300169100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.301 UTC [policies] Evaluate -> DEBU 2501 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.301 UTC [policies] Evaluate -> DEBU 2502 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.301 UTC [policies] Evaluate -> DEBU 2503 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.302 UTC [cauthdsl] func1 -> DEBU 2504 0xc00448fd40 gate 1556789268302168700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.302 UTC [cauthdsl] func2 -> DEBU 2505 0xc00448fd40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.302 UTC [cauthdsl] func2 -> DEBU 2506 0xc00448fd40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.302 UTC [cauthdsl] func2 -> DEBU 2507 0xc00448fd40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.302 UTC [msp.identity] Verify -> DEBU 2508 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.| +peer0.org1.example.com | 00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|" +peer0.org1.example.com | "2019-05-02 09:27:48.303 UTC [msp.identity] Verify -> DEBU 2509 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. | +peer0.org1.example.com | 00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3| +peer0.org1.example.com | 00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$| +peer0.org1.example.com | 00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E| +peer0.org1.example.com | 00000040 ca 44 3d eb 27 9e 00 |.D=.'..|" +peer0.org1.example.com | "2019-05-02 09:27:48.303 UTC [cauthdsl] func2 -> DEBU 250a 0xc00448fd40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.303 UTC [cauthdsl] func1 -> DEBU 250b 0xc00448fd40 gate 1556789268302168700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [msp] DeserializeIdentity -> DEBU 2510 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2511 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2512 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [policies] Evaluate -> DEBU 2513 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [policies] Evaluate -> DEBU 2514 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [policies] Evaluate -> DEBU 2515 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [cauthdsl] func1 -> DEBU 2516 0xc0044a2e20 gate 1556789268305827600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.305 UTC [cauthdsl] func2 -> DEBU 2517 0xc0044a2e20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [cauthdsl] func2 -> DEBU 2518 0xc0044a2e20 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [cauthdsl] func2 -> DEBU 2519 0xc0044a2e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [cauthdsl] func2 -> DEBU 251a 0xc0044a2e20 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [cauthdsl] func1 -> DEBU 251b 0xc0044a2e20 gate 1556789268305827600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [policies] Evaluate -> DEBU 251c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [policies] Evaluate -> DEBU 251d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.306 UTC [policies] Evaluate -> DEBU 251e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [cauthdsl] func1 -> DEBU 251f 0xc0044a3660 gate 1556789268307067800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [cauthdsl] func2 -> DEBU 2520 0xc0044a3660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [cauthdsl] func2 -> DEBU 2521 0xc0044a3660 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [cauthdsl] func2 -> DEBU 2522 0xc0044a3660 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [msp.identity] Verify -> DEBU 2523 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.| +peer0.org1.example.com | 00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|" +peer0.org1.example.com | "2019-05-02 09:27:48.307 UTC [msp.identity] Verify -> DEBU 2524 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. | +peer0.org1.example.com | 00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3| +peer0.org1.example.com | 00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$| +peer0.org1.example.com | 00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E| +peer0.org1.example.com | 00000040 ca 44 3d eb 27 9e 00 |.D=.'..|" +peer0.org1.example.com | "2019-05-02 09:27:48.308 UTC [cauthdsl] func2 -> DEBU 2525 0xc0044a3660 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.308 UTC [cauthdsl] func1 -> DEBU 2526 0xc0044a3660 gate 1556789268307067800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 2527 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 2528 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 2529 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 252a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.309 UTC [msp.identity] Verify -> DEBU 252b Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....| +peer0.org1.example.com | 00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|" +peer0.org1.example.com | "2019-05-02 09:27:48.310 UTC [msp.identity] Verify -> DEBU 252c Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj| +peer0.org1.example.com | 00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<| +peer0.org1.example.com | 00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&| +peer0.org1.example.com | 00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..| +peer0.org1.example.com | 00000040 97 4a 87 c3 f2 e2 |.J....|" +peer0.org1.example.com | "2019-05-02 09:27:48.310 UTC [gossip.gossip] handleMessage -> DEBU 252d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.310 UTC [gossip.gossip] handleMessage -> DEBU 252e Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.311 UTC [msp.identity] Verify -> DEBU 252f Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....| +peer0.org1.example.com | 00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|" +peer0.org1.example.com | "2019-05-02 09:27:48.311 UTC [msp.identity] Verify -> DEBU 2530 Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj| +peer0.org1.example.com | 00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<| +peer0.org1.example.com | 00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&| +peer0.org1.example.com | 00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..| +peer0.org1.example.com | 00000040 97 4a 87 c3 f2 e2 |.J....|" +peer0.org1.example.com | "2019-05-02 09:27:48.311 UTC [msp] DeserializeIdentity -> DEBU 2531 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.312 UTC [gossip.gossip] handleMessage -> DEBU 2532 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.506 UTC [gossip.gossip] handleMessage -> DEBU 2533 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.507 UTC [msp] DeserializeIdentity -> DEBU 2534 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.507 UTC [msp] DeserializeIdentity -> DEBU 2535 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.508 UTC [gossip.gossip] handleMessage -> DEBU 2536 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.515 UTC [gossip.gossip] handleMessage -> DEBU 2537 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.516 UTC [msp.identity] Verify -> DEBU 2538 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +peer0.org1.example.com | "2019-05-02 09:27:48.516 UTC [msp.identity] Verify -> DEBU 2539 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|" +peer0.org1.example.com | "2019-05-02 09:27:48.516 UTC [gossip.gossip] handleMessage -> DEBU 253a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.520 UTC [gossip.comm] func1 -> DEBU 253b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.521 UTC [gossip.gossip] handleMessage -> DEBU 253c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.521 UTC [msp.identity] Verify -> DEBU 253d Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +peer0.org1.example.com | "2019-05-02 09:27:48.521 UTC [msp.identity] Verify -> DEBU 253e Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|" +peer0.org1.example.com | "2019-05-02 09:27:48.522 UTC [msp] DeserializeIdentity -> DEBU 253f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.522 UTC [gossip.gossip] handleMessage -> DEBU 2540 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.533 UTC [gossip.gossip] handleMessage -> DEBU 2541 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.535 UTC [msp.identity] Verify -> DEBU 2542 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +peer0.org1.example.com | "2019-05-02 09:27:48.535 UTC [msp.identity] Verify -> DEBU 2543 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|" +peer0.org1.example.com | "2019-05-02 09:27:48.536 UTC [msp] DeserializeIdentity -> DEBU 2544 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.536 UTC [gossip.gossip] handleMessage -> DEBU 2545 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.556 UTC [gossip.gossip] handleMessage -> DEBU 2546 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.556 UTC [gossip.pull] HandleMessage -> DEBU 2547 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.556 UTC [gossip.pull] SendDigest -> DEBU 2548 Sending BLOCK_MSG digest: [4 5 6 7 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:48.556 UTC [gossip.gossip] handleMessage -> DEBU 2549 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.753 UTC [gossip.gossip] handleMessage -> DEBU 254a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.753 UTC [msp] DeserializeIdentity -> DEBU 254b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.754 UTC [msp] DeserializeIdentity -> DEBU 254c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.754 UTC [msp] DeserializeIdentity -> DEBU 254d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.754 UTC [gossip.gossip] handleMessage -> DEBU 254e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.761 UTC [gossip.gossip] handleMessage -> DEBU 254f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789267062989700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.761 UTC [msp] DeserializeIdentity -> DEBU 2550 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2551 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2552 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2553 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [policies] Evaluate -> DEBU 2554 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [policies] Evaluate -> DEBU 2555 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [policies] Evaluate -> DEBU 2556 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [cauthdsl] func1 -> DEBU 2557 0xc0044f2ed0 gate 1556789268762539800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [cauthdsl] func2 -> DEBU 2558 0xc0044f2ed0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [cauthdsl] func2 -> DEBU 2559 0xc0044f2ed0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.762 UTC [cauthdsl] func2 -> DEBU 255a 0xc0044f2ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 255b 0xc0044f2ed0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func1 -> DEBU 255c 0xc0044f2ed0 gate 1556789268762539800 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [policies] Evaluate -> DEBU 255d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [policies] Evaluate -> DEBU 255e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [policies] Evaluate -> DEBU 255f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func1 -> DEBU 2560 0xc0044f3710 gate 1556789268763478500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 2561 0xc0044f3710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 2562 0xc0044f3710 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 2563 0xc0044f3710 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.763 UTC [msp.identity] Verify -> DEBU 2564 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [msp.identity] Verify -> DEBU 2565 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [cauthdsl] func2 -> DEBU 2566 0xc0044f3710 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [cauthdsl] func1 -> DEBU 2567 0xc0044f3710 gate 1556789268763478500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 2568 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 2569 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 256a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 256b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [msp] DeserializeIdentity -> DEBU 256c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.764 UTC [gossip.gossip] handleMessage -> DEBU 256d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.767 UTC [gossip.comm] func1 -> DEBU 256e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789267062989700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.767 UTC [gossip.gossip] handleMessage -> DEBU 256f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789267062989700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [msp] DeserializeIdentity -> DEBU 2570 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2571 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2572 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2573 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 2574 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 2575 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 2576 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func1 -> DEBU 2577 0xc004507280 gate 1556789268768569000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 2578 0xc004507280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 2579 0xc004507280 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 257a 0xc004507280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 257b 0xc004507280 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [cauthdsl] func1 -> DEBU 257c 0xc004507280 gate 1556789268768569000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 257d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 257e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 257f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func1 -> DEBU 2580 0xc004507ac0 gate 1556789268769127900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2581 0xc004507ac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2582 0xc004507ac0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2583 0xc004507ac0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [msp.identity] Verify -> DEBU 2584 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [msp.identity] Verify -> DEBU 2585 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2586 0xc004507ac0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [cauthdsl] func1 -> DEBU 2587 0xc004507ac0 gate 1556789268769127900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 2588 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 2589 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 258a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 258b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.770 UTC [msp] DeserializeIdentity -> DEBU 258c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.770 UTC [gossip.gossip] handleMessage -> DEBU 258d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.802 UTC [gossip.comm] func1 -> DEBU 258e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.802 UTC [gossip.gossip] handleMessage -> DEBU 258f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.802 UTC [gossip.gossip] handleMessage -> DEBU 2590 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2591 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.802 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2592 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [msp] DeserializeIdentity -> DEBU 2593 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2594 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2595 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2596 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [policies] Evaluate -> DEBU 2597 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [policies] Evaluate -> DEBU 2598 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [policies] Evaluate -> DEBU 2599 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.803 UTC [cauthdsl] func1 -> DEBU 259a 0xc00451b9b0 gate 1556789268803937500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259b 0xc00451b9b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259c 0xc00451b9b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259d 0xc00451b9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259e 0xc00451b9b0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func1 -> DEBU 259f 0xc00451b9b0 gate 1556789268803937500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [policies] Evaluate -> DEBU 25a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [policies] Evaluate -> DEBU 25a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [policies] Evaluate -> DEBU 25a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func1 -> DEBU 25a3 0xc00452e1f0 gate 1556789268804893200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 25a4 0xc00452e1f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [cauthdsl] func2 -> DEBU 25a5 0xc00452e1f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [cauthdsl] func2 -> DEBU 25a6 0xc00452e1f0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [msp.identity] Verify -> DEBU 25a7 Verify: digest = 00000000 7b 98 ff a8 3f da 20 30 17 05 b3 77 64 bc b0 b2 |{...?. 0...wd...| +peer0.org1.example.com | 00000010 0e 41 f2 02 55 9f 6b 22 17 72 47 c0 35 2b d0 00 |.A..U.k".rG.5+..|" +peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [msp.identity] Verify -> DEBU 25a8 Verify: sig = 00000000 30 45 02 21 00 ba 38 b9 2d 06 48 b0 09 68 0a ef |0E.!..8.-.H..h..| +peer0.org1.example.com | 00000010 fc 0a 79 2b 7a 6c 56 3a 5c e3 e2 49 34 96 71 20 |..y+zlV:\..I4.q | +peer0.org1.example.com | 00000020 1d 6d 3a da ba 02 20 11 de 87 a6 61 4b 15 d2 a5 |.m:... ....aK...| +peer0.org1.example.com | 00000030 9a 63 f9 94 9d 1a c6 c1 da d1 bf 41 43 64 8c ee |.c.........ACd..| +peer0.org1.example.com | 00000040 4e 69 e5 82 1b e2 6c |Ni....l|" +peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [cauthdsl] func2 -> DEBU 25a9 0xc00452e1f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [cauthdsl] func1 -> DEBU 25aa 0xc00452e1f0 gate 1556789268804893200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ab Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ad Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 25af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 " +peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 " +peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 25b5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.806 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25b6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.807 UTC [msp] DeserializeIdentity -> DEBU 25b7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.807 UTC [msp] DeserializeIdentity -> DEBU 25b8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25b9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25ba Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25bb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25bc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] Send -> DEBU 25bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25be Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25bf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] Send -> DEBU 25c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.813 UTC [gossip.comm] func1 -> DEBU 25c5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.813 UTC [gossip.gossip] handleMessage -> DEBU 25c6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.813 UTC [gossip.pull] HandleMessage -> DEBU 25c7 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.813 UTC [msp] DeserializeIdentity -> DEBU 25c8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25c9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25ca Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25cb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25cc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.815 UTC [msp] DeserializeIdentity -> DEBU 25cd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.815 UTC [gossip.pull] SendDigest -> DEBU 25ce Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:48.815 UTC [gossip.gossip] handleMessage -> DEBU 25cf Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.821 UTC [gossip.gossip] handleMessage -> DEBU 25d0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.822 UTC [gossip.gossip] handleMessage -> DEBU 25d1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.822 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.822 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.831 UTC [gossip.comm] func1 -> DEBU 25d4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.831 UTC [gossip.gossip] handleMessage -> DEBU 25d5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.832 UTC [gossip.gossip] handleMessage -> DEBU 25d6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.832 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25d8 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:48.832 UTC [msp] DeserializeIdentity -> DEBU 25d9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.833 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25da Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25db Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25dc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.833 UTC [policies] Evaluate -> DEBU 25dd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.833 UTC [policies] Evaluate -> DEBU 25de This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.834 UTC [policies] Evaluate -> DEBU 25df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.834 UTC [cauthdsl] func1 -> DEBU 25e0 0xc00455d010 gate 1556789268834572300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.834 UTC [cauthdsl] func2 -> DEBU 25e1 0xc00455d010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.835 UTC [cauthdsl] func2 -> DEBU 25e2 0xc00455d010 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.835 UTC [cauthdsl] func2 -> DEBU 25e3 0xc00455d010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.835 UTC [cauthdsl] func2 -> DEBU 25e4 0xc00455d010 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.835 UTC [cauthdsl] func1 -> DEBU 25e5 0xc00455d010 gate 1556789268834572300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.836 UTC [policies] Evaluate -> DEBU 25e6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.836 UTC [policies] Evaluate -> DEBU 25e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.836 UTC [policies] Evaluate -> DEBU 25e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.836 UTC [cauthdsl] func1 -> DEBU 25e9 0xc00455d850 gate 1556789268836696400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.836 UTC [cauthdsl] func2 -> DEBU 25ea 0xc00455d850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.837 UTC [cauthdsl] func2 -> DEBU 25eb 0xc00455d850 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.837 UTC [cauthdsl] func2 -> DEBU 25ec 0xc00455d850 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.837 UTC [msp.identity] Verify -> DEBU 25ed Verify: digest = 00000000 41 f8 24 e9 c5 5d 4b ef 6d 0c e0 73 af c4 a5 b7 |A.$..]K.m..s....| +peer0.org1.example.com | 00000010 ba 0b b8 1a 71 d0 16 b5 dc 66 fe 4e 0f 3e 0d 74 |....q....f.N.>.t|" +peer0.org1.example.com | "2019-05-02 09:27:48.837 UTC [msp.identity] Verify -> DEBU 25ee Verify: sig = 00000000 30 44 02 20 71 79 47 c9 31 7a f9 e0 d5 3a 07 3e |0D. qyG.1z...:.>| +peer0.org1.example.com | 00000010 fa 9b 3f c2 e7 8e b8 06 60 43 1c 52 b3 e9 49 65 |..?.....`C.R..Ie| +peer0.org1.example.com | 00000020 53 d5 91 6e 02 20 73 b2 65 d8 af 93 ce 0a 2a 22 |S..n. s.e.....*"| +peer0.org1.example.com | 00000030 ae 3b e5 77 76 2d 21 94 da 6b 81 bf 84 59 8b 86 |.;.wv-!..k...Y..| +peer0.org1.example.com | 00000040 92 76 ab 56 bb ca |.v.V..|" +peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [cauthdsl] func2 -> DEBU 25ef 0xc00455d850 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [cauthdsl] func1 -> DEBU 25f0 0xc00455d850 gate 1556789268836696400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.838 UTC [gossip.discovery] handleAliveMessage -> DEBU 25f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f7 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 " +peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 " +peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25fa Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.839 UTC [gossip.discovery] handleAliveMessage -> DEBU 25fb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.840 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25fc Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.840 UTC [gossip.discovery] sendMemResponse -> DEBU 25fd Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:48.841 UTC [msp] DeserializeIdentity -> DEBU 25fe Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.841 UTC [msp] DeserializeIdentity -> DEBU 25ff Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.841 UTC [msp] DeserializeIdentity -> DEBU 2600 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.842 UTC [gossip.comm] Send -> DEBU 2601 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:48.842 UTC [gossip.discovery] sendMemResponse -> DEBU 2602 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:48.842 UTC [gossip.comm] sendToEndpoint -> DEBU 2603 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.842 UTC [gossip.comm] sendToEndpoint -> DEBU 2604 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.989 UTC [gossip.comm] func1 -> DEBU 2605 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.989 UTC [gossip.comm] func1 -> DEBU 2606 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789267060314300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.989 UTC [gossip.gossip] handleMessage -> DEBU 2607 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.990 UTC [msp] DeserializeIdentity -> DEBU 2608 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.991 UTC [msp] DeserializeIdentity -> DEBU 2609 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.991 UTC [msp] DeserializeIdentity -> DEBU 260a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.991 UTC [gossip.gossip] handleMessage -> DEBU 260b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:48.992 UTC [gossip.gossip] handleMessage -> DEBU 260c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789267060314300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:48.992 UTC [msp] DeserializeIdentity -> DEBU 260d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:48.993 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 260e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:48.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 260f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2610 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:48.994 UTC [policies] Evaluate -> DEBU 2611 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.994 UTC [policies] Evaluate -> DEBU 2612 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:48.994 UTC [policies] Evaluate -> DEBU 2613 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.995 UTC [cauthdsl] func1 -> DEBU 2614 0xc00458ca80 gate 1556789268995205500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2615 0xc00458ca80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2616 0xc00458ca80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2617 0xc00458ca80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2618 0xc00458ca80 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.996 UTC [cauthdsl] func1 -> DEBU 2619 0xc00458ca80 gate 1556789268995205500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:48.996 UTC [policies] Evaluate -> DEBU 261a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.996 UTC [policies] Evaluate -> DEBU 261b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:48.996 UTC [policies] Evaluate -> DEBU 261c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:48.996 UTC [cauthdsl] func1 -> DEBU 261d 0xc00458d2c0 gate 1556789268996959200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:48.997 UTC [cauthdsl] func2 -> DEBU 261e 0xc00458d2c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:48.997 UTC [cauthdsl] func2 -> DEBU 261f 0xc00458d2c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:48.997 UTC [cauthdsl] func2 -> DEBU 2620 0xc00458d2c0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.997 UTC [msp.identity] Verify -> DEBU 2621 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.| +peer0.org1.example.com | 00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|" +peer0.org1.example.com | "2019-05-02 09:27:48.998 UTC [msp.identity] Verify -> DEBU 2622 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. | +peer0.org1.example.com | 00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3| +peer0.org1.example.com | 00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$| +peer0.org1.example.com | 00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E| +peer0.org1.example.com | 00000040 ca 44 3d eb 27 9e 00 |.D=.'..|" +peer0.org1.example.com | "2019-05-02 09:27:48.998 UTC [cauthdsl] func2 -> DEBU 2623 0xc00458d2c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:48.999 UTC [cauthdsl] func1 -> DEBU 2624 0xc00458d2c0 gate 1556789268996959200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:49.001 UTC [policies] Evaluate -> DEBU 2625 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.002 UTC [policies] Evaluate -> DEBU 2626 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.002 UTC [policies] Evaluate -> DEBU 2627 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.002 UTC [policies] Evaluate -> DEBU 2628 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.002 UTC [msp] DeserializeIdentity -> DEBU 2629 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.003 UTC [gossip.gossip] handleMessage -> DEBU 262a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.003 UTC [msp] DeserializeIdentity -> DEBU 262b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.003 UTC [msp] DeserializeIdentity -> DEBU 262c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.004 UTC [gossip.pull] Hello -> DEBU 262d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:49.004 UTC [msp] DeserializeIdentity -> DEBU 262e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.004 UTC [msp] DeserializeIdentity -> DEBU 262f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.005 UTC [gossip.comm] Send -> DEBU 2630 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.005 UTC [gossip.comm] sendToEndpoint -> DEBU 2631 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.005 UTC [gossip.comm] sendToEndpoint -> DEBU 2632 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.006 UTC [gossip.gossip] handleMessage -> DEBU 2633 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11370566117805470300 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6 7], Envelope: 55 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.007 UTC [gossip.pull] HandleMessage -> DEBU 2634 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11370566117805470300 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6 7], Envelope: 55 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.007 UTC [gossip.gossip] handleMessage -> DEBU 2635 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.042 UTC [msp.identity] Sign -> DEBU 2636 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101B " +peer0.org1.example.com | "2019-05-02 09:27:49.042 UTC [msp.identity] Sign -> DEBU 2637 Sign: digest: 3C9763F32527B00797EDDEC06813EDD9B992BECEEB58EAC8B782CF46E6F1E095 " +peer0.org1.example.com | "2019-05-02 09:27:49.043 UTC [msp.identity] Sign -> DEBU 2638 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:49.043 UTC [msp.identity] Sign -> DEBU 2639 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:49.044 UTC [gossip.discovery] periodicalSendAlive -> DEBU 263a Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:49.048 UTC [msp] DeserializeIdentity -> DEBU 263b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.049 UTC [msp] DeserializeIdentity -> DEBU 263c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.049 UTC [gossip.comm] Send -> DEBU 263d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.050 UTC [msp] DeserializeIdentity -> DEBU 263e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.050 UTC [gossip.comm] Send -> DEBU 263f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.050 UTC [gossip.comm] sendToEndpoint -> DEBU 2640 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.051 UTC [msp] DeserializeIdentity -> DEBU 2641 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.051 UTC [gossip.comm] sendToEndpoint -> DEBU 2642 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.051 UTC [gossip.comm] Send -> DEBU 2643 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.051 UTC [gossip.comm] sendToEndpoint -> DEBU 2644 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2645 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2646 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2647 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.090 UTC [gossip.pull] Hello -> DEBU 2648 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:49.091 UTC [gossip.comm] Send -> DEBU 2649 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.092 UTC [gossip.pull] Hello -> DEBU 264a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:49.096 UTC [gossip.comm] Send -> DEBU 264b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.096 UTC [gossip.pull] Hello -> DEBU 264c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:49.099 UTC [gossip.comm] Send -> DEBU 264f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.099 UTC [gossip.comm] sendToEndpoint -> DEBU 2650 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.099 UTC [gossip.comm] sendToEndpoint -> DEBU 2651 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.098 UTC [gossip.comm] sendToEndpoint -> DEBU 264e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.099 UTC [gossip.comm] sendToEndpoint -> DEBU 2652 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.096 UTC [gossip.comm] sendToEndpoint -> DEBU 264d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.100 UTC [gossip.comm] sendToEndpoint -> DEBU 2653 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.099 UTC [gossip.gossip] handleMessage -> DEBU 2654 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.104 UTC [gossip.gossip] handleMessage -> DEBU 2655 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.105 UTC [gossip.gossip] handleMessage -> DEBU 2656 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.107 UTC [gossip.pull] HandleMessage -> DEBU 2658 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2657 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.108 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2659 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.108 UTC [gossip.pull] SendDigest -> DEBU 265a Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:49.109 UTC [gossip.gossip] handleMessage -> DEBU 265b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.109 UTC [msp.identity] Verify -> DEBU 265c Verify: digest = 00000000 78 5d f0 85 0f 78 62 8e 8d 34 76 97 b8 80 60 0e |x]...xb..4v...`.| +peer0.org1.example.com | 00000010 04 3e ee e3 45 67 42 6a 1d a7 a5 1c 57 13 1c 46 |.>..EgBj....W..F|" +peer0.org1.example.com | "2019-05-02 09:27:49.110 UTC [msp.identity] Verify -> DEBU 265d Verify: sig = 00000000 30 44 02 20 1e aa 15 e4 2e 04 d6 f0 b4 b0 b0 7b |0D. ...........{| +peer0.org1.example.com | 00000010 49 d0 59 a5 09 9c d7 f0 3f 6e f3 5b 69 3c 63 cc |I.Y.....?n.[i..../....| +peer0.org1.example.com | 00000040 25 51 1a 6f c3 7a |%Q.o.z|" +peer0.org1.example.com | "2019-05-02 09:27:49.111 UTC [msp.identity] Verify -> DEBU 265f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:49.114 UTC [msp.identity] Verify -> DEBU 2660 Verify: sig = 00000000 30 45 02 21 00 a4 fe c1 d1 0d 87 f8 46 f1 47 5f |0E.!........F.G_| +peer0.org1.example.com | 00000010 d6 2c 18 ab 60 e5 e9 90 76 9c 72 e8 c5 90 74 28 |.,..`...v.r...t(| +peer0.org1.example.com | 00000020 67 1d ea 23 59 02 20 08 d7 7a bd aa 24 cd 22 c5 |g..#Y. ..z..$.".| +peer0.org1.example.com | 00000030 92 73 5a e7 4b 92 6e fa 0c 6f 19 31 5f 97 20 8f |.sZ.K.n..o.1_. .| +peer0.org1.example.com | 00000040 46 bd 42 92 ba 7d c1 |F.B..}.|" +peer0.org1.example.com | "2019-05-02 09:27:49.115 UTC [gossip.discovery] handleAliveMessage -> DEBU 2661 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2662 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:49.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2663 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 " +peer0.org1.example.com | "2019-05-02 09:27:49.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2664 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 " +peer0.org1.example.com | "2019-05-02 09:27:49.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2665 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:49.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2666 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 2667 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2668 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.109 UTC [gossip.gossip] handleMessage -> DEBU 265e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10473393887253975232 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.118 UTC [gossip.pull] HandleMessage -> DEBU 2669 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10473393887253975232 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.118 UTC [gossip.gossip] handleMessage -> DEBU 266a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.119 UTC [gossip.gossip] handleMessage -> DEBU 266b Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.119 UTC [gossip.gossip] handleMessage -> DEBU 266c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.119 UTC [gossip.gossip] handleMessage -> DEBU 266d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3336650009731732356 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.119 UTC [gossip.pull] HandleMessage -> DEBU 266e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3336650009731732356 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.120 UTC [gossip.gossip] handleMessage -> DEBU 266f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.120 UTC [gossip.gossip] handleMessage -> DEBU 2670 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2671 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2672 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2673 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.121 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2674 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.122 UTC [msp.identity] Verify -> DEBU 2675 Verify: digest = 00000000 69 59 a1 68 08 4d 75 c9 75 5e 82 05 a6 1c b1 7f |iY.h.Mu.u^......| +peer0.org1.example.com | 00000010 9c ed b4 7a e6 f9 54 5b 10 f6 b9 fc a1 8b 03 98 |...z..T[........|" +peer0.org1.example.com | "2019-05-02 09:27:49.122 UTC [msp.identity] Verify -> DEBU 2676 Verify: sig = 00000000 30 44 02 20 27 84 7b e8 97 85 09 98 01 c6 9a 4d |0D. '.{........M| +peer0.org1.example.com | 00000010 6c 2a fc 9f c2 e3 fe d4 51 55 9a 60 08 3a 70 da |l*......QU.`.:p.| +peer0.org1.example.com | 00000020 42 c5 fe 57 02 20 0e c3 74 e2 2a 5d 47 cd 9b 1c |B..W. ..t.*]G...| +peer0.org1.example.com | 00000030 b1 e1 e8 99 cd 65 cc 01 1e a6 b9 3c 47 52 bc fb |.....e..... DEBU 2677 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:49.123 UTC [msp.identity] Verify -> DEBU 2678 Verify: sig = 00000000 30 45 02 21 00 ef 4d 61 a2 d6 91 17 58 da 67 b0 |0E.!..Ma....X.g.| +peer0.org1.example.com | 00000010 e3 f1 82 93 4c 43 a7 45 26 09 09 d7 e4 f0 21 cf |....LC.E&.....!.| +peer0.org1.example.com | 00000020 9d fb 12 c1 20 02 20 74 b7 07 20 bf 91 0a 66 50 |.... . t.. ...fP| +peer0.org1.example.com | 00000030 db 35 c2 01 e8 c5 a9 c1 57 d9 30 2e d1 b0 37 0f |.5......W.0...7.| +peer0.org1.example.com | 00000040 b9 21 c1 7b 58 60 46 |.!.{X`F|" +peer0.org1.example.com | "2019-05-02 09:27:49.123 UTC [gossip.discovery] handleAliveMessage -> DEBU 2679 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267b updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 " +peer0.org1.example.com | "2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 " +peer0.org1.example.com | "2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:49.125 UTC [gossip.discovery] learnExistingMembers -> DEBU 267e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 267f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.125 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2680 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.126 UTC [gossip.discovery] sendMemResponse -> DEBU 2681 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:49.126 UTC [msp] DeserializeIdentity -> DEBU 2682 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.126 UTC [msp] DeserializeIdentity -> DEBU 2683 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.127 UTC [gossip.comm] Send -> DEBU 2684 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.127 UTC [gossip.discovery] sendMemResponse -> DEBU 2685 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:49.127 UTC [gossip.comm] sendToEndpoint -> DEBU 2686 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.127 UTC [gossip.comm] sendToEndpoint -> DEBU 2687 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.127 UTC [gossip.gossip] handleMessage -> DEBU 2688 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.128 UTC [msp] DeserializeIdentity -> DEBU 2689 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.128 UTC [msp] DeserializeIdentity -> DEBU 268a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.129 UTC [msp] DeserializeIdentity -> DEBU 268b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.129 UTC [gossip.comm] Send -> DEBU 268c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.129 UTC [msp] DeserializeIdentity -> DEBU 268d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.130 UTC [gossip.comm] Send -> DEBU 268e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.130 UTC [gossip.comm] sendToEndpoint -> DEBU 268f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.130 UTC [gossip.comm] sendToEndpoint -> DEBU 2690 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.131 UTC [gossip.comm] func1 -> DEBU 2691 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.133 UTC [gossip.comm] func1 -> DEBU 2694 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6061621436322034165 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.133 UTC [gossip.gossip] handleMessage -> DEBU 2695 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.134 UTC [gossip.gossip] handleMessage -> DEBU 2696 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.131 UTC [msp.identity] Sign -> DEBU 2692 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101C " +peer0.org1.example.com | "2019-05-02 09:27:49.135 UTC [msp.identity] Sign -> DEBU 2699 Sign: digest: BD1BD6FE9C1F80CB993D510424B58C699DF27D8503A07D17D8B1F81C087E00B4 " +peer0.org1.example.com | "2019-05-02 09:27:49.131 UTC [gossip.comm] sendToEndpoint -> DEBU 2693 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.135 UTC [gossip.gossip] handleMessage -> DEBU 2697 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6061621436322034165 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.135 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2698 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.136 UTC [msp.identity] Sign -> DEBU 269a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:49.137 UTC [msp.identity] Sign -> DEBU 269d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:49.136 UTC [gossip.comm] sendToEndpoint -> DEBU 269e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.137 UTC [gossip.comm] Send -> DEBU 269f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.137 UTC [msp] DeserializeIdentity -> DEBU 26a0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.137 UTC [gossip.comm] Send -> DEBU 26a1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.138 UTC [msp] DeserializeIdentity -> DEBU 26a2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.138 UTC [gossip.comm] Send -> DEBU 26a3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.138 UTC [gossip.comm] sendToEndpoint -> DEBU 26a4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.138 UTC [gossip.comm] sendToEndpoint -> DEBU 26a5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.139 UTC [gossip.comm] sendToEndpoint -> DEBU 26a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.139 UTC [gossip.comm] sendToEndpoint -> DEBU 26a7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.140 UTC [gossip.comm] sendToEndpoint -> DEBU 26a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.140 UTC [gossip.comm] sendToEndpoint -> DEBU 26a9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.136 UTC [gossip.pull] HandleMessage -> DEBU 269b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6061621436322034165 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.141 UTC [gossip.gossip] handleMessage -> DEBU 26aa Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.136 UTC [gossip.discovery] handleMsgFromComm -> DEBU 269c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.144 UTC [gossip.comm] func1 -> DEBU 26ab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.144 UTC [gossip.gossip] handleMessage -> DEBU 26ac Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.145 UTC [gossip.gossip] handleMessage -> DEBU 26ad Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26ae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.146 UTC [gossip.gossip] handleMessage -> DEBU 26af Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.147 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26b0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.148 UTC [msp.identity] Verify -> DEBU 26b1 Verify: digest = 00000000 69 59 a1 68 08 4d 75 c9 75 5e 82 05 a6 1c b1 7f |iY.h.Mu.u^......| +peer0.org1.example.com | 00000010 9c ed b4 7a e6 f9 54 5b 10 f6 b9 fc a1 8b 03 98 |...z..T[........|" +peer0.org1.example.com | "2019-05-02 09:27:49.148 UTC [msp.identity] Verify -> DEBU 26b2 Verify: sig = 00000000 30 44 02 20 27 84 7b e8 97 85 09 98 01 c6 9a 4d |0D. '.{........M| +peer0.org1.example.com | 00000010 6c 2a fc 9f c2 e3 fe d4 51 55 9a 60 08 3a 70 da |l*......QU.`.:p.| +peer0.org1.example.com | 00000020 42 c5 fe 57 02 20 0e c3 74 e2 2a 5d 47 cd 9b 1c |B..W. ..t.*]G...| +peer0.org1.example.com | 00000030 b1 e1 e8 99 cd 65 cc 01 1e a6 b9 3c 47 52 bc fb |.....e..... DEBU 26b3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.148 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.148 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26b5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.149 UTC [msp.identity] Verify -> DEBU 26b6 Verify: digest = 00000000 bd 1b d6 fe 9c 1f 80 cb 99 3d 51 04 24 b5 8c 69 |.........=Q.$..i| +peer0.org1.example.com | 00000010 9d f2 7d 85 03 a0 7d 17 d8 b1 f8 1c 08 7e 00 b4 |..}...}......~..|" +peer0.org1.example.com | "2019-05-02 09:27:49.149 UTC [msp.identity] Verify -> DEBU 26b7 Verify: sig = 00000000 30 44 02 20 09 93 30 c4 f6 46 b7 04 bb 5b 33 ca |0D. ..0..F...[3.| +peer0.org1.example.com | 00000010 39 84 57 4f 5e 22 17 4a 90 ed cf 82 ee 49 e9 e7 |9.WO^".J.....I..| +peer0.org1.example.com | 00000020 97 4e 4b 7a 02 20 11 71 59 ed f1 9c 4f 12 f1 19 |.NKz. .qY...O...| +peer0.org1.example.com | 00000030 e9 ec d1 76 c1 67 62 20 79 51 63 95 ef f3 92 0f |...v.gb yQc.....| +peer0.org1.example.com | 00000040 8d 91 60 54 bd 7f |..`T..|" +peer0.org1.example.com | "2019-05-02 09:27:49.149 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.149 UTC [gossip.discovery] isSentByMe -> DEBU 26b9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [gossip.discovery] handleAliveMessage -> DEBU 26ba Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26bb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [msp] DeserializeIdentity -> DEBU 26bc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26be Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26bf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:49.150 UTC [policies] Evaluate -> DEBU 26c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.151 UTC [policies] Evaluate -> DEBU 26c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:49.151 UTC [policies] Evaluate -> DEBU 26c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.151 UTC [cauthdsl] func1 -> DEBU 26c3 0xc0046420e0 gate 1556789269151479200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:49.151 UTC [cauthdsl] func2 -> DEBU 26c4 0xc0046420e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:49.151 UTC [cauthdsl] func2 -> DEBU 26c5 0xc0046420e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [cauthdsl] func2 -> DEBU 26c6 0xc0046420e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [cauthdsl] func2 -> DEBU 26c7 0xc0046420e0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [cauthdsl] func1 -> DEBU 26c8 0xc0046420e0 gate 1556789269151479200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [policies] Evaluate -> DEBU 26c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [policies] Evaluate -> DEBU 26ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.152 UTC [policies] Evaluate -> DEBU 26cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.153 UTC [cauthdsl] func1 -> DEBU 26cc 0xc004642920 gate 1556789269153026500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:49.153 UTC [cauthdsl] func2 -> DEBU 26cd 0xc004642920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:49.153 UTC [cauthdsl] func2 -> DEBU 26ce 0xc004642920 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:49.153 UTC [cauthdsl] func2 -> DEBU 26cf 0xc004642920 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.153 UTC [msp.identity] Verify -> DEBU 26d0 Verify: digest = 00000000 41 f8 24 e9 c5 5d 4b ef 6d 0c e0 73 af c4 a5 b7 |A.$..]K.m..s....| +peer0.org1.example.com | 00000010 ba 0b b8 1a 71 d0 16 b5 dc 66 fe 4e 0f 3e 0d 74 |....q....f.N.>.t|" +peer0.org1.example.com | "2019-05-02 09:27:49.154 UTC [msp.identity] Verify -> DEBU 26d1 Verify: sig = 00000000 30 44 02 20 71 79 47 c9 31 7a f9 e0 d5 3a 07 3e |0D. qyG.1z...:.>| +peer0.org1.example.com | 00000010 fa 9b 3f c2 e7 8e b8 06 60 43 1c 52 b3 e9 49 65 |..?.....`C.R..Ie| +peer0.org1.example.com | 00000020 53 d5 91 6e 02 20 73 b2 65 d8 af 93 ce 0a 2a 22 |S..n. s.e.....*"| +peer0.org1.example.com | 00000030 ae 3b e5 77 76 2d 21 94 da 6b 81 bf 84 59 8b 86 |.;.wv-!..k...Y..| +peer0.org1.example.com | 00000040 92 76 ab 56 bb ca |.v.V..|" +peer0.org1.example.com | "2019-05-02 09:27:49.155 UTC [cauthdsl] func2 -> DEBU 26d2 0xc004642920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.155 UTC [cauthdsl] func1 -> DEBU 26d3 0xc004642920 gate 1556789269153026500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:49.155 UTC [policies] Evaluate -> DEBU 26d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.155 UTC [policies] Evaluate -> DEBU 26d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.156 UTC [policies] Evaluate -> DEBU 26d6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.156 UTC [policies] Evaluate -> DEBU 26d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.157 UTC [gossip.discovery] handleAliveMessage -> DEBU 26d8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.157 UTC [gossip.discovery] handleAliveMessage -> DEBU 26d9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.157 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26da Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.161 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26dc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.162 UTC [gossip.gossip] handleMessage -> DEBU 26dd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.165 UTC [gossip.gossip] handleMessage -> DEBU 26de Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.161 UTC [msp] DeserializeIdentity -> DEBU 26df Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.167 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:49.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:49.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:49.168 UTC [policies] Evaluate -> DEBU 26e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.169 UTC [gossip.comm] func1 -> DEBU 26e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.168 UTC [policies] Evaluate -> DEBU 26e5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:49.169 UTC [policies] Evaluate -> DEBU 26e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.170 UTC [cauthdsl] func1 -> DEBU 26e7 0xc004658580 gate 1556789269170286900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26e8 0xc004658580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26e9 0xc004658580 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26ea 0xc004658580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26eb 0xc004658580 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:49.171 UTC [cauthdsl] func1 -> DEBU 26ec 0xc004658580 gate 1556789269170286900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:49.171 UTC [policies] Evaluate -> DEBU 26ed Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.171 UTC [policies] Evaluate -> DEBU 26ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.171 UTC [policies] Evaluate -> DEBU 26ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.171 UTC [cauthdsl] func1 -> DEBU 26f0 0xc004658dc0 gate 1556789269171948900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:49.172 UTC [cauthdsl] func2 -> DEBU 26f1 0xc004658dc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:49.172 UTC [cauthdsl] func2 -> DEBU 26f2 0xc004658dc0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:49.172 UTC [cauthdsl] func2 -> DEBU 26f3 0xc004658dc0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.173 UTC [msp.identity] Verify -> DEBU 26f4 Verify: digest = 00000000 8c c9 77 5f dc 20 1e c0 75 c9 e6 c0 7e 28 ed 6f |..w_. ..u...~(.o| +peer0.org1.example.com | 00000010 8e ec 7f 13 de 3e 35 6c 7f 0d 02 ad 8c 6d ff fd |.....>5l.....m..|" +peer0.org1.example.com | "2019-05-02 09:27:49.183 UTC [msp.identity] Verify -> DEBU 26f5 Verify: sig = 00000000 30 44 02 20 38 86 bf 71 09 6b 99 bc 37 b1 97 7b |0D. 8..q.k..7..{| +peer0.org1.example.com | 00000010 59 63 58 fc 5b 10 a2 9d dc 10 9a 45 a5 56 8b 55 |YcX.[......E.V.U| +peer0.org1.example.com | 00000020 9b f8 fe cf 02 20 2d 89 c7 49 58 b9 1e bf ef b2 |..... -..IX.....| +peer0.org1.example.com | 00000030 05 bc 95 f2 a9 81 f2 52 03 22 10 a2 29 ee 06 97 |.......R."..)...| +peer0.org1.example.com | 00000040 9c 37 68 e1 92 b4 |.7h...|" +peer0.org1.example.com | "2019-05-02 09:27:49.184 UTC [cauthdsl] func2 -> DEBU 26f6 0xc004658dc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.184 UTC [cauthdsl] func1 -> DEBU 26f7 0xc004658dc0 gate 1556789269171948900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26f8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26fa Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 26fc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 26fd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.186 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26fe Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.187 UTC [msp.identity] Verify -> DEBU 26ff Verify: digest = 00000000 bd 1b d6 fe 9c 1f 80 cb 99 3d 51 04 24 b5 8c 69 |.........=Q.$..i| +peer0.org1.example.com | 00000010 9d f2 7d 85 03 a0 7d 17 d8 b1 f8 1c 08 7e 00 b4 |..}...}......~..|" +peer0.org1.example.com | "2019-05-02 09:27:49.187 UTC [msp.identity] Verify -> DEBU 2700 Verify: sig = 00000000 30 44 02 20 09 93 30 c4 f6 46 b7 04 bb 5b 33 ca |0D. ..0..F...[3.| +peer0.org1.example.com | 00000010 39 84 57 4f 5e 22 17 4a 90 ed cf 82 ee 49 e9 e7 |9.WO^".J.....I..| +peer0.org1.example.com | 00000020 97 4e 4b 7a 02 20 11 71 59 ed f1 9c 4f 12 f1 19 |.NKz. .qY...O...| +peer0.org1.example.com | 00000030 e9 ec d1 76 c1 67 62 20 79 51 63 95 ef f3 92 0f |...v.gb yQc.....| +peer0.org1.example.com | 00000040 8d 91 60 54 bd 7f |..`T..|" +peer0.org1.example.com | "2019-05-02 09:27:49.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 2701 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.188 UTC [gossip.discovery] isSentByMe -> DEBU 2702 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 2703 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.189 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2704 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.193 UTC [msp.identity] Verify -> DEBU 2705 Verify: digest = 00000000 69 59 a1 68 08 4d 75 c9 75 5e 82 05 a6 1c b1 7f |iY.h.Mu.u^......| +peer0.org1.example.com | 00000010 9c ed b4 7a e6 f9 54 5b 10 f6 b9 fc a1 8b 03 98 |...z..T[........|" +peer0.org1.example.com | "2019-05-02 09:27:49.194 UTC [msp.identity] Verify -> DEBU 2706 Verify: sig = 00000000 30 44 02 20 27 84 7b e8 97 85 09 98 01 c6 9a 4d |0D. '.{........M| +peer0.org1.example.com | 00000010 6c 2a fc 9f c2 e3 fe d4 51 55 9a 60 08 3a 70 da |l*......QU.`.:p.| +peer0.org1.example.com | 00000020 42 c5 fe 57 02 20 0e c3 74 e2 2a 5d 47 cd 9b 1c |B..W. ..t.*]G...| +peer0.org1.example.com | 00000030 b1 e1 e8 99 cd 65 cc 01 1e a6 b9 3c 47 52 bc fb |.....e..... DEBU 2707 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 2708 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2709 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 270a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 270b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.198 UTC [msp.identity] Verify -> DEBU 270c Verify: digest = 00000000 bd 1b d6 fe 9c 1f 80 cb 99 3d 51 04 24 b5 8c 69 |.........=Q.$..i| +peer0.org1.example.com | 00000010 9d f2 7d 85 03 a0 7d 17 d8 b1 f8 1c 08 7e 00 b4 |..}...}......~..|" +peer0.org1.example.com | "2019-05-02 09:27:49.198 UTC [msp.identity] Verify -> DEBU 270d Verify: sig = 00000000 30 44 02 20 09 93 30 c4 f6 46 b7 04 bb 5b 33 ca |0D. ..0..F...[3.| +peer0.org1.example.com | 00000010 39 84 57 4f 5e 22 17 4a 90 ed cf 82 ee 49 e9 e7 |9.WO^".J.....I..| +peer0.org1.example.com | 00000020 97 4e 4b 7a 02 20 11 71 59 ed f1 9c 4f 12 f1 19 |.NKz. .qY...O...| +peer0.org1.example.com | 00000030 e9 ec d1 76 c1 67 62 20 79 51 63 95 ef f3 92 0f |...v.gb yQc.....| +peer0.org1.example.com | 00000040 8d 91 60 54 bd 7f |..`T..|" +peer0.org1.example.com | "2019-05-02 09:27:49.199 UTC [msp.identity] Verify -> DEBU 270e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:49.199 UTC [msp.identity] Verify -> DEBU 270f Verify: sig = 00000000 30 44 02 20 7c 18 55 c5 f9 ae 5c d3 2a 4a 79 bb |0D. |.U...\.*Jy.| +peer0.org1.example.com | 00000010 55 fc 6a c9 b7 54 32 3d ae 16 06 26 04 63 13 98 |U.j..T2=...&.c..| +peer0.org1.example.com | 00000020 63 94 d8 f8 02 20 03 81 cf 5b 1b 33 29 ba 97 d5 |c.... ...[.3)...| +peer0.org1.example.com | 00000030 5d 03 fe 3d 70 04 49 41 2d 5f 75 84 2f 2b da 82 |]..=p.IA-_u./+..| +peer0.org1.example.com | 00000040 b0 38 ff 76 1a 39 |.8.v.9|" +peer0.org1.example.com | "2019-05-02 09:27:49.199 UTC [gossip.discovery] handleAliveMessage -> DEBU 2710 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.199 UTC [gossip.discovery] isSentByMe -> DEBU 2711 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.199 UTC [gossip.discovery] handleAliveMessage -> DEBU 2712 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2713 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2714 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2715 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2716 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2717 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2718 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.202 UTC [gossip.pull] HandleMessage -> DEBU 2719 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.202 UTC [msp] DeserializeIdentity -> DEBU 271a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.202 UTC [msp] DeserializeIdentity -> DEBU 271b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 271d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 271e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 271f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 2720 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.201 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 271c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.204 UTC [gossip.pull] SendDigest -> DEBU 2721 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:49.205 UTC [gossip.gossip] handleMessage -> DEBU 2722 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.205 UTC [gossip.gossip] handleMessage -> DEBU 2723 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.204 UTC [msp] DeserializeIdentity -> DEBU 2724 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.206 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2725 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2726 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2727 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [policies] Evaluate -> DEBU 2728 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [policies] Evaluate -> DEBU 2729 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [policies] Evaluate -> DEBU 272a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [cauthdsl] func1 -> DEBU 272b 0xc004642320 gate 1556789269207666200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:49.207 UTC [cauthdsl] func2 -> DEBU 272c 0xc004642320 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [cauthdsl] func2 -> DEBU 272d 0xc004642320 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [cauthdsl] func2 -> DEBU 272e 0xc004642320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [cauthdsl] func2 -> DEBU 272f 0xc004642320 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [cauthdsl] func1 -> DEBU 2730 0xc004642320 gate 1556789269207666200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [policies] Evaluate -> DEBU 2731 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.208 UTC [policies] Evaluate -> DEBU 2732 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [policies] Evaluate -> DEBU 2733 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [cauthdsl] func1 -> DEBU 2734 0xc004642b60 gate 1556789269209224000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [cauthdsl] func2 -> DEBU 2735 0xc004642b60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [cauthdsl] func2 -> DEBU 2736 0xc004642b60 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [cauthdsl] func2 -> DEBU 2737 0xc004642b60 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [msp.identity] Verify -> DEBU 2738 Verify: digest = 00000000 be b6 0e ab a3 44 29 70 3c be c5 26 00 3f d9 9a |.....D)p<..&.?..| +peer0.org1.example.com | 00000010 d0 68 c4 fc 42 20 88 25 1e 22 8d 2a a7 33 5c f9 |.h..B .%.".*.3\.|" +peer0.org1.example.com | "2019-05-02 09:27:49.209 UTC [msp.identity] Verify -> DEBU 2739 Verify: sig = 00000000 30 44 02 20 44 34 3d 35 9f 83 a9 e3 2a 0a 45 ec |0D. D4=5....*.E.| +peer0.org1.example.com | 00000010 ba e8 d2 07 91 a9 6f 5b 90 7b b2 d1 ff b1 0c 50 |......o[.{.....P| +peer0.org1.example.com | 00000020 d7 4e f8 85 02 20 13 ff 0c b4 43 b8 b9 2a f2 7d |.N... ....C..*.}| +peer0.org1.example.com | 00000030 a4 cc 72 be f6 b4 08 10 18 11 6d f8 ff 4b 5d 0a |..r.......m..K].| +peer0.org1.example.com | 00000040 4c 73 07 21 5c 38 |Ls.!\8|" +peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [cauthdsl] func2 -> DEBU 273a 0xc004642b60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [cauthdsl] func1 -> DEBU 273b 0xc004642b60 gate 1556789269209224000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 2740 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2741 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2742 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 " +peer0.org1.example.com | "2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2743 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 " +peer0.org1.example.com | "2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2744 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 2745 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 2746 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2747 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2748 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2749 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.gossip] handleMessage -> DEBU 274a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.212 UTC [gossip.gossip] handleMessage -> DEBU 274b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.213 UTC [gossip.gossip] handleMessage -> DEBU 274c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.213 UTC [gossip.gossip] handleMessage -> DEBU 274d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 274e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 274f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2750 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2751 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [msp] DeserializeIdentity -> DEBU 2752 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2753 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2754 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2755 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:49.214 UTC [policies] Evaluate -> DEBU 2756 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [policies] Evaluate -> DEBU 2757 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [policies] Evaluate -> DEBU 2758 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [cauthdsl] func1 -> DEBU 2759 0xc0045bd860 gate 1556789269215193500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [cauthdsl] func2 -> DEBU 275a 0xc0045bd860 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [cauthdsl] func2 -> DEBU 275b 0xc0045bd860 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:49.215 UTC [cauthdsl] func2 -> DEBU 275c 0xc0045bd860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:49.216 UTC [cauthdsl] func2 -> DEBU 275d 0xc0045bd860 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:49.216 UTC [cauthdsl] func1 -> DEBU 275e 0xc0045bd860 gate 1556789269215193500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:49.216 UTC [policies] Evaluate -> DEBU 275f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.216 UTC [policies] Evaluate -> DEBU 2760 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.216 UTC [policies] Evaluate -> DEBU 2761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func1 -> DEBU 2762 0xc00451a0a0 gate 1556789269217045700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2763 0xc00451a0a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2764 0xc00451a0a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2765 0xc00451a0a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [msp.identity] Verify -> DEBU 2766 Verify: digest = 00000000 28 f5 bc 9a a9 eb 67 06 76 5d 72 15 6f cf a1 3e |(.....g.v]r.o..>| +peer0.org1.example.com | 00000010 85 1b b0 eb e3 d4 cc 0e 5a f4 06 64 63 92 02 34 |........Z..dc..4|" +peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [msp.identity] Verify -> DEBU 2767 Verify: sig = 00000000 30 44 02 20 32 d2 b7 c8 6e 29 a4 89 28 8b be 7e |0D. 2...n)..(..~| +peer0.org1.example.com | 00000010 9a dc ea 69 b8 b2 2e c0 86 5e 35 8d bb da 6a b7 |...i.....^5...j.| +peer0.org1.example.com | 00000020 fc 52 5d 4e 02 20 22 43 71 fd e3 71 47 8b ce 31 |.R]N. "Cq..qG..1| +peer0.org1.example.com | 00000030 ff 74 f0 ac 69 46 c8 b1 d0 69 19 ac ee b1 2b 6c |.t..iF...i....+l| +peer0.org1.example.com | 00000040 4f 21 b8 78 20 06 |O!.x .|" +peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2768 0xc00451a0a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [cauthdsl] func1 -> DEBU 2769 0xc00451a0a0 gate 1556789269217045700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [policies] Evaluate -> DEBU 276a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.217 UTC [policies] Evaluate -> DEBU 276b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [policies] Evaluate -> DEBU 276c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [policies] Evaluate -> DEBU 276d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] handleAliveMessage -> DEBU 276e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 276f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2770 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 " +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2771 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 " +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2772 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2773 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] handleAliveMessage -> DEBU 2774 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2775 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [gossip.discovery] sendMemResponse -> DEBU 2776 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:49.218 UTC [msp] DeserializeIdentity -> DEBU 2777 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [msp] DeserializeIdentity -> DEBU 2778 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [msp] DeserializeIdentity -> DEBU 2779 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [gossip.comm] Send -> DEBU 277a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [gossip.discovery] sendMemResponse -> DEBU 277b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [gossip.comm] sendToEndpoint -> DEBU 277c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [gossip.comm] sendToEndpoint -> DEBU 277d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.219 UTC [gossip.gossip] handleMessage -> DEBU 277e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.234 UTC [msp] DeserializeIdentity -> DEBU 277f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.234 UTC [msp] DeserializeIdentity -> DEBU 2780 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.235 UTC [msp] DeserializeIdentity -> DEBU 2781 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.235 UTC [msp] DeserializeIdentity -> DEBU 2782 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.235 UTC [msp] DeserializeIdentity -> DEBU 2783 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.236 UTC [msp] DeserializeIdentity -> DEBU 2784 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.236 UTC [msp] DeserializeIdentity -> DEBU 2785 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.236 UTC [gossip.comm] Send -> DEBU 2786 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.236 UTC [msp] DeserializeIdentity -> DEBU 2787 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.237 UTC [gossip.comm] Send -> DEBU 2788 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.237 UTC [gossip.comm] sendToEndpoint -> DEBU 2789 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.237 UTC [gossip.comm] sendToEndpoint -> DEBU 278a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.238 UTC [gossip.comm] sendToEndpoint -> DEBU 278b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.238 UTC [gossip.comm] sendToEndpoint -> DEBU 278c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.806 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 278d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:49.806 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 278e Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:49.807 UTC [policies] Evaluate -> DEBU 278f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-05-02 09:27:49.807 UTC [policies] Evaluate -> DEBU 2790 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [policies] Evaluate -> DEBU 2791 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [cauthdsl] func1 -> DEBU 2792 0xc003936510 gate 1556789269808070900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [cauthdsl] func2 -> DEBU 2793 0xc003936510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [cauthdsl] func2 -> DEBU 2794 0xc003936510 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [cauthdsl] func2 -> DEBU 2795 0xc003936510 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.808 UTC [msp.identity] Verify -> DEBU 2796 Verify: digest = 00000000 27 30 54 77 93 7b bc 69 63 ed d7 aa 5a 8e 0a 5f |'0Tw.{.ic...Z.._| +peer0.org1.example.com | 00000010 84 81 a0 7d ac 0d 90 db c5 c7 d1 61 46 d8 2b 6a |...}.......aF.+j|" +peer0.org1.example.com | "2019-05-02 09:27:49.809 UTC [msp.identity] Verify -> DEBU 2797 Verify: sig = 00000000 30 44 02 20 31 00 d0 ca 4a 78 30 f4 ca f2 b9 94 |0D. 1...Jx0.....| +peer0.org1.example.com | 00000010 5f e3 d6 22 26 a9 ca c9 e1 48 d5 65 55 c6 98 a5 |_.."&....H.eU...| +peer0.org1.example.com | 00000020 96 9d 9f bd 02 20 7a ce 10 8a 26 35 1b b0 81 81 |..... z...&5....| +peer0.org1.example.com | 00000030 71 b6 57 49 b8 64 f3 45 d6 b6 0e e0 54 db 09 02 |q.WI.d.E....T...| +peer0.org1.example.com | 00000040 7d 1a 38 48 d0 98 |}.8H..|" +peer0.org1.example.com | "2019-05-02 09:27:49.809 UTC [cauthdsl] func2 -> DEBU 2798 0xc003936510 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.810 UTC [cauthdsl] func1 -> DEBU 2799 0xc003936510 gate 1556789269808070900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279c Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:27:49.811 UTC [blocksProvider] DeliverBlocks -> DEBU 279e [businesschannel] Adding payload to local buffer, blockNum = [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.811 UTC [gossip.state] addPayload -> DEBU 279f [businesschannel] Adding payload to local buffer, blockNum = [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.812 UTC [gossip.state] addPayload -> DEBU 27a0 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-05-02 09:27:49.813 UTC [blocksProvider] DeliverBlocks -> DEBU 27a2 [businesschannel] Gossiping block [8], peers number [3]" +peer0.org1.example.com | "2019-05-02 09:27:49.813 UTC [gossip.state] deliverPayloads -> DEBU 27a1 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.813 UTC [gossip.state] deliverPayloads -> DEBU 27a4 [businesschannel] Transferring block [8] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-05-02 09:27:49.813 UTC [gossip.privdata] StoreBlock -> INFO 27a5 [businesschannel] Received block [8] from buffer" +peer0.org1.example.com | "2019-05-02 09:27:49.814 UTC [gossip.privdata] StoreBlock -> DEBU 27a6 [businesschannel] Validating block [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.813 UTC [gossip.channel] AddToMsgStore -> DEBU 27a3 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-05-02 09:27:49.814 UTC [committer.txvalidator] Validate -> DEBU 27a7 [businesschannel] START Block Validation for block [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.814 UTC [committer.txvalidator] Validate -> DEBU 27a8 expecting 1 block validation responses" +peer0.org1.example.com | "2019-05-02 09:27:49.814 UTC [committer.txvalidator] validateTx -> DEBU 27a9 [businesschannel] validateTx starts for block 0xc0045e0380 env 0xc00443aaf0 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] ValidateTransaction -> DEBU 27ab ValidateTransactionEnvelope starts for envelope 0xc00443aaf0" +peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] ValidateTransaction -> DEBU 27ac Header is channel_header:"\010\003\032\014\010\223\360\252\346\005\020\240\275\332\336\002\"\017businesschannel*@f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030e\223@\256\202p\003\340j\302=\306\016\303\007\026\372\331\206\021D\207\310" " +peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] validateChannelHeader -> DEBU 27ad validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] checkSignatureFromCreator -> DEBU 27ae begin" +peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [msp] GetManagerForChain -> DEBU 27af Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] checkSignatureFromCreator -> DEBU 27b0 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-05-02 09:27:49.815 UTC [protoutils] checkSignatureFromCreator -> DEBU 27b1 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:49.814 UTC [gossip.pull] Add -> DEBU 27aa Added 8, total items: 8" +peer0.org1.example.com | "2019-05-02 09:27:49.816 UTC [msp.identity] Verify -> DEBU 27b2 Verify: digest = 00000000 9d 1a 32 6d 5f bc 13 f8 45 b8 60 0f 16 f8 bd cf |..2m_...E.`.....| +peer0.org1.example.com | 00000010 c4 1a 80 39 8d 13 0e de 7d 1f 66 83 ff 2d da be |...9....}.f..-..|" +peer0.org1.example.com | "2019-05-02 09:27:49.816 UTC [msp.identity] Verify -> DEBU 27b3 Verify: sig = 00000000 30 44 02 20 13 0a fa 13 d5 6c 5e 7f b5 37 72 79 |0D. .....l^..7ry| +peer0.org1.example.com | 00000010 2d 47 b9 8d aa ba ae 33 ba 66 86 a4 f4 55 83 9d |-G.....3.f...U..| +peer0.org1.example.com | 00000020 8a 12 53 97 02 20 63 42 a9 84 5f 26 98 76 1f b4 |..S.. cB.._&.v..| +peer0.org1.example.com | 00000030 48 24 eb b5 bc 89 71 b6 f1 f0 97 16 ba 96 06 64 |H$....q........d| +peer0.org1.example.com | 00000040 4f b1 ca 9f 55 1a |O...U.|" +peer0.org1.example.com | "2019-05-02 09:27:49.817 UTC [protoutils] checkSignatureFromCreator -> DEBU 27b4 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:49.817 UTC [protoutils] validateEndorserTransaction -> DEBU 27b5 validateEndorserTransaction starts for data 0xc0033b8800, header channel_header:"\010\003\032\014\010\223\360\252\346\005\020\240\275\332\336\002\"\017businesschannel*@f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030e\223@\256\202p\003\340j\302=\306\016\303\007\026\372\331\206\021D\207\310" " +peer0.org1.example.com | "2019-05-02 09:27:49.817 UTC [protoutils] validateEndorserTransaction -> DEBU 27b6 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-05-02 09:27:49.817 UTC [protoutils] validateEndorserTransaction -> DEBU 27b7 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-05-02 09:27:49.818 UTC [protoutils] ValidateTransaction -> DEBU 27b8 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-05-02 09:27:49.818 UTC [committer.txvalidator] validateTx -> DEBU 27b9 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:49.818 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 27ba retrieveTransactionByID() - txId = [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]" +peer0.org1.example.com | "2019-05-02 09:27:49.819 UTC [committer.txvalidator] validateTx -> DEBU 27bb Validating transaction with plugins" +peer0.org1.example.com | "2019-05-02 09:27:49.819 UTC [committer.txvalidator] Dispatch -> DEBU 27bc [businesschannel] Dispatch starts for bytes 0xc002cc8400" +peer0.org1.example.com | "2019-05-02 09:27:49.819 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27bd constructing new query executor txid = [b343bb2c-5768-4bf7-9e20-81a431852db1]" +peer0.org1.example.com | "2019-05-02 09:27:49.819 UTC [stateleveldb] GetState -> DEBU 27be GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-05-02 09:27:49.819 UTC [stateleveldb] GetState -> DEBU 27bf GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:49.820 UTC [stateleveldb] GetState -> DEBU 27c0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +peer0.org1.example.com | "2019-05-02 09:27:49.821 UTC [stateleveldb] GetState -> DEBU 27c1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +peer0.org1.example.com | "2019-05-02 09:27:49.821 UTC [stateleveldb] GetState -> DEBU 27c2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +peer0.org1.example.com | "2019-05-02 09:27:49.821 UTC [lockbasedtxmgr] Done -> DEBU 27c3 Done with transaction simulation / query execution [b343bb2c-5768-4bf7-9e20-81a431852db1]" +peer0.org1.example.com | "2019-05-02 09:27:49.821 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 27c4 Validating Tx f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, seq 0 out of 1 in block 8 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-05-02 09:27:49.822 UTC [msp] DeserializeIdentity -> DEBU 27c5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.822 UTC [msp] DeserializeIdentity -> DEBU 27c6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [msp] DeserializeIdentity -> DEBU 27c7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [msp] DeserializeIdentity -> DEBU 27c9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [gossip.comm] Send -> DEBU 27ca Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27c8 constructing new query executor txid = [87dca2fc-7cfd-4504-853a-96c521fa4acf]" +peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [lockbasedtxmgr] Done -> DEBU 27cc Done with transaction simulation / query execution [87dca2fc-7cfd-4504-853a-96c521fa4acf]" +peer0.org1.example.com | "2019-05-02 09:27:49.823 UTC [msp] DeserializeIdentity -> DEBU 27cb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [msp] DeserializeIdentity -> DEBU 27cd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [cauthdsl] func1 -> DEBU 27ce 0xc003902bd0 gate 1556789269824356200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [cauthdsl] func2 -> DEBU 27d0 0xc003902bd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [gossip.comm] sendToEndpoint -> DEBU 27cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [cauthdsl] func2 -> DEBU 27d1 0xc003902bd0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:49.824 UTC [gossip.comm] sendToEndpoint -> DEBU 27d2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:49.825 UTC [cauthdsl] func2 -> DEBU 27d3 0xc003902bd0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.842 UTC [msp.identity] Verify -> DEBU 27d4 Verify: digest = 00000000 7f 4d 0d b0 fb 16 17 0e a9 9b 1c 9e dc 7e 0e e0 |.M...........~..| +peer0.org1.example.com | 00000010 4f 80 fa d3 20 c7 54 c6 87 42 49 9a e9 80 27 a0 |O... .T..BI...'.|" +peer0.org1.example.com | "2019-05-02 09:27:49.842 UTC [msp.identity] Verify -> DEBU 27d5 Verify: sig = 00000000 30 45 02 21 00 96 9b ea 15 49 12 69 e6 f6 1e 21 |0E.!.....I.i...!| +peer0.org1.example.com | 00000010 7d f9 18 c3 75 3c 7f 4d 26 d7 18 1b 1c f1 4e 77 |}...u<.M&.....Nw| +peer0.org1.example.com | 00000020 8d 34 c2 7d e6 02 20 1e cf 14 17 97 37 42 5e 2c |.4.}.. .....7B^,| +peer0.org1.example.com | 00000030 3b bc d1 b2 1a f0 61 d0 31 5a 61 8a 6a b1 6d dd |;.....a.1Za.j.m.| +peer0.org1.example.com | 00000040 e6 02 d8 ef 82 6c eb |.....l.|" +peer0.org1.example.com | "2019-05-02 09:27:49.845 UTC [cauthdsl] func2 -> DEBU 27d6 0xc003902bd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:49.845 UTC [cauthdsl] func2 -> DEBU 27d7 0xc003902bd0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-05-02 09:27:49.845 UTC [cauthdsl] func2 -> DEBU 27d8 0xc003902bd0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-05-02 09:27:49.846 UTC [cauthdsl] func2 -> DEBU 27d9 0xc003902bd0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:49.847 UTC [cauthdsl] func1 -> DEBU 27da 0xc003902bd0 gate 1556789269824356200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:49.849 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27db constructing new query executor txid = [e2780b94-5445-431b-a318-0bb82f332a66]" +peer0.org1.example.com | "2019-05-02 09:27:49.850 UTC [lockbasedtxmgr] Done -> DEBU 27dc Done with transaction simulation / query execution [e2780b94-5445-431b-a318-0bb82f332a66]" +peer0.org1.example.com | "2019-05-02 09:27:49.850 UTC [vscc] Validate -> DEBU 27dd block 8, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-05-02 09:27:49.852 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 27de Transaction f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176 appears to be valid" +peer0.org1.example.com | "2019-05-02 09:27:49.853 UTC [committer.txvalidator] Dispatch -> DEBU 27df [businesschannel] Dispatch completes env bytes 0xc002cc8400" +peer0.org1.example.com | "2019-05-02 09:27:49.855 UTC [committer.txvalidator] validateTx -> DEBU 27e0 [businesschannel] validateTx completes for block 0xc0045e0380 env 0xc00443aaf0 txn 0" +peer0.org1.example.com | "2019-05-02 09:27:49.856 UTC [committer.txvalidator] Validate -> DEBU 27e1 got result for idx 0, code 0" +peer0.org1.example.com | "2019-05-02 09:27:49.858 UTC [committer.txvalidator] Validate -> INFO 27e2 [businesschannel] Validated block [8] in 44ms" +peer0.org1.example.com | "2019-05-02 09:27:49.858 UTC [gossip.privdata] listMissingPrivateData -> DEBU 27e3 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-05-02 09:27:49.859 UTC [gossip.privdata] StoreBlock -> DEBU 27e4 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [kvledger] CommitWithPvtData -> DEBU 27e5 [businesschannel] Validating state for block [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 27e6 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 27e7 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 27e8 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27e9 ValidateAndPrepareBatch() for block number = [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.860 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27ea preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:49.861 UTC [valimpl] preprocessProtoBlock -> DEBU 27eb txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-05-02 09:27:49.861 UTC [stateleveldb] GetState -> DEBU 27ec GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:49.861 UTC [statebasedval] validateKVRead -> DEBU 27ed Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +peer0.org1.example.com | "2019-05-02 09:27:49.862 UTC [stateleveldb] GetState -> DEBU 27ee GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:49.862 UTC [statebasedval] validateKVRead -> DEBU 27ef Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +peer0.org1.example.com | "2019-05-02 09:27:49.862 UTC [stateleveldb] GetState -> DEBU 27f0 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-05-02 09:27:49.862 UTC [statebasedval] validateKVRead -> DEBU 27f1 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" +peer0.org1.example.com | "2019-05-02 09:27:49.863 UTC [stateleveldb] GetState -> DEBU 27f2 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-05-02 09:27:49.863 UTC [statebasedval] validateKVRead -> DEBU 27f3 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" +peer0.org1.example.com | "2019-05-02 09:27:49.863 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 27f4 Block [8] Transaction index [0] TxId [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176] marked as valid by state validator. ContainsPostOrderWrites [false]" +peer0.org1.example.com | "2019-05-02 09:27:49.863 UTC [valinternal] ApplyWriteSet -> DEBU 27f5 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003913840), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003913880)}" +peer0.org1.example.com | "2019-05-02 09:27:49.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27f6 validating rwset..." +peer0.org1.example.com | "2019-05-02 09:27:49.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27f7 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:27:49.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27f8 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-05-02 09:27:49.864 UTC [kvledger] CommitWithPvtData -> DEBU 27f9 [businesschannel] Committing block [8] to storage" +peer0.org1.example.com | "2019-05-02 09:27:49.865 UTC [ledgerstorage] CommitWithPvtData -> DEBU 27fa Writing block [8] to pvt block store" +peer0.org1.example.com | "2019-05-02 09:27:49.867 UTC [pvtdatastorage] Prepare -> DEBU 27fb Saved 0 private data write sets for block [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.869 UTC [fsblkstorage] indexBlock -> DEBU 27fc Indexing block [blockNum=8, blockHash=[]byte{0x2, 0x24, 0xe7, 0x4a, 0x9c, 0xc4, 0xcd, 0x6e, 0x9e, 0x50, 0x85, 0x1e, 0xb1, 0x9f, 0xf0, 0x6f, 0xcf, 0x12, 0x7a, 0xf4, 0xce, 0xb7, 0xdf, 0x24, 0x6e, 0x20, 0x2e, 0xb6, 0x60, 0x3f, 0x17, 0xec} txOffsets= +peer0.org1.example.com | txId=f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176 locPointer=offset=70, bytesLength=3044 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-05-02 09:27:49.869 UTC [fsblkstorage] indexBlock -> DEBU 27fd Adding txLoc [fileSuffixNum=0, offset=94692, bytesLength=3044] for tx ID: [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176] to txid-index" +peer0.org1.example.com | "2019-05-02 09:27:49.869 UTC [fsblkstorage] indexBlock -> DEBU 27fe Adding txLoc [fileSuffixNum=0, offset=94692, bytesLength=3044] for tx number:[0] ID: [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176] to blockNumTranNum index" +peer0.org1.example.com | "2019-05-02 09:27:49.871 UTC [fsblkstorage] updateCheckpoint -> DEBU 27ff Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98673], isChainEmpty=[false], lastBlockNumber=[8]" +peer0.org1.example.com | "2019-05-02 09:27:49.871 UTC [pvtdatastorage] Commit -> DEBU 2800 Committing private data for block [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.874 UTC [pvtdatastorage] Commit -> DEBU 2801 Committed private data for block [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.874 UTC [kvledger] CommitWithPvtData -> DEBU 2802 [businesschannel] Committing block [8] transactions to state database" +peer0.org1.example.com | "2019-05-02 09:27:49.874 UTC [lockbasedtxmgr] Commit -> DEBU 2803 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:49.874 UTC [lockbasedtxmgr] Commit -> DEBU 2804 Committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:49.874 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2805 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-05-02 09:27:49.875 UTC [lockbasedtxmgr] Commit -> DEBU 2806 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:27:49.875 UTC [stateleveldb] ApplyUpdates -> DEBU 2807 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-05-02 09:27:49.875 UTC [stateleveldb] ApplyUpdates -> DEBU 2808 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-05-02 09:27:49.877 UTC [lockbasedtxmgr] Commit -> DEBU 2809 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-05-02 09:27:49.877 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 280a Preparing potential purge list working-set for expiringAtBlk [9]" +peer0.org1.example.com | "2019-05-02 09:27:49.877 UTC [leveldbhelper] GetIterator -> DEBU 280c Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:27:49.877 UTC [lockbasedtxmgr] func1 -> DEBU 280b launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-05-02 09:27:49.878 UTC [kvledger] CommitWithPvtData -> DEBU 280e [businesschannel] Committing block [8] transactions to history database" +peer0.org1.example.com | "2019-05-02 09:27:49.878 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 280d No expiry entry found for expiringAtBlk [9]" +peer0.org1.example.com | "2019-05-02 09:27:49.878 UTC [historyleveldb] Commit -> DEBU 280f Channel [businesschannel]: Updating history database for blockNo [8] with [1] transactions" +peer0.org1.example.com | "2019-05-02 09:27:49.881 UTC [historyleveldb] Commit -> DEBU 2810 Channel [businesschannel]: Updates committed to history database for blockNo [8]" +peer0.org1.example.com | "2019-05-02 09:27:49.881 UTC [kvledger] CommitWithPvtData -> INFO 2811 [businesschannel] Committed block [8] with 1 transaction(s) in 21ms (state_validation=4ms block_commit=9ms state_commit=4ms)" +peer0.org1.example.com | "2019-05-02 09:27:49.882 UTC [msp.identity] Sign -> DEBU 2812 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020809 " +peer0.org1.example.com | "2019-05-02 09:27:49.882 UTC [msp.identity] Sign -> DEBU 2813 Sign: digest: A621B06F03D34A0674B18CFCA8E22E1A10C61FB115DB21B02C16B6FB5ED84533 " +peer0.org1.example.com | "2019-05-02 09:27:49.883 UTC [gossip.state] commitBlock -> DEBU 2814 [businesschannel] Committed block [8] with 1 transaction(s)" +peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [endorser] ProcessProposal -> DEBU 2815 Entering: request from 172.18.0.8:57370" +peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [protoutils] ValidateProposalMessage -> DEBU 2816 ValidateProposalMessage starts for signed proposal 0xc0038488c0" +peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [protoutils] validateChannelHeader -> DEBU 2817 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 2818 begin" +peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [msp] GetManagerForChain -> DEBU 2819 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:50.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 281a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:50.190 UTC [protoutils] checkSignatureFromCreator -> DEBU 281b creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:50.190 UTC [msp.identity] Verify -> DEBU 281c Verify: digest = 00000000 e0 be 15 c6 e1 7b 44 fe a2 cf d8 51 d6 dd 90 bc |.....{D....Q....| +peer0.org1.example.com | 00000010 bb c7 5c 7b 53 c7 cd d3 bb ab 5b 9c b5 18 2c 6e |..\{S.....[...,n|" +peer0.org1.example.com | "2019-05-02 09:27:50.190 UTC [msp.identity] Verify -> DEBU 281d Verify: sig = 00000000 30 44 02 20 1d f4 8e 8b b9 fe 3d 81 2b f9 6d c8 |0D. ......=.+.m.| +peer0.org1.example.com | 00000010 a6 5c 1e 41 36 9e fa 77 6e e9 6c 68 47 f4 04 5a |.\.A6..wn.lhG..Z| +peer0.org1.example.com | 00000020 e9 e8 1d 0b 02 20 05 73 03 c1 8c 60 d0 f0 05 f9 |..... .s...`....| +peer0.org1.example.com | 00000030 f1 fc ca 2e 9b f6 68 27 f8 1c 9d be 24 6b ee e4 |......h'....$k..| +peer0.org1.example.com | 00000040 07 16 be 7d c3 24 |...}.$|" +peer0.org1.example.com | "2019-05-02 09:27:50.191 UTC [protoutils] checkSignatureFromCreator -> DEBU 281e exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:50.191 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 281f validateChaincodeProposalMessage starts for proposal 0xc003168850, header 0xc003848cd0" +peer0.org1.example.com | "2019-05-02 09:27:50.191 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2820 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [endorser] preProcess -> DEBU 2821 [businesschannel][64069c4c] processing txid: 64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a" +peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2822 retrieveTransactionByID() - txId = [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]" +peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [aclmgmt] CheckACL -> DEBU 2823 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [aclmgmt] CheckACL -> DEBU 2824 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [policies] Evaluate -> DEBU 2825 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:50.192 UTC [policies] Evaluate -> DEBU 2826 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:50.193 UTC [policies] Evaluate -> DEBU 2827 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-05-02 09:27:50.193 UTC [cauthdsl] func1 -> DEBU 2828 0xc0038446d0 gate 1556789270193171500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:50.193 UTC [cauthdsl] func2 -> DEBU 2829 0xc0038446d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:50.193 UTC [cauthdsl] func2 -> DEBU 282a 0xc0038446d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:50.194 UTC [cauthdsl] func2 -> DEBU 282b 0xc0038446d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:50.194 UTC [msp.identity] Verify -> DEBU 282c Verify: digest = 00000000 e0 be 15 c6 e1 7b 44 fe a2 cf d8 51 d6 dd 90 bc |.....{D....Q....| +peer0.org1.example.com | 00000010 bb c7 5c 7b 53 c7 cd d3 bb ab 5b 9c b5 18 2c 6e |..\{S.....[...,n|" +peer0.org1.example.com | "2019-05-02 09:27:50.194 UTC [msp.identity] Verify -> DEBU 282d Verify: sig = 00000000 30 44 02 20 1d f4 8e 8b b9 fe 3d 81 2b f9 6d c8 |0D. ......=.+.m.| +peer0.org1.example.com | 00000010 a6 5c 1e 41 36 9e fa 77 6e e9 6c 68 47 f4 04 5a |.\.A6..wn.lhG..Z| +peer0.org1.example.com | 00000020 e9 e8 1d 0b 02 20 05 73 03 c1 8c 60 d0 f0 05 f9 |..... .s...`....| +peer0.org1.example.com | 00000030 f1 fc ca 2e 9b f6 68 27 f8 1c 9d be 24 6b ee e4 |......h'....$k..| +peer0.org1.example.com | 00000040 07 16 be 7d c3 24 |...}.$|" +peer0.org1.example.com | "2019-05-02 09:27:50.195 UTC [cauthdsl] func2 -> DEBU 282e 0xc0038446d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:50.195 UTC [cauthdsl] func1 -> DEBU 282f 0xc0038446d0 gate 1556789270193171500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:50.195 UTC [policies] Evaluate -> DEBU 2830 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [policies] Evaluate -> DEBU 2831 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [policies] Evaluate -> DEBU 2832 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [policies] Evaluate -> DEBU 2833 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2834 constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2835 constructing new tx simulator txid = [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]" +peer0.org1.example.com | "2019-05-02 09:27:50.196 UTC [endorser] SimulateProposal -> DEBU 2836 [businesschannel][64069c4c] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:50.197 UTC [stateleveldb] GetState -> DEBU 2837 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:50.197 UTC [endorser] callChaincode -> INFO 2838 [businesschannel][64069c4c] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:50.197 UTC [stateleveldb] GetState -> DEBU 2839 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-05-02 09:27:50.198 UTC [stateleveldb] GetState -> DEBU 283a GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-05-02 09:27:50.198 UTC [chaincode] Execute -> DEBU 283b Entry" +peer0.org1.example.com | "2019-05-02 09:27:50.201 UTC [chaincode] handleMessage -> DEBU 283c [64069c4c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-05-02 09:27:50.201 UTC [chaincode] HandleTransaction -> DEBU 283d [64069c4c] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-05-02 09:27:50.202 UTC [chaincode] HandleGetState -> DEBU 283e [64069c4c] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:50.202 UTC [stateleveldb] GetState -> DEBU 283f GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-05-02 09:27:50.203 UTC [chaincode] HandleTransaction -> DEBU 2840 [64069c4c] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-05-02 09:27:50.205 UTC [chaincode] handleMessage -> DEBU 2841 [64069c4c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:50.205 UTC [chaincode] Notify -> DEBU 2842 [64069c4c] notifying Txid:64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [chaincode] Execute -> DEBU 2843 Exit" +peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [endorser] callChaincode -> INFO 2844 [businesschannel][64069c4c] Exit chaincode: name:"exp02" (9ms)" +peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2845 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [lockbasedtxmgr] Done -> DEBU 2846 Done with transaction simulation / query execution [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]" +peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [endorser] SimulateProposal -> DEBU 2847 [businesschannel][64069c4c] Exit" +peer0.org1.example.com | "2019-05-02 09:27:50.206 UTC [endorser] endorseProposal -> DEBU 2848 [businesschannel][64069c4c] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [endorser] endorseProposal -> DEBU 2849 [businesschannel][64069c4c] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [endorser] EndorseWithPlugin -> DEBU 284a Entering endorsement for {plugin: escc, channel: businesschannel, tx: 64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [msp.identity] Sign -> DEBU 284b Sign: plaintext: 0A20CFB7F550DAC8D829265B6FF08392...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [msp.identity] Sign -> DEBU 284c Sign: digest: 4B1EDB0672B51A00EF0208881946EB8E3F8CD03514D6A3F4407522E2E3ADF5CE " +peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [endorser] EndorseWithPlugin -> DEBU 284d Exiting {plugin: escc, channel: businesschannel, tx: 64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a, chaincode: exp02}" +peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [endorser] endorseProposal -> DEBU 284e [businesschannel][64069c4c] Exit" +peer0.org1.example.com | "2019-05-02 09:27:50.207 UTC [lockbasedtxmgr] Done -> DEBU 284f Done with transaction simulation / query execution [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]" +peer0.org1.example.com | "2019-05-02 09:27:50.208 UTC [endorser] func1 -> DEBU 2850 Exit: request from 172.18.0.8:57370" +peer0.org1.example.com | "2019-05-02 09:27:50.208 UTC [comm.grpc.server] 1 -> INFO 2851 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57370 grpc.code=OK grpc.call_duration=19.3263ms +peer0.org1.example.com | "2019-05-02 09:27:50.211 UTC [grpc] infof -> DEBU 2852 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:50.211 UTC [grpc] infof -> DEBU 2853 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:50.761 UTC [endorser] ProcessProposal -> DEBU 2854 Entering: request from 172.18.0.8:57374" +peer0.org1.example.com | "2019-05-02 09:27:50.762 UTC [protoutils] ValidateProposalMessage -> DEBU 2855 ValidateProposalMessage starts for signed proposal 0xc0038495e0" +peer0.org1.example.com | "2019-05-02 09:27:50.762 UTC [protoutils] validateChannelHeader -> DEBU 2856 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:50.762 UTC [protoutils] checkSignatureFromCreator -> DEBU 2857 begin" +peer0.org1.example.com | "2019-05-02 09:27:50.763 UTC [msp] GetManagerForChain -> DEBU 2858 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:50.763 UTC [protoutils] checkSignatureFromCreator -> DEBU 2859 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:50.764 UTC [protoutils] checkSignatureFromCreator -> DEBU 285a creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:50.764 UTC [msp.identity] Verify -> DEBU 285b Verify: digest = 00000000 0f a4 f6 a2 63 de b8 94 68 54 97 77 75 4e 38 c2 |....c...hT.wuN8.| +peer0.org1.example.com | 00000010 5d b6 07 63 88 fa cf bb 95 05 37 28 3b 03 01 03 |]..c......7(;...|" +peer0.org1.example.com | "2019-05-02 09:27:50.765 UTC [msp.identity] Verify -> DEBU 285c Verify: sig = 00000000 30 44 02 20 4e 0a 43 ee 5a 8f 79 48 8f 4b bf 08 |0D. N.C.Z.yH.K..| +peer0.org1.example.com | 00000010 c1 ff a0 2f d9 09 22 ca 07 c0 8c 92 7d a4 1f 59 |.../..".....}..Y| +peer0.org1.example.com | 00000020 1b 81 58 64 02 20 57 81 44 8f b7 a2 9b 77 d9 1b |..Xd. W.D....w..| +peer0.org1.example.com | 00000030 da d3 f5 cb ea 5f 5b b1 d6 95 29 de 1c c7 a7 b6 |....._[...).....| +peer0.org1.example.com | 00000040 10 fd 42 a9 42 45 |..B.BE|" +peer0.org1.example.com | "2019-05-02 09:27:50.765 UTC [protoutils] checkSignatureFromCreator -> DEBU 285d exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:50.766 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285e validateChaincodeProposalMessage starts for proposal 0xc003168af0, header 0xc0038499f0" +peer0.org1.example.com | "2019-05-02 09:27:50.766 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285f validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:50.766 UTC [endorser] preProcess -> DEBU 2860 [businesschannel][24104060] processing txid: 241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f" +peer0.org1.example.com | "2019-05-02 09:27:50.767 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2861 retrieveTransactionByID() - txId = [241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f]" +peer0.org1.example.com | "2019-05-02 09:27:50.767 UTC [endorser] SimulateProposal -> DEBU 2862 [businesschannel][24104060] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:50.768 UTC [endorser] callChaincode -> INFO 2863 [businesschannel][24104060] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:50.768 UTC [chaincode] Execute -> DEBU 2864 Entry" +peer0.org1.example.com | "2019-05-02 09:27:50.769 UTC [qscc] Invoke -> DEBU 2865 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:50.769 UTC [aclmgmt] CheckACL -> DEBU 2866 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-05-02 09:27:50.769 UTC [aclmgmt] CheckACL -> DEBU 2867 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-05-02 09:27:50.769 UTC [policies] Evaluate -> DEBU 2868 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:50.769 UTC [policies] Evaluate -> DEBU 2869 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:50.770 UTC [policies] Evaluate -> DEBU 286a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:50.770 UTC [cauthdsl] func1 -> DEBU 286b 0xc0037d54e0 gate 1556789270770402200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:50.770 UTC [cauthdsl] func2 -> DEBU 286c 0xc0037d54e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:50.770 UTC [cauthdsl] func2 -> DEBU 286d 0xc0037d54e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:50.771 UTC [cauthdsl] func2 -> DEBU 286e 0xc0037d54e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:50.771 UTC [msp.identity] Verify -> DEBU 286f Verify: digest = 00000000 0f a4 f6 a2 63 de b8 94 68 54 97 77 75 4e 38 c2 |....c...hT.wuN8.| +peer0.org1.example.com | 00000010 5d b6 07 63 88 fa cf bb 95 05 37 28 3b 03 01 03 |]..c......7(;...|" +peer0.org1.example.com | "2019-05-02 09:27:50.771 UTC [msp.identity] Verify -> DEBU 2870 Verify: sig = 00000000 30 44 02 20 4e 0a 43 ee 5a 8f 79 48 8f 4b bf 08 |0D. N.C.Z.yH.K..| +peer0.org1.example.com | 00000010 c1 ff a0 2f d9 09 22 ca 07 c0 8c 92 7d a4 1f 59 |.../..".....}..Y| +peer0.org1.example.com | 00000020 1b 81 58 64 02 20 57 81 44 8f b7 a2 9b 77 d9 1b |..Xd. W.D....w..| +peer0.org1.example.com | 00000030 da d3 f5 cb ea 5f 5b b1 d6 95 29 de 1c c7 a7 b6 |....._[...).....| +peer0.org1.example.com | 00000040 10 fd 42 a9 42 45 |..B.BE|" +peer0.org1.example.com | "2019-05-02 09:27:50.771 UTC [cauthdsl] func2 -> DEBU 2871 0xc0037d54e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:50.772 UTC [cauthdsl] func1 -> DEBU 2872 0xc0037d54e0 gate 1556789270770402200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2873 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2874 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2875 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2876 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:50.773 UTC [chaincode] handleMessage -> DEBU 2877 [24104060] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:50.773 UTC [chaincode] Notify -> DEBU 2878 [24104060] notifying Txid:241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:50.773 UTC [chaincode] Execute -> DEBU 2879 Exit" +peer0.org1.example.com | "2019-05-02 09:27:50.773 UTC [endorser] callChaincode -> INFO 287a [businesschannel][24104060] Exit chaincode: name:"qscc" (5ms)" +peer0.org1.example.com | "2019-05-02 09:27:50.774 UTC [endorser] SimulateProposal -> DEBU 287b [businesschannel][24104060] Exit" +peer0.org1.example.com | "2019-05-02 09:27:50.774 UTC [endorser] endorseProposal -> DEBU 287c [businesschannel][24104060] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:50.774 UTC [endorser] endorseProposal -> DEBU 287d [businesschannel][24104060] escc for chaincode name:"qscc" is escc" +peer0.org1.example.com | "2019-05-02 09:27:50.775 UTC [endorser] EndorseWithPlugin -> DEBU 287e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f, chaincode: qscc}" +peer0.org1.example.com | "2019-05-02 09:27:50.776 UTC [msp.identity] Sign -> DEBU 287f Sign: plaintext: 0A209B70645B41BEAE595688F2AD0075...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:50.776 UTC [msp.identity] Sign -> DEBU 2880 Sign: digest: EA378FB334945ABB2C73BB8C79377341F8B4B5298502586042935902DFB47468 " +peer0.org1.example.com | "2019-05-02 09:27:50.776 UTC [endorser] EndorseWithPlugin -> DEBU 2881 Exiting {plugin: escc, channel: businesschannel, tx: 241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f, chaincode: qscc}" +peer0.org1.example.com | "2019-05-02 09:27:50.776 UTC [endorser] endorseProposal -> DEBU 2882 [businesschannel][24104060] Exit" +peer0.org1.example.com | "2019-05-02 09:27:50.777 UTC [endorser] func1 -> DEBU 2883 Exit: request from 172.18.0.8:57374" +peer0.org1.example.com | "2019-05-02 09:27:50.777 UTC [comm.grpc.server] 1 -> INFO 2884 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57374 grpc.code=OK grpc.call_duration=15.5943ms +peer0.org1.example.com | "2019-05-02 09:27:50.781 UTC [grpc] infof -> DEBU 2885 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:50.781 UTC [grpc] infof -> DEBU 2886 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:50.971 UTC [endorser] ProcessProposal -> DEBU 2887 Entering: request from 172.18.0.8:57378" +peer0.org1.example.com | "2019-05-02 09:27:50.971 UTC [protoutils] ValidateProposalMessage -> DEBU 2888 ValidateProposalMessage starts for signed proposal 0xc0037ceb40" +peer0.org1.example.com | "2019-05-02 09:27:50.971 UTC [protoutils] validateChannelHeader -> DEBU 2889 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:50.972 UTC [protoutils] checkSignatureFromCreator -> DEBU 288a begin" +peer0.org1.example.com | "2019-05-02 09:27:50.972 UTC [msp] GetManagerForChain -> DEBU 288b Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:50.972 UTC [protoutils] checkSignatureFromCreator -> DEBU 288c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:50.972 UTC [protoutils] checkSignatureFromCreator -> DEBU 288d creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:50.973 UTC [msp.identity] Verify -> DEBU 288e Verify: digest = 00000000 ba c2 4b 98 b6 d2 d6 da 18 41 cd fa b8 10 8f 9a |..K......A......| +peer0.org1.example.com | 00000010 83 14 60 40 9b 15 07 ed 7a d0 73 fe 3d 08 28 0b |..`@....z.s.=.(.|" +peer0.org1.example.com | "2019-05-02 09:27:50.973 UTC [msp.identity] Verify -> DEBU 288f Verify: sig = 00000000 30 45 02 21 00 9c 4f 0e d0 04 3c 06 b0 32 15 7f |0E.!..O...<..2..| +peer0.org1.example.com | 00000010 28 30 1d 7a e1 b1 c7 36 d6 36 04 0c 69 94 19 46 |(0.z...6.6..i..F| +peer0.org1.example.com | 00000020 47 c3 ed fc 8e 02 20 56 5c 84 f2 6e 1b fc d8 ef |G..... V\..n....| +peer0.org1.example.com | 00000030 56 09 48 27 61 9b 15 3f 97 82 8d b9 a6 7f 9a 65 |V.H'a..?.......e| +peer0.org1.example.com | 00000040 86 57 05 3f f6 ca 5f |.W.?.._|" +peer0.org1.example.com | "2019-05-02 09:27:50.973 UTC [protoutils] checkSignatureFromCreator -> DEBU 2890 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:50.974 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2891 validateChaincodeProposalMessage starts for proposal 0xc003168e00, header 0xc0037ceff0" +peer0.org1.example.com | "2019-05-02 09:27:50.974 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2892 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:50.975 UTC [endorser] preProcess -> DEBU 2893 [businesschannel][2df4e9c0] processing txid: 2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44" +peer0.org1.example.com | "2019-05-02 09:27:50.975 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2894 retrieveTransactionByID() - txId = [2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44]" +peer0.org1.example.com | "2019-05-02 09:27:50.975 UTC [endorser] SimulateProposal -> DEBU 2895 [businesschannel][2df4e9c0] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:50.975 UTC [endorser] callChaincode -> INFO 2896 [businesschannel][2df4e9c0] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:50.975 UTC [chaincode] Execute -> DEBU 2897 Entry" +peer0.org1.example.com | "2019-05-02 09:27:50.976 UTC [qscc] Invoke -> DEBU 2898 Invoke function: GetBlockByNumber on chain: businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:50.976 UTC [aclmgmt] CheckACL -> DEBU 2899 acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" +peer0.org1.example.com | "2019-05-02 09:27:50.976 UTC [aclmgmt] CheckACL -> DEBU 289a acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-05-02 09:27:50.976 UTC [policies] Evaluate -> DEBU 289b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:50.977 UTC [policies] Evaluate -> DEBU 289c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:50.977 UTC [policies] Evaluate -> DEBU 289d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:50.977 UTC [cauthdsl] func1 -> DEBU 289e 0xc003774f70 gate 1556789270977536800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:50.977 UTC [cauthdsl] func2 -> DEBU 289f 0xc003774f70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:50.977 UTC [cauthdsl] func2 -> DEBU 28a0 0xc003774f70 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:50.978 UTC [cauthdsl] func2 -> DEBU 28a1 0xc003774f70 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:50.978 UTC [msp.identity] Verify -> DEBU 28a2 Verify: digest = 00000000 ba c2 4b 98 b6 d2 d6 da 18 41 cd fa b8 10 8f 9a |..K......A......| +peer0.org1.example.com | 00000010 83 14 60 40 9b 15 07 ed 7a d0 73 fe 3d 08 28 0b |..`@....z.s.=.(.|" +peer0.org1.example.com | "2019-05-02 09:27:50.978 UTC [msp.identity] Verify -> DEBU 28a3 Verify: sig = 00000000 30 45 02 21 00 9c 4f 0e d0 04 3c 06 b0 32 15 7f |0E.!..O...<..2..| +peer0.org1.example.com | 00000010 28 30 1d 7a e1 b1 c7 36 d6 36 04 0c 69 94 19 46 |(0.z...6.6..i..F| +peer0.org1.example.com | 00000020 47 c3 ed fc 8e 02 20 56 5c 84 f2 6e 1b fc d8 ef |G..... V\..n....| +peer0.org1.example.com | 00000030 56 09 48 27 61 9b 15 3f 97 82 8d b9 a6 7f 9a 65 |V.H'a..?.......e| +peer0.org1.example.com | 00000040 86 57 05 3f f6 ca 5f |.W.?.._|" +peer0.org1.example.com | "2019-05-02 09:27:50.979 UTC [cauthdsl] func2 -> DEBU 28a4 0xc003774f70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:50.979 UTC [cauthdsl] func1 -> DEBU 28a5 0xc003774f70 gate 1556789270977536800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a6 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:50.981 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 28aa retrieveBlockByNumber() - blockNum = [2]" +peer0.org1.example.com | "2019-05-02 09:27:50.981 UTC [fsblkstorage] newBlockfileStream -> DEBU 28ab newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47626]" +peer0.org1.example.com | "2019-05-02 09:27:50.982 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 28ac Remaining bytes=[51047], Going to peek [8] bytes" +peer0.org1.example.com | "2019-05-02 09:27:50.982 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 28ad Returning blockbytes - length=[23743], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" +peer0.org1.example.com | "2019-05-02 09:27:50.983 UTC [chaincode] handleMessage -> DEBU 28ae [2df4e9c0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:50.983 UTC [chaincode] Notify -> DEBU 28af [2df4e9c0] notifying Txid:2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:50.983 UTC [chaincode] Execute -> DEBU 28b0 Exit" +peer0.org1.example.com | "2019-05-02 09:27:50.984 UTC [endorser] callChaincode -> INFO 28b1 [businesschannel][2df4e9c0] Exit chaincode: name:"qscc" (9ms)" +peer0.org1.example.com | "2019-05-02 09:27:50.984 UTC [endorser] SimulateProposal -> DEBU 28b2 [businesschannel][2df4e9c0] Exit" +peer0.org1.example.com | "2019-05-02 09:27:50.985 UTC [endorser] endorseProposal -> DEBU 28b3 [businesschannel][2df4e9c0] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:27:50.985 UTC [endorser] endorseProposal -> DEBU 28b4 [businesschannel][2df4e9c0] escc for chaincode name:"qscc" is escc" +peer0.org1.example.com | "2019-05-02 09:27:50.986 UTC [endorser] EndorseWithPlugin -> DEBU 28b5 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44, chaincode: qscc}" +peer0.org1.example.com | "2019-05-02 09:27:50.986 UTC [msp.identity] Sign -> DEBU 28b6 Sign: plaintext: 0A2016059D49945D8C7832B1426637D1...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:50.986 UTC [msp.identity] Sign -> DEBU 28b7 Sign: digest: 828A231ABBC2A984BCFA1D369556CD17EF40D394F97964C1C6EE762582FD7EF5 " +peer0.org1.example.com | "2019-05-02 09:27:50.987 UTC [endorser] EndorseWithPlugin -> DEBU 28b8 Exiting {plugin: escc, channel: businesschannel, tx: 2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44, chaincode: qscc}" +peer0.org1.example.com | "2019-05-02 09:27:50.987 UTC [endorser] endorseProposal -> DEBU 28b9 [businesschannel][2df4e9c0] Exit" +peer0.org1.example.com | "2019-05-02 09:27:50.988 UTC [endorser] func1 -> DEBU 28ba Exit: request from 172.18.0.8:57378" +peer0.org1.example.com | "2019-05-02 09:27:50.988 UTC [comm.grpc.server] 1 -> INFO 28bb unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57378 grpc.code=OK grpc.call_duration=17.2875ms +peer0.org1.example.com | "2019-05-02 09:27:50.993 UTC [grpc] infof -> DEBU 28bc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:50.993 UTC [grpc] infof -> DEBU 28bd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:51.506 UTC [endorser] ProcessProposal -> DEBU 28be Entering: request from 172.18.0.8:57382" +peer0.org1.example.com | "2019-05-02 09:27:51.506 UTC [protoutils] ValidateProposalMessage -> DEBU 28bf ValidateProposalMessage starts for signed proposal 0xc0037cff90" +peer0.org1.example.com | "2019-05-02 09:27:51.506 UTC [protoutils] validateChannelHeader -> DEBU 28c0 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:51.506 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c1 begin" +peer0.org1.example.com | "2019-05-02 09:27:51.507 UTC [msp] GetManagerForChain -> DEBU 28c2 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:51.507 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c3 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:51.507 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c4 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:51.507 UTC [msp.identity] Verify -> DEBU 28c5 Verify: digest = 00000000 bd 73 e7 3e d5 29 73 26 92 11 70 4f bb 69 ea a7 |.s.>.)s&..pO.i..| +peer0.org1.example.com | 00000010 3a 16 b7 ef 42 ce 73 1a a5 d9 43 76 62 42 b0 2f |:...B.s...CvbB./|" +peer0.org1.example.com | "2019-05-02 09:27:51.507 UTC [msp.identity] Verify -> DEBU 28c6 Verify: sig = 00000000 30 45 02 21 00 ac 41 29 63 a2 87 db 9c 4b 49 c8 |0E.!..A)c....KI.| +peer0.org1.example.com | 00000010 97 d5 ea 8a 84 17 f4 ba 59 23 c5 67 04 34 13 1b |........Y#.g.4..| +peer0.org1.example.com | 00000020 1d 13 81 ae 37 02 20 49 e7 96 ce ea 09 cb d3 b5 |....7. I........| +peer0.org1.example.com | 00000030 d9 68 5c 1c 3b 82 de 50 c9 b0 74 33 cf 1b de 9b |.h\.;..P..t3....| +peer0.org1.example.com | 00000040 65 dc 7f ea 7c 97 17 |e...|..|" +peer0.org1.example.com | "2019-05-02 09:27:51.508 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c7 exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:51.508 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28c8 validateChaincodeProposalMessage starts for proposal 0xc0031690a0, header 0xc003758410" +peer0.org1.example.com | "2019-05-02 09:27:51.508 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28c9 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.509 UTC [endorser] preProcess -> DEBU 28ca [businesschannel][a97e4d2e] processing txid: a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a" +peer0.org1.example.com | "2019-05-02 09:27:51.509 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28cb retrieveTransactionByID() - txId = [a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a]" +peer0.org1.example.com | "2019-05-02 09:27:51.509 UTC [endorser] SimulateProposal -> DEBU 28cc [businesschannel][a97e4d2e] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.510 UTC [endorser] callChaincode -> INFO 28cd [businesschannel][a97e4d2e] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.510 UTC [chaincode] Execute -> DEBU 28ce Entry" +peer0.org1.example.com | "2019-05-02 09:27:51.510 UTC [cscc] Invoke -> DEBU 28cf Invoke function: GetConfigBlock" +peer0.org1.example.com | "2019-05-02 09:27:51.511 UTC [aclmgmt] CheckACL -> DEBU 28d0 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +peer0.org1.example.com | "2019-05-02 09:27:51.511 UTC [aclmgmt] CheckACL -> DEBU 28d1 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-05-02 09:27:51.511 UTC [policies] Evaluate -> DEBU 28d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:51.511 UTC [policies] Evaluate -> DEBU 28d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [policies] Evaluate -> DEBU 28d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [cauthdsl] func1 -> DEBU 28d5 0xc0036f6b30 gate 1556789271512089500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [cauthdsl] func2 -> DEBU 28d6 0xc0036f6b30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [cauthdsl] func2 -> DEBU 28d7 0xc0036f6b30 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [cauthdsl] func2 -> DEBU 28d8 0xc0036f6b30 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:51.512 UTC [msp.identity] Verify -> DEBU 28d9 Verify: digest = 00000000 bd 73 e7 3e d5 29 73 26 92 11 70 4f bb 69 ea a7 |.s.>.)s&..pO.i..| +peer0.org1.example.com | 00000010 3a 16 b7 ef 42 ce 73 1a a5 d9 43 76 62 42 b0 2f |:...B.s...CvbB./|" +peer0.org1.example.com | "2019-05-02 09:27:51.513 UTC [msp.identity] Verify -> DEBU 28da Verify: sig = 00000000 30 45 02 21 00 ac 41 29 63 a2 87 db 9c 4b 49 c8 |0E.!..A)c....KI.| +peer0.org1.example.com | 00000010 97 d5 ea 8a 84 17 f4 ba 59 23 c5 67 04 34 13 1b |........Y#.g.4..| +peer0.org1.example.com | 00000020 1d 13 81 ae 37 02 20 49 e7 96 ce ea 09 cb d3 b5 |....7. I........| +peer0.org1.example.com | 00000030 d9 68 5c 1c 3b 82 de 50 c9 b0 74 33 cf 1b de 9b |.h\.;..P..t3....| +peer0.org1.example.com | 00000040 65 dc 7f ea 7c 97 17 |e...|..|" +peer0.org1.example.com | "2019-05-02 09:27:51.513 UTC [cauthdsl] func2 -> DEBU 28db 0xc0036f6b30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:51.514 UTC [cauthdsl] func1 -> DEBU 28dc 0xc0036f6b30 gate 1556789271512089500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28dd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28df Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:51.515 UTC [chaincode] handleMessage -> DEBU 28e1 [a97e4d2e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:51.515 UTC [chaincode] Notify -> DEBU 28e2 [a97e4d2e] notifying Txid:a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:51.515 UTC [chaincode] Execute -> DEBU 28e3 Exit" +peer0.org1.example.com | "2019-05-02 09:27:51.515 UTC [endorser] callChaincode -> INFO 28e4 [businesschannel][a97e4d2e] Exit chaincode: name:"cscc" (6ms)" +peer0.org1.example.com | "2019-05-02 09:27:51.515 UTC [endorser] SimulateProposal -> DEBU 28e5 [businesschannel][a97e4d2e] Exit" +peer0.org1.example.com | "2019-05-02 09:27:51.516 UTC [endorser] endorseProposal -> DEBU 28e6 [businesschannel][a97e4d2e] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.516 UTC [endorser] endorseProposal -> DEBU 28e7 [businesschannel][a97e4d2e] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-05-02 09:27:51.516 UTC [endorser] EndorseWithPlugin -> DEBU 28e8 Entering endorsement for {plugin: escc, channel: businesschannel, tx: a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a, chaincode: cscc}" +peer0.org1.example.com | "2019-05-02 09:27:51.517 UTC [msp.identity] Sign -> DEBU 28e9 Sign: plaintext: 0A2048A4F3E80B8107BCA08ABF3A0D82...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:51.517 UTC [msp.identity] Sign -> DEBU 28ea Sign: digest: 53473CFF231C4119BEB7B7FF9D6F26836A77AC913801EEE2176514D99C80BF06 " +peer0.org1.example.com | "2019-05-02 09:27:51.517 UTC [endorser] EndorseWithPlugin -> DEBU 28eb Exiting {plugin: escc, channel: businesschannel, tx: a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a, chaincode: cscc}" +peer0.org1.example.com | "2019-05-02 09:27:51.517 UTC [endorser] endorseProposal -> DEBU 28ec [businesschannel][a97e4d2e] Exit" +peer0.org1.example.com | "2019-05-02 09:27:51.517 UTC [endorser] func1 -> DEBU 28ed Exit: request from 172.18.0.8:57382" +peer0.org1.example.com | "2019-05-02 09:27:51.518 UTC [comm.grpc.server] 1 -> INFO 28ee unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57382 grpc.code=OK grpc.call_duration=12.6023ms +peer0.org1.example.com | "2019-05-02 09:27:51.523 UTC [grpc] infof -> DEBU 28ef transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:51.524 UTC [grpc] infof -> DEBU 28f0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:51.711 UTC [endorser] ProcessProposal -> DEBU 28f1 Entering: request from 172.18.0.8:57386" +peer0.org1.example.com | "2019-05-02 09:27:51.711 UTC [protoutils] ValidateProposalMessage -> DEBU 28f2 ValidateProposalMessage starts for signed proposal 0xc003708140" +peer0.org1.example.com | "2019-05-02 09:27:51.711 UTC [protoutils] validateChannelHeader -> DEBU 28f3 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:51.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 28f4 begin" +peer0.org1.example.com | "2019-05-02 09:27:51.712 UTC [msp] GetManagerForChain -> DEBU 28f5 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:51.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 28f6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:51.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 28f7 creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:51.713 UTC [msp.identity] Verify -> DEBU 28f8 Verify: digest = 00000000 ab fc 34 7a b3 c3 81 e6 ad 68 f2 93 c3 02 c6 30 |..4z.....h.....0| +peer0.org1.example.com | 00000010 3b 78 79 b8 4a e1 0b df 63 74 a6 a1 8b 88 82 ae |;xy.J...ct......|" +peer0.org1.example.com | "2019-05-02 09:27:51.713 UTC [msp.identity] Verify -> DEBU 28f9 Verify: sig = 00000000 30 45 02 21 00 ec 61 4b 72 06 98 49 a4 3f 31 5f |0E.!..aKr..I.?1_| +peer0.org1.example.com | 00000010 c9 39 d7 30 87 35 86 1e 22 34 6d 02 92 e7 b1 86 |.9.0.5.."4m.....| +peer0.org1.example.com | 00000020 6d cf 8f 1e dc 02 20 10 f0 87 ab 09 b9 74 36 19 |m..... ......t6.| +peer0.org1.example.com | 00000030 56 52 1c 92 55 f7 5d 2d 51 da da 3b a7 bd 3c fe |VR..U.]-Q..;..<.| +peer0.org1.example.com | 00000040 d5 04 91 31 1c bc d3 |...1...|" +peer0.org1.example.com | "2019-05-02 09:27:51.713 UTC [protoutils] checkSignatureFromCreator -> DEBU 28fa exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:51.713 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28fb validateChaincodeProposalMessage starts for proposal 0xc0034605b0, header 0xc003708550" +peer0.org1.example.com | "2019-05-02 09:27:51.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28fc validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.714 UTC [endorser] preProcess -> DEBU 28fd [businesschannel][2ef25060] processing txid: 2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4" +peer0.org1.example.com | "2019-05-02 09:27:51.714 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28fe retrieveTransactionByID() - txId = [2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4]" +peer0.org1.example.com | "2019-05-02 09:27:51.715 UTC [endorser] SimulateProposal -> DEBU 28ff [businesschannel][2ef25060] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.715 UTC [endorser] callChaincode -> INFO 2900 [businesschannel][2ef25060] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.715 UTC [chaincode] Execute -> DEBU 2901 Entry" +peer0.org1.example.com | "2019-05-02 09:27:51.715 UTC [cscc] Invoke -> DEBU 2902 Invoke function: GetChannels" +peer0.org1.example.com | "2019-05-02 09:27:51.716 UTC [msp.identity] Verify -> DEBU 2903 Verify: digest = 00000000 ab fc 34 7a b3 c3 81 e6 ad 68 f2 93 c3 02 c6 30 |..4z.....h.....0| +peer0.org1.example.com | 00000010 3b 78 79 b8 4a e1 0b df 63 74 a6 a1 8b 88 82 ae |;xy.J...ct......|" +peer0.org1.example.com | "2019-05-02 09:27:51.716 UTC [msp.identity] Verify -> DEBU 2904 Verify: sig = 00000000 30 45 02 21 00 ec 61 4b 72 06 98 49 a4 3f 31 5f |0E.!..aKr..I.?1_| +peer0.org1.example.com | 00000010 c9 39 d7 30 87 35 86 1e 22 34 6d 02 92 e7 b1 86 |.9.0.5.."4m.....| +peer0.org1.example.com | 00000020 6d cf 8f 1e dc 02 20 10 f0 87 ab 09 b9 74 36 19 |m..... ......t6.| +peer0.org1.example.com | 00000030 56 52 1c 92 55 f7 5d 2d 51 da da 3b a7 bd 3c fe |VR..U.]-Q..;..<.| +peer0.org1.example.com | 00000040 d5 04 91 31 1c bc d3 |...1...|" +peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [chaincode] handleMessage -> DEBU 2905 [2ef25060] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [chaincode] Notify -> DEBU 2906 [2ef25060] notifying Txid:2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [chaincode] Execute -> DEBU 2907 Exit" +peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [endorser] callChaincode -> INFO 2908 [businesschannel][2ef25060] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [endorser] SimulateProposal -> DEBU 2909 [businesschannel][2ef25060] Exit" +peer0.org1.example.com | "2019-05-02 09:27:51.717 UTC [endorser] endorseProposal -> DEBU 290a [businesschannel][2ef25060] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.718 UTC [endorser] endorseProposal -> DEBU 290b [businesschannel][2ef25060] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-05-02 09:27:51.718 UTC [endorser] EndorseWithPlugin -> DEBU 290c Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4, chaincode: cscc}" +peer0.org1.example.com | "2019-05-02 09:27:51.718 UTC [msp.identity] Sign -> DEBU 290d Sign: plaintext: 0A206B67B3A204BFF1BC0071B1CC6F8E...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:51.718 UTC [msp.identity] Sign -> DEBU 290e Sign: digest: BB4C7619526B2EDADDE7EE15D90E4B8EF6BF124AF765D67673B4AB3D56217E2E " +peer0.org1.example.com | "2019-05-02 09:27:51.719 UTC [endorser] EndorseWithPlugin -> DEBU 290f Exiting {plugin: escc, channel: businesschannel, tx: 2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4, chaincode: cscc}" +peer0.org1.example.com | "2019-05-02 09:27:51.719 UTC [endorser] endorseProposal -> DEBU 2910 [businesschannel][2ef25060] Exit" +peer0.org1.example.com | "2019-05-02 09:27:51.719 UTC [endorser] func1 -> DEBU 2911 Exit: request from 172.18.0.8:57386" +peer0.org1.example.com | "2019-05-02 09:27:51.720 UTC [comm.grpc.server] 1 -> INFO 2912 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57386 grpc.code=OK grpc.call_duration=8.8482ms +peer0.org1.example.com | "2019-05-02 09:27:51.724 UTC [grpc] infof -> DEBU 2913 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:51.725 UTC [grpc] infof -> DEBU 2914 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:51.899 UTC [endorser] ProcessProposal -> DEBU 2915 Entering: request from 172.18.0.8:57390" +peer0.org1.example.com | "2019-05-02 09:27:51.899 UTC [protoutils] ValidateProposalMessage -> DEBU 2916 ValidateProposalMessage starts for signed proposal 0xc0037094f0" +peer0.org1.example.com | "2019-05-02 09:27:51.899 UTC [protoutils] validateChannelHeader -> DEBU 2917 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 2918 begin" +peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [msp] GetManagerForChain -> DEBU 2919 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 291a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 291b creator is valid" +peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [msp.identity] Verify -> DEBU 291c Verify: digest = 00000000 aa 9d 34 d7 4f 0e 2d 5a 14 70 0f 10 f9 1d 6e 74 |..4.O.-Z.p....nt| +peer0.org1.example.com | 00000010 47 ba bc bb 0b 6b 27 55 19 e5 62 eb 1e 4c 57 23 |G....k'U..b..LW#|" +peer0.org1.example.com | "2019-05-02 09:27:51.900 UTC [msp.identity] Verify -> DEBU 291d Verify: sig = 00000000 30 45 02 21 00 f5 d1 29 0e 9a 96 7a 22 9b b1 f2 |0E.!...)...z"...| +peer0.org1.example.com | 00000010 10 23 20 bc fd 40 59 67 0a ea 52 f0 70 9b 54 d9 |.# ..@Yg..R.p.T.| +peer0.org1.example.com | 00000020 11 64 72 f1 7f 02 20 36 ce fc 81 8a 53 8c 98 4a |.dr... 6....S..J| +peer0.org1.example.com | 00000030 66 62 0b ed 78 89 f5 39 83 c1 9a 45 8b 9b 12 e9 |fb..x..9...E....| +peer0.org1.example.com | 00000040 e9 c9 87 c0 00 2e 69 |......i|" +peer0.org1.example.com | "2019-05-02 09:27:51.901 UTC [protoutils] checkSignatureFromCreator -> DEBU 291e exits successfully" +peer0.org1.example.com | "2019-05-02 09:27:51.901 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 291f validateChaincodeProposalMessage starts for proposal 0xc003460850, header 0xc003709950" +peer0.org1.example.com | "2019-05-02 09:27:51.901 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2920 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.902 UTC [endorser] preProcess -> DEBU 2921 [businesschannel][3ec1dd6f] processing txid: 3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306" +peer0.org1.example.com | "2019-05-02 09:27:51.902 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2922 retrieveTransactionByID() - txId = [3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306]" +peer0.org1.example.com | "2019-05-02 09:27:51.902 UTC [endorser] SimulateProposal -> DEBU 2923 [businesschannel][3ec1dd6f] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.902 UTC [endorser] callChaincode -> INFO 2924 [businesschannel][3ec1dd6f] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.903 UTC [chaincode] Execute -> DEBU 2925 Entry" +peer0.org1.example.com | "2019-05-02 09:27:51.903 UTC [cscc] Invoke -> DEBU 2926 Invoke function: GetConfigTree" +peer0.org1.example.com | "2019-05-02 09:27:51.903 UTC [aclmgmt] CheckACL -> DEBU 2927 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigTree" +peer0.org1.example.com | "2019-05-02 09:27:51.903 UTC [aclmgmt] CheckACL -> DEBU 2928 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-05-02 09:27:51.903 UTC [policies] Evaluate -> DEBU 2929 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:51.904 UTC [policies] Evaluate -> DEBU 292a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:51.904 UTC [policies] Evaluate -> DEBU 292b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:51.904 UTC [cauthdsl] func1 -> DEBU 292c 0xc003543be0 gate 1556789271904780500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:51.904 UTC [cauthdsl] func2 -> DEBU 292d 0xc003543be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:51.905 UTC [cauthdsl] func2 -> DEBU 292e 0xc003543be0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:51.905 UTC [cauthdsl] func2 -> DEBU 292f 0xc003543be0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:51.905 UTC [msp.identity] Verify -> DEBU 2930 Verify: digest = 00000000 aa 9d 34 d7 4f 0e 2d 5a 14 70 0f 10 f9 1d 6e 74 |..4.O.-Z.p....nt| +peer0.org1.example.com | 00000010 47 ba bc bb 0b 6b 27 55 19 e5 62 eb 1e 4c 57 23 |G....k'U..b..LW#|" +peer0.org1.example.com | "2019-05-02 09:27:51.905 UTC [msp.identity] Verify -> DEBU 2931 Verify: sig = 00000000 30 45 02 21 00 f5 d1 29 0e 9a 96 7a 22 9b b1 f2 |0E.!...)...z"...| +peer0.org1.example.com | 00000010 10 23 20 bc fd 40 59 67 0a ea 52 f0 70 9b 54 d9 |.# ..@Yg..R.p.T.| +peer0.org1.example.com | 00000020 11 64 72 f1 7f 02 20 36 ce fc 81 8a 53 8c 98 4a |.dr... 6....S..J| +peer0.org1.example.com | 00000030 66 62 0b ed 78 89 f5 39 83 c1 9a 45 8b 9b 12 e9 |fb..x..9...E....| +peer0.org1.example.com | 00000040 e9 c9 87 c0 00 2e 69 |......i|" +peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [cauthdsl] func2 -> DEBU 2932 0xc003543be0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [cauthdsl] func1 -> DEBU 2933 0xc003543be0 gate 1556789271904780500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2934 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2935 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2936 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2937 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:51.907 UTC [chaincode] handleMessage -> DEBU 2938 [3ec1dd6f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:27:51.907 UTC [chaincode] Notify -> DEBU 2939 [3ec1dd6f] notifying Txid:3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306, channelID:businesschannel" +peer0.org1.example.com | "2019-05-02 09:27:51.907 UTC [chaincode] Execute -> DEBU 293a Exit" +peer0.org1.example.com | "2019-05-02 09:27:51.908 UTC [endorser] callChaincode -> INFO 293b [businesschannel][3ec1dd6f] Exit chaincode: name:"cscc" (5ms)" +peer0.org1.example.com | "2019-05-02 09:27:51.908 UTC [endorser] SimulateProposal -> DEBU 293c [businesschannel][3ec1dd6f] Exit" +peer0.org1.example.com | "2019-05-02 09:27:51.908 UTC [endorser] endorseProposal -> DEBU 293d [businesschannel][3ec1dd6f] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:27:51.909 UTC [endorser] endorseProposal -> DEBU 293e [businesschannel][3ec1dd6f] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-05-02 09:27:51.909 UTC [endorser] EndorseWithPlugin -> DEBU 293f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306, chaincode: cscc}" +peer0.org1.example.com | "2019-05-02 09:27:51.909 UTC [msp.identity] Sign -> DEBU 2940 Sign: plaintext: 0A209037445891E6447F4E4A5C737046...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-05-02 09:27:51.909 UTC [msp.identity] Sign -> DEBU 2941 Sign: digest: 1C1F089306B22C542D72A6549BEF042EE439AC16B533273D756DD1C2B691BF6E " +peer0.org1.example.com | "2019-05-02 09:27:51.909 UTC [endorser] EndorseWithPlugin -> DEBU 2942 Exiting {plugin: escc, channel: businesschannel, tx: 3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306, chaincode: cscc}" +peer0.org1.example.com | "2019-05-02 09:27:51.910 UTC [endorser] endorseProposal -> DEBU 2943 [businesschannel][3ec1dd6f] Exit" +peer0.org1.example.com | "2019-05-02 09:27:51.910 UTC [endorser] func1 -> DEBU 2944 Exit: request from 172.18.0.8:57390" +peer0.org1.example.com | "2019-05-02 09:27:51.910 UTC [comm.grpc.server] 1 -> INFO 2945 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57390 grpc.code=OK grpc.call_duration=11.0778ms +peer0.org1.example.com | "2019-05-02 09:27:51.914 UTC [grpc] infof -> DEBU 2946 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:51.915 UTC [grpc] infof -> DEBU 2947 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:27:52.247 UTC [msp] DeserializeIdentity -> DEBU 2948 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.247 UTC [msp] DeserializeIdentity -> DEBU 2949 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.248 UTC [gossip.comm] Send -> DEBU 294a Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:52.249 UTC [gossip.comm] sendToEndpoint -> DEBU 294b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.249 UTC [gossip.comm] sendToEndpoint -> DEBU 294c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.250 UTC [gossip.comm] sendToEndpoint -> DEBU 294d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.250 UTC [gossip.comm] sendToEndpoint -> DEBU 294e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.250 UTC [gossip.comm] sendToEndpoint -> DEBU 294f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.251 UTC [gossip.comm] sendToEndpoint -> DEBU 2950 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.252 UTC [gossip.comm] func1 -> DEBU 2951 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.252 UTC [gossip.gossip] handleMessage -> DEBU 2952 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.252 UTC [msp] DeserializeIdentity -> DEBU 2953 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.252 UTC [msp.identity] Verify -> DEBU 2954 Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....| +peer0.org1.example.com | 00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|" +peer0.org1.example.com | "2019-05-02 09:27:52.252 UTC [msp.identity] Verify -> DEBU 2955 Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj| +peer0.org1.example.com | 00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<| +peer0.org1.example.com | 00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&| +peer0.org1.example.com | 00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..| +peer0.org1.example.com | 00000040 97 4a 87 c3 f2 e2 |.J....|" +peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [msp.identity] Verify -> DEBU 2956 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [msp.identity] Verify -> DEBU 2957 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|" +peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [msp] DeserializeIdentity -> DEBU 2958 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [msp] DeserializeIdentity -> DEBU 2959 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 295a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:52.253 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 295b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.256 UTC [msp] DeserializeIdentity -> DEBU 295c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.256 UTC [msp] DeserializeIdentity -> DEBU 295d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.256 UTC [gossip.comm] Send -> DEBU 295e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:52.256 UTC [msp] DeserializeIdentity -> DEBU 295f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [msp] DeserializeIdentity -> DEBU 2960 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2961 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2962 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2963 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2964 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2965 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2966 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.256 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2967 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.258 UTC [policies] Evaluate -> DEBU 2968 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2969 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 296a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func1 -> DEBU 296b 0xc003444a40 gate 1556789272278231700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296c 0xc003444a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296d 0xc003444a40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296e 0xc003444a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296f 0xc003444a40 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func1 -> DEBU 2970 0xc003444a40 gate 1556789272278231700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2971 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2972 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2973 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func1 -> DEBU 2974 0xc003445290 gate 1556789272278689800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 2975 0xc003445290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [cauthdsl] func2 -> DEBU 2976 0xc003445290 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [cauthdsl] func2 -> DEBU 2977 0xc003445290 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [msp.identity] Verify -> DEBU 2978 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [msp.identity] Verify -> DEBU 2979 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [cauthdsl] func2 -> DEBU 297a 0xc003445290 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [cauthdsl] func1 -> DEBU 297b 0xc003445290 gate 1556789272278689800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [msp] DeserializeIdentity -> DEBU 2980 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [msp] DeserializeIdentity -> DEBU 2981 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2982 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2983 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2984 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 2985 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2986 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2987 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 2988 0xc003428aa0 gate 1556789272280100100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2989 0xc003428aa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 298a 0xc003428aa0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 298b 0xc003428aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 298c 0xc003428aa0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 298d 0xc003428aa0 gate 1556789272280100100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 298e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 298f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2990 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 2991 0xc003429420 gate 1556789272280452300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2992 0xc003429420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2993 0xc003429420 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2994 0xc003429420 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [msp.identity] Verify -> DEBU 2995 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [msp.identity] Verify -> DEBU 2996 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2997 0xc003429420 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 2998 0xc003429420 gate 1556789272280452300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2999 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 299a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 299b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 299c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [msp] DeserializeIdentity -> DEBU 299d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 299e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 299f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func1 -> DEBU 29a3 0xc0033f8600 gate 1556789272281280100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a4 0xc0033f8600 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a5 0xc0033f8600 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a6 0xc0033f8600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a7 0xc0033f8600 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func1 -> DEBU 29a8 0xc0033f8600 gate 1556789272281280100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func1 -> DEBU 29ac 0xc0033f8e70 gate 1556789272281606900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29ad 0xc0033f8e70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29ae 0xc0033f8e70 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29af 0xc0033f8e70 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [msp.identity] Verify -> DEBU 29b0 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [msp.identity] Verify -> DEBU 29b1 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29b2 0xc0033f8e70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [cauthdsl] func1 -> DEBU 29b3 0xc0033f8e70 gate 1556789272281606900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [gossip.gossip] handleMessage -> DEBU 29b8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [gossip.gossip] handleMessage -> DEBU 29b9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp] DeserializeIdentity -> DEBU 29ba Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29bb Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....| +peer0.org1.example.com | 00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29bc Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj| +peer0.org1.example.com | 00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<| +peer0.org1.example.com | 00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&| +peer0.org1.example.com | 00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..| +peer0.org1.example.com | 00000040 97 4a 87 c3 f2 e2 |.J....|" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29bd Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +peer0.org1.example.com | 00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29be Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +peer0.org1.example.com | 00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +peer0.org1.example.com | 00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +peer0.org1.example.com | 00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +peer0.org1.example.com | 00000040 a6 7f 10 af bd 05 6d |......m|" +peer0.org1.example.com | "2019-05-02 09:27:52.282 UTC [msp] DeserializeIdentity -> DEBU 29bf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [msp] DeserializeIdentity -> DEBU 29c0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func1 -> DEBU 29c7 0xc0033d9c60 gate 1556789272283411600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29c8 0xc0033d9c60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29c9 0xc0033d9c60 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29ca 0xc0033d9c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29cb 0xc0033d9c60 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func1 -> DEBU 29cc 0xc0033d9c60 gate 1556789272283411600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29cd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func1 -> DEBU 29d0 0xc0033ca4a0 gate 1556789272283751800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29d1 0xc0033ca4a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29d2 0xc0033ca4a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29d3 0xc0033ca4a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [msp.identity] Verify -> DEBU 29d4 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.| +peer0.org1.example.com | 00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|" +peer0.org1.example.com | "2019-05-02 09:27:52.283 UTC [msp.identity] Verify -> DEBU 29d5 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. | +peer0.org1.example.com | 00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3| +peer0.org1.example.com | 00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$| +peer0.org1.example.com | 00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E| +peer0.org1.example.com | 00000040 ca 44 3d eb 27 9e 00 |.D=.'..|" +peer0.org1.example.com | "2019-05-02 09:27:52.292 UTC [cauthdsl] func2 -> DEBU 29d6 0xc0033ca4a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.292 UTC [cauthdsl] func1 -> DEBU 29d7 0xc0033ca4a0 gate 1556789272283751800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.293 UTC [policies] Evaluate -> DEBU 29d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.293 UTC [policies] Evaluate -> DEBU 29d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.295 UTC [policies] Evaluate -> DEBU 29da Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.296 UTC [policies] Evaluate -> DEBU 29db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.297 UTC [msp] DeserializeIdentity -> DEBU 29dc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.298 UTC [msp] DeserializeIdentity -> DEBU 29dd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.300 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:52.301 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29df Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29e0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.303 UTC [policies] Evaluate -> DEBU 29e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.304 UTC [policies] Evaluate -> DEBU 29e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.304 UTC [policies] Evaluate -> DEBU 29e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.306 UTC [cauthdsl] func1 -> DEBU 29e4 0xc0033cbcd0 gate 1556789272306047300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.306 UTC [cauthdsl] func2 -> DEBU 29e5 0xc0033cbcd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.306 UTC [cauthdsl] func2 -> DEBU 29e6 0xc0033cbcd0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.306 UTC [cauthdsl] func2 -> DEBU 29e7 0xc0033cbcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [cauthdsl] func2 -> DEBU 29e8 0xc0033cbcd0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [cauthdsl] func1 -> DEBU 29e9 0xc0033cbcd0 gate 1556789272306047300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [policies] Evaluate -> DEBU 29ea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [policies] Evaluate -> DEBU 29eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [policies] Evaluate -> DEBU 29ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [cauthdsl] func1 -> DEBU 29ed 0xc0032f4720 gate 1556789272307897900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [cauthdsl] func2 -> DEBU 29ee 0xc0032f4720 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.307 UTC [cauthdsl] func2 -> DEBU 29ef 0xc0032f4720 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [cauthdsl] func2 -> DEBU 29f0 0xc0032f4720 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [msp.identity] Verify -> DEBU 29f1 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [msp.identity] Verify -> DEBU 29f2 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [cauthdsl] func2 -> DEBU 29f3 0xc0032f4720 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [cauthdsl] func1 -> DEBU 29f4 0xc0032f4720 gate 1556789272307897900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [msp] DeserializeIdentity -> DEBU 29f9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29fa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29fb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.309 UTC [policies] Evaluate -> DEBU 29fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.309 UTC [policies] Evaluate -> DEBU 29fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.309 UTC [cauthdsl] func1 -> DEBU 29ff 0xc0032f5810 gate 1556789272309496700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.309 UTC [cauthdsl] func2 -> DEBU 2a00 0xc0032f5810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.311 UTC [cauthdsl] func2 -> DEBU 2a01 0xc0032f5810 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.312 UTC [cauthdsl] func2 -> DEBU 2a02 0xc0032f5810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.312 UTC [cauthdsl] func2 -> DEBU 2a03 0xc0032f5810 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.313 UTC [cauthdsl] func1 -> DEBU 2a04 0xc0032f5810 gate 1556789272309496700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.313 UTC [policies] Evaluate -> DEBU 2a05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.313 UTC [policies] Evaluate -> DEBU 2a06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [policies] Evaluate -> DEBU 2a07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [cauthdsl] func1 -> DEBU 2a08 0xc0032b4060 gate 1556789272314300100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [cauthdsl] func2 -> DEBU 2a09 0xc0032b4060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [cauthdsl] func2 -> DEBU 2a0a 0xc0032b4060 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [cauthdsl] func2 -> DEBU 2a0b 0xc0032b4060 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [msp.identity] Verify -> DEBU 2a0c Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:27:52.314 UTC [msp.identity] Verify -> DEBU 2a0d Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:27:52.316 UTC [gossip.election] waitForInterrupt -> DEBU 2a0e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.317 UTC [gossip.election] IsLeader -> DEBU 2a0f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:27:52.317 UTC [msp.identity] Sign -> DEBU 2a10 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510081801 " +peer0.org1.example.com | "2019-05-02 09:27:52.318 UTC [msp.identity] Sign -> DEBU 2a11 Sign: digest: 094146C0F2228C9D7DB4175481F7A1B1DDF73F04769F4BD9E74919884DB59756 " +peer0.org1.example.com | "2019-05-02 09:27:52.319 UTC [gossip.election] waitForInterrupt -> DEBU 2a12 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a13 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a14 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a15 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a16 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.325 UTC [gossip.comm] Send -> DEBU 2a17 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:52.325 UTC [msp] DeserializeIdentity -> DEBU 2a18 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.325 UTC [msp] DeserializeIdentity -> DEBU 2a19 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.325 UTC [gossip.comm] sendToEndpoint -> DEBU 2a1a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.325 UTC [gossip.comm] sendToEndpoint -> DEBU 2a1b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.320 UTC [cauthdsl] func2 -> DEBU 2a1c 0xc0032b4060 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.327 UTC [cauthdsl] func1 -> DEBU 2a1d 0xc0032b4060 gate 1556789272314300100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.327 UTC [policies] Evaluate -> DEBU 2a1e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [policies] Evaluate -> DEBU 2a1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [policies] Evaluate -> DEBU 2a20 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [policies] Evaluate -> DEBU 2a21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [gossip.gossip] handleMessage -> DEBU 2a22 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [gossip.gossip] handleMessage -> DEBU 2a23 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [msp.identity] Verify -> DEBU 2a24 Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....| +peer0.org1.example.com | 00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|" +peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [msp.identity] Verify -> DEBU 2a25 Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj| +peer0.org1.example.com | 00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<| +peer0.org1.example.com | 00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&| +peer0.org1.example.com | 00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..| +peer0.org1.example.com | 00000040 97 4a 87 c3 f2 e2 |.J....|" +peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [msp] DeserializeIdentity -> DEBU 2a26 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.328 UTC [msp] DeserializeIdentity -> DEBU 2a27 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a28 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a29 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a2a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [policies] Evaluate -> DEBU 2a2b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [policies] Evaluate -> DEBU 2a2c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.334 UTC [policies] Evaluate -> DEBU 2a2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.335 UTC [cauthdsl] func1 -> DEBU 2a2e 0xc003108280 gate 1556789272335306700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.335 UTC [cauthdsl] func2 -> DEBU 2a2f 0xc003108280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.335 UTC [cauthdsl] func2 -> DEBU 2a30 0xc003108280 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.335 UTC [cauthdsl] func2 -> DEBU 2a31 0xc003108280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [cauthdsl] func2 -> DEBU 2a32 0xc003108280 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [cauthdsl] func1 -> DEBU 2a33 0xc003108280 gate 1556789272335306700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [policies] Evaluate -> DEBU 2a34 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [policies] Evaluate -> DEBU 2a35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [policies] Evaluate -> DEBU 2a36 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [cauthdsl] func1 -> DEBU 2a37 0xc003108ac0 gate 1556789272336935700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.336 UTC [cauthdsl] func2 -> DEBU 2a38 0xc003108ac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [cauthdsl] func2 -> DEBU 2a39 0xc003108ac0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [cauthdsl] func2 -> DEBU 2a3a 0xc003108ac0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [msp.identity] Verify -> DEBU 2a3b Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +peer0.org1.example.com | 00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [msp.identity] Verify -> DEBU 2a3c Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +peer0.org1.example.com | 00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +peer0.org1.example.com | 00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +peer0.org1.example.com | 00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +peer0.org1.example.com | 00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [cauthdsl] func2 -> DEBU 2a3d 0xc003108ac0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [cauthdsl] func1 -> DEBU 2a3e 0xc003108ac0 gate 1556789272336935700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a3f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a40 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a41 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a42 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [msp] DeserializeIdentity -> DEBU 2a43 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [msp] DeserializeIdentity -> DEBU 2a44 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a46 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a47 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a48 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a49 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func1 -> DEBU 2a4b 0xc00301a410 gate 1556789272338052200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4c 0xc00301a410 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4d 0xc00301a410 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4e 0xc00301a410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4f 0xc00301a410 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func1 -> DEBU 2a50 0xc00301a410 gate 1556789272338052200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func1 -> DEBU 2a54 0xc00301ac50 gate 1556789272338501400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a55 0xc00301ac50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a56 0xc00301ac50 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a57 0xc00301ac50 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [msp.identity] Verify -> DEBU 2a58 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.| +peer0.org1.example.com | 00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|" +peer0.org1.example.com | "2019-05-02 09:27:52.338 UTC [msp.identity] Verify -> DEBU 2a59 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. | +peer0.org1.example.com | 00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3| +peer0.org1.example.com | 00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$| +peer0.org1.example.com | 00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E| +peer0.org1.example.com | 00000040 ca 44 3d eb 27 9e 00 |.D=.'..|" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [cauthdsl] func2 -> DEBU 2a5a 0xc00301ac50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [cauthdsl] func1 -> DEBU 2a5b 0xc00301ac50 gate 1556789272338501400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [msp.identity] Verify -> DEBU 2a60 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [msp.identity] Verify -> DEBU 2a61 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a62 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a63 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [policies] Evaluate -> DEBU 2a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [policies] Evaluate -> DEBU 2a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [cauthdsl] func1 -> DEBU 2a67 0xc002f84350 gate 1556789272340508100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [cauthdsl] func2 -> DEBU 2a68 0xc002f84350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [cauthdsl] func2 -> DEBU 2a69 0xc002f84350 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.340 UTC [cauthdsl] func2 -> DEBU 2a6a 0xc002f84350 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.341 UTC [msp.identity] Verify -> DEBU 2a6b Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:27:52.341 UTC [msp.identity] Verify -> DEBU 2a6c Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:27:52.341 UTC [cauthdsl] func2 -> DEBU 2a6d 0xc002f84350 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.342 UTC [cauthdsl] func1 -> DEBU 2a6e 0xc002f84350 gate 1556789272340508100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a6f Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a71 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a72 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.343 UTC [gossip.gossip] handleMessage -> DEBU 2a73 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.391 UTC [gossip.gossip] handleMessage -> DEBU 2a74 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 282 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a75 Got message: GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 282 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.392 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a76 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:52.393 UTC [msp.identity] Verify -> DEBU 2a77 Verify: digest = 00000000 3f f3 7b 01 4b 67 e4 ae d4 80 79 f9 d5 b1 2b e4 |?.{.Kg....y...+.| +peer0.org1.example.com | 00000010 0c 6f 9d 0c 3c 63 0a b4 63 94 de 7f 92 56 fb 0d |.o.. DEBU 2a78 Verify: sig = 00000000 30 45 02 21 00 be 57 96 1e ac ab f2 00 a2 c6 b4 |0E.!..W.........| +peer0.org1.example.com | 00000010 e4 37 61 4e a9 c2 4a 6b 5a cc e8 c7 46 c0 9e 58 |.7aN..JkZ...F..X| +peer0.org1.example.com | 00000020 ef e6 e3 40 f2 02 20 1b f5 cb 8b 68 ab 00 1c 9f |...@.. ....h....| +peer0.org1.example.com | 00000030 f0 31 0f 0e c5 b9 bc f0 65 6f 9f 31 58 53 cf d4 |.1......eo.1XS..| +peer0.org1.example.com | 00000040 d2 3b d1 8f fa 22 6e |.;..."n|" +peer0.org1.example.com | "2019-05-02 09:27:52.394 UTC [msp.identity] Verify -> DEBU 2a79 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:52.394 UTC [msp.identity] Verify -> DEBU 2a7a Verify: sig = 00000000 30 44 02 20 0c 06 0f 84 b0 9e 4f e5 d1 98 3d 7a |0D. ......O...=z| +peer0.org1.example.com | 00000010 d1 0e d7 8d e4 4c 4c 6e 83 91 b6 d9 ee 11 48 02 |.....LLn......H.| +peer0.org1.example.com | 00000020 ee 00 97 4b 02 20 0b 54 fc ee 22 eb 98 0b 50 b1 |...K. .T.."...P.| +peer0.org1.example.com | 00000030 05 35 52 2e 70 a6 c7 11 be ca 1a 57 b7 75 49 8f |.5R.p......W.uI.| +peer0.org1.example.com | 00000040 a7 03 ae ab 64 57 |....dW|" +peer0.org1.example.com | "2019-05-02 09:27:52.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a7b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.395 UTC [gossip.discovery] sendMemResponse -> DEBU 2a7c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:52.396 UTC [msp] DeserializeIdentity -> DEBU 2a7d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.396 UTC [msp] DeserializeIdentity -> DEBU 2a7e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.396 UTC [gossip.comm] Send -> DEBU 2a7f Entering, sending GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:52.396 UTC [gossip.discovery] sendMemResponse -> DEBU 2a80 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:52.397 UTC [gossip.comm] sendToEndpoint -> DEBU 2a81 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.397 UTC [gossip.comm] sendToEndpoint -> DEBU 2a82 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.397 UTC [gossip.gossip] handleMessage -> DEBU 2a83 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.504 UTC [gossip.gossip] handleMessage -> DEBU 2a84 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.506 UTC [msp] DeserializeIdentity -> DEBU 2a85 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.506 UTC [msp] DeserializeIdentity -> DEBU 2a86 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.507 UTC [gossip.gossip] handleMessage -> DEBU 2a87 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.518 UTC [gossip.gossip] handleMessage -> DEBU 2a88 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.522 UTC [msp.identity] Verify -> DEBU 2a89 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:27:52.522 UTC [msp.identity] Verify -> DEBU 2a8a Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:27:52.523 UTC [gossip.gossip] handleMessage -> DEBU 2a8b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.523 UTC [gossip.gossip] handleMessage -> DEBU 2a8c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.523 UTC [msp.identity] Verify -> DEBU 2a8d Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:27:52.523 UTC [msp.identity] Verify -> DEBU 2a8e Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:27:52.524 UTC [msp] DeserializeIdentity -> DEBU 2a8f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.524 UTC [gossip.gossip] handleMessage -> DEBU 2a90 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.530 UTC [gossip.comm] func1 -> DEBU 2a91 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.530 UTC [gossip.gossip] handleMessage -> DEBU 2a92 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.531 UTC [msp.identity] Verify -> DEBU 2a93 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:27:52.531 UTC [msp.identity] Verify -> DEBU 2a94 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:27:52.531 UTC [msp] DeserializeIdentity -> DEBU 2a95 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.531 UTC [gossip.gossip] handleMessage -> DEBU 2a96 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.557 UTC [gossip.gossip] handleMessage -> DEBU 2a97 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.558 UTC [gossip.pull] HandleMessage -> DEBU 2a98 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.558 UTC [gossip.pull] SendDigest -> DEBU 2a99 Sending BLOCK_MSG digest: [4 5 6 7 8 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:52.559 UTC [gossip.gossip] handleMessage -> DEBU 2a9a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.751 UTC [gossip.gossip] handleMessage -> DEBU 2a9b Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.751 UTC [msp] DeserializeIdentity -> DEBU 2a9c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.752 UTC [msp] DeserializeIdentity -> DEBU 2a9d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.752 UTC [msp] DeserializeIdentity -> DEBU 2a9e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.753 UTC [gossip.gossip] handleMessage -> DEBU 2a9f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.762 UTC [gossip.gossip] handleMessage -> DEBU 2aa0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789269839972700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.766 UTC [msp] DeserializeIdentity -> DEBU 2aa1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2aa2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:52.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2aa3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2aa4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.769 UTC [policies] Evaluate -> DEBU 2aa5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.770 UTC [policies] Evaluate -> DEBU 2aa6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.770 UTC [policies] Evaluate -> DEBU 2aa7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.771 UTC [cauthdsl] func1 -> DEBU 2aa8 0xc002ee0090 gate 1556789272770718900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aa9 0xc002ee0090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aaa 0xc002ee0090 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aab 0xc002ee0090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aac 0xc002ee0090 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [cauthdsl] func1 -> DEBU 2aad 0xc002ee0090 gate 1556789272770718900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [policies] Evaluate -> DEBU 2aae Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.772 UTC [policies] Evaluate -> DEBU 2aaf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.773 UTC [policies] Evaluate -> DEBU 2ab0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.774 UTC [cauthdsl] func1 -> DEBU 2ab1 0xc002ee08d0 gate 1556789272773770200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.774 UTC [cauthdsl] func2 -> DEBU 2ab2 0xc002ee08d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.774 UTC [cauthdsl] func2 -> DEBU 2ab3 0xc002ee08d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.775 UTC [cauthdsl] func2 -> DEBU 2ab4 0xc002ee08d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.775 UTC [msp.identity] Verify -> DEBU 2ab5 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:27:52.775 UTC [msp.identity] Verify -> DEBU 2ab6 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:27:52.776 UTC [cauthdsl] func2 -> DEBU 2ab7 0xc002ee08d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.776 UTC [cauthdsl] func1 -> DEBU 2ab8 0xc002ee08d0 gate 1556789272773770200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.776 UTC [policies] Evaluate -> DEBU 2ab9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU 2aba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU 2abb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU 2abc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.777 UTC [msp] DeserializeIdentity -> DEBU 2abd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.778 UTC [gossip.gossip] handleMessage -> DEBU 2abe Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.782 UTC [gossip.comm] func1 -> DEBU 2abf Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789269839972700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.782 UTC [gossip.gossip] handleMessage -> DEBU 2ac0 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789269839972700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.782 UTC [msp] DeserializeIdentity -> DEBU 2ac1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.783 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ac2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:52.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ac3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ac4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.783 UTC [policies] Evaluate -> DEBU 2ac5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.784 UTC [policies] Evaluate -> DEBU 2ac6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.784 UTC [policies] Evaluate -> DEBU 2ac7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.784 UTC [cauthdsl] func1 -> DEBU 2ac8 0xc002ea6590 gate 1556789272784549100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.784 UTC [cauthdsl] func2 -> DEBU 2ac9 0xc002ea6590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.785 UTC [cauthdsl] func2 -> DEBU 2aca 0xc002ea6590 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.785 UTC [cauthdsl] func2 -> DEBU 2acb 0xc002ea6590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.785 UTC [cauthdsl] func2 -> DEBU 2acc 0xc002ea6590 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.786 UTC [cauthdsl] func1 -> DEBU 2acd 0xc002ea6590 gate 1556789272784549100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.786 UTC [policies] Evaluate -> DEBU 2ace Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.786 UTC [policies] Evaluate -> DEBU 2acf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.786 UTC [policies] Evaluate -> DEBU 2ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.787 UTC [cauthdsl] func1 -> DEBU 2ad1 0xc002ea6f00 gate 1556789272787102400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.787 UTC [cauthdsl] func2 -> DEBU 2ad2 0xc002ea6f00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.787 UTC [cauthdsl] func2 -> DEBU 2ad3 0xc002ea6f00 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.787 UTC [cauthdsl] func2 -> DEBU 2ad4 0xc002ea6f00 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.788 UTC [msp.identity] Verify -> DEBU 2ad5 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:27:52.788 UTC [msp.identity] Verify -> DEBU 2ad6 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:27:52.789 UTC [cauthdsl] func2 -> DEBU 2ad7 0xc002ea6f00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.789 UTC [cauthdsl] func1 -> DEBU 2ad8 0xc002ea6f00 gate 1556789272787102400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.790 UTC [policies] Evaluate -> DEBU 2ad9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.791 UTC [policies] Evaluate -> DEBU 2ada == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.792 UTC [policies] Evaluate -> DEBU 2adb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.792 UTC [policies] Evaluate -> DEBU 2adc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.792 UTC [msp] DeserializeIdentity -> DEBU 2add Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.793 UTC [gossip.gossip] handleMessage -> DEBU 2ade Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.815 UTC [gossip.comm] func1 -> DEBU 2adf Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.815 UTC [gossip.gossip] handleMessage -> DEBU 2ae0 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.818 UTC [gossip.pull] HandleMessage -> DEBU 2ae1 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.819 UTC [msp] DeserializeIdentity -> DEBU 2ae2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.820 UTC [msp] DeserializeIdentity -> DEBU 2ae3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.821 UTC [msp] DeserializeIdentity -> DEBU 2ae4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.821 UTC [msp] DeserializeIdentity -> DEBU 2ae5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.822 UTC [msp] DeserializeIdentity -> DEBU 2ae6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.822 UTC [msp] DeserializeIdentity -> DEBU 2ae7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.823 UTC [gossip.pull] SendDigest -> DEBU 2ae8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:52.823 UTC [gossip.gossip] handleMessage -> DEBU 2ae9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.834 UTC [gossip.comm] func1 -> DEBU 2aea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.834 UTC [gossip.gossip] handleMessage -> DEBU 2aeb Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.835 UTC [gossip.gossip] handleMessage -> DEBU 2aec Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.836 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.837 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aee Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:52.837 UTC [msp] DeserializeIdentity -> DEBU 2aef Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.838 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2af0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:52.839 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2af1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2af2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.842 UTC [policies] Evaluate -> DEBU 2af3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.842 UTC [policies] Evaluate -> DEBU 2af4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.842 UTC [policies] Evaluate -> DEBU 2af5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func1 -> DEBU 2af6 0xc002e59910 gate 1556789272843494600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2af7 0xc002e59910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2af8 0xc002e59910 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2af9 0xc002e59910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2afa 0xc002e59910 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [cauthdsl] func1 -> DEBU 2afb 0xc002e59910 gate 1556789272843494600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.846 UTC [policies] Evaluate -> DEBU 2afc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.847 UTC [policies] Evaluate -> DEBU 2afd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.847 UTC [policies] Evaluate -> DEBU 2afe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.847 UTC [cauthdsl] func1 -> DEBU 2aff 0xc002e42170 gate 1556789272847526700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.847 UTC [cauthdsl] func2 -> DEBU 2b00 0xc002e42170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.848 UTC [cauthdsl] func2 -> DEBU 2b01 0xc002e42170 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.848 UTC [cauthdsl] func2 -> DEBU 2b02 0xc002e42170 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.848 UTC [msp.identity] Verify -> DEBU 2b03 Verify: digest = 00000000 aa dd c4 28 04 7b e8 7f ee 60 d5 11 ef d5 b6 9c |...(.{...`......| +peer0.org1.example.com | 00000010 05 1a 30 65 4e 65 1c 84 8e 73 63 5c b3 7a b3 3c |..0eNe...sc\.z.<|" +peer0.org1.example.com | "2019-05-02 09:27:52.848 UTC [msp.identity] Verify -> DEBU 2b04 Verify: sig = 00000000 30 44 02 20 31 36 16 86 3a 1f 47 9b ed ee e2 8e |0D. 16..:.G.....| +peer0.org1.example.com | 00000010 87 e8 03 8d 95 10 41 0b d6 15 bb 6e cd dd d1 8d |......A....n....| +peer0.org1.example.com | 00000020 0a 13 f0 6e 02 20 10 6a 41 fb 11 d0 f2 35 21 c9 |...n. .jA....5!.| +peer0.org1.example.com | 00000030 b8 08 64 ac 50 cf b1 7d eb 21 f9 f2 f0 ee a6 ce |..d.P..}.!......| +peer0.org1.example.com | 00000040 72 8c e1 c3 66 83 |r...f.|" +peer0.org1.example.com | "2019-05-02 09:27:52.849 UTC [cauthdsl] func2 -> DEBU 2b05 0xc002e42170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.849 UTC [cauthdsl] func1 -> DEBU 2b06 0xc002e42170 gate 1556789272847526700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.849 UTC [policies] Evaluate -> DEBU 2b07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [policies] Evaluate -> DEBU 2b08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [policies] Evaluate -> DEBU 2b09 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [policies] Evaluate -> DEBU 2b0a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b0b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:52.850 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0d updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 " +peer0.org1.example.com | "2019-05-02 09:27:52.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 " +peer0.org1.example.com | "2019-05-02 09:27:52.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:52.852 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b10 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b11 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.853 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b12 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.853 UTC [gossip.discovery] sendMemResponse -> DEBU 2b13 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:52.853 UTC [msp] DeserializeIdentity -> DEBU 2b14 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.854 UTC [msp] DeserializeIdentity -> DEBU 2b15 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.855 UTC [msp] DeserializeIdentity -> DEBU 2b16 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.856 UTC [gossip.comm] Send -> DEBU 2b17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:52.857 UTC [gossip.discovery] sendMemResponse -> DEBU 2b18 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:52.858 UTC [gossip.comm] sendToEndpoint -> DEBU 2b19 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.858 UTC [gossip.comm] sendToEndpoint -> DEBU 2b1a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.983 UTC [gossip.comm] func1 -> DEBU 2b1b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.984 UTC [gossip.gossip] handleMessage -> DEBU 2b1c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.985 UTC [msp] DeserializeIdentity -> DEBU 2b1d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.986 UTC [msp] DeserializeIdentity -> DEBU 2b1e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.986 UTC [msp] DeserializeIdentity -> DEBU 2b1f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.986 UTC [gossip.gossip] handleMessage -> DEBU 2b20 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:52.993 UTC [gossip.comm] func1 -> DEBU 2b21 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789269860040500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.993 UTC [gossip.gossip] handleMessage -> DEBU 2b22 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789269860040500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:52.993 UTC [msp] DeserializeIdentity -> DEBU 2b23 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:52.994 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:52.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b25 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b26 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:52.994 UTC [policies] Evaluate -> DEBU 2b27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.995 UTC [policies] Evaluate -> DEBU 2b28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:52.995 UTC [policies] Evaluate -> DEBU 2b29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.995 UTC [cauthdsl] func1 -> DEBU 2b2a 0xc002e174f0 gate 1556789272995559700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.995 UTC [cauthdsl] func2 -> DEBU 2b2b 0xc002e174f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.995 UTC [cauthdsl] func2 -> DEBU 2b2c 0xc002e174f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.996 UTC [cauthdsl] func2 -> DEBU 2b2d 0xc002e174f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:52.996 UTC [cauthdsl] func2 -> DEBU 2b2e 0xc002e174f0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.996 UTC [cauthdsl] func1 -> DEBU 2b2f 0xc002e174f0 gate 1556789272995559700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:52.996 UTC [policies] Evaluate -> DEBU 2b30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.997 UTC [policies] Evaluate -> DEBU 2b31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:52.997 UTC [policies] Evaluate -> DEBU 2b32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:52.997 UTC [cauthdsl] func1 -> DEBU 2b33 0xc002e17ef0 gate 1556789272997487300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:52.997 UTC [cauthdsl] func2 -> DEBU 2b34 0xc002e17ef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:52.997 UTC [cauthdsl] func2 -> DEBU 2b35 0xc002e17ef0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:52.998 UTC [cauthdsl] func2 -> DEBU 2b36 0xc002e17ef0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.998 UTC [msp.identity] Verify -> DEBU 2b37 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:27:52.998 UTC [msp.identity] Verify -> DEBU 2b38 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:27:52.999 UTC [cauthdsl] func2 -> DEBU 2b39 0xc002e17ef0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:52.999 UTC [cauthdsl] func1 -> DEBU 2b3a 0xc002e17ef0 gate 1556789272997487300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:52.999 UTC [policies] Evaluate -> DEBU 2b3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.000 UTC [policies] Evaluate -> DEBU 2b3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.000 UTC [policies] Evaluate -> DEBU 2b3d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.000 UTC [policies] Evaluate -> DEBU 2b3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.000 UTC [msp] DeserializeIdentity -> DEBU 2b3f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.001 UTC [gossip.gossip] handleMessage -> DEBU 2b40 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.005 UTC [msp] DeserializeIdentity -> DEBU 2b41 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.006 UTC [msp] DeserializeIdentity -> DEBU 2b42 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.006 UTC [gossip.pull] Hello -> DEBU 2b43 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:53.006 UTC [msp] DeserializeIdentity -> DEBU 2b44 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.007 UTC [msp] DeserializeIdentity -> DEBU 2b45 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.007 UTC [gossip.comm] Send -> DEBU 2b46 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.007 UTC [gossip.comm] sendToEndpoint -> DEBU 2b47 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.008 UTC [gossip.comm] sendToEndpoint -> DEBU 2b48 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.010 UTC [gossip.gossip] handleMessage -> DEBU 2b49 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15349309374599361185 , Msg_type: BLOCK_MSG, digests: [3 4 5 6 7 8 2 1], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.011 UTC [gossip.pull] HandleMessage -> DEBU 2b4a GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15349309374599361185 , Msg_type: BLOCK_MSG, digests: [3 4 5 6 7 8 2 1], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.011 UTC [gossip.gossip] handleMessage -> DEBU 2b4b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.099 UTC [gossip.gossip] handleMessage -> DEBU 2b4c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.100 UTC [gossip.pull] Hello -> DEBU 2b4d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:53.100 UTC [gossip.pull] HandleMessage -> DEBU 2b4e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.101 UTC [gossip.pull] SendDigest -> DEBU 2b4f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:53.101 UTC [gossip.gossip] handleMessage -> DEBU 2b50 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.comm] Send -> DEBU 2b51 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.pull] Hello -> DEBU 2b52 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.comm] Send -> DEBU 2b53 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.comm] sendToEndpoint -> DEBU 2b54 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.comm] sendToEndpoint -> DEBU 2b55 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.103 UTC [gossip.comm] sendToEndpoint -> DEBU 2b56 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.103 UTC [gossip.comm] sendToEndpoint -> DEBU 2b57 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.102 UTC [gossip.pull] Hello -> DEBU 2b58 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:53.104 UTC [gossip.comm] Send -> DEBU 2b59 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.106 UTC [gossip.gossip] handleMessage -> DEBU 2b5a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7835840832422763451 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.106 UTC [gossip.pull] HandleMessage -> DEBU 2b5b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7835840832422763451 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.106 UTC [gossip.gossip] handleMessage -> DEBU 2b5c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2b5d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.107 UTC [gossip.gossip] handleMessage -> DEBU 2b5e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4201595857500789673 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.107 UTC [gossip.pull] HandleMessage -> DEBU 2b5f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4201595857500789673 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.108 UTC [gossip.gossip] handleMessage -> DEBU 2b60 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2b61 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.114 UTC [gossip.comm] func1 -> DEBU 2b62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17072324767179249031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.114 UTC [gossip.gossip] handleMessage -> DEBU 2b63 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17072324767179249031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.115 UTC [gossip.pull] HandleMessage -> DEBU 2b64 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17072324767179249031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.115 UTC [gossip.gossip] handleMessage -> DEBU 2b65 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.119 UTC [gossip.gossip] handleMessage -> DEBU 2b66 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.119 UTC [gossip.gossip] handleMessage -> DEBU 2b67 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.120 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b69 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.120 UTC [msp.identity] Verify -> DEBU 2b6a Verify: digest = 00000000 c3 26 b9 f7 ff 1b f2 49 c1 e6 ad 8c 4b 38 97 b3 |.&.....I....K8..| +peer0.org1.example.com | 00000010 c5 e3 22 e3 72 57 43 5d 3f 87 d2 47 cc fe 50 d3 |..".rWC]?..G..P.|" +peer0.org1.example.com | "2019-05-02 09:27:53.120 UTC [msp.identity] Verify -> DEBU 2b6b Verify: sig = 00000000 30 45 02 21 00 bd bb e9 66 0a cb e8 79 d0 17 22 |0E.!....f...y.."| +peer0.org1.example.com | 00000010 48 7d 01 9b ae b9 d2 62 4f a6 b6 f5 90 36 f1 b2 |H}.....bO....6..| +peer0.org1.example.com | 00000020 40 db b1 27 7b 02 20 52 55 7c 4a be de 05 31 6f |@..'{. RU|J...1o| +peer0.org1.example.com | 00000030 a1 bb 0d 64 7e ab bb fe af 87 d6 01 83 2a 3e 6f |...d~........*>o| +peer0.org1.example.com | 00000040 33 19 d2 04 61 37 7a |3...a7z|" +peer0.org1.example.com | "2019-05-02 09:27:53.121 UTC [msp.identity] Verify -> DEBU 2b6c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:53.122 UTC [msp.identity] Verify -> DEBU 2b6d Verify: sig = 00000000 30 45 02 21 00 9d 65 6d 7f 52 4d f0 0d da 17 96 |0E.!..em.RM.....| +peer0.org1.example.com | 00000010 18 3d 48 25 85 ca 9b b8 3b ee 4b 9b 8b b3 f0 dd |.=H%....;.K.....| +peer0.org1.example.com | 00000020 82 7c d8 26 55 02 20 54 f4 de 62 3a 11 23 31 57 |.|.&U. T..b:.#1W| +peer0.org1.example.com | 00000030 9b 56 72 0b 25 89 da 3a fe 0d 8c 25 94 d6 91 ad |.Vr.%..:...%....| +peer0.org1.example.com | 00000040 a9 4f d1 7f c4 18 37 |.O....7|" +peer0.org1.example.com | "2019-05-02 09:27:53.123 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b6e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.123 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b6f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:53.127 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b70 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 " +peer0.org1.example.com | "2019-05-02 09:27:53.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b71 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 " +peer0.org1.example.com | "2019-05-02 09:27:53.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b72 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:53.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b73 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.129 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b74 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.140 UTC [gossip.discovery] sendMemResponse -> DEBU 2b75 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:53.141 UTC [msp] DeserializeIdentity -> DEBU 2b76 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.142 UTC [msp] DeserializeIdentity -> DEBU 2b77 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.143 UTC [gossip.comm] Send -> DEBU 2b78 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.143 UTC [gossip.discovery] sendMemResponse -> DEBU 2b79 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:53.146 UTC [gossip.comm] sendToEndpoint -> DEBU 2b7a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.146 UTC [gossip.comm] sendToEndpoint -> DEBU 2b7b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.148 UTC [msp.identity] Sign -> DEBU 2b7c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101D " +peer0.org1.example.com | "2019-05-02 09:27:53.148 UTC [msp.identity] Sign -> DEBU 2b7d Sign: digest: 3467A9C1608A1F692B5BFA73C18A48C458F06FECEAA4FE00F7B6405167B2D245 " +peer0.org1.example.com | "2019-05-02 09:27:53.149 UTC [msp.identity] Sign -> DEBU 2b7e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:53.149 UTC [msp.identity] Sign -> DEBU 2b7f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:53.150 UTC [msp] DeserializeIdentity -> DEBU 2b80 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.151 UTC [gossip.comm] Send -> DEBU 2b81 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.151 UTC [msp] DeserializeIdentity -> DEBU 2b82 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.152 UTC [gossip.comm] Send -> DEBU 2b83 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.152 UTC [gossip.comm] Send -> DEBU 2b84 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.153 UTC [gossip.comm] sendToEndpoint -> DEBU 2b85 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.153 UTC [gossip.comm] sendToEndpoint -> DEBU 2b86 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.154 UTC [gossip.comm] sendToEndpoint -> DEBU 2b87 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.154 UTC [gossip.comm] sendToEndpoint -> DEBU 2b88 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b89 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.158 UTC [gossip.gossip] handleMessage -> DEBU 2b8c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.162 UTC [gossip.gossip] handleMessage -> DEBU 2b8d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.162 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b8f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.163 UTC [msp.identity] Verify -> DEBU 2b90 Verify: digest = 00000000 34 67 a9 c1 60 8a 1f 69 2b 5b fa 73 c1 8a 48 c4 |4g..`..i+[.s..H.| +peer0.org1.example.com | 00000010 58 f0 6f ec ea a4 fe 00 f7 b6 40 51 67 b2 d2 45 |X.o.......@Qg..E|" +peer0.org1.example.com | "2019-05-02 09:27:53.163 UTC [msp.identity] Verify -> DEBU 2b91 Verify: sig = 00000000 30 45 02 21 00 aa b6 bb 74 0c 56 31 5d 95 0e 14 |0E.!....t.V1]...| +peer0.org1.example.com | 00000010 61 c5 a7 ee 06 0d ca 6a 90 2c a2 03 02 9e 1a b1 |a......j.,......| +peer0.org1.example.com | 00000020 41 53 e7 da d5 02 20 68 55 e0 86 6e b3 4c 88 25 |AS.... hU..n.L.%| +peer0.org1.example.com | 00000030 05 a7 48 e3 07 4d 31 83 8a fb f7 e3 25 45 8f 8d |..H..M1.....%E..| +peer0.org1.example.com | 00000040 18 e7 98 e3 64 67 d5 |....dg.|" +peer0.org1.example.com | "2019-05-02 09:27:53.164 UTC [msp.identity] Verify -> DEBU 2b92 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:53.164 UTC [msp.identity] Verify -> DEBU 2b93 Verify: sig = 00000000 30 45 02 21 00 94 43 3a f2 d3 fc 95 92 6f 85 b2 |0E.!..C:.....o..| +peer0.org1.example.com | 00000010 5e 7d 68 b7 dc 0b 91 0a 0c d9 73 a2 80 92 e9 34 |^}h.......s....4| +peer0.org1.example.com | 00000020 d4 6a fc 8c f9 02 20 6b a9 94 18 6f 77 4a 59 84 |.j.... k...owJY.| +peer0.org1.example.com | 00000030 58 51 df d4 5f 6c c0 d7 24 77 42 3e ba 88 3f e5 |XQ.._l..$wB>..?.| +peer0.org1.example.com | 00000040 c6 b7 2b c8 ff b4 f8 |..+....|" +peer0.org1.example.com | "2019-05-02 09:27:53.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.165 UTC [gossip.discovery] isSentByMe -> DEBU 2b95 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b96 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b97 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.170 UTC [gossip.comm] func1 -> DEBU 2b98 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.170 UTC [gossip.gossip] handleMessage -> DEBU 2b99 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.170 UTC [gossip.gossip] handleMessage -> DEBU 2b9a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b9b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b9c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.171 UTC [msp] DeserializeIdentity -> DEBU 2b9d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.172 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:53.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:53.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:53.173 UTC [policies] Evaluate -> DEBU 2ba1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.173 UTC [policies] Evaluate -> DEBU 2ba2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:53.175 UTC [policies] Evaluate -> DEBU 2ba3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.175 UTC [cauthdsl] func1 -> DEBU 2ba4 0xc002c75ca0 gate 1556789273175513400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:53.175 UTC [cauthdsl] func2 -> DEBU 2ba5 0xc002c75ca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [cauthdsl] func2 -> DEBU 2ba6 0xc002c75ca0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [cauthdsl] func2 -> DEBU 2ba7 0xc002c75ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [cauthdsl] func2 -> DEBU 2ba8 0xc002c75ca0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [cauthdsl] func1 -> DEBU 2ba9 0xc002c75ca0 gate 1556789273175513400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [policies] Evaluate -> DEBU 2baa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.176 UTC [policies] Evaluate -> DEBU 2bab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.188 UTC [policies] Evaluate -> DEBU 2bac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.193 UTC [cauthdsl] func1 -> DEBU 2bad 0xc002c424e0 gate 1556789273193434500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:53.193 UTC [cauthdsl] func2 -> DEBU 2bae 0xc002c424e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:53.194 UTC [cauthdsl] func2 -> DEBU 2baf 0xc002c424e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:53.194 UTC [cauthdsl] func2 -> DEBU 2bb0 0xc002c424e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:53.194 UTC [msp.identity] Verify -> DEBU 2bb1 Verify: digest = 00000000 28 f5 bc 9a a9 eb 67 06 76 5d 72 15 6f cf a1 3e |(.....g.v]r.o..>| +peer0.org1.example.com | 00000010 85 1b b0 eb e3 d4 cc 0e 5a f4 06 64 63 92 02 34 |........Z..dc..4|" +peer0.org1.example.com | "2019-05-02 09:27:53.195 UTC [msp.identity] Verify -> DEBU 2bb2 Verify: sig = 00000000 30 44 02 20 32 d2 b7 c8 6e 29 a4 89 28 8b be 7e |0D. 2...n)..(..~| +peer0.org1.example.com | 00000010 9a dc ea 69 b8 b2 2e c0 86 5e 35 8d bb da 6a b7 |...i.....^5...j.| +peer0.org1.example.com | 00000020 fc 52 5d 4e 02 20 22 43 71 fd e3 71 47 8b ce 31 |.R]N. "Cq..qG..1| +peer0.org1.example.com | 00000030 ff 74 f0 ac 69 46 c8 b1 d0 69 19 ac ee b1 2b 6c |.t..iF...i....+l| +peer0.org1.example.com | 00000040 4f 21 b8 78 20 06 |O!.x .|" +peer0.org1.example.com | "2019-05-02 09:27:53.195 UTC [cauthdsl] func2 -> DEBU 2bb3 0xc002c424e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:53.195 UTC [cauthdsl] func1 -> DEBU 2bb4 0xc002c424e0 gate 1556789273193434500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bb9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bba Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.197 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bbb Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.197 UTC [msp.identity] Verify -> DEBU 2bbc Verify: digest = 00000000 34 67 a9 c1 60 8a 1f 69 2b 5b fa 73 c1 8a 48 c4 |4g..`..i+[.s..H.| +peer0.org1.example.com | 00000010 58 f0 6f ec ea a4 fe 00 f7 b6 40 51 67 b2 d2 45 |X.o.......@Qg..E|" +peer0.org1.example.com | "2019-05-02 09:27:53.197 UTC [msp.identity] Verify -> DEBU 2bbd Verify: sig = 00000000 30 45 02 21 00 aa b6 bb 74 0c 56 31 5d 95 0e 14 |0E.!....t.V1]...| +peer0.org1.example.com | 00000010 61 c5 a7 ee 06 0d ca 6a 90 2c a2 03 02 9e 1a b1 |a......j.,......| +peer0.org1.example.com | 00000020 41 53 e7 da d5 02 20 68 55 e0 86 6e b3 4c 88 25 |AS.... hU..n.L.%| +peer0.org1.example.com | 00000030 05 a7 48 e3 07 4d 31 83 8a fb f7 e3 25 45 8f 8d |..H..M1.....%E..| +peer0.org1.example.com | 00000040 18 e7 98 e3 64 67 d5 |....dg.|" +peer0.org1.example.com | "2019-05-02 09:27:53.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bbe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.198 UTC [gossip.discovery] isSentByMe -> DEBU 2bbf Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bc0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bc1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.200 UTC [msp.identity] Verify -> DEBU 2bc2 Verify: digest = 00000000 c3 26 b9 f7 ff 1b f2 49 c1 e6 ad 8c 4b 38 97 b3 |.&.....I....K8..| +peer0.org1.example.com | 00000010 c5 e3 22 e3 72 57 43 5d 3f 87 d2 47 cc fe 50 d3 |..".rWC]?..G..P.|" +peer0.org1.example.com | "2019-05-02 09:27:53.200 UTC [msp.identity] Verify -> DEBU 2bc3 Verify: sig = 00000000 30 45 02 21 00 bd bb e9 66 0a cb e8 79 d0 17 22 |0E.!....f...y.."| +peer0.org1.example.com | 00000010 48 7d 01 9b ae b9 d2 62 4f a6 b6 f5 90 36 f1 b2 |H}.....bO....6..| +peer0.org1.example.com | 00000020 40 db b1 27 7b 02 20 52 55 7c 4a be de 05 31 6f |@..'{. RU|J...1o| +peer0.org1.example.com | 00000030 a1 bb 0d 64 7e ab bb fe af 87 d6 01 83 2a 3e 6f |...d~........*>o| +peer0.org1.example.com | 00000040 33 19 d2 04 61 37 7a |3...a7z|" +peer0.org1.example.com | "2019-05-02 09:27:53.201 UTC [gossip.gossip] handleMessage -> DEBU 2bc4 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.206 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bc5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.207 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bc6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bc7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.208 UTC [gossip.gossip] handleMessage -> DEBU 2bc8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.208 UTC [gossip.gossip] handleMessage -> DEBU 2bc9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.209 UTC [gossip.pull] HandleMessage -> DEBU 2bca GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.209 UTC [msp] DeserializeIdentity -> DEBU 2bcb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.210 UTC [msp] DeserializeIdentity -> DEBU 2bcc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.211 UTC [msp] DeserializeIdentity -> DEBU 2bcd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.211 UTC [msp] DeserializeIdentity -> DEBU 2bce Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.211 UTC [msp] DeserializeIdentity -> DEBU 2bcf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.212 UTC [msp] DeserializeIdentity -> DEBU 2bd0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.212 UTC [gossip.pull] SendDigest -> DEBU 2bd1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:53.212 UTC [gossip.gossip] handleMessage -> DEBU 2bd2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.212 UTC [gossip.gossip] handleMessage -> DEBU 2bd3 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.221 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bd5 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.225 UTC [msp.identity] Verify -> DEBU 2bd6 Verify: digest = 00000000 c3 26 b9 f7 ff 1b f2 49 c1 e6 ad 8c 4b 38 97 b3 |.&.....I....K8..| +peer0.org1.example.com | 00000010 c5 e3 22 e3 72 57 43 5d 3f 87 d2 47 cc fe 50 d3 |..".rWC]?..G..P.|" +peer0.org1.example.com | "2019-05-02 09:27:53.226 UTC [msp.identity] Verify -> DEBU 2bd8 Verify: sig = 00000000 30 45 02 21 00 bd bb e9 66 0a cb e8 79 d0 17 22 |0E.!....f...y.."| +peer0.org1.example.com | 00000010 48 7d 01 9b ae b9 d2 62 4f a6 b6 f5 90 36 f1 b2 |H}.....bO....6..| +peer0.org1.example.com | 00000020 40 db b1 27 7b 02 20 52 55 7c 4a be de 05 31 6f |@..'{. RU|J...1o| +peer0.org1.example.com | 00000030 a1 bb 0d 64 7e ab bb fe af 87 d6 01 83 2a 3e 6f |...d~........*>o| +peer0.org1.example.com | 00000040 33 19 d2 04 61 37 7a |3...a7z|" +peer0.org1.example.com | "2019-05-02 09:27:53.225 UTC [gossip.comm] func1 -> DEBU 2bd7 Got message: GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.230 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.231 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bda Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.231 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bdb Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.232 UTC [msp.identity] Verify -> DEBU 2bdc Verify: digest = 00000000 34 67 a9 c1 60 8a 1f 69 2b 5b fa 73 c1 8a 48 c4 |4g..`..i+[.s..H.| +peer0.org1.example.com | 00000010 58 f0 6f ec ea a4 fe 00 f7 b6 40 51 67 b2 d2 45 |X.o.......@Qg..E|" +peer0.org1.example.com | "2019-05-02 09:27:53.232 UTC [msp.identity] Verify -> DEBU 2bdd Verify: sig = 00000000 30 45 02 21 00 aa b6 bb 74 0c 56 31 5d 95 0e 14 |0E.!....t.V1]...| +peer0.org1.example.com | 00000010 61 c5 a7 ee 06 0d ca 6a 90 2c a2 03 02 9e 1a b1 |a......j.,......| +peer0.org1.example.com | 00000020 41 53 e7 da d5 02 20 68 55 e0 86 6e b3 4c 88 25 |AS.... hU..n.L.%| +peer0.org1.example.com | 00000030 05 a7 48 e3 07 4d 31 83 8a fb f7 e3 25 45 8f 8d |..H..M1.....%E..| +peer0.org1.example.com | 00000040 18 e7 98 e3 64 67 d5 |....dg.|" +peer0.org1.example.com | "2019-05-02 09:27:53.232 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bde Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.233 UTC [gossip.discovery] isSentByMe -> DEBU 2bdf Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.233 UTC [gossip.discovery] handleAliveMessage -> DEBU 2be0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.233 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2be1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.233 UTC [msp] DeserializeIdentity -> DEBU 2be2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.234 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2be3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:53.234 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:53.235 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:53.235 UTC [policies] Evaluate -> DEBU 2be6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.235 UTC [policies] Evaluate -> DEBU 2be7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:53.236 UTC [policies] Evaluate -> DEBU 2be8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.236 UTC [cauthdsl] func1 -> DEBU 2be9 0xc002808ed0 gate 1556789273236414500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:53.236 UTC [cauthdsl] func2 -> DEBU 2bea 0xc002808ed0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:53.236 UTC [cauthdsl] func2 -> DEBU 2beb 0xc002808ed0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:53.237 UTC [cauthdsl] func2 -> DEBU 2bec 0xc002808ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:53.237 UTC [cauthdsl] func2 -> DEBU 2bed 0xc002808ed0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:53.238 UTC [cauthdsl] func1 -> DEBU 2bee 0xc002808ed0 gate 1556789273236414500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:53.241 UTC [policies] Evaluate -> DEBU 2bef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.241 UTC [policies] Evaluate -> DEBU 2bf0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.242 UTC [policies] Evaluate -> DEBU 2bf1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.242 UTC [cauthdsl] func1 -> DEBU 2bf2 0xc002809710 gate 1556789273242201000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:53.242 UTC [cauthdsl] func2 -> DEBU 2bf3 0xc002809710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:53.243 UTC [cauthdsl] func2 -> DEBU 2bf4 0xc002809710 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:53.243 UTC [cauthdsl] func2 -> DEBU 2bf5 0xc002809710 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:53.243 UTC [msp.identity] Verify -> DEBU 2bf6 Verify: digest = 00000000 aa dd c4 28 04 7b e8 7f ee 60 d5 11 ef d5 b6 9c |...(.{...`......| +peer0.org1.example.com | 00000010 05 1a 30 65 4e 65 1c 84 8e 73 63 5c b3 7a b3 3c |..0eNe...sc\.z.<|" +peer0.org1.example.com | "2019-05-02 09:27:53.244 UTC [msp.identity] Verify -> DEBU 2bf7 Verify: sig = 00000000 30 44 02 20 31 36 16 86 3a 1f 47 9b ed ee e2 8e |0D. 16..:.G.....| +peer0.org1.example.com | 00000010 87 e8 03 8d 95 10 41 0b d6 15 bb 6e cd dd d1 8d |......A....n....| +peer0.org1.example.com | 00000020 0a 13 f0 6e 02 20 10 6a 41 fb 11 d0 f2 35 21 c9 |...n. .jA....5!.| +peer0.org1.example.com | 00000030 b8 08 64 ac 50 cf b1 7d eb 21 f9 f2 f0 ee a6 ce |..d.P..}.!......| +peer0.org1.example.com | 00000040 72 8c e1 c3 66 83 |r...f.|" +peer0.org1.example.com | "2019-05-02 09:27:53.245 UTC [cauthdsl] func2 -> DEBU 2bf8 0xc002809710 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:53.245 UTC [cauthdsl] func1 -> DEBU 2bf9 0xc002809710 gate 1556789273242201000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:53.245 UTC [policies] Evaluate -> DEBU 2bfa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.245 UTC [policies] Evaluate -> DEBU 2bfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.246 UTC [policies] Evaluate -> DEBU 2bfc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.246 UTC [policies] Evaluate -> DEBU 2bfd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.246 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bfe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.248 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bff Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.248 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c00 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.248 UTC [gossip.gossip] handleMessage -> DEBU 2c01 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.248 UTC [gossip.gossip] handleMessage -> DEBU 2c02 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.248 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c03 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.249 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c04 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.252 UTC [msp] DeserializeIdentity -> DEBU 2c05 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:53.253 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c07 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:53.253 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c08 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:53.253 UTC [policies] Evaluate -> DEBU 2c09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.253 UTC [policies] Evaluate -> DEBU 2c0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:53.253 UTC [policies] Evaluate -> DEBU 2c0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.254 UTC [cauthdsl] func1 -> DEBU 2c0c 0xc0027c7540 gate 1556789273254075400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:53.254 UTC [cauthdsl] func2 -> DEBU 2c0d 0xc0027c7540 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:53.254 UTC [cauthdsl] func2 -> DEBU 2c0e 0xc0027c7540 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:53.254 UTC [cauthdsl] func2 -> DEBU 2c0f 0xc0027c7540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:53.255 UTC [cauthdsl] func2 -> DEBU 2c10 0xc0027c7540 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:53.255 UTC [cauthdsl] func1 -> DEBU 2c11 0xc0027c7540 gate 1556789273254075400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:53.255 UTC [policies] Evaluate -> DEBU 2c12 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.255 UTC [policies] Evaluate -> DEBU 2c13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.255 UTC [policies] Evaluate -> DEBU 2c14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.256 UTC [cauthdsl] func1 -> DEBU 2c15 0xc0027c7d80 gate 1556789273256226800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:53.256 UTC [cauthdsl] func2 -> DEBU 2c16 0xc0027c7d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:53.256 UTC [cauthdsl] func2 -> DEBU 2c17 0xc0027c7d80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:53.256 UTC [cauthdsl] func2 -> DEBU 2c18 0xc0027c7d80 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:53.256 UTC [msp.identity] Verify -> DEBU 2c19 Verify: digest = 00000000 54 60 c8 b5 48 bf a9 92 d6 f5 15 1c 36 e5 1c 30 |T`..H.......6..0| +peer0.org1.example.com | 00000010 74 f9 d3 c3 8c ba b2 28 3b 5c 36 b2 4d a2 93 56 |t......(;\6.M..V|" +peer0.org1.example.com | "2019-05-02 09:27:53.257 UTC [msp.identity] Verify -> DEBU 2c1a Verify: sig = 00000000 30 44 02 20 70 3b bb 6a 4a 62 d2 53 e1 44 1a 93 |0D. p;.jJb.S.D..| +peer0.org1.example.com | 00000010 da e5 2d b3 d6 d4 3a 51 a7 2e f5 6a 76 63 a8 94 |..-...:Q...jvc..| +peer0.org1.example.com | 00000020 22 17 96 38 02 20 41 91 02 39 c3 49 b7 b6 17 7f |"..8. A..9.I....| +peer0.org1.example.com | 00000030 ee 72 5e e2 1e 60 66 3a b2 9a ee 48 ca c4 b8 19 |.r^..`f:...H....| +peer0.org1.example.com | 00000040 05 98 3a 77 9d 60 |..:w.`|" +peer0.org1.example.com | "2019-05-02 09:27:53.257 UTC [cauthdsl] func2 -> DEBU 2c1b 0xc0027c7d80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:53.258 UTC [cauthdsl] func1 -> DEBU 2c1c 0xc0027c7d80 gate 1556789273256226800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:53.258 UTC [policies] Evaluate -> DEBU 2c1d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.258 UTC [policies] Evaluate -> DEBU 2c1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.259 UTC [policies] Evaluate -> DEBU 2c1f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.259 UTC [policies] Evaluate -> DEBU 2c20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.259 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c21 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.260 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c22 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:53.260 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c23 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 " +peer0.org1.example.com | "2019-05-02 09:27:53.261 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c24 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 " +peer0.org1.example.com | "2019-05-02 09:27:53.262 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c25 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:53.263 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c26 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.263 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c27 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.263 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c28 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.263 UTC [gossip.discovery] sendMemResponse -> DEBU 2c29 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:53.264 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.264 UTC [msp] DeserializeIdentity -> DEBU 2c2c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.265 UTC [msp] DeserializeIdentity -> DEBU 2c2d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.265 UTC [msp] DeserializeIdentity -> DEBU 2c2e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.265 UTC [gossip.comm] Send -> DEBU 2c2f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.264 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c2a Got message: GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.267 UTC [gossip.discovery] sendMemResponse -> DEBU 2c30 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:53.268 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c31 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.267 UTC [gossip.comm] sendToEndpoint -> DEBU 2c32 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.270 UTC [msp] DeserializeIdentity -> DEBU 2c33 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.271 UTC [gossip.comm] sendToEndpoint -> DEBU 2c34 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.272 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c35 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:53.273 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c36 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:53.273 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c37 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:53.273 UTC [policies] Evaluate -> DEBU 2c38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.276 UTC [policies] Evaluate -> DEBU 2c39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:53.276 UTC [policies] Evaluate -> DEBU 2c3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.276 UTC [cauthdsl] func1 -> DEBU 2c3b 0xc002614b10 gate 1556789273276304000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:53.276 UTC [cauthdsl] func2 -> DEBU 2c3c 0xc002614b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:53.277 UTC [cauthdsl] func2 -> DEBU 2c3d 0xc002614b10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:53.277 UTC [cauthdsl] func2 -> DEBU 2c3e 0xc002614b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:53.277 UTC [cauthdsl] func2 -> DEBU 2c3f 0xc002614b10 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [cauthdsl] func1 -> DEBU 2c40 0xc002614b10 gate 1556789273276304000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [policies] Evaluate -> DEBU 2c41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [policies] Evaluate -> DEBU 2c42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [policies] Evaluate -> DEBU 2c43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [cauthdsl] func1 -> DEBU 2c44 0xc002615350 gate 1556789273278938200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:53.278 UTC [cauthdsl] func2 -> DEBU 2c45 0xc002615350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:53.279 UTC [cauthdsl] func2 -> DEBU 2c46 0xc002615350 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [cauthdsl] func2 -> DEBU 2c47 0xc002615350 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [msp.identity] Verify -> DEBU 2c48 Verify: digest = 00000000 80 94 d8 5e f1 18 0f 6d 05 9e cc e7 c7 2d 7e a5 |...^...m.....-~.| +peer0.org1.example.com | 00000010 c1 d3 e9 bc 57 95 dd a7 b2 a5 6c 34 c4 86 c8 df |....W.....l4....|" +peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [msp.identity] Verify -> DEBU 2c49 Verify: sig = 00000000 30 45 02 21 00 b1 c9 4e 4b 22 bf 7d a5 b2 4a 33 |0E.!...NK".}..J3| +peer0.org1.example.com | 00000010 60 f0 8e ea 40 06 73 24 ee 8d a0 ff 9f 3f 28 69 |`...@.s$.....?(i| +peer0.org1.example.com | 00000020 06 0b a6 80 15 02 20 25 45 22 66 5f 08 ad 02 7f |...... %E"f_....| +peer0.org1.example.com | 00000030 d5 e2 8c 7f 52 06 3b 31 fd 48 ab 0b 8f 83 b0 cd |....R.;1.H......| +peer0.org1.example.com | 00000040 16 81 d6 f0 66 8b 5d |....f.]|" +peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [cauthdsl] func2 -> DEBU 2c4a 0xc002615350 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [cauthdsl] func1 -> DEBU 2c4b 0xc002615350 gate 1556789273278938200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:53.280 UTC [policies] Evaluate -> DEBU 2c4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.281 UTC [policies] Evaluate -> DEBU 2c4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.281 UTC [policies] Evaluate -> DEBU 2c4e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.281 UTC [policies] Evaluate -> DEBU 2c4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.281 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c50 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.281 UTC [gossip.discovery] sendMemResponse -> DEBU 2c51 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:53.282 UTC [msp] DeserializeIdentity -> DEBU 2c52 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.286 UTC [msp] DeserializeIdentity -> DEBU 2c53 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.286 UTC [msp] DeserializeIdentity -> DEBU 2c54 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.286 UTC [gossip.comm] Send -> DEBU 2c55 Entering, sending GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.287 UTC [gossip.discovery] sendMemResponse -> DEBU 2c56 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:53.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2c57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2c58 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.810 UTC [gossip.comm] func1 -> DEBU 2c59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.810 UTC [gossip.gossip] handleMessage -> DEBU 2c5a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.812 UTC [gossip.gossip] handleMessage -> DEBU 2c5b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.812 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.813 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c5d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:53.813 UTC [msp] DeserializeIdentity -> DEBU 2c5e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.814 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c5f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:53.814 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c60 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:53.814 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c61 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:53.814 UTC [policies] Evaluate -> DEBU 2c62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.815 UTC [policies] Evaluate -> DEBU 2c63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:53.815 UTC [policies] Evaluate -> DEBU 2c64 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.816 UTC [cauthdsl] func1 -> DEBU 2c65 0xc0025d5bc0 gate 1556789273816100700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:53.816 UTC [cauthdsl] func2 -> DEBU 2c66 0xc0025d5bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:53.816 UTC [cauthdsl] func2 -> DEBU 2c67 0xc0025d5bc0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:53.817 UTC [cauthdsl] func2 -> DEBU 2c68 0xc0025d5bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:53.818 UTC [cauthdsl] func2 -> DEBU 2c69 0xc0025d5bc0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:53.818 UTC [cauthdsl] func1 -> DEBU 2c6a 0xc0025d5bc0 gate 1556789273816100700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:53.818 UTC [policies] Evaluate -> DEBU 2c6b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.818 UTC [policies] Evaluate -> DEBU 2c6c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.818 UTC [policies] Evaluate -> DEBU 2c6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:53.819 UTC [cauthdsl] func1 -> DEBU 2c6e 0xc002566400 gate 1556789273818896100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:53.819 UTC [cauthdsl] func2 -> DEBU 2c6f 0xc002566400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:53.819 UTC [cauthdsl] func2 -> DEBU 2c70 0xc002566400 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:53.819 UTC [cauthdsl] func2 -> DEBU 2c71 0xc002566400 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:53.819 UTC [msp.identity] Verify -> DEBU 2c72 Verify: digest = 00000000 c7 ea 98 ae dd 49 1d c3 5a a2 59 45 cb 57 32 20 |.....I..Z.YE.W2 | +peer0.org1.example.com | 00000010 d2 d4 25 a2 07 34 34 fe 75 77 36 54 6a 69 81 0a |..%..44.uw6Tji..|" +peer0.org1.example.com | "2019-05-02 09:27:53.820 UTC [msp.identity] Verify -> DEBU 2c73 Verify: sig = 00000000 30 45 02 21 00 93 3d ca a3 f6 16 cd b9 de 79 77 |0E.!..=.......yw| +peer0.org1.example.com | 00000010 8d b6 bb 52 f5 4d 6f 89 5c c7 51 78 96 d9 ab 83 |...R.Mo.\.Qx....| +peer0.org1.example.com | 00000020 cf 22 be 6e 7c 02 20 06 66 14 b6 b1 c4 00 f4 16 |.".n|. .f.......| +peer0.org1.example.com | 00000030 23 7e a0 ec 4e 1b 34 c1 4a 26 71 63 b6 08 6e c2 |#~..N.4.J&qc..n.| +peer0.org1.example.com | 00000040 f7 3a 98 96 7e 4c dc |.:..~L.|" +peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [cauthdsl] func2 -> DEBU 2c74 0xc002566400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [cauthdsl] func1 -> DEBU 2c75 0xc002566400 gate 1556789273818896100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c76 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c78 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c79 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:53.822 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c7a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 " +peer0.org1.example.com | "2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 " +peer0.org1.example.com | "2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:53.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.823 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c80 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.823 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c81 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.823 UTC [msp] DeserializeIdentity -> DEBU 2c82 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.824 UTC [msp] DeserializeIdentity -> DEBU 2c83 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.824 UTC [msp] DeserializeIdentity -> DEBU 2c84 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.824 UTC [msp] DeserializeIdentity -> DEBU 2c86 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.825 UTC [msp] DeserializeIdentity -> DEBU 2c87 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.825 UTC [msp] DeserializeIdentity -> DEBU 2c88 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.825 UTC [msp] DeserializeIdentity -> DEBU 2c89 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.826 UTC [gossip.comm] Send -> DEBU 2c8a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.824 UTC [gossip.gossip] handleMessage -> DEBU 2c85 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.826 UTC [msp] DeserializeIdentity -> DEBU 2c8b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:53.826 UTC [gossip.gossip] handleMessage -> DEBU 2c8c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.826 UTC [gossip.comm] Send -> DEBU 2c8d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:53.826 UTC [gossip.gossip] handleMessage -> DEBU 2c8f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.827 UTC [gossip.comm] sendToEndpoint -> DEBU 2c8e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.827 UTC [gossip.comm] sendToEndpoint -> DEBU 2c90 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.827 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c91 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.828 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c92 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.828 UTC [gossip.comm] sendToEndpoint -> DEBU 2c93 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.828 UTC [gossip.comm] sendToEndpoint -> DEBU 2c94 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.828 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c95 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:53.829 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c96 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:53.829 UTC [gossip.gossip] handleMessage -> DEBU 2c97 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.045 UTC [msp.identity] Sign -> DEBU 2c98 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101E " +peer0.org1.example.com | "2019-05-02 09:27:54.045 UTC [msp.identity] Sign -> DEBU 2c99 Sign: digest: C6C4B52E1E86197CF13CA2D018E3C6F21F2242615E7EEAB488E7A883173577B1 " +peer0.org1.example.com | "2019-05-02 09:27:54.046 UTC [msp.identity] Sign -> DEBU 2c9a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:54.047 UTC [msp.identity] Sign -> DEBU 2c9b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:54.048 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2c9c Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:54.049 UTC [msp] DeserializeIdentity -> DEBU 2c9d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.049 UTC [msp] DeserializeIdentity -> DEBU 2c9e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.050 UTC [gossip.comm] Send -> DEBU 2c9f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:54.050 UTC [msp] DeserializeIdentity -> DEBU 2ca0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.050 UTC [gossip.comm] Send -> DEBU 2ca2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:54.050 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.051 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.051 UTC [msp] DeserializeIdentity -> DEBU 2ca4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.051 UTC [gossip.comm] Send -> DEBU 2ca5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:54.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.090 UTC [gossip.gossip] handleMessage -> DEBU 2caa Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.091 UTC [gossip.gossip] handleMessage -> DEBU 2cab Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.092 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.092 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2cad Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:54.093 UTC [msp.identity] Verify -> DEBU 2cae Verify: digest = 00000000 f2 5d 27 ab c1 e0 9c db 76 dd 3a a5 c4 05 82 ff |.]'.....v.:.....| +peer0.org1.example.com | 00000010 3f 52 39 a5 02 ed 24 c9 46 5c 66 5e 77 04 8f 58 |?R9...$.F\f^w..X|" +peer0.org1.example.com | "2019-05-02 09:27:54.093 UTC [msp.identity] Verify -> DEBU 2caf Verify: sig = 00000000 30 44 02 20 18 54 a2 d3 e8 a7 31 b7 f9 30 98 1b |0D. .T....1..0..| +peer0.org1.example.com | 00000010 f2 59 18 89 25 54 06 13 d8 90 be c1 c4 39 31 ae |.Y..%T.......91.| +peer0.org1.example.com | 00000020 29 f3 59 1d 02 20 15 4a 37 78 68 2a 09 d2 0e 7d |).Y.. .J7xh*...}| +peer0.org1.example.com | 00000030 4e 7c f1 5d df 3b 96 dd fb b9 2f 86 9b 3a 9c 90 |N|.].;..../..:..| +peer0.org1.example.com | 00000040 5e ed a8 23 31 e0 |^..#1.|" +peer0.org1.example.com | "2019-05-02 09:27:54.094 UTC [msp.identity] Verify -> DEBU 2cb0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:54.094 UTC [msp.identity] Verify -> DEBU 2cb1 Verify: sig = 00000000 30 45 02 21 00 9f be 4d b8 64 d0 91 c8 ac a4 46 |0E.!...M.d.....F| +peer0.org1.example.com | 00000010 bb cc c8 65 67 16 c4 02 6e f7 eb 94 ee 91 83 d8 |...eg...n.......| +peer0.org1.example.com | 00000020 d1 d5 04 09 ec 02 20 5e ab d7 67 1f 7d 80 07 c0 |...... ^..g.}...| +peer0.org1.example.com | 00000030 f6 6c 50 74 bf f0 24 c8 fc e4 b7 4f c3 5c b3 95 |.lPt..$....O.\..| +peer0.org1.example.com | 00000040 5f f4 10 29 bc f5 9f |_..)...|" +peer0.org1.example.com | "2019-05-02 09:27:54.095 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cb2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb4 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 " +peer0.org1.example.com | "2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 " +peer0.org1.example.com | "2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:54.096 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.096 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cb8 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.096 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cb9 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.100 UTC [gossip.gossip] handleMessage -> DEBU 2cba Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.100 UTC [gossip.gossip] handleMessage -> DEBU 2cbb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cbc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cbd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.101 UTC [gossip.comm] func1 -> DEBU 2cbe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.101 UTC [gossip.gossip] handleMessage -> DEBU 2cbf Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.101 UTC [gossip.gossip] handleMessage -> DEBU 2cc0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.101 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cc1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cc2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.104 UTC [msp] DeserializeIdentity -> DEBU 2cc3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.105 UTC [msp] DeserializeIdentity -> DEBU 2cc4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.105 UTC [msp] DeserializeIdentity -> DEBU 2cc5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.106 UTC [gossip.comm] Send -> DEBU 2cc6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:54.106 UTC [msp] DeserializeIdentity -> DEBU 2cc7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.107 UTC [gossip.comm] Send -> DEBU 2cc8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:54.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2cc9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2cca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2ccb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2ccc Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.169 UTC [gossip.gossip] handleMessage -> DEBU 2ccd Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.169 UTC [gossip.gossip] handleMessage -> DEBU 2cce Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ccf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.170 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2cd0 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:54.170 UTC [msp] DeserializeIdentity -> DEBU 2cd1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.171 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cd2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:54.171 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:54.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:54.172 UTC [policies] Evaluate -> DEBU 2cd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:54.173 UTC [policies] Evaluate -> DEBU 2cd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:54.173 UTC [policies] Evaluate -> DEBU 2cd7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:54.174 UTC [cauthdsl] func1 -> DEBU 2cd8 0xc0024489f0 gate 1556789274174389000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:54.175 UTC [cauthdsl] func2 -> DEBU 2cd9 0xc0024489f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:54.176 UTC [cauthdsl] func2 -> DEBU 2cda 0xc0024489f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:54.176 UTC [cauthdsl] func2 -> DEBU 2cdb 0xc0024489f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:54.177 UTC [cauthdsl] func2 -> DEBU 2cdc 0xc0024489f0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:54.179 UTC [gossip.gossip] handleMessage -> DEBU 2cdd Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.179 UTC [gossip.comm] func1 -> DEBU 2cde Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.180 UTC [cauthdsl] func1 -> DEBU 2cdf 0xc0024489f0 gate 1556789274174389000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:54.183 UTC [policies] Evaluate -> DEBU 2ce0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:54.183 UTC [policies] Evaluate -> DEBU 2ce1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:54.184 UTC [policies] Evaluate -> DEBU 2ce2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:54.184 UTC [cauthdsl] func1 -> DEBU 2ce3 0xc002449630 gate 1556789274184562900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:54.185 UTC [cauthdsl] func2 -> DEBU 2ce4 0xc002449630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:54.185 UTC [cauthdsl] func2 -> DEBU 2ce5 0xc002449630 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:54.186 UTC [cauthdsl] func2 -> DEBU 2ce6 0xc002449630 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:54.188 UTC [msp.identity] Verify -> DEBU 2ce7 Verify: digest = 00000000 cf 51 72 cc 05 64 23 d4 f6 e4 07 62 c5 6b fb 4f |.Qr..d#....b.k.O| +peer0.org1.example.com | 00000010 81 96 68 ce bf db 48 61 f6 2c 61 97 0b ad 2d b2 |..h...Ha.,a...-.|" +peer0.org1.example.com | "2019-05-02 09:27:54.188 UTC [msp.identity] Verify -> DEBU 2ce8 Verify: sig = 00000000 30 44 02 20 7b e9 0e fa 5e ce 6a d1 a3 0a 06 40 |0D. {...^.j....@| +peer0.org1.example.com | 00000010 de a2 77 4b 1a b9 bb df fb ba c2 f4 5c 93 73 09 |..wK........\.s.| +peer0.org1.example.com | 00000020 fa 23 9d 9f 02 20 77 7f 15 0e eb dc 36 c8 9b f8 |.#... w.....6...| +peer0.org1.example.com | 00000030 dc c0 6f f1 a2 79 86 4f c1 63 f1 64 e5 46 85 d9 |..o..y.O.c.d.F..| +peer0.org1.example.com | 00000040 d7 ed 9b 70 0c a6 |...p..|" +peer0.org1.example.com | "2019-05-02 09:27:54.189 UTC [cauthdsl] func2 -> DEBU 2ce9 0xc002449630 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:54.191 UTC [cauthdsl] func1 -> DEBU 2cea 0xc002449630 gate 1556789274184562900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:54.191 UTC [policies] Evaluate -> DEBU 2ceb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:54.191 UTC [policies] Evaluate -> DEBU 2cec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:54.192 UTC [policies] Evaluate -> DEBU 2ced Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:54.193 UTC [policies] Evaluate -> DEBU 2cee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:54.193 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cef Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:54.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf1 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 " +peer0.org1.example.com | "2019-05-02 09:27:54.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf2 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 " +peer0.org1.example.com | "2019-05-02 09:27:54.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:54.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cf5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cf6 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.199 UTC [gossip.gossip] handleMessage -> DEBU 2cf7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.200 UTC [gossip.gossip] handleMessage -> DEBU 2cf8 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.201 UTC [msp] DeserializeIdentity -> DEBU 2cf9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.201 UTC [msp] DeserializeIdentity -> DEBU 2cfa Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.202 UTC [msp] DeserializeIdentity -> DEBU 2cfb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.203 UTC [msp] DeserializeIdentity -> DEBU 2cfc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.204 UTC [msp] DeserializeIdentity -> DEBU 2cfd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.205 UTC [msp] DeserializeIdentity -> DEBU 2cfe Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.207 UTC [gossip.comm] Send -> DEBU 2cff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:54.208 UTC [msp] DeserializeIdentity -> DEBU 2d00 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.209 UTC [msp] DeserializeIdentity -> DEBU 2d01 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:54.209 UTC [gossip.comm] Send -> DEBU 2d02 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:54.209 UTC [gossip.comm] sendToEndpoint -> DEBU 2d03 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.209 UTC [gossip.comm] sendToEndpoint -> DEBU 2d04 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.210 UTC [gossip.comm] sendToEndpoint -> DEBU 2d05 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.210 UTC [gossip.comm] sendToEndpoint -> DEBU 2d06 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.199 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.219 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d08 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.221 UTC [gossip.gossip] handleMessage -> DEBU 2d09 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:54.223 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:54.223 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d0b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.247 UTC [msp] DeserializeIdentity -> DEBU 2d0c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.247 UTC [msp] DeserializeIdentity -> DEBU 2d0d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.247 UTC [gossip.comm] Send -> DEBU 2d0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d0f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d10 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d11 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d12 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d13 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d14 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.249 UTC [gossip.comm] func1 -> DEBU 2d15 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.249 UTC [gossip.gossip] handleMessage -> DEBU 2d16 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d17 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d18 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d19 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +peer0.org1.example.com | "2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d1a Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [msp] DeserializeIdentity -> DEBU 2d1b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [msp] DeserializeIdentity -> DEBU 2d1c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d1d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d1e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d1f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [policies] Evaluate -> DEBU 2d20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [policies] Evaluate -> DEBU 2d21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [policies] Evaluate -> DEBU 2d22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.251 UTC [cauthdsl] func1 -> DEBU 2d23 0xc002353440 gate 1556789276251913000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d24 0xc002353440 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d25 0xc002353440 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d26 0xc002353440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d27 0xc002353440 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func1 -> DEBU 2d28 0xc002353440 gate 1556789276251913000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [policies] Evaluate -> DEBU 2d29 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [policies] Evaluate -> DEBU 2d2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [policies] Evaluate -> DEBU 2d2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func1 -> DEBU 2d2c 0xc002353cd0 gate 1556789276252565300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d2d 0xc002353cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d2e 0xc002353cd0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d2f 0xc002353cd0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [msp.identity] Verify -> DEBU 2d30 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:27:56.252 UTC [msp.identity] Verify -> DEBU 2d31 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:27:56.257 UTC [cauthdsl] func2 -> DEBU 2d32 0xc002353cd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.257 UTC [cauthdsl] func1 -> DEBU 2d33 0xc002353cd0 gate 1556789276252565300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:56.258 UTC [policies] Evaluate -> DEBU 2d34 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.258 UTC [policies] Evaluate -> DEBU 2d35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.258 UTC [policies] Evaluate -> DEBU 2d36 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.259 UTC [policies] Evaluate -> DEBU 2d37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.259 UTC [msp] DeserializeIdentity -> DEBU 2d38 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.260 UTC [msp] DeserializeIdentity -> DEBU 2d39 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.260 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:56.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d3b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d3c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.261 UTC [policies] Evaluate -> DEBU 2d3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.261 UTC [policies] Evaluate -> DEBU 2d3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:56.261 UTC [policies] Evaluate -> DEBU 2d3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.262 UTC [cauthdsl] func1 -> DEBU 2d40 0xc0022546b0 gate 1556789276261784300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.262 UTC [cauthdsl] func2 -> DEBU 2d41 0xc0022546b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.262 UTC [cauthdsl] func2 -> DEBU 2d42 0xc0022546b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.263 UTC [cauthdsl] func2 -> DEBU 2d43 0xc0022546b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:56.263 UTC [cauthdsl] func2 -> DEBU 2d44 0xc0022546b0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.264 UTC [cauthdsl] func1 -> DEBU 2d45 0xc0022546b0 gate 1556789276261784300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [policies] Evaluate -> DEBU 2d46 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [policies] Evaluate -> DEBU 2d47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [policies] Evaluate -> DEBU 2d48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [cauthdsl] func1 -> DEBU 2d49 0xc002254f20 gate 1556789276265797700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [cauthdsl] func2 -> DEBU 2d4a 0xc002254f20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [cauthdsl] func2 -> DEBU 2d4b 0xc002254f20 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.265 UTC [cauthdsl] func2 -> DEBU 2d4c 0xc002254f20 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.266 UTC [msp.identity] Verify -> DEBU 2d4d Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:27:56.266 UTC [msp.identity] Verify -> DEBU 2d4e Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:27:56.268 UTC [cauthdsl] func2 -> DEBU 2d4f 0xc002254f20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.269 UTC [cauthdsl] func1 -> DEBU 2d50 0xc002254f20 gate 1556789276265797700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:56.269 UTC [policies] Evaluate -> DEBU 2d51 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.269 UTC [policies] Evaluate -> DEBU 2d52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.270 UTC [policies] Evaluate -> DEBU 2d53 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.271 UTC [policies] Evaluate -> DEBU 2d54 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.271 UTC [gossip.gossip] handleMessage -> DEBU 2d55 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.271 UTC [gossip.gossip] handleMessage -> DEBU 2d56 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.271 UTC [msp] DeserializeIdentity -> DEBU 2d57 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.271 UTC [msp] DeserializeIdentity -> DEBU 2d58 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.272 UTC [msp] DeserializeIdentity -> DEBU 2d59 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.273 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d5a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:56.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d5b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d5c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.275 UTC [policies] Evaluate -> DEBU 2d5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.276 UTC [policies] Evaluate -> DEBU 2d5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:56.276 UTC [policies] Evaluate -> DEBU 2d5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.277 UTC [cauthdsl] func1 -> DEBU 2d60 0xc002238bd0 gate 1556789276277150800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.277 UTC [cauthdsl] func2 -> DEBU 2d61 0xc002238bd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.278 UTC [cauthdsl] func2 -> DEBU 2d62 0xc002238bd0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.278 UTC [cauthdsl] func2 -> DEBU 2d63 0xc002238bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:56.278 UTC [cauthdsl] func2 -> DEBU 2d64 0xc002238bd0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.278 UTC [cauthdsl] func1 -> DEBU 2d65 0xc002238bd0 gate 1556789276277150800 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.279 UTC [policies] Evaluate -> DEBU 2d66 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.279 UTC [policies] Evaluate -> DEBU 2d67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.280 UTC [policies] Evaluate -> DEBU 2d68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.281 UTC [cauthdsl] func1 -> DEBU 2d69 0xc002239420 gate 1556789276280966900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.281 UTC [cauthdsl] func2 -> DEBU 2d6a 0xc002239420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.281 UTC [cauthdsl] func2 -> DEBU 2d6b 0xc002239420 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.281 UTC [cauthdsl] func2 -> DEBU 2d6c 0xc002239420 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.281 UTC [msp.identity] Verify -> DEBU 2d6d Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:27:56.282 UTC [msp.identity] Verify -> DEBU 2d6e Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [cauthdsl] func2 -> DEBU 2d6f 0xc002239420 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [cauthdsl] func1 -> DEBU 2d70 0xc002239420 gate 1556789276280966900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d71 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d72 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d73 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d74 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.283 UTC [msp.identity] Verify -> DEBU 2d75 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +peer0.org1.example.com | "2019-05-02 09:27:56.284 UTC [msp.identity] Verify -> DEBU 2d76 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +peer0.org1.example.com | "2019-05-02 09:27:56.284 UTC [msp.identity] Verify -> DEBU 2d77 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:27:56.284 UTC [msp.identity] Verify -> DEBU 2d78 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:27:56.285 UTC [msp] DeserializeIdentity -> DEBU 2d79 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.286 UTC [msp] DeserializeIdentity -> DEBU 2d7a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d7c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d7d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.287 UTC [policies] Evaluate -> DEBU 2d7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.287 UTC [policies] Evaluate -> DEBU 2d7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:56.287 UTC [policies] Evaluate -> DEBU 2d80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.287 UTC [cauthdsl] func1 -> DEBU 2d81 0xc002217a80 gate 1556789276287691700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.288 UTC [cauthdsl] func2 -> DEBU 2d82 0xc002217a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.288 UTC [cauthdsl] func2 -> DEBU 2d83 0xc002217a80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.288 UTC [cauthdsl] func2 -> DEBU 2d84 0xc002217a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d85 0xc002217a80 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func1 -> DEBU 2d86 0xc002217a80 gate 1556789276287691700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [policies] Evaluate -> DEBU 2d87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [policies] Evaluate -> DEBU 2d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [policies] Evaluate -> DEBU 2d89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func1 -> DEBU 2d8a 0xc002204480 gate 1556789276289635800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d8b 0xc002204480 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d8c 0xc002204480 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d8d 0xc002204480 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [msp.identity] Verify -> DEBU 2d8e Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:27:56.289 UTC [msp.identity] Verify -> DEBU 2d8f Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [cauthdsl] func2 -> DEBU 2d90 0xc002204480 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [cauthdsl] func1 -> DEBU 2d91 0xc002204480 gate 1556789276289635800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d94 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.291 UTC [gossip.gossip] handleMessage -> DEBU 2d96 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.292 UTC [gossip.gossip] handleMessage -> DEBU 2d97 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.292 UTC [msp] DeserializeIdentity -> DEBU 2d98 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.293 UTC [msp] DeserializeIdentity -> DEBU 2d99 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.293 UTC [msp] DeserializeIdentity -> DEBU 2d9a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.294 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:56.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d9c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.295 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d9d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.295 UTC [policies] Evaluate -> DEBU 2d9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.295 UTC [policies] Evaluate -> DEBU 2d9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:56.296 UTC [policies] Evaluate -> DEBU 2da0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.296 UTC [cauthdsl] func1 -> DEBU 2da1 0xc002205fb0 gate 1556789276296453500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.296 UTC [cauthdsl] func2 -> DEBU 2da2 0xc002205fb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.296 UTC [cauthdsl] func2 -> DEBU 2da3 0xc002205fb0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.296 UTC [cauthdsl] func2 -> DEBU 2da4 0xc002205fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:56.297 UTC [cauthdsl] func2 -> DEBU 2da5 0xc002205fb0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.297 UTC [cauthdsl] func1 -> DEBU 2da6 0xc002205fb0 gate 1556789276296453500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.297 UTC [policies] Evaluate -> DEBU 2da7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.297 UTC [policies] Evaluate -> DEBU 2da8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.297 UTC [policies] Evaluate -> DEBU 2da9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.298 UTC [cauthdsl] func1 -> DEBU 2daa 0xc0021c27f0 gate 1556789276298112300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.298 UTC [cauthdsl] func2 -> DEBU 2dab 0xc0021c27f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.298 UTC [cauthdsl] func2 -> DEBU 2dac 0xc0021c27f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.298 UTC [cauthdsl] func2 -> DEBU 2dad 0xc0021c27f0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.298 UTC [msp.identity] Verify -> DEBU 2dae Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:27:56.299 UTC [msp.identity] Verify -> DEBU 2daf Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:27:56.299 UTC [cauthdsl] func2 -> DEBU 2db0 0xc0021c27f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.299 UTC [cauthdsl] func1 -> DEBU 2db1 0xc0021c27f0 gate 1556789276298112300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:56.299 UTC [policies] Evaluate -> DEBU 2db2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.300 UTC [policies] Evaluate -> DEBU 2db3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.300 UTC [policies] Evaluate -> DEBU 2db4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.300 UTC [policies] Evaluate -> DEBU 2db5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.301 UTC [msp.identity] Verify -> DEBU 2db6 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +peer0.org1.example.com | "2019-05-02 09:27:56.301 UTC [msp.identity] Verify -> DEBU 2db7 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +peer0.org1.example.com | "2019-05-02 09:27:56.302 UTC [msp.identity] Verify -> DEBU 2db8 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:27:56.302 UTC [msp.identity] Verify -> DEBU 2db9 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [msp] DeserializeIdentity -> DEBU 2dba Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [msp] DeserializeIdentity -> DEBU 2dbb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2dbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dbd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dbe Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.303 UTC [policies] Evaluate -> DEBU 2dbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.304 UTC [policies] Evaluate -> DEBU 2dc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:56.304 UTC [policies] Evaluate -> DEBU 2dc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.305 UTC [cauthdsl] func1 -> DEBU 2dc2 0xc00218af00 gate 1556789276305004400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc00218af00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc4 0xc00218af00 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc5 0xc00218af00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc00218af00 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.306 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc00218af00 gate 1556789276305004400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.306 UTC [policies] Evaluate -> DEBU 2dc8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.306 UTC [policies] Evaluate -> DEBU 2dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [policies] Evaluate -> DEBU 2dca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [cauthdsl] func1 -> DEBU 2dcb 0xc00218b740 gate 1556789276307255500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [cauthdsl] func2 -> DEBU 2dcc 0xc00218b740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [cauthdsl] func2 -> DEBU 2dcd 0xc00218b740 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [cauthdsl] func2 -> DEBU 2dce 0xc00218b740 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.307 UTC [msp.identity] Verify -> DEBU 2dcf Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:27:56.308 UTC [msp.identity] Verify -> DEBU 2dd0 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:27:56.308 UTC [cauthdsl] func2 -> DEBU 2dd1 0xc00218b740 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [cauthdsl] func1 -> DEBU 2dd2 0xc00218b740 gate 1556789276307255500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.309 UTC [gossip.gossip] handleMessage -> DEBU 2dd7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.504 UTC [gossip.gossip] handleMessage -> DEBU 2dd8 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.504 UTC [msp] DeserializeIdentity -> DEBU 2dd9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.505 UTC [msp] DeserializeIdentity -> DEBU 2dda Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.505 UTC [gossip.gossip] handleMessage -> DEBU 2ddb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.558 UTC [gossip.gossip] handleMessage -> DEBU 2ddc Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.558 UTC [gossip.pull] HandleMessage -> DEBU 2ddd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.558 UTC [gossip.pull] SendDigest -> DEBU 2dde Sending BLOCK_MSG digest: [4 5 6 7 8 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:56.558 UTC [gossip.gossip] handleMessage -> DEBU 2ddf Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.751 UTC [gossip.gossip] handleMessage -> DEBU 2de0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.751 UTC [msp] DeserializeIdentity -> DEBU 2de1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.751 UTC [msp] DeserializeIdentity -> DEBU 2de2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.751 UTC [msp] DeserializeIdentity -> DEBU 2de3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.751 UTC [gossip.gossip] handleMessage -> DEBU 2de4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.816 UTC [gossip.comm] func1 -> DEBU 2de5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.816 UTC [gossip.gossip] handleMessage -> DEBU 2de6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.816 UTC [gossip.pull] HandleMessage -> DEBU 2de7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.816 UTC [msp] DeserializeIdentity -> DEBU 2de8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.816 UTC [msp] DeserializeIdentity -> DEBU 2de9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2dea Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2deb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2dec Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2ded Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [gossip.pull] SendDigest -> DEBU 2dee Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:56.817 UTC [gossip.gossip] handleMessage -> DEBU 2def Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.835 UTC [gossip.comm] func1 -> DEBU 2df0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.835 UTC [gossip.gossip] handleMessage -> DEBU 2df1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.835 UTC [gossip.gossip] handleMessage -> DEBU 2df2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.835 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2df3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.835 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2df4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:56.836 UTC [msp] DeserializeIdentity -> DEBU 2df5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.836 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2df6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:56.836 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2df7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.836 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2df8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [policies] Evaluate -> DEBU 2df9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [policies] Evaluate -> DEBU 2dfa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [policies] Evaluate -> DEBU 2dfb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [cauthdsl] func1 -> DEBU 2dfc 0xc002177c10 gate 1556789276837575500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [cauthdsl] func2 -> DEBU 2dfd 0xc002177c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.837 UTC [cauthdsl] func2 -> DEBU 2dfe 0xc002177c10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.838 UTC [cauthdsl] func2 -> DEBU 2dff 0xc002177c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:56.838 UTC [cauthdsl] func2 -> DEBU 2e00 0xc002177c10 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.840 UTC [cauthdsl] func1 -> DEBU 2e01 0xc002177c10 gate 1556789276837575500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:56.840 UTC [policies] Evaluate -> DEBU 2e02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.841 UTC [policies] Evaluate -> DEBU 2e03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.841 UTC [policies] Evaluate -> DEBU 2e04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:56.841 UTC [cauthdsl] func1 -> DEBU 2e05 0xc002152450 gate 1556789276841318900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:56.841 UTC [cauthdsl] func2 -> DEBU 2e06 0xc002152450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:56.842 UTC [cauthdsl] func2 -> DEBU 2e07 0xc002152450 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:56.842 UTC [cauthdsl] func2 -> DEBU 2e08 0xc002152450 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.842 UTC [msp.identity] Verify -> DEBU 2e09 Verify: digest = 00000000 8e ab 79 f9 33 76 ca 73 af 46 a7 01 7f 37 05 8f |..y.3v.s.F...7..| +peer0.org1.example.com | 00000010 f8 ff 78 29 20 d2 5c e5 c3 a2 84 78 49 e7 68 90 |..x) .\....xI.h.|" +peer0.org1.example.com | "2019-05-02 09:27:56.842 UTC [msp.identity] Verify -> DEBU 2e0a Verify: sig = 00000000 30 45 02 21 00 ce 88 b2 fa ff 08 3c df 52 7a 50 |0E.!.......<.RzP| +peer0.org1.example.com | 00000010 d3 6b 47 b6 8d fb 53 e3 4e 8d 4e 5a 1f ce fd 3c |.kG...S.N.NZ...<| +peer0.org1.example.com | 00000020 7a 9a c9 19 f9 02 20 4b 0b 2d 8b c3 63 8b 85 8c |z..... K.-..c...| +peer0.org1.example.com | 00000030 25 6a 36 e5 da fe 4c 90 c0 55 4a 0e 7d 0c 98 57 |%j6...L..UJ.}..W| +peer0.org1.example.com | 00000040 cd 97 3a f0 2b 03 e9 |..:.+..|" +peer0.org1.example.com | "2019-05-02 09:27:56.843 UTC [cauthdsl] func2 -> DEBU 2e0b 0xc002152450 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:56.843 UTC [cauthdsl] func1 -> DEBU 2e0c 0xc002152450 gate 1556789276841318900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:56.843 UTC [policies] Evaluate -> DEBU 2e0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.843 UTC [policies] Evaluate -> DEBU 2e0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.844 UTC [policies] Evaluate -> DEBU 2e0f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.844 UTC [policies] Evaluate -> DEBU 2e10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:56.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e12 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e13 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 " +peer0.org1.example.com | "2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e14 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 " +peer0.org1.example.com | "2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e15 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:56.847 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e16 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e17 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e18 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.848 UTC [gossip.discovery] sendMemResponse -> DEBU 2e19 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:27:56.848 UTC [msp] DeserializeIdentity -> DEBU 2e1a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.849 UTC [msp] DeserializeIdentity -> DEBU 2e1b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.849 UTC [msp] DeserializeIdentity -> DEBU 2e1c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.850 UTC [gossip.comm] Send -> DEBU 2e1d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:56.850 UTC [gossip.discovery] sendMemResponse -> DEBU 2e1e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:56.851 UTC [gossip.comm] sendToEndpoint -> DEBU 2e1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.853 UTC [gossip.comm] sendToEndpoint -> DEBU 2e20 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:56.980 UTC [gossip.comm] func1 -> DEBU 2e21 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.980 UTC [gossip.gossip] handleMessage -> DEBU 2e22 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:56.981 UTC [msp] DeserializeIdentity -> DEBU 2e23 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.981 UTC [msp] DeserializeIdentity -> DEBU 2e24 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.982 UTC [msp] DeserializeIdentity -> DEBU 2e25 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:56.983 UTC [gossip.gossip] handleMessage -> DEBU 2e26 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.008 UTC [msp] DeserializeIdentity -> DEBU 2e27 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.008 UTC [msp] DeserializeIdentity -> DEBU 2e28 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.008 UTC [gossip.pull] Hello -> DEBU 2e29 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:57.008 UTC [msp] DeserializeIdentity -> DEBU 2e2a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.009 UTC [msp] DeserializeIdentity -> DEBU 2e2b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.010 UTC [gossip.comm] Send -> DEBU 2e2c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:57.010 UTC [gossip.comm] sendToEndpoint -> DEBU 2e2d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.010 UTC [gossip.comm] sendToEndpoint -> DEBU 2e2e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.013 UTC [gossip.gossip] handleMessage -> DEBU 2e2f Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18423874894943821565 , Msg_type: BLOCK_MSG, digests: [8 2 1 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.013 UTC [gossip.pull] HandleMessage -> DEBU 2e30 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18423874894943821565 , Msg_type: BLOCK_MSG, digests: [8 2 1 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.013 UTC [gossip.gossip] handleMessage -> DEBU 2e31 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.101 UTC [gossip.gossip] handleMessage -> DEBU 2e32 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.101 UTC [gossip.pull] HandleMessage -> DEBU 2e33 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.101 UTC [gossip.pull] SendDigest -> DEBU 2e34 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:57.101 UTC [gossip.gossip] handleMessage -> DEBU 2e35 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.pull] Hello -> DEBU 2e36 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.comm] Send -> DEBU 2e37 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.pull] Hello -> DEBU 2e38 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.comm] Send -> DEBU 2e39 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.pull] Hello -> DEBU 2e3a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.comm] Send -> DEBU 2e3b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:57.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e40 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e41 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.109 UTC [gossip.gossip] handleMessage -> DEBU 2e42 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15705107216210067546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.109 UTC [gossip.pull] HandleMessage -> DEBU 2e43 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15705107216210067546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.109 UTC [gossip.gossip] handleMessage -> DEBU 2e44 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.110 UTC [gossip.gossip] handleMessage -> DEBU 2e45 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7030554139193622813 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.110 UTC [gossip.pull] HandleMessage -> DEBU 2e46 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7030554139193622813 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.110 UTC [gossip.gossip] handleMessage -> DEBU 2e47 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.111 UTC [gossip.comm] func1 -> DEBU 2e48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16480138393559414308 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.111 UTC [gossip.gossip] handleMessage -> DEBU 2e49 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16480138393559414308 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.112 UTC [gossip.pull] HandleMessage -> DEBU 2e4a GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16480138393559414308 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.112 UTC [gossip.gossip] handleMessage -> DEBU 2e4b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [gossip.gossip] handleMessage -> DEBU 2e4c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [gossip.gossip] handleMessage -> DEBU 2e4d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e4e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e4f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:57.119 UTC [msp.identity] Verify -> DEBU 2e50 Verify: digest = 00000000 a0 8d 9c cc b8 52 25 4f 46 56 80 5e 8a d2 26 6d |.....R%OFV.^..&m| +peer0.org1.example.com | 00000010 b0 04 b6 0a f6 49 b2 5a b0 2d 5c e0 4b 98 3c 74 |.....I.Z.-\.K. DEBU 2e51 Verify: sig = 00000000 30 44 02 20 00 f6 bd 00 be 9d 17 d5 42 13 bc d6 |0D. ........B...| +peer0.org1.example.com | 00000010 b8 02 63 9c 5c 03 3e d5 bd f0 ac 4f 13 56 cd 36 |..c.\.>....O.V.6| +peer0.org1.example.com | 00000020 df 8d 17 e1 02 20 07 30 2a d9 a4 16 25 77 fb 9c |..... .0*...%w..| +peer0.org1.example.com | 00000030 28 8b 4b b1 42 92 2c 89 08 da 0c d5 c0 04 cf ad |(.K.B.,.........| +peer0.org1.example.com | 00000040 74 cf e4 2e 77 31 |t...w1|" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [msp.identity] Verify -> DEBU 2e52 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [msp.identity] Verify -> DEBU 2e53 Verify: sig = 00000000 30 45 02 21 00 91 6d 90 e3 8f d0 7a 64 a1 c4 b1 |0E.!..m....zd...| +peer0.org1.example.com | 00000010 ef 90 ca 71 06 63 7c cb 00 72 07 dc e5 f5 41 74 |...q.c|..r....At| +peer0.org1.example.com | 00000020 11 93 da 55 9d 02 20 0e 57 85 06 f5 6b f4 75 47 |...U.. .W...k.uG| +peer0.org1.example.com | 00000030 6f 73 86 27 d4 ab d6 b5 da 9c 9f d7 a2 97 1e 47 |os.'...........G| +peer0.org1.example.com | 00000040 16 cf 10 f2 3b ab b7 |....;..|" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e54 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e55 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e56 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 " +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e57 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 " +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e58 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e59 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e5a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e5b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] sendMemResponse -> DEBU 2e5c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [msp] DeserializeIdentity -> DEBU 2e5d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [msp] DeserializeIdentity -> DEBU 2e5e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.comm] Send -> DEBU 2e5f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:57.120 UTC [gossip.discovery] sendMemResponse -> DEBU 2e60 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:57.121 UTC [gossip.comm] sendToEndpoint -> DEBU 2e61 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.121 UTC [gossip.comm] sendToEndpoint -> DEBU 2e62 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e63 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101F " +peer0.org1.example.com | "2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e64 Sign: digest: 6B0A58B13013B23FF775E1CEC33391F5B408A02DEB67E06DA5A846E2FAE1E90C " +peer0.org1.example.com | "2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e65 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e66 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:57.154 UTC [msp] DeserializeIdentity -> DEBU 2e67 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] Send -> DEBU 2e68 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [msp] DeserializeIdentity -> DEBU 2e69 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] Send -> DEBU 2e6a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] Send -> DEBU 2e6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e70 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e71 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.comm] func1 -> DEBU 2e72 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.gossip] handleMessage -> DEBU 2e73 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.gossip] handleMessage -> DEBU 2e74 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e76 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [msp.identity] Verify -> DEBU 2e77 Verify: digest = 00000000 a0 8d 9c cc b8 52 25 4f 46 56 80 5e 8a d2 26 6d |.....R%OFV.^..&m| +peer0.org1.example.com | 00000010 b0 04 b6 0a f6 49 b2 5a b0 2d 5c e0 4b 98 3c 74 |.....I.Z.-\.K. DEBU 2e78 Verify: sig = 00000000 30 44 02 20 00 f6 bd 00 be 9d 17 d5 42 13 bc d6 |0D. ........B...| +peer0.org1.example.com | 00000010 b8 02 63 9c 5c 03 3e d5 bd f0 ac 4f 13 56 cd 36 |..c.\.>....O.V.6| +peer0.org1.example.com | 00000020 df 8d 17 e1 02 20 07 30 2a d9 a4 16 25 77 fb 9c |..... .0*...%w..| +peer0.org1.example.com | 00000030 28 8b 4b b1 42 92 2c 89 08 da 0c d5 c0 04 cf ad |(.K.B.,.........| +peer0.org1.example.com | 00000040 74 cf e4 2e 77 31 |t...w1|" +peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e79 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e7a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e7b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e7c Verify: digest = 00000000 6b 0a 58 b1 30 13 b2 3f f7 75 e1 ce c3 33 91 f5 |k.X.0..?.u...3..| +peer0.org1.example.com | 00000010 b4 08 a0 2d eb 67 e0 6d a5 a8 46 e2 fa e1 e9 0c |...-.g.m..F.....|" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e7d Verify: sig = 00000000 30 45 02 21 00 fc ef ed 74 b5 a9 e0 55 f5 a9 cf |0E.!....t...U...| +peer0.org1.example.com | 00000010 3a 39 aa 92 51 ba 31 e4 55 37 01 7e 4b 40 2f 9f |:9..Q.1.U7.~K@/.| +peer0.org1.example.com | 00000020 36 f3 e0 76 27 02 20 3b 80 29 5c f0 01 12 51 da |6..v'. ;.)\...Q.| +peer0.org1.example.com | 00000030 99 25 2e db 35 30 ae 11 8d d5 54 ef 08 e1 00 7b |.%..50....T....{| +peer0.org1.example.com | 00000040 cf 5c be f3 7c 0d a8 |.\..|..|" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e7e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.discovery] isSentByMe -> DEBU 2e7f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e80 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e81 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.gossip] handleMessage -> DEBU 2e82 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.gossip] handleMessage -> DEBU 2e83 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e84 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e85 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e86 Verify: digest = 00000000 6b 0a 58 b1 30 13 b2 3f f7 75 e1 ce c3 33 91 f5 |k.X.0..?.u...3..| +peer0.org1.example.com | 00000010 b4 08 a0 2d eb 67 e0 6d a5 a8 46 e2 fa e1 e9 0c |...-.g.m..F.....|" +peer0.org1.example.com | "2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e87 Verify: sig = 00000000 30 45 02 21 00 fc ef ed 74 b5 a9 e0 55 f5 a9 cf |0E.!....t...U...| +peer0.org1.example.com | 00000010 3a 39 aa 92 51 ba 31 e4 55 37 01 7e 4b 40 2f 9f |:9..Q.1.U7.~K@/.| +peer0.org1.example.com | 00000020 36 f3 e0 76 27 02 20 3b 80 29 5c f0 01 12 51 da |6..v'. ;.)\...Q.| +peer0.org1.example.com | 00000030 99 25 2e db 35 30 ae 11 8d d5 54 ef 08 e1 00 7b |.%..50....T....{| +peer0.org1.example.com | 00000040 cf 5c be f3 7c 0d a8 |.\..|..|" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [msp.identity] Verify -> DEBU 2e88 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [msp.identity] Verify -> DEBU 2e89 Verify: sig = 00000000 30 44 02 20 32 a2 79 ad c6 1f 0f 61 cb c2 bf b5 |0D. 2.y....a....| +peer0.org1.example.com | 00000010 d7 fe 41 47 77 a9 95 ce eb 6f e1 a9 83 18 fd 33 |..AGw....o.....3| +peer0.org1.example.com | 00000020 d4 bd d6 9c 02 20 52 02 53 e0 e7 60 b8 1d 2c df |..... R.S..`..,.| +peer0.org1.example.com | 00000030 99 33 73 b6 51 91 41 33 d6 2e d2 0e 92 10 da 39 |.3s.Q.A3.......9| +peer0.org1.example.com | 00000040 89 1a 5d 8e ce 76 |..]..v|" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e8a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.discovery] isSentByMe -> DEBU 2e8b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e8c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e8d Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.gossip] handleMessage -> DEBU 2e8e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.gossip] handleMessage -> DEBU 2e8f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e90 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e91 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:57.167 UTC [msp] DeserializeIdentity -> DEBU 2e92 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e94 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e95 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2e99 0xc0003a4be0 gate 1556789277168239700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9a 0xc0003a4be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9b 0xc0003a4be0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9c 0xc0003a4be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9d 0xc0003a4be0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2e9e 0xc0003a4be0 gate 1556789277168239700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e9f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2ea0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2ea1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2ea2 0xc0003a5430 gate 1556789277168593100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea3 0xc0003a5430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea4 0xc0003a5430 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea5 0xc0003a5430 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [msp.identity] Verify -> DEBU 2ea6 Verify: digest = 00000000 8e ab 79 f9 33 76 ca 73 af 46 a7 01 7f 37 05 8f |..y.3v.s.F...7..| +peer0.org1.example.com | 00000010 f8 ff 78 29 20 d2 5c e5 c3 a2 84 78 49 e7 68 90 |..x) .\....xI.h.|" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [msp.identity] Verify -> DEBU 2ea7 Verify: sig = 00000000 30 45 02 21 00 ce 88 b2 fa ff 08 3c df 52 7a 50 |0E.!.......<.RzP| +peer0.org1.example.com | 00000010 d3 6b 47 b6 8d fb 53 e3 4e 8d 4e 5a 1f ce fd 3c |.kG...S.N.NZ...<| +peer0.org1.example.com | 00000020 7a 9a c9 19 f9 02 20 4b 0b 2d 8b c3 63 8b 85 8c |z..... K.-..c...| +peer0.org1.example.com | 00000030 25 6a 36 e5 da fe 4c 90 c0 55 4a 0e 7d 0c 98 57 |%j6...L..UJ.}..W| +peer0.org1.example.com | 00000040 cd 97 3a f0 2b 03 e9 |..:.+..|" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea8 0xc0003a5430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2ea9 0xc0003a5430 gate 1556789277168593100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2eaa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2eac Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2ead == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eaf Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2eb0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [msp.identity] Verify -> DEBU 2eb1 Verify: digest = 00000000 a0 8d 9c cc b8 52 25 4f 46 56 80 5e 8a d2 26 6d |.....R%OFV.^..&m| +peer0.org1.example.com | 00000010 b0 04 b6 0a f6 49 b2 5a b0 2d 5c e0 4b 98 3c 74 |.....I.Z.-\.K. DEBU 2eb2 Verify: sig = 00000000 30 44 02 20 00 f6 bd 00 be 9d 17 d5 42 13 bc d6 |0D. ........B...| +peer0.org1.example.com | 00000010 b8 02 63 9c 5c 03 3e d5 bd f0 ac 4f 13 56 cd 36 |..c.\.>....O.V.6| +peer0.org1.example.com | 00000020 df 8d 17 e1 02 20 07 30 2a d9 a4 16 25 77 fb 9c |..... .0*...%w..| +peer0.org1.example.com | 00000030 28 8b 4b b1 42 92 2c 89 08 da 0c d5 c0 04 cf ad |(.K.B.,.........| +peer0.org1.example.com | 00000040 74 cf e4 2e 77 31 |t...w1|" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2eb5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [msp.identity] Verify -> DEBU 2eb6 Verify: digest = 00000000 6b 0a 58 b1 30 13 b2 3f f7 75 e1 ce c3 33 91 f5 |k.X.0..?.u...3..| +peer0.org1.example.com | 00000010 b4 08 a0 2d eb 67 e0 6d a5 a8 46 e2 fa e1 e9 0c |...-.g.m..F.....|" +peer0.org1.example.com | "2019-05-02 09:27:57.169 UTC [msp.identity] Verify -> DEBU 2eb7 Verify: sig = 00000000 30 45 02 21 00 fc ef ed 74 b5 a9 e0 55 f5 a9 cf |0E.!....t...U...| +peer0.org1.example.com | 00000010 3a 39 aa 92 51 ba 31 e4 55 37 01 7e 4b 40 2f 9f |:9..Q.1.U7.~K@/.| +peer0.org1.example.com | 00000020 36 f3 e0 76 27 02 20 3b 80 29 5c f0 01 12 51 da |6..v'. ;.)\...Q.| +peer0.org1.example.com | 00000030 99 25 2e db 35 30 ae 11 8d d5 54 ef 08 e1 00 7b |.%..50....T....{| +peer0.org1.example.com | 00000040 cf 5c be f3 7c 0d a8 |.\..|..|" +peer0.org1.example.com | "2019-05-02 09:27:57.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.170 UTC [gossip.discovery] isSentByMe -> DEBU 2eb9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eba Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ebb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.194 UTC [gossip.gossip] handleMessage -> DEBU 2ebc Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [gossip.gossip] handleMessage -> DEBU 2ebd Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [gossip.gossip] handleMessage -> DEBU 2ebe Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [gossip.pull] HandleMessage -> DEBU 2ebf GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [gossip.pull] SendDigest -> DEBU 2ec6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:57.195 UTC [gossip.gossip] handleMessage -> DEBU 2ec7 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ec8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ec9 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [msp] DeserializeIdentity -> DEBU 2eca Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ecb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ecc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ecd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:57.198 UTC [policies] Evaluate -> DEBU 2ece == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ecf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2ed1 0xc00030a230 gate 1556789277199077300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed2 0xc00030a230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed3 0xc00030a230 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed4 0xc00030a230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed5 0xc00030a230 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2ed6 0xc00030a230 gate 1556789277199077300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2eda 0xc00030af70 gate 1556789277199421000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2edb 0xc00030af70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2edc 0xc00030af70 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2edd 0xc00030af70 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [msp.identity] Verify -> DEBU 2ede Verify: digest = 00000000 9d 84 f9 c6 2f 0e e1 a8 68 f4 96 d0 f2 60 0d 87 |..../...h....`..| +peer0.org1.example.com | 00000010 93 5c 81 bb cb 10 dc 2e 72 96 7a 59 5b bb 78 18 |.\......r.zY[.x.|" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [msp.identity] Verify -> DEBU 2edf Verify: sig = 00000000 30 44 02 20 3c 5e ad dc 85 4b 7c 5d e8 36 7a d3 |0D. <^...K|].6z.| +peer0.org1.example.com | 00000010 30 3b ac 40 88 88 bf b0 17 6b b6 de d0 2d b1 a0 |0;.@.....k...-..| +peer0.org1.example.com | 00000020 af a9 21 e6 02 20 64 e3 0c 2b 28 f2 71 5f 0d 6a |..!.. d..+(.q_.j| +peer0.org1.example.com | 00000030 cb d6 3d e9 a0 7c b2 a7 ad f3 a7 06 c5 cd 82 55 |..=..|.........U| +peer0.org1.example.com | 00000040 ce d6 f6 6e 89 b2 |...n..|" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ee0 0xc00030af70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2ee1 0xc00030af70 gate 1556789277199421000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ee6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ee7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ee8 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 " +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ee9 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 " +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eea Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eeb Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eec Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2eed Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] sendMemResponse -> DEBU 2eee Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [msp] DeserializeIdentity -> DEBU 2eef Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [msp] DeserializeIdentity -> DEBU 2ef0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [msp] DeserializeIdentity -> DEBU 2ef1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.comm] Send -> DEBU 2ef2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.discovery] sendMemResponse -> DEBU 2ef3 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.comm] sendToEndpoint -> DEBU 2ef4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.200 UTC [gossip.comm] sendToEndpoint -> DEBU 2ef5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.320 UTC [gossip.election] waitForInterrupt -> DEBU 2ef6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:27:57.320 UTC [gossip.election] IsLeader -> DEBU 2ef7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:27:57.320 UTC [msp.identity] Sign -> DEBU 2ef8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510091801 " +peer0.org1.example.com | "2019-05-02 09:27:57.320 UTC [msp.identity] Sign -> DEBU 2ef9 Sign: digest: 462B319F16B820A244F548AB2D0FE497F7815E8C73F97D1EC0E3C8EA6A1E9F47 " +peer0.org1.example.com | "2019-05-02 09:27:57.321 UTC [gossip.election] waitForInterrupt -> DEBU 2efa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efe Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.327 UTC [gossip.comm] Send -> DEBU 2eff Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:57.327 UTC [msp] DeserializeIdentity -> DEBU 2f00 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.327 UTC [msp] DeserializeIdentity -> DEBU 2f01 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:57.327 UTC [gossip.comm] sendToEndpoint -> DEBU 2f02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:57.327 UTC [gossip.comm] sendToEndpoint -> DEBU 2f03 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [gossip.comm] func1 -> DEBU 2f04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [gossip.gossip] handleMessage -> DEBU 2f05 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [gossip.gossip] handleMessage -> DEBU 2f06 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f08 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [msp] DeserializeIdentity -> DEBU 2f09 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:58.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f0b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f0c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func1 -> DEBU 2f10 0xc000394bd0 gate 1556789278805217700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f11 0xc000394bd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f12 0xc000394bd0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f13 0xc000394bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f14 0xc000394bd0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func1 -> DEBU 2f15 0xc000394bd0 gate 1556789278805217700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f16 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func1 -> DEBU 2f19 0xc000395410 gate 1556789278805645500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f1a 0xc000395410 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f1b 0xc000395410 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f1c 0xc000395410 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [msp.identity] Verify -> DEBU 2f1d Verify: digest = 00000000 3f 3d a0 cd ab c9 e0 2f 55 b1 2c 4d 34 fa 18 04 |?=...../U.,M4...| +peer0.org1.example.com | 00000010 0a bf 9d 8a b1 79 63 21 85 8e 2e 09 3f 72 23 df |.....yc!....?r#.|" +peer0.org1.example.com | "2019-05-02 09:27:58.805 UTC [msp.identity] Verify -> DEBU 2f1e Verify: sig = 00000000 30 45 02 21 00 af 91 78 d9 62 a8 61 d8 ab 11 f7 |0E.!...x.b.a....| +peer0.org1.example.com | 00000010 cf 50 d6 b1 a5 dc ed a4 58 0a aa 1a 4e b7 68 bf |.P......X...N.h.| +peer0.org1.example.com | 00000020 88 b4 73 f9 66 02 20 5a a1 1e 0c c1 59 a6 7d ad |..s.f. Z....Y.}.| +peer0.org1.example.com | 00000030 92 b5 1e 33 73 8d c2 d8 af 65 38 47 39 ac 6a e2 |...3s....e8G9.j.| +peer0.org1.example.com | 00000040 b6 b0 48 b4 0e bd ce |..H....|" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [cauthdsl] func2 -> DEBU 2f1f 0xc000395410 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [cauthdsl] func1 -> DEBU 2f20 0xc000395410 gate 1556789278805645500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f21 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f23 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f25 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f26 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f27 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 " +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f28 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 " +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f29 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f2a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f2b Exiting" +peer0.org1.example.com | "2019-05-02 09:27:58.806 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f2c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [gossip.gossip] handleMessage -> DEBU 2f2d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [gossip.gossip] handleMessage -> DEBU 2f2e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f2f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f30 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f31 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f32 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f33 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f34 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f35 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [msp] DeserializeIdentity -> DEBU 2f36 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] Send -> DEBU 2f37 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [msp] DeserializeIdentity -> DEBU 2f38 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [msp] DeserializeIdentity -> DEBU 2f39 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] Send -> DEBU 2f3a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3c Exiting" +peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:58.818 UTC [gossip.gossip] handleMessage -> DEBU 2f3f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:58.818 UTC [gossip.gossip] handleMessage -> DEBU 2f40 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:58.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f41 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:58.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f42 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.026 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 2f43 Sleeping 25s" +peer0.org1.example.com | "2019-05-02 09:27:59.050 UTC [msp.identity] Sign -> DEBU 2f44 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151020 " +peer0.org1.example.com | "2019-05-02 09:27:59.051 UTC [msp.identity] Sign -> DEBU 2f45 Sign: digest: 8B0F1721906A1A7B8E6E66FD82887B64909157F0976BA494FC42849BF2C88A79 " +peer0.org1.example.com | "2019-05-02 09:27:59.052 UTC [msp.identity] Sign -> DEBU 2f46 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:27:59.052 UTC [msp.identity] Sign -> DEBU 2f47 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:27:59.053 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2f48 Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:27:59.063 UTC [msp] DeserializeIdentity -> DEBU 2f49 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.063 UTC [msp] DeserializeIdentity -> DEBU 2f4a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.063 UTC [msp] DeserializeIdentity -> DEBU 2f4b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.063 UTC [gossip.comm] Send -> DEBU 2f4c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [msp] DeserializeIdentity -> DEBU 2f4d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [gossip.comm] Send -> DEBU 2f4e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [gossip.comm] Send -> DEBU 2f4f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [gossip.comm] sendToEndpoint -> DEBU 2f50 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [gossip.comm] sendToEndpoint -> DEBU 2f51 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.064 UTC [gossip.comm] sendToEndpoint -> DEBU 2f52 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2f53 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2f55 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2f54 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.098 UTC [gossip.gossip] handleMessage -> DEBU 2f56 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.098 UTC [gossip.gossip] handleMessage -> DEBU 2f57 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f59 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5a Verify: digest = 00000000 ea 8e ed bf 77 a0 19 87 89 80 3b 3d 86 c9 81 d4 |....w.....;=....| +peer0.org1.example.com | 00000010 e4 ff 64 bf ae 1e 34 8c a7 b6 3f 8f 55 03 4c 83 |..d...4...?.U.L.|" +peer0.org1.example.com | "2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5b Verify: sig = 00000000 30 45 02 21 00 b7 ff 09 99 cd 32 b8 fd 9f c6 b8 |0E.!......2.....| +peer0.org1.example.com | 00000010 96 37 00 e8 6f 79 c6 dc 46 21 e4 fa 4d 7d 91 15 |.7..oy..F!..M}..| +peer0.org1.example.com | 00000020 47 aa 86 04 b0 02 20 6f a1 e9 44 a0 4f 5e 25 6c |G..... o..D.O^%l| +peer0.org1.example.com | 00000030 c6 be f7 87 b9 99 91 25 93 d5 99 1f a9 88 b7 fa |.......%........| +peer0.org1.example.com | 00000040 67 d3 af 10 17 8b 62 |g.....b|" +peer0.org1.example.com | "2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5d Verify: sig = 00000000 30 44 02 20 1d c0 36 96 a4 a3 ce 74 17 fa eb 16 |0D. ..6....t....| +peer0.org1.example.com | 00000010 b1 03 16 20 58 69 f1 2a a5 1b 3f 19 41 f2 56 17 |... Xi.*..?.A.V.| +peer0.org1.example.com | 00000020 72 c6 c2 1c 02 20 42 19 6f 02 2c 47 fe 39 ae 7b |r.... B.o.,G.9.{| +peer0.org1.example.com | 00000030 fe 7f b3 f5 03 01 16 cc 3f ec 36 7b e5 70 a9 b9 |........?.6{.p..| +peer0.org1.example.com | 00000040 43 38 88 fb f4 1f |C8....|" +peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f5e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f60 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 " +peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f61 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 " +peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f62 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f63 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f64 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f65 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.103 UTC [gossip.comm] func1 -> DEBU 2f66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.104 UTC [gossip.gossip] handleMessage -> DEBU 2f67 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.104 UTC [gossip.gossip] handleMessage -> DEBU 2f68 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.105 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.105 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.106 UTC [msp] DeserializeIdentity -> DEBU 2f6b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.107 UTC [msp] DeserializeIdentity -> DEBU 2f6c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.107 UTC [gossip.gossip] handleMessage -> DEBU 2f6d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.107 UTC [gossip.gossip] handleMessage -> DEBU 2f6e Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f70 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.108 UTC [msp] DeserializeIdentity -> DEBU 2f71 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.108 UTC [gossip.comm] Send -> DEBU 2f72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:59.108 UTC [msp] DeserializeIdentity -> DEBU 2f73 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f74 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f75 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.109 UTC [gossip.comm] Send -> DEBU 2f76 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f77 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f78 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.164 UTC [gossip.gossip] handleMessage -> DEBU 2f79 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.164 UTC [gossip.gossip] handleMessage -> DEBU 2f7a Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f7c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [msp] DeserializeIdentity -> DEBU 2f7d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f7f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f80 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [policies] Evaluate -> DEBU 2f81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [policies] Evaluate -> DEBU 2f82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:27:59.166 UTC [policies] Evaluate -> DEBU 2f83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func1 -> DEBU 2f84 0xc0003cfff0 gate 1556789279167003300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f85 0xc0003cfff0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f86 0xc0003cfff0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f87 0xc0003cfff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f88 0xc0003cfff0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [cauthdsl] func1 -> DEBU 2f89 0xc0003cfff0 gate 1556789279167003300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [policies] Evaluate -> DEBU 2f8a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [policies] Evaluate -> DEBU 2f8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:59.167 UTC [policies] Evaluate -> DEBU 2f8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:27:59.168 UTC [cauthdsl] func1 -> DEBU 2f8d 0xc000259f00 gate 1556789279167854300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f8f 0xc000259f00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f90 0xc000259f00 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f91 0xc000259f00 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [msp.identity] Verify -> DEBU 2f92 Verify: digest = 00000000 5b 6d 36 c7 b1 e1 9b 57 5e 59 2d 60 43 d2 38 d5 |[m6....W^Y-`C.8.| +peer0.org1.example.com | 00000010 26 40 f4 06 37 57 00 91 0f 3a 6a 5b 4f 9e 32 ed |&@..7W...:j[O.2.|" +peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [msp.identity] Verify -> DEBU 2f93 Verify: sig = 00000000 30 44 02 20 00 b3 a1 9b c5 32 0f ce b8 61 e6 6a |0D. .....2...a.j| +peer0.org1.example.com | 00000010 6e cd 9f 39 79 bb ab 5b ad a2 ad 3f f3 8a 47 f1 |n..9y..[...?..G.| +peer0.org1.example.com | 00000020 d5 46 2b cf 02 20 37 e3 65 ad 8f b4 f7 ce b5 d1 |.F+.. 7.e.......| +peer0.org1.example.com | 00000030 a2 e1 44 61 5d 75 5c 5c a7 f9 3a b5 5a 3f da fb |..Da]u\\..:.Z?..| +peer0.org1.example.com | 00000040 fd b3 b5 d9 39 94 |....9.|" +peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f94 0xc000259f00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [cauthdsl] func1 -> DEBU 2f95 0xc000259f00 gate 1556789279167854300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [policies] Evaluate -> DEBU 2f96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [policies] Evaluate -> DEBU 2f97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:27:59.169 UTC [policies] Evaluate -> DEBU 2f98 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [policies] Evaluate -> DEBU 2f99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f9a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 " +peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 " +peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9f Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fa0 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa1 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.168 UTC [gossip.comm] func1 -> DEBU 2f8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.171 UTC [gossip.gossip] handleMessage -> DEBU 2fa2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.171 UTC [gossip.gossip] handleMessage -> DEBU 2fa3 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.182 UTC [msp] DeserializeIdentity -> DEBU 2fa6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.183 UTC [msp] DeserializeIdentity -> DEBU 2fa7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.183 UTC [msp] DeserializeIdentity -> DEBU 2fa8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.184 UTC [msp] DeserializeIdentity -> DEBU 2fa9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.185 UTC [msp] DeserializeIdentity -> DEBU 2faa Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.185 UTC [msp] DeserializeIdentity -> DEBU 2fab Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.186 UTC [gossip.comm] Send -> DEBU 2fac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:59.186 UTC [msp] DeserializeIdentity -> DEBU 2fad Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.187 UTC [msp] DeserializeIdentity -> DEBU 2fae Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:27:59.188 UTC [gossip.comm] Send -> DEBU 2faf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:27:59.188 UTC [gossip.gossip] handleMessage -> DEBU 2fb0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.189 UTC [gossip.gossip] handleMessage -> DEBU 2fb2 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb4 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.188 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.189 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb5 Exiting" +peer0.org1.example.com | "2019-05-02 09:27:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:27:59.191 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb7 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:00.247 UTC [msp] DeserializeIdentity -> DEBU 2fb8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.247 UTC [msp] DeserializeIdentity -> DEBU 2fb9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.247 UTC [gossip.comm] Send -> DEBU 2fba Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:28:00.247 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbc Exiting" +peer0.org1.example.com | "2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbe Exiting" +peer0.org1.example.com | "2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:00.251 UTC [gossip.comm] func1 -> DEBU 2fc1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:00.251 UTC [gossip.gossip] handleMessage -> DEBU 2fc2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:00.251 UTC [msp] DeserializeIdentity -> DEBU 2fc3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.251 UTC [msp] DeserializeIdentity -> DEBU 2fc4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.251 UTC [msp] DeserializeIdentity -> DEBU 2fc5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fc6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fc7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fc8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fc9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fcb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func1 -> DEBU 2fcc 0xc002d965a0 gate 1556789280252279900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fcd 0xc002d965a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fce 0xc002d965a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fcf 0xc002d965a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd0 0xc002d965a0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func1 -> DEBU 2fd1 0xc002d965a0 gate 1556789280252279900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fd2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fd4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func1 -> DEBU 2fd5 0xc002d96e10 gate 1556789280252630800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd6 0xc002d96e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd7 0xc002d96e10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd8 0xc002d96e10 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [msp.identity] Verify -> DEBU 2fd9 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [msp.identity] Verify -> DEBU 2fda Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fdb 0xc002d96e10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [cauthdsl] func1 -> DEBU 2fdc 0xc002d96e10 gate 1556789280252630800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fdd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fde == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fdf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fe0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe1 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe2 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe3 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe4 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [msp] DeserializeIdentity -> DEBU 2fe5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [msp] DeserializeIdentity -> DEBU 2fe6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fe7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.254 UTC [policies] Evaluate -> DEBU 2fea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [policies] Evaluate -> DEBU 2feb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [policies] Evaluate -> DEBU 2fec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func1 -> DEBU 2fed 0xc0025d7590 gate 1556789280265584100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2fee 0xc0025d7590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2fef 0xc0025d7590 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2ff0 0xc0025d7590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2ff1 0xc0025d7590 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.265 UTC [cauthdsl] func1 -> DEBU 2ff2 0xc0025d7590 gate 1556789280265584100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [policies] Evaluate -> DEBU 2ff3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [policies] Evaluate -> DEBU 2ff4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [policies] Evaluate -> DEBU 2ff5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [cauthdsl] func1 -> DEBU 2ff6 0xc0025d7dd0 gate 1556789280266231600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ff7 0xc0025d7dd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ff8 0xc0025d7dd0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ff9 0xc0025d7dd0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [msp.identity] Verify -> DEBU 2ffa Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [msp.identity] Verify -> DEBU 2ffb Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ffc 0xc0025d7dd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [cauthdsl] func1 -> DEBU 2ffd 0xc0025d7dd0 gate 1556789280266231600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 2ffe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 2fff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 3000 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 3001 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [gossip.gossip] handleMessage -> DEBU 3002 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [gossip.gossip] handleMessage -> DEBU 3003 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3004 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3005 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3006 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +peer0.org1.example.com | "2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3007 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [msp] DeserializeIdentity -> DEBU 3008 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [msp] DeserializeIdentity -> DEBU 3009 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 300a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 300b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 300c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 300d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 300e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 300f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func1 -> DEBU 3010 0xc00248a640 gate 1556789280268613600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3011 0xc00248a640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3012 0xc00248a640 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3013 0xc00248a640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3014 0xc00248a640 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func1 -> DEBU 3015 0xc00248a640 gate 1556789280268613600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 3016 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 3017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 3018 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.268 UTC [cauthdsl] func1 -> DEBU 3019 0xc00248ae90 gate 1556789280268968200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301a 0xc00248ae90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301b 0xc00248ae90 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301c 0xc00248ae90 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [msp.identity] Verify -> DEBU 301d Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [msp.identity] Verify -> DEBU 301e Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301f 0xc00248ae90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [cauthdsl] func1 -> DEBU 3020 0xc00248ae90 gate 1556789280268968200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3021 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3022 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3023 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3024 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [msp] DeserializeIdentity -> DEBU 3025 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.269 UTC [msp] DeserializeIdentity -> DEBU 3026 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.270 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3027 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:00.270 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3028 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.273 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3029 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.273 UTC [policies] Evaluate -> DEBU 302a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.273 UTC [policies] Evaluate -> DEBU 302b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:00.274 UTC [policies] Evaluate -> DEBU 302c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.274 UTC [cauthdsl] func1 -> DEBU 302d 0xc00252a660 gate 1556789280274445000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.274 UTC [cauthdsl] func2 -> DEBU 302e 0xc00252a660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [cauthdsl] func2 -> DEBU 302f 0xc00252a660 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [cauthdsl] func2 -> DEBU 3030 0xc00252a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [cauthdsl] func2 -> DEBU 3031 0xc00252a660 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [cauthdsl] func1 -> DEBU 3032 0xc00252a660 gate 1556789280274445000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [policies] Evaluate -> DEBU 3033 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.275 UTC [policies] Evaluate -> DEBU 3034 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.276 UTC [policies] Evaluate -> DEBU 3035 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.276 UTC [cauthdsl] func1 -> DEBU 3036 0xc00252aea0 gate 1556789280276085900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.276 UTC [cauthdsl] func2 -> DEBU 3037 0xc00252aea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.276 UTC [cauthdsl] func2 -> DEBU 3038 0xc00252aea0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.277 UTC [cauthdsl] func2 -> DEBU 3039 0xc00252aea0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.277 UTC [msp.identity] Verify -> DEBU 303a Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:28:00.277 UTC [msp.identity] Verify -> DEBU 303b Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [cauthdsl] func2 -> DEBU 303c 0xc00252aea0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [cauthdsl] func1 -> DEBU 303d 0xc00252aea0 gate 1556789280276085900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 303e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 303f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 3040 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 3041 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.278 UTC [gossip.gossip] handleMessage -> DEBU 3042 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:00.279 UTC [gossip.gossip] handleMessage -> DEBU 3043 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:00.279 UTC [msp] DeserializeIdentity -> DEBU 3044 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.279 UTC [msp] DeserializeIdentity -> DEBU 3045 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.280 UTC [msp] DeserializeIdentity -> DEBU 3046 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.280 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3047 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:00.280 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3048 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.280 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3049 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [policies] Evaluate -> DEBU 304a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [policies] Evaluate -> DEBU 304b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [policies] Evaluate -> DEBU 304c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [cauthdsl] func1 -> DEBU 304d 0xc00370aa20 gate 1556789280281536300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [cauthdsl] func2 -> DEBU 304e 0xc00370aa20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.281 UTC [cauthdsl] func2 -> DEBU 304f 0xc00370aa20 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.291 UTC [cauthdsl] func2 -> DEBU 3050 0xc00370aa20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:00.291 UTC [cauthdsl] func2 -> DEBU 3051 0xc00370aa20 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.292 UTC [cauthdsl] func1 -> DEBU 3052 0xc00370aa20 gate 1556789280281536300 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.292 UTC [policies] Evaluate -> DEBU 3053 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.296 UTC [policies] Evaluate -> DEBU 3054 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.296 UTC [policies] Evaluate -> DEBU 3055 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func1 -> DEBU 3056 0xc00370b260 gate 1556789280296953500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 3057 0xc00370b260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 3058 0xc00370b260 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 3059 0xc00370b260 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [msp.identity] Verify -> DEBU 305a Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [msp.identity] Verify -> DEBU 305b Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 305c 0xc00370b260 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [cauthdsl] func1 -> DEBU 305d 0xc00370b260 gate 1556789280296953500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [policies] Evaluate -> DEBU 305e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [policies] Evaluate -> DEBU 305f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.297 UTC [policies] Evaluate -> DEBU 3060 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.300 UTC [policies] Evaluate -> DEBU 3061 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.301 UTC [msp.identity] Verify -> DEBU 3062 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +peer0.org1.example.com | "2019-05-02 09:28:00.302 UTC [msp.identity] Verify -> DEBU 3063 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +peer0.org1.example.com | "2019-05-02 09:28:00.302 UTC [msp.identity] Verify -> DEBU 3064 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:28:00.303 UTC [msp.identity] Verify -> DEBU 3065 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:28:00.303 UTC [msp] DeserializeIdentity -> DEBU 3066 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [msp] DeserializeIdentity -> DEBU 3067 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3068 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3069 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 306a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [policies] Evaluate -> DEBU 306b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [policies] Evaluate -> DEBU 306c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [policies] Evaluate -> DEBU 306d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [cauthdsl] func1 -> DEBU 306e 0xc0031d3890 gate 1556789280304762700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [cauthdsl] func2 -> DEBU 306f 0xc0031d3890 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [cauthdsl] func2 -> DEBU 3070 0xc0031d3890 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.304 UTC [cauthdsl] func2 -> DEBU 3071 0xc0031d3890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 3072 0xc0031d3890 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func1 -> DEBU 3073 0xc0031d3890 gate 1556789280304762700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [policies] Evaluate -> DEBU 3074 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [policies] Evaluate -> DEBU 3075 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [policies] Evaluate -> DEBU 3076 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func1 -> DEBU 3077 0xc0032220d0 gate 1556789280305516800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 3078 0xc0032220d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 3079 0xc0032220d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 307a 0xc0032220d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [msp.identity] Verify -> DEBU 307b Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:28:00.305 UTC [msp.identity] Verify -> DEBU 307c Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:28:00.306 UTC [cauthdsl] func2 -> DEBU 307d 0xc0032220d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [cauthdsl] func1 -> DEBU 307e 0xc0032220d0 gate 1556789280305516800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 307f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 3080 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 3081 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 3082 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:00.307 UTC [gossip.gossip] handleMessage -> DEBU 3083 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:00.513 UTC [gossip.gossip] handleMessage -> DEBU 3084 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:00.513 UTC [msp] DeserializeIdentity -> DEBU 3085 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.513 UTC [msp] DeserializeIdentity -> DEBU 3086 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:00.513 UTC [gossip.gossip] handleMessage -> DEBU 3087 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:00.570 UTC [gossip.gossip] handleMessage -> DEBU 3088 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:00.571 UTC [gossip.pull] HandleMessage -> DEBU 3089 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:00.571 UTC [gossip.pull] SendDigest -> DEBU 308a Sending BLOCK_MSG digest: [1 2 3 4 5 6 7 8] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:00.571 UTC [gossip.gossip] handleMessage -> DEBU 308b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.604 UTC [msp.identity] Sign -> DEBU 308c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151021 " +peer0.org1.example.com | "2019-05-02 09:28:01.604 UTC [msp.identity] Sign -> DEBU 308d Sign: digest: 6CEFE7D0473B4E118851FB15DB8292827AA4E55AA097DF10B2FA116BB361EB8E " +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [msp.identity] Sign -> DEBU 308e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [msp.identity] Sign -> DEBU 308f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [msp] DeserializeIdentity -> DEBU 3090 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] Send -> DEBU 3091 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [msp] DeserializeIdentity -> DEBU 3092 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] Send -> DEBU 3093 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] Send -> DEBU 3094 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3095 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3096 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3097 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3098 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3099 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 309a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.625 UTC [gossip.comm] func1 -> DEBU 309b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.625 UTC [gossip.gossip] handleMessage -> DEBU 309c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.625 UTC [gossip.gossip] handleMessage -> DEBU 309d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 309e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.625 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 309f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:01.626 UTC [msp.identity] Verify -> DEBU 30a0 Verify: digest = 00000000 6c ef e7 d0 47 3b 4e 11 88 51 fb 15 db 82 92 82 |l...G;N..Q......| +peer0.org1.example.com | 00000010 7a a4 e5 5a a0 97 df 10 b2 fa 11 6b b3 61 eb 8e |z..Z.......k.a..|" +peer0.org1.example.com | "2019-05-02 09:28:01.626 UTC [msp.identity] Verify -> DEBU 30a1 Verify: sig = 00000000 30 44 02 20 6b d7 43 74 6b 3e 93 33 78 03 ea cb |0D. k.Ctk>.3x...| +peer0.org1.example.com | 00000010 fa 91 ee f7 f8 9f 92 5e 72 06 7f 91 c8 00 1f ef |.......^r.......| +peer0.org1.example.com | 00000020 af fd b2 a6 02 20 2e e8 95 7e d8 a1 92 1d 04 8d |..... ...~......| +peer0.org1.example.com | 00000030 c9 af bb ec 04 8a b1 cc 51 2b 84 c4 70 50 e6 c1 |........Q+..pP..| +peer0.org1.example.com | 00000040 6d bb 54 75 e6 f9 |m.Tu..|" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [gossip.gossip] handleMessage -> DEBU 30a2 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [gossip.pull] HandleMessage -> DEBU 30a3 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [gossip.pull] SendDigest -> DEBU 30aa Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [gossip.gossip] handleMessage -> DEBU 30ab Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.647 UTC [gossip.gossip] handleMessage -> DEBU 30ac Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ad Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.discovery] isSentByMe -> DEBU 30ae Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 30af Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30b2 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [msp] DeserializeIdentity -> DEBU 30b3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30b5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30b6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [policies] Evaluate -> DEBU 30b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [policies] Evaluate -> DEBU 30b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [policies] Evaluate -> DEBU 30b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:01.648 UTC [cauthdsl] func1 -> DEBU 30ba 0xc00268cc40 gate 1556789281648918000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30bb 0xc00268cc40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30bc 0xc00268cc40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30bd 0xc00268cc40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30be 0xc00268cc40 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func1 -> DEBU 30bf 0xc00268cc40 gate 1556789281648918000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func1 -> DEBU 30c3 0xc00268d480 gate 1556789281649313100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c4 0xc00268d480 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c5 0xc00268d480 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c6 0xc00268d480 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [msp.identity] Verify -> DEBU 30c7 Verify: digest = 00000000 d0 ef 71 3c 59 d2 9a e9 ce 07 8f 2d ef 23 1e 4f |..q DEBU 30c8 Verify: sig = 00000000 30 45 02 21 00 b6 df 1c c9 fa 2f 0c e5 da 0d 89 |0E.!....../.....| +peer0.org1.example.com | 00000010 89 79 4e 26 51 9b af 8f 22 ea 3a 6a 6c aa a2 b0 |.yN&Q...".:jl...| +peer0.org1.example.com | 00000020 4d f8 b5 dd 06 02 20 73 77 da d5 7e 80 1f fb f5 |M..... sw..~....| +peer0.org1.example.com | 00000030 ec ef b8 ea 2e 84 01 cf 2e 4f b9 fd bb 8d 1d be |.........O......| +peer0.org1.example.com | 00000040 61 9d e1 82 21 48 7d |a...!H}|" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c9 0xc00268d480 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [cauthdsl] func1 -> DEBU 30ca 0xc00268d480 gate 1556789281649313100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30cd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 30cf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d1 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 " +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d2 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 " +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 30d5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30d6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] sendMemResponse -> DEBU 30d7 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [msp] DeserializeIdentity -> DEBU 30d8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [msp] DeserializeIdentity -> DEBU 30d9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [msp] DeserializeIdentity -> DEBU 30da Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.comm] Send -> DEBU 30db Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.discovery] sendMemResponse -> DEBU 30dc Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.comm] sendToEndpoint -> DEBU 30dd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.comm] sendToEndpoint -> DEBU 30de Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.gossip] handleMessage -> DEBU 30df Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.650 UTC [gossip.gossip] handleMessage -> DEBU 30e0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [msp] DeserializeIdentity -> DEBU 30e1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [msp] DeserializeIdentity -> DEBU 30e2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [msp] DeserializeIdentity -> DEBU 30e3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.gossip] handleMessage -> DEBU 30e4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.gossip] handleMessage -> DEBU 30e5 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.gossip] handleMessage -> DEBU 30e6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30e7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30e8 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [msp.identity] Verify -> DEBU 30e9 Verify: digest = 00000000 6c ef e7 d0 47 3b 4e 11 88 51 fb 15 db 82 92 82 |l...G;N..Q......| +peer0.org1.example.com | 00000010 7a a4 e5 5a a0 97 df 10 b2 fa 11 6b b3 61 eb 8e |z..Z.......k.a..|" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [msp.identity] Verify -> DEBU 30ea Verify: sig = 00000000 30 44 02 20 6b d7 43 74 6b 3e 93 33 78 03 ea cb |0D. k.Ctk>.3x...| +peer0.org1.example.com | 00000010 fa 91 ee f7 f8 9f 92 5e 72 06 7f 91 c8 00 1f ef |.......^r.......| +peer0.org1.example.com | 00000020 af fd b2 a6 02 20 2e e8 95 7e d8 a1 92 1d 04 8d |..... ...~......| +peer0.org1.example.com | 00000030 c9 af bb ec 04 8a b1 cc 51 2b 84 c4 70 50 e6 c1 |........Q+..pP..| +peer0.org1.example.com | 00000040 6d bb 54 75 e6 f9 |m.Tu..|" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.discovery] handleAliveMessage -> DEBU 30eb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.discovery] isSentByMe -> DEBU 30ec Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.651 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ed Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ee Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [gossip.comm] func1 -> DEBU 30ef Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [gossip.gossip] handleMessage -> DEBU 30f0 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [gossip.pull] HandleMessage -> DEBU 30f1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.652 UTC [gossip.pull] SendDigest -> DEBU 30f8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.gossip] handleMessage -> DEBU 30f9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.gossip] handleMessage -> DEBU 30fa Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.gossip] handleMessage -> DEBU 30fb Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30fc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30fd Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 30fe Verify: digest = 00000000 6c ef e7 d0 47 3b 4e 11 88 51 fb 15 db 82 92 82 |l...G;N..Q......| +peer0.org1.example.com | 00000010 7a a4 e5 5a a0 97 df 10 b2 fa 11 6b b3 61 eb 8e |z..Z.......k.a..|" +peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 30ff Verify: sig = 00000000 30 44 02 20 6b d7 43 74 6b 3e 93 33 78 03 ea cb |0D. k.Ctk>.3x...| +peer0.org1.example.com | 00000010 fa 91 ee f7 f8 9f 92 5e 72 06 7f 91 c8 00 1f ef |.......^r.......| +peer0.org1.example.com | 00000020 af fd b2 a6 02 20 2e e8 95 7e d8 a1 92 1d 04 8d |..... ...~......| +peer0.org1.example.com | 00000030 c9 af bb ec 04 8a b1 cc 51 2b 84 c4 70 50 e6 c1 |........Q+..pP..| +peer0.org1.example.com | 00000040 6d bb 54 75 e6 f9 |m.Tu..|" +peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 3100 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 3101 Verify: sig = 00000000 30 44 02 21 00 e2 28 8d 93 0e 5f e2 37 61 8b 26 |0D.!..(..._.7a.&| +peer0.org1.example.com | 00000010 c6 79 d6 da 50 72 8b 9f 4b 65 41 2e cb 16 d7 95 |.y..Pr..KeA.....| +peer0.org1.example.com | 00000020 fa af 3a 35 f8 02 1f 55 77 32 2c 63 1c c5 f3 49 |..:5...Uw2,c...I| +peer0.org1.example.com | 00000030 b4 7c df 00 c5 46 1f d8 fc 1e c7 46 ac e1 d8 27 |.|...F.....F...'| +peer0.org1.example.com | 00000040 81 b8 fc b5 d7 b9 |......|" +peer0.org1.example.com | "2019-05-02 09:28:01.653 UTC [gossip.discovery] handleAliveMessage -> DEBU 3102 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.654 UTC [gossip.discovery] isSentByMe -> DEBU 3103 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.685 UTC [gossip.gossip] handleMessage -> DEBU 3104 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.685 UTC [gossip.pull] HandleMessage -> DEBU 3105 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.685 UTC [gossip.pull] SendDigest -> DEBU 3106 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:01.685 UTC [gossip.gossip] handleMessage -> DEBU 3107 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.686 UTC [gossip.gossip] handleMessage -> DEBU 3108 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.687 UTC [gossip.comm] func1 -> DEBU 3109 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.699 UTC [msp] DeserializeIdentity -> DEBU 310a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.699 UTC [msp] DeserializeIdentity -> DEBU 310b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.699 UTC [gossip.pull] Hello -> DEBU 310c Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:01.702 UTC [msp] DeserializeIdentity -> DEBU 310d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.702 UTC [msp] DeserializeIdentity -> DEBU 310e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.702 UTC [gossip.comm] Send -> DEBU 310f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:01.703 UTC [gossip.comm] sendToEndpoint -> DEBU 3110 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.703 UTC [gossip.comm] sendToEndpoint -> DEBU 3111 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.pull] Hello -> DEBU 3112 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.comm] Send -> DEBU 3113 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.pull] Hello -> DEBU 3114 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.comm] Send -> DEBU 3115 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.pull] Hello -> DEBU 3116 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.comm] Send -> DEBU 3117 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.comm] sendToEndpoint -> DEBU 3118 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.704 UTC [gossip.comm] sendToEndpoint -> DEBU 3119 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.706 UTC [gossip.comm] sendToEndpoint -> DEBU 311a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.706 UTC [gossip.comm] sendToEndpoint -> DEBU 311b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.706 UTC [gossip.comm] sendToEndpoint -> DEBU 311c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.711 UTC [gossip.comm] sendToEndpoint -> DEBU 311d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.711 UTC [gossip.comm] func1 -> DEBU 311e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 311f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3120 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3121 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3122 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3123 Verify: digest = 00000000 48 53 ee 5c 4c 3e e4 d3 4e 8f 96 84 9a ac a3 8d |HS.\L>..N.......| +peer0.org1.example.com | 00000010 ed 53 4d 86 94 cc 76 25 b4 41 f7 f1 89 1d d7 b0 |.SM...v%.A......|" +peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3124 Verify: sig = 00000000 30 45 02 21 00 9c d7 15 31 f6 45 24 c3 70 48 39 |0E.!....1.E$.pH9| +peer0.org1.example.com | 00000010 ae bd b8 f1 03 40 47 26 45 f2 76 4d f6 20 3c ee |.....@G&E.vM. <.| +peer0.org1.example.com | 00000020 bc 6c 4f 63 5c 02 20 33 c3 d3 9b c6 0f 71 67 02 |.lOc\. 3.....qg.| +peer0.org1.example.com | 00000030 11 1b cb a9 22 ac 27 48 24 82 57 36 a3 96 3e c0 |....".'H$.W6..>.| +peer0.org1.example.com | 00000040 40 aa 4c 75 58 84 2f |@.LuX./|" +peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3125 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3126 Verify: sig = 00000000 30 44 02 20 14 d7 8d c3 c1 30 71 df cd b8 41 10 |0D. .....0q...A.| +peer0.org1.example.com | 00000010 95 8d 4a c4 e4 23 5b 54 f9 c9 23 3d 93 17 3d ea |..J..#[T..#=..=.| +peer0.org1.example.com | 00000020 0e 20 c9 6d 02 20 27 65 aa 8c 81 7e 2f 11 d5 b1 |. .m. 'e...~/...| +peer0.org1.example.com | 00000030 cd d1 f1 44 cd 61 45 e4 ae 33 e8 c2 50 3d 9a 93 |...D.aE..3..P=..| +peer0.org1.example.com | 00000040 e5 ce bf 36 d4 17 |...6..|" +peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [gossip.discovery] handleAliveMessage -> DEBU 3127 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3128 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3129 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 " +peer0.org1.example.com | "2019-05-02 09:28:01.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 312a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 " +peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 312b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 312c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 312d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 312e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.discovery] sendMemResponse -> DEBU 312f Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [msp] DeserializeIdentity -> DEBU 3130 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [msp] DeserializeIdentity -> DEBU 3131 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.713 UTC [gossip.comm] Send -> DEBU 3132 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3133 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3134 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 3135 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 3136 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 3137 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3138 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3139 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 313a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 313b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 313c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 313d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 313e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 313f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3140 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3141 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3142 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3143 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func1 -> DEBU 3144 0xc003d94e10 gate 1556789281715104400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3145 0xc003d94e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3146 0xc003d94e10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3147 0xc003d94e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3148 0xc003d94e10 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [cauthdsl] func1 -> DEBU 3149 0xc003d94e10 gate 1556789281715104400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:01.714 UTC [gossip.discovery] sendMemResponse -> DEBU 314a Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:01.719 UTC [gossip.comm] sendToEndpoint -> DEBU 314b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.719 UTC [gossip.comm] sendToEndpoint -> DEBU 314c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.719 UTC [gossip.gossip] handleMessage -> DEBU 314d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9695688311555706345 , Msg_type: BLOCK_MSG, digests: [1 3 4 5 6 7 8 2], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.pull] HandleMessage -> DEBU 314e GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9695688311555706345 , Msg_type: BLOCK_MSG, digests: [1 3 4 5 6 7 8 2], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 314f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3150 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7896500689143047538 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.pull] HandleMessage -> DEBU 3151 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7896500689143047538 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3152 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.comm] func1 -> DEBU 3153 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10766680169397763346 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3154 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10766680169397763346 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.pull] HandleMessage -> DEBU 3155 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10766680169397763346 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3156 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3157 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3158 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3159 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func1 -> DEBU 315a 0xc003d956d0 gate 1556789281724493100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 315b 0xc003d956d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 315c 0xc003d956d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 315d 0xc003d956d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [msp.identity] Verify -> DEBU 315e Verify: digest = 00000000 56 97 ff ce ca 60 9d ee 53 04 d7 ae 73 80 31 93 |V....`..S...s.1.| +peer0.org1.example.com | 00000010 9f d2 cf 79 d3 74 2a af c1 f1 19 59 62 42 52 50 |...y.t*....YbBRP|" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [msp.identity] Verify -> DEBU 315f Verify: sig = 00000000 30 45 02 21 00 a5 ce 70 09 cf 42 3d 9d d1 55 cd |0E.!...p..B=..U.| +peer0.org1.example.com | 00000010 a7 2f 28 50 65 e8 72 4e bf 61 09 6b ae 51 04 59 |./(Pe.rN.a.k.Q.Y| +peer0.org1.example.com | 00000020 5a b9 2f bf 5d 02 20 1b 61 2d 29 13 9b b9 88 54 |Z./.]. .a-)....T| +peer0.org1.example.com | 00000030 21 6f 85 5e d0 c3 d7 89 83 29 f5 f5 0b a0 77 84 |!o.^.....)....w.| +peer0.org1.example.com | 00000040 0c 31 69 cf 79 7f e3 |.1i.y..|" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 3160 0xc003d956d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [cauthdsl] func1 -> DEBU 3161 0xc003d956d0 gate 1556789281724493100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3162 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3163 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [policies] Evaluate -> DEBU 3164 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [policies] Evaluate -> DEBU 3165 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 3166 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 3167 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 3168 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 " +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 3169 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 " +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 316a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 316b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 316c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 316d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] sendMemResponse -> DEBU 316e Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [msp] DeserializeIdentity -> DEBU 316f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [msp] DeserializeIdentity -> DEBU 3170 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [msp] DeserializeIdentity -> DEBU 3171 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.comm] Send -> DEBU 3172 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.discovery] sendMemResponse -> DEBU 3173 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:01.725 UTC [gossip.comm] sendToEndpoint -> DEBU 3174 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.726 UTC [gossip.comm] sendToEndpoint -> DEBU 3175 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:01.737 UTC [gossip.gossip] handleMessage -> DEBU 3176 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 357036938197498236 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.737 UTC [gossip.pull] HandleMessage -> DEBU 3177 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 357036938197498236 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:01.737 UTC [gossip.gossip] handleMessage -> DEBU 3178 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:02.321 UTC [gossip.election] waitForInterrupt -> DEBU 3179 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:28:02.321 UTC [gossip.election] IsLeader -> DEBU 317a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:28:02.321 UTC [msp.identity] Sign -> DEBU 317b Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100A1801 " +peer0.org1.example.com | "2019-05-02 09:28:02.321 UTC [msp.identity] Sign -> DEBU 317c Sign: digest: 39011A784D8265CF26E4949B56D8EADCEAC3516E1B7DE5319533E33B891E4D76 " +peer0.org1.example.com | "2019-05-02 09:28:02.321 UTC [gossip.election] waitForInterrupt -> DEBU 317d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 317e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 317f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3180 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3181 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [gossip.comm] Send -> DEBU 3182 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3183 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3184 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:02.330 UTC [gossip.comm] sendToEndpoint -> DEBU 3185 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:02.330 UTC [gossip.comm] sendToEndpoint -> DEBU 3186 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:03.803 UTC [gossip.comm] func1 -> DEBU 3187 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:03.804 UTC [gossip.gossip] handleMessage -> DEBU 3188 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:03.804 UTC [gossip.gossip] handleMessage -> DEBU 3189 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:03.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 318a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:03.805 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 318b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:03.806 UTC [msp] DeserializeIdentity -> DEBU 318c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:03.807 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 318d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:03.807 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 318e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:03.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 318f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:03.809 UTC [policies] Evaluate -> DEBU 3190 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:03.809 UTC [policies] Evaluate -> DEBU 3191 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:03.810 UTC [policies] Evaluate -> DEBU 3192 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:03.810 UTC [cauthdsl] func1 -> DEBU 3193 0xc00421efe0 gate 1556789283810632600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:03.811 UTC [cauthdsl] func2 -> DEBU 3194 0xc00421efe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:03.811 UTC [cauthdsl] func2 -> DEBU 3195 0xc00421efe0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:03.816 UTC [cauthdsl] func2 -> DEBU 3197 0xc00421efe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:03.816 UTC [cauthdsl] func2 -> DEBU 3198 0xc00421efe0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:03.815 UTC [gossip.gossip] handleMessage -> DEBU 3196 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:03.817 UTC [cauthdsl] func1 -> DEBU 3199 0xc00421efe0 gate 1556789283810632600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:03.819 UTC [policies] Evaluate -> DEBU 319a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:03.819 UTC [policies] Evaluate -> DEBU 319b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:03.820 UTC [policies] Evaluate -> DEBU 319c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:03.821 UTC [cauthdsl] func1 -> DEBU 319d 0xc00421f820 gate 1556789283821644400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:03.822 UTC [cauthdsl] func2 -> DEBU 319e 0xc00421f820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:03.823 UTC [cauthdsl] func2 -> DEBU 319f 0xc00421f820 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:03.824 UTC [cauthdsl] func2 -> DEBU 31a0 0xc00421f820 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:03.825 UTC [msp.identity] Verify -> DEBU 31a1 Verify: digest = 00000000 df 2b 57 44 7e 39 a4 59 4c 87 2a f5 02 ea f2 c8 |.+WD~9.YL.*.....| +peer0.org1.example.com | 00000010 7a 90 8d 5a b8 a9 a4 e6 b6 0f 58 df 95 34 dc ff |z..Z......X..4..|" +peer0.org1.example.com | "2019-05-02 09:28:03.826 UTC [msp.identity] Verify -> DEBU 31a2 Verify: sig = 00000000 30 45 02 21 00 c4 c1 07 41 6a d9 6c 75 ba b4 ee |0E.!....Aj.lu...| +peer0.org1.example.com | 00000010 5f 0b 0c 3a 5d fe a3 9c a4 19 b5 95 57 a0 53 51 |_..:].......W.SQ| +peer0.org1.example.com | 00000020 6b 1b 26 22 37 02 20 04 6d 8d 5a 22 8b f2 95 d5 |k.&"7. .m.Z"....| +peer0.org1.example.com | 00000030 3b 6d 58 87 6a 17 9b 80 f9 a7 1c 33 ec bc 9e 51 |;mX.j......3...Q| +peer0.org1.example.com | 00000040 ce da 4c 0c af 59 a8 |..L..Y.|" +peer0.org1.example.com | "2019-05-02 09:28:03.828 UTC [cauthdsl] func2 -> DEBU 31a3 0xc00421f820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:03.829 UTC [cauthdsl] func1 -> DEBU 31a4 0xc00421f820 gate 1556789283821644400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:03.830 UTC [policies] Evaluate -> DEBU 31a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:03.830 UTC [policies] Evaluate -> DEBU 31a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:03.832 UTC [policies] Evaluate -> DEBU 31a7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:03.832 UTC [policies] Evaluate -> DEBU 31a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:03.833 UTC [gossip.discovery] handleAliveMessage -> DEBU 31a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:03.834 UTC [gossip.discovery] learnExistingMembers -> DEBU 31aa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:03.835 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ab updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 " +peer0.org1.example.com | "2019-05-02 09:28:03.836 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ac Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 " +peer0.org1.example.com | "2019-05-02 09:28:03.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ad Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:03.838 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ae Exiting" +peer0.org1.example.com | "2019-05-02 09:28:03.840 UTC [gossip.discovery] handleAliveMessage -> DEBU 31af Exiting" +peer0.org1.example.com | "2019-05-02 09:28:03.842 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31b0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:03.843 UTC [msp] DeserializeIdentity -> DEBU 31b1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [gossip.comm] Send -> DEBU 31b7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [msp] DeserializeIdentity -> DEBU 31b8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [msp] DeserializeIdentity -> DEBU 31b9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [gossip.comm] Send -> DEBU 31ba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [gossip.comm] sendToEndpoint -> DEBU 31bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [gossip.comm] sendToEndpoint -> DEBU 31bc Exiting" +peer0.org1.example.com | "2019-05-02 09:28:03.845 UTC [gossip.comm] sendToEndpoint -> DEBU 31bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:03.846 UTC [gossip.comm] sendToEndpoint -> DEBU 31be Exiting" +peer0.org1.example.com | "2019-05-02 09:28:03.843 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31bf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:03.847 UTC [gossip.gossip] handleMessage -> DEBU 31c0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:03.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c1 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:03.849 UTC [gossip.gossip] handleMessage -> DEBU 31c2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:03.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:03.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:03.851 UTC [gossip.gossip] handleMessage -> DEBU 31c4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 31c6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 31c7 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [policies] Evaluate -> DEBU 31c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [policies] Evaluate -> DEBU 31c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [policies] Evaluate -> DEBU 31ca == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [cauthdsl] func1 -> DEBU 31cb 0xc00426f550 gate 1556789284049776900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [cauthdsl] func2 -> DEBU 31cc 0xc00426f550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [cauthdsl] func2 -> DEBU 31cd 0xc00426f550 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.049 UTC [cauthdsl] func2 -> DEBU 31ce 0xc00426f550 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [msp.identity] Verify -> DEBU 31cf Verify: digest = 00000000 d4 e6 12 2a c2 c7 5b 23 94 4d f6 22 c9 25 13 0f |...*..[#.M.".%..| +peer0.org1.example.com | 00000010 c1 12 c9 e8 b1 26 4c de 4b 77 d2 92 4b 51 b6 14 |.....&L.Kw..KQ..|" +peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [msp.identity] Verify -> DEBU 31d0 Verify: sig = 00000000 30 45 02 21 00 d4 df 00 4d 03 fb af 6e 74 41 d9 |0E.!....M...ntA.| +peer0.org1.example.com | 00000010 64 60 25 3a 01 68 00 be d9 80 46 4a 39 aa b6 6c |d`%:.h....FJ9..l| +peer0.org1.example.com | 00000020 79 f3 2e e6 ee 02 20 69 59 df 5b e5 20 00 55 b5 |y..... iY.[. .U.| +peer0.org1.example.com | 00000030 36 5d db dc dd 7e dd 8e 2e 81 11 c2 7d 37 34 c3 |6]...~......}74.| +peer0.org1.example.com | 00000040 d1 c1 f1 c3 82 03 fe |.......|" +peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [cauthdsl] func2 -> DEBU 31d1 0xc00426f550 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [cauthdsl] func1 -> DEBU 31d2 0xc00426f550 gate 1556789284049776900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d5 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:28:04.050 UTC [blocksProvider] DeliverBlocks -> DEBU 31d7 [businesschannel] Adding payload to local buffer, blockNum = [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.state] addPayload -> DEBU 31d8 [businesschannel] Adding payload to local buffer, blockNum = [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.state] addPayload -> DEBU 31d9 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [blocksProvider] DeliverBlocks -> DEBU 31da [businesschannel] Gossiping block [9], peers number [3]" +peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.channel] AddToMsgStore -> DEBU 31db Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34890 bytes, seq: 9}, Envelope: 34923 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.pull] Add -> DEBU 31dc Added 9, total items: 9" +peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.state] deliverPayloads -> DEBU 31dd [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.state] deliverPayloads -> DEBU 31de [businesschannel] Transferring block [9] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-05-02 09:28:04.051 UTC [gossip.privdata] StoreBlock -> INFO 31df [businesschannel] Received block [9] from buffer" +peer0.org1.example.com | "2019-05-02 09:28:04.052 UTC [gossip.privdata] StoreBlock -> DEBU 31e0 [businesschannel] Validating block [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.052 UTC [committer.txvalidator] Validate -> DEBU 31e1 [businesschannel] START Block Validation for block [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.052 UTC [committer.txvalidator] Validate -> DEBU 31e2 expecting 1 block validation responses" +peer0.org1.example.com | "2019-05-02 09:28:04.052 UTC [committer.txvalidator] validateTx -> DEBU 31e3 [businesschannel] validateTx starts for block 0xc0033af8c0 env 0xc0023f2190 txn 0" +peer0.org1.example.com | "2019-05-02 09:28:04.052 UTC [protoutils] ValidateTransaction -> DEBU 31e4 ValidateTransactionEnvelope starts for envelope 0xc0023f2190" +peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [protoutils] ValidateTransaction -> DEBU 31e5 Header is channel_header:"\010\001\032\006\010\243\360\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030n\\\350s\236\316i\321\200\245E\241v\323\357b\221\266\256\307[\221\004\247" " +peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [protoutils] validateChannelHeader -> DEBU 31e6 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [protoutils] checkSignatureFromCreator -> DEBU 31e7 begin" +peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [msp] GetManagerForChain -> DEBU 31e8 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [msp] DeserializeIdentity -> DEBU 31e9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [msp.identity] newIdentity -> DEBU 31ea Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.053 UTC [msp.identity] Sign -> DEBU 31eb Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151022 " +peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [msp.identity] Sign -> DEBU 31ec Sign: digest: 5B60D2C483522D448385F8ECC85BE48D24592C7B9EE0507D39B1BBA9FCB594AC " +peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [protoutils] checkSignatureFromCreator -> DEBU 31ed creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [msp.identity] Sign -> DEBU 31ee Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [msp] Validate -> DEBU 31ef MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [msp.identity] Sign -> DEBU 31f0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [gossip.discovery] periodicalSendAlive -> DEBU 31f1 Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:28:04.054 UTC [protoutils] checkSignatureFromCreator -> DEBU 31f2 creator is valid" +peer0.org1.example.com | "2019-05-02 09:28:04.055 UTC [msp.identity] Verify -> DEBU 31f3 Verify: digest = 00000000 ee 16 cd a5 d4 21 24 67 68 81 7d 03 6e 9c 38 ef |.....!$gh.}.n.8.| +peer0.org1.example.com | 00000010 e9 00 7f a0 5b 31 09 e4 f2 2a c3 f4 8c 3f 33 f6 |....[1...*...?3.|" +peer0.org1.example.com | "2019-05-02 09:28:04.055 UTC [msp.identity] Verify -> DEBU 31f4 Verify: sig = 00000000 30 45 02 21 00 b5 41 bd ed 21 97 bc c2 3a d9 a4 |0E.!..A..!...:..| +peer0.org1.example.com | 00000010 5d 1d 40 a2 44 9c 84 8a 70 3a 7d 04 cf 03 5f 51 |].@.D...p:}..._Q| +peer0.org1.example.com | 00000020 60 44 a8 fb e8 02 20 0a d3 c5 d1 4b 45 a6 76 26 |`D.... ....KE.v&| +peer0.org1.example.com | 00000030 f3 8a f0 be 0d 0d e8 b9 fd 97 27 13 40 da ef 59 |..........'.@..Y| +peer0.org1.example.com | 00000040 9b 10 bb ec fa 93 92 |.......|" +peer0.org1.example.com | "2019-05-02 09:28:04.055 UTC [protoutils] checkSignatureFromCreator -> DEBU 31f5 exits successfully" +peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [protoutils] validateConfigTransaction -> DEBU 31f6 validateConfigTransaction starts for data 0xc004578000, header channel_header:"\010\001\032\006\010\243\360\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030n\\\350s\236\316i\321\200\245E\241v\323\357b\221\266\256\307[\221\004\247" " +peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [committer.txvalidator] validateTx -> DEBU 31f7 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31f8 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31f9 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31fa Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [msp] DeserializeIdentity -> DEBU 31fb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [msp] DeserializeIdentity -> DEBU 31fd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31fc Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [msp] DeserializeIdentity -> DEBU 31fe Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 31ff Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3200 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [msp] DeserializeIdentity -> DEBU 3201 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3202 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3203 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3204 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3205 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3207 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.057 UTC [gossip.comm] Send -> DEBU 3206 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34890 bytes, seq: 9}, Envelope: 34923 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3208 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3209 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 320a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320b Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320c Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 320d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3210 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 3211 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3212 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3213 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] Send -> DEBU 3214 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3215 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3216 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 3217 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3218 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] Send -> DEBU 3219 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321a Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321b Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] Send -> DEBU 321d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321e Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321f Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3220 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] verifyDeltaSet -> DEBU 3221 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3222 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] verifyDeltaSet -> DEBU 3223 Processing change to key: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [common.configtx] policyForItem -> DEBU 3224 Getting policy for item Application with mod_policy Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [policies] Manager -> DEBU 3225 Manager Channel looking up path []" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3226 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34890 bytes, seq: 9}, Envelope: 34923 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [policies] Manager -> DEBU 3227 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3228 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.058 UTC [policies] Manager -> DEBU 3229 Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.059 UTC [policies] Manager -> DEBU 322e Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 322f Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 3230 Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 3231 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 3232 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.072 UTC [policies] Manager -> DEBU 3233 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.072 UTC [policies] Evaluate -> DEBU 3234 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +peer0.org1.example.com | "2019-05-02 09:28:04.074 UTC [policies] Evaluate -> DEBU 3235 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.074 UTC [policies] Evaluate -> DEBU 3236 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] deduplicate -> WARN 3237 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] func1 -> DEBU 3238 0xc00036a2d0 gate 1556789284075449700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] func2 -> DEBU 3239 0xc00036a2d0 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-05-02 09:28:04.075 UTC [cauthdsl] func2 -> DEBU 323a 0xc00036a2d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.076 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 323b Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.076 UTC [cauthdsl] func2 -> DEBU 323c 0xc00036a2d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.076 UTC [msp.identity] Verify -> DEBU 323d Verify: digest = 00000000 55 f0 c2 94 3a 37 23 eb d0 1b da 18 4a 66 45 b5 |U...:7#.....JfE.| +peer0.org1.example.com | 00000010 54 12 61 d1 4b ae fe 57 e9 51 94 57 aa af 68 17 |T.a.K..W.Q.W..h.|" +peer0.org1.example.com | "2019-05-02 09:28:04.076 UTC [msp.identity] Verify -> DEBU 323e Verify: sig = 00000000 30 45 02 21 00 ef 26 69 f6 43 cc ea 70 a5 61 8d |0E.!..&i.C..p.a.| +peer0.org1.example.com | 00000010 ff a4 ff 24 9b 2c 47 7c 14 f4 82 75 2d 27 b6 b0 |...$.,G|...u-'..| +peer0.org1.example.com | 00000020 a2 6a 68 25 32 02 20 23 80 40 b2 b7 b1 c9 60 08 |.jh%2. #.@....`.| +peer0.org1.example.com | 00000030 cd 4e 09 a9 3c 63 75 29 2f 85 61 35 08 11 df c6 |.N.. DEBU 323f 0xc00036a2d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func1 -> DEBU 3240 0xc00036a2d0 gate 1556789284075449700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3241 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3242 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] deduplicate -> WARN 3244 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func1 -> DEBU 3245 0xc00036a9c0 gate 1556789284077249100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3246 0xc00036a9c0 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3247 0xc00036a9c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3248 0xc00036a9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3249 0xc00036a9c0 processing identity 1 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 324a Checking if identity satisfies ADMIN role for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 324b 0xc00036a9c0 principal matched by identity 1" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [msp.identity] Verify -> DEBU 324c Verify: digest = 00000000 70 27 54 c7 10 65 06 23 74 50 fc 01 20 7a 9f 22 |p'T..e.#tP.. z."| +peer0.org1.example.com | 00000010 df 75 70 9a b8 8e 15 04 cc 2d a3 ad 5e 15 ee 89 |.up......-..^...|" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [msp.identity] Verify -> DEBU 324d Verify: sig = 00000000 30 44 02 20 3e 34 30 a7 7a 34 94 d8 b3 73 97 db |0D. >40.z4...s..| +peer0.org1.example.com | 00000010 96 da 10 13 46 64 57 5e af 8c ec ad 13 2e 72 23 |....FdW^......r#| +peer0.org1.example.com | 00000020 12 36 e1 a7 02 20 67 6b 69 65 0e 27 d7 39 1b e1 |.6... gkie.'.9..| +peer0.org1.example.com | 00000030 07 2a cf 5f b4 cf 8d 8d 2e 70 bf ed ec 66 7c 6b |.*._.....p...f|k| +peer0.org1.example.com | 00000040 a3 af 89 d2 b2 af |......|" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 324e 0xc00036a9c0 principal evaluation succeeds for identity 1" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [cauthdsl] func1 -> DEBU 324f 0xc00036a9c0 gate 1556789284077249100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3250 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3251 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3252 Signature set satisfies policy /Channel/Application/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3253 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.077 UTC [common.configtx] verifyDeltaSet -> DEBU 3254 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3255 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3256 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3257 Processing change to key: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3258 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3259 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325a Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325c Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325d Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325e Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3260 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3261 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3262 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3263 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3264 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3265 Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3266 Setting policy for key LifecycleEndorsement to " +peer0.org1.example.com | "2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3267 Setting policy for key Readers to " +peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 3268 Setting policy for key Writers to " +peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 3269 Setting policy for key Admins to " +peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326a Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326b Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326c Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326d Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326e Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326f Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 3270 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 3271 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 3272 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.configtx] recurseConfigMap -> DEBU 3273 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] NewStandardValues -> DEBU 3274 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3275 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3276 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3277 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3278 Processing field: Consortium" +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3279 Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] NewStandardValues -> DEBU 327a Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 327b Processing field: ACLs" +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 327c Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] NewStandardValues -> DEBU 327d Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 327e Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [common.channelconfig] NewStandardValues -> DEBU 327f Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3280 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [common.channelconfig] Validate -> DEBU 3281 Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [common.channelconfig] validateMSP -> DEBU 3282 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [msp] newBccspMsp -> DEBU 3283 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [msp] New -> DEBU 3284 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [msp] Setup -> DEBU 3285 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.099 UTC [msp.identity] newIdentity -> DEBU 3286 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.104 UTC [msp.identity] newIdentity -> DEBU 3287 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3288 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [msp] Validate -> DEBU 3289 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [msp] getCertificationChain -> DEBU 328a MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [msp] hasOURole -> DEBU 328b MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [msp] getCertificationChain -> DEBU 328c MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] NewStandardValues -> DEBU 328d Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 328e Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] NewStandardValues -> DEBU 328f Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3290 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] Validate -> DEBU 3291 Anchor peers for org Org3MSP are " +peer0.org1.example.com | "2019-05-02 09:28:04.105 UTC [common.channelconfig] validateMSP -> DEBU 3292 Setting up MSP for org Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp] newBccspMsp -> DEBU 3293 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp] New -> DEBU 3294 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp] Setup -> DEBU 3295 Setting up MSP instance Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp.identity] newIdentity -> DEBU 3296 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +peer0.org1.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +peer0.org1.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp.identity] newIdentity -> DEBU 3297 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +peer0.org1.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +peer0.org1.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +peer0.org1.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +peer0.org1.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3298 Checking if identity satisfies role [CLIENT] for Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.106 UTC [msp] Validate -> DEBU 3299 MSP Org3MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] getCertificationChain -> DEBU 329a MSP Org3MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] hasOURole -> DEBU 329b MSP Org3MSP checking if the identity is a client" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] getCertificationChain -> DEBU 329c MSP Org3MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] NewStandardValues -> DEBU 329d Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 329e Processing field: AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] NewStandardValues -> DEBU 329f Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32a0 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] Validate -> DEBU 32a1 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [common.channelconfig] validateMSP -> DEBU 32a2 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] newBccspMsp -> DEBU 32a3 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] New -> DEBU 32a4 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:28:04.107 UTC [msp] Setup -> DEBU 32a5 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp.identity] newIdentity -> DEBU 32a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp.identity] newIdentity -> DEBU 32a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 32a8 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp] Validate -> DEBU 32a9 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp] getCertificationChain -> DEBU 32aa MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.108 UTC [msp] hasOURole -> DEBU 32ab MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [msp] getCertificationChain -> DEBU 32ac MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] NewStandardValues -> DEBU 32ad Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32ae Processing field: ConsensusType" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32af Processing field: BatchSize" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b0 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b1 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b2 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b3 Processing field: Capabilities" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] NewStandardValues -> DEBU 32b4 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b5 Processing field: Endpoints" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] NewStandardValues -> DEBU 32b6 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b7 Processing field: MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [common.channelconfig] validateMSP -> DEBU 32b8 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [msp] newBccspMsp -> DEBU 32b9 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [msp] New -> DEBU 32ba Creating Cache-MSP instance" +peer0.org1.example.com | "2019-05-02 09:28:04.109 UTC [msp] Setup -> DEBU 32bb Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-05-02 09:28:04.110 UTC [msp.identity] newIdentity -> DEBU 32bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.110 UTC [msp.identity] newIdentity -> DEBU 32bd Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.110 UTC [msp] Validate -> DEBU 32be MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:04.130 UTC [msp] Setup -> DEBU 32bf Setting up the MSP manager (4 msps)" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [msp] Setup -> DEBU 32c0 MSP manager setup complete, setup 4 msps" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c1 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c2 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c3 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c4 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c5 Proposed new policy Admins for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c6 Proposed new policy Endorsement for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c7 Proposed new policy Readers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c8 Proposed new policy Writers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c9 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32ca Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cb Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cc Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cd Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32ce Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cf Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d0 Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d1 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d3 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d4 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d5 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d6 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d7 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d8 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d9 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32da Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32db Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [common.configtx] addToMap -> DEBU 32dc Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [common.configtx] addToMap -> DEBU 32dd Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-05-02 09:28:04.132 UTC [common.configtx] addToMap -> DEBU 32de Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32df Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e5 Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e6 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ea Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32eb Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ec Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ed Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ee Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ef Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.140 UTC [common.configtx] addToMap -> DEBU 32f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.139 UTC [gossip.comm] func1 -> DEBU 32f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.140 UTC [gossip.gossip] handleMessage -> DEBU 32f3 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.140 UTC [gossip.gossip] handleMessage -> DEBU 32f4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.140 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.140 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32f6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [msp.identity] Verify -> DEBU 32f7 Verify: digest = 00000000 75 83 f6 94 57 c7 45 0f 0e 53 f0 09 37 54 0f de |u...W.E..S..7T..| +peer0.org1.example.com | 00000010 19 8a 7b 91 0a f0 59 14 f2 2f d0 dd 2b 5e 82 3d |..{...Y../..+^.=|" +peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [msp.identity] Verify -> DEBU 32f8 Verify: sig = 00000000 30 45 02 21 00 ee da e1 93 0a 08 cf 00 ba 07 2e |0E.!............| +peer0.org1.example.com | 00000010 43 46 5c 6a ab 97 5d 0c 16 00 c5 54 53 7a 69 9d |CF\j..]....TSzi.| +peer0.org1.example.com | 00000020 80 c3 9f bc 23 02 20 13 e3 48 2b 19 2c f4 2b 1f |....#. ..H+.,.+.| +peer0.org1.example.com | 00000030 1e 7b 63 88 ad 37 91 7a 40 f2 e5 cd 2e 3b ff 47 |.{c..7.z@....;.G| +peer0.org1.example.com | 00000040 2d 08 7f f0 9a f1 e9 |-......|" +peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fb updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 " +peer0.org1.example.com | "2019-05-02 09:28:04.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fc Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 " +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fd Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fe Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [gossip.discovery] handleAliveMessage -> DEBU 32ff Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3300 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3301 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3302 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3303 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3304 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3305 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3306 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3307 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3308 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3309 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 330a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330f Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3310 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3311 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3312 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3313 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3314 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3315 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3316 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3317 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3318 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3319 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 331a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331b Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331c Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331d Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331e Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.channelconfig] LogSanityChecks -> DEBU 331f As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [common.channelconfig] LogSanityChecks -> DEBU 3320 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [policies] Manager -> DEBU 3321 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [policies] Manager -> DEBU 3322 Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:28:04.145 UTC [policies] Manager -> DEBU 3323 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3324 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3325 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3326 Manager Channel/Application has managers Org3MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3327 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [common.channelconfig] LogSanityChecks -> DEBU 3328 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [common.channelconfig] LogSanityChecks -> DEBU 3329 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [common.channelconfig] LogSanityChecks -> DEBU 332a As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 332b Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332c Manager Channel has managers Application" +peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332d Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332e Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332f Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [common.channelconfig] LogSanityChecks -> DEBU 3330 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-05-02 09:28:04.147 UTC [common.capabilities] Supported -> DEBU 3331 Application capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [common.capabilities] Supported -> DEBU 3332 Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [msp] DeserializeIdentity -> DEBU 3333 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [msp] DeserializeIdentity -> DEBU 3334 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [msp] DeserializeIdentity -> DEBU 3335 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [gossip.comm] Send -> DEBU 3336 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [gossip.comm] Send -> DEBU 3337 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 3338 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 3339 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 333a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 333b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.150 UTC [gossip.gossip] handleMessage -> DEBU 333c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.150 UTC [gossip.gossip] handleMessage -> DEBU 333d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.discovery] handleMsgFromComm -> DEBU 333e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.discovery] handleMsgFromComm -> DEBU 333f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.148 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3340 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3341 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3342 Org3MSP anchor peers: []" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3343 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3344 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3345 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [msp] DeserializeIdentity -> DEBU 3346 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3347 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3348 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [policies] Evaluate -> DEBU 3349 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.153 UTC [policies] Evaluate -> DEBU 334a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [policies] Evaluate -> DEBU 334b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func1 -> DEBU 334c 0xc00264f900 gate 1556789284154067400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 334d 0xc00264f900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 334e 0xc00264f900 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 334f 0xc00264f900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 3350 0xc00264f900 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.154 UTC [cauthdsl] func1 -> DEBU 3351 0xc00264f900 gate 1556789284154067400 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [policies] Evaluate -> DEBU 3352 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [policies] Evaluate -> DEBU 3353 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [policies] Evaluate -> DEBU 3354 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [cauthdsl] func1 -> DEBU 3355 0xc002cf4140 gate 1556789284155465100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [cauthdsl] func2 -> DEBU 3356 0xc002cf4140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [cauthdsl] func2 -> DEBU 3357 0xc002cf4140 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [cauthdsl] func2 -> DEBU 3358 0xc002cf4140 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [msp.identity] Verify -> DEBU 3359 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:28:04.155 UTC [msp.identity] Verify -> DEBU 335a Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 335b 0xc002cf4140 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 335c 0xc002cf4140 gate 1556789284155465100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 335d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 335e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 335f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3360 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [msp] DeserializeIdentity -> DEBU 3361 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3362 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3363 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3364 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3365 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3366 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 3367 0xc002cf5220 gate 1556789284156479200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3368 0xc002cf5220 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3369 0xc002cf5220 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 336a 0xc002cf5220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 336b 0xc002cf5220 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 336c 0xc002cf5220 gate 1556789284156479200 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 336d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 336e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 336f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 3370 0xc002cf5a60 gate 1556789284156813000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3371 0xc002cf5a60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3372 0xc002cf5a60 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3373 0xc002cf5a60 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.156 UTC [msp.identity] Verify -> DEBU 3374 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [msp.identity] Verify -> DEBU 3375 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3376 0xc002cf5a60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func1 -> DEBU 3377 0xc002cf5a60 gate 1556789284156813000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 3378 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 3379 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 337c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 337d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 3380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func1 -> DEBU 3381 0xc00303ca40 gate 1556789284157548500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3382 0xc00303ca40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3383 0xc00303ca40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3384 0xc00303ca40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [msp.identity] Verify -> DEBU 3385 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:28:04.157 UTC [msp.identity] Verify -> DEBU 3386 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:28:04.158 UTC [cauthdsl] func2 -> DEBU 3387 0xc00303ca40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [cauthdsl] func1 -> DEBU 3388 0xc00303ca40 gate 1556789284157548500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 3389 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 338a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 338b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 338c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [gossip.gossip] JoinChan -> INFO 338d Joining gossip network of channel businesschannel with 3 organizations" +peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [gossip.gossip] learnAnchorPeers -> INFO 338e Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-05-02 09:28:04.159 UTC [gossip.discovery] Connect -> DEBU 338f Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +peer0.org1.example.com | "2019-05-02 09:28:04.168 UTC [gossip.gossip] handleMessage -> DEBU 3390 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.gossip] handleMessage -> DEBU 3391 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.gossip] handleMessage -> DEBU 3392 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3393 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3394 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3395 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3396 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [msp] DeserializeIdentity -> DEBU 3397 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.170 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3398 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 339c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 339d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 339e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 339f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 33a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func1 -> DEBU 33a1 0xc003606160 gate 1556789284180530600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a2 0xc003606160 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a3 0xc003606160 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a4 0xc003606160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a5 0xc003606160 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [cauthdsl] func1 -> DEBU 33a6 0xc003606160 gate 1556789284180530600 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 33a7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 33a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func1 -> DEBU 33aa 0xc0036069a0 gate 1556789284181093500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33ab 0xc0036069a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33ac 0xc0036069a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33ad 0xc0036069a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [msp.identity] Verify -> DEBU 33ae Verify: digest = 00000000 0a 22 f0 7b 96 0a ac bc d7 0f 52 c5 e3 cc 2d a7 |.".{......R...-.| +peer0.org1.example.com | 00000010 87 f1 1e e7 77 b1 c5 d6 72 23 4e 39 d5 c3 64 1a |....w...r#N9..d.|" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [msp.identity] Verify -> DEBU 33af Verify: sig = 00000000 30 45 02 21 00 d1 90 5b 08 95 ac 58 ec af c0 89 |0E.!...[...X....| +peer0.org1.example.com | 00000010 f5 f6 33 11 d0 3c 01 85 5f f5 b2 89 e3 01 10 a1 |..3..<.._.......| +peer0.org1.example.com | 00000020 17 9c 39 be a5 02 20 2f 7b e5 7d 75 6b ea 70 e8 |..9... /{.}uk.p.| +peer0.org1.example.com | 00000030 59 f6 4d 65 e8 f0 fb 0d 6f f3 e9 7b 21 32 56 c7 |Y.Me....o..{!2V.| +peer0.org1.example.com | 00000040 0b 25 7e 5c fe c9 fd |.%~\...|" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33b0 0xc0036069a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [cauthdsl] func1 -> DEBU 33b1 0xc0036069a0 gate 1556789284181093500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 33b6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:04.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b8 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 " +peer0.org1.example.com | "2019-05-02 09:28:04.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b9 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 " +peer0.org1.example.com | "2019-05-02 09:28:04.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ba Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:04.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 33bb Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.191 UTC [gossip.discovery] handleAliveMessage -> DEBU 33bc Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33bd Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.172 UTC [gossip.gossip] handleMessage -> DEBU 3399 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.180 UTC [grpc] DialContext -> DEBU 339b parsed scheme: """ +peer0.org1.example.com | "2019-05-02 09:28:04.196 UTC [grpc] DialContext -> DEBU 33be scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-05-02 09:28:04.169 UTC [gossip.discovery] Connect -> DEBU 339a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 33bf No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-05-02 09:28:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 33c0 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-05-02 09:28:04.197 UTC [grpc] UpdateState -> DEBU 33c1 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" +peer0.org1.example.com | "2019-05-02 09:28:04.198 UTC [grpc] switchBalancer -> DEBU 33c2 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-05-02 09:28:04.198 UTC [grpc] HandleSubConnStateChange -> DEBU 33c3 pickfirstBalancer: HandleSubConnStateChange: 0xc0036ce130, CONNECTING" +peer0.org1.example.com | "2019-05-02 09:28:04.198 UTC [msp] DeserializeIdentity -> DEBU 33c4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.203 UTC [gossip.comm] Send -> DEBU 33ca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.203 UTC [msp] DeserializeIdentity -> DEBU 33cb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.203 UTC [msp] DeserializeIdentity -> DEBU 33cc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.203 UTC [gossip.comm] Send -> DEBU 33cd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.207 UTC [gossip.comm] sendToEndpoint -> DEBU 33ce Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.207 UTC [gossip.comm] sendToEndpoint -> DEBU 33cf Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.210 UTC [gossip.comm] sendToEndpoint -> DEBU 33d0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.210 UTC [gossip.comm] sendToEndpoint -> DEBU 33d1 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.211 UTC [gossip.comm] func1 -> DEBU 33d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.211 UTC [gossip.gossip] handleMessage -> DEBU 33d3 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.211 UTC [gossip.gossip] handleMessage -> DEBU 33d4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33d5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33d6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.220 UTC [comm.grpc.server] 1 -> INFO 33d7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.219Z grpc.peer_address=172.18.0.5:57068 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=180.2µs +peer0.org1.example.com | "2019-05-02 09:28:04.223 UTC [gossip.gossip] handleMessage -> DEBU 33d8 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.223 UTC [gossip.gossip] handleMessage -> DEBU 33d9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33db Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 33dc Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-05-02 09:28:04.225 UTC [gossip.service] updateEndpoints -> DEBU 33dd Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-05-02 09:28:04.226 UTC [msp] DeserializeIdentity -> DEBU 33de Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.235 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.253 UTC [msp] DeserializeIdentity -> DEBU 33e0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.255 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33e1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.256 UTC [peer] updateTrustedRoots -> DEBU 33e2 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-05-02 09:28:04.261 UTC [msp.identity] Sign -> DEBU 33e3 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:28:04.262 UTC [msp.identity] Sign -> DEBU 33e4 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:28:04.268 UTC [grpc] HandleSubConnStateChange -> DEBU 33e5 pickfirstBalancer: HandleSubConnStateChange: 0xc0036ce130, READY" +peer0.org1.example.com | "2019-05-02 09:28:04.276 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33e6 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:57068" +peer0.org1.example.com | "2019-05-02 09:28:04.277 UTC [msp.identity] Sign -> DEBU 33e8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:28:04.278 UTC [msp.identity] Sign -> DEBU 33e9 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:28:04.278 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33ea Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.283 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33eb Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:57068" +peer0.org1.example.com | "2019-05-02 09:28:04.284 UTC [grpc] infof -> DEBU 33ec transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:28:04.284 UTC [gossip.comm] readFromStream -> DEBU 33ed Got error, aborting: EOF" +peer0.org1.example.com | "2019-05-02 09:28:04.284 UTC [gossip.comm] func2 -> DEBU 33ee Client 172.18.0.9:42018 disconnected" +peer0.org1.example.com | "2019-05-02 09:28:04.285 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33ef Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.297 UTC [msp] DeserializeIdentity -> DEBU 33f3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.299 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.301 UTC [msp] DeserializeIdentity -> DEBU 33f5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.294 UTC [comm.grpc.server] 1 -> INFO 33f6 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:42018 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=41.3789506s +peer0.org1.example.com | "2019-05-02 09:28:04.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33f7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.276 UTC [msp] DeserializeIdentity -> DEBU 33e7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.291 UTC [gossip.comm] func1 -> DEBU 33f0 Got message: GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.291 UTC [grpc] infof -> DEBU 33f1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:28:04.291 UTC [msp] DeserializeIdentity -> DEBU 33f2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.304 UTC [gossip.comm] writeToStream -> DEBU 33f8 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:28:04.306 UTC [msp] DeserializeIdentity -> DEBU 33f9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.307 UTC [msp] DeserializeIdentity -> DEBU 33fa Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.315 UTC [peer] buildTrustedRootsForChain -> DEBU 33fb updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.318 UTC [comm.grpc.server] 1 -> INFO 33fc unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.318Z grpc.peer_address=172.18.0.6:53420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=127.9µs +peer0.org1.example.com | "2019-05-02 09:28:04.316 UTC [gossip.gossip] handleMessage -> DEBU 33fd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.320 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.320 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33ff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.320 UTC [gossip.comm] Send -> DEBU 3400 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.321 UTC [peer] buildTrustedRootsForChain -> DEBU 3401 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-05-02 09:28:04.322 UTC [gossip.gossip] handleMessage -> DEBU 3402 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3403 Got message: GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.324 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3408 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:04.324 UTC [msp] DeserializeIdentity -> DEBU 3409 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.325 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 340a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 340b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 340c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.327 UTC [policies] Evaluate -> DEBU 340d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.327 UTC [policies] Evaluate -> DEBU 340e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.327 UTC [policies] Evaluate -> DEBU 340f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.327 UTC [cauthdsl] func1 -> DEBU 3410 0xc00423e9d0 gate 1556789284327939700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3411 0xc00423e9d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3412 0xc00423e9d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3413 0xc00423e9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3414 0xc00423e9d0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [cauthdsl] func1 -> DEBU 3415 0xc00423e9d0 gate 1556789284327939700 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [policies] Evaluate -> DEBU 3416 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [policies] Evaluate -> DEBU 3417 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.328 UTC [policies] Evaluate -> DEBU 3418 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.330 UTC [cauthdsl] func1 -> DEBU 3419 0xc00423f210 gate 1556789284330064200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.330 UTC [cauthdsl] func2 -> DEBU 341a 0xc00423f210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.323 UTC [msp] DeserializeIdentity -> DEBU 3404 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.323 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3405 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.323 UTC [gossip.comm] sendToEndpoint -> DEBU 3406 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.323 UTC [peer] buildTrustedRootsForChain -> DEBU 3407 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-05-02 09:28:04.333 UTC [gossip.comm] sendToEndpoint -> DEBU 341b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.333 UTC [gossip.comm] sendToEndpoint -> DEBU 341c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.334 UTC [cauthdsl] func2 -> DEBU 341d 0xc00423f210 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.337 UTC [msp.identity] Sign -> DEBU 341e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:28:04.340 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 341f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.340 UTC [gossip.comm] sendToEndpoint -> DEBU 3420 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.344 UTC [peer] buildTrustedRootsForChain -> DEBU 3421 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-05-02 09:28:04.344 UTC [gossip.comm] sendToEndpoint -> DEBU 3422 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.347 UTC [gossip.comm] createConnection -> DEBU 3423 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:04.349 UTC [cauthdsl] func2 -> DEBU 3424 0xc00423f210 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.350 UTC [msp.identity] Sign -> DEBU 3425 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:28:04.352 UTC [policies] Evaluate -> DEBU 3426 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.354 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3427 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.354 UTC [gossip.comm] func1 -> DEBU 3428 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 727 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.355 UTC [comm.grpc.server] 1 -> INFO 3429 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.354Z grpc.peer_address=172.18.0.9:42206 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147µs +peer0.org1.example.com | "2019-05-02 09:28:04.355 UTC [peer] buildTrustedRootsForChain -> DEBU 342a adding app root CAs for MSP [Org3MSP]" +peer0.org1.example.com | "2019-05-02 09:28:04.357 UTC [msp.identity] Verify -> DEBU 342b Verify: digest = 00000000 6c 9b 11 78 32 10 3a c0 47 06 89 0f de 4e db a7 |l..x2.:.G....N..| +peer0.org1.example.com | 00000010 b6 2c d4 db 51 a0 a9 a4 a8 52 59 83 d5 0c 4e 8e |.,..Q....RY...N.|" +peer0.org1.example.com | "2019-05-02 09:28:04.360 UTC [gossip.comm] authenticateRemotePeer -> DEBU 342c Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53420" +peer0.org1.example.com | "2019-05-02 09:28:04.360 UTC [gossip.gossip] handleMessage -> DEBU 342d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.361 UTC [policies] Evaluate -> DEBU 342e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.364 UTC [msp] DeserializeIdentity -> DEBU 342f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.364 UTC [committer.txvalidator] validateTx -> DEBU 3430 config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-05-02 09:28:04.364 UTC [msp.identity] Verify -> DEBU 3431 Verify: sig = 00000000 30 44 02 20 38 57 22 43 d5 4e 72 41 bc e0 90 e4 |0D. 8W"C.NrA....| +peer0.org1.example.com | 00000010 6e 54 21 d2 52 29 95 d3 08 24 fe b4 28 ce 31 b3 |nT!.R)...$..(.1.| +peer0.org1.example.com | 00000020 64 21 b7 ab 02 20 3c df 10 32 c3 77 f1 d2 7d b2 |d!... <..2.w..}.| +peer0.org1.example.com | 00000030 71 16 ac a3 0f 99 fe f3 94 9e 90 04 54 39 58 b6 |q...........T9X.| +peer0.org1.example.com | 00000040 76 d0 a2 77 21 75 |v..w!u|" +peer0.org1.example.com | "2019-05-02 09:28:04.366 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3432 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53420" +peer0.org1.example.com | "2019-05-02 09:28:04.367 UTC [msp.identity] Verify -> DEBU 3433 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:28:04.367 UTC [grpc] DialContext -> DEBU 3434 parsed scheme: """ +peer0.org1.example.com | "2019-05-02 09:28:04.368 UTC [policies] Evaluate -> DEBU 3435 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.370 UTC [msp] DeserializeIdentity -> DEBU 3436 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.370 UTC [grpc] infof -> DEBU 3437 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:28:04.370 UTC [committer.txvalidator] validateTx -> DEBU 3438 [businesschannel] validateTx completes for block 0xc0033af8c0 env 0xc0023f2190 txn 0" +peer0.org1.example.com | "2019-05-02 09:28:04.370 UTC [committer.txvalidator] Validate -> DEBU 3439 got result for idx 0, code 0" +peer0.org1.example.com | "2019-05-02 09:28:04.370 UTC [cauthdsl] func2 -> DEBU 343a 0xc00423f210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.371 UTC [msp.identity] Verify -> DEBU 343b Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-05-02 09:28:04.372 UTC [msp.identity] Verify -> DEBU 343c Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:28:04.373 UTC [grpc] DialContext -> DEBU 343d scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-05-02 09:28:04.373 UTC [msp.identity] Sign -> DEBU 343e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:28:04.373 UTC [cauthdsl] func1 -> DEBU 343f 0xc0042e9de0 gate 1556789284373865000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.375 UTC [msp.identity] newIdentity -> DEBU 3440 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.375 UTC [committer.txvalidator] Validate -> INFO 3441 [businesschannel] Validated block [9] in 323ms" +peer0.org1.example.com | "2019-05-02 09:28:04.375 UTC [cauthdsl] func1 -> DEBU 3442 0xc00423f210 gate 1556789284330064200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.376 UTC [msp.identity] Verify -> DEBU 3443 Verify: sig = 00000000 30 44 02 20 54 ba d4 9b 33 a4 a2 cb 1b 20 6a 8a |0D. T...3.... j.| +peer0.org1.example.com | 00000010 03 d7 18 00 49 e3 fa be 26 85 d5 2b a3 8d 0c 26 |....I...&..+...&| +peer0.org1.example.com | 00000020 3b 3e 2f 07 02 20 64 92 23 0c 74 f5 36 42 9e 61 |;>/.. d.#.t.6B.a| +peer0.org1.example.com | 00000030 98 3d 4c 56 c9 9e bc 68 4b cc 54 6b a2 90 67 32 |.=LV...hK.Tk..g2| +peer0.org1.example.com | 00000040 e2 41 2b 3c 81 6c |.A+<.l|" +peer0.org1.example.com | "2019-05-02 09:28:04.377 UTC [msp.identity] Verify -> DEBU 3444 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +peer0.org1.example.com | "2019-05-02 09:28:04.377 UTC [grpc] UpdateState -> DEBU 3445 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" +peer0.org1.example.com | "2019-05-02 09:28:04.377 UTC [msp.identity] Sign -> DEBU 3446 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:28:04.377 UTC [cauthdsl] func2 -> DEBU 3447 0xc0042e9de0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.378 UTC [msp] Validate -> DEBU 3448 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:04.379 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3449 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-05-02 09:28:04.379 UTC [policies] Evaluate -> DEBU 344a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.380 UTC [msp.identity] Verify -> DEBU 344b Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +peer0.org1.example.com | "2019-05-02 09:28:04.380 UTC [gossip.comm] authenticateRemotePeer -> DEBU 344c Authenticated 172.18.0.6:53420" +peer0.org1.example.com | "2019-05-02 09:28:04.380 UTC [grpc] switchBalancer -> DEBU 344d ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-05-02 09:28:04.381 UTC [gossip.comm] authenticateRemotePeer -> DEBU 344e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:42206" +peer0.org1.example.com | "2019-05-02 09:28:04.381 UTC [cauthdsl] func2 -> DEBU 344f 0xc0042e9de0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.382 UTC [msp] getCertificationChain -> DEBU 3450 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.382 UTC [gossip.privdata] StoreBlock -> DEBU 3451 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-05-02 09:28:04.382 UTC [policies] Evaluate -> DEBU 3452 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.383 UTC [msp] DeserializeIdentity -> DEBU 3453 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.383 UTC [gossip.comm] GossipStream -> DEBU 3454 Servicing 172.18.0.6:53420" +peer0.org1.example.com | "2019-05-02 09:28:04.383 UTC [grpc] HandleSubConnStateChange -> DEBU 3455 pickfirstBalancer: HandleSubConnStateChange: 0xc0045cf780, CONNECTING" +peer0.org1.example.com | "2019-05-02 09:28:04.385 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3456 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42206" +peer0.org1.example.com | "2019-05-02 09:28:04.385 UTC [cauthdsl] func2 -> DEBU 3457 0xc0042e9de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-05-02 09:28:04.387 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3458 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.387 UTC [committer] preCommit -> DEBU 3459 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-05-02 09:28:04.388 UTC [policies] Evaluate -> DEBU 345a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.388 UTC [msp] DeserializeIdentity -> DEBU 345b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.389 UTC [gossip.comm] writeToStream -> DEBU 345c Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:28:04.390 UTC [gossip.comm] readFromStream -> DEBU 345d Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-05-02 09:28:04.390 UTC [grpc] infof -> DEBU 345e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:28:04.390 UTC [msp] DeserializeIdentity -> DEBU 345f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.390 UTC [cauthdsl] func2 -> DEBU 3460 0xc0042e9de0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.391 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3461 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.391 UTC [kvledger] CommitWithPvtData -> DEBU 3462 [businesschannel] Validating state for block [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.391 UTC [policies] Evaluate -> DEBU 3463 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.391 UTC [msp.identity] newIdentity -> DEBU 3464 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [msp] DeserializeIdentity -> DEBU 346b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [msp] Validate -> DEBU 346c MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [msp] getCertificationChain -> DEBU 346d MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 346e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 346f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.393 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3470 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [policies] Evaluate -> DEBU 3471 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [policies] Evaluate -> DEBU 3472 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [policies] Evaluate -> DEBU 3473 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [cauthdsl] func1 -> DEBU 3474 0xc003165b90 gate 1556789284394321400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [cauthdsl] func2 -> DEBU 3475 0xc003165b90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [cauthdsl] func2 -> DEBU 3476 0xc003165b90 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3477 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [msp] Validate -> DEBU 3478 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:04.394 UTC [msp] getCertificationChain -> DEBU 3479 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [cauthdsl] func2 -> DEBU 347a 0xc003165b90 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [msp.identity] Verify -> DEBU 347b Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [msp.identity] Verify -> DEBU 347c Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [cauthdsl] func2 -> DEBU 347d 0xc003165b90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [cauthdsl] func1 -> DEBU 347e 0xc003165b90 gate 1556789284394321400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 347f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 3480 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 3481 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 3482 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [msp] DeserializeIdentity -> DEBU 3483 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [msp] DeserializeIdentity -> DEBU 3484 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3485 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3486 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3487 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [policies] Evaluate -> DEBU 3488 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [policies] Evaluate -> DEBU 3489 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.396 UTC [policies] Evaluate -> DEBU 348a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [cauthdsl] func1 -> DEBU 348b 0xc00313d6e0 gate 1556789284397003900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [cauthdsl] func2 -> DEBU 348c 0xc00313d6e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [cauthdsl] func2 -> DEBU 348d 0xc00313d6e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 348e Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [msp] Validate -> DEBU 348f MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:04.397 UTC [msp] getCertificationChain -> DEBU 3490 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [cauthdsl] func2 -> DEBU 3491 0xc00313d6e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [msp.identity] Verify -> DEBU 3492 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [msp.identity] Verify -> DEBU 3493 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [cauthdsl] func2 -> DEBU 3494 0xc00313d6e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [cauthdsl] func1 -> DEBU 3495 0xc00313d6e0 gate 1556789284397003900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3496 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3498 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3499 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.398 UTC [gossip.gossip] handleMessage -> DEBU 349a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.399 UTC [gossip.gossip] handleMessage -> DEBU 349b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 727 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.399 UTC [msp] DeserializeIdentity -> DEBU 349c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.399 UTC [msp.identity] Verify -> DEBU 349d Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +peer0.org1.example.com | "2019-05-02 09:28:04.399 UTC [msp.identity] Verify -> DEBU 349e Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [msp.identity] Verify -> DEBU 349f Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [msp.identity] Verify -> DEBU 34a0 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [msp] DeserializeIdentity -> DEBU 34a1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [gossip.comm] func2 -> DEBU 34a2 Client 172.18.0.6:53420 disconnected" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [comm.grpc.server] 1 -> INFO 34a3 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.335Z grpc.peer_address=172.18.0.6:53420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=62.9613ms +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [msp] DeserializeIdentity -> DEBU 34a4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [gossip.comm] writeToStream -> DEBU 34a5 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [policies] Evaluate -> DEBU 34a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [policies] Evaluate -> DEBU 34aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [policies] Evaluate -> DEBU 34ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.400 UTC [cauthdsl] func1 -> DEBU 34ac 0xc00341a3b0 gate 1556789284400975900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34ad 0xc00341a3b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34ae 0xc00341a3b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34af 0xc00341a3b0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [msp.identity] Verify -> DEBU 34b0 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +peer0.org1.example.com | 00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [msp.identity] Verify -> DEBU 34b1 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +peer0.org1.example.com | 00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +peer0.org1.example.com | 00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +peer0.org1.example.com | 00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +peer0.org1.example.com | 00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34b2 0xc00341a3b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [cauthdsl] func1 -> DEBU 34b3 0xc00341a3b0 gate 1556789284400975900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [policies] Evaluate -> DEBU 34b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [policies] Evaluate -> DEBU 34b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.402 UTC [grpc] HandleSubConnStateChange -> DEBU 34b6 pickfirstBalancer: HandleSubConnStateChange: 0xc0045cf780, READY" +peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [gossip.comm] serviceConnection -> DEBU 3465 Closing reading from stream" +peer0.org1.example.com | "2019-05-02 09:28:04.402 UTC [gossip.comm] func2 -> DEBU 34b7 Client 172.18.0.6:53224 disconnected" +peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [comm.grpc.server] 1 -> INFO 34b8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:53224 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=41.8966157s +peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [cauthdsl] func1 -> DEBU 3467 0xc0042e9de0 gate 1556789284373865000 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [policies] Evaluate -> DEBU 34b9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [policies] Evaluate -> DEBU 34ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [policies] Evaluate -> DEBU 34bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [cauthdsl] func1 -> DEBU 34bc 0xc003459080 gate 1556789284403603300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [cauthdsl] func2 -> DEBU 34bd 0xc003459080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.403 UTC [cauthdsl] func2 -> DEBU 34be 0xc003459080 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [cauthdsl] func2 -> DEBU 34bf 0xc003459080 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [msp.identity] Verify -> DEBU 34c0 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [msp.identity] Verify -> DEBU 34c1 Verify: sig = 00000000 30 45 02 21 00 91 b9 ca 97 ad 28 01 e4 1f 2d a4 |0E.!......(...-.| +peer0.org1.example.com | 00000010 31 06 fe f6 0c 30 1e fe c0 1b 8c c7 15 3f 8b 03 |1....0.......?..| +peer0.org1.example.com | 00000020 fa 68 27 2b 15 02 20 75 68 b3 5a 59 3a 3e c1 76 |.h'+.. uh.ZY:>.v| +peer0.org1.example.com | 00000030 4b 5c d5 59 a5 e4 62 91 e4 a6 70 37 67 10 83 84 |K\.Y..b...p7g...| +peer0.org1.example.com | 00000040 85 ff d3 5a a2 0c f4 |...Z...|" +peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [cauthdsl] func2 -> DEBU 34c2 0xc003459080 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [cauthdsl] func1 -> DEBU 34c3 0xc003459080 gate 1556789284403603300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.404 UTC [gossip.comm] authenticateRemotePeer -> DEBU 34c8 Authenticated 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp] DeserializeIdentity -> DEBU 34c9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34ca Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151027 " +peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34cb Sign: digest: 469FBC171A97132299A85FD1EFA9BED2C2A44D77EF8DD074607E47FEA82F0189 " +peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34cc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34cd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:04.405 UTC [msp] DeserializeIdentity -> DEBU 34ce Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [gossip.comm] Send -> DEBU 34cf Entering, sending GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [gossip.comm] sendToEndpoint -> DEBU 34d0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [gossip.comm] readFromStream -> DEBU 34d1 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3468 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [policies] Evaluate -> DEBU 34d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [policies] Evaluate -> DEBU 34d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [policies] Evaluate -> DEBU 34d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [cauthdsl] func1 -> DEBU 34d5 0xc00373eab0 gate 1556789284406645700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [cauthdsl] func2 -> DEBU 34d6 0xc00373eab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [cauthdsl] func2 -> DEBU 34d7 0xc00373eab0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [cauthdsl] func2 -> DEBU 34d8 0xc00373eab0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [msp.identity] Verify -> DEBU 34d9 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-05-02 09:28:04.406 UTC [msp.identity] Verify -> DEBU 34da Verify: sig = 00000000 30 44 02 20 64 fa 7b a8 f7 01 b8 ff 50 55 19 63 |0D. d.{.....PU.c| +peer0.org1.example.com | 00000010 7d 3b f8 9e d0 55 30 ae 22 bc 9b 8e e2 aa 95 b6 |};...U0.".......| +peer0.org1.example.com | 00000020 cb 89 c7 13 02 20 2a 1b 2f db b7 7a ab a4 c4 fa |..... *./..z....| +peer0.org1.example.com | 00000030 1a 94 62 88 ac 2f 25 f4 37 62 9b e4 a3 21 82 38 |..b../%.7b...!.8| +peer0.org1.example.com | 00000040 fa 52 69 12 f2 f9 |.Ri...|" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [cauthdsl] func2 -> DEBU 34db 0xc00373eab0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [cauthdsl] func1 -> DEBU 34dc 0xc00373eab0 gate 1556789284406645700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34df Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [gossip.comm] authenticateRemotePeer -> DEBU 34e1 Authenticated 172.18.0.5:57068" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [gossip.comm] GossipStream -> DEBU 34e2 Servicing 172.18.0.5:57068" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [gossip.comm] writeToStream -> DEBU 34e3 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3469 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 34e4 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 34e5 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-05-02 09:28:04.407 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34e6 ValidateAndPrepareBatch() for block number = [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34e7 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [valimpl] preprocessProtoBlock -> DEBU 34e8 txType=CONFIG" +peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [valimpl] processNonEndorserTx -> DEBU 34e9 Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [valimpl] processNonEndorserTx -> DEBU 34ea Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 34eb constructing new tx simulator" +peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 34ec constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-05-02 09:28:04.408 UTC [peer] GenerateSimulationResults -> DEBU 34ed Processing CONFIG" +peer0.org1.example.com | "2019-05-02 09:28:04.409 UTC [peer] processChannelConfigTx -> DEBU 34ee channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-05-02 09:28:04.409 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 34ef Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-05-02 09:28:04.409 UTC [lockbasedtxmgr] Done -> DEBU 34f0 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-05-02 09:28:04.409 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 34f1 Block [9] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.409 UTC [valinternal] ApplyWriteSet -> DEBU 34f2 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002549380)}" +peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34f3 validating rwset..." +peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [msp] DeserializeIdentity -> DEBU 3466 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34f4 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34f5 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [kvledger] CommitWithPvtData -> DEBU 34f6 [businesschannel] Committing block [9] to storage" +peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [ledgerstorage] CommitWithPvtData -> DEBU 34f7 Writing block [9] to pvt block store" +peer0.org1.example.com | "2019-05-02 09:28:04.410 UTC [msp.identity] newIdentity -> DEBU 34f8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.411 UTC [msp] DeserializeIdentity -> DEBU 34fa Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.411 UTC [msp] DeserializeIdentity -> DEBU 34fc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34fe Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34ff Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [policies] Evaluate -> DEBU 3500 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [policies] Evaluate -> DEBU 3501 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.412 UTC [policies] Evaluate -> DEBU 3502 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func1 -> DEBU 3503 0xc003246da0 gate 1556789284412996700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3504 0xc003246da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3505 0xc003246da0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3506 0xc003246da0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [msp.identity] Verify -> DEBU 3507 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [msp.identity] Verify -> DEBU 3508 Verify: sig = 00000000 30 45 02 21 00 b4 65 91 85 7e a4 72 50 cf d4 3a |0E.!..e..~.rP..:| +peer0.org1.example.com | 00000010 6b 92 51 e5 cc 75 ad 3a 9a 6b 1c 9c 1d e8 db e1 |k.Q..u.:.k......| +peer0.org1.example.com | 00000020 83 f1 1e d3 91 02 20 38 61 b4 a2 e3 7e 13 84 44 |...... 8a...~..D| +peer0.org1.example.com | 00000030 2a 51 3c f4 fc 6b bf 85 b2 75 82 90 68 75 3e 65 |*Q<..k...u..hu>e| +peer0.org1.example.com | 00000040 e7 1b 9f 95 8c d0 6b |......k|" +peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3509 0xc003246da0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [cauthdsl] func1 -> DEBU 350a 0xc003246da0 gate 1556789284412996700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [pvtdatastorage] Prepare -> DEBU 350b Saved 0 private data write sets for block [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.413 UTC [policies] Evaluate -> DEBU 350c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [policies] Evaluate -> DEBU 350d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [policies] Evaluate -> DEBU 350e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [policies] Evaluate -> DEBU 350f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3510 Authenticated 172.18.0.9:42206" +peer0.org1.example.com | "2019-05-02 09:28:04.414 UTC [gossip.comm] GossipStream -> DEBU 3511 Servicing 172.18.0.9:42206" +peer0.org1.example.com | "2019-05-02 09:28:04.415 UTC [gossip.comm] readFromStream -> DEBU 3512 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-05-02 09:28:04.415 UTC [gossip.comm] func2 -> DEBU 3513 Client 172.18.0.9:42206 disconnected" +peer0.org1.example.com | "2019-05-02 09:28:04.415 UTC [comm.grpc.server] 1 -> INFO 3514 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.372Z grpc.peer_address=172.18.0.9:42206 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.6834ms +peer0.org1.example.com | "2019-05-02 09:28:04.416 UTC [gossip.comm] writeToStream -> DEBU 3515 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:28:04.416 UTC [grpc] infof -> DEBU 3516 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:28:04.418 UTC [msp.identity] Sign -> DEBU 3517 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:28:04.418 UTC [msp.identity] Sign -> DEBU 3518 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:28:04.419 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3519 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.401 UTC [policies] Evaluate -> DEBU 351a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.419 UTC [policies] Evaluate -> DEBU 351b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.419 UTC [msp] DeserializeIdentity -> DEBU 351c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.419 UTC [msp] DeserializeIdentity -> DEBU 351d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 351e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 351f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3520 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [policies] Evaluate -> DEBU 3521 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [policies] Evaluate -> DEBU 3522 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [policies] Evaluate -> DEBU 3523 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [cauthdsl] func1 -> DEBU 3524 0xc002f55260 gate 1556789284420649300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [cauthdsl] func2 -> DEBU 3525 0xc002f55260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [cauthdsl] func2 -> DEBU 3526 0xc002f55260 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.420 UTC [cauthdsl] func2 -> DEBU 3527 0xc002f55260 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [msp.identity] Verify -> DEBU 3528 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [msp.identity] Verify -> DEBU 3529 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [cauthdsl] func2 -> DEBU 352a 0xc002f55260 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [cauthdsl] func1 -> DEBU 352b 0xc002f55260 gate 1556789284420649300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [msp] DeserializeIdentity -> DEBU 3530 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3531 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3532 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [fsblkstorage] indexBlock -> DEBU 3533 Indexing block [blockNum=9, blockHash=[]byte{0xae, 0x40, 0xdc, 0x77, 0x8f, 0x7a, 0x6, 0x29, 0xa2, 0x2c, 0x4f, 0x45, 0x7, 0xc4, 0x6e, 0xb1, 0x3c, 0xef, 0x36, 0xd4, 0x2, 0xad, 0x6a, 0x15, 0xaf, 0x8a, 0xbf, 0xad, 0xa7, 0x18, 0xe2, 0x5} txOffsets= +peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=33870 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [fsblkstorage] indexBlock -> DEBU 3534 txid [] is a duplicate of a previous tx. Not indexing in txid-index" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [fsblkstorage] indexBlock -> DEBU 3535 Adding txLoc [fileSuffixNum=0, offset=98744, bytesLength=33870] for tx number:[0] ID: [] to blockNumTranNum index" +peer0.org1.example.com | "2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 3536 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [policies] Evaluate -> DEBU 3537 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [policies] Evaluate -> DEBU 3538 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [cauthdsl] func1 -> DEBU 3539 0xc00448c340 gate 1556789284422433700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [cauthdsl] func2 -> DEBU 353a 0xc00448c340 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [cauthdsl] func2 -> DEBU 353b 0xc00448c340 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [cauthdsl] func2 -> DEBU 353c 0xc00448c340 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [msp.identity] Verify -> DEBU 353d Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:04.422 UTC [msp.identity] Verify -> DEBU 353e Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [cauthdsl] func2 -> DEBU 353f 0xc00448c340 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [cauthdsl] func1 -> DEBU 3540 0xc00448c340 gate 1556789284422433700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3541 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3542 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3543 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3544 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.423 UTC [gossip.gossip] handleMessage -> DEBU 3545 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.424 UTC [fsblkstorage] updateCheckpoint -> DEBU 3546 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133552], isChainEmpty=[false], lastBlockNumber=[9]" +peer0.org1.example.com | "2019-05-02 09:28:04.424 UTC [pvtdatastorage] Commit -> DEBU 3547 Committing private data for block [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.424 UTC [gossip.gossip] handleMessage -> DEBU 3548 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3549 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [msp] DeserializeIdentity -> DEBU 354a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [pvtdatastorage] Commit -> DEBU 354b Committed private data for block [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [kvledger] CommitWithPvtData -> DEBU 354c [businesschannel] Committing block [9] transactions to state database" +peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [lockbasedtxmgr] Commit -> DEBU 354d lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [lockbasedtxmgr] Commit -> DEBU 354e Committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:28:04.428 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 354f Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3550 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [lockbasedtxmgr] Commit -> DEBU 3551 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [msp] DeserializeIdentity -> DEBU 3552 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [stateleveldb] ApplyUpdates -> DEBU 3553 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3554 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [msp] DeserializeIdentity -> DEBU 3555 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3556 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3557 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3558 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [policies] Evaluate -> DEBU 3559 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [policies] Evaluate -> DEBU 355a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.429 UTC [policies] Evaluate -> DEBU 355b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func1 -> DEBU 355c 0xc000244bc0 gate 1556789284430008600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 355d 0xc000244bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 355e 0xc000244bc0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 355f 0xc000244bc0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [msp.identity] Verify -> DEBU 3560 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [msp.identity] Verify -> DEBU 3561 Verify: sig = 00000000 30 45 02 21 00 99 9f 28 b3 c8 5a 89 ae 0c 49 3b |0E.!...(..Z...I;| +peer0.org1.example.com | 00000010 12 fa cc 29 11 5c 53 29 20 29 0e 9f 28 61 5d ed |...).\S) )..(a].| +peer0.org1.example.com | 00000020 ae 03 53 d5 8f 02 20 6d a9 89 9e 36 78 8d 81 72 |..S... m...6x..r| +peer0.org1.example.com | 00000030 4d 0a 4f 7a 27 e0 5e 0e 71 98 ab eb ef 60 79 fb |M.Oz'.^.q....`y.| +peer0.org1.example.com | 00000040 4a c4 a5 e7 66 02 ef |J...f..|" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 3562 0xc000244bc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [cauthdsl] func1 -> DEBU 3563 0xc000244bc0 gate 1556789284430008600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3564 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3565 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3566 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.431 UTC [lockbasedtxmgr] Commit -> DEBU 3567 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-05-02 09:28:04.431 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3568 Preparing potential purge list working-set for expiringAtBlk [10]" +peer0.org1.example.com | "2019-05-02 09:28:04.431 UTC [leveldbhelper] GetIterator -> DEBU 3569 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xb, 0x0}]" +peer0.org1.example.com | "2019-05-02 09:28:04.431 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 356a No expiry entry found for expiringAtBlk [10]" +peer0.org1.example.com | "2019-05-02 09:28:04.432 UTC [lockbasedtxmgr] func1 -> DEBU 356b launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-05-02 09:28:04.432 UTC [kvledger] CommitWithPvtData -> DEBU 356c [businesschannel] Committing block [9] transactions to history database" +peer0.org1.example.com | "2019-05-02 09:28:04.432 UTC [historyleveldb] Commit -> DEBU 356d Channel [businesschannel]: Updating history database for blockNo [9] with [1] transactions" +peer0.org1.example.com | "2019-05-02 09:28:04.432 UTC [historyleveldb] Commit -> DEBU 356e Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [historyleveldb] Commit -> DEBU 356f Channel [businesschannel]: Updates committed to history database for blockNo [9]" +peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [kvledger] CommitWithPvtData -> INFO 3570 [businesschannel] Committed block [9] with 1 transaction(s) in 43ms (state_validation=19ms block_commit=18ms state_commit=3ms)" +peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [msp.identity] Sign -> DEBU 3571 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A02080A " +peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [msp.identity] Sign -> DEBU 3572 Sign: digest: 5A6ADC83E89FA0299A699739CD6E79AAA80486E8AFEA08E44B48F1B1F8A0A2AD " +peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [gossip.state] commitBlock -> DEBU 3573 [businesschannel] Committed block [9] with 1 transaction(s)" +peer0.org1.example.com | "2019-05-02 09:28:04.434 UTC [gossip.comm] serviceConnection -> DEBU 3574 Closing reading from stream" +peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [gossip.comm] readFromStream -> DEBU 3575 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [gossip.comm] readFromStream -> DEBU 3576 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [gossip.comm] func2 -> DEBU 3577 Client 172.18.0.5:57068 disconnected" +peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [comm.grpc.server] 1 -> INFO 3578 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.258Z grpc.peer_address=172.18.0.5:57068 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=173.6968ms +peer0.org1.example.com | "2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3579 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [gossip.comm] authenticateRemotePeer -> DEBU 357a Authenticated 172.18.0.9:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.392 UTC [gossip.discovery] handleAliveMessage -> DEBU 346a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.435 UTC [gossip.comm] createConnection -> DEBU 357b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.comm] sendToEndpoint -> DEBU 357c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 357d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 357e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 " +peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 357f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 " +peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3580 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 3581 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 3582 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] handleAliveMessage -> DEBU 3583 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.436 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3584 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.440 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3589 Got message: GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.440 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 358a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:04.437 UTC [grpc] infof -> DEBU 3585 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 358b Verify: digest = 00000000 ef 8f f9 c9 84 da a4 78 5c 6b 28 82 09 9e 01 15 |.......x\k(.....| +peer0.org1.example.com | 00000010 0a cd 9d cd 70 56 89 01 2c 81 69 06 ff 14 80 89 |....pV..,.i.....|" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 358c Verify: sig = 00000000 30 45 02 21 00 be 0d e7 61 f0 f8 fc 7c 89 5e 8d |0E.!....a...|.^.| +peer0.org1.example.com | 00000010 16 63 bd cf cf 74 c6 d4 91 37 3a 0f 65 4f b5 fe |.c...t...7:.eO..| +peer0.org1.example.com | 00000020 82 9e b1 10 3c 02 20 53 d4 94 e8 4c 78 33 02 3e |....<. S...Lx3.>| +peer0.org1.example.com | 00000030 21 8d 15 ed 8e b4 18 73 cf 86 3b 00 69 be 1b 95 |!......s..;.i...| +peer0.org1.example.com | 00000040 1b 99 50 89 d8 5d 8a |..P..].|" +peer0.org1.example.com | "2019-05-02 09:28:04.440 UTC [gossip.comm] func1 -> DEBU 3586 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.comm] func1 -> DEBU 358d Got message: GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.440 UTC [gossip.comm] writeToStream -> DEBU 3587 Closing writing to stream" +peer0.org1.example.com | "2019-05-02 09:28:04.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3588 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 358e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp] DeserializeIdentity -> DEBU 358f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 3590 Verify: sig = 00000000 30 44 02 20 58 12 c4 7a e9 d9 77 95 af ce f8 07 |0D. X..z..w.....| +peer0.org1.example.com | 00000010 40 88 1b 14 a8 9d c4 7d 9e 22 70 72 0d 6e 63 97 |@......}."pr.nc.| +peer0.org1.example.com | 00000020 88 b1 17 db 02 20 46 12 d7 71 d0 a4 a1 b8 fe 39 |..... F..q.....9| +peer0.org1.example.com | 00000030 3c 38 cf 00 cc dd fb 10 8f 39 bd 81 58 1c 0f 1a |<8.......9..X...| +peer0.org1.example.com | 00000040 cd 3e 0b 27 43 06 |.>.'C.|" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp] DeserializeIdentity -> DEBU 3591 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] handleAliveMessage -> DEBU 3592 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [msp] DeserializeIdentity -> DEBU 3593 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 3594 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.comm] Send -> DEBU 3595 Entering, sending GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 3596 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 " +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] sendMemResponse -> DEBU 3597 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 3598 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 " +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.comm] sendToEndpoint -> DEBU 3599 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 359a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.comm] createConnection -> DEBU 359b Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 359c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] handleAliveMessage -> DEBU 359d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.441 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [gossip.discovery] sendMemResponse -> DEBU 359f Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [msp] DeserializeIdentity -> DEBU 35a0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [msp] DeserializeIdentity -> DEBU 35a1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [gossip.comm] Send -> DEBU 35a2 Entering, sending GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [gossip.discovery] sendMemResponse -> DEBU 35a3 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [gossip.comm] sendToEndpoint -> DEBU 35a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.442 UTC [gossip.comm] createConnection -> DEBU 35a5 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35a6 parsed scheme: """ +peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35a7 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] UpdateState -> DEBU 35a8 ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 }] }" +peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] switchBalancer -> DEBU 35a9 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] HandleSubConnStateChange -> DEBU 35aa pickfirstBalancer: HandleSubConnStateChange: 0xc002f72570, CONNECTING" +peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35ab parsed scheme: """ +peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35ac scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] UpdateState -> DEBU 35ad ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 }] }" +peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] switchBalancer -> DEBU 35ae ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-05-02 09:28:04.447 UTC [grpc] HandleSubConnStateChange -> DEBU 35af pickfirstBalancer: HandleSubConnStateChange: 0xc002f72570, READY" +peer0.org1.example.com | "2019-05-02 09:28:04.449 UTC [msp.identity] Sign -> DEBU 35b0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:28:04.449 UTC [msp.identity] Sign -> DEBU 35b1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:28:04.449 UTC [gossip.comm] authenticateRemotePeer -> DEBU 35b2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.443 UTC [grpc] HandleSubConnStateChange -> DEBU 35b3 pickfirstBalancer: HandleSubConnStateChange: 0xc00308aab0, CONNECTING" +peer0.org1.example.com | "2019-05-02 09:28:04.456 UTC [gossip.gossip] handleMessage -> DEBU 35b4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.456 UTC [gossip.gossip] handleMessage -> DEBU 35b5 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.456 UTC [msp] DeserializeIdentity -> DEBU 35b6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35b7 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +peer0.org1.example.com | 00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +peer0.org1.example.com | "2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35b8 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +peer0.org1.example.com | 00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +peer0.org1.example.com | 00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +peer0.org1.example.com | 00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +peer0.org1.example.com | 00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +peer0.org1.example.com | "2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35b9 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +peer0.org1.example.com | 00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +peer0.org1.example.com | "2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35ba Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +peer0.org1.example.com | 00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +peer0.org1.example.com | 00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +peer0.org1.example.com | 00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +peer0.org1.example.com | 00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +peer0.org1.example.com | "2019-05-02 09:28:04.457 UTC [msp] DeserializeIdentity -> DEBU 35bb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [msp] DeserializeIdentity -> DEBU 35bc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35be Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35bf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [policies] Evaluate -> DEBU 35c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [policies] Evaluate -> DEBU 35c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [policies] Evaluate -> DEBU 35c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [cauthdsl] func1 -> DEBU 35c3 0xc0038f09e0 gate 1556789284458739100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [cauthdsl] func2 -> DEBU 35c4 0xc0038f09e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [cauthdsl] func2 -> DEBU 35c5 0xc0038f09e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.458 UTC [cauthdsl] func2 -> DEBU 35c6 0xc0038f09e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [msp.identity] Verify -> DEBU 35c7 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +peer0.org1.example.com | 00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [msp.identity] Verify -> DEBU 35c8 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +peer0.org1.example.com | 00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +peer0.org1.example.com | 00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +peer0.org1.example.com | 00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +peer0.org1.example.com | 00000040 40 6f 9d c2 22 6e |@o.."n|" +peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [cauthdsl] func2 -> DEBU 35c9 0xc0038f09e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [cauthdsl] func1 -> DEBU 35ca 0xc0038f09e0 gate 1556789284458739100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35cd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.459 UTC [msp] DeserializeIdentity -> DEBU 35cf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [msp] DeserializeIdentity -> DEBU 35d0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35d1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35d2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35d3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [policies] Evaluate -> DEBU 35d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [policies] Evaluate -> DEBU 35d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [policies] Evaluate -> DEBU 35d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [cauthdsl] func1 -> DEBU 35d7 0xc0039281b0 gate 1556789284460649900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [cauthdsl] func2 -> DEBU 35d8 0xc0039281b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [cauthdsl] func2 -> DEBU 35d9 0xc0039281b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [cauthdsl] func2 -> DEBU 35da 0xc0039281b0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [msp.identity] Verify -> DEBU 35db Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:04.460 UTC [msp.identity] Verify -> DEBU 35dc Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [cauthdsl] func2 -> DEBU 35dd 0xc0039281b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [cauthdsl] func1 -> DEBU 35de 0xc0039281b0 gate 1556789284460649900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35e1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [msp] DeserializeIdentity -> DEBU 35e3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35e4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35e5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [policies] Evaluate -> DEBU 35e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [policies] Evaluate -> DEBU 35e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [policies] Evaluate -> DEBU 35e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [cauthdsl] func1 -> DEBU 35e9 0xc003929290 gate 1556789284462225900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [cauthdsl] func2 -> DEBU 35ea 0xc003929290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [cauthdsl] func2 -> DEBU 35eb 0xc003929290 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [cauthdsl] func2 -> DEBU 35ec 0xc003929290 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [msp.identity] Verify -> DEBU 35ed Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:04.462 UTC [msp.identity] Verify -> DEBU 35ee Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [cauthdsl] func2 -> DEBU 35ef 0xc003929290 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [cauthdsl] func1 -> DEBU 35f0 0xc003929290 gate 1556789284462225900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [gossip.gossip] handleMessage -> DEBU 35f5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [gossip.gossip] handleMessage -> DEBU 35f6 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [gossip.gossip] handleMessage -> DEBU 35f7 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35f8 Got message: GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35f9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:04.463 UTC [msp.identity] Verify -> DEBU 35fa Verify: digest = 00000000 46 9f bc 17 1a 97 13 22 99 a8 5f d1 ef a9 be d2 |F......".._.....| +peer0.org1.example.com | 00000010 c2 a4 4d 77 ef 8d d0 74 60 7e 47 fe a8 2f 01 89 |..Mw...t`~G../..|" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [msp.identity] Verify -> DEBU 35fb Verify: sig = 00000000 30 44 02 20 67 f3 86 7e 34 5e 52 aa 09 3e 66 2b |0D. g..~4^R..>f+| +peer0.org1.example.com | 00000010 72 6c 2b 60 72 fd fe 6d 80 e5 9a fb dd 86 ad c4 |rl+`r..m........| +peer0.org1.example.com | 00000020 ab 24 6e 44 02 20 48 9a d6 96 cf 20 2b 9d 24 72 |.$nD. H.... +.$r| +peer0.org1.example.com | 00000030 d8 ee 7f 3f 5f 99 d4 ef 7d 4f d9 78 77 0b cb 04 |...?_...}O.xw...| +peer0.org1.example.com | 00000040 79 e6 a8 d4 e3 03 |y.....|" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [gossip.discovery] handleAliveMessage -> DEBU 35fc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [gossip.discovery] isSentByMe -> DEBU 35fd Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [gossip.discovery] handleAliveMessage -> DEBU 35fe Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35ff Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3600 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [msp] DeserializeIdentity -> DEBU 3601 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3602 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [msp] DeserializeIdentity -> DEBU 3603 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3604 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [msp] DeserializeIdentity -> DEBU 3605 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3606 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3607 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3608 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [policies] Evaluate -> DEBU 3609 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [policies] Evaluate -> DEBU 360a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [policies] Evaluate -> DEBU 360b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [cauthdsl] func1 -> DEBU 360c 0xc0044a92d0 gate 1556789284465124200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [cauthdsl] func2 -> DEBU 360d 0xc0044a92d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [cauthdsl] func2 -> DEBU 360e 0xc0044a92d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [cauthdsl] func2 -> DEBU 360f 0xc0044a92d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [msp.identity] Verify -> DEBU 3610 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-05-02 09:28:04.465 UTC [msp.identity] Verify -> DEBU 3611 Verify: sig = 00000000 30 45 02 21 00 ef 71 9d 80 d2 c7 f7 33 64 7b 79 |0E.!..q.....3d{y| +peer0.org1.example.com | 00000010 6f e0 41 b0 94 29 eb 66 f5 6a 79 70 6d 25 4d 04 |o.A..).f.jypm%M.| +peer0.org1.example.com | 00000020 75 99 52 26 9a 02 20 13 cb 56 a3 7e fc c6 1f c2 |u.R&.. ..V.~....| +peer0.org1.example.com | 00000030 e3 a6 62 4a 4a d2 60 65 fa 3e d6 da 86 dd 6c 5c |..bJJ.`e.>....l\| +peer0.org1.example.com | 00000040 73 b2 7b 29 c6 79 02 |s.{).y.|" +peer0.org1.example.com | "2019-05-02 09:28:04.474 UTC [grpc] HandleSubConnStateChange -> DEBU 3612 pickfirstBalancer: HandleSubConnStateChange: 0xc00308aab0, READY" +peer0.org1.example.com | "2019-05-02 09:28:04.473 UTC [cauthdsl] func2 -> DEBU 3613 0xc0044a92d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.477 UTC [msp.identity] Sign -> DEBU 3614 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-05-02 09:28:04.478 UTC [msp.identity] Sign -> DEBU 3615 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-05-02 09:28:04.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3616 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.479 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3617 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.480 UTC [msp.identity] Verify -> DEBU 3618 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-05-02 09:28:04.480 UTC [msp.identity] Verify -> DEBU 3619 Verify: sig = 00000000 30 44 02 20 34 6a de 18 86 d6 cf 36 41 ca 8e d9 |0D. 4j.....6A...| +peer0.org1.example.com | 00000010 95 ad 74 02 22 19 2d 56 87 a0 72 d2 eb 57 a9 9c |..t.".-V..r..W..| +peer0.org1.example.com | 00000020 88 84 30 71 02 20 70 e0 0f 48 34 44 e2 71 09 b7 |..0q. p..H4D.q..| +peer0.org1.example.com | 00000030 8f e1 db 9b 10 af 37 84 d1 3a 21 16 a1 02 c9 68 |......7..:!....h| +peer0.org1.example.com | 00000040 13 a8 63 31 f9 6c |..c1.l|" +peer0.org1.example.com | "2019-05-02 09:28:04.480 UTC [gossip.comm] authenticateRemotePeer -> DEBU 361a Authenticated 172.18.0.6:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.480 UTC [gossip.comm] createConnection -> DEBU 361b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.480 UTC [gossip.comm] sendToEndpoint -> DEBU 361c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.478 UTC [cauthdsl] func1 -> DEBU 361d 0xc0044a92d0 gate 1556789284465124200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.484 UTC [grpc] infof -> DEBU 361e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:28:04.484 UTC [policies] Evaluate -> DEBU 361f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.484 UTC [policies] Evaluate -> DEBU 3620 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.485 UTC [policies] Evaluate -> DEBU 3621 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.485 UTC [policies] Evaluate -> DEBU 3622 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.485 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3623 Authenticated 172.18.0.5:7051" +peer0.org1.example.com | "2019-05-02 09:28:04.485 UTC [gossip.comm] createConnection -> DEBU 3624 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.485 UTC [gossip.comm] sendToEndpoint -> DEBU 3625 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.508 UTC [gossip.comm] func1 -> DEBU 3626 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.508 UTC [gossip.gossip] handleMessage -> DEBU 3627 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.509 UTC [msp] DeserializeIdentity -> DEBU 3628 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.509 UTC [msp] DeserializeIdentity -> DEBU 3629 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.510 UTC [gossip.gossip] handleMessage -> DEBU 362a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.517 UTC [gossip.comm] func1 -> DEBU 362b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.518 UTC [gossip.gossip] handleMessage -> DEBU 362c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.518 UTC [msp.identity] Verify -> DEBU 362d Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:04.519 UTC [msp.identity] Verify -> DEBU 362e Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:04.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 362f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.520 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3630 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.520 UTC [policies] Evaluate -> DEBU 3631 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.521 UTC [policies] Evaluate -> DEBU 3632 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.521 UTC [gossip.comm] func1 -> DEBU 3633 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.521 UTC [policies] Evaluate -> DEBU 3634 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.522 UTC [msp] DeserializeIdentity -> DEBU 3635 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.522 UTC [msp.identity] newIdentity -> DEBU 3636 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:04.523 UTC [cauthdsl] func1 -> DEBU 3637 0xc00244d0d0 gate 1556789284523506100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.523 UTC [cauthdsl] func2 -> DEBU 3638 0xc00244d0d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.524 UTC [cauthdsl] func2 -> DEBU 3639 0xc00244d0d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.524 UTC [cauthdsl] func2 -> DEBU 363a 0xc00244d0d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-05-02 09:28:04.524 UTC [cauthdsl] func2 -> DEBU 363b 0xc00244d0d0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.524 UTC [cauthdsl] func1 -> DEBU 363c 0xc00244d0d0 gate 1556789284523506100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.525 UTC [policies] Evaluate -> DEBU 363d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.525 UTC [policies] Evaluate -> DEBU 363e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.527 UTC [policies] Evaluate -> DEBU 363f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.527 UTC [cauthdsl] func1 -> DEBU 3640 0xc002e8a250 gate 1556789284527722500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3641 0xc002e8a250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3642 0xc002e8a250 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3643 0xc002e8a250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +peer0.org1.example.com | "2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3644 0xc002e8a250 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.528 UTC [cauthdsl] func1 -> DEBU 3645 0xc002e8a250 gate 1556789284527722500 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:04.529 UTC [policies] Evaluate -> DEBU 3646 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.529 UTC [policies] Evaluate -> DEBU 3647 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.530 UTC [policies] Evaluate -> DEBU 3648 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.534 UTC [cauthdsl] func1 -> DEBU 3649 0xc002e8aab0 gate 1556789284534150800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.534 UTC [cauthdsl] func2 -> DEBU 364a 0xc002e8aab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.534 UTC [cauthdsl] func2 -> DEBU 364b 0xc002e8aab0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.534 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 364c Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:04.535 UTC [msp] Validate -> DEBU 364d MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:04.535 UTC [msp] getCertificationChain -> DEBU 364e MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:04.536 UTC [cauthdsl] func2 -> DEBU 364f 0xc002e8aab0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.536 UTC [msp.identity] Verify -> DEBU 3650 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:04.536 UTC [msp.identity] Verify -> DEBU 3651 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:04.537 UTC [cauthdsl] func2 -> DEBU 3652 0xc002e8aab0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.537 UTC [cauthdsl] func1 -> DEBU 3653 0xc002e8aab0 gate 1556789284534150800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.537 UTC [policies] Evaluate -> DEBU 3654 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.538 UTC [policies] Evaluate -> DEBU 3655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.538 UTC [policies] Evaluate -> DEBU 3656 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.538 UTC [policies] Evaluate -> DEBU 3657 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.539 UTC [gossip.gossip] handleMessage -> DEBU 3658 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.539 UTC [gossip.gossip] handleMessage -> DEBU 3659 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.540 UTC [msp.identity] Verify -> DEBU 365a Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:04.543 UTC [msp.identity] Verify -> DEBU 365c Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:04.542 UTC [msp] DeserializeIdentity -> DEBU 365b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.543 UTC [msp] DeserializeIdentity -> DEBU 365d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.544 UTC [msp] DeserializeIdentity -> DEBU 365e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.544 UTC [gossip.gossip] handleMessage -> DEBU 365f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.544 UTC [gossip.comm] Send -> DEBU 3660 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes to 2 peers" +peer0.org1.example.com | "2019-05-02 09:28:04.545 UTC [msp] DeserializeIdentity -> DEBU 3661 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.545 UTC [gossip.comm] sendToEndpoint -> DEBU 3662 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.545 UTC [gossip.comm] sendToEndpoint -> DEBU 3663 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.545 UTC [msp] DeserializeIdentity -> DEBU 3664 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.546 UTC [gossip.comm] sendToEndpoint -> DEBU 3665 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.546 UTC [gossip.comm] sendToEndpoint -> DEBU 3666 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.570 UTC [gossip.comm] func1 -> DEBU 3667 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.571 UTC [gossip.gossip] handleMessage -> DEBU 3668 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.571 UTC [gossip.pull] HandleMessage -> DEBU 3669 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.572 UTC [gossip.pull] SendDigest -> DEBU 366a Sending BLOCK_MSG digest: [9 1 2 3 4 5 6 7 8] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:04.572 UTC [gossip.gossip] handleMessage -> DEBU 366b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.752 UTC [gossip.comm] func1 -> DEBU 366c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.752 UTC [gossip.gossip] handleMessage -> DEBU 366d Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.753 UTC [msp] DeserializeIdentity -> DEBU 366e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.753 UTC [msp] DeserializeIdentity -> DEBU 366f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.753 UTC [msp] DeserializeIdentity -> DEBU 3670 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.756 UTC [gossip.gossip] handleMessage -> DEBU 3671 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.758 UTC [gossip.comm] func1 -> DEBU 3672 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.758 UTC [gossip.gossip] handleMessage -> DEBU 3673 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.759 UTC [msp] DeserializeIdentity -> DEBU 3674 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.759 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3675 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3676 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3677 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.760 UTC [policies] Evaluate -> DEBU 3678 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.760 UTC [policies] Evaluate -> DEBU 3679 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.760 UTC [policies] Evaluate -> DEBU 367a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [cauthdsl] func1 -> DEBU 367b 0xc002fd96c0 gate 1556789284760892500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [cauthdsl] func2 -> DEBU 367c 0xc002fd96c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [cauthdsl] func2 -> DEBU 367d 0xc002fd96c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [cauthdsl] func2 -> DEBU 367e 0xc002fd96c0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [msp.identity] Verify -> DEBU 367f Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:04.761 UTC [msp.identity] Verify -> DEBU 3680 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:04.762 UTC [cauthdsl] func2 -> DEBU 3681 0xc002fd96c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.762 UTC [cauthdsl] func1 -> DEBU 3682 0xc002fd96c0 gate 1556789284760892500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.762 UTC [policies] Evaluate -> DEBU 3683 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.762 UTC [policies] Evaluate -> DEBU 3684 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.763 UTC [policies] Evaluate -> DEBU 3685 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.763 UTC [policies] Evaluate -> DEBU 3686 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.763 UTC [msp] DeserializeIdentity -> DEBU 3687 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.765 UTC [gossip.comm] func1 -> DEBU 3688 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.770 UTC [gossip.gossip] handleMessage -> DEBU 3689 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.770 UTC [gossip.gossip] handleMessage -> DEBU 368a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.771 UTC [msp] DeserializeIdentity -> DEBU 368b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 368c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 368d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 368e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.773 UTC [policies] Evaluate -> DEBU 368f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.773 UTC [policies] Evaluate -> DEBU 3690 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.773 UTC [policies] Evaluate -> DEBU 3691 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.774 UTC [cauthdsl] func1 -> DEBU 3692 0xc0035f10d0 gate 1556789284774089100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.774 UTC [cauthdsl] func2 -> DEBU 3693 0xc0035f10d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.774 UTC [cauthdsl] func2 -> DEBU 3694 0xc0035f10d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.775 UTC [cauthdsl] func2 -> DEBU 3695 0xc0035f10d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.775 UTC [msp.identity] Verify -> DEBU 3696 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:04.776 UTC [msp.identity] Verify -> DEBU 3697 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:04.776 UTC [cauthdsl] func2 -> DEBU 3698 0xc0035f10d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.776 UTC [cauthdsl] func1 -> DEBU 3699 0xc0035f10d0 gate 1556789284774089100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.778 UTC [msp] DeserializeIdentity -> DEBU 369e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.778 UTC [gossip.gossip] handleMessage -> DEBU 369f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.980 UTC [gossip.comm] func1 -> DEBU 36a0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.981 UTC [gossip.gossip] handleMessage -> DEBU 36a1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.982 UTC [msp] DeserializeIdentity -> DEBU 36a2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.982 UTC [msp] DeserializeIdentity -> DEBU 36a3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.982 UTC [msp] DeserializeIdentity -> DEBU 36a4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.983 UTC [gossip.gossip] handleMessage -> DEBU 36a5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:04.990 UTC [gossip.comm] func1 -> DEBU 36a6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789284200243300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.990 UTC [gossip.gossip] handleMessage -> DEBU 36a7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789284200243300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:04.991 UTC [msp] DeserializeIdentity -> DEBU 36a8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:04.992 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36aa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.992 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ab Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:04.992 UTC [policies] Evaluate -> DEBU 36ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.993 UTC [policies] Evaluate -> DEBU 36ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:04.993 UTC [policies] Evaluate -> DEBU 36ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:04.993 UTC [cauthdsl] func1 -> DEBU 36af 0xc003e6b320 gate 1556789284993571600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:04.993 UTC [cauthdsl] func2 -> DEBU 36b0 0xc003e6b320 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:04.994 UTC [cauthdsl] func2 -> DEBU 36b1 0xc003e6b320 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:04.994 UTC [cauthdsl] func2 -> DEBU 36b2 0xc003e6b320 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.995 UTC [msp.identity] Verify -> DEBU 36b3 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:04.995 UTC [msp.identity] Verify -> DEBU 36b4 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:04.995 UTC [cauthdsl] func2 -> DEBU 36b5 0xc003e6b320 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:04.996 UTC [cauthdsl] func1 -> DEBU 36b6 0xc003e6b320 gate 1556789284993571600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:04.996 UTC [policies] Evaluate -> DEBU 36b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.996 UTC [policies] Evaluate -> DEBU 36b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.997 UTC [policies] Evaluate -> DEBU 36b9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.997 UTC [policies] Evaluate -> DEBU 36ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:04.997 UTC [msp] DeserializeIdentity -> DEBU 36bb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:04.998 UTC [gossip.gossip] handleMessage -> DEBU 36bc Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.607 UTC [msp.identity] Sign -> DEBU 36bd Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151028 " +peer0.org1.example.com | "2019-05-02 09:28:05.607 UTC [msp.identity] Sign -> DEBU 36be Sign: digest: 80087D267E5F5F113D94F3674E6B1C812887033DC10ABD3A76F6DB510C95C6D4 " +peer0.org1.example.com | "2019-05-02 09:28:05.608 UTC [msp.identity] Sign -> DEBU 36bf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:05.609 UTC [msp.identity] Sign -> DEBU 36c0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:05.610 UTC [gossip.comm] Send -> DEBU 36c1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:05.610 UTC [msp] DeserializeIdentity -> DEBU 36c2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.611 UTC [gossip.comm] sendToEndpoint -> DEBU 36c3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.611 UTC [gossip.comm] sendToEndpoint -> DEBU 36c4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.611 UTC [gossip.comm] Send -> DEBU 36c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:05.612 UTC [msp] DeserializeIdentity -> DEBU 36c6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.612 UTC [gossip.comm] sendToEndpoint -> DEBU 36c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.613 UTC [gossip.comm] sendToEndpoint -> DEBU 36c9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.612 UTC [gossip.comm] Send -> DEBU 36c8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:05.613 UTC [gossip.comm] sendToEndpoint -> DEBU 36ca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.613 UTC [gossip.comm] sendToEndpoint -> DEBU 36cb Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.618 UTC [gossip.comm] func1 -> DEBU 36cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.618 UTC [gossip.gossip] handleMessage -> DEBU 36cd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.618 UTC [gossip.gossip] handleMessage -> DEBU 36ce Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36d0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [msp.identity] Verify -> DEBU 36d1 Verify: digest = 00000000 80 08 7d 26 7e 5f 5f 11 3d 94 f3 67 4e 6b 1c 81 |..}&~__.=..gNk..| +peer0.org1.example.com | 00000010 28 87 03 3d c1 0a bd 3a 76 f6 db 51 0c 95 c6 d4 |(..=...:v..Q....|" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [msp.identity] Verify -> DEBU 36d2 Verify: sig = 00000000 30 45 02 21 00 f5 66 3d 18 73 85 2f aa 69 17 80 |0E.!..f=.s./.i..| +peer0.org1.example.com | 00000010 d9 58 8e c2 ab 05 ca 86 23 8d f8 b8 ea 90 9a c1 |.X......#.......| +peer0.org1.example.com | 00000020 79 26 17 1f 9a 02 20 1d d1 27 9e 20 f0 0a ea f8 |y&.... ..'. ....| +peer0.org1.example.com | 00000030 8e a7 8c 63 4f 0e 52 c9 76 c8 3f 16 03 bb 39 1d |...cO.R.v.?...9.| +peer0.org1.example.com | 00000040 9a 8c 7b 02 22 78 6a |..{."xj|" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.discovery] handleAliveMessage -> DEBU 36d3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.discovery] isSentByMe -> DEBU 36d4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.discovery] handleAliveMessage -> DEBU 36d5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36d6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.comm] func1 -> DEBU 36d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.gossip] handleMessage -> DEBU 36d8 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.gossip] handleMessage -> DEBU 36d9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.619 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36db Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [msp.identity] Verify -> DEBU 36dc Verify: digest = 00000000 80 08 7d 26 7e 5f 5f 11 3d 94 f3 67 4e 6b 1c 81 |..}&~__.=..gNk..| +peer0.org1.example.com | 00000010 28 87 03 3d c1 0a bd 3a 76 f6 db 51 0c 95 c6 d4 |(..=...:v..Q....|" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [msp.identity] Verify -> DEBU 36dd Verify: sig = 00000000 30 45 02 21 00 f5 66 3d 18 73 85 2f aa 69 17 80 |0E.!..f=.s./.i..| +peer0.org1.example.com | 00000010 d9 58 8e c2 ab 05 ca 86 23 8d f8 b8 ea 90 9a c1 |.X......#.......| +peer0.org1.example.com | 00000020 79 26 17 1f 9a 02 20 1d d1 27 9e 20 f0 0a ea f8 |y&.... ..'. ....| +peer0.org1.example.com | 00000030 8e a7 8c 63 4f 0e 52 c9 76 c8 3f 16 03 bb 39 1d |...cO.R.v.?...9.| +peer0.org1.example.com | 00000040 9a 8c 7b 02 22 78 6a |..{."xj|" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 36de Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.discovery] isSentByMe -> DEBU 36df Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 36e0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36e1 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.comm] func1 -> DEBU 36e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.gossip] handleMessage -> DEBU 36e3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.gossip] handleMessage -> DEBU 36e4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.620 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36e6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36e7 Verify: digest = 00000000 80 08 7d 26 7e 5f 5f 11 3d 94 f3 67 4e 6b 1c 81 |..}&~__.=..gNk..| +peer0.org1.example.com | 00000010 28 87 03 3d c1 0a bd 3a 76 f6 db 51 0c 95 c6 d4 |(..=...:v..Q....|" +peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36e8 Verify: sig = 00000000 30 45 02 21 00 f5 66 3d 18 73 85 2f aa 69 17 80 |0E.!..f=.s./.i..| +peer0.org1.example.com | 00000010 d9 58 8e c2 ab 05 ca 86 23 8d f8 b8 ea 90 9a c1 |.X......#.......| +peer0.org1.example.com | 00000020 79 26 17 1f 9a 02 20 1d d1 27 9e 20 f0 0a ea f8 |y&.... ..'. ....| +peer0.org1.example.com | 00000030 8e a7 8c 63 4f 0e 52 c9 76 c8 3f 16 03 bb 39 1d |...cO.R.v.?...9.| +peer0.org1.example.com | 00000040 9a 8c 7b 02 22 78 6a |..{."xj|" +peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36e9 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36ea Verify: sig = 00000000 30 44 02 20 32 68 4e c8 56 1b 5b 8e 54 b7 b0 d7 |0D. 2hN.V.[.T...| +peer0.org1.example.com | 00000010 d6 5e e7 9d f9 98 40 b9 78 26 cf 74 56 ee 48 7c |.^....@.x&.tV.H|| +peer0.org1.example.com | 00000020 80 c7 20 86 02 20 04 89 58 5b d8 38 9f 55 15 2a |.. .. ..X[.8.U.*| +peer0.org1.example.com | 00000030 e3 3a f4 c8 64 d9 0f 36 d4 95 f2 4d 2e da aa af |.:..d..6...M....| +peer0.org1.example.com | 00000040 33 ce a6 b0 d1 58 |3....X|" +peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 36eb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [gossip.discovery] isSentByMe -> DEBU 36ec Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 36ed Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.621 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36ee Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [gossip.comm] func1 -> DEBU 36ef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [gossip.gossip] handleMessage -> DEBU 36f0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [gossip.gossip] handleMessage -> DEBU 36f1 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36f2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36f3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [msp] DeserializeIdentity -> DEBU 36f4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36f6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36f7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [policies] Evaluate -> DEBU 36f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [policies] Evaluate -> DEBU 36f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [policies] Evaluate -> DEBU 36fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:05.625 UTC [cauthdsl] func1 -> DEBU 36fb 0xc00419fb80 gate 1556789285625972700 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 36fc 0xc00419fb80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 36fd 0xc00419fb80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 36fe 0xc00419fb80 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [msp.identity] Verify -> DEBU 36ff Verify: digest = 00000000 fa a0 9b 03 9a 54 97 2d fe f5 21 b0 77 43 11 c7 |.....T.-..!.wC..| +peer0.org1.example.com | 00000010 44 07 9a e5 b2 10 76 1f f8 aa 56 f7 2f 0c 3e 8f |D.....v...V./.>.|" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [msp.identity] Verify -> DEBU 3700 Verify: sig = 00000000 30 44 02 20 17 10 ee 8b 8d 75 a8 d5 1b 2c db 8e |0D. .....u...,..| +peer0.org1.example.com | 00000010 45 30 5f 20 3e 71 ab 67 39 41 b2 51 d8 3a 76 43 |E0_ >q.g9A.Q.:vC| +peer0.org1.example.com | 00000020 ec ee 89 c0 02 20 4c 3a 8c de e0 e3 09 b4 96 47 |..... L:.......G| +peer0.org1.example.com | 00000030 8e 79 84 af 16 31 04 93 51 d1 7f 32 a0 13 75 13 |.y...1..Q..2..u.| +peer0.org1.example.com | 00000040 c7 82 92 b0 63 2b |....c+|" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 3701 0xc00419fb80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [cauthdsl] func1 -> DEBU 3702 0xc00419fb80 gate 1556789285625972700 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3703 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3704 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3705 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3706 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [gossip.discovery] handleAliveMessage -> DEBU 3707 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 3708 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 3709 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 " +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 370a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 " +peer0.org1.example.com | "2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 370b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.discovery] learnExistingMembers -> DEBU 370c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.discovery] handleAliveMessage -> DEBU 370d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 370e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.discovery] sendMemResponse -> DEBU 370f Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [msp] DeserializeIdentity -> DEBU 3710 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [msp] DeserializeIdentity -> DEBU 3711 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [msp] DeserializeIdentity -> DEBU 3712 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.comm] Send -> DEBU 3713 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.discovery] sendMemResponse -> DEBU 3714 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.comm] sendToEndpoint -> DEBU 3715 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.627 UTC [gossip.comm] sendToEndpoint -> DEBU 3716 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.631 UTC [gossip.comm] func1 -> DEBU 3717 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.631 UTC [gossip.gossip] handleMessage -> DEBU 3718 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.631 UTC [gossip.pull] HandleMessage -> DEBU 3719 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.631 UTC [msp] DeserializeIdentity -> DEBU 371a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.631 UTC [msp] DeserializeIdentity -> DEBU 371b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [gossip.pull] SendDigest -> DEBU 3720 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:05.632 UTC [gossip.gossip] handleMessage -> DEBU 3721 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.644 UTC [gossip.comm] func1 -> DEBU 3722 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.644 UTC [gossip.gossip] handleMessage -> DEBU 3723 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.644 UTC [gossip.pull] HandleMessage -> DEBU 3724 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3725 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3726 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3727 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3728 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3729 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 372a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [gossip.pull] SendDigest -> DEBU 372b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:05.645 UTC [gossip.gossip] handleMessage -> DEBU 372c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.671 UTC [gossip.comm] func1 -> DEBU 372d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.671 UTC [gossip.comm] func1 -> DEBU 372e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.672 UTC [gossip.gossip] handleMessage -> DEBU 372f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.672 UTC [gossip.pull] HandleMessage -> DEBU 3730 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.672 UTC [gossip.pull] SendDigest -> DEBU 3731 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:05.673 UTC [gossip.gossip] handleMessage -> DEBU 3732 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.673 UTC [gossip.gossip] handleMessage -> DEBU 3733 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.674 UTC [gossip.gossip] handleMessage -> DEBU 3734 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3735 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.674 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3736 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:05.674 UTC [msp.identity] Verify -> DEBU 3737 Verify: digest = 00000000 a8 ad bf 04 eb 1e c7 38 ac ef 02 9a 41 6a de 26 |.......8....Aj.&| +peer0.org1.example.com | 00000010 29 03 06 7d ce 8c c2 77 62 56 bf 86 d9 7d b5 54 |)..}...wbV...}.T|" +peer0.org1.example.com | "2019-05-02 09:28:05.674 UTC [msp.identity] Verify -> DEBU 3738 Verify: sig = 00000000 30 44 02 20 30 f4 a0 c3 85 70 46 b3 8d 41 09 f1 |0D. 0....pF..A..| +peer0.org1.example.com | 00000010 55 d3 bb 5a 38 4a fb d6 24 bf 1a 2e c4 31 90 3b |U..Z8J..$....1.;| +peer0.org1.example.com | 00000020 73 ff 1f d1 02 20 43 fd 52 05 89 00 4a 35 66 2a |s.... C.R...J5f*| +peer0.org1.example.com | 00000030 9a 74 8c 53 ab 7d 14 ee 33 aa 22 03 09 35 c7 5f |.t.S.}..3."..5._| +peer0.org1.example.com | 00000040 9f 34 49 b8 2d d8 |.4I.-.|" +peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [msp.identity] Verify -> DEBU 3739 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [msp.identity] Verify -> DEBU 373a Verify: sig = 00000000 30 45 02 21 00 af 59 0a ed 19 99 7f 10 71 0a 09 |0E.!..Y......q..| +peer0.org1.example.com | 00000010 ef e0 78 a0 ab 3c 4a 5c 35 00 62 cc 0b e3 8f dc |..x.. DEBU 373b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373d updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 " +peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 " +peer0.org1.example.com | "2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [gossip.discovery] learnExistingMembers -> DEBU 3740 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 3741 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3742 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [gossip.discovery] sendMemResponse -> DEBU 3743 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [msp] DeserializeIdentity -> DEBU 3744 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [msp] DeserializeIdentity -> DEBU 3745 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.676 UTC [gossip.comm] Send -> DEBU 3746 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:05.677 UTC [gossip.discovery] sendMemResponse -> DEBU 3747 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:05.677 UTC [gossip.comm] sendToEndpoint -> DEBU 3748 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.677 UTC [gossip.comm] sendToEndpoint -> DEBU 3749 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.694 UTC [gossip.comm] func1 -> DEBU 374a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.697 UTC [gossip.gossip] handleMessage -> DEBU 374b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.698 UTC [gossip.gossip] handleMessage -> DEBU 374c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 374d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.699 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 374e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:05.700 UTC [msp] DeserializeIdentity -> DEBU 374f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3750 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:05.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3751 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:05.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3752 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:05.701 UTC [policies] Evaluate -> DEBU 3753 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:05.702 UTC [policies] Evaluate -> DEBU 3754 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:05.702 UTC [policies] Evaluate -> DEBU 3755 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:05.703 UTC [cauthdsl] func1 -> DEBU 3756 0xc0026291d0 gate 1556789285703406500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:05.703 UTC [msp] DeserializeIdentity -> DEBU 3757 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.703 UTC [msp] DeserializeIdentity -> DEBU 3758 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.704 UTC [gossip.pull] Hello -> DEBU 3759 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:05.704 UTC [msp] DeserializeIdentity -> DEBU 375a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.704 UTC [msp] DeserializeIdentity -> DEBU 375b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.704 UTC [gossip.comm] Send -> DEBU 375d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:05.704 UTC [gossip.comm] sendToEndpoint -> DEBU 375e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.comm] sendToEndpoint -> DEBU 375f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.pull] Hello -> DEBU 3760 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.comm] Send -> DEBU 3761 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.pull] Hello -> DEBU 3762 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.comm] Send -> DEBU 3763 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.pull] Hello -> DEBU 3764 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:05.705 UTC [gossip.comm] Send -> DEBU 3765 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3766 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3767 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3768 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3769 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 376a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 376b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.703 UTC [cauthdsl] func2 -> DEBU 375c 0xc0026291d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [cauthdsl] func2 -> DEBU 376c 0xc0026291d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [gossip.comm] func1 -> DEBU 376d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2621721536798222730 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [gossip.gossip] handleMessage -> DEBU 376e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2621721536798222730 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [gossip.pull] HandleMessage -> DEBU 376f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2621721536798222730 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [gossip.gossip] handleMessage -> DEBU 3770 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [gossip.comm] func1 -> DEBU 3771 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16145687940009107059 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [gossip.gossip] handleMessage -> DEBU 3772 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16145687940009107059 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [gossip.pull] HandleMessage -> DEBU 3773 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16145687940009107059 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [gossip.gossip] handleMessage -> DEBU 3774 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.708 UTC [cauthdsl] func2 -> DEBU 3775 0xc0026291d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [msp.identity] Verify -> DEBU 3776 Verify: digest = 00000000 27 b1 36 fb 51 6b 55 ff 98 b2 e5 ab 39 23 4f 33 |'.6.QkU.....9#O3| +peer0.org1.example.com | 00000010 50 92 ad 32 b1 6b e6 ce c5 b3 c9 e6 03 1c c4 e3 |P..2.k..........|" +peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [msp.identity] Verify -> DEBU 3777 Verify: sig = 00000000 30 44 02 20 62 76 55 fd 27 ec 91 79 7b f7 78 72 |0D. bvU.'..y{.xr| +peer0.org1.example.com | 00000010 af da ee 51 00 33 4b cc d7 e5 96 1b 74 5e cc 59 |...Q.3K.....t^.Y| +peer0.org1.example.com | 00000020 4d 0a a8 0f 02 20 66 44 86 07 5a be ec 10 21 ca |M.... fD..Z...!.| +peer0.org1.example.com | 00000030 d3 a2 cb eb a1 78 6a 76 5e 81 b9 f3 26 f4 96 b4 |.....xjv^...&...| +peer0.org1.example.com | 00000040 18 8f 2f 93 bd 8c |../...|" +peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [cauthdsl] func2 -> DEBU 3778 0xc0026291d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:05.709 UTC [cauthdsl] func1 -> DEBU 3779 0xc0026291d0 gate 1556789285703406500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 377e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 377f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3780 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 " +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3781 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 " +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3782 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3783 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 3784 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3785 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] sendMemResponse -> DEBU 3786 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [msp] DeserializeIdentity -> DEBU 3787 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [msp] DeserializeIdentity -> DEBU 3788 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [msp] DeserializeIdentity -> DEBU 3789 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.comm] Send -> DEBU 378a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:05.710 UTC [gossip.discovery] sendMemResponse -> DEBU 378b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:05.711 UTC [gossip.comm] sendToEndpoint -> DEBU 378c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.712 UTC [gossip.comm] sendToEndpoint -> DEBU 378d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.714 UTC [gossip.comm] func1 -> DEBU 378e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11157422678022721553 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.714 UTC [gossip.comm] func1 -> DEBU 378f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13684990153607220555 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.714 UTC [gossip.gossip] handleMessage -> DEBU 3790 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11157422678022721553 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.715 UTC [gossip.pull] HandleMessage -> DEBU 3791 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11157422678022721553 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.715 UTC [gossip.gossip] handleMessage -> DEBU 3792 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:05.716 UTC [gossip.gossip] handleMessage -> DEBU 3793 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13684990153607220555 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.716 UTC [gossip.pull] HandleMessage -> DEBU 3794 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13684990153607220555 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:05.716 UTC [gossip.gossip] handleMessage -> DEBU 3795 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:07.322 UTC [gossip.election] waitForInterrupt -> DEBU 3796 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:28:07.322 UTC [gossip.election] IsLeader -> DEBU 3797 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:28:07.322 UTC [msp.identity] Sign -> DEBU 3798 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100B1801 " +peer0.org1.example.com | "2019-05-02 09:28:07.322 UTC [msp.identity] Sign -> DEBU 3799 Sign: digest: 7F30746E3538A71E84D333B12392F6BDF8AF53624F0CEFB266DE0033E741D1B0 " +peer0.org1.example.com | "2019-05-02 09:28:07.322 UTC [gossip.election] waitForInterrupt -> DEBU 379a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [gossip.comm] Send -> DEBU 379f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 37a0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 37a1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:07.329 UTC [gossip.comm] sendToEndpoint -> DEBU 37a2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:07.330 UTC [gossip.comm] sendToEndpoint -> DEBU 37a3 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.247 UTC [msp] DeserializeIdentity -> DEBU 37a4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.247 UTC [msp] DeserializeIdentity -> DEBU 37a5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] Send -> DEBU 37a6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37a7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37a8 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37aa Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37ab Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37ac Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.250 UTC [gossip.comm] func1 -> DEBU 37ad Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.252 UTC [gossip.gossip] handleMessage -> DEBU 37b0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.253 UTC [msp] DeserializeIdentity -> DEBU 37b1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.251 UTC [gossip.comm] func1 -> DEBU 37ae Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.251 UTC [gossip.comm] func1 -> DEBU 37af Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.254 UTC [msp] DeserializeIdentity -> DEBU 37b2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.255 UTC [msp] DeserializeIdentity -> DEBU 37b3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.255 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:08.255 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.256 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.256 UTC [policies] Evaluate -> DEBU 37b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.257 UTC [policies] Evaluate -> DEBU 37b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:08.257 UTC [policies] Evaluate -> DEBU 37b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37ba Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37bb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.258 UTC [gossip.comm] Send -> DEBU 37bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37bd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37be Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.260 UTC [gossip.comm] sendToEndpoint -> DEBU 37c4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.261 UTC [cauthdsl] func1 -> DEBU 37c5 0xc00328b390 gate 1556789288261762500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:08.262 UTC [cauthdsl] func2 -> DEBU 37c6 0xc00328b390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:08.262 UTC [cauthdsl] func2 -> DEBU 37c7 0xc00328b390 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:08.263 UTC [cauthdsl] func2 -> DEBU 37c8 0xc00328b390 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.263 UTC [msp.identity] Verify -> DEBU 37c9 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:08.264 UTC [msp.identity] Verify -> DEBU 37ca Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:08.265 UTC [cauthdsl] func2 -> DEBU 37cb 0xc00328b390 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.265 UTC [cauthdsl] func1 -> DEBU 37cc 0xc00328b390 gate 1556789288261762500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:08.265 UTC [policies] Evaluate -> DEBU 37cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.266 UTC [policies] Evaluate -> DEBU 37ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.266 UTC [policies] Evaluate -> DEBU 37cf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.266 UTC [policies] Evaluate -> DEBU 37d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.267 UTC [msp.identity] Verify -> DEBU 37d1 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:08.267 UTC [msp.identity] Verify -> DEBU 37d2 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:08.268 UTC [msp] DeserializeIdentity -> DEBU 37d3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.268 UTC [msp] DeserializeIdentity -> DEBU 37d4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37d6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37d7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [policies] Evaluate -> DEBU 37d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [policies] Evaluate -> DEBU 37d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [policies] Evaluate -> DEBU 37da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [cauthdsl] func1 -> DEBU 37db 0xc0042d3280 gate 1556789288269829900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [cauthdsl] func2 -> DEBU 37dc 0xc0042d3280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [cauthdsl] func2 -> DEBU 37dd 0xc0042d3280 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:08.269 UTC [cauthdsl] func2 -> DEBU 37de 0xc0042d3280 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [msp.identity] Verify -> DEBU 37df Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [msp.identity] Verify -> DEBU 37e0 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [cauthdsl] func2 -> DEBU 37e1 0xc0042d3280 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [cauthdsl] func1 -> DEBU 37e2 0xc0042d3280 gate 1556789288269829900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.273 UTC [msp.identity] Verify -> DEBU 37e7 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:08.274 UTC [msp.identity] Verify -> DEBU 37e8 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:08.275 UTC [gossip.gossip] handleMessage -> DEBU 37e9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.275 UTC [gossip.gossip] handleMessage -> DEBU 37ea Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.275 UTC [msp] DeserializeIdentity -> DEBU 37eb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.276 UTC [msp] DeserializeIdentity -> DEBU 37ec Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.277 UTC [msp] DeserializeIdentity -> DEBU 37ed Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.278 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37ee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:08.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ef Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37f0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.281 UTC [policies] Evaluate -> DEBU 37f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.282 UTC [policies] Evaluate -> DEBU 37f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:08.282 UTC [policies] Evaluate -> DEBU 37f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.283 UTC [cauthdsl] func1 -> DEBU 37f4 0xc0024b94b0 gate 1556789288283540800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:08.283 UTC [cauthdsl] func2 -> DEBU 37f5 0xc0024b94b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:08.284 UTC [cauthdsl] func2 -> DEBU 37f6 0xc0024b94b0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:08.286 UTC [cauthdsl] func2 -> DEBU 37f7 0xc0024b94b0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.286 UTC [msp.identity] Verify -> DEBU 37f8 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:08.287 UTC [msp.identity] Verify -> DEBU 37f9 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:08.288 UTC [cauthdsl] func2 -> DEBU 37fa 0xc0024b94b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.289 UTC [cauthdsl] func1 -> DEBU 37fb 0xc0024b94b0 gate 1556789288283540800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:08.292 UTC [policies] Evaluate -> DEBU 37fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.292 UTC [policies] Evaluate -> DEBU 37fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.293 UTC [policies] Evaluate -> DEBU 37fe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.293 UTC [policies] Evaluate -> DEBU 37ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.294 UTC [msp.identity] Verify -> DEBU 3800 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:08.295 UTC [msp.identity] Verify -> DEBU 3801 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:08.295 UTC [msp] DeserializeIdentity -> DEBU 3802 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.296 UTC [msp] DeserializeIdentity -> DEBU 3803 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.296 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3804 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:08.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3805 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3806 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.298 UTC [policies] Evaluate -> DEBU 3807 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.298 UTC [policies] Evaluate -> DEBU 3808 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:08.299 UTC [policies] Evaluate -> DEBU 3809 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.300 UTC [cauthdsl] func1 -> DEBU 380a 0xc0025013a0 gate 1556789288300251500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:08.300 UTC [cauthdsl] func2 -> DEBU 380b 0xc0025013a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:08.301 UTC [cauthdsl] func2 -> DEBU 380c 0xc0025013a0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:08.302 UTC [cauthdsl] func2 -> DEBU 380d 0xc0025013a0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.303 UTC [msp.identity] Verify -> DEBU 380e Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:08.304 UTC [msp.identity] Verify -> DEBU 380f Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:08.305 UTC [cauthdsl] func2 -> DEBU 3810 0xc0025013a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.306 UTC [cauthdsl] func1 -> DEBU 3811 0xc0025013a0 gate 1556789288300251500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:08.306 UTC [policies] Evaluate -> DEBU 3812 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.307 UTC [policies] Evaluate -> DEBU 3813 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.307 UTC [policies] Evaluate -> DEBU 3814 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.308 UTC [policies] Evaluate -> DEBU 3815 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.309 UTC [msp.identity] Verify -> DEBU 3816 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:08.311 UTC [msp.identity] Verify -> DEBU 3817 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:08.313 UTC [gossip.gossip] handleMessage -> DEBU 3818 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.314 UTC [gossip.gossip] handleMessage -> DEBU 3819 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.315 UTC [msp.identity] Verify -> DEBU 381a Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:08.316 UTC [msp.identity] Verify -> DEBU 381b Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:08.317 UTC [msp] DeserializeIdentity -> DEBU 381c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.317 UTC [msp] DeserializeIdentity -> DEBU 381d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 381e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:08.319 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 381f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.319 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3820 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.320 UTC [policies] Evaluate -> DEBU 3821 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.320 UTC [policies] Evaluate -> DEBU 3822 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:08.320 UTC [policies] Evaluate -> DEBU 3823 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.321 UTC [cauthdsl] func1 -> DEBU 3824 0xc002c65bf0 gate 1556789288321352000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:08.321 UTC [cauthdsl] func2 -> DEBU 3825 0xc002c65bf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:08.322 UTC [cauthdsl] func2 -> DEBU 3826 0xc002c65bf0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:08.322 UTC [cauthdsl] func2 -> DEBU 3827 0xc002c65bf0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.322 UTC [msp.identity] Verify -> DEBU 3828 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:08.324 UTC [msp.identity] Verify -> DEBU 3829 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:08.325 UTC [cauthdsl] func2 -> DEBU 382a 0xc002c65bf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.326 UTC [cauthdsl] func1 -> DEBU 382b 0xc002c65bf0 gate 1556789288321352000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:08.327 UTC [policies] Evaluate -> DEBU 382c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.327 UTC [policies] Evaluate -> DEBU 382d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.327 UTC [policies] Evaluate -> DEBU 382e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.328 UTC [policies] Evaluate -> DEBU 382f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.329 UTC [msp.identity] Verify -> DEBU 3830 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:08.329 UTC [msp.identity] Verify -> DEBU 3831 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:08.330 UTC [msp] DeserializeIdentity -> DEBU 3832 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.331 UTC [msp] DeserializeIdentity -> DEBU 3833 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.331 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3834 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:08.332 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3835 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.332 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3836 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.334 UTC [policies] Evaluate -> DEBU 3837 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.335 UTC [policies] Evaluate -> DEBU 3838 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:08.336 UTC [policies] Evaluate -> DEBU 3839 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.336 UTC [cauthdsl] func1 -> DEBU 383a 0xc003077ae0 gate 1556789288336687100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:08.337 UTC [cauthdsl] func2 -> DEBU 383b 0xc003077ae0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:08.337 UTC [cauthdsl] func2 -> DEBU 383c 0xc003077ae0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:08.338 UTC [cauthdsl] func2 -> DEBU 383d 0xc003077ae0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.338 UTC [msp.identity] Verify -> DEBU 383e Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:08.338 UTC [msp.identity] Verify -> DEBU 383f Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:08.339 UTC [cauthdsl] func2 -> DEBU 3840 0xc003077ae0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.340 UTC [cauthdsl] func1 -> DEBU 3841 0xc003077ae0 gate 1556789288336687100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:08.340 UTC [policies] Evaluate -> DEBU 3842 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.340 UTC [policies] Evaluate -> DEBU 3843 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.341 UTC [policies] Evaluate -> DEBU 3844 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.341 UTC [policies] Evaluate -> DEBU 3845 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.341 UTC [gossip.gossip] handleMessage -> DEBU 3846 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.504 UTC [gossip.comm] func1 -> DEBU 3847 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.504 UTC [gossip.gossip] handleMessage -> DEBU 3848 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.505 UTC [msp] DeserializeIdentity -> DEBU 3849 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.505 UTC [msp] DeserializeIdentity -> DEBU 384a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.506 UTC [gossip.gossip] handleMessage -> DEBU 384b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.567 UTC [gossip.comm] func1 -> DEBU 384c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.567 UTC [gossip.gossip] handleMessage -> DEBU 384d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.568 UTC [gossip.pull] HandleMessage -> DEBU 384e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.568 UTC [gossip.pull] SendDigest -> DEBU 384f Sending BLOCK_MSG digest: [6 7 8 1 2 3 4 5 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:08.568 UTC [gossip.gossip] handleMessage -> DEBU 3850 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.753 UTC [gossip.comm] func1 -> DEBU 3851 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.754 UTC [gossip.gossip] handleMessage -> DEBU 3852 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.755 UTC [msp] DeserializeIdentity -> DEBU 3853 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.755 UTC [msp] DeserializeIdentity -> DEBU 3854 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.755 UTC [msp] DeserializeIdentity -> DEBU 3855 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.755 UTC [gossip.gossip] handleMessage -> DEBU 3856 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.807 UTC [gossip.comm] func1 -> DEBU 3857 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.807 UTC [gossip.gossip] handleMessage -> DEBU 3858 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.807 UTC [gossip.gossip] handleMessage -> DEBU 3859 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.807 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.807 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 385b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [msp] DeserializeIdentity -> DEBU 385c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 385d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 385e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 385f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [policies] Evaluate -> DEBU 3860 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.808 UTC [policies] Evaluate -> DEBU 3861 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:08.809 UTC [policies] Evaluate -> DEBU 3862 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:08.809 UTC [cauthdsl] func1 -> DEBU 3863 0xc003f098d0 gate 1556789288809414900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:08.809 UTC [cauthdsl] func2 -> DEBU 3864 0xc003f098d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:08.809 UTC [cauthdsl] func2 -> DEBU 3865 0xc003f098d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:08.809 UTC [cauthdsl] func2 -> DEBU 3866 0xc003f098d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.810 UTC [msp.identity] Verify -> DEBU 3867 Verify: digest = 00000000 a1 75 1b 11 26 e1 38 06 9a 6f a3 62 38 56 57 94 |.u..&.8..o.b8VW.| +peer0.org1.example.com | 00000010 0b ca 59 e6 19 28 49 fe 27 9b 1a c6 4d 33 7d f9 |..Y..(I.'...M3}.|" +peer0.org1.example.com | "2019-05-02 09:28:08.810 UTC [msp.identity] Verify -> DEBU 3868 Verify: sig = 00000000 30 45 02 21 00 f2 11 27 85 de f2 2b 3d 77 4e c9 |0E.!...'...+=wN.| +peer0.org1.example.com | 00000010 b3 da 02 e6 b2 05 10 e4 fa a3 77 5e 17 40 ab 14 |..........w^.@..| +peer0.org1.example.com | 00000020 6e e0 f4 64 35 02 20 46 16 b5 c7 ea 1a 54 7b 38 |n..d5. F.....T{8| +peer0.org1.example.com | 00000030 37 92 21 c3 42 94 76 aa fe 15 43 5c b1 8f 45 a9 |7.!.B.v...C\..E.| +peer0.org1.example.com | 00000040 47 dd 46 72 eb 70 57 |G.Fr.pW|" +peer0.org1.example.com | "2019-05-02 09:28:08.810 UTC [cauthdsl] func2 -> DEBU 3869 0xc003f098d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [cauthdsl] func1 -> DEBU 386a 0xc003f098d0 gate 1556789288809414900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:08.811 UTC [gossip.discovery] handleAliveMessage -> DEBU 386f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3870 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3871 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 " +peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3872 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 " +peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3873 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3874 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.812 UTC [gossip.discovery] handleAliveMessage -> DEBU 3875 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.813 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3876 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.817 UTC [gossip.comm] func1 -> DEBU 3877 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.817 UTC [gossip.gossip] handleMessage -> DEBU 3879 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.818 UTC [gossip.gossip] handleMessage -> DEBU 387a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.817 UTC [gossip.comm] func1 -> DEBU 3878 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 387b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.819 UTC [gossip.discovery] handleMsgFromComm -> DEBU 387e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.818 UTC [msp] DeserializeIdentity -> DEBU 387c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.819 UTC [msp] DeserializeIdentity -> DEBU 387f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.819 UTC [gossip.gossip] handleMessage -> DEBU 387d Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.820 UTC [gossip.gossip] handleMessage -> DEBU 3881 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.819 UTC [msp] DeserializeIdentity -> DEBU 3880 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.820 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3882 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.820 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3883 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.821 UTC [msp] DeserializeIdentity -> DEBU 3884 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.821 UTC [msp] DeserializeIdentity -> DEBU 3885 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.821 UTC [msp] DeserializeIdentity -> DEBU 3886 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.822 UTC [msp] DeserializeIdentity -> DEBU 3887 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.822 UTC [gossip.comm] Send -> DEBU 3888 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:08.822 UTC [gossip.comm] sendToEndpoint -> DEBU 3889 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.823 UTC [gossip.comm] sendToEndpoint -> DEBU 388a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.823 UTC [msp] DeserializeIdentity -> DEBU 388b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.823 UTC [gossip.comm] Send -> DEBU 388c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:08.824 UTC [gossip.comm] sendToEndpoint -> DEBU 388d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.825 UTC [gossip.comm] sendToEndpoint -> DEBU 388e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:08.981 UTC [gossip.comm] func1 -> DEBU 388f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.981 UTC [gossip.gossip] handleMessage -> DEBU 3890 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:08.981 UTC [msp] DeserializeIdentity -> DEBU 3891 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.981 UTC [msp] DeserializeIdentity -> DEBU 3892 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.982 UTC [msp] DeserializeIdentity -> DEBU 3893 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:08.982 UTC [gossip.gossip] handleMessage -> DEBU 3894 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.054 UTC [msp.identity] Sign -> DEBU 3895 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151029 " +peer0.org1.example.com | "2019-05-02 09:28:09.054 UTC [msp.identity] Sign -> DEBU 3896 Sign: digest: 73B8DC8ED20B5D216C16DA8D0769521CD788ED38DA01E5477397329AE90110EF " +peer0.org1.example.com | "2019-05-02 09:28:09.055 UTC [msp.identity] Sign -> DEBU 3897 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:09.055 UTC [msp.identity] Sign -> DEBU 3898 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:09.055 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3899 Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:28:09.060 UTC [msp] DeserializeIdentity -> DEBU 389a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.060 UTC [msp] DeserializeIdentity -> DEBU 389b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.061 UTC [msp] DeserializeIdentity -> DEBU 389c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.061 UTC [gossip.comm] Send -> DEBU 389d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.061 UTC [gossip.comm] Send -> DEBU 389e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.061 UTC [msp] DeserializeIdentity -> DEBU 389f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] Send -> DEBU 38a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.061 UTC [gossip.comm] sendToEndpoint -> DEBU 38a0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a3 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.097 UTC [gossip.comm] func1 -> DEBU 38a7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.097 UTC [gossip.gossip] handleMessage -> DEBU 38a8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.097 UTC [gossip.gossip] handleMessage -> DEBU 38a9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.097 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38ab Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:09.099 UTC [msp.identity] Verify -> DEBU 38ac Verify: digest = 00000000 34 1f 66 70 48 e7 de d8 4a 0e f1 8d 7f 75 4d 83 |4.fpH...J....uM.| +peer0.org1.example.com | 00000010 a6 16 25 4e 7b a6 bf 83 e4 98 ca 88 c8 4c f3 f0 |..%N{........L..|" +peer0.org1.example.com | "2019-05-02 09:28:09.099 UTC [msp.identity] Verify -> DEBU 38ad Verify: sig = 00000000 30 45 02 21 00 b1 e3 f6 11 c6 94 b5 1b 98 9c b6 |0E.!............| +peer0.org1.example.com | 00000010 0d 2a 6c d4 7c 98 a6 0e e9 f5 8e fb f6 39 4d 36 |.*l.|........9M6| +peer0.org1.example.com | 00000020 82 10 9a 90 0f 02 20 18 af e8 d6 1a f8 b9 bb 88 |...... .........| +peer0.org1.example.com | 00000030 43 19 ab 8f df 9e 28 d2 cd 45 bd f9 b2 56 0f a2 |C.....(..E...V..| +peer0.org1.example.com | 00000040 bb b3 af 5c 1a 18 24 |...\..$|" +peer0.org1.example.com | "2019-05-02 09:28:09.100 UTC [msp.identity] Verify -> DEBU 38ae Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:28:09.100 UTC [msp.identity] Verify -> DEBU 38af Verify: sig = 00000000 30 45 02 21 00 a2 ce b0 77 99 5a e2 eb 9b 95 d2 |0E.!....w.Z.....| +peer0.org1.example.com | 00000010 84 7e ea 01 6e 1f 91 d9 7a b0 ee 91 c0 e7 85 c1 |.~..n...z.......| +peer0.org1.example.com | 00000020 63 da 25 bf 20 02 20 48 e3 cc e5 c9 c2 59 b7 c2 |c.%. . H.....Y..| +peer0.org1.example.com | 00000030 1b ea 17 7d 87 cd 37 2a 94 4b 9a 84 98 30 59 e8 |...}..7*.K...0Y.| +peer0.org1.example.com | 00000040 75 d5 77 d0 a3 6a aa |u.w..j.|" +peer0.org1.example.com | "2019-05-02 09:28:09.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 38b0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.101 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:09.106 UTC [gossip.comm] func1 -> DEBU 38b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b3 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 " +peer0.org1.example.com | "2019-05-02 09:28:09.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 " +peer0.org1.example.com | "2019-05-02 09:28:09.107 UTC [gossip.gossip] handleMessage -> DEBU 38b5 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:09.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b7 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.107 UTC [gossip.discovery] handleAliveMessage -> DEBU 38b8 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38b9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.108 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.109 UTC [gossip.comm] func1 -> DEBU 38bb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.109 UTC [gossip.gossip] handleMessage -> DEBU 38bc Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.110 UTC [gossip.gossip] handleMessage -> DEBU 38bd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.110 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38be Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.110 UTC [gossip.gossip] handleMessage -> DEBU 38bf Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.111 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.111 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38c1 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.118 UTC [msp] DeserializeIdentity -> DEBU 38c2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.119 UTC [msp] DeserializeIdentity -> DEBU 38c3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.120 UTC [msp] DeserializeIdentity -> DEBU 38c4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.120 UTC [gossip.comm] Send -> DEBU 38c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.120 UTC [msp] DeserializeIdentity -> DEBU 38c6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.121 UTC [gossip.comm] Send -> DEBU 38c7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.121 UTC [gossip.comm] sendToEndpoint -> DEBU 38c8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.121 UTC [gossip.comm] sendToEndpoint -> DEBU 38c9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.121 UTC [gossip.comm] sendToEndpoint -> DEBU 38ca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.122 UTC [gossip.comm] sendToEndpoint -> DEBU 38cb Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.172 UTC [gossip.comm] func1 -> DEBU 38cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.172 UTC [gossip.gossip] handleMessage -> DEBU 38cd Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.173 UTC [gossip.gossip] handleMessage -> DEBU 38ce Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.173 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38d0 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:09.175 UTC [msp] DeserializeIdentity -> DEBU 38d1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.176 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:09.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38d3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:09.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38d4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:09.177 UTC [policies] Evaluate -> DEBU 38d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:09.178 UTC [policies] Evaluate -> DEBU 38d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:09.180 UTC [policies] Evaluate -> DEBU 38d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:09.181 UTC [cauthdsl] func1 -> DEBU 38d8 0xc003d68920 gate 1556789289181739600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:09.182 UTC [cauthdsl] func2 -> DEBU 38d9 0xc003d68920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:09.183 UTC [cauthdsl] func2 -> DEBU 38da 0xc003d68920 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:09.184 UTC [cauthdsl] func2 -> DEBU 38db 0xc003d68920 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:09.184 UTC [msp.identity] Verify -> DEBU 38dc Verify: digest = 00000000 37 ad 16 38 c1 22 77 1c 31 b6 4d 36 93 80 be 04 |7..8."w.1.M6....| +peer0.org1.example.com | 00000010 1b a3 b8 ff 3f 87 e7 a4 36 65 7d d5 d1 ef c6 5b |....?...6e}....[|" +peer0.org1.example.com | "2019-05-02 09:28:09.186 UTC [gossip.comm] func1 -> DEBU 38dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.186 UTC [gossip.gossip] handleMessage -> DEBU 38df Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.186 UTC [msp.identity] Verify -> DEBU 38de Verify: sig = 00000000 30 44 02 20 7b f6 8a 22 29 b4 de dd 48 05 b6 5f |0D. {..")...H.._| +peer0.org1.example.com | 00000010 e1 1f 1e 44 4c 4e 66 98 84 f9 a5 09 79 1c 40 9c |...DLNf.....y.@.| +peer0.org1.example.com | 00000020 af c6 0c a3 02 20 30 6f f4 a5 f8 04 dd a0 c4 3c |..... 0o.......<| +peer0.org1.example.com | 00000030 bc aa e7 0e 53 dc 1c 7d 24 f1 29 ea 83 ef c4 25 |....S..}$.)....%| +peer0.org1.example.com | 00000040 9c ee 1a 0b dd a5 |......|" +peer0.org1.example.com | "2019-05-02 09:28:09.188 UTC [cauthdsl] func2 -> DEBU 38e0 0xc003d68920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:09.188 UTC [cauthdsl] func1 -> DEBU 38e1 0xc003d68920 gate 1556789289181739600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:09.189 UTC [policies] Evaluate -> DEBU 38e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.189 UTC [policies] Evaluate -> DEBU 38e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [gossip.comm] func1 -> DEBU 38e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.190 UTC [policies] Evaluate -> DEBU 38e4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [policies] Evaluate -> DEBU 38e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e9 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 " +peer0.org1.example.com | "2019-05-02 09:28:09.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 38ea Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 " +peer0.org1.example.com | "2019-05-02 09:28:09.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 38eb Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:09.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 38ec Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.193 UTC [gossip.discovery] handleAliveMessage -> DEBU 38ed Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.193 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ee Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.gossip] handleMessage -> DEBU 38ef Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.gossip] handleMessage -> DEBU 38f0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.gossip] handleMessage -> DEBU 38f3 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.197 UTC [msp] DeserializeIdentity -> DEBU 38f5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.201 UTC [msp] DeserializeIdentity -> DEBU 38f6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.206 UTC [msp] DeserializeIdentity -> DEBU 38f7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.207 UTC [msp] DeserializeIdentity -> DEBU 38f8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.208 UTC [msp] DeserializeIdentity -> DEBU 38f9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.209 UTC [msp] DeserializeIdentity -> DEBU 38fb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.210 UTC [gossip.comm] Send -> DEBU 38fc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.210 UTC [msp] DeserializeIdentity -> DEBU 38fd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.209 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38fa Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.210 UTC [gossip.comm] sendToEndpoint -> DEBU 38fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.211 UTC [gossip.comm] sendToEndpoint -> DEBU 3900 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.210 UTC [msp] DeserializeIdentity -> DEBU 38ff Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.214 UTC [gossip.comm] Send -> DEBU 3901 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3902 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3903 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.613 UTC [msp.identity] Sign -> DEBU 3904 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102A " +peer0.org1.example.com | "2019-05-02 09:28:09.614 UTC [msp.identity] Sign -> DEBU 3905 Sign: digest: F7DE0249F4584EFE2D0BC0F49C32E173DBC309588E5D22168386C156B5A2A574 " +peer0.org1.example.com | "2019-05-02 09:28:09.615 UTC [msp.identity] Sign -> DEBU 3906 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:09.616 UTC [msp.identity] Sign -> DEBU 3907 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:09.619 UTC [gossip.comm] Send -> DEBU 3908 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.619 UTC [msp] DeserializeIdentity -> DEBU 3909 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.620 UTC [gossip.comm] Send -> DEBU 390a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.621 UTC [msp] DeserializeIdentity -> DEBU 390b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.622 UTC [gossip.comm] Send -> DEBU 390c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.632 UTC [gossip.comm] sendToEndpoint -> DEBU 390d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.632 UTC [gossip.comm] sendToEndpoint -> DEBU 390e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.632 UTC [gossip.comm] sendToEndpoint -> DEBU 390f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.633 UTC [gossip.comm] sendToEndpoint -> DEBU 3910 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.634 UTC [gossip.comm] sendToEndpoint -> DEBU 3911 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.634 UTC [gossip.comm] sendToEndpoint -> DEBU 3912 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.637 UTC [gossip.comm] func1 -> DEBU 3913 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.638 UTC [gossip.comm] func1 -> DEBU 3914 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.639 UTC [gossip.gossip] handleMessage -> DEBU 3915 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.639 UTC [gossip.gossip] handleMessage -> DEBU 3916 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.641 UTC [gossip.gossip] handleMessage -> DEBU 3917 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.658 UTC [gossip.comm] func1 -> DEBU 391a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.658 UTC [gossip.comm] func1 -> DEBU 391b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.642 UTC [gossip.comm] func1 -> DEBU 3918 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.659 UTC [gossip.comm] func1 -> DEBU 391c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3919 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.659 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 391d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:09.659 UTC [msp] DeserializeIdentity -> DEBU 391e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.660 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 391f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:09.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3920 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:09.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3921 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:09.660 UTC [policies] Evaluate -> DEBU 3922 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:09.660 UTC [policies] Evaluate -> DEBU 3923 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [policies] Evaluate -> DEBU 3924 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [cauthdsl] func1 -> DEBU 3925 0xc002534e10 gate 1556789289661227400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [cauthdsl] func2 -> DEBU 3926 0xc002534e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [cauthdsl] func2 -> DEBU 3927 0xc002534e10 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [cauthdsl] func2 -> DEBU 3928 0xc002534e10 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:09.661 UTC [msp.identity] Verify -> DEBU 3929 Verify: digest = 00000000 7b 6e 12 89 dd 80 a7 4b df 68 c5 8e b0 91 55 4c |{n.....K.h....UL| +peer0.org1.example.com | 00000010 e7 39 c3 da 02 63 42 71 3c 4a 60 24 57 93 1c 1f |.9...cBq DEBU 392a Verify: sig = 00000000 30 44 02 20 0e b1 3a 27 60 c0 d4 9d 00 03 d6 a8 |0D. ..:'`.......| +peer0.org1.example.com | 00000010 b1 af 90 d2 3c 12 90 1f 35 89 2a 52 20 8f 6c 47 |....<...5.*R .lG| +peer0.org1.example.com | 00000020 5d 4e 5c f7 02 20 57 18 38 f6 83 95 cd 4b 28 0e |]N\.. W.8....K(.| +peer0.org1.example.com | 00000030 ea 6a ea 01 4c 49 ca 23 f7 7a 6e d7 c1 4e 79 42 |.j..LI.#.zn..NyB| +peer0.org1.example.com | 00000040 42 bb c7 8b 68 9e |B...h.|" +peer0.org1.example.com | "2019-05-02 09:28:09.662 UTC [cauthdsl] func2 -> DEBU 392b 0xc002534e10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:09.662 UTC [cauthdsl] func1 -> DEBU 392c 0xc002534e10 gate 1556789289661227400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:09.662 UTC [policies] Evaluate -> DEBU 392d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.662 UTC [policies] Evaluate -> DEBU 392e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [policies] Evaluate -> DEBU 392f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [policies] Evaluate -> DEBU 3930 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [gossip.discovery] handleAliveMessage -> DEBU 3931 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3932 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3933 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 " +peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3934 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 " +peer0.org1.example.com | "2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3935 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 3936 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.discovery] handleAliveMessage -> DEBU 3937 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3938 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.discovery] sendMemResponse -> DEBU 3939 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [msp] DeserializeIdentity -> DEBU 393a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [msp] DeserializeIdentity -> DEBU 393b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [msp] DeserializeIdentity -> DEBU 393c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.comm] Send -> DEBU 393d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.discovery] sendMemResponse -> DEBU 393e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.comm] sendToEndpoint -> DEBU 393f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.664 UTC [gossip.comm] sendToEndpoint -> DEBU 3940 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.671 UTC [gossip.comm] func1 -> DEBU 3941 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.676 UTC [gossip.pull] HandleMessage -> DEBU 3942 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.686 UTC [msp] DeserializeIdentity -> DEBU 3943 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.686 UTC [msp] DeserializeIdentity -> DEBU 3944 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.687 UTC [msp] DeserializeIdentity -> DEBU 3945 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.687 UTC [msp] DeserializeIdentity -> DEBU 3946 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.688 UTC [msp] DeserializeIdentity -> DEBU 3947 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.688 UTC [msp] DeserializeIdentity -> DEBU 3948 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.688 UTC [gossip.pull] SendDigest -> DEBU 3949 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:09.693 UTC [gossip.gossip] handleMessage -> DEBU 394a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.693 UTC [gossip.gossip] handleMessage -> DEBU 394b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.693 UTC [gossip.gossip] handleMessage -> DEBU 394c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.694 UTC [gossip.gossip] handleMessage -> DEBU 394e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 394d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 394f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:09.695 UTC [msp.identity] Verify -> DEBU 3950 Verify: digest = 00000000 f7 de 02 49 f4 58 4e fe 2d 0b c0 f4 9c 32 e1 73 |...I.XN.-....2.s| +peer0.org1.example.com | 00000010 db c3 09 58 8e 5d 22 16 83 86 c1 56 b5 a2 a5 74 |...X.]"....V...t|" +peer0.org1.example.com | "2019-05-02 09:28:09.695 UTC [msp.identity] Verify -> DEBU 3951 Verify: sig = 00000000 30 45 02 21 00 9c e2 f3 eb c2 5b f0 00 2a 7b 9f |0E.!......[..*{.| +peer0.org1.example.com | 00000010 e2 be 4a 38 a9 4a 8d b7 47 a8 b0 0f e4 2d a1 66 |..J8.J..G....-.f| +peer0.org1.example.com | 00000020 4d e1 79 12 b4 02 20 77 de 6e 56 d3 96 15 17 93 |M.y... w.nV.....| +peer0.org1.example.com | 00000030 7f 8b 87 46 88 81 d9 1c 66 a8 bc 51 d8 d6 21 bc |...F....f..Q..!.| +peer0.org1.example.com | 00000040 55 7e 22 fa 6e 06 19 |U~".n..|" +peer0.org1.example.com | "2019-05-02 09:28:09.696 UTC [msp.identity] Verify -> DEBU 3952 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:28:09.698 UTC [msp.identity] Verify -> DEBU 3953 Verify: sig = 00000000 30 44 02 20 1c f6 13 da 70 99 f0 f8 0e 5c 10 7f |0D. ....p....\..| +peer0.org1.example.com | 00000010 ad 79 d7 ca 85 4a 32 2b e2 11 ab 6b 54 05 7e bc |.y...J2+...kT.~.| +peer0.org1.example.com | 00000020 27 b9 1a dc 02 20 71 ee 61 49 c3 e9 53 b5 b0 c2 |'.... q.aI..S...| +peer0.org1.example.com | 00000030 00 55 bb a9 12 39 4c d4 dd 04 e8 0e 95 5e 23 01 |.U...9L......^#.| +peer0.org1.example.com | 00000040 74 5d d8 6a 52 4d |t].jRM|" +peer0.org1.example.com | "2019-05-02 09:28:09.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 3954 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.699 UTC [gossip.discovery] isSentByMe -> DEBU 3955 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 3956 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3957 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3958 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.700 UTC [gossip.gossip] handleMessage -> DEBU 3959 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.700 UTC [gossip.gossip] handleMessage -> DEBU 395a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.700 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 395b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:09.701 UTC [msp.identity] Verify -> DEBU 395c Verify: digest = 00000000 f7 de 02 49 f4 58 4e fe 2d 0b c0 f4 9c 32 e1 73 |...I.XN.-....2.s| +peer0.org1.example.com | 00000010 db c3 09 58 8e 5d 22 16 83 86 c1 56 b5 a2 a5 74 |...X.]"....V...t|" +peer0.org1.example.com | "2019-05-02 09:28:09.703 UTC [msp.identity] Verify -> DEBU 395d Verify: sig = 00000000 30 45 02 21 00 9c e2 f3 eb c2 5b f0 00 2a 7b 9f |0E.!......[..*{.| +peer0.org1.example.com | 00000010 e2 be 4a 38 a9 4a 8d b7 47 a8 b0 0f e4 2d a1 66 |..J8.J..G....-.f| +peer0.org1.example.com | 00000020 4d e1 79 12 b4 02 20 77 de 6e 56 d3 96 15 17 93 |M.y... w.nV.....| +peer0.org1.example.com | 00000030 7f 8b 87 46 88 81 d9 1c 66 a8 bc 51 d8 d6 21 bc |...F....f..Q..!.| +peer0.org1.example.com | 00000040 55 7e 22 fa 6e 06 19 |U~".n..|" +peer0.org1.example.com | "2019-05-02 09:28:09.703 UTC [gossip.discovery] handleAliveMessage -> DEBU 395e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.706 UTC [gossip.discovery] isSentByMe -> DEBU 395f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 3960 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3962 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3963 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.707 UTC [gossip.comm] func1 -> DEBU 3961 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.709 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3964 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:09.710 UTC [msp] DeserializeIdentity -> DEBU 3968 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.711 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 396a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:09.710 UTC [gossip.gossip] handleMessage -> DEBU 3969 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.713 UTC [gossip.gossip] handleMessage -> DEBU 396c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.710 UTC [gossip.pull] Hello -> DEBU 3966 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:09.713 UTC [gossip.comm] Send -> DEBU 396d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.713 UTC [gossip.pull] HandleMessage -> DEBU 396e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.713 UTC [msp] DeserializeIdentity -> DEBU 396f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3971 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3972 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3974 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3975 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.715 UTC [msp] DeserializeIdentity -> DEBU 3976 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.715 UTC [gossip.pull] SendDigest -> DEBU 3977 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:09.715 UTC [gossip.gossip] handleMessage -> DEBU 3978 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.716 UTC [gossip.gossip] handleMessage -> DEBU 3979 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.716 UTC [gossip.pull] HandleMessage -> DEBU 397a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3973 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.716 UTC [gossip.pull] SendDigest -> DEBU 397b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:09.717 UTC [gossip.gossip] handleMessage -> DEBU 397c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.717 UTC [gossip.gossip] handleMessage -> DEBU 397d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.713 UTC [gossip.pull] Hello -> DEBU 3970 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:09.718 UTC [gossip.comm] Send -> DEBU 397e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.718 UTC [gossip.pull] Hello -> DEBU 397f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:09.718 UTC [gossip.comm] Send -> DEBU 3981 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.720 UTC [gossip.comm] sendToEndpoint -> DEBU 3983 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.720 UTC [gossip.comm] sendToEndpoint -> DEBU 3984 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.716 UTC [gossip.comm] sendToEndpoint -> DEBU 3980 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 396b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:09.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3985 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:09.710 UTC [gossip.comm] func1 -> DEBU 3967 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.710 UTC [msp] DeserializeIdentity -> DEBU 3965 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.721 UTC [policies] Evaluate -> DEBU 3986 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:09.722 UTC [policies] Evaluate -> DEBU 3987 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:09.722 UTC [policies] Evaluate -> DEBU 3988 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:09.723 UTC [cauthdsl] func1 -> DEBU 3989 0xc00352e360 gate 1556789289723314300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:09.723 UTC [cauthdsl] func2 -> DEBU 398a 0xc00352e360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:09.723 UTC [cauthdsl] func2 -> DEBU 398b 0xc00352e360 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:09.724 UTC [cauthdsl] func2 -> DEBU 398c 0xc00352e360 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:09.724 UTC [msp.identity] Verify -> DEBU 398d Verify: digest = 00000000 7b 6e 12 89 dd 80 a7 4b df 68 c5 8e b0 91 55 4c |{n.....K.h....UL| +peer0.org1.example.com | 00000010 e7 39 c3 da 02 63 42 71 3c 4a 60 24 57 93 1c 1f |.9...cBq DEBU 398f Verify: sig = 00000000 30 44 02 20 0e b1 3a 27 60 c0 d4 9d 00 03 d6 a8 |0D. ..:'`.......| +peer0.org1.example.com | 00000010 b1 af 90 d2 3c 12 90 1f 35 89 2a 52 20 8f 6c 47 |....<...5.*R .lG| +peer0.org1.example.com | 00000020 5d 4e 5c f7 02 20 57 18 38 f6 83 95 cd 4b 28 0e |]N\.. W.8....K(.| +peer0.org1.example.com | 00000030 ea 6a ea 01 4c 49 ca 23 f7 7a 6e d7 c1 4e 79 42 |.j..LI.#.zn..NyB| +peer0.org1.example.com | 00000040 42 bb c7 8b 68 9e |B...h.|" +peer0.org1.example.com | "2019-05-02 09:28:09.725 UTC [cauthdsl] func2 -> DEBU 3990 0xc00352e360 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:09.725 UTC [cauthdsl] func1 -> DEBU 3991 0xc00352e360 gate 1556789289723314300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:09.724 UTC [msp] DeserializeIdentity -> DEBU 398e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.725 UTC [policies] Evaluate -> DEBU 3992 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.726 UTC [policies] Evaluate -> DEBU 3994 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.726 UTC [policies] Evaluate -> DEBU 3995 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.726 UTC [policies] Evaluate -> DEBU 3996 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.726 UTC [gossip.discovery] handleAliveMessage -> DEBU 3997 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 3998 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.727 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3999 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:09.727 UTC [msp.identity] Verify -> DEBU 399a Verify: digest = 00000000 f7 de 02 49 f4 58 4e fe 2d 0b c0 f4 9c 32 e1 73 |...I.XN.-....2.s| +peer0.org1.example.com | 00000010 db c3 09 58 8e 5d 22 16 83 86 c1 56 b5 a2 a5 74 |...X.]"....V...t|" +peer0.org1.example.com | "2019-05-02 09:28:09.727 UTC [msp.identity] Verify -> DEBU 399b Verify: sig = 00000000 30 45 02 21 00 9c e2 f3 eb c2 5b f0 00 2a 7b 9f |0E.!......[..*{.| +peer0.org1.example.com | 00000010 e2 be 4a 38 a9 4a 8d b7 47 a8 b0 0f e4 2d a1 66 |..J8.J..G....-.f| +peer0.org1.example.com | 00000020 4d e1 79 12 b4 02 20 77 de 6e 56 d3 96 15 17 93 |M.y... w.nV.....| +peer0.org1.example.com | 00000030 7f 8b 87 46 88 81 d9 1c 66 a8 bc 51 d8 d6 21 bc |...F....f..Q..!.| +peer0.org1.example.com | 00000040 55 7e 22 fa 6e 06 19 |U~".n..|" +peer0.org1.example.com | "2019-05-02 09:28:09.728 UTC [gossip.discovery] handleAliveMessage -> DEBU 399c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.728 UTC [gossip.discovery] isSentByMe -> DEBU 399d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.728 UTC [gossip.discovery] handleAliveMessage -> DEBU 399e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 399f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39a0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39a1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:09.729 UTC [msp.identity] Verify -> DEBU 39a2 Verify: digest = 00000000 8f 68 76 c3 0c e0 b0 37 7c f6 29 61 e4 27 35 e2 |.hv....7|.)a.'5.| +peer0.org1.example.com | 00000010 c7 87 68 18 6d f4 3f 7f 4f 74 b4 12 21 52 ed 7f |..h.m.?.Ot..!R..|" +peer0.org1.example.com | "2019-05-02 09:28:09.729 UTC [msp.identity] Verify -> DEBU 39a3 Verify: sig = 00000000 30 44 02 20 18 0a e6 41 8b 1a 99 6d 30 a2 52 1c |0D. ...A...m0.R.| +peer0.org1.example.com | 00000010 21 84 21 36 cc 86 4f a1 48 23 f7 16 05 1a 9e ce |!.!6..O.H#......| +peer0.org1.example.com | 00000020 54 dc 83 1a 02 20 34 d8 6d 56 a8 31 3c 75 88 32 |T.... 4.mV.1 DEBU 39a4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:28:09.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3982 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.726 UTC [gossip.pull] Hello -> DEBU 3993 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:09.731 UTC [msp.identity] Verify -> DEBU 39a5 Verify: sig = 00000000 30 44 02 20 22 e2 72 2e 41 92 eb 36 a3 fd 12 0d |0D. ".r.A..6....| +peer0.org1.example.com | 00000010 68 c2 81 db 04 cb e9 3f c9 e5 37 c0 c6 4b 85 8c |h......?..7..K..| +peer0.org1.example.com | 00000020 8a 1b 7e b9 02 20 60 48 8b 66 6d 05 36 92 aa 40 |..~.. `H.fm.6..@| +peer0.org1.example.com | 00000030 72 42 a7 f7 05 80 17 3e 8d 3e 1a 82 d4 95 50 dd |rB.....>.>....P.| +peer0.org1.example.com | 00000040 2b 0f 76 01 e8 45 |+.v..E|" +peer0.org1.example.com | "2019-05-02 09:28:09.732 UTC [gossip.discovery] handleAliveMessage -> DEBU 39a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 39aa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:09.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ab updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 " +peer0.org1.example.com | "2019-05-02 09:28:09.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ac Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 " +peer0.org1.example.com | "2019-05-02 09:28:09.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ad Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:09.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ae Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 39af Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39b0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.735 UTC [gossip.discovery] sendMemResponse -> DEBU 39b1 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:09.735 UTC [msp] DeserializeIdentity -> DEBU 39b2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.736 UTC [msp] DeserializeIdentity -> DEBU 39b3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.736 UTC [gossip.comm] Send -> DEBU 39b4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.736 UTC [gossip.discovery] sendMemResponse -> DEBU 39b5 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:09.736 UTC [gossip.comm] sendToEndpoint -> DEBU 39b6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.737 UTC [gossip.comm] sendToEndpoint -> DEBU 39b7 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.737 UTC [gossip.comm] func1 -> DEBU 39b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4841735105627059395 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.731 UTC [gossip.comm] sendToEndpoint -> DEBU 39a7 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.732 UTC [msp] DeserializeIdentity -> DEBU 39a8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.742 UTC [msp] DeserializeIdentity -> DEBU 39bb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.731 UTC [gossip.gossip] handleMessage -> DEBU 39a6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.741 UTC [gossip.comm] func1 -> DEBU 39b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1355778949748241885 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.742 UTC [gossip.comm] func1 -> DEBU 39ba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2948271416903558199 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.743 UTC [gossip.comm] Send -> DEBU 39bc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.744 UTC [gossip.gossip] handleMessage -> DEBU 39bd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.744 UTC [gossip.gossip] handleMessage -> DEBU 39bf Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.745 UTC [gossip.gossip] handleMessage -> DEBU 39c1 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4841735105627059395 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.745 UTC [gossip.pull] HandleMessage -> DEBU 39c2 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4841735105627059395 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.745 UTC [gossip.gossip] handleMessage -> DEBU 39c3 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.746 UTC [gossip.gossip] handleMessage -> DEBU 39c4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1355778949748241885 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.746 UTC [gossip.pull] HandleMessage -> DEBU 39c5 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1355778949748241885 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.746 UTC [gossip.gossip] handleMessage -> DEBU 39c6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.746 UTC [gossip.gossip] handleMessage -> DEBU 39c7 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2948271416903558199 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.747 UTC [gossip.pull] HandleMessage -> DEBU 39c8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2948271416903558199 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.747 UTC [gossip.gossip] handleMessage -> DEBU 39c9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.744 UTC [gossip.comm] sendToEndpoint -> DEBU 39be Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.747 UTC [gossip.comm] sendToEndpoint -> DEBU 39ca Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.749 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39cb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:09.749 UTC [msp] DeserializeIdentity -> DEBU 39cc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39cd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:09.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39ce Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:09.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39cf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:09.751 UTC [policies] Evaluate -> DEBU 39d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:09.751 UTC [policies] Evaluate -> DEBU 39d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:09.751 UTC [policies] Evaluate -> DEBU 39d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:09.752 UTC [cauthdsl] func1 -> DEBU 39d3 0xc0043edbd0 gate 1556789289752181000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:09.752 UTC [cauthdsl] func2 -> DEBU 39d4 0xc0043edbd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:09.752 UTC [cauthdsl] func2 -> DEBU 39d5 0xc0043edbd0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:09.752 UTC [cauthdsl] func2 -> DEBU 39d6 0xc0043edbd0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:09.753 UTC [msp.identity] Verify -> DEBU 39d7 Verify: digest = 00000000 43 7e 96 3a d4 64 a7 88 4a 57 9b 29 24 d1 02 1e |C~.:.d..JW.)$...| +peer0.org1.example.com | 00000010 3f a0 e0 a0 0f 95 06 5b 67 e8 38 42 fe 10 0b c5 |?......[g.8B....|" +peer0.org1.example.com | "2019-05-02 09:28:09.753 UTC [msp.identity] Verify -> DEBU 39d8 Verify: sig = 00000000 30 45 02 21 00 86 ac 9f 8f a0 ec f0 c1 c3 51 39 |0E.!..........Q9| +peer0.org1.example.com | 00000010 25 ec 28 33 45 94 20 6c f4 04 0d 15 67 b2 32 1a |%.(3E. l....g.2.| +peer0.org1.example.com | 00000020 72 e5 cb 26 39 02 20 77 4d bc 7e 5c 45 dc 7e f4 |r..&9. wM.~\E.~.| +peer0.org1.example.com | 00000030 57 c7 83 d4 b9 25 79 4e f1 45 54 39 60 81 20 e1 |W....%yN.ET9`. .| +peer0.org1.example.com | 00000040 b5 b7 7f 38 7e 61 1c |...8~a.|" +peer0.org1.example.com | "2019-05-02 09:28:09.754 UTC [cauthdsl] func2 -> DEBU 39d9 0xc0043edbd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:09.754 UTC [cauthdsl] func1 -> DEBU 39da 0xc0043edbd0 gate 1556789289752181000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:09.754 UTC [policies] Evaluate -> DEBU 39db Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.755 UTC [policies] Evaluate -> DEBU 39dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.755 UTC [policies] Evaluate -> DEBU 39dd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.755 UTC [policies] Evaluate -> DEBU 39de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:09.756 UTC [gossip.discovery] handleAliveMessage -> DEBU 39df Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.756 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:09.756 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 " +peer0.org1.example.com | "2019-05-02 09:28:09.757 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 " +peer0.org1.example.com | "2019-05-02 09:28:09.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:09.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.758 UTC [gossip.discovery] handleAliveMessage -> DEBU 39e5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.759 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39e6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.760 UTC [gossip.discovery] sendMemResponse -> DEBU 39e7 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:09.760 UTC [msp] DeserializeIdentity -> DEBU 39e8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.761 UTC [msp] DeserializeIdentity -> DEBU 39e9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.762 UTC [msp] DeserializeIdentity -> DEBU 39ea Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:09.762 UTC [gossip.comm] Send -> DEBU 39eb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:09.762 UTC [gossip.discovery] sendMemResponse -> DEBU 39ec Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:09.763 UTC [gossip.comm] sendToEndpoint -> DEBU 39ed Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.763 UTC [gossip.comm] sendToEndpoint -> DEBU 39ee Exiting" +peer0.org1.example.com | "2019-05-02 09:28:09.768 UTC [gossip.comm] func1 -> DEBU 39ef Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1437820415744880594 , Msg_type: BLOCK_MSG, digests: [7 9 1 3 5 8 2 4 6], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.768 UTC [gossip.gossip] handleMessage -> DEBU 39f0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1437820415744880594 , Msg_type: BLOCK_MSG, digests: [7 9 1 3 5 8 2 4 6], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.769 UTC [gossip.pull] HandleMessage -> DEBU 39f1 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1437820415744880594 , Msg_type: BLOCK_MSG, digests: [7 9 1 3 5 8 2 4 6], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:09.770 UTC [gossip.gossip] handleMessage -> DEBU 39f2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.247 UTC [msp] DeserializeIdentity -> DEBU 39f3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.247 UTC [msp] DeserializeIdentity -> DEBU 39f4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.247 UTC [gossip.comm] Send -> DEBU 39f5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:28:12.247 UTC [gossip.comm] sendToEndpoint -> DEBU 39f6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39f7 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39f8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39f9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39fb Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.251 UTC [gossip.comm] func1 -> DEBU 39fc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.251 UTC [gossip.gossip] handleMessage -> DEBU 39fd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.251 UTC [msp] DeserializeIdentity -> DEBU 39fe Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.251 UTC [msp] DeserializeIdentity -> DEBU 39ff Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.252 UTC [msp] DeserializeIdentity -> DEBU 3a00 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:12.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a02 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a03 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [policies] Evaluate -> DEBU 3a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [policies] Evaluate -> DEBU 3a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [policies] Evaluate -> DEBU 3a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [cauthdsl] func1 -> DEBU 3a07 0xc003617040 gate 1556789292253253000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [cauthdsl] func2 -> DEBU 3a08 0xc003617040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [cauthdsl] func2 -> DEBU 3a09 0xc003617040 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [cauthdsl] func2 -> DEBU 3a0a 0xc003617040 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [msp.identity] Verify -> DEBU 3a0b Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:12.253 UTC [msp.identity] Verify -> DEBU 3a0c Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:12.262 UTC [gossip.comm] func1 -> DEBU 3a0d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.262 UTC [gossip.comm] func1 -> DEBU 3a0e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [cauthdsl] func2 -> DEBU 3a0f 0xc003617040 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [cauthdsl] func1 -> DEBU 3a10 0xc003617040 gate 1556789292253253000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a11 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a13 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a14 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [msp.identity] Verify -> DEBU 3a15 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [msp.identity] Verify -> DEBU 3a16 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [msp] DeserializeIdentity -> DEBU 3a17 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [msp] DeserializeIdentity -> DEBU 3a18 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a19 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:12.266 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a1a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.269 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a1b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.272 UTC [policies] Evaluate -> DEBU 3a1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.273 UTC [policies] Evaluate -> DEBU 3a1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:12.273 UTC [policies] Evaluate -> DEBU 3a1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.273 UTC [cauthdsl] func1 -> DEBU 3a1f 0xc003a76f30 gate 1556789292273744800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:12.274 UTC [cauthdsl] func2 -> DEBU 3a20 0xc003a76f30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:12.274 UTC [cauthdsl] func2 -> DEBU 3a21 0xc003a76f30 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:12.274 UTC [cauthdsl] func2 -> DEBU 3a22 0xc003a76f30 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.275 UTC [msp.identity] Verify -> DEBU 3a23 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:12.315 UTC [msp.identity] Verify -> DEBU 3a24 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:12.327 UTC [gossip.election] waitForInterrupt -> DEBU 3a25 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.328 UTC [gossip.election] IsLeader -> DEBU 3a26 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:28:12.328 UTC [msp.identity] Sign -> DEBU 3a27 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100C1801 " +peer0.org1.example.com | "2019-05-02 09:28:12.329 UTC [msp.identity] Sign -> DEBU 3a28 Sign: digest: F18829B3F517D100D3F9D0AA3660444C4D35DBEE50C01F3A1E3486C249A526F3 " +peer0.org1.example.com | "2019-05-02 09:28:12.330 UTC [gossip.election] waitForInterrupt -> DEBU 3a29 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:28:12.355 UTC [msp] DeserializeIdentity -> DEBU 3a2a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.356 UTC [msp] DeserializeIdentity -> DEBU 3a2b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.316 UTC [cauthdsl] func2 -> DEBU 3a2c 0xc003a76f30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.357 UTC [cauthdsl] func1 -> DEBU 3a2d 0xc003a76f30 gate 1556789292273744800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:12.369 UTC [msp] DeserializeIdentity -> DEBU 3a2e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.368 UTC [policies] Evaluate -> DEBU 3a2f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.369 UTC [policies] Evaluate -> DEBU 3a30 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.369 UTC [policies] Evaluate -> DEBU 3a31 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.370 UTC [policies] Evaluate -> DEBU 3a33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.371 UTC [msp.identity] Verify -> DEBU 3a34 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:12.371 UTC [msp.identity] Verify -> DEBU 3a35 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:12.371 UTC [gossip.gossip] handleMessage -> DEBU 3a36 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.372 UTC [gossip.gossip] handleMessage -> DEBU 3a37 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.372 UTC [msp] DeserializeIdentity -> DEBU 3a38 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.372 UTC [msp] DeserializeIdentity -> DEBU 3a39 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.373 UTC [msp] DeserializeIdentity -> DEBU 3a3a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.369 UTC [msp] DeserializeIdentity -> DEBU 3a32 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.378 UTC [gossip.comm] Send -> DEBU 3a3b Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:12.378 UTC [msp] DeserializeIdentity -> DEBU 3a3c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.378 UTC [msp] DeserializeIdentity -> DEBU 3a3d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.379 UTC [gossip.comm] sendToEndpoint -> DEBU 3a3e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.379 UTC [gossip.comm] sendToEndpoint -> DEBU 3a3f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.379 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:12.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a41 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a42 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.380 UTC [policies] Evaluate -> DEBU 3a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.380 UTC [policies] Evaluate -> DEBU 3a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:12.380 UTC [policies] Evaluate -> DEBU 3a45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.381 UTC [cauthdsl] func1 -> DEBU 3a46 0xc003da5910 gate 1556789292381536800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:12.388 UTC [cauthdsl] func2 -> DEBU 3a47 0xc003da5910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:12.388 UTC [cauthdsl] func2 -> DEBU 3a48 0xc003da5910 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:12.388 UTC [cauthdsl] func2 -> DEBU 3a49 0xc003da5910 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.388 UTC [msp.identity] Verify -> DEBU 3a4a Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:12.389 UTC [msp.identity] Verify -> DEBU 3a4b Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:12.390 UTC [cauthdsl] func2 -> DEBU 3a4c 0xc003da5910 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.390 UTC [cauthdsl] func1 -> DEBU 3a4d 0xc003da5910 gate 1556789292381536800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:12.390 UTC [policies] Evaluate -> DEBU 3a4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.390 UTC [policies] Evaluate -> DEBU 3a4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [policies] Evaluate -> DEBU 3a50 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [policies] Evaluate -> DEBU 3a51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [msp.identity] Verify -> DEBU 3a52 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [msp.identity] Verify -> DEBU 3a53 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [msp] DeserializeIdentity -> DEBU 3a54 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.391 UTC [msp] DeserializeIdentity -> DEBU 3a55 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.399 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a57 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a58 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [policies] Evaluate -> DEBU 3a59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [policies] Evaluate -> DEBU 3a5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [policies] Evaluate -> DEBU 3a5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [cauthdsl] func1 -> DEBU 3a5c 0xc004265800 gate 1556789292400491900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [cauthdsl] func2 -> DEBU 3a5d 0xc004265800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [cauthdsl] func2 -> DEBU 3a5e 0xc004265800 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:12.400 UTC [cauthdsl] func2 -> DEBU 3a5f 0xc004265800 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [msp.identity] Verify -> DEBU 3a60 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [msp.identity] Verify -> DEBU 3a61 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [cauthdsl] func2 -> DEBU 3a62 0xc004265800 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [cauthdsl] func1 -> DEBU 3a63 0xc004265800 gate 1556789292400491900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a64 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a66 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a68 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a69 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [gossip.gossip] handleMessage -> DEBU 3a6a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [gossip.gossip] handleMessage -> DEBU 3a6b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a6c Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a6d Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [msp] DeserializeIdentity -> DEBU 3a6e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [msp] DeserializeIdentity -> DEBU 3a6f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a70 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a71 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a72 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [policies] Evaluate -> DEBU 3a73 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [policies] Evaluate -> DEBU 3a74 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:12.403 UTC [policies] Evaluate -> DEBU 3a75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.405 UTC [cauthdsl] func1 -> DEBU 3a76 0xc00228c050 gate 1556789292404990600 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:12.405 UTC [cauthdsl] func2 -> DEBU 3a77 0xc00228c050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:12.405 UTC [cauthdsl] func2 -> DEBU 3a78 0xc00228c050 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:12.405 UTC [cauthdsl] func2 -> DEBU 3a79 0xc00228c050 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.412 UTC [msp.identity] Verify -> DEBU 3a7a Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:12.419 UTC [msp.identity] Verify -> DEBU 3a7b Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:12.420 UTC [cauthdsl] func2 -> DEBU 3a7c 0xc00228c050 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.421 UTC [cauthdsl] func1 -> DEBU 3a7d 0xc00228c050 gate 1556789292404990600 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a80 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.426 UTC [msp.identity] Verify -> DEBU 3a82 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [msp.identity] Verify -> DEBU 3a83 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [msp] DeserializeIdentity -> DEBU 3a84 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [msp] DeserializeIdentity -> DEBU 3a85 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a86 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a87 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a88 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:12.430 UTC [policies] Evaluate -> DEBU 3a89 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.430 UTC [policies] Evaluate -> DEBU 3a8a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func1 -> DEBU 3a8c 0xc00228df40 gate 1556789292431164200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a8d 0xc00228df40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a8e 0xc00228df40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a8f 0xc00228df40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [msp.identity] Verify -> DEBU 3a90 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [msp.identity] Verify -> DEBU 3a91 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a92 0xc00228df40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [cauthdsl] func1 -> DEBU 3a93 0xc00228df40 gate 1556789292431164200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a96 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:12.431 UTC [gossip.gossip] handleMessage -> DEBU 3a98 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.537 UTC [gossip.comm] func1 -> DEBU 3a99 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.537 UTC [gossip.gossip] handleMessage -> DEBU 3a9a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.537 UTC [msp] DeserializeIdentity -> DEBU 3a9b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.537 UTC [msp] DeserializeIdentity -> DEBU 3a9c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.538 UTC [gossip.gossip] handleMessage -> DEBU 3a9d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.578 UTC [gossip.comm] func1 -> DEBU 3a9e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.578 UTC [gossip.gossip] handleMessage -> DEBU 3a9f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.579 UTC [gossip.pull] HandleMessage -> DEBU 3aa0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.579 UTC [gossip.pull] SendDigest -> DEBU 3aa1 Sending BLOCK_MSG digest: [7 8 1 2 3 4 5 6 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:12.579 UTC [gossip.gossip] handleMessage -> DEBU 3aa2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:12.762 UTC [gossip.comm] func1 -> DEBU 3aa3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.764 UTC [gossip.gossip] handleMessage -> DEBU 3aa4 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:12.765 UTC [msp] DeserializeIdentity -> DEBU 3aa5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.766 UTC [msp] DeserializeIdentity -> DEBU 3aa6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.767 UTC [msp] DeserializeIdentity -> DEBU 3aa7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:12.769 UTC [gossip.gossip] handleMessage -> DEBU 3aa8 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.007 UTC [gossip.comm] func1 -> DEBU 3aa9 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.007 UTC [gossip.gossip] handleMessage -> DEBU 3aaa Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.007 UTC [msp] DeserializeIdentity -> DEBU 3aab Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.008 UTC [msp] DeserializeIdentity -> DEBU 3aac Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.008 UTC [msp] DeserializeIdentity -> DEBU 3aad Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.008 UTC [gossip.gossip] handleMessage -> DEBU 3aae Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.592 UTC [gossip.comm] func1 -> DEBU 3aaf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.592 UTC [gossip.gossip] handleMessage -> DEBU 3ab0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.593 UTC [gossip.gossip] handleMessage -> DEBU 3ab1 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ab2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.594 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ab3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.595 UTC [msp] DeserializeIdentity -> DEBU 3ab4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.596 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ab5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:13.596 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ab6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:13.597 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ab7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:13.597 UTC [policies] Evaluate -> DEBU 3ab8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:13.597 UTC [policies] Evaluate -> DEBU 3ab9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:13.598 UTC [policies] Evaluate -> DEBU 3aba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:13.598 UTC [cauthdsl] func1 -> DEBU 3abb 0xc00363afa0 gate 1556789293598417900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:13.607 UTC [cauthdsl] func2 -> DEBU 3abc 0xc00363afa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:13.607 UTC [cauthdsl] func2 -> DEBU 3abd 0xc00363afa0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:13.607 UTC [cauthdsl] func2 -> DEBU 3abe 0xc00363afa0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:13.607 UTC [msp.identity] Verify -> DEBU 3abf Verify: digest = 00000000 0e 29 48 69 64 4d 5a af aa 6d bb 6b 10 44 7e 56 |.)HidMZ..m.k.D~V| +peer0.org1.example.com | 00000010 7a 70 1a be 8c b2 0a 0e 1f 17 ab 53 d8 78 66 09 |zp.........S.xf.|" +peer0.org1.example.com | "2019-05-02 09:28:13.608 UTC [msp.identity] Verify -> DEBU 3ac0 Verify: sig = 00000000 30 44 02 20 5f f9 d1 54 69 54 25 9a 74 b0 ca 5b |0D. _..TiT%.t..[| +peer0.org1.example.com | 00000010 b1 87 6e 0a e7 81 70 06 14 b4 95 a0 09 40 69 6c |..n...p......@il| +peer0.org1.example.com | 00000020 f0 bc d4 d9 02 20 40 16 78 ad 52 04 4a 36 ce 00 |..... @.x.R.J6..| +peer0.org1.example.com | 00000030 bc 69 81 c9 a3 df 04 1a fd c7 65 c6 3c 7d f6 54 |.i........e.<}.T| +peer0.org1.example.com | 00000040 89 bb 53 c5 4e 51 |..S.NQ|" +peer0.org1.example.com | "2019-05-02 09:28:13.608 UTC [cauthdsl] func2 -> DEBU 3ac1 0xc00363afa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:13.608 UTC [cauthdsl] func1 -> DEBU 3ac2 0xc00363afa0 gate 1556789293598417900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:13.608 UTC [policies] Evaluate -> DEBU 3ac3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.609 UTC [policies] Evaluate -> DEBU 3ac4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.609 UTC [policies] Evaluate -> DEBU 3ac5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.612 UTC [gossip.comm] func1 -> DEBU 3ac6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.613 UTC [gossip.gossip] handleMessage -> DEBU 3ac7 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.613 UTC [gossip.pull] HandleMessage -> DEBU 3ac8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.613 UTC [msp] DeserializeIdentity -> DEBU 3ac9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3aca Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3acb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3acc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3acd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.617 UTC [msp] DeserializeIdentity -> DEBU 3ace Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.618 UTC [gossip.pull] SendDigest -> DEBU 3acf Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:13.618 UTC [gossip.gossip] handleMessage -> DEBU 3ad0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.621 UTC [policies] Evaluate -> DEBU 3ad1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ad2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:13.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad4 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 " +peer0.org1.example.com | "2019-05-02 09:28:13.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad5 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 " +peer0.org1.example.com | "2019-05-02 09:28:13.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:13.623 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad7 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3ad8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102B " +peer0.org1.example.com | "2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3ad9 Sign: digest: F05B313F24126515C171AC32D2C41D0112118C5D6B111DC167604649DFB72F26 " +peer0.org1.example.com | "2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3ada Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3adb Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:13.629 UTC [gossip.comm] Send -> DEBU 3adc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [msp] DeserializeIdentity -> DEBU 3add Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] Send -> DEBU 3ade Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [msp] DeserializeIdentity -> DEBU 3adf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] Send -> DEBU 3ae0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ae7 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ae8 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.discovery] sendMemResponse -> DEBU 3ae9 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [msp] DeserializeIdentity -> DEBU 3aea Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [msp] DeserializeIdentity -> DEBU 3aeb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [msp] DeserializeIdentity -> DEBU 3aec Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.comm] Send -> DEBU 3aed Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.discovery] sendMemResponse -> DEBU 3aee Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:13.631 UTC [gossip.comm] sendToEndpoint -> DEBU 3aef Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3af0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.639 UTC [gossip.comm] func1 -> DEBU 3af1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.639 UTC [gossip.comm] func1 -> DEBU 3af2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.639 UTC [gossip.gossip] handleMessage -> DEBU 3af3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.645 UTC [gossip.pull] HandleMessage -> DEBU 3af4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.646 UTC [gossip.pull] SendDigest -> DEBU 3af5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:13.648 UTC [gossip.gossip] handleMessage -> DEBU 3af6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.649 UTC [gossip.gossip] handleMessage -> DEBU 3af7 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.653 UTC [gossip.comm] func1 -> DEBU 3af8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.654 UTC [gossip.comm] func1 -> DEBU 3af9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.656 UTC [gossip.gossip] handleMessage -> DEBU 3afa Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.656 UTC [gossip.gossip] handleMessage -> DEBU 3afb Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.659 UTC [gossip.comm] func1 -> DEBU 3afc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.657 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3afd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.661 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3afe Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.663 UTC [msp.identity] Verify -> DEBU 3aff Verify: digest = 00000000 f0 5b 31 3f 24 12 65 15 c1 71 ac 32 d2 c4 1d 01 |.[1?$.e..q.2....| +peer0.org1.example.com | 00000010 12 11 8c 5d 6b 11 1d c1 67 60 46 49 df b7 2f 26 |...]k...g`FI../&|" +peer0.org1.example.com | "2019-05-02 09:28:13.663 UTC [msp.identity] Verify -> DEBU 3b00 Verify: sig = 00000000 30 44 02 20 3a ff 2b b9 d3 c7 c6 ff 28 81 90 13 |0D. :.+.....(...| +peer0.org1.example.com | 00000010 9d 67 c7 df bd c2 19 f6 f0 92 38 b8 ff a1 50 60 |.g........8...P`| +peer0.org1.example.com | 00000020 91 17 83 23 02 20 66 83 d1 4c d8 91 98 bb cb 35 |...#. f..L.....5| +peer0.org1.example.com | 00000030 d3 a1 20 02 5b 0e a4 6d d1 10 80 69 79 65 b3 c0 |.. .[..m...iye..| +peer0.org1.example.com | 00000040 8c c5 3b ea 75 cb |..;.u.|" +peer0.org1.example.com | "2019-05-02 09:28:13.664 UTC [msp.identity] Verify -> DEBU 3b01 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:28:13.664 UTC [msp.identity] Verify -> DEBU 3b02 Verify: sig = 00000000 30 44 02 20 3e 3d 7d 57 33 da b5 3a 15 0d 9c a3 |0D. >=}W3..:....| +peer0.org1.example.com | 00000010 42 47 a1 59 e3 5b 4b eb 2c a2 b1 82 59 c6 fd e9 |BG.Y.[K.,...Y...| +peer0.org1.example.com | 00000020 00 61 74 e2 02 20 5f 66 2d 4f 6b 63 64 7d ca a4 |.at.. _f-Okcd}..| +peer0.org1.example.com | 00000030 5a 19 9a 4e d2 92 55 bb 8c 93 da ff f1 c1 05 e1 |Z..N..U.........| +peer0.org1.example.com | 00000040 b4 bf f4 3d 7b 58 |...={X|" +peer0.org1.example.com | "2019-05-02 09:28:13.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b03 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.665 UTC [gossip.discovery] isSentByMe -> DEBU 3b04 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b05 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.670 UTC [gossip.comm] func1 -> DEBU 3b06 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.679 UTC [gossip.comm] func1 -> DEBU 3b07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b08 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.680 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b09 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.680 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b0a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.680 UTC [msp.identity] Verify -> DEBU 3b0b Verify: digest = 00000000 8f 68 76 c3 0c e0 b0 37 7c f6 29 61 e4 27 35 e2 |.hv....7|.)a.'5.| +peer0.org1.example.com | 00000010 c7 87 68 18 6d f4 3f 7f 4f 74 b4 12 21 52 ed 7f |..h.m.?.Ot..!R..|" +peer0.org1.example.com | "2019-05-02 09:28:13.681 UTC [msp.identity] Verify -> DEBU 3b0c Verify: sig = 00000000 30 44 02 20 18 0a e6 41 8b 1a 99 6d 30 a2 52 1c |0D. ...A...m0.R.| +peer0.org1.example.com | 00000010 21 84 21 36 cc 86 4f a1 48 23 f7 16 05 1a 9e ce |!.!6..O.H#......| +peer0.org1.example.com | 00000020 54 dc 83 1a 02 20 34 d8 6d 56 a8 31 3c 75 88 32 |T.... 4.mV.1 DEBU 3b0d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.681 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b0e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.682 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b0f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.683 UTC [msp.identity] Verify -> DEBU 3b10 Verify: digest = 00000000 f0 5b 31 3f 24 12 65 15 c1 71 ac 32 d2 c4 1d 01 |.[1?$.e..q.2....| +peer0.org1.example.com | 00000010 12 11 8c 5d 6b 11 1d c1 67 60 46 49 df b7 2f 26 |...]k...g`FI../&|" +peer0.org1.example.com | "2019-05-02 09:28:13.683 UTC [msp.identity] Verify -> DEBU 3b11 Verify: sig = 00000000 30 44 02 20 3a ff 2b b9 d3 c7 c6 ff 28 81 90 13 |0D. :.+.....(...| +peer0.org1.example.com | 00000010 9d 67 c7 df bd c2 19 f6 f0 92 38 b8 ff a1 50 60 |.g........8...P`| +peer0.org1.example.com | 00000020 91 17 83 23 02 20 66 83 d1 4c d8 91 98 bb cb 35 |...#. f..L.....5| +peer0.org1.example.com | 00000030 d3 a1 20 02 5b 0e a4 6d d1 10 80 69 79 65 b3 c0 |.. .[..m...iye..| +peer0.org1.example.com | 00000040 8c c5 3b ea 75 cb |..;.u.|" +peer0.org1.example.com | "2019-05-02 09:28:13.684 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b12 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.684 UTC [gossip.discovery] isSentByMe -> DEBU 3b13 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.684 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b14 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.685 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b15 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.685 UTC [msp] DeserializeIdentity -> DEBU 3b16 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b17 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:13.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b18 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:13.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b19 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:13.687 UTC [policies] Evaluate -> DEBU 3b1a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:13.687 UTC [policies] Evaluate -> DEBU 3b1b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:13.687 UTC [policies] Evaluate -> DEBU 3b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:13.687 UTC [cauthdsl] func1 -> DEBU 3b1d 0xc0041187e0 gate 1556789293687555000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:13.687 UTC [cauthdsl] func2 -> DEBU 3b1e 0xc0041187e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:13.688 UTC [cauthdsl] func2 -> DEBU 3b1f 0xc0041187e0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:13.688 UTC [cauthdsl] func2 -> DEBU 3b20 0xc0041187e0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:13.690 UTC [msp.identity] Verify -> DEBU 3b21 Verify: digest = 00000000 43 7e 96 3a d4 64 a7 88 4a 57 9b 29 24 d1 02 1e |C~.:.d..JW.)$...| +peer0.org1.example.com | 00000010 3f a0 e0 a0 0f 95 06 5b 67 e8 38 42 fe 10 0b c5 |?......[g.8B....|" +peer0.org1.example.com | "2019-05-02 09:28:13.690 UTC [msp.identity] Verify -> DEBU 3b22 Verify: sig = 00000000 30 45 02 21 00 86 ac 9f 8f a0 ec f0 c1 c3 51 39 |0E.!..........Q9| +peer0.org1.example.com | 00000010 25 ec 28 33 45 94 20 6c f4 04 0d 15 67 b2 32 1a |%.(3E. l....g.2.| +peer0.org1.example.com | 00000020 72 e5 cb 26 39 02 20 77 4d bc 7e 5c 45 dc 7e f4 |r..&9. wM.~\E.~.| +peer0.org1.example.com | 00000030 57 c7 83 d4 b9 25 79 4e f1 45 54 39 60 81 20 e1 |W....%yN.ET9`. .| +peer0.org1.example.com | 00000040 b5 b7 7f 38 7e 61 1c |...8~a.|" +peer0.org1.example.com | "2019-05-02 09:28:13.691 UTC [cauthdsl] func2 -> DEBU 3b23 0xc0041187e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:13.691 UTC [cauthdsl] func1 -> DEBU 3b24 0xc0041187e0 gate 1556789293687555000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b27 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.692 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b29 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b2a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b2b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.693 UTC [gossip.gossip] handleMessage -> DEBU 3b2c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.694 UTC [gossip.gossip] handleMessage -> DEBU 3b2d Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.694 UTC [gossip.pull] HandleMessage -> DEBU 3b2e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.694 UTC [msp] DeserializeIdentity -> DEBU 3b2f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b30 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b31 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b32 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b33 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.696 UTC [msp] DeserializeIdentity -> DEBU 3b34 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.696 UTC [gossip.pull] SendDigest -> DEBU 3b35 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:13.696 UTC [gossip.gossip] handleMessage -> DEBU 3b36 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.696 UTC [gossip.gossip] handleMessage -> DEBU 3b37 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.697 UTC [gossip.gossip] handleMessage -> DEBU 3b38 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.697 UTC [gossip.gossip] handleMessage -> DEBU 3b39 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b3a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.698 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b3b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.698 UTC [msp.identity] Verify -> DEBU 3b3c Verify: digest = 00000000 91 b3 1b f5 b1 b2 4f c1 f7 e1 40 3c dc d4 54 5b |......O...@<..T[| +peer0.org1.example.com | 00000010 5c ba 89 2f 8b 8a 44 49 0d 0a a2 d0 a5 71 10 fb |\../..DI.....q..|" +peer0.org1.example.com | "2019-05-02 09:28:13.698 UTC [msp.identity] Verify -> DEBU 3b3d Verify: sig = 00000000 30 44 02 20 56 13 31 da c5 76 11 81 ec 10 04 18 |0D. V.1..v......| +peer0.org1.example.com | 00000010 ea 18 97 5f cb 95 c1 bc 49 bd 31 03 3b a8 d8 a1 |..._....I.1.;...| +peer0.org1.example.com | 00000020 10 16 9b 84 02 20 09 21 29 ff b1 9c 95 20 01 94 |..... .!).... ..| +peer0.org1.example.com | 00000030 4e 28 c8 00 18 45 e1 3f ee 64 e6 5b 54 36 8b 03 |N(...E.?.d.[T6..| +peer0.org1.example.com | 00000040 6c 80 78 51 9f 1c |l.xQ..|" +peer0.org1.example.com | "2019-05-02 09:28:13.699 UTC [msp.identity] Verify -> DEBU 3b3e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:28:13.700 UTC [msp.identity] Verify -> DEBU 3b3f Verify: sig = 00000000 30 44 02 20 3f a4 21 18 e3 6c c1 a9 0d 99 00 98 |0D. ?.!..l......| +peer0.org1.example.com | 00000010 89 c3 0e d4 84 b3 12 57 b5 1f 3b e0 ac 87 d4 23 |.......W..;....#| +peer0.org1.example.com | 00000020 b4 aa 5d ce 02 20 7e eb c3 76 b7 71 5b b7 d0 39 |..].. ~..v.q[..9| +peer0.org1.example.com | 00000030 69 f2 26 74 d5 fb e5 61 00 95 fb f8 e9 96 ef 34 |i.&t...a.......4| +peer0.org1.example.com | 00000040 30 0c 04 28 0a 3d |0..(.=|" +peer0.org1.example.com | "2019-05-02 09:28:13.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b41 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:13.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b42 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 " +peer0.org1.example.com | "2019-05-02 09:28:13.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b43 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 " +peer0.org1.example.com | "2019-05-02 09:28:13.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b44 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:13.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b45 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.703 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b46 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b47 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b49 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.705 UTC [msp] DeserializeIdentity -> DEBU 3b4a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.706 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b4b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:13.706 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b4c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:13.706 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b4d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:13.706 UTC [policies] Evaluate -> DEBU 3b4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:13.706 UTC [policies] Evaluate -> DEBU 3b4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:13.707 UTC [policies] Evaluate -> DEBU 3b50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:13.707 UTC [cauthdsl] func1 -> DEBU 3b51 0xc0041bcfb0 gate 1556789293707387900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:13.708 UTC [cauthdsl] func2 -> DEBU 3b52 0xc0041bcfb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:13.708 UTC [cauthdsl] func2 -> DEBU 3b53 0xc0041bcfb0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:13.709 UTC [cauthdsl] func2 -> DEBU 3b54 0xc0041bcfb0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:13.709 UTC [msp.identity] Verify -> DEBU 3b55 Verify: digest = 00000000 a1 24 f4 01 ff 3e 39 31 ab 8e bd 16 8d de fe ed |.$...>91........| +peer0.org1.example.com | 00000010 c1 9d 9c 4b 55 5e 86 75 bb 71 96 0d 40 dd 63 b1 |...KU^.u.q..@.c.|" +peer0.org1.example.com | "2019-05-02 09:28:13.709 UTC [msp.identity] Verify -> DEBU 3b56 Verify: sig = 00000000 30 44 02 20 62 e5 16 b4 05 b5 6f c7 6f 01 f4 4f |0D. b.....o.o..O| +peer0.org1.example.com | 00000010 31 69 45 75 9f 76 4f c5 ef 3d 9e 03 1d 56 f3 80 |1iEu.vO..=...V..| +peer0.org1.example.com | 00000020 cc 79 4b 96 02 20 66 bd 6f b2 f8 0b 91 9a 2b ac |.yK.. f.o.....+.| +peer0.org1.example.com | 00000030 89 37 74 4f 4b 69 39 fe 9b c0 4a 9d 8b ca c8 34 |.7tOKi9...J....4| +peer0.org1.example.com | 00000040 4e f2 7f ac a0 00 |N.....|" +peer0.org1.example.com | "2019-05-02 09:28:13.710 UTC [cauthdsl] func2 -> DEBU 3b57 0xc0041bcfb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:13.710 UTC [cauthdsl] func1 -> DEBU 3b58 0xc0041bcfb0 gate 1556789293707387900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:13.710 UTC [policies] Evaluate -> DEBU 3b59 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.710 UTC [policies] Evaluate -> DEBU 3b5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.711 UTC [policies] Evaluate -> DEBU 3b5b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.711 UTC [policies] Evaluate -> DEBU 3b5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.711 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b5d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b5e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b5f updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 " +peer0.org1.example.com | "2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b60 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 " +peer0.org1.example.com | "2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b61 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:13.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b62 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b63 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b64 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.714 UTC [gossip.discovery] sendMemResponse -> DEBU 3b65 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:13.714 UTC [msp] DeserializeIdentity -> DEBU 3b66 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.716 UTC [msp] DeserializeIdentity -> DEBU 3b67 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.717 UTC [msp] DeserializeIdentity -> DEBU 3b68 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.717 UTC [gossip.comm] Send -> DEBU 3b69 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.717 UTC [gossip.discovery] sendMemResponse -> DEBU 3b6a Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:13.718 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.718 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.719 UTC [gossip.discovery] sendMemResponse -> DEBU 3b6d Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:13.719 UTC [msp] DeserializeIdentity -> DEBU 3b6e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.719 UTC [msp] DeserializeIdentity -> DEBU 3b6f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.720 UTC [gossip.comm] Send -> DEBU 3b70 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.720 UTC [gossip.discovery] sendMemResponse -> DEBU 3b71 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:13.721 UTC [gossip.comm] sendToEndpoint -> DEBU 3b72 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.721 UTC [gossip.comm] sendToEndpoint -> DEBU 3b73 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.721 UTC [gossip.gossip] handleMessage -> DEBU 3b74 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.721 UTC [gossip.gossip] handleMessage -> DEBU 3b75 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.722 UTC [gossip.gossip] handleMessage -> DEBU 3b76 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.722 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b77 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.722 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b78 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.723 UTC [msp.identity] Verify -> DEBU 3b79 Verify: digest = 00000000 f0 5b 31 3f 24 12 65 15 c1 71 ac 32 d2 c4 1d 01 |.[1?$.e..q.2....| +peer0.org1.example.com | 00000010 12 11 8c 5d 6b 11 1d c1 67 60 46 49 df b7 2f 26 |...]k...g`FI../&|" +peer0.org1.example.com | "2019-05-02 09:28:13.724 UTC [msp.identity] Verify -> DEBU 3b7a Verify: sig = 00000000 30 44 02 20 3a ff 2b b9 d3 c7 c6 ff 28 81 90 13 |0D. :.+.....(...| +peer0.org1.example.com | 00000010 9d 67 c7 df bd c2 19 f6 f0 92 38 b8 ff a1 50 60 |.g........8...P`| +peer0.org1.example.com | 00000020 91 17 83 23 02 20 66 83 d1 4c d8 91 98 bb cb 35 |...#. f..L.....5| +peer0.org1.example.com | 00000030 d3 a1 20 02 5b 0e a4 6d d1 10 80 69 79 65 b3 c0 |.. .[..m...iye..| +peer0.org1.example.com | 00000040 8c c5 3b ea 75 cb |..;.u.|" +peer0.org1.example.com | "2019-05-02 09:28:13.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b7b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.725 UTC [gossip.discovery] isSentByMe -> DEBU 3b7c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b7d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.726 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b7e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.726 UTC [msp.identity] Verify -> DEBU 3b7f Verify: digest = 00000000 91 b3 1b f5 b1 b2 4f c1 f7 e1 40 3c dc d4 54 5b |......O...@<..T[| +peer0.org1.example.com | 00000010 5c ba 89 2f 8b 8a 44 49 0d 0a a2 d0 a5 71 10 fb |\../..DI.....q..|" +peer0.org1.example.com | "2019-05-02 09:28:13.727 UTC [msp.identity] Verify -> DEBU 3b80 Verify: sig = 00000000 30 44 02 20 56 13 31 da c5 76 11 81 ec 10 04 18 |0D. V.1..v......| +peer0.org1.example.com | 00000010 ea 18 97 5f cb 95 c1 bc 49 bd 31 03 3b a8 d8 a1 |..._....I.1.;...| +peer0.org1.example.com | 00000020 10 16 9b 84 02 20 09 21 29 ff b1 9c 95 20 01 94 |..... .!).... ..| +peer0.org1.example.com | 00000030 4e 28 c8 00 18 45 e1 3f ee 64 e6 5b 54 36 8b 03 |N(...E.?.d.[T6..| +peer0.org1.example.com | 00000040 6c 80 78 51 9f 1c |l.xQ..|" +peer0.org1.example.com | "2019-05-02 09:28:13.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b81 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.728 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b82 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.728 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b83 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.728 UTC [msp] DeserializeIdentity -> DEBU 3b84 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.729 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:13.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b86 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:13.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b87 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:13.730 UTC [policies] Evaluate -> DEBU 3b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:13.730 UTC [policies] Evaluate -> DEBU 3b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:13.730 UTC [policies] Evaluate -> DEBU 3b8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:13.730 UTC [cauthdsl] func1 -> DEBU 3b8b 0xc00430dbc0 gate 1556789293730955800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:13.731 UTC [cauthdsl] func2 -> DEBU 3b8c 0xc00430dbc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:13.731 UTC [cauthdsl] func2 -> DEBU 3b8d 0xc00430dbc0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:13.731 UTC [cauthdsl] func2 -> DEBU 3b8e 0xc00430dbc0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:13.731 UTC [msp.identity] Verify -> DEBU 3b8f Verify: digest = 00000000 0e 29 48 69 64 4d 5a af aa 6d bb 6b 10 44 7e 56 |.)HidMZ..m.k.D~V| +peer0.org1.example.com | 00000010 7a 70 1a be 8c b2 0a 0e 1f 17 ab 53 d8 78 66 09 |zp.........S.xf.|" +peer0.org1.example.com | "2019-05-02 09:28:13.732 UTC [msp.identity] Verify -> DEBU 3b90 Verify: sig = 00000000 30 44 02 20 5f f9 d1 54 69 54 25 9a 74 b0 ca 5b |0D. _..TiT%.t..[| +peer0.org1.example.com | 00000010 b1 87 6e 0a e7 81 70 06 14 b4 95 a0 09 40 69 6c |..n...p......@il| +peer0.org1.example.com | 00000020 f0 bc d4 d9 02 20 40 16 78 ad 52 04 4a 36 ce 00 |..... @.x.R.J6..| +peer0.org1.example.com | 00000030 bc 69 81 c9 a3 df 04 1a fd c7 65 c6 3c 7d f6 54 |.i........e.<}.T| +peer0.org1.example.com | 00000040 89 bb 53 c5 4e 51 |..S.NQ|" +peer0.org1.example.com | "2019-05-02 09:28:13.732 UTC [cauthdsl] func2 -> DEBU 3b91 0xc00430dbc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:13.732 UTC [cauthdsl] func1 -> DEBU 3b92 0xc00430dbc0 gate 1556789293730955800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:13.732 UTC [policies] Evaluate -> DEBU 3b93 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.733 UTC [policies] Evaluate -> DEBU 3b94 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.733 UTC [policies] Evaluate -> DEBU 3b95 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.733 UTC [policies] Evaluate -> DEBU 3b96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b97 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b98 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.734 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b99 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.735 UTC [msp] DeserializeIdentity -> DEBU 3b9a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.735 UTC [msp] DeserializeIdentity -> DEBU 3b9b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.736 UTC [gossip.pull] Hello -> DEBU 3b9c Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:13.736 UTC [msp] DeserializeIdentity -> DEBU 3b9d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.736 UTC [msp] DeserializeIdentity -> DEBU 3b9e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.737 UTC [gossip.comm] Send -> DEBU 3b9f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.737 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.738 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba1 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.741 UTC [gossip.pull] Hello -> DEBU 3ba2 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:13.741 UTC [gossip.comm] Send -> DEBU 3ba3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.742 UTC [gossip.pull] Hello -> DEBU 3ba4 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:13.742 UTC [gossip.comm] Send -> DEBU 3ba5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.742 UTC [gossip.pull] Hello -> DEBU 3ba6 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:13.743 UTC [gossip.comm] Send -> DEBU 3ba7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3baa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.745 UTC [gossip.comm] sendToEndpoint -> DEBU 3bab Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.746 UTC [gossip.comm] sendToEndpoint -> DEBU 3bac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.746 UTC [gossip.comm] sendToEndpoint -> DEBU 3bad Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.749 UTC [gossip.comm] func1 -> DEBU 3bae Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8087694384524145658 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.750 UTC [gossip.comm] func1 -> DEBU 3baf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10522915394422428203 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.750 UTC [gossip.gossip] handleMessage -> DEBU 3bb0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8087694384524145658 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.751 UTC [gossip.pull] HandleMessage -> DEBU 3bb1 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8087694384524145658 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.751 UTC [gossip.gossip] handleMessage -> DEBU 3bb2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.751 UTC [gossip.gossip] handleMessage -> DEBU 3bb3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10522915394422428203 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.752 UTC [gossip.pull] HandleMessage -> DEBU 3bb4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10522915394422428203 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.752 UTC [gossip.gossip] handleMessage -> DEBU 3bb5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.753 UTC [gossip.comm] func1 -> DEBU 3bb6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10722611922427056407 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.753 UTC [gossip.gossip] handleMessage -> DEBU 3bb7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10722611922427056407 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.753 UTC [gossip.comm] func1 -> DEBU 3bb8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5211070648313222613 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.755 UTC [gossip.pull] HandleMessage -> DEBU 3bb9 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10722611922427056407 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.755 UTC [gossip.gossip] handleMessage -> DEBU 3bba Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.756 UTC [gossip.gossip] handleMessage -> DEBU 3bbb Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5211070648313222613 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.756 UTC [gossip.pull] HandleMessage -> DEBU 3bbc GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5211070648313222613 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.756 UTC [gossip.gossip] handleMessage -> DEBU 3bbd Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.783 UTC [gossip.comm] func1 -> DEBU 3bbe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.783 UTC [gossip.gossip] handleMessage -> DEBU 3bbf Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.783 UTC [gossip.gossip] handleMessage -> DEBU 3bc0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.784 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bc1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.785 UTC [gossip.comm] func1 -> DEBU 3bc2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.785 UTC [gossip.gossip] handleMessage -> DEBU 3bc3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.784 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bc4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:13.787 UTC [gossip.comm] func1 -> DEBU 3bc5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.788 UTC [msp] DeserializeIdentity -> DEBU 3bc6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.789 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3bc7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:13.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:13.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:13.790 UTC [policies] Evaluate -> DEBU 3bca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:13.791 UTC [policies] Evaluate -> DEBU 3bcb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:13.791 UTC [policies] Evaluate -> DEBU 3bcc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:13.791 UTC [cauthdsl] func1 -> DEBU 3bcd 0xc0034e2690 gate 1556789293791713300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:13.791 UTC [cauthdsl] func2 -> DEBU 3bce 0xc0034e2690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:13.792 UTC [cauthdsl] func2 -> DEBU 3bcf 0xc0034e2690 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:13.792 UTC [cauthdsl] func2 -> DEBU 3bd0 0xc0034e2690 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:13.793 UTC [msp.identity] Verify -> DEBU 3bd1 Verify: digest = 00000000 5c 09 0d 2f 46 d3 15 b5 71 aa 4d f5 f3 f8 43 e2 |\../F...q.M...C.| +peer0.org1.example.com | 00000010 8f e8 22 ed b6 54 2c f6 18 52 aa c2 60 f9 ac c2 |.."..T,..R..`...|" +peer0.org1.example.com | "2019-05-02 09:28:13.794 UTC [msp.identity] Verify -> DEBU 3bd2 Verify: sig = 00000000 30 44 02 20 77 00 11 eb 8b 44 14 88 fa 2a 1a 67 |0D. w....D...*.g| +peer0.org1.example.com | 00000010 0a fb 8b 0d de 91 7d 63 22 77 db 4e 35 2e 9a 84 |......}c"w.N5...| +peer0.org1.example.com | 00000020 29 e3 a3 7c 02 20 68 fd cb 4e 05 29 b2 8b 4a 1d |)..|. h..N.)..J.| +peer0.org1.example.com | 00000030 19 d6 17 3f 26 1f e9 16 5a 48 48 88 ed ac 2f 07 |...?&...ZHH.../.| +peer0.org1.example.com | 00000040 31 42 15 d6 c2 ff |1B....|" +peer0.org1.example.com | "2019-05-02 09:28:13.795 UTC [cauthdsl] func2 -> DEBU 3bd3 0xc0034e2690 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:13.795 UTC [cauthdsl] func1 -> DEBU 3bd4 0xc0034e2690 gate 1556789293791713300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:13.795 UTC [policies] Evaluate -> DEBU 3bd5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.796 UTC [policies] Evaluate -> DEBU 3bd6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.796 UTC [policies] Evaluate -> DEBU 3bd7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.797 UTC [policies] Evaluate -> DEBU 3bd8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:13.797 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bda Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:13.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bdb updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 " +peer0.org1.example.com | "2019-05-02 09:28:13.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bdc Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 " +peer0.org1.example.com | "2019-05-02 09:28:13.799 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bdd Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:13.799 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bde Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.800 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bdf Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.800 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.801 UTC [gossip.gossip] handleMessage -> DEBU 3be1 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.801 UTC [gossip.gossip] handleMessage -> DEBU 3be2 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.802 UTC [gossip.gossip] handleMessage -> DEBU 3be5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3be7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3be8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bea Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3beb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bec Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bed Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bee Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [gossip.comm] Send -> DEBU 3bef Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bf0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:13.804 UTC [gossip.comm] Send -> DEBU 3bf1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:13.804 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.804 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf3 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:13.804 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:13.806 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.021 UTC [msp.identity] Sign -> DEBU 3bf6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102C " +peer0.org1.example.com | "2019-05-02 09:28:14.021 UTC [msp.identity] Sign -> DEBU 3bf7 Sign: digest: BCFC79A684F20A2FECB5877BB67D925313B55CDC2738C810E34B07D6C1EEAFCB " +peer0.org1.example.com | "2019-05-02 09:28:14.022 UTC [msp.identity] Sign -> DEBU 3bf8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:14.022 UTC [msp.identity] Sign -> DEBU 3bf9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:14.022 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3bfa Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bfb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bfc Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bfd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] Send -> DEBU 3bfe Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bff Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] Send -> DEBU 3c00 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] Send -> DEBU 3c01 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c02 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c03 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c05 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c06 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.030 UTC [gossip.comm] sendToEndpoint -> DEBU 3c07 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.comm] func1 -> DEBU 3c08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.gossip] handleMessage -> DEBU 3c09 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.gossip] handleMessage -> DEBU 3c0a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c0b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c0c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c0d Verify: digest = 00000000 18 7c fa c5 c5 fc a0 86 5b f1 ab f9 1a ad 89 97 |.|......[.......| +peer0.org1.example.com | 00000010 86 c3 4c 2d 8e bf 9d ec 46 4e a6 62 bb 46 3e 23 |..L-....FN.b.F>#|" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c0e Verify: sig = 00000000 30 45 02 21 00 ef 73 c4 c5 33 6d f2 24 63 29 f7 |0E.!..s..3m.$c).| +peer0.org1.example.com | 00000010 87 43 0e 02 07 4e d5 c5 64 02 95 e3 c6 f2 ed b4 |.C...N..d.......| +peer0.org1.example.com | 00000020 d6 6d 98 46 29 02 20 1f 7f 79 3c ad bf e7 d4 06 |.m.F). ..y<.....| +peer0.org1.example.com | 00000030 b0 ae 4e c9 aa 0c 2f 45 53 ba 35 72 39 bc 86 4d |..N.../ES.5r9..M| +peer0.org1.example.com | 00000040 38 11 16 0b 84 29 32 |8....)2|" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c0f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c10 Verify: sig = 00000000 30 44 02 20 3a 06 a4 d6 15 25 4a 5d 27 e7 ad aa |0D. :....%J]'...| +peer0.org1.example.com | 00000010 fb 31 b0 0c 27 49 51 ae 65 59 92 6e 5c 59 f9 07 |.1..'IQ.eY.n\Y..| +peer0.org1.example.com | 00000020 cf 37 b3 73 02 20 54 d5 a5 4f ee 83 d6 03 67 ad |.7.s. T..O....g.| +peer0.org1.example.com | 00000030 14 70 5c 17 c9 31 7d 0f 62 6d fa 3c 85 c1 fe d7 |.p\..1}.bm.<....| +peer0.org1.example.com | 00000040 3b db de 03 0e ac |;.....|" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c12 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c13 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 " +peer0.org1.example.com | "2019-05-02 09:28:14.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c14 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 " +peer0.org1.example.com | "2019-05-02 09:28:14.066 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c15 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:14.066 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c16 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.066 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c17 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.066 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c18 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c19 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c1a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c1b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] Send -> DEBU 3c1c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c1d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] Send -> DEBU 3c1e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c1f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c20 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c21 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c22 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.075 UTC [gossip.comm] func1 -> DEBU 3c23 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.076 UTC [gossip.gossip] handleMessage -> DEBU 3c24 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.076 UTC [gossip.gossip] handleMessage -> DEBU 3c25 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c27 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.079 UTC [gossip.comm] func1 -> DEBU 3c28 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.079 UTC [gossip.gossip] handleMessage -> DEBU 3c29 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.079 UTC [gossip.gossip] handleMessage -> DEBU 3c2a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.079 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c2b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.079 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c2c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [gossip.comm] func1 -> DEBU 3c2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [gossip.gossip] handleMessage -> DEBU 3c2e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [gossip.gossip] handleMessage -> DEBU 3c2f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c31 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [msp] DeserializeIdentity -> DEBU 3c32 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:14.148 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c34 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c35 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [policies] Evaluate -> DEBU 3c36 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [policies] Evaluate -> DEBU 3c37 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [policies] Evaluate -> DEBU 3c38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [cauthdsl] func1 -> DEBU 3c39 0xc0042afd40 gate 1556789294149285000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [cauthdsl] func2 -> DEBU 3c3a 0xc0042afd40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [cauthdsl] func2 -> DEBU 3c3b 0xc0042afd40 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:14.149 UTC [cauthdsl] func2 -> DEBU 3c3c 0xc0042afd40 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:14.150 UTC [msp.identity] Verify -> DEBU 3c3d Verify: digest = 00000000 05 dc ff 52 2e 71 34 e1 f1 a6 f3 d0 ab 80 7d 1d |...R.q4.......}.| +peer0.org1.example.com | 00000010 b2 c3 46 46 75 b5 c6 53 1c 82 8a 2d 6f 15 10 1b |..FFu..S...-o...|" +peer0.org1.example.com | "2019-05-02 09:28:14.150 UTC [msp.identity] Verify -> DEBU 3c3e Verify: sig = 00000000 30 44 02 20 02 4a d8 7b 18 45 cd 55 d9 25 ad 1a |0D. .J.{.E.U.%..| +peer0.org1.example.com | 00000010 0a 9a da 2f a8 28 1c 83 11 31 34 ee 00 c6 33 ad |.../.(...14...3.| +peer0.org1.example.com | 00000020 ce 7d cc 96 02 20 75 d6 99 d9 cc b3 64 ee c4 a3 |.}... u.....d...| +peer0.org1.example.com | 00000030 2b f7 db 2d 1c 9c 2a 36 7d d4 4c 4d df 18 8f e7 |+..-..*6}.LM....| +peer0.org1.example.com | 00000040 07 18 f8 7b d6 0b |...{..|" +peer0.org1.example.com | "2019-05-02 09:28:14.150 UTC [cauthdsl] func2 -> DEBU 3c3f 0xc0042afd40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:14.150 UTC [cauthdsl] func1 -> DEBU 3c40 0xc0042afd40 gate 1556789294149285000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:14.152 UTC [policies] Evaluate -> DEBU 3c41 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:14.159 UTC [policies] Evaluate -> DEBU 3c42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:14.162 UTC [policies] Evaluate -> DEBU 3c43 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:14.170 UTC [policies] Evaluate -> DEBU 3c44 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:14.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c45 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c46 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:14.180 UTC [gossip.comm] func1 -> DEBU 3c47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.180 UTC [gossip.gossip] handleMessage -> DEBU 3c48 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c49 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 " +peer0.org1.example.com | "2019-05-02 09:28:14.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c4a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 " +peer0.org1.example.com | "2019-05-02 09:28:14.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c4b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:14.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c4c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c4d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.182 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c4e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.193 UTC [gossip.comm] func1 -> DEBU 3c4f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.195 UTC [msp] DeserializeIdentity -> DEBU 3c50 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.195 UTC [msp] DeserializeIdentity -> DEBU 3c51 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.196 UTC [msp] DeserializeIdentity -> DEBU 3c52 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.197 UTC [msp] DeserializeIdentity -> DEBU 3c53 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.197 UTC [msp] DeserializeIdentity -> DEBU 3c54 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.197 UTC [msp] DeserializeIdentity -> DEBU 3c55 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.198 UTC [gossip.comm] Send -> DEBU 3c56 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:14.198 UTC [msp] DeserializeIdentity -> DEBU 3c57 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.198 UTC [msp] DeserializeIdentity -> DEBU 3c58 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:14.198 UTC [gossip.comm] Send -> DEBU 3c59 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:14.199 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.199 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.203 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.203 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c5e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c5f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.208 UTC [gossip.gossip] handleMessage -> DEBU 3c60 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.209 UTC [gossip.gossip] handleMessage -> DEBU 3c61 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.210 UTC [gossip.gossip] handleMessage -> DEBU 3c62 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:14.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c63 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:14.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c64 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:16.213 UTC [msp] DeserializeIdentity -> DEBU 3c65 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [msp] DeserializeIdentity -> DEBU 3c66 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] Send -> DEBU 3c67 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c68 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c69 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:16.216 UTC [gossip.comm] func1 -> DEBU 3c6e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.216 UTC [gossip.gossip] handleMessage -> DEBU 3c6f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.217 UTC [gossip.comm] func1 -> DEBU 3c70 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.217 UTC [msp] DeserializeIdentity -> DEBU 3c71 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.218 UTC [msp] DeserializeIdentity -> DEBU 3c72 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.218 UTC [msp] DeserializeIdentity -> DEBU 3c73 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.218 UTC [gossip.comm] func1 -> DEBU 3c74 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.218 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:16.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c76 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c77 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.220 UTC [policies] Evaluate -> DEBU 3c78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.220 UTC [policies] Evaluate -> DEBU 3c79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:16.220 UTC [policies] Evaluate -> DEBU 3c7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.221 UTC [cauthdsl] func1 -> DEBU 3c7b 0xc00239d000 gate 1556789296221442800 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:16.221 UTC [cauthdsl] func2 -> DEBU 3c7c 0xc00239d000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:16.221 UTC [cauthdsl] func2 -> DEBU 3c7d 0xc00239d000 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:16.222 UTC [cauthdsl] func2 -> DEBU 3c7e 0xc00239d000 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.222 UTC [msp.identity] Verify -> DEBU 3c7f Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:16.223 UTC [msp.identity] Verify -> DEBU 3c80 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:16.224 UTC [cauthdsl] func2 -> DEBU 3c81 0xc00239d000 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.224 UTC [cauthdsl] func1 -> DEBU 3c82 0xc00239d000 gate 1556789296221442800 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c85 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.226 UTC [msp.identity] Verify -> DEBU 3c87 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:16.227 UTC [msp.identity] Verify -> DEBU 3c88 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:16.227 UTC [msp] DeserializeIdentity -> DEBU 3c89 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.228 UTC [msp] DeserializeIdentity -> DEBU 3c8a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.228 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:16.229 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c8c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.229 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c8d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.229 UTC [policies] Evaluate -> DEBU 3c8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.229 UTC [policies] Evaluate -> DEBU 3c8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:16.230 UTC [policies] Evaluate -> DEBU 3c90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.230 UTC [cauthdsl] func1 -> DEBU 3c91 0xc0026daef0 gate 1556789296230552000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:16.231 UTC [cauthdsl] func2 -> DEBU 3c92 0xc0026daef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:16.231 UTC [cauthdsl] func2 -> DEBU 3c93 0xc0026daef0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:16.231 UTC [cauthdsl] func2 -> DEBU 3c94 0xc0026daef0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.232 UTC [msp.identity] Verify -> DEBU 3c95 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:16.232 UTC [msp.identity] Verify -> DEBU 3c96 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:16.232 UTC [cauthdsl] func2 -> DEBU 3c97 0xc0026daef0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.233 UTC [cauthdsl] func1 -> DEBU 3c98 0xc0026daef0 gate 1556789296230552000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:16.233 UTC [policies] Evaluate -> DEBU 3c99 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.234 UTC [policies] Evaluate -> DEBU 3c9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.234 UTC [policies] Evaluate -> DEBU 3c9b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.234 UTC [policies] Evaluate -> DEBU 3c9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.235 UTC [msp.identity] Verify -> DEBU 3c9d Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:16.235 UTC [msp.identity] Verify -> DEBU 3c9e Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:16.235 UTC [gossip.gossip] handleMessage -> DEBU 3c9f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:16.236 UTC [gossip.gossip] handleMessage -> DEBU 3ca0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.236 UTC [msp.identity] Verify -> DEBU 3ca1 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:16.236 UTC [msp.identity] Verify -> DEBU 3ca2 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:16.237 UTC [msp] DeserializeIdentity -> DEBU 3ca3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.237 UTC [msp] DeserializeIdentity -> DEBU 3ca4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.238 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ca5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:16.238 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ca6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.238 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ca7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.238 UTC [policies] Evaluate -> DEBU 3ca8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.238 UTC [policies] Evaluate -> DEBU 3ca9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:16.239 UTC [policies] Evaluate -> DEBU 3caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.239 UTC [cauthdsl] func1 -> DEBU 3cab 0xc0035a7740 gate 1556789296239233500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:16.239 UTC [cauthdsl] func2 -> DEBU 3cac 0xc0035a7740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:16.239 UTC [cauthdsl] func2 -> DEBU 3cad 0xc0035a7740 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:16.239 UTC [cauthdsl] func2 -> DEBU 3cae 0xc0035a7740 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.240 UTC [msp.identity] Verify -> DEBU 3caf Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:16.240 UTC [msp.identity] Verify -> DEBU 3cb0 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:16.241 UTC [cauthdsl] func2 -> DEBU 3cb1 0xc0035a7740 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.241 UTC [cauthdsl] func1 -> DEBU 3cb2 0xc0035a7740 gate 1556789296239233500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:16.241 UTC [policies] Evaluate -> DEBU 3cb3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.241 UTC [policies] Evaluate -> DEBU 3cb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.242 UTC [policies] Evaluate -> DEBU 3cb5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.242 UTC [policies] Evaluate -> DEBU 3cb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.243 UTC [msp.identity] Verify -> DEBU 3cb7 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:16.244 UTC [msp.identity] Verify -> DEBU 3cb8 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:16.245 UTC [msp] DeserializeIdentity -> DEBU 3cb9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.245 UTC [msp] DeserializeIdentity -> DEBU 3cbb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.245 UTC [gossip.privdata] run -> DEBU 3cba Start reconcile missing private info" +peer0.org1.example.com | "2019-05-02 09:28:16.246 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:16.246 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cbd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.246 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cbe Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [policies] Evaluate -> DEBU 3cbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [policies] Evaluate -> DEBU 3cc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [policies] Evaluate -> DEBU 3cc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func1 -> DEBU 3cc2 0xc003e47630 gate 1556789296247325900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc3 0xc003e47630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc4 0xc003e47630 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc5 0xc003e47630 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [msp.identity] Verify -> DEBU 3cc6 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [msp.identity] Verify -> DEBU 3cc7 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc8 0xc003e47630 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.247 UTC [cauthdsl] func1 -> DEBU 3cc9 0xc003e47630 gate 1556789296247325900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3cca Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3ccb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3ccc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3ccd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [gossip.gossip] handleMessage -> DEBU 3cce Exiting" +peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [gossip.gossip] handleMessage -> DEBU 3ccf Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [msp] DeserializeIdentity -> DEBU 3cd0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [msp] DeserializeIdentity -> DEBU 3cd1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [msp] DeserializeIdentity -> DEBU 3cd2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.248 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cd3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [policies] Evaluate -> DEBU 3cd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [policies] Evaluate -> DEBU 3cd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [policies] Evaluate -> DEBU 3cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [cauthdsl] func1 -> DEBU 3cd9 0xc00438b140 gate 1556789296249519400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [cauthdsl] func2 -> DEBU 3cda 0xc00438b140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [cauthdsl] func2 -> DEBU 3cdb 0xc00438b140 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [cauthdsl] func2 -> DEBU 3cdc 0xc00438b140 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [msp.identity] Verify -> DEBU 3cdd Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:16.249 UTC [msp.identity] Verify -> DEBU 3cde Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [cauthdsl] func2 -> DEBU 3cdf 0xc00438b140 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [cauthdsl] func1 -> DEBU 3ce0 0xc00438b140 gate 1556789296249519400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.250 UTC [msp.identity] Verify -> DEBU 3ce5 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [msp.identity] Verify -> DEBU 3ce6 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [msp] DeserializeIdentity -> DEBU 3ce7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [msp] DeserializeIdentity -> DEBU 3ce8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ce9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cea Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ceb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [policies] Evaluate -> DEBU 3cec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [policies] Evaluate -> DEBU 3ced This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:16.251 UTC [policies] Evaluate -> DEBU 3cee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func1 -> DEBU 3cef 0xc002763030 gate 1556789296252069200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf0 0xc002763030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf1 0xc002763030 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf2 0xc002763030 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [msp.identity] Verify -> DEBU 3cf3 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [msp.identity] Verify -> DEBU 3cf4 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf5 0xc002763030 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [cauthdsl] func1 -> DEBU 3cf6 0xc002763030 gate 1556789296252069200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [policies] Evaluate -> DEBU 3cf7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.252 UTC [policies] Evaluate -> DEBU 3cf8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.253 UTC [policies] Evaluate -> DEBU 3cf9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.253 UTC [policies] Evaluate -> DEBU 3cfa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:16.253 UTC [msp.identity] Verify -> DEBU 3cfb Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:16.253 UTC [msp.identity] Verify -> DEBU 3cfc Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:16.253 UTC [gossip.gossip] handleMessage -> DEBU 3cfd Exiting" +peer0.org1.example.com | "2019-05-02 09:28:16.246 UTC [leveldbhelper] GetIterator -> DEBU 3cfe Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xf6}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +peer0.org1.example.com | "2019-05-02 09:28:16.254 UTC [gossip.privdata] reconcile -> DEBU 3cff Reconciliation cycle finished successfully. no items to reconcile" +peer0.org1.example.com | "2019-05-02 09:28:16.470 UTC [gossip.comm] func1 -> DEBU 3d00 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.471 UTC [gossip.gossip] handleMessage -> DEBU 3d01 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.471 UTC [msp] DeserializeIdentity -> DEBU 3d02 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.471 UTC [msp] DeserializeIdentity -> DEBU 3d03 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.471 UTC [gossip.gossip] handleMessage -> DEBU 3d04 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:16.544 UTC [gossip.comm] func1 -> DEBU 3d05 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.544 UTC [gossip.gossip] handleMessage -> DEBU 3d06 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.545 UTC [gossip.pull] HandleMessage -> DEBU 3d07 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.545 UTC [gossip.pull] SendDigest -> DEBU 3d08 Sending BLOCK_MSG digest: [6 7 8 1 2 3 4 5 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:16.546 UTC [gossip.gossip] handleMessage -> DEBU 3d09 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:16.716 UTC [gossip.comm] func1 -> DEBU 3d0a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.716 UTC [gossip.gossip] handleMessage -> DEBU 3d0b Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.717 UTC [msp] DeserializeIdentity -> DEBU 3d0c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.717 UTC [msp] DeserializeIdentity -> DEBU 3d0d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.717 UTC [msp] DeserializeIdentity -> DEBU 3d0e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.717 UTC [gossip.gossip] handleMessage -> DEBU 3d0f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:16.951 UTC [gossip.comm] func1 -> DEBU 3d10 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.951 UTC [gossip.gossip] handleMessage -> DEBU 3d11 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:16.952 UTC [msp] DeserializeIdentity -> DEBU 3d12 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.959 UTC [msp] DeserializeIdentity -> DEBU 3d13 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.960 UTC [msp] DeserializeIdentity -> DEBU 3d14 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:16.961 UTC [gossip.gossip] handleMessage -> DEBU 3d15 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.296 UTC [gossip.election] waitForInterrupt -> DEBU 3d16 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.296 UTC [gossip.election] IsLeader -> DEBU 3d17 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-05-02 09:28:17.296 UTC [msp.identity] Sign -> DEBU 3d18 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100D1801 " +peer0.org1.example.com | "2019-05-02 09:28:17.296 UTC [msp.identity] Sign -> DEBU 3d19 Sign: digest: EA9514E5B5DE87377206684C8235829BFEC895424EB23EE05ABC0126D9AD2AC3 " +peer0.org1.example.com | "2019-05-02 09:28:17.296 UTC [gossip.election] waitForInterrupt -> DEBU 3d1a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.298 UTC [gossip.comm] Send -> DEBU 3d1f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.298 UTC [msp] DeserializeIdentity -> DEBU 3d20 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.298 UTC [msp] DeserializeIdentity -> DEBU 3d21 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.298 UTC [gossip.comm] sendToEndpoint -> DEBU 3d22 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.298 UTC [gossip.comm] sendToEndpoint -> DEBU 3d23 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.594 UTC [gossip.comm] func1 -> DEBU 3d24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.594 UTC [gossip.gossip] handleMessage -> DEBU 3d25 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.594 UTC [gossip.gossip] handleMessage -> DEBU 3d26 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.600 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d28 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:17.601 UTC [msp] DeserializeIdentity -> DEBU 3d29 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.603 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d2a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:17.605 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d2b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:17.606 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d2c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:17.606 UTC [policies] Evaluate -> DEBU 3d2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:17.606 UTC [policies] Evaluate -> DEBU 3d2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:17.606 UTC [policies] Evaluate -> DEBU 3d2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:17.607 UTC [cauthdsl] func1 -> DEBU 3d30 0xc004374b80 gate 1556789297607083900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:17.607 UTC [cauthdsl] func2 -> DEBU 3d31 0xc004374b80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:17.607 UTC [cauthdsl] func2 -> DEBU 3d32 0xc004374b80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:17.607 UTC [cauthdsl] func2 -> DEBU 3d33 0xc004374b80 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:17.613 UTC [gossip.comm] func1 -> DEBU 3d34 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.619 UTC [gossip.gossip] handleMessage -> DEBU 3d35 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.619 UTC [gossip.pull] HandleMessage -> DEBU 3d36 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.619 UTC [msp] DeserializeIdentity -> DEBU 3d37 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.621 UTC [msp] DeserializeIdentity -> DEBU 3d38 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.624 UTC [msp] DeserializeIdentity -> DEBU 3d39 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.624 UTC [msp] DeserializeIdentity -> DEBU 3d3a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.625 UTC [msp] DeserializeIdentity -> DEBU 3d3b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.625 UTC [msp] DeserializeIdentity -> DEBU 3d3c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.626 UTC [gossip.pull] SendDigest -> DEBU 3d3d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:17.627 UTC [gossip.gossip] handleMessage -> DEBU 3d3e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.613 UTC [msp.identity] Verify -> DEBU 3d3f Verify: digest = 00000000 63 a3 9c e0 f3 5a 8d c4 d0 1b 35 e5 70 45 98 5f |c....Z....5.pE._| +peer0.org1.example.com | 00000010 fc f0 da b3 86 fd a4 2c 9f 0e 3e a1 c4 e8 78 55 |.......,..>...xU|" +peer0.org1.example.com | "2019-05-02 09:28:17.643 UTC [msp.identity] Sign -> DEBU 3d40 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102D " +peer0.org1.example.com | "2019-05-02 09:28:17.650 UTC [msp.identity] Sign -> DEBU 3d41 Sign: digest: 8B923E02083CAF7B287C02E755358EE8E03BBC263E640CB3BA4223F63DD9973B " +peer0.org1.example.com | "2019-05-02 09:28:17.641 UTC [msp.identity] Verify -> DEBU 3d42 Verify: sig = 00000000 30 44 02 20 68 28 7c aa bf ee 30 b2 ca db bf 62 |0D. h(|...0....b| +peer0.org1.example.com | 00000010 6a a4 68 3b 45 af ee 39 df 2b d9 29 b1 28 c0 cd |j.h;E..9.+.).(..| +peer0.org1.example.com | 00000020 ba 84 f7 45 02 20 43 d2 36 59 12 b0 15 ef d6 4a |...E. C.6Y.....J| +peer0.org1.example.com | 00000030 9b 17 3e bc 5a 7c 04 27 2b 10 74 fb 75 3e 0b 64 |..>.Z|.'+.t.u>.d| +peer0.org1.example.com | 00000040 74 33 4c ce 78 21 |t3L.x!|" +peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [cauthdsl] func2 -> DEBU 3d43 0xc004374b80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [cauthdsl] func1 -> DEBU 3d44 0xc004374b80 gate 1556789297607083900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d45 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d47 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d49 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 " +peer0.org1.example.com | "2019-05-02 09:28:17.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 " +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d4f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d50 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] sendMemResponse -> DEBU 3d51 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [msp] DeserializeIdentity -> DEBU 3d52 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [msp] DeserializeIdentity -> DEBU 3d53 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [msp] DeserializeIdentity -> DEBU 3d54 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.comm] Send -> DEBU 3d55 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.discovery] sendMemResponse -> DEBU 3d56 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.comm] sendToEndpoint -> DEBU 3d57 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.671 UTC [gossip.comm] sendToEndpoint -> DEBU 3d58 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.687 UTC [msp.identity] Sign -> DEBU 3d59 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [msp.identity] Sign -> DEBU 3d5a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [gossip.comm] Send -> DEBU 3d5b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [msp] DeserializeIdentity -> DEBU 3d5c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [gossip.comm] Send -> DEBU 3d5d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [msp] DeserializeIdentity -> DEBU 3d5e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [gossip.comm] Send -> DEBU 3d5f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [gossip.comm] sendToEndpoint -> DEBU 3d60 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.688 UTC [gossip.comm] sendToEndpoint -> DEBU 3d61 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d62 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d63 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d64 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d65 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] func1 -> DEBU 3d66 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.comm] func1 -> DEBU 3d67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.gossip] handleMessage -> DEBU 3d68 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.689 UTC [gossip.pull] HandleMessage -> DEBU 3d69 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.pull] SendDigest -> DEBU 3d70 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.gossip] handleMessage -> DEBU 3d71 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.gossip] handleMessage -> DEBU 3d72 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.gossip] handleMessage -> DEBU 3d73 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d74 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d75 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d76 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d77 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d78 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:17.690 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d79 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d7a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d7b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func1 -> DEBU 3d7d 0xc003cfc600 gate 1556789297691143400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d7e 0xc003cfc600 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d7f 0xc003cfc600 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d80 0xc003cfc600 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [msp.identity] Verify -> DEBU 3d81 Verify: digest = 00000000 91 71 e7 69 4d 05 60 f4 ad 9a 04 6f 8c aa 09 21 |.q.iM.`....o...!| +peer0.org1.example.com | 00000010 95 92 a2 0a 63 59 a0 96 d8 48 4b 69 a3 0d cd fc |....cY...HKi....|" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [msp.identity] Verify -> DEBU 3d82 Verify: sig = 00000000 30 45 02 21 00 b6 67 d5 d9 f0 33 11 7f 78 ef 7b |0E.!..g...3..x.{| +peer0.org1.example.com | 00000010 1a d2 d3 bb 5e d3 39 01 ce 6b 07 55 c4 cc 2d ad |....^.9..k.U..-.| +peer0.org1.example.com | 00000020 d0 b7 74 29 18 02 20 53 17 12 11 89 8b 0c 5b 3c |..t).. S......[<| +peer0.org1.example.com | 00000030 c9 97 e8 32 45 6c af 1a be fb bb d1 2c 47 3f 78 |...2El......,G?x| +peer0.org1.example.com | 00000040 05 3c ed e4 b2 b5 8a |.<.....|" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d83 0xc003cfc600 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [cauthdsl] func1 -> DEBU 3d84 0xc003cfc600 gate 1556789297691143400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d87 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d89 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.696 UTC [gossip.comm] func1 -> DEBU 3d8a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.696 UTC [gossip.gossip] handleMessage -> DEBU 3d8b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.701 UTC [gossip.comm] func1 -> DEBU 3d8c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d8d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:17.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d8e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 " +peer0.org1.example.com | "2019-05-02 09:28:17.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d8f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 " +peer0.org1.example.com | "2019-05-02 09:28:17.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d90 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:17.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d91 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d92 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.704 UTC [gossip.discovery] sendMemResponse -> DEBU 3d93 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:17.704 UTC [msp] DeserializeIdentity -> DEBU 3d94 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.705 UTC [msp] DeserializeIdentity -> DEBU 3d95 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.705 UTC [msp] DeserializeIdentity -> DEBU 3d96 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.705 UTC [gossip.comm] Send -> DEBU 3d97 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.705 UTC [gossip.discovery] sendMemResponse -> DEBU 3d98 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3d99 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3d9a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d9b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.708 UTC [gossip.gossip] handleMessage -> DEBU 3d9c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.708 UTC [gossip.gossip] handleMessage -> DEBU 3d9d Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d9e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.708 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d9f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:17.709 UTC [msp] DeserializeIdentity -> DEBU 3da0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.709 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3da1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:17.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3da2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:17.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3da3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:17.710 UTC [policies] Evaluate -> DEBU 3da4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:17.710 UTC [policies] Evaluate -> DEBU 3da5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:17.711 UTC [policies] Evaluate -> DEBU 3da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:17.711 UTC [cauthdsl] func1 -> DEBU 3da7 0xc0020e8850 gate 1556789297711225300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:17.711 UTC [cauthdsl] func2 -> DEBU 3da8 0xc0020e8850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:17.711 UTC [cauthdsl] func2 -> DEBU 3da9 0xc0020e8850 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:17.712 UTC [cauthdsl] func2 -> DEBU 3daa 0xc0020e8850 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:17.712 UTC [msp.identity] Verify -> DEBU 3dab Verify: digest = 00000000 63 a3 9c e0 f3 5a 8d c4 d0 1b 35 e5 70 45 98 5f |c....Z....5.pE._| +peer0.org1.example.com | 00000010 fc f0 da b3 86 fd a4 2c 9f 0e 3e a1 c4 e8 78 55 |.......,..>...xU|" +peer0.org1.example.com | "2019-05-02 09:28:17.713 UTC [msp.identity] Verify -> DEBU 3dac Verify: sig = 00000000 30 44 02 20 68 28 7c aa bf ee 30 b2 ca db bf 62 |0D. h(|...0....b| +peer0.org1.example.com | 00000010 6a a4 68 3b 45 af ee 39 df 2b d9 29 b1 28 c0 cd |j.h;E..9.+.).(..| +peer0.org1.example.com | 00000020 ba 84 f7 45 02 20 43 d2 36 59 12 b0 15 ef d6 4a |...E. C.6Y.....J| +peer0.org1.example.com | 00000030 9b 17 3e bc 5a 7c 04 27 2b 10 74 fb 75 3e 0b 64 |..>.Z|.'+.t.u>.d| +peer0.org1.example.com | 00000040 74 33 4c ce 78 21 |t3L.x!|" +peer0.org1.example.com | "2019-05-02 09:28:17.713 UTC [cauthdsl] func2 -> DEBU 3dad 0xc0020e8850 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:17.713 UTC [cauthdsl] func1 -> DEBU 3dae 0xc0020e8850 gate 1556789297711225300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3daf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3db0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3db1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3db2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.714 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.715 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3db5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:17.715 UTC [msp.identity] Verify -> DEBU 3db6 Verify: digest = 00000000 8b 92 3e 02 08 3c af 7b 28 7c 02 e7 55 35 8e e8 |..>..<.{(|..U5..| +peer0.org1.example.com | 00000010 e0 3b bc 26 3e 64 0c b3 ba 42 23 f6 3d d9 97 3b |.;.&>d...B#.=..;|" +peer0.org1.example.com | "2019-05-02 09:28:17.715 UTC [msp.identity] Verify -> DEBU 3db7 Verify: sig = 00000000 30 45 02 21 00 91 5c bb b3 49 b0 11 04 7e 2f 39 |0E.!..\..I...~/9| +peer0.org1.example.com | 00000010 bf 32 9f 8b 0e e9 d1 25 9d 05 e6 8e 53 51 5a fb |.2.....%....SQZ.| +peer0.org1.example.com | 00000020 ef ce 3f c6 fa 02 20 1b a5 38 d9 02 7c bc fd 87 |..?... ..8..|...| +peer0.org1.example.com | 00000030 56 42 05 6b 4b 82 71 12 29 9a 4e 29 4b aa 90 02 |VB.kK.q.).N)K...| +peer0.org1.example.com | 00000040 29 c1 24 27 fe df fc |).$'...|" +peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.discovery] isSentByMe -> DEBU 3db9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dba Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dbb Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dbc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.716 UTC [gossip.gossip] handleMessage -> DEBU 3dbd Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.717 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dbe Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:17.717 UTC [msp.identity] Verify -> DEBU 3dbf Verify: digest = 00000000 8b 92 3e 02 08 3c af 7b 28 7c 02 e7 55 35 8e e8 |..>..<.{(|..U5..| +peer0.org1.example.com | 00000010 e0 3b bc 26 3e 64 0c b3 ba 42 23 f6 3d d9 97 3b |.;.&>d...B#.=..;|" +peer0.org1.example.com | "2019-05-02 09:28:17.717 UTC [msp.identity] Verify -> DEBU 3dc0 Verify: sig = 00000000 30 45 02 21 00 91 5c bb b3 49 b0 11 04 7e 2f 39 |0E.!..\..I...~/9| +peer0.org1.example.com | 00000010 bf 32 9f 8b 0e e9 d1 25 9d 05 e6 8e 53 51 5a fb |.2.....%....SQZ.| +peer0.org1.example.com | 00000020 ef ce 3f c6 fa 02 20 1b a5 38 d9 02 7c bc fd 87 |..?... ..8..|...| +peer0.org1.example.com | 00000030 56 42 05 6b 4b 82 71 12 29 9a 4e 29 4b aa 90 02 |VB.kK.q.).N)K...| +peer0.org1.example.com | 00000040 29 c1 24 27 fe df fc |).$'...|" +peer0.org1.example.com | "2019-05-02 09:28:17.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.718 UTC [gossip.discovery] isSentByMe -> DEBU 3dc2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc3 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.718 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dc4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:17.718 UTC [msp] DeserializeIdentity -> DEBU 3dc5 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dc6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dc7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dc8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [policies] Evaluate -> DEBU 3dc9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [policies] Evaluate -> DEBU 3dca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [policies] Evaluate -> DEBU 3dcb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [cauthdsl] func1 -> DEBU 3dcc 0xc00304dc90 gate 1556789297719537500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:17.719 UTC [cauthdsl] func2 -> DEBU 3dcd 0xc00304dc90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:17.720 UTC [cauthdsl] func2 -> DEBU 3dce 0xc00304dc90 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:17.720 UTC [cauthdsl] func2 -> DEBU 3dcf 0xc00304dc90 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:17.720 UTC [msp.identity] Verify -> DEBU 3dd0 Verify: digest = 00000000 91 71 e7 69 4d 05 60 f4 ad 9a 04 6f 8c aa 09 21 |.q.iM.`....o...!| +peer0.org1.example.com | 00000010 95 92 a2 0a 63 59 a0 96 d8 48 4b 69 a3 0d cd fc |....cY...HKi....|" +peer0.org1.example.com | "2019-05-02 09:28:17.720 UTC [msp.identity] Verify -> DEBU 3dd1 Verify: sig = 00000000 30 45 02 21 00 b6 67 d5 d9 f0 33 11 7f 78 ef 7b |0E.!..g...3..x.{| +peer0.org1.example.com | 00000010 1a d2 d3 bb 5e d3 39 01 ce 6b 07 55 c4 cc 2d ad |....^.9..k.U..-.| +peer0.org1.example.com | 00000020 d0 b7 74 29 18 02 20 53 17 12 11 89 8b 0c 5b 3c |..t).. S......[<| +peer0.org1.example.com | 00000030 c9 97 e8 32 45 6c af 1a be fb bb d1 2c 47 3f 78 |...2El......,G?x| +peer0.org1.example.com | 00000040 05 3c ed e4 b2 b5 8a |.<.....|" +peer0.org1.example.com | "2019-05-02 09:28:17.720 UTC [cauthdsl] func2 -> DEBU 3dd2 0xc00304dc90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [cauthdsl] func1 -> DEBU 3dd3 0xc00304dc90 gate 1556789297719537500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dd8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dd9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.721 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dda Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.732 UTC [gossip.comm] func1 -> DEBU 3ddb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.733 UTC [gossip.comm] func1 -> DEBU 3ddc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.733 UTC [gossip.gossip] handleMessage -> DEBU 3ddd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.733 UTC [gossip.gossip] handleMessage -> DEBU 3dde Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.734 UTC [gossip.gossip] handleMessage -> DEBU 3ddf Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.734 UTC [gossip.pull] HandleMessage -> DEBU 3de0 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.734 UTC [gossip.pull] SendDigest -> DEBU 3de1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:17.735 UTC [gossip.gossip] handleMessage -> DEBU 3de2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3de3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.735 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3de4 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:17.736 UTC [msp.identity] Verify -> DEBU 3de5 Verify: digest = 00000000 8e 00 7c a6 60 fd 6e e1 31 88 5b d1 e3 ca fb 8c |..|.`.n.1.[.....| +peer0.org1.example.com | 00000010 26 3e d1 3c 81 fb 8f fa c6 75 e9 ad c1 74 13 cd |&>.<.....u...t..|" +peer0.org1.example.com | "2019-05-02 09:28:17.736 UTC [msp.identity] Verify -> DEBU 3de6 Verify: sig = 00000000 30 44 02 20 2d ae 71 0f 53 f8 6a bc f4 fa 0e 6a |0D. -.q.S.j....j| +peer0.org1.example.com | 00000010 23 c8 87 57 43 5d 0d cb ce e7 55 14 1b 26 58 1b |#..WC]....U..&X.| +peer0.org1.example.com | 00000020 78 8a da 03 02 20 02 59 9e d5 19 cf 66 a4 17 a2 |x.... .Y....f...| +peer0.org1.example.com | 00000030 ef 65 90 bf 38 a8 e7 53 b4 a8 be 5a 1f 58 39 38 |.e..8..S...Z.X98| +peer0.org1.example.com | 00000040 9c fc 08 f7 62 39 |....b9|" +peer0.org1.example.com | "2019-05-02 09:28:17.737 UTC [msp.identity] Verify -> DEBU 3de7 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:28:17.737 UTC [msp.identity] Verify -> DEBU 3de8 Verify: sig = 00000000 30 44 02 20 75 11 61 e0 d6 ff 84 46 32 08 f6 13 |0D. u.a....F2...| +peer0.org1.example.com | 00000010 66 02 da 65 df 5e 2c 63 0a 6a 2c 52 45 b8 61 8e |f..e.^,c.j,RE.a.| +peer0.org1.example.com | 00000020 92 cd 62 7d 02 20 6f 8b af 48 1b 28 26 11 ca 2d |..b}. o..H.(&..-| +peer0.org1.example.com | 00000030 34 b1 ab 64 e6 12 1b 5b ea 92 d8 79 14 07 ea 64 |4..d...[...y...d| +peer0.org1.example.com | 00000040 cb b2 24 50 47 2f |..$PG/|" +peer0.org1.example.com | "2019-05-02 09:28:17.738 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.738 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dea Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:17.738 UTC [gossip.discovery] learnExistingMembers -> DEBU 3deb updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 " +peer0.org1.example.com | "2019-05-02 09:28:17.738 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dec Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 " +peer0.org1.example.com | "2019-05-02 09:28:17.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ded Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:17.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dee Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.739 UTC [gossip.discovery] handleAliveMessage -> DEBU 3def Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.740 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3df0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.740 UTC [gossip.discovery] sendMemResponse -> DEBU 3df1 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:17.740 UTC [msp] DeserializeIdentity -> DEBU 3df2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.741 UTC [msp] DeserializeIdentity -> DEBU 3df3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.741 UTC [gossip.comm] Send -> DEBU 3df4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.741 UTC [gossip.discovery] sendMemResponse -> DEBU 3df5 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:17.742 UTC [gossip.comm] sendToEndpoint -> DEBU 3df6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.742 UTC [gossip.comm] sendToEndpoint -> DEBU 3df7 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.771 UTC [gossip.comm] func1 -> DEBU 3df8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.772 UTC [gossip.gossip] handleMessage -> DEBU 3df9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.772 UTC [gossip.gossip] handleMessage -> DEBU 3dfa Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.773 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dfb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.773 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dfc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:17.774 UTC [msp.identity] Verify -> DEBU 3dfd Verify: digest = 00000000 8b 92 3e 02 08 3c af 7b 28 7c 02 e7 55 35 8e e8 |..>..<.{(|..U5..| +peer0.org1.example.com | 00000010 e0 3b bc 26 3e 64 0c b3 ba 42 23 f6 3d d9 97 3b |.;.&>d...B#.=..;|" +peer0.org1.example.com | "2019-05-02 09:28:17.774 UTC [msp.identity] Verify -> DEBU 3dfe Verify: sig = 00000000 30 45 02 21 00 91 5c bb b3 49 b0 11 04 7e 2f 39 |0E.!..\..I...~/9| +peer0.org1.example.com | 00000010 bf 32 9f 8b 0e e9 d1 25 9d 05 e6 8e 53 51 5a fb |.2.....%....SQZ.| +peer0.org1.example.com | 00000020 ef ce 3f c6 fa 02 20 1b a5 38 d9 02 7c bc fd 87 |..?... ..8..|...| +peer0.org1.example.com | 00000030 56 42 05 6b 4b 82 71 12 29 9a 4e 29 4b aa 90 02 |VB.kK.q.).N)K...| +peer0.org1.example.com | 00000040 29 c1 24 27 fe df fc |).$'...|" +peer0.org1.example.com | "2019-05-02 09:28:17.775 UTC [msp.identity] Verify -> DEBU 3dff Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:28:17.775 UTC [msp.identity] Verify -> DEBU 3e00 Verify: sig = 00000000 30 44 02 20 14 83 93 06 29 d9 29 65 89 e2 e3 0c |0D. ....).)e....| +peer0.org1.example.com | 00000010 45 fe d5 31 d5 a7 ef 7d f8 07 fd b3 0e fe 12 4a |E..1...}.......J| +peer0.org1.example.com | 00000020 2f 2d 40 09 02 20 4d 3b 62 8d 9d 1b a0 5f 38 0c |/-@.. M;b...._8.| +peer0.org1.example.com | 00000030 2c 7b ab 8d fa ed 0e 9c e1 60 b7 58 f2 9e fe 2d |,{.......`.X...-| +peer0.org1.example.com | 00000040 c8 f4 47 4c 33 a0 |..GL3.|" +peer0.org1.example.com | "2019-05-02 09:28:17.775 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e01 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.776 UTC [gossip.discovery] isSentByMe -> DEBU 3e02 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e03 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e04 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.839 UTC [gossip.pull] Hello -> DEBU 3e05 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:17.839 UTC [msp] DeserializeIdentity -> DEBU 3e06 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [msp] DeserializeIdentity -> DEBU 3e08 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.839 UTC [gossip.comm] Send -> DEBU 3e07 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.pull] Hello -> DEBU 3e09 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.comm] Send -> DEBU 3e0a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.pull] Hello -> DEBU 3e0b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.comm] Send -> DEBU 3e0c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.pull] Hello -> DEBU 3e0d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:17.840 UTC [gossip.comm] sendToEndpoint -> DEBU 3e0e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [gossip.comm] sendToEndpoint -> DEBU 3e0f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [msp] DeserializeIdentity -> DEBU 3e10 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [msp] DeserializeIdentity -> DEBU 3e11 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [gossip.comm] sendToEndpoint -> DEBU 3e12 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [gossip.comm] sendToEndpoint -> DEBU 3e13 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.841 UTC [gossip.comm] Send -> DEBU 3e14 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e15 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e16 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e17 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e18 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.comm] func1 -> DEBU 3e19 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3024106290083695586 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.comm] func1 -> DEBU 3e1a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6290708047405863089 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e1b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3024106290083695586 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.pull] HandleMessage -> DEBU 3e1c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3024106290083695586 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e1d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e1e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6290708047405863089 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.pull] HandleMessage -> DEBU 3e1f GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6290708047405863089 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e20 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.848 UTC [gossip.comm] func1 -> DEBU 3e21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10570254373589169019 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.848 UTC [gossip.gossip] handleMessage -> DEBU 3e22 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10570254373589169019 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.849 UTC [gossip.pull] HandleMessage -> DEBU 3e23 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10570254373589169019 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.849 UTC [gossip.gossip] handleMessage -> DEBU 3e24 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:17.850 UTC [gossip.comm] func1 -> DEBU 3e25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6643126557587392879 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.850 UTC [gossip.gossip] handleMessage -> DEBU 3e26 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6643126557587392879 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.851 UTC [gossip.pull] HandleMessage -> DEBU 3e27 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6643126557587392879 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:17.851 UTC [gossip.gossip] handleMessage -> DEBU 3e28 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:18.251 UTC [endorser] ProcessProposal -> DEBU 3e29 Entering: request from 172.18.0.8:57486" +peer0.org1.example.com | "2019-05-02 09:28:18.252 UTC [protoutils] ValidateProposalMessage -> DEBU 3e2a ValidateProposalMessage starts for signed proposal 0xc00305e5f0" +peer0.org1.example.com | "2019-05-02 09:28:18.252 UTC [protoutils] validateChannelHeader -> DEBU 3e2b validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:28:18.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e2c begin" +peer0.org1.example.com | "2019-05-02 09:28:18.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e2d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:28:18.254 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e2e creator is valid" +peer0.org1.example.com | "2019-05-02 09:28:18.254 UTC [msp.identity] Verify -> DEBU 3e2f Verify: digest = 00000000 eb 9e cf df f1 ea 39 fa fd f0 34 6f 1b f0 61 ae |......9...4o..a.| +peer0.org1.example.com | 00000010 a9 eb 49 59 06 27 37 0a 65 2a c1 73 c8 95 cc 62 |..IY.'7.e*.s...b|" +peer0.org1.example.com | "2019-05-02 09:28:18.255 UTC [msp.identity] Verify -> DEBU 3e30 Verify: sig = 00000000 30 45 02 21 00 e7 4c 61 a9 0f ed 1b e2 c0 5d 30 |0E.!..La......]0| +peer0.org1.example.com | 00000010 b4 6b 94 5d 20 d7 e5 c7 5e 0c d9 33 de 72 b2 b7 |.k.] ...^..3.r..| +peer0.org1.example.com | 00000020 03 b2 60 27 da 02 20 53 a2 f2 ea 56 b8 03 9d 97 |..`'.. S...V....| +peer0.org1.example.com | 00000030 19 1d 31 a9 ef 8e f9 f2 ce c5 41 7f e4 d2 ca a8 |..1.......A.....| +peer0.org1.example.com | 00000040 e3 c1 76 f7 71 37 3f |..v.q7?|" +peer0.org1.example.com | "2019-05-02 09:28:18.255 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e31 exits successfully" +peer0.org1.example.com | "2019-05-02 09:28:18.256 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3e32 validateChaincodeProposalMessage starts for proposal 0xc002643e30, header 0xc00305ea00" +peer0.org1.example.com | "2019-05-02 09:28:18.256 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3e33 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:28:18.257 UTC [endorser] preProcess -> DEBU 3e34 [][6092491a] processing txid: 6092491a779b4758505b08c78c6187f7e99639ee0f42a5786dfc6d5a1f1a82d8" +peer0.org1.example.com | "2019-05-02 09:28:18.257 UTC [endorser] SimulateProposal -> DEBU 3e35 [][6092491a] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:28:18.257 UTC [endorser] callChaincode -> INFO 3e36 [][6092491a] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-05-02 09:28:18.258 UTC [chaincode] Execute -> DEBU 3e37 Entry" +peer0.org1.example.com | "2019-05-02 09:28:18.259 UTC [cscc] Invoke -> DEBU 3e38 Invoke function: GetChannels" +peer0.org1.example.com | "2019-05-02 09:28:18.260 UTC [msp.identity] Verify -> DEBU 3e39 Verify: digest = 00000000 eb 9e cf df f1 ea 39 fa fd f0 34 6f 1b f0 61 ae |......9...4o..a.| +peer0.org1.example.com | 00000010 a9 eb 49 59 06 27 37 0a 65 2a c1 73 c8 95 cc 62 |..IY.'7.e*.s...b|" +peer0.org1.example.com | "2019-05-02 09:28:18.261 UTC [msp.identity] Verify -> DEBU 3e3a Verify: sig = 00000000 30 45 02 21 00 e7 4c 61 a9 0f ed 1b e2 c0 5d 30 |0E.!..La......]0| +peer0.org1.example.com | 00000010 b4 6b 94 5d 20 d7 e5 c7 5e 0c d9 33 de 72 b2 b7 |.k.] ...^..3.r..| +peer0.org1.example.com | 00000020 03 b2 60 27 da 02 20 53 a2 f2 ea 56 b8 03 9d 97 |..`'.. S...V....| +peer0.org1.example.com | 00000030 19 1d 31 a9 ef 8e f9 f2 ce c5 41 7f e4 d2 ca a8 |..1.......A.....| +peer0.org1.example.com | 00000040 e3 c1 76 f7 71 37 3f |..v.q7?|" +peer0.org1.example.com | "2019-05-02 09:28:18.262 UTC [chaincode] handleMessage -> DEBU 3e3b [6092491a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:28:18.263 UTC [chaincode] Notify -> DEBU 3e3c [6092491a] notifying Txid:6092491a779b4758505b08c78c6187f7e99639ee0f42a5786dfc6d5a1f1a82d8, channelID:" +peer0.org1.example.com | "2019-05-02 09:28:18.263 UTC [chaincode] Execute -> DEBU 3e3d Exit" +peer0.org1.example.com | "2019-05-02 09:28:18.264 UTC [endorser] callChaincode -> INFO 3e3e [][6092491a] Exit chaincode: name:"cscc" (6ms)" +peer0.org1.example.com | "2019-05-02 09:28:18.264 UTC [endorser] SimulateProposal -> DEBU 3e3f [][6092491a] Exit" +peer0.org1.example.com | "2019-05-02 09:28:18.264 UTC [endorser] func1 -> DEBU 3e40 Exit: request from 172.18.0.8:57486" +peer0.org1.example.com | "2019-05-02 09:28:18.266 UTC [comm.grpc.server] 1 -> INFO 3e41 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57486 grpc.code=OK grpc.call_duration=15.8301ms +peer0.org1.example.com | "2019-05-02 09:28:18.270 UTC [grpc] warningf -> DEBU 3e42 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.8:57486: read: connection reset by peer" +peer0.org1.example.com | "2019-05-02 09:28:18.270 UTC [grpc] infof -> DEBU 3e43 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:28:18.801 UTC [gossip.comm] func1 -> DEBU 3e44 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [gossip.gossip] handleMessage -> DEBU 3e45 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [gossip.gossip] handleMessage -> DEBU 3e46 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e48 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [msp] DeserializeIdentity -> DEBU 3e49 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e4b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e4c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:18.802 UTC [policies] Evaluate -> DEBU 3e4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [policies] Evaluate -> DEBU 3e4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [policies] Evaluate -> DEBU 3e4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func1 -> DEBU 3e50 0xc002730e00 gate 1556789298803173000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e51 0xc002730e00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e52 0xc002730e00 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e53 0xc002730e00 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [msp.identity] Verify -> DEBU 3e54 Verify: digest = 00000000 97 7a 0d 86 07 b9 17 2e 1f 9b 1f 27 34 3c 69 8f |.z.........'4 DEBU 3e55 Verify: sig = 00000000 30 44 02 20 5d 7d 2a fa ac dd 0a bb 81 48 9c dc |0D. ]}*......H..| +peer0.org1.example.com | 00000010 cc 4c 86 14 42 37 07 06 e5 45 62 e4 10 58 44 23 |.L..B7...Eb..XD#| +peer0.org1.example.com | 00000020 91 25 8c 4f 02 20 60 56 59 8a 33 4d 42 a3 9e d9 |.%.O. `VY.3MB...| +peer0.org1.example.com | 00000030 68 dd 77 3a f0 f9 20 81 39 f0 7e bd 49 e2 50 18 |h.w:.. .9.~.I.P.| +peer0.org1.example.com | 00000040 67 fc be 09 53 90 |g...S.|" +peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e56 0xc002730e00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [cauthdsl] func1 -> DEBU 3e57 0xc002730e00 gate 1556789298803173000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:18.803 UTC [policies] Evaluate -> DEBU 3e58 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [policies] Evaluate -> DEBU 3e59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [policies] Evaluate -> DEBU 3e5a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [policies] Evaluate -> DEBU 3e5b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e5c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 " +peer0.org1.example.com | "2019-05-02 09:28:18.804 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 " +peer0.org1.example.com | "2019-05-02 09:28:18.805 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e60 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:18.805 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e61 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:18.805 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e62 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:18.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e63 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e64 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e65 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e66 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e67 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e68 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [msp] DeserializeIdentity -> DEBU 3e69 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [msp] DeserializeIdentity -> DEBU 3e6a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [gossip.comm] Send -> DEBU 3e6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [msp] DeserializeIdentity -> DEBU 3e6c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [gossip.comm] Send -> DEBU 3e6d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:18.807 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:18.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3e70 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3e71 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:18.842 UTC [gossip.comm] func1 -> DEBU 3e72 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.842 UTC [gossip.gossip] handleMessage -> DEBU 3e73 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.842 UTC [gossip.gossip] handleMessage -> DEBU 3e74 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:18.879 UTC [gossip.comm] func1 -> DEBU 3e75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e76 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.879 UTC [gossip.gossip] handleMessage -> DEBU 3e77 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e78 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:18.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e79 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:18.882 UTC [gossip.gossip] handleMessage -> DEBU 3e7a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:18.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e7b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.035 UTC [msp.identity] Sign -> DEBU 3e7c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102E " +peer0.org1.example.com | "2019-05-02 09:28:19.035 UTC [msp.identity] Sign -> DEBU 3e7d Sign: digest: F153887618E2AD95BAF15F5BF692723AC67F3474ED1DB640E00C678916A5E4A7 " +peer0.org1.example.com | "2019-05-02 09:28:19.037 UTC [msp.identity] Sign -> DEBU 3e7e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:19.037 UTC [msp.identity] Sign -> DEBU 3e7f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:19.037 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3e80 Sleeping 5s" +peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e81 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e82 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e83 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [gossip.comm] Send -> DEBU 3e84 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e85 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.038 UTC [gossip.comm] Send -> DEBU 3e86 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:19.041 UTC [gossip.comm] Send -> DEBU 3e87 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:19.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3e88 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e89 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.071 UTC [gossip.comm] func1 -> DEBU 3e8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.071 UTC [gossip.gossip] handleMessage -> DEBU 3e8f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.071 UTC [gossip.gossip] handleMessage -> DEBU 3e90 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.072 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e91 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.072 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e92 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:19.072 UTC [msp.identity] Verify -> DEBU 3e93 Verify: digest = 00000000 2a 5d 7a af 95 62 13 10 82 f3 f0 d2 58 8f 7f 06 |*]z..b......X...| +peer0.org1.example.com | 00000010 1c 71 1c cb 56 4b 76 b7 98 5e fa 36 0d 3e 6e 57 |.q..VKv..^.6.>nW|" +peer0.org1.example.com | "2019-05-02 09:28:19.072 UTC [msp.identity] Verify -> DEBU 3e94 Verify: sig = 00000000 30 45 02 21 00 f3 b3 a2 ee 9e 9e 39 c4 35 68 59 |0E.!.......9.5hY| +peer0.org1.example.com | 00000010 8d 0e 5c c4 f9 92 d8 54 bb 14 50 4c 45 3a d7 8a |..\....T..PLE:..| +peer0.org1.example.com | 00000020 03 a5 48 a9 0d 02 20 61 1f 8c 5d c5 ba a1 f2 19 |..H... a..].....| +peer0.org1.example.com | 00000030 fb 46 d5 89 e7 6c b4 28 3b be 27 57 8b 77 32 c8 |.F...l.(;.'W.w2.| +peer0.org1.example.com | 00000040 e3 c8 9c c6 e5 6d d2 |.....m.|" +peer0.org1.example.com | "2019-05-02 09:28:19.073 UTC [msp.identity] Verify -> DEBU 3e95 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:28:19.073 UTC [msp.identity] Verify -> DEBU 3e96 Verify: sig = 00000000 30 45 02 21 00 cc 7e 7b 1c b4 a2 32 09 73 fb ef |0E.!..~{...2.s..| +peer0.org1.example.com | 00000010 d6 65 9b ef 54 56 3b 50 b4 5b b7 88 93 46 2a ea |.e..TV;P.[...F*.| +peer0.org1.example.com | 00000020 a9 c9 ef 75 b6 02 20 59 f2 eb c1 77 76 2a 6d 64 |...u.. Y...wv*md| +peer0.org1.example.com | 00000030 54 18 90 2c aa df 1c 4c 1d 73 4f d8 fb d3 d3 71 |T..,...L.sO....q| +peer0.org1.example.com | 00000040 e5 b4 d6 db ea ac 9e |.......|" +peer0.org1.example.com | "2019-05-02 09:28:19.073 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e97 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.073 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e98 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:19.073 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e99 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 " +peer0.org1.example.com | "2019-05-02 09:28:19.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 " +peer0.org1.example.com | "2019-05-02 09:28:19.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:19.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.074 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e9d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.074 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e9e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.080 UTC [gossip.comm] func1 -> DEBU 3e9f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.080 UTC [gossip.gossip] handleMessage -> DEBU 3ea0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [gossip.gossip] handleMessage -> DEBU 3ea1 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea4 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [gossip.comm] Send -> DEBU 3ea5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [gossip.comm] Send -> DEBU 3ea7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3eaa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3eab Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.081 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.083 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ead Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:19.084 UTC [msp.identity] Verify -> DEBU 3eae Verify: digest = 00000000 f1 53 88 76 18 e2 ad 95 ba f1 5f 5b f6 92 72 3a |.S.v......_[..r:| +peer0.org1.example.com | 00000010 c6 7f 34 74 ed 1d b6 40 e0 0c 67 89 16 a5 e4 a7 |..4t...@..g.....|" +peer0.org1.example.com | "2019-05-02 09:28:19.084 UTC [msp.identity] Verify -> DEBU 3eaf Verify: sig = 00000000 30 44 02 20 6a b2 f8 a0 c7 ac f2 13 0f 93 6e 70 |0D. j.........np| +peer0.org1.example.com | 00000010 e1 5f 66 c7 88 7a ba 24 c9 4d d0 0e 72 df 12 89 |._f..z.$.M..r...| +peer0.org1.example.com | 00000020 46 77 87 fe 02 20 75 b4 73 1a bc df 53 8e cc c6 |Fw... u.s...S...| +peer0.org1.example.com | 00000030 e5 85 58 0e a9 c2 05 73 bf fd 40 9c ac 86 34 a7 |..X....s..@...4.| +peer0.org1.example.com | 00000040 a8 35 af fb b6 a1 |.5....|" +peer0.org1.example.com | "2019-05-02 09:28:19.088 UTC [gossip.comm] func1 -> DEBU 3eb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.088 UTC [gossip.gossip] handleMessage -> DEBU 3eb1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.089 UTC [gossip.discovery] isSentByMe -> DEBU 3eb2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb3 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.090 UTC [gossip.gossip] handleMessage -> DEBU 3eb4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.090 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.090 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.105 UTC [gossip.comm] func1 -> DEBU 3eb7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.106 UTC [gossip.gossip] handleMessage -> DEBU 3eb8 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eba Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.106 UTC [gossip.gossip] handleMessage -> DEBU 3ebb Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.149 UTC [gossip.comm] func1 -> DEBU 3ebc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.149 UTC [gossip.gossip] handleMessage -> DEBU 3ebd Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.149 UTC [gossip.gossip] handleMessage -> DEBU 3ebe Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ebf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.152 UTC [gossip.comm] func1 -> DEBU 3ec0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.152 UTC [gossip.gossip] handleMessage -> DEBU 3ec1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ec2 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:19.157 UTC [msp] DeserializeIdentity -> DEBU 3ec3 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.157 UTC [gossip.comm] func1 -> DEBU 3ec4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ec5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ec6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ec7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [policies] Evaluate -> DEBU 3ec8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [policies] Evaluate -> DEBU 3ec9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [policies] Evaluate -> DEBU 3eca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [cauthdsl] func1 -> DEBU 3ecb 0xc003a60850 gate 1556789299159529300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [cauthdsl] func2 -> DEBU 3ecc 0xc003a60850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [cauthdsl] func2 -> DEBU 3ecd 0xc003a60850 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [cauthdsl] func2 -> DEBU 3ece 0xc003a60850 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [msp.identity] Verify -> DEBU 3ecf Verify: digest = 00000000 c2 1c 0f 8d 4d a4 35 c6 43 ca 3b 2a bf 8e 8c 21 |....M.5.C.;*...!| +peer0.org1.example.com | 00000010 7e ae 71 d4 16 1d 50 0a 14 59 da 9b 92 7b 2e 91 |~.q...P..Y...{..|" +peer0.org1.example.com | "2019-05-02 09:28:19.159 UTC [msp.identity] Verify -> DEBU 3ed0 Verify: sig = 00000000 30 44 02 21 00 8c 0c ef 6e 8f b1 23 3f 6f 0e 99 |0D.!....n..#?o..| +peer0.org1.example.com | 00000010 47 c3 ef b0 eb 51 27 ec e2 ba de 49 83 9f 80 de |G....Q'....I....| +peer0.org1.example.com | 00000020 67 97 2e 00 89 02 1f 52 5b 4b db ca ec 2b 3e a2 |g......R[K...+>.| +peer0.org1.example.com | 00000030 e1 ab e0 3a 52 b0 76 2a 1e 2c df 5c 89 ab 7c 28 |...:R.v*.,.\..|(| +peer0.org1.example.com | 00000040 03 83 b5 47 6c d2 |...Gl.|" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [cauthdsl] func2 -> DEBU 3ed1 0xc003a60850 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [cauthdsl] func1 -> DEBU 3ed2 0xc003a60850 gate 1556789299159529300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed9 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 " +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3eda Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 " +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3edb Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3edc Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 3edd Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ede Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.161 UTC [gossip.gossip] handleMessage -> DEBU 3edf Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.161 UTC [gossip.gossip] handleMessage -> DEBU 3ee0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.161 UTC [gossip.gossip] handleMessage -> DEBU 3ee3 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.167 UTC [msp] DeserializeIdentity -> DEBU 3ee6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.167 UTC [msp] DeserializeIdentity -> DEBU 3ee7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.167 UTC [msp] DeserializeIdentity -> DEBU 3ee8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.168 UTC [msp] DeserializeIdentity -> DEBU 3ee9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.168 UTC [msp] DeserializeIdentity -> DEBU 3eea Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.170 UTC [msp] DeserializeIdentity -> DEBU 3eeb Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.171 UTC [gossip.comm] Send -> DEBU 3eec Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:19.171 UTC [msp] DeserializeIdentity -> DEBU 3eed Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.171 UTC [msp] DeserializeIdentity -> DEBU 3eee Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.171 UTC [gossip.comm] Send -> DEBU 3eef Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:19.177 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.172 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:19.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef3 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:19.464 UTC [endorser] ProcessProposal -> DEBU 3ef4 Entering: request from 172.18.0.8:57494" +peer0.org1.example.com | "2019-05-02 09:28:19.465 UTC [protoutils] ValidateProposalMessage -> DEBU 3ef5 ValidateProposalMessage starts for signed proposal 0xc003cc9a90" +peer0.org1.example.com | "2019-05-02 09:28:19.466 UTC [protoutils] validateChannelHeader -> DEBU 3ef6 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-05-02 09:28:19.466 UTC [protoutils] checkSignatureFromCreator -> DEBU 3ef7 begin" +peer0.org1.example.com | "2019-05-02 09:28:19.467 UTC [protoutils] checkSignatureFromCreator -> DEBU 3ef8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-05-02 09:28:19.467 UTC [protoutils] checkSignatureFromCreator -> DEBU 3ef9 creator is valid" +peer0.org1.example.com | "2019-05-02 09:28:19.467 UTC [msp.identity] Verify -> DEBU 3efa Verify: digest = 00000000 a1 68 bc 87 72 fa 5d 06 e0 ef eb 6e fe bc 2a 08 |.h..r.]....n..*.| +peer0.org1.example.com | 00000010 fe a6 2d c6 d5 bb 2d 70 c0 46 7f 4f c3 44 23 97 |..-...-p.F.O.D#.|" +peer0.org1.example.com | "2019-05-02 09:28:19.468 UTC [msp.identity] Verify -> DEBU 3efb Verify: sig = 00000000 30 44 02 20 61 bc a2 db c9 41 1d 46 80 68 1f 4d |0D. a....A.F.h.M| +peer0.org1.example.com | 00000010 cb 89 29 7e 47 c8 17 41 38 47 ca a0 6f b7 4c a5 |..)~G..A8G..o.L.| +peer0.org1.example.com | 00000020 a6 53 af 09 02 20 1a 98 c3 f7 a7 62 b9 98 d9 49 |.S... .....b...I| +peer0.org1.example.com | 00000030 d9 3c 56 38 95 6f f8 f1 bf 4e 99 ef aa ad a8 9b |. DEBU 3efc exits successfully" +peer0.org1.example.com | "2019-05-02 09:28:19.469 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3efd validateChaincodeProposalMessage starts for proposal 0xc0024b6150, header 0xc003cc9ea0" +peer0.org1.example.com | "2019-05-02 09:28:19.470 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3efe validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:28:19.470 UTC [endorser] preProcess -> DEBU 3eff [][9995e49a] processing txid: 9995e49aff838e8113f46d3da64294278625ae0f28f3107ace201c8bd57d1b63" +peer0.org1.example.com | "2019-05-02 09:28:19.471 UTC [endorser] SimulateProposal -> DEBU 3f00 [][9995e49a] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:28:19.471 UTC [endorser] callChaincode -> INFO 3f01 [][9995e49a] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-05-02 09:28:19.472 UTC [chaincode] Execute -> DEBU 3f02 Entry" +peer0.org1.example.com | "2019-05-02 09:28:19.473 UTC [qscc] Invoke -> DEBU 3f03 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-05-02 09:28:19.473 UTC [aclmgmt] CheckACL -> DEBU 3f04 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-05-02 09:28:19.473 UTC [aclmgmt] CheckACL -> DEBU 3f05 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-05-02 09:28:19.474 UTC [policies] Evaluate -> DEBU 3f06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:19.474 UTC [policies] Evaluate -> DEBU 3f07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:19.475 UTC [policies] Evaluate -> DEBU 3f08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:19.475 UTC [msp] DeserializeIdentity -> DEBU 3f09 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:19.476 UTC [msp.identity] newIdentity -> DEBU 3f0a Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-05-02 09:28:19.478 UTC [cauthdsl] func1 -> DEBU 3f0b 0xc0040ae7f0 gate 1556789299478061900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:19.478 UTC [cauthdsl] func2 -> DEBU 3f0c 0xc0040ae7f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:19.478 UTC [cauthdsl] func2 -> DEBU 3f0d 0xc0040ae7f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:19.479 UTC [cauthdsl] func2 -> DEBU 3f0e 0xc0040ae7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-05-02 09:28:19.480 UTC [cauthdsl] func2 -> DEBU 3f0f 0xc0040ae7f0 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:19.480 UTC [cauthdsl] func1 -> DEBU 3f10 0xc0040ae7f0 gate 1556789299478061900 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:19.480 UTC [policies] Evaluate -> DEBU 3f11 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.481 UTC [policies] Evaluate -> DEBU 3f12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.481 UTC [policies] Evaluate -> DEBU 3f13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:19.482 UTC [cauthdsl] func1 -> DEBU 3f14 0xc0040af970 gate 1556789299481981100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:19.482 UTC [cauthdsl] func2 -> DEBU 3f15 0xc0040af970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:19.482 UTC [cauthdsl] func2 -> DEBU 3f16 0xc0040af970 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:19.483 UTC [cauthdsl] func2 -> DEBU 3f17 0xc0040af970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +peer0.org1.example.com | "2019-05-02 09:28:19.483 UTC [cauthdsl] func2 -> DEBU 3f18 0xc0040af970 principal evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:19.483 UTC [cauthdsl] func1 -> DEBU 3f19 0xc0040af970 gate 1556789299481981100 evaluation fails" +peer0.org1.example.com | "2019-05-02 09:28:19.484 UTC [policies] Evaluate -> DEBU 3f1a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.484 UTC [policies] Evaluate -> DEBU 3f1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.484 UTC [policies] Evaluate -> DEBU 3f1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:19.485 UTC [cauthdsl] func1 -> DEBU 3f1d 0xc0040c21d0 gate 1556789299485203300 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:19.485 UTC [cauthdsl] func2 -> DEBU 3f1e 0xc0040c21d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:19.485 UTC [cauthdsl] func2 -> DEBU 3f1f 0xc0040c21d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:19.486 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3f20 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-05-02 09:28:19.487 UTC [msp] Validate -> DEBU 3f21 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-05-02 09:28:19.488 UTC [msp] getCertificationChain -> DEBU 3f22 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-05-02 09:28:19.488 UTC [cauthdsl] func2 -> DEBU 3f23 0xc0040c21d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:19.489 UTC [msp.identity] Verify -> DEBU 3f24 Verify: digest = 00000000 a1 68 bc 87 72 fa 5d 06 e0 ef eb 6e fe bc 2a 08 |.h..r.]....n..*.| +peer0.org1.example.com | 00000010 fe a6 2d c6 d5 bb 2d 70 c0 46 7f 4f c3 44 23 97 |..-...-p.F.O.D#.|" +peer0.org1.example.com | "2019-05-02 09:28:19.489 UTC [msp.identity] Verify -> DEBU 3f25 Verify: sig = 00000000 30 44 02 20 61 bc a2 db c9 41 1d 46 80 68 1f 4d |0D. a....A.F.h.M| +peer0.org1.example.com | 00000010 cb 89 29 7e 47 c8 17 41 38 47 ca a0 6f b7 4c a5 |..)~G..A8G..o.L.| +peer0.org1.example.com | 00000020 a6 53 af 09 02 20 1a 98 c3 f7 a7 62 b9 98 d9 49 |.S... .....b...I| +peer0.org1.example.com | 00000030 d9 3c 56 38 95 6f f8 f1 bf 4e 99 ef aa ad a8 9b |. DEBU 3f26 0xc0040c21d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [cauthdsl] func1 -> DEBU 3f27 0xc0040c21d0 gate 1556789299485203300 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f28 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f2a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [chaincode] handleMessage -> DEBU 3f2c [9995e49a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [chaincode] Notify -> DEBU 3f2d [9995e49a] notifying Txid:9995e49aff838e8113f46d3da64294278625ae0f28f3107ace201c8bd57d1b63, channelID:" +peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [chaincode] Execute -> DEBU 3f2e Exit" +peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [endorser] callChaincode -> INFO 3f2f [][9995e49a] Exit chaincode: name:"qscc" (19ms)" +peer0.org1.example.com | "2019-05-02 09:28:19.490 UTC [endorser] SimulateProposal -> DEBU 3f30 [][9995e49a] Exit" +peer0.org1.example.com | "2019-05-02 09:28:19.491 UTC [endorser] func1 -> DEBU 3f31 Exit: request from 172.18.0.8:57494" +peer0.org1.example.com | "2019-05-02 09:28:19.491 UTC [comm.grpc.server] 1 -> INFO 3f32 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57494 grpc.code=OK grpc.call_duration=26.9711ms +peer0.org1.example.com | "2019-05-02 09:28:19.495 UTC [grpc] infof -> DEBU 3f33 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [msp] DeserializeIdentity -> DEBU 3f34 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [msp] DeserializeIdentity -> DEBU 3f35 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] Send -> DEBU 3f36 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] sendToEndpoint -> DEBU 3f37 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] sendToEndpoint -> DEBU 3f38 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] sendToEndpoint -> DEBU 3f39 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] sendToEndpoint -> DEBU 3f3a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:20.212 UTC [gossip.comm] sendToEndpoint -> DEBU 3f3b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.213 UTC [gossip.comm] sendToEndpoint -> DEBU 3f3c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:20.215 UTC [gossip.comm] func1 -> DEBU 3f3d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.215 UTC [gossip.gossip] handleMessage -> DEBU 3f3e Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [msp] DeserializeIdentity -> DEBU 3f3f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [msp] DeserializeIdentity -> DEBU 3f40 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [msp] DeserializeIdentity -> DEBU 3f41 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f42 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f43 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f44 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [policies] Evaluate -> DEBU 3f45 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [policies] Evaluate -> DEBU 3f46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [policies] Evaluate -> DEBU 3f47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [cauthdsl] func1 -> DEBU 3f48 0xc003a59e70 gate 1556789300216616900 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [cauthdsl] func2 -> DEBU 3f49 0xc003a59e70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [cauthdsl] func2 -> DEBU 3f4a 0xc003a59e70 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [cauthdsl] func2 -> DEBU 3f4b 0xc003a59e70 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [msp.identity] Verify -> DEBU 3f4c Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [msp.identity] Verify -> DEBU 3f4d Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:20.216 UTC [cauthdsl] func2 -> DEBU 3f4e 0xc003a59e70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [cauthdsl] func1 -> DEBU 3f4f 0xc003a59e70 gate 1556789300216616900 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f50 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f52 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [msp.identity] Verify -> DEBU 3f54 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [msp.identity] Verify -> DEBU 3f55 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [msp] DeserializeIdentity -> DEBU 3f56 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [msp] DeserializeIdentity -> DEBU 3f57 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f58 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f59 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f5a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f5c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:20.217 UTC [policies] Evaluate -> DEBU 3f5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [cauthdsl] func1 -> DEBU 3f5e 0xc003b3bd60 gate 1556789300217987200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [cauthdsl] func2 -> DEBU 3f5f 0xc003b3bd60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [cauthdsl] func2 -> DEBU 3f60 0xc003b3bd60 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [cauthdsl] func2 -> DEBU 3f61 0xc003b3bd60 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [msp.identity] Verify -> DEBU 3f62 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:20.218 UTC [msp.identity] Verify -> DEBU 3f63 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [cauthdsl] func2 -> DEBU 3f64 0xc003b3bd60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [cauthdsl] func1 -> DEBU 3f65 0xc003b3bd60 gate 1556789300217987200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [policies] Evaluate -> DEBU 3f66 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [policies] Evaluate -> DEBU 3f67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [policies] Evaluate -> DEBU 3f68 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.219 UTC [policies] Evaluate -> DEBU 3f69 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.224 UTC [gossip.comm] func1 -> DEBU 3f6a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.224 UTC [gossip.comm] func1 -> DEBU 3f6b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.225 UTC [msp.identity] Verify -> DEBU 3f6c Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:20.225 UTC [msp.identity] Verify -> DEBU 3f6d Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [gossip.gossip] handleMessage -> DEBU 3f6e Exiting" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [gossip.gossip] handleMessage -> DEBU 3f6f Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [msp] DeserializeIdentity -> DEBU 3f70 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [msp] DeserializeIdentity -> DEBU 3f71 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [msp] DeserializeIdentity -> DEBU 3f72 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f73 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f74 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f75 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [policies] Evaluate -> DEBU 3f76 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [policies] Evaluate -> DEBU 3f77 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [policies] Evaluate -> DEBU 3f78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [cauthdsl] func1 -> DEBU 3f79 0xc003b51f90 gate 1556789300226857400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [cauthdsl] func2 -> DEBU 3f7a 0xc003b51f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [cauthdsl] func2 -> DEBU 3f7b 0xc003b51f90 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:20.226 UTC [cauthdsl] func2 -> DEBU 3f7c 0xc003b51f90 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [msp.identity] Verify -> DEBU 3f7d Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [msp.identity] Verify -> DEBU 3f7e Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [cauthdsl] func2 -> DEBU 3f7f 0xc003b51f90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [cauthdsl] func1 -> DEBU 3f80 0xc003b51f90 gate 1556789300226857400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [policies] Evaluate -> DEBU 3f81 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [policies] Evaluate -> DEBU 3f82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [policies] Evaluate -> DEBU 3f83 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [policies] Evaluate -> DEBU 3f84 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [msp.identity] Verify -> DEBU 3f85 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [msp.identity] Verify -> DEBU 3f86 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:20.227 UTC [msp] DeserializeIdentity -> DEBU 3f87 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [msp] DeserializeIdentity -> DEBU 3f88 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f89 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f8a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f8b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f8c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f8d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func1 -> DEBU 3f8f 0xc003e9de80 gate 1556789300228395200 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func2 -> DEBU 3f90 0xc003e9de80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func2 -> DEBU 3f91 0xc003e9de80 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func2 -> DEBU 3f92 0xc003e9de80 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [msp.identity] Verify -> DEBU 3f93 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [msp.identity] Verify -> DEBU 3f94 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func2 -> DEBU 3f95 0xc003e9de80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [cauthdsl] func1 -> DEBU 3f96 0xc003e9de80 gate 1556789300228395200 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f97 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f99 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.228 UTC [policies] Evaluate -> DEBU 3f9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [msp.identity] Verify -> DEBU 3f9b Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [msp.identity] Verify -> DEBU 3f9c Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [gossip.gossip] handleMessage -> DEBU 3f9d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [gossip.gossip] handleMessage -> DEBU 3f9e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [msp.identity] Verify -> DEBU 3f9f Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +peer0.org1.example.com | 00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [msp.identity] Verify -> DEBU 3fa0 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +peer0.org1.example.com | 00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +peer0.org1.example.com | 00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +peer0.org1.example.com | 00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +peer0.org1.example.com | 00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +peer0.org1.example.com | "2019-05-02 09:28:20.229 UTC [msp] DeserializeIdentity -> DEBU 3fa1 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.230 UTC [msp] DeserializeIdentity -> DEBU 3fa2 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fa3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fa4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fa5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [policies] Evaluate -> DEBU 3fa6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [policies] Evaluate -> DEBU 3fa7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [policies] Evaluate -> DEBU 3fa8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.232 UTC [cauthdsl] func1 -> DEBU 3fa9 0xc003c5a6d0 gate 1556789300232976000 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [cauthdsl] func2 -> DEBU 3faa 0xc003c5a6d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [cauthdsl] func2 -> DEBU 3fab 0xc003c5a6d0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [cauthdsl] func2 -> DEBU 3fac 0xc003c5a6d0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [msp.identity] Verify -> DEBU 3fad Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +peer0.org1.example.com | 00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [msp.identity] Verify -> DEBU 3fae Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +peer0.org1.example.com | 00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +peer0.org1.example.com | 00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +peer0.org1.example.com | 00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +peer0.org1.example.com | 00000040 aa b5 50 07 8c 16 c0 |..P....|" +peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [cauthdsl] func2 -> DEBU 3faf 0xc003c5a6d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [cauthdsl] func1 -> DEBU 3fb0 0xc003c5a6d0 gate 1556789300232976000 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [policies] Evaluate -> DEBU 3fb1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [policies] Evaluate -> DEBU 3fb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.233 UTC [policies] Evaluate -> DEBU 3fb3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.234 UTC [policies] Evaluate -> DEBU 3fb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.234 UTC [msp.identity] Verify -> DEBU 3fb5 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +peer0.org1.example.com | 00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +peer0.org1.example.com | "2019-05-02 09:28:20.234 UTC [msp.identity] Verify -> DEBU 3fb6 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +peer0.org1.example.com | 00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +peer0.org1.example.com | 00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +peer0.org1.example.com | 00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +peer0.org1.example.com | 00000040 b0 a3 de d0 53 b0 |....S.|" +peer0.org1.example.com | "2019-05-02 09:28:20.235 UTC [msp] DeserializeIdentity -> DEBU 3fb7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.236 UTC [msp] DeserializeIdentity -> DEBU 3fb8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.236 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fb9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:20.236 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fba Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.236 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fbb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:20.236 UTC [policies] Evaluate -> DEBU 3fbc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [policies] Evaluate -> DEBU 3fbd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [policies] Evaluate -> DEBU 3fbe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [cauthdsl] func1 -> DEBU 3fbf 0xc003c6e5c0 gate 1556789300237571500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [cauthdsl] func2 -> DEBU 3fc0 0xc003c6e5c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [cauthdsl] func2 -> DEBU 3fc1 0xc003c6e5c0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:20.237 UTC [cauthdsl] func2 -> DEBU 3fc2 0xc003c6e5c0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [msp.identity] Verify -> DEBU 3fc3 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +peer0.org1.example.com | 00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [msp.identity] Verify -> DEBU 3fc4 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +peer0.org1.example.com | 00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +peer0.org1.example.com | 00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +peer0.org1.example.com | 00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +peer0.org1.example.com | 00000040 37 dc 37 96 5f ce 7f |7.7._..|" +peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [cauthdsl] func2 -> DEBU 3fc5 0xc003c6e5c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [cauthdsl] func1 -> DEBU 3fc6 0xc003c6e5c0 gate 1556789300237571500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [policies] Evaluate -> DEBU 3fc7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [policies] Evaluate -> DEBU 3fc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.238 UTC [policies] Evaluate -> DEBU 3fc9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.239 UTC [policies] Evaluate -> DEBU 3fca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:20.239 UTC [gossip.gossip] handleMessage -> DEBU 3fcb Exiting" +peer0.org1.example.com | "2019-05-02 09:28:20.475 UTC [gossip.comm] func1 -> DEBU 3fcc Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.475 UTC [gossip.gossip] handleMessage -> DEBU 3fcd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.475 UTC [msp] DeserializeIdentity -> DEBU 3fce Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.475 UTC [msp] DeserializeIdentity -> DEBU 3fcf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.475 UTC [gossip.gossip] handleMessage -> DEBU 3fd0 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:20.545 UTC [gossip.comm] func1 -> DEBU 3fd1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.545 UTC [gossip.gossip] handleMessage -> DEBU 3fd2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.546 UTC [gossip.pull] HandleMessage -> DEBU 3fd3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.546 UTC [gossip.pull] SendDigest -> DEBU 3fd4 Sending BLOCK_MSG digest: [5 6 7 8 1 2 3 4 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:20.546 UTC [gossip.gossip] handleMessage -> DEBU 3fd5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [gossip.comm] func1 -> DEBU 3fd6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [gossip.gossip] handleMessage -> DEBU 3fd7 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [msp] DeserializeIdentity -> DEBU 3fd8 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [msp] DeserializeIdentity -> DEBU 3fd9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [msp] DeserializeIdentity -> DEBU 3fda Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.716 UTC [gossip.gossip] handleMessage -> DEBU 3fdb Exiting" +peer0.org1.example.com | "2019-05-02 09:28:20.945 UTC [gossip.comm] func1 -> DEBU 3fdc Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.945 UTC [gossip.gossip] handleMessage -> DEBU 3fdd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:20.946 UTC [msp] DeserializeIdentity -> DEBU 3fde Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.946 UTC [msp] DeserializeIdentity -> DEBU 3fdf Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.946 UTC [msp] DeserializeIdentity -> DEBU 3fe0 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:20.946 UTC [gossip.gossip] handleMessage -> DEBU 3fe1 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.597 UTC [gossip.comm] func1 -> DEBU 3fe2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.597 UTC [gossip.gossip] handleMessage -> DEBU 3fe3 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.597 UTC [gossip.gossip] handleMessage -> DEBU 3fe4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fe5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.599 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fe6 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:21.599 UTC [msp] DeserializeIdentity -> DEBU 3fe7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.599 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fe8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:21.600 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fe9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:21.600 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fea Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:21.600 UTC [policies] Evaluate -> DEBU 3feb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:21.600 UTC [policies] Evaluate -> DEBU 3fec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:21.601 UTC [policies] Evaluate -> DEBU 3fed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:21.601 UTC [cauthdsl] func1 -> DEBU 3fee 0xc003b2dec0 gate 1556789301601335400 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:21.601 UTC [cauthdsl] func2 -> DEBU 3fef 0xc003b2dec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:21.601 UTC [cauthdsl] func2 -> DEBU 3ff0 0xc003b2dec0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:21.601 UTC [cauthdsl] func2 -> DEBU 3ff1 0xc003b2dec0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:21.602 UTC [msp.identity] Verify -> DEBU 3ff2 Verify: digest = 00000000 7f d7 1a ca 80 12 ba 3d d1 86 b9 f2 c2 95 11 8c |.......=........| +peer0.org1.example.com | 00000010 ed 11 ec b1 05 dc 29 fa e4 8d 60 ff 6e c8 d8 a1 |......)...`.n...|" +peer0.org1.example.com | "2019-05-02 09:28:21.602 UTC [msp.identity] Verify -> DEBU 3ff3 Verify: sig = 00000000 30 45 02 21 00 ea 44 01 df 40 c6 c7 6e c7 47 e3 |0E.!..D..@..n.G.| +peer0.org1.example.com | 00000010 1c 92 1d d6 ea 8a 5e 95 63 b2 7c 74 97 ae 56 50 |......^.c.|t..VP| +peer0.org1.example.com | 00000020 0d 3a 6d 2c d0 02 20 5d 5b ab a9 4f 64 03 d7 e5 |.:m,.. ][..Od...| +peer0.org1.example.com | 00000030 b5 88 26 0f 98 f0 62 4a 1b 73 39 e1 c1 7b f3 7f |..&...bJ.s9..{..| +peer0.org1.example.com | 00000040 a4 fa 53 87 66 61 9b |..S.fa.|" +peer0.org1.example.com | "2019-05-02 09:28:21.603 UTC [cauthdsl] func2 -> DEBU 3ff4 0xc003b2dec0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:21.603 UTC [cauthdsl] func1 -> DEBU 3ff5 0xc003b2dec0 gate 1556789301601335400 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:21.603 UTC [policies] Evaluate -> DEBU 3ff6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.603 UTC [policies] Evaluate -> DEBU 3ff7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.604 UTC [policies] Evaluate -> DEBU 3ff8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.604 UTC [policies] Evaluate -> DEBU 3ff9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.604 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ffa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffb Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:21.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffc updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 " +peer0.org1.example.com | "2019-05-02 09:28:21.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffd Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 " +peer0.org1.example.com | "2019-05-02 09:28:21.606 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffe Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:21.606 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fff Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.606 UTC [gossip.discovery] handleAliveMessage -> DEBU 4000 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.607 UTC [gossip.discovery] sendMemResponse -> DEBU 4001 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:21.607 UTC [msp] DeserializeIdentity -> DEBU 4002 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.608 UTC [msp] DeserializeIdentity -> DEBU 4003 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.608 UTC [msp] DeserializeIdentity -> DEBU 4004 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.608 UTC [gossip.comm] Send -> DEBU 4005 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:21.608 UTC [gossip.discovery] sendMemResponse -> DEBU 4006 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:21.609 UTC [gossip.comm] sendToEndpoint -> DEBU 4007 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.609 UTC [gossip.comm] sendToEndpoint -> DEBU 4008 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.607 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4009 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.613 UTC [gossip.comm] func1 -> DEBU 400a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.613 UTC [gossip.gossip] handleMessage -> DEBU 400b Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.614 UTC [gossip.pull] HandleMessage -> DEBU 400c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.614 UTC [msp] DeserializeIdentity -> DEBU 400d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.615 UTC [msp] DeserializeIdentity -> DEBU 400e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.615 UTC [msp] DeserializeIdentity -> DEBU 400f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.616 UTC [msp] DeserializeIdentity -> DEBU 4010 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.616 UTC [msp] DeserializeIdentity -> DEBU 4011 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.617 UTC [msp] DeserializeIdentity -> DEBU 4012 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.618 UTC [gossip.pull] SendDigest -> DEBU 4013 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-05-02 09:28:21.618 UTC [gossip.gossip] handleMessage -> DEBU 4014 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.649 UTC [gossip.comm] func1 -> DEBU 4015 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.649 UTC [gossip.gossip] handleMessage -> DEBU 4016 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.649 UTC [gossip.pull] HandleMessage -> DEBU 4017 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.650 UTC [msp] DeserializeIdentity -> DEBU 4018 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.650 UTC [msp] DeserializeIdentity -> DEBU 4019 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.650 UTC [msp] DeserializeIdentity -> DEBU 401a Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.651 UTC [msp] DeserializeIdentity -> DEBU 401b Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.651 UTC [msp] DeserializeIdentity -> DEBU 401c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.651 UTC [msp] DeserializeIdentity -> DEBU 401d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.652 UTC [gossip.pull] SendDigest -> DEBU 401e Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:21.652 UTC [gossip.gossip] handleMessage -> DEBU 401f Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.681 UTC [gossip.comm] func1 -> DEBU 4020 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.682 UTC [gossip.gossip] handleMessage -> DEBU 4021 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.682 UTC [gossip.gossip] handleMessage -> DEBU 4022 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.682 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4023 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.683 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4024 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:21.683 UTC [msp] DeserializeIdentity -> DEBU 4025 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.684 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4026 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:21.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4027 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:21.685 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4028 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:21.685 UTC [policies] Evaluate -> DEBU 4029 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:21.686 UTC [policies] Evaluate -> DEBU 402a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:21.686 UTC [policies] Evaluate -> DEBU 402b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:21.687 UTC [cauthdsl] func1 -> DEBU 402c 0xc003c8ff90 gate 1556789301686951500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:21.687 UTC [cauthdsl] func2 -> DEBU 402d 0xc003c8ff90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:21.687 UTC [cauthdsl] func2 -> DEBU 402e 0xc003c8ff90 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:21.688 UTC [cauthdsl] func2 -> DEBU 402f 0xc003c8ff90 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:21.688 UTC [msp.identity] Verify -> DEBU 4030 Verify: digest = 00000000 c6 4c ed 59 30 cd 8e bc 73 38 8d 55 c3 ee 3e 2b |.L.Y0...s8.U..>+| +peer0.org1.example.com | 00000010 76 58 ee 48 63 e2 5a 88 09 e1 36 90 5e 0c c1 5f |vX.Hc.Z...6.^.._|" +peer0.org1.example.com | "2019-05-02 09:28:21.688 UTC [msp.identity] Verify -> DEBU 4031 Verify: sig = 00000000 30 44 02 20 45 df dd 8b f3 62 ca 8b 79 56 6f 82 |0D. E....b..yVo.| +peer0.org1.example.com | 00000010 2f 2f b3 20 f1 89 2f c2 07 d7 00 af 0e 23 a0 e0 |//. ../......#..| +peer0.org1.example.com | 00000020 81 d7 32 ba 02 20 36 21 a4 5b 2b 61 ad 4d 75 49 |..2.. 6!.[+a.MuI| +peer0.org1.example.com | 00000030 c7 84 53 44 25 be ed 40 f0 68 b9 d0 3c 74 80 b7 |..SD%..@.h.. DEBU 4032 0xc003c8ff90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:21.689 UTC [cauthdsl] func1 -> DEBU 4033 0xc003c8ff90 gate 1556789301686951500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:21.689 UTC [policies] Evaluate -> DEBU 4035 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.689 UTC [policies] Evaluate -> DEBU 4036 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.689 UTC [msp.identity] Sign -> DEBU 4034 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102F " +peer0.org1.example.com | "2019-05-02 09:28:21.690 UTC [msp.identity] Sign -> DEBU 4037 Sign: digest: CA9CC4BC7099F6C11A7CF67D70018177C2CA667CBBF6C2B3F84BAC5789CEEEA9 " +peer0.org1.example.com | "2019-05-02 09:28:21.691 UTC [msp.identity] Sign -> DEBU 4038 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-05-02 09:28:21.691 UTC [msp.identity] Sign -> DEBU 4039 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-05-02 09:28:21.690 UTC [policies] Evaluate -> DEBU 403a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.692 UTC [gossip.comm] Send -> DEBU 403b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:21.692 UTC [msp] DeserializeIdentity -> DEBU 403c Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.693 UTC [gossip.comm] Send -> DEBU 403d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:21.693 UTC [msp] DeserializeIdentity -> DEBU 403e Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.693 UTC [gossip.comm] Send -> DEBU 403f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:21.694 UTC [gossip.comm] sendToEndpoint -> DEBU 4040 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.694 UTC [gossip.comm] sendToEndpoint -> DEBU 4041 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.695 UTC [gossip.comm] sendToEndpoint -> DEBU 4042 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.695 UTC [gossip.comm] sendToEndpoint -> DEBU 4043 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.695 UTC [gossip.comm] sendToEndpoint -> DEBU 4044 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.696 UTC [gossip.comm] sendToEndpoint -> DEBU 4046 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.693 UTC [policies] Evaluate -> DEBU 4045 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.696 UTC [gossip.discovery] handleAliveMessage -> DEBU 4047 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 4048 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:21.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 4049 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 " +peer0.org1.example.com | "2019-05-02 09:28:21.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 404a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 " +peer0.org1.example.com | "2019-05-02 09:28:21.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 404b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:21.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 404c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.701 UTC [gossip.discovery] handleAliveMessage -> DEBU 404d Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.704 UTC [gossip.discovery] sendMemResponse -> DEBU 404e Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-05-02 09:28:21.704 UTC [msp] DeserializeIdentity -> DEBU 404f Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.704 UTC [msp] DeserializeIdentity -> DEBU 4050 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.704 UTC [msp] DeserializeIdentity -> DEBU 4051 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.705 UTC [gossip.comm] Send -> DEBU 4052 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:21.705 UTC [gossip.discovery] sendMemResponse -> DEBU 4054 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:21.705 UTC [gossip.comm] sendToEndpoint -> DEBU 4055 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.706 UTC [gossip.comm] sendToEndpoint -> DEBU 4056 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.705 UTC [gossip.comm] func1 -> DEBU 4057 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.706 UTC [gossip.gossip] handleMessage -> DEBU 4058 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4053 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4059 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.707 UTC [gossip.comm] func1 -> DEBU 405a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.707 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 405b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:21.708 UTC [gossip.gossip] handleMessage -> DEBU 405c Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.708 UTC [gossip.gossip] handleMessage -> DEBU 405e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.707 UTC [msp] DeserializeIdentity -> DEBU 405d Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.709 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 405f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:21.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4060 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:21.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4061 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:21.713 UTC [policies] Evaluate -> DEBU 4062 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:21.713 UTC [policies] Evaluate -> DEBU 4063 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:21.713 UTC [policies] Evaluate -> DEBU 4064 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:21.713 UTC [cauthdsl] func1 -> DEBU 4065 0xc0039779f0 gate 1556789301713908100 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:21.714 UTC [cauthdsl] func2 -> DEBU 4066 0xc0039779f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:21.714 UTC [cauthdsl] func2 -> DEBU 4067 0xc0039779f0 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:21.714 UTC [cauthdsl] func2 -> DEBU 4068 0xc0039779f0 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:21.714 UTC [msp.identity] Verify -> DEBU 4069 Verify: digest = 00000000 7f d7 1a ca 80 12 ba 3d d1 86 b9 f2 c2 95 11 8c |.......=........| +peer0.org1.example.com | 00000010 ed 11 ec b1 05 dc 29 fa e4 8d 60 ff 6e c8 d8 a1 |......)...`.n...|" +peer0.org1.example.com | "2019-05-02 09:28:21.715 UTC [msp.identity] Verify -> DEBU 406a Verify: sig = 00000000 30 45 02 21 00 ea 44 01 df 40 c6 c7 6e c7 47 e3 |0E.!..D..@..n.G.| +peer0.org1.example.com | 00000010 1c 92 1d d6 ea 8a 5e 95 63 b2 7c 74 97 ae 56 50 |......^.c.|t..VP| +peer0.org1.example.com | 00000020 0d 3a 6d 2c d0 02 20 5d 5b ab a9 4f 64 03 d7 e5 |.:m,.. ][..Od...| +peer0.org1.example.com | 00000030 b5 88 26 0f 98 f0 62 4a 1b 73 39 e1 c1 7b f3 7f |..&...bJ.s9..{..| +peer0.org1.example.com | 00000040 a4 fa 53 87 66 61 9b |..S.fa.|" +peer0.org1.example.com | "2019-05-02 09:28:21.716 UTC [cauthdsl] func2 -> DEBU 406b 0xc0039779f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:21.716 UTC [cauthdsl] func1 -> DEBU 406c 0xc0039779f0 gate 1556789301713908100 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:21.716 UTC [policies] Evaluate -> DEBU 406d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.717 UTC [policies] Evaluate -> DEBU 406e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.717 UTC [policies] Evaluate -> DEBU 406f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.717 UTC [policies] Evaluate -> DEBU 4070 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.717 UTC [gossip.discovery] handleAliveMessage -> DEBU 4071 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 4072 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.718 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4073 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:21.718 UTC [msp.identity] Verify -> DEBU 4074 Verify: digest = 00000000 ca 9c c4 bc 70 99 f6 c1 1a 7c f6 7d 70 01 81 77 |....p....|.}p..w| +peer0.org1.example.com | 00000010 c2 ca 66 7c bb f6 c2 b3 f8 4b ac 57 89 ce ee a9 |..f|.....K.W....|" +peer0.org1.example.com | "2019-05-02 09:28:21.719 UTC [msp.identity] Verify -> DEBU 4075 Verify: sig = 00000000 30 44 02 20 2b a5 b9 b2 19 c4 80 4a a7 b7 3b 2f |0D. +......J..;/| +peer0.org1.example.com | 00000010 81 31 fd d4 16 33 69 c4 62 c9 28 ad 1b ae d0 0c |.1...3i.b.(.....| +peer0.org1.example.com | 00000020 35 61 19 ae 02 20 2a 5f be 3b 0c 0d e8 34 1c 3b |5a... *_.;...4.;| +peer0.org1.example.com | 00000030 fa 1e 1f c6 bd 4d 32 d1 d1 9a 76 a7 80 38 a7 ae |.....M2...v..8..| +peer0.org1.example.com | 00000040 71 73 29 9d 93 a0 |qs)...|" +peer0.org1.example.com | "2019-05-02 09:28:21.720 UTC [gossip.discovery] handleAliveMessage -> DEBU 4076 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.720 UTC [gossip.discovery] isSentByMe -> DEBU 4078 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.720 UTC [gossip.discovery] handleAliveMessage -> DEBU 4079 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.720 UTC [gossip.comm] func1 -> DEBU 4077 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.721 UTC [gossip.discovery] handleMsgFromComm -> DEBU 407a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.722 UTC [gossip.gossip] handleMessage -> DEBU 407b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.722 UTC [gossip.gossip] handleMessage -> DEBU 407c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.722 UTC [gossip.discovery] handleMsgFromComm -> DEBU 407d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.723 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 407e Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:21.723 UTC [msp.identity] Verify -> DEBU 407f Verify: digest = 00000000 ca 9c c4 bc 70 99 f6 c1 1a 7c f6 7d 70 01 81 77 |....p....|.}p..w| +peer0.org1.example.com | 00000010 c2 ca 66 7c bb f6 c2 b3 f8 4b ac 57 89 ce ee a9 |..f|.....K.W....|" +peer0.org1.example.com | "2019-05-02 09:28:21.724 UTC [msp.identity] Verify -> DEBU 4080 Verify: sig = 00000000 30 44 02 20 2b a5 b9 b2 19 c4 80 4a a7 b7 3b 2f |0D. +......J..;/| +peer0.org1.example.com | 00000010 81 31 fd d4 16 33 69 c4 62 c9 28 ad 1b ae d0 0c |.1...3i.b.(.....| +peer0.org1.example.com | 00000020 35 61 19 ae 02 20 2a 5f be 3b 0c 0d e8 34 1c 3b |5a... *_.;...4.;| +peer0.org1.example.com | 00000030 fa 1e 1f c6 bd 4d 32 d1 d1 9a 76 a7 80 38 a7 ae |.....M2...v..8..| +peer0.org1.example.com | 00000040 71 73 29 9d 93 a0 |qs)...|" +peer0.org1.example.com | "2019-05-02 09:28:21.724 UTC [gossip.discovery] handleAliveMessage -> DEBU 4081 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.724 UTC [gossip.discovery] isSentByMe -> DEBU 4082 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 4083 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.725 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4084 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-05-02 09:28:21.725 UTC [msp] DeserializeIdentity -> DEBU 4085 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.725 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4086 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-05-02 09:28:21.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4087 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:21.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4088 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-05-02 09:28:21.726 UTC [policies] Evaluate -> DEBU 4089 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:21.726 UTC [policies] Evaluate -> DEBU 408a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-05-02 09:28:21.727 UTC [policies] Evaluate -> DEBU 408b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-05-02 09:28:21.728 UTC [cauthdsl] func1 -> DEBU 408c 0xc00399b210 gate 1556789301728076500 evaluation starts" +peer0.org1.example.com | "2019-05-02 09:28:21.728 UTC [cauthdsl] func2 -> DEBU 408d 0xc00399b210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-05-02 09:28:21.728 UTC [cauthdsl] func2 -> DEBU 408e 0xc00399b210 processing identity 0 with bytes of 10fffc0" +peer0.org1.example.com | "2019-05-02 09:28:21.728 UTC [cauthdsl] func2 -> DEBU 408f 0xc00399b210 principal matched by identity 0" +peer0.org1.example.com | "2019-05-02 09:28:21.729 UTC [msp.identity] Verify -> DEBU 4090 Verify: digest = 00000000 c6 4c ed 59 30 cd 8e bc 73 38 8d 55 c3 ee 3e 2b |.L.Y0...s8.U..>+| +peer0.org1.example.com | 00000010 76 58 ee 48 63 e2 5a 88 09 e1 36 90 5e 0c c1 5f |vX.Hc.Z...6.^.._|" +peer0.org1.example.com | "2019-05-02 09:28:21.729 UTC [msp.identity] Verify -> DEBU 4091 Verify: sig = 00000000 30 44 02 20 45 df dd 8b f3 62 ca 8b 79 56 6f 82 |0D. E....b..yVo.| +peer0.org1.example.com | 00000010 2f 2f b3 20 f1 89 2f c2 07 d7 00 af 0e 23 a0 e0 |//. ../......#..| +peer0.org1.example.com | 00000020 81 d7 32 ba 02 20 36 21 a4 5b 2b 61 ad 4d 75 49 |..2.. 6!.[+a.MuI| +peer0.org1.example.com | 00000030 c7 84 53 44 25 be ed 40 f0 68 b9 d0 3c 74 80 b7 |..SD%..@.h.. DEBU 4092 0xc00399b210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-05-02 09:28:21.730 UTC [cauthdsl] func1 -> DEBU 4093 0xc00399b210 gate 1556789301728076500 evaluation succeeds" +peer0.org1.example.com | "2019-05-02 09:28:21.730 UTC [policies] Evaluate -> DEBU 4094 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.731 UTC [policies] Evaluate -> DEBU 4095 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.731 UTC [policies] Evaluate -> DEBU 4096 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.731 UTC [policies] Evaluate -> DEBU 4097 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-05-02 09:28:21.731 UTC [gossip.discovery] handleAliveMessage -> DEBU 4098 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.732 UTC [gossip.discovery] handleAliveMessage -> DEBU 4099 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.732 UTC [gossip.discovery] handleMsgFromComm -> DEBU 409a Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.732 UTC [gossip.gossip] handleMessage -> DEBU 409b Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.732 UTC [gossip.discovery] handleMsgFromComm -> DEBU 409c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.733 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 409d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-05-02 09:28:21.733 UTC [msp.identity] Verify -> DEBU 409e Verify: digest = 00000000 ca 9c c4 bc 70 99 f6 c1 1a 7c f6 7d 70 01 81 77 |....p....|.}p..w| +peer0.org1.example.com | 00000010 c2 ca 66 7c bb f6 c2 b3 f8 4b ac 57 89 ce ee a9 |..f|.....K.W....|" +peer0.org1.example.com | "2019-05-02 09:28:21.734 UTC [msp.identity] Verify -> DEBU 409f Verify: sig = 00000000 30 44 02 20 2b a5 b9 b2 19 c4 80 4a a7 b7 3b 2f |0D. +......J..;/| +peer0.org1.example.com | 00000010 81 31 fd d4 16 33 69 c4 62 c9 28 ad 1b ae d0 0c |.1...3i.b.(.....| +peer0.org1.example.com | 00000020 35 61 19 ae 02 20 2a 5f be 3b 0c 0d e8 34 1c 3b |5a... *_.;...4.;| +peer0.org1.example.com | 00000030 fa 1e 1f c6 bd 4d 32 d1 d1 9a 76 a7 80 38 a7 ae |.....M2...v..8..| +peer0.org1.example.com | 00000040 71 73 29 9d 93 a0 |qs)...|" +peer0.org1.example.com | "2019-05-02 09:28:21.734 UTC [msp.identity] Verify -> DEBU 40a0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-05-02 09:28:21.734 UTC [msp.identity] Verify -> DEBU 40a1 Verify: sig = 00000000 30 45 02 21 00 bb 34 a9 dc 99 ea 3d 09 e3 13 7b |0E.!..4....=...{| +peer0.org1.example.com | 00000010 3f ca 0f fc ee 43 bc 7a 98 5c d0 c7 ed 12 6a ef |?....C.z.\....j.| +peer0.org1.example.com | 00000020 1d bd d7 5f c1 02 20 66 44 8d 3f c3 82 8e d5 8d |..._.. fD.?.....| +peer0.org1.example.com | 00000030 dc 0e 36 be 81 6c 8e c6 20 8d 11 0a bc 80 ab e2 |..6..l.. .......| +peer0.org1.example.com | 00000040 dc b4 ff fb 41 6a 77 |....Ajw|" +peer0.org1.example.com | "2019-05-02 09:28:21.735 UTC [gossip.discovery] handleAliveMessage -> DEBU 40a2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.735 UTC [gossip.discovery] isSentByMe -> DEBU 40a3 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.735 UTC [gossip.discovery] handleAliveMessage -> DEBU 40a4 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a5 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.744 UTC [gossip.comm] func1 -> DEBU 40a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.744 UTC [gossip.comm] func1 -> DEBU 40a7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.745 UTC [gossip.gossip] handleMessage -> DEBU 40a8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.745 UTC [gossip.gossip] handleMessage -> DEBU 40a9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.746 UTC [gossip.gossip] handleMessage -> DEBU 40aa Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.746 UTC [gossip.pull] HandleMessage -> DEBU 40ab GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.747 UTC [gossip.pull] SendDigest -> DEBU 40ac Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:21.747 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.747 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 40af Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-05-02 09:28:21.747 UTC [gossip.gossip] handleMessage -> DEBU 40ae Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.748 UTC [msp.identity] Verify -> DEBU 40b0 Verify: digest = 00000000 2c 5f d5 59 73 24 4c a4 78 59 94 18 c7 e9 7a d2 |,_.Ys$L.xY....z.| +peer0.org1.example.com | 00000010 64 ff 87 c0 e1 29 65 24 e9 02 86 d0 0b e7 04 d0 |d....)e$........|" +peer0.org1.example.com | "2019-05-02 09:28:21.749 UTC [msp.identity] Verify -> DEBU 40b1 Verify: sig = 00000000 30 45 02 21 00 ee 41 21 9e 1a 5a f8 e2 91 78 a1 |0E.!..A!..Z...x.| +peer0.org1.example.com | 00000010 da 0e f1 68 b4 b3 b8 71 18 25 63 f3 1f be 13 26 |...h...q.%c....&| +peer0.org1.example.com | 00000020 67 8a ae 12 29 02 20 5d 77 7d 37 ca 4e 8c 2b 9f |g...). ]w}7.N.+.| +peer0.org1.example.com | 00000030 71 b3 27 67 69 99 c2 46 de e5 51 7e 45 93 3f cb |q.'gi..F..Q~E.?.| +peer0.org1.example.com | 00000040 24 ec 45 16 57 13 f0 |$.E.W..|" +peer0.org1.example.com | "2019-05-02 09:28:21.749 UTC [msp.identity] Verify -> DEBU 40b2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-05-02 09:28:21.750 UTC [msp.identity] Verify -> DEBU 40b3 Verify: sig = 00000000 30 45 02 21 00 fb 7f 92 06 21 7a fc 06 6d d5 9b |0E.!.....!z..m..| +peer0.org1.example.com | 00000010 d6 62 b4 09 16 c5 97 5d 6a 12 61 1f 83 6f 78 cd |.b.....]j.a..ox.| +peer0.org1.example.com | 00000020 02 40 01 76 10 02 20 45 8a f1 6a ac 2a a5 c9 6d |.@.v.. E..j.*..m| +peer0.org1.example.com | 00000030 5e 6f c2 8b 77 46 5e fc 93 75 10 ec 3b 4d e6 6a |^o..wF^..u..;M.j| +peer0.org1.example.com | 00000040 8e 63 37 e3 1d 9c 77 |.c7...w|" +peer0.org1.example.com | "2019-05-02 09:28:21.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 40b4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 40b5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-05-02 09:28:21.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 40b6 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 " +peer0.org1.example.com | "2019-05-02 09:28:21.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 40b7 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:53 " +peer0.org1.example.com | "2019-05-02 09:28:21.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 40b8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-05-02 09:28:21.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 40b9 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.751 UTC [gossip.discovery] handleAliveMessage -> DEBU 40ba Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40bb Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.752 UTC [gossip.discovery] sendMemResponse -> DEBU 40bc Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-05-02 09:28:21.753 UTC [msp] DeserializeIdentity -> DEBU 40bd Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.753 UTC [msp] DeserializeIdentity -> DEBU 40be Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.753 UTC [gossip.comm] Send -> DEBU 40bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:21.754 UTC [gossip.comm] sendToEndpoint -> DEBU 40c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.754 UTC [gossip.comm] sendToEndpoint -> DEBU 40c2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.754 UTC [gossip.discovery] sendMemResponse -> DEBU 40c0 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-05-02 09:28:21.841 UTC [gossip.pull] Hello -> DEBU 40c3 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [gossip.comm] Send -> DEBU 40c4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [gossip.pull] Hello -> DEBU 40c5 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [msp] DeserializeIdentity -> DEBU 40c6 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [msp] DeserializeIdentity -> DEBU 40c7 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [gossip.pull] Hello -> DEBU 40c8 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:21.842 UTC [msp] DeserializeIdentity -> DEBU 40c9 Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [msp] DeserializeIdentity -> DEBU 40ca Obtaining identity" +peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [gossip.comm] Send -> DEBU 40cb Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [gossip.comm] sendToEndpoint -> DEBU 40cc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [gossip.comm] sendToEndpoint -> DEBU 40cd Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [gossip.comm] Send -> DEBU 40ce Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:21.845 UTC [gossip.pull] Hello -> DEBU 40d0 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-05-02 09:28:21.846 UTC [gossip.comm] sendToEndpoint -> DEBU 40d2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.846 UTC [gossip.comm] sendToEndpoint -> DEBU 40d3 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.846 UTC [gossip.comm] Send -> DEBU 40d4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-05-02 09:28:21.845 UTC [gossip.comm] func1 -> DEBU 40d1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10786296609119762845 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.843 UTC [gossip.comm] sendToEndpoint -> DEBU 40cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.847 UTC [gossip.gossip] handleMessage -> DEBU 40d5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10786296609119762845 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.847 UTC [gossip.pull] HandleMessage -> DEBU 40d7 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10786296609119762845 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.847 UTC [gossip.gossip] handleMessage -> DEBU 40d8 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.847 UTC [gossip.comm] sendToEndpoint -> DEBU 40d6 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.848 UTC [gossip.comm] sendToEndpoint -> DEBU 40d9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.848 UTC [gossip.comm] sendToEndpoint -> DEBU 40da Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.comm] func1 -> DEBU 40db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9028287631272026798 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.gossip] handleMessage -> DEBU 40dc Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9028287631272026798 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.pull] HandleMessage -> DEBU 40dd GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9028287631272026798 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.gossip] handleMessage -> DEBU 40de Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.comm] func1 -> DEBU 40df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7666957482472577737 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.gossip] handleMessage -> DEBU 40e0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7666957482472577737 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.pull] HandleMessage -> DEBU 40e1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7666957482472577737 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.850 UTC [gossip.gossip] handleMessage -> DEBU 40e2 Exiting" +peer0.org1.example.com | "2019-05-02 09:28:21.852 UTC [gossip.comm] func1 -> DEBU 40e3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16141346674960453334 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.852 UTC [gossip.gossip] handleMessage -> DEBU 40e4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16141346674960453334 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.852 UTC [gossip.pull] HandleMessage -> DEBU 40e5 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16141346674960453334 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-05-02 09:28:21.852 UTC [gossip.gossip] handleMessage -> DEBU 40e6 Exiting" diff --git a/hyperledger_fabric/latest/raft/logs/dev_orderer.log b/hyperledger_fabric/latest/raft/logs/dev_orderer.log index d298f906..e403587c 100644 --- a/hyperledger_fabric/latest/raft/logs/dev_orderer.log +++ b/hyperledger_fabric/latest/raft/logs/dev_orderer.log @@ -1,195 +1,195 @@ -2019-05-02 01:30:30.336 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for general -2019-05-02 01:30:30.337 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') -2019-05-02 01:30:30.337 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for general.GenesisMethod setting to string file -2019-05-02 01:30:30.337 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-05-02 01:30:30.337 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp -2019-05-02 01:30:30.338 UTC [viperutil] unmarshalJSON -> DEBU 006 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -2019-05-02 01:30:30.338 UTC [viperutil] getKeysRecursively -> DEBU 007 Found real value for general.GenesisProfile setting to string SampleInsecureSolo -2019-05-02 01:30:30.338 UTC [viperutil] getKeysRecursively -> DEBU 008 Found map[string]interface{} value for general.Profile -2019-05-02 01:30:30.362 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -2019-05-02 01:30:30.362 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for general.Profile.Address setting to string 0.0.0.0:6060 -2019-05-02 01:30:30.364 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: false -2019-05-02 01:30:30.364 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for general.Profile.Enabled setting to bool false -2019-05-02 01:30:30.364 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') -2019-05-02 01:30:30.364 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for general.LedgerType setting to string file -2019-05-02 01:30:30.365 UTC [viperutil] getKeysRecursively -> DEBU 00f Found map[string]interface{} value for general.BCCSP -2019-05-02 01:30:30.365 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -2019-05-02 01:30:30.365 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for general.BCCSP.Default setting to string SW -2019-05-02 01:30:30.366 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[string]interface{} value for general.BCCSP.SW -2019-05-02 01:30:30.373 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore -2019-05-02 01:30:30.385 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.388 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to -2019-05-02 01:30:30.388 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -2019-05-02 01:30:30.388 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for general.BCCSP.SW.Hash setting to string SHA2 -2019-05-02 01:30:30.389 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: 256 -2019-05-02 01:30:30.389 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for general.BCCSP.SW.Security setting to int 256 -2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for general.ListenAddress setting to string 0.0.0.0 -2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string -2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for general.ListenPort setting to string 7050 -2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 01e Found map[string]interface{} value for general.Keepalive -2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 01f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 020 Found real value for general.Keepalive.ServerMinInterval setting to string 60s -2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for general.Keepalive.ServerInterval setting to string 7200s -2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.Keepalive.ServerTimeout setting to string 20s -2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 025 Found map[string]interface{} value for general.Authentication -2019-05-02 01:30:30.392 UTC [viperutil] unmarshalJSON -> DEBU 026 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -2019-05-02 01:30:30.392 UTC [viperutil] getKeysRecursively -> DEBU 027 Found real value for general.Authentication.TimeWindow setting to string 15m -2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 028 Found map[string]interface{} value for general.TLS -2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 029 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string -2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 02a Found real value for general.TLS.Enabled setting to string true -2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 02b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 02c Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key -2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt -2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] -2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value is not a string: false -2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for general.TLS.ClientAuthRequired setting to bool false -2019-05-02 01:30:30.393 UTC [viperutil] unmarshalJSON -> DEBU 033 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.393 UTC [viperutil] getKeysRecursively -> DEBU 034 Found real value for general.TLS.ClientRootCAs setting to -2019-05-02 01:30:30.396 UTC [viperutil] unmarshalJSON -> DEBU 035 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-05-02 01:30:30.396 UTC [viperutil] getKeysRecursively -> DEBU 036 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block -2019-05-02 01:30:30.396 UTC [viperutil] unmarshalJSON -> DEBU 037 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value -2019-05-02 01:30:30.396 UTC [viperutil] getKeysRecursively -> DEBU 038 Found real value for general.LocalMSPID setting to string OrdererMSP -2019-05-02 01:30:30.396 UTC [viperutil] getKeysRecursively -> DEBU 039 Found map[string]interface{} value for general.Cluster -2019-05-02 01:30:30.396 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.396 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.Cluster.ServerCertificate setting to -2019-05-02 01:30:30.397 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.397 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.Cluster.ServerPrivateKey setting to -2019-05-02 01:30:30.397 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value is not a string: 10 -2019-05-02 01:30:30.397 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for general.Cluster.SendBufferSize setting to int 10 -2019-05-02 01:30:30.397 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-05-02 01:30:30.397 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt -2019-05-02 01:30:30.397 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-05-02 01:30:30.397 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key -2019-05-02 01:30:30.397 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.397 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for general.Cluster.ListenPort setting to -2019-05-02 01:30:30.398 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.398 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.Cluster.ListenAddress setting to -2019-05-02 01:30:30.398 UTC [viperutil] getKeysRecursively -> DEBU 048 Found map[interface{}]interface{} value for fileledger -2019-05-02 01:30:30.398 UTC [viperutil] unmarshalJSON -> DEBU 049 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-05-02 01:30:30.398 UTC [viperutil] getKeysRecursively -> DEBU 04a Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer -2019-05-02 01:30:30.398 UTC [viperutil] unmarshalJSON -> DEBU 04b Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value -2019-05-02 01:30:30.398 UTC [viperutil] getKeysRecursively -> DEBU 04c Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger -2019-05-02 01:30:30.409 UTC [viperutil] getKeysRecursively -> DEBU 04d Found map[interface{}]interface{} value for ramledger -2019-05-02 01:30:30.410 UTC [viperutil] unmarshalJSON -> DEBU 04e Unmarshal JSON: value is not a string: 1000 -2019-05-02 01:30:30.410 UTC [viperutil] getKeysRecursively -> DEBU 04f Found real value for ramledger.HistorySize setting to int 1000 -2019-05-02 01:30:30.410 UTC [viperutil] getKeysRecursively -> DEBU 050 Found map[interface{}]interface{} value for kafka -2019-05-02 01:30:30.410 UTC [viperutil] getKeysRecursively -> DEBU 051 Found map[string]interface{} value for kafka.Topic -2019-05-02 01:30:30.410 UTC [viperutil] unmarshalJSON -> DEBU 052 Unmarshal JSON: value is not a string: 3 -2019-05-02 01:30:30.410 UTC [viperutil] getKeysRecursively -> DEBU 053 Found real value for kafka.Topic.ReplicationFactor setting to int 3 -2019-05-02 01:30:30.410 UTC [viperutil] unmarshalJSON -> DEBU 054 Unmarshal JSON: value is not a string: false -2019-05-02 01:30:30.410 UTC [viperutil] getKeysRecursively -> DEBU 055 Found real value for kafka.Verbose setting to bool false -2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 056 Found map[string]interface{} value for kafka.TLS -2019-05-02 01:30:30.411 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value is not a string: false -2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for kafka.TLS.Enabled setting to bool false -2019-05-02 01:30:30.411 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for kafka.TLS.PrivateKey setting to -2019-05-02 01:30:30.411 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for kafka.TLS.Certificate setting to -2019-05-02 01:30:30.411 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for kafka.TLS.RootCAs setting to -2019-05-02 01:30:30.411 UTC [viperutil] getKeysRecursively -> DEBU 05f Found map[string]interface{} value for kafka.SASLPlain -2019-05-02 01:30:30.412 UTC [viperutil] unmarshalJSON -> DEBU 060 Unmarshal JSON: value is not a string: false -2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 061 Found real value for kafka.SASLPlain.Enabled setting to bool false -2019-05-02 01:30:30.412 UTC [viperutil] unmarshalJSON -> DEBU 062 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 063 Found real value for kafka.SASLPlain.User setting to -2019-05-02 01:30:30.412 UTC [viperutil] unmarshalJSON -> DEBU 064 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 065 Found real value for kafka.SASLPlain.Password setting to -2019-05-02 01:30:30.412 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for kafka.Version setting to -2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[string]interface{} value for kafka.Retry -2019-05-02 01:30:30.412 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for kafka.Retry.Consumer -2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s -2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for kafka.Retry.ShortInterval setting to string 5s -2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for kafka.Retry.ShortTotal setting to string 10m -2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for kafka.Retry.LongInterval setting to string 5m -2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value -2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for kafka.Retry.LongTotal setting to string 12h -2019-05-02 01:30:30.413 UTC [viperutil] getKeysRecursively -> DEBU 074 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts -2019-05-02 01:30:30.413 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-05-02 01:30:30.414 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s -2019-05-02 01:30:30.419 UTC [viperutil] unmarshalJSON -> DEBU 077 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-05-02 01:30:30.420 UTC [viperutil] getKeysRecursively -> DEBU 078 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s -2019-05-02 01:30:30.420 UTC [viperutil] unmarshalJSON -> DEBU 079 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-05-02 01:30:30.421 UTC [viperutil] getKeysRecursively -> DEBU 07a Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s -2019-05-02 01:30:30.421 UTC [viperutil] getKeysRecursively -> DEBU 07b Found map[string]interface{} value for kafka.Retry.Metadata -2019-05-02 01:30:30.422 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -2019-05-02 01:30:30.422 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms -2019-05-02 01:30:30.422 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value is not a string: 3 -2019-05-02 01:30:30.422 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 -2019-05-02 01:30:30.422 UTC [viperutil] getKeysRecursively -> DEBU 080 Found map[string]interface{} value for kafka.Retry.Producer -2019-05-02 01:30:30.422 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -2019-05-02 01:30:30.422 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms -2019-05-02 01:30:30.423 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value is not a string: 3 -2019-05-02 01:30:30.423 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 -2019-05-02 01:30:30.423 UTC [viperutil] getKeysRecursively -> DEBU 085 Found map[interface{}]interface{} value for debug -2019-05-02 01:30:30.423 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.423 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for debug.DeliverTraceDir setting to -2019-05-02 01:30:30.423 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.424 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for debug.BroadcastTraceDir setting to -2019-05-02 01:30:30.424 UTC [viperutil] getKeysRecursively -> DEBU 08a Found map[interface{}]interface{} value for operations -2019-05-02 01:30:30.433 UTC [viperutil] unmarshalJSON -> DEBU 08b Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -2019-05-02 01:30:30.433 UTC [viperutil] getKeysRecursively -> DEBU 08c Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 -2019-05-02 01:30:30.434 UTC [viperutil] getKeysRecursively -> DEBU 08d Found map[string]interface{} value for operations.TLS -2019-05-02 01:30:30.434 UTC [viperutil] unmarshalJSON -> DEBU 08e Unmarshal JSON: value is not a string: false -2019-05-02 01:30:30.434 UTC [viperutil] getKeysRecursively -> DEBU 08f Found real value for operations.TLS.ClientAuthRequired setting to bool false -2019-05-02 01:30:30.434 UTC [viperutil] unmarshalJSON -> DEBU 090 Unmarshal JSON: value is not a string: [] -2019-05-02 01:30:30.434 UTC [viperutil] getKeysRecursively -> DEBU 091 Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] -2019-05-02 01:30:30.434 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value is not a string: false -2019-05-02 01:30:30.435 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for operations.TLS.Enabled setting to bool false -2019-05-02 01:30:30.435 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.435 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for operations.TLS.Certificate setting to -2019-05-02 01:30:30.435 UTC [viperutil] unmarshalJSON -> DEBU 096 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.435 UTC [viperutil] getKeysRecursively -> DEBU 097 Found real value for operations.TLS.PrivateKey setting to -2019-05-02 01:30:30.435 UTC [viperutil] getKeysRecursively -> DEBU 098 Found map[interface{}]interface{} value for metrics -2019-05-02 01:30:30.435 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value -2019-05-02 01:30:30.435 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for metrics.Provider setting to string prometheus -2019-05-02 01:30:30.436 UTC [viperutil] getKeysRecursively -> DEBU 09b Found map[string]interface{} value for metrics.Statsd -2019-05-02 01:30:30.436 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value -2019-05-02 01:30:30.436 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for metrics.Statsd.Network setting to string udp -2019-05-02 01:30:30.436 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -2019-05-02 01:30:30.436 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 -2019-05-02 01:30:30.436 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-05-02 01:30:30.436 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for metrics.Statsd.WriteInterval setting to string 30s -2019-05-02 01:30:30.437 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: -2019-05-02 01:30:30.437 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for metrics.Statsd.Prefix setting to -2019-05-02 01:30:30.437 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found map[interface{}]interface{} value for consensus -2019-05-02 01:30:30.437 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-05-02 01:30:30.437 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal -2019-05-02 01:30:30.437 UTC [viperutil] unmarshalJSON -> DEBU 0a7 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-05-02 01:30:30.437 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot -2019-05-02 01:30:30.438 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0a9 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key ListenAddress: ListenPort: SendBufferSize:10 ServerCertificate: ServerPrivateKey:] GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey:]] ramledger:map[HistorySize:1000]] -2019-05-02 01:30:30.441 UTC [localconfig] completeInitialization -> INFO 0aa Kafka.Version unset, setting to 0.10.2.0 -"2019-05-02 01:30:30.494 UTC [bccsp_sw] openKeyStore -> DEBU 0ab KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" -"2019-05-02 01:30:30.494 UTC [bccsp] initBCCSP -> DEBU 0ac Initialize BCCSP [SW]" -"2019-05-02 01:30:30.494 UTC [msp] getPemMaterialFromDir -> DEBU 0ad Reading directory /var/hyperledger/orderer/msp/signcerts" -"2019-05-02 01:30:30.546 UTC [msp] getPemMaterialFromDir -> DEBU 0ae Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" -"2019-05-02 01:30:30.552 UTC [msp] getPemMaterialFromDir -> DEBU 0af Reading directory /var/hyperledger/orderer/msp/cacerts" -"2019-05-02 01:30:30.562 UTC [msp] getPemMaterialFromDir -> DEBU 0b0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" -"2019-05-02 01:30:30.568 UTC [msp] getPemMaterialFromDir -> DEBU 0b1 Reading directory /var/hyperledger/orderer/msp/admincerts" -"2019-05-02 01:30:30.571 UTC [msp] getPemMaterialFromDir -> DEBU 0b2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" -"2019-05-02 01:30:30.576 UTC [msp] getPemMaterialFromDir -> DEBU 0b3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" -"2019-05-02 01:30:30.577 UTC [msp] getMspConfig -> DEBU 0b4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" -"2019-05-02 01:30:30.577 UTC [msp] getPemMaterialFromDir -> DEBU 0b5 Reading directory /var/hyperledger/orderer/msp/tlscacerts" -"2019-05-02 01:30:30.581 UTC [msp] getPemMaterialFromDir -> DEBU 0b6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" -"2019-05-02 01:30:30.588 UTC [msp] getPemMaterialFromDir -> DEBU 0b7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" -"2019-05-02 01:30:30.589 UTC [msp] getMspConfig -> DEBU 0b8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" -"2019-05-02 01:30:30.589 UTC [msp] getPemMaterialFromDir -> DEBU 0b9 Reading directory /var/hyperledger/orderer/msp/crls" -"2019-05-02 01:30:30.590 UTC [msp] getMspConfig -> DEBU 0ba crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" -"2019-05-02 01:30:30.590 UTC [msp] getMspConfig -> DEBU 0bb MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" -"2019-05-02 01:30:30.590 UTC [msp] newBccspMsp -> DEBU 0bc Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.590 UTC [msp] New -> DEBU 0bd Creating Cache-MSP instance" -"2019-05-02 01:30:30.590 UTC [msp] loadLocaMSP -> DEBU 0be Created new local MSP" -"2019-05-02 01:30:30.590 UTC [msp] Setup -> DEBU 0bf Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:30.591 UTC [msp.identity] newIdentity -> DEBU 0c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +2019-05-02 09:27:05.875 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for metrics +2019-05-02 09:27:05.875 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for metrics.Statsd +2019-05-02 09:27:05.877 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.878 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for metrics.Statsd.Prefix setting to +2019-05-02 09:27:05.878 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +2019-05-02 09:27:05.878 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for metrics.Statsd.Network setting to string udp +2019-05-02 09:27:05.879 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +2019-05-02 09:27:05.879 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for metrics.Statsd.WriteInterval setting to string 30s +2019-05-02 09:27:05.879 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for metrics.Provider setting to string prometheus +2019-05-02 09:27:05.879 UTC [viperutil] getKeysRecursively -> DEBU 00d Found map[interface{}]interface{} value for consensus +2019-05-02 09:27:05.880 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-05-02 09:27:05.880 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +2019-05-02 09:27:05.881 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-05-02 09:27:05.881 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +2019-05-02 09:27:05.889 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[interface{}]interface{} value for general +2019-05-02 09:27:05.898 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for general.Cluster +2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for general.Cluster.ServerPrivateKey setting to +2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: 10 +2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for general.Cluster.SendBufferSize setting to int 10 +2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.899 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for general.Cluster.ListenPort setting to +2019-05-02 09:27:05.899 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for general.Cluster.ListenAddress setting to +2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 020 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 021 Found real value for general.Cluster.ServerCertificate setting to +2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 022 Found map[string]interface{} value for general.Profile +2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value is not a string: false +2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.Profile.Enabled setting to bool false +2019-05-02 09:27:05.900 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +2019-05-02 09:27:05.900 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.LocalMSPID setting to string OrdererMSP +2019-05-02 09:27:05.901 UTC [viperutil] getKeysRecursively -> DEBU 029 Found map[string]interface{} value for general.BCCSP +2019-05-02 09:27:05.901 UTC [viperutil] getKeysRecursively -> DEBU 02a Found map[string]interface{} value for general.BCCSP.SW +2019-05-02 09:27:05.901 UTC [viperutil] unmarshalJSON -> DEBU 02b Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-05-02 09:27:05.901 UTC [viperutil] getKeysRecursively -> DEBU 02c Found real value for general.BCCSP.SW.Hash setting to string SHA2 +2019-05-02 09:27:05.902 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value is not a string: 256 +2019-05-02 09:27:05.904 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.BCCSP.SW.Security setting to int 256 +2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 02f Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 030 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 031 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.BCCSP.Default setting to string SW +2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.LedgerType setting to string file +2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.ListenAddress setting to string 0.0.0.0 +2019-05-02 09:27:05.905 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-05-02 09:27:05.905 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.ListenPort setting to string 7050 +2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 03e Found map[string]interface{} value for general.Authentication +2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 03f Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 040 Found real value for general.Authentication.TimeWindow setting to string 15m +2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 041 Found map[string]interface{} value for general.TLS +2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.TLS.Enabled setting to string true +2019-05-02 09:27:05.906 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-05-02 09:27:05.906 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-05-02 09:27:05.907 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-05-02 09:27:05.907 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-05-02 09:27:05.907 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-05-02 09:27:05.907 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2019-05-02 09:27:05.908 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value is not a string: false +2019-05-02 09:27:05.908 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.TLS.ClientAuthRequired setting to bool false +2019-05-02 09:27:05.909 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.909 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for general.TLS.ClientRootCAs setting to +2019-05-02 09:27:05.910 UTC [viperutil] getKeysRecursively -> DEBU 04e Found map[string]interface{} value for general.Keepalive +2019-05-02 09:27:05.910 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-05-02 09:27:05.914 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.Keepalive.ServerMinInterval setting to string 60s +2019-05-02 09:27:05.915 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-05-02 09:27:05.916 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for general.Keepalive.ServerInterval setting to string 7200s +2019-05-02 09:27:05.919 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.Keepalive.ServerTimeout setting to string 20s +2019-05-02 09:27:05.920 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.GenesisMethod setting to string file +2019-05-02 09:27:05.920 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +2019-05-02 09:27:05.920 UTC [viperutil] getKeysRecursively -> DEBU 059 Found map[interface{}]interface{} value for fileledger +2019-05-02 09:27:05.933 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-05-02 09:27:05.933 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +2019-05-02 09:27:05.934 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +2019-05-02 09:27:05.934 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +2019-05-02 09:27:05.939 UTC [viperutil] getKeysRecursively -> DEBU 05e Found map[interface{}]interface{} value for ramledger +2019-05-02 09:27:05.940 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value is not a string: 1000 +2019-05-02 09:27:05.940 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for ramledger.HistorySize setting to int 1000 +2019-05-02 09:27:05.940 UTC [viperutil] getKeysRecursively -> DEBU 061 Found map[interface{}]interface{} value for kafka +2019-05-02 09:27:05.941 UTC [viperutil] getKeysRecursively -> DEBU 062 Found map[string]interface{} value for kafka.Topic +2019-05-02 09:27:05.941 UTC [viperutil] unmarshalJSON -> DEBU 063 Unmarshal JSON: value is not a string: 3 +2019-05-02 09:27:05.941 UTC [viperutil] getKeysRecursively -> DEBU 064 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +2019-05-02 09:27:05.942 UTC [viperutil] unmarshalJSON -> DEBU 065 Unmarshal JSON: value is not a string: false +2019-05-02 09:27:05.944 UTC [viperutil] getKeysRecursively -> DEBU 066 Found real value for kafka.Verbose setting to bool false +2019-05-02 09:27:05.947 UTC [viperutil] getKeysRecursively -> DEBU 067 Found map[string]interface{} value for kafka.TLS +2019-05-02 09:27:05.947 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value is not a string: false +2019-05-02 09:27:05.947 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for kafka.TLS.Enabled setting to bool false +2019-05-02 09:27:05.948 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.948 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for kafka.TLS.PrivateKey setting to +2019-05-02 09:27:05.948 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.948 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for kafka.TLS.Certificate setting to +2019-05-02 09:27:05.948 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.948 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for kafka.TLS.RootCAs setting to +2019-05-02 09:27:05.963 UTC [viperutil] getKeysRecursively -> DEBU 070 Found map[string]interface{} value for kafka.SASLPlain +2019-05-02 09:27:05.964 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.965 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for kafka.SASLPlain.Password setting to +2019-05-02 09:27:05.965 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value is not a string: false +2019-05-02 09:27:05.966 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for kafka.SASLPlain.Enabled setting to bool false +2019-05-02 09:27:05.966 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.967 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for kafka.SASLPlain.User setting to +2019-05-02 09:27:05.967 UTC [viperutil] unmarshalJSON -> DEBU 077 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.968 UTC [viperutil] getKeysRecursively -> DEBU 078 Found real value for kafka.Version setting to +2019-05-02 09:27:05.968 UTC [viperutil] getKeysRecursively -> DEBU 079 Found map[string]interface{} value for kafka.Retry +2019-05-02 09:27:05.969 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-05-02 09:27:05.969 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for kafka.Retry.ShortTotal setting to string 10m +2019-05-02 09:27:05.969 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-05-02 09:27:05.970 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for kafka.Retry.LongInterval setting to string 5m +2019-05-02 09:27:05.970 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +2019-05-02 09:27:05.974 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for kafka.Retry.LongTotal setting to string 12h +2019-05-02 09:27:05.975 UTC [viperutil] getKeysRecursively -> DEBU 080 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +2019-05-02 09:27:05.975 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-05-02 09:27:05.975 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +2019-05-02 09:27:05.975 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-05-02 09:27:05.975 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +2019-05-02 09:27:05.975 UTC [viperutil] unmarshalJSON -> DEBU 085 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 086 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 087 Found map[string]interface{} value for kafka.Retry.Metadata +2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: 3 +2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 08c Found map[string]interface{} value for kafka.Retry.Producer +2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +2019-05-02 09:27:05.976 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value is not a string: 3 +2019-05-02 09:27:05.976 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 091 Found map[string]interface{} value for kafka.Retry.Consumer +2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for kafka.Retry.ShortInterval setting to string 5s +2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 096 Found map[interface{}]interface{} value for debug +2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for debug.DeliverTraceDir setting to +2019-05-02 09:27:05.977 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.977 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for debug.BroadcastTraceDir setting to +2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 09b Found map[interface{}]interface{} value for operations +2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 09e Found map[string]interface{} value for operations.TLS +2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 09f Unmarshal JSON: value is not a string: false +2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a0 Found real value for operations.TLS.ClientAuthRequired setting to bool false +2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a1 Unmarshal JSON: value is not a string: [] +2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value is not a string: false +2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for operations.TLS.Enabled setting to bool false +2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for operations.TLS.Certificate setting to +2019-05-02 09:27:05.978 UTC [viperutil] unmarshalJSON -> DEBU 0a7 Unmarshal JSON: value is not a string: +2019-05-02 09:27:05.978 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found real value for operations.TLS.PrivateKey setting to +2019-05-02 09:27:05.979 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0a9 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key ListenAddress: ListenPort: SendBufferSize:10 ServerCertificate: ServerPrivateKey:] GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey:]] ramledger:map[HistorySize:1000]] +2019-05-02 09:27:05.980 UTC [localconfig] completeInitialization -> INFO 0aa Kafka.Version unset, setting to 0.10.2.0 +"2019-05-02 09:27:06.034 UTC [bccsp_sw] openKeyStore -> DEBU 0ab KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +"2019-05-02 09:27:06.051 UTC [bccsp] initBCCSP -> DEBU 0ac Initialize BCCSP [SW]" +"2019-05-02 09:27:06.051 UTC [msp] getPemMaterialFromDir -> DEBU 0ad Reading directory /var/hyperledger/orderer/msp/signcerts" +"2019-05-02 09:27:06.059 UTC [msp] getPemMaterialFromDir -> DEBU 0ae Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +"2019-05-02 09:27:06.080 UTC [msp] getPemMaterialFromDir -> DEBU 0af Reading directory /var/hyperledger/orderer/msp/cacerts" +"2019-05-02 09:27:06.106 UTC [msp] getPemMaterialFromDir -> DEBU 0b0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +"2019-05-02 09:27:06.111 UTC [msp] getPemMaterialFromDir -> DEBU 0b1 Reading directory /var/hyperledger/orderer/msp/admincerts" +"2019-05-02 09:27:06.120 UTC [msp] getPemMaterialFromDir -> DEBU 0b2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +"2019-05-02 09:27:06.128 UTC [msp] getPemMaterialFromDir -> DEBU 0b3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +"2019-05-02 09:27:06.130 UTC [msp] getMspConfig -> DEBU 0b4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +"2019-05-02 09:27:06.130 UTC [msp] getPemMaterialFromDir -> DEBU 0b5 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +"2019-05-02 09:27:06.135 UTC [msp] getPemMaterialFromDir -> DEBU 0b6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +"2019-05-02 09:27:06.139 UTC [msp] getPemMaterialFromDir -> DEBU 0b7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +"2019-05-02 09:27:06.141 UTC [msp] getMspConfig -> DEBU 0b8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +"2019-05-02 09:27:06.141 UTC [msp] getPemMaterialFromDir -> DEBU 0b9 Reading directory /var/hyperledger/orderer/msp/crls" +"2019-05-02 09:27:06.142 UTC [msp] getMspConfig -> DEBU 0ba crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +"2019-05-02 09:27:06.144 UTC [msp] getMspConfig -> DEBU 0bb MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +"2019-05-02 09:27:06.144 UTC [msp] newBccspMsp -> DEBU 0bc Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.144 UTC [msp] New -> DEBU 0bd Creating Cache-MSP instance" +"2019-05-02 09:27:06.144 UTC [msp] loadLocaMSP -> DEBU 0be Created new local MSP" +"2019-05-02 09:27:06.144 UTC [msp] Setup -> DEBU 0bf Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:06.145 UTC [msp.identity] newIdentity -> DEBU 0c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -203,7 +203,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:30.591 UTC [msp.identity] newIdentity -> DEBU 0c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.145 UTC [msp.identity] newIdentity -> DEBU 0c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -216,7 +216,7 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.600 UTC [msp.identity] newIdentity -> DEBU 0c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.154 UTC [msp.identity] newIdentity -> DEBU 0c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -230,8 +230,8 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.620 UTC [bccsp_sw] loadPrivateKey -> DEBU 0c3 Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." -"2019-05-02 01:30:30.631 UTC [msp.identity] newIdentity -> DEBU 0c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.165 UTC [bccsp_sw] loadPrivateKey -> DEBU 0c3 Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." +"2019-05-02 09:27:06.171 UTC [msp.identity] newIdentity -> DEBU 0c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -245,9 +245,9 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.631 UTC [msp] setupSigningIdentity -> DEBU 0c5 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" -"2019-05-02 01:30:30.632 UTC [msp] Validate -> DEBU 0c6 MSP OrdererMSP validating identity" -"2019-05-02 01:30:30.634 UTC [orderer.common.server] prettyPrintStruct -> INFO 0c7 Orderer config values: +"2019-05-02 09:27:06.171 UTC [msp] setupSigningIdentity -> DEBU 0c5 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +"2019-05-02 09:27:06.171 UTC [msp] Validate -> DEBU 0c6 MSP OrdererMSP validating identity" +"2019-05-02 09:27:06.171 UTC [orderer.common.server] prettyPrintStruct -> INFO 0c7 Orderer config values: General.LedgerType = "file" General.ListenAddress = "0.0.0.0" General.ListenPort = 7050 @@ -335,28 +335,28 @@ QQ== Metrics.Statsd.Address = "127.0.0.1:8125" Metrics.Statsd.WriteInterval = 30s Metrics.Statsd.Prefix = """ -"2019-05-02 01:30:30.658 UTC [common.channelconfig] NewStandardValues -> DEBU 0c8 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0c9 Processing field: HashingAlgorithm" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ca Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cb Processing field: OrdererAddresses" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cc Processing field: Consortium" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cd Processing field: Capabilities" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] NewStandardValues -> DEBU 0ce Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cf Processing field: ConsensusType" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d0 Processing field: BatchSize" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d1 Processing field: BatchTimeout" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d2 Processing field: KafkaBrokers" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d3 Processing field: ChannelRestrictions" -"2019-05-02 01:30:30.658 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d4 Processing field: Capabilities" -"2019-05-02 01:30:30.659 UTC [common.channelconfig] NewStandardValues -> DEBU 0d5 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:30.659 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d6 Processing field: Endpoints" -"2019-05-02 01:30:30.659 UTC [common.channelconfig] NewStandardValues -> DEBU 0d7 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.659 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d8 Processing field: MSP" -"2019-05-02 01:30:30.659 UTC [common.channelconfig] validateMSP -> DEBU 0d9 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:30.659 UTC [msp] newBccspMsp -> DEBU 0da Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.659 UTC [msp] New -> DEBU 0db Creating Cache-MSP instance" -"2019-05-02 01:30:30.659 UTC [msp] Setup -> DEBU 0dc Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:30.659 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.188 UTC [common.channelconfig] NewStandardValues -> DEBU 0c8 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0c9 Processing field: HashingAlgorithm" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ca Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cb Processing field: OrdererAddresses" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cc Processing field: Consortium" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cd Processing field: Capabilities" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] NewStandardValues -> DEBU 0ce Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cf Processing field: ConsensusType" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d0 Processing field: BatchSize" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d1 Processing field: BatchTimeout" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d2 Processing field: KafkaBrokers" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d3 Processing field: ChannelRestrictions" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d4 Processing field: Capabilities" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] NewStandardValues -> DEBU 0d5 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d6 Processing field: Endpoints" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] NewStandardValues -> DEBU 0d7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d8 Processing field: MSP" +"2019-05-02 09:27:06.189 UTC [common.channelconfig] validateMSP -> DEBU 0d9 Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:06.189 UTC [msp] newBccspMsp -> DEBU 0da Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.189 UTC [msp] New -> DEBU 0db Creating Cache-MSP instance" +"2019-05-02 09:27:06.190 UTC [msp] Setup -> DEBU 0dc Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:06.190 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -370,7 +370,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:30.659 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.190 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -383,16 +383,16 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.660 UTC [msp] Validate -> DEBU 0df MSP OrdererMSP validating identity" -"2019-05-02 01:30:30.660 UTC [common.channelconfig] NewStandardValues -> DEBU 0e0 Initializing protos for *channelconfig.ConsortiumProtos" -"2019-05-02 01:30:30.660 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e1 Processing field: ChannelCreationPolicy" -"2019-05-02 01:30:30.660 UTC [common.channelconfig] NewStandardValues -> DEBU 0e2 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.660 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e3 Processing field: MSP" -"2019-05-02 01:30:30.660 UTC [common.channelconfig] validateMSP -> DEBU 0e4 Setting up MSP for org Org1MSP" -"2019-05-02 01:30:30.660 UTC [msp] newBccspMsp -> DEBU 0e5 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.660 UTC [msp] New -> DEBU 0e6 Creating Cache-MSP instance" -"2019-05-02 01:30:30.660 UTC [msp] Setup -> DEBU 0e7 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:30.660 UTC [msp.identity] newIdentity -> DEBU 0e8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.190 UTC [msp] Validate -> DEBU 0df MSP OrdererMSP validating identity" +"2019-05-02 09:27:06.190 UTC [common.channelconfig] NewStandardValues -> DEBU 0e0 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-05-02 09:27:06.190 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e1 Processing field: ChannelCreationPolicy" +"2019-05-02 09:27:06.190 UTC [common.channelconfig] NewStandardValues -> DEBU 0e2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.190 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e3 Processing field: MSP" +"2019-05-02 09:27:06.190 UTC [common.channelconfig] validateMSP -> DEBU 0e4 Setting up MSP for org Org1MSP" +"2019-05-02 09:27:06.190 UTC [msp] newBccspMsp -> DEBU 0e5 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.190 UTC [msp] New -> DEBU 0e6 Creating Cache-MSP instance" +"2019-05-02 09:27:06.192 UTC [msp] Setup -> DEBU 0e7 Setting up MSP instance Org1MSP" +"2019-05-02 09:27:06.193 UTC [msp.identity] newIdentity -> DEBU 0e8 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -407,7 +407,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:30.660 UTC [msp.identity] newIdentity -> DEBU 0e9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.193 UTC [msp.identity] newIdentity -> DEBU 0e9 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -421,18 +421,18 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.661 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0ea Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:30.661 UTC [msp] Validate -> DEBU 0eb MSP Org1MSP validating identity" -"2019-05-02 01:30:30.661 UTC [msp] getCertificationChain -> DEBU 0ec MSP Org1MSP getting certification chain" -"2019-05-02 01:30:30.661 UTC [msp] hasOURole -> DEBU 0ed MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:30.662 UTC [msp] getCertificationChain -> DEBU 0ee MSP Org1MSP getting certification chain" -"2019-05-02 01:30:30.662 UTC [common.channelconfig] NewStandardValues -> DEBU 0ef Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.662 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: MSP" -"2019-05-02 01:30:30.662 UTC [common.channelconfig] validateMSP -> DEBU 0f1 Setting up MSP for org Org2MSP" -"2019-05-02 01:30:30.662 UTC [msp] newBccspMsp -> DEBU 0f2 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.662 UTC [msp] New -> DEBU 0f3 Creating Cache-MSP instance" -"2019-05-02 01:30:30.662 UTC [msp] Setup -> DEBU 0f4 Setting up MSP instance Org2MSP" -"2019-05-02 01:30:30.662 UTC [msp.identity] newIdentity -> DEBU 0f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.193 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0ea Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:06.194 UTC [msp] Validate -> DEBU 0eb MSP Org1MSP validating identity" +"2019-05-02 09:27:06.194 UTC [msp] getCertificationChain -> DEBU 0ec MSP Org1MSP getting certification chain" +"2019-05-02 09:27:06.194 UTC [msp] hasOURole -> DEBU 0ed MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:06.194 UTC [msp] getCertificationChain -> DEBU 0ee MSP Org1MSP getting certification chain" +"2019-05-02 09:27:06.195 UTC [common.channelconfig] NewStandardValues -> DEBU 0ef Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.195 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: MSP" +"2019-05-02 09:27:06.195 UTC [common.channelconfig] validateMSP -> DEBU 0f1 Setting up MSP for org Org2MSP" +"2019-05-02 09:27:06.195 UTC [msp] newBccspMsp -> DEBU 0f2 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.195 UTC [msp] New -> DEBU 0f3 Creating Cache-MSP instance" +"2019-05-02 09:27:06.195 UTC [msp] Setup -> DEBU 0f4 Setting up MSP instance Org2MSP" +"2019-05-02 09:27:06.201 UTC [msp.identity] newIdentity -> DEBU 0f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -447,7 +447,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.662 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.201 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -461,101 +461,101 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.663 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0f7 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:30.663 UTC [msp] Validate -> DEBU 0f8 MSP Org2MSP validating identity" -"2019-05-02 01:30:30.663 UTC [msp] getCertificationChain -> DEBU 0f9 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:30.664 UTC [msp] hasOURole -> DEBU 0fa MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:30.664 UTC [msp] getCertificationChain -> DEBU 0fb MSP Org2MSP getting certification chain" -"2019-05-02 01:30:30.664 UTC [msp] Setup -> DEBU 0fc Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:30.664 UTC [msp] Setup -> DEBU 0fd MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 0fe Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 0ff Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 100 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 101 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 102 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 103 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 104 Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 105 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 106 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 107 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 108 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 109 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 10a Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.664 UTC [policies] NewManagerImpl -> DEBU 10b Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.665 UTC [policies] NewManagerImpl -> DEBU 10c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.665 UTC [policies] NewManagerImpl -> DEBU 10d Proposed new policy Admins for Channel/Consortiums" -"2019-05-02 01:30:30.665 UTC [policies] GetPolicy -> DEBU 10e Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -"2019-05-02 01:30:30.665 UTC [policies] NewManagerImpl -> DEBU 10f Proposed new policy Readers for Channel" -"2019-05-02 01:30:30.665 UTC [policies] GetPolicy -> DEBU 110 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -"2019-05-02 01:30:30.665 UTC [policies] NewManagerImpl -> DEBU 111 Proposed new policy Writers for Channel" -"2019-05-02 01:30:30.665 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Admins for Channel" -"2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 113 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 114 Adding to config map: [Group] /Channel/Consortiums" -"2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 115 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -"2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 116 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 117 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -"2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 118 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -"2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 119 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -"2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 11a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -"2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 11b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -"2019-05-02 01:30:30.665 UTC [common.configtx] addToMap -> DEBU 11c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 11d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 11e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 11f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 120 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 121 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 122 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 123 Adding to config map: [Policy] /Channel/Consortiums/Admins" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 124 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 125 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 126 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:30.666 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:30.667 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:30.667 UTC [orderer.common.server] createLedgerFactory -> DEBU 13a Ledger dir: /var/hyperledger/production/orderer" -"2019-05-02 01:30:30.667 UTC [kvledger.util] CreateDirIfMissing -> DEBU 13b CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" -"2019-05-02 01:30:30.667 UTC [kvledger.util] logDirStatus -> DEBU 13c Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" -"2019-05-02 01:30:30.668 UTC [kvledger.util] logDirStatus -> DEBU 13d After creating dir - [/var/hyperledger/production/orderer/index/] exists" -"2019-05-02 01:30:30.692 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 13e Bootstrapping because no existing chains" -"2019-05-02 01:30:30.692 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 13f Selected bootstrap block, because system channel last config block is nil" -"2019-05-02 01:30:30.693 UTC [common.channelconfig] NewStandardValues -> DEBU 140 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:30.693 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141 Processing field: HashingAlgorithm" -"2019-05-02 01:30:30.693 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:30.693 UTC [common.channelconfig] initializeProtosStruct -> DEBU 143 Processing field: OrdererAddresses" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 144 Processing field: Consortium" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 145 Processing field: Capabilities" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] NewStandardValues -> DEBU 146 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 147 Processing field: ConsensusType" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 148 Processing field: BatchSize" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 149 Processing field: BatchTimeout" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14a Processing field: KafkaBrokers" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14b Processing field: ChannelRestrictions" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14c Processing field: Capabilities" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] NewStandardValues -> DEBU 14d Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e Processing field: Endpoints" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] NewStandardValues -> DEBU 14f Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] initializeProtosStruct -> DEBU 150 Processing field: MSP" -"2019-05-02 01:30:30.694 UTC [common.channelconfig] validateMSP -> DEBU 151 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:30.694 UTC [msp] newBccspMsp -> DEBU 152 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.694 UTC [msp] New -> DEBU 153 Creating Cache-MSP instance" -"2019-05-02 01:30:30.694 UTC [msp] Setup -> DEBU 154 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:30.694 UTC [msp.identity] newIdentity -> DEBU 155 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.202 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0f7 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:06.202 UTC [msp] Validate -> DEBU 0f8 MSP Org2MSP validating identity" +"2019-05-02 09:27:06.202 UTC [msp] getCertificationChain -> DEBU 0f9 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:06.202 UTC [msp] hasOURole -> DEBU 0fa MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:06.202 UTC [msp] getCertificationChain -> DEBU 0fb MSP Org2MSP getting certification chain" +"2019-05-02 09:27:06.202 UTC [msp] Setup -> DEBU 0fc Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:06.202 UTC [msp] Setup -> DEBU 0fd MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 0fe Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 0ff Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 100 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 101 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.202 UTC [policies] NewManagerImpl -> DEBU 102 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 103 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 104 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 105 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 106 Proposed new policy Admins for Channel/Consortiums" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 107 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 108 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 109 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10a Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10b Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10c Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10d Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 10e Proposed new policy Admins for Channel" +"2019-05-02 09:27:06.203 UTC [policies] GetPolicy -> DEBU 10f Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 110 Proposed new policy Readers for Channel" +"2019-05-02 09:27:06.203 UTC [policies] GetPolicy -> DEBU 111 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-05-02 09:27:06.203 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Writers for Channel" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 113 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 114 Adding to config map: [Group] /Channel/Consortiums" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 115 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 116 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 117 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 118 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 119 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-05-02 09:27:06.203 UTC [common.configtx] addToMap -> DEBU 11e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 11f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 120 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 121 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 122 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 123 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 124 Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 125 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 126 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:06.204 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:06.205 UTC [orderer.common.server] createLedgerFactory -> DEBU 13a Ledger dir: /var/hyperledger/production/orderer" +"2019-05-02 09:27:06.205 UTC [kvledger.util] CreateDirIfMissing -> DEBU 13b CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +"2019-05-02 09:27:06.205 UTC [kvledger.util] logDirStatus -> DEBU 13c Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +"2019-05-02 09:27:06.205 UTC [kvledger.util] logDirStatus -> DEBU 13d After creating dir - [/var/hyperledger/production/orderer/index/] exists" +"2019-05-02 09:27:06.231 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 13e Bootstrapping because no existing chains" +"2019-05-02 09:27:06.232 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 13f Selected bootstrap block, because system channel last config block is nil" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 140 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141 Processing field: HashingAlgorithm" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142 Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 143 Processing field: OrdererAddresses" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 144 Processing field: Consortium" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 145 Processing field: Capabilities" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 146 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 147 Processing field: ConsensusType" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 148 Processing field: BatchSize" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 149 Processing field: BatchTimeout" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14a Processing field: KafkaBrokers" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14b Processing field: ChannelRestrictions" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14c Processing field: Capabilities" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 14d Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e Processing field: Endpoints" +"2019-05-02 09:27:06.235 UTC [common.channelconfig] NewStandardValues -> DEBU 14f Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.236 UTC [common.channelconfig] initializeProtosStruct -> DEBU 150 Processing field: MSP" +"2019-05-02 09:27:06.237 UTC [common.channelconfig] validateMSP -> DEBU 151 Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:06.237 UTC [msp] newBccspMsp -> DEBU 152 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.237 UTC [msp] New -> DEBU 153 Creating Cache-MSP instance" +"2019-05-02 09:27:06.237 UTC [msp] Setup -> DEBU 154 Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:06.238 UTC [msp.identity] newIdentity -> DEBU 155 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -569,7 +569,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:30.695 UTC [msp.identity] newIdentity -> DEBU 156 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.238 UTC [msp.identity] newIdentity -> DEBU 156 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -582,16 +582,16 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.695 UTC [msp] Validate -> DEBU 157 MSP OrdererMSP validating identity" -"2019-05-02 01:30:30.695 UTC [common.channelconfig] NewStandardValues -> DEBU 158 Initializing protos for *channelconfig.ConsortiumProtos" -"2019-05-02 01:30:30.695 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159 Processing field: ChannelCreationPolicy" -"2019-05-02 01:30:30.695 UTC [common.channelconfig] NewStandardValues -> DEBU 15a Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.695 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b Processing field: MSP" -"2019-05-02 01:30:30.695 UTC [common.channelconfig] validateMSP -> DEBU 15c Setting up MSP for org Org1MSP" -"2019-05-02 01:30:30.695 UTC [msp] newBccspMsp -> DEBU 15d Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.695 UTC [msp] New -> DEBU 15e Creating Cache-MSP instance" -"2019-05-02 01:30:30.695 UTC [msp] Setup -> DEBU 15f Setting up MSP instance Org1MSP" -"2019-05-02 01:30:30.696 UTC [msp.identity] newIdentity -> DEBU 160 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.239 UTC [msp] Validate -> DEBU 157 MSP OrdererMSP validating identity" +"2019-05-02 09:27:06.239 UTC [common.channelconfig] NewStandardValues -> DEBU 158 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-05-02 09:27:06.239 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159 Processing field: ChannelCreationPolicy" +"2019-05-02 09:27:06.239 UTC [common.channelconfig] NewStandardValues -> DEBU 15a Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.239 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b Processing field: MSP" +"2019-05-02 09:27:06.239 UTC [common.channelconfig] validateMSP -> DEBU 15c Setting up MSP for org Org1MSP" +"2019-05-02 09:27:06.239 UTC [msp] newBccspMsp -> DEBU 15d Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.239 UTC [msp] New -> DEBU 15e Creating Cache-MSP instance" +"2019-05-02 09:27:06.239 UTC [msp] Setup -> DEBU 15f Setting up MSP instance Org1MSP" +"2019-05-02 09:27:06.240 UTC [msp.identity] newIdentity -> DEBU 160 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -606,7 +606,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:30.696 UTC [msp.identity] newIdentity -> DEBU 161 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.240 UTC [msp.identity] newIdentity -> DEBU 161 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -620,18 +620,18 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.696 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 162 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:30.696 UTC [msp] Validate -> DEBU 163 MSP Org1MSP validating identity" -"2019-05-02 01:30:30.696 UTC [msp] getCertificationChain -> DEBU 164 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:30.696 UTC [msp] hasOURole -> DEBU 165 MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:30.696 UTC [msp] getCertificationChain -> DEBU 166 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:30.697 UTC [common.channelconfig] NewStandardValues -> DEBU 167 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.697 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: MSP" -"2019-05-02 01:30:30.697 UTC [common.channelconfig] validateMSP -> DEBU 169 Setting up MSP for org Org2MSP" -"2019-05-02 01:30:30.697 UTC [msp] newBccspMsp -> DEBU 16a Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.697 UTC [msp] New -> DEBU 16b Creating Cache-MSP instance" -"2019-05-02 01:30:30.697 UTC [msp] Setup -> DEBU 16c Setting up MSP instance Org2MSP" -"2019-05-02 01:30:30.697 UTC [msp.identity] newIdentity -> DEBU 16d Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.259 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 162 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:06.259 UTC [msp] Validate -> DEBU 163 MSP Org1MSP validating identity" +"2019-05-02 09:27:06.261 UTC [msp] getCertificationChain -> DEBU 164 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:06.261 UTC [msp] hasOURole -> DEBU 165 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:06.261 UTC [msp] getCertificationChain -> DEBU 166 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:06.263 UTC [common.channelconfig] NewStandardValues -> DEBU 167 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: MSP" +"2019-05-02 09:27:06.263 UTC [common.channelconfig] validateMSP -> DEBU 169 Setting up MSP for org Org2MSP" +"2019-05-02 09:27:06.263 UTC [msp] newBccspMsp -> DEBU 16a Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.263 UTC [msp] New -> DEBU 16b Creating Cache-MSP instance" +"2019-05-02 09:27:06.263 UTC [msp] Setup -> DEBU 16c Setting up MSP instance Org2MSP" +"2019-05-02 09:27:06.264 UTC [msp.identity] newIdentity -> DEBU 16d Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -646,7 +646,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.697 UTC [msp.identity] newIdentity -> DEBU 16e Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.264 UTC [msp.identity] newIdentity -> DEBU 16e Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -660,115 +660,115 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.698 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16f Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:30.698 UTC [msp] Validate -> DEBU 170 MSP Org2MSP validating identity" -"2019-05-02 01:30:30.698 UTC [msp] getCertificationChain -> DEBU 171 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:30.698 UTC [msp] hasOURole -> DEBU 172 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:30.698 UTC [msp] getCertificationChain -> DEBU 173 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:30.698 UTC [msp] Setup -> DEBU 174 Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:30.698 UTC [msp] Setup -> DEBU 175 MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 176 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 177 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 178 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 179 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 17a Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 17b Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 17c Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:30.698 UTC [policies] NewManagerImpl -> DEBU 17d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 181 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 183 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 185 Proposed new policy Admins for Channel/Consortiums" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 186 Proposed new policy Admins for Channel" -"2019-05-02 01:30:30.699 UTC [policies] GetPolicy -> DEBU 187 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 188 Proposed new policy Readers for Channel" -"2019-05-02 01:30:30.699 UTC [policies] GetPolicy -> DEBU 189 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -"2019-05-02 01:30:30.699 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Writers for Channel" -"2019-05-02 01:30:30.699 UTC [common.configtx] addToMap -> DEBU 18b Adding to config map: [Group] /Channel" -"2019-05-02 01:30:30.699 UTC [common.configtx] addToMap -> DEBU 18c Adding to config map: [Group] /Channel/Consortiums" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 18d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 18e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 18f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 190 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 191 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 192 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Policy] /Channel/Consortiums/Admins" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:30.700 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:30.701 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:30.701 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b2 Obtaining default signing identity" -"2019-05-02 01:30:30.714 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1b3 Booted with a genesis block, replication isn't an option" -"2019-05-02 01:30:30.732 UTC [orderer.common.server] initializeServerConfig -> INFO 1b4 Starting orderer with TLS enabled" -"2019-05-02 01:30:30.733 UTC [orderer.common.server] configureClusterListener -> INFO 1b5 Cluster listener is not configured, defaulting to use the general listener on port 7050" -"2019-05-02 01:30:30.736 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1b6 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " -"2019-05-02 01:30:30.736 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1b7 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" -"2019-05-02 01:30:30.736 UTC [kvledger.util] logDirStatus -> DEBU 1b8 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" -"2019-05-02 01:30:30.736 UTC [kvledger.util] logDirStatus -> DEBU 1b9 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" -"2019-05-02 01:30:30.736 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ba Getting block information from block storage" -"2019-05-02 01:30:30.736 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bb Retrieving checkpoint info from block files" -"2019-05-02 01:30:30.737 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bc retrieveLastFileSuffix()" -"2019-05-02 01:30:30.737 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bd retrieveLastFileSuffix() - biggestFileNum = -1" -"2019-05-02 01:30:30.737 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1be Last file number found = -1" -"2019-05-02 01:30:30.737 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bf No block file found" -"2019-05-02 01:30:30.737 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1c0 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0003c4ba0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -"2019-05-02 01:30:30.742 UTC [fsblkstorage] newBlockIndex -> DEBU 1c1 newBlockIndex() - indexItems:[[BlockNum]]" -"2019-05-02 01:30:30.748 UTC [fsblkstorage] indexBlock -> DEBU 1c2 Indexing block [blockNum=0, blockHash=[]byte{0xea, 0xac, 0xc2, 0xd4, 0x83, 0xd6, 0xd8, 0xe7, 0x3f, 0x39, 0x9e, 0xc, 0x2c, 0xef, 0xff, 0xb5, 0x7b, 0x43, 0x9a, 0xce, 0xf6, 0x32, 0x71, 0x91, 0x54, 0x49, 0x8b, 0xa7, 0xc7, 0x38, 0x3e, 0xb1} txOffsets= -txId=cb62c9396856dd18a3dd67c3707e8a29cd0e1b9a900cf1444524dcd70fb6cffd locPointer=offset=39, bytesLength=18371 +"2019-05-02 09:27:06.265 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16f Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:06.265 UTC [msp] Validate -> DEBU 170 MSP Org2MSP validating identity" +"2019-05-02 09:27:06.265 UTC [msp] getCertificationChain -> DEBU 171 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:06.266 UTC [msp] hasOURole -> DEBU 172 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:06.270 UTC [msp] getCertificationChain -> DEBU 173 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:06.271 UTC [msp] Setup -> DEBU 174 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:06.271 UTC [msp] Setup -> DEBU 175 MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:06.271 UTC [policies] NewManagerImpl -> DEBU 176 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.273 UTC [policies] NewManagerImpl -> DEBU 177 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.275 UTC [policies] NewManagerImpl -> DEBU 178 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 179 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17a Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17b Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17c Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.276 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 181 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 183 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 185 Proposed new policy Admins for Channel/Consortiums" +"2019-05-02 09:27:06.277 UTC [policies] GetPolicy -> DEBU 186 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-05-02 09:27:06.277 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Readers for Channel" +"2019-05-02 09:27:06.277 UTC [policies] GetPolicy -> DEBU 188 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-05-02 09:27:06.278 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Writers for Channel" +"2019-05-02 09:27:06.278 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Admins for Channel" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18b Adding to config map: [Group] /Channel" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18c Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 18f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 190 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 191 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 192 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:06.278 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Group] /Channel/Consortiums" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-05-02 09:27:06.279 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:06.280 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:06.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b2 Obtaining default signing identity" +"2019-05-02 09:27:06.295 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1b3 Booted with a genesis block, replication isn't an option" +"2019-05-02 09:27:06.312 UTC [orderer.common.server] initializeServerConfig -> INFO 1b4 Starting orderer with TLS enabled" +"2019-05-02 09:27:06.313 UTC [orderer.common.server] configureClusterListener -> INFO 1b5 Cluster listener is not configured, defaulting to use the general listener on port 7050" +"2019-05-02 09:27:06.316 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1b6 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +"2019-05-02 09:27:06.316 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1b7 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +"2019-05-02 09:27:06.316 UTC [kvledger.util] logDirStatus -> DEBU 1b8 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +"2019-05-02 09:27:06.316 UTC [kvledger.util] logDirStatus -> DEBU 1b9 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +"2019-05-02 09:27:06.316 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ba Getting block information from block storage" +"2019-05-02 09:27:06.316 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bb Retrieving checkpoint info from block files" +"2019-05-02 09:27:06.316 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bc retrieveLastFileSuffix()" +"2019-05-02 09:27:06.316 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bd retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-05-02 09:27:06.316 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1be Last file number found = -1" +"2019-05-02 09:27:06.317 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bf No block file found" +"2019-05-02 09:27:06.317 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1c0 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0003f28a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-05-02 09:27:06.322 UTC [fsblkstorage] newBlockIndex -> DEBU 1c1 newBlockIndex() - indexItems:[[BlockNum]]" +"2019-05-02 09:27:06.327 UTC [fsblkstorage] indexBlock -> DEBU 1c2 Indexing block [blockNum=0, blockHash=[]byte{0x90, 0xf3, 0x5b, 0xf6, 0x65, 0xcc, 0xb0, 0x39, 0x2, 0xab, 0x1f, 0x8, 0xbd, 0x90, 0x1c, 0xde, 0x6b, 0xcd, 0x74, 0xd9, 0xda, 0x8f, 0xbb, 0xba, 0xde, 0x4c, 0x4b, 0x31, 0xcd, 0x28, 0x3, 0x78} txOffsets= +txId=10ff1805e27e581e5aec2a19a7560dc3993ce3082d43b002f1bc22be30f352f1 locPointer=offset=39, bytesLength=18371 ]" -"2019-05-02 01:30:30.751 UTC [fsblkstorage] updateCheckpoint -> DEBU 1c3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18415], isChainEmpty=[false], lastBlockNumber=[0]" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] NewStandardValues -> DEBU 1c4 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: HashingAlgorithm" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: OrdererAddresses" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c8 Processing field: Consortium" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: Capabilities" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] NewStandardValues -> DEBU 1ca Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: ConsensusType" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: BatchSize" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: BatchTimeout" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: KafkaBrokers" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: ChannelRestrictions" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Capabilities" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: Endpoints" -"2019-05-02 01:30:30.752 UTC [common.channelconfig] NewStandardValues -> DEBU 1d3 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: MSP" -"2019-05-02 01:30:30.753 UTC [common.channelconfig] validateMSP -> DEBU 1d5 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:30.753 UTC [msp] newBccspMsp -> DEBU 1d6 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.753 UTC [msp] New -> DEBU 1d7 Creating Cache-MSP instance" -"2019-05-02 01:30:30.753 UTC [msp] Setup -> DEBU 1d8 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:30.753 UTC [msp.identity] newIdentity -> DEBU 1d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.331 UTC [fsblkstorage] updateCheckpoint -> DEBU 1c3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18415], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] NewStandardValues -> DEBU 1c4 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: HashingAlgorithm" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: OrdererAddresses" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c8 Processing field: Consortium" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: Capabilities" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] NewStandardValues -> DEBU 1ca Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: ConsensusType" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: BatchSize" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: BatchTimeout" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: KafkaBrokers" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: ChannelRestrictions" +"2019-05-02 09:27:06.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Capabilities" +"2019-05-02 09:27:06.333 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:06.333 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: Endpoints" +"2019-05-02 09:27:06.333 UTC [common.channelconfig] NewStandardValues -> DEBU 1d3 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.333 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: MSP" +"2019-05-02 09:27:06.333 UTC [common.channelconfig] validateMSP -> DEBU 1d5 Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:06.334 UTC [msp] newBccspMsp -> DEBU 1d6 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.334 UTC [msp] New -> DEBU 1d7 Creating Cache-MSP instance" +"2019-05-02 09:27:06.334 UTC [msp] Setup -> DEBU 1d8 Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:06.335 UTC [msp.identity] newIdentity -> DEBU 1d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -782,7 +782,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:30.754 UTC [msp.identity] newIdentity -> DEBU 1da Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.335 UTC [msp.identity] newIdentity -> DEBU 1da Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -795,16 +795,16 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.754 UTC [msp] Validate -> DEBU 1db MSP OrdererMSP validating identity" -"2019-05-02 01:30:30.754 UTC [common.channelconfig] NewStandardValues -> DEBU 1dc Initializing protos for *channelconfig.ConsortiumProtos" -"2019-05-02 01:30:30.755 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ChannelCreationPolicy" -"2019-05-02 01:30:30.755 UTC [common.channelconfig] NewStandardValues -> DEBU 1de Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.755 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1df Processing field: MSP" -"2019-05-02 01:30:30.755 UTC [common.channelconfig] validateMSP -> DEBU 1e0 Setting up MSP for org Org1MSP" -"2019-05-02 01:30:30.755 UTC [msp] newBccspMsp -> DEBU 1e1 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.755 UTC [msp] New -> DEBU 1e2 Creating Cache-MSP instance" -"2019-05-02 01:30:30.755 UTC [msp] Setup -> DEBU 1e3 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:30.756 UTC [msp.identity] newIdentity -> DEBU 1e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.335 UTC [msp] Validate -> DEBU 1db MSP OrdererMSP validating identity" +"2019-05-02 09:27:06.335 UTC [common.channelconfig] NewStandardValues -> DEBU 1dc Initializing protos for *channelconfig.ConsortiumProtos" +"2019-05-02 09:27:06.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ChannelCreationPolicy" +"2019-05-02 09:27:06.335 UTC [common.channelconfig] NewStandardValues -> DEBU 1de Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1df Processing field: MSP" +"2019-05-02 09:27:06.336 UTC [common.channelconfig] validateMSP -> DEBU 1e0 Setting up MSP for org Org1MSP" +"2019-05-02 09:27:06.336 UTC [msp] newBccspMsp -> DEBU 1e1 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.336 UTC [msp] New -> DEBU 1e2 Creating Cache-MSP instance" +"2019-05-02 09:27:06.336 UTC [msp] Setup -> DEBU 1e3 Setting up MSP instance Org1MSP" +"2019-05-02 09:27:06.336 UTC [msp.identity] newIdentity -> DEBU 1e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -819,7 +819,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:30.757 UTC [msp.identity] newIdentity -> DEBU 1e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.336 UTC [msp.identity] newIdentity -> DEBU 1e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -833,18 +833,18 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.758 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e6 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:30.758 UTC [msp] Validate -> DEBU 1e7 MSP Org1MSP validating identity" -"2019-05-02 01:30:30.758 UTC [msp] getCertificationChain -> DEBU 1e8 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:30.758 UTC [msp] hasOURole -> DEBU 1e9 MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:30.758 UTC [msp] getCertificationChain -> DEBU 1ea MSP Org1MSP getting certification chain" -"2019-05-02 01:30:30.759 UTC [common.channelconfig] NewStandardValues -> DEBU 1eb Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.759 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ec Processing field: MSP" -"2019-05-02 01:30:30.759 UTC [common.channelconfig] validateMSP -> DEBU 1ed Setting up MSP for org Org2MSP" -"2019-05-02 01:30:30.759 UTC [msp] newBccspMsp -> DEBU 1ee Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.759 UTC [msp] New -> DEBU 1ef Creating Cache-MSP instance" -"2019-05-02 01:30:30.759 UTC [msp] Setup -> DEBU 1f0 Setting up MSP instance Org2MSP" -"2019-05-02 01:30:30.759 UTC [msp.identity] newIdentity -> DEBU 1f1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.336 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e6 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:06.336 UTC [msp] Validate -> DEBU 1e7 MSP Org1MSP validating identity" +"2019-05-02 09:27:06.337 UTC [msp] getCertificationChain -> DEBU 1e8 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:06.337 UTC [msp] hasOURole -> DEBU 1e9 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:06.337 UTC [msp] getCertificationChain -> DEBU 1ea MSP Org1MSP getting certification chain" +"2019-05-02 09:27:06.337 UTC [common.channelconfig] NewStandardValues -> DEBU 1eb Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.337 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ec Processing field: MSP" +"2019-05-02 09:27:06.337 UTC [common.channelconfig] validateMSP -> DEBU 1ed Setting up MSP for org Org2MSP" +"2019-05-02 09:27:06.337 UTC [msp] newBccspMsp -> DEBU 1ee Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.337 UTC [msp] New -> DEBU 1ef Creating Cache-MSP instance" +"2019-05-02 09:27:06.337 UTC [msp] Setup -> DEBU 1f0 Setting up MSP instance Org2MSP" +"2019-05-02 09:27:06.337 UTC [msp.identity] newIdentity -> DEBU 1f1 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -859,7 +859,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.760 UTC [msp.identity] newIdentity -> DEBU 1f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.338 UTC [msp.identity] newIdentity -> DEBU 1f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -873,105 +873,105 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.760 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1f3 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:30.760 UTC [msp] Validate -> DEBU 1f4 MSP Org2MSP validating identity" -"2019-05-02 01:30:30.761 UTC [msp] getCertificationChain -> DEBU 1f5 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:30.761 UTC [msp] hasOURole -> DEBU 1f6 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:30.761 UTC [msp] getCertificationChain -> DEBU 1f7 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:30.761 UTC [msp] Setup -> DEBU 1f8 Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:30.761 UTC [msp] Setup -> DEBU 1f9 MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:30.761 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.761 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.761 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 205 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 206 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 208 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 209 Proposed new policy Admins for Channel/Consortiums" -"2019-05-02 01:30:30.762 UTC [policies] GetPolicy -> DEBU 20a Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 20b Proposed new policy Writers for Channel" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 20c Proposed new policy Admins for Channel" -"2019-05-02 01:30:30.762 UTC [policies] GetPolicy -> DEBU 20d Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -"2019-05-02 01:30:30.762 UTC [policies] NewManagerImpl -> DEBU 20e Proposed new policy Readers for Channel" -"2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Group] /Channel" -"2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:30.763 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Group] /Channel/Consortiums" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.764 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -"2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -"2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -"2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -"2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -"2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -"2019-05-02 01:30:30.765 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Consortiums/Admins" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:30.766 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:30.767 UTC [fsblkstorage] Next -> DEBU 236 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-05-02 01:30:30.767 UTC [fsblkstorage] newBlockfileStream -> DEBU 237 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-05-02 01:30:30.767 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 238 Remaining bytes=[18415], Going to peek [8] bytes" -"2019-05-02 01:30:30.767 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 239 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:30:30.767 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23a blockbytes [18412] read from file [0]" -"2019-05-02 01:30:30.768 UTC [fsblkstorage] Next -> DEBU 23b Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-05-02 01:30:30.768 UTC [fsblkstorage] newBlockfileStream -> DEBU 23c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-05-02 01:30:30.768 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23d Remaining bytes=[18415], Going to peek [8] bytes" -"2019-05-02 01:30:30.768 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23e Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:30:30.768 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23f blockbytes [18412] read from file [0]" -"2019-05-02 01:30:30.768 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:30.768 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: HashingAlgorithm" -"2019-05-02 01:30:30.768 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:30.768 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: OrdererAddresses" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: Consortium" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: Capabilities" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: ConsensusType" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: BatchSize" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: BatchTimeout" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: KafkaBrokers" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: ChannelRestrictions" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24c Processing field: Capabilities" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: Endpoints" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] NewStandardValues -> DEBU 24f Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: MSP" -"2019-05-02 01:30:30.769 UTC [common.channelconfig] validateMSP -> DEBU 251 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:30.770 UTC [msp] newBccspMsp -> DEBU 252 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.770 UTC [msp] New -> DEBU 253 Creating Cache-MSP instance" -"2019-05-02 01:30:30.770 UTC [msp] Setup -> DEBU 254 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:30.770 UTC [msp.identity] newIdentity -> DEBU 255 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.338 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1f3 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:06.338 UTC [msp] Validate -> DEBU 1f4 MSP Org2MSP validating identity" +"2019-05-02 09:27:06.338 UTC [msp] getCertificationChain -> DEBU 1f5 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:06.338 UTC [msp] hasOURole -> DEBU 1f6 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:06.338 UTC [msp] getCertificationChain -> DEBU 1f7 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:06.339 UTC [msp] Setup -> DEBU 1f8 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:06.339 UTC [msp] Setup -> DEBU 1f9 MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 205 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.339 UTC [policies] NewManagerImpl -> DEBU 206 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 208 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 209 Proposed new policy Admins for Channel/Consortiums" +"2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 20a Proposed new policy Admins for Channel" +"2019-05-02 09:27:06.340 UTC [policies] GetPolicy -> DEBU 20b Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 20c Proposed new policy Readers for Channel" +"2019-05-02 09:27:06.340 UTC [policies] GetPolicy -> DEBU 20d Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-05-02 09:27:06.340 UTC [policies] NewManagerImpl -> DEBU 20e Proposed new policy Writers for Channel" +"2019-05-02 09:27:06.340 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Group] /Channel" +"2019-05-02 09:27:06.340 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:06.340 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.350 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:06.350 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:06.350 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Group] /Channel/Consortiums" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-05-02 09:27:06.351 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:06.352 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:06.352 UTC [fsblkstorage] Next -> DEBU 236 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-05-02 09:27:06.353 UTC [fsblkstorage] newBlockfileStream -> DEBU 237 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 238 Remaining bytes=[18415], Going to peek [8] bytes" +"2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 239 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23a blockbytes [18412] read from file [0]" +"2019-05-02 09:27:06.353 UTC [fsblkstorage] Next -> DEBU 23b Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-05-02 09:27:06.353 UTC [fsblkstorage] newBlockfileStream -> DEBU 23c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23d Remaining bytes=[18415], Going to peek [8] bytes" +"2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23e Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:06.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23f blockbytes [18412] read from file [0]" +"2019-05-02 09:27:06.353 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: HashingAlgorithm" +"2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: OrdererAddresses" +"2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: Consortium" +"2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: Capabilities" +"2019-05-02 09:27:06.353 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:06.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: ConsensusType" +"2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: BatchSize" +"2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: BatchTimeout" +"2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: KafkaBrokers" +"2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: ChannelRestrictions" +"2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24c Processing field: Capabilities" +"2019-05-02 09:27:06.354 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: Endpoints" +"2019-05-02 09:27:06.354 UTC [common.channelconfig] NewStandardValues -> DEBU 24f Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: MSP" +"2019-05-02 09:27:06.354 UTC [common.channelconfig] validateMSP -> DEBU 251 Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:06.354 UTC [msp] newBccspMsp -> DEBU 252 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.354 UTC [msp] New -> DEBU 253 Creating Cache-MSP instance" +"2019-05-02 09:27:06.354 UTC [msp] Setup -> DEBU 254 Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:06.354 UTC [msp.identity] newIdentity -> DEBU 255 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -985,7 +985,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:30.770 UTC [msp.identity] newIdentity -> DEBU 256 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.354 UTC [msp.identity] newIdentity -> DEBU 256 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -998,16 +998,56 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.771 UTC [msp] Validate -> DEBU 257 MSP OrdererMSP validating identity" -"2019-05-02 01:30:30.771 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.ConsortiumProtos" -"2019-05-02 01:30:30.771 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: ChannelCreationPolicy" -"2019-05-02 01:30:30.771 UTC [common.channelconfig] NewStandardValues -> DEBU 25a Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.771 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: MSP" -"2019-05-02 01:30:30.771 UTC [common.channelconfig] validateMSP -> DEBU 25c Setting up MSP for org Org1MSP" -"2019-05-02 01:30:30.771 UTC [msp] newBccspMsp -> DEBU 25d Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.771 UTC [msp] New -> DEBU 25e Creating Cache-MSP instance" -"2019-05-02 01:30:30.772 UTC [msp] Setup -> DEBU 25f Setting up MSP instance Org1MSP" -"2019-05-02 01:30:30.772 UTC [msp.identity] newIdentity -> DEBU 260 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.363 UTC [msp] Validate -> DEBU 257 MSP OrdererMSP validating identity" +"2019-05-02 09:27:06.363 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-05-02 09:27:06.363 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: ChannelCreationPolicy" +"2019-05-02 09:27:06.363 UTC [common.channelconfig] NewStandardValues -> DEBU 25a Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.363 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: MSP" +"2019-05-02 09:27:06.363 UTC [common.channelconfig] validateMSP -> DEBU 25c Setting up MSP for org Org2MSP" +"2019-05-02 09:27:06.363 UTC [msp] newBccspMsp -> DEBU 25d Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.364 UTC [msp] New -> DEBU 25e Creating Cache-MSP instance" +"2019-05-02 09:27:06.364 UTC [msp] Setup -> DEBU 25f Setting up MSP instance Org2MSP" +"2019-05-02 09:27:06.364 UTC [msp.identity] newIdentity -> DEBU 260 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-05-02 09:27:06.364 UTC [msp.identity] newIdentity -> DEBU 261 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:06.365 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 262 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:06.365 UTC [msp] Validate -> DEBU 263 MSP Org2MSP validating identity" +"2019-05-02 09:27:06.365 UTC [msp] getCertificationChain -> DEBU 264 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:06.365 UTC [msp] hasOURole -> DEBU 265 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:06.365 UTC [msp] getCertificationChain -> DEBU 266 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:06.365 UTC [common.channelconfig] NewStandardValues -> DEBU 267 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:06.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU 268 Processing field: MSP" +"2019-05-02 09:27:06.365 UTC [common.channelconfig] validateMSP -> DEBU 269 Setting up MSP for org Org1MSP" +"2019-05-02 09:27:06.365 UTC [msp] newBccspMsp -> DEBU 26a Creating BCCSP-based MSP instance" +"2019-05-02 09:27:06.365 UTC [msp] New -> DEBU 26b Creating Cache-MSP instance" +"2019-05-02 09:27:06.366 UTC [msp] Setup -> DEBU 26c Setting up MSP instance Org1MSP" +"2019-05-02 09:27:06.366 UTC [msp.identity] newIdentity -> DEBU 26d Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1022,7 +1062,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:30.772 UTC [msp.identity] newIdentity -> DEBU 261 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.366 UTC [msp.identity] newIdentity -> DEBU 26e Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1036,158 +1076,118 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:30.773 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 262 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:30.773 UTC [msp] Validate -> DEBU 263 MSP Org1MSP validating identity" -"2019-05-02 01:30:30.773 UTC [msp] getCertificationChain -> DEBU 264 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:30.773 UTC [msp] hasOURole -> DEBU 265 MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:30.773 UTC [msp] getCertificationChain -> DEBU 266 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:30.774 UTC [common.channelconfig] NewStandardValues -> DEBU 267 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:30.774 UTC [common.channelconfig] initializeProtosStruct -> DEBU 268 Processing field: MSP" -"2019-05-02 01:30:30.774 UTC [common.channelconfig] validateMSP -> DEBU 269 Setting up MSP for org Org2MSP" -"2019-05-02 01:30:30.774 UTC [msp] newBccspMsp -> DEBU 26a Creating BCCSP-based MSP instance" -"2019-05-02 01:30:30.774 UTC [msp] New -> DEBU 26b Creating Cache-MSP instance" -"2019-05-02 01:30:30.774 UTC [msp] Setup -> DEBU 26c Setting up MSP instance Org2MSP" -"2019-05-02 01:30:30.774 UTC [msp.identity] newIdentity -> DEBU 26d Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-05-02 01:30:30.774 UTC [msp.identity] newIdentity -> DEBU 26e Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-05-02 01:30:30.775 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 26f Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:30.775 UTC [msp] Validate -> DEBU 270 MSP Org2MSP validating identity" -"2019-05-02 01:30:30.775 UTC [msp] getCertificationChain -> DEBU 271 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:30.775 UTC [msp] hasOURole -> DEBU 272 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:30.775 UTC [msp] getCertificationChain -> DEBU 273 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:30.776 UTC [msp] Setup -> DEBU 274 Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:30.776 UTC [msp] Setup -> DEBU 275 MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 285 Proposed new policy Admins for Channel/Consortiums" -"2019-05-02 01:30:30.776 UTC [policies] GetPolicy -> DEBU 286 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -"2019-05-02 01:30:30.776 UTC [policies] NewManagerImpl -> DEBU 287 Proposed new policy Writers for Channel" -"2019-05-02 01:30:30.777 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy Admins for Channel" -"2019-05-02 01:30:30.777 UTC [policies] GetPolicy -> DEBU 289 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -"2019-05-02 01:30:30.777 UTC [policies] NewManagerImpl -> DEBU 28a Proposed new policy Readers for Channel" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Group] /Channel/Consortiums" -"2019-05-02 01:30:30.777 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Consortiums/Admins" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:30.778 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:30.779 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:30.779 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:30.779 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:30.779 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b2 As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:30:30.779 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b3 As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b4 Manager Channel looking up path [Application]" -"2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b5 Manager Channel has managers Orderer" -"2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b6 Manager Channel has managers Consortiums" -"2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b7 Manager Channel looking up path [Orderer]" -"2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b8 Manager Channel has managers Orderer" -"2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2b9 Manager Channel has managers Consortiums" -"2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2ba Manager Channel/Orderer looking up path []" -"2019-05-02 01:30:30.779 UTC [policies] Manager -> DEBU 2bb Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:30:30.779 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:30:30.779 UTC [common.capabilities] Supported -> DEBU 2bd Orderer capability V2_0 is supported and is enabled" -"2019-05-02 01:30:30.779 UTC [common.capabilities] Supported -> DEBU 2be Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:30.779 UTC [orderer.common.server] func1 -> DEBU 2bf Executing callback to update root CAs" -"2019-05-02 01:30:30.780 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c0 updating root CAs for channel [testchainid]" -"2019-05-02 01:30:30.780 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c1 adding app root CAs for MSP [Org1MSP]" -"2019-05-02 01:30:30.780 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c2 adding app root CAs for MSP [Org2MSP]" -"2019-05-02 01:30:30.780 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c3 adding orderer root CAs for MSP [OrdererMSP]" -"2019-05-02 01:30:30.780 UTC [fsblkstorage] Next -> DEBU 2c4 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-05-02 01:30:30.780 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-05-02 01:30:30.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 Remaining bytes=[18415], Going to peek [8] bytes" -"2019-05-02 01:30:30.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c7 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:30:30.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c8 blockbytes [18412] read from file [0]" -"2019-05-02 01:30:30.780 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2c9 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" -"2019-05-02 01:30:30.780 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2ca EvictionSuspicion not set, defaulting to 10m0s" -"2019-05-02 01:30:30.781 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cb No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 -"2019-05-02 01:30:30.781 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2cc No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 -"2019-05-02 01:30:30.808 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2cd Loading WAL at Term 0 and Index 0" channel=testchainid node=1 -"2019-05-02 01:30:30.812 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ce Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 -"2019-05-02 01:30:30.812 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cf Appending 0 entries to memory storage" channel=testchainid node=1 -"2019-05-02 01:30:30.813 UTC [fsblkstorage] Next -> DEBU 2d0 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-05-02 01:30:30.813 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-05-02 01:30:30.813 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d2 Remaining bytes=[18415], Going to peek [8] bytes" -"2019-05-02 01:30:30.813 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d3 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:30:30.814 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d4 blockbytes [18412] read from file [0]" -"2019-05-02 01:30:30.814 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2d5 [channel: testchainid] Done creating channel support resources" -"2019-05-02 01:30:30.815 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2d6 Creating system channel msg processor for channel testchainid" -"2019-05-02 01:30:30.815 UTC [fsblkstorage] Next -> DEBU 2d7 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-05-02 01:30:30.816 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-05-02 01:30:30.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d9 Remaining bytes=[18415], Going to peek [8] bytes" -"2019-05-02 01:30:30.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2da Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:30:30.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2db blockbytes [18412] read from file [0]" -"2019-05-02 01:30:30.816 UTC [orderer.commmon.multichannel] Initialize -> INFO 2dc Starting system channel 'testchainid' with genesis block hash eaacc2d483d6d8e73f399e0c2cefffb57b439acef632719154498ba7c7383eb1 and orderer type etcdraft" -"2019-05-02 01:30:30.816 UTC [orderer.consensus.etcdraft] Start -> INFO 2dd Starting Raft node" channel=testchainid node=1 -"2019-05-02 01:30:30.816 UTC [orderer.common.cluster] Configure -> INFO 2de Entering, channel: testchainid, nodes: [ID: 2, +"2019-05-02 09:27:06.367 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 26f Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:06.367 UTC [msp] Validate -> DEBU 270 MSP Org1MSP validating identity" +"2019-05-02 09:27:06.367 UTC [msp] getCertificationChain -> DEBU 271 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:06.367 UTC [msp] hasOURole -> DEBU 272 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:06.367 UTC [msp] getCertificationChain -> DEBU 273 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:06.367 UTC [msp] Setup -> DEBU 274 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:06.367 UTC [msp] Setup -> DEBU 275 MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:06.367 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 285 Proposed new policy Admins for Channel/Consortiums" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 286 Proposed new policy Admins for Channel" +"2019-05-02 09:27:06.368 UTC [policies] GetPolicy -> DEBU 287 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy Readers for Channel" +"2019-05-02 09:27:06.368 UTC [policies] GetPolicy -> DEBU 289 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-05-02 09:27:06.368 UTC [policies] NewManagerImpl -> DEBU 28a Proposed new policy Writers for Channel" +"2019-05-02 09:27:06.368 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel" +"2019-05-02 09:27:06.368 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:06.369 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Group] /Channel/Consortiums" +"2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-05-02 09:27:06.370 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:06.376 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:06.377 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:06.377 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:06.377 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b2 As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:27:06.377 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b3 As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b4 Manager Channel looking up path [Application]" +"2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b5 Manager Channel has managers Orderer" +"2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b6 Manager Channel has managers Consortiums" +"2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b7 Manager Channel looking up path [Orderer]" +"2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b8 Manager Channel has managers Orderer" +"2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2b9 Manager Channel has managers Consortiums" +"2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2ba Manager Channel/Orderer looking up path []" +"2019-05-02 09:27:06.377 UTC [policies] Manager -> DEBU 2bb Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:27:06.377 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:27:06.377 UTC [common.capabilities] Supported -> DEBU 2bd Orderer capability V2_0 is supported and is enabled" +"2019-05-02 09:27:06.377 UTC [common.capabilities] Supported -> DEBU 2be Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:06.377 UTC [orderer.common.server] func1 -> DEBU 2bf Executing callback to update root CAs" +"2019-05-02 09:27:06.377 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c0 updating root CAs for channel [testchainid]" +"2019-05-02 09:27:06.378 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c1 adding app root CAs for MSP [Org1MSP]" +"2019-05-02 09:27:06.378 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c2 adding orderer root CAs for MSP [OrdererMSP]" +"2019-05-02 09:27:06.378 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c3 adding app root CAs for MSP [Org2MSP]" +"2019-05-02 09:27:06.378 UTC [fsblkstorage] Next -> DEBU 2c4 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-05-02 09:27:06.378 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:06.378 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 Remaining bytes=[18415], Going to peek [8] bytes" +"2019-05-02 09:27:06.378 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c7 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:06.378 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c8 blockbytes [18412] read from file [0]" +"2019-05-02 09:27:06.379 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2c9 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +"2019-05-02 09:27:06.379 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2ca EvictionSuspicion not set, defaulting to 10m0s" +"2019-05-02 09:27:06.379 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cb No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +"2019-05-02 09:27:06.379 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2cc No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +"2019-05-02 09:27:06.396 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2cd Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +"2019-05-02 09:27:06.397 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ce Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +"2019-05-02 09:27:06.397 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cf Appending 0 entries to memory storage" channel=testchainid node=1 +"2019-05-02 09:27:06.397 UTC [fsblkstorage] Next -> DEBU 2d0 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-05-02 09:27:06.397 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:06.397 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d2 Remaining bytes=[18415], Going to peek [8] bytes" +"2019-05-02 09:27:06.397 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d3 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:06.397 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d4 blockbytes [18412] read from file [0]" +"2019-05-02 09:27:06.397 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2d5 [channel: testchainid] Done creating channel support resources" +"2019-05-02 09:27:06.398 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2d6 Creating system channel msg processor for channel testchainid" +"2019-05-02 09:27:06.398 UTC [fsblkstorage] Next -> DEBU 2d7 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-05-02 09:27:06.398 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:06.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d9 Remaining bytes=[18415], Going to peek [8] bytes" +"2019-05-02 09:27:06.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2da Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:06.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2db blockbytes [18412] read from file [0]" +"2019-05-02 09:27:06.398 UTC [orderer.commmon.multichannel] Initialize -> INFO 2dc Starting system channel 'testchainid' with genesis block hash 90f35bf665ccb03902ab1f08bd901cde6bcd74d9da8fbbbade4c4b31cd280378 and orderer type etcdraft" +"2019-05-02 09:27:06.398 UTC [orderer.consensus.etcdraft] Start -> INFO 2dd Starting Raft node" channel=testchainid node=1 +"2019-05-02 09:27:06.398 UTC [orderer.common.cluster] Configure -> INFO 2de Entering, channel: testchainid, nodes: [ID: 2, Endpoint: orderer1.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL @@ -1252,9 +1252,9 @@ hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -----END CERTIFICATE----- ]" -"2019-05-02 01:30:30.816 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2df Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" -"2019-05-02 01:30:30.817 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e0 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" -"2019-05-02 01:30:30.817 UTC [orderer.common.cluster] func1 -> DEBU 2e1 Connecting to ID: 2, +"2019-05-02 09:27:06.398 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2df Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +"2019-05-02 09:27:06.398 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e0 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-05-02 09:27:06.398 UTC [orderer.common.cluster] func1 -> DEBU 2e1 Connecting to ID: 2, Endpoint: orderer1.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL @@ -1287,13 +1287,13 @@ hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -----END CERTIFICATE----- for channel testchainid" -"2019-05-02 01:30:30.817 UTC [grpc] DialContext -> DEBU 2e2 parsed scheme: """ -"2019-05-02 01:30:30.817 UTC [grpc] DialContext -> DEBU 2e3 scheme "" not registered, fallback to default scheme" -"2019-05-02 01:30:30.817 UTC [grpc] UpdateState -> DEBU 2e4 ccResolverWrapper: sending update to cc: {[{orderer1.example.com:7050 0 }] }" -"2019-05-02 01:30:30.817 UTC [grpc] switchBalancer -> DEBU 2e5 ClientConn switching balancer to "pick_first"" -"2019-05-02 01:30:30.818 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e6 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" -"2019-05-02 01:30:30.818 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e7 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" -"2019-05-02 01:30:30.818 UTC [orderer.common.cluster] func1 -> DEBU 2e8 Connecting to ID: 3, +"2019-05-02 09:27:06.399 UTC [grpc] DialContext -> DEBU 2e2 parsed scheme: """ +"2019-05-02 09:27:06.399 UTC [grpc] DialContext -> DEBU 2e3 scheme "" not registered, fallback to default scheme" +"2019-05-02 09:27:06.399 UTC [grpc] UpdateState -> DEBU 2e4 ccResolverWrapper: sending update to cc: {[{orderer1.example.com:7050 0 }] }" +"2019-05-02 09:27:06.399 UTC [grpc] switchBalancer -> DEBU 2e5 ClientConn switching balancer to "pick_first"" +"2019-05-02 09:27:06.399 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e6 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +"2019-05-02 09:27:06.399 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e7 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-05-02 09:27:06.399 UTC [orderer.common.cluster] func1 -> DEBU 2e8 Connecting to ID: 3, Endpoint: orderer2.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL @@ -1326,123 +1326,117 @@ hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -----END CERTIFICATE----- for channel testchainid" -"2019-05-02 01:30:30.819 UTC [grpc] DialContext -> DEBU 2e9 parsed scheme: """ -"2019-05-02 01:30:30.820 UTC [grpc] DialContext -> DEBU 2ea scheme "" not registered, fallback to default scheme" -"2019-05-02 01:30:30.822 UTC [grpc] UpdateState -> DEBU 2eb ccResolverWrapper: sending update to cc: {[{orderer2.example.com:7050 0 }] }" -"2019-05-02 01:30:30.822 UTC [grpc] switchBalancer -> DEBU 2ec ClientConn switching balancer to "pick_first"" -"2019-05-02 01:30:30.822 UTC [grpc] HandleSubConnStateChange -> DEBU 2ed pickfirstBalancer: HandleSubConnStateChange: 0xc000286010, CONNECTING" -"2019-05-02 01:30:30.822 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ee 2 exists in both old and new membership for channel testchainid , skipping its deactivation" -"2019-05-02 01:30:30.823 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ef 3 exists in both old and new membership for channel testchainid , skipping its deactivation" -"2019-05-02 01:30:30.823 UTC [orderer.common.cluster] Configure -> INFO 2f0 Exiting" -"2019-05-02 01:30:30.823 UTC [orderer.consensus.etcdraft] start -> DEBU 2f1 Starting raft node: #peers: 3" channel=testchainid node=1 -"2019-05-02 01:30:30.823 UTC [orderer.consensus.etcdraft] start -> INFO 2f2 Starting raft node as part of a new channel" channel=testchainid node=1 -"2019-05-02 01:30:30.823 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f3 1 became follower at term 0" channel=testchainid node=1 -"2019-05-02 01:30:30.824 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2f4 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 -"2019-05-02 01:30:30.824 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f5 1 became follower at term 1" channel=testchainid node=1 -"2019-05-02 01:30:30.824 UTC [orderer.common.server] Start -> INFO 2f6 Starting orderer: +"2019-05-02 09:27:06.400 UTC [grpc] DialContext -> DEBU 2e9 parsed scheme: """ +"2019-05-02 09:27:06.400 UTC [grpc] DialContext -> DEBU 2ea scheme "" not registered, fallback to default scheme" +"2019-05-02 09:27:06.400 UTC [grpc] UpdateState -> DEBU 2eb ccResolverWrapper: sending update to cc: {[{orderer2.example.com:7050 0 }] }" +"2019-05-02 09:27:06.400 UTC [grpc] switchBalancer -> DEBU 2ec ClientConn switching balancer to "pick_first"" +"2019-05-02 09:27:06.400 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ed 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-05-02 09:27:06.400 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ee 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-05-02 09:27:06.400 UTC [orderer.common.cluster] Configure -> INFO 2ef Exiting" +"2019-05-02 09:27:06.406 UTC [grpc] HandleSubConnStateChange -> DEBU 2f0 pickfirstBalancer: HandleSubConnStateChange: 0xc000380030, CONNECTING" +"2019-05-02 09:27:06.400 UTC [orderer.consensus.etcdraft] start -> DEBU 2f1 Starting raft node: #peers: 3" channel=testchainid node=1 +"2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] start -> INFO 2f2 Starting raft node as part of a new channel" channel=testchainid node=1 +"2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f3 1 became follower at term 0" channel=testchainid node=1 +"2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2f4 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +"2019-05-02 09:27:06.406 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f5 1 became follower at term 1" channel=testchainid node=1 +"2019-05-02 09:27:06.406 UTC [orderer.common.server] Start -> INFO 2f6 Starting orderer: Version: 2.0.0 Commit SHA: development build Go version: go1.12.4 OS/Arch: linux/amd64" -"2019-05-02 01:30:30.825 UTC [orderer.common.server] Start -> INFO 2f7 Beginning to serve requests" -"2019-05-02 01:30:30.826 UTC [grpc] HandleSubConnStateChange -> DEBU 2f8 pickfirstBalancer: HandleSubConnStateChange: 0xc00004f470, CONNECTING" -"2019-05-02 01:30:30.829 UTC [orderer.consensus.etcdraft] apply -> INFO 2f9 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 -"2019-05-02 01:30:30.829 UTC [orderer.consensus.etcdraft] apply -> INFO 2fa Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 -"2019-05-02 01:30:30.830 UTC [orderer.consensus.etcdraft] apply -> INFO 2fb Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 -"2019-05-02 01:30:30.849 UTC [grpc] createTransport -> DEBU 2fc grpc: addrConn.createTransport failed to connect to {orderer2.example.com:7050 0 }. Err :connection error: desc = "transport: Error while dialing dial tcp 192.168.240.4:7050: connect: connection refused". Reconnecting..." -"2019-05-02 01:30:30.849 UTC [grpc] HandleSubConnStateChange -> DEBU 2fd pickfirstBalancer: HandleSubConnStateChange: 0xc00004f470, TRANSIENT_FAILURE" -"2019-05-02 01:30:30.852 UTC [grpc] HandleSubConnStateChange -> DEBU 2fe pickfirstBalancer: HandleSubConnStateChange: 0xc000286010, READY" -"2019-05-02 01:30:31.851 UTC [grpc] HandleSubConnStateChange -> DEBU 2ff pickfirstBalancer: HandleSubConnStateChange: 0xc00004f470, CONNECTING" -"2019-05-02 01:30:31.855 UTC [grpc] HandleSubConnStateChange -> DEBU 300 pickfirstBalancer: HandleSubConnStateChange: 0xc00004f470, READY" -"2019-05-02 01:30:32.078 UTC [orderer.common.cluster] Step -> DEBU 301 Connection from orderer2.example.com(192.168.240.4:47814)" -"2019-05-02 01:30:32.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 302 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:32.079 UTC [orderer.consensus.etcdraft] Step -> INFO 303 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 -"2019-05-02 01:30:32.079 UTC [orderer.common.cluster] NewStream -> DEBU 304 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" -"2019-05-02 01:30:32.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 305 Sending msg of 28 bytes to 3 on channel testchainid took 82.9µs" -"2019-05-02 01:30:32.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 306 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.4µs " -"2019-05-02 01:30:32.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 307 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:32.084 UTC [orderer.consensus.etcdraft] Step -> INFO 308 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 -"2019-05-02 01:30:32.085 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 309 1 became follower at term 2" channel=testchainid node=1 -"2019-05-02 01:30:32.085 UTC [orderer.consensus.etcdraft] Step -> INFO 30a 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 -"2019-05-02 01:30:32.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30b Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" -"2019-05-02 01:30:32.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " -"2019-05-02 01:30:32.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 36" -"2019-05-02 01:30:32.093 UTC [orderer.consensus.etcdraft] run -> INFO 30e raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 -"2019-05-02 01:30:32.096 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 30f Raft leader changed: 0 -> 3" channel=testchainid node=1 -"2019-05-02 01:30:32.095 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 310 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" -"2019-05-02 01:30:32.096 UTC [orderer.common.cluster.step] sendMessage -> DEBU 311 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.4µs " -"2019-05-02 01:30:32.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 312 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:32.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 313 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" -"2019-05-02 01:30:32.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 314 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.5µs " -"2019-05-02 01:30:32.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 315 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:32.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 316 Sending msg of 28 bytes to 3 on channel testchainid took 83.4µs" -"2019-05-02 01:30:32.578 UTC [orderer.common.cluster.step] sendMessage -> DEBU 317 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.6µs " -"2019-05-02 01:30:33.081 UTC [orderer.common.cluster.step] handleMessage -> DEBU 318 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:33.081 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 319 Sending msg of 28 bytes to 3 on channel testchainid took 16.2µs" -"2019-05-02 01:30:33.084 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.0682ms " -"2019-05-02 01:30:33.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:33.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31c Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" -"2019-05-02 01:30:33.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 609.6µs " -"2019-05-02 01:30:34.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:34.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31f Sending msg of 28 bytes to 3 on channel testchainid took 23.5µs" -"2019-05-02 01:30:34.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 320 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.9µs " -"2019-05-02 01:30:34.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 321 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:34.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 322 Sending msg of 28 bytes to 3 on channel testchainid took 37µs" -"2019-05-02 01:30:34.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU 323 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0976ms " -"2019-05-02 01:30:35.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 324 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:35.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 325 Sending msg of 28 bytes to 3 on channel testchainid took 152.4µs" -"2019-05-02 01:30:35.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 326 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 302.2µs " -"2019-05-02 01:30:35.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 327 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:35.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 328 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" -"2019-05-02 01:30:35.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU 329 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 212.9µs " -"2019-05-02 01:30:36.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:36.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " -"2019-05-02 01:30:36.081 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32c Sending msg of 28 bytes to 3 on channel testchainid took 18.9µs" -"2019-05-02 01:30:36.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:36.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" -"2019-05-02 01:30:36.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.5µs " -"2019-05-02 01:30:37.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:37.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 24.3µs" -"2019-05-02 01:30:37.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " -"2019-05-02 01:30:37.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:37.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" -"2019-05-02 01:30:37.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 387.5µs " -"2019-05-02 01:30:38.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 336 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:38.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 337 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" -"2019-05-02 01:30:38.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 338 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126µs " -"2019-05-02 01:30:38.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU 339 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:38.588 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33a Sending msg of 28 bytes to 3 on channel testchainid took 29µs" -"2019-05-02 01:30:38.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130µs " -"2019-05-02 01:30:38.774 UTC [orderer.common.server] Deliver -> DEBU 33c Starting new Deliver handler" -"2019-05-02 01:30:38.775 UTC [common.deliver] Handle -> DEBU 33d Starting new deliver loop for 192.168.240.9:47266" -"2019-05-02 01:30:38.776 UTC [common.deliver] Handle -> DEBU 33e Attempting to read seek info message from 192.168.240.9:47266" -"2019-05-02 01:30:38.785 UTC [orderer.common.server] Broadcast -> DEBU 33f Starting new Broadcast handler" -"2019-05-02 01:30:38.785 UTC [orderer.common.broadcast] Handle -> DEBU 340 Starting new broadcast loop for 192.168.240.9:47268" -"2019-05-02 01:30:38.786 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 341 [channel: businesschannel] Broadcast is processing config update message from 192.168.240.9:47268" -"2019-05-02 01:30:38.786 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 342 Processing config update tx with system channel message processor for channel ID businesschannel" -"2019-05-02 01:30:38.786 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 343 Processing channel create tx for channel businesschannel on system channel testchainid" -"2019-05-02 01:30:38.786 UTC [common.channelconfig] NewStandardValues -> DEBU 344 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:38.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 345 Processing field: HashingAlgorithm" -"2019-05-02 01:30:38.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 346 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:38.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 347 Processing field: OrdererAddresses" -"2019-05-02 01:30:38.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 348 Processing field: Consortium" -"2019-05-02 01:30:38.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 349 Processing field: Capabilities" -"2019-05-02 01:30:38.788 UTC [common.channelconfig] NewStandardValues -> DEBU 34a Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:38.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34b Processing field: ConsensusType" -"2019-05-02 01:30:38.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34c Processing field: BatchSize" -"2019-05-02 01:30:38.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34d Processing field: BatchTimeout" -"2019-05-02 01:30:38.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34e Processing field: KafkaBrokers" -"2019-05-02 01:30:38.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34f Processing field: ChannelRestrictions" -"2019-05-02 01:30:38.790 UTC [common.channelconfig] initializeProtosStruct -> DEBU 350 Processing field: Capabilities" -"2019-05-02 01:30:38.790 UTC [common.channelconfig] NewStandardValues -> DEBU 351 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:38.790 UTC [common.channelconfig] initializeProtosStruct -> DEBU 352 Processing field: Endpoints" -"2019-05-02 01:30:38.790 UTC [common.channelconfig] NewStandardValues -> DEBU 353 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.791 UTC [common.channelconfig] initializeProtosStruct -> DEBU 354 Processing field: MSP" -"2019-05-02 01:30:38.791 UTC [common.channelconfig] validateMSP -> DEBU 355 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:38.791 UTC [msp] newBccspMsp -> DEBU 356 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.791 UTC [msp] New -> DEBU 357 Creating Cache-MSP instance" -"2019-05-02 01:30:38.791 UTC [msp] Setup -> DEBU 358 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:38.793 UTC [msp.identity] newIdentity -> DEBU 359 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:06.406 UTC [orderer.common.server] Start -> INFO 2f7 Beginning to serve requests" +"2019-05-02 09:27:06.407 UTC [grpc] HandleSubConnStateChange -> DEBU 2f8 pickfirstBalancer: HandleSubConnStateChange: 0xc000380350, CONNECTING" +"2019-05-02 09:27:06.417 UTC [orderer.consensus.etcdraft] apply -> INFO 2f9 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-05-02 09:27:06.417 UTC [orderer.consensus.etcdraft] apply -> INFO 2fa Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-05-02 09:27:06.417 UTC [orderer.consensus.etcdraft] apply -> INFO 2fb Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-05-02 09:27:06.422 UTC [grpc] HandleSubConnStateChange -> DEBU 2fc pickfirstBalancer: HandleSubConnStateChange: 0xc000380350, READY" +"2019-05-02 09:27:06.493 UTC [grpc] HandleSubConnStateChange -> DEBU 2fd pickfirstBalancer: HandleSubConnStateChange: 0xc000380030, READY" +"2019-05-02 09:27:07.746 UTC [orderer.common.cluster] Step -> DEBU 2fe Connection from orderer2.example.com(172.18.0.3:56182)" +"2019-05-02 09:27:07.746 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2ff Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:07.747 UTC [orderer.consensus.etcdraft] Step -> INFO 300 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +"2019-05-02 09:27:07.747 UTC [orderer.common.cluster] NewStream -> DEBU 301 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-05-02 09:27:07.747 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 302 Sending msg of 28 bytes to 3 on channel testchainid took 114.2µs" +"2019-05-02 09:27:07.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU 303 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130µs " +"2019-05-02 09:27:07.752 UTC [orderer.common.cluster.step] handleMessage -> DEBU 304 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:07.752 UTC [orderer.consensus.etcdraft] Step -> INFO 305 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +"2019-05-02 09:27:07.752 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 306 1 became follower at term 2" channel=testchainid node=1 +"2019-05-02 09:27:07.752 UTC [orderer.consensus.etcdraft] Step -> INFO 307 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +"2019-05-02 09:27:07.753 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 308 Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +"2019-05-02 09:27:07.753 UTC [orderer.common.cluster.step] sendMessage -> DEBU 309 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +"2019-05-02 09:27:07.756 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 36" +"2019-05-02 09:27:07.756 UTC [orderer.consensus.etcdraft] run -> INFO 30b raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +"2019-05-02 09:27:07.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30c Sending msg of 28 bytes to 3 on channel testchainid took 29.3µs" +"2019-05-02 09:27:07.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs " +"2019-05-02 09:27:07.759 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 30e Raft leader changed: 0 -> 3" channel=testchainid node=1 +"2019-05-02 09:27:07.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:07.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 310 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +"2019-05-02 09:27:07.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 311 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131µs " +"2019-05-02 09:27:08.244 UTC [orderer.common.cluster.step] handleMessage -> DEBU 312 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:08.244 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 313 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +"2019-05-02 09:27:08.244 UTC [orderer.common.cluster.step] sendMessage -> DEBU 314 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs " +"2019-05-02 09:27:08.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU 315 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:08.748 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 316 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +"2019-05-02 09:27:08.748 UTC [orderer.common.cluster.step] sendMessage -> DEBU 317 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.9µs " +"2019-05-02 09:27:09.245 UTC [orderer.common.cluster.step] handleMessage -> DEBU 318 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:09.247 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 319 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2019-05-02 09:27:09.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 411µs " +"2019-05-02 09:27:09.746 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:09.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31c Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +"2019-05-02 09:27:09.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.6µs " +"2019-05-02 09:27:10.245 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:10.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31f Sending msg of 28 bytes to 3 on channel testchainid took 28.7µs" +"2019-05-02 09:27:10.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU 320 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 445.4µs " +"2019-05-02 09:27:10.744 UTC [orderer.common.cluster.step] handleMessage -> DEBU 321 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:10.744 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 322 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +"2019-05-02 09:27:10.744 UTC [orderer.common.cluster.step] sendMessage -> DEBU 323 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.1µs " +"2019-05-02 09:27:11.244 UTC [orderer.common.cluster.step] handleMessage -> DEBU 324 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:11.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 325 Sending msg of 28 bytes to 3 on channel testchainid took 71.5µs" +"2019-05-02 09:27:11.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU 326 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 409.4µs " +"2019-05-02 09:27:11.745 UTC [orderer.common.cluster.step] handleMessage -> DEBU 327 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:11.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 328 Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs" +"2019-05-02 09:27:11.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 329 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.2µs " +"2019-05-02 09:27:12.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:12.247 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32b Sending msg of 28 bytes to 3 on channel testchainid took 30µs" +"2019-05-02 09:27:12.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +"2019-05-02 09:27:12.745 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:12.748 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 28.9µs" +"2019-05-02 09:27:12.750 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 475.2µs " +"2019-05-02 09:27:13.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:13.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" +"2019-05-02 09:27:13.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 936µs " +"2019-05-02 09:27:13.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:13.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +"2019-05-02 09:27:13.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.7µs " +"2019-05-02 09:27:14.124 UTC [orderer.common.server] Deliver -> DEBU 336 Starting new Deliver handler" +"2019-05-02 09:27:14.124 UTC [common.deliver] Handle -> DEBU 337 Starting new deliver loop for 172.18.0.8:57138" +"2019-05-02 09:27:14.124 UTC [common.deliver] Handle -> DEBU 338 Attempting to read seek info message from 172.18.0.8:57138" +"2019-05-02 09:27:14.153 UTC [orderer.common.server] Broadcast -> DEBU 339 Starting new Broadcast handler" +"2019-05-02 09:27:14.153 UTC [orderer.common.broadcast] Handle -> DEBU 33a Starting new broadcast loop for 172.18.0.8:57140" +"2019-05-02 09:27:14.154 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 33b [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57140" +"2019-05-02 09:27:14.154 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 33c Processing config update tx with system channel message processor for channel ID businesschannel" +"2019-05-02 09:27:14.154 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 33d Processing channel create tx for channel businesschannel on system channel testchainid" +"2019-05-02 09:27:14.156 UTC [common.channelconfig] NewStandardValues -> DEBU 33e Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:14.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33f Processing field: HashingAlgorithm" +"2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 340 Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 341 Processing field: OrdererAddresses" +"2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 342 Processing field: Consortium" +"2019-05-02 09:27:14.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 343 Processing field: Capabilities" +"2019-05-02 09:27:14.158 UTC [common.channelconfig] NewStandardValues -> DEBU 344 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:14.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 345 Processing field: ConsensusType" +"2019-05-02 09:27:14.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 346 Processing field: BatchSize" +"2019-05-02 09:27:14.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 347 Processing field: BatchTimeout" +"2019-05-02 09:27:14.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 348 Processing field: KafkaBrokers" +"2019-05-02 09:27:14.161 UTC [common.channelconfig] initializeProtosStruct -> DEBU 349 Processing field: ChannelRestrictions" +"2019-05-02 09:27:14.162 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34a Processing field: Capabilities" +"2019-05-02 09:27:14.162 UTC [common.channelconfig] NewStandardValues -> DEBU 34b Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:14.162 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34c Processing field: Endpoints" +"2019-05-02 09:27:14.162 UTC [common.channelconfig] NewStandardValues -> DEBU 34d Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.163 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34e Processing field: MSP" +"2019-05-02 09:27:14.163 UTC [common.channelconfig] validateMSP -> DEBU 34f Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:14.164 UTC [msp] newBccspMsp -> DEBU 350 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.164 UTC [msp] New -> DEBU 351 Creating Cache-MSP instance" +"2019-05-02 09:27:14.164 UTC [msp] Setup -> DEBU 352 Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:14.166 UTC [msp.identity] newIdentity -> DEBU 353 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1456,7 +1450,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:38.795 UTC [msp.identity] newIdentity -> DEBU 35a Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.168 UTC [msp.identity] newIdentity -> DEBU 354 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1469,63 +1463,20 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.796 UTC [msp] Validate -> DEBU 35b MSP OrdererMSP validating identity" -"2019-05-02 01:30:38.797 UTC [common.channelconfig] NewStandardValues -> DEBU 35c Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:38.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35d Processing field: ACLs" -"2019-05-02 01:30:38.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35e Processing field: Capabilities" -"2019-05-02 01:30:38.797 UTC [common.channelconfig] NewStandardValues -> DEBU 35f Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:38.798 UTC [common.channelconfig] initializeProtosStruct -> DEBU 360 Processing field: AnchorPeers" -"2019-05-02 01:30:38.798 UTC [common.channelconfig] NewStandardValues -> DEBU 361 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.798 UTC [common.channelconfig] initializeProtosStruct -> DEBU 362 Processing field: MSP" -"2019-05-02 01:30:38.799 UTC [common.channelconfig] Validate -> DEBU 363 Anchor peers for org Org1MSP are " -"2019-05-02 01:30:38.799 UTC [common.channelconfig] validateMSP -> DEBU 364 Setting up MSP for org Org1MSP" -"2019-05-02 01:30:38.799 UTC [msp] newBccspMsp -> DEBU 365 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.799 UTC [msp] New -> DEBU 366 Creating Cache-MSP instance" -"2019-05-02 01:30:38.799 UTC [msp] Setup -> DEBU 367 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:38.801 UTC [msp.identity] newIdentity -> DEBU 368 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-05-02 01:30:38.801 UTC [msp.identity] newIdentity -> DEBU 369 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-05-02 01:30:38.803 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 36a Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:38.803 UTC [msp] Validate -> DEBU 36b MSP Org1MSP validating identity" -"2019-05-02 01:30:38.804 UTC [msp] getCertificationChain -> DEBU 36c MSP Org1MSP getting certification chain" -"2019-05-02 01:30:38.805 UTC [msp] hasOURole -> DEBU 36d MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:38.805 UTC [msp] getCertificationChain -> DEBU 36e MSP Org1MSP getting certification chain" -"2019-05-02 01:30:38.805 UTC [common.channelconfig] NewStandardValues -> DEBU 36f Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:38.805 UTC [common.channelconfig] initializeProtosStruct -> DEBU 370 Processing field: AnchorPeers" -"2019-05-02 01:30:38.805 UTC [common.channelconfig] NewStandardValues -> DEBU 371 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.806 UTC [common.channelconfig] initializeProtosStruct -> DEBU 372 Processing field: MSP" -"2019-05-02 01:30:38.806 UTC [common.channelconfig] Validate -> DEBU 373 Anchor peers for org Org2MSP are " -"2019-05-02 01:30:38.807 UTC [common.channelconfig] validateMSP -> DEBU 374 Setting up MSP for org Org2MSP" -"2019-05-02 01:30:38.807 UTC [msp] newBccspMsp -> DEBU 375 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.807 UTC [msp] New -> DEBU 376 Creating Cache-MSP instance" -"2019-05-02 01:30:38.807 UTC [msp] Setup -> DEBU 377 Setting up MSP instance Org2MSP" -"2019-05-02 01:30:38.808 UTC [msp.identity] newIdentity -> DEBU 378 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.169 UTC [msp] Validate -> DEBU 355 MSP OrdererMSP validating identity" +"2019-05-02 09:27:14.169 UTC [common.channelconfig] NewStandardValues -> DEBU 356 Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:14.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 357 Processing field: ACLs" +"2019-05-02 09:27:14.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 358 Processing field: Capabilities" +"2019-05-02 09:27:14.171 UTC [common.channelconfig] NewStandardValues -> DEBU 359 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:14.171 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35a Processing field: AnchorPeers" +"2019-05-02 09:27:14.171 UTC [common.channelconfig] NewStandardValues -> DEBU 35b Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.172 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35c Processing field: MSP" +"2019-05-02 09:27:14.172 UTC [common.channelconfig] Validate -> DEBU 35d Anchor peers for org Org2MSP are " +"2019-05-02 09:27:14.173 UTC [common.channelconfig] validateMSP -> DEBU 35e Setting up MSP for org Org2MSP" +"2019-05-02 09:27:14.173 UTC [msp] newBccspMsp -> DEBU 35f Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.173 UTC [msp] New -> DEBU 360 Creating Cache-MSP instance" +"2019-05-02 09:27:14.174 UTC [msp] Setup -> DEBU 361 Setting up MSP instance Org2MSP" +"2019-05-02 09:27:14.175 UTC [msp.identity] newIdentity -> DEBU 362 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1540,7 +1491,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.809 UTC [msp.identity] newIdentity -> DEBU 379 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.176 UTC [msp.identity] newIdentity -> DEBU 363 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1554,111 +1505,36 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.810 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 37a Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:38.810 UTC [msp] Validate -> DEBU 37b MSP Org2MSP validating identity" -"2019-05-02 01:30:38.811 UTC [msp] getCertificationChain -> DEBU 37c MSP Org2MSP getting certification chain" -"2019-05-02 01:30:38.811 UTC [msp] hasOURole -> DEBU 37d MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:38.811 UTC [msp] getCertificationChain -> DEBU 37e MSP Org2MSP getting certification chain" -"2019-05-02 01:30:38.812 UTC [msp] Setup -> DEBU 37f Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:38.812 UTC [msp] Setup -> DEBU 380 MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:38.812 UTC [policies] NewManagerImpl -> DEBU 381 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.812 UTC [policies] NewManagerImpl -> DEBU 382 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.813 UTC [policies] NewManagerImpl -> DEBU 383 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.813 UTC [policies] NewManagerImpl -> DEBU 384 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:38.814 UTC [policies] NewManagerImpl -> DEBU 385 Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:38.814 UTC [policies] NewManagerImpl -> DEBU 386 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:38.814 UTC [policies] NewManagerImpl -> DEBU 387 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:38.814 UTC [policies] NewManagerImpl -> DEBU 388 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.815 UTC [policies] NewManagerImpl -> DEBU 389 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.815 UTC [policies] NewManagerImpl -> DEBU 38a Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 38b Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 38c Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 38d Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 38e Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 38f Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.816 UTC [policies] NewManagerImpl -> DEBU 390 Proposed new policy ChannelCreationPolicy for Channel/Application" -"2019-05-02 01:30:38.817 UTC [policies] GetPolicy -> DEBU 391 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" -"2019-05-02 01:30:38.817 UTC [policies] NewManagerImpl -> DEBU 392 Proposed new policy Writers for Channel" -"2019-05-02 01:30:38.817 UTC [policies] GetPolicy -> DEBU 393 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" -"2019-05-02 01:30:38.817 UTC [policies] NewManagerImpl -> DEBU 394 Proposed new policy Admins for Channel" -"2019-05-02 01:30:38.818 UTC [policies] GetPolicy -> DEBU 395 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" -"2019-05-02 01:30:38.818 UTC [policies] NewManagerImpl -> DEBU 396 Proposed new policy Readers for Channel" -"2019-05-02 01:30:38.819 UTC [common.configtx] addToMap -> DEBU 397 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:38.819 UTC [common.configtx] addToMap -> DEBU 398 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:38.819 UTC [common.configtx] addToMap -> DEBU 399 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.819 UTC [common.configtx] addToMap -> DEBU 39a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:38.820 UTC [common.configtx] addToMap -> DEBU 39b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:38.820 UTC [common.configtx] addToMap -> DEBU 39c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:38.820 UTC [common.configtx] addToMap -> DEBU 39d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:38.820 UTC [common.configtx] addToMap -> DEBU 39e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:38.821 UTC [common.configtx] addToMap -> DEBU 39f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:38.821 UTC [common.configtx] addToMap -> DEBU 3a0 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:38.821 UTC [common.configtx] addToMap -> DEBU 3a1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:38.821 UTC [common.configtx] addToMap -> DEBU 3a2 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:38.822 UTC [common.configtx] addToMap -> DEBU 3a3 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:38.822 UTC [common.configtx] addToMap -> DEBU 3a4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:38.822 UTC [common.configtx] addToMap -> DEBU 3a5 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:38.822 UTC [common.configtx] addToMap -> DEBU 3a6 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:38.822 UTC [common.configtx] addToMap -> DEBU 3a7 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:38.823 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:38.824 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:38.824 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:38.824 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:38.825 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:38.825 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:38.825 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:38.825 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:38.826 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:38.826 UTC [common.configtx] addToMap -> DEBU 3b1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:38.826 UTC [common.configtx] addToMap -> DEBU 3b2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:38.826 UTC [common.configtx] addToMap -> DEBU 3b3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:38.826 UTC [common.configtx] addToMap -> DEBU 3b4 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" -"2019-05-02 01:30:38.827 UTC [common.configtx] addToMap -> DEBU 3b5 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:38.827 UTC [common.configtx] addToMap -> DEBU 3b6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:38.827 UTC [common.configtx] addToMap -> DEBU 3b7 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:38.828 UTC [common.configtx] addToMap -> DEBU 3b8 Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:38.828 UTC [common.configtx] addToMap -> DEBU 3b9 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:38.828 UTC [common.configtx] addToMap -> DEBU 3ba Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:38.828 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:38.829 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:38.829 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Group] /Channel" -"2019-05-02 01:30:38.829 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:38.829 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:38.829 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:38.830 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:38.830 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:38.830 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:38.831 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:38.831 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:38.831 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:38.831 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:38.832 UTC [common.configtx] addToMap -> DEBU 3c8 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:38.832 UTC [common.configtx] addToMap -> DEBU 3c9 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:38.832 UTC [common.configtx] addToMap -> DEBU 3ca Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:38.833 UTC [common.configtx] addToMap -> DEBU 3cb Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:38.833 UTC [common.configtx] addToMap -> DEBU 3cc Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:38.833 UTC [common.configtx] addToMap -> DEBU 3cd Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:38.834 UTC [common.configtx] verifyDeltaSet -> DEBU 3ce Processing change to key: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:38.834 UTC [common.configtx] verifyDeltaSet -> DEBU 3cf Processing change to key: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:38.834 UTC [common.configtx] verifyDeltaSet -> DEBU 3d0 Processing change to key: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:38.835 UTC [common.configtx] verifyDeltaSet -> DEBU 3d1 Processing change to key: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:38.835 UTC [common.configtx] verifyDeltaSet -> DEBU 3d2 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:38.835 UTC [common.configtx] verifyDeltaSet -> DEBU 3d3 Processing change to key: [Group] /Channel/Application" -"2019-05-02 01:30:38.836 UTC [common.configtx] policyForItem -> DEBU 3d4 Getting policy for item Application with mod_policy ChannelCreationPolicy" -"2019-05-02 01:30:38.836 UTC [policies] Manager -> DEBU 3d5 Manager Channel looking up path []" -"2019-05-02 01:30:38.836 UTC [policies] Manager -> DEBU 3d6 Manager Channel has managers Orderer" -"2019-05-02 01:30:38.836 UTC [policies] Manager -> DEBU 3d7 Manager Channel has managers Application" -"2019-05-02 01:30:38.836 UTC [policies] Manager -> DEBU 3d8 Manager Channel looking up path [Application]" -"2019-05-02 01:30:38.837 UTC [policies] Manager -> DEBU 3d9 Manager Channel has managers Orderer" -"2019-05-02 01:30:38.837 UTC [policies] Manager -> DEBU 3da Manager Channel has managers Application" -"2019-05-02 01:30:38.837 UTC [policies] Manager -> DEBU 3db Manager Channel/Application looking up path []" -"2019-05-02 01:30:38.837 UTC [policies] Manager -> DEBU 3dc Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:38.838 UTC [policies] Manager -> DEBU 3dd Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:38.838 UTC [policies] Evaluate -> DEBU 3de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" -"2019-05-02 01:30:38.838 UTC [policies] Evaluate -> DEBU 3df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:38.839 UTC [policies] Evaluate -> DEBU 3e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-05-02 01:30:38.839 UTC [msp] DeserializeIdentity -> DEBU 3e1 Obtaining identity" -"2019-05-02 01:30:38.840 UTC [msp.identity] newIdentity -> DEBU 3e2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.177 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 364 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:14.177 UTC [msp] Validate -> DEBU 365 MSP Org2MSP validating identity" +"2019-05-02 09:27:14.178 UTC [msp] getCertificationChain -> DEBU 366 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:14.179 UTC [msp] hasOURole -> DEBU 367 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:14.179 UTC [msp] getCertificationChain -> DEBU 368 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:14.179 UTC [common.channelconfig] NewStandardValues -> DEBU 369 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:14.179 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36a Processing field: AnchorPeers" +"2019-05-02 09:27:14.179 UTC [common.channelconfig] NewStandardValues -> DEBU 36b Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.179 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36c Processing field: MSP" +"2019-05-02 09:27:14.180 UTC [common.channelconfig] Validate -> DEBU 36d Anchor peers for org Org1MSP are " +"2019-05-02 09:27:14.181 UTC [common.channelconfig] validateMSP -> DEBU 36e Setting up MSP for org Org1MSP" +"2019-05-02 09:27:14.181 UTC [msp] newBccspMsp -> DEBU 36f Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.181 UTC [msp] New -> DEBU 370 Creating Cache-MSP instance" +"2019-05-02 09:27:14.181 UTC [msp] Setup -> DEBU 371 Setting up MSP instance Org1MSP" +"2019-05-02 09:27:14.182 UTC [msp.identity] newIdentity -> DEBU 372 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-05-02 09:27:14.183 UTC [msp.identity] newIdentity -> DEBU 373 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1672,69 +1548,190 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.841 UTC [cauthdsl] func1 -> DEBU 3e3 0xc000b76b40 gate 1556760638841030200 evaluation starts" -"2019-05-02 01:30:38.841 UTC [cauthdsl] func2 -> DEBU 3e4 0xc000b76b40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:38.841 UTC [cauthdsl] func2 -> DEBU 3e5 0xc000b76b40 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:38.841 UTC [cauthdsl] func2 -> DEBU 3e6 0xc000b76b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:30:38.841 UTC [cauthdsl] func2 -> DEBU 3e7 0xc000b76b40 principal evaluation fails" -"2019-05-02 01:30:38.841 UTC [cauthdsl] func1 -> DEBU 3e8 0xc000b76b40 gate 1556760638841030200 evaluation fails" -"2019-05-02 01:30:38.841 UTC [policies] Evaluate -> DEBU 3e9 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:38.842 UTC [policies] Evaluate -> DEBU 3ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:38.842 UTC [policies] Evaluate -> DEBU 3eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-05-02 01:30:38.843 UTC [cauthdsl] func1 -> DEBU 3ec 0xc000b77cc0 gate 1556760638843281500 evaluation starts" -"2019-05-02 01:30:38.843 UTC [cauthdsl] func2 -> DEBU 3ed 0xc000b77cc0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:38.843 UTC [cauthdsl] func2 -> DEBU 3ee 0xc000b77cc0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:38.843 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3ef Checking if identity satisfies ADMIN role for Org1MSP" -"2019-05-02 01:30:38.844 UTC [cauthdsl] func2 -> DEBU 3f0 0xc000b77cc0 principal matched by identity 0" -"2019-05-02 01:30:38.844 UTC [msp.identity] Verify -> DEBU 3f1 Verify: digest = 00000000 89 c5 30 09 2f 42 58 54 bf b0 28 d6 86 d6 13 e4 |..0./BXT..(.....| -00000010 9b 54 6d d0 1e a8 cf b7 98 c0 12 76 b9 bb 1c 36 |.Tm........v...6|" -"2019-05-02 01:30:38.844 UTC [msp.identity] Verify -> DEBU 3f2 Verify: sig = 00000000 30 45 02 21 00 e7 d9 34 ae 08 7f 3b 30 d5 e4 18 |0E.!...4...;0...| -00000010 28 11 f1 fb 87 bd 97 11 28 b9 2f 5a c0 f3 71 87 |(.......(./Z..q.| -00000020 29 cc b5 17 a5 02 20 36 16 4d 85 ba c9 4e c1 31 |)..... 6.M...N.1| -00000030 b0 7f ea 5e 5f 8f d7 10 9b 58 85 dc 97 6d d9 55 |...^_....X...m.U| -00000040 d6 a1 57 ad 6c 81 d7 |..W.l..|" -"2019-05-02 01:30:38.845 UTC [cauthdsl] func2 -> DEBU 3f3 0xc000b77cc0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:38.845 UTC [cauthdsl] func1 -> DEBU 3f4 0xc000b77cc0 gate 1556760638843281500 evaluation succeeds" -"2019-05-02 01:30:38.845 UTC [policies] Evaluate -> DEBU 3f5 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:38.845 UTC [policies] Evaluate -> DEBU 3f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:38.846 UTC [policies] Evaluate -> DEBU 3f7 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" -"2019-05-02 01:30:38.846 UTC [policies] Evaluate -> DEBU 3f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" -"2019-05-02 01:30:38.847 UTC [common.configtx] verifyDeltaSet -> DEBU 3f9 Processing change to key: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:38.847 UTC [common.configtx] verifyDeltaSet -> DEBU 3fa Processing change to key: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:38.848 UTC [common.configtx] recurseConfigMap -> DEBU 3fb Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.848 UTC [common.configtx] recurseConfigMap -> DEBU 3fc Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.848 UTC [common.configtx] recurseConfigMap -> DEBU 3fd Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.848 UTC [common.configtx] recurseConfigMap -> DEBU 3fe Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.848 UTC [common.configtx] recurseConfigMap -> DEBU 3ff Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.849 UTC [common.configtx] recurseConfigMap -> DEBU 400 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.849 UTC [common.configtx] recurseConfigMap -> DEBU 401 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.849 UTC [common.configtx] recurseConfigMap -> DEBU 402 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.850 UTC [common.configtx] recurseConfigMap -> DEBU 403 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.850 UTC [common.configtx] recurseConfigMap -> DEBU 404 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.850 UTC [common.configtx] recurseConfigMap -> DEBU 405 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.850 UTC [common.configtx] recurseConfigMap -> DEBU 406 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.850 UTC [common.configtx] recurseConfigMap -> DEBU 407 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 408 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 409 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 40a Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 40b Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 40c Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 40d Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.851 UTC [common.configtx] recurseConfigMap -> DEBU 40e Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.852 UTC [common.configtx] recurseConfigMap -> DEBU 40f Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.852 UTC [common.configtx] recurseConfigMap -> DEBU 410 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.852 UTC [common.configtx] recurseConfigMap -> DEBU 411 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.852 UTC [msp.identity] Sign -> DEBU 412 Sign: plaintext: 0AD2060A1B08011A0608BE90A9E60522...DA1F5CAE742779B7DA17E4516ECF8837 " -"2019-05-02 01:30:38.852 UTC [msp.identity] Sign -> DEBU 413 Sign: digest: 6A42C159969B17B1522DAE7FF5D8D2B33EBD5DC1015536A055610E81743EF170 " -"2019-05-02 01:30:38.852 UTC [msp.identity] Sign -> DEBU 414 Sign: plaintext: 0ACE060A1708041A0608BE90A9E60522...A3AB6390248798930B8A8E60C0A5C784 " -"2019-05-02 01:30:38.855 UTC [msp.identity] Sign -> DEBU 415 Sign: digest: 7E60CFE7D46FCF699105ED094C0C812DF783F802D50422E2D417091EE1E0D445 " -"2019-05-02 01:30:38.855 UTC [policies] Evaluate -> DEBU 416 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:30:38.855 UTC [policies] Evaluate -> DEBU 417 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:38.855 UTC [policies] Evaluate -> DEBU 418 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-05-02 01:30:38.855 UTC [policies] Evaluate -> DEBU 419 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:38.856 UTC [policies] Evaluate -> DEBU 41a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:30:38.856 UTC [msp] DeserializeIdentity -> DEBU 41b Obtaining identity" -"2019-05-02 01:30:38.856 UTC [msp.identity] newIdentity -> DEBU 41c Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.185 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 374 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:14.185 UTC [msp] Validate -> DEBU 375 MSP Org1MSP validating identity" +"2019-05-02 09:27:14.186 UTC [msp] getCertificationChain -> DEBU 376 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:14.186 UTC [msp] hasOURole -> DEBU 377 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:14.186 UTC [msp] getCertificationChain -> DEBU 378 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:14.187 UTC [msp] Setup -> DEBU 379 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:14.187 UTC [msp] Setup -> DEBU 37a MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:14.187 UTC [policies] NewManagerImpl -> DEBU 37b Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37c Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37d Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37e Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 37f Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.188 UTC [policies] NewManagerImpl -> DEBU 380 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 381 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 382 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 383 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 384 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.189 UTC [policies] NewManagerImpl -> DEBU 385 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 386 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 387 Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 388 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:14.190 UTC [policies] NewManagerImpl -> DEBU 389 Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:14.191 UTC [policies] NewManagerImpl -> DEBU 38a Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:14.191 UTC [policies] GetPolicy -> DEBU 38b Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-05-02 09:27:14.192 UTC [policies] NewManagerImpl -> DEBU 38c Proposed new policy Admins for Channel" +"2019-05-02 09:27:14.192 UTC [policies] GetPolicy -> DEBU 38d Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-05-02 09:27:14.192 UTC [policies] NewManagerImpl -> DEBU 38e Proposed new policy Readers for Channel" +"2019-05-02 09:27:14.192 UTC [policies] GetPolicy -> DEBU 38f Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-05-02 09:27:14.192 UTC [policies] NewManagerImpl -> DEBU 390 Proposed new policy Writers for Channel" +"2019-05-02 09:27:14.193 UTC [common.configtx] addToMap -> DEBU 391 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:14.193 UTC [common.configtx] addToMap -> DEBU 392 Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:14.193 UTC [common.configtx] addToMap -> DEBU 393 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.194 UTC [common.configtx] addToMap -> DEBU 394 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:14.194 UTC [common.configtx] addToMap -> DEBU 395 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:14.194 UTC [common.configtx] addToMap -> DEBU 396 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 397 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 398 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 399 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 39a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:14.195 UTC [common.configtx] addToMap -> DEBU 39b Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:14.196 UTC [common.configtx] addToMap -> DEBU 39c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:14.196 UTC [common.configtx] addToMap -> DEBU 39d Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:14.196 UTC [common.configtx] addToMap -> DEBU 39e Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:14.197 UTC [common.configtx] addToMap -> DEBU 39f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:14.197 UTC [common.configtx] addToMap -> DEBU 3a0 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:14.197 UTC [common.configtx] addToMap -> DEBU 3a1 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:14.198 UTC [common.configtx] addToMap -> DEBU 3a2 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:14.198 UTC [common.configtx] addToMap -> DEBU 3a3 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:14.198 UTC [common.configtx] addToMap -> DEBU 3a4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:14.199 UTC [common.configtx] addToMap -> DEBU 3a5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:14.199 UTC [common.configtx] addToMap -> DEBU 3a6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:14.200 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:14.201 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:14.201 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:14.202 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b1 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b2 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b3 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b4 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b5 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:14.203 UTC [common.configtx] addToMap -> DEBU 3b6 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:14.204 UTC [common.configtx] addToMap -> DEBU 3b7 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:14.204 UTC [common.configtx] addToMap -> DEBU 3b8 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3b9 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3ba Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:14.205 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Group] /Channel" +"2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:14.206 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:14.207 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:14.207 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:14.207 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:14.208 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:14.208 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:14.208 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:14.209 UTC [common.configtx] verifyDeltaSet -> DEBU 3c8 Processing change to key: [Group] /Channel/Application" +"2019-05-02 09:27:14.209 UTC [common.configtx] policyForItem -> DEBU 3c9 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-05-02 09:27:14.209 UTC [policies] Manager -> DEBU 3ca Manager Channel looking up path []" +"2019-05-02 09:27:14.209 UTC [policies] Manager -> DEBU 3cb Manager Channel has managers Application" +"2019-05-02 09:27:14.209 UTC [policies] Manager -> DEBU 3cc Manager Channel has managers Orderer" +"2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3cd Manager Channel looking up path [Application]" +"2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3ce Manager Channel has managers Application" +"2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3cf Manager Channel has managers Orderer" +"2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3d0 Manager Channel/Application looking up path []" +"2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3d1 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:14.210 UTC [policies] Manager -> DEBU 3d2 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:14.211 UTC [policies] Evaluate -> DEBU 3d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-05-02 09:27:14.211 UTC [policies] Evaluate -> DEBU 3d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:14.211 UTC [policies] Evaluate -> DEBU 3d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-05-02 09:27:14.212 UTC [msp] DeserializeIdentity -> DEBU 3d6 Obtaining identity" +"2019-05-02 09:27:14.212 UTC [msp.identity] newIdentity -> DEBU 3d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:14.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3d8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:14.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3d9 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2019-05-02 09:27:14.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3da Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +"2019-05-02 09:27:14.216 UTC [cauthdsl] func1 -> DEBU 3db 0xc0008b6530 gate 1556789234216356100 evaluation starts" +"2019-05-02 09:27:14.216 UTC [cauthdsl] func2 -> DEBU 3dc 0xc0008b6530 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:14.216 UTC [cauthdsl] func2 -> DEBU 3dd 0xc0008b6530 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:14.217 UTC [cauthdsl] func2 -> DEBU 3de 0xc0008b6530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-05-02 09:27:14.217 UTC [cauthdsl] func2 -> DEBU 3df 0xc0008b6530 principal evaluation fails" +"2019-05-02 09:27:14.217 UTC [cauthdsl] func1 -> DEBU 3e0 0xc0008b6530 gate 1556789234216356100 evaluation fails" +"2019-05-02 09:27:14.217 UTC [policies] Evaluate -> DEBU 3e1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:14.218 UTC [policies] Evaluate -> DEBU 3e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:14.218 UTC [policies] Evaluate -> DEBU 3e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-05-02 09:27:14.219 UTC [cauthdsl] func1 -> DEBU 3e4 0xc0008b76b0 gate 1556789234218928400 evaluation starts" +"2019-05-02 09:27:14.219 UTC [cauthdsl] func2 -> DEBU 3e5 0xc0008b76b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:14.219 UTC [cauthdsl] func2 -> DEBU 3e6 0xc0008b76b0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:14.219 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3e7 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-05-02 09:27:14.220 UTC [cauthdsl] func2 -> DEBU 3e8 0xc0008b76b0 principal matched by identity 0" +"2019-05-02 09:27:14.223 UTC [msp.identity] Verify -> DEBU 3e9 Verify: digest = 00000000 be 65 ff 94 74 b5 dd 0a 8b e0 fb 53 1f bc cb 53 |.e..t......S...S| +00000010 2c 56 9e 6a cc 84 33 2f a0 93 1f 86 d6 33 5e 45 |,V.j..3/.....3^E|" +"2019-05-02 09:27:14.223 UTC [msp.identity] Verify -> DEBU 3ea Verify: sig = 00000000 30 44 02 20 5c 06 73 4e 5f 4a a6 b1 a0 36 db 18 |0D. \.sN_J...6..| +00000010 83 d9 ac 96 21 2f fa cb cb 16 cd 0c 79 ce 78 b9 |....!/......y.x.| +00000020 74 f6 6e 26 02 20 35 72 5f ea b5 76 18 c6 4a 55 |t.n&. 5r_..v..JU| +00000030 64 5e 26 e7 68 0c 17 1b be 2e 15 bb 05 06 1a 74 |d^&.h..........t| +00000040 7d 02 b5 e9 86 99 |}.....|" +"2019-05-02 09:27:14.225 UTC [cauthdsl] func2 -> DEBU 3eb 0xc0008b76b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:14.225 UTC [cauthdsl] func1 -> DEBU 3ec 0xc0008b76b0 gate 1556789234218928400 evaluation succeeds" +"2019-05-02 09:27:14.225 UTC [policies] Evaluate -> DEBU 3ed Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:14.225 UTC [policies] Evaluate -> DEBU 3ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:14.225 UTC [policies] Evaluate -> DEBU 3ef Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-05-02 09:27:14.226 UTC [policies] Evaluate -> DEBU 3f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-05-02 09:27:14.226 UTC [common.configtx] verifyDeltaSet -> DEBU 3f1 Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:14.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3f2 Processing change to key: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f3 Processing change to key: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f4 Processing change to key: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f5 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f6 Processing change to key: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:14.229 UTC [common.configtx] verifyDeltaSet -> DEBU 3f7 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:14.230 UTC [common.configtx] recurseConfigMap -> DEBU 3f8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.230 UTC [common.configtx] recurseConfigMap -> DEBU 3f9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.231 UTC [common.configtx] recurseConfigMap -> DEBU 3fa Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.231 UTC [common.configtx] recurseConfigMap -> DEBU 3fb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3fc Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3fd Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3fe Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.232 UTC [common.configtx] recurseConfigMap -> DEBU 3ff Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.233 UTC [common.configtx] recurseConfigMap -> DEBU 400 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 401 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 402 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 403 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.234 UTC [common.configtx] recurseConfigMap -> DEBU 404 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.235 UTC [common.configtx] recurseConfigMap -> DEBU 405 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.235 UTC [common.configtx] recurseConfigMap -> DEBU 406 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 407 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 408 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 409 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40a Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.236 UTC [common.configtx] recurseConfigMap -> DEBU 40d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.237 UTC [common.configtx] recurseConfigMap -> DEBU 40e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.237 UTC [msp.identity] Sign -> DEBU 40f Sign: plaintext: 0AD2060A1B08011A0608F2EFAAE60522...2B4A1C0498989CB418996DBC241BDFD9 " +"2019-05-02 09:27:14.237 UTC [msp.identity] Sign -> DEBU 410 Sign: digest: DC2D9F9564EAF37BA9F69AAE8C22B42AB99D6A9EE3A09446DAF53F04513B57FB " +"2019-05-02 09:27:14.238 UTC [msp.identity] Sign -> DEBU 411 Sign: plaintext: 0ACE060A1708041A0608F2EFAAE60522...E052C51F0D3B206F9EFB9A4DE09B6230 " +"2019-05-02 09:27:14.238 UTC [msp.identity] Sign -> DEBU 412 Sign: digest: 12FAEDAB443FA508631D7D64AA5E3CDFC584DEA945117649CD4FE37A9F0EEA29 " +"2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 413 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 414 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 415 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 416 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:14.239 UTC [policies] Evaluate -> DEBU 417 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:14.239 UTC [msp] DeserializeIdentity -> DEBU 418 Obtaining identity" +"2019-05-02 09:27:14.240 UTC [msp.identity] newIdentity -> DEBU 419 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -1748,49 +1745,49 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.856 UTC [cauthdsl] func1 -> DEBU 41d 0xc000232b80 gate 1556760638856352100 evaluation starts" -"2019-05-02 01:30:38.856 UTC [cauthdsl] func2 -> DEBU 41e 0xc000232b80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:38.856 UTC [cauthdsl] func2 -> DEBU 41f 0xc000232b80 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:38.856 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 420 Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-05-02 01:30:38.856 UTC [msp] Validate -> DEBU 421 MSP OrdererMSP validating identity" -"2019-05-02 01:30:38.856 UTC [cauthdsl] func2 -> DEBU 422 0xc000232b80 principal matched by identity 0" -"2019-05-02 01:30:38.857 UTC [msp.identity] Verify -> DEBU 423 Verify: digest = 00000000 7e 60 cf e7 d4 6f cf 69 91 05 ed 09 4c 0c 81 2d |~`...o.i....L..-| -00000010 f7 83 f8 02 d5 04 22 e2 d4 17 09 1e e1 e0 d4 45 |......"........E|" -"2019-05-02 01:30:38.858 UTC [msp.identity] Verify -> DEBU 424 Verify: sig = 00000000 30 45 02 21 00 ab 21 9a e4 e7 e2 0e 03 91 3f 20 |0E.!..!.......? | -00000010 c0 46 4d e6 3f 45 ba 78 ca 75 0e e1 27 a3 d4 7e |.FM.?E.x.u..'..~| -00000020 26 37 58 21 71 02 20 3d e7 48 98 f6 7e 33 e5 7c |&7X!q. =.H..~3.|| -00000030 5e c8 0a ad d1 5a 5d c4 8f ca 0b 80 1f 08 6a a9 |^....Z].......j.| -00000040 59 af 79 31 22 80 be |Y.y1"..|" -"2019-05-02 01:30:38.858 UTC [cauthdsl] func2 -> DEBU 425 0xc000232b80 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:38.858 UTC [cauthdsl] func1 -> DEBU 426 0xc000232b80 gate 1556760638856352100 evaluation succeeds" -"2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 427 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 428 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 429 Signature set satisfies policy /Channel/Orderer/Writers" -"2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 42a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 42b Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:30:38.858 UTC [policies] Evaluate -> DEBU 42c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:30:38.858 UTC [common.channelconfig] NewStandardValues -> DEBU 42d Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42e Processing field: HashingAlgorithm" -"2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42f Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 430 Processing field: OrdererAddresses" -"2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 431 Processing field: Consortium" -"2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 432 Processing field: Capabilities" -"2019-05-02 01:30:38.858 UTC [common.channelconfig] NewStandardValues -> DEBU 433 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 434 Processing field: ConsensusType" -"2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 435 Processing field: BatchSize" -"2019-05-02 01:30:38.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 436 Processing field: BatchTimeout" -"2019-05-02 01:30:38.859 UTC [common.channelconfig] initializeProtosStruct -> DEBU 437 Processing field: KafkaBrokers" -"2019-05-02 01:30:38.859 UTC [common.channelconfig] initializeProtosStruct -> DEBU 438 Processing field: ChannelRestrictions" -"2019-05-02 01:30:38.859 UTC [common.channelconfig] initializeProtosStruct -> DEBU 439 Processing field: Capabilities" -"2019-05-02 01:30:38.859 UTC [common.channelconfig] NewStandardValues -> DEBU 43a Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:38.859 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43b Processing field: Endpoints" -"2019-05-02 01:30:38.859 UTC [common.channelconfig] NewStandardValues -> DEBU 43c Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.859 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43d Processing field: MSP" -"2019-05-02 01:30:38.859 UTC [common.channelconfig] validateMSP -> DEBU 43e Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:38.859 UTC [msp] newBccspMsp -> DEBU 43f Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.859 UTC [msp] New -> DEBU 440 Creating Cache-MSP instance" -"2019-05-02 01:30:38.859 UTC [msp] Setup -> DEBU 441 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:38.859 UTC [msp.identity] newIdentity -> DEBU 442 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.240 UTC [cauthdsl] func1 -> DEBU 41a 0xc00091e3e0 gate 1556789234240548300 evaluation starts" +"2019-05-02 09:27:14.241 UTC [cauthdsl] func2 -> DEBU 41b 0xc00091e3e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:14.241 UTC [cauthdsl] func2 -> DEBU 41c 0xc00091e3e0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:14.241 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 41d Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-05-02 09:27:14.242 UTC [msp] Validate -> DEBU 41e MSP OrdererMSP validating identity" +"2019-05-02 09:27:14.242 UTC [cauthdsl] func2 -> DEBU 41f 0xc00091e3e0 principal matched by identity 0" +"2019-05-02 09:27:14.242 UTC [msp.identity] Verify -> DEBU 420 Verify: digest = 00000000 12 fa ed ab 44 3f a5 08 63 1d 7d 64 aa 5e 3c df |....D?..c.}d.^<.| +00000010 c5 84 de a9 45 11 76 49 cd 4f e3 7a 9f 0e ea 29 |....E.vI.O.z...)|" +"2019-05-02 09:27:14.242 UTC [msp.identity] Verify -> DEBU 421 Verify: sig = 00000000 30 45 02 21 00 bf a9 2c ea a3 4b d3 1b 86 bf 38 |0E.!...,..K....8| +00000010 5e 65 0b 45 ae 4e 13 3a ff e5 27 5b c6 12 77 da |^e.E.N.:..'[..w.| +00000020 2c 07 09 f2 8f 02 20 69 33 cd d4 ff e7 0e 3f 7e |,..... i3.....?~| +00000030 b2 8c f5 b5 44 73 cb 4f 17 9d fa f3 41 c1 3d 31 |....Ds.O....A.=1| +00000040 b3 a6 61 9e ec 61 0e |..a..a.|" +"2019-05-02 09:27:14.244 UTC [cauthdsl] func2 -> DEBU 422 0xc00091e3e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:14.244 UTC [cauthdsl] func1 -> DEBU 423 0xc00091e3e0 gate 1556789234240548300 evaluation succeeds" +"2019-05-02 09:27:14.244 UTC [policies] Evaluate -> DEBU 424 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:14.244 UTC [policies] Evaluate -> DEBU 425 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:14.244 UTC [policies] Evaluate -> DEBU 426 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-05-02 09:27:14.245 UTC [policies] Evaluate -> DEBU 427 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-05-02 09:27:14.245 UTC [policies] Evaluate -> DEBU 428 Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:14.246 UTC [policies] Evaluate -> DEBU 429 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:14.246 UTC [common.channelconfig] NewStandardValues -> DEBU 42a Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:14.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42b Processing field: HashingAlgorithm" +"2019-05-02 09:27:14.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42c Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:14.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42d Processing field: OrdererAddresses" +"2019-05-02 09:27:14.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42e Processing field: Consortium" +"2019-05-02 09:27:14.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42f Processing field: Capabilities" +"2019-05-02 09:27:14.248 UTC [common.channelconfig] NewStandardValues -> DEBU 430 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:14.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 431 Processing field: ConsensusType" +"2019-05-02 09:27:14.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 432 Processing field: BatchSize" +"2019-05-02 09:27:14.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 433 Processing field: BatchTimeout" +"2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 434 Processing field: KafkaBrokers" +"2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 435 Processing field: ChannelRestrictions" +"2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 436 Processing field: Capabilities" +"2019-05-02 09:27:14.249 UTC [common.channelconfig] NewStandardValues -> DEBU 437 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 438 Processing field: Endpoints" +"2019-05-02 09:27:14.249 UTC [common.channelconfig] NewStandardValues -> DEBU 439 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.249 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43a Processing field: MSP" +"2019-05-02 09:27:14.250 UTC [common.channelconfig] validateMSP -> DEBU 43b Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:14.250 UTC [msp] newBccspMsp -> DEBU 43c Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.250 UTC [msp] New -> DEBU 43d Creating Cache-MSP instance" +"2019-05-02 09:27:14.250 UTC [msp] Setup -> DEBU 43e Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:14.251 UTC [msp.identity] newIdentity -> DEBU 43f Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1804,7 +1801,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:38.859 UTC [msp.identity] newIdentity -> DEBU 443 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.252 UTC [msp.identity] newIdentity -> DEBU 440 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1817,63 +1814,20 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.859 UTC [msp] Validate -> DEBU 444 MSP OrdererMSP validating identity" -"2019-05-02 01:30:38.860 UTC [common.channelconfig] NewStandardValues -> DEBU 445 Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:38.860 UTC [common.channelconfig] initializeProtosStruct -> DEBU 446 Processing field: ACLs" -"2019-05-02 01:30:38.860 UTC [common.channelconfig] initializeProtosStruct -> DEBU 447 Processing field: Capabilities" -"2019-05-02 01:30:38.860 UTC [common.channelconfig] NewStandardValues -> DEBU 448 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:38.860 UTC [common.channelconfig] initializeProtosStruct -> DEBU 449 Processing field: AnchorPeers" -"2019-05-02 01:30:38.860 UTC [common.channelconfig] NewStandardValues -> DEBU 44a Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.860 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44b Processing field: MSP" -"2019-05-02 01:30:38.860 UTC [common.channelconfig] Validate -> DEBU 44c Anchor peers for org Org1MSP are " -"2019-05-02 01:30:38.860 UTC [common.channelconfig] validateMSP -> DEBU 44d Setting up MSP for org Org1MSP" -"2019-05-02 01:30:38.860 UTC [msp] newBccspMsp -> DEBU 44e Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.860 UTC [msp] New -> DEBU 44f Creating Cache-MSP instance" -"2019-05-02 01:30:38.860 UTC [msp] Setup -> DEBU 450 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:38.860 UTC [msp.identity] newIdentity -> DEBU 451 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-05-02 01:30:38.860 UTC [msp.identity] newIdentity -> DEBU 452 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-05-02 01:30:38.861 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 453 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:38.861 UTC [msp] Validate -> DEBU 454 MSP Org1MSP validating identity" -"2019-05-02 01:30:38.861 UTC [msp] getCertificationChain -> DEBU 455 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:38.861 UTC [msp] hasOURole -> DEBU 456 MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:38.861 UTC [msp] getCertificationChain -> DEBU 457 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:38.861 UTC [common.channelconfig] NewStandardValues -> DEBU 458 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:38.861 UTC [common.channelconfig] initializeProtosStruct -> DEBU 459 Processing field: AnchorPeers" -"2019-05-02 01:30:38.862 UTC [common.channelconfig] NewStandardValues -> DEBU 45a Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.862 UTC [common.channelconfig] initializeProtosStruct -> DEBU 45b Processing field: MSP" -"2019-05-02 01:30:38.863 UTC [common.channelconfig] Validate -> DEBU 45c Anchor peers for org Org2MSP are " -"2019-05-02 01:30:38.863 UTC [common.channelconfig] validateMSP -> DEBU 45d Setting up MSP for org Org2MSP" -"2019-05-02 01:30:38.864 UTC [msp] newBccspMsp -> DEBU 45e Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.864 UTC [msp] New -> DEBU 45f Creating Cache-MSP instance" -"2019-05-02 01:30:38.865 UTC [msp] Setup -> DEBU 460 Setting up MSP instance Org2MSP" -"2019-05-02 01:30:38.866 UTC [msp.identity] newIdentity -> DEBU 461 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.253 UTC [msp] Validate -> DEBU 441 MSP OrdererMSP validating identity" +"2019-05-02 09:27:14.253 UTC [common.channelconfig] NewStandardValues -> DEBU 442 Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 443 Processing field: ACLs" +"2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 444 Processing field: Capabilities" +"2019-05-02 09:27:14.253 UTC [common.channelconfig] NewStandardValues -> DEBU 445 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 446 Processing field: AnchorPeers" +"2019-05-02 09:27:14.253 UTC [common.channelconfig] NewStandardValues -> DEBU 447 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 448 Processing field: MSP" +"2019-05-02 09:27:14.253 UTC [common.channelconfig] Validate -> DEBU 449 Anchor peers for org Org2MSP are " +"2019-05-02 09:27:14.253 UTC [common.channelconfig] validateMSP -> DEBU 44a Setting up MSP for org Org2MSP" +"2019-05-02 09:27:14.253 UTC [msp] newBccspMsp -> DEBU 44b Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.253 UTC [msp] New -> DEBU 44c Creating Cache-MSP instance" +"2019-05-02 09:27:14.254 UTC [msp] Setup -> DEBU 44d Setting up MSP instance Org2MSP" +"2019-05-02 09:27:14.255 UTC [msp.identity] newIdentity -> DEBU 44e Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1888,7 +1842,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.866 UTC [msp.identity] newIdentity -> DEBU 462 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.255 UTC [msp.identity] newIdentity -> DEBU 44f Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1902,229 +1856,21 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.868 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 463 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:38.868 UTC [msp] Validate -> DEBU 464 MSP Org2MSP validating identity" -"2019-05-02 01:30:38.868 UTC [msp] getCertificationChain -> DEBU 465 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:38.869 UTC [msp] hasOURole -> DEBU 466 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:38.869 UTC [msp] getCertificationChain -> DEBU 467 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:38.869 UTC [msp] Setup -> DEBU 468 Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:38.870 UTC [msp] Setup -> DEBU 469 MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:38.870 UTC [policies] NewManagerImpl -> DEBU 46a Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.871 UTC [policies] NewManagerImpl -> DEBU 46b Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.871 UTC [policies] NewManagerImpl -> DEBU 46c Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.871 UTC [policies] NewManagerImpl -> DEBU 46d Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:38.872 UTC [policies] NewManagerImpl -> DEBU 46e Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:38.872 UTC [policies] NewManagerImpl -> DEBU 46f Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:38.872 UTC [policies] NewManagerImpl -> DEBU 470 Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:38.873 UTC [policies] NewManagerImpl -> DEBU 471 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.873 UTC [policies] NewManagerImpl -> DEBU 472 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.874 UTC [policies] NewManagerImpl -> DEBU 473 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.874 UTC [policies] NewManagerImpl -> DEBU 474 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.874 UTC [policies] NewManagerImpl -> DEBU 475 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.875 UTC [policies] NewManagerImpl -> DEBU 476 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.876 UTC [policies] NewManagerImpl -> DEBU 477 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.876 UTC [policies] NewManagerImpl -> DEBU 478 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.876 UTC [policies] NewManagerImpl -> DEBU 479 Proposed new policy ChannelCreationPolicy for Channel/Application" -"2019-05-02 01:30:38.877 UTC [policies] GetPolicy -> DEBU 47a Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" -"2019-05-02 01:30:38.877 UTC [policies] NewManagerImpl -> DEBU 47b Proposed new policy Readers for Channel" -"2019-05-02 01:30:38.877 UTC [policies] GetPolicy -> DEBU 47c Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" -"2019-05-02 01:30:38.878 UTC [policies] NewManagerImpl -> DEBU 47d Proposed new policy Writers for Channel" -"2019-05-02 01:30:38.878 UTC [policies] GetPolicy -> DEBU 47e Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" -"2019-05-02 01:30:38.879 UTC [policies] NewManagerImpl -> DEBU 47f Proposed new policy Admins for Channel" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 480 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 481 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 483 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 484 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 485 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 486 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 487 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 491 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 492 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 493 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 494 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 495 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 496 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:38.879 UTC [common.configtx] addToMap -> DEBU 497 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 498 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 499 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49d Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49e Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Group] /Channel" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:38.880 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b4 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b5 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:38.881 UTC [common.configtx] addToMap -> DEBU 4b6 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:38.881 UTC [common.configtx] verifyDeltaSet -> DEBU 4b7 Processing change to key: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:38.881 UTC [common.configtx] verifyDeltaSet -> DEBU 4b8 Processing change to key: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:38.881 UTC [common.configtx] verifyDeltaSet -> DEBU 4b9 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:38.881 UTC [common.configtx] verifyDeltaSet -> DEBU 4ba Processing change to key: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:38.881 UTC [common.configtx] verifyDeltaSet -> DEBU 4bb Processing change to key: [Group] /Channel/Application" -"2019-05-02 01:30:38.881 UTC [common.configtx] policyForItem -> DEBU 4bc Getting policy for item Application with mod_policy ChannelCreationPolicy" -"2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4bd Manager Channel looking up path []" -"2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4be Manager Channel has managers Orderer" -"2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4bf Manager Channel has managers Application" -"2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c0 Manager Channel looking up path [Application]" -"2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c1 Manager Channel has managers Orderer" -"2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c2 Manager Channel has managers Application" -"2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c3 Manager Channel/Application looking up path []" -"2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c4 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:38.881 UTC [policies] Manager -> DEBU 4c5 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:38.881 UTC [policies] Evaluate -> DEBU 4c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" -"2019-05-02 01:30:38.881 UTC [policies] Evaluate -> DEBU 4c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:38.881 UTC [policies] Evaluate -> DEBU 4c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-05-02 01:30:38.881 UTC [msp] DeserializeIdentity -> DEBU 4c9 Obtaining identity" -"2019-05-02 01:30:38.882 UTC [msp.identity] newIdentity -> DEBU 4ca Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-05-02 01:30:38.882 UTC [cauthdsl] func1 -> DEBU 4cb 0xc000b18c10 gate 1556760638882240600 evaluation starts" -"2019-05-02 01:30:38.882 UTC [cauthdsl] func2 -> DEBU 4cc 0xc000b18c10 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:38.882 UTC [cauthdsl] func2 -> DEBU 4cd 0xc000b18c10 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:38.882 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4ce Checking if identity satisfies ADMIN role for Org1MSP" -"2019-05-02 01:30:38.882 UTC [cauthdsl] func2 -> DEBU 4cf 0xc000b18c10 principal matched by identity 0" -"2019-05-02 01:30:38.882 UTC [msp.identity] Verify -> DEBU 4d0 Verify: digest = 00000000 89 c5 30 09 2f 42 58 54 bf b0 28 d6 86 d6 13 e4 |..0./BXT..(.....| -00000010 9b 54 6d d0 1e a8 cf b7 98 c0 12 76 b9 bb 1c 36 |.Tm........v...6|" -"2019-05-02 01:30:38.882 UTC [msp.identity] Verify -> DEBU 4d1 Verify: sig = 00000000 30 45 02 21 00 e7 d9 34 ae 08 7f 3b 30 d5 e4 18 |0E.!...4...;0...| -00000010 28 11 f1 fb 87 bd 97 11 28 b9 2f 5a c0 f3 71 87 |(.......(./Z..q.| -00000020 29 cc b5 17 a5 02 20 36 16 4d 85 ba c9 4e c1 31 |)..... 6.M...N.1| -00000030 b0 7f ea 5e 5f 8f d7 10 9b 58 85 dc 97 6d d9 55 |...^_....X...m.U| -00000040 d6 a1 57 ad 6c 81 d7 |..W.l..|" -"2019-05-02 01:30:38.884 UTC [cauthdsl] func2 -> DEBU 4d2 0xc000b18c10 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:38.884 UTC [cauthdsl] func1 -> DEBU 4d3 0xc000b18c10 gate 1556760638882240600 evaluation succeeds" -"2019-05-02 01:30:38.884 UTC [policies] Evaluate -> DEBU 4d4 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:38.884 UTC [policies] Evaluate -> DEBU 4d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:38.884 UTC [policies] Evaluate -> DEBU 4d6 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" -"2019-05-02 01:30:38.884 UTC [policies] Evaluate -> DEBU 4d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" -"2019-05-02 01:30:38.884 UTC [common.configtx] verifyDeltaSet -> DEBU 4d8 Processing change to key: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:38.884 UTC [common.configtx] verifyDeltaSet -> DEBU 4d9 Processing change to key: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:38.884 UTC [common.configtx] verifyDeltaSet -> DEBU 4da Processing change to key: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4db Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4dc Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4dd Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4de Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4df Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e0 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e1 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e2 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e4 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.885 UTC [common.configtx] recurseConfigMap -> DEBU 4e5 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.886 UTC [common.configtx] recurseConfigMap -> DEBU 4e6 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.886 UTC [common.configtx] recurseConfigMap -> DEBU 4e7 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.887 UTC [common.configtx] recurseConfigMap -> DEBU 4e8 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.887 UTC [common.configtx] recurseConfigMap -> DEBU 4e9 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.888 UTC [common.configtx] recurseConfigMap -> DEBU 4ea Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.888 UTC [common.configtx] recurseConfigMap -> DEBU 4eb Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.888 UTC [common.configtx] recurseConfigMap -> DEBU 4ec Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.889 UTC [common.configtx] recurseConfigMap -> DEBU 4ed Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.889 UTC [common.configtx] recurseConfigMap -> DEBU 4ee Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.890 UTC [common.configtx] recurseConfigMap -> DEBU 4ef Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.890 UTC [common.configtx] recurseConfigMap -> DEBU 4f0 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.890 UTC [common.configtx] recurseConfigMap -> DEBU 4f1 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:38.891 UTC [common.channelconfig] NewStandardValues -> DEBU 4f2 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:38.891 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f3 Processing field: HashingAlgorithm" -"2019-05-02 01:30:38.892 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f4 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:38.892 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f5 Processing field: OrdererAddresses" -"2019-05-02 01:30:38.893 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f6 Processing field: Consortium" -"2019-05-02 01:30:38.893 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f7 Processing field: Capabilities" -"2019-05-02 01:30:38.894 UTC [common.channelconfig] NewStandardValues -> DEBU 4f8 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:38.894 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f9 Processing field: ConsensusType" -"2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fa Processing field: BatchSize" -"2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fb Processing field: BatchTimeout" -"2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fc Processing field: KafkaBrokers" -"2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: ChannelRestrictions" -"2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fe Processing field: Capabilities" -"2019-05-02 01:30:38.895 UTC [common.channelconfig] NewStandardValues -> DEBU 4ff Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 500 Processing field: Endpoints" -"2019-05-02 01:30:38.895 UTC [common.channelconfig] NewStandardValues -> DEBU 501 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU 502 Processing field: MSP" -"2019-05-02 01:30:38.895 UTC [common.channelconfig] validateMSP -> DEBU 503 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:38.895 UTC [msp] newBccspMsp -> DEBU 504 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.895 UTC [msp] New -> DEBU 505 Creating Cache-MSP instance" -"2019-05-02 01:30:38.895 UTC [msp] Setup -> DEBU 506 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:38.896 UTC [msp.identity] newIdentity -> DEBU 507 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-05-02 01:30:38.896 UTC [msp.identity] newIdentity -> DEBU 508 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-05-02 01:30:38.896 UTC [msp] Validate -> DEBU 509 MSP OrdererMSP validating identity" -"2019-05-02 01:30:38.896 UTC [common.channelconfig] NewStandardValues -> DEBU 50a Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:38.896 UTC [common.channelconfig] initializeProtosStruct -> DEBU 50b Processing field: ACLs" -"2019-05-02 01:30:38.896 UTC [common.channelconfig] initializeProtosStruct -> DEBU 50c Processing field: Capabilities" -"2019-05-02 01:30:38.897 UTC [common.channelconfig] NewStandardValues -> DEBU 50d Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:38.898 UTC [common.channelconfig] initializeProtosStruct -> DEBU 50e Processing field: AnchorPeers" -"2019-05-02 01:30:38.899 UTC [common.channelconfig] NewStandardValues -> DEBU 50f Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.899 UTC [common.channelconfig] initializeProtosStruct -> DEBU 510 Processing field: MSP" -"2019-05-02 01:30:38.900 UTC [common.channelconfig] Validate -> DEBU 511 Anchor peers for org Org1MSP are " -"2019-05-02 01:30:38.900 UTC [common.channelconfig] validateMSP -> DEBU 512 Setting up MSP for org Org1MSP" -"2019-05-02 01:30:38.900 UTC [msp] newBccspMsp -> DEBU 513 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.900 UTC [msp] New -> DEBU 514 Creating Cache-MSP instance" -"2019-05-02 01:30:38.901 UTC [msp] Setup -> DEBU 515 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:38.902 UTC [msp.identity] newIdentity -> DEBU 516 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.257 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 450 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:14.257 UTC [msp] Validate -> DEBU 451 MSP Org2MSP validating identity" +"2019-05-02 09:27:14.257 UTC [msp] getCertificationChain -> DEBU 452 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:14.257 UTC [msp] hasOURole -> DEBU 453 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:14.258 UTC [msp] getCertificationChain -> DEBU 454 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:14.258 UTC [common.channelconfig] NewStandardValues -> DEBU 455 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:14.258 UTC [common.channelconfig] initializeProtosStruct -> DEBU 456 Processing field: AnchorPeers" +"2019-05-02 09:27:14.258 UTC [common.channelconfig] NewStandardValues -> DEBU 457 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.258 UTC [common.channelconfig] initializeProtosStruct -> DEBU 458 Processing field: MSP" +"2019-05-02 09:27:14.261 UTC [common.channelconfig] Validate -> DEBU 459 Anchor peers for org Org1MSP are " +"2019-05-02 09:27:14.261 UTC [common.channelconfig] validateMSP -> DEBU 45a Setting up MSP for org Org1MSP" +"2019-05-02 09:27:14.261 UTC [msp] newBccspMsp -> DEBU 45b Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.261 UTC [msp] New -> DEBU 45c Creating Cache-MSP instance" +"2019-05-02 09:27:14.261 UTC [msp] Setup -> DEBU 45d Setting up MSP instance Org1MSP" +"2019-05-02 09:27:14.262 UTC [msp.identity] newIdentity -> DEBU 45e Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2139,7 +1885,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:38.902 UTC [msp.identity] newIdentity -> DEBU 517 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.263 UTC [msp.identity] newIdentity -> DEBU 45f Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2153,204 +1899,195 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.904 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 518 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:38.904 UTC [msp] Validate -> DEBU 519 MSP Org1MSP validating identity" -"2019-05-02 01:30:38.904 UTC [msp] getCertificationChain -> DEBU 51a MSP Org1MSP getting certification chain" -"2019-05-02 01:30:38.905 UTC [msp] hasOURole -> DEBU 51b MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:38.905 UTC [msp] getCertificationChain -> DEBU 51c MSP Org1MSP getting certification chain" -"2019-05-02 01:30:38.906 UTC [common.channelconfig] NewStandardValues -> DEBU 51d Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:38.906 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51e Processing field: AnchorPeers" -"2019-05-02 01:30:38.906 UTC [common.channelconfig] NewStandardValues -> DEBU 51f Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.906 UTC [common.channelconfig] initializeProtosStruct -> DEBU 520 Processing field: MSP" -"2019-05-02 01:30:38.907 UTC [common.channelconfig] Validate -> DEBU 521 Anchor peers for org Org2MSP are " -"2019-05-02 01:30:38.907 UTC [common.channelconfig] validateMSP -> DEBU 522 Setting up MSP for org Org2MSP" -"2019-05-02 01:30:38.907 UTC [msp] newBccspMsp -> DEBU 523 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.908 UTC [msp] New -> DEBU 524 Creating Cache-MSP instance" -"2019-05-02 01:30:38.908 UTC [msp] Setup -> DEBU 525 Setting up MSP instance Org2MSP" -"2019-05-02 01:30:38.909 UTC [msp.identity] newIdentity -> DEBU 526 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +"2019-05-02 09:27:14.264 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 460 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:14.264 UTC [msp] Validate -> DEBU 461 MSP Org1MSP validating identity" +"2019-05-02 09:27:14.265 UTC [msp] getCertificationChain -> DEBU 462 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:14.265 UTC [msp] hasOURole -> DEBU 463 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:14.265 UTC [msp] getCertificationChain -> DEBU 464 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:14.266 UTC [msp] Setup -> DEBU 465 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:14.266 UTC [msp] Setup -> DEBU 466 MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 467 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 468 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 469 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46a Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46b Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46c Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:14.266 UTC [policies] NewManagerImpl -> DEBU 46d Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 46e Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 46f Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 470 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 471 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.267 UTC [policies] NewManagerImpl -> DEBU 472 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 473 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 474 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 475 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 476 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-05-02 09:27:14.268 UTC [policies] GetPolicy -> DEBU 477 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-05-02 09:27:14.268 UTC [policies] NewManagerImpl -> DEBU 478 Proposed new policy Readers for Channel" +"2019-05-02 09:27:14.268 UTC [policies] GetPolicy -> DEBU 479 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-05-02 09:27:14.269 UTC [policies] NewManagerImpl -> DEBU 47a Proposed new policy Writers for Channel" +"2019-05-02 09:27:14.269 UTC [policies] GetPolicy -> DEBU 47b Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-05-02 09:27:14.270 UTC [policies] NewManagerImpl -> DEBU 47c Proposed new policy Admins for Channel" +"2019-05-02 09:27:14.270 UTC [common.configtx] addToMap -> DEBU 47d Adding to config map: [Group] /Channel" +"2019-05-02 09:27:14.270 UTC [common.configtx] addToMap -> DEBU 47e Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 47f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 480 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 481 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:14.271 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 483 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 484 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 485 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:14.272 UTC [common.configtx] addToMap -> DEBU 486 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 487 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:14.273 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-05-02 09:27:14.274 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:14.274 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.274 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:14.275 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:14.275 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:14.275 UTC [common.configtx] addToMap -> DEBU 491 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 492 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 493 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 494 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 495 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:14.276 UTC [common.configtx] addToMap -> DEBU 496 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 497 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 498 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 499 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49a Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49b Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:14.277 UTC [common.configtx] addToMap -> DEBU 49d Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 49e Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:14.278 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:14.279 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:14.280 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:14.280 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:14.281 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:14.281 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:14.281 UTC [common.configtx] verifyDeltaSet -> DEBU 4b4 Processing change to key: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:14.281 UTC [common.configtx] verifyDeltaSet -> DEBU 4b5 Processing change to key: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b6 Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b7 Processing change to key: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b8 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4b9 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:14.282 UTC [common.configtx] verifyDeltaSet -> DEBU 4ba Processing change to key: [Group] /Channel/Application" +"2019-05-02 09:27:14.283 UTC [common.configtx] policyForItem -> DEBU 4bb Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4bc Manager Channel looking up path []" +"2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4bd Manager Channel has managers Orderer" +"2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4be Manager Channel has managers Application" +"2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4bf Manager Channel looking up path [Application]" +"2019-05-02 09:27:14.283 UTC [policies] Manager -> DEBU 4c0 Manager Channel has managers Orderer" +"2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c1 Manager Channel has managers Application" +"2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c2 Manager Channel/Application looking up path []" +"2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c3 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:14.284 UTC [policies] Manager -> DEBU 4c4 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:14.284 UTC [policies] Evaluate -> DEBU 4c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-05-02 09:27:14.284 UTC [policies] Evaluate -> DEBU 4c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:14.285 UTC [policies] Evaluate -> DEBU 4c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-05-02 09:27:14.285 UTC [msp] DeserializeIdentity -> DEBU 4c8 Obtaining identity" +"2019-05-02 09:27:14.286 UTC [msp.identity] newIdentity -> DEBU 4c9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-05-02 01:30:38.909 UTC [msp.identity] newIdentity -> DEBU 527 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.911 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 528 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:38.911 UTC [msp] Validate -> DEBU 529 MSP Org2MSP validating identity" -"2019-05-02 01:30:38.912 UTC [msp] getCertificationChain -> DEBU 52a MSP Org2MSP getting certification chain" -"2019-05-02 01:30:38.912 UTC [msp] hasOURole -> DEBU 52b MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:38.912 UTC [msp] getCertificationChain -> DEBU 52c MSP Org2MSP getting certification chain" -"2019-05-02 01:30:38.912 UTC [msp] Setup -> DEBU 52d Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:38.912 UTC [msp] Setup -> DEBU 52e MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:38.912 UTC [policies] NewManagerImpl -> DEBU 52f Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.912 UTC [policies] NewManagerImpl -> DEBU 530 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.912 UTC [policies] NewManagerImpl -> DEBU 531 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.912 UTC [policies] NewManagerImpl -> DEBU 532 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 533 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 534 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 535 Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 536 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 537 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 538 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 539 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53a Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53b Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53c Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53d Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53e Proposed new policy Readers for Channel/Application" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 53f Proposed new policy Writers for Channel/Application" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 540 Proposed new policy Admins for Channel/Application" -"2019-05-02 01:30:38.913 UTC [policies] NewManagerImpl -> DEBU 541 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:30:38.914 UTC [policies] NewManagerImpl -> DEBU 542 Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:30:38.914 UTC [policies] NewManagerImpl -> DEBU 543 Proposed new policy Readers for Channel" -"2019-05-02 01:30:38.915 UTC [policies] NewManagerImpl -> DEBU 544 Proposed new policy Writers for Channel" -"2019-05-02 01:30:38.915 UTC [policies] NewManagerImpl -> DEBU 545 Proposed new policy Admins for Channel" -"2019-05-02 01:30:38.916 UTC [common.configtx] addToMap -> DEBU 546 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:38.916 UTC [common.configtx] addToMap -> DEBU 547 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:38.916 UTC [common.configtx] addToMap -> DEBU 548 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.916 UTC [common.configtx] addToMap -> DEBU 549 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:38.917 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:38.919 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:38.919 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 55f Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 560 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 561 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 562 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 563 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 564 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 565 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:38.920 UTC [common.configtx] addToMap -> DEBU 566 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 567 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 568 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 569 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56a Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56b Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56c Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56d Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:38.921 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:38.921 UTC [common.capabilities] Supported -> DEBU 572 Orderer capability V2_0 is supported and is enabled" -"2019-05-02 01:30:38.921 UTC [common.capabilities] Supported -> DEBU 573 Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:38.921 UTC [orderer.common.cluster] NewStream -> DEBU 574 Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" -"2019-05-02 01:30:38.921 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 575 Sending msg of 24746 bytes to 3 on channel testchainid took 119.2µs" -"2019-05-02 01:30:38.922 UTC [orderer.common.cluster.step] sendMessage -> DEBU 576 Send of SubmitRequest for channel testchainid with payload of size 24746 to orderer2.example.com(orderer2.example.com:7050) took 151.1µs " -"2019-05-02 01:30:38.921 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 577 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.240.9:47268" -"2019-05-02 01:30:38.936 UTC [common.deliver] deliverBlocks -> DEBU 578 Rejecting deliver for 192.168.240.9:47266 because channel businesschannel not found" -"2019-05-02 01:30:38.938 UTC [orderer.common.server] func1 -> DEBU 579 Closing Deliver stream" -"2019-05-02 01:30:38.938 UTC [comm.grpc.server] 1 -> INFO 57a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47266 grpc.code=OK grpc.call_duration=164.2238ms -"2019-05-02 01:30:38.949 UTC [orderer.common.broadcast] Handle -> DEBU 57b Received EOF from 192.168.240.9:47268, hangup" -"2019-05-02 01:30:38.949 UTC [orderer.common.server] func1 -> DEBU 57c Closing Broadcast stream" -"2019-05-02 01:30:38.949 UTC [comm.grpc.server] 1 -> INFO 57d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47268 grpc.code=OK grpc.call_duration=164.0902ms -"2019-05-02 01:30:38.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU 57e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 24955" -"2019-05-02 01:30:38.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 57f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:38.956 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 580 Sending msg of 28 bytes to 3 on channel testchainid took 65.4µs" -"2019-05-02 01:30:38.956 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 581 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" -"2019-05-02 01:30:38.956 UTC [orderer.common.cluster.step] sendMessage -> DEBU 582 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 307.2µs " -"2019-05-02 01:30:38.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU 583 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 277.8µs " -"2019-05-02 01:30:38.960 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 584 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 -"2019-05-02 01:30:38.961 UTC [common.channelconfig] NewStandardValues -> DEBU 585 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:38.961 UTC [common.channelconfig] initializeProtosStruct -> DEBU 586 Processing field: HashingAlgorithm" -"2019-05-02 01:30:38.961 UTC [common.channelconfig] initializeProtosStruct -> DEBU 587 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:38.961 UTC [common.channelconfig] initializeProtosStruct -> DEBU 588 Processing field: OrdererAddresses" -"2019-05-02 01:30:38.961 UTC [common.channelconfig] initializeProtosStruct -> DEBU 589 Processing field: Consortium" -"2019-05-02 01:30:38.961 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58a Processing field: Capabilities" -"2019-05-02 01:30:38.962 UTC [common.channelconfig] NewStandardValues -> DEBU 58b Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:38.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58c Processing field: ConsensusType" -"2019-05-02 01:30:38.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58d Processing field: BatchSize" -"2019-05-02 01:30:38.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58e Processing field: BatchTimeout" -"2019-05-02 01:30:38.963 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58f Processing field: KafkaBrokers" -"2019-05-02 01:30:38.963 UTC [common.channelconfig] initializeProtosStruct -> DEBU 590 Processing field: ChannelRestrictions" -"2019-05-02 01:30:38.963 UTC [common.channelconfig] initializeProtosStruct -> DEBU 591 Processing field: Capabilities" -"2019-05-02 01:30:38.963 UTC [common.channelconfig] NewStandardValues -> DEBU 592 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:38.963 UTC [common.channelconfig] initializeProtosStruct -> DEBU 593 Processing field: Endpoints" -"2019-05-02 01:30:38.963 UTC [common.channelconfig] NewStandardValues -> DEBU 594 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.964 UTC [common.channelconfig] initializeProtosStruct -> DEBU 595 Processing field: MSP" -"2019-05-02 01:30:38.964 UTC [common.channelconfig] validateMSP -> DEBU 596 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:38.964 UTC [msp] newBccspMsp -> DEBU 597 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.964 UTC [msp] New -> DEBU 598 Creating Cache-MSP instance" -"2019-05-02 01:30:38.965 UTC [msp] Setup -> DEBU 599 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:38.965 UTC [msp.identity] newIdentity -> DEBU 59a Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-05-02 01:30:38.966 UTC [msp.identity] newIdentity -> DEBU 59b Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-05-02 01:30:38.966 UTC [msp] Validate -> DEBU 59c MSP OrdererMSP validating identity" -"2019-05-02 01:30:38.966 UTC [common.channelconfig] NewStandardValues -> DEBU 59d Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:38.966 UTC [common.channelconfig] initializeProtosStruct -> DEBU 59e Processing field: ACLs" -"2019-05-02 01:30:38.967 UTC [common.channelconfig] initializeProtosStruct -> DEBU 59f Processing field: Capabilities" -"2019-05-02 01:30:38.967 UTC [common.channelconfig] NewStandardValues -> DEBU 5a0 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:38.967 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a1 Processing field: AnchorPeers" -"2019-05-02 01:30:38.967 UTC [common.channelconfig] NewStandardValues -> DEBU 5a2 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.967 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a3 Processing field: MSP" -"2019-05-02 01:30:38.967 UTC [common.channelconfig] Validate -> DEBU 5a4 Anchor peers for org Org1MSP are " -"2019-05-02 01:30:38.967 UTC [common.channelconfig] validateMSP -> DEBU 5a5 Setting up MSP for org Org1MSP" -"2019-05-02 01:30:38.967 UTC [msp] newBccspMsp -> DEBU 5a6 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.967 UTC [msp] New -> DEBU 5a7 Creating Cache-MSP instance" -"2019-05-02 01:30:38.968 UTC [msp] Setup -> DEBU 5a8 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:38.968 UTC [msp.identity] newIdentity -> DEBU 5a9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.287 UTC [cauthdsl] func1 -> DEBU 4ca 0xc000b52160 gate 1556789234287363800 evaluation starts" +"2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4cb 0xc000b52160 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4cc 0xc000b52160 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4cd 0xc000b52160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-05-02 09:27:14.287 UTC [cauthdsl] func2 -> DEBU 4ce 0xc000b52160 principal evaluation fails" +"2019-05-02 09:27:14.287 UTC [cauthdsl] func1 -> DEBU 4cf 0xc000b52160 gate 1556789234287363800 evaluation fails" +"2019-05-02 09:27:14.287 UTC [policies] Evaluate -> DEBU 4d0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:14.288 UTC [policies] Evaluate -> DEBU 4d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:14.288 UTC [policies] Evaluate -> DEBU 4d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-05-02 09:27:14.288 UTC [cauthdsl] func1 -> DEBU 4d3 0xc000b532e0 gate 1556789234288629900 evaluation starts" +"2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4d4 0xc000b532e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4d5 0xc000b532e0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:14.289 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4d6 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4d7 0xc000b532e0 principal matched by identity 0" +"2019-05-02 09:27:14.289 UTC [msp.identity] Verify -> DEBU 4d8 Verify: digest = 00000000 be 65 ff 94 74 b5 dd 0a 8b e0 fb 53 1f bc cb 53 |.e..t......S...S| +00000010 2c 56 9e 6a cc 84 33 2f a0 93 1f 86 d6 33 5e 45 |,V.j..3/.....3^E|" +"2019-05-02 09:27:14.289 UTC [msp.identity] Verify -> DEBU 4d9 Verify: sig = 00000000 30 44 02 20 5c 06 73 4e 5f 4a a6 b1 a0 36 db 18 |0D. \.sN_J...6..| +00000010 83 d9 ac 96 21 2f fa cb cb 16 cd 0c 79 ce 78 b9 |....!/......y.x.| +00000020 74 f6 6e 26 02 20 35 72 5f ea b5 76 18 c6 4a 55 |t.n&. 5r_..v..JU| +00000030 64 5e 26 e7 68 0c 17 1b be 2e 15 bb 05 06 1a 74 |d^&.h..........t| +00000040 7d 02 b5 e9 86 99 |}.....|" +"2019-05-02 09:27:14.289 UTC [cauthdsl] func2 -> DEBU 4da 0xc000b532e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:14.289 UTC [cauthdsl] func1 -> DEBU 4db 0xc000b532e0 gate 1556789234288629900 evaluation succeeds" +"2019-05-02 09:27:14.289 UTC [policies] Evaluate -> DEBU 4dc Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:14.289 UTC [policies] Evaluate -> DEBU 4dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:14.289 UTC [policies] Evaluate -> DEBU 4de Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-05-02 09:27:14.290 UTC [policies] Evaluate -> DEBU 4df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-05-02 09:27:14.290 UTC [common.configtx] verifyDeltaSet -> DEBU 4e0 Processing change to key: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:14.290 UTC [common.configtx] recurseConfigMap -> DEBU 4e1 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e2 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e3 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e5 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4e9 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ea Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4eb Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ec Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ed Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ee Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4ef Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.291 UTC [common.configtx] recurseConfigMap -> DEBU 4f0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f2 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f5 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.292 UTC [common.configtx] recurseConfigMap -> DEBU 4f7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:14.292 UTC [common.channelconfig] NewStandardValues -> DEBU 4f8 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f9 Processing field: HashingAlgorithm" +"2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fa Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fb Processing field: OrdererAddresses" +"2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fc Processing field: Consortium" +"2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: Capabilities" +"2019-05-02 09:27:14.292 UTC [common.channelconfig] NewStandardValues -> DEBU 4fe Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:14.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ff Processing field: ACLs" +"2019-05-02 09:27:14.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 500 Processing field: Capabilities" +"2019-05-02 09:27:14.293 UTC [common.channelconfig] NewStandardValues -> DEBU 501 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:14.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 502 Processing field: AnchorPeers" +"2019-05-02 09:27:14.293 UTC [common.channelconfig] NewStandardValues -> DEBU 503 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 504 Processing field: MSP" +"2019-05-02 09:27:14.293 UTC [common.channelconfig] Validate -> DEBU 505 Anchor peers for org Org1MSP are " +"2019-05-02 09:27:14.293 UTC [common.channelconfig] validateMSP -> DEBU 506 Setting up MSP for org Org1MSP" +"2019-05-02 09:27:14.294 UTC [msp] newBccspMsp -> DEBU 507 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.294 UTC [msp] New -> DEBU 508 Creating Cache-MSP instance" +"2019-05-02 09:27:14.294 UTC [msp] Setup -> DEBU 509 Setting up MSP instance Org1MSP" +"2019-05-02 09:27:14.294 UTC [msp.identity] newIdentity -> DEBU 50a Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2365,7 +2102,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:38.968 UTC [msp.identity] newIdentity -> DEBU 5aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.295 UTC [msp.identity] newIdentity -> DEBU 50b Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2379,24 +2116,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.969 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5ab Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:38.974 UTC [msp] Validate -> DEBU 5ac MSP Org1MSP validating identity" -"2019-05-02 01:30:38.975 UTC [msp] getCertificationChain -> DEBU 5ad MSP Org1MSP getting certification chain" -"2019-05-02 01:30:38.975 UTC [msp] hasOURole -> DEBU 5ae MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:38.975 UTC [msp] getCertificationChain -> DEBU 5af MSP Org1MSP getting certification chain" -"2019-05-02 01:30:38.976 UTC [common.channelconfig] NewStandardValues -> DEBU 5b0 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:38.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b1 Processing field: AnchorPeers" -"2019-05-02 01:30:38.976 UTC [common.channelconfig] NewStandardValues -> DEBU 5b2 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:38.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b3 Processing field: MSP" -"2019-05-02 01:30:38.976 UTC [common.channelconfig] Validate -> DEBU 5b4 Anchor peers for org Org2MSP are " -"2019-05-02 01:30:38.976 UTC [common.channelconfig] validateMSP -> DEBU 5b5 Setting up MSP for org Org2MSP" -"2019-05-02 01:30:38.976 UTC [msp] newBccspMsp -> DEBU 5b6 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:38.976 UTC [msp] New -> DEBU 5b7 Creating Cache-MSP instance" -"2019-05-02 01:30:38.977 UTC [msp] Setup -> DEBU 5b8 Setting up MSP instance Org2MSP" -"2019-05-02 01:30:38.982 UTC [orderer.common.server] Deliver -> DEBU 5b9 Starting new Deliver handler" -"2019-05-02 01:30:38.982 UTC [common.deliver] Handle -> DEBU 5ba Starting new deliver loop for 192.168.240.9:47270" -"2019-05-02 01:30:38.982 UTC [common.deliver] Handle -> DEBU 5bb Attempting to read seek info message from 192.168.240.9:47270" -"2019-05-02 01:30:38.983 UTC [msp.identity] newIdentity -> DEBU 5bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.296 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 50c Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:14.296 UTC [msp] Validate -> DEBU 50d MSP Org1MSP validating identity" +"2019-05-02 09:27:14.296 UTC [msp] getCertificationChain -> DEBU 50e MSP Org1MSP getting certification chain" +"2019-05-02 09:27:14.296 UTC [msp] hasOURole -> DEBU 50f MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:14.296 UTC [msp] getCertificationChain -> DEBU 510 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:14.297 UTC [common.channelconfig] NewStandardValues -> DEBU 511 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:14.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 512 Processing field: AnchorPeers" +"2019-05-02 09:27:14.297 UTC [common.channelconfig] NewStandardValues -> DEBU 513 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 514 Processing field: MSP" +"2019-05-02 09:27:14.297 UTC [common.channelconfig] Validate -> DEBU 515 Anchor peers for org Org2MSP are " +"2019-05-02 09:27:14.297 UTC [common.channelconfig] validateMSP -> DEBU 516 Setting up MSP for org Org2MSP" +"2019-05-02 09:27:14.297 UTC [msp] newBccspMsp -> DEBU 517 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.297 UTC [msp] New -> DEBU 518 Creating Cache-MSP instance" +"2019-05-02 09:27:14.297 UTC [msp] Setup -> DEBU 519 Setting up MSP instance Org2MSP" +"2019-05-02 09:27:14.298 UTC [msp.identity] newIdentity -> DEBU 51a Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2411,7 +2145,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.983 UTC [msp.identity] newIdentity -> DEBU 5bd Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.298 UTC [msp.identity] newIdentity -> DEBU 51b Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2425,173 +2159,413 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:38.986 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5be Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:38.986 UTC [msp] Validate -> DEBU 5bf MSP Org2MSP validating identity" -"2019-05-02 01:30:38.986 UTC [msp] getCertificationChain -> DEBU 5c0 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:38.986 UTC [msp] hasOURole -> DEBU 5c1 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:38.986 UTC [msp] getCertificationChain -> DEBU 5c2 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:38.986 UTC [msp] Setup -> DEBU 5c3 Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:38.986 UTC [msp] Setup -> DEBU 5c4 MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5c5 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5c6 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5c7 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5c8 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5c9 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5ca Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5cb Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5cc Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5cd Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5ce Proposed new policy Readers for Channel/Application" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5cf Proposed new policy Writers for Channel/Application" -"2019-05-02 01:30:38.987 UTC [policies] NewManagerImpl -> DEBU 5d0 Proposed new policy Admins for Channel/Application" -"2019-05-02 01:30:38.988 UTC [policies] NewManagerImpl -> DEBU 5d1 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:30:38.988 UTC [policies] NewManagerImpl -> DEBU 5d2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.988 UTC [policies] NewManagerImpl -> DEBU 5d3 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.989 UTC [policies] NewManagerImpl -> DEBU 5d4 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.989 UTC [policies] NewManagerImpl -> DEBU 5d5 Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:38.989 UTC [policies] NewManagerImpl -> DEBU 5d6 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:38.989 UTC [policies] NewManagerImpl -> DEBU 5d7 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:38.989 UTC [policies] NewManagerImpl -> DEBU 5d8 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:38.994 UTC [policies] NewManagerImpl -> DEBU 5d9 Proposed new policy Readers for Channel" -"2019-05-02 01:30:38.994 UTC [policies] NewManagerImpl -> DEBU 5da Proposed new policy Writers for Channel" -"2019-05-02 01:30:38.994 UTC [policies] NewManagerImpl -> DEBU 5db Proposed new policy Admins for Channel" -"2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5dc Adding to config map: [Group] /Channel" -"2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5dd Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5de Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5df Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5e0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5e1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5e2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5e3 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:38.994 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:38.996 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:38.996 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:38.996 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:38.998 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:38.998 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5ea Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5eb Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5ec Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5ed Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:38.999 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:39.000 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:39.000 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:39.000 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 5ff Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 600 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:39.002 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:39.003 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:39.003 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:39.003 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:39.003 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:39.004 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:39.004 UTC [common.channelconfig] LogSanityChecks -> DEBU 608 As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:30:39.005 UTC [common.channelconfig] LogSanityChecks -> DEBU 609 As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:30:39.005 UTC [policies] Manager -> DEBU 60a Manager Channel looking up path [Application]" -"2019-05-02 01:30:39.005 UTC [policies] Manager -> DEBU 60b Manager Channel has managers Application" -"2019-05-02 01:30:39.005 UTC [policies] Manager -> DEBU 60c Manager Channel has managers Orderer" -"2019-05-02 01:30:39.005 UTC [policies] Manager -> DEBU 60d Manager Channel/Application looking up path []" -"2019-05-02 01:30:39.006 UTC [policies] Manager -> DEBU 60e Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:39.006 UTC [policies] Manager -> DEBU 60f Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:39.006 UTC [common.channelconfig] LogSanityChecks -> DEBU 610 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:30:39.007 UTC [common.channelconfig] LogSanityChecks -> DEBU 611 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:30:39.007 UTC [common.channelconfig] LogSanityChecks -> DEBU 612 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:30:39.008 UTC [policies] Manager -> DEBU 613 Manager Channel looking up path [Orderer]" -"2019-05-02 01:30:39.008 UTC [policies] Manager -> DEBU 614 Manager Channel has managers Orderer" -"2019-05-02 01:30:39.008 UTC [policies] Manager -> DEBU 615 Manager Channel has managers Application" -"2019-05-02 01:30:39.008 UTC [policies] Manager -> DEBU 616 Manager Channel/Orderer looking up path []" -"2019-05-02 01:30:39.008 UTC [policies] Manager -> DEBU 617 Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:30:39.008 UTC [common.channelconfig] LogSanityChecks -> DEBU 618 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:30:39.008 UTC [common.capabilities] Supported -> DEBU 619 Orderer capability V2_0 is supported and is enabled" -"2019-05-02 01:30:39.008 UTC [common.capabilities] Supported -> DEBU 61a Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:39.008 UTC [fsblkstorage] newBlockfileMgr -> DEBU 61b newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " -"2019-05-02 01:30:39.008 UTC [kvledger.util] CreateDirIfMissing -> DEBU 61c CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" -"2019-05-02 01:30:39.008 UTC [kvledger.util] logDirStatus -> DEBU 61d Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" -"2019-05-02 01:30:39.009 UTC [kvledger.util] logDirStatus -> DEBU 61e After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" -"2019-05-02 01:30:39.009 UTC [fsblkstorage] newBlockfileMgr -> INFO 61f Getting block information from block storage" -"2019-05-02 01:30:39.009 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 620 Retrieving checkpoint info from block files" -"2019-05-02 01:30:39.009 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 621 retrieveLastFileSuffix()" -"2019-05-02 01:30:39.010 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 622 retrieveLastFileSuffix() - biggestFileNum = -1" -"2019-05-02 01:30:39.010 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 623 Last file number found = -1" -"2019-05-02 01:30:39.010 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 624 No block file found" -"2019-05-02 01:30:39.010 UTC [fsblkstorage] newBlockfileMgr -> DEBU 625 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000c4f440)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -"2019-05-02 01:30:39.018 UTC [fsblkstorage] newBlockIndex -> DEBU 626 newBlockIndex() - indexItems:[[BlockNum]]" -"2019-05-02 01:30:39.018 UTC [orderer.common.server] func1 -> DEBU 627 Executing callback to update root CAs" -"2019-05-02 01:30:39.018 UTC [orderer.common.server] updateTrustedRoots -> DEBU 628 updating root CAs for channel [businesschannel]" -"2019-05-02 01:30:39.018 UTC [orderer.common.server] updateTrustedRoots -> DEBU 629 adding orderer root CAs for MSP [OrdererMSP]" -"2019-05-02 01:30:39.018 UTC [orderer.common.server] updateTrustedRoots -> DEBU 62a adding app root CAs for MSP [Org1MSP]" -"2019-05-02 01:30:39.018 UTC [orderer.common.server] updateTrustedRoots -> DEBU 62b adding app root CAs for MSP [Org2MSP]" -"2019-05-02 01:30:39.027 UTC [fsblkstorage] indexBlock -> DEBU 62c Indexing block [blockNum=0, blockHash=[]byte{0xad, 0x7c, 0xdc, 0x87, 0x83, 0xa5, 0x2c, 0x74, 0x62, 0x49, 0x6a, 0xb, 0xdd, 0xfc, 0x97, 0xee, 0x22, 0x89, 0x41, 0x3b, 0xf7, 0xba, 0x29, 0xe, 0xd2, 0xf8, 0x28, 0x95, 0x25, 0x2d, 0x23, 0x51} txOffsets= -txId= locPointer=offset=39, bytesLength=23896 +"2019-05-02 09:27:14.299 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 51c Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:14.299 UTC [msp] Validate -> DEBU 51d MSP Org2MSP validating identity" +"2019-05-02 09:27:14.300 UTC [msp] getCertificationChain -> DEBU 51e MSP Org2MSP getting certification chain" +"2019-05-02 09:27:14.300 UTC [msp] hasOURole -> DEBU 51f MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:14.300 UTC [msp] getCertificationChain -> DEBU 520 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:14.301 UTC [common.channelconfig] NewStandardValues -> DEBU 521 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 522 Processing field: ConsensusType" +"2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 523 Processing field: BatchSize" +"2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 524 Processing field: BatchTimeout" +"2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 525 Processing field: KafkaBrokers" +"2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 526 Processing field: ChannelRestrictions" +"2019-05-02 09:27:14.301 UTC [common.channelconfig] initializeProtosStruct -> DEBU 527 Processing field: Capabilities" +"2019-05-02 09:27:14.302 UTC [common.channelconfig] NewStandardValues -> DEBU 528 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:14.302 UTC [common.channelconfig] initializeProtosStruct -> DEBU 529 Processing field: Endpoints" +"2019-05-02 09:27:14.302 UTC [common.channelconfig] NewStandardValues -> DEBU 52a Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.302 UTC [common.channelconfig] initializeProtosStruct -> DEBU 52b Processing field: MSP" +"2019-05-02 09:27:14.302 UTC [common.channelconfig] validateMSP -> DEBU 52c Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:14.302 UTC [msp] newBccspMsp -> DEBU 52d Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.303 UTC [msp] New -> DEBU 52e Creating Cache-MSP instance" +"2019-05-02 09:27:14.303 UTC [msp] Setup -> DEBU 52f Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:14.303 UTC [msp.identity] newIdentity -> DEBU 530 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-05-02 09:27:14.304 UTC [msp.identity] newIdentity -> DEBU 531 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:14.304 UTC [msp] Validate -> DEBU 532 MSP OrdererMSP validating identity" +"2019-05-02 09:27:14.305 UTC [msp] Setup -> DEBU 533 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:14.305 UTC [msp] Setup -> DEBU 534 MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 535 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 536 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 537 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 538 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 539 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53a Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53b Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53c Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53d Proposed new policy Writers for Channel/Application" +"2019-05-02 09:27:14.305 UTC [policies] NewManagerImpl -> DEBU 53e Proposed new policy Admins for Channel/Application" +"2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 53f Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 540 Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 541 Proposed new policy Readers for Channel/Application" +"2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 542 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 543 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 544 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 545 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 546 Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 547 Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:14.306 UTC [policies] NewManagerImpl -> DEBU 548 Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:14.307 UTC [policies] NewManagerImpl -> DEBU 549 Proposed new policy Writers for Channel" +"2019-05-02 09:27:14.307 UTC [policies] NewManagerImpl -> DEBU 54a Proposed new policy Admins for Channel" +"2019-05-02 09:27:14.307 UTC [policies] NewManagerImpl -> DEBU 54b Proposed new policy Readers for Channel" +"2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Group] /Channel" +"2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:14.307 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 55f Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 560 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 561 Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 562 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.308 UTC [common.configtx] addToMap -> DEBU 563 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 564 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 565 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 566 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 567 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 568 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 569 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56a Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56b Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56c Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:14.309 UTC [common.configtx] addToMap -> DEBU 56d Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 572 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 573 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 574 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 575 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 576 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:14.310 UTC [common.configtx] addToMap -> DEBU 577 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:14.311 UTC [common.capabilities] Supported -> DEBU 578 Orderer capability V2_0 is supported and is enabled" +"2019-05-02 09:27:14.311 UTC [common.capabilities] Supported -> DEBU 579 Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:14.312 UTC [orderer.common.cluster] NewStream -> DEBU 57a Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +"2019-05-02 09:27:14.312 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 57b Sending msg of 24744 bytes to 3 on channel testchainid took 863.7µs" +"2019-05-02 09:27:14.312 UTC [orderer.common.cluster.step] sendMessage -> DEBU 57c Send of SubmitRequest for channel testchainid with payload of size 24744 to orderer2.example.com(orderer2.example.com:7050) took 160.9µs " +"2019-05-02 09:27:14.314 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 57d [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57140" +"2019-05-02 09:27:14.317 UTC [orderer.common.broadcast] Handle -> DEBU 57e Received EOF from 172.18.0.8:57140, hangup" +"2019-05-02 09:27:14.317 UTC [orderer.common.server] func1 -> DEBU 57f Closing Broadcast stream" +"2019-05-02 09:27:14.317 UTC [comm.grpc.server] 1 -> INFO 580 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57140 grpc.code=OK grpc.call_duration=164.0761ms +"2019-05-02 09:27:14.318 UTC [common.deliver] deliverBlocks -> DEBU 581 Rejecting deliver for 172.18.0.8:57138 because channel businesschannel not found" +"2019-05-02 09:27:14.318 UTC [orderer.common.server] func1 -> DEBU 582 Closing Deliver stream" +"2019-05-02 09:27:14.318 UTC [comm.grpc.server] 1 -> INFO 583 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57138 grpc.code=OK grpc.call_duration=193.6519ms +"2019-05-02 09:27:14.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 584 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 24953" +"2019-05-02 09:27:14.344 UTC [orderer.common.cluster.step] handleMessage -> DEBU 585 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:14.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 586 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2019-05-02 09:27:14.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 587 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.1µs " +"2019-05-02 09:27:14.351 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 588 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +"2019-05-02 09:27:14.352 UTC [orderer.common.cluster.step] sendMessage -> DEBU 589 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.5µs " +"2019-05-02 09:27:14.352 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 58a Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +"2019-05-02 09:27:14.353 UTC [common.channelconfig] NewStandardValues -> DEBU 58b Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:14.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58c Processing field: HashingAlgorithm" +"2019-05-02 09:27:14.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58d Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:14.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58e Processing field: OrdererAddresses" +"2019-05-02 09:27:14.355 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58f Processing field: Consortium" +"2019-05-02 09:27:14.356 UTC [common.channelconfig] initializeProtosStruct -> DEBU 590 Processing field: Capabilities" +"2019-05-02 09:27:14.356 UTC [common.channelconfig] NewStandardValues -> DEBU 591 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:14.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 592 Processing field: ConsensusType" +"2019-05-02 09:27:14.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 593 Processing field: BatchSize" +"2019-05-02 09:27:14.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 594 Processing field: BatchTimeout" +"2019-05-02 09:27:14.358 UTC [common.channelconfig] initializeProtosStruct -> DEBU 596 Processing field: KafkaBrokers" +"2019-05-02 09:27:14.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 597 Processing field: ChannelRestrictions" +"2019-05-02 09:27:14.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 598 Processing field: Capabilities" +"2019-05-02 09:27:14.360 UTC [common.channelconfig] NewStandardValues -> DEBU 599 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:14.358 UTC [orderer.common.server] Deliver -> DEBU 595 Starting new Deliver handler" +"2019-05-02 09:27:14.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 59a Processing field: Endpoints" +"2019-05-02 09:27:14.362 UTC [common.channelconfig] NewStandardValues -> DEBU 59b Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.361 UTC [common.deliver] Handle -> DEBU 59c Starting new deliver loop for 172.18.0.8:57142" +"2019-05-02 09:27:14.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 59d Processing field: MSP" +"2019-05-02 09:27:14.363 UTC [common.channelconfig] validateMSP -> DEBU 59e Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:14.364 UTC [msp] newBccspMsp -> DEBU 5a0 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.364 UTC [msp] New -> DEBU 5a1 Creating Cache-MSP instance" +"2019-05-02 09:27:14.362 UTC [common.deliver] Handle -> DEBU 59f Attempting to read seek info message from 172.18.0.8:57142" +"2019-05-02 09:27:14.365 UTC [msp] Setup -> DEBU 5a2 Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:14.366 UTC [msp.identity] newIdentity -> DEBU 5a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-05-02 09:27:14.367 UTC [msp.identity] newIdentity -> DEBU 5a4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:14.368 UTC [msp] Validate -> DEBU 5a5 MSP OrdererMSP validating identity" +"2019-05-02 09:27:14.369 UTC [common.channelconfig] NewStandardValues -> DEBU 5a6 Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:14.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a7 Processing field: ACLs" +"2019-05-02 09:27:14.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a8 Processing field: Capabilities" +"2019-05-02 09:27:14.370 UTC [common.channelconfig] NewStandardValues -> DEBU 5a9 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:14.370 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5aa Processing field: AnchorPeers" +"2019-05-02 09:27:14.374 UTC [common.channelconfig] NewStandardValues -> DEBU 5ab Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ac Processing field: MSP" +"2019-05-02 09:27:14.377 UTC [common.channelconfig] Validate -> DEBU 5ad Anchor peers for org Org1MSP are " +"2019-05-02 09:27:14.378 UTC [common.channelconfig] validateMSP -> DEBU 5ae Setting up MSP for org Org1MSP" +"2019-05-02 09:27:14.380 UTC [msp] newBccspMsp -> DEBU 5af Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.380 UTC [msp] New -> DEBU 5b0 Creating Cache-MSP instance" +"2019-05-02 09:27:14.380 UTC [msp] Setup -> DEBU 5b1 Setting up MSP instance Org1MSP" +"2019-05-02 09:27:14.381 UTC [msp.identity] newIdentity -> DEBU 5b2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-05-02 09:27:14.384 UTC [msp.identity] newIdentity -> DEBU 5b3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:14.385 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5b4 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:14.386 UTC [msp] Validate -> DEBU 5b5 MSP Org1MSP validating identity" +"2019-05-02 09:27:14.386 UTC [msp] getCertificationChain -> DEBU 5b6 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:14.387 UTC [msp] hasOURole -> DEBU 5b7 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:14.387 UTC [msp] getCertificationChain -> DEBU 5b8 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:14.387 UTC [common.channelconfig] NewStandardValues -> DEBU 5b9 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:14.387 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ba Processing field: AnchorPeers" +"2019-05-02 09:27:14.387 UTC [common.channelconfig] NewStandardValues -> DEBU 5bb Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:14.388 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bc Processing field: MSP" +"2019-05-02 09:27:14.388 UTC [common.channelconfig] Validate -> DEBU 5bd Anchor peers for org Org2MSP are " +"2019-05-02 09:27:14.388 UTC [common.channelconfig] validateMSP -> DEBU 5be Setting up MSP for org Org2MSP" +"2019-05-02 09:27:14.388 UTC [msp] newBccspMsp -> DEBU 5bf Creating BCCSP-based MSP instance" +"2019-05-02 09:27:14.388 UTC [msp] New -> DEBU 5c0 Creating Cache-MSP instance" +"2019-05-02 09:27:14.388 UTC [msp] Setup -> DEBU 5c1 Setting up MSP instance Org2MSP" +"2019-05-02 09:27:14.388 UTC [msp.identity] newIdentity -> DEBU 5c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-05-02 09:27:14.388 UTC [msp.identity] newIdentity -> DEBU 5c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:14.389 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5c4 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:14.389 UTC [msp] Validate -> DEBU 5c5 MSP Org2MSP validating identity" +"2019-05-02 09:27:14.389 UTC [msp] getCertificationChain -> DEBU 5c6 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:14.389 UTC [msp] hasOURole -> DEBU 5c7 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:14.389 UTC [msp] getCertificationChain -> DEBU 5c8 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:14.390 UTC [msp] Setup -> DEBU 5c9 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:14.390 UTC [msp] Setup -> DEBU 5ca MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:14.390 UTC [policies] NewManagerImpl -> DEBU 5cb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.390 UTC [policies] NewManagerImpl -> DEBU 5cc Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.390 UTC [policies] NewManagerImpl -> DEBU 5cd Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5ce Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5cf Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5d0 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:14.393 UTC [policies] NewManagerImpl -> DEBU 5d1 Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:14.394 UTC [policies] NewManagerImpl -> DEBU 5d2 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d3 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d4 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d5 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:14.397 UTC [policies] NewManagerImpl -> DEBU 5d6 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5d7 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5d8 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5d9 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5da Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5db Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5dc Proposed new policy Readers for Channel/Application" +"2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5dd Proposed new policy Writers for Channel/Application" +"2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5de Proposed new policy Admins for Channel/Application" +"2019-05-02 09:27:14.398 UTC [policies] NewManagerImpl -> DEBU 5df Proposed new policy Readers for Channel" +"2019-05-02 09:27:14.400 UTC [policies] NewManagerImpl -> DEBU 5e0 Proposed new policy Writers for Channel" +"2019-05-02 09:27:14.401 UTC [policies] NewManagerImpl -> DEBU 5e1 Proposed new policy Admins for Channel" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e2 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e3 Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ea Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5eb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ec Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ed Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:14.401 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:14.402 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:14.402 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:14.411 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:14.412 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:14.413 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:14.414 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:14.415 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:14.415 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 5ff Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 600 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 608 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 609 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60a Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:14.416 UTC [common.configtx] addToMap -> DEBU 60d Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:14.430 UTC [common.channelconfig] LogSanityChecks -> DEBU 60e As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:27:14.433 UTC [common.channelconfig] LogSanityChecks -> DEBU 60f As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:27:14.434 UTC [policies] Manager -> DEBU 610 Manager Channel looking up path [Application]" +"2019-05-02 09:27:14.435 UTC [policies] Manager -> DEBU 611 Manager Channel has managers Orderer" +"2019-05-02 09:27:14.435 UTC [policies] Manager -> DEBU 612 Manager Channel has managers Application" +"2019-05-02 09:27:14.436 UTC [policies] Manager -> DEBU 613 Manager Channel/Application looking up path []" +"2019-05-02 09:27:14.436 UTC [policies] Manager -> DEBU 614 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:14.437 UTC [policies] Manager -> DEBU 615 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:14.437 UTC [common.channelconfig] LogSanityChecks -> DEBU 616 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:27:14.437 UTC [common.channelconfig] LogSanityChecks -> DEBU 617 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:27:14.438 UTC [common.channelconfig] LogSanityChecks -> DEBU 618 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:27:14.438 UTC [policies] Manager -> DEBU 619 Manager Channel looking up path [Orderer]" +"2019-05-02 09:27:14.439 UTC [policies] Manager -> DEBU 61a Manager Channel has managers Orderer" +"2019-05-02 09:27:14.441 UTC [policies] Manager -> DEBU 61b Manager Channel has managers Application" +"2019-05-02 09:27:14.441 UTC [policies] Manager -> DEBU 61c Manager Channel/Orderer looking up path []" +"2019-05-02 09:27:14.442 UTC [policies] Manager -> DEBU 61d Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:27:14.442 UTC [common.channelconfig] LogSanityChecks -> DEBU 61e As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:27:14.442 UTC [common.capabilities] Supported -> DEBU 61f Orderer capability V2_0 is supported and is enabled" +"2019-05-02 09:27:14.443 UTC [common.capabilities] Supported -> DEBU 620 Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:14.443 UTC [fsblkstorage] newBlockfileMgr -> DEBU 621 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-05-02 09:27:14.444 UTC [kvledger.util] CreateDirIfMissing -> DEBU 622 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +"2019-05-02 09:27:14.444 UTC [kvledger.util] logDirStatus -> DEBU 623 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +"2019-05-02 09:27:14.445 UTC [kvledger.util] logDirStatus -> DEBU 624 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +"2019-05-02 09:27:14.445 UTC [fsblkstorage] newBlockfileMgr -> INFO 625 Getting block information from block storage" +"2019-05-02 09:27:14.445 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 626 Retrieving checkpoint info from block files" +"2019-05-02 09:27:14.446 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 627 retrieveLastFileSuffix()" +"2019-05-02 09:27:14.446 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 628 retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-05-02 09:27:14.447 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 629 Last file number found = -1" +"2019-05-02 09:27:14.447 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 62a No block file found" +"2019-05-02 09:27:14.447 UTC [fsblkstorage] newBlockfileMgr -> DEBU 62b Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc00040b220)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-05-02 09:27:14.450 UTC [fsblkstorage] newBlockIndex -> DEBU 62c newBlockIndex() - indexItems:[[BlockNum]]" +"2019-05-02 09:27:14.451 UTC [orderer.common.server] func1 -> DEBU 62d Executing callback to update root CAs" +"2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 62e updating root CAs for channel [businesschannel]" +"2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 62f adding app root CAs for MSP [Org2MSP]" +"2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 630 adding orderer root CAs for MSP [OrdererMSP]" +"2019-05-02 09:27:14.452 UTC [orderer.common.server] updateTrustedRoots -> DEBU 631 adding app root CAs for MSP [Org1MSP]" +"2019-05-02 09:27:14.457 UTC [fsblkstorage] indexBlock -> DEBU 632 Indexing block [blockNum=0, blockHash=[]byte{0x26, 0xf2, 0x93, 0x1, 0xed, 0x1c, 0x73, 0x48, 0xfc, 0x20, 0x75, 0x55, 0x5, 0x51, 0x67, 0x25, 0xf3, 0x5a, 0xec, 0x82, 0x34, 0x6d, 0xbc, 0x24, 0xb7, 0xb3, 0xb4, 0x5c, 0xd0, 0xdf, 0x9, 0xb3} txOffsets= +txId= locPointer=offset=39, bytesLength=23894 ]" -"2019-05-02 01:30:39.031 UTC [fsblkstorage] updateCheckpoint -> DEBU 62d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23940], isChainEmpty=[false], lastBlockNumber=[0]" -"2019-05-02 01:30:39.031 UTC [fsblkstorage] Next -> DEBU 62e Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-05-02 01:30:39.031 UTC [fsblkstorage] newBlockfileStream -> DEBU 62f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -"2019-05-02 01:30:39.031 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 630 Remaining bytes=[23940], Going to peek [8] bytes" -"2019-05-02 01:30:39.031 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 631 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:30:39.032 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 632 blockbytes [23937] read from file [0]" -"2019-05-02 01:30:39.032 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 633 [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" -"2019-05-02 01:30:39.032 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 634 EvictionSuspicion not set, defaulting to 10m0s" -"2019-05-02 01:30:39.034 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 635 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 -"2019-05-02 01:30:39.034 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 636 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 -"2019-05-02 01:30:39.050 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 637 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 -"2019-05-02 01:30:39.062 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 638 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 -"2019-05-02 01:30:39.062 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 639 Appending 0 entries to memory storage" channel=businesschannel node=1 -"2019-05-02 01:30:39.066 UTC [fsblkstorage] Next -> DEBU 63a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-05-02 01:30:39.066 UTC [fsblkstorage] newBlockfileStream -> DEBU 63b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -"2019-05-02 01:30:39.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 63c Remaining bytes=[23940], Going to peek [8] bytes" -"2019-05-02 01:30:39.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 63d Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:30:39.067 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 63e blockbytes [23937] read from file [0]" -"2019-05-02 01:30:39.068 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 63f [channel: businesschannel] Done creating channel support resources" -"2019-05-02 01:30:39.068 UTC [orderer.commmon.multichannel] newChain -> INFO 640 Created and starting new chain businesschannel" -"2019-05-02 01:30:39.068 UTC [orderer.consensus.etcdraft] Start -> INFO 641 Starting Raft node" channel=businesschannel node=1 -"2019-05-02 01:30:39.069 UTC [orderer.common.cluster] Configure -> INFO 642 Entering, channel: businesschannel, nodes: [ID: 2, -Endpoint: orderer1.example.com:7050, -ServerTLSCert:-----BEGIN CERTIFICATE----- -MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= ------END CERTIFICATE----- -, ClientTLSCert:-----BEGIN CERTIFICATE----- -MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= ------END CERTIFICATE----- - ID: 3, +"2019-05-02 09:27:14.461 UTC [fsblkstorage] updateCheckpoint -> DEBU 633 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23938], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-05-02 09:27:14.462 UTC [fsblkstorage] Next -> DEBU 634 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-05-02 09:27:14.463 UTC [fsblkstorage] newBlockfileStream -> DEBU 635 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:14.463 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 636 Remaining bytes=[23938], Going to peek [8] bytes" +"2019-05-02 09:27:14.463 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 637 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:14.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 638 blockbytes [23935] read from file [0]" +"2019-05-02 09:27:14.464 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 639 [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +"2019-05-02 09:27:14.465 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 63a EvictionSuspicion not set, defaulting to 10m0s" +"2019-05-02 09:27:14.465 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63b No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +"2019-05-02 09:27:14.465 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 63c No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +"2019-05-02 09:27:14.472 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 63d Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +"2019-05-02 09:27:14.473 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63e Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +"2019-05-02 09:27:14.473 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63f Appending 0 entries to memory storage" channel=businesschannel node=1 +"2019-05-02 09:27:14.474 UTC [fsblkstorage] Next -> DEBU 640 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-05-02 09:27:14.474 UTC [fsblkstorage] newBlockfileStream -> DEBU 641 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:14.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 642 Remaining bytes=[23938], Going to peek [8] bytes" +"2019-05-02 09:27:14.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 643 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:14.476 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 644 blockbytes [23935] read from file [0]" +"2019-05-02 09:27:14.477 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 645 [channel: businesschannel] Done creating channel support resources" +"2019-05-02 09:27:14.478 UTC [orderer.commmon.multichannel] newChain -> INFO 646 Created and starting new chain businesschannel" +"2019-05-02 09:27:14.478 UTC [orderer.consensus.etcdraft] Start -> INFO 647 Starting Raft node" channel=businesschannel node=1 +"2019-05-02 09:27:14.479 UTC [orderer.common.cluster] Configure -> INFO 648 Entering, channel: businesschannel, nodes: [ID: 3, Endpoint: orderer2.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL @@ -2623,10 +2597,7 @@ MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -----END CERTIFICATE----- -]" -"2019-05-02 01:30:39.072 UTC [orderer.common.cluster] updateStubInMapping -> INFO 643 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" -"2019-05-02 01:30:39.072 UTC [orderer.common.cluster] updateStubInMapping -> INFO 644 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" -"2019-05-02 01:30:39.072 UTC [orderer.common.cluster] func1 -> DEBU 645 Connecting to ID: 2, + ID: 2, Endpoint: orderer1.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL @@ -2658,10 +2629,10 @@ MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -----END CERTIFICATE----- - for channel businesschannel" -"2019-05-02 01:30:39.072 UTC [orderer.common.cluster] updateStubInMapping -> INFO 646 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" -"2019-05-02 01:30:39.072 UTC [orderer.common.cluster] updateStubInMapping -> INFO 647 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" -"2019-05-02 01:30:39.073 UTC [orderer.common.cluster] func1 -> DEBU 648 Connecting to ID: 3, +]" +"2019-05-02 09:27:14.479 UTC [orderer.common.cluster] updateStubInMapping -> INFO 649 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +"2019-05-02 09:27:14.480 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64a Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-05-02 09:27:14.481 UTC [orderer.common.cluster] func1 -> DEBU 64b Connecting to ID: 3, Endpoint: orderer2.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL @@ -2694,119 +2665,151 @@ hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -----END CERTIFICATE----- for channel businesschannel" -"2019-05-02 01:30:39.073 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 649 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" -"2019-05-02 01:30:39.073 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 64a 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" -"2019-05-02 01:30:39.073 UTC [orderer.common.cluster] Configure -> INFO 64b Exiting" -"2019-05-02 01:30:39.073 UTC [orderer.consensus.etcdraft] start -> DEBU 64c Starting raft node: #peers: 3" channel=businesschannel node=1 -"2019-05-02 01:30:39.073 UTC [orderer.consensus.etcdraft] start -> INFO 64d Starting raft node as part of a new channel" channel=businesschannel node=1 -"2019-05-02 01:30:39.073 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 64e 1 became follower at term 0" channel=businesschannel node=1 -"2019-05-02 01:30:39.073 UTC [orderer.consensus.etcdraft] newRaft -> INFO 64f newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 -"2019-05-02 01:30:39.074 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 650 1 became follower at term 1" channel=businesschannel node=1 -"2019-05-02 01:30:39.074 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 651 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" -"2019-05-02 01:30:39.074 UTC [msp.identity] Sign -> DEBU 652 Sign: plaintext: 0A00120B0A090A03010203100418050A...D662279D93BB3CD4E47B88CE198DC28B " -"2019-05-02 01:30:39.074 UTC [msp.identity] Sign -> DEBU 653 Sign: digest: 22BF79C30380EA3B7B42E153624298C7927E5A779512302423C782A14F03681C " -"2019-05-02 01:30:39.074 UTC [orderer.consensus.etcdraft] run -> INFO 654 This node is picked to start campaign" channel=businesschannel node=1 -"2019-05-02 01:30:39.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 655 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:39.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 656 Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" -"2019-05-02 01:30:39.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 657 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.5µs " -"2019-05-02 01:30:39.082 UTC [fsblkstorage] indexBlock -> DEBU 658 Indexing block [blockNum=1, blockHash=[]byte{0xf1, 0xe3, 0xf3, 0xe0, 0xc, 0xc2, 0xac, 0xa3, 0x12, 0x9, 0x74, 0xc0, 0xe1, 0x24, 0x28, 0x3e, 0x31, 0x17, 0x71, 0xb4, 0xe9, 0x1c, 0x85, 0x80, 0xee, 0x78, 0x5f, 0x57, 0xd9, 0x1e, 0xe5, 0x9} txOffsets= -txId= locPointer=offset=71, bytesLength=24826 +"2019-05-02 09:27:14.482 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64c Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +"2019-05-02 09:27:14.482 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64d Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-05-02 09:27:14.483 UTC [orderer.common.cluster] func1 -> DEBU 64e Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- + for channel businesschannel" +"2019-05-02 09:27:14.484 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 64f 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-05-02 09:27:14.485 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 650 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-05-02 09:27:14.485 UTC [orderer.common.cluster] Configure -> INFO 651 Exiting" +"2019-05-02 09:27:14.485 UTC [orderer.consensus.etcdraft] start -> DEBU 652 Starting raft node: #peers: 3" channel=businesschannel node=1 +"2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] start -> INFO 653 Starting raft node as part of a new channel" channel=businesschannel node=1 +"2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 654 1 became follower at term 0" channel=businesschannel node=1 +"2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] newRaft -> INFO 655 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +"2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 656 1 became follower at term 1" channel=businesschannel node=1 +"2019-05-02 09:27:14.486 UTC [orderer.consensus.etcdraft] run -> INFO 657 This node is picked to start campaign" channel=businesschannel node=1 +"2019-05-02 09:27:14.486 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 658 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +"2019-05-02 09:27:14.486 UTC [msp.identity] Sign -> DEBU 659 Sign: plaintext: 0A00120B0A090A03010203100418050A...EC9F6749FC7E927080D6D099F3419E8C " +"2019-05-02 09:27:14.486 UTC [msp.identity] Sign -> DEBU 65a Sign: digest: 68557D82A654C101CD7E3C9A16564FC0776386EE1C49877DE775BE6229627D91 " +"2019-05-02 09:27:14.490 UTC [orderer.consensus.etcdraft] apply -> INFO 65b Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-05-02 09:27:14.490 UTC [orderer.consensus.etcdraft] apply -> INFO 65c Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-05-02 09:27:14.491 UTC [orderer.consensus.etcdraft] apply -> INFO 65d Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-05-02 09:27:14.493 UTC [fsblkstorage] indexBlock -> DEBU 65e Indexing block [blockNum=1, blockHash=[]byte{0x90, 0x42, 0xb2, 0x46, 0xc4, 0xef, 0xd2, 0xf1, 0xe5, 0x46, 0xcb, 0x7a, 0xee, 0xd9, 0x2e, 0x77, 0xf, 0x7a, 0xe4, 0x58, 0xf1, 0x9e, 0x66, 0x4b, 0x8d, 0xb8, 0x2d, 0x23, 0xd8, 0xf7, 0x76, 0x5d} txOffsets= +txId= locPointer=offset=71, bytesLength=24824 ]" -"2019-05-02 01:30:39.083 UTC [orderer.consensus.etcdraft] apply -> INFO 659 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -"2019-05-02 01:30:39.084 UTC [orderer.consensus.etcdraft] apply -> INFO 65a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -"2019-05-02 01:30:39.084 UTC [orderer.consensus.etcdraft] apply -> INFO 65b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -"2019-05-02 01:30:39.087 UTC [fsblkstorage] updateCheckpoint -> DEBU 65c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44242], isChainEmpty=[false], lastBlockNumber=[1]" -"2019-05-02 01:30:39.088 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 65d [channel: testchainid] Wrote block [1]" -"2019-05-02 01:30:39.186 UTC [common.deliver] deliverBlocks -> WARN 65e [channel: businesschannel] Rejecting deliver request for 192.168.240.9:47270 because of consenter error" -"2019-05-02 01:30:39.187 UTC [orderer.common.server] func1 -> DEBU 65f Closing Deliver stream" -"2019-05-02 01:30:39.187 UTC [comm.grpc.server] 1 -> INFO 660 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47270 grpc.code=OK grpc.call_duration=205.2366ms -"2019-05-02 01:30:39.204 UTC [orderer.common.server] Deliver -> DEBU 661 Starting new Deliver handler" -"2019-05-02 01:30:39.204 UTC [common.deliver] Handle -> DEBU 662 Starting new deliver loop for 192.168.240.9:47272" -"2019-05-02 01:30:39.205 UTC [common.deliver] Handle -> DEBU 663 Attempting to read seek info message from 192.168.240.9:47272" -"2019-05-02 01:30:39.406 UTC [common.deliver] deliverBlocks -> WARN 664 [channel: businesschannel] Rejecting deliver request for 192.168.240.9:47272 because of consenter error" -"2019-05-02 01:30:39.407 UTC [orderer.common.server] func1 -> DEBU 665 Closing Deliver stream" -"2019-05-02 01:30:39.407 UTC [comm.grpc.server] 1 -> INFO 666 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47272 grpc.code=OK grpc.call_duration=203.7027ms -"2019-05-02 01:30:39.422 UTC [orderer.common.server] Deliver -> DEBU 667 Starting new Deliver handler" -"2019-05-02 01:30:39.422 UTC [common.deliver] Handle -> DEBU 668 Starting new deliver loop for 192.168.240.9:47274" -"2019-05-02 01:30:39.422 UTC [common.deliver] Handle -> DEBU 669 Attempting to read seek info message from 192.168.240.9:47274" -"2019-05-02 01:30:39.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 66a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:39.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 66b Sending msg of 28 bytes to 3 on channel testchainid took 64.7µs" -"2019-05-02 01:30:39.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 66c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 348.3µs " -"2019-05-02 01:30:39.622 UTC [common.deliver] deliverBlocks -> WARN 66d [channel: businesschannel] Rejecting deliver request for 192.168.240.9:47274 because of consenter error" -"2019-05-02 01:30:39.623 UTC [orderer.common.server] func1 -> DEBU 66e Closing Deliver stream" -"2019-05-02 01:30:39.624 UTC [comm.grpc.server] 1 -> INFO 66f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47274 grpc.code=OK grpc.call_duration=201.654ms -"2019-05-02 01:30:39.639 UTC [orderer.common.server] Deliver -> DEBU 670 Starting new Deliver handler" -"2019-05-02 01:30:39.639 UTC [common.deliver] Handle -> DEBU 671 Starting new deliver loop for 192.168.240.9:47276" -"2019-05-02 01:30:39.639 UTC [common.deliver] Handle -> DEBU 672 Attempting to read seek info message from 192.168.240.9:47276" -"2019-05-02 01:30:39.843 UTC [common.deliver] deliverBlocks -> WARN 673 [channel: businesschannel] Rejecting deliver request for 192.168.240.9:47276 because of consenter error" -"2019-05-02 01:30:39.844 UTC [orderer.common.server] func1 -> DEBU 674 Closing Deliver stream" -"2019-05-02 01:30:39.844 UTC [comm.grpc.server] 1 -> INFO 675 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47276 grpc.code=OK grpc.call_duration=205.3417ms -"2019-05-02 01:30:39.856 UTC [orderer.common.server] Deliver -> DEBU 676 Starting new Deliver handler" -"2019-05-02 01:30:39.856 UTC [common.deliver] Handle -> DEBU 677 Starting new deliver loop for 192.168.240.9:47278" -"2019-05-02 01:30:39.856 UTC [common.deliver] Handle -> DEBU 678 Attempting to read seek info message from 192.168.240.9:47278" -"2019-05-02 01:30:40.058 UTC [common.deliver] deliverBlocks -> WARN 679 [channel: businesschannel] Rejecting deliver request for 192.168.240.9:47278 because of consenter error" -"2019-05-02 01:30:40.060 UTC [orderer.common.server] func1 -> DEBU 67a Closing Deliver stream" -"2019-05-02 01:30:40.061 UTC [comm.grpc.server] 1 -> INFO 67b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47278 grpc.code=OK grpc.call_duration=204.7017ms -"2019-05-02 01:30:40.074 UTC [orderer.common.server] Deliver -> DEBU 67c Starting new Deliver handler" -"2019-05-02 01:30:40.074 UTC [common.deliver] Handle -> DEBU 67d Starting new deliver loop for 192.168.240.9:47280" -"2019-05-02 01:30:40.074 UTC [common.deliver] Handle -> DEBU 67e Attempting to read seek info message from 192.168.240.9:47280" -"2019-05-02 01:30:40.075 UTC [orderer.consensus.etcdraft] Step -> INFO 67f 1 is starting a new election at term 1" channel=businesschannel node=1 -"2019-05-02 01:30:40.075 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 680 1 became pre-candidate at term 1" channel=businesschannel node=1 -"2019-05-02 01:30:40.076 UTC [orderer.consensus.etcdraft] poll -> INFO 681 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 -"2019-05-02 01:30:40.076 UTC [orderer.consensus.etcdraft] campaign -> INFO 682 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 -"2019-05-02 01:30:40.076 UTC [orderer.consensus.etcdraft] campaign -> INFO 683 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 -"2019-05-02 01:30:40.077 UTC [orderer.common.cluster] NewStream -> DEBU 684 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" -"2019-05-02 01:30:40.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 686 Sending msg of 28 bytes to 3 on channel businesschannel took 2.2948ms" -"2019-05-02 01:30:40.080 UTC [orderer.common.cluster] NewStream -> DEBU 687 Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" -"2019-05-02 01:30:40.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 688 Sending msg of 28 bytes to 2 on channel businesschannel took 249.5µs" -"2019-05-02 01:30:40.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 689 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 954.5µs " -"2019-05-02 01:30:40.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 685 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:40.082 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68a Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" -"2019-05-02 01:30:40.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.192ms " -"2019-05-02 01:30:40.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 343.8µs " -"2019-05-02 01:30:40.084 UTC [orderer.common.cluster] Step -> DEBU 68d Connection from orderer2.example.com(192.168.240.4:47814)" -"2019-05-02 01:30:40.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 68f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:40.085 UTC [orderer.common.cluster] Step -> DEBU 68e Connection from orderer1.example.com(192.168.240.3:58762)" -"2019-05-02 01:30:40.086 UTC [orderer.consensus.etcdraft] poll -> INFO 690 1 received MsgPreVoteResp from 3 at term 1" channel=businesschannel node=1 -"2019-05-02 01:30:40.087 UTC [orderer.common.cluster.step] handleMessage -> DEBU 691 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:40.087 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 692 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 -"2019-05-02 01:30:40.087 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 693 1 became candidate at term 2" channel=businesschannel node=1 -"2019-05-02 01:30:40.088 UTC [orderer.consensus.etcdraft] poll -> INFO 694 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 -"2019-05-02 01:30:40.088 UTC [orderer.consensus.etcdraft] campaign -> INFO 695 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 -"2019-05-02 01:30:40.088 UTC [orderer.consensus.etcdraft] campaign -> INFO 696 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 -"2019-05-02 01:30:40.091 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 697 Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" -"2019-05-02 01:30:40.091 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 698 Sending msg of 28 bytes to 3 on channel businesschannel took 184.1µs" -"2019-05-02 01:30:40.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 699 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 330µs " -"2019-05-02 01:30:40.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 211.9µs " -"2019-05-02 01:30:40.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:40.097 UTC [orderer.consensus.etcdraft] poll -> INFO 69c 1 received MsgVoteResp from 3 at term 2" channel=businesschannel node=1 -"2019-05-02 01:30:40.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69d Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:40.098 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 69e 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 -"2019-05-02 01:30:40.098 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 69f 1 became leader at term 2" channel=businesschannel node=1 -"2019-05-02 01:30:40.099 UTC [orderer.consensus.etcdraft] run -> INFO 6a0 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 -"2019-05-02 01:30:40.100 UTC [orderer.consensus.etcdraft] run -> INFO 6a1 Leader 1 is present, quit campaign" channel=businesschannel node=1 -"2019-05-02 01:30:40.101 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6a2 Raft leader changed: 0 -> 1" channel=businesschannel node=1 -"2019-05-02 01:30:40.101 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6a3 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 -"2019-05-02 01:30:40.101 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a4 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 118.2µs " -"2019-05-02 01:30:40.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a5 Sending msg of 36 bytes to 2 on channel businesschannel took 27.2µs" -"2019-05-02 01:30:40.104 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a6 Sending msg of 36 bytes to 3 on channel businesschannel took 54.7µs" -"2019-05-02 01:30:40.104 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a7 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 184.6µs " -"2019-05-02 01:30:40.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:40.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a9 Sending msg of 28 bytes to 2 on channel businesschannel took 86.8µs" -"2019-05-02 01:30:40.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.5µs " -"2019-05-02 01:30:40.107 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6ab Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 -"2019-05-02 01:30:40.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ac Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:40.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ad Sending msg of 28 bytes to 3 on channel businesschannel took 113.2µs" -"2019-05-02 01:30:40.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.7µs " -"2019-05-02 01:30:40.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6af Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:40.111 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:40.275 UTC [policies] Evaluate -> DEBU 6b1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:30:40.275 UTC [policies] Evaluate -> DEBU 6b2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:40.275 UTC [policies] Evaluate -> DEBU 6b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:40.275 UTC [policies] Evaluate -> DEBU 6b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:40.275 UTC [policies] Evaluate -> DEBU 6b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:30:40.275 UTC [msp] DeserializeIdentity -> DEBU 6b6 Obtaining identity" -"2019-05-02 01:30:40.275 UTC [msp.identity] newIdentity -> DEBU 6b7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.496 UTC [fsblkstorage] updateCheckpoint -> DEBU 65f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44241], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-05-02 09:27:14.497 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 660 [channel: testchainid] Wrote block [1]" +"2019-05-02 09:27:14.560 UTC [common.deliver] deliverBlocks -> WARN 661 [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57142 because of consenter error" +"2019-05-02 09:27:14.560 UTC [orderer.common.server] func1 -> DEBU 662 Closing Deliver stream" +"2019-05-02 09:27:14.561 UTC [comm.grpc.server] 1 -> INFO 663 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57142 grpc.code=OK grpc.call_duration=203.5441ms +"2019-05-02 09:27:14.577 UTC [orderer.common.server] Deliver -> DEBU 664 Starting new Deliver handler" +"2019-05-02 09:27:14.578 UTC [common.deliver] Handle -> DEBU 665 Starting new deliver loop for 172.18.0.8:57144" +"2019-05-02 09:27:14.578 UTC [common.deliver] Handle -> DEBU 666 Attempting to read seek info message from 172.18.0.8:57144" +"2019-05-02 09:27:14.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 667 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:14.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 668 Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +"2019-05-02 09:27:14.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU 669 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs " +"2019-05-02 09:27:14.778 UTC [common.deliver] deliverBlocks -> WARN 66a [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57144 because of consenter error" +"2019-05-02 09:27:14.779 UTC [orderer.common.server] func1 -> DEBU 66b Closing Deliver stream" +"2019-05-02 09:27:14.779 UTC [comm.grpc.server] 1 -> INFO 66c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57144 grpc.code=OK grpc.call_duration=201.4329ms +"2019-05-02 09:27:14.797 UTC [orderer.common.server] Deliver -> DEBU 66d Starting new Deliver handler" +"2019-05-02 09:27:14.798 UTC [common.deliver] Handle -> DEBU 66e Starting new deliver loop for 172.18.0.8:57146" +"2019-05-02 09:27:14.798 UTC [common.deliver] Handle -> DEBU 66f Attempting to read seek info message from 172.18.0.8:57146" +"2019-05-02 09:27:14.997 UTC [common.deliver] deliverBlocks -> WARN 670 [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57146 because of consenter error" +"2019-05-02 09:27:14.998 UTC [orderer.common.server] func1 -> DEBU 671 Closing Deliver stream" +"2019-05-02 09:27:15.000 UTC [comm.grpc.server] 1 -> INFO 672 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57146 grpc.code=OK grpc.call_duration=202.9803ms +"2019-05-02 09:27:15.019 UTC [orderer.common.server] Deliver -> DEBU 673 Starting new Deliver handler" +"2019-05-02 09:27:15.019 UTC [common.deliver] Handle -> DEBU 674 Starting new deliver loop for 172.18.0.8:57148" +"2019-05-02 09:27:15.019 UTC [common.deliver] Handle -> DEBU 675 Attempting to read seek info message from 172.18.0.8:57148" +"2019-05-02 09:27:15.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 676 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:15.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 677 Sending msg of 28 bytes to 3 on channel testchainid took 34.7µs" +"2019-05-02 09:27:15.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU 678 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.2µs " +"2019-05-02 09:27:15.220 UTC [common.deliver] deliverBlocks -> WARN 679 [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57148 because of consenter error" +"2019-05-02 09:27:15.220 UTC [orderer.common.server] func1 -> DEBU 67a Closing Deliver stream" +"2019-05-02 09:27:15.220 UTC [comm.grpc.server] 1 -> INFO 67b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57148 grpc.code=OK grpc.call_duration=201.4772ms +"2019-05-02 09:27:15.238 UTC [orderer.common.server] Deliver -> DEBU 67c Starting new Deliver handler" +"2019-05-02 09:27:15.238 UTC [common.deliver] Handle -> DEBU 67d Starting new deliver loop for 172.18.0.8:57150" +"2019-05-02 09:27:15.238 UTC [common.deliver] Handle -> DEBU 67e Attempting to read seek info message from 172.18.0.8:57150" +"2019-05-02 09:27:15.442 UTC [common.deliver] deliverBlocks -> WARN 67f [channel: businesschannel] Rejecting deliver request for 172.18.0.8:57150 because of consenter error" +"2019-05-02 09:27:15.443 UTC [orderer.common.server] func1 -> DEBU 680 Closing Deliver stream" +"2019-05-02 09:27:15.443 UTC [comm.grpc.server] 1 -> INFO 681 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57150 grpc.code=OK grpc.call_duration=206.8682ms +"2019-05-02 09:27:15.463 UTC [orderer.common.server] Deliver -> DEBU 682 Starting new Deliver handler" +"2019-05-02 09:27:15.464 UTC [common.deliver] Handle -> DEBU 683 Starting new deliver loop for 172.18.0.8:57152" +"2019-05-02 09:27:15.465 UTC [common.deliver] Handle -> DEBU 684 Attempting to read seek info message from 172.18.0.8:57152" +"2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] Step -> INFO 685 1 is starting a new election at term 1" channel=businesschannel node=1 +"2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 686 1 became pre-candidate at term 1" channel=businesschannel node=1 +"2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] poll -> INFO 687 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +"2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] campaign -> INFO 688 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +"2019-05-02 09:27:15.487 UTC [orderer.consensus.etcdraft] campaign -> INFO 689 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +"2019-05-02 09:27:15.488 UTC [orderer.common.cluster] NewStream -> DEBU 68a Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +"2019-05-02 09:27:15.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68b Sending msg of 28 bytes to 2 on channel businesschannel took 357.3µs" +"2019-05-02 09:27:15.489 UTC [orderer.common.cluster] NewStream -> DEBU 68c Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-05-02 09:27:15.490 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68d Sending msg of 28 bytes to 3 on channel businesschannel took 821.6µs" +"2019-05-02 09:27:15.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 964.2µs " +"2019-05-02 09:27:15.500 UTC [orderer.common.cluster] Step -> DEBU 690 Connection from orderer1.example.com(172.18.0.4:44256)" +"2019-05-02 09:27:15.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 691 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:15.501 UTC [orderer.consensus.etcdraft] poll -> INFO 692 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 +"2019-05-02 09:27:15.501 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 693 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-05-02 09:27:15.502 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 694 1 became candidate at term 2" channel=businesschannel node=1 +"2019-05-02 09:27:15.502 UTC [orderer.consensus.etcdraft] poll -> INFO 695 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +"2019-05-02 09:27:15.502 UTC [orderer.consensus.etcdraft] campaign -> INFO 696 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +"2019-05-02 09:27:15.503 UTC [orderer.consensus.etcdraft] campaign -> INFO 697 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +"2019-05-02 09:27:15.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.197ms " +"2019-05-02 09:27:15.504 UTC [orderer.common.cluster] Step -> DEBU 698 Connection from orderer2.example.com(172.18.0.3:56182)" +"2019-05-02 09:27:15.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 699 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:15.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69a Sending msg of 28 bytes to 3 on channel businesschannel took 96.6µs" +"2019-05-02 09:27:15.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69b Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +"2019-05-02 09:27:15.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 152.1µs " +"2019-05-02 09:27:15.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.3µs " +"2019-05-02 09:27:15.511 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] poll -> INFO 69f 1 received MsgVoteResp from 3 at term 2" channel=businesschannel node=1 +"2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6a0 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6a1 1 became leader at term 2" channel=businesschannel node=1 +"2019-05-02 09:27:15.512 UTC [orderer.consensus.etcdraft] run -> INFO 6a2 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +"2019-05-02 09:27:15.514 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:15.514 UTC [orderer.consensus.etcdraft] run -> INFO 6a4 Leader 1 is present, quit campaign" channel=businesschannel node=1 +"2019-05-02 09:27:15.514 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a5 Sending msg of 36 bytes to 3 on channel businesschannel took 18.9µs" +"2019-05-02 09:27:15.515 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a6 Sending msg of 36 bytes to 2 on channel businesschannel took 16.2µs" +"2019-05-02 09:27:15.515 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a7 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 416.5µs " +"2019-05-02 09:27:15.516 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6a8 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +"2019-05-02 09:27:15.516 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6a9 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +"2019-05-02 09:27:15.516 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6aa Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " +"2019-05-02 09:27:15.522 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ab Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:15.522 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ac Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2019-05-02 09:27:15.523 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214.9µs " +"2019-05-02 09:27:15.524 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6ae Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +"2019-05-02 09:27:15.524 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6af Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:15.524 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b0 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +"2019-05-02 09:27:15.525 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.3µs " +"2019-05-02 09:27:15.526 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:15.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:15.662 UTC [policies] Evaluate -> DEBU 6b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:15.663 UTC [policies] Evaluate -> DEBU 6b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:15.664 UTC [policies] Evaluate -> DEBU 6b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:15.664 UTC [policies] Evaluate -> DEBU 6b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:15.664 UTC [policies] Evaluate -> DEBU 6b8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:15.665 UTC [msp] DeserializeIdentity -> DEBU 6b9 Obtaining identity" +"2019-05-02 09:27:15.665 UTC [msp.identity] newIdentity -> DEBU 6ba Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2820,294 +2823,280 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:40.275 UTC [cauthdsl] func1 -> DEBU 6b8 0xc00046c450 gate 1556760640275935400 evaluation starts" -"2019-05-02 01:30:40.276 UTC [cauthdsl] func2 -> DEBU 6b9 0xc00046c450 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:40.276 UTC [cauthdsl] func2 -> DEBU 6ba 0xc00046c450 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:40.276 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6bb Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:30:40.276 UTC [msp] Validate -> DEBU 6bc MSP Org1MSP validating identity" -"2019-05-02 01:30:40.276 UTC [msp] getCertificationChain -> DEBU 6bd MSP Org1MSP getting certification chain" -"2019-05-02 01:30:40.276 UTC [cauthdsl] func2 -> DEBU 6be 0xc00046c450 principal matched by identity 0" -"2019-05-02 01:30:40.276 UTC [msp.identity] Verify -> DEBU 6bf Verify: digest = 00000000 7b e2 92 6d e7 8f c0 c2 9f f6 10 cf d8 dd b9 58 |{..m...........X| -00000010 82 34 14 3a 64 6e a1 95 12 c7 a7 fa 46 28 9f b4 |.4.:dn......F(..|" -"2019-05-02 01:30:40.276 UTC [msp.identity] Verify -> DEBU 6c0 Verify: sig = 00000000 30 44 02 20 3d 47 97 c1 98 02 8c ed 91 b4 21 da |0D. =G........!.| -00000010 e6 02 07 ff 1a 84 4b fa 0e a3 5b d0 e4 f8 7e 1a |......K...[...~.| -00000020 20 87 40 46 02 20 21 65 a8 1e 11 07 8a da 3e 09 | .@F. !e......>.| -00000030 cc 99 00 06 f2 4e f6 34 86 67 46 f7 a2 da ea 06 |.....N.4.gF.....| -00000040 8f 85 14 d7 67 9e |....g.|" -"2019-05-02 01:30:40.276 UTC [cauthdsl] func2 -> DEBU 6c1 0xc00046c450 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:40.276 UTC [cauthdsl] func1 -> DEBU 6c2 0xc00046c450 gate 1556760640275935400 evaluation succeeds" -"2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c3 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c5 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c7 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:30:40.276 UTC [policies] Evaluate -> DEBU 6c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:30:40.277 UTC [common.deliver] deliverBlocks -> DEBU 6c9 [channel: businesschannel] Received seekInfo (0xc000c891c0) start: > stop: > from 192.168.240.9:47280" -"2019-05-02 01:30:40.277 UTC [fsblkstorage] Next -> DEBU 6ca Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-05-02 01:30:40.277 UTC [fsblkstorage] newBlockfileStream -> DEBU 6cb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -"2019-05-02 01:30:40.277 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6cc Remaining bytes=[23940], Going to peek [8] bytes" -"2019-05-02 01:30:40.277 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6cd Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:30:40.277 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6ce blockbytes [23937] read from file [0]" -"2019-05-02 01:30:40.277 UTC [common.deliver] deliverBlocks -> DEBU 6cf [channel: businesschannel] Delivering block [0] for (0xc000c891c0) for 192.168.240.9:47280" -"2019-05-02 01:30:40.277 UTC [common.deliver] deliverBlocks -> DEBU 6d0 [channel: businesschannel] Done delivering to 192.168.240.9:47280 for (0xc000c891c0)" -"2019-05-02 01:30:40.277 UTC [common.deliver] Handle -> DEBU 6d1 Waiting for new SeekInfo from 192.168.240.9:47280" -"2019-05-02 01:30:40.277 UTC [common.deliver] Handle -> DEBU 6d2 Attempting to read seek info message from 192.168.240.9:47280" -"2019-05-02 01:30:40.281 UTC [grpc] infof -> DEBU 6d3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:40.281 UTC [grpc] infof -> DEBU 6d4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:40.281 UTC [grpc] infof -> DEBU 6d5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:40.281 UTC [common.deliver] Handle -> WARN 6d6 Error reading from 192.168.240.9:47280: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:40.281 UTC [orderer.common.server] func1 -> DEBU 6d7 Closing Deliver stream" -"2019-05-02 01:30:40.281 UTC [comm.grpc.server] 1 -> INFO 6d8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47280 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=207.853ms -"2019-05-02 01:30:40.281 UTC [grpc] infof -> DEBU 6d9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:40.282 UTC [grpc] infof -> DEBU 6da transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:40.282 UTC [grpc] infof -> DEBU 6db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:40.282 UTC [grpc] infof -> DEBU 6dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:40.282 UTC [grpc] infof -> DEBU 6dd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:40.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6de Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" -"2019-05-02 01:30:40.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6df Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" -"2019-05-02 01:30:40.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.1µs " -"2019-05-02 01:30:40.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.5µs " -"2019-05-02 01:30:40.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:40.577 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:40.577 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:40.577 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e5 Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" -"2019-05-02 01:30:40.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " -"2019-05-02 01:30:40.768 UTC [orderer.common.server] replicateDisabledChains -> DEBU 6e7 No inactive chains to try to replicate" -"2019-05-02 01:30:41.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e8 Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" -"2019-05-02 01:30:41.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e9 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" -"2019-05-02 01:30:41.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 207.5µs " -"2019-05-02 01:30:41.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176µs " -"2019-05-02 01:30:41.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ec Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:41.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ed Sending msg of 28 bytes to 3 on channel testchainid took 11.5µs" -"2019-05-02 01:30:41.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ee Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " -"2019-05-02 01:30:41.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ef Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:41.084 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:41.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:41.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f2 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" -"2019-05-02 01:30:41.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.2µs " -"2019-05-02 01:30:41.582 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f4 Sending msg of 28 bytes to 2 on channel businesschannel took 891.3µs" -"2019-05-02 01:30:41.583 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f5 Sending msg of 28 bytes to 3 on channel businesschannel took 25.2µs" -"2019-05-02 01:30:41.584 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.4µs " -"2019-05-02 01:30:41.584 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.4µs " -"2019-05-02 01:30:41.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:41.587 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:42.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fa Sending msg of 28 bytes to 3 on channel businesschannel took 52.4µs" -"2019-05-02 01:30:42.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fb Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" -"2019-05-02 01:30:42.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.3µs " -"2019-05-02 01:30:42.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.3µs " -"2019-05-02 01:30:42.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6fe Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:42.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ff Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:42.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 700 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:42.084 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 701 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" -"2019-05-02 01:30:42.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU 702 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 729.8µs " -"2019-05-02 01:30:42.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 703 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.2µs " -"2019-05-02 01:30:42.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 704 Sending msg of 28 bytes to 2 on channel businesschannel took 103.7µs" -"2019-05-02 01:30:42.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 705 Sending msg of 28 bytes to 3 on channel businesschannel took 43.7µs" -"2019-05-02 01:30:42.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 706 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 148.2µs " -"2019-05-02 01:30:42.577 UTC [orderer.common.cluster.step] handleMessage -> DEBU 707 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:42.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 708 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:42.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 709 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:42.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70a Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" -"2019-05-02 01:30:42.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " -"2019-05-02 01:30:43.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70c Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" -"2019-05-02 01:30:43.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 177.6µs " -"2019-05-02 01:30:43.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70e Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" -"2019-05-02 01:30:43.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4599ms " -"2019-05-02 01:30:43.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 710 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:43.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 711 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" -"2019-05-02 01:30:43.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 712 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " -"2019-05-02 01:30:43.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 713 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:43.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 714 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:43.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 715 Sending msg of 28 bytes to 2 on channel businesschannel took 61.1µs" -"2019-05-02 01:30:43.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 716 Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" -"2019-05-02 01:30:43.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 717 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.2µs " -"2019-05-02 01:30:43.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 718 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.8µs " -"2019-05-02 01:30:43.577 UTC [orderer.common.cluster.step] handleMessage -> DEBU 719 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:43.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71a Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:43.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:43.581 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71c Sending msg of 28 bytes to 3 on channel testchainid took 109.7µs" -"2019-05-02 01:30:43.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122µs " -"2019-05-02 01:30:44.698 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71e Sending msg of 28 bytes to 2 on channel businesschannel took 28.2µs" -"2019-05-02 01:30:44.698 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71f Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" -"2019-05-02 01:30:44.699 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.6µs " -"2019-05-02 01:30:44.699 UTC [orderer.common.cluster.step] sendMessage -> DEBU 721 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.2µs " -"2019-05-02 01:30:44.702 UTC [orderer.common.cluster.step] handleMessage -> DEBU 722 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:44.703 UTC [orderer.common.cluster.step] handleMessage -> DEBU 723 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:44.703 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 724 Sending msg of 28 bytes to 3 on channel testchainid took 57.6µs" -"2019-05-02 01:30:44.703 UTC [orderer.common.cluster.step] sendMessage -> DEBU 725 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.8µs " -"2019-05-02 01:30:44.704 UTC [orderer.common.cluster.step] handleMessage -> DEBU 726 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:44.998 UTC [orderer.common.server] Deliver -> DEBU 727 Starting new Deliver handler" -"2019-05-02 01:30:44.998 UTC [common.deliver] Handle -> DEBU 728 Starting new deliver loop for 192.168.240.9:47306" -"2019-05-02 01:30:44.998 UTC [common.deliver] Handle -> DEBU 729 Attempting to read seek info message from 192.168.240.9:47306" -"2019-05-02 01:30:45.012 UTC [orderer.common.server] Broadcast -> DEBU 72a Starting new Broadcast handler" -"2019-05-02 01:30:45.012 UTC [orderer.common.broadcast] Handle -> DEBU 72b Starting new broadcast loop for 192.168.240.9:47308" -"2019-05-02 01:30:45.012 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 72c [channel: businesschannel] Broadcast is processing config update message from 192.168.240.9:47308" -"2019-05-02 01:30:45.012 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 72d Processing config update message for channel businesschannel" -"2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 72e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 72f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 730 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 731 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 732 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:30:45.012 UTC [cauthdsl] func1 -> DEBU 733 0xc00018f9c0 gate 1556760645012703400 evaluation starts" -"2019-05-02 01:30:45.012 UTC [cauthdsl] func2 -> DEBU 734 0xc00018f9c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:45.012 UTC [cauthdsl] func2 -> DEBU 735 0xc00018f9c0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:45.012 UTC [cauthdsl] func2 -> DEBU 736 0xc00018f9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:30:45.012 UTC [cauthdsl] func2 -> DEBU 737 0xc00018f9c0 principal evaluation fails" -"2019-05-02 01:30:45.012 UTC [cauthdsl] func1 -> DEBU 738 0xc00018f9c0 gate 1556760645012703400 evaluation fails" -"2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 739 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:45.012 UTC [policies] Evaluate -> DEBU 73a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 73b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:30:45.013 UTC [cauthdsl] func1 -> DEBU 73c 0xc00026c330 gate 1556760645013048100 evaluation starts" -"2019-05-02 01:30:45.013 UTC [cauthdsl] func2 -> DEBU 73d 0xc00026c330 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:45.013 UTC [cauthdsl] func2 -> DEBU 73e 0xc00026c330 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:45.013 UTC [cauthdsl] func2 -> DEBU 73f 0xc00026c330 principal matched by identity 0" -"2019-05-02 01:30:45.013 UTC [msp.identity] Verify -> DEBU 740 Verify: digest = 00000000 60 8d 00 21 bb e7 5c c0 ce ba 59 a4 d3 76 5b 12 |`..!..\...Y..v[.| -00000010 c5 72 d9 ff 23 36 0e c9 19 9b 14 c6 28 45 fb fc |.r..#6......(E..|" -"2019-05-02 01:30:45.013 UTC [msp.identity] Verify -> DEBU 741 Verify: sig = 00000000 30 44 02 20 56 c5 45 81 8b 36 5a ba ff 92 00 29 |0D. V.E..6Z....)| -00000010 3d f0 9b 9d 31 64 22 91 24 ba 63 23 0d d4 04 20 |=...1d".$.c#... | -00000020 bb 58 60 25 02 20 74 1f f6 5e d9 fe f6 84 c2 6a |.X`%. t..^.....j| -00000030 39 8a a1 23 fc 6f 62 7b 10 7b 89 dc a3 3b 09 63 |9..#.ob{.{...;.c| -00000040 fa 57 c8 6c b4 0a |.W.l..|" -"2019-05-02 01:30:45.013 UTC [cauthdsl] func2 -> DEBU 742 0xc00026c330 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:45.013 UTC [cauthdsl] func1 -> DEBU 743 0xc00026c330 gate 1556760645013048100 evaluation succeeds" -"2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 744 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 745 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 746 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 747 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 748 Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:30:45.013 UTC [policies] Evaluate -> DEBU 749 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:30:45.013 UTC [common.configtx] addToMap -> DEBU 74a Adding to config map: [Group] /Channel" -"2019-05-02 01:30:45.013 UTC [common.configtx] addToMap -> DEBU 74b Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:45.013 UTC [common.configtx] addToMap -> DEBU 74c Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:45.013 UTC [common.configtx] addToMap -> DEBU 74d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:45.013 UTC [common.configtx] addToMap -> DEBU 74e Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 74f Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 750 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 751 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 752 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 753 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 754 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 755 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 756 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 757 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 758 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 759 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:45.014 UTC [common.configtx] addToMap -> DEBU 75a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:45.014 UTC [common.configtx] verifyDeltaSet -> DEBU 75b Processing change to key: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:45.014 UTC [common.configtx] policyForItem -> DEBU 75c Getting policy for item Org1MSP with mod_policy Admins" -"2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 75d Manager Channel looking up path [Application]" -"2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 75e Manager Channel has managers Application" -"2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 75f Manager Channel has managers Orderer" -"2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 760 Manager Channel/Application looking up path []" -"2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 761 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 762 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 763 Manager Channel/Application looking up path [Org1MSP]" -"2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 764 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 765 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:45.014 UTC [policies] Manager -> DEBU 766 Manager Channel/Application/Org1MSP looking up path []" -"2019-05-02 01:30:45.014 UTC [policies] Evaluate -> DEBU 767 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-05-02 01:30:45.014 UTC [cauthdsl] func1 -> DEBU 768 0xc0002eb3e0 gate 1556760645014939100 evaluation starts" -"2019-05-02 01:30:45.014 UTC [cauthdsl] func2 -> DEBU 769 0xc0002eb3e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:45.015 UTC [cauthdsl] func2 -> DEBU 76a 0xc0002eb3e0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:45.015 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 76b Checking if identity satisfies ADMIN role for Org1MSP" -"2019-05-02 01:30:45.015 UTC [cauthdsl] func2 -> DEBU 76c 0xc0002eb3e0 principal matched by identity 0" -"2019-05-02 01:30:45.015 UTC [msp.identity] Verify -> DEBU 76d Verify: digest = 00000000 7e e0 d8 d0 d7 b3 a3 c0 01 cb 90 33 37 60 be ef |~..........37`..| -00000010 83 04 8b cc e0 6f 0e 3f 09 4a b5 dc 79 83 5e 60 |.....o.?.J..y.^`|" -"2019-05-02 01:30:45.015 UTC [msp.identity] Verify -> DEBU 76e Verify: sig = 00000000 30 44 02 20 39 8e 08 37 34 ec ec 41 53 c4 ad ba |0D. 9..74..AS...| -00000010 2b dc ff 17 42 53 d2 3d 6f 68 d1 51 80 64 85 d7 |+...BS.=oh.Q.d..| -00000020 4f 85 ee ad 02 20 6a 36 2b aa 0f 2c 88 10 ef 67 |O.... j6+..,...g| -00000030 83 9e 48 8b 6f d5 dc 74 97 3a a1 54 c5 58 6e c1 |..H.o..t.:.T.Xn.| -00000040 78 e3 76 0b 0d 01 |x.v...|" -"2019-05-02 01:30:45.015 UTC [cauthdsl] func2 -> DEBU 76f 0xc0002eb3e0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:45.015 UTC [cauthdsl] func1 -> DEBU 770 0xc0002eb3e0 gate 1556760645014939100 evaluation succeeds" -"2019-05-02 01:30:45.015 UTC [policies] Evaluate -> DEBU 771 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:45.015 UTC [policies] Evaluate -> DEBU 772 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:45.015 UTC [common.configtx] verifyDeltaSet -> DEBU 773 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:45.015 UTC [common.configtx] recurseConfigMap -> DEBU 774 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.015 UTC [common.configtx] recurseConfigMap -> DEBU 775 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.016 UTC [common.configtx] recurseConfigMap -> DEBU 776 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.016 UTC [common.configtx] recurseConfigMap -> DEBU 777 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.016 UTC [common.configtx] recurseConfigMap -> DEBU 778 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.017 UTC [common.configtx] recurseConfigMap -> DEBU 779 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.017 UTC [common.configtx] recurseConfigMap -> DEBU 77a Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.017 UTC [common.configtx] recurseConfigMap -> DEBU 77b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.017 UTC [common.configtx] recurseConfigMap -> DEBU 77c Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.018 UTC [common.configtx] recurseConfigMap -> DEBU 77d Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.018 UTC [common.configtx] recurseConfigMap -> DEBU 77e Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.018 UTC [common.configtx] recurseConfigMap -> DEBU 77f Setting policy for key Writers to " -"2019-05-02 01:30:45.019 UTC [common.configtx] recurseConfigMap -> DEBU 780 Setting policy for key Admins to " -"2019-05-02 01:30:45.019 UTC [common.configtx] recurseConfigMap -> DEBU 781 Setting policy for key Endorsement to " -"2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 782 Setting policy for key Readers to " -"2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 783 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 784 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 785 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 786 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 787 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 788 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 789 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.020 UTC [common.configtx] recurseConfigMap -> DEBU 78a Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.020 UTC [common.channelconfig] NewStandardValues -> DEBU 78b Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78c Processing field: HashingAlgorithm" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78d Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78e Processing field: OrdererAddresses" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78f Processing field: Consortium" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 790 Processing field: Capabilities" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] NewStandardValues -> DEBU 791 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 792 Processing field: ConsensusType" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 793 Processing field: BatchSize" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 794 Processing field: BatchTimeout" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 795 Processing field: KafkaBrokers" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 796 Processing field: ChannelRestrictions" -"2019-05-02 01:30:45.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 797 Processing field: Capabilities" -"2019-05-02 01:30:45.021 UTC [common.channelconfig] NewStandardValues -> DEBU 798 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:45.021 UTC [common.channelconfig] initializeProtosStruct -> DEBU 799 Processing field: Endpoints" -"2019-05-02 01:30:45.021 UTC [common.channelconfig] NewStandardValues -> DEBU 79a Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:45.021 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79b Processing field: MSP" -"2019-05-02 01:30:45.021 UTC [common.channelconfig] validateMSP -> DEBU 79c Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:45.021 UTC [msp] newBccspMsp -> DEBU 79d Creating BCCSP-based MSP instance" -"2019-05-02 01:30:45.021 UTC [msp] New -> DEBU 79e Creating Cache-MSP instance" -"2019-05-02 01:30:45.021 UTC [msp] Setup -> DEBU 79f Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:45.021 UTC [msp.identity] newIdentity -> DEBU 7a0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-05-02 01:30:45.021 UTC [msp.identity] newIdentity -> DEBU 7a1 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-05-02 01:30:45.021 UTC [msp] Validate -> DEBU 7a2 MSP OrdererMSP validating identity" -"2019-05-02 01:30:45.022 UTC [common.channelconfig] NewStandardValues -> DEBU 7a3 Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:45.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a4 Processing field: ACLs" -"2019-05-02 01:30:45.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a5 Processing field: Capabilities" -"2019-05-02 01:30:45.022 UTC [common.channelconfig] NewStandardValues -> DEBU 7a6 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:45.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a7 Processing field: AnchorPeers" -"2019-05-02 01:30:45.022 UTC [common.channelconfig] NewStandardValues -> DEBU 7a8 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:45.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a9 Processing field: MSP" -"2019-05-02 01:30:45.022 UTC [common.channelconfig] Validate -> DEBU 7aa Anchor peers for org Org1MSP are anchor_peers: " -"2019-05-02 01:30:45.022 UTC [common.channelconfig] validateMSP -> DEBU 7ab Setting up MSP for org Org1MSP" -"2019-05-02 01:30:45.022 UTC [msp] newBccspMsp -> DEBU 7ac Creating BCCSP-based MSP instance" -"2019-05-02 01:30:45.022 UTC [msp] New -> DEBU 7ad Creating Cache-MSP instance" -"2019-05-02 01:30:45.022 UTC [msp] Setup -> DEBU 7ae Setting up MSP instance Org1MSP" -"2019-05-02 01:30:45.022 UTC [msp.identity] newIdentity -> DEBU 7af Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:15.666 UTC [cauthdsl] func1 -> DEBU 6bb 0xc0008a3f80 gate 1556789235666884700 evaluation starts" +"2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6bc 0xc0008a3f80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6bd 0xc0008a3f80 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6be 0xc0008a3f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-05-02 09:27:15.667 UTC [cauthdsl] func2 -> DEBU 6bf 0xc0008a3f80 principal evaluation fails" +"2019-05-02 09:27:15.668 UTC [cauthdsl] func1 -> DEBU 6c0 0xc0008a3f80 gate 1556789235666884700 evaluation fails" +"2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c1 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:15.668 UTC [policies] func1 -> DEBU 6c3 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c4 Signature set did not satisfy policy /Channel/Orderer/Readers" +"2019-05-02 09:27:15.668 UTC [policies] Evaluate -> DEBU 6c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:15.669 UTC [policies] Evaluate -> DEBU 6c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:15.669 UTC [policies] Evaluate -> DEBU 6c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:15.669 UTC [policies] Evaluate -> DEBU 6c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:15.670 UTC [cauthdsl] func1 -> DEBU 6c9 0xc0009315b0 gate 1556789235670009000 evaluation starts" +"2019-05-02 09:27:15.670 UTC [cauthdsl] func2 -> DEBU 6ca 0xc0009315b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:15.670 UTC [cauthdsl] func2 -> DEBU 6cb 0xc0009315b0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:15.671 UTC [cauthdsl] func2 -> DEBU 6cc 0xc0009315b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-05-02 09:27:15.671 UTC [cauthdsl] func2 -> DEBU 6cd 0xc0009315b0 principal evaluation fails" +"2019-05-02 09:27:15.671 UTC [cauthdsl] func1 -> DEBU 6ce 0xc0009315b0 gate 1556789235670009000 evaluation fails" +"2019-05-02 09:27:15.672 UTC [policies] Evaluate -> DEBU 6cf Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:15.672 UTC [policies] Evaluate -> DEBU 6d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:15.672 UTC [policies] Evaluate -> DEBU 6d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:15.672 UTC [cauthdsl] func1 -> DEBU 6d2 0xc000931e10 gate 1556789235672729900 evaluation starts" +"2019-05-02 09:27:15.672 UTC [cauthdsl] func2 -> DEBU 6d3 0xc000931e10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:15.673 UTC [cauthdsl] func2 -> DEBU 6d4 0xc000931e10 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:15.673 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6d5 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:27:15.673 UTC [msp] Validate -> DEBU 6d6 MSP Org1MSP validating identity" +"2019-05-02 09:27:15.674 UTC [msp] getCertificationChain -> DEBU 6d7 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:15.674 UTC [cauthdsl] func2 -> DEBU 6d8 0xc000931e10 principal matched by identity 0" +"2019-05-02 09:27:15.674 UTC [msp.identity] Verify -> DEBU 6d9 Verify: digest = 00000000 5d de 64 d6 6d 2f 41 35 99 2f 7a e1 d4 24 25 52 |].d.m/A5./z..$%R| +00000010 d3 0d 9f f2 6c be 2b 2e 5e d9 bc 21 66 c6 c6 e5 |....l.+.^..!f...|" +"2019-05-02 09:27:15.675 UTC [msp.identity] Verify -> DEBU 6da Verify: sig = 00000000 30 44 02 20 69 2e 43 52 f9 a2 4c ed 63 1d e2 b8 |0D. i.CR..L.c...| +00000010 09 85 66 2f fc ae 45 72 b1 71 08 6a 24 65 ed 70 |..f/..Er.q.j$e.p| +00000020 22 82 96 57 02 20 2c 5c 91 98 de 14 55 f8 b3 f7 |"..W. ,\....U...| +00000030 eb 53 a5 2b ed 05 06 f5 eb 15 04 bc 36 73 ab eb |.S.+........6s..| +00000040 0b ca 35 3e 0e be |..5>..|" +"2019-05-02 09:27:15.675 UTC [cauthdsl] func2 -> DEBU 6db 0xc000931e10 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:15.675 UTC [cauthdsl] func1 -> DEBU 6dc 0xc000931e10 gate 1556789235672729900 evaluation succeeds" +"2019-05-02 09:27:15.675 UTC [policies] Evaluate -> DEBU 6dd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6df Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6e1 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:15.676 UTC [policies] Evaluate -> DEBU 6e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:15.677 UTC [common.deliver] deliverBlocks -> DEBU 6e3 [channel: businesschannel] Received seekInfo (0xc000b6c180) start: > stop: > from 172.18.0.8:57152" +"2019-05-02 09:27:15.677 UTC [fsblkstorage] Next -> DEBU 6e4 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-05-02 09:27:15.677 UTC [fsblkstorage] newBlockfileStream -> DEBU 6e5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:15.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6e6 Remaining bytes=[23938], Going to peek [8] bytes" +"2019-05-02 09:27:15.678 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6e7 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:15.678 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6e8 blockbytes [23935] read from file [0]" +"2019-05-02 09:27:15.678 UTC [common.deliver] deliverBlocks -> DEBU 6e9 [channel: businesschannel] Delivering block [0] for (0xc000b6c180) for 172.18.0.8:57152" +"2019-05-02 09:27:15.679 UTC [common.deliver] deliverBlocks -> DEBU 6ea [channel: businesschannel] Done delivering to 172.18.0.8:57152 for (0xc000b6c180)" +"2019-05-02 09:27:15.679 UTC [common.deliver] Handle -> DEBU 6eb Waiting for new SeekInfo from 172.18.0.8:57152" +"2019-05-02 09:27:15.679 UTC [common.deliver] Handle -> DEBU 6ec Attempting to read seek info message from 172.18.0.8:57152" +"2019-05-02 09:27:15.682 UTC [common.deliver] Handle -> DEBU 6ed Received EOF from 172.18.0.8:57152, hangup" +"2019-05-02 09:27:15.682 UTC [orderer.common.server] func1 -> DEBU 6ee Closing Deliver stream" +"2019-05-02 09:27:15.682 UTC [comm.grpc.server] 1 -> INFO 6ef streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57152 grpc.code=OK grpc.call_duration=219.6995ms +"2019-05-02 09:27:15.685 UTC [grpc] warningf -> DEBU 6f0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.8:57152: read: connection reset by peer" +"2019-05-02 09:27:15.685 UTC [grpc] infof -> DEBU 6f1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:15.688 UTC [grpc] infof -> DEBU 6f2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:15.689 UTC [grpc] infof -> DEBU 6f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:15.690 UTC [grpc] infof -> DEBU 6f4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:15.690 UTC [grpc] infof -> DEBU 6f5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:15.690 UTC [grpc] infof -> DEBU 6f6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:15.691 UTC [grpc] infof -> DEBU 6f7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:15.691 UTC [grpc] infof -> DEBU 6f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:15.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:15.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fa Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2019-05-02 09:27:15.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +"2019-05-02 09:27:15.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fc Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +"2019-05-02 09:27:15.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fd Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2019-05-02 09:27:15.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.1µs " +"2019-05-02 09:27:15.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.4µs " +"2019-05-02 09:27:15.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 700 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:15.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 701 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:16.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 702 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:16.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 703 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2019-05-02 09:27:16.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 704 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs " +"2019-05-02 09:27:16.325 UTC [orderer.common.server] replicateDisabledChains -> DEBU 705 No inactive chains to try to replicate" +"2019-05-02 09:27:16.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 706 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +"2019-05-02 09:27:16.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 707 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +"2019-05-02 09:27:16.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 708 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.4µs " +"2019-05-02 09:27:16.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 709 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.3µs " +"2019-05-02 09:27:16.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:16.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:16.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:16.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70d Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +"2019-05-02 09:27:16.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 179.8µs " +"2019-05-02 09:27:16.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70f Sending msg of 28 bytes to 2 on channel businesschannel took 65.5µs" +"2019-05-02 09:27:16.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 710 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +"2019-05-02 09:27:16.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 711 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 235.6µs " +"2019-05-02 09:27:16.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 712 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 625.1µs " +"2019-05-02 09:27:16.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 713 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:16.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 714 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:17.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 715 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:17.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 716 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +"2019-05-02 09:27:17.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 717 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +"2019-05-02 09:27:17.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 718 Sending msg of 28 bytes to 2 on channel businesschannel took 68.5µs" +"2019-05-02 09:27:17.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 719 Sending msg of 28 bytes to 3 on channel businesschannel took 25.1µs" +"2019-05-02 09:27:17.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 364.3µs " +"2019-05-02 09:27:17.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 860.4µs " +"2019-05-02 09:27:17.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:17.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:17.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:17.714 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71f Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +"2019-05-02 09:27:17.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395.7µs " +"2019-05-02 09:27:17.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 721 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +"2019-05-02 09:27:17.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 722 Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +"2019-05-02 09:27:17.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 723 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.2µs " +"2019-05-02 09:27:17.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 724 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +"2019-05-02 09:27:17.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 725 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:17.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 726 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:18.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 727 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:18.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 728 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-05-02 09:27:18.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 729 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.2µs " +"2019-05-02 09:27:18.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72a Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +"2019-05-02 09:27:18.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72b Sending msg of 28 bytes to 3 on channel businesschannel took 9.9µs" +"2019-05-02 09:27:18.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 72c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76µs " +"2019-05-02 09:27:18.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 72d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 699.2µs " +"2019-05-02 09:27:18.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:18.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:18.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 730 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:18.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 731 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +"2019-05-02 09:27:18.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 732 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.4µs " +"2019-05-02 09:27:18.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 733 Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs" +"2019-05-02 09:27:18.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 734 Sending msg of 28 bytes to 3 on channel businesschannel took 27.5µs" +"2019-05-02 09:27:18.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU 735 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.9941ms " +"2019-05-02 09:27:18.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU 736 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.4172ms " +"2019-05-02 09:27:18.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 737 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:18.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 738 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:19.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 739 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:19.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73a Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2019-05-02 09:27:19.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " +"2019-05-02 09:27:19.476 UTC [orderer.common.server] Deliver -> DEBU 73c Starting new Deliver handler" +"2019-05-02 09:27:19.480 UTC [common.deliver] Handle -> DEBU 73d Starting new deliver loop for 172.18.0.8:57178" +"2019-05-02 09:27:19.481 UTC [common.deliver] Handle -> DEBU 73e Attempting to read seek info message from 172.18.0.8:57178" +"2019-05-02 09:27:19.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73f Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +"2019-05-02 09:27:19.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 740 Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +"2019-05-02 09:27:19.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 741 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 439.3µs " +"2019-05-02 09:27:19.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 742 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.3µs " +"2019-05-02 09:27:19.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 743 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:19.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 744 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:19.503 UTC [orderer.common.server] Broadcast -> DEBU 745 Starting new Broadcast handler" +"2019-05-02 09:27:19.503 UTC [orderer.common.broadcast] Handle -> DEBU 746 Starting new broadcast loop for 172.18.0.8:57180" +"2019-05-02 09:27:19.504 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 747 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57180" +"2019-05-02 09:27:19.504 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 748 Processing config update message for channel businesschannel" +"2019-05-02 09:27:19.505 UTC [policies] Evaluate -> DEBU 749 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:19.505 UTC [policies] Evaluate -> DEBU 74a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:19.505 UTC [policies] Evaluate -> DEBU 74b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-05-02 09:27:19.506 UTC [policies] Evaluate -> DEBU 74c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:19.506 UTC [policies] Evaluate -> DEBU 74d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:19.506 UTC [cauthdsl] func1 -> DEBU 74e 0xc000889c20 gate 1556789239506818300 evaluation starts" +"2019-05-02 09:27:19.507 UTC [cauthdsl] func2 -> DEBU 74f 0xc000889c20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:19.507 UTC [cauthdsl] func2 -> DEBU 750 0xc000889c20 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:19.507 UTC [cauthdsl] func2 -> DEBU 751 0xc000889c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-05-02 09:27:19.508 UTC [cauthdsl] func2 -> DEBU 752 0xc000889c20 principal evaluation fails" +"2019-05-02 09:27:19.508 UTC [cauthdsl] func1 -> DEBU 753 0xc000889c20 gate 1556789239506818300 evaluation fails" +"2019-05-02 09:27:19.508 UTC [policies] Evaluate -> DEBU 754 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:19.509 UTC [policies] Evaluate -> DEBU 755 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:19.509 UTC [policies] func1 -> DEBU 756 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2019-05-02 09:27:19.510 UTC [policies] Evaluate -> DEBU 757 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2019-05-02 09:27:19.510 UTC [policies] Evaluate -> DEBU 758 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-05-02 09:27:19.510 UTC [policies] Evaluate -> DEBU 759 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:19.511 UTC [policies] Evaluate -> DEBU 75a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:19.511 UTC [policies] Evaluate -> DEBU 75b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:19.511 UTC [cauthdsl] func1 -> DEBU 75c 0xc000c1e9a0 gate 1556789239511792800 evaluation starts" +"2019-05-02 09:27:19.512 UTC [cauthdsl] func2 -> DEBU 75d 0xc000c1e9a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:19.512 UTC [cauthdsl] func2 -> DEBU 75e 0xc000c1e9a0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:19.512 UTC [cauthdsl] func2 -> DEBU 75f 0xc000c1e9a0 principal matched by identity 0" +"2019-05-02 09:27:19.513 UTC [msp.identity] Verify -> DEBU 760 Verify: digest = 00000000 2d 24 ae af 2b ab cf a4 1b 31 20 53 db 1d e7 59 |-$..+....1 S...Y| +00000010 93 1c 74 0e af 14 c2 23 6a 79 e1 94 8c 28 23 44 |..t....#jy...(#D|" +"2019-05-02 09:27:19.513 UTC [msp.identity] Verify -> DEBU 761 Verify: sig = 00000000 30 45 02 21 00 f1 15 94 c7 e6 9e a3 48 5c b6 ac |0E.!........H\..| +00000010 c5 6f d4 68 62 76 0f 4e 5f a2 30 ea 64 12 1b e3 |.o.hbv.N_.0.d...| +00000020 5a 20 ab fe 8d 02 20 46 77 44 3d 2f 1a cc c6 ff |Z .... FwD=/....| +00000030 b6 8f 70 4d 2a 8b a2 6a 0d 7e 4c b7 28 f9 1f d5 |..pM*..j.~L.(...| +00000040 b1 62 49 3c d7 2f 05 |.bI<./.|" +"2019-05-02 09:27:19.514 UTC [cauthdsl] func2 -> DEBU 762 0xc000c1e9a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:19.514 UTC [cauthdsl] func1 -> DEBU 763 0xc000c1e9a0 gate 1556789239511792800 evaluation succeeds" +"2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 764 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 765 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 766 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 767 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 768 Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:19.515 UTC [policies] Evaluate -> DEBU 769 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76a Adding to config map: [Group] /Channel" +"2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76b Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76e Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 76f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:19.516 UTC [common.configtx] addToMap -> DEBU 770 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 771 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 772 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 773 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 774 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 775 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 776 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:19.517 UTC [common.configtx] addToMap -> DEBU 777 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:19.518 UTC [common.configtx] addToMap -> DEBU 778 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:19.518 UTC [common.configtx] addToMap -> DEBU 779 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:19.518 UTC [common.configtx] addToMap -> DEBU 77a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:19.518 UTC [common.configtx] verifyDeltaSet -> DEBU 77b Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:19.518 UTC [common.configtx] verifyDeltaSet -> DEBU 77c Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:19.518 UTC [common.configtx] policyForItem -> DEBU 77d Getting policy for item Org1MSP with mod_policy Admins" +"2019-05-02 09:27:19.518 UTC [policies] Manager -> DEBU 77e Manager Channel looking up path [Application]" +"2019-05-02 09:27:19.518 UTC [policies] Manager -> DEBU 77f Manager Channel has managers Orderer" +"2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 780 Manager Channel has managers Application" +"2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 781 Manager Channel/Application looking up path []" +"2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 782 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 783 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:19.519 UTC [policies] Manager -> DEBU 784 Manager Channel/Application looking up path [Org1MSP]" +"2019-05-02 09:27:19.520 UTC [policies] Manager -> DEBU 785 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:19.520 UTC [policies] Manager -> DEBU 786 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:19.520 UTC [policies] Manager -> DEBU 787 Manager Channel/Application/Org1MSP looking up path []" +"2019-05-02 09:27:19.520 UTC [policies] Evaluate -> DEBU 788 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-05-02 09:27:19.520 UTC [cauthdsl] func1 -> DEBU 789 0xc000b87b00 gate 1556789239520652300 evaluation starts" +"2019-05-02 09:27:19.520 UTC [cauthdsl] func2 -> DEBU 78a 0xc000b87b00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:19.521 UTC [cauthdsl] func2 -> DEBU 78b 0xc000b87b00 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:19.521 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 78c Checking if identity satisfies ADMIN role for Org1MSP" +"2019-05-02 09:27:19.521 UTC [cauthdsl] func2 -> DEBU 78d 0xc000b87b00 principal matched by identity 0" +"2019-05-02 09:27:19.521 UTC [msp.identity] Verify -> DEBU 78e Verify: digest = 00000000 1e 4a 2b e5 03 f9 6c c3 23 48 0d a8 83 20 ef f2 |.J+...l.#H... ..| +00000010 7a e8 18 fd 74 24 f2 e6 41 72 f3 5d d7 16 16 71 |z...t$..Ar.]...q|" +"2019-05-02 09:27:19.521 UTC [msp.identity] Verify -> DEBU 78f Verify: sig = 00000000 30 44 02 20 7c b2 f7 03 cd 4f 8e cd 30 a1 37 b6 |0D. |....O..0.7.| +00000010 7e b2 75 32 5d 38 f1 78 91 c4 b9 3a c8 50 d7 24 |~.u2]8.x...:.P.$| +00000020 86 46 58 89 02 20 01 29 a4 4f 1b da f4 cd 41 1a |.FX.. .).O....A.| +00000030 ea 42 9b bf da 05 a0 92 ff 30 14 2e a4 22 c8 09 |.B.......0..."..| +00000040 d0 64 c5 30 31 53 |.d.01S|" +"2019-05-02 09:27:19.522 UTC [cauthdsl] func2 -> DEBU 790 0xc000b87b00 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:19.522 UTC [cauthdsl] func1 -> DEBU 791 0xc000b87b00 gate 1556789239520652300 evaluation succeeds" +"2019-05-02 09:27:19.522 UTC [policies] Evaluate -> DEBU 792 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:19.522 UTC [policies] Evaluate -> DEBU 793 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:19.522 UTC [common.configtx] recurseConfigMap -> DEBU 794 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.522 UTC [common.configtx] recurseConfigMap -> DEBU 795 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 796 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 797 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 798 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 799 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79b Setting policy for key Readers to " +"2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79c Setting policy for key Writers to " +"2019-05-02 09:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 79d Setting policy for key Admins to " +"2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 79e Setting policy for key Endorsement to " +"2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 79f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a1 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a2 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.525 UTC [common.configtx] recurseConfigMap -> DEBU 7a3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a7 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 7a9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.527 UTC [common.configtx] recurseConfigMap -> DEBU 7aa Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.527 UTC [common.channelconfig] NewStandardValues -> DEBU 7ab Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ac Processing field: HashingAlgorithm" +"2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ad Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ae Processing field: OrdererAddresses" +"2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7af Processing field: Consortium" +"2019-05-02 09:27:19.527 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b0 Processing field: Capabilities" +"2019-05-02 09:27:19.527 UTC [common.channelconfig] NewStandardValues -> DEBU 7b1 Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b2 Processing field: ACLs" +"2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b3 Processing field: Capabilities" +"2019-05-02 09:27:19.528 UTC [common.channelconfig] NewStandardValues -> DEBU 7b4 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b5 Processing field: AnchorPeers" +"2019-05-02 09:27:19.528 UTC [common.channelconfig] NewStandardValues -> DEBU 7b6 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:19.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b7 Processing field: MSP" +"2019-05-02 09:27:19.528 UTC [common.channelconfig] Validate -> DEBU 7b8 Anchor peers for org Org1MSP are anchor_peers: " +"2019-05-02 09:27:19.529 UTC [common.channelconfig] validateMSP -> DEBU 7b9 Setting up MSP for org Org1MSP" +"2019-05-02 09:27:19.529 UTC [msp] newBccspMsp -> DEBU 7ba Creating BCCSP-based MSP instance" +"2019-05-02 09:27:19.529 UTC [msp] New -> DEBU 7bb Creating Cache-MSP instance" +"2019-05-02 09:27:19.529 UTC [msp] Setup -> DEBU 7bc Setting up MSP instance Org1MSP" +"2019-05-02 09:27:19.530 UTC [msp.identity] newIdentity -> DEBU 7bd Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3122,7 +3111,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:45.023 UTC [msp.identity] newIdentity -> DEBU 7b0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:19.531 UTC [msp.identity] newIdentity -> DEBU 7be Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3136,21 +3125,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:45.023 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7b1 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:45.023 UTC [msp] Validate -> DEBU 7b2 MSP Org1MSP validating identity" -"2019-05-02 01:30:45.024 UTC [msp] getCertificationChain -> DEBU 7b3 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:45.024 UTC [msp] hasOURole -> DEBU 7b4 MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:45.024 UTC [msp] getCertificationChain -> DEBU 7b5 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:45.025 UTC [common.channelconfig] NewStandardValues -> DEBU 7b6 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:45.025 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b7 Processing field: AnchorPeers" -"2019-05-02 01:30:45.025 UTC [common.channelconfig] NewStandardValues -> DEBU 7b8 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:45.025 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7b9 Processing field: MSP" -"2019-05-02 01:30:45.025 UTC [common.channelconfig] Validate -> DEBU 7ba Anchor peers for org Org2MSP are " -"2019-05-02 01:30:45.025 UTC [common.channelconfig] validateMSP -> DEBU 7bb Setting up MSP for org Org2MSP" -"2019-05-02 01:30:45.026 UTC [msp] newBccspMsp -> DEBU 7bc Creating BCCSP-based MSP instance" -"2019-05-02 01:30:45.026 UTC [msp] New -> DEBU 7bd Creating Cache-MSP instance" -"2019-05-02 01:30:45.026 UTC [msp] Setup -> DEBU 7be Setting up MSP instance Org2MSP" -"2019-05-02 01:30:45.026 UTC [msp.identity] newIdentity -> DEBU 7bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:19.532 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7bf Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:19.532 UTC [msp] Validate -> DEBU 7c0 MSP Org1MSP validating identity" +"2019-05-02 09:27:19.532 UTC [msp] getCertificationChain -> DEBU 7c1 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:19.532 UTC [msp] hasOURole -> DEBU 7c2 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:19.532 UTC [msp] getCertificationChain -> DEBU 7c3 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:19.533 UTC [common.channelconfig] NewStandardValues -> DEBU 7c4 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:19.533 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c5 Processing field: AnchorPeers" +"2019-05-02 09:27:19.533 UTC [common.channelconfig] NewStandardValues -> DEBU 7c6 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:19.533 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c7 Processing field: MSP" +"2019-05-02 09:27:19.533 UTC [common.channelconfig] Validate -> DEBU 7c8 Anchor peers for org Org2MSP are " +"2019-05-02 09:27:19.533 UTC [common.channelconfig] validateMSP -> DEBU 7c9 Setting up MSP for org Org2MSP" +"2019-05-02 09:27:19.533 UTC [msp] newBccspMsp -> DEBU 7ca Creating BCCSP-based MSP instance" +"2019-05-02 09:27:19.533 UTC [msp] New -> DEBU 7cb Creating Cache-MSP instance" +"2019-05-02 09:27:19.534 UTC [msp] Setup -> DEBU 7cc Setting up MSP instance Org2MSP" +"2019-05-02 09:27:19.534 UTC [msp.identity] newIdentity -> DEBU 7cd Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3165,7 +3154,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:45.027 UTC [msp.identity] newIdentity -> DEBU 7c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:19.535 UTC [msp.identity] newIdentity -> DEBU 7ce Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3179,109 +3168,152 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:45.027 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7c1 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:45.027 UTC [msp] Validate -> DEBU 7c2 MSP Org2MSP validating identity" -"2019-05-02 01:30:45.027 UTC [msp] getCertificationChain -> DEBU 7c3 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:45.028 UTC [msp] hasOURole -> DEBU 7c4 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:45.028 UTC [msp] getCertificationChain -> DEBU 7c5 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:45.028 UTC [msp] Setup -> DEBU 7c6 Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:45.029 UTC [msp] Setup -> DEBU 7c7 MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:45.029 UTC [policies] NewManagerImpl -> DEBU 7c8 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:45.029 UTC [policies] NewManagerImpl -> DEBU 7c9 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:45.029 UTC [policies] NewManagerImpl -> DEBU 7ca Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:45.030 UTC [policies] NewManagerImpl -> DEBU 7cb Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:45.031 UTC [policies] NewManagerImpl -> DEBU 7cc Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:45.031 UTC [policies] NewManagerImpl -> DEBU 7cd Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:45.032 UTC [policies] NewManagerImpl -> DEBU 7ce Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:45.032 UTC [policies] NewManagerImpl -> DEBU 7cf Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:45.032 UTC [policies] NewManagerImpl -> DEBU 7d0 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:45.032 UTC [policies] NewManagerImpl -> DEBU 7d1 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:45.032 UTC [policies] NewManagerImpl -> DEBU 7d2 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d3 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d4 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d5 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d6 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d7 Proposed new policy Writers for Channel/Application" -"2019-05-02 01:30:45.033 UTC [policies] NewManagerImpl -> DEBU 7d8 Proposed new policy Admins for Channel/Application" -"2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7d9 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7da Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7db Proposed new policy Readers for Channel/Application" -"2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7dc Proposed new policy Readers for Channel" -"2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7dd Proposed new policy Writers for Channel" -"2019-05-02 01:30:45.034 UTC [policies] NewManagerImpl -> DEBU 7de Proposed new policy Admins for Channel" -"2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7df Adding to config map: [Group] /Channel" -"2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7e0 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7e1 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7e2 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7e3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:45.035 UTC [common.configtx] addToMap -> DEBU 7e4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:45.036 UTC [common.configtx] addToMap -> DEBU 7e5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:45.036 UTC [common.configtx] addToMap -> DEBU 7e6 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:45.036 UTC [common.configtx] addToMap -> DEBU 7e7 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:45.036 UTC [common.configtx] addToMap -> DEBU 7e8 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:45.036 UTC [common.configtx] addToMap -> DEBU 7e9 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:45.037 UTC [common.configtx] addToMap -> DEBU 7ea Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:45.037 UTC [common.configtx] addToMap -> DEBU 7eb Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:45.037 UTC [common.configtx] addToMap -> DEBU 7ec Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:45.037 UTC [common.configtx] addToMap -> DEBU 7ed Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:45.038 UTC [common.configtx] addToMap -> DEBU 7ee Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:45.038 UTC [common.configtx] addToMap -> DEBU 7ef Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:45.038 UTC [common.configtx] addToMap -> DEBU 7f0 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:45.038 UTC [common.configtx] addToMap -> DEBU 7f1 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:45.039 UTC [common.configtx] addToMap -> DEBU 7f2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:45.039 UTC [common.configtx] addToMap -> DEBU 7f3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:45.039 UTC [common.configtx] addToMap -> DEBU 7f4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:45.039 UTC [common.configtx] addToMap -> DEBU 7f5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7f7 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7f8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7f9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7fa Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:45.040 UTC [common.configtx] addToMap -> DEBU 7fd Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 7fe Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 7ff Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 800 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 801 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 802 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 803 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 804 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 805 Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 806 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 807 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 808 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 809 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:45.041 UTC [common.configtx] addToMap -> DEBU 80a Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:45.042 UTC [common.configtx] addToMap -> DEBU 80b Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:45.042 UTC [common.channelconfig] LogSanityChecks -> DEBU 80c As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:30:45.042 UTC [common.channelconfig] LogSanityChecks -> DEBU 80d As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 80e Manager Channel looking up path [Application]" -"2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 80f Manager Channel has managers Orderer" -"2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 810 Manager Channel has managers Application" -"2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 811 Manager Channel/Application looking up path []" -"2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 812 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:45.043 UTC [policies] Manager -> DEBU 813 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:45.043 UTC [common.channelconfig] LogSanityChecks -> DEBU 814 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:30:45.044 UTC [common.channelconfig] LogSanityChecks -> DEBU 815 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:30:45.044 UTC [common.channelconfig] LogSanityChecks -> DEBU 816 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:30:45.044 UTC [policies] Manager -> DEBU 817 Manager Channel looking up path [Orderer]" -"2019-05-02 01:30:45.044 UTC [policies] Manager -> DEBU 818 Manager Channel has managers Orderer" -"2019-05-02 01:30:45.044 UTC [policies] Manager -> DEBU 819 Manager Channel has managers Application" -"2019-05-02 01:30:45.044 UTC [policies] Manager -> DEBU 81a Manager Channel/Orderer looking up path []" -"2019-05-02 01:30:45.044 UTC [policies] Manager -> DEBU 81b Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:30:45.044 UTC [common.channelconfig] LogSanityChecks -> DEBU 81c As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:30:45.044 UTC [common.capabilities] Supported -> DEBU 81d Orderer capability V2_0 is supported and is enabled" -"2019-05-02 01:30:45.044 UTC [common.capabilities] Supported -> DEBU 81e Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:45.044 UTC [msp.identity] Sign -> DEBU 81f Sign: plaintext: 0AD2060A1B08011A0608C590A9E60522...627B107B89DCA33B0963FA57C86CB40A " -"2019-05-02 01:30:45.044 UTC [msp.identity] Sign -> DEBU 820 Sign: digest: A71BA89C30043A2D9ABABE84AC4A847B35A7B484007D167914EBAFA33D59BF32 " -"2019-05-02 01:30:45.044 UTC [policies] Evaluate -> DEBU 821 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:30:45.044 UTC [policies] Evaluate -> DEBU 822 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:45.044 UTC [policies] Evaluate -> DEBU 823 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:30:45.044 UTC [policies] Evaluate -> DEBU 824 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:45.044 UTC [policies] Evaluate -> DEBU 825 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:30:45.045 UTC [msp] DeserializeIdentity -> DEBU 826 Obtaining identity" -"2019-05-02 01:30:45.045 UTC [msp.identity] newIdentity -> DEBU 827 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:19.536 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7cf Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:19.536 UTC [msp] Validate -> DEBU 7d0 MSP Org2MSP validating identity" +"2019-05-02 09:27:19.536 UTC [msp] getCertificationChain -> DEBU 7d1 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:19.536 UTC [msp] hasOURole -> DEBU 7d2 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:19.536 UTC [msp] getCertificationChain -> DEBU 7d3 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:19.537 UTC [common.channelconfig] NewStandardValues -> DEBU 7d4 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d5 Processing field: ConsensusType" +"2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d6 Processing field: BatchSize" +"2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d7 Processing field: BatchTimeout" +"2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d8 Processing field: KafkaBrokers" +"2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d9 Processing field: ChannelRestrictions" +"2019-05-02 09:27:19.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7da Processing field: Capabilities" +"2019-05-02 09:27:19.538 UTC [common.channelconfig] NewStandardValues -> DEBU 7db Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:19.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7dc Processing field: Endpoints" +"2019-05-02 09:27:19.538 UTC [common.channelconfig] NewStandardValues -> DEBU 7dd Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:19.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7de Processing field: MSP" +"2019-05-02 09:27:19.538 UTC [common.channelconfig] validateMSP -> DEBU 7df Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:19.538 UTC [msp] newBccspMsp -> DEBU 7e0 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:19.538 UTC [msp] New -> DEBU 7e1 Creating Cache-MSP instance" +"2019-05-02 09:27:19.539 UTC [msp] Setup -> DEBU 7e2 Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:19.539 UTC [msp.identity] newIdentity -> DEBU 7e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-05-02 09:27:19.540 UTC [msp.identity] newIdentity -> DEBU 7e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:19.541 UTC [msp] Validate -> DEBU 7e5 MSP OrdererMSP validating identity" +"2019-05-02 09:27:19.541 UTC [msp] Setup -> DEBU 7e6 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:19.541 UTC [msp] Setup -> DEBU 7e7 MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:19.541 UTC [policies] NewManagerImpl -> DEBU 7e8 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:19.541 UTC [policies] NewManagerImpl -> DEBU 7e9 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ea Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7eb Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ec Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ed Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ee Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:19.542 UTC [policies] NewManagerImpl -> DEBU 7ef Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f0 Proposed new policy Admins for Channel/Application" +"2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f1 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f2 Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f3 Proposed new policy Readers for Channel/Application" +"2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f4 Proposed new policy Writers for Channel/Application" +"2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:19.543 UTC [policies] NewManagerImpl -> DEBU 7f6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7f7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7f8 Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7f9 Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fa Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fb Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fc Proposed new policy Writers for Channel" +"2019-05-02 09:27:19.544 UTC [policies] NewManagerImpl -> DEBU 7fd Proposed new policy Admins for Channel" +"2019-05-02 09:27:19.545 UTC [policies] NewManagerImpl -> DEBU 7fe Proposed new policy Readers for Channel" +"2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 7ff Adding to config map: [Group] /Channel" +"2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 800 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 801 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 802 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:19.545 UTC [common.configtx] addToMap -> DEBU 803 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 804 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 805 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 806 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 807 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 808 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 809 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 80a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:19.546 UTC [common.configtx] addToMap -> DEBU 80b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80e Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 80f Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 810 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 811 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:19.547 UTC [common.configtx] addToMap -> DEBU 812 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 813 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 814 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 815 Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 816 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 817 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 818 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 819 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 81a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:19.548 UTC [common.configtx] addToMap -> DEBU 81b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:19.549 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:19.550 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:19.551 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:19.551 UTC [common.channelconfig] LogSanityChecks -> DEBU 82c As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:27:19.551 UTC [common.channelconfig] LogSanityChecks -> DEBU 82d As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:27:19.551 UTC [policies] Manager -> DEBU 82e Manager Channel looking up path [Application]" +"2019-05-02 09:27:19.551 UTC [policies] Manager -> DEBU 82f Manager Channel has managers Application" +"2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 830 Manager Channel has managers Orderer" +"2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 831 Manager Channel/Application looking up path []" +"2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 832 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:19.552 UTC [policies] Manager -> DEBU 833 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:19.552 UTC [common.channelconfig] LogSanityChecks -> DEBU 834 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:27:19.552 UTC [common.channelconfig] LogSanityChecks -> DEBU 835 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:27:19.552 UTC [common.channelconfig] LogSanityChecks -> DEBU 836 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 837 Manager Channel looking up path [Orderer]" +"2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 838 Manager Channel has managers Application" +"2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 839 Manager Channel has managers Orderer" +"2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 83a Manager Channel/Orderer looking up path []" +"2019-05-02 09:27:19.553 UTC [policies] Manager -> DEBU 83b Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:27:19.553 UTC [common.channelconfig] LogSanityChecks -> DEBU 83c As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:27:19.553 UTC [common.capabilities] Supported -> DEBU 83d Orderer capability V2_0 is supported and is enabled" +"2019-05-02 09:27:19.553 UTC [common.capabilities] Supported -> DEBU 83e Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:19.554 UTC [msp.identity] Sign -> DEBU 83f Sign: plaintext: 0AD2060A1B08011A0608F7EFAAE60522...6A0D7E4CB728F91FD5B162493CD72F05 " +"2019-05-02 09:27:19.554 UTC [msp.identity] Sign -> DEBU 840 Sign: digest: 5EB9017E36426B312471394DE5B16CCACE277C4E33EFA0BE53BE4C1EF1CB951D " +"2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 841 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 842 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 843 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 844 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:19.555 UTC [policies] Evaluate -> DEBU 845 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:19.555 UTC [msp] DeserializeIdentity -> DEBU 846 Obtaining identity" +"2019-05-02 09:27:19.556 UTC [msp.identity] newIdentity -> DEBU 847 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -3295,215 +3327,140 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func1 -> DEBU 828 0xc000c958f0 gate 1556760645045308800 evaluation starts" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 829 0xc000c958f0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 82a 0xc000c958f0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 82b 0xc000c958f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 82c 0xc000c958f0 principal evaluation fails" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func1 -> DEBU 82d 0xc000c958f0 gate 1556760645045308800 evaluation fails" -"2019-05-02 01:30:45.045 UTC [policies] Evaluate -> DEBU 82e Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:45.045 UTC [policies] Evaluate -> DEBU 82f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:45.045 UTC [policies] Evaluate -> DEBU 830 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func1 -> DEBU 831 0xc000ca2a30 gate 1556760645045680700 evaluation starts" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 832 0xc000ca2a30 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 833 0xc000ca2a30 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 834 0xc000ca2a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func2 -> DEBU 835 0xc000ca2a30 principal evaluation fails" -"2019-05-02 01:30:45.045 UTC [cauthdsl] func1 -> DEBU 836 0xc000ca2a30 gate 1556760645045680700 evaluation fails" -"2019-05-02 01:30:45.045 UTC [policies] Evaluate -> DEBU 837 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:45.045 UTC [policies] Evaluate -> DEBU 838 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:45.045 UTC [policies] func1 -> DEBU 839 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" -"2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 83a Signature set did not satisfy policy /Channel/Application/Writers" -"2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 83b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 83c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 83d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 83e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:30:45.046 UTC [cauthdsl] func1 -> DEBU 83f 0xc000ca3740 gate 1556760645046191300 evaluation starts" -"2019-05-02 01:30:45.046 UTC [cauthdsl] func2 -> DEBU 840 0xc000ca3740 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:45.046 UTC [cauthdsl] func2 -> DEBU 841 0xc000ca3740 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:45.046 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 842 Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-05-02 01:30:45.046 UTC [msp] Validate -> DEBU 843 MSP OrdererMSP validating identity" -"2019-05-02 01:30:45.046 UTC [cauthdsl] func2 -> DEBU 844 0xc000ca3740 principal matched by identity 0" -"2019-05-02 01:30:45.046 UTC [msp.identity] Verify -> DEBU 845 Verify: digest = 00000000 a7 1b a8 9c 30 04 3a 2d 9a ba be 84 ac 4a 84 7b |....0.:-.....J.{| -00000010 35 a7 b4 84 00 7d 16 79 14 eb af a3 3d 59 bf 32 |5....}.y....=Y.2|" -"2019-05-02 01:30:45.046 UTC [msp.identity] Verify -> DEBU 846 Verify: sig = 00000000 30 45 02 21 00 b6 5f 7a 53 df 5f 76 85 dd 0b ea |0E.!.._zS._v....| -00000010 9f 26 c6 a9 8e 06 6a 34 37 3d f3 15 28 17 9a 74 |.&....j47=..(..t| -00000020 31 28 76 c8 a6 02 20 2b b0 d1 53 f4 ca 8f 92 68 |1(v... +..S....h| -00000030 07 cb d5 a1 f3 3f fc 62 d2 13 9d 61 d0 30 18 b0 |.....?.b...a.0..| -00000040 6a e8 85 0e 1c 91 43 |j.....C|" -"2019-05-02 01:30:45.046 UTC [cauthdsl] func2 -> DEBU 847 0xc000ca3740 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:45.046 UTC [cauthdsl] func1 -> DEBU 848 0xc000ca3740 gate 1556760645046191300 evaluation succeeds" -"2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 849 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 84a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 84b Signature set satisfies policy /Channel/Orderer/Writers" -"2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 84c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-05-02 01:30:45.046 UTC [policies] Evaluate -> DEBU 84d Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:30:45.047 UTC [policies] Evaluate -> DEBU 84e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:30:45.049 UTC [orderer.consensus.etcdraft] propose -> INFO 84f Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-05-02 01:30:45.049 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 850 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.240.9:47308" -"2019-05-02 01:30:45.049 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 851 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -"2019-05-02 01:30:45.050 UTC [orderer.consensus.etcdraft] 2 -> DEBU 852 Proposed block [1] to raft consensus" channel=businesschannel node=1 -"2019-05-02 01:30:45.056 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 853 Sending msg of 22807 bytes to 2 on channel businesschannel took 31.5µs" -"2019-05-02 01:30:45.056 UTC [orderer.common.broadcast] Handle -> WARN 856 Error reading from 192.168.240.9:47308: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:45.056 UTC [orderer.common.server] func1 -> DEBU 858 Closing Broadcast stream" -"2019-05-02 01:30:45.056 UTC [comm.grpc.server] 1 -> INFO 859 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47308 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=44.917ms -"2019-05-02 01:30:45.057 UTC [grpc] infof -> DEBU 85a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:45.056 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 857 Sending msg of 22807 bytes to 3 on channel businesschannel took 17.2µs" -"2019-05-02 01:30:45.056 UTC [grpc] infof -> DEBU 855 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:45.057 UTC [orderer.common.cluster.step] sendMessage -> DEBU 85b Send of ConsensusRequest for channel businesschannel with payload of size 22807 to orderer2.example.com(orderer2.example.com:7050) took 99.8µs " -"2019-05-02 01:30:45.056 UTC [common.deliver] Handle -> WARN 854 Error reading from 192.168.240.9:47306: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:45.057 UTC [orderer.common.server] func1 -> DEBU 85c Closing Deliver stream" -"2019-05-02 01:30:45.057 UTC [orderer.common.cluster.step] sendMessage -> DEBU 85d Send of ConsensusRequest for channel businesschannel with payload of size 22807 to orderer1.example.com(orderer1.example.com:7050) took 91.7µs " -"2019-05-02 01:30:45.057 UTC [comm.grpc.server] 1 -> INFO 85e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47306 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=62.9723ms -"2019-05-02 01:30:45.066 UTC [orderer.common.cluster.step] handleMessage -> DEBU 85f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:45.067 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 860 Sending msg of 28 bytes to 2 on channel businesschannel took 10.9µs" -"2019-05-02 01:30:45.067 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 861 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" -"2019-05-02 01:30:45.068 UTC [orderer.common.cluster.step] sendMessage -> DEBU 865 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " -"2019-05-02 01:30:45.068 UTC [orderer.common.cluster.step] handleMessage -> DEBU 862 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:45.068 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 863 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 -"2019-05-02 01:30:45.080 UTC [common.configtx] addToMap -> DEBU 866 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:45.091 UTC [common.configtx] addToMap -> DEBU 86b Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:45.084 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 867 Sending msg of 28 bytes to 2 on channel businesschannel took 713.8µs" -"2019-05-02 01:30:45.068 UTC [orderer.common.cluster.step] sendMessage -> DEBU 864 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.4µs " -"2019-05-02 01:30:45.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 868 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:45.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 869 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:45.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 86a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:45.093 UTC [common.configtx] addToMap -> DEBU 86c Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:45.094 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 86d Sending msg of 28 bytes to 3 on channel businesschannel took 29.2µs" -"2019-05-02 01:30:45.094 UTC [orderer.common.cluster.step] sendMessage -> DEBU 86e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.9µs " -"2019-05-02 01:30:45.096 UTC [orderer.common.cluster.step] sendMessage -> DEBU 86f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137µs " -"2019-05-02 01:30:45.097 UTC [common.configtx] addToMap -> DEBU 870 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:45.099 UTC [common.configtx] addToMap -> DEBU 871 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:45.099 UTC [common.configtx] addToMap -> DEBU 872 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:45.099 UTC [common.configtx] addToMap -> DEBU 873 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:45.099 UTC [common.configtx] addToMap -> DEBU 874 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:45.099 UTC [common.configtx] addToMap -> DEBU 875 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 876 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 877 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 878 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 879 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 87a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:45.100 UTC [common.configtx] addToMap -> DEBU 87b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:45.101 UTC [common.configtx] addToMap -> DEBU 87c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:45.101 UTC [common.configtx] addToMap -> DEBU 87d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:45.101 UTC [common.configtx] verifyDeltaSet -> DEBU 87e Processing change to key: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:45.101 UTC [common.configtx] policyForItem -> DEBU 87f Getting policy for item Org1MSP with mod_policy Admins" -"2019-05-02 01:30:45.101 UTC [policies] Manager -> DEBU 880 Manager Channel looking up path [Application]" -"2019-05-02 01:30:45.101 UTC [policies] Manager -> DEBU 881 Manager Channel has managers Application" -"2019-05-02 01:30:45.101 UTC [policies] Manager -> DEBU 882 Manager Channel has managers Orderer" -"2019-05-02 01:30:45.102 UTC [policies] Manager -> DEBU 883 Manager Channel/Application looking up path []" -"2019-05-02 01:30:45.102 UTC [policies] Manager -> DEBU 884 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:45.103 UTC [policies] Manager -> DEBU 885 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:45.103 UTC [policies] Manager -> DEBU 887 Manager Channel/Application looking up path [Org1MSP]" -"2019-05-02 01:30:45.103 UTC [policies] Manager -> DEBU 888 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:45.103 UTC [policies] Manager -> DEBU 889 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:45.103 UTC [policies] Manager -> DEBU 88a Manager Channel/Application/Org1MSP looking up path []" -"2019-05-02 01:30:45.103 UTC [policies] Evaluate -> DEBU 88b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-05-02 01:30:45.104 UTC [cauthdsl] func1 -> DEBU 88c 0xc000dc99f0 gate 1556760645104137000 evaluation starts" -"2019-05-02 01:30:45.104 UTC [cauthdsl] func2 -> DEBU 88d 0xc000dc99f0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:45.105 UTC [cauthdsl] func2 -> DEBU 88e 0xc000dc99f0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:45.105 UTC [cauthdsl] func2 -> DEBU 88f 0xc000dc99f0 principal matched by identity 0" -"2019-05-02 01:30:45.105 UTC [msp.identity] Verify -> DEBU 890 Verify: digest = 00000000 7e e0 d8 d0 d7 b3 a3 c0 01 cb 90 33 37 60 be ef |~..........37`..| -00000010 83 04 8b cc e0 6f 0e 3f 09 4a b5 dc 79 83 5e 60 |.....o.?.J..y.^`|" -"2019-05-02 01:30:45.105 UTC [msp.identity] Verify -> DEBU 891 Verify: sig = 00000000 30 44 02 20 39 8e 08 37 34 ec ec 41 53 c4 ad ba |0D. 9..74..AS...| -00000010 2b dc ff 17 42 53 d2 3d 6f 68 d1 51 80 64 85 d7 |+...BS.=oh.Q.d..| -00000020 4f 85 ee ad 02 20 6a 36 2b aa 0f 2c 88 10 ef 67 |O.... j6+..,...g| -00000030 83 9e 48 8b 6f d5 dc 74 97 3a a1 54 c5 58 6e c1 |..H.o..t.:.T.Xn.| -00000040 78 e3 76 0b 0d 01 |x.v...|" -"2019-05-02 01:30:45.106 UTC [cauthdsl] func2 -> DEBU 893 0xc000dc99f0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:45.106 UTC [cauthdsl] func1 -> DEBU 894 0xc000dc99f0 gate 1556760645104137000 evaluation succeeds" -"2019-05-02 01:30:45.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 886 Sending msg of 28 bytes to 3 on channel testchainid took 445µs" -"2019-05-02 01:30:45.106 UTC [policies] Evaluate -> DEBU 895 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:45.108 UTC [policies] Evaluate -> DEBU 896 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:45.108 UTC [common.configtx] verifyDeltaSet -> DEBU 897 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:45.109 UTC [common.configtx] recurseConfigMap -> DEBU 898 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 892 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.7067ms " -"2019-05-02 01:30:45.109 UTC [common.configtx] recurseConfigMap -> DEBU 899 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.109 UTC [common.configtx] recurseConfigMap -> DEBU 89a Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.109 UTC [common.configtx] recurseConfigMap -> DEBU 89b Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.110 UTC [common.configtx] recurseConfigMap -> DEBU 89c Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.110 UTC [common.configtx] recurseConfigMap -> DEBU 89d Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.110 UTC [common.configtx] recurseConfigMap -> DEBU 89e Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 89f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:45.111 UTC [common.configtx] recurseConfigMap -> DEBU 8a0 Setting policy for key Readers to " -"2019-05-02 01:30:45.111 UTC [common.configtx] recurseConfigMap -> DEBU 8a1 Setting policy for key Writers to " -"2019-05-02 01:30:45.111 UTC [common.configtx] recurseConfigMap -> DEBU 8a2 Setting policy for key Admins to " -"2019-05-02 01:30:45.111 UTC [common.configtx] recurseConfigMap -> DEBU 8a3 Setting policy for key Endorsement to " -"2019-05-02 01:30:45.111 UTC [common.configtx] recurseConfigMap -> DEBU 8a4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.112 UTC [common.configtx] recurseConfigMap -> DEBU 8a5 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.113 UTC [common.configtx] recurseConfigMap -> DEBU 8a7 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.113 UTC [common.configtx] recurseConfigMap -> DEBU 8a8 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.114 UTC [common.configtx] recurseConfigMap -> DEBU 8a9 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.114 UTC [common.configtx] recurseConfigMap -> DEBU 8aa Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.114 UTC [common.configtx] recurseConfigMap -> DEBU 8ab Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.114 UTC [common.configtx] recurseConfigMap -> DEBU 8ac Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.114 UTC [common.configtx] recurseConfigMap -> DEBU 8ad Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.115 UTC [common.configtx] recurseConfigMap -> DEBU 8ae Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.115 UTC [common.configtx] recurseConfigMap -> DEBU 8af Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.115 UTC [common.configtx] recurseConfigMap -> DEBU 8b0 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:45.116 UTC [common.channelconfig] NewStandardValues -> DEBU 8b1 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:45.113 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8a6 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:45.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b2 Processing field: HashingAlgorithm" -"2019-05-02 01:30:45.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b3 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:45.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b4 Processing field: OrdererAddresses" -"2019-05-02 01:30:45.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b5 Processing field: Consortium" -"2019-05-02 01:30:45.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b6 Processing field: Capabilities" -"2019-05-02 01:30:45.118 UTC [common.channelconfig] NewStandardValues -> DEBU 8b7 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:45.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b8 Processing field: ConsensusType" -"2019-05-02 01:30:45.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b9 Processing field: BatchSize" -"2019-05-02 01:30:45.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ba Processing field: BatchTimeout" -"2019-05-02 01:30:45.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bb Processing field: KafkaBrokers" -"2019-05-02 01:30:45.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bc Processing field: ChannelRestrictions" -"2019-05-02 01:30:45.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bd Processing field: Capabilities" -"2019-05-02 01:30:45.121 UTC [common.channelconfig] NewStandardValues -> DEBU 8be Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:45.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bf Processing field: Endpoints" -"2019-05-02 01:30:45.121 UTC [common.channelconfig] NewStandardValues -> DEBU 8c0 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:45.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c1 Processing field: MSP" -"2019-05-02 01:30:45.122 UTC [common.channelconfig] validateMSP -> DEBU 8c2 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:45.122 UTC [msp] newBccspMsp -> DEBU 8c3 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:45.130 UTC [msp] New -> DEBU 8c4 Creating Cache-MSP instance" -"2019-05-02 01:30:45.135 UTC [msp] Setup -> DEBU 8c5 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:45.137 UTC [msp.identity] newIdentity -> DEBU 8c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-05-02 01:30:45.140 UTC [msp.identity] newIdentity -> DEBU 8c7 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-05-02 01:30:45.143 UTC [msp] Validate -> DEBU 8c8 MSP OrdererMSP validating identity" -"2019-05-02 01:30:45.144 UTC [common.channelconfig] NewStandardValues -> DEBU 8c9 Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:45.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ca Processing field: ACLs" -"2019-05-02 01:30:45.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cb Processing field: Capabilities" -"2019-05-02 01:30:45.144 UTC [common.channelconfig] NewStandardValues -> DEBU 8cc Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:45.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cd Processing field: AnchorPeers" -"2019-05-02 01:30:45.145 UTC [common.channelconfig] NewStandardValues -> DEBU 8ce Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:45.145 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cf Processing field: MSP" -"2019-05-02 01:30:45.145 UTC [common.channelconfig] Validate -> DEBU 8d0 Anchor peers for org Org1MSP are anchor_peers: " -"2019-05-02 01:30:45.145 UTC [common.channelconfig] validateMSP -> DEBU 8d1 Setting up MSP for org Org1MSP" -"2019-05-02 01:30:45.145 UTC [msp] newBccspMsp -> DEBU 8d2 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:45.145 UTC [msp] New -> DEBU 8d3 Creating Cache-MSP instance" -"2019-05-02 01:30:45.145 UTC [msp] Setup -> DEBU 8d4 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:45.146 UTC [msp.identity] newIdentity -> DEBU 8d5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:19.556 UTC [cauthdsl] func1 -> DEBU 848 0xc000847e50 gate 1556789239556730800 evaluation starts" +"2019-05-02 09:27:19.556 UTC [cauthdsl] func2 -> DEBU 849 0xc000847e50 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:19.556 UTC [cauthdsl] func2 -> DEBU 84a 0xc000847e50 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:19.556 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 84b Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-05-02 09:27:19.557 UTC [msp] Validate -> DEBU 84c MSP OrdererMSP validating identity" +"2019-05-02 09:27:19.557 UTC [cauthdsl] func2 -> DEBU 84d 0xc000847e50 principal matched by identity 0" +"2019-05-02 09:27:19.557 UTC [msp.identity] Verify -> DEBU 84e Verify: digest = 00000000 5e b9 01 7e 36 42 6b 31 24 71 39 4d e5 b1 6c ca |^..~6Bk1$q9M..l.| +00000010 ce 27 7c 4e 33 ef a0 be 53 be 4c 1e f1 cb 95 1d |.'|N3...S.L.....|" +"2019-05-02 09:27:19.557 UTC [msp.identity] Verify -> DEBU 84f Verify: sig = 00000000 30 45 02 21 00 be 47 8b ce db 26 57 b4 11 11 08 |0E.!..G...&W....| +00000010 f9 be 3d 46 9f b5 2d f9 46 64 13 a9 79 52 08 4c |..=F..-.Fd..yR.L| +00000020 e0 55 30 75 29 02 20 3f 14 58 43 89 87 f7 bf 90 |.U0u). ?.XC.....| +00000030 9e 87 74 e9 8f 2a 1f a5 38 cf 98 0d a9 03 70 d8 |..t..*..8.....p.| +00000040 1a 33 13 1f 94 5f 84 |.3..._.|" +"2019-05-02 09:27:19.558 UTC [cauthdsl] func2 -> DEBU 850 0xc000847e50 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:19.558 UTC [cauthdsl] func1 -> DEBU 851 0xc000847e50 gate 1556789239556730800 evaluation succeeds" +"2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 852 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 853 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 854 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 855 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 856 Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:19.558 UTC [policies] Evaluate -> DEBU 857 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:19.559 UTC [orderer.consensus.etcdraft] propose -> INFO 858 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-05-02 09:27:19.559 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 859 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-05-02 09:27:19.559 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 85a [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57180" +"2019-05-02 09:27:19.563 UTC [orderer.consensus.etcdraft] 2 -> DEBU 85b Proposed block [1] to raft consensus" channel=businesschannel node=1 +"2019-05-02 09:27:19.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 85c Sending msg of 22808 bytes to 2 on channel businesschannel took 22.3µs" +"2019-05-02 09:27:19.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 85d Send of ConsensusRequest for channel businesschannel with payload of size 22808 to orderer1.example.com(orderer1.example.com:7050) took 108.3µs " +"2019-05-02 09:27:19.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 85e Sending msg of 22808 bytes to 3 on channel businesschannel took 696.7µs" +"2019-05-02 09:27:19.565 UTC [orderer.common.broadcast] Handle -> WARN 85f Error reading from 172.18.0.8:57180: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:19.565 UTC [orderer.common.server] func1 -> DEBU 861 Closing Broadcast stream" +"2019-05-02 09:27:19.572 UTC [orderer.common.cluster.step] handleMessage -> DEBU 865 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:19.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 866 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +"2019-05-02 09:27:19.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 867 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +"2019-05-02 09:27:19.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 868 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " +"2019-05-02 09:27:19.573 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 869 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +"2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86a Adding to config map: [Group] /Channel" +"2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86b Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 86f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 870 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 871 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:19.573 UTC [common.configtx] addToMap -> DEBU 872 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 873 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 874 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 875 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 876 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 877 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 878 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 879 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:19.574 UTC [common.configtx] addToMap -> DEBU 87a Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:19.574 UTC [common.configtx] verifyDeltaSet -> DEBU 87b Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:19.574 UTC [common.configtx] policyForItem -> DEBU 87c Getting policy for item Org1MSP with mod_policy Admins" +"2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 87d Manager Channel looking up path [Application]" +"2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 87e Manager Channel has managers Application" +"2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 87f Manager Channel has managers Orderer" +"2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 880 Manager Channel/Application looking up path []" +"2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 881 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 882 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 883 Manager Channel/Application looking up path [Org1MSP]" +"2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 884 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 885 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:19.574 UTC [policies] Manager -> DEBU 886 Manager Channel/Application/Org1MSP looking up path []" +"2019-05-02 09:27:19.574 UTC [policies] Evaluate -> DEBU 887 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-05-02 09:27:19.574 UTC [cauthdsl] func1 -> DEBU 888 0xc000931580 gate 1556789239574831400 evaluation starts" +"2019-05-02 09:27:19.574 UTC [cauthdsl] func2 -> DEBU 889 0xc000931580 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:19.574 UTC [cauthdsl] func2 -> DEBU 88a 0xc000931580 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:19.574 UTC [cauthdsl] func2 -> DEBU 88b 0xc000931580 principal matched by identity 0" +"2019-05-02 09:27:19.575 UTC [msp.identity] Verify -> DEBU 88c Verify: digest = 00000000 1e 4a 2b e5 03 f9 6c c3 23 48 0d a8 83 20 ef f2 |.J+...l.#H... ..| +00000010 7a e8 18 fd 74 24 f2 e6 41 72 f3 5d d7 16 16 71 |z...t$..Ar.]...q|" +"2019-05-02 09:27:19.575 UTC [msp.identity] Verify -> DEBU 88d Verify: sig = 00000000 30 44 02 20 7c b2 f7 03 cd 4f 8e cd 30 a1 37 b6 |0D. |....O..0.7.| +00000010 7e b2 75 32 5d 38 f1 78 91 c4 b9 3a c8 50 d7 24 |~.u2]8.x...:.P.$| +00000020 86 46 58 89 02 20 01 29 a4 4f 1b da f4 cd 41 1a |.FX.. .).O....A.| +00000030 ea 42 9b bf da 05 a0 92 ff 30 14 2e a4 22 c8 09 |.B.......0..."..| +00000040 d0 64 c5 30 31 53 |.d.01S|" +"2019-05-02 09:27:19.568 UTC [comm.grpc.server] 1 -> INFO 88e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57180 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=65.0375ms +"2019-05-02 09:27:19.566 UTC [common.deliver] Handle -> WARN 862 Error reading from 172.18.0.8:57178: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:19.579 UTC [orderer.common.server] func1 -> DEBU 88f Closing Deliver stream" +"2019-05-02 09:27:19.579 UTC [comm.grpc.server] 1 -> INFO 890 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57178 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.2523ms +"2019-05-02 09:27:19.566 UTC [grpc] infof -> DEBU 863 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:19.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU 864 Send of ConsensusRequest for channel businesschannel with payload of size 22808 to orderer2.example.com(orderer2.example.com:7050) took 235µs " +"2019-05-02 09:27:19.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 891 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +"2019-05-02 09:27:19.565 UTC [grpc] infof -> DEBU 860 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:19.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 892 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:19.590 UTC [orderer.common.cluster.step] handleMessage -> DEBU 893 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:19.592 UTC [cauthdsl] func2 -> DEBU 894 0xc000931580 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:19.593 UTC [orderer.common.cluster.step] handleMessage -> DEBU 895 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:19.594 UTC [cauthdsl] func1 -> DEBU 896 0xc000931580 gate 1556789239574831400 evaluation succeeds" +"2019-05-02 09:27:19.595 UTC [policies] Evaluate -> DEBU 897 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:19.595 UTC [policies] Evaluate -> DEBU 898 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:19.596 UTC [common.configtx] verifyDeltaSet -> DEBU 899 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:19.599 UTC [common.configtx] recurseConfigMap -> DEBU 89a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.599 UTC [common.configtx] recurseConfigMap -> DEBU 89b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.599 UTC [common.configtx] recurseConfigMap -> DEBU 89c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.600 UTC [common.configtx] recurseConfigMap -> DEBU 89d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.601 UTC [common.configtx] recurseConfigMap -> DEBU 89e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.601 UTC [common.configtx] recurseConfigMap -> DEBU 89f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.601 UTC [common.configtx] recurseConfigMap -> DEBU 8a0 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.602 UTC [common.configtx] recurseConfigMap -> DEBU 8a1 Setting policy for key Admins to " +"2019-05-02 09:27:19.602 UTC [common.configtx] recurseConfigMap -> DEBU 8a2 Setting policy for key Endorsement to " +"2019-05-02 09:27:19.604 UTC [common.configtx] recurseConfigMap -> DEBU 8a3 Setting policy for key Readers to " +"2019-05-02 09:27:19.604 UTC [common.configtx] recurseConfigMap -> DEBU 8a4 Setting policy for key Writers to " +"2019-05-02 09:27:19.606 UTC [common.configtx] recurseConfigMap -> DEBU 8a5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.607 UTC [common.configtx] recurseConfigMap -> DEBU 8a6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.607 UTC [common.configtx] recurseConfigMap -> DEBU 8a7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.608 UTC [common.configtx] recurseConfigMap -> DEBU 8a8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.608 UTC [common.configtx] recurseConfigMap -> DEBU 8a9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.609 UTC [common.configtx] recurseConfigMap -> DEBU 8aa Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.609 UTC [common.configtx] recurseConfigMap -> DEBU 8ab Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.609 UTC [common.configtx] recurseConfigMap -> DEBU 8ac Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.610 UTC [common.configtx] recurseConfigMap -> DEBU 8ad Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.611 UTC [common.configtx] recurseConfigMap -> DEBU 8ae Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.611 UTC [common.configtx] recurseConfigMap -> DEBU 8af Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.611 UTC [common.configtx] recurseConfigMap -> DEBU 8b0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:19.614 UTC [common.channelconfig] NewStandardValues -> DEBU 8b1 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:19.614 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b2 Processing field: HashingAlgorithm" +"2019-05-02 09:27:19.614 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b3 Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:19.615 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b4 Processing field: OrdererAddresses" +"2019-05-02 09:27:19.615 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b5 Processing field: Consortium" +"2019-05-02 09:27:19.615 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b6 Processing field: Capabilities" +"2019-05-02 09:27:19.615 UTC [common.channelconfig] NewStandardValues -> DEBU 8b7 Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:19.616 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b8 Processing field: ACLs" +"2019-05-02 09:27:19.616 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b9 Processing field: Capabilities" +"2019-05-02 09:27:19.618 UTC [common.channelconfig] NewStandardValues -> DEBU 8ba Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:19.618 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bb Processing field: AnchorPeers" +"2019-05-02 09:27:19.619 UTC [common.channelconfig] NewStandardValues -> DEBU 8bc Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:19.619 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bd Processing field: MSP" +"2019-05-02 09:27:19.619 UTC [common.channelconfig] Validate -> DEBU 8be Anchor peers for org Org1MSP are anchor_peers: " +"2019-05-02 09:27:19.619 UTC [common.channelconfig] validateMSP -> DEBU 8bf Setting up MSP for org Org1MSP" +"2019-05-02 09:27:19.620 UTC [msp] newBccspMsp -> DEBU 8c0 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:19.620 UTC [msp] New -> DEBU 8c1 Creating Cache-MSP instance" +"2019-05-02 09:27:19.620 UTC [msp] Setup -> DEBU 8c2 Setting up MSP instance Org1MSP" +"2019-05-02 09:27:19.621 UTC [msp.identity] newIdentity -> DEBU 8c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3518,7 +3475,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:45.146 UTC [msp.identity] newIdentity -> DEBU 8d6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:19.623 UTC [msp.identity] newIdentity -> DEBU 8c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3532,21 +3489,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:45.147 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8d7 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:45.147 UTC [msp] Validate -> DEBU 8d8 MSP Org1MSP validating identity" -"2019-05-02 01:30:45.147 UTC [msp] getCertificationChain -> DEBU 8d9 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:45.148 UTC [msp] hasOURole -> DEBU 8da MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:45.148 UTC [msp] getCertificationChain -> DEBU 8db MSP Org1MSP getting certification chain" -"2019-05-02 01:30:45.148 UTC [common.channelconfig] NewStandardValues -> DEBU 8dc Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:45.148 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dd Processing field: AnchorPeers" -"2019-05-02 01:30:45.148 UTC [common.channelconfig] NewStandardValues -> DEBU 8de Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:45.148 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8df Processing field: MSP" -"2019-05-02 01:30:45.149 UTC [common.channelconfig] Validate -> DEBU 8e0 Anchor peers for org Org2MSP are " -"2019-05-02 01:30:45.149 UTC [common.channelconfig] validateMSP -> DEBU 8e1 Setting up MSP for org Org2MSP" -"2019-05-02 01:30:45.149 UTC [msp] newBccspMsp -> DEBU 8e2 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:45.149 UTC [msp] New -> DEBU 8e3 Creating Cache-MSP instance" -"2019-05-02 01:30:45.149 UTC [msp] Setup -> DEBU 8e4 Setting up MSP instance Org2MSP" -"2019-05-02 01:30:45.150 UTC [msp.identity] newIdentity -> DEBU 8e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:19.625 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8c5 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:19.626 UTC [msp] Validate -> DEBU 8c6 MSP Org1MSP validating identity" +"2019-05-02 09:27:19.630 UTC [msp] getCertificationChain -> DEBU 8c7 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:19.631 UTC [msp] hasOURole -> DEBU 8c8 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:19.631 UTC [msp] getCertificationChain -> DEBU 8c9 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:19.632 UTC [common.channelconfig] NewStandardValues -> DEBU 8ca Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:19.632 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cb Processing field: AnchorPeers" +"2019-05-02 09:27:19.632 UTC [common.channelconfig] NewStandardValues -> DEBU 8cc Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:19.633 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cd Processing field: MSP" +"2019-05-02 09:27:19.633 UTC [common.channelconfig] Validate -> DEBU 8ce Anchor peers for org Org2MSP are " +"2019-05-02 09:27:19.633 UTC [common.channelconfig] validateMSP -> DEBU 8cf Setting up MSP for org Org2MSP" +"2019-05-02 09:27:19.633 UTC [msp] newBccspMsp -> DEBU 8d0 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:19.633 UTC [msp] New -> DEBU 8d1 Creating Cache-MSP instance" +"2019-05-02 09:27:19.634 UTC [msp] Setup -> DEBU 8d2 Setting up MSP instance Org2MSP" +"2019-05-02 09:27:19.636 UTC [msp.identity] newIdentity -> DEBU 8d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3561,7 +3518,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:45.151 UTC [msp.identity] newIdentity -> DEBU 8e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:19.638 UTC [msp.identity] newIdentity -> DEBU 8d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3575,164 +3532,210 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:45.151 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8e7 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:45.151 UTC [msp] Validate -> DEBU 8e8 MSP Org2MSP validating identity" -"2019-05-02 01:30:45.152 UTC [msp] getCertificationChain -> DEBU 8e9 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:45.152 UTC [msp] hasOURole -> DEBU 8ea MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:45.152 UTC [msp] getCertificationChain -> DEBU 8eb MSP Org2MSP getting certification chain" -"2019-05-02 01:30:45.152 UTC [msp] Setup -> DEBU 8ec Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:45.153 UTC [msp] Setup -> DEBU 8ed MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:45.153 UTC [policies] NewManagerImpl -> DEBU 8ee Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:45.153 UTC [policies] NewManagerImpl -> DEBU 8ef Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:45.153 UTC [policies] NewManagerImpl -> DEBU 8f0 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:45.153 UTC [policies] NewManagerImpl -> DEBU 8f1 Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:45.153 UTC [policies] NewManagerImpl -> DEBU 8f2 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:45.154 UTC [policies] NewManagerImpl -> DEBU 8f3 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:45.154 UTC [policies] NewManagerImpl -> DEBU 8f4 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:45.154 UTC [policies] NewManagerImpl -> DEBU 8f5 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:45.154 UTC [policies] NewManagerImpl -> DEBU 8f6 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:45.155 UTC [policies] NewManagerImpl -> DEBU 8f7 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:45.155 UTC [policies] NewManagerImpl -> DEBU 8f8 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:45.155 UTC [policies] NewManagerImpl -> DEBU 8f9 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:45.155 UTC [policies] NewManagerImpl -> DEBU 8fa Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:45.155 UTC [policies] NewManagerImpl -> DEBU 8fb Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 8fc Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 8fd Proposed new policy Writers for Channel/Application" -"2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 8fe Proposed new policy Admins for Channel/Application" -"2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 8ff Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 900 Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 901 Proposed new policy Readers for Channel/Application" -"2019-05-02 01:30:45.156 UTC [policies] NewManagerImpl -> DEBU 902 Proposed new policy Readers for Channel" -"2019-05-02 01:30:45.157 UTC [policies] NewManagerImpl -> DEBU 903 Proposed new policy Writers for Channel" -"2019-05-02 01:30:45.157 UTC [policies] NewManagerImpl -> DEBU 904 Proposed new policy Admins for Channel" -"2019-05-02 01:30:45.157 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:45.157 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:45.157 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:45.157 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:45.158 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:45.159 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:45.159 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:45.159 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:45.159 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:45.159 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 917 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 918 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:45.160 UTC [common.configtx] addToMap -> DEBU 919 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:45.161 UTC [common.configtx] addToMap -> DEBU 91a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:45.161 UTC [common.configtx] addToMap -> DEBU 91b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:45.161 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:45.161 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:45.161 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:45.162 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 925 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 926 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:45.163 UTC [common.configtx] addToMap -> DEBU 92b Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 92c Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 92d Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 92e Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 92f Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 930 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:45.164 UTC [common.configtx] addToMap -> DEBU 931 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:45.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 932 As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:30:45.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 933 As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:30:45.165 UTC [policies] Manager -> DEBU 934 Manager Channel looking up path [Application]" -"2019-05-02 01:30:45.165 UTC [policies] Manager -> DEBU 935 Manager Channel has managers Orderer" -"2019-05-02 01:30:45.165 UTC [policies] Manager -> DEBU 936 Manager Channel has managers Application" -"2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 937 Manager Channel/Application looking up path []" -"2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 938 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 939 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:45.166 UTC [common.channelconfig] LogSanityChecks -> DEBU 93a As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:30:45.166 UTC [common.channelconfig] LogSanityChecks -> DEBU 93b As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:30:45.166 UTC [common.channelconfig] LogSanityChecks -> DEBU 93c As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 93d Manager Channel looking up path [Orderer]" -"2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 93e Manager Channel has managers Application" -"2019-05-02 01:30:45.166 UTC [policies] Manager -> DEBU 93f Manager Channel has managers Orderer" -"2019-05-02 01:30:45.167 UTC [policies] Manager -> DEBU 940 Manager Channel/Orderer looking up path []" -"2019-05-02 01:30:45.167 UTC [policies] Manager -> DEBU 941 Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:30:45.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 942 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:30:45.167 UTC [common.capabilities] Supported -> DEBU 943 Orderer capability V2_0 is supported and is enabled" -"2019-05-02 01:30:45.167 UTC [common.capabilities] Supported -> DEBU 944 Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:45.167 UTC [orderer.common.server] func1 -> DEBU 945 Executing callback to update root CAs" -"2019-05-02 01:30:45.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 946 updating root CAs for channel [businesschannel]" -"2019-05-02 01:30:45.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 947 adding app root CAs for MSP [Org1MSP]" -"2019-05-02 01:30:45.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 948 adding app root CAs for MSP [Org2MSP]" -"2019-05-02 01:30:45.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 949 adding orderer root CAs for MSP [OrdererMSP]" -"2019-05-02 01:30:45.168 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 94a [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" -"2019-05-02 01:30:45.169 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 94b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" -"2019-05-02 01:30:45.169 UTC [msp.identity] Sign -> DEBU 94c Sign: plaintext: 0A020801120B0A090A03010203100418...4130F9282653BA422E72B1296461086E " -"2019-05-02 01:30:45.169 UTC [msp.identity] Sign -> DEBU 94d Sign: digest: 55A33B1FD2A405943E06CE6DBCCA10DFBAC94E9C621E409964FC262923739AC7 " -"2019-05-02 01:30:45.172 UTC [fsblkstorage] indexBlock -> DEBU 94e Indexing block [blockNum=1, blockHash=[]byte{0xff, 0x3a, 0xf4, 0xf2, 0x7d, 0x57, 0xed, 0xa3, 0xbb, 0xd3, 0xc3, 0x89, 0xf0, 0x76, 0xc5, 0xde, 0x51, 0x48, 0x5f, 0xa5, 0xe0, 0xf9, 0x5f, 0xe5, 0xee, 0x96, 0x4e, 0xe6, 0xcd, 0x8c, 0x8d, 0x72} txOffsets= -txId= locPointer=offset=71, bytesLength=22678 +"2019-05-02 09:27:19.640 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8d5 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:19.640 UTC [msp] Validate -> DEBU 8d6 MSP Org2MSP validating identity" +"2019-05-02 09:27:19.640 UTC [msp] getCertificationChain -> DEBU 8d7 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:19.641 UTC [msp] hasOURole -> DEBU 8d8 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:19.641 UTC [msp] getCertificationChain -> DEBU 8d9 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:19.641 UTC [common.channelconfig] NewStandardValues -> DEBU 8da Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:19.641 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8db Processing field: ConsensusType" +"2019-05-02 09:27:19.641 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dc Processing field: BatchSize" +"2019-05-02 09:27:19.641 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dd Processing field: BatchTimeout" +"2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8de Processing field: KafkaBrokers" +"2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8df Processing field: ChannelRestrictions" +"2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e0 Processing field: Capabilities" +"2019-05-02 09:27:19.642 UTC [common.channelconfig] NewStandardValues -> DEBU 8e1 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:19.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e2 Processing field: Endpoints" +"2019-05-02 09:27:19.643 UTC [common.channelconfig] NewStandardValues -> DEBU 8e3 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:19.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e4 Processing field: MSP" +"2019-05-02 09:27:19.643 UTC [common.channelconfig] validateMSP -> DEBU 8e5 Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:19.643 UTC [msp] newBccspMsp -> DEBU 8e6 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:19.643 UTC [msp] New -> DEBU 8e7 Creating Cache-MSP instance" +"2019-05-02 09:27:19.644 UTC [msp] Setup -> DEBU 8e8 Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:19.644 UTC [msp.identity] newIdentity -> DEBU 8e9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-05-02 09:27:19.645 UTC [msp.identity] newIdentity -> DEBU 8ea Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:19.646 UTC [msp] Validate -> DEBU 8eb MSP OrdererMSP validating identity" +"2019-05-02 09:27:19.646 UTC [msp] Setup -> DEBU 8ec Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:19.646 UTC [msp] Setup -> DEBU 8ed MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:19.646 UTC [policies] NewManagerImpl -> DEBU 8ee Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8ef Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f0 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f1 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f2 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:19.647 UTC [policies] NewManagerImpl -> DEBU 8f3 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:19.648 UTC [policies] NewManagerImpl -> DEBU 8f4 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:19.648 UTC [policies] NewManagerImpl -> DEBU 8f5 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:19.648 UTC [policies] NewManagerImpl -> DEBU 8f6 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:27:19.649 UTC [policies] NewManagerImpl -> DEBU 8f7 Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:27:19.649 UTC [policies] NewManagerImpl -> DEBU 8f8 Proposed new policy Readers for Channel/Application" +"2019-05-02 09:27:19.649 UTC [policies] NewManagerImpl -> DEBU 8f9 Proposed new policy Writers for Channel/Application" +"2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fa Proposed new policy Admins for Channel/Application" +"2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fb Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fc Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fd Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8fe Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:19.650 UTC [policies] NewManagerImpl -> DEBU 8ff Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 900 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 901 Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 902 Proposed new policy Writers for Channel" +"2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 903 Proposed new policy Admins for Channel" +"2019-05-02 09:27:19.651 UTC [policies] NewManagerImpl -> DEBU 904 Proposed new policy Readers for Channel" +"2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:19.652 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:19.653 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:19.654 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:19.654 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:19.655 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:19.655 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:19.655 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:19.656 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 917 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 918 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 919 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:19.657 UTC [common.configtx] addToMap -> DEBU 91a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91b Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:19.658 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:19.659 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:19.660 UTC [common.configtx] addToMap -> DEBU 925 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:19.660 UTC [common.configtx] addToMap -> DEBU 926 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:19.660 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92b Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:19.661 UTC [common.configtx] addToMap -> DEBU 92d Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 92e Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 92f Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 930 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:19.662 UTC [common.configtx] addToMap -> DEBU 931 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:19.662 UTC [common.channelconfig] LogSanityChecks -> DEBU 932 As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 933 As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 934 Manager Channel looking up path [Application]" +"2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 935 Manager Channel has managers Application" +"2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 936 Manager Channel has managers Orderer" +"2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 937 Manager Channel/Application looking up path []" +"2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 938 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 939 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 93a As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 93b As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:27:19.663 UTC [common.channelconfig] LogSanityChecks -> DEBU 93c As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 93d Manager Channel looking up path [Orderer]" +"2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 93e Manager Channel has managers Application" +"2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 93f Manager Channel has managers Orderer" +"2019-05-02 09:27:19.663 UTC [policies] Manager -> DEBU 940 Manager Channel/Orderer looking up path []" +"2019-05-02 09:27:19.664 UTC [policies] Manager -> DEBU 941 Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:27:19.664 UTC [common.channelconfig] LogSanityChecks -> DEBU 942 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:27:19.664 UTC [common.capabilities] Supported -> DEBU 943 Orderer capability V2_0 is supported and is enabled" +"2019-05-02 09:27:19.664 UTC [common.capabilities] Supported -> DEBU 944 Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:19.664 UTC [orderer.common.server] func1 -> DEBU 945 Executing callback to update root CAs" +"2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 946 updating root CAs for channel [businesschannel]" +"2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 947 adding app root CAs for MSP [Org1MSP]" +"2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 948 adding app root CAs for MSP [Org2MSP]" +"2019-05-02 09:27:19.664 UTC [orderer.common.server] updateTrustedRoots -> DEBU 949 adding orderer root CAs for MSP [OrdererMSP]" +"2019-05-02 09:27:19.664 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 94a [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +"2019-05-02 09:27:19.664 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 94b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +"2019-05-02 09:27:19.664 UTC [msp.identity] Sign -> DEBU 94c Sign: plaintext: 0A020801120B0A090A03010203100418...683F1999831A1C0CDF0D984CFEC05FF5 " +"2019-05-02 09:27:19.664 UTC [msp.identity] Sign -> DEBU 94d Sign: digest: 344DC25EA27E63D9B62219B26D45D3F996010DBE9F55CAC16F8C5001BA77DBAC " +"2019-05-02 09:27:19.667 UTC [fsblkstorage] indexBlock -> DEBU 94e Indexing block [blockNum=1, blockHash=[]byte{0x3d, 0xc8, 0x17, 0xef, 0x7d, 0xc5, 0xdd, 0xc, 0x94, 0x3f, 0xe9, 0xfc, 0x37, 0xb1, 0xef, 0xbb, 0xc6, 0x3e, 0x6a, 0xed, 0x5c, 0x37, 0xe9, 0x5f, 0x75, 0xea, 0xfa, 0x1d, 0xbf, 0x69, 0x5, 0x4a} txOffsets= +txId= locPointer=offset=71, bytesLength=22679 ]" -"2019-05-02 01:30:45.175 UTC [fsblkstorage] updateCheckpoint -> DEBU 94f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47626], isChainEmpty=[false], lastBlockNumber=[1]" -"2019-05-02 01:30:45.175 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 950 [channel: businesschannel] Wrote block [1]" -"2019-05-02 01:30:45.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 951 Sending msg of 28 bytes to 2 on channel businesschannel took 31.3µs" -"2019-05-02 01:30:45.577 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 952 Sending msg of 28 bytes to 3 on channel businesschannel took 23.5µs" -"2019-05-02 01:30:45.578 UTC [orderer.common.cluster.step] sendMessage -> DEBU 953 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.7µs " -"2019-05-02 01:30:45.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 954 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:45.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 955 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" -"2019-05-02 01:30:45.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU 956 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 202.8µs " -"2019-05-02 01:30:45.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU 957 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:45.582 UTC [orderer.common.cluster.step] sendMessage -> DEBU 958 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.4113ms " -"2019-05-02 01:30:45.584 UTC [orderer.common.cluster.step] handleMessage -> DEBU 959 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:46.078 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95a Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" -"2019-05-02 01:30:46.078 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95b Sending msg of 28 bytes to 3 on channel businesschannel took 87.5µs" -"2019-05-02 01:30:46.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.2µs " -"2019-05-02 01:30:46.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 642.1µs " -"2019-05-02 01:30:46.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:46.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:46.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 960 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:46.084 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 961 Sending msg of 28 bytes to 3 on channel testchainid took 10.1µs" -"2019-05-02 01:30:46.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU 962 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.7µs " -"2019-05-02 01:30:46.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 963 Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" -"2019-05-02 01:30:46.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 964 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 508.6µs " -"2019-05-02 01:30:46.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 966 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.2µs " -"2019-05-02 01:30:46.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 965 Sending msg of 28 bytes to 3 on channel businesschannel took 30.4µs" -"2019-05-02 01:30:46.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 967 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:46.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU 968 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:46.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU 969 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:46.583 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96a Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" -"2019-05-02 01:30:46.583 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 329.8µs " -"2019-05-02 01:30:47.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96c Sending msg of 28 bytes to 3 on channel businesschannel took 21.3µs" -"2019-05-02 01:30:47.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96d Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" -"2019-05-02 01:30:47.075 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.8µs " -"2019-05-02 01:30:47.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 253.6µs " -"2019-05-02 01:30:47.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 970 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:47.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 971 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:47.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 972 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:47.082 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 973 Sending msg of 28 bytes to 3 on channel testchainid took 19.8µs" -"2019-05-02 01:30:47.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU 974 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 632.9µs " -"2019-05-02 01:30:47.242 UTC [orderer.common.server] Deliver -> DEBU 975 Starting new Deliver handler" -"2019-05-02 01:30:47.242 UTC [common.deliver] Handle -> DEBU 976 Starting new deliver loop for 192.168.240.9:47316" -"2019-05-02 01:30:47.243 UTC [common.deliver] Handle -> DEBU 977 Attempting to read seek info message from 192.168.240.9:47316" -"2019-05-02 01:30:47.256 UTC [orderer.common.server] Broadcast -> DEBU 978 Starting new Broadcast handler" -"2019-05-02 01:30:47.256 UTC [orderer.common.broadcast] Handle -> DEBU 979 Starting new broadcast loop for 192.168.240.9:47318" -"2019-05-02 01:30:47.257 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 97a [channel: businesschannel] Broadcast is processing config update message from 192.168.240.9:47318" -"2019-05-02 01:30:47.257 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 97b Processing config update message for channel businesschannel" -"2019-05-02 01:30:47.258 UTC [policies] Evaluate -> DEBU 97c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:30:47.258 UTC [policies] Evaluate -> DEBU 97d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.258 UTC [policies] Evaluate -> DEBU 97e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-05-02 01:30:47.259 UTC [policies] Evaluate -> DEBU 97f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.259 UTC [policies] Evaluate -> DEBU 980 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:30:47.259 UTC [msp] DeserializeIdentity -> DEBU 981 Obtaining identity" -"2019-05-02 01:30:47.260 UTC [msp.identity] newIdentity -> DEBU 982 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:19.670 UTC [fsblkstorage] updateCheckpoint -> DEBU 94f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47625], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-05-02 09:27:19.670 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 950 [channel: businesschannel] Wrote block [1]" +"2019-05-02 09:27:19.716 UTC [orderer.common.cluster.step] handleMessage -> DEBU 951 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:19.717 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 952 Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +"2019-05-02 09:27:19.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU 953 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180µs " +"2019-05-02 09:27:19.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 954 Sending msg of 28 bytes to 2 on channel businesschannel took 53.6µs" +"2019-05-02 09:27:19.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 955 Sending msg of 28 bytes to 3 on channel businesschannel took 62.9µs" +"2019-05-02 09:27:19.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 956 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.3µs " +"2019-05-02 09:27:19.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 957 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.4µs " +"2019-05-02 09:27:19.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 958 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:19.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 959 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:20.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:20.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95b Sending msg of 28 bytes to 3 on channel testchainid took 167.1µs" +"2019-05-02 09:27:20.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 323.4µs " +"2019-05-02 09:27:20.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95d Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs" +"2019-05-02 09:27:20.491 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95e Sending msg of 28 bytes to 3 on channel businesschannel took 42.4µs" +"2019-05-02 09:27:20.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.1µs " +"2019-05-02 09:27:20.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 960 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.9664ms " +"2019-05-02 09:27:20.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU 961 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:20.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU 962 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:20.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 963 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:20.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 964 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +"2019-05-02 09:27:20.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 965 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +"2019-05-02 09:27:20.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 966 Sending msg of 28 bytes to 2 on channel businesschannel took 383.9µs" +"2019-05-02 09:27:20.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 968 Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +"2019-05-02 09:27:20.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 967 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.3µs " +"2019-05-02 09:27:20.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 969 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 476.7µs " +"2019-05-02 09:27:20.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:20.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:21.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:21.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96d Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +"2019-05-02 09:27:21.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 429.5µs " +"2019-05-02 09:27:21.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96f Sending msg of 28 bytes to 2 on channel businesschannel took 38.5µs" +"2019-05-02 09:27:21.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 970 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 578.8µs " +"2019-05-02 09:27:21.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 971 Sending msg of 28 bytes to 3 on channel businesschannel took 33.6µs" +"2019-05-02 09:27:21.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 972 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.6µs " +"2019-05-02 09:27:21.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 973 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:21.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 974 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:21.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 975 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:21.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 976 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2019-05-02 09:27:21.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU 977 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 251.5µs " +"2019-05-02 09:27:21.737 UTC [orderer.common.server] Deliver -> DEBU 978 Starting new Deliver handler" +"2019-05-02 09:27:21.738 UTC [common.deliver] Handle -> DEBU 979 Starting new deliver loop for 172.18.0.8:57182" +"2019-05-02 09:27:21.739 UTC [common.deliver] Handle -> DEBU 97a Attempting to read seek info message from 172.18.0.8:57182" +"2019-05-02 09:27:21.754 UTC [orderer.common.server] Broadcast -> DEBU 97b Starting new Broadcast handler" +"2019-05-02 09:27:21.755 UTC [orderer.common.broadcast] Handle -> DEBU 97c Starting new broadcast loop for 172.18.0.8:57184" +"2019-05-02 09:27:21.755 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 97d [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57184" +"2019-05-02 09:27:21.756 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 97e Processing config update message for channel businesschannel" +"2019-05-02 09:27:21.756 UTC [policies] Evaluate -> DEBU 97f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:21.757 UTC [policies] Evaluate -> DEBU 980 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:21.757 UTC [policies] Evaluate -> DEBU 981 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:21.758 UTC [policies] Evaluate -> DEBU 982 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:21.758 UTC [policies] Evaluate -> DEBU 983 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-05-02 09:27:21.759 UTC [msp] DeserializeIdentity -> DEBU 984 Obtaining identity" +"2019-05-02 09:27:21.759 UTC [msp.identity] newIdentity -> DEBU 985 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3746,174 +3749,117 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.261 UTC [cauthdsl] func1 -> DEBU 983 0xc00107c9d0 gate 1556760647261516500 evaluation starts" -"2019-05-02 01:30:47.261 UTC [cauthdsl] func2 -> DEBU 984 0xc00107c9d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.261 UTC [cauthdsl] func2 -> DEBU 985 0xc00107c9d0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.261 UTC [cauthdsl] func2 -> DEBU 986 0xc00107c9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -"2019-05-02 01:30:47.262 UTC [cauthdsl] func2 -> DEBU 987 0xc00107c9d0 principal evaluation fails" -"2019-05-02 01:30:47.262 UTC [cauthdsl] func1 -> DEBU 988 0xc00107c9d0 gate 1556760647261516500 evaluation fails" -"2019-05-02 01:30:47.262 UTC [policies] Evaluate -> DEBU 989 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:47.262 UTC [policies] Evaluate -> DEBU 98a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:47.263 UTC [policies] func1 -> DEBU 98b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -"2019-05-02 01:30:47.264 UTC [policies] Evaluate -> DEBU 98c Signature set did not satisfy policy /Channel/Orderer/Writers" -"2019-05-02 01:30:47.264 UTC [policies] Evaluate -> DEBU 98d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-05-02 01:30:47.264 UTC [policies] Evaluate -> DEBU 98e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:30:47.264 UTC [policies] Evaluate -> DEBU 98f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.264 UTC [policies] Evaluate -> DEBU 990 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:30:47.265 UTC [cauthdsl] func1 -> DEBU 991 0xc0010a6000 gate 1556760647265136700 evaluation starts" -"2019-05-02 01:30:47.265 UTC [cauthdsl] func2 -> DEBU 992 0xc0010a6000 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.265 UTC [cauthdsl] func2 -> DEBU 993 0xc0010a6000 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.265 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 994 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:30:47.265 UTC [msp] Validate -> DEBU 995 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.266 UTC [msp] getCertificationChain -> DEBU 996 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.267 UTC [cauthdsl] func2 -> DEBU 997 0xc0010a6000 principal matched by identity 0" -"2019-05-02 01:30:47.267 UTC [msp.identity] Verify -> DEBU 998 Verify: digest = 00000000 fa 56 9b 68 0f f0 0b 27 52 f9 72 03 bb d9 e7 c8 |.V.h...'R.r.....| -00000010 67 25 c1 32 45 5e d9 2e 10 06 48 e5 76 5f 4f 2f |g%.2E^....H.v_O/|" -"2019-05-02 01:30:47.268 UTC [msp.identity] Verify -> DEBU 999 Verify: sig = 00000000 30 44 02 20 13 91 18 f3 9c f5 ab d2 e9 cf 79 8f |0D. ..........y.| -00000010 50 f6 c1 24 7b 7c 6c 1c dc c5 c9 49 67 8d 2c 64 |P..${|l....Ig.,d| -00000020 4c f3 74 d1 02 20 3e 71 3d e9 4b 2a 4e e1 bd 4b |L.t.. >q=.K*N..K| -00000030 ea 4d 36 20 93 f7 6d 92 a4 d7 4d 7d 9f 14 aa 08 |.M6 ..m...M}....| -00000040 b8 78 3f fe 75 91 |.x?.u.|" -"2019-05-02 01:30:47.268 UTC [cauthdsl] func2 -> DEBU 99a 0xc0010a6000 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.269 UTC [cauthdsl] func1 -> DEBU 99b 0xc0010a6000 gate 1556760647265136700 evaluation succeeds" -"2019-05-02 01:30:47.269 UTC [policies] Evaluate -> DEBU 99c Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.269 UTC [policies] Evaluate -> DEBU 99d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.270 UTC [policies] Evaluate -> DEBU 99e Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:30:47.270 UTC [policies] Evaluate -> DEBU 99f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:30:47.271 UTC [policies] Evaluate -> DEBU 9a0 Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:30:47.271 UTC [policies] Evaluate -> DEBU 9a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:30:47.272 UTC [common.configtx] addToMap -> DEBU 9a2 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:47.272 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:47.273 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.273 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:47.274 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:47.274 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.274 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.274 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.275 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Group] /Channel" -"2019-05-02 01:30:47.275 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:47.275 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.276 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:47.276 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:30:47.276 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:47.276 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.277 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.277 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.277 UTC [common.configtx] verifyDeltaSet -> DEBU 9b3 Processing change to key: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.278 UTC [common.configtx] policyForItem -> DEBU 9b4 Getting policy for item Org2MSP with mod_policy Admins" -"2019-05-02 01:30:47.278 UTC [policies] Manager -> DEBU 9b5 Manager Channel looking up path [Application]" -"2019-05-02 01:30:47.278 UTC [policies] Manager -> DEBU 9b6 Manager Channel has managers Orderer" -"2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9b7 Manager Channel has managers Application" -"2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9b8 Manager Channel/Application looking up path []" -"2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9b9 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9ba Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9bb Manager Channel/Application looking up path [Org2MSP]" -"2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9bc Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9bd Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:47.279 UTC [policies] Manager -> DEBU 9be Manager Channel/Application/Org2MSP looking up path []" -"2019-05-02 01:30:47.279 UTC [policies] Evaluate -> DEBU 9bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-05-02 01:30:47.279 UTC [cauthdsl] func1 -> DEBU 9c0 0xc0010b0f80 gate 1556760647279433600 evaluation starts" -"2019-05-02 01:30:47.279 UTC [cauthdsl] func2 -> DEBU 9c1 0xc0010b0f80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.279 UTC [cauthdsl] func2 -> DEBU 9c2 0xc0010b0f80 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.279 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9c3 Checking if identity satisfies ADMIN role for Org2MSP" -"2019-05-02 01:30:47.279 UTC [cauthdsl] func2 -> DEBU 9c4 0xc0010b0f80 principal matched by identity 0" -"2019-05-02 01:30:47.279 UTC [msp.identity] Verify -> DEBU 9c5 Verify: digest = 00000000 94 91 3a 9b 42 3e cb f7 04 35 a7 fe 6e 63 d5 7c |..:.B>...5..nc.|| -00000010 7c 24 53 70 15 d2 b1 1a 57 a8 f8 c6 bb 05 dc 1f ||$Sp....W.......|" -"2019-05-02 01:30:47.279 UTC [msp.identity] Verify -> DEBU 9c6 Verify: sig = 00000000 30 44 02 20 2a 4c 37 99 83 06 3b 26 bc cd 68 87 |0D. *L7...;&..h.| -00000010 b4 dc 8d 15 40 47 d5 be ff cd 6a b3 4e fb 5a 82 |....@G....j.N.Z.| -00000020 06 7e 76 b6 02 20 04 f7 43 d0 0a f5 49 8b 53 76 |.~v.. ..C...I.Sv| -00000030 e9 cd a4 0c 01 31 38 3b 3f 69 a2 6e 25 1c d8 26 |.....18;?i.n%..&| -00000040 b9 56 9b 7e 5e 90 |.V.~^.|" -"2019-05-02 01:30:47.279 UTC [cauthdsl] func2 -> DEBU 9c7 0xc0010b0f80 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.279 UTC [cauthdsl] func1 -> DEBU 9c8 0xc0010b0f80 gate 1556760647279433600 evaluation succeeds" -"2019-05-02 01:30:47.280 UTC [policies] Evaluate -> DEBU 9c9 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.280 UTC [policies] Evaluate -> DEBU 9ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.280 UTC [common.configtx] verifyDeltaSet -> DEBU 9cb Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9cc Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9cd Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9ce Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9cf Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d0 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d1 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d2 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d3 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d5 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d6 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d7 Setting policy for key Endorsement to " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d8 Setting policy for key Readers to " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9d9 Setting policy for key Writers to " -"2019-05-02 01:30:47.280 UTC [common.configtx] recurseConfigMap -> DEBU 9da Setting policy for key Admins to " -"2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9db Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9dc Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9dd Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9de Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9df Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9e0 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9e1 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.281 UTC [common.configtx] recurseConfigMap -> DEBU 9e2 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.281 UTC [common.channelconfig] NewStandardValues -> DEBU 9e3 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e4 Processing field: HashingAlgorithm" -"2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e5 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e6 Processing field: OrdererAddresses" -"2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e7 Processing field: Consortium" -"2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e8 Processing field: Capabilities" -"2019-05-02 01:30:47.281 UTC [common.channelconfig] NewStandardValues -> DEBU 9e9 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ea Processing field: ConsensusType" -"2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9eb Processing field: BatchSize" -"2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ec Processing field: BatchTimeout" -"2019-05-02 01:30:47.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ed Processing field: KafkaBrokers" -"2019-05-02 01:30:47.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ee Processing field: ChannelRestrictions" -"2019-05-02 01:30:47.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ef Processing field: Capabilities" -"2019-05-02 01:30:47.283 UTC [common.channelconfig] NewStandardValues -> DEBU 9f0 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:47.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f1 Processing field: Endpoints" -"2019-05-02 01:30:47.284 UTC [common.channelconfig] NewStandardValues -> DEBU 9f2 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f3 Processing field: MSP" -"2019-05-02 01:30:47.285 UTC [common.channelconfig] validateMSP -> DEBU 9f4 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:47.285 UTC [msp] newBccspMsp -> DEBU 9f5 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.285 UTC [msp] New -> DEBU 9f6 Creating Cache-MSP instance" -"2019-05-02 01:30:47.286 UTC [msp] Setup -> DEBU 9f7 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:47.286 UTC [msp.identity] newIdentity -> DEBU 9f8 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-05-02 01:30:47.287 UTC [msp.identity] newIdentity -> DEBU 9f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-05-02 01:30:47.288 UTC [msp] Validate -> DEBU 9fa MSP OrdererMSP validating identity" -"2019-05-02 01:30:47.289 UTC [common.channelconfig] NewStandardValues -> DEBU 9fb Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:47.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9fc Processing field: ACLs" -"2019-05-02 01:30:47.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9fd Processing field: Capabilities" -"2019-05-02 01:30:47.289 UTC [common.channelconfig] NewStandardValues -> DEBU 9fe Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:47.290 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ff Processing field: AnchorPeers" -"2019-05-02 01:30:47.290 UTC [common.channelconfig] NewStandardValues -> DEBU a00 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.290 UTC [common.channelconfig] initializeProtosStruct -> DEBU a01 Processing field: MSP" -"2019-05-02 01:30:47.290 UTC [common.channelconfig] Validate -> DEBU a02 Anchor peers for org Org1MSP are anchor_peers: " -"2019-05-02 01:30:47.290 UTC [common.channelconfig] validateMSP -> DEBU a03 Setting up MSP for org Org1MSP" -"2019-05-02 01:30:47.291 UTC [msp] newBccspMsp -> DEBU a04 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.291 UTC [msp] New -> DEBU a05 Creating Cache-MSP instance" -"2019-05-02 01:30:47.291 UTC [msp] Setup -> DEBU a06 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:47.291 UTC [msp.identity] newIdentity -> DEBU a07 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.761 UTC [cauthdsl] func1 -> DEBU 986 0xc000970f30 gate 1556789241761270700 evaluation starts" +"2019-05-02 09:27:21.761 UTC [cauthdsl] func2 -> DEBU 987 0xc000970f30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:21.762 UTC [cauthdsl] func2 -> DEBU 988 0xc000970f30 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:21.762 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 989 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-05-02 09:27:21.762 UTC [msp] Validate -> DEBU 98a MSP Org2MSP validating identity" +"2019-05-02 09:27:21.763 UTC [msp] getCertificationChain -> DEBU 98b MSP Org2MSP getting certification chain" +"2019-05-02 09:27:21.764 UTC [cauthdsl] func2 -> DEBU 98c 0xc000970f30 principal matched by identity 0" +"2019-05-02 09:27:21.765 UTC [msp.identity] Verify -> DEBU 98d Verify: digest = 00000000 e4 18 59 98 0d 3b a7 30 be cc 46 08 ec 74 fd f2 |..Y..;.0..F..t..| +00000010 89 8b c4 f0 ec d1 42 e7 29 be db 21 86 0a 03 30 |......B.)..!...0|" +"2019-05-02 09:27:21.765 UTC [msp.identity] Verify -> DEBU 98e Verify: sig = 00000000 30 45 02 21 00 d3 77 a5 76 87 7d ad 38 c8 e3 87 |0E.!..w.v.}.8...| +00000010 ac b0 f9 03 ba af b9 cc 72 47 5e 58 24 aa 04 4c |........rG^X$..L| +00000020 2e e6 c9 13 03 02 20 16 a7 9b 44 cc 32 92 1d a7 |...... ...D.2...| +00000030 93 3c ca cf 44 03 c3 03 99 d4 ff 75 03 df c0 51 |.<..D......u...Q| +00000040 9a 6f 3e fa e0 10 c9 |.o>....|" +"2019-05-02 09:27:21.766 UTC [cauthdsl] func2 -> DEBU 98f 0xc000970f30 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:21.766 UTC [cauthdsl] func1 -> DEBU 990 0xc000970f30 gate 1556789241761270700 evaluation succeeds" +"2019-05-02 09:27:21.766 UTC [policies] Evaluate -> DEBU 991 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:21.767 UTC [policies] Evaluate -> DEBU 992 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:21.767 UTC [policies] Evaluate -> DEBU 993 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:21.767 UTC [policies] Evaluate -> DEBU 994 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:21.768 UTC [policies] Evaluate -> DEBU 995 Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:21.768 UTC [policies] Evaluate -> DEBU 996 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:21.769 UTC [common.configtx] addToMap -> DEBU 997 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:21.769 UTC [common.configtx] addToMap -> DEBU 998 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:21.769 UTC [common.configtx] addToMap -> DEBU 999 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:21.770 UTC [common.configtx] addToMap -> DEBU 99a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:21.770 UTC [common.configtx] addToMap -> DEBU 99b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:21.770 UTC [common.configtx] addToMap -> DEBU 99c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:21.771 UTC [common.configtx] addToMap -> DEBU 99d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:21.771 UTC [common.configtx] addToMap -> DEBU 99e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:21.771 UTC [common.configtx] addToMap -> DEBU 99f Adding to config map: [Group] /Channel" +"2019-05-02 09:27:21.772 UTC [common.configtx] addToMap -> DEBU 9a0 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:21.772 UTC [common.configtx] addToMap -> DEBU 9a1 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:21.772 UTC [common.configtx] addToMap -> DEBU 9a2 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:27:21.773 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:21.773 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:21.773 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:21.774 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:21.774 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:21.775 UTC [common.configtx] verifyDeltaSet -> DEBU 9a8 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:21.775 UTC [common.configtx] policyForItem -> DEBU 9a9 Getting policy for item Org2MSP with mod_policy Admins" +"2019-05-02 09:27:21.776 UTC [policies] Manager -> DEBU 9aa Manager Channel looking up path [Application]" +"2019-05-02 09:27:21.776 UTC [policies] Manager -> DEBU 9ab Manager Channel has managers Application" +"2019-05-02 09:27:21.776 UTC [policies] Manager -> DEBU 9ac Manager Channel has managers Orderer" +"2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9ad Manager Channel/Application looking up path []" +"2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9ae Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9af Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b0 Manager Channel/Application looking up path [Org2MSP]" +"2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b1 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b2 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:21.777 UTC [policies] Manager -> DEBU 9b3 Manager Channel/Application/Org2MSP looking up path []" +"2019-05-02 09:27:21.777 UTC [policies] Evaluate -> DEBU 9b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-05-02 09:27:21.777 UTC [cauthdsl] func1 -> DEBU 9b5 0xc000cd87d0 gate 1556789241777974000 evaluation starts" +"2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9b6 0xc000cd87d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9b7 0xc000cd87d0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:21.778 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9b8 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9b9 0xc000cd87d0 principal matched by identity 0" +"2019-05-02 09:27:21.778 UTC [msp.identity] Verify -> DEBU 9ba Verify: digest = 00000000 30 66 a6 63 f0 f2 5c 8b cc 30 97 57 cc 96 e6 ed |0f.c..\..0.W....| +00000010 ee 9d 29 cb 9e b5 de 97 29 52 7a 5e 61 16 79 e8 |..).....)Rz^a.y.|" +"2019-05-02 09:27:21.778 UTC [msp.identity] Verify -> DEBU 9bb Verify: sig = 00000000 30 45 02 21 00 a7 41 a5 d2 f7 c5 ff ec 5e 7f 6c |0E.!..A......^.l| +00000010 71 c9 ae 59 aa ec 85 dd 94 0c 54 cf 58 8b 8e 8c |q..Y......T.X...| +00000020 3a b9 3d 56 43 02 20 01 e7 16 fb f9 76 cf ae de |:.=VC. .....v...| +00000030 49 88 9b 17 52 e6 8f c3 fa dc 64 50 b3 87 99 97 |I...R.....dP....| +00000040 11 08 49 2b 8c 95 fc |..I+...|" +"2019-05-02 09:27:21.778 UTC [cauthdsl] func2 -> DEBU 9bc 0xc000cd87d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:21.778 UTC [cauthdsl] func1 -> DEBU 9bd 0xc000cd87d0 gate 1556789241777974000 evaluation succeeds" +"2019-05-02 09:27:21.778 UTC [policies] Evaluate -> DEBU 9be Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:21.778 UTC [policies] Evaluate -> DEBU 9bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:21.778 UTC [common.configtx] verifyDeltaSet -> DEBU 9c0 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c4 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c5 Setting policy for key Admins to " +"2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c6 Setting policy for key Endorsement to " +"2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c7 Setting policy for key Readers to " +"2019-05-02 09:27:21.778 UTC [common.configtx] recurseConfigMap -> DEBU 9c8 Setting policy for key Writers to " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9c9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9ca Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cb Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cc Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cd Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9ce Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9cf Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d1 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d3 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d6 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.configtx] recurseConfigMap -> DEBU 9d7 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.779 UTC [common.channelconfig] NewStandardValues -> DEBU 9d8 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d9 Processing field: HashingAlgorithm" +"2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9da Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9db Processing field: OrdererAddresses" +"2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9dc Processing field: Consortium" +"2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9dd Processing field: Capabilities" +"2019-05-02 09:27:21.779 UTC [common.channelconfig] NewStandardValues -> DEBU 9de Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:21.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9df Processing field: ACLs" +"2019-05-02 09:27:21.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e0 Processing field: Capabilities" +"2019-05-02 09:27:21.780 UTC [common.channelconfig] NewStandardValues -> DEBU 9e1 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:21.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e2 Processing field: AnchorPeers" +"2019-05-02 09:27:21.780 UTC [common.channelconfig] NewStandardValues -> DEBU 9e3 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:21.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e4 Processing field: MSP" +"2019-05-02 09:27:21.780 UTC [common.channelconfig] Validate -> DEBU 9e5 Anchor peers for org Org1MSP are anchor_peers: " +"2019-05-02 09:27:21.780 UTC [common.channelconfig] validateMSP -> DEBU 9e6 Setting up MSP for org Org1MSP" +"2019-05-02 09:27:21.780 UTC [msp] newBccspMsp -> DEBU 9e7 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:21.780 UTC [msp] New -> DEBU 9e8 Creating Cache-MSP instance" +"2019-05-02 09:27:21.780 UTC [msp] Setup -> DEBU 9e9 Setting up MSP instance Org1MSP" +"2019-05-02 09:27:21.780 UTC [msp.identity] newIdentity -> DEBU 9ea Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3928,7 +3874,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:47.292 UTC [msp.identity] newIdentity -> DEBU a08 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.780 UTC [msp.identity] newIdentity -> DEBU 9eb Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3942,21 +3888,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.293 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a09 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:47.293 UTC [msp] Validate -> DEBU a0a MSP Org1MSP validating identity" -"2019-05-02 01:30:47.294 UTC [msp] getCertificationChain -> DEBU a0b MSP Org1MSP getting certification chain" -"2019-05-02 01:30:47.294 UTC [msp] hasOURole -> DEBU a0c MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:47.295 UTC [msp] getCertificationChain -> DEBU a0d MSP Org1MSP getting certification chain" -"2019-05-02 01:30:47.295 UTC [common.channelconfig] NewStandardValues -> DEBU a0e Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:47.295 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0f Processing field: AnchorPeers" -"2019-05-02 01:30:47.296 UTC [common.channelconfig] NewStandardValues -> DEBU a10 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.296 UTC [common.channelconfig] initializeProtosStruct -> DEBU a11 Processing field: MSP" -"2019-05-02 01:30:47.296 UTC [common.channelconfig] Validate -> DEBU a12 Anchor peers for org Org2MSP are anchor_peers: " -"2019-05-02 01:30:47.296 UTC [common.channelconfig] validateMSP -> DEBU a13 Setting up MSP for org Org2MSP" -"2019-05-02 01:30:47.296 UTC [msp] newBccspMsp -> DEBU a14 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.297 UTC [msp] New -> DEBU a15 Creating Cache-MSP instance" -"2019-05-02 01:30:47.297 UTC [msp] Setup -> DEBU a16 Setting up MSP instance Org2MSP" -"2019-05-02 01:30:47.297 UTC [msp.identity] newIdentity -> DEBU a17 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.781 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9ec Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:21.784 UTC [msp] Validate -> DEBU 9ed MSP Org1MSP validating identity" +"2019-05-02 09:27:21.785 UTC [msp] getCertificationChain -> DEBU 9ee MSP Org1MSP getting certification chain" +"2019-05-02 09:27:21.785 UTC [msp] hasOURole -> DEBU 9ef MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:21.786 UTC [msp] getCertificationChain -> DEBU 9f0 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:21.787 UTC [common.channelconfig] NewStandardValues -> DEBU 9f1 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:21.787 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f2 Processing field: AnchorPeers" +"2019-05-02 09:27:21.787 UTC [common.channelconfig] NewStandardValues -> DEBU 9f3 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:21.788 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f4 Processing field: MSP" +"2019-05-02 09:27:21.788 UTC [common.channelconfig] Validate -> DEBU 9f5 Anchor peers for org Org2MSP are anchor_peers: " +"2019-05-02 09:27:21.788 UTC [common.channelconfig] validateMSP -> DEBU 9f6 Setting up MSP for org Org2MSP" +"2019-05-02 09:27:21.789 UTC [msp] newBccspMsp -> DEBU 9f7 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:21.789 UTC [msp] New -> DEBU 9f8 Creating Cache-MSP instance" +"2019-05-02 09:27:21.789 UTC [msp] Setup -> DEBU 9f9 Setting up MSP instance Org2MSP" +"2019-05-02 09:27:21.790 UTC [msp.identity] newIdentity -> DEBU 9fa Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3971,7 +3917,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.298 UTC [msp.identity] newIdentity -> DEBU a18 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.791 UTC [msp.identity] newIdentity -> DEBU 9fb Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3985,110 +3931,153 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.299 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a19 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:47.300 UTC [msp] Validate -> DEBU a1a MSP Org2MSP validating identity" -"2019-05-02 01:30:47.300 UTC [msp] getCertificationChain -> DEBU a1b MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.300 UTC [msp] hasOURole -> DEBU a1c MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:47.301 UTC [msp] getCertificationChain -> DEBU a1d MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.301 UTC [msp] Setup -> DEBU a1e Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:47.301 UTC [msp] Setup -> DEBU a1f MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:47.301 UTC [policies] NewManagerImpl -> DEBU a20 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a21 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a22 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a23 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a24 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a25 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.302 UTC [policies] NewManagerImpl -> DEBU a26 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.303 UTC [policies] NewManagerImpl -> DEBU a27 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.303 UTC [policies] NewManagerImpl -> DEBU a28 Proposed new policy Writers for Channel/Application" -"2019-05-02 01:30:47.303 UTC [policies] NewManagerImpl -> DEBU a29 Proposed new policy Admins for Channel/Application" -"2019-05-02 01:30:47.304 UTC [policies] NewManagerImpl -> DEBU a2a Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:30:47.304 UTC [policies] NewManagerImpl -> DEBU a2b Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:30:47.304 UTC [policies] NewManagerImpl -> DEBU a2c Proposed new policy Readers for Channel/Application" -"2019-05-02 01:30:47.304 UTC [policies] NewManagerImpl -> DEBU a2d Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.304 UTC [policies] NewManagerImpl -> DEBU a2e Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.305 UTC [policies] NewManagerImpl -> DEBU a2f Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.305 UTC [policies] NewManagerImpl -> DEBU a30 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:47.305 UTC [policies] NewManagerImpl -> DEBU a31 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:47.305 UTC [policies] NewManagerImpl -> DEBU a32 Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:47.305 UTC [policies] NewManagerImpl -> DEBU a33 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:47.306 UTC [policies] NewManagerImpl -> DEBU a34 Proposed new policy Admins for Channel" -"2019-05-02 01:30:47.306 UTC [policies] NewManagerImpl -> DEBU a35 Proposed new policy Readers for Channel" -"2019-05-02 01:30:47.306 UTC [policies] NewManagerImpl -> DEBU a36 Proposed new policy Writers for Channel" -"2019-05-02 01:30:47.306 UTC [common.configtx] addToMap -> DEBU a37 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:47.307 UTC [common.configtx] addToMap -> DEBU a38 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:47.307 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.307 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:47.307 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:47.308 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:47.308 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:47.308 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:47.308 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.309 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5a Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5b Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5c Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5d Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5e Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a5f Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a60 Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a61 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a62 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a63 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:47.310 UTC [common.configtx] addToMap -> DEBU a64 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:47.310 UTC [common.channelconfig] LogSanityChecks -> DEBU a65 As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:30:47.310 UTC [common.channelconfig] LogSanityChecks -> DEBU a66 As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a67 Manager Channel looking up path [Application]" -"2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a68 Manager Channel has managers Orderer" -"2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a69 Manager Channel has managers Application" -"2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a6a Manager Channel/Application looking up path []" -"2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a6b Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:47.310 UTC [policies] Manager -> DEBU a6c Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:47.310 UTC [common.channelconfig] LogSanityChecks -> DEBU a6d As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:30:47.311 UTC [common.channelconfig] LogSanityChecks -> DEBU a6e As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:30:47.311 UTC [common.channelconfig] LogSanityChecks -> DEBU a6f As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:30:47.311 UTC [policies] Manager -> DEBU a70 Manager Channel looking up path [Orderer]" -"2019-05-02 01:30:47.311 UTC [policies] Manager -> DEBU a71 Manager Channel has managers Application" -"2019-05-02 01:30:47.311 UTC [policies] Manager -> DEBU a72 Manager Channel has managers Orderer" -"2019-05-02 01:30:47.311 UTC [policies] Manager -> DEBU a73 Manager Channel/Orderer looking up path []" -"2019-05-02 01:30:47.311 UTC [policies] Manager -> DEBU a74 Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:30:47.311 UTC [common.channelconfig] LogSanityChecks -> DEBU a75 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:30:47.311 UTC [common.capabilities] Supported -> DEBU a76 Orderer capability V2_0 is supported and is enabled" -"2019-05-02 01:30:47.311 UTC [common.capabilities] Supported -> DEBU a77 Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:47.314 UTC [msp.identity] Sign -> DEBU a78 Sign: plaintext: 0AD2060A1B08011A0608C790A9E60522...6D92A4D74D7D9F14AA08B8783FFE7591 " -"2019-05-02 01:30:47.314 UTC [msp.identity] Sign -> DEBU a79 Sign: digest: 214FFB0B5FAB9AC46722086681B5B4CF2E2C23F48033E2A81F04B0583C4328F3 " -"2019-05-02 01:30:47.314 UTC [policies] Evaluate -> DEBU a7a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:30:47.315 UTC [policies] Evaluate -> DEBU a7b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.315 UTC [policies] Evaluate -> DEBU a7c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-05-02 01:30:47.315 UTC [policies] Evaluate -> DEBU a7d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.315 UTC [policies] Evaluate -> DEBU a7e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:30:47.315 UTC [msp] DeserializeIdentity -> DEBU a7f Obtaining identity" -"2019-05-02 01:30:47.315 UTC [msp.identity] newIdentity -> DEBU a80 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.792 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9fc Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:21.792 UTC [msp] Validate -> DEBU 9fd MSP Org2MSP validating identity" +"2019-05-02 09:27:21.793 UTC [msp] getCertificationChain -> DEBU 9fe MSP Org2MSP getting certification chain" +"2019-05-02 09:27:21.793 UTC [msp] hasOURole -> DEBU 9ff MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:21.793 UTC [msp] getCertificationChain -> DEBU a00 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:21.794 UTC [common.channelconfig] NewStandardValues -> DEBU a01 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:21.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU a02 Processing field: ConsensusType" +"2019-05-02 09:27:21.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU a03 Processing field: BatchSize" +"2019-05-02 09:27:21.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU a04 Processing field: BatchTimeout" +"2019-05-02 09:27:21.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU a05 Processing field: KafkaBrokers" +"2019-05-02 09:27:21.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU a06 Processing field: ChannelRestrictions" +"2019-05-02 09:27:21.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU a07 Processing field: Capabilities" +"2019-05-02 09:27:21.796 UTC [common.channelconfig] NewStandardValues -> DEBU a08 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:21.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU a09 Processing field: Endpoints" +"2019-05-02 09:27:21.797 UTC [common.channelconfig] NewStandardValues -> DEBU a0a Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:21.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0b Processing field: MSP" +"2019-05-02 09:27:21.797 UTC [common.channelconfig] validateMSP -> DEBU a0c Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:21.797 UTC [msp] newBccspMsp -> DEBU a0d Creating BCCSP-based MSP instance" +"2019-05-02 09:27:21.797 UTC [msp] New -> DEBU a0e Creating Cache-MSP instance" +"2019-05-02 09:27:21.798 UTC [msp] Setup -> DEBU a0f Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:21.798 UTC [msp.identity] newIdentity -> DEBU a10 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-05-02 09:27:21.798 UTC [msp.identity] newIdentity -> DEBU a11 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:21.799 UTC [msp] Validate -> DEBU a12 MSP OrdererMSP validating identity" +"2019-05-02 09:27:21.799 UTC [msp] Setup -> DEBU a13 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:21.799 UTC [msp] Setup -> DEBU a14 MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a15 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a16 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a17 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:21.800 UTC [policies] NewManagerImpl -> DEBU a18 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a19 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1a Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1b Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1c Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1d Proposed new policy Admins for Channel/Application" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1e Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a1f Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a20 Proposed new policy Readers for Channel/Application" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a21 Proposed new policy Writers for Channel/Application" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a22 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a23 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a24 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a25 Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a26 Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a27 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a28 Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a29 Proposed new policy Writers for Channel" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a2a Proposed new policy Admins for Channel" +"2019-05-02 09:27:21.801 UTC [policies] NewManagerImpl -> DEBU a2b Proposed new policy Readers for Channel" +"2019-05-02 09:27:21.801 UTC [common.configtx] addToMap -> DEBU a2c Adding to config map: [Group] /Channel" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a2d Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a2e Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a2f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a30 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a31 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a32 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a33 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a34 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a35 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a36 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a37 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a38 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:21.802 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:21.803 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:21.803 UTC [common.channelconfig] LogSanityChecks -> DEBU a5a As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:27:21.803 UTC [common.channelconfig] LogSanityChecks -> DEBU a5b As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5c Manager Channel looking up path [Application]" +"2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5d Manager Channel has managers Application" +"2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5e Manager Channel has managers Orderer" +"2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a5f Manager Channel/Application looking up path []" +"2019-05-02 09:27:21.803 UTC [policies] Manager -> DEBU a60 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a61 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a62 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a63 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a64 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a65 Manager Channel looking up path [Orderer]" +"2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a66 Manager Channel has managers Application" +"2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a67 Manager Channel has managers Orderer" +"2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a68 Manager Channel/Orderer looking up path []" +"2019-05-02 09:27:21.804 UTC [policies] Manager -> DEBU a69 Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:27:21.804 UTC [common.channelconfig] LogSanityChecks -> DEBU a6a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:27:21.804 UTC [common.capabilities] Supported -> DEBU a6b Orderer capability V2_0 is supported and is enabled" +"2019-05-02 09:27:21.804 UTC [common.capabilities] Supported -> DEBU a6c Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:21.804 UTC [msp.identity] Sign -> DEBU a6d Sign: plaintext: 0AD2060A1B08011A0608F9EFAAE60522...0399D4FF7503DFC0519A6F3EFAE010C9 " +"2019-05-02 09:27:21.804 UTC [msp.identity] Sign -> DEBU a6e Sign: digest: 28BE1EAFAC51AB90A5A66D7457C10ED8719A11DC4920A71DE7405F6DCC0EA568 " +"2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:21.804 UTC [policies] Evaluate -> DEBU a72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:21.805 UTC [policies] Evaluate -> DEBU a73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-05-02 09:27:21.806 UTC [msp] DeserializeIdentity -> DEBU a74 Obtaining identity" +"2019-05-02 09:27:21.807 UTC [msp.identity] newIdentity -> DEBU a75 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -4102,206 +4091,163 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.315 UTC [cauthdsl] func1 -> DEBU a81 0xc0011a4940 gate 1556760647315838700 evaluation starts" -"2019-05-02 01:30:47.315 UTC [cauthdsl] func2 -> DEBU a82 0xc0011a4940 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.315 UTC [cauthdsl] func2 -> DEBU a83 0xc0011a4940 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.316 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a84 Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-05-02 01:30:47.316 UTC [msp] Validate -> DEBU a85 MSP OrdererMSP validating identity" -"2019-05-02 01:30:47.316 UTC [cauthdsl] func2 -> DEBU a86 0xc0011a4940 principal matched by identity 0" -"2019-05-02 01:30:47.316 UTC [msp.identity] Verify -> DEBU a87 Verify: digest = 00000000 21 4f fb 0b 5f ab 9a c4 67 22 08 66 81 b5 b4 cf |!O.._...g".f....| -00000010 2e 2c 23 f4 80 33 e2 a8 1f 04 b0 58 3c 43 28 f3 |.,#..3.....X DEBU a88 Verify: sig = 00000000 30 45 02 21 00 86 fb 9c 76 cb 8b 44 af f4 0f 00 |0E.!....v..D....| -00000010 6e e3 d1 6b 41 41 f8 4f c3 17 a3 44 ca c9 5f 0a |n..kAA.O...D.._.| -00000020 81 7e ce 61 81 02 20 50 e7 08 a1 de af f0 a0 ab |.~.a.. P........| -00000030 8d 52 b4 19 b0 21 33 09 ea d4 9f ad 17 d6 94 e3 |.R...!3.........| -00000040 85 6c 7e 6e e3 72 97 |.l~n.r.|" -"2019-05-02 01:30:47.316 UTC [cauthdsl] func2 -> DEBU a89 0xc0011a4940 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.316 UTC [cauthdsl] func1 -> DEBU a8a 0xc0011a4940 gate 1556760647315838700 evaluation succeeds" -"2019-05-02 01:30:47.316 UTC [policies] Evaluate -> DEBU a8b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:47.316 UTC [policies] Evaluate -> DEBU a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:47.317 UTC [policies] Evaluate -> DEBU a8d Signature set satisfies policy /Channel/Orderer/Writers" -"2019-05-02 01:30:47.317 UTC [policies] Evaluate -> DEBU a8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-05-02 01:30:47.317 UTC [policies] Evaluate -> DEBU a8f Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:30:47.317 UTC [policies] Evaluate -> DEBU a90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:30:47.318 UTC [orderer.consensus.etcdraft] propose -> INFO a91 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-05-02 01:30:47.318 UTC [orderer.consensus.etcdraft] serveRequest -> INFO a92 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -"2019-05-02 01:30:47.320 UTC [orderer.consensus.etcdraft] 2 -> DEBU a93 Proposed block [2] to raft consensus" channel=businesschannel node=1 -"2019-05-02 01:30:47.323 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a94 Sending msg of 22865 bytes to 2 on channel businesschannel took 21.9µs" -"2019-05-02 01:30:47.324 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a95 Sending msg of 22865 bytes to 3 on channel businesschannel took 23.9µs" -"2019-05-02 01:30:47.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU a96 Send of ConsensusRequest for channel businesschannel with payload of size 22865 to orderer2.example.com(orderer2.example.com:7050) took 573.1µs " -"2019-05-02 01:30:47.319 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a97 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.240.9:47318" -"2019-05-02 01:30:47.325 UTC [orderer.common.cluster.step] sendMessage -> DEBU a98 Send of ConsensusRequest for channel businesschannel with payload of size 22865 to orderer1.example.com(orderer1.example.com:7050) took 106.8µs " -"2019-05-02 01:30:47.333 UTC [orderer.common.cluster.step] handleMessage -> DEBU a99 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:47.333 UTC [orderer.common.broadcast] Handle -> WARN a9b Error reading from 192.168.240.9:47318: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:47.333 UTC [orderer.common.server] func1 -> DEBU a9d Closing Broadcast stream" -"2019-05-02 01:30:47.333 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a9c Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" -"2019-05-02 01:30:47.334 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a9e Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" -"2019-05-02 01:30:47.334 UTC [grpc] infof -> DEBU aa0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.334 UTC [comm.grpc.server] 1 -> INFO a9f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47318 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=78.2588ms -"2019-05-02 01:30:47.333 UTC [orderer.common.cluster.step] handleMessage -> DEBU a9a Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:47.335 UTC [orderer.consensus.etcdraft] writeBlock -> INFO aa1 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 -"2019-05-02 01:30:47.335 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 301.5µs " -"2019-05-02 01:30:47.335 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.2µs " -"2019-05-02 01:30:47.336 UTC [common.configtx] addToMap -> DEBU aa4 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:47.336 UTC [common.configtx] addToMap -> DEBU aa5 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:47.336 UTC [common.configtx] addToMap -> DEBU aa6 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.338 UTC [common.configtx] addToMap -> DEBU aa7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:47.340 UTC [common.configtx] addToMap -> DEBU aa8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.341 UTC [common.configtx] addToMap -> DEBU aa9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:47.341 UTC [common.configtx] addToMap -> DEBU aaa Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.343 UTC [common.configtx] addToMap -> DEBU aab Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.344 UTC [common.configtx] addToMap -> DEBU aac Adding to config map: [Group] /Channel" -"2019-05-02 01:30:47.344 UTC [common.configtx] addToMap -> DEBU aad Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:47.345 UTC [common.configtx] addToMap -> DEBU aae Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.346 UTC [common.configtx] addToMap -> DEBU aaf Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:30:47.347 UTC [common.configtx] addToMap -> DEBU ab0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:47.347 UTC [common.configtx] addToMap -> DEBU ab1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:47.348 UTC [common.configtx] addToMap -> DEBU ab2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.348 UTC [common.configtx] addToMap -> DEBU ab3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.348 UTC [common.configtx] addToMap -> DEBU ab4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.349 UTC [common.configtx] verifyDeltaSet -> DEBU ab5 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:30:47.349 UTC [common.configtx] verifyDeltaSet -> DEBU ab6 Processing change to key: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.350 UTC [common.configtx] policyForItem -> DEBU ab7 Getting policy for item Org2MSP with mod_policy Admins" -"2019-05-02 01:30:47.350 UTC [policies] Manager -> DEBU ab8 Manager Channel looking up path [Application]" -"2019-05-02 01:30:47.351 UTC [policies] Manager -> DEBU ab9 Manager Channel has managers Orderer" -"2019-05-02 01:30:47.352 UTC [policies] Manager -> DEBU aba Manager Channel has managers Application" -"2019-05-02 01:30:47.352 UTC [policies] Manager -> DEBU abb Manager Channel/Application looking up path []" -"2019-05-02 01:30:47.353 UTC [policies] Manager -> DEBU abc Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:47.353 UTC [policies] Manager -> DEBU abd Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:47.353 UTC [policies] Manager -> DEBU abe Manager Channel/Application looking up path [Org2MSP]" -"2019-05-02 01:30:47.354 UTC [policies] Manager -> DEBU abf Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:47.354 UTC [policies] Manager -> DEBU ac0 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:47.354 UTC [policies] Manager -> DEBU ac1 Manager Channel/Application/Org2MSP looking up path []" -"2019-05-02 01:30:47.355 UTC [policies] Evaluate -> DEBU ac2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-05-02 01:30:47.355 UTC [cauthdsl] func1 -> DEBU ac3 0xc000c8d580 gate 1556760647355108500 evaluation starts" -"2019-05-02 01:30:47.355 UTC [cauthdsl] func2 -> DEBU ac4 0xc000c8d580 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.355 UTC [cauthdsl] func2 -> DEBU ac5 0xc000c8d580 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.355 UTC [common.deliver] Handle -> WARN ac6 Error reading from 192.168.240.9:47316: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:47.356 UTC [orderer.common.server] func1 -> DEBU ac7 Closing Deliver stream" -"2019-05-02 01:30:47.356 UTC [comm.grpc.server] 1 -> INFO ac8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47316 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=113.7487ms -"2019-05-02 01:30:47.356 UTC [grpc] infof -> DEBU ac9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.356 UTC [cauthdsl] func2 -> DEBU aca 0xc000c8d580 principal matched by identity 0" -"2019-05-02 01:30:47.357 UTC [msp.identity] Verify -> DEBU acb Verify: digest = 00000000 94 91 3a 9b 42 3e cb f7 04 35 a7 fe 6e 63 d5 7c |..:.B>...5..nc.|| -00000010 7c 24 53 70 15 d2 b1 1a 57 a8 f8 c6 bb 05 dc 1f ||$Sp....W.......|" -"2019-05-02 01:30:47.357 UTC [msp.identity] Verify -> DEBU acc Verify: sig = 00000000 30 44 02 20 2a 4c 37 99 83 06 3b 26 bc cd 68 87 |0D. *L7...;&..h.| -00000010 b4 dc 8d 15 40 47 d5 be ff cd 6a b3 4e fb 5a 82 |....@G....j.N.Z.| -00000020 06 7e 76 b6 02 20 04 f7 43 d0 0a f5 49 8b 53 76 |.~v.. ..C...I.Sv| -00000030 e9 cd a4 0c 01 31 38 3b 3f 69 a2 6e 25 1c d8 26 |.....18;?i.n%..&| -00000040 b9 56 9b 7e 5e 90 |.V.~^.|" -"2019-05-02 01:30:47.358 UTC [cauthdsl] func2 -> DEBU acd 0xc000c8d580 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.358 UTC [cauthdsl] func1 -> DEBU ace 0xc000c8d580 gate 1556760647355108500 evaluation succeeds" -"2019-05-02 01:30:47.358 UTC [policies] Evaluate -> DEBU acf Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.359 UTC [policies] Evaluate -> DEBU ad0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.359 UTC [common.configtx] recurseConfigMap -> DEBU ad1 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.359 UTC [common.configtx] recurseConfigMap -> DEBU ad2 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.360 UTC [common.configtx] recurseConfigMap -> DEBU ad3 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.360 UTC [common.configtx] recurseConfigMap -> DEBU ad4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.360 UTC [common.configtx] recurseConfigMap -> DEBU ad5 Setting policy for key Endorsement to " -"2019-05-02 01:30:47.361 UTC [common.configtx] recurseConfigMap -> DEBU ad6 Setting policy for key Readers to " -"2019-05-02 01:30:47.361 UTC [common.configtx] recurseConfigMap -> DEBU ad7 Setting policy for key Writers to " -"2019-05-02 01:30:47.362 UTC [common.configtx] recurseConfigMap -> DEBU ad8 Setting policy for key Admins to " -"2019-05-02 01:30:47.362 UTC [common.configtx] recurseConfigMap -> DEBU ad9 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.362 UTC [common.configtx] recurseConfigMap -> DEBU ada Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.362 UTC [common.configtx] recurseConfigMap -> DEBU adb Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU adc Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU add Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU ade Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU adf Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU ae0 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.363 UTC [common.configtx] recurseConfigMap -> DEBU ae1 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae2 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae3 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae4 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae5 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae6 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.364 UTC [common.configtx] recurseConfigMap -> DEBU ae7 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.365 UTC [common.channelconfig] NewStandardValues -> DEBU ae8 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:47.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU ae9 Processing field: HashingAlgorithm" -"2019-05-02 01:30:47.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU aea Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:47.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU aeb Processing field: OrdererAddresses" -"2019-05-02 01:30:47.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU aec Processing field: Consortium" -"2019-05-02 01:30:47.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU aed Processing field: Capabilities" -"2019-05-02 01:30:47.366 UTC [common.channelconfig] NewStandardValues -> DEBU aee Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:47.366 UTC [common.channelconfig] initializeProtosStruct -> DEBU aef Processing field: ACLs" -"2019-05-02 01:30:47.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU af0 Processing field: Capabilities" -"2019-05-02 01:30:47.367 UTC [common.channelconfig] NewStandardValues -> DEBU af1 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:47.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU af2 Processing field: AnchorPeers" -"2019-05-02 01:30:47.368 UTC [common.channelconfig] NewStandardValues -> DEBU af3 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.368 UTC [common.channelconfig] initializeProtosStruct -> DEBU af4 Processing field: MSP" -"2019-05-02 01:30:47.368 UTC [common.channelconfig] Validate -> DEBU af5 Anchor peers for org Org2MSP are anchor_peers: " -"2019-05-02 01:30:47.369 UTC [common.channelconfig] validateMSP -> DEBU af6 Setting up MSP for org Org2MSP" -"2019-05-02 01:30:47.369 UTC [msp] newBccspMsp -> DEBU af7 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.370 UTC [msp] New -> DEBU afa Creating Cache-MSP instance" -"2019-05-02 01:30:47.370 UTC [orderer.common.cluster.step] handleMessage -> DEBU af8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:47.370 UTC [orderer.common.cluster.step] handleMessage -> DEBU af9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:47.372 UTC [msp] Setup -> DEBU afb Setting up MSP instance Org2MSP" -"2019-05-02 01:30:47.373 UTC [msp.identity] newIdentity -> DEBU afc Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-05-02 01:30:47.374 UTC [msp.identity] newIdentity -> DEBU afd Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-05-02 01:30:47.377 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU afe Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:47.377 UTC [msp] Validate -> DEBU aff MSP Org2MSP validating identity" -"2019-05-02 01:30:47.385 UTC [msp] getCertificationChain -> DEBU b00 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.386 UTC [msp] hasOURole -> DEBU b01 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:47.386 UTC [msp] getCertificationChain -> DEBU b02 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.389 UTC [common.channelconfig] NewStandardValues -> DEBU b03 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:47.389 UTC [common.channelconfig] initializeProtosStruct -> DEBU b04 Processing field: AnchorPeers" -"2019-05-02 01:30:47.389 UTC [common.channelconfig] NewStandardValues -> DEBU b05 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.393 UTC [common.channelconfig] initializeProtosStruct -> DEBU b07 Processing field: MSP" -"2019-05-02 01:30:47.392 UTC [orderer.common.server] Deliver -> DEBU b06 Starting new Deliver handler" -"2019-05-02 01:30:47.393 UTC [common.deliver] Handle -> DEBU b08 Starting new deliver loop for 192.168.240.5:58984" -"2019-05-02 01:30:47.394 UTC [common.deliver] Handle -> DEBU b09 Attempting to read seek info message from 192.168.240.5:58984" -"2019-05-02 01:30:47.394 UTC [common.channelconfig] Validate -> DEBU b0a Anchor peers for org Org1MSP are anchor_peers: " -"2019-05-02 01:30:47.395 UTC [policies] Evaluate -> DEBU b0b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:30:47.395 UTC [policies] Evaluate -> DEBU b0c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.395 UTC [policies] Evaluate -> DEBU b0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:30:47.394 UTC [common.channelconfig] validateMSP -> DEBU b0e Setting up MSP for org Org1MSP" -"2019-05-02 01:30:47.396 UTC [msp] newBccspMsp -> DEBU b10 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.395 UTC [policies] Evaluate -> DEBU b0f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.396 UTC [msp] New -> DEBU b11 Creating Cache-MSP instance" -"2019-05-02 01:30:47.396 UTC [policies] Evaluate -> DEBU b12 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:30:47.397 UTC [msp] DeserializeIdentity -> DEBU b13 Obtaining identity" -"2019-05-02 01:30:47.397 UTC [msp] Setup -> DEBU b14 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:47.398 UTC [msp.identity] newIdentity -> DEBU b15 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL ------END CERTIFICATE-----" -"2019-05-02 01:30:47.399 UTC [msp.identity] newIdentity -> DEBU b16 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.808 UTC [cauthdsl] func1 -> DEBU a76 0xc000f4a170 gate 1556789241808157000 evaluation starts" +"2019-05-02 09:27:21.809 UTC [cauthdsl] func2 -> DEBU a77 0xc000f4a170 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:21.809 UTC [cauthdsl] func2 -> DEBU a78 0xc000f4a170 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:21.809 UTC [cauthdsl] func2 -> DEBU a79 0xc000f4a170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:21.810 UTC [cauthdsl] func2 -> DEBU a7a 0xc000f4a170 principal evaluation fails" +"2019-05-02 09:27:21.810 UTC [cauthdsl] func1 -> DEBU a7b 0xc000f4a170 gate 1556789241808157000 evaluation fails" +"2019-05-02 09:27:21.810 UTC [policies] Evaluate -> DEBU a7c Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:21.811 UTC [policies] Evaluate -> DEBU a7d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:21.811 UTC [policies] Evaluate -> DEBU a7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:21.811 UTC [cauthdsl] func1 -> DEBU a7f 0xc000f4b2b0 gate 1556789241811771100 evaluation starts" +"2019-05-02 09:27:21.812 UTC [cauthdsl] func2 -> DEBU a80 0xc000f4b2b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:21.812 UTC [cauthdsl] func2 -> DEBU a81 0xc000f4b2b0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:21.812 UTC [cauthdsl] func2 -> DEBU a82 0xc000f4b2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:21.813 UTC [cauthdsl] func2 -> DEBU a83 0xc000f4b2b0 principal evaluation fails" +"2019-05-02 09:27:21.813 UTC [cauthdsl] func1 -> DEBU a84 0xc000f4b2b0 gate 1556789241811771100 evaluation fails" +"2019-05-02 09:27:21.813 UTC [policies] Evaluate -> DEBU a85 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:21.814 UTC [policies] Evaluate -> DEBU a86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:21.814 UTC [policies] func1 -> DEBU a87 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Writers Org1MSP/Writers ]" +"2019-05-02 09:27:21.814 UTC [policies] Evaluate -> DEBU a88 Signature set did not satisfy policy /Channel/Application/Writers" +"2019-05-02 09:27:21.815 UTC [policies] Evaluate -> DEBU a89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:21.815 UTC [policies] Evaluate -> DEBU a8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-05-02 09:27:21.815 UTC [policies] Evaluate -> DEBU a8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:21.816 UTC [policies] Evaluate -> DEBU a8c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:21.816 UTC [cauthdsl] func1 -> DEBU a8d 0xc000f4bfc0 gate 1556789241816623000 evaluation starts" +"2019-05-02 09:27:21.816 UTC [cauthdsl] func2 -> DEBU a8e 0xc000f4bfc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:21.817 UTC [cauthdsl] func2 -> DEBU a8f 0xc000f4bfc0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:21.817 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a90 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-05-02 09:27:21.817 UTC [msp] Validate -> DEBU a91 MSP OrdererMSP validating identity" +"2019-05-02 09:27:21.818 UTC [cauthdsl] func2 -> DEBU a92 0xc000f4bfc0 principal matched by identity 0" +"2019-05-02 09:27:21.819 UTC [msp.identity] Verify -> DEBU a93 Verify: digest = 00000000 28 be 1e af ac 51 ab 90 a5 a6 6d 74 57 c1 0e d8 |(....Q....mtW...| +00000010 71 9a 11 dc 49 20 a7 1d e7 40 5f 6d cc 0e a5 68 |q...I ...@_m...h|" +"2019-05-02 09:27:21.819 UTC [msp.identity] Verify -> DEBU a94 Verify: sig = 00000000 30 44 02 20 3e bf 95 0c a9 21 62 de ef 7e a5 ef |0D. >....!b..~..| +00000010 63 5c 98 e1 bd c7 36 04 00 18 3d 1d 07 ee 99 4e |c\....6...=....N| +00000020 ce 31 f7 f9 02 20 6e 36 96 aa ea c8 84 49 93 f8 |.1... n6.....I..| +00000030 ee bb 98 2d 71 5e af d9 92 ee 7a 05 0c 7d 37 8b |...-q^....z..}7.| +00000040 69 13 32 1f 05 3e |i.2..>|" +"2019-05-02 09:27:21.820 UTC [cauthdsl] func2 -> DEBU a95 0xc000f4bfc0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:21.820 UTC [cauthdsl] func1 -> DEBU a96 0xc000f4bfc0 gate 1556789241816623000 evaluation succeeds" +"2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a97 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a98 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a99 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a9b Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:21.820 UTC [policies] Evaluate -> DEBU a9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:21.821 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a9d [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57184" +"2019-05-02 09:27:21.822 UTC [orderer.consensus.etcdraft] propose -> INFO a9e Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-05-02 09:27:21.824 UTC [orderer.consensus.etcdraft] serveRequest -> INFO a9f Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-05-02 09:27:21.824 UTC [common.deliver] Handle -> WARN aa0 Error reading from 172.18.0.8:57182: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:21.825 UTC [orderer.common.server] func1 -> DEBU aa4 Closing Deliver stream" +"2019-05-02 09:27:21.827 UTC [comm.grpc.server] 1 -> INFO aa5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57182 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=90.0028ms +"2019-05-02 09:27:21.825 UTC [grpc] infof -> DEBU aa1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:21.825 UTC [orderer.common.broadcast] Handle -> WARN aa2 Error reading from 172.18.0.8:57184: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:21.830 UTC [orderer.common.server] func1 -> DEBU aa9 Closing Broadcast stream" +"2019-05-02 09:27:21.830 UTC [comm.grpc.server] 1 -> INFO aaa streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57184 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=76.6966ms +"2019-05-02 09:27:21.825 UTC [grpc] infof -> DEBU aa3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:21.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa6 Sending msg of 22866 bytes to 2 on channel businesschannel took 24.1µs" +"2019-05-02 09:27:21.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aab Sending msg of 22866 bytes to 3 on channel businesschannel took 19.7µs" +"2019-05-02 09:27:21.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa7 Send of ConsensusRequest for channel businesschannel with payload of size 22866 to orderer1.example.com(orderer1.example.com:7050) took 118.3µs " +"2019-05-02 09:27:21.830 UTC [orderer.consensus.etcdraft] 2 -> DEBU aa8 Proposed block [2] to raft consensus" channel=businesschannel node=1 +"2019-05-02 09:27:21.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU aac Send of ConsensusRequest for channel businesschannel with payload of size 22866 to orderer2.example.com(orderer2.example.com:7050) took 129.1µs " +"2019-05-02 09:27:21.836 UTC [orderer.common.cluster.step] handleMessage -> DEBU aad Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:21.837 UTC [orderer.common.cluster.step] handleMessage -> DEBU aae Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:21.837 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aaf Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +"2019-05-02 09:27:21.837 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ab0 Sending msg of 28 bytes to 3 on channel businesschannel took 7.2µs" +"2019-05-02 09:27:21.838 UTC [orderer.common.cluster.step] sendMessage -> DEBU ab1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.2µs " +"2019-05-02 09:27:21.838 UTC [orderer.consensus.etcdraft] writeBlock -> INFO ab2 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +"2019-05-02 09:27:21.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU ab3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.2µs " +"2019-05-02 09:27:21.848 UTC [orderer.common.cluster.step] handleMessage -> DEBU ab4 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:21.859 UTC [orderer.common.cluster.step] handleMessage -> DEBU ab5 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:21.839 UTC [common.configtx] addToMap -> DEBU ab6 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU ab7 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU ab8 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU ab9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:21.859 UTC [common.configtx] addToMap -> DEBU aba Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:21.860 UTC [common.configtx] addToMap -> DEBU abb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:21.860 UTC [common.configtx] addToMap -> DEBU abc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:21.866 UTC [common.configtx] addToMap -> DEBU abd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU abe Adding to config map: [Group] /Channel" +"2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU abf Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac0 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac1 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac2 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:21.867 UTC [common.configtx] addToMap -> DEBU ac6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:21.868 UTC [common.configtx] verifyDeltaSet -> DEBU ac7 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:27:21.868 UTC [common.configtx] verifyDeltaSet -> DEBU ac8 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:21.868 UTC [common.configtx] policyForItem -> DEBU ac9 Getting policy for item Org2MSP with mod_policy Admins" +"2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU aca Manager Channel looking up path [Application]" +"2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acb Manager Channel has managers Application" +"2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acc Manager Channel has managers Orderer" +"2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acd Manager Channel/Application looking up path []" +"2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU ace Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU acf Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:21.868 UTC [policies] Manager -> DEBU ad0 Manager Channel/Application looking up path [Org2MSP]" +"2019-05-02 09:27:21.869 UTC [policies] Manager -> DEBU ad1 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:21.869 UTC [policies] Manager -> DEBU ad2 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:21.869 UTC [policies] Manager -> DEBU ad3 Manager Channel/Application/Org2MSP looking up path []" +"2019-05-02 09:27:21.869 UTC [policies] Evaluate -> DEBU ad4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-05-02 09:27:21.869 UTC [cauthdsl] func1 -> DEBU ad5 0xc00104c7f0 gate 1556789241869584500 evaluation starts" +"2019-05-02 09:27:21.869 UTC [cauthdsl] func2 -> DEBU ad6 0xc00104c7f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:21.869 UTC [cauthdsl] func2 -> DEBU ad7 0xc00104c7f0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:21.869 UTC [cauthdsl] func2 -> DEBU ad8 0xc00104c7f0 principal matched by identity 0" +"2019-05-02 09:27:21.869 UTC [msp.identity] Verify -> DEBU ad9 Verify: digest = 00000000 30 66 a6 63 f0 f2 5c 8b cc 30 97 57 cc 96 e6 ed |0f.c..\..0.W....| +00000010 ee 9d 29 cb 9e b5 de 97 29 52 7a 5e 61 16 79 e8 |..).....)Rz^a.y.|" +"2019-05-02 09:27:21.870 UTC [msp.identity] Verify -> DEBU ada Verify: sig = 00000000 30 45 02 21 00 a7 41 a5 d2 f7 c5 ff ec 5e 7f 6c |0E.!..A......^.l| +00000010 71 c9 ae 59 aa ec 85 dd 94 0c 54 cf 58 8b 8e 8c |q..Y......T.X...| +00000020 3a b9 3d 56 43 02 20 01 e7 16 fb f9 76 cf ae de |:.=VC. .....v...| +00000030 49 88 9b 17 52 e6 8f c3 fa dc 64 50 b3 87 99 97 |I...R.....dP....| +00000040 11 08 49 2b 8c 95 fc |..I+...|" +"2019-05-02 09:27:21.871 UTC [cauthdsl] func2 -> DEBU adb 0xc00104c7f0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:21.871 UTC [cauthdsl] func1 -> DEBU adc 0xc00104c7f0 gate 1556789241869584500 evaluation succeeds" +"2019-05-02 09:27:21.871 UTC [policies] Evaluate -> DEBU add Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:21.871 UTC [policies] Evaluate -> DEBU ade == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:21.873 UTC [common.configtx] recurseConfigMap -> DEBU adf Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae1 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae2 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.874 UTC [common.configtx] recurseConfigMap -> DEBU ae3 Setting policy for key Readers to " +"2019-05-02 09:27:21.877 UTC [common.configtx] recurseConfigMap -> DEBU ae4 Setting policy for key Writers to " +"2019-05-02 09:27:21.878 UTC [common.configtx] recurseConfigMap -> DEBU ae5 Setting policy for key Admins to " +"2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae6 Setting policy for key Endorsement to " +"2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae7 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae8 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU ae9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.879 UTC [common.configtx] recurseConfigMap -> DEBU aea Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.883 UTC [common.configtx] recurseConfigMap -> DEBU aeb Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.884 UTC [common.configtx] recurseConfigMap -> DEBU aec Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.884 UTC [common.configtx] recurseConfigMap -> DEBU aed Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU aee Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU aef Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU af0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.885 UTC [common.configtx] recurseConfigMap -> DEBU af1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.886 UTC [common.configtx] recurseConfigMap -> DEBU af2 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.887 UTC [common.configtx] recurseConfigMap -> DEBU af3 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.888 UTC [common.configtx] recurseConfigMap -> DEBU af4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.888 UTC [common.configtx] recurseConfigMap -> DEBU af5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:21.889 UTC [common.channelconfig] NewStandardValues -> DEBU af6 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:21.889 UTC [common.channelconfig] initializeProtosStruct -> DEBU af7 Processing field: HashingAlgorithm" +"2019-05-02 09:27:21.889 UTC [common.channelconfig] initializeProtosStruct -> DEBU af8 Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU af9 Processing field: OrdererAddresses" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afa Processing field: Consortium" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afb Processing field: Capabilities" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] NewStandardValues -> DEBU afc Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afd Processing field: ACLs" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU afe Processing field: Capabilities" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] NewStandardValues -> DEBU aff Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU b00 Processing field: AnchorPeers" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] NewStandardValues -> DEBU b01 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] initializeProtosStruct -> DEBU b02 Processing field: MSP" +"2019-05-02 09:27:21.890 UTC [common.channelconfig] Validate -> DEBU b03 Anchor peers for org Org1MSP are anchor_peers: " +"2019-05-02 09:27:21.890 UTC [common.channelconfig] validateMSP -> DEBU b04 Setting up MSP for org Org1MSP" +"2019-05-02 09:27:21.891 UTC [msp] newBccspMsp -> DEBU b05 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:21.891 UTC [msp] New -> DEBU b06 Creating Cache-MSP instance" +"2019-05-02 09:27:21.891 UTC [msp] Setup -> DEBU b07 Setting up MSP instance Org1MSP" +"2019-05-02 09:27:21.891 UTC [msp.identity] newIdentity -> DEBU b08 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -4316,7 +4262,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:47.400 UTC [msp.identity] newIdentity -> DEBU b17 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.892 UTC [msp.identity] newIdentity -> DEBU b09 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -4330,57 +4276,70 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.402 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b18 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:47.401 UTC [cauthdsl] func1 -> DEBU b19 0xc000bf13a0 gate 1556760647401225100 evaluation starts" -"2019-05-02 01:30:47.404 UTC [cauthdsl] func2 -> DEBU b1a 0xc000bf13a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.404 UTC [cauthdsl] func2 -> DEBU b1b 0xc000bf13a0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.404 UTC [cauthdsl] func2 -> DEBU b1c 0xc000bf13a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -"2019-05-02 01:30:47.403 UTC [msp] Validate -> DEBU b1d MSP Org1MSP validating identity" -"2019-05-02 01:30:47.406 UTC [cauthdsl] func2 -> DEBU b1e 0xc000bf13a0 principal evaluation fails" -"2019-05-02 01:30:47.406 UTC [cauthdsl] func1 -> DEBU b1f 0xc000bf13a0 gate 1556760647401225100 evaluation fails" -"2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b21 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b22 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:47.407 UTC [policies] func1 -> DEBU b23 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -"2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b24 Signature set did not satisfy policy /Channel/Orderer/Readers" -"2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b25 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b26 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b27 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.407 UTC [policies] Evaluate -> DEBU b28 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.407 UTC [cauthdsl] func1 -> DEBU b29 0xc0009229d0 gate 1556760647407944500 evaluation starts" -"2019-05-02 01:30:47.408 UTC [cauthdsl] func2 -> DEBU b2a 0xc0009229d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.408 UTC [cauthdsl] func2 -> DEBU b2b 0xc0009229d0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.408 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b2c Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:30:47.407 UTC [msp] getCertificationChain -> DEBU b20 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:47.409 UTC [msp] hasOURole -> DEBU b2e MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:47.409 UTC [msp] getCertificationChain -> DEBU b2f MSP Org1MSP getting certification chain" -"2019-05-02 01:30:47.410 UTC [common.channelconfig] NewStandardValues -> DEBU b30 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:47.408 UTC [msp] Validate -> DEBU b2d MSP Org2MSP validating identity" -"2019-05-02 01:30:47.416 UTC [msp] getCertificationChain -> DEBU b31 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.420 UTC [cauthdsl] func2 -> DEBU b32 0xc0009229d0 principal matched by identity 0" -"2019-05-02 01:30:47.420 UTC [msp.identity] Verify -> DEBU b33 Verify: digest = 00000000 7c 7a ed 35 86 0f 34 87 51 98 60 f1 d9 93 38 6f ||z.5..4.Q.`...8o| -00000010 9f 37 a4 52 89 2b f2 79 8a c9 80 63 e2 73 5f 82 |.7.R.+.y...c.s_.|" -"2019-05-02 01:30:47.420 UTC [msp.identity] Verify -> DEBU b34 Verify: sig = 00000000 30 44 02 20 00 b9 4b ec d5 9c bb 15 46 17 08 94 |0D. ..K.....F...| -00000010 16 69 a1 e9 ce 7d ed 29 d3 72 2e de 98 9a ff a5 |.i...}.).r......| -00000020 ce 04 5e 8d 02 20 04 31 6b d0 ef 45 61 23 82 ce |..^.. .1k..Ea#..| -00000030 47 e2 a7 ec 34 90 1b f7 bf 91 86 e3 73 93 bf 0f |G...4.......s...| -00000040 69 ad df e2 47 71 |i...Gq|" -"2019-05-02 01:30:47.421 UTC [cauthdsl] func2 -> DEBU b35 0xc0009229d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU b36 Processing field: ConsensusType" -"2019-05-02 01:30:47.423 UTC [common.channelconfig] initializeProtosStruct -> DEBU b37 Processing field: BatchSize" -"2019-05-02 01:30:47.424 UTC [common.channelconfig] initializeProtosStruct -> DEBU b38 Processing field: BatchTimeout" -"2019-05-02 01:30:47.425 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3a Processing field: KafkaBrokers" -"2019-05-02 01:30:47.425 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3b Processing field: ChannelRestrictions" -"2019-05-02 01:30:47.425 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3c Processing field: Capabilities" -"2019-05-02 01:30:47.425 UTC [common.channelconfig] NewStandardValues -> DEBU b3d Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:47.425 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3e Processing field: Endpoints" -"2019-05-02 01:30:47.426 UTC [common.channelconfig] NewStandardValues -> DEBU b3f Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.426 UTC [common.channelconfig] initializeProtosStruct -> DEBU b40 Processing field: MSP" -"2019-05-02 01:30:47.427 UTC [common.channelconfig] validateMSP -> DEBU b41 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:47.421 UTC [cauthdsl] func1 -> DEBU b39 0xc0009229d0 gate 1556760647407944500 evaluation succeeds" -"2019-05-02 01:30:47.427 UTC [msp] newBccspMsp -> DEBU b42 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.428 UTC [msp] New -> DEBU b44 Creating Cache-MSP instance" -"2019-05-02 01:30:47.428 UTC [msp] Setup -> DEBU b45 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:47.428 UTC [msp.identity] newIdentity -> DEBU b46 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.893 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b0a Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:21.893 UTC [msp] Validate -> DEBU b0b MSP Org1MSP validating identity" +"2019-05-02 09:27:21.893 UTC [msp] getCertificationChain -> DEBU b0c MSP Org1MSP getting certification chain" +"2019-05-02 09:27:21.894 UTC [msp] hasOURole -> DEBU b0d MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:21.894 UTC [msp] getCertificationChain -> DEBU b0e MSP Org1MSP getting certification chain" +"2019-05-02 09:27:21.894 UTC [common.channelconfig] NewStandardValues -> DEBU b0f Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:21.894 UTC [common.channelconfig] initializeProtosStruct -> DEBU b10 Processing field: AnchorPeers" +"2019-05-02 09:27:21.894 UTC [common.channelconfig] NewStandardValues -> DEBU b11 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:21.894 UTC [common.channelconfig] initializeProtosStruct -> DEBU b12 Processing field: MSP" +"2019-05-02 09:27:21.895 UTC [common.channelconfig] Validate -> DEBU b13 Anchor peers for org Org2MSP are anchor_peers: " +"2019-05-02 09:27:21.895 UTC [common.channelconfig] validateMSP -> DEBU b14 Setting up MSP for org Org2MSP" +"2019-05-02 09:27:21.895 UTC [msp] newBccspMsp -> DEBU b15 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:21.895 UTC [msp] New -> DEBU b16 Creating Cache-MSP instance" +"2019-05-02 09:27:21.895 UTC [msp] Setup -> DEBU b17 Setting up MSP instance Org2MSP" +"2019-05-02 09:27:21.895 UTC [msp.identity] newIdentity -> DEBU b18 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-05-02 09:27:21.896 UTC [msp.identity] newIdentity -> DEBU b19 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:21.896 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b1a Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:21.896 UTC [msp] Validate -> DEBU b1b MSP Org2MSP validating identity" +"2019-05-02 09:27:21.896 UTC [msp] getCertificationChain -> DEBU b1c MSP Org2MSP getting certification chain" +"2019-05-02 09:27:21.897 UTC [msp] hasOURole -> DEBU b1d MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:21.897 UTC [msp] getCertificationChain -> DEBU b1e MSP Org2MSP getting certification chain" +"2019-05-02 09:27:21.897 UTC [common.channelconfig] NewStandardValues -> DEBU b1f Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b20 Processing field: ConsensusType" +"2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b21 Processing field: BatchSize" +"2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b22 Processing field: BatchTimeout" +"2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b23 Processing field: KafkaBrokers" +"2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b24 Processing field: ChannelRestrictions" +"2019-05-02 09:27:21.897 UTC [common.channelconfig] initializeProtosStruct -> DEBU b25 Processing field: Capabilities" +"2019-05-02 09:27:21.897 UTC [common.channelconfig] NewStandardValues -> DEBU b26 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:21.898 UTC [common.channelconfig] initializeProtosStruct -> DEBU b27 Processing field: Endpoints" +"2019-05-02 09:27:21.898 UTC [common.channelconfig] NewStandardValues -> DEBU b28 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:21.898 UTC [common.channelconfig] initializeProtosStruct -> DEBU b29 Processing field: MSP" +"2019-05-02 09:27:21.898 UTC [common.channelconfig] validateMSP -> DEBU b2a Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:21.898 UTC [msp] newBccspMsp -> DEBU b2b Creating BCCSP-based MSP instance" +"2019-05-02 09:27:21.898 UTC [msp] New -> DEBU b2c Creating Cache-MSP instance" +"2019-05-02 09:27:21.898 UTC [msp] Setup -> DEBU b2d Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:21.898 UTC [msp.identity] newIdentity -> DEBU b2e Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -4394,8 +4353,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:47.427 UTC [policies] Evaluate -> DEBU b43 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.429 UTC [msp.identity] newIdentity -> DEBU b47 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.899 UTC [msp.identity] newIdentity -> DEBU b2f Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -4408,205 +4366,145 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.430 UTC [msp] Validate -> DEBU b49 MSP OrdererMSP validating identity" -"2019-05-02 01:30:47.429 UTC [policies] Evaluate -> DEBU b48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.433 UTC [msp] Setup -> DEBU b4a Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:47.434 UTC [msp] Setup -> DEBU b4b MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:47.434 UTC [policies] NewManagerImpl -> DEBU b4c Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.434 UTC [policies] NewManagerImpl -> DEBU b4d Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.433 UTC [policies] Evaluate -> DEBU b4e Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.438 UTC [policies] Evaluate -> DEBU b4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.437 UTC [policies] NewManagerImpl -> DEBU b50 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.441 UTC [policies] NewManagerImpl -> DEBU b51 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:47.441 UTC [policies] NewManagerImpl -> DEBU b52 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:47.442 UTC [policies] NewManagerImpl -> DEBU b53 Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:47.442 UTC [policies] NewManagerImpl -> DEBU b55 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:47.441 UTC [policies] Evaluate -> DEBU b54 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:30:47.443 UTC [policies] Evaluate -> DEBU b57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:30:47.443 UTC [common.deliver] deliverBlocks -> DEBU b58 [channel: businesschannel] Received seekInfo (0xc0008bfb80) start: > stop: > from 192.168.240.5:58984" -"2019-05-02 01:30:47.443 UTC [fsblkstorage] Next -> DEBU b59 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:30:47.443 UTC [fsblkstorage] newBlockfileStream -> DEBU b5a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" -"2019-05-02 01:30:47.444 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU b5b Remaining bytes=[23686], Going to peek [8] bytes" -"2019-05-02 01:30:47.444 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU b5c Returning blockbytes - length=[23683], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" -"2019-05-02 01:30:47.444 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU b5d blockbytes [23683] read from file [0]" -"2019-05-02 01:30:47.444 UTC [common.deliver] deliverBlocks -> DEBU b5e [channel: businesschannel] Delivering block [1] for (0xc0008bfb80) for 192.168.240.5:58984" -"2019-05-02 01:30:47.442 UTC [policies] NewManagerImpl -> DEBU b56 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.445 UTC [policies] NewManagerImpl -> DEBU b5f Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.445 UTC [policies] NewManagerImpl -> DEBU b60 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.445 UTC [policies] NewManagerImpl -> DEBU b61 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.445 UTC [policies] NewManagerImpl -> DEBU b62 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.446 UTC [policies] NewManagerImpl -> DEBU b63 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.446 UTC [policies] NewManagerImpl -> DEBU b64 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.446 UTC [policies] NewManagerImpl -> DEBU b65 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.446 UTC [policies] NewManagerImpl -> DEBU b67 Proposed new policy Writers for Channel/Application" -"2019-05-02 01:30:47.461 UTC [policies] NewManagerImpl -> DEBU b68 Proposed new policy Admins for Channel/Application" -"2019-05-02 01:30:47.446 UTC [fsblkstorage] waitForBlock -> DEBU b66 Going to wait for newer blocks. maxAvailaBlockNumber=[1], waitForBlockNum=[2]" -"2019-05-02 01:30:47.462 UTC [policies] NewManagerImpl -> DEBU b69 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:30:47.463 UTC [policies] NewManagerImpl -> DEBU b6a Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:30:47.468 UTC [policies] NewManagerImpl -> DEBU b6b Proposed new policy Readers for Channel/Application" -"2019-05-02 01:30:47.469 UTC [policies] NewManagerImpl -> DEBU b6c Proposed new policy Readers for Channel" -"2019-05-02 01:30:47.469 UTC [policies] NewManagerImpl -> DEBU b6d Proposed new policy Writers for Channel" -"2019-05-02 01:30:47.469 UTC [policies] NewManagerImpl -> DEBU b6e Proposed new policy Admins for Channel" -"2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b6f Adding to config map: [Group] /Channel" -"2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b70 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b71 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b72 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b73 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:47.470 UTC [common.configtx] addToMap -> DEBU b74 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:47.488 UTC [common.configtx] addToMap -> DEBU b75 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.489 UTC [common.configtx] addToMap -> DEBU b76 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.496 UTC [common.configtx] addToMap -> DEBU b77 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.498 UTC [common.configtx] addToMap -> DEBU b78 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:47.499 UTC [common.configtx] addToMap -> DEBU b79 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:47.500 UTC [common.configtx] addToMap -> DEBU b7a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:47.500 UTC [common.configtx] addToMap -> DEBU b7b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:47.503 UTC [common.configtx] addToMap -> DEBU b7c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:47.503 UTC [common.configtx] addToMap -> DEBU b7d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:47.504 UTC [common.configtx] addToMap -> DEBU b7e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:47.504 UTC [common.configtx] addToMap -> DEBU b7f Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:47.505 UTC [common.configtx] addToMap -> DEBU b80 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:47.505 UTC [common.configtx] addToMap -> DEBU b81 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:47.509 UTC [common.configtx] addToMap -> DEBU b82 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:47.510 UTC [common.configtx] addToMap -> DEBU b83 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:47.510 UTC [common.configtx] addToMap -> DEBU b84 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:47.510 UTC [common.configtx] addToMap -> DEBU b85 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:47.511 UTC [common.configtx] addToMap -> DEBU b86 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:47.512 UTC [common.configtx] addToMap -> DEBU b87 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.512 UTC [common.configtx] addToMap -> DEBU b88 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:47.512 UTC [common.configtx] addToMap -> DEBU b89 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:47.512 UTC [common.configtx] addToMap -> DEBU b8a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:47.512 UTC [common.configtx] addToMap -> DEBU b8b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:47.513 UTC [common.configtx] addToMap -> DEBU b8c Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:47.513 UTC [common.configtx] addToMap -> DEBU b8d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:47.513 UTC [common.configtx] addToMap -> DEBU b8e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:47.513 UTC [common.configtx] addToMap -> DEBU b8f Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:47.514 UTC [common.configtx] addToMap -> DEBU b90 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:47.514 UTC [common.configtx] addToMap -> DEBU b91 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:47.514 UTC [common.configtx] addToMap -> DEBU b92 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:47.514 UTC [common.configtx] addToMap -> DEBU b93 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:47.515 UTC [common.configtx] addToMap -> DEBU b94 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:47.515 UTC [common.configtx] addToMap -> DEBU b95 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:47.515 UTC [common.configtx] addToMap -> DEBU b96 Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:47.515 UTC [common.configtx] addToMap -> DEBU b97 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:47.516 UTC [common.configtx] addToMap -> DEBU b98 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:47.516 UTC [common.configtx] addToMap -> DEBU b99 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:47.516 UTC [common.configtx] addToMap -> DEBU b9a Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:47.516 UTC [common.configtx] addToMap -> DEBU b9b Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:47.516 UTC [common.configtx] addToMap -> DEBU b9c Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:47.517 UTC [common.channelconfig] LogSanityChecks -> DEBU b9d As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:30:47.517 UTC [common.channelconfig] LogSanityChecks -> DEBU b9e As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:30:47.517 UTC [policies] Manager -> DEBU b9f Manager Channel looking up path [Application]" -"2019-05-02 01:30:47.517 UTC [policies] Manager -> DEBU ba0 Manager Channel has managers Orderer" -"2019-05-02 01:30:47.517 UTC [policies] Manager -> DEBU ba1 Manager Channel has managers Application" -"2019-05-02 01:30:47.518 UTC [policies] Manager -> DEBU ba2 Manager Channel/Application looking up path []" -"2019-05-02 01:30:47.518 UTC [policies] Manager -> DEBU ba3 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:47.518 UTC [policies] Manager -> DEBU ba4 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:47.518 UTC [common.channelconfig] LogSanityChecks -> DEBU ba5 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:30:47.518 UTC [common.channelconfig] LogSanityChecks -> DEBU ba6 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:30:47.519 UTC [common.channelconfig] LogSanityChecks -> DEBU ba7 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:30:47.519 UTC [policies] Manager -> DEBU ba8 Manager Channel looking up path [Orderer]" -"2019-05-02 01:30:47.519 UTC [policies] Manager -> DEBU ba9 Manager Channel has managers Application" -"2019-05-02 01:30:47.519 UTC [policies] Manager -> DEBU baa Manager Channel has managers Orderer" -"2019-05-02 01:30:47.519 UTC [policies] Manager -> DEBU bab Manager Channel/Orderer looking up path []" -"2019-05-02 01:30:47.520 UTC [policies] Manager -> DEBU bac Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:30:47.520 UTC [common.channelconfig] LogSanityChecks -> DEBU bad As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:30:47.520 UTC [common.capabilities] Supported -> DEBU bae Orderer capability V2_0 is supported and is enabled" -"2019-05-02 01:30:47.520 UTC [common.capabilities] Supported -> DEBU baf Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:47.520 UTC [orderer.common.server] func1 -> DEBU bb0 Executing callback to update root CAs" -"2019-05-02 01:30:47.520 UTC [orderer.common.server] updateTrustedRoots -> DEBU bb1 updating root CAs for channel [businesschannel]" -"2019-05-02 01:30:47.520 UTC [orderer.common.server] updateTrustedRoots -> DEBU bb2 adding app root CAs for MSP [Org2MSP]" -"2019-05-02 01:30:47.521 UTC [orderer.common.server] updateTrustedRoots -> DEBU bb3 adding app root CAs for MSP [Org1MSP]" -"2019-05-02 01:30:47.522 UTC [orderer.common.server] updateTrustedRoots -> DEBU bb4 adding orderer root CAs for MSP [OrdererMSP]" -"2019-05-02 01:30:47.523 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU bb5 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" -"2019-05-02 01:30:47.524 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU bb6 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-05-02 01:30:47.524 UTC [msp.identity] Sign -> DEBU bb7 Sign: plaintext: 0A020802120B0A090A03010203100418...5DEE28494FB27FD0EAD443509103CCCC " -"2019-05-02 01:30:47.524 UTC [msp.identity] Sign -> DEBU bb8 Sign: digest: BB436F1B1B45FEF3826B4DCC777220AC1DF298A84C2BE2EF7E46175E4C597CA3 " -"2019-05-02 01:30:47.534 UTC [fsblkstorage] indexBlock -> DEBU bb9 Indexing block [blockNum=2, blockHash=[]byte{0x10, 0xa6, 0x73, 0x2, 0x98, 0xd8, 0x5d, 0x96, 0xae, 0x3a, 0x57, 0x2b, 0xde, 0xb5, 0xd3, 0x7f, 0x2e, 0x75, 0xc3, 0x9b, 0xc3, 0x8a, 0xd3, 0xa3, 0x6d, 0xe6, 0x7c, 0xa8, 0x8e, 0x95, 0x7a, 0xb} txOffsets= -txId= locPointer=offset=71, bytesLength=22736 +"2019-05-02 09:27:21.899 UTC [msp] Validate -> DEBU b30 MSP OrdererMSP validating identity" +"2019-05-02 09:27:21.899 UTC [msp] Setup -> DEBU b31 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:21.899 UTC [msp] Setup -> DEBU b32 MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b33 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b34 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b35 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b36 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b37 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b38 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b39 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b3a Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b3b Proposed new policy Admins for Channel/Application" +"2019-05-02 09:27:21.900 UTC [policies] NewManagerImpl -> DEBU b3c Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b3d Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b3e Proposed new policy Readers for Channel/Application" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b3f Proposed new policy Writers for Channel/Application" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b40 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b41 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b42 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b43 Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b44 Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b45 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b46 Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:21.901 UTC [policies] NewManagerImpl -> DEBU b47 Proposed new policy Admins for Channel" +"2019-05-02 09:27:21.902 UTC [policies] NewManagerImpl -> DEBU b48 Proposed new policy Readers for Channel" +"2019-05-02 09:27:21.902 UTC [policies] NewManagerImpl -> DEBU b49 Proposed new policy Writers for Channel" +"2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4a Adding to config map: [Group] /Channel" +"2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4b Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4c Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4d Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b4f Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:21.902 UTC [common.configtx] addToMap -> DEBU b50 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b51 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b52 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b53 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b54 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b55 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b56 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b57 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b58 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b59 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:21.903 UTC [common.configtx] addToMap -> DEBU b5a Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5b Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5c Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5d Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5e Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b5f Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b60 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b61 Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b62 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b63 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:21.904 UTC [common.configtx] addToMap -> DEBU b64 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b65 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b66 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b67 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b68 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b69 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6a Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6b Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6c Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6e Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:21.905 UTC [common.configtx] addToMap -> DEBU b6f Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b70 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b71 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b72 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b73 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b74 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b75 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b76 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:21.906 UTC [common.configtx] addToMap -> DEBU b77 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:21.906 UTC [common.channelconfig] LogSanityChecks -> DEBU b78 As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:27:21.906 UTC [common.channelconfig] LogSanityChecks -> DEBU b79 As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:27:21.906 UTC [policies] Manager -> DEBU b7a Manager Channel looking up path [Application]" +"2019-05-02 09:27:21.906 UTC [policies] Manager -> DEBU b7b Manager Channel has managers Application" +"2019-05-02 09:27:21.906 UTC [policies] Manager -> DEBU b7c Manager Channel has managers Orderer" +"2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b7d Manager Channel/Application looking up path []" +"2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b7e Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b7f Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b80 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b81 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b82 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b83 Manager Channel looking up path [Orderer]" +"2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b84 Manager Channel has managers Orderer" +"2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b85 Manager Channel has managers Application" +"2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b86 Manager Channel/Orderer looking up path []" +"2019-05-02 09:27:21.907 UTC [policies] Manager -> DEBU b87 Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:27:21.907 UTC [common.channelconfig] LogSanityChecks -> DEBU b88 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:27:21.907 UTC [common.capabilities] Supported -> DEBU b89 Orderer capability V2_0 is supported and is enabled" +"2019-05-02 09:27:21.908 UTC [common.capabilities] Supported -> DEBU b8a Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:21.908 UTC [orderer.common.server] func1 -> DEBU b8b Executing callback to update root CAs" +"2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8c updating root CAs for channel [businesschannel]" +"2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8d adding orderer root CAs for MSP [OrdererMSP]" +"2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8e adding app root CAs for MSP [Org1MSP]" +"2019-05-02 09:27:21.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU b8f adding app root CAs for MSP [Org2MSP]" +"2019-05-02 09:27:21.908 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU b90 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +"2019-05-02 09:27:21.908 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU b91 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-05-02 09:27:21.909 UTC [msp.identity] Sign -> DEBU b92 Sign: plaintext: 0A020802120B0A090A03010203100418...5682C079B401AF95A9AC4327AD694339 " +"2019-05-02 09:27:21.909 UTC [msp.identity] Sign -> DEBU b93 Sign: digest: 69665648D66422A078E26752B27D981A4623B89C9AED8F569755B04E66FFB50F " +"2019-05-02 09:27:21.911 UTC [fsblkstorage] indexBlock -> DEBU b94 Indexing block [blockNum=2, blockHash=[]byte{0x77, 0xce, 0x8d, 0x7, 0x90, 0xe, 0xa5, 0xa9, 0x76, 0x46, 0x90, 0x13, 0x95, 0x91, 0x37, 0xc8, 0x4d, 0x7f, 0xdd, 0xf1, 0x19, 0xb8, 0x8a, 0xad, 0x5f, 0xdd, 0xe8, 0x55, 0x7b, 0xa1, 0x6e, 0x5a} txOffsets= +txId= locPointer=offset=71, bytesLength=22737 ]" -"2019-05-02 01:30:47.538 UTC [fsblkstorage] updateCheckpoint -> DEBU bba Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71370], isChainEmpty=[false], lastBlockNumber=[2]" -"2019-05-02 01:30:47.539 UTC [orderer.commmon.multichannel] commitBlock -> DEBU bbb [channel: businesschannel] Wrote block [2]" -"2019-05-02 01:30:47.539 UTC [fsblkstorage] waitForBlock -> DEBU bbc Came out of wait. maxAvailaBlockNumber=[2]" -"2019-05-02 01:30:47.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bbd Remaining bytes=[23744], Going to peek [8] bytes" -"2019-05-02 01:30:47.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bbe Returning blockbytes - length=[23741], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" -"2019-05-02 01:30:47.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bbf blockbytes [23741] read from file [0]" -"2019-05-02 01:30:47.542 UTC [policies] Evaluate -> DEBU bc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:30:47.543 UTC [policies] Evaluate -> DEBU bc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.543 UTC [policies] Evaluate -> DEBU bc2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:30:47.543 UTC [policies] Evaluate -> DEBU bc3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.543 UTC [policies] Evaluate -> DEBU bc4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:30:47.544 UTC [msp] DeserializeIdentity -> DEBU bc5 Obtaining identity" -"2019-05-02 01:30:47.544 UTC [msp.identity] newIdentity -> DEBU bc6 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL ------END CERTIFICATE-----" -"2019-05-02 01:30:47.545 UTC [cauthdsl] func1 -> DEBU bc7 0xc00004fcd0 gate 1556760647545331400 evaluation starts" -"2019-05-02 01:30:47.545 UTC [cauthdsl] func2 -> DEBU bc8 0xc00004fcd0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.546 UTC [cauthdsl] func2 -> DEBU bc9 0xc00004fcd0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.546 UTC [cauthdsl] func2 -> DEBU bca 0xc00004fcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -"2019-05-02 01:30:47.546 UTC [cauthdsl] func2 -> DEBU bcb 0xc00004fcd0 principal evaluation fails" -"2019-05-02 01:30:47.547 UTC [cauthdsl] func1 -> DEBU bcc 0xc00004fcd0 gate 1556760647545331400 evaluation fails" -"2019-05-02 01:30:47.547 UTC [policies] Evaluate -> DEBU bcd Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:47.547 UTC [policies] Evaluate -> DEBU bce == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:47.547 UTC [policies] func1 -> DEBU bcf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -"2019-05-02 01:30:47.548 UTC [policies] Evaluate -> DEBU bd0 Signature set did not satisfy policy /Channel/Orderer/Readers" -"2019-05-02 01:30:47.549 UTC [policies] Evaluate -> DEBU bd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:30:47.551 UTC [policies] Evaluate -> DEBU bd2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.551 UTC [policies] Evaluate -> DEBU bd3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.553 UTC [policies] Evaluate -> DEBU bd4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.553 UTC [cauthdsl] func1 -> DEBU bd5 0xc0003bb3a0 gate 1556760647553899400 evaluation starts" -"2019-05-02 01:30:47.554 UTC [cauthdsl] func2 -> DEBU bd6 0xc0003bb3a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.554 UTC [cauthdsl] func2 -> DEBU bd7 0xc0003bb3a0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.554 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bd8 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:30:47.554 UTC [msp] Validate -> DEBU bd9 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.554 UTC [msp] getCertificationChain -> DEBU bda MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.555 UTC [cauthdsl] func2 -> DEBU bdb 0xc0003bb3a0 principal matched by identity 0" -"2019-05-02 01:30:47.555 UTC [msp.identity] Verify -> DEBU bdc Verify: digest = 00000000 7c 7a ed 35 86 0f 34 87 51 98 60 f1 d9 93 38 6f ||z.5..4.Q.`...8o| -00000010 9f 37 a4 52 89 2b f2 79 8a c9 80 63 e2 73 5f 82 |.7.R.+.y...c.s_.|" -"2019-05-02 01:30:47.555 UTC [msp.identity] Verify -> DEBU bdd Verify: sig = 00000000 30 44 02 20 00 b9 4b ec d5 9c bb 15 46 17 08 94 |0D. ..K.....F...| -00000010 16 69 a1 e9 ce 7d ed 29 d3 72 2e de 98 9a ff a5 |.i...}.).r......| -00000020 ce 04 5e 8d 02 20 04 31 6b d0 ef 45 61 23 82 ce |..^.. .1k..Ea#..| -00000030 47 e2 a7 ec 34 90 1b f7 bf 91 86 e3 73 93 bf 0f |G...4.......s...| -00000040 69 ad df e2 47 71 |i...Gq|" -"2019-05-02 01:30:47.555 UTC [cauthdsl] func2 -> DEBU bde 0xc0003bb3a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.555 UTC [cauthdsl] func1 -> DEBU bdf 0xc0003bb3a0 gate 1556760647553899400 evaluation succeeds" -"2019-05-02 01:30:47.555 UTC [policies] Evaluate -> DEBU be0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.556 UTC [policies] Evaluate -> DEBU be1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.556 UTC [policies] Evaluate -> DEBU be2 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.556 UTC [policies] Evaluate -> DEBU be3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.556 UTC [policies] Evaluate -> DEBU be4 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:30:47.556 UTC [policies] Evaluate -> DEBU be5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:30:47.556 UTC [common.deliver] deliverBlocks -> DEBU be6 [channel: businesschannel] Delivering block [2] for (0xc0008bfb80) for 192.168.240.5:58984" -"2019-05-02 01:30:47.557 UTC [fsblkstorage] waitForBlock -> DEBU be7 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -"2019-05-02 01:30:47.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be8 Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" -"2019-05-02 01:30:47.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be9 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" -"2019-05-02 01:30:47.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU bea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 418.2µs " -"2019-05-02 01:30:47.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU beb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.1µs " -"2019-05-02 01:30:47.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU bec Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:47.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bef Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" -"2019-05-02 01:30:47.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU bed Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:47.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU bee Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:47.583 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.3355ms " -"2019-05-02 01:30:47.658 UTC [orderer.common.server] Deliver -> DEBU bf1 Starting new Deliver handler" -"2019-05-02 01:30:47.659 UTC [common.deliver] Handle -> DEBU bf2 Starting new deliver loop for 192.168.240.8:40188" -"2019-05-02 01:30:47.659 UTC [common.deliver] Handle -> DEBU bf3 Attempting to read seek info message from 192.168.240.8:40188" -"2019-05-02 01:30:47.660 UTC [policies] Evaluate -> DEBU bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:30:47.660 UTC [policies] Evaluate -> DEBU bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.660 UTC [policies] Evaluate -> DEBU bf6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:30:47.660 UTC [policies] Evaluate -> DEBU bf7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.661 UTC [policies] Evaluate -> DEBU bf8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:30:47.661 UTC [msp] DeserializeIdentity -> DEBU bf9 Obtaining identity" -"2019-05-02 01:30:47.663 UTC [msp.identity] newIdentity -> DEBU bfa Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.913 UTC [fsblkstorage] updateCheckpoint -> DEBU b95 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71370], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-05-02 09:27:21.913 UTC [orderer.commmon.multichannel] commitBlock -> DEBU b96 [channel: businesschannel] Wrote block [2]" +"2019-05-02 09:27:21.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b97 Sending msg of 28 bytes to 2 on channel businesschannel took 43.2µs" +"2019-05-02 09:27:21.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b98 Sending msg of 28 bytes to 3 on channel businesschannel took 62.1µs" +"2019-05-02 09:27:21.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU b99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 686.1µs " +"2019-05-02 09:27:21.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU b9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 388µs " +"2019-05-02 09:27:21.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU b9b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:21.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU b9c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:22.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU b9d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:22.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b9e Sending msg of 28 bytes to 3 on channel testchainid took 35µs" +"2019-05-02 09:27:22.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU b9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 977.7µs " +"2019-05-02 09:27:22.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba0 Sending msg of 28 bytes to 2 on channel businesschannel took 35.6µs" +"2019-05-02 09:27:22.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba1 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +"2019-05-02 09:27:22.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.2µs " +"2019-05-02 09:27:22.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.2µs " +"2019-05-02 09:27:22.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:22.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:22.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:22.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba7 Sending msg of 28 bytes to 3 on channel testchainid took 128.1µs" +"2019-05-02 09:27:22.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 272.9µs " +"2019-05-02 09:27:22.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba9 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2019-05-02 09:27:22.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU baa Sending msg of 28 bytes to 3 on channel businesschannel took 39.8µs" +"2019-05-02 09:27:22.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU bab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 266µs " +"2019-05-02 09:27:22.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU bac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.3µs " +"2019-05-02 09:27:22.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU bad Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:22.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU bae Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:23.055 UTC [orderer.common.server] Deliver -> DEBU baf Starting new Deliver handler" +"2019-05-02 09:27:23.055 UTC [common.deliver] Handle -> DEBU bb0 Starting new deliver loop for 172.18.0.5:42818" +"2019-05-02 09:27:23.055 UTC [common.deliver] Handle -> DEBU bb1 Attempting to read seek info message from 172.18.0.5:42818" +"2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:23.056 UTC [policies] Evaluate -> DEBU bb5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:23.057 UTC [policies] Evaluate -> DEBU bb6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:23.057 UTC [msp] DeserializeIdentity -> DEBU bb7 Obtaining identity" +"2019-05-02 09:27:23.058 UTC [msp.identity] newIdentity -> DEBU bb8 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -4620,215 +4518,148 @@ BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -----END CERTIFICATE-----" -"2019-05-02 01:30:47.663 UTC [cauthdsl] func1 -> DEBU bfb 0xc000b76460 gate 1556760647663649400 evaluation starts" -"2019-05-02 01:30:47.663 UTC [cauthdsl] func2 -> DEBU bfc 0xc000b76460 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.663 UTC [cauthdsl] func2 -> DEBU bfd 0xc000b76460 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.663 UTC [cauthdsl] func2 -> DEBU bfe 0xc000b76460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -"2019-05-02 01:30:47.664 UTC [cauthdsl] func2 -> DEBU bff 0xc000b76460 principal evaluation fails" -"2019-05-02 01:30:47.664 UTC [cauthdsl] func1 -> DEBU c00 0xc000b76460 gate 1556760647663649400 evaluation fails" -"2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c01 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c02 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:47.665 UTC [policies] func1 -> DEBU c03 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -"2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c04 Signature set did not satisfy policy /Channel/Orderer/Readers" -"2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c05 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.665 UTC [policies] Evaluate -> DEBU c07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.666 UTC [policies] Evaluate -> DEBU c08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.666 UTC [cauthdsl] func1 -> DEBU c09 0xc000b77aa0 gate 1556760647666180400 evaluation starts" -"2019-05-02 01:30:47.666 UTC [cauthdsl] func2 -> DEBU c0a 0xc000b77aa0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.666 UTC [cauthdsl] func2 -> DEBU c0b 0xc000b77aa0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:47.666 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c0c Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:30:47.666 UTC [msp] Validate -> DEBU c0d MSP Org2MSP validating identity" -"2019-05-02 01:30:47.667 UTC [msp] getCertificationChain -> DEBU c0e MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.667 UTC [cauthdsl] func2 -> DEBU c0f 0xc000b77aa0 principal matched by identity 0" -"2019-05-02 01:30:47.667 UTC [msp.identity] Verify -> DEBU c10 Verify: digest = 00000000 d0 c0 26 cc 59 50 3b e3 c2 02 6d ae 79 dd 85 e1 |..&.YP;...m.y...| -00000010 91 f2 a2 ff 76 16 1d dd ec 4f 58 14 8d 6a 36 45 |....v....OX..j6E|" -"2019-05-02 01:30:47.667 UTC [msp.identity] Verify -> DEBU c11 Verify: sig = 00000000 30 45 02 21 00 de 41 6b 84 df 28 46 47 e8 96 92 |0E.!..Ak..(FG...| -00000010 e5 4b 51 5f c2 ee 26 90 62 b2 d6 0f 6c 4f f0 e3 |.KQ_..&.b...lO..| -00000020 ba 60 29 98 ce 02 20 32 75 85 c3 78 d2 06 bf de |.`)... 2u..x....| -00000030 1e 2c 41 be e8 4a fb 24 11 d7 d7 83 a6 a4 c1 c8 |.,A..J.$........| -00000040 7e 1b 7d 31 bf a5 58 |~.}1..X|" -"2019-05-02 01:30:47.668 UTC [cauthdsl] func2 -> DEBU c12 0xc000b77aa0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.668 UTC [cauthdsl] func1 -> DEBU c13 0xc000b77aa0 gate 1556760647666180400 evaluation succeeds" -"2019-05-02 01:30:47.668 UTC [policies] Evaluate -> DEBU c14 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.668 UTC [policies] Evaluate -> DEBU c15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.668 UTC [policies] Evaluate -> DEBU c16 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.668 UTC [policies] Evaluate -> DEBU c17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.669 UTC [policies] Evaluate -> DEBU c18 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:30:47.669 UTC [policies] Evaluate -> DEBU c19 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:30:47.669 UTC [common.deliver] deliverBlocks -> DEBU c1a [channel: businesschannel] Received seekInfo (0xc0003c9bc0) start: > stop: > from 192.168.240.8:40188" -"2019-05-02 01:30:47.670 UTC [fsblkstorage] Next -> DEBU c1b Initializing block stream for iterator. itr.maxBlockNumAvailable=2" -"2019-05-02 01:30:47.670 UTC [fsblkstorage] newBlockfileStream -> DEBU c1c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" -"2019-05-02 01:30:47.671 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c1d Remaining bytes=[47430], Going to peek [8] bytes" -"2019-05-02 01:30:47.672 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c1e Returning blockbytes - length=[23683], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" -"2019-05-02 01:30:47.672 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c1f blockbytes [23683] read from file [0]" -"2019-05-02 01:30:47.673 UTC [common.deliver] deliverBlocks -> DEBU c20 [channel: businesschannel] Delivering block [1] for (0xc0003c9bc0) for 192.168.240.8:40188" -"2019-05-02 01:30:47.678 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c21 Remaining bytes=[23744], Going to peek [8] bytes" -"2019-05-02 01:30:47.679 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c22 Returning blockbytes - length=[23741], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" -"2019-05-02 01:30:47.679 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU c23 blockbytes [23741] read from file [0]" -"2019-05-02 01:30:47.681 UTC [common.deliver] deliverBlocks -> DEBU c24 [channel: businesschannel] Delivering block [2] for (0xc0003c9bc0) for 192.168.240.8:40188" -"2019-05-02 01:30:47.682 UTC [fsblkstorage] waitForBlock -> DEBU c25 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -"2019-05-02 01:30:48.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c26 Sending msg of 28 bytes to 2 on channel businesschannel took 35.1µs" -"2019-05-02 01:30:48.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c27 Sending msg of 28 bytes to 3 on channel businesschannel took 28.8µs" -"2019-05-02 01:30:48.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU c28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 676.7µs " -"2019-05-02 01:30:48.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU c29 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:48.078 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2a Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" -"2019-05-02 01:30:48.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " -"2019-05-02 01:30:48.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.9032ms " -"2019-05-02 01:30:48.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:48.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:48.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2f Sending msg of 28 bytes to 2 on channel businesschannel took 36.5µs" -"2019-05-02 01:30:48.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c30 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" -"2019-05-02 01:30:48.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU c31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 467.9µs " -"2019-05-02 01:30:48.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU c32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1476ms " -"2019-05-02 01:30:48.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU c33 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:48.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU c34 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:48.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c35 Sending msg of 28 bytes to 3 on channel testchainid took 34.8µs" -"2019-05-02 01:30:48.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU c36 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:48.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU c37 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.8µs " -"2019-05-02 01:30:49.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c38 Sending msg of 28 bytes to 2 on channel businesschannel took 46.1µs" -"2019-05-02 01:30:49.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c39 Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" -"2019-05-02 01:30:49.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 396µs " -"2019-05-02 01:30:49.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 296.4µs " -"2019-05-02 01:30:49.081 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:49.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3d Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:49.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:49.083 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c3f Sending msg of 28 bytes to 3 on channel testchainid took 30.3µs" -"2019-05-02 01:30:49.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU c40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 750.9µs " -"2019-05-02 01:30:49.596 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c41 Sending msg of 28 bytes to 2 on channel businesschannel took 146µs" -"2019-05-02 01:30:49.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c42 Sending msg of 28 bytes to 3 on channel businesschannel took 78.1µs" -"2019-05-02 01:30:49.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU c43 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.4µs " -"2019-05-02 01:30:49.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU c44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 877.3µs " -"2019-05-02 01:30:49.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU c45 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:49.641 UTC [orderer.common.cluster.step] handleMessage -> DEBU c46 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:49.641 UTC [orderer.common.cluster.step] handleMessage -> DEBU c47 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:49.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c48 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" -"2019-05-02 01:30:49.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU c49 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.7µs " -"2019-05-02 01:30:50.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4a Sending msg of 28 bytes to 2 on channel businesschannel took 53.1µs" -"2019-05-02 01:30:50.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4b Sending msg of 28 bytes to 3 on channel businesschannel took 37.6µs" -"2019-05-02 01:30:50.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 220.9µs " -"2019-05-02 01:30:50.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 285.3µs " -"2019-05-02 01:30:50.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:50.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:50.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c50 Sending msg of 28 bytes to 3 on channel testchainid took 31.1µs" -"2019-05-02 01:30:50.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU c51 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.6µs " -"2019-05-02 01:30:50.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c52 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:50.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c53 Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" -"2019-05-02 01:30:50.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c54 Sending msg of 28 bytes to 3 on channel businesschannel took 32.7µs" -"2019-05-02 01:30:50.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU c55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 463.2µs " -"2019-05-02 01:30:50.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU c56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.5636ms " -"2019-05-02 01:30:50.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU c57 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:50.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU c58 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:50.584 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c59 Sending msg of 28 bytes to 3 on channel testchainid took 27µs" -"2019-05-02 01:30:50.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:50.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5816ms " -"2019-05-02 01:30:51.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5c Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" -"2019-05-02 01:30:51.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5d Sending msg of 28 bytes to 3 on channel businesschannel took 196.4µs" -"2019-05-02 01:30:51.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 888.2µs " -"2019-05-02 01:30:51.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.2µs " -"2019-05-02 01:30:51.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU c60 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:51.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c61 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:51.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c62 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:51.085 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c63 Sending msg of 28 bytes to 3 on channel testchainid took 59.1µs" -"2019-05-02 01:30:51.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU c64 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.2µs " -"2019-05-02 01:30:51.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c65 Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" -"2019-05-02 01:30:51.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU c66 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 176.3µs " -"2019-05-02 01:30:51.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU c67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 988.4µs " -"2019-05-02 01:30:51.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU c68 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:51.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU c69 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:51.582 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6a Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" -"2019-05-02 01:30:51.582 UTC [orderer.common.cluster.step] sendMessage -> DEBU c6b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " -"2019-05-02 01:30:51.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6c Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" -"2019-05-02 01:30:51.584 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:52.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6e Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" -"2019-05-02 01:30:52.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6f Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" -"2019-05-02 01:30:52.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU c70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 204.3µs " -"2019-05-02 01:30:52.077 UTC [orderer.common.cluster.step] handleMessage -> DEBU c71 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:52.078 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c72 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" -"2019-05-02 01:30:52.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU c73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.2µs " -"2019-05-02 01:30:52.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU c74 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:52.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU c75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.5368ms " -"2019-05-02 01:30:52.081 UTC [orderer.common.cluster.step] handleMessage -> DEBU c76 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:52.390 UTC [common.deliver] deliverBlocks -> DEBU c77 Context canceled, aborting wait for next block" -"2019-05-02 01:30:52.390 UTC [grpc] infof -> DEBU c78 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:52.390 UTC [orderer.common.server] func1 -> DEBU c79 Closing Deliver stream" -"2019-05-02 01:30:52.391 UTC [comm.grpc.server] 1 -> INFO c7b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.8:40188 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.7323204s -"2019-05-02 01:30:52.390 UTC [fsblkstorage] waitForBlock -> DEBU c7a Came out of wait. maxAvailaBlockNumber=[2]" -"2019-05-02 01:30:52.391 UTC [fsblkstorage] waitForBlock -> DEBU c7c Came out of wait. maxAvailaBlockNumber=[2]" -"2019-05-02 01:30:52.391 UTC [fsblkstorage] waitForBlock -> DEBU c7d Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -"2019-05-02 01:30:52.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7e Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" -"2019-05-02 01:30:52.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7f Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" -"2019-05-02 01:30:52.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU c80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134µs " -"2019-05-02 01:30:52.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU c81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.6µs " -"2019-05-02 01:30:52.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU c82 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:52.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU c83 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:52.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c84 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" -"2019-05-02 01:30:52.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU c85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.9µs " -"2019-05-02 01:30:52.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU c86 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:53.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU c87 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:53.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c88 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" -"2019-05-02 01:30:53.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU c89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 204µs " -"2019-05-02 01:30:53.137 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8a Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" -"2019-05-02 01:30:53.137 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8b Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" -"2019-05-02 01:30:53.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 374µs " -"2019-05-02 01:30:53.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 632.6µs " -"2019-05-02 01:30:53.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:53.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:53.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c90 Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" -"2019-05-02 01:30:53.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c91 Sending msg of 28 bytes to 3 on channel businesschannel took 28.8µs" -"2019-05-02 01:30:53.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU c92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2343ms " -"2019-05-02 01:30:53.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU c93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 683.9µs " -"2019-05-02 01:30:53.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU c94 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:53.582 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c95 Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" -"2019-05-02 01:30:53.583 UTC [orderer.common.cluster.step] sendMessage -> DEBU c96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 679.4µs " -"2019-05-02 01:30:53.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU c97 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:53.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU c98 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:54.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c99 Sending msg of 28 bytes to 2 on channel businesschannel took 27.6µs" -"2019-05-02 01:30:54.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9a Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" -"2019-05-02 01:30:54.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.9µs " -"2019-05-02 01:30:54.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5437ms " -"2019-05-02 01:30:54.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9d Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:54.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:54.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:54.084 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca0 Sending msg of 28 bytes to 3 on channel testchainid took 29.1µs" -"2019-05-02 01:30:54.084 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.8µs " -"2019-05-02 01:30:54.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca2 Sending msg of 28 bytes to 2 on channel businesschannel took 30.5µs" -"2019-05-02 01:30:54.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca3 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" -"2019-05-02 01:30:54.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 202.7µs " -"2019-05-02 01:30:54.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.3µs " -"2019-05-02 01:30:54.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca6 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:54.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:54.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca8 Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs" -"2019-05-02 01:30:54.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101µs " -"2019-05-02 01:30:54.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU caa Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:55.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cab Sending msg of 28 bytes to 3 on channel businesschannel took 67.7µs" -"2019-05-02 01:30:55.077 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cac Sending msg of 28 bytes to 2 on channel businesschannel took 38µs" -"2019-05-02 01:30:55.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU cad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0152ms " -"2019-05-02 01:30:55.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU cae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.2µs " -"2019-05-02 01:30:55.081 UTC [orderer.common.cluster.step] handleMessage -> DEBU caf Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:55.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:55.109 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb1 Sending msg of 28 bytes to 3 on channel testchainid took 177µs" -"2019-05-02 01:30:55.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 283.5µs " -"2019-05-02 01:30:55.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb3 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:55.571 UTC [orderer.common.server] Broadcast -> DEBU cb4 Starting new Broadcast handler" -"2019-05-02 01:30:55.572 UTC [orderer.common.broadcast] Handle -> DEBU cb5 Starting new broadcast loop for 192.168.240.9:47382" -"2019-05-02 01:30:55.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb6 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" -"2019-05-02 01:30:55.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb8 Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" -"2019-05-02 01:30:55.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.7µs " -"2019-05-02 01:30:55.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.1µs " -"2019-05-02 01:30:55.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU cba Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:55.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:55.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cbd Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" -"2019-05-02 01:30:55.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbc Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:55.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.7µs " -"2019-05-02 01:30:55.592 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cbf [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47382 with txid '48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a' of type ENDORSER_TRANSACTION" -"2019-05-02 01:30:55.593 UTC [policies] Evaluate -> DEBU cc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:30:55.594 UTC [policies] Evaluate -> DEBU cc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:55.594 UTC [policies] Evaluate -> DEBU cc2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:30:55.595 UTC [policies] Evaluate -> DEBU cc3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:55.595 UTC [policies] Evaluate -> DEBU cc4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:30:55.595 UTC [msp] DeserializeIdentity -> DEBU cc5 Obtaining identity" -"2019-05-02 01:30:55.596 UTC [msp.identity] newIdentity -> DEBU cc6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:23.058 UTC [cauthdsl] func1 -> DEBU bb9 0xc001159a70 gate 1556789243058667500 evaluation starts" +"2019-05-02 09:27:23.060 UTC [cauthdsl] func2 -> DEBU bba 0xc001159a70 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.060 UTC [cauthdsl] func2 -> DEBU bbb 0xc001159a70 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:23.060 UTC [cauthdsl] func2 -> DEBU bbc 0xc001159a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:23.061 UTC [cauthdsl] func2 -> DEBU bbd 0xc001159a70 principal evaluation fails" +"2019-05-02 09:27:23.061 UTC [cauthdsl] func1 -> DEBU bbe 0xc001159a70 gate 1556789243058667500 evaluation fails" +"2019-05-02 09:27:23.061 UTC [policies] Evaluate -> DEBU bbf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.062 UTC [policies] Evaluate -> DEBU bc0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.062 UTC [policies] Evaluate -> DEBU bc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:23.063 UTC [cauthdsl] func1 -> DEBU bc2 0xc00118ec10 gate 1556789243063652700 evaluation starts" +"2019-05-02 09:27:23.064 UTC [cauthdsl] func2 -> DEBU bc3 0xc00118ec10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.069 UTC [cauthdsl] func2 -> DEBU bc4 0xc00118ec10 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:23.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bc5 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-05-02 09:27:23.070 UTC [msp] Validate -> DEBU bc6 MSP Org2MSP validating identity" +"2019-05-02 09:27:23.071 UTC [msp] getCertificationChain -> DEBU bc7 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:23.072 UTC [cauthdsl] func2 -> DEBU bc8 0xc00118ec10 principal matched by identity 0" +"2019-05-02 09:27:23.073 UTC [msp.identity] Verify -> DEBU bc9 Verify: digest = 00000000 38 a0 81 24 8f 33 ab 73 3d 14 8c ac 62 ab 1a 32 |8..$.3.s=...b..2| +00000010 27 4d a0 4b c7 b6 15 68 3a d1 42 b8 e9 5d 33 fe |'M.K...h:.B..]3.|" +"2019-05-02 09:27:23.073 UTC [msp.identity] Verify -> DEBU bca Verify: sig = 00000000 30 45 02 21 00 94 7f d4 b1 c0 40 9d 9c b3 db 14 |0E.!......@.....| +00000010 d1 39 25 3c 44 80 e6 de dc d0 a6 46 60 63 67 58 |.9% DEBU bcb 0xc00118ec10 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:23.079 UTC [cauthdsl] func1 -> DEBU bcc 0xc00118ec10 gate 1556789243063652700 evaluation succeeds" +"2019-05-02 09:27:23.079 UTC [policies] Evaluate -> DEBU bcd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.079 UTC [policies] Evaluate -> DEBU bce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bcf Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bd0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bd1 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:23.080 UTC [policies] Evaluate -> DEBU bd2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:23.081 UTC [common.deliver] deliverBlocks -> DEBU bd3 [channel: businesschannel] Received seekInfo (0xc0010cfe40) start: > stop: > from 172.18.0.5:42818" +"2019-05-02 09:27:23.081 UTC [fsblkstorage] Next -> DEBU bd4 Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +"2019-05-02 09:27:23.082 UTC [fsblkstorage] newBlockfileStream -> DEBU bd5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23938]" +"2019-05-02 09:27:23.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bd6 Remaining bytes=[47432], Going to peek [8] bytes" +"2019-05-02 09:27:23.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bd7 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23938], bytesOffset=[23941]}" +"2019-05-02 09:27:23.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bd8 blockbytes [23684] read from file [0]" +"2019-05-02 09:27:23.083 UTC [common.deliver] deliverBlocks -> DEBU bd9 [channel: businesschannel] Delivering block [1] for (0xc0010cfe40) for 172.18.0.5:42818" +"2019-05-02 09:27:23.094 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bda Remaining bytes=[23745], Going to peek [8] bytes" +"2019-05-02 09:27:23.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bdb Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}" +"2019-05-02 09:27:23.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bdc blockbytes [23742] read from file [0]" +"2019-05-02 09:27:23.095 UTC [common.deliver] deliverBlocks -> DEBU bdd [channel: businesschannel] Delivering block [2] for (0xc0010cfe40) for 172.18.0.5:42818" +"2019-05-02 09:27:23.096 UTC [fsblkstorage] waitForBlock -> DEBU bde Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-05-02 09:27:23.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU bdf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:23.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be0 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2019-05-02 09:27:23.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU be1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 384.5µs " +"2019-05-02 09:27:23.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be2 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" +"2019-05-02 09:27:23.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be3 Sending msg of 28 bytes to 3 on channel businesschannel took 27.2µs" +"2019-05-02 09:27:23.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU be4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.1µs " +"2019-05-02 09:27:23.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU be5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.1µs " +"2019-05-02 09:27:23.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU be6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:23.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU be7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:23.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU be8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:23.719 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be9 Sending msg of 28 bytes to 3 on channel testchainid took 152.4µs" +"2019-05-02 09:27:23.720 UTC [orderer.common.cluster.step] sendMessage -> DEBU bea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.4µs " +"2019-05-02 09:27:23.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU beb Sending msg of 28 bytes to 2 on channel businesschannel took 65.3µs" +"2019-05-02 09:27:23.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bec Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +"2019-05-02 09:27:23.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU bed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.4µs " +"2019-05-02 09:27:23.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU bee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 163.2µs " +"2019-05-02 09:27:23.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU bef Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:23.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:24.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:24.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf2 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-05-02 09:27:24.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +"2019-05-02 09:27:24.491 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf4 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +"2019-05-02 09:27:24.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf5 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +"2019-05-02 09:27:24.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 360.9µs " +"2019-05-02 09:27:24.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.1µs " +"2019-05-02 09:27:24.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:24.495 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:24.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU bfa Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:24.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfb Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2019-05-02 09:27:24.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU bfc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.2µs " +"2019-05-02 09:27:24.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfd Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +"2019-05-02 09:27:24.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfe Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2019-05-02 09:27:24.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU bff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs " +"2019-05-02 09:27:24.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 193.4µs " +"2019-05-02 09:27:24.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c01 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:24.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c02 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:25.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU c03 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:25.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c04 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +"2019-05-02 09:27:25.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.5µs " +"2019-05-02 09:27:25.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c06 Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +"2019-05-02 09:27:25.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c08 Sending msg of 28 bytes to 3 on channel businesschannel took 18.7µs" +"2019-05-02 09:27:25.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.5µs " +"2019-05-02 09:27:25.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU c09 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:25.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU c0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2669ms " +"2019-05-02 09:27:25.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c0b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:25.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU c0c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:25.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c0d Sending msg of 28 bytes to 3 on channel testchainid took 43.9µs" +"2019-05-02 09:27:25.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU c0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " +"2019-05-02 09:27:25.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c0f Sending msg of 28 bytes to 2 on channel businesschannel took 111.8µs" +"2019-05-02 09:27:25.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c10 Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +"2019-05-02 09:27:25.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU c11 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.4µs " +"2019-05-02 09:27:25.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72µs " +"2019-05-02 09:27:25.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU c13 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:25.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c14 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:26.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU c15 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:26.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c16 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2019-05-02 09:27:26.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs " +"2019-05-02 09:27:26.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c18 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +"2019-05-02 09:27:26.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c19 Sending msg of 28 bytes to 3 on channel businesschannel took 10.3µs" +"2019-05-02 09:27:26.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 363.6µs " +"2019-05-02 09:27:26.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 297.6µs " +"2019-05-02 09:27:26.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:26.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:26.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:26.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c1f Sending msg of 28 bytes to 3 on channel testchainid took 27.9µs" +"2019-05-02 09:27:26.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU c20 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.3µs " +"2019-05-02 09:27:26.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c21 Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" +"2019-05-02 09:27:26.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c22 Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +"2019-05-02 09:27:26.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.5µs " +"2019-05-02 09:27:26.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.5µs " +"2019-05-02 09:27:26.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c25 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:26.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c26 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:27.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU c27 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:27.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c28 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-05-02 09:27:27.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.4µs " +"2019-05-02 09:27:27.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2a Sending msg of 28 bytes to 2 on channel businesschannel took 89.5µs" +"2019-05-02 09:27:27.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2b Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +"2019-05-02 09:27:27.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.2µs " +"2019-05-02 09:27:27.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 567µs " +"2019-05-02 09:27:27.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:27.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:27.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU c30 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:27.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c31 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +"2019-05-02 09:27:27.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU c32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1744ms " +"2019-05-02 09:27:27.825 UTC [grpc] infof -> DEBU c33 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:27.825 UTC [common.deliver] deliverBlocks -> DEBU c34 Context canceled, aborting wait for next block" +"2019-05-02 09:27:27.826 UTC [orderer.common.server] func1 -> DEBU c35 Closing Deliver stream" +"2019-05-02 09:27:27.826 UTC [comm.grpc.server] 1 -> INFO c36 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:42818 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.7707471s +"2019-05-02 09:27:27.826 UTC [fsblkstorage] waitForBlock -> DEBU c37 Came out of wait. maxAvailaBlockNumber=[2]" +"2019-05-02 09:27:27.920 UTC [orderer.common.server] Broadcast -> DEBU c38 Starting new Broadcast handler" +"2019-05-02 09:27:27.920 UTC [orderer.common.broadcast] Handle -> DEBU c39 Starting new broadcast loop for 172.18.0.8:57248" +"2019-05-02 09:27:27.956 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c3a [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57248 with txid 'fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940' of type ENDORSER_TRANSACTION" +"2019-05-02 09:27:27.956 UTC [policies] Evaluate -> DEBU c3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:27.957 UTC [policies] Evaluate -> DEBU c3c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:27.957 UTC [policies] Evaluate -> DEBU c3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:27.957 UTC [policies] Evaluate -> DEBU c3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:27.958 UTC [policies] Evaluate -> DEBU c3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:27.958 UTC [msp] DeserializeIdentity -> DEBU c40 Obtaining identity" +"2019-05-02 09:27:27.959 UTC [msp.identity] newIdentity -> DEBU c41 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -4842,155 +4673,113 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:55.600 UTC [cauthdsl] func1 -> DEBU cc7 0xc000f93470 gate 1556760655600741700 evaluation starts" -"2019-05-02 01:30:55.601 UTC [cauthdsl] func2 -> DEBU cc8 0xc000f93470 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:55.602 UTC [cauthdsl] func2 -> DEBU cc9 0xc000f93470 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:55.603 UTC [cauthdsl] func2 -> DEBU cca 0xc000f93470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:30:55.603 UTC [cauthdsl] func2 -> DEBU ccb 0xc000f93470 principal evaluation fails" -"2019-05-02 01:30:55.604 UTC [cauthdsl] func1 -> DEBU ccc 0xc000f93470 gate 1556760655600741700 evaluation fails" -"2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU ccd Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU cce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU ccf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:30:55.605 UTC [cauthdsl] func1 -> DEBU cd0 0xc000fae5f0 gate 1556760655605125000 evaluation starts" -"2019-05-02 01:30:55.605 UTC [cauthdsl] func2 -> DEBU cd1 0xc000fae5f0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:55.605 UTC [cauthdsl] func2 -> DEBU cd2 0xc000fae5f0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:55.605 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cd3 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:30:55.605 UTC [msp] Validate -> DEBU cd4 MSP Org1MSP validating identity" -"2019-05-02 01:30:55.605 UTC [msp] getCertificationChain -> DEBU cd5 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:55.606 UTC [cauthdsl] func2 -> DEBU cd6 0xc000fae5f0 principal matched by identity 0" -"2019-05-02 01:30:55.606 UTC [msp.identity] Verify -> DEBU cd7 Verify: digest = 00000000 30 2b 78 82 93 28 6b 8b c3 cf 7e 75 7b a0 56 aa |0+x..(k...~u{.V.| -00000010 06 be 8a 3a cd 72 e3 7f 56 3a 6a 93 12 cc ee 11 |...:.r..V:j.....|" -"2019-05-02 01:30:55.607 UTC [msp.identity] Verify -> DEBU cd8 Verify: sig = 00000000 30 45 02 21 00 87 4b 3f 3c 2d 2e a3 58 0d 8b 10 |0E.!..K?<-..X...| -00000010 3f c6 c2 a1 6b 5a b2 25 2a 4a 96 1c 46 b8 2d 0b |?...kZ.%*J..F.-.| -00000020 e4 a9 39 92 37 02 20 67 ff 3a 3f 62 cd c9 90 e7 |..9.7. g.:?b....| -00000030 69 ed cb e1 7b d4 6d df b5 a5 8d 8f 8a 9c 01 b5 |i...{.m.........| -00000040 d1 e8 59 34 d4 0a f2 |..Y4...|" -"2019-05-02 01:30:55.607 UTC [cauthdsl] func2 -> DEBU cd9 0xc000fae5f0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:55.607 UTC [cauthdsl] func1 -> DEBU cda 0xc000fae5f0 gate 1556760655605125000 evaluation succeeds" -"2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU cdb Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU cdc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU cdd Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU cde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU cdf Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:30:55.608 UTC [policies] Evaluate -> DEBU ce0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:30:55.609 UTC [orderer.common.blockcutter] Ordered -> DEBU ce1 Enqueuing message into batch" -"2019-05-02 01:30:55.610 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ce2 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47382" -"2019-05-02 01:30:56.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs" -"2019-05-02 01:30:56.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce4 Sending msg of 28 bytes to 3 on channel businesschannel took 126.4µs" -"2019-05-02 01:30:56.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242µs " -"2019-05-02 01:30:56.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 391µs " -"2019-05-02 01:30:56.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:56.081 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce8 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:56.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:56.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cea Sending msg of 28 bytes to 3 on channel testchainid took 33.4µs" -"2019-05-02 01:30:56.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU ceb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 569.8µs " -"2019-05-02 01:30:56.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 2 on channel businesschannel took 27.6µs" -"2019-05-02 01:30:56.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ced Sending msg of 28 bytes to 3 on channel businesschannel took 23.9µs" -"2019-05-02 01:30:56.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU cee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.1µs " -"2019-05-02 01:30:56.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU cef Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:56.579 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf0 Sending msg of 28 bytes to 3 on channel testchainid took 119.2µs" -"2019-05-02 01:30:56.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305µs " -"2019-05-02 01:30:56.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.9783ms " -"2019-05-02 01:30:56.582 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:56.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:57.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" -"2019-05-02 01:30:57.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf6 Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" -"2019-05-02 01:30:57.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 244.2µs " -"2019-05-02 01:30:57.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.7µs " -"2019-05-02 01:30:57.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:57.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfa Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:57.092 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfb Sending msg of 28 bytes to 3 on channel testchainid took 877.9µs" -"2019-05-02 01:30:57.093 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481.7µs " -"2019-05-02 01:30:57.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:57.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfe Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" -"2019-05-02 01:30:57.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cff Sending msg of 28 bytes to 3 on channel businesschannel took 26.2µs" -"2019-05-02 01:30:57.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU d00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 351.7µs " -"2019-05-02 01:30:57.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU d01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 917.1µs " -"2019-05-02 01:30:57.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU d02 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:57.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU d03 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:57.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:57.584 UTC [orderer.common.cluster.step] sendMessage -> DEBU d05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs " -"2019-05-02 01:30:57.584 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d06 Sending msg of 28 bytes to 3 on channel testchainid took 381.9µs" -"2019-05-02 01:30:57.610 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d07 Batch timer expired, creating block" channel=businesschannel node=1 -"2019-05-02 01:30:57.611 UTC [orderer.consensus.etcdraft] propose -> INFO d08 Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-05-02 01:30:57.613 UTC [orderer.consensus.etcdraft] 2 -> DEBU d09 Proposed block [3] to raft consensus" channel=businesschannel node=1 -"2019-05-02 01:30:57.617 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 3831 bytes to 2 on channel businesschannel took 29.7µs" -"2019-05-02 01:30:57.618 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0b Sending msg of 3831 bytes to 3 on channel businesschannel took 79.7µs" -"2019-05-02 01:30:57.619 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 3831 to orderer1.example.com(orderer1.example.com:7050) took 145.6µs " -"2019-05-02 01:30:57.619 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0d Send of ConsensusRequest for channel businesschannel with payload of size 3831 to orderer2.example.com(orderer2.example.com:7050) took 1.0783ms " -"2019-05-02 01:30:57.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:57.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0f Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" -"2019-05-02 01:30:57.631 UTC [orderer.consensus.etcdraft] writeBlock -> INFO d10 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 -"2019-05-02 01:30:57.631 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU d11 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-05-02 01:30:57.631 UTC [msp.identity] Sign -> DEBU d12 Sign: plaintext: 0A020802120B0A090A03010203100418...BB09D4280BADE8B7D8379BF419E7E687 " -"2019-05-02 01:30:57.631 UTC [msp.identity] Sign -> DEBU d13 Sign: digest: C974EB1B312C4AB4F01370E131F82477FA39FDAC9005435B9F99F01CD94E6202 " -"2019-05-02 01:30:57.630 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d14 Sending msg of 28 bytes to 3 on channel businesschannel took 80.9µs" -"2019-05-02 01:30:57.635 UTC [fsblkstorage] indexBlock -> DEBU d15 Indexing block [blockNum=3, blockHash=[]byte{0xa8, 0xe, 0x22, 0x69, 0x53, 0xd1, 0x69, 0x7c, 0x0, 0x47, 0xba, 0xba, 0x55, 0xac, 0x35, 0x1e, 0xd5, 0x4c, 0xc4, 0x47, 0x90, 0xfc, 0xed, 0x3d, 0xc9, 0x7c, 0xf5, 0x2f, 0xee, 0xe9, 0x79, 0xd} txOffsets= -txId=48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a locPointer=offset=70, bytesLength=3705 +"2019-05-02 09:27:27.960 UTC [cauthdsl] func1 -> DEBU c42 0xc0008a61a0 gate 1556789247960911800 evaluation starts" +"2019-05-02 09:27:27.961 UTC [cauthdsl] func2 -> DEBU c43 0xc0008a61a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:27.961 UTC [cauthdsl] func2 -> DEBU c44 0xc0008a61a0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:27.962 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c45 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:27:27.963 UTC [msp] Validate -> DEBU c46 MSP Org1MSP validating identity" +"2019-05-02 09:27:27.963 UTC [msp] getCertificationChain -> DEBU c47 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:27.964 UTC [cauthdsl] func2 -> DEBU c48 0xc0008a61a0 principal matched by identity 0" +"2019-05-02 09:27:27.965 UTC [msp.identity] Verify -> DEBU c49 Verify: digest = 00000000 4d e3 34 38 46 86 b5 a2 c5 08 2a 3d 74 f1 7b 3d |M.48F.....*=t.{=| +00000010 ca d3 8e 76 16 ce 7f b2 7b 9b 62 8e 0f 55 ae ee |...v....{.b..U..|" +"2019-05-02 09:27:27.965 UTC [msp.identity] Verify -> DEBU c4a Verify: sig = 00000000 30 45 02 21 00 84 a6 c2 9c 60 54 00 ed 04 97 bd |0E.!.....`T.....| +00000010 e7 ef 54 53 c3 59 d9 32 03 66 c2 4e f0 dc 25 6e |..TS.Y.2.f.N..%n| +00000020 46 06 2e 6b 5e 02 20 34 53 a9 96 44 6f f9 5d 5e |F..k^. 4S..Do.]^| +00000030 5f cc e9 c0 33 db 1b 44 95 d1 cd 17 d4 7d a0 a3 |_...3..D.....}..| +00000040 fa b9 0d de c0 80 62 |......b|" +"2019-05-02 09:27:27.966 UTC [cauthdsl] func2 -> DEBU c4b 0xc0008a61a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:27.966 UTC [cauthdsl] func1 -> DEBU c4c 0xc0008a61a0 gate 1556789247960911800 evaluation succeeds" +"2019-05-02 09:27:27.967 UTC [policies] Evaluate -> DEBU c4d Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:27.968 UTC [policies] Evaluate -> DEBU c4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:27.968 UTC [policies] Evaluate -> DEBU c4f Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:27.968 UTC [policies] Evaluate -> DEBU c50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:27.969 UTC [policies] Evaluate -> DEBU c51 Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:27.969 UTC [policies] Evaluate -> DEBU c52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:27.970 UTC [orderer.common.blockcutter] Ordered -> DEBU c53 Enqueuing message into batch" +"2019-05-02 09:27:27.970 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c54 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57248" +"2019-05-02 09:27:27.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c55 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +"2019-05-02 09:27:27.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c56 Sending msg of 28 bytes to 3 on channel businesschannel took 173.3µs" +"2019-05-02 09:27:27.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.7µs " +"2019-05-02 09:27:27.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 161.9µs " +"2019-05-02 09:27:28.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c59 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs" +"2019-05-02 09:27:28.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5a Sending msg of 28 bytes to 3 on channel businesschannel took 171.9µs" +"2019-05-02 09:27:28.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.8µs " +"2019-05-02 09:27:28.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262µs " +"2019-05-02 09:27:28.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:28.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:28.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU c5f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:28.990 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c60 Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs" +"2019-05-02 09:27:28.990 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c61 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2019-05-02 09:27:28.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU c62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +"2019-05-02 09:27:28.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU c63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.3µs " +"2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c64 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c65 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c66 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:28.991 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c67 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU c68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " +"2019-05-02 09:27:28.991 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c69 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2019-05-02 09:27:28.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU c6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs " +"2019-05-02 09:27:28.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:28.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:29.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:29.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6e Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2019-05-02 09:27:29.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU c6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.6µs " +"2019-05-02 09:27:29.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c70 Sending msg of 28 bytes to 3 on channel businesschannel took 40.9µs" +"2019-05-02 09:27:29.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU c71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 171.1µs " +"2019-05-02 09:27:29.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU c72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.2µs " +"2019-05-02 09:27:29.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU c74 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:29.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c73 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +"2019-05-02 09:27:29.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU c75 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:29.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU c76 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:29.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c77 Sending msg of 28 bytes to 3 on channel testchainid took 28.9µs" +"2019-05-02 09:27:29.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU c78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 244.1µs " +"2019-05-02 09:27:29.971 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU c79 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-05-02 09:27:29.971 UTC [orderer.consensus.etcdraft] propose -> INFO c7a Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-05-02 09:27:29.972 UTC [orderer.consensus.etcdraft] 2 -> DEBU c7b Proposed block [3] to raft consensus" channel=businesschannel node=1 +"2019-05-02 09:27:29.976 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7c Sending msg of 3831 bytes to 3 on channel businesschannel took 18.1µs" +"2019-05-02 09:27:29.977 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7d Sending msg of 3831 bytes to 2 on channel businesschannel took 203.1µs" +"2019-05-02 09:27:29.977 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7e Send of ConsensusRequest for channel businesschannel with payload of size 3831 to orderer2.example.com(orderer2.example.com:7050) took 190.4µs " +"2019-05-02 09:27:29.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7f Send of ConsensusRequest for channel businesschannel with payload of size 3831 to orderer1.example.com(orderer1.example.com:7050) took 121.5µs " +"2019-05-02 09:27:29.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU c81 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:29.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c82 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +"2019-05-02 09:27:29.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c83 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +"2019-05-02 09:27:29.983 UTC [orderer.common.cluster.step] sendMessage -> DEBU c84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +"2019-05-02 09:27:29.983 UTC [orderer.consensus.etcdraft] writeBlock -> INFO c85 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +"2019-05-02 09:27:29.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU c86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.4µs " +"2019-05-02 09:27:29.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU c80 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:29.984 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c87 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-05-02 09:27:29.984 UTC [msp.identity] Sign -> DEBU c88 Sign: plaintext: 0A020802120B0A090A03010203100418...F97EED81623BCA86C8D9743A6BD37848 " +"2019-05-02 09:27:29.984 UTC [msp.identity] Sign -> DEBU c89 Sign: digest: 3A61CB55F205B840086B7312602C27B1721649382796FD94F5CA81888B1EDCF3 " +"2019-05-02 09:27:29.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:29.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:29.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8c Sending msg of 28 bytes to 2 on channel businesschannel took 22.7µs" +"2019-05-02 09:27:29.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8d Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs" +"2019-05-02 09:27:29.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 179.6µs " +"2019-05-02 09:27:29.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.4µs " +"2019-05-02 09:27:29.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU c90 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:29.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU c91 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:29.991 UTC [fsblkstorage] indexBlock -> DEBU c92 Indexing block [blockNum=3, blockHash=[]byte{0x19, 0xcd, 0xcd, 0x5c, 0x29, 0x4b, 0x7c, 0x44, 0xae, 0x5, 0xb7, 0xcb, 0x3a, 0xbf, 0xcb, 0xc3, 0xf2, 0xcc, 0x3c, 0xa9, 0x83, 0x39, 0x7c, 0x8f, 0x82, 0x59, 0xb5, 0x99, 0xa7, 0x3d, 0xe9, 0x5e} txOffsets= +txId=fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 locPointer=offset=70, bytesLength=3705 ]" -"2019-05-02 01:30:57.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU d17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.6µs " -"2019-05-02 01:30:57.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU d18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " -"2019-05-02 01:30:57.636 UTC [orderer.common.cluster.step] handleMessage -> DEBU d16 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:57.649 UTC [orderer.common.cluster.step] handleMessage -> DEBU d19 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:57.650 UTC [fsblkstorage] updateCheckpoint -> DEBU d1a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76082], isChainEmpty=[false], lastBlockNumber=[3]" -"2019-05-02 01:30:57.652 UTC [orderer.commmon.multichannel] commitBlock -> DEBU d1c [channel: businesschannel] Wrote block [3]" -"2019-05-02 01:30:57.650 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:57.652 UTC [fsblkstorage] waitForBlock -> DEBU d1d Came out of wait. maxAvailaBlockNumber=[3]" -"2019-05-02 01:30:57.660 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d1e Remaining bytes=[4712], Going to peek [8] bytes" -"2019-05-02 01:30:57.661 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d1f Returning blockbytes - length=[4710], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}" -"2019-05-02 01:30:57.661 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d20 blockbytes [4710] read from file [0]" -"2019-05-02 01:30:57.697 UTC [common.deliver] deliverBlocks -> DEBU d21 [channel: businesschannel] Delivering block [3] for (0xc0008bfb80) for 192.168.240.5:58984" -"2019-05-02 01:30:57.701 UTC [fsblkstorage] waitForBlock -> DEBU d22 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" -"2019-05-02 01:30:58.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d23 Sending msg of 28 bytes to 2 on channel businesschannel took 31.7µs" -"2019-05-02 01:30:58.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d24 Sending msg of 28 bytes to 3 on channel businesschannel took 31µs" -"2019-05-02 01:30:58.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU d25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.4µs " -"2019-05-02 01:30:58.082 UTC [orderer.common.cluster.step] handleMessage -> DEBU d26 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:58.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d28 Sending msg of 28 bytes to 3 on channel testchainid took 200.5µs" -"2019-05-02 01:30:58.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU d29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.8µs " -"2019-05-02 01:30:58.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU d27 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:58.103 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 26.4428ms " -"2019-05-02 01:30:58.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:58.150 UTC [grpc] infof -> DEBU d2c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:58.149 UTC [orderer.common.broadcast] Handle -> WARN d2d Error reading from 192.168.240.9:47382: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:58.157 UTC [orderer.common.server] func1 -> DEBU d2e Closing Broadcast stream" -"2019-05-02 01:30:58.158 UTC [comm.grpc.server] 1 -> INFO d2f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47382 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.5866356s -"2019-05-02 01:30:58.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d30 Sending msg of 28 bytes to 3 on channel businesschannel took 31.5µs" -"2019-05-02 01:30:58.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d31 Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" -"2019-05-02 01:30:58.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU d32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 438µs " -"2019-05-02 01:30:58.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU d33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.1µs " -"2019-05-02 01:30:58.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU d34 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:58.550 UTC [orderer.common.cluster.step] handleMessage -> DEBU d35 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:58.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU d36 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:58.553 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d37 Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs" -"2019-05-02 01:30:58.554 UTC [orderer.common.cluster.step] sendMessage -> DEBU d38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192µs " -"2019-05-02 01:30:59.043 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d39 Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" -"2019-05-02 01:30:59.043 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3a Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" -"2019-05-02 01:30:59.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 391.9µs " -"2019-05-02 01:30:59.047 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 278.1µs " -"2019-05-02 01:30:59.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:59.065 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:59.066 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:59.068 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d40 Sending msg of 28 bytes to 3 on channel testchainid took 64.8µs" -"2019-05-02 01:30:59.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU d41 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.9µs " -"2019-05-02 01:30:59.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU d42 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:30:59.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d43 Sending msg of 28 bytes to 3 on channel testchainid took 36.9µs" -"2019-05-02 01:30:59.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.8µs " -"2019-05-02 01:30:59.548 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d45 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" -"2019-05-02 01:30:59.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d46 Sending msg of 28 bytes to 3 on channel businesschannel took 21.6µs" -"2019-05-02 01:30:59.549 UTC [orderer.common.cluster.step] sendMessage -> DEBU d47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.3µs " -"2019-05-02 01:30:59.551 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6928ms " -"2019-05-02 01:30:59.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU d49 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:59.554 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:30:59.575 UTC [orderer.common.server] Broadcast -> DEBU d4b Starting new Broadcast handler" -"2019-05-02 01:30:59.575 UTC [orderer.common.broadcast] Handle -> DEBU d4c Starting new broadcast loop for 192.168.240.9:47392" -"2019-05-02 01:30:59.591 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d4d [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47392 with txid 'cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885' of type ENDORSER_TRANSACTION" -"2019-05-02 01:30:59.592 UTC [policies] Evaluate -> DEBU d4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:30:59.592 UTC [policies] Evaluate -> DEBU d4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:59.593 UTC [policies] Evaluate -> DEBU d50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:30:59.593 UTC [policies] Evaluate -> DEBU d51 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:59.594 UTC [policies] Evaluate -> DEBU d52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:30:59.594 UTC [msp] DeserializeIdentity -> DEBU d53 Obtaining identity" -"2019-05-02 01:30:59.595 UTC [msp.identity] newIdentity -> DEBU d54 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:29.999 UTC [fsblkstorage] updateCheckpoint -> DEBU c93 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76081], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-05-02 09:27:30.001 UTC [orderer.commmon.multichannel] commitBlock -> DEBU c94 [channel: businesschannel] Wrote block [3]" +"2019-05-02 09:27:30.053 UTC [grpc] infof -> DEBU c95 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:30.053 UTC [orderer.common.broadcast] Handle -> WARN c96 Error reading from 172.18.0.8:57248: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:30.055 UTC [orderer.common.server] func1 -> DEBU c97 Closing Broadcast stream" +"2019-05-02 09:27:30.056 UTC [comm.grpc.server] 1 -> INFO c98 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57248 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.137027s +"2019-05-02 09:27:30.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU c99 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:30.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " +"2019-05-02 09:27:30.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9b Sending msg of 28 bytes to 3 on channel testchainid took 38.2µs" +"2019-05-02 09:27:30.452 UTC [orderer.common.server] Broadcast -> DEBU c9c Starting new Broadcast handler" +"2019-05-02 09:27:30.452 UTC [orderer.common.broadcast] Handle -> DEBU c9d Starting new broadcast loop for 172.18.0.8:57260" +"2019-05-02 09:27:30.462 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c9e [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57260 with txid 'fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd' of type ENDORSER_TRANSACTION" +"2019-05-02 09:27:30.463 UTC [policies] Evaluate -> DEBU c9f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:30.464 UTC [policies] Evaluate -> DEBU ca0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:30.464 UTC [policies] Evaluate -> DEBU ca1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:30.464 UTC [policies] Evaluate -> DEBU ca2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:30.465 UTC [policies] Evaluate -> DEBU ca3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:30.465 UTC [msp] DeserializeIdentity -> DEBU ca4 Obtaining identity" +"2019-05-02 09:27:30.466 UTC [msp.identity] newIdentity -> DEBU ca5 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -5004,759 +4793,717 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:59.595 UTC [cauthdsl] func1 -> DEBU d55 0xc00107dbb0 gate 1556760659595780200 evaluation starts" -"2019-05-02 01:30:59.595 UTC [cauthdsl] func2 -> DEBU d56 0xc00107dbb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:59.596 UTC [cauthdsl] func2 -> DEBU d57 0xc00107dbb0 processing identity 0 with bytes of efef60" -"2019-05-02 01:30:59.596 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d58 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:30:59.597 UTC [msp] Validate -> DEBU d59 MSP Org2MSP validating identity" -"2019-05-02 01:30:59.597 UTC [msp] getCertificationChain -> DEBU d5a MSP Org2MSP getting certification chain" -"2019-05-02 01:30:59.598 UTC [cauthdsl] func2 -> DEBU d5b 0xc00107dbb0 principal matched by identity 0" -"2019-05-02 01:30:59.599 UTC [msp.identity] Verify -> DEBU d5c Verify: digest = 00000000 18 89 da 7d ee 2f fa 9d b7 31 99 e7 69 5c 72 c4 |...}./...1..i\r.| -00000010 32 53 fe b4 21 0f b5 62 f1 8f 2f de 95 92 26 b2 |2S..!..b../...&.|" -"2019-05-02 01:30:59.599 UTC [msp.identity] Verify -> DEBU d5d Verify: sig = 00000000 30 45 02 21 00 f7 20 96 b5 eb 51 76 b8 c6 3d b1 |0E.!.. ...Qv..=.| -00000010 4b 39 4a 1d 0b 7d 98 44 2c 4e 65 87 2a 1c e4 48 |K9J..}.D,Ne.*..H| -00000020 c4 14 e8 db 07 02 20 4e 2c ea b1 fc 8f f9 f3 13 |...... N,.......| -00000030 4a 95 7e 34 07 e1 af 27 36 33 64 f0 c5 79 a9 02 |J.~4...'63d..y..| -00000040 e4 c9 83 73 4f bc 7d |...sO.}|" -"2019-05-02 01:30:59.600 UTC [cauthdsl] func2 -> DEBU d5e 0xc00107dbb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:59.600 UTC [cauthdsl] func1 -> DEBU d5f 0xc00107dbb0 gate 1556760659595780200 evaluation succeeds" -"2019-05-02 01:30:59.600 UTC [policies] Evaluate -> DEBU d60 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:59.601 UTC [policies] Evaluate -> DEBU d61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:59.601 UTC [policies] Evaluate -> DEBU d62 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:30:59.602 UTC [policies] Evaluate -> DEBU d63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:30:59.603 UTC [policies] Evaluate -> DEBU d64 Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:30:59.603 UTC [policies] Evaluate -> DEBU d65 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:30:59.604 UTC [orderer.common.blockcutter] Ordered -> DEBU d66 Enqueuing message into batch" -"2019-05-02 01:30:59.604 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d67 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47392" -"2019-05-02 01:31:00.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d68 Sending msg of 28 bytes to 2 on channel businesschannel took 103.9µs" -"2019-05-02 01:31:00.044 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d69 Sending msg of 28 bytes to 3 on channel businesschannel took 107.8µs" -"2019-05-02 01:31:00.049 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 335µs " -"2019-05-02 01:31:00.050 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 522.8µs " -"2019-05-02 01:31:00.055 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:00.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:00.060 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6e Sending msg of 28 bytes to 3 on channel testchainid took 38.8µs" -"2019-05-02 01:31:00.061 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182.7µs " -"2019-05-02 01:31:00.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d70 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:00.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 2 on channel businesschannel took 37.8µs" -"2019-05-02 01:31:00.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d73 Sending msg of 28 bytes to 3 on channel businesschannel took 54.6µs" -"2019-05-02 01:31:00.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 286.6µs " -"2019-05-02 01:31:00.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU d74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.8µs " -"2019-05-02 01:31:00.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU d75 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:00.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU d76 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:00.548 UTC [orderer.common.cluster.step] handleMessage -> DEBU d77 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:00.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d78 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" -"2019-05-02 01:31:00.549 UTC [orderer.common.cluster.step] sendMessage -> DEBU d79 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.3µs " -"2019-05-02 01:31:00.734 UTC [orderer.common.server] replicateDisabledChains -> DEBU d7a No inactive chains to try to replicate" -"2019-05-02 01:31:01.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7b Sending msg of 28 bytes to 2 on channel businesschannel took 39.4µs" -"2019-05-02 01:31:01.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7c Sending msg of 28 bytes to 3 on channel businesschannel took 26.3µs" -"2019-05-02 01:31:01.044 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.5µs " -"2019-05-02 01:31:01.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:01.045 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7f Sending msg of 28 bytes to 3 on channel testchainid took 28.7µs" -"2019-05-02 01:31:01.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU d81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.1µs " -"2019-05-02 01:31:01.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU d80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 855.5µs " -"2019-05-02 01:31:01.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU d82 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:01.048 UTC [orderer.common.cluster.step] handleMessage -> DEBU d83 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:01.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.4µs " -"2019-05-02 01:31:01.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d85 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" -"2019-05-02 01:31:01.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d86 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" -"2019-05-02 01:31:01.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192.6µs " -"2019-05-02 01:31:01.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU d88 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:01.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU d89 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:01.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8a Sending msg of 28 bytes to 3 on channel testchainid took 546.8µs" -"2019-05-02 01:31:01.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:01.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 227.5µs " -"2019-05-02 01:31:01.606 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d8d Batch timer expired, creating block" channel=businesschannel node=1 -"2019-05-02 01:31:01.607 UTC [orderer.consensus.etcdraft] propose -> INFO d8e Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-05-02 01:31:01.608 UTC [orderer.consensus.etcdraft] 2 -> DEBU d8f Proposed block [4] to raft consensus" channel=businesschannel node=1 -"2019-05-02 01:31:01.611 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d90 Sending msg of 3830 bytes to 3 on channel businesschannel took 17.4µs" -"2019-05-02 01:31:01.611 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d91 Sending msg of 3830 bytes to 2 on channel businesschannel took 9.9µs" -"2019-05-02 01:31:01.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU d92 Send of ConsensusRequest for channel businesschannel with payload of size 3830 to orderer2.example.com(orderer2.example.com:7050) took 257.2µs " -"2019-05-02 01:31:01.612 UTC [orderer.common.cluster.step] sendMessage -> DEBU d93 Send of ConsensusRequest for channel businesschannel with payload of size 3830 to orderer1.example.com(orderer1.example.com:7050) took 583.4µs " -"2019-05-02 01:31:01.617 UTC [orderer.common.cluster.step] handleMessage -> DEBU d94 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:01.617 UTC [orderer.common.cluster.step] handleMessage -> DEBU d95 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:01.617 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d96 Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" -"2019-05-02 01:31:01.618 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d97 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" -"2019-05-02 01:31:01.618 UTC [orderer.common.cluster.step] sendMessage -> DEBU d98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 729.7µs " -"2019-05-02 01:31:01.618 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 345.3µs " -"2019-05-02 01:31:01.619 UTC [orderer.consensus.etcdraft] writeBlock -> INFO d9a Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 -"2019-05-02 01:31:01.619 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU d9b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-05-02 01:31:01.620 UTC [msp.identity] Sign -> DEBU d9c Sign: plaintext: 0A020802120B0A090A03010203100418...9BE696F5C828F8957916E872A6B976DF " -"2019-05-02 01:31:01.620 UTC [msp.identity] Sign -> DEBU d9d Sign: digest: 0B08D20E0E46085B67CA3888DA384E32446C1B0E25B5119CA851F1DEF393BF4F " -"2019-05-02 01:31:01.622 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:01.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:01.628 UTC [fsblkstorage] indexBlock -> DEBU da0 Indexing block [blockNum=4, blockHash=[]byte{0xf8, 0xa9, 0x4a, 0x62, 0xdc, 0x56, 0x89, 0xf, 0xb2, 0x6c, 0xee, 0x66, 0x95, 0x3d, 0x66, 0xa0, 0xae, 0x6d, 0x16, 0xd3, 0x60, 0x8f, 0x39, 0x0, 0x9b, 0xa7, 0xeb, 0x99, 0xf4, 0xfb, 0x35, 0xcf} txOffsets= -txId=cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885 locPointer=offset=70, bytesLength=3704 +"2019-05-02 09:27:30.467 UTC [cauthdsl] func1 -> DEBU ca6 0xc00026d9b0 gate 1556789250467801700 evaluation starts" +"2019-05-02 09:27:30.468 UTC [cauthdsl] func2 -> DEBU ca7 0xc00026d9b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:30.468 UTC [cauthdsl] func2 -> DEBU ca8 0xc00026d9b0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:30.469 UTC [cauthdsl] func2 -> DEBU ca9 0xc00026d9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:30.469 UTC [cauthdsl] func2 -> DEBU caa 0xc00026d9b0 principal evaluation fails" +"2019-05-02 09:27:30.469 UTC [cauthdsl] func1 -> DEBU cab 0xc00026d9b0 gate 1556789250467801700 evaluation fails" +"2019-05-02 09:27:30.470 UTC [policies] Evaluate -> DEBU cac Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:30.471 UTC [policies] Evaluate -> DEBU cad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:30.471 UTC [policies] Evaluate -> DEBU cae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-05-02 09:27:30.471 UTC [cauthdsl] func1 -> DEBU caf 0xc000280da0 gate 1556789250471780600 evaluation starts" +"2019-05-02 09:27:30.472 UTC [cauthdsl] func2 -> DEBU cb0 0xc000280da0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:30.472 UTC [cauthdsl] func2 -> DEBU cb1 0xc000280da0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:30.472 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cb2 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-05-02 09:27:30.473 UTC [msp] Validate -> DEBU cb3 MSP Org2MSP validating identity" +"2019-05-02 09:27:30.474 UTC [msp] getCertificationChain -> DEBU cb4 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:30.474 UTC [cauthdsl] func2 -> DEBU cb5 0xc000280da0 principal matched by identity 0" +"2019-05-02 09:27:30.475 UTC [msp.identity] Verify -> DEBU cb6 Verify: digest = 00000000 5f f7 a9 77 bb 08 23 e9 79 a3 1a 5a 4b df bf 14 |_..w..#.y..ZK...| +00000010 0b ee 78 cb 24 b7 9b 4f 26 45 ee c7 3a c5 0a 72 |..x.$..O&E..:..r|" +"2019-05-02 09:27:30.475 UTC [msp.identity] Verify -> DEBU cb7 Verify: sig = 00000000 30 44 02 20 42 94 36 89 e4 a8 e8 1f d1 03 2c 54 |0D. B.6.......,T| +00000010 08 33 49 2c a0 e6 9d e2 4e 10 2f f4 03 8f 1f 07 |.3I,....N./.....| +00000020 ef 9a af 12 02 20 29 ad 5f 1b 8d e8 b0 33 a5 20 |..... )._....3. | +00000030 ae 2d 97 79 ba c1 a3 a1 b6 f2 f7 62 cc b3 74 f4 |.-.y.......b..t.| +00000040 91 85 a0 fa 29 4d |....)M|" +"2019-05-02 09:27:30.476 UTC [cauthdsl] func2 -> DEBU cb8 0xc000280da0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:30.477 UTC [cauthdsl] func1 -> DEBU cb9 0xc000280da0 gate 1556789250471780600 evaluation succeeds" +"2019-05-02 09:27:30.477 UTC [policies] Evaluate -> DEBU cba Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:30.477 UTC [policies] Evaluate -> DEBU cbb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:30.478 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:30.478 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:30.478 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:30.479 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:30.479 UTC [orderer.common.blockcutter] Ordered -> DEBU cc0 Enqueuing message into batch" +"2019-05-02 09:27:30.479 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cc1 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57260" +"2019-05-02 09:27:30.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc2 Sending msg of 28 bytes to 2 on channel businesschannel took 92.8µs" +"2019-05-02 09:27:30.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc3 Sending msg of 28 bytes to 3 on channel businesschannel took 83.4µs" +"2019-05-02 09:27:30.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 284.8µs " +"2019-05-02 09:27:30.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.7µs " +"2019-05-02 09:27:30.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:30.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:30.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:30.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc9 Sending msg of 28 bytes to 3 on channel testchainid took 28.4µs" +"2019-05-02 09:27:30.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU cca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.3µs " +"2019-05-02 09:27:30.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccb Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" +"2019-05-02 09:27:30.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccc Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs" +"2019-05-02 09:27:30.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172µs " +"2019-05-02 09:27:30.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU cce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6002ms " +"2019-05-02 09:27:30.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:30.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:31.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:31.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd2 Sending msg of 28 bytes to 3 on channel testchainid took 55.9µs" +"2019-05-02 09:27:31.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs " +"2019-05-02 09:27:31.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd4 Sending msg of 28 bytes to 2 on channel businesschannel took 42.8µs" +"2019-05-02 09:27:31.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd5 Sending msg of 28 bytes to 3 on channel businesschannel took 31.6µs" +"2019-05-02 09:27:31.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 213.9µs " +"2019-05-02 09:27:31.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5292ms " +"2019-05-02 09:27:31.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:31.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:31.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU cda Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:31.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdb Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-05-02 09:27:31.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 340.2µs " +"2019-05-02 09:27:31.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.1µs " +"2019-05-02 09:27:31.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cde Sending msg of 28 bytes to 2 on channel businesschannel took 36.6µs" +"2019-05-02 09:27:31.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdf Sending msg of 28 bytes to 3 on channel businesschannel took 25.2µs" +"2019-05-02 09:27:31.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +"2019-05-02 09:27:31.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:31.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:32.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:32.214 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce4 Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" +"2019-05-02 09:27:32.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 309.9µs " +"2019-05-02 09:27:32.481 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU ce6 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-05-02 09:27:32.481 UTC [orderer.consensus.etcdraft] propose -> INFO ce7 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-05-02 09:27:32.481 UTC [orderer.consensus.etcdraft] 2 -> DEBU ce8 Proposed block [4] to raft consensus" channel=businesschannel node=1 +"2019-05-02 09:27:32.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce9 Sending msg of 3829 bytes to 2 on channel businesschannel took 22.4µs" +"2019-05-02 09:27:32.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cea Sending msg of 3829 bytes to 3 on channel businesschannel took 19.4µs" +"2019-05-02 09:27:32.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU ceb Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs " +"2019-05-02 09:27:32.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU cec Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer1.example.com(orderer1.example.com:7050) took 321µs " +"2019-05-02 09:27:32.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ced Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs" +"2019-05-02 09:27:32.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cee Sending msg of 28 bytes to 3 on channel businesschannel took 155.4µs" +"2019-05-02 09:27:32.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU cef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2069ms " +"2019-05-02 09:27:32.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.9µs " +"2019-05-02 09:27:32.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:32.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:32.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:32.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf4 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +"2019-05-02 09:27:32.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 3 on channel businesschannel took 99.1µs" +"2019-05-02 09:27:32.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " +"2019-05-02 09:27:32.494 UTC [orderer.consensus.etcdraft] writeBlock -> INFO cf7 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +"2019-05-02 09:27:32.495 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cf8 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-05-02 09:27:32.495 UTC [msp.identity] Sign -> DEBU cf9 Sign: plaintext: 0A020802120B0A090A03010203100418...E02EDFA4D45B9D6BFDE5AB324DC39AA4 " +"2019-05-02 09:27:32.495 UTC [msp.identity] Sign -> DEBU cfa Sign: digest: 09950A335BFF8CDB28DBD69079831BFC246A8BDC8347AB8D99A66E1A279D884C " +"2019-05-02 09:27:32.496 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.6µs " +"2019-05-02 09:27:32.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:32.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:32.501 UTC [fsblkstorage] indexBlock -> DEBU cfe Indexing block [blockNum=4, blockHash=[]byte{0x3f, 0x8b, 0xa1, 0x1f, 0x8f, 0x88, 0xc1, 0xba, 0x58, 0x69, 0x5b, 0x7b, 0xae, 0x78, 0x89, 0x9c, 0xeb, 0xc3, 0x4b, 0xbf, 0x99, 0xfe, 0xf3, 0x9e, 0xef, 0xe7, 0xb4, 0x8a, 0xe5, 0xe4, 0xa4, 0x51} txOffsets= +txId=fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd locPointer=offset=70, bytesLength=3703 ]" -"2019-05-02 01:31:01.631 UTC [fsblkstorage] updateCheckpoint -> DEBU da1 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80793], isChainEmpty=[false], lastBlockNumber=[4]" -"2019-05-02 01:31:01.631 UTC [fsblkstorage] waitForBlock -> DEBU da2 Came out of wait. maxAvailaBlockNumber=[4]" -"2019-05-02 01:31:01.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU da3 Remaining bytes=[4711], Going to peek [8] bytes" -"2019-05-02 01:31:01.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU da4 Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" -"2019-05-02 01:31:01.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU da5 blockbytes [4709] read from file [0]" -"2019-05-02 01:31:01.633 UTC [common.deliver] deliverBlocks -> DEBU da6 [channel: businesschannel] Delivering block [4] for (0xc0008bfb80) for 192.168.240.5:58984" -"2019-05-02 01:31:01.634 UTC [fsblkstorage] waitForBlock -> DEBU da7 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" -"2019-05-02 01:31:01.631 UTC [orderer.commmon.multichannel] commitBlock -> DEBU da8 [channel: businesschannel] Wrote block [4]" -"2019-05-02 01:31:01.689 UTC [grpc] infof -> DEBU da9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:01.690 UTC [orderer.common.broadcast] Handle -> WARN daa Error reading from 192.168.240.9:47392: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:01.690 UTC [orderer.common.server] func1 -> DEBU dab Closing Broadcast stream" -"2019-05-02 01:31:01.690 UTC [comm.grpc.server] 1 -> INFO dac streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47392 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1151715s -"2019-05-02 01:31:02.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dad Sending msg of 28 bytes to 2 on channel businesschannel took 71.7µs" -"2019-05-02 01:31:02.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dae Sending msg of 28 bytes to 3 on channel businesschannel took 29.1µs" -"2019-05-02 01:31:02.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU daf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 233.3µs " -"2019-05-02 01:31:02.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU db0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.1µs " -"2019-05-02 01:31:02.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU db1 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:02.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU db2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:02.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU db3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:02.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db4 Sending msg of 28 bytes to 3 on channel testchainid took 26.7µs" -"2019-05-02 01:31:02.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU db5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.5µs " -"2019-05-02 01:31:02.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db6 Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" -"2019-05-02 01:31:02.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db7 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" -"2019-05-02 01:31:02.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU db9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.2µs " -"2019-05-02 01:31:02.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU db8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 302.2µs " -"2019-05-02 01:31:02.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU dba Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:02.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbb Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:02.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbc Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:02.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbd Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" -"2019-05-02 01:31:02.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.9µs " -"2019-05-02 01:31:03.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbf Sending msg of 28 bytes to 3 on channel businesschannel took 32.6µs" -"2019-05-02 01:31:03.046 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:03.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 822.5µs " -"2019-05-02 01:31:03.046 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:03.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc3 Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" -"2019-05-02 01:31:03.047 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.3µs " -"2019-05-02 01:31:03.048 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc5 Sending msg of 28 bytes to 3 on channel testchainid took 26.7µs" -"2019-05-02 01:31:03.049 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 818.3µs " -"2019-05-02 01:31:03.050 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc7 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:03.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc8 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" -"2019-05-02 01:31:03.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc9 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" -"2019-05-02 01:31:03.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU dca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 284.4µs " -"2019-05-02 01:31:03.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 454.5µs " -"2019-05-02 01:31:03.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcc Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:03.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcd Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:03.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:03.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcf Sending msg of 28 bytes to 3 on channel testchainid took 99µs" -"2019-05-02 01:31:03.555 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.8868ms " -"2019-05-02 01:31:03.654 UTC [orderer.common.server] Broadcast -> DEBU dd1 Starting new Broadcast handler" -"2019-05-02 01:31:03.654 UTC [orderer.common.broadcast] Handle -> DEBU dd2 Starting new broadcast loop for 192.168.240.9:47414" -"2019-05-02 01:31:03.708 UTC [orderer.common.broadcast] ProcessMessage -> DEBU dd3 [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47414 with txid 'c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf' of type ENDORSER_TRANSACTION" -"2019-05-02 01:31:03.709 UTC [policies] Evaluate -> DEBU dd4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:31:03.709 UTC [policies] Evaluate -> DEBU dd5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:03.710 UTC [policies] Evaluate -> DEBU dd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:03.710 UTC [policies] Evaluate -> DEBU dd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:03.710 UTC [policies] Evaluate -> DEBU dd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:31:03.711 UTC [cauthdsl] func1 -> DEBU dd9 0xc000b99a40 gate 1556760663711080500 evaluation starts" -"2019-05-02 01:31:03.711 UTC [cauthdsl] func2 -> DEBU dda 0xc000b99a40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:03.711 UTC [cauthdsl] func2 -> DEBU ddb 0xc000b99a40 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:03.712 UTC [cauthdsl] func2 -> DEBU ddc 0xc000b99a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:03.712 UTC [cauthdsl] func2 -> DEBU ddd 0xc000b99a40 principal evaluation fails" -"2019-05-02 01:31:03.712 UTC [cauthdsl] func1 -> DEBU dde 0xc000b99a40 gate 1556760663711080500 evaluation fails" -"2019-05-02 01:31:03.713 UTC [policies] Evaluate -> DEBU ddf Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:03.713 UTC [policies] Evaluate -> DEBU de0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:03.713 UTC [policies] Evaluate -> DEBU de1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:03.714 UTC [cauthdsl] func1 -> DEBU de2 0xc000caa280 gate 1556760663714312200 evaluation starts" -"2019-05-02 01:31:03.714 UTC [cauthdsl] func2 -> DEBU de3 0xc000caa280 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:03.714 UTC [cauthdsl] func2 -> DEBU de4 0xc000caa280 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:03.715 UTC [cauthdsl] func2 -> DEBU de5 0xc000caa280 principal matched by identity 0" -"2019-05-02 01:31:03.715 UTC [msp.identity] Verify -> DEBU de6 Verify: digest = 00000000 03 14 9e 71 a1 36 1e 2d 0f 44 72 fa 0c 27 8f 81 |...q.6.-.Dr..'..| -00000010 23 a1 3c e5 44 3d ed 70 77 c3 f9 01 7c 4d 36 5b |#.<.D=.pw...|M6[|" -"2019-05-02 01:31:03.716 UTC [msp.identity] Verify -> DEBU de7 Verify: sig = 00000000 30 44 02 20 7d 9e 40 85 03 46 bf 49 0c 16 c7 f4 |0D. }.@..F.I....| -00000010 2d 15 37 bc 11 7e 31 6d 41 0b a4 02 37 c3 4d 4e |-.7..~1mA...7.MN| -00000020 67 3a 24 43 02 20 27 53 1c 1b e1 0c ef ef 89 d0 |g:$C. 'S........| -00000030 b0 27 77 60 0b a1 dd 73 6a a9 68 6a b4 b8 47 af |.'w`...sj.hj..G.| -00000040 a2 10 d6 ec 0e 1d |......|" -"2019-05-02 01:31:03.716 UTC [cauthdsl] func2 -> DEBU de8 0xc000caa280 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:03.717 UTC [cauthdsl] func1 -> DEBU de9 0xc000caa280 gate 1556760663714312200 evaluation succeeds" -"2019-05-02 01:31:03.717 UTC [policies] Evaluate -> DEBU dea Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:03.717 UTC [policies] Evaluate -> DEBU deb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:03.717 UTC [policies] Evaluate -> DEBU dec Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:03.718 UTC [policies] Evaluate -> DEBU ded == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:03.718 UTC [policies] Evaluate -> DEBU dee Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:31:03.718 UTC [policies] Evaluate -> DEBU def == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:31:03.719 UTC [orderer.common.blockcutter] Ordered -> DEBU df0 Enqueuing message into batch" -"2019-05-02 01:31:03.719 UTC [orderer.common.broadcast] ProcessMessage -> DEBU df1 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47414" -"2019-05-02 01:31:04.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df2 Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" -"2019-05-02 01:31:04.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df3 Sending msg of 28 bytes to 3 on channel businesschannel took 321.1µs" -"2019-05-02 01:31:04.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU df4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 360.7µs " -"2019-05-02 01:31:04.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU df5 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:04.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df9 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" -"2019-05-02 01:31:04.050 UTC [orderer.common.cluster.step] handleMessage -> DEBU df6 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:04.050 UTC [orderer.common.cluster.step] handleMessage -> DEBU df7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:04.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU df8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.1339ms " -"2019-05-02 01:31:04.057 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.8128ms " -"2019-05-02 01:31:04.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfb Sending msg of 28 bytes to 2 on channel businesschannel took 34.6µs" -"2019-05-02 01:31:04.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfc Sending msg of 28 bytes to 3 on channel businesschannel took 119.4µs" -"2019-05-02 01:31:04.548 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 689.6µs " -"2019-05-02 01:31:04.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfe Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:04.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dff Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" -"2019-05-02 01:31:04.550 UTC [orderer.common.cluster.step] sendMessage -> DEBU e00 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.3µs " -"2019-05-02 01:31:04.550 UTC [orderer.common.cluster.step] handleMessage -> DEBU e01 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:04.551 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 7.7646ms " -"2019-05-02 01:31:04.557 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:05.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e04 Sending msg of 28 bytes to 3 on channel businesschannel took 27.2µs" -"2019-05-02 01:31:05.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU e05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 307.7µs " -"2019-05-02 01:31:05.042 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:05.044 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 2 on channel businesschannel took 2.8148ms" -"2019-05-02 01:31:05.044 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.7µs " -"2019-05-02 01:31:05.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU e09 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:05.046 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:05.047 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0b Sending msg of 28 bytes to 3 on channel testchainid took 43.3µs" -"2019-05-02 01:31:05.048 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.7µs " -"2019-05-02 01:31:05.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0d Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" -"2019-05-02 01:31:05.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0e Sending msg of 28 bytes to 3 on channel businesschannel took 31µs" -"2019-05-02 01:31:05.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.557ms " -"2019-05-02 01:31:05.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU e10 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:05.548 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" -"2019-05-02 01:31:05.550 UTC [orderer.common.cluster.step] sendMessage -> DEBU e12 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7526ms " -"2019-05-02 01:31:05.550 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.9252ms " -"2019-05-02 01:31:05.553 UTC [orderer.common.cluster.step] handleMessage -> DEBU e14 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:05.553 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:05.722 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU e16 Batch timer expired, creating block" channel=businesschannel node=1 -"2019-05-02 01:31:05.727 UTC [orderer.consensus.etcdraft] propose -> INFO e17 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-05-02 01:31:05.735 UTC [orderer.consensus.etcdraft] 2 -> DEBU e18 Proposed block [5] to raft consensus" channel=businesschannel node=1 -"2019-05-02 01:31:05.869 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 4832 bytes to 2 on channel businesschannel took 24.6µs" -"2019-05-02 01:31:05.870 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1a Send of ConsensusRequest for channel businesschannel with payload of size 4832 to orderer1.example.com(orderer1.example.com:7050) took 204.3µs " -"2019-05-02 01:31:05.870 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 4832 bytes to 3 on channel businesschannel took 407.7µs" -"2019-05-02 01:31:05.871 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 4832 to orderer2.example.com(orderer2.example.com:7050) took 102.6µs " -"2019-05-02 01:31:05.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:05.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:05.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1f Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" -"2019-05-02 01:31:05.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" -"2019-05-02 01:31:05.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.7µs " -"2019-05-02 01:31:05.876 UTC [orderer.consensus.etcdraft] writeBlock -> INFO e20 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 -"2019-05-02 01:31:05.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.4µs " -"2019-05-02 01:31:05.877 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU e24 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-05-02 01:31:05.878 UTC [msp.identity] Sign -> DEBU e25 Sign: plaintext: 0A020802120B0A090A03010203100418...7933038FF5973B2516EC8E44CFBB6CC1 " -"2019-05-02 01:31:05.878 UTC [msp.identity] Sign -> DEBU e26 Sign: digest: 2D583A5B27164B164D8E8932C8E253B612B40369B9BE0A5B59B088934CD7D0D2 " -"2019-05-02 01:31:05.881 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:05.882 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:05.883 UTC [fsblkstorage] indexBlock -> DEBU e29 Indexing block [blockNum=5, blockHash=[]byte{0x11, 0xe8, 0x9b, 0x88, 0x21, 0x80, 0x3, 0xc4, 0xce, 0x32, 0x91, 0xc, 0x63, 0x34, 0x40, 0x39, 0xf7, 0xd7, 0x36, 0x66, 0x25, 0x30, 0x1a, 0x98, 0xf5, 0x12, 0x6d, 0x91, 0x34, 0x40, 0x38, 0xa8} txOffsets= -txId=c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf locPointer=offset=70, bytesLength=4706 +"2019-05-02 09:27:32.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU cff Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:32.505 UTC [fsblkstorage] updateCheckpoint -> DEBU d00 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80790], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-05-02 09:27:32.505 UTC [orderer.commmon.multichannel] commitBlock -> DEBU d01 [channel: businesschannel] Wrote block [4]" +"2019-05-02 09:27:32.559 UTC [orderer.common.broadcast] Handle -> WARN d02 Error reading from 172.18.0.8:57260: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:32.560 UTC [orderer.common.server] func1 -> DEBU d03 Closing Broadcast stream" +"2019-05-02 09:27:32.561 UTC [comm.grpc.server] 1 -> INFO d04 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57260 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1085268s +"2019-05-02 09:27:32.564 UTC [grpc] infof -> DEBU d05 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:32.716 UTC [orderer.common.cluster.step] handleMessage -> DEBU d06 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:32.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +"2019-05-02 09:27:32.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 7.7923ms " +"2019-05-02 09:27:32.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +"2019-05-02 09:27:32.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 28 bytes to 3 on channel businesschannel took 24.9µs" +"2019-05-02 09:27:32.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 289.6µs " +"2019-05-02 09:27:32.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 607.2µs " +"2019-05-02 09:27:32.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:32.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:33.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:33.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d10 Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" +"2019-05-02 09:27:33.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU d11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.7µs " +"2019-05-02 09:27:33.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 2 on channel businesschannel took 36.6µs" +"2019-05-02 09:27:33.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d13 Sending msg of 28 bytes to 3 on channel businesschannel took 25.1µs" +"2019-05-02 09:27:33.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 665.1µs " +"2019-05-02 09:27:33.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU d16 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:33.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 816.2µs " +"2019-05-02 09:27:33.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:33.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU d18 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:33.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d19 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +"2019-05-02 09:27:33.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.9µs " +"2019-05-02 09:27:33.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1b Sending msg of 28 bytes to 2 on channel businesschannel took 23.8µs" +"2019-05-02 09:27:33.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1c Sending msg of 28 bytes to 3 on channel businesschannel took 21µs" +"2019-05-02 09:27:33.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs " +"2019-05-02 09:27:33.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.9µs " +"2019-05-02 09:27:33.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:33.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:34.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d21 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:34.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d22 Sending msg of 28 bytes to 3 on channel testchainid took 33.6µs" +"2019-05-02 09:27:34.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU d23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.2µs " +"2019-05-02 09:27:34.412 UTC [orderer.common.server] Broadcast -> DEBU d24 Starting new Broadcast handler" +"2019-05-02 09:27:34.413 UTC [orderer.common.broadcast] Handle -> DEBU d25 Starting new broadcast loop for 172.18.0.8:57282" +"2019-05-02 09:27:34.470 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d26 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57282 with txid 'f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1' of type ENDORSER_TRANSACTION" +"2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d29 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:34.471 UTC [policies] Evaluate -> DEBU d2a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:34.472 UTC [policies] Evaluate -> DEBU d2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:34.472 UTC [cauthdsl] func1 -> DEBU d2c 0xc00084c660 gate 1556789254472084400 evaluation starts" +"2019-05-02 09:27:34.472 UTC [cauthdsl] func2 -> DEBU d2d 0xc00084c660 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:34.472 UTC [cauthdsl] func2 -> DEBU d2e 0xc00084c660 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:34.472 UTC [cauthdsl] func2 -> DEBU d2f 0xc00084c660 principal matched by identity 0" +"2019-05-02 09:27:34.472 UTC [msp.identity] Verify -> DEBU d30 Verify: digest = 00000000 e1 bc 9e ea 26 2e 53 22 7f 18 0b b0 a0 87 2f b7 |....&.S"....../.| +00000010 7d d4 55 a3 5c 3e 56 1a 13 08 07 eb 68 19 cc 23 |}.U.\>V.....h..#|" +"2019-05-02 09:27:34.472 UTC [msp.identity] Verify -> DEBU d31 Verify: sig = 00000000 30 44 02 20 5f 33 fb e6 a2 75 d0 8e db 9b 31 61 |0D. _3...u....1a| +00000010 af 03 73 4c 80 1b 5e 9a de a3 10 4c eb 80 6a 29 |..sL..^....L..j)| +00000020 90 1a 05 86 02 20 6c 70 70 d5 9b d0 9c 08 df ab |..... lpp.......| +00000030 8f fb 97 db 2e 62 f8 57 e7 41 2c 2e a6 81 56 32 |.....b.W.A,...V2| +00000040 e6 e4 37 e8 a5 f7 |..7...|" +"2019-05-02 09:27:34.473 UTC [cauthdsl] func2 -> DEBU d32 0xc00084c660 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:34.473 UTC [cauthdsl] func1 -> DEBU d33 0xc00084c660 gate 1556789254472084400 evaluation succeeds" +"2019-05-02 09:27:34.473 UTC [policies] Evaluate -> DEBU d34 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:34.473 UTC [policies] Evaluate -> DEBU d35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d36 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d38 Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:34.474 UTC [policies] Evaluate -> DEBU d39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:34.474 UTC [orderer.common.blockcutter] Ordered -> DEBU d3a Enqueuing message into batch" +"2019-05-02 09:27:34.475 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d3b [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57282" +"2019-05-02 09:27:34.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3c Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +"2019-05-02 09:27:34.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3d Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs" +"2019-05-02 09:27:34.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278.8µs " +"2019-05-02 09:27:34.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116µs " +"2019-05-02 09:27:34.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU d40 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:34.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU d41 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:34.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU d42 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:34.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d43 Sending msg of 28 bytes to 3 on channel testchainid took 128.4µs" +"2019-05-02 09:27:34.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 398.5µs " +"2019-05-02 09:27:34.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d45 Sending msg of 28 bytes to 2 on channel businesschannel took 93µs" +"2019-05-02 09:27:34.990 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d46 Sending msg of 28 bytes to 3 on channel businesschannel took 30.1µs" +"2019-05-02 09:27:34.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU d47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 514.3µs " +"2019-05-02 09:27:34.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.5µs " +"2019-05-02 09:27:34.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU d49 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:34.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:35.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:35.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4c Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +"2019-05-02 09:27:35.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.6µs " +"2019-05-02 09:27:35.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4e Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" +"2019-05-02 09:27:35.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4f Sending msg of 28 bytes to 3 on channel businesschannel took 46.8µs" +"2019-05-02 09:27:35.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 553.5µs " +"2019-05-02 09:27:35.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3489ms " +"2019-05-02 09:27:35.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU d52 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:35.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU d53 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:35.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU d54 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:35.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d55 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +"2019-05-02 09:27:35.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 284.7µs " +"2019-05-02 09:27:35.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d57 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs" +"2019-05-02 09:27:35.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d58 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" +"2019-05-02 09:27:35.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU d59 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.1µs " +"2019-05-02 09:27:35.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 393.1µs " +"2019-05-02 09:27:35.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:35.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:36.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:36.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5e Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" +"2019-05-02 09:27:36.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.8µs " +"2019-05-02 09:27:36.326 UTC [orderer.common.server] replicateDisabledChains -> DEBU d60 No inactive chains to try to replicate" +"2019-05-02 09:27:36.477 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d61 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-05-02 09:27:36.478 UTC [orderer.consensus.etcdraft] propose -> INFO d62 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-05-02 09:27:36.486 UTC [orderer.consensus.etcdraft] 2 -> DEBU d63 Proposed block [5] to raft consensus" channel=businesschannel node=1 +"2019-05-02 09:27:36.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU d64 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:36.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d65 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +"2019-05-02 09:27:36.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU d66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.6µs " +"2019-05-02 09:27:36.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d67 Sending msg of 4831 bytes to 2 on channel businesschannel took 24.8µs" +"2019-05-02 09:27:36.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d68 Sending msg of 4831 bytes to 3 on channel businesschannel took 16.3µs" +"2019-05-02 09:27:36.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU d69 Send of ConsensusRequest for channel businesschannel with payload of size 4831 to orderer2.example.com(orderer2.example.com:7050) took 361.7µs " +"2019-05-02 09:27:36.800 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6a Sending msg of 28 bytes to 2 on channel businesschannel took 11.7µs" +"2019-05-02 09:27:36.800 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6b Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs" +"2019-05-02 09:27:36.801 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6c Send of ConsensusRequest for channel businesschannel with payload of size 4831 to orderer1.example.com(orderer1.example.com:7050) took 149.2µs " +"2019-05-02 09:27:36.801 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 807.2µs " +"2019-05-02 09:27:36.802 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0942ms " +"2019-05-02 09:27:36.807 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:36.808 UTC [orderer.common.cluster.step] handleMessage -> DEBU d70 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:36.808 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +"2019-05-02 09:27:36.808 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d73 Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +"2019-05-02 09:27:36.809 UTC [orderer.common.cluster.step] sendMessage -> DEBU d74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262µs " +"2019-05-02 09:27:36.808 UTC [orderer.consensus.etcdraft] writeBlock -> INFO d72 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +"2019-05-02 09:27:36.809 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU d76 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-05-02 09:27:36.810 UTC [msp.identity] Sign -> DEBU d77 Sign: plaintext: 0A020802120B0A090A03010203100418...8D87BD4412B1A81CC613E34DE8F22984 " +"2019-05-02 09:27:36.810 UTC [msp.identity] Sign -> DEBU d78 Sign: digest: 6035AB39F3AF415B7E1B9C43BA898201E49D40DA63DC7DCEA85B2B1DD927BA29 " +"2019-05-02 09:27:36.809 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs " +"2019-05-02 09:27:36.811 UTC [orderer.common.cluster.step] handleMessage -> DEBU d79 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:36.815 UTC [fsblkstorage] indexBlock -> DEBU d7a Indexing block [blockNum=5, blockHash=[]byte{0x5f, 0x54, 0x4d, 0xff, 0x12, 0x65, 0x12, 0xe, 0xc5, 0x7f, 0x48, 0x3d, 0x97, 0x19, 0x5b, 0xa3, 0xda, 0x2c, 0x78, 0xea, 0x37, 0x3d, 0x8f, 0xde, 0xaf, 0x84, 0x17, 0xbc, 0xfa, 0xa4, 0xf2, 0xd1} txOffsets= +txId=f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1 locPointer=offset=70, bytesLength=4705 ]" -"2019-05-02 01:31:05.888 UTC [fsblkstorage] updateCheckpoint -> DEBU e2a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86506], isChainEmpty=[false], lastBlockNumber=[5]" -"2019-05-02 01:31:05.889 UTC [orderer.commmon.multichannel] commitBlock -> DEBU e2b [channel: businesschannel] Wrote block [5]" -"2019-05-02 01:31:05.889 UTC [fsblkstorage] waitForBlock -> DEBU e2c Came out of wait. maxAvailaBlockNumber=[5]" -"2019-05-02 01:31:05.889 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e2d Remaining bytes=[5713], Going to peek [8] bytes" -"2019-05-02 01:31:05.889 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e2e Returning blockbytes - length=[5711], placementInfo={fileNum=[0], startOffset=[80793], bytesOffset=[80795]}" -"2019-05-02 01:31:05.889 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e2f blockbytes [5711] read from file [0]" -"2019-05-02 01:31:05.889 UTC [common.deliver] deliverBlocks -> DEBU e30 [channel: businesschannel] Delivering block [5] for (0xc0008bfb80) for 192.168.240.5:58984" -"2019-05-02 01:31:05.889 UTC [fsblkstorage] waitForBlock -> DEBU e31 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-05-02 01:31:06.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e32 Sending msg of 28 bytes to 2 on channel businesschannel took 33µs" -"2019-05-02 01:31:06.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU e33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.8762ms " -"2019-05-02 01:31:06.048 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel businesschannel took 83.3µs" -"2019-05-02 01:31:06.049 UTC [orderer.common.cluster.step] handleMessage -> DEBU e35 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:06.051 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.4526ms " -"2019-05-02 01:31:06.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel testchainid took 60.8µs" -"2019-05-02 01:31:06.054 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:06.055 UTC [orderer.common.cluster.step] sendMessage -> DEBU e39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4711ms " -"2019-05-02 01:31:06.056 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:06.106 UTC [grpc] infof -> DEBU e3b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:06.108 UTC [orderer.common.broadcast] Handle -> WARN e3c Error reading from 192.168.240.9:47414: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:06.108 UTC [orderer.common.server] func1 -> DEBU e3d Closing Broadcast stream" -"2019-05-02 01:31:06.108 UTC [comm.grpc.server] 1 -> INFO e3e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47414 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.4542422s -"2019-05-02 01:31:06.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 2 on channel businesschannel took 27.5µs" -"2019-05-02 01:31:06.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262.5µs " -"2019-05-02 01:31:06.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e41 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" -"2019-05-02 01:31:06.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU e42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.6µs " -"2019-05-02 01:31:06.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:06.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:06.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU e45 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:06.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 3 on channel testchainid took 10.5µs" -"2019-05-02 01:31:06.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 254.8µs " -"2019-05-02 01:31:07.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 3 on channel businesschannel took 28.2µs" -"2019-05-02 01:31:07.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" -"2019-05-02 01:31:07.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.6µs " -"2019-05-02 01:31:07.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 245.5µs " -"2019-05-02 01:31:07.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:07.043 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4d Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" -"2019-05-02 01:31:07.044 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.2µs " -"2019-05-02 01:31:07.046 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:07.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU e50 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:07.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 2 on channel businesschannel took 51.6µs" -"2019-05-02 01:31:07.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e53 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" -"2019-05-02 01:31:07.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU e54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.8µs " -"2019-05-02 01:31:07.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.3µs " -"2019-05-02 01:31:07.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:07.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:07.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU e57 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:07.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e58 Sending msg of 28 bytes to 3 on channel testchainid took 341.3µs" -"2019-05-02 01:31:07.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e59 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.8µs " -"2019-05-02 01:31:07.953 UTC [orderer.common.server] Broadcast -> DEBU e5a Starting new Broadcast handler" -"2019-05-02 01:31:07.955 UTC [orderer.common.broadcast] Handle -> DEBU e5b Starting new broadcast loop for 192.168.240.9:47428" -"2019-05-02 01:31:08.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5c Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" -"2019-05-02 01:31:08.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5d Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" -"2019-05-02 01:31:08.040 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.2µs " -"2019-05-02 01:31:08.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " -"2019-05-02 01:31:08.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU e60 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:08.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU e61 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:08.043 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e62 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" -"2019-05-02 01:31:08.043 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.3µs " -"2019-05-02 01:31:08.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU e64 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:08.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e65 Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" -"2019-05-02 01:31:08.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e66 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" -"2019-05-02 01:31:08.540 UTC [orderer.common.cluster.step] sendMessage -> DEBU e67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131µs " -"2019-05-02 01:31:08.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU e68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.9µs " -"2019-05-02 01:31:08.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU e69 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:08.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6a Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:08.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:08.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" -"2019-05-02 01:31:08.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.2µs " -"2019-05-02 01:31:09.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6e Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" -"2019-05-02 01:31:09.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6f Sending msg of 28 bytes to 3 on channel businesschannel took 68.7µs" -"2019-05-02 01:31:09.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU e70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 346.6µs " -"2019-05-02 01:31:09.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU e72 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:09.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU e73 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:09.045 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" -"2019-05-02 01:31:09.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.7µs " -"2019-05-02 01:31:09.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU e71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.8µs " -"2019-05-02 01:31:09.049 UTC [orderer.common.cluster.step] handleMessage -> DEBU e76 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:09.358 UTC [orderer.common.broadcast] ProcessMessage -> DEBU e77 [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47428 with txid '13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa' of type ENDORSER_TRANSACTION" -"2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU e78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU e79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU e7a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU e7b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:09.361 UTC [policies] Evaluate -> DEBU e7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:31:09.361 UTC [cauthdsl] func1 -> DEBU e7d 0xc0010dac60 gate 1556760669361075100 evaluation starts" -"2019-05-02 01:31:09.362 UTC [cauthdsl] func2 -> DEBU e7e 0xc0010dac60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:09.362 UTC [cauthdsl] func2 -> DEBU e7f 0xc0010dac60 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:09.363 UTC [cauthdsl] func2 -> DEBU e80 0xc0010dac60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:09.363 UTC [cauthdsl] func2 -> DEBU e81 0xc0010dac60 principal evaluation fails" -"2019-05-02 01:31:09.363 UTC [cauthdsl] func1 -> DEBU e82 0xc0010dac60 gate 1556760669361075100 evaluation fails" -"2019-05-02 01:31:09.364 UTC [policies] Evaluate -> DEBU e83 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:09.364 UTC [policies] Evaluate -> DEBU e84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:09.364 UTC [policies] Evaluate -> DEBU e85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:09.364 UTC [cauthdsl] func1 -> DEBU e86 0xc0010db4a0 gate 1556760669364177100 evaluation starts" -"2019-05-02 01:31:09.364 UTC [cauthdsl] func2 -> DEBU e87 0xc0010db4a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:09.364 UTC [cauthdsl] func2 -> DEBU e88 0xc0010db4a0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:09.364 UTC [cauthdsl] func2 -> DEBU e89 0xc0010db4a0 principal matched by identity 0" -"2019-05-02 01:31:09.364 UTC [msp.identity] Verify -> DEBU e8a Verify: digest = 00000000 cc 3a cf e1 4b 35 9d 17 a9 e6 85 2b 0b 68 18 e9 |.:..K5.....+.h..| -00000010 77 c3 fe 6e 06 78 10 0b 0b f4 fd 12 77 69 d9 e1 |w..n.x......wi..|" -"2019-05-02 01:31:09.364 UTC [msp.identity] Verify -> DEBU e8b Verify: sig = 00000000 30 44 02 20 67 6f e6 58 06 60 f9 c7 a9 d4 28 51 |0D. go.X.`....(Q| -00000010 88 dc d4 b0 e9 12 85 b4 cf 09 57 11 7b 67 b9 a1 |..........W.{g..| -00000020 9e 18 f6 d1 02 20 33 cd ba ab b8 32 12 20 20 1a |..... 3....2. .| -00000030 02 ac 0c 82 b0 2a 5d d6 aa 02 45 f8 5e 92 62 d2 |.....*]...E.^.b.| -00000040 82 9a c0 c8 2a 6d |....*m|" -"2019-05-02 01:31:09.365 UTC [cauthdsl] func2 -> DEBU e8c 0xc0010db4a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:09.365 UTC [cauthdsl] func1 -> DEBU e8d 0xc0010db4a0 gate 1556760669364177100 evaluation succeeds" -"2019-05-02 01:31:09.365 UTC [policies] Evaluate -> DEBU e8e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:09.365 UTC [policies] Evaluate -> DEBU e8f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:09.365 UTC [policies] Evaluate -> DEBU e90 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:09.365 UTC [policies] Evaluate -> DEBU e91 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:09.366 UTC [policies] Evaluate -> DEBU e92 Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:31:09.366 UTC [policies] Evaluate -> DEBU e93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:31:09.366 UTC [orderer.common.blockcutter] Ordered -> DEBU e94 Enqueuing message into batch" -"2019-05-02 01:31:09.366 UTC [orderer.common.broadcast] ProcessMessage -> DEBU e95 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47428" -"2019-05-02 01:31:09.376 UTC [orderer.common.broadcast] Handle -> WARN e96 Error reading from 192.168.240.9:47428: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:09.376 UTC [orderer.common.server] func1 -> DEBU e97 Closing Broadcast stream" -"2019-05-02 01:31:09.377 UTC [comm.grpc.server] 1 -> INFO e98 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47428 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1.4237134s -"2019-05-02 01:31:09.377 UTC [grpc] infof -> DEBU e99 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:09.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9a Sending msg of 28 bytes to 3 on channel businesschannel took 28µs" -"2019-05-02 01:31:09.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9b Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" -"2019-05-02 01:31:09.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262µs " -"2019-05-02 01:31:09.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.3µs " -"2019-05-02 01:31:09.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:09.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:09.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 3 on channel testchainid took 28.9µs" -"2019-05-02 01:31:09.550 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 269µs " -"2019-05-02 01:31:09.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:10.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:10.055 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea4 Sending msg of 28 bytes to 3 on channel testchainid took 66.5µs" -"2019-05-02 01:31:10.056 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 948.2µs " -"2019-05-02 01:31:10.057 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea6 Sending msg of 28 bytes to 2 on channel businesschannel took 30.2µs" -"2019-05-02 01:31:10.057 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea7 Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" -"2019-05-02 01:31:10.057 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126µs " -"2019-05-02 01:31:10.057 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.7µs " -"2019-05-02 01:31:10.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaa Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:10.068 UTC [orderer.common.cluster.step] handleMessage -> DEBU eab Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:10.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" -"2019-05-02 01:31:10.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ead Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" -"2019-05-02 01:31:10.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU eae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.1µs " -"2019-05-02 01:31:10.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU eaf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.485ms " -"2019-05-02 01:31:10.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:10.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:10.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:10.547 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" -"2019-05-02 01:31:10.547 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.2µs " -"2019-05-02 01:31:11.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel businesschannel took 31.4µs" -"2019-05-02 01:31:11.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb6 Sending msg of 28 bytes to 2 on channel businesschannel took 229µs" -"2019-05-02 01:31:11.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203µs " -"2019-05-02 01:31:11.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 936.8µs " -"2019-05-02 01:31:11.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:11.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU eba Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:11.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:11.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebc Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" -"2019-05-02 01:31:11.048 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 650.5µs " -"2019-05-02 01:31:11.367 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU ebe Batch timer expired, creating block" channel=businesschannel node=1 -"2019-05-02 01:31:11.367 UTC [orderer.consensus.etcdraft] propose -> INFO ebf Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-05-02 01:31:11.368 UTC [orderer.consensus.etcdraft] 2 -> DEBU ec0 Proposed block [6] to raft consensus" channel=businesschannel node=1 -"2019-05-02 01:31:11.372 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec1 Send of ConsensusRequest for channel businesschannel with payload of size 3179 to orderer1.example.com(orderer1.example.com:7050) took 94.8µs " -"2019-05-02 01:31:11.372 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec2 Sending msg of 3179 bytes to 2 on channel businesschannel took 24.2µs" -"2019-05-02 01:31:11.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec3 Sending msg of 3179 bytes to 3 on channel businesschannel took 58µs" -"2019-05-02 01:31:11.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec4 Send of ConsensusRequest for channel businesschannel with payload of size 3179 to orderer2.example.com(orderer2.example.com:7050) took 277.8µs " -"2019-05-02 01:31:11.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec5 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:11.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec6 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" -"2019-05-02 01:31:11.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec9 Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" -"2019-05-02 01:31:11.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU eca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.8µs " -"2019-05-02 01:31:11.382 UTC [orderer.consensus.etcdraft] writeBlock -> INFO ec8 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 -"2019-05-02 01:31:11.384 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU ecc [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-05-02 01:31:11.382 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:11.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 214.6µs " -"2019-05-02 01:31:11.384 UTC [msp.identity] Sign -> DEBU ecd Sign: plaintext: 0A020802120B0A090A03010203100418...852B43AF71C442B6CFD54BBC64C93509 " -"2019-05-02 01:31:11.386 UTC [msp.identity] Sign -> DEBU ece Sign: digest: BE7CE61251F3D1B38FBBD66B52CD85C3FDBD35BFB532E3B5214288FB120B63E9 " -"2019-05-02 01:31:11.389 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecf Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:11.392 UTC [fsblkstorage] indexBlock -> DEBU ed0 Indexing block [blockNum=6, blockHash=[]byte{0x49, 0xe, 0xd3, 0x82, 0x36, 0xc9, 0x80, 0xf6, 0xc4, 0xf3, 0x7b, 0x6f, 0x90, 0xf7, 0xc6, 0xcb, 0x46, 0xe1, 0xdb, 0xf2, 0x2, 0x21, 0xed, 0x35, 0x8f, 0x6e, 0xd0, 0x6c, 0xf4, 0x4, 0xb9, 0xfd} txOffsets= -txId=13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa locPointer=offset=70, bytesLength=3053 +"2019-05-02 09:27:36.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:36.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:36.819 UTC [fsblkstorage] updateCheckpoint -> DEBU d7d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86501], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-05-02 09:27:36.819 UTC [orderer.commmon.multichannel] commitBlock -> DEBU d7e [channel: businesschannel] Wrote block [5]" +"2019-05-02 09:27:36.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:36.923 UTC [grpc] infof -> DEBU d80 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:36.925 UTC [orderer.common.broadcast] Handle -> WARN d81 Error reading from 172.18.0.8:57282: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:36.934 UTC [orderer.common.server] func1 -> DEBU d82 Closing Broadcast stream" +"2019-05-02 09:27:36.938 UTC [comm.grpc.server] 1 -> INFO d83 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57282 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.5251949s +"2019-05-02 09:27:36.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d84 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +"2019-05-02 09:27:36.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d85 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2019-05-02 09:27:36.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +"2019-05-02 09:27:36.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.2µs " +"2019-05-02 09:27:36.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU d88 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:36.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU d89 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:37.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:37.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8b Sending msg of 28 bytes to 3 on channel testchainid took 49.6µs" +"2019-05-02 09:27:37.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.5µs " +"2019-05-02 09:27:37.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8d Sending msg of 28 bytes to 2 on channel businesschannel took 83.6µs" +"2019-05-02 09:27:37.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8e Sending msg of 28 bytes to 3 on channel businesschannel took 30.7µs" +"2019-05-02 09:27:37.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.7µs " +"2019-05-02 09:27:37.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 273.8µs " +"2019-05-02 09:27:37.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU d92 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:37.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU d91 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:37.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU d93 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:37.718 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 3 on channel testchainid took 28µs" +"2019-05-02 09:27:37.718 UTC [orderer.common.cluster.step] sendMessage -> DEBU d95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 373µs " +"2019-05-02 09:27:37.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d96 Sending msg of 28 bytes to 2 on channel businesschannel took 48.9µs" +"2019-05-02 09:27:37.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d97 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2019-05-02 09:27:37.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU d98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 496.9µs " +"2019-05-02 09:27:37.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 653.2µs " +"2019-05-02 09:27:37.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:37.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:38.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:38.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +"2019-05-02 09:27:38.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.9µs " +"2019-05-02 09:27:38.286 UTC [orderer.common.server] Broadcast -> DEBU d9f Starting new Broadcast handler" +"2019-05-02 09:27:38.286 UTC [orderer.common.broadcast] Handle -> DEBU da0 Starting new broadcast loop for 172.18.0.8:57296" +"2019-05-02 09:27:38.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 3 on channel businesschannel took 78.4µs" +"2019-05-02 09:27:38.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da2 Sending msg of 28 bytes to 2 on channel businesschannel took 13.8µs" +"2019-05-02 09:27:38.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU da3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.9µs " +"2019-05-02 09:27:38.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU da4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +"2019-05-02 09:27:38.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU da5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:38.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU da6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:38.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU da7 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:38.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da8 Sending msg of 28 bytes to 3 on channel testchainid took 41.2µs" +"2019-05-02 09:27:38.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU da9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.2µs " +"2019-05-02 09:27:38.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daa Sending msg of 28 bytes to 2 on channel businesschannel took 28.7µs" +"2019-05-02 09:27:38.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dab Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +"2019-05-02 09:27:38.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU dac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.7µs " +"2019-05-02 09:27:38.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU dad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.9µs " +"2019-05-02 09:27:38.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU dae Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:38.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU daf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:39.220 UTC [orderer.common.cluster.step] handleMessage -> DEBU db0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:39.220 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db1 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +"2019-05-02 09:27:39.220 UTC [orderer.common.cluster.step] sendMessage -> DEBU db2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.7µs " +"2019-05-02 09:27:39.323 UTC [orderer.common.broadcast] ProcessMessage -> DEBU db3 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57296 with txid '592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9' of type ENDORSER_TRANSACTION" +"2019-05-02 09:27:39.324 UTC [policies] Evaluate -> DEBU db4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:39.324 UTC [policies] Evaluate -> DEBU db5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:39.324 UTC [policies] Evaluate -> DEBU db6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:39.325 UTC [policies] Evaluate -> DEBU db7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:39.325 UTC [policies] Evaluate -> DEBU db8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:39.326 UTC [cauthdsl] func1 -> DEBU db9 0xc000888f30 gate 1556789259325922700 evaluation starts" +"2019-05-02 09:27:39.326 UTC [cauthdsl] func2 -> DEBU dba 0xc000888f30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:39.326 UTC [cauthdsl] func2 -> DEBU dbb 0xc000888f30 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:39.327 UTC [cauthdsl] func2 -> DEBU dbc 0xc000888f30 principal matched by identity 0" +"2019-05-02 09:27:39.327 UTC [msp.identity] Verify -> DEBU dbd Verify: digest = 00000000 ee 3b ed f0 66 6a 84 41 a3 33 12 fd f6 cb eb d8 |.;..fj.A.3......| +00000010 14 22 98 43 7a 96 c1 8d 99 84 14 e1 47 90 8f fd |.".Cz.......G...|" +"2019-05-02 09:27:39.327 UTC [msp.identity] Verify -> DEBU dbe Verify: sig = 00000000 30 45 02 21 00 bd 46 9a fc 92 4f d4 7e 59 1b dc |0E.!..F...O.~Y..| +00000010 63 67 6c d1 a6 7a 05 97 e6 5a 66 bd a1 3b 6a 8e |cgl..z...Zf..;j.| +00000020 a0 dd 62 9d ed 02 20 0d 44 82 59 1d 36 d1 fe 40 |..b... .D.Y.6..@| +00000030 b7 a5 b2 72 f7 51 72 9f c8 89 8b 76 9f 45 9e 8d |...r.Qr....v.E..| +00000040 ef 22 01 d3 23 c9 7c |."..#.||" +"2019-05-02 09:27:39.328 UTC [cauthdsl] func2 -> DEBU dbf 0xc000888f30 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:39.328 UTC [cauthdsl] func1 -> DEBU dc0 0xc000888f30 gate 1556789259325922700 evaluation succeeds" +"2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc1 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc3 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc5 Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:39.328 UTC [policies] Evaluate -> DEBU dc6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:39.328 UTC [orderer.common.blockcutter] Ordered -> DEBU dc7 Enqueuing message into batch" +"2019-05-02 09:27:39.328 UTC [orderer.common.broadcast] ProcessMessage -> DEBU dc8 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57296" +"2019-05-02 09:27:39.332 UTC [orderer.common.broadcast] Handle -> WARN dc9 Error reading from 172.18.0.8:57296: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:39.334 UTC [orderer.common.server] func1 -> DEBU dca Closing Broadcast stream" +"2019-05-02 09:27:39.335 UTC [comm.grpc.server] 1 -> INFO dcb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57296 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1.0490441s +"2019-05-02 09:27:39.333 UTC [grpc] infof -> DEBU dcc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:39.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcd Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +"2019-05-02 09:27:39.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU dce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 563µs " +"2019-05-02 09:27:39.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcf Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +"2019-05-02 09:27:39.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.7µs " +"2019-05-02 09:27:39.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:39.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:39.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:39.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 3 on channel testchainid took 30.3µs" +"2019-05-02 09:27:39.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.4µs " +"2019-05-02 09:27:39.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd6 Sending msg of 28 bytes to 2 on channel businesschannel took 37.6µs" +"2019-05-02 09:27:39.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 206.4µs " +"2019-05-02 09:27:39.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd9 Sending msg of 28 bytes to 3 on channel businesschannel took 34.3µs" +"2019-05-02 09:27:39.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210.5µs " +"2019-05-02 09:27:39.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU dda Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:39.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddb Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:40.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddc Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:40.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddd Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" +"2019-05-02 09:27:40.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.6µs " +"2019-05-02 09:27:40.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddf Sending msg of 28 bytes to 2 on channel businesschannel took 36.2µs" +"2019-05-02 09:27:40.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de0 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +"2019-05-02 09:27:40.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU de1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 236.7µs " +"2019-05-02 09:27:40.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU de2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.2045ms " +"2019-05-02 09:27:40.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU de3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:40.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU de4 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:40.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU de5 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:40.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.8µs " +"2019-05-02 09:27:40.717 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de7 Sending msg of 28 bytes to 3 on channel testchainid took 31.3µs" +"2019-05-02 09:27:40.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de8 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +"2019-05-02 09:27:40.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de9 Sending msg of 28 bytes to 3 on channel businesschannel took 41µs" +"2019-05-02 09:27:40.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU dea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 285.5µs " +"2019-05-02 09:27:40.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU deb Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:40.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU dec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.8003ms " +"2019-05-02 09:27:40.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU ded Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:41.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU dee Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:41.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU def Sending msg of 28 bytes to 3 on channel testchainid took 20.3µs" +"2019-05-02 09:27:41.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 218.6µs " +"2019-05-02 09:27:41.331 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU df1 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-05-02 09:27:41.332 UTC [orderer.consensus.etcdraft] propose -> INFO df2 Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-05-02 09:27:41.333 UTC [orderer.consensus.etcdraft] 2 -> DEBU df3 Proposed block [6] to raft consensus" channel=businesschannel node=1 +"2019-05-02 09:27:41.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df4 Sending msg of 3181 bytes to 2 on channel businesschannel took 39.5µs" +"2019-05-02 09:27:41.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 3181 bytes to 3 on channel businesschannel took 18.9µs" +"2019-05-02 09:27:41.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU df6 Send of ConsensusRequest for channel businesschannel with payload of size 3181 to orderer1.example.com(orderer1.example.com:7050) took 100.1µs " +"2019-05-02 09:27:41.403 UTC [orderer.common.cluster.step] sendMessage -> DEBU df7 Send of ConsensusRequest for channel businesschannel with payload of size 3181 to orderer2.example.com(orderer2.example.com:7050) took 561µs " +"2019-05-02 09:27:41.407 UTC [orderer.common.cluster.step] handleMessage -> DEBU df8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:41.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df9 Sending msg of 28 bytes to 2 on channel businesschannel took 265.5µs" +"2019-05-02 09:27:41.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfa Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2019-05-02 09:27:41.408 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 384.8µs " +"2019-05-02 09:27:41.409 UTC [orderer.consensus.etcdraft] writeBlock -> INFO dfc Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +"2019-05-02 09:27:41.409 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU dfd [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-05-02 09:27:41.409 UTC [msp.identity] Sign -> DEBU dfe Sign: plaintext: 0A020802120B0A090A03010203100418...D151EC9BF7DFDE5658923E26A8AEB4BD " +"2019-05-02 09:27:41.410 UTC [msp.identity] Sign -> DEBU dff Sign: digest: 0929A37CDAAD05CF07385DEFE3C8BEB23C7FF4732E3F4F0D02A6404DFB92BAEA " +"2019-05-02 09:27:41.411 UTC [orderer.common.cluster.step] handleMessage -> DEBU e00 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:41.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 216.5µs " +"2019-05-02 09:27:41.412 UTC [fsblkstorage] indexBlock -> DEBU e02 Indexing block [blockNum=6, blockHash=[]byte{0x13, 0xd2, 0x4, 0x27, 0x55, 0xc2, 0x5f, 0x7c, 0x72, 0x4d, 0x56, 0xe4, 0x30, 0x48, 0x7e, 0xa, 0x6b, 0x2c, 0x6b, 0x68, 0x24, 0x9, 0x99, 0xcd, 0x22, 0x6, 0xb1, 0x32, 0xe5, 0x65, 0x92, 0x6c} txOffsets= +txId=592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9 locPointer=offset=70, bytesLength=3055 ]" -"2019-05-02 01:31:11.398 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:11.412 UTC [fsblkstorage] updateCheckpoint -> DEBU ed2 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90566], isChainEmpty=[false], lastBlockNumber=[6]" -"2019-05-02 01:31:11.414 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ed3 [channel: businesschannel] Wrote block [6]" -"2019-05-02 01:31:11.414 UTC [fsblkstorage] waitForBlock -> DEBU ed4 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-05-02 01:31:11.415 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ed5 Remaining bytes=[4060], Going to peek [8] bytes" -"2019-05-02 01:31:11.417 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ed6 Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86506], bytesOffset=[86508]}" -"2019-05-02 01:31:11.418 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ed7 blockbytes [4058] read from file [0]" -"2019-05-02 01:31:11.419 UTC [common.deliver] deliverBlocks -> DEBU ed8 [channel: businesschannel] Delivering block [6] for (0xc0008bfb80) for 192.168.240.5:58984" -"2019-05-02 01:31:11.421 UTC [fsblkstorage] waitForBlock -> DEBU ed9 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-05-02 01:31:11.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 2 on channel businesschannel took 34.4µs" -"2019-05-02 01:31:11.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edb Sending msg of 28 bytes to 3 on channel businesschannel took 28.4µs" -"2019-05-02 01:31:11.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU edc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178µs " -"2019-05-02 01:31:11.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU edd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 453.8µs " -"2019-05-02 01:31:11.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU ede Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:11.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU edf Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:11.549 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee1 Sending msg of 28 bytes to 3 on channel testchainid took 42.9µs" -"2019-05-02 01:31:11.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.2µs " -"2019-05-02 01:31:11.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:12.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee3 Sending msg of 28 bytes to 2 on channel businesschannel took 38.1µs" -"2019-05-02 01:31:12.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee4 Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" -"2019-05-02 01:31:12.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 254.3µs " -"2019-05-02 01:31:12.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.3µs " -"2019-05-02 01:31:12.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee7 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:12.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:12.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:12.045 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eea Sending msg of 28 bytes to 3 on channel testchainid took 10.7µs" -"2019-05-02 01:31:12.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU eeb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " -"2019-05-02 01:31:12.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eec Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" -"2019-05-02 01:31:12.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eee Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" -"2019-05-02 01:31:12.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU eef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.4µs " -"2019-05-02 01:31:12.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU eed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.2µs " -"2019-05-02 01:31:12.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:12.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:12.544 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 3 on channel testchainid took 71.1µs" -"2019-05-02 01:31:12.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " -"2019-05-02 01:31:12.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef4 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:13.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 2 on channel businesschannel took 24.7µs" -"2019-05-02 01:31:13.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef6 Sending msg of 28 bytes to 3 on channel businesschannel took 38µs" -"2019-05-02 01:31:13.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.8µs " -"2019-05-02 01:31:13.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1702ms " -"2019-05-02 01:31:13.042 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:13.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU efa Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:13.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU efb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:13.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efc Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" -"2019-05-02 01:31:13.047 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163µs " -"2019-05-02 01:31:13.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efe Sending msg of 28 bytes to 2 on channel businesschannel took 42.3µs" -"2019-05-02 01:31:13.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f00 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" -"2019-05-02 01:31:13.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.2µs " -"2019-05-02 01:31:13.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU eff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.3µs " -"2019-05-02 01:31:13.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU f02 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:13.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU f03 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:13.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU f04 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:13.550 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f05 Sending msg of 28 bytes to 3 on channel testchainid took 59.7µs" -"2019-05-02 01:31:13.551 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 605.8µs " -"2019-05-02 01:31:14.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f07 Sending msg of 28 bytes to 3 on channel businesschannel took 43.1µs" -"2019-05-02 01:31:14.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f09 Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" -"2019-05-02 01:31:14.049 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 835.8µs " -"2019-05-02 01:31:14.043 UTC [orderer.common.cluster.step] sendMessage -> DEBU f08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471µs " -"2019-05-02 01:31:14.055 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:14.067 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:14.072 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:14.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0e Sending msg of 28 bytes to 3 on channel testchainid took 311.4µs" -"2019-05-02 01:31:14.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2359ms " -"2019-05-02 01:31:14.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f10 Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" -"2019-05-02 01:31:14.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f11 Sending msg of 28 bytes to 3 on channel businesschannel took 18.7µs" -"2019-05-02 01:31:14.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU f12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.4µs " -"2019-05-02 01:31:14.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU f13 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:14.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f14 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" -"2019-05-02 01:31:14.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU f15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.2607ms " -"2019-05-02 01:31:14.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU f16 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:14.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU f17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 486.5µs " -"2019-05-02 01:31:14.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU f18 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:14.781 UTC [orderer.common.server] Broadcast -> DEBU f19 Starting new Broadcast handler" -"2019-05-02 01:31:14.781 UTC [orderer.common.broadcast] Handle -> DEBU f1a Starting new broadcast loop for 192.168.240.9:47440" -"2019-05-02 01:31:14.808 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f1b [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47440 with txid '1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183' of type ENDORSER_TRANSACTION" -"2019-05-02 01:31:14.809 UTC [policies] Evaluate -> DEBU f1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:31:14.809 UTC [policies] Evaluate -> DEBU f1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:14.810 UTC [policies] Evaluate -> DEBU f1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:14.810 UTC [policies] Evaluate -> DEBU f1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:14.810 UTC [policies] Evaluate -> DEBU f20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:31:14.811 UTC [cauthdsl] func1 -> DEBU f21 0xc001236880 gate 1556760674811134400 evaluation starts" -"2019-05-02 01:31:14.811 UTC [cauthdsl] func2 -> DEBU f22 0xc001236880 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:14.811 UTC [cauthdsl] func2 -> DEBU f23 0xc001236880 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:14.812 UTC [cauthdsl] func2 -> DEBU f24 0xc001236880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:14.812 UTC [cauthdsl] func2 -> DEBU f25 0xc001236880 principal evaluation fails" -"2019-05-02 01:31:14.813 UTC [cauthdsl] func1 -> DEBU f26 0xc001236880 gate 1556760674811134400 evaluation fails" -"2019-05-02 01:31:14.813 UTC [policies] Evaluate -> DEBU f27 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:14.814 UTC [policies] Evaluate -> DEBU f28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:14.814 UTC [policies] Evaluate -> DEBU f29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:14.814 UTC [cauthdsl] func1 -> DEBU f2a 0xc0012370c0 gate 1556760674814945400 evaluation starts" -"2019-05-02 01:31:14.815 UTC [cauthdsl] func2 -> DEBU f2b 0xc0012370c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:14.815 UTC [cauthdsl] func2 -> DEBU f2c 0xc0012370c0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:14.816 UTC [cauthdsl] func2 -> DEBU f2d 0xc0012370c0 principal matched by identity 0" -"2019-05-02 01:31:14.816 UTC [msp.identity] Verify -> DEBU f2e Verify: digest = 00000000 ae 68 b2 66 52 f0 23 85 03 d1 e6 d7 a5 7a e1 b1 |.h.fR.#......z..| -00000010 c9 9e 4a 42 17 65 4d 07 2c 58 78 00 bb 50 3b d1 |..JB.eM.,Xx..P;.|" -"2019-05-02 01:31:14.816 UTC [msp.identity] Verify -> DEBU f2f Verify: sig = 00000000 30 45 02 21 00 de e4 42 2b 7e c5 77 9f 6f 46 48 |0E.!...B+~.w.oFH| -00000010 81 4a aa d6 c3 23 79 c6 9a f9 43 c1 7c 47 0a 1d |.J...#y...C.|G..| -00000020 3b ab f7 cc ec 02 20 7d be 8f 68 b0 dc 63 ed 2b |;..... }..h..c.+| -00000030 fa 38 90 fb c4 6a 77 16 1d 4a 82 fc ef c9 ec 9c |.8...jw..J......| -00000040 a1 3e fb a4 7a 34 d4 |.>..z4.|" -"2019-05-02 01:31:14.817 UTC [cauthdsl] func2 -> DEBU f30 0xc0012370c0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:14.817 UTC [cauthdsl] func1 -> DEBU f31 0xc0012370c0 gate 1556760674814945400 evaluation succeeds" -"2019-05-02 01:31:14.817 UTC [policies] Evaluate -> DEBU f32 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:14.818 UTC [policies] Evaluate -> DEBU f33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:14.818 UTC [policies] Evaluate -> DEBU f34 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:14.818 UTC [policies] Evaluate -> DEBU f35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:14.819 UTC [policies] Evaluate -> DEBU f36 Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:31:14.819 UTC [policies] Evaluate -> DEBU f37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:31:14.819 UTC [orderer.common.blockcutter] Ordered -> DEBU f38 Enqueuing message into batch" -"2019-05-02 01:31:14.819 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f39 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47440" -"2019-05-02 01:31:14.823 UTC [grpc] infof -> DEBU f3a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:14.823 UTC [orderer.common.broadcast] Handle -> WARN f3b Error reading from 192.168.240.9:47440: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:14.824 UTC [orderer.common.server] func1 -> DEBU f3c Closing Broadcast stream" -"2019-05-02 01:31:14.824 UTC [comm.grpc.server] 1 -> INFO f3d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47440 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.7662ms -"2019-05-02 01:31:15.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3e Sending msg of 28 bytes to 2 on channel businesschannel took 127.3µs" -"2019-05-02 01:31:15.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 415.4µs " -"2019-05-02 01:31:15.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f40 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" -"2019-05-02 01:31:15.043 UTC [orderer.common.cluster.step] sendMessage -> DEBU f41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.4µs " -"2019-05-02 01:31:15.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:15.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU f43 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:15.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU f44 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:15.049 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f45 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" -"2019-05-02 01:31:15.049 UTC [orderer.common.cluster.step] sendMessage -> DEBU f46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.7µs " -"2019-05-02 01:31:15.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f47 Sending msg of 28 bytes to 2 on channel businesschannel took 42µs" -"2019-05-02 01:31:15.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f48 Sending msg of 28 bytes to 3 on channel businesschannel took 39.1µs" -"2019-05-02 01:31:15.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU f49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 179.9µs " -"2019-05-02 01:31:15.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.7µs " -"2019-05-02 01:31:15.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:15.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:15.544 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4d Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" -"2019-05-02 01:31:15.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.2µs " -"2019-05-02 01:31:15.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:16.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f50 Sending msg of 28 bytes to 2 on channel businesschannel took 38.3µs" -"2019-05-02 01:31:16.043 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f51 Sending msg of 28 bytes to 3 on channel businesschannel took 83µs" -"2019-05-02 01:31:16.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU f52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182.3µs " -"2019-05-02 01:31:16.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU f53 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:16.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU f54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.2µs " -"2019-05-02 01:31:16.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel testchainid took 143.9µs" -"2019-05-02 01:31:16.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU f56 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:16.048 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 680.8µs " -"2019-05-02 01:31:16.048 UTC [orderer.common.cluster.step] handleMessage -> DEBU f58 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:16.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f59 Sending msg of 28 bytes to 2 on channel businesschannel took 34.6µs" -"2019-05-02 01:31:16.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5b Sending msg of 28 bytes to 3 on channel businesschannel took 18.3µs" -"2019-05-02 01:31:16.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " -"2019-05-02 01:31:16.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 292.7µs " -"2019-05-02 01:31:16.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:16.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" -"2019-05-02 01:31:16.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.8µs " -"2019-05-02 01:31:16.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU f60 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:16.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU f61 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:16.820 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU f62 Batch timer expired, creating block" channel=businesschannel node=1 -"2019-05-02 01:31:16.821 UTC [orderer.consensus.etcdraft] propose -> INFO f63 Created block [7], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-05-02 01:31:16.822 UTC [orderer.consensus.etcdraft] 2 -> DEBU f64 Proposed block [7] to raft consensus" channel=businesschannel node=1 -"2019-05-02 01:31:16.826 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f65 Sending msg of 3170 bytes to 2 on channel businesschannel took 23.4µs" -"2019-05-02 01:31:16.826 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 3170 bytes to 3 on channel businesschannel took 25.1µs" -"2019-05-02 01:31:16.826 UTC [orderer.common.cluster.step] sendMessage -> DEBU f66 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 218.8µs " -"2019-05-02 01:31:16.827 UTC [orderer.common.cluster.step] sendMessage -> DEBU f68 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 101.5µs " -"2019-05-02 01:31:16.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU f69 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:16.831 UTC [orderer.consensus.etcdraft] writeBlock -> INFO f6a Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=1 -"2019-05-02 01:31:16.834 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU f6e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-05-02 01:31:16.835 UTC [msp.identity] Sign -> DEBU f6f Sign: plaintext: 0A020802120B0A090A03010203100418...959938B4CEB1403A1CD112F66273DB37 " -"2019-05-02 01:31:16.835 UTC [msp.identity] Sign -> DEBU f70 Sign: digest: 60FE5FC4683DA8F8D104F2DF88E5B60C917F14C9146CC12BE895B761939AF825 " -"2019-05-02 01:31:16.831 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:16.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6c Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" -"2019-05-02 01:31:16.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88µs " -"2019-05-02 01:31:16.836 UTC [orderer.common.cluster.step] handleMessage -> DEBU f71 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:16.836 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f72 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" -"2019-05-02 01:31:16.837 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 447.2µs " -"2019-05-02 01:31:16.840 UTC [fsblkstorage] indexBlock -> DEBU f74 Indexing block [blockNum=7, blockHash=[]byte{0xbc, 0xfa, 0x3c, 0x5a, 0xf3, 0x9f, 0x56, 0x93, 0x3b, 0x6f, 0xab, 0xd3, 0xf7, 0xd1, 0x48, 0x7b, 0xa0, 0x71, 0x3f, 0x9, 0x7d, 0xfc, 0x8, 0x82, 0xd0, 0xc4, 0xc7, 0x31, 0xfc, 0x30, 0x55, 0x44} txOffsets= -txId=1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183 locPointer=offset=70, bytesLength=3044 +"2019-05-02 09:27:41.414 UTC [fsblkstorage] updateCheckpoint -> DEBU e03 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90563], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-05-02 09:27:41.414 UTC [orderer.commmon.multichannel] commitBlock -> DEBU e04 [channel: businesschannel] Wrote block [6]" +"2019-05-02 09:27:41.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:41.433 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:41.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel businesschannel took 180.2µs" +"2019-05-02 09:27:41.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e08 Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +"2019-05-02 09:27:41.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU e09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 381.6µs " +"2019-05-02 09:27:41.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.7µs " +"2019-05-02 09:27:41.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:41.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:41.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:41.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0e Sending msg of 28 bytes to 3 on channel testchainid took 57.7µs" +"2019-05-02 09:27:41.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.7µs " +"2019-05-02 09:27:41.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 2 on channel businesschannel took 44.6µs" +"2019-05-02 09:27:41.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2019-05-02 09:27:41.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.4µs " +"2019-05-02 09:27:41.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91µs " +"2019-05-02 09:27:41.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU e14 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:41.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:42.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:42.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e17 Sending msg of 28 bytes to 3 on channel testchainid took 10.3µs" +"2019-05-02 09:27:42.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU e18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +"2019-05-02 09:27:42.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU e19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs " +"2019-05-02 09:27:42.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-05-02 09:27:42.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" +"2019-05-02 09:27:42.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 451.5µs " +"2019-05-02 09:27:42.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:42.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:42.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:42.716 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e20 Sending msg of 28 bytes to 3 on channel testchainid took 31.6µs" +"2019-05-02 09:27:42.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 552.2µs " +"2019-05-02 09:27:42.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel businesschannel took 63.8µs" +"2019-05-02 09:27:42.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.5µs " +"2019-05-02 09:27:42.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 2 on channel businesschannel took 28.7µs" +"2019-05-02 09:27:42.990 UTC [orderer.common.cluster.step] sendMessage -> DEBU e25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 461.7µs " +"2019-05-02 09:27:42.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU e26 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:42.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:43.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:43.216 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e29 Sending msg of 28 bytes to 3 on channel testchainid took 52.2µs" +"2019-05-02 09:27:43.216 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.2µs " +"2019-05-02 09:27:43.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 2 on channel businesschannel took 49.4µs" +"2019-05-02 09:27:43.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 3 on channel businesschannel took 27.8µs" +"2019-05-02 09:27:43.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 515.7µs " +"2019-05-02 09:27:43.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5106ms " +"2019-05-02 09:27:43.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:43.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:43.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:43.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU e32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.2µs " +"2019-05-02 09:27:43.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e33 Sending msg of 28 bytes to 3 on channel testchainid took 183.5µs" +"2019-05-02 09:27:43.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +"2019-05-02 09:27:43.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +"2019-05-02 09:27:43.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 397.2µs " +"2019-05-02 09:27:43.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7465ms " +"2019-05-02 09:27:43.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:43.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:44.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:44.183 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 467.6µs " +"2019-05-02 09:27:44.182 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3c Sending msg of 28 bytes to 3 on channel testchainid took 67.9µs" +"2019-05-02 09:27:44.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +"2019-05-02 09:27:44.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +"2019-05-02 09:27:44.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.8µs " +"2019-05-02 09:27:44.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.8µs " +"2019-05-02 09:27:44.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU e41 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:44.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:44.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:44.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e44 Sending msg of 28 bytes to 3 on channel testchainid took 44.7µs" +"2019-05-02 09:27:44.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU e45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2039ms " +"2019-05-02 09:27:44.932 UTC [orderer.common.server] Broadcast -> DEBU e46 Starting new Broadcast handler" +"2019-05-02 09:27:44.932 UTC [orderer.common.broadcast] Handle -> DEBU e47 Starting new broadcast loop for 172.18.0.8:57308" +"2019-05-02 09:27:44.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +"2019-05-02 09:27:44.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2019-05-02 09:27:44.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.9µs " +"2019-05-02 09:27:44.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.2µs " +"2019-05-02 09:27:44.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:44.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:44.956 UTC [orderer.common.broadcast] ProcessMessage -> DEBU e4e [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57308 with txid '91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0' of type ENDORSER_TRANSACTION" +"2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e4f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e50 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e51 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e52 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.957 UTC [policies] Evaluate -> DEBU e53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:44.957 UTC [cauthdsl] func1 -> DEBU e54 0xc0010e3a80 gate 1556789264957658800 evaluation starts" +"2019-05-02 09:27:44.957 UTC [cauthdsl] func2 -> DEBU e55 0xc0010e3a80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.957 UTC [cauthdsl] func2 -> DEBU e56 0xc0010e3a80 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:44.958 UTC [cauthdsl] func2 -> DEBU e57 0xc0010e3a80 principal matched by identity 0" +"2019-05-02 09:27:44.958 UTC [msp.identity] Verify -> DEBU e58 Verify: digest = 00000000 4b 54 f8 96 1e 46 32 1a 3e 10 d7 c7 2f 4b 4e af |KT...F2.>.../KN.| +00000010 64 13 11 09 83 a2 1e 74 33 1e 72 d2 2d 1e 49 33 |d......t3.r.-.I3|" +"2019-05-02 09:27:44.958 UTC [msp.identity] Verify -> DEBU e59 Verify: sig = 00000000 30 45 02 21 00 9a 74 50 45 f1 33 ed 80 bc 70 62 |0E.!..tPE.3...pb| +00000010 a6 3b 96 31 9d 46 f9 6f cb c3 bf 48 3c 00 f1 ff |.;.1.F.o...H<...| +00000020 0e ef 32 4e a2 02 20 6f f9 b6 f8 46 5b ad 9b 89 |..2N.. o...F[...| +00000030 9f 71 ee 1f 7e b2 2f e3 88 bf f4 76 96 0a a8 04 |.q..~./....v....| +00000040 fe 64 c2 00 aa 35 b0 |.d...5.|" +"2019-05-02 09:27:44.958 UTC [cauthdsl] func2 -> DEBU e5a 0xc0010e3a80 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.958 UTC [cauthdsl] func1 -> DEBU e5b 0xc0010e3a80 gate 1556789264957658800 evaluation succeeds" +"2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5e Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:44.958 UTC [policies] Evaluate -> DEBU e5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:44.959 UTC [policies] Evaluate -> DEBU e60 Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:44.959 UTC [policies] Evaluate -> DEBU e61 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:44.959 UTC [orderer.common.blockcutter] Ordered -> DEBU e62 Enqueuing message into batch" +"2019-05-02 09:27:44.959 UTC [orderer.common.broadcast] ProcessMessage -> DEBU e63 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57308" +"2019-05-02 09:27:44.963 UTC [grpc] infof -> DEBU e65 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:44.963 UTC [orderer.common.broadcast] Handle -> WARN e64 Error reading from 172.18.0.8:57308: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:44.963 UTC [orderer.common.server] func1 -> DEBU e66 Closing Broadcast stream" +"2019-05-02 09:27:44.963 UTC [comm.grpc.server] 1 -> INFO e67 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57308 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.1271ms +"2019-05-02 09:27:45.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:45.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e69 Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs" +"2019-05-02 09:27:45.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.7µs " +"2019-05-02 09:27:45.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 2 on channel businesschannel took 40.5µs" +"2019-05-02 09:27:45.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 3 on channel businesschannel took 36.2µs" +"2019-05-02 09:27:45.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 365µs " +"2019-05-02 09:27:45.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 204.2µs " +"2019-05-02 09:27:45.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:45.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:45.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:45.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e72 Sending msg of 28 bytes to 3 on channel testchainid took 113.1µs" +"2019-05-02 09:27:45.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU e73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.8µs " +"2019-05-02 09:27:45.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 2 on channel businesschannel took 88.9µs" +"2019-05-02 09:27:45.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e75 Sending msg of 28 bytes to 3 on channel businesschannel took 29µs" +"2019-05-02 09:27:45.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU e76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.9µs " +"2019-05-02 09:27:45.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.7µs " +"2019-05-02 09:27:45.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:45.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:46.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:46.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7b Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs" +"2019-05-02 09:27:46.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.7µs " +"2019-05-02 09:27:46.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 2 on channel businesschannel took 35.2µs" +"2019-05-02 09:27:46.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7e Sending msg of 28 bytes to 3 on channel businesschannel took 30.5µs" +"2019-05-02 09:27:46.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.8µs " +"2019-05-02 09:27:46.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.1µs " +"2019-05-02 09:27:46.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:46.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:46.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:46.682 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e84 Sending msg of 28 bytes to 3 on channel testchainid took 8.9µs" +"2019-05-02 09:27:46.682 UTC [orderer.common.cluster.step] sendMessage -> DEBU e85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs " +"2019-05-02 09:27:46.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 2 on channel businesschannel took 48.1µs" +"2019-05-02 09:27:46.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +"2019-05-02 09:27:46.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.8µs " +"2019-05-02 09:27:46.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 920µs " +"2019-05-02 09:27:46.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:46.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:46.960 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU e8c Batch timer expired, creating block" channel=businesschannel node=1 +"2019-05-02 09:27:46.961 UTC [orderer.consensus.etcdraft] propose -> INFO e8d Created block [7], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-05-02 09:27:46.961 UTC [orderer.consensus.etcdraft] 2 -> DEBU e8e Proposed block [7] to raft consensus" channel=businesschannel node=1 +"2019-05-02 09:27:46.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 3170 bytes to 2 on channel businesschannel took 21.8µs" +"2019-05-02 09:27:46.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e90 Sending msg of 3170 bytes to 3 on channel businesschannel took 12.8µs" +"2019-05-02 09:27:46.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 390.1µs " +"2019-05-02 09:27:46.965 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 196.6µs " +"2019-05-02 09:27:46.967 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:46.968 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e94 Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +"2019-05-02 09:27:46.968 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e95 Sending msg of 28 bytes to 3 on channel businesschannel took 93.2µs" +"2019-05-02 09:27:46.968 UTC [orderer.common.cluster.step] sendMessage -> DEBU e96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " +"2019-05-02 09:27:46.969 UTC [orderer.consensus.etcdraft] writeBlock -> INFO e97 Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=1 +"2019-05-02 09:27:46.969 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU e98 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-05-02 09:27:46.969 UTC [msp.identity] Sign -> DEBU e99 Sign: plaintext: 0A020802120B0A090A03010203100418...DAA07E5AE5AA5E062D063F7B0FFC2EE0 " +"2019-05-02 09:27:46.970 UTC [msp.identity] Sign -> DEBU e9a Sign: digest: 22E126E3A2EFA139FCCC3372D510C3F1A0191C4EC46B4CA19541E6F8ECCB3EA4 " +"2019-05-02 09:27:46.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:46.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.6µs " +"2019-05-02 09:27:46.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:46.976 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:46.980 UTC [fsblkstorage] indexBlock -> DEBU e9f Indexing block [blockNum=7, blockHash=[]byte{0x30, 0xa6, 0xff, 0xc, 0x32, 0x27, 0x9e, 0xbc, 0xbb, 0x79, 0xcc, 0xe2, 0x1a, 0x7f, 0x74, 0x43, 0x84, 0x98, 0x45, 0x15, 0x41, 0x88, 0x33, 0xee, 0x2a, 0x32, 0x97, 0xdb, 0xcf, 0x57, 0x3f, 0x8c} txOffsets= +txId=91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0 locPointer=offset=70, bytesLength=3044 ]" -"2019-05-02 01:31:16.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU f75 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:16.847 UTC [fsblkstorage] updateCheckpoint -> DEBU f76 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94616], isChainEmpty=[false], lastBlockNumber=[7]" -"2019-05-02 01:31:16.848 UTC [orderer.commmon.multichannel] commitBlock -> DEBU f77 [channel: businesschannel] Wrote block [7]" -"2019-05-02 01:31:16.849 UTC [fsblkstorage] waitForBlock -> DEBU f78 Came out of wait. maxAvailaBlockNumber=[7]" -"2019-05-02 01:31:16.849 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f79 Remaining bytes=[4050], Going to peek [8] bytes" -"2019-05-02 01:31:16.850 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f7a Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90566], bytesOffset=[90568]}" -"2019-05-02 01:31:16.850 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f7b blockbytes [4048] read from file [0]" -"2019-05-02 01:31:16.852 UTC [common.deliver] deliverBlocks -> DEBU f7c [channel: businesschannel] Delivering block [7] for (0xc0008bfb80) for 192.168.240.5:58984" -"2019-05-02 01:31:16.853 UTC [fsblkstorage] waitForBlock -> DEBU f7d Going to wait for newer blocks. maxAvailaBlockNumber=[7], waitForBlockNum=[8]" -"2019-05-02 01:31:17.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7e Sending msg of 28 bytes to 2 on channel businesschannel took 21.5µs" -"2019-05-02 01:31:17.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7f Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" -"2019-05-02 01:31:17.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU f80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.8µs " -"2019-05-02 01:31:17.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU f81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.21ms " -"2019-05-02 01:31:17.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU f82 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:17.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU f83 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:17.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU f84 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:17.045 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f85 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" -"2019-05-02 01:31:17.045 UTC [orderer.common.cluster.step] sendMessage -> DEBU f86 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.2µs " -"2019-05-02 01:31:17.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f87 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" -"2019-05-02 01:31:17.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f88 Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" -"2019-05-02 01:31:17.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU f89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.8µs " -"2019-05-02 01:31:17.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.9µs " -"2019-05-02 01:31:17.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:17.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8c Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:17.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:17.546 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8e Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" -"2019-05-02 01:31:17.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.7µs " -"2019-05-02 01:31:17.561 UTC [orderer.common.server] Broadcast -> DEBU f90 Starting new Broadcast handler" -"2019-05-02 01:31:17.561 UTC [orderer.common.broadcast] Handle -> DEBU f91 Starting new broadcast loop for 192.168.240.9:47454" -"2019-05-02 01:31:17.623 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f92 [channel: businesschannel] Broadcast is processing normal message from 192.168.240.9:47454 with txid 'ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b' of type ENDORSER_TRANSACTION" -"2019-05-02 01:31:17.624 UTC [policies] Evaluate -> DEBU f93 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:31:17.625 UTC [policies] Evaluate -> DEBU f94 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.625 UTC [policies] Evaluate -> DEBU f95 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:17.625 UTC [policies] Evaluate -> DEBU f96 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.625 UTC [policies] Evaluate -> DEBU f97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:31:17.625 UTC [cauthdsl] func1 -> DEBU f98 0xc001287800 gate 1556760677625271200 evaluation starts" -"2019-05-02 01:31:17.625 UTC [cauthdsl] func2 -> DEBU f99 0xc001287800 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.625 UTC [cauthdsl] func2 -> DEBU f9a 0xc001287800 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:17.625 UTC [cauthdsl] func2 -> DEBU f9b 0xc001287800 principal matched by identity 0" -"2019-05-02 01:31:17.626 UTC [msp.identity] Verify -> DEBU f9c Verify: digest = 00000000 66 e4 f2 de d2 a6 a0 d5 b6 09 1c 1e bd d8 2c fa |f.............,.| -00000010 93 b6 be a4 e5 76 0e 42 ca 72 e6 17 85 c4 ea 76 |.....v.B.r.....v|" -"2019-05-02 01:31:17.626 UTC [msp.identity] Verify -> DEBU f9d Verify: sig = 00000000 30 44 02 20 78 b3 37 1d ca ba c7 c9 5d 36 6d 83 |0D. x.7.....]6m.| -00000010 42 de 4a 72 50 d3 54 e1 f1 dc 3e e7 99 fb f5 c0 |B.JrP.T...>.....| -00000020 2a c9 95 0a 02 20 20 f0 1d d8 94 c2 2e d9 22 69 |*.... ......."i| -00000030 48 80 cc 13 de 39 9d 40 97 56 24 68 5a c9 8f 6f |H....9.@.V$hZ..o| -00000040 89 51 23 9f 67 ae |.Q#.g.|" -"2019-05-02 01:31:17.627 UTC [cauthdsl] func2 -> DEBU f9e 0xc001287800 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.627 UTC [cauthdsl] func1 -> DEBU f9f 0xc001287800 gate 1556760677625271200 evaluation succeeds" -"2019-05-02 01:31:17.627 UTC [policies] Evaluate -> DEBU fa0 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:17.627 UTC [policies] Evaluate -> DEBU fa1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:17.627 UTC [policies] Evaluate -> DEBU fa2 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:17.627 UTC [policies] Evaluate -> DEBU fa3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:17.628 UTC [policies] Evaluate -> DEBU fa4 Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:31:17.628 UTC [policies] Evaluate -> DEBU fa5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:31:17.629 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fa6 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.240.9:47454" -"2019-05-02 01:31:17.629 UTC [orderer.common.blockcutter] Ordered -> DEBU fa7 Enqueuing message into batch" -"2019-05-02 01:31:17.636 UTC [grpc] infof -> DEBU fa8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:17.637 UTC [orderer.common.broadcast] Handle -> WARN fa9 Error reading from 192.168.240.9:47454: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:17.637 UTC [orderer.common.server] func1 -> DEBU faa Closing Broadcast stream" -"2019-05-02 01:31:17.637 UTC [comm.grpc.server] 1 -> INFO fab streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47454 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=76.5719ms -"2019-05-02 01:31:18.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fac Sending msg of 28 bytes to 2 on channel businesschannel took 35µs" -"2019-05-02 01:31:18.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fad Sending msg of 28 bytes to 3 on channel businesschannel took 28.7µs" -"2019-05-02 01:31:18.043 UTC [orderer.common.cluster.step] sendMessage -> DEBU fae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 298.6µs " -"2019-05-02 01:31:18.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU faf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 230.2µs " -"2019-05-02 01:31:18.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:18.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb1 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:18.046 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:18.047 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb3 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" -"2019-05-02 01:31:18.048 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 404.2µs " -"2019-05-02 01:31:18.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb5 Sending msg of 28 bytes to 3 on channel businesschannel took 23.1µs" -"2019-05-02 01:31:18.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb6 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" -"2019-05-02 01:31:18.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 268.6µs " -"2019-05-02 01:31:18.540 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.6µs " -"2019-05-02 01:31:18.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:18.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU fba Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:18.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:18.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbc Sending msg of 28 bytes to 3 on channel testchainid took 59µs" -"2019-05-02 01:31:18.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " -"2019-05-02 01:31:19.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbe Sending msg of 28 bytes to 2 on channel businesschannel took 37.2µs" -"2019-05-02 01:31:19.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbf Sending msg of 28 bytes to 3 on channel businesschannel took 70.2µs" -"2019-05-02 01:31:19.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.1µs " -"2019-05-02 01:31:19.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 199µs " -"2019-05-02 01:31:19.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:19.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:19.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:19.047 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc5 Sending msg of 28 bytes to 3 on channel testchainid took 49.2µs" -"2019-05-02 01:31:19.048 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 286.5µs " -"2019-05-02 01:31:19.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc7 Sending msg of 28 bytes to 3 on channel businesschannel took 32.9µs" -"2019-05-02 01:31:19.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc8 Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" -"2019-05-02 01:31:19.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 226.7µs " -"2019-05-02 01:31:19.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU fca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.1µs " -"2019-05-02 01:31:19.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcb Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:19.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcc Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:19.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcd Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:19.548 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fce Sending msg of 28 bytes to 3 on channel testchainid took 66.3µs" -"2019-05-02 01:31:19.548 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.2µs " -"2019-05-02 01:31:19.637 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU fd0 Batch timer expired, creating block" channel=businesschannel node=1 -"2019-05-02 01:31:19.638 UTC [orderer.consensus.etcdraft] propose -> INFO fd1 Created block [8], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-05-02 01:31:19.638 UTC [orderer.consensus.etcdraft] 2 -> DEBU fd2 Proposed block [8] to raft consensus" channel=businesschannel node=1 -"2019-05-02 01:31:19.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd3 Sending msg of 3170 bytes to 2 on channel businesschannel took 31µs" -"2019-05-02 01:31:19.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd4 Sending msg of 3170 bytes to 3 on channel businesschannel took 115.4µs" -"2019-05-02 01:31:19.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 296.1µs " -"2019-05-02 01:31:19.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd6 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 192.1µs " -"2019-05-02 01:31:19.648 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd7 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:19.648 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd8 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:19.649 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd9 Sending msg of 28 bytes to 2 on channel businesschannel took 71.9µs" -"2019-05-02 01:31:19.649 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fda Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" -"2019-05-02 01:31:19.650 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481.5µs " -"2019-05-02 01:31:19.651 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 303.1µs " -"2019-05-02 01:31:19.650 UTC [orderer.consensus.etcdraft] writeBlock -> INFO fdd Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=1 -"2019-05-02 01:31:19.654 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU fde [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-05-02 01:31:19.654 UTC [msp.identity] Sign -> DEBU fdf Sign: plaintext: 0A020802120B0A090A03010203100418...96D5DE151ED094B63E0191F6F0A5035A " -"2019-05-02 01:31:19.654 UTC [msp.identity] Sign -> DEBU fe0 Sign: digest: 88D28832267011D22D6A63318239160ED42B75F445EEBA327A76376257FD0051 " -"2019-05-02 01:31:19.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:19.662 UTC [fsblkstorage] indexBlock -> DEBU fe2 Indexing block [blockNum=8, blockHash=[]byte{0xec, 0x7a, 0xf9, 0x87, 0x2a, 0xf6, 0xf9, 0xf3, 0x9d, 0x8, 0x72, 0xc7, 0xa9, 0xe8, 0x8f, 0xb7, 0xe, 0x92, 0xd, 0x6d, 0x8e, 0xab, 0xc4, 0xfc, 0xd4, 0x86, 0x3b, 0x46, 0x29, 0x92, 0x30, 0x8d} txOffsets= -txId=ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b locPointer=offset=70, bytesLength=3044 +"2019-05-02 09:27:46.985 UTC [fsblkstorage] updateCheckpoint -> DEBU ea0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94614], isChainEmpty=[false], lastBlockNumber=[7]" +"2019-05-02 09:27:46.986 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ea1 [channel: businesschannel] Wrote block [7]" +"2019-05-02 09:27:47.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:47.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2019-05-02 09:27:47.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.4µs " +"2019-05-02 09:27:47.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea5 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +"2019-05-02 09:27:47.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2019-05-02 09:27:47.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 196.2µs " +"2019-05-02 09:27:47.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 334.7µs " +"2019-05-02 09:27:47.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:47.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaa Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:47.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU eab Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:47.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-05-02 09:27:47.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU ead Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191.4µs " +"2019-05-02 09:27:47.735 UTC [orderer.common.server] Broadcast -> DEBU eae Starting new Broadcast handler" +"2019-05-02 09:27:47.735 UTC [orderer.common.broadcast] Handle -> DEBU eaf Starting new broadcast loop for 172.18.0.8:57322" +"2019-05-02 09:27:47.765 UTC [orderer.common.broadcast] ProcessMessage -> DEBU eb0 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.8:57322 with txid 'f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176' of type ENDORSER_TRANSACTION" +"2019-05-02 09:27:47.766 UTC [policies] Evaluate -> DEBU eb1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:27:47.766 UTC [policies] Evaluate -> DEBU eb2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:47.766 UTC [policies] Evaluate -> DEBU eb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:47.767 UTC [policies] Evaluate -> DEBU eb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:47.767 UTC [policies] Evaluate -> DEBU eb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:47.768 UTC [cauthdsl] func1 -> DEBU eb6 0xc001129c30 gate 1556789267767870500 evaluation starts" +"2019-05-02 09:27:47.768 UTC [cauthdsl] func2 -> DEBU eb7 0xc001129c30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:47.768 UTC [cauthdsl] func2 -> DEBU eb8 0xc001129c30 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:47.769 UTC [cauthdsl] func2 -> DEBU eb9 0xc001129c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:47.769 UTC [cauthdsl] func2 -> DEBU eba 0xc001129c30 principal evaluation fails" +"2019-05-02 09:27:47.769 UTC [cauthdsl] func1 -> DEBU ebb 0xc001129c30 gate 1556789267767870500 evaluation fails" +"2019-05-02 09:27:47.770 UTC [policies] Evaluate -> DEBU ebc Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:47.770 UTC [policies] Evaluate -> DEBU ebd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:47.770 UTC [policies] Evaluate -> DEBU ebe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-05-02 09:27:47.771 UTC [cauthdsl] func1 -> DEBU ebf 0xc00118f090 gate 1556789267771324800 evaluation starts" +"2019-05-02 09:27:47.771 UTC [cauthdsl] func2 -> DEBU ec0 0xc00118f090 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:47.772 UTC [cauthdsl] func2 -> DEBU ec1 0xc00118f090 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:47.772 UTC [cauthdsl] func2 -> DEBU ec2 0xc00118f090 principal matched by identity 0" +"2019-05-02 09:27:47.773 UTC [msp.identity] Verify -> DEBU ec3 Verify: digest = 00000000 9d 1a 32 6d 5f bc 13 f8 45 b8 60 0f 16 f8 bd cf |..2m_...E.`.....| +00000010 c4 1a 80 39 8d 13 0e de 7d 1f 66 83 ff 2d da be |...9....}.f..-..|" +"2019-05-02 09:27:47.773 UTC [msp.identity] Verify -> DEBU ec4 Verify: sig = 00000000 30 44 02 20 13 0a fa 13 d5 6c 5e 7f b5 37 72 79 |0D. .....l^..7ry| +00000010 2d 47 b9 8d aa ba ae 33 ba 66 86 a4 f4 55 83 9d |-G.....3.f...U..| +00000020 8a 12 53 97 02 20 63 42 a9 84 5f 26 98 76 1f b4 |..S.. cB.._&.v..| +00000030 48 24 eb b5 bc 89 71 b6 f1 f0 97 16 ba 96 06 64 |H$....q........d| +00000040 4f b1 ca 9f 55 1a |O...U.|" +"2019-05-02 09:27:47.774 UTC [cauthdsl] func2 -> DEBU ec5 0xc00118f090 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:47.774 UTC [cauthdsl] func1 -> DEBU ec6 0xc00118f090 gate 1556789267771324800 evaluation succeeds" +"2019-05-02 09:27:47.774 UTC [policies] Evaluate -> DEBU ec7 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:47.775 UTC [policies] Evaluate -> DEBU ec8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:47.775 UTC [policies] Evaluate -> DEBU ec9 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:47.775 UTC [policies] Evaluate -> DEBU eca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:47.776 UTC [policies] Evaluate -> DEBU ecb Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:27:47.776 UTC [policies] Evaluate -> DEBU ecc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:27:47.777 UTC [orderer.common.blockcutter] Ordered -> DEBU ecd Enqueuing message into batch" +"2019-05-02 09:27:47.777 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ece [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.8:57322" +"2019-05-02 09:27:47.780 UTC [grpc] infof -> DEBU ecf transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:47.780 UTC [orderer.common.broadcast] Handle -> WARN ed0 Error reading from 172.18.0.8:57322: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:47.781 UTC [orderer.common.server] func1 -> DEBU ed1 Closing Broadcast stream" +"2019-05-02 09:27:47.781 UTC [comm.grpc.server] 1 -> INFO ed2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57322 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=46.2738ms +"2019-05-02 09:27:47.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed3 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2019-05-02 09:27:47.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 3 on channel businesschannel took 139µs" +"2019-05-02 09:27:47.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.6µs " +"2019-05-02 09:27:47.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.8µs " +"2019-05-02 09:27:47.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed7 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:47.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:48.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:48.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 3 on channel testchainid took 31.9µs" +"2019-05-02 09:27:48.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.5µs " +"2019-05-02 09:27:48.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edc Sending msg of 28 bytes to 2 on channel businesschannel took 49.2µs" +"2019-05-02 09:27:48.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edd Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" +"2019-05-02 09:27:48.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ede Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.1µs " +"2019-05-02 09:27:48.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU edf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4521ms " +"2019-05-02 09:27:48.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:48.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:48.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:48.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee3 Sending msg of 28 bytes to 3 on channel testchainid took 23.2µs" +"2019-05-02 09:27:48.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.2µs " +"2019-05-02 09:27:48.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee5 Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" +"2019-05-02 09:27:48.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 3 on channel businesschannel took 21.8µs" +"2019-05-02 09:27:48.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.4µs " +"2019-05-02 09:27:48.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:48.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.4µs " +"2019-05-02 09:27:48.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU eea Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:49.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU eeb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:49.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eec Sending msg of 28 bytes to 3 on channel testchainid took 754.8µs" +"2019-05-02 09:27:49.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU eed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +"2019-05-02 09:27:49.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eee Sending msg of 28 bytes to 2 on channel businesschannel took 39.1µs" +"2019-05-02 09:27:49.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eef Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-05-02 09:27:49.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258.8µs " +"2019-05-02 09:27:49.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.5µs " +"2019-05-02 09:27:49.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:49.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:49.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:49.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 3 on channel testchainid took 28.5µs" +"2019-05-02 09:27:49.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.8µs " +"2019-05-02 09:27:49.779 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU ef7 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-05-02 09:27:49.779 UTC [orderer.consensus.etcdraft] propose -> INFO ef8 Created block [8], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-05-02 09:27:49.781 UTC [orderer.consensus.etcdraft] 2 -> DEBU ef9 Proposed block [8] to raft consensus" channel=businesschannel node=1 +"2019-05-02 09:27:49.784 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efa Sending msg of 3170 bytes to 2 on channel businesschannel took 29.5µs" +"2019-05-02 09:27:49.784 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 3170 bytes to 3 on channel businesschannel took 17.3µs" +"2019-05-02 09:27:49.785 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +"2019-05-02 09:27:49.785 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 265.5µs " +"2019-05-02 09:27:49.790 UTC [orderer.common.cluster.step] handleMessage -> DEBU efe Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:49.790 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eff Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +"2019-05-02 09:27:49.791 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f00 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2019-05-02 09:27:49.791 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.7µs " +"2019-05-02 09:27:49.792 UTC [orderer.consensus.etcdraft] writeBlock -> INFO f02 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=1 +"2019-05-02 09:27:49.792 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU f03 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-05-02 09:27:49.792 UTC [msp.identity] Sign -> DEBU f04 Sign: plaintext: 0A020802120B0A090A03010203100418...514B52B5CEA2B0457AF4595D7D94A4BF " +"2019-05-02 09:27:49.792 UTC [msp.identity] Sign -> DEBU f05 Sign: digest: 45CDD9EC16838AE18F87E5441ED922AFDC76B0374E84CAD29B729FE2FE40C24E " +"2019-05-02 09:27:49.793 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.8µs " +"2019-05-02 09:27:49.793 UTC [orderer.common.cluster.step] handleMessage -> DEBU f07 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:49.798 UTC [fsblkstorage] indexBlock -> DEBU f08 Indexing block [blockNum=8, blockHash=[]byte{0x2, 0x24, 0xe7, 0x4a, 0x9c, 0xc4, 0xcd, 0x6e, 0x9e, 0x50, 0x85, 0x1e, 0xb1, 0x9f, 0xf0, 0x6f, 0xcf, 0x12, 0x7a, 0xf4, 0xce, 0xb7, 0xdf, 0x24, 0x6e, 0x20, 0x2e, 0xb6, 0x60, 0x3f, 0x17, 0xec} txOffsets= +txId=f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176 locPointer=offset=70, bytesLength=3044 ]" -"2019-05-02 01:31:19.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe3 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:19.666 UTC [fsblkstorage] updateCheckpoint -> DEBU fe4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98666], isChainEmpty=[false], lastBlockNumber=[8]" -"2019-05-02 01:31:19.667 UTC [orderer.commmon.multichannel] commitBlock -> DEBU fe5 [channel: businesschannel] Wrote block [8]" -"2019-05-02 01:31:19.667 UTC [fsblkstorage] waitForBlock -> DEBU fe6 Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:19.668 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe7 Remaining bytes=[4050], Going to peek [8] bytes" -"2019-05-02 01:31:19.668 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe8 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[94616], bytesOffset=[94618]}" -"2019-05-02 01:31:19.668 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe9 blockbytes [4048] read from file [0]" -"2019-05-02 01:31:19.669 UTC [common.deliver] deliverBlocks -> DEBU fea [channel: businesschannel] Delivering block [8] for (0xc0008bfb80) for 192.168.240.5:58984" -"2019-05-02 01:31:19.669 UTC [fsblkstorage] waitForBlock -> DEBU feb Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:20.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fec Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" -"2019-05-02 01:31:20.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fed Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" -"2019-05-02 01:31:20.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU fee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 382.7µs " -"2019-05-02 01:31:20.042 UTC [orderer.common.cluster.step] handleMessage -> DEBU fef Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:20.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:20.044 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.9µs " -"2019-05-02 01:31:20.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:20.047 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff3 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" -"2019-05-02 01:31:20.049 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 669.6µs " -"2019-05-02 01:31:20.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff5 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" -"2019-05-02 01:31:20.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff7 Sending msg of 28 bytes to 3 on channel businesschannel took 44.9µs" -"2019-05-02 01:31:20.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.4µs " -"2019-05-02 01:31:20.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.4µs " -"2019-05-02 01:31:20.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:20.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffa Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:20.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffc Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" -"2019-05-02 01:31:20.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.8µs " -"2019-05-02 01:31:20.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:21.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffe Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs" -"2019-05-02 01:31:21.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU fff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.1µs " -"2019-05-02 01:31:21.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1000 Sending msg of 28 bytes to 3 on channel businesschannel took 30.8µs" -"2019-05-02 01:31:21.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1001 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 199.7µs " -"2019-05-02 01:31:21.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1002 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:21.053 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1003 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:21.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1004 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" -"2019-05-02 01:31:21.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1005 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.6µs " -"2019-05-02 01:31:21.054 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1006 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:21.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1007 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" -"2019-05-02 01:31:21.543 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100b Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" -"2019-05-02 01:31:21.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 525.1µs " -"2019-05-02 01:31:21.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1008 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.4µs " -"2019-05-02 01:31:21.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1009 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:21.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:21.544 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100d Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" -"2019-05-02 01:31:21.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.4µs " -"2019-05-02 01:31:21.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:22.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1010 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" -"2019-05-02 01:31:22.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1011 Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" -"2019-05-02 01:31:22.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1012 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.3µs " -"2019-05-02 01:31:22.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1013 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.9µs " -"2019-05-02 01:31:22.042 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1014 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:22.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1015 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:22.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1016 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:22.045 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1017 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" -"2019-05-02 01:31:22.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1018 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " -"2019-05-02 01:31:22.427 UTC [orderer.common.server] Deliver -> DEBU 1019 Starting new Deliver handler" -"2019-05-02 01:31:22.427 UTC [common.deliver] Handle -> DEBU 101a Starting new deliver loop for 192.168.240.9:47484" -"2019-05-02 01:31:22.428 UTC [common.deliver] Handle -> DEBU 101b Attempting to read seek info message from 192.168.240.9:47484" -"2019-05-02 01:31:22.431 UTC [policies] Evaluate -> DEBU 101c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:22.431 UTC [policies] Evaluate -> DEBU 101d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:22.431 UTC [policies] Evaluate -> DEBU 101e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:22.431 UTC [policies] Evaluate -> DEBU 101f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:22.432 UTC [policies] Evaluate -> DEBU 1020 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:22.433 UTC [msp] DeserializeIdentity -> DEBU 1021 Obtaining identity" -"2019-05-02 01:31:22.435 UTC [msp.identity] newIdentity -> DEBU 1022 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:49.801 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:49.804 UTC [fsblkstorage] updateCheckpoint -> DEBU f0a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98665], isChainEmpty=[false], lastBlockNumber=[8]" +"2019-05-02 09:27:49.805 UTC [orderer.commmon.multichannel] commitBlock -> DEBU f0b [channel: businesschannel] Wrote block [8]" +"2019-05-02 09:27:49.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:49.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-05-02 09:27:49.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0e Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +"2019-05-02 09:27:49.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.5µs " +"2019-05-02 09:27:49.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 787.1µs " +"2019-05-02 09:27:49.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:49.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:50.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU f13 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:50.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f14 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-05-02 09:27:50.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU f15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 920.9µs " +"2019-05-02 09:27:50.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs" +"2019-05-02 09:27:50.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 3 on channel businesschannel took 27µs" +"2019-05-02 09:27:50.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.9µs " +"2019-05-02 09:27:50.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.9µs " +"2019-05-02 09:27:50.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:50.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:50.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:50.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1d Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +"2019-05-02 09:27:50.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5813ms " +"2019-05-02 09:27:50.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 2 on channel businesschannel took 31.1µs" +"2019-05-02 09:27:50.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f20 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2019-05-02 09:27:50.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.7µs " +"2019-05-02 09:27:50.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f22 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:50.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU f23 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:50.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU f24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.997ms " +"2019-05-02 09:27:51.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:51.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f26 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +"2019-05-02 09:27:51.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU f27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.2µs " +"2019-05-02 09:27:51.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 2 on channel businesschannel took 86.5µs" +"2019-05-02 09:27:51.458 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 5.1044ms " +"2019-05-02 09:27:51.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:51.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs " +"2019-05-02 09:27:51.464 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:51.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2d Sending msg of 28 bytes to 3 on channel businesschannel took 116.5µs" +"2019-05-02 09:27:51.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:51.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.7µs " +"2019-05-02 09:27:51.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f30 Sending msg of 28 bytes to 3 on channel testchainid took 174.8µs" +"2019-05-02 09:27:51.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2019-05-02 09:27:51.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f32 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2019-05-02 09:27:51.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.2µs " +"2019-05-02 09:27:51.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.7µs " +"2019-05-02 09:27:51.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:51.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:52.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:52.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f38 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +"2019-05-02 09:27:52.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU f39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96µs " +"2019-05-02 09:27:52.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +"2019-05-02 09:27:52.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3b Sending msg of 28 bytes to 2 on channel businesschannel took 8.3µs" +"2019-05-02 09:27:52.450 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 423µs " +"2019-05-02 09:27:52.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.6µs " +"2019-05-02 09:27:52.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:52.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:52.488 UTC [orderer.common.server] Deliver -> DEBU f40 Starting new Deliver handler" +"2019-05-02 09:27:52.488 UTC [common.deliver] Handle -> DEBU f41 Starting new deliver loop for 172.18.0.8:57352" +"2019-05-02 09:27:52.488 UTC [common.deliver] Handle -> DEBU f42 Attempting to read seek info message from 172.18.0.8:57352" +"2019-05-02 09:27:52.489 UTC [policies] Evaluate -> DEBU f43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:52.489 UTC [policies] Evaluate -> DEBU f44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.489 UTC [policies] Evaluate -> DEBU f45 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.490 UTC [policies] Evaluate -> DEBU f46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.490 UTC [policies] Evaluate -> DEBU f47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.490 UTC [msp] DeserializeIdentity -> DEBU f48 Obtaining identity" +"2019-05-02 09:27:52.491 UTC [msp.identity] newIdentity -> DEBU f49 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -5769,600 +5516,820 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:31:22.436 UTC [cauthdsl] func1 -> DEBU 1023 0xc000f93400 gate 1556760682436111100 evaluation starts" -"2019-05-02 01:31:22.436 UTC [cauthdsl] func2 -> DEBU 1024 0xc000f93400 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:22.436 UTC [cauthdsl] func2 -> DEBU 1025 0xc000f93400 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:22.437 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1026 Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-05-02 01:31:22.437 UTC [msp] Validate -> DEBU 1027 MSP OrdererMSP validating identity" -"2019-05-02 01:31:22.437 UTC [cauthdsl] func2 -> DEBU 1028 0xc000f93400 principal matched by identity 0" -"2019-05-02 01:31:22.438 UTC [msp.identity] Verify -> DEBU 1029 Verify: digest = 00000000 38 94 53 91 c4 13 ca e8 34 76 e4 ff 37 87 d3 6b |8.S.....4v..7..k| -00000010 65 65 2d a3 d5 0e b4 ba 0a bd 4a 27 5c 5d 04 1d |ee-.......J'\]..|" -"2019-05-02 01:31:22.438 UTC [msp.identity] Verify -> DEBU 102a Verify: sig = 00000000 30 44 02 20 05 a4 05 bb 89 86 b6 72 1a 1d 8f 70 |0D. .......r...p| -00000010 c7 3f c3 fb 8a 3f ff 80 bf b1 29 ad cd 2a d6 5d |.?...?....)..*.]| -00000020 33 7e fe 2b 02 20 5f 0f bc 8e 0c 30 e3 e0 29 35 |3~.+. _....0..)5| -00000030 f7 95 bf 31 a4 c2 87 c4 8c a8 1a c7 75 1d e7 2b |...1........u..+| -00000040 ea 5d 11 8d 63 78 |.]..cx|" -"2019-05-02 01:31:22.439 UTC [cauthdsl] func2 -> DEBU 102b 0xc000f93400 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:22.439 UTC [cauthdsl] func1 -> DEBU 102c 0xc000f93400 gate 1556760682436111100 evaluation succeeds" -"2019-05-02 01:31:22.439 UTC [policies] Evaluate -> DEBU 102d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:22.439 UTC [policies] Evaluate -> DEBU 102e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:22.439 UTC [policies] Evaluate -> DEBU 102f Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:22.439 UTC [policies] Evaluate -> DEBU 1030 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:22.440 UTC [policies] Evaluate -> DEBU 1031 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:22.440 UTC [policies] Evaluate -> DEBU 1032 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:22.440 UTC [common.deliver] deliverBlocks -> DEBU 1033 [channel: businesschannel] Received seekInfo (0xc00106cd40) start: > stop: > from 192.168.240.9:47484" -"2019-05-02 01:31:22.440 UTC [fsblkstorage] Next -> DEBU 1034 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:22.441 UTC [fsblkstorage] newBlockfileStream -> DEBU 1035 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94616]" -"2019-05-02 01:31:22.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1036 Remaining bytes=[4050], Going to peek [8] bytes" -"2019-05-02 01:31:22.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1037 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[94616], bytesOffset=[94618]}" -"2019-05-02 01:31:22.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1038 blockbytes [4048] read from file [0]" -"2019-05-02 01:31:22.442 UTC [common.deliver] deliverBlocks -> DEBU 1039 [channel: businesschannel] Delivering block [8] for (0xc00106cd40) for 192.168.240.9:47484" -"2019-05-02 01:31:22.444 UTC [common.deliver] deliverBlocks -> DEBU 103a [channel: businesschannel] Done delivering to 192.168.240.9:47484 for (0xc00106cd40)" -"2019-05-02 01:31:22.445 UTC [fsblkstorage] waitForBlock -> DEBU 103b Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:22.445 UTC [fsblkstorage] waitForBlock -> DEBU 103c Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:22.446 UTC [common.deliver] Handle -> DEBU 103d Waiting for new SeekInfo from 192.168.240.9:47484" -"2019-05-02 01:31:22.446 UTC [common.deliver] Handle -> DEBU 103e Attempting to read seek info message from 192.168.240.9:47484" -"2019-05-02 01:31:22.450 UTC [grpc] warningf -> DEBU 103f transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.2:7050->192.168.240.9:47484: read: connection reset by peer" -"2019-05-02 01:31:22.450 UTC [common.deliver] Handle -> WARN 1040 Error reading from 192.168.240.9:47484: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:22.451 UTC [orderer.common.server] func1 -> DEBU 1042 Closing Deliver stream" -"2019-05-02 01:31:22.451 UTC [comm.grpc.server] 1 -> INFO 1043 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47484 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.5225ms -"2019-05-02 01:31:22.451 UTC [grpc] infof -> DEBU 1041 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:22.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1044 Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" -"2019-05-02 01:31:22.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1045 Sending msg of 28 bytes to 3 on channel businesschannel took 29.9µs" -"2019-05-02 01:31:22.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1046 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 536.6µs " -"2019-05-02 01:31:22.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1047 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 696.8µs " -"2019-05-02 01:31:22.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1048 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:22.543 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1049 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:22.544 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104a Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" -"2019-05-02 01:31:22.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.7µs " -"2019-05-02 01:31:22.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:22.825 UTC [orderer.common.server] Deliver -> DEBU 104d Starting new Deliver handler" -"2019-05-02 01:31:22.826 UTC [common.deliver] Handle -> DEBU 104e Starting new deliver loop for 192.168.240.9:47486" -"2019-05-02 01:31:22.826 UTC [common.deliver] Handle -> DEBU 104f Attempting to read seek info message from 192.168.240.9:47486" -"2019-05-02 01:31:22.827 UTC [policies] Evaluate -> DEBU 1050 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:22.827 UTC [policies] Evaluate -> DEBU 1051 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:22.828 UTC [policies] Evaluate -> DEBU 1052 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:22.828 UTC [policies] Evaluate -> DEBU 1053 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:22.829 UTC [policies] Evaluate -> DEBU 1054 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:22.830 UTC [cauthdsl] func1 -> DEBU 1055 0xc000df4e20 gate 1556760682830203700 evaluation starts" -"2019-05-02 01:31:22.830 UTC [cauthdsl] func2 -> DEBU 1056 0xc000df4e20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:22.830 UTC [cauthdsl] func2 -> DEBU 1057 0xc000df4e20 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:22.831 UTC [cauthdsl] func2 -> DEBU 1058 0xc000df4e20 principal matched by identity 0" -"2019-05-02 01:31:22.831 UTC [msp.identity] Verify -> DEBU 1059 Verify: digest = 00000000 56 2b f5 0a ce 7d 2f 70 b2 c0 1d 3c ad 8e 51 c7 |V+...}/p...<..Q.| -00000010 88 ca ff cf 79 bc 13 a1 a3 03 bf 16 47 5d e6 a4 |....y.......G]..|" -"2019-05-02 01:31:22.831 UTC [msp.identity] Verify -> DEBU 105a Verify: sig = 00000000 30 44 02 20 2f db 1e 46 17 aa 8c 7e 73 db 62 3b |0D. /..F...~s.b;| -00000010 85 43 90 a4 98 4b f8 15 31 da a6 3c 74 e4 a3 50 |.C...K..1..u.. 6{..J..=g.| -00000030 aa 71 26 88 39 af ee 6e b6 76 34 c7 55 ba f1 c0 |.q&.9..n.v4.U...| -00000040 eb 06 9f 62 37 eb |...b7.|" -"2019-05-02 01:31:22.832 UTC [cauthdsl] func2 -> DEBU 105b 0xc000df4e20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:22.832 UTC [cauthdsl] func1 -> DEBU 105c 0xc000df4e20 gate 1556760682830203700 evaluation succeeds" -"2019-05-02 01:31:22.833 UTC [policies] Evaluate -> DEBU 105d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:22.833 UTC [policies] Evaluate -> DEBU 105e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:22.834 UTC [policies] Evaluate -> DEBU 105f Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:22.834 UTC [policies] Evaluate -> DEBU 1060 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:22.834 UTC [policies] Evaluate -> DEBU 1061 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:22.835 UTC [policies] Evaluate -> DEBU 1062 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:22.835 UTC [common.deliver] deliverBlocks -> DEBU 1063 [channel: businesschannel] Received seekInfo (0xc000baa0c0) start: > stop: > from 192.168.240.9:47486" -"2019-05-02 01:31:22.836 UTC [fsblkstorage] Next -> DEBU 1064 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:22.836 UTC [fsblkstorage] newBlockfileStream -> DEBU 1065 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94616]" -"2019-05-02 01:31:22.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1066 Remaining bytes=[4050], Going to peek [8] bytes" -"2019-05-02 01:31:22.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1067 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[94616], bytesOffset=[94618]}" -"2019-05-02 01:31:22.838 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1068 blockbytes [4048] read from file [0]" -"2019-05-02 01:31:22.838 UTC [common.deliver] deliverBlocks -> DEBU 1069 [channel: businesschannel] Delivering block [8] for (0xc000baa0c0) for 192.168.240.9:47486" -"2019-05-02 01:31:22.839 UTC [common.deliver] deliverBlocks -> DEBU 106a [channel: businesschannel] Done delivering to 192.168.240.9:47486 for (0xc000baa0c0)" -"2019-05-02 01:31:22.844 UTC [common.deliver] Handle -> DEBU 106b Waiting for new SeekInfo from 192.168.240.9:47486" -"2019-05-02 01:31:22.844 UTC [fsblkstorage] waitForBlock -> DEBU 106c Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:22.845 UTC [fsblkstorage] waitForBlock -> DEBU 106e Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:22.845 UTC [common.deliver] Handle -> DEBU 106d Attempting to read seek info message from 192.168.240.9:47486" -"2019-05-02 01:31:22.847 UTC [policies] Evaluate -> DEBU 106f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:22.847 UTC [policies] Evaluate -> DEBU 1070 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:22.847 UTC [policies] Evaluate -> DEBU 1071 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:22.847 UTC [policies] Evaluate -> DEBU 1072 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:22.847 UTC [policies] Evaluate -> DEBU 1073 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:22.848 UTC [cauthdsl] func1 -> DEBU 1074 0xc000c94f00 gate 1556760682848145600 evaluation starts" -"2019-05-02 01:31:22.848 UTC [cauthdsl] func2 -> DEBU 1075 0xc000c94f00 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:22.848 UTC [cauthdsl] func2 -> DEBU 1076 0xc000c94f00 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:22.849 UTC [cauthdsl] func2 -> DEBU 1077 0xc000c94f00 principal matched by identity 0" -"2019-05-02 01:31:22.849 UTC [msp.identity] Verify -> DEBU 1078 Verify: digest = 00000000 3f 7c 55 25 e0 fc df 7b e4 1a 90 06 24 23 39 be |?|U%...{....$#9.| -00000010 44 86 3e 2d e3 53 ce f4 80 e5 50 a2 3c 6b 1b de |D.>-.S....P. DEBU 1079 Verify: sig = 00000000 30 45 02 21 00 88 a0 35 5a 09 ff 1d e0 ed 7f 70 |0E.!...5Z......p| -00000010 24 d6 1e 1c 68 bb 1f dc cd df 3c ca 58 73 06 9c |$...h.....<.Xs..| -00000020 6c 66 cd 38 1f 02 20 22 1b 19 ee d2 7f ce 63 ec |lf.8.. "......c.| -00000030 0d 30 65 c8 c7 0b a6 77 4d 4c b6 1c ad 9e 6b 0e |.0e....wML....k.| -00000040 3b 44 6a a0 3c 03 3d |;Dj.<.=|" -"2019-05-02 01:31:22.851 UTC [cauthdsl] func2 -> DEBU 107a 0xc000c94f00 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:22.851 UTC [cauthdsl] func1 -> DEBU 107b 0xc000c94f00 gate 1556760682848145600 evaluation succeeds" -"2019-05-02 01:31:22.851 UTC [policies] Evaluate -> DEBU 107c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:22.852 UTC [policies] Evaluate -> DEBU 107d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:22.852 UTC [policies] Evaluate -> DEBU 107e Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:22.852 UTC [policies] Evaluate -> DEBU 107f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:22.853 UTC [policies] Evaluate -> DEBU 1080 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:22.853 UTC [policies] Evaluate -> DEBU 1081 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:22.853 UTC [common.deliver] deliverBlocks -> DEBU 1082 [channel: businesschannel] Received seekInfo (0xc000baa8c0) start: > stop: > from 192.168.240.9:47486" -"2019-05-02 01:31:22.854 UTC [fsblkstorage] Next -> DEBU 1083 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:22.854 UTC [fsblkstorage] newBlockfileStream -> DEBU 1084 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47626]" -"2019-05-02 01:31:22.854 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1085 Remaining bytes=[51040], Going to peek [8] bytes" -"2019-05-02 01:31:22.854 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1086 Returning blockbytes - length=[23741], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" -"2019-05-02 01:31:22.855 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1087 blockbytes [23741] read from file [0]" -"2019-05-02 01:31:22.855 UTC [common.deliver] deliverBlocks -> DEBU 1088 [channel: businesschannel] Delivering block [2] for (0xc000baa8c0) for 192.168.240.9:47486" -"2019-05-02 01:31:22.855 UTC [common.deliver] deliverBlocks -> DEBU 1089 [channel: businesschannel] Done delivering to 192.168.240.9:47486 for (0xc000baa8c0)" -"2019-05-02 01:31:22.855 UTC [common.deliver] Handle -> DEBU 108a Waiting for new SeekInfo from 192.168.240.9:47486" -"2019-05-02 01:31:22.856 UTC [common.deliver] Handle -> DEBU 108b Attempting to read seek info message from 192.168.240.9:47486" -"2019-05-02 01:31:22.856 UTC [fsblkstorage] waitForBlock -> DEBU 108c Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:22.856 UTC [fsblkstorage] waitForBlock -> DEBU 108d Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:22.866 UTC [common.deliver] Handle -> WARN 108e Error reading from 192.168.240.9:47486: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:22.866 UTC [orderer.common.server] func1 -> DEBU 1090 Closing Deliver stream" -"2019-05-02 01:31:22.866 UTC [grpc] infof -> DEBU 108f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:22.866 UTC [comm.grpc.server] 1 -> INFO 1091 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47486 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=41.323ms -"2019-05-02 01:31:23.023 UTC [orderer.common.server] Deliver -> DEBU 1092 Starting new Deliver handler" -"2019-05-02 01:31:23.024 UTC [common.deliver] Handle -> DEBU 1093 Starting new deliver loop for 192.168.240.9:47488" -"2019-05-02 01:31:23.024 UTC [common.deliver] Handle -> DEBU 1094 Attempting to read seek info message from 192.168.240.9:47488" -"2019-05-02 01:31:23.025 UTC [policies] Evaluate -> DEBU 1095 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:23.025 UTC [policies] Evaluate -> DEBU 1096 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:23.026 UTC [policies] Evaluate -> DEBU 1097 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:23.026 UTC [policies] Evaluate -> DEBU 1098 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:23.026 UTC [policies] Evaluate -> DEBU 1099 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:23.027 UTC [cauthdsl] func1 -> DEBU 109a 0xc000badb80 gate 1556760683027181200 evaluation starts" -"2019-05-02 01:31:23.027 UTC [cauthdsl] func2 -> DEBU 109b 0xc000badb80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:23.027 UTC [cauthdsl] func2 -> DEBU 109c 0xc000badb80 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:23.028 UTC [cauthdsl] func2 -> DEBU 109d 0xc000badb80 principal matched by identity 0" -"2019-05-02 01:31:23.028 UTC [msp.identity] Verify -> DEBU 109e Verify: digest = 00000000 2b 1c f5 79 de e2 a6 f1 2e a9 1e 19 a8 a6 10 a7 |+..y............| -00000010 e6 ce b6 60 b5 97 6c c4 57 e9 83 8b cd a5 db 19 |...`..l.W.......|" -"2019-05-02 01:31:23.029 UTC [msp.identity] Verify -> DEBU 109f Verify: sig = 00000000 30 45 02 21 00 b7 77 0a 5f 1a e0 2c 51 2d 6e 7e |0E.!..w._..,Q-n~| -00000010 1b a2 57 7d 1f f7 40 75 44 19 01 f8 e3 08 33 d1 |..W}..@uD.....3.| -00000020 3d 11 d4 76 bf 02 20 56 6e 26 95 eb c9 91 0f db |=..v.. Vn&......| -00000030 3e c0 46 a9 70 5e 81 31 02 7b 98 7d bd b1 07 6d |>.F.p^.1.{.}...m| -00000040 7e 00 1d 59 02 c1 1a |~..Y...|" -"2019-05-02 01:31:23.029 UTC [cauthdsl] func2 -> DEBU 10a0 0xc000badb80 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:23.029 UTC [cauthdsl] func1 -> DEBU 10a1 0xc000badb80 gate 1556760683027181200 evaluation succeeds" -"2019-05-02 01:31:23.030 UTC [policies] Evaluate -> DEBU 10a2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:23.030 UTC [policies] Evaluate -> DEBU 10a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:23.030 UTC [policies] Evaluate -> DEBU 10a4 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:23.030 UTC [policies] Evaluate -> DEBU 10a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:23.031 UTC [policies] Evaluate -> DEBU 10a6 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:23.031 UTC [policies] Evaluate -> DEBU 10a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:23.031 UTC [common.deliver] deliverBlocks -> DEBU 10a8 [channel: businesschannel] Received seekInfo (0xc000bab240) start: > stop: > from 192.168.240.9:47488" -"2019-05-02 01:31:23.032 UTC [fsblkstorage] Next -> DEBU 10a9 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:23.033 UTC [fsblkstorage] newBlockfileStream -> DEBU 10aa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -"2019-05-02 01:31:23.033 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ab Remaining bytes=[98666], Going to peek [8] bytes" -"2019-05-02 01:31:23.033 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ac Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:31:23.034 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ad blockbytes [23937] read from file [0]" -"2019-05-02 01:31:23.034 UTC [common.deliver] deliverBlocks -> DEBU 10ae [channel: businesschannel] Delivering block [0] for (0xc000bab240) for 192.168.240.9:47488" -"2019-05-02 01:31:23.034 UTC [common.deliver] deliverBlocks -> DEBU 10af [channel: businesschannel] Done delivering to 192.168.240.9:47488 for (0xc000bab240)" -"2019-05-02 01:31:23.035 UTC [common.deliver] Handle -> DEBU 10b0 Waiting for new SeekInfo from 192.168.240.9:47488" -"2019-05-02 01:31:23.035 UTC [common.deliver] Handle -> DEBU 10b1 Attempting to read seek info message from 192.168.240.9:47488" -"2019-05-02 01:31:23.035 UTC [fsblkstorage] waitForBlock -> DEBU 10b2 Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:23.036 UTC [fsblkstorage] waitForBlock -> DEBU 10b3 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:23.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b4 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" -"2019-05-02 01:31:23.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b5 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" -"2019-05-02 01:31:23.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 245.4µs " -"2019-05-02 01:31:23.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.2µs " -"2019-05-02 01:31:23.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:23.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:23.046 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bb Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" -"2019-05-02 01:31:23.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ba Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:23.047 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.7µs " -"2019-05-02 01:31:23.051 UTC [grpc] infof -> DEBU 10be transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:23.051 UTC [common.deliver] Handle -> WARN 10bd Error reading from 192.168.240.9:47488: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:23.051 UTC [orderer.common.server] func1 -> DEBU 10bf Closing Deliver stream" -"2019-05-02 01:31:23.052 UTC [comm.grpc.server] 1 -> INFO 10c0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47488 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.855ms -"2019-05-02 01:31:23.248 UTC [orderer.common.server] Deliver -> DEBU 10c1 Starting new Deliver handler" -"2019-05-02 01:31:23.248 UTC [common.deliver] Handle -> DEBU 10c2 Starting new deliver loop for 192.168.240.9:47490" -"2019-05-02 01:31:23.248 UTC [common.deliver] Handle -> DEBU 10c3 Attempting to read seek info message from 192.168.240.9:47490" -"2019-05-02 01:31:23.250 UTC [policies] Evaluate -> DEBU 10c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:23.250 UTC [policies] Evaluate -> DEBU 10c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:23.250 UTC [policies] Evaluate -> DEBU 10c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:23.250 UTC [policies] Evaluate -> DEBU 10c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:23.251 UTC [policies] Evaluate -> DEBU 10c8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:23.251 UTC [cauthdsl] func1 -> DEBU 10c9 0xc000382eb0 gate 1556760683251360100 evaluation starts" -"2019-05-02 01:31:23.251 UTC [cauthdsl] func2 -> DEBU 10ca 0xc000382eb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:23.251 UTC [cauthdsl] func2 -> DEBU 10cb 0xc000382eb0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:23.252 UTC [cauthdsl] func2 -> DEBU 10cc 0xc000382eb0 principal matched by identity 0" -"2019-05-02 01:31:23.252 UTC [msp.identity] Verify -> DEBU 10cd Verify: digest = 00000000 f6 33 b2 df c5 92 66 40 85 b2 87 d6 f1 21 da 93 |.3....f@.....!..| -00000010 8c b2 85 e4 47 1b 8d 8a b0 28 95 30 fd e8 09 13 |....G....(.0....|" -"2019-05-02 01:31:23.252 UTC [msp.identity] Verify -> DEBU 10ce Verify: sig = 00000000 30 44 02 20 29 de e4 6e 52 31 46 6c ed 5e db 6f |0D. )..nR1Fl.^.o| -00000010 43 cc 4c 00 77 ac d8 7d ec 5d cd 76 dc 9a ec fd |C.L.w..}.].v....| -00000020 7f 61 a3 86 02 20 13 94 d6 59 1a 16 d6 1a 84 ae |.a... ...Y......| -00000030 5d 3d e9 39 c8 fd 23 f1 d4 03 7a b1 e5 d6 03 a5 |]=.9..#...z.....| -00000040 f7 bb 33 ab d7 a2 |..3...|" -"2019-05-02 01:31:23.253 UTC [cauthdsl] func2 -> DEBU 10cf 0xc000382eb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:23.253 UTC [cauthdsl] func1 -> DEBU 10d0 0xc000382eb0 gate 1556760683251360100 evaluation succeeds" -"2019-05-02 01:31:23.253 UTC [policies] Evaluate -> DEBU 10d1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:23.254 UTC [policies] Evaluate -> DEBU 10d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:23.254 UTC [policies] Evaluate -> DEBU 10d3 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:23.255 UTC [policies] Evaluate -> DEBU 10d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:23.255 UTC [policies] Evaluate -> DEBU 10d5 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:23.255 UTC [policies] Evaluate -> DEBU 10d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:23.256 UTC [common.deliver] deliverBlocks -> DEBU 10d7 [channel: businesschannel] Received seekInfo (0xc000bab8c0) start: > stop: > from 192.168.240.9:47490" -"2019-05-02 01:31:23.256 UTC [fsblkstorage] Next -> DEBU 10d8 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:23.256 UTC [fsblkstorage] newBlockfileStream -> DEBU 10d9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" -"2019-05-02 01:31:23.256 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10da Remaining bytes=[74726], Going to peek [8] bytes" -"2019-05-02 01:31:23.257 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10db Returning blockbytes - length=[23683], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" -"2019-05-02 01:31:23.257 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10dc blockbytes [23683] read from file [0]" -"2019-05-02 01:31:23.258 UTC [common.deliver] deliverBlocks -> DEBU 10dd [channel: businesschannel] Delivering block [1] for (0xc000bab8c0) for 192.168.240.9:47490" -"2019-05-02 01:31:23.258 UTC [common.deliver] deliverBlocks -> DEBU 10de [channel: businesschannel] Done delivering to 192.168.240.9:47490 for (0xc000bab8c0)" -"2019-05-02 01:31:23.259 UTC [common.deliver] Handle -> DEBU 10df Waiting for new SeekInfo from 192.168.240.9:47490" -"2019-05-02 01:31:23.259 UTC [common.deliver] Handle -> DEBU 10e0 Attempting to read seek info message from 192.168.240.9:47490" -"2019-05-02 01:31:23.259 UTC [fsblkstorage] waitForBlock -> DEBU 10e1 Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:23.259 UTC [fsblkstorage] waitForBlock -> DEBU 10e2 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:23.273 UTC [common.deliver] Handle -> WARN 10e3 Error reading from 192.168.240.9:47490: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:23.276 UTC [orderer.common.server] func1 -> DEBU 10e4 Closing Deliver stream" -"2019-05-02 01:31:23.277 UTC [comm.grpc.server] 1 -> INFO 10e5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47490 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.1633ms -"2019-05-02 01:31:23.277 UTC [grpc] infof -> DEBU 10e6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:23.491 UTC [orderer.common.server] Deliver -> DEBU 10e7 Starting new Deliver handler" -"2019-05-02 01:31:23.491 UTC [common.deliver] Handle -> DEBU 10e8 Starting new deliver loop for 192.168.240.9:47492" -"2019-05-02 01:31:23.492 UTC [common.deliver] Handle -> DEBU 10e9 Attempting to read seek info message from 192.168.240.9:47492" -"2019-05-02 01:31:23.492 UTC [policies] Evaluate -> DEBU 10ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:23.493 UTC [policies] Evaluate -> DEBU 10eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:23.493 UTC [policies] Evaluate -> DEBU 10ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:23.493 UTC [policies] Evaluate -> DEBU 10ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:23.493 UTC [policies] Evaluate -> DEBU 10ee == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:23.494 UTC [cauthdsl] func1 -> DEBU 10ef 0xc0003ba250 gate 1556760683494370500 evaluation starts" -"2019-05-02 01:31:23.494 UTC [cauthdsl] func2 -> DEBU 10f0 0xc0003ba250 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:23.495 UTC [cauthdsl] func2 -> DEBU 10f1 0xc0003ba250 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:23.495 UTC [cauthdsl] func2 -> DEBU 10f2 0xc0003ba250 principal matched by identity 0" -"2019-05-02 01:31:23.495 UTC [msp.identity] Verify -> DEBU 10f3 Verify: digest = 00000000 b6 f8 e5 6d 8c 8f 41 c7 98 98 63 d8 06 d3 37 5b |...m..A...c...7[| -00000010 be 9b fb 49 a7 c9 77 5d 9a 6c ee e4 eb 2a 6d eb |...I..w].l...*m.|" -"2019-05-02 01:31:23.496 UTC [msp.identity] Verify -> DEBU 10f4 Verify: sig = 00000000 30 45 02 21 00 aa 42 58 f1 ab e6 bd 7d 48 79 4c |0E.!..BX....}HyL| -00000010 c6 ad b6 0f 53 8a 96 fe 43 81 3d 72 8e 6d c2 62 |....S...C.=r.m.b| -00000020 60 fd 7a 27 45 02 20 2e aa 10 d7 00 4e dd d0 d2 |`.z'E. .....N...| -00000030 fe 2b e2 3d 4c 2f 3f 33 f7 cb ee bf e8 f5 12 d5 |.+.=L/?3........| -00000040 1e e7 40 a2 9d 17 93 |..@....|" -"2019-05-02 01:31:23.496 UTC [cauthdsl] func2 -> DEBU 10f5 0xc0003ba250 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:23.496 UTC [cauthdsl] func1 -> DEBU 10f6 0xc0003ba250 gate 1556760683494370500 evaluation succeeds" -"2019-05-02 01:31:23.497 UTC [policies] Evaluate -> DEBU 10f7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:23.497 UTC [policies] Evaluate -> DEBU 10f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:23.497 UTC [policies] Evaluate -> DEBU 10f9 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:23.498 UTC [policies] Evaluate -> DEBU 10fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:23.498 UTC [policies] Evaluate -> DEBU 10fb Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:23.499 UTC [policies] Evaluate -> DEBU 10fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:23.500 UTC [common.deliver] deliverBlocks -> DEBU 10fd [channel: businesschannel] Received seekInfo (0xc000babe80) start: > stop: > from 192.168.240.9:47492" -"2019-05-02 01:31:23.500 UTC [fsblkstorage] Next -> DEBU 10fe Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:23.501 UTC [fsblkstorage] newBlockfileStream -> DEBU 10ff newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47626]" -"2019-05-02 01:31:23.501 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1100 Remaining bytes=[51040], Going to peek [8] bytes" -"2019-05-02 01:31:23.502 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1101 Returning blockbytes - length=[23741], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" -"2019-05-02 01:31:23.502 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1102 blockbytes [23741] read from file [0]" -"2019-05-02 01:31:23.503 UTC [common.deliver] deliverBlocks -> DEBU 1103 [channel: businesschannel] Delivering block [2] for (0xc000babe80) for 192.168.240.9:47492" -"2019-05-02 01:31:23.504 UTC [common.deliver] deliverBlocks -> DEBU 1104 [channel: businesschannel] Done delivering to 192.168.240.9:47492 for (0xc000babe80)" -"2019-05-02 01:31:23.506 UTC [fsblkstorage] waitForBlock -> DEBU 1105 Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:23.506 UTC [fsblkstorage] waitForBlock -> DEBU 1106 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:23.507 UTC [common.deliver] Handle -> DEBU 1107 Waiting for new SeekInfo from 192.168.240.9:47492" -"2019-05-02 01:31:23.507 UTC [common.deliver] Handle -> DEBU 1108 Attempting to read seek info message from 192.168.240.9:47492" -"2019-05-02 01:31:23.538 UTC [common.deliver] Handle -> WARN 1109 Error reading from 192.168.240.9:47492: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:23.539 UTC [grpc] infof -> DEBU 110a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:23.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110b Sending msg of 28 bytes to 3 on channel businesschannel took 33.6µs" -"2019-05-02 01:31:23.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110c Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" -"2019-05-02 01:31:23.542 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.9µs " -"2019-05-02 01:31:23.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 333.7µs " -"2019-05-02 01:31:23.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:23.546 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 3 on channel testchainid took 30.5µs" -"2019-05-02 01:31:23.548 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1111 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 611.9µs " -"2019-05-02 01:31:23.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1112 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:23.550 UTC [orderer.common.server] func1 -> DEBU 1113 Closing Deliver stream" -"2019-05-02 01:31:23.553 UTC [comm.grpc.server] 1 -> INFO 1114 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47492 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=62.9149ms -"2019-05-02 01:31:23.555 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1115 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:23.796 UTC [orderer.common.server] Deliver -> DEBU 1116 Starting new Deliver handler" -"2019-05-02 01:31:23.796 UTC [common.deliver] Handle -> DEBU 1117 Starting new deliver loop for 192.168.240.9:47494" -"2019-05-02 01:31:23.797 UTC [common.deliver] Handle -> DEBU 1118 Attempting to read seek info message from 192.168.240.9:47494" -"2019-05-02 01:31:23.798 UTC [policies] Evaluate -> DEBU 1119 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:23.798 UTC [policies] Evaluate -> DEBU 111a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:23.798 UTC [policies] Evaluate -> DEBU 111b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:23.799 UTC [policies] Evaluate -> DEBU 111c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:23.799 UTC [policies] Evaluate -> DEBU 111d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:23.800 UTC [cauthdsl] func1 -> DEBU 111e 0xc000439030 gate 1556760683800107900 evaluation starts" -"2019-05-02 01:31:23.800 UTC [cauthdsl] func2 -> DEBU 111f 0xc000439030 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:23.800 UTC [cauthdsl] func2 -> DEBU 1120 0xc000439030 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:23.801 UTC [cauthdsl] func2 -> DEBU 1121 0xc000439030 principal matched by identity 0" -"2019-05-02 01:31:23.801 UTC [msp.identity] Verify -> DEBU 1122 Verify: digest = 00000000 d0 dd 1d ee 72 88 5c 90 dc 14 e1 dd 56 03 b9 49 |....r.\.....V..I| -00000010 2a 2e 5d 57 bc a0 8b d2 8a 00 3b 87 c2 45 b5 ec |*.]W......;..E..|" -"2019-05-02 01:31:23.801 UTC [msp.identity] Verify -> DEBU 1123 Verify: sig = 00000000 30 45 02 21 00 c7 b2 54 67 bf f6 48 65 80 a3 36 |0E.!...Tg..He..6| -00000010 7c 41 aa 3f 85 c8 fc 3f 7c 62 02 e7 27 67 60 f5 ||A.?...?|b..'g`.| -00000020 de 5e 89 a6 b6 02 20 4e b5 77 03 5e 04 d0 68 c8 |.^.... N.w.^..h.| -00000030 af 0c 6b 0c e9 50 df b6 0d 34 41 c3 08 6b 7a cc |..k..P...4A..kz.| -00000040 0b 94 be 3b 37 32 4f |...;72O|" -"2019-05-02 01:31:23.802 UTC [cauthdsl] func2 -> DEBU 1124 0xc000439030 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:23.802 UTC [cauthdsl] func1 -> DEBU 1125 0xc000439030 gate 1556760683800107900 evaluation succeeds" -"2019-05-02 01:31:23.803 UTC [policies] Evaluate -> DEBU 1126 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:23.803 UTC [policies] Evaluate -> DEBU 1127 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:23.804 UTC [policies] Evaluate -> DEBU 1128 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:23.804 UTC [policies] Evaluate -> DEBU 1129 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:23.804 UTC [policies] Evaluate -> DEBU 112a Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:23.805 UTC [policies] Evaluate -> DEBU 112b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:23.806 UTC [common.deliver] deliverBlocks -> DEBU 112c [channel: businesschannel] Received seekInfo (0xc00110bbc0) start: > stop: > from 192.168.240.9:47494" -"2019-05-02 01:31:23.806 UTC [fsblkstorage] Next -> DEBU 112d Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:23.807 UTC [fsblkstorage] newBlockfileStream -> DEBU 112e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71370]" -"2019-05-02 01:31:23.807 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 112f Remaining bytes=[27296], Going to peek [8] bytes" -"2019-05-02 01:31:23.807 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1130 Returning blockbytes - length=[4710], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}" -"2019-05-02 01:31:23.808 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1131 blockbytes [4710] read from file [0]" -"2019-05-02 01:31:23.809 UTC [common.deliver] deliverBlocks -> DEBU 1132 [channel: businesschannel] Delivering block [3] for (0xc00110bbc0) for 192.168.240.9:47494" -"2019-05-02 01:31:23.810 UTC [common.deliver] deliverBlocks -> DEBU 1133 [channel: businesschannel] Done delivering to 192.168.240.9:47494 for (0xc00110bbc0)" -"2019-05-02 01:31:23.810 UTC [common.deliver] Handle -> DEBU 1134 Waiting for new SeekInfo from 192.168.240.9:47494" -"2019-05-02 01:31:23.811 UTC [common.deliver] Handle -> DEBU 1135 Attempting to read seek info message from 192.168.240.9:47494" -"2019-05-02 01:31:23.811 UTC [fsblkstorage] waitForBlock -> DEBU 1136 Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:23.812 UTC [fsblkstorage] waitForBlock -> DEBU 1137 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:23.818 UTC [common.deliver] Handle -> WARN 1138 Error reading from 192.168.240.9:47494: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:23.818 UTC [orderer.common.server] func1 -> DEBU 1139 Closing Deliver stream" -"2019-05-02 01:31:23.819 UTC [comm.grpc.server] 1 -> INFO 113a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47494 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.6575ms -"2019-05-02 01:31:23.819 UTC [grpc] infof -> DEBU 113b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:24.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113c Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" -"2019-05-02 01:31:24.040 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" -"2019-05-02 01:31:24.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.2µs " -"2019-05-02 01:31:24.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 233.4µs " -"2019-05-02 01:31:24.043 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1140 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:24.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1141 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:24.048 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1142 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:24.056 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1143 Sending msg of 28 bytes to 3 on channel testchainid took 1.1526ms" -"2019-05-02 01:31:24.058 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1144 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5317ms " -"2019-05-02 01:31:24.077 UTC [orderer.common.server] Deliver -> DEBU 1145 Starting new Deliver handler" -"2019-05-02 01:31:24.078 UTC [common.deliver] Handle -> DEBU 1146 Starting new deliver loop for 192.168.240.9:47496" -"2019-05-02 01:31:24.078 UTC [common.deliver] Handle -> DEBU 1147 Attempting to read seek info message from 192.168.240.9:47496" -"2019-05-02 01:31:24.079 UTC [policies] Evaluate -> DEBU 1148 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:24.080 UTC [policies] Evaluate -> DEBU 1149 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.080 UTC [policies] Evaluate -> DEBU 114a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:24.081 UTC [policies] Evaluate -> DEBU 114b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.081 UTC [policies] Evaluate -> DEBU 114c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:24.082 UTC [cauthdsl] func1 -> DEBU 114d 0xc00018f7a0 gate 1556760684082032700 evaluation starts" -"2019-05-02 01:31:24.082 UTC [cauthdsl] func2 -> DEBU 114e 0xc00018f7a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:24.083 UTC [cauthdsl] func2 -> DEBU 114f 0xc00018f7a0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:24.083 UTC [cauthdsl] func2 -> DEBU 1150 0xc00018f7a0 principal matched by identity 0" -"2019-05-02 01:31:24.084 UTC [msp.identity] Verify -> DEBU 1151 Verify: digest = 00000000 7a c5 f8 91 de 79 ce a6 18 95 b8 1c 71 f8 3e f6 |z....y......q.>.| -00000010 db 76 35 4f e3 de b5 1f ca c2 89 0b ea 91 c7 08 |.v5O............|" -"2019-05-02 01:31:24.084 UTC [msp.identity] Verify -> DEBU 1152 Verify: sig = 00000000 30 44 02 20 64 0e 03 49 9f 89 0e 1e 0b d4 7b 89 |0D. d..I......{.| -00000010 24 aa 78 bd 48 b4 eb 6e ce 19 55 83 93 bc e0 b2 |$.x.H..n..U.....| -00000020 b3 20 f5 89 02 20 50 d5 61 10 8c df 95 62 47 28 |. ... P.a....bG(| -00000030 24 ca 90 f3 78 d5 25 62 b8 a4 50 82 da 44 fc 41 |$...x.%b..P..D.A| -00000040 02 f4 e0 0c f5 0c |......|" -"2019-05-02 01:31:24.085 UTC [cauthdsl] func2 -> DEBU 1153 0xc00018f7a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:24.085 UTC [cauthdsl] func1 -> DEBU 1154 0xc00018f7a0 gate 1556760684082032700 evaluation succeeds" -"2019-05-02 01:31:24.086 UTC [policies] Evaluate -> DEBU 1155 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:24.086 UTC [policies] Evaluate -> DEBU 1156 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:24.087 UTC [policies] Evaluate -> DEBU 1157 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:24.087 UTC [policies] Evaluate -> DEBU 1158 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:24.088 UTC [policies] Evaluate -> DEBU 1159 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:24.090 UTC [policies] Evaluate -> DEBU 115a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:24.092 UTC [common.deliver] deliverBlocks -> DEBU 115b [channel: businesschannel] Received seekInfo (0xc00019b580) start: > stop: > from 192.168.240.9:47496" -"2019-05-02 01:31:24.093 UTC [fsblkstorage] Next -> DEBU 115c Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:24.093 UTC [fsblkstorage] newBlockfileStream -> DEBU 115d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76082]" -"2019-05-02 01:31:24.094 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 115e Remaining bytes=[22584], Going to peek [8] bytes" -"2019-05-02 01:31:24.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 115f Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" -"2019-05-02 01:31:24.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1160 blockbytes [4709] read from file [0]" -"2019-05-02 01:31:24.096 UTC [common.deliver] deliverBlocks -> DEBU 1161 [channel: businesschannel] Delivering block [4] for (0xc00019b580) for 192.168.240.9:47496" -"2019-05-02 01:31:24.096 UTC [common.deliver] deliverBlocks -> DEBU 1162 [channel: businesschannel] Done delivering to 192.168.240.9:47496 for (0xc00019b580)" -"2019-05-02 01:31:24.097 UTC [common.deliver] Handle -> DEBU 1163 Waiting for new SeekInfo from 192.168.240.9:47496" -"2019-05-02 01:31:24.097 UTC [common.deliver] Handle -> DEBU 1164 Attempting to read seek info message from 192.168.240.9:47496" -"2019-05-02 01:31:24.097 UTC [fsblkstorage] waitForBlock -> DEBU 1165 Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:24.097 UTC [fsblkstorage] waitForBlock -> DEBU 1166 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:24.106 UTC [common.deliver] Handle -> WARN 1167 Error reading from 192.168.240.9:47496: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:24.106 UTC [orderer.common.server] func1 -> DEBU 1168 Closing Deliver stream" -"2019-05-02 01:31:24.107 UTC [comm.grpc.server] 1 -> INFO 1169 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47496 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.3572ms -"2019-05-02 01:31:24.108 UTC [grpc] infof -> DEBU 116a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:24.410 UTC [orderer.common.server] Deliver -> DEBU 116b Starting new Deliver handler" -"2019-05-02 01:31:24.410 UTC [common.deliver] Handle -> DEBU 116c Starting new deliver loop for 192.168.240.9:47498" -"2019-05-02 01:31:24.411 UTC [common.deliver] Handle -> DEBU 116d Attempting to read seek info message from 192.168.240.9:47498" -"2019-05-02 01:31:24.412 UTC [policies] Evaluate -> DEBU 116e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:24.412 UTC [policies] Evaluate -> DEBU 116f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.412 UTC [policies] Evaluate -> DEBU 1170 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:24.413 UTC [policies] Evaluate -> DEBU 1171 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.413 UTC [policies] Evaluate -> DEBU 1172 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:24.414 UTC [cauthdsl] func1 -> DEBU 1173 0xc00048dca0 gate 1556760684414286600 evaluation starts" -"2019-05-02 01:31:24.414 UTC [cauthdsl] func2 -> DEBU 1174 0xc00048dca0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:24.415 UTC [cauthdsl] func2 -> DEBU 1175 0xc00048dca0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:24.415 UTC [cauthdsl] func2 -> DEBU 1176 0xc00048dca0 principal matched by identity 0" -"2019-05-02 01:31:24.416 UTC [msp.identity] Verify -> DEBU 1177 Verify: digest = 00000000 d7 c4 1d e1 47 b2 88 b2 50 f2 73 3a a8 d0 f1 50 |....G...P.s:...P| -00000010 c5 91 31 98 31 34 48 be a8 87 e2 5d 9b 83 03 e3 |..1.14H....]....|" -"2019-05-02 01:31:24.416 UTC [msp.identity] Verify -> DEBU 1178 Verify: sig = 00000000 30 44 02 20 37 44 24 e5 7c e2 3d c9 9a aa a7 ec |0D. 7D$.|.=.....| -00000010 99 b1 68 36 b8 b2 cd 9a fb b4 ec d8 75 47 64 a5 |..h6........uGd.| -00000020 64 de 53 ff 02 20 26 7c b8 7a b9 f6 3c 6c ff af |d.S.. &|.z.. DEBU 1179 0xc00048dca0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:24.417 UTC [cauthdsl] func1 -> DEBU 117a 0xc00048dca0 gate 1556760684414286600 evaluation succeeds" -"2019-05-02 01:31:24.418 UTC [policies] Evaluate -> DEBU 117b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:24.419 UTC [policies] Evaluate -> DEBU 117c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:24.419 UTC [policies] Evaluate -> DEBU 117d Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:24.420 UTC [policies] Evaluate -> DEBU 117e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:24.420 UTC [policies] Evaluate -> DEBU 117f Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:24.421 UTC [policies] Evaluate -> DEBU 1180 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:24.421 UTC [common.deliver] deliverBlocks -> DEBU 1181 [channel: businesschannel] Received seekInfo (0xc00019bac0) start: > stop: > from 192.168.240.9:47498" -"2019-05-02 01:31:24.422 UTC [fsblkstorage] Next -> DEBU 1182 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:24.422 UTC [fsblkstorage] newBlockfileStream -> DEBU 1183 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80793]" -"2019-05-02 01:31:24.423 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1184 Remaining bytes=[17873], Going to peek [8] bytes" -"2019-05-02 01:31:24.423 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1185 Returning blockbytes - length=[5711], placementInfo={fileNum=[0], startOffset=[80793], bytesOffset=[80795]}" -"2019-05-02 01:31:24.424 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1186 blockbytes [5711] read from file [0]" -"2019-05-02 01:31:24.425 UTC [common.deliver] deliverBlocks -> DEBU 1187 [channel: businesschannel] Delivering block [5] for (0xc00019bac0) for 192.168.240.9:47498" -"2019-05-02 01:31:24.426 UTC [common.deliver] deliverBlocks -> DEBU 1188 [channel: businesschannel] Done delivering to 192.168.240.9:47498 for (0xc00019bac0)" -"2019-05-02 01:31:24.427 UTC [fsblkstorage] waitForBlock -> DEBU 1189 Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:24.428 UTC [fsblkstorage] waitForBlock -> DEBU 118a Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:24.429 UTC [common.deliver] Handle -> DEBU 118b Waiting for new SeekInfo from 192.168.240.9:47498" -"2019-05-02 01:31:24.431 UTC [common.deliver] Handle -> DEBU 118c Attempting to read seek info message from 192.168.240.9:47498" -"2019-05-02 01:31:24.439 UTC [common.deliver] Handle -> WARN 118d Error reading from 192.168.240.9:47498: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:24.439 UTC [orderer.common.server] func1 -> DEBU 118e Closing Deliver stream" -"2019-05-02 01:31:24.440 UTC [comm.grpc.server] 1 -> INFO 118f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47498 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.7036ms -"2019-05-02 01:31:24.441 UTC [grpc] infof -> DEBU 1190 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:24.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1191 Sending msg of 28 bytes to 2 on channel businesschannel took 38µs" -"2019-05-02 01:31:24.542 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1192 Sending msg of 28 bytes to 3 on channel businesschannel took 38.1µs" -"2019-05-02 01:31:24.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1193 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 693µs " -"2019-05-02 01:31:24.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1194 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:24.544 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1195 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 826.1µs " -"2019-05-02 01:31:24.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1196 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:24.547 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1197 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:24.548 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1198 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.2µs " -"2019-05-02 01:31:24.546 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1199 Sending msg of 28 bytes to 3 on channel testchainid took 147.6µs" -"2019-05-02 01:31:24.807 UTC [orderer.common.server] Deliver -> DEBU 119a Starting new Deliver handler" -"2019-05-02 01:31:24.808 UTC [common.deliver] Handle -> DEBU 119b Starting new deliver loop for 192.168.240.9:47500" -"2019-05-02 01:31:24.810 UTC [common.deliver] Handle -> DEBU 119c Attempting to read seek info message from 192.168.240.9:47500" -"2019-05-02 01:31:24.812 UTC [policies] Evaluate -> DEBU 119d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:24.812 UTC [policies] Evaluate -> DEBU 119e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.812 UTC [policies] Evaluate -> DEBU 119f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:24.813 UTC [policies] Evaluate -> DEBU 11a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.813 UTC [policies] Evaluate -> DEBU 11a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:24.813 UTC [cauthdsl] func1 -> DEBU 11a2 0xc0002ebc80 gate 1556760684813147400 evaluation starts" -"2019-05-02 01:31:24.813 UTC [cauthdsl] func2 -> DEBU 11a3 0xc0002ebc80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:24.813 UTC [cauthdsl] func2 -> DEBU 11a4 0xc0002ebc80 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:24.813 UTC [cauthdsl] func2 -> DEBU 11a5 0xc0002ebc80 principal matched by identity 0" -"2019-05-02 01:31:24.813 UTC [msp.identity] Verify -> DEBU 11a6 Verify: digest = 00000000 a0 73 bf e9 71 11 16 54 9d 4c 6f 5d a1 41 5b c5 |.s..q..T.Lo].A[.| -00000010 5a 78 23 76 ea c2 f0 ad 43 6a e4 97 b0 e5 20 2d |Zx#v....Cj.... -|" -"2019-05-02 01:31:24.814 UTC [msp.identity] Verify -> DEBU 11a7 Verify: sig = 00000000 30 44 02 20 4e 55 15 0f fe 8b 32 3c e4 91 74 c3 |0D. NU....2<..t.| -00000010 bf 6c 3f 48 f1 50 7d af db d3 ef bf f3 10 37 c2 |.l?H.P}.......7.| -00000020 d5 ae 54 41 02 20 0c 5b 94 3e 97 fa 21 19 05 5a |..TA. .[.>..!..Z| -00000030 fb ef 38 49 51 3e f6 0f 35 9d b9 f8 8b 2a 53 5f |..8IQ>..5....*S_| -00000040 3c b1 dc d0 23 c8 |<...#.|" -"2019-05-02 01:31:24.814 UTC [cauthdsl] func2 -> DEBU 11a8 0xc0002ebc80 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:24.814 UTC [cauthdsl] func1 -> DEBU 11a9 0xc0002ebc80 gate 1556760684813147400 evaluation succeeds" -"2019-05-02 01:31:24.814 UTC [policies] Evaluate -> DEBU 11aa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:24.814 UTC [policies] Evaluate -> DEBU 11ab == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:24.814 UTC [policies] Evaluate -> DEBU 11ac Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:24.814 UTC [policies] Evaluate -> DEBU 11ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:24.815 UTC [policies] Evaluate -> DEBU 11ae Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:24.815 UTC [policies] Evaluate -> DEBU 11af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:24.815 UTC [common.deliver] deliverBlocks -> DEBU 11b0 [channel: businesschannel] Received seekInfo (0xc00016f440) start: > stop: > from 192.168.240.9:47500" -"2019-05-02 01:31:24.815 UTC [fsblkstorage] Next -> DEBU 11b1 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:24.815 UTC [fsblkstorage] newBlockfileStream -> DEBU 11b2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86506]" -"2019-05-02 01:31:24.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b3 Remaining bytes=[12160], Going to peek [8] bytes" -"2019-05-02 01:31:24.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b4 Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86506], bytesOffset=[86508]}" -"2019-05-02 01:31:24.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b5 blockbytes [4058] read from file [0]" -"2019-05-02 01:31:24.816 UTC [common.deliver] deliverBlocks -> DEBU 11b6 [channel: businesschannel] Delivering block [6] for (0xc00016f440) for 192.168.240.9:47500" -"2019-05-02 01:31:24.817 UTC [common.deliver] deliverBlocks -> DEBU 11b7 [channel: businesschannel] Done delivering to 192.168.240.9:47500 for (0xc00016f440)" -"2019-05-02 01:31:24.817 UTC [common.deliver] Handle -> DEBU 11b8 Waiting for new SeekInfo from 192.168.240.9:47500" -"2019-05-02 01:31:24.817 UTC [common.deliver] Handle -> DEBU 11b9 Attempting to read seek info message from 192.168.240.9:47500" -"2019-05-02 01:31:24.817 UTC [fsblkstorage] waitForBlock -> DEBU 11ba Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:24.817 UTC [fsblkstorage] waitForBlock -> DEBU 11bb Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:24.825 UTC [common.deliver] Handle -> WARN 11bc Error reading from 192.168.240.9:47500: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:24.826 UTC [orderer.common.server] func1 -> DEBU 11bd Closing Deliver stream" -"2019-05-02 01:31:24.826 UTC [comm.grpc.server] 1 -> INFO 11be streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47500 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.6365ms -"2019-05-02 01:31:24.829 UTC [grpc] infof -> DEBU 11bf transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:25.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c0 Sending msg of 28 bytes to 2 on channel businesschannel took 30.8µs" -"2019-05-02 01:31:25.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c1 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" -"2019-05-02 01:31:25.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471.1µs " -"2019-05-02 01:31:25.043 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7171ms " -"2019-05-02 01:31:25.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:25.045 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c5 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:25.050 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c7 Sending msg of 28 bytes to 3 on channel testchainid took 39.5µs" -"2019-05-02 01:31:25.051 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 337.7µs " -"2019-05-02 01:31:25.047 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c6 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:25.117 UTC [orderer.common.server] Deliver -> DEBU 11c9 Starting new Deliver handler" -"2019-05-02 01:31:25.118 UTC [common.deliver] Handle -> DEBU 11ca Starting new deliver loop for 192.168.240.9:47502" -"2019-05-02 01:31:25.118 UTC [common.deliver] Handle -> DEBU 11cb Attempting to read seek info message from 192.168.240.9:47502" -"2019-05-02 01:31:25.119 UTC [policies] Evaluate -> DEBU 11cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:25.120 UTC [policies] Evaluate -> DEBU 11cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:25.122 UTC [policies] Evaluate -> DEBU 11ce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:25.122 UTC [policies] Evaluate -> DEBU 11cf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:25.122 UTC [policies] Evaluate -> DEBU 11d0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:25.123 UTC [cauthdsl] func1 -> DEBU 11d1 0xc000981320 gate 1556760685123286900 evaluation starts" -"2019-05-02 01:31:25.124 UTC [cauthdsl] func2 -> DEBU 11d2 0xc000981320 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:25.124 UTC [cauthdsl] func2 -> DEBU 11d3 0xc000981320 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:25.125 UTC [cauthdsl] func2 -> DEBU 11d4 0xc000981320 principal matched by identity 0" -"2019-05-02 01:31:25.129 UTC [msp.identity] Verify -> DEBU 11d5 Verify: digest = 00000000 f0 8a 65 bb 4f 5e e4 f9 eb d1 26 0f 9c d6 e4 6f |..e.O^....&....o| -00000010 a3 be 10 d9 88 d7 90 ed 3d 16 47 9e 5f 82 05 87 |........=.G._...|" -"2019-05-02 01:31:25.131 UTC [msp.identity] Verify -> DEBU 11d6 Verify: sig = 00000000 30 44 02 20 45 0c e1 20 bd 90 6a f0 3b 2b ef 46 |0D. E.. ..j.;+.F| -00000010 72 a3 f2 5d 87 9a ac 8e 9e bb cf 5e be b9 ae 31 |r..].......^...1| -00000020 a0 ad 51 7f 02 20 5a 19 03 a8 51 97 0d d7 a7 88 |..Q.. Z...Q.....| -00000030 2d 25 2f ba ee c5 aa cd 87 9a 6a e5 0e a5 cf 1c |-%/.......j.....| -00000040 c0 2b 0c f5 93 54 |.+...T|" -"2019-05-02 01:31:25.140 UTC [cauthdsl] func2 -> DEBU 11d7 0xc000981320 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:25.140 UTC [cauthdsl] func1 -> DEBU 11d8 0xc000981320 gate 1556760685123286900 evaluation succeeds" -"2019-05-02 01:31:25.141 UTC [policies] Evaluate -> DEBU 11d9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:25.142 UTC [policies] Evaluate -> DEBU 11da == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:25.143 UTC [policies] Evaluate -> DEBU 11db Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:25.144 UTC [policies] Evaluate -> DEBU 11dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:25.144 UTC [policies] Evaluate -> DEBU 11dd Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:25.145 UTC [policies] Evaluate -> DEBU 11de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:25.145 UTC [common.deliver] deliverBlocks -> DEBU 11df [channel: businesschannel] Received seekInfo (0xc00017e400) start: > stop: > from 192.168.240.9:47502" -"2019-05-02 01:31:25.146 UTC [fsblkstorage] Next -> DEBU 11e0 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:25.146 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90566]" -"2019-05-02 01:31:25.147 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e2 Remaining bytes=[8100], Going to peek [8] bytes" -"2019-05-02 01:31:25.148 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e3 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90566], bytesOffset=[90568]}" -"2019-05-02 01:31:25.148 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e4 blockbytes [4048] read from file [0]" -"2019-05-02 01:31:25.149 UTC [common.deliver] deliverBlocks -> DEBU 11e5 [channel: businesschannel] Delivering block [7] for (0xc00017e400) for 192.168.240.9:47502" -"2019-05-02 01:31:25.150 UTC [common.deliver] deliverBlocks -> DEBU 11e6 [channel: businesschannel] Done delivering to 192.168.240.9:47502 for (0xc00017e400)" -"2019-05-02 01:31:25.150 UTC [fsblkstorage] waitForBlock -> DEBU 11e7 Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:25.151 UTC [fsblkstorage] waitForBlock -> DEBU 11e8 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:25.153 UTC [common.deliver] Handle -> DEBU 11e9 Waiting for new SeekInfo from 192.168.240.9:47502" -"2019-05-02 01:31:25.159 UTC [common.deliver] Handle -> DEBU 11ea Attempting to read seek info message from 192.168.240.9:47502" -"2019-05-02 01:31:25.161 UTC [grpc] warningf -> DEBU 11eb transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.2:7050->192.168.240.9:47502: read: connection reset by peer" -"2019-05-02 01:31:25.163 UTC [common.deliver] Handle -> WARN 11ec Error reading from 192.168.240.9:47502: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:25.163 UTC [orderer.common.server] func1 -> DEBU 11ed Closing Deliver stream" -"2019-05-02 01:31:25.163 UTC [comm.grpc.server] 1 -> INFO 11ee streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47502 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=46.8627ms -"2019-05-02 01:31:25.164 UTC [grpc] infof -> DEBU 11ef transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:25.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f0 Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" -"2019-05-02 01:31:25.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82µs " -"2019-05-02 01:31:25.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:25.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:25.547 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f4 Sending msg of 28 bytes to 3 on channel testchainid took 19µs" -"2019-05-02 01:31:25.547 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114µs " -"2019-05-02 01:31:25.549 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 587.4µs " -"2019-05-02 01:31:25.554 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:25.555 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f8 Sending msg of 28 bytes to 3 on channel businesschannel took 6.5538ms" -"2019-05-02 01:31:25.600 UTC [orderer.common.server] Deliver -> DEBU 11f9 Starting new Deliver handler" -"2019-05-02 01:31:25.601 UTC [common.deliver] Handle -> DEBU 11fa Starting new deliver loop for 192.168.240.9:47504" -"2019-05-02 01:31:25.602 UTC [common.deliver] Handle -> DEBU 11fb Attempting to read seek info message from 192.168.240.9:47504" -"2019-05-02 01:31:25.611 UTC [policies] Evaluate -> DEBU 11fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:25.612 UTC [policies] Evaluate -> DEBU 11fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:25.612 UTC [policies] Evaluate -> DEBU 11fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:25.613 UTC [policies] Evaluate -> DEBU 11ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:25.614 UTC [policies] Evaluate -> DEBU 1200 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:25.614 UTC [cauthdsl] func1 -> DEBU 1201 0xc000bf0920 gate 1556760685614674700 evaluation starts" -"2019-05-02 01:31:25.615 UTC [cauthdsl] func2 -> DEBU 1202 0xc000bf0920 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:25.615 UTC [cauthdsl] func2 -> DEBU 1203 0xc000bf0920 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:25.616 UTC [cauthdsl] func2 -> DEBU 1204 0xc000bf0920 principal matched by identity 0" -"2019-05-02 01:31:25.616 UTC [msp.identity] Verify -> DEBU 1205 Verify: digest = 00000000 32 62 9b 7e 14 ea 59 00 b8 da d3 7f 1c 68 25 66 |2b.~..Y......h%f| -00000010 60 35 6d 30 4e c1 88 e5 3c aa 64 e6 3c b6 1b 92 |`5m0N...<.d.<...|" -"2019-05-02 01:31:25.617 UTC [msp.identity] Verify -> DEBU 1206 Verify: sig = 00000000 30 44 02 20 48 df c8 cf 66 1d 4b dd 3c c8 16 27 |0D. H...f.K.<..'| -00000010 6d 3d 96 b0 18 52 a8 8f e6 39 27 b3 3d 09 84 47 |m=...R...9'.=..G| -00000020 a1 5b 6a 6a 02 20 49 24 80 be dc c7 3a cb 1a 64 |.[jj. I$....:..d| -00000030 f1 3b bf e1 17 e7 2c 20 e5 e2 f2 06 17 e5 4c d4 |.;...., ......L.| -00000040 0e 2b b6 cb 97 57 |.+...W|" -"2019-05-02 01:31:25.618 UTC [cauthdsl] func2 -> DEBU 1207 0xc000bf0920 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:25.621 UTC [cauthdsl] func1 -> DEBU 1208 0xc000bf0920 gate 1556760685614674700 evaluation succeeds" -"2019-05-02 01:31:25.626 UTC [policies] Evaluate -> DEBU 1209 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:25.627 UTC [policies] Evaluate -> DEBU 120a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:25.627 UTC [policies] Evaluate -> DEBU 120b Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:25.628 UTC [policies] Evaluate -> DEBU 120c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:25.629 UTC [policies] Evaluate -> DEBU 120d Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:25.630 UTC [policies] Evaluate -> DEBU 120e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:25.630 UTC [common.deliver] deliverBlocks -> DEBU 120f [channel: businesschannel] Received seekInfo (0xc00017ef40) start: > stop: > from 192.168.240.9:47504" -"2019-05-02 01:31:25.631 UTC [fsblkstorage] Next -> DEBU 1210 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" -"2019-05-02 01:31:25.632 UTC [fsblkstorage] newBlockfileStream -> DEBU 1211 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94616]" -"2019-05-02 01:31:25.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1212 Remaining bytes=[4050], Going to peek [8] bytes" -"2019-05-02 01:31:25.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1213 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[94616], bytesOffset=[94618]}" -"2019-05-02 01:31:25.633 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1214 blockbytes [4048] read from file [0]" -"2019-05-02 01:31:25.633 UTC [common.deliver] deliverBlocks -> DEBU 1215 [channel: businesschannel] Delivering block [8] for (0xc00017ef40) for 192.168.240.9:47504" -"2019-05-02 01:31:25.634 UTC [common.deliver] deliverBlocks -> DEBU 1216 [channel: businesschannel] Done delivering to 192.168.240.9:47504 for (0xc00017ef40)" -"2019-05-02 01:31:25.635 UTC [fsblkstorage] waitForBlock -> DEBU 1217 Came out of wait. maxAvailaBlockNumber=[8]" -"2019-05-02 01:31:25.635 UTC [fsblkstorage] waitForBlock -> DEBU 1218 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" -"2019-05-02 01:31:25.636 UTC [common.deliver] Handle -> DEBU 1219 Waiting for new SeekInfo from 192.168.240.9:47504" -"2019-05-02 01:31:25.645 UTC [common.deliver] Handle -> DEBU 121b Attempting to read seek info message from 192.168.240.9:47504" -"2019-05-02 01:31:25.643 UTC [grpc] infof -> DEBU 121a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:25.647 UTC [common.deliver] Handle -> WARN 121c Error reading from 192.168.240.9:47504: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:25.648 UTC [orderer.common.server] func1 -> DEBU 121d Closing Deliver stream" -"2019-05-02 01:31:25.649 UTC [comm.grpc.server] 1 -> INFO 121e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47504 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=49.2001ms -"2019-05-02 01:31:26.048 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 121f Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs" -"2019-05-02 01:31:26.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1220 Sending msg of 28 bytes to 3 on channel businesschannel took 354.5µs" -"2019-05-02 01:31:26.056 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1221 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1873ms " -"2019-05-02 01:31:26.058 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1222 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 510.3µs " -"2019-05-02 01:31:26.059 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1223 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:26.171 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1225 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:26.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1224 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:26.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1226 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" -"2019-05-02 01:31:26.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1227 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.8µs " -"2019-05-02 01:31:26.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1228 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:26.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1229 Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs" -"2019-05-02 01:31:26.547 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191µs " -"2019-05-02 01:31:26.551 UTC [orderer.common.server] Deliver -> DEBU 122b Starting new Deliver handler" -"2019-05-02 01:31:26.552 UTC [common.deliver] Handle -> DEBU 122c Starting new deliver loop for 192.168.240.9:47506" -"2019-05-02 01:31:26.553 UTC [common.deliver] Handle -> DEBU 122d Attempting to read seek info message from 192.168.240.9:47506" -"2019-05-02 01:31:26.557 UTC [policies] Evaluate -> DEBU 122e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:26.559 UTC [policies] Evaluate -> DEBU 122f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:26.561 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" -"2019-05-02 01:31:26.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1231 Sending msg of 28 bytes to 3 on channel businesschannel took 47µs" -"2019-05-02 01:31:26.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1232 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3874ms " -"2019-05-02 01:31:26.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1233 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.2µs " -"2019-05-02 01:31:26.560 UTC [policies] Evaluate -> DEBU 1234 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:26.573 UTC [policies] Evaluate -> DEBU 1235 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:26.573 UTC [policies] Evaluate -> DEBU 1236 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:26.573 UTC [msp] DeserializeIdentity -> DEBU 1237 Obtaining identity" -"2019-05-02 01:31:26.575 UTC [msp.identity] newIdentity -> DEBU 1238 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:52.491 UTC [cauthdsl] func1 -> DEBU f4a 0xc000c5d630 gate 1556789272491766100 evaluation starts" +"2019-05-02 09:27:52.492 UTC [cauthdsl] func2 -> DEBU f4b 0xc000c5d630 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.492 UTC [cauthdsl] func2 -> DEBU f4c 0xc000c5d630 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:52.493 UTC [cauthdsl] func2 -> DEBU f4d 0xc000c5d630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:52.493 UTC [cauthdsl] func2 -> DEBU f4e 0xc000c5d630 principal evaluation fails" +"2019-05-02 09:27:52.494 UTC [cauthdsl] func1 -> DEBU f4f 0xc000c5d630 gate 1556789272491766100 evaluation fails" +"2019-05-02 09:27:52.494 UTC [policies] Evaluate -> DEBU f50 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.494 UTC [policies] Evaluate -> DEBU f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.494 UTC [policies] Evaluate -> DEBU f52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.495 UTC [cauthdsl] func1 -> DEBU f53 0xc000b88770 gate 1556789272495359700 evaluation starts" +"2019-05-02 09:27:52.495 UTC [cauthdsl] func2 -> DEBU f54 0xc000b88770 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.495 UTC [cauthdsl] func2 -> DEBU f55 0xc000b88770 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:52.496 UTC [cauthdsl] func2 -> DEBU f56 0xc000b88770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:52.496 UTC [cauthdsl] func2 -> DEBU f57 0xc000b88770 principal evaluation fails" +"2019-05-02 09:27:52.496 UTC [cauthdsl] func1 -> DEBU f58 0xc000b88770 gate 1556789272495359700 evaluation fails" +"2019-05-02 09:27:52.497 UTC [policies] Evaluate -> DEBU f59 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.497 UTC [policies] Evaluate -> DEBU f5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.498 UTC [policies] func1 -> DEBU f5b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:52.499 UTC [policies] Evaluate -> DEBU f5c Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:52.499 UTC [policies] Evaluate -> DEBU f5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.499 UTC [policies] Evaluate -> DEBU f5e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:52.500 UTC [policies] Evaluate -> DEBU f5f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.500 UTC [policies] Evaluate -> DEBU f60 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:52.501 UTC [cauthdsl] func1 -> DEBU f61 0xc000b89480 gate 1556789272500902900 evaluation starts" +"2019-05-02 09:27:52.501 UTC [cauthdsl] func2 -> DEBU f62 0xc000b89480 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.501 UTC [cauthdsl] func2 -> DEBU f63 0xc000b89480 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:52.501 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU f64 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-05-02 09:27:52.501 UTC [msp] Validate -> DEBU f65 MSP OrdererMSP validating identity" +"2019-05-02 09:27:52.502 UTC [cauthdsl] func2 -> DEBU f66 0xc000b89480 principal matched by identity 0" +"2019-05-02 09:27:52.502 UTC [msp.identity] Verify -> DEBU f67 Verify: digest = 00000000 aa 2a aa ac 5f 58 db 10 7a 6b fc 41 0c a7 56 fb |.*.._X..zk.A..V.| +00000010 c6 ae 5c cc 06 8c 4d 21 df 90 b4 b1 59 5b 03 64 |..\...M!....Y[.d|" +"2019-05-02 09:27:52.502 UTC [msp.identity] Verify -> DEBU f68 Verify: sig = 00000000 30 44 02 20 56 3e 60 41 52 6c e3 38 cc 81 e4 fc |0D. V>`ARl.8....| +00000010 6b 85 79 6f e2 ea df f2 38 5e 44 22 6b cc ca 09 |k.yo....8^D"k...| +00000020 e3 a3 09 6e 02 20 7a 91 90 c9 79 b5 e7 1b 0e 15 |...n. z...y.....| +00000030 88 bf c1 4e 3f da 66 b6 7c 82 16 4a d7 fd 08 d8 |...N?.f.|..J....| +00000040 9d 6e 2f 73 05 68 |.n/s.h|" +"2019-05-02 09:27:52.509 UTC [cauthdsl] func2 -> DEBU f69 0xc000b89480 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.509 UTC [cauthdsl] func1 -> DEBU f6a 0xc000b89480 gate 1556789272500902900 evaluation succeeds" +"2019-05-02 09:27:52.509 UTC [policies] Evaluate -> DEBU f6b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:52.510 UTC [policies] Evaluate -> DEBU f6c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:52.510 UTC [policies] Evaluate -> DEBU f6d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:52.511 UTC [policies] Evaluate -> DEBU f6e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:52.511 UTC [policies] Evaluate -> DEBU f6f Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:52.511 UTC [policies] Evaluate -> DEBU f70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:52.512 UTC [common.deliver] deliverBlocks -> DEBU f71 [channel: businesschannel] Received seekInfo (0xc00102bac0) start: > stop: > from 172.18.0.8:57352" +"2019-05-02 09:27:52.513 UTC [fsblkstorage] Next -> DEBU f72 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:52.513 UTC [fsblkstorage] newBlockfileStream -> DEBU f73 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]" +"2019-05-02 09:27:52.514 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f74 Remaining bytes=[4051], Going to peek [8] bytes" +"2019-05-02 09:27:52.514 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f75 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}" +"2019-05-02 09:27:52.514 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f76 blockbytes [4049] read from file [0]" +"2019-05-02 09:27:52.515 UTC [common.deliver] deliverBlocks -> DEBU f77 [channel: businesschannel] Delivering block [8] for (0xc00102bac0) for 172.18.0.8:57352" +"2019-05-02 09:27:52.533 UTC [common.deliver] deliverBlocks -> DEBU f78 [channel: businesschannel] Done delivering to 172.18.0.8:57352 for (0xc00102bac0)" +"2019-05-02 09:27:52.534 UTC [common.deliver] Handle -> DEBU f79 Waiting for new SeekInfo from 172.18.0.8:57352" +"2019-05-02 09:27:52.534 UTC [common.deliver] Handle -> DEBU f7a Attempting to read seek info message from 172.18.0.8:57352" +"2019-05-02 09:27:52.538 UTC [common.deliver] Handle -> WARN f7b Error reading from 172.18.0.8:57352: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:52.538 UTC [orderer.common.server] func1 -> DEBU f7c Closing Deliver stream" +"2019-05-02 09:27:52.538 UTC [comm.grpc.server] 1 -> INFO f7d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57352 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=50.4727ms +"2019-05-02 09:27:52.539 UTC [grpc] infof -> DEBU f7e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:52.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:52.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f80 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +"2019-05-02 09:27:52.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU f81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 715.1µs " +"2019-05-02 09:27:52.746 UTC [orderer.common.server] Deliver -> DEBU f82 Starting new Deliver handler" +"2019-05-02 09:27:52.746 UTC [common.deliver] Handle -> DEBU f83 Starting new deliver loop for 172.18.0.8:57354" +"2019-05-02 09:27:52.746 UTC [common.deliver] Handle -> DEBU f84 Attempting to read seek info message from 172.18.0.8:57354" +"2019-05-02 09:27:52.749 UTC [policies] Evaluate -> DEBU f85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:52.749 UTC [policies] Evaluate -> DEBU f86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.749 UTC [policies] Evaluate -> DEBU f87 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.754 UTC [policies] Evaluate -> DEBU f88 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.755 UTC [policies] Evaluate -> DEBU f89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.756 UTC [cauthdsl] func1 -> DEBU f8a 0xc000b937b0 gate 1556789272756392300 evaluation starts" +"2019-05-02 09:27:52.757 UTC [cauthdsl] func2 -> DEBU f8b 0xc000b937b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.757 UTC [cauthdsl] func2 -> DEBU f8c 0xc000b937b0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:52.758 UTC [cauthdsl] func2 -> DEBU f8d 0xc000b937b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:52.758 UTC [cauthdsl] func2 -> DEBU f8e 0xc000b937b0 principal evaluation fails" +"2019-05-02 09:27:52.759 UTC [cauthdsl] func1 -> DEBU f8f 0xc000b937b0 gate 1556789272756392300 evaluation fails" +"2019-05-02 09:27:52.760 UTC [policies] Evaluate -> DEBU f90 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.760 UTC [policies] Evaluate -> DEBU f91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.761 UTC [policies] Evaluate -> DEBU f92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.761 UTC [cauthdsl] func1 -> DEBU f93 0xc000b93ff0 gate 1556789272761807700 evaluation starts" +"2019-05-02 09:27:52.763 UTC [cauthdsl] func2 -> DEBU f94 0xc000b93ff0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.765 UTC [cauthdsl] func2 -> DEBU f95 0xc000b93ff0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:52.767 UTC [cauthdsl] func2 -> DEBU f96 0xc000b93ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:52.768 UTC [cauthdsl] func2 -> DEBU f97 0xc000b93ff0 principal evaluation fails" +"2019-05-02 09:27:52.770 UTC [cauthdsl] func1 -> DEBU f98 0xc000b93ff0 gate 1556789272761807700 evaluation fails" +"2019-05-02 09:27:52.774 UTC [policies] Evaluate -> DEBU f99 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.775 UTC [policies] Evaluate -> DEBU f9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.776 UTC [policies] func1 -> DEBU f9b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU f9c Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:52.778 UTC [policies] Evaluate -> DEBU f9d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.778 UTC [policies] Evaluate -> DEBU f9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:52.779 UTC [policies] Evaluate -> DEBU f9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.779 UTC [policies] Evaluate -> DEBU fa0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:52.779 UTC [cauthdsl] func1 -> DEBU fa1 0xc0008aece0 gate 1556789272779495000 evaluation starts" +"2019-05-02 09:27:52.779 UTC [cauthdsl] func2 -> DEBU fa2 0xc0008aece0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.780 UTC [cauthdsl] func2 -> DEBU fa3 0xc0008aece0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:52.789 UTC [cauthdsl] func2 -> DEBU fa4 0xc0008aece0 principal matched by identity 0" +"2019-05-02 09:27:52.791 UTC [msp.identity] Verify -> DEBU fa5 Verify: digest = 00000000 51 b5 59 49 8e 88 d2 29 bb 35 a7 3a cb 1a cd 85 |Q.YI...).5.:....| +00000010 63 9b 8d 93 72 30 ef c3 a6 7c 09 ce 62 06 95 9b |c...r0...|..b...|" +"2019-05-02 09:27:52.791 UTC [msp.identity] Verify -> DEBU fa6 Verify: sig = 00000000 30 44 02 20 7f 7c 8d 61 da 00 c4 15 7c e1 1e 8b |0D. .|.a....|...| +00000010 2e f1 c8 8a 9a 56 aa b5 bd 74 56 b9 40 96 a7 ba |.....V...tV.@...| +00000020 0f ba f2 6c 02 20 50 97 b2 2d 85 a0 f5 b7 ca 97 |...l. P..-......| +00000030 77 42 f7 33 5e 86 61 14 70 1e 47 76 51 d2 ef 68 |wB.3^.a.p.GvQ..h| +00000040 0a 49 7e 6f af c6 |.I~o..|" +"2019-05-02 09:27:52.792 UTC [cauthdsl] func2 -> DEBU fa7 0xc0008aece0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.792 UTC [cauthdsl] func1 -> DEBU fa8 0xc0008aece0 gate 1556789272779495000 evaluation succeeds" +"2019-05-02 09:27:52.793 UTC [policies] Evaluate -> DEBU fa9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:52.793 UTC [policies] Evaluate -> DEBU faa == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:52.795 UTC [policies] Evaluate -> DEBU fab Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:52.796 UTC [policies] Evaluate -> DEBU fac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:52.796 UTC [policies] Evaluate -> DEBU fad Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:52.797 UTC [policies] Evaluate -> DEBU fae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:52.797 UTC [common.deliver] deliverBlocks -> DEBU faf [channel: businesschannel] Received seekInfo (0xc0010ce040) start: > stop: > from 172.18.0.8:57354" +"2019-05-02 09:27:52.797 UTC [fsblkstorage] Next -> DEBU fb0 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:52.798 UTC [fsblkstorage] newBlockfileStream -> DEBU fb1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]" +"2019-05-02 09:27:52.799 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fb2 Remaining bytes=[4051], Going to peek [8] bytes" +"2019-05-02 09:27:52.799 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fb3 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}" +"2019-05-02 09:27:52.799 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fb4 blockbytes [4049] read from file [0]" +"2019-05-02 09:27:52.799 UTC [common.deliver] deliverBlocks -> DEBU fb5 [channel: businesschannel] Delivering block [8] for (0xc0010ce040) for 172.18.0.8:57354" +"2019-05-02 09:27:52.800 UTC [common.deliver] deliverBlocks -> DEBU fb6 [channel: businesschannel] Done delivering to 172.18.0.8:57354 for (0xc0010ce040)" +"2019-05-02 09:27:52.800 UTC [common.deliver] Handle -> DEBU fb7 Waiting for new SeekInfo from 172.18.0.8:57354" +"2019-05-02 09:27:52.801 UTC [common.deliver] Handle -> DEBU fb8 Attempting to read seek info message from 172.18.0.8:57354" +"2019-05-02 09:27:52.802 UTC [policies] Evaluate -> DEBU fb9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:52.802 UTC [policies] Evaluate -> DEBU fba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.802 UTC [policies] Evaluate -> DEBU fbb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.803 UTC [policies] Evaluate -> DEBU fbc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.803 UTC [policies] Evaluate -> DEBU fbd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.803 UTC [cauthdsl] func1 -> DEBU fbe 0xc0008c48a0 gate 1556789272803415100 evaluation starts" +"2019-05-02 09:27:52.803 UTC [cauthdsl] func2 -> DEBU fbf 0xc0008c48a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.804 UTC [cauthdsl] func2 -> DEBU fc0 0xc0008c48a0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:52.804 UTC [cauthdsl] func2 -> DEBU fc1 0xc0008c48a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:52.804 UTC [cauthdsl] func2 -> DEBU fc2 0xc0008c48a0 principal evaluation fails" +"2019-05-02 09:27:52.804 UTC [cauthdsl] func1 -> DEBU fc3 0xc0008c48a0 gate 1556789272803415100 evaluation fails" +"2019-05-02 09:27:52.805 UTC [policies] Evaluate -> DEBU fc4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.805 UTC [policies] Evaluate -> DEBU fc5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.805 UTC [policies] Evaluate -> DEBU fc6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.805 UTC [cauthdsl] func1 -> DEBU fc7 0xc0008c50e0 gate 1556789272805692300 evaluation starts" +"2019-05-02 09:27:52.806 UTC [cauthdsl] func2 -> DEBU fc8 0xc0008c50e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.806 UTC [cauthdsl] func2 -> DEBU fc9 0xc0008c50e0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:52.806 UTC [cauthdsl] func2 -> DEBU fca 0xc0008c50e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:52.807 UTC [cauthdsl] func2 -> DEBU fcb 0xc0008c50e0 principal evaluation fails" +"2019-05-02 09:27:52.807 UTC [cauthdsl] func1 -> DEBU fcc 0xc0008c50e0 gate 1556789272805692300 evaluation fails" +"2019-05-02 09:27:52.807 UTC [policies] Evaluate -> DEBU fcd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.807 UTC [policies] Evaluate -> DEBU fce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.807 UTC [policies] func1 -> DEBU fcf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:52.807 UTC [policies] Evaluate -> DEBU fd0 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.808 UTC [policies] Evaluate -> DEBU fd4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:52.808 UTC [cauthdsl] func1 -> DEBU fd5 0xc0008c5dd0 gate 1556789272808840200 evaluation starts" +"2019-05-02 09:27:52.809 UTC [cauthdsl] func2 -> DEBU fd6 0xc0008c5dd0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.809 UTC [cauthdsl] func2 -> DEBU fd7 0xc0008c5dd0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:52.809 UTC [cauthdsl] func2 -> DEBU fd8 0xc0008c5dd0 principal matched by identity 0" +"2019-05-02 09:27:52.809 UTC [msp.identity] Verify -> DEBU fd9 Verify: digest = 00000000 b3 8e c3 82 c2 85 96 25 36 01 25 77 f2 f7 6c aa |.......%6.%w..l.| +00000010 1d 66 b9 19 a2 e5 14 11 b0 fa 32 48 71 83 5e b1 |.f........2Hq.^.|" +"2019-05-02 09:27:52.810 UTC [msp.identity] Verify -> DEBU fda Verify: sig = 00000000 30 44 02 20 1b d7 ab bd 8b 3a 80 39 6f c7 b9 1c |0D. .....:.9o...| +00000010 7a 29 f1 10 d3 81 06 56 5c 0a 1a 42 62 d5 17 a3 |z).....V\..Bb...| +00000020 ef de b2 4c 02 20 37 49 8c ac a6 12 e1 46 7f 03 |...L. 7I.....F..| +00000030 cb f4 65 3b 55 18 c7 78 3b 21 ab d2 a6 96 e9 bc |..e;U..x;!......| +00000040 ef a5 0b eb c8 b7 |......|" +"2019-05-02 09:27:52.811 UTC [cauthdsl] func2 -> DEBU fdb 0xc0008c5dd0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.811 UTC [cauthdsl] func1 -> DEBU fdc 0xc0008c5dd0 gate 1556789272808840200 evaluation succeeds" +"2019-05-02 09:27:52.812 UTC [policies] Evaluate -> DEBU fdd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:52.812 UTC [policies] Evaluate -> DEBU fde == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:52.812 UTC [policies] Evaluate -> DEBU fdf Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:52.813 UTC [policies] Evaluate -> DEBU fe0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:52.813 UTC [policies] Evaluate -> DEBU fe1 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:52.813 UTC [policies] Evaluate -> DEBU fe2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:52.817 UTC [common.deliver] deliverBlocks -> DEBU fe3 [channel: businesschannel] Received seekInfo (0xc0010ce500) start: > stop: > from 172.18.0.8:57354" +"2019-05-02 09:27:52.819 UTC [fsblkstorage] Next -> DEBU fe4 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:52.826 UTC [fsblkstorage] newBlockfileStream -> DEBU fe5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47625]" +"2019-05-02 09:27:52.827 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe6 Remaining bytes=[51040], Going to peek [8] bytes" +"2019-05-02 09:27:52.831 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe7 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}" +"2019-05-02 09:27:52.831 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fe8 blockbytes [23742] read from file [0]" +"2019-05-02 09:27:52.832 UTC [common.deliver] deliverBlocks -> DEBU fe9 [channel: businesschannel] Delivering block [2] for (0xc0010ce500) for 172.18.0.8:57354" +"2019-05-02 09:27:52.852 UTC [common.deliver] deliverBlocks -> DEBU fea [channel: businesschannel] Done delivering to 172.18.0.8:57354 for (0xc0010ce500)" +"2019-05-02 09:27:52.853 UTC [common.deliver] Handle -> DEBU feb Waiting for new SeekInfo from 172.18.0.8:57354" +"2019-05-02 09:27:52.854 UTC [common.deliver] Handle -> DEBU fec Attempting to read seek info message from 172.18.0.8:57354" +"2019-05-02 09:27:52.865 UTC [grpc] infof -> DEBU fed transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:52.864 UTC [common.deliver] Handle -> WARN fee Error reading from 172.18.0.8:57354: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:52.870 UTC [orderer.common.server] func1 -> DEBU fef Closing Deliver stream" +"2019-05-02 09:27:52.872 UTC [comm.grpc.server] 1 -> INFO ff0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57354 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=126.0907ms +"2019-05-02 09:27:52.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff1 Sending msg of 28 bytes to 2 on channel businesschannel took 91.8µs" +"2019-05-02 09:27:52.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff2 Sending msg of 28 bytes to 3 on channel businesschannel took 44.7µs" +"2019-05-02 09:27:52.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.2µs " +"2019-05-02 09:27:52.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 886µs " +"2019-05-02 09:27:52.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:52.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:53.043 UTC [orderer.common.server] Deliver -> DEBU ff7 Starting new Deliver handler" +"2019-05-02 09:27:53.044 UTC [common.deliver] Handle -> DEBU ff8 Starting new deliver loop for 172.18.0.8:57356" +"2019-05-02 09:27:53.044 UTC [common.deliver] Handle -> DEBU ff9 Attempting to read seek info message from 172.18.0.8:57356" +"2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.045 UTC [policies] Evaluate -> DEBU ffe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:53.046 UTC [cauthdsl] func1 -> DEBU fff 0xc000f34a30 gate 1556789273046087700 evaluation starts" +"2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1000 0xc000f34a30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1001 0xc000f34a30 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1002 0xc000f34a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:53.046 UTC [cauthdsl] func2 -> DEBU 1003 0xc000f34a30 principal evaluation fails" +"2019-05-02 09:27:53.047 UTC [cauthdsl] func1 -> DEBU 1004 0xc000f34a30 gate 1556789273046087700 evaluation fails" +"2019-05-02 09:27:53.047 UTC [policies] Evaluate -> DEBU 1005 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.047 UTC [policies] Evaluate -> DEBU 1006 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.047 UTC [policies] Evaluate -> DEBU 1007 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:53.048 UTC [cauthdsl] func1 -> DEBU 1008 0xc000f35270 gate 1556789273048284900 evaluation starts" +"2019-05-02 09:27:53.048 UTC [cauthdsl] func2 -> DEBU 1009 0xc000f35270 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.048 UTC [cauthdsl] func2 -> DEBU 100a 0xc000f35270 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.048 UTC [cauthdsl] func2 -> DEBU 100b 0xc000f35270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:53.049 UTC [cauthdsl] func2 -> DEBU 100c 0xc000f35270 principal evaluation fails" +"2019-05-02 09:27:53.049 UTC [cauthdsl] func1 -> DEBU 100d 0xc000f35270 gate 1556789273048284900 evaluation fails" +"2019-05-02 09:27:53.049 UTC [policies] Evaluate -> DEBU 100e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.049 UTC [policies] Evaluate -> DEBU 100f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.050 UTC [policies] func1 -> DEBU 1010 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1011 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1012 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1013 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:53.050 UTC [policies] Evaluate -> DEBU 1014 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.051 UTC [policies] Evaluate -> DEBU 1015 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:53.051 UTC [cauthdsl] func1 -> DEBU 1016 0xc000f35f60 gate 1556789273051402800 evaluation starts" +"2019-05-02 09:27:53.051 UTC [cauthdsl] func2 -> DEBU 1017 0xc000f35f60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.051 UTC [cauthdsl] func2 -> DEBU 1018 0xc000f35f60 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.052 UTC [cauthdsl] func2 -> DEBU 1019 0xc000f35f60 principal matched by identity 0" +"2019-05-02 09:27:53.052 UTC [msp.identity] Verify -> DEBU 101a Verify: digest = 00000000 05 ae 83 a4 44 52 d3 78 63 72 e7 59 a1 ab 53 39 |....DR.xcr.Y..S9| +00000010 94 48 e0 b9 cd be 47 25 75 b7 70 be ae af 93 8c |.H....G%u.p.....|" +"2019-05-02 09:27:53.052 UTC [msp.identity] Verify -> DEBU 101b Verify: sig = 00000000 30 45 02 21 00 e6 af 39 14 fe c2 7e 6f 26 79 e8 |0E.!...9...~o&y.| +00000010 7b 15 37 29 fd 0f ac ac eb a8 2f ef e5 9c 3c 66 |{.7)....../... DEBU 101c 0xc000f35f60 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:53.053 UTC [cauthdsl] func1 -> DEBU 101d 0xc000f35f60 gate 1556789273051402800 evaluation succeeds" +"2019-05-02 09:27:53.053 UTC [policies] Evaluate -> DEBU 101e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 101f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 1020 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 1021 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:53.054 UTC [policies] Evaluate -> DEBU 1022 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:53.055 UTC [policies] Evaluate -> DEBU 1023 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:53.055 UTC [common.deliver] deliverBlocks -> DEBU 1024 [channel: businesschannel] Received seekInfo (0xc0010566c0) start: > stop: > from 172.18.0.8:57356" +"2019-05-02 09:27:53.056 UTC [fsblkstorage] Next -> DEBU 1025 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:53.056 UTC [fsblkstorage] newBlockfileStream -> DEBU 1026 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:53.056 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1027 Remaining bytes=[98665], Going to peek [8] bytes" +"2019-05-02 09:27:53.056 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1028 Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:53.057 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1029 blockbytes [23935] read from file [0]" +"2019-05-02 09:27:53.057 UTC [common.deliver] deliverBlocks -> DEBU 102a [channel: businesschannel] Delivering block [0] for (0xc0010566c0) for 172.18.0.8:57356" +"2019-05-02 09:27:53.058 UTC [common.deliver] deliverBlocks -> DEBU 102b [channel: businesschannel] Done delivering to 172.18.0.8:57356 for (0xc0010566c0)" +"2019-05-02 09:27:53.058 UTC [common.deliver] Handle -> DEBU 102c Waiting for new SeekInfo from 172.18.0.8:57356" +"2019-05-02 09:27:53.058 UTC [common.deliver] Handle -> DEBU 102d Attempting to read seek info message from 172.18.0.8:57356" +"2019-05-02 09:27:53.068 UTC [common.deliver] Handle -> WARN 102e Error reading from 172.18.0.8:57356: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:53.068 UTC [orderer.common.server] func1 -> DEBU 102f Closing Deliver stream" +"2019-05-02 09:27:53.068 UTC [comm.grpc.server] 1 -> INFO 1030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57356 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.705ms +"2019-05-02 09:27:53.068 UTC [grpc] infof -> DEBU 1031 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:53.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1032 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:53.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1033 Sending msg of 28 bytes to 3 on channel testchainid took 165.5µs" +"2019-05-02 09:27:53.185 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1034 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.4µs " +"2019-05-02 09:27:53.392 UTC [orderer.common.server] Deliver -> DEBU 1035 Starting new Deliver handler" +"2019-05-02 09:27:53.392 UTC [common.deliver] Handle -> DEBU 1036 Starting new deliver loop for 172.18.0.8:57358" +"2019-05-02 09:27:53.392 UTC [common.deliver] Handle -> DEBU 1037 Attempting to read seek info message from 172.18.0.8:57358" +"2019-05-02 09:27:53.394 UTC [policies] Evaluate -> DEBU 1038 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:53.394 UTC [policies] Evaluate -> DEBU 1039 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.394 UTC [policies] Evaluate -> DEBU 103a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:53.395 UTC [policies] Evaluate -> DEBU 103b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.395 UTC [policies] Evaluate -> DEBU 103c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:53.396 UTC [cauthdsl] func1 -> DEBU 103d 0xc000fd9ca0 gate 1556789273396195300 evaluation starts" +"2019-05-02 09:27:53.396 UTC [cauthdsl] func2 -> DEBU 103e 0xc000fd9ca0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.396 UTC [cauthdsl] func2 -> DEBU 103f 0xc000fd9ca0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.397 UTC [cauthdsl] func2 -> DEBU 1040 0xc000fd9ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:53.398 UTC [cauthdsl] func2 -> DEBU 1041 0xc000fd9ca0 principal evaluation fails" +"2019-05-02 09:27:53.398 UTC [cauthdsl] func1 -> DEBU 1042 0xc000fd9ca0 gate 1556789273396195300 evaluation fails" +"2019-05-02 09:27:53.399 UTC [policies] Evaluate -> DEBU 1043 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.399 UTC [policies] Evaluate -> DEBU 1044 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.399 UTC [policies] Evaluate -> DEBU 1045 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:53.400 UTC [cauthdsl] func1 -> DEBU 1046 0xc000d0a4e0 gate 1556789273400020500 evaluation starts" +"2019-05-02 09:27:53.400 UTC [cauthdsl] func2 -> DEBU 1047 0xc000d0a4e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.400 UTC [cauthdsl] func2 -> DEBU 1048 0xc000d0a4e0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.401 UTC [cauthdsl] func2 -> DEBU 1049 0xc000d0a4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:53.401 UTC [cauthdsl] func2 -> DEBU 104a 0xc000d0a4e0 principal evaluation fails" +"2019-05-02 09:27:53.402 UTC [cauthdsl] func1 -> DEBU 104b 0xc000d0a4e0 gate 1556789273400020500 evaluation fails" +"2019-05-02 09:27:53.402 UTC [policies] Evaluate -> DEBU 104c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.402 UTC [policies] Evaluate -> DEBU 104d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.403 UTC [policies] func1 -> DEBU 104e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:53.403 UTC [policies] Evaluate -> DEBU 104f Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:53.404 UTC [policies] Evaluate -> DEBU 1050 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:53.404 UTC [policies] Evaluate -> DEBU 1051 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:53.404 UTC [policies] Evaluate -> DEBU 1052 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.405 UTC [policies] Evaluate -> DEBU 1053 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:53.405 UTC [cauthdsl] func1 -> DEBU 1054 0xc000d0b1d0 gate 1556789273405590800 evaluation starts" +"2019-05-02 09:27:53.405 UTC [cauthdsl] func2 -> DEBU 1055 0xc000d0b1d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.406 UTC [cauthdsl] func2 -> DEBU 1056 0xc000d0b1d0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.406 UTC [cauthdsl] func2 -> DEBU 1057 0xc000d0b1d0 principal matched by identity 0" +"2019-05-02 09:27:53.407 UTC [msp.identity] Verify -> DEBU 1058 Verify: digest = 00000000 1c f0 80 02 d2 b9 a0 65 98 ce c4 1b 06 23 58 11 |.......e.....#X.| +00000010 e0 4e ed 3e 58 bb 81 f7 52 8f 0f fb e5 c8 69 b8 |.N.>X...R.....i.|" +"2019-05-02 09:27:53.407 UTC [msp.identity] Verify -> DEBU 1059 Verify: sig = 00000000 30 44 02 20 74 de 2d 01 56 d5 d9 7c 3e e9 40 46 |0D. t.-.V..|>.@F| +00000010 8e db 34 ce 86 bc 54 ef cb 3b 92 25 c0 41 a1 3e |..4...T..;.%.A.>| +00000020 4d ed 6b 49 02 20 58 91 f9 da 3b 83 16 6a db 0a |M.kI. X...;..j..| +00000030 37 03 18 f9 16 27 f8 85 62 e2 9f 98 8e 3a d3 53 |7....'..b....:.S| +00000040 fd fd f6 41 ad a6 |...A..|" +"2019-05-02 09:27:53.408 UTC [cauthdsl] func2 -> DEBU 105a 0xc000d0b1d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:53.408 UTC [cauthdsl] func1 -> DEBU 105b 0xc000d0b1d0 gate 1556789273405590800 evaluation succeeds" +"2019-05-02 09:27:53.409 UTC [policies] Evaluate -> DEBU 105c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:53.409 UTC [policies] Evaluate -> DEBU 105d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:53.410 UTC [policies] Evaluate -> DEBU 105e Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:53.410 UTC [policies] Evaluate -> DEBU 105f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:53.411 UTC [policies] Evaluate -> DEBU 1060 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:53.411 UTC [policies] Evaluate -> DEBU 1061 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:53.411 UTC [common.deliver] deliverBlocks -> DEBU 1062 [channel: businesschannel] Received seekInfo (0xc0010cf4c0) start: > stop: > from 172.18.0.8:57358" +"2019-05-02 09:27:53.412 UTC [fsblkstorage] Next -> DEBU 1063 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:53.412 UTC [fsblkstorage] newBlockfileStream -> DEBU 1064 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23938]" +"2019-05-02 09:27:53.413 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1065 Remaining bytes=[74727], Going to peek [8] bytes" +"2019-05-02 09:27:53.413 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1066 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23938], bytesOffset=[23941]}" +"2019-05-02 09:27:53.413 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1067 blockbytes [23684] read from file [0]" +"2019-05-02 09:27:53.414 UTC [common.deliver] deliverBlocks -> DEBU 1068 [channel: businesschannel] Delivering block [1] for (0xc0010cf4c0) for 172.18.0.8:57358" +"2019-05-02 09:27:53.414 UTC [common.deliver] deliverBlocks -> DEBU 1069 [channel: businesschannel] Done delivering to 172.18.0.8:57358 for (0xc0010cf4c0)" +"2019-05-02 09:27:53.415 UTC [common.deliver] Handle -> DEBU 106a Waiting for new SeekInfo from 172.18.0.8:57358" +"2019-05-02 09:27:53.415 UTC [common.deliver] Handle -> DEBU 106b Attempting to read seek info message from 172.18.0.8:57358" +"2019-05-02 09:27:53.425 UTC [common.deliver] Handle -> WARN 106c Error reading from 172.18.0.8:57358: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:53.425 UTC [orderer.common.server] func1 -> DEBU 106e Closing Deliver stream" +"2019-05-02 09:27:53.425 UTC [comm.grpc.server] 1 -> INFO 106f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57358 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5595ms +"2019-05-02 09:27:53.425 UTC [grpc] infof -> DEBU 106d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:53.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1070 Sending msg of 28 bytes to 2 on channel businesschannel took 27.2µs" +"2019-05-02 09:27:53.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1071 Sending msg of 28 bytes to 3 on channel businesschannel took 165µs" +"2019-05-02 09:27:53.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1072 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " +"2019-05-02 09:27:53.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1073 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.9µs " +"2019-05-02 09:27:53.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1074 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:53.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1075 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:53.620 UTC [orderer.common.server] Deliver -> DEBU 1076 Starting new Deliver handler" +"2019-05-02 09:27:53.620 UTC [common.deliver] Handle -> DEBU 1077 Starting new deliver loop for 172.18.0.8:57360" +"2019-05-02 09:27:53.620 UTC [common.deliver] Handle -> DEBU 1078 Attempting to read seek info message from 172.18.0.8:57360" +"2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 1079 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 107a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 107b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:53.621 UTC [policies] Evaluate -> DEBU 107c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.622 UTC [policies] Evaluate -> DEBU 107d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:53.623 UTC [cauthdsl] func1 -> DEBU 107e 0xc000d08eb0 gate 1556789273623226800 evaluation starts" +"2019-05-02 09:27:53.623 UTC [cauthdsl] func2 -> DEBU 107f 0xc000d08eb0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.623 UTC [cauthdsl] func2 -> DEBU 1080 0xc000d08eb0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.624 UTC [cauthdsl] func2 -> DEBU 1081 0xc000d08eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:53.624 UTC [cauthdsl] func2 -> DEBU 1082 0xc000d08eb0 principal evaluation fails" +"2019-05-02 09:27:53.625 UTC [cauthdsl] func1 -> DEBU 1083 0xc000d08eb0 gate 1556789273623226800 evaluation fails" +"2019-05-02 09:27:53.625 UTC [policies] Evaluate -> DEBU 1084 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.626 UTC [policies] Evaluate -> DEBU 1085 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.626 UTC [policies] Evaluate -> DEBU 1086 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:53.626 UTC [cauthdsl] func1 -> DEBU 1087 0xc000d096f0 gate 1556789273626795400 evaluation starts" +"2019-05-02 09:27:53.627 UTC [cauthdsl] func2 -> DEBU 1088 0xc000d096f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.627 UTC [cauthdsl] func2 -> DEBU 1089 0xc000d096f0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.627 UTC [cauthdsl] func2 -> DEBU 108a 0xc000d096f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:53.628 UTC [cauthdsl] func2 -> DEBU 108b 0xc000d096f0 principal evaluation fails" +"2019-05-02 09:27:53.629 UTC [cauthdsl] func1 -> DEBU 108c 0xc000d096f0 gate 1556789273626795400 evaluation fails" +"2019-05-02 09:27:53.630 UTC [policies] Evaluate -> DEBU 108d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.630 UTC [policies] Evaluate -> DEBU 108e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.631 UTC [policies] func1 -> DEBU 108f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-05-02 09:27:53.631 UTC [policies] Evaluate -> DEBU 1090 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:53.632 UTC [policies] Evaluate -> DEBU 1091 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:53.632 UTC [policies] Evaluate -> DEBU 1092 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:53.633 UTC [policies] Evaluate -> DEBU 1093 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.633 UTC [policies] Evaluate -> DEBU 1094 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:53.634 UTC [cauthdsl] func1 -> DEBU 1095 0xc0011dc3e0 gate 1556789273634532000 evaluation starts" +"2019-05-02 09:27:53.635 UTC [cauthdsl] func2 -> DEBU 1096 0xc0011dc3e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.635 UTC [cauthdsl] func2 -> DEBU 1097 0xc0011dc3e0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.636 UTC [cauthdsl] func2 -> DEBU 1098 0xc0011dc3e0 principal matched by identity 0" +"2019-05-02 09:27:53.636 UTC [msp.identity] Verify -> DEBU 1099 Verify: digest = 00000000 bb a9 95 be 70 7e b2 2c 1c 35 98 4d 7c 9f fd 22 |....p~.,.5.M|.."| +00000010 4f 67 6f 27 ca cd 6b 62 12 c8 0d 84 4b a0 63 83 |Ogo'..kb....K.c.|" +"2019-05-02 09:27:53.637 UTC [msp.identity] Verify -> DEBU 109a Verify: sig = 00000000 30 45 02 21 00 b8 53 bc c1 d6 05 f0 ac a1 07 e4 |0E.!..S.........| +00000010 2b 82 23 7f 00 39 71 d1 e2 3b 90 fd 0b 15 8d 4f |+.#..9q..;.....O| +00000020 5a 7c 13 89 5a 02 20 6d c0 0c 50 ae 8e c1 6e 78 |Z|..Z. m..P...nx| +00000030 d4 8f 75 f3 5e 0e 01 ba 71 30 60 77 26 28 d9 32 |..u.^...q0`w&(.2| +00000040 92 13 f4 88 3f d9 7d |....?.}|" +"2019-05-02 09:27:53.638 UTC [cauthdsl] func2 -> DEBU 109b 0xc0011dc3e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:53.638 UTC [cauthdsl] func1 -> DEBU 109c 0xc0011dc3e0 gate 1556789273634532000 evaluation succeeds" +"2019-05-02 09:27:53.638 UTC [policies] Evaluate -> DEBU 109d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:53.638 UTC [policies] Evaluate -> DEBU 109e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 109f Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 10a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 10a1 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:53.639 UTC [policies] Evaluate -> DEBU 10a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:53.640 UTC [common.deliver] deliverBlocks -> DEBU 10a3 [channel: businesschannel] Received seekInfo (0xc001057080) start: > stop: > from 172.18.0.8:57360" +"2019-05-02 09:27:53.640 UTC [fsblkstorage] Next -> DEBU 10a4 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:53.640 UTC [fsblkstorage] newBlockfileStream -> DEBU 10a5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47625]" +"2019-05-02 09:27:53.641 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10a6 Remaining bytes=[51040], Going to peek [8] bytes" +"2019-05-02 09:27:53.641 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10a7 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}" +"2019-05-02 09:27:53.642 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10a8 blockbytes [23742] read from file [0]" +"2019-05-02 09:27:53.642 UTC [common.deliver] deliverBlocks -> DEBU 10a9 [channel: businesschannel] Delivering block [2] for (0xc001057080) for 172.18.0.8:57360" +"2019-05-02 09:27:53.643 UTC [common.deliver] deliverBlocks -> DEBU 10aa [channel: businesschannel] Done delivering to 172.18.0.8:57360 for (0xc001057080)" +"2019-05-02 09:27:53.644 UTC [common.deliver] Handle -> DEBU 10ab Waiting for new SeekInfo from 172.18.0.8:57360" +"2019-05-02 09:27:53.645 UTC [common.deliver] Handle -> DEBU 10ac Attempting to read seek info message from 172.18.0.8:57360" +"2019-05-02 09:27:53.652 UTC [common.deliver] Handle -> WARN 10ad Error reading from 172.18.0.8:57360: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:53.653 UTC [orderer.common.server] func1 -> DEBU 10ae Closing Deliver stream" +"2019-05-02 09:27:53.653 UTC [comm.grpc.server] 1 -> INFO 10af streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57360 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.9286ms +"2019-05-02 09:27:53.654 UTC [grpc] infof -> DEBU 10b0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:53.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:53.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b2 Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +"2019-05-02 09:27:53.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.5µs " +"2019-05-02 09:27:53.874 UTC [orderer.common.server] Deliver -> DEBU 10b4 Starting new Deliver handler" +"2019-05-02 09:27:53.874 UTC [common.deliver] Handle -> DEBU 10b5 Starting new deliver loop for 172.18.0.8:57362" +"2019-05-02 09:27:53.874 UTC [common.deliver] Handle -> DEBU 10b6 Attempting to read seek info message from 172.18.0.8:57362" +"2019-05-02 09:27:53.876 UTC [policies] Evaluate -> DEBU 10b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:53.877 UTC [policies] Evaluate -> DEBU 10b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.877 UTC [policies] Evaluate -> DEBU 10b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:53.878 UTC [policies] Evaluate -> DEBU 10ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.878 UTC [policies] Evaluate -> DEBU 10bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:53.879 UTC [cauthdsl] func1 -> DEBU 10bc 0xc00123a900 gate 1556789273878856500 evaluation starts" +"2019-05-02 09:27:53.879 UTC [cauthdsl] func2 -> DEBU 10bd 0xc00123a900 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.879 UTC [cauthdsl] func2 -> DEBU 10be 0xc00123a900 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.880 UTC [cauthdsl] func2 -> DEBU 10bf 0xc00123a900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:53.880 UTC [cauthdsl] func2 -> DEBU 10c0 0xc00123a900 principal evaluation fails" +"2019-05-02 09:27:53.881 UTC [cauthdsl] func1 -> DEBU 10c1 0xc00123a900 gate 1556789273878856500 evaluation fails" +"2019-05-02 09:27:53.881 UTC [policies] Evaluate -> DEBU 10c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.882 UTC [policies] Evaluate -> DEBU 10c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.882 UTC [policies] Evaluate -> DEBU 10c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:53.883 UTC [cauthdsl] func1 -> DEBU 10c5 0xc00123b140 gate 1556789273883168300 evaluation starts" +"2019-05-02 09:27:53.884 UTC [cauthdsl] func2 -> DEBU 10c6 0xc00123b140 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.884 UTC [cauthdsl] func2 -> DEBU 10c7 0xc00123b140 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.885 UTC [cauthdsl] func2 -> DEBU 10c8 0xc00123b140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:53.885 UTC [cauthdsl] func2 -> DEBU 10c9 0xc00123b140 principal evaluation fails" +"2019-05-02 09:27:53.886 UTC [cauthdsl] func1 -> DEBU 10ca 0xc00123b140 gate 1556789273883168300 evaluation fails" +"2019-05-02 09:27:53.886 UTC [policies] Evaluate -> DEBU 10cb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.887 UTC [policies] Evaluate -> DEBU 10cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.887 UTC [policies] func1 -> DEBU 10cd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:53.887 UTC [policies] Evaluate -> DEBU 10ce Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:53.888 UTC [policies] Evaluate -> DEBU 10cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:53.888 UTC [policies] Evaluate -> DEBU 10d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:53.888 UTC [policies] Evaluate -> DEBU 10d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.889 UTC [policies] Evaluate -> DEBU 10d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:53.890 UTC [cauthdsl] func1 -> DEBU 10d3 0xc00123be30 gate 1556789273889401700 evaluation starts" +"2019-05-02 09:27:53.890 UTC [cauthdsl] func2 -> DEBU 10d4 0xc00123be30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.890 UTC [cauthdsl] func2 -> DEBU 10d5 0xc00123be30 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:53.890 UTC [cauthdsl] func2 -> DEBU 10d6 0xc00123be30 principal matched by identity 0" +"2019-05-02 09:27:53.890 UTC [msp.identity] Verify -> DEBU 10d7 Verify: digest = 00000000 26 f5 ee 4c 73 57 f9 2b 50 c9 cc 05 d8 7f 68 cf |&..LsW.+P.....h.| +00000010 f7 b9 a2 03 c3 02 29 de 0c e5 3c 25 e6 45 df 8d |......)...<%.E..|" +"2019-05-02 09:27:53.890 UTC [msp.identity] Verify -> DEBU 10d8 Verify: sig = 00000000 30 45 02 21 00 eb c2 3d ad 6d e5 26 ba cf bc 0f |0E.!...=.m.&....| +00000010 3f 48 d3 6b 32 a7 10 54 bd 5a 6e df 8a 6c 07 93 |?H.k2..T.Zn..l..| +00000020 aa 8c 17 42 8e 02 20 3f d4 c5 d0 d4 50 63 4f a1 |...B.. ?....PcO.| +00000030 5d 10 ed 68 7d 5f 76 fb 71 ae 09 33 5b 18 07 23 |]..h}_v.q..3[..#| +00000040 f5 17 6c 40 a0 12 c7 |..l@...|" +"2019-05-02 09:27:53.891 UTC [cauthdsl] func2 -> DEBU 10d9 0xc00123be30 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:53.891 UTC [cauthdsl] func1 -> DEBU 10da 0xc00123be30 gate 1556789273889401700 evaluation succeeds" +"2019-05-02 09:27:53.891 UTC [policies] Evaluate -> DEBU 10db Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10dd Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10df Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:53.892 UTC [policies] Evaluate -> DEBU 10e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:53.893 UTC [common.deliver] deliverBlocks -> DEBU 10e1 [channel: businesschannel] Received seekInfo (0xc001057780) start: > stop: > from 172.18.0.8:57362" +"2019-05-02 09:27:53.893 UTC [fsblkstorage] Next -> DEBU 10e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:53.894 UTC [fsblkstorage] newBlockfileStream -> DEBU 10e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71370]" +"2019-05-02 09:27:53.894 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10e4 Remaining bytes=[27295], Going to peek [8] bytes" +"2019-05-02 09:27:53.895 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10e5 Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}" +"2019-05-02 09:27:53.895 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10e6 blockbytes [4709] read from file [0]" +"2019-05-02 09:27:53.896 UTC [common.deliver] deliverBlocks -> DEBU 10e7 [channel: businesschannel] Delivering block [3] for (0xc001057780) for 172.18.0.8:57362" +"2019-05-02 09:27:53.896 UTC [common.deliver] deliverBlocks -> DEBU 10e8 [channel: businesschannel] Done delivering to 172.18.0.8:57362 for (0xc001057780)" +"2019-05-02 09:27:53.896 UTC [common.deliver] Handle -> DEBU 10e9 Waiting for new SeekInfo from 172.18.0.8:57362" +"2019-05-02 09:27:53.896 UTC [common.deliver] Handle -> DEBU 10ea Attempting to read seek info message from 172.18.0.8:57362" +"2019-05-02 09:27:53.905 UTC [common.deliver] Handle -> WARN 10eb Error reading from 172.18.0.8:57362: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:53.905 UTC [orderer.common.server] func1 -> DEBU 10ec Closing Deliver stream" +"2019-05-02 09:27:53.905 UTC [comm.grpc.server] 1 -> INFO 10ed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57362 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.4388ms +"2019-05-02 09:27:53.905 UTC [grpc] infof -> DEBU 10ee transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:53.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ef Sending msg of 28 bytes to 2 on channel businesschannel took 49.1µs" +"2019-05-02 09:27:53.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f0 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" +"2019-05-02 09:27:53.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.3µs " +"2019-05-02 09:27:53.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 696.8µs " +"2019-05-02 09:27:53.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:53.964 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:54.152 UTC [orderer.common.server] Deliver -> DEBU 10f5 Starting new Deliver handler" +"2019-05-02 09:27:54.153 UTC [common.deliver] Handle -> DEBU 10f6 Starting new deliver loop for 172.18.0.8:57364" +"2019-05-02 09:27:54.154 UTC [common.deliver] Handle -> DEBU 10f7 Attempting to read seek info message from 172.18.0.8:57364" +"2019-05-02 09:27:54.155 UTC [policies] Evaluate -> DEBU 10f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:54.155 UTC [policies] Evaluate -> DEBU 10f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.155 UTC [policies] Evaluate -> DEBU 10fa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:54.156 UTC [policies] Evaluate -> DEBU 10fb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.156 UTC [policies] Evaluate -> DEBU 10fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:54.157 UTC [cauthdsl] func1 -> DEBU 10fd 0xc0012886a0 gate 1556789274157192000 evaluation starts" +"2019-05-02 09:27:54.157 UTC [cauthdsl] func2 -> DEBU 10fe 0xc0012886a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.157 UTC [cauthdsl] func2 -> DEBU 10ff 0xc0012886a0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.158 UTC [cauthdsl] func2 -> DEBU 1100 0xc0012886a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:54.159 UTC [cauthdsl] func2 -> DEBU 1101 0xc0012886a0 principal evaluation fails" +"2019-05-02 09:27:54.159 UTC [cauthdsl] func1 -> DEBU 1102 0xc0012886a0 gate 1556789274157192000 evaluation fails" +"2019-05-02 09:27:54.159 UTC [policies] Evaluate -> DEBU 1103 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:54.160 UTC [policies] Evaluate -> DEBU 1104 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:54.160 UTC [policies] Evaluate -> DEBU 1105 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:54.161 UTC [cauthdsl] func1 -> DEBU 1106 0xc001288ee0 gate 1556789274161384200 evaluation starts" +"2019-05-02 09:27:54.161 UTC [cauthdsl] func2 -> DEBU 1107 0xc001288ee0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.161 UTC [cauthdsl] func2 -> DEBU 1108 0xc001288ee0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.162 UTC [cauthdsl] func2 -> DEBU 1109 0xc001288ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:54.163 UTC [cauthdsl] func2 -> DEBU 110a 0xc001288ee0 principal evaluation fails" +"2019-05-02 09:27:54.164 UTC [cauthdsl] func1 -> DEBU 110b 0xc001288ee0 gate 1556789274161384200 evaluation fails" +"2019-05-02 09:27:54.164 UTC [policies] Evaluate -> DEBU 110c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:54.165 UTC [policies] Evaluate -> DEBU 110d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:54.166 UTC [policies] func1 -> DEBU 110e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:54.167 UTC [policies] Evaluate -> DEBU 110f Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:54.175 UTC [policies] Evaluate -> DEBU 1110 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:54.181 UTC [policies] Evaluate -> DEBU 1112 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:54.182 UTC [policies] Evaluate -> DEBU 1113 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1111 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:54.184 UTC [policies] Evaluate -> DEBU 1114 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:54.187 UTC [cauthdsl] func1 -> DEBU 1115 0xc001256ae0 gate 1556789274187301300 evaluation starts" +"2019-05-02 09:27:54.187 UTC [cauthdsl] func2 -> DEBU 1116 0xc001256ae0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.189 UTC [cauthdsl] func2 -> DEBU 1117 0xc001256ae0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.190 UTC [cauthdsl] func2 -> DEBU 1118 0xc001256ae0 principal matched by identity 0" +"2019-05-02 09:27:54.192 UTC [msp.identity] Verify -> DEBU 1119 Verify: digest = 00000000 ad 0c 01 02 49 47 28 af 32 c6 d0 de c9 46 4f 0c |....IG(.2....FO.| +00000010 29 5d aa 7b d8 e3 34 c1 5d 25 d4 04 2c f1 65 6b |)].{..4.]%..,.ek|" +"2019-05-02 09:27:54.193 UTC [msp.identity] Verify -> DEBU 111a Verify: sig = 00000000 30 44 02 20 3d 28 bd 57 ef b8 8c fe 5b c6 5a c3 |0D. =(.W....[.Z.| +00000010 b6 97 60 9b 98 91 68 72 0a 1a e9 93 dd 40 b3 8c |..`...hr.....@..| +00000020 71 1b 9f 9b 02 20 57 9d b8 7a 7e 90 b6 ed a6 c5 |q.... W..z~.....| +00000030 a5 f8 3d 6d 38 9b cc 35 bd c6 d8 f7 8e a8 48 ba |..=m8..5......H.| +00000040 be 7a fe 6a d3 b5 |.z.j..|" +"2019-05-02 09:27:54.195 UTC [cauthdsl] func2 -> DEBU 111b 0xc001256ae0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:54.197 UTC [cauthdsl] func1 -> DEBU 111c 0xc001256ae0 gate 1556789274187301300 evaluation succeeds" +"2019-05-02 09:27:54.198 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111d Sending msg of 28 bytes to 3 on channel testchainid took 45.5µs" +"2019-05-02 09:27:54.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.1µs " +"2019-05-02 09:27:54.197 UTC [policies] Evaluate -> DEBU 111e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:54.202 UTC [policies] Evaluate -> DEBU 1120 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1121 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1122 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1123 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:54.203 UTC [policies] Evaluate -> DEBU 1124 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:54.205 UTC [common.deliver] deliverBlocks -> DEBU 1125 [channel: businesschannel] Received seekInfo (0xc0011ac140) start: > stop: > from 172.18.0.8:57364" +"2019-05-02 09:27:54.205 UTC [fsblkstorage] Next -> DEBU 1126 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:54.205 UTC [fsblkstorage] newBlockfileStream -> DEBU 1127 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76081]" +"2019-05-02 09:27:54.207 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1128 Remaining bytes=[22584], Going to peek [8] bytes" +"2019-05-02 09:27:54.207 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1129 Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76081], bytesOffset=[76083]}" +"2019-05-02 09:27:54.207 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 112a blockbytes [4707] read from file [0]" +"2019-05-02 09:27:54.217 UTC [common.deliver] deliverBlocks -> DEBU 112b [channel: businesschannel] Delivering block [4] for (0xc0011ac140) for 172.18.0.8:57364" +"2019-05-02 09:27:54.217 UTC [common.deliver] deliverBlocks -> DEBU 112c [channel: businesschannel] Done delivering to 172.18.0.8:57364 for (0xc0011ac140)" +"2019-05-02 09:27:54.217 UTC [common.deliver] Handle -> DEBU 112d Waiting for new SeekInfo from 172.18.0.8:57364" +"2019-05-02 09:27:54.217 UTC [common.deliver] Handle -> DEBU 112e Attempting to read seek info message from 172.18.0.8:57364" +"2019-05-02 09:27:54.227 UTC [grpc] warningf -> DEBU 112f transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.8:57364: read: connection reset by peer" +"2019-05-02 09:27:54.238 UTC [common.deliver] Handle -> WARN 1130 Error reading from 172.18.0.8:57364: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:54.239 UTC [orderer.common.server] func1 -> DEBU 1131 Closing Deliver stream" +"2019-05-02 09:27:54.239 UTC [comm.grpc.server] 1 -> INFO 1132 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57364 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=86.7309ms +"2019-05-02 09:27:54.240 UTC [grpc] infof -> DEBU 1133 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:54.425 UTC [orderer.common.server] Deliver -> DEBU 1134 Starting new Deliver handler" +"2019-05-02 09:27:54.425 UTC [common.deliver] Handle -> DEBU 1135 Starting new deliver loop for 172.18.0.8:57366" +"2019-05-02 09:27:54.426 UTC [common.deliver] Handle -> DEBU 1136 Attempting to read seek info message from 172.18.0.8:57366" +"2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 1137 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 1138 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 1139 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:54.426 UTC [policies] Evaluate -> DEBU 113a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.427 UTC [policies] Evaluate -> DEBU 113b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:54.427 UTC [cauthdsl] func1 -> DEBU 113c 0xc001158d60 gate 1556789274427426300 evaluation starts" +"2019-05-02 09:27:54.427 UTC [cauthdsl] func2 -> DEBU 113d 0xc001158d60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.427 UTC [cauthdsl] func2 -> DEBU 113e 0xc001158d60 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.427 UTC [cauthdsl] func2 -> DEBU 113f 0xc001158d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:54.428 UTC [cauthdsl] func2 -> DEBU 1140 0xc001158d60 principal evaluation fails" +"2019-05-02 09:27:54.428 UTC [cauthdsl] func1 -> DEBU 1141 0xc001158d60 gate 1556789274427426300 evaluation fails" +"2019-05-02 09:27:54.428 UTC [policies] Evaluate -> DEBU 1142 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:54.428 UTC [policies] Evaluate -> DEBU 1143 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:54.428 UTC [policies] Evaluate -> DEBU 1144 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:54.428 UTC [cauthdsl] func1 -> DEBU 1145 0xc0011595a0 gate 1556789274428653300 evaluation starts" +"2019-05-02 09:27:54.428 UTC [cauthdsl] func2 -> DEBU 1146 0xc0011595a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.429 UTC [cauthdsl] func2 -> DEBU 1147 0xc0011595a0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.429 UTC [cauthdsl] func2 -> DEBU 1148 0xc0011595a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:54.429 UTC [cauthdsl] func2 -> DEBU 1149 0xc0011595a0 principal evaluation fails" +"2019-05-02 09:27:54.429 UTC [cauthdsl] func1 -> DEBU 114a 0xc0011595a0 gate 1556789274428653300 evaluation fails" +"2019-05-02 09:27:54.429 UTC [policies] Evaluate -> DEBU 114b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:54.429 UTC [policies] Evaluate -> DEBU 114c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:54.429 UTC [policies] func1 -> DEBU 114d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 114e Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 114f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 1150 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 1151 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.430 UTC [policies] Evaluate -> DEBU 1152 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:54.430 UTC [cauthdsl] func1 -> DEBU 1153 0xc0011284d0 gate 1556789274430638000 evaluation starts" +"2019-05-02 09:27:54.430 UTC [cauthdsl] func2 -> DEBU 1154 0xc0011284d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.430 UTC [cauthdsl] func2 -> DEBU 1155 0xc0011284d0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.431 UTC [cauthdsl] func2 -> DEBU 1156 0xc0011284d0 principal matched by identity 0" +"2019-05-02 09:27:54.431 UTC [msp.identity] Verify -> DEBU 1157 Verify: digest = 00000000 fa 9f 56 4a 61 78 23 71 18 54 ca 8c d6 4b e9 48 |..VJax#q.T...K.H| +00000010 2f 5e 22 d0 f9 62 4c 3b 8c 9b 10 d1 33 7f 34 3a |/^"..bL;....3.4:|" +"2019-05-02 09:27:54.431 UTC [msp.identity] Verify -> DEBU 1158 Verify: sig = 00000000 30 44 02 20 59 d9 de 5b 8f 1f 0b 38 a6 5c 63 26 |0D. Y..[...8.\c&| +00000010 51 62 e2 38 99 b4 3a ec 62 27 0d f4 da 24 59 c0 |Qb.8..:.b'...$Y.| +00000020 16 60 8a da 02 20 0a 41 34 24 b9 89 51 54 c6 e3 |.`... .A4$..QT..| +00000030 20 4e f8 17 97 96 bc 41 bb 68 f2 d5 05 1d 75 24 | N.....A.h....u$| +00000040 3f b8 bc d5 9a 20 |?.... |" +"2019-05-02 09:27:54.432 UTC [cauthdsl] func2 -> DEBU 1159 0xc0011284d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:54.432 UTC [cauthdsl] func1 -> DEBU 115a 0xc0011284d0 gate 1556789274430638000 evaluation succeeds" +"2019-05-02 09:27:54.432 UTC [policies] Evaluate -> DEBU 115b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 115f Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:54.433 UTC [policies] Evaluate -> DEBU 1160 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:54.433 UTC [common.deliver] deliverBlocks -> DEBU 1161 [channel: businesschannel] Received seekInfo (0xc0010ce580) start: > stop: > from 172.18.0.8:57366" +"2019-05-02 09:27:54.434 UTC [fsblkstorage] Next -> DEBU 1162 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:54.434 UTC [fsblkstorage] newBlockfileStream -> DEBU 1163 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80790]" +"2019-05-02 09:27:54.434 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1164 Remaining bytes=[17875], Going to peek [8] bytes" +"2019-05-02 09:27:54.434 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1165 Returning blockbytes - length=[5709], placementInfo={fileNum=[0], startOffset=[80790], bytesOffset=[80792]}" +"2019-05-02 09:27:54.434 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1166 blockbytes [5709] read from file [0]" +"2019-05-02 09:27:54.434 UTC [common.deliver] deliverBlocks -> DEBU 1167 [channel: businesschannel] Delivering block [5] for (0xc0010ce580) for 172.18.0.8:57366" +"2019-05-02 09:27:54.435 UTC [common.deliver] deliverBlocks -> DEBU 1168 [channel: businesschannel] Done delivering to 172.18.0.8:57366 for (0xc0010ce580)" +"2019-05-02 09:27:54.435 UTC [common.deliver] Handle -> DEBU 1169 Waiting for new SeekInfo from 172.18.0.8:57366" +"2019-05-02 09:27:54.435 UTC [common.deliver] Handle -> DEBU 116a Attempting to read seek info message from 172.18.0.8:57366" +"2019-05-02 09:27:54.444 UTC [grpc] infof -> DEBU 116b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:54.444 UTC [common.deliver] Handle -> WARN 116c Error reading from 172.18.0.8:57366: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:54.444 UTC [orderer.common.server] func1 -> DEBU 116d Closing Deliver stream" +"2019-05-02 09:27:54.444 UTC [comm.grpc.server] 1 -> INFO 116e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57366 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.3445ms +"2019-05-02 09:27:54.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116f Sending msg of 28 bytes to 2 on channel businesschannel took 64.3µs" +"2019-05-02 09:27:54.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1170 Sending msg of 28 bytes to 3 on channel businesschannel took 9.7µs" +"2019-05-02 09:27:54.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1171 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 425.3µs " +"2019-05-02 09:27:54.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1172 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:54.455 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1173 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.6394ms " +"2019-05-02 09:27:54.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1174 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:54.648 UTC [orderer.common.server] Deliver -> DEBU 1175 Starting new Deliver handler" +"2019-05-02 09:27:54.649 UTC [common.deliver] Handle -> DEBU 1176 Starting new deliver loop for 172.18.0.8:57368" +"2019-05-02 09:27:54.649 UTC [common.deliver] Handle -> DEBU 1177 Attempting to read seek info message from 172.18.0.8:57368" +"2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 1178 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 1179 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 117a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 117b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.651 UTC [policies] Evaluate -> DEBU 117c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:54.652 UTC [cauthdsl] func1 -> DEBU 117d 0xc0011171d0 gate 1556789274652048300 evaluation starts" +"2019-05-02 09:27:54.652 UTC [cauthdsl] func2 -> DEBU 117e 0xc0011171d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.652 UTC [cauthdsl] func2 -> DEBU 117f 0xc0011171d0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.652 UTC [cauthdsl] func2 -> DEBU 1180 0xc0011171d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:54.653 UTC [cauthdsl] func2 -> DEBU 1181 0xc0011171d0 principal evaluation fails" +"2019-05-02 09:27:54.653 UTC [cauthdsl] func1 -> DEBU 1182 0xc0011171d0 gate 1556789274652048300 evaluation fails" +"2019-05-02 09:27:54.653 UTC [policies] Evaluate -> DEBU 1183 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:54.653 UTC [policies] Evaluate -> DEBU 1184 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:54.653 UTC [policies] Evaluate -> DEBU 1185 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:54.654 UTC [cauthdsl] func1 -> DEBU 1186 0xc001117a10 gate 1556789274654438400 evaluation starts" +"2019-05-02 09:27:54.654 UTC [cauthdsl] func2 -> DEBU 1187 0xc001117a10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.654 UTC [cauthdsl] func2 -> DEBU 1188 0xc001117a10 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.655 UTC [cauthdsl] func2 -> DEBU 1189 0xc001117a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:54.656 UTC [cauthdsl] func2 -> DEBU 118a 0xc001117a10 principal evaluation fails" +"2019-05-02 09:27:54.656 UTC [cauthdsl] func1 -> DEBU 118b 0xc001117a10 gate 1556789274654438400 evaluation fails" +"2019-05-02 09:27:54.656 UTC [policies] Evaluate -> DEBU 118c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:54.657 UTC [policies] Evaluate -> DEBU 118d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:54.657 UTC [policies] func1 -> DEBU 118e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:54.658 UTC [policies] Evaluate -> DEBU 118f Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:54.658 UTC [policies] Evaluate -> DEBU 1190 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:54.658 UTC [policies] Evaluate -> DEBU 1191 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:54.659 UTC [policies] Evaluate -> DEBU 1192 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.659 UTC [policies] Evaluate -> DEBU 1193 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:54.660 UTC [cauthdsl] func1 -> DEBU 1194 0xc0010f4880 gate 1556789274660009600 evaluation starts" +"2019-05-02 09:27:54.660 UTC [cauthdsl] func2 -> DEBU 1195 0xc0010f4880 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.661 UTC [cauthdsl] func2 -> DEBU 1196 0xc0010f4880 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.661 UTC [cauthdsl] func2 -> DEBU 1197 0xc0010f4880 principal matched by identity 0" +"2019-05-02 09:27:54.661 UTC [msp.identity] Verify -> DEBU 1198 Verify: digest = 00000000 c0 d3 e5 e2 7c 29 f6 1c f9 28 a0 eb e6 53 e5 1c |....|)...(...S..| +00000010 47 f3 b1 51 60 48 cb 43 a7 76 36 4a e3 b2 cf 7a |G..Q`H.C.v6J...z|" +"2019-05-02 09:27:54.662 UTC [msp.identity] Verify -> DEBU 1199 Verify: sig = 00000000 30 44 02 20 51 63 13 2e 65 a6 20 3e b8 41 2c 04 |0D. Qc..e. >.A,.| +00000010 d1 01 ed ab 52 e4 3c e1 08 28 f4 22 b0 a9 b6 c1 |....R.<..(."....| +00000020 3d 8d a1 55 02 20 03 2e dd 55 14 c6 dd e6 97 4d |=..U. ...U.....M| +00000030 1a ed f8 cf ba 2b 69 b1 24 5f 53 af 2a 99 76 11 |.....+i.$_S.*.v.| +00000040 41 1b 72 54 51 88 |A.rTQ.|" +"2019-05-02 09:27:54.663 UTC [cauthdsl] func2 -> DEBU 119a 0xc0010f4880 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:54.663 UTC [cauthdsl] func1 -> DEBU 119b 0xc0010f4880 gate 1556789274660009600 evaluation succeeds" +"2019-05-02 09:27:54.663 UTC [policies] Evaluate -> DEBU 119c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:54.664 UTC [policies] Evaluate -> DEBU 119d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:54.665 UTC [policies] Evaluate -> DEBU 119e Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:54.665 UTC [policies] Evaluate -> DEBU 119f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:54.666 UTC [policies] Evaluate -> DEBU 11a0 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:54.667 UTC [policies] Evaluate -> DEBU 11a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:54.668 UTC [common.deliver] deliverBlocks -> DEBU 11a2 [channel: businesschannel] Received seekInfo (0xc0010cf5c0) start: > stop: > from 172.18.0.8:57368" +"2019-05-02 09:27:54.669 UTC [fsblkstorage] Next -> DEBU 11a3 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:54.669 UTC [fsblkstorage] newBlockfileStream -> DEBU 11a4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86501]" +"2019-05-02 09:27:54.669 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11a5 Remaining bytes=[12164], Going to peek [8] bytes" +"2019-05-02 09:27:54.669 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11a6 Returning blockbytes - length=[4060], placementInfo={fileNum=[0], startOffset=[86501], bytesOffset=[86503]}" +"2019-05-02 09:27:54.669 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11a7 blockbytes [4060] read from file [0]" +"2019-05-02 09:27:54.670 UTC [common.deliver] deliverBlocks -> DEBU 11a8 [channel: businesschannel] Delivering block [6] for (0xc0010cf5c0) for 172.18.0.8:57368" +"2019-05-02 09:27:54.671 UTC [common.deliver] deliverBlocks -> DEBU 11a9 [channel: businesschannel] Done delivering to 172.18.0.8:57368 for (0xc0010cf5c0)" +"2019-05-02 09:27:54.672 UTC [common.deliver] Handle -> DEBU 11aa Waiting for new SeekInfo from 172.18.0.8:57368" +"2019-05-02 09:27:54.673 UTC [common.deliver] Handle -> DEBU 11ab Attempting to read seek info message from 172.18.0.8:57368" +"2019-05-02 09:27:54.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ac Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:54.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ad Sending msg of 28 bytes to 3 on channel testchainid took 134.4µs" +"2019-05-02 09:27:54.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.1µs " +"2019-05-02 09:27:54.682 UTC [common.deliver] Handle -> WARN 11af Error reading from 172.18.0.8:57368: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:54.682 UTC [orderer.common.server] func1 -> DEBU 11b0 Closing Deliver stream" +"2019-05-02 09:27:54.682 UTC [comm.grpc.server] 1 -> INFO 11b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57368 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.6064ms +"2019-05-02 09:27:54.681 UTC [grpc] infof -> DEBU 11b2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:54.870 UTC [orderer.common.server] Deliver -> DEBU 11b3 Starting new Deliver handler" +"2019-05-02 09:27:54.870 UTC [common.deliver] Handle -> DEBU 11b4 Starting new deliver loop for 172.18.0.8:57370" +"2019-05-02 09:27:54.870 UTC [common.deliver] Handle -> DEBU 11b5 Attempting to read seek info message from 172.18.0.8:57370" +"2019-05-02 09:27:54.871 UTC [policies] Evaluate -> DEBU 11b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:54.871 UTC [policies] Evaluate -> DEBU 11b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.871 UTC [policies] Evaluate -> DEBU 11b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:54.872 UTC [policies] Evaluate -> DEBU 11b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.872 UTC [policies] Evaluate -> DEBU 11ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:54.872 UTC [cauthdsl] func1 -> DEBU 11bb 0xc0010e2fc0 gate 1556789274872258100 evaluation starts" +"2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11bc 0xc0010e2fc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11bd 0xc0010e2fc0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11be 0xc0010e2fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:54.872 UTC [cauthdsl] func2 -> DEBU 11bf 0xc0010e2fc0 principal evaluation fails" +"2019-05-02 09:27:54.873 UTC [cauthdsl] func1 -> DEBU 11c0 0xc0010e2fc0 gate 1556789274872258100 evaluation fails" +"2019-05-02 09:27:54.873 UTC [policies] Evaluate -> DEBU 11c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:54.873 UTC [policies] Evaluate -> DEBU 11c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:54.873 UTC [policies] Evaluate -> DEBU 11c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:54.873 UTC [cauthdsl] func1 -> DEBU 11c4 0xc0010e3800 gate 1556789274873552600 evaluation starts" +"2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c5 0xc0010e3800 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c6 0xc0010e3800 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0010e3800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:54.873 UTC [cauthdsl] func2 -> DEBU 11c8 0xc0010e3800 principal evaluation fails" +"2019-05-02 09:27:54.874 UTC [cauthdsl] func1 -> DEBU 11c9 0xc0010e3800 gate 1556789274873552600 evaluation fails" +"2019-05-02 09:27:54.874 UTC [policies] Evaluate -> DEBU 11ca Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:54.874 UTC [policies] Evaluate -> DEBU 11cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:54.874 UTC [policies] func1 -> DEBU 11cc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11cd Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.875 UTC [policies] Evaluate -> DEBU 11d1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:54.876 UTC [cauthdsl] func1 -> DEBU 11d2 0xc0010d24f0 gate 1556789274876175000 evaluation starts" +"2019-05-02 09:27:54.876 UTC [cauthdsl] func2 -> DEBU 11d3 0xc0010d24f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.876 UTC [cauthdsl] func2 -> DEBU 11d4 0xc0010d24f0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:54.876 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0010d24f0 principal matched by identity 0" +"2019-05-02 09:27:54.877 UTC [msp.identity] Verify -> DEBU 11d6 Verify: digest = 00000000 f9 ed 45 d2 7d dc 66 16 10 b0 82 7b 45 1a c1 90 |..E.}.f....{E...| +00000010 03 8c f4 ce 07 32 ad 13 37 53 e3 5f 2d 1b 23 88 |.....2..7S._-.#.|" +"2019-05-02 09:27:54.877 UTC [msp.identity] Verify -> DEBU 11d7 Verify: sig = 00000000 30 44 02 20 34 be bb 83 0d 7c af 8d ce 15 82 4e |0D. 4....|.....N| +00000010 53 a7 58 f9 2e 5b c7 a4 d4 e9 33 4a 54 ee 20 84 |S.X..[....3JT. .| +00000020 24 8b 8d 4d 02 20 77 70 3d 6f e8 51 21 ed 20 c7 |$..M. wp=o.Q!. .| +00000030 2d 76 45 c7 98 41 bd cc 44 cc a3 ff b6 b1 c5 67 |-vE..A..D......g| +00000040 28 af 00 9e ad bc |(.....|" +"2019-05-02 09:27:54.877 UTC [cauthdsl] func2 -> DEBU 11d8 0xc0010d24f0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:54.877 UTC [cauthdsl] func1 -> DEBU 11d9 0xc0010d24f0 gate 1556789274876175000 evaluation succeeds" +"2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11da Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11db == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11dc Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11de Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:54.878 UTC [policies] Evaluate -> DEBU 11df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:54.878 UTC [common.deliver] deliverBlocks -> DEBU 11e0 [channel: businesschannel] Received seekInfo (0xc0010cfb80) start: > stop: > from 172.18.0.8:57370" +"2019-05-02 09:27:54.879 UTC [fsblkstorage] Next -> DEBU 11e1 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:54.879 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90563]" +"2019-05-02 09:27:54.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e3 Remaining bytes=[8102], Going to peek [8] bytes" +"2019-05-02 09:27:54.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e4 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[90563], bytesOffset=[90565]}" +"2019-05-02 09:27:54.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e5 blockbytes [4049] read from file [0]" +"2019-05-02 09:27:54.880 UTC [common.deliver] deliverBlocks -> DEBU 11e6 [channel: businesschannel] Delivering block [7] for (0xc0010cfb80) for 172.18.0.8:57370" +"2019-05-02 09:27:54.880 UTC [common.deliver] deliverBlocks -> DEBU 11e7 [channel: businesschannel] Done delivering to 172.18.0.8:57370 for (0xc0010cfb80)" +"2019-05-02 09:27:54.880 UTC [common.deliver] Handle -> DEBU 11e8 Waiting for new SeekInfo from 172.18.0.8:57370" +"2019-05-02 09:27:54.880 UTC [common.deliver] Handle -> DEBU 11e9 Attempting to read seek info message from 172.18.0.8:57370" +"2019-05-02 09:27:54.888 UTC [grpc] infof -> DEBU 11ea transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:54.889 UTC [common.deliver] Handle -> WARN 11eb Error reading from 172.18.0.8:57370: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:54.889 UTC [orderer.common.server] func1 -> DEBU 11ec Closing Deliver stream" +"2019-05-02 09:27:54.889 UTC [comm.grpc.server] 1 -> INFO 11ed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57370 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6047ms +"2019-05-02 09:27:54.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ee Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" +"2019-05-02 09:27:54.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ef Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +"2019-05-02 09:27:54.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 975µs " +"2019-05-02 09:27:54.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.8µs " +"2019-05-02 09:27:54.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:54.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f3 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:55.073 UTC [orderer.common.server] Deliver -> DEBU 11f4 Starting new Deliver handler" +"2019-05-02 09:27:55.073 UTC [common.deliver] Handle -> DEBU 11f5 Starting new deliver loop for 172.18.0.8:57372" +"2019-05-02 09:27:55.073 UTC [common.deliver] Handle -> DEBU 11f6 Attempting to read seek info message from 172.18.0.8:57372" +"2019-05-02 09:27:55.075 UTC [policies] Evaluate -> DEBU 11f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:55.075 UTC [policies] Evaluate -> DEBU 11f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.075 UTC [policies] Evaluate -> DEBU 11f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:55.076 UTC [policies] Evaluate -> DEBU 11fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.076 UTC [policies] Evaluate -> DEBU 11fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:55.076 UTC [cauthdsl] func1 -> DEBU 11fc 0xc0010b29d0 gate 1556789275076391100 evaluation starts" +"2019-05-02 09:27:55.076 UTC [cauthdsl] func2 -> DEBU 11fd 0xc0010b29d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:55.077 UTC [cauthdsl] func2 -> DEBU 11fe 0xc0010b29d0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:55.077 UTC [cauthdsl] func2 -> DEBU 11ff 0xc0010b29d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:27:55.077 UTC [cauthdsl] func2 -> DEBU 1200 0xc0010b29d0 principal evaluation fails" +"2019-05-02 09:27:55.077 UTC [cauthdsl] func1 -> DEBU 1201 0xc0010b29d0 gate 1556789275076391100 evaluation fails" +"2019-05-02 09:27:55.077 UTC [policies] Evaluate -> DEBU 1202 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:55.077 UTC [policies] Evaluate -> DEBU 1203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:55.077 UTC [policies] Evaluate -> DEBU 1204 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:55.078 UTC [cauthdsl] func1 -> DEBU 1205 0xc0010b3330 gate 1556789275077999500 evaluation starts" +"2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1206 0xc0010b3330 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1207 0xc0010b3330 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1208 0xc0010b3330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:27:55.078 UTC [cauthdsl] func2 -> DEBU 1209 0xc0010b3330 principal evaluation fails" +"2019-05-02 09:27:55.078 UTC [cauthdsl] func1 -> DEBU 120a 0xc0010b3330 gate 1556789275077999500 evaluation fails" +"2019-05-02 09:27:55.078 UTC [policies] Evaluate -> DEBU 120b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:55.078 UTC [policies] Evaluate -> DEBU 120c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:55.078 UTC [policies] func1 -> DEBU 120d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 120e Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 120f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 1210 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 1211 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.079 UTC [policies] Evaluate -> DEBU 1212 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:55.079 UTC [cauthdsl] func1 -> DEBU 1213 0xc001094020 gate 1556789275079836300 evaluation starts" +"2019-05-02 09:27:55.079 UTC [cauthdsl] func2 -> DEBU 1214 0xc001094020 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:55.080 UTC [cauthdsl] func2 -> DEBU 1215 0xc001094020 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:55.080 UTC [cauthdsl] func2 -> DEBU 1216 0xc001094020 principal matched by identity 0" +"2019-05-02 09:27:55.080 UTC [msp.identity] Verify -> DEBU 1217 Verify: digest = 00000000 5d 72 74 87 aa 9b 16 3c e5 61 26 08 88 d7 3f 07 |]rt....<.a&...?.| +00000010 ee eb 9d be 0f a5 6b 62 55 db e9 32 06 81 59 2c |......kbU..2..Y,|" +"2019-05-02 09:27:55.080 UTC [msp.identity] Verify -> DEBU 1218 Verify: sig = 00000000 30 45 02 21 00 b1 d8 d3 d7 0c 64 ce a2 b4 31 73 |0E.!......d...1s| +00000010 10 b7 ad 1a 51 97 52 0f bd f5 e1 f8 3c 46 b7 50 |....Q.R..... DEBU 1219 0xc001094020 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:55.080 UTC [cauthdsl] func1 -> DEBU 121a 0xc001094020 gate 1556789275079836300 evaluation succeeds" +"2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 121f Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:55.081 UTC [policies] Evaluate -> DEBU 1220 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:55.081 UTC [common.deliver] deliverBlocks -> DEBU 1221 [channel: businesschannel] Received seekInfo (0xc001190b80) start: > stop: > from 172.18.0.8:57372" +"2019-05-02 09:27:55.082 UTC [fsblkstorage] Next -> DEBU 1222 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-05-02 09:27:55.082 UTC [fsblkstorage] newBlockfileStream -> DEBU 1223 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]" +"2019-05-02 09:27:55.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1224 Remaining bytes=[4051], Going to peek [8] bytes" +"2019-05-02 09:27:55.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1225 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}" +"2019-05-02 09:27:55.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1226 blockbytes [4049] read from file [0]" +"2019-05-02 09:27:55.082 UTC [common.deliver] deliverBlocks -> DEBU 1227 [channel: businesschannel] Delivering block [8] for (0xc001190b80) for 172.18.0.8:57372" +"2019-05-02 09:27:55.082 UTC [common.deliver] deliverBlocks -> DEBU 1228 [channel: businesschannel] Done delivering to 172.18.0.8:57372 for (0xc001190b80)" +"2019-05-02 09:27:55.083 UTC [common.deliver] Handle -> DEBU 1229 Waiting for new SeekInfo from 172.18.0.8:57372" +"2019-05-02 09:27:55.083 UTC [common.deliver] Handle -> DEBU 122a Attempting to read seek info message from 172.18.0.8:57372" +"2019-05-02 09:27:55.090 UTC [common.deliver] Handle -> WARN 122b Error reading from 172.18.0.8:57372: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:55.091 UTC [orderer.common.server] func1 -> DEBU 122d Closing Deliver stream" +"2019-05-02 09:27:55.091 UTC [comm.grpc.server] 1 -> INFO 122e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57372 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.5619ms +"2019-05-02 09:27:55.090 UTC [grpc] infof -> DEBU 122c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:55.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:55.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +"2019-05-02 09:27:55.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1231 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.1µs " +"2019-05-02 09:27:55.310 UTC [orderer.common.server] Deliver -> DEBU 1232 Starting new Deliver handler" +"2019-05-02 09:27:55.310 UTC [common.deliver] Handle -> DEBU 1233 Starting new deliver loop for 172.18.0.8:57374" +"2019-05-02 09:27:55.310 UTC [common.deliver] Handle -> DEBU 1234 Attempting to read seek info message from 172.18.0.8:57374" +"2019-05-02 09:27:55.312 UTC [policies] Evaluate -> DEBU 1235 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:55.312 UTC [policies] Evaluate -> DEBU 1236 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.313 UTC [policies] Evaluate -> DEBU 1237 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:55.313 UTC [policies] Evaluate -> DEBU 1238 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.314 UTC [policies] Evaluate -> DEBU 1239 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:55.315 UTC [msp] DeserializeIdentity -> DEBU 123a Obtaining identity" +"2019-05-02 09:27:55.316 UTC [msp.identity] newIdentity -> DEBU 123b Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -6375,603 +6342,506 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:31:26.577 UTC [cauthdsl] func1 -> DEBU 1239 0xc000232200 gate 1556760686577722800 evaluation starts" -"2019-05-02 01:31:26.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:26.578 UTC [cauthdsl] func2 -> DEBU 123a 0xc000232200 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:26.585 UTC [cauthdsl] func2 -> DEBU 123c 0xc000232200 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:26.586 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 123d Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-05-02 01:31:26.586 UTC [msp] Validate -> DEBU 123e MSP OrdererMSP validating identity" -"2019-05-02 01:31:26.588 UTC [cauthdsl] func2 -> DEBU 123f 0xc000232200 principal matched by identity 0" -"2019-05-02 01:31:26.588 UTC [msp.identity] Verify -> DEBU 1240 Verify: digest = 00000000 12 84 cc d1 3a 3a 06 a5 ff 37 27 bf f1 db 04 f7 |....::...7'.....| -00000010 4c 60 b0 f0 4c ad 5f c8 e9 50 6b 17 64 4a 84 f0 |L`..L._..Pk.dJ..|" -"2019-05-02 01:31:26.588 UTC [msp.identity] Verify -> DEBU 1241 Verify: sig = 00000000 30 45 02 21 00 c1 12 09 b6 d0 52 54 04 6e de 16 |0E.!......RT.n..| -00000010 3d ab 6c 39 d8 fd 04 20 80 f9 7a e5 01 5f 85 d0 |=.l9... ..z.._..| -00000020 f4 21 8b 16 c8 02 20 13 07 ce f6 45 83 46 a7 20 |.!.... ....E.F. | -00000030 c9 ed 72 34 e0 41 e9 f4 5f 63 8a f1 97 65 bc ec |..r4.A.._c...e..| -00000040 3f 9d 69 2f 15 7c af |?.i/.|.|" -"2019-05-02 01:31:26.590 UTC [cauthdsl] func2 -> DEBU 1242 0xc000232200 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:26.591 UTC [cauthdsl] func1 -> DEBU 1243 0xc000232200 gate 1556760686577722800 evaluation succeeds" -"2019-05-02 01:31:26.592 UTC [policies] Evaluate -> DEBU 1244 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:26.593 UTC [policies] Evaluate -> DEBU 1245 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:26.594 UTC [policies] Evaluate -> DEBU 1246 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:26.594 UTC [policies] Evaluate -> DEBU 1247 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:26.594 UTC [policies] Evaluate -> DEBU 1248 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:26.595 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1249 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:26.595 UTC [policies] Evaluate -> DEBU 124a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:26.597 UTC [common.deliver] deliverBlocks -> DEBU 124b [channel: testchainid] Received seekInfo (0xc000088fc0) start: > stop: > from 192.168.240.9:47506" -"2019-05-02 01:31:26.597 UTC [fsblkstorage] Next -> DEBU 124c Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:31:26.598 UTC [fsblkstorage] newBlockfileStream -> DEBU 124d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -"2019-05-02 01:31:26.598 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 124e Remaining bytes=[25827], Going to peek [8] bytes" -"2019-05-02 01:31:26.599 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 124f Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -"2019-05-02 01:31:26.599 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1250 blockbytes [25824] read from file [0]" -"2019-05-02 01:31:26.600 UTC [common.deliver] deliverBlocks -> DEBU 1251 [channel: testchainid] Delivering block [1] for (0xc000088fc0) for 192.168.240.9:47506" -"2019-05-02 01:31:26.601 UTC [common.deliver] deliverBlocks -> DEBU 1252 [channel: testchainid] Done delivering to 192.168.240.9:47506 for (0xc000088fc0)" -"2019-05-02 01:31:26.601 UTC [common.deliver] Handle -> DEBU 1253 Waiting for new SeekInfo from 192.168.240.9:47506" -"2019-05-02 01:31:26.602 UTC [common.deliver] Handle -> DEBU 1254 Attempting to read seek info message from 192.168.240.9:47506" -"2019-05-02 01:31:26.611 UTC [common.deliver] Handle -> WARN 1255 Error reading from 192.168.240.9:47506: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:26.612 UTC [grpc] infof -> DEBU 1256 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:26.611 UTC [orderer.common.server] func1 -> DEBU 1257 Closing Deliver stream" -"2019-05-02 01:31:26.615 UTC [comm.grpc.server] 1 -> INFO 1258 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47506 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=64.6606ms -"2019-05-02 01:31:26.944 UTC [orderer.common.server] Deliver -> DEBU 1259 Starting new Deliver handler" -"2019-05-02 01:31:26.944 UTC [common.deliver] Handle -> DEBU 125a Starting new deliver loop for 192.168.240.9:47508" -"2019-05-02 01:31:26.945 UTC [common.deliver] Handle -> DEBU 125b Attempting to read seek info message from 192.168.240.9:47508" -"2019-05-02 01:31:26.947 UTC [policies] Evaluate -> DEBU 125c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:26.948 UTC [policies] Evaluate -> DEBU 125d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:26.948 UTC [policies] Evaluate -> DEBU 125e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:26.948 UTC [policies] Evaluate -> DEBU 125f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:26.948 UTC [policies] Evaluate -> DEBU 1260 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:26.948 UTC [cauthdsl] func1 -> DEBU 1261 0xc0008c1940 gate 1556760686948333600 evaluation starts" -"2019-05-02 01:31:26.949 UTC [cauthdsl] func2 -> DEBU 1262 0xc0008c1940 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:26.952 UTC [cauthdsl] func2 -> DEBU 1263 0xc0008c1940 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:26.953 UTC [cauthdsl] func2 -> DEBU 1264 0xc0008c1940 principal matched by identity 0" -"2019-05-02 01:31:26.953 UTC [msp.identity] Verify -> DEBU 1265 Verify: digest = 00000000 c8 83 56 cd 29 32 1d 84 12 b4 86 97 a3 7d ea d7 |..V.)2.......}..| -00000010 d0 44 2c d9 69 c6 cc 37 51 c7 7f 3d 55 ad 58 ee |.D,.i..7Q..=U.X.|" -"2019-05-02 01:31:26.953 UTC [msp.identity] Verify -> DEBU 1266 Verify: sig = 00000000 30 45 02 21 00 bd 09 41 be fa 21 2d b3 c7 68 6c |0E.!...A..!-..hl| -00000010 02 d2 5a 2e 2d 2c 78 e9 64 f0 90 a4 8d d3 8a aa |..Z.-,x.d.......| -00000020 fe b9 6c 0b 3f 02 20 6a dd f2 46 8a da e5 4e 34 |..l.?. j..F...N4| -00000030 f9 86 13 57 a4 0a be 6e c2 bb 24 f3 53 5a f0 ce |...W...n..$.SZ..| -00000040 b3 fc aa f6 e8 cc e0 |.......|" -"2019-05-02 01:31:26.953 UTC [cauthdsl] func2 -> DEBU 1267 0xc0008c1940 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:26.953 UTC [cauthdsl] func1 -> DEBU 1268 0xc0008c1940 gate 1556760686948333600 evaluation succeeds" -"2019-05-02 01:31:26.953 UTC [policies] Evaluate -> DEBU 1269 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:26.954 UTC [policies] Evaluate -> DEBU 126a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:26.954 UTC [policies] Evaluate -> DEBU 126b Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:26.955 UTC [policies] Evaluate -> DEBU 126c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:26.955 UTC [policies] Evaluate -> DEBU 126d Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:26.956 UTC [policies] Evaluate -> DEBU 126e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:26.957 UTC [common.deliver] deliverBlocks -> DEBU 126f [channel: testchainid] Received seekInfo (0xc000089840) start: > stop: > from 192.168.240.9:47508" -"2019-05-02 01:31:26.960 UTC [fsblkstorage] Next -> DEBU 1270 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:31:26.961 UTC [fsblkstorage] newBlockfileStream -> DEBU 1271 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -"2019-05-02 01:31:26.961 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1272 Remaining bytes=[25827], Going to peek [8] bytes" -"2019-05-02 01:31:26.964 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1273 Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -"2019-05-02 01:31:26.966 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1274 blockbytes [25824] read from file [0]" -"2019-05-02 01:31:26.971 UTC [common.deliver] deliverBlocks -> DEBU 1275 [channel: testchainid] Delivering block [1] for (0xc000089840) for 192.168.240.9:47508" -"2019-05-02 01:31:26.972 UTC [common.deliver] deliverBlocks -> DEBU 1276 [channel: testchainid] Done delivering to 192.168.240.9:47508 for (0xc000089840)" -"2019-05-02 01:31:26.983 UTC [common.deliver] Handle -> DEBU 1277 Waiting for new SeekInfo from 192.168.240.9:47508" -"2019-05-02 01:31:26.983 UTC [common.deliver] Handle -> DEBU 1278 Attempting to read seek info message from 192.168.240.9:47508" -"2019-05-02 01:31:27.008 UTC [policies] Evaluate -> DEBU 1279 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:27.009 UTC [policies] Evaluate -> DEBU 127a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:27.009 UTC [policies] Evaluate -> DEBU 127b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:27.010 UTC [policies] Evaluate -> DEBU 127c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:27.019 UTC [policies] Evaluate -> DEBU 127d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:27.020 UTC [cauthdsl] func1 -> DEBU 127e 0xc000c8dbe0 gate 1556760687019989000 evaluation starts" -"2019-05-02 01:31:27.020 UTC [cauthdsl] func2 -> DEBU 127f 0xc000c8dbe0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:27.020 UTC [cauthdsl] func2 -> DEBU 1280 0xc000c8dbe0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:27.020 UTC [cauthdsl] func2 -> DEBU 1281 0xc000c8dbe0 principal matched by identity 0" -"2019-05-02 01:31:27.020 UTC [msp.identity] Verify -> DEBU 1282 Verify: digest = 00000000 c6 5f 24 c6 e1 98 cb f3 b7 0a a3 6d 30 e5 54 a3 |._$........m0.T.| -00000010 a2 62 4d bc 27 3d b0 9e 3b 1d 2f c0 1c 5a 12 d0 |.bM.'=..;./..Z..|" -"2019-05-02 01:31:27.020 UTC [msp.identity] Verify -> DEBU 1283 Verify: sig = 00000000 30 45 02 21 00 db 28 1e 8a 4b 5e 59 e1 40 53 2a |0E.!..(..K^Y.@S*| -00000010 ba 69 34 e3 e6 8a c5 66 2f 67 82 87 fa 70 a9 4f |.i4....f/g...p.O| -00000020 a5 ed 47 dd 72 02 20 24 ef d1 8e af 6d 30 1c d0 |..G.r. $....m0..| -00000030 6b 6b 77 a3 3c e2 5a 57 df 1d ed 82 cd 35 d6 24 |kkw.<.ZW.....5.$| -00000040 03 ce 6b ac 35 81 42 |..k.5.B|" -"2019-05-02 01:31:27.020 UTC [cauthdsl] func2 -> DEBU 1284 0xc000c8dbe0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:27.020 UTC [cauthdsl] func1 -> DEBU 1285 0xc000c8dbe0 gate 1556760687019989000 evaluation succeeds" -"2019-05-02 01:31:27.020 UTC [policies] Evaluate -> DEBU 1286 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:27.020 UTC [policies] Evaluate -> DEBU 1287 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:27.020 UTC [policies] Evaluate -> DEBU 1288 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:27.020 UTC [policies] Evaluate -> DEBU 1289 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:27.020 UTC [policies] Evaluate -> DEBU 128a Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:27.021 UTC [policies] Evaluate -> DEBU 128b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:27.021 UTC [common.deliver] deliverBlocks -> DEBU 128c [channel: testchainid] Received seekInfo (0xc000089c80) start: > stop: > from 192.168.240.9:47508" -"2019-05-02 01:31:27.021 UTC [fsblkstorage] Next -> DEBU 128d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:31:27.021 UTC [fsblkstorage] newBlockfileStream -> DEBU 128e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-05-02 01:31:27.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 128f Remaining bytes=[44242], Going to peek [8] bytes" -"2019-05-02 01:31:27.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1290 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:31:27.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1291 blockbytes [18412] read from file [0]" -"2019-05-02 01:31:27.021 UTC [common.deliver] deliverBlocks -> DEBU 1292 [channel: testchainid] Delivering block [0] for (0xc000089c80) for 192.168.240.9:47508" -"2019-05-02 01:31:27.021 UTC [common.deliver] deliverBlocks -> DEBU 1293 [channel: testchainid] Done delivering to 192.168.240.9:47508 for (0xc000089c80)" -"2019-05-02 01:31:27.021 UTC [common.deliver] Handle -> DEBU 1294 Waiting for new SeekInfo from 192.168.240.9:47508" -"2019-05-02 01:31:27.023 UTC [common.deliver] Handle -> DEBU 1295 Attempting to read seek info message from 192.168.240.9:47508" -"2019-05-02 01:31:27.040 UTC [common.deliver] Handle -> WARN 1296 Error reading from 192.168.240.9:47508: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:27.041 UTC [orderer.common.server] func1 -> DEBU 1297 Closing Deliver stream" -"2019-05-02 01:31:27.041 UTC [comm.grpc.server] 1 -> INFO 1298 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47508 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=97.2138ms -"2019-05-02 01:31:27.050 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1299 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:27.047 UTC [grpc] infof -> DEBU 129a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:27.057 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129b Sending msg of 28 bytes to 2 on channel businesschannel took 51.7µs" -"2019-05-02 01:31:27.058 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129c Sending msg of 28 bytes to 3 on channel businesschannel took 144.8µs" -"2019-05-02 01:31:27.061 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.2µs " -"2019-05-02 01:31:27.066 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 416.9µs " -"2019-05-02 01:31:27.069 UTC [orderer.common.cluster.step] handleMessage -> DEBU 129f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:27.070 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:27.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a2 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" -"2019-05-02 01:31:27.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.8419ms " -"2019-05-02 01:31:27.251 UTC [orderer.common.server] Deliver -> DEBU 12a3 Starting new Deliver handler" -"2019-05-02 01:31:27.251 UTC [common.deliver] Handle -> DEBU 12a4 Starting new deliver loop for 192.168.240.9:47510" -"2019-05-02 01:31:27.251 UTC [common.deliver] Handle -> DEBU 12a5 Attempting to read seek info message from 192.168.240.9:47510" -"2019-05-02 01:31:27.252 UTC [policies] Evaluate -> DEBU 12a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:27.252 UTC [policies] Evaluate -> DEBU 12a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:27.252 UTC [policies] Evaluate -> DEBU 12a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:27.253 UTC [policies] Evaluate -> DEBU 12a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:27.253 UTC [policies] Evaluate -> DEBU 12aa == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:27.254 UTC [cauthdsl] func1 -> DEBU 12ab 0xc0010ff110 gate 1556760687253768700 evaluation starts" -"2019-05-02 01:31:27.254 UTC [cauthdsl] func2 -> DEBU 12ac 0xc0010ff110 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:27.254 UTC [cauthdsl] func2 -> DEBU 12ad 0xc0010ff110 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:27.255 UTC [cauthdsl] func2 -> DEBU 12ae 0xc0010ff110 principal matched by identity 0" -"2019-05-02 01:31:27.255 UTC [msp.identity] Verify -> DEBU 12af Verify: digest = 00000000 3a e5 48 7c d4 28 be 21 91 44 4e 44 62 89 d5 43 |:.H|.(.!.DNDb..C| -00000010 ac b8 1f 07 82 dc 7e 6a 6e e1 ce 98 d8 ca 3f 2c |......~jn.....?,|" -"2019-05-02 01:31:27.256 UTC [msp.identity] Verify -> DEBU 12b0 Verify: sig = 00000000 30 45 02 21 00 a1 fe d3 bd b8 26 22 25 3f 57 18 |0E.!......&"%?W.| -00000010 a6 cb ff 02 94 6b 74 7f fb b7 2f 7a d8 d9 50 cf |.....kt.../z..P.| -00000020 a6 3b 6d b3 fa 02 20 10 93 94 21 f9 64 c2 68 ae |.;m... ...!.d.h.| -00000030 46 be dd 6b 0c 5b 99 55 90 f1 97 f8 08 41 67 50 |F..k.[.U.....AgP| -00000040 8c 74 0e 3b 37 d5 24 |.t.;7.$|" -"2019-05-02 01:31:27.256 UTC [cauthdsl] func2 -> DEBU 12b1 0xc0010ff110 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:27.256 UTC [cauthdsl] func1 -> DEBU 12b2 0xc0010ff110 gate 1556760687253768700 evaluation succeeds" -"2019-05-02 01:31:27.258 UTC [policies] Evaluate -> DEBU 12b3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:27.258 UTC [policies] Evaluate -> DEBU 12b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:27.258 UTC [policies] Evaluate -> DEBU 12b5 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:27.260 UTC [policies] Evaluate -> DEBU 12b6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:27.260 UTC [policies] Evaluate -> DEBU 12b7 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:27.261 UTC [policies] Evaluate -> DEBU 12b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:27.261 UTC [common.deliver] deliverBlocks -> DEBU 12b9 [channel: testchainid] Received seekInfo (0xc00017fd40) start: > stop: > from 192.168.240.9:47510" -"2019-05-02 01:31:27.262 UTC [fsblkstorage] Next -> DEBU 12ba Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:31:27.262 UTC [fsblkstorage] newBlockfileStream -> DEBU 12bb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-05-02 01:31:27.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12bc Remaining bytes=[44242], Going to peek [8] bytes" -"2019-05-02 01:31:27.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12bd Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:31:27.264 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12be blockbytes [18412] read from file [0]" -"2019-05-02 01:31:27.264 UTC [common.deliver] deliverBlocks -> DEBU 12bf [channel: testchainid] Delivering block [0] for (0xc00017fd40) for 192.168.240.9:47510" -"2019-05-02 01:31:27.264 UTC [common.deliver] deliverBlocks -> DEBU 12c0 [channel: testchainid] Done delivering to 192.168.240.9:47510 for (0xc00017fd40)" -"2019-05-02 01:31:27.264 UTC [common.deliver] Handle -> DEBU 12c1 Waiting for new SeekInfo from 192.168.240.9:47510" -"2019-05-02 01:31:27.264 UTC [common.deliver] Handle -> DEBU 12c2 Attempting to read seek info message from 192.168.240.9:47510" -"2019-05-02 01:31:27.272 UTC [common.deliver] Handle -> WARN 12c3 Error reading from 192.168.240.9:47510: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:27.272 UTC [orderer.common.server] func1 -> DEBU 12c4 Closing Deliver stream" -"2019-05-02 01:31:27.273 UTC [comm.grpc.server] 1 -> INFO 12c5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47510 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.5679ms -"2019-05-02 01:31:27.273 UTC [grpc] infof -> DEBU 12c6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:27.463 UTC [orderer.common.server] Deliver -> DEBU 12c7 Starting new Deliver handler" -"2019-05-02 01:31:27.464 UTC [common.deliver] Handle -> DEBU 12c8 Starting new deliver loop for 192.168.240.9:47512" -"2019-05-02 01:31:27.464 UTC [common.deliver] Handle -> DEBU 12c9 Attempting to read seek info message from 192.168.240.9:47512" -"2019-05-02 01:31:27.465 UTC [policies] Evaluate -> DEBU 12ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:27.465 UTC [policies] Evaluate -> DEBU 12cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:27.466 UTC [policies] Evaluate -> DEBU 12cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:27.466 UTC [policies] Evaluate -> DEBU 12cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:27.466 UTC [policies] Evaluate -> DEBU 12ce == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:27.467 UTC [cauthdsl] func1 -> DEBU 12cf 0xc0012e05b0 gate 1556760687467219700 evaluation starts" -"2019-05-02 01:31:27.467 UTC [cauthdsl] func2 -> DEBU 12d0 0xc0012e05b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:27.467 UTC [cauthdsl] func2 -> DEBU 12d1 0xc0012e05b0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:27.467 UTC [cauthdsl] func2 -> DEBU 12d2 0xc0012e05b0 principal matched by identity 0" -"2019-05-02 01:31:27.468 UTC [msp.identity] Verify -> DEBU 12d3 Verify: digest = 00000000 ba d0 61 bb fd 05 6d 75 ff d9 a3 59 98 2d 03 6f |..a...mu...Y.-.o| -00000010 57 ba 30 fd d7 d9 d1 d9 db c6 73 96 95 a7 c4 0a |W.0.......s.....|" -"2019-05-02 01:31:27.468 UTC [msp.identity] Verify -> DEBU 12d4 Verify: sig = 00000000 30 45 02 21 00 90 72 bf ac 1c c7 bb f5 5d 8a e1 |0E.!..r......]..| -00000010 35 cf c0 2c 0f 90 57 52 ed 29 f2 3d 83 f7 69 8c |5..,..WR.).=..i.| -00000020 21 0d 9d c0 9a 02 20 3b 92 13 cf ef a3 5b 5f 63 |!..... ;.....[_c| -00000030 82 8e f3 ff 72 84 fe a4 8f 87 3d 25 f6 4d 74 bf |....r.....=%.Mt.| -00000040 66 07 4c b7 95 15 cc |f.L....|" -"2019-05-02 01:31:27.469 UTC [cauthdsl] func2 -> DEBU 12d5 0xc0012e05b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:27.469 UTC [cauthdsl] func1 -> DEBU 12d6 0xc0012e05b0 gate 1556760687467219700 evaluation succeeds" -"2019-05-02 01:31:27.470 UTC [policies] Evaluate -> DEBU 12d7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:27.470 UTC [policies] Evaluate -> DEBU 12d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:27.470 UTC [policies] Evaluate -> DEBU 12d9 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:27.471 UTC [policies] Evaluate -> DEBU 12da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:27.471 UTC [policies] Evaluate -> DEBU 12db Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:27.471 UTC [policies] Evaluate -> DEBU 12dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:27.472 UTC [common.deliver] deliverBlocks -> DEBU 12dd [channel: testchainid] Received seekInfo (0xc0003c86c0) start: > stop: > from 192.168.240.9:47512" -"2019-05-02 01:31:27.472 UTC [fsblkstorage] Next -> DEBU 12de Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:31:27.472 UTC [fsblkstorage] newBlockfileStream -> DEBU 12df newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -"2019-05-02 01:31:27.473 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e0 Remaining bytes=[25827], Going to peek [8] bytes" -"2019-05-02 01:31:27.473 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e1 Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -"2019-05-02 01:31:27.474 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e2 blockbytes [25824] read from file [0]" -"2019-05-02 01:31:27.474 UTC [common.deliver] deliverBlocks -> DEBU 12e3 [channel: testchainid] Delivering block [1] for (0xc0003c86c0) for 192.168.240.9:47512" -"2019-05-02 01:31:27.475 UTC [common.deliver] deliverBlocks -> DEBU 12e4 [channel: testchainid] Done delivering to 192.168.240.9:47512 for (0xc0003c86c0)" -"2019-05-02 01:31:27.475 UTC [common.deliver] Handle -> DEBU 12e5 Waiting for new SeekInfo from 192.168.240.9:47512" -"2019-05-02 01:31:27.476 UTC [common.deliver] Handle -> DEBU 12e6 Attempting to read seek info message from 192.168.240.9:47512" -"2019-05-02 01:31:27.487 UTC [common.deliver] Handle -> WARN 12e7 Error reading from 192.168.240.9:47512: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:27.488 UTC [orderer.common.server] func1 -> DEBU 12e8 Closing Deliver stream" -"2019-05-02 01:31:27.488 UTC [comm.grpc.server] 1 -> INFO 12e9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47512 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.5121ms -"2019-05-02 01:31:27.488 UTC [grpc] infof -> DEBU 12ea transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:27.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12eb Sending msg of 28 bytes to 2 on channel businesschannel took 48.7µs" -"2019-05-02 01:31:27.541 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ec Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" -"2019-05-02 01:31:27.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 424.2µs " -"2019-05-02 01:31:27.543 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " -"2019-05-02 01:31:27.544 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ef Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:27.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f0 Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs" -"2019-05-02 01:31:27.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.4µs " -"2019-05-02 01:31:27.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f2 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:27.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:28.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f4 Sending msg of 28 bytes to 2 on channel businesschannel took 26.4µs" -"2019-05-02 01:31:28.041 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f5 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" -"2019-05-02 01:31:28.041 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.6µs " -"2019-05-02 01:31:28.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105µs " -"2019-05-02 01:31:28.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:28.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:28.044 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fa Sending msg of 28 bytes to 3 on channel testchainid took 100.9µs" -"2019-05-02 01:31:28.044 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fb Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:28.044 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.6µs " -"2019-05-02 01:31:28.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fd Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" -"2019-05-02 01:31:28.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fe Sending msg of 28 bytes to 2 on channel businesschannel took 14.9µs" -"2019-05-02 01:31:28.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.8µs " -"2019-05-02 01:31:28.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1300 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.9µs " -"2019-05-02 01:31:28.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1301 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:28.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1302 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:28.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1303 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:28.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1304 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" -"2019-05-02 01:31:28.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1305 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62µs " -"2019-05-02 01:31:28.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1306 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" -"2019-05-02 01:31:28.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1307 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" -"2019-05-02 01:31:28.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1308 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.9µs " -"2019-05-02 01:31:28.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1309 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.2µs " -"2019-05-02 01:31:29.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:29.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:29.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:29.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130d Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" -"2019-05-02 01:31:29.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.7µs " -"2019-05-02 01:31:29.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130f Sending msg of 28 bytes to 2 on channel businesschannel took 51.8µs" -"2019-05-02 01:31:29.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1310 Sending msg of 28 bytes to 3 on channel businesschannel took 40.3µs" -"2019-05-02 01:31:29.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1311 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.4µs " -"2019-05-02 01:31:29.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1312 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.8µs " -"2019-05-02 01:31:29.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1313 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:29.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1314 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:29.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1315 Sending msg of 28 bytes to 3 on channel testchainid took 33.1µs" -"2019-05-02 01:31:29.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1316 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107µs " -"2019-05-02 01:31:29.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1317 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:30.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1318 Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" -"2019-05-02 01:31:30.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131a Sending msg of 28 bytes to 3 on channel businesschannel took 55.3µs" -"2019-05-02 01:31:30.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1319 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 212.8µs " -"2019-05-02 01:31:30.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.4µs " -"2019-05-02 01:31:30.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:30.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131d Sending msg of 28 bytes to 3 on channel testchainid took 23.5µs" -"2019-05-02 01:31:30.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.1µs " -"2019-05-02 01:31:30.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:30.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1320 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:30.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1321 Sending msg of 28 bytes to 2 on channel businesschannel took 51µs" -"2019-05-02 01:31:30.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1322 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 346.4µs " -"2019-05-02 01:31:30.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1323 Sending msg of 28 bytes to 3 on channel businesschannel took 66.1µs" -"2019-05-02 01:31:30.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1324 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.1µs " -"2019-05-02 01:31:30.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1325 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:30.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1326 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:30.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1327 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:30.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1328 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" -"2019-05-02 01:31:30.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1329 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.3µs " -"2019-05-02 01:31:30.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132a Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" -"2019-05-02 01:31:30.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132b Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" -"2019-05-02 01:31:30.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.6µs " -"2019-05-02 01:31:30.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.7µs " -"2019-05-02 01:31:31.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:31.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:31.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1330 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:31.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1331 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" -"2019-05-02 01:31:31.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.4µs " -"2019-05-02 01:31:31.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1333 Sending msg of 28 bytes to 3 on channel businesschannel took 36.3µs" -"2019-05-02 01:31:31.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1334 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" -"2019-05-02 01:31:31.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1335 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.6µs " -"2019-05-02 01:31:31.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1336 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.3µs " -"2019-05-02 01:31:31.510 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1337 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:31.511 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1338 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:31.513 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1339 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:31.515 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133a Sending msg of 28 bytes to 3 on channel testchainid took 64.4µs" -"2019-05-02 01:31:31.515 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 350.9µs " -"2019-05-02 01:31:31.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133c Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" -"2019-05-02 01:31:32.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133d Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" -"2019-05-02 01:31:32.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.5µs " -"2019-05-02 01:31:32.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.6µs " -"2019-05-02 01:31:32.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1340 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:32.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1341 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:32.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1342 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" -"2019-05-02 01:31:32.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1343 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.2µs " -"2019-05-02 01:31:32.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1344 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:32.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1345 Sending msg of 28 bytes to 2 on channel businesschannel took 15.2µs" -"2019-05-02 01:31:32.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1346 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" -"2019-05-02 01:31:32.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1347 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs " -"2019-05-02 01:31:32.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1348 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.8µs " -"2019-05-02 01:31:32.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1349 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:32.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:32.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:32.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134c Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" -"2019-05-02 01:31:32.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.6µs " -"2019-05-02 01:31:32.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134e Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" -"2019-05-02 01:31:32.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134f Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" -"2019-05-02 01:31:32.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1350 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.5µs " -"2019-05-02 01:31:32.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1351 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.3µs " -"2019-05-02 01:31:33.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1352 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:33.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1353 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:33.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1354 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:33.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1355 Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" -"2019-05-02 01:31:33.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1356 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " -"2019-05-02 01:31:33.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1357 Sending msg of 28 bytes to 3 on channel businesschannel took 35µs" -"2019-05-02 01:31:33.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1358 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" -"2019-05-02 01:31:33.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1359 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.1µs " -"2019-05-02 01:31:33.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " -"2019-05-02 01:31:33.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:33.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:33.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:33.513 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 135e Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" -"2019-05-02 01:31:33.513 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 528.8µs " -"2019-05-02 01:31:33.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1360 Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" -"2019-05-02 01:31:33.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1361 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" -"2019-05-02 01:31:34.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1362 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 294.2µs " -"2019-05-02 01:31:34.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1363 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.8µs " -"2019-05-02 01:31:34.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1364 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:34.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1365 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:34.007 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1366 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:34.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1367 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" -"2019-05-02 01:31:34.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1368 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.6µs " -"2019-05-02 01:31:34.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1369 Sending msg of 28 bytes to 2 on channel businesschannel took 26.7µs" -"2019-05-02 01:31:34.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136a Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" -"2019-05-02 01:31:34.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.1µs " -"2019-05-02 01:31:34.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.1µs " -"2019-05-02 01:31:34.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:34.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:34.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:34.509 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1370 Sending msg of 28 bytes to 3 on channel testchainid took 42.2µs" -"2019-05-02 01:31:34.510 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1371 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 513.6µs " -"2019-05-02 01:31:34.788 UTC [orderer.common.server] Deliver -> DEBU 1372 Starting new Deliver handler" -"2019-05-02 01:31:34.788 UTC [common.deliver] Handle -> DEBU 1373 Starting new deliver loop for 192.168.240.9:47514" -"2019-05-02 01:31:34.788 UTC [common.deliver] Handle -> DEBU 1374 Attempting to read seek info message from 192.168.240.9:47514" -"2019-05-02 01:31:34.835 UTC [orderer.common.server] Broadcast -> DEBU 1375 Starting new Broadcast handler" -"2019-05-02 01:31:34.835 UTC [orderer.common.broadcast] Handle -> DEBU 1376 Starting new broadcast loop for 192.168.240.9:47516" -"2019-05-02 01:31:34.840 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1377 [channel: businesschannel] Broadcast is processing config update message from 192.168.240.9:47516" -"2019-05-02 01:31:34.840 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1378 Processing config update message for channel businesschannel" -"2019-05-02 01:31:34.841 UTC [policies] Evaluate -> DEBU 1379 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:31:34.841 UTC [policies] Evaluate -> DEBU 137a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:34.842 UTC [policies] Evaluate -> DEBU 137b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:34.842 UTC [policies] Evaluate -> DEBU 137c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:34.842 UTC [policies] Evaluate -> DEBU 137d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:31:34.843 UTC [cauthdsl] func1 -> DEBU 137e 0xc001162ef0 gate 1556760694843271700 evaluation starts" -"2019-05-02 01:31:34.843 UTC [cauthdsl] func2 -> DEBU 137f 0xc001162ef0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:34.844 UTC [cauthdsl] func2 -> DEBU 1380 0xc001162ef0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:34.844 UTC [cauthdsl] func2 -> DEBU 1381 0xc001162ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:34.845 UTC [cauthdsl] func2 -> DEBU 1382 0xc001162ef0 principal evaluation fails" -"2019-05-02 01:31:34.845 UTC [cauthdsl] func1 -> DEBU 1383 0xc001162ef0 gate 1556760694843271700 evaluation fails" -"2019-05-02 01:31:34.846 UTC [policies] Evaluate -> DEBU 1384 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:34.846 UTC [policies] Evaluate -> DEBU 1385 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:34.847 UTC [policies] Evaluate -> DEBU 1386 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:34.847 UTC [cauthdsl] func1 -> DEBU 1387 0xc001163730 gate 1556760694847357900 evaluation starts" -"2019-05-02 01:31:34.847 UTC [cauthdsl] func2 -> DEBU 1388 0xc001163730 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:34.848 UTC [cauthdsl] func2 -> DEBU 1389 0xc001163730 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:34.848 UTC [cauthdsl] func2 -> DEBU 138a 0xc001163730 principal matched by identity 0" -"2019-05-02 01:31:34.849 UTC [msp.identity] Verify -> DEBU 138b Verify: digest = 00000000 24 a2 49 e2 af 42 b6 b0 2c 67 6f 9e f3 88 79 62 |$.I..B..,go...yb| -00000010 b2 2f de 6a 19 21 28 4d 88 da c6 8b 5c 56 b1 45 |./.j.!(M....\V.E|" -"2019-05-02 01:31:34.849 UTC [msp.identity] Verify -> DEBU 138c Verify: sig = 00000000 30 45 02 21 00 c2 17 1f ab 59 23 92 23 f4 f3 15 |0E.!.....Y#.#...| -00000010 11 5c 2c f5 ad 62 eb d5 0b ce ad 52 6e 6e d2 c3 |.\,..b.....Rnn..| -00000020 44 3d 53 7a 2c 02 20 3f 12 d2 69 c7 98 cc a4 bb |D=Sz,. ?..i.....| -00000030 3f 4c 78 f2 9c a6 64 4f 94 d4 b4 ef 61 21 38 69 |?Lx...dO....a!8i| -00000040 8f 4f 6e e2 4f 94 d1 |.On.O..|" -"2019-05-02 01:31:34.850 UTC [cauthdsl] func2 -> DEBU 138d 0xc001163730 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:34.850 UTC [cauthdsl] func1 -> DEBU 138e 0xc001163730 gate 1556760694847357900 evaluation succeeds" -"2019-05-02 01:31:34.851 UTC [policies] Evaluate -> DEBU 138f Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:34.851 UTC [policies] Evaluate -> DEBU 1390 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:34.851 UTC [policies] Evaluate -> DEBU 1391 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:34.852 UTC [policies] Evaluate -> DEBU 1392 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:34.852 UTC [policies] Evaluate -> DEBU 1393 Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:31:34.852 UTC [policies] Evaluate -> DEBU 1394 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:31:34.853 UTC [common.configtx] addToMap -> DEBU 1395 Adding to config map: [Group] /Channel" -"2019-05-02 01:31:34.853 UTC [common.configtx] addToMap -> DEBU 1396 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:31:34.853 UTC [common.configtx] addToMap -> DEBU 1397 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:31:34.854 UTC [common.configtx] addToMap -> DEBU 1398 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:31:34.854 UTC [common.configtx] addToMap -> DEBU 1399 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:31:34.854 UTC [common.configtx] addToMap -> DEBU 139a Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:31:34.854 UTC [common.configtx] addToMap -> DEBU 139b Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:31:34.855 UTC [common.configtx] addToMap -> DEBU 139c Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:31:34.855 UTC [common.configtx] addToMap -> DEBU 139d Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:31:34.856 UTC [common.configtx] addToMap -> DEBU 139e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:34.856 UTC [common.configtx] addToMap -> DEBU 139f Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:31:34.856 UTC [common.configtx] addToMap -> DEBU 13a0 Adding to config map: [Group] /Channel" -"2019-05-02 01:31:34.857 UTC [common.configtx] addToMap -> DEBU 13a1 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:31:34.857 UTC [common.configtx] addToMap -> DEBU 13a2 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:31:34.857 UTC [common.configtx] addToMap -> DEBU 13a3 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:31:34.858 UTC [common.configtx] addToMap -> DEBU 13a4 Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-05-02 01:31:34.858 UTC [common.configtx] addToMap -> DEBU 13a5 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-05-02 01:31:34.858 UTC [common.configtx] addToMap -> DEBU 13a6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13a7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13a8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13a9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13aa Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13ab Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13ac Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:34.859 UTC [common.configtx] addToMap -> DEBU 13ad Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:31:34.860 UTC [common.configtx] addToMap -> DEBU 13ae Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:31:34.860 UTC [common.configtx] addToMap -> DEBU 13af Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:31:34.860 UTC [common.configtx] addToMap -> DEBU 13b0 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:31:34.860 UTC [common.configtx] verifyDeltaSet -> DEBU 13b1 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-05-02 01:31:34.861 UTC [common.configtx] verifyDeltaSet -> DEBU 13b2 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-05-02 01:31:34.861 UTC [common.configtx] verifyDeltaSet -> DEBU 13b3 Processing change to key: [Group] /Channel/Application/Org3MSP" -"2019-05-02 01:31:34.861 UTC [common.configtx] verifyDeltaSet -> DEBU 13b4 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:34.861 UTC [common.configtx] verifyDeltaSet -> DEBU 13b5 Processing change to key: [Group] /Channel/Application" -"2019-05-02 01:31:34.862 UTC [common.configtx] policyForItem -> DEBU 13b6 Getting policy for item Application with mod_policy Admins" -"2019-05-02 01:31:34.862 UTC [policies] Manager -> DEBU 13b7 Manager Channel looking up path []" -"2019-05-02 01:31:34.862 UTC [policies] Manager -> DEBU 13b8 Manager Channel has managers Orderer" -"2019-05-02 01:31:34.862 UTC [policies] Manager -> DEBU 13b9 Manager Channel has managers Application" -"2019-05-02 01:31:34.863 UTC [policies] Manager -> DEBU 13ba Manager Channel looking up path [Application]" -"2019-05-02 01:31:34.863 UTC [policies] Manager -> DEBU 13bb Manager Channel has managers Orderer" -"2019-05-02 01:31:34.863 UTC [policies] Manager -> DEBU 13bc Manager Channel has managers Application" -"2019-05-02 01:31:34.864 UTC [policies] Manager -> DEBU 13bd Manager Channel/Application looking up path []" -"2019-05-02 01:31:34.864 UTC [policies] Manager -> DEBU 13be Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:31:34.864 UTC [policies] Manager -> DEBU 13bf Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:31:34.865 UTC [policies] Evaluate -> DEBU 13c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -"2019-05-02 01:31:34.865 UTC [policies] Evaluate -> DEBU 13c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:34.865 UTC [policies] Evaluate -> DEBU 13c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-05-02 01:31:34.865 UTC [cauthdsl] deduplicate -> WARN 13c3 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-05-02 01:31:34.866 UTC [cauthdsl] func1 -> DEBU 13c4 0xc0009443c0 gate 1556760694866009000 evaluation starts" -"2019-05-02 01:31:34.866 UTC [cauthdsl] func2 -> DEBU 13c5 0xc0009443c0 signed by 0 principal evaluation starts (used [false false false])" -"2019-05-02 01:31:34.866 UTC [cauthdsl] func2 -> DEBU 13c6 0xc0009443c0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:34.867 UTC [cauthdsl] func2 -> DEBU 13c7 0xc0009443c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:34.867 UTC [cauthdsl] func2 -> DEBU 13c8 0xc0009443c0 processing identity 1 with bytes of efef60" -"2019-05-02 01:31:34.867 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13c9 Checking if identity satisfies ADMIN role for Org2MSP" -"2019-05-02 01:31:34.867 UTC [cauthdsl] func2 -> DEBU 13ca 0xc0009443c0 principal matched by identity 1" -"2019-05-02 01:31:34.867 UTC [msp.identity] Verify -> DEBU 13cb Verify: digest = 00000000 0a 93 54 f3 ca 50 66 cd 2e b2 91 c4 a1 99 4b fe |..T..Pf.......K.| -00000010 78 04 08 22 86 5c 95 44 eb 44 40 b9 7f 21 df a9 |x..".\.D.D@..!..|" -"2019-05-02 01:31:34.868 UTC [msp.identity] Verify -> DEBU 13cc Verify: sig = 00000000 30 44 02 20 73 e6 28 8c bd 51 8c f6 e4 26 ca 3c |0D. s.(..Q...&.<| -00000010 a7 51 9f 0f f8 98 78 97 9a 0a 5b de 1d 2f 26 8a |.Q....x...[../&.| -00000020 4a bd b1 0a 02 20 7d 21 70 08 83 04 6d 41 e4 2d |J.... }!p...mA.-| -00000030 97 f9 e7 46 95 6f 32 34 86 6a f5 6d 90 57 38 e1 |...F.o24.j.m.W8.| -00000040 82 3f 3a 29 69 89 |.?:)i.|" -"2019-05-02 01:31:34.868 UTC [cauthdsl] func2 -> DEBU 13cd 0xc0009443c0 principal evaluation succeeds for identity 1" -"2019-05-02 01:31:34.868 UTC [cauthdsl] func1 -> DEBU 13ce 0xc0009443c0 gate 1556760694866009000 evaluation succeeds" -"2019-05-02 01:31:34.868 UTC [policies] Evaluate -> DEBU 13cf Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:31:34.869 UTC [policies] Evaluate -> DEBU 13d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:31:34.869 UTC [policies] Evaluate -> DEBU 13d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-05-02 01:31:34.869 UTC [cauthdsl] deduplicate -> WARN 13d2 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-05-02 01:31:34.869 UTC [cauthdsl] func1 -> DEBU 13d3 0xc000944ab0 gate 1556760694869603200 evaluation starts" -"2019-05-02 01:31:34.869 UTC [cauthdsl] func2 -> DEBU 13d4 0xc000944ab0 signed by 0 principal evaluation starts (used [false false false])" -"2019-05-02 01:31:34.869 UTC [cauthdsl] func2 -> DEBU 13d5 0xc000944ab0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:34.870 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13d6 Checking if identity satisfies ADMIN role for Org1MSP" -"2019-05-02 01:31:34.870 UTC [cauthdsl] func2 -> DEBU 13d7 0xc000944ab0 principal matched by identity 0" -"2019-05-02 01:31:34.870 UTC [msp.identity] Verify -> DEBU 13d8 Verify: digest = 00000000 96 5b d6 35 6e 24 ba 8d ea c0 f3 54 be 64 a0 8e |.[.5n$.....T.d..| -00000010 d7 2c 6e 83 3b c0 ba 63 fa 91 e5 8e d7 f6 d2 45 |.,n.;..c.......E|" -"2019-05-02 01:31:34.870 UTC [msp.identity] Verify -> DEBU 13d9 Verify: sig = 00000000 30 44 02 20 06 17 d3 85 97 6c 5b f8 2b ee 4f 8b |0D. .....l[.+.O.| -00000010 ef 9b 4d fa 3e e1 e8 50 ac 6a 0b 7c dd d7 cd af |..M.>..P.j.|....| -00000020 ef 6f e1 14 02 20 7a 9c e6 c9 a1 11 d2 73 46 49 |.o... z......sFI| -00000030 45 b3 5c 7b 74 db 4e 00 94 b3 b0 43 5c b9 74 72 |E.\{t.N....C\.tr| -00000040 0b fb bb cd 10 b7 |......|" -"2019-05-02 01:31:34.870 UTC [cauthdsl] func2 -> DEBU 13da 0xc000944ab0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:34.871 UTC [cauthdsl] func1 -> DEBU 13db 0xc000944ab0 gate 1556760694869603200 evaluation succeeds" -"2019-05-02 01:31:34.871 UTC [policies] Evaluate -> DEBU 13dc Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:31:34.871 UTC [policies] Evaluate -> DEBU 13dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:31:34.871 UTC [policies] Evaluate -> DEBU 13de Signature set satisfies policy /Channel/Application/Admins" -"2019-05-02 01:31:34.871 UTC [policies] Evaluate -> DEBU 13df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -"2019-05-02 01:31:34.872 UTC [common.configtx] verifyDeltaSet -> DEBU 13e0 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -"2019-05-02 01:31:34.872 UTC [common.configtx] verifyDeltaSet -> DEBU 13e1 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-05-02 01:31:34.872 UTC [common.configtx] recurseConfigMap -> DEBU 13e2 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.872 UTC [common.configtx] recurseConfigMap -> DEBU 13e3 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.873 UTC [common.configtx] recurseConfigMap -> DEBU 13e4 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.873 UTC [common.configtx] recurseConfigMap -> DEBU 13e5 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.873 UTC [common.configtx] recurseConfigMap -> DEBU 13e6 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.873 UTC [common.configtx] recurseConfigMap -> DEBU 13e7 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.873 UTC [common.configtx] recurseConfigMap -> DEBU 13e8 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.874 UTC [common.configtx] recurseConfigMap -> DEBU 13e9 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.874 UTC [common.configtx] recurseConfigMap -> DEBU 13ea Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.874 UTC [common.configtx] recurseConfigMap -> DEBU 13eb Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.874 UTC [common.configtx] recurseConfigMap -> DEBU 13ec Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.875 UTC [common.configtx] recurseConfigMap -> DEBU 13ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.875 UTC [common.configtx] recurseConfigMap -> DEBU 13ee Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.875 UTC [common.configtx] recurseConfigMap -> DEBU 13ef Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.875 UTC [common.configtx] recurseConfigMap -> DEBU 13f0 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.875 UTC [common.configtx] recurseConfigMap -> DEBU 13f1 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.876 UTC [common.configtx] recurseConfigMap -> DEBU 13f2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.876 UTC [common.configtx] recurseConfigMap -> DEBU 13f3 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.877 UTC [common.configtx] recurseConfigMap -> DEBU 13f4 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.877 UTC [common.configtx] recurseConfigMap -> DEBU 13f5 Setting policy for key LifecycleEndorsement to " -"2019-05-02 01:31:34.877 UTC [common.configtx] recurseConfigMap -> DEBU 13f6 Setting policy for key Readers to " -"2019-05-02 01:31:34.877 UTC [common.configtx] recurseConfigMap -> DEBU 13f7 Setting policy for key Writers to " -"2019-05-02 01:31:34.878 UTC [common.configtx] recurseConfigMap -> DEBU 13f8 Setting policy for key Admins to " -"2019-05-02 01:31:34.878 UTC [common.configtx] recurseConfigMap -> DEBU 13f9 Setting policy for key Endorsement to " -"2019-05-02 01:31:34.878 UTC [common.configtx] recurseConfigMap -> DEBU 13fa Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.878 UTC [common.configtx] recurseConfigMap -> DEBU 13fb Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.878 UTC [common.configtx] recurseConfigMap -> DEBU 13fc Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:34.878 UTC [common.channelconfig] NewStandardValues -> DEBU 13fd Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:31:34.878 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fe Processing field: HashingAlgorithm" -"2019-05-02 01:31:34.878 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13ff Processing field: BlockDataHashingStructure" -"2019-05-02 01:31:34.879 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1400 Processing field: OrdererAddresses" -"2019-05-02 01:31:34.879 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1401 Processing field: Consortium" -"2019-05-02 01:31:34.879 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1402 Processing field: Capabilities" -"2019-05-02 01:31:34.879 UTC [common.channelconfig] NewStandardValues -> DEBU 1403 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:31:34.879 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1404 Processing field: ConsensusType" -"2019-05-02 01:31:34.879 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1405 Processing field: BatchSize" -"2019-05-02 01:31:34.880 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1406 Processing field: BatchTimeout" -"2019-05-02 01:31:34.880 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1407 Processing field: KafkaBrokers" -"2019-05-02 01:31:34.880 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1408 Processing field: ChannelRestrictions" -"2019-05-02 01:31:34.880 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1409 Processing field: Capabilities" -"2019-05-02 01:31:34.880 UTC [common.channelconfig] NewStandardValues -> DEBU 140a Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:31:34.880 UTC [common.channelconfig] initializeProtosStruct -> DEBU 140b Processing field: Endpoints" -"2019-05-02 01:31:34.881 UTC [common.channelconfig] NewStandardValues -> DEBU 140c Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:34.881 UTC [common.channelconfig] initializeProtosStruct -> DEBU 140d Processing field: MSP" -"2019-05-02 01:31:34.881 UTC [common.channelconfig] validateMSP -> DEBU 140e Setting up MSP for org OrdererOrg" -"2019-05-02 01:31:34.881 UTC [msp] newBccspMsp -> DEBU 140f Creating BCCSP-based MSP instance" -"2019-05-02 01:31:34.881 UTC [msp] New -> DEBU 1410 Creating Cache-MSP instance" -"2019-05-02 01:31:34.881 UTC [msp] Setup -> DEBU 1411 Setting up MSP instance OrdererMSP" -"2019-05-02 01:31:34.882 UTC [msp.identity] newIdentity -> DEBU 1412 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-05-02 01:31:34.882 UTC [msp.identity] newIdentity -> DEBU 1413 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-05-02 01:31:34.884 UTC [msp] Validate -> DEBU 1414 MSP OrdererMSP validating identity" -"2019-05-02 01:31:34.884 UTC [common.channelconfig] NewStandardValues -> DEBU 1415 Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:31:34.884 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1416 Processing field: ACLs" -"2019-05-02 01:31:34.884 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1417 Processing field: Capabilities" -"2019-05-02 01:31:34.885 UTC [common.channelconfig] NewStandardValues -> DEBU 1418 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:31:34.885 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1419 Processing field: AnchorPeers" -"2019-05-02 01:31:34.885 UTC [common.channelconfig] NewStandardValues -> DEBU 141a Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:34.885 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141b Processing field: MSP" -"2019-05-02 01:31:34.885 UTC [common.channelconfig] Validate -> DEBU 141c Anchor peers for org Org1MSP are anchor_peers: " -"2019-05-02 01:31:34.886 UTC [common.channelconfig] validateMSP -> DEBU 141d Setting up MSP for org Org1MSP" -"2019-05-02 01:31:34.886 UTC [msp] newBccspMsp -> DEBU 141e Creating BCCSP-based MSP instance" -"2019-05-02 01:31:34.886 UTC [msp] New -> DEBU 141f Creating Cache-MSP instance" -"2019-05-02 01:31:34.886 UTC [msp] Setup -> DEBU 1420 Setting up MSP instance Org1MSP" -"2019-05-02 01:31:34.891 UTC [msp.identity] newIdentity -> DEBU 1421 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-05-02 01:31:34.895 UTC [msp.identity] newIdentity -> DEBU 1422 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-05-02 01:31:34.895 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1423 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:31:34.895 UTC [msp] Validate -> DEBU 1424 MSP Org1MSP validating identity" -"2019-05-02 01:31:34.895 UTC [msp] getCertificationChain -> DEBU 1425 MSP Org1MSP getting certification chain" -"2019-05-02 01:31:34.895 UTC [msp] hasOURole -> DEBU 1426 MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:31:34.896 UTC [msp] getCertificationChain -> DEBU 1427 MSP Org1MSP getting certification chain" -"2019-05-02 01:31:34.896 UTC [common.channelconfig] NewStandardValues -> DEBU 1428 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:31:34.896 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1429 Processing field: AnchorPeers" -"2019-05-02 01:31:34.896 UTC [common.channelconfig] NewStandardValues -> DEBU 142a Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:34.896 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142b Processing field: MSP" -"2019-05-02 01:31:34.896 UTC [common.channelconfig] Validate -> DEBU 142c Anchor peers for org Org2MSP are anchor_peers: " -"2019-05-02 01:31:34.896 UTC [common.channelconfig] validateMSP -> DEBU 142d Setting up MSP for org Org2MSP" -"2019-05-02 01:31:34.896 UTC [msp] newBccspMsp -> DEBU 142e Creating BCCSP-based MSP instance" -"2019-05-02 01:31:34.896 UTC [msp] New -> DEBU 142f Creating Cache-MSP instance" -"2019-05-02 01:31:34.896 UTC [msp] Setup -> DEBU 1430 Setting up MSP instance Org2MSP" -"2019-05-02 01:31:34.896 UTC [msp.identity] newIdentity -> DEBU 1431 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:55.317 UTC [cauthdsl] func1 -> DEBU 123c 0xc00105e8a0 gate 1556789275317530800 evaluation starts" +"2019-05-02 09:27:55.317 UTC [cauthdsl] func2 -> DEBU 123d 0xc00105e8a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:55.318 UTC [cauthdsl] func2 -> DEBU 123e 0xc00105e8a0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:55.319 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 123f Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-05-02 09:27:55.319 UTC [msp] Validate -> DEBU 1240 MSP OrdererMSP validating identity" +"2019-05-02 09:27:55.320 UTC [cauthdsl] func2 -> DEBU 1241 0xc00105e8a0 principal matched by identity 0" +"2019-05-02 09:27:55.321 UTC [msp.identity] Verify -> DEBU 1242 Verify: digest = 00000000 18 93 3a f3 8f 51 4c 97 83 64 25 4a 0f 9d 16 75 |..:..QL..d%J...u| +00000010 06 bd 69 8c fa 3b 9a ab aa 6b 17 3d f2 6b a8 e7 |..i..;...k.=.k..|" +"2019-05-02 09:27:55.321 UTC [msp.identity] Verify -> DEBU 1243 Verify: sig = 00000000 30 44 02 20 78 46 3b a9 fa 0a d8 f0 11 ff e2 0b |0D. xF;.........| +00000010 71 dd 3e ff 70 97 a3 aa 7a 0c 5d 32 3c 22 db c2 |q.>.p...z.]2<"..| +00000020 9b 03 8e b3 02 20 27 95 5c 39 bc af 69 cb 45 11 |..... '.\9..i.E.| +00000030 ff 6e d7 40 9d 7f 34 e9 d4 de 10 3a 86 b9 b1 4d |.n.@..4....:...M| +00000040 3c 9d e4 3c 0c 6c |<..<.l|" +"2019-05-02 09:27:55.322 UTC [cauthdsl] func2 -> DEBU 1244 0xc00105e8a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:55.322 UTC [cauthdsl] func1 -> DEBU 1245 0xc00105e8a0 gate 1556789275317530800 evaluation succeeds" +"2019-05-02 09:27:55.323 UTC [policies] Evaluate -> DEBU 1246 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.323 UTC [policies] Evaluate -> DEBU 1247 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.324 UTC [policies] Evaluate -> DEBU 1248 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.324 UTC [policies] Evaluate -> DEBU 1249 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.325 UTC [policies] Evaluate -> DEBU 124a Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:55.325 UTC [policies] Evaluate -> DEBU 124b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:55.326 UTC [common.deliver] deliverBlocks -> DEBU 124c [channel: testchainid] Received seekInfo (0xc001191300) start: > stop: > from 172.18.0.8:57374" +"2019-05-02 09:27:55.327 UTC [fsblkstorage] Next -> DEBU 124d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-05-02 09:27:55.327 UTC [fsblkstorage] newBlockfileStream -> DEBU 124e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-05-02 09:27:55.327 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 124f Remaining bytes=[25826], Going to peek [8] bytes" +"2019-05-02 09:27:55.327 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1250 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-05-02 09:27:55.328 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1251 blockbytes [25823] read from file [0]" +"2019-05-02 09:27:55.328 UTC [common.deliver] deliverBlocks -> DEBU 1252 [channel: testchainid] Delivering block [1] for (0xc001191300) for 172.18.0.8:57374" +"2019-05-02 09:27:55.329 UTC [common.deliver] deliverBlocks -> DEBU 1253 [channel: testchainid] Done delivering to 172.18.0.8:57374 for (0xc001191300)" +"2019-05-02 09:27:55.330 UTC [common.deliver] Handle -> DEBU 1254 Waiting for new SeekInfo from 172.18.0.8:57374" +"2019-05-02 09:27:55.330 UTC [common.deliver] Handle -> DEBU 1255 Attempting to read seek info message from 172.18.0.8:57374" +"2019-05-02 09:27:55.336 UTC [grpc] infof -> DEBU 1256 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:55.337 UTC [common.deliver] Handle -> WARN 1257 Error reading from 172.18.0.8:57374: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:55.339 UTC [orderer.common.server] func1 -> DEBU 1258 Closing Deliver stream" +"2019-05-02 09:27:55.339 UTC [comm.grpc.server] 1 -> INFO 1259 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57374 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.0399ms +"2019-05-02 09:27:55.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 125a Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs" +"2019-05-02 09:27:55.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 125b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.3µs " +"2019-05-02 09:27:55.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 125c Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +"2019-05-02 09:27:55.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 125d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2124ms " +"2019-05-02 09:27:55.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:55.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:55.540 UTC [orderer.common.server] Deliver -> DEBU 1260 Starting new Deliver handler" +"2019-05-02 09:27:55.541 UTC [common.deliver] Handle -> DEBU 1261 Starting new deliver loop for 172.18.0.8:57376" +"2019-05-02 09:27:55.542 UTC [common.deliver] Handle -> DEBU 1262 Attempting to read seek info message from 172.18.0.8:57376" +"2019-05-02 09:27:55.544 UTC [policies] Evaluate -> DEBU 1263 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:55.544 UTC [policies] Evaluate -> DEBU 1264 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.544 UTC [policies] Evaluate -> DEBU 1265 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:55.545 UTC [policies] Evaluate -> DEBU 1266 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.545 UTC [policies] Evaluate -> DEBU 1267 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:55.545 UTC [cauthdsl] func1 -> DEBU 1268 0xc000889fe0 gate 1556789275545604100 evaluation starts" +"2019-05-02 09:27:55.545 UTC [cauthdsl] func2 -> DEBU 1269 0xc000889fe0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:55.546 UTC [cauthdsl] func2 -> DEBU 126a 0xc000889fe0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:55.546 UTC [cauthdsl] func2 -> DEBU 126b 0xc000889fe0 principal matched by identity 0" +"2019-05-02 09:27:55.546 UTC [msp.identity] Verify -> DEBU 126c Verify: digest = 00000000 a0 af 2e 60 21 b7 2c f5 ab 6b 2a ee 36 6d 79 28 |...`!.,..k*.6my(| +00000010 ea 79 cc af 36 3f 28 0c df 01 1c b4 4e 9a 79 1b |.y..6?(.....N.y.|" +"2019-05-02 09:27:55.546 UTC [msp.identity] Verify -> DEBU 126d Verify: sig = 00000000 30 44 02 20 08 92 4a 66 a0 24 ef 6a 54 42 f3 55 |0D. ..Jf.$.jTB.U| +00000010 71 8d 3e 52 25 6e 65 12 04 93 98 10 30 38 11 fa |q.>R%ne.....08..| +00000020 be 20 8b ab 02 20 0b d8 24 00 d5 44 3f f1 dc be |. ... ..$..D?...| +00000030 ed 70 bc 36 c2 bb 4a d9 a7 57 6a 30 33 9d 00 60 |.p.6..J..Wj03..`| +00000040 70 b2 44 d9 06 3a |p.D..:|" +"2019-05-02 09:27:55.546 UTC [cauthdsl] func2 -> DEBU 126e 0xc000889fe0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:55.547 UTC [cauthdsl] func1 -> DEBU 126f 0xc000889fe0 gate 1556789275545604100 evaluation succeeds" +"2019-05-02 09:27:55.547 UTC [policies] Evaluate -> DEBU 1270 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1271 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1272 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1273 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1274 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:55.548 UTC [policies] Evaluate -> DEBU 1275 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:55.548 UTC [common.deliver] deliverBlocks -> DEBU 1276 [channel: testchainid] Received seekInfo (0xc001191cc0) start: > stop: > from 172.18.0.8:57376" +"2019-05-02 09:27:55.549 UTC [fsblkstorage] Next -> DEBU 1277 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-05-02 09:27:55.549 UTC [fsblkstorage] newBlockfileStream -> DEBU 1278 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-05-02 09:27:55.549 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1279 Remaining bytes=[25826], Going to peek [8] bytes" +"2019-05-02 09:27:55.550 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 127a Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-05-02 09:27:55.550 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 127b blockbytes [25823] read from file [0]" +"2019-05-02 09:27:55.550 UTC [common.deliver] deliverBlocks -> DEBU 127c [channel: testchainid] Delivering block [1] for (0xc001191cc0) for 172.18.0.8:57376" +"2019-05-02 09:27:55.550 UTC [common.deliver] deliverBlocks -> DEBU 127d [channel: testchainid] Done delivering to 172.18.0.8:57376 for (0xc001191cc0)" +"2019-05-02 09:27:55.551 UTC [common.deliver] Handle -> DEBU 127e Waiting for new SeekInfo from 172.18.0.8:57376" +"2019-05-02 09:27:55.551 UTC [common.deliver] Handle -> DEBU 127f Attempting to read seek info message from 172.18.0.8:57376" +"2019-05-02 09:27:55.555 UTC [policies] Evaluate -> DEBU 1280 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:55.555 UTC [policies] Evaluate -> DEBU 1281 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.556 UTC [policies] Evaluate -> DEBU 1282 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:55.556 UTC [policies] Evaluate -> DEBU 1283 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.556 UTC [policies] Evaluate -> DEBU 1284 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:55.557 UTC [cauthdsl] func1 -> DEBU 1285 0xc0010794b0 gate 1556789275557087800 evaluation starts" +"2019-05-02 09:27:55.558 UTC [cauthdsl] func2 -> DEBU 1286 0xc0010794b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:55.558 UTC [cauthdsl] func2 -> DEBU 1287 0xc0010794b0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:55.558 UTC [cauthdsl] func2 -> DEBU 1288 0xc0010794b0 principal matched by identity 0" +"2019-05-02 09:27:55.559 UTC [msp.identity] Verify -> DEBU 1289 Verify: digest = 00000000 bd a8 93 90 1e c8 e2 03 73 08 f8 f9 a5 26 e6 74 |........s....&.t| +00000010 9e bb a8 9d 61 dc 00 cc 8f f7 d9 fe 93 30 e9 10 |....a........0..|" +"2019-05-02 09:27:55.559 UTC [msp.identity] Verify -> DEBU 128a Verify: sig = 00000000 30 45 02 21 00 82 16 17 fe f9 8e b4 3b dc 79 32 |0E.!........;.y2| +00000010 55 12 fb a2 4e 83 d3 43 28 c3 52 52 4f d0 84 26 |U...N..C(.RRO..&| +00000020 26 55 3f c5 6c 02 20 3f 88 34 6a ca ec 6f db 6e |&U?.l. ?.4j..o.n| +00000030 19 bc 01 d4 aa e9 bb da 42 ea aa 5a 4b 22 88 e9 |........B..ZK"..| +00000040 d7 ab b5 44 13 9d 3c |...D..<|" +"2019-05-02 09:27:55.560 UTC [cauthdsl] func2 -> DEBU 128b 0xc0010794b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:55.561 UTC [cauthdsl] func1 -> DEBU 128c 0xc0010794b0 gate 1556789275557087800 evaluation succeeds" +"2019-05-02 09:27:55.561 UTC [policies] Evaluate -> DEBU 128d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.562 UTC [policies] Evaluate -> DEBU 128e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.563 UTC [policies] Evaluate -> DEBU 128f Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.564 UTC [policies] Evaluate -> DEBU 1290 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.564 UTC [policies] Evaluate -> DEBU 1291 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:55.565 UTC [policies] Evaluate -> DEBU 1292 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:55.566 UTC [common.deliver] deliverBlocks -> DEBU 1293 [channel: testchainid] Received seekInfo (0xc001056240) start: > stop: > from 172.18.0.8:57376" +"2019-05-02 09:27:55.567 UTC [fsblkstorage] Next -> DEBU 1294 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-05-02 09:27:55.567 UTC [fsblkstorage] newBlockfileStream -> DEBU 1295 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:55.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1296 Remaining bytes=[44241], Going to peek [8] bytes" +"2019-05-02 09:27:55.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1297 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:55.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1298 blockbytes [18412] read from file [0]" +"2019-05-02 09:27:55.569 UTC [common.deliver] deliverBlocks -> DEBU 1299 [channel: testchainid] Delivering block [0] for (0xc001056240) for 172.18.0.8:57376" +"2019-05-02 09:27:55.569 UTC [common.deliver] deliverBlocks -> DEBU 129a [channel: testchainid] Done delivering to 172.18.0.8:57376 for (0xc001056240)" +"2019-05-02 09:27:55.570 UTC [common.deliver] Handle -> DEBU 129b Waiting for new SeekInfo from 172.18.0.8:57376" +"2019-05-02 09:27:55.570 UTC [common.deliver] Handle -> DEBU 129c Attempting to read seek info message from 172.18.0.8:57376" +"2019-05-02 09:27:55.579 UTC [common.deliver] Handle -> WARN 129d Error reading from 172.18.0.8:57376: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:55.580 UTC [orderer.common.server] func1 -> DEBU 129e Closing Deliver stream" +"2019-05-02 09:27:55.580 UTC [comm.grpc.server] 1 -> INFO 129f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57376 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.7269ms +"2019-05-02 09:27:55.580 UTC [grpc] infof -> DEBU 12a0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:55.687 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:55.688 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a2 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" +"2019-05-02 09:27:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 485.3µs " +"2019-05-02 09:27:55.728 UTC [orderer.common.server] Deliver -> DEBU 12a4 Starting new Deliver handler" +"2019-05-02 09:27:55.728 UTC [common.deliver] Handle -> DEBU 12a5 Starting new deliver loop for 172.18.0.8:57378" +"2019-05-02 09:27:55.728 UTC [common.deliver] Handle -> DEBU 12a6 Attempting to read seek info message from 172.18.0.8:57378" +"2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.729 UTC [policies] Evaluate -> DEBU 12ab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:55.729 UTC [cauthdsl] func1 -> DEBU 12ac 0xc00091eb70 gate 1556789275729816600 evaluation starts" +"2019-05-02 09:27:55.730 UTC [cauthdsl] func2 -> DEBU 12ad 0xc00091eb70 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:55.730 UTC [cauthdsl] func2 -> DEBU 12ae 0xc00091eb70 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:55.730 UTC [cauthdsl] func2 -> DEBU 12af 0xc00091eb70 principal matched by identity 0" +"2019-05-02 09:27:55.730 UTC [msp.identity] Verify -> DEBU 12b0 Verify: digest = 00000000 59 89 45 0a 74 27 16 b8 95 50 7f 23 45 7e 8b 73 |Y.E.t'...P.#E~.s| +00000010 77 f1 10 45 23 34 42 49 ea f8 f1 0f 18 67 f0 57 |w..E#4BI.....g.W|" +"2019-05-02 09:27:55.730 UTC [msp.identity] Verify -> DEBU 12b1 Verify: sig = 00000000 30 44 02 20 46 81 8b 21 76 d6 1b b5 bb 7a 70 83 |0D. F..!v....zp.| +00000010 52 36 bd 38 52 32 57 4e 88 0a 74 47 a0 0a 61 e6 |R6.8R2WN..tG..a.| +00000020 c3 95 b9 31 02 20 05 d4 65 c5 16 8a 7a 3e 55 8f |...1. ..e...z>U.| +00000030 fd 65 c6 81 bc 79 94 af 7d 6a cb 64 39 0d 4e 54 |.e...y..}j.d9.NT| +00000040 6d 3e 93 3e ab e3 |m>.>..|" +"2019-05-02 09:27:55.731 UTC [cauthdsl] func2 -> DEBU 12b2 0xc00091eb70 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:55.731 UTC [cauthdsl] func1 -> DEBU 12b3 0xc00091eb70 gate 1556789275729816600 evaluation succeeds" +"2019-05-02 09:27:55.731 UTC [policies] Evaluate -> DEBU 12b4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.731 UTC [policies] Evaluate -> DEBU 12b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b6 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b8 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:55.732 UTC [policies] Evaluate -> DEBU 12b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:55.733 UTC [common.deliver] deliverBlocks -> DEBU 12ba [channel: testchainid] Received seekInfo (0xc00102af40) start: > stop: > from 172.18.0.8:57378" +"2019-05-02 09:27:55.735 UTC [fsblkstorage] Next -> DEBU 12bb Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-05-02 09:27:55.735 UTC [fsblkstorage] newBlockfileStream -> DEBU 12bc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-05-02 09:27:55.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12bd Remaining bytes=[44241], Going to peek [8] bytes" +"2019-05-02 09:27:55.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12be Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:27:55.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12bf blockbytes [18412] read from file [0]" +"2019-05-02 09:27:55.736 UTC [common.deliver] deliverBlocks -> DEBU 12c0 [channel: testchainid] Delivering block [0] for (0xc00102af40) for 172.18.0.8:57378" +"2019-05-02 09:27:55.737 UTC [common.deliver] deliverBlocks -> DEBU 12c1 [channel: testchainid] Done delivering to 172.18.0.8:57378 for (0xc00102af40)" +"2019-05-02 09:27:55.737 UTC [common.deliver] Handle -> DEBU 12c2 Waiting for new SeekInfo from 172.18.0.8:57378" +"2019-05-02 09:27:55.738 UTC [common.deliver] Handle -> DEBU 12c3 Attempting to read seek info message from 172.18.0.8:57378" +"2019-05-02 09:27:55.745 UTC [common.deliver] Handle -> WARN 12c4 Error reading from 172.18.0.8:57378: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:55.745 UTC [orderer.common.server] func1 -> DEBU 12c5 Closing Deliver stream" +"2019-05-02 09:27:55.745 UTC [comm.grpc.server] 1 -> INFO 12c6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57378 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.7529ms +"2019-05-02 09:27:55.746 UTC [grpc] infof -> DEBU 12c7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:55.940 UTC [orderer.common.server] Deliver -> DEBU 12c8 Starting new Deliver handler" +"2019-05-02 09:27:55.940 UTC [common.deliver] Handle -> DEBU 12c9 Starting new deliver loop for 172.18.0.8:57380" +"2019-05-02 09:27:55.940 UTC [common.deliver] Handle -> DEBU 12ca Attempting to read seek info message from 172.18.0.8:57380" +"2019-05-02 09:27:55.941 UTC [policies] Evaluate -> DEBU 12cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:27:55.941 UTC [policies] Evaluate -> DEBU 12cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.942 UTC [policies] Evaluate -> DEBU 12cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:27:55.942 UTC [policies] Evaluate -> DEBU 12ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:55.942 UTC [policies] Evaluate -> DEBU 12cf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:27:55.943 UTC [cauthdsl] func1 -> DEBU 12d0 0xc000b87db0 gate 1556789275943020300 evaluation starts" +"2019-05-02 09:27:55.943 UTC [cauthdsl] func2 -> DEBU 12d1 0xc000b87db0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:55.943 UTC [cauthdsl] func2 -> DEBU 12d2 0xc000b87db0 processing identity 0 with bytes of efef60" +"2019-05-02 09:27:55.944 UTC [cauthdsl] func2 -> DEBU 12d3 0xc000b87db0 principal matched by identity 0" +"2019-05-02 09:27:55.945 UTC [msp.identity] Verify -> DEBU 12d4 Verify: digest = 00000000 9e 90 26 06 26 20 25 09 b4 7f 89 a8 15 11 81 39 |..&.& %........9| +00000010 4d d9 b9 8f 11 37 bd 83 ed 6a 90 6d 00 0e ff bf |M....7...j.m....|" +"2019-05-02 09:27:55.945 UTC [msp.identity] Verify -> DEBU 12d5 Verify: sig = 00000000 30 44 02 20 63 51 3b 4a 31 d6 b6 90 85 73 6b 3e |0D. cQ;J1....sk>| +00000010 fe e7 8a 5c 25 ae 26 bb 82 73 79 6e de f8 44 fe |...\%.&..syn..D.| +00000020 ef e8 b5 f3 02 20 13 c1 4a 09 47 d1 bf 05 d4 f4 |..... ..J.G.....| +00000030 60 ce 6d 02 61 05 4c 02 5d 0b 7c 2b 12 f2 e3 d3 |`.m.a.L.].|+....| +00000040 7b 38 20 ef c1 43 |{8 ..C|" +"2019-05-02 09:27:55.946 UTC [cauthdsl] func2 -> DEBU 12d6 0xc000b87db0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:55.946 UTC [cauthdsl] func1 -> DEBU 12d7 0xc000b87db0 gate 1556789275943020300 evaluation succeeds" +"2019-05-02 09:27:55.947 UTC [policies] Evaluate -> DEBU 12d8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.947 UTC [policies] Evaluate -> DEBU 12d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:55.948 UTC [policies] Evaluate -> DEBU 12da Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.949 UTC [policies] Evaluate -> DEBU 12db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:27:55.949 UTC [policies] Evaluate -> DEBU 12dc Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:27:55.949 UTC [policies] Evaluate -> DEBU 12dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:27:55.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12de Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +"2019-05-02 09:27:55.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12df Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +"2019-05-02 09:27:55.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 458.2µs " +"2019-05-02 09:27:55.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.2µs " +"2019-05-02 09:27:55.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:55.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:55.953 UTC [common.deliver] deliverBlocks -> DEBU 12e4 [channel: testchainid] Received seekInfo (0xc001056840) start: > stop: > from 172.18.0.8:57380" +"2019-05-02 09:27:55.955 UTC [fsblkstorage] Next -> DEBU 12e5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-05-02 09:27:55.955 UTC [fsblkstorage] newBlockfileStream -> DEBU 12e6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-05-02 09:27:55.956 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e7 Remaining bytes=[25826], Going to peek [8] bytes" +"2019-05-02 09:27:55.956 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e8 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-05-02 09:27:55.957 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e9 blockbytes [25823] read from file [0]" +"2019-05-02 09:27:55.957 UTC [common.deliver] deliverBlocks -> DEBU 12ea [channel: testchainid] Delivering block [1] for (0xc001056840) for 172.18.0.8:57380" +"2019-05-02 09:27:55.958 UTC [common.deliver] deliverBlocks -> DEBU 12eb [channel: testchainid] Done delivering to 172.18.0.8:57380 for (0xc001056840)" +"2019-05-02 09:27:55.959 UTC [common.deliver] Handle -> DEBU 12ec Waiting for new SeekInfo from 172.18.0.8:57380" +"2019-05-02 09:27:55.960 UTC [common.deliver] Handle -> DEBU 12ed Attempting to read seek info message from 172.18.0.8:57380" +"2019-05-02 09:27:55.967 UTC [common.deliver] Handle -> WARN 12ee Error reading from 172.18.0.8:57380: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:55.967 UTC [orderer.common.server] func1 -> DEBU 12ef Closing Deliver stream" +"2019-05-02 09:27:55.967 UTC [comm.grpc.server] 1 -> INFO 12f0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57380 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.582ms +"2019-05-02 09:27:55.968 UTC [grpc] infof -> DEBU 12f1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:56.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:56.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f3 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +"2019-05-02 09:27:56.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs " +"2019-05-02 09:27:56.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f5 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +"2019-05-02 09:27:56.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +"2019-05-02 09:27:56.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118.9µs " +"2019-05-02 09:27:56.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.8µs " +"2019-05-02 09:27:56.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:56.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fa Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:56.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:56.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fc Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2019-05-02 09:27:56.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " +"2019-05-02 09:27:56.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fe Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +"2019-05-02 09:27:56.962 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146µs " +"2019-05-02 09:27:56.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1300 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2019-05-02 09:27:56.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1301 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:56.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1302 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5618ms " +"2019-05-02 09:27:56.966 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1303 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:57.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1304 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:57.182 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1305 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-05-02 09:27:57.182 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1306 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.2µs " +"2019-05-02 09:27:57.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1307 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +"2019-05-02 09:27:57.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1308 Sending msg of 28 bytes to 3 on channel businesschannel took 9.9µs" +"2019-05-02 09:27:57.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1309 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.4µs " +"2019-05-02 09:27:57.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.8µs " +"2019-05-02 09:27:57.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:57.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:57.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:57.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130e Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs" +"2019-05-02 09:27:57.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.8µs " +"2019-05-02 09:27:57.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1310 Sending msg of 28 bytes to 2 on channel businesschannel took 88.6µs" +"2019-05-02 09:27:57.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1311 Sending msg of 28 bytes to 3 on channel businesschannel took 123.4µs" +"2019-05-02 09:27:57.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1312 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.4µs " +"2019-05-02 09:27:57.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1313 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.4µs " +"2019-05-02 09:27:57.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1314 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:57.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1315 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:58.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1316 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:58.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1317 Sending msg of 28 bytes to 3 on channel testchainid took 41.8µs" +"2019-05-02 09:27:58.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1318 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.6µs " +"2019-05-02 09:27:58.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1319 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs" +"2019-05-02 09:27:58.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131a Sending msg of 28 bytes to 3 on channel businesschannel took 26.8µs" +"2019-05-02 09:27:58.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.4µs " +"2019-05-02 09:27:58.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.1µs " +"2019-05-02 09:27:58.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:58.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:58.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 131f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:58.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1320 Sending msg of 28 bytes to 3 on channel testchainid took 653.6µs" +"2019-05-02 09:27:58.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 466µs " +"2019-05-02 09:27:58.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1322 Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs" +"2019-05-02 09:27:58.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1323 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +"2019-05-02 09:27:58.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1324 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 635.7µs " +"2019-05-02 09:27:58.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1325 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 238.9µs " +"2019-05-02 09:27:58.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1326 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:58.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1327 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:59.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1328 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:59.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1329 Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +"2019-05-02 09:27:59.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130µs " +"2019-05-02 09:27:59.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132b Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs" +"2019-05-02 09:27:59.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 364.2µs " +"2019-05-02 09:27:59.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.1µs " +"2019-05-02 09:27:59.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:59.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132f Sending msg of 28 bytes to 3 on channel businesschannel took 65.4µs" +"2019-05-02 09:27:59.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1330 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:59.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1331 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:27:59.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1332 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2019-05-02 09:27:59.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1333 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 552.8µs " +"2019-05-02 09:27:59.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1334 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +"2019-05-02 09:27:59.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1335 Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs" +"2019-05-02 09:27:59.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1336 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.2µs " +"2019-05-02 09:27:59.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1337 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " +"2019-05-02 09:27:59.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1338 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:27:59.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1339 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:00.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133a Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:00.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133b Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" +"2019-05-02 09:28:00.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.4µs " +"2019-05-02 09:28:00.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133d Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2019-05-02 09:28:00.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 199.7µs " +"2019-05-02 09:28:00.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:00.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1340 Sending msg of 28 bytes to 3 on channel businesschannel took 2.1559ms" +"2019-05-02 09:28:00.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1341 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 490.8µs " +"2019-05-02 09:28:00.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1342 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:01.609 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1343 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2019-05-02 09:28:01.610 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1344 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2019-05-02 09:28:01.612 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1345 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4561ms " +"2019-05-02 09:28:01.621 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1346 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 7.3567ms " +"2019-05-02 09:28:01.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1347 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:01.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1348 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:01.628 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1349 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2019-05-02 09:28:01.628 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.6µs " +"2019-05-02 09:28:01.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134b Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:01.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:01.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134d Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +"2019-05-02 09:28:01.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +"2019-05-02 09:28:01.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134f Sending msg of 28 bytes to 2 on channel businesschannel took 155.4µs" +"2019-05-02 09:28:01.953 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1350 Sending msg of 28 bytes to 3 on channel businesschannel took 27.9µs" +"2019-05-02 09:28:01.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1351 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.5µs " +"2019-05-02 09:28:01.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1352 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.2µs " +"2019-05-02 09:28:01.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1353 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:01.958 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1354 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:02.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1355 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:02.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1356 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +"2019-05-02 09:28:02.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1357 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.9µs " +"2019-05-02 09:28:02.459 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1358 Sending msg of 28 bytes to 2 on channel businesschannel took 30.5µs" +"2019-05-02 09:28:02.459 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1359 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2019-05-02 09:28:02.460 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.1µs " +"2019-05-02 09:28:02.460 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.1µs " +"2019-05-02 09:28:02.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:02.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:02.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:02.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 135f Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +"2019-05-02 09:28:02.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1360 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.7µs " +"2019-05-02 09:28:02.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1361 Sending msg of 28 bytes to 2 on channel businesschannel took 37.7µs" +"2019-05-02 09:28:02.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1362 Sending msg of 28 bytes to 3 on channel businesschannel took 25.7µs" +"2019-05-02 09:28:02.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1363 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.4µs " +"2019-05-02 09:28:02.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1364 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.2µs " +"2019-05-02 09:28:02.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1365 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:02.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1366 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:03.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1367 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:03.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1368 Sending msg of 28 bytes to 3 on channel testchainid took 20.1µs" +"2019-05-02 09:28:03.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1369 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " +"2019-05-02 09:28:03.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136a Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs" +"2019-05-02 09:28:03.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136b Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +"2019-05-02 09:28:03.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 490.6µs " +"2019-05-02 09:28:03.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 447.8µs " +"2019-05-02 09:28:03.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:03.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:03.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1370 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:03.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1371 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" +"2019-05-02 09:28:03.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1372 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 272.8µs " +"2019-05-02 09:28:03.880 UTC [orderer.common.server] Deliver -> DEBU 1373 Starting new Deliver handler" +"2019-05-02 09:28:03.880 UTC [common.deliver] Handle -> DEBU 1374 Starting new deliver loop for 172.18.0.8:57382" +"2019-05-02 09:28:03.880 UTC [common.deliver] Handle -> DEBU 1375 Attempting to read seek info message from 172.18.0.8:57382" +"2019-05-02 09:28:03.895 UTC [orderer.common.server] Broadcast -> DEBU 1376 Starting new Broadcast handler" +"2019-05-02 09:28:03.895 UTC [orderer.common.broadcast] Handle -> DEBU 1377 Starting new broadcast loop for 172.18.0.8:57384" +"2019-05-02 09:28:03.895 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1378 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.8:57384" +"2019-05-02 09:28:03.895 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1379 Processing config update message for channel businesschannel" +"2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:03.896 UTC [policies] Evaluate -> DEBU 137e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:28:03.896 UTC [cauthdsl] func1 -> DEBU 137f 0xc000380670 gate 1556789283896336900 evaluation starts" +"2019-05-02 09:28:03.896 UTC [cauthdsl] func2 -> DEBU 1380 0xc000380670 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:03.896 UTC [cauthdsl] func2 -> DEBU 1381 0xc000380670 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:03.896 UTC [cauthdsl] func2 -> DEBU 1382 0xc000380670 principal matched by identity 0" +"2019-05-02 09:28:03.897 UTC [msp.identity] Verify -> DEBU 1383 Verify: digest = 00000000 95 cd 8f e5 ed ef 6d d2 0f be f9 0d 55 50 9b 77 |......m.....UP.w| +00000010 1d d8 d3 ab 72 85 c8 22 da d0 40 e6 35 b4 0f 72 |....r.."..@.5..r|" +"2019-05-02 09:28:03.897 UTC [msp.identity] Verify -> DEBU 1384 Verify: sig = 00000000 30 44 02 20 2f ce f2 5a 3e 0c cf 74 8a 09 d9 a0 |0D. /..Z>..t....| +00000010 6b d5 9d b9 da 2b 99 1d f0 fd f8 d0 4c 7e 9d e6 |k....+......L~..| +00000020 20 17 7a 2c 02 20 6e 4a e3 b8 a6 ec bd 29 dc c7 | .z,. nJ.....)..| +00000030 49 c1 7e 43 5c 97 8e 99 e3 05 70 0b c6 9b 95 a3 |I.~C\.....p.....| +00000040 c8 33 4c 0e 94 c6 |.3L...|" +"2019-05-02 09:28:03.897 UTC [cauthdsl] func2 -> DEBU 1385 0xc000380670 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:03.898 UTC [cauthdsl] func1 -> DEBU 1386 0xc000380670 gate 1556789283896336900 evaluation succeeds" +"2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 1387 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 1388 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 1389 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:28:03.899 UTC [policies] Evaluate -> DEBU 138a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:28:03.900 UTC [policies] Evaluate -> DEBU 138b Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:28:03.900 UTC [policies] Evaluate -> DEBU 138c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 138d Adding to config map: [Group] /Channel" +"2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 138e Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 138f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 1390 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 1391 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:28:03.901 UTC [common.configtx] addToMap -> DEBU 1392 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1393 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1394 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1395 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:28:03.902 UTC [common.configtx] addToMap -> DEBU 1396 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:28:03.903 UTC [common.configtx] addToMap -> DEBU 1397 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:28:03.903 UTC [common.configtx] addToMap -> DEBU 1398 Adding to config map: [Group] /Channel" +"2019-05-02 09:28:03.903 UTC [common.configtx] addToMap -> DEBU 1399 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:28:03.904 UTC [common.configtx] addToMap -> DEBU 139a Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:28:03.904 UTC [common.configtx] addToMap -> DEBU 139b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:28:03.904 UTC [common.configtx] addToMap -> DEBU 139c Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-05-02 09:28:03.905 UTC [common.configtx] addToMap -> DEBU 139d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-05-02 09:28:03.905 UTC [common.configtx] addToMap -> DEBU 139e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 139f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 13a0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 13a1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-05-02 09:28:03.906 UTC [common.configtx] addToMap -> DEBU 13a2 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:28:03.907 UTC [common.configtx] addToMap -> DEBU 13a3 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:28:03.907 UTC [common.configtx] addToMap -> DEBU 13a4 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:28:03.907 UTC [common.configtx] addToMap -> DEBU 13a5 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:28:03.908 UTC [common.configtx] addToMap -> DEBU 13a6 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:28:03.908 UTC [common.configtx] addToMap -> DEBU 13a7 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:28:03.909 UTC [common.configtx] addToMap -> DEBU 13a8 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:28:03.909 UTC [common.configtx] verifyDeltaSet -> DEBU 13a9 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-05-02 09:28:03.910 UTC [common.configtx] verifyDeltaSet -> DEBU 13aa Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-05-02 09:28:03.910 UTC [common.configtx] verifyDeltaSet -> DEBU 13ab Processing change to key: [Group] /Channel/Application" +"2019-05-02 09:28:03.910 UTC [common.configtx] policyForItem -> DEBU 13ac Getting policy for item Application with mod_policy Admins" +"2019-05-02 09:28:03.910 UTC [policies] Manager -> DEBU 13ad Manager Channel looking up path []" +"2019-05-02 09:28:03.910 UTC [policies] Manager -> DEBU 13ae Manager Channel has managers Application" +"2019-05-02 09:28:03.910 UTC [policies] Manager -> DEBU 13af Manager Channel has managers Orderer" +"2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b0 Manager Channel looking up path [Application]" +"2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b1 Manager Channel has managers Application" +"2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b2 Manager Channel has managers Orderer" +"2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b3 Manager Channel/Application looking up path []" +"2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b4 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:28:03.911 UTC [policies] Manager -> DEBU 13b5 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:28:03.912 UTC [policies] Evaluate -> DEBU 13b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-05-02 09:28:03.912 UTC [policies] Evaluate -> DEBU 13b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:03.912 UTC [policies] Evaluate -> DEBU 13b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-05-02 09:28:03.912 UTC [cauthdsl] deduplicate -> WARN 13b9 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-05-02 09:28:03.912 UTC [cauthdsl] func1 -> DEBU 13ba 0xc0004038f0 gate 1556789283912816400 evaluation starts" +"2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13bb 0xc0004038f0 signed by 0 principal evaluation starts (used [false false false])" +"2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13bc 0xc0004038f0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13bd 0xc0004038f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-05-02 09:28:03.913 UTC [cauthdsl] func2 -> DEBU 13be 0xc0004038f0 processing identity 1 with bytes of efef60" +"2019-05-02 09:28:03.913 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13bf Checking if identity satisfies ADMIN role for Org2MSP" +"2019-05-02 09:28:03.914 UTC [cauthdsl] func2 -> DEBU 13c0 0xc0004038f0 principal matched by identity 1" +"2019-05-02 09:28:03.914 UTC [msp.identity] Verify -> DEBU 13c1 Verify: digest = 00000000 70 27 54 c7 10 65 06 23 74 50 fc 01 20 7a 9f 22 |p'T..e.#tP.. z."| +00000010 df 75 70 9a b8 8e 15 04 cc 2d a3 ad 5e 15 ee 89 |.up......-..^...|" +"2019-05-02 09:28:03.914 UTC [msp.identity] Verify -> DEBU 13c2 Verify: sig = 00000000 30 44 02 20 3e 34 30 a7 7a 34 94 d8 b3 73 97 db |0D. >40.z4...s..| +00000010 96 da 10 13 46 64 57 5e af 8c ec ad 13 2e 72 23 |....FdW^......r#| +00000020 12 36 e1 a7 02 20 67 6b 69 65 0e 27 d7 39 1b e1 |.6... gkie.'.9..| +00000030 07 2a cf 5f b4 cf 8d 8d 2e 70 bf ed ec 66 7c 6b |.*._.....p...f|k| +00000040 a3 af 89 d2 b2 af |......|" +"2019-05-02 09:28:03.915 UTC [cauthdsl] func2 -> DEBU 13c3 0xc0004038f0 principal evaluation succeeds for identity 1" +"2019-05-02 09:28:03.915 UTC [cauthdsl] func1 -> DEBU 13c4 0xc0004038f0 gate 1556789283912816400 evaluation succeeds" +"2019-05-02 09:28:03.915 UTC [policies] Evaluate -> DEBU 13c5 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:28:03.915 UTC [policies] Evaluate -> DEBU 13c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:28:03.915 UTC [policies] Evaluate -> DEBU 13c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-05-02 09:28:03.915 UTC [cauthdsl] deduplicate -> WARN 13c8 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-05-02 09:28:03.916 UTC [cauthdsl] func1 -> DEBU 13c9 0xc00041cd20 gate 1556789283915990600 evaluation starts" +"2019-05-02 09:28:03.916 UTC [cauthdsl] func2 -> DEBU 13ca 0xc00041cd20 signed by 0 principal evaluation starts (used [false false false])" +"2019-05-02 09:28:03.916 UTC [cauthdsl] func2 -> DEBU 13cb 0xc00041cd20 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:03.916 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13cc Checking if identity satisfies ADMIN role for Org1MSP" +"2019-05-02 09:28:03.916 UTC [cauthdsl] func2 -> DEBU 13cd 0xc00041cd20 principal matched by identity 0" +"2019-05-02 09:28:03.917 UTC [msp.identity] Verify -> DEBU 13ce Verify: digest = 00000000 55 f0 c2 94 3a 37 23 eb d0 1b da 18 4a 66 45 b5 |U...:7#.....JfE.| +00000010 54 12 61 d1 4b ae fe 57 e9 51 94 57 aa af 68 17 |T.a.K..W.Q.W..h.|" +"2019-05-02 09:28:03.917 UTC [msp.identity] Verify -> DEBU 13cf Verify: sig = 00000000 30 45 02 21 00 ef 26 69 f6 43 cc ea 70 a5 61 8d |0E.!..&i.C..p.a.| +00000010 ff a4 ff 24 9b 2c 47 7c 14 f4 82 75 2d 27 b6 b0 |...$.,G|...u-'..| +00000020 a2 6a 68 25 32 02 20 23 80 40 b2 b7 b1 c9 60 08 |.jh%2. #.@....`.| +00000030 cd 4e 09 a9 3c 63 75 29 2f 85 61 35 08 11 df c6 |.N.. DEBU 13d0 0xc00041cd20 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:03.917 UTC [cauthdsl] func1 -> DEBU 13d1 0xc00041cd20 gate 1556789283915990600 evaluation succeeds" +"2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d2 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d4 Signature set satisfies policy /Channel/Application/Admins" +"2019-05-02 09:28:03.918 UTC [policies] Evaluate -> DEBU 13d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-05-02 09:28:03.918 UTC [common.configtx] verifyDeltaSet -> DEBU 13d6 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-05-02 09:28:03.919 UTC [common.configtx] verifyDeltaSet -> DEBU 13d7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-05-02 09:28:03.919 UTC [common.configtx] verifyDeltaSet -> DEBU 13d8 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-05-02 09:28:03.919 UTC [common.configtx] verifyDeltaSet -> DEBU 13d9 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13da Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13db Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13dc Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13dd Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.920 UTC [common.configtx] recurseConfigMap -> DEBU 13de Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.921 UTC [common.configtx] recurseConfigMap -> DEBU 13df Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.921 UTC [common.configtx] recurseConfigMap -> DEBU 13e0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.921 UTC [common.configtx] recurseConfigMap -> DEBU 13e1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e2 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e6 Setting policy for key Endorsement to " +"2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e7 Setting policy for key LifecycleEndorsement to " +"2019-05-02 09:28:03.922 UTC [common.configtx] recurseConfigMap -> DEBU 13e8 Setting policy for key Readers to " +"2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13e9 Setting policy for key Writers to " +"2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ea Setting policy for key Admins to " +"2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13eb Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ec Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ed Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ee Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.923 UTC [common.configtx] recurseConfigMap -> DEBU 13ef Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f1 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f2 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.924 UTC [common.configtx] recurseConfigMap -> DEBU 13f4 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:03.925 UTC [common.channelconfig] NewStandardValues -> DEBU 13f5 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:28:03.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f6 Processing field: HashingAlgorithm" +"2019-05-02 09:28:03.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f7 Processing field: BlockDataHashingStructure" +"2019-05-02 09:28:03.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f8 Processing field: OrdererAddresses" +"2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f9 Processing field: Consortium" +"2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fa Processing field: Capabilities" +"2019-05-02 09:28:03.926 UTC [common.channelconfig] NewStandardValues -> DEBU 13fb Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fc Processing field: ACLs" +"2019-05-02 09:28:03.926 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13fd Processing field: Capabilities" +"2019-05-02 09:28:03.927 UTC [common.channelconfig] NewStandardValues -> DEBU 13fe Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:28:03.927 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13ff Processing field: AnchorPeers" +"2019-05-02 09:28:03.927 UTC [common.channelconfig] NewStandardValues -> DEBU 1400 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:03.927 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1401 Processing field: MSP" +"2019-05-02 09:28:03.927 UTC [common.channelconfig] Validate -> DEBU 1402 Anchor peers for org Org2MSP are anchor_peers: " +"2019-05-02 09:28:03.927 UTC [common.channelconfig] validateMSP -> DEBU 1403 Setting up MSP for org Org2MSP" +"2019-05-02 09:28:03.928 UTC [msp] newBccspMsp -> DEBU 1404 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:03.928 UTC [msp] New -> DEBU 1405 Creating Cache-MSP instance" +"2019-05-02 09:28:03.928 UTC [msp] Setup -> DEBU 1406 Setting up MSP instance Org2MSP" +"2019-05-02 09:28:03.929 UTC [msp.identity] newIdentity -> DEBU 1407 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -6986,7 +6856,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:31:34.897 UTC [msp.identity] newIdentity -> DEBU 1432 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:03.930 UTC [msp.identity] newIdentity -> DEBU 1408 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7000,21 +6870,21 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:31:34.897 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1433 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:31:34.897 UTC [msp] Validate -> DEBU 1434 MSP Org2MSP validating identity" -"2019-05-02 01:31:34.898 UTC [msp] getCertificationChain -> DEBU 1435 MSP Org2MSP getting certification chain" -"2019-05-02 01:31:34.899 UTC [msp] hasOURole -> DEBU 1436 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:31:34.899 UTC [msp] getCertificationChain -> DEBU 1437 MSP Org2MSP getting certification chain" -"2019-05-02 01:31:34.900 UTC [common.channelconfig] NewStandardValues -> DEBU 1438 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:31:34.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1439 Processing field: AnchorPeers" -"2019-05-02 01:31:34.900 UTC [common.channelconfig] NewStandardValues -> DEBU 143a Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:34.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 143b Processing field: MSP" -"2019-05-02 01:31:34.900 UTC [common.channelconfig] Validate -> DEBU 143c Anchor peers for org Org3MSP are " -"2019-05-02 01:31:34.900 UTC [common.channelconfig] validateMSP -> DEBU 143d Setting up MSP for org Org3MSP" -"2019-05-02 01:31:34.901 UTC [msp] newBccspMsp -> DEBU 143e Creating BCCSP-based MSP instance" -"2019-05-02 01:31:34.901 UTC [msp] New -> DEBU 143f Creating Cache-MSP instance" -"2019-05-02 01:31:34.901 UTC [msp] Setup -> DEBU 1440 Setting up MSP instance Org3MSP" -"2019-05-02 01:31:34.901 UTC [msp.identity] newIdentity -> DEBU 1441 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:03.931 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1409 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:28:03.931 UTC [msp] Validate -> DEBU 140a MSP Org2MSP validating identity" +"2019-05-02 09:28:03.931 UTC [msp] getCertificationChain -> DEBU 140b MSP Org2MSP getting certification chain" +"2019-05-02 09:28:03.932 UTC [msp] hasOURole -> DEBU 140c MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:28:03.932 UTC [msp] getCertificationChain -> DEBU 140d MSP Org2MSP getting certification chain" +"2019-05-02 09:28:03.932 UTC [common.channelconfig] NewStandardValues -> DEBU 140e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:28:03.932 UTC [common.channelconfig] initializeProtosStruct -> DEBU 140f Processing field: AnchorPeers" +"2019-05-02 09:28:03.932 UTC [common.channelconfig] NewStandardValues -> DEBU 1410 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:03.932 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1411 Processing field: MSP" +"2019-05-02 09:28:03.933 UTC [common.channelconfig] Validate -> DEBU 1412 Anchor peers for org Org3MSP are " +"2019-05-02 09:28:03.933 UTC [common.channelconfig] validateMSP -> DEBU 1413 Setting up MSP for org Org3MSP" +"2019-05-02 09:28:03.933 UTC [msp] newBccspMsp -> DEBU 1414 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:03.933 UTC [msp] New -> DEBU 1415 Creating Cache-MSP instance" +"2019-05-02 09:28:03.933 UTC [msp] Setup -> DEBU 1416 Setting up MSP instance Org3MSP" +"2019-05-02 09:28:03.934 UTC [msp.identity] newIdentity -> DEBU 1417 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7029,7 +6899,7 @@ rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== -----END CERTIFICATE-----" -"2019-05-02 01:31:34.902 UTC [msp.identity] newIdentity -> DEBU 1442 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:03.934 UTC [msp.identity] newIdentity -> DEBU 1418 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -7043,121 +6913,213 @@ HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= -----END CERTIFICATE-----" -"2019-05-02 01:31:34.904 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1443 Checking if identity satisfies role [CLIENT] for Org3MSP" -"2019-05-02 01:31:34.904 UTC [msp] Validate -> DEBU 1444 MSP Org3MSP validating identity" -"2019-05-02 01:31:34.904 UTC [msp] getCertificationChain -> DEBU 1445 MSP Org3MSP getting certification chain" -"2019-05-02 01:31:34.904 UTC [msp] hasOURole -> DEBU 1446 MSP Org3MSP checking if the identity is a client" -"2019-05-02 01:31:34.905 UTC [msp] getCertificationChain -> DEBU 1447 MSP Org3MSP getting certification chain" -"2019-05-02 01:31:34.905 UTC [msp] Setup -> DEBU 1448 Setting up the MSP manager (4 msps)" -"2019-05-02 01:31:34.905 UTC [msp] Setup -> DEBU 1449 MSP manager setup complete, setup 4 msps" -"2019-05-02 01:31:34.905 UTC [policies] NewManagerImpl -> DEBU 144a Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:34.905 UTC [policies] NewManagerImpl -> DEBU 144b Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:34.905 UTC [policies] NewManagerImpl -> DEBU 144c Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:34.906 UTC [policies] NewManagerImpl -> DEBU 144d Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:31:34.906 UTC [policies] NewManagerImpl -> DEBU 144e Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:31:34.906 UTC [policies] NewManagerImpl -> DEBU 144f Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:31:34.906 UTC [policies] NewManagerImpl -> DEBU 1450 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:31:34.907 UTC [policies] NewManagerImpl -> DEBU 1451 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:31:34.907 UTC [policies] NewManagerImpl -> DEBU 1452 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:31:34.907 UTC [policies] NewManagerImpl -> DEBU 1453 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:31:34.907 UTC [policies] NewManagerImpl -> DEBU 1454 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:31:34.907 UTC [policies] NewManagerImpl -> DEBU 1455 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:31:34.908 UTC [policies] NewManagerImpl -> DEBU 1456 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:31:34.908 UTC [policies] NewManagerImpl -> DEBU 1457 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:31:34.909 UTC [policies] NewManagerImpl -> DEBU 1458 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:31:34.909 UTC [policies] NewManagerImpl -> DEBU 1459 Proposed new policy Endorsement for Channel/Application/Org3MSP" -"2019-05-02 01:31:34.909 UTC [policies] NewManagerImpl -> DEBU 145a Proposed new policy Readers for Channel/Application/Org3MSP" -"2019-05-02 01:31:34.909 UTC [policies] NewManagerImpl -> DEBU 145b Proposed new policy Writers for Channel/Application/Org3MSP" -"2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 145c Proposed new policy Admins for Channel/Application/Org3MSP" -"2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 145d Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 145e Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 145f Proposed new policy Readers for Channel/Application" -"2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 1460 Proposed new policy Writers for Channel/Application" -"2019-05-02 01:31:34.910 UTC [policies] NewManagerImpl -> DEBU 1461 Proposed new policy Admins for Channel/Application" -"2019-05-02 01:31:34.911 UTC [policies] NewManagerImpl -> DEBU 1462 Proposed new policy Readers for Channel" -"2019-05-02 01:31:34.911 UTC [policies] NewManagerImpl -> DEBU 1463 Proposed new policy Writers for Channel" -"2019-05-02 01:31:34.911 UTC [policies] NewManagerImpl -> DEBU 1464 Proposed new policy Admins for Channel" -"2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 1465 Adding to config map: [Group] /Channel" -"2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 1466 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 1467 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 1468 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 1469 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:34.912 UTC [common.configtx] addToMap -> DEBU 146a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 146b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 146c Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 146d Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 146e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 146f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:31:34.913 UTC [common.configtx] addToMap -> DEBU 1470 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1471 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1472 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1473 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1474 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1475 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1476 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1477 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1478 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1479 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147d Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147e Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 147f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1480 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1481 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1482 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-05-02 01:31:34.914 UTC [common.configtx] addToMap -> DEBU 1483 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1484 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1485 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1486 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1487 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1488 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1489 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148a Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148b Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148c Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148d Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148e Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 148f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1490 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1491 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1492 Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1493 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1494 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1495 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1496 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1497 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:31:34.915 UTC [common.configtx] addToMap -> DEBU 1498 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:31:34.915 UTC [common.channelconfig] LogSanityChecks -> DEBU 1499 As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:31:34.915 UTC [common.channelconfig] LogSanityChecks -> DEBU 149a As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:31:34.915 UTC [policies] Manager -> DEBU 149b Manager Channel looking up path [Application]" -"2019-05-02 01:31:34.915 UTC [policies] Manager -> DEBU 149c Manager Channel has managers Orderer" -"2019-05-02 01:31:34.915 UTC [policies] Manager -> DEBU 149d Manager Channel has managers Application" -"2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 149e Manager Channel/Application looking up path []" -"2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 149f Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a0 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a1 Manager Channel/Application has managers Org3MSP" -"2019-05-02 01:31:34.916 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a2 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:31:34.916 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a3 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:31:34.916 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a4 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a5 Manager Channel looking up path [Orderer]" -"2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a6 Manager Channel has managers Orderer" -"2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a7 Manager Channel has managers Application" -"2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a8 Manager Channel/Orderer looking up path []" -"2019-05-02 01:31:34.916 UTC [policies] Manager -> DEBU 14a9 Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:31:34.916 UTC [common.channelconfig] LogSanityChecks -> DEBU 14aa As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:31:34.916 UTC [common.capabilities] Supported -> DEBU 14ab Orderer capability V2_0 is supported and is enabled" -"2019-05-02 01:31:34.916 UTC [common.capabilities] Supported -> DEBU 14ac Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:31:34.916 UTC [msp.identity] Sign -> DEBU 14ad Sign: plaintext: 0AD2060A1B08011A0608F690A9E60522...4F94D4B4EF612138698F4F6EE24F94D1 " -"2019-05-02 01:31:34.916 UTC [msp.identity] Sign -> DEBU 14ae Sign: digest: 7B27D98EC5A9C138DB989B54C4347266FE0D3D0F4A95B099269B68BCCF585B53 " -"2019-05-02 01:31:34.917 UTC [policies] Evaluate -> DEBU 14af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-05-02 01:31:34.917 UTC [policies] Evaluate -> DEBU 14b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:34.917 UTC [policies] Evaluate -> DEBU 14b1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:34.917 UTC [policies] Evaluate -> DEBU 14b2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:34.917 UTC [policies] Evaluate -> DEBU 14b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:31:34.917 UTC [msp] DeserializeIdentity -> DEBU 14b4 Obtaining identity" -"2019-05-02 01:31:34.918 UTC [msp.identity] newIdentity -> DEBU 14b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:03.935 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1419 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-05-02 09:28:03.935 UTC [msp] Validate -> DEBU 141a MSP Org3MSP validating identity" +"2019-05-02 09:28:03.936 UTC [msp] getCertificationChain -> DEBU 141b MSP Org3MSP getting certification chain" +"2019-05-02 09:28:03.936 UTC [msp] hasOURole -> DEBU 141c MSP Org3MSP checking if the identity is a client" +"2019-05-02 09:28:03.936 UTC [msp] getCertificationChain -> DEBU 141d MSP Org3MSP getting certification chain" +"2019-05-02 09:28:03.936 UTC [common.channelconfig] NewStandardValues -> DEBU 141e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:28:03.937 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141f Processing field: AnchorPeers" +"2019-05-02 09:28:03.937 UTC [common.channelconfig] NewStandardValues -> DEBU 1420 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:03.937 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1421 Processing field: MSP" +"2019-05-02 09:28:03.937 UTC [common.channelconfig] Validate -> DEBU 1422 Anchor peers for org Org1MSP are anchor_peers: " +"2019-05-02 09:28:03.937 UTC [common.channelconfig] validateMSP -> DEBU 1423 Setting up MSP for org Org1MSP" +"2019-05-02 09:28:03.937 UTC [msp] newBccspMsp -> DEBU 1424 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:03.937 UTC [msp] New -> DEBU 1425 Creating Cache-MSP instance" +"2019-05-02 09:28:03.938 UTC [msp] Setup -> DEBU 1426 Setting up MSP instance Org1MSP" +"2019-05-02 09:28:03.938 UTC [msp.identity] newIdentity -> DEBU 1427 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-05-02 09:28:03.939 UTC [msp.identity] newIdentity -> DEBU 1428 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-05-02 09:28:03.940 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1429 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:28:03.940 UTC [msp] Validate -> DEBU 142a MSP Org1MSP validating identity" +"2019-05-02 09:28:03.941 UTC [msp] getCertificationChain -> DEBU 142b MSP Org1MSP getting certification chain" +"2019-05-02 09:28:03.941 UTC [msp] hasOURole -> DEBU 142c MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:28:03.941 UTC [msp] getCertificationChain -> DEBU 142d MSP Org1MSP getting certification chain" +"2019-05-02 09:28:03.941 UTC [common.channelconfig] NewStandardValues -> DEBU 142e Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:28:03.941 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142f Processing field: ConsensusType" +"2019-05-02 09:28:03.941 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1430 Processing field: BatchSize" +"2019-05-02 09:28:03.941 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1431 Processing field: BatchTimeout" +"2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1432 Processing field: KafkaBrokers" +"2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1433 Processing field: ChannelRestrictions" +"2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1434 Processing field: Capabilities" +"2019-05-02 09:28:03.942 UTC [common.channelconfig] NewStandardValues -> DEBU 1435 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1436 Processing field: Endpoints" +"2019-05-02 09:28:03.942 UTC [common.channelconfig] NewStandardValues -> DEBU 1437 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:03.942 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1438 Processing field: MSP" +"2019-05-02 09:28:03.943 UTC [common.channelconfig] validateMSP -> DEBU 1439 Setting up MSP for org OrdererOrg" +"2019-05-02 09:28:03.943 UTC [msp] newBccspMsp -> DEBU 143a Creating BCCSP-based MSP instance" +"2019-05-02 09:28:03.943 UTC [msp] New -> DEBU 143b Creating Cache-MSP instance" +"2019-05-02 09:28:03.944 UTC [msp] Setup -> DEBU 143c Setting up MSP instance OrdererMSP" +"2019-05-02 09:28:03.944 UTC [msp.identity] newIdentity -> DEBU 143d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-05-02 09:28:03.945 UTC [msp.identity] newIdentity -> DEBU 143e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-05-02 09:28:03.946 UTC [msp] Validate -> DEBU 143f MSP OrdererMSP validating identity" +"2019-05-02 09:28:03.946 UTC [msp] Setup -> DEBU 1440 Setting up the MSP manager (4 msps)" +"2019-05-02 09:28:03.946 UTC [msp] Setup -> DEBU 1441 MSP manager setup complete, setup 4 msps" +"2019-05-02 09:28:03.946 UTC [policies] NewManagerImpl -> DEBU 1442 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:28:03.946 UTC [policies] NewManagerImpl -> DEBU 1443 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:28:03.946 UTC [policies] NewManagerImpl -> DEBU 1444 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1445 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1446 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1447 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-05-02 09:28:03.947 UTC [policies] NewManagerImpl -> DEBU 1448 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 1449 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144a Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144b Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144c Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:28:03.948 UTC [policies] NewManagerImpl -> DEBU 144d Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 144e Proposed new policy Admins for Channel/Application" +"2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 144f Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 1450 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 1451 Proposed new policy Readers for Channel/Application" +"2019-05-02 09:28:03.949 UTC [policies] NewManagerImpl -> DEBU 1452 Proposed new policy Writers for Channel/Application" +"2019-05-02 09:28:03.950 UTC [policies] NewManagerImpl -> DEBU 1453 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:03.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1454 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs" +"2019-05-02 09:28:03.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1455 Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +"2019-05-02 09:28:03.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1456 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.9µs " +"2019-05-02 09:28:03.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1457 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.7µs " +"2019-05-02 09:28:03.950 UTC [policies] NewManagerImpl -> DEBU 1458 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 1459 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145a Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145b Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145c Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145d Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145e Proposed new policy Admins for Channel" +"2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 145f Proposed new policy Readers for Channel" +"2019-05-02 09:28:03.951 UTC [policies] NewManagerImpl -> DEBU 1460 Proposed new policy Writers for Channel" +"2019-05-02 09:28:03.951 UTC [common.configtx] addToMap -> DEBU 1461 Adding to config map: [Group] /Channel" +"2019-05-02 09:28:03.951 UTC [common.configtx] addToMap -> DEBU 1462 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1463 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1464 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1465 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1466 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1467 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:03.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1468 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1469 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146b Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146c Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146d Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146e Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 146f Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1470 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1471 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1472 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1473 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1474 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1475 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1476 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1477 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1478 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 1479 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 147a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:28:03.952 UTC [common.configtx] addToMap -> DEBU 147b Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147c Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147d Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147e Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 147f Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:28:03.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1480 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1481 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1482 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1483 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1484 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1485 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1486 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1487 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1488 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 1489 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 148a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 148b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:28:03.953 UTC [common.configtx] addToMap -> DEBU 148c Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 148d Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 148e Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 148f Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:28:03.954 UTC [common.configtx] addToMap -> DEBU 1490 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:28:03.955 UTC [common.configtx] addToMap -> DEBU 1491 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:28:03.955 UTC [common.configtx] addToMap -> DEBU 1492 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:28:03.955 UTC [common.configtx] addToMap -> DEBU 1493 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:28:03.956 UTC [common.configtx] addToMap -> DEBU 1494 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:28:03.956 UTC [common.configtx] addToMap -> DEBU 1495 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:28:03.956 UTC [common.configtx] addToMap -> DEBU 1496 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:28:03.957 UTC [common.channelconfig] LogSanityChecks -> DEBU 1497 As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:28:03.957 UTC [common.channelconfig] LogSanityChecks -> DEBU 1498 As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:28:03.957 UTC [policies] Manager -> DEBU 1499 Manager Channel looking up path [Application]" +"2019-05-02 09:28:03.957 UTC [policies] Manager -> DEBU 149a Manager Channel has managers Application" +"2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149b Manager Channel has managers Orderer" +"2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149c Manager Channel/Application looking up path []" +"2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149d Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:28:03.958 UTC [policies] Manager -> DEBU 149e Manager Channel/Application has managers Org3MSP" +"2019-05-02 09:28:03.959 UTC [policies] Manager -> DEBU 149f Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:28:03.959 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a0 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:28:03.959 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a1 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:28:03.959 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a2 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:28:03.960 UTC [policies] Manager -> DEBU 14a3 Manager Channel looking up path [Orderer]" +"2019-05-02 09:28:03.960 UTC [policies] Manager -> DEBU 14a4 Manager Channel has managers Application" +"2019-05-02 09:28:03.961 UTC [policies] Manager -> DEBU 14a5 Manager Channel has managers Orderer" +"2019-05-02 09:28:03.961 UTC [policies] Manager -> DEBU 14a6 Manager Channel/Orderer looking up path []" +"2019-05-02 09:28:03.961 UTC [policies] Manager -> DEBU 14a7 Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:28:03.961 UTC [common.channelconfig] LogSanityChecks -> DEBU 14a8 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:28:03.962 UTC [common.capabilities] Supported -> DEBU 14a9 Orderer capability V2_0 is supported and is enabled" +"2019-05-02 09:28:03.962 UTC [common.capabilities] Supported -> DEBU 14aa Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:28:03.962 UTC [msp.identity] Sign -> DEBU 14ab Sign: plaintext: 0AD2060A1B08011A0608A3F0AAE60522...8E99E305700BC69B95A3C8334C0E94C6 " +"2019-05-02 09:28:03.962 UTC [msp.identity] Sign -> DEBU 14ac Sign: digest: EE16CDA5D421246768817D036E9C38EFE9007FA05B3109E4F22AC3F48C3F33F6 " +"2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:03.963 UTC [policies] Evaluate -> DEBU 14b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:28:03.963 UTC [msp] DeserializeIdentity -> DEBU 14b2 Obtaining identity" +"2019-05-02 09:28:03.963 UTC [msp.identity] newIdentity -> DEBU 14b3 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -7171,345 +7133,206 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-05-02 01:31:34.919 UTC [cauthdsl] func1 -> DEBU 14b6 0xc0009b1d60 gate 1556760694919762500 evaluation starts" -"2019-05-02 01:31:34.920 UTC [cauthdsl] func2 -> DEBU 14b7 0xc0009b1d60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:34.920 UTC [cauthdsl] func2 -> DEBU 14b8 0xc0009b1d60 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:34.920 UTC [cauthdsl] func2 -> DEBU 14b9 0xc0009b1d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-05-02 01:31:34.921 UTC [cauthdsl] func2 -> DEBU 14ba 0xc0009b1d60 principal evaluation fails" -"2019-05-02 01:31:34.921 UTC [cauthdsl] func1 -> DEBU 14bb 0xc0009b1d60 gate 1556760694919762500 evaluation fails" -"2019-05-02 01:31:34.921 UTC [policies] Evaluate -> DEBU 14bc Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:34.921 UTC [policies] Evaluate -> DEBU 14bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:34.922 UTC [policies] Evaluate -> DEBU 14be == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:34.922 UTC [cauthdsl] func1 -> DEBU 14bf 0xc000996f20 gate 1556760694922466800 evaluation starts" -"2019-05-02 01:31:34.922 UTC [cauthdsl] func2 -> DEBU 14c0 0xc000996f20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:34.923 UTC [cauthdsl] func2 -> DEBU 14c1 0xc000996f20 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:34.923 UTC [cauthdsl] func2 -> DEBU 14c2 0xc000996f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-05-02 01:31:34.923 UTC [cauthdsl] func2 -> DEBU 14c3 0xc000996f20 principal evaluation fails" -"2019-05-02 01:31:34.923 UTC [cauthdsl] func1 -> DEBU 14c4 0xc000996f20 gate 1556760694922466800 evaluation fails" -"2019-05-02 01:31:34.923 UTC [policies] Evaluate -> DEBU 14c5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:34.923 UTC [policies] Evaluate -> DEBU 14c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:34.923 UTC [policies] func1 -> DEBU 14c7 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" -"2019-05-02 01:31:34.923 UTC [policies] Evaluate -> DEBU 14c8 Signature set did not satisfy policy /Channel/Application/Writers" -"2019-05-02 01:31:34.924 UTC [policies] Evaluate -> DEBU 14c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:34.924 UTC [policies] Evaluate -> DEBU 14ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-05-02 01:31:34.924 UTC [policies] Evaluate -> DEBU 14cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:34.924 UTC [policies] Evaluate -> DEBU 14cc == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:31:34.924 UTC [cauthdsl] func1 -> DEBU 14cd 0xc000997e90 gate 1556760694924135100 evaluation starts" -"2019-05-02 01:31:34.924 UTC [cauthdsl] func2 -> DEBU 14ce 0xc000997e90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:34.924 UTC [cauthdsl] func2 -> DEBU 14cf 0xc000997e90 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:34.924 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14d0 Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-05-02 01:31:34.924 UTC [msp] Validate -> DEBU 14d1 MSP OrdererMSP validating identity" -"2019-05-02 01:31:34.925 UTC [cauthdsl] func2 -> DEBU 14d2 0xc000997e90 principal matched by identity 0" -"2019-05-02 01:31:34.925 UTC [msp.identity] Verify -> DEBU 14d3 Verify: digest = 00000000 7b 27 d9 8e c5 a9 c1 38 db 98 9b 54 c4 34 72 66 |{'.....8...T.4rf| -00000010 fe 0d 3d 0f 4a 95 b0 99 26 9b 68 bc cf 58 5b 53 |..=.J...&.h..X[S|" -"2019-05-02 01:31:34.925 UTC [msp.identity] Verify -> DEBU 14d4 Verify: sig = 00000000 30 44 02 20 17 fb 96 95 cf 78 11 ee f6 f6 bf 00 |0D. .....x......| -00000010 86 65 7e 97 5b 5f 51 43 e4 6a fa 3e d0 8f 80 95 |.e~.[_QC.j.>....| -00000020 5c 30 f3 79 02 20 31 03 e1 81 80 b3 8e 6d 77 9c |\0.y. 1......mw.| -00000030 df 06 16 94 09 13 bc 5f 75 84 4c 0a d7 71 fa 74 |......._u.L..q.t| -00000040 df de 6e 9d 1c cb |..n...|" -"2019-05-02 01:31:34.925 UTC [cauthdsl] func2 -> DEBU 14d5 0xc000997e90 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:34.925 UTC [cauthdsl] func1 -> DEBU 14d6 0xc000997e90 gate 1556760694924135100 evaluation succeeds" -"2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14d7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14d9 Signature set satisfies policy /Channel/Orderer/Writers" -"2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14db Signature set satisfies policy /Channel/Writers" -"2019-05-02 01:31:34.926 UTC [policies] Evaluate -> DEBU 14dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-05-02 01:31:34.927 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 14dd [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.240.9:47516" -"2019-05-02 01:31:34.927 UTC [orderer.consensus.etcdraft] propose -> INFO 14de Created block [9], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-05-02 01:31:34.928 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 14df Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -"2019-05-02 01:31:34.928 UTC [orderer.consensus.etcdraft] 2 -> DEBU 14e0 Proposed block [9] to raft consensus" channel=businesschannel node=1 -"2019-05-02 01:31:34.933 UTC [grpc] warningf -> DEBU 14e1 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.2:7050->192.168.240.9:47516: read: connection reset by peer" -"2019-05-02 01:31:34.939 UTC [orderer.common.broadcast] Handle -> WARN 14e2 Error reading from 192.168.240.9:47516: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:34.939 UTC [orderer.common.server] func1 -> DEBU 14e3 Closing Broadcast stream" -"2019-05-02 01:31:34.939 UTC [comm.grpc.server] 1 -> INFO 14e4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.240.9:47516 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=104.2258ms -"2019-05-02 01:31:34.939 UTC [grpc] infof -> DEBU 14e5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:34.940 UTC [common.deliver] Handle -> WARN 14e6 Error reading from 192.168.240.9:47514: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:34.940 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e7 Sending msg of 34121 bytes to 2 on channel businesschannel took 29.2µs" -"2019-05-02 01:31:34.941 UTC [grpc] infof -> DEBU 14e9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:34.941 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ea Sending msg of 34121 bytes to 3 on channel businesschannel took 22.1µs" -"2019-05-02 01:31:34.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14eb Send of ConsensusRequest for channel businesschannel with payload of size 34121 to orderer1.example.com(orderer1.example.com:7050) took 101.7µs " -"2019-05-02 01:31:34.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ec Send of ConsensusRequest for channel businesschannel with payload of size 34121 to orderer2.example.com(orderer2.example.com:7050) took 197.1µs " -"2019-05-02 01:31:34.941 UTC [orderer.common.server] func1 -> DEBU 14e8 Closing Deliver stream" -"2019-05-02 01:31:34.941 UTC [comm.grpc.server] 1 -> INFO 14ed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47514 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=153.5911ms -"2019-05-02 01:31:34.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ee Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:34.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f0 Sending msg of 28 bytes to 2 on channel businesschannel took 102.7µs" -"2019-05-02 01:31:34.962 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f1 Sending msg of 28 bytes to 3 on channel businesschannel took 578.5µs" -"2019-05-02 01:31:34.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ef Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:34.963 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 716.1µs " -"2019-05-02 01:31:34.963 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 14f3 Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=1 -"2019-05-02 01:31:34.966 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 430.5µs " -"2019-05-02 01:31:34.974 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f5 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:34.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f6 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:34.994 UTC [common.configtx] addToMap -> DEBU 14f7 Adding to config map: [Group] /Channel" -"2019-05-02 01:31:34.995 UTC [common.configtx] addToMap -> DEBU 14f8 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:31:35.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fa Sending msg of 28 bytes to 2 on channel businesschannel took 72.5µs" -"2019-05-02 01:31:35.000 UTC [common.configtx] addToMap -> DEBU 14f9 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:31:35.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 799.3µs " -"2019-05-02 01:31:35.004 UTC [common.configtx] addToMap -> DEBU 14fc Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:31:35.007 UTC [common.configtx] addToMap -> DEBU 14fe Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:31:35.007 UTC [common.configtx] addToMap -> DEBU 14ff Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:31:35.008 UTC [common.configtx] addToMap -> DEBU 1500 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:31:35.009 UTC [common.configtx] addToMap -> DEBU 1501 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:31:35.009 UTC [common.configtx] addToMap -> DEBU 1502 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:35.009 UTC [common.configtx] addToMap -> DEBU 1503 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:31:35.010 UTC [common.configtx] addToMap -> DEBU 1504 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:31:35.012 UTC [common.configtx] addToMap -> DEBU 1505 Adding to config map: [Group] /Channel" -"2019-05-02 01:31:35.012 UTC [common.configtx] addToMap -> DEBU 1506 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:31:35.013 UTC [common.configtx] addToMap -> DEBU 1507 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:31:35.013 UTC [common.configtx] addToMap -> DEBU 1508 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:31:35.013 UTC [common.configtx] addToMap -> DEBU 1509 Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-05-02 01:31:35.014 UTC [common.configtx] addToMap -> DEBU 150a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-05-02 01:31:35.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fd Sending msg of 28 bytes to 3 on channel businesschannel took 96.4µs" -"2019-05-02 01:31:35.016 UTC [orderer.common.cluster.step] handleMessage -> DEBU 150b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:35.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150c Sending msg of 28 bytes to 3 on channel testchainid took 21µs" -"2019-05-02 01:31:35.013 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 7.1636ms " -"2019-05-02 01:31:35.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 377µs " -"2019-05-02 01:31:35.014 UTC [common.configtx] addToMap -> DEBU 150f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-05-02 01:31:35.018 UTC [common.configtx] addToMap -> DEBU 1510 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:35.019 UTC [common.configtx] addToMap -> DEBU 1511 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-05-02 01:31:35.019 UTC [common.configtx] addToMap -> DEBU 1512 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-05-02 01:31:35.020 UTC [common.configtx] addToMap -> DEBU 1513 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:31:35.022 UTC [common.configtx] addToMap -> DEBU 1514 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:31:35.023 UTC [common.configtx] addToMap -> DEBU 1515 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:31:35.024 UTC [common.configtx] addToMap -> DEBU 1516 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:31:35.024 UTC [common.configtx] addToMap -> DEBU 1517 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:35.024 UTC [common.configtx] addToMap -> DEBU 1518 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:31:35.025 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1519 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:35.025 UTC [common.configtx] addToMap -> DEBU 151a Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:31:35.030 UTC [common.configtx] verifyDeltaSet -> DEBU 151b Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-05-02 01:31:35.030 UTC [common.configtx] verifyDeltaSet -> DEBU 151c Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -"2019-05-02 01:31:35.030 UTC [common.configtx] verifyDeltaSet -> DEBU 151d Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:35.030 UTC [common.configtx] verifyDeltaSet -> DEBU 151e Processing change to key: [Group] /Channel/Application" -"2019-05-02 01:31:35.031 UTC [common.configtx] policyForItem -> DEBU 151f Getting policy for item Application with mod_policy Admins" -"2019-05-02 01:31:35.031 UTC [policies] Manager -> DEBU 1520 Manager Channel looking up path []" -"2019-05-02 01:31:35.031 UTC [policies] Manager -> DEBU 1521 Manager Channel has managers Orderer" -"2019-05-02 01:31:35.031 UTC [policies] Manager -> DEBU 1522 Manager Channel has managers Application" -"2019-05-02 01:31:35.031 UTC [policies] Manager -> DEBU 1523 Manager Channel looking up path [Application]" -"2019-05-02 01:31:35.031 UTC [policies] Manager -> DEBU 1524 Manager Channel has managers Orderer" -"2019-05-02 01:31:35.032 UTC [policies] Manager -> DEBU 1525 Manager Channel has managers Application" -"2019-05-02 01:31:35.032 UTC [policies] Manager -> DEBU 1526 Manager Channel/Application looking up path []" -"2019-05-02 01:31:35.032 UTC [policies] Manager -> DEBU 1527 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:31:35.032 UTC [policies] Manager -> DEBU 1528 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:31:35.032 UTC [policies] Evaluate -> DEBU 1529 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -"2019-05-02 01:31:35.033 UTC [policies] Evaluate -> DEBU 152a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.033 UTC [policies] Evaluate -> DEBU 152b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-05-02 01:31:35.033 UTC [cauthdsl] deduplicate -> WARN 152c De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-05-02 01:31:35.033 UTC [cauthdsl] func1 -> DEBU 152d 0xc0009bb740 gate 1556760695033644700 evaluation starts" -"2019-05-02 01:31:35.034 UTC [cauthdsl] func2 -> DEBU 152e 0xc0009bb740 signed by 0 principal evaluation starts (used [false false false])" -"2019-05-02 01:31:35.034 UTC [cauthdsl] func2 -> DEBU 152f 0xc0009bb740 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:35.034 UTC [cauthdsl] func2 -> DEBU 1530 0xc0009bb740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:35.034 UTC [cauthdsl] func2 -> DEBU 1531 0xc0009bb740 processing identity 1 with bytes of efef60" -"2019-05-02 01:31:35.034 UTC [cauthdsl] func2 -> DEBU 1532 0xc0009bb740 principal matched by identity 1" -"2019-05-02 01:31:35.035 UTC [msp.identity] Verify -> DEBU 1534 Verify: digest = 00000000 0a 93 54 f3 ca 50 66 cd 2e b2 91 c4 a1 99 4b fe |..T..Pf.......K.| -00000010 78 04 08 22 86 5c 95 44 eb 44 40 b9 7f 21 df a9 |x..".\.D.D@..!..|" -"2019-05-02 01:31:35.035 UTC [msp.identity] Verify -> DEBU 1535 Verify: sig = 00000000 30 44 02 20 73 e6 28 8c bd 51 8c f6 e4 26 ca 3c |0D. s.(..Q...&.<| -00000010 a7 51 9f 0f f8 98 78 97 9a 0a 5b de 1d 2f 26 8a |.Q....x...[../&.| -00000020 4a bd b1 0a 02 20 7d 21 70 08 83 04 6d 41 e4 2d |J.... }!p...mA.-| -00000030 97 f9 e7 46 95 6f 32 34 86 6a f5 6d 90 57 38 e1 |...F.o24.j.m.W8.| -00000040 82 3f 3a 29 69 89 |.?:)i.|" -"2019-05-02 01:31:35.036 UTC [cauthdsl] func2 -> DEBU 1536 0xc0009bb740 principal evaluation succeeds for identity 1" -"2019-05-02 01:31:35.036 UTC [cauthdsl] func1 -> DEBU 1537 0xc0009bb740 gate 1556760695033644700 evaluation succeeds" -"2019-05-02 01:31:35.039 UTC [policies] Evaluate -> DEBU 1538 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:31:35.040 UTC [policies] Evaluate -> DEBU 1539 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:31:35.041 UTC [policies] Evaluate -> DEBU 153a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-05-02 01:31:35.042 UTC [cauthdsl] deduplicate -> WARN 153b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-05-02 01:31:35.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1533 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:35.045 UTC [cauthdsl] func1 -> DEBU 153c 0xc000990300 gate 1556760695043486100 evaluation starts" -"2019-05-02 01:31:35.045 UTC [cauthdsl] func2 -> DEBU 153d 0xc000990300 signed by 0 principal evaluation starts (used [false false false])" -"2019-05-02 01:31:35.046 UTC [cauthdsl] func2 -> DEBU 153e 0xc000990300 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:35.046 UTC [cauthdsl] func2 -> DEBU 153f 0xc000990300 principal matched by identity 0" -"2019-05-02 01:31:35.046 UTC [msp.identity] Verify -> DEBU 1540 Verify: digest = 00000000 96 5b d6 35 6e 24 ba 8d ea c0 f3 54 be 64 a0 8e |.[.5n$.....T.d..| -00000010 d7 2c 6e 83 3b c0 ba 63 fa 91 e5 8e d7 f6 d2 45 |.,n.;..c.......E|" -"2019-05-02 01:31:35.046 UTC [msp.identity] Verify -> DEBU 1541 Verify: sig = 00000000 30 44 02 20 06 17 d3 85 97 6c 5b f8 2b ee 4f 8b |0D. .....l[.+.O.| -00000010 ef 9b 4d fa 3e e1 e8 50 ac 6a 0b 7c dd d7 cd af |..M.>..P.j.|....| -00000020 ef 6f e1 14 02 20 7a 9c e6 c9 a1 11 d2 73 46 49 |.o... z......sFI| -00000030 45 b3 5c 7b 74 db 4e 00 94 b3 b0 43 5c b9 74 72 |E.\{t.N....C\.tr| -00000040 0b fb bb cd 10 b7 |......|" -"2019-05-02 01:31:35.047 UTC [cauthdsl] func2 -> DEBU 1542 0xc000990300 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.047 UTC [cauthdsl] func1 -> DEBU 1543 0xc000990300 gate 1556760695043486100 evaluation succeeds" -"2019-05-02 01:31:35.048 UTC [policies] Evaluate -> DEBU 1544 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:31:35.051 UTC [policies] Evaluate -> DEBU 1545 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:31:35.051 UTC [policies] Evaluate -> DEBU 1546 Signature set satisfies policy /Channel/Application/Admins" -"2019-05-02 01:31:35.052 UTC [policies] Evaluate -> DEBU 1547 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -"2019-05-02 01:31:35.052 UTC [common.configtx] verifyDeltaSet -> DEBU 1548 Processing change to key: [Group] /Channel/Application/Org3MSP" -"2019-05-02 01:31:35.052 UTC [common.configtx] verifyDeltaSet -> DEBU 1549 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-05-02 01:31:35.052 UTC [common.configtx] verifyDeltaSet -> DEBU 154a Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-05-02 01:31:35.053 UTC [common.configtx] recurseConfigMap -> DEBU 154b Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.054 UTC [common.configtx] recurseConfigMap -> DEBU 154c Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.054 UTC [common.configtx] recurseConfigMap -> DEBU 154d Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.055 UTC [common.configtx] recurseConfigMap -> DEBU 154e Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.056 UTC [common.configtx] recurseConfigMap -> DEBU 154f Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.056 UTC [common.configtx] recurseConfigMap -> DEBU 1550 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.057 UTC [common.configtx] recurseConfigMap -> DEBU 1551 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.057 UTC [common.configtx] recurseConfigMap -> DEBU 1552 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.057 UTC [common.configtx] recurseConfigMap -> DEBU 1553 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.059 UTC [common.configtx] recurseConfigMap -> DEBU 1554 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.059 UTC [common.configtx] recurseConfigMap -> DEBU 1555 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.060 UTC [common.configtx] recurseConfigMap -> DEBU 1556 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.060 UTC [common.configtx] recurseConfigMap -> DEBU 1557 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.060 UTC [common.configtx] recurseConfigMap -> DEBU 1558 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.061 UTC [common.configtx] recurseConfigMap -> DEBU 1559 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.061 UTC [common.configtx] recurseConfigMap -> DEBU 155a Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.061 UTC [common.configtx] recurseConfigMap -> DEBU 155b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.062 UTC [common.configtx] recurseConfigMap -> DEBU 155c Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.062 UTC [common.configtx] recurseConfigMap -> DEBU 155d Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.062 UTC [common.configtx] recurseConfigMap -> DEBU 155e Setting policy for key Admins to " -"2019-05-02 01:31:35.062 UTC [common.configtx] recurseConfigMap -> DEBU 155f Setting policy for key Endorsement to " -"2019-05-02 01:31:35.063 UTC [common.configtx] recurseConfigMap -> DEBU 1560 Setting policy for key LifecycleEndorsement to " -"2019-05-02 01:31:35.063 UTC [common.configtx] recurseConfigMap -> DEBU 1561 Setting policy for key Readers to " -"2019-05-02 01:31:35.063 UTC [common.configtx] recurseConfigMap -> DEBU 1562 Setting policy for key Writers to " -"2019-05-02 01:31:35.063 UTC [common.configtx] recurseConfigMap -> DEBU 1563 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.063 UTC [common.configtx] recurseConfigMap -> DEBU 1564 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.064 UTC [common.configtx] recurseConfigMap -> DEBU 1565 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.064 UTC [common.channelconfig] NewStandardValues -> DEBU 1566 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:31:35.064 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1567 Processing field: HashingAlgorithm" -"2019-05-02 01:31:35.064 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1568 Processing field: BlockDataHashingStructure" -"2019-05-02 01:31:35.064 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1569 Processing field: OrdererAddresses" -"2019-05-02 01:31:35.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156a Processing field: Consortium" -"2019-05-02 01:31:35.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156b Processing field: Capabilities" -"2019-05-02 01:31:35.065 UTC [common.channelconfig] NewStandardValues -> DEBU 156c Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:31:35.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156d Processing field: ConsensusType" -"2019-05-02 01:31:35.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156e Processing field: BatchSize" -"2019-05-02 01:31:35.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156f Processing field: BatchTimeout" -"2019-05-02 01:31:35.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1570 Processing field: KafkaBrokers" -"2019-05-02 01:31:35.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1571 Processing field: ChannelRestrictions" -"2019-05-02 01:31:35.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1572 Processing field: Capabilities" -"2019-05-02 01:31:35.067 UTC [common.channelconfig] NewStandardValues -> DEBU 1573 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:31:35.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1574 Processing field: Endpoints" -"2019-05-02 01:31:35.067 UTC [common.channelconfig] NewStandardValues -> DEBU 1575 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:35.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1576 Processing field: MSP" -"2019-05-02 01:31:35.067 UTC [common.channelconfig] validateMSP -> DEBU 1577 Setting up MSP for org OrdererOrg" -"2019-05-02 01:31:35.068 UTC [msp] newBccspMsp -> DEBU 1578 Creating BCCSP-based MSP instance" -"2019-05-02 01:31:35.068 UTC [msp] New -> DEBU 1579 Creating Cache-MSP instance" -"2019-05-02 01:31:35.068 UTC [msp] Setup -> DEBU 157a Setting up MSP instance OrdererMSP" -"2019-05-02 01:31:35.069 UTC [msp.identity] newIdentity -> DEBU 157b Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-05-02 01:31:35.070 UTC [msp.identity] newIdentity -> DEBU 157c Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-05-02 01:31:35.070 UTC [msp] Validate -> DEBU 157d MSP OrdererMSP validating identity" -"2019-05-02 01:31:35.071 UTC [common.channelconfig] NewStandardValues -> DEBU 157e Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:31:35.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 157f Processing field: ACLs" -"2019-05-02 01:31:35.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1580 Processing field: Capabilities" -"2019-05-02 01:31:35.071 UTC [common.channelconfig] NewStandardValues -> DEBU 1581 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:31:35.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1582 Processing field: AnchorPeers" -"2019-05-02 01:31:35.072 UTC [common.channelconfig] NewStandardValues -> DEBU 1583 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:35.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1584 Processing field: MSP" -"2019-05-02 01:31:35.072 UTC [common.channelconfig] Validate -> DEBU 1585 Anchor peers for org Org3MSP are " -"2019-05-02 01:31:35.073 UTC [common.channelconfig] validateMSP -> DEBU 1586 Setting up MSP for org Org3MSP" -"2019-05-02 01:31:35.073 UTC [msp] newBccspMsp -> DEBU 1587 Creating BCCSP-based MSP instance" -"2019-05-02 01:31:35.073 UTC [msp] New -> DEBU 1588 Creating Cache-MSP instance" -"2019-05-02 01:31:35.073 UTC [msp] Setup -> DEBU 1589 Setting up MSP instance Org3MSP" -"2019-05-02 01:31:35.074 UTC [msp.identity] newIdentity -> DEBU 158a Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB -6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw -RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc -CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== ------END CERTIFICATE-----" -"2019-05-02 01:31:35.074 UTC [msp.identity] newIdentity -> DEBU 158b Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y -ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr -zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky -u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV -HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO -PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ -R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= ------END CERTIFICATE-----" -"2019-05-02 01:31:35.075 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 158c Checking if identity satisfies role [CLIENT] for Org3MSP" -"2019-05-02 01:31:35.075 UTC [msp] Validate -> DEBU 158d MSP Org3MSP validating identity" -"2019-05-02 01:31:35.076 UTC [msp] getCertificationChain -> DEBU 158e MSP Org3MSP getting certification chain" -"2019-05-02 01:31:35.076 UTC [msp] hasOURole -> DEBU 158f MSP Org3MSP checking if the identity is a client" -"2019-05-02 01:31:35.077 UTC [msp] getCertificationChain -> DEBU 1590 MSP Org3MSP getting certification chain" -"2019-05-02 01:31:35.077 UTC [common.channelconfig] NewStandardValues -> DEBU 1591 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:31:35.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1592 Processing field: AnchorPeers" -"2019-05-02 01:31:35.078 UTC [common.channelconfig] NewStandardValues -> DEBU 1593 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:35.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1594 Processing field: MSP" -"2019-05-02 01:31:35.078 UTC [common.channelconfig] Validate -> DEBU 1595 Anchor peers for org Org1MSP are anchor_peers: " -"2019-05-02 01:31:35.078 UTC [common.channelconfig] validateMSP -> DEBU 1596 Setting up MSP for org Org1MSP" -"2019-05-02 01:31:35.079 UTC [msp] newBccspMsp -> DEBU 1597 Creating BCCSP-based MSP instance" -"2019-05-02 01:31:35.079 UTC [msp] New -> DEBU 1598 Creating Cache-MSP instance" -"2019-05-02 01:31:35.079 UTC [msp] Setup -> DEBU 1599 Setting up MSP instance Org1MSP" -"2019-05-02 01:31:35.080 UTC [msp.identity] newIdentity -> DEBU 159a Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-05-02 01:31:35.080 UTC [msp.identity] newIdentity -> DEBU 159b Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-05-02 01:31:35.081 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 159c Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:31:35.081 UTC [msp] Validate -> DEBU 159d MSP Org1MSP validating identity" -"2019-05-02 01:31:35.082 UTC [msp] getCertificationChain -> DEBU 159e MSP Org1MSP getting certification chain" -"2019-05-02 01:31:35.082 UTC [msp] hasOURole -> DEBU 159f MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:31:35.082 UTC [msp] getCertificationChain -> DEBU 15a0 MSP Org1MSP getting certification chain" -"2019-05-02 01:31:35.083 UTC [common.channelconfig] NewStandardValues -> DEBU 15a1 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:31:35.083 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a2 Processing field: AnchorPeers" -"2019-05-02 01:31:35.083 UTC [common.channelconfig] NewStandardValues -> DEBU 15a3 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:35.083 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a4 Processing field: MSP" -"2019-05-02 01:31:35.083 UTC [common.channelconfig] Validate -> DEBU 15a5 Anchor peers for org Org2MSP are anchor_peers: " -"2019-05-02 01:31:35.084 UTC [common.channelconfig] validateMSP -> DEBU 15a6 Setting up MSP for org Org2MSP" -"2019-05-02 01:31:35.084 UTC [msp] newBccspMsp -> DEBU 15a7 Creating BCCSP-based MSP instance" -"2019-05-02 01:31:35.084 UTC [msp] New -> DEBU 15a8 Creating Cache-MSP instance" -"2019-05-02 01:31:35.084 UTC [msp] Setup -> DEBU 15a9 Setting up MSP instance Org2MSP" -"2019-05-02 01:31:35.085 UTC [msp.identity] newIdentity -> DEBU 15aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:03.964 UTC [cauthdsl] func1 -> DEBU 14b4 0xc000d00e90 gate 1556789283964332300 evaluation starts" +"2019-05-02 09:28:03.964 UTC [cauthdsl] func2 -> DEBU 14b5 0xc000d00e90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:03.965 UTC [cauthdsl] func2 -> DEBU 14b6 0xc000d00e90 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:03.965 UTC [cauthdsl] func2 -> DEBU 14b7 0xc000d00e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:03.965 UTC [cauthdsl] func2 -> DEBU 14b8 0xc000d00e90 principal evaluation fails" +"2019-05-02 09:28:03.965 UTC [cauthdsl] func1 -> DEBU 14b9 0xc000d00e90 gate 1556789283964332300 evaluation fails" +"2019-05-02 09:28:03.965 UTC [policies] Evaluate -> DEBU 14ba Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:28:03.965 UTC [policies] Evaluate -> DEBU 14bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:28:03.966 UTC [policies] Evaluate -> DEBU 14bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-05-02 09:28:03.966 UTC [cauthdsl] func1 -> DEBU 14bd 0xc000d01fd0 gate 1556789283966118500 evaluation starts" +"2019-05-02 09:28:03.966 UTC [cauthdsl] func2 -> DEBU 14be 0xc000d01fd0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:03.966 UTC [cauthdsl] func2 -> DEBU 14bf 0xc000d01fd0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:03.966 UTC [cauthdsl] func2 -> DEBU 14c0 0xc000d01fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:03.967 UTC [cauthdsl] func2 -> DEBU 14c1 0xc000d01fd0 principal evaluation fails" +"2019-05-02 09:28:03.967 UTC [cauthdsl] func1 -> DEBU 14c2 0xc000d01fd0 gate 1556789283966118500 evaluation fails" +"2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:28:03.967 UTC [policies] func1 -> DEBU 14c5 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +"2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c6 Signature set did not satisfy policy /Channel/Application/Writers" +"2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:28:03.967 UTC [policies] Evaluate -> DEBU 14c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-05-02 09:28:03.968 UTC [policies] Evaluate -> DEBU 14c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:03.968 UTC [policies] Evaluate -> DEBU 14ca == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:28:03.968 UTC [cauthdsl] func1 -> DEBU 14cb 0xc000f40ce0 gate 1556789283968350700 evaluation starts" +"2019-05-02 09:28:03.968 UTC [cauthdsl] func2 -> DEBU 14cc 0xc000f40ce0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:03.968 UTC [cauthdsl] func2 -> DEBU 14cd 0xc000f40ce0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:03.968 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14ce Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-05-02 09:28:03.969 UTC [msp] Validate -> DEBU 14cf MSP OrdererMSP validating identity" +"2019-05-02 09:28:03.969 UTC [cauthdsl] func2 -> DEBU 14d0 0xc000f40ce0 principal matched by identity 0" +"2019-05-02 09:28:03.969 UTC [msp.identity] Verify -> DEBU 14d1 Verify: digest = 00000000 ee 16 cd a5 d4 21 24 67 68 81 7d 03 6e 9c 38 ef |.....!$gh.}.n.8.| +00000010 e9 00 7f a0 5b 31 09 e4 f2 2a c3 f4 8c 3f 33 f6 |....[1...*...?3.|" +"2019-05-02 09:28:03.970 UTC [msp.identity] Verify -> DEBU 14d2 Verify: sig = 00000000 30 45 02 21 00 b5 41 bd ed 21 97 bc c2 3a d9 a4 |0E.!..A..!...:..| +00000010 5d 1d 40 a2 44 9c 84 8a 70 3a 7d 04 cf 03 5f 51 |].@.D...p:}..._Q| +00000020 60 44 a8 fb e8 02 20 0a d3 c5 d1 4b 45 a6 76 26 |`D.... ....KE.v&| +00000030 f3 8a f0 be 0d 0d e8 b9 fd 97 27 13 40 da ef 59 |..........'.@..Y| +00000040 9b 10 bb ec fa 93 92 |.......|" +"2019-05-02 09:28:03.970 UTC [cauthdsl] func2 -> DEBU 14d3 0xc000f40ce0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:03.971 UTC [cauthdsl] func1 -> DEBU 14d4 0xc000f40ce0 gate 1556789283968350700 evaluation succeeds" +"2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d7 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14d9 Signature set satisfies policy /Channel/Writers" +"2019-05-02 09:28:03.971 UTC [policies] Evaluate -> DEBU 14da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-05-02 09:28:03.972 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 14db [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.8:57384" +"2019-05-02 09:28:03.972 UTC [orderer.consensus.etcdraft] propose -> INFO 14dc Created block [9], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-05-02 09:28:03.974 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 14dd Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-05-02 09:28:03.974 UTC [orderer.consensus.etcdraft] 2 -> DEBU 14de Proposed block [9] to raft consensus" channel=businesschannel node=1 +"2019-05-02 09:28:03.976 UTC [orderer.common.broadcast] Handle -> WARN 14df Error reading from 172.18.0.8:57384: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:03.976 UTC [orderer.common.server] func1 -> DEBU 14e0 Closing Broadcast stream" +"2019-05-02 09:28:03.976 UTC [comm.grpc.server] 1 -> INFO 14e1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.8:57384 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=81.2501ms +"2019-05-02 09:28:03.976 UTC [grpc] infof -> DEBU 14e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:03.976 UTC [common.deliver] Handle -> WARN 14e3 Error reading from 172.18.0.8:57382: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:03.976 UTC [orderer.common.server] func1 -> DEBU 14e4 Closing Deliver stream" +"2019-05-02 09:28:03.976 UTC [comm.grpc.server] 1 -> INFO 14e5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57382 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=95.981ms +"2019-05-02 09:28:03.976 UTC [grpc] infof -> DEBU 14e6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:03.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e7 Sending msg of 33999 bytes to 2 on channel businesschannel took 20.1µs" +"2019-05-02 09:28:03.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e8 Sending msg of 33999 bytes to 3 on channel businesschannel took 23.2µs" +"2019-05-02 09:28:03.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e9 Send of ConsensusRequest for channel businesschannel with payload of size 33999 to orderer2.example.com(orderer2.example.com:7050) took 217.2µs " +"2019-05-02 09:28:03.979 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ea Send of ConsensusRequest for channel businesschannel with payload of size 33999 to orderer1.example.com(orderer1.example.com:7050) took 127.3µs " +"2019-05-02 09:28:03.987 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14eb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:03.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ec Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +"2019-05-02 09:28:03.989 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ed Sending msg of 28 bytes to 3 on channel businesschannel took 122µs" +"2019-05-02 09:28:03.989 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +"2019-05-02 09:28:03.989 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 14ef Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=1 +"2019-05-02 09:28:03.990 UTC [common.configtx] addToMap -> DEBU 14f0 Adding to config map: [Group] /Channel" +"2019-05-02 09:28:03.992 UTC [common.configtx] addToMap -> DEBU 14f1 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:28:03.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f2 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:03.992 UTC [common.configtx] addToMap -> DEBU 14f3 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:28:04.001 UTC [common.configtx] addToMap -> DEBU 14f5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:28:04.001 UTC [common.configtx] addToMap -> DEBU 14f6 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:28:04.012 UTC [common.configtx] addToMap -> DEBU 14f7 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:28:04.014 UTC [common.configtx] addToMap -> DEBU 14fa Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:28:04.014 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:03.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.8µs " +"2019-05-02 09:28:04.014 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:04.015 UTC [common.configtx] addToMap -> DEBU 14fb Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:28:04.016 UTC [common.configtx] addToMap -> DEBU 14fc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:28:04.017 UTC [common.configtx] addToMap -> DEBU 14fd Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:28:04.017 UTC [common.configtx] addToMap -> DEBU 14fe Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 14ff Adding to config map: [Group] /Channel" +"2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 1500 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 1501 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:28:04.018 UTC [common.configtx] addToMap -> DEBU 1502 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1503 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1504 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1505 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-05-02 09:28:04.019 UTC [common.configtx] addToMap -> DEBU 1506 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:04.021 UTC [common.configtx] addToMap -> DEBU 1507 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-05-02 09:28:04.021 UTC [common.configtx] addToMap -> DEBU 1508 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:28:04.022 UTC [common.configtx] addToMap -> DEBU 1509 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:28:04.022 UTC [common.configtx] addToMap -> DEBU 150a Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:28:04.022 UTC [common.configtx] addToMap -> DEBU 150b Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:28:04.027 UTC [common.configtx] addToMap -> DEBU 150c Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:28:04.028 UTC [common.configtx] addToMap -> DEBU 150d Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:28:04.028 UTC [common.configtx] addToMap -> DEBU 150e Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:28:04.029 UTC [common.configtx] addToMap -> DEBU 150f Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:28:04.029 UTC [common.configtx] verifyDeltaSet -> DEBU 1510 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-05-02 09:28:04.030 UTC [common.configtx] verifyDeltaSet -> DEBU 1511 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-05-02 09:28:04.030 UTC [common.configtx] verifyDeltaSet -> DEBU 1512 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-05-02 09:28:04.030 UTC [common.configtx] verifyDeltaSet -> DEBU 1513 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-05-02 09:28:04.031 UTC [common.configtx] verifyDeltaSet -> DEBU 1514 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:04.031 UTC [common.configtx] verifyDeltaSet -> DEBU 1515 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-05-02 09:28:04.035 UTC [common.configtx] verifyDeltaSet -> DEBU 1516 Processing change to key: [Group] /Channel/Application" +"2019-05-02 09:28:04.036 UTC [common.configtx] policyForItem -> DEBU 1517 Getting policy for item Application with mod_policy Admins" +"2019-05-02 09:28:04.038 UTC [policies] Manager -> DEBU 1518 Manager Channel looking up path []" +"2019-05-02 09:28:04.041 UTC [policies] Manager -> DEBU 1519 Manager Channel has managers Application" +"2019-05-02 09:28:04.042 UTC [policies] Manager -> DEBU 151a Manager Channel has managers Orderer" +"2019-05-02 09:28:04.042 UTC [policies] Manager -> DEBU 151b Manager Channel looking up path [Application]" +"2019-05-02 09:28:04.042 UTC [policies] Manager -> DEBU 151c Manager Channel has managers Application" +"2019-05-02 09:28:04.043 UTC [policies] Manager -> DEBU 151d Manager Channel has managers Orderer" +"2019-05-02 09:28:04.043 UTC [policies] Manager -> DEBU 151e Manager Channel/Application looking up path []" +"2019-05-02 09:28:04.044 UTC [policies] Manager -> DEBU 151f Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:28:04.044 UTC [policies] Manager -> DEBU 1520 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:28:04.045 UTC [policies] Evaluate -> DEBU 1521 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-05-02 09:28:04.047 UTC [policies] Evaluate -> DEBU 1522 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.048 UTC [policies] Evaluate -> DEBU 1523 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-05-02 09:28:04.048 UTC [cauthdsl] deduplicate -> WARN 1524 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-05-02 09:28:04.056 UTC [cauthdsl] func1 -> DEBU 1525 0xc001284ab0 gate 1556789284056859400 evaluation starts" +"2019-05-02 09:28:04.057 UTC [cauthdsl] func2 -> DEBU 1526 0xc001284ab0 signed by 0 principal evaluation starts (used [false false false])" +"2019-05-02 09:28:04.057 UTC [cauthdsl] func2 -> DEBU 1527 0xc001284ab0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:04.060 UTC [cauthdsl] func2 -> DEBU 1528 0xc001284ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-05-02 09:28:04.061 UTC [cauthdsl] func2 -> DEBU 1529 0xc001284ab0 processing identity 1 with bytes of efef60" +"2019-05-02 09:28:04.061 UTC [cauthdsl] func2 -> DEBU 152a 0xc001284ab0 principal matched by identity 1" +"2019-05-02 09:28:04.062 UTC [msp.identity] Verify -> DEBU 152b Verify: digest = 00000000 70 27 54 c7 10 65 06 23 74 50 fc 01 20 7a 9f 22 |p'T..e.#tP.. z."| +00000010 df 75 70 9a b8 8e 15 04 cc 2d a3 ad 5e 15 ee 89 |.up......-..^...|" +"2019-05-02 09:28:04.065 UTC [msp.identity] Verify -> DEBU 152c Verify: sig = 00000000 30 44 02 20 3e 34 30 a7 7a 34 94 d8 b3 73 97 db |0D. >40.z4...s..| +00000010 96 da 10 13 46 64 57 5e af 8c ec ad 13 2e 72 23 |....FdW^......r#| +00000020 12 36 e1 a7 02 20 67 6b 69 65 0e 27 d7 39 1b e1 |.6... gkie.'.9..| +00000030 07 2a cf 5f b4 cf 8d 8d 2e 70 bf ed ec 66 7c 6b |.*._.....p...f|k| +00000040 a3 af 89 d2 b2 af |......|" +"2019-05-02 09:28:04.066 UTC [cauthdsl] func2 -> DEBU 152d 0xc001284ab0 principal evaluation succeeds for identity 1" +"2019-05-02 09:28:04.071 UTC [cauthdsl] func1 -> DEBU 152e 0xc001284ab0 gate 1556789284056859400 evaluation succeeds" +"2019-05-02 09:28:04.071 UTC [policies] Evaluate -> DEBU 152f Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:28:04.072 UTC [policies] Evaluate -> DEBU 1530 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:28:04.072 UTC [policies] Evaluate -> DEBU 1531 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-05-02 09:28:04.074 UTC [cauthdsl] deduplicate -> WARN 1532 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-05-02 09:28:04.075 UTC [cauthdsl] func1 -> DEBU 1533 0xc0012850e0 gate 1556789284075081800 evaluation starts" +"2019-05-02 09:28:04.075 UTC [cauthdsl] func2 -> DEBU 1534 0xc0012850e0 signed by 0 principal evaluation starts (used [false false false])" +"2019-05-02 09:28:04.076 UTC [cauthdsl] func2 -> DEBU 1535 0xc0012850e0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:04.076 UTC [cauthdsl] func2 -> DEBU 1536 0xc0012850e0 principal matched by identity 0" +"2019-05-02 09:28:04.079 UTC [msp.identity] Verify -> DEBU 1537 Verify: digest = 00000000 55 f0 c2 94 3a 37 23 eb d0 1b da 18 4a 66 45 b5 |U...:7#.....JfE.| +00000010 54 12 61 d1 4b ae fe 57 e9 51 94 57 aa af 68 17 |T.a.K..W.Q.W..h.|" +"2019-05-02 09:28:04.079 UTC [msp.identity] Verify -> DEBU 1538 Verify: sig = 00000000 30 45 02 21 00 ef 26 69 f6 43 cc ea 70 a5 61 8d |0E.!..&i.C..p.a.| +00000010 ff a4 ff 24 9b 2c 47 7c 14 f4 82 75 2d 27 b6 b0 |...$.,G|...u-'..| +00000020 a2 6a 68 25 32 02 20 23 80 40 b2 b7 b1 c9 60 08 |.jh%2. #.@....`.| +00000030 cd 4e 09 a9 3c 63 75 29 2f 85 61 35 08 11 df c6 |.N.. DEBU 1539 0xc0012850e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.080 UTC [cauthdsl] func1 -> DEBU 153a 0xc0012850e0 gate 1556789284075081800 evaluation succeeds" +"2019-05-02 09:28:04.080 UTC [policies] Evaluate -> DEBU 153b Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:28:04.093 UTC [policies] Evaluate -> DEBU 153c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:28:04.093 UTC [policies] Evaluate -> DEBU 153d Signature set satisfies policy /Channel/Application/Admins" +"2019-05-02 09:28:04.093 UTC [policies] Evaluate -> DEBU 153e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-05-02 09:28:04.094 UTC [common.configtx] recurseConfigMap -> DEBU 153f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.094 UTC [common.configtx] recurseConfigMap -> DEBU 1540 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.095 UTC [common.configtx] recurseConfigMap -> DEBU 1541 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.096 UTC [common.configtx] recurseConfigMap -> DEBU 1542 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.096 UTC [common.configtx] recurseConfigMap -> DEBU 1543 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1544 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1545 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1546 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 1547 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.099 UTC [common.configtx] recurseConfigMap -> DEBU 1548 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 1549 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 154a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 154b Setting policy for key Writers to " +"2019-05-02 09:28:04.100 UTC [common.configtx] recurseConfigMap -> DEBU 154c Setting policy for key Admins to " +"2019-05-02 09:28:04.102 UTC [common.configtx] recurseConfigMap -> DEBU 154d Setting policy for key Endorsement to " +"2019-05-02 09:28:04.102 UTC [common.configtx] recurseConfigMap -> DEBU 154e Setting policy for key LifecycleEndorsement to " +"2019-05-02 09:28:04.102 UTC [common.configtx] recurseConfigMap -> DEBU 154f Setting policy for key Readers to " +"2019-05-02 09:28:04.103 UTC [common.configtx] recurseConfigMap -> DEBU 1550 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.103 UTC [common.configtx] recurseConfigMap -> DEBU 1551 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.104 UTC [common.configtx] recurseConfigMap -> DEBU 1552 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1553 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1554 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1555 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1556 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.114 UTC [common.configtx] recurseConfigMap -> DEBU 1557 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.115 UTC [common.configtx] recurseConfigMap -> DEBU 1558 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.115 UTC [common.configtx] recurseConfigMap -> DEBU 1559 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.115 UTC [common.channelconfig] NewStandardValues -> DEBU 155a Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:28:04.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155b Processing field: HashingAlgorithm" +"2019-05-02 09:28:04.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155c Processing field: BlockDataHashingStructure" +"2019-05-02 09:28:04.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155d Processing field: OrdererAddresses" +"2019-05-02 09:28:04.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155e Processing field: Consortium" +"2019-05-02 09:28:04.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155f Processing field: Capabilities" +"2019-05-02 09:28:04.116 UTC [common.channelconfig] NewStandardValues -> DEBU 1560 Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:28:04.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1561 Processing field: ACLs" +"2019-05-02 09:28:04.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1562 Processing field: Capabilities" +"2019-05-02 09:28:04.117 UTC [common.channelconfig] NewStandardValues -> DEBU 1563 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:28:04.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1564 Processing field: AnchorPeers" +"2019-05-02 09:28:04.117 UTC [common.channelconfig] NewStandardValues -> DEBU 1565 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:04.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1566 Processing field: MSP" +"2019-05-02 09:28:04.117 UTC [common.channelconfig] Validate -> DEBU 1567 Anchor peers for org Org2MSP are anchor_peers: " +"2019-05-02 09:28:04.117 UTC [common.channelconfig] validateMSP -> DEBU 1568 Setting up MSP for org Org2MSP" +"2019-05-02 09:28:04.118 UTC [msp] newBccspMsp -> DEBU 1569 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:04.118 UTC [msp] New -> DEBU 156a Creating Cache-MSP instance" +"2019-05-02 09:28:04.118 UTC [msp] Setup -> DEBU 156b Setting up MSP instance Org2MSP" +"2019-05-02 09:28:04.118 UTC [msp.identity] newIdentity -> DEBU 156c Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7524,7 +7347,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:31:35.085 UTC [msp.identity] newIdentity -> DEBU 15ab Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:04.119 UTC [msp.identity] newIdentity -> DEBU 156d Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7538,261 +7361,130 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:31:35.086 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15ac Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:31:35.086 UTC [msp] Validate -> DEBU 15ad MSP Org2MSP validating identity" -"2019-05-02 01:31:35.087 UTC [msp] getCertificationChain -> DEBU 15ae MSP Org2MSP getting certification chain" -"2019-05-02 01:31:35.087 UTC [msp] hasOURole -> DEBU 15af MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:31:35.087 UTC [msp] getCertificationChain -> DEBU 15b0 MSP Org2MSP getting certification chain" -"2019-05-02 01:31:35.087 UTC [msp] Setup -> DEBU 15b1 Setting up the MSP manager (4 msps)" -"2019-05-02 01:31:35.088 UTC [msp] Setup -> DEBU 15b2 MSP manager setup complete, setup 4 msps" -"2019-05-02 01:31:35.088 UTC [policies] NewManagerImpl -> DEBU 15b3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:35.088 UTC [policies] NewManagerImpl -> DEBU 15b4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:35.088 UTC [policies] NewManagerImpl -> DEBU 15b5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:35.089 UTC [policies] NewManagerImpl -> DEBU 15b6 Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:31:35.089 UTC [policies] NewManagerImpl -> DEBU 15b7 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:31:35.090 UTC [policies] NewManagerImpl -> DEBU 15b8 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:31:35.090 UTC [policies] NewManagerImpl -> DEBU 15b9 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:31:35.090 UTC [policies] NewManagerImpl -> DEBU 15ba Proposed new policy Readers for Channel/Application/Org3MSP" -"2019-05-02 01:31:35.090 UTC [policies] NewManagerImpl -> DEBU 15bb Proposed new policy Writers for Channel/Application/Org3MSP" -"2019-05-02 01:31:35.091 UTC [policies] NewManagerImpl -> DEBU 15bc Proposed new policy Admins for Channel/Application/Org3MSP" -"2019-05-02 01:31:35.091 UTC [policies] NewManagerImpl -> DEBU 15bd Proposed new policy Endorsement for Channel/Application/Org3MSP" -"2019-05-02 01:31:35.091 UTC [policies] NewManagerImpl -> DEBU 15be Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:31:35.091 UTC [policies] NewManagerImpl -> DEBU 15bf Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:31:35.092 UTC [policies] NewManagerImpl -> DEBU 15c0 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:31:35.092 UTC [policies] NewManagerImpl -> DEBU 15c1 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:31:35.092 UTC [policies] NewManagerImpl -> DEBU 15c2 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:31:35.092 UTC [policies] NewManagerImpl -> DEBU 15c3 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:31:35.092 UTC [policies] NewManagerImpl -> DEBU 15c4 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15c5 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15c6 Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15c7 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15c8 Proposed new policy Readers for Channel/Application" -"2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15c9 Proposed new policy Writers for Channel/Application" -"2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15ca Proposed new policy Admins for Channel/Application" -"2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15cb Proposed new policy Admins for Channel" -"2019-05-02 01:31:35.093 UTC [policies] NewManagerImpl -> DEBU 15cc Proposed new policy Readers for Channel" -"2019-05-02 01:31:35.094 UTC [policies] NewManagerImpl -> DEBU 15cd Proposed new policy Writers for Channel" -"2019-05-02 01:31:35.094 UTC [common.configtx] addToMap -> DEBU 15ce Adding to config map: [Group] /Channel" -"2019-05-02 01:31:35.094 UTC [common.configtx] addToMap -> DEBU 15cf Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:31:35.094 UTC [common.configtx] addToMap -> DEBU 15d0 Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-05-02 01:31:35.094 UTC [common.configtx] addToMap -> DEBU 15d1 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-05-02 01:31:35.094 UTC [common.configtx] addToMap -> DEBU 15d2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d4 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d6 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d7 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:31:35.095 UTC [common.configtx] addToMap -> DEBU 15d9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15da Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15db Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15dc Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15dd Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15de Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15df Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:31:35.096 UTC [common.configtx] addToMap -> DEBU 15e0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:31:35.097 UTC [common.configtx] addToMap -> DEBU 15e1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.098 UTC [common.configtx] addToMap -> DEBU 15e2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:35.098 UTC [common.configtx] addToMap -> DEBU 15e3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:31:35.098 UTC [common.configtx] addToMap -> DEBU 15e4 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:31:35.098 UTC [common.configtx] addToMap -> DEBU 15e5 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:31:35.098 UTC [common.configtx] addToMap -> DEBU 15e6 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:31:35.099 UTC [common.configtx] addToMap -> DEBU 15e7 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:31:35.099 UTC [common.configtx] addToMap -> DEBU 15e8 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:31:35.099 UTC [common.configtx] addToMap -> DEBU 15e9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:35.100 UTC [common.configtx] addToMap -> DEBU 15ea Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:31:35.100 UTC [common.configtx] addToMap -> DEBU 15eb Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:31:35.100 UTC [common.configtx] addToMap -> DEBU 15ec Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:35.100 UTC [common.configtx] addToMap -> DEBU 15ed Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:31:35.100 UTC [common.configtx] addToMap -> DEBU 15ee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:35.101 UTC [common.configtx] addToMap -> DEBU 15ef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:35.101 UTC [common.configtx] addToMap -> DEBU 15f0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:31:35.101 UTC [common.configtx] addToMap -> DEBU 15f1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:31:35.101 UTC [common.configtx] addToMap -> DEBU 15f2 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:31:35.101 UTC [common.configtx] addToMap -> DEBU 15f3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:31:35.102 UTC [common.configtx] addToMap -> DEBU 15f4 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:31:35.102 UTC [common.configtx] addToMap -> DEBU 15f5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:31:35.102 UTC [common.configtx] addToMap -> DEBU 15f6 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:31:35.103 UTC [common.configtx] addToMap -> DEBU 15f7 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:31:35.103 UTC [common.configtx] addToMap -> DEBU 15f8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:35.103 UTC [common.configtx] addToMap -> DEBU 15f9 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:31:35.103 UTC [common.configtx] addToMap -> DEBU 15fa Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:31:35.104 UTC [common.configtx] addToMap -> DEBU 15fb Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:31:35.104 UTC [common.configtx] addToMap -> DEBU 15fc Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:31:35.104 UTC [common.configtx] addToMap -> DEBU 15fd Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:31:35.105 UTC [common.configtx] addToMap -> DEBU 15fe Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:31:35.105 UTC [common.configtx] addToMap -> DEBU 15ff Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:31:35.105 UTC [common.configtx] addToMap -> DEBU 1600 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:31:35.105 UTC [common.configtx] addToMap -> DEBU 1601 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:31:35.105 UTC [common.channelconfig] LogSanityChecks -> DEBU 1602 As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:31:35.105 UTC [common.channelconfig] LogSanityChecks -> DEBU 1603 As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:31:35.105 UTC [policies] Manager -> DEBU 1604 Manager Channel looking up path [Application]" -"2019-05-02 01:31:35.105 UTC [policies] Manager -> DEBU 1605 Manager Channel has managers Orderer" -"2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1606 Manager Channel has managers Application" -"2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1607 Manager Channel/Application looking up path []" -"2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1608 Manager Channel/Application has managers Org3MSP" -"2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1609 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 160a Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:31:35.106 UTC [common.channelconfig] LogSanityChecks -> DEBU 160b As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:31:35.106 UTC [common.channelconfig] LogSanityChecks -> DEBU 160c As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:31:35.106 UTC [common.channelconfig] LogSanityChecks -> DEBU 160d As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 160e Manager Channel looking up path [Orderer]" -"2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 160f Manager Channel has managers Orderer" -"2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1610 Manager Channel has managers Application" -"2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1611 Manager Channel/Orderer looking up path []" -"2019-05-02 01:31:35.106 UTC [policies] Manager -> DEBU 1612 Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:31:35.106 UTC [common.channelconfig] LogSanityChecks -> DEBU 1613 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:31:35.106 UTC [common.capabilities] Supported -> DEBU 1614 Orderer capability V2_0 is supported and is enabled" -"2019-05-02 01:31:35.107 UTC [common.capabilities] Supported -> DEBU 1615 Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:31:35.107 UTC [orderer.common.server] func1 -> DEBU 1616 Executing callback to update root CAs" -"2019-05-02 01:31:35.107 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1617 updating root CAs for channel [businesschannel]" -"2019-05-02 01:31:35.107 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1618 adding orderer root CAs for MSP [OrdererMSP]" -"2019-05-02 01:31:35.107 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1619 adding app root CAs for MSP [Org3MSP]" -"2019-05-02 01:31:35.107 UTC [orderer.common.server] updateTrustedRoots -> DEBU 161a adding app root CAs for MSP [Org1MSP]" -"2019-05-02 01:31:35.107 UTC [orderer.common.server] updateTrustedRoots -> DEBU 161b adding app root CAs for MSP [Org2MSP]" -"2019-05-02 01:31:35.108 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 161c [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 9" -"2019-05-02 01:31:35.109 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 161d [channel: businesschannel] About to write block, setting its LAST_CONFIG to 9" -"2019-05-02 01:31:35.109 UTC [msp.identity] Sign -> DEBU 161e Sign: plaintext: 0A020809120B0A090A03010203100418...EF1CD0CD8A5A7DB4F31A36B52ABE38C7 " -"2019-05-02 01:31:35.109 UTC [msp.identity] Sign -> DEBU 161f Sign: digest: 6F0AB425F597FDC657AB29B4870EAF3578EA57ED11030A5D5560D5F792DC1755 " -"2019-05-02 01:31:35.115 UTC [fsblkstorage] indexBlock -> DEBU 1620 Indexing block [blockNum=9, blockHash=[]byte{0x9a, 0x83, 0x39, 0x88, 0xb6, 0x7a, 0x70, 0x8, 0xe7, 0x16, 0x79, 0x57, 0x8, 0x1e, 0x62, 0x7b, 0xd4, 0x43, 0x19, 0x39, 0xb0, 0x8, 0xfe, 0x2, 0x20, 0xae, 0x67, 0xae, 0xf2, 0x52, 0x17, 0x2b} txOffsets= -txId= locPointer=offset=71, bytesLength=33992 -]" -"2019-05-02 01:31:35.119 UTC [fsblkstorage] updateCheckpoint -> DEBU 1621 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133666], isChainEmpty=[false], lastBlockNumber=[9]" -"2019-05-02 01:31:35.120 UTC [fsblkstorage] waitForBlock -> DEBU 1622 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:35.120 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1623 Remaining bytes=[35000], Going to peek [8] bytes" -"2019-05-02 01:31:35.121 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1624 Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -"2019-05-02 01:31:35.121 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1625 blockbytes [34997] read from file [0]" -"2019-05-02 01:31:35.121 UTC [policies] Evaluate -> DEBU 1626 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:35.122 UTC [policies] Evaluate -> DEBU 1627 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.122 UTC [policies] Evaluate -> DEBU 1628 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:35.122 UTC [policies] Evaluate -> DEBU 1629 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.123 UTC [policies] Evaluate -> DEBU 162a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:35.123 UTC [msp] DeserializeIdentity -> DEBU 162b Obtaining identity" -"2019-05-02 01:31:35.123 UTC [msp.identity] newIdentity -> DEBU 162c Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +"2019-05-02 09:28:04.120 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 156e Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:28:04.120 UTC [msp] Validate -> DEBU 156f MSP Org2MSP validating identity" +"2019-05-02 09:28:04.120 UTC [msp] getCertificationChain -> DEBU 1570 MSP Org2MSP getting certification chain" +"2019-05-02 09:28:04.121 UTC [msp] hasOURole -> DEBU 1571 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:28:04.121 UTC [msp] getCertificationChain -> DEBU 1572 MSP Org2MSP getting certification chain" +"2019-05-02 09:28:04.126 UTC [common.channelconfig] NewStandardValues -> DEBU 1573 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:28:04.126 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1574 Processing field: AnchorPeers" +"2019-05-02 09:28:04.126 UTC [common.channelconfig] NewStandardValues -> DEBU 1575 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:04.126 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1576 Processing field: MSP" +"2019-05-02 09:28:04.127 UTC [common.channelconfig] Validate -> DEBU 1577 Anchor peers for org Org3MSP are " +"2019-05-02 09:28:04.127 UTC [common.channelconfig] validateMSP -> DEBU 1578 Setting up MSP for org Org3MSP" +"2019-05-02 09:28:04.129 UTC [msp] newBccspMsp -> DEBU 1579 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:04.129 UTC [msp] New -> DEBU 157a Creating Cache-MSP instance" +"2019-05-02 09:28:04.130 UTC [msp] Setup -> DEBU 157b Setting up MSP instance Org3MSP" +"2019-05-02 09:28:04.135 UTC [msp.identity] newIdentity -> DEBU 157c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== -----END CERTIFICATE-----" -"2019-05-02 01:31:35.124 UTC [cauthdsl] func1 -> DEBU 162d 0xc0011c2730 gate 1556760695124116600 evaluation starts" -"2019-05-02 01:31:35.124 UTC [cauthdsl] func2 -> DEBU 162e 0xc0011c2730 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.124 UTC [cauthdsl] func2 -> DEBU 162f 0xc0011c2730 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:35.124 UTC [cauthdsl] func2 -> DEBU 1630 0xc0011c2730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -"2019-05-02 01:31:35.124 UTC [cauthdsl] func2 -> DEBU 1631 0xc0011c2730 principal evaluation fails" -"2019-05-02 01:31:35.126 UTC [cauthdsl] func1 -> DEBU 1632 0xc0011c2730 gate 1556760695124116600 evaluation fails" -"2019-05-02 01:31:35.126 UTC [policies] Evaluate -> DEBU 1633 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:35.127 UTC [policies] Evaluate -> DEBU 1634 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:35.127 UTC [policies] func1 -> DEBU 1635 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -"2019-05-02 01:31:35.127 UTC [policies] Evaluate -> DEBU 1636 Signature set did not satisfy policy /Channel/Orderer/Readers" -"2019-05-02 01:31:35.127 UTC [policies] Evaluate -> DEBU 1637 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:35.128 UTC [policies] Evaluate -> DEBU 1638 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.128 UTC [policies] Evaluate -> DEBU 1639 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.128 UTC [policies] Evaluate -> DEBU 163a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-05-02 01:31:35.129 UTC [cauthdsl] func1 -> DEBU 163b 0xc0011c3d60 gate 1556760695129026500 evaluation starts" -"2019-05-02 01:31:35.129 UTC [cauthdsl] func2 -> DEBU 163c 0xc0011c3d60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.129 UTC [cauthdsl] func2 -> DEBU 163d 0xc0011c3d60 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:35.129 UTC [cauthdsl] func2 -> DEBU 163e 0xc0011c3d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-05-02 01:31:35.130 UTC [cauthdsl] func2 -> DEBU 163f 0xc0011c3d60 principal evaluation fails" -"2019-05-02 01:31:35.131 UTC [cauthdsl] func2 -> DEBU 1640 0xc0011c3d60 signed by 1 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.131 UTC [cauthdsl] func2 -> DEBU 1641 0xc0011c3d60 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:35.131 UTC [cauthdsl] func2 -> DEBU 1642 0xc0011c3d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-05-02 01:31:35.131 UTC [cauthdsl] func2 -> DEBU 1643 0xc0011c3d60 principal evaluation fails" -"2019-05-02 01:31:35.131 UTC [cauthdsl] func2 -> DEBU 1644 0xc0011c3d60 signed by 2 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.132 UTC [cauthdsl] func2 -> DEBU 1645 0xc0011c3d60 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:35.132 UTC [cauthdsl] func2 -> DEBU 1646 0xc0011c3d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-05-02 01:31:35.132 UTC [cauthdsl] func2 -> DEBU 1647 0xc0011c3d60 principal evaluation fails" -"2019-05-02 01:31:35.132 UTC [cauthdsl] func1 -> DEBU 1648 0xc0011c3d60 gate 1556760695129026500 evaluation fails" -"2019-05-02 01:31:35.132 UTC [policies] Evaluate -> DEBU 1649 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:35.132 UTC [policies] Evaluate -> DEBU 164a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:35.133 UTC [policies] Evaluate -> DEBU 164b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:35.133 UTC [cauthdsl] func1 -> DEBU 164c 0xc000ddad00 gate 1556760695133372200 evaluation starts" -"2019-05-02 01:31:35.133 UTC [cauthdsl] func2 -> DEBU 164d 0xc000ddad00 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.133 UTC [cauthdsl] func2 -> DEBU 164e 0xc000ddad00 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:35.134 UTC [cauthdsl] func2 -> DEBU 164f 0xc000ddad00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:35.134 UTC [cauthdsl] func2 -> DEBU 1650 0xc000ddad00 principal evaluation fails" -"2019-05-02 01:31:35.135 UTC [cauthdsl] func1 -> DEBU 1651 0xc000ddad00 gate 1556760695133372200 evaluation fails" -"2019-05-02 01:31:35.135 UTC [policies] Evaluate -> DEBU 1652 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.135 UTC [policies] Evaluate -> DEBU 1653 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.135 UTC [policies] Evaluate -> DEBU 1654 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.135 UTC [cauthdsl] func1 -> DEBU 1655 0xc000ddb560 gate 1556760695135844400 evaluation starts" -"2019-05-02 01:31:35.144 UTC [cauthdsl] func2 -> DEBU 1656 0xc000ddb560 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.145 UTC [cauthdsl] func2 -> DEBU 1657 0xc000ddb560 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:35.146 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1658 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:31:35.147 UTC [msp] Validate -> DEBU 1659 MSP Org2MSP validating identity" -"2019-05-02 01:31:35.148 UTC [msp] getCertificationChain -> DEBU 165a MSP Org2MSP getting certification chain" -"2019-05-02 01:31:35.119 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 165b [channel: businesschannel] Wrote block [9]" -"2019-05-02 01:31:35.154 UTC [cauthdsl] func2 -> DEBU 165c 0xc000ddb560 principal matched by identity 0" -"2019-05-02 01:31:35.157 UTC [msp.identity] Verify -> DEBU 165d Verify: digest = 00000000 7c 7a ed 35 86 0f 34 87 51 98 60 f1 d9 93 38 6f ||z.5..4.Q.`...8o| -00000010 9f 37 a4 52 89 2b f2 79 8a c9 80 63 e2 73 5f 82 |.7.R.+.y...c.s_.|" -"2019-05-02 01:31:35.160 UTC [msp.identity] Verify -> DEBU 165e Verify: sig = 00000000 30 44 02 20 00 b9 4b ec d5 9c bb 15 46 17 08 94 |0D. ..K.....F...| -00000010 16 69 a1 e9 ce 7d ed 29 d3 72 2e de 98 9a ff a5 |.i...}.).r......| -00000020 ce 04 5e 8d 02 20 04 31 6b d0 ef 45 61 23 82 ce |..^.. .1k..Ea#..| -00000030 47 e2 a7 ec 34 90 1b f7 bf 91 86 e3 73 93 bf 0f |G...4.......s...| -00000040 69 ad df e2 47 71 |i...Gq|" -"2019-05-02 01:31:35.161 UTC [cauthdsl] func2 -> DEBU 165f 0xc000ddb560 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.162 UTC [cauthdsl] func1 -> DEBU 1660 0xc000ddb560 gate 1556760695135844400 evaluation succeeds" -"2019-05-02 01:31:35.164 UTC [policies] Evaluate -> DEBU 1661 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.164 UTC [policies] Evaluate -> DEBU 1662 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.166 UTC [policies] Evaluate -> DEBU 1663 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.166 UTC [policies] Evaluate -> DEBU 1664 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.167 UTC [policies] Evaluate -> DEBU 1665 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:35.171 UTC [policies] Evaluate -> DEBU 1666 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:35.171 UTC [common.deliver] deliverBlocks -> DEBU 1667 [channel: businesschannel] Delivering block [9] for (0xc0008bfb80) for 192.168.240.5:58984" -"2019-05-02 01:31:35.172 UTC [fsblkstorage] waitForBlock -> DEBU 1668 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:35.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1669 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" -"2019-05-02 01:31:35.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 453.2µs " -"2019-05-02 01:31:35.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166b Sending msg of 28 bytes to 3 on channel businesschannel took 138.4µs" -"2019-05-02 01:31:35.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 338.8µs " -"2019-05-02 01:31:35.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 166d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:35.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166e Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" -"2019-05-02 01:31:35.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " -"2019-05-02 01:31:35.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1670 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:35.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1671 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:36.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1672 Sending msg of 28 bytes to 2 on channel businesschannel took 191.6µs" -"2019-05-02 01:31:36.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1673 Sending msg of 28 bytes to 3 on channel businesschannel took 47.5µs" -"2019-05-02 01:31:36.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1674 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84µs " -"2019-05-02 01:31:36.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1675 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 843.5µs " -"2019-05-02 01:31:36.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1676 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:36.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1677 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:36.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1678 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:36.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1679 Sending msg of 28 bytes to 3 on channel testchainid took 18µs" -"2019-05-02 01:31:36.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 437.8µs " -"2019-05-02 01:31:36.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167b Sending msg of 28 bytes to 2 on channel businesschannel took 36.6µs" -"2019-05-02 01:31:36.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167c Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" -"2019-05-02 01:31:36.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.5µs " -"2019-05-02 01:31:36.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7377ms " -"2019-05-02 01:31:36.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:36.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1680 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:36.507 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1682 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" -"2019-05-02 01:31:36.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1681 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:36.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1683 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.7µs " -"2019-05-02 01:31:37.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1684 Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" -"2019-05-02 01:31:37.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1686 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" -"2019-05-02 01:31:37.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1687 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.4µs " -"2019-05-02 01:31:37.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1685 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 587.1µs " -"2019-05-02 01:31:37.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1688 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:37.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1689 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:37.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 168a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:37.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 168b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " -"2019-05-02 01:31:37.008 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 168c Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" -"2019-05-02 01:31:37.104 UTC [orderer.common.server] Deliver -> DEBU 168d Starting new Deliver handler" -"2019-05-02 01:31:37.104 UTC [common.deliver] Handle -> DEBU 168e Starting new deliver loop for 192.168.240.9:47540" -"2019-05-02 01:31:37.104 UTC [common.deliver] Handle -> DEBU 168f Attempting to read seek info message from 192.168.240.9:47540" -"2019-05-02 01:31:37.105 UTC [policies] Evaluate -> DEBU 1690 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:37.105 UTC [policies] Evaluate -> DEBU 1691 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.105 UTC [policies] Evaluate -> DEBU 1692 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:37.106 UTC [policies] Evaluate -> DEBU 1693 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.106 UTC [policies] Evaluate -> DEBU 1694 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:37.106 UTC [msp] DeserializeIdentity -> DEBU 1695 Obtaining identity" -"2019-05-02 01:31:37.106 UTC [msp.identity] newIdentity -> DEBU 1696 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:04.136 UTC [msp.identity] newIdentity -> DEBU 157d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-05-02 09:28:04.136 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 157e Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-05-02 09:28:04.136 UTC [msp] Validate -> DEBU 157f MSP Org3MSP validating identity" +"2019-05-02 09:28:04.136 UTC [msp] getCertificationChain -> DEBU 1580 MSP Org3MSP getting certification chain" +"2019-05-02 09:28:04.137 UTC [msp] hasOURole -> DEBU 1581 MSP Org3MSP checking if the identity is a client" +"2019-05-02 09:28:04.137 UTC [msp] getCertificationChain -> DEBU 1582 MSP Org3MSP getting certification chain" +"2019-05-02 09:28:04.137 UTC [common.channelconfig] NewStandardValues -> DEBU 1583 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:28:04.137 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1584 Processing field: AnchorPeers" +"2019-05-02 09:28:04.137 UTC [common.channelconfig] NewStandardValues -> DEBU 1585 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:04.137 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1586 Processing field: MSP" +"2019-05-02 09:28:04.137 UTC [common.channelconfig] Validate -> DEBU 1587 Anchor peers for org Org1MSP are anchor_peers: " +"2019-05-02 09:28:04.137 UTC [common.channelconfig] validateMSP -> DEBU 1588 Setting up MSP for org Org1MSP" +"2019-05-02 09:28:04.137 UTC [msp] newBccspMsp -> DEBU 1589 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:04.137 UTC [msp] New -> DEBU 158a Creating Cache-MSP instance" +"2019-05-02 09:28:04.137 UTC [msp] Setup -> DEBU 158b Setting up MSP instance Org1MSP" +"2019-05-02 09:28:04.138 UTC [msp.identity] newIdentity -> DEBU 158c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-05-02 09:28:04.138 UTC [msp.identity] newIdentity -> DEBU 158d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-05-02 09:28:04.139 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 158e Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:28:04.139 UTC [msp] Validate -> DEBU 158f MSP Org1MSP validating identity" +"2019-05-02 09:28:04.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1590 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:04.185 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1591 Sending msg of 28 bytes to 3 on channel testchainid took 29.4µs" +"2019-05-02 09:28:04.185 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1592 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.1µs " +"2019-05-02 09:28:04.139 UTC [msp] getCertificationChain -> DEBU 1593 MSP Org1MSP getting certification chain" +"2019-05-02 09:28:04.200 UTC [msp] hasOURole -> DEBU 1594 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:28:04.200 UTC [msp] getCertificationChain -> DEBU 1595 MSP Org1MSP getting certification chain" +"2019-05-02 09:28:04.200 UTC [common.channelconfig] NewStandardValues -> DEBU 1596 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1597 Processing field: ConsensusType" +"2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1598 Processing field: BatchSize" +"2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1599 Processing field: BatchTimeout" +"2019-05-02 09:28:04.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159a Processing field: KafkaBrokers" +"2019-05-02 09:28:04.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159b Processing field: ChannelRestrictions" +"2019-05-02 09:28:04.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159c Processing field: Capabilities" +"2019-05-02 09:28:04.208 UTC [common.channelconfig] NewStandardValues -> DEBU 159d Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:28:04.208 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159e Processing field: Endpoints" +"2019-05-02 09:28:04.208 UTC [common.channelconfig] NewStandardValues -> DEBU 159f Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:04.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a0 Processing field: MSP" +"2019-05-02 09:28:04.209 UTC [common.channelconfig] validateMSP -> DEBU 15a1 Setting up MSP for org OrdererOrg" +"2019-05-02 09:28:04.209 UTC [msp] newBccspMsp -> DEBU 15a2 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:04.209 UTC [msp] New -> DEBU 15a3 Creating Cache-MSP instance" +"2019-05-02 09:28:04.212 UTC [msp] Setup -> DEBU 15a4 Setting up MSP instance OrdererMSP" +"2019-05-02 09:28:04.216 UTC [msp.identity] newIdentity -> DEBU 15a5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-05-02 09:28:04.219 UTC [msp.identity] newIdentity -> DEBU 15a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -7805,1132 +7497,1712 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:31:37.107 UTC [cauthdsl] func1 -> DEBU 1697 0xc000bd6aa0 gate 1556760697107065500 evaluation starts" -"2019-05-02 01:31:37.107 UTC [cauthdsl] func2 -> DEBU 1698 0xc000bd6aa0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.107 UTC [cauthdsl] func2 -> DEBU 1699 0xc000bd6aa0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:37.107 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 169a Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-05-02 01:31:37.107 UTC [msp] Validate -> DEBU 169b MSP OrdererMSP validating identity" -"2019-05-02 01:31:37.107 UTC [cauthdsl] func2 -> DEBU 169c 0xc000bd6aa0 principal matched by identity 0" -"2019-05-02 01:31:37.107 UTC [msp.identity] Verify -> DEBU 169d Verify: digest = 00000000 32 e1 f7 43 ce fb e0 d5 96 00 4c 9b f4 8a 3d 21 |2..C......L...=!| -00000010 c2 c7 e5 92 ef 87 6c 76 66 3e b9 36 e0 49 f3 08 |......lvf>.6.I..|" -"2019-05-02 01:31:37.108 UTC [msp.identity] Verify -> DEBU 169e Verify: sig = 00000000 30 44 02 20 7b c1 62 92 92 33 72 dd 7b d0 60 e9 |0D. {.b..3r.{.`.| -00000010 9a c7 86 a9 a8 e2 44 ad 5b 79 25 63 a9 08 8d 79 |......D.[y%c...y| -00000020 d8 b9 4a 72 02 20 07 e8 9c 08 c0 db c4 a0 b0 15 |..Jr. ..........| -00000030 6a d6 0c de 18 c4 79 d2 a3 1e fe a9 4d 5b 0e f6 |j.....y.....M[..| -00000040 e2 bd 4f ed 7a d3 |..O.z.|" -"2019-05-02 01:31:37.108 UTC [cauthdsl] func2 -> DEBU 169f 0xc000bd6aa0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:37.108 UTC [cauthdsl] func1 -> DEBU 16a0 0xc000bd6aa0 gate 1556760697107065500 evaluation succeeds" -"2019-05-02 01:31:37.108 UTC [policies] Evaluate -> DEBU 16a1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:37.108 UTC [policies] Evaluate -> DEBU 16a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:37.109 UTC [policies] Evaluate -> DEBU 16a3 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:37.109 UTC [policies] Evaluate -> DEBU 16a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:37.109 UTC [policies] Evaluate -> DEBU 16a5 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:37.109 UTC [policies] Evaluate -> DEBU 16a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:37.109 UTC [common.deliver] deliverBlocks -> DEBU 16a7 [channel: businesschannel] Received seekInfo (0xc00110a480) start: > stop: > from 192.168.240.9:47540" -"2019-05-02 01:31:37.109 UTC [fsblkstorage] Next -> DEBU 16a8 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:37.109 UTC [fsblkstorage] newBlockfileStream -> DEBU 16a9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -"2019-05-02 01:31:37.110 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16aa Remaining bytes=[35000], Going to peek [8] bytes" -"2019-05-02 01:31:37.110 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16ab Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -"2019-05-02 01:31:37.110 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16ac blockbytes [34997] read from file [0]" -"2019-05-02 01:31:37.110 UTC [common.deliver] deliverBlocks -> DEBU 16ad [channel: businesschannel] Delivering block [9] for (0xc00110a480) for 192.168.240.9:47540" -"2019-05-02 01:31:37.110 UTC [common.deliver] deliverBlocks -> DEBU 16ae [channel: businesschannel] Done delivering to 192.168.240.9:47540 for (0xc00110a480)" -"2019-05-02 01:31:37.111 UTC [fsblkstorage] waitForBlock -> DEBU 16af Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:37.111 UTC [fsblkstorage] waitForBlock -> DEBU 16b0 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:37.112 UTC [common.deliver] Handle -> DEBU 16b1 Waiting for new SeekInfo from 192.168.240.9:47540" -"2019-05-02 01:31:37.112 UTC [common.deliver] Handle -> DEBU 16b2 Attempting to read seek info message from 192.168.240.9:47540" -"2019-05-02 01:31:37.119 UTC [common.deliver] Handle -> WARN 16b3 Error reading from 192.168.240.9:47540: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:37.119 UTC [orderer.common.server] func1 -> DEBU 16b4 Closing Deliver stream" -"2019-05-02 01:31:37.119 UTC [comm.grpc.server] 1 -> INFO 16b5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47540 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.1042ms -"2019-05-02 01:31:37.119 UTC [grpc] infof -> DEBU 16b6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:37.232 UTC [orderer.common.server] Deliver -> DEBU 16b7 Starting new Deliver handler" -"2019-05-02 01:31:37.232 UTC [common.deliver] Handle -> DEBU 16b8 Starting new deliver loop for 192.168.240.9:47542" -"2019-05-02 01:31:37.232 UTC [common.deliver] Handle -> DEBU 16b9 Attempting to read seek info message from 192.168.240.9:47542" -"2019-05-02 01:31:37.232 UTC [policies] Evaluate -> DEBU 16ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:37.233 UTC [policies] Evaluate -> DEBU 16bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.233 UTC [policies] Evaluate -> DEBU 16bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:37.233 UTC [policies] Evaluate -> DEBU 16bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.233 UTC [policies] Evaluate -> DEBU 16be == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:37.233 UTC [cauthdsl] func1 -> DEBU 16bf 0xc000c509d0 gate 1556760697233654300 evaluation starts" -"2019-05-02 01:31:37.233 UTC [cauthdsl] func2 -> DEBU 16c0 0xc000c509d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.234 UTC [cauthdsl] func2 -> DEBU 16c1 0xc000c509d0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:37.234 UTC [cauthdsl] func2 -> DEBU 16c2 0xc000c509d0 principal matched by identity 0" -"2019-05-02 01:31:37.234 UTC [msp.identity] Verify -> DEBU 16c3 Verify: digest = 00000000 b9 62 5d f9 e6 d6 c2 b6 b7 f0 3a d8 0c 0f 17 58 |.b].......:....X| -00000010 f3 33 35 35 75 b0 c1 53 98 b4 56 a4 95 b3 2a d7 |.355u..S..V...*.|" -"2019-05-02 01:31:37.234 UTC [msp.identity] Verify -> DEBU 16c4 Verify: sig = 00000000 30 44 02 20 32 2c 14 4b 7f e9 fa c4 aa ec c5 f6 |0D. 2,.K........| -00000010 4a 21 47 9c cb 3a cb 55 53 35 51 ef 7a 79 93 ec |J!G..:.US5Q.zy..| -00000020 4e 1c 5b ca 02 20 56 d7 22 25 e5 0d 5f d9 ca 86 |N.[.. V."%.._...| -00000030 49 56 e9 ba 27 b8 d5 b0 c9 cb ca b7 91 e7 2c f1 |IV..'.........,.| -00000040 3b fa 9c 17 71 da |;...q.|" -"2019-05-02 01:31:37.234 UTC [cauthdsl] func2 -> DEBU 16c5 0xc000c509d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:37.235 UTC [cauthdsl] func1 -> DEBU 16c6 0xc000c509d0 gate 1556760697233654300 evaluation succeeds" -"2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16c7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16c9 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16cb Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:37.235 UTC [policies] Evaluate -> DEBU 16cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:37.235 UTC [common.deliver] deliverBlocks -> DEBU 16cd [channel: businesschannel] Received seekInfo (0xc00110acc0) start: > stop: > from 192.168.240.9:47542" -"2019-05-02 01:31:37.235 UTC [fsblkstorage] Next -> DEBU 16ce Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:37.236 UTC [fsblkstorage] newBlockfileStream -> DEBU 16cf newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -"2019-05-02 01:31:37.236 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16d0 Remaining bytes=[35000], Going to peek [8] bytes" -"2019-05-02 01:31:37.236 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16d1 Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -"2019-05-02 01:31:37.236 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16d2 blockbytes [34997] read from file [0]" -"2019-05-02 01:31:37.236 UTC [common.deliver] deliverBlocks -> DEBU 16d3 [channel: businesschannel] Delivering block [9] for (0xc00110acc0) for 192.168.240.9:47542" -"2019-05-02 01:31:37.237 UTC [common.deliver] deliverBlocks -> DEBU 16d4 [channel: businesschannel] Done delivering to 192.168.240.9:47542 for (0xc00110acc0)" -"2019-05-02 01:31:37.237 UTC [fsblkstorage] waitForBlock -> DEBU 16d5 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:37.237 UTC [fsblkstorage] waitForBlock -> DEBU 16d6 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:37.237 UTC [common.deliver] Handle -> DEBU 16d7 Waiting for new SeekInfo from 192.168.240.9:47542" -"2019-05-02 01:31:37.238 UTC [common.deliver] Handle -> DEBU 16d8 Attempting to read seek info message from 192.168.240.9:47542" -"2019-05-02 01:31:37.244 UTC [common.deliver] Handle -> WARN 16d9 Error reading from 192.168.240.9:47542: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:37.245 UTC [orderer.common.server] func1 -> DEBU 16da Closing Deliver stream" -"2019-05-02 01:31:37.245 UTC [comm.grpc.server] 1 -> INFO 16db streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47542 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.2598ms -"2019-05-02 01:31:37.245 UTC [grpc] infof -> DEBU 16dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:37.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16dd Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" -"2019-05-02 01:31:37.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16de Sending msg of 28 bytes to 3 on channel businesschannel took 26µs" -"2019-05-02 01:31:37.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.4µs " -"2019-05-02 01:31:37.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.7µs " -"2019-05-02 01:31:37.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:37.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:37.508 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e3 Sending msg of 28 bytes to 3 on channel testchainid took 2.6211ms" -"2019-05-02 01:31:37.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " -"2019-05-02 01:31:37.509 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e5 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:37.839 UTC [orderer.common.server] Deliver -> DEBU 16e6 Starting new Deliver handler" -"2019-05-02 01:31:37.840 UTC [common.deliver] Handle -> DEBU 16e7 Starting new deliver loop for 192.168.240.9:47544" -"2019-05-02 01:31:37.840 UTC [common.deliver] Handle -> DEBU 16e8 Attempting to read seek info message from 192.168.240.9:47544" -"2019-05-02 01:31:37.841 UTC [policies] Evaluate -> DEBU 16e9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:37.841 UTC [policies] Evaluate -> DEBU 16ea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.841 UTC [policies] Evaluate -> DEBU 16eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:37.842 UTC [policies] Evaluate -> DEBU 16ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.842 UTC [policies] Evaluate -> DEBU 16ed == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:37.842 UTC [cauthdsl] func1 -> DEBU 16ee 0xc000d13380 gate 1556760697842618500 evaluation starts" -"2019-05-02 01:31:37.842 UTC [cauthdsl] func2 -> DEBU 16ef 0xc000d13380 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.843 UTC [cauthdsl] func2 -> DEBU 16f0 0xc000d13380 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:37.843 UTC [cauthdsl] func2 -> DEBU 16f1 0xc000d13380 principal matched by identity 0" -"2019-05-02 01:31:37.843 UTC [msp.identity] Verify -> DEBU 16f2 Verify: digest = 00000000 3c f5 6e 5e 45 30 dd fa fa d2 8e e7 ee 05 19 0a |<.n^E0..........| -00000010 ce e1 e5 18 6a af 25 26 9b 62 a2 bc 54 88 e3 a2 |....j.%&.b..T...|" -"2019-05-02 01:31:37.843 UTC [msp.identity] Verify -> DEBU 16f3 Verify: sig = 00000000 30 45 02 21 00 ba e0 0c 22 83 c8 a4 af 84 32 e3 |0E.!....".....2.| -00000010 da d7 a6 4c a8 98 4a 26 14 9f 04 c0 63 90 cb 01 |...L..J&....c...| -00000020 f4 fd 36 6a 99 02 20 41 e4 2c 38 3c f8 ee 73 76 |..6j.. A.,8<..sv| -00000030 db b1 99 81 29 e4 04 01 8c fa 74 a0 e9 fa b8 2a |....).....t....*| -00000040 ec be 75 0b af b4 58 |..u...X|" -"2019-05-02 01:31:37.844 UTC [cauthdsl] func2 -> DEBU 16f4 0xc000d13380 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:37.844 UTC [cauthdsl] func1 -> DEBU 16f5 0xc000d13380 gate 1556760697842618500 evaluation succeeds" -"2019-05-02 01:31:37.844 UTC [policies] Evaluate -> DEBU 16f6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:37.845 UTC [policies] Evaluate -> DEBU 16f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:37.845 UTC [policies] Evaluate -> DEBU 16f8 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:37.845 UTC [policies] Evaluate -> DEBU 16f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:37.845 UTC [policies] Evaluate -> DEBU 16fa Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:37.845 UTC [policies] Evaluate -> DEBU 16fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:37.846 UTC [common.deliver] deliverBlocks -> DEBU 16fc [channel: businesschannel] Received seekInfo (0xc00110b4c0) start: > stop: > from 192.168.240.9:47544" -"2019-05-02 01:31:37.846 UTC [fsblkstorage] Next -> DEBU 16fd Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:37.846 UTC [fsblkstorage] newBlockfileStream -> DEBU 16fe newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -"2019-05-02 01:31:37.846 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16ff Remaining bytes=[35000], Going to peek [8] bytes" -"2019-05-02 01:31:37.846 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1700 Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -"2019-05-02 01:31:37.847 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1701 blockbytes [34997] read from file [0]" -"2019-05-02 01:31:37.847 UTC [common.deliver] deliverBlocks -> DEBU 1702 [channel: businesschannel] Delivering block [9] for (0xc00110b4c0) for 192.168.240.9:47544" -"2019-05-02 01:31:37.848 UTC [common.deliver] deliverBlocks -> DEBU 1703 [channel: businesschannel] Done delivering to 192.168.240.9:47544 for (0xc00110b4c0)" -"2019-05-02 01:31:37.848 UTC [common.deliver] Handle -> DEBU 1704 Waiting for new SeekInfo from 192.168.240.9:47544" -"2019-05-02 01:31:37.849 UTC [common.deliver] Handle -> DEBU 1706 Attempting to read seek info message from 192.168.240.9:47544" -"2019-05-02 01:31:37.849 UTC [fsblkstorage] waitForBlock -> DEBU 1705 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:37.849 UTC [fsblkstorage] waitForBlock -> DEBU 1707 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:37.855 UTC [common.deliver] Handle -> WARN 1708 Error reading from 192.168.240.9:47544: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:37.856 UTC [orderer.common.server] func1 -> DEBU 1709 Closing Deliver stream" -"2019-05-02 01:31:37.856 UTC [comm.grpc.server] 1 -> INFO 170a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47544 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.6703ms -"2019-05-02 01:31:37.856 UTC [grpc] infof -> DEBU 170b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:37.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 170c Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" -"2019-05-02 01:31:38.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 170d Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" -"2019-05-02 01:31:38.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 170e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.6µs " -"2019-05-02 01:31:38.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 170f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.6µs " -"2019-05-02 01:31:38.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1710 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:38.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1711 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:38.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1713 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" -"2019-05-02 01:31:38.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1712 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:38.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1714 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.9µs " -"2019-05-02 01:31:38.067 UTC [orderer.common.server] Deliver -> DEBU 1715 Starting new Deliver handler" -"2019-05-02 01:31:38.067 UTC [common.deliver] Handle -> DEBU 1716 Starting new deliver loop for 192.168.240.9:47546" -"2019-05-02 01:31:38.067 UTC [common.deliver] Handle -> DEBU 1717 Attempting to read seek info message from 192.168.240.9:47546" -"2019-05-02 01:31:38.068 UTC [policies] Evaluate -> DEBU 1718 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:38.068 UTC [policies] Evaluate -> DEBU 1719 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.068 UTC [policies] Evaluate -> DEBU 171a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:38.068 UTC [policies] Evaluate -> DEBU 171b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.068 UTC [policies] Evaluate -> DEBU 171c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:38.068 UTC [cauthdsl] func1 -> DEBU 171d 0xc000fb1e60 gate 1556760698068960300 evaluation starts" -"2019-05-02 01:31:38.069 UTC [cauthdsl] func2 -> DEBU 171e 0xc000fb1e60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.069 UTC [cauthdsl] func2 -> DEBU 171f 0xc000fb1e60 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:38.069 UTC [cauthdsl] func2 -> DEBU 1720 0xc000fb1e60 principal matched by identity 0" -"2019-05-02 01:31:38.069 UTC [msp.identity] Verify -> DEBU 1721 Verify: digest = 00000000 54 91 d3 75 c2 76 e7 e1 c6 67 24 99 67 c1 a9 b7 |T..u.v...g$.g...| -00000010 7c 2a 91 1f 92 87 32 3c 47 90 d7 73 76 46 f3 1d ||*....2 DEBU 1722 Verify: sig = 00000000 30 45 02 21 00 d1 d9 27 9a 19 8f 65 eb d5 5f 3d |0E.!...'...e.._=| -00000010 93 97 0e 65 6b 6d 0c 42 af 37 b4 b1 59 6c 1b f1 |...ekm.B.7..Yl..| -00000020 dd dd 92 e0 5d 02 20 2c 1b 83 40 f0 16 5d 44 ec |....]. ,..@..]D.| -00000030 d2 24 d2 d0 b7 40 5c 75 93 17 88 02 20 a9 77 74 |.$...@\u.... .wt| -00000040 2c 78 ea f5 c2 2c 68 |,x...,h|" -"2019-05-02 01:31:38.069 UTC [cauthdsl] func2 -> DEBU 1723 0xc000fb1e60 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:38.070 UTC [cauthdsl] func1 -> DEBU 1724 0xc000fb1e60 gate 1556760698068960300 evaluation succeeds" -"2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 1725 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 1726 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 1727 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 1728 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 1729 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:38.070 UTC [policies] Evaluate -> DEBU 172a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:38.070 UTC [common.deliver] deliverBlocks -> DEBU 172b [channel: businesschannel] Received seekInfo (0xc00110bb80) start: > stop: > from 192.168.240.9:47546" -"2019-05-02 01:31:38.071 UTC [fsblkstorage] Next -> DEBU 172c Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:38.071 UTC [fsblkstorage] newBlockfileStream -> DEBU 172d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -"2019-05-02 01:31:38.071 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 172e Remaining bytes=[35000], Going to peek [8] bytes" -"2019-05-02 01:31:38.071 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 172f Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -"2019-05-02 01:31:38.071 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1730 blockbytes [34997] read from file [0]" -"2019-05-02 01:31:38.072 UTC [common.deliver] deliverBlocks -> DEBU 1731 [channel: businesschannel] Delivering block [9] for (0xc00110bb80) for 192.168.240.9:47546" -"2019-05-02 01:31:38.073 UTC [common.deliver] deliverBlocks -> DEBU 1732 [channel: businesschannel] Done delivering to 192.168.240.9:47546 for (0xc00110bb80)" -"2019-05-02 01:31:38.073 UTC [fsblkstorage] waitForBlock -> DEBU 1733 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:38.074 UTC [fsblkstorage] waitForBlock -> DEBU 1734 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:38.074 UTC [common.deliver] Handle -> DEBU 1735 Waiting for new SeekInfo from 192.168.240.9:47546" -"2019-05-02 01:31:38.074 UTC [common.deliver] Handle -> DEBU 1736 Attempting to read seek info message from 192.168.240.9:47546" -"2019-05-02 01:31:38.079 UTC [policies] Evaluate -> DEBU 1737 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:38.079 UTC [policies] Evaluate -> DEBU 1738 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.080 UTC [policies] Evaluate -> DEBU 1739 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:38.080 UTC [policies] Evaluate -> DEBU 173a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.080 UTC [policies] Evaluate -> DEBU 173b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:38.080 UTC [cauthdsl] func1 -> DEBU 173c 0xc00113b550 gate 1556760698080648200 evaluation starts" -"2019-05-02 01:31:38.080 UTC [cauthdsl] func2 -> DEBU 173d 0xc00113b550 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.081 UTC [cauthdsl] func2 -> DEBU 173e 0xc00113b550 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:38.081 UTC [cauthdsl] func2 -> DEBU 173f 0xc00113b550 principal matched by identity 0" -"2019-05-02 01:31:38.081 UTC [msp.identity] Verify -> DEBU 1740 Verify: digest = 00000000 38 35 6c bb bd 10 45 fd cb d3 86 c6 2f ae bc f6 |85l...E...../...| -00000010 1e e5 75 46 38 fd d6 c9 8c ae 4b ed 9b 66 ac 6d |..uF8.....K..f.m|" -"2019-05-02 01:31:38.081 UTC [msp.identity] Verify -> DEBU 1741 Verify: sig = 00000000 30 45 02 21 00 bb c3 3a 48 9a 99 05 c1 d7 ef 4a |0E.!...:H......J| -00000010 94 1b 5e 2c f7 0d e6 71 4a cf 26 ef 8a 40 e4 44 |..^,...qJ.&..@.D| -00000020 c1 6e 04 97 cb 02 20 25 38 a7 a5 f6 b3 10 18 0b |.n.... %8.......| -00000030 d4 5f 33 aa 8f a4 26 8c f3 58 45 96 71 f7 55 62 |._3...&..XE.q.Ub| -00000040 dc a4 2a 8f 33 83 23 |..*.3.#|" -"2019-05-02 01:31:38.082 UTC [cauthdsl] func2 -> DEBU 1742 0xc00113b550 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:38.082 UTC [cauthdsl] func1 -> DEBU 1743 0xc00113b550 gate 1556760698080648200 evaluation succeeds" -"2019-05-02 01:31:38.082 UTC [policies] Evaluate -> DEBU 1744 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.082 UTC [policies] Evaluate -> DEBU 1745 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.083 UTC [policies] Evaluate -> DEBU 1746 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.083 UTC [policies] Evaluate -> DEBU 1747 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.083 UTC [policies] Evaluate -> DEBU 1748 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:38.083 UTC [policies] Evaluate -> DEBU 1749 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:38.084 UTC [common.deliver] deliverBlocks -> DEBU 174a [channel: businesschannel] Received seekInfo (0xc000bab940) start: > stop: > from 192.168.240.9:47546" -"2019-05-02 01:31:38.084 UTC [fsblkstorage] Next -> DEBU 174b Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:38.085 UTC [fsblkstorage] newBlockfileStream -> DEBU 174c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -"2019-05-02 01:31:38.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 174d Remaining bytes=[35000], Going to peek [8] bytes" -"2019-05-02 01:31:38.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 174e Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -"2019-05-02 01:31:38.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 174f blockbytes [34997] read from file [0]" -"2019-05-02 01:31:38.086 UTC [common.deliver] deliverBlocks -> DEBU 1750 [channel: businesschannel] Delivering block [9] for (0xc000bab940) for 192.168.240.9:47546" -"2019-05-02 01:31:38.087 UTC [common.deliver] deliverBlocks -> DEBU 1751 [channel: businesschannel] Done delivering to 192.168.240.9:47546 for (0xc000bab940)" -"2019-05-02 01:31:38.088 UTC [fsblkstorage] waitForBlock -> DEBU 1752 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:38.089 UTC [fsblkstorage] waitForBlock -> DEBU 1753 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:38.090 UTC [common.deliver] Handle -> DEBU 1754 Waiting for new SeekInfo from 192.168.240.9:47546" -"2019-05-02 01:31:38.090 UTC [common.deliver] Handle -> DEBU 1755 Attempting to read seek info message from 192.168.240.9:47546" -"2019-05-02 01:31:38.100 UTC [common.deliver] Handle -> WARN 1756 Error reading from 192.168.240.9:47546: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:38.101 UTC [orderer.common.server] func1 -> DEBU 1757 Closing Deliver stream" -"2019-05-02 01:31:38.101 UTC [comm.grpc.server] 1 -> INFO 1758 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47546 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.6198ms -"2019-05-02 01:31:38.103 UTC [grpc] infof -> DEBU 1759 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:38.263 UTC [orderer.common.server] Deliver -> DEBU 175a Starting new Deliver handler" -"2019-05-02 01:31:38.263 UTC [common.deliver] Handle -> DEBU 175b Starting new deliver loop for 192.168.240.9:47548" -"2019-05-02 01:31:38.263 UTC [common.deliver] Handle -> DEBU 175c Attempting to read seek info message from 192.168.240.9:47548" -"2019-05-02 01:31:38.264 UTC [policies] Evaluate -> DEBU 175d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:38.264 UTC [policies] Evaluate -> DEBU 175e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.264 UTC [policies] Evaluate -> DEBU 175f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:38.264 UTC [policies] Evaluate -> DEBU 1760 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.264 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:38.265 UTC [cauthdsl] func1 -> DEBU 1762 0xc000cc9660 gate 1556760698265019000 evaluation starts" -"2019-05-02 01:31:38.265 UTC [cauthdsl] func2 -> DEBU 1763 0xc000cc9660 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.265 UTC [cauthdsl] func2 -> DEBU 1764 0xc000cc9660 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:38.265 UTC [cauthdsl] func2 -> DEBU 1765 0xc000cc9660 principal matched by identity 0" -"2019-05-02 01:31:38.265 UTC [msp.identity] Verify -> DEBU 1766 Verify: digest = 00000000 3c fc 63 34 24 24 68 b4 2e 46 0c 6e 18 d9 0b a8 |<.c4$$h..F.n....| -00000010 08 07 a7 ad ed d5 eb 06 d6 65 c8 b7 45 8a 8f bd |.........e..E...|" -"2019-05-02 01:31:38.265 UTC [msp.identity] Verify -> DEBU 1767 Verify: sig = 00000000 30 45 02 21 00 fd 4a c1 86 76 88 01 5e b7 5d 64 |0E.!..J..v..^.]d| -00000010 65 70 bc ba d6 5d e8 d0 d0 eb d2 55 22 bb 03 fe |ep...].....U"...| -00000020 00 92 c6 6f 84 02 20 7c cb d2 d8 62 9c 14 c6 55 |...o.. |...b...U| -00000030 33 b7 ff 25 fd 58 47 0c 5b 35 bf b5 35 49 6e 7b |3..%.XG.[5..5In{| -00000040 5a 49 61 23 2c 33 65 |ZIa#,3e|" -"2019-05-02 01:31:38.266 UTC [cauthdsl] func2 -> DEBU 1768 0xc000cc9660 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:38.266 UTC [cauthdsl] func1 -> DEBU 1769 0xc000cc9660 gate 1556760698265019000 evaluation succeeds" -"2019-05-02 01:31:38.266 UTC [policies] Evaluate -> DEBU 176a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.266 UTC [policies] Evaluate -> DEBU 176b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.266 UTC [policies] Evaluate -> DEBU 176c Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.266 UTC [policies] Evaluate -> DEBU 176d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.266 UTC [policies] Evaluate -> DEBU 176e Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:38.267 UTC [policies] Evaluate -> DEBU 176f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:38.267 UTC [common.deliver] deliverBlocks -> DEBU 1770 [channel: businesschannel] Received seekInfo (0xc000babe80) start: > stop: > from 192.168.240.9:47548" -"2019-05-02 01:31:38.267 UTC [fsblkstorage] Next -> DEBU 1771 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:38.267 UTC [fsblkstorage] newBlockfileStream -> DEBU 1772 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -"2019-05-02 01:31:38.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1773 Remaining bytes=[133666], Going to peek [8] bytes" -"2019-05-02 01:31:38.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1774 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:31:38.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1775 blockbytes [23937] read from file [0]" -"2019-05-02 01:31:38.268 UTC [common.deliver] deliverBlocks -> DEBU 1776 [channel: businesschannel] Delivering block [0] for (0xc000babe80) for 192.168.240.9:47548" -"2019-05-02 01:31:38.268 UTC [common.deliver] deliverBlocks -> DEBU 1777 [channel: businesschannel] Done delivering to 192.168.240.9:47548 for (0xc000babe80)" -"2019-05-02 01:31:38.269 UTC [common.deliver] Handle -> DEBU 1778 Waiting for new SeekInfo from 192.168.240.9:47548" -"2019-05-02 01:31:38.269 UTC [common.deliver] Handle -> DEBU 1779 Attempting to read seek info message from 192.168.240.9:47548" -"2019-05-02 01:31:38.269 UTC [fsblkstorage] waitForBlock -> DEBU 177a Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:38.269 UTC [fsblkstorage] waitForBlock -> DEBU 177b Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:38.276 UTC [grpc] warningf -> DEBU 177c transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.2:7050->192.168.240.9:47548: read: connection reset by peer" -"2019-05-02 01:31:38.277 UTC [common.deliver] Handle -> WARN 177d Error reading from 192.168.240.9:47548: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:38.277 UTC [orderer.common.server] func1 -> DEBU 177e Closing Deliver stream" -"2019-05-02 01:31:38.277 UTC [comm.grpc.server] 1 -> INFO 177f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47548 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.9001ms -"2019-05-02 01:31:38.278 UTC [grpc] infof -> DEBU 1780 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:38.472 UTC [orderer.common.server] Deliver -> DEBU 1781 Starting new Deliver handler" -"2019-05-02 01:31:38.472 UTC [common.deliver] Handle -> DEBU 1782 Starting new deliver loop for 192.168.240.9:47550" -"2019-05-02 01:31:38.472 UTC [common.deliver] Handle -> DEBU 1783 Attempting to read seek info message from 192.168.240.9:47550" -"2019-05-02 01:31:38.472 UTC [policies] Evaluate -> DEBU 1784 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:38.473 UTC [policies] Evaluate -> DEBU 1785 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.473 UTC [policies] Evaluate -> DEBU 1786 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:38.473 UTC [policies] Evaluate -> DEBU 1787 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.474 UTC [policies] Evaluate -> DEBU 1788 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:38.474 UTC [cauthdsl] func1 -> DEBU 1789 0xc00125cbe0 gate 1556760698474309200 evaluation starts" -"2019-05-02 01:31:38.474 UTC [cauthdsl] func2 -> DEBU 178a 0xc00125cbe0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.475 UTC [cauthdsl] func2 -> DEBU 178b 0xc00125cbe0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:38.475 UTC [cauthdsl] func2 -> DEBU 178c 0xc00125cbe0 principal matched by identity 0" -"2019-05-02 01:31:38.481 UTC [msp.identity] Verify -> DEBU 178d Verify: digest = 00000000 6e fd b4 a2 0e 29 84 0e 1d 2b d7 86 2c 98 7e c5 |n....)...+..,.~.| -00000010 92 5a fa 48 2f 32 45 df cc 95 9c c7 84 6a b1 7f |.Z.H/2E......j..|" -"2019-05-02 01:31:38.481 UTC [msp.identity] Verify -> DEBU 178e Verify: sig = 00000000 30 44 02 20 1c 2f 0d 0c 7b 9a c2 0d 82 54 dc 4e |0D. ./..{....T.N| -00000010 c3 5f d7 67 38 10 18 6f 3a 44 b3 03 8b 06 6b d3 |._.g8..o:D....k.| -00000020 a3 36 1e cf 02 20 78 aa 68 ed 3b 66 4b 87 85 0f |.6... x.h.;fK...| -00000030 e0 ff 3d dd 60 e2 d2 a7 c3 8a a3 16 df 7a 32 dc |..=.`........z2.| -00000040 ab b0 3e fd 6d 8a |..>.m.|" -"2019-05-02 01:31:38.482 UTC [cauthdsl] func2 -> DEBU 178f 0xc00125cbe0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:38.483 UTC [cauthdsl] func1 -> DEBU 1790 0xc00125cbe0 gate 1556760698474309200 evaluation succeeds" -"2019-05-02 01:31:38.483 UTC [policies] Evaluate -> DEBU 1791 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.484 UTC [policies] Evaluate -> DEBU 1792 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.485 UTC [policies] Evaluate -> DEBU 1793 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.487 UTC [policies] Evaluate -> DEBU 1794 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.487 UTC [policies] Evaluate -> DEBU 1795 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:38.488 UTC [policies] Evaluate -> DEBU 1796 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:38.488 UTC [common.deliver] deliverBlocks -> DEBU 1797 [channel: businesschannel] Received seekInfo (0xc00106c400) start: > stop: > from 192.168.240.9:47550" -"2019-05-02 01:31:38.489 UTC [fsblkstorage] Next -> DEBU 1798 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:38.489 UTC [fsblkstorage] newBlockfileStream -> DEBU 1799 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" -"2019-05-02 01:31:38.490 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 179a Remaining bytes=[109726], Going to peek [8] bytes" -"2019-05-02 01:31:38.491 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 179b Returning blockbytes - length=[23683], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" -"2019-05-02 01:31:38.491 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 179c blockbytes [23683] read from file [0]" -"2019-05-02 01:31:38.492 UTC [common.deliver] deliverBlocks -> DEBU 179d [channel: businesschannel] Delivering block [1] for (0xc00106c400) for 192.168.240.9:47550" -"2019-05-02 01:31:38.493 UTC [common.deliver] deliverBlocks -> DEBU 179e [channel: businesschannel] Done delivering to 192.168.240.9:47550 for (0xc00106c400)" -"2019-05-02 01:31:38.494 UTC [fsblkstorage] waitForBlock -> DEBU 179f Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:38.494 UTC [fsblkstorage] waitForBlock -> DEBU 17a0 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:38.495 UTC [common.deliver] Handle -> DEBU 17a1 Waiting for new SeekInfo from 192.168.240.9:47550" -"2019-05-02 01:31:38.495 UTC [common.deliver] Handle -> DEBU 17a2 Attempting to read seek info message from 192.168.240.9:47550" -"2019-05-02 01:31:38.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17a3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" -"2019-05-02 01:31:38.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17a4 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" -"2019-05-02 01:31:38.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17a5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " -"2019-05-02 01:31:38.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.4µs " -"2019-05-02 01:31:38.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17a7 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:38.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17a8 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" -"2019-05-02 01:31:38.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " -"2019-05-02 01:31:38.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17aa Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:38.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ab Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:38.524 UTC [common.deliver] Handle -> WARN 17ac Error reading from 192.168.240.9:47550: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:38.525 UTC [orderer.common.server] func1 -> DEBU 17ad Closing Deliver stream" -"2019-05-02 01:31:38.525 UTC [comm.grpc.server] 1 -> INFO 17ae streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47550 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=53.1331ms -"2019-05-02 01:31:38.525 UTC [grpc] infof -> DEBU 17af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:38.691 UTC [orderer.common.server] Deliver -> DEBU 17b0 Starting new Deliver handler" -"2019-05-02 01:31:38.691 UTC [common.deliver] Handle -> DEBU 17b1 Starting new deliver loop for 192.168.240.9:47552" -"2019-05-02 01:31:38.691 UTC [common.deliver] Handle -> DEBU 17b2 Attempting to read seek info message from 192.168.240.9:47552" -"2019-05-02 01:31:38.692 UTC [policies] Evaluate -> DEBU 17b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:38.693 UTC [policies] Evaluate -> DEBU 17b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.693 UTC [policies] Evaluate -> DEBU 17b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:38.693 UTC [policies] Evaluate -> DEBU 17b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.694 UTC [policies] Evaluate -> DEBU 17b7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:38.694 UTC [cauthdsl] func1 -> DEBU 17b8 0xc001264130 gate 1556760698694256500 evaluation starts" -"2019-05-02 01:31:38.694 UTC [cauthdsl] func2 -> DEBU 17b9 0xc001264130 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.694 UTC [cauthdsl] func2 -> DEBU 17ba 0xc001264130 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:38.694 UTC [cauthdsl] func2 -> DEBU 17bb 0xc001264130 principal matched by identity 0" -"2019-05-02 01:31:38.695 UTC [msp.identity] Verify -> DEBU 17bc Verify: digest = 00000000 81 22 dd ef f0 80 8c 31 a8 4f a1 e2 19 14 12 8a |.".....1.O......| -00000010 41 d9 78 46 29 b6 72 96 e6 bf 3b 92 3d e3 2f 80 |A.xF).r...;.=./.|" -"2019-05-02 01:31:38.696 UTC [msp.identity] Verify -> DEBU 17bd Verify: sig = 00000000 30 45 02 21 00 d9 67 42 80 9b 8b 7c 35 f8 6f 83 |0E.!..gB...|5.o.| -00000010 07 a5 11 5f b7 76 0e 5e 11 aa 61 2c f1 37 0f 8e |..._.v.^..a,.7..| -00000020 51 f8 ea e9 92 02 20 1d d9 0a cc ae a8 4b ea f2 |Q..... ......K..| -00000030 87 3f 69 24 ca 9d 12 a5 57 27 af c1 0f f7 01 33 |.?i$....W'.....3| -00000040 8f b8 29 2b 15 25 b8 |..)+.%.|" -"2019-05-02 01:31:38.696 UTC [cauthdsl] func2 -> DEBU 17be 0xc001264130 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:38.696 UTC [cauthdsl] func1 -> DEBU 17bf 0xc001264130 gate 1556760698694256500 evaluation succeeds" -"2019-05-02 01:31:38.697 UTC [policies] Evaluate -> DEBU 17c0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.697 UTC [policies] Evaluate -> DEBU 17c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.697 UTC [policies] Evaluate -> DEBU 17c2 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.698 UTC [policies] Evaluate -> DEBU 17c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.699 UTC [policies] Evaluate -> DEBU 17c4 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:38.699 UTC [policies] Evaluate -> DEBU 17c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:38.700 UTC [common.deliver] deliverBlocks -> DEBU 17c6 [channel: businesschannel] Received seekInfo (0xc000c892c0) start: > stop: > from 192.168.240.9:47552" -"2019-05-02 01:31:38.701 UTC [fsblkstorage] Next -> DEBU 17c7 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:38.701 UTC [fsblkstorage] newBlockfileStream -> DEBU 17c8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47626]" -"2019-05-02 01:31:38.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17c9 Remaining bytes=[86040], Going to peek [8] bytes" -"2019-05-02 01:31:38.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17ca Returning blockbytes - length=[23741], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" -"2019-05-02 01:31:38.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17cb blockbytes [23741] read from file [0]" -"2019-05-02 01:31:38.703 UTC [common.deliver] deliverBlocks -> DEBU 17cc [channel: businesschannel] Delivering block [2] for (0xc000c892c0) for 192.168.240.9:47552" -"2019-05-02 01:31:38.703 UTC [common.deliver] deliverBlocks -> DEBU 17cd [channel: businesschannel] Done delivering to 192.168.240.9:47552 for (0xc000c892c0)" -"2019-05-02 01:31:38.704 UTC [common.deliver] Handle -> DEBU 17ce Waiting for new SeekInfo from 192.168.240.9:47552" -"2019-05-02 01:31:38.704 UTC [common.deliver] Handle -> DEBU 17d0 Attempting to read seek info message from 192.168.240.9:47552" -"2019-05-02 01:31:38.704 UTC [fsblkstorage] waitForBlock -> DEBU 17cf Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:38.705 UTC [fsblkstorage] waitForBlock -> DEBU 17d1 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:38.723 UTC [common.deliver] Handle -> WARN 17d2 Error reading from 192.168.240.9:47552: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:38.723 UTC [orderer.common.server] func1 -> DEBU 17d3 Closing Deliver stream" -"2019-05-02 01:31:38.724 UTC [comm.grpc.server] 1 -> INFO 17d4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47552 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.6509ms -"2019-05-02 01:31:38.724 UTC [grpc] infof -> DEBU 17d5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:38.915 UTC [orderer.common.server] Deliver -> DEBU 17d6 Starting new Deliver handler" -"2019-05-02 01:31:38.915 UTC [common.deliver] Handle -> DEBU 17d7 Starting new deliver loop for 192.168.240.9:47554" -"2019-05-02 01:31:38.915 UTC [common.deliver] Handle -> DEBU 17d8 Attempting to read seek info message from 192.168.240.9:47554" -"2019-05-02 01:31:38.916 UTC [policies] Evaluate -> DEBU 17d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:38.916 UTC [policies] Evaluate -> DEBU 17da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.917 UTC [policies] Evaluate -> DEBU 17db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:38.918 UTC [policies] Evaluate -> DEBU 17dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.918 UTC [policies] Evaluate -> DEBU 17dd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:38.918 UTC [cauthdsl] func1 -> DEBU 17de 0xc000bb4d70 gate 1556760698918827400 evaluation starts" -"2019-05-02 01:31:38.919 UTC [cauthdsl] func2 -> DEBU 17df 0xc000bb4d70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.919 UTC [cauthdsl] func2 -> DEBU 17e0 0xc000bb4d70 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:38.919 UTC [cauthdsl] func2 -> DEBU 17e1 0xc000bb4d70 principal matched by identity 0" -"2019-05-02 01:31:38.919 UTC [msp.identity] Verify -> DEBU 17e2 Verify: digest = 00000000 9c 87 24 dc fe 8f b4 fa ee c9 eb d1 df 23 86 d9 |..$..........#..| -00000010 08 60 2d cd d3 de 54 09 85 e1 38 5e 2c 66 c9 a8 |.`-...T...8^,f..|" -"2019-05-02 01:31:38.920 UTC [msp.identity] Verify -> DEBU 17e3 Verify: sig = 00000000 30 45 02 21 00 9b d5 b9 59 24 87 34 ba a2 67 7e |0E.!....Y$.4..g~| -00000010 68 ed 65 4f a2 e7 97 44 0c 95 43 20 34 08 b2 9d |h.eO...D..C 4...| -00000020 af 02 68 03 b4 02 20 4f 29 1c 38 25 44 94 fe 9e |..h... O).8%D...| -00000030 63 5a dd b7 24 70 b4 c3 c1 85 2c fc df dc 43 93 |cZ..$p....,...C.| -00000040 a4 99 3f 8a a8 b4 2d |..?...-|" -"2019-05-02 01:31:38.921 UTC [cauthdsl] func2 -> DEBU 17e4 0xc000bb4d70 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:38.921 UTC [cauthdsl] func1 -> DEBU 17e5 0xc000bb4d70 gate 1556760698918827400 evaluation succeeds" -"2019-05-02 01:31:38.921 UTC [policies] Evaluate -> DEBU 17e6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.922 UTC [policies] Evaluate -> DEBU 17e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:38.922 UTC [policies] Evaluate -> DEBU 17e8 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.922 UTC [policies] Evaluate -> DEBU 17e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:38.923 UTC [policies] Evaluate -> DEBU 17ea Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:38.923 UTC [policies] Evaluate -> DEBU 17eb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:38.923 UTC [common.deliver] deliverBlocks -> DEBU 17ec [channel: businesschannel] Received seekInfo (0xc000baa780) start: > stop: > from 192.168.240.9:47554" -"2019-05-02 01:31:38.924 UTC [fsblkstorage] Next -> DEBU 17ed Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:38.924 UTC [fsblkstorage] newBlockfileStream -> DEBU 17ee newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71370]" -"2019-05-02 01:31:38.925 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17ef Remaining bytes=[62296], Going to peek [8] bytes" -"2019-05-02 01:31:38.925 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17f0 Returning blockbytes - length=[4710], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}" -"2019-05-02 01:31:38.926 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17f1 blockbytes [4710] read from file [0]" -"2019-05-02 01:31:38.926 UTC [common.deliver] deliverBlocks -> DEBU 17f2 [channel: businesschannel] Delivering block [3] for (0xc000baa780) for 192.168.240.9:47554" -"2019-05-02 01:31:38.927 UTC [common.deliver] deliverBlocks -> DEBU 17f3 [channel: businesschannel] Done delivering to 192.168.240.9:47554 for (0xc000baa780)" -"2019-05-02 01:31:38.927 UTC [fsblkstorage] waitForBlock -> DEBU 17f4 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:38.928 UTC [fsblkstorage] waitForBlock -> DEBU 17f5 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:38.928 UTC [common.deliver] Handle -> DEBU 17f6 Waiting for new SeekInfo from 192.168.240.9:47554" -"2019-05-02 01:31:38.928 UTC [common.deliver] Handle -> DEBU 17f7 Attempting to read seek info message from 192.168.240.9:47554" -"2019-05-02 01:31:38.939 UTC [common.deliver] Handle -> WARN 17f8 Error reading from 192.168.240.9:47554: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:38.939 UTC [orderer.common.server] func1 -> DEBU 17f9 Closing Deliver stream" -"2019-05-02 01:31:38.940 UTC [comm.grpc.server] 1 -> INFO 17fa streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47554 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.4014ms -"2019-05-02 01:31:38.941 UTC [grpc] infof -> DEBU 17fb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:38.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17fc Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" -"2019-05-02 01:31:39.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17fd Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" -"2019-05-02 01:31:39.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.2µs " -"2019-05-02 01:31:39.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.4µs " -"2019-05-02 01:31:39.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1800 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:39.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1801 Sending msg of 28 bytes to 3 on channel testchainid took 115.6µs" -"2019-05-02 01:31:39.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1802 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141µs " -"2019-05-02 01:31:39.007 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1803 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:39.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1804 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:39.132 UTC [orderer.common.server] Deliver -> DEBU 1805 Starting new Deliver handler" -"2019-05-02 01:31:39.132 UTC [common.deliver] Handle -> DEBU 1806 Starting new deliver loop for 192.168.240.9:47556" -"2019-05-02 01:31:39.133 UTC [common.deliver] Handle -> DEBU 1807 Attempting to read seek info message from 192.168.240.9:47556" -"2019-05-02 01:31:39.134 UTC [policies] Evaluate -> DEBU 1808 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:39.134 UTC [policies] Evaluate -> DEBU 1809 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:39.135 UTC [policies] Evaluate -> DEBU 180a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:39.135 UTC [policies] Evaluate -> DEBU 180b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:39.135 UTC [policies] Evaluate -> DEBU 180c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:39.135 UTC [cauthdsl] func1 -> DEBU 180d 0xc000bd7350 gate 1556760699135642600 evaluation starts" -"2019-05-02 01:31:39.135 UTC [cauthdsl] func2 -> DEBU 180e 0xc000bd7350 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:39.135 UTC [cauthdsl] func2 -> DEBU 180f 0xc000bd7350 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:39.136 UTC [cauthdsl] func2 -> DEBU 1810 0xc000bd7350 principal matched by identity 0" -"2019-05-02 01:31:39.136 UTC [msp.identity] Verify -> DEBU 1811 Verify: digest = 00000000 2b 88 1a 3c 7f 86 ab 2f 84 bd c6 90 e8 3a 7c d5 |+..<.../.....:|.| -00000010 d3 ba a3 0c 90 24 e0 4c 0a 08 a8 5b c4 38 c4 76 |.....$.L...[.8.v|" -"2019-05-02 01:31:39.136 UTC [msp.identity] Verify -> DEBU 1812 Verify: sig = 00000000 30 45 02 21 00 fe 99 4a 29 11 64 52 60 7c 60 b4 |0E.!...J).dR`|`.| -00000010 7b ed 70 de c0 b3 8e ec 61 2b 95 80 a1 af d4 4d |{.p.....a+.....M| -00000020 03 10 d4 81 0a 02 20 5f c0 32 d7 79 51 b3 10 18 |...... _.2.yQ...| -00000030 b9 bf 4b fb 00 5f 23 80 6e 49 db 1d 25 08 a1 ef |..K.._#.nI..%...| -00000040 c0 0b b7 dc d6 b3 99 |.......|" -"2019-05-02 01:31:39.136 UTC [cauthdsl] func2 -> DEBU 1813 0xc000bd7350 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:39.136 UTC [cauthdsl] func1 -> DEBU 1814 0xc000bd7350 gate 1556760699135642600 evaluation succeeds" -"2019-05-02 01:31:39.137 UTC [policies] Evaluate -> DEBU 1815 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:39.137 UTC [policies] Evaluate -> DEBU 1816 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:39.137 UTC [policies] Evaluate -> DEBU 1817 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:39.137 UTC [policies] Evaluate -> DEBU 1818 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:39.138 UTC [policies] Evaluate -> DEBU 1819 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:39.138 UTC [policies] Evaluate -> DEBU 181a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:39.138 UTC [common.deliver] deliverBlocks -> DEBU 181b [channel: businesschannel] Received seekInfo (0xc00110a400) start: > stop: > from 192.168.240.9:47556" -"2019-05-02 01:31:39.139 UTC [fsblkstorage] Next -> DEBU 181c Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:39.139 UTC [fsblkstorage] newBlockfileStream -> DEBU 181d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76082]" -"2019-05-02 01:31:39.139 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 181e Remaining bytes=[57584], Going to peek [8] bytes" -"2019-05-02 01:31:39.139 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 181f Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" -"2019-05-02 01:31:39.140 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1820 blockbytes [4709] read from file [0]" -"2019-05-02 01:31:39.140 UTC [common.deliver] deliverBlocks -> DEBU 1821 [channel: businesschannel] Delivering block [4] for (0xc00110a400) for 192.168.240.9:47556" -"2019-05-02 01:31:39.140 UTC [common.deliver] deliverBlocks -> DEBU 1822 [channel: businesschannel] Done delivering to 192.168.240.9:47556 for (0xc00110a400)" -"2019-05-02 01:31:39.141 UTC [common.deliver] Handle -> DEBU 1823 Waiting for new SeekInfo from 192.168.240.9:47556" -"2019-05-02 01:31:39.141 UTC [common.deliver] Handle -> DEBU 1825 Attempting to read seek info message from 192.168.240.9:47556" -"2019-05-02 01:31:39.141 UTC [fsblkstorage] waitForBlock -> DEBU 1824 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:39.142 UTC [fsblkstorage] waitForBlock -> DEBU 1826 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:39.155 UTC [common.deliver] Handle -> WARN 1827 Error reading from 192.168.240.9:47556: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:39.156 UTC [orderer.common.server] func1 -> DEBU 1829 Closing Deliver stream" -"2019-05-02 01:31:39.156 UTC [comm.grpc.server] 1 -> INFO 182a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47556 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.1823ms -"2019-05-02 01:31:39.155 UTC [grpc] infof -> DEBU 1828 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:39.311 UTC [orderer.common.server] Deliver -> DEBU 182b Starting new Deliver handler" -"2019-05-02 01:31:39.312 UTC [common.deliver] Handle -> DEBU 182c Starting new deliver loop for 192.168.240.9:47558" -"2019-05-02 01:31:39.312 UTC [common.deliver] Handle -> DEBU 182d Attempting to read seek info message from 192.168.240.9:47558" -"2019-05-02 01:31:39.312 UTC [policies] Evaluate -> DEBU 182e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:39.313 UTC [policies] Evaluate -> DEBU 182f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:39.313 UTC [policies] Evaluate -> DEBU 1830 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:39.313 UTC [policies] Evaluate -> DEBU 1831 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:39.314 UTC [policies] Evaluate -> DEBU 1832 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:39.314 UTC [cauthdsl] func1 -> DEBU 1833 0xc000fae170 gate 1556760699314345500 evaluation starts" -"2019-05-02 01:31:39.314 UTC [cauthdsl] func2 -> DEBU 1834 0xc000fae170 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:39.314 UTC [cauthdsl] func2 -> DEBU 1835 0xc000fae170 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:39.315 UTC [cauthdsl] func2 -> DEBU 1836 0xc000fae170 principal matched by identity 0" -"2019-05-02 01:31:39.315 UTC [msp.identity] Verify -> DEBU 1837 Verify: digest = 00000000 fe d1 e9 bf 20 e1 1f 4f 89 2a 31 5d bd 5f df a0 |.... ..O.*1]._..| -00000010 b5 c6 40 bf 94 bc 9e 34 e2 38 10 7e fe cf d2 86 |..@....4.8.~....|" -"2019-05-02 01:31:39.315 UTC [msp.identity] Verify -> DEBU 1838 Verify: sig = 00000000 30 43 02 1f 77 a6 88 52 c1 ff c4 34 6d 65 80 39 |0C..w..R...4me.9| -00000010 7d 3a 73 72 53 a9 ad 11 bb f9 7e b6 b2 12 c4 94 |}:srS.....~.....| -00000020 5b 4c d4 02 20 19 20 04 5f cc 7e de c3 f2 84 18 |[L.. . ._.~.....| -00000030 e1 49 00 da 30 0f 4a 4b 77 97 69 43 d4 f6 2b df |.I..0.JKw.iC..+.| -00000040 03 21 8d ca aa |.!...|" -"2019-05-02 01:31:39.316 UTC [cauthdsl] func2 -> DEBU 1839 0xc000fae170 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:39.316 UTC [cauthdsl] func1 -> DEBU 183a 0xc000fae170 gate 1556760699314345500 evaluation succeeds" -"2019-05-02 01:31:39.316 UTC [policies] Evaluate -> DEBU 183b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:39.317 UTC [policies] Evaluate -> DEBU 183c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:39.317 UTC [policies] Evaluate -> DEBU 183d Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:39.317 UTC [policies] Evaluate -> DEBU 183e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:39.317 UTC [policies] Evaluate -> DEBU 183f Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:39.318 UTC [policies] Evaluate -> DEBU 1840 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:39.318 UTC [common.deliver] deliverBlocks -> DEBU 1841 [channel: businesschannel] Received seekInfo (0xc000bab600) start: > stop: > from 192.168.240.9:47558" -"2019-05-02 01:31:39.318 UTC [fsblkstorage] Next -> DEBU 1842 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:39.319 UTC [fsblkstorage] newBlockfileStream -> DEBU 1843 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80793]" -"2019-05-02 01:31:39.319 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1844 Remaining bytes=[52873], Going to peek [8] bytes" -"2019-05-02 01:31:39.320 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1845 Returning blockbytes - length=[5711], placementInfo={fileNum=[0], startOffset=[80793], bytesOffset=[80795]}" -"2019-05-02 01:31:39.320 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1846 blockbytes [5711] read from file [0]" -"2019-05-02 01:31:39.320 UTC [common.deliver] deliverBlocks -> DEBU 1847 [channel: businesschannel] Delivering block [5] for (0xc000bab600) for 192.168.240.9:47558" -"2019-05-02 01:31:39.321 UTC [common.deliver] deliverBlocks -> DEBU 1848 [channel: businesschannel] Done delivering to 192.168.240.9:47558 for (0xc000bab600)" -"2019-05-02 01:31:39.321 UTC [fsblkstorage] waitForBlock -> DEBU 1849 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:39.322 UTC [fsblkstorage] waitForBlock -> DEBU 184a Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:39.322 UTC [common.deliver] Handle -> DEBU 184b Waiting for new SeekInfo from 192.168.240.9:47558" -"2019-05-02 01:31:39.323 UTC [common.deliver] Handle -> DEBU 184c Attempting to read seek info message from 192.168.240.9:47558" -"2019-05-02 01:31:39.332 UTC [common.deliver] Handle -> WARN 184d Error reading from 192.168.240.9:47558: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:39.333 UTC [orderer.common.server] func1 -> DEBU 184e Closing Deliver stream" -"2019-05-02 01:31:39.333 UTC [comm.grpc.server] 1 -> INFO 184f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47558 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.3955ms -"2019-05-02 01:31:39.334 UTC [grpc] infof -> DEBU 1850 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:39.488 UTC [orderer.common.server] Deliver -> DEBU 1851 Starting new Deliver handler" -"2019-05-02 01:31:39.488 UTC [common.deliver] Handle -> DEBU 1852 Starting new deliver loop for 192.168.240.9:47560" -"2019-05-02 01:31:39.488 UTC [common.deliver] Handle -> DEBU 1853 Attempting to read seek info message from 192.168.240.9:47560" -"2019-05-02 01:31:39.489 UTC [policies] Evaluate -> DEBU 1854 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:39.489 UTC [policies] Evaluate -> DEBU 1855 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:39.489 UTC [policies] Evaluate -> DEBU 1856 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:39.490 UTC [policies] Evaluate -> DEBU 1857 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:39.490 UTC [policies] Evaluate -> DEBU 1858 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:39.490 UTC [cauthdsl] func1 -> DEBU 1859 0xc000f7a8d0 gate 1556760699490783100 evaluation starts" -"2019-05-02 01:31:39.491 UTC [cauthdsl] func2 -> DEBU 185a 0xc000f7a8d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:39.491 UTC [cauthdsl] func2 -> DEBU 185b 0xc000f7a8d0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:39.491 UTC [cauthdsl] func2 -> DEBU 185c 0xc000f7a8d0 principal matched by identity 0" -"2019-05-02 01:31:39.491 UTC [msp.identity] Verify -> DEBU 185d Verify: digest = 00000000 c4 53 49 90 b6 a9 6f 63 0c 2b 8f 5e 74 0b 56 62 |.SI...oc.+.^t.Vb| -00000010 a5 c0 da b3 2f ea d8 fc 73 9a 48 ae 35 f0 ca ea |..../...s.H.5...|" -"2019-05-02 01:31:39.492 UTC [msp.identity] Verify -> DEBU 185e Verify: sig = 00000000 30 45 02 21 00 ba 41 d9 4f ae b1 c7 b9 38 ba cb |0E.!..A.O....8..| -00000010 d5 b3 f7 3d 28 ea 54 3f 51 44 bd 67 35 36 fb 45 |...=(.T?QD.g56.E| -00000020 36 88 34 0d 4d 02 20 4d 21 38 ed db 28 dc 1a 89 |6.4.M. M!8..(...| -00000030 21 c7 86 1d bb 53 01 8d 3f 46 44 51 4e bd e9 ed |!....S..?FDQN...| -00000040 5e fd 97 b9 8e 73 ac |^....s.|" -"2019-05-02 01:31:39.492 UTC [cauthdsl] func2 -> DEBU 185f 0xc000f7a8d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:39.492 UTC [cauthdsl] func1 -> DEBU 1860 0xc000f7a8d0 gate 1556760699490783100 evaluation succeeds" -"2019-05-02 01:31:39.493 UTC [policies] Evaluate -> DEBU 1861 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:39.493 UTC [policies] Evaluate -> DEBU 1862 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:39.493 UTC [policies] Evaluate -> DEBU 1863 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:39.494 UTC [policies] Evaluate -> DEBU 1864 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:39.494 UTC [policies] Evaluate -> DEBU 1865 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:39.494 UTC [policies] Evaluate -> DEBU 1866 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:39.494 UTC [common.deliver] deliverBlocks -> DEBU 1867 [channel: businesschannel] Received seekInfo (0xc000babc40) start: > stop: > from 192.168.240.9:47560" -"2019-05-02 01:31:39.495 UTC [fsblkstorage] Next -> DEBU 1868 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:39.495 UTC [fsblkstorage] newBlockfileStream -> DEBU 1869 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86506]" -"2019-05-02 01:31:39.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186a Remaining bytes=[47160], Going to peek [8] bytes" -"2019-05-02 01:31:39.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186b Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86506], bytesOffset=[86508]}" -"2019-05-02 01:31:39.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186c blockbytes [4058] read from file [0]" -"2019-05-02 01:31:39.496 UTC [common.deliver] deliverBlocks -> DEBU 186d [channel: businesschannel] Delivering block [6] for (0xc000babc40) for 192.168.240.9:47560" -"2019-05-02 01:31:39.497 UTC [common.deliver] deliverBlocks -> DEBU 186e [channel: businesschannel] Done delivering to 192.168.240.9:47560 for (0xc000babc40)" -"2019-05-02 01:31:39.498 UTC [fsblkstorage] waitForBlock -> DEBU 186f Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:39.498 UTC [fsblkstorage] waitForBlock -> DEBU 1870 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:39.498 UTC [common.deliver] Handle -> DEBU 1871 Waiting for new SeekInfo from 192.168.240.9:47560" -"2019-05-02 01:31:39.498 UTC [common.deliver] Handle -> DEBU 1872 Attempting to read seek info message from 192.168.240.9:47560" -"2019-05-02 01:31:39.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1873 Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" -"2019-05-02 01:31:39.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1874 Sending msg of 28 bytes to 3 on channel businesschannel took 18.7µs" -"2019-05-02 01:31:39.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1875 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.5µs " -"2019-05-02 01:31:39.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1876 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.8µs " -"2019-05-02 01:31:39.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1877 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:39.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1878 Sending msg of 28 bytes to 3 on channel testchainid took 37.3µs" -"2019-05-02 01:31:39.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1879 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.5µs " -"2019-05-02 01:31:39.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 187a Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:39.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 187b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:39.511 UTC [common.deliver] Handle -> WARN 187c Error reading from 192.168.240.9:47560: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:39.517 UTC [grpc] infof -> DEBU 187d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:39.518 UTC [orderer.common.server] func1 -> DEBU 187e Closing Deliver stream" -"2019-05-02 01:31:39.519 UTC [comm.grpc.server] 1 -> INFO 187f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47560 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.9377ms -"2019-05-02 01:31:39.678 UTC [orderer.common.server] Deliver -> DEBU 1880 Starting new Deliver handler" -"2019-05-02 01:31:39.679 UTC [common.deliver] Handle -> DEBU 1881 Starting new deliver loop for 192.168.240.9:47562" -"2019-05-02 01:31:39.679 UTC [common.deliver] Handle -> DEBU 1882 Attempting to read seek info message from 192.168.240.9:47562" -"2019-05-02 01:31:39.679 UTC [policies] Evaluate -> DEBU 1883 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:39.679 UTC [policies] Evaluate -> DEBU 1884 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:39.679 UTC [policies] Evaluate -> DEBU 1885 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:39.679 UTC [policies] Evaluate -> DEBU 1886 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:39.680 UTC [policies] Evaluate -> DEBU 1887 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:39.680 UTC [cauthdsl] func1 -> DEBU 1888 0xc000952b30 gate 1556760699680288000 evaluation starts" -"2019-05-02 01:31:39.680 UTC [cauthdsl] func2 -> DEBU 1889 0xc000952b30 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:39.680 UTC [cauthdsl] func2 -> DEBU 188a 0xc000952b30 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:39.680 UTC [cauthdsl] func2 -> DEBU 188b 0xc000952b30 principal matched by identity 0" -"2019-05-02 01:31:39.680 UTC [msp.identity] Verify -> DEBU 188c Verify: digest = 00000000 b1 66 05 39 06 5f ff 27 59 08 02 fe d3 4d bb 45 |.f.9._.'Y....M.E| -00000010 cd 4a 64 bd 89 ff af 29 eb ed 0e 9b 8c 1b 52 2e |.Jd....)......R.|" -"2019-05-02 01:31:39.681 UTC [msp.identity] Verify -> DEBU 188d Verify: sig = 00000000 30 44 02 20 4c 1d 2b 53 cd 64 8a 8b a9 26 bc 88 |0D. L.+S.d...&..| -00000010 8d 8e c3 8e c2 fd 11 ce 3a db 83 52 f2 35 b8 0a |........:..R.5..| -00000020 4c 99 fe d3 02 20 7f 26 e7 28 24 e0 77 c6 1a 80 |L.... .&.($.w...| -00000030 52 70 e6 09 32 c3 5e 47 3e f8 11 0f 6e d4 f2 cc |Rp..2.^G>...n...| -00000040 3b f2 32 24 8b f5 |;.2$..|" -"2019-05-02 01:31:39.681 UTC [cauthdsl] func2 -> DEBU 188e 0xc000952b30 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:39.681 UTC [cauthdsl] func1 -> DEBU 188f 0xc000952b30 gate 1556760699680288000 evaluation succeeds" -"2019-05-02 01:31:39.681 UTC [policies] Evaluate -> DEBU 1890 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:39.681 UTC [policies] Evaluate -> DEBU 1891 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:39.681 UTC [policies] Evaluate -> DEBU 1892 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:39.682 UTC [policies] Evaluate -> DEBU 1893 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:39.682 UTC [policies] Evaluate -> DEBU 1894 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:39.682 UTC [policies] Evaluate -> DEBU 1895 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:39.683 UTC [common.deliver] deliverBlocks -> DEBU 1896 [channel: businesschannel] Received seekInfo (0xc00110af40) start: > stop: > from 192.168.240.9:47562" -"2019-05-02 01:31:39.683 UTC [fsblkstorage] Next -> DEBU 1897 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:39.683 UTC [fsblkstorage] newBlockfileStream -> DEBU 1898 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90566]" -"2019-05-02 01:31:39.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1899 Remaining bytes=[43100], Going to peek [8] bytes" -"2019-05-02 01:31:39.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189a Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90566], bytesOffset=[90568]}" -"2019-05-02 01:31:39.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189b blockbytes [4048] read from file [0]" -"2019-05-02 01:31:39.684 UTC [common.deliver] deliverBlocks -> DEBU 189c [channel: businesschannel] Delivering block [7] for (0xc00110af40) for 192.168.240.9:47562" -"2019-05-02 01:31:39.684 UTC [common.deliver] deliverBlocks -> DEBU 189d [channel: businesschannel] Done delivering to 192.168.240.9:47562 for (0xc00110af40)" -"2019-05-02 01:31:39.684 UTC [common.deliver] Handle -> DEBU 189e Waiting for new SeekInfo from 192.168.240.9:47562" -"2019-05-02 01:31:39.684 UTC [common.deliver] Handle -> DEBU 189f Attempting to read seek info message from 192.168.240.9:47562" -"2019-05-02 01:31:39.685 UTC [fsblkstorage] waitForBlock -> DEBU 18a0 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:39.685 UTC [fsblkstorage] waitForBlock -> DEBU 18a1 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:39.692 UTC [common.deliver] Handle -> WARN 18a2 Error reading from 192.168.240.9:47562: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:39.693 UTC [orderer.common.server] func1 -> DEBU 18a3 Closing Deliver stream" -"2019-05-02 01:31:39.693 UTC [comm.grpc.server] 1 -> INFO 18a4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47562 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.805ms -"2019-05-02 01:31:39.693 UTC [grpc] infof -> DEBU 18a5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:39.868 UTC [orderer.common.server] Deliver -> DEBU 18a6 Starting new Deliver handler" -"2019-05-02 01:31:39.868 UTC [common.deliver] Handle -> DEBU 18a7 Starting new deliver loop for 192.168.240.9:47564" -"2019-05-02 01:31:39.868 UTC [common.deliver] Handle -> DEBU 18a8 Attempting to read seek info message from 192.168.240.9:47564" -"2019-05-02 01:31:39.870 UTC [policies] Evaluate -> DEBU 18a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:39.870 UTC [policies] Evaluate -> DEBU 18aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:39.871 UTC [policies] Evaluate -> DEBU 18ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:39.871 UTC [policies] Evaluate -> DEBU 18ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:39.872 UTC [policies] Evaluate -> DEBU 18ad == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:39.872 UTC [cauthdsl] func1 -> DEBU 18ae 0xc000c955d0 gate 1556760699872409800 evaluation starts" -"2019-05-02 01:31:39.872 UTC [cauthdsl] func2 -> DEBU 18af 0xc000c955d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:39.872 UTC [cauthdsl] func2 -> DEBU 18b0 0xc000c955d0 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:39.873 UTC [cauthdsl] func2 -> DEBU 18b1 0xc000c955d0 principal matched by identity 0" -"2019-05-02 01:31:39.873 UTC [msp.identity] Verify -> DEBU 18b2 Verify: digest = 00000000 7e ce c7 13 b6 27 ee 22 5c c2 ed db 01 74 67 48 |~....'."\....tgH| -00000010 83 6c 0b 59 eb c5 ef 4e c2 6b d9 12 e5 be eb f9 |.l.Y...N.k......|" -"2019-05-02 01:31:39.873 UTC [msp.identity] Verify -> DEBU 18b3 Verify: sig = 00000000 30 44 02 20 48 f9 f8 ac fa d4 a5 f0 ec d4 05 84 |0D. H...........| -00000010 5c 01 28 24 12 03 bc 48 a8 b3 e8 65 9c 67 6f 5c |\.($...H...e.go\| -00000020 41 27 bd e7 02 20 01 b0 f1 51 43 7a 81 53 d5 47 |A'... ...QCz.S.G| -00000030 5b ea 76 63 60 63 5c 44 27 45 6e a2 ed 74 47 fc |[.vc`c\D'En..tG.| -00000040 b5 d2 64 f8 28 a3 |..d.(.|" -"2019-05-02 01:31:39.874 UTC [cauthdsl] func2 -> DEBU 18b4 0xc000c955d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:39.874 UTC [cauthdsl] func1 -> DEBU 18b5 0xc000c955d0 gate 1556760699872409800 evaluation succeeds" -"2019-05-02 01:31:39.874 UTC [policies] Evaluate -> DEBU 18b6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:39.875 UTC [policies] Evaluate -> DEBU 18b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:39.875 UTC [policies] Evaluate -> DEBU 18b8 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:39.875 UTC [policies] Evaluate -> DEBU 18b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:39.876 UTC [policies] Evaluate -> DEBU 18ba Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:39.876 UTC [policies] Evaluate -> DEBU 18bb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:39.876 UTC [common.deliver] deliverBlocks -> DEBU 18bc [channel: businesschannel] Received seekInfo (0xc00110b5c0) start: > stop: > from 192.168.240.9:47564" -"2019-05-02 01:31:39.877 UTC [fsblkstorage] Next -> DEBU 18bd Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:39.877 UTC [fsblkstorage] newBlockfileStream -> DEBU 18be newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94616]" -"2019-05-02 01:31:39.877 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18bf Remaining bytes=[39050], Going to peek [8] bytes" -"2019-05-02 01:31:39.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18c0 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[94616], bytesOffset=[94618]}" -"2019-05-02 01:31:39.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18c1 blockbytes [4048] read from file [0]" -"2019-05-02 01:31:39.878 UTC [common.deliver] deliverBlocks -> DEBU 18c2 [channel: businesschannel] Delivering block [8] for (0xc00110b5c0) for 192.168.240.9:47564" -"2019-05-02 01:31:39.879 UTC [common.deliver] deliverBlocks -> DEBU 18c3 [channel: businesschannel] Done delivering to 192.168.240.9:47564 for (0xc00110b5c0)" -"2019-05-02 01:31:39.879 UTC [fsblkstorage] waitForBlock -> DEBU 18c4 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:39.880 UTC [fsblkstorage] waitForBlock -> DEBU 18c5 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:39.880 UTC [common.deliver] Handle -> DEBU 18c6 Waiting for new SeekInfo from 192.168.240.9:47564" -"2019-05-02 01:31:39.880 UTC [common.deliver] Handle -> DEBU 18c7 Attempting to read seek info message from 192.168.240.9:47564" -"2019-05-02 01:31:39.887 UTC [common.deliver] Handle -> WARN 18c8 Error reading from 192.168.240.9:47564: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:39.888 UTC [orderer.common.server] func1 -> DEBU 18c9 Closing Deliver stream" -"2019-05-02 01:31:39.888 UTC [comm.grpc.server] 1 -> INFO 18ca streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47564 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.1848ms -"2019-05-02 01:31:39.888 UTC [grpc] infof -> DEBU 18cb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:39.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18cc Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs" -"2019-05-02 01:31:40.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18cd Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" -"2019-05-02 01:31:40.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.3µs " -"2019-05-02 01:31:40.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.4µs " -"2019-05-02 01:31:40.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18d0 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:40.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18d1 Sending msg of 28 bytes to 3 on channel testchainid took 12.1µs" -"2019-05-02 01:31:40.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18d2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.3µs " -"2019-05-02 01:31:40.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18d3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:40.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18d4 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:40.055 UTC [orderer.common.server] Deliver -> DEBU 18d5 Starting new Deliver handler" -"2019-05-02 01:31:40.055 UTC [common.deliver] Handle -> DEBU 18d6 Starting new deliver loop for 192.168.240.9:47566" -"2019-05-02 01:31:40.056 UTC [common.deliver] Handle -> DEBU 18d7 Attempting to read seek info message from 192.168.240.9:47566" -"2019-05-02 01:31:40.058 UTC [policies] Evaluate -> DEBU 18d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:40.058 UTC [policies] Evaluate -> DEBU 18d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.058 UTC [policies] Evaluate -> DEBU 18da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:40.059 UTC [policies] Evaluate -> DEBU 18db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.059 UTC [policies] Evaluate -> DEBU 18dc == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:40.059 UTC [cauthdsl] func1 -> DEBU 18dd 0xc000b76260 gate 1556760700059647300 evaluation starts" -"2019-05-02 01:31:40.060 UTC [cauthdsl] func2 -> DEBU 18de 0xc000b76260 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.060 UTC [cauthdsl] func2 -> DEBU 18df 0xc000b76260 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:40.060 UTC [cauthdsl] func2 -> DEBU 18e0 0xc000b76260 principal matched by identity 0" -"2019-05-02 01:31:40.061 UTC [msp.identity] Verify -> DEBU 18e1 Verify: digest = 00000000 ea 0e 51 b1 25 30 09 20 15 94 9a 26 55 2b 04 50 |..Q.%0. ...&U+.P| -00000010 ec ee a2 59 60 c6 1b 3d 03 23 57 ae c2 c7 4e 63 |...Y`..=.#W...Nc|" -"2019-05-02 01:31:40.061 UTC [msp.identity] Verify -> DEBU 18e2 Verify: sig = 00000000 30 44 02 20 20 92 bf 40 c9 58 0f 6e 21 d6 97 50 |0D. ..@.X.n!..P| -00000010 36 29 ec 23 06 9c b3 ca 25 71 a9 48 83 2e 43 b7 |6).#....%q.H..C.| -00000020 f9 c4 16 dc 02 20 0f af 64 05 3c c4 a1 10 f0 46 |..... ..d.<....F| -00000030 9e a0 b2 53 e7 10 b6 5c 33 95 64 4d 02 01 98 c5 |...S...\3.dM....| -00000040 4f 06 e7 c3 ca c7 |O.....|" -"2019-05-02 01:31:40.061 UTC [cauthdsl] func2 -> DEBU 18e3 0xc000b76260 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.062 UTC [cauthdsl] func1 -> DEBU 18e4 0xc000b76260 gate 1556760700059647300 evaluation succeeds" -"2019-05-02 01:31:40.062 UTC [policies] Evaluate -> DEBU 18e5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.062 UTC [policies] Evaluate -> DEBU 18e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.063 UTC [policies] Evaluate -> DEBU 18e7 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.064 UTC [policies] Evaluate -> DEBU 18e8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.064 UTC [policies] Evaluate -> DEBU 18e9 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:40.065 UTC [policies] Evaluate -> DEBU 18ea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:40.065 UTC [common.deliver] deliverBlocks -> DEBU 18eb [channel: businesschannel] Received seekInfo (0xc0001088c0) start: > stop: > from 192.168.240.9:47566" -"2019-05-02 01:31:40.066 UTC [fsblkstorage] Next -> DEBU 18ec Initializing block stream for iterator. itr.maxBlockNumAvailable=9" -"2019-05-02 01:31:40.066 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ed newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" -"2019-05-02 01:31:40.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ee Remaining bytes=[35000], Going to peek [8] bytes" -"2019-05-02 01:31:40.069 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ef Returning blockbytes - length=[34997], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" -"2019-05-02 01:31:40.070 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18f0 blockbytes [34997] read from file [0]" -"2019-05-02 01:31:40.071 UTC [common.deliver] deliverBlocks -> DEBU 18f1 [channel: businesschannel] Delivering block [9] for (0xc0001088c0) for 192.168.240.9:47566" -"2019-05-02 01:31:40.071 UTC [common.deliver] deliverBlocks -> DEBU 18f2 [channel: businesschannel] Done delivering to 192.168.240.9:47566 for (0xc0001088c0)" -"2019-05-02 01:31:40.072 UTC [fsblkstorage] waitForBlock -> DEBU 18f3 Came out of wait. maxAvailaBlockNumber=[9]" -"2019-05-02 01:31:40.073 UTC [fsblkstorage] waitForBlock -> DEBU 18f4 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" -"2019-05-02 01:31:40.073 UTC [common.deliver] Handle -> DEBU 18f5 Waiting for new SeekInfo from 192.168.240.9:47566" -"2019-05-02 01:31:40.073 UTC [common.deliver] Handle -> DEBU 18f6 Attempting to read seek info message from 192.168.240.9:47566" -"2019-05-02 01:31:40.088 UTC [common.deliver] Handle -> WARN 18f7 Error reading from 192.168.240.9:47566: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:40.088 UTC [orderer.common.server] func1 -> DEBU 18f8 Closing Deliver stream" -"2019-05-02 01:31:40.089 UTC [comm.grpc.server] 1 -> INFO 18f9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47566 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.2425ms -"2019-05-02 01:31:40.090 UTC [grpc] infof -> DEBU 18fa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:40.276 UTC [orderer.common.server] Deliver -> DEBU 18fb Starting new Deliver handler" -"2019-05-02 01:31:40.276 UTC [common.deliver] Handle -> DEBU 18fc Starting new deliver loop for 192.168.240.9:47568" -"2019-05-02 01:31:40.276 UTC [common.deliver] Handle -> DEBU 18fd Attempting to read seek info message from 192.168.240.9:47568" -"2019-05-02 01:31:40.277 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:40.277 UTC [policies] Evaluate -> DEBU 18ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.278 UTC [policies] Evaluate -> DEBU 1900 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:40.278 UTC [policies] Evaluate -> DEBU 1901 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.278 UTC [policies] Evaluate -> DEBU 1902 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:40.278 UTC [cauthdsl] func1 -> DEBU 1903 0xc00046d270 gate 1556760700278951500 evaluation starts" -"2019-05-02 01:31:40.279 UTC [cauthdsl] func2 -> DEBU 1904 0xc00046d270 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.279 UTC [cauthdsl] func2 -> DEBU 1905 0xc00046d270 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:40.279 UTC [cauthdsl] func2 -> DEBU 1906 0xc00046d270 principal matched by identity 0" -"2019-05-02 01:31:40.280 UTC [msp.identity] Verify -> DEBU 1907 Verify: digest = 00000000 72 04 71 fb 77 ea 2a 61 02 39 34 49 43 f0 b9 0d |r.q.w.*a.94IC...| -00000010 0d ef b3 36 03 5a 1a 6d f7 88 bc ab 68 9f 0c 0f |...6.Z.m....h...|" -"2019-05-02 01:31:40.280 UTC [msp.identity] Verify -> DEBU 1908 Verify: sig = 00000000 30 45 02 21 00 f5 5f 3a 0a d4 fc 82 20 d9 d0 6d |0E.!.._:.... ..m| -00000010 bd 80 c0 35 d9 cd b8 60 2e 60 72 1a ce 9b 2f c6 |...5...`.`r.../.| -00000020 56 54 82 31 16 02 20 3b ae aa 0c b8 3b cb 28 63 |VT.1.. ;....;.(c| -00000030 b8 ad 35 42 48 7e 84 2f ef 2a ad d1 66 5f e4 e9 |..5BH~./.*..f_..| -00000040 fa bc 7a a6 88 80 22 |..z..."|" -"2019-05-02 01:31:40.281 UTC [cauthdsl] func2 -> DEBU 1909 0xc00046d270 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.281 UTC [cauthdsl] func1 -> DEBU 190a 0xc00046d270 gate 1556760700278951500 evaluation succeeds" -"2019-05-02 01:31:40.281 UTC [policies] Evaluate -> DEBU 190b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.282 UTC [policies] Evaluate -> DEBU 190c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.282 UTC [policies] Evaluate -> DEBU 190d Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.282 UTC [policies] Evaluate -> DEBU 190e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.282 UTC [policies] Evaluate -> DEBU 190f Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:40.283 UTC [policies] Evaluate -> DEBU 1910 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:40.283 UTC [common.deliver] deliverBlocks -> DEBU 1911 [channel: testchainid] Received seekInfo (0xc000109cc0) start: > stop: > from 192.168.240.9:47568" -"2019-05-02 01:31:40.283 UTC [fsblkstorage] Next -> DEBU 1912 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:31:40.283 UTC [fsblkstorage] newBlockfileStream -> DEBU 1913 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -"2019-05-02 01:31:40.284 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1914 Remaining bytes=[25827], Going to peek [8] bytes" -"2019-05-02 01:31:40.284 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1915 Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -"2019-05-02 01:31:40.284 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1916 blockbytes [25824] read from file [0]" -"2019-05-02 01:31:40.285 UTC [common.deliver] deliverBlocks -> DEBU 1917 [channel: testchainid] Delivering block [1] for (0xc000109cc0) for 192.168.240.9:47568" -"2019-05-02 01:31:40.285 UTC [common.deliver] deliverBlocks -> DEBU 1918 [channel: testchainid] Done delivering to 192.168.240.9:47568 for (0xc000109cc0)" -"2019-05-02 01:31:40.286 UTC [common.deliver] Handle -> DEBU 1919 Waiting for new SeekInfo from 192.168.240.9:47568" -"2019-05-02 01:31:40.286 UTC [common.deliver] Handle -> DEBU 191a Attempting to read seek info message from 192.168.240.9:47568" -"2019-05-02 01:31:40.292 UTC [common.deliver] Handle -> WARN 191b Error reading from 192.168.240.9:47568: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:40.292 UTC [orderer.common.server] func1 -> DEBU 191c Closing Deliver stream" -"2019-05-02 01:31:40.293 UTC [comm.grpc.server] 1 -> INFO 191d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47568 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.6285ms -"2019-05-02 01:31:40.294 UTC [grpc] infof -> DEBU 191e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:40.456 UTC [orderer.common.server] Deliver -> DEBU 191f Starting new Deliver handler" -"2019-05-02 01:31:40.456 UTC [common.deliver] Handle -> DEBU 1920 Starting new deliver loop for 192.168.240.9:47570" -"2019-05-02 01:31:40.457 UTC [common.deliver] Handle -> DEBU 1921 Attempting to read seek info message from 192.168.240.9:47570" -"2019-05-02 01:31:40.461 UTC [policies] Evaluate -> DEBU 1922 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:40.462 UTC [policies] Evaluate -> DEBU 1923 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.463 UTC [policies] Evaluate -> DEBU 1924 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:40.463 UTC [policies] Evaluate -> DEBU 1925 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.464 UTC [policies] Evaluate -> DEBU 1926 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:40.464 UTC [cauthdsl] func1 -> DEBU 1927 0xc000383c20 gate 1556760700464843500 evaluation starts" -"2019-05-02 01:31:40.465 UTC [cauthdsl] func2 -> DEBU 1928 0xc000383c20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.465 UTC [cauthdsl] func2 -> DEBU 1929 0xc000383c20 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:40.466 UTC [cauthdsl] func2 -> DEBU 192a 0xc000383c20 principal matched by identity 0" -"2019-05-02 01:31:40.466 UTC [msp.identity] Verify -> DEBU 192b Verify: digest = 00000000 99 96 2d 44 b1 b7 0c 43 63 a0 8b 82 75 a1 5c 58 |..-D...Cc...u.\X| -00000010 3f ca 07 3f 63 3f 99 35 2f a2 1f 56 16 7b 68 fa |?..?c?.5/..V.{h.|" -"2019-05-02 01:31:40.467 UTC [msp.identity] Verify -> DEBU 192c Verify: sig = 00000000 30 45 02 21 00 e1 a5 83 60 b6 22 03 a6 8a cf ab |0E.!....`.".....| -00000010 2a a0 05 73 4f 2b 48 be fe c0 2d 55 be db b5 06 |*..sO+H...-U....| -00000020 2d d9 66 f7 5a 02 20 31 88 3a 72 34 48 66 37 91 |-.f.Z. 1.:r4Hf7.| -00000030 95 7a 53 fe 6e 1c ec 5a fe ff 27 cb e1 01 6e 51 |.zS.n..Z..'...nQ| -00000040 f4 37 e6 4b 64 c6 5c |.7.Kd.\|" -"2019-05-02 01:31:40.468 UTC [cauthdsl] func2 -> DEBU 192d 0xc000383c20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.468 UTC [cauthdsl] func1 -> DEBU 192e 0xc000383c20 gate 1556760700464843500 evaluation succeeds" -"2019-05-02 01:31:40.468 UTC [policies] Evaluate -> DEBU 192f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.469 UTC [policies] Evaluate -> DEBU 1930 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.469 UTC [policies] Evaluate -> DEBU 1931 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.469 UTC [policies] Evaluate -> DEBU 1932 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.469 UTC [policies] Evaluate -> DEBU 1933 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:40.470 UTC [policies] Evaluate -> DEBU 1934 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:40.470 UTC [common.deliver] deliverBlocks -> DEBU 1935 [channel: testchainid] Received seekInfo (0xc00017e640) start: > stop: > from 192.168.240.9:47570" -"2019-05-02 01:31:40.471 UTC [fsblkstorage] Next -> DEBU 1936 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:31:40.471 UTC [fsblkstorage] newBlockfileStream -> DEBU 1937 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -"2019-05-02 01:31:40.471 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1938 Remaining bytes=[25827], Going to peek [8] bytes" -"2019-05-02 01:31:40.472 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1939 Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -"2019-05-02 01:31:40.472 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 193a blockbytes [25824] read from file [0]" -"2019-05-02 01:31:40.473 UTC [common.deliver] deliverBlocks -> DEBU 193b [channel: testchainid] Delivering block [1] for (0xc00017e640) for 192.168.240.9:47570" -"2019-05-02 01:31:40.473 UTC [common.deliver] deliverBlocks -> DEBU 193c [channel: testchainid] Done delivering to 192.168.240.9:47570 for (0xc00017e640)" -"2019-05-02 01:31:40.474 UTC [common.deliver] Handle -> DEBU 193d Waiting for new SeekInfo from 192.168.240.9:47570" -"2019-05-02 01:31:40.475 UTC [common.deliver] Handle -> DEBU 193e Attempting to read seek info message from 192.168.240.9:47570" -"2019-05-02 01:31:40.476 UTC [policies] Evaluate -> DEBU 193f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:40.477 UTC [policies] Evaluate -> DEBU 1940 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.477 UTC [policies] Evaluate -> DEBU 1941 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:40.477 UTC [policies] Evaluate -> DEBU 1942 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.477 UTC [policies] Evaluate -> DEBU 1943 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:40.478 UTC [cauthdsl] func1 -> DEBU 1944 0xc000439550 gate 1556760700478059600 evaluation starts" -"2019-05-02 01:31:40.478 UTC [cauthdsl] func2 -> DEBU 1945 0xc000439550 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.478 UTC [cauthdsl] func2 -> DEBU 1946 0xc000439550 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:40.478 UTC [cauthdsl] func2 -> DEBU 1947 0xc000439550 principal matched by identity 0" -"2019-05-02 01:31:40.479 UTC [msp.identity] Verify -> DEBU 1948 Verify: digest = 00000000 7b 97 5a 38 4b 9d ea a3 5e 47 45 4c 42 0e 27 2e |{.Z8K...^GELB.'.| -00000010 64 2c c0 d5 a9 ed fc fe 52 d3 3e 76 50 d7 38 af |d,......R.>vP.8.|" -"2019-05-02 01:31:40.479 UTC [msp.identity] Verify -> DEBU 1949 Verify: sig = 00000000 30 44 02 20 67 d5 c5 d0 46 62 39 1d 94 a9 73 b4 |0D. g...Fb9...s.| -00000010 2e 82 39 09 1d aa ca 69 7d 01 f1 ee 57 32 41 97 |..9....i}...W2A.| -00000020 55 c4 cd 9f 02 20 57 c4 ff ec 0d d6 1a 6a ab 72 |U.... W......j.r| -00000030 e3 1d 93 47 16 70 5e d7 d9 63 66 51 1a 6d e8 91 |...G.p^..cfQ.m..| -00000040 af 2b 4e 1b 37 e0 |.+N.7.|" -"2019-05-02 01:31:40.479 UTC [cauthdsl] func2 -> DEBU 194a 0xc000439550 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.479 UTC [cauthdsl] func1 -> DEBU 194b 0xc000439550 gate 1556760700478059600 evaluation succeeds" -"2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 194c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 194d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 194e Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 194f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 1950 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:40.480 UTC [policies] Evaluate -> DEBU 1951 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:40.481 UTC [common.deliver] deliverBlocks -> DEBU 1952 [channel: testchainid] Received seekInfo (0xc00017eb40) start: > stop: > from 192.168.240.9:47570" -"2019-05-02 01:31:40.481 UTC [fsblkstorage] Next -> DEBU 1953 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:31:40.481 UTC [fsblkstorage] newBlockfileStream -> DEBU 1954 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-05-02 01:31:40.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1955 Remaining bytes=[44242], Going to peek [8] bytes" -"2019-05-02 01:31:40.482 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1956 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:31:40.482 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1957 blockbytes [18412] read from file [0]" -"2019-05-02 01:31:40.482 UTC [common.deliver] deliverBlocks -> DEBU 1958 [channel: testchainid] Delivering block [0] for (0xc00017eb40) for 192.168.240.9:47570" -"2019-05-02 01:31:40.482 UTC [common.deliver] deliverBlocks -> DEBU 1959 [channel: testchainid] Done delivering to 192.168.240.9:47570 for (0xc00017eb40)" -"2019-05-02 01:31:40.483 UTC [common.deliver] Handle -> DEBU 195a Waiting for new SeekInfo from 192.168.240.9:47570" -"2019-05-02 01:31:40.483 UTC [common.deliver] Handle -> DEBU 195b Attempting to read seek info message from 192.168.240.9:47570" -"2019-05-02 01:31:40.491 UTC [common.deliver] Handle -> WARN 195c Error reading from 192.168.240.9:47570: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:40.491 UTC [orderer.common.server] func1 -> DEBU 195d Closing Deliver stream" -"2019-05-02 01:31:40.492 UTC [comm.grpc.server] 1 -> INFO 195e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47570 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.7935ms -"2019-05-02 01:31:40.492 UTC [grpc] infof -> DEBU 195f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:40.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1960 Sending msg of 28 bytes to 3 on channel businesschannel took 173.4µs" -"2019-05-02 01:31:40.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1961 Sending msg of 28 bytes to 2 on channel businesschannel took 66.8µs" -"2019-05-02 01:31:40.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1962 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.1596ms " -"2019-05-02 01:31:40.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1965 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:40.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1966 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:40.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1963 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.3253ms " -"2019-05-02 01:31:40.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1964 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:40.509 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1967 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" -"2019-05-02 01:31:40.511 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1968 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 660.8µs " -"2019-05-02 01:31:40.639 UTC [orderer.common.server] Deliver -> DEBU 1969 Starting new Deliver handler" -"2019-05-02 01:31:40.639 UTC [common.deliver] Handle -> DEBU 196a Starting new deliver loop for 192.168.240.9:47572" -"2019-05-02 01:31:40.639 UTC [common.deliver] Handle -> DEBU 196b Attempting to read seek info message from 192.168.240.9:47572" -"2019-05-02 01:31:40.640 UTC [policies] Evaluate -> DEBU 196c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:40.641 UTC [policies] Evaluate -> DEBU 196d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.641 UTC [policies] Evaluate -> DEBU 196e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:40.641 UTC [policies] Evaluate -> DEBU 196f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.641 UTC [policies] Evaluate -> DEBU 1970 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:40.641 UTC [cauthdsl] func1 -> DEBU 1971 0xc00048c170 gate 1556760700641590200 evaluation starts" -"2019-05-02 01:31:40.641 UTC [cauthdsl] func2 -> DEBU 1972 0xc00048c170 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.641 UTC [cauthdsl] func2 -> DEBU 1973 0xc00048c170 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:40.642 UTC [cauthdsl] func2 -> DEBU 1974 0xc00048c170 principal matched by identity 0" -"2019-05-02 01:31:40.642 UTC [msp.identity] Verify -> DEBU 1975 Verify: digest = 00000000 52 f5 39 2f b0 39 f6 46 02 b1 bf 3a 75 b2 72 05 |R.9/.9.F...:u.r.| -00000010 b4 42 ce fb 81 6f ae 54 18 af 28 31 56 06 0d 3d |.B...o.T..(1V..=|" -"2019-05-02 01:31:40.642 UTC [msp.identity] Verify -> DEBU 1976 Verify: sig = 00000000 30 44 02 20 29 e8 77 d0 78 b8 02 b3 33 df 28 34 |0D. ).w.x...3.(4| -00000010 c2 9f 1c 91 98 4c fb 95 9a 3f 18 72 83 16 21 48 |.....L...?.r..!H| -00000020 17 62 87 f0 02 20 23 37 83 d8 2c a7 73 f6 aa ad |.b... #7..,.s...| -00000030 54 f3 2c 09 6d 10 32 e6 9e ff 69 72 65 1e c9 13 |T.,.m.2...ire...| -00000040 cb 00 2c 86 81 c4 |..,...|" -"2019-05-02 01:31:40.642 UTC [cauthdsl] func2 -> DEBU 1977 0xc00048c170 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.642 UTC [cauthdsl] func1 -> DEBU 1978 0xc00048c170 gate 1556760700641590200 evaluation succeeds" -"2019-05-02 01:31:40.642 UTC [policies] Evaluate -> DEBU 1979 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.642 UTC [policies] Evaluate -> DEBU 197a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.642 UTC [policies] Evaluate -> DEBU 197b Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.643 UTC [policies] Evaluate -> DEBU 197c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.643 UTC [policies] Evaluate -> DEBU 197d Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:40.643 UTC [policies] Evaluate -> DEBU 197e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:40.643 UTC [common.deliver] deliverBlocks -> DEBU 197f [channel: testchainid] Received seekInfo (0xc00017f300) start: > stop: > from 192.168.240.9:47572" -"2019-05-02 01:31:40.643 UTC [fsblkstorage] Next -> DEBU 1980 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:31:40.643 UTC [fsblkstorage] newBlockfileStream -> DEBU 1981 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-05-02 01:31:40.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1982 Remaining bytes=[44242], Going to peek [8] bytes" -"2019-05-02 01:31:40.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1983 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-05-02 01:31:40.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1984 blockbytes [18412] read from file [0]" -"2019-05-02 01:31:40.644 UTC [common.deliver] deliverBlocks -> DEBU 1985 [channel: testchainid] Delivering block [0] for (0xc00017f300) for 192.168.240.9:47572" -"2019-05-02 01:31:40.645 UTC [common.deliver] deliverBlocks -> DEBU 1986 [channel: testchainid] Done delivering to 192.168.240.9:47572 for (0xc00017f300)" -"2019-05-02 01:31:40.645 UTC [common.deliver] Handle -> DEBU 1987 Waiting for new SeekInfo from 192.168.240.9:47572" -"2019-05-02 01:31:40.645 UTC [common.deliver] Handle -> DEBU 1988 Attempting to read seek info message from 192.168.240.9:47572" -"2019-05-02 01:31:40.652 UTC [grpc] infof -> DEBU 1989 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:40.652 UTC [common.deliver] Handle -> WARN 198a Error reading from 192.168.240.9:47572: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:40.652 UTC [orderer.common.server] func1 -> DEBU 198b Closing Deliver stream" -"2019-05-02 01:31:40.653 UTC [comm.grpc.server] 1 -> INFO 198c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47572 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.9752ms -"2019-05-02 01:31:40.693 UTC [orderer.common.server] replicateDisabledChains -> DEBU 198d No inactive chains to try to replicate" -"2019-05-02 01:31:40.865 UTC [orderer.common.server] Deliver -> DEBU 198e Starting new Deliver handler" -"2019-05-02 01:31:40.865 UTC [common.deliver] Handle -> DEBU 198f Starting new deliver loop for 192.168.240.9:47574" -"2019-05-02 01:31:40.866 UTC [common.deliver] Handle -> DEBU 1990 Attempting to read seek info message from 192.168.240.9:47574" -"2019-05-02 01:31:40.867 UTC [policies] Evaluate -> DEBU 1991 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 1992 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 1993 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 1994 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 1995 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-05-02 01:31:40.868 UTC [cauthdsl] func1 -> DEBU 1996 0xc00018fc60 gate 1556760700868318300 evaluation starts" -"2019-05-02 01:31:40.868 UTC [cauthdsl] func2 -> DEBU 1997 0xc00018fc60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.868 UTC [cauthdsl] func2 -> DEBU 1998 0xc00018fc60 processing identity 0 with bytes of efef60" -"2019-05-02 01:31:40.868 UTC [cauthdsl] func2 -> DEBU 1999 0xc00018fc60 principal matched by identity 0" -"2019-05-02 01:31:40.868 UTC [msp.identity] Verify -> DEBU 199a Verify: digest = 00000000 d9 42 a7 73 b6 f2 19 dc 6d ea 2a ed 70 17 73 d1 |.B.s....m.*.p.s.| -00000010 d0 2e 65 f5 64 ae a7 1d eb 8f ae 34 7d ba aa 06 |..e.d......4}...|" -"2019-05-02 01:31:40.868 UTC [msp.identity] Verify -> DEBU 199b Verify: sig = 00000000 30 45 02 21 00 9f bb 1c 54 8f 46 13 22 17 c5 d6 |0E.!....T.F."...| -00000010 bd a0 c5 49 46 92 fb a2 69 b2 aa d8 13 29 8d 9d |...IF...i....)..| -00000020 5e a9 af 3a 61 02 20 71 7a ce fe a8 0e 4d d0 de |^..:a. qz....M..| -00000030 c6 a4 da ac 0d a3 c9 64 5d 8b 3b 2f 1a 12 4e 9f |.......d].;/..N.| -00000040 b8 91 ee 34 16 0d 23 |...4..#|" -"2019-05-02 01:31:40.868 UTC [cauthdsl] func2 -> DEBU 199c 0xc00018fc60 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.868 UTC [cauthdsl] func1 -> DEBU 199d 0xc00018fc60 gate 1556760700868318300 evaluation succeeds" -"2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 199e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.868 UTC [policies] Evaluate -> DEBU 199f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:40.869 UTC [policies] Evaluate -> DEBU 19a0 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.869 UTC [policies] Evaluate -> DEBU 19a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-05-02 01:31:40.869 UTC [policies] Evaluate -> DEBU 19a2 Signature set satisfies policy /Channel/Readers" -"2019-05-02 01:31:40.869 UTC [policies] Evaluate -> DEBU 19a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-05-02 01:31:40.869 UTC [common.deliver] deliverBlocks -> DEBU 19a4 [channel: testchainid] Received seekInfo (0xc000088cc0) start: > stop: > from 192.168.240.9:47574" -"2019-05-02 01:31:40.869 UTC [fsblkstorage] Next -> DEBU 19a5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-05-02 01:31:40.869 UTC [fsblkstorage] newBlockfileStream -> DEBU 19a6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" -"2019-05-02 01:31:40.869 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19a7 Remaining bytes=[25827], Going to peek [8] bytes" -"2019-05-02 01:31:40.869 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19a8 Returning blockbytes - length=[25824], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" -"2019-05-02 01:31:40.869 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19a9 blockbytes [25824] read from file [0]" -"2019-05-02 01:31:40.869 UTC [common.deliver] deliverBlocks -> DEBU 19aa [channel: testchainid] Delivering block [1] for (0xc000088cc0) for 192.168.240.9:47574" -"2019-05-02 01:31:40.870 UTC [common.deliver] deliverBlocks -> DEBU 19ab [channel: testchainid] Done delivering to 192.168.240.9:47574 for (0xc000088cc0)" -"2019-05-02 01:31:40.870 UTC [common.deliver] Handle -> DEBU 19ac Waiting for new SeekInfo from 192.168.240.9:47574" -"2019-05-02 01:31:40.870 UTC [common.deliver] Handle -> DEBU 19ad Attempting to read seek info message from 192.168.240.9:47574" -"2019-05-02 01:31:40.881 UTC [grpc] infof -> DEBU 19ae transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:40.881 UTC [common.deliver] Handle -> WARN 19af Error reading from 192.168.240.9:47574: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:40.882 UTC [orderer.common.server] func1 -> DEBU 19b0 Closing Deliver stream" -"2019-05-02 01:31:40.882 UTC [comm.grpc.server] 1 -> INFO 19b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.240.9:47574 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.8258ms -"2019-05-02 01:31:40.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b2 Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" -"2019-05-02 01:31:40.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b3 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" -"2019-05-02 01:31:41.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.9µs " -"2019-05-02 01:31:41.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.9µs " -"2019-05-02 01:31:41.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b6 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:41.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b7 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:41.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b8 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:41.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b9 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" -"2019-05-02 01:31:41.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19ba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 720.3µs " -"2019-05-02 01:31:41.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19bb Sending msg of 28 bytes to 3 on channel businesschannel took 29.1µs" -"2019-05-02 01:31:41.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19bc Sending msg of 28 bytes to 2 on channel businesschannel took 15.9µs" -"2019-05-02 01:31:41.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77µs " -"2019-05-02 01:31:41.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.2µs " -"2019-05-02 01:31:41.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19bf Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:41.511 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c0 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:41.512 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c1 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:41.512 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c2 Sending msg of 28 bytes to 3 on channel testchainid took 18µs" -"2019-05-02 01:31:41.512 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117µs " -"2019-05-02 01:31:41.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c4 Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" -"2019-05-02 01:31:41.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c5 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" -"2019-05-02 01:31:42.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.9µs " -"2019-05-02 01:31:42.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " -"2019-05-02 01:31:42.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c8 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:42.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c9 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:42.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ca Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:42.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19cb Sending msg of 28 bytes to 3 on channel testchainid took 25.4µs" -"2019-05-02 01:31:42.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19cc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.7µs " -"2019-05-02 01:31:42.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19cd Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" -"2019-05-02 01:31:42.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ce Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" -"2019-05-02 01:31:42.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.8µs " -"2019-05-02 01:31:42.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.8µs " -"2019-05-02 01:31:42.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d1 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:42.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d2 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:42.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d3 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:42.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d4 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" -"2019-05-02 01:31:42.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.2µs " -"2019-05-02 01:31:42.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d6 Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" -"2019-05-02 01:31:42.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d7 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" -"2019-05-02 01:31:42.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.8µs " -"2019-05-02 01:31:43.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.5µs " -"2019-05-02 01:31:43.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19da Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:43.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19db Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:43.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19dc Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:43.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dd Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" -"2019-05-02 01:31:43.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.7µs " -"2019-05-02 01:31:43.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19df Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" -"2019-05-02 01:31:43.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e0 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" -"2019-05-02 01:31:43.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.3µs " -"2019-05-02 01:31:43.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " -"2019-05-02 01:31:43.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e3 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:43.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e4 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:43.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e5 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:43.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e6 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" -"2019-05-02 01:31:43.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.3µs " -"2019-05-02 01:31:43.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e8 Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" -"2019-05-02 01:31:43.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e9 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" -"2019-05-02 01:31:43.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " -"2019-05-02 01:31:43.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.2µs " -"2019-05-02 01:31:44.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ec Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:44.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ed Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:44.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ee Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:44.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ef Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" -"2019-05-02 01:31:44.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19f0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.4µs " -"2019-05-02 01:31:44.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19f1 Sending msg of 28 bytes to 2 on channel businesschannel took 66.4µs" -"2019-05-02 01:31:44.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19f2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" -"2019-05-02 01:31:44.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.4µs " -"2019-05-02 01:31:44.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0464ms " -"2019-05-02 01:31:44.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19f5 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:44.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19f6 Sending msg of 28 bytes to 3 on channel testchainid took 183.6µs" -"2019-05-02 01:31:44.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19f7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.8µs " -"2019-05-02 01:31:44.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19f8 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:44.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19f9 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:45.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19fa Sending msg of 28 bytes to 3 on channel businesschannel took 41.3µs" -"2019-05-02 01:31:45.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19fb Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" -"2019-05-02 01:31:45.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.1µs " -"2019-05-02 01:31:45.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.9µs " -"2019-05-02 01:31:45.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19fe Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:45.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ff Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:45.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a00 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" -"2019-05-02 01:31:45.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a01 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " -"2019-05-02 01:31:45.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a02 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:45.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a03 Sending msg of 28 bytes to 2 on channel businesschannel took 47.7µs" -"2019-05-02 01:31:45.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a04 Sending msg of 28 bytes to 3 on channel businesschannel took 28.2µs" -"2019-05-02 01:31:45.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.3µs " -"2019-05-02 01:31:45.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167.5µs " -"2019-05-02 01:31:45.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a07 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:45.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a08 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:45.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a09 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:45.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0a Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" -"2019-05-02 01:31:45.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.7µs " -"2019-05-02 01:31:45.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0c Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" -"2019-05-02 01:31:45.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0d Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" -"2019-05-02 01:31:45.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " -"2019-05-02 01:31:46.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71µs " -"2019-05-02 01:31:46.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a10 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:46.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a11 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:46.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a12 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:46.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a13 Sending msg of 28 bytes to 3 on channel testchainid took 9.2µs" -"2019-05-02 01:31:46.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.5µs " -"2019-05-02 01:31:46.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a15 Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" -"2019-05-02 01:31:46.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a16 Sending msg of 28 bytes to 3 on channel businesschannel took 42.6µs" -"2019-05-02 01:31:46.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.4µs " -"2019-05-02 01:31:46.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.7µs " -"2019-05-02 01:31:46.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a19 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:46.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a1a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:46.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a1b Sending msg of 28 bytes to 3 on channel testchainid took 27.6µs" -"2019-05-02 01:31:46.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a1c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.1µs " -"2019-05-02 01:31:46.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a1d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:46.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.6µs " -"2019-05-02 01:31:46.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a1f Sending msg of 28 bytes to 3 on channel businesschannel took 60.1µs" -"2019-05-02 01:31:47.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a20 Sending msg of 28 bytes to 2 on channel businesschannel took 40.8µs" -"2019-05-02 01:31:47.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.7µs " -"2019-05-02 01:31:47.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a22 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:47.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a23 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:47.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a24 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" -"2019-05-02 01:31:47.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a25 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.3µs " -"2019-05-02 01:31:47.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a26 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:47.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a27 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" -"2019-05-02 01:31:47.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a28 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" -"2019-05-02 01:31:47.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " -"2019-05-02 01:31:47.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 385.9µs " -"2019-05-02 01:31:47.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a2b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:47.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a2c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:47.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a2d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:47.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a2e Sending msg of 28 bytes to 3 on channel testchainid took 1.1871ms" -"2019-05-02 01:31:47.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " -"2019-05-02 01:31:47.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a30 Sending msg of 28 bytes to 3 on channel businesschannel took 26.2µs" -"2019-05-02 01:31:47.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a31 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" -"2019-05-02 01:31:47.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.4µs " -"2019-05-02 01:31:47.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.7µs " -"2019-05-02 01:31:48.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a34 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:48.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a35 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:48.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a36 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:48.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a37 Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" -"2019-05-02 01:31:48.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.7µs " -"2019-05-02 01:31:48.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a39 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" -"2019-05-02 01:31:48.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3a Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" -"2019-05-02 01:31:48.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " -"2019-05-02 01:31:48.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.2µs " -"2019-05-02 01:31:48.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3d Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:48.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3e Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" -"2019-05-02 01:31:48.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3f Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:48.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " -"2019-05-02 01:31:48.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a41 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:49.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a42 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" -"2019-05-02 01:31:49.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a43 Sending msg of 28 bytes to 3 on channel businesschannel took 40.4µs" -"2019-05-02 01:31:49.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs " -"2019-05-02 01:31:49.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167.6µs " -"2019-05-02 01:31:49.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a46 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:49.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a47 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:49.012 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a48 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" -"2019-05-02 01:31:49.012 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a49 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.9µs " -"2019-05-02 01:31:49.012 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a4a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:49.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a4b Sending msg of 28 bytes to 2 on channel businesschannel took 41.6µs" -"2019-05-02 01:31:49.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a4c Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" -"2019-05-02 01:31:49.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.9µs " -"2019-05-02 01:31:49.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.3µs " -"2019-05-02 01:31:49.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a4f Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:49.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a50 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" -"2019-05-02 01:31:49.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a51 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.6µs " -"2019-05-02 01:31:49.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a52 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:49.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a53 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:49.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a54 Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" -"2019-05-02 01:31:49.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a55 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" -"2019-05-02 01:31:49.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " -"2019-05-02 01:31:49.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.7µs " -"2019-05-02 01:31:50.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a58 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:50.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a59 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:50.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a5a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:50.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a5b Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" -"2019-05-02 01:31:50.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a5c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.8µs " -"2019-05-02 01:31:50.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a5d Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" -"2019-05-02 01:31:50.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a5e Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" -"2019-05-02 01:31:50.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.1µs " -"2019-05-02 01:31:50.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.8µs " -"2019-05-02 01:31:50.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a61 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:50.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a62 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:50.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a63 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:50.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a64 Sending msg of 28 bytes to 3 on channel testchainid took 120.3µs" -"2019-05-02 01:31:50.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 373.2µs " -"2019-05-02 01:31:51.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a66 Sending msg of 28 bytes to 2 on channel businesschannel took 39µs" -"2019-05-02 01:31:51.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a67 Sending msg of 28 bytes to 3 on channel businesschannel took 40.1µs" -"2019-05-02 01:31:51.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 718.4µs " -"2019-05-02 01:31:51.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5758ms " -"2019-05-02 01:31:51.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a6a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:51.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6c Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" -"2019-05-02 01:31:51.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.8µs " -"2019-05-02 01:31:51.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a6b Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:51.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a6e Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:51.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6f Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" -"2019-05-02 01:31:51.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a70 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" -"2019-05-02 01:31:51.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.2µs " -"2019-05-02 01:31:51.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " -"2019-05-02 01:31:51.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a73 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:51.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a74 Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" -"2019-05-02 01:31:51.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.3µs " -"2019-05-02 01:31:51.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a76 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:51.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a77 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:51.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a78 Sending msg of 28 bytes to 3 on channel businesschannel took 34.6µs" -"2019-05-02 01:31:51.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a79 Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" -"2019-05-02 01:31:52.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.6µs " -"2019-05-02 01:31:52.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.3µs " -"2019-05-02 01:31:52.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a7c Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:52.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a7d Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:52.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a7e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:52.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a7f Sending msg of 28 bytes to 3 on channel testchainid took 27.1µs" -"2019-05-02 01:31:52.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.3µs " -"2019-05-02 01:31:52.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a81 Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" -"2019-05-02 01:31:52.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a82 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" -"2019-05-02 01:31:52.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.9µs " -"2019-05-02 01:31:52.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.9µs " -"2019-05-02 01:31:52.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a85 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:52.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a86 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:52.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a87 Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" -"2019-05-02 01:31:52.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a88 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.6µs " -"2019-05-02 01:31:52.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a89 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:52.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8a Sending msg of 28 bytes to 2 on channel businesschannel took 33µs" -"2019-05-02 01:31:53.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 236.5µs " -"2019-05-02 01:31:53.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8c Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" -"2019-05-02 01:31:53.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143µs " -"2019-05-02 01:31:53.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a8e Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:53.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8f Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" -"2019-05-02 01:31:53.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a90 Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:53.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a91 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.6µs " -"2019-05-02 01:31:53.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a92 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:53.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a93 Sending msg of 28 bytes to 2 on channel businesschannel took 36.9µs" -"2019-05-02 01:31:53.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a94 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" -"2019-05-02 01:31:53.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93µs " -"2019-05-02 01:31:53.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66µs " -"2019-05-02 01:31:53.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a97 Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel testchainid with payload of size 28" -"2019-05-02 01:31:53.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a98 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" -"2019-05-02 01:31:53.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " -"2019-05-02 01:31:53.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9a Received message from orderer2.example.com(192.168.240.4:47814): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-05-02 01:31:53.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9b Received message from orderer1.example.com(192.168.240.3:58762): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:04.221 UTC [msp] Validate -> DEBU 15a7 MSP OrdererMSP validating identity" +"2019-05-02 09:28:04.225 UTC [msp] Setup -> DEBU 15a8 Setting up the MSP manager (4 msps)" +"2019-05-02 09:28:04.226 UTC [msp] Setup -> DEBU 15a9 MSP manager setup complete, setup 4 msps" +"2019-05-02 09:28:04.227 UTC [policies] NewManagerImpl -> DEBU 15aa Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-05-02 09:28:04.228 UTC [policies] NewManagerImpl -> DEBU 15ab Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15ac Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15ad Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15ae Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15af Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b0 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b1 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b2 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:28:04.230 UTC [policies] NewManagerImpl -> DEBU 15b3 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:28:04.231 UTC [policies] NewManagerImpl -> DEBU 15b4 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:28:04.236 UTC [policies] NewManagerImpl -> DEBU 15b5 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:28:04.237 UTC [policies] NewManagerImpl -> DEBU 15b6 Proposed new policy Readers for Channel/Application" +"2019-05-02 09:28:04.237 UTC [policies] NewManagerImpl -> DEBU 15b7 Proposed new policy Writers for Channel/Application" +"2019-05-02 09:28:04.237 UTC [policies] NewManagerImpl -> DEBU 15b8 Proposed new policy Admins for Channel/Application" +"2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15b9 Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15ba Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15bb Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:04.238 UTC [policies] NewManagerImpl -> DEBU 15bc Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15bd Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15be Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15bf Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c0 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c1 Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c2 Proposed new policy Admins for Channel" +"2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c3 Proposed new policy Readers for Channel" +"2019-05-02 09:28:04.239 UTC [policies] NewManagerImpl -> DEBU 15c4 Proposed new policy Writers for Channel" +"2019-05-02 09:28:04.239 UTC [common.configtx] addToMap -> DEBU 15c5 Adding to config map: [Group] /Channel" +"2019-05-02 09:28:04.239 UTC [common.configtx] addToMap -> DEBU 15c6 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:28:04.239 UTC [common.configtx] addToMap -> DEBU 15c7 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15c8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15c9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15ca Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15ce Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15cf Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15d0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-05-02 09:28:04.240 UTC [common.configtx] addToMap -> DEBU 15d1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d4 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15d9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15da Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15db Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15dc Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15dd Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15de Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:28:04.241 UTC [common.configtx] addToMap -> DEBU 15df Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:28:04.244 UTC [common.configtx] addToMap -> DEBU 15e0 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:28:04.244 UTC [common.configtx] addToMap -> DEBU 15e1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:28:04.244 UTC [common.configtx] addToMap -> DEBU 15e2 Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:28:04.245 UTC [common.configtx] addToMap -> DEBU 15e3 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:04.245 UTC [common.configtx] addToMap -> DEBU 15e4 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:28:04.245 UTC [common.configtx] addToMap -> DEBU 15e5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:28:04.246 UTC [common.configtx] addToMap -> DEBU 15e9 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:28:04.247 UTC [common.configtx] addToMap -> DEBU 15ea Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:28:04.247 UTC [common.configtx] addToMap -> DEBU 15eb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:28:04.249 UTC [common.configtx] addToMap -> DEBU 15ec Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:28:04.251 UTC [common.configtx] addToMap -> DEBU 15ed Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:28:04.254 UTC [common.configtx] addToMap -> DEBU 15ee Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:28:04.255 UTC [common.configtx] addToMap -> DEBU 15ef Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:28:04.255 UTC [common.configtx] addToMap -> DEBU 15f0 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:28:04.256 UTC [common.configtx] addToMap -> DEBU 15f1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:28:04.256 UTC [common.configtx] addToMap -> DEBU 15f2 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:28:04.257 UTC [common.configtx] addToMap -> DEBU 15f3 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:28:04.258 UTC [common.configtx] addToMap -> DEBU 15f4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:28:04.258 UTC [common.configtx] addToMap -> DEBU 15f5 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:28:04.259 UTC [common.configtx] addToMap -> DEBU 15f6 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:28:04.259 UTC [common.configtx] addToMap -> DEBU 15f7 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:28:04.261 UTC [common.configtx] addToMap -> DEBU 15f8 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:28:04.266 UTC [common.channelconfig] LogSanityChecks -> DEBU 15f9 As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:28:04.267 UTC [common.channelconfig] LogSanityChecks -> DEBU 15fa As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:28:04.269 UTC [policies] Manager -> DEBU 15fb Manager Channel looking up path [Application]" +"2019-05-02 09:28:04.270 UTC [policies] Manager -> DEBU 15fc Manager Channel has managers Application" +"2019-05-02 09:28:04.271 UTC [policies] Manager -> DEBU 15fd Manager Channel has managers Orderer" +"2019-05-02 09:28:04.272 UTC [policies] Manager -> DEBU 15fe Manager Channel/Application looking up path []" +"2019-05-02 09:28:04.274 UTC [policies] Manager -> DEBU 15ff Manager Channel/Application has managers Org3MSP" +"2019-05-02 09:28:04.275 UTC [policies] Manager -> DEBU 1600 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:28:04.276 UTC [policies] Manager -> DEBU 1601 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:28:04.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1602 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:28:04.277 UTC [common.channelconfig] LogSanityChecks -> DEBU 1603 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:28:04.278 UTC [common.channelconfig] LogSanityChecks -> DEBU 1604 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:28:04.279 UTC [policies] Manager -> DEBU 1605 Manager Channel looking up path [Orderer]" +"2019-05-02 09:28:04.284 UTC [policies] Manager -> DEBU 1606 Manager Channel has managers Application" +"2019-05-02 09:28:04.285 UTC [policies] Manager -> DEBU 1607 Manager Channel has managers Orderer" +"2019-05-02 09:28:04.286 UTC [policies] Manager -> DEBU 1608 Manager Channel/Orderer looking up path []" +"2019-05-02 09:28:04.286 UTC [policies] Manager -> DEBU 1609 Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:28:04.287 UTC [common.channelconfig] LogSanityChecks -> DEBU 160a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:28:04.287 UTC [common.capabilities] Supported -> DEBU 160b Orderer capability V2_0 is supported and is enabled" +"2019-05-02 09:28:04.288 UTC [common.capabilities] Supported -> DEBU 160c Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:28:04.288 UTC [orderer.common.server] func1 -> DEBU 160d Executing callback to update root CAs" +"2019-05-02 09:28:04.289 UTC [orderer.common.server] updateTrustedRoots -> DEBU 160e updating root CAs for channel [businesschannel]" +"2019-05-02 09:28:04.290 UTC [orderer.common.server] updateTrustedRoots -> DEBU 160f adding app root CAs for MSP [Org1MSP]" +"2019-05-02 09:28:04.290 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1610 adding orderer root CAs for MSP [OrdererMSP]" +"2019-05-02 09:28:04.291 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1611 adding app root CAs for MSP [Org2MSP]" +"2019-05-02 09:28:04.292 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1612 adding app root CAs for MSP [Org3MSP]" +"2019-05-02 09:28:04.297 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1613 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 9" +"2019-05-02 09:28:04.298 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1614 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 9" +"2019-05-02 09:28:04.300 UTC [msp.identity] Sign -> DEBU 1615 Sign: plaintext: 0A020809120B0A090A03010203100418...38782EB8550459A628E82A4B1424BD7B " +"2019-05-02 09:28:04.300 UTC [msp.identity] Sign -> DEBU 1616 Sign: digest: 3F9FAB749D98D9BE91CF9BC47487CB032A854E85FED401A4872615AD0D3AA734 " +"2019-05-02 09:28:04.304 UTC [fsblkstorage] indexBlock -> DEBU 1617 Indexing block [blockNum=9, blockHash=[]byte{0xae, 0x40, 0xdc, 0x77, 0x8f, 0x7a, 0x6, 0x29, 0xa2, 0x2c, 0x4f, 0x45, 0x7, 0xc4, 0x6e, 0xb1, 0x3c, 0xef, 0x36, 0xd4, 0x2, 0xad, 0x6a, 0x15, 0xaf, 0x8a, 0xbf, 0xad, 0xa7, 0x18, 0xe2, 0x5} txOffsets= +txId= locPointer=offset=71, bytesLength=33870 +]" +"2019-05-02 09:28:04.309 UTC [fsblkstorage] updateCheckpoint -> DEBU 1618 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133542], isChainEmpty=[false], lastBlockNumber=[9]" +"2019-05-02 09:28:04.310 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1619 [channel: businesschannel] Wrote block [9]" +"2019-05-02 09:28:04.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161a Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +"2019-05-02 09:28:04.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161b Sending msg of 28 bytes to 3 on channel businesschannel took 89.7µs" +"2019-05-02 09:28:04.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.3µs " +"2019-05-02 09:28:04.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.5µs " +"2019-05-02 09:28:04.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 161e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:04.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 161f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:04.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1620 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:04.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1621 Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +"2019-05-02 09:28:04.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1622 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +"2019-05-02 09:28:04.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1623 Sending msg of 28 bytes to 2 on channel businesschannel took 38.4µs" +"2019-05-02 09:28:04.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1624 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +"2019-05-02 09:28:04.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1625 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.4µs " +"2019-05-02 09:28:04.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1626 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.5µs " +"2019-05-02 09:28:04.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1627 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:04.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1628 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:05.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1629 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:05.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162a Sending msg of 28 bytes to 3 on channel testchainid took 32µs" +"2019-05-02 09:28:05.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.6µs " +"2019-05-02 09:28:05.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162c Sending msg of 28 bytes to 2 on channel businesschannel took 38µs" +"2019-05-02 09:28:05.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162d Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +"2019-05-02 09:28:05.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.5µs " +"2019-05-02 09:28:05.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5747ms " +"2019-05-02 09:28:05.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1630 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:05.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1631 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:05.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1632 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:05.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1633 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2019-05-02 09:28:05.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1634 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +"2019-05-02 09:28:05.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1635 Sending msg of 28 bytes to 2 on channel businesschannel took 38.2µs" +"2019-05-02 09:28:05.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1636 Sending msg of 28 bytes to 3 on channel businesschannel took 26.8µs" +"2019-05-02 09:28:05.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1637 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 490.5µs " +"2019-05-02 09:28:05.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1638 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.4µs " +"2019-05-02 09:28:05.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1639 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:05.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:06.120 UTC [orderer.common.server] Deliver -> DEBU 163b Starting new Deliver handler" +"2019-05-02 09:28:06.120 UTC [common.deliver] Handle -> DEBU 163c Starting new deliver loop for 172.18.0.8:57408" +"2019-05-02 09:28:06.120 UTC [common.deliver] Handle -> DEBU 163d Attempting to read seek info message from 172.18.0.8:57408" +"2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 163e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 163f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 1640 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 1641 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:06.122 UTC [policies] Evaluate -> DEBU 1642 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:06.123 UTC [msp] DeserializeIdentity -> DEBU 1643 Obtaining identity" +"2019-05-02 09:28:06.123 UTC [msp.identity] newIdentity -> DEBU 1644 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-05-02 09:28:06.124 UTC [cauthdsl] func1 -> DEBU 1645 0xc0008a2dc0 gate 1556789286124513300 evaluation starts" +"2019-05-02 09:28:06.124 UTC [cauthdsl] func2 -> DEBU 1646 0xc0008a2dc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.124 UTC [cauthdsl] func2 -> DEBU 1647 0xc0008a2dc0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.125 UTC [cauthdsl] func2 -> DEBU 1648 0xc0008a2dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:06.125 UTC [cauthdsl] func2 -> DEBU 1649 0xc0008a2dc0 principal evaluation fails" +"2019-05-02 09:28:06.125 UTC [cauthdsl] func1 -> DEBU 164a 0xc0008a2dc0 gate 1556789286124513300 evaluation fails" +"2019-05-02 09:28:06.126 UTC [policies] Evaluate -> DEBU 164b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:06.126 UTC [policies] Evaluate -> DEBU 164c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:06.126 UTC [policies] Evaluate -> DEBU 164d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:06.126 UTC [cauthdsl] func1 -> DEBU 164e 0xc000846110 gate 1556789286126635100 evaluation starts" +"2019-05-02 09:28:06.126 UTC [cauthdsl] func2 -> DEBU 164f 0xc000846110 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.127 UTC [cauthdsl] func2 -> DEBU 1650 0xc000846110 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.127 UTC [cauthdsl] func2 -> DEBU 1651 0xc000846110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:06.127 UTC [cauthdsl] func2 -> DEBU 1652 0xc000846110 principal evaluation fails" +"2019-05-02 09:28:06.127 UTC [cauthdsl] func1 -> DEBU 1653 0xc000846110 gate 1556789286126635100 evaluation fails" +"2019-05-02 09:28:06.128 UTC [policies] Evaluate -> DEBU 1654 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:06.128 UTC [policies] Evaluate -> DEBU 1655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:06.129 UTC [policies] Evaluate -> DEBU 1656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:06.129 UTC [cauthdsl] func1 -> DEBU 1657 0xc000846a50 gate 1556789286129302600 evaluation starts" +"2019-05-02 09:28:06.129 UTC [cauthdsl] func2 -> DEBU 1658 0xc000846a50 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.130 UTC [cauthdsl] func2 -> DEBU 1659 0xc000846a50 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.130 UTC [cauthdsl] func2 -> DEBU 165a 0xc000846a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:06.130 UTC [cauthdsl] func2 -> DEBU 165b 0xc000846a50 principal evaluation fails" +"2019-05-02 09:28:06.130 UTC [cauthdsl] func1 -> DEBU 165c 0xc000846a50 gate 1556789286129302600 evaluation fails" +"2019-05-02 09:28:06.131 UTC [policies] Evaluate -> DEBU 165d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:06.131 UTC [policies] Evaluate -> DEBU 165e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:06.131 UTC [policies] func1 -> DEBU 165f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1660 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1661 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1662 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1663 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:06.132 UTC [policies] Evaluate -> DEBU 1664 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:06.133 UTC [cauthdsl] func1 -> DEBU 1665 0xc0008478c0 gate 1556789286133163000 evaluation starts" +"2019-05-02 09:28:06.133 UTC [cauthdsl] func2 -> DEBU 1666 0xc0008478c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.133 UTC [cauthdsl] func2 -> DEBU 1667 0xc0008478c0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.134 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1668 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-05-02 09:28:06.134 UTC [msp] Validate -> DEBU 1669 MSP OrdererMSP validating identity" +"2019-05-02 09:28:06.135 UTC [cauthdsl] func2 -> DEBU 166a 0xc0008478c0 principal matched by identity 0" +"2019-05-02 09:28:06.135 UTC [msp.identity] Verify -> DEBU 166b Verify: digest = 00000000 15 99 02 6f 82 d1 25 07 bc ac 92 f5 dd 9c 1e 5d |...o..%........]| +00000010 e1 ac 31 b0 0c a6 47 06 85 5c 7e 65 9a 19 24 16 |..1...G..\~e..$.|" +"2019-05-02 09:28:06.135 UTC [msp.identity] Verify -> DEBU 166c Verify: sig = 00000000 30 45 02 21 00 b1 5e 2a 28 81 d9 3b 83 a4 32 6d |0E.!..^*(..;..2m| +00000010 a1 a5 56 7d e0 b5 94 65 0f f1 c8 fa e9 2a 6b 7f |..V}...e.....*k.| +00000020 fa 71 fd ea d2 02 20 6d d6 0d c7 11 9d 63 94 d9 |.q.... m.....c..| +00000030 80 20 e7 d0 0d d9 b1 90 5a 11 15 a0 42 c9 0b bf |. ......Z...B...| +00000040 c7 3b be b2 a0 7a cf |.;...z.|" +"2019-05-02 09:28:06.136 UTC [cauthdsl] func2 -> DEBU 166d 0xc0008478c0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:06.136 UTC [cauthdsl] func1 -> DEBU 166e 0xc0008478c0 gate 1556789286133163000 evaluation succeeds" +"2019-05-02 09:28:06.136 UTC [policies] Evaluate -> DEBU 166f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:06.136 UTC [policies] Evaluate -> DEBU 1670 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:06.137 UTC [policies] Evaluate -> DEBU 1671 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:06.137 UTC [policies] Evaluate -> DEBU 1672 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:06.138 UTC [policies] Evaluate -> DEBU 1673 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:06.138 UTC [policies] Evaluate -> DEBU 1674 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:06.138 UTC [common.deliver] deliverBlocks -> DEBU 1675 [channel: businesschannel] Received seekInfo (0xc001190640) start: > stop: > from 172.18.0.8:57408" +"2019-05-02 09:28:06.139 UTC [fsblkstorage] Next -> DEBU 1676 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:06.139 UTC [fsblkstorage] newBlockfileStream -> DEBU 1677 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +"2019-05-02 09:28:06.139 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1678 Remaining bytes=[34877], Going to peek [8] bytes" +"2019-05-02 09:28:06.139 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1679 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +"2019-05-02 09:28:06.140 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 167a blockbytes [34874] read from file [0]" +"2019-05-02 09:28:06.140 UTC [common.deliver] deliverBlocks -> DEBU 167b [channel: businesschannel] Delivering block [9] for (0xc001190640) for 172.18.0.8:57408" +"2019-05-02 09:28:06.140 UTC [common.deliver] deliverBlocks -> DEBU 167c [channel: businesschannel] Done delivering to 172.18.0.8:57408 for (0xc001190640)" +"2019-05-02 09:28:06.141 UTC [common.deliver] Handle -> DEBU 167d Waiting for new SeekInfo from 172.18.0.8:57408" +"2019-05-02 09:28:06.142 UTC [common.deliver] Handle -> DEBU 167e Attempting to read seek info message from 172.18.0.8:57408" +"2019-05-02 09:28:06.146 UTC [grpc] infof -> DEBU 167f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:06.146 UTC [common.deliver] Handle -> WARN 1680 Error reading from 172.18.0.8:57408: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:06.147 UTC [orderer.common.server] func1 -> DEBU 1681 Closing Deliver stream" +"2019-05-02 09:28:06.147 UTC [comm.grpc.server] 1 -> INFO 1682 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57408 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.3689ms +"2019-05-02 09:28:06.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1683 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:06.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1684 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-05-02 09:28:06.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1685 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " +"2019-05-02 09:28:06.290 UTC [orderer.common.server] Deliver -> DEBU 1686 Starting new Deliver handler" +"2019-05-02 09:28:06.290 UTC [common.deliver] Handle -> DEBU 1687 Starting new deliver loop for 172.18.0.8:57410" +"2019-05-02 09:28:06.291 UTC [common.deliver] Handle -> DEBU 1688 Attempting to read seek info message from 172.18.0.8:57410" +"2019-05-02 09:28:06.291 UTC [policies] Evaluate -> DEBU 1689 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:06.291 UTC [policies] Evaluate -> DEBU 168a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:06.292 UTC [policies] Evaluate -> DEBU 168b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:06.292 UTC [policies] Evaluate -> DEBU 168c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:06.292 UTC [policies] Evaluate -> DEBU 168d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:06.292 UTC [cauthdsl] func1 -> DEBU 168e 0xc000280bf0 gate 1556789286292646400 evaluation starts" +"2019-05-02 09:28:06.292 UTC [cauthdsl] func2 -> DEBU 168f 0xc000280bf0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.293 UTC [cauthdsl] func2 -> DEBU 1690 0xc000280bf0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.293 UTC [cauthdsl] func2 -> DEBU 1691 0xc000280bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:06.293 UTC [cauthdsl] func2 -> DEBU 1692 0xc000280bf0 principal evaluation fails" +"2019-05-02 09:28:06.293 UTC [cauthdsl] func1 -> DEBU 1693 0xc000280bf0 gate 1556789286292646400 evaluation fails" +"2019-05-02 09:28:06.293 UTC [policies] Evaluate -> DEBU 1694 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:06.293 UTC [policies] Evaluate -> DEBU 1695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:06.294 UTC [policies] Evaluate -> DEBU 1696 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:06.294 UTC [cauthdsl] func1 -> DEBU 1697 0xc0002815f0 gate 1556789286294374000 evaluation starts" +"2019-05-02 09:28:06.294 UTC [cauthdsl] func2 -> DEBU 1698 0xc0002815f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.294 UTC [cauthdsl] func2 -> DEBU 1699 0xc0002815f0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.295 UTC [cauthdsl] func2 -> DEBU 169a 0xc0002815f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:06.295 UTC [cauthdsl] func2 -> DEBU 169b 0xc0002815f0 principal evaluation fails" +"2019-05-02 09:28:06.295 UTC [cauthdsl] func1 -> DEBU 169c 0xc0002815f0 gate 1556789286294374000 evaluation fails" +"2019-05-02 09:28:06.295 UTC [policies] Evaluate -> DEBU 169d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:06.295 UTC [policies] Evaluate -> DEBU 169e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:06.296 UTC [policies] Evaluate -> DEBU 169f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:06.296 UTC [cauthdsl] func1 -> DEBU 16a0 0xc000281e30 gate 1556789286296265600 evaluation starts" +"2019-05-02 09:28:06.296 UTC [cauthdsl] func2 -> DEBU 16a1 0xc000281e30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.296 UTC [cauthdsl] func2 -> DEBU 16a2 0xc000281e30 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.296 UTC [cauthdsl] func2 -> DEBU 16a3 0xc000281e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:06.297 UTC [cauthdsl] func2 -> DEBU 16a4 0xc000281e30 principal evaluation fails" +"2019-05-02 09:28:06.297 UTC [cauthdsl] func1 -> DEBU 16a5 0xc000281e30 gate 1556789286296265600 evaluation fails" +"2019-05-02 09:28:06.297 UTC [policies] Evaluate -> DEBU 16a6 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:06.297 UTC [policies] Evaluate -> DEBU 16a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:06.298 UTC [policies] func1 -> DEBU 16a8 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:06.298 UTC [policies] Evaluate -> DEBU 16a9 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:06.298 UTC [policies] Evaluate -> DEBU 16aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:06.299 UTC [policies] Evaluate -> DEBU 16ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:06.299 UTC [policies] Evaluate -> DEBU 16ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:06.299 UTC [policies] Evaluate -> DEBU 16ad == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:06.299 UTC [cauthdsl] func1 -> DEBU 16ae 0xc0002f6e60 gate 1556789286299774000 evaluation starts" +"2019-05-02 09:28:06.299 UTC [cauthdsl] func2 -> DEBU 16af 0xc0002f6e60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.300 UTC [cauthdsl] func2 -> DEBU 16b0 0xc0002f6e60 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.300 UTC [cauthdsl] func2 -> DEBU 16b1 0xc0002f6e60 principal matched by identity 0" +"2019-05-02 09:28:06.300 UTC [msp.identity] Verify -> DEBU 16b2 Verify: digest = 00000000 e6 67 d1 c0 27 41 5d bd d7 c7 29 eb 81 a4 00 01 |.g..'A]...).....| +00000010 bb 77 6d 93 ac 1c aa d0 06 fe df 6f ae 0a 63 e8 |.wm........o..c.|" +"2019-05-02 09:28:06.300 UTC [msp.identity] Verify -> DEBU 16b3 Verify: sig = 00000000 30 44 02 20 62 99 d0 52 fe be 42 f1 8a 07 7f 1e |0D. b..R..B.....| +00000010 2a 1e 87 aa 6a 3f 66 97 21 55 78 90 c4 6e 37 21 |*...j?f.!Ux..n7!| +00000020 98 66 4b 69 02 20 45 11 e1 36 06 a2 33 88 a5 2c |.fKi. E..6..3..,| +00000030 ff 95 17 22 b8 c3 e4 ae bd 1a e9 34 52 93 bc b7 |...".......4R...| +00000040 8e a5 b9 3b e1 01 |...;..|" +"2019-05-02 09:28:06.301 UTC [cauthdsl] func2 -> DEBU 16b4 0xc0002f6e60 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:06.301 UTC [cauthdsl] func1 -> DEBU 16b5 0xc0002f6e60 gate 1556789286299774000 evaluation succeeds" +"2019-05-02 09:28:06.301 UTC [policies] Evaluate -> DEBU 16b6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:06.301 UTC [policies] Evaluate -> DEBU 16b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16b8 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16ba Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:06.302 UTC [policies] Evaluate -> DEBU 16bb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:06.302 UTC [common.deliver] deliverBlocks -> DEBU 16bc [channel: businesschannel] Received seekInfo (0xc001190ec0) start: > stop: > from 172.18.0.8:57410" +"2019-05-02 09:28:06.303 UTC [fsblkstorage] Next -> DEBU 16bd Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:06.303 UTC [fsblkstorage] newBlockfileStream -> DEBU 16be newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +"2019-05-02 09:28:06.303 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16bf Remaining bytes=[34877], Going to peek [8] bytes" +"2019-05-02 09:28:06.303 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16c0 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +"2019-05-02 09:28:06.303 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16c1 blockbytes [34874] read from file [0]" +"2019-05-02 09:28:06.304 UTC [common.deliver] deliverBlocks -> DEBU 16c2 [channel: businesschannel] Delivering block [9] for (0xc001190ec0) for 172.18.0.8:57410" +"2019-05-02 09:28:06.304 UTC [common.deliver] deliverBlocks -> DEBU 16c3 [channel: businesschannel] Done delivering to 172.18.0.8:57410 for (0xc001190ec0)" +"2019-05-02 09:28:06.304 UTC [common.deliver] Handle -> DEBU 16c4 Waiting for new SeekInfo from 172.18.0.8:57410" +"2019-05-02 09:28:06.304 UTC [common.deliver] Handle -> DEBU 16c5 Attempting to read seek info message from 172.18.0.8:57410" +"2019-05-02 09:28:06.307 UTC [common.deliver] Handle -> WARN 16c6 Error reading from 172.18.0.8:57410: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:06.308 UTC [orderer.common.server] func1 -> DEBU 16c8 Closing Deliver stream" +"2019-05-02 09:28:06.309 UTC [comm.grpc.server] 1 -> INFO 16c9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57410 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.3832ms +"2019-05-02 09:28:06.308 UTC [grpc] infof -> DEBU 16c7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:06.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ca Sending msg of 28 bytes to 2 on channel businesschannel took 34.4µs" +"2019-05-02 09:28:06.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16cb Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2019-05-02 09:28:06.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104µs " +"2019-05-02 09:28:06.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs " +"2019-05-02 09:28:06.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16ce Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:06.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16cf Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:06.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16d0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:06.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16d1 Sending msg of 28 bytes to 3 on channel testchainid took 132µs" +"2019-05-02 09:28:06.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.3µs " +"2019-05-02 09:28:06.868 UTC [orderer.common.server] Deliver -> DEBU 16d3 Starting new Deliver handler" +"2019-05-02 09:28:06.868 UTC [common.deliver] Handle -> DEBU 16d4 Starting new deliver loop for 172.18.0.8:57412" +"2019-05-02 09:28:06.868 UTC [common.deliver] Handle -> DEBU 16d5 Attempting to read seek info message from 172.18.0.8:57412" +"2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:06.869 UTC [policies] Evaluate -> DEBU 16da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:06.869 UTC [cauthdsl] func1 -> DEBU 16db 0xc00029e130 gate 1556789286869917300 evaluation starts" +"2019-05-02 09:28:06.869 UTC [cauthdsl] func2 -> DEBU 16dc 0xc00029e130 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.870 UTC [cauthdsl] func2 -> DEBU 16dd 0xc00029e130 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.870 UTC [cauthdsl] func2 -> DEBU 16de 0xc00029e130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:06.870 UTC [cauthdsl] func2 -> DEBU 16df 0xc00029e130 principal evaluation fails" +"2019-05-02 09:28:06.871 UTC [cauthdsl] func1 -> DEBU 16e0 0xc00029e130 gate 1556789286869917300 evaluation fails" +"2019-05-02 09:28:06.871 UTC [policies] Evaluate -> DEBU 16e1 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:06.871 UTC [policies] Evaluate -> DEBU 16e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:06.872 UTC [policies] Evaluate -> DEBU 16e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:06.872 UTC [cauthdsl] func1 -> DEBU 16e4 0xc00029eef0 gate 1556789286872551500 evaluation starts" +"2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e5 0xc00029eef0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e6 0xc00029eef0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e7 0xc00029eef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:06.873 UTC [cauthdsl] func2 -> DEBU 16e8 0xc00029eef0 principal evaluation fails" +"2019-05-02 09:28:06.873 UTC [cauthdsl] func1 -> DEBU 16e9 0xc00029eef0 gate 1556789286872551500 evaluation fails" +"2019-05-02 09:28:06.874 UTC [policies] Evaluate -> DEBU 16ea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:06.874 UTC [policies] Evaluate -> DEBU 16eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:06.874 UTC [policies] Evaluate -> DEBU 16ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:06.874 UTC [cauthdsl] func1 -> DEBU 16ed 0xc00029f740 gate 1556789286874908800 evaluation starts" +"2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16ee 0xc00029f740 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16ef 0xc00029f740 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16f0 0xc00029f740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:06.875 UTC [cauthdsl] func2 -> DEBU 16f1 0xc00029f740 principal evaluation fails" +"2019-05-02 09:28:06.875 UTC [cauthdsl] func1 -> DEBU 16f2 0xc00029f740 gate 1556789286874908800 evaluation fails" +"2019-05-02 09:28:06.875 UTC [policies] Evaluate -> DEBU 16f3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:06.876 UTC [policies] Evaluate -> DEBU 16f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:06.876 UTC [policies] func1 -> DEBU 16f5 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:06.876 UTC [policies] Evaluate -> DEBU 16f6 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:06.876 UTC [policies] Evaluate -> DEBU 16f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:06.877 UTC [policies] Evaluate -> DEBU 16f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:06.877 UTC [policies] Evaluate -> DEBU 16f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:06.877 UTC [policies] Evaluate -> DEBU 16fa == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:06.878 UTC [cauthdsl] func1 -> DEBU 16fb 0xc0000e05b0 gate 1556789286878209600 evaluation starts" +"2019-05-02 09:28:06.878 UTC [cauthdsl] func2 -> DEBU 16fc 0xc0000e05b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:06.878 UTC [cauthdsl] func2 -> DEBU 16fd 0xc0000e05b0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:06.879 UTC [cauthdsl] func2 -> DEBU 16fe 0xc0000e05b0 principal matched by identity 0" +"2019-05-02 09:28:06.879 UTC [msp.identity] Verify -> DEBU 16ff Verify: digest = 00000000 df 81 da 94 ae 24 38 32 83 21 79 12 4e 49 6d 6b |.....$82.!y.NImk| +00000010 d7 16 48 49 91 d7 c1 db d3 b6 ae be 50 d0 93 7c |..HI........P..||" +"2019-05-02 09:28:06.879 UTC [msp.identity] Verify -> DEBU 1700 Verify: sig = 00000000 30 44 02 20 04 77 7f 3f a2 b2 27 58 fb 08 f2 80 |0D. .w.?..'X....| +00000010 a2 cc 55 9f 22 5f 77 eb 20 f2 68 9c 75 e9 9b 70 |..U."_w. .h.u..p| +00000020 64 3b 5a ef 02 20 66 1e c5 16 f2 1d 09 bb 6e b6 |d;Z.. f.......n.| +00000030 a7 af ec 49 c5 45 5c f6 56 19 66 b2 b8 a5 40 b5 |...I.E\.V.f...@.| +00000040 8c 8f 1c 1b 75 14 |....u.|" +"2019-05-02 09:28:06.880 UTC [cauthdsl] func2 -> DEBU 1701 0xc0000e05b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:06.880 UTC [cauthdsl] func1 -> DEBU 1702 0xc0000e05b0 gate 1556789286878209600 evaluation succeeds" +"2019-05-02 09:28:06.880 UTC [policies] Evaluate -> DEBU 1703 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:06.880 UTC [policies] Evaluate -> DEBU 1704 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:06.881 UTC [policies] Evaluate -> DEBU 1705 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:06.881 UTC [policies] Evaluate -> DEBU 1706 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:06.881 UTC [policies] Evaluate -> DEBU 1707 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:06.882 UTC [policies] Evaluate -> DEBU 1708 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:06.882 UTC [common.deliver] deliverBlocks -> DEBU 1709 [channel: businesschannel] Received seekInfo (0xc001191500) start: > stop: > from 172.18.0.8:57412" +"2019-05-02 09:28:06.882 UTC [fsblkstorage] Next -> DEBU 170a Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:06.883 UTC [fsblkstorage] newBlockfileStream -> DEBU 170b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +"2019-05-02 09:28:06.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 170c Remaining bytes=[34877], Going to peek [8] bytes" +"2019-05-02 09:28:06.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 170d Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +"2019-05-02 09:28:06.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 170e blockbytes [34874] read from file [0]" +"2019-05-02 09:28:06.884 UTC [common.deliver] deliverBlocks -> DEBU 170f [channel: businesschannel] Delivering block [9] for (0xc001191500) for 172.18.0.8:57412" +"2019-05-02 09:28:06.885 UTC [common.deliver] deliverBlocks -> DEBU 1710 [channel: businesschannel] Done delivering to 172.18.0.8:57412 for (0xc001191500)" +"2019-05-02 09:28:06.886 UTC [common.deliver] Handle -> DEBU 1711 Waiting for new SeekInfo from 172.18.0.8:57412" +"2019-05-02 09:28:06.886 UTC [common.deliver] Handle -> DEBU 1712 Attempting to read seek info message from 172.18.0.8:57412" +"2019-05-02 09:28:06.891 UTC [common.deliver] Handle -> WARN 1713 Error reading from 172.18.0.8:57412: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:06.891 UTC [grpc] infof -> DEBU 1714 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:06.892 UTC [orderer.common.server] func1 -> DEBU 1715 Closing Deliver stream" +"2019-05-02 09:28:06.892 UTC [comm.grpc.server] 1 -> INFO 1716 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57412 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.0172ms +"2019-05-02 09:28:06.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1717 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2019-05-02 09:28:06.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1718 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" +"2019-05-02 09:28:06.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1719 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 163µs " +"2019-05-02 09:28:06.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 171a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.2µs " +"2019-05-02 09:28:06.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:06.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:07.064 UTC [orderer.common.server] Deliver -> DEBU 171d Starting new Deliver handler" +"2019-05-02 09:28:07.064 UTC [common.deliver] Handle -> DEBU 171e Starting new deliver loop for 172.18.0.8:57414" +"2019-05-02 09:28:07.065 UTC [common.deliver] Handle -> DEBU 171f Attempting to read seek info message from 172.18.0.8:57414" +"2019-05-02 09:28:07.066 UTC [policies] Evaluate -> DEBU 1720 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:07.066 UTC [policies] Evaluate -> DEBU 1721 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.066 UTC [policies] Evaluate -> DEBU 1722 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:07.067 UTC [policies] Evaluate -> DEBU 1723 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.067 UTC [policies] Evaluate -> DEBU 1724 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:07.067 UTC [cauthdsl] func1 -> DEBU 1725 0xc00084ce10 gate 1556789287067886600 evaluation starts" +"2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1726 0xc00084ce10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1727 0xc00084ce10 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1728 0xc00084ce10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:07.068 UTC [cauthdsl] func2 -> DEBU 1729 0xc00084ce10 principal evaluation fails" +"2019-05-02 09:28:07.069 UTC [cauthdsl] func1 -> DEBU 172a 0xc00084ce10 gate 1556789287067886600 evaluation fails" +"2019-05-02 09:28:07.069 UTC [policies] Evaluate -> DEBU 172b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.069 UTC [policies] Evaluate -> DEBU 172c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.069 UTC [policies] Evaluate -> DEBU 172d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:07.070 UTC [cauthdsl] func1 -> DEBU 172e 0xc00084d660 gate 1556789287069961300 evaluation starts" +"2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 172f 0xc00084d660 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 1730 0xc00084d660 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 1731 0xc00084d660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:07.070 UTC [cauthdsl] func2 -> DEBU 1732 0xc00084d660 principal evaluation fails" +"2019-05-02 09:28:07.071 UTC [cauthdsl] func1 -> DEBU 1733 0xc00084d660 gate 1556789287069961300 evaluation fails" +"2019-05-02 09:28:07.071 UTC [policies] Evaluate -> DEBU 1734 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.071 UTC [policies] Evaluate -> DEBU 1735 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.071 UTC [policies] Evaluate -> DEBU 1736 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:07.072 UTC [cauthdsl] func1 -> DEBU 1737 0xc00084dea0 gate 1556789287072160100 evaluation starts" +"2019-05-02 09:28:07.072 UTC [cauthdsl] func2 -> DEBU 1738 0xc00084dea0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.072 UTC [cauthdsl] func2 -> DEBU 1739 0xc00084dea0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.072 UTC [cauthdsl] func2 -> DEBU 173a 0xc00084dea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:07.073 UTC [cauthdsl] func2 -> DEBU 173b 0xc00084dea0 principal evaluation fails" +"2019-05-02 09:28:07.073 UTC [cauthdsl] func1 -> DEBU 173c 0xc00084dea0 gate 1556789287072160100 evaluation fails" +"2019-05-02 09:28:07.073 UTC [policies] Evaluate -> DEBU 173d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.074 UTC [policies] Evaluate -> DEBU 173e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.074 UTC [policies] func1 -> DEBU 173f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:07.075 UTC [policies] Evaluate -> DEBU 1740 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:07.075 UTC [policies] Evaluate -> DEBU 1741 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:07.076 UTC [policies] Evaluate -> DEBU 1742 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:07.076 UTC [policies] Evaluate -> DEBU 1743 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.076 UTC [policies] Evaluate -> DEBU 1744 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:07.077 UTC [cauthdsl] func1 -> DEBU 1745 0xc0008e4cf0 gate 1556789287077290500 evaluation starts" +"2019-05-02 09:28:07.077 UTC [cauthdsl] func2 -> DEBU 1746 0xc0008e4cf0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.077 UTC [cauthdsl] func2 -> DEBU 1747 0xc0008e4cf0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.078 UTC [cauthdsl] func2 -> DEBU 1748 0xc0008e4cf0 principal matched by identity 0" +"2019-05-02 09:28:07.078 UTC [msp.identity] Verify -> DEBU 1749 Verify: digest = 00000000 03 fc 72 46 26 c5 b9 b1 0a ad 9c ea 08 c0 4d cf |..rF&.........M.| +00000010 2b 2d 19 e8 2c 5a e5 d4 a9 c7 11 d2 22 88 26 71 |+-..,Z......".&q|" +"2019-05-02 09:28:07.078 UTC [msp.identity] Verify -> DEBU 174a Verify: sig = 00000000 30 45 02 21 00 99 d2 71 1c 6f cd a6 fc 0f 1b 07 |0E.!...q.o......| +00000010 1a 32 df 27 10 64 ba 51 dd 7a 35 c0 02 a7 52 8e |.2.'.d.Q.z5...R.| +00000020 48 d3 63 b2 91 02 20 1a 15 b7 77 bc 9c 16 d7 49 |H.c... ...w....I| +00000030 0c 06 28 1b 6a 0c f2 41 e1 6f 9d c5 10 01 17 82 |..(.j..A.o......| +00000040 31 98 aa 46 d5 f4 3e |1..F..>|" +"2019-05-02 09:28:07.079 UTC [cauthdsl] func2 -> DEBU 174b 0xc0008e4cf0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:07.079 UTC [cauthdsl] func1 -> DEBU 174c 0xc0008e4cf0 gate 1556789287077290500 evaluation succeeds" +"2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 174d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 174e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 174f Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.080 UTC [policies] Evaluate -> DEBU 1750 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.081 UTC [policies] Evaluate -> DEBU 1751 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:07.081 UTC [policies] Evaluate -> DEBU 1752 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:07.081 UTC [common.deliver] deliverBlocks -> DEBU 1753 [channel: businesschannel] Received seekInfo (0xc0008d0700) start: > stop: > from 172.18.0.8:57414" +"2019-05-02 09:28:07.082 UTC [fsblkstorage] Next -> DEBU 1754 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:07.082 UTC [fsblkstorage] newBlockfileStream -> DEBU 1755 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +"2019-05-02 09:28:07.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1756 Remaining bytes=[34877], Going to peek [8] bytes" +"2019-05-02 09:28:07.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1757 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +"2019-05-02 09:28:07.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1758 blockbytes [34874] read from file [0]" +"2019-05-02 09:28:07.084 UTC [common.deliver] deliverBlocks -> DEBU 1759 [channel: businesschannel] Delivering block [9] for (0xc0008d0700) for 172.18.0.8:57414" +"2019-05-02 09:28:07.084 UTC [common.deliver] deliverBlocks -> DEBU 175a [channel: businesschannel] Done delivering to 172.18.0.8:57414 for (0xc0008d0700)" +"2019-05-02 09:28:07.088 UTC [common.deliver] Handle -> DEBU 175b Waiting for new SeekInfo from 172.18.0.8:57414" +"2019-05-02 09:28:07.089 UTC [common.deliver] Handle -> DEBU 175c Attempting to read seek info message from 172.18.0.8:57414" +"2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 175d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 175e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 175f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:07.089 UTC [policies] Evaluate -> DEBU 1760 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.090 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:07.090 UTC [cauthdsl] func1 -> DEBU 1762 0xc00091eec0 gate 1556789287090182300 evaluation starts" +"2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1763 0xc00091eec0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1764 0xc00091eec0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1765 0xc00091eec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:07.090 UTC [cauthdsl] func2 -> DEBU 1766 0xc00091eec0 principal evaluation fails" +"2019-05-02 09:28:07.090 UTC [cauthdsl] func1 -> DEBU 1767 0xc00091eec0 gate 1556789287090182300 evaluation fails" +"2019-05-02 09:28:07.091 UTC [policies] Evaluate -> DEBU 1768 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.091 UTC [policies] Evaluate -> DEBU 1769 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.091 UTC [policies] Evaluate -> DEBU 176a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:07.091 UTC [cauthdsl] func1 -> DEBU 176b 0xc00091f710 gate 1556789287091575100 evaluation starts" +"2019-05-02 09:28:07.091 UTC [cauthdsl] func2 -> DEBU 176c 0xc00091f710 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.091 UTC [cauthdsl] func2 -> DEBU 176d 0xc00091f710 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.092 UTC [cauthdsl] func2 -> DEBU 176e 0xc00091f710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:07.092 UTC [cauthdsl] func2 -> DEBU 176f 0xc00091f710 principal evaluation fails" +"2019-05-02 09:28:07.092 UTC [cauthdsl] func1 -> DEBU 1770 0xc00091f710 gate 1556789287091575100 evaluation fails" +"2019-05-02 09:28:07.092 UTC [policies] Evaluate -> DEBU 1771 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.093 UTC [policies] Evaluate -> DEBU 1772 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.093 UTC [policies] Evaluate -> DEBU 1773 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:07.093 UTC [cauthdsl] func1 -> DEBU 1774 0xc00091ff90 gate 1556789287093427700 evaluation starts" +"2019-05-02 09:28:07.093 UTC [cauthdsl] func2 -> DEBU 1775 0xc00091ff90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.093 UTC [cauthdsl] func2 -> DEBU 1776 0xc00091ff90 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.094 UTC [cauthdsl] func2 -> DEBU 1777 0xc00091ff90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:07.094 UTC [cauthdsl] func2 -> DEBU 1778 0xc00091ff90 principal evaluation fails" +"2019-05-02 09:28:07.094 UTC [cauthdsl] func1 -> DEBU 1779 0xc00091ff90 gate 1556789287093427700 evaluation fails" +"2019-05-02 09:28:07.094 UTC [policies] Evaluate -> DEBU 177a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.094 UTC [policies] Evaluate -> DEBU 177b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.095 UTC [policies] func1 -> DEBU 177c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-05-02 09:28:07.095 UTC [policies] Evaluate -> DEBU 177d Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:07.095 UTC [policies] Evaluate -> DEBU 177e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:07.095 UTC [policies] Evaluate -> DEBU 177f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:07.096 UTC [policies] Evaluate -> DEBU 1780 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.096 UTC [policies] Evaluate -> DEBU 1781 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:07.097 UTC [cauthdsl] func1 -> DEBU 1782 0xc000b86e00 gate 1556789287097171600 evaluation starts" +"2019-05-02 09:28:07.097 UTC [cauthdsl] func2 -> DEBU 1783 0xc000b86e00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.098 UTC [cauthdsl] func2 -> DEBU 1784 0xc000b86e00 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.098 UTC [cauthdsl] func2 -> DEBU 1785 0xc000b86e00 principal matched by identity 0" +"2019-05-02 09:28:07.099 UTC [msp.identity] Verify -> DEBU 1786 Verify: digest = 00000000 ae 90 af dd 56 b7 e7 04 36 2d 74 52 10 c4 d2 62 |....V...6-tR...b| +00000010 b5 b7 65 60 d9 3c d4 af a5 d6 58 6e 6d 0c 63 36 |..e`.<....Xnm.c6|" +"2019-05-02 09:28:07.099 UTC [msp.identity] Verify -> DEBU 1787 Verify: sig = 00000000 30 45 02 21 00 8e 33 d2 96 95 98 f0 ae b7 ad 8e |0E.!..3.........| +00000010 c2 3f ef 84 44 fb 98 1a 42 77 0e b8 be 48 a0 4d |.?..D...Bw...H.M| +00000020 87 0c 28 24 c1 02 20 6a e7 b2 d1 b6 1e b0 99 26 |..($.. j.......&| +00000030 80 22 50 4e 99 d2 63 1e 40 81 8f 07 7c 54 6b 3b |."PN..c.@...|Tk;| +00000040 6d 50 26 b6 3f 30 5f |mP&.?0_|" +"2019-05-02 09:28:07.099 UTC [cauthdsl] func2 -> DEBU 1788 0xc000b86e00 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:07.099 UTC [cauthdsl] func1 -> DEBU 1789 0xc000b86e00 gate 1556789287097171600 evaluation succeeds" +"2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178c Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178e Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:07.099 UTC [policies] Evaluate -> DEBU 178f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:07.099 UTC [common.deliver] deliverBlocks -> DEBU 1790 [channel: businesschannel] Received seekInfo (0xc0008d0b40) start: > stop: > from 172.18.0.8:57414" +"2019-05-02 09:28:07.100 UTC [fsblkstorage] Next -> DEBU 1791 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:07.100 UTC [fsblkstorage] newBlockfileStream -> DEBU 1792 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +"2019-05-02 09:28:07.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1793 Remaining bytes=[34877], Going to peek [8] bytes" +"2019-05-02 09:28:07.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1794 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +"2019-05-02 09:28:07.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1795 blockbytes [34874] read from file [0]" +"2019-05-02 09:28:07.100 UTC [common.deliver] deliverBlocks -> DEBU 1796 [channel: businesschannel] Delivering block [9] for (0xc0008d0b40) for 172.18.0.8:57414" +"2019-05-02 09:28:07.100 UTC [common.deliver] deliverBlocks -> DEBU 1797 [channel: businesschannel] Done delivering to 172.18.0.8:57414 for (0xc0008d0b40)" +"2019-05-02 09:28:07.100 UTC [common.deliver] Handle -> DEBU 1798 Waiting for new SeekInfo from 172.18.0.8:57414" +"2019-05-02 09:28:07.100 UTC [common.deliver] Handle -> DEBU 1799 Attempting to read seek info message from 172.18.0.8:57414" +"2019-05-02 09:28:07.110 UTC [common.deliver] Handle -> WARN 179a Error reading from 172.18.0.8:57414: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:07.110 UTC [orderer.common.server] func1 -> DEBU 179b Closing Deliver stream" +"2019-05-02 09:28:07.110 UTC [comm.grpc.server] 1 -> INFO 179c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57414 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.7859ms +"2019-05-02 09:28:07.110 UTC [grpc] infof -> DEBU 179d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:07.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 179e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:07.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 179f Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +"2019-05-02 09:28:07.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 445.7µs " +"2019-05-02 09:28:07.264 UTC [orderer.common.server] Deliver -> DEBU 17a1 Starting new Deliver handler" +"2019-05-02 09:28:07.264 UTC [common.deliver] Handle -> DEBU 17a2 Starting new deliver loop for 172.18.0.8:57416" +"2019-05-02 09:28:07.264 UTC [common.deliver] Handle -> DEBU 17a3 Attempting to read seek info message from 172.18.0.8:57416" +"2019-05-02 09:28:07.265 UTC [policies] Evaluate -> DEBU 17a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:07.265 UTC [policies] Evaluate -> DEBU 17a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.265 UTC [policies] Evaluate -> DEBU 17a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:07.266 UTC [policies] Evaluate -> DEBU 17a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.266 UTC [policies] Evaluate -> DEBU 17a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:07.267 UTC [cauthdsl] func1 -> DEBU 17a9 0xc000888e10 gate 1556789287267023600 evaluation starts" +"2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17aa 0xc000888e10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17ab 0xc000888e10 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17ac 0xc000888e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:07.267 UTC [cauthdsl] func2 -> DEBU 17ad 0xc000888e10 principal evaluation fails" +"2019-05-02 09:28:07.268 UTC [cauthdsl] func1 -> DEBU 17ae 0xc000888e10 gate 1556789287267023600 evaluation fails" +"2019-05-02 09:28:07.268 UTC [policies] Evaluate -> DEBU 17af Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.268 UTC [policies] Evaluate -> DEBU 17b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.269 UTC [policies] Evaluate -> DEBU 17b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:07.269 UTC [cauthdsl] func1 -> DEBU 17b2 0xc000889660 gate 1556789287269600400 evaluation starts" +"2019-05-02 09:28:07.269 UTC [cauthdsl] func2 -> DEBU 17b3 0xc000889660 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.269 UTC [cauthdsl] func2 -> DEBU 17b4 0xc000889660 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.270 UTC [cauthdsl] func2 -> DEBU 17b5 0xc000889660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:07.270 UTC [cauthdsl] func2 -> DEBU 17b6 0xc000889660 principal evaluation fails" +"2019-05-02 09:28:07.270 UTC [cauthdsl] func1 -> DEBU 17b7 0xc000889660 gate 1556789287269600400 evaluation fails" +"2019-05-02 09:28:07.270 UTC [policies] Evaluate -> DEBU 17b8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.271 UTC [policies] Evaluate -> DEBU 17b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.271 UTC [policies] Evaluate -> DEBU 17ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:07.271 UTC [cauthdsl] func1 -> DEBU 17bb 0xc000889ed0 gate 1556789287271698300 evaluation starts" +"2019-05-02 09:28:07.271 UTC [cauthdsl] func2 -> DEBU 17bc 0xc000889ed0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.271 UTC [cauthdsl] func2 -> DEBU 17bd 0xc000889ed0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.272 UTC [cauthdsl] func2 -> DEBU 17be 0xc000889ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:07.272 UTC [cauthdsl] func2 -> DEBU 17bf 0xc000889ed0 principal evaluation fails" +"2019-05-02 09:28:07.272 UTC [cauthdsl] func1 -> DEBU 17c0 0xc000889ed0 gate 1556789287271698300 evaluation fails" +"2019-05-02 09:28:07.272 UTC [policies] Evaluate -> DEBU 17c1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.272 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.273 UTC [policies] func1 -> DEBU 17c3 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c4 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.273 UTC [policies] Evaluate -> DEBU 17c8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:07.274 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00105ebc0 gate 1556789287274469800 evaluation starts" +"2019-05-02 09:28:07.274 UTC [cauthdsl] func2 -> DEBU 17ca 0xc00105ebc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.274 UTC [cauthdsl] func2 -> DEBU 17cb 0xc00105ebc0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.274 UTC [cauthdsl] func2 -> DEBU 17cc 0xc00105ebc0 principal matched by identity 0" +"2019-05-02 09:28:07.274 UTC [msp.identity] Verify -> DEBU 17cd Verify: digest = 00000000 f1 7b 7b 6e 6a df d1 51 73 11 0a c3 11 00 52 37 |.{{nj..Qs.....R7| +00000010 07 cf 5a fb 05 39 8e 2e 4b 35 7b af 65 cf fa ba |..Z..9..K5{.e...|" +"2019-05-02 09:28:07.275 UTC [msp.identity] Verify -> DEBU 17ce Verify: sig = 00000000 30 45 02 21 00 b5 f8 b5 9d 83 5e 31 ca cb 20 7d |0E.!......^1.. }| +00000010 f7 6a 8e ea 9d ab 46 15 4b aa a3 5a b5 68 dd 34 |.j....F.K..Z.h.4| +00000020 49 2b 51 f9 79 02 20 07 29 af 1b 43 f4 a6 a2 54 |I+Q.y. .)..C...T| +00000030 d2 41 ca fe 6a e1 0f ad b0 e6 19 ff 46 40 31 d2 |.A..j.......F@1.| +00000040 5b 3c e3 24 82 c2 5c |[<.$..\|" +"2019-05-02 09:28:07.275 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00105ebc0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:07.276 UTC [cauthdsl] func1 -> DEBU 17d0 0xc00105ebc0 gate 1556789287274469800 evaluation succeeds" +"2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d3 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.276 UTC [policies] Evaluate -> DEBU 17d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.277 UTC [policies] Evaluate -> DEBU 17d5 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:07.277 UTC [policies] Evaluate -> DEBU 17d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:07.277 UTC [common.deliver] deliverBlocks -> DEBU 17d7 [channel: businesschannel] Received seekInfo (0xc001191e80) start: > stop: > from 172.18.0.8:57416" +"2019-05-02 09:28:07.278 UTC [fsblkstorage] Next -> DEBU 17d8 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:07.278 UTC [fsblkstorage] newBlockfileStream -> DEBU 17d9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-05-02 09:28:07.278 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17da Remaining bytes=[133542], Going to peek [8] bytes" +"2019-05-02 09:28:07.279 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17db Returning blockbytes - length=[23935], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:28:07.279 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17dc blockbytes [23935] read from file [0]" +"2019-05-02 09:28:07.279 UTC [common.deliver] deliverBlocks -> DEBU 17dd [channel: businesschannel] Delivering block [0] for (0xc001191e80) for 172.18.0.8:57416" +"2019-05-02 09:28:07.280 UTC [common.deliver] deliverBlocks -> DEBU 17de [channel: businesschannel] Done delivering to 172.18.0.8:57416 for (0xc001191e80)" +"2019-05-02 09:28:07.281 UTC [common.deliver] Handle -> DEBU 17df Waiting for new SeekInfo from 172.18.0.8:57416" +"2019-05-02 09:28:07.281 UTC [common.deliver] Handle -> DEBU 17e0 Attempting to read seek info message from 172.18.0.8:57416" +"2019-05-02 09:28:07.289 UTC [common.deliver] Handle -> WARN 17e1 Error reading from 172.18.0.8:57416: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:07.289 UTC [orderer.common.server] func1 -> DEBU 17e2 Closing Deliver stream" +"2019-05-02 09:28:07.289 UTC [comm.grpc.server] 1 -> INFO 17e3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57416 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.1514ms +"2019-05-02 09:28:07.290 UTC [grpc] infof -> DEBU 17e4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:07.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e5 Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs" +"2019-05-02 09:28:07.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e6 Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs" +"2019-05-02 09:28:07.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 453.9µs " +"2019-05-02 09:28:07.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 346.8µs " +"2019-05-02 09:28:07.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ea Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:07.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:07.471 UTC [orderer.common.server] Deliver -> DEBU 17eb Starting new Deliver handler" +"2019-05-02 09:28:07.471 UTC [common.deliver] Handle -> DEBU 17ec Starting new deliver loop for 172.18.0.8:57418" +"2019-05-02 09:28:07.472 UTC [common.deliver] Handle -> DEBU 17ed Attempting to read seek info message from 172.18.0.8:57418" +"2019-05-02 09:28:07.472 UTC [policies] Evaluate -> DEBU 17ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:07.472 UTC [policies] Evaluate -> DEBU 17ef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.473 UTC [policies] Evaluate -> DEBU 17f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:07.473 UTC [policies] Evaluate -> DEBU 17f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.473 UTC [policies] Evaluate -> DEBU 17f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:07.473 UTC [cauthdsl] func1 -> DEBU 17f3 0xc001079af0 gate 1556789287473693100 evaluation starts" +"2019-05-02 09:28:07.473 UTC [cauthdsl] func2 -> DEBU 17f4 0xc001079af0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.474 UTC [cauthdsl] func2 -> DEBU 17f5 0xc001079af0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.474 UTC [cauthdsl] func2 -> DEBU 17f6 0xc001079af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:07.474 UTC [cauthdsl] func2 -> DEBU 17f7 0xc001079af0 principal evaluation fails" +"2019-05-02 09:28:07.474 UTC [cauthdsl] func1 -> DEBU 17f8 0xc001079af0 gate 1556789287473693100 evaluation fails" +"2019-05-02 09:28:07.474 UTC [policies] Evaluate -> DEBU 17f9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.475 UTC [policies] Evaluate -> DEBU 17fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.475 UTC [policies] Evaluate -> DEBU 17fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:07.475 UTC [cauthdsl] func1 -> DEBU 17fc 0xc001094330 gate 1556789287475738900 evaluation starts" +"2019-05-02 09:28:07.476 UTC [cauthdsl] func2 -> DEBU 17fd 0xc001094330 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.476 UTC [cauthdsl] func2 -> DEBU 17fe 0xc001094330 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.476 UTC [cauthdsl] func2 -> DEBU 17ff 0xc001094330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:07.477 UTC [cauthdsl] func2 -> DEBU 1800 0xc001094330 principal evaluation fails" +"2019-05-02 09:28:07.477 UTC [cauthdsl] func1 -> DEBU 1801 0xc001094330 gate 1556789287475738900 evaluation fails" +"2019-05-02 09:28:07.477 UTC [policies] Evaluate -> DEBU 1802 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.477 UTC [policies] Evaluate -> DEBU 1803 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.478 UTC [policies] Evaluate -> DEBU 1804 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:07.478 UTC [cauthdsl] func1 -> DEBU 1805 0xc001094b70 gate 1556789287478306900 evaluation starts" +"2019-05-02 09:28:07.478 UTC [cauthdsl] func2 -> DEBU 1806 0xc001094b70 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.478 UTC [cauthdsl] func2 -> DEBU 1807 0xc001094b70 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.478 UTC [cauthdsl] func2 -> DEBU 1808 0xc001094b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:07.479 UTC [cauthdsl] func2 -> DEBU 1809 0xc001094b70 principal evaluation fails" +"2019-05-02 09:28:07.479 UTC [cauthdsl] func1 -> DEBU 180a 0xc001094b70 gate 1556789287478306900 evaluation fails" +"2019-05-02 09:28:07.479 UTC [policies] Evaluate -> DEBU 180b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.479 UTC [policies] Evaluate -> DEBU 180c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.480 UTC [policies] func1 -> DEBU 180d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-05-02 09:28:07.480 UTC [policies] Evaluate -> DEBU 180e Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:07.480 UTC [policies] Evaluate -> DEBU 180f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:07.481 UTC [policies] Evaluate -> DEBU 1810 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:07.481 UTC [policies] Evaluate -> DEBU 1811 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.481 UTC [policies] Evaluate -> DEBU 1812 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:07.482 UTC [cauthdsl] func1 -> DEBU 1813 0xc001095860 gate 1556789287482124100 evaluation starts" +"2019-05-02 09:28:07.482 UTC [cauthdsl] func2 -> DEBU 1814 0xc001095860 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.482 UTC [cauthdsl] func2 -> DEBU 1815 0xc001095860 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.483 UTC [cauthdsl] func2 -> DEBU 1816 0xc001095860 principal matched by identity 0" +"2019-05-02 09:28:07.483 UTC [msp.identity] Verify -> DEBU 1817 Verify: digest = 00000000 74 54 48 33 e7 8f c3 2c 08 ea 8e 5e 3f 4c ba 83 |tTH3...,...^?L..| +00000010 90 32 db 7f 94 33 ba 33 4b 37 9f 4f e7 ed e2 5e |.2...3.3K7.O...^|" +"2019-05-02 09:28:07.483 UTC [msp.identity] Verify -> DEBU 1818 Verify: sig = 00000000 30 45 02 21 00 f1 dc 4f 4d 28 31 c5 7d 2d 29 b7 |0E.!...OM(1.}-).| +00000010 b8 07 06 08 f7 12 8d 8d 07 1b a4 d1 0d 6a 98 6b |.............j.k| +00000020 c9 73 ad a4 96 02 20 5e 3c 7b 63 ca 1b 7e 18 89 |.s.... ^<{c..~..| +00000030 4d 8f 2d 75 ab d4 cb c2 c1 d1 90 a3 25 b6 cf a5 |M.-u........%...| +00000040 c7 8a 81 a9 10 8c c2 |.......|" +"2019-05-02 09:28:07.484 UTC [cauthdsl] func2 -> DEBU 1819 0xc001095860 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:07.484 UTC [cauthdsl] func1 -> DEBU 181a 0xc001095860 gate 1556789287482124100 evaluation succeeds" +"2019-05-02 09:28:07.485 UTC [policies] Evaluate -> DEBU 181b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.485 UTC [policies] Evaluate -> DEBU 181c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.485 UTC [policies] Evaluate -> DEBU 181d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.486 UTC [policies] Evaluate -> DEBU 181e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.486 UTC [policies] Evaluate -> DEBU 181f Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:07.487 UTC [policies] Evaluate -> DEBU 1820 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:07.487 UTC [common.deliver] deliverBlocks -> DEBU 1821 [channel: businesschannel] Received seekInfo (0xc000b6d640) start: > stop: > from 172.18.0.8:57418" +"2019-05-02 09:28:07.488 UTC [fsblkstorage] Next -> DEBU 1822 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:07.488 UTC [fsblkstorage] newBlockfileStream -> DEBU 1823 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23938]" +"2019-05-02 09:28:07.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1824 Remaining bytes=[109604], Going to peek [8] bytes" +"2019-05-02 09:28:07.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1825 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23938], bytesOffset=[23941]}" +"2019-05-02 09:28:07.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1826 blockbytes [23684] read from file [0]" +"2019-05-02 09:28:07.490 UTC [common.deliver] deliverBlocks -> DEBU 1827 [channel: businesschannel] Delivering block [1] for (0xc000b6d640) for 172.18.0.8:57418" +"2019-05-02 09:28:07.490 UTC [common.deliver] deliverBlocks -> DEBU 1828 [channel: businesschannel] Done delivering to 172.18.0.8:57418 for (0xc000b6d640)" +"2019-05-02 09:28:07.491 UTC [common.deliver] Handle -> DEBU 1829 Waiting for new SeekInfo from 172.18.0.8:57418" +"2019-05-02 09:28:07.491 UTC [common.deliver] Handle -> DEBU 182a Attempting to read seek info message from 172.18.0.8:57418" +"2019-05-02 09:28:07.500 UTC [grpc] infof -> DEBU 182b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:07.500 UTC [common.deliver] Handle -> WARN 182c Error reading from 172.18.0.8:57418: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:07.501 UTC [orderer.common.server] func1 -> DEBU 182d Closing Deliver stream" +"2019-05-02 09:28:07.501 UTC [comm.grpc.server] 1 -> INFO 182e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57418 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.1933ms +"2019-05-02 09:28:07.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 182f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:07.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1830 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +"2019-05-02 09:28:07.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1831 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.4µs " +"2019-05-02 09:28:07.698 UTC [orderer.common.server] Deliver -> DEBU 1832 Starting new Deliver handler" +"2019-05-02 09:28:07.698 UTC [common.deliver] Handle -> DEBU 1833 Starting new deliver loop for 172.18.0.8:57420" +"2019-05-02 09:28:07.698 UTC [common.deliver] Handle -> DEBU 1834 Attempting to read seek info message from 172.18.0.8:57420" +"2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1835 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1836 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1837 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1838 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.699 UTC [policies] Evaluate -> DEBU 1839 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:07.699 UTC [cauthdsl] func1 -> DEBU 183a 0xc0010d2250 gate 1556789287699654200 evaluation starts" +"2019-05-02 09:28:07.699 UTC [cauthdsl] func2 -> DEBU 183b 0xc0010d2250 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.700 UTC [cauthdsl] func2 -> DEBU 183c 0xc0010d2250 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.701 UTC [cauthdsl] func2 -> DEBU 183d 0xc0010d2250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:07.701 UTC [cauthdsl] func2 -> DEBU 183e 0xc0010d2250 principal evaluation fails" +"2019-05-02 09:28:07.701 UTC [cauthdsl] func1 -> DEBU 183f 0xc0010d2250 gate 1556789287699654200 evaluation fails" +"2019-05-02 09:28:07.701 UTC [policies] Evaluate -> DEBU 1840 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.702 UTC [policies] Evaluate -> DEBU 1841 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.702 UTC [policies] Evaluate -> DEBU 1842 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:07.702 UTC [cauthdsl] func1 -> DEBU 1843 0xc0010d2aa0 gate 1556789287702893400 evaluation starts" +"2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1844 0xc0010d2aa0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1845 0xc0010d2aa0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1846 0xc0010d2aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:07.703 UTC [cauthdsl] func2 -> DEBU 1847 0xc0010d2aa0 principal evaluation fails" +"2019-05-02 09:28:07.703 UTC [cauthdsl] func1 -> DEBU 1848 0xc0010d2aa0 gate 1556789287702893400 evaluation fails" +"2019-05-02 09:28:07.703 UTC [policies] Evaluate -> DEBU 1849 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.703 UTC [policies] Evaluate -> DEBU 184a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.703 UTC [policies] Evaluate -> DEBU 184b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:07.704 UTC [cauthdsl] func1 -> DEBU 184c 0xc0010d32e0 gate 1556789287704310800 evaluation starts" +"2019-05-02 09:28:07.704 UTC [cauthdsl] func2 -> DEBU 184d 0xc0010d32e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.704 UTC [cauthdsl] func2 -> DEBU 184e 0xc0010d32e0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.704 UTC [cauthdsl] func2 -> DEBU 184f 0xc0010d32e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:07.705 UTC [cauthdsl] func2 -> DEBU 1850 0xc0010d32e0 principal evaluation fails" +"2019-05-02 09:28:07.705 UTC [cauthdsl] func1 -> DEBU 1851 0xc0010d32e0 gate 1556789287704310800 evaluation fails" +"2019-05-02 09:28:07.705 UTC [policies] Evaluate -> DEBU 1852 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.705 UTC [policies] Evaluate -> DEBU 1853 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.706 UTC [policies] func1 -> DEBU 1854 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:07.706 UTC [policies] Evaluate -> DEBU 1855 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:07.706 UTC [policies] Evaluate -> DEBU 1856 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:07.707 UTC [policies] Evaluate -> DEBU 1857 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:07.707 UTC [policies] Evaluate -> DEBU 1858 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.707 UTC [policies] Evaluate -> DEBU 1859 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:07.707 UTC [cauthdsl] func1 -> DEBU 185a 0xc0010e2130 gate 1556789287707663400 evaluation starts" +"2019-05-02 09:28:07.707 UTC [cauthdsl] func2 -> DEBU 185b 0xc0010e2130 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.708 UTC [cauthdsl] func2 -> DEBU 185c 0xc0010e2130 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.708 UTC [cauthdsl] func2 -> DEBU 185d 0xc0010e2130 principal matched by identity 0" +"2019-05-02 09:28:07.708 UTC [msp.identity] Verify -> DEBU 185e Verify: digest = 00000000 53 c4 84 a5 42 ab 50 3e 8e 0c 15 0e 81 d6 0d 08 |S...B.P>........| +00000010 10 de c5 dd 24 87 7d 6e 4f ab 36 e0 fd ee 1a 62 |....$.}nO.6....b|" +"2019-05-02 09:28:07.708 UTC [msp.identity] Verify -> DEBU 185f Verify: sig = 00000000 30 45 02 21 00 90 13 e2 88 04 02 95 01 89 44 38 |0E.!..........D8| +00000010 de ed 4e a5 2e e4 24 ac 0e 13 36 c8 6a bb f9 1b |..N...$...6.j...| +00000020 22 a4 93 3d 97 02 20 76 43 6c ca 27 c8 0a 53 b2 |"..=.. vCl.'..S.| +00000030 9b 73 98 04 7f 43 36 b6 98 ae 0a 56 67 34 50 5c |.s...C6....Vg4P\| +00000040 2e 65 f1 1a d9 f9 c7 |.e.....|" +"2019-05-02 09:28:07.709 UTC [cauthdsl] func2 -> DEBU 1860 0xc0010e2130 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:07.709 UTC [cauthdsl] func1 -> DEBU 1861 0xc0010e2130 gate 1556789287707663400 evaluation succeeds" +"2019-05-02 09:28:07.709 UTC [policies] Evaluate -> DEBU 1862 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.709 UTC [policies] Evaluate -> DEBU 1863 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.709 UTC [policies] Evaluate -> DEBU 1864 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.710 UTC [policies] Evaluate -> DEBU 1865 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.710 UTC [policies] Evaluate -> DEBU 1866 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:07.710 UTC [policies] Evaluate -> DEBU 1867 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:07.710 UTC [common.deliver] deliverBlocks -> DEBU 1868 [channel: businesschannel] Received seekInfo (0xc000b6dc80) start: > stop: > from 172.18.0.8:57420" +"2019-05-02 09:28:07.711 UTC [fsblkstorage] Next -> DEBU 1869 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:07.712 UTC [fsblkstorage] newBlockfileStream -> DEBU 186a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47625]" +"2019-05-02 09:28:07.712 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186b Remaining bytes=[85917], Going to peek [8] bytes" +"2019-05-02 09:28:07.712 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186c Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47625], bytesOffset=[47628]}" +"2019-05-02 09:28:07.712 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186d blockbytes [23742] read from file [0]" +"2019-05-02 09:28:07.713 UTC [common.deliver] deliverBlocks -> DEBU 186e [channel: businesschannel] Delivering block [2] for (0xc000b6dc80) for 172.18.0.8:57420" +"2019-05-02 09:28:07.713 UTC [common.deliver] deliverBlocks -> DEBU 186f [channel: businesschannel] Done delivering to 172.18.0.8:57420 for (0xc000b6dc80)" +"2019-05-02 09:28:07.714 UTC [common.deliver] Handle -> DEBU 1870 Waiting for new SeekInfo from 172.18.0.8:57420" +"2019-05-02 09:28:07.714 UTC [common.deliver] Handle -> DEBU 1871 Attempting to read seek info message from 172.18.0.8:57420" +"2019-05-02 09:28:07.723 UTC [common.deliver] Handle -> WARN 1872 Error reading from 172.18.0.8:57420: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:07.724 UTC [orderer.common.server] func1 -> DEBU 1873 Closing Deliver stream" +"2019-05-02 09:28:07.724 UTC [comm.grpc.server] 1 -> INFO 1874 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57420 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.4878ms +"2019-05-02 09:28:07.725 UTC [grpc] infof -> DEBU 1875 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:07.909 UTC [orderer.common.server] Deliver -> DEBU 1876 Starting new Deliver handler" +"2019-05-02 09:28:07.909 UTC [common.deliver] Handle -> DEBU 1877 Starting new deliver loop for 172.18.0.8:57422" +"2019-05-02 09:28:07.909 UTC [common.deliver] Handle -> DEBU 1878 Attempting to read seek info message from 172.18.0.8:57422" +"2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 1879 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.910 UTC [policies] Evaluate -> DEBU 187d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:07.911 UTC [cauthdsl] func1 -> DEBU 187e 0xc0010f43a0 gate 1556789287911213300 evaluation starts" +"2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 187f 0xc0010f43a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 1880 0xc0010f43a0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 1881 0xc0010f43a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:07.911 UTC [cauthdsl] func2 -> DEBU 1882 0xc0010f43a0 principal evaluation fails" +"2019-05-02 09:28:07.912 UTC [cauthdsl] func1 -> DEBU 1883 0xc0010f43a0 gate 1556789287911213300 evaluation fails" +"2019-05-02 09:28:07.912 UTC [policies] Evaluate -> DEBU 1884 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.912 UTC [policies] Evaluate -> DEBU 1885 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:07.912 UTC [policies] Evaluate -> DEBU 1886 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:07.912 UTC [cauthdsl] func1 -> DEBU 1887 0xc0010f4c20 gate 1556789287912946900 evaluation starts" +"2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 1888 0xc0010f4c20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 1889 0xc0010f4c20 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 188a 0xc0010f4c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:07.913 UTC [cauthdsl] func2 -> DEBU 188b 0xc0010f4c20 principal evaluation fails" +"2019-05-02 09:28:07.913 UTC [cauthdsl] func1 -> DEBU 188c 0xc0010f4c20 gate 1556789287912946900 evaluation fails" +"2019-05-02 09:28:07.914 UTC [policies] Evaluate -> DEBU 188d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.914 UTC [policies] Evaluate -> DEBU 188e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:07.914 UTC [policies] Evaluate -> DEBU 188f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:07.914 UTC [cauthdsl] func1 -> DEBU 1890 0xc0010f5460 gate 1556789287914396400 evaluation starts" +"2019-05-02 09:28:07.914 UTC [cauthdsl] func2 -> DEBU 1891 0xc0010f5460 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.915 UTC [cauthdsl] func2 -> DEBU 1892 0xc0010f5460 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.915 UTC [cauthdsl] func2 -> DEBU 1893 0xc0010f5460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:07.915 UTC [cauthdsl] func2 -> DEBU 1894 0xc0010f5460 principal evaluation fails" +"2019-05-02 09:28:07.916 UTC [cauthdsl] func1 -> DEBU 1895 0xc0010f5460 gate 1556789287914396400 evaluation fails" +"2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 1896 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 1897 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:07.916 UTC [policies] func1 -> DEBU 1898 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 1899 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 189a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:07.916 UTC [policies] Evaluate -> DEBU 189b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:07.917 UTC [policies] Evaluate -> DEBU 189c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:07.917 UTC [policies] Evaluate -> DEBU 189d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:07.917 UTC [cauthdsl] func1 -> DEBU 189e 0xc001116150 gate 1556789287917356800 evaluation starts" +"2019-05-02 09:28:07.917 UTC [cauthdsl] func2 -> DEBU 189f 0xc001116150 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:07.917 UTC [cauthdsl] func2 -> DEBU 18a0 0xc001116150 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:07.917 UTC [cauthdsl] func2 -> DEBU 18a1 0xc001116150 principal matched by identity 0" +"2019-05-02 09:28:07.918 UTC [msp.identity] Verify -> DEBU 18a2 Verify: digest = 00000000 63 bd 8b 87 e9 ea d7 22 ed 74 7c ad 89 a0 b0 94 |c......".t|.....| +00000010 02 c1 77 50 a1 35 5b ee 67 6c 62 d8 8c 4a c4 a9 |..wP.5[.glb..J..|" +"2019-05-02 09:28:07.918 UTC [msp.identity] Verify -> DEBU 18a3 Verify: sig = 00000000 30 45 02 21 00 8b ce df 03 a2 1a 2f 3f 8c c9 a6 |0E.!......./?...| +00000010 8f 5f 46 ba 1e 9a 98 b7 06 33 d6 32 ec 83 a8 d3 |._F......3.2....| +00000020 3d 42 b5 6e 30 02 20 02 99 21 9e 5e 01 f7 f5 d1 |=B.n0. ..!.^....| +00000030 62 1f 03 9d 7f 83 52 89 54 dd d6 e8 b3 af 76 58 |b.....R.T.....vX| +00000040 30 b4 6c f5 5f 89 df |0.l._..|" +"2019-05-02 09:28:07.919 UTC [cauthdsl] func2 -> DEBU 18a4 0xc001116150 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:07.919 UTC [cauthdsl] func1 -> DEBU 18a5 0xc001116150 gate 1556789287917356800 evaluation succeeds" +"2019-05-02 09:28:07.919 UTC [policies] Evaluate -> DEBU 18a6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.919 UTC [policies] Evaluate -> DEBU 18a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:07.919 UTC [policies] Evaluate -> DEBU 18a8 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.920 UTC [policies] Evaluate -> DEBU 18a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:07.920 UTC [policies] Evaluate -> DEBU 18aa Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:07.920 UTC [policies] Evaluate -> DEBU 18ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:07.921 UTC [common.deliver] deliverBlocks -> DEBU 18ac [channel: businesschannel] Received seekInfo (0xc0008d1680) start: > stop: > from 172.18.0.8:57422" +"2019-05-02 09:28:07.921 UTC [fsblkstorage] Next -> DEBU 18ad Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:07.921 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ae newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71370]" +"2019-05-02 09:28:07.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18af Remaining bytes=[62172], Going to peek [8] bytes" +"2019-05-02 09:28:07.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b0 Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[71370], bytesOffset=[71372]}" +"2019-05-02 09:28:07.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b1 blockbytes [4709] read from file [0]" +"2019-05-02 09:28:07.922 UTC [common.deliver] deliverBlocks -> DEBU 18b2 [channel: businesschannel] Delivering block [3] for (0xc0008d1680) for 172.18.0.8:57422" +"2019-05-02 09:28:07.923 UTC [common.deliver] deliverBlocks -> DEBU 18b3 [channel: businesschannel] Done delivering to 172.18.0.8:57422 for (0xc0008d1680)" +"2019-05-02 09:28:07.924 UTC [common.deliver] Handle -> DEBU 18b4 Waiting for new SeekInfo from 172.18.0.8:57422" +"2019-05-02 09:28:07.924 UTC [common.deliver] Handle -> DEBU 18b5 Attempting to read seek info message from 172.18.0.8:57422" +"2019-05-02 09:28:07.932 UTC [common.deliver] Handle -> WARN 18b6 Error reading from 172.18.0.8:57422: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:07.933 UTC [orderer.common.server] func1 -> DEBU 18b7 Closing Deliver stream" +"2019-05-02 09:28:07.933 UTC [comm.grpc.server] 1 -> INFO 18b8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57422 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.6875ms +"2019-05-02 09:28:07.933 UTC [grpc] infof -> DEBU 18b9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:07.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18ba Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +"2019-05-02 09:28:07.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18bb Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +"2019-05-02 09:28:07.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 545.3µs " +"2019-05-02 09:28:07.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.8µs " +"2019-05-02 09:28:07.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18be Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:07.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18bf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:08.104 UTC [orderer.common.server] Deliver -> DEBU 18c0 Starting new Deliver handler" +"2019-05-02 09:28:08.104 UTC [common.deliver] Handle -> DEBU 18c1 Starting new deliver loop for 172.18.0.8:57424" +"2019-05-02 09:28:08.104 UTC [common.deliver] Handle -> DEBU 18c2 Attempting to read seek info message from 172.18.0.8:57424" +"2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.105 UTC [policies] Evaluate -> DEBU 18c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:08.106 UTC [cauthdsl] func1 -> DEBU 18c8 0xc0011291b0 gate 1556789288106110000 evaluation starts" +"2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18c9 0xc0011291b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18ca 0xc0011291b0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18cb 0xc0011291b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:08.107 UTC [cauthdsl] func2 -> DEBU 18cc 0xc0011291b0 principal evaluation fails" +"2019-05-02 09:28:08.107 UTC [cauthdsl] func1 -> DEBU 18cd 0xc0011291b0 gate 1556789288106110000 evaluation fails" +"2019-05-02 09:28:08.107 UTC [policies] Evaluate -> DEBU 18ce Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:08.107 UTC [policies] Evaluate -> DEBU 18cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:08.108 UTC [policies] Evaluate -> DEBU 18d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:08.108 UTC [cauthdsl] func1 -> DEBU 18d1 0xc001129a00 gate 1556789288108763400 evaluation starts" +"2019-05-02 09:28:08.108 UTC [cauthdsl] func2 -> DEBU 18d2 0xc001129a00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.108 UTC [cauthdsl] func2 -> DEBU 18d3 0xc001129a00 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.109 UTC [cauthdsl] func2 -> DEBU 18d4 0xc001129a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:08.109 UTC [cauthdsl] func2 -> DEBU 18d5 0xc001129a00 principal evaluation fails" +"2019-05-02 09:28:08.109 UTC [cauthdsl] func1 -> DEBU 18d6 0xc001129a00 gate 1556789288108763400 evaluation fails" +"2019-05-02 09:28:08.109 UTC [policies] Evaluate -> DEBU 18d7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:08.109 UTC [policies] Evaluate -> DEBU 18d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:08.110 UTC [policies] Evaluate -> DEBU 18d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.110 UTC [cauthdsl] func1 -> DEBU 18da 0xc000b24240 gate 1556789288110540100 evaluation starts" +"2019-05-02 09:28:08.110 UTC [cauthdsl] func2 -> DEBU 18db 0xc000b24240 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.110 UTC [cauthdsl] func2 -> DEBU 18dc 0xc000b24240 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.111 UTC [cauthdsl] func2 -> DEBU 18dd 0xc000b24240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:08.111 UTC [cauthdsl] func2 -> DEBU 18de 0xc000b24240 principal evaluation fails" +"2019-05-02 09:28:08.111 UTC [cauthdsl] func1 -> DEBU 18df 0xc000b24240 gate 1556789288110540100 evaluation fails" +"2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.111 UTC [policies] func1 -> DEBU 18e2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e3 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:08.111 UTC [policies] Evaluate -> DEBU 18e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.112 UTC [policies] Evaluate -> DEBU 18e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:08.112 UTC [policies] Evaluate -> DEBU 18e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.112 UTC [policies] Evaluate -> DEBU 18e7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:08.112 UTC [cauthdsl] func1 -> DEBU 18e8 0xc000b24fa0 gate 1556789288112574500 evaluation starts" +"2019-05-02 09:28:08.112 UTC [cauthdsl] func2 -> DEBU 18e9 0xc000b24fa0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.112 UTC [cauthdsl] func2 -> DEBU 18ea 0xc000b24fa0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.112 UTC [cauthdsl] func2 -> DEBU 18eb 0xc000b24fa0 principal matched by identity 0" +"2019-05-02 09:28:08.113 UTC [msp.identity] Verify -> DEBU 18ec Verify: digest = 00000000 c2 3a 59 e3 81 8e 03 36 c4 4b d6 0e 3c 63 f5 b5 |.:Y....6.K.. DEBU 18ed Verify: sig = 00000000 30 45 02 21 00 b7 41 33 2e 7f 02 54 33 71 dc f0 |0E.!..A3...T3q..| +00000010 7b 0b 3d ed e5 81 e7 9e 18 9d 4c 2b db e3 b8 7c |{.=.......L+...|| +00000020 59 66 16 b7 43 02 20 5b 22 8c a4 5f 2d 29 ce 2a |Yf..C. [".._-).*| +00000030 06 2a e7 40 11 06 2c 8a fa 8e 0f 7d 06 6d c8 6a |.*.@..,....}.m.j| +00000040 02 1e e9 38 eb 37 57 |...8.7W|" +"2019-05-02 09:28:08.113 UTC [cauthdsl] func2 -> DEBU 18ee 0xc000b24fa0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.113 UTC [cauthdsl] func1 -> DEBU 18ef 0xc000b24fa0 gate 1556789288112574500 evaluation succeeds" +"2019-05-02 09:28:08.113 UTC [policies] Evaluate -> DEBU 18f0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:08.113 UTC [policies] Evaluate -> DEBU 18f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:08.113 UTC [policies] Evaluate -> DEBU 18f2 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:08.114 UTC [policies] Evaluate -> DEBU 18f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:08.114 UTC [policies] Evaluate -> DEBU 18f4 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:08.114 UTC [policies] Evaluate -> DEBU 18f5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:08.114 UTC [common.deliver] deliverBlocks -> DEBU 18f6 [channel: businesschannel] Received seekInfo (0xc000089700) start: > stop: > from 172.18.0.8:57424" +"2019-05-02 09:28:08.115 UTC [fsblkstorage] Next -> DEBU 18f7 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:08.115 UTC [fsblkstorage] newBlockfileStream -> DEBU 18f8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76081]" +"2019-05-02 09:28:08.115 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18f9 Remaining bytes=[57461], Going to peek [8] bytes" +"2019-05-02 09:28:08.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18fa Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76081], bytesOffset=[76083]}" +"2019-05-02 09:28:08.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18fb blockbytes [4707] read from file [0]" +"2019-05-02 09:28:08.116 UTC [common.deliver] deliverBlocks -> DEBU 18fc [channel: businesschannel] Delivering block [4] for (0xc000089700) for 172.18.0.8:57424" +"2019-05-02 09:28:08.117 UTC [common.deliver] deliverBlocks -> DEBU 18fd [channel: businesschannel] Done delivering to 172.18.0.8:57424 for (0xc000089700)" +"2019-05-02 09:28:08.117 UTC [common.deliver] Handle -> DEBU 18fe Waiting for new SeekInfo from 172.18.0.8:57424" +"2019-05-02 09:28:08.118 UTC [common.deliver] Handle -> DEBU 18ff Attempting to read seek info message from 172.18.0.8:57424" +"2019-05-02 09:28:08.124 UTC [common.deliver] Handle -> WARN 1900 Error reading from 172.18.0.8:57424: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:08.124 UTC [orderer.common.server] func1 -> DEBU 1901 Closing Deliver stream" +"2019-05-02 09:28:08.124 UTC [comm.grpc.server] 1 -> INFO 1902 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57424 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6932ms +"2019-05-02 09:28:08.124 UTC [grpc] infof -> DEBU 1903 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:08.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1904 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:08.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1905 Sending msg of 28 bytes to 3 on channel testchainid took 62.2µs" +"2019-05-02 09:28:08.188 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1906 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.3498ms " +"2019-05-02 09:28:08.367 UTC [orderer.common.server] Deliver -> DEBU 1907 Starting new Deliver handler" +"2019-05-02 09:28:08.367 UTC [common.deliver] Handle -> DEBU 1908 Starting new deliver loop for 172.18.0.8:57426" +"2019-05-02 09:28:08.367 UTC [common.deliver] Handle -> DEBU 1909 Attempting to read seek info message from 172.18.0.8:57426" +"2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.368 UTC [policies] Evaluate -> DEBU 190d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 190e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:08.369 UTC [cauthdsl] func1 -> DEBU 190f 0xc0011490b0 gate 1556789288369082600 evaluation starts" +"2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1910 0xc0011490b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1911 0xc0011490b0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1912 0xc0011490b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:08.369 UTC [cauthdsl] func2 -> DEBU 1913 0xc0011490b0 principal evaluation fails" +"2019-05-02 09:28:08.369 UTC [cauthdsl] func1 -> DEBU 1914 0xc0011490b0 gate 1556789288369082600 evaluation fails" +"2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 1915 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 1916 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:08.369 UTC [policies] Evaluate -> DEBU 1917 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:08.370 UTC [cauthdsl] func1 -> DEBU 1918 0xc0011498f0 gate 1556789288370152600 evaluation starts" +"2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 1919 0xc0011498f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 191a 0xc0011498f0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 191b 0xc0011498f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:08.370 UTC [cauthdsl] func2 -> DEBU 191c 0xc0011498f0 principal evaluation fails" +"2019-05-02 09:28:08.370 UTC [cauthdsl] func1 -> DEBU 191d 0xc0011498f0 gate 1556789288370152600 evaluation fails" +"2019-05-02 09:28:08.370 UTC [policies] Evaluate -> DEBU 191e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:08.370 UTC [policies] Evaluate -> DEBU 191f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:08.371 UTC [policies] Evaluate -> DEBU 1920 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.371 UTC [cauthdsl] func1 -> DEBU 1921 0xc0012aa130 gate 1556789288371194200 evaluation starts" +"2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1922 0xc0012aa130 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1923 0xc0012aa130 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1924 0xc0012aa130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:08.371 UTC [cauthdsl] func2 -> DEBU 1925 0xc0012aa130 principal evaluation fails" +"2019-05-02 09:28:08.371 UTC [cauthdsl] func1 -> DEBU 1926 0xc0012aa130 gate 1556789288371194200 evaluation fails" +"2019-05-02 09:28:08.371 UTC [policies] Evaluate -> DEBU 1927 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.371 UTC [policies] Evaluate -> DEBU 1928 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.371 UTC [policies] func1 -> DEBU 1929 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192a Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.372 UTC [policies] Evaluate -> DEBU 192e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:08.372 UTC [cauthdsl] func1 -> DEBU 192f 0xc0012aae20 gate 1556789288372680300 evaluation starts" +"2019-05-02 09:28:08.372 UTC [cauthdsl] func2 -> DEBU 1930 0xc0012aae20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.372 UTC [cauthdsl] func2 -> DEBU 1931 0xc0012aae20 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.372 UTC [cauthdsl] func2 -> DEBU 1932 0xc0012aae20 principal matched by identity 0" +"2019-05-02 09:28:08.373 UTC [msp.identity] Verify -> DEBU 1933 Verify: digest = 00000000 26 1a 16 4a 19 d4 86 3d 03 22 b3 a2 1f 33 e9 69 |&..J...=."...3.i| +00000010 fd b7 00 f1 5f 78 fa ab 4f 2e fd c2 07 76 3c 3d |...._x..O....v<=|" +"2019-05-02 09:28:08.373 UTC [msp.identity] Verify -> DEBU 1934 Verify: sig = 00000000 30 45 02 21 00 c5 8c 3a 37 ba 81 8d b7 59 86 9a |0E.!...:7....Y..| +00000010 63 89 0d 6a d7 64 62 8a 3a 73 9f 9a 16 26 75 db |c..j.db.:s...&u.| +00000020 7a 26 ce 8d 84 02 20 11 5a ae 96 60 5b f7 42 bd |z&.... .Z..`[.B.| +00000030 1e 44 57 d5 1a ca 94 cb 3d 7c 4a d1 bd ad 9e 9d |.DW.....=|J.....| +00000040 ef 30 c6 b7 af 8b b2 |.0.....|" +"2019-05-02 09:28:08.373 UTC [cauthdsl] func2 -> DEBU 1935 0xc0012aae20 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.373 UTC [cauthdsl] func1 -> DEBU 1936 0xc0012aae20 gate 1556789288372680300 evaluation succeeds" +"2019-05-02 09:28:08.373 UTC [policies] Evaluate -> DEBU 1937 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 1938 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 1939 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 193a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 193b Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:08.374 UTC [policies] Evaluate -> DEBU 193c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:08.374 UTC [common.deliver] deliverBlocks -> DEBU 193d [channel: businesschannel] Received seekInfo (0xc0002209c0) start: > stop: > from 172.18.0.8:57426" +"2019-05-02 09:28:08.374 UTC [fsblkstorage] Next -> DEBU 193e Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:08.375 UTC [fsblkstorage] newBlockfileStream -> DEBU 193f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80790]" +"2019-05-02 09:28:08.375 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1940 Remaining bytes=[52752], Going to peek [8] bytes" +"2019-05-02 09:28:08.375 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1941 Returning blockbytes - length=[5709], placementInfo={fileNum=[0], startOffset=[80790], bytesOffset=[80792]}" +"2019-05-02 09:28:08.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1942 blockbytes [5709] read from file [0]" +"2019-05-02 09:28:08.376 UTC [common.deliver] deliverBlocks -> DEBU 1943 [channel: businesschannel] Delivering block [5] for (0xc0002209c0) for 172.18.0.8:57426" +"2019-05-02 09:28:08.376 UTC [common.deliver] deliverBlocks -> DEBU 1944 [channel: businesschannel] Done delivering to 172.18.0.8:57426 for (0xc0002209c0)" +"2019-05-02 09:28:08.377 UTC [common.deliver] Handle -> DEBU 1945 Waiting for new SeekInfo from 172.18.0.8:57426" +"2019-05-02 09:28:08.377 UTC [common.deliver] Handle -> DEBU 1946 Attempting to read seek info message from 172.18.0.8:57426" +"2019-05-02 09:28:08.389 UTC [common.deliver] Handle -> WARN 1947 Error reading from 172.18.0.8:57426: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:08.389 UTC [orderer.common.server] func1 -> DEBU 1948 Closing Deliver stream" +"2019-05-02 09:28:08.391 UTC [comm.grpc.server] 1 -> INFO 1949 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57426 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.7817ms +"2019-05-02 09:28:08.392 UTC [grpc] infof -> DEBU 194a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:08.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 194b Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs" +"2019-05-02 09:28:08.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 194c Sending msg of 28 bytes to 3 on channel businesschannel took 20.6µs" +"2019-05-02 09:28:08.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 194d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 776.4µs " +"2019-05-02 09:28:08.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 194e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.4µs " +"2019-05-02 09:28:08.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 194f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:08.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1950 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:08.597 UTC [orderer.common.server] Deliver -> DEBU 1951 Starting new Deliver handler" +"2019-05-02 09:28:08.597 UTC [common.deliver] Handle -> DEBU 1952 Starting new deliver loop for 172.18.0.8:57428" +"2019-05-02 09:28:08.597 UTC [common.deliver] Handle -> DEBU 1953 Attempting to read seek info message from 172.18.0.8:57428" +"2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1954 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1955 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1956 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1957 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.599 UTC [policies] Evaluate -> DEBU 1958 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:08.599 UTC [cauthdsl] func1 -> DEBU 1959 0xc0011594d0 gate 1556789288599854200 evaluation starts" +"2019-05-02 09:28:08.599 UTC [cauthdsl] func2 -> DEBU 195a 0xc0011594d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.600 UTC [cauthdsl] func2 -> DEBU 195b 0xc0011594d0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.601 UTC [cauthdsl] func2 -> DEBU 195c 0xc0011594d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:08.601 UTC [cauthdsl] func2 -> DEBU 195d 0xc0011594d0 principal evaluation fails" +"2019-05-02 09:28:08.601 UTC [cauthdsl] func1 -> DEBU 195e 0xc0011594d0 gate 1556789288599854200 evaluation fails" +"2019-05-02 09:28:08.601 UTC [policies] Evaluate -> DEBU 195f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:08.601 UTC [policies] Evaluate -> DEBU 1960 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:08.601 UTC [policies] Evaluate -> DEBU 1961 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:08.602 UTC [cauthdsl] func1 -> DEBU 1962 0xc001159d10 gate 1556789288602276900 evaluation starts" +"2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1963 0xc001159d10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1964 0xc001159d10 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1965 0xc001159d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:08.602 UTC [cauthdsl] func2 -> DEBU 1966 0xc001159d10 principal evaluation fails" +"2019-05-02 09:28:08.602 UTC [cauthdsl] func1 -> DEBU 1967 0xc001159d10 gate 1556789288602276900 evaluation fails" +"2019-05-02 09:28:08.603 UTC [policies] Evaluate -> DEBU 1968 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:08.603 UTC [policies] Evaluate -> DEBU 1969 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:08.603 UTC [policies] Evaluate -> DEBU 196a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.603 UTC [cauthdsl] func1 -> DEBU 196b 0xc001022670 gate 1556789288603411200 evaluation starts" +"2019-05-02 09:28:08.603 UTC [cauthdsl] func2 -> DEBU 196c 0xc001022670 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.603 UTC [cauthdsl] func2 -> DEBU 196d 0xc001022670 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.603 UTC [cauthdsl] func2 -> DEBU 196e 0xc001022670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:08.604 UTC [cauthdsl] func2 -> DEBU 196f 0xc001022670 principal evaluation fails" +"2019-05-02 09:28:08.604 UTC [cauthdsl] func1 -> DEBU 1970 0xc001022670 gate 1556789288603411200 evaluation fails" +"2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1971 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1972 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.604 UTC [policies] func1 -> DEBU 1973 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1974 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:08.604 UTC [policies] Evaluate -> DEBU 1975 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.605 UTC [policies] Evaluate -> DEBU 1976 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:08.605 UTC [policies] Evaluate -> DEBU 1977 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.605 UTC [policies] Evaluate -> DEBU 1978 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:08.605 UTC [cauthdsl] func1 -> DEBU 1979 0xc001023360 gate 1556789288605625800 evaluation starts" +"2019-05-02 09:28:08.605 UTC [cauthdsl] func2 -> DEBU 197a 0xc001023360 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.605 UTC [cauthdsl] func2 -> DEBU 197b 0xc001023360 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.605 UTC [cauthdsl] func2 -> DEBU 197c 0xc001023360 principal matched by identity 0" +"2019-05-02 09:28:08.606 UTC [msp.identity] Verify -> DEBU 197d Verify: digest = 00000000 8b 4e c6 16 a0 ef d7 dd 19 51 2f 47 82 55 2f f8 |.N.......Q/G.U/.| +00000010 96 db 89 68 55 4b 6c 3f dd 3a b4 41 f4 29 d6 8e |...hUKl?.:.A.)..|" +"2019-05-02 09:28:08.606 UTC [msp.identity] Verify -> DEBU 197e Verify: sig = 00000000 30 44 02 20 1d 83 da 52 84 8a 81 27 59 78 80 dd |0D. ...R...'Yx..| +00000010 d8 5e c3 49 19 39 7b 96 70 5e 6a d7 b4 26 87 6d |.^.I.9{.p^j..&.m| +00000020 04 f8 18 e9 02 20 31 7e 86 02 c0 e9 b5 08 f1 40 |..... 1~.......@| +00000030 1a 9f c3 5b 79 e0 13 79 40 00 49 47 c4 38 53 00 |...[y..y@.IG.8S.| +00000040 09 7a 0b 14 bc e0 |.z....|" +"2019-05-02 09:28:08.606 UTC [cauthdsl] func2 -> DEBU 197f 0xc001023360 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.606 UTC [cauthdsl] func1 -> DEBU 1980 0xc001023360 gate 1556789288605625800 evaluation succeeds" +"2019-05-02 09:28:08.606 UTC [policies] Evaluate -> DEBU 1981 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:08.606 UTC [policies] Evaluate -> DEBU 1982 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1983 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1984 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1985 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:08.607 UTC [policies] Evaluate -> DEBU 1986 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:08.607 UTC [common.deliver] deliverBlocks -> DEBU 1987 [channel: businesschannel] Received seekInfo (0xc000bb0100) start: > stop: > from 172.18.0.8:57428" +"2019-05-02 09:28:08.608 UTC [fsblkstorage] Next -> DEBU 1988 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:08.608 UTC [fsblkstorage] newBlockfileStream -> DEBU 1989 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86501]" +"2019-05-02 09:28:08.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 198a Remaining bytes=[47041], Going to peek [8] bytes" +"2019-05-02 09:28:08.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 198b Returning blockbytes - length=[4060], placementInfo={fileNum=[0], startOffset=[86501], bytesOffset=[86503]}" +"2019-05-02 09:28:08.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 198c blockbytes [4060] read from file [0]" +"2019-05-02 09:28:08.608 UTC [common.deliver] deliverBlocks -> DEBU 198d [channel: businesschannel] Delivering block [6] for (0xc000bb0100) for 172.18.0.8:57428" +"2019-05-02 09:28:08.609 UTC [common.deliver] deliverBlocks -> DEBU 198e [channel: businesschannel] Done delivering to 172.18.0.8:57428 for (0xc000bb0100)" +"2019-05-02 09:28:08.611 UTC [common.deliver] Handle -> DEBU 198f Waiting for new SeekInfo from 172.18.0.8:57428" +"2019-05-02 09:28:08.611 UTC [common.deliver] Handle -> DEBU 1990 Attempting to read seek info message from 172.18.0.8:57428" +"2019-05-02 09:28:08.617 UTC [common.deliver] Handle -> WARN 1991 Error reading from 172.18.0.8:57428: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:08.617 UTC [orderer.common.server] func1 -> DEBU 1992 Closing Deliver stream" +"2019-05-02 09:28:08.617 UTC [comm.grpc.server] 1 -> INFO 1993 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57428 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0819ms +"2019-05-02 09:28:08.617 UTC [grpc] infof -> DEBU 1994 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:08.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1995 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:08.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1996 Sending msg of 28 bytes to 3 on channel testchainid took 47.6µs" +"2019-05-02 09:28:08.682 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1997 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1148ms " +"2019-05-02 09:28:08.835 UTC [orderer.common.server] Deliver -> DEBU 1998 Starting new Deliver handler" +"2019-05-02 09:28:08.835 UTC [common.deliver] Handle -> DEBU 1999 Starting new deliver loop for 172.18.0.8:57430" +"2019-05-02 09:28:08.835 UTC [common.deliver] Handle -> DEBU 199a Attempting to read seek info message from 172.18.0.8:57430" +"2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.836 UTC [policies] Evaluate -> DEBU 199f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:08.837 UTC [cauthdsl] func1 -> DEBU 19a0 0xc000cfe020 gate 1556789288836977200 evaluation starts" +"2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a1 0xc000cfe020 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a2 0xc000cfe020 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a3 0xc000cfe020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:08.837 UTC [cauthdsl] func2 -> DEBU 19a4 0xc000cfe020 principal evaluation fails" +"2019-05-02 09:28:08.837 UTC [cauthdsl] func1 -> DEBU 19a5 0xc000cfe020 gate 1556789288836977200 evaluation fails" +"2019-05-02 09:28:08.837 UTC [policies] Evaluate -> DEBU 19a6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:08.838 UTC [policies] Evaluate -> DEBU 19a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:08.838 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:08.838 UTC [cauthdsl] func1 -> DEBU 19a9 0xc000cfe860 gate 1556789288838884000 evaluation starts" +"2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19aa 0xc000cfe860 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19ab 0xc000cfe860 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19ac 0xc000cfe860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:08.839 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000cfe860 principal evaluation fails" +"2019-05-02 09:28:08.839 UTC [cauthdsl] func1 -> DEBU 19ae 0xc000cfe860 gate 1556789288838884000 evaluation fails" +"2019-05-02 09:28:08.839 UTC [policies] Evaluate -> DEBU 19af Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:08.839 UTC [policies] Evaluate -> DEBU 19b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:08.839 UTC [policies] Evaluate -> DEBU 19b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.840 UTC [cauthdsl] func1 -> DEBU 19b2 0xc000cff0a0 gate 1556789288840215000 evaluation starts" +"2019-05-02 09:28:08.840 UTC [cauthdsl] func2 -> DEBU 19b3 0xc000cff0a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.840 UTC [cauthdsl] func2 -> DEBU 19b4 0xc000cff0a0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.840 UTC [cauthdsl] func2 -> DEBU 19b5 0xc000cff0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:08.841 UTC [cauthdsl] func2 -> DEBU 19b6 0xc000cff0a0 principal evaluation fails" +"2019-05-02 09:28:08.841 UTC [cauthdsl] func1 -> DEBU 19b7 0xc000cff0a0 gate 1556789288840215000 evaluation fails" +"2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19b8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.841 UTC [policies] func1 -> DEBU 19ba Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bb Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.841 UTC [policies] Evaluate -> DEBU 19bf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:08.842 UTC [cauthdsl] func1 -> DEBU 19c0 0xc000cffd90 gate 1556789288842186500 evaluation starts" +"2019-05-02 09:28:08.842 UTC [cauthdsl] func2 -> DEBU 19c1 0xc000cffd90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.842 UTC [cauthdsl] func2 -> DEBU 19c2 0xc000cffd90 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:08.842 UTC [cauthdsl] func2 -> DEBU 19c3 0xc000cffd90 principal matched by identity 0" +"2019-05-02 09:28:08.842 UTC [msp.identity] Verify -> DEBU 19c4 Verify: digest = 00000000 e2 16 b6 ce 94 50 34 28 06 48 7a b1 5e f2 cd 8e |.....P4(.Hz.^...| +00000010 80 b4 3b 07 ab 70 cf 34 4e 52 0c b6 98 fb 52 a9 |..;..p.4NR....R.|" +"2019-05-02 09:28:08.842 UTC [msp.identity] Verify -> DEBU 19c5 Verify: sig = 00000000 30 45 02 21 00 d4 74 bd 8d 7a df 79 41 c8 c5 a6 |0E.!..t..z.yA...| +00000010 92 b7 73 62 98 3f ec 22 40 24 b2 47 b1 b8 d4 f4 |..sb.?."@$.G....| +00000020 b0 08 ac bf f7 02 20 60 f4 8b 7e 8e 90 79 55 ef |...... `..~..yU.| +00000030 53 32 f6 34 30 4a 85 54 32 ad f6 1b 92 a8 e3 9f |S2.40J.T2.......| +00000040 1c 0d e4 6d b6 c5 03 |...m...|" +"2019-05-02 09:28:08.843 UTC [cauthdsl] func2 -> DEBU 19c6 0xc000cffd90 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.843 UTC [cauthdsl] func1 -> DEBU 19c7 0xc000cffd90 gate 1556789288842186500 evaluation succeeds" +"2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19c8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19ca Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:08.843 UTC [policies] Evaluate -> DEBU 19cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:08.844 UTC [policies] Evaluate -> DEBU 19cc Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:08.844 UTC [policies] Evaluate -> DEBU 19cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:08.844 UTC [common.deliver] deliverBlocks -> DEBU 19ce [channel: businesschannel] Received seekInfo (0xc000221840) start: > stop: > from 172.18.0.8:57430" +"2019-05-02 09:28:08.844 UTC [fsblkstorage] Next -> DEBU 19cf Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:08.844 UTC [fsblkstorage] newBlockfileStream -> DEBU 19d0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90563]" +"2019-05-02 09:28:08.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d1 Remaining bytes=[42979], Going to peek [8] bytes" +"2019-05-02 09:28:08.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d2 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[90563], bytesOffset=[90565]}" +"2019-05-02 09:28:08.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d3 blockbytes [4049] read from file [0]" +"2019-05-02 09:28:08.845 UTC [common.deliver] deliverBlocks -> DEBU 19d4 [channel: businesschannel] Delivering block [7] for (0xc000221840) for 172.18.0.8:57430" +"2019-05-02 09:28:08.846 UTC [common.deliver] deliverBlocks -> DEBU 19d5 [channel: businesschannel] Done delivering to 172.18.0.8:57430 for (0xc000221840)" +"2019-05-02 09:28:08.846 UTC [common.deliver] Handle -> DEBU 19d6 Waiting for new SeekInfo from 172.18.0.8:57430" +"2019-05-02 09:28:08.846 UTC [common.deliver] Handle -> DEBU 19d7 Attempting to read seek info message from 172.18.0.8:57430" +"2019-05-02 09:28:08.853 UTC [common.deliver] Handle -> WARN 19d8 Error reading from 172.18.0.8:57430: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:08.854 UTC [orderer.common.server] func1 -> DEBU 19d9 Closing Deliver stream" +"2019-05-02 09:28:08.856 UTC [comm.grpc.server] 1 -> INFO 19da streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57430 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.8614ms +"2019-05-02 09:28:08.856 UTC [grpc] infof -> DEBU 19db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:08.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dc Sending msg of 28 bytes to 2 on channel businesschannel took 59.5µs" +"2019-05-02 09:28:08.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dd Sending msg of 28 bytes to 3 on channel businesschannel took 31.7µs" +"2019-05-02 09:28:08.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19de Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 589.2µs " +"2019-05-02 09:28:08.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 395.8µs " +"2019-05-02 09:28:08.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:08.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:09.050 UTC [orderer.common.server] Deliver -> DEBU 19e2 Starting new Deliver handler" +"2019-05-02 09:28:09.050 UTC [common.deliver] Handle -> DEBU 19e3 Starting new deliver loop for 172.18.0.8:57432" +"2019-05-02 09:28:09.050 UTC [common.deliver] Handle -> DEBU 19e4 Attempting to read seek info message from 172.18.0.8:57432" +"2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.051 UTC [policies] Evaluate -> DEBU 19e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:09.051 UTC [cauthdsl] func1 -> DEBU 19ea 0xc0011ca090 gate 1556789289051899400 evaluation starts" +"2019-05-02 09:28:09.051 UTC [cauthdsl] func2 -> DEBU 19eb 0xc0011ca090 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.052 UTC [cauthdsl] func2 -> DEBU 19ec 0xc0011ca090 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.052 UTC [cauthdsl] func2 -> DEBU 19ed 0xc0011ca090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:09.052 UTC [cauthdsl] func2 -> DEBU 19ee 0xc0011ca090 principal evaluation fails" +"2019-05-02 09:28:09.052 UTC [cauthdsl] func1 -> DEBU 19ef 0xc0011ca090 gate 1556789289051899400 evaluation fails" +"2019-05-02 09:28:09.053 UTC [policies] Evaluate -> DEBU 19f0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:09.053 UTC [policies] Evaluate -> DEBU 19f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:09.053 UTC [policies] Evaluate -> DEBU 19f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:09.054 UTC [cauthdsl] func1 -> DEBU 19f3 0xc0011ca8d0 gate 1556789289054104300 evaluation starts" +"2019-05-02 09:28:09.054 UTC [cauthdsl] func2 -> DEBU 19f4 0xc0011ca8d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.056 UTC [cauthdsl] func2 -> DEBU 19f5 0xc0011ca8d0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.056 UTC [cauthdsl] func2 -> DEBU 19f6 0xc0011ca8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:09.056 UTC [cauthdsl] func2 -> DEBU 19f7 0xc0011ca8d0 principal evaluation fails" +"2019-05-02 09:28:09.057 UTC [cauthdsl] func1 -> DEBU 19f8 0xc0011ca8d0 gate 1556789289054104300 evaluation fails" +"2019-05-02 09:28:09.057 UTC [policies] Evaluate -> DEBU 19f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:09.057 UTC [policies] Evaluate -> DEBU 19fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:09.057 UTC [policies] Evaluate -> DEBU 19fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:09.058 UTC [cauthdsl] func1 -> DEBU 19fc 0xc0011cb110 gate 1556789289058056700 evaluation starts" +"2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 19fd 0xc0011cb110 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 19fe 0xc0011cb110 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 19ff 0xc0011cb110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:09.058 UTC [cauthdsl] func2 -> DEBU 1a00 0xc0011cb110 principal evaluation fails" +"2019-05-02 09:28:09.059 UTC [cauthdsl] func1 -> DEBU 1a01 0xc0011cb110 gate 1556789289058056700 evaluation fails" +"2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a02 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.059 UTC [policies] func1 -> DEBU 1a04 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a05 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a07 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a08 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.059 UTC [policies] Evaluate -> DEBU 1a09 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:09.059 UTC [cauthdsl] func1 -> DEBU 1a0a 0xc0011cbe00 gate 1556789289059921200 evaluation starts" +"2019-05-02 09:28:09.064 UTC [cauthdsl] func2 -> DEBU 1a0b 0xc0011cbe00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.064 UTC [cauthdsl] func2 -> DEBU 1a0c 0xc0011cbe00 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.065 UTC [cauthdsl] func2 -> DEBU 1a0d 0xc0011cbe00 principal matched by identity 0" +"2019-05-02 09:28:09.065 UTC [msp.identity] Verify -> DEBU 1a0e Verify: digest = 00000000 67 7d 0f 6f 26 08 a9 e7 a0 6b 81 16 cf 2d 64 28 |g}.o&....k...-d(| +00000010 4c d2 f4 11 f9 8c 65 76 62 67 d2 58 81 43 be a1 |L.....evbg.X.C..|" +"2019-05-02 09:28:09.065 UTC [msp.identity] Verify -> DEBU 1a0f Verify: sig = 00000000 30 44 02 20 11 8c bc c0 a6 5f 6d b8 ca 62 06 de |0D. ....._m..b..| +00000010 2c 1c d1 fc 1a 37 24 20 16 03 61 60 41 d4 15 93 |,....7$ ..a`A...| +00000020 34 f6 e1 53 02 20 45 f6 3e 83 9d 53 c7 5f f7 e4 |4..S. E.>..S._..| +00000030 78 fb 64 3d 6f c1 66 ee 5d 59 14 3e df 3d fc 42 |x.d=o.f.]Y.>.=.B| +00000040 07 33 26 3c b2 cf |.3&<..|" +"2019-05-02 09:28:09.065 UTC [cauthdsl] func2 -> DEBU 1a10 0xc0011cbe00 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:09.065 UTC [cauthdsl] func1 -> DEBU 1a11 0xc0011cbe00 gate 1556789289059921200 evaluation succeeds" +"2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a12 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a14 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:09.065 UTC [policies] Evaluate -> DEBU 1a16 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:09.066 UTC [policies] Evaluate -> DEBU 1a17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:09.066 UTC [common.deliver] deliverBlocks -> DEBU 1a18 [channel: businesschannel] Received seekInfo (0xc000bb0840) start: > stop: > from 172.18.0.8:57432" +"2019-05-02 09:28:09.066 UTC [fsblkstorage] Next -> DEBU 1a19 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:09.066 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a1a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94614]" +"2019-05-02 09:28:09.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1b Remaining bytes=[38928], Going to peek [8] bytes" +"2019-05-02 09:28:09.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1c Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94614], bytesOffset=[94616]}" +"2019-05-02 09:28:09.066 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1d blockbytes [4049] read from file [0]" +"2019-05-02 09:28:09.067 UTC [common.deliver] deliverBlocks -> DEBU 1a1e [channel: businesschannel] Delivering block [8] for (0xc000bb0840) for 172.18.0.8:57432" +"2019-05-02 09:28:09.067 UTC [common.deliver] deliverBlocks -> DEBU 1a1f [channel: businesschannel] Done delivering to 172.18.0.8:57432 for (0xc000bb0840)" +"2019-05-02 09:28:09.067 UTC [common.deliver] Handle -> DEBU 1a20 Waiting for new SeekInfo from 172.18.0.8:57432" +"2019-05-02 09:28:09.067 UTC [common.deliver] Handle -> DEBU 1a21 Attempting to read seek info message from 172.18.0.8:57432" +"2019-05-02 09:28:09.089 UTC [common.deliver] Handle -> WARN 1a22 Error reading from 172.18.0.8:57432: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:09.090 UTC [orderer.common.server] func1 -> DEBU 1a23 Closing Deliver stream" +"2019-05-02 09:28:09.090 UTC [comm.grpc.server] 1 -> INFO 1a24 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57432 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=41.0645ms +"2019-05-02 09:28:09.092 UTC [grpc] infof -> DEBU 1a25 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:09.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a26 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:09.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a27 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-05-02 09:28:09.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a28 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81µs " +"2019-05-02 09:28:09.302 UTC [orderer.common.server] Deliver -> DEBU 1a29 Starting new Deliver handler" +"2019-05-02 09:28:09.302 UTC [common.deliver] Handle -> DEBU 1a2a Starting new deliver loop for 172.18.0.8:57434" +"2019-05-02 09:28:09.302 UTC [common.deliver] Handle -> DEBU 1a2b Attempting to read seek info message from 172.18.0.8:57434" +"2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.303 UTC [policies] Evaluate -> DEBU 1a30 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:09.303 UTC [cauthdsl] func1 -> DEBU 1a31 0xc0012046a0 gate 1556789289303922500 evaluation starts" +"2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a32 0xc0012046a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a33 0xc0012046a0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a34 0xc0012046a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a35 0xc0012046a0 principal evaluation fails" +"2019-05-02 09:28:09.304 UTC [cauthdsl] func1 -> DEBU 1a36 0xc0012046a0 gate 1556789289303922500 evaluation fails" +"2019-05-02 09:28:09.304 UTC [policies] Evaluate -> DEBU 1a37 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:09.304 UTC [policies] Evaluate -> DEBU 1a38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:09.304 UTC [policies] Evaluate -> DEBU 1a39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:09.304 UTC [cauthdsl] func1 -> DEBU 1a3a 0xc001204ee0 gate 1556789289304846800 evaluation starts" +"2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a3b 0xc001204ee0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.304 UTC [cauthdsl] func2 -> DEBU 1a3c 0xc001204ee0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a3d 0xc001204ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc001204ee0 principal evaluation fails" +"2019-05-02 09:28:09.305 UTC [cauthdsl] func1 -> DEBU 1a3f 0xc001204ee0 gate 1556789289304846800 evaluation fails" +"2019-05-02 09:28:09.305 UTC [policies] Evaluate -> DEBU 1a40 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:09.305 UTC [policies] Evaluate -> DEBU 1a41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:09.305 UTC [policies] Evaluate -> DEBU 1a42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:09.305 UTC [cauthdsl] func1 -> DEBU 1a43 0xc001205720 gate 1556789289305659700 evaluation starts" +"2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a44 0xc001205720 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a45 0xc001205720 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.305 UTC [cauthdsl] func2 -> DEBU 1a46 0xc001205720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-05-02 09:28:09.306 UTC [cauthdsl] func2 -> DEBU 1a47 0xc001205720 principal evaluation fails" +"2019-05-02 09:28:09.306 UTC [cauthdsl] func1 -> DEBU 1a48 0xc001205720 gate 1556789289305659700 evaluation fails" +"2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a49 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.306 UTC [policies] func1 -> DEBU 1a4b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4c Signature set did not satisfy policy /Channel/Application/Readers" +"2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.306 UTC [policies] Evaluate -> DEBU 1a50 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:09.306 UTC [cauthdsl] func1 -> DEBU 1a51 0xc001214410 gate 1556789289306716700 evaluation starts" +"2019-05-02 09:28:09.306 UTC [cauthdsl] func2 -> DEBU 1a52 0xc001214410 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.306 UTC [cauthdsl] func2 -> DEBU 1a53 0xc001214410 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.307 UTC [cauthdsl] func2 -> DEBU 1a54 0xc001214410 principal matched by identity 0" +"2019-05-02 09:28:09.307 UTC [msp.identity] Verify -> DEBU 1a55 Verify: digest = 00000000 8f 16 74 7b 1e 49 2c 40 21 57 2b 1b 61 bf c7 b1 |..t{.I,@!W+.a...| +00000010 7c 17 e3 76 af 02 42 cf 66 69 83 5a 15 e3 3e 25 ||..v..B.fi.Z..>%|" +"2019-05-02 09:28:09.307 UTC [msp.identity] Verify -> DEBU 1a56 Verify: sig = 00000000 30 45 02 21 00 f3 cc 57 3c b2 77 c7 79 4f 4e c7 |0E.!...W<.w.yON.| +00000010 f3 da 70 61 58 9c d9 68 ec a2 cd 46 05 a8 3d bd |..paX..h...F..=.| +00000020 a3 24 d8 68 f6 02 20 69 93 7c f3 b4 d3 18 74 c3 |.$.h.. i.|....t.| +00000030 92 5c 3d 60 8a 19 25 ca ff fe be 17 61 d9 a1 ee |.\=`..%.....a...| +00000040 74 e8 49 e0 be 0d ba |t.I....|" +"2019-05-02 09:28:09.308 UTC [cauthdsl] func2 -> DEBU 1a57 0xc001214410 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:09.308 UTC [cauthdsl] func1 -> DEBU 1a58 0xc001214410 gate 1556789289306716700 evaluation succeeds" +"2019-05-02 09:28:09.308 UTC [policies] Evaluate -> DEBU 1a59 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5b Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:09.309 UTC [policies] Evaluate -> DEBU 1a5d Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:09.310 UTC [policies] Evaluate -> DEBU 1a5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:09.310 UTC [common.deliver] deliverBlocks -> DEBU 1a5f [channel: businesschannel] Received seekInfo (0xc0000c09c0) start: > stop: > from 172.18.0.8:57434" +"2019-05-02 09:28:09.310 UTC [fsblkstorage] Next -> DEBU 1a60 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-05-02 09:28:09.310 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a61 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98665]" +"2019-05-02 09:28:09.311 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a62 Remaining bytes=[34877], Going to peek [8] bytes" +"2019-05-02 09:28:09.311 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a63 Returning blockbytes - length=[34874], placementInfo={fileNum=[0], startOffset=[98665], bytesOffset=[98668]}" +"2019-05-02 09:28:09.311 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a64 blockbytes [34874] read from file [0]" +"2019-05-02 09:28:09.312 UTC [common.deliver] deliverBlocks -> DEBU 1a65 [channel: businesschannel] Delivering block [9] for (0xc0000c09c0) for 172.18.0.8:57434" +"2019-05-02 09:28:09.312 UTC [common.deliver] deliverBlocks -> DEBU 1a66 [channel: businesschannel] Done delivering to 172.18.0.8:57434 for (0xc0000c09c0)" +"2019-05-02 09:28:09.313 UTC [common.deliver] Handle -> DEBU 1a67 Waiting for new SeekInfo from 172.18.0.8:57434" +"2019-05-02 09:28:09.313 UTC [common.deliver] Handle -> DEBU 1a68 Attempting to read seek info message from 172.18.0.8:57434" +"2019-05-02 09:28:09.326 UTC [common.deliver] Handle -> WARN 1a69 Error reading from 172.18.0.8:57434: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:09.326 UTC [orderer.common.server] func1 -> DEBU 1a6a Closing Deliver stream" +"2019-05-02 09:28:09.326 UTC [comm.grpc.server] 1 -> INFO 1a6b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57434 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.0824ms +"2019-05-02 09:28:09.326 UTC [grpc] infof -> DEBU 1a6c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:09.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6d Sending msg of 28 bytes to 2 on channel businesschannel took 22.7µs" +"2019-05-02 09:28:09.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6e Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2019-05-02 09:28:09.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " +"2019-05-02 09:28:09.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.1µs " +"2019-05-02 09:28:09.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a71 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:09.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a72 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:09.537 UTC [orderer.common.server] Deliver -> DEBU 1a73 Starting new Deliver handler" +"2019-05-02 09:28:09.537 UTC [common.deliver] Handle -> DEBU 1a74 Starting new deliver loop for 172.18.0.8:57436" +"2019-05-02 09:28:09.537 UTC [common.deliver] Handle -> DEBU 1a75 Attempting to read seek info message from 172.18.0.8:57436" +"2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a76 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a77 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.539 UTC [policies] Evaluate -> DEBU 1a7a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:09.539 UTC [cauthdsl] func1 -> DEBU 1a7b 0xc0012314d0 gate 1556789289539922500 evaluation starts" +"2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc0012314d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc0012314d0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a7e 0xc0012314d0 principal matched by identity 0" +"2019-05-02 09:28:09.540 UTC [msp.identity] Verify -> DEBU 1a7f Verify: digest = 00000000 01 78 be 83 04 ac 35 24 c3 f0 da a0 9f 39 81 c0 |.x....5$.....9..| +00000010 ee 4c 56 24 fa 75 c9 2d 59 9b bf 24 b1 b7 9f 81 |.LV$.u.-Y..$....|" +"2019-05-02 09:28:09.540 UTC [msp.identity] Verify -> DEBU 1a80 Verify: sig = 00000000 30 44 02 20 2e ac fd 06 07 30 85 57 fb 65 37 db |0D. .....0.W.e7.| +00000010 24 88 4a 42 cd ff 05 2a fe 95 a2 05 84 f2 af b4 |$.JB...*........| +00000020 2b 59 cf d1 02 20 6e 7a 19 11 8a ae 2a 0b 35 ef |+Y... nz....*.5.| +00000030 a1 c7 e4 d2 12 b5 c9 4f d9 12 a4 64 a4 80 0b 13 |.......O...d....| +00000040 81 93 8b c2 ef f9 |......|" +"2019-05-02 09:28:09.540 UTC [cauthdsl] func2 -> DEBU 1a81 0xc0012314d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:09.540 UTC [cauthdsl] func1 -> DEBU 1a82 0xc0012314d0 gate 1556789289539922500 evaluation succeeds" +"2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a83 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a84 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a85 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a87 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:09.541 UTC [policies] Evaluate -> DEBU 1a88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:09.541 UTC [common.deliver] deliverBlocks -> DEBU 1a89 [channel: testchainid] Received seekInfo (0xc000bb1300) start: > stop: > from 172.18.0.8:57436" +"2019-05-02 09:28:09.542 UTC [fsblkstorage] Next -> DEBU 1a8a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-05-02 09:28:09.542 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a8b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-05-02 09:28:09.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8c Remaining bytes=[25826], Going to peek [8] bytes" +"2019-05-02 09:28:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8d Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-05-02 09:28:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8e blockbytes [25823] read from file [0]" +"2019-05-02 09:28:09.543 UTC [common.deliver] deliverBlocks -> DEBU 1a8f [channel: testchainid] Delivering block [1] for (0xc000bb1300) for 172.18.0.8:57436" +"2019-05-02 09:28:09.544 UTC [common.deliver] deliverBlocks -> DEBU 1a90 [channel: testchainid] Done delivering to 172.18.0.8:57436 for (0xc000bb1300)" +"2019-05-02 09:28:09.555 UTC [common.deliver] Handle -> DEBU 1a91 Waiting for new SeekInfo from 172.18.0.8:57436" +"2019-05-02 09:28:09.555 UTC [common.deliver] Handle -> DEBU 1a92 Attempting to read seek info message from 172.18.0.8:57436" +"2019-05-02 09:28:09.563 UTC [grpc] warningf -> DEBU 1a93 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.8:57436: read: connection reset by peer" +"2019-05-02 09:28:09.567 UTC [grpc] infof -> DEBU 1a94 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:09.569 UTC [common.deliver] Handle -> WARN 1a95 Error reading from 172.18.0.8:57436: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:09.569 UTC [orderer.common.server] func1 -> DEBU 1a96 Closing Deliver stream" +"2019-05-02 09:28:09.571 UTC [comm.grpc.server] 1 -> INFO 1a97 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57436 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.3748ms +"2019-05-02 09:28:09.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a98 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:09.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a99 Sending msg of 28 bytes to 3 on channel testchainid took 31.4µs" +"2019-05-02 09:28:09.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a9a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 771.7µs " +"2019-05-02 09:28:09.871 UTC [orderer.common.server] Deliver -> DEBU 1a9b Starting new Deliver handler" +"2019-05-02 09:28:09.871 UTC [common.deliver] Handle -> DEBU 1a9c Starting new deliver loop for 172.18.0.8:57438" +"2019-05-02 09:28:09.871 UTC [common.deliver] Handle -> DEBU 1a9d Attempting to read seek info message from 172.18.0.8:57438" +"2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1a9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1a9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1aa0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1aa1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.872 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:09.872 UTC [cauthdsl] func1 -> DEBU 1aa3 0xc000f15130 gate 1556789289872980200 evaluation starts" +"2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc000f15130 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa5 0xc000f15130 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000f15130 principal matched by identity 0" +"2019-05-02 09:28:09.873 UTC [msp.identity] Verify -> DEBU 1aa7 Verify: digest = 00000000 40 6b e9 74 a0 9b 03 41 c9 cf b9 71 26 01 d6 0b |@k.t...A...q&...| +00000010 ec 2d 32 f1 91 44 03 fe b9 54 71 6e 72 75 f9 0e |.-2..D...Tqnru..|" +"2019-05-02 09:28:09.873 UTC [msp.identity] Verify -> DEBU 1aa8 Verify: sig = 00000000 30 44 02 20 46 31 55 8d 63 df 95 3b 73 ea e6 e6 |0D. F1U.c..;s...| +00000010 8e f7 f4 c7 b0 38 55 9a c5 b1 19 e4 37 74 fd 85 |.....8U.....7t..| +00000020 42 56 b8 41 02 20 6d e1 44 36 55 f6 7e 64 64 b3 |BV.A. m.D6U.~dd.| +00000030 47 b9 5c d3 2c 28 10 03 72 b3 fd 98 f5 6b 89 6d |G.\.,(..r....k.m| +00000040 44 1a 60 99 cb bb |D.`...|" +"2019-05-02 09:28:09.873 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000f15130 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:09.874 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000f15130 gate 1556789289872980200 evaluation succeeds" +"2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aab Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aad Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:09.874 UTC [policies] Evaluate -> DEBU 1aae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:09.875 UTC [policies] Evaluate -> DEBU 1aaf Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:09.875 UTC [policies] Evaluate -> DEBU 1ab0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:09.875 UTC [common.deliver] deliverBlocks -> DEBU 1ab1 [channel: testchainid] Received seekInfo (0xc0011ac200) start: > stop: > from 172.18.0.8:57438" +"2019-05-02 09:28:09.875 UTC [fsblkstorage] Next -> DEBU 1ab2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-05-02 09:28:09.875 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ab3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-05-02 09:28:09.876 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab4 Remaining bytes=[25826], Going to peek [8] bytes" +"2019-05-02 09:28:09.876 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab5 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-05-02 09:28:09.876 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab6 blockbytes [25823] read from file [0]" +"2019-05-02 09:28:09.876 UTC [common.deliver] deliverBlocks -> DEBU 1ab7 [channel: testchainid] Delivering block [1] for (0xc0011ac200) for 172.18.0.8:57438" +"2019-05-02 09:28:09.876 UTC [common.deliver] deliverBlocks -> DEBU 1ab8 [channel: testchainid] Done delivering to 172.18.0.8:57438 for (0xc0011ac200)" +"2019-05-02 09:28:09.877 UTC [common.deliver] Handle -> DEBU 1ab9 Waiting for new SeekInfo from 172.18.0.8:57438" +"2019-05-02 09:28:09.877 UTC [common.deliver] Handle -> DEBU 1aba Attempting to read seek info message from 172.18.0.8:57438" +"2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.880 UTC [policies] Evaluate -> DEBU 1abf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:09.880 UTC [cauthdsl] func1 -> DEBU 1ac0 0xc000ccf160 gate 1556789289880360100 evaluation starts" +"2019-05-02 09:28:09.880 UTC [cauthdsl] func2 -> DEBU 1ac1 0xc000ccf160 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.880 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc000ccf160 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:09.880 UTC [cauthdsl] func2 -> DEBU 1ac3 0xc000ccf160 principal matched by identity 0" +"2019-05-02 09:28:09.880 UTC [msp.identity] Verify -> DEBU 1ac4 Verify: digest = 00000000 8d ec 9c 50 23 08 9b f0 51 12 80 5b 56 8b 9e a0 |...P#...Q..[V...| +00000010 2e 5b 50 90 9d f9 ba ec 6c 75 80 fa 7d 9b 6a de |.[P.....lu..}.j.|" +"2019-05-02 09:28:09.881 UTC [msp.identity] Verify -> DEBU 1ac5 Verify: sig = 00000000 30 45 02 21 00 f9 d7 37 4d 2a 21 b3 38 16 ec 7b |0E.!...7M*!.8..{| +00000010 39 c0 9d bb 29 79 e1 a0 9d 60 16 65 52 b0 15 f3 |9...)y...`.eR...| +00000020 a9 53 2e f7 3f 02 20 0c 55 b1 25 74 17 0d b5 88 |.S..?. .U.%t....| +00000030 64 39 b8 26 0d 2e f8 7f 28 26 01 d5 47 1e 3e 02 |d9.&....(&..G.>.| +00000040 2e f9 ba c4 42 25 e0 |....B%.|" +"2019-05-02 09:28:09.881 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc000ccf160 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:09.881 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc000ccf160 gate 1556789289880360100 evaluation succeeds" +"2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1ac8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1aca Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1acb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:09.881 UTC [policies] Evaluate -> DEBU 1acc Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:09.882 UTC [policies] Evaluate -> DEBU 1acd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:09.882 UTC [common.deliver] deliverBlocks -> DEBU 1ace [channel: testchainid] Received seekInfo (0xc0011ac5c0) start: > stop: > from 172.18.0.8:57438" +"2019-05-02 09:28:09.883 UTC [fsblkstorage] Next -> DEBU 1acf Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-05-02 09:28:09.883 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ad0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-05-02 09:28:09.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad1 Remaining bytes=[44241], Going to peek [8] bytes" +"2019-05-02 09:28:09.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad2 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:28:09.883 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad3 blockbytes [18412] read from file [0]" +"2019-05-02 09:28:09.884 UTC [common.deliver] deliverBlocks -> DEBU 1ad4 [channel: testchainid] Delivering block [0] for (0xc0011ac5c0) for 172.18.0.8:57438" +"2019-05-02 09:28:09.884 UTC [common.deliver] deliverBlocks -> DEBU 1ad5 [channel: testchainid] Done delivering to 172.18.0.8:57438 for (0xc0011ac5c0)" +"2019-05-02 09:28:09.884 UTC [common.deliver] Handle -> DEBU 1ad6 Waiting for new SeekInfo from 172.18.0.8:57438" +"2019-05-02 09:28:09.884 UTC [common.deliver] Handle -> DEBU 1ad7 Attempting to read seek info message from 172.18.0.8:57438" +"2019-05-02 09:28:09.894 UTC [common.deliver] Handle -> WARN 1ad8 Error reading from 172.18.0.8:57438: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:09.895 UTC [grpc] infof -> DEBU 1ad9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:09.895 UTC [orderer.common.server] func1 -> DEBU 1ada Closing Deliver stream" +"2019-05-02 09:28:09.900 UTC [comm.grpc.server] 1 -> INFO 1adb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57438 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.7763ms +"2019-05-02 09:28:09.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1adc Sending msg of 28 bytes to 2 on channel businesschannel took 92µs" +"2019-05-02 09:28:09.953 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1add Sending msg of 28 bytes to 3 on channel businesschannel took 76.9µs" +"2019-05-02 09:28:09.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ade Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 360.2µs " +"2019-05-02 09:28:09.955 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1adf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 902.9µs " +"2019-05-02 09:28:09.960 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:09.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae1 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:10.044 UTC [orderer.common.server] Deliver -> DEBU 1ae2 Starting new Deliver handler" +"2019-05-02 09:28:10.045 UTC [common.deliver] Handle -> DEBU 1ae3 Starting new deliver loop for 172.18.0.8:57440" +"2019-05-02 09:28:10.045 UTC [common.deliver] Handle -> DEBU 1ae4 Attempting to read seek info message from 172.18.0.8:57440" +"2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:10.045 UTC [policies] Evaluate -> DEBU 1ae8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:10.046 UTC [policies] Evaluate -> DEBU 1ae9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:10.046 UTC [cauthdsl] func1 -> DEBU 1aea 0xc000f2ffc0 gate 1556789290046501800 evaluation starts" +"2019-05-02 09:28:10.046 UTC [cauthdsl] func2 -> DEBU 1aeb 0xc000f2ffc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:10.046 UTC [cauthdsl] func2 -> DEBU 1aec 0xc000f2ffc0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:10.046 UTC [cauthdsl] func2 -> DEBU 1aed 0xc000f2ffc0 principal matched by identity 0" +"2019-05-02 09:28:10.047 UTC [msp.identity] Verify -> DEBU 1aee Verify: digest = 00000000 e4 ef 83 3b 15 d5 45 77 3f 26 5c 0f 96 19 15 9b |...;..Ew?&\.....| +00000010 8b dc 6f 9c d4 94 9e 84 c7 f3 03 90 e6 89 d4 dc |..o.............|" +"2019-05-02 09:28:10.047 UTC [msp.identity] Verify -> DEBU 1aef Verify: sig = 00000000 30 45 02 21 00 d9 99 41 8c dd 9a c5 86 23 a4 08 |0E.!...A.....#..| +00000010 98 85 ac 57 73 40 19 07 41 a9 e0 b3 46 b1 6a 39 |...Ws@..A...F.j9| +00000020 b5 0b ba b8 f0 02 20 72 ae e0 76 60 30 ce eb 85 |...... r..v`0...| +00000030 bd ec 9c 80 3f 9d 5b c5 86 3f d6 65 63 57 1b af |....?.[..?.ecW..| +00000040 31 b4 8d e7 37 31 89 |1...71.|" +"2019-05-02 09:28:10.047 UTC [cauthdsl] func2 -> DEBU 1af0 0xc000f2ffc0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:10.047 UTC [cauthdsl] func1 -> DEBU 1af1 0xc000f2ffc0 gate 1556789290046501800 evaluation succeeds" +"2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af4 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:10.047 UTC [policies] Evaluate -> DEBU 1af6 Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:10.048 UTC [policies] Evaluate -> DEBU 1af7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:10.048 UTC [common.deliver] deliverBlocks -> DEBU 1af8 [channel: testchainid] Received seekInfo (0xc0003fdc40) start: > stop: > from 172.18.0.8:57440" +"2019-05-02 09:28:10.048 UTC [fsblkstorage] Next -> DEBU 1af9 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-05-02 09:28:10.048 UTC [fsblkstorage] newBlockfileStream -> DEBU 1afa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-05-02 09:28:10.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afb Remaining bytes=[44241], Going to peek [8] bytes" +"2019-05-02 09:28:10.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afc Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-05-02 09:28:10.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afd blockbytes [18412] read from file [0]" +"2019-05-02 09:28:10.048 UTC [common.deliver] deliverBlocks -> DEBU 1afe [channel: testchainid] Delivering block [0] for (0xc0003fdc40) for 172.18.0.8:57440" +"2019-05-02 09:28:10.049 UTC [common.deliver] deliverBlocks -> DEBU 1aff [channel: testchainid] Done delivering to 172.18.0.8:57440 for (0xc0003fdc40)" +"2019-05-02 09:28:10.049 UTC [common.deliver] Handle -> DEBU 1b00 Waiting for new SeekInfo from 172.18.0.8:57440" +"2019-05-02 09:28:10.049 UTC [common.deliver] Handle -> DEBU 1b01 Attempting to read seek info message from 172.18.0.8:57440" +"2019-05-02 09:28:10.057 UTC [grpc] infof -> DEBU 1b02 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:10.058 UTC [common.deliver] Handle -> WARN 1b03 Error reading from 172.18.0.8:57440: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:10.058 UTC [orderer.common.server] func1 -> DEBU 1b04 Closing Deliver stream" +"2019-05-02 09:28:10.059 UTC [comm.grpc.server] 1 -> INFO 1b05 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57440 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.1157ms +"2019-05-02 09:28:10.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b06 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:10.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b07 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +"2019-05-02 09:28:10.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.3µs " +"2019-05-02 09:28:10.246 UTC [orderer.common.server] Deliver -> DEBU 1b09 Starting new Deliver handler" +"2019-05-02 09:28:10.246 UTC [common.deliver] Handle -> DEBU 1b0a Starting new deliver loop for 172.18.0.8:57442" +"2019-05-02 09:28:10.246 UTC [common.deliver] Handle -> DEBU 1b0b Attempting to read seek info message from 172.18.0.8:57442" +"2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b0f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:10.248 UTC [policies] Evaluate -> DEBU 1b10 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-05-02 09:28:10.248 UTC [cauthdsl] func1 -> DEBU 1b11 0xc000b246b0 gate 1556789290248617400 evaluation starts" +"2019-05-02 09:28:10.248 UTC [cauthdsl] func2 -> DEBU 1b12 0xc000b246b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:10.248 UTC [cauthdsl] func2 -> DEBU 1b13 0xc000b246b0 processing identity 0 with bytes of efef60" +"2019-05-02 09:28:10.248 UTC [cauthdsl] func2 -> DEBU 1b14 0xc000b246b0 principal matched by identity 0" +"2019-05-02 09:28:10.248 UTC [msp.identity] Verify -> DEBU 1b15 Verify: digest = 00000000 de d8 29 3b 93 53 04 5e 60 d9 ac 8a 09 e5 a1 1d |..);.S.^`.......| +00000010 07 34 ab f6 9e de e1 44 12 9a 8b bf 30 0b 80 28 |.4.....D....0..(|" +"2019-05-02 09:28:10.248 UTC [msp.identity] Verify -> DEBU 1b16 Verify: sig = 00000000 30 44 02 20 38 21 02 ad 0e cf 99 02 73 d0 6b f5 |0D. 8!......s.k.| +00000010 30 b0 2a bc 27 17 19 7a 83 b1 6f da 66 b2 3a 31 |0.*.'..z..o.f.:1| +00000020 e9 f2 78 8d 02 20 0f f2 c2 b6 ad a9 f6 50 db dc |..x.. .......P..| +00000030 88 2b 74 6f 41 a8 04 d3 5b 3c 1e d0 f8 95 f8 74 |.+toA...[<.....t| +00000040 f1 f1 9d cf 4a 82 |....J.|" +"2019-05-02 09:28:10.249 UTC [cauthdsl] func2 -> DEBU 1b17 0xc000b246b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:10.249 UTC [cauthdsl] func1 -> DEBU 1b18 0xc000b246b0 gate 1556789290248617400 evaluation succeeds" +"2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b19 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1b Signature set satisfies policy /Channel/Orderer/Readers" +"2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1d Signature set satisfies policy /Channel/Readers" +"2019-05-02 09:28:10.249 UTC [policies] Evaluate -> DEBU 1b1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-05-02 09:28:10.249 UTC [common.deliver] deliverBlocks -> DEBU 1b1f [channel: testchainid] Received seekInfo (0xc0000c10c0) start: > stop: > from 172.18.0.8:57442" +"2019-05-02 09:28:10.249 UTC [fsblkstorage] Next -> DEBU 1b20 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-05-02 09:28:10.249 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b21 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-05-02 09:28:10.249 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b22 Remaining bytes=[25826], Going to peek [8] bytes" +"2019-05-02 09:28:10.249 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b23 Returning blockbytes - length=[25823], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-05-02 09:28:10.249 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b24 blockbytes [25823] read from file [0]" +"2019-05-02 09:28:10.250 UTC [common.deliver] deliverBlocks -> DEBU 1b25 [channel: testchainid] Delivering block [1] for (0xc0000c10c0) for 172.18.0.8:57442" +"2019-05-02 09:28:10.250 UTC [common.deliver] deliverBlocks -> DEBU 1b26 [channel: testchainid] Done delivering to 172.18.0.8:57442 for (0xc0000c10c0)" +"2019-05-02 09:28:10.250 UTC [common.deliver] Handle -> DEBU 1b27 Waiting for new SeekInfo from 172.18.0.8:57442" +"2019-05-02 09:28:10.250 UTC [common.deliver] Handle -> DEBU 1b28 Attempting to read seek info message from 172.18.0.8:57442" +"2019-05-02 09:28:10.263 UTC [common.deliver] Handle -> WARN 1b29 Error reading from 172.18.0.8:57442: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:10.263 UTC [orderer.common.server] func1 -> DEBU 1b2a Closing Deliver stream" +"2019-05-02 09:28:10.263 UTC [comm.grpc.server] 1 -> INFO 1b2b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:57442 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.7119ms +"2019-05-02 09:28:10.263 UTC [grpc] infof -> DEBU 1b2c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:10.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2d Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +"2019-05-02 09:28:10.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2e Sending msg of 28 bytes to 3 on channel businesschannel took 53.8µs" +"2019-05-02 09:28:10.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.9µs " +"2019-05-02 09:28:10.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b30 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.2µs " +"2019-05-02 09:28:10.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b32 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:10.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b31 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:10.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b33 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:10.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b34 Sending msg of 28 bytes to 3 on channel testchainid took 123.8µs" +"2019-05-02 09:28:10.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b35 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.6µs " +"2019-05-02 09:28:10.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b36 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +"2019-05-02 09:28:10.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b37 Sending msg of 28 bytes to 3 on channel businesschannel took 60.5µs" +"2019-05-02 09:28:10.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.9µs " +"2019-05-02 09:28:10.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.2µs " +"2019-05-02 09:28:10.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:10.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3a Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:11.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:11.185 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3d Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +"2019-05-02 09:28:11.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 819.4µs " +"2019-05-02 09:28:11.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3f Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +"2019-05-02 09:28:11.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b40 Sending msg of 28 bytes to 3 on channel businesschannel took 8µs" +"2019-05-02 09:28:11.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.7µs " +"2019-05-02 09:28:11.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.7µs " +"2019-05-02 09:28:11.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b43 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:11.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b44 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:11.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b45 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:11.681 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b46 Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +"2019-05-02 09:28:11.681 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.7µs " +"2019-05-02 09:28:11.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b48 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +"2019-05-02 09:28:11.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b49 Sending msg of 28 bytes to 3 on channel businesschannel took 21.6µs" +"2019-05-02 09:28:11.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs " +"2019-05-02 09:28:11.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.4µs " +"2019-05-02 09:28:11.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4c Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:11.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4d Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:12.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:12.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b4f Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +"2019-05-02 09:28:12.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b50 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " +"2019-05-02 09:28:12.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b51 Sending msg of 28 bytes to 2 on channel businesschannel took 58µs" +"2019-05-02 09:28:12.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b52 Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +"2019-05-02 09:28:12.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.6µs " +"2019-05-02 09:28:12.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 224µs " +"2019-05-02 09:28:12.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b55 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:12.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b56 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:12.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b57 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:12.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b58 Sending msg of 28 bytes to 3 on channel testchainid took 90.8µs" +"2019-05-02 09:28:12.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b59 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +"2019-05-02 09:28:12.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b5a Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" +"2019-05-02 09:28:12.950 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b5b Sending msg of 28 bytes to 3 on channel businesschannel took 23.8µs" +"2019-05-02 09:28:12.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b5d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.4µs " +"2019-05-02 09:28:12.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.2µs " +"2019-05-02 09:28:12.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5e Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:12.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5f Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:13.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b60 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:13.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b61 Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +"2019-05-02 09:28:13.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b62 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " +"2019-05-02 09:28:13.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b63 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +"2019-05-02 09:28:13.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b64 Sending msg of 28 bytes to 3 on channel businesschannel took 28µs" +"2019-05-02 09:28:13.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs " +"2019-05-02 09:28:13.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b66 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95µs " +"2019-05-02 09:28:13.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b67 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:13.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b68 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:13.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b69 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:13.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6a Sending msg of 28 bytes to 3 on channel testchainid took 134.8µs" +"2019-05-02 09:28:13.646 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1925ms " +"2019-05-02 09:28:13.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6c Sending msg of 28 bytes to 2 on channel businesschannel took 88.9µs" +"2019-05-02 09:28:13.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6d Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-05-02 09:28:13.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.9µs " +"2019-05-02 09:28:13.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.8µs " +"2019-05-02 09:28:13.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b70 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:13.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b71 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:14.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b72 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:14.146 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b73 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +"2019-05-02 09:28:14.146 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b74 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.4µs " +"2019-05-02 09:28:15.250 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b75 Sending msg of 28 bytes to 2 on channel businesschannel took 37.9µs" +"2019-05-02 09:28:15.251 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b78 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2019-05-02 09:28:15.252 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b79 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:15.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b77 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:15.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109µs " +"2019-05-02 09:28:15.252 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs " +"2019-05-02 09:28:15.254 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7b Sending msg of 28 bytes to 3 on channel testchainid took 448µs" +"2019-05-02 09:28:15.255 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.5µs " +"2019-05-02 09:28:15.256 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:15.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7e Sending msg of 28 bytes to 3 on channel businesschannel took 22.1µs" +"2019-05-02 09:28:15.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7f Sending msg of 28 bytes to 2 on channel businesschannel took 9.5µs" +"2019-05-02 09:28:15.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.6µs " +"2019-05-02 09:28:15.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.6µs " +"2019-05-02 09:28:15.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b82 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:15.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b83 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:15.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b84 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:15.644 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b85 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2019-05-02 09:28:15.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b86 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.6µs " +"2019-05-02 09:28:15.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b87 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2019-05-02 09:28:15.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b88 Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs" +"2019-05-02 09:28:15.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.8µs " +"2019-05-02 09:28:15.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174µs " +"2019-05-02 09:28:15.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8b Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:15.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8c Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:16.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8d Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:16.145 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b8e Sending msg of 28 bytes to 3 on channel testchainid took 30.6µs" +"2019-05-02 09:28:16.145 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b8f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.3µs " +"2019-05-02 09:28:16.255 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1b90 No inactive chains to try to replicate" +"2019-05-02 09:28:16.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b91 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +"2019-05-02 09:28:16.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.5µs " +"2019-05-02 09:28:16.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 212.5µs " +"2019-05-02 09:28:16.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b94 Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +"2019-05-02 09:28:16.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b95 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:16.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b96 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:16.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b97 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:16.644 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b98 Sending msg of 28 bytes to 3 on channel testchainid took 110.8µs" +"2019-05-02 09:28:16.645 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 596.5µs " +"2019-05-02 09:28:16.921 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9a Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +"2019-05-02 09:28:16.921 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9b Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +"2019-05-02 09:28:16.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.9µs " +"2019-05-02 09:28:16.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.5µs " +"2019-05-02 09:28:16.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9e Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:16.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9f Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:17.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba0 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:17.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba1 Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +"2019-05-02 09:28:17.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.3µs " +"2019-05-02 09:28:17.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba3 Sending msg of 28 bytes to 3 on channel businesschannel took 38.4µs" +"2019-05-02 09:28:17.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba4 Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" +"2019-05-02 09:28:17.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.6µs " +"2019-05-02 09:28:17.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.9µs " +"2019-05-02 09:28:17.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba7 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:17.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba8 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:17.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba9 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:17.648 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1baa Sending msg of 28 bytes to 3 on channel testchainid took 30.3µs" +"2019-05-02 09:28:17.649 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.4µs " +"2019-05-02 09:28:17.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bac Sending msg of 28 bytes to 2 on channel businesschannel took 85.4µs" +"2019-05-02 09:28:17.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bad Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +"2019-05-02 09:28:17.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.8µs " +"2019-05-02 09:28:17.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 387.1µs " +"2019-05-02 09:28:17.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb0 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:17.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb1 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:18.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:18.145 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb3 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" +"2019-05-02 09:28:18.146 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174µs " +"2019-05-02 09:28:18.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb5 Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +"2019-05-02 09:28:18.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +"2019-05-02 09:28:18.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.3µs " +"2019-05-02 09:28:18.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.8µs " +"2019-05-02 09:28:18.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb9 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:18.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bba Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:18.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bbb Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:18.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbc Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2019-05-02 09:28:18.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " +"2019-05-02 09:28:18.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbe Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +"2019-05-02 09:28:18.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbf Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +"2019-05-02 09:28:18.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195µs " +"2019-05-02 09:28:18.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.9µs " +"2019-05-02 09:28:18.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc2 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:18.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc3 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:19.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:19.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc5 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2019-05-02 09:28:19.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.4µs " +"2019-05-02 09:28:19.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc7 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +"2019-05-02 09:28:19.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc8 Sending msg of 28 bytes to 3 on channel businesschannel took 168.2µs" +"2019-05-02 09:28:19.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 483.3µs " +"2019-05-02 09:28:19.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 409.5µs " +"2019-05-02 09:28:19.430 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcb Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:19.431 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcc Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:19.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcd Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:19.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bce Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +"2019-05-02 09:28:19.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bcf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " +"2019-05-02 09:28:19.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 223.1µs " +"2019-05-02 09:28:19.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd1 Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +"2019-05-02 09:28:19.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd2 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +"2019-05-02 09:28:19.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.2µs " +"2019-05-02 09:28:19.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd4 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:19.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd5 Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:20.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd6 Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:20.147 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd7 Sending msg of 28 bytes to 3 on channel testchainid took 98.3µs" +"2019-05-02 09:28:20.148 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 428µs " +"2019-05-02 09:28:20.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd9 Sending msg of 28 bytes to 2 on channel businesschannel took 58.8µs" +"2019-05-02 09:28:20.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bda Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +"2019-05-02 09:28:20.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.6µs " +"2019-05-02 09:28:20.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 480µs " +"2019-05-02 09:28:20.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bdd Received message from orderer1.example.com(172.18.0.4:44256): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:20.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bde Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-05-02 09:28:20.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bdf Received message from orderer2.example.com(172.18.0.3:56182): ConsensusRequest for channel testchainid with payload of size 28" +"2019-05-02 09:28:20.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be0 Sending msg of 28 bytes to 3 on channel testchainid took 49.1µs" +"2019-05-02 09:28:20.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.4µs " diff --git a/hyperledger_fabric/latest/raft/logs/dev_peer0.log b/hyperledger_fabric/latest/raft/logs/dev_peer0.log index bd17b7da..2914c438 100644 --- a/hyperledger_fabric/latest/raft/logs/dev_peer0.log +++ b/hyperledger_fabric/latest/raft/logs/dev_peer0.log @@ -1,51 +1,51 @@ -"2019-05-02 01:30:33.052 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" -"2019-05-02 01:30:33.053 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" -"2019-05-02 01:30:33.053 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for peer.BCCSP.Default setting to string SW" -"2019-05-02 01:30:33.054 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[string]interface{} value for peer.BCCSP.SW" -"2019-05-02 01:30:33.055 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" -"2019-05-02 01:30:33.056 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" -"2019-05-02 01:30:33.057 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 256" -"2019-05-02 01:30:33.057 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for peer.BCCSP.SW.Security setting to int 256" -"2019-05-02 01:30:33.058 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" -"2019-05-02 01:30:33.058 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" -"2019-05-02 01:30:33.058 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " -"2019-05-02 01:30:33.059 UTC [viperutil] getKeysRecursively -> DEBU 00c Found map[string]interface{} value for peer.BCCSP.PKCS11" -"2019-05-02 01:30:33.060 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " -"2019-05-02 01:30:33.061 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Hash setting to " -"2019-05-02 01:30:33.063 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " -"2019-05-02 01:30:33.064 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Security setting to " -"2019-05-02 01:30:33.065 UTC [viperutil] getKeysRecursively -> DEBU 011 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" -"2019-05-02 01:30:33.067 UTC [viperutil] unmarshalJSON -> DEBU 012 Unmarshal JSON: value is not a string: " -"2019-05-02 01:30:33.068 UTC [viperutil] getKeysRecursively -> DEBU 013 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " -"2019-05-02 01:30:33.069 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: " -"2019-05-02 01:30:33.071 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for peer.BCCSP.PKCS11.Library setting to " -"2019-05-02 01:30:33.071 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: " -"2019-05-02 01:30:33.072 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.Label setting to " -"2019-05-02 01:30:33.072 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: " -"2019-05-02 01:30:33.074 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.PKCS11.Pin setting to " -"2019-05-02 01:30:33.074 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" -"2019-05-02 01:30:33.079 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" -"2019-05-02 01:30:33.079 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" -"2019-05-02 01:30:33.079 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" -"2019-05-02 01:30:33.095 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" -"2019-05-02 01:30:33.104 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" -"2019-05-02 01:30:33.117 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" -"2019-05-02 01:30:33.125 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" -"2019-05-02 01:30:33.129 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" -"2019-05-02 01:30:33.132 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" -"2019-05-02 01:30:33.134 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" -"2019-05-02 01:30:33.135 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" -"2019-05-02 01:30:33.143 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" -"2019-05-02 01:30:33.151 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" -"2019-05-02 01:30:33.155 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" -"2019-05-02 01:30:33.155 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" -"2019-05-02 01:30:33.158 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" -"2019-05-02 01:30:33.165 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" -"2019-05-02 01:30:33.191 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" -"2019-05-02 01:30:33.192 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" -"2019-05-02 01:30:33.193 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" -"2019-05-02 01:30:33.193 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" -"2019-05-02 01:30:33.194 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:08.750 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" +"2019-05-02 09:27:08.752 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +"2019-05-02 09:27:08.752 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for peer.BCCSP.Default setting to string SW" +"2019-05-02 09:27:08.752 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[string]interface{} value for peer.BCCSP.SW" +"2019-05-02 09:27:08.753 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +"2019-05-02 09:27:08.753 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" +"2019-05-02 09:27:08.753 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 256" +"2019-05-02 09:27:08.753 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for peer.BCCSP.SW.Security setting to int 256" +"2019-05-02 09:27:08.754 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" +"2019-05-02 09:27:08.754 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" +"2019-05-02 09:27:08.754 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " +"2019-05-02 09:27:08.755 UTC [viperutil] getKeysRecursively -> DEBU 00c Found map[string]interface{} value for peer.BCCSP.PKCS11" +"2019-05-02 09:27:08.756 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " +"2019-05-02 09:27:08.756 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Pin setting to " +"2019-05-02 09:27:08.757 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " +"2019-05-02 09:27:08.758 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Hash setting to " +"2019-05-02 09:27:08.758 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: " +"2019-05-02 09:27:08.759 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Security setting to " +"2019-05-02 09:27:08.759 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" +"2019-05-02 09:27:08.759 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: " +"2019-05-02 09:27:08.760 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " +"2019-05-02 09:27:08.760 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: " +"2019-05-02 09:27:08.761 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.Library setting to " +"2019-05-02 09:27:08.762 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: " +"2019-05-02 09:27:08.762 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.PKCS11.Label setting to " +"2019-05-02 09:27:08.762 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" +"2019-05-02 09:27:08.769 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" +"2019-05-02 09:27:08.769 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" +"2019-05-02 09:27:08.769 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" +"2019-05-02 09:27:08.773 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" +"2019-05-02 09:27:08.777 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" +"2019-05-02 09:27:08.782 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" +"2019-05-02 09:27:08.785 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" +"2019-05-02 09:27:08.789 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" +"2019-05-02 09:27:08.791 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" +"2019-05-02 09:27:08.792 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" +"2019-05-02 09:27:08.793 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" +"2019-05-02 09:27:08.796 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" +"2019-05-02 09:27:08.799 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" +"2019-05-02 09:27:08.800 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" +"2019-05-02 09:27:08.800 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" +"2019-05-02 09:27:08.801 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" +"2019-05-02 09:27:08.804 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" +"2019-05-02 09:27:08.812 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" +"2019-05-02 09:27:08.812 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" +"2019-05-02 09:27:08.812 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" +"2019-05-02 09:27:08.813 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" +"2019-05-02 09:27:08.814 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -60,7 +60,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:33.194 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:08.815 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -74,7 +74,7 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:33.194 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:08.816 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -88,8 +88,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE-----" -"2019-05-02 01:30:33.214 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." -"2019-05-02 01:30:33.234 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:08.819 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." +"2019-05-02 09:27:08.823 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -103,9 +103,9 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE-----" -"2019-05-02 01:30:33.237 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" -"2019-05-02 01:30:33.240 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" -"2019-05-02 01:30:33.241 UTC [nodeCmd] serve -> INFO 037 Starting peer: +"2019-05-02 09:27:08.824 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +"2019-05-02 09:27:08.825 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" +"2019-05-02 09:27:08.825 UTC [nodeCmd] serve -> INFO 037 Starting peer: Version: 2.0.0 Commit SHA: development build Go version: go1.12.4 @@ -114,74 +114,74 @@ whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig Base Docker Namespace: hyperledger Base Docker Label: org.hyperledger.fabric Docker Namespace: hyperledger" -"2019-05-02 01:30:33.242 UTC [peer] getLocalAddress -> INFO 038 Auto-detected peer address: 192.168.240.7:7051" -"2019-05-02 01:30:33.243 UTC [peer] getLocalAddress -> INFO 039 Returning peer0.org1.example.com:7051" -"2019-05-02 01:30:33.255 UTC [msp] GetDefaultSigningIdentity -> DEBU 03a Obtaining default signing identity" -"2019-05-02 01:30:33.255 UTC [msp.identity] Sign -> DEBU 03b Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " -"2019-05-02 01:30:33.255 UTC [msp.identity] Sign -> DEBU 03c Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " -"2019-05-02 01:30:33.284 UTC [ledgermgmt] initialize -> INFO 03d Initializing ledger mgmt" -"2019-05-02 01:30:33.285 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03e CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" -"2019-05-02 01:30:33.285 UTC [kvledger.util] logDirStatus -> DEBU 03f Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" -"2019-05-02 01:30:33.290 UTC [kvledger.util] logDirStatus -> DEBU 040 After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" -"2019-05-02 01:30:33.325 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" -"2019-05-02 01:30:33.325 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" -"2019-05-02 01:30:33.325 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" -"2019-05-02 01:30:33.369 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" -"2019-05-02 01:30:33.370 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" -"2019-05-02 01:30:33.372 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" -"2019-05-02 01:30:33.423 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 047 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" -"2019-05-02 01:30:33.424 UTC [kvledger.util] CreateDirIfMissing -> DEBU 048 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" -"2019-05-02 01:30:33.424 UTC [kvledger.util] logDirStatus -> DEBU 049 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" -"2019-05-02 01:30:33.424 UTC [kvledger.util] logDirStatus -> DEBU 04a After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" -"2019-05-02 01:30:33.441 UTC [confighistory] newDBProvider -> DEBU 04b Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" -"2019-05-02 01:30:33.441 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" -"2019-05-02 01:30:33.442 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" -"2019-05-02 01:30:33.442 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" -"2019-05-02 01:30:33.480 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" -"2019-05-02 01:30:33.482 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" -"2019-05-02 01:30:33.483 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" -"2019-05-02 01:30:33.493 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 052 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" -"2019-05-02 01:30:33.493 UTC [kvledger.util] CreateDirIfMissing -> DEBU 053 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" -"2019-05-02 01:30:33.494 UTC [kvledger.util] logDirStatus -> DEBU 054 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" -"2019-05-02 01:30:33.494 UTC [kvledger.util] logDirStatus -> DEBU 055 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" -"2019-05-02 01:30:33.505 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 056 Recovering under construction ledger" -"2019-05-02 01:30:33.506 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 057 No under construction ledger found. Quitting recovery" -"2019-05-02 01:30:33.507 UTC [ledgermgmt] initialize -> INFO 058 ledger mgmt initialized" -"2019-05-02 01:30:33.508 UTC [lifecycle] InitializeLocalChaincodes -> INFO 059 Initialized lifecycle cache with 0 already installed chaincodes" -"2019-05-02 01:30:33.530 UTC [nodeCmd] serve -> INFO 05a Starting peer with TLS enabled" -"2019-05-02 01:30:33.546 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05b Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" -"2019-05-02 01:30:33.547 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05c Exit with ccEndpoint: peer0.org1.example.com:7052" -"2019-05-02 01:30:33.560 UTC [inproccontroller] Register -> DEBU 05d Registering chaincode instance: lscc:2.0.0" -"2019-05-02 01:30:33.561 UTC [sccapi] registerSysCC -> INFO 05e system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" -"2019-05-02 01:30:33.562 UTC [inproccontroller] Register -> DEBU 05f Registering chaincode instance: cscc:2.0.0" -"2019-05-02 01:30:33.562 UTC [sccapi] registerSysCC -> INFO 060 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" -"2019-05-02 01:30:33.563 UTC [inproccontroller] Register -> DEBU 061 Registering chaincode instance: qscc:2.0.0" -"2019-05-02 01:30:33.565 UTC [sccapi] registerSysCC -> INFO 062 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" -"2019-05-02 01:30:33.566 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: _lifecycle:2.0.0" -"2019-05-02 01:30:33.567 UTC [sccapi] registerSysCC -> INFO 064 system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" -"2019-05-02 01:30:33.573 UTC [nodeCmd] serve -> DEBU 065 Running peer" -"2019-05-02 01:30:33.574 UTC [msp] GetDefaultSigningIdentity -> DEBU 066 Obtaining default signing identity" -"2019-05-02 01:30:33.575 UTC [viperutil] getKeysRecursively -> DEBU 067 Found map[string]interface{} value for peer.handlers" -"2019-05-02 01:30:33.576 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[string]interface{} value for peer.handlers.validators" -"2019-05-02 01:30:33.576 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for peer.handlers.validators.vscc" -"2019-05-02 01:30:33.581 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" -"2019-05-02 01:30:33.582 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" -"2019-05-02 01:30:33.582 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: " -"2019-05-02 01:30:33.583 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for peer.handlers.validators.vscc.library setting to " -"2019-05-02 01:30:33.584 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" -"2019-05-02 01:30:33.584 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" -"2019-05-02 01:30:33.585 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" -"2019-05-02 01:30:33.585 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" -"2019-05-02 01:30:33.586 UTC [viperutil] getKeysRecursively -> DEBU 072 Found map[string]interface{} value for peer.handlers.endorsers" -"2019-05-02 01:30:33.586 UTC [viperutil] getKeysRecursively -> DEBU 073 Found map[string]interface{} value for peer.handlers.endorsers.escc" -"2019-05-02 01:30:33.587 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" -"2019-05-02 01:30:33.588 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" -"2019-05-02 01:30:33.589 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: " -"2019-05-02 01:30:33.591 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for peer.handlers.endorsers.escc.library setting to " -"2019-05-02 01:30:33.591 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 078 map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" -"2019-05-02 01:30:33.606 UTC [gossip.service] func1 -> INFO 079 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" -"2019-05-02 01:30:33.610 UTC [msp] DeserializeIdentity -> DEBU 07a Obtaining identity" -"2019-05-02 01:30:33.611 UTC [msp.identity] newIdentity -> DEBU 07b Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:08.826 UTC [peer] getLocalAddress -> INFO 038 Auto-detected peer address: 172.18.0.7:7051" +"2019-05-02 09:27:08.826 UTC [peer] getLocalAddress -> INFO 039 Returning peer0.org1.example.com:7051" +"2019-05-02 09:27:08.841 UTC [msp] GetDefaultSigningIdentity -> DEBU 03a Obtaining default signing identity" +"2019-05-02 09:27:08.842 UTC [msp.identity] Sign -> DEBU 03b Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +"2019-05-02 09:27:08.842 UTC [msp.identity] Sign -> DEBU 03c Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +"2019-05-02 09:27:08.844 UTC [ledgermgmt] initialize -> INFO 03d Initializing ledger mgmt" +"2019-05-02 09:27:08.844 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03e CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" +"2019-05-02 09:27:08.844 UTC [kvledger.util] logDirStatus -> DEBU 03f Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" +"2019-05-02 09:27:08.844 UTC [kvledger.util] logDirStatus -> DEBU 040 After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" +"2019-05-02 09:27:08.882 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" +"2019-05-02 09:27:08.882 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" +"2019-05-02 09:27:08.883 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" +"2019-05-02 09:27:08.899 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" +"2019-05-02 09:27:08.901 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" +"2019-05-02 09:27:08.901 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" +"2019-05-02 09:27:08.924 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 047 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" +"2019-05-02 09:27:08.924 UTC [kvledger.util] CreateDirIfMissing -> DEBU 048 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" +"2019-05-02 09:27:08.924 UTC [kvledger.util] logDirStatus -> DEBU 049 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" +"2019-05-02 09:27:08.925 UTC [kvledger.util] logDirStatus -> DEBU 04a After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" +"2019-05-02 09:27:08.953 UTC [confighistory] newDBProvider -> DEBU 04b Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" +"2019-05-02 09:27:08.953 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" +"2019-05-02 09:27:08.953 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" +"2019-05-02 09:27:08.953 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" +"2019-05-02 09:27:08.966 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" +"2019-05-02 09:27:08.966 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" +"2019-05-02 09:27:08.967 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" +"2019-05-02 09:27:08.979 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 052 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" +"2019-05-02 09:27:08.979 UTC [kvledger.util] CreateDirIfMissing -> DEBU 053 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" +"2019-05-02 09:27:08.979 UTC [kvledger.util] logDirStatus -> DEBU 054 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" +"2019-05-02 09:27:08.979 UTC [kvledger.util] logDirStatus -> DEBU 055 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" +"2019-05-02 09:27:08.994 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 056 Recovering under construction ledger" +"2019-05-02 09:27:08.994 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 057 No under construction ledger found. Quitting recovery" +"2019-05-02 09:27:08.995 UTC [ledgermgmt] initialize -> INFO 058 ledger mgmt initialized" +"2019-05-02 09:27:08.995 UTC [lifecycle] InitializeLocalChaincodes -> INFO 059 Initialized lifecycle cache with 0 already installed chaincodes" +"2019-05-02 09:27:09.018 UTC [nodeCmd] serve -> INFO 05a Starting peer with TLS enabled" +"2019-05-02 09:27:09.027 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05b Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +"2019-05-02 09:27:09.027 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05c Exit with ccEndpoint: peer0.org1.example.com:7052" +"2019-05-02 09:27:09.050 UTC [inproccontroller] Register -> DEBU 05d Registering chaincode instance: lscc:2.0.0" +"2019-05-02 09:27:09.050 UTC [sccapi] registerSysCC -> INFO 05e system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +"2019-05-02 09:27:09.050 UTC [inproccontroller] Register -> DEBU 05f Registering chaincode instance: cscc:2.0.0" +"2019-05-02 09:27:09.050 UTC [sccapi] registerSysCC -> INFO 060 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +"2019-05-02 09:27:09.052 UTC [inproccontroller] Register -> DEBU 061 Registering chaincode instance: qscc:2.0.0" +"2019-05-02 09:27:09.052 UTC [sccapi] registerSysCC -> INFO 062 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +"2019-05-02 09:27:09.052 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: _lifecycle:2.0.0" +"2019-05-02 09:27:09.053 UTC [sccapi] registerSysCC -> INFO 064 system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +"2019-05-02 09:27:09.053 UTC [nodeCmd] serve -> DEBU 065 Running peer" +"2019-05-02 09:27:09.054 UTC [msp] GetDefaultSigningIdentity -> DEBU 066 Obtaining default signing identity" +"2019-05-02 09:27:09.054 UTC [viperutil] getKeysRecursively -> DEBU 067 Found map[string]interface{} value for peer.handlers" +"2019-05-02 09:27:09.055 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[string]interface{} value for peer.handlers.validators" +"2019-05-02 09:27:09.055 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for peer.handlers.validators.vscc" +"2019-05-02 09:27:09.057 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +"2019-05-02 09:27:09.058 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" +"2019-05-02 09:27:09.058 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: " +"2019-05-02 09:27:09.058 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for peer.handlers.validators.vscc.library setting to " +"2019-05-02 09:27:09.059 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" +"2019-05-02 09:27:09.059 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" +"2019-05-02 09:27:09.060 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" +"2019-05-02 09:27:09.061 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" +"2019-05-02 09:27:09.061 UTC [viperutil] getKeysRecursively -> DEBU 072 Found map[string]interface{} value for peer.handlers.endorsers" +"2019-05-02 09:27:09.061 UTC [viperutil] getKeysRecursively -> DEBU 073 Found map[string]interface{} value for peer.handlers.endorsers.escc" +"2019-05-02 09:27:09.062 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +"2019-05-02 09:27:09.062 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" +"2019-05-02 09:27:09.063 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: " +"2019-05-02 09:27:09.064 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for peer.handlers.endorsers.escc.library setting to " +"2019-05-02 09:27:09.068 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 078 map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" +"2019-05-02 09:27:09.080 UTC [gossip.service] func1 -> INFO 079 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +"2019-05-02 09:27:09.086 UTC [msp] DeserializeIdentity -> DEBU 07a Obtaining identity" +"2019-05-02 09:27:09.087 UTC [msp.identity] newIdentity -> DEBU 07b Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -195,24 +195,24 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE-----" -"2019-05-02 01:30:33.612 UTC [msp] Validate -> DEBU 07c MSP Org1MSP validating identity" -"2019-05-02 01:30:33.613 UTC [gossip.discovery] periodicalSendAlive -> DEBU 07d Sleeping 5s" -"2019-05-02 01:30:33.613 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 07e Sleeping 25s" -"2019-05-02 01:30:33.613 UTC [gossip.gossip] NewGossipService -> INFO 07f Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " -"2019-05-02 01:30:33.614 UTC [msp.identity] Sign -> DEBU 080 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:30:33.614 UTC [msp.identity] Sign -> DEBU 081 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " -"2019-05-02 01:30:33.614 UTC [gossip.pull] Add -> DEBU 082 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" -"2019-05-02 01:30:33.614 UTC [gossip.gossip] start -> INFO 083 Gossip instance peer0.org1.example.com:7051 started" -"2019-05-02 01:30:33.615 UTC [gossip.gossip] syncDiscovery -> DEBU 084 Entering discovery sync with interval 4s" -"2019-05-02 01:30:33.615 UTC [msp.identity] Sign -> DEBU 085 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:30:33.615 UTC [msp.identity] Sign -> DEBU 086 Sign: digest: 87DC3B0FD0CDF32FEECEBDF17BDD8C231EEEAD76AD06D2152F80F14FACF21E24 " -"2019-05-02 01:30:33.615 UTC [msp.identity] Sign -> DEBU 087 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:33.615 UTC [msp.identity] Sign -> DEBU 088 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:33.616 UTC [gossip.discovery] Connect -> DEBU 089 Skipping connecting to myself" -"2019-05-02 01:30:33.617 UTC [chaincode] LaunchConfig -> DEBU 08a launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -"2019-05-02 01:30:33.618 UTC [chaincode] Start -> DEBU 08b start container: lscc:2.0.0" -"2019-05-02 01:30:33.618 UTC [chaincode] Start -> DEBU 08c start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -"2019-05-02 01:30:33.619 UTC [chaincode] Start -> DEBU 08d start container with env: +"2019-05-02 09:27:09.088 UTC [msp] Validate -> DEBU 07c MSP Org1MSP validating identity" +"2019-05-02 09:27:09.089 UTC [gossip.discovery] periodicalSendAlive -> DEBU 07d Sleeping 5s" +"2019-05-02 09:27:09.089 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 07e Sleeping 25s" +"2019-05-02 09:27:09.090 UTC [gossip.gossip] NewGossipService -> INFO 07f Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +"2019-05-02 09:27:09.092 UTC [msp.identity] Sign -> DEBU 080 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:09.092 UTC [msp.identity] Sign -> DEBU 081 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " +"2019-05-02 09:27:09.094 UTC [gossip.pull] Add -> DEBU 082 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" +"2019-05-02 09:27:09.095 UTC [gossip.gossip] start -> INFO 083 Gossip instance peer0.org1.example.com:7051 started" +"2019-05-02 09:27:09.095 UTC [gossip.gossip] syncDiscovery -> DEBU 084 Entering discovery sync with interval 4s" +"2019-05-02 09:27:09.095 UTC [msp.identity] Sign -> DEBU 085 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:09.095 UTC [msp.identity] Sign -> DEBU 086 Sign: digest: 27FF9427800FE3DD452432775CD6BAEFC9CEBA33A76F5BBE04EC5B74295D5EDF " +"2019-05-02 09:27:09.096 UTC [msp.identity] Sign -> DEBU 087 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:09.096 UTC [msp.identity] Sign -> DEBU 088 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:09.096 UTC [gossip.discovery] Connect -> DEBU 089 Skipping connecting to myself" +"2019-05-02 09:27:09.098 UTC [chaincode] LaunchConfig -> DEBU 08a launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-05-02 09:27:09.098 UTC [chaincode] Start -> DEBU 08b start container: lscc:2.0.0" +"2019-05-02 09:27:09.098 UTC [chaincode] Start -> DEBU 08c start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-05-02 09:27:09.098 UTC [chaincode] Start -> DEBU 08d start container with env: CORE_CHAINCODE_LOGGING_LEVEL=info CORE_CHAINCODE_LOGGING_SHIM=warning CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} @@ -221,28 +221,30 @@ whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -"2019-05-02 01:30:33.621 UTC [container] lockContainer -> DEBU 08e waiting for container(lscc:2.0.0) lock" -"2019-05-02 01:30:33.621 UTC [container] lockContainer -> DEBU 08f got container (lscc:2.0.0) lock" -"2019-05-02 01:30:33.622 UTC [inproccontroller] getInstance -> DEBU 090 chaincode instance created for lscc:2.0.0" -"2019-05-02 01:30:33.622 UTC [inproccontroller] func2 -> DEBU 091 chaincode-support started for lscc:2.0.0" -"2019-05-02 01:30:33.623 UTC [inproccontroller] func1 -> DEBU 092 chaincode started for lscc:2.0.0" -"2019-05-02 01:30:33.623 UTC [chaincode] handleMessage -> DEBU 093 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -"2019-05-02 01:30:33.623 UTC [chaincode] HandleRegister -> DEBU 094 Received REGISTER in state created" -"2019-05-02 01:30:33.623 UTC [chaincode] Register -> DEBU 095 registered handler complete for chaincode lscc:2.0.0" -"2019-05-02 01:30:33.624 UTC [chaincode] HandleRegister -> DEBU 096 Got REGISTER for chaincodeID = name:"lscc:2.0.0" , sending back REGISTERED" -"2019-05-02 01:30:33.624 UTC [chaincode] HandleRegister -> DEBU 097 Changed state to established for name:"lscc:2.0.0" " -"2019-05-02 01:30:33.624 UTC [chaincode] sendReady -> DEBU 098 sending READY for chaincode name:"lscc:2.0.0" " -"2019-05-02 01:30:33.624 UTC [chaincode] sendReady -> DEBU 099 Changed to state ready for chaincode name:"lscc:2.0.0" " -"2019-05-02 01:30:33.624 UTC [chaincode] Launch -> DEBU 09a launch complete" -"2019-05-02 01:30:33.624 UTC [chaincode] Execute -> DEBU 09b Entry" -"2019-05-02 01:30:33.625 UTC [chaincode] handleMessage -> DEBU 09c [652f1cc0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:33.625 UTC [chaincode] Notify -> DEBU 09d [652f1cc0] notifying Txid:652f1cc0-bac7-419d-891d-111cedf29756, channelID:" -"2019-05-02 01:30:33.625 UTC [chaincode] Execute -> DEBU 09e Exit" -"2019-05-02 01:30:33.625 UTC [sccapi] deploySysCC -> INFO 09f system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" -"2019-05-02 01:30:33.626 UTC [chaincode] LaunchConfig -> DEBU 0a0 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -"2019-05-02 01:30:33.626 UTC [chaincode] Start -> DEBU 0a1 start container: cscc:2.0.0" -"2019-05-02 01:30:33.626 UTC [chaincode] Start -> DEBU 0a2 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -"2019-05-02 01:30:33.626 UTC [chaincode] Start -> DEBU 0a3 start container with env: +"2019-05-02 09:27:09.098 UTC [container] lockContainer -> DEBU 08e waiting for container(lscc:2.0.0) lock" +"2019-05-02 09:27:09.099 UTC [container] lockContainer -> DEBU 08f got container (lscc:2.0.0) lock" +"2019-05-02 09:27:09.099 UTC [inproccontroller] getInstance -> DEBU 090 chaincode instance created for lscc:2.0.0" +"2019-05-02 09:27:09.100 UTC [container] unlockContainer -> DEBU 091 container lock deleted(lscc:2.0.0)" +"2019-05-02 09:27:09.100 UTC [container] lockContainer -> DEBU 094 waiting for container(lscc:2.0.0) lock" +"2019-05-02 09:27:09.100 UTC [inproccontroller] func2 -> DEBU 092 chaincode-support started for lscc:2.0.0" +"2019-05-02 09:27:09.100 UTC [inproccontroller] func1 -> DEBU 093 chaincode started for lscc:2.0.0" +"2019-05-02 09:27:09.100 UTC [chaincode] handleMessage -> DEBU 095 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-05-02 09:27:09.101 UTC [chaincode] HandleRegister -> DEBU 096 Received REGISTER in state created" +"2019-05-02 09:27:09.101 UTC [chaincode] Register -> DEBU 097 registered handler complete for chaincode lscc:2.0.0" +"2019-05-02 09:27:09.101 UTC [chaincode] HandleRegister -> DEBU 098 Got REGISTER for chaincodeID = name:"lscc:2.0.0" , sending back REGISTERED" +"2019-05-02 09:27:09.101 UTC [chaincode] HandleRegister -> DEBU 099 Changed state to established for name:"lscc:2.0.0" " +"2019-05-02 09:27:09.101 UTC [chaincode] sendReady -> DEBU 09a sending READY for chaincode name:"lscc:2.0.0" " +"2019-05-02 09:27:09.102 UTC [chaincode] sendReady -> DEBU 09b Changed to state ready for chaincode name:"lscc:2.0.0" " +"2019-05-02 09:27:09.102 UTC [chaincode] Launch -> DEBU 09c launch complete" +"2019-05-02 09:27:09.102 UTC [chaincode] Execute -> DEBU 09d Entry" +"2019-05-02 09:27:09.102 UTC [chaincode] handleMessage -> DEBU 09e [f4841619] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:09.102 UTC [chaincode] Notify -> DEBU 09f [f4841619] notifying Txid:f4841619-3456-4681-80e9-bff70932f74d, channelID:" +"2019-05-02 09:27:09.105 UTC [chaincode] Execute -> DEBU 0a0 Exit" +"2019-05-02 09:27:09.105 UTC [sccapi] deploySysCC -> INFO 0a1 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-05-02 09:27:09.106 UTC [chaincode] LaunchConfig -> DEBU 0a2 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-05-02 09:27:09.107 UTC [chaincode] Start -> DEBU 0a3 start container: cscc:2.0.0" +"2019-05-02 09:27:09.107 UTC [chaincode] Start -> DEBU 0a4 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-05-02 09:27:09.107 UTC [chaincode] Start -> DEBU 0a5 start container with env: CORE_CHAINCODE_LOGGING_LEVEL=info CORE_CHAINCODE_LOGGING_SHIM=warning CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} @@ -251,35 +253,35 @@ whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -"2019-05-02 01:30:33.622 UTC [container] unlockContainer -> DEBU 0a4 container lock deleted(lscc:2.0.0)" -"2019-05-02 01:30:33.627 UTC [container] lockContainer -> DEBU 0a5 waiting for container(lscc:2.0.0) lock" -"2019-05-02 01:30:33.627 UTC [container] lockContainer -> DEBU 0a6 waiting for container(cscc:2.0.0) lock" -"2019-05-02 01:30:33.627 UTC [container] lockContainer -> DEBU 0a7 got container (cscc:2.0.0) lock" -"2019-05-02 01:30:33.627 UTC [inproccontroller] getInstance -> DEBU 0a8 chaincode instance created for cscc:2.0.0" -"2019-05-02 01:30:33.627 UTC [container] unlockContainer -> DEBU 0a9 container lock deleted(cscc:2.0.0)" -"2019-05-02 01:30:33.628 UTC [container] lockContainer -> DEBU 0aa waiting for container(cscc:2.0.0) lock" -"2019-05-02 01:30:33.628 UTC [container] lockContainer -> DEBU 0ab got container (cscc:2.0.0) lock" -"2019-05-02 01:30:33.628 UTC [container] unlockContainer -> DEBU 0ac container lock deleted(cscc:2.0.0)" -"2019-05-02 01:30:33.628 UTC [inproccontroller] func2 -> DEBU 0ad chaincode-support started for cscc:2.0.0" -"2019-05-02 01:30:33.628 UTC [inproccontroller] func1 -> DEBU 0ae chaincode started for cscc:2.0.0" -"2019-05-02 01:30:33.628 UTC [chaincode] handleMessage -> DEBU 0af [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -"2019-05-02 01:30:33.629 UTC [chaincode] HandleRegister -> DEBU 0b0 Received REGISTER in state created" -"2019-05-02 01:30:33.629 UTC [chaincode] Register -> DEBU 0b1 registered handler complete for chaincode cscc:2.0.0" -"2019-05-02 01:30:33.629 UTC [chaincode] HandleRegister -> DEBU 0b2 Got REGISTER for chaincodeID = name:"cscc:2.0.0" , sending back REGISTERED" -"2019-05-02 01:30:33.629 UTC [chaincode] HandleRegister -> DEBU 0b3 Changed state to established for name:"cscc:2.0.0" " -"2019-05-02 01:30:33.629 UTC [chaincode] sendReady -> DEBU 0b4 sending READY for chaincode name:"cscc:2.0.0" " -"2019-05-02 01:30:33.629 UTC [chaincode] sendReady -> DEBU 0b5 Changed to state ready for chaincode name:"cscc:2.0.0" " -"2019-05-02 01:30:33.629 UTC [chaincode] Launch -> DEBU 0b6 launch complete" -"2019-05-02 01:30:33.629 UTC [chaincode] Execute -> DEBU 0b7 Entry" -"2019-05-02 01:30:33.629 UTC [cscc] Init -> INFO 0b8 Init CSCC" -"2019-05-02 01:30:33.630 UTC [chaincode] handleMessage -> DEBU 0b9 [bd75d9cf] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:33.630 UTC [chaincode] Notify -> DEBU 0ba [bd75d9cf] notifying Txid:bd75d9cf-62f5-4989-90ef-97287fa18c8f, channelID:" -"2019-05-02 01:30:33.630 UTC [chaincode] Execute -> DEBU 0bb Exit" -"2019-05-02 01:30:33.630 UTC [sccapi] deploySysCC -> INFO 0bc system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" -"2019-05-02 01:30:33.634 UTC [chaincode] LaunchConfig -> DEBU 0bd launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -"2019-05-02 01:30:33.634 UTC [chaincode] Start -> DEBU 0be start container: qscc:2.0.0" -"2019-05-02 01:30:33.635 UTC [chaincode] Start -> DEBU 0bf start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -"2019-05-02 01:30:33.635 UTC [chaincode] Start -> DEBU 0c0 start container with env: +"2019-05-02 09:27:09.107 UTC [container] lockContainer -> DEBU 0a6 waiting for container(cscc:2.0.0) lock" +"2019-05-02 09:27:09.107 UTC [container] lockContainer -> DEBU 0a7 got container (cscc:2.0.0) lock" +"2019-05-02 09:27:09.107 UTC [inproccontroller] getInstance -> DEBU 0a8 chaincode instance created for cscc:2.0.0" +"2019-05-02 09:27:09.107 UTC [container] unlockContainer -> DEBU 0a9 container lock deleted(cscc:2.0.0)" +"2019-05-02 09:27:09.107 UTC [container] lockContainer -> DEBU 0aa waiting for container(cscc:2.0.0) lock" +"2019-05-02 09:27:09.108 UTC [container] lockContainer -> DEBU 0ab got container (cscc:2.0.0) lock" +"2019-05-02 09:27:09.108 UTC [container] unlockContainer -> DEBU 0ac container lock deleted(cscc:2.0.0)" +"2019-05-02 09:27:09.109 UTC [inproccontroller] func2 -> DEBU 0ad chaincode-support started for cscc:2.0.0" +"2019-05-02 09:27:09.109 UTC [inproccontroller] func1 -> DEBU 0ae chaincode started for cscc:2.0.0" +"2019-05-02 09:27:09.109 UTC [chaincode] handleMessage -> DEBU 0af [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-05-02 09:27:09.110 UTC [chaincode] HandleRegister -> DEBU 0b0 Received REGISTER in state created" +"2019-05-02 09:27:09.110 UTC [chaincode] Register -> DEBU 0b1 registered handler complete for chaincode cscc:2.0.0" +"2019-05-02 09:27:09.110 UTC [chaincode] HandleRegister -> DEBU 0b2 Got REGISTER for chaincodeID = name:"cscc:2.0.0" , sending back REGISTERED" +"2019-05-02 09:27:09.110 UTC [chaincode] HandleRegister -> DEBU 0b3 Changed state to established for name:"cscc:2.0.0" " +"2019-05-02 09:27:09.111 UTC [chaincode] sendReady -> DEBU 0b4 sending READY for chaincode name:"cscc:2.0.0" " +"2019-05-02 09:27:09.114 UTC [chaincode] sendReady -> DEBU 0b5 Changed to state ready for chaincode name:"cscc:2.0.0" " +"2019-05-02 09:27:09.114 UTC [chaincode] Launch -> DEBU 0b6 launch complete" +"2019-05-02 09:27:09.114 UTC [chaincode] Execute -> DEBU 0b7 Entry" +"2019-05-02 09:27:09.114 UTC [cscc] Init -> INFO 0b8 Init CSCC" +"2019-05-02 09:27:09.114 UTC [chaincode] handleMessage -> DEBU 0b9 [93019833] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:09.114 UTC [chaincode] Notify -> DEBU 0ba [93019833] notifying Txid:93019833-420f-4a87-a3e6-963973a4d596, channelID:" +"2019-05-02 09:27:09.114 UTC [chaincode] Execute -> DEBU 0bb Exit" +"2019-05-02 09:27:09.114 UTC [sccapi] deploySysCC -> INFO 0bc system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-05-02 09:27:09.100 UTC [container] lockContainer -> DEBU 0bd got container (lscc:2.0.0) lock" +"2019-05-02 09:27:09.115 UTC [container] unlockContainer -> DEBU 0be container lock deleted(lscc:2.0.0)" +"2019-05-02 09:27:09.117 UTC [chaincode] LaunchConfig -> DEBU 0bf launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-05-02 09:27:09.117 UTC [chaincode] Start -> DEBU 0c0 start container: qscc:2.0.0" +"2019-05-02 09:27:09.117 UTC [chaincode] Start -> DEBU 0c1 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-05-02 09:27:09.118 UTC [chaincode] Start -> DEBU 0c2 start container with env: CORE_CHAINCODE_LOGGING_LEVEL=info CORE_CHAINCODE_LOGGING_SHIM=warning CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} @@ -288,33 +290,29 @@ whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -"2019-05-02 01:30:33.635 UTC [container] lockContainer -> DEBU 0c1 waiting for container(qscc:2.0.0) lock" -"2019-05-02 01:30:33.635 UTC [container] lockContainer -> DEBU 0c2 got container (qscc:2.0.0) lock" -"2019-05-02 01:30:33.635 UTC [inproccontroller] getInstance -> DEBU 0c3 chaincode instance created for qscc:2.0.0" -"2019-05-02 01:30:33.635 UTC [container] unlockContainer -> DEBU 0c4 container lock deleted(qscc:2.0.0)" -"2019-05-02 01:30:33.635 UTC [container] lockContainer -> DEBU 0c5 waiting for container(qscc:2.0.0) lock" -"2019-05-02 01:30:33.635 UTC [container] lockContainer -> DEBU 0c6 got container (qscc:2.0.0) lock" -"2019-05-02 01:30:33.635 UTC [container] unlockContainer -> DEBU 0c7 container lock deleted(qscc:2.0.0)" -"2019-05-02 01:30:33.635 UTC [inproccontroller] func2 -> DEBU 0c8 chaincode-support started for qscc:2.0.0" -"2019-05-02 01:30:33.635 UTC [inproccontroller] func1 -> DEBU 0c9 chaincode started for qscc:2.0.0" -"2019-05-02 01:30:33.635 UTC [chaincode] handleMessage -> DEBU 0ca [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -"2019-05-02 01:30:33.636 UTC [chaincode] HandleRegister -> DEBU 0cb Received REGISTER in state created" -"2019-05-02 01:30:33.636 UTC [chaincode] Register -> DEBU 0cc registered handler complete for chaincode qscc:2.0.0" -"2019-05-02 01:30:33.636 UTC [chaincode] HandleRegister -> DEBU 0cd Got REGISTER for chaincodeID = name:"qscc:2.0.0" , sending back REGISTERED" -"2019-05-02 01:30:33.636 UTC [chaincode] HandleRegister -> DEBU 0ce Changed state to established for name:"qscc:2.0.0" " -"2019-05-02 01:30:33.636 UTC [chaincode] sendReady -> DEBU 0cf sending READY for chaincode name:"qscc:2.0.0" " -"2019-05-02 01:30:33.636 UTC [chaincode] sendReady -> DEBU 0d0 Changed to state ready for chaincode name:"qscc:2.0.0" " -"2019-05-02 01:30:33.637 UTC [chaincode] Launch -> DEBU 0d1 launch complete" -"2019-05-02 01:30:33.637 UTC [chaincode] Execute -> DEBU 0d2 Entry" -"2019-05-02 01:30:33.637 UTC [qscc] Init -> INFO 0d3 Init QSCC" -"2019-05-02 01:30:33.637 UTC [chaincode] handleMessage -> DEBU 0d4 [ce70f4bb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:33.637 UTC [chaincode] Notify -> DEBU 0d5 [ce70f4bb] notifying Txid:ce70f4bb-2c09-4d21-a344-8433c20e846d, channelID:" -"2019-05-02 01:30:33.637 UTC [chaincode] Execute -> DEBU 0d6 Exit" -"2019-05-02 01:30:33.637 UTC [sccapi] deploySysCC -> INFO 0d7 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" -"2019-05-02 01:30:33.638 UTC [chaincode] LaunchConfig -> DEBU 0d8 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -"2019-05-02 01:30:33.638 UTC [chaincode] Start -> DEBU 0d9 start container: _lifecycle:2.0.0" -"2019-05-02 01:30:33.638 UTC [chaincode] Start -> DEBU 0da start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -"2019-05-02 01:30:33.638 UTC [chaincode] Start -> DEBU 0db start container with env: +"2019-05-02 09:27:09.118 UTC [container] lockContainer -> DEBU 0c3 waiting for container(qscc:2.0.0) lock" +"2019-05-02 09:27:09.118 UTC [container] lockContainer -> DEBU 0c4 got container (qscc:2.0.0) lock" +"2019-05-02 09:27:09.118 UTC [inproccontroller] getInstance -> DEBU 0c5 chaincode instance created for qscc:2.0.0" +"2019-05-02 09:27:09.119 UTC [inproccontroller] func2 -> DEBU 0c6 chaincode-support started for qscc:2.0.0" +"2019-05-02 09:27:09.131 UTC [inproccontroller] func1 -> DEBU 0c7 chaincode started for qscc:2.0.0" +"2019-05-02 09:27:09.131 UTC [chaincode] handleMessage -> DEBU 0c8 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-05-02 09:27:09.131 UTC [chaincode] HandleRegister -> DEBU 0c9 Received REGISTER in state created" +"2019-05-02 09:27:09.131 UTC [chaincode] Register -> DEBU 0ca registered handler complete for chaincode qscc:2.0.0" +"2019-05-02 09:27:09.131 UTC [chaincode] HandleRegister -> DEBU 0cb Got REGISTER for chaincodeID = name:"qscc:2.0.0" , sending back REGISTERED" +"2019-05-02 09:27:09.131 UTC [chaincode] HandleRegister -> DEBU 0cc Changed state to established for name:"qscc:2.0.0" " +"2019-05-02 09:27:09.131 UTC [chaincode] sendReady -> DEBU 0cd sending READY for chaincode name:"qscc:2.0.0" " +"2019-05-02 09:27:09.131 UTC [chaincode] sendReady -> DEBU 0ce Changed to state ready for chaincode name:"qscc:2.0.0" " +"2019-05-02 09:27:09.131 UTC [chaincode] Launch -> DEBU 0cf launch complete" +"2019-05-02 09:27:09.131 UTC [chaincode] Execute -> DEBU 0d0 Entry" +"2019-05-02 09:27:09.131 UTC [qscc] Init -> INFO 0d1 Init QSCC" +"2019-05-02 09:27:09.131 UTC [chaincode] handleMessage -> DEBU 0d2 [fd716703] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:09.131 UTC [chaincode] Notify -> DEBU 0d3 [fd716703] notifying Txid:fd716703-bf83-4d5f-9759-1f3a73295ec2, channelID:" +"2019-05-02 09:27:09.131 UTC [chaincode] Execute -> DEBU 0d4 Exit" +"2019-05-02 09:27:09.132 UTC [sccapi] deploySysCC -> INFO 0d5 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-05-02 09:27:09.132 UTC [chaincode] LaunchConfig -> DEBU 0d6 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-05-02 09:27:09.132 UTC [chaincode] Start -> DEBU 0d7 start container: _lifecycle:2.0.0" +"2019-05-02 09:27:09.132 UTC [chaincode] Start -> DEBU 0d8 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-05-02 09:27:09.132 UTC [chaincode] Start -> DEBU 0d9 start container with env: CORE_CHAINCODE_LOGGING_LEVEL=info CORE_CHAINCODE_LOGGING_SHIM=warning CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} @@ -323,43 +321,45 @@ whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -"2019-05-02 01:30:33.639 UTC [container] lockContainer -> DEBU 0dd waiting for container(_lifecycle:2.0.0) lock" -"2019-05-02 01:30:33.639 UTC [container] lockContainer -> DEBU 0dc got container (lscc:2.0.0) lock" -"2019-05-02 01:30:33.639 UTC [container] unlockContainer -> DEBU 0de container lock deleted(lscc:2.0.0)" -"2019-05-02 01:30:33.639 UTC [container] lockContainer -> DEBU 0df got container (_lifecycle:2.0.0) lock" -"2019-05-02 01:30:33.639 UTC [inproccontroller] getInstance -> DEBU 0e0 chaincode instance created for _lifecycle:2.0.0" -"2019-05-02 01:30:33.640 UTC [container] unlockContainer -> DEBU 0e1 container lock deleted(_lifecycle:2.0.0)" -"2019-05-02 01:30:33.640 UTC [inproccontroller] func2 -> DEBU 0e2 chaincode-support started for _lifecycle:2.0.0" -"2019-05-02 01:30:33.640 UTC [inproccontroller] func1 -> DEBU 0e3 chaincode started for _lifecycle:2.0.0" -"2019-05-02 01:30:33.640 UTC [chaincode] handleMessage -> DEBU 0e4 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -"2019-05-02 01:30:33.640 UTC [chaincode] HandleRegister -> DEBU 0e5 Received REGISTER in state created" -"2019-05-02 01:30:33.641 UTC [chaincode] Register -> DEBU 0e6 registered handler complete for chaincode _lifecycle:2.0.0" -"2019-05-02 01:30:33.641 UTC [chaincode] HandleRegister -> DEBU 0e7 Got REGISTER for chaincodeID = name:"_lifecycle:2.0.0" , sending back REGISTERED" -"2019-05-02 01:30:33.641 UTC [chaincode] HandleRegister -> DEBU 0e8 Changed state to established for name:"_lifecycle:2.0.0" " -"2019-05-02 01:30:33.641 UTC [chaincode] sendReady -> DEBU 0e9 sending READY for chaincode name:"_lifecycle:2.0.0" " -"2019-05-02 01:30:33.641 UTC [chaincode] sendReady -> DEBU 0ea Changed to state ready for chaincode name:"_lifecycle:2.0.0" " -"2019-05-02 01:30:33.642 UTC [chaincode] Launch -> DEBU 0eb launch complete" -"2019-05-02 01:30:33.642 UTC [chaincode] Execute -> DEBU 0ec Entry" -"2019-05-02 01:30:33.642 UTC [chaincode] handleMessage -> DEBU 0ed [76024bed] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:33.642 UTC [chaincode] Notify -> DEBU 0ee [76024bed] notifying Txid:76024bed-1439-46b7-b2b4-32506b4d7ff3, channelID:" -"2019-05-02 01:30:33.642 UTC [chaincode] Execute -> DEBU 0ef Exit" -"2019-05-02 01:30:33.643 UTC [sccapi] deploySysCC -> INFO 0f0 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" -"2019-05-02 01:30:33.643 UTC [nodeCmd] serve -> INFO 0f1 Deployed system chaincodes" -"2019-05-02 01:30:33.643 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0f2 Returning []" -"2019-05-02 01:30:33.645 UTC [discovery] NewService -> INFO 0f3 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" -"2019-05-02 01:30:33.645 UTC [nodeCmd] registerDiscoveryService -> INFO 0f4 Discovery service activated" -"2019-05-02 01:30:33.645 UTC [nodeCmd] serve -> INFO 0f5 Starting peer with ID=[peer0.org1.example.com], network ID=[], address=[peer0.org1.example.com:7051]" -"2019-05-02 01:30:33.645 UTC [nodeCmd] serve -> INFO 0f6 Started peer with ID=[peer0.org1.example.com], network ID=[], address=[peer0.org1.example.com:7051]" -"2019-05-02 01:30:33.640 UTC [container] lockContainer -> DEBU 0f7 waiting for container(_lifecycle:2.0.0) lock" -"2019-05-02 01:30:33.645 UTC [container] lockContainer -> DEBU 0f8 got container (_lifecycle:2.0.0) lock" -"2019-05-02 01:30:33.645 UTC [container] unlockContainer -> DEBU 0f9 container lock deleted(_lifecycle:2.0.0)" -"2019-05-02 01:30:34.466 UTC [comm.grpc.server] 1 -> INFO 0fa unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:36.466Z grpc.peer_address=192.168.240.6:44892 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147µs -"2019-05-02 01:30:34.471 UTC [msp.identity] Sign -> DEBU 0fb Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:34.471 UTC [msp.identity] Sign -> DEBU 0fc Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:34.472 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0fd Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.6:44892" -"2019-05-02 01:30:34.476 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0fe Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:44892" -"2019-05-02 01:30:34.476 UTC [msp] DeserializeIdentity -> DEBU 0ff Obtaining identity" -"2019-05-02 01:30:34.477 UTC [msp.identity] newIdentity -> DEBU 100 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:09.119 UTC [container] unlockContainer -> DEBU 0da container lock deleted(qscc:2.0.0)" +"2019-05-02 09:27:09.132 UTC [container] lockContainer -> DEBU 0db waiting for container(qscc:2.0.0) lock" +"2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0dc got container (qscc:2.0.0) lock" +"2019-05-02 09:27:09.133 UTC [container] unlockContainer -> DEBU 0dd container lock deleted(qscc:2.0.0)" +"2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0de waiting for container(_lifecycle:2.0.0) lock" +"2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0df got container (_lifecycle:2.0.0) lock" +"2019-05-02 09:27:09.133 UTC [inproccontroller] getInstance -> DEBU 0e0 chaincode instance created for _lifecycle:2.0.0" +"2019-05-02 09:27:09.133 UTC [container] unlockContainer -> DEBU 0e1 container lock deleted(_lifecycle:2.0.0)" +"2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0e2 waiting for container(_lifecycle:2.0.0) lock" +"2019-05-02 09:27:09.133 UTC [container] lockContainer -> DEBU 0e3 got container (_lifecycle:2.0.0) lock" +"2019-05-02 09:27:09.133 UTC [container] unlockContainer -> DEBU 0e4 container lock deleted(_lifecycle:2.0.0)" +"2019-05-02 09:27:09.133 UTC [inproccontroller] func2 -> DEBU 0e5 chaincode-support started for _lifecycle:2.0.0" +"2019-05-02 09:27:09.133 UTC [inproccontroller] func1 -> DEBU 0e6 chaincode started for _lifecycle:2.0.0" +"2019-05-02 09:27:09.133 UTC [chaincode] handleMessage -> DEBU 0e7 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-05-02 09:27:09.133 UTC [chaincode] HandleRegister -> DEBU 0e8 Received REGISTER in state created" +"2019-05-02 09:27:09.133 UTC [chaincode] Register -> DEBU 0e9 registered handler complete for chaincode _lifecycle:2.0.0" +"2019-05-02 09:27:09.133 UTC [chaincode] HandleRegister -> DEBU 0ea Got REGISTER for chaincodeID = name:"_lifecycle:2.0.0" , sending back REGISTERED" +"2019-05-02 09:27:09.133 UTC [chaincode] HandleRegister -> DEBU 0eb Changed state to established for name:"_lifecycle:2.0.0" " +"2019-05-02 09:27:09.133 UTC [chaincode] sendReady -> DEBU 0ec sending READY for chaincode name:"_lifecycle:2.0.0" " +"2019-05-02 09:27:09.133 UTC [chaincode] sendReady -> DEBU 0ed Changed to state ready for chaincode name:"_lifecycle:2.0.0" " +"2019-05-02 09:27:09.134 UTC [chaincode] Launch -> DEBU 0ee launch complete" +"2019-05-02 09:27:09.134 UTC [chaincode] Execute -> DEBU 0ef Entry" +"2019-05-02 09:27:09.134 UTC [chaincode] handleMessage -> DEBU 0f0 [408a31a2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:09.134 UTC [chaincode] Notify -> DEBU 0f1 [408a31a2] notifying Txid:408a31a2-2689-4f2c-a170-7afbe11d589d, channelID:" +"2019-05-02 09:27:09.134 UTC [chaincode] Execute -> DEBU 0f2 Exit" +"2019-05-02 09:27:09.134 UTC [sccapi] deploySysCC -> INFO 0f3 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-05-02 09:27:09.134 UTC [nodeCmd] serve -> INFO 0f4 Deployed system chaincodes" +"2019-05-02 09:27:09.134 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0f5 Returning []" +"2019-05-02 09:27:09.135 UTC [discovery] NewService -> INFO 0f6 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +"2019-05-02 09:27:09.135 UTC [nodeCmd] registerDiscoveryService -> INFO 0f7 Discovery service activated" +"2019-05-02 09:27:09.135 UTC [nodeCmd] serve -> INFO 0f8 Starting peer with ID=[peer0.org1.example.com], network ID=[], address=[peer0.org1.example.com:7051]" +"2019-05-02 09:27:09.135 UTC [nodeCmd] serve -> INFO 0f9 Started peer with ID=[peer0.org1.example.com], network ID=[], address=[peer0.org1.example.com:7051]" +"2019-05-02 09:27:09.158 UTC [comm.grpc.server] 1 -> INFO 0fa unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:11.156Z grpc.peer_address=172.18.0.6:53162 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=359.2µs +"2019-05-02 09:27:09.161 UTC [msp.identity] Sign -> DEBU 0fb Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:09.162 UTC [msp.identity] Sign -> DEBU 0fc Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:09.162 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0fd Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53162" +"2019-05-02 09:27:09.163 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0fe Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53162" +"2019-05-02 09:27:09.163 UTC [msp] DeserializeIdentity -> DEBU 0ff Obtaining identity" +"2019-05-02 09:27:09.165 UTC [msp.identity] newIdentity -> DEBU 100 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -373,36 +373,36 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE-----" -"2019-05-02 01:30:34.478 UTC [msp] Validate -> DEBU 101 MSP Org1MSP validating identity" -"2019-05-02 01:30:34.479 UTC [grpc] infof -> DEBU 102 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:34.481 UTC [msp.identity] Verify -> DEBU 103 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +"2019-05-02 09:27:09.166 UTC [msp] Validate -> DEBU 101 MSP Org1MSP validating identity" +"2019-05-02 09:27:09.169 UTC [msp.identity] Verify -> DEBU 102 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-05-02 01:30:34.482 UTC [msp.identity] Verify -> DEBU 104 Verify: sig = 00000000 30 45 02 21 00 da c1 32 b7 6c 99 9e f0 f4 e1 0e |0E.!...2.l......| -00000010 ef 7c 8b 4a 6d 60 59 ee b1 56 e4 14 f2 c7 d2 f3 |.|.Jm`Y..V......| -00000020 40 db 97 78 77 02 20 1c 54 4c 65 e9 7d 56 b8 22 |@..xw. .TLe.}V."| -00000030 00 5a 0d f6 83 e9 72 65 d5 7a 68 b1 42 2a 2b 7d |.Z....re.zh.B*+}| -00000040 3c fc be b4 42 90 ec |<...B..|" -"2019-05-02 01:30:34.482 UTC [gossip.comm] authenticateRemotePeer -> DEBU 105 Authenticated 192.168.240.6:44892" -"2019-05-02 01:30:34.482 UTC [gossip.comm] GossipStream -> DEBU 106 Servicing 192.168.240.6:44892" -"2019-05-02 01:30:34.483 UTC [gossip.comm] readFromStream -> DEBU 107 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:34.483 UTC [gossip.comm] func2 -> DEBU 108 Client 192.168.240.6:44892 disconnected" -"2019-05-02 01:30:34.483 UTC [comm.grpc.server] 1 -> INFO 109 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:44.47Z grpc.peer_address=192.168.240.6:44892 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.3636ms -"2019-05-02 01:30:34.484 UTC [gossip.comm] writeToStream -> DEBU 10a Closing writing to stream" -"2019-05-02 01:30:34.486 UTC [comm.grpc.server] 1 -> INFO 10b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:36.486Z grpc.peer_address=192.168.240.6:44894 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.9µs -"2019-05-02 01:30:34.489 UTC [msp.identity] Sign -> DEBU 10c Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:34.489 UTC [msp.identity] Sign -> DEBU 10d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:34.490 UTC [gossip.comm] authenticateRemotePeer -> DEBU 10e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.6:44894" -"2019-05-02 01:30:34.490 UTC [gossip.comm] authenticateRemotePeer -> DEBU 10f Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:44894" -"2019-05-02 01:30:34.495 UTC [msp.identity] Verify -> DEBU 110 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +"2019-05-02 09:27:09.170 UTC [msp.identity] Verify -> DEBU 103 Verify: sig = 00000000 30 44 02 20 2f 10 db 70 91 60 35 8b 4e 58 4a e5 |0D. /..p.`5.NXJ.| +00000010 90 69 22 ed 77 7a 7e 5d 36 3b c6 ec b9 31 47 41 |.i".wz~]6;...1GA| +00000020 0f a8 00 41 02 20 13 db 80 56 45 9d 59 80 4c 67 |...A. ...VE.Y.Lg| +00000030 37 52 0e 54 7d b7 70 c5 22 f4 db 8a 54 18 e4 b9 |7R.T}.p."...T...| +00000040 c1 e7 5d fe e7 dd |..]...|" +"2019-05-02 09:27:09.171 UTC [gossip.comm] authenticateRemotePeer -> DEBU 104 Authenticated 172.18.0.6:53162" +"2019-05-02 09:27:09.172 UTC [gossip.comm] GossipStream -> DEBU 105 Servicing 172.18.0.6:53162" +"2019-05-02 09:27:09.174 UTC [gossip.comm] readFromStream -> DEBU 106 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:09.174 UTC [gossip.comm] func2 -> DEBU 107 Client 172.18.0.6:53162 disconnected" +"2019-05-02 09:27:09.174 UTC [comm.grpc.server] 1 -> INFO 108 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:19.161Z grpc.peer_address=172.18.0.6:53162 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.0584ms +"2019-05-02 09:27:09.175 UTC [gossip.comm] writeToStream -> DEBU 109 Closing writing to stream" +"2019-05-02 09:27:09.177 UTC [grpc] infof -> DEBU 10a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:09.190 UTC [comm.grpc.server] 1 -> INFO 10b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:11.19Z grpc.peer_address=172.18.0.6:53164 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=131.7µs +"2019-05-02 09:27:09.192 UTC [msp.identity] Sign -> DEBU 10c Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:09.192 UTC [msp.identity] Sign -> DEBU 10d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:09.193 UTC [gossip.comm] authenticateRemotePeer -> DEBU 10e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:53164" +"2019-05-02 09:27:09.194 UTC [gossip.comm] authenticateRemotePeer -> DEBU 10f Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53164" +"2019-05-02 09:27:09.195 UTC [msp.identity] Verify -> DEBU 110 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-05-02 01:30:34.496 UTC [msp.identity] Verify -> DEBU 111 Verify: sig = 00000000 30 44 02 20 75 9d 1b 6b 5d 0b 5a 70 8c 6d 7b 31 |0D. u..k].Zp.m{1| -00000010 d0 1c ab 59 f8 a1 ce 91 16 af dc 6b f2 83 a2 f6 |...Y.......k....| -00000020 ec cb f2 c5 02 20 61 1d 47 e5 a0 8c 0a a8 b1 b5 |..... a.G.......| -00000030 76 25 b5 66 49 46 b4 f8 18 9c 52 ab 17 ac ee 4f |v%.fIF....R....O| -00000040 8a b6 64 b6 e2 e1 |..d...|" -"2019-05-02 01:30:34.497 UTC [gossip.comm] authenticateRemotePeer -> DEBU 112 Authenticated 192.168.240.6:44894" -"2019-05-02 01:30:34.497 UTC [gossip.comm] GossipStream -> DEBU 113 Servicing 192.168.240.6:44894" -"2019-05-02 01:30:34.498 UTC [gossip.gossip] handleMessage -> DEBU 114 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 7184683292863464581, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +"2019-05-02 09:27:09.195 UTC [msp.identity] Verify -> DEBU 111 Verify: sig = 00000000 30 45 02 21 00 f4 4d be bf 97 d6 a3 ee c0 c3 d5 |0E.!..M.........| +00000010 26 4d 50 d1 6c 15 49 87 b3 e3 fb f8 2a 4e 9b d2 |&MP.l.I.....*N..| +00000020 2c 29 6e 12 fd 02 20 04 2e 24 e6 ff 7d a8 7d ef |,)n... ..$..}.}.| +00000030 f6 a3 2e f5 f7 88 73 ee c9 03 17 0f ec 5a 20 67 |......s......Z g| +00000040 e2 4e 65 97 86 59 e9 |.Ne..Y.|" +"2019-05-02 09:27:09.196 UTC [gossip.comm] authenticateRemotePeer -> DEBU 112 Authenticated 172.18.0.6:53164" +"2019-05-02 09:27:09.196 UTC [gossip.comm] GossipStream -> DEBU 113 Servicing 172.18.0.6:53164" +"2019-05-02 09:27:09.200 UTC [gossip.gossip] handleMessage -> DEBU 114 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -416,9 +416,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1109 bytes, Signature: 0 bytes" -"2019-05-02 01:30:34.499 UTC [gossip.gossip] handleMessage -> DEBU 115 Exiting" -"2019-05-02 01:30:34.500 UTC [gossip.discovery] handleMsgFromComm -> DEBU 116 Got message: GossipMessage: Channel: , nonce: 7184683292863464581, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1109 bytes, Signature: 0 bytes" +"2019-05-02 09:27:09.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 115 Got message: GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -432,22 +431,23 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1109 bytes, Signature: 0 bytes" -"2019-05-02 01:30:34.502 UTC [msp.identity] Verify -> DEBU 117 Verify: digest = 00000000 76 aa 3a d7 1b 70 c1 94 48 8b fe f4 63 17 f9 39 |v.:..p..H...c..9| -00000010 a7 97 5e 21 21 6a 9c 40 1e 65 9a 95 a6 f1 96 16 |..^!!j.@.e......|" -"2019-05-02 01:30:34.502 UTC [msp.identity] Verify -> DEBU 118 Verify: sig = 00000000 30 45 02 21 00 86 80 88 74 ec c2 79 6c 3e 02 51 |0E.!....t..yl>.Q| -00000010 4a 49 9b 51 2c 95 c1 3f 88 3f 2f 55 b9 22 00 15 |JI.Q,..?.?/U."..| -00000020 2d 4b 54 87 b4 02 20 5a 4e aa dc 2b bd 23 3d b1 |-KT... ZN..+.#=.| -00000030 b3 ab 7e b3 e9 2d 97 4f 7c 4a e5 23 1b 92 e1 5b |..~..-.O|J.#...[| -00000040 74 f3 3f 28 72 55 0b |t.?(rU.|" -"2019-05-02 01:30:34.503 UTC [msp.identity] Verify -> DEBU 119 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1109 bytes, Signature: 0 bytes" +"2019-05-02 09:27:09.200 UTC [gossip.gossip] handleMessage -> DEBU 116 Exiting" +"2019-05-02 09:27:09.202 UTC [msp.identity] Verify -> DEBU 117 Verify: digest = 00000000 c9 f0 7e c3 11 0e 51 a1 50 82 0d 6c 29 57 ab 41 |..~...Q.P..l)W.A| +00000010 27 de 01 d4 b2 04 63 b5 94 ff d0 99 fe 20 4b 6d |'.....c...... Km|" +"2019-05-02 09:27:09.202 UTC [msp.identity] Verify -> DEBU 118 Verify: sig = 00000000 30 44 02 20 03 e4 68 96 38 3b fa 14 de ac 73 11 |0D. ..h.8;....s.| +00000010 ff cb 36 26 cb f1 55 b9 0b 12 a4 f1 d1 cb 36 e8 |..6&..U.......6.| +00000020 20 ff dc 72 02 20 25 6e ac 7a 5c 78 45 fd c6 b8 | ..r. %n.z\xE...| +00000030 94 02 b5 ea da 7f c9 23 2a 48 81 10 a3 2e 75 ec |.......#*H....u.| +00000040 6d 48 39 8f c9 2d |mH9..-|" +"2019-05-02 09:27:09.203 UTC [msp.identity] Verify -> DEBU 119 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:34.504 UTC [msp.identity] Verify -> DEBU 11a Verify: sig = 00000000 30 45 02 21 00 ed ef 42 24 1d a2 b2 80 df 09 af |0E.!...B$.......| -00000010 f5 1e 41 8e 6c 1c 05 55 46 95 ab f6 9b 87 70 f8 |..A.l..UF.....p.| -00000020 a8 fa 7f 66 87 02 20 3e 7b 2d a7 59 82 a9 1b 8e |...f.. >{-.Y....| -00000030 4d 9c a4 2f 52 17 c6 d2 68 2a de 6c 81 01 e5 99 |M../R...h*.l....| -00000040 bf a8 6f ca 92 4c 11 |..o..L.|" -"2019-05-02 01:30:34.505 UTC [gossip.discovery] handleAliveMessage -> DEBU 11b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +"2019-05-02 09:27:09.203 UTC [msp.identity] Verify -> DEBU 11a Verify: sig = 00000000 30 45 02 21 00 83 e8 b0 ba d6 d1 78 86 78 ba 69 |0E.!.......x.x.i| +00000010 53 41 10 2a e4 5f b8 d7 9b 5b 30 a8 47 57 82 e0 |SA.*._...[0.GW..| +00000020 b0 67 97 d1 98 02 20 13 35 0e cb 19 d0 b9 de 1e |.g.... .5.......| +00000030 6f 77 81 2d 29 ef b8 9a 24 1f 8c c1 0e 4e 16 09 |ow.-)...$....N..| +00000040 0d 1e 76 0c 8b 3c 55 |..v.. DEBU 11b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -461,8 +461,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:34.506 UTC [gossip.discovery] learnNewMembers -> DEBU 11c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:09.203 UTC [gossip.discovery] learnNewMembers -> DEBU 11c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -476,8 +476,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]}" -"2019-05-02 01:30:34.507 UTC [gossip.discovery] learnNewMembers -> DEBU 11d Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]}" +"2019-05-02 09:27:09.204 UTC [gossip.discovery] learnNewMembers -> DEBU 11d Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -491,164 +491,31 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:34.507 UTC [gossip.discovery] learnNewMembers -> DEBU 11e Exiting" -"2019-05-02 01:30:34.508 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f Exiting" -"2019-05-02 01:30:34.508 UTC [gossip.discovery] handleMsgFromComm -> DEBU 120 Exiting" -"2019-05-02 01:30:34.508 UTC [gossip.discovery] sendMemResponse -> DEBU 121 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:34.509 UTC [msp.identity] Sign -> DEBU 122 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:30:34.509 UTC [msp.identity] Sign -> DEBU 123 Sign: digest: 7EF9B1AE0898C9E6446F72B5F382146C63647A74C0CAEC1ED6AC1E0E59C923BE " -"2019-05-02 01:30:34.510 UTC [msp.identity] Sign -> DEBU 124 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:34.510 UTC [msp.identity] Sign -> DEBU 125 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:34.511 UTC [gossip.comm] Send -> DEBU 126 Entering, sending GossipMessage: Channel: , nonce: 7184683292863464581, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2199 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:34.512 UTC [gossip.comm] sendToEndpoint -> DEBU 127 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7184683292863464581, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2199 bytes, Signature: 0 bytes" -"2019-05-02 01:30:34.513 UTC [gossip.comm] sendToEndpoint -> DEBU 128 Exiting" -"2019-05-02 01:30:34.512 UTC [gossip.discovery] sendMemResponse -> DEBU 129 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:30:37.454 UTC [gossip.gossip] handleMessage -> DEBU 12a Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1098 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.454 UTC [gossip.gossip] handleMessage -> DEBU 12b Exiting" -"2019-05-02 01:30:37.454 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1098 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.455 UTC [msp.identity] Verify -> DEBU 12d Verify: digest = 00000000 cf 06 6c 72 13 08 0f 2a ba c6 45 4b 69 d7 f3 4e |..lr...*..EKi..N| -00000010 05 d7 75 f1 c4 e2 eb ce 89 ab 14 76 b5 45 5c 74 |..u........v.E\t|" -"2019-05-02 01:30:37.455 UTC [msp.identity] Verify -> DEBU 12e Verify: sig = 00000000 30 45 02 21 00 83 07 7d 3f 09 a7 22 6d 38 6f 71 |0E.!...}?.."m8oq| -00000010 56 b7 71 29 69 51 b8 c4 df cc f2 55 c3 7a b7 1c |V.q)iQ.....U.z..| -00000020 7e bd cb 1a 91 02 20 7d 81 4d e4 4e 72 8e d3 a8 |~..... }.M.Nr...| -00000030 a0 64 f2 d1 86 69 65 74 40 ca 76 1f f4 c5 cf 7b |.d...iet@.v....{| -00000040 ac d5 23 d8 6e a6 57 |..#.n.W|" -"2019-05-02 01:30:37.455 UTC [msp.identity] Verify -> DEBU 12f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:37.456 UTC [msp.identity] Verify -> DEBU 130 Verify: sig = 00000000 30 44 02 20 5c 40 4f 9a f5 65 46 c2 a6 58 9f 3f |0D. \@O..eF..X.?| -00000010 bd 96 bc 89 dd 63 f3 d9 cb 8c da c8 34 f4 92 00 |.....c......4...| -00000020 27 84 f4 ed 02 20 47 92 dd 1d c1 77 a6 21 08 e5 |'.... G....w.!..| -00000030 a0 18 30 ab 07 54 fe 61 a4 22 1a a2 11 d5 48 b3 |..0..T.a."....H.| -00000040 90 40 9e d3 0d 5e |.@...^|" -"2019-05-02 01:30:37.456 UTC [gossip.discovery] handleAliveMessage -> DEBU 131 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:37.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 132 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:30:37.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 133 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:4 " -"2019-05-02 01:30:37.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 134 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:4 " -"2019-05-02 01:30:37.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 135 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:3 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:37.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 136 Exiting" -"2019-05-02 01:30:37.458 UTC [gossip.discovery] handleAliveMessage -> DEBU 137 Exiting" -"2019-05-02 01:30:37.458 UTC [gossip.discovery] handleMsgFromComm -> DEBU 138 Exiting" -"2019-05-02 01:30:37.458 UTC [gossip.discovery] sendMemResponse -> DEBU 139 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:37.458 UTC [msp.identity] Sign -> DEBU 13a Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:30:37.459 UTC [msp.identity] Sign -> DEBU 13b Sign: digest: 8BE3C0D36A6C1511098EDB4E3059DF11BCD2C0435DF2B1AEEEB679536358345F " -"2019-05-02 01:30:37.459 UTC [msp.identity] Sign -> DEBU 13c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:37.459 UTC [msp.identity] Sign -> DEBU 13d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:37.460 UTC [gossip.comm] Send -> DEBU 13e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:37.460 UTC [gossip.discovery] sendMemResponse -> DEBU 13f Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:30:37.460 UTC [gossip.comm] sendToEndpoint -> DEBU 140 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.461 UTC [gossip.comm] sendToEndpoint -> DEBU 141 Exiting" -"2019-05-02 01:30:37.462 UTC [gossip.gossip] handleMessage -> DEBU 142 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.462 UTC [gossip.pull] HandleMessage -> DEBU 143 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.462 UTC [gossip.pull] SendDigest -> DEBU 144 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:37.463 UTC [gossip.gossip] handleMessage -> DEBU 145 Exiting" -"2019-05-02 01:30:37.615 UTC [gossip.pull] Hello -> DEBU 146 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:30:37.615 UTC [gossip.comm] Send -> DEBU 147 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:37.615 UTC [gossip.comm] sendToEndpoint -> DEBU 148 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.615 UTC [gossip.comm] sendToEndpoint -> DEBU 149 Exiting" -"2019-05-02 01:30:37.616 UTC [msp.identity] Sign -> DEBU 14a Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:30:37.617 UTC [msp.identity] Sign -> DEBU 14b Sign: digest: 5141F5D8F50842FC3127408EBEBE6E2EA2D3E417ADB090C629001EB4EC9D5395 " -"2019-05-02 01:30:37.618 UTC [msp.identity] Sign -> DEBU 14c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:37.618 UTC [msp.identity] Sign -> DEBU 14d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:37.619 UTC [gossip.comm] Send -> DEBU 14e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:09.204 UTC [gossip.discovery] learnNewMembers -> DEBU 11e Exiting" +"2019-05-02 09:27:09.204 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f Exiting" +"2019-05-02 09:27:09.204 UTC [gossip.discovery] handleMsgFromComm -> DEBU 120 Exiting" +"2019-05-02 09:27:09.205 UTC [gossip.discovery] sendMemResponse -> DEBU 121 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 122 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 123 Sign: digest: 294D679F4B8DA423A9752C47753FA557B8520BC698D992FDDE58602EF4E23EDE " +"2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 124 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:09.205 UTC [msp.identity] Sign -> DEBU 125 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:09.206 UTC [gossip.comm] Send -> DEBU 126 Entering, sending GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2198 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:09.207 UTC [gossip.comm] sendToEndpoint -> DEBU 127 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 18214032413450206326, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2198 bytes, Signature: 0 bytes" +"2019-05-02 09:27:09.207 UTC [gossip.comm] sendToEndpoint -> DEBU 128 Exiting" +"2019-05-02 09:27:09.208 UTC [gossip.discovery] sendMemResponse -> DEBU 129 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:13.092 UTC [gossip.pull] Hello -> DEBU 12a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:13.093 UTC [gossip.comm] Send -> DEBU 12b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:13.094 UTC [gossip.comm] sendToEndpoint -> DEBU 12c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.094 UTC [gossip.comm] sendToEndpoint -> DEBU 12d Exiting" +"2019-05-02 09:27:13.096 UTC [gossip.gossip] handleMessage -> DEBU 12e Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.096 UTC [gossip.pull] HandleMessage -> DEBU 12f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.096 UTC [gossip.gossip] handleMessage -> DEBU 130 Exiting" +"2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 131 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 132 Sign: digest: 1D328FAFAE76FEBA6036434DB4200718BB99346BAE4F5605AC555F446D3BCBF6 " +"2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 133 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:13.097 UTC [msp.identity] Sign -> DEBU 134 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:13.098 UTC [gossip.comm] Send -> DEBU 135 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -662,11 +529,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE----- -Timestamp:inc_num:1556760633613118000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:37.619 UTC [gossip.gossip] handleMessage -> DEBU 14f Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9065475227465345842 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.620 UTC [gossip.pull] HandleMessage -> DEBU 151 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9065475227465345842 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.620 UTC [gossip.gossip] handleMessage -> DEBU 152 Exiting" -"2019-05-02 01:30:37.619 UTC [gossip.comm] sendToEndpoint -> DEBU 150 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:13.098 UTC [gossip.comm] sendToEndpoint -> DEBU 136 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -680,26 +544,26 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE----- -Timestamp:inc_num:1556760633613118000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.621 UTC [gossip.comm] sendToEndpoint -> DEBU 153 Exiting" -"2019-05-02 01:30:37.625 UTC [gossip.gossip] handleMessage -> DEBU 154 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.625 UTC [gossip.gossip] handleMessage -> DEBU 155 Exiting" -"2019-05-02 01:30:37.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" -"2019-05-02 01:30:37.626 UTC [msp.identity] Verify -> DEBU 157 Verify: digest = 00000000 51 41 f5 d8 f5 08 42 fc 31 27 40 8e be be 6e 2e |QA....B.1'@...n.| -00000010 a2 d3 e4 17 ad b0 90 c6 29 00 1e b4 ec 9d 53 95 |........).....S.|" -"2019-05-02 01:30:37.626 UTC [msp.identity] Verify -> DEBU 158 Verify: sig = 00000000 30 44 02 20 67 26 a0 05 88 fa 35 57 06 3d d1 b4 |0D. g&....5W.=..| -00000010 90 5d 62 6d a6 95 4b ca a2 a4 67 76 f7 3e 0d 49 |.]bm..K...gv.>.I| -00000020 79 da f5 92 02 20 7c c3 8a ff e5 94 62 de 36 f3 |y.... |.....b.6.| -00000030 7c 89 74 bd 66 50 fa aa b8 04 d0 d1 e9 62 41 d7 ||.t.fP.......bA.| -00000040 7f 06 66 df 45 37 |..f.E7|" -"2019-05-02 01:30:37.627 UTC [msp.identity] Verify -> DEBU 159 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1094 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.099 UTC [gossip.comm] sendToEndpoint -> DEBU 137 Exiting" +"2019-05-02 09:27:13.101 UTC [gossip.gossip] handleMessage -> DEBU 138 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.101 UTC [gossip.gossip] handleMessage -> DEBU 139 Exiting" +"2019-05-02 09:27:13.101 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13b Verify: digest = 00000000 1d 32 8f af ae 76 fe ba 60 36 43 4d b4 20 07 18 |.2...v..`6CM. ..| +00000010 bb 99 34 6b ae 4f 56 05 ac 55 5f 44 6d 3b cb f6 |..4k.OV..U_Dm;..|" +"2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13c Verify: sig = 00000000 30 45 02 21 00 c0 a4 06 5c 49 75 2a 3f 49 23 0e |0E.!....\Iu*?I#.| +00000010 f3 1c 69 28 e7 98 dc b7 28 1c f2 3c f5 26 f9 1b |..i(....(..<.&..| +00000020 00 78 c5 e5 89 02 20 50 03 2c bd 98 41 09 0f 9d |.x.... P.,..A...| +00000030 2f 8b 36 18 40 57 1d 45 23 0f ad 35 9f 8e 53 61 |/.6.@W.E#..5..Sa| +00000040 87 4e 3e eb 57 d8 94 |.N>.W..|" +"2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13d Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:30:37.627 UTC [msp.identity] Verify -> DEBU 15a Verify: sig = 00000000 30 45 02 21 00 c0 c9 7e 46 23 9c a6 5d d2 a2 2e |0E.!...~F#..]...| -00000010 d2 31 81 ba 47 a3 3e c6 0b 5b 42 cf 94 a3 b4 83 |.1..G.>..[B.....| -00000020 e6 34 40 19 4e 02 20 1e f1 97 23 91 96 0e b2 9a |.4@.N. ...#.....| -00000030 6c a2 9e c0 94 26 11 7f 4a c5 55 9d 6a df 0d 7d |l....&..J.U.j..}| -00000040 e1 ca af 05 07 86 3c |......<|" -"2019-05-02 01:30:37.627 UTC [gossip.discovery] handleAliveMessage -> DEBU 15b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +"2019-05-02 09:27:13.102 UTC [msp.identity] Verify -> DEBU 13e Verify: sig = 00000000 30 44 02 20 5e 66 33 ce 48 06 7b e0 5e 34 05 79 |0D. ^f3.H.{.^4.y| +00000010 8f ab 5f 83 0f bd 42 0f bc 0d 84 94 a7 7b c2 8e |.._...B......{..| +00000020 94 70 cd 8f 02 20 58 39 3d a6 8b a9 ff c7 f1 9a |.p... X9=.......| +00000030 3d ad 67 70 3c 0d c1 59 b1 f2 f3 a8 f4 88 3f d1 |=.gp<..Y......?.| +00000040 bc 1c 17 25 af 47 |...%.G|" +"2019-05-02 09:27:13.102 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -713,8 +577,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE----- -Timestamp:inc_num:1556760633613118000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:37.627 UTC [gossip.discovery] isSentByMe -> DEBU 15c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:13.102 UTC [gossip.discovery] isSentByMe -> DEBU 140 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -728,23 +592,23 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE----- -Timestamp:inc_num:1556760633613118000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:37.627 UTC [gossip.discovery] handleAliveMessage -> DEBU 15d Exiting" -"2019-05-02 01:30:37.628 UTC [msp.identity] Verify -> DEBU 15e Verify: digest = 00000000 b6 df f4 ff 4b 2d 6b 6b 19 f1 a6 b0 93 56 a9 36 |....K-kk.....V.6| -00000010 30 f0 0b b5 b4 42 d3 62 d7 85 71 39 e5 61 4c ba |0....B.b..q9.aL.|" -"2019-05-02 01:30:37.628 UTC [msp.identity] Verify -> DEBU 15f Verify: sig = 00000000 30 44 02 20 07 d7 de cf 20 49 d7 56 bf 96 cd d4 |0D. .... I.V....| -00000010 58 28 79 db d5 04 62 d1 ad 29 f0 6b 50 eb 49 13 |X(y...b..).kP.I.| -00000020 54 4f 68 b6 02 20 5c 83 f1 ae 69 92 09 ee e9 25 |TOh.. \...i....%| -00000030 55 0a 28 ce e2 9b 60 15 a2 8c 6b d8 d1 e4 68 5d |U.(...`...k...h]| -00000040 ad 34 49 7f 2b c2 |.4I.+.|" -"2019-05-02 01:30:37.628 UTC [msp.identity] Verify -> DEBU 160 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +Timestamp:inc_num:1556789229089237200 seq_num:4 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:13.102 UTC [gossip.discovery] handleAliveMessage -> DEBU 141 Exiting" +"2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 142 Verify: digest = 00000000 f2 9f d6 4e 51 d8 70 03 8b cc ce 6d 34 37 3e 54 |...NQ.p....m47>T| +00000010 5b 9e 4c b0 f2 73 5e 0c 82 03 26 96 7d a1 22 cf |[.L..s^...&.}.".|" +"2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 143 Verify: sig = 00000000 30 44 02 20 4b 9f 93 fc 8c 14 0f a1 28 76 bd 93 |0D. K.......(v..| +00000010 ea 2a a9 58 fb 5a d5 52 3d d8 49 7f fe de 6b 58 |.*.X.Z.R=.I...kX| +00000020 5e f9 14 9c 02 20 5a 54 97 83 c5 8f 84 2b e7 9c |^.... ZT.....+..| +00000030 c9 d4 31 36 8b 35 55 11 33 0a f4 62 2e 7f 44 80 |..16.5U.3..b..D.| +00000040 62 ad d8 07 51 10 |b...Q.|" +"2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 144 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:37.628 UTC [msp.identity] Verify -> DEBU 161 Verify: sig = 00000000 30 45 02 21 00 f6 36 fa 89 36 6c e5 7b 22 2e 3b |0E.!..6..6l.{".;| -00000010 70 82 53 49 59 61 19 7f e4 1e 4d f9 a4 59 e6 ca |p.SIYa....M..Y..| -00000020 2c d4 22 01 8b 02 20 39 31 68 c5 e5 8b 32 d4 1b |,."... 91h...2..| -00000030 f9 7a 16 91 36 32 53 4a c7 28 2c 8f 47 88 1d b0 |.z..62SJ.(,.G...| -00000040 7b dc 5f 5c 19 0e 1e |{._\...|" -"2019-05-02 01:30:37.629 UTC [gossip.discovery] handleAliveMessage -> DEBU 162 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +"2019-05-02 09:27:13.103 UTC [msp.identity] Verify -> DEBU 145 Verify: sig = 00000000 30 44 02 20 71 a4 01 5f 21 3c f0 31 f8 c0 ae 0b |0D. q.._!<.1....| +00000010 ce e6 75 07 f0 c6 e4 e4 40 47 67 1a 0d 85 b1 0e |..u.....@Gg.....| +00000020 1f 7d 2b a7 02 20 69 67 89 56 35 11 a5 81 1c 5c |.}+.. ig.V5....\| +00000030 10 5b 6d 56 2f f4 b3 de e5 7e 17 7c e3 db 2d ba |.[mV/....~.|..-.| +00000040 66 e4 a1 bf 30 9d |f...0.|" +"2019-05-02 09:27:13.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 146 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -758,8 +622,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:37.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 163 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:13.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 147 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -773,8 +637,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:30:37.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 164 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:27:13.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 148 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -788,8 +652,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:5 " -"2019-05-02 01:30:37.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 165 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:4 " +"2019-05-02 09:27:13.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 149 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -803,8 +667,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:5 " -"2019-05-02 01:30:37.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 166 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:4 " +"2019-05-02 09:27:13.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -818,15 +682,15 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-05-02 01:30:37.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 167 Exiting" -"2019-05-02 01:30:37.629 UTC [gossip.discovery] handleAliveMessage -> DEBU 168 Exiting" -"2019-05-02 01:30:37.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU 169 Exiting" -"2019-05-02 01:30:38.455 UTC [gossip.gossip] handleMessage -> DEBU 16a Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10671959488972110286 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" -"2019-05-02 01:30:38.455 UTC [gossip.pull] HandleMessage -> DEBU 16b GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10671959488972110286 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" -"2019-05-02 01:30:38.455 UTC [gossip.gossip] handleMessage -> DEBU 16c Exiting" -"2019-05-02 01:30:38.455 UTC [gossip.pull] SendRes -> DEBU 16d Sending 1 IDENTITY_MSG items to 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:38.459 UTC [gossip.gossip] handleMessage -> DEBU 16e Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:13.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 14b Exiting" +"2019-05-02 09:27:13.104 UTC [gossip.discovery] handleAliveMessage -> DEBU 14c Exiting" +"2019-05-02 09:27:13.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d Exiting" +"2019-05-02 09:27:13.141 UTC [gossip.gossip] handleMessage -> DEBU 14e Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.141 UTC [gossip.pull] HandleMessage -> DEBU 14f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.141 UTC [gossip.pull] SendDigest -> DEBU 150 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:13.141 UTC [gossip.gossip] handleMessage -> DEBU 151 Exiting" +"2019-05-02 09:27:13.143 UTC [gossip.gossip] handleMessage -> DEBU 152 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -840,9 +704,9 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:38.459 UTC [gossip.gossip] handleMessage -> DEBU 16f Exiting" -"2019-05-02 01:30:38.459 UTC [gossip.discovery] handleMsgFromComm -> DEBU 170 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.143 UTC [gossip.gossip] handleMessage -> DEBU 153 Exiting" +"2019-05-02 09:27:13.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU 154 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -856,22 +720,22 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:38.460 UTC [msp.identity] Verify -> DEBU 171 Verify: digest = 00000000 a6 61 86 87 ab 47 e1 f8 2f 5a da 75 53 13 d3 44 |.a...G../Z.uS..D| -00000010 24 88 9f a8 5e 0e af 8e a1 30 2b 60 e3 8f 60 03 |$...^....0+`..`.|" -"2019-05-02 01:30:38.460 UTC [msp.identity] Verify -> DEBU 172 Verify: sig = 00000000 30 44 02 20 52 37 47 aa 1d 60 b2 59 8a 96 65 b9 |0D. R7G..`.Y..e.| -00000010 7b 15 c7 4f 75 34 7b 68 ee b1 5e e0 69 6b 01 b2 |{..Ou4{h..^.ik..| -00000020 3e 1a 03 64 02 20 51 d6 c2 6a 7e 6e db 92 ce b4 |>..d. Q..j~n....| -00000030 f0 a1 cb fe 02 63 01 a7 4a a2 d3 c6 89 1e 55 2f |.....c..J.....U/| -00000040 56 52 0f e2 79 8b |VR..y.|" -"2019-05-02 01:30:38.460 UTC [msp.identity] Verify -> DEBU 173 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 155 Verify: digest = 00000000 4f 61 18 9a 46 50 55 1f 38 af 18 76 5f 38 f5 78 |Oa..FPU.8..v_8.x| +00000010 eb b8 ab 55 16 51 25 db b9 14 fe db 42 d0 c8 c9 |...U.Q%.....B...|" +"2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 156 Verify: sig = 00000000 30 44 02 20 0a c2 bb 53 a0 6e 65 aa cc da 79 c4 |0D. ...S.ne...y.| +00000010 1e 77 55 82 bd 1f 4c 33 01 29 c3 42 ee a9 45 f5 |.wU...L3.).B..E.| +00000020 d9 99 72 9c 02 20 1c 85 a4 5c af 94 66 a5 95 b8 |..r.. ...\..f...| +00000030 19 2b 24 f1 13 66 98 dd d3 87 74 cb 3e 5b c5 f1 |.+$..f....t.>[..| +00000040 48 b4 9b 10 c4 dd |H.....|" +"2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 157 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:38.460 UTC [msp.identity] Verify -> DEBU 174 Verify: sig = 00000000 30 45 02 21 00 f8 34 f1 cd db ca cc ab 41 35 0b |0E.!..4......A5.| -00000010 8c 9c aa 35 fd 45 8a fc ad 07 53 e0 bd ca 31 eb |...5.E....S...1.| -00000020 3d 01 f3 fa bd 02 20 0b 8f bc 7e 55 0e bf bf 08 |=..... ...~U....| -00000030 ec ae e1 28 47 54 95 b8 11 be b4 04 71 25 0a ba |...(GT......q%..| -00000040 7f 7b 62 4a a0 ae 66 |.{bJ..f|" -"2019-05-02 01:30:38.461 UTC [gossip.discovery] handleAliveMessage -> DEBU 175 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +"2019-05-02 09:27:13.144 UTC [msp.identity] Verify -> DEBU 158 Verify: sig = 00000000 30 45 02 21 00 d7 82 7f 5d c0 1e 8d 93 95 50 45 |0E.!....].....PE| +00000010 4a 09 a7 2b 4b 3b ba 73 98 09 78 78 37 36 c2 86 |J..+K;.s..xx76..| +00000020 b9 0a af 95 2d 02 20 50 4b dc c2 36 24 eb 50 7d |....-. PK..6$.P}| +00000030 7d d2 36 23 48 71 f0 8a 02 ad 47 a1 f6 25 00 7a |}.6#Hq....G..%.z| +00000040 79 98 36 30 e9 eb 1c |y.60...|" +"2019-05-02 09:27:13.144 UTC [gossip.discovery] handleAliveMessage -> DEBU 159 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -885,8 +749,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:38.461 UTC [gossip.discovery] learnExistingMembers -> DEBU 176 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:13.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 15a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -900,8 +764,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:30:38.461 UTC [gossip.discovery] learnExistingMembers -> DEBU 177 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:13.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 15b updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -915,8 +779,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:6 " -"2019-05-02 01:30:38.461 UTC [gossip.discovery] learnExistingMembers -> DEBU 178 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:5 " +"2019-05-02 09:27:13.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 15c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -930,8 +794,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:6 " -"2019-05-02 01:30:38.461 UTC [gossip.discovery] learnExistingMembers -> DEBU 179 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:5 " +"2019-05-02 09:27:13.145 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -945,68 +809,204 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:38.461 UTC [gossip.discovery] learnExistingMembers -> DEBU 17a Exiting" -"2019-05-02 01:30:38.461 UTC [gossip.discovery] handleAliveMessage -> DEBU 17b Exiting" -"2019-05-02 01:30:38.461 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17c Exiting" -"2019-05-02 01:30:38.613 UTC [msp.identity] Sign -> DEBU 17d Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:30:38.614 UTC [msp.identity] Sign -> DEBU 17e Sign: digest: E0014447DAB4F1831CCC952DC5F61D59C1D33398B9933D534A2FC89B90F9276E " -"2019-05-02 01:30:38.614 UTC [msp.identity] Sign -> DEBU 17f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:38.614 UTC [msp.identity] Sign -> DEBU 180 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:38.614 UTC [gossip.discovery] periodicalSendAlive -> DEBU 181 Sleeping 5s" -"2019-05-02 01:30:38.616 UTC [gossip.comm] Send -> DEBU 182 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig ------END CERTIFICATE----- -Timestamp:inc_num:1556760633613118000 seq_num:6 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:38.616 UTC [gossip.comm] sendToEndpoint -> DEBU 183 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig ------END CERTIFICATE----- -Timestamp:inc_num:1556760633613118000 seq_num:6 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:38.616 UTC [gossip.comm] sendToEndpoint -> DEBU 184 Exiting" -"2019-05-02 01:30:38.616 UTC [gossip.pull] SendReq -> DEBU 185 Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" -"2019-05-02 01:30:38.617 UTC [gossip.comm] Send -> DEBU 186 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 9065475227465345842 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:38.618 UTC [gossip.comm] sendToEndpoint -> DEBU 187 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 9065475227465345842 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" -"2019-05-02 01:30:38.618 UTC [gossip.comm] sendToEndpoint -> DEBU 188 Exiting" -"2019-05-02 01:30:38.620 UTC [gossip.gossip] handleMessage -> DEBU 189 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 9065475227465345842, Envelope: 960 bytes, Signature: 0 bytes" -"2019-05-02 01:30:38.620 UTC [msp.identity] Verify -> DEBU 18a Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| +Timestamp:inc_num:1556789229135374800 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:13.145 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e Exiting" +"2019-05-02 09:27:13.145 UTC [gossip.discovery] handleAliveMessage -> DEBU 15f Exiting" +"2019-05-02 09:27:13.145 UTC [gossip.discovery] handleMsgFromComm -> DEBU 160 Exiting" +"2019-05-02 09:27:13.145 UTC [gossip.discovery] sendMemResponse -> DEBU 161 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 162 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 163 Sign: digest: 72A9295ADCC55E1ADAF8686ABEC8A9762EEF9ABBF0F0BF0809368B567368C629 " +"2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 164 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:13.145 UTC [msp.identity] Sign -> DEBU 165 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:13.145 UTC [gossip.comm] Send -> DEBU 166 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:13.146 UTC [gossip.comm] sendToEndpoint -> DEBU 167 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +"2019-05-02 09:27:13.146 UTC [gossip.comm] sendToEndpoint -> DEBU 168 Exiting" +"2019-05-02 09:27:13.146 UTC [gossip.discovery] sendMemResponse -> DEBU 169 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:14.059 UTC [msp.identity] Sign -> DEBU 16a Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:14.060 UTC [msp.identity] Sign -> DEBU 16b Sign: digest: 89C366B5701489D679D2777974B03C747D0B532CCABE350CD605CEEE397A95D8 " +"2019-05-02 09:27:14.061 UTC [msp.identity] Sign -> DEBU 16c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:14.061 UTC [msp.identity] Sign -> DEBU 16d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:14.061 UTC [gossip.discovery] periodicalSendAlive -> DEBU 16e Sleeping 5s" +"2019-05-02 09:27:14.064 UTC [gossip.pull] SendReq -> DEBU 16f Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" +"2019-05-02 09:27:14.064 UTC [gossip.comm] Send -> DEBU 170 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:14.064 UTC [gossip.comm] sendToEndpoint -> DEBU 171 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 8171991975260542063 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" +"2019-05-02 09:27:14.064 UTC [gossip.comm] sendToEndpoint -> DEBU 172 Exiting" +"2019-05-02 09:27:14.066 UTC [gossip.gossip] handleMessage -> DEBU 173 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8171991975260542063, Envelope: 960 bytes, Signature: 0 bytes" +"2019-05-02 09:27:14.066 UTC [msp.identity] Verify -> DEBU 174 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| 00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|" -"2019-05-02 01:30:38.620 UTC [msp.identity] Verify -> DEBU 18b Verify: sig = 00000000 30 44 02 20 14 32 fb 10 5c 7b f4 1f 9b 72 7c f5 |0D. .2..\{...r|.| -00000010 cc 48 ca 41 76 e9 9c cb d3 9b d2 17 34 88 fb 59 |.H.Av.......4..Y| -00000020 17 62 a0 0a 02 20 6e 1d 72 bd 9c e0 55 17 3a 5e |.b... n.r...U.:^| -00000030 be 65 94 35 38 3c 50 8d 63 1a 0b eb e6 8b 9a bf |.e.58 DEBU 18c GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 9065475227465345842, Envelope: 960 bytes, Signature: 0 bytes" -"2019-05-02 01:30:38.621 UTC [gossip.gossip] func2 -> DEBU 18d Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -"2019-05-02 01:30:38.621 UTC [gossip.pull] HandleMessage -> DEBU 18e Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" -"2019-05-02 01:30:38.621 UTC [gossip.gossip] handleMessage -> DEBU 18f Exiting" -"2019-05-02 01:30:40.731 UTC [endorser] ProcessProposal -> DEBU 190 Entering: request from 192.168.240.9:41182" -"2019-05-02 01:30:40.731 UTC [protoutils] ValidateProposalMessage -> DEBU 191 ValidateProposalMessage starts for signed proposal 0xc002311590" -"2019-05-02 01:30:40.731 UTC [protoutils] validateChannelHeader -> DEBU 192 validateChannelHeader info: header type 1" -"2019-05-02 01:30:40.732 UTC [protoutils] checkSignatureFromCreator -> DEBU 193 begin" -"2019-05-02 01:30:40.732 UTC [msp] DeserializeIdentity -> DEBU 194 Obtaining identity" -"2019-05-02 01:30:40.732 UTC [msp.identity] newIdentity -> DEBU 195 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:14.067 UTC [msp.identity] Verify -> DEBU 175 Verify: sig = 00000000 30 44 02 20 47 67 e7 6b 08 b7 e8 66 20 94 39 a3 |0D. Gg.k...f .9.| +00000010 f4 f9 e3 c7 9e 9a 6f 94 6b 49 25 8e 5c 91 a8 c1 |......o.kI%.\...| +00000020 86 69 ca b6 02 20 56 6e 45 f4 4e 9a a8 e1 b1 a7 |.i... VnE.N.....| +00000030 a5 73 b7 d1 a6 5f 6d 59 d4 9a a5 ef 5b 6a 60 e1 |.s..._mY....[j`.| +00000040 15 38 16 55 9a ef |.8.U..|" +"2019-05-02 09:27:14.067 UTC [gossip.pull] HandleMessage -> DEBU 176 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8171991975260542063, Envelope: 960 bytes, Signature: 0 bytes" +"2019-05-02 09:27:14.068 UTC [gossip.gossip] func2 -> DEBU 177 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-05-02 09:27:14.068 UTC [gossip.pull] HandleMessage -> DEBU 178 Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" +"2019-05-02 09:27:14.069 UTC [gossip.gossip] handleMessage -> DEBU 179 Exiting" +"2019-05-02 09:27:14.070 UTC [gossip.comm] Send -> DEBU 17a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229089237200 seq_num:6 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:14.071 UTC [gossip.comm] sendToEndpoint -> DEBU 17b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229089237200 seq_num:6 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:14.071 UTC [gossip.comm] sendToEndpoint -> DEBU 17c Exiting" +"2019-05-02 09:27:14.112 UTC [gossip.gossip] handleMessage -> DEBU 17d Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 17703106220587596212 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" +"2019-05-02 09:27:14.112 UTC [gossip.pull] HandleMessage -> DEBU 17e GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 17703106220587596212 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" +"2019-05-02 09:27:14.113 UTC [gossip.gossip] handleMessage -> DEBU 17f Exiting" +"2019-05-02 09:27:14.113 UTC [gossip.pull] SendRes -> DEBU 180 Sending 1 IDENTITY_MSG items to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:14.114 UTC [gossip.gossip] handleMessage -> DEBU 181 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:14.115 UTC [gossip.gossip] handleMessage -> DEBU 182 Exiting" +"2019-05-02 09:27:14.115 UTC [gossip.discovery] handleMsgFromComm -> DEBU 183 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 184 Verify: digest = 00000000 98 97 02 8b 69 77 28 e9 ad bb 36 09 85 63 3b 96 |....iw(...6..c;.| +00000010 ae d1 54 0d e4 9e 03 e8 9e cb c4 70 61 db a5 f4 |..T........pa...|" +"2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 185 Verify: sig = 00000000 30 45 02 21 00 cb 78 f9 34 bb 57 41 89 ec a0 c1 |0E.!..x.4.WA....| +00000010 67 af c4 27 e9 34 0c 85 b2 cf a8 39 88 a5 4b 7b |g..'.4.....9..K{| +00000020 80 27 ad 21 da 02 20 47 8e 9f bf 19 b7 0b 94 5e |.'.!.. G.......^| +00000030 a2 d6 55 ac 59 0c ef db 53 07 3e 15 19 b2 6d 1b |..U.Y...S.>...m.| +00000040 cd 74 d4 8d 5b ab d1 |.t..[..|" +"2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 186 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:27:14.116 UTC [msp.identity] Verify -> DEBU 187 Verify: sig = 00000000 30 44 02 20 4f 0c 0a f4 94 25 f3 90 b4 7a dc 2e |0D. O....%...z..| +00000010 9f 53 fb ae 8e 66 fd 3c 02 2c 2d d9 91 05 0c cf |.S...f.<.,-.....| +00000020 77 3a f9 5c 02 20 41 5f 73 66 aa 59 93 99 ac 7e |w:.\. A_sf.Y...~| +00000030 82 0e 4e 8c 06 54 fc f4 dc 80 09 92 c4 31 eb 9c |..N..T.......1..| +00000040 73 c7 3d 39 ba 8f |s.=9..|" +"2019-05-02 09:27:14.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 188 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 189 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:6 " +"2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:6 " +"2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:14.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d Exiting" +"2019-05-02 09:27:14.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e Exiting" +"2019-05-02 09:27:14.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18f Exiting" +"2019-05-02 09:27:16.160 UTC [endorser] ProcessProposal -> DEBU 190 Entering: request from 172.18.0.8:57196" +"2019-05-02 09:27:16.160 UTC [protoutils] ValidateProposalMessage -> DEBU 191 ValidateProposalMessage starts for signed proposal 0xc0023f2e60" +"2019-05-02 09:27:16.160 UTC [protoutils] validateChannelHeader -> DEBU 192 validateChannelHeader info: header type 1" +"2019-05-02 09:27:16.161 UTC [protoutils] checkSignatureFromCreator -> DEBU 193 begin" +"2019-05-02 09:27:16.161 UTC [msp] DeserializeIdentity -> DEBU 194 Obtaining identity" +"2019-05-02 09:27:16.162 UTC [msp.identity] newIdentity -> DEBU 195 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1020,43 +1020,86 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:40.733 UTC [protoutils] checkSignatureFromCreator -> DEBU 196 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:30:40.733 UTC [msp] Validate -> DEBU 197 MSP Org1MSP validating identity" -"2019-05-02 01:30:40.734 UTC [protoutils] checkSignatureFromCreator -> DEBU 198 creator is valid" -"2019-05-02 01:30:40.734 UTC [msp.identity] Verify -> DEBU 199 Verify: digest = 00000000 6f 78 a3 d9 de ea c6 08 34 f4 b1 d7 a1 ca db 13 |ox......4.......| -00000010 ff c4 ac ff c2 f0 b8 ca dc da 80 6d 63 81 a2 72 |...........mc..r|" -"2019-05-02 01:30:40.735 UTC [msp.identity] Verify -> DEBU 19a Verify: sig = 00000000 30 45 02 21 00 df 83 90 76 d2 20 1b 8e 8a 24 cc |0E.!....v. ...$.| -00000010 f0 d4 f9 77 b3 ba e5 12 df a3 85 71 53 c9 2d 02 |...w.......qS.-.| -00000020 95 b4 bd 22 90 02 20 30 28 68 bf 64 12 48 65 52 |...".. 0(h.d.HeR| -00000030 04 d2 aa 54 ac 6c 68 c2 ac 77 ad bb d6 12 26 dd |...T.lh..w....&.| -00000040 c8 7e 9a 42 f6 d3 89 |.~.B...|" -"2019-05-02 01:30:40.735 UTC [protoutils] checkSignatureFromCreator -> DEBU 19b exits successfully" -"2019-05-02 01:30:40.735 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19c validateChaincodeProposalMessage starts for proposal 0xc000429ab0, header 0xc002311ea0" -"2019-05-02 01:30:40.735 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19d validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-05-02 01:30:40.736 UTC [endorser] preProcess -> DEBU 19e [][dd1fa066] processing txid: dd1fa066e4336fdb8c0bfafb034fe06984b31b027331fc8a6f9955ca29e6dce8" -"2019-05-02 01:30:40.736 UTC [endorser] SimulateProposal -> DEBU 19f [][dd1fa066] Entry chaincode: name:"cscc" " -"2019-05-02 01:30:40.737 UTC [endorser] callChaincode -> INFO 1a0 [][dd1fa066] Entry chaincode: name:"cscc" " -"2019-05-02 01:30:40.737 UTC [chaincode] Execute -> DEBU 1a1 Entry" -"2019-05-02 01:30:40.737 UTC [cscc] Invoke -> DEBU 1a2 Invoke function: JoinChain" -"2019-05-02 01:30:40.738 UTC [common.channelconfig] NewStandardValues -> DEBU 1a3 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:40.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a4 Processing field: HashingAlgorithm" -"2019-05-02 01:30:40.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a5 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:40.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a6 Processing field: OrdererAddresses" -"2019-05-02 01:30:40.739 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a7 Processing field: Consortium" -"2019-05-02 01:30:40.739 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a8 Processing field: Capabilities" -"2019-05-02 01:30:40.739 UTC [common.channelconfig] NewStandardValues -> DEBU 1a9 Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:40.739 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1aa Processing field: ACLs" -"2019-05-02 01:30:40.739 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ab Processing field: Capabilities" -"2019-05-02 01:30:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 1ac Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ad Processing field: AnchorPeers" -"2019-05-02 01:30:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 1ae Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1af Processing field: MSP" -"2019-05-02 01:30:40.740 UTC [common.channelconfig] Validate -> DEBU 1b0 Anchor peers for org Org1MSP are " -"2019-05-02 01:30:40.740 UTC [common.channelconfig] validateMSP -> DEBU 1b1 Setting up MSP for org Org1MSP" -"2019-05-02 01:30:40.741 UTC [msp] newBccspMsp -> DEBU 1b2 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:40.741 UTC [msp] New -> DEBU 1b3 Creating Cache-MSP instance" -"2019-05-02 01:30:40.741 UTC [msp] Setup -> DEBU 1b4 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:40.742 UTC [msp.identity] newIdentity -> DEBU 1b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.162 UTC [protoutils] checkSignatureFromCreator -> DEBU 196 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:16.163 UTC [msp] Validate -> DEBU 197 MSP Org1MSP validating identity" +"2019-05-02 09:27:16.163 UTC [protoutils] checkSignatureFromCreator -> DEBU 198 creator is valid" +"2019-05-02 09:27:16.163 UTC [msp.identity] Verify -> DEBU 199 Verify: digest = 00000000 ec 95 8a 08 31 e6 41 a0 74 24 3f ae b5 e8 13 99 |....1.A.t$?.....| +00000010 02 70 34 54 3f 92 81 6c d9 45 e0 57 5a 56 6e 7f |.p4T?..l.E.WZVn.|" +"2019-05-02 09:27:16.163 UTC [msp.identity] Verify -> DEBU 19a Verify: sig = 00000000 30 44 02 20 11 a5 9e 50 29 82 a9 26 de 9a 9b 76 |0D. ...P)..&...v| +00000010 39 e2 b6 d9 c1 69 06 11 e1 eb 9d c7 fb 54 4e 85 |9....i.......TN.| +00000020 8c 2f 75 82 02 20 0c 25 dc a4 03 c2 b2 34 f6 92 |./u.. .%.....4..| +00000030 d7 fb 22 69 54 60 33 35 ec 14 8e c0 cd 47 1e 68 |.."iT`35.....G.h| +00000040 2b e7 48 0c fc 0f |+.H...|" +"2019-05-02 09:27:16.164 UTC [protoutils] checkSignatureFromCreator -> DEBU 19b exits successfully" +"2019-05-02 09:27:16.164 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19c validateChaincodeProposalMessage starts for proposal 0xc0024b6690, header 0xc0023f3770" +"2019-05-02 09:27:16.165 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19d validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-05-02 09:27:16.165 UTC [endorser] preProcess -> DEBU 19e [][dbf7024a] processing txid: dbf7024a20c887786328981f5471b882c076486d1171040f17166c48d15b8a84" +"2019-05-02 09:27:16.165 UTC [endorser] SimulateProposal -> DEBU 19f [][dbf7024a] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:16.165 UTC [endorser] callChaincode -> INFO 1a0 [][dbf7024a] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:16.166 UTC [chaincode] Execute -> DEBU 1a1 Entry" +"2019-05-02 09:27:16.166 UTC [cscc] Invoke -> DEBU 1a2 Invoke function: JoinChain" +"2019-05-02 09:27:16.167 UTC [common.channelconfig] NewStandardValues -> DEBU 1a3 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a4 Processing field: HashingAlgorithm" +"2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a5 Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a6 Processing field: OrdererAddresses" +"2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a7 Processing field: Consortium" +"2019-05-02 09:27:16.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1a8 Processing field: Capabilities" +"2019-05-02 09:27:16.168 UTC [common.channelconfig] NewStandardValues -> DEBU 1a9 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1aa Processing field: ConsensusType" +"2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ab Processing field: BatchSize" +"2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ac Processing field: BatchTimeout" +"2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ad Processing field: KafkaBrokers" +"2019-05-02 09:27:16.168 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ae Processing field: ChannelRestrictions" +"2019-05-02 09:27:16.169 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1af Processing field: Capabilities" +"2019-05-02 09:27:16.170 UTC [common.channelconfig] NewStandardValues -> DEBU 1b0 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:16.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b1 Processing field: Endpoints" +"2019-05-02 09:27:16.170 UTC [common.channelconfig] NewStandardValues -> DEBU 1b2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:16.170 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b3 Processing field: MSP" +"2019-05-02 09:27:16.171 UTC [common.channelconfig] validateMSP -> DEBU 1b4 Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:16.171 UTC [msp] newBccspMsp -> DEBU 1b5 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:16.171 UTC [msp] New -> DEBU 1b6 Creating Cache-MSP instance" +"2019-05-02 09:27:16.171 UTC [msp] Setup -> DEBU 1b7 Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:16.172 UTC [msp.identity] newIdentity -> DEBU 1b8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-05-02 09:27:16.173 UTC [msp.identity] newIdentity -> DEBU 1b9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:16.174 UTC [msp] Validate -> DEBU 1ba MSP OrdererMSP validating identity" +"2019-05-02 09:27:16.175 UTC [common.channelconfig] NewStandardValues -> DEBU 1bb Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:16.175 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bc Processing field: ACLs" +"2019-05-02 09:27:16.175 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bd Processing field: Capabilities" +"2019-05-02 09:27:16.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1be Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:16.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bf Processing field: AnchorPeers" +"2019-05-02 09:27:16.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1c0 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:16.177 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c1 Processing field: MSP" +"2019-05-02 09:27:16.177 UTC [common.channelconfig] Validate -> DEBU 1c2 Anchor peers for org Org1MSP are " +"2019-05-02 09:27:16.177 UTC [common.channelconfig] validateMSP -> DEBU 1c3 Setting up MSP for org Org1MSP" +"2019-05-02 09:27:16.177 UTC [msp] newBccspMsp -> DEBU 1c4 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:16.177 UTC [msp] New -> DEBU 1c5 Creating Cache-MSP instance" +"2019-05-02 09:27:16.178 UTC [msp] Setup -> DEBU 1c6 Setting up MSP instance Org1MSP" +"2019-05-02 09:27:16.178 UTC [msp.identity] newIdentity -> DEBU 1c7 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1071,7 +1114,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:40.743 UTC [msp.identity] newIdentity -> DEBU 1b6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.179 UTC [msp.identity] newIdentity -> DEBU 1c8 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1085,21 +1128,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:40.744 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1b7 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:40.745 UTC [msp] Validate -> DEBU 1b8 MSP Org1MSP validating identity" -"2019-05-02 01:30:40.745 UTC [msp] getCertificationChain -> DEBU 1b9 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:40.746 UTC [msp] hasOURole -> DEBU 1ba MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:40.746 UTC [msp] getCertificationChain -> DEBU 1bb MSP Org1MSP getting certification chain" -"2019-05-02 01:30:40.746 UTC [common.channelconfig] NewStandardValues -> DEBU 1bc Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:40.746 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bd Processing field: AnchorPeers" -"2019-05-02 01:30:40.746 UTC [common.channelconfig] NewStandardValues -> DEBU 1be Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:40.747 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1bf Processing field: MSP" -"2019-05-02 01:30:40.747 UTC [common.channelconfig] Validate -> DEBU 1c0 Anchor peers for org Org2MSP are " -"2019-05-02 01:30:40.748 UTC [common.channelconfig] validateMSP -> DEBU 1c1 Setting up MSP for org Org2MSP" -"2019-05-02 01:30:40.748 UTC [msp] newBccspMsp -> DEBU 1c2 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:40.748 UTC [msp] New -> DEBU 1c3 Creating Cache-MSP instance" -"2019-05-02 01:30:40.749 UTC [msp] Setup -> DEBU 1c4 Setting up MSP instance Org2MSP" -"2019-05-02 01:30:40.749 UTC [msp.identity] newIdentity -> DEBU 1c5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.181 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c9 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:16.181 UTC [msp] Validate -> DEBU 1ca MSP Org1MSP validating identity" +"2019-05-02 09:27:16.181 UTC [msp] getCertificationChain -> DEBU 1cb MSP Org1MSP getting certification chain" +"2019-05-02 09:27:16.182 UTC [msp] hasOURole -> DEBU 1cc MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:16.182 UTC [msp] getCertificationChain -> DEBU 1cd MSP Org1MSP getting certification chain" +"2019-05-02 09:27:16.182 UTC [common.channelconfig] NewStandardValues -> DEBU 1ce Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:16.183 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: AnchorPeers" +"2019-05-02 09:27:16.183 UTC [common.channelconfig] NewStandardValues -> DEBU 1d0 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:16.183 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d1 Processing field: MSP" +"2019-05-02 09:27:16.183 UTC [common.channelconfig] Validate -> DEBU 1d2 Anchor peers for org Org2MSP are " +"2019-05-02 09:27:16.184 UTC [common.channelconfig] validateMSP -> DEBU 1d3 Setting up MSP for org Org2MSP" +"2019-05-02 09:27:16.184 UTC [msp] newBccspMsp -> DEBU 1d4 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:16.184 UTC [msp] New -> DEBU 1d5 Creating Cache-MSP instance" +"2019-05-02 09:27:16.185 UTC [msp] Setup -> DEBU 1d6 Setting up MSP instance Org2MSP" +"2019-05-02 09:27:16.186 UTC [msp.identity] newIdentity -> DEBU 1d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1114,7 +1157,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:40.750 UTC [msp.identity] newIdentity -> DEBU 1c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.186 UTC [msp.identity] newIdentity -> DEBU 1d8 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1128,175 +1171,132 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:40.754 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c7 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:40.755 UTC [msp] Validate -> DEBU 1c8 MSP Org2MSP validating identity" -"2019-05-02 01:30:40.756 UTC [msp] getCertificationChain -> DEBU 1c9 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:40.757 UTC [msp] hasOURole -> DEBU 1ca MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:40.757 UTC [msp] getCertificationChain -> DEBU 1cb MSP Org2MSP getting certification chain" -"2019-05-02 01:30:40.758 UTC [common.channelconfig] NewStandardValues -> DEBU 1cc Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:40.758 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: ConsensusType" -"2019-05-02 01:30:40.759 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: BatchSize" -"2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: BatchTimeout" -"2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: KafkaBrokers" -"2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d1 Processing field: ChannelRestrictions" -"2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: Capabilities" -"2019-05-02 01:30:40.760 UTC [common.channelconfig] NewStandardValues -> DEBU 1d3 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: Endpoints" -"2019-05-02 01:30:40.760 UTC [common.channelconfig] NewStandardValues -> DEBU 1d5 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:40.760 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6 Processing field: MSP" -"2019-05-02 01:30:40.761 UTC [common.channelconfig] validateMSP -> DEBU 1d7 Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:40.761 UTC [msp] newBccspMsp -> DEBU 1d8 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:40.761 UTC [msp] New -> DEBU 1d9 Creating Cache-MSP instance" -"2019-05-02 01:30:40.761 UTC [msp] Setup -> DEBU 1da Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:40.761 UTC [msp.identity] newIdentity -> DEBU 1db Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-05-02 01:30:40.762 UTC [msp.identity] newIdentity -> DEBU 1dc Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-05-02 01:30:40.763 UTC [msp] Validate -> DEBU 1dd MSP OrdererMSP validating identity" -"2019-05-02 01:30:40.763 UTC [msp] Setup -> DEBU 1de Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:40.763 UTC [msp] Setup -> DEBU 1df MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:40.764 UTC [common.capabilities] Supported -> DEBU 1e0 Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:40.764 UTC [common.capabilities] Supported -> DEBU 1e1 Application capability V2_0 is supported and is enabled" -"2019-05-02 01:30:40.764 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e2 Checking if identity satisfies ADMIN role for Org1MSP" -"2019-05-02 01:30:40.764 UTC [msp.identity] Verify -> DEBU 1e3 Verify: digest = 00000000 6f 78 a3 d9 de ea c6 08 34 f4 b1 d7 a1 ca db 13 |ox......4.......| -00000010 ff c4 ac ff c2 f0 b8 ca dc da 80 6d 63 81 a2 72 |...........mc..r|" -"2019-05-02 01:30:40.764 UTC [msp.identity] Verify -> DEBU 1e4 Verify: sig = 00000000 30 45 02 21 00 df 83 90 76 d2 20 1b 8e 8a 24 cc |0E.!....v. ...$.| -00000010 f0 d4 f9 77 b3 ba e5 12 df a3 85 71 53 c9 2d 02 |...w.......qS.-.| -00000020 95 b4 bd 22 90 02 20 30 28 68 bf 64 12 48 65 52 |...".. 0(h.d.HeR| -00000030 04 d2 aa 54 ac 6c 68 c2 ac 77 ad bb d6 12 26 dd |...T.lh..w....&.| -00000040 c8 7e 9a 42 f6 d3 89 |.~.B...|" -"2019-05-02 01:30:40.765 UTC [ledgermgmt] CreateLedger -> INFO 1e5 Creating ledger [businesschannel] with genesis block" -"2019-05-02 01:30:40.778 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1e6 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " -"2019-05-02 01:30:40.778 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1e7 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" -"2019-05-02 01:30:40.778 UTC [kvledger.util] logDirStatus -> DEBU 1e8 Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" -"2019-05-02 01:30:40.780 UTC [kvledger.util] logDirStatus -> DEBU 1e9 After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" -"2019-05-02 01:30:40.781 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ea Getting block information from block storage" -"2019-05-02 01:30:40.781 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1eb Retrieving checkpoint info from block files" -"2019-05-02 01:30:40.781 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ec retrieveLastFileSuffix()" -"2019-05-02 01:30:40.781 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ed retrieveLastFileSuffix() - biggestFileNum = -1" -"2019-05-02 01:30:40.781 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ee Last file number found = -1" -"2019-05-02 01:30:40.781 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ef No block file found" -"2019-05-02 01:30:40.781 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1f0 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0025a53c0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -"2019-05-02 01:30:40.785 UTC [fsblkstorage] newBlockIndex -> DEBU 1f1 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" -"2019-05-02 01:30:40.785 UTC [pvtdatastorage] OpenStore -> DEBU 1f2 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" -"2019-05-02 01:30:40.785 UTC [leveldbhelper] GetIterator -> DEBU 1f3 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" -"2019-05-02 01:30:40.785 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f4 Starting to process collection eligibility events" -"2019-05-02 01:30:40.785 UTC [kvledger] newKVLedger -> DEBU 1f5 Creating KVLedger ledgerID=businesschannel: " -"2019-05-02 01:30:40.785 UTC [leveldbhelper] GetIterator -> DEBU 1f6 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" -"2019-05-02 01:30:40.785 UTC [kvledger] newKVLedger -> DEBU 1f7 Register state db for chaincode lifecycle events: false" -"2019-05-02 01:30:40.785 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f8 Converted [0] inelligible mising data entries to elligible" -"2019-05-02 01:30:40.785 UTC [pvtdatastorage] func1 -> DEBU 1f9 Waiting for collection eligibility event" -"2019-05-02 01:30:40.785 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1fa constructing new query executor txid = []" -"2019-05-02 01:30:40.785 UTC [leveldbhelper] GetIterator -> DEBU 1fb Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x7f}]" -"2019-05-02 01:30:40.785 UTC [lockbasedtxmgr] Done -> DEBU 1fc Done with transaction simulation / query execution []" -"2019-05-02 01:30:40.785 UTC [kvledger] recoverDBs -> DEBU 1fd Entering recoverDB()" -"2019-05-02 01:30:40.785 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1fe Block storage is empty." -"2019-05-02 01:30:40.785 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ff Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:30:40.786 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 200 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" -"2019-05-02 01:30:40.786 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 201 Constructing unique pvtData by removing duplicate entries" -"2019-05-02 01:30:40.789 UTC [kvledger] CommitWithPvtData -> DEBU 202 [businesschannel] Validating state for block [0]" -"2019-05-02 01:30:40.789 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 203 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:30:40.789 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 204 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-05-02 01:30:40.790 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 205 Validating new block with num trans = [1]" -"2019-05-02 01:30:40.790 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 206 ValidateAndPrepareBatch() for block number = [0]" -"2019-05-02 01:30:40.790 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 207 preprocessing ProtoBlock..." -"2019-05-02 01:30:40.790 UTC [valimpl] preprocessProtoBlock -> DEBU 208 txType=CONFIG" -"2019-05-02 01:30:40.790 UTC [valimpl] processNonEndorserTx -> DEBU 209 Performing custom processing for transaction [txid=], [txType=CONFIG]" -"2019-05-02 01:30:40.790 UTC [valimpl] processNonEndorserTx -> DEBU 20a Processor for custom tx processing:&peer.configtxProcessor{}" -"2019-05-02 01:30:40.790 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 20b constructing new tx simulator" -"2019-05-02 01:30:40.790 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 20c constructing new tx simulator txid = []" -"2019-05-02 01:30:40.791 UTC [peer] GenerateSimulationResults -> DEBU 20d Processing CONFIG" -"2019-05-02 01:30:40.792 UTC [peer] processChannelConfigTx -> DEBU 20e channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -"2019-05-02 01:30:40.792 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 20f Simulation completed, getting simulation results" -"2019-05-02 01:30:40.792 UTC [lockbasedtxmgr] Done -> DEBU 210 Done with transaction simulation / query execution []" -"2019-05-02 01:30:40.792 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 211 Block [0] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" -"2019-05-02 01:30:40.792 UTC [valinternal] ApplyWriteSet -> DEBU 212 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0025c1100)}" -"2019-05-02 01:30:40.792 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 213 validating rwset..." -"2019-05-02 01:30:40.792 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 214 postprocessing ProtoBlock..." -"2019-05-02 01:30:40.792 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 215 ValidateAndPrepareBatch() complete" -"2019-05-02 01:30:40.792 UTC [kvledger] CommitWithPvtData -> DEBU 216 [businesschannel] Committing block [0] to storage" -"2019-05-02 01:30:40.792 UTC [ledgerstorage] CommitWithPvtData -> DEBU 217 Writing block [0] to pvt block store" -"2019-05-02 01:30:40.795 UTC [pvtdatastorage] Prepare -> DEBU 218 Saved 0 private data write sets for block [0]" -"2019-05-02 01:30:40.799 UTC [fsblkstorage] indexBlock -> DEBU 219 Indexing block [blockNum=0, blockHash=[]byte{0xad, 0x7c, 0xdc, 0x87, 0x83, 0xa5, 0x2c, 0x74, 0x62, 0x49, 0x6a, 0xb, 0xdd, 0xfc, 0x97, 0xee, 0x22, 0x89, 0x41, 0x3b, 0xf7, 0xba, 0x29, 0xe, 0xd2, 0xf8, 0x28, 0x95, 0x25, 0x2d, 0x23, 0x51} txOffsets= -txId= locPointer=offset=39, bytesLength=23896 +"2019-05-02 09:27:16.188 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1d9 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:16.188 UTC [msp] Validate -> DEBU 1da MSP Org2MSP validating identity" +"2019-05-02 09:27:16.188 UTC [msp] getCertificationChain -> DEBU 1db MSP Org2MSP getting certification chain" +"2019-05-02 09:27:16.189 UTC [msp] hasOURole -> DEBU 1dc MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:16.189 UTC [msp] getCertificationChain -> DEBU 1dd MSP Org2MSP getting certification chain" +"2019-05-02 09:27:16.189 UTC [msp] Setup -> DEBU 1de Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:16.189 UTC [msp] Setup -> DEBU 1df MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:16.189 UTC [common.capabilities] Supported -> DEBU 1e0 Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:16.189 UTC [common.capabilities] Supported -> DEBU 1e1 Application capability V2_0 is supported and is enabled" +"2019-05-02 09:27:16.189 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e2 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-05-02 09:27:16.189 UTC [msp.identity] Verify -> DEBU 1e3 Verify: digest = 00000000 ec 95 8a 08 31 e6 41 a0 74 24 3f ae b5 e8 13 99 |....1.A.t$?.....| +00000010 02 70 34 54 3f 92 81 6c d9 45 e0 57 5a 56 6e 7f |.p4T?..l.E.WZVn.|" +"2019-05-02 09:27:16.189 UTC [msp.identity] Verify -> DEBU 1e4 Verify: sig = 00000000 30 44 02 20 11 a5 9e 50 29 82 a9 26 de 9a 9b 76 |0D. ...P)..&...v| +00000010 39 e2 b6 d9 c1 69 06 11 e1 eb 9d c7 fb 54 4e 85 |9....i.......TN.| +00000020 8c 2f 75 82 02 20 0c 25 dc a4 03 c2 b2 34 f6 92 |./u.. .%.....4..| +00000030 d7 fb 22 69 54 60 33 35 ec 14 8e c0 cd 47 1e 68 |.."iT`35.....G.h| +00000040 2b e7 48 0c fc 0f |+.H...|" +"2019-05-02 09:27:16.191 UTC [ledgermgmt] CreateLedger -> INFO 1e5 Creating ledger [businesschannel] with genesis block" +"2019-05-02 09:27:16.195 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1e6 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-05-02 09:27:16.195 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1e7 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" +"2019-05-02 09:27:16.195 UTC [kvledger.util] logDirStatus -> DEBU 1e8 Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" +"2019-05-02 09:27:16.195 UTC [kvledger.util] logDirStatus -> DEBU 1e9 After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" +"2019-05-02 09:27:16.196 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ea Getting block information from block storage" +"2019-05-02 09:27:16.197 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1eb Retrieving checkpoint info from block files" +"2019-05-02 09:27:16.197 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ec retrieveLastFileSuffix()" +"2019-05-02 09:27:16.197 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ed retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-05-02 09:27:16.198 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ee Last file number found = -1" +"2019-05-02 09:27:16.198 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ef No block file found" +"2019-05-02 09:27:16.198 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1f0 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0025cc7c0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-05-02 09:27:16.202 UTC [fsblkstorage] newBlockIndex -> DEBU 1f1 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" +"2019-05-02 09:27:16.203 UTC [pvtdatastorage] OpenStore -> DEBU 1f2 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" +"2019-05-02 09:27:16.203 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f3 Starting to process collection eligibility events" +"2019-05-02 09:27:16.203 UTC [leveldbhelper] GetIterator -> DEBU 1f4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" +"2019-05-02 09:27:16.203 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f5 Converted [0] inelligible mising data entries to elligible" +"2019-05-02 09:27:16.204 UTC [pvtdatastorage] func1 -> DEBU 1f6 Waiting for collection eligibility event" +"2019-05-02 09:27:16.204 UTC [leveldbhelper] GetIterator -> DEBU 1f7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" +"2019-05-02 09:27:16.204 UTC [kvledger] newKVLedger -> DEBU 1f8 Creating KVLedger ledgerID=businesschannel: " +"2019-05-02 09:27:16.204 UTC [kvledger] newKVLedger -> DEBU 1f9 Register state db for chaincode lifecycle events: false" +"2019-05-02 09:27:16.205 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1fa constructing new query executor txid = []" +"2019-05-02 09:27:16.206 UTC [leveldbhelper] GetIterator -> DEBU 1fb Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x7f}]" +"2019-05-02 09:27:16.206 UTC [lockbasedtxmgr] Done -> DEBU 1fc Done with transaction simulation / query execution []" +"2019-05-02 09:27:16.206 UTC [kvledger] recoverDBs -> DEBU 1fd Entering recoverDB()" +"2019-05-02 09:27:16.206 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1fe Block storage is empty." +"2019-05-02 09:27:16.206 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ff Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:27:16.206 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 200 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" +"2019-05-02 09:27:16.207 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 201 Constructing unique pvtData by removing duplicate entries" +"2019-05-02 09:27:16.210 UTC [kvledger] CommitWithPvtData -> DEBU 202 [businesschannel] Validating state for block [0]" +"2019-05-02 09:27:16.210 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 203 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:27:16.210 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 204 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-05-02 09:27:16.210 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 205 Validating new block with num trans = [1]" +"2019-05-02 09:27:16.210 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 206 ValidateAndPrepareBatch() for block number = [0]" +"2019-05-02 09:27:16.211 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 207 preprocessing ProtoBlock..." +"2019-05-02 09:27:16.211 UTC [valimpl] preprocessProtoBlock -> DEBU 208 txType=CONFIG" +"2019-05-02 09:27:16.211 UTC [valimpl] processNonEndorserTx -> DEBU 209 Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-05-02 09:27:16.211 UTC [valimpl] processNonEndorserTx -> DEBU 20a Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-05-02 09:27:16.212 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 20b constructing new tx simulator" +"2019-05-02 09:27:16.212 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 20c constructing new tx simulator txid = []" +"2019-05-02 09:27:16.212 UTC [peer] GenerateSimulationResults -> DEBU 20d Processing CONFIG" +"2019-05-02 09:27:16.216 UTC [peer] processChannelConfigTx -> DEBU 20e channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-05-02 09:27:16.216 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 20f Simulation completed, getting simulation results" +"2019-05-02 09:27:16.217 UTC [lockbasedtxmgr] Done -> DEBU 210 Done with transaction simulation / query execution []" +"2019-05-02 09:27:16.217 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 211 Block [0] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +"2019-05-02 09:27:16.217 UTC [valinternal] ApplyWriteSet -> DEBU 212 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0025df140)}" +"2019-05-02 09:27:16.217 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 213 validating rwset..." +"2019-05-02 09:27:16.218 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 214 postprocessing ProtoBlock..." +"2019-05-02 09:27:16.218 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 215 ValidateAndPrepareBatch() complete" +"2019-05-02 09:27:16.218 UTC [kvledger] CommitWithPvtData -> DEBU 216 [businesschannel] Committing block [0] to storage" +"2019-05-02 09:27:16.218 UTC [ledgerstorage] CommitWithPvtData -> DEBU 217 Writing block [0] to pvt block store" +"2019-05-02 09:27:16.221 UTC [pvtdatastorage] Prepare -> DEBU 218 Saved 0 private data write sets for block [0]" +"2019-05-02 09:27:16.225 UTC [fsblkstorage] indexBlock -> DEBU 219 Indexing block [blockNum=0, blockHash=[]byte{0x26, 0xf2, 0x93, 0x1, 0xed, 0x1c, 0x73, 0x48, 0xfc, 0x20, 0x75, 0x55, 0x5, 0x51, 0x67, 0x25, 0xf3, 0x5a, 0xec, 0x82, 0x34, 0x6d, 0xbc, 0x24, 0xb7, 0xb3, 0xb4, 0x5c, 0xd0, 0xdf, 0x9, 0xb3} txOffsets= +txId= locPointer=offset=39, bytesLength=23894 ]" -"2019-05-02 01:30:40.799 UTC [fsblkstorage] indexBlock -> DEBU 21a Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23896] for tx ID: [] to txid-index" -"2019-05-02 01:30:40.799 UTC [fsblkstorage] indexBlock -> DEBU 21b Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23896] for tx number:[0] ID: [] to blockNumTranNum index" -"2019-05-02 01:30:40.802 UTC [fsblkstorage] updateCheckpoint -> DEBU 21c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23941], isChainEmpty=[false], lastBlockNumber=[0]" -"2019-05-02 01:30:40.802 UTC [pvtdatastorage] Commit -> DEBU 21d Committing private data for block [0]" -"2019-05-02 01:30:40.805 UTC [pvtdatastorage] Commit -> DEBU 21e Committed private data for block [0]" -"2019-05-02 01:30:40.805 UTC [kvledger] CommitWithPvtData -> DEBU 21f [businesschannel] Committing block [0] transactions to state database" -"2019-05-02 01:30:40.805 UTC [pvtdatastorage] func1 -> DEBU 220 Purger started: Purging expired private data till block number [0]" -"2019-05-02 01:30:40.805 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 221 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" -"2019-05-02 01:30:40.805 UTC [lockbasedtxmgr] Commit -> DEBU 222 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-05-02 01:30:40.805 UTC [leveldbhelper] GetIterator -> DEBU 223 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" -"2019-05-02 01:30:40.806 UTC [pvtdatastorage] func1 -> DEBU 224 Purger finished" -"2019-05-02 01:30:40.806 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 225 Preparing potential purge list working-set for expiringAtBlk [0]" -"2019-05-02 01:30:40.806 UTC [leveldbhelper] GetIterator -> DEBU 226 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" -"2019-05-02 01:30:40.806 UTC [lockbasedtxmgr] Commit -> DEBU 227 Committing updates to state database" -"2019-05-02 01:30:40.806 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 228 No expiry entry found for expiringAtBlk [0]" -"2019-05-02 01:30:40.806 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 229 Building the expiry schedules based on the update batch" -"2019-05-02 01:30:40.806 UTC [lockbasedtxmgr] Commit -> DEBU 22a Write lock acquired for committing updates to state database" -"2019-05-02 01:30:40.806 UTC [stateleveldb] ApplyUpdates -> DEBU 22b Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -"2019-05-02 01:30:40.809 UTC [lockbasedtxmgr] Commit -> DEBU 22c Updates committed to state database and the write lock is released" -"2019-05-02 01:30:40.809 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 22d Preparing potential purge list working-set for expiringAtBlk [1]" -"2019-05-02 01:30:40.809 UTC [leveldbhelper] GetIterator -> DEBU 22e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" -"2019-05-02 01:30:40.809 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 22f No expiry entry found for expiringAtBlk [1]" -"2019-05-02 01:30:40.809 UTC [lockbasedtxmgr] func1 -> DEBU 230 launched the background routine for preparing keys to purge with the next block" -"2019-05-02 01:30:40.809 UTC [kvledger] CommitWithPvtData -> DEBU 231 [businesschannel] Committing block [0] transactions to history database" -"2019-05-02 01:30:40.809 UTC [historyleveldb] Commit -> DEBU 232 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" -"2019-05-02 01:30:40.809 UTC [historyleveldb] Commit -> DEBU 233 Skipping transaction [0] since it is not an endorsement transaction" -"2019-05-02 01:30:40.812 UTC [historyleveldb] Commit -> DEBU 234 Channel [businesschannel]: Updates committed to history database for blockNo [0]" -"2019-05-02 01:30:40.812 UTC [kvledger] CommitWithPvtData -> INFO 235 [businesschannel] Committed block [0] with 1 transaction(s) in 22ms (state_validation=2ms block_commit=12ms state_commit=4ms)" -"2019-05-02 01:30:40.815 UTC [ledgermgmt] CreateLedger -> INFO 236 Created ledger [businesschannel] with genesis block" -"2019-05-02 01:30:40.815 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 237 constructing new query executor txid = [bca46409-a767-4df7-a709-b1fca8800cf3]" -"2019-05-02 01:30:40.815 UTC [stateleveldb] GetState -> DEBU 238 GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" -"2019-05-02 01:30:40.815 UTC [lockbasedtxmgr] Done -> DEBU 239 Done with transaction simulation / query execution [bca46409-a767-4df7-a709-b1fca8800cf3]" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] NewStandardValues -> DEBU 23a Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: HashingAlgorithm" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: OrdererAddresses" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: Consortium" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: Capabilities" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: ConsensusType" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BatchSize" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: BatchTimeout" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: KafkaBrokers" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: ChannelRestrictions" -"2019-05-02 01:30:40.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: Capabilities" -"2019-05-02 01:30:40.817 UTC [common.channelconfig] NewStandardValues -> DEBU 247 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:40.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: Endpoints" -"2019-05-02 01:30:40.817 UTC [common.channelconfig] NewStandardValues -> DEBU 249 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:40.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: MSP" -"2019-05-02 01:30:40.817 UTC [common.channelconfig] validateMSP -> DEBU 24b Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:40.817 UTC [msp] newBccspMsp -> DEBU 24c Creating BCCSP-based MSP instance" -"2019-05-02 01:30:40.817 UTC [msp] New -> DEBU 24d Creating Cache-MSP instance" -"2019-05-02 01:30:40.817 UTC [msp] Setup -> DEBU 24e Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:40.817 UTC [msp.identity] newIdentity -> DEBU 24f Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.225 UTC [fsblkstorage] indexBlock -> DEBU 21a Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23894] for tx ID: [] to txid-index" +"2019-05-02 09:27:16.225 UTC [fsblkstorage] indexBlock -> DEBU 21b Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23894] for tx number:[0] ID: [] to blockNumTranNum index" +"2019-05-02 09:27:16.228 UTC [fsblkstorage] updateCheckpoint -> DEBU 21c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23939], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-05-02 09:27:16.229 UTC [pvtdatastorage] Commit -> DEBU 21d Committing private data for block [0]" +"2019-05-02 09:27:16.231 UTC [pvtdatastorage] Commit -> DEBU 21e Committed private data for block [0]" +"2019-05-02 09:27:16.231 UTC [pvtdatastorage] func1 -> DEBU 21f Purger started: Purging expired private data till block number [0]" +"2019-05-02 09:27:16.231 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 220 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" +"2019-05-02 09:27:16.232 UTC [leveldbhelper] GetIterator -> DEBU 221 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" +"2019-05-02 09:27:16.232 UTC [pvtdatastorage] func1 -> DEBU 222 Purger finished" +"2019-05-02 09:27:16.231 UTC [kvledger] CommitWithPvtData -> DEBU 223 [businesschannel] Committing block [0] transactions to state database" +"2019-05-02 09:27:16.232 UTC [lockbasedtxmgr] Commit -> DEBU 224 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-05-02 09:27:16.232 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 225 Preparing potential purge list working-set for expiringAtBlk [0]" +"2019-05-02 09:27:16.232 UTC [leveldbhelper] GetIterator -> DEBU 226 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" +"2019-05-02 09:27:16.233 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 227 No expiry entry found for expiringAtBlk [0]" +"2019-05-02 09:27:16.233 UTC [lockbasedtxmgr] Commit -> DEBU 228 Committing updates to state database" +"2019-05-02 09:27:16.233 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 229 Building the expiry schedules based on the update batch" +"2019-05-02 09:27:16.233 UTC [lockbasedtxmgr] Commit -> DEBU 22a Write lock acquired for committing updates to state database" +"2019-05-02 09:27:16.233 UTC [stateleveldb] ApplyUpdates -> DEBU 22b Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-05-02 09:27:16.236 UTC [lockbasedtxmgr] Commit -> DEBU 22c Updates committed to state database and the write lock is released" +"2019-05-02 09:27:16.236 UTC [lockbasedtxmgr] func1 -> DEBU 22d launched the background routine for preparing keys to purge with the next block" +"2019-05-02 09:27:16.236 UTC [kvledger] CommitWithPvtData -> DEBU 22e [businesschannel] Committing block [0] transactions to history database" +"2019-05-02 09:27:16.237 UTC [historyleveldb] Commit -> DEBU 22f Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" +"2019-05-02 09:27:16.237 UTC [historyleveldb] Commit -> DEBU 230 Skipping transaction [0] since it is not an endorsement transaction" +"2019-05-02 09:27:16.236 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 231 Preparing potential purge list working-set for expiringAtBlk [1]" +"2019-05-02 09:27:16.238 UTC [leveldbhelper] GetIterator -> DEBU 232 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" +"2019-05-02 09:27:16.238 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 233 No expiry entry found for expiringAtBlk [1]" +"2019-05-02 09:27:16.240 UTC [historyleveldb] Commit -> DEBU 234 Channel [businesschannel]: Updates committed to history database for blockNo [0]" +"2019-05-02 09:27:16.240 UTC [kvledger] CommitWithPvtData -> INFO 235 [businesschannel] Committed block [0] with 1 transaction(s) in 30ms (state_validation=8ms block_commit=12ms state_commit=5ms)" +"2019-05-02 09:27:16.244 UTC [ledgermgmt] CreateLedger -> INFO 236 Created ledger [businesschannel] with genesis block" +"2019-05-02 09:27:16.244 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 237 constructing new query executor txid = [3c4bb870-9db6-45fa-a5ec-324bd6705f2e]" +"2019-05-02 09:27:16.244 UTC [stateleveldb] GetState -> DEBU 238 GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" +"2019-05-02 09:27:16.245 UTC [lockbasedtxmgr] Done -> DEBU 239 Done with transaction simulation / query execution [3c4bb870-9db6-45fa-a5ec-324bd6705f2e]" +"2019-05-02 09:27:16.245 UTC [common.channelconfig] NewStandardValues -> DEBU 23a Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: HashingAlgorithm" +"2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: OrdererAddresses" +"2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: Consortium" +"2019-05-02 09:27:16.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: Capabilities" +"2019-05-02 09:27:16.247 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: ConsensusType" +"2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BatchSize" +"2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: BatchTimeout" +"2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: KafkaBrokers" +"2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: ChannelRestrictions" +"2019-05-02 09:27:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: Capabilities" +"2019-05-02 09:27:16.248 UTC [common.channelconfig] NewStandardValues -> DEBU 247 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:16.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: Endpoints" +"2019-05-02 09:27:16.248 UTC [common.channelconfig] NewStandardValues -> DEBU 249 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:16.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: MSP" +"2019-05-02 09:27:16.248 UTC [common.channelconfig] validateMSP -> DEBU 24b Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:16.249 UTC [msp] newBccspMsp -> DEBU 24c Creating BCCSP-based MSP instance" +"2019-05-02 09:27:16.249 UTC [msp] New -> DEBU 24d Creating Cache-MSP instance" +"2019-05-02 09:27:16.249 UTC [msp] Setup -> DEBU 24e Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:16.250 UTC [msp.identity] newIdentity -> DEBU 24f Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1310,7 +1310,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:40.817 UTC [msp.identity] newIdentity -> DEBU 250 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.251 UTC [msp.identity] newIdentity -> DEBU 250 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1323,20 +1323,20 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:30:40.818 UTC [msp] Validate -> DEBU 251 MSP OrdererMSP validating identity" -"2019-05-02 01:30:40.818 UTC [common.channelconfig] NewStandardValues -> DEBU 252 Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:40.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 253 Processing field: ACLs" -"2019-05-02 01:30:40.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 254 Processing field: Capabilities" -"2019-05-02 01:30:40.818 UTC [common.channelconfig] NewStandardValues -> DEBU 255 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:40.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 256 Processing field: AnchorPeers" -"2019-05-02 01:30:40.818 UTC [common.channelconfig] NewStandardValues -> DEBU 257 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:40.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 258 Processing field: MSP" -"2019-05-02 01:30:40.818 UTC [common.channelconfig] Validate -> DEBU 259 Anchor peers for org Org1MSP are " -"2019-05-02 01:30:40.818 UTC [common.channelconfig] validateMSP -> DEBU 25a Setting up MSP for org Org1MSP" -"2019-05-02 01:30:40.819 UTC [msp] newBccspMsp -> DEBU 25b Creating BCCSP-based MSP instance" -"2019-05-02 01:30:40.819 UTC [msp] New -> DEBU 25c Creating Cache-MSP instance" -"2019-05-02 01:30:40.819 UTC [msp] Setup -> DEBU 25d Setting up MSP instance Org1MSP" -"2019-05-02 01:30:40.822 UTC [msp.identity] newIdentity -> DEBU 25e Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.252 UTC [msp] Validate -> DEBU 251 MSP OrdererMSP validating identity" +"2019-05-02 09:27:16.252 UTC [common.channelconfig] NewStandardValues -> DEBU 252 Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:16.252 UTC [common.channelconfig] initializeProtosStruct -> DEBU 253 Processing field: ACLs" +"2019-05-02 09:27:16.252 UTC [common.channelconfig] initializeProtosStruct -> DEBU 254 Processing field: Capabilities" +"2019-05-02 09:27:16.252 UTC [common.channelconfig] NewStandardValues -> DEBU 255 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:16.252 UTC [common.channelconfig] initializeProtosStruct -> DEBU 256 Processing field: AnchorPeers" +"2019-05-02 09:27:16.253 UTC [common.channelconfig] NewStandardValues -> DEBU 257 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:16.253 UTC [common.channelconfig] initializeProtosStruct -> DEBU 258 Processing field: MSP" +"2019-05-02 09:27:16.253 UTC [common.channelconfig] Validate -> DEBU 259 Anchor peers for org Org1MSP are " +"2019-05-02 09:27:16.253 UTC [common.channelconfig] validateMSP -> DEBU 25a Setting up MSP for org Org1MSP" +"2019-05-02 09:27:16.253 UTC [msp] newBccspMsp -> DEBU 25b Creating BCCSP-based MSP instance" +"2019-05-02 09:27:16.254 UTC [msp] New -> DEBU 25c Creating Cache-MSP instance" +"2019-05-02 09:27:16.254 UTC [msp] Setup -> DEBU 25d Setting up MSP instance Org1MSP" +"2019-05-02 09:27:16.254 UTC [msp.identity] newIdentity -> DEBU 25e Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1351,7 +1351,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:40.823 UTC [msp.identity] newIdentity -> DEBU 25f Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.255 UTC [msp.identity] newIdentity -> DEBU 25f Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1365,21 +1365,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:40.824 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 260 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:40.824 UTC [msp] Validate -> DEBU 261 MSP Org1MSP validating identity" -"2019-05-02 01:30:40.825 UTC [msp] getCertificationChain -> DEBU 262 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:40.826 UTC [msp] hasOURole -> DEBU 263 MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:40.826 UTC [msp] getCertificationChain -> DEBU 264 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:40.827 UTC [common.channelconfig] NewStandardValues -> DEBU 265 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:40.827 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: AnchorPeers" -"2019-05-02 01:30:40.827 UTC [common.channelconfig] NewStandardValues -> DEBU 267 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:40.827 UTC [common.channelconfig] initializeProtosStruct -> DEBU 268 Processing field: MSP" -"2019-05-02 01:30:40.828 UTC [common.channelconfig] Validate -> DEBU 269 Anchor peers for org Org2MSP are " -"2019-05-02 01:30:40.828 UTC [common.channelconfig] validateMSP -> DEBU 26a Setting up MSP for org Org2MSP" -"2019-05-02 01:30:40.829 UTC [msp] newBccspMsp -> DEBU 26b Creating BCCSP-based MSP instance" -"2019-05-02 01:30:40.829 UTC [msp] New -> DEBU 26c Creating Cache-MSP instance" -"2019-05-02 01:30:40.829 UTC [msp] Setup -> DEBU 26d Setting up MSP instance Org2MSP" -"2019-05-02 01:30:40.829 UTC [msp.identity] newIdentity -> DEBU 26e Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.256 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 260 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:16.256 UTC [msp] Validate -> DEBU 261 MSP Org1MSP validating identity" +"2019-05-02 09:27:16.256 UTC [msp] getCertificationChain -> DEBU 262 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:16.256 UTC [msp] hasOURole -> DEBU 263 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:16.257 UTC [msp] getCertificationChain -> DEBU 264 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:16.257 UTC [common.channelconfig] NewStandardValues -> DEBU 265 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:16.257 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: AnchorPeers" +"2019-05-02 09:27:16.257 UTC [common.channelconfig] NewStandardValues -> DEBU 267 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:16.257 UTC [common.channelconfig] initializeProtosStruct -> DEBU 268 Processing field: MSP" +"2019-05-02 09:27:16.258 UTC [common.channelconfig] Validate -> DEBU 269 Anchor peers for org Org2MSP are " +"2019-05-02 09:27:16.258 UTC [common.channelconfig] validateMSP -> DEBU 26a Setting up MSP for org Org2MSP" +"2019-05-02 09:27:16.258 UTC [msp] newBccspMsp -> DEBU 26b Creating BCCSP-based MSP instance" +"2019-05-02 09:27:16.258 UTC [msp] New -> DEBU 26c Creating Cache-MSP instance" +"2019-05-02 09:27:16.258 UTC [msp] Setup -> DEBU 26d Setting up MSP instance Org2MSP" +"2019-05-02 09:27:16.259 UTC [msp.identity] newIdentity -> DEBU 26e Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1394,7 +1394,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:40.830 UTC [msp.identity] newIdentity -> DEBU 26f Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.260 UTC [msp.identity] newIdentity -> DEBU 26f Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1408,320 +1408,186 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:40.832 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 270 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:40.832 UTC [msp] Validate -> DEBU 271 MSP Org2MSP validating identity" -"2019-05-02 01:30:40.832 UTC [msp] getCertificationChain -> DEBU 272 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:40.833 UTC [msp] hasOURole -> DEBU 273 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:40.833 UTC [msp] getCertificationChain -> DEBU 274 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:40.834 UTC [msp] Setup -> DEBU 275 Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:40.834 UTC [msp] Setup -> DEBU 276 MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:40.834 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:40.834 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:40.834 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:40.835 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:40.835 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:40.835 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:40.836 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:40.836 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:40.836 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:40.836 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:40.836 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:40.837 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:40.837 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:40.837 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:40.838 UTC [policies] NewManagerImpl -> DEBU 285 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:40.838 UTC [policies] NewManagerImpl -> DEBU 286 Proposed new policy Writers for Channel/Application" -"2019-05-02 01:30:40.838 UTC [policies] NewManagerImpl -> DEBU 287 Proposed new policy Admins for Channel/Application" -"2019-05-02 01:30:40.838 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:30:40.839 UTC [policies] NewManagerImpl -> DEBU 289 Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:30:40.839 UTC [policies] NewManagerImpl -> DEBU 28a Proposed new policy Readers for Channel/Application" -"2019-05-02 01:30:40.839 UTC [policies] NewManagerImpl -> DEBU 28b Proposed new policy Admins for Channel" -"2019-05-02 01:30:40.839 UTC [policies] NewManagerImpl -> DEBU 28c Proposed new policy Readers for Channel" -"2019-05-02 01:30:40.839 UTC [policies] NewManagerImpl -> DEBU 28d Proposed new policy Writers for Channel" -"2019-05-02 01:30:40.840 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Group] /Channel" -"2019-05-02 01:30:40.840 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:40.841 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:40.841 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:40.841 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:40.842 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:40.842 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:40.842 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:40.843 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:40.843 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:40.843 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:40.843 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:40.844 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:40.844 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:40.844 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:40.845 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:40.845 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:40.845 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:40.845 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:40.846 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:40.846 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:40.847 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:40.847 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:40.847 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:40.848 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:40.848 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:40.849 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:40.849 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:40.850 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:40.850 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:40.850 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:40.850 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:40.851 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:40.851 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:40.851 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:40.851 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:40.851 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:40.852 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:40.853 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:40.853 UTC [common.capabilities] Supported -> DEBU 2ba Application capability V2_0 is supported and is enabled" -"2019-05-02 01:30:40.854 UTC [common.capabilities] Supported -> DEBU 2bb Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:40.854 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bc As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:30:40.854 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bd As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:30:40.854 UTC [policies] Manager -> DEBU 2be Manager Channel looking up path [Application]" -"2019-05-02 01:30:40.855 UTC [policies] Manager -> DEBU 2bf Manager Channel has managers Orderer" -"2019-05-02 01:30:40.855 UTC [policies] Manager -> DEBU 2c0 Manager Channel has managers Application" -"2019-05-02 01:30:40.855 UTC [policies] Manager -> DEBU 2c1 Manager Channel/Application looking up path []" -"2019-05-02 01:30:40.855 UTC [policies] Manager -> DEBU 2c2 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:40.856 UTC [policies] Manager -> DEBU 2c3 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:40.856 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c4 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:30:40.856 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c5 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:30:40.856 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c6 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:30:40.856 UTC [policies] Manager -> DEBU 2c7 Manager Channel looking up path [Orderer]" -"2019-05-02 01:30:40.857 UTC [policies] Manager -> DEBU 2c8 Manager Channel has managers Orderer" -"2019-05-02 01:30:40.857 UTC [policies] Manager -> DEBU 2c9 Manager Channel has managers Application" -"2019-05-02 01:30:40.858 UTC [policies] Manager -> DEBU 2ca Manager Channel/Orderer looking up path []" -"2019-05-02 01:30:40.858 UTC [policies] Manager -> DEBU 2cb Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:30:40.858 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:30:40.858 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2cd Processing new config for channel businesschannel" -"2019-05-02 01:30:40.859 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2ce Calling out because config was updated for channel businesschannel" -"2019-05-02 01:30:40.859 UTC [gossip.service] updateAnchors -> DEBU 2cf Org1MSP anchor peers: []" -"2019-05-02 01:30:40.861 UTC [gossip.service] updateAnchors -> DEBU 2d0 Org2MSP anchor peers: []" -"2019-05-02 01:30:40.861 UTC [gossip.service] updateAnchors -> DEBU 2d1 Creating state provider for chainID businesschannel" -"2019-05-02 01:30:40.861 UTC [gossip.gossip] JoinChan -> INFO 2d2 Joining gossip network of channel businesschannel with 2 organizations" -"2019-05-02 01:30:40.861 UTC [gossip.gossip] learnAnchorPeers -> INFO 2d3 No configured anchor peers of Org1MSP for channel businesschannel to learn about" -"2019-05-02 01:30:40.861 UTC [gossip.gossip] learnAnchorPeers -> INFO 2d4 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -"2019-05-02 01:30:40.862 UTC [peer] updateTrustedRoots -> DEBU 2d5 Updating trusted root authorities for channel businesschannel" -"2019-05-02 01:30:40.875 UTC [peer] buildTrustedRootsForChain -> DEBU 2d6 updating root CAs for channel [businesschannel]" -"2019-05-02 01:30:40.875 UTC [peer] buildTrustedRootsForChain -> DEBU 2d7 adding orderer root CAs for MSP [OrdererMSP]" -"2019-05-02 01:30:40.875 UTC [peer] buildTrustedRootsForChain -> DEBU 2d8 adding app root CAs for MSP [Org1MSP]" -"2019-05-02 01:30:40.875 UTC [peer] buildTrustedRootsForChain -> DEBU 2d9 adding app root CAs for MSP [Org2MSP]" -"2019-05-02 01:30:40.876 UTC [kvledger.util] CreateDirIfMissing -> DEBU 2da CreateDirIfMissing [/var/hyperledger/production/transientStore/]" -"2019-05-02 01:30:40.876 UTC [kvledger.util] logDirStatus -> DEBU 2db Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" -"2019-05-02 01:30:40.877 UTC [kvledger.util] logDirStatus -> DEBU 2dc After creating dir - [/var/hyperledger/production/transientStore/] exists" -"2019-05-02 01:30:40.887 UTC [gossip.service] InitializeChannel -> DEBU 2dd Creating state provider for chainID businesschannel" -"2019-05-02 01:30:40.889 UTC [msp.identity] Sign -> DEBU 2de Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " -"2019-05-02 01:30:40.889 UTC [msp.identity] Sign -> DEBU 2df Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " -"2019-05-02 01:30:40.890 UTC [gossip.privdata] NewReconciler -> DEBU 2e0 Private data reconciliation is enabled" -"2019-05-02 01:30:40.895 UTC [gossip.state] NewGossipStateProvider -> INFO 2e1 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" -"2019-05-02 01:30:40.895 UTC [gossip.state] NewGossipStateProvider -> DEBU 2e2 Updating gossip ledger height to 1" -"2019-05-02 01:30:40.895 UTC [msp.identity] Sign -> DEBU 2e3 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020801 " -"2019-05-02 01:30:40.895 UTC [msp.identity] Sign -> DEBU 2e4 Sign: digest: 5D5E8594944356B7F43B3555131CB08ECE5F4E5C0A4549E5569888902FBF67FF " -"2019-05-02 01:30:40.896 UTC [gossip.service] InitializeChannel -> DEBU 2e5 Delivery uses dynamic leader election mechanism, channel businesschannel" -"2019-05-02 01:30:40.897 UTC [peer] InitChain -> DEBU 2e6 Initializing channel businesschannel" -"2019-05-02 01:30:40.897 UTC [nodeCmd] func6 -> DEBU 2e7 Deploying system CC, for channel " -"2019-05-02 01:30:40.897 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2e8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:30:40.897 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e9 constructing new tx simulator" -"2019-05-02 01:30:40.897 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2ea constructing new tx simulator txid = [0931a319-abc8-40da-854d-d3d92c0fd340]" -"2019-05-02 01:30:40.897 UTC [gossip.election] handleMessages -> DEBU 2eb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:30:40.897 UTC [chaincode] Execute -> DEBU 2ec Entry" -"2019-05-02 01:30:40.897 UTC [chaincode] handleMessage -> DEBU 2ed [0931a319] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:40.898 UTC [chaincode] Notify -> DEBU 2ee [0931a319] notifying Txid:0931a319-abc8-40da-854d-d3d92c0fd340, channelID:businesschannel" -"2019-05-02 01:30:40.898 UTC [chaincode] Execute -> DEBU 2ef Exit" -"2019-05-02 01:30:40.898 UTC [sccapi] deploySysCC -> INFO 2f0 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" -"2019-05-02 01:30:40.898 UTC [lockbasedtxmgr] Done -> DEBU 2f1 Done with transaction simulation / query execution [0931a319-abc8-40da-854d-d3d92c0fd340]" -"2019-05-02 01:30:40.899 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2f2 constructing new tx simulator" -"2019-05-02 01:30:40.899 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2f3 constructing new tx simulator txid = [0026da2f-47a1-4c54-8463-5813051fa044]" -"2019-05-02 01:30:40.899 UTC [chaincode] Execute -> DEBU 2f4 Entry" -"2019-05-02 01:30:40.900 UTC [cscc] Init -> INFO 2f5 Init CSCC" -"2019-05-02 01:30:40.900 UTC [chaincode] handleMessage -> DEBU 2f6 [0026da2f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:40.900 UTC [chaincode] Notify -> DEBU 2f7 [0026da2f] notifying Txid:0026da2f-47a1-4c54-8463-5813051fa044, channelID:businesschannel" -"2019-05-02 01:30:40.901 UTC [chaincode] Execute -> DEBU 2f8 Exit" -"2019-05-02 01:30:40.901 UTC [sccapi] deploySysCC -> INFO 2f9 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" -"2019-05-02 01:30:40.902 UTC [lockbasedtxmgr] Done -> DEBU 2fa Done with transaction simulation / query execution [0026da2f-47a1-4c54-8463-5813051fa044]" -"2019-05-02 01:30:40.902 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2fb constructing new tx simulator" -"2019-05-02 01:30:40.902 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2fc constructing new tx simulator txid = [159c8873-a021-4e94-8343-dd2844c25760]" -"2019-05-02 01:30:40.902 UTC [chaincode] Execute -> DEBU 2fd Entry" -"2019-05-02 01:30:40.903 UTC [qscc] Init -> INFO 2fe Init QSCC" -"2019-05-02 01:30:40.903 UTC [chaincode] handleMessage -> DEBU 2ff [159c8873] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:40.903 UTC [chaincode] Notify -> DEBU 300 [159c8873] notifying Txid:159c8873-a021-4e94-8343-dd2844c25760, channelID:businesschannel" -"2019-05-02 01:30:40.904 UTC [chaincode] Execute -> DEBU 301 Exit" -"2019-05-02 01:30:40.904 UTC [sccapi] deploySysCC -> INFO 302 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" -"2019-05-02 01:30:40.905 UTC [lockbasedtxmgr] Done -> DEBU 303 Done with transaction simulation / query execution [159c8873-a021-4e94-8343-dd2844c25760]" -"2019-05-02 01:30:40.905 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 304 constructing new tx simulator" -"2019-05-02 01:30:40.905 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 305 constructing new tx simulator txid = [ffda1102-2ccc-4d41-9fad-c4bb2d002d42]" -"2019-05-02 01:30:40.906 UTC [chaincode] Execute -> DEBU 306 Entry" -"2019-05-02 01:30:40.906 UTC [chaincode] handleMessage -> DEBU 307 [ffda1102] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:40.906 UTC [chaincode] Notify -> DEBU 308 [ffda1102] notifying Txid:ffda1102-2ccc-4d41-9fad-c4bb2d002d42, channelID:businesschannel" -"2019-05-02 01:30:40.907 UTC [chaincode] Execute -> DEBU 309 Exit" -"2019-05-02 01:30:40.907 UTC [sccapi] deploySysCC -> INFO 30a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" -"2019-05-02 01:30:40.907 UTC [lockbasedtxmgr] Done -> DEBU 30b Done with transaction simulation / query execution [ffda1102-2ccc-4d41-9fad-c4bb2d002d42]" -"2019-05-02 01:30:40.908 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 30c constructing new query executor txid = [feef2973-cb24-4032-b31c-0795ecb63453]" -"2019-05-02 01:30:40.908 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 30d Returning []" -"2019-05-02 01:30:40.908 UTC [lockbasedtxmgr] Done -> DEBU 30e Done with transaction simulation / query execution [feef2973-cb24-4032-b31c-0795ecb63453]" -"2019-05-02 01:30:40.909 UTC [msp.identity] Sign -> DEBU 30f Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020801 " -"2019-05-02 01:30:40.909 UTC [msp.identity] Sign -> DEBU 310 Sign: digest: CF013B4EFDFB559B5B6EB630DCF76F66C1C7F8CC88B6AD4A12C21380798AFA4C " -"2019-05-02 01:30:40.910 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 311 Listeners for channel businesschannel invoked" -"2019-05-02 01:30:40.910 UTC [chaincode] handleMessage -> DEBU 312 [dd1fa066] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:40.910 UTC [chaincode] Notify -> DEBU 313 [dd1fa066] notifying Txid:dd1fa066e4336fdb8c0bfafb034fe06984b31b027331fc8a6f9955ca29e6dce8, channelID:" -"2019-05-02 01:30:40.910 UTC [chaincode] Execute -> DEBU 314 Exit" -"2019-05-02 01:30:40.911 UTC [endorser] callChaincode -> INFO 315 [][dd1fa066] Exit chaincode: name:"cscc" (174ms)" -"2019-05-02 01:30:40.911 UTC [endorser] SimulateProposal -> DEBU 316 [][dd1fa066] Exit" -"2019-05-02 01:30:40.911 UTC [endorser] func1 -> DEBU 317 Exit: request from 192.168.240.9:41182" -"2019-05-02 01:30:40.911 UTC [comm.grpc.server] 1 -> INFO 318 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41182 grpc.code=OK grpc.call_duration=181.0442ms -"2019-05-02 01:30:40.917 UTC [grpc] infof -> DEBU 319 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:41.454 UTC [gossip.gossip] handleMessage -> DEBU 31a Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.454 UTC [gossip.gossip] handleMessage -> DEBU 31b Exiting" -"2019-05-02 01:30:41.455 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.456 UTC [msp.identity] Verify -> DEBU 31d Verify: digest = 00000000 86 1a 48 7f c7 74 8c 19 08 12 9d 48 5e 7c 7b fb |..H..t.....H^|{.| -00000010 61 2f 71 21 f1 9b f0 fe 2f 07 e2 9b 36 d4 cf 55 |a/q!..../...6..U|" -"2019-05-02 01:30:41.456 UTC [msp.identity] Verify -> DEBU 31e Verify: sig = 00000000 30 44 02 20 58 0c a2 6c 0e 3c 4f 26 19 6c 8d 90 |0D. X..l. DEBU 31f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:41.457 UTC [msp.identity] Verify -> DEBU 320 Verify: sig = 00000000 30 45 02 21 00 ff 76 bf a6 d4 77 88 66 ae 16 78 |0E.!..v...w.f..x| -00000010 c5 96 e7 1d d8 bf 56 04 9f a9 0c 6a ba 1a 6c bb |......V....j..l.| -00000020 c5 6b 1c ab 12 02 20 63 02 c6 b3 5d de e2 f5 c4 |.k.... c...]....| -00000030 9d c9 0d 89 19 ae a8 34 1f 56 76 b7 2d 5e 23 b2 |.......4.Vv.-^#.| -00000040 a1 ff 39 df f2 d3 25 |..9...%|" -"2019-05-02 01:30:41.458 UTC [gossip.discovery] handleAliveMessage -> DEBU 321 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:41.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 322 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:30:41.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 323 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:7 " -"2019-05-02 01:30:41.459 UTC [gossip.discovery] learnExistingMembers -> DEBU 324 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:7 " -"2019-05-02 01:30:41.460 UTC [gossip.discovery] learnExistingMembers -> DEBU 325 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:41.460 UTC [gossip.discovery] learnExistingMembers -> DEBU 326 Exiting" -"2019-05-02 01:30:41.460 UTC [gossip.discovery] handleAliveMessage -> DEBU 327 Exiting" -"2019-05-02 01:30:41.460 UTC [gossip.discovery] handleMsgFromComm -> DEBU 328 Exiting" -"2019-05-02 01:30:41.460 UTC [gossip.discovery] sendMemResponse -> DEBU 329 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:41.460 UTC [gossip.comm] Send -> DEBU 32a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:41.460 UTC [gossip.discovery] sendMemResponse -> DEBU 32b Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:30:41.460 UTC [gossip.comm] sendToEndpoint -> DEBU 32c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.460 UTC [gossip.comm] sendToEndpoint -> DEBU 32d Exiting" -"2019-05-02 01:30:41.464 UTC [gossip.gossip] handleMessage -> DEBU 32e Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.464 UTC [gossip.pull] HandleMessage -> DEBU 32f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.465 UTC [gossip.pull] SendDigest -> DEBU 330 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:41.465 UTC [gossip.gossip] handleMessage -> DEBU 331 Exiting" -"2019-05-02 01:30:41.616 UTC [gossip.pull] Hello -> DEBU 332 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:30:41.616 UTC [gossip.comm] Send -> DEBU 333 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:41.616 UTC [gossip.comm] sendToEndpoint -> DEBU 334 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.616 UTC [gossip.comm] sendToEndpoint -> DEBU 335 Exiting" -"2019-05-02 01:30:41.617 UTC [gossip.gossip] handleMessage -> DEBU 336 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9140029366054201217 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.617 UTC [gossip.pull] HandleMessage -> DEBU 337 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9140029366054201217 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.617 UTC [gossip.gossip] handleMessage -> DEBU 338 Exiting" -"2019-05-02 01:30:41.619 UTC [msp.identity] Sign -> DEBU 339 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:30:41.619 UTC [msp.identity] Sign -> DEBU 33a Sign: digest: 5DDB1D1C795F4637858A27C6EDD85874DB28E9A4319A0631BF524ABCFF7FE38B " -"2019-05-02 01:30:41.619 UTC [msp.identity] Sign -> DEBU 33b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:41.619 UTC [msp.identity] Sign -> DEBU 33c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:41.620 UTC [gossip.comm] Send -> DEBU 33d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +"2019-05-02 09:27:16.261 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 270 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:16.261 UTC [msp] Validate -> DEBU 271 MSP Org2MSP validating identity" +"2019-05-02 09:27:16.262 UTC [msp] getCertificationChain -> DEBU 272 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:16.262 UTC [msp] hasOURole -> DEBU 273 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:16.262 UTC [msp] getCertificationChain -> DEBU 274 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:16.263 UTC [msp] Setup -> DEBU 275 Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:16.263 UTC [msp] Setup -> DEBU 276 MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:16.263 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:16.263 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:16.264 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:16.264 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:16.265 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:16.266 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:16.266 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:16.266 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 285 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 286 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 287 Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy Readers for Channel/Application" +"2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 289 Proposed new policy Writers for Channel/Application" +"2019-05-02 09:27:16.267 UTC [policies] NewManagerImpl -> DEBU 28a Proposed new policy Admins for Channel/Application" +"2019-05-02 09:27:16.268 UTC [policies] NewManagerImpl -> DEBU 28b Proposed new policy Readers for Channel" +"2019-05-02 09:27:16.268 UTC [policies] NewManagerImpl -> DEBU 28c Proposed new policy Writers for Channel" +"2019-05-02 09:27:16.268 UTC [policies] NewManagerImpl -> DEBU 28d Proposed new policy Admins for Channel" +"2019-05-02 09:27:16.268 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Group] /Channel" +"2019-05-02 09:27:16.268 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:16.268 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:16.269 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:16.270 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:16.270 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:16.270 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:16.271 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:16.272 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:16.273 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:16.273 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:16.273 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:16.274 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:16.275 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:16.276 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:16.276 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:16.276 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:16.277 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:16.278 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:16.278 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:16.278 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:16.278 UTC [common.capabilities] Supported -> DEBU 2ba Application capability V2_0 is supported and is enabled" +"2019-05-02 09:27:16.279 UTC [common.capabilities] Supported -> DEBU 2bb Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:16.279 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bc As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:27:16.279 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bd As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2be Manager Channel looking up path [Application]" +"2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2bf Manager Channel has managers Orderer" +"2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2c0 Manager Channel has managers Application" +"2019-05-02 09:27:16.279 UTC [policies] Manager -> DEBU 2c1 Manager Channel/Application looking up path []" +"2019-05-02 09:27:16.280 UTC [policies] Manager -> DEBU 2c2 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:16.280 UTC [policies] Manager -> DEBU 2c3 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:16.280 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c4 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:27:16.280 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c5 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:27:16.280 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c6 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2c7 Manager Channel looking up path [Orderer]" +"2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2c8 Manager Channel has managers Orderer" +"2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2c9 Manager Channel has managers Application" +"2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2ca Manager Channel/Orderer looking up path []" +"2019-05-02 09:27:16.281 UTC [policies] Manager -> DEBU 2cb Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:27:16.282 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:27:16.282 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2cd Processing new config for channel businesschannel" +"2019-05-02 09:27:16.282 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2ce Calling out because config was updated for channel businesschannel" +"2019-05-02 09:27:16.282 UTC [gossip.service] updateAnchors -> DEBU 2cf Org1MSP anchor peers: []" +"2019-05-02 09:27:16.283 UTC [gossip.service] updateAnchors -> DEBU 2d0 Org2MSP anchor peers: []" +"2019-05-02 09:27:16.283 UTC [gossip.service] updateAnchors -> DEBU 2d1 Creating state provider for chainID businesschannel" +"2019-05-02 09:27:16.283 UTC [gossip.gossip] JoinChan -> INFO 2d2 Joining gossip network of channel businesschannel with 2 organizations" +"2019-05-02 09:27:16.283 UTC [gossip.gossip] learnAnchorPeers -> INFO 2d3 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +"2019-05-02 09:27:16.284 UTC [gossip.gossip] learnAnchorPeers -> INFO 2d4 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-05-02 09:27:16.284 UTC [peer] updateTrustedRoots -> DEBU 2d5 Updating trusted root authorities for channel businesschannel" +"2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d6 updating root CAs for channel [businesschannel]" +"2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d7 adding orderer root CAs for MSP [OrdererMSP]" +"2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d8 adding app root CAs for MSP [Org1MSP]" +"2019-05-02 09:27:16.297 UTC [peer] buildTrustedRootsForChain -> DEBU 2d9 adding app root CAs for MSP [Org2MSP]" +"2019-05-02 09:27:16.299 UTC [kvledger.util] CreateDirIfMissing -> DEBU 2da CreateDirIfMissing [/var/hyperledger/production/transientStore/]" +"2019-05-02 09:27:16.299 UTC [kvledger.util] logDirStatus -> DEBU 2db Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" +"2019-05-02 09:27:16.299 UTC [kvledger.util] logDirStatus -> DEBU 2dc After creating dir - [/var/hyperledger/production/transientStore/] exists" +"2019-05-02 09:27:16.312 UTC [gossip.service] InitializeChannel -> DEBU 2dd Creating state provider for chainID businesschannel" +"2019-05-02 09:27:16.314 UTC [msp.identity] Sign -> DEBU 2de Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +"2019-05-02 09:27:16.314 UTC [msp.identity] Sign -> DEBU 2df Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +"2019-05-02 09:27:16.315 UTC [gossip.privdata] NewReconciler -> DEBU 2e0 Private data reconciliation is enabled" +"2019-05-02 09:27:16.319 UTC [gossip.state] NewGossipStateProvider -> INFO 2e1 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +"2019-05-02 09:27:16.319 UTC [gossip.state] NewGossipStateProvider -> DEBU 2e2 Updating gossip ledger height to 1" +"2019-05-02 09:27:16.319 UTC [msp.identity] Sign -> DEBU 2e3 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020801 " +"2019-05-02 09:27:16.319 UTC [msp.identity] Sign -> DEBU 2e4 Sign: digest: 8B78C9A6480A8CF41DAD7D6C38347BBE000B4649C45AD2CBB13B3B21E63B0471 " +"2019-05-02 09:27:16.320 UTC [gossip.service] InitializeChannel -> DEBU 2e5 Delivery uses dynamic leader election mechanism, channel businesschannel" +"2019-05-02 09:27:16.321 UTC [peer] InitChain -> DEBU 2e6 Initializing channel businesschannel" +"2019-05-02 09:27:16.322 UTC [nodeCmd] func6 -> DEBU 2e9 Deploying system CC, for channel " +"2019-05-02 09:27:16.321 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2e7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:16.322 UTC [gossip.election] handleMessages -> DEBU 2e8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2ea constructing new tx simulator" +"2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2eb constructing new tx simulator txid = [2d70ce9e-c497-49ba-98e6-086bbe3a68c0]" +"2019-05-02 09:27:16.323 UTC [chaincode] Execute -> DEBU 2ec Entry" +"2019-05-02 09:27:16.323 UTC [chaincode] handleMessage -> DEBU 2ed [2d70ce9e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:16.323 UTC [chaincode] Notify -> DEBU 2ee [2d70ce9e] notifying Txid:2d70ce9e-c497-49ba-98e6-086bbe3a68c0, channelID:businesschannel" +"2019-05-02 09:27:16.323 UTC [chaincode] Execute -> DEBU 2ef Exit" +"2019-05-02 09:27:16.323 UTC [sccapi] deploySysCC -> INFO 2f0 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] Done -> DEBU 2f1 Done with transaction simulation / query execution [2d70ce9e-c497-49ba-98e6-086bbe3a68c0]" +"2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2f2 constructing new tx simulator" +"2019-05-02 09:27:16.323 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2f3 constructing new tx simulator txid = [aaa0bcce-8228-4523-9513-7572889c7e8a]" +"2019-05-02 09:27:16.323 UTC [chaincode] Execute -> DEBU 2f4 Entry" +"2019-05-02 09:27:16.323 UTC [cscc] Init -> INFO 2f5 Init CSCC" +"2019-05-02 09:27:16.323 UTC [chaincode] handleMessage -> DEBU 2f6 [aaa0bcce] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:16.324 UTC [chaincode] Notify -> DEBU 2f7 [aaa0bcce] notifying Txid:aaa0bcce-8228-4523-9513-7572889c7e8a, channelID:businesschannel" +"2019-05-02 09:27:16.324 UTC [chaincode] Execute -> DEBU 2f8 Exit" +"2019-05-02 09:27:16.324 UTC [sccapi] deploySysCC -> INFO 2f9 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] Done -> DEBU 2fa Done with transaction simulation / query execution [aaa0bcce-8228-4523-9513-7572889c7e8a]" +"2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2fb constructing new tx simulator" +"2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2fc constructing new tx simulator txid = [4eccbbcc-0bc1-47ee-9bf9-ad847826e38f]" +"2019-05-02 09:27:16.324 UTC [chaincode] Execute -> DEBU 2fd Entry" +"2019-05-02 09:27:16.324 UTC [qscc] Init -> INFO 2fe Init QSCC" +"2019-05-02 09:27:16.324 UTC [chaincode] handleMessage -> DEBU 2ff [4eccbbcc] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:16.324 UTC [chaincode] Notify -> DEBU 300 [4eccbbcc] notifying Txid:4eccbbcc-0bc1-47ee-9bf9-ad847826e38f, channelID:businesschannel" +"2019-05-02 09:27:16.324 UTC [chaincode] Execute -> DEBU 301 Exit" +"2019-05-02 09:27:16.324 UTC [sccapi] deploySysCC -> INFO 302 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-05-02 09:27:16.324 UTC [lockbasedtxmgr] Done -> DEBU 303 Done with transaction simulation / query execution [4eccbbcc-0bc1-47ee-9bf9-ad847826e38f]" +"2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 304 constructing new tx simulator" +"2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 305 constructing new tx simulator txid = [d66845b9-8103-46a2-ad5d-eccb84f8e2e1]" +"2019-05-02 09:27:16.325 UTC [chaincode] Execute -> DEBU 306 Entry" +"2019-05-02 09:27:16.325 UTC [chaincode] handleMessage -> DEBU 307 [d66845b9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:16.325 UTC [chaincode] Notify -> DEBU 308 [d66845b9] notifying Txid:d66845b9-8103-46a2-ad5d-eccb84f8e2e1, channelID:businesschannel" +"2019-05-02 09:27:16.325 UTC [chaincode] Execute -> DEBU 309 Exit" +"2019-05-02 09:27:16.325 UTC [sccapi] deploySysCC -> INFO 30a system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] Done -> DEBU 30b Done with transaction simulation / query execution [d66845b9-8103-46a2-ad5d-eccb84f8e2e1]" +"2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 30c constructing new query executor txid = [3859875e-d985-49dd-a968-59cd4a08ce53]" +"2019-05-02 09:27:16.325 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 30d Returning []" +"2019-05-02 09:27:16.325 UTC [lockbasedtxmgr] Done -> DEBU 30e Done with transaction simulation / query execution [3859875e-d985-49dd-a968-59cd4a08ce53]" +"2019-05-02 09:27:16.325 UTC [msp.identity] Sign -> DEBU 30f Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020801 " +"2019-05-02 09:27:16.326 UTC [msp.identity] Sign -> DEBU 310 Sign: digest: FA734A64D20B4ADC12D7D68112DB4CE8D3BFB6E481C65D686855FEEBA9B327D3 " +"2019-05-02 09:27:16.326 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 311 Listeners for channel businesschannel invoked" +"2019-05-02 09:27:16.326 UTC [chaincode] handleMessage -> DEBU 312 [dbf7024a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:16.326 UTC [chaincode] Notify -> DEBU 313 [dbf7024a] notifying Txid:dbf7024a20c887786328981f5471b882c076486d1171040f17166c48d15b8a84, channelID:" +"2019-05-02 09:27:16.326 UTC [chaincode] Execute -> DEBU 314 Exit" +"2019-05-02 09:27:16.326 UTC [endorser] callChaincode -> INFO 315 [][dbf7024a] Exit chaincode: name:"cscc" (160ms)" +"2019-05-02 09:27:16.326 UTC [endorser] SimulateProposal -> DEBU 316 [][dbf7024a] Exit" +"2019-05-02 09:27:16.326 UTC [endorser] func1 -> DEBU 317 Exit: request from 172.18.0.8:57196" +"2019-05-02 09:27:16.326 UTC [comm.grpc.server] 1 -> INFO 318 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57196 grpc.code=OK grpc.call_duration=166.7647ms +"2019-05-02 09:27:16.331 UTC [grpc] warningf -> DEBU 319 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.8:57196: read: connection reset by peer" +"2019-05-02 09:27:16.331 UTC [grpc] infof -> DEBU 31a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:17.068 UTC [gossip.pull] Hello -> DEBU 31b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:17.068 UTC [gossip.comm] Send -> DEBU 31c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:17.068 UTC [gossip.comm] sendToEndpoint -> DEBU 31d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.068 UTC [gossip.comm] sendToEndpoint -> DEBU 31e Exiting" +"2019-05-02 09:27:17.068 UTC [msp.identity] Sign -> DEBU 31f Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:17.069 UTC [msp.identity] Sign -> DEBU 320 Sign: digest: 6E6BFE1B00C82FA9E2C4DD1D85FC07A35A386C6C84DE322084C7EA918F28FD50 " +"2019-05-02 09:27:17.069 UTC [msp.identity] Sign -> DEBU 321 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:17.069 UTC [msp.identity] Sign -> DEBU 322 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:17.069 UTC [gossip.comm] Send -> DEBU 323 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -1735,8 +1601,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE----- -Timestamp:inc_num:1556760633613118000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:41.620 UTC [gossip.comm] sendToEndpoint -> DEBU 33e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:17.069 UTC [gossip.comm] sendToEndpoint -> DEBU 324 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -1750,26 +1616,29 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE----- -Timestamp:inc_num:1556760633613118000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.620 UTC [gossip.comm] sendToEndpoint -> DEBU 33f Exiting" -"2019-05-02 01:30:41.625 UTC [gossip.gossip] handleMessage -> DEBU 340 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.625 UTC [gossip.gossip] handleMessage -> DEBU 341 Exiting" -"2019-05-02 01:30:41.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 342 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" -"2019-05-02 01:30:41.626 UTC [msp.identity] Verify -> DEBU 343 Verify: digest = 00000000 5d db 1d 1c 79 5f 46 37 85 8a 27 c6 ed d8 58 74 |]...y_F7..'...Xt| -00000010 db 28 e9 a4 31 9a 06 31 bf 52 4a bc ff 7f e3 8b |.(..1..1.RJ.....|" -"2019-05-02 01:30:41.626 UTC [msp.identity] Verify -> DEBU 344 Verify: sig = 00000000 30 45 02 21 00 da a2 f4 f7 44 65 da 4e b1 27 48 |0E.!.....De.N.'H| -00000010 b6 87 cf 1b b3 4f 8a fc 6b b6 64 d4 88 55 77 e7 |.....O..k.d..Uw.| -00000020 3b 8f 58 40 e8 02 20 10 91 ce b0 e7 c3 53 c4 66 |;.X@.. ......S.f| -00000030 57 fa 30 79 74 7c bb a4 44 22 1c c7 fa 71 84 f0 |W.0yt|..D"...q..| -00000040 db 23 a6 a7 41 51 83 |.#..AQ.|" -"2019-05-02 01:30:41.626 UTC [msp.identity] Verify -> DEBU 345 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.069 UTC [gossip.comm] sendToEndpoint -> DEBU 325 Exiting" +"2019-05-02 09:27:17.074 UTC [gossip.gossip] handleMessage -> DEBU 326 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6173781539121442575 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.076 UTC [gossip.pull] HandleMessage -> DEBU 327 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6173781539121442575 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.076 UTC [gossip.gossip] handleMessage -> DEBU 328 Exiting" +"2019-05-02 09:27:17.077 UTC [gossip.gossip] handleMessage -> DEBU 329 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.077 UTC [gossip.gossip] handleMessage -> DEBU 32a Exiting" +"2019-05-02 09:27:17.077 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32c Verify: digest = 00000000 6e 6b fe 1b 00 c8 2f a9 e2 c4 dd 1d 85 fc 07 a3 |nk..../.........| +00000010 5a 38 6c 6c 84 de 32 20 84 c7 ea 91 8f 28 fd 50 |Z8ll..2 .....(.P|" +"2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32d Verify: sig = 00000000 30 45 02 21 00 ef 55 3c db c8 8d 10 b7 f6 bc c3 |0E.!..U<........| +00000010 3e ca 32 24 25 58 31 a1 ba d2 53 bf f4 60 36 f1 |>.2$%X1...S..`6.| +00000020 af 1d d0 34 fb 02 20 77 78 16 b2 2a d8 1f b4 15 |...4.. wx..*....| +00000030 8d a2 00 d4 e1 54 35 23 2a 8d d5 80 1a 38 63 06 |.....T5#*....8c.| +00000040 9b 89 af e8 2d 54 3e |....-T>|" +"2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:30:41.626 UTC [msp.identity] Verify -> DEBU 346 Verify: sig = 00000000 30 45 02 21 00 de b1 6d b1 4d cd f0 7c 75 f7 11 |0E.!...m.M..|u..| -00000010 1c 46 3b 83 a9 43 ac 51 f1 3c 14 d4 88 e7 5f fa |.F;..C.Q.<...._.| -00000020 09 2a 45 28 0f 02 20 02 87 4e 65 55 3a 0e 21 8a |.*E(.. ..NeU:.!.| -00000030 0e d6 d5 d1 40 ed 58 0c 5f cb 6d 4d 70 75 82 71 |....@.X._.mMpu.q| -00000040 f4 2c f9 83 db 4b 26 |.,...K&|" -"2019-05-02 01:30:41.626 UTC [gossip.discovery] handleAliveMessage -> DEBU 347 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +"2019-05-02 09:27:17.078 UTC [msp.identity] Verify -> DEBU 32f Verify: sig = 00000000 30 45 02 21 00 95 ca 6f 83 1a ed 86 98 57 ad 1b |0E.!...o.....W..| +00000010 ba 05 27 96 d4 8d be a5 3b 2c eb 55 a2 2b fc d9 |..'.....;,.U.+..| +00000020 65 9c 37 13 15 02 20 71 10 c2 cd 18 91 db 75 18 |e.7... q......u.| +00000030 7a c3 34 51 58 91 89 a8 a2 00 b5 4b 6e c7 81 e2 |z.4QX......Kn...| +00000040 a0 ba ab 6d 5d 9d 38 |...m].8|" +"2019-05-02 09:27:17.079 UTC [gossip.discovery] handleAliveMessage -> DEBU 330 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -1783,8 +1652,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE----- -Timestamp:inc_num:1556760633613118000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:41.626 UTC [gossip.discovery] isSentByMe -> DEBU 348 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:17.079 UTC [gossip.discovery] isSentByMe -> DEBU 331 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -1798,83 +1667,214 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE----- -Timestamp:inc_num:1556760633613118000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:41.626 UTC [gossip.discovery] handleAliveMessage -> DEBU 349 Exiting" -"2019-05-02 01:30:41.626 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34a Exiting" -"2019-05-02 01:30:41.898 UTC [gossip.election] waitForMembershipStabilization -> DEBU 34b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" -"2019-05-02 01:30:41.899 UTC [gossip.election] leaderElection -> DEBU 34c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:30:41.899 UTC [gossip.election] propose -> DEBU 34d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:30:41.899 UTC [gossip.election] propose -> DEBU 34e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:30:41.899 UTC [msp.identity] Sign -> DEBU 34f Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08B0E7B8C7E0B1AECD151001 " -"2019-05-02 01:30:41.900 UTC [msp.identity] Sign -> DEBU 350 Sign: digest: 6224A9EAAB37F6EB1B1B021BD3F8B4212403417B11B3A7ED26C078ABDEDD660C " -"2019-05-02 01:30:41.900 UTC [gossip.election] waitForInterrupt -> DEBU 351 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:30:42.098 UTC [endorser] ProcessProposal -> DEBU 352 Entering: request from 192.168.240.9:41190" -"2019-05-02 01:30:42.099 UTC [protoutils] ValidateProposalMessage -> DEBU 353 ValidateProposalMessage starts for signed proposal 0xc002d2ae10" -"2019-05-02 01:30:42.099 UTC [protoutils] validateChannelHeader -> DEBU 354 validateChannelHeader info: header type 3" -"2019-05-02 01:30:42.100 UTC [protoutils] checkSignatureFromCreator -> DEBU 355 begin" -"2019-05-02 01:30:42.101 UTC [protoutils] checkSignatureFromCreator -> DEBU 356 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:30:42.101 UTC [protoutils] checkSignatureFromCreator -> DEBU 357 creator is valid" -"2019-05-02 01:30:42.102 UTC [msp.identity] Verify -> DEBU 358 Verify: digest = 00000000 1c 6b 39 0d ed 65 86 ef 11 ff d6 34 b4 ed c7 7d |.k9..e.....4...}| -00000010 4d c9 b2 dd 63 a5 3c 01 3f da 92 75 3d d4 35 80 |M...c.<.?..u=.5.|" -"2019-05-02 01:30:42.102 UTC [msp.identity] Verify -> DEBU 359 Verify: sig = 00000000 30 45 02 21 00 d9 9e d4 0a 03 5a 47 74 10 36 2c |0E.!......ZGt.6,| -00000010 15 0d 8c 46 3b b4 85 73 58 ee 25 86 c8 cb b8 51 |...F;..sX.%....Q| -00000020 f5 dc e2 99 25 02 20 66 60 16 10 ba 27 fa 0c 58 |....%. f`...'..X| -00000030 8d 54 26 04 ba 81 33 33 ed e7 82 b1 8b 82 9c a6 |.T&...33........| -00000040 2c 96 0f 1f 82 a4 04 |,......|" -"2019-05-02 01:30:42.103 UTC [protoutils] checkSignatureFromCreator -> DEBU 35a exits successfully" -"2019-05-02 01:30:42.103 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 35b validateChaincodeProposalMessage starts for proposal 0xc002d6c3f0, header 0xc002d2b220" -"2019-05-02 01:30:42.104 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 35c validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-05-02 01:30:42.104 UTC [endorser] preProcess -> DEBU 35d [][5a020f8d] processing txid: 5a020f8d9c1069f5a1d64576c680cbea19aa64863a542b252cbeb36b01b2dc29" -"2019-05-02 01:30:42.104 UTC [endorser] SimulateProposal -> DEBU 35e [][5a020f8d] Entry chaincode: name:"cscc" " -"2019-05-02 01:30:42.105 UTC [endorser] callChaincode -> INFO 35f [][5a020f8d] Entry chaincode: name:"cscc" " -"2019-05-02 01:30:42.105 UTC [chaincode] Execute -> DEBU 360 Entry" -"2019-05-02 01:30:42.106 UTC [cscc] Invoke -> DEBU 361 Invoke function: GetChannels" -"2019-05-02 01:30:42.106 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 362 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:30:42.106 UTC [msp] Validate -> DEBU 363 MSP Org1MSP validating identity" -"2019-05-02 01:30:42.107 UTC [msp.identity] Verify -> DEBU 364 Verify: digest = 00000000 1c 6b 39 0d ed 65 86 ef 11 ff d6 34 b4 ed c7 7d |.k9..e.....4...}| -00000010 4d c9 b2 dd 63 a5 3c 01 3f da 92 75 3d d4 35 80 |M...c.<.?..u=.5.|" -"2019-05-02 01:30:42.107 UTC [msp.identity] Verify -> DEBU 365 Verify: sig = 00000000 30 45 02 21 00 d9 9e d4 0a 03 5a 47 74 10 36 2c |0E.!......ZGt.6,| -00000010 15 0d 8c 46 3b b4 85 73 58 ee 25 86 c8 cb b8 51 |...F;..sX.%....Q| -00000020 f5 dc e2 99 25 02 20 66 60 16 10 ba 27 fa 0c 58 |....%. f`...'..X| -00000030 8d 54 26 04 ba 81 33 33 ed e7 82 b1 8b 82 9c a6 |.T&...33........| -00000040 2c 96 0f 1f 82 a4 04 |,......|" -"2019-05-02 01:30:42.107 UTC [chaincode] handleMessage -> DEBU 366 [5a020f8d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:42.108 UTC [chaincode] Notify -> DEBU 367 [5a020f8d] notifying Txid:5a020f8d9c1069f5a1d64576c680cbea19aa64863a542b252cbeb36b01b2dc29, channelID:" -"2019-05-02 01:30:42.108 UTC [chaincode] Execute -> DEBU 368 Exit" -"2019-05-02 01:30:42.109 UTC [endorser] callChaincode -> INFO 369 [][5a020f8d] Exit chaincode: name:"cscc" (3ms)" -"2019-05-02 01:30:42.109 UTC [endorser] SimulateProposal -> DEBU 36a [][5a020f8d] Exit" -"2019-05-02 01:30:42.110 UTC [endorser] func1 -> DEBU 36b Exit: request from 192.168.240.9:41190" -"2019-05-02 01:30:42.110 UTC [comm.grpc.server] 1 -> INFO 36c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41190 grpc.code=OK grpc.call_duration=13.1791ms -"2019-05-02 01:30:42.115 UTC [grpc] warningf -> DEBU 36d transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41190: read: connection reset by peer" -"2019-05-02 01:30:42.116 UTC [grpc] infof -> DEBU 36e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:43.024 UTC [endorser] ProcessProposal -> DEBU 36f Entering: request from 192.168.240.9:41198" -"2019-05-02 01:30:43.025 UTC [protoutils] ValidateProposalMessage -> DEBU 370 ValidateProposalMessage starts for signed proposal 0xc002dd60a0" -"2019-05-02 01:30:43.025 UTC [protoutils] validateChannelHeader -> DEBU 371 validateChannelHeader info: header type 3" -"2019-05-02 01:30:43.025 UTC [protoutils] checkSignatureFromCreator -> DEBU 372 begin" -"2019-05-02 01:30:43.025 UTC [protoutils] checkSignatureFromCreator -> DEBU 373 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:30:43.025 UTC [protoutils] checkSignatureFromCreator -> DEBU 374 creator is valid" -"2019-05-02 01:30:43.025 UTC [msp.identity] Verify -> DEBU 375 Verify: digest = 00000000 f0 5c 4f 14 e3 5f f7 68 88 ab c5 05 35 9e 4d 07 |.\O.._.h....5.M.| -00000010 02 1a cf dc 40 66 5c 88 69 c0 c9 ea 15 01 f1 e9 |....@f\.i.......|" -"2019-05-02 01:30:43.025 UTC [msp.identity] Verify -> DEBU 376 Verify: sig = 00000000 30 44 02 20 6f 0e 57 d0 37 a9 71 a2 ab 01 6b b2 |0D. o.W.7.q...k.| -00000010 1a c8 0c 53 fc 95 df db 7f 80 23 f8 95 bc 9f fb |...S......#.....| -00000020 f1 18 94 67 02 20 7f 5d e9 03 ad ce 26 16 e5 19 |...g. .]....&...| -00000030 4a 11 3f df 98 33 0d c4 18 02 16 26 25 fa da 56 |J.?..3.....&%..V| -00000040 92 ec ce 76 29 b8 |...v).|" -"2019-05-02 01:30:43.026 UTC [protoutils] checkSignatureFromCreator -> DEBU 377 exits successfully" -"2019-05-02 01:30:43.026 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 378 validateChaincodeProposalMessage starts for proposal 0xc002d6caf0, header 0xc002dd64b0" -"2019-05-02 01:30:43.026 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 379 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -"2019-05-02 01:30:43.026 UTC [endorser] preProcess -> DEBU 37a [][472b2b8a] processing txid: 472b2b8acdb6f31dbcede8e00eb9b0112e9374c6cfb2f7aef5ddeecff988a0e0" -"2019-05-02 01:30:43.027 UTC [endorser] SimulateProposal -> DEBU 37b [][472b2b8a] Entry chaincode: name:"qscc" " -"2019-05-02 01:30:43.027 UTC [endorser] callChaincode -> INFO 37c [][472b2b8a] Entry chaincode: name:"qscc" " -"2019-05-02 01:30:43.027 UTC [chaincode] Execute -> DEBU 37d Entry" -"2019-05-02 01:30:43.028 UTC [qscc] Invoke -> DEBU 37e Invoke function: GetChainInfo on chain: businesschannel" -"2019-05-02 01:30:43.028 UTC [aclmgmt] CheckACL -> DEBU 37f acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -"2019-05-02 01:30:43.028 UTC [aclmgmt] CheckACL -> DEBU 380 acl check(/Channel/Application/Readers)" -"2019-05-02 01:30:43.028 UTC [policies] Evaluate -> DEBU 381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:43.028 UTC [policies] Evaluate -> DEBU 382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:43.029 UTC [policies] Evaluate -> DEBU 383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:30:43.029 UTC [msp] DeserializeIdentity -> DEBU 384 Obtaining identity" -"2019-05-02 01:30:43.029 UTC [msp.identity] newIdentity -> DEBU 385 Creating identity instance for cert -----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229089237200 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:17.079 UTC [gossip.discovery] handleAliveMessage -> DEBU 332 Exiting" +"2019-05-02 09:27:17.080 UTC [gossip.discovery] handleMsgFromComm -> DEBU 333 Exiting" +"2019-05-02 09:27:17.114 UTC [gossip.gossip] handleMessage -> DEBU 334 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.115 UTC [gossip.pull] HandleMessage -> DEBU 335 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.115 UTC [gossip.pull] SendDigest -> DEBU 336 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:17.115 UTC [gossip.gossip] handleMessage -> DEBU 337 Exiting" +"2019-05-02 09:27:17.117 UTC [gossip.gossip] handleMessage -> DEBU 338 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1099 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 339 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1099 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.118 UTC [msp.identity] Verify -> DEBU 33a Verify: digest = 00000000 5e 21 fd c3 3f 6b bf 46 7d ad 72 6a a3 9b eb df |^!..?k.F}.rj....| +00000010 94 bf 54 d0 c0 a5 d1 69 35 6a f8 7f ab 9f 80 bb |..T....i5j......|" +"2019-05-02 09:27:17.118 UTC [msp.identity] Verify -> DEBU 33b Verify: sig = 00000000 30 45 02 21 00 b8 44 6c c1 b1 87 c8 b1 3d a5 9c |0E.!..Dl.....=..| +00000010 96 34 88 3e 19 72 cc 99 f1 a2 76 b2 d9 05 26 94 |.4.>.r....v...&.| +00000020 d6 1e 97 c1 35 02 20 44 31 23 1d 1c dd cb 6a 76 |....5. D1#....jv| +00000030 95 bb c4 88 ce 5f 94 a9 95 26 b5 5e b9 dd 85 5b |....._...&.^...[| +00000040 b5 e5 5c d4 29 4c f6 |..\.)L.|" +"2019-05-02 09:27:17.119 UTC [msp.identity] Verify -> DEBU 33c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:27:17.119 UTC [msp.identity] Verify -> DEBU 33d Verify: sig = 00000000 30 45 02 21 00 f3 ca ca ef 97 c0 e8 29 a2 23 c4 |0E.!........).#.| +00000010 fb d2 50 11 be 9b 7a 4e 4b 7d 70 87 22 f0 d4 64 |..P...zNK}p."..d| +00000020 7b fb 91 82 32 02 20 49 7b 56 2d c4 03 d5 51 4c |{...2. I{V-...QL| +00000030 68 8a 8c 6f 38 c5 ee 5d 6b 7d bf 30 20 04 00 5b |h..o8..]k}.0 ..[| +00000040 af ac 81 20 6f 36 cd |... o6.|" +"2019-05-02 09:27:17.122 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:17.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:17.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 340 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:7 " +"2019-05-02 09:27:17.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 341 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:7 " +"2019-05-02 09:27:17.123 UTC [gossip.discovery] learnExistingMembers -> DEBU 342 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:17.123 UTC [gossip.discovery] learnExistingMembers -> DEBU 343 Exiting" +"2019-05-02 09:27:17.123 UTC [gossip.discovery] handleAliveMessage -> DEBU 344 Exiting" +"2019-05-02 09:27:17.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 345 Exiting" +"2019-05-02 09:27:17.123 UTC [gossip.discovery] sendMemResponse -> DEBU 346 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:17.123 UTC [gossip.comm] Send -> DEBU 347 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:17.124 UTC [gossip.discovery] sendMemResponse -> DEBU 348 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:17.124 UTC [gossip.comm] sendToEndpoint -> DEBU 349 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes" +"2019-05-02 09:27:17.124 UTC [gossip.comm] sendToEndpoint -> DEBU 34a Exiting" +"2019-05-02 09:27:17.117 UTC [gossip.gossip] handleMessage -> DEBU 34b Exiting" +"2019-05-02 09:27:17.323 UTC [gossip.election] waitForMembershipStabilization -> DEBU 34c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" +"2019-05-02 09:27:17.323 UTC [gossip.election] leaderElection -> DEBU 34d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:17.323 UTC [gossip.election] propose -> DEBU 34e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:17.323 UTC [gossip.election] propose -> DEBU 34f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:27:17.324 UTC [msp.identity] Sign -> DEBU 350 Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08BCA7ABE8FEF1B4CD151001 " +"2019-05-02 09:27:17.324 UTC [msp.identity] Sign -> DEBU 351 Sign: digest: 5CF0E972D4F2A13EEB0551D5D89C9BCC32A7CFC77553710AEE74BA7D35FC5DEC " +"2019-05-02 09:27:17.326 UTC [gossip.election] waitForInterrupt -> DEBU 352 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:17.518 UTC [endorser] ProcessProposal -> DEBU 353 Entering: request from 172.18.0.8:57204" +"2019-05-02 09:27:17.518 UTC [protoutils] ValidateProposalMessage -> DEBU 354 ValidateProposalMessage starts for signed proposal 0xc002d6f090" +"2019-05-02 09:27:17.518 UTC [protoutils] validateChannelHeader -> DEBU 355 validateChannelHeader info: header type 3" +"2019-05-02 09:27:17.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 356 begin" +"2019-05-02 09:27:17.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 357 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:17.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 358 creator is valid" +"2019-05-02 09:27:17.519 UTC [msp.identity] Verify -> DEBU 359 Verify: digest = 00000000 75 74 78 92 3d 9e 73 60 a5 3f 5c a3 2b 59 86 09 |utx.=.s`.?\.+Y..| +00000010 24 a0 a7 62 ee b1 0c f7 d5 3e 8e eb 89 e6 83 09 |$..b.....>......|" +"2019-05-02 09:27:17.519 UTC [msp.identity] Verify -> DEBU 35a Verify: sig = 00000000 30 44 02 20 38 35 59 ca 73 12 a4 c6 82 fc 4e d9 |0D. 85Y.s.....N.| +00000010 f8 07 99 4c c8 d9 82 91 f7 e4 74 52 3c 48 21 72 |...L......tR DEBU 35b exits successfully" +"2019-05-02 09:27:17.520 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 35c validateChaincodeProposalMessage starts for proposal 0xc002643a40, header 0xc002d6f4a0" +"2019-05-02 09:27:17.521 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 35d validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-05-02 09:27:17.521 UTC [endorser] preProcess -> DEBU 35e [][023c903b] processing txid: 023c903b0cd2c18d664179b0f27558b6de8975a98a972a42bc4850ea7327665c" +"2019-05-02 09:27:17.521 UTC [endorser] SimulateProposal -> DEBU 35f [][023c903b] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:17.521 UTC [endorser] callChaincode -> INFO 360 [][023c903b] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:17.522 UTC [chaincode] Execute -> DEBU 361 Entry" +"2019-05-02 09:27:17.522 UTC [cscc] Invoke -> DEBU 362 Invoke function: GetChannels" +"2019-05-02 09:27:17.522 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 363 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:27:17.523 UTC [msp] Validate -> DEBU 364 MSP Org1MSP validating identity" +"2019-05-02 09:27:17.524 UTC [msp.identity] Verify -> DEBU 365 Verify: digest = 00000000 75 74 78 92 3d 9e 73 60 a5 3f 5c a3 2b 59 86 09 |utx.=.s`.?\.+Y..| +00000010 24 a0 a7 62 ee b1 0c f7 d5 3e 8e eb 89 e6 83 09 |$..b.....>......|" +"2019-05-02 09:27:17.524 UTC [msp.identity] Verify -> DEBU 366 Verify: sig = 00000000 30 44 02 20 38 35 59 ca 73 12 a4 c6 82 fc 4e d9 |0D. 85Y.s.....N.| +00000010 f8 07 99 4c c8 d9 82 91 f7 e4 74 52 3c 48 21 72 |...L......tR DEBU 367 [023c903b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:17.525 UTC [chaincode] Notify -> DEBU 368 [023c903b] notifying Txid:023c903b0cd2c18d664179b0f27558b6de8975a98a972a42bc4850ea7327665c, channelID:" +"2019-05-02 09:27:17.526 UTC [chaincode] Execute -> DEBU 369 Exit" +"2019-05-02 09:27:17.526 UTC [endorser] callChaincode -> INFO 36a [][023c903b] Exit chaincode: name:"cscc" (4ms)" +"2019-05-02 09:27:17.526 UTC [endorser] SimulateProposal -> DEBU 36b [][023c903b] Exit" +"2019-05-02 09:27:17.526 UTC [endorser] func1 -> DEBU 36c Exit: request from 172.18.0.8:57204" +"2019-05-02 09:27:17.527 UTC [comm.grpc.server] 1 -> INFO 36d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57204 grpc.code=OK grpc.call_duration=8.4436ms +"2019-05-02 09:27:17.530 UTC [grpc] infof -> DEBU 36e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:18.451 UTC [endorser] ProcessProposal -> DEBU 36f Entering: request from 172.18.0.8:57212" +"2019-05-02 09:27:18.451 UTC [protoutils] ValidateProposalMessage -> DEBU 370 ValidateProposalMessage starts for signed proposal 0xc002d41a40" +"2019-05-02 09:27:18.451 UTC [protoutils] validateChannelHeader -> DEBU 371 validateChannelHeader info: header type 3" +"2019-05-02 09:27:18.451 UTC [protoutils] checkSignatureFromCreator -> DEBU 372 begin" +"2019-05-02 09:27:18.451 UTC [protoutils] checkSignatureFromCreator -> DEBU 373 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:18.451 UTC [protoutils] checkSignatureFromCreator -> DEBU 374 creator is valid" +"2019-05-02 09:27:18.452 UTC [msp.identity] Verify -> DEBU 375 Verify: digest = 00000000 3a 0f 30 69 d6 29 d5 3b 03 24 d6 0d 03 6c 03 47 |:.0i.).;.$...l.G| +00000010 ed c1 2d 17 78 98 a9 2b b3 e2 2d 64 e4 1c d1 24 |..-.x..+..-d...$|" +"2019-05-02 09:27:18.452 UTC [msp.identity] Verify -> DEBU 376 Verify: sig = 00000000 30 44 02 20 09 f7 93 b0 ec 7e 9d bd 6a 1c de e7 |0D. .....~..j...| +00000010 3b 66 da 09 67 7e 52 02 46 38 b6 dd 09 5c f6 b4 |;f..g~R.F8...\..| +00000020 27 86 52 a0 02 20 05 27 37 a4 af cd 3f 86 14 08 |'.R.. .'7...?...| +00000030 4d cb e6 c0 8f 60 33 8c 5d 72 27 6d d5 e1 22 3a |M....`3.]r'm..":| +00000040 63 8c 2f 4a b4 09 |c./J..|" +"2019-05-02 09:27:18.452 UTC [protoutils] checkSignatureFromCreator -> DEBU 377 exits successfully" +"2019-05-02 09:27:18.452 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 378 validateChaincodeProposalMessage starts for proposal 0xc002cdce00, header 0xc002d41e50" +"2019-05-02 09:27:18.453 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 379 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-05-02 09:27:18.453 UTC [endorser] preProcess -> DEBU 37a [][716a73c1] processing txid: 716a73c130bfb25dd8bcba33e06ba94e3532aafe9f6f842a99d19cb09b6e5234" +"2019-05-02 09:27:18.453 UTC [endorser] SimulateProposal -> DEBU 37b [][716a73c1] Entry chaincode: name:"qscc" " +"2019-05-02 09:27:18.453 UTC [endorser] callChaincode -> INFO 37c [][716a73c1] Entry chaincode: name:"qscc" " +"2019-05-02 09:27:18.453 UTC [chaincode] Execute -> DEBU 37d Entry" +"2019-05-02 09:27:18.454 UTC [qscc] Invoke -> DEBU 37e Invoke function: GetChainInfo on chain: businesschannel" +"2019-05-02 09:27:18.454 UTC [aclmgmt] CheckACL -> DEBU 37f acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-05-02 09:27:18.454 UTC [aclmgmt] CheckACL -> DEBU 380 acl check(/Channel/Application/Readers)" +"2019-05-02 09:27:18.455 UTC [policies] Evaluate -> DEBU 381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:18.455 UTC [policies] Evaluate -> DEBU 382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:18.455 UTC [policies] Evaluate -> DEBU 383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:18.455 UTC [msp] DeserializeIdentity -> DEBU 384 Obtaining identity" +"2019-05-02 09:27:18.456 UTC [msp.identity] newIdentity -> DEBU 385 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1888,57 +1888,65 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:43.030 UTC [cauthdsl] func1 -> DEBU 386 0xc002dea280 gate 1556760643030244600 evaluation starts" -"2019-05-02 01:30:43.030 UTC [cauthdsl] func2 -> DEBU 387 0xc002dea280 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:43.030 UTC [cauthdsl] func2 -> DEBU 388 0xc002dea280 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:43.030 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 389 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:30:43.030 UTC [msp] Validate -> DEBU 38a MSP Org1MSP validating identity" -"2019-05-02 01:30:43.031 UTC [msp] getCertificationChain -> DEBU 38b MSP Org1MSP getting certification chain" -"2019-05-02 01:30:43.032 UTC [cauthdsl] func2 -> DEBU 38c 0xc002dea280 principal matched by identity 0" -"2019-05-02 01:30:43.032 UTC [msp.identity] Verify -> DEBU 38d Verify: digest = 00000000 f0 5c 4f 14 e3 5f f7 68 88 ab c5 05 35 9e 4d 07 |.\O.._.h....5.M.| -00000010 02 1a cf dc 40 66 5c 88 69 c0 c9 ea 15 01 f1 e9 |....@f\.i.......|" -"2019-05-02 01:30:43.032 UTC [msp.identity] Verify -> DEBU 38e Verify: sig = 00000000 30 44 02 20 6f 0e 57 d0 37 a9 71 a2 ab 01 6b b2 |0D. o.W.7.q...k.| -00000010 1a c8 0c 53 fc 95 df db 7f 80 23 f8 95 bc 9f fb |...S......#.....| -00000020 f1 18 94 67 02 20 7f 5d e9 03 ad ce 26 16 e5 19 |...g. .]....&...| -00000030 4a 11 3f df 98 33 0d c4 18 02 16 26 25 fa da 56 |J.?..3.....&%..V| -00000040 92 ec ce 76 29 b8 |...v).|" -"2019-05-02 01:30:43.033 UTC [cauthdsl] func2 -> DEBU 38f 0xc002dea280 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:43.033 UTC [cauthdsl] func1 -> DEBU 390 0xc002dea280 gate 1556760643030244600 evaluation succeeds" -"2019-05-02 01:30:43.033 UTC [policies] Evaluate -> DEBU 391 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:43.033 UTC [policies] Evaluate -> DEBU 392 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:43.034 UTC [policies] Evaluate -> DEBU 393 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:43.034 UTC [policies] Evaluate -> DEBU 394 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:43.034 UTC [chaincode] handleMessage -> DEBU 395 [472b2b8a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:43.034 UTC [chaincode] Notify -> DEBU 396 [472b2b8a] notifying Txid:472b2b8acdb6f31dbcede8e00eb9b0112e9374c6cfb2f7aef5ddeecff988a0e0, channelID:" -"2019-05-02 01:30:43.034 UTC [chaincode] Execute -> DEBU 397 Exit" -"2019-05-02 01:30:43.035 UTC [endorser] callChaincode -> INFO 398 [][472b2b8a] Exit chaincode: name:"qscc" (7ms)" -"2019-05-02 01:30:43.035 UTC [endorser] SimulateProposal -> DEBU 399 [][472b2b8a] Exit" -"2019-05-02 01:30:43.035 UTC [endorser] func1 -> DEBU 39a Exit: request from 192.168.240.9:41198" -"2019-05-02 01:30:43.035 UTC [comm.grpc.server] 1 -> INFO 39b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41198 grpc.code=OK grpc.call_duration=11.0597ms -"2019-05-02 01:30:43.041 UTC [grpc] infof -> DEBU 39c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:43.461 UTC [gossip.gossip] handleMessage -> DEBU 39d Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:43.461 UTC [gossip.gossip] handleMessage -> DEBU 39e Exiting" -"2019-05-02 01:30:43.462 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:43.462 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:43.463 UTC [msp.identity] Verify -> DEBU 3a1 Verify: digest = 00000000 e2 4d de 95 45 ee b5 dd 0e 2e b3 02 0e db 4a 00 |.M..E.........J.| -00000010 35 0f 6f 3e 25 23 b5 b0 8e 01 c5 cd 29 7d fe 5b |5.o>%#......)}.[|" -"2019-05-02 01:30:43.463 UTC [msp.identity] Verify -> DEBU 3a2 Verify: sig = 00000000 30 44 02 20 3b 47 63 6b ff d1 1b 99 aa 51 8b 23 |0D. ;Gck.....Q.#| -00000010 83 89 b9 bf 86 b1 f5 02 cc 9d d3 e5 ab 0d eb f3 |................| -00000020 34 38 5f 97 02 20 57 77 0c a6 34 75 9c c6 a3 3c |48_.. Ww..4u...<| -00000030 7e 2b 1b a7 85 09 dd dd ac db 5b cf b7 7e 62 77 |~+........[..~bw| -00000040 0a 73 93 31 29 ee |.s.1).|" -"2019-05-02 01:30:43.464 UTC [msp.identity] Verify -> DEBU 3a3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:18.458 UTC [cauthdsl] func1 -> DEBU 386 0xc002e019d0 gate 1556789238458692400 evaluation starts" +"2019-05-02 09:27:18.458 UTC [cauthdsl] func2 -> DEBU 387 0xc002e019d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:18.459 UTC [cauthdsl] func2 -> DEBU 388 0xc002e019d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:18.459 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 389 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:27:18.459 UTC [msp] Validate -> DEBU 38a MSP Org1MSP validating identity" +"2019-05-02 09:27:18.460 UTC [msp] getCertificationChain -> DEBU 38b MSP Org1MSP getting certification chain" +"2019-05-02 09:27:18.461 UTC [cauthdsl] func2 -> DEBU 38c 0xc002e019d0 principal matched by identity 0" +"2019-05-02 09:27:18.461 UTC [msp.identity] Verify -> DEBU 38d Verify: digest = 00000000 3a 0f 30 69 d6 29 d5 3b 03 24 d6 0d 03 6c 03 47 |:.0i.).;.$...l.G| +00000010 ed c1 2d 17 78 98 a9 2b b3 e2 2d 64 e4 1c d1 24 |..-.x..+..-d...$|" +"2019-05-02 09:27:18.461 UTC [msp.identity] Verify -> DEBU 38e Verify: sig = 00000000 30 44 02 20 09 f7 93 b0 ec 7e 9d bd 6a 1c de e7 |0D. .....~..j...| +00000010 3b 66 da 09 67 7e 52 02 46 38 b6 dd 09 5c f6 b4 |;f..g~R.F8...\..| +00000020 27 86 52 a0 02 20 05 27 37 a4 af cd 3f 86 14 08 |'.R.. .'7...?...| +00000030 4d cb e6 c0 8f 60 33 8c 5d 72 27 6d d5 e1 22 3a |M....`3.]r'm..":| +00000040 63 8c 2f 4a b4 09 |c./J..|" +"2019-05-02 09:27:18.462 UTC [cauthdsl] func2 -> DEBU 38f 0xc002e019d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:18.463 UTC [cauthdsl] func1 -> DEBU 390 0xc002e019d0 gate 1556789238458692400 evaluation succeeds" +"2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 391 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 392 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 393 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:18.463 UTC [policies] Evaluate -> DEBU 394 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:18.464 UTC [chaincode] handleMessage -> DEBU 395 [716a73c1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:18.464 UTC [chaincode] Notify -> DEBU 396 [716a73c1] notifying Txid:716a73c130bfb25dd8bcba33e06ba94e3532aafe9f6f842a99d19cb09b6e5234, channelID:" +"2019-05-02 09:27:18.464 UTC [chaincode] Execute -> DEBU 397 Exit" +"2019-05-02 09:27:18.464 UTC [endorser] callChaincode -> INFO 398 [][716a73c1] Exit chaincode: name:"qscc" (11ms)" +"2019-05-02 09:27:18.464 UTC [endorser] SimulateProposal -> DEBU 399 [][716a73c1] Exit" +"2019-05-02 09:27:18.465 UTC [endorser] func1 -> DEBU 39a Exit: request from 172.18.0.8:57212" +"2019-05-02 09:27:18.465 UTC [comm.grpc.server] 1 -> INFO 39b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57212 grpc.code=OK grpc.call_duration=14.4182ms +"2019-05-02 09:27:18.469 UTC [grpc] infof -> DEBU 39c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 39d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151008 " +"2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 39e Sign: digest: EF09E2D58682A805749A98A96E2B543A0C3248E6F007BFAD30F068D012DEB0FD " +"2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 39f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:19.063 UTC [msp.identity] Sign -> DEBU 3a0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:19.063 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3a1 Sleeping 5s" +"2019-05-02 09:27:19.073 UTC [gossip.comm] Send -> DEBU 3a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:19.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:19.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3a4 Exiting" +"2019-05-02 09:27:19.116 UTC [gossip.gossip] handleMessage -> DEBU 3a5 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:19.116 UTC [gossip.gossip] handleMessage -> DEBU 3a6 Exiting" +"2019-05-02 09:27:19.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:19.117 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a8 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:19.117 UTC [msp.identity] Verify -> DEBU 3a9 Verify: digest = 00000000 ed 47 db 57 06 c0 5e 0d e1 8c 81 a0 02 35 2f 1a |.G.W..^......5/.| +00000010 94 23 9a 81 4e 5b 68 32 3c e0 b3 4f 76 60 72 95 |.#..N[h2<..Ov`r.|" +"2019-05-02 09:27:19.117 UTC [msp.identity] Verify -> DEBU 3aa Verify: sig = 00000000 30 44 02 20 31 b9 af 62 ef d4 94 05 d7 2d d8 61 |0D. 1..b.....-.a| +00000010 41 6f 0e c1 5d 1f ff ed d6 5b f5 55 e3 5a b5 18 |Ao..]....[.U.Z..| +00000020 bb 50 fd 15 02 20 51 de 62 25 cb 58 6a 8e 04 42 |.P... Q.b%.Xj..B| +00000030 c0 98 cc 3f 02 75 fb de 0c 81 3d 46 96 19 3c 11 |...?.u....=F..<.| +00000040 83 8a a5 e8 02 f6 |......|" +"2019-05-02 09:27:19.117 UTC [msp.identity] Verify -> DEBU 3ab Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:43.464 UTC [msp.identity] Verify -> DEBU 3a4 Verify: sig = 00000000 30 45 02 21 00 c7 f7 17 3d 57 35 cb 5a 9c 01 57 |0E.!....=W5.Z..W| -00000010 d6 22 32 2c 92 c6 75 ae 0d e1 2e e4 d3 35 3f 0c |."2,..u......5?.| -00000020 db e2 ca b3 f9 02 20 7b 30 12 62 a5 ae c0 cd 47 |...... {0.b....G| -00000030 75 79 0e 1a 55 d4 81 37 32 92 96 68 e5 dd a5 30 |uy..U..72..h...0| -00000040 40 99 55 90 72 2f ea |@.U.r/.|" -"2019-05-02 01:30:43.464 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:43.465 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:30:43.465 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a7 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 " -"2019-05-02 01:30:43.465 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 " -"2019-05-02 01:30:43.466 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +"2019-05-02 09:27:19.118 UTC [msp.identity] Verify -> DEBU 3ac Verify: sig = 00000000 30 45 02 21 00 9c a1 11 d3 49 e8 bc 1c 50 d3 4c |0E.!.....I...P.L| +00000010 d1 c8 73 f4 b3 77 ff 2d de a7 b9 b3 51 a6 69 35 |..s..w.-....Q.i5| +00000020 6e db 41 3a 23 02 20 1f a1 d1 b3 ec 4b 5f ef 62 |n.A:#. .....K_.b| +00000030 ed e1 84 09 ac e9 47 df e9 f7 e3 c4 f6 67 c0 7f |......G......g..| +00000040 b2 ee bb ce 57 6c 24 |....Wl$|" +"2019-05-02 09:27:19.118 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ad Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ae Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3af updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 " +"2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 " +"2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -1952,36 +1960,28 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE----- -Timestamp:inc_num:1556760633448248700 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:43.467 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aa Exiting" -"2019-05-02 01:30:43.467 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ab Exiting" -"2019-05-02 01:30:43.467 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ac Exiting" -"2019-05-02 01:30:43.615 UTC [msp.identity] Sign -> DEBU 3ad Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151008 " -"2019-05-02 01:30:43.615 UTC [msp.identity] Sign -> DEBU 3ae Sign: digest: DF90D1173360E38AE18519664A3E99B041F98F5955F6B239F6CD49BB47B839BA " -"2019-05-02 01:30:43.616 UTC [msp.identity] Sign -> DEBU 3af Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:43.616 UTC [msp.identity] Sign -> DEBU 3b0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:43.616 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3b1 Sleeping 5s" -"2019-05-02 01:30:43.623 UTC [gossip.comm] Send -> DEBU 3b2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:43.623 UTC [gossip.comm] sendToEndpoint -> DEBU 3b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:43.624 UTC [gossip.comm] sendToEndpoint -> DEBU 3b4 Exiting" -"2019-05-02 01:30:44.862 UTC [gossip.comm] Send -> DEBU 3b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:44.862 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:44.862 UTC [gossip.comm] sendToEndpoint -> DEBU 3b7 Exiting" -"2019-05-02 01:30:44.864 UTC [gossip.gossip] handleMessage -> DEBU 3b8 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -"2019-05-02 01:30:44.865 UTC [msp.identity] Verify -> DEBU 3b9 Verify: digest = 00000000 64 b8 f5 fc bc 41 9d c3 23 39 08 c8 d5 68 b5 5f |d....A..#9...h._| -00000010 cb 60 03 12 f4 56 5f 02 2c cb 7b ec 0c ec e7 f3 |.`...V_.,.{.....|" -"2019-05-02 01:30:44.865 UTC [msp.identity] Verify -> DEBU 3ba Verify: sig = 00000000 30 45 02 21 00 8d e0 ab 12 85 44 66 c1 8b 8d dc |0E.!......Df....| -00000010 51 43 a8 33 77 2b f7 6f 71 2f 33 f0 a3 f9 30 e6 |QC.3w+.oq/3...0.| -00000020 a4 d6 0c 08 30 02 20 02 6e 63 0c 91 c6 6e 86 31 |....0. .nc...n.1| -00000030 d8 28 5e 48 90 45 48 1d c0 4f 20 99 6b c8 54 11 |.(^H.EH..O .k.T.| -00000040 af 82 d0 06 25 10 d2 |....%..|" -"2019-05-02 01:30:44.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bb Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:44.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:44.866 UTC [policies] Evaluate -> DEBU 3bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:44.866 UTC [policies] Evaluate -> DEBU 3be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:44.866 UTC [policies] Evaluate -> DEBU 3bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:30:44.867 UTC [msp] DeserializeIdentity -> DEBU 3c0 Obtaining identity" -"2019-05-02 01:30:44.867 UTC [msp.identity] newIdentity -> DEBU 3c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +Timestamp:inc_num:1556789229135374800 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:19.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b2 Exiting" +"2019-05-02 09:27:19.118 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b3 Exiting" +"2019-05-02 09:27:19.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b4 Exiting" +"2019-05-02 09:27:20.283 UTC [gossip.comm] Send -> DEBU 3b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:20.284 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:20.285 UTC [gossip.comm] sendToEndpoint -> DEBU 3b7 Exiting" +"2019-05-02 09:27:20.287 UTC [gossip.gossip] handleMessage -> DEBU 3b8 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +"2019-05-02 09:27:20.287 UTC [msp.identity] Verify -> DEBU 3b9 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h| +00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y DEBU 3ba Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....| +00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b| +00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..| +00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.| +00000040 89 bc 81 84 80 a7 |......|" +"2019-05-02 09:27:20.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bb Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:20.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:20.288 UTC [policies] Evaluate -> DEBU 3bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:20.288 UTC [policies] Evaluate -> DEBU 3be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:20.288 UTC [policies] Evaluate -> DEBU 3bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:20.288 UTC [msp] DeserializeIdentity -> DEBU 3c0 Obtaining identity" +"2019-05-02 09:27:20.288 UTC [msp.identity] newIdentity -> DEBU 3c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -1995,154 +1995,150 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE-----" -"2019-05-02 01:30:44.868 UTC [cauthdsl] func1 -> DEBU 3c2 0xc002e19160 gate 1556760644868912600 evaluation starts" -"2019-05-02 01:30:44.869 UTC [cauthdsl] func2 -> DEBU 3c3 0xc002e19160 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:44.869 UTC [cauthdsl] func2 -> DEBU 3c4 0xc002e19160 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:44.869 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3c5 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:30:44.870 UTC [msp] Validate -> DEBU 3c6 MSP Org1MSP validating identity" -"2019-05-02 01:30:44.871 UTC [msp] getCertificationChain -> DEBU 3c7 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:44.871 UTC [cauthdsl] func2 -> DEBU 3c8 0xc002e19160 principal matched by identity 0" -"2019-05-02 01:30:44.871 UTC [msp.identity] Verify -> DEBU 3c9 Verify: digest = 00000000 64 b8 f5 fc bc 41 9d c3 23 39 08 c8 d5 68 b5 5f |d....A..#9...h._| -00000010 cb 60 03 12 f4 56 5f 02 2c cb 7b ec 0c ec e7 f3 |.`...V_.,.{.....|" -"2019-05-02 01:30:44.871 UTC [msp.identity] Verify -> DEBU 3ca Verify: sig = 00000000 30 45 02 21 00 8d e0 ab 12 85 44 66 c1 8b 8d dc |0E.!......Df....| -00000010 51 43 a8 33 77 2b f7 6f 71 2f 33 f0 a3 f9 30 e6 |QC.3w+.oq/3...0.| -00000020 a4 d6 0c 08 30 02 20 02 6e 63 0c 91 c6 6e 86 31 |....0. .nc...n.1| -00000030 d8 28 5e 48 90 45 48 1d c0 4f 20 99 6b c8 54 11 |.(^H.EH..O .k.T.| -00000040 af 82 d0 06 25 10 d2 |....%..|" -"2019-05-02 01:30:44.872 UTC [cauthdsl] func2 -> DEBU 3cb 0xc002e19160 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:44.872 UTC [cauthdsl] func1 -> DEBU 3cc 0xc002e19160 gate 1556760644868912600 evaluation succeeds" -"2019-05-02 01:30:44.872 UTC [policies] Evaluate -> DEBU 3cd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:44.872 UTC [policies] Evaluate -> DEBU 3ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:44.872 UTC [policies] Evaluate -> DEBU 3cf Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:44.872 UTC [policies] Evaluate -> DEBU 3d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:44.872 UTC [gossip.gossip] handleMessage -> DEBU 3d1 Exiting" -"2019-05-02 01:30:44.873 UTC [gossip.pull] Hello -> DEBU 3d2 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:30:44.874 UTC [gossip.comm] Send -> DEBU 3d3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760640909059700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:44.874 UTC [gossip.comm] sendToEndpoint -> DEBU 3d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760640909059700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:44.875 UTC [gossip.comm] sendToEndpoint -> DEBU 3d5 Exiting" -"2019-05-02 01:30:44.878 UTC [gossip.comm] Send -> DEBU 3d6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:44.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3d7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:30:44.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8 Exiting" -"2019-05-02 01:30:45.127 UTC [gossip.gossip] handleMessage -> DEBU 3d9 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.129 UTC [gossip.gossip] handleMessage -> DEBU 3da Exiting" -"2019-05-02 01:30:45.135 UTC [gossip.gossip] handleMessage -> DEBU 3db Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.136 UTC [gossip.pull] HandleMessage -> DEBU 3dc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.137 UTC [gossip.gossip] handleMessage -> DEBU 3dd Exiting" -"2019-05-02 01:30:45.137 UTC [gossip.gossip] handleMessage -> DEBU 3de Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760641155345900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:30:45.140 UTC [msp.identity] Verify -> DEBU 3df Verify: digest = 00000000 64 b8 f5 fc bc 41 9d c3 23 39 08 c8 d5 68 b5 5f |d....A..#9...h._| -00000010 cb 60 03 12 f4 56 5f 02 2c cb 7b ec 0c ec e7 f3 |.`...V_.,.{.....|" -"2019-05-02 01:30:45.140 UTC [msp.identity] Verify -> DEBU 3e0 Verify: sig = 00000000 30 45 02 21 00 8d e0 ab 12 85 44 66 c1 8b 8d dc |0E.!......Df....| -00000010 51 43 a8 33 77 2b f7 6f 71 2f 33 f0 a3 f9 30 e6 |QC.3w+.oq/3...0.| -00000020 a4 d6 0c 08 30 02 20 02 6e 63 0c 91 c6 6e 86 31 |....0. .nc...n.1| -00000030 d8 28 5e 48 90 45 48 1d c0 4f 20 99 6b c8 54 11 |.(^H.EH..O .k.T.| -00000040 af 82 d0 06 25 10 d2 |....%..|" -"2019-05-02 01:30:45.142 UTC [gossip.gossip] handleMessage -> DEBU 3e1 Exiting" -"2019-05-02 01:30:45.457 UTC [gossip.gossip] handleMessage -> DEBU 3e2 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.457 UTC [gossip.pull] HandleMessage -> DEBU 3e3 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.458 UTC [gossip.pull] SendDigest -> DEBU 3e4 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:45.459 UTC [gossip.gossip] handleMessage -> DEBU 3e5 Exiting" -"2019-05-02 01:30:45.459 UTC [gossip.gossip] handleMessage -> DEBU 3e6 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.460 UTC [gossip.gossip] handleMessage -> DEBU 3e7 Exiting" -"2019-05-02 01:30:45.460 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.460 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e9 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:45.461 UTC [msp.identity] Verify -> DEBU 3ea Verify: digest = 00000000 2e 8c 68 23 b6 59 99 ab 05 d8 d7 3d 12 98 00 84 |..h#.Y.....=....| -00000010 f0 60 49 b0 be ac 01 7c a3 35 03 e1 6b 4c c2 c0 |.`I....|.5..kL..|" -"2019-05-02 01:30:45.461 UTC [msp.identity] Verify -> DEBU 3eb Verify: sig = 00000000 30 44 02 20 2b 9b 4d a1 c6 8f b2 99 63 7e 7a a9 |0D. +.M.....c~z.| -00000010 fc 48 e2 00 6e d5 94 b6 22 97 88 98 85 82 89 04 |.H..n...".......| -00000020 2e a4 d6 bf 02 20 33 bd 0a 60 58 81 8d 23 21 71 |..... 3..`X..#!q| -00000030 34 79 9a 55 19 2d bf fb 61 81 a0 08 65 1e 06 15 |4y.U.-..a...e...| -00000040 b2 9a dd e4 88 a7 |......|" -"2019-05-02 01:30:45.461 UTC [msp.identity] Verify -> DEBU 3ec Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:45.461 UTC [msp.identity] Verify -> DEBU 3ed Verify: sig = 00000000 30 45 02 21 00 fb 9e 94 b5 af 91 e4 bd cf 4b 05 |0E.!..........K.| -00000010 b8 d2 10 d4 6a 63 51 23 bd 80 b4 a6 e8 d2 cd 79 |....jcQ#.......y| -00000020 c2 90 f3 d0 5c 02 20 54 6a b6 69 89 89 e1 ee 2e |....\. Tj.i.....| -00000030 08 6b 68 e0 07 5f 8c 78 9d 5e 57 da b8 8b 01 56 |.kh.._.x.^W....V| -00000040 04 16 96 fd 07 ae 83 |.......|" -"2019-05-02 01:30:45.462 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ee Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:45.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ef Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:30:45.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f0 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 " -"2019-05-02 01:30:45.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 " -"2019-05-02 01:30:45.463 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:45.463 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3 Exiting" -"2019-05-02 01:30:45.463 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f4 Exiting" -"2019-05-02 01:30:45.463 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f5 Exiting" -"2019-05-02 01:30:45.463 UTC [gossip.discovery] sendMemResponse -> DEBU 3f6 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:45.464 UTC [gossip.comm] Send -> DEBU 3f7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:45.464 UTC [gossip.discovery] sendMemResponse -> DEBU 3f8 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:30:45.464 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.464 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa Exiting" -"2019-05-02 01:30:45.617 UTC [gossip.pull] Hello -> DEBU 3fb Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:30:45.617 UTC [gossip.comm] Send -> DEBU 3fc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:45.617 UTC [gossip.comm] sendToEndpoint -> DEBU 3fd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.617 UTC [gossip.comm] sendToEndpoint -> DEBU 3fe Exiting" -"2019-05-02 01:30:45.618 UTC [gossip.gossip] handleMessage -> DEBU 3ff Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7342555231517954143 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.618 UTC [gossip.pull] HandleMessage -> DEBU 400 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7342555231517954143 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.618 UTC [gossip.gossip] handleMessage -> DEBU 401 Exiting" -"2019-05-02 01:30:45.621 UTC [msp.identity] Sign -> DEBU 402 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151009 " -"2019-05-02 01:30:45.621 UTC [msp.identity] Sign -> DEBU 403 Sign: digest: 17C272D0B1B95EA74D202C4FAF26DB44D06F2521E28F3123903C2D7E21EABA54 " -"2019-05-02 01:30:45.621 UTC [msp.identity] Sign -> DEBU 404 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:45.621 UTC [msp.identity] Sign -> DEBU 405 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:45.621 UTC [gossip.comm] Send -> DEBU 406 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:45.621 UTC [gossip.comm] sendToEndpoint -> DEBU 407 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.621 UTC [gossip.comm] sendToEndpoint -> DEBU 408 Exiting" -"2019-05-02 01:30:45.624 UTC [gossip.gossip] handleMessage -> DEBU 409 Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.624 UTC [gossip.gossip] handleMessage -> DEBU 40a Exiting" -"2019-05-02 01:30:45.624 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:30:45.624 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 40c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:45.624 UTC [msp.identity] Verify -> DEBU 40d Verify: digest = 00000000 17 c2 72 d0 b1 b9 5e a7 4d 20 2c 4f af 26 db 44 |..r...^.M ,O.&.D| -00000010 d0 6f 25 21 e2 8f 31 23 90 3c 2d 7e 21 ea ba 54 |.o%!..1#.<-~!..T|" -"2019-05-02 01:30:45.624 UTC [msp.identity] Verify -> DEBU 40e Verify: sig = 00000000 30 45 02 21 00 f0 c0 8e 38 9a b0 25 b0 b4 0a f7 |0E.!....8..%....| -00000010 b3 22 bb b5 44 61 4c 9b 92 d0 0f 69 1f a1 74 d6 |."..DaL....i..t.| -00000020 55 80 84 d0 a0 02 20 44 76 aa 62 36 eb 04 af 61 |U..... Dv.b6...a| -00000030 08 5d d5 3c 1a 32 74 3d b2 ae cd d8 31 b3 64 f3 |.].<.2t=....1.d.| -00000040 1a a3 86 fc 98 9e af |.......|" -"2019-05-02 01:30:45.625 UTC [msp.identity] Verify -> DEBU 40f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:27:20.288 UTC [cauthdsl] func1 -> DEBU 3c2 0xc002e58140 gate 1556789240288894500 evaluation starts" +"2019-05-02 09:27:20.289 UTC [cauthdsl] func2 -> DEBU 3c3 0xc002e58140 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:20.289 UTC [cauthdsl] func2 -> DEBU 3c4 0xc002e58140 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:20.289 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3c5 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:27:20.289 UTC [msp] Validate -> DEBU 3c6 MSP Org1MSP validating identity" +"2019-05-02 09:27:20.290 UTC [msp] getCertificationChain -> DEBU 3c7 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:20.290 UTC [cauthdsl] func2 -> DEBU 3c8 0xc002e58140 principal matched by identity 0" +"2019-05-02 09:27:20.290 UTC [msp.identity] Verify -> DEBU 3c9 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h| +00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y DEBU 3ca Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....| +00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b| +00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..| +00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.| +00000040 89 bc 81 84 80 a7 |......|" +"2019-05-02 09:27:20.290 UTC [cauthdsl] func2 -> DEBU 3cb 0xc002e58140 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:20.290 UTC [cauthdsl] func1 -> DEBU 3cc 0xc002e58140 gate 1556789240288894500 evaluation succeeds" +"2019-05-02 09:27:20.290 UTC [policies] Evaluate -> DEBU 3cd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:20.290 UTC [policies] Evaluate -> DEBU 3ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:20.290 UTC [policies] Evaluate -> DEBU 3cf Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:20.291 UTC [policies] Evaluate -> DEBU 3d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:20.291 UTC [gossip.gossip] handleMessage -> DEBU 3d1 Exiting" +"2019-05-02 09:27:20.295 UTC [gossip.comm] Send -> DEBU 3d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789236325947800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:20.295 UTC [gossip.comm] sendToEndpoint -> DEBU 3d3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789236325947800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:20.295 UTC [gossip.comm] sendToEndpoint -> DEBU 3d4 Exiting" +"2019-05-02 09:27:20.542 UTC [gossip.gossip] handleMessage -> DEBU 3d5 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:20.543 UTC [gossip.gossip] handleMessage -> DEBU 3d6 Exiting" +"2019-05-02 09:27:20.543 UTC [gossip.gossip] handleMessage -> DEBU 3d7 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:20.545 UTC [gossip.pull] HandleMessage -> DEBU 3d8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:20.545 UTC [gossip.gossip] handleMessage -> DEBU 3d9 Exiting" +"2019-05-02 09:27:20.547 UTC [gossip.gossip] handleMessage -> DEBU 3da Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789236573790800 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:20.548 UTC [msp.identity] Verify -> DEBU 3db Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h| +00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y DEBU 3dc Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....| +00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b| +00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..| +00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.| +00000040 89 bc 81 84 80 a7 |......|" +"2019-05-02 09:27:20.549 UTC [gossip.gossip] handleMessage -> DEBU 3dd Exiting" +"2019-05-02 09:27:21.070 UTC [gossip.pull] Hello -> DEBU 3de Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:21.070 UTC [msp.identity] Sign -> DEBU 3df Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151009 " +"2019-05-02 09:27:21.071 UTC [msp.identity] Sign -> DEBU 3e0 Sign: digest: 0E943797D8D439F6639B66FD538EC511BE9DB7FCC43AA95E3077CB08A6CCE129 " +"2019-05-02 09:27:21.071 UTC [msp.identity] Sign -> DEBU 3e1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:21.071 UTC [msp.identity] Sign -> DEBU 3e2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:21.072 UTC [gossip.comm] Send -> DEBU 3e3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:21.072 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.072 UTC [gossip.comm] sendToEndpoint -> DEBU 3e5 Exiting" +"2019-05-02 09:27:21.073 UTC [gossip.comm] Send -> DEBU 3e6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:21.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3e7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8 Exiting" +"2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3e9 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3ea Exiting" +"2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3eb Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 785619318732718520 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.076 UTC [gossip.pull] HandleMessage -> DEBU 3ec GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 785619318732718520 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.076 UTC [gossip.gossip] handleMessage -> DEBU 3ed Exiting" +"2019-05-02 09:27:21.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.076 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:21.076 UTC [msp.identity] Verify -> DEBU 3f0 Verify: digest = 00000000 0e 94 37 97 d8 d4 39 f6 63 9b 66 fd 53 8e c5 11 |..7...9.c.f.S...| +00000010 be 9d b7 fc c4 3a a9 5e 30 77 cb 08 a6 cc e1 29 |.....:.^0w.....)|" +"2019-05-02 09:27:21.077 UTC [msp.identity] Verify -> DEBU 3f1 Verify: sig = 00000000 30 44 02 20 3c 60 f3 75 6c c8 c4 74 dd c8 61 b7 |0D. <`.ul..t..a.| +00000010 a3 9b 28 51 86 57 e0 e9 9f f8 af 37 14 41 61 62 |..(Q.W.....7.Aab| +00000020 e0 e6 42 d6 02 20 4b 7f c3 5e 82 f7 53 19 e9 1d |..B.. K..^..S...| +00000030 f3 85 00 23 ca 69 71 21 5f 74 28 da 36 65 41 9c |...#.iq!_t(.6eA.| +00000040 d6 e6 0a 68 db 24 |...h.$|" +"2019-05-02 09:27:21.077 UTC [msp.identity] Verify -> DEBU 3f2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:30:45.625 UTC [msp.identity] Verify -> DEBU 410 Verify: sig = 00000000 30 44 02 20 19 b8 16 61 44 b6 3d ae 9e 7f 53 bc |0D. ...aD.=...S.| -00000010 61 c9 99 ef 93 bd 33 81 ee ff 23 a6 29 cb 05 df |a.....3...#.)...| -00000020 12 a6 e3 2e 02 20 40 f0 ba bf b3 53 2d 8a 24 b2 |..... @....S-.$.| -00000030 68 69 19 20 22 b6 fa fb d2 52 38 3f d7 90 c0 f1 |hi. "....R8?....| -00000040 69 45 1d 11 89 c7 |iE....|" -"2019-05-02 01:30:45.625 UTC [gossip.discovery] handleAliveMessage -> DEBU 411 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:45.625 UTC [gossip.discovery] isSentByMe -> DEBU 412 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:45.625 UTC [gossip.discovery] handleAliveMessage -> DEBU 413 Exiting" -"2019-05-02 01:30:45.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 414 Exiting" -"2019-05-02 01:30:45.864 UTC [gossip.channel] reportMembershipChanges -> INFO 415 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" -"2019-05-02 01:30:46.902 UTC [gossip.election] waitForInterrupt -> DEBU 416 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:30:46.903 UTC [gossip.election] beLeader -> INFO 417 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" -"2019-05-02 01:30:46.903 UTC [gossip.service] func1 -> INFO 418 Elected as a leader, starting delivery service for channel businesschannel" -"2019-05-02 01:30:46.905 UTC [deliveryClient] StartDeliverForChannel -> DEBU 419 This peer will pass blocks from orderer service to other peers for channel businesschannel" -"2019-05-02 01:30:46.906 UTC [gossip.election] leaderElection -> DEBU 41a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:30:46.907 UTC [ConnProducer] NewConnection -> DEBU 41b Creating a new connection" -"2019-05-02 01:30:46.908 UTC [gossip.election] IsLeader -> DEBU 41c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:30:46.909 UTC [msp.identity] Sign -> DEBU 41d Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510021801 " -"2019-05-02 01:30:46.909 UTC [msp.identity] Sign -> DEBU 41e Sign: digest: 8B6F697684C215A73D24832DE95F115158D05764162D7564445E92AC4BF4B6F7 " -"2019-05-02 01:30:46.910 UTC [gossip.election] waitForInterrupt -> DEBU 41f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:30:46.911 UTC [grpc] DialContext -> DEBU 420 parsed scheme: """ -"2019-05-02 01:30:46.911 UTC [grpc] DialContext -> DEBU 421 scheme "" not registered, fallback to default scheme" -"2019-05-02 01:30:46.911 UTC [grpc] UpdateState -> DEBU 422 ccResolverWrapper: sending update to cc: {[{orderer1.example.com:7050 0 }] }" -"2019-05-02 01:30:46.911 UTC [grpc] switchBalancer -> DEBU 423 ClientConn switching balancer to "pick_first"" -"2019-05-02 01:30:46.912 UTC [grpc] HandleSubConnStateChange -> DEBU 424 pickfirstBalancer: HandleSubConnStateChange: 0xc002eb66d0, CONNECTING" -"2019-05-02 01:30:46.913 UTC [gossip.comm] Send -> DEBU 425 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:46.913 UTC [gossip.comm] sendToEndpoint -> DEBU 426 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -"2019-05-02 01:30:46.914 UTC [gossip.comm] sendToEndpoint -> DEBU 427 Exiting" -"2019-05-02 01:30:46.918 UTC [grpc] HandleSubConnStateChange -> DEBU 428 pickfirstBalancer: HandleSubConnStateChange: 0xc002eb66d0, READY" -"2019-05-02 01:30:46.918 UTC [ConnProducer] NewConnection -> DEBU 429 Connected to orderer1.example.com:7050" -"2019-05-02 01:30:46.919 UTC [deliveryClient] connect -> DEBU 42a Connected to orderer1.example.com:7050" -"2019-05-02 01:30:46.919 UTC [deliveryClient] connect -> DEBU 42b Establishing gRPC stream with orderer1.example.com:7050 ..." -"2019-05-02 01:30:46.919 UTC [deliveryClient] afterConnect -> DEBU 42c Entering" -"2019-05-02 01:30:46.920 UTC [deliveryClient] RequestBlocks -> DEBU 42d Starting deliver with block [1] for channel businesschannel" -"2019-05-02 01:30:46.920 UTC [msp.identity] Sign -> DEBU 42e Sign: plaintext: 0A91070A3D08051A0608C690A9E60522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " -"2019-05-02 01:30:46.921 UTC [msp.identity] Sign -> DEBU 42f Sign: digest: 413DC8997F20A32C9CBF7533B5F548E5788336132435B6A50FE828E63AD3D42F " -"2019-05-02 01:30:46.921 UTC [deliveryClient] afterConnect -> DEBU 430 Exiting" -"2019-05-02 01:30:46.925 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 431 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:46.925 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 432 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:46.925 UTC [policies] Evaluate -> DEBU 433 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-05-02 01:30:46.925 UTC [policies] Evaluate -> DEBU 434 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:46.926 UTC [policies] Evaluate -> DEBU 435 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:30:46.926 UTC [msp] DeserializeIdentity -> DEBU 436 Obtaining identity" -"2019-05-02 01:30:46.926 UTC [msp.identity] newIdentity -> DEBU 437 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:21.078 UTC [msp.identity] Verify -> DEBU 3f3 Verify: sig = 00000000 30 45 02 21 00 e7 53 0a 9a 72 26 2a b8 18 0f e4 |0E.!..S..r&*....| +00000010 51 be 3c 11 c6 70 fd 36 a1 7a ae f6 a8 97 c9 55 |Q.<..p.6.z.....U| +00000020 16 4f ef 17 7b 02 20 5b bf ca 5c 5a 34 da 75 8b |.O..{. [..\Z4.u.| +00000030 36 92 ff 1a 2c b5 19 c8 e6 0e 9e 79 a0 fb 49 04 |6...,......y..I.| +00000040 d7 99 5c 67 50 01 93 |..\gP..|" +"2019-05-02 09:27:21.078 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:21.080 UTC [gossip.discovery] isSentByMe -> DEBU 3f5 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:21.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f6 Exiting" +"2019-05-02 09:27:21.081 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f7 Exiting" +"2019-05-02 09:27:21.115 UTC [gossip.gossip] handleMessage -> DEBU 3f8 Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.116 UTC [gossip.pull] HandleMessage -> DEBU 3f9 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.116 UTC [gossip.pull] SendDigest -> DEBU 3fa Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:21.116 UTC [gossip.gossip] handleMessage -> DEBU 3fb Exiting" +"2019-05-02 09:27:21.119 UTC [gossip.gossip] handleMessage -> DEBU 3fc Entering, 172.18.0.6:53164 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fe Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:21.120 UTC [msp.identity] Verify -> DEBU 3ff Verify: digest = 00000000 3c d2 ae 36 98 38 d6 fb 44 e5 ff 16 21 78 36 7c |<..6.8..D...!x6|| +00000010 91 7a b7 92 d5 93 28 23 98 f8 70 a5 44 73 c8 20 |.z....(#..p.Ds. |" +"2019-05-02 09:27:21.120 UTC [msp.identity] Verify -> DEBU 400 Verify: sig = 00000000 30 44 02 20 19 cd 84 14 7c 45 5e 5f 42 0e fc 7a |0D. ....|E^_B..z| +00000010 de 0c 36 fb 21 e1 2c 87 80 82 4f 5b c3 00 62 26 |..6.!.,...O[..b&| +00000020 37 18 b5 f1 02 20 39 00 da 84 4b b9 8a 1d 90 6c |7.... 9...K....l| +00000030 4f 37 4b 30 99 44 56 b8 ef 72 01 43 b5 d3 c8 e9 |O7K0.DV..r.C....| +00000040 ec 5f a3 34 fa 3c |._.4.<|" +"2019-05-02 09:27:21.120 UTC [msp.identity] Verify -> DEBU 401 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:27:21.121 UTC [msp.identity] Verify -> DEBU 402 Verify: sig = 00000000 30 45 02 21 00 c2 1d 04 10 d6 df 07 2a 8a 67 66 |0E.!........*.gf| +00000010 2f 24 20 3e d5 7c 5e 31 93 1b 25 4a 71 99 10 2d |/$ >.|^1..%Jq..-| +00000020 21 c0 56 be 83 02 20 2f c8 13 bb 2b 84 1f dd 9a |!.V... /...+....| +00000030 c5 b0 04 af 8e 26 09 e2 d0 22 1d 64 e1 e5 b2 2e |.....&...".d....| +00000040 c7 ab ff 9f f0 11 bc |.......|" +"2019-05-02 09:27:21.121 UTC [gossip.discovery] handleAliveMessage -> DEBU 403 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:21.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 404 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:21.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 405 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 " +"2019-05-02 09:27:21.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 406 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 " +"2019-05-02 09:27:21.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 407 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:21.122 UTC [gossip.discovery] learnExistingMembers -> DEBU 408 Exiting" +"2019-05-02 09:27:21.122 UTC [gossip.discovery] handleAliveMessage -> DEBU 409 Exiting" +"2019-05-02 09:27:21.122 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a Exiting" +"2019-05-02 09:27:21.122 UTC [gossip.discovery] sendMemResponse -> DEBU 40b Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:21.122 UTC [gossip.comm] Send -> DEBU 40c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:21.122 UTC [gossip.discovery] sendMemResponse -> DEBU 40d Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:21.122 UTC [gossip.comm] sendToEndpoint -> DEBU 40e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-05-02 09:27:21.122 UTC [gossip.comm] sendToEndpoint -> DEBU 40f Exiting" +"2019-05-02 09:27:21.119 UTC [gossip.gossip] handleMessage -> DEBU 410 Exiting" +"2019-05-02 09:27:21.284 UTC [gossip.channel] reportMembershipChanges -> INFO 411 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +"2019-05-02 09:27:22.328 UTC [gossip.election] waitForInterrupt -> DEBU 412 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:27:22.329 UTC [gossip.election] beLeader -> INFO 413 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +"2019-05-02 09:27:22.329 UTC [gossip.service] func1 -> INFO 414 Elected as a leader, starting delivery service for channel businesschannel" +"2019-05-02 09:27:22.331 UTC [deliveryClient] StartDeliverForChannel -> DEBU 415 This peer will pass blocks from orderer service to other peers for channel businesschannel" +"2019-05-02 09:27:22.332 UTC [gossip.election] leaderElection -> DEBU 416 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:27:22.332 UTC [ConnProducer] NewConnection -> DEBU 417 Creating a new connection" +"2019-05-02 09:27:22.334 UTC [grpc] DialContext -> DEBU 418 parsed scheme: """ +"2019-05-02 09:27:22.334 UTC [grpc] DialContext -> DEBU 419 scheme "" not registered, fallback to default scheme" +"2019-05-02 09:27:22.335 UTC [grpc] UpdateState -> DEBU 41a ccResolverWrapper: sending update to cc: {[{orderer1.example.com:7050 0 }] }" +"2019-05-02 09:27:22.335 UTC [grpc] switchBalancer -> DEBU 41b ClientConn switching balancer to "pick_first"" +"2019-05-02 09:27:22.335 UTC [grpc] HandleSubConnStateChange -> DEBU 41c pickfirstBalancer: HandleSubConnStateChange: 0xc002eec260, CONNECTING" +"2019-05-02 09:27:22.332 UTC [gossip.election] IsLeader -> DEBU 41d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:27:22.338 UTC [msp.identity] Sign -> DEBU 41e Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510021801 " +"2019-05-02 09:27:22.339 UTC [msp.identity] Sign -> DEBU 41f Sign: digest: 60FC0EDC70A832CF6DF96F5563D02DBB555FDCF61BF2B6A8AF9231771DFA2140 " +"2019-05-02 09:27:22.339 UTC [gossip.election] waitForInterrupt -> DEBU 420 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:22.342 UTC [grpc] HandleSubConnStateChange -> DEBU 421 pickfirstBalancer: HandleSubConnStateChange: 0xc002eec260, READY" +"2019-05-02 09:27:22.342 UTC [gossip.comm] Send -> DEBU 422 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:22.343 UTC [gossip.comm] sendToEndpoint -> DEBU 423 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-05-02 09:27:22.343 UTC [gossip.comm] sendToEndpoint -> DEBU 425 Exiting" +"2019-05-02 09:27:22.343 UTC [ConnProducer] NewConnection -> DEBU 424 Connected to orderer1.example.com:7050" +"2019-05-02 09:27:22.343 UTC [deliveryClient] connect -> DEBU 426 Connected to orderer1.example.com:7050" +"2019-05-02 09:27:22.344 UTC [deliveryClient] connect -> DEBU 427 Establishing gRPC stream with orderer1.example.com:7050 ..." +"2019-05-02 09:27:22.344 UTC [deliveryClient] afterConnect -> DEBU 428 Entering" +"2019-05-02 09:27:22.344 UTC [deliveryClient] RequestBlocks -> DEBU 429 Starting deliver with block [1] for channel businesschannel" +"2019-05-02 09:27:22.344 UTC [msp.identity] Sign -> DEBU 42a Sign: plaintext: 0A91070A3D08051A0608FAEFAAE60522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " +"2019-05-02 09:27:22.344 UTC [msp.identity] Sign -> DEBU 42b Sign: digest: E5C7564D501A5B1C04CAF6AD5E5AE6F2DAB2D795A5C6261A95AD6BDB3D38E8AB " +"2019-05-02 09:27:22.345 UTC [deliveryClient] afterConnect -> DEBU 42c Exiting" +"2019-05-02 09:27:22.350 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 42d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.351 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 42e Got block validation policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.351 UTC [policies] Evaluate -> DEBU 42f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-05-02 09:27:22.352 UTC [policies] Evaluate -> DEBU 430 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.352 UTC [policies] Evaluate -> DEBU 431 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:22.352 UTC [msp] DeserializeIdentity -> DEBU 432 Obtaining identity" +"2019-05-02 09:27:22.353 UTC [msp.identity] newIdentity -> DEBU 433 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2156,45 +2152,43 @@ b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q 1A== -----END CERTIFICATE-----" -"2019-05-02 01:30:46.927 UTC [cauthdsl] func1 -> DEBU 438 0xc002e8d990 gate 1556760646927402700 evaluation starts" -"2019-05-02 01:30:46.927 UTC [cauthdsl] func2 -> DEBU 439 0xc002e8d990 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:46.927 UTC [cauthdsl] func2 -> DEBU 43a 0xc002e8d990 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:46.927 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 43b Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-05-02 01:30:46.927 UTC [msp] Validate -> DEBU 43c MSP OrdererMSP validating identity" -"2019-05-02 01:30:46.928 UTC [cauthdsl] func2 -> DEBU 43d 0xc002e8d990 principal matched by identity 0" -"2019-05-02 01:30:46.928 UTC [msp.identity] Verify -> DEBU 43e Verify: digest = 00000000 ca 8e 2c fd 4b f0 b4 69 5d 28 73 09 26 8e 92 fd |..,.K..i](s.&...| -00000010 d5 42 95 74 d4 18 25 3b df 62 96 36 31 b3 95 ac |.B.t..%;.b.61...|" -"2019-05-02 01:30:46.928 UTC [msp.identity] Verify -> DEBU 43f Verify: sig = 00000000 30 45 02 21 00 9c b6 07 f6 98 0a b2 e2 6d 6b 19 |0E.!.........mk.| -00000010 9d c7 dd 47 ec e3 09 09 34 6e 2e 5c 57 df cf 39 |...G....4n.\W..9| -00000020 a6 56 0d 15 05 02 20 21 61 db 9c 4b 5d d0 71 18 |.V.... !a..K].q.| -00000030 d9 a8 2f 89 0a 50 a6 c6 96 32 3f c3 91 bd dc 97 |../..P...2?.....| -00000040 c0 9f 98 81 77 fc 4c |....w.L|" -"2019-05-02 01:30:46.929 UTC [cauthdsl] func2 -> DEBU 440 0xc002e8d990 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:46.929 UTC [cauthdsl] func1 -> DEBU 441 0xc002e8d990 gate 1556760646927402700 evaluation succeeds" -"2019-05-02 01:30:46.929 UTC [policies] Evaluate -> DEBU 442 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:46.929 UTC [policies] Evaluate -> DEBU 443 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:46.929 UTC [policies] Evaluate -> DEBU 444 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:46.930 UTC [policies] Evaluate -> DEBU 445 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:46.930 UTC [blocksProvider] DeliverBlocks -> DEBU 446 [businesschannel] Adding payload to local buffer, blockNum = [1]" -"2019-05-02 01:30:46.931 UTC [gossip.state] addPayload -> DEBU 447 [businesschannel] Adding payload to local buffer, blockNum = [1]" -"2019-05-02 01:30:46.931 UTC [gossip.state] addPayload -> DEBU 448 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-05-02 01:30:46.931 UTC [gossip.state] deliverPayloads -> DEBU 449 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" -"2019-05-02 01:30:46.931 UTC [blocksProvider] DeliverBlocks -> DEBU 44a [businesschannel] Gossiping block [1], peers number [1]" -"2019-05-02 01:30:46.931 UTC [gossip.state] deliverPayloads -> DEBU 44b [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" -"2019-05-02 01:30:46.932 UTC [gossip.privdata] StoreBlock -> INFO 44c [businesschannel] Received block [1] from buffer" -"2019-05-02 01:30:46.932 UTC [gossip.privdata] StoreBlock -> DEBU 44d [businesschannel] Validating block [1]" -"2019-05-02 01:30:46.932 UTC [committer.txvalidator] Validate -> DEBU 44e [businesschannel] START Block Validation for block [1]" -"2019-05-02 01:30:46.933 UTC [committer.txvalidator] Validate -> DEBU 44f expecting 1 block validation responses" -"2019-05-02 01:30:46.932 UTC [gossip.channel] AddToMsgStore -> DEBU 450 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes to the block puller" -"2019-05-02 01:30:46.933 UTC [committer.txvalidator] validateTx -> DEBU 451 [businesschannel] validateTx starts for block 0xc002d99d80 env 0xc002efe190 txn 0" -"2019-05-02 01:30:46.933 UTC [protoutils] ValidateTransaction -> DEBU 452 ValidateTransactionEnvelope starts for envelope 0xc002efe190" -"2019-05-02 01:30:46.934 UTC [gossip.pull] Add -> DEBU 453 Added 1, total items: 1" -"2019-05-02 01:30:46.934 UTC [protoutils] ValidateTransaction -> DEBU 454 Header is channel_header:"\010\001\032\006\010\305\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030\2718\"\253\342x:\353j9\"b\272\310\2533\311^]\020m$\322\321" " -"2019-05-02 01:30:46.934 UTC [protoutils] validateChannelHeader -> DEBU 455 validateChannelHeader info: header type 1" -"2019-05-02 01:30:46.934 UTC [protoutils] checkSignatureFromCreator -> DEBU 456 begin" -"2019-05-02 01:30:46.934 UTC [msp] GetManagerForChain -> DEBU 457 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:30:46.935 UTC [msp] DeserializeIdentity -> DEBU 458 Obtaining identity" -"2019-05-02 01:30:46.935 UTC [msp.identity] newIdentity -> DEBU 459 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.353 UTC [cauthdsl] func1 -> DEBU 434 0xc002f26f50 gate 1556789242353952600 evaluation starts" +"2019-05-02 09:27:22.354 UTC [cauthdsl] func2 -> DEBU 435 0xc002f26f50 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.354 UTC [cauthdsl] func2 -> DEBU 436 0xc002f26f50 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.354 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 437 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-05-02 09:27:22.355 UTC [msp] Validate -> DEBU 438 MSP OrdererMSP validating identity" +"2019-05-02 09:27:22.355 UTC [cauthdsl] func2 -> DEBU 439 0xc002f26f50 principal matched by identity 0" +"2019-05-02 09:27:22.356 UTC [msp.identity] Verify -> DEBU 43a Verify: digest = 00000000 56 2e 33 96 85 a9 52 2d c2 1a a7 20 42 3a b0 10 |V.3...R-... B:..| +00000010 ec d7 75 f9 75 94 ee 5d 14 d1 ee bc 56 2b fa 37 |..u.u..]....V+.7|" +"2019-05-02 09:27:22.357 UTC [msp.identity] Verify -> DEBU 43b Verify: sig = 00000000 30 44 02 20 3d f7 5b a0 eb 92 62 41 d4 01 2b e4 |0D. =.[...bA..+.| +00000010 90 4e 76 27 54 d2 a8 28 18 32 87 13 a7 84 83 58 |.Nv'T..(.2.....X| +00000020 53 34 90 f8 02 20 2c a7 c8 04 84 af 33 47 ac c9 |S4... ,.....3G..| +00000030 32 af 26 5b a6 ea c1 f4 12 7a 24 21 9e dc 4b aa |2.&[.....z$!..K.| +00000040 c7 a8 6a d4 17 c4 |..j...|" +"2019-05-02 09:27:22.357 UTC [cauthdsl] func2 -> DEBU 43c 0xc002f26f50 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.358 UTC [cauthdsl] func1 -> DEBU 43d 0xc002f26f50 gate 1556789242353952600 evaluation succeeds" +"2019-05-02 09:27:22.358 UTC [policies] Evaluate -> DEBU 43e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:22.358 UTC [policies] Evaluate -> DEBU 43f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:22.359 UTC [policies] Evaluate -> DEBU 440 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:22.359 UTC [policies] Evaluate -> DEBU 441 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:22.359 UTC [blocksProvider] DeliverBlocks -> DEBU 442 [businesschannel] Adding payload to local buffer, blockNum = [1]" +"2019-05-02 09:27:22.359 UTC [gossip.state] addPayload -> DEBU 443 [businesschannel] Adding payload to local buffer, blockNum = [1]" +"2019-05-02 09:27:22.360 UTC [gossip.state] addPayload -> DEBU 444 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-05-02 09:27:22.360 UTC [gossip.state] deliverPayloads -> DEBU 445 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" +"2019-05-02 09:27:22.360 UTC [gossip.state] deliverPayloads -> DEBU 447 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" +"2019-05-02 09:27:22.361 UTC [gossip.privdata] StoreBlock -> INFO 448 [businesschannel] Received block [1] from buffer" +"2019-05-02 09:27:22.361 UTC [gossip.privdata] StoreBlock -> DEBU 449 [businesschannel] Validating block [1]" +"2019-05-02 09:27:22.361 UTC [committer.txvalidator] Validate -> DEBU 44a [businesschannel] START Block Validation for block [1]" +"2019-05-02 09:27:22.361 UTC [committer.txvalidator] Validate -> DEBU 44b expecting 1 block validation responses" +"2019-05-02 09:27:22.361 UTC [committer.txvalidator] validateTx -> DEBU 44c [businesschannel] validateTx starts for block 0xc002e28c00 env 0xc002ef2af0 txn 0" +"2019-05-02 09:27:22.361 UTC [protoutils] ValidateTransaction -> DEBU 44d ValidateTransactionEnvelope starts for envelope 0xc002ef2af0" +"2019-05-02 09:27:22.361 UTC [protoutils] ValidateTransaction -> DEBU 44e Header is channel_header:"\010\001\032\006\010\367\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030\353\031M\307+7i\210 \336\250\362\037\274\227\000\362\323Sb\230>\236\200" " +"2019-05-02 09:27:22.362 UTC [protoutils] validateChannelHeader -> DEBU 44f validateChannelHeader info: header type 1" +"2019-05-02 09:27:22.362 UTC [protoutils] checkSignatureFromCreator -> DEBU 450 begin" +"2019-05-02 09:27:22.360 UTC [blocksProvider] DeliverBlocks -> DEBU 446 [businesschannel] Gossiping block [1], peers number [1]" +"2019-05-02 09:27:22.363 UTC [msp] GetManagerForChain -> DEBU 451 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:22.363 UTC [msp] DeserializeIdentity -> DEBU 453 Obtaining identity" +"2019-05-02 09:27:22.363 UTC [msp.identity] newIdentity -> DEBU 454 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -2208,208 +2202,144 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-05-02 01:30:46.936 UTC [protoutils] checkSignatureFromCreator -> DEBU 45a creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -"2019-05-02 01:30:46.936 UTC [msp] Validate -> DEBU 45b MSP OrdererMSP validating identity" -"2019-05-02 01:30:46.936 UTC [protoutils] checkSignatureFromCreator -> DEBU 45c creator is valid" -"2019-05-02 01:30:46.937 UTC [msp.identity] Verify -> DEBU 45d Verify: digest = 00000000 a7 1b a8 9c 30 04 3a 2d 9a ba be 84 ac 4a 84 7b |....0.:-.....J.{| -00000010 35 a7 b4 84 00 7d 16 79 14 eb af a3 3d 59 bf 32 |5....}.y....=Y.2|" -"2019-05-02 01:30:46.937 UTC [msp.identity] Verify -> DEBU 45e Verify: sig = 00000000 30 45 02 21 00 b6 5f 7a 53 df 5f 76 85 dd 0b ea |0E.!.._zS._v....| -00000010 9f 26 c6 a9 8e 06 6a 34 37 3d f3 15 28 17 9a 74 |.&....j47=..(..t| -00000020 31 28 76 c8 a6 02 20 2b b0 d1 53 f4 ca 8f 92 68 |1(v... +..S....h| -00000030 07 cb d5 a1 f3 3f fc 62 d2 13 9d 61 d0 30 18 b0 |.....?.b...a.0..| -00000040 6a e8 85 0e 1c 91 43 |j.....C|" -"2019-05-02 01:30:46.937 UTC [protoutils] checkSignatureFromCreator -> DEBU 45f exits successfully" -"2019-05-02 01:30:46.938 UTC [protoutils] validateConfigTransaction -> DEBU 460 validateConfigTransaction starts for data 0xc002f6e000, header channel_header:"\010\001\032\006\010\305\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\2718\"\253\342x:\353j9\"b\272\310\2533\311^]\020m$\322\321" " -"2019-05-02 01:30:46.938 UTC [committer.txvalidator] validateTx -> DEBU 461 Transaction is for channel businesschannel" -"2019-05-02 01:30:46.938 UTC [common.configtx] addToMap -> DEBU 462 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:46.938 UTC [common.configtx] addToMap -> DEBU 463 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:46.939 UTC [common.configtx] addToMap -> DEBU 464 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:46.939 UTC [common.configtx] addToMap -> DEBU 465 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:46.939 UTC [common.configtx] addToMap -> DEBU 466 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:46.939 UTC [common.configtx] addToMap -> DEBU 467 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:46.940 UTC [gossip.comm] Send -> DEBU 468 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:46.940 UTC [common.configtx] addToMap -> DEBU 469 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:46.941 UTC [common.configtx] addToMap -> DEBU 46b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:46.941 UTC [common.configtx] addToMap -> DEBU 46c Adding to config map: [Group] /Channel" -"2019-05-02 01:30:46.941 UTC [common.configtx] addToMap -> DEBU 46d Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:46.941 UTC [common.configtx] addToMap -> DEBU 46e Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:46.941 UTC [common.configtx] addToMap -> DEBU 46f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:46.940 UTC [gossip.comm] sendToEndpoint -> DEBU 46a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes" -"2019-05-02 01:30:46.942 UTC [gossip.comm] sendToEndpoint -> DEBU 471 Exiting" -"2019-05-02 01:30:46.942 UTC [common.configtx] addToMap -> DEBU 470 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:46.951 UTC [common.configtx] addToMap -> DEBU 472 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:46.952 UTC [common.configtx] addToMap -> DEBU 473 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:46.952 UTC [common.configtx] addToMap -> DEBU 474 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:46.952 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:46.953 UTC [common.configtx] verifyDeltaSet -> DEBU 476 Processing change to key: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:46.953 UTC [common.configtx] policyForItem -> DEBU 477 Getting policy for item Org1MSP with mod_policy Admins" -"2019-05-02 01:30:46.954 UTC [policies] Manager -> DEBU 478 Manager Channel looking up path [Application]" -"2019-05-02 01:30:46.954 UTC [policies] Manager -> DEBU 479 Manager Channel has managers Orderer" -"2019-05-02 01:30:46.954 UTC [policies] Manager -> DEBU 47a Manager Channel has managers Application" -"2019-05-02 01:30:46.955 UTC [policies] Manager -> DEBU 47b Manager Channel/Application looking up path []" -"2019-05-02 01:30:46.955 UTC [policies] Manager -> DEBU 47c Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:46.956 UTC [policies] Manager -> DEBU 47d Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:46.956 UTC [policies] Manager -> DEBU 47e Manager Channel/Application looking up path [Org1MSP]" -"2019-05-02 01:30:46.956 UTC [policies] Manager -> DEBU 47f Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:46.957 UTC [policies] Manager -> DEBU 480 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:46.957 UTC [policies] Manager -> DEBU 481 Manager Channel/Application/Org1MSP looking up path []" -"2019-05-02 01:30:46.957 UTC [policies] Evaluate -> DEBU 482 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-05-02 01:30:46.958 UTC [cauthdsl] func1 -> DEBU 483 0xc002fcea40 gate 1556760646958344200 evaluation starts" -"2019-05-02 01:30:46.958 UTC [cauthdsl] func2 -> DEBU 484 0xc002fcea40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:46.958 UTC [cauthdsl] func2 -> DEBU 485 0xc002fcea40 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:46.959 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 486 Checking if identity satisfies ADMIN role for Org1MSP" -"2019-05-02 01:30:46.960 UTC [cauthdsl] func2 -> DEBU 487 0xc002fcea40 principal matched by identity 0" -"2019-05-02 01:30:46.960 UTC [msp.identity] Verify -> DEBU 488 Verify: digest = 00000000 7e e0 d8 d0 d7 b3 a3 c0 01 cb 90 33 37 60 be ef |~..........37`..| -00000010 83 04 8b cc e0 6f 0e 3f 09 4a b5 dc 79 83 5e 60 |.....o.?.J..y.^`|" -"2019-05-02 01:30:46.961 UTC [msp.identity] Verify -> DEBU 489 Verify: sig = 00000000 30 44 02 20 39 8e 08 37 34 ec ec 41 53 c4 ad ba |0D. 9..74..AS...| -00000010 2b dc ff 17 42 53 d2 3d 6f 68 d1 51 80 64 85 d7 |+...BS.=oh.Q.d..| -00000020 4f 85 ee ad 02 20 6a 36 2b aa 0f 2c 88 10 ef 67 |O.... j6+..,...g| -00000030 83 9e 48 8b 6f d5 dc 74 97 3a a1 54 c5 58 6e c1 |..H.o..t.:.T.Xn.| -00000040 78 e3 76 0b 0d 01 |x.v...|" -"2019-05-02 01:30:46.962 UTC [cauthdsl] func2 -> DEBU 48a 0xc002fcea40 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:46.962 UTC [cauthdsl] func1 -> DEBU 48b 0xc002fcea40 gate 1556760646958344200 evaluation succeeds" -"2019-05-02 01:30:46.963 UTC [policies] Evaluate -> DEBU 48c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:46.963 UTC [policies] Evaluate -> DEBU 48d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:46.969 UTC [common.configtx] verifyDeltaSet -> DEBU 48e Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:46.970 UTC [common.configtx] recurseConfigMap -> DEBU 48f Setting policy for key Endorsement to " -"2019-05-02 01:30:46.972 UTC [common.configtx] recurseConfigMap -> DEBU 490 Setting policy for key Readers to " -"2019-05-02 01:30:46.973 UTC [common.configtx] recurseConfigMap -> DEBU 491 Setting policy for key Writers to " -"2019-05-02 01:30:46.973 UTC [common.configtx] recurseConfigMap -> DEBU 492 Setting policy for key Admins to " -"2019-05-02 01:30:46.974 UTC [common.configtx] recurseConfigMap -> DEBU 493 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.975 UTC [common.configtx] recurseConfigMap -> DEBU 494 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.975 UTC [common.configtx] recurseConfigMap -> DEBU 495 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.975 UTC [common.configtx] recurseConfigMap -> DEBU 496 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.975 UTC [common.configtx] recurseConfigMap -> DEBU 497 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.976 UTC [common.configtx] recurseConfigMap -> DEBU 498 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.976 UTC [common.configtx] recurseConfigMap -> DEBU 499 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.976 UTC [common.configtx] recurseConfigMap -> DEBU 49a Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.976 UTC [common.configtx] recurseConfigMap -> DEBU 49b Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.976 UTC [common.configtx] recurseConfigMap -> DEBU 49c Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.977 UTC [common.configtx] recurseConfigMap -> DEBU 49e Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.977 UTC [common.configtx] recurseConfigMap -> DEBU 49f Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.978 UTC [common.configtx] recurseConfigMap -> DEBU 4a0 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.978 UTC [common.configtx] recurseConfigMap -> DEBU 4a1 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.978 UTC [common.configtx] recurseConfigMap -> DEBU 4a2 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.978 UTC [common.configtx] recurseConfigMap -> DEBU 4a3 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.979 UTC [common.configtx] recurseConfigMap -> DEBU 4a4 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.979 UTC [common.configtx] recurseConfigMap -> DEBU 4a5 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 4a6 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:46.976 UTC [comm.grpc.server] 1 -> INFO 49d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:48.975Z grpc.peer_address=192.168.240.6:44942 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=455.4µs -"2019-05-02 01:30:46.981 UTC [common.channelconfig] NewStandardValues -> DEBU 4a7 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:46.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a8 Processing field: HashingAlgorithm" -"2019-05-02 01:30:46.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a9 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:46.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4aa Processing field: OrdererAddresses" -"2019-05-02 01:30:46.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ab Processing field: Consortium" -"2019-05-02 01:30:46.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ac Processing field: Capabilities" -"2019-05-02 01:30:46.984 UTC [common.channelconfig] NewStandardValues -> DEBU 4ad Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:46.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ae Processing field: ConsensusType" -"2019-05-02 01:30:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b0 Processing field: BatchSize" -"2019-05-02 01:30:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b1 Processing field: BatchTimeout" -"2019-05-02 01:30:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b2 Processing field: KafkaBrokers" -"2019-05-02 01:30:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b3 Processing field: ChannelRestrictions" -"2019-05-02 01:30:46.985 UTC [msp.identity] Sign -> DEBU 4af Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b4 Processing field: Capabilities" -"2019-05-02 01:30:46.986 UTC [msp.identity] Sign -> DEBU 4b5 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:46.988 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4b6 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.6:44942" -"2019-05-02 01:30:46.988 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4b7 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:44942" -"2019-05-02 01:30:46.989 UTC [msp.identity] Verify -> DEBU 4b8 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-05-02 01:30:46.989 UTC [msp.identity] Verify -> DEBU 4b9 Verify: sig = 00000000 30 45 02 21 00 ce b0 4a 1f 9e b4 38 b2 67 4d 6c |0E.!...J...8.gMl| -00000010 97 5e b7 4d e5 22 5e 91 34 c6 7f fe bc d9 82 38 |.^.M."^.4......8| -00000020 93 25 2b 93 21 02 20 3b ea 5c 1f dd 60 64 8b 87 |.%+.!. ;.\..`d..| -00000030 53 0e d2 40 ed 07 2f 1e 97 48 b0 2c 5b 7f 91 ac |S..@../..H.,[...| -00000040 a5 58 51 aa 7b 37 79 |.XQ.{7y|" -"2019-05-02 01:30:46.987 UTC [common.channelconfig] NewStandardValues -> DEBU 4ba Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:46.990 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4bb Authenticated 192.168.240.6:44942" -"2019-05-02 01:30:46.997 UTC [gossip.comm] GossipStream -> DEBU 4bf Servicing 192.168.240.6:44942" -"2019-05-02 01:30:46.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bc Processing field: Endpoints" -"2019-05-02 01:30:46.996 UTC [grpc] infof -> DEBU 4bd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:46.997 UTC [gossip.gossip] handleMessage -> DEBU 4be Entering, 192.168.240.6:44894 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 15663384753221398544, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 283 bytes, Signature: 0 bytes" -"2019-05-02 01:30:46.998 UTC [common.channelconfig] NewStandardValues -> DEBU 4c0 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.000 UTC [gossip.comm] writeToStream -> DEBU 4c1 Closing writing to stream" -"2019-05-02 01:30:47.001 UTC [gossip.gossip] handleMessage -> DEBU 4c2 Exiting" -"2019-05-02 01:30:47.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c3 Got message: GossipMessage: Channel: , nonce: 15663384753221398544, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 283 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.000 UTC [gossip.comm] readFromStream -> DEBU 4c4 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:47.001 UTC [gossip.comm] func2 -> DEBU 4c5 Client 192.168.240.6:44942 disconnected" -"2019-05-02 01:30:47.002 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: MSP" -"2019-05-02 01:30:47.003 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:47.004 UTC [comm.grpc.server] 1 -> INFO 4c8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:56.984Z grpc.peer_address=192.168.240.6:44942 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.5633ms -"2019-05-02 01:30:47.004 UTC [gossip.comm] writeToStream -> DEBU 4c9 Closing writing to stream" -"2019-05-02 01:30:47.004 UTC [common.channelconfig] validateMSP -> DEBU 4ca Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:47.005 UTC [msp.identity] Verify -> DEBU 4cb Verify: digest = 00000000 cf 2e 34 c0 36 28 d6 b0 5d c4 c0 30 f2 06 02 55 |..4.6(..]..0...U| -00000010 db d3 07 1e 50 a9 4b c1 c7 6d d8 e3 4d 39 c6 b5 |....P.K..m..M9..|" -"2019-05-02 01:30:47.002 UTC [gossip.comm] serviceConnection -> DEBU 4cc Closing reading from stream" -"2019-05-02 01:30:47.007 UTC [msp] newBccspMsp -> DEBU 4cd Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.007 UTC [msp.identity] Verify -> DEBU 4ce Verify: sig = 00000000 30 45 02 21 00 c4 13 1f 85 07 cf d0 37 b7 c1 e7 |0E.!........7...| -00000010 8f e3 38 04 85 0b a3 8a 7d 44 b6 84 8a e3 28 00 |..8.....}D....(.| -00000020 c6 e3 8b c8 04 02 20 31 37 a5 30 90 5f 4c 0f 94 |...... 17.0._L..| -00000030 05 b4 5f 1b 8a 58 69 50 14 a6 a3 8a 87 0d 5f b0 |.._..XiP......_.| -00000040 f7 8a b4 6a 87 b2 09 |...j...|" -"2019-05-02 01:30:47.008 UTC [gossip.comm] func2 -> DEBU 4cf Client 192.168.240.6:44894 disconnected" -"2019-05-02 01:30:47.008 UTC [msp] New -> DEBU 4d0 Creating Cache-MSP instance" -"2019-05-02 01:30:47.011 UTC [comm.grpc.server] 1 -> INFO 4d1 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.6:44894 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.5227729s -"2019-05-02 01:30:47.012 UTC [msp] Setup -> DEBU 4d3 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:47.012 UTC [gossip.comm] readFromStream -> DEBU 4d4 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -"2019-05-02 01:30:47.011 UTC [msp.identity] Verify -> DEBU 4d2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:47.014 UTC [msp.identity] Verify -> DEBU 4d5 Verify: sig = 00000000 30 45 02 21 00 d3 6b 57 d5 04 a0 37 e6 cc fb 80 |0E.!..kW...7....| -00000010 e8 2b 59 fd d3 4e 23 e4 13 7a 53 54 cc 5b 21 ba |.+Y..N#..zST.[!.| -00000020 78 74 10 b1 5b 02 20 2a 6f ce b6 0a c9 82 f1 f0 |xt..[. *o.......| -00000030 23 61 ec 7e 9f 3e 32 6c 04 30 23 c7 88 d8 a9 23 |#a.~.>2l.0#....#| -00000040 89 b0 dc a0 bb 08 8d |.......|" -"2019-05-02 01:30:47.014 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:47.014 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:30:47.014 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d8 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 " -"2019-05-02 01:30:47.015 UTC [msp.identity] newIdentity -> DEBU 4d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-05-02 01:30:47.015 UTC [msp.identity] newIdentity -> DEBU 4da Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-05-02 01:30:47.015 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 " -"2019-05-02 01:30:47.016 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:47.016 UTC [msp] Validate -> DEBU 4dd MSP OrdererMSP validating identity" -"2019-05-02 01:30:47.016 UTC [common.channelconfig] NewStandardValues -> DEBU 4de Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:47.017 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4df Processing field: ACLs" -"2019-05-02 01:30:47.016 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e0 Exiting" -"2019-05-02 01:30:47.017 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e1 Exiting" -"2019-05-02 01:30:47.017 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4e2 Processing field: Capabilities" -"2019-05-02 01:30:47.017 UTC [common.channelconfig] NewStandardValues -> DEBU 4e3 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:47.017 UTC [gossip.discovery] sendMemResponse -> DEBU 4e5 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:47.017 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4e6 Processing field: AnchorPeers" -"2019-05-02 01:30:47.018 UTC [gossip.comm] Send -> DEBU 4e7 Entering, sending GossipMessage: Channel: , nonce: 15663384753221398544, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:47.018 UTC [gossip.discovery] sendMemResponse -> DEBU 4e8 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:30:47.018 UTC [common.channelconfig] NewStandardValues -> DEBU 4e9 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.018 UTC [gossip.comm] sendToEndpoint -> DEBU 4ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15663384753221398544, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.018 UTC [gossip.comm] createConnection -> DEBU 4ec Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:47.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4eb Processing field: MSP" -"2019-05-02 01:30:47.019 UTC [common.channelconfig] Validate -> DEBU 4ed Anchor peers for org Org1MSP are anchor_peers: " -"2019-05-02 01:30:47.019 UTC [common.channelconfig] validateMSP -> DEBU 4ee Setting up MSP for org Org1MSP" -"2019-05-02 01:30:47.019 UTC [msp] newBccspMsp -> DEBU 4ef Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.019 UTC [msp] New -> DEBU 4f0 Creating Cache-MSP instance" -"2019-05-02 01:30:47.020 UTC [msp] Setup -> DEBU 4f1 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:47.020 UTC [msp.identity] newIdentity -> DEBU 4f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.363 UTC [protoutils] checkSignatureFromCreator -> DEBU 455 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-05-02 09:27:22.364 UTC [msp] Validate -> DEBU 456 MSP OrdererMSP validating identity" +"2019-05-02 09:27:22.364 UTC [protoutils] checkSignatureFromCreator -> DEBU 457 creator is valid" +"2019-05-02 09:27:22.364 UTC [msp.identity] Verify -> DEBU 458 Verify: digest = 00000000 5e b9 01 7e 36 42 6b 31 24 71 39 4d e5 b1 6c ca |^..~6Bk1$q9M..l.| +00000010 ce 27 7c 4e 33 ef a0 be 53 be 4c 1e f1 cb 95 1d |.'|N3...S.L.....|" +"2019-05-02 09:27:22.364 UTC [msp.identity] Verify -> DEBU 459 Verify: sig = 00000000 30 45 02 21 00 be 47 8b ce db 26 57 b4 11 11 08 |0E.!..G...&W....| +00000010 f9 be 3d 46 9f b5 2d f9 46 64 13 a9 79 52 08 4c |..=F..-.Fd..yR.L| +00000020 e0 55 30 75 29 02 20 3f 14 58 43 89 87 f7 bf 90 |.U0u). ?.XC.....| +00000030 9e 87 74 e9 8f 2a 1f a5 38 cf 98 0d a9 03 70 d8 |..t..*..8.....p.| +00000040 1a 33 13 1f 94 5f 84 |.3..._.|" +"2019-05-02 09:27:22.365 UTC [protoutils] checkSignatureFromCreator -> DEBU 45a exits successfully" +"2019-05-02 09:27:22.363 UTC [gossip.channel] AddToMsgStore -> DEBU 452 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes to the block puller" +"2019-05-02 09:27:22.365 UTC [gossip.pull] Add -> DEBU 45b Added 1, total items: 1" +"2019-05-02 09:27:22.365 UTC [protoutils] validateConfigTransaction -> DEBU 45c validateConfigTransaction starts for data 0xc002f98000, header channel_header:"\010\001\032\006\010\367\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\353\031M\307+7i\210 \336\250\362\037\274\227\000\362\323Sb\230>\236\200" " +"2019-05-02 09:27:22.365 UTC [committer.txvalidator] validateTx -> DEBU 45d Transaction is for channel businesschannel" +"2019-05-02 09:27:22.365 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 45e Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 45f Adding to config map: [Group] /Channel" +"2019-05-02 09:27:22.365 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 460 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 461 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 462 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:22.365 UTC [policies] Evaluate -> DEBU 463 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-05-02 09:27:22.365 UTC [common.configtx] addToMap -> DEBU 464 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:22.365 UTC [policies] Evaluate -> DEBU 465 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 466 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 467 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 468 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 469 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:22.366 UTC [cauthdsl] func1 -> DEBU 46a 0xc002f84fb0 gate 1556789242366080600 evaluation starts" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 46b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 46c 0xc002f84fb0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 46d Adding to config map: [Group] /Channel" +"2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 46e 0xc002f84fb0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 46f Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 470 0xc002f84fb0 principal matched by identity 0" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 471 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:22.366 UTC [msp.identity] Verify -> DEBU 472 Verify: digest = 00000000 24 2f 50 1d 36 ee 86 46 81 38 f5 a7 f3 b1 12 09 |$/P.6..F.8......| +00000010 e6 b4 df ef e6 de ed 34 9a 91 5c e0 f0 75 a8 4b |.......4..\..u.K|" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 473 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:22.366 UTC [msp.identity] Verify -> DEBU 474 Verify: sig = 00000000 30 45 02 21 00 86 af 4e 12 bd d7 84 85 43 85 8a |0E.!...N.....C..| +00000010 c4 f3 fb 2b 06 92 44 1f 82 96 dd 9a 9e f0 cf d9 |...+..D.........| +00000020 19 33 c0 99 ef 02 20 26 fd 78 05 2e 72 8f 1b d7 |.3.... &.x..r...| +00000030 30 ee bf b3 95 48 b9 16 15 ba cd d3 ec aa 24 2d |0....H........$-| +00000040 1f 08 b8 c8 d1 f5 7f |.......|" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 476 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 477 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:22.366 UTC [cauthdsl] func2 -> DEBU 478 0xc002f84fb0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 479 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:22.366 UTC [cauthdsl] func1 -> DEBU 47a 0xc002f84fb0 gate 1556789242366080600 evaluation succeeds" +"2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 47b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:22.366 UTC [common.configtx] addToMap -> DEBU 47c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 47d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:22.366 UTC [common.configtx] verifyDeltaSet -> DEBU 47e Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 47f Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:22.366 UTC [common.configtx] policyForItem -> DEBU 480 Getting policy for item Org1MSP with mod_policy Admins" +"2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 481 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 482 Manager Channel looking up path [Application]" +"2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 483 Manager Channel has managers Orderer" +"2019-05-02 09:27:22.366 UTC [blocksProvider] DeliverBlocks -> DEBU 484 [businesschannel] Adding payload to local buffer, blockNum = [2]" +"2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 485 Manager Channel has managers Application" +"2019-05-02 09:27:22.366 UTC [gossip.state] addPayload -> DEBU 486 [businesschannel] Adding payload to local buffer, blockNum = [2]" +"2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 487 Manager Channel/Application looking up path []" +"2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 488 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:22.366 UTC [gossip.state] addPayload -> DEBU 489 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48a Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:22.366 UTC [blocksProvider] DeliverBlocks -> DEBU 48b [businesschannel] Gossiping block [2], peers number [1]" +"2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48c Manager Channel/Application looking up path [Org1MSP]" +"2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48d Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48e Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:22.366 UTC [policies] Manager -> DEBU 48f Manager Channel/Application/Org1MSP looking up path []" +"2019-05-02 09:27:22.366 UTC [gossip.channel] AddToMsgStore -> DEBU 490 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes to the block puller" +"2019-05-02 09:27:22.366 UTC [policies] Evaluate -> DEBU 491 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-05-02 09:27:22.366 UTC [gossip.pull] Add -> DEBU 492 Added 2, total items: 2" +"2019-05-02 09:27:22.367 UTC [cauthdsl] func1 -> DEBU 493 0xc003007140 gate 1556789242367018200 evaluation starts" +"2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 494 0xc003007140 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 495 0xc003007140 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.367 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 496 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 497 0xc003007140 principal matched by identity 0" +"2019-05-02 09:27:22.367 UTC [msp.identity] Verify -> DEBU 498 Verify: digest = 00000000 1e 4a 2b e5 03 f9 6c c3 23 48 0d a8 83 20 ef f2 |.J+...l.#H... ..| +00000010 7a e8 18 fd 74 24 f2 e6 41 72 f3 5d d7 16 16 71 |z...t$..Ar.]...q|" +"2019-05-02 09:27:22.367 UTC [msp.identity] Verify -> DEBU 499 Verify: sig = 00000000 30 44 02 20 7c b2 f7 03 cd 4f 8e cd 30 a1 37 b6 |0D. |....O..0.7.| +00000010 7e b2 75 32 5d 38 f1 78 91 c4 b9 3a c8 50 d7 24 |~.u2]8.x...:.P.$| +00000020 86 46 58 89 02 20 01 29 a4 4f 1b da f4 cd 41 1a |.FX.. .).O....A.| +00000030 ea 42 9b bf da 05 a0 92 ff 30 14 2e a4 22 c8 09 |.B.......0..."..| +00000040 d0 64 c5 30 31 53 |.d.01S|" +"2019-05-02 09:27:22.367 UTC [cauthdsl] func2 -> DEBU 49a 0xc003007140 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.367 UTC [cauthdsl] func1 -> DEBU 49b 0xc003007140 gate 1556789242367018200 evaluation succeeds" +"2019-05-02 09:27:22.367 UTC [policies] Evaluate -> DEBU 49c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:22.368 UTC [policies] Evaluate -> DEBU 49d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:22.368 UTC [common.configtx] verifyDeltaSet -> DEBU 49e Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 49f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 4a0 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 4a1 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.369 UTC [common.configtx] recurseConfigMap -> DEBU 4a2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a3 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a5 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a6 Setting policy for key Readers to " +"2019-05-02 09:27:22.370 UTC [common.configtx] recurseConfigMap -> DEBU 4a7 Setting policy for key Writers to " +"2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4a8 Setting policy for key Admins to " +"2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4a9 Setting policy for key Endorsement to " +"2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4aa Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4ab Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.371 UTC [common.configtx] recurseConfigMap -> DEBU 4ac Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.372 UTC [common.configtx] recurseConfigMap -> DEBU 4ad Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.373 UTC [gossip.comm] Send -> DEBU 4ae Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4af Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.373 UTC [gossip.comm] Send -> DEBU 4b0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.373 UTC [gossip.comm] sendToEndpoint -> DEBU 4b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.373 UTC [gossip.comm] sendToEndpoint -> DEBU 4b4 Exiting" +"2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.374 UTC [gossip.comm] sendToEndpoint -> DEBU 4b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23698 bytes, seq: 1}, Envelope: 23731 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.374 UTC [gossip.comm] sendToEndpoint -> DEBU 4b8 Exiting" +"2019-05-02 09:27:22.373 UTC [common.configtx] recurseConfigMap -> DEBU 4b9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.377 UTC [common.configtx] recurseConfigMap -> DEBU 4ba Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.377 UTC [common.configtx] recurseConfigMap -> DEBU 4bb Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.378 UTC [common.channelconfig] NewStandardValues -> DEBU 4bc Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:22.378 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bd Processing field: HashingAlgorithm" +"2019-05-02 09:27:22.379 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4be Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:22.379 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bf Processing field: OrdererAddresses" +"2019-05-02 09:27:22.379 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c0 Processing field: Consortium" +"2019-05-02 09:27:22.380 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c1 Processing field: Capabilities" +"2019-05-02 09:27:22.380 UTC [common.channelconfig] NewStandardValues -> DEBU 4c2 Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:22.380 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c3 Processing field: ACLs" +"2019-05-02 09:27:22.381 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c4 Processing field: Capabilities" +"2019-05-02 09:27:22.382 UTC [common.channelconfig] NewStandardValues -> DEBU 4c5 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:22.383 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: AnchorPeers" +"2019-05-02 09:27:22.384 UTC [common.channelconfig] NewStandardValues -> DEBU 4c7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:22.384 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c8 Processing field: MSP" +"2019-05-02 09:27:22.385 UTC [common.channelconfig] Validate -> DEBU 4c9 Anchor peers for org Org1MSP are anchor_peers: " +"2019-05-02 09:27:22.385 UTC [common.channelconfig] validateMSP -> DEBU 4ca Setting up MSP for org Org1MSP" +"2019-05-02 09:27:22.386 UTC [msp] newBccspMsp -> DEBU 4cb Creating BCCSP-based MSP instance" +"2019-05-02 09:27:22.386 UTC [msp] New -> DEBU 4cc Creating Cache-MSP instance" +"2019-05-02 09:27:22.387 UTC [msp] Setup -> DEBU 4cd Setting up MSP instance Org1MSP" +"2019-05-02 09:27:22.387 UTC [msp.identity] newIdentity -> DEBU 4ce Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2424,7 +2354,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:47.021 UTC [msp.identity] newIdentity -> DEBU 4f3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.389 UTC [msp.identity] newIdentity -> DEBU 4cf Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2438,43 +2368,22 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.022 UTC [grpc] DialContext -> DEBU 4f4 parsed scheme: """ -"2019-05-02 01:30:47.022 UTC [grpc] DialContext -> DEBU 4f5 scheme "" not registered, fallback to default scheme" -"2019-05-02 01:30:47.022 UTC [grpc] UpdateState -> DEBU 4f6 ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 }] }" -"2019-05-02 01:30:47.023 UTC [grpc] switchBalancer -> DEBU 4f7 ClientConn switching balancer to "pick_first"" -"2019-05-02 01:30:47.023 UTC [grpc] HandleSubConnStateChange -> DEBU 4f8 pickfirstBalancer: HandleSubConnStateChange: 0xc0030de480, CONNECTING" -"2019-05-02 01:30:47.017 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e4 Exiting" -"2019-05-02 01:30:47.028 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f9 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:47.029 UTC [grpc] HandleSubConnStateChange -> DEBU 4fa pickfirstBalancer: HandleSubConnStateChange: 0xc0030de480, READY" -"2019-05-02 01:30:47.028 UTC [msp] Validate -> DEBU 4fb MSP Org1MSP validating identity" -"2019-05-02 01:30:47.031 UTC [msp.identity] Sign -> DEBU 4fc Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.031 UTC [msp.identity] Sign -> DEBU 4fd Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.032 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4fe Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.6:7051" -"2019-05-02 01:30:47.033 UTC [msp] getCertificationChain -> DEBU 4ff MSP Org1MSP getting certification chain" -"2019-05-02 01:30:47.034 UTC [gossip.comm] authenticateRemotePeer -> DEBU 500 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:7051" -"2019-05-02 01:30:47.034 UTC [msp] hasOURole -> DEBU 501 MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:47.035 UTC [msp] getCertificationChain -> DEBU 502 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:47.036 UTC [common.channelconfig] NewStandardValues -> DEBU 503 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:47.036 UTC [common.channelconfig] initializeProtosStruct -> DEBU 504 Processing field: AnchorPeers" -"2019-05-02 01:30:47.036 UTC [msp.identity] Verify -> DEBU 505 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-05-02 01:30:47.036 UTC [msp.identity] Verify -> DEBU 506 Verify: sig = 00000000 30 44 02 20 46 01 ab 1a cc 2d 08 ce be a8 e2 de |0D. F....-......| -00000010 9d 0d 8a 99 a1 7c 82 e9 79 3d b1 a1 a9 ae aa 69 |.....|..y=.....i| -00000020 fa 51 56 a9 02 20 54 7f 9a a8 d8 f4 31 1f 41 98 |.QV.. T.....1.A.| -00000030 a2 18 3b 34 33 0a 46 44 d3 63 14 5e 44 48 65 b5 |..;43.FD.c.^DHe.| -00000040 be 84 94 f9 1c d3 |......|" -"2019-05-02 01:30:47.036 UTC [common.channelconfig] NewStandardValues -> DEBU 507 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 508 Processing field: MSP" -"2019-05-02 01:30:47.037 UTC [common.channelconfig] Validate -> DEBU 509 Anchor peers for org Org2MSP are " -"2019-05-02 01:30:47.038 UTC [common.channelconfig] validateMSP -> DEBU 50a Setting up MSP for org Org2MSP" -"2019-05-02 01:30:47.038 UTC [msp] newBccspMsp -> DEBU 50c Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.039 UTC [msp] New -> DEBU 50e Creating Cache-MSP instance" -"2019-05-02 01:30:47.039 UTC [msp] Setup -> DEBU 50f Setting up MSP instance Org2MSP" -"2019-05-02 01:30:47.038 UTC [grpc] infof -> DEBU 50d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.037 UTC [gossip.comm] authenticateRemotePeer -> DEBU 50b Authenticated 192.168.240.6:7051" -"2019-05-02 01:30:47.040 UTC [gossip.comm] createConnection -> DEBU 510 Exiting" -"2019-05-02 01:30:47.040 UTC [gossip.comm] sendToEndpoint -> DEBU 511 Exiting" -"2019-05-02 01:30:47.041 UTC [msp.identity] newIdentity -> DEBU 512 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.391 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4d0 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:22.391 UTC [msp] Validate -> DEBU 4d1 MSP Org1MSP validating identity" +"2019-05-02 09:27:22.391 UTC [msp] getCertificationChain -> DEBU 4d2 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:22.392 UTC [msp] hasOURole -> DEBU 4d3 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:22.392 UTC [msp] getCertificationChain -> DEBU 4d4 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:22.393 UTC [common.channelconfig] NewStandardValues -> DEBU 4d5 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:22.393 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d6 Processing field: AnchorPeers" +"2019-05-02 09:27:22.393 UTC [common.channelconfig] NewStandardValues -> DEBU 4d7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:22.394 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d8 Processing field: MSP" +"2019-05-02 09:27:22.394 UTC [common.channelconfig] Validate -> DEBU 4d9 Anchor peers for org Org2MSP are " +"2019-05-02 09:27:22.394 UTC [common.channelconfig] validateMSP -> DEBU 4da Setting up MSP for org Org2MSP" +"2019-05-02 09:27:22.395 UTC [msp] newBccspMsp -> DEBU 4db Creating BCCSP-based MSP instance" +"2019-05-02 09:27:22.395 UTC [msp] New -> DEBU 4dc Creating Cache-MSP instance" +"2019-05-02 09:27:22.407 UTC [msp] Setup -> DEBU 4dd Setting up MSP instance Org2MSP" +"2019-05-02 09:27:22.408 UTC [comm.grpc.server] 1 -> INFO 4de unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.408Z grpc.peer_address=172.18.0.6:53216 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=124.6µs +"2019-05-02 09:27:22.409 UTC [msp.identity] newIdentity -> DEBU 4df Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2489,7 +2398,27 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.042 UTC [msp.identity] newIdentity -> DEBU 513 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.411 UTC [msp.identity] Sign -> DEBU 4e0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:22.412 UTC [msp.identity] Sign -> DEBU 4e1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:22.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4e2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53216" +"2019-05-02 09:27:22.414 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4e3 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53216" +"2019-05-02 09:27:22.416 UTC [msp.identity] Verify -> DEBU 4e4 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-05-02 09:27:22.417 UTC [msp.identity] Verify -> DEBU 4e5 Verify: sig = 00000000 30 44 02 20 01 3a fc 5f 3d 11 c1 39 9c 3f 62 dc |0D. .:._=..9.?b.| +00000010 34 d7 79 8e ec 78 df 57 4b 3c ab ec 2d 9b 93 b4 |4.y..x.WK<..-...| +00000020 21 fa 7d 9b 02 20 65 c0 70 63 b0 34 15 dc b9 94 |!.}.. e.pc.4....| +00000030 3d fb 65 34 11 09 7e a4 c3 d8 83 cf 58 73 03 d0 |=.e4..~.....Xs..| +00000040 7a e3 37 96 05 04 |z.7...|" +"2019-05-02 09:27:22.419 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4e6 Authenticated 172.18.0.6:53216" +"2019-05-02 09:27:22.419 UTC [gossip.comm] GossipStream -> DEBU 4e7 Servicing 172.18.0.6:53216" +"2019-05-02 09:27:22.420 UTC [gossip.comm] serviceConnection -> DEBU 4e8 Closing reading from stream" +"2019-05-02 09:27:22.420 UTC [gossip.comm] func2 -> DEBU 4e9 Client 172.18.0.6:53164 disconnected" +"2019-05-02 09:27:22.420 UTC [comm.grpc.server] 1 -> INFO 4ea streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:53164 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=13.2584929s +"2019-05-02 09:27:22.421 UTC [gossip.comm] writeToStream -> DEBU 4eb Closing writing to stream" +"2019-05-02 09:27:22.421 UTC [gossip.comm] serviceConnection -> DEBU 4ec Closing reading from stream" +"2019-05-02 09:27:22.421 UTC [gossip.comm] func2 -> DEBU 4ed Client 172.18.0.6:53216 disconnected" +"2019-05-02 09:27:22.421 UTC [comm.grpc.server] 1 -> INFO 4ee streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.411Z grpc.peer_address=172.18.0.6:53216 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.9769ms +"2019-05-02 09:27:22.421 UTC [msp.identity] newIdentity -> DEBU 4ef Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2503,527 +2432,31 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.043 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 514 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:47.044 UTC [msp] Validate -> DEBU 515 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.044 UTC [msp] getCertificationChain -> DEBU 516 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.045 UTC [msp] hasOURole -> DEBU 517 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:47.045 UTC [msp] getCertificationChain -> DEBU 518 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.046 UTC [msp] Setup -> DEBU 519 Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:47.046 UTC [msp] Setup -> DEBU 51a MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:47.047 UTC [policies] NewManagerImpl -> DEBU 51b Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.047 UTC [policies] NewManagerImpl -> DEBU 51c Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.047 UTC [policies] NewManagerImpl -> DEBU 51d Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.048 UTC [policies] NewManagerImpl -> DEBU 51e Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:47.048 UTC [policies] NewManagerImpl -> DEBU 51f Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:47.049 UTC [policies] NewManagerImpl -> DEBU 520 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:47.049 UTC [policies] NewManagerImpl -> DEBU 521 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:47.050 UTC [policies] NewManagerImpl -> DEBU 522 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.051 UTC [policies] NewManagerImpl -> DEBU 523 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.051 UTC [policies] NewManagerImpl -> DEBU 524 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.051 UTC [policies] NewManagerImpl -> DEBU 525 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.052 UTC [policies] NewManagerImpl -> DEBU 526 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.052 UTC [policies] NewManagerImpl -> DEBU 527 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.052 UTC [policies] NewManagerImpl -> DEBU 528 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.052 UTC [policies] NewManagerImpl -> DEBU 529 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.053 UTC [policies] NewManagerImpl -> DEBU 52a Proposed new policy Writers for Channel/Application" -"2019-05-02 01:30:47.053 UTC [policies] NewManagerImpl -> DEBU 52b Proposed new policy Admins for Channel/Application" -"2019-05-02 01:30:47.053 UTC [policies] NewManagerImpl -> DEBU 52c Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:30:47.054 UTC [policies] NewManagerImpl -> DEBU 52d Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:30:47.054 UTC [policies] NewManagerImpl -> DEBU 52e Proposed new policy Readers for Channel/Application" -"2019-05-02 01:30:47.054 UTC [policies] NewManagerImpl -> DEBU 52f Proposed new policy Admins for Channel" -"2019-05-02 01:30:47.054 UTC [policies] NewManagerImpl -> DEBU 530 Proposed new policy Readers for Channel" -"2019-05-02 01:30:47.054 UTC [policies] NewManagerImpl -> DEBU 531 Proposed new policy Writers for Channel" -"2019-05-02 01:30:47.055 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:47.055 UTC [common.configtx] addToMap -> DEBU 533 Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:47.055 UTC [common.configtx] addToMap -> DEBU 534 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.055 UTC [common.configtx] addToMap -> DEBU 535 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:47.055 UTC [common.configtx] addToMap -> DEBU 536 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:47.056 UTC [common.configtx] addToMap -> DEBU 537 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:47.056 UTC [common.configtx] addToMap -> DEBU 538 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:47.056 UTC [common.configtx] addToMap -> DEBU 539 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:47.056 UTC [common.configtx] addToMap -> DEBU 53a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:47.056 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 53c Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:47.057 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 542 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 543 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 544 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 545 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 546 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:47.058 UTC [common.configtx] addToMap -> DEBU 547 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:47.059 UTC [common.configtx] addToMap -> DEBU 548 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:47.059 UTC [common.configtx] addToMap -> DEBU 549 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:47.059 UTC [common.configtx] addToMap -> DEBU 54a Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.060 UTC [common.configtx] addToMap -> DEBU 54b Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:47.060 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.060 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:47.060 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:47.061 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:47.062 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:47.062 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:47.062 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:47.062 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:47.063 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:47.063 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:47.063 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:47.064 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:47.064 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:47.064 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:47.064 UTC [common.channelconfig] LogSanityChecks -> DEBU 55f As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:30:47.064 UTC [common.channelconfig] LogSanityChecks -> DEBU 560 As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:30:47.064 UTC [policies] Manager -> DEBU 561 Manager Channel looking up path [Application]" -"2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 562 Manager Channel has managers Orderer" -"2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 563 Manager Channel has managers Application" -"2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 564 Manager Channel/Application looking up path []" -"2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 565 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 566 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:47.065 UTC [common.channelconfig] LogSanityChecks -> DEBU 567 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:30:47.065 UTC [common.channelconfig] LogSanityChecks -> DEBU 568 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:30:47.065 UTC [common.channelconfig] LogSanityChecks -> DEBU 569 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 56a Manager Channel looking up path [Orderer]" -"2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 56b Manager Channel has managers Orderer" -"2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 56c Manager Channel has managers Application" -"2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 56d Manager Channel/Orderer looking up path []" -"2019-05-02 01:30:47.065 UTC [policies] Manager -> DEBU 56e Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:30:47.065 UTC [common.channelconfig] LogSanityChecks -> DEBU 56f As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:30:47.065 UTC [common.capabilities] Supported -> DEBU 570 Application capability V2_0 is supported and is enabled" -"2019-05-02 01:30:47.065 UTC [common.capabilities] Supported -> DEBU 571 Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:47.065 UTC [gossip.service] ProcessConfigUpdate -> DEBU 572 Processing new config for channel businesschannel" -"2019-05-02 01:30:47.065 UTC [gossip.service] ProcessConfigUpdate -> DEBU 573 Calling out because config was updated for channel businesschannel" -"2019-05-02 01:30:47.065 UTC [gossip.service] updateAnchors -> DEBU 574 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -"2019-05-02 01:30:47.065 UTC [gossip.service] updateAnchors -> DEBU 575 Org2MSP anchor peers: []" -"2019-05-02 01:30:47.065 UTC [gossip.service] updateAnchors -> DEBU 576 Creating state provider for chainID businesschannel" -"2019-05-02 01:30:47.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 577 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.066 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 578 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 579 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 57a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 57b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:30:47.066 UTC [cauthdsl] func1 -> DEBU 57c 0xc0031a08c0 gate 1556760647066147200 evaluation starts" -"2019-05-02 01:30:47.066 UTC [cauthdsl] func2 -> DEBU 57d 0xc0031a08c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.066 UTC [cauthdsl] func2 -> DEBU 57e 0xc0031a08c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.066 UTC [cauthdsl] func2 -> DEBU 57f 0xc0031a08c0 principal matched by identity 0" -"2019-05-02 01:30:47.066 UTC [msp.identity] Verify -> DEBU 580 Verify: digest = 00000000 64 b8 f5 fc bc 41 9d c3 23 39 08 c8 d5 68 b5 5f |d....A..#9...h._| -00000010 cb 60 03 12 f4 56 5f 02 2c cb 7b ec 0c ec e7 f3 |.`...V_.,.{.....|" -"2019-05-02 01:30:47.066 UTC [msp.identity] Verify -> DEBU 581 Verify: sig = 00000000 30 45 02 21 00 8d e0 ab 12 85 44 66 c1 8b 8d dc |0E.!......Df....| -00000010 51 43 a8 33 77 2b f7 6f 71 2f 33 f0 a3 f9 30 e6 |QC.3w+.oq/3...0.| -00000020 a4 d6 0c 08 30 02 20 02 6e 63 0c 91 c6 6e 86 31 |....0. .nc...n.1| -00000030 d8 28 5e 48 90 45 48 1d c0 4f 20 99 6b c8 54 11 |.(^H.EH..O .k.T.| -00000040 af 82 d0 06 25 10 d2 |....%..|" -"2019-05-02 01:30:47.066 UTC [cauthdsl] func2 -> DEBU 582 0xc0031a08c0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.066 UTC [cauthdsl] func1 -> DEBU 583 0xc0031a08c0 gate 1556760647066147200 evaluation succeeds" -"2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 584 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 585 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 586 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.066 UTC [policies] Evaluate -> DEBU 587 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.066 UTC [gossip.gossip] JoinChan -> INFO 588 Joining gossip network of channel businesschannel with 2 organizations" -"2019-05-02 01:30:47.066 UTC [gossip.gossip] learnAnchorPeers -> INFO 589 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -"2019-05-02 01:30:47.066 UTC [gossip.gossip] learnAnchorPeers -> INFO 58a Anchor peer with same endpoint, skipping connecting to myself" -"2019-05-02 01:30:47.066 UTC [gossip.gossip] learnAnchorPeers -> INFO 58b No configured anchor peers of Org2MSP for channel businesschannel to learn about" -"2019-05-02 01:30:47.066 UTC [gossip.service] updateEndpoints -> DEBU 58c Updating endpoints for chainID%!(EXTRA string=businesschannel)" -"2019-05-02 01:30:47.067 UTC [peer] updateTrustedRoots -> DEBU 58d Updating trusted root authorities for channel businesschannel" -"2019-05-02 01:30:47.091 UTC [peer] buildTrustedRootsForChain -> DEBU 58e updating root CAs for channel [businesschannel]" -"2019-05-02 01:30:47.092 UTC [peer] buildTrustedRootsForChain -> DEBU 58f adding app root CAs for MSP [Org2MSP]" -"2019-05-02 01:30:47.093 UTC [peer] buildTrustedRootsForChain -> DEBU 590 adding orderer root CAs for MSP [OrdererMSP]" -"2019-05-02 01:30:47.093 UTC [peer] buildTrustedRootsForChain -> DEBU 591 adding app root CAs for MSP [Org1MSP]" -"2019-05-02 01:30:47.094 UTC [committer.txvalidator] validateTx -> DEBU 592 config transaction received for chain businesschannel" -"2019-05-02 01:30:47.095 UTC [committer.txvalidator] validateTx -> DEBU 593 [businesschannel] validateTx completes for block 0xc002d99d80 env 0xc002efe190 txn 0" -"2019-05-02 01:30:47.095 UTC [committer.txvalidator] Validate -> DEBU 594 got result for idx 0, code 0" -"2019-05-02 01:30:47.095 UTC [committer.txvalidator] Validate -> INFO 595 [businesschannel] Validated block [1] in 163ms" -"2019-05-02 01:30:47.096 UTC [gossip.privdata] listMissingPrivateData -> DEBU 596 Retrieving private write sets for 0 transactions from transient store" -"2019-05-02 01:30:47.096 UTC [gossip.privdata] StoreBlock -> DEBU 597 [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-05-02 01:30:47.096 UTC [committer] preCommit -> DEBU 598 Received configuration update, calling CSCC ConfigUpdate" -"2019-05-02 01:30:47.097 UTC [kvledger] CommitWithPvtData -> DEBU 599 [businesschannel] Validating state for block [1]" -"2019-05-02 01:30:47.097 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 59a Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:30:47.097 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 59b lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-05-02 01:30:47.097 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 59c Validating new block with num trans = [1]" -"2019-05-02 01:30:47.097 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59d ValidateAndPrepareBatch() for block number = [1]" -"2019-05-02 01:30:47.097 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59e preprocessing ProtoBlock..." -"2019-05-02 01:30:47.098 UTC [valimpl] preprocessProtoBlock -> DEBU 59f txType=CONFIG" -"2019-05-02 01:30:47.098 UTC [valimpl] processNonEndorserTx -> DEBU 5a0 Performing custom processing for transaction [txid=], [txType=CONFIG]" -"2019-05-02 01:30:47.098 UTC [valimpl] processNonEndorserTx -> DEBU 5a1 Processor for custom tx processing:&peer.configtxProcessor{}" -"2019-05-02 01:30:47.099 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5a2 constructing new tx simulator" -"2019-05-02 01:30:47.099 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5a3 constructing new tx simulator txid = []" -"2019-05-02 01:30:47.099 UTC [peer] GenerateSimulationResults -> DEBU 5a4 Processing CONFIG" -"2019-05-02 01:30:47.100 UTC [peer] processChannelConfigTx -> DEBU 5a5 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -"2019-05-02 01:30:47.100 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5a6 Simulation completed, getting simulation results" -"2019-05-02 01:30:47.101 UTC [lockbasedtxmgr] Done -> DEBU 5a7 Done with transaction simulation / query execution []" -"2019-05-02 01:30:47.101 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 5a8 Block [1] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" -"2019-05-02 01:30:47.101 UTC [valinternal] ApplyWriteSet -> DEBU 5a9 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003232240)}" -"2019-05-02 01:30:47.102 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5aa validating rwset..." -"2019-05-02 01:30:47.102 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5ab postprocessing ProtoBlock..." -"2019-05-02 01:30:47.102 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5ac ValidateAndPrepareBatch() complete" -"2019-05-02 01:30:47.103 UTC [kvledger] CommitWithPvtData -> DEBU 5ad [businesschannel] Committing block [1] to storage" -"2019-05-02 01:30:47.103 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5ae Writing block [1] to pvt block store" -"2019-05-02 01:30:47.107 UTC [pvtdatastorage] Prepare -> DEBU 5af Saved 0 private data write sets for block [1]" -"2019-05-02 01:30:47.111 UTC [fsblkstorage] indexBlock -> DEBU 5b0 Indexing block [blockNum=1, blockHash=[]byte{0xff, 0x3a, 0xf4, 0xf2, 0x7d, 0x57, 0xed, 0xa3, 0xbb, 0xd3, 0xc3, 0x89, 0xf0, 0x76, 0xc5, 0xde, 0x51, 0x48, 0x5f, 0xa5, 0xe0, 0xf9, 0x5f, 0xe5, 0xee, 0x96, 0x4e, 0xe6, 0xcd, 0x8c, 0x8d, 0x72} txOffsets= -txId= locPointer=offset=71, bytesLength=22678 -]" -"2019-05-02 01:30:47.112 UTC [fsblkstorage] indexBlock -> DEBU 5b1 txid [] is a duplicate of a previous tx. Not indexing in txid-index" -"2019-05-02 01:30:47.112 UTC [fsblkstorage] indexBlock -> DEBU 5b2 Adding txLoc [fileSuffixNum=0, offset=24012, bytesLength=22678] for tx number:[0] ID: [] to blockNumTranNum index" -"2019-05-02 01:30:47.115 UTC [fsblkstorage] updateCheckpoint -> DEBU 5b3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47628], isChainEmpty=[false], lastBlockNumber=[1]" -"2019-05-02 01:30:47.115 UTC [pvtdatastorage] Commit -> DEBU 5b4 Committing private data for block [1]" -"2019-05-02 01:30:47.119 UTC [pvtdatastorage] Commit -> DEBU 5b5 Committed private data for block [1]" -"2019-05-02 01:30:47.119 UTC [kvledger] CommitWithPvtData -> DEBU 5b6 [businesschannel] Committing block [1] transactions to state database" -"2019-05-02 01:30:47.120 UTC [lockbasedtxmgr] Commit -> DEBU 5b7 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-05-02 01:30:47.120 UTC [lockbasedtxmgr] Commit -> DEBU 5b8 Committing updates to state database" -"2019-05-02 01:30:47.120 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5b9 Building the expiry schedules based on the update batch" -"2019-05-02 01:30:47.120 UTC [lockbasedtxmgr] Commit -> DEBU 5ba Write lock acquired for committing updates to state database" -"2019-05-02 01:30:47.121 UTC [stateleveldb] ApplyUpdates -> DEBU 5bb Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -"2019-05-02 01:30:47.125 UTC [lockbasedtxmgr] Commit -> DEBU 5bc Updates committed to state database and the write lock is released" -"2019-05-02 01:30:47.126 UTC [lockbasedtxmgr] func1 -> DEBU 5bd launched the background routine for preparing keys to purge with the next block" -"2019-05-02 01:30:47.126 UTC [kvledger] CommitWithPvtData -> DEBU 5bf [businesschannel] Committing block [1] transactions to history database" -"2019-05-02 01:30:47.126 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5be Preparing potential purge list working-set for expiringAtBlk [2]" -"2019-05-02 01:30:47.126 UTC [historyleveldb] Commit -> DEBU 5c0 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" -"2019-05-02 01:30:47.127 UTC [historyleveldb] Commit -> DEBU 5c2 Skipping transaction [0] since it is not an endorsement transaction" -"2019-05-02 01:30:47.126 UTC [leveldbhelper] GetIterator -> DEBU 5c1 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" -"2019-05-02 01:30:47.127 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5c3 No expiry entry found for expiringAtBlk [2]" -"2019-05-02 01:30:47.130 UTC [historyleveldb] Commit -> DEBU 5c4 Channel [businesschannel]: Updates committed to history database for blockNo [1]" -"2019-05-02 01:30:47.130 UTC [kvledger] CommitWithPvtData -> INFO 5c5 [businesschannel] Committed block [1] with 1 transaction(s) in 33ms (state_validation=5ms block_commit=16ms state_commit=6ms)" -"2019-05-02 01:30:47.131 UTC [msp.identity] Sign -> DEBU 5c6 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020802 " -"2019-05-02 01:30:47.131 UTC [msp.identity] Sign -> DEBU 5c7 Sign: digest: 3E6306466F7189ED67DF73929522511CEF79C91E89AFF29EBF683A97BC28E3B9 " -"2019-05-02 01:30:47.131 UTC [gossip.state] commitBlock -> DEBU 5c8 [businesschannel] Committed block [1] with 1 transaction(s)" -"2019-05-02 01:30:47.471 UTC [comm.grpc.server] 1 -> INFO 5c9 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.469Z grpc.peer_address=192.168.240.5:55178 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=230.9µs -"2019-05-02 01:30:47.474 UTC [msp.identity] Sign -> DEBU 5ca Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.475 UTC [msp.identity] Sign -> DEBU 5cb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.475 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5cc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.5:55178" -"2019-05-02 01:30:47.476 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5cd Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:55178" -"2019-05-02 01:30:47.476 UTC [msp] DeserializeIdentity -> DEBU 5ce Obtaining identity" -"2019-05-02 01:30:47.476 UTC [msp] DeserializeIdentity -> DEBU 5cf Obtaining identity" -"2019-05-02 01:30:47.477 UTC [msp.identity] newIdentity -> DEBU 5d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL ------END CERTIFICATE-----" -"2019-05-02 01:30:47.477 UTC [msp] Validate -> DEBU 5d1 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.478 UTC [msp] getCertificationChain -> DEBU 5d2 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.479 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5d3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.479 UTC [msp] DeserializeIdentity -> DEBU 5d4 Obtaining identity" -"2019-05-02 01:30:47.480 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.480 UTC [msp] DeserializeIdentity -> DEBU 5d6 Obtaining identity" -"2019-05-02 01:30:47.482 UTC [msp] DeserializeIdentity -> DEBU 5d7 Obtaining identity" -"2019-05-02 01:30:47.484 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5d8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5d9 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5da Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.489 UTC [policies] Evaluate -> DEBU 5db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.494 UTC [policies] Evaluate -> DEBU 5dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.495 UTC [policies] Evaluate -> DEBU 5dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.498 UTC [cauthdsl] func1 -> DEBU 5de 0xc0033005b0 gate 1556760647498656500 evaluation starts" -"2019-05-02 01:30:47.498 UTC [cauthdsl] func2 -> DEBU 5df 0xc0033005b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.498 UTC [cauthdsl] func2 -> DEBU 5e0 0xc0033005b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.498 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5e1 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:30:47.498 UTC [msp] Validate -> DEBU 5e2 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.498 UTC [msp] getCertificationChain -> DEBU 5e3 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.499 UTC [cauthdsl] func2 -> DEBU 5e4 0xc0033005b0 principal matched by identity 0" -"2019-05-02 01:30:47.499 UTC [msp.identity] Verify -> DEBU 5e5 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-05-02 01:30:47.499 UTC [msp.identity] Verify -> DEBU 5e6 Verify: sig = 00000000 30 45 02 21 00 c9 2d 64 80 b0 04 84 fa 94 bb d0 |0E.!..-d........| -00000010 20 33 25 bc 96 51 ad 83 96 19 15 4c f1 d1 d3 81 | 3%..Q.....L....| -00000020 a3 12 f8 e7 9b 02 20 28 c0 fb 1c 11 9e 7b 56 e0 |...... (.....{V.| -00000030 54 64 09 ee 7f 15 0e 5f cf a4 8d f2 ef 3e 35 08 |Td....._.....>5.| -00000040 2c 89 c7 53 b7 6a ee |,..S.j.|" -"2019-05-02 01:30:47.499 UTC [cauthdsl] func2 -> DEBU 5e7 0xc0033005b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.499 UTC [cauthdsl] func1 -> DEBU 5e8 0xc0033005b0 gate 1556760647498656500 evaluation succeeds" -"2019-05-02 01:30:47.499 UTC [policies] Evaluate -> DEBU 5e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.499 UTC [policies] Evaluate -> DEBU 5ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.499 UTC [policies] Evaluate -> DEBU 5eb Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.499 UTC [policies] Evaluate -> DEBU 5ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.499 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ed Authenticated 192.168.240.5:55178" -"2019-05-02 01:30:47.499 UTC [gossip.comm] GossipStream -> DEBU 5ee Servicing 192.168.240.5:55178" -"2019-05-02 01:30:47.528 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5ef Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.529 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5f0 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.529 UTC [policies] Evaluate -> DEBU 5f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-05-02 01:30:47.529 UTC [policies] Evaluate -> DEBU 5f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.529 UTC [policies] Evaluate -> DEBU 5f3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:30:47.530 UTC [msp] DeserializeIdentity -> DEBU 5f4 Obtaining identity" -"2019-05-02 01:30:47.531 UTC [msp.identity] newIdentity -> DEBU 5f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI -KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO -CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA -MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM -SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q -1A== ------END CERTIFICATE-----" -"2019-05-02 01:30:47.531 UTC [cauthdsl] func1 -> DEBU 5f6 0xc003145b30 gate 1556760647531940300 evaluation starts" -"2019-05-02 01:30:47.532 UTC [cauthdsl] func2 -> DEBU 5fa 0xc003145b30 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.533 UTC [cauthdsl] func2 -> DEBU 5fb 0xc003145b30 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.532 UTC [gossip.comm] readFromStream -> DEBU 5f7 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:47.532 UTC [gossip.comm] func2 -> DEBU 5f8 Client 192.168.240.5:55178 disconnected" -"2019-05-02 01:30:47.536 UTC [comm.grpc.server] 1 -> INFO 5fc streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.474Z grpc.peer_address=192.168.240.5:55178 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=61.902ms -"2019-05-02 01:30:47.532 UTC [grpc] infof -> DEBU 5f9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.537 UTC [gossip.comm] writeToStream -> DEBU 5fd Closing writing to stream" -"2019-05-02 01:30:47.538 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5fe Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-05-02 01:30:47.540 UTC [msp] Validate -> DEBU 5ff MSP OrdererMSP validating identity" -"2019-05-02 01:30:47.540 UTC [cauthdsl] func2 -> DEBU 600 0xc003145b30 principal matched by identity 0" -"2019-05-02 01:30:47.540 UTC [msp.identity] Verify -> DEBU 601 Verify: digest = 00000000 a0 63 37 55 8b 40 75 fb 71 6a c8 2e aa ea 87 3d |.c7U.@u.qj.....=| -00000010 42 53 60 e7 41 23 c8 72 ad b9 02 5d b9 85 a0 2b |BS`.A#.r...]...+|" -"2019-05-02 01:30:47.541 UTC [msp.identity] Verify -> DEBU 602 Verify: sig = 00000000 30 45 02 21 00 da ec 2d 6a b7 74 dd 66 0b d6 9d |0E.!...-j.t.f...| -00000010 7a 02 7b 9d 88 b9 4a 5b 91 27 be d9 f6 f4 e9 9e |z.{...J[.'......| -00000020 43 35 ce 9e 60 02 20 7c 35 ac c7 af 58 ca 57 a8 |C5..`. |5...X.W.| -00000030 3e 97 66 b7 f8 de a4 bf 70 c7 bc b6 c8 41 04 fd |>.f.....p....A..| -00000040 fa db 5c 9c bb f6 ff |..\....|" -"2019-05-02 01:30:47.549 UTC [comm.grpc.server] 1 -> INFO 603 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.541Z grpc.peer_address=192.168.240.5:55180 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.5612ms -"2019-05-02 01:30:47.551 UTC [cauthdsl] func2 -> DEBU 604 0xc003145b30 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.552 UTC [cauthdsl] func1 -> DEBU 605 0xc003145b30 gate 1556760647531940300 evaluation succeeds" -"2019-05-02 01:30:47.553 UTC [policies] Evaluate -> DEBU 606 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:47.553 UTC [policies] Evaluate -> DEBU 607 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:47.557 UTC [policies] Evaluate -> DEBU 608 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:47.558 UTC [policies] Evaluate -> DEBU 609 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:47.558 UTC [blocksProvider] DeliverBlocks -> DEBU 60a [businesschannel] Adding payload to local buffer, blockNum = [2]" -"2019-05-02 01:30:47.559 UTC [gossip.state] addPayload -> DEBU 60b [businesschannel] Adding payload to local buffer, blockNum = [2]" -"2019-05-02 01:30:47.559 UTC [gossip.state] addPayload -> DEBU 60c Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-05-02 01:30:47.560 UTC [blocksProvider] DeliverBlocks -> DEBU 60d [businesschannel] Gossiping block [2], peers number [1]" -"2019-05-02 01:30:47.560 UTC [gossip.channel] AddToMsgStore -> DEBU 60e Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23756 bytes, seq: 2}, Envelope: 23789 bytes, Signature: 0 bytes to the block puller" -"2019-05-02 01:30:47.562 UTC [gossip.pull] Add -> DEBU 611 Added 2, total items: 2" -"2019-05-02 01:30:47.561 UTC [gossip.state] deliverPayloads -> DEBU 60f [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [2]" -"2019-05-02 01:30:47.563 UTC [gossip.state] deliverPayloads -> DEBU 612 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" -"2019-05-02 01:30:47.563 UTC [gossip.privdata] StoreBlock -> INFO 613 [businesschannel] Received block [2] from buffer" -"2019-05-02 01:30:47.564 UTC [gossip.privdata] StoreBlock -> DEBU 614 [businesschannel] Validating block [2]" -"2019-05-02 01:30:47.564 UTC [committer.txvalidator] Validate -> DEBU 615 [businesschannel] START Block Validation for block [2]" -"2019-05-02 01:30:47.564 UTC [committer.txvalidator] Validate -> DEBU 616 expecting 1 block validation responses" -"2019-05-02 01:30:47.565 UTC [committer.txvalidator] validateTx -> DEBU 617 [businesschannel] validateTx starts for block 0xc00312f340 env 0xc0031490e0 txn 0" -"2019-05-02 01:30:47.565 UTC [protoutils] ValidateTransaction -> DEBU 618 ValidateTransactionEnvelope starts for envelope 0xc0031490e0" -"2019-05-02 01:30:47.566 UTC [protoutils] ValidateTransaction -> DEBU 619 Header is channel_header:"\010\001\032\006\010\307\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\022\351\317\224\344K\254\270\031\247\202s\313\323o\034E\377\377:\265\311\rd" " -"2019-05-02 01:30:47.566 UTC [protoutils] validateChannelHeader -> DEBU 61a validateChannelHeader info: header type 1" -"2019-05-02 01:30:47.567 UTC [protoutils] checkSignatureFromCreator -> DEBU 61b begin" -"2019-05-02 01:30:47.567 UTC [msp] GetManagerForChain -> DEBU 61c Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:30:47.562 UTC [msp.identity] Sign -> DEBU 610 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.568 UTC [msp] DeserializeIdentity -> DEBU 61d Obtaining identity" -"2019-05-02 01:30:47.569 UTC [msp.identity] newIdentity -> DEBU 61f Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -QQ== ------END CERTIFICATE-----" -"2019-05-02 01:30:47.570 UTC [protoutils] checkSignatureFromCreator -> DEBU 620 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -"2019-05-02 01:30:47.571 UTC [msp] Validate -> DEBU 621 MSP OrdererMSP validating identity" -"2019-05-02 01:30:47.572 UTC [protoutils] checkSignatureFromCreator -> DEBU 622 creator is valid" -"2019-05-02 01:30:47.573 UTC [msp.identity] Verify -> DEBU 623 Verify: digest = 00000000 21 4f fb 0b 5f ab 9a c4 67 22 08 66 81 b5 b4 cf |!O.._...g".f....| -00000010 2e 2c 23 f4 80 33 e2 a8 1f 04 b0 58 3c 43 28 f3 |.,#..3.....X DEBU 624 Verify: sig = 00000000 30 45 02 21 00 86 fb 9c 76 cb 8b 44 af f4 0f 00 |0E.!....v..D....| -00000010 6e e3 d1 6b 41 41 f8 4f c3 17 a3 44 ca c9 5f 0a |n..kAA.O...D.._.| -00000020 81 7e ce 61 81 02 20 50 e7 08 a1 de af f0 a0 ab |.~.a.. P........| -00000030 8d 52 b4 19 b0 21 33 09 ea d4 9f ad 17 d6 94 e3 |.R...!3.........| -00000040 85 6c 7e 6e e3 72 97 |.l~n.r.|" -"2019-05-02 01:30:47.574 UTC [protoutils] checkSignatureFromCreator -> DEBU 625 exits successfully" -"2019-05-02 01:30:47.568 UTC [msp.identity] Sign -> DEBU 61e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.575 UTC [protoutils] validateConfigTransaction -> DEBU 626 validateConfigTransaction starts for data 0xc0033a4000, header channel_header:"\010\001\032\006\010\307\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\022\351\317\224\344K\254\270\031\247\202s\313\323o\034E\377\377:\265\311\rd" " -"2019-05-02 01:30:47.581 UTC [gossip.comm] authenticateRemotePeer -> DEBU 627 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.5:55180" -"2019-05-02 01:30:47.583 UTC [gossip.comm] authenticateRemotePeer -> DEBU 629 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:55180" -"2019-05-02 01:30:47.583 UTC [msp] DeserializeIdentity -> DEBU 62a Obtaining identity" -"2019-05-02 01:30:47.584 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.584 UTC [msp] DeserializeIdentity -> DEBU 62c Obtaining identity" -"2019-05-02 01:30:47.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.586 UTC [msp] DeserializeIdentity -> DEBU 62e Obtaining identity" -"2019-05-02 01:30:47.587 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 630 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 631 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.588 UTC [policies] Evaluate -> DEBU 632 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.588 UTC [policies] Evaluate -> DEBU 633 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.588 UTC [policies] Evaluate -> DEBU 634 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.589 UTC [cauthdsl] func1 -> DEBU 635 0xc0033bf2d0 gate 1556760647589013500 evaluation starts" -"2019-05-02 01:30:47.590 UTC [cauthdsl] func2 -> DEBU 636 0xc0033bf2d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.590 UTC [cauthdsl] func2 -> DEBU 637 0xc0033bf2d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.581 UTC [committer.txvalidator] validateTx -> DEBU 628 Transaction is for channel businesschannel" -"2019-05-02 01:30:47.591 UTC [cauthdsl] func2 -> DEBU 638 0xc0033bf2d0 principal matched by identity 0" -"2019-05-02 01:30:47.592 UTC [msp.identity] Verify -> DEBU 63a Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-05-02 01:30:47.592 UTC [msp.identity] Verify -> DEBU 63b Verify: sig = 00000000 30 45 02 21 00 9a 04 67 89 50 f5 22 12 f0 b8 10 |0E.!...g.P."....| -00000010 ed 32 3d 12 ad 0d 47 ce 80 50 5c c4 f6 08 c0 b0 |.2=...G..P\.....| -00000020 d2 d2 50 4e 91 02 20 60 7f bb 47 f2 90 cb af 5c |..PN.. `..G....\| -00000030 f5 74 84 1d ae 5b 86 67 0b a4 a6 0a 9e 47 d3 d3 |.t...[.g.....G..| -00000040 9e fe 10 b1 4a c1 d2 |....J..|" -"2019-05-02 01:30:47.594 UTC [cauthdsl] func2 -> DEBU 63c 0xc0033bf2d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.594 UTC [gossip.comm] Send -> DEBU 63d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23756 bytes, seq: 2}, Envelope: 23789 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:47.595 UTC [gossip.comm] sendToEndpoint -> DEBU 63f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23756 bytes, seq: 2}, Envelope: 23789 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.595 UTC [gossip.comm] sendToEndpoint -> DEBU 640 Exiting" -"2019-05-02 01:30:47.594 UTC [cauthdsl] func1 -> DEBU 63e 0xc0033bf2d0 gate 1556760647589013500 evaluation succeeds" -"2019-05-02 01:30:47.591 UTC [common.configtx] addToMap -> DEBU 639 Adding to config map: [Group] /Channel" -"2019-05-02 01:30:47.607 UTC [policies] Evaluate -> DEBU 641 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.607 UTC [policies] Evaluate -> DEBU 643 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.607 UTC [policies] Evaluate -> DEBU 644 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.608 UTC [policies] Evaluate -> DEBU 645 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.608 UTC [gossip.comm] authenticateRemotePeer -> DEBU 646 Authenticated 192.168.240.5:55180" -"2019-05-02 01:30:47.608 UTC [gossip.comm] GossipStream -> DEBU 647 Servicing 192.168.240.5:55180" -"2019-05-02 01:30:47.607 UTC [common.configtx] addToMap -> DEBU 642 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:47.609 UTC [common.configtx] addToMap -> DEBU 648 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.609 UTC [common.configtx] addToMap -> DEBU 649 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:47.611 UTC [common.configtx] addToMap -> DEBU 64a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.612 UTC [common.configtx] addToMap -> DEBU 64b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:47.612 UTC [common.configtx] addToMap -> DEBU 64c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.612 UTC [common.configtx] addToMap -> DEBU 64d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.612 UTC [common.configtx] addToMap -> DEBU 64e Adding to config map: [Group] /Channel" -"2019-05-02 01:30:47.613 UTC [common.configtx] addToMap -> DEBU 64f Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:47.613 UTC [common.configtx] addToMap -> DEBU 650 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.613 UTC [common.configtx] addToMap -> DEBU 651 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:30:47.614 UTC [common.configtx] addToMap -> DEBU 653 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:47.614 UTC [common.configtx] addToMap -> DEBU 654 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:47.614 UTC [common.configtx] addToMap -> DEBU 655 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.614 UTC [gossip.gossip] handleMessage -> DEBU 652 Entering, 192.168.240.5:55180 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 10824040122491647565, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.615 UTC [gossip.gossip] handleMessage -> DEBU 657 Exiting" -"2019-05-02 01:30:47.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 658 Got message: GossipMessage: Channel: , nonce: 10824040122491647565, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.615 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 659 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:47.616 UTC [msp] DeserializeIdentity -> DEBU 65a Obtaining identity" -"2019-05-02 01:30:47.616 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 65b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 65c Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 65d Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.617 UTC [policies] Evaluate -> DEBU 65e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.617 UTC [policies] Evaluate -> DEBU 65f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.617 UTC [policies] Evaluate -> DEBU 660 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.618 UTC [cauthdsl] func1 -> DEBU 661 0xc003414ce0 gate 1556760647618131600 evaluation starts" -"2019-05-02 01:30:47.618 UTC [cauthdsl] func2 -> DEBU 662 0xc003414ce0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.618 UTC [cauthdsl] func2 -> DEBU 663 0xc003414ce0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.618 UTC [cauthdsl] func2 -> DEBU 664 0xc003414ce0 principal matched by identity 0" -"2019-05-02 01:30:47.618 UTC [msp.identity] Verify -> DEBU 665 Verify: digest = 00000000 32 3d 9b d7 ca 81 cb 3a 10 7e 65 1f 7e 39 06 2e |2=.....:.~e.~9..| -00000010 82 b2 fb fe d4 cc ef 41 53 e4 9a b2 e4 8f 6a 46 |.......AS.....jF|" -"2019-05-02 01:30:47.618 UTC [msp.identity] Verify -> DEBU 666 Verify: sig = 00000000 30 45 02 21 00 a6 12 8a 7f 4e ec a1 a1 26 08 2f |0E.!.....N...&./| -00000010 f9 b9 6a 9b 3c fd b2 4a b4 56 ce ab 2f a8 c5 8b |..j.<..J.V../...| -00000020 da ea bb dd b8 02 20 4c 3a b6 39 05 30 6f 3b 71 |...... L:.9.0o;q| -00000030 51 27 65 f1 38 31 a4 22 a2 26 b0 57 7b f5 70 ad |Q'e.81.".&.W{.p.| -00000040 fd fe 4e 79 dc 52 ac |..Ny.R.|" -"2019-05-02 01:30:47.619 UTC [cauthdsl] func2 -> DEBU 667 0xc003414ce0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.621 UTC [cauthdsl] func1 -> DEBU 668 0xc003414ce0 gate 1556760647618131600 evaluation succeeds" -"2019-05-02 01:30:47.614 UTC [common.configtx] addToMap -> DEBU 656 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.621 UTC [common.configtx] addToMap -> DEBU 669 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.622 UTC [common.configtx] verifyDeltaSet -> DEBU 66a Processing change to key: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.621 UTC [policies] Evaluate -> DEBU 66b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.622 UTC [policies] Evaluate -> DEBU 66d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.622 UTC [policies] Evaluate -> DEBU 66e Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.622 UTC [policies] Evaluate -> DEBU 66f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.623 UTC [gossip.discovery] handleAliveMessage -> DEBU 670 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:47.623 UTC [gossip.discovery] learnNewMembers -> DEBU 671 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}" -"2019-05-02 01:30:47.623 UTC [gossip.discovery] learnNewMembers -> DEBU 672 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:47.623 UTC [gossip.discovery] learnNewMembers -> DEBU 673 Exiting" -"2019-05-02 01:30:47.623 UTC [gossip.discovery] handleAliveMessage -> DEBU 674 Exiting" -"2019-05-02 01:30:47.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 675 Exiting" -"2019-05-02 01:30:47.623 UTC [gossip.discovery] sendMemResponse -> DEBU 676 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:47.623 UTC [msp] DeserializeIdentity -> DEBU 677 Obtaining identity" -"2019-05-02 01:30:47.624 UTC [msp] DeserializeIdentity -> DEBU 678 Obtaining identity" -"2019-05-02 01:30:47.624 UTC [gossip.comm] Send -> DEBU 679 Entering, sending GossipMessage: Channel: , nonce: 10824040122491647565, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:47.624 UTC [gossip.discovery] sendMemResponse -> DEBU 67a Exiting, replying with MembershipResponse with Alive: 3, Dead: 0" -"2019-05-02 01:30:47.624 UTC [gossip.comm] sendToEndpoint -> DEBU 67b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 10824040122491647565, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.624 UTC [gossip.comm] sendToEndpoint -> DEBU 67c Exiting" -"2019-05-02 01:30:47.622 UTC [common.configtx] policyForItem -> DEBU 66c Getting policy for item Org2MSP with mod_policy Admins" -"2019-05-02 01:30:47.625 UTC [policies] Manager -> DEBU 67d Manager Channel looking up path [Application]" -"2019-05-02 01:30:47.626 UTC [policies] Manager -> DEBU 67e Manager Channel has managers Orderer" -"2019-05-02 01:30:47.636 UTC [policies] Manager -> DEBU 67f Manager Channel has managers Application" -"2019-05-02 01:30:47.637 UTC [policies] Manager -> DEBU 680 Manager Channel/Application looking up path []" -"2019-05-02 01:30:47.640 UTC [policies] Manager -> DEBU 681 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:47.641 UTC [policies] Manager -> DEBU 682 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:47.641 UTC [policies] Manager -> DEBU 683 Manager Channel/Application looking up path [Org2MSP]" -"2019-05-02 01:30:47.641 UTC [policies] Manager -> DEBU 684 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:47.641 UTC [policies] Manager -> DEBU 685 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:47.657 UTC [policies] Manager -> DEBU 686 Manager Channel/Application/Org2MSP looking up path []" -"2019-05-02 01:30:47.657 UTC [policies] Evaluate -> DEBU 687 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-05-02 01:30:47.657 UTC [msp] DeserializeIdentity -> DEBU 688 Obtaining identity" -"2019-05-02 01:30:47.657 UTC [comm.grpc.server] 1 -> INFO 689 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.656Z grpc.peer_address=192.168.240.5:55182 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.2979ms -"2019-05-02 01:30:47.660 UTC [msp.identity] newIdentity -> DEBU 68a Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-05-02 01:30:47.671 UTC [cauthdsl] func1 -> DEBU 68b 0xc00342d200 gate 1556760647662980100 evaluation starts" -"2019-05-02 01:30:47.671 UTC [cauthdsl] func2 -> DEBU 68c 0xc00342d200 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.673 UTC [cauthdsl] func2 -> DEBU 68d 0xc00342d200 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.674 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 68e Checking if identity satisfies ADMIN role for Org2MSP" -"2019-05-02 01:30:47.675 UTC [cauthdsl] func2 -> DEBU 68f 0xc00342d200 principal matched by identity 0" -"2019-05-02 01:30:47.675 UTC [msp.identity] Verify -> DEBU 690 Verify: digest = 00000000 94 91 3a 9b 42 3e cb f7 04 35 a7 fe 6e 63 d5 7c |..:.B>...5..nc.|| -00000010 7c 24 53 70 15 d2 b1 1a 57 a8 f8 c6 bb 05 dc 1f ||$Sp....W.......|" -"2019-05-02 01:30:47.677 UTC [msp.identity] Verify -> DEBU 691 Verify: sig = 00000000 30 44 02 20 2a 4c 37 99 83 06 3b 26 bc cd 68 87 |0D. *L7...;&..h.| -00000010 b4 dc 8d 15 40 47 d5 be ff cd 6a b3 4e fb 5a 82 |....@G....j.N.Z.| -00000020 06 7e 76 b6 02 20 04 f7 43 d0 0a f5 49 8b 53 76 |.~v.. ..C...I.Sv| -00000030 e9 cd a4 0c 01 31 38 3b 3f 69 a2 6e 25 1c d8 26 |.....18;?i.n%..&| -00000040 b9 56 9b 7e 5e 90 |.V.~^.|" -"2019-05-02 01:30:47.677 UTC [cauthdsl] func2 -> DEBU 692 0xc00342d200 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.677 UTC [cauthdsl] func1 -> DEBU 693 0xc00342d200 gate 1556760647662980100 evaluation succeeds" -"2019-05-02 01:30:47.678 UTC [policies] Evaluate -> DEBU 694 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.678 UTC [policies] Evaluate -> DEBU 695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.679 UTC [common.configtx] verifyDeltaSet -> DEBU 696 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:30:47.680 UTC [common.configtx] recurseConfigMap -> DEBU 697 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.680 UTC [common.configtx] recurseConfigMap -> DEBU 698 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.682 UTC [common.configtx] recurseConfigMap -> DEBU 699 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.683 UTC [common.configtx] recurseConfigMap -> DEBU 69a Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.683 UTC [common.configtx] recurseConfigMap -> DEBU 69b Setting policy for key Readers to " -"2019-05-02 01:30:47.684 UTC [common.configtx] recurseConfigMap -> DEBU 69c Setting policy for key Writers to " -"2019-05-02 01:30:47.685 UTC [common.configtx] recurseConfigMap -> DEBU 69d Setting policy for key Admins to " -"2019-05-02 01:30:47.685 UTC [common.configtx] recurseConfigMap -> DEBU 69e Setting policy for key Endorsement to " -"2019-05-02 01:30:47.685 UTC [common.configtx] recurseConfigMap -> DEBU 69f Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.686 UTC [common.configtx] recurseConfigMap -> DEBU 6a0 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.686 UTC [common.configtx] recurseConfigMap -> DEBU 6a1 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.686 UTC [common.configtx] recurseConfigMap -> DEBU 6a2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.687 UTC [common.configtx] recurseConfigMap -> DEBU 6a3 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.688 UTC [common.configtx] recurseConfigMap -> DEBU 6a4 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.688 UTC [common.configtx] recurseConfigMap -> DEBU 6a5 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.688 UTC [common.configtx] recurseConfigMap -> DEBU 6a6 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.689 UTC [common.configtx] recurseConfigMap -> DEBU 6a7 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.689 UTC [common.configtx] recurseConfigMap -> DEBU 6a8 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.689 UTC [common.configtx] recurseConfigMap -> DEBU 6a9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.690 UTC [common.configtx] recurseConfigMap -> DEBU 6aa Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.690 UTC [common.configtx] recurseConfigMap -> DEBU 6ab Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.690 UTC [common.configtx] recurseConfigMap -> DEBU 6ac Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.691 UTC [common.configtx] recurseConfigMap -> DEBU 6ad Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:30:47.692 UTC [common.channelconfig] NewStandardValues -> DEBU 6ae Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:30:47.692 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6af Processing field: HashingAlgorithm" -"2019-05-02 01:30:47.693 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b0 Processing field: BlockDataHashingStructure" -"2019-05-02 01:30:47.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b1 Processing field: OrdererAddresses" -"2019-05-02 01:30:47.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b2 Processing field: Consortium" -"2019-05-02 01:30:47.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b3 Processing field: Capabilities" -"2019-05-02 01:30:47.703 UTC [common.channelconfig] NewStandardValues -> DEBU 6b4 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:30:47.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b5 Processing field: ConsensusType" -"2019-05-02 01:30:47.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b6 Processing field: BatchSize" -"2019-05-02 01:30:47.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b7 Processing field: BatchTimeout" -"2019-05-02 01:30:47.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b8 Processing field: KafkaBrokers" -"2019-05-02 01:30:47.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6b9 Processing field: ChannelRestrictions" -"2019-05-02 01:30:47.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6ba Processing field: Capabilities" -"2019-05-02 01:30:47.705 UTC [common.channelconfig] NewStandardValues -> DEBU 6bb Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:30:47.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6bc Processing field: Endpoints" -"2019-05-02 01:30:47.705 UTC [common.channelconfig] NewStandardValues -> DEBU 6bd Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6be Processing field: MSP" -"2019-05-02 01:30:47.706 UTC [common.channelconfig] validateMSP -> DEBU 6bf Setting up MSP for org OrdererOrg" -"2019-05-02 01:30:47.706 UTC [msp] newBccspMsp -> DEBU 6c0 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.706 UTC [msp] New -> DEBU 6c1 Creating Cache-MSP instance" -"2019-05-02 01:30:47.706 UTC [msp] Setup -> DEBU 6c2 Setting up MSP instance OrdererMSP" -"2019-05-02 01:30:47.707 UTC [msp.identity] newIdentity -> DEBU 6c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.422 UTC [gossip.comm] writeToStream -> DEBU 4f0 Closing writing to stream" +"2019-05-02 09:27:22.422 UTC [gossip.comm] readFromStream -> DEBU 4f1 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-05-02 09:27:22.425 UTC [grpc] infof -> DEBU 4f2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:22.426 UTC [grpc] infof -> DEBU 4f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:22.426 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f4 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:22.426 UTC [msp] Validate -> DEBU 4f5 MSP Org2MSP validating identity" +"2019-05-02 09:27:22.427 UTC [msp] getCertificationChain -> DEBU 4f6 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:22.427 UTC [msp] hasOURole -> DEBU 4f7 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:22.427 UTC [msp] getCertificationChain -> DEBU 4f8 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] NewStandardValues -> DEBU 4f9 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fa Processing field: ConsensusType" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fb Processing field: BatchSize" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fc Processing field: BatchTimeout" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: KafkaBrokers" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fe Processing field: ChannelRestrictions" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ff Processing field: Capabilities" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] NewStandardValues -> DEBU 500 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 501 Processing field: Endpoints" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] NewStandardValues -> DEBU 502 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 503 Processing field: MSP" +"2019-05-02 09:27:22.427 UTC [common.channelconfig] validateMSP -> DEBU 504 Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:22.427 UTC [msp] newBccspMsp -> DEBU 505 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:22.427 UTC [msp] New -> DEBU 506 Creating Cache-MSP instance" +"2019-05-02 09:27:22.427 UTC [msp] Setup -> DEBU 507 Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:22.428 UTC [msp.identity] newIdentity -> DEBU 508 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -3037,7 +2470,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:47.707 UTC [msp.identity] newIdentity -> DEBU 6c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.428 UTC [msp.identity] newIdentity -> DEBU 509 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -3050,20 +2483,397 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.708 UTC [msp] Validate -> DEBU 6c5 MSP OrdererMSP validating identity" -"2019-05-02 01:30:47.709 UTC [common.channelconfig] NewStandardValues -> DEBU 6c6 Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:30:47.709 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6c7 Processing field: ACLs" -"2019-05-02 01:30:47.709 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6c8 Processing field: Capabilities" -"2019-05-02 01:30:47.709 UTC [common.channelconfig] NewStandardValues -> DEBU 6c9 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:47.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6ca Processing field: AnchorPeers" -"2019-05-02 01:30:47.710 UTC [common.channelconfig] NewStandardValues -> DEBU 6cb Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6cc Processing field: MSP" -"2019-05-02 01:30:47.710 UTC [common.channelconfig] Validate -> DEBU 6cd Anchor peers for org Org1MSP are anchor_peers: " -"2019-05-02 01:30:47.710 UTC [common.channelconfig] validateMSP -> DEBU 6ce Setting up MSP for org Org1MSP" -"2019-05-02 01:30:47.710 UTC [msp] newBccspMsp -> DEBU 6cf Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.710 UTC [msp] New -> DEBU 6d0 Creating Cache-MSP instance" -"2019-05-02 01:30:47.711 UTC [msp] Setup -> DEBU 6d1 Setting up MSP instance Org1MSP" -"2019-05-02 01:30:47.712 UTC [msp.identity] newIdentity -> DEBU 6d2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.428 UTC [msp] Validate -> DEBU 50a MSP OrdererMSP validating identity" +"2019-05-02 09:27:22.428 UTC [msp] Setup -> DEBU 50b Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:22.428 UTC [msp] Setup -> DEBU 50c MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 50d Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 50e Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 50f Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:22.428 UTC [policies] NewManagerImpl -> DEBU 510 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 511 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 512 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 513 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 514 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 515 Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 516 Proposed new policy Readers for Channel/Application" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 517 Proposed new policy Writers for Channel/Application" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 518 Proposed new policy Admins for Channel/Application" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 519 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51d Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51e Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 51f Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 520 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 521 Proposed new policy Readers for Channel" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 522 Proposed new policy Writers for Channel" +"2019-05-02 09:27:22.429 UTC [policies] NewManagerImpl -> DEBU 523 Proposed new policy Admins for Channel" +"2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 524 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 525 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 526 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 527 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 528 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 529 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.429 UTC [common.configtx] addToMap -> DEBU 52a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52d Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 52f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 530 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 531 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 533 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 534 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 535 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 536 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 537 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 538 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 539 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53a Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 542 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:22.430 UTC [common.configtx] addToMap -> DEBU 543 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 544 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 545 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 546 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 547 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 548 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 549 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54a Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54b Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:22.431 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:22.431 UTC [common.channelconfig] LogSanityChecks -> DEBU 551 As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:27:22.431 UTC [common.channelconfig] LogSanityChecks -> DEBU 552 As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 553 Manager Channel looking up path [Application]" +"2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 554 Manager Channel has managers Application" +"2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 555 Manager Channel has managers Orderer" +"2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 556 Manager Channel/Application looking up path []" +"2019-05-02 09:27:22.431 UTC [policies] Manager -> DEBU 557 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 558 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:22.436 UTC [common.channelconfig] LogSanityChecks -> DEBU 559 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:27:22.436 UTC [common.channelconfig] LogSanityChecks -> DEBU 55a As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:27:22.436 UTC [common.channelconfig] LogSanityChecks -> DEBU 55b As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55c Manager Channel looking up path [Orderer]" +"2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55d Manager Channel has managers Application" +"2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55e Manager Channel has managers Orderer" +"2019-05-02 09:27:22.436 UTC [policies] Manager -> DEBU 55f Manager Channel/Orderer looking up path []" +"2019-05-02 09:27:22.437 UTC [policies] Manager -> DEBU 560 Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:27:22.437 UTC [common.channelconfig] LogSanityChecks -> DEBU 561 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:27:22.437 UTC [common.capabilities] Supported -> DEBU 562 Application capability V2_0 is supported and is enabled" +"2019-05-02 09:27:22.437 UTC [common.capabilities] Supported -> DEBU 563 Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:22.437 UTC [gossip.service] ProcessConfigUpdate -> DEBU 564 Processing new config for channel businesschannel" +"2019-05-02 09:27:22.437 UTC [gossip.service] ProcessConfigUpdate -> DEBU 565 Calling out because config was updated for channel businesschannel" +"2019-05-02 09:27:22.437 UTC [gossip.service] updateAnchors -> DEBU 566 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-05-02 09:27:22.437 UTC [gossip.service] updateAnchors -> DEBU 567 Org2MSP anchor peers: []" +"2019-05-02 09:27:22.437 UTC [gossip.service] updateAnchors -> DEBU 568 Creating state provider for chainID businesschannel" +"2019-05-02 09:27:22.437 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 569 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.437 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56a Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.437 UTC [policies] Evaluate -> DEBU 56b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:22.437 UTC [policies] Evaluate -> DEBU 56c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.437 UTC [policies] Evaluate -> DEBU 56d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:22.437 UTC [cauthdsl] func1 -> DEBU 56e 0xc00317e000 gate 1556789242437610900 evaluation starts" +"2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 56f 0xc00317e000 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 570 0xc00317e000 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 571 0xc00317e000 principal matched by identity 0" +"2019-05-02 09:27:22.437 UTC [msp.identity] Verify -> DEBU 572 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h| +00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y DEBU 573 Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....| +00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b| +00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..| +00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.| +00000040 89 bc 81 84 80 a7 |......|" +"2019-05-02 09:27:22.437 UTC [cauthdsl] func2 -> DEBU 574 0xc00317e000 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.438 UTC [cauthdsl] func1 -> DEBU 575 0xc00317e000 gate 1556789242437610900 evaluation succeeds" +"2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 576 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 577 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 578 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:22.438 UTC [policies] Evaluate -> DEBU 579 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:22.438 UTC [gossip.gossip] JoinChan -> INFO 57a Joining gossip network of channel businesschannel with 2 organizations" +"2019-05-02 09:27:22.438 UTC [gossip.gossip] learnAnchorPeers -> INFO 57b Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-05-02 09:27:22.438 UTC [gossip.gossip] learnAnchorPeers -> INFO 57c Anchor peer with same endpoint, skipping connecting to myself" +"2019-05-02 09:27:22.438 UTC [gossip.gossip] learnAnchorPeers -> INFO 57d No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-05-02 09:27:22.438 UTC [gossip.service] updateEndpoints -> DEBU 57e Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-05-02 09:27:22.438 UTC [peer] updateTrustedRoots -> DEBU 57f Updating trusted root authorities for channel businesschannel" +"2019-05-02 09:27:22.461 UTC [peer] buildTrustedRootsForChain -> DEBU 580 updating root CAs for channel [businesschannel]" +"2019-05-02 09:27:22.462 UTC [peer] buildTrustedRootsForChain -> DEBU 581 adding app root CAs for MSP [Org1MSP]" +"2019-05-02 09:27:22.462 UTC [peer] buildTrustedRootsForChain -> DEBU 582 adding app root CAs for MSP [Org2MSP]" +"2019-05-02 09:27:22.462 UTC [peer] buildTrustedRootsForChain -> DEBU 583 adding orderer root CAs for MSP [OrdererMSP]" +"2019-05-02 09:27:22.463 UTC [committer.txvalidator] validateTx -> DEBU 584 config transaction received for chain businesschannel" +"2019-05-02 09:27:22.466 UTC [committer.txvalidator] Validate -> DEBU 585 got result for idx 0, code 0" +"2019-05-02 09:27:22.468 UTC [committer.txvalidator] Validate -> INFO 586 [businesschannel] Validated block [1] in 107ms" +"2019-05-02 09:27:22.469 UTC [gossip.privdata] listMissingPrivateData -> DEBU 587 Retrieving private write sets for 0 transactions from transient store" +"2019-05-02 09:27:22.469 UTC [gossip.privdata] StoreBlock -> DEBU 588 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-05-02 09:27:22.469 UTC [committer] preCommit -> DEBU 589 Received configuration update, calling CSCC ConfigUpdate" +"2019-05-02 09:27:22.470 UTC [kvledger] CommitWithPvtData -> DEBU 58b [businesschannel] Validating state for block [1]" +"2019-05-02 09:27:22.471 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58c Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:27:22.465 UTC [committer.txvalidator] validateTx -> DEBU 58a [businesschannel] validateTx completes for block 0xc002e28c00 env 0xc002ef2af0 txn 0" +"2019-05-02 09:27:22.471 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58d lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-05-02 09:27:22.472 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58e Validating new block with num trans = [1]" +"2019-05-02 09:27:22.472 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 58f ValidateAndPrepareBatch() for block number = [1]" +"2019-05-02 09:27:22.473 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 590 preprocessing ProtoBlock..." +"2019-05-02 09:27:22.473 UTC [valimpl] preprocessProtoBlock -> DEBU 591 txType=CONFIG" +"2019-05-02 09:27:22.473 UTC [valimpl] processNonEndorserTx -> DEBU 592 Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-05-02 09:27:22.474 UTC [valimpl] processNonEndorserTx -> DEBU 593 Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-05-02 09:27:22.474 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 594 constructing new tx simulator" +"2019-05-02 09:27:22.479 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 596 constructing new tx simulator txid = []" +"2019-05-02 09:27:22.480 UTC [peer] GenerateSimulationResults -> DEBU 597 Processing CONFIG" +"2019-05-02 09:27:22.479 UTC [comm.grpc.server] 1 -> INFO 595 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.478Z grpc.peer_address=172.18.0.6:53220 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=144.5µs +"2019-05-02 09:27:22.484 UTC [peer] processChannelConfigTx -> DEBU 598 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-05-02 09:27:22.485 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 599 Simulation completed, getting simulation results" +"2019-05-02 09:27:22.486 UTC [lockbasedtxmgr] Done -> DEBU 59a Done with transaction simulation / query execution []" +"2019-05-02 09:27:22.498 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 59c Block [1] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +"2019-05-02 09:27:22.499 UTC [valinternal] ApplyWriteSet -> DEBU 59d txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0030e3940)}" +"2019-05-02 09:27:22.498 UTC [msp.identity] Sign -> DEBU 59b Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:22.499 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59e validating rwset..." +"2019-05-02 09:27:22.500 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5a0 postprocessing ProtoBlock..." +"2019-05-02 09:27:22.500 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5a1 ValidateAndPrepareBatch() complete" +"2019-05-02 09:27:22.501 UTC [kvledger] CommitWithPvtData -> DEBU 5a2 [businesschannel] Committing block [1] to storage" +"2019-05-02 09:27:22.500 UTC [msp.identity] Sign -> DEBU 59f Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:22.501 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5a3 Writing block [1] to pvt block store" +"2019-05-02 09:27:22.502 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5a4 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53220" +"2019-05-02 09:27:22.505 UTC [pvtdatastorage] Prepare -> DEBU 5a5 Saved 0 private data write sets for block [1]" +"2019-05-02 09:27:22.508 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5a6 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53220" +"2019-05-02 09:27:22.509 UTC [msp.identity] Verify -> DEBU 5a7 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-05-02 09:27:22.510 UTC [fsblkstorage] indexBlock -> DEBU 5a8 Indexing block [blockNum=1, blockHash=[]byte{0x3d, 0xc8, 0x17, 0xef, 0x7d, 0xc5, 0xdd, 0xc, 0x94, 0x3f, 0xe9, 0xfc, 0x37, 0xb1, 0xef, 0xbb, 0xc6, 0x3e, 0x6a, 0xed, 0x5c, 0x37, 0xe9, 0x5f, 0x75, 0xea, 0xfa, 0x1d, 0xbf, 0x69, 0x5, 0x4a} txOffsets= +txId= locPointer=offset=71, bytesLength=22679 +]" +"2019-05-02 09:27:22.514 UTC [fsblkstorage] indexBlock -> DEBU 5aa txid [] is a duplicate of a previous tx. Not indexing in txid-index" +"2019-05-02 09:27:22.514 UTC [fsblkstorage] indexBlock -> DEBU 5ab Adding txLoc [fileSuffixNum=0, offset=24010, bytesLength=22679] for tx number:[0] ID: [] to blockNumTranNum index" +"2019-05-02 09:27:22.515 UTC [msp.identity] Verify -> DEBU 5ac Verify: sig = 00000000 30 44 02 20 6a 2f b1 fd 86 2d 6e f1 4f d9 e2 09 |0D. j/...-n.O...| +00000010 ac 77 7b be 04 18 8d bd 5d b7 26 b7 e4 80 63 7a |.w{.....].&...cz| +00000020 10 83 3d 19 02 20 4d 28 09 f2 b5 79 24 95 e1 e8 |..=.. M(...y$...| +00000030 7b 20 a8 e1 bc 49 f4 98 96 7c 1a e7 a7 9e 69 09 |{ ...I...|....i.| +00000040 d6 37 43 cd 2b 6e |.7C.+n|" +"2019-05-02 09:27:22.518 UTC [fsblkstorage] updateCheckpoint -> DEBU 5ad Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47626], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-05-02 09:27:22.518 UTC [pvtdatastorage] Commit -> DEBU 5ae Committing private data for block [1]" +"2019-05-02 09:27:22.519 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5af Authenticated 172.18.0.6:53220" +"2019-05-02 09:27:22.520 UTC [gossip.comm] GossipStream -> DEBU 5b0 Servicing 172.18.0.6:53220" +"2019-05-02 09:27:22.521 UTC [gossip.comm] readFromStream -> DEBU 5b1 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:22.521 UTC [gossip.comm] func2 -> DEBU 5b2 Client 172.18.0.6:53220 disconnected" +"2019-05-02 09:27:22.521 UTC [comm.grpc.server] 1 -> INFO 5b3 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.497Z grpc.peer_address=172.18.0.6:53220 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.0959ms +"2019-05-02 09:27:22.522 UTC [gossip.comm] writeToStream -> DEBU 5b4 Closing writing to stream" +"2019-05-02 09:27:22.514 UTC [grpc] infof -> DEBU 5a9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:22.523 UTC [pvtdatastorage] Commit -> DEBU 5b5 Committed private data for block [1]" +"2019-05-02 09:27:22.523 UTC [kvledger] CommitWithPvtData -> DEBU 5b6 [businesschannel] Committing block [1] transactions to state database" +"2019-05-02 09:27:22.523 UTC [lockbasedtxmgr] Commit -> DEBU 5b7 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-05-02 09:27:22.523 UTC [lockbasedtxmgr] Commit -> DEBU 5b8 Committing updates to state database" +"2019-05-02 09:27:22.523 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5b9 Building the expiry schedules based on the update batch" +"2019-05-02 09:27:22.523 UTC [lockbasedtxmgr] Commit -> DEBU 5ba Write lock acquired for committing updates to state database" +"2019-05-02 09:27:22.523 UTC [stateleveldb] ApplyUpdates -> DEBU 5bb Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-05-02 09:27:22.527 UTC [lockbasedtxmgr] Commit -> DEBU 5bc Updates committed to state database and the write lock is released" +"2019-05-02 09:27:22.527 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5bd Preparing potential purge list working-set for expiringAtBlk [2]" +"2019-05-02 09:27:22.527 UTC [lockbasedtxmgr] func1 -> DEBU 5be launched the background routine for preparing keys to purge with the next block" +"2019-05-02 09:27:22.527 UTC [kvledger] CommitWithPvtData -> DEBU 5bf [businesschannel] Committing block [1] transactions to history database" +"2019-05-02 09:27:22.528 UTC [historyleveldb] Commit -> DEBU 5c0 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" +"2019-05-02 09:27:22.528 UTC [historyleveldb] Commit -> DEBU 5c1 Skipping transaction [0] since it is not an endorsement transaction" +"2019-05-02 09:27:22.527 UTC [leveldbhelper] GetIterator -> DEBU 5c2 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" +"2019-05-02 09:27:22.529 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5c3 No expiry entry found for expiringAtBlk [2]" +"2019-05-02 09:27:22.533 UTC [historyleveldb] Commit -> DEBU 5c4 Channel [businesschannel]: Updates committed to history database for blockNo [1]" +"2019-05-02 09:27:22.533 UTC [kvledger] CommitWithPvtData -> INFO 5c5 [businesschannel] Committed block [1] with 1 transaction(s) in 62ms (state_validation=30ms block_commit=22ms state_commit=4ms)" +"2019-05-02 09:27:22.533 UTC [msp.identity] Sign -> DEBU 5c6 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020802 " +"2019-05-02 09:27:22.533 UTC [msp.identity] Sign -> DEBU 5c7 Sign: digest: AAE95B93C2C6B23F762A87C4C48D3503B8487313D8F657F7F2C6091DFBA174C6 " +"2019-05-02 09:27:22.534 UTC [gossip.state] commitBlock -> DEBU 5c8 [businesschannel] Committed block [1] with 1 transaction(s)" +"2019-05-02 09:27:22.534 UTC [gossip.state] deliverPayloads -> DEBU 5c9 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" +"2019-05-02 09:27:22.534 UTC [gossip.privdata] StoreBlock -> INFO 5ca [businesschannel] Received block [2] from buffer" +"2019-05-02 09:27:22.534 UTC [gossip.privdata] StoreBlock -> DEBU 5cb [businesschannel] Validating block [2]" +"2019-05-02 09:27:22.534 UTC [committer.txvalidator] Validate -> DEBU 5cc [businesschannel] START Block Validation for block [2]" +"2019-05-02 09:27:22.534 UTC [committer.txvalidator] Validate -> DEBU 5cd expecting 1 block validation responses" +"2019-05-02 09:27:22.534 UTC [committer.txvalidator] validateTx -> DEBU 5ce [businesschannel] validateTx starts for block 0xc0030e3d40 env 0xc0032a2e10 txn 0" +"2019-05-02 09:27:22.535 UTC [protoutils] ValidateTransaction -> DEBU 5cf ValidateTransactionEnvelope starts for envelope 0xc0032a2e10" +"2019-05-02 09:27:22.535 UTC [protoutils] ValidateTransaction -> DEBU 5d0 Header is channel_header:"\010\001\032\006\010\371\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030i\205}\0100\335\357\252\362O\251\262 \234\345\000:\254\0339n\311\010\373" " +"2019-05-02 09:27:22.535 UTC [protoutils] validateChannelHeader -> DEBU 5d1 validateChannelHeader info: header type 1" +"2019-05-02 09:27:22.535 UTC [protoutils] checkSignatureFromCreator -> DEBU 5d2 begin" +"2019-05-02 09:27:22.535 UTC [msp] GetManagerForChain -> DEBU 5d3 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:22.536 UTC [msp] DeserializeIdentity -> DEBU 5d4 Obtaining identity" +"2019-05-02 09:27:22.536 UTC [msp.identity] newIdentity -> DEBU 5d5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-05-02 09:27:22.537 UTC [protoutils] checkSignatureFromCreator -> DEBU 5d6 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-05-02 09:27:22.537 UTC [msp] Validate -> DEBU 5d7 MSP OrdererMSP validating identity" +"2019-05-02 09:27:22.537 UTC [protoutils] checkSignatureFromCreator -> DEBU 5d8 creator is valid" +"2019-05-02 09:27:22.537 UTC [msp.identity] Verify -> DEBU 5d9 Verify: digest = 00000000 28 be 1e af ac 51 ab 90 a5 a6 6d 74 57 c1 0e d8 |(....Q....mtW...| +00000010 71 9a 11 dc 49 20 a7 1d e7 40 5f 6d cc 0e a5 68 |q...I ...@_m...h|" +"2019-05-02 09:27:22.537 UTC [msp.identity] Verify -> DEBU 5da Verify: sig = 00000000 30 44 02 20 3e bf 95 0c a9 21 62 de ef 7e a5 ef |0D. >....!b..~..| +00000010 63 5c 98 e1 bd c7 36 04 00 18 3d 1d 07 ee 99 4e |c\....6...=....N| +00000020 ce 31 f7 f9 02 20 6e 36 96 aa ea c8 84 49 93 f8 |.1... n6.....I..| +00000030 ee bb 98 2d 71 5e af d9 92 ee 7a 05 0c 7d 37 8b |...-q^....z..}7.| +00000040 69 13 32 1f 05 3e |i.2..>|" +"2019-05-02 09:27:22.538 UTC [protoutils] checkSignatureFromCreator -> DEBU 5db exits successfully" +"2019-05-02 09:27:22.538 UTC [protoutils] validateConfigTransaction -> DEBU 5dc validateConfigTransaction starts for data 0xc003324000, header channel_header:"\010\001\032\006\010\371\357\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030i\205}\0100\335\357\252\362O\251\262 \234\345\000:\254\0339n\311\010\373" " +"2019-05-02 09:27:22.539 UTC [committer.txvalidator] validateTx -> DEBU 5dd Transaction is for channel businesschannel" +"2019-05-02 09:27:22.540 UTC [comm.grpc.server] 1 -> INFO 5de unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.539Z grpc.peer_address=172.18.0.6:53224 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=137.1µs +"2019-05-02 09:27:22.539 UTC [common.configtx] addToMap -> DEBU 5df Adding to config map: [Group] /Channel" +"2019-05-02 09:27:22.540 UTC [common.configtx] addToMap -> DEBU 5e0 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:22.540 UTC [common.configtx] addToMap -> DEBU 5e1 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:22.540 UTC [common.configtx] addToMap -> DEBU 5e2 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:22.541 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:22.542 UTC [msp.identity] Sign -> DEBU 5ea Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:22.543 UTC [msp.identity] Sign -> DEBU 5eb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:22.543 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ec Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:53224" +"2019-05-02 09:27:22.544 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ed Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53224" +"2019-05-02 09:27:22.544 UTC [msp.identity] Verify -> DEBU 5ee Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-05-02 09:27:22.545 UTC [msp.identity] Verify -> DEBU 5ef Verify: sig = 00000000 30 45 02 21 00 97 35 d5 cf 34 fa e6 3a 73 bf c5 |0E.!..5..4..:s..| +00000010 db 67 96 6f f8 83 09 ca 90 e4 fb f3 51 bd 4e f2 |.g.o........Q.N.| +00000020 ef 5a 18 e4 5e 02 20 63 8f 02 15 e2 48 e3 94 39 |.Z..^. c....H..9| +00000030 88 b3 43 15 b5 3d 56 ce b8 64 df 14 24 d7 2a 46 |..C..=V..d..$.*F| +00000040 0a ba a5 ee ef 51 1b |.....Q.|" +"2019-05-02 09:27:22.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5f0 Authenticated 172.18.0.6:53224" +"2019-05-02 09:27:22.545 UTC [gossip.comm] GossipStream -> DEBU 5f1 Servicing 172.18.0.6:53224" +"2019-05-02 09:27:22.545 UTC [gossip.gossip] handleMessage -> DEBU 5f2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.545 UTC [gossip.gossip] handleMessage -> DEBU 5f3 Exiting" +"2019-05-02 09:27:22.545 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f4 Got message: GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.546 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:27:22.546 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5f6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:22.546 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:22.546 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:22.546 UTC [msp.identity] Verify -> DEBU 5f9 Verify: digest = 00000000 37 72 e6 74 46 b4 11 7d 5e a5 ea 1b 6d 00 8a c8 |7r.tF..}^...m...| +00000010 83 ff 07 59 44 a2 84 8c 23 81 7c 6e 6f a0 c5 82 |...YD...#.|no...|" +"2019-05-02 09:27:22.547 UTC [msp.identity] Verify -> DEBU 5fb Verify: sig = 00000000 30 45 02 21 00 a2 4e 55 7b b6 c4 b6 75 ed b1 4f |0E.!..NU{...u..O| +00000010 8c c7 7a 40 4b d5 5b bd 36 c1 64 78 b0 73 07 91 |..z@K.[.6.dx.s..| +00000020 e5 ba d6 e3 c5 02 20 4a 8b e3 63 85 4d c7 68 4c |...... J..c.M.hL| +00000030 c1 08 75 c9 ec fb 0a 07 f7 57 f9 62 5f 42 1f 63 |..u......W.b_B.c| +00000040 45 46 49 2c b2 92 d4 |EFI,...|" +"2019-05-02 09:27:22.547 UTC [msp.identity] Verify -> DEBU 5fc Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:27:22.547 UTC [msp.identity] Verify -> DEBU 5fd Verify: sig = 00000000 30 44 02 20 3d 9c 91 b3 48 ee 0a 55 9c 03 f2 f3 |0D. =...H..U....| +00000010 60 93 76 94 d5 c5 bc c6 0a 5c ca ce 16 66 eb d8 |`.v......\...f..| +00000020 8a 17 73 73 02 20 6b b6 ff e4 d3 99 80 3f a7 c9 |..ss. k......?..| +00000030 cf a6 b2 0c de 4d 7a f7 ae 8d 3b 7a c1 85 ad 3f |.....Mz...;z...?| +00000040 da 33 90 96 41 41 |.3..AA|" +"2019-05-02 09:27:22.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 5fe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:22.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ff Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:27:22.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 600 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 " +"2019-05-02 09:27:22.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 601 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 " +"2019-05-02 09:27:22.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 602 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:22.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 603 Exiting" +"2019-05-02 09:27:22.549 UTC [gossip.discovery] handleAliveMessage -> DEBU 604 Exiting" +"2019-05-02 09:27:22.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 605 Exiting" +"2019-05-02 09:27:22.549 UTC [gossip.discovery] sendMemResponse -> DEBU 606 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:22.549 UTC [gossip.comm] Send -> DEBU 607 Entering, sending GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:22.549 UTC [gossip.discovery] sendMemResponse -> DEBU 608 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:22.549 UTC [gossip.comm] sendToEndpoint -> DEBU 609 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6406107167240103207, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.549 UTC [gossip.comm] sendToEndpoint -> DEBU 60a Exiting" +"2019-05-02 09:27:22.547 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:22.550 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:22.550 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.550 UTC [common.configtx] verifyDeltaSet -> DEBU 60d Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:22.550 UTC [common.configtx] policyForItem -> DEBU 60e Getting policy for item Org2MSP with mod_policy Admins" +"2019-05-02 09:27:22.550 UTC [policies] Manager -> DEBU 60f Manager Channel looking up path [Application]" +"2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 610 Manager Channel has managers Orderer" +"2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 611 Manager Channel has managers Application" +"2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 612 Manager Channel/Application looking up path []" +"2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 613 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 614 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 615 Manager Channel/Application looking up path [Org2MSP]" +"2019-05-02 09:27:22.551 UTC [policies] Manager -> DEBU 616 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:22.552 UTC [policies] Manager -> DEBU 617 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:22.552 UTC [policies] Manager -> DEBU 618 Manager Channel/Application/Org2MSP looking up path []" +"2019-05-02 09:27:22.552 UTC [policies] Evaluate -> DEBU 619 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-05-02 09:27:22.552 UTC [msp] DeserializeIdentity -> DEBU 61a Obtaining identity" +"2019-05-02 09:27:22.554 UTC [msp.identity] newIdentity -> DEBU 61b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:22.554 UTC [cauthdsl] func1 -> DEBU 61c 0xc003390d80 gate 1556789242554648600 evaluation starts" +"2019-05-02 09:27:22.554 UTC [cauthdsl] func2 -> DEBU 61d 0xc003390d80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.554 UTC [cauthdsl] func2 -> DEBU 61e 0xc003390d80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.555 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 61f Checking if identity satisfies ADMIN role for Org2MSP" +"2019-05-02 09:27:22.555 UTC [cauthdsl] func2 -> DEBU 620 0xc003390d80 principal matched by identity 0" +"2019-05-02 09:27:22.555 UTC [msp.identity] Verify -> DEBU 621 Verify: digest = 00000000 30 66 a6 63 f0 f2 5c 8b cc 30 97 57 cc 96 e6 ed |0f.c..\..0.W....| +00000010 ee 9d 29 cb 9e b5 de 97 29 52 7a 5e 61 16 79 e8 |..).....)Rz^a.y.|" +"2019-05-02 09:27:22.555 UTC [msp.identity] Verify -> DEBU 622 Verify: sig = 00000000 30 45 02 21 00 a7 41 a5 d2 f7 c5 ff ec 5e 7f 6c |0E.!..A......^.l| +00000010 71 c9 ae 59 aa ec 85 dd 94 0c 54 cf 58 8b 8e 8c |q..Y......T.X...| +00000020 3a b9 3d 56 43 02 20 01 e7 16 fb f9 76 cf ae de |:.=VC. .....v...| +00000030 49 88 9b 17 52 e6 8f c3 fa dc 64 50 b3 87 99 97 |I...R.....dP....| +00000040 11 08 49 2b 8c 95 fc |..I+...|" +"2019-05-02 09:27:22.556 UTC [cauthdsl] func2 -> DEBU 623 0xc003390d80 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.556 UTC [cauthdsl] func1 -> DEBU 624 0xc003390d80 gate 1556789242554648600 evaluation succeeds" +"2019-05-02 09:27:22.556 UTC [policies] Evaluate -> DEBU 625 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:22.556 UTC [policies] Evaluate -> DEBU 626 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:22.556 UTC [common.configtx] verifyDeltaSet -> DEBU 627 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 628 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 629 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62c Setting policy for key Admins to " +"2019-05-02 09:27:22.557 UTC [common.configtx] recurseConfigMap -> DEBU 62d Setting policy for key Endorsement to " +"2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 62e Setting policy for key Readers to " +"2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 62f Setting policy for key Writers to " +"2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 630 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 631 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.558 UTC [common.configtx] recurseConfigMap -> DEBU 632 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 633 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 634 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 635 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.559 UTC [common.configtx] recurseConfigMap -> DEBU 636 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 637 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 638 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 639 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 63a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.560 UTC [common.configtx] recurseConfigMap -> DEBU 63b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.561 UTC [common.configtx] recurseConfigMap -> DEBU 63c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.561 UTC [common.configtx] recurseConfigMap -> DEBU 63d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.561 UTC [common.configtx] recurseConfigMap -> DEBU 63e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:27:22.561 UTC [common.channelconfig] NewStandardValues -> DEBU 63f Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:27:22.561 UTC [common.channelconfig] initializeProtosStruct -> DEBU 640 Processing field: HashingAlgorithm" +"2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 641 Processing field: BlockDataHashingStructure" +"2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 642 Processing field: OrdererAddresses" +"2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 643 Processing field: Consortium" +"2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 644 Processing field: Capabilities" +"2019-05-02 09:27:22.562 UTC [common.channelconfig] NewStandardValues -> DEBU 645 Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:27:22.562 UTC [common.channelconfig] initializeProtosStruct -> DEBU 646 Processing field: ACLs" +"2019-05-02 09:27:22.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 647 Processing field: Capabilities" +"2019-05-02 09:27:22.563 UTC [common.channelconfig] NewStandardValues -> DEBU 648 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:22.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 649 Processing field: AnchorPeers" +"2019-05-02 09:27:22.563 UTC [common.channelconfig] NewStandardValues -> DEBU 64a Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:22.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64b Processing field: MSP" +"2019-05-02 09:27:22.563 UTC [common.channelconfig] Validate -> DEBU 64c Anchor peers for org Org1MSP are anchor_peers: " +"2019-05-02 09:27:22.563 UTC [common.channelconfig] validateMSP -> DEBU 64d Setting up MSP for org Org1MSP" +"2019-05-02 09:27:22.563 UTC [msp] newBccspMsp -> DEBU 64e Creating BCCSP-based MSP instance" +"2019-05-02 09:27:22.564 UTC [msp] New -> DEBU 64f Creating Cache-MSP instance" +"2019-05-02 09:27:22.564 UTC [msp] Setup -> DEBU 650 Setting up MSP instance Org1MSP" +"2019-05-02 09:27:22.564 UTC [msp.identity] newIdentity -> DEBU 651 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3078,7 +2888,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:30:47.713 UTC [msp.identity] newIdentity -> DEBU 6d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.565 UTC [msp.identity] newIdentity -> DEBU 652 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3092,22 +2902,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.714 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6d4 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:30:47.714 UTC [msp] Validate -> DEBU 6d5 MSP Org1MSP validating identity" -"2019-05-02 01:30:47.718 UTC [msp] getCertificationChain -> DEBU 6d6 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:47.718 UTC [msp] hasOURole -> DEBU 6d7 MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:30:47.718 UTC [msp] getCertificationChain -> DEBU 6d8 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:47.721 UTC [common.channelconfig] NewStandardValues -> DEBU 6d9 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:30:47.722 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6db Processing field: AnchorPeers" -"2019-05-02 01:30:47.722 UTC [common.channelconfig] NewStandardValues -> DEBU 6dc Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:30:47.722 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6dd Processing field: MSP" -"2019-05-02 01:30:47.723 UTC [common.channelconfig] Validate -> DEBU 6de Anchor peers for org Org2MSP are anchor_peers: " -"2019-05-02 01:30:47.723 UTC [common.channelconfig] validateMSP -> DEBU 6df Setting up MSP for org Org2MSP" -"2019-05-02 01:30:47.723 UTC [msp] newBccspMsp -> DEBU 6e0 Creating BCCSP-based MSP instance" -"2019-05-02 01:30:47.723 UTC [msp] New -> DEBU 6e1 Creating Cache-MSP instance" -"2019-05-02 01:30:47.723 UTC [msp] Setup -> DEBU 6e2 Setting up MSP instance Org2MSP" -"2019-05-02 01:30:47.722 UTC [msp.identity] Sign -> DEBU 6da Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.725 UTC [msp.identity] newIdentity -> DEBU 6e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.566 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 653 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:27:22.566 UTC [msp] Validate -> DEBU 654 MSP Org1MSP validating identity" +"2019-05-02 09:27:22.566 UTC [msp] getCertificationChain -> DEBU 655 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:22.566 UTC [msp] hasOURole -> DEBU 656 MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:27:22.567 UTC [msp] getCertificationChain -> DEBU 657 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:22.567 UTC [common.channelconfig] NewStandardValues -> DEBU 658 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:27:22.567 UTC [common.channelconfig] initializeProtosStruct -> DEBU 659 Processing field: AnchorPeers" +"2019-05-02 09:27:22.567 UTC [common.channelconfig] NewStandardValues -> DEBU 65a Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:22.567 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65b Processing field: MSP" +"2019-05-02 09:27:22.568 UTC [common.channelconfig] Validate -> DEBU 65c Anchor peers for org Org2MSP are anchor_peers: " +"2019-05-02 09:27:22.568 UTC [common.channelconfig] validateMSP -> DEBU 65d Setting up MSP for org Org2MSP" +"2019-05-02 09:27:22.568 UTC [msp] newBccspMsp -> DEBU 65e Creating BCCSP-based MSP instance" +"2019-05-02 09:27:22.568 UTC [msp] New -> DEBU 65f Creating Cache-MSP instance" +"2019-05-02 09:27:22.568 UTC [msp] Setup -> DEBU 660 Setting up MSP instance Org2MSP" +"2019-05-02 09:27:22.568 UTC [msp.identity] newIdentity -> DEBU 661 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3122,7 +2931,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.728 UTC [msp.identity] newIdentity -> DEBU 6e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.569 UTC [msp.identity] newIdentity -> DEBU 662 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -3136,261 +2945,156 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.729 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6e5 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:30:47.729 UTC [msp] Validate -> DEBU 6e6 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.730 UTC [msp] getCertificationChain -> DEBU 6e7 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.730 UTC [msp] hasOURole -> DEBU 6e8 MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:30:47.731 UTC [msp] getCertificationChain -> DEBU 6e9 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.731 UTC [msp] Setup -> DEBU 6ea Setting up the MSP manager (3 msps)" -"2019-05-02 01:30:47.732 UTC [msp] Setup -> DEBU 6eb MSP manager setup complete, setup 3 msps" -"2019-05-02 01:30:47.732 UTC [policies] NewManagerImpl -> DEBU 6ec Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.733 UTC [policies] NewManagerImpl -> DEBU 6ed Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.733 UTC [policies] NewManagerImpl -> DEBU 6ee Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.734 UTC [policies] NewManagerImpl -> DEBU 6ef Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:30:47.734 UTC [policies] NewManagerImpl -> DEBU 6f0 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:30:47.734 UTC [policies] NewManagerImpl -> DEBU 6f1 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:30:47.734 UTC [policies] NewManagerImpl -> DEBU 6f2 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:30:47.735 UTC [policies] NewManagerImpl -> DEBU 6f3 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.735 UTC [policies] NewManagerImpl -> DEBU 6f4 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.736 UTC [policies] NewManagerImpl -> DEBU 6f5 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.736 UTC [policies] NewManagerImpl -> DEBU 6f6 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:30:47.737 UTC [policies] NewManagerImpl -> DEBU 6f7 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.737 UTC [policies] NewManagerImpl -> DEBU 6f8 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.738 UTC [policies] NewManagerImpl -> DEBU 6f9 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.738 UTC [policies] NewManagerImpl -> DEBU 6fa Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:30:47.724 UTC [msp.identity] Sign -> DEBU 6fb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.738 UTC [policies] NewManagerImpl -> DEBU 6fc Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:30:47.740 UTC [policies] NewManagerImpl -> DEBU 6fd Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:30:47.740 UTC [policies] NewManagerImpl -> DEBU 6ff Proposed new policy Readers for Channel/Application" -"2019-05-02 01:30:47.750 UTC [comm.grpc.server] 1 -> INFO 700 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.749Z grpc.peer_address=192.168.240.6:44962 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=169.4µs -"2019-05-02 01:30:47.741 UTC [policies] NewManagerImpl -> DEBU 701 Proposed new policy Writers for Channel/Application" -"2019-05-02 01:30:47.755 UTC [policies] NewManagerImpl -> DEBU 702 Proposed new policy Admins for Channel/Application" -"2019-05-02 01:30:47.759 UTC [policies] NewManagerImpl -> DEBU 703 Proposed new policy Readers for Channel" -"2019-05-02 01:30:47.759 UTC [policies] NewManagerImpl -> DEBU 704 Proposed new policy Writers for Channel" -"2019-05-02 01:30:47.759 UTC [policies] NewManagerImpl -> DEBU 705 Proposed new policy Admins for Channel" -"2019-05-02 01:30:47.739 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6fe Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:55182" -"2019-05-02 01:30:47.760 UTC [gossip.comm] authenticateRemotePeer -> DEBU 706 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:55182" -"2019-05-02 01:30:47.761 UTC [msp] DeserializeIdentity -> DEBU 707 Obtaining identity" -"2019-05-02 01:30:47.762 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.762 UTC [msp] DeserializeIdentity -> DEBU 709 Obtaining identity" -"2019-05-02 01:30:47.764 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.764 UTC [msp] DeserializeIdentity -> DEBU 70b Obtaining identity" -"2019-05-02 01:30:47.770 UTC [common.configtx] addToMap -> DEBU 70c Adding to config map: [Group] /Channel" -"2019-05-02 01:30:47.780 UTC [common.configtx] addToMap -> DEBU 70e Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:30:47.782 UTC [comm.grpc.server] 1 -> INFO 70f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.781Z grpc.peer_address=192.168.240.8:38802 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=167.6µs -"2019-05-02 01:30:47.782 UTC [common.configtx] addToMap -> DEBU 710 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:30:47.783 UTC [common.configtx] addToMap -> DEBU 711 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:30:47.783 UTC [common.configtx] addToMap -> DEBU 712 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:30:47.783 UTC [common.configtx] addToMap -> DEBU 713 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:47.783 UTC [common.configtx] addToMap -> DEBU 714 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:30:47.785 UTC [common.configtx] addToMap -> DEBU 715 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:30:47.785 UTC [common.configtx] addToMap -> DEBU 716 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:30:47.786 UTC [common.configtx] addToMap -> DEBU 717 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:30:47.786 UTC [common.configtx] addToMap -> DEBU 718 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:30:47.787 UTC [gossip.gossip] handleMessage -> DEBU 71a Entering, 192.168.240.5:55180 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.787 UTC [gossip.gossip] handleMessage -> DEBU 71b Exiting" -"2019-05-02 01:30:47.786 UTC [common.configtx] addToMap -> DEBU 719 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:30:47.787 UTC [common.configtx] addToMap -> DEBU 71c Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:30:47.787 UTC [common.configtx] addToMap -> DEBU 71d Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:30:47.787 UTC [common.configtx] addToMap -> DEBU 71e Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:30:47.787 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71f Got message: GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.787 UTC [common.configtx] addToMap -> DEBU 720 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:47.788 UTC [common.configtx] addToMap -> DEBU 721 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:30:47.789 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 722 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:47.788 UTC [common.configtx] addToMap -> DEBU 723 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:30:47.790 UTC [msp] DeserializeIdentity -> DEBU 724 Obtaining identity" -"2019-05-02 01:30:47.791 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 725 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.791 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 726 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.797 UTC [grpc] infof -> DEBU 728 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.791 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 727 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.798 UTC [policies] Evaluate -> DEBU 729 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.799 UTC [msp.identity] Sign -> DEBU 72a Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.799 UTC [msp.identity] Sign -> DEBU 72b Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.798 UTC [policies] Evaluate -> DEBU 72c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.799 UTC [policies] Evaluate -> DEBU 72d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.799 UTC [cauthdsl] func1 -> DEBU 72e 0xc00038f8a0 gate 1556760647799780200 evaluation starts" -"2019-05-02 01:30:47.799 UTC [cauthdsl] func2 -> DEBU 72f 0xc00038f8a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.800 UTC [gossip.comm] authenticateRemotePeer -> DEBU 730 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.8:38802" -"2019-05-02 01:30:47.800 UTC [cauthdsl] func2 -> DEBU 731 0xc00038f8a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.800 UTC [cauthdsl] func2 -> DEBU 732 0xc00038f8a0 principal matched by identity 0" -"2019-05-02 01:30:47.800 UTC [msp.identity] Verify -> DEBU 733 Verify: digest = 00000000 9c 5f 7e 58 f0 34 09 00 93 ae 5d 98 6e 54 8a 6e |._~X.4....].nT.n| -00000010 de ff f9 17 16 3d a3 41 76 58 1e ab 6a 7f 94 a6 |.....=.AvX..j...|" -"2019-05-02 01:30:47.800 UTC [msp.identity] Verify -> DEBU 734 Verify: sig = 00000000 30 44 02 20 41 09 0b c1 19 17 1a 22 88 8f 4c d7 |0D. A......"..L.| -00000010 37 48 5c a3 b2 27 57 d3 63 39 1d 05 c4 c1 87 1e |7H\..'W.c9......| -00000020 36 95 16 6f 02 20 60 5e cf 5a 46 d9 46 53 85 83 |6..o. `^.ZF.FS..| -00000030 91 8d 9b 85 c2 e3 e9 e7 7f 64 9e 91 c7 61 5e fe |.........d...a^.| -00000040 a3 3a 48 b5 bc 58 |.:H..X|" -"2019-05-02 01:30:47.801 UTC [gossip.comm] authenticateRemotePeer -> DEBU 735 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:38802" -"2019-05-02 01:30:47.801 UTC [msp] DeserializeIdentity -> DEBU 736 Obtaining identity" -"2019-05-02 01:30:47.801 UTC [msp] DeserializeIdentity -> DEBU 737 Obtaining identity" -"2019-05-02 01:30:47.802 UTC [msp.identity] Sign -> DEBU 738 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.802 UTC [msp.identity] Sign -> DEBU 739 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.802 UTC [gossip.comm] authenticateRemotePeer -> DEBU 73a Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.6:44962" -"2019-05-02 01:30:47.802 UTC [gossip.comm] authenticateRemotePeer -> DEBU 73b Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:44962" -"2019-05-02 01:30:47.803 UTC [msp.identity] Verify -> DEBU 73c Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-05-02 01:30:47.803 UTC [msp.identity] Verify -> DEBU 73d Verify: sig = 00000000 30 45 02 21 00 b8 61 dd b0 2e 79 7c 48 07 ce 5b |0E.!..a...y|H..[| -00000010 65 f9 d9 24 87 c9 5c 8f 13 63 2a e9 ab a0 e1 18 |e..$..\..c*.....| -00000020 b8 a4 9f 27 f8 02 20 2e 4e 3e 2a 34 fa 2e fe e7 |...'.. .N>*4....| -00000030 0c 30 9f d7 ea 64 52 3a 5a 98 6d 38 0f bc 84 84 |.0...dR:Z.m8....| -00000040 b9 36 f0 f1 63 a1 da |.6..c..|" -"2019-05-02 01:30:47.803 UTC [gossip.comm] authenticateRemotePeer -> DEBU 73e Authenticated 192.168.240.6:44962" -"2019-05-02 01:30:47.803 UTC [gossip.comm] GossipStream -> DEBU 73f Servicing 192.168.240.6:44962" -"2019-05-02 01:30:47.803 UTC [gossip.comm] serviceConnection -> DEBU 740 Closing reading from stream" -"2019-05-02 01:30:47.804 UTC [gossip.comm] writeToStream -> DEBU 741 Closing writing to stream" -"2019-05-02 01:30:47.773 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 742 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 743 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.804 UTC [policies] Evaluate -> DEBU 744 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.804 UTC [policies] Evaluate -> DEBU 745 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.804 UTC [policies] Evaluate -> DEBU 746 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.804 UTC [cauthdsl] func1 -> DEBU 747 0xc0003b1e90 gate 1556760647804862000 evaluation starts" -"2019-05-02 01:30:47.805 UTC [cauthdsl] func2 -> DEBU 748 0xc0003b1e90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.805 UTC [cauthdsl] func2 -> DEBU 749 0xc0003b1e90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.805 UTC [cauthdsl] func2 -> DEBU 74a 0xc0003b1e90 principal matched by identity 0" -"2019-05-02 01:30:47.805 UTC [msp.identity] Verify -> DEBU 74b Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-05-02 01:30:47.805 UTC [msp.identity] Verify -> DEBU 74c Verify: sig = 00000000 30 45 02 21 00 a2 44 13 2b 23 ad 6f 95 10 ff f5 |0E.!..D.+#.o....| -00000010 d8 cf 2a 0e 6c 5e ff b4 d4 7e a1 df ea 03 8d 5c |..*.l^...~.....\| -00000020 bb 02 97 4a be 02 20 02 77 8a 8c b1 0e 4a 41 bc |...J.. .w....JA.| -00000030 e6 d4 30 e4 2d 11 fa 53 a6 1f 53 2e 16 64 20 c3 |..0.-..S..S..d .| -00000040 16 26 3d f2 87 7f 49 |.&=...I|" -"2019-05-02 01:30:47.805 UTC [cauthdsl] func2 -> DEBU 74d 0xc0003b1e90 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.805 UTC [cauthdsl] func1 -> DEBU 74e 0xc0003b1e90 gate 1556760647804862000 evaluation succeeds" -"2019-05-02 01:30:47.805 UTC [policies] Evaluate -> DEBU 74f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.805 UTC [policies] Evaluate -> DEBU 750 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.805 UTC [policies] Evaluate -> DEBU 751 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.806 UTC [policies] Evaluate -> DEBU 752 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.806 UTC [gossip.comm] authenticateRemotePeer -> DEBU 753 Authenticated 192.168.240.5:55182" -"2019-05-02 01:30:47.806 UTC [gossip.comm] GossipStream -> DEBU 754 Servicing 192.168.240.5:55182" -"2019-05-02 01:30:47.807 UTC [gossip.comm] readFromStream -> DEBU 755 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -"2019-05-02 01:30:47.807 UTC [gossip.comm] writeToStream -> DEBU 756 Closing writing to stream" -"2019-05-02 01:30:47.807 UTC [gossip.comm] serviceConnection -> DEBU 757 Closing reading from stream" -"2019-05-02 01:30:47.808 UTC [gossip.comm] func2 -> DEBU 758 Client 192.168.240.5:55180 disconnected" -"2019-05-02 01:30:47.808 UTC [comm.grpc.server] 1 -> INFO 759 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.5:55180 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=246.1729ms -"2019-05-02 01:30:47.808 UTC [gossip.comm] serviceConnection -> DEBU 75a Closing reading from stream" -"2019-05-02 01:30:47.808 UTC [gossip.comm] func2 -> DEBU 75b Client 192.168.240.5:55182 disconnected" -"2019-05-02 01:30:47.808 UTC [comm.grpc.server] 1 -> INFO 75c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.721Z grpc.peer_address=192.168.240.5:55182 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=86.56ms -"2019-05-02 01:30:47.809 UTC [msp.identity] newIdentity -> DEBU 75d Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +"2019-05-02 09:27:22.570 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 663 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:27:22.570 UTC [msp] Validate -> DEBU 664 MSP Org2MSP validating identity" +"2019-05-02 09:27:22.570 UTC [msp] getCertificationChain -> DEBU 665 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:22.570 UTC [msp] hasOURole -> DEBU 666 MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:27:22.570 UTC [msp] getCertificationChain -> DEBU 667 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:22.571 UTC [common.channelconfig] NewStandardValues -> DEBU 668 Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 669 Processing field: ConsensusType" +"2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66a Processing field: BatchSize" +"2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66b Processing field: BatchTimeout" +"2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66c Processing field: KafkaBrokers" +"2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66d Processing field: ChannelRestrictions" +"2019-05-02 09:27:22.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 66e Processing field: Capabilities" +"2019-05-02 09:27:22.571 UTC [common.channelconfig] NewStandardValues -> DEBU 66f Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:27:22.572 UTC [common.channelconfig] initializeProtosStruct -> DEBU 670 Processing field: Endpoints" +"2019-05-02 09:27:22.572 UTC [common.channelconfig] NewStandardValues -> DEBU 671 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:27:22.572 UTC [common.channelconfig] initializeProtosStruct -> DEBU 672 Processing field: MSP" +"2019-05-02 09:27:22.572 UTC [common.channelconfig] validateMSP -> DEBU 673 Setting up MSP for org OrdererOrg" +"2019-05-02 09:27:22.572 UTC [msp] newBccspMsp -> DEBU 674 Creating BCCSP-based MSP instance" +"2019-05-02 09:27:22.572 UTC [msp] New -> DEBU 675 Creating Cache-MSP instance" +"2019-05-02 09:27:22.572 UTC [msp] Setup -> DEBU 676 Setting up MSP instance OrdererMSP" +"2019-05-02 09:27:22.573 UTC [msp.identity] newIdentity -> DEBU 677 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c -pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv -WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr -KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:30:47.809 UTC [grpc] infof -> DEBU 762 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.810 UTC [gossip.comm] readFromStream -> DEBU 763 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:47.810 UTC [gossip.comm] func2 -> DEBU 764 Client 192.168.240.6:44962 disconnected" -"2019-05-02 01:30:47.810 UTC [comm.grpc.server] 1 -> INFO 765 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.801Z grpc.peer_address=192.168.240.6:44962 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.9452ms -"2019-05-02 01:30:47.811 UTC [gossip.comm] writeToStream -> DEBU 766 Closing writing to stream" -"2019-05-02 01:30:47.790 UTC [common.configtx] addToMap -> DEBU 767 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:30:47.811 UTC [common.configtx] addToMap -> DEBU 768 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:30:47.811 UTC [common.configtx] addToMap -> DEBU 769 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:30:47.811 UTC [common.configtx] addToMap -> DEBU 76a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.811 UTC [common.configtx] addToMap -> DEBU 76b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:30:47.811 UTC [common.configtx] addToMap -> DEBU 76c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:30:47.812 UTC [common.configtx] addToMap -> DEBU 76d Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:30:47.812 UTC [common.configtx] addToMap -> DEBU 76e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:30:47.812 UTC [common.configtx] addToMap -> DEBU 76f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:30:47.809 UTC [gossip.comm] readFromStream -> DEBU 75e 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -"2019-05-02 01:30:47.809 UTC [gossip.comm] writeToStream -> DEBU 75f Closing writing to stream" -"2019-05-02 01:30:47.809 UTC [cauthdsl] func2 -> DEBU 760 0xc00038f8a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.809 UTC [grpc] infof -> DEBU 761 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.812 UTC [common.configtx] addToMap -> DEBU 770 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:47.813 UTC [common.configtx] addToMap -> DEBU 773 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:30:47.813 UTC [common.configtx] addToMap -> DEBU 774 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:30:47.814 UTC [common.configtx] addToMap -> DEBU 775 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:47.815 UTC [common.configtx] addToMap -> DEBU 776 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:30:47.815 UTC [common.configtx] addToMap -> DEBU 777 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:30:47.812 UTC [cauthdsl] func1 -> DEBU 771 0xc00038f8a0 gate 1556760647799780200 evaluation succeeds" -"2019-05-02 01:30:47.813 UTC [msp] Validate -> DEBU 772 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.816 UTC [common.configtx] addToMap -> DEBU 778 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:30:47.817 UTC [policies] Evaluate -> DEBU 779 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.818 UTC [common.configtx] addToMap -> DEBU 77a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:30:47.820 UTC [common.configtx] addToMap -> DEBU 77c Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:30:47.821 UTC [common.configtx] addToMap -> DEBU 77d Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:30:47.821 UTC [common.configtx] addToMap -> DEBU 77e Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:30:47.822 UTC [common.configtx] addToMap -> DEBU 77f Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:30:47.823 UTC [common.configtx] addToMap -> DEBU 780 Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:30:47.824 UTC [common.configtx] addToMap -> DEBU 781 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:30:47.825 UTC [common.configtx] addToMap -> DEBU 782 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:30:47.825 UTC [common.configtx] addToMap -> DEBU 783 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:30:47.826 UTC [common.configtx] addToMap -> DEBU 784 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:30:47.826 UTC [common.configtx] addToMap -> DEBU 785 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:30:47.826 UTC [common.configtx] addToMap -> DEBU 786 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:30:47.827 UTC [common.channelconfig] LogSanityChecks -> DEBU 787 As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:30:47.827 UTC [common.channelconfig] LogSanityChecks -> DEBU 788 As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:30:47.827 UTC [policies] Manager -> DEBU 78a Manager Channel looking up path [Application]" -"2019-05-02 01:30:47.827 UTC [policies] Manager -> DEBU 78b Manager Channel has managers Application" -"2019-05-02 01:30:47.827 UTC [policies] Manager -> DEBU 78c Manager Channel has managers Orderer" -"2019-05-02 01:30:47.818 UTC [msp] getCertificationChain -> DEBU 789 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.828 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 78d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.828 UTC [msp] DeserializeIdentity -> DEBU 78e Obtaining identity" -"2019-05-02 01:30:47.828 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 78f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.828 UTC [msp] DeserializeIdentity -> DEBU 790 Obtaining identity" -"2019-05-02 01:30:47.829 UTC [msp] DeserializeIdentity -> DEBU 791 Obtaining identity" -"2019-05-02 01:30:47.829 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 792 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.829 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 793 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.829 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 794 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.829 UTC [policies] Evaluate -> DEBU 795 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.829 UTC [policies] Evaluate -> DEBU 796 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.827 UTC [policies] Manager -> DEBU 797 Manager Channel/Application looking up path []" -"2019-05-02 01:30:47.829 UTC [policies] Manager -> DEBU 798 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:30:47.829 UTC [policies] Manager -> DEBU 799 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:30:47.830 UTC [policies] Evaluate -> DEBU 79b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.830 UTC [cauthdsl] func1 -> DEBU 79c 0xc00017ca00 gate 1556760647830175600 evaluation starts" -"2019-05-02 01:30:47.830 UTC [cauthdsl] func2 -> DEBU 79d 0xc00017ca00 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.830 UTC [common.channelconfig] LogSanityChecks -> DEBU 79a As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:30:47.830 UTC [common.channelconfig] LogSanityChecks -> DEBU 79e As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:30:47.830 UTC [common.channelconfig] LogSanityChecks -> DEBU 79f As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:30:47.830 UTC [cauthdsl] func2 -> DEBU 7a0 0xc00017ca00 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.830 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7a1 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:30:47.830 UTC [msp] Validate -> DEBU 7a2 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.831 UTC [msp] getCertificationChain -> DEBU 7a4 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.830 UTC [policies] Manager -> DEBU 7a3 Manager Channel looking up path [Orderer]" -"2019-05-02 01:30:47.831 UTC [policies] Manager -> DEBU 7a5 Manager Channel has managers Orderer" -"2019-05-02 01:30:47.831 UTC [policies] Manager -> DEBU 7a6 Manager Channel has managers Application" -"2019-05-02 01:30:47.831 UTC [policies] Manager -> DEBU 7a7 Manager Channel/Orderer looking up path []" -"2019-05-02 01:30:47.831 UTC [policies] Manager -> DEBU 7a8 Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:30:47.831 UTC [common.channelconfig] LogSanityChecks -> DEBU 7a9 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:30:47.832 UTC [common.capabilities] Supported -> DEBU 7aa Application capability V2_0 is supported and is enabled" -"2019-05-02 01:30:47.832 UTC [common.capabilities] Supported -> DEBU 7ab Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:30:47.832 UTC [cauthdsl] func2 -> DEBU 7ac 0xc00017ca00 principal matched by identity 0" -"2019-05-02 01:30:47.832 UTC [msp.identity] Verify -> DEBU 7ae Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-05-02 01:30:47.832 UTC [msp.identity] Verify -> DEBU 7af Verify: sig = 00000000 30 44 02 20 67 69 77 ef 45 f0 7d e7 37 7a 82 b8 |0D. giw.E.}.7z..| -00000010 11 89 66 4f 31 cd 76 f3 99 ed e0 80 0b ed aa ea |..fO1.v.........| -00000020 2e 70 8d 6e 02 20 7d 27 5f 9c 2c 35 54 6b 93 87 |.p.n. }'_.,5Tk..| -00000030 23 3b b1 93 4b 96 7f 14 19 eb e8 d4 47 38 a7 9e |#;..K.......G8..| -00000040 31 d5 25 c1 34 d9 |1.%.4.|" -"2019-05-02 01:30:47.832 UTC [gossip.service] ProcessConfigUpdate -> DEBU 7ad Processing new config for channel businesschannel" -"2019-05-02 01:30:47.832 UTC [gossip.service] ProcessConfigUpdate -> DEBU 7b0 Calling out because config was updated for channel businesschannel" -"2019-05-02 01:30:47.832 UTC [gossip.service] updateAnchors -> DEBU 7b1 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -"2019-05-02 01:30:47.833 UTC [gossip.service] updateAnchors -> DEBU 7b2 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" -"2019-05-02 01:30:47.833 UTC [gossip.service] updateAnchors -> DEBU 7b4 Creating state provider for chainID businesschannel" -"2019-05-02 01:30:47.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.833 UTC [cauthdsl] func2 -> DEBU 7b3 0xc00017ca00 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.834 UTC [cauthdsl] func1 -> DEBU 7b7 0xc00017ca00 gate 1556760647830175600 evaluation succeeds" -"2019-05-02 01:30:47.834 UTC [policies] Evaluate -> DEBU 7b8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.834 UTC [policies] Evaluate -> DEBU 7b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.834 UTC [policies] Evaluate -> DEBU 7ba Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.834 UTC [policies] Evaluate -> DEBU 7bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.834 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7bd Authenticated 192.168.240.8:38802" -"2019-05-02 01:30:47.834 UTC [gossip.comm] GossipStream -> DEBU 7be Servicing 192.168.240.8:38802" -"2019-05-02 01:30:47.834 UTC [policies] Evaluate -> DEBU 7bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.835 UTC [policies] Evaluate -> DEBU 7bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.835 UTC [policies] Evaluate -> DEBU 7c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.835 UTC [msp] DeserializeIdentity -> DEBU 7c1 Obtaining identity" -"2019-05-02 01:30:47.820 UTC [policies] Evaluate -> DEBU 77b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.836 UTC [msp.identity] newIdentity -> DEBU 7c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.574 UTC [msp.identity] newIdentity -> DEBU 678 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-05-02 09:27:22.574 UTC [msp] Validate -> DEBU 679 MSP OrdererMSP validating identity" +"2019-05-02 09:27:22.575 UTC [msp] Setup -> DEBU 67a Setting up the MSP manager (3 msps)" +"2019-05-02 09:27:22.575 UTC [msp] Setup -> DEBU 67b MSP manager setup complete, setup 3 msps" +"2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67e Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 67f Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:27:22.575 UTC [policies] NewManagerImpl -> DEBU 680 Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 681 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 682 Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 683 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 684 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 685 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:27:22.576 UTC [policies] NewManagerImpl -> DEBU 686 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 687 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 688 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 689 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68a Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68b Proposed new policy Admins for Channel/Application" +"2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68c Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:27:22.577 UTC [policies] NewManagerImpl -> DEBU 68d Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 68e Proposed new policy Readers for Channel/Application" +"2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 68f Proposed new policy Writers for Channel/Application" +"2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 690 Proposed new policy Readers for Channel" +"2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 691 Proposed new policy Writers for Channel" +"2019-05-02 09:27:22.578 UTC [policies] NewManagerImpl -> DEBU 692 Proposed new policy Admins for Channel" +"2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 693 Adding to config map: [Group] /Channel" +"2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 694 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 695 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 696 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 697 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:27:22.579 UTC [common.configtx] addToMap -> DEBU 698 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 699 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69c Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69d Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:27:22.580 UTC [common.configtx] addToMap -> DEBU 69f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:27:22.581 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:27:22.582 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6b1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:27:22.583 UTC [common.configtx] addToMap -> DEBU 6b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b5 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b6 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b7 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:27:22.584 UTC [common.configtx] addToMap -> DEBU 6b8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6b9 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6ba Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6bb Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6bc Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6bd Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:27:22.585 UTC [common.configtx] addToMap -> DEBU 6be Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:27:22.586 UTC [common.configtx] addToMap -> DEBU 6bf Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:27:22.586 UTC [common.configtx] addToMap -> DEBU 6c0 Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:27:22.586 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c1 As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:27:22.586 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c2 As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:27:22.586 UTC [policies] Manager -> DEBU 6c3 Manager Channel looking up path [Application]" +"2019-05-02 09:27:22.586 UTC [policies] Manager -> DEBU 6c4 Manager Channel has managers Orderer" +"2019-05-02 09:27:22.586 UTC [policies] Manager -> DEBU 6c5 Manager Channel has managers Application" +"2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6c6 Manager Channel/Application looking up path []" +"2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6c7 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6c8 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:27:22.587 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c9 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:27:22.587 UTC [common.channelconfig] LogSanityChecks -> DEBU 6ca As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:27:22.587 UTC [common.channelconfig] LogSanityChecks -> DEBU 6cb As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:27:22.587 UTC [policies] Manager -> DEBU 6cc Manager Channel looking up path [Orderer]" +"2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6cd Manager Channel has managers Orderer" +"2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6ce Manager Channel has managers Application" +"2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6cf Manager Channel/Orderer looking up path []" +"2019-05-02 09:27:22.588 UTC [policies] Manager -> DEBU 6d0 Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:27:22.588 UTC [common.channelconfig] LogSanityChecks -> DEBU 6d1 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:27:22.588 UTC [common.capabilities] Supported -> DEBU 6d2 Application capability V2_0 is supported and is enabled" +"2019-05-02 09:27:22.589 UTC [common.capabilities] Supported -> DEBU 6d3 Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:27:22.589 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6d4 Processing new config for channel businesschannel" +"2019-05-02 09:27:22.589 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6d5 Calling out because config was updated for channel businesschannel" +"2019-05-02 09:27:22.590 UTC [gossip.service] updateAnchors -> DEBU 6d6 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-05-02 09:27:22.590 UTC [gossip.service] updateAnchors -> DEBU 6d7 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +"2019-05-02 09:27:22.590 UTC [gossip.service] updateAnchors -> DEBU 6d8 Creating state provider for chainID businesschannel" +"2019-05-02 09:27:22.590 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.590 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6da Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.590 UTC [policies] Evaluate -> DEBU 6db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:22.590 UTC [policies] Evaluate -> DEBU 6dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.590 UTC [policies] Evaluate -> DEBU 6dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:22.591 UTC [msp] DeserializeIdentity -> DEBU 6de Obtaining identity" +"2019-05-02 09:27:22.591 UTC [msp.identity] newIdentity -> DEBU 6df Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -3404,102 +3108,47 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE-----" -"2019-05-02 01:30:47.836 UTC [cauthdsl] func1 -> DEBU 7c4 0xc0002a03b0 gate 1556760647836519100 evaluation starts" -"2019-05-02 01:30:47.836 UTC [cauthdsl] func2 -> DEBU 7c5 0xc0002a03b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.836 UTC [cauthdsl] func2 -> DEBU 7c6 0xc0002a03b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.836 UTC [cauthdsl] func2 -> DEBU 7c7 0xc0002a03b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:30:47.836 UTC [cauthdsl] func2 -> DEBU 7c8 0xc0002a03b0 principal evaluation fails" -"2019-05-02 01:30:47.836 UTC [policies] Evaluate -> DEBU 7c3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.836 UTC [policies] Evaluate -> DEBU 7c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.836 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ca Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:47.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 7cb Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:30:47.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 7cc updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 " -"2019-05-02 01:30:47.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 7cd Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 " -"2019-05-02 01:30:47.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 7ce Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:47.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 7cf Exiting" -"2019-05-02 01:30:47.837 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d0 Exiting" -"2019-05-02 01:30:47.837 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7d1 Exiting" -"2019-05-02 01:30:47.836 UTC [cauthdsl] func1 -> DEBU 7d2 0xc0002a03b0 gate 1556760647836519100 evaluation fails" -"2019-05-02 01:30:47.838 UTC [policies] Evaluate -> DEBU 7d3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.838 UTC [policies] Evaluate -> DEBU 7d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.838 UTC [policies] Evaluate -> DEBU 7d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:30:47.838 UTC [cauthdsl] func1 -> DEBU 7d6 0xc0002a1700 gate 1556760647838309800 evaluation starts" -"2019-05-02 01:30:47.838 UTC [cauthdsl] func2 -> DEBU 7d7 0xc0002a1700 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.838 UTC [cauthdsl] func2 -> DEBU 7d8 0xc0002a1700 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.838 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7d9 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:30:47.838 UTC [msp] Validate -> DEBU 7da MSP Org1MSP validating identity" -"2019-05-02 01:30:47.838 UTC [msp] getCertificationChain -> DEBU 7db MSP Org1MSP getting certification chain" -"2019-05-02 01:30:47.838 UTC [cauthdsl] func2 -> DEBU 7dc 0xc0002a1700 principal matched by identity 0" -"2019-05-02 01:30:47.838 UTC [msp.identity] Verify -> DEBU 7dd Verify: digest = 00000000 64 b8 f5 fc bc 41 9d c3 23 39 08 c8 d5 68 b5 5f |d....A..#9...h._| -00000010 cb 60 03 12 f4 56 5f 02 2c cb 7b ec 0c ec e7 f3 |.`...V_.,.{.....|" -"2019-05-02 01:30:47.838 UTC [msp.identity] Verify -> DEBU 7de Verify: sig = 00000000 30 45 02 21 00 8d e0 ab 12 85 44 66 c1 8b 8d dc |0E.!......Df....| -00000010 51 43 a8 33 77 2b f7 6f 71 2f 33 f0 a3 f9 30 e6 |QC.3w+.oq/3...0.| -00000020 a4 d6 0c 08 30 02 20 02 6e 63 0c 91 c6 6e 86 31 |....0. .nc...n.1| -00000030 d8 28 5e 48 90 45 48 1d c0 4f 20 99 6b c8 54 11 |.(^H.EH..O .k.T.| -00000040 af 82 d0 06 25 10 d2 |....%..|" -"2019-05-02 01:30:47.838 UTC [cauthdsl] func2 -> DEBU 7df 0xc0002a1700 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.839 UTC [cauthdsl] func1 -> DEBU 7e0 0xc0002a1700 gate 1556760647838309800 evaluation succeeds" -"2019-05-02 01:30:47.839 UTC [policies] Evaluate -> DEBU 7e1 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:47.839 UTC [policies] Evaluate -> DEBU 7e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:47.839 UTC [policies] Evaluate -> DEBU 7e3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.839 UTC [policies] Evaluate -> DEBU 7e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.839 UTC [gossip.gossip] JoinChan -> INFO 7e5 Joining gossip network of channel businesschannel with 2 organizations" -"2019-05-02 01:30:47.839 UTC [gossip.gossip] learnAnchorPeers -> INFO 7e6 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -"2019-05-02 01:30:47.839 UTC [gossip.gossip] learnAnchorPeers -> INFO 7e7 Anchor peer with same endpoint, skipping connecting to myself" -"2019-05-02 01:30:47.839 UTC [gossip.gossip] learnAnchorPeers -> INFO 7e8 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -"2019-05-02 01:30:47.839 UTC [gossip.discovery] Connect -> DEBU 7e9 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " -"2019-05-02 01:30:47.839 UTC [gossip.discovery] Connect -> DEBU 7ea Exiting" -"2019-05-02 01:30:47.839 UTC [gossip.service] updateEndpoints -> DEBU 7eb Updating endpoints for chainID%!(EXTRA string=businesschannel)" -"2019-05-02 01:30:47.839 UTC [msp] DeserializeIdentity -> DEBU 7ec Obtaining identity" -"2019-05-02 01:30:47.838 UTC [gossip.discovery] sendMemResponse -> DEBU 7ed Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:47.839 UTC [msp] DeserializeIdentity -> DEBU 7ee Obtaining identity" -"2019-05-02 01:30:47.840 UTC [msp] DeserializeIdentity -> DEBU 7ef Obtaining identity" -"2019-05-02 01:30:47.840 UTC [gossip.comm] Send -> DEBU 7f0 Entering, sending GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:47.840 UTC [gossip.discovery] sendMemResponse -> DEBU 7f1 Exiting, replying with MembershipResponse with Alive: 3, Dead: 0" -"2019-05-02 01:30:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 7f2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.840 UTC [gossip.comm] createConnection -> DEBU 7f3 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:47.841 UTC [grpc] DialContext -> DEBU 7f4 parsed scheme: """ -"2019-05-02 01:30:47.841 UTC [grpc] DialContext -> DEBU 7f5 scheme "" not registered, fallback to default scheme" -"2019-05-02 01:30:47.841 UTC [grpc] UpdateState -> DEBU 7f6 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" -"2019-05-02 01:30:47.841 UTC [grpc] switchBalancer -> DEBU 7f7 ClientConn switching balancer to "pick_first"" -"2019-05-02 01:30:47.842 UTC [grpc] HandleSubConnStateChange -> DEBU 7f8 pickfirstBalancer: HandleSubConnStateChange: 0xc0002af2e0, CONNECTING" -"2019-05-02 01:30:47.841 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.842 UTC [msp] DeserializeIdentity -> DEBU 7fa Obtaining identity" -"2019-05-02 01:30:47.842 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.843 UTC [peer] updateTrustedRoots -> DEBU 7fc Updating trusted root authorities for channel businesschannel" -"2019-05-02 01:30:47.846 UTC [grpc] DialContext -> DEBU 7fd parsed scheme: """ -"2019-05-02 01:30:47.846 UTC [grpc] DialContext -> DEBU 7fe scheme "" not registered, fallback to default scheme" -"2019-05-02 01:30:47.846 UTC [grpc] UpdateState -> DEBU 7ff ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" -"2019-05-02 01:30:47.846 UTC [grpc] switchBalancer -> DEBU 800 ClientConn switching balancer to "pick_first"" -"2019-05-02 01:30:47.846 UTC [grpc] HandleSubConnStateChange -> DEBU 801 pickfirstBalancer: HandleSubConnStateChange: 0xc0021873a0, CONNECTING" -"2019-05-02 01:30:47.849 UTC [grpc] infof -> DEBU 802 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.850 UTC [gossip.comm] readFromStream -> DEBU 803 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:30:47.850 UTC [gossip.comm] func2 -> DEBU 804 Client 192.168.240.8:38802 disconnected" -"2019-05-02 01:30:47.850 UTC [comm.grpc.server] 1 -> INFO 805 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.797Z grpc.peer_address=192.168.240.8:38802 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.03ms -"2019-05-02 01:30:47.850 UTC [gossip.comm] writeToStream -> DEBU 806 Closing writing to stream" -"2019-05-02 01:30:47.867 UTC [grpc] HandleSubConnStateChange -> DEBU 807 pickfirstBalancer: HandleSubConnStateChange: 0xc0021873a0, READY" -"2019-05-02 01:30:47.869 UTC [grpc] HandleSubConnStateChange -> DEBU 808 pickfirstBalancer: HandleSubConnStateChange: 0xc0002af2e0, READY" -"2019-05-02 01:30:47.871 UTC [comm.grpc.server] 1 -> INFO 809 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.869Z grpc.peer_address=192.168.240.8:38810 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=126.6µs -"2019-05-02 01:30:47.881 UTC [msp.identity] Sign -> DEBU 80a Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.881 UTC [msp.identity] Sign -> DEBU 80b Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.884 UTC [gossip.comm] authenticateRemotePeer -> DEBU 80d Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:7051" -"2019-05-02 01:30:47.883 UTC [peer] buildTrustedRootsForChain -> DEBU 80c updating root CAs for channel [businesschannel]" -"2019-05-02 01:30:47.884 UTC [peer] buildTrustedRootsForChain -> DEBU 80e adding app root CAs for MSP [Org1MSP]" -"2019-05-02 01:30:47.885 UTC [peer] buildTrustedRootsForChain -> DEBU 810 adding app root CAs for MSP [Org2MSP]" -"2019-05-02 01:30:47.886 UTC [peer] buildTrustedRootsForChain -> DEBU 811 adding orderer root CAs for MSP [OrdererMSP]" -"2019-05-02 01:30:47.887 UTC [committer.txvalidator] validateTx -> DEBU 812 config transaction received for chain businesschannel" -"2019-05-02 01:30:47.885 UTC [msp.identity] Sign -> DEBU 80f Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.887 UTC [msp.identity] Sign -> DEBU 813 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.887 UTC [committer.txvalidator] validateTx -> DEBU 814 [businesschannel] validateTx completes for block 0xc00312f340 env 0xc0031490e0 txn 0" -"2019-05-02 01:30:47.888 UTC [gossip.comm] authenticateRemotePeer -> DEBU 815 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:7051" -"2019-05-02 01:30:47.888 UTC [committer.txvalidator] Validate -> DEBU 816 got result for idx 0, code 0" -"2019-05-02 01:30:47.888 UTC [committer.txvalidator] Validate -> INFO 817 [businesschannel] Validated block [2] in 324ms" -"2019-05-02 01:30:47.891 UTC [gossip.privdata] listMissingPrivateData -> DEBU 818 Retrieving private write sets for 0 transactions from transient store" -"2019-05-02 01:30:47.891 UTC [gossip.privdata] StoreBlock -> DEBU 819 [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-05-02 01:30:47.891 UTC [gossip.comm] authenticateRemotePeer -> DEBU 81b Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:7051" -"2019-05-02 01:30:47.891 UTC [msp] DeserializeIdentity -> DEBU 81d Obtaining identity" -"2019-05-02 01:30:47.892 UTC [msp] DeserializeIdentity -> DEBU 81e Obtaining identity" -"2019-05-02 01:30:47.892 UTC [msp.identity] newIdentity -> DEBU 81f Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.591 UTC [cauthdsl] func1 -> DEBU 6e0 0xc00347a750 gate 1556789242591792300 evaluation starts" +"2019-05-02 09:27:22.592 UTC [cauthdsl] func2 -> DEBU 6e1 0xc00347a750 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.592 UTC [cauthdsl] func2 -> DEBU 6e2 0xc00347a750 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.592 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6e3 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:27:22.593 UTC [msp] Validate -> DEBU 6e4 MSP Org1MSP validating identity" +"2019-05-02 09:27:22.593 UTC [msp] getCertificationChain -> DEBU 6e5 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:22.594 UTC [cauthdsl] func2 -> DEBU 6e6 0xc00347a750 principal matched by identity 0" +"2019-05-02 09:27:22.594 UTC [msp.identity] Verify -> DEBU 6e7 Verify: digest = 00000000 a6 4d f8 94 d0 f3 1b 63 5f ff 98 72 79 e4 8b 68 |.M.....c_..ry..h| +00000010 85 23 bf d6 04 6e d5 26 1d 59 3c 76 64 b8 82 b7 |.#...n.&.Y DEBU 6e8 Verify: sig = 00000000 30 44 02 20 1d b8 53 67 a3 67 64 56 93 ed c7 eb |0D. ..Sg.gdV....| +00000010 49 c9 9b b0 ae ff dd f0 75 cd 9e 3e bf e2 ff 62 |I.......u..>...b| +00000020 37 18 e1 9f 02 20 40 02 53 23 9b 08 3b 75 e3 8c |7.... @.S#..;u..| +00000030 01 c5 e2 dd 62 9a b9 80 e4 94 3c dd 70 0f 28 a0 |....b.....<.p.(.| +00000040 89 bc 81 84 80 a7 |......|" +"2019-05-02 09:27:22.594 UTC [cauthdsl] func2 -> DEBU 6e9 0xc00347a750 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.594 UTC [cauthdsl] func1 -> DEBU 6ea 0xc00347a750 gate 1556789242591792300 evaluation succeeds" +"2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6eb Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6ed Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:22.595 UTC [policies] Evaluate -> DEBU 6ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:22.595 UTC [gossip.gossip] JoinChan -> INFO 6ef Joining gossip network of channel businesschannel with 2 organizations" +"2019-05-02 09:27:22.596 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f0 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-05-02 09:27:22.596 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f1 Anchor peer with same endpoint, skipping connecting to myself" +"2019-05-02 09:27:22.596 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f2 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-05-02 09:27:22.596 UTC [gossip.discovery] Connect -> DEBU 6f3 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +"2019-05-02 09:27:22.596 UTC [gossip.discovery] Connect -> DEBU 6f4 Exiting" +"2019-05-02 09:27:22.597 UTC [gossip.service] updateEndpoints -> DEBU 6f5 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-05-02 09:27:22.597 UTC [peer] updateTrustedRoots -> DEBU 6f6 Updating trusted root authorities for channel businesschannel" +"2019-05-02 09:27:22.598 UTC [grpc] DialContext -> DEBU 6f7 parsed scheme: """ +"2019-05-02 09:27:22.598 UTC [grpc] DialContext -> DEBU 6f8 scheme "" not registered, fallback to default scheme" +"2019-05-02 09:27:22.598 UTC [grpc] UpdateState -> DEBU 6f9 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" +"2019-05-02 09:27:22.598 UTC [grpc] switchBalancer -> DEBU 6fa ClientConn switching balancer to "pick_first"" +"2019-05-02 09:27:22.598 UTC [grpc] HandleSubConnStateChange -> DEBU 6fb pickfirstBalancer: HandleSubConnStateChange: 0xc0034ab9b0, CONNECTING" +"2019-05-02 09:27:22.604 UTC [grpc] HandleSubConnStateChange -> DEBU 6fc pickfirstBalancer: HandleSubConnStateChange: 0xc0034ab9b0, READY" +"2019-05-02 09:27:22.607 UTC [msp.identity] Sign -> DEBU 6fd Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:22.608 UTC [msp.identity] Sign -> DEBU 6fe Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:22.609 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6ff Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:7051" +"2019-05-02 09:27:22.616 UTC [gossip.comm] authenticateRemotePeer -> DEBU 700 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051" +"2019-05-02 09:27:22.617 UTC [msp] DeserializeIdentity -> DEBU 701 Obtaining identity" +"2019-05-02 09:27:22.617 UTC [msp] DeserializeIdentity -> DEBU 702 Obtaining identity" +"2019-05-02 09:27:22.618 UTC [msp.identity] newIdentity -> DEBU 703 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -3513,80 +3162,515 @@ BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -----END CERTIFICATE-----" -"2019-05-02 01:30:47.894 UTC [msp] Validate -> DEBU 820 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.894 UTC [grpc] infof -> DEBU 821 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.894 UTC [comm.grpc.server] 1 -> INFO 822 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:49.894Z grpc.peer_address=192.168.240.8:38808 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=127.8µs -"2019-05-02 01:30:47.891 UTC [committer] preCommit -> DEBU 81c Received configuration update, calling CSCC ConfigUpdate" -"2019-05-02 01:30:47.896 UTC [msp.identity] Sign -> DEBU 824 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.896 UTC [msp.identity] Sign -> DEBU 825 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.896 UTC [kvledger] CommitWithPvtData -> DEBU 826 [businesschannel] Validating state for block [2]" -"2019-05-02 01:30:47.897 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 827 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:30:47.897 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 828 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-05-02 01:30:47.897 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 829 Validating new block with num trans = [1]" -"2019-05-02 01:30:47.897 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 82a ValidateAndPrepareBatch() for block number = [2]" -"2019-05-02 01:30:47.898 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 82b preprocessing ProtoBlock..." -"2019-05-02 01:30:47.898 UTC [gossip.comm] authenticateRemotePeer -> DEBU 82d Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.8:38810" -"2019-05-02 01:30:47.898 UTC [valimpl] preprocessProtoBlock -> DEBU 82c txType=CONFIG" -"2019-05-02 01:30:47.898 UTC [valimpl] processNonEndorserTx -> DEBU 82e Performing custom processing for transaction [txid=], [txType=CONFIG]" -"2019-05-02 01:30:47.899 UTC [valimpl] processNonEndorserTx -> DEBU 82f Processor for custom tx processing:&peer.configtxProcessor{}" -"2019-05-02 01:30:47.899 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 830 constructing new tx simulator" -"2019-05-02 01:30:47.899 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 831 constructing new tx simulator txid = []" -"2019-05-02 01:30:47.899 UTC [peer] GenerateSimulationResults -> DEBU 832 Processing CONFIG" -"2019-05-02 01:30:47.900 UTC [peer] processChannelConfigTx -> DEBU 833 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -"2019-05-02 01:30:47.901 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 834 Simulation completed, getting simulation results" -"2019-05-02 01:30:47.902 UTC [lockbasedtxmgr] Done -> DEBU 835 Done with transaction simulation / query execution []" -"2019-05-02 01:30:47.895 UTC [msp] getCertificationChain -> DEBU 823 MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.891 UTC [gossip.comm] authenticateRemotePeer -> DEBU 81a Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:7051" -"2019-05-02 01:30:47.902 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 836 Block [2] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" -"2019-05-02 01:30:47.903 UTC [valinternal] ApplyWriteSet -> DEBU 839 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002275480)}" -"2019-05-02 01:30:47.903 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 83a validating rwset..." -"2019-05-02 01:30:47.902 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 837 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.903 UTC [msp] DeserializeIdentity -> DEBU 838 Obtaining identity" -"2019-05-02 01:30:47.904 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 83b postprocessing ProtoBlock..." -"2019-05-02 01:30:47.905 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 83e ValidateAndPrepareBatch() complete" -"2019-05-02 01:30:47.904 UTC [msp] DeserializeIdentity -> DEBU 83c Obtaining identity" -"2019-05-02 01:30:47.905 UTC [kvledger] CommitWithPvtData -> DEBU 83f [businesschannel] Committing block [2] to storage" -"2019-05-02 01:30:47.906 UTC [ledgerstorage] CommitWithPvtData -> DEBU 841 Writing block [2] to pvt block store" -"2019-05-02 01:30:47.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 840 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.906 UTC [msp] DeserializeIdentity -> DEBU 842 Obtaining identity" -"2019-05-02 01:30:47.906 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 843 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 844 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.907 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 845 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.907 UTC [policies] Evaluate -> DEBU 846 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.907 UTC [policies] Evaluate -> DEBU 847 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.907 UTC [policies] Evaluate -> DEBU 848 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.908 UTC [cauthdsl] func1 -> DEBU 849 0xc00234c8e0 gate 1556760647908482100 evaluation starts" -"2019-05-02 01:30:47.910 UTC [cauthdsl] func2 -> DEBU 84c 0xc00234c8e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.909 UTC [pvtdatastorage] Prepare -> DEBU 84a Saved 0 private data write sets for block [2]" -"2019-05-02 01:30:47.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 83d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.909 UTC [msp.identity] Sign -> DEBU 84b Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.910 UTC [cauthdsl] func2 -> DEBU 84d 0xc00234c8e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.911 UTC [msp] DeserializeIdentity -> DEBU 84e Obtaining identity" -"2019-05-02 01:30:47.912 UTC [msp.identity] Sign -> DEBU 84f Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.913 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 850 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:30:47.913 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 851 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.914 UTC [gossip.comm] authenticateRemotePeer -> DEBU 852 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.8:38808" -"2019-05-02 01:30:47.917 UTC [fsblkstorage] indexBlock -> DEBU 853 Indexing block [blockNum=2, blockHash=[]byte{0x10, 0xa6, 0x73, 0x2, 0x98, 0xd8, 0x5d, 0x96, 0xae, 0x3a, 0x57, 0x2b, 0xde, 0xb5, 0xd3, 0x7f, 0x2e, 0x75, 0xc3, 0x9b, 0xc3, 0x8a, 0xd3, 0xa3, 0x6d, 0xe6, 0x7c, 0xa8, 0x8e, 0x95, 0x7a, 0xb} txOffsets= -txId= locPointer=offset=71, bytesLength=22736 +"2019-05-02 09:27:22.620 UTC [msp] Validate -> DEBU 704 MSP Org2MSP validating identity" +"2019-05-02 09:27:22.620 UTC [msp] getCertificationChain -> DEBU 705 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:22.621 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 706 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.621 UTC [msp] DeserializeIdentity -> DEBU 707 Obtaining identity" +"2019-05-02 09:27:22.622 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.622 UTC [msp] DeserializeIdentity -> DEBU 709 Obtaining identity" +"2019-05-02 09:27:22.623 UTC [msp] DeserializeIdentity -> DEBU 70b Obtaining identity" +"2019-05-02 09:27:22.623 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.624 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.622 UTC [peer] buildTrustedRootsForChain -> DEBU 70a updating root CAs for channel [businesschannel]" +"2019-05-02 09:27:22.624 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70e Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.624 UTC [policies] Evaluate -> DEBU 710 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:22.625 UTC [policies] Evaluate -> DEBU 711 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.625 UTC [policies] Evaluate -> DEBU 712 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:22.625 UTC [cauthdsl] func1 -> DEBU 713 0xc00352b4e0 gate 1556789242625572000 evaluation starts" +"2019-05-02 09:27:22.624 UTC [peer] buildTrustedRootsForChain -> DEBU 70f adding app root CAs for MSP [Org1MSP]" +"2019-05-02 09:27:22.626 UTC [cauthdsl] func2 -> DEBU 714 0xc00352b4e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.627 UTC [cauthdsl] func2 -> DEBU 716 0xc00352b4e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.627 UTC [cauthdsl] func2 -> DEBU 717 0xc00352b4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:22.627 UTC [cauthdsl] func2 -> DEBU 718 0xc00352b4e0 principal evaluation fails" +"2019-05-02 09:27:22.626 UTC [peer] buildTrustedRootsForChain -> DEBU 715 adding app root CAs for MSP [Org2MSP]" +"2019-05-02 09:27:22.628 UTC [peer] buildTrustedRootsForChain -> DEBU 71a adding orderer root CAs for MSP [OrdererMSP]" +"2019-05-02 09:27:22.627 UTC [cauthdsl] func1 -> DEBU 719 0xc00352b4e0 gate 1556789242625572000 evaluation fails" +"2019-05-02 09:27:22.628 UTC [policies] Evaluate -> DEBU 71b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.628 UTC [policies] Evaluate -> DEBU 71c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.629 UTC [policies] Evaluate -> DEBU 71e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:22.629 UTC [committer.txvalidator] validateTx -> DEBU 71d config transaction received for chain businesschannel" +"2019-05-02 09:27:22.629 UTC [cauthdsl] func1 -> DEBU 71f 0xc00352be30 gate 1556789242629620200 evaluation starts" +"2019-05-02 09:27:22.630 UTC [committer.txvalidator] Validate -> DEBU 721 got result for idx 0, code 0" +"2019-05-02 09:27:22.630 UTC [committer.txvalidator] Validate -> INFO 722 [businesschannel] Validated block [2] in 95ms" +"2019-05-02 09:27:22.629 UTC [committer.txvalidator] validateTx -> DEBU 720 [businesschannel] validateTx completes for block 0xc0030e3d40 env 0xc0032a2e10 txn 0" +"2019-05-02 09:27:22.630 UTC [cauthdsl] func2 -> DEBU 723 0xc00352be30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.631 UTC [cauthdsl] func2 -> DEBU 725 0xc00352be30 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.630 UTC [gossip.privdata] listMissingPrivateData -> DEBU 724 Retrieving private write sets for 0 transactions from transient store" +"2019-05-02 09:27:22.631 UTC [gossip.privdata] StoreBlock -> DEBU 726 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-05-02 09:27:22.631 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 727 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-05-02 09:27:22.631 UTC [committer] preCommit -> DEBU 728 Received configuration update, calling CSCC ConfigUpdate" +"2019-05-02 09:27:22.632 UTC [kvledger] CommitWithPvtData -> DEBU 729 [businesschannel] Validating state for block [2]" +"2019-05-02 09:27:22.631 UTC [msp] Validate -> DEBU 72a MSP Org2MSP validating identity" +"2019-05-02 09:27:22.632 UTC [msp] getCertificationChain -> DEBU 72c MSP Org2MSP getting certification chain" +"2019-05-02 09:27:22.633 UTC [cauthdsl] func2 -> DEBU 72d 0xc00352be30 principal matched by identity 0" +"2019-05-02 09:27:22.633 UTC [msp.identity] Verify -> DEBU 72e Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-05-02 09:27:22.633 UTC [msp.identity] Verify -> DEBU 72f Verify: sig = 00000000 30 44 02 20 46 36 3c 9c 63 4e 98 06 45 41 b5 ff |0D. F6<.cN..EA..| +00000010 4e 14 48 c7 8a a7 13 94 df 63 a0 0f c9 54 77 20 |N.H......c...Tw | +00000020 aa 84 66 18 02 20 43 89 90 3d bb ea d8 eb b0 69 |..f.. C..=.....i| +00000030 a9 f6 22 a3 db 6e 0f a6 ea e0 07 fa 10 02 ba 42 |.."..n.........B| +00000040 4b 5d ee a7 42 7a |K]..Bz|" +"2019-05-02 09:27:22.632 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 72b Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:27:22.634 UTC [cauthdsl] func2 -> DEBU 730 0xc00352be30 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.634 UTC [cauthdsl] func1 -> DEBU 732 0xc00352be30 gate 1556789242629620200 evaluation succeeds" +"2019-05-02 09:27:22.635 UTC [policies] Evaluate -> DEBU 733 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.635 UTC [policies] Evaluate -> DEBU 734 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.634 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 731 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-05-02 09:27:22.636 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 735 Validating new block with num trans = [1]" +"2019-05-02 09:27:22.636 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 736 ValidateAndPrepareBatch() for block number = [2]" +"2019-05-02 09:27:22.636 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 738 preprocessing ProtoBlock..." +"2019-05-02 09:27:22.636 UTC [valimpl] preprocessProtoBlock -> DEBU 739 txType=CONFIG" +"2019-05-02 09:27:22.636 UTC [valimpl] processNonEndorserTx -> DEBU 73a Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-05-02 09:27:22.636 UTC [valimpl] processNonEndorserTx -> DEBU 73b Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-05-02 09:27:22.636 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 73c constructing new tx simulator" +"2019-05-02 09:27:22.636 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 73d constructing new tx simulator txid = []" +"2019-05-02 09:27:22.636 UTC [peer] GenerateSimulationResults -> DEBU 73e Processing CONFIG" +"2019-05-02 09:27:22.636 UTC [policies] Evaluate -> DEBU 737 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:22.637 UTC [policies] Evaluate -> DEBU 73f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:22.637 UTC [gossip.comm] authenticateRemotePeer -> DEBU 740 Authenticated 172.18.0.9:7051" +"2019-05-02 09:27:22.637 UTC [msp] DeserializeIdentity -> DEBU 742 Obtaining identity" +"2019-05-02 09:27:22.637 UTC [msp] DeserializeIdentity -> DEBU 743 Obtaining identity" +"2019-05-02 09:27:22.637 UTC [peer] processChannelConfigTx -> DEBU 741 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-05-02 09:27:22.638 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 744 Simulation completed, getting simulation results" +"2019-05-02 09:27:22.638 UTC [lockbasedtxmgr] Done -> DEBU 745 Done with transaction simulation / query execution []" +"2019-05-02 09:27:22.638 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 746 Block [2] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +"2019-05-02 09:27:22.638 UTC [valinternal] ApplyWriteSet -> DEBU 749 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0035c0700)}" +"2019-05-02 09:27:22.639 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74a validating rwset..." +"2019-05-02 09:27:22.639 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74b postprocessing ProtoBlock..." +"2019-05-02 09:27:22.639 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74c ValidateAndPrepareBatch() complete" +"2019-05-02 09:27:22.639 UTC [kvledger] CommitWithPvtData -> DEBU 74d [businesschannel] Committing block [2] to storage" +"2019-05-02 09:27:22.639 UTC [ledgerstorage] CommitWithPvtData -> DEBU 74e Writing block [2] to pvt block store" +"2019-05-02 09:27:22.638 UTC [msp.identity] newIdentity -> DEBU 747 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 74f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15100F " +"2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 750 Sign: digest: 1C9F0D7EF98B17E45B15C5CD54742784DD5E737AEDA124D37E38F589075E5CF6 " +"2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 751 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:22.641 UTC [msp.identity] Sign -> DEBU 752 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:22.642 UTC [msp] DeserializeIdentity -> DEBU 753 Obtaining identity" +"2019-05-02 09:27:22.642 UTC [gossip.comm] Send -> DEBU 754 Entering, sending GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:22.643 UTC [gossip.comm] sendToEndpoint -> DEBU 755 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.643 UTC [gossip.comm] createConnection -> DEBU 756 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:22.644 UTC [grpc] DialContext -> DEBU 757 parsed scheme: """ +"2019-05-02 09:27:22.644 UTC [grpc] DialContext -> DEBU 758 scheme "" not registered, fallback to default scheme" +"2019-05-02 09:27:22.644 UTC [grpc] UpdateState -> DEBU 759 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" +"2019-05-02 09:27:22.644 UTC [grpc] switchBalancer -> DEBU 75a ClientConn switching balancer to "pick_first"" +"2019-05-02 09:27:22.645 UTC [grpc] HandleSubConnStateChange -> DEBU 75b pickfirstBalancer: HandleSubConnStateChange: 0xc003621c50, CONNECTING" +"2019-05-02 09:27:22.638 UTC [grpc] infof -> DEBU 748 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:22.648 UTC [pvtdatastorage] Prepare -> DEBU 75c Saved 0 private data write sets for block [2]" +"2019-05-02 09:27:22.650 UTC [grpc] HandleSubConnStateChange -> DEBU 75d pickfirstBalancer: HandleSubConnStateChange: 0xc003621c50, READY" +"2019-05-02 09:27:22.651 UTC [fsblkstorage] indexBlock -> DEBU 75e Indexing block [blockNum=2, blockHash=[]byte{0x77, 0xce, 0x8d, 0x7, 0x90, 0xe, 0xa5, 0xa9, 0x76, 0x46, 0x90, 0x13, 0x95, 0x91, 0x37, 0xc8, 0x4d, 0x7f, 0xdd, 0xf1, 0x19, 0xb8, 0x8a, 0xad, 0x5f, 0xdd, 0xe8, 0x55, 0x7b, 0xa1, 0x6e, 0x5a} txOffsets= +txId= locPointer=offset=71, bytesLength=22737 ]" -"2019-05-02 01:30:47.917 UTC [gossip.comm] authenticateRemotePeer -> DEBU 854 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:38810" -"2019-05-02 01:30:47.917 UTC [msp] Validate -> DEBU 855 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.918 UTC [msp] DeserializeIdentity -> DEBU 856 Obtaining identity" -"2019-05-02 01:30:47.918 UTC [fsblkstorage] indexBlock -> DEBU 857 txid [] is a duplicate of a previous tx. Not indexing in txid-index" -"2019-05-02 01:30:47.919 UTC [msp] DeserializeIdentity -> DEBU 858 Obtaining identity" -"2019-05-02 01:30:47.919 UTC [gossip.comm] authenticateRemotePeer -> DEBU 859 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:38808" -"2019-05-02 01:30:47.919 UTC [msp] getCertificationChain -> DEBU 85a MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.920 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 85b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.920 UTC [fsblkstorage] indexBlock -> DEBU 85c Adding txLoc [fileSuffixNum=0, offset=47699, bytesLength=22736] for tx number:[0] ID: [] to blockNumTranNum index" -"2019-05-02 01:30:47.921 UTC [msp] DeserializeIdentity -> DEBU 85d Obtaining identity" -"2019-05-02 01:30:47.921 UTC [cauthdsl] func2 -> DEBU 85e 0xc00234c8e0 principal matched by identity 0" -"2019-05-02 01:30:47.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 85f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.920 UTC [msp] DeserializeIdentity -> DEBU 860 Obtaining identity" -"2019-05-02 01:30:47.922 UTC [msp] DeserializeIdentity -> DEBU 861 Obtaining identity" -"2019-05-02 01:30:47.922 UTC [msp.identity] Verify -> DEBU 862 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +"2019-05-02 09:27:22.652 UTC [fsblkstorage] indexBlock -> DEBU 75f txid [] is a duplicate of a previous tx. Not indexing in txid-index" +"2019-05-02 09:27:22.652 UTC [fsblkstorage] indexBlock -> DEBU 760 Adding txLoc [fileSuffixNum=0, offset=47697, bytesLength=22737] for tx number:[0] ID: [] to blockNumTranNum index" +"2019-05-02 09:27:22.653 UTC [msp.identity] Sign -> DEBU 761 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:22.653 UTC [msp.identity] Sign -> DEBU 762 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:22.653 UTC [gossip.comm] authenticateRemotePeer -> DEBU 763 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +"2019-05-02 09:27:22.657 UTC [fsblkstorage] updateCheckpoint -> DEBU 764 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71372], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-05-02 09:27:22.657 UTC [pvtdatastorage] Commit -> DEBU 765 Committing private data for block [2]" +"2019-05-02 09:27:22.658 UTC [gossip.comm] authenticateRemotePeer -> DEBU 766 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051" +"2019-05-02 09:27:22.658 UTC [msp] DeserializeIdentity -> DEBU 767 Obtaining identity" +"2019-05-02 09:27:22.659 UTC [msp] Validate -> DEBU 768 MSP Org2MSP validating identity" +"2019-05-02 09:27:22.659 UTC [pvtdatastorage] Commit -> DEBU 769 Committed private data for block [2]" +"2019-05-02 09:27:22.660 UTC [kvledger] CommitWithPvtData -> DEBU 76a [businesschannel] Committing block [2] transactions to state database" +"2019-05-02 09:27:22.660 UTC [lockbasedtxmgr] Commit -> DEBU 76b lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-05-02 09:27:22.660 UTC [lockbasedtxmgr] Commit -> DEBU 76c Committing updates to state database" +"2019-05-02 09:27:22.660 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 76d Building the expiry schedules based on the update batch" +"2019-05-02 09:27:22.660 UTC [lockbasedtxmgr] Commit -> DEBU 76e Write lock acquired for committing updates to state database" +"2019-05-02 09:27:22.660 UTC [stateleveldb] ApplyUpdates -> DEBU 76f Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-05-02 09:27:22.661 UTC [msp] getCertificationChain -> DEBU 770 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:22.661 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 771 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.661 UTC [msp] DeserializeIdentity -> DEBU 772 Obtaining identity" +"2019-05-02 09:27:22.661 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 773 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.662 UTC [msp] DeserializeIdentity -> DEBU 774 Obtaining identity" +"2019-05-02 09:27:22.662 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 775 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 776 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 777 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.662 UTC [policies] Evaluate -> DEBU 778 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:22.662 UTC [policies] Evaluate -> DEBU 779 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.662 UTC [policies] Evaluate -> DEBU 77a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:22.662 UTC [cauthdsl] func1 -> DEBU 77b 0xc0036aac60 gate 1556789242662578600 evaluation starts" +"2019-05-02 09:27:22.662 UTC [cauthdsl] func2 -> DEBU 77c 0xc0036aac60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.662 UTC [cauthdsl] func2 -> DEBU 77d 0xc0036aac60 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.662 UTC [cauthdsl] func2 -> DEBU 77e 0xc0036aac60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:22.663 UTC [cauthdsl] func2 -> DEBU 77f 0xc0036aac60 principal evaluation fails" +"2019-05-02 09:27:22.664 UTC [cauthdsl] func1 -> DEBU 780 0xc0036aac60 gate 1556789242662578600 evaluation fails" +"2019-05-02 09:27:22.664 UTC [policies] Evaluate -> DEBU 781 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.664 UTC [policies] Evaluate -> DEBU 782 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.664 UTC [policies] Evaluate -> DEBU 783 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:22.665 UTC [cauthdsl] func1 -> DEBU 784 0xc0036ab4c0 gate 1556789242665023100 evaluation starts" +"2019-05-02 09:27:22.665 UTC [cauthdsl] func2 -> DEBU 785 0xc0036ab4c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.665 UTC [cauthdsl] func2 -> DEBU 786 0xc0036ab4c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.665 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 787 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-05-02 09:27:22.665 UTC [msp] Validate -> DEBU 788 MSP Org2MSP validating identity" +"2019-05-02 09:27:22.666 UTC [msp] getCertificationChain -> DEBU 789 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:22.667 UTC [lockbasedtxmgr] Commit -> DEBU 78a Updates committed to state database and the write lock is released" +"2019-05-02 09:27:22.667 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 78b Preparing potential purge list working-set for expiringAtBlk [3]" +"2019-05-02 09:27:22.667 UTC [leveldbhelper] GetIterator -> DEBU 78c Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" +"2019-05-02 09:27:22.667 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 78d No expiry entry found for expiringAtBlk [3]" +"2019-05-02 09:27:22.668 UTC [lockbasedtxmgr] func1 -> DEBU 78e launched the background routine for preparing keys to purge with the next block" +"2019-05-02 09:27:22.668 UTC [kvledger] CommitWithPvtData -> DEBU 78f [businesschannel] Committing block [2] transactions to history database" +"2019-05-02 09:27:22.668 UTC [historyleveldb] Commit -> DEBU 790 Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" +"2019-05-02 09:27:22.668 UTC [historyleveldb] Commit -> DEBU 791 Skipping transaction [0] since it is not an endorsement transaction" +"2019-05-02 09:27:22.669 UTC [cauthdsl] func2 -> DEBU 792 0xc0036ab4c0 principal matched by identity 0" +"2019-05-02 09:27:22.669 UTC [msp.identity] Verify -> DEBU 793 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-05-02 01:30:47.923 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 863 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.924 UTC [msp.identity] newIdentity -> DEBU 864 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:22.670 UTC [msp.identity] Verify -> DEBU 794 Verify: sig = 00000000 30 45 02 21 00 ab 62 8d ce e2 3e 89 f0 9f d4 05 |0E.!..b...>.....| +00000010 a0 e4 b0 bd ba df 3b 90 60 6f 6e 2c e5 45 a9 36 |......;.`on,.E.6| +00000020 c3 7b 22 44 0c 02 20 05 52 39 fe 47 57 e5 d1 94 |.{"D.. .R9.GW...| +00000030 49 bf d0 a6 18 a6 f9 16 0d 0c 8b dd 22 99 a6 3f |I..........."..?| +00000040 e1 ab 82 b0 48 3a 73 |....H:s|" +"2019-05-02 09:27:22.670 UTC [cauthdsl] func2 -> DEBU 795 0xc0036ab4c0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.670 UTC [cauthdsl] func1 -> DEBU 796 0xc0036ab4c0 gate 1556789242665023100 evaluation succeeds" +"2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 797 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 798 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 799 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:22.670 UTC [policies] Evaluate -> DEBU 79a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:22.670 UTC [gossip.comm] authenticateRemotePeer -> DEBU 79b Authenticated 172.18.0.9:7051" +"2019-05-02 09:27:22.670 UTC [gossip.comm] createConnection -> DEBU 79c Exiting" +"2019-05-02 09:27:22.670 UTC [gossip.comm] sendToEndpoint -> DEBU 79d Exiting" +"2019-05-02 09:27:22.675 UTC [gossip.comm] func1 -> DEBU 79e Got message: GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.675 UTC [gossip.gossip] handleMessage -> DEBU 79f Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.675 UTC [gossip.gossip] handleMessage -> DEBU 7a0 Exiting" +"2019-05-02 09:27:22.675 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7a1 Got message: GossipMessage: Channel: , nonce: 3589820325997843422, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.675 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a2 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:22.675 UTC [msp.identity] Verify -> DEBU 7a3 Verify: digest = 00000000 3b 8b fe b5 67 e7 b7 5f 1e 0d b2 9d eb 20 ed 14 |;...g.._..... ..| +00000010 02 ff 66 cd 4f c7 16 7c 04 31 5d 70 96 2c fe 42 |..f.O..|.1]p.,.B|" +"2019-05-02 09:27:22.676 UTC [msp.identity] Verify -> DEBU 7a4 Verify: sig = 00000000 30 44 02 20 41 71 ce b9 93 60 a2 97 82 35 e8 86 |0D. Aq...`...5..| +00000010 a8 ef 6c 1e 44 4f 13 a9 dc 4f 2b 82 f8 95 7d 80 |..l.DO...O+...}.| +00000020 f0 40 bc 6b 02 20 74 8a 58 4d ba 7e 10 de e5 35 |.@.k. t.XM.~...5| +00000030 7e 39 05 53 0a 15 70 18 73 53 24 0c c6 c9 e6 fd |~9.S..p.sS$.....| +00000040 c8 d0 bc 01 d2 fb |......|" +"2019-05-02 09:27:22.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:22.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a6 got old alive message about alive peer Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 lastAliveTS: 1556789229135374800, 19 but got ts: inc_num:1556789229135374800 seq_num:18 " +"2019-05-02 09:27:22.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a7 Exiting" +"2019-05-02 09:27:22.676 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a8 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:22.676 UTC [msp.identity] Verify -> DEBU 7a9 Verify: digest = 00000000 1c 9f 0d 7e f9 8b 17 e4 5b 15 c5 cd 54 74 27 84 |...~....[...Tt'.| +00000010 dd 5e 73 7a ed a1 24 d3 7e 38 f5 89 07 5e 5c f6 |.^sz..$.~8...^\.|" +"2019-05-02 09:27:22.677 UTC [msp.identity] Verify -> DEBU 7aa Verify: sig = 00000000 30 45 02 21 00 da 21 68 1c 3b 3f 24 7b aa 1e 84 |0E.!..!h.;?${...| +00000010 79 a0 af 8c 08 c9 fc 78 6a a4 73 e5 0e c3 07 a9 |y......xj.s.....| +00000020 7b 3c 8b 43 97 02 20 46 bb 25 39 92 ed 83 f7 70 |{<.C.. F.%9....p| +00000030 7f 59 f5 33 e1 49 fb ff 76 fb 24 0e d6 19 e9 a9 |.Y.3.I..v.$.....| +00000040 51 a0 89 cf cc 9b f1 |Q......|" +"2019-05-02 09:27:22.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ab Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:22.678 UTC [gossip.discovery] isSentByMe -> DEBU 7ac Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:15 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:22.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ad Exiting" +"2019-05-02 09:27:22.678 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7ae Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:22.678 UTC [historyleveldb] Commit -> DEBU 7af Channel [businesschannel]: Updates committed to history database for blockNo [2]" +"2019-05-02 09:27:22.678 UTC [kvledger] CommitWithPvtData -> INFO 7b0 [businesschannel] Committed block [2] with 1 transaction(s) in 46ms (state_validation=7ms block_commit=20ms state_commit=8ms)" +"2019-05-02 09:27:22.678 UTC [msp] DeserializeIdentity -> DEBU 7b1 Obtaining identity" +"2019-05-02 09:27:22.679 UTC [msp.identity] Sign -> DEBU 7b2 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020803 " +"2019-05-02 09:27:22.679 UTC [msp.identity] Sign -> DEBU 7b3 Sign: digest: 3811DE16E7CAE6E4D211B6AA1B4BFDD46D07171C5DDD92B8D5C1F5664EDB62AD " +"2019-05-02 09:27:22.680 UTC [gossip.state] commitBlock -> DEBU 7b4 [businesschannel] Committed block [2] with 1 transaction(s)" +"2019-05-02 09:27:22.680 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.680 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.681 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.681 UTC [policies] Evaluate -> DEBU 7b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:22.681 UTC [policies] Evaluate -> DEBU 7b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.681 UTC [policies] Evaluate -> DEBU 7ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:22.681 UTC [cauthdsl] func1 -> DEBU 7bb 0xc0036def40 gate 1556789242681876900 evaluation starts" +"2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7bc 0xc0036def40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7bd 0xc0036def40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7be 0xc0036def40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:22.682 UTC [cauthdsl] func2 -> DEBU 7bf 0xc0036def40 principal evaluation fails" +"2019-05-02 09:27:22.682 UTC [cauthdsl] func1 -> DEBU 7c0 0xc0036def40 gate 1556789242681876900 evaluation fails" +"2019-05-02 09:27:22.683 UTC [policies] Evaluate -> DEBU 7c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.683 UTC [policies] Evaluate -> DEBU 7c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.683 UTC [policies] Evaluate -> DEBU 7c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:22.683 UTC [cauthdsl] func1 -> DEBU 7c4 0xc0036df780 gate 1556789242683458700 evaluation starts" +"2019-05-02 09:27:22.683 UTC [cauthdsl] func2 -> DEBU 7c5 0xc0036df780 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.683 UTC [cauthdsl] func2 -> DEBU 7c6 0xc0036df780 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.683 UTC [cauthdsl] func2 -> DEBU 7c7 0xc0036df780 principal matched by identity 0" +"2019-05-02 09:27:22.683 UTC [msp.identity] Verify -> DEBU 7c8 Verify: digest = 00000000 14 41 ad e5 11 61 77 f1 7c 69 d6 60 27 6f 11 2a |.A...aw.|i.`'o.*| +00000010 9d 8a 5f f1 c4 6d a7 50 72 ea a6 70 3e 70 f9 12 |.._..m.Pr..p>p..|" +"2019-05-02 09:27:22.684 UTC [msp.identity] Verify -> DEBU 7c9 Verify: sig = 00000000 30 44 02 20 2d f7 2b 2f 8f dd 00 67 4d 49 02 10 |0D. -.+/...gMI..| +00000010 b4 5b 34 d9 5d ff 55 09 4a de 66 69 b1 53 44 0b |.[4.].U.J.fi.SD.| +00000020 f5 19 40 5b 02 20 67 ee 0f ad 63 d0 76 53 87 cd |..@[. g...c.vS..| +00000030 50 6f 20 bd 6e 5b 64 2a 6d 05 70 d4 a6 79 73 a7 |Po .n[d*m.p..ys.| +00000040 2e 6b ce 70 79 db |.k.py.|" +"2019-05-02 09:27:22.684 UTC [cauthdsl] func2 -> DEBU 7ca 0xc0036df780 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.685 UTC [cauthdsl] func1 -> DEBU 7cb 0xc0036df780 gate 1556789242683458700 evaluation succeeds" +"2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7ce Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:22.685 UTC [policies] Evaluate -> DEBU 7cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:22.685 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:22.685 UTC [gossip.discovery] learnNewMembers -> DEBU 7d1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +"2019-05-02 09:27:22.686 UTC [gossip.discovery] learnNewMembers -> DEBU 7d2 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:22.686 UTC [gossip.discovery] learnNewMembers -> DEBU 7d3 Exiting" +"2019-05-02 09:27:22.686 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d4 Exiting" +"2019-05-02 09:27:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7d5 Exiting" +"2019-05-02 09:27:22.847 UTC [comm.grpc.server] 1 -> INFO 7d6 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.846Z grpc.peer_address=172.18.0.9:42014 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.8µs +"2019-05-02 09:27:22.850 UTC [msp.identity] Sign -> DEBU 7d7 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:22.850 UTC [msp.identity] Sign -> DEBU 7d8 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:22.851 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d9 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:42014" +"2019-05-02 09:27:22.852 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7da Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42014" +"2019-05-02 09:27:22.852 UTC [msp] DeserializeIdentity -> DEBU 7db Obtaining identity" +"2019-05-02 09:27:22.853 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.853 UTC [msp] DeserializeIdentity -> DEBU 7dd Obtaining identity" +"2019-05-02 09:27:22.854 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.854 UTC [msp] DeserializeIdentity -> DEBU 7df Obtaining identity" +"2019-05-02 09:27:22.854 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.855 UTC [policies] Evaluate -> DEBU 7e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:22.855 UTC [policies] Evaluate -> DEBU 7e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.856 UTC [policies] Evaluate -> DEBU 7e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:22.856 UTC [cauthdsl] func1 -> DEBU 7e6 0xc003750000 gate 1556789242856527700 evaluation starts" +"2019-05-02 09:27:22.856 UTC [cauthdsl] func2 -> DEBU 7e7 0xc003750000 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.857 UTC [cauthdsl] func2 -> DEBU 7e8 0xc003750000 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.857 UTC [cauthdsl] func2 -> DEBU 7e9 0xc003750000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:22.857 UTC [cauthdsl] func2 -> DEBU 7ea 0xc003750000 principal evaluation fails" +"2019-05-02 09:27:22.857 UTC [cauthdsl] func1 -> DEBU 7eb 0xc003750000 gate 1556789242856527700 evaluation fails" +"2019-05-02 09:27:22.858 UTC [policies] Evaluate -> DEBU 7ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.858 UTC [policies] Evaluate -> DEBU 7ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.858 UTC [policies] Evaluate -> DEBU 7ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:22.859 UTC [cauthdsl] func1 -> DEBU 7ef 0xc003750840 gate 1556789242859150900 evaluation starts" +"2019-05-02 09:27:22.859 UTC [cauthdsl] func2 -> DEBU 7f0 0xc003750840 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.859 UTC [cauthdsl] func2 -> DEBU 7f1 0xc003750840 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.860 UTC [cauthdsl] func2 -> DEBU 7f2 0xc003750840 principal matched by identity 0" +"2019-05-02 09:27:22.860 UTC [msp.identity] Verify -> DEBU 7f3 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-05-02 09:27:22.860 UTC [msp.identity] Verify -> DEBU 7f4 Verify: sig = 00000000 30 45 02 21 00 d9 f3 24 4b 1f 2b 0d 86 c7 ff 75 |0E.!...$K.+....u| +00000010 d4 c2 df 10 b1 88 fe e2 9a f1 dc 01 22 09 b3 02 |............"...| +00000020 10 7f 07 b5 3d 02 20 1c 1a c6 fd 84 ba ee 71 63 |....=. .......qc| +00000030 51 8b 19 3c 7f 4d d6 b8 f3 bf 8f 1c 6b 64 a5 7d |Q..<.M......kd.}| +00000040 d9 b5 47 f2 fd 7f ab |..G....|" +"2019-05-02 09:27:22.861 UTC [cauthdsl] func2 -> DEBU 7f5 0xc003750840 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.861 UTC [cauthdsl] func1 -> DEBU 7f7 0xc003750840 gate 1556789242859150900 evaluation succeeds" +"2019-05-02 09:27:22.861 UTC [grpc] infof -> DEBU 7f6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:22.864 UTC [gossip.comm] func1 -> DEBU 7f8 Got message: GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.865 UTC [gossip.gossip] handleMessage -> DEBU 7f9 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.866 UTC [gossip.gossip] handleMessage -> DEBU 7fa Exiting" +"2019-05-02 09:27:22.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7fb Got message: GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.867 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7fc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:22.867 UTC [msp] DeserializeIdentity -> DEBU 7fd Obtaining identity" +"2019-05-02 09:27:22.868 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.869 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7ff Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.869 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 800 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.870 UTC [policies] Evaluate -> DEBU 801 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:22.871 UTC [policies] Evaluate -> DEBU 802 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.872 UTC [policies] Evaluate -> DEBU 803 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:22.872 UTC [cauthdsl] func1 -> DEBU 804 0xc003768970 gate 1556789242872413800 evaluation starts" +"2019-05-02 09:27:22.872 UTC [cauthdsl] func2 -> DEBU 805 0xc003768970 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.873 UTC [cauthdsl] func2 -> DEBU 806 0xc003768970 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.874 UTC [cauthdsl] func2 -> DEBU 807 0xc003768970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:22.874 UTC [cauthdsl] func2 -> DEBU 808 0xc003768970 principal evaluation fails" +"2019-05-02 09:27:22.874 UTC [cauthdsl] func1 -> DEBU 809 0xc003768970 gate 1556789242872413800 evaluation fails" +"2019-05-02 09:27:22.875 UTC [policies] Evaluate -> DEBU 80a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.875 UTC [policies] Evaluate -> DEBU 80b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.875 UTC [policies] Evaluate -> DEBU 80c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:22.875 UTC [cauthdsl] func1 -> DEBU 80d 0xc0037691b0 gate 1556789242875929300 evaluation starts" +"2019-05-02 09:27:22.875 UTC [cauthdsl] func2 -> DEBU 80e 0xc0037691b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.876 UTC [cauthdsl] func2 -> DEBU 80f 0xc0037691b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.876 UTC [cauthdsl] func2 -> DEBU 810 0xc0037691b0 principal matched by identity 0" +"2019-05-02 09:27:22.876 UTC [msp.identity] Verify -> DEBU 811 Verify: digest = 00000000 19 53 48 52 4d 2a 2d 46 cf 02 5d 8f c4 06 81 99 |.SHRM*-F..].....| +00000010 d1 b6 eb 51 e5 93 32 c8 db 0a d1 4f 3d 43 ba 1c |...Q..2....O=C..|" +"2019-05-02 09:27:22.876 UTC [msp.identity] Verify -> DEBU 812 Verify: sig = 00000000 30 45 02 21 00 e3 e7 2e ba d7 30 6c 06 6d ba 8d |0E.!......0l.m..| +00000010 7c 44 88 d7 e8 e3 be 77 e8 91 16 a9 bf af ff ff ||D.....w........| +00000020 e3 f7 8c aa d2 02 20 5f f8 9d 5b ec 92 ab 90 15 |...... _..[.....| +00000030 14 cc 8c a8 2a a2 95 6f 6e 3e 42 29 79 b1 43 a8 |....*..on>B)y.C.| +00000040 a2 d7 b2 83 29 ec b6 |....)..|" +"2019-05-02 09:27:22.876 UTC [cauthdsl] func2 -> DEBU 813 0xc0037691b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.876 UTC [cauthdsl] func1 -> DEBU 814 0xc0037691b0 gate 1556789242875929300 evaluation succeeds" +"2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 815 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 816 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 817 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:22.876 UTC [policies] Evaluate -> DEBU 818 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:22.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 819 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:22.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 81a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:22.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 81b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 " +"2019-05-02 09:27:22.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 81c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 " +"2019-05-02 09:27:22.880 UTC [gossip.discovery] learnExistingMembers -> DEBU 81d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:22.881 UTC [gossip.discovery] learnExistingMembers -> DEBU 81e Exiting" +"2019-05-02 09:27:22.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 81f Exiting" +"2019-05-02 09:27:22.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 820 Exiting" +"2019-05-02 09:27:22.882 UTC [gossip.discovery] sendMemResponse -> DEBU 821 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:22.883 UTC [msp] DeserializeIdentity -> DEBU 822 Obtaining identity" +"2019-05-02 09:27:22.884 UTC [msp] DeserializeIdentity -> DEBU 823 Obtaining identity" +"2019-05-02 09:27:22.886 UTC [gossip.comm] Send -> DEBU 824 Entering, sending GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:22.887 UTC [gossip.discovery] sendMemResponse -> DEBU 825 Exiting, replying with MembershipResponse with Alive: 3, Dead: 0" +"2019-05-02 09:27:22.887 UTC [gossip.comm] sendToEndpoint -> DEBU 826 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6220319859237669684, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.887 UTC [gossip.comm] sendToEndpoint -> DEBU 827 Exiting" +"2019-05-02 09:27:22.864 UTC [policies] Evaluate -> DEBU 828 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.890 UTC [policies] Evaluate -> DEBU 829 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.890 UTC [policies] Evaluate -> DEBU 82a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:22.891 UTC [policies] Evaluate -> DEBU 82b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:22.891 UTC [gossip.comm] authenticateRemotePeer -> DEBU 82c Authenticated 172.18.0.9:42014" +"2019-05-02 09:27:22.891 UTC [gossip.comm] GossipStream -> DEBU 82d Servicing 172.18.0.9:42014" +"2019-05-02 09:27:22.891 UTC [gossip.comm] serviceConnection -> DEBU 82e Closing reading from stream" +"2019-05-02 09:27:22.891 UTC [gossip.comm] writeToStream -> DEBU 82f Closing writing to stream" +"2019-05-02 09:27:22.892 UTC [gossip.comm] readFromStream -> DEBU 830 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-05-02 09:27:22.892 UTC [grpc] infof -> DEBU 831 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:22.893 UTC [gossip.comm] readFromStream -> DEBU 832 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:22.893 UTC [gossip.comm] func2 -> DEBU 833 Client 172.18.0.9:42014 disconnected" +"2019-05-02 09:27:22.894 UTC [comm.grpc.server] 1 -> INFO 834 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.849Z grpc.peer_address=172.18.0.9:42014 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=44.5551ms +"2019-05-02 09:27:22.895 UTC [gossip.comm] writeToStream -> DEBU 835 Closing writing to stream" +"2019-05-02 09:27:22.916 UTC [comm.grpc.server] 1 -> INFO 836 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.916Z grpc.peer_address=172.18.0.9:42016 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=119.9µs +"2019-05-02 09:27:22.919 UTC [msp.identity] Sign -> DEBU 837 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:22.921 UTC [msp.identity] Sign -> DEBU 838 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:22.922 UTC [gossip.comm] authenticateRemotePeer -> DEBU 839 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:42016" +"2019-05-02 09:27:22.923 UTC [gossip.comm] authenticateRemotePeer -> DEBU 83a Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42016" +"2019-05-02 09:27:22.923 UTC [msp] DeserializeIdentity -> DEBU 83b Obtaining identity" +"2019-05-02 09:27:22.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 83c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.924 UTC [msp] DeserializeIdentity -> DEBU 83d Obtaining identity" +"2019-05-02 09:27:22.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 83e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.925 UTC [msp] DeserializeIdentity -> DEBU 83f Obtaining identity" +"2019-05-02 09:27:22.925 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 840 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 841 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 842 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.926 UTC [policies] Evaluate -> DEBU 843 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:22.927 UTC [policies] Evaluate -> DEBU 844 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.927 UTC [policies] Evaluate -> DEBU 845 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:22.927 UTC [cauthdsl] func1 -> DEBU 846 0xc0037d4250 gate 1556789242927718400 evaluation starts" +"2019-05-02 09:27:22.927 UTC [cauthdsl] func2 -> DEBU 847 0xc0037d4250 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.928 UTC [cauthdsl] func2 -> DEBU 848 0xc0037d4250 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.928 UTC [cauthdsl] func2 -> DEBU 849 0xc0037d4250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:22.928 UTC [cauthdsl] func2 -> DEBU 84a 0xc0037d4250 principal evaluation fails" +"2019-05-02 09:27:22.929 UTC [cauthdsl] func1 -> DEBU 84b 0xc0037d4250 gate 1556789242927718400 evaluation fails" +"2019-05-02 09:27:22.929 UTC [policies] Evaluate -> DEBU 84c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.929 UTC [policies] Evaluate -> DEBU 84d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.930 UTC [policies] Evaluate -> DEBU 84e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:22.931 UTC [cauthdsl] func1 -> DEBU 84f 0xc0037d4a90 gate 1556789242931216300 evaluation starts" +"2019-05-02 09:27:22.931 UTC [cauthdsl] func2 -> DEBU 850 0xc0037d4a90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.932 UTC [cauthdsl] func2 -> DEBU 851 0xc0037d4a90 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.932 UTC [cauthdsl] func2 -> DEBU 852 0xc0037d4a90 principal matched by identity 0" +"2019-05-02 09:27:22.934 UTC [grpc] infof -> DEBU 853 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:22.934 UTC [msp.identity] Verify -> DEBU 854 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-05-02 09:27:22.936 UTC [msp.identity] Verify -> DEBU 855 Verify: sig = 00000000 30 44 02 20 32 8d c7 f6 55 11 1e 4e d4 0c 84 34 |0D. 2...U..N...4| +00000010 d6 46 44 f0 f8 59 72 96 fd 04 c5 e7 92 54 01 bc |.FD..Yr......T..| +00000020 3d 36 5b 60 02 20 07 02 fa a4 60 3f 54 5d 02 bb |=6[`. ....`?T]..| +00000030 9e 62 be 74 95 4e 28 3b 72 6c 22 1c bc ee b5 15 |.b.t.N(;rl".....| +00000040 65 e6 32 15 75 be |e.2.u.|" +"2019-05-02 09:27:22.938 UTC [cauthdsl] func2 -> DEBU 856 0xc0037d4a90 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.939 UTC [cauthdsl] func1 -> DEBU 857 0xc0037d4a90 gate 1556789242931216300 evaluation succeeds" +"2019-05-02 09:27:22.940 UTC [policies] Evaluate -> DEBU 858 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.941 UTC [policies] Evaluate -> DEBU 859 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.942 UTC [policies] Evaluate -> DEBU 85a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:22.943 UTC [policies] Evaluate -> DEBU 85b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:22.944 UTC [gossip.comm] authenticateRemotePeer -> DEBU 85c Authenticated 172.18.0.9:42016" +"2019-05-02 09:27:22.944 UTC [gossip.comm] GossipStream -> DEBU 85d Servicing 172.18.0.9:42016" +"2019-05-02 09:27:22.945 UTC [gossip.comm] readFromStream -> DEBU 85e Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:22.945 UTC [gossip.comm] func2 -> DEBU 85f Client 172.18.0.9:42016 disconnected" +"2019-05-02 09:27:22.946 UTC [gossip.comm] writeToStream -> DEBU 860 Closing writing to stream" +"2019-05-02 09:27:22.946 UTC [comm.grpc.server] 1 -> INFO 861 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:32.918Z grpc.peer_address=172.18.0.9:42016 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.2379ms +"2019-05-02 09:27:22.958 UTC [comm.grpc.server] 1 -> INFO 862 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:24.957Z grpc.peer_address=172.18.0.9:42018 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=179.4µs +"2019-05-02 09:27:22.960 UTC [msp.identity] Sign -> DEBU 863 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:22.960 UTC [msp.identity] Sign -> DEBU 864 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:22.960 UTC [gossip.comm] authenticateRemotePeer -> DEBU 865 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:42018" +"2019-05-02 09:27:22.961 UTC [gossip.comm] authenticateRemotePeer -> DEBU 866 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42018" +"2019-05-02 09:27:22.961 UTC [msp] DeserializeIdentity -> DEBU 867 Obtaining identity" +"2019-05-02 09:27:22.961 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 868 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.961 UTC [msp] DeserializeIdentity -> DEBU 869 Obtaining identity" +"2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.962 UTC [msp] DeserializeIdentity -> DEBU 86b Obtaining identity" +"2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 86d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 86e Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.962 UTC [policies] Evaluate -> DEBU 86f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:22.963 UTC [policies] Evaluate -> DEBU 870 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.963 UTC [policies] Evaluate -> DEBU 871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:22.963 UTC [cauthdsl] func1 -> DEBU 872 0xc003807ad0 gate 1556789242963441400 evaluation starts" +"2019-05-02 09:27:22.963 UTC [cauthdsl] func2 -> DEBU 873 0xc003807ad0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.963 UTC [cauthdsl] func2 -> DEBU 874 0xc003807ad0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 875 0xc003807ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 876 0xc003807ad0 principal evaluation fails" +"2019-05-02 09:27:22.964 UTC [cauthdsl] func1 -> DEBU 877 0xc003807ad0 gate 1556789242963441400 evaluation fails" +"2019-05-02 09:27:22.964 UTC [policies] Evaluate -> DEBU 878 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.964 UTC [policies] Evaluate -> DEBU 879 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.964 UTC [policies] Evaluate -> DEBU 87a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:22.964 UTC [cauthdsl] func1 -> DEBU 87b 0xc003828310 gate 1556789242964710200 evaluation starts" +"2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 87c 0xc003828310 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 87d 0xc003828310 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.964 UTC [cauthdsl] func2 -> DEBU 87e 0xc003828310 principal matched by identity 0" +"2019-05-02 09:27:22.964 UTC [msp.identity] Verify -> DEBU 87f Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-05-02 09:27:22.965 UTC [msp.identity] Verify -> DEBU 880 Verify: sig = 00000000 30 44 02 20 1c 49 9b 3f 31 5b f2 93 84 1b 20 9b |0D. .I.?1[.... .| +00000010 1b a4 7f 89 fc f6 c3 f7 b0 6c 0a 3a cb 12 5d 32 |.........l.:..]2| +00000020 0f 6b e2 3f 02 20 23 1d cc b6 fc 5b 32 0f c0 9a |.k.?. #....[2...| +00000030 9b 4c 46 01 3d 9a 97 5f 77 9e e6 af a9 a7 52 96 |.LF.=.._w.....R.| +00000040 0e 79 6f d8 44 e7 |.yo.D.|" +"2019-05-02 09:27:22.965 UTC [cauthdsl] func2 -> DEBU 881 0xc003828310 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.965 UTC [cauthdsl] func1 -> DEBU 882 0xc003828310 gate 1556789242964710200 evaluation succeeds" +"2019-05-02 09:27:22.965 UTC [policies] Evaluate -> DEBU 883 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.966 UTC [policies] Evaluate -> DEBU 884 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.966 UTC [policies] Evaluate -> DEBU 885 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:22.967 UTC [policies] Evaluate -> DEBU 886 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:22.967 UTC [gossip.comm] authenticateRemotePeer -> DEBU 887 Authenticated 172.18.0.9:42018" +"2019-05-02 09:27:22.967 UTC [gossip.comm] GossipStream -> DEBU 888 Servicing 172.18.0.9:42018" +"2019-05-02 09:27:22.970 UTC [gossip.gossip] handleMessage -> DEBU 889 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.971 UTC [gossip.gossip] handleMessage -> DEBU 88a Exiting" +"2019-05-02 09:27:22.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 88b Got message: GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-05-02 09:27:22.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 88c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:22.974 UTC [msp] DeserializeIdentity -> DEBU 88d Obtaining identity" +"2019-05-02 09:27:22.974 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 88e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:22.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 88f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 890 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:22.976 UTC [policies] Evaluate -> DEBU 891 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:22.976 UTC [policies] Evaluate -> DEBU 892 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:22.977 UTC [policies] Evaluate -> DEBU 893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:22.977 UTC [cauthdsl] func1 -> DEBU 894 0xc003832a50 gate 1556789242977465500 evaluation starts" +"2019-05-02 09:27:22.978 UTC [cauthdsl] func2 -> DEBU 895 0xc003832a50 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.979 UTC [cauthdsl] func2 -> DEBU 896 0xc003832a50 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.979 UTC [cauthdsl] func2 -> DEBU 897 0xc003832a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:22.980 UTC [cauthdsl] func2 -> DEBU 898 0xc003832a50 principal evaluation fails" +"2019-05-02 09:27:22.981 UTC [cauthdsl] func1 -> DEBU 899 0xc003832a50 gate 1556789242977465500 evaluation fails" +"2019-05-02 09:27:22.981 UTC [policies] Evaluate -> DEBU 89a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.981 UTC [policies] Evaluate -> DEBU 89b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:22.982 UTC [policies] Evaluate -> DEBU 89c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:22.982 UTC [cauthdsl] func1 -> DEBU 89d 0xc003833290 gate 1556789242982602400 evaluation starts" +"2019-05-02 09:27:22.983 UTC [cauthdsl] func2 -> DEBU 89e 0xc003833290 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:22.983 UTC [cauthdsl] func2 -> DEBU 89f 0xc003833290 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:22.984 UTC [cauthdsl] func2 -> DEBU 8a0 0xc003833290 principal matched by identity 0" +"2019-05-02 09:27:22.984 UTC [msp.identity] Verify -> DEBU 8a1 Verify: digest = 00000000 fd 11 4d ee 68 00 e9 ca 1b 49 f9 92 f3 2d 42 8b |..M.h....I...-B.| +00000010 54 d9 e0 01 fb 83 45 c8 78 fd d1 40 90 fa 21 49 |T.....E.x..@..!I|" +"2019-05-02 09:27:22.985 UTC [msp.identity] Verify -> DEBU 8a2 Verify: sig = 00000000 30 44 02 20 34 65 8c a6 3a 82 ef 99 4d 5d 73 05 |0D. 4e..:...M]s.| +00000010 46 93 df 67 10 73 3d 57 d5 07 92 bc 12 03 fd 2f |F..g.s=W......./| +00000020 b1 4c 5c 5f 02 20 1e 0d 35 99 e9 f5 ab d2 5d fa |.L\_. ..5.....].| +00000030 df eb 24 a3 d2 1c 30 f3 b7 94 f4 23 01 a8 f3 8e |..$...0....#....| +00000040 83 02 6a 68 9a f0 |..jh..|" +"2019-05-02 09:27:22.986 UTC [cauthdsl] func2 -> DEBU 8a3 0xc003833290 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:22.994 UTC [cauthdsl] func1 -> DEBU 8a4 0xc003833290 gate 1556789242982602400 evaluation succeeds" +"2019-05-02 09:27:22.994 UTC [policies] Evaluate -> DEBU 8a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.994 UTC [policies] Evaluate -> DEBU 8a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:22.995 UTC [policies] Evaluate -> DEBU 8a7 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:22.995 UTC [policies] Evaluate -> DEBU 8a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:22.995 UTC [gossip.discovery] handleAliveMessage -> DEBU 8a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:22.996 UTC [gossip.discovery] learnExistingMembers -> DEBU 8aa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:22.996 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ab updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 " +"2019-05-02 09:27:22.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ac Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 " +"2019-05-02 09:27:22.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ad Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:22.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 8ae Exiting" +"2019-05-02 09:27:22.997 UTC [gossip.discovery] handleAliveMessage -> DEBU 8af Exiting" +"2019-05-02 09:27:22.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 8b0 Exiting" +"2019-05-02 09:27:22.998 UTC [gossip.discovery] sendMemResponse -> DEBU 8b1 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:22.999 UTC [msp] DeserializeIdentity -> DEBU 8b2 Obtaining identity" +"2019-05-02 09:27:22.999 UTC [msp] DeserializeIdentity -> DEBU 8b3 Obtaining identity" +"2019-05-02 09:27:22.999 UTC [gossip.comm] Send -> DEBU 8b4 Entering, sending GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:23.000 UTC [gossip.comm] sendToEndpoint -> DEBU 8b5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7299207915957447169, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +"2019-05-02 09:27:23.000 UTC [gossip.comm] sendToEndpoint -> DEBU 8b6 Exiting" +"2019-05-02 09:27:23.000 UTC [gossip.discovery] sendMemResponse -> DEBU 8b7 Exiting, replying with MembershipResponse with Alive: 3, Dead: 0" +"2019-05-02 09:27:23.111 UTC [comm.grpc.server] 1 -> INFO 8b8 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.11Z grpc.peer_address=172.18.0.5:56894 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=201µs +"2019-05-02 09:27:23.113 UTC [msp.identity] Sign -> DEBU 8b9 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:23.113 UTC [msp.identity] Sign -> DEBU 8ba Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:23.113 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8bb Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:56894" +"2019-05-02 09:27:23.114 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8bc Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:56894" +"2019-05-02 09:27:23.114 UTC [msp] DeserializeIdentity -> DEBU 8bd Obtaining identity" +"2019-05-02 09:27:23.115 UTC [msp] DeserializeIdentity -> DEBU 8be Obtaining identity" +"2019-05-02 09:27:23.115 UTC [msp.identity] newIdentity -> DEBU 8bf Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -3600,564 +3684,570 @@ BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -----END CERTIFICATE-----" -"2019-05-02 01:30:47.924 UTC [msp.identity] newIdentity -> DEBU 865 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c -pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv -WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr -KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ ------END CERTIFICATE-----" -"2019-05-02 01:30:47.925 UTC [fsblkstorage] updateCheckpoint -> DEBU 866 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71373], isChainEmpty=[false], lastBlockNumber=[2]" -"2019-05-02 01:30:47.925 UTC [policies] Evaluate -> DEBU 868 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.926 UTC [msp] Validate -> DEBU 869 MSP Org2MSP validating identity" -"2019-05-02 01:30:47.929 UTC [msp] Validate -> DEBU 86a MSP Org2MSP validating identity" -"2019-05-02 01:30:47.929 UTC [pvtdatastorage] Commit -> DEBU 86b Committing private data for block [2]" -"2019-05-02 01:30:47.929 UTC [policies] Evaluate -> DEBU 86c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.925 UTC [msp.identity] Verify -> DEBU 867 Verify: sig = 00000000 30 44 02 20 40 12 db f1 ce 22 c2 1c 13 25 3f b3 |0D. @...."...%?.| -00000010 bc f0 02 3b 5d 31 e5 06 39 ab ae ec f2 d5 3b 55 |...;]1..9.....;U| -00000020 d2 ec 80 46 02 20 1d a3 c0 50 a6 80 2c 47 67 0c |...F. ...P..,Gg.| -00000030 06 14 26 63 d3 08 4e 42 d6 66 5a 9d 76 b5 52 56 |..&c..NB.fZ.v.RV| -00000040 ef 09 70 f6 fa ed |..p...|" -"2019-05-02 01:30:47.930 UTC [msp] getCertificationChain -> DEBU 86d MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.930 UTC [msp] getCertificationChain -> DEBU 86e MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.930 UTC [grpc] infof -> DEBU 86f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.931 UTC [policies] Evaluate -> DEBU 870 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.932 UTC [cauthdsl] func2 -> DEBU 871 0xc00234c8e0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.932 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 872 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.932 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 873 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.933 UTC [cauthdsl] func1 -> DEBU 874 0xc00252e040 gate 1556760647933243700 evaluation starts" -"2019-05-02 01:30:47.933 UTC [cauthdsl] func1 -> DEBU 875 0xc00234c8e0 gate 1556760647908482100 evaluation succeeds" -"2019-05-02 01:30:47.934 UTC [policies] Evaluate -> DEBU 879 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.934 UTC [policies] Evaluate -> DEBU 87a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.935 UTC [policies] Evaluate -> DEBU 87b Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.935 UTC [policies] Evaluate -> DEBU 87c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.935 UTC [gossip.comm] authenticateRemotePeer -> DEBU 87d Authenticated 192.168.240.5:7051" -"2019-05-02 01:30:47.935 UTC [msp] DeserializeIdentity -> DEBU 87e Obtaining identity" -"2019-05-02 01:30:47.933 UTC [msp] DeserializeIdentity -> DEBU 876 Obtaining identity" -"2019-05-02 01:30:47.936 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 880 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.936 UTC [msp] DeserializeIdentity -> DEBU 882 Obtaining identity" -"2019-05-02 01:30:47.936 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 883 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 884 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 885 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.936 UTC [policies] Evaluate -> DEBU 886 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.936 UTC [policies] Evaluate -> DEBU 887 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.936 UTC [policies] Evaluate -> DEBU 888 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.936 UTC [cauthdsl] func1 -> DEBU 889 0xc0025b4180 gate 1556760647936887100 evaluation starts" -"2019-05-02 01:30:47.936 UTC [cauthdsl] func2 -> DEBU 88a 0xc0025b4180 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.936 UTC [cauthdsl] func2 -> DEBU 88b 0xc0025b4180 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.937 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 88c Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:30:47.937 UTC [msp] Validate -> DEBU 88d MSP Org2MSP validating identity" -"2019-05-02 01:30:47.937 UTC [msp] getCertificationChain -> DEBU 88e MSP Org2MSP getting certification chain" -"2019-05-02 01:30:47.937 UTC [cauthdsl] func2 -> DEBU 88f 0xc0025b4180 principal matched by identity 0" -"2019-05-02 01:30:47.937 UTC [msp.identity] Verify -> DEBU 890 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +"2019-05-02 09:27:23.116 UTC [msp] Validate -> DEBU 8c0 MSP Org2MSP validating identity" +"2019-05-02 09:27:23.116 UTC [msp] getCertificationChain -> DEBU 8c1 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:23.117 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.117 UTC [msp] DeserializeIdentity -> DEBU 8c3 Obtaining identity" +"2019-05-02 09:27:23.117 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.118 UTC [msp] DeserializeIdentity -> DEBU 8c5 Obtaining identity" +"2019-05-02 09:27:23.118 UTC [msp] DeserializeIdentity -> DEBU 8c6 Obtaining identity" +"2019-05-02 09:27:23.119 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.119 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8c8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.119 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8c9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.119 UTC [policies] Evaluate -> DEBU 8ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:23.120 UTC [policies] Evaluate -> DEBU 8cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:23.120 UTC [policies] Evaluate -> DEBU 8cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:23.120 UTC [cauthdsl] func1 -> DEBU 8cd 0xc003899540 gate 1556789243120806800 evaluation starts" +"2019-05-02 09:27:23.120 UTC [cauthdsl] func2 -> DEBU 8ce 0xc003899540 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.121 UTC [cauthdsl] func2 -> DEBU 8cf 0xc003899540 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.121 UTC [cauthdsl] func2 -> DEBU 8d0 0xc003899540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:23.121 UTC [cauthdsl] func2 -> DEBU 8d1 0xc003899540 principal evaluation fails" +"2019-05-02 09:27:23.122 UTC [cauthdsl] func1 -> DEBU 8d2 0xc003899540 gate 1556789243120806800 evaluation fails" +"2019-05-02 09:27:23.122 UTC [policies] Evaluate -> DEBU 8d3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.122 UTC [policies] Evaluate -> DEBU 8d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.122 UTC [policies] Evaluate -> DEBU 8d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:23.123 UTC [cauthdsl] func1 -> DEBU 8d6 0xc003899da0 gate 1556789243123168200 evaluation starts" +"2019-05-02 09:27:23.123 UTC [cauthdsl] func2 -> DEBU 8d7 0xc003899da0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.123 UTC [cauthdsl] func2 -> DEBU 8d8 0xc003899da0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.123 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8d9 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-05-02 09:27:23.126 UTC [msp] Validate -> DEBU 8da MSP Org2MSP validating identity" +"2019-05-02 09:27:23.126 UTC [msp] getCertificationChain -> DEBU 8db MSP Org2MSP getting certification chain" +"2019-05-02 09:27:23.126 UTC [cauthdsl] func2 -> DEBU 8dc 0xc003899da0 principal matched by identity 0" +"2019-05-02 09:27:23.127 UTC [msp.identity] Verify -> DEBU 8dd Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-05-02 01:30:47.937 UTC [msp.identity] Verify -> DEBU 891 Verify: sig = 00000000 30 44 02 20 2e 49 72 b7 ea 20 f0 df 2a 76 01 0d |0D. .Ir.. ..*v..| -00000010 6b bc e9 c8 7d 54 c1 a6 1e ca 89 77 5d d1 ec d1 |k...}T.....w]...| -00000020 a3 0e 09 1d 02 20 52 25 8d 91 44 84 12 c4 88 53 |..... R%..D....S| -00000030 bd e3 24 41 0f a8 54 50 f3 0f 59 13 69 fd 4d 2c |..$A..TP..Y.i.M,| -00000040 32 9f 9c 5c 73 62 |2..\sb|" -"2019-05-02 01:30:47.937 UTC [cauthdsl] func2 -> DEBU 892 0xc0025b4180 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.937 UTC [cauthdsl] func1 -> DEBU 893 0xc0025b4180 gate 1556760647936887100 evaluation succeeds" -"2019-05-02 01:30:47.937 UTC [policies] Evaluate -> DEBU 894 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.937 UTC [policies] Evaluate -> DEBU 895 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.937 UTC [policies] Evaluate -> DEBU 896 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.937 UTC [policies] Evaluate -> DEBU 897 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.937 UTC [gossip.comm] authenticateRemotePeer -> DEBU 898 Authenticated 192.168.240.8:38810" -"2019-05-02 01:30:47.937 UTC [gossip.comm] GossipStream -> DEBU 899 Servicing 192.168.240.8:38810" -"2019-05-02 01:30:47.934 UTC [msp] DeserializeIdentity -> DEBU 877 Obtaining identity" -"2019-05-02 01:30:47.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 89a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.938 UTC [msp] DeserializeIdentity -> DEBU 89b Obtaining identity" -"2019-05-02 01:30:47.938 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 89c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 89d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 89e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 89f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 8a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 8a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.938 UTC [cauthdsl] func1 -> DEBU 8a2 0xc0025f6430 gate 1556760647938411200 evaluation starts" -"2019-05-02 01:30:47.938 UTC [cauthdsl] func2 -> DEBU 8a3 0xc0025f6430 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.938 UTC [cauthdsl] func2 -> DEBU 8a4 0xc0025f6430 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.938 UTC [cauthdsl] func2 -> DEBU 8a5 0xc0025f6430 principal matched by identity 0" -"2019-05-02 01:30:47.938 UTC [msp.identity] Verify -> DEBU 8a6 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +"2019-05-02 09:27:23.127 UTC [msp.identity] Verify -> DEBU 8de Verify: sig = 00000000 30 44 02 20 3d 95 d0 1f 80 8f c6 4a dc 3e 2f aa |0D. =......J.>/.| +00000010 eb f9 5a aa 8a bc 21 20 51 8b d2 3c 15 fa d4 a8 |..Z...! Q..<....| +00000020 11 43 dd 1a 02 20 69 6a 4a 6a 7f fe 0c c6 15 03 |.C... ijJj......| +00000030 0a 4d 73 c3 ba d6 0c ae da 5b 95 a7 fb 60 35 0e |.Ms......[...`5.| +00000040 b6 85 9a bc f2 b5 |......|" +"2019-05-02 09:27:23.127 UTC [cauthdsl] func2 -> DEBU 8df 0xc003899da0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:23.128 UTC [cauthdsl] func1 -> DEBU 8e0 0xc003899da0 gate 1556789243123168200 evaluation succeeds" +"2019-05-02 09:27:23.128 UTC [policies] Evaluate -> DEBU 8e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.128 UTC [policies] Evaluate -> DEBU 8e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.129 UTC [policies] Evaluate -> DEBU 8e3 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:23.131 UTC [policies] Evaluate -> DEBU 8e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:23.131 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8e5 Authenticated 172.18.0.5:56894" +"2019-05-02 09:27:23.132 UTC [gossip.comm] GossipStream -> DEBU 8e6 Servicing 172.18.0.5:56894" +"2019-05-02 09:27:23.142 UTC [gossip.comm] readFromStream -> DEBU 8e7 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:27:23.142 UTC [gossip.comm] func2 -> DEBU 8e8 Client 172.18.0.5:56894 disconnected" +"2019-05-02 09:27:23.142 UTC [comm.grpc.server] 1 -> INFO 8e9 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:33.112Z grpc.peer_address=172.18.0.5:56894 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.4386ms +"2019-05-02 09:27:23.143 UTC [gossip.comm] writeToStream -> DEBU 8ea Closing writing to stream" +"2019-05-02 09:27:23.143 UTC [grpc] infof -> DEBU 8eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:23.150 UTC [comm.grpc.server] 1 -> INFO 8ec unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.15Z grpc.peer_address=172.18.0.5:56896 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=568.2µs +"2019-05-02 09:27:23.152 UTC [msp.identity] Sign -> DEBU 8ed Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:23.153 UTC [msp.identity] Sign -> DEBU 8ee Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:23.153 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ef Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:56896" +"2019-05-02 09:27:23.154 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8f0 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:56896" +"2019-05-02 09:27:23.154 UTC [msp] DeserializeIdentity -> DEBU 8f1 Obtaining identity" +"2019-05-02 09:27:23.154 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.155 UTC [msp] DeserializeIdentity -> DEBU 8f3 Obtaining identity" +"2019-05-02 09:27:23.155 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.155 UTC [msp] DeserializeIdentity -> DEBU 8f5 Obtaining identity" +"2019-05-02 09:27:23.156 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8f7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8f8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.157 UTC [policies] Evaluate -> DEBU 8f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:23.157 UTC [policies] Evaluate -> DEBU 8fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:23.158 UTC [policies] Evaluate -> DEBU 8fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:23.158 UTC [cauthdsl] func1 -> DEBU 8fc 0xc0039027d0 gate 1556789243158295500 evaluation starts" +"2019-05-02 09:27:23.158 UTC [cauthdsl] func2 -> DEBU 8fd 0xc0039027d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.160 UTC [cauthdsl] func2 -> DEBU 8fe 0xc0039027d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.161 UTC [cauthdsl] func2 -> DEBU 8ff 0xc0039027d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:23.161 UTC [cauthdsl] func2 -> DEBU 900 0xc0039027d0 principal evaluation fails" +"2019-05-02 09:27:23.162 UTC [cauthdsl] func1 -> DEBU 901 0xc0039027d0 gate 1556789243158295500 evaluation fails" +"2019-05-02 09:27:23.162 UTC [policies] Evaluate -> DEBU 902 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.162 UTC [policies] Evaluate -> DEBU 903 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.163 UTC [policies] Evaluate -> DEBU 904 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:23.164 UTC [cauthdsl] func1 -> DEBU 905 0xc0038af780 gate 1556789243164671300 evaluation starts" +"2019-05-02 09:27:23.165 UTC [cauthdsl] func2 -> DEBU 906 0xc0038af780 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.165 UTC [cauthdsl] func2 -> DEBU 907 0xc0038af780 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.165 UTC [cauthdsl] func2 -> DEBU 908 0xc0038af780 principal matched by identity 0" +"2019-05-02 09:27:23.165 UTC [msp.identity] Verify -> DEBU 909 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-05-02 01:30:47.938 UTC [msp.identity] Verify -> DEBU 8a7 Verify: sig = 00000000 30 44 02 20 3f 56 e7 d1 97 98 b5 84 41 ab 9f bc |0D. ?V......A...| -00000010 71 51 fb 0c 33 fb 6c 2c 0c 3b ec b8 21 9d a2 a9 |qQ..3.l,.;..!...| -00000020 7d 99 c9 b0 02 20 06 e0 bc 14 d6 b5 3b 3d cd c8 |}.... ......;=..| -00000030 3a 2e 42 0c 68 a5 89 02 b9 ca 79 19 5b 98 c1 da |:.B.h.....y.[...| -00000040 79 92 e0 71 07 b3 |y..q..|" -"2019-05-02 01:30:47.938 UTC [cauthdsl] func2 -> DEBU 8a8 0xc0025f6430 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.938 UTC [cauthdsl] func1 -> DEBU 8a9 0xc0025f6430 gate 1556760647938411200 evaluation succeeds" -"2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 8aa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 8ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.938 UTC [policies] Evaluate -> DEBU 8ac Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.939 UTC [policies] Evaluate -> DEBU 8ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.939 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ae Authenticated 192.168.240.8:38808" -"2019-05-02 01:30:47.939 UTC [gossip.comm] GossipStream -> DEBU 8af Servicing 192.168.240.8:38808" -"2019-05-02 01:30:47.936 UTC [pvtdatastorage] Commit -> DEBU 87f Committed private data for block [2]" -"2019-05-02 01:30:47.939 UTC [kvledger] CommitWithPvtData -> DEBU 8b0 [businesschannel] Committing block [2] transactions to state database" -"2019-05-02 01:30:47.939 UTC [lockbasedtxmgr] Commit -> DEBU 8b1 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-05-02 01:30:47.939 UTC [lockbasedtxmgr] Commit -> DEBU 8b2 Committing updates to state database" -"2019-05-02 01:30:47.939 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 8b3 Building the expiry schedules based on the update batch" -"2019-05-02 01:30:47.939 UTC [lockbasedtxmgr] Commit -> DEBU 8b4 Write lock acquired for committing updates to state database" -"2019-05-02 01:30:47.939 UTC [stateleveldb] ApplyUpdates -> DEBU 8b5 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -"2019-05-02 01:30:47.937 UTC [grpc] infof -> DEBU 8b6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.936 UTC [msp.identity] Sign -> DEBU 881 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15100F " -"2019-05-02 01:30:47.941 UTC [msp.identity] Sign -> DEBU 8b7 Sign: digest: 207DA0F07A70D8B2B062620EA4897C486DEE1EFBCB48FBEE32884411E9530286 " -"2019-05-02 01:30:47.943 UTC [msp.identity] Sign -> DEBU 8b8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:47.944 UTC [msp.identity] Sign -> DEBU 8b9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:47.945 UTC [msp] DeserializeIdentity -> DEBU 8ba Obtaining identity" -"2019-05-02 01:30:47.945 UTC [gossip.comm] Send -> DEBU 8bb Entering, sending GossipMessage: Channel: , nonce: 1904573150992454915, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:15 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:47.946 UTC [gossip.comm] sendToEndpoint -> DEBU 8bc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1904573150992454915, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:15 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.946 UTC [gossip.comm] serviceConnection -> DEBU 8bd Closing reading from stream" -"2019-05-02 01:30:47.946 UTC [gossip.comm] func2 -> DEBU 8be Client 192.168.240.8:38810 disconnected" -"2019-05-02 01:30:47.946 UTC [lockbasedtxmgr] Commit -> DEBU 8bf Updates committed to state database and the write lock is released" -"2019-05-02 01:30:47.946 UTC [comm.grpc.server] 1 -> INFO 8c0 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.8:38810 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=50.429ms -"2019-05-02 01:30:47.946 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 8c1 Preparing potential purge list working-set for expiringAtBlk [3]" -"2019-05-02 01:30:47.947 UTC [leveldbhelper] GetIterator -> DEBU 8c2 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" -"2019-05-02 01:30:47.947 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 8c3 No expiry entry found for expiringAtBlk [3]" -"2019-05-02 01:30:47.947 UTC [lockbasedtxmgr] func1 -> DEBU 8c4 launched the background routine for preparing keys to purge with the next block" -"2019-05-02 01:30:47.947 UTC [gossip.comm] writeToStream -> DEBU 8c5 Closing writing to stream" -"2019-05-02 01:30:47.947 UTC [gossip.comm] serviceConnection -> DEBU 8c6 Closing reading from stream" -"2019-05-02 01:30:47.947 UTC [kvledger] CommitWithPvtData -> DEBU 8c7 [businesschannel] Committing block [2] transactions to history database" -"2019-05-02 01:30:47.947 UTC [gossip.comm] func2 -> DEBU 8c8 Client 192.168.240.8:38808 disconnected" -"2019-05-02 01:30:47.947 UTC [historyleveldb] Commit -> DEBU 8c9 Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" -"2019-05-02 01:30:47.947 UTC [comm.grpc.server] 1 -> INFO 8ca streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:30:57.909Z grpc.peer_address=192.168.240.8:38808 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=37.48ms -"2019-05-02 01:30:47.947 UTC [historyleveldb] Commit -> DEBU 8cb Skipping transaction [0] since it is not an endorsement transaction" -"2019-05-02 01:30:47.947 UTC [gossip.comm] writeToStream -> DEBU 8cc Closing writing to stream" -"2019-05-02 01:30:47.934 UTC [cauthdsl] func2 -> DEBU 878 0xc00252e040 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.948 UTC [cauthdsl] func2 -> DEBU 8cd 0xc00252e040 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.948 UTC [cauthdsl] func2 -> DEBU 8ce 0xc00252e040 principal matched by identity 0" -"2019-05-02 01:30:47.948 UTC [msp.identity] Verify -> DEBU 8cf Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-05-02 01:30:47.948 UTC [msp.identity] Verify -> DEBU 8d0 Verify: sig = 00000000 30 44 02 20 62 6f e5 0d e9 66 a3 42 0b 39 54 ec |0D. bo...f.B.9T.| -00000010 5b 4d b9 5c 0c 92 37 83 bf a4 a3 86 8d 7e 07 f9 |[M.\..7......~..| -00000020 4e 1e ea c7 02 20 1e 1b 3a 94 b3 58 65 dc 68 9f |N.... ..:..Xe.h.| -00000030 b7 14 42 65 91 60 53 8a f9 e5 a1 f2 90 42 68 d2 |..Be.`S......Bh.| -00000040 c1 ac 6f 2c d1 cd |..o,..|" -"2019-05-02 01:30:47.948 UTC [cauthdsl] func2 -> DEBU 8d1 0xc00252e040 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.948 UTC [cauthdsl] func1 -> DEBU 8d2 0xc00252e040 gate 1556760647933243700 evaluation succeeds" -"2019-05-02 01:30:47.948 UTC [policies] Evaluate -> DEBU 8d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.948 UTC [policies] Evaluate -> DEBU 8d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.948 UTC [policies] Evaluate -> DEBU 8d5 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.948 UTC [policies] Evaluate -> DEBU 8d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.948 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d7 Authenticated 192.168.240.5:7051" -"2019-05-02 01:30:47.948 UTC [gossip.comm] createConnection -> DEBU 8d8 Exiting" -"2019-05-02 01:30:47.949 UTC [gossip.comm] sendToEndpoint -> DEBU 8d9 Exiting" -"2019-05-02 01:30:47.949 UTC [gossip.comm] func1 -> WARN 8da peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" -"2019-05-02 01:30:47.949 UTC [gossip.comm] createConnection -> DEBU 8db Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:47.950 UTC [grpc] DialContext -> DEBU 8dc parsed scheme: """ -"2019-05-02 01:30:47.950 UTC [grpc] DialContext -> DEBU 8dd scheme "" not registered, fallback to default scheme" -"2019-05-02 01:30:47.950 UTC [grpc] UpdateState -> DEBU 8de ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" -"2019-05-02 01:30:47.950 UTC [grpc] switchBalancer -> DEBU 8df ClientConn switching balancer to "pick_first"" -"2019-05-02 01:30:47.950 UTC [grpc] HandleSubConnStateChange -> DEBU 8e0 pickfirstBalancer: HandleSubConnStateChange: 0xc0027b66d0, CONNECTING" -"2019-05-02 01:30:47.950 UTC [gossip.discovery] expireDeadMembers -> WARN 8e1 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" -"2019-05-02 01:30:47.950 UTC [gossip.discovery] expireDeadMembers -> WARN 8e2 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " -"2019-05-02 01:30:47.950 UTC [gossip.comm] CloseConn -> DEBU 8e3 Closing connection for , PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:47.950 UTC [gossip.discovery] expireDeadMembers -> WARN 8e4 Exiting" -"2019-05-02 01:30:47.950 UTC [gossip.comm] serviceConnection -> DEBU 8e5 Closing reading from stream" -"2019-05-02 01:30:47.950 UTC [grpc] infof -> DEBU 8e6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:47.953 UTC [historyleveldb] Commit -> DEBU 8e7 Channel [businesschannel]: Updates committed to history database for blockNo [2]" -"2019-05-02 01:30:47.954 UTC [kvledger] CommitWithPvtData -> INFO 8e8 [businesschannel] Committed block [2] with 1 transaction(s) in 57ms (state_validation=9ms block_commit=33ms state_commit=7ms)" -"2019-05-02 01:30:47.954 UTC [msp.identity] Sign -> DEBU 8e9 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020803 " -"2019-05-02 01:30:47.954 UTC [msp.identity] Sign -> DEBU 8ea Sign: digest: 1CEE98790D2D6AD18385C2F67EDA914EC24C20FF0DB39710106BFEE68F86848E " -"2019-05-02 01:30:47.955 UTC [gossip.state] commitBlock -> DEBU 8eb [businesschannel] Committed block [2] with 1 transaction(s)" -"2019-05-02 01:30:47.958 UTC [grpc] HandleSubConnStateChange -> DEBU 8ec pickfirstBalancer: HandleSubConnStateChange: 0xc0027b66d0, READY" -"2019-05-02 01:30:47.960 UTC [msp.identity] Sign -> DEBU 8ed Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:47.961 UTC [msp.identity] Sign -> DEBU 8ee Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:47.961 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ef Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:7051" -"2019-05-02 01:30:47.963 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8f0 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:7051" -"2019-05-02 01:30:47.964 UTC [msp] DeserializeIdentity -> DEBU 8f1 Obtaining identity" -"2019-05-02 01:30:47.964 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.964 UTC [msp] DeserializeIdentity -> DEBU 8f3 Obtaining identity" -"2019-05-02 01:30:47.965 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.965 UTC [msp] DeserializeIdentity -> DEBU 8f5 Obtaining identity" -"2019-05-02 01:30:47.966 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.966 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8f7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.966 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8f8 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.966 UTC [policies] Evaluate -> DEBU 8f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.966 UTC [policies] Evaluate -> DEBU 8fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.967 UTC [policies] Evaluate -> DEBU 8fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.967 UTC [cauthdsl] func1 -> DEBU 8fc 0xc0027faec0 gate 1556760647967440400 evaluation starts" -"2019-05-02 01:30:47.967 UTC [cauthdsl] func2 -> DEBU 8fd 0xc0027faec0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.967 UTC [cauthdsl] func2 -> DEBU 8fe 0xc0027faec0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.968 UTC [cauthdsl] func2 -> DEBU 8ff 0xc0027faec0 principal matched by identity 0" -"2019-05-02 01:30:47.968 UTC [msp.identity] Verify -> DEBU 900 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-05-02 01:30:47.968 UTC [msp.identity] Verify -> DEBU 901 Verify: sig = 00000000 30 45 02 21 00 92 cb 48 51 95 f4 f3 5f b7 cb 48 |0E.!...HQ..._..H| -00000010 d8 ed 93 44 71 ca 55 41 0e 9f 9f c3 a7 2b 68 02 |...Dq.UA.....+h.| -00000020 1a 99 33 9f 39 02 20 14 02 58 a2 14 1c a6 06 cc |..3.9. ..X......| -00000030 90 a2 99 03 6f 15 37 98 aa ef c9 28 dd e7 e6 db |....o.7....(....| -00000040 f8 bc 21 5c 63 a9 d5 |..!\c..|" -"2019-05-02 01:30:47.969 UTC [cauthdsl] func2 -> DEBU 902 0xc0027faec0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.969 UTC [cauthdsl] func1 -> DEBU 903 0xc0027faec0 gate 1556760647967440400 evaluation succeeds" -"2019-05-02 01:30:47.969 UTC [policies] Evaluate -> DEBU 904 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.969 UTC [policies] Evaluate -> DEBU 905 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.969 UTC [policies] Evaluate -> DEBU 906 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.970 UTC [policies] Evaluate -> DEBU 907 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.970 UTC [gossip.comm] authenticateRemotePeer -> DEBU 908 Authenticated 192.168.240.5:7051" -"2019-05-02 01:30:47.970 UTC [gossip.comm] createConnection -> DEBU 909 Exiting" -"2019-05-02 01:30:47.970 UTC [gossip.comm] sendToEndpoint -> DEBU 90a Exiting" -"2019-05-02 01:30:47.973 UTC [gossip.comm] func1 -> DEBU 90b Got message: GossipMessage: Channel: , nonce: 1904573150992454915, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.974 UTC [gossip.gossip] handleMessage -> DEBU 90c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 1904573150992454915, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.974 UTC [gossip.gossip] handleMessage -> DEBU 90d Exiting" -"2019-05-02 01:30:47.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 90e Got message: GossipMessage: Channel: , nonce: 1904573150992454915, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -"2019-05-02 01:30:47.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 90f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:47.975 UTC [msp.identity] Verify -> DEBU 910 Verify: digest = 00000000 20 7d a0 f0 7a 70 d8 b2 b0 62 62 0e a4 89 7c 48 | }..zp...bb...|H| -00000010 6d ee 1e fb cb 48 fb ee 32 88 44 11 e9 53 02 86 |m....H..2.D..S..|" -"2019-05-02 01:30:47.975 UTC [msp.identity] Verify -> DEBU 911 Verify: sig = 00000000 30 44 02 20 73 ea bc 2e e2 33 cc 17 2a 05 2c e7 |0D. s....3..*.,.| -00000010 6f 37 c5 07 5a a6 0d a3 86 66 ef 22 92 cf d4 c8 |o7..Z....f."....| -00000020 a1 9f db a1 02 20 18 08 88 c4 56 59 2e 9d 22 96 |..... ....VY..".| -00000030 93 40 da 6d 0f 2e 4e ff dd c7 b3 77 f6 2f 4e b1 |.@.m..N....w./N.| -00000040 62 75 e3 d1 aa 49 |bu...I|" -"2019-05-02 01:30:47.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 912 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:15 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:47.976 UTC [gossip.discovery] isSentByMe -> DEBU 913 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:15 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:47.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 914 Exiting" -"2019-05-02 01:30:47.976 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 915 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:47.977 UTC [msp.identity] Verify -> DEBU 916 Verify: digest = 00000000 55 13 64 07 c3 c2 9b 1d 08 56 6f f3 ff 9d 41 67 |U.d......Vo...Ag| -00000010 77 7c be 85 23 78 cf fd 59 1b 9c ce 64 e8 02 fc |w|..#x..Y...d...|" -"2019-05-02 01:30:47.977 UTC [msp.identity] Verify -> DEBU 917 Verify: sig = 00000000 30 44 02 20 03 98 23 eb 8c 42 0b 68 d2 38 99 aa |0D. ..#..B.h.8..| -00000010 05 4a dd 56 0e 82 35 0f b3 39 19 b3 12 83 75 7b |.J.V..5..9....u{| -00000020 35 f2 90 56 02 20 5b a2 f3 e5 1f 6c e2 48 c1 7f |5..V. [....l.H..| -00000030 50 c7 d2 51 86 99 fb 30 d6 ef 0d c9 c9 4f 56 fc |P..Q...0.....OV.| -00000040 2d d5 e9 38 46 90 |-..8F.|" -"2019-05-02 01:30:47.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 918 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:47.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 919 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:30:47.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 91a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:18 " -"2019-05-02 01:30:47.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 91b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:18 " -"2019-05-02 01:30:47.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 91c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:47.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 91d Exiting" -"2019-05-02 01:30:47.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 91e Exiting" -"2019-05-02 01:30:47.979 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 91f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:30:47.979 UTC [msp] DeserializeIdentity -> DEBU 920 Obtaining identity" -"2019-05-02 01:30:47.980 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 921 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 922 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 923 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.980 UTC [policies] Evaluate -> DEBU 924 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.980 UTC [policies] Evaluate -> DEBU 925 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.981 UTC [policies] Evaluate -> DEBU 926 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.981 UTC [cauthdsl] func1 -> DEBU 927 0xc002c2bd30 gate 1556760647981271500 evaluation starts" -"2019-05-02 01:30:47.981 UTC [cauthdsl] func2 -> DEBU 928 0xc002c2bd30 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.981 UTC [cauthdsl] func2 -> DEBU 929 0xc002c2bd30 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.981 UTC [cauthdsl] func2 -> DEBU 92a 0xc002c2bd30 principal matched by identity 0" -"2019-05-02 01:30:47.982 UTC [msp.identity] Verify -> DEBU 92b Verify: digest = 00000000 59 12 61 c3 97 a1 f4 57 cd aa 79 70 6f 8f 71 5c |Y.a....W..ypo.q\| -00000010 79 5e 5b 4a 02 e3 2c ec 23 65 3f 1f 44 fc 8c 7a |y^[J..,.#e?.D..z|" -"2019-05-02 01:30:47.982 UTC [msp.identity] Verify -> DEBU 92c Verify: sig = 00000000 30 45 02 21 00 e5 8c ff 82 06 43 9d 0d b4 96 fa |0E.!......C.....| -00000010 c4 96 b3 ee 6c f6 69 5b 2e b8 6e 7c 08 a7 a5 0f |....l.i[..n|....| -00000020 e6 8f 3d 40 c0 02 20 4f 5a 42 c0 13 2f 65 7b 98 |..=@.. OZB../e{.| -00000030 28 ce a0 23 66 51 77 88 e7 d1 e2 79 1f a7 68 2e |(..#fQw....y..h.| -00000040 c2 1a 73 ec 85 7f 6d |..s...m|" -"2019-05-02 01:30:47.982 UTC [cauthdsl] func2 -> DEBU 92d 0xc002c2bd30 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.983 UTC [cauthdsl] func1 -> DEBU 92e 0xc002c2bd30 gate 1556760647981271500 evaluation succeeds" -"2019-05-02 01:30:47.983 UTC [policies] Evaluate -> DEBU 92f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.983 UTC [policies] Evaluate -> DEBU 930 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.984 UTC [policies] Evaluate -> DEBU 931 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.984 UTC [policies] Evaluate -> DEBU 932 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.985 UTC [gossip.discovery] handleAliveMessage -> DEBU 933 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:47.985 UTC [gossip.discovery] learnNewMembers -> DEBU 934 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}" -"2019-05-02 01:30:47.985 UTC [gossip.discovery] learnNewMembers -> DEBU 935 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:47.985 UTC [gossip.discovery] learnNewMembers -> DEBU 936 Exiting" -"2019-05-02 01:30:47.986 UTC [gossip.discovery] handleAliveMessage -> DEBU 937 Exiting" -"2019-05-02 01:30:47.986 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 938 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:47.986 UTC [msp] DeserializeIdentity -> DEBU 939 Obtaining identity" -"2019-05-02 01:30:47.987 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 93a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:47.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 93b Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 93c Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:47.987 UTC [policies] Evaluate -> DEBU 93d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:47.987 UTC [policies] Evaluate -> DEBU 93e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:47.988 UTC [policies] Evaluate -> DEBU 93f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:47.988 UTC [cauthdsl] func1 -> DEBU 940 0xc002c57b40 gate 1556760647988423200 evaluation starts" -"2019-05-02 01:30:47.988 UTC [cauthdsl] func2 -> DEBU 941 0xc002c57b40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:47.988 UTC [cauthdsl] func2 -> DEBU 942 0xc002c57b40 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:47.989 UTC [cauthdsl] func2 -> DEBU 943 0xc002c57b40 principal matched by identity 0" -"2019-05-02 01:30:47.989 UTC [msp.identity] Verify -> DEBU 944 Verify: digest = 00000000 84 64 45 99 78 3d f9 90 03 20 36 7e 27 2b e1 be |.dE.x=... 6~'+..| -00000010 73 f7 11 75 ab 9c 5e e9 fa 27 65 cb e5 bd 83 fe |s..u..^..'e.....|" -"2019-05-02 01:30:47.989 UTC [msp.identity] Verify -> DEBU 945 Verify: sig = 00000000 30 45 02 21 00 80 c2 2d 65 49 aa 1b 00 27 bb f6 |0E.!...-eI...'..| -00000010 35 78 f5 02 a1 da fc 2f aa 30 b1 91 18 65 25 63 |5x...../.0...e%c| -00000020 d4 63 f1 8d db 02 20 3f b4 2c d2 77 86 ee b2 b5 |.c.... ?.,.w....| -00000030 cc 87 d2 81 60 9b 14 be 96 7d e8 b5 1a 7d 15 26 |....`....}...}.&| -00000040 c1 c3 95 57 fb c6 60 |...W..`|" -"2019-05-02 01:30:47.990 UTC [cauthdsl] func2 -> DEBU 946 0xc002c57b40 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:47.990 UTC [cauthdsl] func1 -> DEBU 947 0xc002c57b40 gate 1556760647988423200 evaluation succeeds" -"2019-05-02 01:30:47.990 UTC [policies] Evaluate -> DEBU 948 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.990 UTC [policies] Evaluate -> DEBU 949 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:47.991 UTC [policies] Evaluate -> DEBU 94a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:47.991 UTC [policies] Evaluate -> DEBU 94b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:47.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 94c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:6 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:47.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 94d got old alive message about dead peer Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 lastDeadTS: 1556760633527025900, 16 but got ts: inc_num:1556760633527025900 seq_num:6 " -"2019-05-02 01:30:47.992 UTC [gossip.discovery] handleAliveMessage -> DEBU 94e Exiting" -"2019-05-02 01:30:47.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 94f Exiting" -"2019-05-02 01:30:48.463 UTC [comm.grpc.server] 1 -> INFO 950 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:30:50.462Z grpc.peer_address=192.168.240.6:44982 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.8µs -"2019-05-02 01:30:48.464 UTC [msp.identity] Sign -> DEBU 951 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:48.464 UTC [msp.identity] Sign -> DEBU 952 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:48.465 UTC [gossip.comm] authenticateRemotePeer -> DEBU 953 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.6:44982" -"2019-05-02 01:30:48.466 UTC [gossip.comm] authenticateRemotePeer -> DEBU 954 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:44982" -"2019-05-02 01:30:48.467 UTC [msp.identity] Verify -> DEBU 955 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-05-02 01:30:48.467 UTC [msp.identity] Verify -> DEBU 956 Verify: sig = 00000000 30 45 02 21 00 93 9f bb c3 94 0d 2b 22 14 ff 02 |0E.!.......+"...| -00000010 27 d7 fd f0 f4 9a 7b 5c df 9c b7 0d f9 c0 20 68 |'.....{\...... h| -00000020 4c 0d 92 89 e4 02 20 76 1c 02 e7 6e 97 e1 b6 37 |L..... v...n...7| -00000030 54 75 51 f0 52 1d 6c 29 fa 0c 1b 22 99 aa 9b 6b |TuQ.R.l)..."...k| -00000040 6b 18 4d cd 74 78 11 |k.M.tx.|" -"2019-05-02 01:30:48.468 UTC [gossip.comm] authenticateRemotePeer -> DEBU 957 Authenticated 192.168.240.6:44982" -"2019-05-02 01:30:48.468 UTC [gossip.comm] GossipStream -> DEBU 958 Servicing 192.168.240.6:44982" -"2019-05-02 01:30:48.471 UTC [gossip.gossip] handleMessage -> DEBU 959 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:48.471 UTC [gossip.gossip] handleMessage -> DEBU 95a Exiting" -"2019-05-02 01:30:48.471 UTC [gossip.discovery] handleMsgFromComm -> DEBU 95b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:48.471 UTC [gossip.comm] func1 -> DEBU 95c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.472 UTC [gossip.gossip] handleMessage -> DEBU 95d Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.473 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 95e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:48.475 UTC [msp.identity] Verify -> DEBU 95f Verify: digest = 00000000 ee 1b 92 60 96 30 bc 79 a7 2c 86 4e 3f d3 2c aa |...`.0.y.,.N?.,.| -00000010 c6 9e 44 e1 2c 1d 86 15 08 e6 e7 c4 21 c1 12 dd |..D.,.......!...|" -"2019-05-02 01:30:48.475 UTC [msp.identity] Verify -> DEBU 960 Verify: sig = 00000000 30 44 02 20 54 c2 dc 7c f0 53 e9 6e 79 56 c8 cc |0D. T..|.S.nyV..| -00000010 03 b5 0e 95 47 a8 ff 2d 05 83 74 fd 0e ea 7c 7d |....G..-..t...|}| -00000020 bb 20 33 08 02 20 02 d0 77 89 13 5e 75 60 71 c3 |. 3.. ..w..^u`q.| -00000030 e9 bb 94 fc 55 2a 59 8d 9f 43 95 cc 01 1b 7e d7 |....U*Y..C....~.| -00000040 08 d4 ee 5f be 56 |..._.V|" -"2019-05-02 01:30:48.478 UTC [msp.identity] Verify -> DEBU 961 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:23.165 UTC [msp.identity] Verify -> DEBU 90a Verify: sig = 00000000 30 44 02 20 59 45 5d e8 5d 24 f9 9d b3 3b 40 ba |0D. YE].]$...;@.| +00000010 48 31 87 a6 31 59 7a 8b be 27 c3 f3 37 94 6c 20 |H1..1Yz..'..7.l | +00000020 9d e3 a0 fe 02 20 74 98 51 b1 87 d2 78 d7 aa e6 |..... t.Q...x...| +00000030 7e b2 38 4e 93 1d 61 9f 10 f8 8c 3d 00 e6 76 50 |~.8N..a....=..vP| +00000040 82 ac 8f 61 a4 97 |...a..|" +"2019-05-02 09:27:23.166 UTC [cauthdsl] func2 -> DEBU 90b 0xc0038af780 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:23.166 UTC [cauthdsl] func1 -> DEBU 90c 0xc0038af780 gate 1556789243164671300 evaluation succeeds" +"2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 90d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 90e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 90f Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:23.166 UTC [policies] Evaluate -> DEBU 910 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:23.166 UTC [gossip.comm] authenticateRemotePeer -> DEBU 911 Authenticated 172.18.0.5:56896" +"2019-05-02 09:27:23.171 UTC [gossip.comm] GossipStream -> DEBU 912 Servicing 172.18.0.5:56896" +"2019-05-02 09:27:23.177 UTC [gossip.gossip] handleMessage -> DEBU 913 Entering, 172.18.0.5:56896 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-05-02 09:27:23.177 UTC [gossip.gossip] handleMessage -> DEBU 914 Exiting" +"2019-05-02 09:27:23.178 UTC [gossip.discovery] handleMsgFromComm -> DEBU 915 Got message: GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-05-02 09:27:23.178 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 916 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:23.178 UTC [msp] DeserializeIdentity -> DEBU 917 Obtaining identity" +"2019-05-02 09:27:23.179 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 918 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 919 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 91a Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.179 UTC [policies] Evaluate -> DEBU 91b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:23.179 UTC [policies] Evaluate -> DEBU 91c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:23.180 UTC [policies] Evaluate -> DEBU 91d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:23.180 UTC [cauthdsl] func1 -> DEBU 91e 0xc003911640 gate 1556789243180251700 evaluation starts" +"2019-05-02 09:27:23.180 UTC [cauthdsl] func2 -> DEBU 91f 0xc003911640 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.180 UTC [cauthdsl] func2 -> DEBU 920 0xc003911640 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.181 UTC [cauthdsl] func2 -> DEBU 921 0xc003911640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:23.181 UTC [cauthdsl] func2 -> DEBU 922 0xc003911640 principal evaluation fails" +"2019-05-02 09:27:23.181 UTC [cauthdsl] func1 -> DEBU 923 0xc003911640 gate 1556789243180251700 evaluation fails" +"2019-05-02 09:27:23.181 UTC [policies] Evaluate -> DEBU 924 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.182 UTC [policies] Evaluate -> DEBU 925 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.182 UTC [policies] Evaluate -> DEBU 926 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:23.182 UTC [cauthdsl] func1 -> DEBU 927 0xc003911e80 gate 1556789243182363400 evaluation starts" +"2019-05-02 09:27:23.182 UTC [cauthdsl] func2 -> DEBU 928 0xc003911e80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.182 UTC [cauthdsl] func2 -> DEBU 929 0xc003911e80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.183 UTC [cauthdsl] func2 -> DEBU 92a 0xc003911e80 principal matched by identity 0" +"2019-05-02 09:27:23.183 UTC [msp.identity] Verify -> DEBU 92b Verify: digest = 00000000 18 43 a4 a2 92 99 84 99 c1 e5 db 1c cc e5 ba 99 |.C..............| +00000010 70 13 a6 19 5f ce a4 93 ee b0 cc 56 01 24 0e 5f |p..._......V.$._|" +"2019-05-02 09:27:23.183 UTC [msp.identity] Verify -> DEBU 92c Verify: sig = 00000000 30 45 02 21 00 d3 cf 39 98 e5 fd 5c 23 9a e6 78 |0E.!...9...\#..x| +00000010 c4 d4 d3 54 63 fb dc 8d b1 06 10 80 da 9e f9 f3 |...Tc...........| +00000020 c0 ae c2 d5 0d 02 20 4d b0 64 ec 8b ec 11 4c 28 |...... M.d....L(| +00000030 25 b8 3c ab 18 5f e5 a7 2b 53 88 82 89 6a fd 6e |%.<.._..+S...j.n| +00000040 c6 81 84 3e 98 26 fb |...>.&.|" +"2019-05-02 09:27:23.183 UTC [cauthdsl] func2 -> DEBU 92d 0xc003911e80 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:23.184 UTC [cauthdsl] func1 -> DEBU 92e 0xc003911e80 gate 1556789243182363400 evaluation succeeds" +"2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 92f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 930 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 931 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:23.184 UTC [policies] Evaluate -> DEBU 932 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:23.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 933 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:23.185 UTC [gossip.discovery] learnNewMembers -> DEBU 934 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}" +"2019-05-02 09:27:23.186 UTC [gossip.discovery] learnNewMembers -> DEBU 935 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:23.186 UTC [gossip.discovery] learnNewMembers -> DEBU 936 Exiting" +"2019-05-02 09:27:23.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 937 Exiting" +"2019-05-02 09:27:23.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 938 Exiting" +"2019-05-02 09:27:23.188 UTC [gossip.discovery] sendMemResponse -> DEBU 939 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:23.189 UTC [msp] DeserializeIdentity -> DEBU 93a Obtaining identity" +"2019-05-02 09:27:23.189 UTC [msp] DeserializeIdentity -> DEBU 93b Obtaining identity" +"2019-05-02 09:27:23.189 UTC [msp] DeserializeIdentity -> DEBU 93c Obtaining identity" +"2019-05-02 09:27:23.190 UTC [gossip.comm] Send -> DEBU 93d Entering, sending GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:23.190 UTC [gossip.discovery] sendMemResponse -> DEBU 93e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:23.191 UTC [gossip.comm] sendToEndpoint -> DEBU 93f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 327996101684606889, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" +"2019-05-02 09:27:23.192 UTC [gossip.comm] sendToEndpoint -> DEBU 940 Exiting" +"2019-05-02 09:27:23.234 UTC [comm.grpc.server] 1 -> INFO 941 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:27:25.234Z grpc.peer_address=172.18.0.5:56898 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=184.2µs +"2019-05-02 09:27:23.237 UTC [msp.identity] Sign -> DEBU 942 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:23.237 UTC [msp.identity] Sign -> DEBU 943 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:23.238 UTC [gossip.comm] authenticateRemotePeer -> DEBU 944 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:56898" +"2019-05-02 09:27:23.239 UTC [gossip.comm] authenticateRemotePeer -> DEBU 945 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:56898" +"2019-05-02 09:27:23.239 UTC [msp] DeserializeIdentity -> DEBU 946 Obtaining identity" +"2019-05-02 09:27:23.240 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 947 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.240 UTC [msp] DeserializeIdentity -> DEBU 948 Obtaining identity" +"2019-05-02 09:27:23.241 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 949 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.242 UTC [msp] DeserializeIdentity -> DEBU 94a Obtaining identity" +"2019-05-02 09:27:23.242 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 94b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.243 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 94c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.243 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 94d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.244 UTC [policies] Evaluate -> DEBU 94e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:23.244 UTC [policies] Evaluate -> DEBU 94f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:23.244 UTC [policies] Evaluate -> DEBU 950 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:23.245 UTC [cauthdsl] func1 -> DEBU 951 0xc00046b810 gate 1556789243245330300 evaluation starts" +"2019-05-02 09:27:23.245 UTC [cauthdsl] func2 -> DEBU 952 0xc00046b810 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.246 UTC [cauthdsl] func2 -> DEBU 953 0xc00046b810 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.246 UTC [cauthdsl] func2 -> DEBU 954 0xc00046b810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:23.246 UTC [cauthdsl] func2 -> DEBU 955 0xc00046b810 principal evaluation fails" +"2019-05-02 09:27:23.247 UTC [cauthdsl] func1 -> DEBU 956 0xc00046b810 gate 1556789243245330300 evaluation fails" +"2019-05-02 09:27:23.247 UTC [policies] Evaluate -> DEBU 957 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.247 UTC [policies] Evaluate -> DEBU 958 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.247 UTC [policies] Evaluate -> DEBU 959 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:23.247 UTC [cauthdsl] func1 -> DEBU 95a 0xc0004380d0 gate 1556789243247680500 evaluation starts" +"2019-05-02 09:27:23.247 UTC [cauthdsl] func2 -> DEBU 95b 0xc0004380d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.248 UTC [cauthdsl] func2 -> DEBU 95c 0xc0004380d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.248 UTC [cauthdsl] func2 -> DEBU 95d 0xc0004380d0 principal matched by identity 0" +"2019-05-02 09:27:23.248 UTC [msp.identity] Verify -> DEBU 95e Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-05-02 09:27:23.248 UTC [msp.identity] Verify -> DEBU 95f Verify: sig = 00000000 30 44 02 20 6c 28 c2 10 7e 10 c4 a0 a0 9f e9 3f |0D. l(..~......?| +00000010 44 d8 cf 24 c8 fd 6a 7e 75 f0 ac 18 76 18 2f 52 |D..$..j~u...v./R| +00000020 6b ca 05 e2 02 20 62 ed 9e 52 e4 f7 97 c1 43 a1 |k.... b..R....C.| +00000030 30 41 52 28 85 e8 dc da c4 71 90 1f c8 e3 db 58 |0AR(.....q.....X| +00000040 4e d6 fe 85 06 de |N.....|" +"2019-05-02 09:27:23.249 UTC [cauthdsl] func2 -> DEBU 960 0xc0004380d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:23.249 UTC [cauthdsl] func1 -> DEBU 961 0xc0004380d0 gate 1556789243247680500 evaluation succeeds" +"2019-05-02 09:27:23.249 UTC [policies] Evaluate -> DEBU 962 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.250 UTC [policies] Evaluate -> DEBU 963 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.250 UTC [policies] Evaluate -> DEBU 964 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:23.250 UTC [policies] Evaluate -> DEBU 965 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:23.250 UTC [gossip.comm] authenticateRemotePeer -> DEBU 966 Authenticated 172.18.0.5:56898" +"2019-05-02 09:27:23.251 UTC [gossip.comm] GossipStream -> DEBU 967 Servicing 172.18.0.5:56898" +"2019-05-02 09:27:23.251 UTC [gossip.comm] serviceConnection -> DEBU 968 Closing reading from stream" +"2019-05-02 09:27:23.252 UTC [gossip.comm] func2 -> DEBU 969 Client 172.18.0.5:56896 disconnected" +"2019-05-02 09:27:23.252 UTC [comm.grpc.server] 1 -> INFO 96a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:56896 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=99.9432ms +"2019-05-02 09:27:23.252 UTC [gossip.comm] serviceConnection -> DEBU 96c Closing reading from stream" +"2019-05-02 09:27:23.253 UTC [gossip.comm] func2 -> DEBU 96d Client 172.18.0.5:56898 disconnected" +"2019-05-02 09:27:23.253 UTC [comm.grpc.server] 1 -> INFO 96e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:27:33.236Z grpc.peer_address=172.18.0.5:56898 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=16.8045ms +"2019-05-02 09:27:23.253 UTC [gossip.comm] readFromStream -> DEBU 96f 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +"2019-05-02 09:27:23.252 UTC [gossip.comm] writeToStream -> DEBU 96b Closing writing to stream" +"2019-05-02 09:27:23.254 UTC [gossip.comm] writeToStream -> DEBU 970 Closing writing to stream" +"2019-05-02 09:27:23.254 UTC [gossip.comm] readFromStream -> DEBU 971 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +"2019-05-02 09:27:23.259 UTC [grpc] infof -> DEBU 972 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:23.259 UTC [grpc] infof -> DEBU 973 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:23.855 UTC [gossip.gossip] handleMessage -> DEBU 974 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:23.855 UTC [gossip.gossip] handleMessage -> DEBU 975 Exiting" +"2019-05-02 09:27:23.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 976 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:23.856 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 977 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:23.856 UTC [msp] DeserializeIdentity -> DEBU 978 Obtaining identity" +"2019-05-02 09:27:23.856 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 979 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.856 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 97a Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.856 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 97b Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.857 UTC [policies] Evaluate -> DEBU 97c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:23.857 UTC [policies] Evaluate -> DEBU 97d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:23.857 UTC [policies] Evaluate -> DEBU 97e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:23.857 UTC [cauthdsl] func1 -> DEBU 97f 0xc0003ce500 gate 1556789243857472100 evaluation starts" +"2019-05-02 09:27:23.857 UTC [cauthdsl] func2 -> DEBU 980 0xc0003ce500 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.857 UTC [cauthdsl] func2 -> DEBU 981 0xc0003ce500 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.858 UTC [cauthdsl] func2 -> DEBU 982 0xc0003ce500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:23.858 UTC [cauthdsl] func2 -> DEBU 983 0xc0003ce500 principal evaluation fails" +"2019-05-02 09:27:23.858 UTC [cauthdsl] func1 -> DEBU 984 0xc0003ce500 gate 1556789243857472100 evaluation fails" +"2019-05-02 09:27:23.858 UTC [policies] Evaluate -> DEBU 985 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.858 UTC [policies] Evaluate -> DEBU 986 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.858 UTC [policies] Evaluate -> DEBU 987 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:23.859 UTC [cauthdsl] func1 -> DEBU 988 0xc0003ced40 gate 1556789243859073700 evaluation starts" +"2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 989 0xc0003ced40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 98a 0xc0003ced40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 98b 0xc0003ced40 principal matched by identity 0" +"2019-05-02 09:27:23.859 UTC [msp.identity] Verify -> DEBU 98c Verify: digest = 00000000 8a 79 7c 8e a1 c8 89 ff a0 4b 14 35 bc 6c 14 0f |.y|......K.5.l..| +00000010 49 fb 7a 9e 00 8d 11 dc 98 96 4e 83 ca 3a 6e 9b |I.z.......N..:n.|" +"2019-05-02 09:27:23.859 UTC [msp.identity] Verify -> DEBU 98d Verify: sig = 00000000 30 44 02 20 78 01 c2 18 17 34 61 86 50 7a 0a 67 |0D. x....4a.Pz.g| +00000010 7c 4b 3d 16 bf 38 d3 96 de 88 b4 48 1d f5 45 a0 ||K=..8.....H..E.| +00000020 d3 b7 6c 84 02 20 22 89 26 af b8 91 6a 54 ed 8f |..l.. ".&...jT..| +00000030 23 a7 a0 af 9c 2e 72 ba 43 e0 4d 9b c5 7c da 67 |#.....r.C.M..|.g| +00000040 1f f8 a9 d1 e6 5a |.....Z|" +"2019-05-02 09:27:23.859 UTC [cauthdsl] func2 -> DEBU 98e 0xc0003ced40 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:23.860 UTC [cauthdsl] func1 -> DEBU 98f 0xc0003ced40 gate 1556789243859073700 evaluation succeeds" +"2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 990 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 992 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:23.860 UTC [policies] Evaluate -> DEBU 993 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:23.861 UTC [gossip.discovery] handleAliveMessage -> DEBU 994 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 995 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 996 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 " +"2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 997 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 " +"2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 998 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:11 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:23.861 UTC [gossip.discovery] learnExistingMembers -> DEBU 999 Exiting" +"2019-05-02 09:27:23.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 99a Exiting" +"2019-05-02 09:27:23.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 99b Exiting" +"2019-05-02 09:27:23.864 UTC [msp] DeserializeIdentity -> DEBU 99c Obtaining identity" +"2019-05-02 09:27:23.866 UTC [msp] DeserializeIdentity -> DEBU 99d Obtaining identity" +"2019-05-02 09:27:23.866 UTC [msp] DeserializeIdentity -> DEBU 99e Obtaining identity" +"2019-05-02 09:27:23.869 UTC [msp] DeserializeIdentity -> DEBU 99f Obtaining identity" +"2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a0 Obtaining identity" +"2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a1 Obtaining identity" +"2019-05-02 09:27:23.870 UTC [gossip.comm] Send -> DEBU 9a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a3 Obtaining identity" +"2019-05-02 09:27:23.870 UTC [msp] DeserializeIdentity -> DEBU 9a4 Obtaining identity" +"2019-05-02 09:27:23.871 UTC [gossip.comm] Send -> DEBU 9a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:23.871 UTC [gossip.comm] sendToEndpoint -> DEBU 9a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:23.871 UTC [gossip.comm] createConnection -> DEBU 9a7 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:23.872 UTC [grpc] DialContext -> DEBU 9a8 parsed scheme: """ +"2019-05-02 09:27:23.872 UTC [grpc] DialContext -> DEBU 9a9 scheme "" not registered, fallback to default scheme" +"2019-05-02 09:27:23.872 UTC [grpc] UpdateState -> DEBU 9aa ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 }] }" +"2019-05-02 09:27:23.872 UTC [grpc] switchBalancer -> DEBU 9ab ClientConn switching balancer to "pick_first"" +"2019-05-02 09:27:23.872 UTC [grpc] HandleSubConnStateChange -> DEBU 9ac pickfirstBalancer: HandleSubConnStateChange: 0xc0001e3880, CONNECTING" +"2019-05-02 09:27:23.872 UTC [gossip.comm] sendToEndpoint -> DEBU 9ad Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:23.872 UTC [gossip.comm] sendToEndpoint -> DEBU 9ae Exiting" +"2019-05-02 09:27:23.884 UTC [grpc] HandleSubConnStateChange -> DEBU 9af pickfirstBalancer: HandleSubConnStateChange: 0xc0001e3880, READY" +"2019-05-02 09:27:23.887 UTC [msp.identity] Sign -> DEBU 9b0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:27:23.887 UTC [msp.identity] Sign -> DEBU 9b1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:27:23.887 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9b2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:7051" +"2019-05-02 09:27:23.892 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9b3 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:7051" +"2019-05-02 09:27:23.892 UTC [msp] DeserializeIdentity -> DEBU 9b4 Obtaining identity" +"2019-05-02 09:27:23.892 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.892 UTC [msp] DeserializeIdentity -> DEBU 9b6 Obtaining identity" +"2019-05-02 09:27:23.892 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.892 UTC [msp] DeserializeIdentity -> DEBU 9b8 Obtaining identity" +"2019-05-02 09:27:23.893 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:23.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9ba Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9bb Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:23.893 UTC [policies] Evaluate -> DEBU 9bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:23.893 UTC [policies] Evaluate -> DEBU 9bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:23.893 UTC [policies] Evaluate -> DEBU 9be == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:23.893 UTC [cauthdsl] func1 -> DEBU 9bf 0xc0003a4250 gate 1556789243893451600 evaluation starts" +"2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c0 0xc0003a4250 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c1 0xc0003a4250 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c2 0xc0003a4250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:23.894 UTC [cauthdsl] func2 -> DEBU 9c3 0xc0003a4250 principal evaluation fails" +"2019-05-02 09:27:23.894 UTC [cauthdsl] func1 -> DEBU 9c4 0xc0003a4250 gate 1556789243893451600 evaluation fails" +"2019-05-02 09:27:23.894 UTC [policies] Evaluate -> DEBU 9c5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:23.895 UTC [cauthdsl] func1 -> DEBU 9c8 0xc0003a4b10 gate 1556789243895108800 evaluation starts" +"2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9c9 0xc0003a4b10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9ca 0xc0003a4b10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9cb 0xc0003a4b10 principal matched by identity 0" +"2019-05-02 09:27:23.895 UTC [msp.identity] Verify -> DEBU 9cc Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-05-02 09:27:23.895 UTC [msp.identity] Verify -> DEBU 9cd Verify: sig = 00000000 30 45 02 21 00 e8 c6 fe a6 9b 44 d0 c5 36 c3 f7 |0E.!......D..6..| +00000010 55 da b7 8d 34 d5 ec 51 dd a7 2a b0 00 62 79 0d |U...4..Q..*..by.| +00000020 de 82 36 e8 a1 02 20 51 7b 6a 66 c1 9f 16 b8 cb |..6... Q{jf.....| +00000030 1b 72 78 c6 4d 7e 74 00 7d 9c ec 81 f3 6d 43 d8 |.rx.M~t.}....mC.| +00000040 de cd d2 57 8b b7 18 |...W...|" +"2019-05-02 09:27:23.895 UTC [cauthdsl] func2 -> DEBU 9ce 0xc0003a4b10 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:23.895 UTC [cauthdsl] func1 -> DEBU 9cf 0xc0003a4b10 gate 1556789243895108800 evaluation succeeds" +"2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.895 UTC [policies] Evaluate -> DEBU 9d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:23.896 UTC [policies] Evaluate -> DEBU 9d2 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:23.896 UTC [policies] Evaluate -> DEBU 9d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:23.896 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9d4 Authenticated 172.18.0.5:7051" +"2019-05-02 09:27:23.896 UTC [gossip.comm] createConnection -> DEBU 9d5 Exiting" +"2019-05-02 09:27:23.896 UTC [gossip.comm] sendToEndpoint -> DEBU 9d6 Exiting" +"2019-05-02 09:27:24.065 UTC [msp.identity] Sign -> DEBU 9d7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151010 " +"2019-05-02 09:27:24.066 UTC [msp.identity] Sign -> DEBU 9d8 Sign: digest: D6BF6E0695D3ECF37A1BBAC784B9F14817C6B21C238B9D8ED8EF86DE7BFF3851 " +"2019-05-02 09:27:24.068 UTC [msp.identity] Sign -> DEBU 9d9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:24.068 UTC [msp.identity] Sign -> DEBU 9da Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:24.068 UTC [gossip.discovery] periodicalSendAlive -> DEBU 9db Sleeping 5s" +"2019-05-02 09:27:24.069 UTC [msp] DeserializeIdentity -> DEBU 9dc Obtaining identity" +"2019-05-02 09:27:24.070 UTC [msp] DeserializeIdentity -> DEBU 9dd Obtaining identity" +"2019-05-02 09:27:24.072 UTC [msp] DeserializeIdentity -> DEBU 9de Obtaining identity" +"2019-05-02 09:27:24.074 UTC [gossip.comm] Send -> DEBU 9df Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:24.079 UTC [gossip.comm] sendToEndpoint -> DEBU 9e0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.079 UTC [gossip.comm] sendToEndpoint -> DEBU 9e1 Exiting" +"2019-05-02 09:27:24.075 UTC [msp] DeserializeIdentity -> DEBU 9e2 Obtaining identity" +"2019-05-02 09:27:24.086 UTC [gossip.comm] Send -> DEBU 9e3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:24.086 UTC [gossip.comm] sendToEndpoint -> DEBU 9e4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.086 UTC [gossip.comm] sendToEndpoint -> DEBU 9e5 Exiting" +"2019-05-02 09:27:24.093 UTC [gossip.comm] Send -> DEBU 9e6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:24.093 UTC [gossip.comm] sendToEndpoint -> DEBU 9e7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:24.094 UTC [gossip.comm] sendToEndpoint -> DEBU 9e8 Exiting" +"2019-05-02 09:27:24.096 UTC [gossip.gossip] handleMessage -> DEBU 9e9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.097 UTC [gossip.gossip] handleMessage -> DEBU 9ea Exiting" +"2019-05-02 09:27:24.097 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9eb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.097 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9ec Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:24.097 UTC [msp.identity] Verify -> DEBU 9ed Verify: digest = 00000000 d6 bf 6e 06 95 d3 ec f3 7a 1b ba c7 84 b9 f1 48 |..n.....z......H| +00000010 17 c6 b2 1c 23 8b 9d 8e d8 ef 86 de 7b ff 38 51 |....#.......{.8Q|" +"2019-05-02 09:27:24.097 UTC [msp.identity] Verify -> DEBU 9ee Verify: sig = 00000000 30 45 02 21 00 b3 86 b6 ba 47 97 70 46 a4 5b 1a |0E.!.....G.pF.[.| +00000010 c6 08 d9 cd a1 da 36 6a a4 eb c3 7a 11 80 08 a4 |......6j...z....| +00000020 3c 5c f8 b4 f6 02 20 12 1f df 46 28 bd b8 31 fa |<\.... ...F(..1.| +00000030 97 6e 51 bc 0b 41 91 9e 3e 95 b9 a5 52 17 36 67 |.nQ..A..>...R.6g| +00000040 4b 6c a9 1f 1c ec 5c |Kl....\|" +"2019-05-02 09:27:24.098 UTC [gossip.discovery] isSentByMe -> DEBU 9ef Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9f0 Exiting" +"2019-05-02 09:27:24.118 UTC [gossip.gossip] handleMessage -> DEBU 9f1 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:24.118 UTC [gossip.gossip] handleMessage -> DEBU 9f2 Exiting" +"2019-05-02 09:27:24.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9f3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:24.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9f4 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f5 Verify: digest = 00000000 19 34 b5 65 b4 96 3c c4 b7 33 51 9b 88 09 01 ad |.4.e..<..3Q.....| +00000010 81 36 7a 4c e6 01 ae 0a fc 19 6f c2 62 b7 94 84 |.6zL......o.b...|" +"2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f6 Verify: sig = 00000000 30 45 02 21 00 a0 ce 24 96 83 db ae 98 4c d4 99 |0E.!...$.....L..| +00000010 4f eb f2 2b 58 5c a0 51 5c b5 1c 50 63 ba a6 3c |O..+X\.Q\..Pc..<| +00000020 cc ea e6 6a a3 02 20 30 d0 04 1b 14 43 8a 95 3a |...j.. 0....C..:| +00000030 0d 1a 02 b7 1a 4f 16 cf c9 74 af f1 98 a4 8a ba |.....O...t......| +00000040 a0 99 f6 5e 28 4f f0 |...^(O.|" +"2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f7 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:48.478 UTC [msp.identity] Verify -> DEBU 962 Verify: sig = 00000000 30 45 02 21 00 9b 10 96 ba ca 61 1a 2e 1e 89 1c |0E.!......a.....| -00000010 8d aa d6 9b c0 54 b2 6d bf a2 85 af 8c b3 4e 3d |.....T.m......N=| -00000020 ba a6 5e 1c 5a 02 20 73 c0 d5 fe 1b a4 93 f7 ae |..^.Z. s........| -00000030 50 79 43 75 ad 6d 34 e7 98 81 04 12 92 d2 df 51 |PyCu.m4........Q| -00000040 9c 9e d5 51 59 bb e1 |...QY..|" -"2019-05-02 01:30:48.478 UTC [gossip.discovery] handleAliveMessage -> DEBU 963 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:48.478 UTC [gossip.discovery] learnExistingMembers -> DEBU 964 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:30:48.478 UTC [gossip.discovery] learnExistingMembers -> DEBU 965 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 " -"2019-05-02 01:30:48.479 UTC [gossip.discovery] learnExistingMembers -> DEBU 966 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 " -"2019-05-02 01:30:48.479 UTC [gossip.discovery] learnExistingMembers -> DEBU 967 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:30:48.479 UTC [gossip.discovery] learnExistingMembers -> DEBU 968 Exiting" -"2019-05-02 01:30:48.479 UTC [gossip.discovery] handleAliveMessage -> DEBU 969 Exiting" -"2019-05-02 01:30:48.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 96a Exiting" -"2019-05-02 01:30:48.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 96b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 96c Exiting" -"2019-05-02 01:30:48.480 UTC [gossip.gossip] handleMessage -> DEBU 96d Exiting" -"2019-05-02 01:30:48.481 UTC [msp] DeserializeIdentity -> DEBU 96e Obtaining identity" -"2019-05-02 01:30:48.481 UTC [msp] DeserializeIdentity -> DEBU 96f Obtaining identity" -"2019-05-02 01:30:48.481 UTC [gossip.comm] Send -> DEBU 970 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:48.481 UTC [gossip.comm] sendToEndpoint -> DEBU 971 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.482 UTC [gossip.comm] createConnection -> DEBU 972 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:30:48.483 UTC [grpc] DialContext -> DEBU 973 parsed scheme: """ -"2019-05-02 01:30:48.483 UTC [grpc] DialContext -> DEBU 974 scheme "" not registered, fallback to default scheme" -"2019-05-02 01:30:48.483 UTC [grpc] UpdateState -> DEBU 975 ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 }] }" -"2019-05-02 01:30:48.483 UTC [grpc] switchBalancer -> DEBU 976 ClientConn switching balancer to "pick_first"" -"2019-05-02 01:30:48.484 UTC [grpc] HandleSubConnStateChange -> DEBU 977 pickfirstBalancer: HandleSubConnStateChange: 0xc002e18400, CONNECTING" -"2019-05-02 01:30:48.487 UTC [grpc] HandleSubConnStateChange -> DEBU 978 pickfirstBalancer: HandleSubConnStateChange: 0xc002e18400, READY" -"2019-05-02 01:30:48.490 UTC [msp.identity] Sign -> DEBU 979 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:30:48.492 UTC [msp.identity] Sign -> DEBU 97a Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:30:48.492 UTC [gossip.comm] authenticateRemotePeer -> DEBU 97b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.8:7051" -"2019-05-02 01:30:48.495 UTC [gossip.comm] authenticateRemotePeer -> DEBU 97c Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:7051" -"2019-05-02 01:30:48.495 UTC [msp] DeserializeIdentity -> DEBU 97d Obtaining identity" -"2019-05-02 01:30:48.495 UTC [grpc] infof -> DEBU 97e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:48.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 97f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:48.496 UTC [msp] DeserializeIdentity -> DEBU 980 Obtaining identity" -"2019-05-02 01:30:48.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 981 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:48.497 UTC [msp] DeserializeIdentity -> DEBU 982 Obtaining identity" -"2019-05-02 01:30:48.497 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 983 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:48.498 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 984 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.498 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 985 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.498 UTC [policies] Evaluate -> DEBU 986 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:48.498 UTC [policies] Evaluate -> DEBU 987 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:48.498 UTC [policies] Evaluate -> DEBU 988 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:48.498 UTC [cauthdsl] func1 -> DEBU 989 0xc002e35500 gate 1556760648498863600 evaluation starts" -"2019-05-02 01:30:48.499 UTC [cauthdsl] func2 -> DEBU 98a 0xc002e35500 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:48.499 UTC [cauthdsl] func2 -> DEBU 98b 0xc002e35500 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:48.499 UTC [cauthdsl] func2 -> DEBU 98c 0xc002e35500 principal matched by identity 0" -"2019-05-02 01:30:48.499 UTC [msp.identity] Verify -> DEBU 98d Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-05-02 01:30:48.500 UTC [msp.identity] Verify -> DEBU 98e Verify: sig = 00000000 30 44 02 20 5b a7 bb 5d 23 3d ef 6c b0 6a 3a 3d |0D. [..]#=.l.j:=| -00000010 b9 7c 3a 32 ef 32 d2 37 3b f1 ed 38 c8 b9 ff d1 |.|:2.2.7;..8....| -00000020 0c 0f 7f fd 02 20 2a 8c 01 4f 33 a0 93 6d 9c f6 |..... *..O3..m..| -00000030 8d 42 22 fb 47 a5 ca e1 c0 50 fd d7 88 38 01 1c |.B".G....P...8..| -00000040 76 e4 f0 d4 19 2b |v....+|" -"2019-05-02 01:30:48.500 UTC [cauthdsl] func2 -> DEBU 98f 0xc002e35500 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:48.500 UTC [cauthdsl] func1 -> DEBU 990 0xc002e35500 gate 1556760648498863600 evaluation succeeds" -"2019-05-02 01:30:48.501 UTC [policies] Evaluate -> DEBU 991 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.501 UTC [policies] Evaluate -> DEBU 992 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.501 UTC [policies] Evaluate -> DEBU 993 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:48.501 UTC [policies] Evaluate -> DEBU 994 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:48.501 UTC [gossip.comm] authenticateRemotePeer -> DEBU 995 Authenticated 192.168.240.8:7051" -"2019-05-02 01:30:48.501 UTC [gossip.comm] createConnection -> DEBU 996 Exiting" -"2019-05-02 01:30:48.502 UTC [gossip.comm] sendToEndpoint -> DEBU 997 Exiting" -"2019-05-02 01:30:48.538 UTC [gossip.comm] func1 -> DEBU 998 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.538 UTC [gossip.gossip] handleMessage -> DEBU 999 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.538 UTC [gossip.gossip] handleMessage -> DEBU 99a Exiting" -"2019-05-02 01:30:48.538 UTC [gossip.discovery] handleMsgFromComm -> DEBU 99b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.538 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 99c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:48.538 UTC [msp] DeserializeIdentity -> DEBU 99d Obtaining identity" -"2019-05-02 01:30:48.539 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 99e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:48.539 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 99f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.539 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9a0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.539 UTC [policies] Evaluate -> DEBU 9a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:48.539 UTC [policies] Evaluate -> DEBU 9a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:48.539 UTC [policies] Evaluate -> DEBU 9a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:48.540 UTC [cauthdsl] func1 -> DEBU 9a4 0xc002e19950 gate 1556760648539947400 evaluation starts" -"2019-05-02 01:30:48.540 UTC [cauthdsl] func2 -> DEBU 9a5 0xc002e19950 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:48.540 UTC [cauthdsl] func2 -> DEBU 9a6 0xc002e19950 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:48.540 UTC [cauthdsl] func2 -> DEBU 9a7 0xc002e19950 principal matched by identity 0" -"2019-05-02 01:30:48.540 UTC [msp.identity] Verify -> DEBU 9a8 Verify: digest = 00000000 45 e7 da 83 a9 da 8a ea b5 f4 bd 7b b3 88 d9 38 |E..........{...8| -00000010 d4 f6 fe 77 ba 22 26 55 ea 5f 53 43 32 dd 10 7b |...w."&U._SC2..{|" -"2019-05-02 01:30:48.540 UTC [msp.identity] Verify -> DEBU 9a9 Verify: sig = 00000000 30 44 02 20 04 7b a9 a5 4d 1b fe 59 18 19 22 23 |0D. .{..M..Y.."#| -00000010 71 0b f7 05 38 7e d9 64 82 1b b1 1b f9 ea 01 cd |q...8~.d........| -00000020 63 8b 13 b6 02 20 39 5d c1 dc ab 0e d9 18 89 b1 |c.... 9]........| -00000030 79 a2 81 67 3a 6a 7a 12 cd ce 11 74 d9 ba b3 fb |y..g:jz....t....| -00000040 74 3c ad b6 d8 37 |t<...7|" -"2019-05-02 01:30:48.541 UTC [cauthdsl] func2 -> DEBU 9aa 0xc002e19950 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:48.541 UTC [cauthdsl] func1 -> DEBU 9ab 0xc002e19950 gate 1556760648539947400 evaluation succeeds" -"2019-05-02 01:30:48.542 UTC [policies] Evaluate -> DEBU 9ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.542 UTC [policies] Evaluate -> DEBU 9ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.542 UTC [policies] Evaluate -> DEBU 9ae Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:48.542 UTC [policies] Evaluate -> DEBU 9af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:48.542 UTC [gossip.discovery] handleAliveMessage -> DEBU 9b0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.542 UTC [gossip.discovery] resurrectMember -> DEBU 9b1 Entering, AliveMessage: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes t: {1556760633527025900 17 {} [] 0}" -"2019-05-02 01:30:48.542 UTC [gossip.discovery] resurrectMember -> DEBU 9b2 Exiting" -"2019-05-02 01:30:48.543 UTC [gossip.discovery] handleAliveMessage -> DEBU 9b3 Exiting" -"2019-05-02 01:30:48.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9b4 Exiting" -"2019-05-02 01:30:48.546 UTC [msp] DeserializeIdentity -> DEBU 9b5 Obtaining identity" -"2019-05-02 01:30:48.546 UTC [msp] DeserializeIdentity -> DEBU 9b6 Obtaining identity" -"2019-05-02 01:30:48.547 UTC [msp] DeserializeIdentity -> DEBU 9b7 Obtaining identity" -"2019-05-02 01:30:48.547 UTC [msp] DeserializeIdentity -> DEBU 9b8 Obtaining identity" -"2019-05-02 01:30:48.547 UTC [msp] DeserializeIdentity -> DEBU 9b9 Obtaining identity" -"2019-05-02 01:30:48.548 UTC [msp] DeserializeIdentity -> DEBU 9ba Obtaining identity" -"2019-05-02 01:30:48.548 UTC [msp] DeserializeIdentity -> DEBU 9bb Obtaining identity" -"2019-05-02 01:30:48.549 UTC [gossip.comm] Send -> DEBU 9bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:48.549 UTC [msp] DeserializeIdentity -> DEBU 9bd Obtaining identity" -"2019-05-02 01:30:48.549 UTC [gossip.comm] sendToEndpoint -> DEBU 9be Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.549 UTC [gossip.comm] sendToEndpoint -> DEBU 9bf Exiting" -"2019-05-02 01:30:48.550 UTC [gossip.comm] Send -> DEBU 9c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:48.551 UTC [gossip.comm] sendToEndpoint -> DEBU 9c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.551 UTC [gossip.comm] sendToEndpoint -> DEBU 9c2 Exiting" -"2019-05-02 01:30:48.553 UTC [gossip.gossip] handleMessage -> DEBU 9c3 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.553 UTC [gossip.gossip] handleMessage -> DEBU 9c4 Exiting" -"2019-05-02 01:30:48.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9c5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9c6 Exiting" -"2019-05-02 01:30:48.616 UTC [msp.identity] Sign -> DEBU 9c7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151010 " -"2019-05-02 01:30:48.617 UTC [msp.identity] Sign -> DEBU 9c8 Sign: digest: 160F5EEBA4FDCF335D1CAB5F3FB3EDFB1E37B7B50B975717033A33F471E55ABE " -"2019-05-02 01:30:48.617 UTC [msp.identity] Sign -> DEBU 9c9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:48.617 UTC [msp.identity] Sign -> DEBU 9ca Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:48.618 UTC [gossip.discovery] periodicalSendAlive -> DEBU 9cb Sleeping 5s" -"2019-05-02 01:30:48.628 UTC [msp] DeserializeIdentity -> DEBU 9cc Obtaining identity" -"2019-05-02 01:30:48.628 UTC [msp] DeserializeIdentity -> DEBU 9cd Obtaining identity" -"2019-05-02 01:30:48.630 UTC [gossip.comm] Send -> DEBU 9ce Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:48.631 UTC [gossip.comm] sendToEndpoint -> DEBU 9cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:48.631 UTC [gossip.comm] sendToEndpoint -> DEBU 9d0 Exiting" -"2019-05-02 01:30:48.633 UTC [msp] DeserializeIdentity -> DEBU 9d1 Obtaining identity" -"2019-05-02 01:30:48.633 UTC [gossip.comm] Send -> DEBU 9d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:48.634 UTC [gossip.comm] sendToEndpoint -> DEBU 9d3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.634 UTC [gossip.comm] sendToEndpoint -> DEBU 9d4 Exiting" -"2019-05-02 01:30:48.636 UTC [msp] DeserializeIdentity -> DEBU 9d5 Obtaining identity" -"2019-05-02 01:30:48.636 UTC [gossip.comm] Send -> DEBU 9d6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:48.637 UTC [gossip.comm] sendToEndpoint -> DEBU 9d7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.637 UTC [gossip.comm] sendToEndpoint -> DEBU 9d8 Exiting" -"2019-05-02 01:30:48.759 UTC [gossip.comm] func1 -> DEBU 9d9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:48.760 UTC [gossip.gossip] handleMessage -> DEBU 9da Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:48.760 UTC [gossip.gossip] handleMessage -> DEBU 9db Exiting" -"2019-05-02 01:30:48.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:48.760 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9dd Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:30:48.760 UTC [msp] DeserializeIdentity -> DEBU 9de Obtaining identity" -"2019-05-02 01:30:48.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:48.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9e0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9e1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.761 UTC [policies] Evaluate -> DEBU 9e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:48.761 UTC [policies] Evaluate -> DEBU 9e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:48.762 UTC [policies] Evaluate -> DEBU 9e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:48.762 UTC [cauthdsl] func1 -> DEBU 9e5 0xc002eac930 gate 1556760648762270900 evaluation starts" -"2019-05-02 01:30:48.762 UTC [cauthdsl] func2 -> DEBU 9e6 0xc002eac930 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:48.762 UTC [cauthdsl] func2 -> DEBU 9e7 0xc002eac930 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:48.762 UTC [cauthdsl] func2 -> DEBU 9e8 0xc002eac930 principal matched by identity 0" -"2019-05-02 01:30:48.762 UTC [msp.identity] Verify -> DEBU 9e9 Verify: digest = 00000000 cb 70 69 4a 3d 3b 44 29 3c a1 3b 11 d2 87 56 57 |.piJ=;D)<.;...VW| -00000010 f1 60 c3 07 f8 18 fe da 91 da f7 26 2c a5 75 55 |.`.........&,.uU|" -"2019-05-02 01:30:48.763 UTC [msp.identity] Verify -> DEBU 9ea Verify: sig = 00000000 30 45 02 21 00 a6 e3 6e 87 a5 0f 1c e8 87 d5 e2 |0E.!...n........| -00000010 2d c7 2a c2 d1 5d 71 7a c2 25 c7 e5 3d b1 1f fb |-.*..]qz.%..=...| -00000020 80 f4 dc 42 ec 02 20 17 26 c8 9b 3e f2 da 78 ac |...B.. .&..>..x.| -00000030 09 a4 56 4a fa 50 d5 9d 18 71 44 b9 72 d0 b3 64 |..VJ.P...qD.r..d| -00000040 59 94 24 62 04 d4 44 |Y.$b..D|" -"2019-05-02 01:30:48.763 UTC [cauthdsl] func2 -> DEBU 9eb 0xc002eac930 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:48.763 UTC [cauthdsl] func1 -> DEBU 9ec 0xc002eac930 gate 1556760648762270900 evaluation succeeds" -"2019-05-02 01:30:48.763 UTC [policies] Evaluate -> DEBU 9ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.763 UTC [policies] Evaluate -> DEBU 9ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.764 UTC [policies] Evaluate -> DEBU 9ef Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:48.764 UTC [policies] Evaluate -> DEBU 9f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:48.764 UTC [gossip.discovery] handleAliveMessage -> DEBU 9f1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:48.764 UTC [gossip.discovery] learnExistingMembers -> DEBU 9f2 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:30:48.764 UTC [gossip.discovery] learnExistingMembers -> DEBU 9f3 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 " -"2019-05-02 01:30:48.765 UTC [gossip.discovery] learnExistingMembers -> DEBU 9f4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 " -"2019-05-02 01:30:48.765 UTC [gossip.discovery] learnExistingMembers -> DEBU 9f5 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:48.765 UTC [gossip.discovery] learnExistingMembers -> DEBU 9f6 Exiting" -"2019-05-02 01:30:48.765 UTC [gossip.discovery] handleAliveMessage -> DEBU 9f7 Exiting" -"2019-05-02 01:30:48.765 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9f8 Exiting" -"2019-05-02 01:30:48.768 UTC [msp] DeserializeIdentity -> DEBU 9f9 Obtaining identity" -"2019-05-02 01:30:48.768 UTC [msp] DeserializeIdentity -> DEBU 9fa Obtaining identity" -"2019-05-02 01:30:48.768 UTC [msp] DeserializeIdentity -> DEBU 9fb Obtaining identity" -"2019-05-02 01:30:48.768 UTC [msp] DeserializeIdentity -> DEBU 9fc Obtaining identity" -"2019-05-02 01:30:48.768 UTC [msp] DeserializeIdentity -> DEBU 9fd Obtaining identity" -"2019-05-02 01:30:48.769 UTC [msp] DeserializeIdentity -> DEBU 9fe Obtaining identity" -"2019-05-02 01:30:48.769 UTC [msp] DeserializeIdentity -> DEBU 9ff Obtaining identity" -"2019-05-02 01:30:48.769 UTC [gossip.comm] Send -> DEBU a00 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:48.769 UTC [msp] DeserializeIdentity -> DEBU a01 Obtaining identity" -"2019-05-02 01:30:48.770 UTC [gossip.comm] Send -> DEBU a02 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:48.770 UTC [gossip.comm] sendToEndpoint -> DEBU a03 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:48.770 UTC [gossip.comm] sendToEndpoint -> DEBU a04 Exiting" -"2019-05-02 01:30:48.771 UTC [gossip.comm] func1 -> DEBU a05 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:48.771 UTC [gossip.gossip] handleMessage -> DEBU a06 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:48.772 UTC [gossip.gossip] handleMessage -> DEBU a07 Exiting" -"2019-05-02 01:30:48.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU a08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:48.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU a09 Exiting" -"2019-05-02 01:30:48.773 UTC [gossip.comm] sendToEndpoint -> DEBU a0a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:48.773 UTC [gossip.comm] sendToEndpoint -> DEBU a0b Exiting" -"2019-05-02 01:30:48.861 UTC [msp] DeserializeIdentity -> DEBU a0c Obtaining identity" -"2019-05-02 01:30:48.862 UTC [msp] DeserializeIdentity -> DEBU a0d Obtaining identity" -"2019-05-02 01:30:48.862 UTC [gossip.comm] Send -> DEBU a0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:30:48.863 UTC [gossip.comm] sendToEndpoint -> DEBU a0f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.863 UTC [gossip.comm] sendToEndpoint -> DEBU a11 Exiting" -"2019-05-02 01:30:48.863 UTC [gossip.comm] sendToEndpoint -> DEBU a12 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.864 UTC [gossip.comm] sendToEndpoint -> DEBU a13 Exiting" -"2019-05-02 01:30:48.863 UTC [gossip.comm] sendToEndpoint -> DEBU a10 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.865 UTC [gossip.comm] sendToEndpoint -> DEBU a14 Exiting" -"2019-05-02 01:30:48.866 UTC [msp] DeserializeIdentity -> DEBU a15 Obtaining identity" -"2019-05-02 01:30:48.866 UTC [msp] DeserializeIdentity -> DEBU a16 Obtaining identity" -"2019-05-02 01:30:48.867 UTC [gossip.comm] Send -> DEBU a17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760647954638000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" -"2019-05-02 01:30:48.867 UTC [msp] DeserializeIdentity -> DEBU a18 Obtaining identity" -"2019-05-02 01:30:48.868 UTC [msp] DeserializeIdentity -> DEBU a19 Obtaining identity" -"2019-05-02 01:30:48.868 UTC [gossip.gossip] handleMessage -> DEBU a1a Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.868 UTC [gossip.comm] sendToEndpoint -> DEBU a1b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760647954638000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.869 UTC [gossip.comm] sendToEndpoint -> DEBU a1c Exiting" -"2019-05-02 01:30:48.869 UTC [gossip.comm] sendToEndpoint -> DEBU a1d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760647954638000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.870 UTC [gossip.comm] sendToEndpoint -> DEBU a1e Exiting" -"2019-05-02 01:30:48.870 UTC [gossip.comm] sendToEndpoint -> DEBU a1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760647954638000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:48.871 UTC [gossip.comm] sendToEndpoint -> DEBU a21 Exiting" -"2019-05-02 01:30:48.870 UTC [msp.identity] Verify -> DEBU a20 Verify: digest = 00000000 cf 01 3b 4e fd fb 55 9b 5b 6e b6 30 dc f7 6f 66 |..;N..U.[n.0..of| -00000010 c1 c7 f8 cc 88 b6 ad 4a 12 c2 13 80 79 8a fa 4c |.......J....y..L|" -"2019-05-02 01:30:48.875 UTC [msp.identity] Verify -> DEBU a22 Verify: sig = 00000000 30 44 02 20 0b 26 e6 42 ad 46 0f a8 fd fd 22 95 |0D. .&.B.F....".| -00000010 a2 39 04 d3 09 f3 b7 6c 9f 34 d2 39 a3 89 61 53 |.9.....l.4.9..aS| -00000020 15 81 43 e7 02 20 01 f8 5b 0f b0 c1 e0 c1 29 b9 |..C.. ..[.....).| -00000030 b6 21 e1 28 dd 3a 50 52 e2 98 3f 3e a6 80 88 51 |.!.(.:PR..?>...Q| -00000040 c2 9a 74 94 9f aa |..t...|" -"2019-05-02 01:30:48.876 UTC [msp.identity] Verify -> DEBU a23 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:30:48.877 UTC [msp.identity] Verify -> DEBU a24 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:30:48.877 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a25 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.882 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a26 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.883 UTC [policies] Evaluate -> DEBU a27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:48.883 UTC [gossip.comm] func1 -> DEBU a28 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.884 UTC [gossip.pull] Hello -> DEBU a29 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:30:48.884 UTC [gossip.comm] Send -> DEBU a2a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:48.885 UTC [gossip.comm] sendToEndpoint -> DEBU a2b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.885 UTC [gossip.comm] sendToEndpoint -> DEBU a2c Exiting" -"2019-05-02 01:30:48.883 UTC [policies] Evaluate -> DEBU a2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:48.888 UTC [gossip.comm] func1 -> DEBU a2e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.891 UTC [policies] Evaluate -> DEBU a2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:48.893 UTC [msp] DeserializeIdentity -> DEBU a30 Obtaining identity" -"2019-05-02 01:30:48.893 UTC [msp.identity] newIdentity -> DEBU a31 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:24.119 UTC [msp.identity] Verify -> DEBU 9f8 Verify: sig = 00000000 30 45 02 21 00 d8 bf c3 11 5e bf 60 92 2d 9c e6 |0E.!.....^.`.-..| +00000010 b7 e1 ef fe 6a 49 5d 48 3f d5 8b c5 d9 ed d0 b1 |....jI]H?.......| +00000020 8d 1e 92 36 ef 02 20 66 b7 9a 8e fd 5e 8d a9 fb |...6.. f....^...| +00000030 17 2f 1d 7c d5 89 4e f6 9c 42 10 c9 50 1b e5 08 |./.|..N..B..P...| +00000040 f9 1e c3 fd a5 78 11 |.....x.|" +"2019-05-02 09:27:24.127 UTC [gossip.gossip] handleMessage -> DEBU 9f9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.129 UTC [gossip.discovery] handleAliveMessage -> DEBU 9fa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:24.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fb Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:24.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fc updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 " +"2019-05-02 09:27:24.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fd Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 " +"2019-05-02 09:27:24.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 9fe Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:24.133 UTC [gossip.discovery] learnExistingMembers -> DEBU 9ff Exiting" +"2019-05-02 09:27:24.133 UTC [gossip.discovery] handleAliveMessage -> DEBU a00 Exiting" +"2019-05-02 09:27:24.134 UTC [gossip.discovery] handleMsgFromComm -> DEBU a01 Exiting" +"2019-05-02 09:27:24.135 UTC [gossip.gossip] handleMessage -> DEBU a02 Exiting" +"2019-05-02 09:27:24.135 UTC [gossip.discovery] handleMsgFromComm -> DEBU a03 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.135 UTC [gossip.discovery] handleMsgFromComm -> DEBU a04 Exiting" +"2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a05 Obtaining identity" +"2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a06 Obtaining identity" +"2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a07 Obtaining identity" +"2019-05-02 09:27:24.136 UTC [gossip.comm] Send -> DEBU a08 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:24.136 UTC [msp] DeserializeIdentity -> DEBU a09 Obtaining identity" +"2019-05-02 09:27:24.137 UTC [gossip.comm] Send -> DEBU a0a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:24.137 UTC [gossip.comm] sendToEndpoint -> DEBU a0b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.137 UTC [gossip.comm] sendToEndpoint -> DEBU a0c Exiting" +"2019-05-02 09:27:24.138 UTC [gossip.comm] sendToEndpoint -> DEBU a0d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.138 UTC [gossip.comm] sendToEndpoint -> DEBU a0e Exiting" +"2019-05-02 09:27:24.192 UTC [gossip.gossip] handleMessage -> DEBU a0f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.192 UTC [gossip.gossip] handleMessage -> DEBU a10 Exiting" +"2019-05-02 09:27:24.192 UTC [gossip.discovery] handleMsgFromComm -> DEBU a11 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.192 UTC [gossip.gossip] ValidateAliveMsg -> DEBU a12 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:24.193 UTC [msp] DeserializeIdentity -> DEBU a13 Obtaining identity" +"2019-05-02 09:27:24.193 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:24.193 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a15 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.193 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a16 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:24.193 UTC [cauthdsl] func1 -> DEBU a1a 0xc0020a2400 gate 1556789244193759600 evaluation starts" +"2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1b 0xc0020a2400 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1c 0xc0020a2400 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1d 0xc0020a2400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:24.193 UTC [cauthdsl] func2 -> DEBU a1e 0xc0020a2400 principal evaluation fails" +"2019-05-02 09:27:24.193 UTC [cauthdsl] func1 -> DEBU a1f 0xc0020a2400 gate 1556789244193759600 evaluation fails" +"2019-05-02 09:27:24.193 UTC [policies] Evaluate -> DEBU a20 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:24.194 UTC [cauthdsl] func1 -> DEBU a23 0xc0020a2c40 gate 1556789244194121800 evaluation starts" +"2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a24 0xc0020a2c40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a25 0xc0020a2c40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a26 0xc0020a2c40 principal matched by identity 0" +"2019-05-02 09:27:24.194 UTC [msp.identity] Verify -> DEBU a27 Verify: digest = 00000000 21 7c a4 01 64 7f ac 24 67 d5 7f 09 18 6e 42 62 |!|..d..$g....nBb| +00000010 91 de 4f 39 92 30 18 8e 97 8a ed 79 34 b7 ee 58 |..O9.0.....y4..X|" +"2019-05-02 09:27:24.194 UTC [msp.identity] Verify -> DEBU a28 Verify: sig = 00000000 30 45 02 21 00 fb 9f f0 d2 14 3e 21 69 d6 a1 2f |0E.!......>!i../| +00000010 f8 05 3e 45 15 f0 33 af d8 54 96 31 a2 73 8f cb |..>E..3..T.1.s..| +00000020 5f d1 ae 8f ac 02 20 6f 37 67 40 2a b8 e3 d4 7c |_..... o7g@*...|| +00000030 c0 70 2a a6 99 df 60 61 17 19 d9 3f bd fd 39 03 |.p*...`a...?..9.| +00000040 1c 59 97 54 d3 a1 47 |.Y.T..G|" +"2019-05-02 09:27:24.194 UTC [cauthdsl] func2 -> DEBU a29 0xc0020a2c40 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:24.194 UTC [cauthdsl] func1 -> DEBU a2a 0xc0020a2c40 gate 1556789244194121800 evaluation succeeds" +"2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2d Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:24.194 UTC [policies] Evaluate -> DEBU a2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:24.194 UTC [gossip.discovery] handleAliveMessage -> DEBU a2f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a30 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a31 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 " +"2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a32 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 " +"2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a33 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:24.194 UTC [gossip.discovery] learnExistingMembers -> DEBU a34 Exiting" +"2019-05-02 09:27:24.195 UTC [gossip.discovery] handleAliveMessage -> DEBU a35 Exiting" +"2019-05-02 09:27:24.195 UTC [gossip.discovery] handleMsgFromComm -> DEBU a36 Exiting" +"2019-05-02 09:27:24.209 UTC [msp] DeserializeIdentity -> DEBU a37 Obtaining identity" +"2019-05-02 09:27:24.209 UTC [msp] DeserializeIdentity -> DEBU a38 Obtaining identity" +"2019-05-02 09:27:24.209 UTC [msp] DeserializeIdentity -> DEBU a39 Obtaining identity" +"2019-05-02 09:27:24.210 UTC [msp] DeserializeIdentity -> DEBU a3a Obtaining identity" +"2019-05-02 09:27:24.211 UTC [msp] DeserializeIdentity -> DEBU a3b Obtaining identity" +"2019-05-02 09:27:24.211 UTC [msp] DeserializeIdentity -> DEBU a3c Obtaining identity" +"2019-05-02 09:27:24.211 UTC [gossip.comm] Send -> DEBU a3d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:24.211 UTC [msp] DeserializeIdentity -> DEBU a3e Obtaining identity" +"2019-05-02 09:27:24.212 UTC [msp] DeserializeIdentity -> DEBU a3f Obtaining identity" +"2019-05-02 09:27:24.212 UTC [gossip.comm] Send -> DEBU a40 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a41 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a42 Exiting" +"2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a43 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.212 UTC [gossip.comm] sendToEndpoint -> DEBU a44 Exiting" +"2019-05-02 09:27:24.214 UTC [gossip.gossip] handleMessage -> DEBU a45 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.218 UTC [gossip.gossip] handleMessage -> DEBU a46 Exiting" +"2019-05-02 09:27:24.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU a47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.219 UTC [gossip.comm] func1 -> DEBU a48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.219 UTC [gossip.gossip] handleMessage -> DEBU a49 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU a4a Exiting" +"2019-05-02 09:27:24.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU a4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.222 UTC [gossip.discovery] handleMsgFromComm -> DEBU a4c Exiting" +"2019-05-02 09:27:24.222 UTC [gossip.gossip] handleMessage -> DEBU a4d Exiting" +"2019-05-02 09:27:24.284 UTC [msp] DeserializeIdentity -> DEBU a4e Obtaining identity" +"2019-05-02 09:27:24.284 UTC [msp] DeserializeIdentity -> DEBU a4f Obtaining identity" +"2019-05-02 09:27:24.284 UTC [gossip.comm] Send -> DEBU a50 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a51 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a52 Exiting" +"2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a54 Exiting" +"2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a55 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.284 UTC [gossip.comm] sendToEndpoint -> DEBU a56 Exiting" +"2019-05-02 09:27:24.291 UTC [msp] DeserializeIdentity -> DEBU a57 Obtaining identity" +"2019-05-02 09:27:24.291 UTC [msp] DeserializeIdentity -> DEBU a58 Obtaining identity" +"2019-05-02 09:27:24.295 UTC [gossip.comm] Send -> DEBU a59 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +"2019-05-02 09:27:24.295 UTC [msp] DeserializeIdentity -> DEBU a5a Obtaining identity" +"2019-05-02 09:27:24.295 UTC [msp] DeserializeIdentity -> DEBU a5b Obtaining identity" +"2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5d Exiting" +"2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU a5f Exiting" +"2019-05-02 09:27:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU a60 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789242679257400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU a61 Exiting" +"2019-05-02 09:27:24.297 UTC [gossip.gossip] handleMessage -> DEBU a62 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.297 UTC [msp] DeserializeIdentity -> DEBU a63 Obtaining identity" +"2019-05-02 09:27:24.297 UTC [msp] DeserializeIdentity -> DEBU a64 Obtaining identity" +"2019-05-02 09:27:24.298 UTC [msp] DeserializeIdentity -> DEBU a65 Obtaining identity" +"2019-05-02 09:27:24.298 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:24.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a67 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a68 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.298 UTC [policies] Evaluate -> DEBU a69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:24.298 UTC [policies] Evaluate -> DEBU a6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:24.298 UTC [policies] Evaluate -> DEBU a6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:24.298 UTC [cauthdsl] func1 -> DEBU a6c 0xc0020c2240 gate 1556789244298951400 evaluation starts" +"2019-05-02 09:27:24.300 UTC [cauthdsl] func2 -> DEBU a6d 0xc0020c2240 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.301 UTC [cauthdsl] func2 -> DEBU a6e 0xc0020c2240 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.301 UTC [cauthdsl] func2 -> DEBU a6f 0xc0020c2240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:24.301 UTC [cauthdsl] func2 -> DEBU a70 0xc0020c2240 principal evaluation fails" +"2019-05-02 09:27:24.301 UTC [cauthdsl] func1 -> DEBU a71 0xc0020c2240 gate 1556789244298951400 evaluation fails" +"2019-05-02 09:27:24.301 UTC [policies] Evaluate -> DEBU a72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.301 UTC [policies] Evaluate -> DEBU a73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.301 UTC [policies] Evaluate -> DEBU a74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:24.302 UTC [cauthdsl] func1 -> DEBU a75 0xc002152500 gate 1556789244302086000 evaluation starts" +"2019-05-02 09:27:24.302 UTC [cauthdsl] func2 -> DEBU a76 0xc002152500 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.302 UTC [cauthdsl] func2 -> DEBU a77 0xc002152500 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.302 UTC [cauthdsl] func2 -> DEBU a78 0xc002152500 principal matched by identity 0" +"2019-05-02 09:27:24.302 UTC [msp.identity] Verify -> DEBU a79 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +"2019-05-02 09:27:24.302 UTC [msp.identity] Verify -> DEBU a7a Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +"2019-05-02 09:27:24.303 UTC [cauthdsl] func2 -> DEBU a7b 0xc002152500 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:24.303 UTC [cauthdsl] func1 -> DEBU a7c 0xc002152500 gate 1556789244302086000 evaluation succeeds" +"2019-05-02 09:27:24.303 UTC [gossip.comm] func1 -> DEBU a7d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.303 UTC [policies] Evaluate -> DEBU a7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.303 UTC [policies] Evaluate -> DEBU a7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.304 UTC [policies] Evaluate -> DEBU a81 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:24.308 UTC [policies] Evaluate -> DEBU a82 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:24.304 UTC [gossip.pull] Hello -> DEBU a80 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:24.308 UTC [msp] DeserializeIdentity -> DEBU a83 Obtaining identity" +"2019-05-02 09:27:24.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a85 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a86 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.309 UTC [policies] Evaluate -> DEBU a87 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:24.309 UTC [policies] Evaluate -> DEBU a88 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:24.309 UTC [policies] Evaluate -> DEBU a89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:24.309 UTC [cauthdsl] func1 -> DEBU a8a 0xc0021535e0 gate 1556789244309579200 evaluation starts" +"2019-05-02 09:27:24.308 UTC [gossip.comm] Send -> DEBU a84 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:24.309 UTC [cauthdsl] func2 -> DEBU a8b 0xc0021535e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.310 UTC [cauthdsl] func2 -> DEBU a8d 0xc0021535e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.311 UTC [cauthdsl] func2 -> DEBU a8e 0xc0021535e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:24.309 UTC [gossip.comm] sendToEndpoint -> DEBU a8c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.311 UTC [cauthdsl] func2 -> DEBU a8f 0xc0021535e0 principal evaluation fails" +"2019-05-02 09:27:24.312 UTC [cauthdsl] func1 -> DEBU a91 0xc0021535e0 gate 1556789244309579200 evaluation fails" +"2019-05-02 09:27:24.311 UTC [gossip.comm] sendToEndpoint -> DEBU a90 Exiting" +"2019-05-02 09:27:24.313 UTC [policies] Evaluate -> DEBU a92 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.314 UTC [policies] Evaluate -> DEBU a93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.315 UTC [policies] Evaluate -> DEBU a94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:24.316 UTC [cauthdsl] func1 -> DEBU a95 0xc0020c2bb0 gate 1556789244316374500 evaluation starts" +"2019-05-02 09:27:24.316 UTC [cauthdsl] func2 -> DEBU a96 0xc0020c2bb0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.317 UTC [cauthdsl] func2 -> DEBU a97 0xc0020c2bb0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.317 UTC [cauthdsl] func2 -> DEBU a98 0xc0020c2bb0 principal matched by identity 0" +"2019-05-02 09:27:24.317 UTC [msp.identity] Verify -> DEBU a99 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +"2019-05-02 09:27:24.318 UTC [msp.identity] Verify -> DEBU a9a Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +"2019-05-02 09:27:24.320 UTC [cauthdsl] func2 -> DEBU a9b 0xc0020c2bb0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:24.320 UTC [cauthdsl] func1 -> DEBU a9c 0xc0020c2bb0 gate 1556789244316374500 evaluation succeeds" +"2019-05-02 09:27:24.321 UTC [policies] Evaluate -> DEBU a9d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.321 UTC [policies] Evaluate -> DEBU a9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.321 UTC [policies] Evaluate -> DEBU a9f Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:24.322 UTC [policies] Evaluate -> DEBU aa0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:24.322 UTC [gossip.gossip] handleMessage -> DEBU aa1 Exiting" +"2019-05-02 09:27:24.322 UTC [gossip.gossip] handleMessage -> DEBU aa2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.323 UTC [msp.identity] Verify -> DEBU aa3 Verify: digest = 00000000 fa 73 4a 64 d2 0b 4a dc 12 d7 d6 81 12 db 4c e8 |.sJd..J.......L.| +00000010 d3 bf b6 e4 81 c6 5d 68 68 55 fe eb a9 b3 27 d3 |......]hhU....'.|" +"2019-05-02 09:27:24.324 UTC [msp.identity] Verify -> DEBU aa4 Verify: sig = 00000000 30 45 02 21 00 ff dc b6 59 78 ea e1 49 ee a6 88 |0E.!....Yx..I...| +00000010 0e 33 c7 06 51 f4 b4 84 39 aa 2a 91 66 5f f3 b6 |.3..Q...9.*.f_..| +00000020 90 35 28 c5 07 02 20 26 56 78 3e 99 16 97 0f 46 |.5(... &Vx>....F| +00000030 5a 97 9c 37 07 27 e2 0d 94 24 33 3b fe 00 ad 48 |Z..7.'...$3;...H| +00000040 0b 52 3b 94 1c c8 d7 |.R;....|" +"2019-05-02 09:27:24.324 UTC [msp.identity] Verify -> DEBU aa5 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +"2019-05-02 09:27:24.325 UTC [msp.identity] Verify -> DEBU aa6 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU aa7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU aa8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.330 UTC [policies] Evaluate -> DEBU aa9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:24.331 UTC [policies] Evaluate -> DEBU aaa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:24.331 UTC [policies] Evaluate -> DEBU aab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:24.331 UTC [msp] DeserializeIdentity -> DEBU aac Obtaining identity" +"2019-05-02 09:27:24.332 UTC [msp.identity] newIdentity -> DEBU aad Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -4171,1438 +4261,735 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE-----" -"2019-05-02 01:30:48.895 UTC [cauthdsl] func1 -> DEBU a32 0xc003022130 gate 1556760648895014300 evaluation starts" -"2019-05-02 01:30:48.895 UTC [cauthdsl] func2 -> DEBU a33 0xc003022130 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:48.895 UTC [cauthdsl] func2 -> DEBU a34 0xc003022130 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:48.896 UTC [cauthdsl] func2 -> DEBU a35 0xc003022130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:30:48.896 UTC [cauthdsl] func2 -> DEBU a36 0xc003022130 principal evaluation fails" -"2019-05-02 01:30:48.897 UTC [cauthdsl] func1 -> DEBU a37 0xc003022130 gate 1556760648895014300 evaluation fails" -"2019-05-02 01:30:48.897 UTC [policies] Evaluate -> DEBU a38 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.897 UTC [policies] Evaluate -> DEBU a39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.898 UTC [policies] Evaluate -> DEBU a3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:30:48.901 UTC [cauthdsl] func1 -> DEBU a3b 0xc0030232b0 gate 1556760648898818900 evaluation starts" -"2019-05-02 01:30:48.901 UTC [cauthdsl] func2 -> DEBU a3c 0xc0030232b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:48.901 UTC [cauthdsl] func2 -> DEBU a3d 0xc0030232b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:48.901 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a3e Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:30:48.902 UTC [msp] Validate -> DEBU a3f MSP Org1MSP validating identity" -"2019-05-02 01:30:48.902 UTC [msp] getCertificationChain -> DEBU a40 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:48.903 UTC [cauthdsl] func2 -> DEBU a41 0xc0030232b0 principal matched by identity 0" -"2019-05-02 01:30:48.904 UTC [msp.identity] Verify -> DEBU a42 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:30:48.904 UTC [msp.identity] Verify -> DEBU a43 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:30:48.905 UTC [cauthdsl] func2 -> DEBU a44 0xc0030232b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:48.905 UTC [cauthdsl] func1 -> DEBU a45 0xc0030232b0 gate 1556760648898818900 evaluation succeeds" -"2019-05-02 01:30:48.905 UTC [policies] Evaluate -> DEBU a46 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:48.906 UTC [policies] Evaluate -> DEBU a47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:48.906 UTC [policies] Evaluate -> DEBU a48 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:48.906 UTC [policies] Evaluate -> DEBU a49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:48.907 UTC [gossip.gossip] handleMessage -> DEBU a4a Exiting" -"2019-05-02 01:30:48.907 UTC [gossip.gossip] handleMessage -> DEBU a4b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.908 UTC [msp] DeserializeIdentity -> DEBU a4c Obtaining identity" -"2019-05-02 01:30:48.908 UTC [msp] DeserializeIdentity -> DEBU a4d Obtaining identity" -"2019-05-02 01:30:48.908 UTC [msp] DeserializeIdentity -> DEBU a4e Obtaining identity" -"2019-05-02 01:30:48.909 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a4f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:48.910 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a50 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.910 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a51 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.910 UTC [policies] Evaluate -> DEBU a52 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:48.911 UTC [policies] Evaluate -> DEBU a53 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:48.911 UTC [policies] Evaluate -> DEBU a54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:48.912 UTC [cauthdsl] func1 -> DEBU a55 0xc003045160 gate 1556760648912087200 evaluation starts" -"2019-05-02 01:30:48.912 UTC [cauthdsl] func2 -> DEBU a56 0xc003045160 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:48.912 UTC [cauthdsl] func2 -> DEBU a57 0xc003045160 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:48.913 UTC [cauthdsl] func2 -> DEBU a58 0xc003045160 principal matched by identity 0" -"2019-05-02 01:30:48.913 UTC [msp.identity] Verify -> DEBU a59 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -"2019-05-02 01:30:48.914 UTC [msp.identity] Verify -> DEBU a5a Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -"2019-05-02 01:30:48.914 UTC [cauthdsl] func2 -> DEBU a5b 0xc003045160 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:48.915 UTC [cauthdsl] func1 -> DEBU a5c 0xc003045160 gate 1556760648912087200 evaluation succeeds" -"2019-05-02 01:30:48.915 UTC [policies] Evaluate -> DEBU a5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.916 UTC [policies] Evaluate -> DEBU a5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.916 UTC [policies] Evaluate -> DEBU a5f Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:48.916 UTC [policies] Evaluate -> DEBU a60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:48.917 UTC [msp] DeserializeIdentity -> DEBU a61 Obtaining identity" -"2019-05-02 01:30:48.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a62 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a63 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.918 UTC [policies] Evaluate -> DEBU a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:48.918 UTC [policies] Evaluate -> DEBU a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:48.918 UTC [policies] Evaluate -> DEBU a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:48.919 UTC [cauthdsl] func1 -> DEBU a67 0xc003052260 gate 1556760648919127100 evaluation starts" -"2019-05-02 01:30:48.919 UTC [cauthdsl] func2 -> DEBU a68 0xc003052260 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:48.919 UTC [cauthdsl] func2 -> DEBU a69 0xc003052260 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:48.919 UTC [cauthdsl] func2 -> DEBU a6a 0xc003052260 principal matched by identity 0" -"2019-05-02 01:30:48.920 UTC [msp.identity] Verify -> DEBU a6b Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -"2019-05-02 01:30:48.921 UTC [msp.identity] Verify -> DEBU a6c Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -"2019-05-02 01:30:48.921 UTC [cauthdsl] func2 -> DEBU a6d 0xc003052260 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:48.921 UTC [cauthdsl] func1 -> DEBU a6e 0xc003052260 gate 1556760648919127100 evaluation succeeds" -"2019-05-02 01:30:48.922 UTC [policies] Evaluate -> DEBU a6f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.922 UTC [policies] Evaluate -> DEBU a70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.922 UTC [policies] Evaluate -> DEBU a71 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:48.923 UTC [policies] Evaluate -> DEBU a72 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:48.923 UTC [gossip.gossip] handleMessage -> DEBU a73 Exiting" -"2019-05-02 01:30:48.924 UTC [gossip.gossip] handleMessage -> DEBU a74 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1487012987430762022 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.924 UTC [gossip.pull] HandleMessage -> DEBU a75 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1487012987430762022 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.925 UTC [gossip.gossip] handleMessage -> DEBU a76 Exiting" -"2019-05-02 01:30:48.925 UTC [gossip.gossip] handleMessage -> DEBU a77 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" -"2019-05-02 01:30:48.925 UTC [msp] DeserializeIdentity -> DEBU a78 Obtaining identity" -"2019-05-02 01:30:48.926 UTC [msp] DeserializeIdentity -> DEBU a79 Obtaining identity" -"2019-05-02 01:30:48.926 UTC [msp] DeserializeIdentity -> DEBU a7a Obtaining identity" -"2019-05-02 01:30:48.927 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:48.928 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a7c Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.928 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a7d Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.929 UTC [policies] Evaluate -> DEBU a7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:48.929 UTC [policies] Evaluate -> DEBU a7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:48.929 UTC [policies] Evaluate -> DEBU a80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:48.929 UTC [cauthdsl] func1 -> DEBU a81 0xc003078290 gate 1556760648929892100 evaluation starts" -"2019-05-02 01:30:48.930 UTC [cauthdsl] func2 -> DEBU a82 0xc003078290 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:48.931 UTC [cauthdsl] func2 -> DEBU a83 0xc003078290 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:48.931 UTC [cauthdsl] func2 -> DEBU a84 0xc003078290 principal matched by identity 0" -"2019-05-02 01:30:48.931 UTC [msp.identity] Verify -> DEBU a85 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:30:48.932 UTC [msp.identity] Verify -> DEBU a86 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU a87 0xc003078290 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:48.933 UTC [cauthdsl] func1 -> DEBU a88 0xc003078290 gate 1556760648929892100 evaluation succeeds" -"2019-05-02 01:30:48.933 UTC [policies] Evaluate -> DEBU a89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.933 UTC [policies] Evaluate -> DEBU a8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.934 UTC [policies] Evaluate -> DEBU a8b Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:48.934 UTC [policies] Evaluate -> DEBU a8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:48.935 UTC [msp] DeserializeIdentity -> DEBU a8d Obtaining identity" -"2019-05-02 01:30:48.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:48.936 UTC [policies] Evaluate -> DEBU a90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:48.936 UTC [policies] Evaluate -> DEBU a91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:48.937 UTC [policies] Evaluate -> DEBU a92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:48.937 UTC [cauthdsl] func1 -> DEBU a93 0xc0030795a0 gate 1556760648937920600 evaluation starts" -"2019-05-02 01:30:48.938 UTC [cauthdsl] func2 -> DEBU a94 0xc0030795a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:48.938 UTC [cauthdsl] func2 -> DEBU a95 0xc0030795a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:48.939 UTC [cauthdsl] func2 -> DEBU a96 0xc0030795a0 principal matched by identity 0" -"2019-05-02 01:30:48.939 UTC [msp.identity] Verify -> DEBU a97 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:30:48.939 UTC [msp.identity] Verify -> DEBU a98 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU a99 0xc0030795a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:48.941 UTC [cauthdsl] func1 -> DEBU a9a 0xc0030795a0 gate 1556760648937920600 evaluation succeeds" -"2019-05-02 01:30:48.941 UTC [policies] Evaluate -> DEBU a9b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.941 UTC [policies] Evaluate -> DEBU a9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:48.942 UTC [policies] Evaluate -> DEBU a9d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:48.942 UTC [policies] Evaluate -> DEBU a9e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:48.943 UTC [gossip.gossip] handleMessage -> DEBU a9f Exiting" -"2019-05-02 01:30:49.124 UTC [gossip.gossip] handleMessage -> DEBU aa0 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.124 UTC [msp] DeserializeIdentity -> DEBU aa1 Obtaining identity" -"2019-05-02 01:30:49.125 UTC [msp] DeserializeIdentity -> DEBU aa2 Obtaining identity" -"2019-05-02 01:30:49.125 UTC [gossip.gossip] handleMessage -> DEBU aa3 Exiting" -"2019-05-02 01:30:49.130 UTC [gossip.gossip] handleMessage -> DEBU aa4 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.131 UTC [gossip.pull] HandleMessage -> DEBU aa5 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.131 UTC [gossip.pull] SendDigest -> DEBU aa6 Sending BLOCK_MSG digest: [1 2] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:49.132 UTC [gossip.gossip] handleMessage -> DEBU aa7 Exiting" -"2019-05-02 01:30:49.137 UTC [gossip.gossip] handleMessage -> DEBU aa8 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760647798862400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.138 UTC [msp.identity] Verify -> DEBU aa9 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:30:49.139 UTC [msp.identity] Verify -> DEBU aaa Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:30:49.139 UTC [gossip.gossip] handleMessage -> DEBU aab Exiting" -"2019-05-02 01:30:49.143 UTC [gossip.comm] func1 -> DEBU aac Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760647798862400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.144 UTC [gossip.gossip] handleMessage -> DEBU aad Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760647798862400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.145 UTC [msp.identity] Verify -> DEBU aae Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:30:49.146 UTC [msp.identity] Verify -> DEBU aaf Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:30:49.146 UTC [msp] DeserializeIdentity -> DEBU ab0 Obtaining identity" -"2019-05-02 01:30:49.147 UTC [gossip.gossip] handleMessage -> DEBU ab1 Exiting" -"2019-05-02 01:30:49.362 UTC [gossip.comm] func1 -> DEBU ab2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.362 UTC [gossip.gossip] handleMessage -> DEBU ab3 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.362 UTC [msp] DeserializeIdentity -> DEBU ab4 Obtaining identity" -"2019-05-02 01:30:49.362 UTC [msp] DeserializeIdentity -> DEBU ab5 Obtaining identity" -"2019-05-02 01:30:49.362 UTC [msp] DeserializeIdentity -> DEBU ab6 Obtaining identity" -"2019-05-02 01:30:49.362 UTC [gossip.gossip] handleMessage -> DEBU ab7 Exiting" -"2019-05-02 01:30:49.375 UTC [gossip.comm] func1 -> DEBU ab8 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760647645718100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.376 UTC [gossip.gossip] handleMessage -> DEBU ab9 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760647645718100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.376 UTC [msp] DeserializeIdentity -> DEBU aba Obtaining identity" -"2019-05-02 01:30:49.376 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU abb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:49.376 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU abc Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.376 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU abd Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.376 UTC [policies] Evaluate -> DEBU abe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:49.376 UTC [policies] Evaluate -> DEBU abf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:49.376 UTC [policies] Evaluate -> DEBU ac0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:49.377 UTC [cauthdsl] func1 -> DEBU ac1 0xc0030b5980 gate 1556760649377055800 evaluation starts" -"2019-05-02 01:30:49.377 UTC [cauthdsl] func2 -> DEBU ac2 0xc0030b5980 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:49.377 UTC [cauthdsl] func2 -> DEBU ac3 0xc0030b5980 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:49.377 UTC [cauthdsl] func2 -> DEBU ac4 0xc0030b5980 principal matched by identity 0" -"2019-05-02 01:30:49.377 UTC [msp.identity] Verify -> DEBU ac5 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:30:49.377 UTC [msp.identity] Verify -> DEBU ac6 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU ac7 0xc0030b5980 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:49.377 UTC [cauthdsl] func1 -> DEBU ac8 0xc0030b5980 gate 1556760649377055800 evaluation succeeds" -"2019-05-02 01:30:49.377 UTC [policies] Evaluate -> DEBU ac9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.377 UTC [policies] Evaluate -> DEBU aca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.377 UTC [policies] Evaluate -> DEBU acb Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:49.377 UTC [policies] Evaluate -> DEBU acc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:49.377 UTC [msp] DeserializeIdentity -> DEBU acd Obtaining identity" -"2019-05-02 01:30:49.378 UTC [gossip.gossip] handleMessage -> DEBU ace Exiting" -"2019-05-02 01:30:49.382 UTC [gossip.comm] func1 -> DEBU acf Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760647645718100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.382 UTC [gossip.gossip] handleMessage -> DEBU ad0 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760647645718100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.382 UTC [msp] DeserializeIdentity -> DEBU ad1 Obtaining identity" -"2019-05-02 01:30:49.382 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ad2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:49.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ad3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ad4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.382 UTC [policies] Evaluate -> DEBU ad5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:49.382 UTC [policies] Evaluate -> DEBU ad6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:49.383 UTC [policies] Evaluate -> DEBU ad7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:49.383 UTC [cauthdsl] func1 -> DEBU ad8 0xc003093c20 gate 1556760649383127400 evaluation starts" -"2019-05-02 01:30:49.383 UTC [cauthdsl] func2 -> DEBU ad9 0xc003093c20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:49.383 UTC [cauthdsl] func2 -> DEBU ada 0xc003093c20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:49.383 UTC [cauthdsl] func2 -> DEBU adb 0xc003093c20 principal matched by identity 0" -"2019-05-02 01:30:49.383 UTC [msp.identity] Verify -> DEBU adc Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:30:49.383 UTC [msp.identity] Verify -> DEBU add Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU ade 0xc003093c20 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:49.383 UTC [cauthdsl] func1 -> DEBU adf 0xc003093c20 gate 1556760649383127400 evaluation succeeds" -"2019-05-02 01:30:49.383 UTC [policies] Evaluate -> DEBU ae0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.383 UTC [policies] Evaluate -> DEBU ae1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.384 UTC [policies] Evaluate -> DEBU ae2 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:49.384 UTC [policies] Evaluate -> DEBU ae3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:49.384 UTC [msp] DeserializeIdentity -> DEBU ae4 Obtaining identity" -"2019-05-02 01:30:49.384 UTC [gossip.gossip] handleMessage -> DEBU ae5 Exiting" -"2019-05-02 01:30:49.459 UTC [gossip.gossip] handleMessage -> DEBU ae6 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.459 UTC [gossip.pull] HandleMessage -> DEBU ae7 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.459 UTC [gossip.pull] SendDigest -> DEBU ae8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:49.459 UTC [gossip.gossip] handleMessage -> DEBU ae9 Exiting" -"2019-05-02 01:30:49.460 UTC [gossip.gossip] handleMessage -> DEBU aea Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.460 UTC [gossip.gossip] handleMessage -> DEBU aeb Exiting" -"2019-05-02 01:30:49.460 UTC [gossip.discovery] handleMsgFromComm -> DEBU aec Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.461 UTC [gossip.gossip] ValidateAliveMsg -> DEBU aed Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:49.461 UTC [msp.identity] Verify -> DEBU aee Verify: digest = 00000000 ce 7f 0e 3b 0c 4e d5 14 5e b2 1b 39 4e 7a d1 5a |...;.N..^..9Nz.Z| -00000010 bb 65 54 1b 08 35 3f 61 39 7d e0 ef b4 ea 07 da |.eT..5?a9}......|" -"2019-05-02 01:30:49.461 UTC [msp.identity] Verify -> DEBU aef Verify: sig = 00000000 30 44 02 20 17 71 33 ee 63 80 6c a0 1e a4 16 7c |0D. .q3.c.l....|| -00000010 07 95 98 db 11 4a fd 91 8f e8 eb 62 c0 e4 c9 04 |.....J.....b....| -00000020 c8 d2 29 2b 02 20 79 99 52 cf 5d af b4 48 f8 38 |..)+. y.R.]..H.8| -00000030 57 0a 3b 14 71 1c ef b8 87 72 67 56 f3 0c 1f 56 |W.;.q....rgV...V| -00000040 14 52 01 9d 9f 49 |.R...I|" -"2019-05-02 01:30:49.461 UTC [msp.identity] Verify -> DEBU af0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:49.461 UTC [msp.identity] Verify -> DEBU af1 Verify: sig = 00000000 30 45 02 21 00 ad 39 6f 4d 72 05 03 5a 42 c5 3b |0E.!..9oMr..ZB.;| -00000010 70 a8 4b 2c 25 be 5f 1c ba ba 18 eb c6 c5 b7 a1 |p.K,%._.........| -00000020 0b 01 76 86 b4 02 20 4a 85 33 39 3d 1c 68 88 f5 |..v... J.39=.h..| -00000030 e7 a1 4f 96 14 db 97 93 98 7f 28 07 dc f3 5d aa |..O.......(...].| -00000040 e6 78 8e a1 9a 53 30 |.x...S0|" -"2019-05-02 01:30:49.461 UTC [gossip.discovery] handleAliveMessage -> DEBU af2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:49.461 UTC [gossip.discovery] learnExistingMembers -> DEBU af3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:30:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU af4 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 " -"2019-05-02 01:30:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU af5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 " -"2019-05-02 01:30:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU af6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU af7 Exiting" -"2019-05-02 01:30:49.462 UTC [gossip.discovery] handleAliveMessage -> DEBU af8 Exiting" -"2019-05-02 01:30:49.462 UTC [gossip.discovery] handleMsgFromComm -> DEBU af9 Exiting" -"2019-05-02 01:30:49.462 UTC [gossip.discovery] sendMemResponse -> DEBU afa Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:49.463 UTC [msp] DeserializeIdentity -> DEBU afb Obtaining identity" -"2019-05-02 01:30:49.463 UTC [msp] DeserializeIdentity -> DEBU afc Obtaining identity" -"2019-05-02 01:30:49.464 UTC [gossip.comm] Send -> DEBU afd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:49.464 UTC [gossip.discovery] sendMemResponse -> DEBU afe Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:30:49.464 UTC [gossip.comm] sendToEndpoint -> DEBU aff Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.464 UTC [gossip.comm] sendToEndpoint -> DEBU b00 Exiting" -"2019-05-02 01:30:49.534 UTC [gossip.comm] func1 -> DEBU b01 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.534 UTC [gossip.gossip] handleMessage -> DEBU b02 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.534 UTC [gossip.pull] HandleMessage -> DEBU b03 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.534 UTC [msp] DeserializeIdentity -> DEBU b04 Obtaining identity" -"2019-05-02 01:30:49.534 UTC [msp] DeserializeIdentity -> DEBU b05 Obtaining identity" -"2019-05-02 01:30:49.535 UTC [gossip.pull] SendDigest -> DEBU b06 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:49.535 UTC [gossip.gossip] handleMessage -> DEBU b07 Exiting" -"2019-05-02 01:30:49.553 UTC [gossip.comm] func1 -> DEBU b08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.553 UTC [gossip.gossip] handleMessage -> DEBU b09 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.553 UTC [gossip.gossip] handleMessage -> DEBU b0a Exiting" -"2019-05-02 01:30:49.553 UTC [gossip.discovery] handleMsgFromComm -> DEBU b0b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.553 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b0c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:49.553 UTC [msp] DeserializeIdentity -> DEBU b0d Obtaining identity" -"2019-05-02 01:30:49.554 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:49.554 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b0f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.554 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b10 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.554 UTC [policies] Evaluate -> DEBU b11 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:49.554 UTC [policies] Evaluate -> DEBU b12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:49.555 UTC [policies] Evaluate -> DEBU b13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:49.556 UTC [cauthdsl] func1 -> DEBU b14 0xc0030e8c60 gate 1556760649556157800 evaluation starts" -"2019-05-02 01:30:49.651 UTC [gossip.comm] func1 -> DEBU b15 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.651 UTC [gossip.gossip] handleMessage -> DEBU b16 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.651 UTC [msp] DeserializeIdentity -> DEBU b17 Obtaining identity" -"2019-05-02 01:30:49.652 UTC [msp] DeserializeIdentity -> DEBU b18 Obtaining identity" -"2019-05-02 01:30:49.652 UTC [msp] DeserializeIdentity -> DEBU b19 Obtaining identity" -"2019-05-02 01:30:49.657 UTC [gossip.gossip] handleMessage -> DEBU b1a Exiting" -"2019-05-02 01:30:49.695 UTC [msp.identity] Sign -> DEBU b1b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151011 " -"2019-05-02 01:30:49.696 UTC [msp.identity] Sign -> DEBU b1c Sign: digest: 3DEA49CE3AFE6C43362B27543B03F45FBFB459261ACF32CD874F78B0D407E096 " -"2019-05-02 01:30:49.697 UTC [msp.identity] Sign -> DEBU b1d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:49.697 UTC [msp.identity] Sign -> DEBU b1e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:49.708 UTC [gossip.pull] Hello -> DEBU b20 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:30:49.713 UTC [gossip.comm] Send -> DEBU b21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:49.713 UTC [gossip.pull] Hello -> DEBU b22 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:30:49.715 UTC [gossip.comm] Send -> DEBU b23 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:49.715 UTC [gossip.pull] Hello -> DEBU b24 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:30:49.718 UTC [gossip.comm] Send -> DEBU b25 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:49.719 UTC [gossip.comm] sendToEndpoint -> DEBU b26 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.719 UTC [gossip.comm] sendToEndpoint -> DEBU b27 Exiting" -"2019-05-02 01:30:49.720 UTC [gossip.comm] sendToEndpoint -> DEBU b28 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.720 UTC [gossip.comm] sendToEndpoint -> DEBU b29 Exiting" -"2019-05-02 01:30:49.720 UTC [gossip.comm] sendToEndpoint -> DEBU b2a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.720 UTC [gossip.comm] sendToEndpoint -> DEBU b2b Exiting" -"2019-05-02 01:30:49.720 UTC [gossip.comm] func1 -> DEBU b2c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760647882998300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:30:49.720 UTC [gossip.gossip] handleMessage -> DEBU b2d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760647882998300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:30:49.720 UTC [msp] DeserializeIdentity -> DEBU b2e Obtaining identity" -"2019-05-02 01:30:49.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b2f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:49.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b30 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b31 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.727 UTC [policies] Evaluate -> DEBU b32 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:49.727 UTC [policies] Evaluate -> DEBU b33 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:49.728 UTC [policies] Evaluate -> DEBU b34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:49.729 UTC [cauthdsl] func1 -> DEBU b35 0xc00316b6a0 gate 1556760649729179300 evaluation starts" -"2019-05-02 01:30:49.730 UTC [cauthdsl] func2 -> DEBU b36 0xc00316b6a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:49.730 UTC [cauthdsl] func2 -> DEBU b37 0xc00316b6a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:49.730 UTC [cauthdsl] func2 -> DEBU b38 0xc00316b6a0 principal matched by identity 0" -"2019-05-02 01:30:49.731 UTC [msp.identity] Verify -> DEBU b39 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -"2019-05-02 01:30:49.731 UTC [msp.identity] Verify -> DEBU b3a Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -"2019-05-02 01:30:49.732 UTC [cauthdsl] func2 -> DEBU b3b 0xc00316b6a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:49.733 UTC [cauthdsl] func1 -> DEBU b3c 0xc00316b6a0 gate 1556760649729179300 evaluation succeeds" -"2019-05-02 01:30:49.733 UTC [policies] Evaluate -> DEBU b3d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.733 UTC [policies] Evaluate -> DEBU b3e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.734 UTC [policies] Evaluate -> DEBU b3f Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:49.734 UTC [policies] Evaluate -> DEBU b40 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:49.735 UTC [msp] DeserializeIdentity -> DEBU b41 Obtaining identity" -"2019-05-02 01:30:49.735 UTC [gossip.gossip] handleMessage -> DEBU b42 Exiting" -"2019-05-02 01:30:49.707 UTC [gossip.comm] Send -> DEBU b1f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:49.736 UTC [msp] DeserializeIdentity -> DEBU b43 Obtaining identity" -"2019-05-02 01:30:49.736 UTC [gossip.comm] Send -> DEBU b44 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:49.737 UTC [msp] DeserializeIdentity -> DEBU b45 Obtaining identity" -"2019-05-02 01:30:49.737 UTC [gossip.comm] Send -> DEBU b46 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:49.738 UTC [gossip.comm] sendToEndpoint -> DEBU b47 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.738 UTC [gossip.comm] sendToEndpoint -> DEBU b48 Exiting" -"2019-05-02 01:30:49.738 UTC [gossip.comm] sendToEndpoint -> DEBU b49 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.738 UTC [gossip.comm] sendToEndpoint -> DEBU b4a Exiting" -"2019-05-02 01:30:49.739 UTC [gossip.comm] sendToEndpoint -> DEBU b4b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.739 UTC [gossip.comm] sendToEndpoint -> DEBU b4c Exiting" -"2019-05-02 01:30:49.744 UTC [gossip.gossip] handleMessage -> DEBU b4d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13587717929261904434 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.744 UTC [gossip.pull] HandleMessage -> DEBU b4e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13587717929261904434 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.744 UTC [gossip.gossip] handleMessage -> DEBU b4f Exiting" -"2019-05-02 01:30:49.744 UTC [gossip.gossip] handleMessage -> DEBU b50 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.745 UTC [gossip.comm] func1 -> DEBU b51 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13121253355825226892 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.745 UTC [gossip.comm] func1 -> DEBU b52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.752 UTC [cauthdsl] func2 -> DEBU b53 0xc0030e8c60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:49.752 UTC [cauthdsl] func2 -> DEBU b54 0xc0030e8c60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:49.752 UTC [cauthdsl] func2 -> DEBU b55 0xc0030e8c60 principal matched by identity 0" -"2019-05-02 01:30:49.753 UTC [msp.identity] Verify -> DEBU b56 Verify: digest = 00000000 fc 3b 4f 07 ee 02 6e 6d 28 dd 29 36 16 e5 38 9b |.;O...nm(.)6..8.| -00000010 59 12 bd 4a 3a f4 ca 66 a0 81 63 b4 ad 75 53 96 |Y..J:..f..c..uS.|" -"2019-05-02 01:30:49.754 UTC [msp.identity] Verify -> DEBU b57 Verify: sig = 00000000 30 45 02 21 00 84 bd 8b 1b ab 55 39 60 42 e3 b1 |0E.!......U9`B..| -00000010 00 86 57 a7 76 5b 90 19 81 3c 48 f8 a2 f6 73 25 |..W.v[... DEBU b58 0xc0030e8c60 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:49.755 UTC [cauthdsl] func1 -> DEBU b59 0xc0030e8c60 gate 1556760649556157800 evaluation succeeds" -"2019-05-02 01:30:49.755 UTC [policies] Evaluate -> DEBU b5a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.755 UTC [policies] Evaluate -> DEBU b5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.756 UTC [policies] Evaluate -> DEBU b5c Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:49.756 UTC [policies] Evaluate -> DEBU b5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:49.756 UTC [gossip.discovery] handleAliveMessage -> DEBU b5e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:49.757 UTC [gossip.discovery] learnExistingMembers -> DEBU b5f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:30:49.757 UTC [gossip.discovery] learnExistingMembers -> DEBU b60 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 " -"2019-05-02 01:30:49.759 UTC [gossip.discovery] learnExistingMembers -> DEBU b61 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 " -"2019-05-02 01:30:49.759 UTC [gossip.discovery] learnExistingMembers -> DEBU b62 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:30:49.759 UTC [gossip.discovery] learnExistingMembers -> DEBU b63 Exiting" -"2019-05-02 01:30:49.760 UTC [gossip.discovery] handleAliveMessage -> DEBU b64 Exiting" -"2019-05-02 01:30:49.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU b65 Exiting" -"2019-05-02 01:30:49.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU b66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.761 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b67 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:49.764 UTC [msp.identity] Verify -> DEBU b6a Verify: digest = 00000000 3d ea 49 ce 3a fe 6c 43 36 2b 27 54 3b 03 f4 5f |=.I.:.lC6+'T;.._| -00000010 bf b4 59 26 1a cf 32 cd 87 4f 78 b0 d4 07 e0 96 |..Y&..2..Ox.....|" -"2019-05-02 01:30:49.764 UTC [msp.identity] Verify -> DEBU b6b Verify: sig = 00000000 30 44 02 20 3e 4c f9 fc d3 81 ec 13 a3 04 1c 01 |0D. >L..........| -00000010 a5 48 7c d3 e2 2d b9 88 48 60 c0 e7 20 43 3b b6 |.H|..-..H`.. C;.| -00000020 92 f6 7a e3 02 20 56 a2 8b 18 a1 04 73 cb 2b 3e |..z.. V.....s.+>| -00000030 e1 f6 52 5b 77 c8 42 59 c4 6f 3a e7 66 c5 41 28 |..R[w.BY.o:.f.A(| -00000040 7f d4 13 16 84 69 |.....i|" -"2019-05-02 01:30:49.765 UTC [msp.identity] Verify -> DEBU b6c Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:27:24.333 UTC [cauthdsl] func1 -> DEBU aae 0xc002164ef0 gate 1556789244333225600 evaluation starts" +"2019-05-02 09:27:24.333 UTC [cauthdsl] func2 -> DEBU aaf 0xc002164ef0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.333 UTC [cauthdsl] func2 -> DEBU ab0 0xc002164ef0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.334 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ab1 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:27:24.334 UTC [msp] Validate -> DEBU ab2 MSP Org1MSP validating identity" +"2019-05-02 09:27:24.334 UTC [msp] getCertificationChain -> DEBU ab3 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:24.335 UTC [cauthdsl] func2 -> DEBU ab4 0xc002164ef0 principal matched by identity 0" +"2019-05-02 09:27:24.335 UTC [msp.identity] Verify -> DEBU ab5 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +"2019-05-02 09:27:24.336 UTC [msp.identity] Verify -> DEBU ab6 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU ab7 0xc002164ef0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:24.337 UTC [cauthdsl] func1 -> DEBU ab8 0xc002164ef0 gate 1556789244333225600 evaluation succeeds" +"2019-05-02 09:27:24.337 UTC [policies] Evaluate -> DEBU ab9 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.337 UTC [policies] Evaluate -> DEBU aba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.337 UTC [policies] Evaluate -> DEBU abb Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:24.338 UTC [policies] Evaluate -> DEBU abc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:24.338 UTC [gossip.gossip] handleMessage -> DEBU abd Exiting" +"2019-05-02 09:27:24.339 UTC [gossip.gossip] handleMessage -> DEBU abe Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.339 UTC [msp] DeserializeIdentity -> DEBU abf Obtaining identity" +"2019-05-02 09:27:24.340 UTC [msp] DeserializeIdentity -> DEBU ac0 Obtaining identity" +"2019-05-02 09:27:24.341 UTC [msp] DeserializeIdentity -> DEBU ac1 Obtaining identity" +"2019-05-02 09:27:24.341 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ac2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:24.342 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ac3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.342 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ac4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.343 UTC [policies] Evaluate -> DEBU ac5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:24.344 UTC [policies] Evaluate -> DEBU ac6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:24.344 UTC [policies] Evaluate -> DEBU ac7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:24.345 UTC [cauthdsl] func1 -> DEBU ac8 0xc002177c60 gate 1556789244345261300 evaluation starts" +"2019-05-02 09:27:24.345 UTC [cauthdsl] func2 -> DEBU ac9 0xc002177c60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.346 UTC [cauthdsl] func2 -> DEBU aca 0xc002177c60 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.346 UTC [cauthdsl] func2 -> DEBU acb 0xc002177c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:24.347 UTC [cauthdsl] func2 -> DEBU acc 0xc002177c60 principal evaluation fails" +"2019-05-02 09:27:24.347 UTC [cauthdsl] func1 -> DEBU acd 0xc002177c60 gate 1556789244345261300 evaluation fails" +"2019-05-02 09:27:24.347 UTC [policies] Evaluate -> DEBU ace Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.348 UTC [policies] Evaluate -> DEBU acf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.348 UTC [policies] Evaluate -> DEBU ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:24.348 UTC [cauthdsl] func1 -> DEBU ad1 0xc00218a4f0 gate 1556789244348793700 evaluation starts" +"2019-05-02 09:27:24.350 UTC [cauthdsl] func2 -> DEBU ad2 0xc00218a4f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.351 UTC [cauthdsl] func2 -> DEBU ad3 0xc00218a4f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.351 UTC [cauthdsl] func2 -> DEBU ad4 0xc00218a4f0 principal matched by identity 0" +"2019-05-02 09:27:24.351 UTC [msp.identity] Verify -> DEBU ad5 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +"2019-05-02 09:27:24.352 UTC [msp.identity] Verify -> DEBU ad6 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +00000040 83 2b b4 bb 36 ef |.+..6.|" +"2019-05-02 09:27:24.352 UTC [cauthdsl] func2 -> DEBU ad7 0xc00218a4f0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:24.353 UTC [cauthdsl] func1 -> DEBU ad8 0xc00218a4f0 gate 1556789244348793700 evaluation succeeds" +"2019-05-02 09:27:24.353 UTC [policies] Evaluate -> DEBU ad9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.353 UTC [policies] Evaluate -> DEBU ada == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.353 UTC [policies] Evaluate -> DEBU adb Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:24.354 UTC [policies] Evaluate -> DEBU adc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:24.354 UTC [msp] DeserializeIdentity -> DEBU add Obtaining identity" +"2019-05-02 09:27:24.354 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ade Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.355 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU adf Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.355 UTC [policies] Evaluate -> DEBU ae0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:24.355 UTC [policies] Evaluate -> DEBU ae1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:24.356 UTC [policies] Evaluate -> DEBU ae2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:24.356 UTC [cauthdsl] func1 -> DEBU ae3 0xc00218b5d0 gate 1556789244356351400 evaluation starts" +"2019-05-02 09:27:24.356 UTC [cauthdsl] func2 -> DEBU ae4 0xc00218b5d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.356 UTC [cauthdsl] func2 -> DEBU ae5 0xc00218b5d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.357 UTC [cauthdsl] func2 -> DEBU ae6 0xc00218b5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:24.357 UTC [cauthdsl] func2 -> DEBU ae7 0xc00218b5d0 principal evaluation fails" +"2019-05-02 09:27:24.358 UTC [cauthdsl] func1 -> DEBU ae8 0xc00218b5d0 gate 1556789244356351400 evaluation fails" +"2019-05-02 09:27:24.358 UTC [policies] Evaluate -> DEBU ae9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.358 UTC [policies] Evaluate -> DEBU aea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.358 UTC [policies] Evaluate -> DEBU aeb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:24.359 UTC [cauthdsl] func1 -> DEBU aec 0xc00218be70 gate 1556789244359183700 evaluation starts" +"2019-05-02 09:27:24.359 UTC [cauthdsl] func2 -> DEBU aed 0xc00218be70 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.359 UTC [cauthdsl] func2 -> DEBU aee 0xc00218be70 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.360 UTC [cauthdsl] func2 -> DEBU aef 0xc00218be70 principal matched by identity 0" +"2019-05-02 09:27:24.360 UTC [msp.identity] Verify -> DEBU af0 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +"2019-05-02 09:27:24.360 UTC [msp.identity] Verify -> DEBU af1 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +00000040 83 2b b4 bb 36 ef |.+..6.|" +"2019-05-02 09:27:24.360 UTC [cauthdsl] func2 -> DEBU af2 0xc00218be70 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:24.360 UTC [cauthdsl] func1 -> DEBU af3 0xc00218be70 gate 1556789244359183700 evaluation succeeds" +"2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af6 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:24.360 UTC [policies] Evaluate -> DEBU af7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:24.360 UTC [gossip.gossip] handleMessage -> DEBU af8 Exiting" +"2019-05-02 09:27:24.360 UTC [gossip.gossip] handleMessage -> DEBU af9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15805491442320967247 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.360 UTC [gossip.pull] HandleMessage -> DEBU afa GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15805491442320967247 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.360 UTC [gossip.gossip] handleMessage -> DEBU afb Exiting" +"2019-05-02 09:27:24.540 UTC [gossip.gossip] handleMessage -> DEBU afc Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.541 UTC [msp] DeserializeIdentity -> DEBU afd Obtaining identity" +"2019-05-02 09:27:24.541 UTC [msp] DeserializeIdentity -> DEBU afe Obtaining identity" +"2019-05-02 09:27:24.542 UTC [gossip.gossip] handleMessage -> DEBU aff Exiting" +"2019-05-02 09:27:24.542 UTC [gossip.gossip] handleMessage -> DEBU b00 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.543 UTC [gossip.pull] HandleMessage -> DEBU b01 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.544 UTC [gossip.pull] SendDigest -> DEBU b02 Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:24.544 UTC [gossip.gossip] handleMessage -> DEBU b03 Exiting" +"2019-05-02 09:27:24.550 UTC [gossip.gossip] handleMessage -> DEBU b04 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789242496119500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:24.550 UTC [msp.identity] Verify -> DEBU b05 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +"2019-05-02 09:27:24.551 UTC [msp.identity] Verify -> DEBU b06 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU b07 Exiting" +"2019-05-02 09:27:24.561 UTC [gossip.gossip] handleMessage -> DEBU b08 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789242496119500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:24.561 UTC [msp.identity] Verify -> DEBU b09 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +"2019-05-02 09:27:24.562 UTC [msp.identity] Verify -> DEBU b0a Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU b0b Obtaining identity" +"2019-05-02 09:27:24.562 UTC [gossip.gossip] handleMessage -> DEBU b0c Exiting" +"2019-05-02 09:27:24.788 UTC [gossip.gossip] handleMessage -> DEBU b0d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.790 UTC [msp] DeserializeIdentity -> DEBU b0e Obtaining identity" +"2019-05-02 09:27:24.791 UTC [msp] DeserializeIdentity -> DEBU b0f Obtaining identity" +"2019-05-02 09:27:24.791 UTC [msp] DeserializeIdentity -> DEBU b10 Obtaining identity" +"2019-05-02 09:27:24.795 UTC [gossip.gossip] handleMessage -> DEBU b11 Exiting" +"2019-05-02 09:27:24.796 UTC [gossip.gossip] handleMessage -> DEBU b12 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789242989438000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.796 UTC [msp] DeserializeIdentity -> DEBU b13 Obtaining identity" +"2019-05-02 09:27:24.797 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:24.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b15 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.798 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b16 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.798 UTC [policies] Evaluate -> DEBU b17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:24.799 UTC [policies] Evaluate -> DEBU b18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:24.801 UTC [policies] Evaluate -> DEBU b19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:24.801 UTC [cauthdsl] func1 -> DEBU b1a 0xc002216700 gate 1556789244801894700 evaluation starts" +"2019-05-02 09:27:24.803 UTC [gossip.comm] func1 -> DEBU b1b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789242989438000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.802 UTC [cauthdsl] func2 -> DEBU b1c 0xc002216700 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.804 UTC [cauthdsl] func2 -> DEBU b1d 0xc002216700 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.804 UTC [cauthdsl] func2 -> DEBU b1e 0xc002216700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:24.805 UTC [cauthdsl] func2 -> DEBU b1f 0xc002216700 principal evaluation fails" +"2019-05-02 09:27:24.805 UTC [cauthdsl] func1 -> DEBU b20 0xc002216700 gate 1556789244801894700 evaluation fails" +"2019-05-02 09:27:24.808 UTC [policies] Evaluate -> DEBU b21 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.809 UTC [policies] Evaluate -> DEBU b22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.809 UTC [policies] Evaluate -> DEBU b23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:24.810 UTC [cauthdsl] func1 -> DEBU b24 0xc002216f40 gate 1556789244810380700 evaluation starts" +"2019-05-02 09:27:24.810 UTC [cauthdsl] func2 -> DEBU b25 0xc002216f40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.811 UTC [cauthdsl] func2 -> DEBU b26 0xc002216f40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.811 UTC [cauthdsl] func2 -> DEBU b27 0xc002216f40 principal matched by identity 0" +"2019-05-02 09:27:24.811 UTC [msp.identity] Verify -> DEBU b28 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +"2019-05-02 09:27:24.812 UTC [msp.identity] Verify -> DEBU b29 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +"2019-05-02 09:27:24.812 UTC [cauthdsl] func2 -> DEBU b2a 0xc002216f40 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:24.813 UTC [cauthdsl] func1 -> DEBU b2b 0xc002216f40 gate 1556789244810380700 evaluation succeeds" +"2019-05-02 09:27:24.813 UTC [policies] Evaluate -> DEBU b2c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.813 UTC [policies] Evaluate -> DEBU b2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.813 UTC [policies] Evaluate -> DEBU b2e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:24.814 UTC [policies] Evaluate -> DEBU b2f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:24.814 UTC [msp] DeserializeIdentity -> DEBU b30 Obtaining identity" +"2019-05-02 09:27:24.814 UTC [gossip.gossip] handleMessage -> DEBU b31 Exiting" +"2019-05-02 09:27:24.815 UTC [gossip.gossip] handleMessage -> DEBU b32 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789242989438000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:24.815 UTC [msp] DeserializeIdentity -> DEBU b33 Obtaining identity" +"2019-05-02 09:27:24.816 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b34 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:24.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b35 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b36 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.817 UTC [policies] Evaluate -> DEBU b37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:24.817 UTC [policies] Evaluate -> DEBU b38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:24.817 UTC [policies] Evaluate -> DEBU b39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:24.817 UTC [cauthdsl] func1 -> DEBU b3a 0xc002238bb0 gate 1556789244817836900 evaluation starts" +"2019-05-02 09:27:24.818 UTC [cauthdsl] func2 -> DEBU b3b 0xc002238bb0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.818 UTC [cauthdsl] func2 -> DEBU b3c 0xc002238bb0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.818 UTC [cauthdsl] func2 -> DEBU b3d 0xc002238bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:24.819 UTC [cauthdsl] func2 -> DEBU b3e 0xc002238bb0 principal evaluation fails" +"2019-05-02 09:27:24.819 UTC [cauthdsl] func1 -> DEBU b3f 0xc002238bb0 gate 1556789244817836900 evaluation fails" +"2019-05-02 09:27:24.819 UTC [policies] Evaluate -> DEBU b40 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.819 UTC [policies] Evaluate -> DEBU b41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.820 UTC [policies] Evaluate -> DEBU b42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:24.820 UTC [cauthdsl] func1 -> DEBU b43 0xc002239400 gate 1556789244820399100 evaluation starts" +"2019-05-02 09:27:24.820 UTC [cauthdsl] func2 -> DEBU b44 0xc002239400 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.820 UTC [cauthdsl] func2 -> DEBU b45 0xc002239400 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.821 UTC [cauthdsl] func2 -> DEBU b46 0xc002239400 principal matched by identity 0" +"2019-05-02 09:27:24.821 UTC [msp.identity] Verify -> DEBU b47 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +"2019-05-02 09:27:24.822 UTC [msp.identity] Verify -> DEBU b48 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +"2019-05-02 09:27:24.822 UTC [cauthdsl] func2 -> DEBU b49 0xc002239400 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:24.823 UTC [cauthdsl] func1 -> DEBU b4a 0xc002239400 gate 1556789244820399100 evaluation succeeds" +"2019-05-02 09:27:24.823 UTC [policies] Evaluate -> DEBU b4b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.823 UTC [policies] Evaluate -> DEBU b4c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.824 UTC [policies] Evaluate -> DEBU b4d Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:24.824 UTC [policies] Evaluate -> DEBU b4e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:24.825 UTC [msp] DeserializeIdentity -> DEBU b4f Obtaining identity" +"2019-05-02 09:27:24.825 UTC [gossip.gossip] handleMessage -> DEBU b50 Exiting" +"2019-05-02 09:27:24.830 UTC [gossip.comm] func1 -> DEBU b51 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.831 UTC [gossip.gossip] handleMessage -> DEBU b52 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.831 UTC [gossip.pull] HandleMessage -> DEBU b53 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.832 UTC [msp] DeserializeIdentity -> DEBU b54 Obtaining identity" +"2019-05-02 09:27:24.832 UTC [msp] DeserializeIdentity -> DEBU b55 Obtaining identity" +"2019-05-02 09:27:24.832 UTC [gossip.pull] SendDigest -> DEBU b56 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:24.833 UTC [gossip.gossip] handleMessage -> DEBU b57 Exiting" +"2019-05-02 09:27:24.847 UTC [gossip.comm] func1 -> DEBU b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.847 UTC [gossip.gossip] handleMessage -> DEBU b59 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.847 UTC [gossip.gossip] handleMessage -> DEBU b5a Exiting" +"2019-05-02 09:27:24.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU b5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b5c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:24.851 UTC [msp] DeserializeIdentity -> DEBU b5d Obtaining identity" +"2019-05-02 09:27:24.852 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b5e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:24.852 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b5f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.853 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b60 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:24.853 UTC [policies] Evaluate -> DEBU b61 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:24.853 UTC [policies] Evaluate -> DEBU b62 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:24.854 UTC [policies] Evaluate -> DEBU b63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:24.855 UTC [cauthdsl] func1 -> DEBU b64 0xc002255bc0 gate 1556789244855458800 evaluation starts" +"2019-05-02 09:27:24.855 UTC [cauthdsl] func2 -> DEBU b65 0xc002255bc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.856 UTC [cauthdsl] func2 -> DEBU b66 0xc002255bc0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.856 UTC [cauthdsl] func2 -> DEBU b67 0xc002255bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:24.856 UTC [cauthdsl] func2 -> DEBU b68 0xc002255bc0 principal evaluation fails" +"2019-05-02 09:27:24.856 UTC [cauthdsl] func1 -> DEBU b69 0xc002255bc0 gate 1556789244855458800 evaluation fails" +"2019-05-02 09:27:24.857 UTC [policies] Evaluate -> DEBU b6a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.857 UTC [policies] Evaluate -> DEBU b6b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:24.857 UTC [policies] Evaluate -> DEBU b6c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:24.857 UTC [cauthdsl] func1 -> DEBU b6d 0xc0022ab3a0 gate 1556789244857139100 evaluation starts" +"2019-05-02 09:27:24.857 UTC [cauthdsl] func2 -> DEBU b6e 0xc0022ab3a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:24.857 UTC [cauthdsl] func2 -> DEBU b6f 0xc0022ab3a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:24.857 UTC [cauthdsl] func2 -> DEBU b70 0xc0022ab3a0 principal matched by identity 0" +"2019-05-02 09:27:24.857 UTC [msp.identity] Verify -> DEBU b71 Verify: digest = 00000000 60 aa 71 04 ab 45 98 fb 6b 87 6e 67 16 55 ae dc |`.q..E..k.ng.U..| +00000010 0f 96 44 41 8a 33 d1 0e 05 83 37 05 bb 02 51 24 |..DA.3....7...Q$|" +"2019-05-02 09:27:24.866 UTC [msp.identity] Verify -> DEBU b72 Verify: sig = 00000000 30 44 02 20 0e e0 44 83 d8 00 43 6d 24 fe e5 21 |0D. ..D...Cm$..!| +00000010 5d 5d a6 72 e5 7f 6c 83 73 7f a7 4e e5 50 d7 13 |]].r..l.s..N.P..| +00000020 2d 80 1f 3f 02 20 31 ab db 4e 63 bf 89 c2 c2 79 |-..?. 1..Nc....y| +00000030 f4 15 3f 8e 3d 02 b8 6a fb 3e d4 62 16 61 cf ab |..?.=..j.>.b.a..| +00000040 42 30 64 b5 7c 5a |B0d.|Z|" +"2019-05-02 09:27:24.866 UTC [cauthdsl] func2 -> DEBU b73 0xc0022ab3a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:24.866 UTC [cauthdsl] func1 -> DEBU b74 0xc0022ab3a0 gate 1556789244857139100 evaluation succeeds" +"2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b75 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b76 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b77 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:24.867 UTC [policies] Evaluate -> DEBU b78 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:24.867 UTC [gossip.discovery] handleAliveMessage -> DEBU b79 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:24.867 UTC [gossip.discovery] learnExistingMembers -> DEBU b7a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:24.867 UTC [gossip.discovery] learnExistingMembers -> DEBU b7b updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 " +"2019-05-02 09:27:24.868 UTC [gossip.discovery] learnExistingMembers -> DEBU b7c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 " +"2019-05-02 09:27:24.868 UTC [gossip.discovery] learnExistingMembers -> DEBU b7d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:24.868 UTC [gossip.discovery] learnExistingMembers -> DEBU b7e Exiting" +"2019-05-02 09:27:24.868 UTC [gossip.discovery] handleAliveMessage -> DEBU b7f Exiting" +"2019-05-02 09:27:24.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU b80 Exiting" +"2019-05-02 09:27:24.869 UTC [gossip.discovery] sendMemResponse -> DEBU b81 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:24.869 UTC [msp] DeserializeIdentity -> DEBU b82 Obtaining identity" +"2019-05-02 09:27:24.869 UTC [msp] DeserializeIdentity -> DEBU b83 Obtaining identity" +"2019-05-02 09:27:24.870 UTC [msp] DeserializeIdentity -> DEBU b84 Obtaining identity" +"2019-05-02 09:27:24.870 UTC [gossip.comm] Send -> DEBU b85 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:24.870 UTC [gossip.discovery] sendMemResponse -> DEBU b86 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:24.870 UTC [gossip.comm] sendToEndpoint -> DEBU b87 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:24.871 UTC [gossip.comm] sendToEndpoint -> DEBU b88 Exiting" +"2019-05-02 09:27:25.016 UTC [gossip.comm] func1 -> DEBU b89 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.016 UTC [gossip.gossip] handleMessage -> DEBU b8a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.016 UTC [msp] DeserializeIdentity -> DEBU b8b Obtaining identity" +"2019-05-02 09:27:25.017 UTC [msp] DeserializeIdentity -> DEBU b8c Obtaining identity" +"2019-05-02 09:27:25.017 UTC [msp] DeserializeIdentity -> DEBU b8d Obtaining identity" +"2019-05-02 09:27:25.017 UTC [gossip.gossip] handleMessage -> DEBU b8e Exiting" +"2019-05-02 09:27:25.025 UTC [gossip.comm] func1 -> DEBU b8f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789243280579200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:25.025 UTC [gossip.gossip] handleMessage -> DEBU b90 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789243280579200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:25.025 UTC [msp] DeserializeIdentity -> DEBU b91 Obtaining identity" +"2019-05-02 09:27:25.026 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b92 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:25.026 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b93 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:25.026 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b94 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:25.026 UTC [policies] Evaluate -> DEBU b95 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:25.026 UTC [policies] Evaluate -> DEBU b96 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:25.026 UTC [policies] Evaluate -> DEBU b97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:25.026 UTC [cauthdsl] func1 -> DEBU b98 0xc00236b0f0 gate 1556789245026754100 evaluation starts" +"2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b99 0xc00236b0f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b9a 0xc00236b0f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b9b 0xc00236b0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:25.026 UTC [cauthdsl] func2 -> DEBU b9c 0xc00236b0f0 principal evaluation fails" +"2019-05-02 09:27:25.026 UTC [cauthdsl] func1 -> DEBU b9d 0xc00236b0f0 gate 1556789245026754100 evaluation fails" +"2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU b9e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU b9f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU ba0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:25.027 UTC [cauthdsl] func1 -> DEBU ba1 0xc00236b930 gate 1556789245027113000 evaluation starts" +"2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba2 0xc00236b930 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba3 0xc00236b930 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba4 0xc00236b930 principal matched by identity 0" +"2019-05-02 09:27:25.027 UTC [msp.identity] Verify -> DEBU ba5 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +"2019-05-02 09:27:25.027 UTC [msp.identity] Verify -> DEBU ba6 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +00000040 83 2b b4 bb 36 ef |.+..6.|" +"2019-05-02 09:27:25.027 UTC [cauthdsl] func2 -> DEBU ba7 0xc00236b930 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:25.027 UTC [cauthdsl] func1 -> DEBU ba8 0xc00236b930 gate 1556789245027113000 evaluation succeeds" +"2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU ba9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU baa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU bab Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:25.027 UTC [policies] Evaluate -> DEBU bac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:25.027 UTC [msp] DeserializeIdentity -> DEBU bad Obtaining identity" +"2019-05-02 09:27:25.027 UTC [gossip.gossip] handleMessage -> DEBU bae Exiting" +"2019-05-02 09:27:25.072 UTC [msp.identity] Sign -> DEBU baf Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151011 " +"2019-05-02 09:27:25.073 UTC [msp.identity] Sign -> DEBU bb0 Sign: digest: F4D1C49B625AE5B24AE96451DB264D062B621D6054CBE6DC551BD8EFB9703AD5 " +"2019-05-02 09:27:25.073 UTC [msp.identity] Sign -> DEBU bb1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:25.073 UTC [msp.identity] Sign -> DEBU bb2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:25.074 UTC [gossip.comm] Send -> DEBU bb3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:25.074 UTC [msp] DeserializeIdentity -> DEBU bb4 Obtaining identity" +"2019-05-02 09:27:25.074 UTC [gossip.pull] Hello -> DEBU bb5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:25.075 UTC [gossip.comm] sendToEndpoint -> DEBU bb7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.075 UTC [gossip.comm] sendToEndpoint -> DEBU bb8 Exiting" +"2019-05-02 09:27:25.076 UTC [gossip.comm] Send -> DEBU bb9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:25.076 UTC [gossip.pull] Hello -> DEBU bba Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:27:25.076 UTC [gossip.comm] Send -> DEBU bbb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:25.077 UTC [gossip.pull] Hello -> DEBU bbc Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:27:25.077 UTC [gossip.comm] Send -> DEBU bbd Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:25.078 UTC [gossip.comm] sendToEndpoint -> DEBU bbe Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.078 UTC [gossip.comm] sendToEndpoint -> DEBU bbf Exiting" +"2019-05-02 09:27:25.075 UTC [gossip.comm] Send -> DEBU bb6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:25.078 UTC [msp] DeserializeIdentity -> DEBU bc0 Obtaining identity" +"2019-05-02 09:27:25.079 UTC [gossip.comm] Send -> DEBU bc1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:25.079 UTC [gossip.comm] sendToEndpoint -> DEBU bc2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.079 UTC [gossip.comm] sendToEndpoint -> DEBU bc3 Exiting" +"2019-05-02 09:27:25.080 UTC [gossip.comm] sendToEndpoint -> DEBU bc4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.080 UTC [gossip.comm] sendToEndpoint -> DEBU bc5 Exiting" +"2019-05-02 09:27:25.081 UTC [gossip.comm] sendToEndpoint -> DEBU bc6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.082 UTC [gossip.comm] sendToEndpoint -> DEBU bc7 Exiting" +"2019-05-02 09:27:25.084 UTC [gossip.comm] sendToEndpoint -> DEBU bc8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.084 UTC [gossip.comm] sendToEndpoint -> DEBU bc9 Exiting" +"2019-05-02 09:27:25.084 UTC [gossip.gossip] handleMessage -> DEBU bca Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.085 UTC [gossip.comm] func1 -> DEBU bcb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.085 UTC [gossip.comm] func1 -> DEBU bcc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.084 UTC [gossip.pull] HandleMessage -> DEBU bcd GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bce Exiting" +"2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bcf Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.088 UTC [gossip.pull] HandleMessage -> DEBU bd0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bd1 Exiting" +"2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bd2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.088 UTC [gossip.gossip] handleMessage -> DEBU bd3 Exiting" +"2019-05-02 09:27:25.089 UTC [gossip.gossip] handleMessage -> DEBU bd4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU bd5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.089 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bd6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:25.089 UTC [msp.identity] Verify -> DEBU bd7 Verify: digest = 00000000 f4 d1 c4 9b 62 5a e5 b2 4a e9 64 51 db 26 4d 06 |....bZ..J.dQ.&M.| +00000010 2b 62 1d 60 54 cb e6 dc 55 1b d8 ef b9 70 3a d5 |+b.`T...U....p:.|" +"2019-05-02 09:27:25.090 UTC [msp.identity] Verify -> DEBU bd8 Verify: sig = 00000000 30 45 02 21 00 c2 05 82 c1 0f 60 99 10 15 45 60 |0E.!......`...E`| +00000010 7a 6c 49 ef 90 f1 62 f2 f5 68 0c 84 eb e5 ef 65 |zlI...b..h.....e| +00000020 d3 cf 2a 9c 32 02 20 7d 78 8d d5 9d 83 c8 5c 50 |..*.2. }x.....\P| +00000030 f0 9e 54 72 8b 47 bc 56 16 d6 9d d2 28 86 38 6f |..Tr.G.V....(.8o| +00000040 d1 14 f2 43 d3 72 89 |...C.r.|" +"2019-05-02 09:27:25.090 UTC [gossip.discovery] handleAliveMessage -> DEBU bd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:25.090 UTC [gossip.discovery] isSentByMe -> DEBU bda Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:25.090 UTC [gossip.discovery] handleAliveMessage -> DEBU bdb Exiting" +"2019-05-02 09:27:25.090 UTC [gossip.discovery] handleMsgFromComm -> DEBU bdc Exiting" +"2019-05-02 09:27:25.091 UTC [gossip.discovery] handleMsgFromComm -> DEBU bdd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.091 UTC [gossip.gossip] handleMessage -> DEBU bde Exiting" +"2019-05-02 09:27:25.091 UTC [gossip.gossip] handleMessage -> DEBU bdf Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1956372221717732963 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.092 UTC [gossip.pull] HandleMessage -> DEBU be0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1956372221717732963 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.092 UTC [gossip.gossip] handleMessage -> DEBU be1 Exiting" +"2019-05-02 09:27:25.092 UTC [gossip.gossip] handleMessage -> DEBU be2 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.092 UTC [gossip.gossip] ValidateAliveMsg -> DEBU be3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:25.092 UTC [msp.identity] Verify -> DEBU be4 Verify: digest = 00000000 f4 d1 c4 9b 62 5a e5 b2 4a e9 64 51 db 26 4d 06 |....bZ..J.dQ.&M.| +00000010 2b 62 1d 60 54 cb e6 dc 55 1b d8 ef b9 70 3a d5 |+b.`T...U....p:.|" +"2019-05-02 09:27:25.092 UTC [msp.identity] Verify -> DEBU be5 Verify: sig = 00000000 30 45 02 21 00 c2 05 82 c1 0f 60 99 10 15 45 60 |0E.!......`...E`| +00000010 7a 6c 49 ef 90 f1 62 f2 f5 68 0c 84 eb e5 ef 65 |zlI...b..h.....e| +00000020 d3 cf 2a 9c 32 02 20 7d 78 8d d5 9d 83 c8 5c 50 |..*.2. }x.....\P| +00000030 f0 9e 54 72 8b 47 bc 56 16 d6 9d d2 28 86 38 6f |..Tr.G.V....(.8o| +00000040 d1 14 f2 43 d3 72 89 |...C.r.|" +"2019-05-02 09:27:25.094 UTC [msp.identity] Verify -> DEBU be6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:30:49.763 UTC [gossip.gossip] handleMessage -> DEBU b68 Exiting" -"2019-05-02 01:30:49.763 UTC [gossip.discovery] sendMemResponse -> DEBU b69 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:49.766 UTC [msp.identity] Verify -> DEBU b6d Verify: sig = 00000000 30 45 02 21 00 96 2a c1 1a 1f dc b6 d3 91 88 44 |0E.!..*........D| -00000010 b3 21 5c 2c 32 81 7f b3 53 62 21 3b ae d4 0a 38 |.!\,2...Sb!;...8| -00000020 4d a7 2f 32 d8 02 20 19 d0 60 13 4c fd 2f b4 0f |M./2.. ..`.L./..| -00000030 dc a9 40 33 7c a1 ad c8 d9 00 db 4a 57 8e 54 e6 |..@3|......JW.T.| -00000040 cf 45 2f c1 1a bc 67 |.E/...g|" -"2019-05-02 01:30:49.767 UTC [gossip.discovery] handleAliveMessage -> DEBU b70 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:49.767 UTC [gossip.discovery] isSentByMe -> DEBU b71 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:49.767 UTC [gossip.discovery] handleAliveMessage -> DEBU b72 Exiting" -"2019-05-02 01:30:49.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU b73 Exiting" -"2019-05-02 01:30:49.766 UTC [gossip.gossip] handleMessage -> DEBU b6e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13121253355825226892 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.767 UTC [gossip.pull] HandleMessage -> DEBU b74 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13121253355825226892 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.767 UTC [gossip.gossip] handleMessage -> DEBU b75 Exiting" -"2019-05-02 01:30:49.767 UTC [gossip.gossip] handleMessage -> DEBU b76 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.767 UTC [gossip.gossip] handleMessage -> DEBU b77 Exiting" -"2019-05-02 01:30:49.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU b78 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.767 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b79 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:49.768 UTC [msp.identity] Verify -> DEBU b7a Verify: digest = 00000000 3d ea 49 ce 3a fe 6c 43 36 2b 27 54 3b 03 f4 5f |=.I.:.lC6+'T;.._| -00000010 bf b4 59 26 1a cf 32 cd 87 4f 78 b0 d4 07 e0 96 |..Y&..2..Ox.....|" -"2019-05-02 01:30:49.768 UTC [msp.identity] Verify -> DEBU b7b Verify: sig = 00000000 30 44 02 20 3e 4c f9 fc d3 81 ec 13 a3 04 1c 01 |0D. >L..........| -00000010 a5 48 7c d3 e2 2d b9 88 48 60 c0 e7 20 43 3b b6 |.H|..-..H`.. C;.| -00000020 92 f6 7a e3 02 20 56 a2 8b 18 a1 04 73 cb 2b 3e |..z.. V.....s.+>| -00000030 e1 f6 52 5b 77 c8 42 59 c4 6f 3a e7 66 c5 41 28 |..R[w.BY.o:.f.A(| -00000040 7f d4 13 16 84 69 |.....i|" -"2019-05-02 01:30:49.768 UTC [gossip.discovery] handleAliveMessage -> DEBU b7c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.768 UTC [gossip.discovery] isSentByMe -> DEBU b7d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.768 UTC [gossip.discovery] handleAliveMessage -> DEBU b7e Exiting" -"2019-05-02 01:30:49.768 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b7f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:49.768 UTC [msp.identity] Verify -> DEBU b80 Verify: digest = 00000000 ce 7f 0e 3b 0c 4e d5 14 5e b2 1b 39 4e 7a d1 5a |...;.N..^..9Nz.Z| -00000010 bb 65 54 1b 08 35 3f 61 39 7d e0 ef b4 ea 07 da |.eT..5?a9}......|" -"2019-05-02 01:30:49.768 UTC [msp.identity] Verify -> DEBU b81 Verify: sig = 00000000 30 44 02 20 17 71 33 ee 63 80 6c a0 1e a4 16 7c |0D. .q3.c.l....|| -00000010 07 95 98 db 11 4a fd 91 8f e8 eb 62 c0 e4 c9 04 |.....J.....b....| -00000020 c8 d2 29 2b 02 20 79 99 52 cf 5d af b4 48 f8 38 |..)+. y.R.]..H.8| -00000030 57 0a 3b 14 71 1c ef b8 87 72 67 56 f3 0c 1f 56 |W.;.q....rgV...V| -00000040 14 52 01 9d 9f 49 |.R...I|" -"2019-05-02 01:30:49.768 UTC [gossip.discovery] handleAliveMessage -> DEBU b82 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.766 UTC [msp] DeserializeIdentity -> DEBU b6f Obtaining identity" -"2019-05-02 01:30:49.774 UTC [msp] DeserializeIdentity -> DEBU b83 Obtaining identity" -"2019-05-02 01:30:49.774 UTC [msp] DeserializeIdentity -> DEBU b84 Obtaining identity" -"2019-05-02 01:30:49.775 UTC [gossip.comm] Send -> DEBU b85 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:49.776 UTC [gossip.discovery] sendMemResponse -> DEBU b86 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:30:49.776 UTC [gossip.comm] sendToEndpoint -> DEBU b87 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.777 UTC [gossip.comm] sendToEndpoint -> DEBU b88 Exiting" -"2019-05-02 01:30:49.769 UTC [gossip.discovery] handleAliveMessage -> DEBU b89 Exiting" -"2019-05-02 01:30:49.779 UTC [gossip.discovery] handleMsgFromComm -> DEBU b8a Exiting" -"2019-05-02 01:30:49.784 UTC [gossip.comm] func1 -> DEBU b8b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17096223391310539901 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 51 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.784 UTC [gossip.comm] func1 -> DEBU b8c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.785 UTC [gossip.comm] func1 -> DEBU b8d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.785 UTC [gossip.gossip] handleMessage -> DEBU b8e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17096223391310539901 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 51 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.786 UTC [gossip.pull] HandleMessage -> DEBU b8f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17096223391310539901 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 51 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.786 UTC [gossip.gossip] handleMessage -> DEBU b90 Exiting" -"2019-05-02 01:30:49.786 UTC [gossip.gossip] handleMessage -> DEBU b91 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.787 UTC [gossip.pull] HandleMessage -> DEBU b92 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.787 UTC [msp] DeserializeIdentity -> DEBU b93 Obtaining identity" -"2019-05-02 01:30:49.788 UTC [msp] DeserializeIdentity -> DEBU b94 Obtaining identity" -"2019-05-02 01:30:49.788 UTC [gossip.pull] SendDigest -> DEBU b95 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:30:49.788 UTC [gossip.gossip] handleMessage -> DEBU b96 Exiting" -"2019-05-02 01:30:49.789 UTC [gossip.gossip] handleMessage -> DEBU b97 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.789 UTC [gossip.gossip] handleMessage -> DEBU b98 Exiting" -"2019-05-02 01:30:49.789 UTC [gossip.discovery] handleMsgFromComm -> DEBU b99 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.790 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b9a Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:49.790 UTC [msp] DeserializeIdentity -> DEBU b9b Obtaining identity" -"2019-05-02 01:30:49.790 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b9c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:49.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b9d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.791 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b9e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.791 UTC [policies] Evaluate -> DEBU b9f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:49.791 UTC [policies] Evaluate -> DEBU ba0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:49.791 UTC [policies] Evaluate -> DEBU ba1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:49.791 UTC [cauthdsl] func1 -> DEBU ba2 0xc0033000d0 gate 1556760649791877900 evaluation starts" -"2019-05-02 01:30:49.793 UTC [cauthdsl] func2 -> DEBU ba3 0xc0033000d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:49.793 UTC [cauthdsl] func2 -> DEBU ba4 0xc0033000d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:49.794 UTC [cauthdsl] func2 -> DEBU ba5 0xc0033000d0 principal matched by identity 0" -"2019-05-02 01:30:49.794 UTC [msp.identity] Verify -> DEBU ba6 Verify: digest = 00000000 fc 3b 4f 07 ee 02 6e 6d 28 dd 29 36 16 e5 38 9b |.;O...nm(.)6..8.| -00000010 59 12 bd 4a 3a f4 ca 66 a0 81 63 b4 ad 75 53 96 |Y..J:..f..c..uS.|" -"2019-05-02 01:30:49.794 UTC [msp.identity] Verify -> DEBU ba7 Verify: sig = 00000000 30 45 02 21 00 84 bd 8b 1b ab 55 39 60 42 e3 b1 |0E.!......U9`B..| -00000010 00 86 57 a7 76 5b 90 19 81 3c 48 f8 a2 f6 73 25 |..W.v[... DEBU ba8 0xc0033000d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:49.795 UTC [cauthdsl] func1 -> DEBU ba9 0xc0033000d0 gate 1556760649791877900 evaluation succeeds" -"2019-05-02 01:30:49.795 UTC [policies] Evaluate -> DEBU baa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.797 UTC [policies] Evaluate -> DEBU bab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.798 UTC [policies] Evaluate -> DEBU bac Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:49.798 UTC [policies] Evaluate -> DEBU bad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:49.798 UTC [gossip.discovery] handleAliveMessage -> DEBU bae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:49.799 UTC [gossip.discovery] handleAliveMessage -> DEBU baf Exiting" -"2019-05-02 01:30:49.800 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bb0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:49.803 UTC [msp.identity] Verify -> DEBU bb1 Verify: digest = 00000000 3d ea 49 ce 3a fe 6c 43 36 2b 27 54 3b 03 f4 5f |=.I.:.lC6+'T;.._| -00000010 bf b4 59 26 1a cf 32 cd 87 4f 78 b0 d4 07 e0 96 |..Y&..2..Ox.....|" -"2019-05-02 01:30:49.804 UTC [msp.identity] Verify -> DEBU bb2 Verify: sig = 00000000 30 44 02 20 3e 4c f9 fc d3 81 ec 13 a3 04 1c 01 |0D. >L..........| -00000010 a5 48 7c d3 e2 2d b9 88 48 60 c0 e7 20 43 3b b6 |.H|..-..H`.. C;.| -00000020 92 f6 7a e3 02 20 56 a2 8b 18 a1 04 73 cb 2b 3e |..z.. V.....s.+>| -00000030 e1 f6 52 5b 77 c8 42 59 c4 6f 3a e7 66 c5 41 28 |..R[w.BY.o:.f.A(| -00000040 7f d4 13 16 84 69 |.....i|" -"2019-05-02 01:30:49.805 UTC [gossip.discovery] handleAliveMessage -> DEBU bb3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.805 UTC [gossip.discovery] isSentByMe -> DEBU bb4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:49.806 UTC [gossip.discovery] handleAliveMessage -> DEBU bb5 Exiting" -"2019-05-02 01:30:49.806 UTC [gossip.discovery] handleMsgFromComm -> DEBU bb6 Exiting" -"2019-05-02 01:30:49.814 UTC [gossip.comm] func1 -> DEBU bb7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.814 UTC [gossip.gossip] handleMessage -> DEBU bb8 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.815 UTC [gossip.gossip] handleMessage -> DEBU bb9 Exiting" -"2019-05-02 01:30:49.815 UTC [gossip.discovery] handleMsgFromComm -> DEBU bba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.816 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bbb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:30:49.816 UTC [msp] DeserializeIdentity -> DEBU bbc Obtaining identity" -"2019-05-02 01:30:49.817 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bbd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:49.817 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bbe Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.817 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bbf Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:49.817 UTC [policies] Evaluate -> DEBU bc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:49.817 UTC [policies] Evaluate -> DEBU bc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:49.818 UTC [policies] Evaluate -> DEBU bc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:49.818 UTC [cauthdsl] func1 -> DEBU bc3 0xc003342f00 gate 1556760649818292400 evaluation starts" -"2019-05-02 01:30:49.818 UTC [cauthdsl] func2 -> DEBU bc4 0xc003342f00 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:49.818 UTC [cauthdsl] func2 -> DEBU bc5 0xc003342f00 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:49.818 UTC [cauthdsl] func2 -> DEBU bc6 0xc003342f00 principal matched by identity 0" -"2019-05-02 01:30:49.819 UTC [msp.identity] Verify -> DEBU bc7 Verify: digest = 00000000 97 9f 5f 46 d8 5e e1 9e 97 d2 5b 9f cc be 2e 45 |.._F.^....[....E| -00000010 11 e7 35 4d dd 77 5b df 72 5c f2 2d b5 b9 d2 0e |..5M.w[.r\.-....|" -"2019-05-02 01:30:49.819 UTC [msp.identity] Verify -> DEBU bc8 Verify: sig = 00000000 30 45 02 21 00 91 91 e2 0a b0 06 af d2 75 ee 90 |0E.!.........u..| -00000010 ad f4 d4 f0 f8 88 65 ea 10 b7 50 92 39 9c c5 e1 |......e...P.9...| -00000020 32 88 af de a5 02 20 0e 8c 65 b2 37 e8 33 a2 02 |2..... ..e.7.3..| -00000030 ce 04 00 3a a8 65 c5 a6 03 6d 45 97 1f 96 25 90 |...:.e...mE...%.| -00000040 70 fb 20 28 44 4e 5e |p. (DN^|" -"2019-05-02 01:30:49.819 UTC [cauthdsl] func2 -> DEBU bc9 0xc003342f00 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:49.819 UTC [cauthdsl] func1 -> DEBU bca 0xc003342f00 gate 1556760649818292400 evaluation succeeds" -"2019-05-02 01:30:49.819 UTC [policies] Evaluate -> DEBU bcb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.819 UTC [policies] Evaluate -> DEBU bcc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:49.820 UTC [policies] Evaluate -> DEBU bcd Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:49.820 UTC [policies] Evaluate -> DEBU bce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:49.820 UTC [gossip.discovery] handleAliveMessage -> DEBU bcf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:49.820 UTC [gossip.discovery] learnExistingMembers -> DEBU bd0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:30:49.820 UTC [gossip.discovery] learnExistingMembers -> DEBU bd1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 " -"2019-05-02 01:30:49.820 UTC [gossip.discovery] learnExistingMembers -> DEBU bd2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 " -"2019-05-02 01:30:49.821 UTC [gossip.discovery] learnExistingMembers -> DEBU bd3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:49.821 UTC [gossip.discovery] learnExistingMembers -> DEBU bd4 Exiting" -"2019-05-02 01:30:49.821 UTC [gossip.discovery] handleAliveMessage -> DEBU bd5 Exiting" -"2019-05-02 01:30:49.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU bd6 Exiting" -"2019-05-02 01:30:49.822 UTC [gossip.discovery] sendMemResponse -> DEBU bd7 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:30:49.822 UTC [msp] DeserializeIdentity -> DEBU bd8 Obtaining identity" -"2019-05-02 01:30:49.822 UTC [msp] DeserializeIdentity -> DEBU bd9 Obtaining identity" -"2019-05-02 01:30:49.823 UTC [msp] DeserializeIdentity -> DEBU bda Obtaining identity" -"2019-05-02 01:30:49.823 UTC [gossip.comm] Send -> DEBU bdb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:49.823 UTC [gossip.discovery] sendMemResponse -> DEBU bdc Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:30:49.824 UTC [gossip.comm] sendToEndpoint -> DEBU bdd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:30:49.824 UTC [gossip.comm] sendToEndpoint -> DEBU bde Exiting" -"2019-05-02 01:30:50.535 UTC [gossip.comm] func1 -> DEBU bdf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 7472938214036638091 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.535 UTC [gossip.gossip] handleMessage -> DEBU be0 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 7472938214036638091 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.537 UTC [gossip.pull] HandleMessage -> DEBU be1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 7472938214036638091 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 84 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.538 UTC [msp] DeserializeIdentity -> DEBU be2 Obtaining identity" -"2019-05-02 01:30:50.539 UTC [msp] DeserializeIdentity -> DEBU be3 Obtaining identity" -"2019-05-02 01:30:50.541 UTC [gossip.pull] SendRes -> DEBU be5 Sending 2 IDENTITY_MSG items to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:50.540 UTC [gossip.gossip] handleMessage -> DEBU be4 Exiting" -"2019-05-02 01:30:50.719 UTC [gossip.pull] SendReq -> DEBU be6 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" -"2019-05-02 01:30:50.720 UTC [gossip.comm] Send -> DEBU be7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13121253355825226892 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:50.721 UTC [gossip.pull] SendReq -> DEBU be8 Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051" -"2019-05-02 01:30:50.721 UTC [gossip.comm] Send -> DEBU be9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 17096223391310539901 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 51 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:50.722 UTC [gossip.comm] sendToEndpoint -> DEBU beb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 17096223391310539901 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 51 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.722 UTC [gossip.comm] sendToEndpoint -> DEBU bec Exiting" -"2019-05-02 01:30:50.721 UTC [gossip.comm] sendToEndpoint -> DEBU bea Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13121253355825226892 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.723 UTC [gossip.comm] sendToEndpoint -> DEBU bed Exiting" -"2019-05-02 01:30:50.725 UTC [gossip.comm] func1 -> DEBU bee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13121253355825226892, Envelope: 958 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.726 UTC [gossip.gossip] handleMessage -> DEBU bef Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13121253355825226892, Envelope: 958 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.727 UTC [msp] DeserializeIdentity -> DEBU bf0 Obtaining identity" -"2019-05-02 01:30:50.727 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:50.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bf2 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:50.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bf3 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:50.729 UTC [policies] Evaluate -> DEBU bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:50.729 UTC [policies] Evaluate -> DEBU bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:50.731 UTC [policies] Evaluate -> DEBU bf6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:50.731 UTC [cauthdsl] func1 -> DEBU bf7 0xc003414510 gate 1556760650731583800 evaluation starts" -"2019-05-02 01:30:50.731 UTC [cauthdsl] func2 -> DEBU bf8 0xc003414510 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:50.732 UTC [cauthdsl] func2 -> DEBU bf9 0xc003414510 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:50.732 UTC [cauthdsl] func2 -> DEBU bfa 0xc003414510 principal matched by identity 0" -"2019-05-02 01:30:50.732 UTC [msp.identity] Verify -> DEBU bfb Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| +"2019-05-02 09:27:25.094 UTC [msp.identity] Verify -> DEBU be7 Verify: sig = 00000000 30 44 02 20 70 c4 3a 23 15 fc 4b 10 a0 4c 7d b2 |0D. p.:#..K..L}.| +00000010 19 14 29 64 0d 7b 0c c1 73 da 27 45 dd 1a df 44 |..)d.{..s.'E...D| +00000020 6a 67 e9 6a 02 20 2b fc d2 18 77 ae 37 01 3a e2 |jg.j. +...w.7.:.| +00000030 97 51 92 20 82 5e 7c 52 fd f3 2c 27 1e d8 9c 5a |.Q. .^|R..,'...Z| +00000040 a6 df 5f 3a 2c ee |.._:,.|" +"2019-05-02 09:27:25.094 UTC [gossip.discovery] handleAliveMessage -> DEBU be8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:25.094 UTC [gossip.discovery] isSentByMe -> DEBU be9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:25.095 UTC [gossip.discovery] handleAliveMessage -> DEBU bea Exiting" +"2019-05-02 09:27:25.095 UTC [gossip.discovery] handleMsgFromComm -> DEBU beb Exiting" +"2019-05-02 09:27:25.095 UTC [gossip.gossip] handleMessage -> DEBU bec Exiting" +"2019-05-02 09:27:25.095 UTC [gossip.discovery] handleMsgFromComm -> DEBU bed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.095 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bee Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:25.096 UTC [msp.identity] Verify -> DEBU bef Verify: digest = 00000000 f4 d1 c4 9b 62 5a e5 b2 4a e9 64 51 db 26 4d 06 |....bZ..J.dQ.&M.| +00000010 2b 62 1d 60 54 cb e6 dc 55 1b d8 ef b9 70 3a d5 |+b.`T...U....p:.|" +"2019-05-02 09:27:25.096 UTC [msp.identity] Verify -> DEBU bf0 Verify: sig = 00000000 30 45 02 21 00 c2 05 82 c1 0f 60 99 10 15 45 60 |0E.!......`...E`| +00000010 7a 6c 49 ef 90 f1 62 f2 f5 68 0c 84 eb e5 ef 65 |zlI...b..h.....e| +00000020 d3 cf 2a 9c 32 02 20 7d 78 8d d5 9d 83 c8 5c 50 |..*.2. }x.....\P| +00000030 f0 9e 54 72 8b 47 bc 56 16 d6 9d d2 28 86 38 6f |..Tr.G.V....(.8o| +00000040 d1 14 f2 43 d3 72 89 |...C.r.|" +"2019-05-02 09:27:25.098 UTC [gossip.discovery] handleAliveMessage -> DEBU bf1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:25.098 UTC [gossip.discovery] isSentByMe -> DEBU bf2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:25.098 UTC [gossip.discovery] handleAliveMessage -> DEBU bf3 Exiting" +"2019-05-02 09:27:25.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bf4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:25.099 UTC [msp] DeserializeIdentity -> DEBU bf5 Obtaining identity" +"2019-05-02 09:27:25.099 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:25.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bf7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:25.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bf8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:25.100 UTC [policies] Evaluate -> DEBU bf9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:25.100 UTC [policies] Evaluate -> DEBU bfa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:25.100 UTC [policies] Evaluate -> DEBU bfb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:25.101 UTC [cauthdsl] func1 -> DEBU bfc 0xc00254c000 gate 1556789245101163900 evaluation starts" +"2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU bfd 0xc00254c000 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU bfe 0xc00254c000 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU bff 0xc00254c000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:25.101 UTC [cauthdsl] func2 -> DEBU c00 0xc00254c000 principal evaluation fails" +"2019-05-02 09:27:25.101 UTC [cauthdsl] func1 -> DEBU c01 0xc00254c000 gate 1556789245101163900 evaluation fails" +"2019-05-02 09:27:25.102 UTC [policies] Evaluate -> DEBU c02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:25.102 UTC [policies] Evaluate -> DEBU c03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:25.102 UTC [policies] Evaluate -> DEBU c04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:25.103 UTC [cauthdsl] func1 -> DEBU c05 0xc00254c860 gate 1556789245103217900 evaluation starts" +"2019-05-02 09:27:25.103 UTC [cauthdsl] func2 -> DEBU c06 0xc00254c860 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:25.103 UTC [cauthdsl] func2 -> DEBU c07 0xc00254c860 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:25.103 UTC [cauthdsl] func2 -> DEBU c08 0xc00254c860 principal matched by identity 0" +"2019-05-02 09:27:25.104 UTC [msp.identity] Verify -> DEBU c09 Verify: digest = 00000000 60 aa 71 04 ab 45 98 fb 6b 87 6e 67 16 55 ae dc |`.q..E..k.ng.U..| +00000010 0f 96 44 41 8a 33 d1 0e 05 83 37 05 bb 02 51 24 |..DA.3....7...Q$|" +"2019-05-02 09:27:25.105 UTC [msp.identity] Verify -> DEBU c0a Verify: sig = 00000000 30 44 02 20 0e e0 44 83 d8 00 43 6d 24 fe e5 21 |0D. ..D...Cm$..!| +00000010 5d 5d a6 72 e5 7f 6c 83 73 7f a7 4e e5 50 d7 13 |]].r..l.s..N.P..| +00000020 2d 80 1f 3f 02 20 31 ab db 4e 63 bf 89 c2 c2 79 |-..?. 1..Nc....y| +00000030 f4 15 3f 8e 3d 02 b8 6a fb 3e d4 62 16 61 cf ab |..?.=..j.>.b.a..| +00000040 42 30 64 b5 7c 5a |B0d.|Z|" +"2019-05-02 09:27:25.105 UTC [cauthdsl] func2 -> DEBU c0b 0xc00254c860 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:25.105 UTC [cauthdsl] func1 -> DEBU c0c 0xc00254c860 gate 1556789245103217900 evaluation succeeds" +"2019-05-02 09:27:25.106 UTC [policies] Evaluate -> DEBU c0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:25.106 UTC [policies] Evaluate -> DEBU c0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:25.107 UTC [policies] Evaluate -> DEBU c0f Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:25.107 UTC [policies] Evaluate -> DEBU c10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:25.108 UTC [gossip.discovery] handleAliveMessage -> DEBU c11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:25.108 UTC [gossip.discovery] handleAliveMessage -> DEBU c12 Exiting" +"2019-05-02 09:27:25.108 UTC [gossip.discovery] handleMsgFromComm -> DEBU c13 Exiting" +"2019-05-02 09:27:25.117 UTC [gossip.gossip] handleMessage -> DEBU c14 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.118 UTC [gossip.pull] HandleMessage -> DEBU c15 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.118 UTC [gossip.pull] SendDigest -> DEBU c16 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:25.119 UTC [gossip.gossip] handleMessage -> DEBU c17 Exiting" +"2019-05-02 09:27:25.126 UTC [gossip.gossip] handleMessage -> DEBU c18 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.126 UTC [gossip.gossip] handleMessage -> DEBU c19 Exiting" +"2019-05-02 09:27:25.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU c1a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.128 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c1b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:25.130 UTC [msp.identity] Verify -> DEBU c1c Verify: digest = 00000000 6a 35 aa 85 56 51 fd f7 1f 00 32 55 34 a9 78 1f |j5..VQ....2U4.x.| +00000010 ef 9f 3b 40 9e 42 79 88 1a 5f f4 3b 06 8f 7d 30 |..;@.By.._.;..}0|" +"2019-05-02 09:27:25.130 UTC [msp.identity] Verify -> DEBU c1d Verify: sig = 00000000 30 45 02 21 00 84 5c ed 29 6d 83 2f ef 24 3d 58 |0E.!..\.)m./.$=X| +00000010 bb 10 72 1c f2 93 4a 83 84 67 bd d2 47 59 eb 99 |..r...J..g..GY..| +00000020 ca 45 0b 83 94 02 20 10 cf 2a cd e1 fd 86 c8 45 |.E.... ..*.....E| +00000030 a8 91 8b e9 d3 b9 3e e6 0b cb 13 10 94 b4 d7 60 |......>........`| +00000040 fb 75 1c 24 de 0f eb |.u.$...|" +"2019-05-02 09:27:25.131 UTC [msp.identity] Verify -> DEBU c1e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:27:25.131 UTC [msp.identity] Verify -> DEBU c1f Verify: sig = 00000000 30 45 02 21 00 c6 56 1a 7b c1 b9 02 fc 93 14 71 |0E.!..V.{......q| +00000010 63 35 4c 96 b6 f7 bf 3d dd 13 0e 35 e9 e9 fe 1d |c5L....=...5....| +00000020 00 94 91 44 79 02 20 4a dd ed 07 ad 12 4b b6 1b |...Dy. J.....K..| +00000030 24 4a 8b 92 bf 0d 42 b0 0e 2e 62 32 ad 14 42 32 |$J....B...b2..B2| +00000040 47 f3 51 d5 0d 5c 0f |G.Q..\.|" +"2019-05-02 09:27:25.132 UTC [gossip.discovery] handleAliveMessage -> DEBU c20 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:25.132 UTC [gossip.discovery] learnExistingMembers -> DEBU c21 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:25.132 UTC [gossip.discovery] learnExistingMembers -> DEBU c22 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 " +"2019-05-02 09:27:25.132 UTC [gossip.discovery] learnExistingMembers -> DEBU c23 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 " +"2019-05-02 09:27:25.133 UTC [gossip.discovery] learnExistingMembers -> DEBU c24 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:25.133 UTC [gossip.discovery] learnExistingMembers -> DEBU c25 Exiting" +"2019-05-02 09:27:25.133 UTC [gossip.discovery] handleAliveMessage -> DEBU c26 Exiting" +"2019-05-02 09:27:25.134 UTC [gossip.discovery] handleMsgFromComm -> DEBU c27 Exiting" +"2019-05-02 09:27:25.134 UTC [gossip.discovery] sendMemResponse -> DEBU c28 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:25.136 UTC [msp] DeserializeIdentity -> DEBU c29 Obtaining identity" +"2019-05-02 09:27:25.138 UTC [msp] DeserializeIdentity -> DEBU c2a Obtaining identity" +"2019-05-02 09:27:25.140 UTC [gossip.comm] Send -> DEBU c2b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:25.141 UTC [gossip.comm] sendToEndpoint -> DEBU c2d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.141 UTC [gossip.comm] sendToEndpoint -> DEBU c2e Exiting" +"2019-05-02 09:27:25.141 UTC [gossip.discovery] sendMemResponse -> DEBU c2c Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:25.172 UTC [endorser] ProcessProposal -> DEBU c2f Entering: request from 172.18.0.8:57266" +"2019-05-02 09:27:25.172 UTC [protoutils] ValidateProposalMessage -> DEBU c30 ValidateProposalMessage starts for signed proposal 0xc00232c0f0" +"2019-05-02 09:27:25.173 UTC [protoutils] validateChannelHeader -> DEBU c31 validateChannelHeader info: header type 3" +"2019-05-02 09:27:25.173 UTC [protoutils] checkSignatureFromCreator -> DEBU c32 begin" +"2019-05-02 09:27:25.173 UTC [protoutils] checkSignatureFromCreator -> DEBU c33 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:25.174 UTC [protoutils] checkSignatureFromCreator -> DEBU c34 creator is valid" +"2019-05-02 09:27:25.174 UTC [msp.identity] Verify -> DEBU c35 Verify: digest = 00000000 32 9f 5c 0f 1a d0 23 a5 16 ab 89 b9 d1 eb ca e8 |2.\...#.........| +00000010 8c 6c 83 85 c9 a4 ce 25 df 0b ae 72 f1 c0 59 bb |.l.....%...r..Y.|" +"2019-05-02 09:27:25.175 UTC [msp.identity] Verify -> DEBU c36 Verify: sig = 00000000 30 44 02 20 74 43 4c 83 cd 87 51 e6 cb 3d 56 3b |0D. tCL...Q..=V;| +00000010 1c c1 c3 b1 da 70 5a f0 9d 2f bc f6 ed 3a 8b 36 |.....pZ../...:.6| +00000020 77 1c ff c3 02 20 3d 28 85 83 0c d8 2a 83 e3 1c |w.... =(....*...| +00000030 04 1b 27 65 a1 c7 24 0c b3 3c 22 60 e6 79 f2 e3 |..'e..$..<"`.y..| +00000040 ac 58 cf 50 f8 bd |.X.P..|" +"2019-05-02 09:27:25.175 UTC [protoutils] checkSignatureFromCreator -> DEBU c37 exits successfully" +"2019-05-02 09:27:25.175 UTC [protoutils] validateChaincodeProposalMessage -> DEBU c38 validateChaincodeProposalMessage starts for proposal 0xc00017eee0, header 0xc00232c500" +"2019-05-02 09:27:25.176 UTC [protoutils] validateChaincodeProposalMessage -> DEBU c39 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-05-02 09:27:25.176 UTC [endorser] preProcess -> DEBU c3a [][19510801] processing txid: 195108018679eee4043cc567ba2e40314729bf4e7ddd4caa43cf2e515c015814" +"2019-05-02 09:27:25.177 UTC [endorser] SimulateProposal -> DEBU c3b [][19510801] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:25.177 UTC [endorser] callChaincode -> INFO c3c [][19510801] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:25.177 UTC [chaincode] Execute -> DEBU c3d Entry" +"2019-05-02 09:27:25.178 UTC [msp.identity] Verify -> DEBU c3e Verify: digest = 00000000 32 9f 5c 0f 1a d0 23 a5 16 ab 89 b9 d1 eb ca e8 |2.\...#.........| +00000010 8c 6c 83 85 c9 a4 ce 25 df 0b ae 72 f1 c0 59 bb |.l.....%...r..Y.|" +"2019-05-02 09:27:25.178 UTC [msp.identity] Verify -> DEBU c3f Verify: sig = 00000000 30 44 02 20 74 43 4c 83 cd 87 51 e6 cb 3d 56 3b |0D. tCL...Q..=V;| +00000010 1c c1 c3 b1 da 70 5a f0 9d 2f bc f6 ed 3a 8b 36 |.....pZ../...:.6| +00000020 77 1c ff c3 02 20 3d 28 85 83 0c d8 2a 83 e3 1c |w.... =(....*...| +00000030 04 1b 27 65 a1 c7 24 0c b3 3c 22 60 e6 79 f2 e3 |..'e..$..<"`.y..| +00000040 ac 58 cf 50 f8 bd |.X.P..|" +"2019-05-02 09:27:25.179 UTC [lifecycle] InstallChaincode -> DEBU c40 received invocation of InstallChaincode for install package 1f8b08000000000000ffecd66750d3d9fa07f08044a58a59a40882040129920412a46b..." +"2019-05-02 09:27:25.180 UTC [chaincode] handleMessage -> DEBU c41 [19510801] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:25.180 UTC [chaincode] Notify -> DEBU c42 [19510801] notifying Txid:195108018679eee4043cc567ba2e40314729bf4e7ddd4caa43cf2e515c015814, channelID:" +"2019-05-02 09:27:25.180 UTC [chaincode] Execute -> DEBU c43 Exit" +"2019-05-02 09:27:25.181 UTC [endorser] callChaincode -> INFO c44 [][19510801] Exit chaincode: name:"_lifecycle" (3ms)" +"2019-05-02 09:27:25.181 UTC [endorser] SimulateProposal -> DEBU c45 [][19510801] Exit" +"2019-05-02 09:27:25.181 UTC [endorser] func1 -> DEBU c46 Exit: request from 172.18.0.8:57266" +"2019-05-02 09:27:25.181 UTC [comm.grpc.server] 1 -> INFO c47 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57266 grpc.code=OK grpc.call_duration=9.3992ms +"2019-05-02 09:27:25.187 UTC [grpc] infof -> DEBU c48 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:25.187 UTC [grpc] infof -> DEBU c49 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:25.194 UTC [gossip.gossip] handleMessage -> DEBU c4a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.195 UTC [gossip.pull] HandleMessage -> DEBU c4b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.196 UTC [msp] DeserializeIdentity -> DEBU c4c Obtaining identity" +"2019-05-02 09:27:25.196 UTC [msp] DeserializeIdentity -> DEBU c4d Obtaining identity" +"2019-05-02 09:27:25.197 UTC [gossip.pull] SendDigest -> DEBU c4e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:25.198 UTC [gossip.gossip] handleMessage -> DEBU c4f Exiting" +"2019-05-02 09:27:25.203 UTC [gossip.gossip] handleMessage -> DEBU c50 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.203 UTC [gossip.gossip] handleMessage -> DEBU c51 Exiting" +"2019-05-02 09:27:25.203 UTC [gossip.discovery] handleMsgFromComm -> DEBU c52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.204 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c53 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:25.204 UTC [msp] DeserializeIdentity -> DEBU c54 Obtaining identity" +"2019-05-02 09:27:25.205 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c55 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:25.205 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c56 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:25.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c57 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:25.206 UTC [policies] Evaluate -> DEBU c58 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:25.206 UTC [policies] Evaluate -> DEBU c59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:25.207 UTC [policies] Evaluate -> DEBU c5a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:25.207 UTC [cauthdsl] func1 -> DEBU c5b 0xc0026153e0 gate 1556789245207239700 evaluation starts" +"2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5c 0xc0026153e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5d 0xc0026153e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5e 0xc0026153e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:25.207 UTC [cauthdsl] func2 -> DEBU c5f 0xc0026153e0 principal evaluation fails" +"2019-05-02 09:27:25.207 UTC [cauthdsl] func1 -> DEBU c60 0xc0026153e0 gate 1556789245207239700 evaluation fails" +"2019-05-02 09:27:25.208 UTC [policies] Evaluate -> DEBU c61 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:25.208 UTC [policies] Evaluate -> DEBU c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:25.208 UTC [policies] Evaluate -> DEBU c63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:25.208 UTC [cauthdsl] func1 -> DEBU c64 0xc002615c20 gate 1556789245208489100 evaluation starts" +"2019-05-02 09:27:25.208 UTC [cauthdsl] func2 -> DEBU c65 0xc002615c20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:25.208 UTC [cauthdsl] func2 -> DEBU c66 0xc002615c20 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:25.208 UTC [cauthdsl] func2 -> DEBU c67 0xc002615c20 principal matched by identity 0" +"2019-05-02 09:27:25.209 UTC [msp.identity] Verify -> DEBU c68 Verify: digest = 00000000 00 2d 21 a4 e9 07 af 9a 18 22 d6 3e 35 56 dc 6f |.-!......".>5V.o| +00000010 dc 3e 6f dc 68 0e ed 14 86 5d 97 ac bb a1 5e 28 |.>o.h....]....^(|" +"2019-05-02 09:27:25.209 UTC [msp.identity] Verify -> DEBU c69 Verify: sig = 00000000 30 44 02 20 74 71 fe 1b 28 ab dd ac 6c 08 0c 62 |0D. tq..(...l..b| +00000010 2c c9 7f ff bf 1c fd e1 e4 6f af 15 b6 6d b9 e7 |,........o...m..| +00000020 06 0a f0 1d 02 20 5b 3d f8 66 0f 05 a2 23 a5 ab |..... [=.f...#..| +00000030 d6 bf ad 8e 62 d1 14 91 48 24 a3 89 ff 23 94 dc |....b...H$...#..| +00000040 23 a8 ae ee 39 1f |#...9.|" +"2019-05-02 09:27:25.209 UTC [cauthdsl] func2 -> DEBU c6a 0xc002615c20 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:25.209 UTC [cauthdsl] func1 -> DEBU c6b 0xc002615c20 gate 1556789245208489100 evaluation succeeds" +"2019-05-02 09:27:25.210 UTC [policies] Evaluate -> DEBU c6c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:25.211 UTC [policies] Evaluate -> DEBU c6d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:25.211 UTC [policies] Evaluate -> DEBU c6e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:25.211 UTC [policies] Evaluate -> DEBU c6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:25.212 UTC [gossip.discovery] handleAliveMessage -> DEBU c70 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:25.212 UTC [gossip.discovery] learnExistingMembers -> DEBU c71 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:25.212 UTC [gossip.discovery] learnExistingMembers -> DEBU c72 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 " +"2019-05-02 09:27:25.212 UTC [gossip.discovery] learnExistingMembers -> DEBU c73 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 " +"2019-05-02 09:27:25.213 UTC [gossip.discovery] learnExistingMembers -> DEBU c74 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:25.216 UTC [gossip.discovery] learnExistingMembers -> DEBU c75 Exiting" +"2019-05-02 09:27:25.217 UTC [gossip.discovery] handleAliveMessage -> DEBU c76 Exiting" +"2019-05-02 09:27:25.218 UTC [gossip.discovery] sendMemResponse -> DEBU c77 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:25.218 UTC [msp] DeserializeIdentity -> DEBU c78 Obtaining identity" +"2019-05-02 09:27:25.219 UTC [msp] DeserializeIdentity -> DEBU c79 Obtaining identity" +"2019-05-02 09:27:25.219 UTC [msp] DeserializeIdentity -> DEBU c7a Obtaining identity" +"2019-05-02 09:27:25.219 UTC [gossip.comm] Send -> DEBU c7b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:25.220 UTC [gossip.discovery] sendMemResponse -> DEBU c7c Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:25.220 UTC [gossip.comm] sendToEndpoint -> DEBU c7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.220 UTC [gossip.comm] sendToEndpoint -> DEBU c7e Exiting" +"2019-05-02 09:27:25.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU c7f Exiting" +"2019-05-02 09:27:25.831 UTC [gossip.comm] func1 -> DEBU c80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12496793612494837772 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.831 UTC [gossip.gossip] handleMessage -> DEBU c81 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12496793612494837772 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.832 UTC [gossip.pull] HandleMessage -> DEBU c82 GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12496793612494837772 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" +"2019-05-02 09:27:25.832 UTC [msp] DeserializeIdentity -> DEBU c83 Obtaining identity" +"2019-05-02 09:27:25.832 UTC [msp] DeserializeIdentity -> DEBU c84 Obtaining identity" +"2019-05-02 09:27:25.832 UTC [gossip.gossip] handleMessage -> DEBU c85 Exiting" +"2019-05-02 09:27:25.832 UTC [gossip.pull] SendRes -> DEBU c86 Sending 2 IDENTITY_MSG items to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:26.078 UTC [gossip.pull] SendReq -> DEBU c87 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" +"2019-05-02 09:27:26.078 UTC [gossip.comm] Send -> DEBU c88 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:26.079 UTC [gossip.comm] sendToEndpoint -> DEBU c89 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10100156514667359141 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes" +"2019-05-02 09:27:26.079 UTC [gossip.comm] sendToEndpoint -> DEBU c8a Exiting" +"2019-05-02 09:27:26.078 UTC [gossip.pull] SendReq -> DEBU c8b Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051" +"2019-05-02 09:27:26.079 UTC [gossip.comm] Send -> DEBU c8c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:26.080 UTC [gossip.comm] sendToEndpoint -> DEBU c8d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 4191687957081881326 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes" +"2019-05-02 09:27:26.080 UTC [gossip.comm] sendToEndpoint -> DEBU c8e Exiting" +"2019-05-02 09:27:26.081 UTC [gossip.gossip] handleMessage -> DEBU c8f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10100156514667359141, Envelope: 958 bytes, Signature: 0 bytes" +"2019-05-02 09:27:26.081 UTC [msp] DeserializeIdentity -> DEBU c90 Obtaining identity" +"2019-05-02 09:27:26.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:26.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c92 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:26.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c93 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:26.083 UTC [policies] Evaluate -> DEBU c94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:26.083 UTC [policies] Evaluate -> DEBU c95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:26.083 UTC [policies] Evaluate -> DEBU c96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:26.084 UTC [cauthdsl] func1 -> DEBU c97 0xc0028083e0 gate 1556789246083989400 evaluation starts" +"2019-05-02 09:27:26.084 UTC [cauthdsl] func2 -> DEBU c98 0xc0028083e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:26.084 UTC [cauthdsl] func2 -> DEBU c99 0xc0028083e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:26.085 UTC [cauthdsl] func2 -> DEBU c9a 0xc0028083e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:26.085 UTC [cauthdsl] func2 -> DEBU c9b 0xc0028083e0 principal evaluation fails" +"2019-05-02 09:27:26.085 UTC [cauthdsl] func1 -> DEBU c9c 0xc0028083e0 gate 1556789246083989400 evaluation fails" +"2019-05-02 09:27:26.085 UTC [policies] Evaluate -> DEBU c9d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:26.086 UTC [policies] Evaluate -> DEBU c9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:26.086 UTC [policies] Evaluate -> DEBU c9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:26.086 UTC [cauthdsl] func1 -> DEBU ca0 0xc002808c20 gate 1556789246086477200 evaluation starts" +"2019-05-02 09:27:26.086 UTC [cauthdsl] func2 -> DEBU ca1 0xc002808c20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:26.086 UTC [cauthdsl] func2 -> DEBU ca2 0xc002808c20 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:26.087 UTC [gossip.comm] func1 -> DEBU ca3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4191687957081881326, Envelope: 956 bytes, Signature: 0 bytes" +"2019-05-02 09:27:26.087 UTC [cauthdsl] func2 -> DEBU ca4 0xc002808c20 principal matched by identity 0" +"2019-05-02 09:27:26.089 UTC [msp.identity] Verify -> DEBU ca5 Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| 00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" -"2019-05-02 01:30:50.734 UTC [msp.identity] Verify -> DEBU bfc Verify: sig = 00000000 30 45 02 21 00 a8 d1 ad ba a6 49 20 ec bc 04 6e |0E.!......I ...n| -00000010 be 4e 25 2c 27 b4 9a cc 8a 7b c5 ff 32 32 c1 59 |.N%,'....{..22.Y| -00000020 75 fe d8 33 2c 02 20 3d 0a 92 26 8b 93 60 c1 60 |u..3,. =..&..`.`| -00000030 c8 8f cb 23 d3 02 c6 bb e1 91 e1 d1 38 25 a0 e2 |...#........8%..| -00000040 ad 5d 42 66 73 64 fd |.]Bfsd.|" -"2019-05-02 01:30:50.736 UTC [cauthdsl] func2 -> DEBU bfd 0xc003414510 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:50.737 UTC [cauthdsl] func1 -> DEBU bfe 0xc003414510 gate 1556760650731583800 evaluation succeeds" -"2019-05-02 01:30:50.740 UTC [policies] Evaluate -> DEBU bff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:50.740 UTC [policies] Evaluate -> DEBU c00 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:50.742 UTC [policies] Evaluate -> DEBU c01 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:50.743 UTC [policies] Evaluate -> DEBU c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:50.745 UTC [gossip.comm] func1 -> DEBU c04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17096223391310539901, Envelope: 958 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.743 UTC [msp] DeserializeIdentity -> DEBU c03 Obtaining identity" -"2019-05-02 01:30:50.749 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:50.749 UTC [gossip.pull] HandleMessage -> DEBU c06 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13121253355825226892, Envelope: 958 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.750 UTC [msp] DeserializeIdentity -> DEBU c07 Obtaining identity" -"2019-05-02 01:30:50.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c08 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:50.751 UTC [msp] DeserializeIdentity -> DEBU c09 Obtaining identity" -"2019-05-02 01:30:50.752 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:50.752 UTC [gossip.gossip] func2 -> DEBU c0b Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -"2019-05-02 01:30:50.752 UTC [gossip.pull] HandleMessage -> DEBU c0c Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 3" -"2019-05-02 01:30:50.755 UTC [gossip.gossip] handleMessage -> DEBU c0d Exiting" -"2019-05-02 01:30:50.756 UTC [gossip.gossip] handleMessage -> DEBU c0e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17096223391310539901, Envelope: 958 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.757 UTC [msp] DeserializeIdentity -> DEBU c0f Obtaining identity" -"2019-05-02 01:30:50.758 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c10 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:50.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c11 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:50.760 UTC [gossip.comm] func1 -> DEBU c12 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13431760505888185262 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c13 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:50.763 UTC [policies] Evaluate -> DEBU c14 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:50.764 UTC [policies] Evaluate -> DEBU c15 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:50.765 UTC [policies] Evaluate -> DEBU c16 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:50.767 UTC [cauthdsl] func1 -> DEBU c17 0xc003414f70 gate 1556760650767156600 evaluation starts" -"2019-05-02 01:30:50.767 UTC [cauthdsl] func2 -> DEBU c18 0xc003414f70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:50.767 UTC [cauthdsl] func2 -> DEBU c19 0xc003414f70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:50.768 UTC [cauthdsl] func2 -> DEBU c1a 0xc003414f70 principal matched by identity 0" -"2019-05-02 01:30:50.768 UTC [msp.identity] Verify -> DEBU c1b Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| +"2019-05-02 09:27:26.089 UTC [msp.identity] Verify -> DEBU ca6 Verify: sig = 00000000 30 45 02 21 00 aa 60 a8 92 c2 2e b3 38 2f f5 c7 |0E.!..`.....8/..| +00000010 7f 31 7c 67 57 c2 f5 44 17 6e 47 86 88 c0 8d 17 |.1|gW..D.nG.....| +00000020 8b a6 f1 0d cc 02 20 67 22 c6 13 53 4e 49 aa 82 |...... g"..SNI..| +00000030 d7 f7 1c 94 93 95 0d 78 e7 99 b9 45 cd 10 02 3e |.......x...E...>| +00000040 a5 67 8e 47 21 e0 6a |.g.G!.j|" +"2019-05-02 09:27:26.089 UTC [cauthdsl] func2 -> DEBU ca7 0xc002808c20 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:26.090 UTC [cauthdsl] func1 -> DEBU ca8 0xc002808c20 gate 1556789246086477200 evaluation succeeds" +"2019-05-02 09:27:26.090 UTC [policies] Evaluate -> DEBU ca9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:26.090 UTC [policies] Evaluate -> DEBU caa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:26.090 UTC [policies] Evaluate -> DEBU cab Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:26.091 UTC [policies] Evaluate -> DEBU cac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:26.091 UTC [msp] DeserializeIdentity -> DEBU cad Obtaining identity" +"2019-05-02 09:27:26.091 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:26.092 UTC [gossip.pull] HandleMessage -> DEBU caf GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10100156514667359141, Envelope: 958 bytes, Signature: 0 bytes" +"2019-05-02 09:27:26.092 UTC [msp] DeserializeIdentity -> DEBU cb0 Obtaining identity" +"2019-05-02 09:27:26.092 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cb1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:26.093 UTC [msp] DeserializeIdentity -> DEBU cb2 Obtaining identity" +"2019-05-02 09:27:26.093 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cb3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:26.093 UTC [gossip.gossip] func2 -> DEBU cb4 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-05-02 09:27:26.094 UTC [gossip.pull] HandleMessage -> DEBU cb5 Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 3" +"2019-05-02 09:27:26.094 UTC [gossip.gossip] handleMessage -> DEBU cb6 Exiting" +"2019-05-02 09:27:26.094 UTC [gossip.gossip] handleMessage -> DEBU cb7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4191687957081881326, Envelope: 956 bytes, Signature: 0 bytes" +"2019-05-02 09:27:26.094 UTC [msp] DeserializeIdentity -> DEBU cb8 Obtaining identity" +"2019-05-02 09:27:26.095 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cb9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:26.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cba Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:26.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cbb Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:26.095 UTC [policies] Evaluate -> DEBU cbc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:26.096 UTC [policies] Evaluate -> DEBU cbd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:26.096 UTC [policies] Evaluate -> DEBU cbe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:26.096 UTC [cauthdsl] func1 -> DEBU cbf 0xc002c42080 gate 1556789246096704600 evaluation starts" +"2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc0 0xc002c42080 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc1 0xc002c42080 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc2 0xc002c42080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:26.097 UTC [cauthdsl] func2 -> DEBU cc3 0xc002c42080 principal evaluation fails" +"2019-05-02 09:27:26.098 UTC [cauthdsl] func1 -> DEBU cc4 0xc002c42080 gate 1556789246096704600 evaluation fails" +"2019-05-02 09:27:26.098 UTC [policies] Evaluate -> DEBU cc5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:26.098 UTC [policies] Evaluate -> DEBU cc6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:26.098 UTC [policies] Evaluate -> DEBU cc7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:26.099 UTC [cauthdsl] func1 -> DEBU cc8 0xc002c428c0 gate 1556789246099359600 evaluation starts" +"2019-05-02 09:27:26.099 UTC [cauthdsl] func2 -> DEBU cc9 0xc002c428c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:26.099 UTC [cauthdsl] func2 -> DEBU cca 0xc002c428c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:26.100 UTC [cauthdsl] func2 -> DEBU ccb 0xc002c428c0 principal matched by identity 0" +"2019-05-02 09:27:26.100 UTC [msp.identity] Verify -> DEBU ccc Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| 00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" -"2019-05-02 01:30:50.769 UTC [msp.identity] Verify -> DEBU c1c Verify: sig = 00000000 30 45 02 21 00 98 b4 4c 59 b8 81 56 8e 5f c7 3f |0E.!...LY..V._.?| -00000010 ff 58 a1 b2 bb 3a 91 31 a4 a4 6c 66 ff d1 45 34 |.X...:.1..lf..E4| -00000020 af 45 9f e1 d3 02 20 48 02 9f e4 07 b6 5e a6 8d |.E.... H.....^..| -00000030 4e d0 9a f9 35 71 28 41 2d 1e 24 a3 35 e0 c8 31 |N...5q(A-.$.5..1| -00000040 fa b1 e6 b3 57 cb 53 |....W.S|" -"2019-05-02 01:30:50.769 UTC [cauthdsl] func2 -> DEBU c1d 0xc003414f70 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:50.769 UTC [cauthdsl] func1 -> DEBU c1e 0xc003414f70 gate 1556760650767156600 evaluation succeeds" -"2019-05-02 01:30:50.770 UTC [policies] Evaluate -> DEBU c1f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:50.770 UTC [policies] Evaluate -> DEBU c20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:50.771 UTC [policies] Evaluate -> DEBU c21 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:50.771 UTC [policies] Evaluate -> DEBU c22 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:50.771 UTC [msp] DeserializeIdentity -> DEBU c23 Obtaining identity" -"2019-05-02 01:30:50.772 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:50.772 UTC [gossip.pull] HandleMessage -> DEBU c25 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17096223391310539901, Envelope: 958 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.773 UTC [msp] DeserializeIdentity -> DEBU c26 Obtaining identity" -"2019-05-02 01:30:50.774 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c27 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:50.774 UTC [msp] DeserializeIdentity -> DEBU c28 Obtaining identity" -"2019-05-02 01:30:50.776 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:50.776 UTC [gossip.gossip] func2 -> DEBU c2a Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -"2019-05-02 01:30:50.777 UTC [gossip.pull] HandleMessage -> DEBU c2b Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 4" -"2019-05-02 01:30:50.777 UTC [gossip.gossip] handleMessage -> DEBU c2c Exiting" -"2019-05-02 01:30:50.778 UTC [gossip.gossip] handleMessage -> DEBU c2d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13431760505888185262 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.778 UTC [gossip.pull] HandleMessage -> DEBU c2e GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13431760505888185262 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes" -"2019-05-02 01:30:50.779 UTC [msp] DeserializeIdentity -> DEBU c2f Obtaining identity" -"2019-05-02 01:30:50.780 UTC [msp] DeserializeIdentity -> DEBU c30 Obtaining identity" -"2019-05-02 01:30:50.781 UTC [gossip.pull] SendRes -> DEBU c31 Sending 2 IDENTITY_MSG items to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:30:50.782 UTC [gossip.gossip] handleMessage -> DEBU c32 Exiting" -"2019-05-02 01:30:50.864 UTC [gossip.channel] reportMembershipChanges -> INFO c33 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ]]" -"2019-05-02 01:30:51.051 UTC [endorser] ProcessProposal -> DEBU c34 Entering: request from 192.168.240.9:41256" -"2019-05-02 01:30:51.051 UTC [protoutils] ValidateProposalMessage -> DEBU c35 ValidateProposalMessage starts for signed proposal 0xc002efe5a0" -"2019-05-02 01:30:51.052 UTC [protoutils] validateChannelHeader -> DEBU c36 validateChannelHeader info: header type 3" -"2019-05-02 01:30:51.052 UTC [protoutils] checkSignatureFromCreator -> DEBU c37 begin" -"2019-05-02 01:30:51.052 UTC [protoutils] checkSignatureFromCreator -> DEBU c38 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:30:51.052 UTC [protoutils] checkSignatureFromCreator -> DEBU c39 creator is valid" -"2019-05-02 01:30:51.053 UTC [msp.identity] Verify -> DEBU c3a Verify: digest = 00000000 af f5 74 43 4c cd 0c 7b 49 1d 4f ee 31 d6 78 8e |..tCL..{I.O.1.x.| -00000010 8c 3a 53 81 a5 19 81 b5 a6 ae 60 66 b6 38 19 83 |.:S.......`f.8..|" -"2019-05-02 01:30:51.053 UTC [msp.identity] Verify -> DEBU c3b Verify: sig = 00000000 30 45 02 21 00 80 36 aa b4 96 2a 30 d5 7d 98 00 |0E.!..6...*0.}..| -00000010 11 1a 8b 1f 1a 54 95 23 e5 ed a0 96 85 ed e9 7f |.....T.#........| -00000020 f1 27 07 21 b3 02 20 0c aa 54 db 35 e3 2d 19 a1 |.'.!.. ..T.5.-..| -00000030 1d d8 8e 9c 75 52 a0 45 dc 14 0a 29 ce ab 59 c0 |....uR.E...)..Y.| -00000040 b8 5d 99 23 d2 0f 61 |.].#..a|" -"2019-05-02 01:30:51.054 UTC [protoutils] checkSignatureFromCreator -> DEBU c3c exits successfully" -"2019-05-02 01:30:51.054 UTC [protoutils] validateChaincodeProposalMessage -> DEBU c3d validateChaincodeProposalMessage starts for proposal 0xc0002fce00, header 0xc002eff090" -"2019-05-02 01:30:51.054 UTC [protoutils] validateChaincodeProposalMessage -> DEBU c3e validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -"2019-05-02 01:30:51.054 UTC [endorser] preProcess -> DEBU c3f [][7e041be8] processing txid: 7e041be856e54d4aa6ccadbf030ba839af91127da8b87ab4873fa31aa019a1e5" -"2019-05-02 01:30:51.055 UTC [endorser] SimulateProposal -> DEBU c40 [][7e041be8] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:30:51.055 UTC [endorser] callChaincode -> INFO c41 [][7e041be8] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:30:51.056 UTC [chaincode] Execute -> DEBU c42 Entry" -"2019-05-02 01:30:51.057 UTC [msp.identity] Verify -> DEBU c43 Verify: digest = 00000000 af f5 74 43 4c cd 0c 7b 49 1d 4f ee 31 d6 78 8e |..tCL..{I.O.1.x.| -00000010 8c 3a 53 81 a5 19 81 b5 a6 ae 60 66 b6 38 19 83 |.:S.......`f.8..|" -"2019-05-02 01:30:51.057 UTC [msp.identity] Verify -> DEBU c44 Verify: sig = 00000000 30 45 02 21 00 80 36 aa b4 96 2a 30 d5 7d 98 00 |0E.!..6...*0.}..| -00000010 11 1a 8b 1f 1a 54 95 23 e5 ed a0 96 85 ed e9 7f |.....T.#........| -00000020 f1 27 07 21 b3 02 20 0c aa 54 db 35 e3 2d 19 a1 |.'.!.. ..T.5.-..| -00000030 1d d8 8e 9c 75 52 a0 45 dc 14 0a 29 ce ab 59 c0 |....uR.E...)..Y.| -00000040 b8 5d 99 23 d2 0f 61 |.].#..a|" -"2019-05-02 01:30:51.058 UTC [lifecycle] InstallChaincode -> DEBU c45 received invocation of InstallChaincode for install package 1f8b08000000000000ffecd66750d3d9fa07f08044a58a59a40882040129920412a46b..." -"2019-05-02 01:30:51.059 UTC [chaincode] handleMessage -> DEBU c46 [7e041be8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:51.059 UTC [chaincode] Notify -> DEBU c47 [7e041be8] notifying Txid:7e041be856e54d4aa6ccadbf030ba839af91127da8b87ab4873fa31aa019a1e5, channelID:" -"2019-05-02 01:30:51.060 UTC [chaincode] Execute -> DEBU c48 Exit" -"2019-05-02 01:30:51.060 UTC [endorser] callChaincode -> INFO c49 [][7e041be8] Exit chaincode: name:"_lifecycle" (4ms)" -"2019-05-02 01:30:51.060 UTC [endorser] SimulateProposal -> DEBU c4a [][7e041be8] Exit" -"2019-05-02 01:30:51.061 UTC [endorser] func1 -> DEBU c4b Exit: request from 192.168.240.9:41256" -"2019-05-02 01:30:51.061 UTC [comm.grpc.server] 1 -> INFO c4c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41256 grpc.code=OK grpc.call_duration=11.4817ms -"2019-05-02 01:30:51.067 UTC [grpc] infof -> DEBU c4d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:51.068 UTC [grpc] infof -> DEBU c4e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:51.911 UTC [gossip.election] waitForInterrupt -> DEBU c4f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:30:51.911 UTC [gossip.election] IsLeader -> DEBU c50 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:30:51.911 UTC [msp.identity] Sign -> DEBU c51 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510031801 " -"2019-05-02 01:30:51.912 UTC [msp.identity] Sign -> DEBU c52 Sign: digest: 4F8D1DDF3C4A17DFBFD76A1C3290003DEF7190C62A1CBE275E37692BCE1AE513 " -"2019-05-02 01:30:51.912 UTC [gossip.election] waitForInterrupt -> DEBU c53 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:30:51.921 UTC [msp] DeserializeIdentity -> DEBU c54 Obtaining identity" -"2019-05-02 01:30:51.922 UTC [msp] DeserializeIdentity -> DEBU c55 Obtaining identity" -"2019-05-02 01:30:51.922 UTC [msp] DeserializeIdentity -> DEBU c56 Obtaining identity" -"2019-05-02 01:30:51.923 UTC [msp] DeserializeIdentity -> DEBU c57 Obtaining identity" -"2019-05-02 01:30:51.923 UTC [gossip.comm] Send -> DEBU c58 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:51.923 UTC [msp] DeserializeIdentity -> DEBU c59 Obtaining identity" -"2019-05-02 01:30:51.924 UTC [msp] DeserializeIdentity -> DEBU c5a Obtaining identity" -"2019-05-02 01:30:51.924 UTC [gossip.comm] sendToEndpoint -> DEBU c5b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -"2019-05-02 01:30:51.924 UTC [gossip.comm] sendToEndpoint -> DEBU c5c Exiting" -"2019-05-02 01:30:52.861 UTC [msp] DeserializeIdentity -> DEBU c5d Obtaining identity" -"2019-05-02 01:30:52.862 UTC [msp] DeserializeIdentity -> DEBU c5e Obtaining identity" -"2019-05-02 01:30:52.862 UTC [gossip.comm] Send -> DEBU c5f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:30:52.862 UTC [gossip.comm] sendToEndpoint -> DEBU c60 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.863 UTC [gossip.comm] sendToEndpoint -> DEBU c61 Exiting" -"2019-05-02 01:30:52.863 UTC [gossip.comm] sendToEndpoint -> DEBU c62 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.863 UTC [gossip.comm] sendToEndpoint -> DEBU c63 Exiting" -"2019-05-02 01:30:52.863 UTC [gossip.comm] sendToEndpoint -> DEBU c64 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.864 UTC [gossip.comm] sendToEndpoint -> DEBU c65 Exiting" -"2019-05-02 01:30:52.866 UTC [gossip.gossip] handleMessage -> DEBU c66 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.866 UTC [msp.identity] Verify -> DEBU c67 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:30:52.867 UTC [msp.identity] Verify -> DEBU c68 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:30:52.867 UTC [msp.identity] Verify -> DEBU c69 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -"2019-05-02 01:30:52.867 UTC [msp.identity] Verify -> DEBU c6a Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -00000040 63 c4 de 4c 07 05 |c..L..|" -"2019-05-02 01:30:52.868 UTC [msp] DeserializeIdentity -> DEBU c6b Obtaining identity" -"2019-05-02 01:30:52.868 UTC [msp] DeserializeIdentity -> DEBU c6c Obtaining identity" -"2019-05-02 01:30:52.869 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c6d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:52.869 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c6e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:52.869 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c6f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:52.869 UTC [policies] Evaluate -> DEBU c70 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:52.869 UTC [policies] Evaluate -> DEBU c71 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:52.870 UTC [policies] Evaluate -> DEBU c72 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:52.870 UTC [cauthdsl] func1 -> DEBU c73 0xc0027e3680 gate 1556760652870165400 evaluation starts" -"2019-05-02 01:30:52.870 UTC [cauthdsl] func2 -> DEBU c74 0xc0027e3680 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:52.870 UTC [cauthdsl] func2 -> DEBU c75 0xc0027e3680 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:52.871 UTC [cauthdsl] func2 -> DEBU c76 0xc0027e3680 principal matched by identity 0" -"2019-05-02 01:30:52.871 UTC [msp.identity] Verify -> DEBU c77 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:30:52.871 UTC [msp.identity] Verify -> DEBU c78 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU c79 0xc0027e3680 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:52.872 UTC [cauthdsl] func1 -> DEBU c7a 0xc0027e3680 gate 1556760652870165400 evaluation succeeds" -"2019-05-02 01:30:52.872 UTC [policies] Evaluate -> DEBU c7b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:52.872 UTC [policies] Evaluate -> DEBU c7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:52.872 UTC [policies] Evaluate -> DEBU c7d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:52.872 UTC [policies] Evaluate -> DEBU c7e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:52.872 UTC [gossip.gossip] handleMessage -> DEBU c7f Exiting" -"2019-05-02 01:30:52.873 UTC [gossip.comm] func1 -> DEBU c80 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.873 UTC [gossip.gossip] handleMessage -> DEBU c81 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.873 UTC [msp] DeserializeIdentity -> DEBU c82 Obtaining identity" -"2019-05-02 01:30:52.873 UTC [msp] DeserializeIdentity -> DEBU c83 Obtaining identity" -"2019-05-02 01:30:52.873 UTC [msp] DeserializeIdentity -> DEBU c84 Obtaining identity" -"2019-05-02 01:30:52.874 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:52.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c86 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:52.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c87 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:52.875 UTC [policies] Evaluate -> DEBU c88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:52.875 UTC [policies] Evaluate -> DEBU c89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:52.875 UTC [policies] Evaluate -> DEBU c8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:52.875 UTC [cauthdsl] func1 -> DEBU c8b 0xc002d092f0 gate 1556760652875885300 evaluation starts" -"2019-05-02 01:30:52.876 UTC [cauthdsl] func2 -> DEBU c8c 0xc002d092f0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:52.876 UTC [cauthdsl] func2 -> DEBU c8d 0xc002d092f0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:52.876 UTC [cauthdsl] func2 -> DEBU c8e 0xc002d092f0 principal matched by identity 0" -"2019-05-02 01:30:52.877 UTC [msp.identity] Verify -> DEBU c8f Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:30:52.877 UTC [msp.identity] Verify -> DEBU c90 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU c91 0xc002d092f0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:52.878 UTC [cauthdsl] func1 -> DEBU c92 0xc002d092f0 gate 1556760652875885300 evaluation succeeds" -"2019-05-02 01:30:52.878 UTC [policies] Evaluate -> DEBU c93 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:52.878 UTC [policies] Evaluate -> DEBU c94 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:52.878 UTC [policies] Evaluate -> DEBU c95 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:52.879 UTC [policies] Evaluate -> DEBU c96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:52.879 UTC [msp.identity] Verify -> DEBU c97 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -"2019-05-02 01:30:52.881 UTC [msp.identity] Verify -> DEBU c98 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -00000040 63 c4 de 4c 07 05 |c..L..|" -"2019-05-02 01:30:52.882 UTC [gossip.comm] func1 -> DEBU c99 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.883 UTC [msp.identity] Verify -> DEBU c9a Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:30:52.884 UTC [msp.identity] Verify -> DEBU c9b Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:30:52.885 UTC [msp] DeserializeIdentity -> DEBU c9c Obtaining identity" -"2019-05-02 01:30:52.885 UTC [msp] DeserializeIdentity -> DEBU c9d Obtaining identity" -"2019-05-02 01:30:52.885 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:52.885 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c9f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:52.885 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ca0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:52.886 UTC [policies] Evaluate -> DEBU ca1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:52.887 UTC [msp] DeserializeIdentity -> DEBU ca2 Obtaining identity" -"2019-05-02 01:30:52.887 UTC [msp] DeserializeIdentity -> DEBU ca3 Obtaining identity" -"2019-05-02 01:30:52.887 UTC [gossip.pull] Hello -> DEBU ca4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:30:52.888 UTC [msp] DeserializeIdentity -> DEBU ca5 Obtaining identity" -"2019-05-02 01:30:52.888 UTC [msp] DeserializeIdentity -> DEBU ca6 Obtaining identity" -"2019-05-02 01:30:52.889 UTC [gossip.comm] Send -> DEBU ca7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:52.890 UTC [gossip.comm] sendToEndpoint -> DEBU ca8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.890 UTC [gossip.comm] sendToEndpoint -> DEBU ca9 Exiting" -"2019-05-02 01:30:52.887 UTC [policies] Evaluate -> DEBU caa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:52.893 UTC [policies] Evaluate -> DEBU cab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:52.893 UTC [cauthdsl] func1 -> DEBU cac 0xc002e51900 gate 1556760652893660500 evaluation starts" -"2019-05-02 01:30:52.893 UTC [cauthdsl] func2 -> DEBU cad 0xc002e51900 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:52.894 UTC [cauthdsl] func2 -> DEBU cae 0xc002e51900 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:52.895 UTC [cauthdsl] func2 -> DEBU caf 0xc002e51900 principal matched by identity 0" -"2019-05-02 01:30:52.895 UTC [msp.identity] Verify -> DEBU cb0 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -"2019-05-02 01:30:52.895 UTC [msp.identity] Verify -> DEBU cb1 Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -"2019-05-02 01:30:52.896 UTC [cauthdsl] func2 -> DEBU cb2 0xc002e51900 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:52.896 UTC [cauthdsl] func1 -> DEBU cb3 0xc002e51900 gate 1556760652893660500 evaluation succeeds" -"2019-05-02 01:30:52.897 UTC [policies] Evaluate -> DEBU cb4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:52.897 UTC [policies] Evaluate -> DEBU cb5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:52.897 UTC [policies] Evaluate -> DEBU cb6 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:52.897 UTC [policies] Evaluate -> DEBU cb7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:52.898 UTC [gossip.gossip] handleMessage -> DEBU cb8 Exiting" -"2019-05-02 01:30:52.898 UTC [gossip.gossip] handleMessage -> DEBU cb9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.898 UTC [msp] DeserializeIdentity -> DEBU cba Obtaining identity" -"2019-05-02 01:30:52.899 UTC [msp] DeserializeIdentity -> DEBU cbb Obtaining identity" -"2019-05-02 01:30:52.900 UTC [msp] DeserializeIdentity -> DEBU cbc Obtaining identity" -"2019-05-02 01:30:52.901 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cbd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:52.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cbe Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:52.902 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cbf Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:52.902 UTC [policies] Evaluate -> DEBU cc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:52.903 UTC [policies] Evaluate -> DEBU cc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:52.903 UTC [policies] Evaluate -> DEBU cc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:52.903 UTC [cauthdsl] func1 -> DEBU cc3 0xc0024a3410 gate 1556760652903805400 evaluation starts" -"2019-05-02 01:30:52.904 UTC [cauthdsl] func2 -> DEBU cc4 0xc0024a3410 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:52.904 UTC [cauthdsl] func2 -> DEBU cc5 0xc0024a3410 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:52.904 UTC [cauthdsl] func2 -> DEBU cc6 0xc0024a3410 principal matched by identity 0" -"2019-05-02 01:30:52.904 UTC [msp.identity] Verify -> DEBU cc7 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -"2019-05-02 01:30:52.904 UTC [msp.identity] Verify -> DEBU cc8 Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -"2019-05-02 01:30:52.905 UTC [cauthdsl] func2 -> DEBU cc9 0xc0024a3410 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:52.905 UTC [cauthdsl] func1 -> DEBU cca 0xc0024a3410 gate 1556760652903805400 evaluation succeeds" -"2019-05-02 01:30:52.905 UTC [policies] Evaluate -> DEBU ccb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:52.905 UTC [policies] Evaluate -> DEBU ccc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:52.905 UTC [policies] Evaluate -> DEBU ccd Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:52.905 UTC [policies] Evaluate -> DEBU cce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:52.906 UTC [msp.identity] Verify -> DEBU ccf Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -"2019-05-02 01:30:52.906 UTC [msp.identity] Verify -> DEBU cd0 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -00000040 63 c4 de 4c 07 05 |c..L..|" -"2019-05-02 01:30:52.906 UTC [msp] DeserializeIdentity -> DEBU cd1 Obtaining identity" -"2019-05-02 01:30:52.907 UTC [msp] DeserializeIdentity -> DEBU cd2 Obtaining identity" -"2019-05-02 01:30:52.907 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cd3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:52.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cd4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:52.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cd5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:52.908 UTC [policies] Evaluate -> DEBU cd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:52.908 UTC [policies] Evaluate -> DEBU cd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:52.908 UTC [policies] Evaluate -> DEBU cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:52.909 UTC [cauthdsl] func1 -> DEBU cd9 0xc002621300 gate 1556760652909100500 evaluation starts" -"2019-05-02 01:30:52.909 UTC [cauthdsl] func2 -> DEBU cda 0xc002621300 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:52.909 UTC [cauthdsl] func2 -> DEBU cdb 0xc002621300 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:52.910 UTC [cauthdsl] func2 -> DEBU cdc 0xc002621300 principal matched by identity 0" -"2019-05-02 01:30:52.910 UTC [msp.identity] Verify -> DEBU cdd Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:30:52.911 UTC [msp.identity] Verify -> DEBU cde Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU cdf 0xc002621300 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:52.912 UTC [cauthdsl] func1 -> DEBU ce0 0xc002621300 gate 1556760652909100500 evaluation succeeds" -"2019-05-02 01:30:52.912 UTC [policies] Evaluate -> DEBU ce1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:52.913 UTC [policies] Evaluate -> DEBU ce2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:52.913 UTC [policies] Evaluate -> DEBU ce3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:52.913 UTC [policies] Evaluate -> DEBU ce4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:52.914 UTC [gossip.gossip] handleMessage -> DEBU ce5 Exiting" -"2019-05-02 01:30:52.914 UTC [gossip.gossip] handleMessage -> DEBU ce6 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17816125704214259142 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.914 UTC [gossip.pull] HandleMessage -> DEBU ce7 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17816125704214259142 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes" -"2019-05-02 01:30:52.915 UTC [gossip.gossip] handleMessage -> DEBU ce8 Exiting" -"2019-05-02 01:30:53.125 UTC [gossip.gossip] handleMessage -> DEBU ce9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.125 UTC [msp] DeserializeIdentity -> DEBU cea Obtaining identity" -"2019-05-02 01:30:53.126 UTC [msp] DeserializeIdentity -> DEBU ceb Obtaining identity" -"2019-05-02 01:30:53.126 UTC [gossip.gossip] handleMessage -> DEBU cec Exiting" -"2019-05-02 01:30:53.132 UTC [gossip.gossip] handleMessage -> DEBU ced Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.133 UTC [gossip.pull] HandleMessage -> DEBU cee GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.133 UTC [gossip.pull] SendDigest -> DEBU cef Sending BLOCK_MSG digest: [1 2] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:53.134 UTC [gossip.gossip] handleMessage -> DEBU cf0 Exiting" -"2019-05-02 01:30:53.363 UTC [gossip.comm] func1 -> DEBU cf1 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.363 UTC [gossip.gossip] handleMessage -> DEBU cf2 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.363 UTC [msp] DeserializeIdentity -> DEBU cf3 Obtaining identity" -"2019-05-02 01:30:53.363 UTC [msp] DeserializeIdentity -> DEBU cf4 Obtaining identity" -"2019-05-02 01:30:53.364 UTC [msp] DeserializeIdentity -> DEBU cf5 Obtaining identity" -"2019-05-02 01:30:53.364 UTC [gossip.gossip] handleMessage -> DEBU cf6 Exiting" -"2019-05-02 01:30:53.475 UTC [gossip.gossip] handleMessage -> DEBU cf7 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.475 UTC [gossip.pull] HandleMessage -> DEBU cf8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.476 UTC [gossip.pull] SendDigest -> DEBU cf9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:53.476 UTC [gossip.gossip] handleMessage -> DEBU cfa Exiting" -"2019-05-02 01:30:53.476 UTC [gossip.gossip] handleMessage -> DEBU cfb Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.476 UTC [gossip.gossip] handleMessage -> DEBU cfc Exiting" -"2019-05-02 01:30:53.477 UTC [gossip.gossip] handleMessage -> DEBU cfd Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:53.477 UTC [gossip.discovery] handleMsgFromComm -> DEBU cfe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.477 UTC [gossip.gossip] ValidateAliveMsg -> DEBU cff Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:53.478 UTC [msp.identity] Verify -> DEBU d00 Verify: digest = 00000000 f9 f2 78 69 52 44 10 3e 3f 80 96 bb 88 64 e6 e3 |..xiRD.>?....d..| -00000010 78 8d b4 bb a2 9a dd 5f fe f1 d7 3e c7 15 bf 87 |x......_...>....|" -"2019-05-02 01:30:53.478 UTC [msp.identity] Verify -> DEBU d01 Verify: sig = 00000000 30 44 02 20 08 9d ee 3b 10 06 ba 32 1b 49 6f 85 |0D. ...;...2.Io.| -00000010 11 84 9e e0 f8 61 96 72 b8 80 c1 61 19 26 29 07 |.....a.r...a.&).| -00000020 e0 0d 00 93 02 20 57 11 04 53 89 24 38 e8 e3 f7 |..... W..S.$8...| -00000030 8f 60 9f ef 93 d7 87 a3 4d 3e 6d c5 04 b2 dc 00 |.`......M>m.....| -00000040 81 95 5d ad 84 b0 |..]...|" -"2019-05-02 01:30:53.481 UTC [msp.identity] Verify -> DEBU d02 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:53.481 UTC [msp.identity] Verify -> DEBU d03 Verify: sig = 00000000 30 45 02 21 00 d5 04 b8 d5 db 6d 0f 97 78 5b 70 |0E.!......m..x[p| -00000010 a2 d8 91 98 77 67 4e c2 49 bb 2a aa 48 20 ac b1 |....wgN.I.*.H ..| -00000020 c8 bf 28 85 57 02 20 1f 0d 63 fc 7f ea b1 f1 1c |..(.W. ..c......| -00000030 26 81 de e1 28 9c 0c c7 dc 5c 4e 9d 47 5c f6 e8 |&...(....\N.G\..| -00000040 f1 39 5f 74 89 4e eb |.9_t.N.|" -"2019-05-02 01:30:53.482 UTC [gossip.discovery] handleAliveMessage -> DEBU d04 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:53.482 UTC [gossip.discovery] learnExistingMembers -> DEBU d05 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:30:53.484 UTC [gossip.discovery] learnExistingMembers -> DEBU d06 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 " -"2019-05-02 01:30:53.488 UTC [gossip.discovery] learnExistingMembers -> DEBU d07 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 " -"2019-05-02 01:30:53.488 UTC [gossip.discovery] learnExistingMembers -> DEBU d08 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:53.489 UTC [gossip.discovery] learnExistingMembers -> DEBU d09 Exiting" -"2019-05-02 01:30:53.489 UTC [gossip.discovery] handleAliveMessage -> DEBU d0a Exiting" -"2019-05-02 01:30:53.490 UTC [gossip.discovery] handleMsgFromComm -> DEBU d0b Exiting" -"2019-05-02 01:30:53.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU d0c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:53.491 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d0d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:53.492 UTC [msp.identity] Verify -> DEBU d0e Verify: digest = 00000000 65 e8 1b 99 e9 bb a2 eb 7b 7f c0 41 e9 73 48 cb |e.......{..A.sH.| -00000010 c2 10 5f 27 86 84 63 26 cc 38 00 31 ba e5 71 41 |.._'..c&.8.1..qA|" -"2019-05-02 01:30:53.493 UTC [gossip.gossip] handleMessage -> DEBU d0f Exiting" -"2019-05-02 01:30:53.493 UTC [msp.identity] Verify -> DEBU d10 Verify: sig = 00000000 30 45 02 21 00 af 10 6c e9 76 9b dc 98 a5 7c e7 |0E.!...l.v....|.| -00000010 1f 29 df 34 50 a0 d0 6f c9 ba f2 01 2d 2b 33 8c |.).4P..o....-+3.| -00000020 34 0c b2 f0 69 02 20 26 e4 ff b4 38 ff 76 e2 d9 |4...i. &...8.v..| -00000030 85 4a 34 cd bb b1 84 50 75 a3 23 07 62 d8 e6 2f |.J4....Pu.#.b../| -00000040 e0 70 44 af de 4f b7 |.pD..O.|" -"2019-05-02 01:30:53.495 UTC [msp.identity] Verify -> DEBU d11 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:53.495 UTC [msp.identity] Verify -> DEBU d12 Verify: sig = 00000000 30 45 02 21 00 96 80 f2 b0 b1 f2 c8 67 cc 54 84 |0E.!........g.T.| -00000010 c6 25 0c f2 09 8c 69 af 56 ba 9f 8b 3e 45 89 c4 |.%....i.V...>E..| -00000020 05 a5 32 e1 85 02 20 2b eb 1a b6 92 ec bb 55 6b |..2... +......Uk| -00000030 25 33 54 92 ca c2 43 a9 6a 67 e7 18 77 b6 cf 8f |%3T...C.jg..w...| -00000040 31 d3 74 4f a6 d3 35 |1.tO..5|" -"2019-05-02 01:30:53.496 UTC [gossip.discovery] handleAliveMessage -> DEBU d13 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:53.497 UTC [gossip.discovery] handleAliveMessage -> DEBU d14 got old alive message about alive peer Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 lastAliveTS: 1556760633448248700, 23 but got ts: inc_num:1556760633448248700 seq_num:22 " -"2019-05-02 01:30:53.497 UTC [gossip.discovery] handleAliveMessage -> DEBU d15 Exiting" -"2019-05-02 01:30:53.497 UTC [gossip.discovery] handleMsgFromComm -> DEBU d16 Exiting" -"2019-05-02 01:30:53.494 UTC [gossip.discovery] sendMemResponse -> DEBU d17 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:53.499 UTC [msp] DeserializeIdentity -> DEBU d18 Obtaining identity" -"2019-05-02 01:30:53.500 UTC [gossip.comm] func1 -> DEBU d19 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.500 UTC [gossip.gossip] handleMessage -> DEBU d1a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.501 UTC [gossip.gossip] handleMessage -> DEBU d1b Exiting" -"2019-05-02 01:30:53.502 UTC [gossip.discovery] handleMsgFromComm -> DEBU d1c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.502 UTC [gossip.discovery] handleMsgFromComm -> DEBU d1d Exiting" -"2019-05-02 01:30:53.504 UTC [gossip.comm] func1 -> DEBU d1e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.504 UTC [gossip.gossip] handleMessage -> DEBU d1f Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.505 UTC [gossip.gossip] handleMessage -> DEBU d20 Exiting" -"2019-05-02 01:30:53.506 UTC [gossip.discovery] handleMsgFromComm -> DEBU d21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.507 UTC [gossip.discovery] handleMsgFromComm -> DEBU d22 Exiting" -"2019-05-02 01:30:53.508 UTC [msp] DeserializeIdentity -> DEBU d23 Obtaining identity" -"2019-05-02 01:30:53.508 UTC [msp] DeserializeIdentity -> DEBU d24 Obtaining identity" -"2019-05-02 01:30:53.509 UTC [msp] DeserializeIdentity -> DEBU d25 Obtaining identity" -"2019-05-02 01:30:53.510 UTC [msp] DeserializeIdentity -> DEBU d26 Obtaining identity" -"2019-05-02 01:30:53.510 UTC [gossip.comm] Send -> DEBU d27 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:53.510 UTC [msp] DeserializeIdentity -> DEBU d28 Obtaining identity" -"2019-05-02 01:30:53.509 UTC [gossip.comm] Send -> DEBU d29 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:53.511 UTC [gossip.discovery] sendMemResponse -> DEBU d2c Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:30:53.512 UTC [gossip.comm] sendToEndpoint -> DEBU d2d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.511 UTC [gossip.comm] sendToEndpoint -> DEBU d2b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.512 UTC [gossip.comm] sendToEndpoint -> DEBU d2e Exiting" -"2019-05-02 01:30:53.549 UTC [gossip.comm] func1 -> DEBU d30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.550 UTC [gossip.gossip] handleMessage -> DEBU d31 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.551 UTC [gossip.gossip] handleMessage -> DEBU d32 Exiting" -"2019-05-02 01:30:53.551 UTC [gossip.discovery] handleMsgFromComm -> DEBU d33 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.552 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d34 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:53.556 UTC [msp] DeserializeIdentity -> DEBU d35 Obtaining identity" -"2019-05-02 01:30:53.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d36 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:53.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d37 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.558 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d38 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.558 UTC [policies] Evaluate -> DEBU d39 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:53.559 UTC [policies] Evaluate -> DEBU d3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:53.559 UTC [policies] Evaluate -> DEBU d3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:53.560 UTC [cauthdsl] func1 -> DEBU d3c 0xc002c47150 gate 1556760653559991100 evaluation starts" -"2019-05-02 01:30:53.560 UTC [cauthdsl] func2 -> DEBU d3d 0xc002c47150 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:53.560 UTC [cauthdsl] func2 -> DEBU d3e 0xc002c47150 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:53.561 UTC [cauthdsl] func2 -> DEBU d3f 0xc002c47150 principal matched by identity 0" -"2019-05-02 01:30:53.561 UTC [msp.identity] Verify -> DEBU d40 Verify: digest = 00000000 e1 5b 31 ff a7 46 db 1c 87 66 a0 13 f9 f9 f5 0a |.[1..F...f......| -00000010 ef 52 2c 7f a6 c7 90 d1 b7 04 2d bf 33 c4 34 60 |.R,.......-.3.4`|" -"2019-05-02 01:30:53.562 UTC [msp.identity] Verify -> DEBU d41 Verify: sig = 00000000 30 44 02 20 2d 51 fe 04 e3 e9 22 12 a2 14 10 80 |0D. -Q....".....| -00000010 b3 20 83 c8 36 39 20 cf d2 1c e6 62 a8 68 f5 ee |. ..69 ....b.h..| -00000020 c5 e2 f9 15 02 20 1d 68 92 a6 02 ea 7a d4 1f b1 |..... .h....z...| -00000030 f4 b5 2d a4 e4 2e bd e4 99 09 fc 07 0c 59 5b dd |..-..........Y[.| -00000040 6e 6b e3 e2 9f 00 |nk....|" -"2019-05-02 01:30:53.563 UTC [cauthdsl] func2 -> DEBU d42 0xc002c47150 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:53.570 UTC [cauthdsl] func1 -> DEBU d43 0xc002c47150 gate 1556760653559991100 evaluation succeeds" -"2019-05-02 01:30:53.571 UTC [policies] Evaluate -> DEBU d44 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:53.572 UTC [policies] Evaluate -> DEBU d47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:53.513 UTC [gossip.comm] sendToEndpoint -> DEBU d2f Exiting" -"2019-05-02 01:30:53.571 UTC [gossip.gossip] handleMessage -> DEBU d45 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.511 UTC [gossip.comm] Send -> DEBU d2a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:53.572 UTC [gossip.comm] func1 -> DEBU d46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.574 UTC [gossip.comm] sendToEndpoint -> DEBU d48 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.575 UTC [gossip.comm] sendToEndpoint -> DEBU d4a Exiting" -"2019-05-02 01:30:53.574 UTC [gossip.comm] func1 -> DEBU d49 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.577 UTC [gossip.comm] func1 -> DEBU d4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.573 UTC [policies] Evaluate -> DEBU d4c Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:53.583 UTC [policies] Evaluate -> DEBU d4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:53.586 UTC [gossip.discovery] handleAliveMessage -> DEBU d4e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.588 UTC [gossip.discovery] learnExistingMembers -> DEBU d4f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:30:53.588 UTC [gossip.discovery] learnExistingMembers -> DEBU d50 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 " -"2019-05-02 01:30:53.589 UTC [gossip.discovery] learnExistingMembers -> DEBU d51 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 " -"2019-05-02 01:30:53.589 UTC [gossip.discovery] learnExistingMembers -> DEBU d52 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:53.590 UTC [gossip.discovery] learnExistingMembers -> DEBU d53 Exiting" -"2019-05-02 01:30:53.590 UTC [gossip.discovery] handleAliveMessage -> DEBU d54 Exiting" -"2019-05-02 01:30:53.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU d55 Exiting" -"2019-05-02 01:30:53.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU d56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.592 UTC [gossip.discovery] handleMsgFromComm -> DEBU d58 Exiting" -"2019-05-02 01:30:53.592 UTC [gossip.gossip] handleMessage -> DEBU d57 Exiting" -"2019-05-02 01:30:53.593 UTC [gossip.gossip] handleMessage -> DEBU d59 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.593 UTC [gossip.gossip] handleMessage -> DEBU d5a Exiting" -"2019-05-02 01:30:53.594 UTC [gossip.gossip] handleMessage -> DEBU d5c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU d5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.595 UTC [gossip.pull] HandleMessage -> DEBU d5d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.596 UTC [msp] DeserializeIdentity -> DEBU d60 Obtaining identity" -"2019-05-02 01:30:53.596 UTC [msp] DeserializeIdentity -> DEBU d61 Obtaining identity" -"2019-05-02 01:30:53.595 UTC [gossip.discovery] handleMsgFromComm -> DEBU d5e Exiting" -"2019-05-02 01:30:53.596 UTC [msp] DeserializeIdentity -> DEBU d5f Obtaining identity" -"2019-05-02 01:30:53.598 UTC [msp] DeserializeIdentity -> DEBU d63 Obtaining identity" -"2019-05-02 01:30:53.599 UTC [msp] DeserializeIdentity -> DEBU d64 Obtaining identity" -"2019-05-02 01:30:53.597 UTC [msp] DeserializeIdentity -> DEBU d62 Obtaining identity" -"2019-05-02 01:30:53.600 UTC [msp] DeserializeIdentity -> DEBU d65 Obtaining identity" -"2019-05-02 01:30:53.601 UTC [msp] DeserializeIdentity -> DEBU d66 Obtaining identity" -"2019-05-02 01:30:53.601 UTC [msp] DeserializeIdentity -> DEBU d67 Obtaining identity" -"2019-05-02 01:30:53.601 UTC [msp] DeserializeIdentity -> DEBU d68 Obtaining identity" -"2019-05-02 01:30:53.601 UTC [msp] DeserializeIdentity -> DEBU d69 Obtaining identity" -"2019-05-02 01:30:53.602 UTC [gossip.comm] Send -> DEBU d6a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:53.602 UTC [msp] DeserializeIdentity -> DEBU d6b Obtaining identity" -"2019-05-02 01:30:53.602 UTC [msp] DeserializeIdentity -> DEBU d6c Obtaining identity" -"2019-05-02 01:30:53.603 UTC [msp] DeserializeIdentity -> DEBU d6f Obtaining identity" -"2019-05-02 01:30:53.604 UTC [gossip.pull] SendDigest -> DEBU d70 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:53.602 UTC [gossip.comm] Send -> DEBU d6d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:53.604 UTC [gossip.gossip] handleMessage -> DEBU d71 Exiting" -"2019-05-02 01:30:53.605 UTC [gossip.gossip] handleMessage -> DEBU d72 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.606 UTC [gossip.gossip] handleMessage -> DEBU d73 Exiting" -"2019-05-02 01:30:53.613 UTC [gossip.discovery] handleMsgFromComm -> DEBU d74 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.626 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d76 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:53.626 UTC [msp] DeserializeIdentity -> DEBU d77 Obtaining identity" -"2019-05-02 01:30:53.627 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d78 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:53.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d79 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d7a Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.626 UTC [gossip.comm] sendToEndpoint -> DEBU d75 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.603 UTC [gossip.comm] sendToEndpoint -> DEBU d6e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.665 UTC [msp.identity] Sign -> DEBU d7b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151012 " -"2019-05-02 01:30:53.665 UTC [gossip.comm] func1 -> DEBU d7c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.678 UTC [policies] Evaluate -> DEBU d7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:53.679 UTC [gossip.comm] sendToEndpoint -> DEBU d7e Exiting" -"2019-05-02 01:30:53.683 UTC [gossip.comm] sendToEndpoint -> DEBU d7f Exiting" -"2019-05-02 01:30:53.689 UTC [msp.identity] Sign -> DEBU d80 Sign: digest: C44C2B02FA80C8CC73DEE6461A942E57496B04C7A5FBB285A08C18C33693E39F " -"2019-05-02 01:30:53.690 UTC [gossip.gossip] handleMessage -> DEBU d81 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.691 UTC [policies] Evaluate -> DEBU d82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:53.693 UTC [msp.identity] Sign -> DEBU d83 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:53.694 UTC [msp] DeserializeIdentity -> DEBU d84 Obtaining identity" -"2019-05-02 01:30:53.694 UTC [policies] Evaluate -> DEBU d85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:53.696 UTC [msp] DeserializeIdentity -> DEBU d86 Obtaining identity" -"2019-05-02 01:30:53.698 UTC [cauthdsl] func1 -> DEBU d87 0xc00323e400 gate 1556760653698638100 evaluation starts" -"2019-05-02 01:30:53.699 UTC [cauthdsl] func2 -> DEBU d89 0xc00323e400 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:53.700 UTC [cauthdsl] func2 -> DEBU d8a 0xc00323e400 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:53.701 UTC [cauthdsl] func2 -> DEBU d8b 0xc00323e400 principal matched by identity 0" -"2019-05-02 01:30:53.704 UTC [msp.identity] Verify -> DEBU d8c Verify: digest = 00000000 9e a8 02 93 d9 c8 ee 82 bc e5 8c 9a 3a 05 e6 17 |............:...| -00000010 5f 78 b5 67 7b 15 be 31 41 8c b8 22 19 ff 99 6e |_x.g{..1A.."...n|" -"2019-05-02 01:30:53.705 UTC [msp.identity] Verify -> DEBU d8d Verify: sig = 00000000 30 44 02 20 18 b1 12 0f 69 f0 92 7a 32 47 92 fe |0D. ....i..z2G..| -00000010 99 2a b6 46 31 04 07 c0 30 1f 06 bf a2 43 8e d8 |.*.F1...0....C..| -00000020 94 a3 2c a5 02 20 06 7e dc 67 1b de a9 a3 a3 1b |..,.. .~.g......| -00000030 c1 90 db e9 26 25 06 22 62 6f d0 4b 1e 09 2a b6 |....&%."bo.K..*.| -00000040 f5 2b e8 30 66 47 |.+.0fG|" -"2019-05-02 01:30:53.707 UTC [cauthdsl] func2 -> DEBU d8e 0xc00323e400 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:53.707 UTC [cauthdsl] func1 -> DEBU d8f 0xc00323e400 gate 1556760653698638100 evaluation succeeds" -"2019-05-02 01:30:53.708 UTC [policies] Evaluate -> DEBU d90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:53.708 UTC [policies] Evaluate -> DEBU d91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:53.708 UTC [policies] Evaluate -> DEBU d92 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:53.709 UTC [policies] Evaluate -> DEBU d93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:53.710 UTC [gossip.discovery] handleAliveMessage -> DEBU d94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.710 UTC [gossip.discovery] learnExistingMembers -> DEBU d95 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:30:53.711 UTC [gossip.discovery] learnExistingMembers -> DEBU d96 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 " -"2019-05-02 01:30:53.711 UTC [gossip.discovery] learnExistingMembers -> DEBU d97 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 " -"2019-05-02 01:30:53.712 UTC [gossip.discovery] learnExistingMembers -> DEBU d98 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:30:53.712 UTC [gossip.discovery] learnExistingMembers -> DEBU d99 Exiting" -"2019-05-02 01:30:53.713 UTC [gossip.discovery] handleAliveMessage -> DEBU d9a Exiting" -"2019-05-02 01:30:53.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU d9b Exiting" -"2019-05-02 01:30:53.714 UTC [gossip.discovery] sendMemResponse -> DEBU d9c Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:53.715 UTC [msp] DeserializeIdentity -> DEBU d9d Obtaining identity" -"2019-05-02 01:30:53.715 UTC [msp] DeserializeIdentity -> DEBU d9e Obtaining identity" -"2019-05-02 01:30:53.716 UTC [msp] DeserializeIdentity -> DEBU d9f Obtaining identity" -"2019-05-02 01:30:53.717 UTC [gossip.comm] Send -> DEBU da0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:53.718 UTC [gossip.discovery] sendMemResponse -> DEBU da1 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:30:53.719 UTC [gossip.comm] sendToEndpoint -> DEBU da2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.720 UTC [gossip.comm] sendToEndpoint -> DEBU da3 Exiting" -"2019-05-02 01:30:53.699 UTC [msp] DeserializeIdentity -> DEBU d88 Obtaining identity" -"2019-05-02 01:30:53.722 UTC [msp.identity] Sign -> DEBU da4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:53.724 UTC [gossip.discovery] periodicalSendAlive -> DEBU da6 Sleeping 5s" -"2019-05-02 01:30:53.722 UTC [gossip.pull] Hello -> DEBU da5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:30:53.726 UTC [gossip.comm] Send -> DEBU da7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:53.726 UTC [gossip.pull] Hello -> DEBU da8 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:30:53.727 UTC [gossip.comm] Send -> DEBU da9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:53.727 UTC [gossip.pull] Hello -> DEBU daa Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:30:53.727 UTC [gossip.comm] Send -> DEBU dab Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:53.728 UTC [gossip.comm] sendToEndpoint -> DEBU dac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.728 UTC [gossip.comm] sendToEndpoint -> DEBU dad Exiting" -"2019-05-02 01:30:53.729 UTC [gossip.comm] sendToEndpoint -> DEBU dae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.729 UTC [gossip.comm] sendToEndpoint -> DEBU daf Exiting" -"2019-05-02 01:30:53.730 UTC [gossip.comm] sendToEndpoint -> DEBU db0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.731 UTC [gossip.comm] sendToEndpoint -> DEBU db1 Exiting" -"2019-05-02 01:30:53.732 UTC [gossip.gossip] handleMessage -> DEBU db2 Exiting" -"2019-05-02 01:30:53.735 UTC [msp] DeserializeIdentity -> DEBU db3 Obtaining identity" -"2019-05-02 01:30:53.735 UTC [msp] DeserializeIdentity -> DEBU db4 Obtaining identity" -"2019-05-02 01:30:53.837 UTC [msp] DeserializeIdentity -> DEBU db8 Obtaining identity" -"2019-05-02 01:30:53.845 UTC [gossip.comm] Send -> DEBU db9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:53.834 UTC [msp.identity] Sign -> DEBU dba Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151013 " -"2019-05-02 01:30:53.856 UTC [msp.identity] Sign -> DEBU dbb Sign: digest: 4651E7C76BEDCC55070799B055940580EA09D1CEE589877A84F9ABBA0482B953 " -"2019-05-02 01:30:53.749 UTC [gossip.comm] func1 -> DEBU db5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3942773947184320849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.809 UTC [gossip.gossip] handleMessage -> DEBU db6 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13500321336765044630 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 119 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.811 UTC [gossip.comm] func1 -> DEBU db7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5645752682005893664 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.855 UTC [msp] DeserializeIdentity -> DEBU dbc Obtaining identity" -"2019-05-02 01:30:53.857 UTC [msp.identity] Sign -> DEBU dbd Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:53.858 UTC [gossip.comm] func1 -> DEBU dbe Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.869 UTC [gossip.pull] HandleMessage -> DEBU dbf GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13500321336765044630 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 119 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.887 UTC [gossip.comm] Send -> DEBU dc0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:53.888 UTC [gossip.comm] Send -> DEBU dc3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:53.889 UTC [gossip.comm] sendToEndpoint -> DEBU dc4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:53.889 UTC [gossip.comm] sendToEndpoint -> DEBU dc5 Exiting" -"2019-05-02 01:30:53.888 UTC [msp.identity] Sign -> DEBU dc1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:53.890 UTC [gossip.comm] Send -> DEBU dc6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:53.891 UTC [msp] DeserializeIdentity -> DEBU dc7 Obtaining identity" -"2019-05-02 01:30:53.891 UTC [gossip.comm] Send -> DEBU dc8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:53.891 UTC [msp] DeserializeIdentity -> DEBU dc9 Obtaining identity" -"2019-05-02 01:30:53.891 UTC [gossip.comm] Send -> DEBU dca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:53.892 UTC [gossip.comm] sendToEndpoint -> DEBU dcb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.892 UTC [gossip.comm] sendToEndpoint -> DEBU dcc Exiting" -"2019-05-02 01:30:53.892 UTC [gossip.comm] sendToEndpoint -> DEBU dcd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.892 UTC [gossip.comm] sendToEndpoint -> DEBU dce Exiting" -"2019-05-02 01:30:53.888 UTC [gossip.gossip] handleMessage -> DEBU dc2 Exiting" -"2019-05-02 01:30:53.893 UTC [gossip.gossip] handleMessage -> DEBU dcf Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3942773947184320849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.893 UTC [gossip.pull] HandleMessage -> DEBU dd0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3942773947184320849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.893 UTC [gossip.gossip] handleMessage -> DEBU dd1 Exiting" -"2019-05-02 01:30:53.894 UTC [gossip.gossip] handleMessage -> DEBU dd2 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5645752682005893664 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.894 UTC [gossip.pull] HandleMessage -> DEBU dd3 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5645752682005893664 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.894 UTC [gossip.gossip] handleMessage -> DEBU dd4 Exiting" -"2019-05-02 01:30:53.894 UTC [gossip.gossip] handleMessage -> DEBU dd5 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.895 UTC [gossip.pull] HandleMessage -> DEBU dd6 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.895 UTC [msp] DeserializeIdentity -> DEBU dd7 Obtaining identity" -"2019-05-02 01:30:53.895 UTC [msp] DeserializeIdentity -> DEBU dd8 Obtaining identity" -"2019-05-02 01:30:53.896 UTC [msp] DeserializeIdentity -> DEBU dd9 Obtaining identity" -"2019-05-02 01:30:53.896 UTC [msp] DeserializeIdentity -> DEBU dda Obtaining identity" -"2019-05-02 01:30:53.896 UTC [msp] DeserializeIdentity -> DEBU ddb Obtaining identity" -"2019-05-02 01:30:53.898 UTC [msp] DeserializeIdentity -> DEBU ddc Obtaining identity" -"2019-05-02 01:30:53.899 UTC [gossip.pull] SendDigest -> DEBU ddd Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:30:53.900 UTC [gossip.gossip] handleMessage -> DEBU dde Exiting" -"2019-05-02 01:30:53.900 UTC [gossip.comm] sendToEndpoint -> DEBU ddf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.901 UTC [gossip.comm] sendToEndpoint -> DEBU de0 Exiting" -"2019-05-02 01:30:53.903 UTC [gossip.comm] sendToEndpoint -> DEBU de1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.904 UTC [gossip.comm] sendToEndpoint -> DEBU de2 Exiting" -"2019-05-02 01:30:53.905 UTC [gossip.comm] sendToEndpoint -> DEBU de3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.905 UTC [gossip.comm] sendToEndpoint -> DEBU de4 Exiting" -"2019-05-02 01:30:53.905 UTC [gossip.comm] func1 -> DEBU de5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.906 UTC [gossip.comm] func1 -> DEBU de6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.906 UTC [gossip.gossip] handleMessage -> DEBU de7 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.906 UTC [gossip.gossip] handleMessage -> DEBU de8 Exiting" -"2019-05-02 01:30:53.906 UTC [gossip.gossip] handleMessage -> DEBU de9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.907 UTC [gossip.discovery] handleMsgFromComm -> DEBU dea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU deb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:30:53.907 UTC [msp] DeserializeIdentity -> DEBU dec Obtaining identity" -"2019-05-02 01:30:53.908 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ded Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:53.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU dee Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU def Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.908 UTC [policies] Evaluate -> DEBU df0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:53.909 UTC [policies] Evaluate -> DEBU df1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:53.909 UTC [policies] Evaluate -> DEBU df2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:53.909 UTC [cauthdsl] func1 -> DEBU df3 0xc002dcb290 gate 1556760653909692500 evaluation starts" -"2019-05-02 01:30:53.909 UTC [cauthdsl] func2 -> DEBU df4 0xc002dcb290 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:53.910 UTC [cauthdsl] func2 -> DEBU df5 0xc002dcb290 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:53.910 UTC [cauthdsl] func2 -> DEBU df6 0xc002dcb290 principal matched by identity 0" -"2019-05-02 01:30:53.910 UTC [msp.identity] Verify -> DEBU df7 Verify: digest = 00000000 da 3f 62 6d e3 0a 94 fd 68 71 cf e1 e7 4d 6d 88 |.?bm....hq...Mm.| -00000010 36 db 5a 5d 3c e7 80 c0 ab 42 15 b2 73 ad ab f3 |6.Z]<....B..s...|" -"2019-05-02 01:30:53.910 UTC [msp.identity] Verify -> DEBU df8 Verify: sig = 00000000 30 44 02 20 02 72 db 39 13 d1 76 ba a8 87 64 f5 |0D. .r.9..v...d.| -00000010 43 84 b0 dd cb 42 e3 ff bb 05 d4 38 79 87 7f 0c |C....B.....8y...| -00000020 8b 5a 19 35 02 20 10 b3 0f 14 56 82 12 80 72 b4 |.Z.5. ....V...r.| -00000030 f5 89 33 b7 ef 0d e6 fa 3c 3a 4f f4 9d 95 cc 1b |..3.....<:O.....| -00000040 42 a5 8a ff a9 3f |B....?|" -"2019-05-02 01:30:53.911 UTC [cauthdsl] func2 -> DEBU df9 0xc002dcb290 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:53.911 UTC [cauthdsl] func1 -> DEBU dfa 0xc002dcb290 gate 1556760653909692500 evaluation succeeds" -"2019-05-02 01:30:53.911 UTC [policies] Evaluate -> DEBU dfb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:53.911 UTC [policies] Evaluate -> DEBU dfc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:53.911 UTC [policies] Evaluate -> DEBU dfd Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:53.912 UTC [policies] Evaluate -> DEBU dfe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:53.912 UTC [gossip.discovery] handleAliveMessage -> DEBU dff Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.912 UTC [gossip.discovery] learnExistingMembers -> DEBU e00 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:30:53.913 UTC [gossip.discovery] learnExistingMembers -> DEBU e01 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 " -"2019-05-02 01:30:53.913 UTC [gossip.discovery] learnExistingMembers -> DEBU e02 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 " -"2019-05-02 01:30:53.913 UTC [gossip.discovery] learnExistingMembers -> DEBU e03 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:53.914 UTC [gossip.discovery] learnExistingMembers -> DEBU e04 Exiting" -"2019-05-02 01:30:53.914 UTC [gossip.discovery] handleAliveMessage -> DEBU e05 Exiting" -"2019-05-02 01:30:53.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU e06 Exiting" -"2019-05-02 01:30:53.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU e07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e08 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:30:53.916 UTC [msp] DeserializeIdentity -> DEBU e09 Obtaining identity" -"2019-05-02 01:30:53.916 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:53.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e0b Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e0c Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.917 UTC [policies] Evaluate -> DEBU e0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:53.917 UTC [policies] Evaluate -> DEBU e0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:53.917 UTC [policies] Evaluate -> DEBU e0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:53.917 UTC [cauthdsl] func1 -> DEBU e10 0xc002f45500 gate 1556760653917813300 evaluation starts" -"2019-05-02 01:30:53.918 UTC [cauthdsl] func2 -> DEBU e11 0xc002f45500 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:53.918 UTC [cauthdsl] func2 -> DEBU e12 0xc002f45500 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:53.918 UTC [cauthdsl] func2 -> DEBU e13 0xc002f45500 principal matched by identity 0" -"2019-05-02 01:30:53.918 UTC [msp.identity] Verify -> DEBU e14 Verify: digest = 00000000 bd f5 92 e9 8d ef fb a6 d2 14 f9 c8 b7 06 58 92 |..............X.| -00000010 7e d8 16 0f a8 a5 d9 d5 6f 36 ec d7 38 0e 2c f5 |~.......o6..8.,.|" -"2019-05-02 01:30:53.918 UTC [msp.identity] Verify -> DEBU e15 Verify: sig = 00000000 30 45 02 21 00 b1 db e9 cc 5a 28 d4 24 8e 74 e7 |0E.!.....Z(.$.t.| -00000010 de 27 cb 76 37 2d 37 ca e4 e2 6b e9 bd 11 2a 9f |.'.v7-7...k...*.| -00000020 6c 45 20 7e f0 02 20 5b 98 21 93 c1 12 d6 7e d4 |lE ~.. [.!....~.| -00000030 48 c9 29 6c ed b9 20 76 88 93 ce 28 59 8d 02 86 |H.)l.. v...(Y...| -00000040 f5 9b 96 9f 24 ed 35 |....$.5|" -"2019-05-02 01:30:53.919 UTC [cauthdsl] func2 -> DEBU e16 0xc002f45500 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:53.919 UTC [cauthdsl] func1 -> DEBU e17 0xc002f45500 gate 1556760653917813300 evaluation succeeds" -"2019-05-02 01:30:53.919 UTC [policies] Evaluate -> DEBU e18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:53.919 UTC [policies] Evaluate -> DEBU e19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:53.920 UTC [policies] Evaluate -> DEBU e1a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:53.920 UTC [policies] Evaluate -> DEBU e1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:53.920 UTC [gossip.discovery] handleAliveMessage -> DEBU e1c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.921 UTC [gossip.discovery] handleAliveMessage -> DEBU e1d got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1556760633753242000, 22 but got ts: inc_num:1556760633753242000 seq_num:21 " -"2019-05-02 01:30:53.921 UTC [gossip.discovery] handleAliveMessage -> DEBU e1e Exiting" -"2019-05-02 01:30:53.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU e1f Exiting" -"2019-05-02 01:30:53.922 UTC [gossip.gossip] handleMessage -> DEBU e20 Exiting" -"2019-05-02 01:30:53.922 UTC [gossip.discovery] sendMemResponse -> DEBU e21 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:30:53.922 UTC [msp] DeserializeIdentity -> DEBU e22 Obtaining identity" -"2019-05-02 01:30:53.923 UTC [msp] DeserializeIdentity -> DEBU e23 Obtaining identity" -"2019-05-02 01:30:53.923 UTC [msp] DeserializeIdentity -> DEBU e24 Obtaining identity" -"2019-05-02 01:30:53.923 UTC [gossip.comm] Send -> DEBU e25 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:53.923 UTC [gossip.discovery] sendMemResponse -> DEBU e26 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:30:53.923 UTC [gossip.comm] sendToEndpoint -> DEBU e27 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.923 UTC [gossip.comm] sendToEndpoint -> DEBU e28 Exiting" -"2019-05-02 01:30:53.924 UTC [gossip.comm] func1 -> DEBU e29 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.924 UTC [gossip.gossip] handleMessage -> DEBU e2a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.925 UTC [gossip.gossip] handleMessage -> DEBU e2b Exiting" -"2019-05-02 01:30:53.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU e2c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU e2d Exiting" -"2019-05-02 01:30:53.926 UTC [gossip.gossip] handleMessage -> DEBU e2e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.926 UTC [gossip.gossip] handleMessage -> DEBU e2f Exiting" -"2019-05-02 01:30:53.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU e30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU e31 Exiting" -"2019-05-02 01:30:53.963 UTC [msp] DeserializeIdentity -> DEBU e32 Obtaining identity" -"2019-05-02 01:30:53.972 UTC [gossip.comm] func1 -> DEBU e33 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.973 UTC [gossip.gossip] handleMessage -> DEBU e34 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.973 UTC [gossip.gossip] handleMessage -> DEBU e35 Exiting" -"2019-05-02 01:30:53.973 UTC [gossip.discovery] handleMsgFromComm -> DEBU e36 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.974 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e37 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:53.974 UTC [msp.identity] Verify -> DEBU e38 Verify: digest = 00000000 46 51 e7 c7 6b ed cc 55 07 07 99 b0 55 94 05 80 |FQ..k..U....U...| -00000010 ea 09 d1 ce e5 89 87 7a 84 f9 ab ba 04 82 b9 53 |.......z.......S|" -"2019-05-02 01:30:53.974 UTC [msp.identity] Verify -> DEBU e39 Verify: sig = 00000000 30 45 02 21 00 d4 12 f7 c1 39 cf af 37 5f ed b5 |0E.!.....9..7_..| -00000010 9b e4 46 ab e4 83 c5 78 04 70 bb fc 62 d9 13 66 |..F....x.p..b..f| -00000020 13 94 9b dc a9 02 20 2e 7c 31 1b b9 c5 d0 da 68 |...... .|1.....h| -00000030 cd d4 38 83 ea 16 6a 64 28 45 c5 95 11 c2 43 c7 |..8...jd(E....C.| -00000040 2b e4 cd 57 32 45 94 |+..W2E.|" -"2019-05-02 01:30:53.975 UTC [gossip.discovery] handleAliveMessage -> DEBU e3a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.975 UTC [gossip.discovery] isSentByMe -> DEBU e3b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:53.975 UTC [gossip.discovery] handleAliveMessage -> DEBU e3c Exiting" -"2019-05-02 01:30:53.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e3d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:53.976 UTC [msp.identity] Verify -> DEBU e3e Verify: digest = 00000000 f9 f2 78 69 52 44 10 3e 3f 80 96 bb 88 64 e6 e3 |..xiRD.>?....d..| -00000010 78 8d b4 bb a2 9a dd 5f fe f1 d7 3e c7 15 bf 87 |x......_...>....|" -"2019-05-02 01:30:53.977 UTC [msp.identity] Verify -> DEBU e3f Verify: sig = 00000000 30 44 02 20 08 9d ee 3b 10 06 ba 32 1b 49 6f 85 |0D. ...;...2.Io.| -00000010 11 84 9e e0 f8 61 96 72 b8 80 c1 61 19 26 29 07 |.....a.r...a.&).| -00000020 e0 0d 00 93 02 20 57 11 04 53 89 24 38 e8 e3 f7 |..... W..S.$8...| -00000030 8f 60 9f ef 93 d7 87 a3 4d 3e 6d c5 04 b2 dc 00 |.`......M>m.....| -00000040 81 95 5d ad 84 b0 |..]...|" -"2019-05-02 01:30:53.977 UTC [gossip.discovery] handleAliveMessage -> DEBU e40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.965 UTC [msp] DeserializeIdentity -> DEBU e41 Obtaining identity" -"2019-05-02 01:30:53.978 UTC [gossip.discovery] handleAliveMessage -> DEBU e42 Exiting" -"2019-05-02 01:30:53.979 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e43 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:30:53.979 UTC [msp] DeserializeIdentity -> DEBU e44 Obtaining identity" -"2019-05-02 01:30:53.980 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:53.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e46 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e47 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.980 UTC [policies] Evaluate -> DEBU e48 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:53.981 UTC [policies] Evaluate -> DEBU e49 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:53.981 UTC [policies] Evaluate -> DEBU e4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:53.981 UTC [cauthdsl] func1 -> DEBU e4b 0xc0025782a0 gate 1556760653981516800 evaluation starts" -"2019-05-02 01:30:53.981 UTC [cauthdsl] func2 -> DEBU e4c 0xc0025782a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:53.982 UTC [cauthdsl] func2 -> DEBU e4d 0xc0025782a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:53.982 UTC [cauthdsl] func2 -> DEBU e4e 0xc0025782a0 principal matched by identity 0" -"2019-05-02 01:30:53.982 UTC [msp.identity] Verify -> DEBU e4f Verify: digest = 00000000 da 3f 62 6d e3 0a 94 fd 68 71 cf e1 e7 4d 6d 88 |.?bm....hq...Mm.| -00000010 36 db 5a 5d 3c e7 80 c0 ab 42 15 b2 73 ad ab f3 |6.Z]<....B..s...|" -"2019-05-02 01:30:53.982 UTC [msp.identity] Verify -> DEBU e50 Verify: sig = 00000000 30 44 02 20 02 72 db 39 13 d1 76 ba a8 87 64 f5 |0D. .r.9..v...d.| -00000010 43 84 b0 dd cb 42 e3 ff bb 05 d4 38 79 87 7f 0c |C....B.....8y...| -00000020 8b 5a 19 35 02 20 10 b3 0f 14 56 82 12 80 72 b4 |.Z.5. ....V...r.| -00000030 f5 89 33 b7 ef 0d e6 fa 3c 3a 4f f4 9d 95 cc 1b |..3.....<:O.....| -00000040 42 a5 8a ff a9 3f |B....?|" -"2019-05-02 01:30:53.982 UTC [cauthdsl] func2 -> DEBU e51 0xc0025782a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:53.983 UTC [cauthdsl] func1 -> DEBU e52 0xc0025782a0 gate 1556760653981516800 evaluation succeeds" -"2019-05-02 01:30:53.980 UTC [msp] DeserializeIdentity -> DEBU e53 Obtaining identity" -"2019-05-02 01:30:53.983 UTC [policies] Evaluate -> DEBU e54 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:53.984 UTC [policies] Evaluate -> DEBU e55 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:53.985 UTC [policies] Evaluate -> DEBU e56 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:53.985 UTC [policies] Evaluate -> DEBU e57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:53.986 UTC [gossip.discovery] handleAliveMessage -> DEBU e58 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:53.986 UTC [gossip.discovery] handleAliveMessage -> DEBU e59 Exiting" -"2019-05-02 01:30:53.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU e5a Exiting" -"2019-05-02 01:30:53.987 UTC [gossip.comm] func1 -> DEBU e5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.987 UTC [gossip.gossip] handleMessage -> DEBU e5c Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.987 UTC [gossip.gossip] handleMessage -> DEBU e5d Exiting" -"2019-05-02 01:30:53.987 UTC [gossip.discovery] handleMsgFromComm -> DEBU e5e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:30:53.987 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e5f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:53.988 UTC [msp] DeserializeIdentity -> DEBU e60 Obtaining identity" -"2019-05-02 01:30:53.989 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e61 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:53.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e62 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e63 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:53.989 UTC [policies] Evaluate -> DEBU e64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:53.989 UTC [policies] Evaluate -> DEBU e65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:53.989 UTC [policies] Evaluate -> DEBU e66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:53.990 UTC [cauthdsl] func1 -> DEBU e67 0xc00258a280 gate 1556760653990045200 evaluation starts" -"2019-05-02 01:30:53.990 UTC [cauthdsl] func2 -> DEBU e68 0xc00258a280 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:53.990 UTC [cauthdsl] func2 -> DEBU e69 0xc00258a280 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:53.990 UTC [cauthdsl] func2 -> DEBU e6a 0xc00258a280 principal matched by identity 0" -"2019-05-02 01:30:53.990 UTC [msp.identity] Verify -> DEBU e6b Verify: digest = 00000000 9e a8 02 93 d9 c8 ee 82 bc e5 8c 9a 3a 05 e6 17 |............:...| -00000010 5f 78 b5 67 7b 15 be 31 41 8c b8 22 19 ff 99 6e |_x.g{..1A.."...n|" -"2019-05-02 01:30:53.991 UTC [msp.identity] Verify -> DEBU e6c Verify: sig = 00000000 30 44 02 20 18 b1 12 0f 69 f0 92 7a 32 47 92 fe |0D. ....i..z2G..| -00000010 99 2a b6 46 31 04 07 c0 30 1f 06 bf a2 43 8e d8 |.*.F1...0....C..| -00000020 94 a3 2c a5 02 20 06 7e dc 67 1b de a9 a3 a3 1b |..,.. .~.g......| -00000030 c1 90 db e9 26 25 06 22 62 6f d0 4b 1e 09 2a b6 |....&%."bo.K..*.| -00000040 f5 2b e8 30 66 47 |.+.0fG|" -"2019-05-02 01:30:53.992 UTC [cauthdsl] func2 -> DEBU e6d 0xc00258a280 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:53.995 UTC [cauthdsl] func1 -> DEBU e6e 0xc00258a280 gate 1556760653990045200 evaluation succeeds" -"2019-05-02 01:30:54.001 UTC [policies] Evaluate -> DEBU e70 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:54.001 UTC [policies] Evaluate -> DEBU e71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:54.001 UTC [policies] Evaluate -> DEBU e72 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:54.001 UTC [policies] Evaluate -> DEBU e73 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:54.002 UTC [gossip.discovery] handleAliveMessage -> DEBU e74 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:54.002 UTC [gossip.discovery] handleAliveMessage -> DEBU e75 Exiting" -"2019-05-02 01:30:54.002 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e76 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:54.002 UTC [msp.identity] Verify -> DEBU e77 Verify: digest = 00000000 46 51 e7 c7 6b ed cc 55 07 07 99 b0 55 94 05 80 |FQ..k..U....U...| -00000010 ea 09 d1 ce e5 89 87 7a 84 f9 ab ba 04 82 b9 53 |.......z.......S|" -"2019-05-02 01:30:54.003 UTC [msp.identity] Verify -> DEBU e78 Verify: sig = 00000000 30 45 02 21 00 d4 12 f7 c1 39 cf af 37 5f ed b5 |0E.!.....9..7_..| -00000010 9b e4 46 ab e4 83 c5 78 04 70 bb fc 62 d9 13 66 |..F....x.p..b..f| -00000020 13 94 9b dc a9 02 20 2e 7c 31 1b b9 c5 d0 da 68 |...... .|1.....h| -00000030 cd d4 38 83 ea 16 6a 64 28 45 c5 95 11 c2 43 c7 |..8...jd(E....C.| -00000040 2b e4 cd 57 32 45 94 |+..W2E.|" -"2019-05-02 01:30:54.004 UTC [gossip.discovery] handleAliveMessage -> DEBU e79 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:54.005 UTC [gossip.discovery] isSentByMe -> DEBU e7a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:54.005 UTC [gossip.discovery] handleAliveMessage -> DEBU e7b Exiting" -"2019-05-02 01:30:54.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU e7d Exiting" -"2019-05-02 01:30:54.005 UTC [gossip.gossip] handleMessage -> DEBU e7c Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:30:54.000 UTC [msp] DeserializeIdentity -> DEBU e6f Obtaining identity" -"2019-05-02 01:30:54.007 UTC [gossip.gossip] handleMessage -> DEBU e7e Exiting" -"2019-05-02 01:30:54.008 UTC [gossip.discovery] handleMsgFromComm -> DEBU e7f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:30:54.010 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e81 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:54.010 UTC [msp.identity] Verify -> DEBU e82 Verify: digest = 00000000 46 51 e7 c7 6b ed cc 55 07 07 99 b0 55 94 05 80 |FQ..k..U....U...| -00000010 ea 09 d1 ce e5 89 87 7a 84 f9 ab ba 04 82 b9 53 |.......z.......S|" -"2019-05-02 01:30:54.011 UTC [msp.identity] Verify -> DEBU e83 Verify: sig = 00000000 30 45 02 21 00 d4 12 f7 c1 39 cf af 37 5f ed b5 |0E.!.....9..7_..| -00000010 9b e4 46 ab e4 83 c5 78 04 70 bb fc 62 d9 13 66 |..F....x.p..b..f| -00000020 13 94 9b dc a9 02 20 2e 7c 31 1b b9 c5 d0 da 68 |...... .|1.....h| -00000030 cd d4 38 83 ea 16 6a 64 28 45 c5 95 11 c2 43 c7 |..8...jd(E....C.| -00000040 2b e4 cd 57 32 45 94 |+..W2E.|" -"2019-05-02 01:30:54.012 UTC [msp.identity] Verify -> DEBU e84 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:30:54.013 UTC [msp.identity] Verify -> DEBU e85 Verify: sig = 00000000 30 44 02 20 10 fa bf 72 0b ff 50 f7 61 be 6b fa |0D. ...r..P.a.k.| -00000010 5d 7e 4f f8 a9 88 ff 5b d3 e7 7c f0 2b aa fe 17 |]~O....[..|.+...| -00000020 23 01 42 4f 02 20 57 88 2c 15 ba 65 2b 41 92 f9 |#.BO. W.,..e+A..| -00000030 db 51 0e 44 c9 14 a8 a2 6f c3 8c ae d4 db fd 43 |.Q.D....o......C| -00000040 eb 64 64 b0 00 7a |.dd..z|" -"2019-05-02 01:30:54.008 UTC [msp] DeserializeIdentity -> DEBU e80 Obtaining identity" -"2019-05-02 01:30:54.013 UTC [gossip.discovery] handleAliveMessage -> DEBU e86 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:54.014 UTC [gossip.discovery] isSentByMe -> DEBU e88 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:54.014 UTC [gossip.discovery] handleAliveMessage -> DEBU e89 Exiting" -"2019-05-02 01:30:54.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU e8a Exiting" -"2019-05-02 01:30:54.013 UTC [msp] DeserializeIdentity -> DEBU e87 Obtaining identity" -"2019-05-02 01:30:54.014 UTC [gossip.comm] Send -> DEBU e8b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:54.015 UTC [msp] DeserializeIdentity -> DEBU e8c Obtaining identity" -"2019-05-02 01:30:54.015 UTC [msp] DeserializeIdentity -> DEBU e8d Obtaining identity" -"2019-05-02 01:30:54.015 UTC [gossip.comm] Send -> DEBU e8e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:54.015 UTC [gossip.comm] sendToEndpoint -> DEBU e8f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:54.016 UTC [gossip.comm] sendToEndpoint -> DEBU e90 Exiting" -"2019-05-02 01:30:54.019 UTC [gossip.comm] sendToEndpoint -> DEBU e91 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:54.019 UTC [gossip.comm] sendToEndpoint -> DEBU e92 Exiting" -"2019-05-02 01:30:54.877 UTC [endorser] ProcessProposal -> DEBU e93 Entering: request from 192.168.240.9:41274" -"2019-05-02 01:30:54.878 UTC [protoutils] ValidateProposalMessage -> DEBU e94 ValidateProposalMessage starts for signed proposal 0xc0032ded20" -"2019-05-02 01:30:54.878 UTC [protoutils] validateChannelHeader -> DEBU e95 validateChannelHeader info: header type 3" -"2019-05-02 01:30:54.879 UTC [protoutils] checkSignatureFromCreator -> DEBU e96 begin" -"2019-05-02 01:30:54.879 UTC [protoutils] checkSignatureFromCreator -> DEBU e97 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:30:54.879 UTC [protoutils] checkSignatureFromCreator -> DEBU e98 creator is valid" -"2019-05-02 01:30:54.879 UTC [msp.identity] Verify -> DEBU e99 Verify: digest = 00000000 45 61 8f 10 a2 ff 7a a9 61 96 37 b8 8b b2 95 cf |Ea....z.a.7.....| -00000010 e3 10 0b bf 9b c1 02 e4 67 e9 43 0d 7c 13 52 26 |........g.C.|.R&|" -"2019-05-02 01:30:54.880 UTC [msp.identity] Verify -> DEBU e9a Verify: sig = 00000000 30 45 02 21 00 e7 58 21 84 cf bc 7f f9 55 e1 97 |0E.!..X!.....U..| -00000010 61 b1 1e 52 65 a5 d9 c8 f1 65 c6 83 e9 a2 fd 17 |a..Re....e......| -00000020 e6 d3 bd e8 82 02 20 45 66 a2 f5 f9 51 65 2a 61 |...... Ef...Qe*a| -00000030 8f 60 ee a7 c1 3e 58 25 4a ca 47 75 9b 91 30 54 |.`...>X%J.Gu..0T| -00000040 8c 78 93 67 7a 4b 3c |.x.gzK<|" -"2019-05-02 01:30:54.880 UTC [protoutils] checkSignatureFromCreator -> DEBU e9b exits successfully" -"2019-05-02 01:30:54.880 UTC [protoutils] validateChaincodeProposalMessage -> DEBU e9c validateChaincodeProposalMessage starts for proposal 0xc0002fdc00, header 0xc0032df180" -"2019-05-02 01:30:54.880 UTC [protoutils] validateChaincodeProposalMessage -> DEBU e9d validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -"2019-05-02 01:30:54.881 UTC [endorser] preProcess -> DEBU e9e [][9312f22c] processing txid: 9312f22c468dcecaf07742e9c76b3c26e413c4fb8f4b51f5493ca430d619574c" -"2019-05-02 01:30:54.881 UTC [endorser] SimulateProposal -> DEBU e9f [][9312f22c] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:30:54.881 UTC [endorser] callChaincode -> INFO ea0 [][9312f22c] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:30:54.881 UTC [chaincode] Execute -> DEBU ea1 Entry" -"2019-05-02 01:30:54.882 UTC [msp.identity] Verify -> DEBU ea2 Verify: digest = 00000000 45 61 8f 10 a2 ff 7a a9 61 96 37 b8 8b b2 95 cf |Ea....z.a.7.....| -00000010 e3 10 0b bf 9b c1 02 e4 67 e9 43 0d 7c 13 52 26 |........g.C.|.R&|" -"2019-05-02 01:30:54.882 UTC [msp.identity] Verify -> DEBU ea3 Verify: sig = 00000000 30 45 02 21 00 e7 58 21 84 cf bc 7f f9 55 e1 97 |0E.!..X!.....U..| -00000010 61 b1 1e 52 65 a5 d9 c8 f1 65 c6 83 e9 a2 fd 17 |a..Re....e......| -00000020 e6 d3 bd e8 82 02 20 45 66 a2 f5 f9 51 65 2a 61 |...... Ef...Qe*a| -00000030 8f 60 ee a7 c1 3e 58 25 4a ca 47 75 9b 91 30 54 |.`...>X%J.Gu..0T| -00000040 8c 78 93 67 7a 4b 3c |.x.gzK<|" -"2019-05-02 01:30:54.882 UTC [lifecycle] QueryInstalledChaincodes -> DEBU ea4 received invocation of QueryInstalledChaincodes" -"2019-05-02 01:30:54.883 UTC [chaincode] handleMessage -> DEBU ea5 [9312f22c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:54.883 UTC [chaincode] Notify -> DEBU ea6 [9312f22c] notifying Txid:9312f22c468dcecaf07742e9c76b3c26e413c4fb8f4b51f5493ca430d619574c, channelID:" -"2019-05-02 01:30:54.884 UTC [chaincode] Execute -> DEBU ea7 Exit" -"2019-05-02 01:30:54.884 UTC [endorser] callChaincode -> INFO ea8 [][9312f22c] Exit chaincode: name:"_lifecycle" (3ms)" -"2019-05-02 01:30:54.884 UTC [endorser] SimulateProposal -> DEBU ea9 [][9312f22c] Exit" -"2019-05-02 01:30:54.885 UTC [endorser] func1 -> DEBU eaa Exit: request from 192.168.240.9:41274" -"2019-05-02 01:30:54.885 UTC [comm.grpc.server] 1 -> INFO eab unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41274 grpc.code=OK grpc.call_duration=7.7394ms -"2019-05-02 01:30:54.891 UTC [grpc] infof -> DEBU eac transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:54.891 UTC [grpc] warningf -> DEBU ead transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41274: read: connection reset by peer" -"2019-05-02 01:30:54.892 UTC [grpc] infof -> DEBU eae transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:55.315 UTC [endorser] ProcessProposal -> DEBU eaf Entering: request from 192.168.240.9:41278" -"2019-05-02 01:30:55.315 UTC [protoutils] ValidateProposalMessage -> DEBU eb0 ValidateProposalMessage starts for signed proposal 0xc0031d2820" -"2019-05-02 01:30:55.315 UTC [protoutils] validateChannelHeader -> DEBU eb1 validateChannelHeader info: header type 1" -"2019-05-02 01:30:55.315 UTC [protoutils] checkSignatureFromCreator -> DEBU eb2 begin" -"2019-05-02 01:30:55.316 UTC [protoutils] checkSignatureFromCreator -> DEBU eb3 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:30:55.316 UTC [protoutils] checkSignatureFromCreator -> DEBU eb4 creator is valid" -"2019-05-02 01:30:55.316 UTC [msp.identity] Verify -> DEBU eb5 Verify: digest = 00000000 aa d1 8c c7 15 10 71 e4 82 31 25 f0 77 cd 0e 8f |......q..1%.w...| -00000010 0c ef 27 1a 06 47 f0 8e 4f 58 3b 7c 0e 79 7c be |..'..G..OX;|.y|.|" -"2019-05-02 01:30:55.316 UTC [msp.identity] Verify -> DEBU eb6 Verify: sig = 00000000 30 45 02 21 00 ab 10 c5 ad aa 1f 84 04 4d 7b 3b |0E.!.........M{;| -00000010 6e 3e 20 97 6c a8 33 66 52 02 21 de be 05 3e 23 |n> .l.3fR.!...>#| -00000020 2f af 24 47 cf 02 20 1e bc 6d 1f fe ec b7 ca 6c |/.$G.. ..m.....l| -00000030 db f1 89 a0 b5 94 cf 6c 30 bc 5c 32 41 39 80 36 |.......l0.\2A9.6| -00000040 e8 34 b8 67 5b 00 36 |.4.g[.6|" -"2019-05-02 01:30:55.317 UTC [protoutils] checkSignatureFromCreator -> DEBU eb7 exits successfully" -"2019-05-02 01:30:55.317 UTC [protoutils] validateChaincodeProposalMessage -> DEBU eb8 validateChaincodeProposalMessage starts for proposal 0xc000166000, header 0xc0031d2c30" -"2019-05-02 01:30:55.317 UTC [protoutils] validateChaincodeProposalMessage -> DEBU eb9 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-05-02 01:30:55.317 UTC [endorser] preProcess -> DEBU eba [][9ff6c9fe] processing txid: 9ff6c9fe74f692b6f4c3577e434897ca5e12c9946a3a4f71cfa3e57d842bd19c" -"2019-05-02 01:30:55.318 UTC [endorser] SimulateProposal -> DEBU ebb [][9ff6c9fe] Entry chaincode: name:"cscc" " -"2019-05-02 01:30:55.318 UTC [endorser] callChaincode -> INFO ebc [][9ff6c9fe] Entry chaincode: name:"cscc" " -"2019-05-02 01:30:55.319 UTC [chaincode] Execute -> DEBU ebd Entry" -"2019-05-02 01:30:55.320 UTC [cscc] Invoke -> DEBU ebe Invoke function: GetConfigBlock" -"2019-05-02 01:30:55.321 UTC [aclmgmt] CheckACL -> DEBU ebf acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" -"2019-05-02 01:30:55.321 UTC [aclmgmt] CheckACL -> DEBU ec0 acl check(/Channel/Application/Readers)" -"2019-05-02 01:30:55.322 UTC [policies] Evaluate -> DEBU ec1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:55.322 UTC [policies] Evaluate -> DEBU ec2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:55.323 UTC [policies] Evaluate -> DEBU ec3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:55.324 UTC [msp] DeserializeIdentity -> DEBU ec4 Obtaining identity" -"2019-05-02 01:30:55.325 UTC [msp.identity] newIdentity -> DEBU ec5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:26.100 UTC [msp.identity] Verify -> DEBU ccd Verify: sig = 00000000 30 44 02 20 12 0d 5c d7 38 c9 55 c5 70 5c bc 7c |0D. ..\.8.U.p\.|| +00000010 4b c8 e7 16 65 68 98 43 4f 52 9f f9 a1 7c 0d 32 |K...eh.COR...|.2| +00000020 65 d8 d6 0d 02 20 54 40 e0 e2 9d e8 e1 b6 a9 d7 |e.... T@........| +00000030 80 f4 1c 5b e0 b5 88 54 d2 45 20 68 52 8a de e6 |...[...T.E hR...| +00000040 26 d9 9d 93 d8 7e |&....~|" +"2019-05-02 09:27:26.100 UTC [cauthdsl] func2 -> DEBU cce 0xc002c428c0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:26.101 UTC [cauthdsl] func1 -> DEBU ccf 0xc002c428c0 gate 1556789246099359600 evaluation succeeds" +"2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd2 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:26.101 UTC [policies] Evaluate -> DEBU cd3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:26.101 UTC [msp] DeserializeIdentity -> DEBU cd4 Obtaining identity" +"2019-05-02 09:27:26.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cd5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:26.101 UTC [gossip.pull] HandleMessage -> DEBU cd6 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4191687957081881326, Envelope: 956 bytes, Signature: 0 bytes" +"2019-05-02 09:27:26.101 UTC [msp] DeserializeIdentity -> DEBU cd7 Obtaining identity" +"2019-05-02 09:27:26.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cd8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:26.101 UTC [msp] DeserializeIdentity -> DEBU cd9 Obtaining identity" +"2019-05-02 09:27:26.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cda Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:26.101 UTC [gossip.gossip] func2 -> DEBU cdb Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-05-02 09:27:26.101 UTC [gossip.pull] HandleMessage -> DEBU cdc Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 4" +"2019-05-02 09:27:26.101 UTC [gossip.gossip] handleMessage -> DEBU cdd Exiting" +"2019-05-02 09:27:26.194 UTC [gossip.gossip] handleMessage -> DEBU cde Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13530515940468942437 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes" +"2019-05-02 09:27:26.194 UTC [gossip.pull] HandleMessage -> DEBU cdf GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13530515940468942437 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes" +"2019-05-02 09:27:26.194 UTC [msp] DeserializeIdentity -> DEBU ce0 Obtaining identity" +"2019-05-02 09:27:26.194 UTC [gossip.gossip] handleMessage -> DEBU ce1 Exiting" +"2019-05-02 09:27:26.194 UTC [gossip.pull] SendRes -> DEBU ce2 Sending 1 IDENTITY_MSG items to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:26.284 UTC [gossip.channel] reportMembershipChanges -> INFO ce3 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" +"2019-05-02 09:27:27.340 UTC [gossip.election] waitForInterrupt -> DEBU ce4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:27:27.340 UTC [gossip.election] IsLeader -> DEBU ce5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:27:27.340 UTC [msp.identity] Sign -> DEBU ce6 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510031801 " +"2019-05-02 09:27:27.340 UTC [msp.identity] Sign -> DEBU ce7 Sign: digest: 2FD57F641333F770D98B5F06B717144D825CB541233AB40BA3CA975EAE26E353 " +"2019-05-02 09:27:27.340 UTC [gossip.election] waitForInterrupt -> DEBU ce8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU ce9 Obtaining identity" +"2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU cea Obtaining identity" +"2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU ceb Obtaining identity" +"2019-05-02 09:27:27.341 UTC [msp] DeserializeIdentity -> DEBU cec Obtaining identity" +"2019-05-02 09:27:27.341 UTC [gossip.comm] Send -> DEBU ced Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:27.342 UTC [msp] DeserializeIdentity -> DEBU cee Obtaining identity" +"2019-05-02 09:27:27.342 UTC [msp] DeserializeIdentity -> DEBU cef Obtaining identity" +"2019-05-02 09:27:27.342 UTC [gossip.comm] sendToEndpoint -> DEBU cf0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-05-02 09:27:27.342 UTC [gossip.comm] sendToEndpoint -> DEBU cf1 Exiting" +"2019-05-02 09:27:27.732 UTC [endorser] ProcessProposal -> DEBU cf2 Entering: request from 172.18.0.8:57282" +"2019-05-02 09:27:27.732 UTC [protoutils] ValidateProposalMessage -> DEBU cf3 ValidateProposalMessage starts for signed proposal 0xc0023a8000" +"2019-05-02 09:27:27.732 UTC [protoutils] validateChannelHeader -> DEBU cf4 validateChannelHeader info: header type 3" +"2019-05-02 09:27:27.732 UTC [protoutils] checkSignatureFromCreator -> DEBU cf5 begin" +"2019-05-02 09:27:27.732 UTC [protoutils] checkSignatureFromCreator -> DEBU cf6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:27.732 UTC [protoutils] checkSignatureFromCreator -> DEBU cf7 creator is valid" +"2019-05-02 09:27:27.733 UTC [msp.identity] Verify -> DEBU cf8 Verify: digest = 00000000 6a a5 8a ce 8c 28 73 88 7a 8f 7f 2a 53 1f 44 e6 |j....(s.z..*S.D.| +00000010 f1 37 ba a4 1b 4f 20 47 33 6a 91 77 18 f3 87 fc |.7...O G3j.w....|" +"2019-05-02 09:27:27.733 UTC [msp.identity] Verify -> DEBU cf9 Verify: sig = 00000000 30 45 02 21 00 c3 37 52 59 50 82 19 de 9a 21 e3 |0E.!..7RYP....!.| +00000010 13 22 b2 ec e6 36 9c ab a9 f7 7a 35 19 ec 43 2d |."...6....z5..C-| +00000020 35 55 e1 3f 78 02 20 50 b7 10 b1 9b 3d 87 5d 92 |5U.?x. P....=.].| +00000030 0a bb 63 7c a7 cf 01 dc 84 3a 98 d8 75 ce ea e6 |..c|.....:..u...| +00000040 b9 f5 68 c6 9b a4 94 |..h....|" +"2019-05-02 09:27:27.733 UTC [protoutils] checkSignatureFromCreator -> DEBU cfa exits successfully" +"2019-05-02 09:27:27.733 UTC [protoutils] validateChaincodeProposalMessage -> DEBU cfb validateChaincodeProposalMessage starts for proposal 0xc00039ed90, header 0xc0023a8410" +"2019-05-02 09:27:27.733 UTC [protoutils] validateChaincodeProposalMessage -> DEBU cfc validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-05-02 09:27:27.734 UTC [endorser] preProcess -> DEBU cfd [][3c8f6041] processing txid: 3c8f604153da77dec4f675be776b65094edad18e5a0fe1be93aefcf8a0748892" +"2019-05-02 09:27:27.734 UTC [endorser] SimulateProposal -> DEBU cfe [][3c8f6041] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:27.734 UTC [endorser] callChaincode -> INFO cff [][3c8f6041] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:27.734 UTC [chaincode] Execute -> DEBU d00 Entry" +"2019-05-02 09:27:27.735 UTC [msp.identity] Verify -> DEBU d01 Verify: digest = 00000000 6a a5 8a ce 8c 28 73 88 7a 8f 7f 2a 53 1f 44 e6 |j....(s.z..*S.D.| +00000010 f1 37 ba a4 1b 4f 20 47 33 6a 91 77 18 f3 87 fc |.7...O G3j.w....|" +"2019-05-02 09:27:27.735 UTC [msp.identity] Verify -> DEBU d02 Verify: sig = 00000000 30 45 02 21 00 c3 37 52 59 50 82 19 de 9a 21 e3 |0E.!..7RYP....!.| +00000010 13 22 b2 ec e6 36 9c ab a9 f7 7a 35 19 ec 43 2d |."...6....z5..C-| +00000020 35 55 e1 3f 78 02 20 50 b7 10 b1 9b 3d 87 5d 92 |5U.?x. P....=.].| +00000030 0a bb 63 7c a7 cf 01 dc 84 3a 98 d8 75 ce ea e6 |..c|.....:..u...| +00000040 b9 f5 68 c6 9b a4 94 |..h....|" +"2019-05-02 09:27:27.735 UTC [lifecycle] QueryInstalledChaincodes -> DEBU d03 received invocation of QueryInstalledChaincodes" +"2019-05-02 09:27:27.736 UTC [chaincode] handleMessage -> DEBU d04 [3c8f6041] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:27.736 UTC [chaincode] Notify -> DEBU d05 [3c8f6041] notifying Txid:3c8f604153da77dec4f675be776b65094edad18e5a0fe1be93aefcf8a0748892, channelID:" +"2019-05-02 09:27:27.736 UTC [chaincode] Execute -> DEBU d06 Exit" +"2019-05-02 09:27:27.736 UTC [endorser] callChaincode -> INFO d07 [][3c8f6041] Exit chaincode: name:"_lifecycle" (2ms)" +"2019-05-02 09:27:27.737 UTC [endorser] SimulateProposal -> DEBU d08 [][3c8f6041] Exit" +"2019-05-02 09:27:27.737 UTC [endorser] func1 -> DEBU d09 Exit: request from 172.18.0.8:57282" +"2019-05-02 09:27:27.737 UTC [comm.grpc.server] 1 -> INFO d0a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57282 grpc.code=OK grpc.call_duration=5.0127ms +"2019-05-02 09:27:27.741 UTC [grpc] infof -> DEBU d0c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:27.741 UTC [grpc] infof -> DEBU d0b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:27.922 UTC [endorser] ProcessProposal -> DEBU d0d Entering: request from 172.18.0.8:57286" +"2019-05-02 09:27:27.922 UTC [protoutils] ValidateProposalMessage -> DEBU d0e ValidateProposalMessage starts for signed proposal 0xc0023a90e0" +"2019-05-02 09:27:27.923 UTC [protoutils] validateChannelHeader -> DEBU d0f validateChannelHeader info: header type 3" +"2019-05-02 09:27:27.923 UTC [protoutils] checkSignatureFromCreator -> DEBU d10 begin" +"2019-05-02 09:27:27.923 UTC [msp] GetManagerForChain -> DEBU d11 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:27.924 UTC [msp] DeserializeIdentity -> DEBU d12 Obtaining identity" +"2019-05-02 09:27:27.924 UTC [msp.identity] newIdentity -> DEBU d13 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -5616,536 +5003,986 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:30:55.326 UTC [cauthdsl] func1 -> DEBU ec6 0xc0031fe690 gate 1556760655326471700 evaluation starts" -"2019-05-02 01:30:55.326 UTC [cauthdsl] func2 -> DEBU ec7 0xc0031fe690 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:55.327 UTC [cauthdsl] func2 -> DEBU ec8 0xc0031fe690 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:55.327 UTC [cauthdsl] func2 -> DEBU ec9 0xc0031fe690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:30:55.327 UTC [cauthdsl] func2 -> DEBU eca 0xc0031fe690 principal evaluation fails" -"2019-05-02 01:30:55.331 UTC [cauthdsl] func1 -> DEBU ecb 0xc0031fe690 gate 1556760655326471700 evaluation fails" -"2019-05-02 01:30:55.346 UTC [policies] Evaluate -> DEBU ecc Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:55.346 UTC [policies] Evaluate -> DEBU ecd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:55.347 UTC [policies] Evaluate -> DEBU ece == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:30:55.347 UTC [cauthdsl] func1 -> DEBU ecf 0xc0031ff810 gate 1556760655347447700 evaluation starts" -"2019-05-02 01:30:55.347 UTC [cauthdsl] func2 -> DEBU ed0 0xc0031ff810 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:55.347 UTC [cauthdsl] func2 -> DEBU ed1 0xc0031ff810 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:55.348 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ed2 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:30:55.348 UTC [msp] Validate -> DEBU ed3 MSP Org1MSP validating identity" -"2019-05-02 01:30:55.428 UTC [msp] getCertificationChain -> DEBU ed4 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:55.431 UTC [cauthdsl] func2 -> DEBU ed5 0xc0031ff810 principal matched by identity 0" -"2019-05-02 01:30:55.432 UTC [msp.identity] Verify -> DEBU ed6 Verify: digest = 00000000 aa d1 8c c7 15 10 71 e4 82 31 25 f0 77 cd 0e 8f |......q..1%.w...| -00000010 0c ef 27 1a 06 47 f0 8e 4f 58 3b 7c 0e 79 7c be |..'..G..OX;|.y|.|" -"2019-05-02 01:30:55.432 UTC [msp.identity] Verify -> DEBU ed7 Verify: sig = 00000000 30 45 02 21 00 ab 10 c5 ad aa 1f 84 04 4d 7b 3b |0E.!.........M{;| -00000010 6e 3e 20 97 6c a8 33 66 52 02 21 de be 05 3e 23 |n> .l.3fR.!...>#| -00000020 2f af 24 47 cf 02 20 1e bc 6d 1f fe ec b7 ca 6c |/.$G.. ..m.....l| -00000030 db f1 89 a0 b5 94 cf 6c 30 bc 5c 32 41 39 80 36 |.......l0.\2A9.6| -00000040 e8 34 b8 67 5b 00 36 |.4.g[.6|" -"2019-05-02 01:30:55.433 UTC [cauthdsl] func2 -> DEBU ed8 0xc0031ff810 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:55.433 UTC [cauthdsl] func1 -> DEBU ed9 0xc0031ff810 gate 1556760655347447700 evaluation succeeds" -"2019-05-02 01:30:55.433 UTC [policies] Evaluate -> DEBU eda Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:55.433 UTC [policies] Evaluate -> DEBU edb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:55.434 UTC [policies] Evaluate -> DEBU edc Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:55.434 UTC [policies] Evaluate -> DEBU edd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:55.434 UTC [chaincode] handleMessage -> DEBU ede [9ff6c9fe] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:55.434 UTC [chaincode] Notify -> DEBU edf [9ff6c9fe] notifying Txid:9ff6c9fe74f692b6f4c3577e434897ca5e12c9946a3a4f71cfa3e57d842bd19c, channelID:" -"2019-05-02 01:30:55.434 UTC [chaincode] Execute -> DEBU ee0 Exit" -"2019-05-02 01:30:55.435 UTC [endorser] callChaincode -> INFO ee1 [][9ff6c9fe] Exit chaincode: name:"cscc" (116ms)" -"2019-05-02 01:30:55.435 UTC [endorser] SimulateProposal -> DEBU ee2 [][9ff6c9fe] Exit" -"2019-05-02 01:30:55.451 UTC [endorser] func1 -> DEBU ee3 Exit: request from 192.168.240.9:41278" -"2019-05-02 01:30:55.451 UTC [comm.grpc.server] 1 -> INFO ee4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41278 grpc.code=OK grpc.call_duration=137.2116ms -"2019-05-02 01:30:55.522 UTC [endorser] ProcessProposal -> DEBU ee5 Entering: request from 192.168.240.9:41278" -"2019-05-02 01:30:55.523 UTC [protoutils] ValidateProposalMessage -> DEBU ee6 ValidateProposalMessage starts for signed proposal 0xc0033c8c80" -"2019-05-02 01:30:55.523 UTC [protoutils] validateChannelHeader -> DEBU ee7 validateChannelHeader info: header type 3" -"2019-05-02 01:30:55.524 UTC [protoutils] checkSignatureFromCreator -> DEBU ee8 begin" -"2019-05-02 01:30:55.524 UTC [msp] GetManagerForChain -> DEBU ee9 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:30:55.524 UTC [protoutils] checkSignatureFromCreator -> DEBU eea creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:30:55.525 UTC [msp] Validate -> DEBU eeb MSP Org1MSP validating identity" -"2019-05-02 01:30:55.525 UTC [msp] getCertificationChain -> DEBU eec MSP Org1MSP getting certification chain" -"2019-05-02 01:30:55.526 UTC [protoutils] checkSignatureFromCreator -> DEBU eed creator is valid" -"2019-05-02 01:30:55.526 UTC [msp.identity] Verify -> DEBU eee Verify: digest = 00000000 44 20 85 f5 46 36 fe 93 0b 6c a8 fd 08 39 92 35 |D ..F6...l...9.5| -00000010 cf 49 ad b3 b9 00 0a ad 07 5c 1d 0c fe 38 2a 10 |.I.......\...8*.|" -"2019-05-02 01:30:55.527 UTC [msp.identity] Verify -> DEBU eef Verify: sig = 00000000 30 44 02 20 16 27 39 b2 85 af 31 53 00 e4 3d 59 |0D. .'9...1S..=Y| -00000010 c0 0d ce 47 6a 6b a3 cd 4d d0 28 4c 8d b9 11 55 |...Gjk..M.(L...U| -00000020 b5 ea e7 78 02 20 65 91 aa 93 bb b2 84 58 d1 5d |...x. e......X.]| -00000030 ce 12 14 9a ee 75 6d 9c b8 e2 1e 07 60 a4 4e 01 |.....um.....`.N.| -00000040 6b 95 26 f2 69 df |k.&.i.|" -"2019-05-02 01:30:55.532 UTC [protoutils] checkSignatureFromCreator -> DEBU ef0 exits successfully" -"2019-05-02 01:30:55.533 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ef1 validateChaincodeProposalMessage starts for proposal 0xc00045f810, header 0xc0034f5180" -"2019-05-02 01:30:55.533 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ef2 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -"2019-05-02 01:30:55.533 UTC [endorser] preProcess -> DEBU ef3 [businesschannel][48f5b1b7] processing txid: 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a" -"2019-05-02 01:30:55.534 UTC [fsblkstorage] retrieveTransactionByID -> DEBU ef4 retrieveTransactionByID() - txId = [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -"2019-05-02 01:30:55.534 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU ef5 constructing new tx simulator" -"2019-05-02 01:30:55.534 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU ef6 constructing new tx simulator txid = [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -"2019-05-02 01:30:55.535 UTC [endorser] SimulateProposal -> DEBU ef7 [businesschannel][48f5b1b7] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:30:55.535 UTC [endorser] callChaincode -> INFO ef8 [businesschannel][48f5b1b7] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:30:55.535 UTC [chaincode] Execute -> DEBU ef9 Entry" -"2019-05-02 01:30:55.535 UTC [msp.identity] Verify -> DEBU efa Verify: digest = 00000000 44 20 85 f5 46 36 fe 93 0b 6c a8 fd 08 39 92 35 |D ..F6...l...9.5| -00000010 cf 49 ad b3 b9 00 0a ad 07 5c 1d 0c fe 38 2a 10 |.I.......\...8*.|" -"2019-05-02 01:30:55.536 UTC [msp.identity] Verify -> DEBU efb Verify: sig = 00000000 30 44 02 20 16 27 39 b2 85 af 31 53 00 e4 3d 59 |0D. .'9...1S..=Y| -00000010 c0 0d ce 47 6a 6b a3 cd 4d d0 28 4c 8d b9 11 55 |...Gjk..M.(L...U| -00000020 b5 ea e7 78 02 20 65 91 aa 93 bb b2 84 58 d1 5d |...x. e......X.]| -00000030 ce 12 14 9a ee 75 6d 9c b8 e2 1e 07 60 a4 4e 01 |.....um.....`.N.| -00000040 6b 95 26 f2 69 df |k.&.i.|" -"2019-05-02 01:30:55.537 UTC [lifecycle] ApproveChaincodeDefinitionForMyOrg -> DEBU efc received invocation of ApproveChaincodeDefinitionForMyOrg on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" -"2019-05-02 01:30:55.537 UTC [chaincode] handleMessage -> DEBU efd [48f5b1b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:30:55.537 UTC [chaincode] HandleTransaction -> DEBU efe [48f5b1b7] handling GET_STATE from chaincode" -"2019-05-02 01:30:55.538 UTC [chaincode] HandleGetState -> DEBU eff [48f5b1b7] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" -"2019-05-02 01:30:55.539 UTC [stateleveldb] GetState -> DEBU f00 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:30:55.540 UTC [chaincode] HandleGetState -> DEBU f01 [48f5b1b7] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" -"2019-05-02 01:30:55.547 UTC [chaincode] HandleTransaction -> DEBU f02 [48f5b1b7] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:30:55.547 UTC [chaincode] handleMessage -> DEBU f03 [48f5b1b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:30:55.547 UTC [chaincode] HandleTransaction -> DEBU f04 [48f5b1b7] handling GET_STATE from chaincode" -"2019-05-02 01:30:55.547 UTC [chaincode] HandleGetState -> DEBU f05 [48f5b1b7] getting state for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" -"2019-05-02 01:30:55.548 UTC [msp] GetManagerForChain -> DEBU f06 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:30:55.548 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU f07 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:30:55.548 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU f08 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:30:55.548 UTC [stateleveldb] GetState -> DEBU f09 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=namespaces/metadata/exp02#1" -"2019-05-02 01:30:55.548 UTC [stateleveldb] GetState -> DEBU f0a GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -"2019-05-02 01:30:55.548 UTC [chaincode] HandleGetState -> DEBU f0b [48f5b1b7] No state associated with key: namespaces/metadata/exp02#1. Sending RESPONSE with an empty payload" -"2019-05-02 01:30:55.548 UTC [chaincode] HandleTransaction -> DEBU f0c [48f5b1b7] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:30:55.550 UTC [chaincode] handleMessage -> DEBU f0d [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:30:55.550 UTC [chaincode] HandleTransaction -> DEBU f0e [48f5b1b7] handling PUT_STATE from chaincode" -"2019-05-02 01:30:55.550 UTC [chaincode] HandleTransaction -> DEBU f0f [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:30:55.551 UTC [chaincode] handleMessage -> DEBU f10 [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:30:55.551 UTC [chaincode] HandleTransaction -> DEBU f11 [48f5b1b7] handling PUT_STATE from chaincode" -"2019-05-02 01:30:55.552 UTC [chaincode] HandleTransaction -> DEBU f12 [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:30:55.552 UTC [chaincode] handleMessage -> DEBU f13 [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:30:55.552 UTC [chaincode] HandleTransaction -> DEBU f14 [48f5b1b7] handling PUT_STATE from chaincode" -"2019-05-02 01:30:55.553 UTC [chaincode] HandleTransaction -> DEBU f15 [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:30:55.553 UTC [chaincode] handleMessage -> DEBU f16 [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:30:55.554 UTC [chaincode] HandleTransaction -> DEBU f17 [48f5b1b7] handling PUT_STATE from chaincode" -"2019-05-02 01:30:55.554 UTC [chaincode] HandleTransaction -> DEBU f18 [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:30:55.554 UTC [chaincode] handleMessage -> DEBU f19 [48f5b1b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:30:55.555 UTC [chaincode] HandleTransaction -> DEBU f1a [48f5b1b7] handling GET_STATE from chaincode" -"2019-05-02 01:30:55.555 UTC [chaincode] HandleGetState -> DEBU f1b [48f5b1b7] getting state for chaincode _lifecycle, key chaincode-sources/metadata/exp02#1, channel businesschannel" -"2019-05-02 01:30:55.555 UTC [stateleveldb] GetState -> DEBU f1c GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=chaincode-sources/metadata/exp02#1" -"2019-05-02 01:30:55.555 UTC [stateleveldb] GetState -> DEBU f1d GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" -"2019-05-02 01:30:55.555 UTC [chaincode] HandleGetState -> DEBU f1e [48f5b1b7] No state associated with key: chaincode-sources/metadata/exp02#1. Sending RESPONSE with an empty payload" -"2019-05-02 01:30:55.556 UTC [chaincode] HandleTransaction -> DEBU f1f [48f5b1b7] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:30:55.556 UTC [chaincode] handleMessage -> DEBU f20 [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:30:55.556 UTC [chaincode] HandleTransaction -> DEBU f21 [48f5b1b7] handling PUT_STATE from chaincode" -"2019-05-02 01:30:55.557 UTC [chaincode] HandleTransaction -> DEBU f22 [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:30:55.558 UTC [chaincode] handleMessage -> DEBU f23 [48f5b1b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:30:55.558 UTC [chaincode] HandleTransaction -> DEBU f24 [48f5b1b7] handling PUT_STATE from chaincode" -"2019-05-02 01:30:55.559 UTC [chaincode] HandleTransaction -> DEBU f25 [48f5b1b7] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:30:55.559 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO f26 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" -"2019-05-02 01:30:55.559 UTC [chaincode] handleMessage -> DEBU f27 [48f5b1b7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:30:55.560 UTC [chaincode] Notify -> DEBU f28 [48f5b1b7] notifying Txid:48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a, channelID:businesschannel" -"2019-05-02 01:30:55.560 UTC [chaincode] Execute -> DEBU f29 Exit" -"2019-05-02 01:30:55.560 UTC [endorser] callChaincode -> INFO f2a [businesschannel][48f5b1b7] Exit chaincode: name:"_lifecycle" (25ms)" -"2019-05-02 01:30:55.560 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU f2b Simulation completed, getting simulation results" -"2019-05-02 01:30:55.561 UTC [lockbasedtxmgr] Done -> DEBU f2c Done with transaction simulation / query execution [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -"2019-05-02 01:30:55.561 UTC [msp] GetManagerForChain -> DEBU f2d Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:30:55.562 UTC [cauthdsl] func1 -> DEBU f2e 0xc00251f740 gate 1556760655562250500 evaluation starts" -"2019-05-02 01:30:55.562 UTC [cauthdsl] func2 -> DEBU f2f 0xc00251f740 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:55.562 UTC [cauthdsl] func2 -> DEBU f30 0xc00251f740 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:55.562 UTC [cauthdsl] func2 -> DEBU f31 0xc00251f740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:30:55.563 UTC [cauthdsl] func2 -> DEBU f32 0xc00251f740 principal evaluation fails" -"2019-05-02 01:30:55.563 UTC [cauthdsl] func1 -> DEBU f33 0xc00251f740 gate 1556760655562250500 evaluation fails" -"2019-05-02 01:30:55.563 UTC [cauthdsl] func1 -> DEBU f34 0xc00251fcd0 gate 1556760655563712600 evaluation starts" -"2019-05-02 01:30:55.564 UTC [cauthdsl] func2 -> DEBU f35 0xc00251fcd0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:55.564 UTC [cauthdsl] func2 -> DEBU f36 0xc00251fcd0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:55.564 UTC [cauthdsl] func2 -> DEBU f37 0xc00251fcd0 principal matched by identity 0" -"2019-05-02 01:30:55.565 UTC [msp.identity] Verify -> DEBU f38 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:30:55.565 UTC [msp.identity] Verify -> DEBU f39 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:30:55.566 UTC [cauthdsl] func2 -> DEBU f3a 0xc00251fcd0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:55.566 UTC [cauthdsl] func1 -> DEBU f3b 0xc00251fcd0 gate 1556760655563712600 evaluation succeeds" -"2019-05-02 01:30:55.567 UTC [cauthdsl] func1 -> DEBU f3c 0xc0025ce450 gate 1556760655567153700 evaluation starts" -"2019-05-02 01:30:55.567 UTC [cauthdsl] func2 -> DEBU f3d 0xc0025ce450 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:55.568 UTC [cauthdsl] func2 -> DEBU f3e 0xc0025ce450 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:55.569 UTC [cauthdsl] func2 -> DEBU f3f 0xc0025ce450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:30:55.569 UTC [cauthdsl] func2 -> DEBU f40 0xc0025ce450 principal evaluation fails" -"2019-05-02 01:30:55.569 UTC [cauthdsl] func1 -> DEBU f41 0xc0025ce450 gate 1556760655567153700 evaluation fails" -"2019-05-02 01:30:55.569 UTC [transientstore] PersistWithConfig -> DEBU f42 Persisting private data to transient store for txid [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a] at block height [3]" -"2019-05-02 01:30:55.574 UTC [lockbasedtxmgr] Done -> DEBU f43 Done with transaction simulation / query execution [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -"2019-05-02 01:30:55.577 UTC [endorser] SimulateProposal -> DEBU f44 [businesschannel][48f5b1b7] Exit" -"2019-05-02 01:30:55.577 UTC [endorser] endorseProposal -> DEBU f45 [businesschannel][48f5b1b7] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:30:55.581 UTC [endorser] endorseProposal -> DEBU f46 [businesschannel][48f5b1b7] escc for chaincode name:"_lifecycle" is escc" -"2019-05-02 01:30:55.582 UTC [endorser] EndorseWithPlugin -> DEBU f47 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a, chaincode: _lifecycle}" -"2019-05-02 01:30:55.583 UTC [msp.identity] Sign -> DEBU f48 Sign: plaintext: 0A20F119EED4D26C9BFEB772BBD660A7...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:30:55.583 UTC [msp.identity] Sign -> DEBU f49 Sign: digest: 4ACD6B268F2DE270D119D6B8FED7EA5626F0B7659DF2BD04511DD4D573BFB4DB " -"2019-05-02 01:30:55.584 UTC [endorser] EndorseWithPlugin -> DEBU f4a Exiting {plugin: escc, channel: businesschannel, tx: 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a, chaincode: _lifecycle}" -"2019-05-02 01:30:55.584 UTC [endorser] endorseProposal -> DEBU f4b [businesschannel][48f5b1b7] Exit" -"2019-05-02 01:30:55.584 UTC [lockbasedtxmgr] Done -> DEBU f4c Done with transaction simulation / query execution [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -"2019-05-02 01:30:55.584 UTC [endorser] func1 -> DEBU f4d Exit: request from 192.168.240.9:41278" -"2019-05-02 01:30:55.584 UTC [comm.grpc.server] 1 -> INFO f4e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41278 grpc.code=OK grpc.call_duration=62.2793ms -"2019-05-02 01:30:55.586 UTC [common.deliverevents] DeliverFiltered -> DEBU f4f Starting new DeliverFiltered handler" -"2019-05-02 01:30:55.588 UTC [common.deliver] Handle -> DEBU f50 Starting new deliver loop for 192.168.240.9:41280" -"2019-05-02 01:30:55.589 UTC [common.deliver] Handle -> DEBU f51 Attempting to read seek info message from 192.168.240.9:41280" -"2019-05-02 01:30:55.590 UTC [aclmgmt] CheckACL -> DEBU f52 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" -"2019-05-02 01:30:55.593 UTC [aclmgmt] CheckACL -> DEBU f53 acl check(/Channel/Application/Readers)" -"2019-05-02 01:30:55.593 UTC [policies] Evaluate -> DEBU f54 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:55.595 UTC [policies] Evaluate -> DEBU f55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:55.599 UTC [policies] Evaluate -> DEBU f56 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:55.599 UTC [cauthdsl] func1 -> DEBU f57 0xc003220900 gate 1556760655599948000 evaluation starts" -"2019-05-02 01:30:55.600 UTC [cauthdsl] func2 -> DEBU f58 0xc003220900 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:55.600 UTC [cauthdsl] func2 -> DEBU f59 0xc003220900 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:55.600 UTC [cauthdsl] func2 -> DEBU f5a 0xc003220900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:30:55.603 UTC [cauthdsl] func2 -> DEBU f5b 0xc003220900 principal evaluation fails" -"2019-05-02 01:30:55.604 UTC [cauthdsl] func1 -> DEBU f5c 0xc003220900 gate 1556760655599948000 evaluation fails" -"2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU f5d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU f5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:55.604 UTC [policies] Evaluate -> DEBU f5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:30:55.604 UTC [cauthdsl] func1 -> DEBU f60 0xc003221140 gate 1556760655604367100 evaluation starts" -"2019-05-02 01:30:55.604 UTC [cauthdsl] func2 -> DEBU f61 0xc003221140 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:55.604 UTC [cauthdsl] func2 -> DEBU f62 0xc003221140 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:55.604 UTC [cauthdsl] func2 -> DEBU f63 0xc003221140 principal matched by identity 0" -"2019-05-02 01:30:55.604 UTC [msp.identity] Verify -> DEBU f64 Verify: digest = 00000000 7b 0b 19 cc 2d b4 bf 01 2d 4e 85 56 c1 c7 1e 7c |{...-...-N.V...|| -00000010 bc da 3e 24 f2 ae b0 b7 a7 4f 72 83 00 35 be f7 |..>$.....Or..5..|" -"2019-05-02 01:30:55.604 UTC [msp.identity] Verify -> DEBU f65 Verify: sig = 00000000 30 44 02 20 78 cb f2 27 2b 9e 9a 21 27 b9 8e bc |0D. x..'+..!'...| -00000010 b8 86 a4 22 ee 6c f7 93 0b 1f e2 a1 28 87 10 4b |...".l......(..K| -00000020 13 75 6a d3 02 20 44 db b5 4d 91 ec b3 e0 a0 08 |.uj.. D..M......| -00000030 f9 d6 a2 71 45 22 03 ca 7f 76 86 e7 8a 5c c5 a8 |...qE"...v...\..| -00000040 35 28 9d 54 89 fa |5(.T..|" -"2019-05-02 01:30:55.605 UTC [cauthdsl] func2 -> DEBU f66 0xc003221140 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:55.605 UTC [cauthdsl] func1 -> DEBU f67 0xc003221140 gate 1556760655604367100 evaluation succeeds" -"2019-05-02 01:30:55.605 UTC [policies] Evaluate -> DEBU f68 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:55.605 UTC [policies] Evaluate -> DEBU f69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:30:55.605 UTC [policies] Evaluate -> DEBU f6a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:55.605 UTC [policies] Evaluate -> DEBU f6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:55.605 UTC [common.deliver] deliverBlocks -> DEBU f6c [channel: businesschannel] Received seekInfo (0xc002e7d500) start: > stop: > from 192.168.240.9:41280" -"2019-05-02 01:30:55.606 UTC [fsblkstorage] Next -> DEBU f6d Initializing block stream for iterator. itr.maxBlockNumAvailable=2" -"2019-05-02 01:30:55.606 UTC [fsblkstorage] newBlockfileStream -> DEBU f6e newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47628]" -"2019-05-02 01:30:55.607 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f6f Remaining bytes=[23745], Going to peek [8] bytes" -"2019-05-02 01:30:55.607 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f70 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47628], bytesOffset=[47631]}" -"2019-05-02 01:30:55.608 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f71 blockbytes [23742] read from file [0]" -"2019-05-02 01:30:55.608 UTC [common.deliver] deliverBlocks -> DEBU f72 [channel: businesschannel] Delivering block [2] for (0xc002e7d500) for 192.168.240.9:41280" -"2019-05-02 01:30:55.614 UTC [fsblkstorage] waitForBlock -> DEBU f73 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -"2019-05-02 01:30:56.862 UTC [msp] DeserializeIdentity -> DEBU f74 Obtaining identity" -"2019-05-02 01:30:56.862 UTC [msp] DeserializeIdentity -> DEBU f75 Obtaining identity" -"2019-05-02 01:30:56.863 UTC [gossip.comm] Send -> DEBU f76 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:30:56.863 UTC [gossip.comm] sendToEndpoint -> DEBU f77 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:56.863 UTC [gossip.comm] sendToEndpoint -> DEBU f78 Exiting" -"2019-05-02 01:30:56.864 UTC [gossip.comm] sendToEndpoint -> DEBU f79 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:56.864 UTC [gossip.comm] sendToEndpoint -> DEBU f7b Exiting" -"2019-05-02 01:30:56.864 UTC [gossip.comm] sendToEndpoint -> DEBU f7a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:56.864 UTC [gossip.comm] sendToEndpoint -> DEBU f7c Exiting" -"2019-05-02 01:30:56.866 UTC [gossip.comm] func1 -> DEBU f7d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:30:56.867 UTC [gossip.gossip] handleMessage -> DEBU f7e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:30:56.867 UTC [msp] DeserializeIdentity -> DEBU f7f Obtaining identity" -"2019-05-02 01:30:56.868 UTC [msp] DeserializeIdentity -> DEBU f80 Obtaining identity" -"2019-05-02 01:30:56.869 UTC [msp] DeserializeIdentity -> DEBU f82 Obtaining identity" -"2019-05-02 01:30:56.870 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f83 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:56.868 UTC [gossip.comm] func1 -> DEBU f81 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:30:56.870 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f84 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:56.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f85 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:56.871 UTC [policies] Evaluate -> DEBU f86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:56.872 UTC [policies] Evaluate -> DEBU f87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:56.872 UTC [policies] Evaluate -> DEBU f88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:56.872 UTC [cauthdsl] func1 -> DEBU f89 0xc0020e1ef0 gate 1556760656872910100 evaluation starts" -"2019-05-02 01:30:56.873 UTC [cauthdsl] func2 -> DEBU f8a 0xc0020e1ef0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:56.873 UTC [cauthdsl] func2 -> DEBU f8b 0xc0020e1ef0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:56.873 UTC [cauthdsl] func2 -> DEBU f8c 0xc0020e1ef0 principal matched by identity 0" -"2019-05-02 01:30:56.873 UTC [msp.identity] Verify -> DEBU f8d Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:30:56.873 UTC [msp.identity] Verify -> DEBU f8e Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU f8f 0xc0020e1ef0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:56.874 UTC [cauthdsl] func1 -> DEBU f90 0xc0020e1ef0 gate 1556760656872910100 evaluation succeeds" -"2019-05-02 01:30:56.874 UTC [policies] Evaluate -> DEBU f91 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:56.874 UTC [policies] Evaluate -> DEBU f92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:56.875 UTC [policies] Evaluate -> DEBU f93 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:56.875 UTC [policies] Evaluate -> DEBU f94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:56.875 UTC [msp.identity] Verify -> DEBU f95 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -"2019-05-02 01:30:56.875 UTC [msp.identity] Verify -> DEBU f96 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -00000040 63 c4 de 4c 07 05 |c..L..|" -"2019-05-02 01:30:56.877 UTC [msp.identity] Verify -> DEBU f97 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:30:56.877 UTC [msp.identity] Verify -> DEBU f98 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:30:56.878 UTC [msp] DeserializeIdentity -> DEBU f99 Obtaining identity" -"2019-05-02 01:30:56.878 UTC [msp] DeserializeIdentity -> DEBU f9a Obtaining identity" -"2019-05-02 01:30:56.879 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:56.879 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f9c Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:56.879 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f9d Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:56.879 UTC [policies] Evaluate -> DEBU f9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:56.879 UTC [policies] Evaluate -> DEBU f9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:56.880 UTC [policies] Evaluate -> DEBU fa0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:56.880 UTC [cauthdsl] func1 -> DEBU fa1 0xc00274e500 gate 1556760656880352500 evaluation starts" -"2019-05-02 01:30:56.880 UTC [cauthdsl] func2 -> DEBU fa2 0xc00274e500 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:56.880 UTC [cauthdsl] func2 -> DEBU fa3 0xc00274e500 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:56.881 UTC [cauthdsl] func2 -> DEBU fa4 0xc00274e500 principal matched by identity 0" -"2019-05-02 01:30:56.881 UTC [msp.identity] Verify -> DEBU fa5 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -"2019-05-02 01:30:56.881 UTC [msp.identity] Verify -> DEBU fa6 Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -"2019-05-02 01:30:56.881 UTC [cauthdsl] func2 -> DEBU fa7 0xc00274e500 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:56.881 UTC [cauthdsl] func1 -> DEBU fa8 0xc00274e500 gate 1556760656880352500 evaluation succeeds" -"2019-05-02 01:30:56.881 UTC [policies] Evaluate -> DEBU fa9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:56.881 UTC [policies] Evaluate -> DEBU faa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:56.881 UTC [policies] Evaluate -> DEBU fab Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:56.881 UTC [policies] Evaluate -> DEBU fac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:56.881 UTC [gossip.gossip] handleMessage -> DEBU fad Exiting" -"2019-05-02 01:30:56.881 UTC [gossip.gossip] handleMessage -> DEBU fae Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes" -"2019-05-02 01:30:56.883 UTC [msp.identity] Verify -> DEBU faf Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:30:56.884 UTC [msp.identity] Verify -> DEBU fb0 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:30:56.888 UTC [msp.identity] Verify -> DEBU fb1 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -"2019-05-02 01:30:56.888 UTC [msp.identity] Verify -> DEBU fb2 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -00000040 63 c4 de 4c 07 05 |c..L..|" -"2019-05-02 01:30:56.889 UTC [msp] DeserializeIdentity -> DEBU fb3 Obtaining identity" -"2019-05-02 01:30:56.889 UTC [msp] DeserializeIdentity -> DEBU fb4 Obtaining identity" -"2019-05-02 01:30:56.890 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fb5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:56.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fb6 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:56.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fb7 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:56.893 UTC [msp] DeserializeIdentity -> DEBU fb9 Obtaining identity" -"2019-05-02 01:30:56.895 UTC [policies] Evaluate -> DEBU fb8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:56.900 UTC [policies] Evaluate -> DEBU fba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:56.901 UTC [policies] Evaluate -> DEBU fbb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:56.901 UTC [cauthdsl] func1 -> DEBU fbc 0xc0023d2d50 gate 1556760656901587600 evaluation starts" -"2019-05-02 01:30:56.897 UTC [msp] DeserializeIdentity -> DEBU fbd Obtaining identity" -"2019-05-02 01:30:56.902 UTC [gossip.pull] Hello -> DEBU fbf Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:30:56.901 UTC [cauthdsl] func2 -> DEBU fbe 0xc0023d2d50 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:56.903 UTC [msp] DeserializeIdentity -> DEBU fc0 Obtaining identity" -"2019-05-02 01:30:56.903 UTC [cauthdsl] func2 -> DEBU fc1 0xc0023d2d50 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:56.904 UTC [msp] DeserializeIdentity -> DEBU fc2 Obtaining identity" -"2019-05-02 01:30:56.904 UTC [cauthdsl] func2 -> DEBU fc3 0xc0023d2d50 principal matched by identity 0" -"2019-05-02 01:30:56.906 UTC [msp.identity] Verify -> DEBU fc4 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:30:56.906 UTC [msp.identity] Verify -> DEBU fc5 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU fc6 0xc0023d2d50 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:56.909 UTC [cauthdsl] func1 -> DEBU fc7 0xc0023d2d50 gate 1556760656901587600 evaluation succeeds" -"2019-05-02 01:30:56.923 UTC [policies] Evaluate -> DEBU fc8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:56.924 UTC [policies] Evaluate -> DEBU fc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:56.925 UTC [gossip.election] waitForInterrupt -> DEBU fcb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:30:56.925 UTC [gossip.election] IsLeader -> DEBU fcc c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:30:56.925 UTC [msp.identity] Sign -> DEBU fcd Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510041801 " -"2019-05-02 01:30:56.925 UTC [policies] Evaluate -> DEBU fce Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:56.928 UTC [policies] Evaluate -> DEBU fd0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:56.925 UTC [msp.identity] Sign -> DEBU fcf Sign: digest: 0E334A361C588116715A750E6C4F834469221B2623F6061BB956EB057D4E97AD " -"2019-05-02 01:30:56.924 UTC [gossip.comm] Send -> DEBU fca Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:56.929 UTC [gossip.gossip] handleMessage -> DEBU fd1 Exiting" -"2019-05-02 01:30:56.930 UTC [gossip.election] waitForInterrupt -> DEBU fd2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:30:56.931 UTC [gossip.comm] sendToEndpoint -> DEBU fd3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:30:56.932 UTC [gossip.gossip] handleMessage -> DEBU fd4 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:30:56.932 UTC [msp] DeserializeIdentity -> DEBU fd6 Obtaining identity" -"2019-05-02 01:30:56.936 UTC [msp] DeserializeIdentity -> DEBU fd7 Obtaining identity" -"2019-05-02 01:30:56.932 UTC [gossip.comm] sendToEndpoint -> DEBU fd5 Exiting" -"2019-05-02 01:30:56.936 UTC [msp] DeserializeIdentity -> DEBU fd8 Obtaining identity" -"2019-05-02 01:30:56.942 UTC [msp] DeserializeIdentity -> DEBU fd9 Obtaining identity" -"2019-05-02 01:30:56.946 UTC [msp] DeserializeIdentity -> DEBU fda Obtaining identity" -"2019-05-02 01:30:56.946 UTC [msp] DeserializeIdentity -> DEBU fdb Obtaining identity" -"2019-05-02 01:30:56.946 UTC [gossip.comm] Send -> DEBU fdc Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:56.947 UTC [msp] DeserializeIdentity -> DEBU fdd Obtaining identity" -"2019-05-02 01:30:56.947 UTC [msp] DeserializeIdentity -> DEBU fde Obtaining identity" -"2019-05-02 01:30:56.947 UTC [gossip.comm] sendToEndpoint -> DEBU fdf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -"2019-05-02 01:30:56.947 UTC [gossip.comm] sendToEndpoint -> DEBU fe0 Exiting" -"2019-05-02 01:30:56.956 UTC [msp] DeserializeIdentity -> DEBU fe1 Obtaining identity" -"2019-05-02 01:30:56.960 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fe2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:56.960 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:56.960 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:56.960 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:56.960 UTC [policies] Evaluate -> DEBU fe6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:56.960 UTC [policies] Evaluate -> DEBU fe7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:56.960 UTC [cauthdsl] func1 -> DEBU fe8 0xc0027170a0 gate 1556760656960585000 evaluation starts" -"2019-05-02 01:30:56.960 UTC [cauthdsl] func2 -> DEBU fe9 0xc0027170a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:56.960 UTC [cauthdsl] func2 -> DEBU fea 0xc0027170a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:56.960 UTC [cauthdsl] func2 -> DEBU feb 0xc0027170a0 principal matched by identity 0" -"2019-05-02 01:30:56.960 UTC [msp.identity] Verify -> DEBU fec Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -"2019-05-02 01:30:56.960 UTC [msp.identity] Verify -> DEBU fed Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -"2019-05-02 01:30:56.961 UTC [cauthdsl] func2 -> DEBU fee 0xc0027170a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:56.961 UTC [cauthdsl] func1 -> DEBU fef 0xc0027170a0 gate 1556760656960585000 evaluation succeeds" -"2019-05-02 01:30:56.968 UTC [policies] Evaluate -> DEBU ff0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:56.969 UTC [policies] Evaluate -> DEBU ff1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:56.969 UTC [policies] Evaluate -> DEBU ff2 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:56.969 UTC [policies] Evaluate -> DEBU ff3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:56.978 UTC [msp.identity] Verify -> DEBU ff4 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -"2019-05-02 01:30:56.979 UTC [msp.identity] Verify -> DEBU ff5 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -00000040 63 c4 de 4c 07 05 |c..L..|" -"2019-05-02 01:30:56.980 UTC [msp] DeserializeIdentity -> DEBU ff6 Obtaining identity" -"2019-05-02 01:30:56.981 UTC [msp] DeserializeIdentity -> DEBU ff7 Obtaining identity" -"2019-05-02 01:30:56.982 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ff8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:56.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ff9 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:56.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ffa Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:56.983 UTC [policies] Evaluate -> DEBU ffb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:56.983 UTC [policies] Evaluate -> DEBU ffc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:56.983 UTC [policies] Evaluate -> DEBU ffd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:56.984 UTC [cauthdsl] func1 -> DEBU ffe 0xc00268cf90 gate 1556760656984020500 evaluation starts" -"2019-05-02 01:30:56.984 UTC [cauthdsl] func2 -> DEBU fff 0xc00268cf90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:56.984 UTC [cauthdsl] func2 -> DEBU 1000 0xc00268cf90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:56.984 UTC [cauthdsl] func2 -> DEBU 1001 0xc00268cf90 principal matched by identity 0" -"2019-05-02 01:30:56.984 UTC [msp.identity] Verify -> DEBU 1002 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:30:57.013 UTC [msp.identity] Verify -> DEBU 1003 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU 1004 0xc00268cf90 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:57.015 UTC [cauthdsl] func1 -> DEBU 1005 0xc00268cf90 gate 1556760656984020500 evaluation succeeds" -"2019-05-02 01:30:57.016 UTC [policies] Evaluate -> DEBU 1006 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:57.016 UTC [policies] Evaluate -> DEBU 1007 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:57.016 UTC [policies] Evaluate -> DEBU 1008 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:57.017 UTC [policies] Evaluate -> DEBU 1009 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:57.039 UTC [msp.identity] Verify -> DEBU 100a Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:30:57.039 UTC [msp.identity] Verify -> DEBU 100b Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:30:57.040 UTC [gossip.gossip] handleMessage -> DEBU 100c Exiting" -"2019-05-02 01:30:57.040 UTC [gossip.gossip] handleMessage -> DEBU 100d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8267777015481731873 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.041 UTC [gossip.pull] HandleMessage -> DEBU 100e GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8267777015481731873 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.044 UTC [gossip.gossip] handleMessage -> DEBU 100f Exiting" -"2019-05-02 01:30:57.141 UTC [gossip.gossip] handleMessage -> DEBU 1010 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.165 UTC [msp] DeserializeIdentity -> DEBU 1011 Obtaining identity" -"2019-05-02 01:30:57.167 UTC [msp] DeserializeIdentity -> DEBU 1012 Obtaining identity" -"2019-05-02 01:30:57.173 UTC [gossip.gossip] handleMessage -> DEBU 1013 Exiting" -"2019-05-02 01:30:57.179 UTC [gossip.gossip] handleMessage -> DEBU 1014 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.202 UTC [gossip.pull] HandleMessage -> DEBU 1015 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.204 UTC [gossip.pull] SendDigest -> DEBU 1016 Sending BLOCK_MSG digest: [1 2] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:57.204 UTC [gossip.gossip] handleMessage -> DEBU 1017 Exiting" -"2019-05-02 01:30:57.352 UTC [gossip.comm] func1 -> DEBU 1018 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.353 UTC [gossip.gossip] handleMessage -> DEBU 1019 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.354 UTC [msp] DeserializeIdentity -> DEBU 101a Obtaining identity" -"2019-05-02 01:30:57.360 UTC [msp] DeserializeIdentity -> DEBU 101b Obtaining identity" -"2019-05-02 01:30:57.361 UTC [msp] DeserializeIdentity -> DEBU 101c Obtaining identity" -"2019-05-02 01:30:57.362 UTC [gossip.gossip] handleMessage -> DEBU 101d Exiting" -"2019-05-02 01:30:57.460 UTC [gossip.gossip] handleMessage -> DEBU 101e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.461 UTC [gossip.pull] HandleMessage -> DEBU 101f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.461 UTC [gossip.pull] SendDigest -> DEBU 1020 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:57.462 UTC [gossip.gossip] handleMessage -> DEBU 1021 Exiting" -"2019-05-02 01:30:57.469 UTC [gossip.gossip] handleMessage -> DEBU 1022 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.469 UTC [gossip.gossip] handleMessage -> DEBU 1023 Exiting" -"2019-05-02 01:30:57.469 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1024 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.469 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1025 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:57.470 UTC [msp.identity] Verify -> DEBU 1026 Verify: digest = 00000000 da 55 14 00 20 42 c4 58 73 9d a9 8e 9f 1d de 82 |.U.. B.Xs.......| -00000010 91 6d cd 5f 01 a6 0b a0 96 34 fb a5 70 bd f6 b2 |.m._.....4..p...|" -"2019-05-02 01:30:57.470 UTC [msp.identity] Verify -> DEBU 1027 Verify: sig = 00000000 30 44 02 20 40 1f 8f 17 bb 76 b9 eb 71 88 f6 6c |0D. @....v..q..l| -00000010 a6 33 92 9c d9 02 11 e6 e6 47 1a 88 ea 7d 44 ae |.3.......G...}D.| -00000020 c5 23 56 97 02 20 75 09 64 6c 25 4f 9b 38 36 72 |.#V.. u.dl%O.86r| -00000030 a9 9c 24 da c6 00 dd 65 5e ae 42 fa 79 da 6e cc |..$....e^.B.y.n.| -00000040 ca 11 05 e1 91 22 |....."|" -"2019-05-02 01:30:57.470 UTC [msp.identity] Verify -> DEBU 1028 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:27.925 UTC [protoutils] checkSignatureFromCreator -> DEBU d14 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:27.925 UTC [msp] Validate -> DEBU d15 MSP Org1MSP validating identity" +"2019-05-02 09:27:27.926 UTC [msp] getCertificationChain -> DEBU d16 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:27.926 UTC [protoutils] checkSignatureFromCreator -> DEBU d17 creator is valid" +"2019-05-02 09:27:27.927 UTC [msp.identity] Verify -> DEBU d18 Verify: digest = 00000000 e4 3e fe cb a2 3d 1b 8a de c1 e4 0a a1 c7 84 10 |.>...=..........| +00000010 c6 81 84 91 e5 cb 0f 9a 62 c2 07 e1 8b 5a d6 6b |........b....Z.k|" +"2019-05-02 09:27:27.927 UTC [msp.identity] Verify -> DEBU d19 Verify: sig = 00000000 30 44 02 20 52 c1 2a 1d b7 99 9e 59 aa 99 47 4a |0D. R.*....Y..GJ| +00000010 d0 bf 6b 76 86 d5 b9 dc 23 e5 8a bf cd fc 99 64 |..kv....#......d| +00000020 98 17 49 47 02 20 0a fc cc 30 f7 eb 39 b8 35 20 |..IG. ...0..9.5 | +00000030 4e b5 5f 5b 73 71 b4 d9 23 87 14 a2 7a 5f d9 60 |N._[sq..#...z_.`| +00000040 42 93 a3 05 09 51 |B....Q|" +"2019-05-02 09:27:27.928 UTC [protoutils] checkSignatureFromCreator -> DEBU d1a exits successfully" +"2019-05-02 09:27:27.928 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d1b validateChaincodeProposalMessage starts for proposal 0xc00039f8f0, header 0xc0023a9540" +"2019-05-02 09:27:27.929 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d1c validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-05-02 09:27:27.929 UTC [endorser] preProcess -> DEBU d1d [businesschannel][fd30334a] processing txid: fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940" +"2019-05-02 09:27:27.929 UTC [fsblkstorage] retrieveTransactionByID -> DEBU d1e retrieveTransactionByID() - txId = [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +"2019-05-02 09:27:27.930 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU d1f constructing new tx simulator" +"2019-05-02 09:27:27.930 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU d20 constructing new tx simulator txid = [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +"2019-05-02 09:27:27.931 UTC [endorser] SimulateProposal -> DEBU d21 [businesschannel][fd30334a] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:27.931 UTC [endorser] callChaincode -> INFO d22 [businesschannel][fd30334a] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:27.932 UTC [chaincode] Execute -> DEBU d23 Entry" +"2019-05-02 09:27:27.932 UTC [msp.identity] Verify -> DEBU d24 Verify: digest = 00000000 e4 3e fe cb a2 3d 1b 8a de c1 e4 0a a1 c7 84 10 |.>...=..........| +00000010 c6 81 84 91 e5 cb 0f 9a 62 c2 07 e1 8b 5a d6 6b |........b....Z.k|" +"2019-05-02 09:27:27.932 UTC [msp.identity] Verify -> DEBU d25 Verify: sig = 00000000 30 44 02 20 52 c1 2a 1d b7 99 9e 59 aa 99 47 4a |0D. R.*....Y..GJ| +00000010 d0 bf 6b 76 86 d5 b9 dc 23 e5 8a bf cd fc 99 64 |..kv....#......d| +00000020 98 17 49 47 02 20 0a fc cc 30 f7 eb 39 b8 35 20 |..IG. ...0..9.5 | +00000030 4e b5 5f 5b 73 71 b4 d9 23 87 14 a2 7a 5f d9 60 |N._[sq..#...z_.`| +00000040 42 93 a3 05 09 51 |B....Q|" +"2019-05-02 09:27:27.933 UTC [lifecycle] ApproveChaincodeDefinitionForMyOrg -> DEBU d26 received invocation of ApproveChaincodeDefinitionForMyOrg on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" +"2019-05-02 09:27:27.934 UTC [chaincode] handleMessage -> DEBU d27 [fd30334a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:27.934 UTC [chaincode] HandleTransaction -> DEBU d28 [fd30334a] handling GET_STATE from chaincode" +"2019-05-02 09:27:27.934 UTC [chaincode] HandleGetState -> DEBU d29 [fd30334a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +"2019-05-02 09:27:27.934 UTC [stateleveldb] GetState -> DEBU d2a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:27.934 UTC [chaincode] HandleGetState -> DEBU d2b [fd30334a] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +"2019-05-02 09:27:27.934 UTC [chaincode] HandleTransaction -> DEBU d2c [fd30334a] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:27.934 UTC [chaincode] handleMessage -> DEBU d2d [fd30334a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:27.934 UTC [chaincode] HandleTransaction -> DEBU d2e [fd30334a] handling GET_STATE from chaincode" +"2019-05-02 09:27:27.934 UTC [chaincode] HandleGetState -> DEBU d2f [fd30334a] getting state for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +"2019-05-02 09:27:27.934 UTC [msp] GetManagerForChain -> DEBU d30 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:27.934 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU d31 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:27.934 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU d32 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:27.935 UTC [stateleveldb] GetState -> DEBU d33 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=namespaces/metadata/exp02#1" +"2019-05-02 09:27:27.935 UTC [stateleveldb] GetState -> DEBU d34 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-05-02 09:27:27.935 UTC [chaincode] HandleGetState -> DEBU d35 [fd30334a] No state associated with key: namespaces/metadata/exp02#1. Sending RESPONSE with an empty payload" +"2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d36 [fd30334a] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d37 [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d38 [fd30334a] handling PUT_STATE from chaincode" +"2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d39 [fd30334a] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d3a [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3b [fd30334a] handling PUT_STATE from chaincode" +"2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3c [fd30334a] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d3d [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3e [fd30334a] handling PUT_STATE from chaincode" +"2019-05-02 09:27:27.935 UTC [chaincode] HandleTransaction -> DEBU d3f [fd30334a] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:27.935 UTC [chaincode] handleMessage -> DEBU d40 [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d41 [fd30334a] handling PUT_STATE from chaincode" +"2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d42 [fd30334a] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:27.936 UTC [chaincode] handleMessage -> DEBU d43 [fd30334a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d44 [fd30334a] handling GET_STATE from chaincode" +"2019-05-02 09:27:27.936 UTC [chaincode] HandleGetState -> DEBU d45 [fd30334a] getting state for chaincode _lifecycle, key chaincode-sources/metadata/exp02#1, channel businesschannel" +"2019-05-02 09:27:27.936 UTC [stateleveldb] GetState -> DEBU d46 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=chaincode-sources/metadata/exp02#1" +"2019-05-02 09:27:27.936 UTC [stateleveldb] GetState -> DEBU d47 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +"2019-05-02 09:27:27.936 UTC [chaincode] HandleGetState -> DEBU d48 [fd30334a] No state associated with key: chaincode-sources/metadata/exp02#1. Sending RESPONSE with an empty payload" +"2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d49 [fd30334a] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:27.936 UTC [chaincode] handleMessage -> DEBU d4a [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4b [fd30334a] handling PUT_STATE from chaincode" +"2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4c [fd30334a] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:27.936 UTC [chaincode] handleMessage -> DEBU d4d [fd30334a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4e [fd30334a] handling PUT_STATE from chaincode" +"2019-05-02 09:27:27.936 UTC [chaincode] HandleTransaction -> DEBU d4f [fd30334a] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:27.937 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO d50 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-05-02 09:27:27.937 UTC [chaincode] handleMessage -> DEBU d51 [fd30334a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:27.937 UTC [chaincode] Notify -> DEBU d52 [fd30334a] notifying Txid:fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, channelID:businesschannel" +"2019-05-02 09:27:27.937 UTC [chaincode] Execute -> DEBU d53 Exit" +"2019-05-02 09:27:27.937 UTC [endorser] callChaincode -> INFO d54 [businesschannel][fd30334a] Exit chaincode: name:"_lifecycle" (5ms)" +"2019-05-02 09:27:27.937 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU d55 Simulation completed, getting simulation results" +"2019-05-02 09:27:27.937 UTC [lockbasedtxmgr] Done -> DEBU d56 Done with transaction simulation / query execution [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +"2019-05-02 09:27:27.937 UTC [msp] GetManagerForChain -> DEBU d57 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:27.937 UTC [cauthdsl] func1 -> DEBU d58 0xc002e16210 gate 1556789247937724200 evaluation starts" +"2019-05-02 09:27:27.937 UTC [cauthdsl] func2 -> DEBU d59 0xc002e16210 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:27.937 UTC [cauthdsl] func2 -> DEBU d5a 0xc002e16210 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:27.937 UTC [cauthdsl] func2 -> DEBU d5b 0xc002e16210 principal matched by identity 0" +"2019-05-02 09:27:27.937 UTC [msp.identity] Verify -> DEBU d5c Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +"2019-05-02 09:27:27.937 UTC [msp.identity] Verify -> DEBU d5d Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU d5e 0xc002e16210 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d5f 0xc002e16210 gate 1556789247937724200 evaluation succeeds" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d60 0xc002e16990 gate 1556789247938177800 evaluation starts" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d61 0xc002e16990 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d62 0xc002e16990 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d63 0xc002e16990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d64 0xc002e16990 principal evaluation fails" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d65 0xc002e16990 gate 1556789247938177800 evaluation fails" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d66 0xc002e16f00 gate 1556789247938430000 evaluation starts" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d67 0xc002e16f00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d68 0xc002e16f00 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d69 0xc002e16f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func2 -> DEBU d6a 0xc002e16f00 principal evaluation fails" +"2019-05-02 09:27:27.938 UTC [cauthdsl] func1 -> DEBU d6b 0xc002e16f00 gate 1556789247938430000 evaluation fails" +"2019-05-02 09:27:27.938 UTC [transientstore] PersistWithConfig -> DEBU d6c Persisting private data to transient store for txid [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] at block height [3]" +"2019-05-02 09:27:27.946 UTC [lockbasedtxmgr] Done -> DEBU d6d Done with transaction simulation / query execution [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +"2019-05-02 09:27:27.947 UTC [endorser] SimulateProposal -> DEBU d6e [businesschannel][fd30334a] Exit" +"2019-05-02 09:27:27.948 UTC [endorser] endorseProposal -> DEBU d6f [businesschannel][fd30334a] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:27.948 UTC [endorser] endorseProposal -> DEBU d70 [businesschannel][fd30334a] escc for chaincode name:"_lifecycle" is escc" +"2019-05-02 09:27:27.948 UTC [endorser] EndorseWithPlugin -> DEBU d71 Entering endorsement for {plugin: escc, channel: businesschannel, tx: fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, chaincode: _lifecycle}" +"2019-05-02 09:27:27.949 UTC [msp.identity] Sign -> DEBU d72 Sign: plaintext: 0A20C4CE59135220423148E679B71478...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:27.950 UTC [msp.identity] Sign -> DEBU d73 Sign: digest: F6BAD1C1E9AE67521A19DE1116714EEE2CA67C454E4BEB9CC41B909165FE73D4 " +"2019-05-02 09:27:27.951 UTC [endorser] EndorseWithPlugin -> DEBU d74 Exiting {plugin: escc, channel: businesschannel, tx: fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, chaincode: _lifecycle}" +"2019-05-02 09:27:27.951 UTC [endorser] endorseProposal -> DEBU d75 [businesschannel][fd30334a] Exit" +"2019-05-02 09:27:27.952 UTC [lockbasedtxmgr] Done -> DEBU d76 Done with transaction simulation / query execution [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +"2019-05-02 09:27:27.952 UTC [endorser] func1 -> DEBU d77 Exit: request from 172.18.0.8:57286" +"2019-05-02 09:27:27.953 UTC [comm.grpc.server] 1 -> INFO d78 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57286 grpc.code=OK grpc.call_duration=31.6105ms +"2019-05-02 09:27:28.980 UTC [gossip.comm] func1 -> DEBU d79 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:28.980 UTC [gossip.comm] func1 -> DEBU d7a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:28.980 UTC [gossip.comm] func1 -> DEBU d7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:28.980 UTC [gossip.gossip] handleMessage -> DEBU d7c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:28.981 UTC [gossip.pull] HandleMessage -> DEBU d7d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d7e Obtaining identity" +"2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d7f Obtaining identity" +"2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d80 Obtaining identity" +"2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d81 Obtaining identity" +"2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d82 Obtaining identity" +"2019-05-02 09:27:28.981 UTC [msp] DeserializeIdentity -> DEBU d83 Obtaining identity" +"2019-05-02 09:27:28.981 UTC [gossip.pull] SendDigest -> DEBU d84 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d85 Exiting" +"2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d86 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d87 Exiting" +"2019-05-02 09:27:28.981 UTC [gossip.gossip] handleMessage -> DEBU d88 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:28.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU d89 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:28.982 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d8a Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:28.982 UTC [msp] DeserializeIdentity -> DEBU d8b Obtaining identity" +"2019-05-02 09:27:28.982 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:28.982 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d8d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:28.982 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d8e Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:28.982 UTC [cauthdsl] func1 -> DEBU d92 0xc002e58630 gate 1556789248982502500 evaluation starts" +"2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d93 0xc002e58630 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d94 0xc002e58630 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d95 0xc002e58630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d96 0xc002e58630 principal evaluation fails" +"2019-05-02 09:27:28.982 UTC [cauthdsl] func1 -> DEBU d97 0xc002e58630 gate 1556789248982502500 evaluation fails" +"2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:28.982 UTC [policies] Evaluate -> DEBU d9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:28.982 UTC [cauthdsl] func1 -> DEBU d9b 0xc002e58e70 gate 1556789248982885700 evaluation starts" +"2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d9c 0xc002e58e70 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:28.982 UTC [cauthdsl] func2 -> DEBU d9d 0xc002e58e70 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:28.983 UTC [cauthdsl] func2 -> DEBU d9e 0xc002e58e70 principal matched by identity 0" +"2019-05-02 09:27:28.983 UTC [msp.identity] Verify -> DEBU d9f Verify: digest = 00000000 19 46 e5 90 dc 7f 40 95 cb 72 1f 3c 26 75 f6 60 |.F....@..r.<&u.`| +00000010 00 a1 a9 b6 fd 31 32 4d 4b 83 4b f7 b4 46 fc c5 |.....12MK.K..F..|" +"2019-05-02 09:27:28.983 UTC [msp.identity] Verify -> DEBU da0 Verify: sig = 00000000 30 44 02 20 2d 8b be 90 15 09 01 ee e8 04 0d 69 |0D. -..........i| +00000010 fe 09 69 d2 61 5c 3e 1a 1c 5a 21 6a 08 fc db ff |..i.a\>..Z!j....| +00000020 02 a1 fd 48 02 20 6a 97 93 fe 9c b3 ab 87 e6 e6 |...H. j.........| +00000030 19 16 b4 82 eb 29 1e e6 4f ad 1a 6a f6 cf d9 b5 |.....)..O..j....| +00000040 b9 ae 06 2f 1a ae |.../..|" +"2019-05-02 09:27:28.983 UTC [cauthdsl] func2 -> DEBU da1 0xc002e58e70 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:28.983 UTC [cauthdsl] func1 -> DEBU da2 0xc002e58e70 gate 1556789248982885700 evaluation succeeds" +"2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da5 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:28.983 UTC [policies] Evaluate -> DEBU da6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:28.983 UTC [gossip.discovery] handleAliveMessage -> DEBU da7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU da8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU da9 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 " +"2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU daa Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 " +"2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU dab Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:28.983 UTC [gossip.discovery] learnExistingMembers -> DEBU dac Exiting" +"2019-05-02 09:27:28.983 UTC [gossip.discovery] handleAliveMessage -> DEBU dad Exiting" +"2019-05-02 09:27:28.984 UTC [gossip.discovery] handleMsgFromComm -> DEBU dae Exiting" +"2019-05-02 09:27:28.984 UTC [gossip.discovery] handleMsgFromComm -> DEBU daf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:28.984 UTC [gossip.gossip] ValidateAliveMsg -> DEBU db0 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:28.984 UTC [msp] DeserializeIdentity -> DEBU db1 Obtaining identity" +"2019-05-02 09:27:28.984 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU db2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:28.984 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:28.984 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:28.984 UTC [policies] Evaluate -> DEBU db5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:28.984 UTC [policies] Evaluate -> DEBU db6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:28.984 UTC [policies] Evaluate -> DEBU db7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:28.984 UTC [cauthdsl] func1 -> DEBU db8 0xc002e8f1a0 gate 1556789248984776100 evaluation starts" +"2019-05-02 09:27:28.984 UTC [cauthdsl] func2 -> DEBU db9 0xc002e8f1a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:28.985 UTC [common.deliverevents] DeliverFiltered -> DEBU dba Starting new DeliverFiltered handler" +"2019-05-02 09:27:28.985 UTC [common.deliver] Handle -> DEBU dbb Starting new deliver loop for 172.18.0.8:57288" +"2019-05-02 09:27:28.985 UTC [common.deliver] Handle -> DEBU dbc Attempting to read seek info message from 172.18.0.8:57288" +"2019-05-02 09:27:28.986 UTC [aclmgmt] CheckACL -> DEBU dbd acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" +"2019-05-02 09:27:28.986 UTC [aclmgmt] CheckACL -> DEBU dbe acl check(/Channel/Application/Readers)" +"2019-05-02 09:27:28.986 UTC [policies] Evaluate -> DEBU dbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:28.986 UTC [policies] Evaluate -> DEBU dc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:28.986 UTC [policies] Evaluate -> DEBU dc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:28.986 UTC [cauthdsl] func1 -> DEBU dc2 0xc002cdb5d0 gate 1556789248986928000 evaluation starts" +"2019-05-02 09:27:28.987 UTC [cauthdsl] func2 -> DEBU dc3 0xc002cdb5d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:28.987 UTC [cauthdsl] func2 -> DEBU dc4 0xc002cdb5d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:28.987 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU dc5 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:27:28.987 UTC [msp] Validate -> DEBU dc6 MSP Org1MSP validating identity" +"2019-05-02 09:27:28.987 UTC [msp] getCertificationChain -> DEBU dc7 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:28.988 UTC [cauthdsl] func2 -> DEBU dc8 0xc002cdb5d0 principal matched by identity 0" +"2019-05-02 09:27:28.988 UTC [msp.identity] Verify -> DEBU dc9 Verify: digest = 00000000 e2 18 1f 42 c4 7c d6 61 4c 45 4b 09 23 ae 1c bc |...B.|.aLEK.#...| +00000010 72 b2 ea 02 59 1f 65 2c 98 c2 d7 38 ea 8c 99 20 |r...Y.e,...8... |" +"2019-05-02 09:27:28.988 UTC [msp.identity] Verify -> DEBU dca Verify: sig = 00000000 30 45 02 21 00 df 8b 16 53 3b 96 ed 61 32 25 bb |0E.!....S;..a2%.| +00000010 3b 51 f9 eb 1c 95 10 8d 30 51 4e e9 7e a4 03 4a |;Q......0QN.~..J| +00000020 bb c8 52 4f bd 02 20 25 a9 c7 ba bd f1 1b ca c3 |..RO.. %........| +00000030 e5 ab 33 9e 50 3e 62 d6 05 3f 4e 20 03 6f 87 b5 |..3.P>b..?N .o..| +00000040 37 24 4f 9a 29 8f 9f |7$O.)..|" +"2019-05-02 09:27:28.988 UTC [cauthdsl] func2 -> DEBU dcb 0xc002cdb5d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:28.988 UTC [cauthdsl] func1 -> DEBU dcc 0xc002cdb5d0 gate 1556789248986928000 evaluation succeeds" +"2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dcd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dcf Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:28.989 UTC [policies] Evaluate -> DEBU dd0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:28.989 UTC [common.deliver] deliverBlocks -> DEBU dd1 [channel: businesschannel] Received seekInfo (0xc002548140) start: > stop: > from 172.18.0.8:57288" +"2019-05-02 09:27:28.989 UTC [fsblkstorage] Next -> DEBU dd2 Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +"2019-05-02 09:27:28.990 UTC [fsblkstorage] newBlockfileStream -> DEBU dd3 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47626]" +"2019-05-02 09:27:28.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dd4 Remaining bytes=[23746], Going to peek [8] bytes" +"2019-05-02 09:27:28.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dd5 Returning blockbytes - length=[23743], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" +"2019-05-02 09:27:28.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dd6 blockbytes [23743] read from file [0]" +"2019-05-02 09:27:28.990 UTC [common.deliver] deliverBlocks -> DEBU dd7 [channel: businesschannel] Delivering block [2] for (0xc002548140) for 172.18.0.8:57288" +"2019-05-02 09:27:28.991 UTC [fsblkstorage] waitForBlock -> DEBU dd8 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-05-02 09:27:28.999 UTC [msp] DeserializeIdentity -> DEBU dd9 Obtaining identity" +"2019-05-02 09:27:28.999 UTC [msp] DeserializeIdentity -> DEBU dda Obtaining identity" +"2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU ddb Obtaining identity" +"2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU ddc Obtaining identity" +"2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU ddd Obtaining identity" +"2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU dde Obtaining identity" +"2019-05-02 09:27:29.000 UTC [gossip.comm] Send -> DEBU ddf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU de0 Obtaining identity" +"2019-05-02 09:27:29.000 UTC [msp] DeserializeIdentity -> DEBU de1 Obtaining identity" +"2019-05-02 09:27:29.000 UTC [gossip.comm] Send -> DEBU de2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU de3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU de4 Exiting" +"2019-05-02 09:27:29.001 UTC [msp] DeserializeIdentity -> DEBU de6 Obtaining identity" +"2019-05-02 09:27:29.001 UTC [msp] DeserializeIdentity -> DEBU de7 Obtaining identity" +"2019-05-02 09:27:29.001 UTC [gossip.comm] Send -> DEBU de8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU de9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.001 UTC [gossip.comm] sendToEndpoint -> DEBU dea Exiting" +"2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU deb Obtaining identity" +"2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU dec Obtaining identity" +"2019-05-02 09:27:29.002 UTC [gossip.pull] Hello -> DEBU ded Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU dee Obtaining identity" +"2019-05-02 09:27:29.002 UTC [msp] DeserializeIdentity -> DEBU def Obtaining identity" +"2019-05-02 09:27:29.002 UTC [gossip.comm] Send -> DEBU df0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:29.002 UTC [gossip.comm] sendToEndpoint -> DEBU df1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df2 Exiting" +"2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df4 Exiting" +"2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df6 Exiting" +"2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.003 UTC [gossip.comm] sendToEndpoint -> DEBU df8 Exiting" +"2019-05-02 09:27:28.984 UTC [cauthdsl] func2 -> DEBU de5 0xc002e8f1a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU df9 0xc002e8f1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU dfa 0xc002e8f1a0 principal evaluation fails" +"2019-05-02 09:27:29.006 UTC [cauthdsl] func1 -> DEBU dfb 0xc002e8f1a0 gate 1556789248984776100 evaluation fails" +"2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU dfc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU dfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:29.006 UTC [cauthdsl] func1 -> DEBU dff 0xc002ee18e0 gate 1556789249006327800 evaluation starts" +"2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e00 0xc002ee18e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e01 0xc002ee18e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e02 0xc002ee18e0 principal matched by identity 0" +"2019-05-02 09:27:29.006 UTC [msp.identity] Verify -> DEBU e03 Verify: digest = 00000000 d8 f9 0e bd 68 6e 1a 4a 12 ec 46 67 33 c4 7a 02 |....hn.J..Fg3.z.| +00000010 d0 0a 4f a1 03 5c 97 07 b9 09 62 9a fd a8 c7 1c |..O..\....b.....|" +"2019-05-02 09:27:29.006 UTC [msp.identity] Verify -> DEBU e04 Verify: sig = 00000000 30 45 02 21 00 c8 30 00 df a5 c2 f9 ca a5 83 8e |0E.!..0.........| +00000010 66 8e 1f 1e 74 e6 b1 d9 33 a2 b1 8f 58 fc eb 27 |f...t...3...X..'| +00000020 48 46 e0 63 9c 02 20 29 e3 b8 08 f6 9f ea f0 00 |HF.c.. )........| +00000030 e2 15 27 ef 93 0d 0a 20 18 d8 47 bf 54 fc 59 1f |..'.... ..G.T.Y.| +00000040 79 3a eb 38 d5 32 d6 |y:.8.2.|" +"2019-05-02 09:27:29.006 UTC [gossip.gossip] handleMessage -> DEBU e05 Exiting" +"2019-05-02 09:27:29.006 UTC [cauthdsl] func2 -> DEBU e06 0xc002ee18e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.006 UTC [cauthdsl] func1 -> DEBU e07 0xc002ee18e0 gate 1556789249006327800 evaluation succeeds" +"2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e0b Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:29.006 UTC [policies] Evaluate -> DEBU e0c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:29.006 UTC [gossip.discovery] handleAliveMessage -> DEBU e0d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.006 UTC [gossip.gossip] handleMessage -> DEBU e0a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.006 UTC [gossip.discovery] learnExistingMembers -> DEBU e0e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e0f updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 " +"2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e10 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 " +"2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e11 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:29.007 UTC [gossip.discovery] learnExistingMembers -> DEBU e12 Exiting" +"2019-05-02 09:27:29.007 UTC [gossip.discovery] handleAliveMessage -> DEBU e13 Exiting" +"2019-05-02 09:27:29.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU e14 Exiting" +"2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e15 Obtaining identity" +"2019-05-02 09:27:29.007 UTC [gossip.discovery] sendMemResponse -> DEBU e16 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e17 Obtaining identity" +"2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e18 Obtaining identity" +"2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e19 Obtaining identity" +"2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e1a Obtaining identity" +"2019-05-02 09:27:29.007 UTC [gossip.comm] Send -> DEBU e1b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:29.007 UTC [gossip.discovery] sendMemResponse -> DEBU e1c Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:29.007 UTC [gossip.comm] sendToEndpoint -> DEBU e1d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.007 UTC [gossip.comm] sendToEndpoint -> DEBU e1e Exiting" +"2019-05-02 09:27:29.007 UTC [msp] DeserializeIdentity -> DEBU e1f Obtaining identity" +"2019-05-02 09:27:29.008 UTC [gossip.gossip] handleMessage -> DEBU e20 Exiting" +"2019-05-02 09:27:29.012 UTC [gossip.comm] func1 -> DEBU e21 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.009 UTC [gossip.gossip] handleMessage -> DEBU e22 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.013 UTC [gossip.gossip] handleMessage -> DEBU e23 Exiting" +"2019-05-02 09:27:29.013 UTC [gossip.gossip] handleMessage -> DEBU e24 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.013 UTC [gossip.discovery] handleMsgFromComm -> DEBU e25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU e26 Exiting" +"2019-05-02 09:27:29.014 UTC [msp] DeserializeIdentity -> DEBU e27 Obtaining identity" +"2019-05-02 09:27:29.014 UTC [msp] DeserializeIdentity -> DEBU e28 Obtaining identity" +"2019-05-02 09:27:29.014 UTC [gossip.gossip] handleMessage -> DEBU e29 Exiting" +"2019-05-02 09:27:29.014 UTC [gossip.gossip] handleMessage -> DEBU e2a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.020 UTC [gossip.comm] func1 -> DEBU e2b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.020 UTC [gossip.pull] HandleMessage -> DEBU e2c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.020 UTC [gossip.pull] SendDigest -> DEBU e2d Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:29.020 UTC [gossip.gossip] handleMessage -> DEBU e2e Exiting" +"2019-05-02 09:27:29.020 UTC [gossip.gossip] handleMessage -> DEBU e2f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.020 UTC [msp] DeserializeIdentity -> DEBU e30 Obtaining identity" +"2019-05-02 09:27:29.020 UTC [msp] DeserializeIdentity -> DEBU e31 Obtaining identity" +"2019-05-02 09:27:29.021 UTC [msp] DeserializeIdentity -> DEBU e32 Obtaining identity" +"2019-05-02 09:27:29.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:29.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e34 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e35 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.023 UTC [policies] Evaluate -> DEBU e36 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e37 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:29.024 UTC [cauthdsl] func1 -> DEBU e39 0xc002f277c0 gate 1556789249024280700 evaluation starts" +"2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3a 0xc002f277c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3b 0xc002f277c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3c 0xc002f277c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:29.024 UTC [cauthdsl] func2 -> DEBU e3d 0xc002f277c0 principal evaluation fails" +"2019-05-02 09:27:29.024 UTC [cauthdsl] func1 -> DEBU e3e 0xc002f277c0 gate 1556789249024280700 evaluation fails" +"2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e3f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e40 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.024 UTC [policies] Evaluate -> DEBU e41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:29.025 UTC [cauthdsl] func1 -> DEBU e42 0xc002f84000 gate 1556789249025055600 evaluation starts" +"2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e43 0xc002f84000 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e44 0xc002f84000 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e45 0xc002f84000 principal matched by identity 0" +"2019-05-02 09:27:29.025 UTC [msp.identity] Verify -> DEBU e46 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +"2019-05-02 09:27:29.025 UTC [msp.identity] Verify -> DEBU e47 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +"2019-05-02 09:27:29.025 UTC [cauthdsl] func2 -> DEBU e48 0xc002f84000 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.025 UTC [cauthdsl] func1 -> DEBU e49 0xc002f84000 gate 1556789249025055600 evaluation succeeds" +"2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4c Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:29.026 UTC [policies] Evaluate -> DEBU e4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:29.027 UTC [msp.identity] Verify -> DEBU e4e Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +"2019-05-02 09:27:29.027 UTC [msp.identity] Verify -> DEBU e4f Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +00000040 c2 37 e5 9d c4 7b |.7...{|" +"2019-05-02 09:27:29.033 UTC [msp.identity] Verify -> DEBU e50 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +"2019-05-02 09:27:29.033 UTC [msp.identity] Verify -> DEBU e51 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU e52 Obtaining identity" +"2019-05-02 09:27:29.034 UTC [msp] DeserializeIdentity -> DEBU e53 Obtaining identity" +"2019-05-02 09:27:29.034 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e54 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:29.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e55 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e56 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.035 UTC [policies] Evaluate -> DEBU e57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:29.035 UTC [policies] Evaluate -> DEBU e58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:29.035 UTC [policies] Evaluate -> DEBU e59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:29.035 UTC [cauthdsl] func1 -> DEBU e5a 0xc00301a6a0 gate 1556789249035901200 evaluation starts" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5b 0xc00301a6a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5c 0xc00301a6a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5d 0xc00301a6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e5e 0xc00301a6a0 principal evaluation fails" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func1 -> DEBU e5f 0xc00301a6a0 gate 1556789249035901200 evaluation fails" +"2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e60 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e62 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func1 -> DEBU e63 0xc00301aee0 gate 1556789249036422100 evaluation starts" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e64 0xc00301aee0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e65 0xc00301aee0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e66 0xc00301aee0 principal matched by identity 0" +"2019-05-02 09:27:29.036 UTC [msp.identity] Verify -> DEBU e67 Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +"2019-05-02 09:27:29.036 UTC [msp.identity] Verify -> DEBU e68 Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +00000040 83 2b b4 bb 36 ef |.+..6.|" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func2 -> DEBU e69 0xc00301aee0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.036 UTC [cauthdsl] func1 -> DEBU e6a 0xc00301aee0 gate 1556789249036422100 evaluation succeeds" +"2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6d Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:29.036 UTC [policies] Evaluate -> DEBU e6e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:29.036 UTC [gossip.gossip] handleMessage -> DEBU e6f Exiting" +"2019-05-02 09:27:29.037 UTC [gossip.gossip] handleMessage -> DEBU e70 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8492395987397891600 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.037 UTC [gossip.pull] HandleMessage -> DEBU e71 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8492395987397891600 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.037 UTC [gossip.gossip] handleMessage -> DEBU e72 Exiting" +"2019-05-02 09:27:29.037 UTC [gossip.gossip] handleMessage -> DEBU e73 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.037 UTC [msp.identity] Verify -> DEBU e74 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +"2019-05-02 09:27:29.037 UTC [msp.identity] Verify -> DEBU e75 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU e76 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +"2019-05-02 09:27:29.037 UTC [msp.identity] Verify -> DEBU e77 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +00000040 c2 37 e5 9d c4 7b |.7...{|" +"2019-05-02 09:27:29.038 UTC [msp] DeserializeIdentity -> DEBU e78 Obtaining identity" +"2019-05-02 09:27:29.038 UTC [msp] DeserializeIdentity -> DEBU e79 Obtaining identity" +"2019-05-02 09:27:29.038 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e7a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:29.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e7b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e7c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.038 UTC [policies] Evaluate -> DEBU e7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:29.038 UTC [policies] Evaluate -> DEBU e7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:29.038 UTC [policies] Evaluate -> DEBU e7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:29.039 UTC [cauthdsl] func1 -> DEBU e80 0xc003109c10 gate 1556789249039153200 evaluation starts" +"2019-05-02 09:27:29.039 UTC [cauthdsl] func2 -> DEBU e81 0xc003109c10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.039 UTC [cauthdsl] func2 -> DEBU e82 0xc003109c10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.040 UTC [cauthdsl] func2 -> DEBU e83 0xc003109c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:29.040 UTC [cauthdsl] func2 -> DEBU e84 0xc003109c10 principal evaluation fails" +"2019-05-02 09:27:29.040 UTC [cauthdsl] func1 -> DEBU e85 0xc003109c10 gate 1556789249039153200 evaluation fails" +"2019-05-02 09:27:29.041 UTC [policies] Evaluate -> DEBU e86 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.041 UTC [policies] Evaluate -> DEBU e87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.041 UTC [policies] Evaluate -> DEBU e88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:29.042 UTC [cauthdsl] func1 -> DEBU e89 0xc0031c24e0 gate 1556789249042060500 evaluation starts" +"2019-05-02 09:27:29.042 UTC [cauthdsl] func2 -> DEBU e8a 0xc0031c24e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.043 UTC [cauthdsl] func2 -> DEBU e8b 0xc0031c24e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.043 UTC [cauthdsl] func2 -> DEBU e8c 0xc0031c24e0 principal matched by identity 0" +"2019-05-02 09:27:29.043 UTC [msp.identity] Verify -> DEBU e8d Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +"2019-05-02 09:27:29.043 UTC [msp.identity] Verify -> DEBU e8e Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +"2019-05-02 09:27:29.043 UTC [cauthdsl] func2 -> DEBU e8f 0xc0031c24e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.043 UTC [cauthdsl] func1 -> DEBU e90 0xc0031c24e0 gate 1556789249042060500 evaluation succeeds" +"2019-05-02 09:27:29.043 UTC [policies] Evaluate -> DEBU e91 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e93 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:29.044 UTC [gossip.gossip] handleMessage -> DEBU e95 Exiting" +"2019-05-02 09:27:29.044 UTC [gossip.gossip] handleMessage -> DEBU e96 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.044 UTC [msp] DeserializeIdentity -> DEBU e97 Obtaining identity" +"2019-05-02 09:27:29.044 UTC [msp] DeserializeIdentity -> DEBU e98 Obtaining identity" +"2019-05-02 09:27:29.044 UTC [msp] DeserializeIdentity -> DEBU e99 Obtaining identity" +"2019-05-02 09:27:29.044 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e9a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:29.044 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e9b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.044 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e9c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:29.044 UTC [cauthdsl] func1 -> DEBU ea0 0xc0032b4000 gate 1556789249044708600 evaluation starts" +"2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea1 0xc0032b4000 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea2 0xc0032b4000 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea3 0xc0032b4000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:29.044 UTC [cauthdsl] func2 -> DEBU ea4 0xc0032b4000 principal evaluation fails" +"2019-05-02 09:27:29.044 UTC [cauthdsl] func1 -> DEBU ea5 0xc0032b4000 gate 1556789249044708600 evaluation fails" +"2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU ea6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.044 UTC [policies] Evaluate -> DEBU ea7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.045 UTC [policies] Evaluate -> DEBU ea8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:29.045 UTC [cauthdsl] func1 -> DEBU ea9 0xc0032b4870 gate 1556789249045052000 evaluation starts" +"2019-05-02 09:27:29.045 UTC [cauthdsl] func2 -> DEBU eaa 0xc0032b4870 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.045 UTC [cauthdsl] func2 -> DEBU eab 0xc0032b4870 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.045 UTC [cauthdsl] func2 -> DEBU eac 0xc0032b4870 principal matched by identity 0" +"2019-05-02 09:27:29.045 UTC [msp.identity] Verify -> DEBU ead Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +"2019-05-02 09:27:29.045 UTC [msp.identity] Verify -> DEBU eae Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +00000040 83 2b b4 bb 36 ef |.+..6.|" +"2019-05-02 09:27:29.046 UTC [cauthdsl] func2 -> DEBU eaf 0xc0032b4870 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.046 UTC [cauthdsl] func1 -> DEBU eb0 0xc0032b4870 gate 1556789249045052000 evaluation succeeds" +"2019-05-02 09:27:29.046 UTC [policies] Evaluate -> DEBU eb1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.046 UTC [policies] Evaluate -> DEBU eb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.046 UTC [policies] Evaluate -> DEBU eb3 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:29.047 UTC [policies] Evaluate -> DEBU eb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:29.047 UTC [msp.identity] Verify -> DEBU eb5 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +"2019-05-02 09:27:29.047 UTC [msp.identity] Verify -> DEBU eb6 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +00000040 c2 37 e5 9d c4 7b |.7...{|" +"2019-05-02 09:27:29.047 UTC [msp] DeserializeIdentity -> DEBU eb7 Obtaining identity" +"2019-05-02 09:27:29.047 UTC [msp] DeserializeIdentity -> DEBU eb8 Obtaining identity" +"2019-05-02 09:27:29.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU eb9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:29.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU eba Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ebb Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.047 UTC [policies] Evaluate -> DEBU ebc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:29.047 UTC [policies] Evaluate -> DEBU ebd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ebe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func1 -> DEBU ebf 0xc0032f4a10 gate 1556789249048050500 evaluation starts" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec0 0xc0032f4a10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec1 0xc0032f4a10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec2 0xc0032f4a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec3 0xc0032f4a10 principal evaluation fails" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func1 -> DEBU ec4 0xc0032f4a10 gate 1556789249048050500 evaluation fails" +"2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ec5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ec6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.048 UTC [policies] Evaluate -> DEBU ec7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func1 -> DEBU ec8 0xc0032f5260 gate 1556789249048554900 evaluation starts" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ec9 0xc0032f5260 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU eca 0xc0032f5260 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ecb 0xc0032f5260 principal matched by identity 0" +"2019-05-02 09:27:29.048 UTC [msp.identity] Verify -> DEBU ecc Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +"2019-05-02 09:27:29.048 UTC [msp.identity] Verify -> DEBU ecd Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +"2019-05-02 09:27:29.048 UTC [cauthdsl] func2 -> DEBU ece 0xc0032f5260 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.049 UTC [cauthdsl] func1 -> DEBU ecf 0xc0032f5260 gate 1556789249048554900 evaluation succeeds" +"2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed2 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:29.049 UTC [policies] Evaluate -> DEBU ed3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:29.049 UTC [gossip.gossip] handleMessage -> DEBU ed4 Exiting" +"2019-05-02 09:27:29.049 UTC [gossip.gossip] handleMessage -> DEBU ed5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.050 UTC [msp] DeserializeIdentity -> DEBU ed6 Obtaining identity" +"2019-05-02 09:27:29.050 UTC [msp] DeserializeIdentity -> DEBU ed7 Obtaining identity" +"2019-05-02 09:27:29.051 UTC [msp] DeserializeIdentity -> DEBU ed8 Obtaining identity" +"2019-05-02 09:27:29.051 UTC [gossip.gossip] handleMessage -> DEBU ed9 Exiting" +"2019-05-02 09:27:29.069 UTC [msp.identity] Sign -> DEBU eda Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151012 " +"2019-05-02 09:27:29.069 UTC [msp.identity] Sign -> DEBU edb Sign: digest: 8BD10C6FF2C774C8C48607744594E8CA643A811FD742E827D44090B22C88A914 " +"2019-05-02 09:27:29.070 UTC [msp.identity] Sign -> DEBU edc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:29.070 UTC [msp.identity] Sign -> DEBU edd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:29.071 UTC [gossip.discovery] periodicalSendAlive -> DEBU ede Sleeping 5s" +"2019-05-02 09:27:29.076 UTC [msp] DeserializeIdentity -> DEBU edf Obtaining identity" +"2019-05-02 09:27:29.077 UTC [msp] DeserializeIdentity -> DEBU ee0 Obtaining identity" +"2019-05-02 09:27:29.077 UTC [msp] DeserializeIdentity -> DEBU ee1 Obtaining identity" +"2019-05-02 09:27:29.077 UTC [gossip.comm] Send -> DEBU ee2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:29.077 UTC [msp] DeserializeIdentity -> DEBU ee3 Obtaining identity" +"2019-05-02 09:27:29.078 UTC [gossip.comm] Send -> DEBU ee4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:29.078 UTC [gossip.pull] Hello -> DEBU ee6 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:29.079 UTC [gossip.comm] sendToEndpoint -> DEBU ee8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.079 UTC [gossip.comm] sendToEndpoint -> DEBU ee9 Exiting" +"2019-05-02 09:27:29.080 UTC [gossip.comm] Send -> DEBU eea Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:29.080 UTC [gossip.pull] Hello -> DEBU eeb Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:27:29.081 UTC [gossip.comm] Send -> DEBU eec Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:29.081 UTC [gossip.pull] Hello -> DEBU eed Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU eee Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151013 " +"2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU eef Sign: digest: 565CA40A80B9A349F8A0EF0879C43063F9BE80BE3F8260A0E5C5F62546CFA5EC " +"2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU ef0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:29.082 UTC [msp.identity] Sign -> DEBU ef2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:29.082 UTC [gossip.comm] Send -> DEBU ef3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:29.082 UTC [msp] DeserializeIdentity -> DEBU ef4 Obtaining identity" +"2019-05-02 09:27:29.083 UTC [gossip.comm] Send -> DEBU ef5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:29.083 UTC [msp] DeserializeIdentity -> DEBU ef6 Obtaining identity" +"2019-05-02 09:27:29.083 UTC [gossip.comm] Send -> DEBU ef7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU ef8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU ef9 Exiting" +"2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU efa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.083 UTC [gossip.comm] sendToEndpoint -> DEBU efb Exiting" +"2019-05-02 09:27:29.084 UTC [gossip.comm] sendToEndpoint -> DEBU efc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.084 UTC [gossip.comm] sendToEndpoint -> DEBU efd Exiting" +"2019-05-02 09:27:29.085 UTC [gossip.comm] sendToEndpoint -> DEBU efe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.085 UTC [gossip.comm] sendToEndpoint -> DEBU eff Exiting" +"2019-05-02 09:27:29.086 UTC [gossip.comm] sendToEndpoint -> DEBU f00 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.086 UTC [gossip.comm] sendToEndpoint -> DEBU f01 Exiting" +"2019-05-02 09:27:29.089 UTC [gossip.gossip] handleMessage -> DEBU f02 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13070340137394638550 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.090 UTC [gossip.pull] HandleMessage -> DEBU f03 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13070340137394638550 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.090 UTC [gossip.comm] func1 -> DEBU f04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.082 UTC [gossip.comm] Send -> DEBU ef1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:29.096 UTC [gossip.gossip] handleMessage -> DEBU f05 Exiting" +"2019-05-02 09:27:29.097 UTC [gossip.gossip] handleMessage -> DEBU f06 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.097 UTC [gossip.gossip] handleMessage -> DEBU f07 Exiting" +"2019-05-02 09:27:29.078 UTC [gossip.comm] Send -> DEBU ee7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:29.078 UTC [gossip.comm] sendToEndpoint -> DEBU ee5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU f08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.098 UTC [gossip.comm] sendToEndpoint -> DEBU f09 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.098 UTC [gossip.gossip] handleMessage -> DEBU f0a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2438078543997422423 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.098 UTC [gossip.comm] sendToEndpoint -> DEBU f0b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:29.099 UTC [gossip.comm] sendToEndpoint -> DEBU f10 Exiting" +"2019-05-02 09:27:29.099 UTC [gossip.comm] sendToEndpoint -> DEBU f0c Exiting" +"2019-05-02 09:27:29.099 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f0d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:29.099 UTC [msp] DeserializeIdentity -> DEBU f11 Obtaining identity" +"2019-05-02 09:27:29.100 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f12 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:29.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f13 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f14 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.100 UTC [policies] Evaluate -> DEBU f15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:29.100 UTC [policies] Evaluate -> DEBU f16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:29.100 UTC [policies] Evaluate -> DEBU f17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:29.100 UTC [cauthdsl] func1 -> DEBU f18 0xc0033f9a90 gate 1556789249100627400 evaluation starts" +"2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f19 0xc0033f9a90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f1a 0xc0033f9a90 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f1b 0xc0033f9a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:29.100 UTC [cauthdsl] func2 -> DEBU f1c 0xc0033f9a90 principal evaluation fails" +"2019-05-02 09:27:29.101 UTC [cauthdsl] func1 -> DEBU f1d 0xc0033f9a90 gate 1556789249100627400 evaluation fails" +"2019-05-02 09:27:29.101 UTC [policies] Evaluate -> DEBU f1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.101 UTC [policies] Evaluate -> DEBU f1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.101 UTC [policies] Evaluate -> DEBU f20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:29.101 UTC [cauthdsl] func1 -> DEBU f21 0xc0034283f0 gate 1556789249101682400 evaluation starts" +"2019-05-02 09:27:29.101 UTC [cauthdsl] func2 -> DEBU f22 0xc0034283f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.101 UTC [cauthdsl] func2 -> DEBU f23 0xc0034283f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.102 UTC [cauthdsl] func2 -> DEBU f24 0xc0034283f0 principal matched by identity 0" +"2019-05-02 09:27:29.102 UTC [msp.identity] Verify -> DEBU f25 Verify: digest = 00000000 00 2d 21 a4 e9 07 af 9a 18 22 d6 3e 35 56 dc 6f |.-!......".>5V.o| +00000010 dc 3e 6f dc 68 0e ed 14 86 5d 97 ac bb a1 5e 28 |.>o.h....]....^(|" +"2019-05-02 09:27:29.102 UTC [msp.identity] Verify -> DEBU f26 Verify: sig = 00000000 30 44 02 20 74 71 fe 1b 28 ab dd ac 6c 08 0c 62 |0D. tq..(...l..b| +00000010 2c c9 7f ff bf 1c fd e1 e4 6f af 15 b6 6d b9 e7 |,........o...m..| +00000020 06 0a f0 1d 02 20 5b 3d f8 66 0f 05 a2 23 a5 ab |..... [=.f...#..| +00000030 d6 bf ad 8e 62 d1 14 91 48 24 a3 89 ff 23 94 dc |....b...H$...#..| +00000040 23 a8 ae ee 39 1f |#...9.|" +"2019-05-02 09:27:29.102 UTC [cauthdsl] func2 -> DEBU f27 0xc0034283f0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.102 UTC [cauthdsl] func1 -> DEBU f28 0xc0034283f0 gate 1556789249101682400 evaluation succeeds" +"2019-05-02 09:27:29.102 UTC [policies] Evaluate -> DEBU f29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.103 UTC [policies] Evaluate -> DEBU f2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.103 UTC [policies] Evaluate -> DEBU f2b Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:29.103 UTC [policies] Evaluate -> DEBU f2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:29.103 UTC [gossip.discovery] handleAliveMessage -> DEBU f2d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.103 UTC [gossip.discovery] handleAliveMessage -> DEBU f2e Exiting" +"2019-05-02 09:27:29.103 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f2f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:29.103 UTC [msp.identity] Verify -> DEBU f30 Verify: digest = 00000000 56 5c a4 0a 80 b9 a3 49 f8 a0 ef 08 79 c4 30 63 |V\.....I....y.0c| +00000010 f9 be 80 be 3f 82 60 a0 e5 c5 f6 25 46 cf a5 ec |....?.`....%F...|" +"2019-05-02 09:27:29.103 UTC [msp.identity] Verify -> DEBU f31 Verify: sig = 00000000 30 44 02 20 32 a8 48 69 ae 3f db 4f 12 05 de c2 |0D. 2.Hi.?.O....| +00000010 f7 6b 43 fb c7 35 65 c6 5b 07 fa 0e 4f ef 67 fe |.kC..5e.[...O.g.| +00000020 af 1d d2 29 02 20 41 28 15 84 a4 2b 80 d8 99 1c |...). A(...+....| +00000030 ce 95 5e ef db 3a 99 bc db 0b 5f ce 96 cf 7c 06 |..^..:...._...|.| +00000040 c9 85 c0 85 6a b2 |....j.|" +"2019-05-02 09:27:29.104 UTC [gossip.discovery] handleAliveMessage -> DEBU f32 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.104 UTC [gossip.discovery] isSentByMe -> DEBU f33 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.104 UTC [gossip.discovery] handleAliveMessage -> DEBU f34 Exiting" +"2019-05-02 09:27:29.104 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f35 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:29.106 UTC [msp.identity] Verify -> DEBU f36 Verify: digest = 00000000 6a 35 aa 85 56 51 fd f7 1f 00 32 55 34 a9 78 1f |j5..VQ....2U4.x.| +00000010 ef 9f 3b 40 9e 42 79 88 1a 5f f4 3b 06 8f 7d 30 |..;@.By.._.;..}0|" +"2019-05-02 09:27:29.106 UTC [msp.identity] Verify -> DEBU f37 Verify: sig = 00000000 30 45 02 21 00 84 5c ed 29 6d 83 2f ef 24 3d 58 |0E.!..\.)m./.$=X| +00000010 bb 10 72 1c f2 93 4a 83 84 67 bd d2 47 59 eb 99 |..r...J..g..GY..| +00000020 ca 45 0b 83 94 02 20 10 cf 2a cd e1 fd 86 c8 45 |.E.... ..*.....E| +00000030 a8 91 8b e9 d3 b9 3e e6 0b cb 13 10 94 b4 d7 60 |......>........`| +00000040 fb 75 1c 24 de 0f eb |.u.$...|" +"2019-05-02 09:27:29.108 UTC [gossip.discovery] handleAliveMessage -> DEBU f38 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.108 UTC [gossip.discovery] handleAliveMessage -> DEBU f39 Exiting" +"2019-05-02 09:27:29.109 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3a Exiting" +"2019-05-02 09:27:29.099 UTC [gossip.comm] sendToEndpoint -> DEBU f0e Exiting" +"2019-05-02 09:27:29.099 UTC [gossip.pull] HandleMessage -> DEBU f0f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2438078543997422423 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.109 UTC [gossip.gossip] handleMessage -> DEBU f3b Exiting" +"2019-05-02 09:27:29.109 UTC [gossip.gossip] handleMessage -> DEBU f3c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.110 UTC [gossip.gossip] handleMessage -> DEBU f3d Exiting" +"2019-05-02 09:27:29.110 UTC [gossip.gossip] handleMessage -> DEBU f3e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.110 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.110 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f40 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:29.111 UTC [msp.identity] Verify -> DEBU f41 Verify: digest = 00000000 56 5c a4 0a 80 b9 a3 49 f8 a0 ef 08 79 c4 30 63 |V\.....I....y.0c| +00000010 f9 be 80 be 3f 82 60 a0 e5 c5 f6 25 46 cf a5 ec |....?.`....%F...|" +"2019-05-02 09:27:29.112 UTC [msp.identity] Verify -> DEBU f42 Verify: sig = 00000000 30 44 02 20 32 a8 48 69 ae 3f db 4f 12 05 de c2 |0D. 2.Hi.?.O....| +00000010 f7 6b 43 fb c7 35 65 c6 5b 07 fa 0e 4f ef 67 fe |.kC..5e.[...O.g.| +00000020 af 1d d2 29 02 20 41 28 15 84 a4 2b 80 d8 99 1c |...). A(...+....| +00000030 ce 95 5e ef db 3a 99 bc db 0b 5f ce 96 cf 7c 06 |..^..:...._...|.| +00000040 c9 85 c0 85 6a b2 |....j.|" +"2019-05-02 09:27:29.112 UTC [gossip.comm] func1 -> DEBU f43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10861530303439601111 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.113 UTC [msp.identity] Verify -> DEBU f44 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-05-02 09:27:29.113 UTC [msp.identity] Verify -> DEBU f45 Verify: sig = 00000000 30 45 02 21 00 eb e2 8f e6 e3 18 d1 ac e0 0f ad |0E.!............| +00000010 ce c8 69 0b 21 67 af 38 12 df a6 75 b1 2b 74 1c |..i.!g.8...u.+t.| +00000020 c4 ac 5f 4e e9 02 20 62 77 43 75 9d 1a 47 ba 1a |.._N.. bwCu..G..| +00000030 22 8c 11 2d a4 42 31 2f af 61 3c c1 2a da cc a0 |"..-.B1/.a<.*...| +00000040 18 c2 35 37 b5 09 c0 |..57...|" +"2019-05-02 09:27:29.114 UTC [gossip.discovery] handleAliveMessage -> DEBU f46 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:29.114 UTC [gossip.discovery] isSentByMe -> DEBU f47 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:29.114 UTC [gossip.discovery] handleAliveMessage -> DEBU f48 Exiting" +"2019-05-02 09:27:29.114 UTC [gossip.discovery] handleMsgFromComm -> DEBU f49 Exiting" +"2019-05-02 09:27:29.114 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.115 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f4b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:29.116 UTC [msp.identity] Verify -> DEBU f4c Verify: digest = 00000000 6a 35 aa 85 56 51 fd f7 1f 00 32 55 34 a9 78 1f |j5..VQ....2U4.x.| +00000010 ef 9f 3b 40 9e 42 79 88 1a 5f f4 3b 06 8f 7d 30 |..;@.By.._.;..}0|" +"2019-05-02 09:27:29.117 UTC [gossip.gossip] handleMessage -> DEBU f4d Exiting" +"2019-05-02 09:27:29.128 UTC [gossip.gossip] handleMessage -> DEBU f4e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.116 UTC [msp.identity] Verify -> DEBU f4f Verify: sig = 00000000 30 45 02 21 00 84 5c ed 29 6d 83 2f ef 24 3d 58 |0E.!..\.)m./.$=X| +00000010 bb 10 72 1c f2 93 4a 83 84 67 bd d2 47 59 eb 99 |..r...J..g..GY..| +00000020 ca 45 0b 83 94 02 20 10 cf 2a cd e1 fd 86 c8 45 |.E.... ..*.....E| +00000030 a8 91 8b e9 d3 b9 3e e6 0b cb 13 10 94 b4 d7 60 |......>........`| +00000040 fb 75 1c 24 de 0f eb |.u.$...|" +"2019-05-02 09:27:29.129 UTC [gossip.discovery] handleAliveMessage -> DEBU f50 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.130 UTC [gossip.discovery] handleAliveMessage -> DEBU f51 Exiting" +"2019-05-02 09:27:29.130 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f52 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:29.130 UTC [msp.identity] Verify -> DEBU f53 Verify: digest = 00000000 56 5c a4 0a 80 b9 a3 49 f8 a0 ef 08 79 c4 30 63 |V\.....I....y.0c| +00000010 f9 be 80 be 3f 82 60 a0 e5 c5 f6 25 46 cf a5 ec |....?.`....%F...|" +"2019-05-02 09:27:29.131 UTC [msp.identity] Verify -> DEBU f54 Verify: sig = 00000000 30 44 02 20 32 a8 48 69 ae 3f db 4f 12 05 de c2 |0D. 2.Hi.?.O....| +00000010 f7 6b 43 fb c7 35 65 c6 5b 07 fa 0e 4f ef 67 fe |.kC..5e.[...O.g.| +00000020 af 1d d2 29 02 20 41 28 15 84 a4 2b 80 d8 99 1c |...). A(...+....| +00000030 ce 95 5e ef db 3a 99 bc db 0b 5f ce 96 cf 7c 06 |..^..:...._...|.| +00000040 c9 85 c0 85 6a b2 |....j.|" +"2019-05-02 09:27:29.133 UTC [gossip.comm] func1 -> DEBU f55 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.134 UTC [gossip.discovery] handleAliveMessage -> DEBU f56 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.134 UTC [gossip.discovery] isSentByMe -> DEBU f57 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.135 UTC [gossip.discovery] handleAliveMessage -> DEBU f58 Exiting" +"2019-05-02 09:27:29.135 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f59 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:29.135 UTC [msp] DeserializeIdentity -> DEBU f5a Obtaining identity" +"2019-05-02 09:27:29.136 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f5b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:29.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f5c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f5d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.136 UTC [policies] Evaluate -> DEBU f5e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:29.136 UTC [policies] Evaluate -> DEBU f5f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:29.137 UTC [policies] Evaluate -> DEBU f60 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:29.137 UTC [cauthdsl] func1 -> DEBU f61 0xc0035429b0 gate 1556789249137467600 evaluation starts" +"2019-05-02 09:27:29.137 UTC [cauthdsl] func2 -> DEBU f62 0xc0035429b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.137 UTC [cauthdsl] func2 -> DEBU f63 0xc0035429b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.138 UTC [cauthdsl] func2 -> DEBU f64 0xc0035429b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:29.138 UTC [cauthdsl] func2 -> DEBU f65 0xc0035429b0 principal evaluation fails" +"2019-05-02 09:27:29.138 UTC [cauthdsl] func1 -> DEBU f66 0xc0035429b0 gate 1556789249137467600 evaluation fails" +"2019-05-02 09:27:29.138 UTC [policies] Evaluate -> DEBU f67 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.139 UTC [policies] Evaluate -> DEBU f68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.139 UTC [policies] Evaluate -> DEBU f69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:29.139 UTC [cauthdsl] func1 -> DEBU f6a 0xc0035431f0 gate 1556789249139469900 evaluation starts" +"2019-05-02 09:27:29.139 UTC [cauthdsl] func2 -> DEBU f6b 0xc0035431f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.139 UTC [cauthdsl] func2 -> DEBU f6c 0xc0035431f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.140 UTC [cauthdsl] func2 -> DEBU f6d 0xc0035431f0 principal matched by identity 0" +"2019-05-02 09:27:29.140 UTC [msp.identity] Verify -> DEBU f6e Verify: digest = 00000000 d8 f9 0e bd 68 6e 1a 4a 12 ec 46 67 33 c4 7a 02 |....hn.J..Fg3.z.| +00000010 d0 0a 4f a1 03 5c 97 07 b9 09 62 9a fd a8 c7 1c |..O..\....b.....|" +"2019-05-02 09:27:29.140 UTC [msp.identity] Verify -> DEBU f6f Verify: sig = 00000000 30 45 02 21 00 c8 30 00 df a5 c2 f9 ca a5 83 8e |0E.!..0.........| +00000010 66 8e 1f 1e 74 e6 b1 d9 33 a2 b1 8f 58 fc eb 27 |f...t...3...X..'| +00000020 48 46 e0 63 9c 02 20 29 e3 b8 08 f6 9f ea f0 00 |HF.c.. )........| +00000030 e2 15 27 ef 93 0d 0a 20 18 d8 47 bf 54 fc 59 1f |..'.... ..G.T.Y.| +00000040 79 3a eb 38 d5 32 d6 |y:.8.2.|" +"2019-05-02 09:27:29.141 UTC [cauthdsl] func2 -> DEBU f70 0xc0035431f0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.141 UTC [cauthdsl] func1 -> DEBU f71 0xc0035431f0 gate 1556789249139469900 evaluation succeeds" +"2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f72 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f74 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:29.141 UTC [policies] Evaluate -> DEBU f75 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:29.141 UTC [gossip.discovery] handleAliveMessage -> DEBU f76 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.141 UTC [gossip.discovery] handleAliveMessage -> DEBU f77 Exiting" +"2019-05-02 09:27:29.141 UTC [gossip.discovery] handleMsgFromComm -> DEBU f78 Exiting" +"2019-05-02 09:27:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU f79 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.142 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f7a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:29.142 UTC [msp.identity] Verify -> DEBU f7b Verify: digest = 00000000 8b d1 0c 6f f2 c7 74 c8 c4 86 07 74 45 94 e8 ca |...o..t....tE...| +00000010 64 3a 81 1f d7 42 e8 27 d4 40 90 b2 2c 88 a9 14 |d:...B.'.@..,...|" +"2019-05-02 09:27:29.142 UTC [msp.identity] Verify -> DEBU f7c Verify: sig = 00000000 30 45 02 21 00 e5 44 62 90 98 7a bc 84 e4 95 38 |0E.!..Db..z....8| +00000010 98 43 e7 d3 d5 22 a8 d7 89 6e e2 7f 94 b8 ff 57 |.C..."...n.....W| +00000020 19 f2 e3 e0 f3 02 20 1f 05 24 cc 87 b2 50 df c2 |...... ..$...P..| +00000030 40 2c ea e5 17 22 bd 71 07 ff 77 b0 dd af ec d3 |@,...".q..w.....| +00000040 1d b3 fc 12 76 7b 14 |....v{.|" +"2019-05-02 09:27:29.142 UTC [gossip.discovery] isSentByMe -> DEBU f7d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU f7e Exiting" +"2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f7f Exiting" +"2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f80 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f81 Exiting" +"2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f82 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10861530303439601111 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.143 UTC [gossip.pull] HandleMessage -> DEBU f83 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10861530303439601111 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f84 Exiting" +"2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f85 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.143 UTC [gossip.pull] HandleMessage -> DEBU f86 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.143 UTC [gossip.pull] SendDigest -> DEBU f87 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:29.143 UTC [gossip.gossip] handleMessage -> DEBU f88 Exiting" +"2019-05-02 09:27:29.144 UTC [gossip.gossip] handleMessage -> DEBU f89 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:29.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU f8a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.144 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f8b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:29.144 UTC [msp.identity] Verify -> DEBU f8c Verify: digest = 00000000 8b d1 0c 6f f2 c7 74 c8 c4 86 07 74 45 94 e8 ca |...o..t....tE...| +00000010 64 3a 81 1f d7 42 e8 27 d4 40 90 b2 2c 88 a9 14 |d:...B.'.@..,...|" +"2019-05-02 09:27:29.144 UTC [msp.identity] Verify -> DEBU f8d Verify: sig = 00000000 30 45 02 21 00 e5 44 62 90 98 7a bc 84 e4 95 38 |0E.!..Db..z....8| +00000010 98 43 e7 d3 d5 22 a8 d7 89 6e e2 7f 94 b8 ff 57 |.C..."...n.....W| +00000020 19 f2 e3 e0 f3 02 20 1f 05 24 cc 87 b2 50 df c2 |...... ..$...P..| +00000030 40 2c ea e5 17 22 bd 71 07 ff 77 b0 dd af ec d3 |@,...".q..w.....| +00000040 1d b3 fc 12 76 7b 14 |....v{.|" +"2019-05-02 09:27:29.144 UTC [gossip.discovery] isSentByMe -> DEBU f8e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU f8f Exiting" +"2019-05-02 09:27:29.144 UTC [gossip.discovery] handleMsgFromComm -> DEBU f90 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:29.144 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f91 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f92 Verify: digest = 00000000 7a ba 25 f8 10 d2 95 2c 49 e0 f3 79 85 d2 24 6d |z.%....,I..y..$m| +00000010 c5 80 af e6 1d 9b df 95 d0 a4 bc a1 b9 dc 64 b9 |..............d.|" +"2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f93 Verify: sig = 00000000 30 44 02 20 26 27 82 df 54 8b f1 2c 3a 10 0e 27 |0D. &'..T..,:..'| +00000010 a5 1e e8 86 69 49 55 c2 53 23 57 45 91 83 09 38 |....iIU.S#WE...8| +00000020 66 ad e7 5f 02 20 04 eb 71 4b 9f 42 ee 83 1b 7f |f.._. ..qK.B....| +00000030 41 dc 6b 05 9b 02 96 5b ee bb 1a 87 96 29 21 38 |A.k....[.....)!8| +00000040 2a 0d c4 2c 77 43 |*..,wC|" +"2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f94 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:57.470 UTC [msp.identity] Verify -> DEBU 1029 Verify: sig = 00000000 30 44 02 20 5b b5 81 e2 65 75 01 fa 6c 52 6d 00 |0D. [...eu..lRm.| -00000010 ad ad c1 30 26 5d b7 e0 eb 1f 16 58 22 3e 58 a4 |...0&].....X">X.| -00000020 26 2a 7b aa 02 20 5e e8 2d 80 b5 ba d2 05 92 3c |&*{.. ^.-......<| -00000030 9f 99 2b cb 56 23 50 18 f8 52 53 fe 7d aa 9b 24 |..+.V#P..RS.}..$| -00000040 b6 f0 1b d7 12 5f |....._|" -"2019-05-02 01:30:57.471 UTC [gossip.discovery] handleAliveMessage -> DEBU 102a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:57.471 UTC [gossip.discovery] learnExistingMembers -> DEBU 102b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:30:57.471 UTC [gossip.discovery] learnExistingMembers -> DEBU 102c updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 " -"2019-05-02 01:30:57.471 UTC [gossip.discovery] learnExistingMembers -> DEBU 102d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 " -"2019-05-02 01:30:57.471 UTC [gossip.discovery] learnExistingMembers -> DEBU 102e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:30:57.471 UTC [gossip.discovery] learnExistingMembers -> DEBU 102f Exiting" -"2019-05-02 01:30:57.472 UTC [gossip.discovery] handleAliveMessage -> DEBU 1030 Exiting" -"2019-05-02 01:30:57.472 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1031 Exiting" -"2019-05-02 01:30:57.472 UTC [gossip.discovery] sendMemResponse -> DEBU 1032 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:30:57.472 UTC [msp] DeserializeIdentity -> DEBU 1033 Obtaining identity" -"2019-05-02 01:30:57.472 UTC [msp] DeserializeIdentity -> DEBU 1034 Obtaining identity" -"2019-05-02 01:30:57.472 UTC [gossip.comm] Send -> DEBU 1035 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:57.473 UTC [gossip.discovery] sendMemResponse -> DEBU 1036 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:30:57.473 UTC [gossip.comm] sendToEndpoint -> DEBU 1037 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.473 UTC [gossip.comm] sendToEndpoint -> DEBU 1038 Exiting" -"2019-05-02 01:30:57.541 UTC [gossip.comm] func1 -> DEBU 1039 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.542 UTC [gossip.gossip] handleMessage -> DEBU 103a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.542 UTC [gossip.pull] HandleMessage -> DEBU 103b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.543 UTC [msp] DeserializeIdentity -> DEBU 103c Obtaining identity" -"2019-05-02 01:30:57.543 UTC [msp] DeserializeIdentity -> DEBU 103d Obtaining identity" -"2019-05-02 01:30:57.544 UTC [msp] DeserializeIdentity -> DEBU 103e Obtaining identity" -"2019-05-02 01:30:57.544 UTC [msp] DeserializeIdentity -> DEBU 103f Obtaining identity" -"2019-05-02 01:30:57.545 UTC [msp] DeserializeIdentity -> DEBU 1040 Obtaining identity" -"2019-05-02 01:30:57.545 UTC [msp] DeserializeIdentity -> DEBU 1041 Obtaining identity" -"2019-05-02 01:30:57.545 UTC [gossip.pull] SendDigest -> DEBU 1042 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:57.546 UTC [gossip.gossip] handleMessage -> DEBU 1043 Exiting" -"2019-05-02 01:30:57.549 UTC [gossip.comm] func1 -> DEBU 1044 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.549 UTC [gossip.gossip] handleMessage -> DEBU 1045 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.549 UTC [gossip.gossip] handleMessage -> DEBU 1046 Exiting" -"2019-05-02 01:30:57.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1047 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.549 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1048 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:57.551 UTC [msp] DeserializeIdentity -> DEBU 1049 Obtaining identity" -"2019-05-02 01:30:57.552 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 104a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:57.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 104b Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:57.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 104c Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:57.552 UTC [policies] Evaluate -> DEBU 104d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:57.552 UTC [policies] Evaluate -> DEBU 104e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:57.552 UTC [policies] Evaluate -> DEBU 104f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:57.552 UTC [cauthdsl] func1 -> DEBU 1050 0xc0002cce80 gate 1556760657552572400 evaluation starts" -"2019-05-02 01:30:57.552 UTC [cauthdsl] func2 -> DEBU 1051 0xc0002cce80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:57.552 UTC [cauthdsl] func2 -> DEBU 1052 0xc0002cce80 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:57.553 UTC [cauthdsl] func2 -> DEBU 1053 0xc0002cce80 principal matched by identity 0" -"2019-05-02 01:30:57.553 UTC [msp.identity] Verify -> DEBU 1054 Verify: digest = 00000000 51 d7 73 b6 db 19 35 79 ed 87 bd be be f7 98 cb |Q.s...5y........| -00000010 2c 3b ba 6e e2 d9 a1 90 72 bf 71 60 11 40 69 29 |,;.n....r.q`.@i)|" -"2019-05-02 01:30:57.553 UTC [msp.identity] Verify -> DEBU 1055 Verify: sig = 00000000 30 44 02 20 09 cf 7b 66 db 8b d0 58 96 f9 ee 90 |0D. ..{f...X....| -00000010 09 16 06 26 84 18 b0 d2 1e 31 84 ed ee 30 28 8c |...&.....1...0(.| -00000020 78 d3 c4 00 02 20 13 30 2e 85 0c 47 95 e5 38 d5 |x.... .0...G..8.| -00000030 d8 94 59 50 fa 97 ef 7c 22 28 d7 5f ee af 87 c4 |..YP...|"(._....| -00000040 43 a7 2c 00 e9 3a |C.,..:|" -"2019-05-02 01:30:57.553 UTC [cauthdsl] func2 -> DEBU 1056 0xc0002cce80 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:57.553 UTC [cauthdsl] func1 -> DEBU 1057 0xc0002cce80 gate 1556760657552572400 evaluation succeeds" -"2019-05-02 01:30:57.553 UTC [policies] Evaluate -> DEBU 1058 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:57.553 UTC [policies] Evaluate -> DEBU 1059 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:57.553 UTC [policies] Evaluate -> DEBU 105a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:57.553 UTC [policies] Evaluate -> DEBU 105b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:57.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 105c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:57.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 105d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:30:57.555 UTC [gossip.discovery] learnExistingMembers -> DEBU 105e updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 " -"2019-05-02 01:30:57.555 UTC [gossip.discovery] learnExistingMembers -> DEBU 105f Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 " -"2019-05-02 01:30:57.556 UTC [gossip.discovery] learnExistingMembers -> DEBU 1060 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:30:57.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 1061 Exiting" -"2019-05-02 01:30:57.564 UTC [gossip.discovery] handleAliveMessage -> DEBU 1062 Exiting" -"2019-05-02 01:30:57.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1063 Exiting" -"2019-05-02 01:30:57.564 UTC [gossip.discovery] sendMemResponse -> DEBU 1064 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:30:57.565 UTC [msp] DeserializeIdentity -> DEBU 1065 Obtaining identity" -"2019-05-02 01:30:57.565 UTC [msp] DeserializeIdentity -> DEBU 1066 Obtaining identity" -"2019-05-02 01:30:57.565 UTC [msp] DeserializeIdentity -> DEBU 1067 Obtaining identity" -"2019-05-02 01:30:57.565 UTC [gossip.comm] Send -> DEBU 1068 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:57.566 UTC [gossip.discovery] sendMemResponse -> DEBU 1069 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:30:57.566 UTC [gossip.comm] sendToEndpoint -> DEBU 106a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.566 UTC [gossip.comm] sendToEndpoint -> DEBU 106b Exiting" -"2019-05-02 01:30:57.617 UTC [gossip.comm] func1 -> DEBU 106c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.619 UTC [gossip.gossip] handleMessage -> DEBU 106d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.625 UTC [msp] DeserializeIdentity -> DEBU 106e Obtaining identity" -"2019-05-02 01:30:57.630 UTC [msp] DeserializeIdentity -> DEBU 106f Obtaining identity" -"2019-05-02 01:30:57.635 UTC [msp] DeserializeIdentity -> DEBU 1070 Obtaining identity" -"2019-05-02 01:30:57.638 UTC [gossip.gossip] handleMessage -> DEBU 1071 Exiting" -"2019-05-02 01:30:57.684 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1072 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:57.684 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1073 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:57.684 UTC [policies] Evaluate -> DEBU 1074 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-05-02 01:30:57.684 UTC [policies] Evaluate -> DEBU 1075 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:57.685 UTC [policies] Evaluate -> DEBU 1076 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:30:57.685 UTC [msp] DeserializeIdentity -> DEBU 1077 Obtaining identity" -"2019-05-02 01:30:57.685 UTC [msp.identity] newIdentity -> DEBU 1078 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:29.145 UTC [msp.identity] Verify -> DEBU f96 Verify: sig = 00000000 30 44 02 20 2c f6 d7 53 a0 03 7e af bd 6c 43 3a |0D. ,..S..~..lC:| +00000010 a0 1d 3e 0b 62 93 d8 3a 82 e1 d3 d4 24 3a d8 bd |..>.b..:....$:..| +00000020 77 25 65 53 02 20 29 fa 86 50 fe 12 65 05 c6 3a |w%eS. )..P..e..:| +00000030 b3 19 38 31 8e 59 c6 3c c9 b3 9b a0 62 ff fc 76 |..81.Y.<....b..v| +00000040 5e ac ea 81 ec db |^.....|" +"2019-05-02 09:27:29.145 UTC [gossip.gossip] handleMessage -> DEBU f95 Exiting" +"2019-05-02 09:27:29.145 UTC [gossip.gossip] handleMessage -> DEBU f97 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.146 UTC [gossip.discovery] handleAliveMessage -> DEBU f98 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f99 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 " +"2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 " +"2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:29.146 UTC [gossip.discovery] learnExistingMembers -> DEBU f9d Exiting" +"2019-05-02 09:27:29.146 UTC [gossip.discovery] handleAliveMessage -> DEBU f9e Exiting" +"2019-05-02 09:27:29.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU f9f Exiting" +"2019-05-02 09:27:29.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU fa0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU fa1 Exiting" +"2019-05-02 09:27:29.146 UTC [gossip.gossip] handleMessage -> DEBU fa2 Exiting" +"2019-05-02 09:27:29.147 UTC [gossip.gossip] handleMessage -> DEBU fa3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.147 UTC [gossip.gossip] handleMessage -> DEBU fa4 Exiting" +"2019-05-02 09:27:29.147 UTC [gossip.gossip] handleMessage -> DEBU fa5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.147 UTC [gossip.discovery] handleMsgFromComm -> DEBU fa6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.147 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fa7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU fa8 Verify: digest = 00000000 28 e3 c7 ef f6 39 26 c9 69 7f de f3 56 21 b3 63 |(....9&.i...V!.c| +00000010 c9 05 70 6a be ac a3 02 e6 39 c0 a6 da c2 f6 7a |..pj.....9.....z|" +"2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU fa9 Verify: sig = 00000000 30 45 02 21 00 9b dc 4c 9d 3b c5 05 f5 fa a4 0c |0E.!...L.;......| +00000010 5b f8 85 2a ba 0f 5a bf e7 d2 f0 12 72 2a 5d 69 |[..*..Z.....r*]i| +00000020 3d 33 94 08 4a 02 20 2c a5 3f 2a da 8b de 2b 08 |=3..J. ,.?*...+.| +00000030 7b 5d 5a 51 c5 2d e9 44 42 47 aa e5 44 9b 1d 90 |{]ZQ.-.DBG..D...| +00000040 7e 09 8a 22 c7 ac 46 |~.."..F|" +"2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU faa Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:27:29.148 UTC [msp.identity] Verify -> DEBU fab Verify: sig = 00000000 30 44 02 20 3b 55 b6 1d 82 73 43 c5 67 90 16 b5 |0D. ;U...sC.g...| +00000010 67 70 18 d3 72 13 14 af 0e be 95 24 60 b3 75 11 |gp..r......$`.u.| +00000020 cd ba f7 86 02 20 2b ba cb 4b 34 7d b1 25 6d 44 |..... +..K4}.%mD| +00000030 ec 2c 9f 0e 65 f0 b4 9b 37 4c e5 e2 ae 48 e6 97 |.,..e...7L...H..| +00000040 be 7f 78 8c 66 83 |..x.f.|" +"2019-05-02 09:27:29.149 UTC [gossip.discovery] handleAliveMessage -> DEBU fac Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fad Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fae updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 " +"2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU faf Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 " +"2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fb0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:29.149 UTC [gossip.discovery] learnExistingMembers -> DEBU fb1 Exiting" +"2019-05-02 09:27:29.150 UTC [gossip.discovery] handleAliveMessage -> DEBU fb2 Exiting" +"2019-05-02 09:27:29.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb3 Exiting" +"2019-05-02 09:27:29.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb5 Exiting" +"2019-05-02 09:27:29.150 UTC [gossip.gossip] handleMessage -> DEBU fb6 Exiting" +"2019-05-02 09:27:29.150 UTC [gossip.discovery] sendMemResponse -> DEBU fb7 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:29.150 UTC [msp] DeserializeIdentity -> DEBU fb8 Obtaining identity" +"2019-05-02 09:27:29.150 UTC [msp] DeserializeIdentity -> DEBU fb9 Obtaining identity" +"2019-05-02 09:27:29.150 UTC [gossip.comm] Send -> DEBU fba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:29.151 UTC [gossip.discovery] sendMemResponse -> DEBU fbb Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:29.151 UTC [gossip.comm] sendToEndpoint -> DEBU fbc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.151 UTC [gossip.comm] sendToEndpoint -> DEBU fbd Exiting" +"2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fbe Obtaining identity" +"2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fbf Obtaining identity" +"2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fc0 Obtaining identity" +"2019-05-02 09:27:29.156 UTC [gossip.comm] Send -> DEBU fc1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:29.156 UTC [msp] DeserializeIdentity -> DEBU fc2 Obtaining identity" +"2019-05-02 09:27:29.156 UTC [gossip.comm] Send -> DEBU fc3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:29.156 UTC [gossip.comm] sendToEndpoint -> DEBU fc4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.156 UTC [gossip.comm] sendToEndpoint -> DEBU fc5 Exiting" +"2019-05-02 09:27:29.156 UTC [gossip.comm] sendToEndpoint -> DEBU fc6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:29.157 UTC [gossip.comm] sendToEndpoint -> DEBU fc7 Exiting" +"2019-05-02 09:27:29.191 UTC [gossip.gossip] handleMessage -> DEBU fc8 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.191 UTC [gossip.gossip] handleMessage -> DEBU fc9 Exiting" +"2019-05-02 09:27:29.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU fca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.191 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fcb Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:29.191 UTC [msp] DeserializeIdentity -> DEBU fcc Obtaining identity" +"2019-05-02 09:27:29.191 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fcd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:29.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fce Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fcf Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.191 UTC [policies] Evaluate -> DEBU fd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:29.191 UTC [policies] Evaluate -> DEBU fd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:29.191 UTC [policies] Evaluate -> DEBU fd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:29.191 UTC [cauthdsl] func1 -> DEBU fd3 0xc0034d1780 gate 1556789249191891900 evaluation starts" +"2019-05-02 09:27:29.191 UTC [cauthdsl] func2 -> DEBU fd4 0xc0034d1780 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.192 UTC [cauthdsl] func2 -> DEBU fd5 0xc0034d1780 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.193 UTC [cauthdsl] func2 -> DEBU fd6 0xc0034d1780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:29.194 UTC [cauthdsl] func2 -> DEBU fd7 0xc0034d1780 principal evaluation fails" +"2019-05-02 09:27:29.197 UTC [cauthdsl] func1 -> DEBU fd8 0xc0034d1780 gate 1556789249191891900 evaluation fails" +"2019-05-02 09:27:29.197 UTC [policies] Evaluate -> DEBU fd9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.198 UTC [policies] Evaluate -> DEBU fda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.198 UTC [policies] Evaluate -> DEBU fdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:29.198 UTC [cauthdsl] func1 -> DEBU fdc 0xc0034d1fc0 gate 1556789249198663100 evaluation starts" +"2019-05-02 09:27:29.198 UTC [cauthdsl] func2 -> DEBU fdd 0xc0034d1fc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.199 UTC [cauthdsl] func2 -> DEBU fde 0xc0034d1fc0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.199 UTC [cauthdsl] func2 -> DEBU fdf 0xc0034d1fc0 principal matched by identity 0" +"2019-05-02 09:27:29.199 UTC [msp.identity] Verify -> DEBU fe0 Verify: digest = 00000000 78 4a af f7 40 b0 72 3e df 0b 4f d9 26 5f 2a 45 |xJ..@.r>..O.&_*E| +00000010 de 4c 90 5c c8 e6 75 bd 8f 40 71 9c ea c9 95 f7 |.L.\..u..@q.....|" +"2019-05-02 09:27:29.199 UTC [msp.identity] Verify -> DEBU fe1 Verify: sig = 00000000 30 45 02 21 00 9d 58 b9 d5 9c cf 2b 3b c9 a9 cb |0E.!..X....+;...| +00000010 06 bb fa d7 a0 4b 77 b0 67 31 3c 44 0c f7 18 7c |.....Kw.g1 DEBU fe2 0xc0034d1fc0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.199 UTC [cauthdsl] func1 -> DEBU fe3 0xc0034d1fc0 gate 1556789249198663100 evaluation succeeds" +"2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe6 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:29.199 UTC [policies] Evaluate -> DEBU fe7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:29.199 UTC [gossip.discovery] handleAliveMessage -> DEBU fe8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.200 UTC [gossip.discovery] learnExistingMembers -> DEBU fe9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:29.207 UTC [gossip.gossip] handleMessage -> DEBU fea Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.207 UTC [gossip.pull] HandleMessage -> DEBU feb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.207 UTC [msp] DeserializeIdentity -> DEBU fec Obtaining identity" +"2019-05-02 09:27:29.207 UTC [msp] DeserializeIdentity -> DEBU fed Obtaining identity" +"2019-05-02 09:27:29.202 UTC [gossip.discovery] learnExistingMembers -> DEBU fee updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 " +"2019-05-02 09:27:29.207 UTC [gossip.discovery] learnExistingMembers -> DEBU fef Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 " +"2019-05-02 09:27:29.207 UTC [gossip.discovery] learnExistingMembers -> DEBU ff0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:29.208 UTC [gossip.discovery] learnExistingMembers -> DEBU ff1 Exiting" +"2019-05-02 09:27:29.208 UTC [gossip.discovery] handleAliveMessage -> DEBU ff2 Exiting" +"2019-05-02 09:27:29.208 UTC [gossip.discovery] handleMsgFromComm -> DEBU ff3 Exiting" +"2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff4 Obtaining identity" +"2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff5 Obtaining identity" +"2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff6 Obtaining identity" +"2019-05-02 09:27:29.208 UTC [msp] DeserializeIdentity -> DEBU ff7 Obtaining identity" +"2019-05-02 09:27:29.208 UTC [gossip.pull] SendDigest -> DEBU ff8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:29.208 UTC [gossip.gossip] handleMessage -> DEBU ff9 Exiting" +"2019-05-02 09:27:29.208 UTC [gossip.gossip] handleMessage -> DEBU ffa Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.208 UTC [gossip.gossip] handleMessage -> DEBU ffb Exiting" +"2019-05-02 09:27:29.209 UTC [gossip.discovery] handleMsgFromComm -> DEBU ffc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.209 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ffd Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:29.209 UTC [msp] DeserializeIdentity -> DEBU ffe Obtaining identity" +"2019-05-02 09:27:29.209 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:29.209 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1000 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.209 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1001 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 1002 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 1003 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 1004 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:29.209 UTC [cauthdsl] func1 -> DEBU 1005 0xc003775070 gate 1556789249209634900 evaluation starts" +"2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1006 0xc003775070 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1007 0xc003775070 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1008 0xc003775070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:29.209 UTC [cauthdsl] func2 -> DEBU 1009 0xc003775070 principal evaluation fails" +"2019-05-02 09:27:29.209 UTC [cauthdsl] func1 -> DEBU 100a 0xc003775070 gate 1556789249209634900 evaluation fails" +"2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 100b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.209 UTC [policies] Evaluate -> DEBU 100c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:29.210 UTC [policies] Evaluate -> DEBU 100d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:29.210 UTC [cauthdsl] func1 -> DEBU 100e 0xc0037758d0 gate 1556789249210063700 evaluation starts" +"2019-05-02 09:27:29.210 UTC [cauthdsl] func2 -> DEBU 100f 0xc0037758d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.210 UTC [cauthdsl] func2 -> DEBU 1010 0xc0037758d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.210 UTC [cauthdsl] func2 -> DEBU 1011 0xc0037758d0 principal matched by identity 0" +"2019-05-02 09:27:29.210 UTC [msp.identity] Verify -> DEBU 1012 Verify: digest = 00000000 eb f5 bd ff 26 ad b2 3c 7b f7 6b 73 2a f6 0c 88 |....&..<{.ks*...| +00000010 ed 78 44 d8 65 33 ad a9 ad 21 3d f0 b8 9a dc 10 |.xD.e3...!=.....|" +"2019-05-02 09:27:29.210 UTC [msp.identity] Verify -> DEBU 1013 Verify: sig = 00000000 30 45 02 21 00 e4 e0 5f e3 3d 0d 98 50 3f 8d bb |0E.!..._.=..P?..| +00000010 4c 91 91 a1 8e bf 0e bd 7c 4e c3 92 a6 dd a5 1d |L.......|N......| +00000020 f9 bf cc e0 65 02 20 70 70 88 ef 3c 74 11 6f 29 |....e. pp.. DEBU 1014 0xc0037758d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.211 UTC [cauthdsl] func1 -> DEBU 1015 0xc0037758d0 gate 1556789249210063700 evaluation succeeds" +"2019-05-02 09:27:29.211 UTC [policies] Evaluate -> DEBU 1016 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.211 UTC [policies] Evaluate -> DEBU 1017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:29.212 UTC [policies] Evaluate -> DEBU 1018 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:29.212 UTC [policies] Evaluate -> DEBU 1019 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:29.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 101a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 101b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:29.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 101c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 " +"2019-05-02 09:27:29.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 101d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 " +"2019-05-02 09:27:29.214 UTC [gossip.discovery] learnExistingMembers -> DEBU 101e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:29.214 UTC [gossip.discovery] learnExistingMembers -> DEBU 101f Exiting" +"2019-05-02 09:27:29.214 UTC [gossip.discovery] handleAliveMessage -> DEBU 1020 Exiting" +"2019-05-02 09:27:29.215 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1021 Exiting" +"2019-05-02 09:27:29.215 UTC [gossip.discovery] sendMemResponse -> DEBU 1022 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:29.215 UTC [msp] DeserializeIdentity -> DEBU 1023 Obtaining identity" +"2019-05-02 09:27:29.216 UTC [msp] DeserializeIdentity -> DEBU 1024 Obtaining identity" +"2019-05-02 09:27:29.216 UTC [msp] DeserializeIdentity -> DEBU 1025 Obtaining identity" +"2019-05-02 09:27:29.218 UTC [gossip.comm] Send -> DEBU 1026 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:29.218 UTC [gossip.discovery] sendMemResponse -> DEBU 1027 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:29.219 UTC [msp] DeserializeIdentity -> DEBU 1028 Obtaining identity" +"2019-05-02 09:27:29.219 UTC [msp] DeserializeIdentity -> DEBU 1029 Obtaining identity" +"2019-05-02 09:27:29.219 UTC [gossip.comm] sendToEndpoint -> DEBU 102a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-05-02 09:27:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 102b Exiting" +"2019-05-02 09:27:29.220 UTC [msp] DeserializeIdentity -> DEBU 102c Obtaining identity" +"2019-05-02 09:27:29.220 UTC [msp] DeserializeIdentity -> DEBU 102d Obtaining identity" +"2019-05-02 09:27:29.221 UTC [msp] DeserializeIdentity -> DEBU 102f Obtaining identity" +"2019-05-02 09:27:29.222 UTC [msp] DeserializeIdentity -> DEBU 1030 Obtaining identity" +"2019-05-02 09:27:29.222 UTC [gossip.comm] Send -> DEBU 1031 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:29.222 UTC [msp] DeserializeIdentity -> DEBU 1032 Obtaining identity" +"2019-05-02 09:27:29.222 UTC [msp] DeserializeIdentity -> DEBU 1033 Obtaining identity" +"2019-05-02 09:27:29.222 UTC [gossip.comm] func1 -> DEBU 1034 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.223 UTC [gossip.comm] Send -> DEBU 1035 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:29.223 UTC [gossip.comm] sendToEndpoint -> DEBU 1036 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.223 UTC [gossip.comm] sendToEndpoint -> DEBU 1037 Exiting" +"2019-05-02 09:27:29.221 UTC [gossip.gossip] handleMessage -> DEBU 102e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.224 UTC [gossip.gossip] handleMessage -> DEBU 1038 Exiting" +"2019-05-02 09:27:29.224 UTC [gossip.gossip] handleMessage -> DEBU 1039 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103b Exiting" +"2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103d Exiting" +"2019-05-02 09:27:29.224 UTC [gossip.gossip] handleMessage -> DEBU 103e Exiting" +"2019-05-02 09:27:29.224 UTC [gossip.comm] sendToEndpoint -> DEBU 103f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:29.224 UTC [gossip.comm] sendToEndpoint -> DEBU 1040 Exiting" +"2019-05-02 09:27:29.993 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1041 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.993 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1042 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:29.993 UTC [policies] Evaluate -> DEBU 1043 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-05-02 09:27:29.993 UTC [policies] Evaluate -> DEBU 1044 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:29.993 UTC [policies] Evaluate -> DEBU 1045 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:29.993 UTC [msp] DeserializeIdentity -> DEBU 1046 Obtaining identity" +"2019-05-02 09:27:29.993 UTC [msp.identity] newIdentity -> DEBU 1047 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -6159,73 +5996,73 @@ b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q 1A== -----END CERTIFICATE-----" -"2019-05-02 01:30:57.685 UTC [cauthdsl] func1 -> DEBU 1079 0xc00272fdb0 gate 1556760657685651100 evaluation starts" -"2019-05-02 01:30:57.685 UTC [cauthdsl] func2 -> DEBU 107a 0xc00272fdb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:57.685 UTC [cauthdsl] func2 -> DEBU 107b 0xc00272fdb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:57.685 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 107c Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-05-02 01:30:57.685 UTC [msp] Validate -> DEBU 107d MSP OrdererMSP validating identity" -"2019-05-02 01:30:57.686 UTC [cauthdsl] func2 -> DEBU 107e 0xc00272fdb0 principal matched by identity 0" -"2019-05-02 01:30:57.686 UTC [msp.identity] Verify -> DEBU 107f Verify: digest = 00000000 e4 64 c7 67 87 0e 5a c2 e1 cf 3f d7 ed a6 a2 d3 |.d.g..Z...?.....| -00000010 31 87 c0 8e a4 57 3f 9e 96 45 a7 79 2d 33 fe bd |1....W?..E.y-3..|" -"2019-05-02 01:30:57.686 UTC [msp.identity] Verify -> DEBU 1080 Verify: sig = 00000000 30 45 02 21 00 a2 cd 09 83 ec 66 64 99 ae da 92 |0E.!......fd....| -00000010 f4 e6 be cf c1 13 f4 46 75 48 93 ff 38 04 e5 e6 |.......FuH..8...| -00000020 59 76 0a b9 74 02 20 08 ae 5e c1 49 59 fc 57 df |Yv..t. ..^.IY.W.| -00000030 ac 57 a9 ba 4e 42 57 1d 08 64 eb 93 c0 7b 18 01 |.W..NBW..d...{..| -00000040 01 7c 69 55 c0 10 e0 |.|iU...|" -"2019-05-02 01:30:57.686 UTC [cauthdsl] func2 -> DEBU 1081 0xc00272fdb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:57.686 UTC [cauthdsl] func1 -> DEBU 1082 0xc00272fdb0 gate 1556760657685651100 evaluation succeeds" -"2019-05-02 01:30:57.686 UTC [policies] Evaluate -> DEBU 1083 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:57.686 UTC [policies] Evaluate -> DEBU 1084 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:30:57.686 UTC [policies] Evaluate -> DEBU 1085 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:57.686 UTC [policies] Evaluate -> DEBU 1086 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:30:57.686 UTC [blocksProvider] DeliverBlocks -> DEBU 1087 [businesschannel] Adding payload to local buffer, blockNum = [3]" -"2019-05-02 01:30:57.686 UTC [gossip.state] addPayload -> DEBU 1088 [businesschannel] Adding payload to local buffer, blockNum = [3]" -"2019-05-02 01:30:57.687 UTC [gossip.state] addPayload -> DEBU 1089 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-05-02 01:30:57.687 UTC [blocksProvider] DeliverBlocks -> DEBU 108a [businesschannel] Gossiping block [3], peers number [3]" -"2019-05-02 01:30:57.687 UTC [gossip.channel] AddToMsgStore -> DEBU 108b Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4724 bytes, seq: 3}, Envelope: 4754 bytes, Signature: 0 bytes to the block puller" -"2019-05-02 01:30:57.687 UTC [gossip.pull] Add -> DEBU 108c Added 3, total items: 3" -"2019-05-02 01:30:57.687 UTC [gossip.state] deliverPayloads -> DEBU 108d [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" -"2019-05-02 01:30:57.687 UTC [gossip.state] deliverPayloads -> DEBU 108e [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" -"2019-05-02 01:30:57.687 UTC [gossip.privdata] StoreBlock -> INFO 108f [businesschannel] Received block [3] from buffer" -"2019-05-02 01:30:57.687 UTC [gossip.privdata] StoreBlock -> DEBU 1090 [businesschannel] Validating block [3]" -"2019-05-02 01:30:57.687 UTC [committer.txvalidator] Validate -> DEBU 1091 [businesschannel] START Block Validation for block [3]" -"2019-05-02 01:30:57.687 UTC [committer.txvalidator] Validate -> DEBU 1092 expecting 1 block validation responses" -"2019-05-02 01:30:57.690 UTC [committer.txvalidator] validateTx -> DEBU 1093 [businesschannel] validateTx starts for block 0xc002f8f240 env 0xc002759cc0 txn 0" -"2019-05-02 01:30:57.690 UTC [protoutils] ValidateTransaction -> DEBU 1094 ValidateTransactionEnvelope starts for envelope 0xc002759cc0" -"2019-05-02 01:30:57.691 UTC [protoutils] ValidateTransaction -> DEBU 1095 Header is channel_header:"\010\003\032\014\010\317\220\251\346\005\020\300\201\222\370\001\"\017businesschannel*@48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\305'\350\322\200\365\337\227\274\345\207\266\273\335\365\301l\024\321\244\226\224\302\320" " -"2019-05-02 01:30:57.720 UTC [protoutils] validateChannelHeader -> DEBU 1096 validateChannelHeader info: header type 3" -"2019-05-02 01:30:57.729 UTC [protoutils] checkSignatureFromCreator -> DEBU 1097 begin" -"2019-05-02 01:30:57.729 UTC [msp] GetManagerForChain -> DEBU 1098 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:30:57.729 UTC [protoutils] checkSignatureFromCreator -> DEBU 1099 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:30:57.729 UTC [protoutils] checkSignatureFromCreator -> DEBU 109a creator is valid" -"2019-05-02 01:30:57.730 UTC [msp.identity] Verify -> DEBU 109b Verify: digest = 00000000 30 2b 78 82 93 28 6b 8b c3 cf 7e 75 7b a0 56 aa |0+x..(k...~u{.V.| -00000010 06 be 8a 3a cd 72 e3 7f 56 3a 6a 93 12 cc ee 11 |...:.r..V:j.....|" -"2019-05-02 01:30:57.730 UTC [msp.identity] Verify -> DEBU 109c Verify: sig = 00000000 30 45 02 21 00 87 4b 3f 3c 2d 2e a3 58 0d 8b 10 |0E.!..K?<-..X...| -00000010 3f c6 c2 a1 6b 5a b2 25 2a 4a 96 1c 46 b8 2d 0b |?...kZ.%*J..F.-.| -00000020 e4 a9 39 92 37 02 20 67 ff 3a 3f 62 cd c9 90 e7 |..9.7. g.:?b....| -00000030 69 ed cb e1 7b d4 6d df b5 a5 8d 8f 8a 9c 01 b5 |i...{.m.........| -00000040 d1 e8 59 34 d4 0a f2 |..Y4...|" -"2019-05-02 01:30:57.731 UTC [protoutils] checkSignatureFromCreator -> DEBU 109d exits successfully" -"2019-05-02 01:30:57.731 UTC [protoutils] validateEndorserTransaction -> DEBU 109e validateEndorserTransaction starts for data 0xc0024e4a80, header channel_header:"\010\003\032\014\010\317\220\251\346\005\020\300\201\222\370\001\"\017businesschannel*@48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\305'\350\322\200\365\337\227\274\345\207\266\273\335\365\301l\024\321\244\226\224\302\320" " -"2019-05-02 01:30:57.731 UTC [protoutils] validateEndorserTransaction -> DEBU 109f validateEndorserTransaction info: there are 1 actions" -"2019-05-02 01:30:57.732 UTC [protoutils] validateEndorserTransaction -> DEBU 10a0 validateEndorserTransaction info: signature header is valid" -"2019-05-02 01:30:57.732 UTC [protoutils] ValidateTransaction -> DEBU 10a1 ValidateTransactionEnvelope returns err %!s()" -"2019-05-02 01:30:57.732 UTC [committer.txvalidator] validateTx -> DEBU 10a2 Transaction is for channel businesschannel" -"2019-05-02 01:30:57.732 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 10a3 retrieveTransactionByID() - txId = [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a]" -"2019-05-02 01:30:57.732 UTC [committer.txvalidator] validateTx -> DEBU 10a4 Validating transaction with plugins" -"2019-05-02 01:30:57.732 UTC [committer.txvalidator] Dispatch -> DEBU 10a5 [businesschannel] Dispatch starts for bytes 0xc0024e7000" -"2019-05-02 01:30:57.733 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10a6 constructing new query executor txid = [fc9ceeca-e279-4291-8758-91189b55aa5c]" -"2019-05-02 01:30:57.744 UTC [lockbasedtxmgr] Done -> DEBU 10a7 Done with transaction simulation / query execution [fc9ceeca-e279-4291-8758-91189b55aa5c]" -"2019-05-02 01:30:57.745 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 10a8 Validating Tx 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" -"2019-05-02 01:30:57.746 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10a9 constructing new query executor txid = [16b7dad7-4dc3-45a4-b784-a097ca37e27f]" -"2019-05-02 01:30:57.746 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10aa retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:30:57.746 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10ab retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:30:57.746 UTC [lockbasedtxmgr] Done -> DEBU 10ac Done with transaction simulation / query execution [16b7dad7-4dc3-45a4-b784-a097ca37e27f]" -"2019-05-02 01:30:57.747 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10ad constructing new query executor txid = [2ca05bb8-7138-47db-8b8c-11c85f209186]" -"2019-05-02 01:30:57.748 UTC [lockbasedtxmgr] Done -> DEBU 10ae Done with transaction simulation / query execution [2ca05bb8-7138-47db-8b8c-11c85f209186]" -"2019-05-02 01:30:57.748 UTC [policies] Evaluate -> DEBU 10af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" -"2019-05-02 01:30:57.748 UTC [msp] DeserializeIdentity -> DEBU 10b0 Obtaining identity" -"2019-05-02 01:30:57.751 UTC [msp.identity] newIdentity -> DEBU 10b1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:29.993 UTC [cauthdsl] func1 -> DEBU 1048 0xc003828ef0 gate 1556789249993801100 evaluation starts" +"2019-05-02 09:27:29.993 UTC [cauthdsl] func2 -> DEBU 1049 0xc003828ef0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:29.993 UTC [cauthdsl] func2 -> DEBU 104a 0xc003828ef0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:29.993 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 104b Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-05-02 09:27:29.994 UTC [msp] Validate -> DEBU 104c MSP OrdererMSP validating identity" +"2019-05-02 09:27:29.994 UTC [cauthdsl] func2 -> DEBU 104d 0xc003828ef0 principal matched by identity 0" +"2019-05-02 09:27:29.994 UTC [msp.identity] Verify -> DEBU 104e Verify: digest = 00000000 c9 bd 12 d3 d2 07 29 01 a6 20 32 de 2d c6 dc f5 |......).. 2.-...| +00000010 f4 0e 6f 90 a3 69 ba 40 c6 0c 58 ee 7f ee 0d 6b |..o..i.@..X....k|" +"2019-05-02 09:27:29.994 UTC [msp.identity] Verify -> DEBU 104f Verify: sig = 00000000 30 44 02 20 09 7d 08 a8 ac 23 13 65 98 37 14 9b |0D. .}...#.e.7..| +00000010 18 ab 5a 5c 08 57 7a ef eb cf 15 e5 3c 2c f1 d4 |..Z\.Wz.....<,..| +00000020 94 d0 b8 9e 02 20 5a b3 fb a2 36 7c 33 b6 12 3d |..... Z...6|3..=| +00000030 8d 54 03 97 19 8e d8 21 48 1e 82 bc 84 64 bf 3b |.T.....!H....d.;| +00000040 11 96 e1 22 ef 6f |...".o|" +"2019-05-02 09:27:29.994 UTC [cauthdsl] func2 -> DEBU 1050 0xc003828ef0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:29.994 UTC [cauthdsl] func1 -> DEBU 1051 0xc003828ef0 gate 1556789249993801100 evaluation succeeds" +"2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1052 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1053 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1054 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:29.994 UTC [policies] Evaluate -> DEBU 1055 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:29.994 UTC [blocksProvider] DeliverBlocks -> DEBU 1056 [businesschannel] Adding payload to local buffer, blockNum = [3]" +"2019-05-02 09:27:29.994 UTC [gossip.state] addPayload -> DEBU 1057 [businesschannel] Adding payload to local buffer, blockNum = [3]" +"2019-05-02 09:27:29.994 UTC [gossip.state] addPayload -> DEBU 1058 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-05-02 09:27:29.994 UTC [blocksProvider] DeliverBlocks -> DEBU 1059 [businesschannel] Gossiping block [3], peers number [3]" +"2019-05-02 09:27:29.994 UTC [gossip.channel] AddToMsgStore -> DEBU 105a Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4723 bytes, seq: 3}, Envelope: 4753 bytes, Signature: 0 bytes to the block puller" +"2019-05-02 09:27:29.994 UTC [gossip.pull] Add -> DEBU 105b Added 3, total items: 3" +"2019-05-02 09:27:29.994 UTC [gossip.state] deliverPayloads -> DEBU 105c [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" +"2019-05-02 09:27:29.995 UTC [gossip.state] deliverPayloads -> DEBU 105d [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" +"2019-05-02 09:27:29.995 UTC [gossip.privdata] StoreBlock -> INFO 105e [businesschannel] Received block [3] from buffer" +"2019-05-02 09:27:29.995 UTC [gossip.privdata] StoreBlock -> DEBU 105f [businesschannel] Validating block [3]" +"2019-05-02 09:27:29.995 UTC [committer.txvalidator] Validate -> DEBU 1060 [businesschannel] START Block Validation for block [3]" +"2019-05-02 09:27:29.995 UTC [committer.txvalidator] Validate -> DEBU 1061 expecting 1 block validation responses" +"2019-05-02 09:27:29.995 UTC [committer.txvalidator] validateTx -> DEBU 1062 [businesschannel] validateTx starts for block 0xc0027182c0 env 0xc002d40690 txn 0" +"2019-05-02 09:27:29.995 UTC [protoutils] ValidateTransaction -> DEBU 1063 ValidateTransactionEnvelope starts for envelope 0xc002d40690" +"2019-05-02 09:27:29.995 UTC [protoutils] ValidateTransaction -> DEBU 1064 Header is channel_header:"\010\003\032\014\010\377\357\252\346\005\020\210\260\354\266\003\"\017businesschannel*@fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\232\265\007i\241\311>\021 DEBU 1065 validateChannelHeader info: header type 3" +"2019-05-02 09:27:29.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 1066 begin" +"2019-05-02 09:27:29.995 UTC [msp] GetManagerForChain -> DEBU 1067 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:29.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 1068 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:29.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 1069 creator is valid" +"2019-05-02 09:27:29.995 UTC [msp.identity] Verify -> DEBU 106a Verify: digest = 00000000 4d e3 34 38 46 86 b5 a2 c5 08 2a 3d 74 f1 7b 3d |M.48F.....*=t.{=| +00000010 ca d3 8e 76 16 ce 7f b2 7b 9b 62 8e 0f 55 ae ee |...v....{.b..U..|" +"2019-05-02 09:27:29.995 UTC [msp.identity] Verify -> DEBU 106b Verify: sig = 00000000 30 45 02 21 00 84 a6 c2 9c 60 54 00 ed 04 97 bd |0E.!.....`T.....| +00000010 e7 ef 54 53 c3 59 d9 32 03 66 c2 4e f0 dc 25 6e |..TS.Y.2.f.N..%n| +00000020 46 06 2e 6b 5e 02 20 34 53 a9 96 44 6f f9 5d 5e |F..k^. 4S..Do.]^| +00000030 5f cc e9 c0 33 db 1b 44 95 d1 cd 17 d4 7d a0 a3 |_...3..D.....}..| +00000040 fa b9 0d de c0 80 62 |......b|" +"2019-05-02 09:27:29.996 UTC [protoutils] checkSignatureFromCreator -> DEBU 106c exits successfully" +"2019-05-02 09:27:29.996 UTC [protoutils] validateEndorserTransaction -> DEBU 106d validateEndorserTransaction starts for data 0xc00217aa80, header channel_header:"\010\003\032\014\010\377\357\252\346\005\020\210\260\354\266\003\"\017businesschannel*@fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\232\265\007i\241\311>\021 DEBU 106e validateEndorserTransaction info: there are 1 actions" +"2019-05-02 09:27:29.996 UTC [protoutils] validateEndorserTransaction -> DEBU 106f validateEndorserTransaction info: signature header is valid" +"2019-05-02 09:27:29.996 UTC [protoutils] ValidateTransaction -> DEBU 1070 ValidateTransactionEnvelope returns err %!s()" +"2019-05-02 09:27:29.996 UTC [committer.txvalidator] validateTx -> DEBU 1071 Transaction is for channel businesschannel" +"2019-05-02 09:27:29.997 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1072 retrieveTransactionByID() - txId = [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940]" +"2019-05-02 09:27:29.998 UTC [committer.txvalidator] validateTx -> DEBU 1073 Validating transaction with plugins" +"2019-05-02 09:27:29.999 UTC [committer.txvalidator] Dispatch -> DEBU 1074 [businesschannel] Dispatch starts for bytes 0xc00217d000" +"2019-05-02 09:27:30.001 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1075 constructing new query executor txid = [3376978c-42b4-4f4d-894e-11a19df7b970]" +"2019-05-02 09:27:30.002 UTC [lockbasedtxmgr] Done -> DEBU 1076 Done with transaction simulation / query execution [3376978c-42b4-4f4d-894e-11a19df7b970]" +"2019-05-02 09:27:30.002 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 1077 Validating Tx fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" +"2019-05-02 09:27:30.006 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1078 constructing new query executor txid = [438fb3c7-59f2-4867-90a3-7004d636656c]" +"2019-05-02 09:27:30.006 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1079 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:30.007 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 107a retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:30.008 UTC [lockbasedtxmgr] Done -> DEBU 107b Done with transaction simulation / query execution [438fb3c7-59f2-4867-90a3-7004d636656c]" +"2019-05-02 09:27:30.008 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 107c constructing new query executor txid = [89a04705-8d4b-4e7e-99b1-2a54bf193f0c]" +"2019-05-02 09:27:30.008 UTC [lockbasedtxmgr] Done -> DEBU 107d Done with transaction simulation / query execution [89a04705-8d4b-4e7e-99b1-2a54bf193f0c]" +"2019-05-02 09:27:30.009 UTC [policies] Evaluate -> DEBU 107e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" +"2019-05-02 09:27:30.010 UTC [msp] DeserializeIdentity -> DEBU 107f Obtaining identity" +"2019-05-02 09:27:30.011 UTC [msp.identity] newIdentity -> DEBU 1080 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -6239,1176 +6076,575 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE-----" -"2019-05-02 01:30:57.751 UTC [cauthdsl] func1 -> DEBU 10b2 0xc002505cc0 gate 1556760657751922300 evaluation starts" -"2019-05-02 01:30:57.752 UTC [cauthdsl] func2 -> DEBU 10b3 0xc002505cc0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:57.752 UTC [cauthdsl] func2 -> DEBU 10b4 0xc002505cc0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:57.752 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 10b5 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:30:57.752 UTC [msp] Validate -> DEBU 10b6 MSP Org1MSP validating identity" -"2019-05-02 01:30:57.752 UTC [msp] getCertificationChain -> DEBU 10b7 MSP Org1MSP getting certification chain" -"2019-05-02 01:30:57.752 UTC [cauthdsl] func2 -> DEBU 10b8 0xc002505cc0 principal matched by identity 0" -"2019-05-02 01:30:57.752 UTC [msp.identity] Verify -> DEBU 10b9 Verify: digest = 00000000 4a cd 6b 26 8f 2d e2 70 d1 19 d6 b8 fe d7 ea 56 |J.k&.-.p.......V| -00000010 26 f0 b7 65 9d f2 bd 04 51 1d d4 d5 73 bf b4 db |&..e....Q...s...|" -"2019-05-02 01:30:57.752 UTC [msp.identity] Verify -> DEBU 10ba Verify: sig = 00000000 30 45 02 21 00 9d 68 5c ad f9 f4 78 69 0e 1f 5b |0E.!..h\...xi..[| -00000010 53 a8 3e 01 03 3a c6 cb 9e a1 fc 18 a2 ef 63 c5 |S.>..:........c.| -00000020 85 5d 17 ff e6 02 20 31 d4 dd 9c 26 b8 92 b9 bf |.].... 1...&....| -00000030 85 00 66 92 5f 15 d1 59 b4 d7 cb fc 5f 87 a1 94 |..f._..Y...._...| -00000040 ce d3 41 72 f2 0a 69 |..Ar..i|" -"2019-05-02 01:30:57.752 UTC [cauthdsl] func2 -> DEBU 10bb 0xc002505cc0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:57.753 UTC [cauthdsl] func1 -> DEBU 10bc 0xc002505cc0 gate 1556760657751922300 evaluation succeeds" -"2019-05-02 01:30:57.753 UTC [policies] Evaluate -> DEBU 10bd Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:57.753 UTC [policies] Evaluate -> DEBU 10be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10bf constructing new query executor txid = [59808426-849f-42d5-a53e-74bc93d1f6de]" -"2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c0 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c1 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] Done -> DEBU 10c2 Done with transaction simulation / query execution [59808426-849f-42d5-a53e-74bc93d1f6de]" -"2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10c3 constructing new query executor txid = [107ff958-d74b-4821-a477-cb2dffc6e3c5]" -"2019-05-02 01:30:57.753 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c4 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c5 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] Done -> DEBU 10c6 Done with transaction simulation / query execution [107ff958-d74b-4821-a477-cb2dffc6e3c5]" -"2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10c7 constructing new query executor txid = [f588474e-ffb2-458f-8d4f-4bddbcb462f6]" -"2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c8 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10c9 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] Done -> DEBU 10ca Done with transaction simulation / query execution [f588474e-ffb2-458f-8d4f-4bddbcb462f6]" -"2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10cb constructing new query executor txid = [5a45630f-6eb2-4bba-a394-f525d55e9821]" -"2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10cc retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:30:57.754 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10cd retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] Done -> DEBU 10ce Done with transaction simulation / query execution [5a45630f-6eb2-4bba-a394-f525d55e9821]" -"2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10cf constructing new query executor txid = [8cc13e79-a77b-49f3-ac16-a26deac5a1fa]" -"2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10d0 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10d1 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] Done -> DEBU 10d2 Done with transaction simulation / query execution [8cc13e79-a77b-49f3-ac16-a26deac5a1fa]" -"2019-05-02 01:30:57.755 UTC [vscc] Validate -> DEBU 10d3 block 3, namespace: _lifecycle, tx 0 validation results is: " -"2019-05-02 01:30:57.755 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 10d4 Transaction 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a appears to be valid" -"2019-05-02 01:30:57.755 UTC [committer.txvalidator] Dispatch -> DEBU 10d5 [businesschannel] Dispatch completes env bytes 0xc0024e7000" -"2019-05-02 01:30:57.755 UTC [committer.txvalidator] validateTx -> DEBU 10d6 [businesschannel] validateTx completes for block 0xc002f8f240 env 0xc002759cc0 txn 0" -"2019-05-02 01:30:57.755 UTC [committer.txvalidator] Validate -> DEBU 10d7 got result for idx 0, code 0" -"2019-05-02 01:30:57.755 UTC [committer.txvalidator] Validate -> INFO 10d8 [businesschannel] Validated block [3] in 67ms" -"2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10d9 constructing new query executor txid = [1da88cc2-95a1-4b84-a626-40feada40649]" -"2019-05-02 01:30:57.755 UTC [lockbasedtxmgr] Done -> DEBU 10da Done with transaction simulation / query execution [1da88cc2-95a1-4b84-a626-40feada40649]" -"2019-05-02 01:30:57.755 UTC [msp] GetManagerForChain -> DEBU 10db Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:30:57.756 UTC [cauthdsl] func1 -> DEBU 10dc 0xc002670fe0 gate 1556760657755994800 evaluation starts" -"2019-05-02 01:30:57.756 UTC [cauthdsl] func2 -> DEBU 10dd 0xc002670fe0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:57.756 UTC [cauthdsl] func2 -> DEBU 10de 0xc002670fe0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:57.756 UTC [cauthdsl] func2 -> DEBU 10df 0xc002670fe0 principal matched by identity 0" -"2019-05-02 01:30:57.756 UTC [msp.identity] Verify -> DEBU 10e0 Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... | +"2019-05-02 09:27:30.012 UTC [cauthdsl] func1 -> DEBU 1081 0xc0038aef40 gate 1556789250012196000 evaluation starts" +"2019-05-02 09:27:30.012 UTC [cauthdsl] func2 -> DEBU 1082 0xc0038aef40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:30.012 UTC [cauthdsl] func2 -> DEBU 1083 0xc0038aef40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:30.012 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1084 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:27:30.013 UTC [msp] Validate -> DEBU 1085 MSP Org1MSP validating identity" +"2019-05-02 09:27:30.013 UTC [msp] getCertificationChain -> DEBU 1086 MSP Org1MSP getting certification chain" +"2019-05-02 09:27:30.013 UTC [cauthdsl] func2 -> DEBU 1087 0xc0038aef40 principal matched by identity 0" +"2019-05-02 09:27:30.014 UTC [msp.identity] Verify -> DEBU 1088 Verify: digest = 00000000 f6 ba d1 c1 e9 ae 67 52 1a 19 de 11 16 71 4e ee |......gR.....qN.| +00000010 2c a6 7c 45 4e 4b eb 9c c4 1b 90 91 65 fe 73 d4 |,.|ENK......e.s.|" +"2019-05-02 09:27:30.015 UTC [msp.identity] Verify -> DEBU 1089 Verify: sig = 00000000 30 45 02 21 00 f1 91 b5 c8 e8 ee de 4c 2a 82 b1 |0E.!........L*..| +00000010 ff 7d b5 dd c8 dd 5e e8 2d e5 b8 01 cf 99 ef aa |.}....^.-.......| +00000020 28 93 90 d8 5a 02 20 79 0c 74 7a cc 1f 09 8b 10 |(...Z. y.tz.....| +00000030 bb 87 e8 a2 f0 91 99 fd d3 77 9d 25 71 28 29 af |.........w.%q().| +00000040 a2 ef 94 af 0a ad 75 |......u|" +"2019-05-02 09:27:30.015 UTC [cauthdsl] func2 -> DEBU 108a 0xc0038aef40 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:30.015 UTC [cauthdsl] func1 -> DEBU 108b 0xc0038aef40 gate 1556789250012196000 evaluation succeeds" +"2019-05-02 09:27:30.015 UTC [policies] Evaluate -> DEBU 108c Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:30.015 UTC [policies] Evaluate -> DEBU 108d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 108e constructing new query executor txid = [971d2601-2a1a-4acd-9c5f-01ba1856704a]" +"2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 108f retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1090 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] Done -> DEBU 1091 Done with transaction simulation / query execution [971d2601-2a1a-4acd-9c5f-01ba1856704a]" +"2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1092 constructing new query executor txid = [a22dcb4a-1a7e-4378-854e-b6c0ab7b0079]" +"2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1093 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:30.016 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1094 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] Done -> DEBU 1095 Done with transaction simulation / query execution [a22dcb4a-1a7e-4378-854e-b6c0ab7b0079]" +"2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1096 constructing new query executor txid = [2420b70c-c870-4439-b6f4-e5060665642d]" +"2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1097 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:30.017 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1098 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] Done -> DEBU 1099 Done with transaction simulation / query execution [2420b70c-c870-4439-b6f4-e5060665642d]" +"2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 109a constructing new query executor txid = [cf54879c-c9b1-4ef0-a9c4-c5f32c74725e]" +"2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 109b retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 109c retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:30.018 UTC [lockbasedtxmgr] Done -> DEBU 109d Done with transaction simulation / query execution [cf54879c-c9b1-4ef0-a9c4-c5f32c74725e]" +"2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 109e constructing new query executor txid = [0a8ed1bf-3673-44d9-980a-c1a3d8a59d0d]" +"2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 109f retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 10a0 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] Done -> DEBU 10a1 Done with transaction simulation / query execution [0a8ed1bf-3673-44d9-980a-c1a3d8a59d0d]" +"2019-05-02 09:27:30.019 UTC [vscc] Validate -> DEBU 10a2 block 3, namespace: _lifecycle, tx 0 validation results is: " +"2019-05-02 09:27:30.019 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 10a3 Transaction fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 appears to be valid" +"2019-05-02 09:27:30.019 UTC [committer.txvalidator] Dispatch -> DEBU 10a4 [businesschannel] Dispatch completes env bytes 0xc00217d000" +"2019-05-02 09:27:30.019 UTC [committer.txvalidator] validateTx -> DEBU 10a5 [businesschannel] validateTx completes for block 0xc0027182c0 env 0xc002d40690 txn 0" +"2019-05-02 09:27:30.019 UTC [committer.txvalidator] Validate -> DEBU 10a6 got result for idx 0, code 0" +"2019-05-02 09:27:30.019 UTC [committer.txvalidator] Validate -> INFO 10a7 [businesschannel] Validated block [3] in 24ms" +"2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10a8 constructing new query executor txid = [e6ada518-a977-452b-8e53-fe283617feed]" +"2019-05-02 09:27:30.019 UTC [lockbasedtxmgr] Done -> DEBU 10a9 Done with transaction simulation / query execution [e6ada518-a977-452b-8e53-fe283617feed]" +"2019-05-02 09:27:30.019 UTC [msp] GetManagerForChain -> DEBU 10aa Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:30.019 UTC [cauthdsl] func1 -> DEBU 10ab 0xc0039104b0 gate 1556789250019687700 evaluation starts" +"2019-05-02 09:27:30.019 UTC [cauthdsl] func2 -> DEBU 10ac 0xc0039104b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:30.019 UTC [cauthdsl] func2 -> DEBU 10ad 0xc0039104b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:30.019 UTC [cauthdsl] func2 -> DEBU 10ae 0xc0039104b0 principal matched by identity 0" +"2019-05-02 09:27:30.019 UTC [msp.identity] Verify -> DEBU 10af Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... | 00000010 08 97 14 85 6e e2 33 b3 90 2a 59 1d 0d 5f 29 25 |....n.3..*Y.._)%|" -"2019-05-02 01:30:57.756 UTC [msp.identity] Verify -> DEBU 10e1 Verify: sig = 00000000 30 44 02 20 32 dc 2b 53 10 59 c1 1e 45 a5 bb d7 |0D. 2.+S.Y..E...| -00000010 8a 93 4e b6 9d 00 50 eb 41 44 b6 55 b2 20 4a a4 |..N...P.AD.U. J.| -00000020 47 d7 b1 e1 02 20 43 a0 ab d6 42 76 52 c7 09 71 |G.... C...BvR..q| -00000030 84 83 3f 21 74 47 0e ea 44 43 21 40 c2 2b 78 74 |..?!tG..DC!@.+xt| -00000040 d2 4e 49 5b 78 75 |.NI[xu|" -"2019-05-02 01:30:57.756 UTC [cauthdsl] func2 -> DEBU 10e2 0xc002670fe0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:57.756 UTC [cauthdsl] func1 -> DEBU 10e3 0xc002670fe0 gate 1556760657755994800 evaluation succeeds" -"2019-05-02 01:30:57.756 UTC [gossip.privdata] listMissingPrivateData -> DEBU 10e4 Retrieving private write sets for 1 transactions from transient store" -"2019-05-02 01:30:57.756 UTC [transientstore] GetTxPvtRWSetByTxid -> DEBU 10e5 Getting private data from transient store for transaction 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a" -"2019-05-02 01:30:57.756 UTC [leveldbhelper] GetIterator -> DEBU 10e6 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x34, 0x38, 0x66, 0x35, 0x62, 0x31, 0x62, 0x37, 0x31, 0x34, 0x62, 0x32, 0x37, 0x39, 0x61, 0x38, 0x63, 0x62, 0x61, 0x32, 0x31, 0x39, 0x65, 0x63, 0x65, 0x32, 0x34, 0x66, 0x34, 0x38, 0x35, 0x36, 0x30, 0x39, 0x34, 0x66, 0x34, 0x32, 0x37, 0x36, 0x35, 0x66, 0x33, 0x64, 0x35, 0x66, 0x36, 0x30, 0x33, 0x32, 0x66, 0x35, 0x37, 0x64, 0x61, 0x65, 0x39, 0x33, 0x31, 0x63, 0x66, 0x33, 0x32, 0x61, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x34, 0x38, 0x66, 0x35, 0x62, 0x31, 0x62, 0x37, 0x31, 0x34, 0x62, 0x32, 0x37, 0x39, 0x61, 0x38, 0x63, 0x62, 0x61, 0x32, 0x31, 0x39, 0x65, 0x63, 0x65, 0x32, 0x34, 0x66, 0x34, 0x38, 0x35, 0x36, 0x30, 0x39, 0x34, 0x66, 0x34, 0x32, 0x37, 0x36, 0x35, 0x66, 0x33, 0x64, 0x35, 0x66, 0x36, 0x30, 0x33, 0x32, 0x66, 0x35, 0x37, 0x64, 0x61, 0x65, 0x39, 0x33, 0x31, 0x63, 0x66, 0x33, 0x32, 0x61, 0xff}]" -"2019-05-02 01:30:57.757 UTC [gossip.privdata] StoreBlock -> DEBU 10e7 [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-05-02 01:30:57.757 UTC [gossip.privdata] StoreBlock -> DEBU 10e8 [businesschannel] Added 1 namespace private write sets for block [3], tran [0]" -"2019-05-02 01:30:57.757 UTC [kvledger] CommitWithPvtData -> DEBU 10e9 [businesschannel] Validating state for block [3]" -"2019-05-02 01:30:57.757 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10ea Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:30:57.757 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10eb lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-05-02 01:30:57.757 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10ec Validating new block with num trans = [1]" -"2019-05-02 01:30:57.757 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10ed ValidateAndPrepareBatch() for block number = [3]" -"2019-05-02 01:30:57.757 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10ee preprocessing ProtoBlock..." -"2019-05-02 01:30:57.757 UTC [valimpl] preprocessProtoBlock -> DEBU 10ef txType=ENDORSER_TRANSACTION" -"2019-05-02 01:30:57.757 UTC [stateleveldb] GetState -> DEBU 10f0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:30:57.757 UTC [statebasedval] validateKVRead -> DEBU 10f1 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -"2019-05-02 01:30:57.757 UTC [stateleveldb] GetState -> DEBU 10f2 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" -"2019-05-02 01:30:57.757 UTC [stateleveldb] GetState -> DEBU 10f3 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -"2019-05-02 01:30:57.758 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 10f4 Block [3] Transaction index [0] TxId [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a] marked as valid by state validator. ContainsPostOrderWrites [false]" -"2019-05-02 01:30:57.758 UTC [valinternal] ApplyWriteSet -> DEBU 10f5 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc00301fc00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc00301fcc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc00301fb80), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc00301fbc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4 DEBU 10f6 validating rwset..." -"2019-05-02 01:30:57.759 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10f7 postprocessing ProtoBlock..." -"2019-05-02 01:30:57.759 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10f8 ValidateAndPrepareBatch() complete" -"2019-05-02 01:30:57.759 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10f9 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0002ef220 0x27475e0 0xc000010ca8}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0025c18c0 map[]})]}" -"2019-05-02 01:30:57.759 UTC [cceventmgmt] HandleStateUpdates -> DEBU 10fa Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" -"2019-05-02 01:30:57.760 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 10fb Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" -"2019-05-02 01:30:57.760 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10fc Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0})}" -"2019-05-02 01:30:57.760 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10fd Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 216 129 76 241 69 60 8 51 200 236 230 104 227 112 199 189 219 19 97 23 185 229 62 48 241 59 155 78 13 25 116 13 2 32 116 67 68 156 136 155 15 173 83 249 60 180 13 82 76 31 222 21 132 92 100 178 210 6 255 132 174 31 211 118 30 104]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0025ee400 0xc00255d110 0xc0025a5580})]}" -"2019-05-02 01:30:57.822 UTC [gossip.pull] Hello -> DEBU 10fe Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:30:57.822 UTC [msp] DeserializeIdentity -> DEBU 1100 Obtaining identity" -"2019-05-02 01:30:57.823 UTC [msp] DeserializeIdentity -> DEBU 1101 Obtaining identity" -"2019-05-02 01:30:57.824 UTC [msp] DeserializeIdentity -> DEBU 1102 Obtaining identity" -"2019-05-02 01:30:57.824 UTC [msp] DeserializeIdentity -> DEBU 1103 Obtaining identity" -"2019-05-02 01:30:57.824 UTC [gossip.comm] Send -> DEBU 1104 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4724 bytes, seq: 3}, Envelope: 4754 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:57.824 UTC [msp] DeserializeIdentity -> DEBU 1105 Obtaining identity" -"2019-05-02 01:30:57.827 UTC [msp] DeserializeIdentity -> DEBU 1106 Obtaining identity" -"2019-05-02 01:30:57.823 UTC [gossip.comm] Send -> DEBU 1107 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:57.829 UTC [gossip.pull] Hello -> DEBU 1108 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:30:57.833 UTC [gossip.comm] sendToEndpoint -> DEBU 1109 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4724 bytes, seq: 3}, Envelope: 4754 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.833 UTC [gossip.comm] sendToEndpoint -> DEBU 110a Exiting" -"2019-05-02 01:30:57.843 UTC [gossip.comm] sendToEndpoint -> DEBU 110b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.844 UTC [gossip.comm] sendToEndpoint -> DEBU 110c Exiting" -"2019-05-02 01:30:57.822 UTC [confighistory] HandleStateUpdates -> ERRO 10ff Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003294fe0)}" -"2019-05-02 01:30:57.845 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 110d Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000e7c0})}" -"2019-05-02 01:30:57.846 UTC [kvledger] CommitWithPvtData -> DEBU 110e [businesschannel] Committing block [3] to storage" -"2019-05-02 01:30:57.851 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1110 Writing block [3] to pvt block store" -"2019-05-02 01:30:57.851 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1111 constructing new query executor txid = [e24c369a-80fc-434c-ac50-f768ee356347]" -"2019-05-02 01:30:57.851 UTC [lockbasedtxmgr] Done -> DEBU 1112 Done with transaction simulation / query execution [e24c369a-80fc-434c-ac50-f768ee356347]" -"2019-05-02 01:30:57.850 UTC [gossip.comm] Send -> DEBU 110f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:57.852 UTC [gossip.pull] Hello -> DEBU 1113 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:30:57.852 UTC [gossip.comm] Send -> DEBU 1114 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:57.853 UTC [gossip.comm] sendToEndpoint -> DEBU 1115 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.853 UTC [gossip.comm] sendToEndpoint -> DEBU 1116 Exiting" -"2019-05-02 01:30:57.854 UTC [gossip.comm] sendToEndpoint -> DEBU 1117 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.854 UTC [gossip.comm] sendToEndpoint -> DEBU 1118 Exiting" -"2019-05-02 01:30:57.866 UTC [pvtdatastorage] Prepare -> DEBU 1119 Saved 1 private data write sets for block [3]" -"2019-05-02 01:30:57.871 UTC [fsblkstorage] indexBlock -> DEBU 111a Indexing block [blockNum=3, blockHash=[]byte{0xa8, 0xe, 0x22, 0x69, 0x53, 0xd1, 0x69, 0x7c, 0x0, 0x47, 0xba, 0xba, 0x55, 0xac, 0x35, 0x1e, 0xd5, 0x4c, 0xc4, 0x47, 0x90, 0xfc, 0xed, 0x3d, 0xc9, 0x7c, 0xf5, 0x2f, 0xee, 0xe9, 0x79, 0xd} txOffsets= -txId=48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a locPointer=offset=70, bytesLength=3705 +"2019-05-02 09:27:30.019 UTC [msp.identity] Verify -> DEBU 10b0 Verify: sig = 00000000 30 44 02 20 48 9c ca c4 a4 a8 2d 4c 45 08 31 b8 |0D. H.....-LE.1.| +00000010 a6 12 3b ce 60 ea 4a 53 9d 05 ba fd e2 01 8d 3f |..;.`.JS.......?| +00000020 7f 77 15 88 02 20 3f ca a9 21 29 53 d0 5b 09 e5 |.w... ?..!)S.[..| +00000030 2b e3 68 49 77 5d 19 ed cb 2c 61 13 02 4d 19 25 |+.hIw]...,a..M.%| +00000040 c9 c5 ee c0 b5 da |......|" +"2019-05-02 09:27:30.020 UTC [cauthdsl] func2 -> DEBU 10b1 0xc0039104b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:30.020 UTC [cauthdsl] func1 -> DEBU 10b2 0xc0039104b0 gate 1556789250019687700 evaluation succeeds" +"2019-05-02 09:27:30.020 UTC [gossip.privdata] listMissingPrivateData -> DEBU 10b3 Retrieving private write sets for 1 transactions from transient store" +"2019-05-02 09:27:30.020 UTC [transientstore] GetTxPvtRWSetByTxid -> DEBU 10b4 Getting private data from transient store for transaction fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940" +"2019-05-02 09:27:30.020 UTC [leveldbhelper] GetIterator -> DEBU 10b5 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0xff}]" +"2019-05-02 09:27:30.020 UTC [gossip.privdata] StoreBlock -> DEBU 10b6 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-05-02 09:27:30.021 UTC [gossip.privdata] StoreBlock -> DEBU 10b7 [businesschannel] Added 1 namespace private write sets for block [3], tran [0]" +"2019-05-02 09:27:30.021 UTC [kvledger] CommitWithPvtData -> DEBU 10b8 [businesschannel] Validating state for block [3]" +"2019-05-02 09:27:30.021 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10b9 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:27:30.021 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10ba lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-05-02 09:27:30.022 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 10bb Validating new block with num trans = [1]" +"2019-05-02 09:27:30.022 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10bc ValidateAndPrepareBatch() for block number = [3]" +"2019-05-02 09:27:30.022 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10bd preprocessing ProtoBlock..." +"2019-05-02 09:27:30.022 UTC [valimpl] preprocessProtoBlock -> DEBU 10be txType=ENDORSER_TRANSACTION" +"2019-05-02 09:27:30.022 UTC [stateleveldb] GetState -> DEBU 10bf GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:30.022 UTC [statebasedval] validateKVRead -> DEBU 10c0 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-05-02 09:27:30.023 UTC [stateleveldb] GetState -> DEBU 10c1 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +"2019-05-02 09:27:30.023 UTC [stateleveldb] GetState -> DEBU 10c2 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-05-02 09:27:30.023 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 10c3 Block [3] Transaction index [0] TxId [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-05-02 09:27:30.023 UTC [valinternal] ApplyWriteSet -> DEBU 10c4 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc002792740), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc002792800), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0027926c0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc002792700), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4 DEBU 10c5 validating rwset..." +"2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10c6 Obtaining identity" +"2019-05-02 09:27:30.024 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10c7 postprocessing ProtoBlock..." +"2019-05-02 09:27:30.024 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 10c8 ValidateAndPrepareBatch() complete" +"2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10c9 Obtaining identity" +"2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10ca Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0004446c0 0x27475e0 0xc000011220}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0022c0dc0 map[]})]}" +"2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10cb Obtaining identity" +"2019-05-02 09:27:30.024 UTC [cceventmgmt] HandleStateUpdates -> DEBU 10cc Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" +"2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10cd Obtaining identity" +"2019-05-02 09:27:30.024 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 10ce Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" +"2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10cf Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0})}" +"2019-05-02 09:27:30.024 UTC [gossip.comm] Send -> DEBU 10d0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4723 bytes, seq: 3}, Envelope: 4753 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10d1 Obtaining identity" +"2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10d2 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 184 141 138 176 125 192 58 83 1 250 26 202 161 54 104 45 229 195 166 43 96 100 9 159 109 154 254 234 147 189 33 229 2 32 120 2 28 36 139 185 5 29 110 69 153 220 53 183 5 154 146 86 140 197 1 134 231 194 84 112 80 242 124 44 67 58]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002604a00 0xc002598700 0xc0025cc980})]}" +"2019-05-02 09:27:30.024 UTC [msp] DeserializeIdentity -> DEBU 10d3 Obtaining identity" +"2019-05-02 09:27:30.024 UTC [confighistory] HandleStateUpdates -> ERRO 10d4 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0037d7120)}" +"2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 10d5 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000ebc0})}" +"2019-05-02 09:27:30.024 UTC [gossip.comm] sendToEndpoint -> DEBU 10d6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4723 bytes, seq: 3}, Envelope: 4753 bytes, Signature: 0 bytes" +"2019-05-02 09:27:30.024 UTC [gossip.comm] sendToEndpoint -> DEBU 10d7 Exiting" +"2019-05-02 09:27:30.024 UTC [kvledger] CommitWithPvtData -> DEBU 10d8 [businesschannel] Committing block [3] to storage" +"2019-05-02 09:27:30.024 UTC [ledgerstorage] CommitWithPvtData -> DEBU 10d9 Writing block [3] to pvt block store" +"2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 10da constructing new query executor txid = [b4299b97-7794-4ce4-bab0-f3cdb7de5da3]" +"2019-05-02 09:27:30.024 UTC [lockbasedtxmgr] Done -> DEBU 10db Done with transaction simulation / query execution [b4299b97-7794-4ce4-bab0-f3cdb7de5da3]" +"2019-05-02 09:27:30.027 UTC [pvtdatastorage] Prepare -> DEBU 10dc Saved 1 private data write sets for block [3]" +"2019-05-02 09:27:30.030 UTC [fsblkstorage] indexBlock -> DEBU 10dd Indexing block [blockNum=3, blockHash=[]byte{0x19, 0xcd, 0xcd, 0x5c, 0x29, 0x4b, 0x7c, 0x44, 0xae, 0x5, 0xb7, 0xcb, 0x3a, 0xbf, 0xcb, 0xc3, 0xf2, 0xcc, 0x3c, 0xa9, 0x83, 0x39, 0x7c, 0x8f, 0x82, 0x59, 0xb5, 0x99, 0xa7, 0x3d, 0xe9, 0x5e} txOffsets= +txId=fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 locPointer=offset=70, bytesLength=3705 ]" -"2019-05-02 01:30:57.871 UTC [fsblkstorage] indexBlock -> DEBU 111b Adding txLoc [fileSuffixNum=0, offset=71443, bytesLength=3705] for tx ID: [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a] to txid-index" -"2019-05-02 01:30:57.872 UTC [fsblkstorage] indexBlock -> DEBU 111c Adding txLoc [fileSuffixNum=0, offset=71443, bytesLength=3705] for tx number:[0] ID: [48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a] to blockNumTranNum index" -"2019-05-02 01:30:57.873 UTC [gossip.gossip] handleMessage -> DEBU 111d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4121206921906600141 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.874 UTC [gossip.pull] HandleMessage -> DEBU 111e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4121206921906600141 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.874 UTC [gossip.gossip] handleMessage -> DEBU 111f Exiting" -"2019-05-02 01:30:57.877 UTC [fsblkstorage] updateCheckpoint -> DEBU 1120 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76086], isChainEmpty=[false], lastBlockNumber=[3]" -"2019-05-02 01:30:57.879 UTC [fsblkstorage] waitForBlock -> DEBU 1122 Came out of wait. maxAvailaBlockNumber=[3]" -"2019-05-02 01:30:57.882 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1123 Remaining bytes=[4713], Going to peek [8] bytes" -"2019-05-02 01:30:57.884 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1124 Returning blockbytes - length=[4711], placementInfo={fileNum=[0], startOffset=[71373], bytesOffset=[71375]}" -"2019-05-02 01:30:57.884 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1125 blockbytes [4711] read from file [0]" -"2019-05-02 01:30:57.925 UTC [msp.identity] Sign -> DEBU 1126 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151014 " -"2019-05-02 01:30:57.926 UTC [msp.identity] Sign -> DEBU 1128 Sign: digest: A57DCCB1DD4C9404FAF92AA13CB491FF81A9CAEE28EC0F9DD54950D48168EE3E " -"2019-05-02 01:30:57.926 UTC [msp.identity] Sign -> DEBU 1129 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:57.927 UTC [msp.identity] Sign -> DEBU 112a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:57.927 UTC [gossip.comm] Send -> DEBU 112b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:57.927 UTC [msp] DeserializeIdentity -> DEBU 112c Obtaining identity" -"2019-05-02 01:30:57.927 UTC [gossip.comm] Send -> DEBU 112d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:57.928 UTC [msp] DeserializeIdentity -> DEBU 112e Obtaining identity" -"2019-05-02 01:30:57.930 UTC [gossip.comm] Send -> DEBU 1131 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:57.932 UTC [gossip.comm] sendToEndpoint -> DEBU 1132 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.932 UTC [gossip.comm] sendToEndpoint -> DEBU 1133 Exiting" -"2019-05-02 01:30:57.930 UTC [gossip.comm] sendToEndpoint -> DEBU 112f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.932 UTC [gossip.comm] sendToEndpoint -> DEBU 1134 Exiting" -"2019-05-02 01:30:57.925 UTC [gossip.comm] func1 -> DEBU 1127 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4088673888927671985 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.933 UTC [gossip.gossip] handleMessage -> DEBU 1135 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4088673888927671985 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.933 UTC [gossip.pull] HandleMessage -> DEBU 1136 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4088673888927671985 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.934 UTC [gossip.gossip] handleMessage -> DEBU 1137 Exiting" -"2019-05-02 01:30:57.930 UTC [gossip.comm] sendToEndpoint -> DEBU 1130 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1138 Exiting" -"2019-05-02 01:30:57.947 UTC [gossip.comm] func1 -> DEBU 1139 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4918315814409880932 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.947 UTC [gossip.gossip] handleMessage -> DEBU 113a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4918315814409880932 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.947 UTC [gossip.privdata] handleRequest -> DEBU 113b Got GossipMessage: nonce:10470113954995349282 channel:"businesschannel" tag:CHAN_ONLY privateReq: > , Envelope: 138 bytes, Signature: 0 bytes from 192.168.240.6:44982" -"2019-05-02 01:30:57.947 UTC [gossip.pull] HandleMessage -> DEBU 113c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4918315814409880932 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.947 UTC [gossip.gossip] handleMessage -> DEBU 113d Exiting" -"2019-05-02 01:30:57.879 UTC [pvtdatastorage] Commit -> DEBU 1121 Committing private data for block [3]" -"2019-05-02 01:30:57.948 UTC [gossip.comm] func1 -> DEBU 113e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.948 UTC [gossip.comm] func1 -> DEBU 113f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.948 UTC [gossip.gossip] handleMessage -> DEBU 1140 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.951 UTC [gossip.pull] HandleMessage -> DEBU 1141 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.951 UTC [msp] DeserializeIdentity -> DEBU 1142 Obtaining identity" -"2019-05-02 01:30:57.952 UTC [msp] DeserializeIdentity -> DEBU 1143 Obtaining identity" -"2019-05-02 01:30:57.952 UTC [msp] DeserializeIdentity -> DEBU 1144 Obtaining identity" -"2019-05-02 01:30:57.952 UTC [msp] DeserializeIdentity -> DEBU 1145 Obtaining identity" -"2019-05-02 01:30:57.982 UTC [msp] DeserializeIdentity -> DEBU 1149 Obtaining identity" -"2019-05-02 01:30:57.957 UTC [gossip.comm] func1 -> DEBU 1146 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.980 UTC [pvtdatastorage] Commit -> DEBU 1147 Committed private data for block [3]" -"2019-05-02 01:30:57.988 UTC [kvledger] CommitWithPvtData -> DEBU 114b [businesschannel] Committing block [3] transactions to state database" -"2019-05-02 01:30:57.988 UTC [lockbasedtxmgr] Commit -> DEBU 114c lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-05-02 01:30:57.988 UTC [lockbasedtxmgr] Commit -> DEBU 114d Committing updates to state database" -"2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 114e Building the expiry schedules based on the update batch" -"2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 114f Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" -"2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1150 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" -"2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1151 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" -"2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1152 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" -"2019-05-02 01:30:57.988 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1153 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" -"2019-05-02 01:30:57.989 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1154 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" -"2019-05-02 01:30:57.989 UTC [lockbasedtxmgr] Commit -> DEBU 1155 Write lock acquired for committing updates to state database" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 1156 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 1157 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 1158 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 1159 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/fields/exp02#1/PackageID] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x50, 0x61, 0x63, 0x6b, 0x61, 0x67, 0x65, 0x49, 0x44}]" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115a Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115b Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115c Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115d Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115e Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 115f Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" -"2019-05-02 01:30:57.989 UTC [stateleveldb] ApplyUpdates -> DEBU 1160 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���R���l� DEBU 1161 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" -"2019-05-02 01:30:57.981 UTC [gossip.comm] func1 -> DEBU 1148 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.983 UTC [msp] DeserializeIdentity -> DEBU 114a Obtaining identity" -"2019-05-02 01:30:57.990 UTC [gossip.pull] SendDigest -> DEBU 1162 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:30:57.991 UTC [gossip.gossip] handleMessage -> DEBU 1163 Exiting" -"2019-05-02 01:30:57.991 UTC [gossip.gossip] handleMessage -> DEBU 1164 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.991 UTC [gossip.gossip] handleMessage -> DEBU 1165 Exiting" -"2019-05-02 01:30:57.991 UTC [gossip.gossip] handleMessage -> DEBU 1166 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1167 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.991 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1168 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:30:57.991 UTC [msp] DeserializeIdentity -> DEBU 1169 Obtaining identity" -"2019-05-02 01:30:57.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 116a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:57.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 116b Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:57.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 116c Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:57.991 UTC [policies] Evaluate -> DEBU 116d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:57.991 UTC [policies] Evaluate -> DEBU 116e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:57.991 UTC [policies] Evaluate -> DEBU 116f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:57.992 UTC [cauthdsl] func1 -> DEBU 1170 0xc0035be920 gate 1556760657992059400 evaluation starts" -"2019-05-02 01:30:57.992 UTC [cauthdsl] func2 -> DEBU 1171 0xc0035be920 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:57.992 UTC [cauthdsl] func2 -> DEBU 1172 0xc0035be920 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:57.992 UTC [cauthdsl] func2 -> DEBU 1173 0xc0035be920 principal matched by identity 0" -"2019-05-02 01:30:57.992 UTC [msp.identity] Verify -> DEBU 1174 Verify: digest = 00000000 96 5b fe 9f 00 6a 58 86 01 6d db 15 43 88 86 7a |.[...jX..m..C..z| -00000010 d7 59 06 b2 35 fe cc 66 fd 76 58 94 68 86 d1 af |.Y..5..f.vX.h...|" -"2019-05-02 01:30:57.992 UTC [msp.identity] Verify -> DEBU 1175 Verify: sig = 00000000 30 44 02 20 75 aa b9 44 00 bd bd d1 61 0d ca 69 |0D. u..D....a..i| -00000010 56 d6 0c 1d 0f 21 92 7b 50 c9 5e 8f 48 5e 5c 2d |V....!.{P.^.H^\-| -00000020 f5 13 e8 d0 02 20 2d 5b 63 98 95 30 4d 2a 1a e4 |..... -[c..0M*..| -00000030 80 4d 8b 35 f7 c9 d7 c8 f6 62 a5 62 b4 ba 62 65 |.M.5.....b.b..be| -00000040 23 b7 fa 54 84 f7 |#..T..|" -"2019-05-02 01:30:57.992 UTC [cauthdsl] func2 -> DEBU 1176 0xc0035be920 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:57.993 UTC [cauthdsl] func1 -> DEBU 1177 0xc0035be920 gate 1556760657992059400 evaluation succeeds" -"2019-05-02 01:30:57.993 UTC [policies] Evaluate -> DEBU 1178 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:57.993 UTC [policies] Evaluate -> DEBU 1179 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:57.993 UTC [policies] Evaluate -> DEBU 117a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:57.993 UTC [policies] Evaluate -> DEBU 117b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:57.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 117c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:57.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 117d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:30:57.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 117e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 " -"2019-05-02 01:30:57.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 117f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 " -"2019-05-02 01:30:57.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 1180 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:30:57.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 1181 Exiting" -"2019-05-02 01:30:57.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 1182 Exiting" -"2019-05-02 01:30:57.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1183 Exiting" -"2019-05-02 01:30:57.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1184 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-05-02 01:30:57.993 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1185 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:58.010 UTC [gossip.discovery] sendMemResponse -> DEBU 1186 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:30:58.011 UTC [msp] DeserializeIdentity -> DEBU 1187 Obtaining identity" -"2019-05-02 01:30:58.013 UTC [msp] DeserializeIdentity -> DEBU 1188 Obtaining identity" -"2019-05-02 01:30:58.015 UTC [msp] DeserializeIdentity -> DEBU 1189 Obtaining identity" -"2019-05-02 01:30:58.027 UTC [gossip.comm] Send -> DEBU 118a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:30:58.027 UTC [gossip.discovery] sendMemResponse -> DEBU 118b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:30:58.027 UTC [gossip.comm] sendToEndpoint -> DEBU 118c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:58.027 UTC [gossip.comm] sendToEndpoint -> DEBU 118d Exiting" -"2019-05-02 01:30:58.050 UTC [msp.identity] Verify -> DEBU 118e Verify: digest = 00000000 da 55 14 00 20 42 c4 58 73 9d a9 8e 9f 1d de 82 |.U.. B.Xs.......| -00000010 91 6d cd 5f 01 a6 0b a0 96 34 fb a5 70 bd f6 b2 |.m._.....4..p...|" -"2019-05-02 01:30:58.050 UTC [msp.identity] Verify -> DEBU 118f Verify: sig = 00000000 30 44 02 20 40 1f 8f 17 bb 76 b9 eb 71 88 f6 6c |0D. @....v..q..l| -00000010 a6 33 92 9c d9 02 11 e6 e6 47 1a 88 ea 7d 44 ae |.3.......G...}D.| -00000020 c5 23 56 97 02 20 75 09 64 6c 25 4f 9b 38 36 72 |.#V.. u.dl%O.86r| -00000030 a9 9c 24 da c6 00 dd 65 5e ae 42 fa 79 da 6e cc |..$....e^.B.y.n.| -00000040 ca 11 05 e1 91 22 |....."|" -"2019-05-02 01:30:58.050 UTC [gossip.discovery] handleAliveMessage -> DEBU 1190 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.051 UTC [gossip.discovery] handleAliveMessage -> DEBU 1191 Exiting" -"2019-05-02 01:30:58.051 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1192 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:30:58.051 UTC [msp] DeserializeIdentity -> DEBU 1193 Obtaining identity" -"2019-05-02 01:30:58.051 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1194 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:58.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1195 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:58.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1196 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:58.051 UTC [policies] Evaluate -> DEBU 1197 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:58.052 UTC [policies] Evaluate -> DEBU 1198 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:58.052 UTC [policies] Evaluate -> DEBU 1199 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:58.052 UTC [cauthdsl] func1 -> DEBU 119a 0xc0035abd10 gate 1556760658052126400 evaluation starts" -"2019-05-02 01:30:58.052 UTC [cauthdsl] func2 -> DEBU 119b 0xc0035abd10 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:58.052 UTC [cauthdsl] func2 -> DEBU 119c 0xc0035abd10 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:58.052 UTC [cauthdsl] func2 -> DEBU 119d 0xc0035abd10 principal matched by identity 0" -"2019-05-02 01:30:58.052 UTC [msp.identity] Verify -> DEBU 119e Verify: digest = 00000000 da 3f 62 6d e3 0a 94 fd 68 71 cf e1 e7 4d 6d 88 |.?bm....hq...Mm.| -00000010 36 db 5a 5d 3c e7 80 c0 ab 42 15 b2 73 ad ab f3 |6.Z]<....B..s...|" -"2019-05-02 01:30:58.052 UTC [msp.identity] Verify -> DEBU 119f Verify: sig = 00000000 30 44 02 20 02 72 db 39 13 d1 76 ba a8 87 64 f5 |0D. .r.9..v...d.| -00000010 43 84 b0 dd cb 42 e3 ff bb 05 d4 38 79 87 7f 0c |C....B.....8y...| -00000020 8b 5a 19 35 02 20 10 b3 0f 14 56 82 12 80 72 b4 |.Z.5. ....V...r.| -00000030 f5 89 33 b7 ef 0d e6 fa 3c 3a 4f f4 9d 95 cc 1b |..3.....<:O.....| -00000040 42 a5 8a ff a9 3f |B....?|" -"2019-05-02 01:30:58.053 UTC [cauthdsl] func2 -> DEBU 11a0 0xc0035abd10 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:58.053 UTC [cauthdsl] func1 -> DEBU 11a1 0xc0035abd10 gate 1556760658052126400 evaluation succeeds" -"2019-05-02 01:30:58.053 UTC [policies] Evaluate -> DEBU 11a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:58.053 UTC [policies] Evaluate -> DEBU 11a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:58.053 UTC [policies] Evaluate -> DEBU 11a4 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:58.053 UTC [policies] Evaluate -> DEBU 11a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:58.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 11a6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 11a7 got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1556760633753242000, 23 but got ts: inc_num:1556760633753242000 seq_num:22 " -"2019-05-02 01:30:58.056 UTC [lockbasedtxmgr] Commit -> DEBU 11a8 Updates committed to state database and the write lock is released" -"2019-05-02 01:30:58.057 UTC [gossip.discovery] handleAliveMessage -> DEBU 11a9 Exiting" -"2019-05-02 01:30:58.057 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11aa Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:58.057 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 11ab Preparing potential purge list working-set for expiringAtBlk [4]" -"2019-05-02 01:30:58.058 UTC [msp.identity] Verify -> DEBU 11ac Verify: digest = 00000000 a5 7d cc b1 dd 4c 94 04 fa f9 2a a1 3c b4 91 ff |.}...L....*.<...| -00000010 81 a9 ca ee 28 ec 0f 9d d5 49 50 d4 81 68 ee 3e |....(....IP..h.>|" -"2019-05-02 01:30:58.058 UTC [msp.identity] Verify -> DEBU 11ad Verify: sig = 00000000 30 44 02 20 2e 94 9c 49 6e 50 ff 01 de b0 74 82 |0D. ...InP....t.| -00000010 83 5c b6 a8 c1 84 fd b2 63 bc d3 8c 88 29 ed b1 |.\......c....)..| -00000020 f9 d6 3a 0d 02 20 13 d7 4c 5a 7d 33 19 fe 67 0c |..:.. ..LZ}3..g.| -00000030 17 4c 0e fa 33 4c 43 f4 6e 41 31 89 4f c4 39 85 |.L..3LC.nA1.O.9.| -00000040 cb e5 c0 9b cf 4f |.....O|" -"2019-05-02 01:30:58.059 UTC [gossip.discovery] handleAliveMessage -> DEBU 11ae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.059 UTC [gossip.discovery] isSentByMe -> DEBU 11af Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.059 UTC [gossip.discovery] handleAliveMessage -> DEBU 11b0 Exiting" -"2019-05-02 01:30:58.059 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11b1 Exiting" -"2019-05-02 01:30:58.027 UTC [gossip.gossip] handleMessage -> DEBU 11b2 Exiting" -"2019-05-02 01:30:58.060 UTC [gossip.gossip] handleMessage -> DEBU 11b3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:58.060 UTC [gossip.gossip] handleMessage -> DEBU 11b5 Exiting" -"2019-05-02 01:30:58.063 UTC [gossip.gossip] handleMessage -> DEBU 11b6 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:30:58.063 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:30:58.063 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11b8 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:58.063 UTC [msp] DeserializeIdentity -> DEBU 11b9 Obtaining identity" -"2019-05-02 01:30:58.064 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:58.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11bb Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:58.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11bc Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:58.065 UTC [policies] Evaluate -> DEBU 11bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:58.065 UTC [policies] Evaluate -> DEBU 11be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:58.065 UTC [policies] Evaluate -> DEBU 11bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:58.066 UTC [cauthdsl] func1 -> DEBU 11c0 0xc0035f8ac0 gate 1556760658066004100 evaluation starts" -"2019-05-02 01:30:58.066 UTC [cauthdsl] func2 -> DEBU 11c1 0xc0035f8ac0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:58.066 UTC [cauthdsl] func2 -> DEBU 11c2 0xc0035f8ac0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:58.066 UTC [cauthdsl] func2 -> DEBU 11c3 0xc0035f8ac0 principal matched by identity 0" -"2019-05-02 01:30:58.066 UTC [msp.identity] Verify -> DEBU 11c4 Verify: digest = 00000000 51 d7 73 b6 db 19 35 79 ed 87 bd be be f7 98 cb |Q.s...5y........| -00000010 2c 3b ba 6e e2 d9 a1 90 72 bf 71 60 11 40 69 29 |,;.n....r.q`.@i)|" -"2019-05-02 01:30:58.067 UTC [msp.identity] Verify -> DEBU 11c5 Verify: sig = 00000000 30 44 02 20 09 cf 7b 66 db 8b d0 58 96 f9 ee 90 |0D. ..{f...X....| -00000010 09 16 06 26 84 18 b0 d2 1e 31 84 ed ee 30 28 8c |...&.....1...0(.| -00000020 78 d3 c4 00 02 20 13 30 2e 85 0c 47 95 e5 38 d5 |x.... .0...G..8.| -00000030 d8 94 59 50 fa 97 ef 7c 22 28 d7 5f ee af 87 c4 |..YP...|"(._....| -00000040 43 a7 2c 00 e9 3a |C.,..:|" -"2019-05-02 01:30:58.067 UTC [cauthdsl] func2 -> DEBU 11c6 0xc0035f8ac0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:58.067 UTC [cauthdsl] func1 -> DEBU 11c7 0xc0035f8ac0 gate 1556760658066004100 evaluation succeeds" -"2019-05-02 01:30:58.067 UTC [policies] Evaluate -> DEBU 11c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:58.067 UTC [policies] Evaluate -> DEBU 11c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:58.068 UTC [policies] Evaluate -> DEBU 11ca Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:58.068 UTC [policies] Evaluate -> DEBU 11cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:58.068 UTC [gossip.discovery] handleAliveMessage -> DEBU 11cc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.068 UTC [gossip.discovery] handleAliveMessage -> DEBU 11cd Exiting" -"2019-05-02 01:30:58.069 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11ce Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:58.069 UTC [msp.identity] Verify -> DEBU 11cf Verify: digest = 00000000 a5 7d cc b1 dd 4c 94 04 fa f9 2a a1 3c b4 91 ff |.}...L....*.<...| -00000010 81 a9 ca ee 28 ec 0f 9d d5 49 50 d4 81 68 ee 3e |....(....IP..h.>|" -"2019-05-02 01:30:58.069 UTC [msp.identity] Verify -> DEBU 11d0 Verify: sig = 00000000 30 44 02 20 2e 94 9c 49 6e 50 ff 01 de b0 74 82 |0D. ...InP....t.| -00000010 83 5c b6 a8 c1 84 fd b2 63 bc d3 8c 88 29 ed b1 |.\......c....)..| -00000020 f9 d6 3a 0d 02 20 13 d7 4c 5a 7d 33 19 fe 67 0c |..:.. ..LZ}3..g.| -00000030 17 4c 0e fa 33 4c 43 f4 6e 41 31 89 4f c4 39 85 |.L..3LC.nA1.O.9.| -00000040 cb e5 c0 9b cf 4f |.....O|" -"2019-05-02 01:30:58.070 UTC [gossip.discovery] handleAliveMessage -> DEBU 11d1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.070 UTC [gossip.discovery] isSentByMe -> DEBU 11d2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.071 UTC [gossip.discovery] handleAliveMessage -> DEBU 11d3 Exiting" -"2019-05-02 01:30:58.071 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11d4 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:58.071 UTC [msp.identity] Verify -> DEBU 11d5 Verify: digest = 00000000 da 55 14 00 20 42 c4 58 73 9d a9 8e 9f 1d de 82 |.U.. B.Xs.......| -00000010 91 6d cd 5f 01 a6 0b a0 96 34 fb a5 70 bd f6 b2 |.m._.....4..p...|" -"2019-05-02 01:30:58.071 UTC [msp.identity] Verify -> DEBU 11d6 Verify: sig = 00000000 30 44 02 20 40 1f 8f 17 bb 76 b9 eb 71 88 f6 6c |0D. @....v..q..l| -00000010 a6 33 92 9c d9 02 11 e6 e6 47 1a 88 ea 7d 44 ae |.3.......G...}D.| -00000020 c5 23 56 97 02 20 75 09 64 6c 25 4f 9b 38 36 72 |.#V.. u.dl%O.86r| -00000030 a9 9c 24 da c6 00 dd 65 5e ae 42 fa 79 da 6e cc |..$....e^.B.y.n.| -00000040 ca 11 05 e1 91 22 |....."|" -"2019-05-02 01:30:58.072 UTC [gossip.discovery] handleAliveMessage -> DEBU 11d7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.076 UTC [lockbasedtxmgr] func1 -> DEBU 11d8 launched the background routine for preparing keys to purge with the next block" -"2019-05-02 01:30:58.076 UTC [kvledger] CommitWithPvtData -> DEBU 11d9 [businesschannel] Committing block [3] transactions to history database" -"2019-05-02 01:30:58.076 UTC [historyleveldb] Commit -> DEBU 11da Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" -"2019-05-02 01:30:58.058 UTC [leveldbhelper] GetIterator -> DEBU 11b4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" -"2019-05-02 01:30:58.081 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 11db No expiry entry found for expiringAtBlk [4]" -"2019-05-02 01:30:58.082 UTC [historyleveldb] Commit -> DEBU 11dc Channel [businesschannel]: Updates committed to history database for blockNo [3]" -"2019-05-02 01:30:58.082 UTC [kvledger] CommitWithPvtData -> INFO 11dd [businesschannel] Committed block [3] with 1 transaction(s) in 325ms (state_validation=88ms block_commit=142ms state_commit=87ms)" -"2019-05-02 01:30:58.083 UTC [transientstore] PurgeByTxids -> DEBU 11de Purging private data from transient store for committed txids" -"2019-05-02 01:30:58.083 UTC [leveldbhelper] GetIterator -> DEBU 11df Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x34, 0x38, 0x66, 0x35, 0x62, 0x31, 0x62, 0x37, 0x31, 0x34, 0x62, 0x32, 0x37, 0x39, 0x61, 0x38, 0x63, 0x62, 0x61, 0x32, 0x31, 0x39, 0x65, 0x63, 0x65, 0x32, 0x34, 0x66, 0x34, 0x38, 0x35, 0x36, 0x30, 0x39, 0x34, 0x66, 0x34, 0x32, 0x37, 0x36, 0x35, 0x66, 0x33, 0x64, 0x35, 0x66, 0x36, 0x30, 0x33, 0x32, 0x66, 0x35, 0x37, 0x64, 0x61, 0x65, 0x39, 0x33, 0x31, 0x63, 0x66, 0x33, 0x32, 0x61, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x34, 0x38, 0x66, 0x35, 0x62, 0x31, 0x62, 0x37, 0x31, 0x34, 0x62, 0x32, 0x37, 0x39, 0x61, 0x38, 0x63, 0x62, 0x61, 0x32, 0x31, 0x39, 0x65, 0x63, 0x65, 0x32, 0x34, 0x66, 0x34, 0x38, 0x35, 0x36, 0x30, 0x39, 0x34, 0x66, 0x34, 0x32, 0x37, 0x36, 0x35, 0x66, 0x33, 0x64, 0x35, 0x66, 0x36, 0x30, 0x33, 0x32, 0x66, 0x35, 0x37, 0x64, 0x61, 0x65, 0x39, 0x33, 0x31, 0x63, 0x66, 0x33, 0x32, 0x61, 0xff}]" -"2019-05-02 01:30:58.089 UTC [pvtdatastorage] GetPvtDataByBlockNum -> DEBU 11e0 Get private data for block [3], filter=ledger.PvtNsCollFilter{"_lifecycle":ledger.PvtCollFilter{"_implicit_org_Org1MSP":true}}" -"2019-05-02 01:30:58.089 UTC [pvtdatastorage] GetPvtDataByBlockNum -> DEBU 11e1 Querying private data storage for write sets using startKey=[]byte{0x2, 0x1, 0x3, 0x0}, endKey=[]byte{0x2, 0x1, 0x4, 0x0}" -"2019-05-02 01:30:58.089 UTC [leveldbhelper] GetIterator -> DEBU 11e2 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x4, 0x0}]" -"2019-05-02 01:30:58.089 UTC [confighistory] mostRecentEntryBelow -> DEBU 11e3 mostRecentEntryBelow() - {lscc, _lifecycle~collection, 3}" -"2019-05-02 01:30:58.090 UTC [leveldbhelper] GetIterator -> DEBU 11e4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x73, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x7e, 0x63, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x1}]" -"2019-05-02 01:30:58.090 UTC [confighistory] mostRecentEntryBelow -> DEBU 11e5 Key no entry found. Returning nil" -"2019-05-02 01:30:58.090 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 11e6 constructing new query executor txid = [15aff45a-adbb-42c1-9b75-cba997dac431]" -"2019-05-02 01:30:58.090 UTC [lockbasedtxmgr] Done -> DEBU 11e7 Done with transaction simulation / query execution [15aff45a-adbb-42c1-9b75-cba997dac431]" -"2019-05-02 01:30:58.090 UTC [gossip.privdata] filterNotEligible -> DEBU 11e8 Found 1 for TxID 48f5b1b714b279a8cba219ece24f4856094f42765f3d5f6032f57dae931cf32a , collection _implicit_org_Org1MSP for 192.168.240.6:44982" -"2019-05-02 01:30:58.090 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 11e9 constructing new query executor txid = [839e0780-4145-4295-84c7-bc05bffd5a12]" -"2019-05-02 01:30:58.090 UTC [lockbasedtxmgr] Done -> DEBU 11ea Done with transaction simulation / query execution [839e0780-4145-4295-84c7-bc05bffd5a12]" -"2019-05-02 01:30:58.090 UTC [msp] GetManagerForChain -> DEBU 11eb Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:30:58.090 UTC [cauthdsl] func1 -> DEBU 11ec 0xc0035cdac0 gate 1556760658090779000 evaluation starts" -"2019-05-02 01:30:58.110 UTC [gossip.discovery] handleAliveMessage -> DEBU 11ed Exiting" -"2019-05-02 01:30:58.110 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ee Exiting" -"2019-05-02 01:30:58.110 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:30:58.110 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11f0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:30:58.110 UTC [msp.identity] Verify -> DEBU 11f1 Verify: digest = 00000000 a5 7d cc b1 dd 4c 94 04 fa f9 2a a1 3c b4 91 ff |.}...L....*.<...| -00000010 81 a9 ca ee 28 ec 0f 9d d5 49 50 d4 81 68 ee 3e |....(....IP..h.>|" -"2019-05-02 01:30:58.110 UTC [msp.identity] Verify -> DEBU 11f2 Verify: sig = 00000000 30 44 02 20 2e 94 9c 49 6e 50 ff 01 de b0 74 82 |0D. ...InP....t.| -00000010 83 5c b6 a8 c1 84 fd b2 63 bc d3 8c 88 29 ed b1 |.\......c....)..| -00000020 f9 d6 3a 0d 02 20 13 d7 4c 5a 7d 33 19 fe 67 0c |..:.. ..LZ}3..g.| -00000030 17 4c 0e fa 33 4c 43 f4 6e 41 31 89 4f c4 39 85 |.L..3LC.nA1.O.9.| -00000040 cb e5 c0 9b cf 4f |.....O|" -"2019-05-02 01:30:58.111 UTC [msp.identity] Verify -> DEBU 11f3 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:30:58.111 UTC [msp.identity] Verify -> DEBU 11f4 Verify: sig = 00000000 30 44 02 20 72 c1 e9 cf 87 98 1d 4d 07 b7 b1 3f |0D. r......M...?| -00000010 1d e0 a8 e3 79 01 3e d4 e1 04 42 1f c4 a6 4a d7 |....y.>...B...J.| -00000020 2a 74 28 9a 02 20 0c 22 28 f3 2c 1d 92 b6 6a 05 |*t(.. ."(.,...j.| -00000030 dd 2f 07 47 e1 eb 3f 49 36 87 e9 45 99 69 27 ed |./.G..?I6..E.i'.| -00000040 de 7b 83 e8 3b 3b |.{..;;|" -"2019-05-02 01:30:58.112 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:58.112 UTC [gossip.discovery] isSentByMe -> DEBU 11f6 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:30:58.113 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f7 Exiting" -"2019-05-02 01:30:58.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11f8 Exiting" -"2019-05-02 01:30:58.113 UTC [gossip.gossip] handleMessage -> DEBU 11f9 Exiting" -"2019-05-02 01:30:58.114 UTC [msp.identity] Sign -> DEBU 11fa Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020804 " -"2019-05-02 01:30:58.114 UTC [msp.identity] Sign -> DEBU 11fb Sign: digest: 622038E5EFA2E5F25A129C1CE0ABB820EEEFD00980938F39CD565946377AEA2C " -"2019-05-02 01:30:58.114 UTC [gossip.state] commitBlock -> DEBU 11fc [businesschannel] Committed block [3] with 1 transaction(s)" -"2019-05-02 01:30:58.114 UTC [common.deliver] deliverBlocks -> DEBU 11fd [channel: businesschannel] Delivering block [3] for (0xc002e7d500) for 192.168.240.9:41280" -"2019-05-02 01:30:58.115 UTC [fsblkstorage] waitForBlock -> DEBU 11fe Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" -"2019-05-02 01:30:58.090 UTC [cauthdsl] func2 -> DEBU 11ff 0xc0035cdac0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:58.117 UTC [cauthdsl] func2 -> DEBU 1200 0xc0035cdac0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:58.117 UTC [cauthdsl] func2 -> DEBU 1201 0xc0035cdac0 principal matched by identity 0" -"2019-05-02 01:30:58.117 UTC [msp.identity] Verify -> DEBU 1202 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +"2019-05-02 09:27:30.030 UTC [fsblkstorage] indexBlock -> DEBU 10de Adding txLoc [fileSuffixNum=0, offset=71442, bytesLength=3705] for tx ID: [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] to txid-index" +"2019-05-02 09:27:30.031 UTC [fsblkstorage] indexBlock -> DEBU 10df Adding txLoc [fileSuffixNum=0, offset=71442, bytesLength=3705] for tx number:[0] ID: [fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940] to blockNumTranNum index" +"2019-05-02 09:27:30.034 UTC [fsblkstorage] updateCheckpoint -> DEBU 10e0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76084], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-05-02 09:27:30.034 UTC [pvtdatastorage] Commit -> DEBU 10e1 Committing private data for block [3]" +"2019-05-02 09:27:30.036 UTC [pvtdatastorage] Commit -> DEBU 10e2 Committed private data for block [3]" +"2019-05-02 09:27:30.036 UTC [kvledger] CommitWithPvtData -> DEBU 10e3 [businesschannel] Committing block [3] transactions to state database" +"2019-05-02 09:27:30.036 UTC [lockbasedtxmgr] Commit -> DEBU 10e4 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-05-02 09:27:30.036 UTC [lockbasedtxmgr] Commit -> DEBU 10e5 Committing updates to state database" +"2019-05-02 09:27:30.036 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e6 Building the expiry schedules based on the update batch" +"2019-05-02 09:27:30.036 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e7 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" +"2019-05-02 09:27:30.036 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e8 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" +"2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10e9 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" +"2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10ea Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" +"2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10eb Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" +"2019-05-02 09:27:30.037 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 10ec Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" +"2019-05-02 09:27:30.037 UTC [lockbasedtxmgr] Commit -> DEBU 10ed Write lock acquired for committing updates to state database" +"2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10ee Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" +"2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10ef Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" +"2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f0 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" +"2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f1 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" +"2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f2 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/fields/exp02#1/PackageID] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x50, 0x61, 0x63, 0x6b, 0x61, 0x67, 0x65, 0x49, 0x44}]" +"2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f3 Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" +"2019-05-02 09:27:30.038 UTC [stateleveldb] ApplyUpdates -> DEBU 10f4 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���R���l� DEBU 10f5 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" +"2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f6 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" +"2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f7 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" +"2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f8 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" +"2019-05-02 09:27:30.039 UTC [stateleveldb] ApplyUpdates -> DEBU 10f9 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" +"2019-05-02 09:27:30.042 UTC [fsblkstorage] waitForBlock -> DEBU 10fa Came out of wait. maxAvailaBlockNumber=[3]" +"2019-05-02 09:27:30.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10fb Remaining bytes=[4712], Going to peek [8] bytes" +"2019-05-02 09:27:30.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10fc Returning blockbytes - length=[4710], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}" +"2019-05-02 09:27:30.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10fd blockbytes [4710] read from file [0]" +"2019-05-02 09:27:30.043 UTC [lockbasedtxmgr] Commit -> DEBU 10fe Updates committed to state database and the write lock is released" +"2019-05-02 09:27:30.043 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 10ff Preparing potential purge list working-set for expiringAtBlk [4]" +"2019-05-02 09:27:30.043 UTC [leveldbhelper] GetIterator -> DEBU 1100 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" +"2019-05-02 09:27:30.043 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1101 No expiry entry found for expiringAtBlk [4]" +"2019-05-02 09:27:30.044 UTC [lockbasedtxmgr] func1 -> DEBU 1102 launched the background routine for preparing keys to purge with the next block" +"2019-05-02 09:27:30.044 UTC [kvledger] CommitWithPvtData -> DEBU 1103 [businesschannel] Committing block [3] transactions to history database" +"2019-05-02 09:27:30.044 UTC [historyleveldb] Commit -> DEBU 1104 Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" +"2019-05-02 09:27:30.046 UTC [historyleveldb] Commit -> DEBU 1105 Channel [businesschannel]: Updates committed to history database for blockNo [3]" +"2019-05-02 09:27:30.046 UTC [kvledger] CommitWithPvtData -> INFO 1106 [businesschannel] Committed block [3] with 1 transaction(s) in 25ms (state_validation=3ms block_commit=11ms state_commit=7ms)" +"2019-05-02 09:27:30.046 UTC [transientstore] PurgeByTxids -> DEBU 1107 Purging private data from transient store for committed txids" +"2019-05-02 09:27:30.046 UTC [leveldbhelper] GetIterator -> DEBU 1108 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x66, 0x64, 0x33, 0x30, 0x33, 0x33, 0x34, 0x61, 0x38, 0x32, 0x31, 0x62, 0x39, 0x36, 0x62, 0x32, 0x39, 0x38, 0x38, 0x38, 0x36, 0x66, 0x35, 0x30, 0x36, 0x31, 0x38, 0x66, 0x65, 0x35, 0x35, 0x37, 0x30, 0x30, 0x36, 0x65, 0x31, 0x62, 0x64, 0x62, 0x36, 0x66, 0x33, 0x32, 0x61, 0x65, 0x31, 0x35, 0x37, 0x35, 0x34, 0x32, 0x61, 0x31, 0x66, 0x63, 0x32, 0x65, 0x30, 0x34, 0x31, 0x39, 0x34, 0x30, 0xff}]" +"2019-05-02 09:27:30.047 UTC [common.deliver] deliverBlocks -> DEBU 1109 [channel: businesschannel] Delivering block [3] for (0xc002548140) for 172.18.0.8:57288" +"2019-05-02 09:27:30.048 UTC [fsblkstorage] waitForBlock -> DEBU 110a Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +"2019-05-02 09:27:30.049 UTC [msp.identity] Sign -> DEBU 110b Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020804 " +"2019-05-02 09:27:30.051 UTC [msp.identity] Sign -> DEBU 110c Sign: digest: 555DD175376C5C862F5FCE28E73AB6235A6633F5F8516C9D10D185C54EC327CF " +"2019-05-02 09:27:30.055 UTC [grpc] infof -> DEBU 110d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:30.055 UTC [common.deliver] deliverBlocks -> DEBU 110e Context canceled, aborting wait for next block" +"2019-05-02 09:27:30.061 UTC [common.deliverevents] func1 -> DEBU 1110 Closing Deliver stream" +"2019-05-02 09:27:30.061 UTC [comm.grpc.server] 1 -> INFO 1111 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T09:27:58.984Z grpc.peer_address=172.18.0.8:57288 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=1.0762516s +"2019-05-02 09:27:30.056 UTC [grpc] infof -> DEBU 110f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:30.063 UTC [fsblkstorage] waitForBlock -> DEBU 1112 Came out of wait. maxAvailaBlockNumber=[3]" +"2019-05-02 09:27:30.064 UTC [gossip.state] commitBlock -> DEBU 1113 [businesschannel] Committed block [3] with 1 transaction(s)" +"2019-05-02 09:27:30.087 UTC [gossip.privdata] handleRequest -> DEBU 1114 Got GossipMessage: nonce:15262395124521686410 channel:"businesschannel" tag:CHAN_ONLY privateReq: > , Envelope: 138 bytes, Signature: 0 bytes from 172.18.0.6:53224" +"2019-05-02 09:27:30.088 UTC [pvtdatastorage] GetPvtDataByBlockNum -> DEBU 1115 Get private data for block [3], filter=ledger.PvtNsCollFilter{"_lifecycle":ledger.PvtCollFilter{"_implicit_org_Org1MSP":true}}" +"2019-05-02 09:27:30.089 UTC [pvtdatastorage] GetPvtDataByBlockNum -> DEBU 1116 Querying private data storage for write sets using startKey=[]byte{0x2, 0x1, 0x3, 0x0}, endKey=[]byte{0x2, 0x1, 0x4, 0x0}" +"2019-05-02 09:27:30.089 UTC [leveldbhelper] GetIterator -> DEBU 1117 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x4, 0x0}]" +"2019-05-02 09:27:30.089 UTC [confighistory] mostRecentEntryBelow -> DEBU 1118 mostRecentEntryBelow() - {lscc, _lifecycle~collection, 3}" +"2019-05-02 09:27:30.089 UTC [leveldbhelper] GetIterator -> DEBU 1119 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x73, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x7e, 0x63, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x1}]" +"2019-05-02 09:27:30.089 UTC [confighistory] mostRecentEntryBelow -> DEBU 111a Key no entry found. Returning nil" +"2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 111b constructing new query executor txid = [25e191a2-dd7b-4485-b7d0-66e54c985427]" +"2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] Done -> DEBU 111c Done with transaction simulation / query execution [25e191a2-dd7b-4485-b7d0-66e54c985427]" +"2019-05-02 09:27:30.090 UTC [gossip.privdata] filterNotEligible -> DEBU 111d Found 1 for TxID fd30334a821b96b298886f50618fe557006e1bdb6f32ae157542a1fc2e041940 , collection _implicit_org_Org1MSP for 172.18.0.6:53224" +"2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 111e constructing new query executor txid = [17b6749c-5c34-4adf-afe1-15daa1971483]" +"2019-05-02 09:27:30.090 UTC [lockbasedtxmgr] Done -> DEBU 111f Done with transaction simulation / query execution [17b6749c-5c34-4adf-afe1-15daa1971483]" +"2019-05-02 09:27:30.090 UTC [msp] GetManagerForChain -> DEBU 1120 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:30.091 UTC [cauthdsl] func1 -> DEBU 1121 0xc002d97230 gate 1556789250091035300 evaluation starts" +"2019-05-02 09:27:30.092 UTC [cauthdsl] func2 -> DEBU 1122 0xc002d97230 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:30.092 UTC [cauthdsl] func2 -> DEBU 1123 0xc002d97230 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:30.092 UTC [cauthdsl] func2 -> DEBU 1124 0xc002d97230 principal matched by identity 0" +"2019-05-02 09:27:30.092 UTC [msp.identity] Verify -> DEBU 1125 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-05-02 01:30:58.117 UTC [msp.identity] Verify -> DEBU 1203 Verify: sig = 00000000 30 45 02 21 00 93 9f bb c3 94 0d 2b 22 14 ff 02 |0E.!.......+"...| -00000010 27 d7 fd f0 f4 9a 7b 5c df 9c b7 0d f9 c0 20 68 |'.....{\...... h| -00000020 4c 0d 92 89 e4 02 20 76 1c 02 e7 6e 97 e1 b6 37 |L..... v...n...7| -00000030 54 75 51 f0 52 1d 6c 29 fa 0c 1b 22 99 aa 9b 6b |TuQ.R.l)..."...k| -00000040 6b 18 4d cd 74 78 11 |k.M.tx.|" -"2019-05-02 01:30:58.117 UTC [cauthdsl] func2 -> DEBU 1204 0xc0035cdac0 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:58.117 UTC [cauthdsl] func1 -> DEBU 1205 0xc0035cdac0 gate 1556760658090779000 evaluation succeeds" -"2019-05-02 01:30:58.117 UTC [gossip.privdata] func1 -> DEBU 1206 Returning 192.168.240.6:44982 1 elements" -"2019-05-02 01:30:58.149 UTC [common.deliver] deliverBlocks -> DEBU 1207 Context canceled, aborting wait for next block" -"2019-05-02 01:30:58.149 UTC [common.deliverevents] func1 -> DEBU 1208 Closing Deliver stream" -"2019-05-02 01:30:58.149 UTC [comm.grpc.server] 1 -> INFO 1209 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T01:31:25.586Z grpc.peer_address=192.168.240.9:41280 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.5627539s -"2019-05-02 01:30:58.149 UTC [grpc] infof -> DEBU 120a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:58.149 UTC [fsblkstorage] waitForBlock -> DEBU 120b Came out of wait. maxAvailaBlockNumber=[3]" -"2019-05-02 01:30:58.150 UTC [grpc] infof -> DEBU 120c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:30:58.433 UTC [gossip.gossip] handleMessage -> DEBU 120d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:58.433 UTC [gossip.gossip] handleMessage -> DEBU 120e Exiting" -"2019-05-02 01:30:58.433 UTC [gossip.discovery] handleMsgFromComm -> DEBU 120f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:58.433 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1210 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:30:58.434 UTC [msp.identity] Verify -> DEBU 1211 Verify: digest = 00000000 93 7d 5a 3c 90 f1 43 b7 07 36 40 e3 97 32 d6 f0 |.}Z<..C..6@..2..| -00000010 ed cf e2 04 7d 36 15 ff 66 cb 3b 1e 18 ec 27 6a |....}6..f.;...'j|" -"2019-05-02 01:30:58.434 UTC [msp.identity] Verify -> DEBU 1212 Verify: sig = 00000000 30 45 02 21 00 a9 e0 a2 d4 bc e1 1d c3 41 c3 d1 |0E.!.........A..| -00000010 92 8e 3c a4 3b 56 c7 6c 79 8b 66 96 bb 3d 49 e3 |..<.;V.ly.f..=I.| -00000020 00 8f 35 71 93 02 20 38 2e 82 15 5a 0c 87 cf 3f |..5q.. 8...Z...?| -00000030 d4 54 25 0e cd bb 5c 27 11 a0 cb 07 7b 50 f8 3c |.T%...\'....{P.<| -00000040 97 7c 77 7d 9c f6 c7 |.|w}...|" -"2019-05-02 01:30:58.434 UTC [msp.identity] Verify -> DEBU 1213 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:30:58.434 UTC [msp.identity] Verify -> DEBU 1214 Verify: sig = 00000000 30 45 02 21 00 9a d1 53 a2 5d 53 15 93 7f 0e 7e |0E.!...S.]S....~| -00000010 6c 1f 1e 83 60 fe 10 9b 34 d9 cf da c2 5e b1 c0 |l...`...4....^..| -00000020 1f a2 e3 35 c5 02 20 3f a2 2f 97 cd 30 95 87 fd |...5.. ?./..0...| -00000030 58 11 56 c3 b9 42 86 51 0c eb 7c c2 9d 58 71 4c |X.V..B.Q..|..XqL| -00000040 76 50 e3 c1 37 34 a5 |vP..74.|" -"2019-05-02 01:30:58.434 UTC [gossip.discovery] handleAliveMessage -> DEBU 1215 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:58.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 1216 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:30:58.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 1217 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 " -"2019-05-02 01:30:58.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 1218 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 " -"2019-05-02 01:30:58.435 UTC [gossip.discovery] learnExistingMembers -> DEBU 1219 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-05-02 01:30:58.435 UTC [gossip.discovery] learnExistingMembers -> DEBU 121a Exiting" -"2019-05-02 01:30:58.435 UTC [gossip.discovery] handleAliveMessage -> DEBU 121b Exiting" -"2019-05-02 01:30:58.435 UTC [gossip.discovery] handleMsgFromComm -> DEBU 121c Exiting" -"2019-05-02 01:30:58.435 UTC [msp] DeserializeIdentity -> DEBU 121d Obtaining identity" -"2019-05-02 01:30:58.435 UTC [msp] DeserializeIdentity -> DEBU 121e Obtaining identity" -"2019-05-02 01:30:58.435 UTC [msp] DeserializeIdentity -> DEBU 121f Obtaining identity" -"2019-05-02 01:30:58.439 UTC [gossip.comm] Send -> DEBU 1220 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:58.439 UTC [msp] DeserializeIdentity -> DEBU 1221 Obtaining identity" -"2019-05-02 01:30:58.439 UTC [gossip.comm] Send -> DEBU 1222 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:58.439 UTC [gossip.comm] sendToEndpoint -> DEBU 1223 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:58.439 UTC [gossip.comm] sendToEndpoint -> DEBU 1224 Exiting" -"2019-05-02 01:30:58.442 UTC [gossip.comm] sendToEndpoint -> DEBU 1225 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:58.473 UTC [gossip.comm] func1 -> DEBU 1226 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:58.473 UTC [gossip.gossip] handleMessage -> DEBU 1227 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:58.483 UTC [gossip.comm] sendToEndpoint -> DEBU 1228 Exiting" -"2019-05-02 01:30:58.485 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1229 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:58.486 UTC [gossip.discovery] handleMsgFromComm -> DEBU 122a Exiting" -"2019-05-02 01:30:58.473 UTC [gossip.gossip] handleMessage -> DEBU 122b Exiting" -"2019-05-02 01:30:58.487 UTC [gossip.comm] func1 -> DEBU 122c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:58.487 UTC [gossip.gossip] handleMessage -> DEBU 122d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:58.487 UTC [gossip.gossip] handleMessage -> DEBU 122e Exiting" -"2019-05-02 01:30:58.487 UTC [gossip.discovery] handleMsgFromComm -> DEBU 122f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:30:58.487 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1230 Exiting" -"2019-05-02 01:30:58.512 UTC [gossip.comm] func1 -> DEBU 1231 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.512 UTC [gossip.gossip] handleMessage -> DEBU 1232 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.512 UTC [gossip.gossip] handleMessage -> DEBU 1233 Exiting" -"2019-05-02 01:30:58.512 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1234 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.512 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1235 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:30:58.512 UTC [msp] DeserializeIdentity -> DEBU 1236 Obtaining identity" -"2019-05-02 01:30:58.513 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1237 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:58.513 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1238 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:58.513 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1239 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:58.513 UTC [policies] Evaluate -> DEBU 123a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:58.513 UTC [policies] Evaluate -> DEBU 123b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:58.513 UTC [policies] Evaluate -> DEBU 123c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:58.514 UTC [cauthdsl] func1 -> DEBU 123d 0xc003670800 gate 1556760658514029100 evaluation starts" -"2019-05-02 01:30:58.514 UTC [cauthdsl] func2 -> DEBU 123e 0xc003670800 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:58.514 UTC [cauthdsl] func2 -> DEBU 123f 0xc003670800 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:58.514 UTC [cauthdsl] func2 -> DEBU 1240 0xc003670800 principal matched by identity 0" -"2019-05-02 01:30:58.514 UTC [msp.identity] Verify -> DEBU 1241 Verify: digest = 00000000 75 83 ce 99 6f 38 5e d3 47 de 28 5a b4 ba 4d 0e |u...o8^.G.(Z..M.| -00000010 87 b0 0f db 4b 9e 88 1a 92 92 e3 c2 8d 01 bf 6c |....K..........l|" -"2019-05-02 01:30:58.514 UTC [msp.identity] Verify -> DEBU 1242 Verify: sig = 00000000 30 44 02 20 73 3b 44 84 70 18 d8 df 40 bd 9e 0e |0D. s;D.p...@...| -00000010 9d c3 15 e2 1a a7 35 2a 3d aa 69 47 24 8c 90 77 |......5*=.iG$..w| -00000020 cc 65 cc e8 02 20 1a e0 d5 9f 7c 30 e5 ee 35 5d |.e... ....|0..5]| -00000030 6c c1 77 12 a5 a9 23 d9 88 a2 28 39 43 22 00 81 |l.w...#...(9C"..| -00000040 f2 e3 f4 d5 5c 89 |....\.|" -"2019-05-02 01:30:58.514 UTC [cauthdsl] func2 -> DEBU 1243 0xc003670800 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:58.514 UTC [cauthdsl] func1 -> DEBU 1244 0xc003670800 gate 1556760658514029100 evaluation succeeds" -"2019-05-02 01:30:58.514 UTC [policies] Evaluate -> DEBU 1245 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:58.514 UTC [policies] Evaluate -> DEBU 1246 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:58.514 UTC [policies] Evaluate -> DEBU 1247 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:58.514 UTC [policies] Evaluate -> DEBU 1248 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:58.515 UTC [gossip.discovery] handleAliveMessage -> DEBU 1249 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 124a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:30:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 124b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 " -"2019-05-02 01:30:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 124c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 " -"2019-05-02 01:30:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 124d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:30:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 124e Exiting" -"2019-05-02 01:30:58.515 UTC [gossip.discovery] handleAliveMessage -> DEBU 124f Exiting" -"2019-05-02 01:30:58.515 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1250 Exiting" -"2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1251 Obtaining identity" -"2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1252 Obtaining identity" -"2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1253 Obtaining identity" -"2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1254 Obtaining identity" -"2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1255 Obtaining identity" -"2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1256 Obtaining identity" -"2019-05-02 01:30:58.522 UTC [msp] DeserializeIdentity -> DEBU 1257 Obtaining identity" -"2019-05-02 01:30:58.523 UTC [gossip.comm] Send -> DEBU 1258 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:58.523 UTC [msp] DeserializeIdentity -> DEBU 1259 Obtaining identity" -"2019-05-02 01:30:58.523 UTC [gossip.comm] Send -> DEBU 125a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:58.523 UTC [gossip.comm] sendToEndpoint -> DEBU 125b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.523 UTC [gossip.comm] sendToEndpoint -> DEBU 125c Exiting" -"2019-05-02 01:30:58.523 UTC [gossip.comm] sendToEndpoint -> DEBU 125d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.523 UTC [gossip.comm] sendToEndpoint -> DEBU 125e Exiting" -"2019-05-02 01:30:58.531 UTC [gossip.gossip] handleMessage -> DEBU 125f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.531 UTC [gossip.gossip] handleMessage -> DEBU 1260 Exiting" -"2019-05-02 01:30:58.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1261 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1262 Exiting" -"2019-05-02 01:30:58.534 UTC [gossip.comm] func1 -> DEBU 1263 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.534 UTC [gossip.gossip] handleMessage -> DEBU 1264 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.534 UTC [gossip.gossip] handleMessage -> DEBU 1265 Exiting" -"2019-05-02 01:30:58.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1266 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1267 Exiting" -"2019-05-02 01:30:58.582 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 1268 Sleeping 25s" -"2019-05-02 01:30:58.715 UTC [msp.identity] Sign -> DEBU 1269 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151015 " -"2019-05-02 01:30:58.715 UTC [msp.identity] Sign -> DEBU 126a Sign: digest: FBB40AE9052DB3078C05BDCD3237D00ED50861CC80B119F920BC17C3415FB165 " -"2019-05-02 01:30:58.716 UTC [msp.identity] Sign -> DEBU 126b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:30:58.716 UTC [msp.identity] Sign -> DEBU 126c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:30:58.716 UTC [gossip.discovery] periodicalSendAlive -> DEBU 126d Sleeping 5s" -"2019-05-02 01:30:58.716 UTC [msp] DeserializeIdentity -> DEBU 126e Obtaining identity" -"2019-05-02 01:30:58.716 UTC [msp] DeserializeIdentity -> DEBU 126f Obtaining identity" -"2019-05-02 01:30:58.717 UTC [gossip.comm] Send -> DEBU 1270 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -"2019-05-02 01:30:58.717 UTC [msp] DeserializeIdentity -> DEBU 1271 Obtaining identity" -"2019-05-02 01:30:58.717 UTC [gossip.comm] Send -> DEBU 1272 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:58.718 UTC [msp] DeserializeIdentity -> DEBU 1273 Obtaining identity" -"2019-05-02 01:30:58.718 UTC [gossip.comm] Send -> DEBU 1274 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:58.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1275 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1276 Exiting" -"2019-05-02 01:30:58.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1277 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:30:58.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1278 Exiting" -"2019-05-02 01:30:58.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1279 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.719 UTC [gossip.comm] sendToEndpoint -> DEBU 127a Exiting" -"2019-05-02 01:30:58.843 UTC [gossip.comm] func1 -> DEBU 127b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.844 UTC [gossip.gossip] handleMessage -> DEBU 127c Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.844 UTC [gossip.gossip] handleMessage -> DEBU 127d Exiting" -"2019-05-02 01:30:58.845 UTC [gossip.discovery] handleMsgFromComm -> DEBU 127e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 127f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:30:58.846 UTC [msp] DeserializeIdentity -> DEBU 1280 Obtaining identity" -"2019-05-02 01:30:58.847 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1281 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:30:58.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1282 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:58.848 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1283 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:30:58.849 UTC [policies] Evaluate -> DEBU 1284 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:30:58.849 UTC [policies] Evaluate -> DEBU 1285 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:30:58.850 UTC [policies] Evaluate -> DEBU 1286 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:30:58.851 UTC [cauthdsl] func1 -> DEBU 1287 0xc0036b0e60 gate 1556760658851152300 evaluation starts" -"2019-05-02 01:30:58.851 UTC [cauthdsl] func2 -> DEBU 1288 0xc0036b0e60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:30:58.855 UTC [cauthdsl] func2 -> DEBU 1289 0xc0036b0e60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:30:58.855 UTC [cauthdsl] func2 -> DEBU 128a 0xc0036b0e60 principal matched by identity 0" -"2019-05-02 01:30:58.855 UTC [msp.identity] Verify -> DEBU 128b Verify: digest = 00000000 e4 69 48 ff 45 bd 93 f0 f6 bb 83 48 31 d5 b5 17 |.iH.E......H1...| -00000010 c6 7d 70 8d 1a c4 69 53 38 11 e7 94 93 26 1b ff |.}p...iS8....&..|" -"2019-05-02 01:30:58.855 UTC [msp.identity] Verify -> DEBU 128c Verify: sig = 00000000 30 44 02 20 06 16 12 62 24 cd b4 de d7 74 ad e3 |0D. ...b$....t..| -00000010 ed f7 35 82 09 d9 0d 8e 39 41 62 5c c6 24 29 0b |..5.....9Ab\.$).| -00000020 65 da 79 1c 02 20 0e b2 e6 1d de 81 7f cc 85 2e |e.y.. ..........| -00000030 62 c7 f7 18 f9 51 1f 6d 0f 31 76 ab 66 c7 a7 19 |b....Q.m.1v.f...| -00000040 6f d5 0a 36 6e 82 |o..6n.|" -"2019-05-02 01:30:58.856 UTC [cauthdsl] func2 -> DEBU 128d 0xc0036b0e60 principal evaluation succeeds for identity 0" -"2019-05-02 01:30:58.856 UTC [cauthdsl] func1 -> DEBU 128e 0xc0036b0e60 gate 1556760658851152300 evaluation succeeds" -"2019-05-02 01:30:58.856 UTC [policies] Evaluate -> DEBU 128f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:58.856 UTC [policies] Evaluate -> DEBU 1290 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:30:58.856 UTC [policies] Evaluate -> DEBU 1291 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:30:58.856 UTC [policies] Evaluate -> DEBU 1292 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:30:58.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 1293 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.856 UTC [gossip.discovery] learnExistingMembers -> DEBU 1294 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:30:58.856 UTC [gossip.discovery] learnExistingMembers -> DEBU 1295 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 " -"2019-05-02 01:30:58.856 UTC [gossip.discovery] learnExistingMembers -> DEBU 1296 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 " -"2019-05-02 01:30:58.856 UTC [gossip.discovery] learnExistingMembers -> DEBU 1297 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:30:58.856 UTC [gossip.discovery] learnExistingMembers -> DEBU 1298 Exiting" -"2019-05-02 01:30:58.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 1299 Exiting" -"2019-05-02 01:30:58.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 129a Exiting" -"2019-05-02 01:30:58.858 UTC [gossip.gossip] handleMessage -> DEBU 129b Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.858 UTC [gossip.gossip] handleMessage -> DEBU 129c Exiting" -"2019-05-02 01:30:58.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 129d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 129e Exiting" -"2019-05-02 01:30:58.863 UTC [gossip.comm] func1 -> DEBU 129f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.863 UTC [gossip.gossip] handleMessage -> DEBU 12a0 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.863 UTC [gossip.gossip] handleMessage -> DEBU 12a1 Exiting" -"2019-05-02 01:30:58.863 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12a3 Exiting" -"2019-05-02 01:30:58.867 UTC [msp] DeserializeIdentity -> DEBU 12a4 Obtaining identity" -"2019-05-02 01:30:58.867 UTC [msp] DeserializeIdentity -> DEBU 12a5 Obtaining identity" -"2019-05-02 01:30:58.867 UTC [msp] DeserializeIdentity -> DEBU 12a6 Obtaining identity" -"2019-05-02 01:30:58.867 UTC [msp] DeserializeIdentity -> DEBU 12a7 Obtaining identity" -"2019-05-02 01:30:58.869 UTC [msp] DeserializeIdentity -> DEBU 12a8 Obtaining identity" -"2019-05-02 01:30:58.871 UTC [msp] DeserializeIdentity -> DEBU 12a9 Obtaining identity" -"2019-05-02 01:30:58.872 UTC [msp] DeserializeIdentity -> DEBU 12aa Obtaining identity" -"2019-05-02 01:30:58.877 UTC [gossip.comm] Send -> DEBU 12ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:58.878 UTC [gossip.comm] sendToEndpoint -> DEBU 12ac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.878 UTC [gossip.comm] sendToEndpoint -> DEBU 12ad Exiting" -"2019-05-02 01:30:58.877 UTC [msp] DeserializeIdentity -> DEBU 12ae Obtaining identity" -"2019-05-02 01:30:58.880 UTC [gossip.comm] Send -> DEBU 12af Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:30:58.880 UTC [gossip.comm] sendToEndpoint -> DEBU 12b0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:30:58.881 UTC [gossip.comm] sendToEndpoint -> DEBU 12b1 Exiting" -"2019-05-02 01:31:00.827 UTC [msp] DeserializeIdentity -> DEBU 12b2 Obtaining identity" -"2019-05-02 01:31:00.827 UTC [msp] DeserializeIdentity -> DEBU 12b3 Obtaining identity" -"2019-05-02 01:31:00.827 UTC [gossip.comm] Send -> DEBU 12b4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:00.828 UTC [gossip.comm] sendToEndpoint -> DEBU 12b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.828 UTC [gossip.comm] sendToEndpoint -> DEBU 12b6 Exiting" -"2019-05-02 01:31:00.828 UTC [gossip.comm] sendToEndpoint -> DEBU 12b7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.828 UTC [gossip.comm] sendToEndpoint -> DEBU 12b8 Exiting" -"2019-05-02 01:31:00.828 UTC [gossip.comm] sendToEndpoint -> DEBU 12b9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.829 UTC [gossip.comm] sendToEndpoint -> DEBU 12ba Exiting" -"2019-05-02 01:31:00.830 UTC [gossip.comm] func1 -> DEBU 12bb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.831 UTC [gossip.gossip] handleMessage -> DEBU 12bc Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.831 UTC [msp] DeserializeIdentity -> DEBU 12bd Obtaining identity" -"2019-05-02 01:31:00.832 UTC [gossip.comm] func1 -> DEBU 12be Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.833 UTC [msp.identity] Verify -> DEBU 12bf Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -"2019-05-02 01:31:00.833 UTC [msp.identity] Verify -> DEBU 12c0 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -00000040 63 c4 de 4c 07 05 |c..L..|" -"2019-05-02 01:31:00.835 UTC [msp] DeserializeIdentity -> DEBU 12c1 Obtaining identity" -"2019-05-02 01:31:00.836 UTC [msp] DeserializeIdentity -> DEBU 12c2 Obtaining identity" -"2019-05-02 01:31:00.837 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:00.837 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.837 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.837 UTC [policies] Evaluate -> DEBU 12c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:00.837 UTC [policies] Evaluate -> DEBU 12c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:00.838 UTC [policies] Evaluate -> DEBU 12c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:00.838 UTC [cauthdsl] func1 -> DEBU 12c9 0xc0036e5660 gate 1556760660838440200 evaluation starts" -"2019-05-02 01:31:00.838 UTC [cauthdsl] func2 -> DEBU 12ca 0xc0036e5660 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:00.839 UTC [cauthdsl] func2 -> DEBU 12cb 0xc0036e5660 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:00.839 UTC [cauthdsl] func2 -> DEBU 12cc 0xc0036e5660 principal matched by identity 0" -"2019-05-02 01:31:00.840 UTC [msp.identity] Verify -> DEBU 12cd Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:31:00.840 UTC [msp.identity] Verify -> DEBU 12ce Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU 12cf 0xc0036e5660 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:00.841 UTC [cauthdsl] func1 -> DEBU 12d0 0xc0036e5660 gate 1556760660838440200 evaluation succeeds" -"2019-05-02 01:31:00.841 UTC [policies] Evaluate -> DEBU 12d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.841 UTC [policies] Evaluate -> DEBU 12d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.841 UTC [policies] Evaluate -> DEBU 12d3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:00.842 UTC [policies] Evaluate -> DEBU 12d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:00.843 UTC [msp.identity] Verify -> DEBU 12d5 Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:31:00.843 UTC [msp.identity] Verify -> DEBU 12d6 Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:31:00.843 UTC [msp] DeserializeIdentity -> DEBU 12d7 Obtaining identity" -"2019-05-02 01:31:00.844 UTC [msp] DeserializeIdentity -> DEBU 12d8 Obtaining identity" -"2019-05-02 01:31:00.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12d9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:00.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12da Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12db Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.844 UTC [policies] Evaluate -> DEBU 12dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:00.845 UTC [policies] Evaluate -> DEBU 12dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:00.845 UTC [policies] Evaluate -> DEBU 12de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:00.845 UTC [cauthdsl] func1 -> DEBU 12df 0xc0036fd550 gate 1556760660845788100 evaluation starts" -"2019-05-02 01:31:00.846 UTC [msp] DeserializeIdentity -> DEBU 12e0 Obtaining identity" -"2019-05-02 01:31:00.846 UTC [msp] DeserializeIdentity -> DEBU 12e1 Obtaining identity" -"2019-05-02 01:31:00.847 UTC [gossip.comm] Send -> DEBU 12e2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760658114316700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" -"2019-05-02 01:31:00.847 UTC [msp] DeserializeIdentity -> DEBU 12e3 Obtaining identity" -"2019-05-02 01:31:00.848 UTC [msp] DeserializeIdentity -> DEBU 12e4 Obtaining identity" -"2019-05-02 01:31:00.848 UTC [gossip.comm] sendToEndpoint -> DEBU 12e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760658114316700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:00.848 UTC [gossip.comm] sendToEndpoint -> DEBU 12e6 Exiting" -"2019-05-02 01:31:00.849 UTC [gossip.comm] sendToEndpoint -> DEBU 12e7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760658114316700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:00.849 UTC [gossip.comm] sendToEndpoint -> DEBU 12e8 Exiting" -"2019-05-02 01:31:00.850 UTC [gossip.comm] sendToEndpoint -> DEBU 12e9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760658114316700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:00.850 UTC [gossip.comm] sendToEndpoint -> DEBU 12ea Exiting" -"2019-05-02 01:31:00.845 UTC [cauthdsl] func2 -> DEBU 12eb 0xc0036fd550 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:00.854 UTC [cauthdsl] func2 -> DEBU 12ec 0xc0036fd550 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:00.855 UTC [cauthdsl] func2 -> DEBU 12ed 0xc0036fd550 principal matched by identity 0" -"2019-05-02 01:31:00.855 UTC [msp.identity] Verify -> DEBU 12ee Verify: digest = 00000000 9d e9 47 45 58 55 ba 08 a7 c1 57 d6 e2 0b 98 a9 |..GEXU....W.....| -00000010 70 2e 25 cd 61 06 ef 5c 24 6d 52 07 20 12 c0 72 |p.%.a..\$mR. ..r|" -"2019-05-02 01:31:00.855 UTC [msp.identity] Verify -> DEBU 12ef Verify: sig = 00000000 30 44 02 20 21 fa 63 73 4d 87 7b 3d 61 8c bb 6c |0D. !.csM.{=a..l| -00000010 4a f2 88 4d 2f d6 9f e4 01 31 93 ed c5 62 ee 74 |J..M/....1...b.t| -00000020 e2 e6 3f f9 02 20 7a 8b de 81 f5 fc 73 7c b1 01 |..?.. z.....s|..| -00000030 27 44 48 aa a2 df 3a e3 d8 45 54 3d 5e a5 25 33 |'DH...:..ET=^.%3| -00000040 a7 5c 29 e1 73 d4 |.\).s.|" -"2019-05-02 01:31:00.860 UTC [cauthdsl] func2 -> DEBU 12f0 0xc0036fd550 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:00.860 UTC [cauthdsl] func1 -> DEBU 12f1 0xc0036fd550 gate 1556760660845788100 evaluation succeeds" -"2019-05-02 01:31:00.861 UTC [policies] Evaluate -> DEBU 12f2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.861 UTC [policies] Evaluate -> DEBU 12f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.861 UTC [policies] Evaluate -> DEBU 12f4 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:00.861 UTC [policies] Evaluate -> DEBU 12f5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:00.862 UTC [msp] DeserializeIdentity -> DEBU 12f6 Obtaining identity" -"2019-05-02 01:31:00.863 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12f7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.863 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12f8 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.863 UTC [policies] Evaluate -> DEBU 12f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:00.863 UTC [policies] Evaluate -> DEBU 12fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:00.864 UTC [policies] Evaluate -> DEBU 12fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:00.864 UTC [cauthdsl] func1 -> DEBU 12fc 0xc003726630 gate 1556760660864125500 evaluation starts" -"2019-05-02 01:31:00.864 UTC [cauthdsl] func2 -> DEBU 12fd 0xc003726630 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:00.864 UTC [cauthdsl] func2 -> DEBU 12fe 0xc003726630 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:00.865 UTC [cauthdsl] func2 -> DEBU 12ff 0xc003726630 principal matched by identity 0" -"2019-05-02 01:31:00.865 UTC [msp.identity] Verify -> DEBU 1300 Verify: digest = 00000000 9d e9 47 45 58 55 ba 08 a7 c1 57 d6 e2 0b 98 a9 |..GEXU....W.....| -00000010 70 2e 25 cd 61 06 ef 5c 24 6d 52 07 20 12 c0 72 |p.%.a..\$mR. ..r|" -"2019-05-02 01:31:00.865 UTC [msp.identity] Verify -> DEBU 1301 Verify: sig = 00000000 30 44 02 20 21 fa 63 73 4d 87 7b 3d 61 8c bb 6c |0D. !.csM.{=a..l| -00000010 4a f2 88 4d 2f d6 9f e4 01 31 93 ed c5 62 ee 74 |J..M/....1...b.t| -00000020 e2 e6 3f f9 02 20 7a 8b de 81 f5 fc 73 7c b1 01 |..?.. z.....s|..| -00000030 27 44 48 aa a2 df 3a e3 d8 45 54 3d 5e a5 25 33 |'DH...:..ET=^.%3| -00000040 a7 5c 29 e1 73 d4 |.\).s.|" -"2019-05-02 01:31:00.866 UTC [cauthdsl] func2 -> DEBU 1302 0xc003726630 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:00.866 UTC [cauthdsl] func1 -> DEBU 1303 0xc003726630 gate 1556760660864125500 evaluation succeeds" -"2019-05-02 01:31:00.866 UTC [policies] Evaluate -> DEBU 1304 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.869 UTC [policies] Evaluate -> DEBU 1305 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.870 UTC [policies] Evaluate -> DEBU 1306 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:00.870 UTC [policies] Evaluate -> DEBU 1307 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:00.870 UTC [gossip.gossip] handleMessage -> DEBU 1308 Exiting" -"2019-05-02 01:31:00.871 UTC [gossip.gossip] handleMessage -> DEBU 1309 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.871 UTC [msp] DeserializeIdentity -> DEBU 130a Obtaining identity" -"2019-05-02 01:31:00.872 UTC [msp.identity] Verify -> DEBU 130b Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -"2019-05-02 01:31:00.872 UTC [msp.identity] Verify -> DEBU 130c Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -00000040 63 c4 de 4c 07 05 |c..L..|" -"2019-05-02 01:31:00.873 UTC [msp.identity] Verify -> DEBU 130d Verify: digest = 00000000 71 48 eb cc b6 c6 10 f8 1a f3 de d4 8f 5e ef 5b |qH...........^.[| -00000010 95 8e 64 c8 05 54 82 65 96 9e 47 7e f7 e0 9b 14 |..d..T.e..G~....|" -"2019-05-02 01:31:00.873 UTC [msp.identity] Verify -> DEBU 130e Verify: sig = 00000000 30 44 02 20 69 00 75 88 56 f3 2a a1 e3 cc 21 49 |0D. i.u.V.*...!I| -00000010 31 9d 22 89 fc 24 d8 cc b6 74 55 10 26 cf 96 4d |1."..$...tU.&..M| -00000020 86 bb c1 13 02 20 53 cc 32 8c 1b b4 3a 57 5f 03 |..... S.2...:W_.| -00000030 4b c9 d2 34 6e 40 f5 45 79 7b 90 b2 bc 96 85 12 |K..4n@.Ey{......| -00000040 ca 2c e1 44 69 07 |.,.Di.|" -"2019-05-02 01:31:00.874 UTC [msp] DeserializeIdentity -> DEBU 130f Obtaining identity" -"2019-05-02 01:31:00.875 UTC [msp] DeserializeIdentity -> DEBU 1310 Obtaining identity" -"2019-05-02 01:31:00.875 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1311 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:00.875 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1312 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.875 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1313 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.876 UTC [policies] Evaluate -> DEBU 1314 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:00.876 UTC [policies] Evaluate -> DEBU 1315 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:00.876 UTC [policies] Evaluate -> DEBU 1316 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:00.877 UTC [cauthdsl] func1 -> DEBU 1317 0xc00373cf80 gate 1556760660877228100 evaluation starts" -"2019-05-02 01:31:00.877 UTC [cauthdsl] func2 -> DEBU 1318 0xc00373cf80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:00.877 UTC [cauthdsl] func2 -> DEBU 1319 0xc00373cf80 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:00.884 UTC [cauthdsl] func2 -> DEBU 131a 0xc00373cf80 principal matched by identity 0" -"2019-05-02 01:31:00.884 UTC [msp.identity] Verify -> DEBU 131b Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -"2019-05-02 01:31:00.884 UTC [msp.identity] Verify -> DEBU 131c Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -"2019-05-02 01:31:00.888 UTC [cauthdsl] func2 -> DEBU 131d 0xc00373cf80 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:00.889 UTC [cauthdsl] func1 -> DEBU 131e 0xc00373cf80 gate 1556760660877228100 evaluation succeeds" -"2019-05-02 01:31:00.889 UTC [policies] Evaluate -> DEBU 131f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.890 UTC [policies] Evaluate -> DEBU 1320 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.890 UTC [policies] Evaluate -> DEBU 1321 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:00.890 UTC [policies] Evaluate -> DEBU 1322 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:00.891 UTC [msp] DeserializeIdentity -> DEBU 1323 Obtaining identity" -"2019-05-02 01:31:00.891 UTC [msp] DeserializeIdentity -> DEBU 1324 Obtaining identity" -"2019-05-02 01:31:00.893 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1325 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:00.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1326 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1327 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.894 UTC [policies] Evaluate -> DEBU 1328 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:00.894 UTC [policies] Evaluate -> DEBU 1329 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:00.894 UTC [policies] Evaluate -> DEBU 132a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:00.894 UTC [cauthdsl] func1 -> DEBU 132b 0xc003756750 gate 1556760660894571000 evaluation starts" -"2019-05-02 01:31:00.894 UTC [cauthdsl] func2 -> DEBU 132c 0xc003756750 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:00.894 UTC [cauthdsl] func2 -> DEBU 132d 0xc003756750 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:00.897 UTC [cauthdsl] func2 -> DEBU 132e 0xc003756750 principal matched by identity 0" -"2019-05-02 01:31:00.899 UTC [msp] DeserializeIdentity -> DEBU 1330 Obtaining identity" -"2019-05-02 01:31:00.899 UTC [msp] DeserializeIdentity -> DEBU 1331 Obtaining identity" -"2019-05-02 01:31:00.900 UTC [gossip.pull] Hello -> DEBU 1332 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:00.901 UTC [msp] DeserializeIdentity -> DEBU 1333 Obtaining identity" -"2019-05-02 01:31:00.902 UTC [msp] DeserializeIdentity -> DEBU 1334 Obtaining identity" -"2019-05-02 01:31:00.903 UTC [gossip.comm] Send -> DEBU 1335 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:00.904 UTC [gossip.comm] sendToEndpoint -> DEBU 1336 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.904 UTC [gossip.comm] sendToEndpoint -> DEBU 1337 Exiting" -"2019-05-02 01:31:00.897 UTC [msp.identity] Verify -> DEBU 132f Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -"2019-05-02 01:31:00.908 UTC [msp.identity] Verify -> DEBU 1338 Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -00000040 58 07 a6 98 8c c7 |X.....|" -"2019-05-02 01:31:00.910 UTC [cauthdsl] func2 -> DEBU 1339 0xc003756750 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:00.910 UTC [cauthdsl] func1 -> DEBU 133a 0xc003756750 gate 1556760660894571000 evaluation succeeds" -"2019-05-02 01:31:00.910 UTC [policies] Evaluate -> DEBU 133b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.910 UTC [policies] Evaluate -> DEBU 133c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.911 UTC [policies] Evaluate -> DEBU 133d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:00.911 UTC [policies] Evaluate -> DEBU 133e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:00.912 UTC [msp] DeserializeIdentity -> DEBU 133f Obtaining identity" -"2019-05-02 01:31:00.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1340 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1341 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.913 UTC [policies] Evaluate -> DEBU 1342 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:00.913 UTC [policies] Evaluate -> DEBU 1343 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:00.913 UTC [policies] Evaluate -> DEBU 1344 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:00.915 UTC [cauthdsl] func1 -> DEBU 1345 0xc003757830 gate 1556760660915032700 evaluation starts" -"2019-05-02 01:31:00.915 UTC [cauthdsl] func2 -> DEBU 1346 0xc003757830 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:00.915 UTC [cauthdsl] func2 -> DEBU 1347 0xc003757830 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:00.916 UTC [cauthdsl] func2 -> DEBU 1348 0xc003757830 principal matched by identity 0" -"2019-05-02 01:31:00.916 UTC [msp.identity] Verify -> DEBU 1349 Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -"2019-05-02 01:31:00.917 UTC [msp.identity] Verify -> DEBU 134a Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -00000040 58 07 a6 98 8c c7 |X.....|" -"2019-05-02 01:31:00.918 UTC [cauthdsl] func2 -> DEBU 134b 0xc003757830 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:00.918 UTC [cauthdsl] func1 -> DEBU 134c 0xc003757830 gate 1556760660915032700 evaluation succeeds" -"2019-05-02 01:31:00.918 UTC [policies] Evaluate -> DEBU 134d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.919 UTC [policies] Evaluate -> DEBU 134e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.920 UTC [policies] Evaluate -> DEBU 134f Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:00.920 UTC [policies] Evaluate -> DEBU 1350 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:00.920 UTC [gossip.gossip] handleMessage -> DEBU 1351 Exiting" -"2019-05-02 01:31:00.921 UTC [gossip.gossip] handleMessage -> DEBU 1352 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.922 UTC [msp.identity] Verify -> DEBU 1353 Verify: digest = 00000000 1c ee 98 79 0d 2d 6a d1 83 85 c2 f6 7e da 91 4e |...y.-j.....~..N| -00000010 c2 4c 20 ff 0d b3 97 10 10 6b fe e6 8f 86 84 8e |.L ......k......|" -"2019-05-02 01:31:00.922 UTC [msp.identity] Verify -> DEBU 1354 Verify: sig = 00000000 30 44 02 20 7d 72 00 15 82 05 65 63 c0 40 29 17 |0D. }r....ec.@).| -00000010 8e 06 b9 1e ea db 8e 9a 90 13 45 6c 21 05 d1 dd |..........El!...| -00000020 9e 44 a1 20 02 20 43 ae 83 3b 27 15 e1 c5 d8 22 |.D. . C..;'...."| -00000030 67 7d 9a ed 22 83 53 f4 56 f1 5e be fc 80 68 cb |g}..".S.V.^...h.| -00000040 63 c4 de 4c 07 05 |c..L..|" -"2019-05-02 01:31:00.923 UTC [msp] DeserializeIdentity -> DEBU 1355 Obtaining identity" -"2019-05-02 01:31:00.923 UTC [msp] DeserializeIdentity -> DEBU 1356 Obtaining identity" -"2019-05-02 01:31:00.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1357 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:00.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1358 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1359 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.925 UTC [policies] Evaluate -> DEBU 135a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:00.928 UTC [policies] Evaluate -> DEBU 135b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:00.928 UTC [policies] Evaluate -> DEBU 135c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:00.928 UTC [cauthdsl] func1 -> DEBU 135d 0xc00376d960 gate 1556760660928827100 evaluation starts" -"2019-05-02 01:31:00.928 UTC [cauthdsl] func2 -> DEBU 135e 0xc00376d960 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:00.929 UTC [cauthdsl] func2 -> DEBU 135f 0xc00376d960 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:00.931 UTC [cauthdsl] func2 -> DEBU 1360 0xc00376d960 principal matched by identity 0" -"2019-05-02 01:31:00.931 UTC [msp.identity] Verify -> DEBU 1361 Verify: digest = 00000000 d4 2c 49 3b 44 d9 09 75 28 02 ef 14 23 7a 6f 5e |.,I;D..u(...#zo^| -00000010 08 0d c4 d8 3c 60 b6 58 eb 06 92 0a 33 5a 4f 24 |....<`.X....3ZO$|" -"2019-05-02 01:31:00.931 UTC [msp.identity] Verify -> DEBU 1362 Verify: sig = 00000000 30 44 02 20 31 00 79 18 e2 c5 3c 3f 92 f0 26 e1 |0D. 1.y... DEBU 1363 0xc00376d960 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:00.932 UTC [cauthdsl] func1 -> DEBU 1364 0xc00376d960 gate 1556760660928827100 evaluation succeeds" -"2019-05-02 01:31:00.932 UTC [policies] Evaluate -> DEBU 1365 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.932 UTC [policies] Evaluate -> DEBU 1366 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.932 UTC [policies] Evaluate -> DEBU 1367 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:00.932 UTC [policies] Evaluate -> DEBU 1368 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:00.933 UTC [msp] DeserializeIdentity -> DEBU 1369 Obtaining identity" -"2019-05-02 01:31:00.933 UTC [msp] DeserializeIdentity -> DEBU 136a Obtaining identity" -"2019-05-02 01:31:00.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 136b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:00.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 136c Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 136d Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.934 UTC [policies] Evaluate -> DEBU 136e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:00.934 UTC [policies] Evaluate -> DEBU 136f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:00.934 UTC [policies] Evaluate -> DEBU 1370 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:00.934 UTC [cauthdsl] func1 -> DEBU 1371 0xc003783130 gate 1556760660934665400 evaluation starts" -"2019-05-02 01:31:00.934 UTC [cauthdsl] func2 -> DEBU 1372 0xc003783130 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:00.934 UTC [cauthdsl] func2 -> DEBU 1373 0xc003783130 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:00.935 UTC [cauthdsl] func2 -> DEBU 1374 0xc003783130 principal matched by identity 0" -"2019-05-02 01:31:00.935 UTC [msp.identity] Verify -> DEBU 1375 Verify: digest = 00000000 a1 cf 0c 51 0d 25 fb 05 e4 74 f3 0e f0 da 25 53 |...Q.%...t....%S| -00000010 f7 12 fc 75 24 e4 6a 96 02 74 87 d1 43 73 9b ab |...u$.j..t..Cs..|" -"2019-05-02 01:31:00.935 UTC [msp.identity] Verify -> DEBU 1376 Verify: sig = 00000000 30 45 02 21 00 c9 ac d5 8f 94 ad f3 9b 75 b3 4d |0E.!.........u.M| -00000010 42 ca 74 c8 33 4e b2 e9 27 d9 ca 5e 97 b8 ac ff |B.t.3N..'..^....| -00000020 65 61 35 4e 1e 02 20 30 00 9e c2 8e b9 31 02 c6 |ea5N.. 0.....1..| -00000030 71 90 45 00 08 6d 43 a6 31 00 45 8e 2b bc c1 4c |q.E..mC.1.E.+..L| -00000040 81 3e 34 4e 99 e9 49 |.>4N..I|" -"2019-05-02 01:31:00.935 UTC [cauthdsl] func2 -> DEBU 1377 0xc003783130 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:00.935 UTC [cauthdsl] func1 -> DEBU 1378 0xc003783130 gate 1556760660934665400 evaluation succeeds" -"2019-05-02 01:31:00.936 UTC [policies] Evaluate -> DEBU 1379 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.936 UTC [policies] Evaluate -> DEBU 137a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.936 UTC [policies] Evaluate -> DEBU 137b Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:00.936 UTC [policies] Evaluate -> DEBU 137c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:00.937 UTC [msp.identity] Verify -> DEBU 137d Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -"2019-05-02 01:31:00.937 UTC [msp.identity] Verify -> DEBU 137e Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -"2019-05-02 01:31:00.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1380 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:00.938 UTC [policies] Evaluate -> DEBU 1381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:00.938 UTC [policies] Evaluate -> DEBU 1382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:00.938 UTC [policies] Evaluate -> DEBU 1383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:00.939 UTC [cauthdsl] func1 -> DEBU 1384 0xc00379c830 gate 1556760660939036600 evaluation starts" -"2019-05-02 01:31:00.939 UTC [cauthdsl] func2 -> DEBU 1385 0xc00379c830 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:00.939 UTC [cauthdsl] func2 -> DEBU 1386 0xc00379c830 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:00.939 UTC [cauthdsl] func2 -> DEBU 1387 0xc00379c830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:00.939 UTC [cauthdsl] func2 -> DEBU 1388 0xc00379c830 principal evaluation fails" -"2019-05-02 01:31:00.940 UTC [cauthdsl] func1 -> DEBU 1389 0xc00379c830 gate 1556760660939036600 evaluation fails" -"2019-05-02 01:31:00.940 UTC [policies] Evaluate -> DEBU 138a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.940 UTC [policies] Evaluate -> DEBU 138b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:00.940 UTC [policies] Evaluate -> DEBU 138c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:00.941 UTC [cauthdsl] func1 -> DEBU 138d 0xc00379d070 gate 1556760660940822600 evaluation starts" -"2019-05-02 01:31:00.941 UTC [cauthdsl] func2 -> DEBU 138e 0xc00379d070 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:00.941 UTC [cauthdsl] func2 -> DEBU 138f 0xc00379d070 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:00.941 UTC [cauthdsl] func2 -> DEBU 1390 0xc00379d070 principal matched by identity 0" -"2019-05-02 01:31:00.941 UTC [msp.identity] Verify -> DEBU 1391 Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -"2019-05-02 01:31:00.942 UTC [msp.identity] Verify -> DEBU 1392 Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -"2019-05-02 01:31:00.942 UTC [cauthdsl] func2 -> DEBU 1393 0xc00379d070 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:00.942 UTC [cauthdsl] func1 -> DEBU 1394 0xc00379d070 gate 1556760660940822600 evaluation succeeds" -"2019-05-02 01:31:00.942 UTC [policies] Evaluate -> DEBU 1395 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:00.942 UTC [policies] Evaluate -> DEBU 1396 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:00.943 UTC [policies] Evaluate -> DEBU 1397 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:00.943 UTC [policies] Evaluate -> DEBU 1398 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:00.943 UTC [gossip.gossip] handleMessage -> DEBU 1399 Exiting" -"2019-05-02 01:31:00.943 UTC [gossip.gossip] handleMessage -> DEBU 139a Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13024588905277607341 , Msg_type: BLOCK_MSG, digests: [3 1 2], Envelope: 43 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.943 UTC [gossip.pull] HandleMessage -> DEBU 139b GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13024588905277607341 , Msg_type: BLOCK_MSG, digests: [3 1 2], Envelope: 43 bytes, Signature: 0 bytes" -"2019-05-02 01:31:00.943 UTC [gossip.gossip] handleMessage -> DEBU 139c Exiting" -"2019-05-02 01:31:01.092 UTC [gossip.gossip] handleMessage -> DEBU 139d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.092 UTC [msp] DeserializeIdentity -> DEBU 139e Obtaining identity" -"2019-05-02 01:31:01.093 UTC [msp] DeserializeIdentity -> DEBU 139f Obtaining identity" -"2019-05-02 01:31:01.093 UTC [gossip.gossip] handleMessage -> DEBU 13a0 Exiting" -"2019-05-02 01:31:01.093 UTC [gossip.gossip] handleMessage -> DEBU 13a1 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760658246133000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.094 UTC [msp.identity] Verify -> DEBU 13a2 Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -"2019-05-02 01:31:01.094 UTC [msp.identity] Verify -> DEBU 13a3 Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -"2019-05-02 01:31:01.095 UTC [gossip.gossip] handleMessage -> DEBU 13a4 Exiting" -"2019-05-02 01:31:01.102 UTC [gossip.gossip] handleMessage -> DEBU 13a5 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.102 UTC [gossip.pull] HandleMessage -> DEBU 13a6 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.103 UTC [gossip.pull] SendDigest -> DEBU 13a7 Sending BLOCK_MSG digest: [3 1 2] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:01.103 UTC [gossip.gossip] handleMessage -> DEBU 13a8 Exiting" -"2019-05-02 01:31:01.105 UTC [gossip.comm] func1 -> DEBU 13a9 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760658246133000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.106 UTC [gossip.gossip] handleMessage -> DEBU 13aa Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760658246133000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.106 UTC [msp.identity] Verify -> DEBU 13ab Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -"2019-05-02 01:31:01.107 UTC [msp.identity] Verify -> DEBU 13ac Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -"2019-05-02 01:31:01.109 UTC [msp] DeserializeIdentity -> DEBU 13ad Obtaining identity" -"2019-05-02 01:31:01.109 UTC [gossip.gossip] handleMessage -> DEBU 13ae Exiting" -"2019-05-02 01:31:01.113 UTC [gossip.comm] func1 -> DEBU 13af Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760658246133000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.118 UTC [gossip.gossip] handleMessage -> DEBU 13b0 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760658246133000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.120 UTC [msp.identity] Verify -> DEBU 13b1 Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -"2019-05-02 01:31:01.120 UTC [msp.identity] Verify -> DEBU 13b2 Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -"2019-05-02 01:31:01.122 UTC [msp] DeserializeIdentity -> DEBU 13b3 Obtaining identity" -"2019-05-02 01:31:01.123 UTC [gossip.gossip] handleMessage -> DEBU 13b4 Exiting" -"2019-05-02 01:31:01.317 UTC [gossip.comm] func1 -> DEBU 13b5 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.317 UTC [gossip.gossip] handleMessage -> DEBU 13b6 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.317 UTC [msp] DeserializeIdentity -> DEBU 13b7 Obtaining identity" -"2019-05-02 01:31:01.318 UTC [msp] DeserializeIdentity -> DEBU 13b8 Obtaining identity" -"2019-05-02 01:31:01.318 UTC [msp] DeserializeIdentity -> DEBU 13b9 Obtaining identity" -"2019-05-02 01:31:01.318 UTC [gossip.gossip] handleMessage -> DEBU 13ba Exiting" -"2019-05-02 01:31:01.326 UTC [gossip.comm] func1 -> DEBU 13bb Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760657982069600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:01.326 UTC [gossip.gossip] handleMessage -> DEBU 13bc Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760657982069600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:01.327 UTC [msp] DeserializeIdentity -> DEBU 13bd Obtaining identity" -"2019-05-02 01:31:01.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:01.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13bf Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13c0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.328 UTC [policies] Evaluate -> DEBU 13c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:01.328 UTC [policies] Evaluate -> DEBU 13c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:01.328 UTC [policies] Evaluate -> DEBU 13c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:01.328 UTC [cauthdsl] func1 -> DEBU 13c4 0xc0037cfa00 gate 1556760661328948100 evaluation starts" -"2019-05-02 01:31:01.329 UTC [cauthdsl] func2 -> DEBU 13c5 0xc0037cfa00 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:01.329 UTC [cauthdsl] func2 -> DEBU 13c6 0xc0037cfa00 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:01.329 UTC [cauthdsl] func2 -> DEBU 13c7 0xc0037cfa00 principal matched by identity 0" -"2019-05-02 01:31:01.329 UTC [msp.identity] Verify -> DEBU 13c8 Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -"2019-05-02 01:31:01.329 UTC [msp.identity] Verify -> DEBU 13c9 Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -00000040 58 07 a6 98 8c c7 |X.....|" -"2019-05-02 01:31:01.329 UTC [cauthdsl] func2 -> DEBU 13ca 0xc0037cfa00 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:01.330 UTC [cauthdsl] func1 -> DEBU 13cb 0xc0037cfa00 gate 1556760661328948100 evaluation succeeds" -"2019-05-02 01:31:01.330 UTC [policies] Evaluate -> DEBU 13cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.330 UTC [policies] Evaluate -> DEBU 13cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.330 UTC [policies] Evaluate -> DEBU 13ce Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:01.330 UTC [policies] Evaluate -> DEBU 13cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:01.331 UTC [gossip.comm] func1 -> DEBU 13d0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760657982069600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:01.332 UTC [msp] DeserializeIdentity -> DEBU 13d1 Obtaining identity" -"2019-05-02 01:31:01.332 UTC [gossip.gossip] handleMessage -> DEBU 13d2 Exiting" -"2019-05-02 01:31:01.333 UTC [gossip.gossip] handleMessage -> DEBU 13d3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760657982069600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:01.333 UTC [msp] DeserializeIdentity -> DEBU 13d4 Obtaining identity" -"2019-05-02 01:31:01.334 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:01.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d6 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d7 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.335 UTC [policies] Evaluate -> DEBU 13d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:01.335 UTC [policies] Evaluate -> DEBU 13d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:01.335 UTC [policies] Evaluate -> DEBU 13da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:01.338 UTC [cauthdsl] func1 -> DEBU 13db 0xc0037f3410 gate 1556760661337985700 evaluation starts" -"2019-05-02 01:31:01.338 UTC [cauthdsl] func2 -> DEBU 13dc 0xc0037f3410 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:01.338 UTC [cauthdsl] func2 -> DEBU 13dd 0xc0037f3410 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:01.338 UTC [cauthdsl] func2 -> DEBU 13de 0xc0037f3410 principal matched by identity 0" -"2019-05-02 01:31:01.338 UTC [msp.identity] Verify -> DEBU 13df Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -"2019-05-02 01:31:01.339 UTC [msp.identity] Verify -> DEBU 13e0 Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -00000040 58 07 a6 98 8c c7 |X.....|" -"2019-05-02 01:31:01.340 UTC [cauthdsl] func2 -> DEBU 13e1 0xc0037f3410 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:01.340 UTC [cauthdsl] func1 -> DEBU 13e2 0xc0037f3410 gate 1556760661337985700 evaluation succeeds" -"2019-05-02 01:31:01.340 UTC [policies] Evaluate -> DEBU 13e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.340 UTC [policies] Evaluate -> DEBU 13e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.340 UTC [policies] Evaluate -> DEBU 13e5 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:01.340 UTC [policies] Evaluate -> DEBU 13e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:01.341 UTC [msp] DeserializeIdentity -> DEBU 13e7 Obtaining identity" -"2019-05-02 01:31:01.342 UTC [gossip.gossip] handleMessage -> DEBU 13e8 Exiting" -"2019-05-02 01:31:01.428 UTC [gossip.gossip] handleMessage -> DEBU 13e9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.428 UTC [gossip.pull] HandleMessage -> DEBU 13ea GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.430 UTC [gossip.pull] SendDigest -> DEBU 13eb Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:01.430 UTC [gossip.gossip] handleMessage -> DEBU 13ec Exiting" -"2019-05-02 01:31:01.435 UTC [gossip.gossip] handleMessage -> DEBU 13ed Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.435 UTC [gossip.gossip] handleMessage -> DEBU 13ee Exiting" -"2019-05-02 01:31:01.435 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13ef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.435 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13f0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:01.436 UTC [msp.identity] Verify -> DEBU 13f1 Verify: digest = 00000000 60 c3 5c ba c3 da 37 33 42 1a 58 5d fa 58 58 87 |`.\...73B.X].XX.| -00000010 41 70 57 93 6e 37 1f f7 c5 e8 b7 de 3e 20 5c 7a |ApW.n7......> \z|" -"2019-05-02 01:31:01.436 UTC [msp.identity] Verify -> DEBU 13f2 Verify: sig = 00000000 30 45 02 21 00 eb d4 b7 27 51 e9 4e 65 ce 99 ab |0E.!....'Q.Ne...| -00000010 ba ec 46 fb 8d cf 8c 6e a0 1d a4 c3 c2 5b 44 b6 |..F....n.....[D.| -00000020 6e 7d 9a 29 b4 02 20 19 51 69 59 18 1d a9 ab f4 |n}.).. .QiY.....| -00000030 6c 67 96 57 7e 89 e8 15 42 62 aa 33 08 a4 46 3b |lg.W~...Bb.3..F;| -00000040 3c 8f b7 46 61 f1 96 |<..Fa..|" -"2019-05-02 01:31:01.438 UTC [msp.identity] Verify -> DEBU 13f3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:01.438 UTC [msp.identity] Verify -> DEBU 13f4 Verify: sig = 00000000 30 45 02 21 00 e9 79 54 05 c7 b5 c3 48 df 28 4a |0E.!..yT....H.(J| -00000010 3f 2b 0b ca 07 bf 5f 12 ea 9e 32 f7 03 fe af 7c |?+...._...2....|| -00000020 81 67 c2 1d 42 02 20 0c 7b af 41 fd cc 83 3f 44 |.g..B. .{.A...?D| -00000030 60 86 a2 00 00 6b 85 ba 05 cd 13 05 46 06 8c d6 |`....k......F...| -00000040 4f 80 c5 49 fd b7 c2 |O..I...|" -"2019-05-02 01:31:01.439 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:01.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:01.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f7 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 " -"2019-05-02 01:31:01.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 " -"2019-05-02 01:31:01.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:01.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 13fa Exiting" -"2019-05-02 01:31:01.440 UTC [gossip.discovery] handleAliveMessage -> DEBU 13fb Exiting" -"2019-05-02 01:31:01.441 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13fc Exiting" -"2019-05-02 01:31:01.441 UTC [gossip.discovery] sendMemResponse -> DEBU 13fd Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:01.442 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity" -"2019-05-02 01:31:01.442 UTC [msp] DeserializeIdentity -> DEBU 13ff Obtaining identity" -"2019-05-02 01:31:01.443 UTC [gossip.comm] Send -> DEBU 1400 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:01.443 UTC [gossip.discovery] sendMemResponse -> DEBU 1401 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:01.443 UTC [gossip.comm] sendToEndpoint -> DEBU 1402 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.443 UTC [gossip.comm] sendToEndpoint -> DEBU 1403 Exiting" -"2019-05-02 01:31:01.510 UTC [gossip.comm] func1 -> DEBU 1404 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.510 UTC [gossip.gossip] handleMessage -> DEBU 1405 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.510 UTC [gossip.pull] HandleMessage -> DEBU 1406 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.511 UTC [msp] DeserializeIdentity -> DEBU 1407 Obtaining identity" -"2019-05-02 01:31:01.511 UTC [msp] DeserializeIdentity -> DEBU 1408 Obtaining identity" -"2019-05-02 01:31:01.511 UTC [msp] DeserializeIdentity -> DEBU 1409 Obtaining identity" -"2019-05-02 01:31:01.512 UTC [msp] DeserializeIdentity -> DEBU 140a Obtaining identity" -"2019-05-02 01:31:01.512 UTC [msp] DeserializeIdentity -> DEBU 140b Obtaining identity" -"2019-05-02 01:31:01.512 UTC [msp] DeserializeIdentity -> DEBU 140c Obtaining identity" -"2019-05-02 01:31:01.512 UTC [gossip.pull] SendDigest -> DEBU 140d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:01.512 UTC [gossip.gossip] handleMessage -> DEBU 140e Exiting" -"2019-05-02 01:31:01.517 UTC [gossip.comm] func1 -> DEBU 140f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.517 UTC [gossip.gossip] handleMessage -> DEBU 1410 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.517 UTC [gossip.gossip] handleMessage -> DEBU 1411 Exiting" -"2019-05-02 01:31:01.517 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1412 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.518 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1413 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:01.518 UTC [msp] DeserializeIdentity -> DEBU 1414 Obtaining identity" -"2019-05-02 01:31:01.519 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1415 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:01.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1416 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1417 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.519 UTC [policies] Evaluate -> DEBU 1418 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:01.520 UTC [policies] Evaluate -> DEBU 1419 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:01.520 UTC [policies] Evaluate -> DEBU 141a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:01.522 UTC [cauthdsl] func1 -> DEBU 141b 0xc00383f490 gate 1556760661521037000 evaluation starts" -"2019-05-02 01:31:01.522 UTC [cauthdsl] func2 -> DEBU 141c 0xc00383f490 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:01.522 UTC [cauthdsl] func2 -> DEBU 141d 0xc00383f490 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:01.523 UTC [cauthdsl] func2 -> DEBU 141e 0xc00383f490 principal matched by identity 0" -"2019-05-02 01:31:01.523 UTC [msp.identity] Verify -> DEBU 141f Verify: digest = 00000000 1c 18 a8 eb ae 1c e1 1f f1 ff a2 67 7a d4 cf 47 |...........gz..G| -00000010 6e cd c0 10 f6 06 57 d2 72 ee 73 11 96 88 58 d8 |n.....W.r.s...X.|" -"2019-05-02 01:31:01.524 UTC [msp.identity] Verify -> DEBU 1420 Verify: sig = 00000000 30 45 02 21 00 d3 58 da 0c c6 a3 fe af e2 0b 34 |0E.!..X........4| -00000010 4d fd c7 5b 6d 41 65 c9 06 24 17 49 76 cc c9 13 |M..[mAe..$.Iv...| -00000020 b3 0d 7a ab 68 02 20 48 73 5c c5 92 3a 1b 60 ea |..z.h. Hs\..:.`.| -00000030 94 36 48 8d 92 fc db 7a 82 73 20 1d 71 d1 73 59 |.6H....z.s .q.sY| -00000040 52 8c 3d 22 c6 34 07 |R.=".4.|" -"2019-05-02 01:31:01.524 UTC [cauthdsl] func2 -> DEBU 1421 0xc00383f490 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:01.524 UTC [cauthdsl] func1 -> DEBU 1422 0xc00383f490 gate 1556760661521037000 evaluation succeeds" -"2019-05-02 01:31:01.524 UTC [policies] Evaluate -> DEBU 1423 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.525 UTC [policies] Evaluate -> DEBU 1424 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.525 UTC [policies] Evaluate -> DEBU 1425 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:01.525 UTC [policies] Evaluate -> DEBU 1426 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:01.525 UTC [gossip.discovery] handleAliveMessage -> DEBU 1427 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.526 UTC [gossip.discovery] learnExistingMembers -> DEBU 1428 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:01.526 UTC [gossip.discovery] learnExistingMembers -> DEBU 1429 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 " -"2019-05-02 01:31:01.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 142a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 " -"2019-05-02 01:31:01.528 UTC [gossip.discovery] learnExistingMembers -> DEBU 142b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:01.528 UTC [gossip.discovery] learnExistingMembers -> DEBU 142c Exiting" -"2019-05-02 01:31:01.528 UTC [gossip.discovery] handleAliveMessage -> DEBU 142d Exiting" -"2019-05-02 01:31:01.528 UTC [gossip.discovery] sendMemResponse -> DEBU 142e Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:01.529 UTC [msp] DeserializeIdentity -> DEBU 1430 Obtaining identity" -"2019-05-02 01:31:01.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 142f Exiting" -"2019-05-02 01:31:01.529 UTC [msp] DeserializeIdentity -> DEBU 1431 Obtaining identity" -"2019-05-02 01:31:01.530 UTC [msp] DeserializeIdentity -> DEBU 1432 Obtaining identity" -"2019-05-02 01:31:01.530 UTC [gossip.comm] Send -> DEBU 1433 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:01.530 UTC [gossip.discovery] sendMemResponse -> DEBU 1434 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:01.530 UTC [gossip.comm] sendToEndpoint -> DEBU 1435 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.531 UTC [gossip.comm] sendToEndpoint -> DEBU 1436 Exiting" -"2019-05-02 01:31:01.577 UTC [gossip.comm] func1 -> DEBU 1437 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.578 UTC [gossip.gossip] handleMessage -> DEBU 1438 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.578 UTC [msp] DeserializeIdentity -> DEBU 1439 Obtaining identity" -"2019-05-02 01:31:01.579 UTC [msp] DeserializeIdentity -> DEBU 143a Obtaining identity" -"2019-05-02 01:31:01.579 UTC [msp] DeserializeIdentity -> DEBU 143b Obtaining identity" -"2019-05-02 01:31:01.582 UTC [gossip.gossip] handleMessage -> DEBU 143c Exiting" -"2019-05-02 01:31:01.583 UTC [gossip.comm] func1 -> DEBU 143d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760658022254500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:01.584 UTC [gossip.gossip] handleMessage -> DEBU 143e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760658022254500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:01.585 UTC [msp] DeserializeIdentity -> DEBU 143f Obtaining identity" -"2019-05-02 01:31:01.586 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1440 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:01.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1441 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1442 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.587 UTC [policies] Evaluate -> DEBU 1443 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:01.587 UTC [policies] Evaluate -> DEBU 1444 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:01.587 UTC [policies] Evaluate -> DEBU 1445 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:01.588 UTC [cauthdsl] func1 -> DEBU 1446 0xc003851e30 gate 1556760661588182100 evaluation starts" -"2019-05-02 01:31:01.588 UTC [cauthdsl] func2 -> DEBU 1447 0xc003851e30 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:01.589 UTC [cauthdsl] func2 -> DEBU 1448 0xc003851e30 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:01.590 UTC [cauthdsl] func2 -> DEBU 1449 0xc003851e30 principal matched by identity 0" -"2019-05-02 01:31:01.590 UTC [msp.identity] Verify -> DEBU 144a Verify: digest = 00000000 9d e9 47 45 58 55 ba 08 a7 c1 57 d6 e2 0b 98 a9 |..GEXU....W.....| -00000010 70 2e 25 cd 61 06 ef 5c 24 6d 52 07 20 12 c0 72 |p.%.a..\$mR. ..r|" -"2019-05-02 01:31:01.591 UTC [msp.identity] Verify -> DEBU 144b Verify: sig = 00000000 30 44 02 20 21 fa 63 73 4d 87 7b 3d 61 8c bb 6c |0D. !.csM.{=a..l| -00000010 4a f2 88 4d 2f d6 9f e4 01 31 93 ed c5 62 ee 74 |J..M/....1...b.t| -00000020 e2 e6 3f f9 02 20 7a 8b de 81 f5 fc 73 7c b1 01 |..?.. z.....s|..| -00000030 27 44 48 aa a2 df 3a e3 d8 45 54 3d 5e a5 25 33 |'DH...:..ET=^.%3| -00000040 a7 5c 29 e1 73 d4 |.\).s.|" -"2019-05-02 01:31:01.592 UTC [cauthdsl] func2 -> DEBU 144c 0xc003851e30 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:01.592 UTC [cauthdsl] func1 -> DEBU 144d 0xc003851e30 gate 1556760661588182100 evaluation succeeds" -"2019-05-02 01:31:01.592 UTC [policies] Evaluate -> DEBU 144e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.593 UTC [policies] Evaluate -> DEBU 144f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.593 UTC [policies] Evaluate -> DEBU 1450 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:01.593 UTC [policies] Evaluate -> DEBU 1451 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:01.594 UTC [msp] DeserializeIdentity -> DEBU 1452 Obtaining identity" -"2019-05-02 01:31:01.594 UTC [gossip.gossip] handleMessage -> DEBU 1453 Exiting" -"2019-05-02 01:31:01.636 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1454 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.636 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1455 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.637 UTC [policies] Evaluate -> DEBU 1456 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-05-02 01:31:01.637 UTC [policies] Evaluate -> DEBU 1457 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:01.637 UTC [policies] Evaluate -> DEBU 1458 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:31:01.638 UTC [cauthdsl] func1 -> DEBU 1459 0xc003869020 gate 1556760661638237900 evaluation starts" -"2019-05-02 01:31:01.638 UTC [cauthdsl] func2 -> DEBU 145a 0xc003869020 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:01.638 UTC [cauthdsl] func2 -> DEBU 145b 0xc003869020 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:01.639 UTC [cauthdsl] func2 -> DEBU 145c 0xc003869020 principal matched by identity 0" -"2019-05-02 01:31:01.640 UTC [msp.identity] Verify -> DEBU 145d Verify: digest = 00000000 9d 0a 1d 67 af e5 af 3f af 84 18 aa 79 56 b8 0a |...g...?....yV..| -00000010 0f d9 c3 ad e6 de ea 14 c6 7b 01 38 66 86 92 19 |.........{.8f...|" -"2019-05-02 01:31:01.640 UTC [msp.identity] Verify -> DEBU 145e Verify: sig = 00000000 30 44 02 20 5d 44 9d 02 39 0f 84 05 b5 e3 cc 42 |0D. ]D..9......B| -00000010 0a c2 72 33 05 5e da 71 32 2b 76 bd 1d e7 27 68 |..r3.^.q2+v...'h| -00000020 48 09 a9 0b 02 20 45 88 c4 8e da 24 e9 78 c6 94 |H.... E....$.x..| -00000030 20 a7 86 99 63 88 2f f2 70 75 65 a8 b7 0f 2d 8d | ...c./.pue...-.| -00000040 1c 2d 30 11 33 2d |.-0.3-|" -"2019-05-02 01:31:01.640 UTC [cauthdsl] func2 -> DEBU 145f 0xc003869020 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:01.640 UTC [cauthdsl] func1 -> DEBU 1460 0xc003869020 gate 1556760661638237900 evaluation succeeds" -"2019-05-02 01:31:01.641 UTC [policies] Evaluate -> DEBU 1461 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:01.641 UTC [policies] Evaluate -> DEBU 1462 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:01.641 UTC [policies] Evaluate -> DEBU 1463 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:01.642 UTC [policies] Evaluate -> DEBU 1464 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:01.644 UTC [blocksProvider] DeliverBlocks -> DEBU 1465 [businesschannel] Adding payload to local buffer, blockNum = [4]" -"2019-05-02 01:31:01.645 UTC [gossip.state] addPayload -> DEBU 1466 [businesschannel] Adding payload to local buffer, blockNum = [4]" -"2019-05-02 01:31:01.645 UTC [gossip.state] deliverPayloads -> DEBU 1467 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" -"2019-05-02 01:31:01.646 UTC [gossip.state] deliverPayloads -> DEBU 1468 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" -"2019-05-02 01:31:01.647 UTC [gossip.privdata] StoreBlock -> INFO 1469 [businesschannel] Received block [4] from buffer" -"2019-05-02 01:31:01.648 UTC [gossip.privdata] StoreBlock -> DEBU 146a [businesschannel] Validating block [4]" -"2019-05-02 01:31:01.648 UTC [committer.txvalidator] Validate -> DEBU 146b [businesschannel] START Block Validation for block [4]" -"2019-05-02 01:31:01.648 UTC [committer.txvalidator] Validate -> DEBU 146c expecting 1 block validation responses" -"2019-05-02 01:31:01.649 UTC [committer.txvalidator] validateTx -> DEBU 146d [businesschannel] validateTx starts for block 0xc0037d8440 env 0xc0037c9630 txn 0" -"2019-05-02 01:31:01.649 UTC [protoutils] ValidateTransaction -> DEBU 146e ValidateTransactionEnvelope starts for envelope 0xc0037c9630" -"2019-05-02 01:31:01.650 UTC [protoutils] ValidateTransaction -> DEBU 146f Header is channel_header:"\010\003\032\014\010\323\220\251\346\005\020\374\243\257\222\002\"\017businesschannel*@cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\323.\347\323\033\010\242&\027>\365\213w\331\356\013\334^\334\017Zc\241\004" " -"2019-05-02 01:31:01.651 UTC [protoutils] validateChannelHeader -> DEBU 1470 validateChannelHeader info: header type 3" -"2019-05-02 01:31:01.651 UTC [protoutils] checkSignatureFromCreator -> DEBU 1471 begin" -"2019-05-02 01:31:01.651 UTC [msp] GetManagerForChain -> DEBU 1472 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:01.652 UTC [msp] DeserializeIdentity -> DEBU 1473 Obtaining identity" -"2019-05-02 01:31:01.653 UTC [msp.identity] newIdentity -> DEBU 1474 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:27:30.092 UTC [msp.identity] Verify -> DEBU 1126 Verify: sig = 00000000 30 45 02 21 00 97 35 d5 cf 34 fa e6 3a 73 bf c5 |0E.!..5..4..:s..| +00000010 db 67 96 6f f8 83 09 ca 90 e4 fb f3 51 bd 4e f2 |.g.o........Q.N.| +00000020 ef 5a 18 e4 5e 02 20 63 8f 02 15 e2 48 e3 94 39 |.Z..^. c....H..9| +00000030 88 b3 43 15 b5 3d 56 ce b8 64 df 14 24 d7 2a 46 |..C..=V..d..$.*F| +00000040 0a ba a5 ee ef 51 1b |.....Q.|" +"2019-05-02 09:27:30.093 UTC [cauthdsl] func2 -> DEBU 1127 0xc002d97230 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:30.095 UTC [cauthdsl] func1 -> DEBU 1128 0xc002d97230 gate 1556789250091035300 evaluation succeeds" +"2019-05-02 09:27:30.095 UTC [gossip.privdata] func1 -> DEBU 1129 Returning 172.18.0.6:53224 1 elements" +"2019-05-02 09:27:32.285 UTC [msp] DeserializeIdentity -> DEBU 112a Obtaining identity" +"2019-05-02 09:27:32.285 UTC [msp] DeserializeIdentity -> DEBU 112b Obtaining identity" +"2019-05-02 09:27:32.286 UTC [gossip.comm] Send -> DEBU 112c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:27:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 112e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 112f Exiting" +"2019-05-02 09:27:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 112d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1131 Exiting" +"2019-05-02 09:27:32.288 UTC [gossip.gossip] handleMessage -> DEBU 1132 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1130 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1133 Exiting" +"2019-05-02 09:27:32.289 UTC [msp.identity] Verify -> DEBU 1134 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +"2019-05-02 09:27:32.289 UTC [gossip.comm] func1 -> DEBU 1135 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.289 UTC [msp.identity] Verify -> DEBU 1136 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +00000040 c2 37 e5 9d c4 7b |.7...{|" +"2019-05-02 09:27:32.290 UTC [msp] DeserializeIdentity -> DEBU 1137 Obtaining identity" +"2019-05-02 09:27:32.291 UTC [msp] DeserializeIdentity -> DEBU 1138 Obtaining identity" +"2019-05-02 09:27:32.291 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1139 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:32.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 113a Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 113b Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.292 UTC [policies] Evaluate -> DEBU 113c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.292 UTC [policies] Evaluate -> DEBU 113d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.292 UTC [policies] Evaluate -> DEBU 113e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.292 UTC [cauthdsl] func1 -> DEBU 113f 0xc002e334d0 gate 1556789252292600400 evaluation starts" +"2019-05-02 09:27:32.292 UTC [cauthdsl] func2 -> DEBU 1140 0xc002e334d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.292 UTC [msp] DeserializeIdentity -> DEBU 1141 Obtaining identity" +"2019-05-02 09:27:32.293 UTC [msp] DeserializeIdentity -> DEBU 1143 Obtaining identity" +"2019-05-02 09:27:32.293 UTC [gossip.comm] Send -> DEBU 1144 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +"2019-05-02 09:27:32.293 UTC [msp] DeserializeIdentity -> DEBU 1145 Obtaining identity" +"2019-05-02 09:27:32.293 UTC [msp] DeserializeIdentity -> DEBU 1146 Obtaining identity" +"2019-05-02 09:27:32.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1147 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:32.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1148 Exiting" +"2019-05-02 09:27:32.292 UTC [cauthdsl] func2 -> DEBU 1142 0xc002e334d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.293 UTC [cauthdsl] func2 -> DEBU 1149 0xc002e334d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.293 UTC [cauthdsl] func2 -> DEBU 114a 0xc002e334d0 principal evaluation fails" +"2019-05-02 09:27:32.293 UTC [cauthdsl] func1 -> DEBU 114b 0xc002e334d0 gate 1556789252292600400 evaluation fails" +"2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 114c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 114d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 114e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.294 UTC [cauthdsl] func1 -> DEBU 114f 0xc002e68b30 gate 1556789252294173000 evaluation starts" +"2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1150 0xc002e68b30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1151 0xc002e68b30 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1152 0xc002e68b30 principal matched by identity 0" +"2019-05-02 09:27:32.294 UTC [msp.identity] Verify -> DEBU 1153 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +"2019-05-02 09:27:32.294 UTC [msp.identity] Verify -> DEBU 1154 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +"2019-05-02 09:27:32.294 UTC [cauthdsl] func2 -> DEBU 1155 0xc002e68b30 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.294 UTC [cauthdsl] func1 -> DEBU 1156 0xc002e68b30 gate 1556789252294173000 evaluation succeeds" +"2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 1157 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 1158 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 1159 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.294 UTC [policies] Evaluate -> DEBU 115a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 115b Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.| +00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|" +"2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 115c Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a| +00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~| +00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...| +00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......| +00000040 32 7c 48 bd 9e 05 6c |2|H...l|" +"2019-05-02 09:27:32.295 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 115d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.295 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 115e Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.295 UTC [policies] Evaluate -> DEBU 115f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.295 UTC [policies] Evaluate -> DEBU 1160 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.295 UTC [policies] Evaluate -> DEBU 1161 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.295 UTC [cauthdsl] func1 -> DEBU 1162 0xc002f52230 gate 1556789252295636200 evaluation starts" +"2019-05-02 09:27:32.295 UTC [cauthdsl] func2 -> DEBU 1163 0xc002f52230 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.295 UTC [cauthdsl] func2 -> DEBU 1164 0xc002f52230 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.295 UTC [cauthdsl] func2 -> DEBU 1165 0xc002f52230 principal matched by identity 0" +"2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 1166 Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.| +00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|" +"2019-05-02 09:27:32.295 UTC [msp.identity] Verify -> DEBU 1167 Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a| +00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~| +00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...| +00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......| +00000040 32 7c 48 bd 9e 05 6c |2|H...l|" +"2019-05-02 09:27:32.296 UTC [cauthdsl] func2 -> DEBU 1168 0xc002f52230 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.296 UTC [cauthdsl] func1 -> DEBU 1169 0xc002f52230 gate 1556789252295636200 evaluation succeeds" +"2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116c Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.296 UTC [policies] Evaluate -> DEBU 116d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.296 UTC [gossip.gossip] handleMessage -> DEBU 116e Exiting" +"2019-05-02 09:27:32.296 UTC [gossip.gossip] handleMessage -> DEBU 116f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.296 UTC [msp] DeserializeIdentity -> DEBU 1170 Obtaining identity" +"2019-05-02 09:27:32.296 UTC [msp.identity] Verify -> DEBU 1171 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +"2019-05-02 09:27:32.296 UTC [msp.identity] Verify -> DEBU 1172 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +00000040 c2 37 e5 9d c4 7b |.7...{|" +"2019-05-02 09:27:32.297 UTC [msp] DeserializeIdentity -> DEBU 1173 Obtaining identity" +"2019-05-02 09:27:32.297 UTC [msp] DeserializeIdentity -> DEBU 1174 Obtaining identity" +"2019-05-02 09:27:32.297 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1175 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:32.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1176 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1177 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.297 UTC [policies] Evaluate -> DEBU 1178 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.297 UTC [policies] Evaluate -> DEBU 1179 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.298 UTC [policies] Evaluate -> DEBU 117a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.298 UTC [cauthdsl] func1 -> DEBU 117b 0xc003564460 gate 1556789252298199700 evaluation starts" +"2019-05-02 09:27:32.298 UTC [cauthdsl] func2 -> DEBU 117c 0xc003564460 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.298 UTC [cauthdsl] func2 -> DEBU 117d 0xc003564460 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.298 UTC [cauthdsl] func2 -> DEBU 117e 0xc003564460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.299 UTC [cauthdsl] func2 -> DEBU 117f 0xc003564460 principal evaluation fails" +"2019-05-02 09:27:32.299 UTC [cauthdsl] func1 -> DEBU 1180 0xc003564460 gate 1556789252298199700 evaluation fails" +"2019-05-02 09:27:32.299 UTC [policies] Evaluate -> DEBU 1181 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.299 UTC [policies] Evaluate -> DEBU 1182 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.299 UTC [policies] Evaluate -> DEBU 1183 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.299 UTC [cauthdsl] func1 -> DEBU 1184 0xc003564ca0 gate 1556789252299791900 evaluation starts" +"2019-05-02 09:27:32.299 UTC [cauthdsl] func2 -> DEBU 1185 0xc003564ca0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.300 UTC [cauthdsl] func2 -> DEBU 1186 0xc003564ca0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.300 UTC [cauthdsl] func2 -> DEBU 1187 0xc003564ca0 principal matched by identity 0" +"2019-05-02 09:27:32.300 UTC [msp.identity] Verify -> DEBU 1188 Verify: digest = 00000000 31 32 db e2 71 57 02 dc cc d9 6a 0c 45 c5 81 c3 |12..qW....j.E...| +00000010 bc 92 8a 97 9a a2 87 64 96 f2 05 33 89 e0 00 a0 |.......d...3....|" +"2019-05-02 09:27:32.300 UTC [msp.identity] Verify -> DEBU 1189 Verify: sig = 00000000 30 45 02 21 00 93 a8 e7 07 11 b0 ed c7 f9 8e fa |0E.!............| +00000010 b3 48 6b bb 9a 3a 6b d7 a8 cb 2e 08 33 57 e9 1b |.Hk..:k.....3W..| +00000020 2c 86 b1 f0 91 02 20 39 f9 c2 f6 a7 cc 10 66 0e |,..... 9......f.| +00000030 19 7d 8d ae dd 36 78 07 64 fb 01 10 5d 67 24 5b |.}...6x.d...]g$[| +00000040 62 19 d6 5f f8 e0 d3 |b.._...|" +"2019-05-02 09:27:32.300 UTC [gossip.comm] sendToEndpoint -> DEBU 118a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:32.300 UTC [gossip.comm] sendToEndpoint -> DEBU 118b Exiting" +"2019-05-02 09:27:32.300 UTC [cauthdsl] func2 -> DEBU 118c 0xc003564ca0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.300 UTC [cauthdsl] func1 -> DEBU 118d 0xc003564ca0 gate 1556789252299791900 evaluation succeeds" +"2019-05-02 09:27:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 118e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789250049358800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 118f Exiting" +"2019-05-02 09:27:32.300 UTC [policies] Evaluate -> DEBU 1190 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.305 UTC [policies] Evaluate -> DEBU 1191 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.305 UTC [policies] Evaluate -> DEBU 1192 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.306 UTC [policies] Evaluate -> DEBU 1193 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.306 UTC [msp.identity] Verify -> DEBU 1194 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +"2019-05-02 09:27:32.307 UTC [msp.identity] Verify -> DEBU 1195 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU 1196 Obtaining identity" +"2019-05-02 09:27:32.307 UTC [msp] DeserializeIdentity -> DEBU 1197 Obtaining identity" +"2019-05-02 09:27:32.308 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1198 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:32.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1199 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.312 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119a Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.312 UTC [policies] Evaluate -> DEBU 119b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.312 UTC [policies] Evaluate -> DEBU 119c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.312 UTC [policies] Evaluate -> DEBU 119d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.313 UTC [cauthdsl] func1 -> DEBU 119e 0xc00362eb90 gate 1556789252312968100 evaluation starts" +"2019-05-02 09:27:32.313 UTC [cauthdsl] func2 -> DEBU 119f 0xc00362eb90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.313 UTC [cauthdsl] func2 -> DEBU 11a0 0xc00362eb90 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.313 UTC [cauthdsl] func2 -> DEBU 11a1 0xc00362eb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.314 UTC [cauthdsl] func2 -> DEBU 11a2 0xc00362eb90 principal evaluation fails" +"2019-05-02 09:27:32.314 UTC [cauthdsl] func1 -> DEBU 11a3 0xc00362eb90 gate 1556789252312968100 evaluation fails" +"2019-05-02 09:27:32.314 UTC [policies] Evaluate -> DEBU 11a4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.315 UTC [policies] Evaluate -> DEBU 11a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.315 UTC [policies] Evaluate -> DEBU 11a6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.315 UTC [cauthdsl] func1 -> DEBU 11a7 0xc00362f3d0 gate 1556789252315430500 evaluation starts" +"2019-05-02 09:27:32.315 UTC [cauthdsl] func2 -> DEBU 11a8 0xc00362f3d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.315 UTC [cauthdsl] func2 -> DEBU 11a9 0xc00362f3d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.316 UTC [cauthdsl] func2 -> DEBU 11aa 0xc00362f3d0 principal matched by identity 0" +"2019-05-02 09:27:32.316 UTC [msp.identity] Verify -> DEBU 11ab Verify: digest = 00000000 fe 15 c7 21 03 e4 15 f3 43 0e 25 df d1 10 e3 d8 |...!....C.%.....| +00000010 c2 75 19 37 0c ee 1a a8 fa b2 f0 63 15 47 4e c2 |.u.7.......c.GN.|" +"2019-05-02 09:27:32.316 UTC [msp.identity] Verify -> DEBU 11ac Verify: sig = 00000000 30 45 02 21 00 f9 1a c0 c8 76 26 f9 fe e4 d7 1b |0E.!.....v&.....| +00000010 30 47 6e 1e f5 e1 40 6f c8 67 90 11 cf 35 c8 9d |0Gn...@o.g...5..| +00000020 51 c8 9a 15 c0 02 20 0a 34 5a 37 26 ea 1a ea aa |Q..... .4Z7&....| +00000030 66 87 e0 70 4d 6c e2 c0 b6 4d 4c c7 3a 22 72 10 |f..pMl...ML.:"r.| +00000040 2f a1 74 57 4c d1 ef |/.tWL..|" +"2019-05-02 09:27:32.317 UTC [cauthdsl] func2 -> DEBU 11ad 0xc00362f3d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.317 UTC [cauthdsl] func1 -> DEBU 11ae 0xc00362f3d0 gate 1556789252315430500 evaluation succeeds" +"2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11af Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11b1 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.317 UTC [policies] Evaluate -> DEBU 11b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.318 UTC [msp] DeserializeIdentity -> DEBU 11b3 Obtaining identity" +"2019-05-02 09:27:32.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11b4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11b5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.318 UTC [cauthdsl] func1 -> DEBU 11b9 0xc00378c4b0 gate 1556789252318517200 evaluation starts" +"2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11ba 0xc00378c4b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11bb 0xc00378c4b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11bc 0xc00378c4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11bd 0xc00378c4b0 principal evaluation fails" +"2019-05-02 09:27:32.318 UTC [cauthdsl] func1 -> DEBU 11be 0xc00378c4b0 gate 1556789252318517200 evaluation fails" +"2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11bf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.318 UTC [policies] Evaluate -> DEBU 11c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.318 UTC [cauthdsl] func1 -> DEBU 11c2 0xc00378ccf0 gate 1556789252318839500 evaluation starts" +"2019-05-02 09:27:32.318 UTC [cauthdsl] func2 -> DEBU 11c3 0xc00378ccf0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.319 UTC [cauthdsl] func2 -> DEBU 11c4 0xc00378ccf0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.319 UTC [cauthdsl] func2 -> DEBU 11c5 0xc00378ccf0 principal matched by identity 0" +"2019-05-02 09:27:32.319 UTC [msp.identity] Verify -> DEBU 11c6 Verify: digest = 00000000 fe 15 c7 21 03 e4 15 f3 43 0e 25 df d1 10 e3 d8 |...!....C.%.....| +00000010 c2 75 19 37 0c ee 1a a8 fa b2 f0 63 15 47 4e c2 |.u.7.......c.GN.|" +"2019-05-02 09:27:32.319 UTC [msp.identity] Verify -> DEBU 11c7 Verify: sig = 00000000 30 45 02 21 00 f9 1a c0 c8 76 26 f9 fe e4 d7 1b |0E.!.....v&.....| +00000010 30 47 6e 1e f5 e1 40 6f c8 67 90 11 cf 35 c8 9d |0Gn...@o.g...5..| +00000020 51 c8 9a 15 c0 02 20 0a 34 5a 37 26 ea 1a ea aa |Q..... .4Z7&....| +00000030 66 87 e0 70 4d 6c e2 c0 b6 4d 4c c7 3a 22 72 10 |f..pMl...ML.:"r.| +00000040 2f a1 74 57 4c d1 ef |/.tWL..|" +"2019-05-02 09:27:32.319 UTC [cauthdsl] func2 -> DEBU 11c8 0xc00378ccf0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.319 UTC [cauthdsl] func1 -> DEBU 11c9 0xc00378ccf0 gate 1556789252318839500 evaluation succeeds" +"2019-05-02 09:27:32.319 UTC [policies] Evaluate -> DEBU 11ca Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.319 UTC [policies] Evaluate -> DEBU 11cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.319 UTC [policies] Evaluate -> DEBU 11cc Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.320 UTC [policies] Evaluate -> DEBU 11cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.320 UTC [gossip.gossip] handleMessage -> DEBU 11ce Exiting" +"2019-05-02 09:27:32.320 UTC [gossip.gossip] handleMessage -> DEBU 11cf Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.320 UTC [msp] DeserializeIdentity -> DEBU 11d0 Obtaining identity" +"2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d1 Verify: digest = 00000000 38 11 de 16 e7 ca e6 e4 d2 11 b6 aa 1b 4b fd d4 |8............K..| +00000010 6d 07 17 1c 5d dd 92 b8 d5 c1 f5 66 4e db 62 ad |m...]......fN.b.|" +"2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d2 Verify: sig = 00000000 30 44 02 20 28 f8 68 af c1 1f a3 8b b0 2f 1e 9d |0D. (.h....../..| +00000010 fb 70 c3 7f bb ab cd 0d c8 03 5e 63 37 46 5c 78 |.p........^c7F\x| +00000020 59 19 27 80 02 20 10 50 12 85 6a 51 be 38 a7 c2 |Y.'.. .P..jQ.8..| +00000030 ee 75 4a 05 e7 70 d8 85 36 54 fa 38 fb 97 aa 15 |.uJ..p..6T.8....| +00000040 c2 37 e5 9d c4 7b |.7...{|" +"2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d3 Verify: digest = 00000000 70 ec c0 ce 54 98 e9 b0 6e 29 22 5d 56 fc 4e 04 |p...T...n)"]V.N.| +00000010 c3 60 96 58 bf 81 e6 31 d5 9d 84 2e 24 45 0b 54 |.`.X...1....$E.T|" +"2019-05-02 09:27:32.320 UTC [msp.identity] Verify -> DEBU 11d4 Verify: sig = 00000000 30 44 02 20 3c 7d 88 bd be 4d 53 6c 7c 0d 23 0d |0D. <}...MSl|.#.| +00000010 5e e2 32 39 45 56 aa 11 ca 5f 4b 5a 8c 09 0f 1f |^.29EV..._KZ....| +00000020 24 bc c1 ae 02 20 28 8c 53 05 13 e1 f8 01 9c ab |$.... (.S.......| +00000030 3c 51 5f ec 9b b2 47 8a 6f a9 74 bf c0 13 7c d1 | DEBU 11d5 Obtaining identity" +"2019-05-02 09:27:32.321 UTC [msp] DeserializeIdentity -> DEBU 11d6 Obtaining identity" +"2019-05-02 09:27:32.321 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11d7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:32.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11d8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11d9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.322 UTC [policies] Evaluate -> DEBU 11da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.322 UTC [policies] Evaluate -> DEBU 11db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.323 UTC [policies] Evaluate -> DEBU 11dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.323 UTC [cauthdsl] func1 -> DEBU 11dd 0xc003887640 gate 1556789252323396900 evaluation starts" +"2019-05-02 09:27:32.323 UTC [cauthdsl] func2 -> DEBU 11de 0xc003887640 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.323 UTC [cauthdsl] func2 -> DEBU 11df 0xc003887640 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.324 UTC [cauthdsl] func2 -> DEBU 11e0 0xc003887640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.324 UTC [cauthdsl] func2 -> DEBU 11e1 0xc003887640 principal evaluation fails" +"2019-05-02 09:27:32.324 UTC [cauthdsl] func1 -> DEBU 11e2 0xc003887640 gate 1556789252323396900 evaluation fails" +"2019-05-02 09:27:32.324 UTC [policies] Evaluate -> DEBU 11e3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.324 UTC [policies] Evaluate -> DEBU 11e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.325 UTC [cauthdsl] func1 -> DEBU 11e6 0xc003887e80 gate 1556789252325216600 evaluation starts" +"2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11e7 0xc003887e80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11e8 0xc003887e80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11e9 0xc003887e80 principal matched by identity 0" +"2019-05-02 09:27:32.325 UTC [msp.identity] Verify -> DEBU 11ea Verify: digest = 00000000 fc 9e 55 ee 2a 26 92 e1 37 75 ab e5 8c 83 88 cc |..U.*&..7u......| +00000010 d9 02 b8 a1 fa a0 b5 d8 38 3c 08 bd a9 d8 67 c6 |........8<....g.|" +"2019-05-02 09:27:32.325 UTC [msp.identity] Verify -> DEBU 11eb Verify: sig = 00000000 30 44 02 20 5c d5 4f 7f 0d d7 23 1c ed 12 78 c9 |0D. \.O...#...x.| +00000010 8e d7 36 35 2a cc ba eb 2e 8a 48 ab 83 1b 59 7d |..65*.....H...Y}| +00000020 b9 95 d9 b7 02 20 22 39 e6 83 05 ff ef a7 27 22 |..... "9......'"| +00000030 18 dd b4 5a a5 a9 e6 5a e2 02 03 fa 6a 1e 0f d2 |...Z...Z....j...| +00000040 83 2b b4 bb 36 ef |.+..6.|" +"2019-05-02 09:27:32.325 UTC [cauthdsl] func2 -> DEBU 11ec 0xc003887e80 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.325 UTC [cauthdsl] func1 -> DEBU 11ed 0xc003887e80 gate 1556789252325216600 evaluation succeeds" +"2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11ee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11f0 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.325 UTC [policies] Evaluate -> DEBU 11f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.326 UTC [msp] DeserializeIdentity -> DEBU 11f2 Obtaining identity" +"2019-05-02 09:27:32.326 UTC [msp] DeserializeIdentity -> DEBU 11f3 Obtaining identity" +"2019-05-02 09:27:32.326 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:32.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11f5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11f6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 11f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 11f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 11f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.326 UTC [cauthdsl] func1 -> DEBU 11fa 0xc000449650 gate 1556789252326582400 evaluation starts" +"2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fb 0xc000449650 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fc 0xc000449650 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fd 0xc000449650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.326 UTC [cauthdsl] func2 -> DEBU 11fe 0xc000449650 principal evaluation fails" +"2019-05-02 09:27:32.326 UTC [cauthdsl] func1 -> DEBU 11ff 0xc000449650 gate 1556789252326582400 evaluation fails" +"2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 1200 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.326 UTC [policies] Evaluate -> DEBU 1201 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 1202 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.327 UTC [cauthdsl] func1 -> DEBU 1203 0xc000449e90 gate 1556789252327069100 evaluation starts" +"2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1204 0xc000449e90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1205 0xc000449e90 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1206 0xc000449e90 principal matched by identity 0" +"2019-05-02 09:27:32.327 UTC [msp.identity] Verify -> DEBU 1207 Verify: digest = 00000000 03 99 07 bb b6 24 89 e1 32 94 ab ee 96 a3 53 b3 |.....$..2.....S.| +00000010 35 7e 51 3a 77 d4 07 ef b1 5a 6e ef 7d c4 af 10 |5~Q:w....Zn.}...|" +"2019-05-02 09:27:32.327 UTC [msp.identity] Verify -> DEBU 1208 Verify: sig = 00000000 30 44 02 20 77 ab 2a 8b bf 4e 23 48 40 76 28 09 |0D. w.*..N#H@v(.| +00000010 bf f6 7d f0 16 4d c0 c1 16 d1 d5 99 a4 a2 70 ae |..}..M........p.| +00000020 44 19 ed 9b 02 20 7c de 8a 80 41 3d f5 65 7e 03 |D.... |...A=.e~.| +00000030 80 a0 7e 30 9b 3b 2a b4 08 da 64 28 a8 36 09 ba |..~0.;*...d(.6..| +00000040 1b 29 54 54 6f c7 |.)TTo.|" +"2019-05-02 09:27:32.327 UTC [cauthdsl] func2 -> DEBU 1209 0xc000449e90 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.327 UTC [cauthdsl] func1 -> DEBU 120a 0xc000449e90 gate 1556789252327069100 evaluation succeeds" +"2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120d Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.327 UTC [policies] Evaluate -> DEBU 120e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.327 UTC [msp] DeserializeIdentity -> DEBU 120f Obtaining identity" +"2019-05-02 09:27:32.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1210 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1211 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 1212 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 1213 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 1214 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.328 UTC [cauthdsl] func1 -> DEBU 1215 0xc002292f70 gate 1556789252328448600 evaluation starts" +"2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1216 0xc002292f70 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1217 0xc002292f70 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1218 0xc002292f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.328 UTC [cauthdsl] func2 -> DEBU 1219 0xc002292f70 principal evaluation fails" +"2019-05-02 09:27:32.328 UTC [cauthdsl] func1 -> DEBU 121a 0xc002292f70 gate 1556789252328448600 evaluation fails" +"2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 121b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.328 UTC [policies] Evaluate -> DEBU 121c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 121d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.329 UTC [cauthdsl] func1 -> DEBU 121e 0xc0022937b0 gate 1556789252329126400 evaluation starts" +"2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 121f 0xc0022937b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 1220 0xc0022937b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 1221 0xc0022937b0 principal matched by identity 0" +"2019-05-02 09:27:32.329 UTC [msp.identity] Verify -> DEBU 1222 Verify: digest = 00000000 03 99 07 bb b6 24 89 e1 32 94 ab ee 96 a3 53 b3 |.....$..2.....S.| +00000010 35 7e 51 3a 77 d4 07 ef b1 5a 6e ef 7d c4 af 10 |5~Q:w....Zn.}...|" +"2019-05-02 09:27:32.329 UTC [msp.identity] Verify -> DEBU 1223 Verify: sig = 00000000 30 44 02 20 77 ab 2a 8b bf 4e 23 48 40 76 28 09 |0D. w.*..N#H@v(.| +00000010 bf f6 7d f0 16 4d c0 c1 16 d1 d5 99 a4 a2 70 ae |..}..M........p.| +00000020 44 19 ed 9b 02 20 7c de 8a 80 41 3d f5 65 7e 03 |D.... |...A=.e~.| +00000030 80 a0 7e 30 9b 3b 2a b4 08 da 64 28 a8 36 09 ba |..~0.;*...d(.6..| +00000040 1b 29 54 54 6f c7 |.)TTo.|" +"2019-05-02 09:27:32.329 UTC [cauthdsl] func2 -> DEBU 1224 0xc0022937b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.329 UTC [cauthdsl] func1 -> DEBU 1225 0xc0022937b0 gate 1556789252329126400 evaluation succeeds" +"2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1226 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1227 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1228 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.329 UTC [policies] Evaluate -> DEBU 1229 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.330 UTC [gossip.gossip] handleMessage -> DEBU 122a Exiting" +"2019-05-02 09:27:32.341 UTC [gossip.election] waitForInterrupt -> DEBU 122b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:27:32.341 UTC [gossip.election] IsLeader -> DEBU 122c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:27:32.341 UTC [msp.identity] Sign -> DEBU 122d Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510041801 " +"2019-05-02 09:27:32.341 UTC [msp.identity] Sign -> DEBU 122e Sign: digest: 864F29BEC3ACAE39E159EED5D13065DB3737E923A6DDBF2781A5C0282EDBEEEE " +"2019-05-02 09:27:32.341 UTC [gossip.election] waitForInterrupt -> DEBU 122f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1230 Obtaining identity" +"2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1231 Obtaining identity" +"2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1232 Obtaining identity" +"2019-05-02 09:27:32.351 UTC [msp] DeserializeIdentity -> DEBU 1233 Obtaining identity" +"2019-05-02 09:27:32.352 UTC [gossip.comm] Send -> DEBU 1234 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:32.352 UTC [msp] DeserializeIdentity -> DEBU 1235 Obtaining identity" +"2019-05-02 09:27:32.352 UTC [msp] DeserializeIdentity -> DEBU 1236 Obtaining identity" +"2019-05-02 09:27:32.352 UTC [gossip.comm] sendToEndpoint -> DEBU 1237 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-05-02 09:27:32.352 UTC [gossip.comm] sendToEndpoint -> DEBU 1238 Exiting" +"2019-05-02 09:27:32.509 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1239 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.510 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 123a Got block validation policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.510 UTC [policies] Evaluate -> DEBU 123b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-05-02 09:27:32.510 UTC [policies] Evaluate -> DEBU 123c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.510 UTC [policies] Evaluate -> DEBU 123d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:32.510 UTC [cauthdsl] func1 -> DEBU 123e 0xc0025772a0 gate 1556789252510380400 evaluation starts" +"2019-05-02 09:27:32.510 UTC [cauthdsl] func2 -> DEBU 123f 0xc0025772a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.511 UTC [cauthdsl] func2 -> DEBU 1240 0xc0025772a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.511 UTC [cauthdsl] func2 -> DEBU 1241 0xc0025772a0 principal matched by identity 0" +"2019-05-02 09:27:32.511 UTC [msp.identity] Verify -> DEBU 1242 Verify: digest = 00000000 68 4c fb e1 65 a3 a9 50 e0 5d 39 be 9c a3 ed 6f |hL..e..P.]9....o| +00000010 e5 d2 ba 78 c7 6e 22 41 c7 4f 22 6e 0c 7a e2 a3 |...x.n"A.O"n.z..|" +"2019-05-02 09:27:32.511 UTC [msp.identity] Verify -> DEBU 1243 Verify: sig = 00000000 30 44 02 20 69 4d 83 33 12 ee 44 57 8a ac ff 0b |0D. iM.3..DW....| +00000010 20 7d 03 9c 5b fe b9 35 b1 92 87 47 be ca 4a 0d | }..[..5...G..J.| +00000020 53 09 41 d9 02 20 45 70 ec 86 66 80 d9 cc de af |S.A.. Ep..f.....| +00000030 42 90 b9 18 dd 19 6c 1f 0f d3 da 9a 72 87 c0 aa |B.....l.....r...| +00000040 40 bd e4 c9 1d 66 |@....f|" +"2019-05-02 09:27:32.512 UTC [cauthdsl] func2 -> DEBU 1244 0xc0025772a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.512 UTC [cauthdsl] func1 -> DEBU 1245 0xc0025772a0 gate 1556789252510380400 evaluation succeeds" +"2019-05-02 09:27:32.512 UTC [policies] Evaluate -> DEBU 1246 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:32.514 UTC [policies] Evaluate -> DEBU 1247 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:32.514 UTC [policies] Evaluate -> DEBU 1248 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:32.514 UTC [policies] Evaluate -> DEBU 1249 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:32.516 UTC [blocksProvider] DeliverBlocks -> DEBU 124a [businesschannel] Adding payload to local buffer, blockNum = [4]" +"2019-05-02 09:27:32.517 UTC [gossip.state] addPayload -> DEBU 124b [businesschannel] Adding payload to local buffer, blockNum = [4]" +"2019-05-02 09:27:32.517 UTC [gossip.state] addPayload -> DEBU 124c Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-05-02 09:27:32.517 UTC [blocksProvider] DeliverBlocks -> DEBU 124d [businesschannel] Gossiping block [4], peers number [3]" +"2019-05-02 09:27:32.517 UTC [gossip.channel] AddToMsgStore -> DEBU 124e Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes to the block puller" +"2019-05-02 09:27:32.517 UTC [gossip.pull] Add -> DEBU 124f Added 4, total items: 4" +"2019-05-02 09:27:32.518 UTC [gossip.state] deliverPayloads -> DEBU 1250 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" +"2019-05-02 09:27:32.518 UTC [gossip.state] deliverPayloads -> DEBU 1251 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" +"2019-05-02 09:27:32.518 UTC [gossip.privdata] StoreBlock -> INFO 1252 [businesschannel] Received block [4] from buffer" +"2019-05-02 09:27:32.518 UTC [gossip.privdata] StoreBlock -> DEBU 1253 [businesschannel] Validating block [4]" +"2019-05-02 09:27:32.519 UTC [committer.txvalidator] Validate -> DEBU 1254 [businesschannel] START Block Validation for block [4]" +"2019-05-02 09:27:32.519 UTC [committer.txvalidator] Validate -> DEBU 1255 expecting 1 block validation responses" +"2019-05-02 09:27:32.519 UTC [committer.txvalidator] validateTx -> DEBU 1256 [businesschannel] validateTx starts for block 0xc0030e2340 env 0xc002e393b0 txn 0" +"2019-05-02 09:27:32.519 UTC [protoutils] ValidateTransaction -> DEBU 1257 ValidateTransactionEnvelope starts for envelope 0xc002e393b0" +"2019-05-02 09:27:32.521 UTC [protoutils] ValidateTransaction -> DEBU 1258 Header is channel_header:"\010\003\032\014\010\202\360\252\346\005\020\330\222\201\324\001\"\017businesschannel*@fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\240\274\353\251\345HY\035\373[\177M\244i/\263LJu\341\014\023!\257" " +"2019-05-02 09:27:32.521 UTC [protoutils] validateChannelHeader -> DEBU 1259 validateChannelHeader info: header type 3" +"2019-05-02 09:27:32.521 UTC [protoutils] checkSignatureFromCreator -> DEBU 125a begin" +"2019-05-02 09:27:32.522 UTC [msp] GetManagerForChain -> DEBU 125b Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:32.522 UTC [msp] DeserializeIdentity -> DEBU 125c Obtaining identity" +"2019-05-02 09:27:32.522 UTC [msp.identity] newIdentity -> DEBU 125d Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7422,2086 +6658,2488 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:31:01.654 UTC [protoutils] checkSignatureFromCreator -> DEBU 1475 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -"2019-05-02 01:31:01.655 UTC [msp] Validate -> DEBU 1476 MSP Org2MSP validating identity" -"2019-05-02 01:31:01.656 UTC [msp] getCertificationChain -> DEBU 1477 MSP Org2MSP getting certification chain" -"2019-05-02 01:31:01.660 UTC [protoutils] checkSignatureFromCreator -> DEBU 1478 creator is valid" -"2019-05-02 01:31:01.661 UTC [msp.identity] Verify -> DEBU 1479 Verify: digest = 00000000 18 89 da 7d ee 2f fa 9d b7 31 99 e7 69 5c 72 c4 |...}./...1..i\r.| -00000010 32 53 fe b4 21 0f b5 62 f1 8f 2f de 95 92 26 b2 |2S..!..b../...&.|" -"2019-05-02 01:31:01.661 UTC [msp.identity] Verify -> DEBU 147a Verify: sig = 00000000 30 45 02 21 00 f7 20 96 b5 eb 51 76 b8 c6 3d b1 |0E.!.. ...Qv..=.| -00000010 4b 39 4a 1d 0b 7d 98 44 2c 4e 65 87 2a 1c e4 48 |K9J..}.D,Ne.*..H| -00000020 c4 14 e8 db 07 02 20 4e 2c ea b1 fc 8f f9 f3 13 |...... N,.......| -00000030 4a 95 7e 34 07 e1 af 27 36 33 64 f0 c5 79 a9 02 |J.~4...'63d..y..| -00000040 e4 c9 83 73 4f bc 7d |...sO.}|" -"2019-05-02 01:31:01.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 147b exits successfully" -"2019-05-02 01:31:01.645 UTC [gossip.state] addPayload -> DEBU 147c Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-05-02 01:31:01.665 UTC [blocksProvider] DeliverBlocks -> DEBU 147d [businesschannel] Gossiping block [4], peers number [3]" -"2019-05-02 01:31:01.665 UTC [gossip.channel] AddToMsgStore -> DEBU 147e Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 4}, Envelope: 4752 bytes, Signature: 0 bytes to the block puller" -"2019-05-02 01:31:01.665 UTC [gossip.pull] Add -> DEBU 147f Added 4, total items: 4" -"2019-05-02 01:31:01.669 UTC [protoutils] validateEndorserTransaction -> DEBU 1480 validateEndorserTransaction starts for data 0xc0037eb500, header channel_header:"\010\003\032\014\010\323\220\251\346\005\020\374\243\257\222\002\"\017businesschannel*@cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\323.\347\323\033\010\242&\027>\365\213w\331\356\013\334^\334\017Zc\241\004" " -"2019-05-02 01:31:01.670 UTC [protoutils] validateEndorserTransaction -> DEBU 1481 validateEndorserTransaction info: there are 1 actions" -"2019-05-02 01:31:01.671 UTC [protoutils] validateEndorserTransaction -> DEBU 1482 validateEndorserTransaction info: signature header is valid" -"2019-05-02 01:31:01.671 UTC [protoutils] ValidateTransaction -> DEBU 1483 ValidateTransactionEnvelope returns err %!s()" -"2019-05-02 01:31:01.671 UTC [committer.txvalidator] validateTx -> DEBU 1484 Transaction is for channel businesschannel" -"2019-05-02 01:31:01.671 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1485 retrieveTransactionByID() - txId = [cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885]" -"2019-05-02 01:31:01.671 UTC [committer.txvalidator] validateTx -> DEBU 1486 Validating transaction with plugins" -"2019-05-02 01:31:01.672 UTC [committer.txvalidator] Dispatch -> DEBU 1487 [businesschannel] Dispatch starts for bytes 0xc003886000" -"2019-05-02 01:31:01.673 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1488 constructing new query executor txid = [cbd5e1ff-1872-48d9-a166-efb7ffd3dd32]" -"2019-05-02 01:31:01.673 UTC [lockbasedtxmgr] Done -> DEBU 1489 Done with transaction simulation / query execution [cbd5e1ff-1872-48d9-a166-efb7ffd3dd32]" -"2019-05-02 01:31:01.673 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 148a Validating Tx cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" -"2019-05-02 01:31:01.675 UTC [msp] DeserializeIdentity -> DEBU 148b Obtaining identity" -"2019-05-02 01:31:01.675 UTC [msp] DeserializeIdentity -> DEBU 148c Obtaining identity" -"2019-05-02 01:31:01.675 UTC [msp] DeserializeIdentity -> DEBU 148d Obtaining identity" -"2019-05-02 01:31:01.676 UTC [msp] DeserializeIdentity -> DEBU 148e Obtaining identity" -"2019-05-02 01:31:01.676 UTC [gossip.comm] Send -> DEBU 148f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 4}, Envelope: 4752 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:01.677 UTC [msp] DeserializeIdentity -> DEBU 1490 Obtaining identity" -"2019-05-02 01:31:01.677 UTC [msp] DeserializeIdentity -> DEBU 1491 Obtaining identity" -"2019-05-02 01:31:01.677 UTC [gossip.comm] sendToEndpoint -> DEBU 1492 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 4}, Envelope: 4752 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.678 UTC [gossip.comm] sendToEndpoint -> DEBU 1493 Exiting" -"2019-05-02 01:31:01.703 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1494 constructing new query executor txid = [fd82a8be-48d8-472d-aa69-724bfc9c6352]" -"2019-05-02 01:31:01.704 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1495 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:31:01.704 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1496 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:31:01.704 UTC [lockbasedtxmgr] Done -> DEBU 1497 Done with transaction simulation / query execution [fd82a8be-48d8-472d-aa69-724bfc9c6352]" -"2019-05-02 01:31:01.704 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1498 constructing new query executor txid = [302f7812-b869-40c9-8b20-ade78323cf95]" -"2019-05-02 01:31:01.704 UTC [lockbasedtxmgr] Done -> DEBU 1499 Done with transaction simulation / query execution [302f7812-b869-40c9-8b20-ade78323cf95]" -"2019-05-02 01:31:01.705 UTC [policies] Evaluate -> DEBU 149a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" -"2019-05-02 01:31:01.705 UTC [cauthdsl] func1 -> DEBU 149b 0xc003891c10 gate 1556760661705241500 evaluation starts" -"2019-05-02 01:31:01.705 UTC [cauthdsl] func2 -> DEBU 149c 0xc003891c10 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:01.705 UTC [cauthdsl] func2 -> DEBU 149d 0xc003891c10 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:01.705 UTC [cauthdsl] func2 -> DEBU 149e 0xc003891c10 principal matched by identity 0" -"2019-05-02 01:31:01.705 UTC [msp.identity] Verify -> DEBU 149f Verify: digest = 00000000 52 20 e2 c6 21 8c 13 44 4f 28 1e 4c f0 f8 e1 d0 |R ..!..DO(.L....| -00000010 21 e3 7d bc 6e 82 76 50 f0 c4 1f aa b7 91 d9 fb |!.}.n.vP........|" -"2019-05-02 01:31:01.706 UTC [msp.identity] Verify -> DEBU 14a0 Verify: sig = 00000000 30 44 02 20 54 42 8f 9e 01 11 53 f8 8d 81 32 88 |0D. TB....S...2.| -00000010 2d 55 90 f0 34 08 e7 6d c7 49 03 0a b6 ef 73 aa |-U..4..m.I....s.| -00000020 c7 fa 53 a5 02 20 5f e4 83 76 6a 9f e5 af 5b ca |..S.. _..vj...[.| -00000030 6b 12 0f bd 50 fc d8 df ba c6 59 51 2a 83 70 3b |k...P.....YQ*.p;| -00000040 89 09 b2 a3 90 1c |......|" -"2019-05-02 01:31:01.707 UTC [cauthdsl] func2 -> DEBU 14a1 0xc003891c10 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:01.707 UTC [cauthdsl] func1 -> DEBU 14a2 0xc003891c10 gate 1556760661705241500 evaluation succeeds" -"2019-05-02 01:31:01.707 UTC [policies] Evaluate -> DEBU 14a3 Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:31:01.709 UTC [policies] Evaluate -> DEBU 14a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14a5 constructing new query executor txid = [39d0f9b0-6afa-48bb-987b-cf32832b70c9]" -"2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14a6 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14a7 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] Done -> DEBU 14a8 Done with transaction simulation / query execution [39d0f9b0-6afa-48bb-987b-cf32832b70c9]" -"2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14a9 constructing new query executor txid = [c9222e57-9c29-4c31-9aaa-774b3ba1aed0]" -"2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14aa retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:31:01.709 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14ab retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:31:01.711 UTC [lockbasedtxmgr] Done -> DEBU 14ac Done with transaction simulation / query execution [c9222e57-9c29-4c31-9aaa-774b3ba1aed0]" -"2019-05-02 01:31:01.711 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14ad constructing new query executor txid = [57c65454-c785-43ac-9d1a-1b0d8559ebc3]" -"2019-05-02 01:31:01.711 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14ae retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:31:01.711 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14af retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:31:01.712 UTC [lockbasedtxmgr] Done -> DEBU 14b0 Done with transaction simulation / query execution [57c65454-c785-43ac-9d1a-1b0d8559ebc3]" -"2019-05-02 01:31:01.713 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14b1 constructing new query executor txid = [cfa234a6-0dfd-466a-bda1-1129f3763411]" -"2019-05-02 01:31:01.714 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14b2 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:31:01.714 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14b3 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:31:01.714 UTC [lockbasedtxmgr] Done -> DEBU 14b4 Done with transaction simulation / query execution [cfa234a6-0dfd-466a-bda1-1129f3763411]" -"2019-05-02 01:31:01.714 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14b5 constructing new query executor txid = [50be9d91-fe65-4a57-974c-02f02bd2217f]" -"2019-05-02 01:31:01.714 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14b6 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:31:01.717 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 14b7 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:31:01.717 UTC [lockbasedtxmgr] Done -> DEBU 14b8 Done with transaction simulation / query execution [50be9d91-fe65-4a57-974c-02f02bd2217f]" -"2019-05-02 01:31:01.717 UTC [vscc] Validate -> DEBU 14b9 block 4, namespace: _lifecycle, tx 0 validation results is: " -"2019-05-02 01:31:01.718 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 14ba Transaction cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885 appears to be valid" -"2019-05-02 01:31:01.718 UTC [committer.txvalidator] Dispatch -> DEBU 14bb [businesschannel] Dispatch completes env bytes 0xc003886000" -"2019-05-02 01:31:01.719 UTC [committer.txvalidator] Validate -> DEBU 14bc got result for idx 0, code 0" -"2019-05-02 01:31:01.719 UTC [committer.txvalidator] Validate -> INFO 14bd [businesschannel] Validated block [4] in 71ms" -"2019-05-02 01:31:01.719 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14be constructing new query executor txid = [04947745-08c8-4d12-b471-67841a4a3b42]" -"2019-05-02 01:31:01.720 UTC [lockbasedtxmgr] Done -> DEBU 14bf Done with transaction simulation / query execution [04947745-08c8-4d12-b471-67841a4a3b42]" -"2019-05-02 01:31:01.720 UTC [msp] GetManagerForChain -> DEBU 14c0 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:01.722 UTC [cauthdsl] func1 -> DEBU 14c1 0xc0038a1080 gate 1556760661722038900 evaluation starts" -"2019-05-02 01:31:01.722 UTC [cauthdsl] func2 -> DEBU 14c2 0xc0038a1080 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:01.722 UTC [cauthdsl] func2 -> DEBU 14c3 0xc0038a1080 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:01.722 UTC [cauthdsl] func2 -> DEBU 14c4 0xc0038a1080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:01.722 UTC [cauthdsl] func2 -> DEBU 14c5 0xc0038a1080 principal evaluation fails" -"2019-05-02 01:31:01.722 UTC [cauthdsl] func1 -> DEBU 14c6 0xc0038a1080 gate 1556760661722038900 evaluation fails" -"2019-05-02 01:31:01.722 UTC [gossip.privdata] isEligible -> DEBU 14c7 Skipping namespace _lifecycle collection _implicit_org_Org2MSP because we're not eligible for the private data" -"2019-05-02 01:31:01.722 UTC [gossip.privdata] inspectTransaction -> DEBU 14c8 Peer is not eligible for collection, channel [businesschannel], chaincode [_lifecycle], collection name [_implicit_org_Org2MSP], txID [cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885] the policy is [&privdata.SimpleCollection{name:"_implicit_org_Org2MSP", accessPolicy:(*cauthdsl.policy)(0xc0038b1040), memberOrgs:[]string{"Org2MSP"}, conf:common.StaticCollectionConfig{Name:"_implicit_org_Org2MSP", MemberOrgsPolicy:(*common.CollectionPolicyConfig)(0xc003863e90), RequiredPeerCount:0, MaximumPeerCount:0, BlockToLive:0x0, MemberOnlyRead:false, MemberOnlyWrite:false, XXX_NoUnkeyedLiteral:struct {}{}, XXX_unrecognized:[]uint8(nil), XXX_sizecache:0}}]. Skipping." -"2019-05-02 01:31:01.723 UTC [gossip.privdata] listMissingPrivateData -> DEBU 14c9 Retrieving private write sets for 0 transactions from transient store" -"2019-05-02 01:31:01.723 UTC [gossip.privdata] StoreBlock -> DEBU 14ca [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-05-02 01:31:01.723 UTC [kvledger] CommitWithPvtData -> DEBU 14cb [businesschannel] Validating state for block [4]" -"2019-05-02 01:31:01.723 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 14cc Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:31:01.723 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 14cd lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-05-02 01:31:01.723 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 14ce Validating new block with num trans = [1]" -"2019-05-02 01:31:01.723 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 14cf ValidateAndPrepareBatch() for block number = [4]" -"2019-05-02 01:31:01.723 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 14d0 preprocessing ProtoBlock..." -"2019-05-02 01:31:01.723 UTC [valimpl] preprocessProtoBlock -> DEBU 14d1 txType=ENDORSER_TRANSACTION" -"2019-05-02 01:31:01.723 UTC [stateleveldb] GetState -> DEBU 14d2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:01.724 UTC [statebasedval] validateKVRead -> DEBU 14d3 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -"2019-05-02 01:31:01.724 UTC [stateleveldb] GetState -> DEBU 14d4 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" -"2019-05-02 01:31:01.724 UTC [stateleveldb] GetState -> DEBU 14d5 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" -"2019-05-02 01:31:01.724 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 14d6 Block [4] Transaction index [0] TxId [cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885] marked as valid by state validator. ContainsPostOrderWrites [false]" -"2019-05-02 01:31:01.724 UTC [valinternal] ApplyWriteSet -> DEBU 14d7 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc00382ef00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc00382efc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc00382ee80), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc00382eec0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4 DEBU 14d8 validating rwset..." -"2019-05-02 01:31:01.724 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 14d9 postprocessing ProtoBlock..." -"2019-05-02 01:31:01.724 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 14da ValidateAndPrepareBatch() complete" -"2019-05-02 01:31:01.724 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 14db Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0002ef220 0x27475e0 0xc000010ca8}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0025c18c0 map[]})]}" -"2019-05-02 01:31:01.724 UTC [cceventmgmt] HandleStateUpdates -> DEBU 14dc Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" -"2019-05-02 01:31:01.724 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 14dd Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" -"2019-05-02 01:31:01.725 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 14de Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0})}" -"2019-05-02 01:31:01.726 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 14df Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 216 129 76 241 69 60 8 51 200 236 230 104 227 112 199 189 219 19 97 23 185 229 62 48 241 59 155 78 13 25 116 13 2 32 116 67 68 156 136 155 15 173 83 249 60 180 13 82 76 31 222 21 132 92 100 178 210 6 255 132 174 31 211 118 30 104]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0025ee400 0xc00255d110 0xc0025a5580})]}" -"2019-05-02 01:31:01.726 UTC [confighistory] HandleStateUpdates -> ERRO 14e0 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0038ef320)}" -"2019-05-02 01:31:01.726 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 14e1 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000e7c0})}" -"2019-05-02 01:31:01.731 UTC [kvledger] CommitWithPvtData -> DEBU 14e2 [businesschannel] Committing block [4] to storage" -"2019-05-02 01:31:01.731 UTC [ledgerstorage] CommitWithPvtData -> DEBU 14e3 Writing block [4] to pvt block store" -"2019-05-02 01:31:01.732 UTC [gossip.comm] func1 -> DEBU 14e4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.732 UTC [gossip.gossip] handleMessage -> DEBU 14e5 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.733 UTC [gossip.pull] HandleMessage -> DEBU 14e6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14e7 Obtaining identity" -"2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14e8 Obtaining identity" -"2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14e9 Obtaining identity" -"2019-05-02 01:31:01.732 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 14ea constructing new query executor txid = [dd5f5c78-0829-4d4e-9499-33205f748246]" -"2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14eb Obtaining identity" -"2019-05-02 01:31:01.733 UTC [lockbasedtxmgr] Done -> DEBU 14ec Done with transaction simulation / query execution [dd5f5c78-0829-4d4e-9499-33205f748246]" -"2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14ed Obtaining identity" -"2019-05-02 01:31:01.733 UTC [msp] DeserializeIdentity -> DEBU 14ee Obtaining identity" -"2019-05-02 01:31:01.734 UTC [gossip.pull] SendDigest -> DEBU 14ef Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:01.734 UTC [gossip.gossip] handleMessage -> DEBU 14f0 Exiting" -"2019-05-02 01:31:01.743 UTC [committer.txvalidator] validateTx -> DEBU 14f1 [businesschannel] validateTx completes for block 0xc0037d8440 env 0xc0037c9630 txn 0" -"2019-05-02 01:31:01.743 UTC [pvtdatastorage] Prepare -> DEBU 14f2 Saved 0 private data write sets for block [4]" -"2019-05-02 01:31:01.751 UTC [fsblkstorage] indexBlock -> DEBU 14f3 Indexing block [blockNum=4, blockHash=[]byte{0xf8, 0xa9, 0x4a, 0x62, 0xdc, 0x56, 0x89, 0xf, 0xb2, 0x6c, 0xee, 0x66, 0x95, 0x3d, 0x66, 0xa0, 0xae, 0x6d, 0x16, 0xd3, 0x60, 0x8f, 0x39, 0x0, 0x9b, 0xa7, 0xeb, 0x99, 0xf4, 0xfb, 0x35, 0xcf} txOffsets= -txId=cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885 locPointer=offset=70, bytesLength=3704 +"2019-05-02 09:27:32.523 UTC [protoutils] checkSignatureFromCreator -> DEBU 125e creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-05-02 09:27:32.523 UTC [msp] Validate -> DEBU 125f MSP Org2MSP validating identity" +"2019-05-02 09:27:32.523 UTC [msp] getCertificationChain -> DEBU 1260 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:32.524 UTC [protoutils] checkSignatureFromCreator -> DEBU 1261 creator is valid" +"2019-05-02 09:27:32.524 UTC [msp.identity] Verify -> DEBU 1262 Verify: digest = 00000000 5f f7 a9 77 bb 08 23 e9 79 a3 1a 5a 4b df bf 14 |_..w..#.y..ZK...| +00000010 0b ee 78 cb 24 b7 9b 4f 26 45 ee c7 3a c5 0a 72 |..x.$..O&E..:..r|" +"2019-05-02 09:27:32.524 UTC [msp.identity] Verify -> DEBU 1263 Verify: sig = 00000000 30 44 02 20 42 94 36 89 e4 a8 e8 1f d1 03 2c 54 |0D. B.6.......,T| +00000010 08 33 49 2c a0 e6 9d e2 4e 10 2f f4 03 8f 1f 07 |.3I,....N./.....| +00000020 ef 9a af 12 02 20 29 ad 5f 1b 8d e8 b0 33 a5 20 |..... )._....3. | +00000030 ae 2d 97 79 ba c1 a3 a1 b6 f2 f7 62 cc b3 74 f4 |.-.y.......b..t.| +00000040 91 85 a0 fa 29 4d |....)M|" +"2019-05-02 09:27:32.524 UTC [protoutils] checkSignatureFromCreator -> DEBU 1264 exits successfully" +"2019-05-02 09:27:32.525 UTC [protoutils] validateEndorserTransaction -> DEBU 1265 validateEndorserTransaction starts for data 0xc002ea0000, header channel_header:"\010\003\032\014\010\202\360\252\346\005\020\330\222\201\324\001\"\017businesschannel*@fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\240\274\353\251\345HY\035\373[\177M\244i/\263LJu\341\014\023!\257" " +"2019-05-02 09:27:32.525 UTC [protoutils] validateEndorserTransaction -> DEBU 1266 validateEndorserTransaction info: there are 1 actions" +"2019-05-02 09:27:32.525 UTC [protoutils] validateEndorserTransaction -> DEBU 1267 validateEndorserTransaction info: signature header is valid" +"2019-05-02 09:27:32.526 UTC [protoutils] ValidateTransaction -> DEBU 1268 ValidateTransactionEnvelope returns err %!s()" +"2019-05-02 09:27:32.526 UTC [committer.txvalidator] validateTx -> DEBU 1269 Transaction is for channel businesschannel" +"2019-05-02 09:27:32.526 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 126a retrieveTransactionByID() - txId = [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd]" +"2019-05-02 09:27:32.526 UTC [committer.txvalidator] validateTx -> DEBU 126b Validating transaction with plugins" +"2019-05-02 09:27:32.528 UTC [committer.txvalidator] Dispatch -> DEBU 126c [businesschannel] Dispatch starts for bytes 0xc002e14000" +"2019-05-02 09:27:32.528 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 126d constructing new query executor txid = [39a75287-65c7-4891-a529-ad2e91f2f4cf]" +"2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] Done -> DEBU 126e Done with transaction simulation / query execution [39a75287-65c7-4891-a529-ad2e91f2f4cf]" +"2019-05-02 09:27:32.529 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 126f Validating Tx fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" +"2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1270 constructing new query executor txid = [6d641d1e-f39e-4b7a-ab54-09ac2b80c369]" +"2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1271 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1272 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:32.529 UTC [lockbasedtxmgr] Done -> DEBU 1273 Done with transaction simulation / query execution [6d641d1e-f39e-4b7a-ab54-09ac2b80c369]" +"2019-05-02 09:27:32.530 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1274 constructing new query executor txid = [5c072d0a-d7ec-4837-96e8-ef7bf252489d]" +"2019-05-02 09:27:32.530 UTC [lockbasedtxmgr] Done -> DEBU 1275 Done with transaction simulation / query execution [5c072d0a-d7ec-4837-96e8-ef7bf252489d]" +"2019-05-02 09:27:32.530 UTC [policies] Evaluate -> DEBU 1276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" +"2019-05-02 09:27:32.530 UTC [cauthdsl] func1 -> DEBU 1277 0xc00313e930 gate 1556789252530857800 evaluation starts" +"2019-05-02 09:27:32.531 UTC [cauthdsl] func2 -> DEBU 1278 0xc00313e930 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.531 UTC [cauthdsl] func2 -> DEBU 1279 0xc00313e930 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.531 UTC [cauthdsl] func2 -> DEBU 127a 0xc00313e930 principal matched by identity 0" +"2019-05-02 09:27:32.531 UTC [msp.identity] Verify -> DEBU 127b Verify: digest = 00000000 59 27 5d c2 6d 27 9c 6b f4 ca 4f 2d 33 7a b3 b2 |Y'].m'.k..O-3z..| +00000010 1d 44 cb 41 64 c9 b1 4b 4e ff 37 82 e8 5a 8b 47 |.D.Ad..KN.7..Z.G|" +"2019-05-02 09:27:32.531 UTC [msp.identity] Verify -> DEBU 127c Verify: sig = 00000000 30 44 02 20 53 34 c0 6c e1 74 af 1f 73 8d 3d c8 |0D. S4.l.t..s.=.| +00000010 5d 09 a9 19 d1 b3 ca 3e d2 23 15 63 01 2f d3 2c |]......>.#.c./.,| +00000020 96 da 17 3c 02 20 71 7b ee a2 39 c5 b0 78 71 c3 |...<. q{..9..xq.| +00000030 3d 35 05 fc 45 d3 49 9b a6 29 4a 0b 9a 93 d6 21 |=5..E.I..)J....!| +00000040 fc 6a 01 f5 6d d6 |.j..m.|" +"2019-05-02 09:27:32.532 UTC [cauthdsl] func2 -> DEBU 127d 0xc00313e930 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.532 UTC [cauthdsl] func1 -> DEBU 127e 0xc00313e930 gate 1556789252530857800 evaluation succeeds" +"2019-05-02 09:27:32.532 UTC [policies] Evaluate -> DEBU 127f Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:32.532 UTC [policies] Evaluate -> DEBU 1280 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1281 constructing new query executor txid = [c2f77205-d7b6-4f22-8985-c5b15a1f8384]" +"2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1282 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1283 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:32.532 UTC [lockbasedtxmgr] Done -> DEBU 1284 Done with transaction simulation / query execution [c2f77205-d7b6-4f22-8985-c5b15a1f8384]" +"2019-05-02 09:27:32.533 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1285 constructing new query executor txid = [3e7b4ad6-eed9-45d9-9625-04ef9a0b29d5]" +"2019-05-02 09:27:32.533 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1286 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:32.533 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1287 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:32.534 UTC [lockbasedtxmgr] Done -> DEBU 1288 Done with transaction simulation / query execution [3e7b4ad6-eed9-45d9-9625-04ef9a0b29d5]" +"2019-05-02 09:27:32.534 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1289 constructing new query executor txid = [12b0d5ea-e63f-4a2b-b063-7eb3486a2798]" +"2019-05-02 09:27:32.535 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 128a retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128b Obtaining identity" +"2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128c Obtaining identity" +"2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128d Obtaining identity" +"2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 128e Obtaining identity" +"2019-05-02 09:27:32.536 UTC [gossip.comm] Send -> DEBU 128f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 1290 Obtaining identity" +"2019-05-02 09:27:32.536 UTC [msp] DeserializeIdentity -> DEBU 1291 Obtaining identity" +"2019-05-02 09:27:32.536 UTC [gossip.comm] sendToEndpoint -> DEBU 1292 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.536 UTC [gossip.comm] sendToEndpoint -> DEBU 1293 Exiting" +"2019-05-02 09:27:32.535 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1294 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:32.538 UTC [lockbasedtxmgr] Done -> DEBU 1295 Done with transaction simulation / query execution [12b0d5ea-e63f-4a2b-b063-7eb3486a2798]" +"2019-05-02 09:27:32.538 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1296 constructing new query executor txid = [e47bebb9-396b-47ba-8ea5-a374711bdc94]" +"2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1297 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1298 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] Done -> DEBU 1299 Done with transaction simulation / query execution [e47bebb9-396b-47ba-8ea5-a374711bdc94]" +"2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 129a constructing new query executor txid = [acc501dc-251f-4568-ad6e-1ffa097d3d4c]" +"2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 129b retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 129c retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:32.539 UTC [lockbasedtxmgr] Done -> DEBU 129d Done with transaction simulation / query execution [acc501dc-251f-4568-ad6e-1ffa097d3d4c]" +"2019-05-02 09:27:32.539 UTC [vscc] Validate -> DEBU 129e block 4, namespace: _lifecycle, tx 0 validation results is: " +"2019-05-02 09:27:32.539 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 129f Transaction fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd appears to be valid" +"2019-05-02 09:27:32.539 UTC [committer.txvalidator] Dispatch -> DEBU 12a0 [businesschannel] Dispatch completes env bytes 0xc002e14000" +"2019-05-02 09:27:32.540 UTC [committer.txvalidator] Validate -> DEBU 12a1 got result for idx 0, code 0" +"2019-05-02 09:27:32.540 UTC [committer.txvalidator] Validate -> INFO 12a2 [businesschannel] Validated block [4] in 21ms" +"2019-05-02 09:27:32.540 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 12a3 constructing new query executor txid = [d87541d3-71c5-4730-a0e1-4fa2a30eb11f]" +"2019-05-02 09:27:32.540 UTC [lockbasedtxmgr] Done -> DEBU 12a4 Done with transaction simulation / query execution [d87541d3-71c5-4730-a0e1-4fa2a30eb11f]" +"2019-05-02 09:27:32.541 UTC [msp] GetManagerForChain -> DEBU 12a5 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:32.541 UTC [cauthdsl] func1 -> DEBU 12a6 0xc002e138c0 gate 1556789252541101200 evaluation starts" +"2019-05-02 09:27:32.542 UTC [cauthdsl] func2 -> DEBU 12a7 0xc002e138c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.542 UTC [cauthdsl] func2 -> DEBU 12a8 0xc002e138c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.542 UTC [cauthdsl] func2 -> DEBU 12a9 0xc002e138c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-05-02 09:27:32.543 UTC [cauthdsl] func2 -> DEBU 12aa 0xc002e138c0 principal evaluation fails" +"2019-05-02 09:27:32.543 UTC [cauthdsl] func1 -> DEBU 12ab 0xc002e138c0 gate 1556789252541101200 evaluation fails" +"2019-05-02 09:27:32.543 UTC [gossip.privdata] isEligible -> DEBU 12ac Skipping namespace _lifecycle collection _implicit_org_Org2MSP because we're not eligible for the private data" +"2019-05-02 09:27:32.545 UTC [gossip.privdata] inspectTransaction -> DEBU 12ad Peer is not eligible for collection, channel [businesschannel], chaincode [_lifecycle], collection name [_implicit_org_Org2MSP], txID [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] the policy is [&privdata.SimpleCollection{name:"_implicit_org_Org2MSP", accessPolicy:(*cauthdsl.policy)(0xc002e11da0), memberOrgs:[]string{"Org2MSP"}, conf:common.StaticCollectionConfig{Name:"_implicit_org_Org2MSP", MemberOrgsPolicy:(*common.CollectionPolicyConfig)(0xc0034acdb0), RequiredPeerCount:0, MaximumPeerCount:0, BlockToLive:0x0, MemberOnlyRead:false, MemberOnlyWrite:false, XXX_NoUnkeyedLiteral:struct {}{}, XXX_unrecognized:[]uint8(nil), XXX_sizecache:0}}]. Skipping." +"2019-05-02 09:27:32.545 UTC [gossip.privdata] listMissingPrivateData -> DEBU 12ae Retrieving private write sets for 0 transactions from transient store" +"2019-05-02 09:27:32.545 UTC [gossip.privdata] StoreBlock -> DEBU 12af [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-05-02 09:27:32.545 UTC [kvledger] CommitWithPvtData -> DEBU 12b0 [businesschannel] Validating state for block [4]" +"2019-05-02 09:27:32.545 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12b1 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:27:32.545 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12b2 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-05-02 09:27:32.545 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12b3 Validating new block with num trans = [1]" +"2019-05-02 09:27:32.545 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b4 ValidateAndPrepareBatch() for block number = [4]" +"2019-05-02 09:27:32.545 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b5 preprocessing ProtoBlock..." +"2019-05-02 09:27:32.546 UTC [valimpl] preprocessProtoBlock -> DEBU 12b6 txType=ENDORSER_TRANSACTION" +"2019-05-02 09:27:32.546 UTC [stateleveldb] GetState -> DEBU 12b7 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:32.546 UTC [statebasedval] validateKVRead -> DEBU 12b8 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-05-02 09:27:32.546 UTC [stateleveldb] GetState -> DEBU 12b9 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +"2019-05-02 09:27:32.546 UTC [stateleveldb] GetState -> DEBU 12ba GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-05-02 09:27:32.546 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 12bb Block [4] Transaction index [0] TxId [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-05-02 09:27:32.546 UTC [valinternal] ApplyWriteSet -> DEBU 12bc txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc0030e2d40), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc0030e2e00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0030e2cc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc0030e2d00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4 DEBU 12bd validating rwset..." +"2019-05-02 09:27:32.546 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12be postprocessing ProtoBlock..." +"2019-05-02 09:27:32.546 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12bf ValidateAndPrepareBatch() complete" +"2019-05-02 09:27:32.546 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c0 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x2637700 0xc0004446c0 0x27475e0 0xc000011220}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0022c0dc0 map[]})]}" +"2019-05-02 09:27:32.546 UTC [cceventmgmt] HandleStateUpdates -> DEBU 12c1 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" +"2019-05-02 09:27:32.546 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 12c2 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" +"2019-05-02 09:27:32.546 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c3 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0})}" +"2019-05-02 09:27:32.546 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c4 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 184 141 138 176 125 192 58 83 1 250 26 202 161 54 104 45 229 195 166 43 96 100 9 159 109 154 254 234 147 189 33 229 2 32 120 2 28 36 139 185 5 29 110 69 153 220 53 183 5 154 146 86 140 197 1 134 231 194 84 112 80 242 124 44 67 58]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002604a00 0xc002598700 0xc0025cc980})]}" +"2019-05-02 09:27:32.546 UTC [confighistory] HandleStateUpdates -> ERRO 12c5 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003770140)}" +"2019-05-02 09:27:32.547 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12c6 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000ebc0})}" +"2019-05-02 09:27:32.547 UTC [kvledger] CommitWithPvtData -> DEBU 12c7 [businesschannel] Committing block [4] to storage" +"2019-05-02 09:27:32.547 UTC [ledgerstorage] CommitWithPvtData -> DEBU 12c8 Writing block [4] to pvt block store" +"2019-05-02 09:27:32.547 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 12c9 constructing new query executor txid = [998036b2-24f2-4003-aed9-57d7cb5f0fe7]" +"2019-05-02 09:27:32.547 UTC [lockbasedtxmgr] Done -> DEBU 12ca Done with transaction simulation / query execution [998036b2-24f2-4003-aed9-57d7cb5f0fe7]" +"2019-05-02 09:27:32.539 UTC [committer.txvalidator] validateTx -> DEBU 12cb [businesschannel] validateTx completes for block 0xc0030e2340 env 0xc002e393b0 txn 0" +"2019-05-02 09:27:32.550 UTC [pvtdatastorage] Prepare -> DEBU 12cc Saved 0 private data write sets for block [4]" +"2019-05-02 09:27:32.555 UTC [fsblkstorage] indexBlock -> DEBU 12cd Indexing block [blockNum=4, blockHash=[]byte{0x3f, 0x8b, 0xa1, 0x1f, 0x8f, 0x88, 0xc1, 0xba, 0x58, 0x69, 0x5b, 0x7b, 0xae, 0x78, 0x89, 0x9c, 0xeb, 0xc3, 0x4b, 0xbf, 0x99, 0xfe, 0xf3, 0x9e, 0xef, 0xe7, 0xb4, 0x8a, 0xe5, 0xe4, 0xa4, 0x51} txOffsets= +txId=fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd locPointer=offset=70, bytesLength=3703 ]" -"2019-05-02 01:31:01.751 UTC [fsblkstorage] indexBlock -> DEBU 14f4 Adding txLoc [fileSuffixNum=0, offset=76156, bytesLength=3704] for tx ID: [cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885] to txid-index" -"2019-05-02 01:31:01.751 UTC [fsblkstorage] indexBlock -> DEBU 14f5 Adding txLoc [fileSuffixNum=0, offset=76156, bytesLength=3704] for tx number:[0] ID: [cbe958b7a8ffb52c23b1cac7656b96d4d6fb723507aae1400c9f2fd75f638885] to blockNumTranNum index" -"2019-05-02 01:31:01.756 UTC [fsblkstorage] updateCheckpoint -> DEBU 14f6 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80797], isChainEmpty=[false], lastBlockNumber=[4]" -"2019-05-02 01:31:01.756 UTC [pvtdatastorage] Commit -> DEBU 14f7 Committing private data for block [4]" -"2019-05-02 01:31:01.759 UTC [pvtdatastorage] Commit -> DEBU 14f8 Committed private data for block [4]" -"2019-05-02 01:31:01.759 UTC [kvledger] CommitWithPvtData -> DEBU 14f9 [businesschannel] Committing block [4] transactions to state database" -"2019-05-02 01:31:01.759 UTC [lockbasedtxmgr] Commit -> DEBU 14fa lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-05-02 01:31:01.759 UTC [lockbasedtxmgr] Commit -> DEBU 14fb Committing updates to state database" -"2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 14fc Building the expiry schedules based on the update batch" -"2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 14fd Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" -"2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 14fe Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" -"2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 14ff Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" -"2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1500 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" -"2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1501 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" -"2019-05-02 01:31:01.759 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1502 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" -"2019-05-02 01:31:01.759 UTC [lockbasedtxmgr] Commit -> DEBU 1503 Write lock acquired for committing updates to state database" -"2019-05-02 01:31:01.759 UTC [stateleveldb] ApplyUpdates -> DEBU 1504 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" -"2019-05-02 01:31:01.759 UTC [stateleveldb] ApplyUpdates -> DEBU 1505 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" -"2019-05-02 01:31:01.760 UTC [stateleveldb] ApplyUpdates -> DEBU 1506 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" -"2019-05-02 01:31:01.760 UTC [stateleveldb] ApplyUpdates -> DEBU 1507 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���R���l� DEBU 1508 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" -"2019-05-02 01:31:01.760 UTC [stateleveldb] ApplyUpdates -> DEBU 1509 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" -"2019-05-02 01:31:01.763 UTC [lockbasedtxmgr] Commit -> DEBU 150a Updates committed to state database and the write lock is released" -"2019-05-02 01:31:01.763 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 150b Preparing potential purge list working-set for expiringAtBlk [5]" -"2019-05-02 01:31:01.763 UTC [lockbasedtxmgr] func1 -> DEBU 150c launched the background routine for preparing keys to purge with the next block" -"2019-05-02 01:31:01.764 UTC [kvledger] CommitWithPvtData -> DEBU 150d [businesschannel] Committing block [4] transactions to history database" -"2019-05-02 01:31:01.764 UTC [historyleveldb] Commit -> DEBU 150e Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" -"2019-05-02 01:31:01.764 UTC [leveldbhelper] GetIterator -> DEBU 150f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" -"2019-05-02 01:31:01.765 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1510 No expiry entry found for expiringAtBlk [5]" -"2019-05-02 01:31:01.767 UTC [historyleveldb] Commit -> DEBU 1511 Channel [businesschannel]: Updates committed to history database for blockNo [4]" -"2019-05-02 01:31:01.767 UTC [kvledger] CommitWithPvtData -> INFO 1512 [businesschannel] Committed block [4] with 1 transaction(s) in 43ms (state_validation=8ms block_commit=27ms state_commit=4ms)" -"2019-05-02 01:31:01.767 UTC [msp.identity] Sign -> DEBU 1513 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020805 " -"2019-05-02 01:31:01.767 UTC [msp.identity] Sign -> DEBU 1514 Sign: digest: 5165A8F53D66BD4CEAE102F75E302FA655DAAC09E916BCE3886689A2A0EA8AB9 " -"2019-05-02 01:31:01.768 UTC [gossip.state] commitBlock -> DEBU 1515 [businesschannel] Committed block [4] with 1 transaction(s)" -"2019-05-02 01:31:01.818 UTC [gossip.pull] Hello -> DEBU 1516 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:01.819 UTC [gossip.comm] Send -> DEBU 1517 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:01.819 UTC [gossip.pull] Hello -> DEBU 1518 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:01.819 UTC [gossip.comm] Send -> DEBU 1519 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:01.819 UTC [gossip.pull] Hello -> DEBU 151a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:01.819 UTC [gossip.comm] Send -> DEBU 151b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:01.819 UTC [gossip.comm] sendToEndpoint -> DEBU 151c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.819 UTC [gossip.comm] sendToEndpoint -> DEBU 151d Exiting" -"2019-05-02 01:31:01.819 UTC [gossip.comm] sendToEndpoint -> DEBU 151e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.819 UTC [gossip.comm] sendToEndpoint -> DEBU 151f Exiting" -"2019-05-02 01:31:01.820 UTC [gossip.comm] sendToEndpoint -> DEBU 1520 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.820 UTC [gossip.comm] sendToEndpoint -> DEBU 1521 Exiting" -"2019-05-02 01:31:01.826 UTC [gossip.comm] func1 -> DEBU 1522 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14339184248847463259 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.826 UTC [gossip.gossip] handleMessage -> DEBU 1523 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14339184248847463259 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.826 UTC [gossip.pull] HandleMessage -> DEBU 1524 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14339184248847463259 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.827 UTC [gossip.gossip] handleMessage -> DEBU 1525 Exiting" -"2019-05-02 01:31:01.828 UTC [gossip.gossip] handleMessage -> DEBU 1526 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7420334789798993735 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.828 UTC [gossip.pull] HandleMessage -> DEBU 1527 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7420334789798993735 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.828 UTC [gossip.gossip] handleMessage -> DEBU 1528 Exiting" -"2019-05-02 01:31:01.828 UTC [gossip.comm] func1 -> DEBU 1529 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10075696068903467186 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.829 UTC [gossip.gossip] handleMessage -> DEBU 152a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10075696068903467186 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.829 UTC [gossip.pull] HandleMessage -> DEBU 152b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10075696068903467186 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.830 UTC [gossip.gossip] handleMessage -> DEBU 152c Exiting" -"2019-05-02 01:31:01.888 UTC [gossip.comm] func1 -> DEBU 152d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.888 UTC [gossip.gossip] handleMessage -> DEBU 152e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.888 UTC [gossip.gossip] handleMessage -> DEBU 152f Exiting" -"2019-05-02 01:31:01.888 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1530 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.888 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1531 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:01.888 UTC [msp] DeserializeIdentity -> DEBU 1532 Obtaining identity" -"2019-05-02 01:31:01.889 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1533 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:01.889 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1534 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.889 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1535 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.890 UTC [policies] Evaluate -> DEBU 1536 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:01.890 UTC [policies] Evaluate -> DEBU 1537 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:01.890 UTC [policies] Evaluate -> DEBU 1538 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:01.890 UTC [cauthdsl] func1 -> DEBU 1539 0xc003941500 gate 1556760661890214700 evaluation starts" -"2019-05-02 01:31:01.890 UTC [cauthdsl] func2 -> DEBU 153a 0xc003941500 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:01.890 UTC [cauthdsl] func2 -> DEBU 153b 0xc003941500 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:01.890 UTC [cauthdsl] func2 -> DEBU 153c 0xc003941500 principal matched by identity 0" -"2019-05-02 01:31:01.890 UTC [msp.identity] Verify -> DEBU 153d Verify: digest = 00000000 39 ba 15 2e 21 51 1e 04 d6 10 c1 70 5f 25 e4 4d |9...!Q.....p_%.M| -00000010 ca bd c0 c8 36 db 28 69 10 90 9d 61 eb 52 f4 7b |....6.(i...a.R.{|" -"2019-05-02 01:31:01.890 UTC [msp.identity] Verify -> DEBU 153e Verify: sig = 00000000 30 44 02 20 33 81 67 65 ee 2b 37 4c 2f 2c 0a a0 |0D. 3.ge.+7L/,..| -00000010 54 a0 3b 21 72 03 28 57 dc b8 e0 f1 e7 d4 99 cd |T.;!r.(W........| -00000020 87 0f 3f 98 02 20 77 b9 d3 d6 d0 72 26 49 3c 87 |..?.. w....r&I<.| -00000030 2d fd 99 46 18 fa 37 74 a8 22 6a 63 3f 71 78 d3 |-..F..7t."jc?qx.| -00000040 8d 3a 03 26 2e e1 |.:.&..|" -"2019-05-02 01:31:01.890 UTC [cauthdsl] func2 -> DEBU 153f 0xc003941500 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:01.890 UTC [cauthdsl] func1 -> DEBU 1540 0xc003941500 gate 1556760661890214700 evaluation succeeds" -"2019-05-02 01:31:01.890 UTC [policies] Evaluate -> DEBU 1541 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.891 UTC [policies] Evaluate -> DEBU 1542 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.891 UTC [policies] Evaluate -> DEBU 1543 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:01.891 UTC [policies] Evaluate -> DEBU 1544 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:01.891 UTC [gossip.discovery] handleAliveMessage -> DEBU 1545 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:01.891 UTC [gossip.discovery] learnExistingMembers -> DEBU 1546 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:01.891 UTC [gossip.discovery] learnExistingMembers -> DEBU 1547 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 " -"2019-05-02 01:31:01.891 UTC [gossip.discovery] learnExistingMembers -> DEBU 1548 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 " -"2019-05-02 01:31:01.891 UTC [gossip.discovery] learnExistingMembers -> DEBU 1549 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:01.892 UTC [gossip.discovery] learnExistingMembers -> DEBU 154a Exiting" -"2019-05-02 01:31:01.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 154b Exiting" -"2019-05-02 01:31:01.892 UTC [gossip.discovery] handleMsgFromComm -> DEBU 154c Exiting" -"2019-05-02 01:31:01.892 UTC [gossip.discovery] sendMemResponse -> DEBU 154d Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:01.892 UTC [msp] DeserializeIdentity -> DEBU 154e Obtaining identity" -"2019-05-02 01:31:01.892 UTC [msp] DeserializeIdentity -> DEBU 154f Obtaining identity" -"2019-05-02 01:31:01.892 UTC [msp] DeserializeIdentity -> DEBU 1550 Obtaining identity" -"2019-05-02 01:31:01.892 UTC [gossip.comm] Send -> DEBU 1551 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:01.892 UTC [gossip.discovery] sendMemResponse -> DEBU 1552 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:01.892 UTC [gossip.comm] sendToEndpoint -> DEBU 1553 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.892 UTC [gossip.comm] sendToEndpoint -> DEBU 1554 Exiting" -"2019-05-02 01:31:01.903 UTC [msp.identity] Sign -> DEBU 1555 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151016 " -"2019-05-02 01:31:01.903 UTC [msp.identity] Sign -> DEBU 1556 Sign: digest: 960814249B26FBE15EB992048586816B0FDAF1AB38137819F896C8602B7B091F " -"2019-05-02 01:31:01.909 UTC [msp.identity] Sign -> DEBU 1557 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:01.909 UTC [msp.identity] Sign -> DEBU 1558 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:01.909 UTC [msp] DeserializeIdentity -> DEBU 1559 Obtaining identity" -"2019-05-02 01:31:01.909 UTC [gossip.comm] Send -> DEBU 155a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:01.909 UTC [gossip.comm] Send -> DEBU 155b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:01.909 UTC [msp] DeserializeIdentity -> DEBU 155c Obtaining identity" -"2019-05-02 01:31:01.910 UTC [gossip.comm] Send -> DEBU 155d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:01.910 UTC [gossip.comm] sendToEndpoint -> DEBU 155e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.910 UTC [gossip.comm] sendToEndpoint -> DEBU 155f Exiting" -"2019-05-02 01:31:01.910 UTC [gossip.election] waitForInterrupt -> DEBU 1560 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:01.910 UTC [gossip.election] IsLeader -> DEBU 1561 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:01.910 UTC [msp.identity] Sign -> DEBU 1562 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510051801 " -"2019-05-02 01:31:01.910 UTC [msp.identity] Sign -> DEBU 1563 Sign: digest: 62CF37588B94F90E7225DE2446BB8B95744251D5243D230FE67E761B21D4F3B3 " -"2019-05-02 01:31:01.910 UTC [gossip.election] waitForInterrupt -> DEBU 1564 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:01.910 UTC [gossip.comm] sendToEndpoint -> DEBU 1565 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.910 UTC [gossip.comm] sendToEndpoint -> DEBU 1566 Exiting" -"2019-05-02 01:31:01.910 UTC [gossip.comm] sendToEndpoint -> DEBU 1567 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.911 UTC [gossip.comm] sendToEndpoint -> DEBU 1568 Exiting" -"2019-05-02 01:31:01.928 UTC [gossip.comm] func1 -> DEBU 1569 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.929 UTC [gossip.gossip] handleMessage -> DEBU 156a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.930 UTC [gossip.gossip] handleMessage -> DEBU 156b Exiting" -"2019-05-02 01:31:01.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.930 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 156d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:01.931 UTC [msp] DeserializeIdentity -> DEBU 156e Obtaining identity" -"2019-05-02 01:31:01.933 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 156f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:01.935 UTC [msp] DeserializeIdentity -> DEBU 1570 Obtaining identity" -"2019-05-02 01:31:01.935 UTC [msp] DeserializeIdentity -> DEBU 1571 Obtaining identity" -"2019-05-02 01:31:01.936 UTC [msp] DeserializeIdentity -> DEBU 1572 Obtaining identity" -"2019-05-02 01:31:01.936 UTC [msp] DeserializeIdentity -> DEBU 1573 Obtaining identity" -"2019-05-02 01:31:01.941 UTC [gossip.gossip] handleMessage -> DEBU 1576 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.942 UTC [gossip.comm] Send -> DEBU 1577 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:01.943 UTC [msp] DeserializeIdentity -> DEBU 1578 Obtaining identity" -"2019-05-02 01:31:01.944 UTC [msp] DeserializeIdentity -> DEBU 1579 Obtaining identity" -"2019-05-02 01:31:01.945 UTC [gossip.comm] sendToEndpoint -> DEBU 157a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -"2019-05-02 01:31:01.945 UTC [gossip.comm] sendToEndpoint -> DEBU 157b Exiting" -"2019-05-02 01:31:01.933 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1574 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.945 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157c Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.946 UTC [policies] Evaluate -> DEBU 157d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:01.946 UTC [policies] Evaluate -> DEBU 157e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:01.946 UTC [policies] Evaluate -> DEBU 157f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:01.946 UTC [cauthdsl] func1 -> DEBU 1580 0xc00398e4c0 gate 1556760661946440100 evaluation starts" -"2019-05-02 01:31:01.946 UTC [cauthdsl] func2 -> DEBU 1581 0xc00398e4c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:01.946 UTC [cauthdsl] func2 -> DEBU 1582 0xc00398e4c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:01.946 UTC [cauthdsl] func2 -> DEBU 1583 0xc00398e4c0 principal matched by identity 0" -"2019-05-02 01:31:01.939 UTC [gossip.comm] func1 -> DEBU 1575 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.948 UTC [msp.identity] Verify -> DEBU 1584 Verify: digest = 00000000 1c 18 a8 eb ae 1c e1 1f f1 ff a2 67 7a d4 cf 47 |...........gz..G| -00000010 6e cd c0 10 f6 06 57 d2 72 ee 73 11 96 88 58 d8 |n.....W.r.s...X.|" -"2019-05-02 01:31:01.948 UTC [msp.identity] Verify -> DEBU 1585 Verify: sig = 00000000 30 45 02 21 00 d3 58 da 0c c6 a3 fe af e2 0b 34 |0E.!..X........4| -00000010 4d fd c7 5b 6d 41 65 c9 06 24 17 49 76 cc c9 13 |M..[mAe..$.Iv...| -00000020 b3 0d 7a ab 68 02 20 48 73 5c c5 92 3a 1b 60 ea |..z.h. Hs\..:.`.| -00000030 94 36 48 8d 92 fc db 7a 82 73 20 1d 71 d1 73 59 |.6H....z.s .q.sY| -00000040 52 8c 3d 22 c6 34 07 |R.=".4.|" -"2019-05-02 01:31:01.949 UTC [cauthdsl] func2 -> DEBU 1586 0xc00398e4c0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:01.950 UTC [cauthdsl] func1 -> DEBU 1587 0xc00398e4c0 gate 1556760661946440100 evaluation succeeds" -"2019-05-02 01:31:01.953 UTC [policies] Evaluate -> DEBU 1588 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.953 UTC [policies] Evaluate -> DEBU 1589 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.953 UTC [policies] Evaluate -> DEBU 158a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:01.954 UTC [policies] Evaluate -> DEBU 158b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:01.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 158c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 158d Exiting" -"2019-05-02 01:31:01.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 158e Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:01.955 UTC [msp.identity] Verify -> DEBU 158f Verify: digest = 00000000 96 08 14 24 9b 26 fb e1 5e b9 92 04 85 86 81 6b |...$.&..^......k| -00000010 0f da f1 ab 38 13 78 19 f8 96 c8 60 2b 7b 09 1f |....8.x....`+{..|" -"2019-05-02 01:31:01.955 UTC [msp.identity] Verify -> DEBU 1590 Verify: sig = 00000000 30 45 02 21 00 d6 1b 95 79 d1 4b 95 38 5a a7 99 |0E.!....y.K.8Z..| -00000010 56 9e dd 53 78 ee fa 5e 28 8d d1 89 83 13 57 87 |V..Sx..^(.....W.| -00000020 e3 53 88 0b 5d 02 20 1e 6d ee 24 98 79 d0 35 9b |.S..]. .m.$.y.5.| -00000030 74 c0 29 1d 80 2d c0 af 00 c4 b4 64 0a c3 9f 8d |t.)..-.....d....| -00000040 74 86 66 d8 ea 79 f3 |t.f..y.|" -"2019-05-02 01:31:01.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 1591 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.960 UTC [gossip.discovery] isSentByMe -> DEBU 1592 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 1593 Exiting" -"2019-05-02 01:31:01.962 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1594 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:01.966 UTC [msp.identity] Verify -> DEBU 1595 Verify: digest = 00000000 60 c3 5c ba c3 da 37 33 42 1a 58 5d fa 58 58 87 |`.\...73B.X].XX.| -00000010 41 70 57 93 6e 37 1f f7 c5 e8 b7 de 3e 20 5c 7a |ApW.n7......> \z|" -"2019-05-02 01:31:01.966 UTC [msp.identity] Verify -> DEBU 1596 Verify: sig = 00000000 30 45 02 21 00 eb d4 b7 27 51 e9 4e 65 ce 99 ab |0E.!....'Q.Ne...| -00000010 ba ec 46 fb 8d cf 8c 6e a0 1d a4 c3 c2 5b 44 b6 |..F....n.....[D.| -00000020 6e 7d 9a 29 b4 02 20 19 51 69 59 18 1d a9 ab f4 |n}.).. .QiY.....| -00000030 6c 67 96 57 7e 89 e8 15 42 62 aa 33 08 a4 46 3b |lg.W~...Bb.3..F;| -00000040 3c 8f b7 46 61 f1 96 |<..Fa..|" -"2019-05-02 01:31:01.967 UTC [gossip.discovery] handleAliveMessage -> DEBU 1597 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.967 UTC [gossip.discovery] handleAliveMessage -> DEBU 1598 Exiting" -"2019-05-02 01:31:01.967 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1599 Exiting" -"2019-05-02 01:31:01.967 UTC [gossip.discovery] handleMsgFromComm -> DEBU 159a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.967 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 159b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:01.968 UTC [msp.identity] Verify -> DEBU 159c Verify: digest = 00000000 96 08 14 24 9b 26 fb e1 5e b9 92 04 85 86 81 6b |...$.&..^......k| -00000010 0f da f1 ab 38 13 78 19 f8 96 c8 60 2b 7b 09 1f |....8.x....`+{..|" -"2019-05-02 01:31:01.968 UTC [msp.identity] Verify -> DEBU 159d Verify: sig = 00000000 30 45 02 21 00 d6 1b 95 79 d1 4b 95 38 5a a7 99 |0E.!....y.K.8Z..| -00000010 56 9e dd 53 78 ee fa 5e 28 8d d1 89 83 13 57 87 |V..Sx..^(.....W.| -00000020 e3 53 88 0b 5d 02 20 1e 6d ee 24 98 79 d0 35 9b |.S..]. .m.$.y.5.| -00000030 74 c0 29 1d 80 2d c0 af 00 c4 b4 64 0a c3 9f 8d |t.)..-.....d....| -00000040 74 86 66 d8 ea 79 f3 |t.f..y.|" -"2019-05-02 01:31:01.968 UTC [msp.identity] Verify -> DEBU 159e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:27:32.555 UTC [fsblkstorage] indexBlock -> DEBU 12ce Adding txLoc [fileSuffixNum=0, offset=76154, bytesLength=3703] for tx ID: [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] to txid-index" +"2019-05-02 09:27:32.555 UTC [fsblkstorage] indexBlock -> DEBU 12cf Adding txLoc [fileSuffixNum=0, offset=76154, bytesLength=3703] for tx number:[0] ID: [fd8294ef675ef6f3e879eb6e225358bf6bc3410ae3b76d2fb0f88ccf51286cbd] to blockNumTranNum index" +"2019-05-02 09:27:32.559 UTC [fsblkstorage] updateCheckpoint -> DEBU 12d0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80794], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-05-02 09:27:32.568 UTC [pvtdatastorage] Commit -> DEBU 12d1 Committing private data for block [4]" +"2019-05-02 09:27:32.584 UTC [pvtdatastorage] Commit -> DEBU 12d2 Committed private data for block [4]" +"2019-05-02 09:27:32.584 UTC [kvledger] CommitWithPvtData -> DEBU 12d3 [businesschannel] Committing block [4] transactions to state database" +"2019-05-02 09:27:32.584 UTC [lockbasedtxmgr] Commit -> DEBU 12d4 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-05-02 09:27:32.584 UTC [lockbasedtxmgr] Commit -> DEBU 12d5 Committing updates to state database" +"2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d6 Building the expiry schedules based on the update batch" +"2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d7 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" +"2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d8 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" +"2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d9 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" +"2019-05-02 09:27:32.584 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12da Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" +"2019-05-02 09:27:32.585 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12db Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" +"2019-05-02 09:27:32.585 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12dc Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" +"2019-05-02 09:27:32.585 UTC [lockbasedtxmgr] Commit -> DEBU 12dd Write lock acquired for committing updates to state database" +"2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12de Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" +"2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12df Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" +"2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12e0 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" +"2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12e1 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���R���l� DEBU 12e2 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" +"2019-05-02 09:27:32.585 UTC [stateleveldb] ApplyUpdates -> DEBU 12e3 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" +"2019-05-02 09:27:32.591 UTC [lockbasedtxmgr] Commit -> DEBU 12e4 Updates committed to state database and the write lock is released" +"2019-05-02 09:27:32.591 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 12e5 Preparing potential purge list working-set for expiringAtBlk [5]" +"2019-05-02 09:27:32.591 UTC [lockbasedtxmgr] func1 -> DEBU 12e6 launched the background routine for preparing keys to purge with the next block" +"2019-05-02 09:27:32.591 UTC [kvledger] CommitWithPvtData -> DEBU 12e7 [businesschannel] Committing block [4] transactions to history database" +"2019-05-02 09:27:32.591 UTC [historyleveldb] Commit -> DEBU 12e8 Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" +"2019-05-02 09:27:32.591 UTC [leveldbhelper] GetIterator -> DEBU 12e9 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" +"2019-05-02 09:27:32.592 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 12ea No expiry entry found for expiringAtBlk [5]" +"2019-05-02 09:27:32.596 UTC [historyleveldb] Commit -> DEBU 12eb Channel [businesschannel]: Updates committed to history database for blockNo [4]" +"2019-05-02 09:27:32.596 UTC [kvledger] CommitWithPvtData -> INFO 12ec [businesschannel] Committed block [4] with 1 transaction(s) in 50ms (state_validation=1ms block_commit=37ms state_commit=7ms)" +"2019-05-02 09:27:32.596 UTC [msp.identity] Sign -> DEBU 12ed Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020805 " +"2019-05-02 09:27:32.596 UTC [msp.identity] Sign -> DEBU 12ee Sign: digest: 0820A4F8A9A920346EFDE259113FB688CD3C1B3AF119364D48D5269BDEF9ED35 " +"2019-05-02 09:27:32.597 UTC [gossip.state] commitBlock -> DEBU 12ef [businesschannel] Committed block [4] with 1 transaction(s)" +"2019-05-02 09:27:32.609 UTC [gossip.gossip] handleMessage -> DEBU 12f0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.609 UTC [gossip.pull] HandleMessage -> DEBU 12f1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.609 UTC [gossip.pull] SendDigest -> DEBU 12f2 Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:32.609 UTC [gossip.gossip] handleMessage -> DEBU 12f3 Exiting" +"2019-05-02 09:27:32.609 UTC [gossip.gossip] handleMessage -> DEBU 12f4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.610 UTC [msp] DeserializeIdentity -> DEBU 12f5 Obtaining identity" +"2019-05-02 09:27:32.610 UTC [msp] DeserializeIdentity -> DEBU 12f6 Obtaining identity" +"2019-05-02 09:27:32.610 UTC [gossip.gossip] handleMessage -> DEBU 12f7 Exiting" +"2019-05-02 09:27:32.638 UTC [gossip.gossip] handleMessage -> DEBU 12f8 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:32.638 UTC [msp.identity] Verify -> DEBU 12f9 Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.| +00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|" +"2019-05-02 09:27:32.638 UTC [msp.identity] Verify -> DEBU 12fa Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a| +00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~| +00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...| +00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......| +00000040 32 7c 48 bd 9e 05 6c |2|H...l|" +"2019-05-02 09:27:32.639 UTC [msp] DeserializeIdentity -> DEBU 12fb Obtaining identity" +"2019-05-02 09:27:32.639 UTC [gossip.gossip] handleMessage -> DEBU 12fc Exiting" +"2019-05-02 09:27:32.646 UTC [gossip.gossip] handleMessage -> DEBU 12fd Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:32.646 UTC [msp.identity] Verify -> DEBU 12fe Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.| +00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|" +"2019-05-02 09:27:32.646 UTC [msp.identity] Verify -> DEBU 12ff Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a| +00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~| +00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...| +00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......| +00000040 32 7c 48 bd 9e 05 6c |2|H...l|" +"2019-05-02 09:27:32.646 UTC [gossip.gossip] handleMessage -> DEBU 1300 Exiting" +"2019-05-02 09:27:32.647 UTC [gossip.comm] func1 -> DEBU 1301 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:32.647 UTC [gossip.gossip] handleMessage -> DEBU 1302 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789250141975600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:32.647 UTC [msp.identity] Verify -> DEBU 1303 Verify: digest = 00000000 92 f1 46 5c fd 47 99 9d 55 34 a9 50 1f 66 77 df |..F\.G..U4.P.fw.| +00000010 17 e2 10 b6 99 ab ea c1 cd 1a d6 d4 7a de 6f 04 |............z.o.|" +"2019-05-02 09:27:32.647 UTC [msp.identity] Verify -> DEBU 1304 Verify: sig = 00000000 30 45 02 21 00 cb da 0f bd ae 6f 4c 61 f4 3b 61 |0E.!......oLa.;a| +00000010 f0 9f 18 93 e7 d1 bd 8e b8 c5 cd e1 a1 09 b8 7e |...............~| +00000020 34 41 3c ae 4b 02 20 3b 91 6e e8 cc 3b 00 a3 e6 |4A<.K. ;.n..;...| +00000030 31 4c 3a b4 b2 84 35 66 6a ae e4 c5 f3 cf a1 ec |1L:...5fj.......| +00000040 32 7c 48 bd 9e 05 6c |2|H...l|" +"2019-05-02 09:27:32.647 UTC [msp] DeserializeIdentity -> DEBU 1305 Obtaining identity" +"2019-05-02 09:27:32.648 UTC [gossip.gossip] handleMessage -> DEBU 1306 Exiting" +"2019-05-02 09:27:32.787 UTC [gossip.gossip] handleMessage -> DEBU 1307 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.787 UTC [msp] DeserializeIdentity -> DEBU 1308 Obtaining identity" +"2019-05-02 09:27:32.787 UTC [msp] DeserializeIdentity -> DEBU 1309 Obtaining identity" +"2019-05-02 09:27:32.787 UTC [msp] DeserializeIdentity -> DEBU 130a Obtaining identity" +"2019-05-02 09:27:32.787 UTC [gossip.gossip] handleMessage -> DEBU 130b Exiting" +"2019-05-02 09:27:32.800 UTC [gossip.gossip] handleMessage -> DEBU 130c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:32.801 UTC [msp] DeserializeIdentity -> DEBU 130d Obtaining identity" +"2019-05-02 09:27:32.806 UTC [gossip.comm] func1 -> DEBU 130e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:32.806 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 130f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:32.806 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1310 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.807 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1311 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 1313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 1314 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.807 UTC [cauthdsl] func1 -> DEBU 1315 0xc002d61f20 gate 1556789252807208600 evaluation starts" +"2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1316 0xc002d61f20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1317 0xc002d61f20 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1318 0xc002d61f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1319 0xc002d61f20 principal evaluation fails" +"2019-05-02 09:27:32.807 UTC [cauthdsl] func1 -> DEBU 131a 0xc002d61f20 gate 1556789252807208600 evaluation fails" +"2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 131b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 131c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.807 UTC [policies] Evaluate -> DEBU 131d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.807 UTC [cauthdsl] func1 -> DEBU 131e 0xc0030fe760 gate 1556789252807694400 evaluation starts" +"2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 131f 0xc0030fe760 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1320 0xc0030fe760 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.807 UTC [cauthdsl] func2 -> DEBU 1321 0xc0030fe760 principal matched by identity 0" +"2019-05-02 09:27:32.807 UTC [msp.identity] Verify -> DEBU 1322 Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +"2019-05-02 09:27:32.807 UTC [msp.identity] Verify -> DEBU 1323 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +00000040 dc 87 d7 13 63 c7 |....c.|" +"2019-05-02 09:27:32.808 UTC [cauthdsl] func2 -> DEBU 1324 0xc0030fe760 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.808 UTC [cauthdsl] func1 -> DEBU 1325 0xc0030fe760 gate 1556789252807694400 evaluation succeeds" +"2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1326 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1327 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1328 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1329 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.808 UTC [msp] DeserializeIdentity -> DEBU 132a Obtaining identity" +"2019-05-02 09:27:32.808 UTC [msp] DeserializeIdentity -> DEBU 132b Obtaining identity" +"2019-05-02 09:27:32.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 132c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 132d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 132e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 132f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.808 UTC [policies] Evaluate -> DEBU 1330 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.808 UTC [cauthdsl] func1 -> DEBU 1331 0xc0030ff940 gate 1556789252808960100 evaluation starts" +"2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1332 0xc0030ff940 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1333 0xc0030ff940 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1334 0xc0030ff940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1335 0xc0030ff940 principal evaluation fails" +"2019-05-02 09:27:32.809 UTC [cauthdsl] func1 -> DEBU 1336 0xc0030ff940 gate 1556789252808960100 evaluation fails" +"2019-05-02 09:27:32.809 UTC [policies] Evaluate -> DEBU 1337 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.809 UTC [policies] Evaluate -> DEBU 1338 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.809 UTC [policies] Evaluate -> DEBU 1339 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.809 UTC [cauthdsl] func1 -> DEBU 133a 0xc00325a180 gate 1556789252809434900 evaluation starts" +"2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 133b 0xc00325a180 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 133c 0xc00325a180 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 133d 0xc00325a180 principal matched by identity 0" +"2019-05-02 09:27:32.809 UTC [msp.identity] Verify -> DEBU 133e Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +"2019-05-02 09:27:32.809 UTC [msp.identity] Verify -> DEBU 133f Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +00000040 dc 87 d7 13 63 c7 |....c.|" +"2019-05-02 09:27:32.809 UTC [cauthdsl] func2 -> DEBU 1340 0xc00325a180 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.810 UTC [cauthdsl] func1 -> DEBU 1341 0xc00325a180 gate 1556789252809434900 evaluation succeeds" +"2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1342 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1343 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1344 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.810 UTC [policies] Evaluate -> DEBU 1345 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.810 UTC [gossip.gossip] handleMessage -> DEBU 1346 Exiting" +"2019-05-02 09:27:32.810 UTC [gossip.gossip] handleMessage -> DEBU 1347 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:32.810 UTC [msp] DeserializeIdentity -> DEBU 1348 Obtaining identity" +"2019-05-02 09:27:32.810 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1349 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:32.819 UTC [msp] DeserializeIdentity -> DEBU 134a Obtaining identity" +"2019-05-02 09:27:32.819 UTC [msp] DeserializeIdentity -> DEBU 134b Obtaining identity" +"2019-05-02 09:27:32.819 UTC [gossip.comm] Send -> DEBU 134c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" +"2019-05-02 09:27:32.820 UTC [msp] DeserializeIdentity -> DEBU 134d Obtaining identity" +"2019-05-02 09:27:32.820 UTC [msp] DeserializeIdentity -> DEBU 134e Obtaining identity" +"2019-05-02 09:27:32.820 UTC [gossip.comm] sendToEndpoint -> DEBU 134f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:32.820 UTC [gossip.comm] sendToEndpoint -> DEBU 1350 Exiting" +"2019-05-02 09:27:32.821 UTC [gossip.comm] sendToEndpoint -> DEBU 1351 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789252556521900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:32.821 UTC [gossip.comm] sendToEndpoint -> DEBU 1352 Exiting" +"2019-05-02 09:27:32.823 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1353 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.824 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1354 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.824 UTC [policies] Evaluate -> DEBU 1355 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.824 UTC [policies] Evaluate -> DEBU 1356 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 1357 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.825 UTC [cauthdsl] func1 -> DEBU 1358 0xc00325baa0 gate 1556789252825268200 evaluation starts" +"2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1359 0xc00325baa0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 135a 0xc00325baa0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 135b 0xc00325baa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 135c 0xc00325baa0 principal evaluation fails" +"2019-05-02 09:27:32.825 UTC [cauthdsl] func1 -> DEBU 135d 0xc00325baa0 gate 1556789252825268200 evaluation fails" +"2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 135e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 135f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.825 UTC [policies] Evaluate -> DEBU 1360 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.825 UTC [cauthdsl] func1 -> DEBU 1361 0xc0035ee2e0 gate 1556789252825782000 evaluation starts" +"2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1362 0xc0035ee2e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1363 0xc0035ee2e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.825 UTC [cauthdsl] func2 -> DEBU 1364 0xc0035ee2e0 principal matched by identity 0" +"2019-05-02 09:27:32.826 UTC [msp.identity] Verify -> DEBU 1365 Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +"2019-05-02 09:27:32.826 UTC [msp.identity] Verify -> DEBU 1366 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +00000040 dc 87 d7 13 63 c7 |....c.|" +"2019-05-02 09:27:32.826 UTC [cauthdsl] func2 -> DEBU 1367 0xc0035ee2e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.826 UTC [cauthdsl] func1 -> DEBU 1368 0xc0035ee2e0 gate 1556789252825782000 evaluation succeeds" +"2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 1369 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 136a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 136b Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.826 UTC [policies] Evaluate -> DEBU 136c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.826 UTC [msp] DeserializeIdentity -> DEBU 136d Obtaining identity" +"2019-05-02 09:27:32.826 UTC [gossip.gossip] handleMessage -> DEBU 136e Exiting" +"2019-05-02 09:27:32.835 UTC [gossip.comm] func1 -> DEBU 136f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.835 UTC [gossip.gossip] handleMessage -> DEBU 1370 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.835 UTC [gossip.pull] HandleMessage -> DEBU 1371 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.835 UTC [msp] DeserializeIdentity -> DEBU 1372 Obtaining identity" +"2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1373 Obtaining identity" +"2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1374 Obtaining identity" +"2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1375 Obtaining identity" +"2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1376 Obtaining identity" +"2019-05-02 09:27:32.836 UTC [msp] DeserializeIdentity -> DEBU 1377 Obtaining identity" +"2019-05-02 09:27:32.836 UTC [gossip.pull] SendDigest -> DEBU 1378 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:32.836 UTC [gossip.gossip] handleMessage -> DEBU 1379 Exiting" +"2019-05-02 09:27:32.856 UTC [gossip.comm] func1 -> DEBU 137a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.856 UTC [gossip.gossip] handleMessage -> DEBU 137b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.856 UTC [gossip.gossip] handleMessage -> DEBU 137c Exiting" +"2019-05-02 09:27:32.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 137d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.856 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 137e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:32.857 UTC [msp] DeserializeIdentity -> DEBU 137f Obtaining identity" +"2019-05-02 09:27:32.857 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1380 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:32.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1381 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1382 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 1383 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 1384 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 1385 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:32.857 UTC [cauthdsl] func1 -> DEBU 1386 0xc0038f3440 gate 1556789252857384200 evaluation starts" +"2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 1387 0xc0038f3440 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 1388 0xc0038f3440 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 1389 0xc0038f3440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:32.857 UTC [cauthdsl] func2 -> DEBU 138a 0xc0038f3440 principal evaluation fails" +"2019-05-02 09:27:32.857 UTC [cauthdsl] func1 -> DEBU 138b 0xc0038f3440 gate 1556789252857384200 evaluation fails" +"2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 138c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.857 UTC [policies] Evaluate -> DEBU 138d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 138e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:32.858 UTC [cauthdsl] func1 -> DEBU 138f 0xc0038f3c80 gate 1556789252858088600 evaluation starts" +"2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1390 0xc0038f3c80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1391 0xc0038f3c80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1392 0xc0038f3c80 principal matched by identity 0" +"2019-05-02 09:27:32.858 UTC [msp.identity] Verify -> DEBU 1393 Verify: digest = 00000000 9d 59 25 df 50 a2 aa 38 9d 0b a5 8d 90 bf 58 99 |.Y%.P..8......X.| +00000010 ac 25 ff b9 93 f4 4e 4c 0f 7b ff 98 89 d6 31 46 |.%....NL.{....1F|" +"2019-05-02 09:27:32.858 UTC [msp.identity] Verify -> DEBU 1394 Verify: sig = 00000000 30 44 02 20 0e 22 75 2b e1 07 24 45 1f 71 fa 37 |0D. ."u+..$E.q.7| +00000010 dd 59 0b e0 63 ad 6c 70 eb 0c f5 59 00 ce c8 33 |.Y..c.lp...Y...3| +00000020 03 26 bb d2 02 20 1b 10 c6 df a0 4d e9 1d 1d 8c |.&... .....M....| +00000030 91 5f 9d 4b 16 d8 82 c6 b9 b7 b4 80 25 40 1a 1a |._.K........%@..| +00000040 ad b7 3b 70 81 a7 |..;p..|" +"2019-05-02 09:27:32.858 UTC [cauthdsl] func2 -> DEBU 1395 0xc0038f3c80 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:32.858 UTC [cauthdsl] func1 -> DEBU 1396 0xc0038f3c80 gate 1556789252858088600 evaluation succeeds" +"2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 1397 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 1398 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 1399 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:32.858 UTC [policies] Evaluate -> DEBU 139a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:32.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 139b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139d updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 " +"2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 " +"2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 139f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:32.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 13a0 Exiting" +"2019-05-02 09:27:32.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a1 Exiting" +"2019-05-02 09:27:32.859 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13a2 Exiting" +"2019-05-02 09:27:32.859 UTC [gossip.discovery] sendMemResponse -> DEBU 13a3 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:32.859 UTC [msp] DeserializeIdentity -> DEBU 13a4 Obtaining identity" +"2019-05-02 09:27:32.859 UTC [msp] DeserializeIdentity -> DEBU 13a5 Obtaining identity" +"2019-05-02 09:27:32.859 UTC [msp] DeserializeIdentity -> DEBU 13a6 Obtaining identity" +"2019-05-02 09:27:32.859 UTC [gossip.comm] Send -> DEBU 13a7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:32.859 UTC [gossip.discovery] sendMemResponse -> DEBU 13a8 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:32.859 UTC [gossip.comm] sendToEndpoint -> DEBU 13a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:32.859 UTC [gossip.comm] sendToEndpoint -> DEBU 13aa Exiting" +"2019-05-02 09:27:33.004 UTC [msp] DeserializeIdentity -> DEBU 13ab Obtaining identity" +"2019-05-02 09:27:33.005 UTC [msp] DeserializeIdentity -> DEBU 13ac Obtaining identity" +"2019-05-02 09:27:33.007 UTC [gossip.pull] Hello -> DEBU 13ad Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:33.008 UTC [msp] DeserializeIdentity -> DEBU 13ae Obtaining identity" +"2019-05-02 09:27:33.009 UTC [msp] DeserializeIdentity -> DEBU 13af Obtaining identity" +"2019-05-02 09:27:33.009 UTC [gossip.comm] Send -> DEBU 13b0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:33.010 UTC [gossip.comm] sendToEndpoint -> DEBU 13b1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.010 UTC [gossip.comm] sendToEndpoint -> DEBU 13b2 Exiting" +"2019-05-02 09:27:33.016 UTC [gossip.gossip] handleMessage -> DEBU 13b3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12447959082874087959 , Msg_type: BLOCK_MSG, digests: [1 3 4 2], Envelope: 46 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.016 UTC [gossip.pull] HandleMessage -> DEBU 13b4 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12447959082874087959 , Msg_type: BLOCK_MSG, digests: [1 3 4 2], Envelope: 46 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.016 UTC [gossip.gossip] handleMessage -> DEBU 13b5 Exiting" +"2019-05-02 09:27:33.017 UTC [gossip.comm] func1 -> DEBU 13b6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.017 UTC [gossip.gossip] handleMessage -> DEBU 13b7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.017 UTC [msp] DeserializeIdentity -> DEBU 13b8 Obtaining identity" +"2019-05-02 09:27:33.018 UTC [msp] DeserializeIdentity -> DEBU 13b9 Obtaining identity" +"2019-05-02 09:27:33.018 UTC [msp] DeserializeIdentity -> DEBU 13ba Obtaining identity" +"2019-05-02 09:27:33.018 UTC [gossip.gossip] handleMessage -> DEBU 13bb Exiting" +"2019-05-02 09:27:33.033 UTC [gossip.gossip] handleMessage -> DEBU 13bc Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:33.034 UTC [msp] DeserializeIdentity -> DEBU 13bd Obtaining identity" +"2019-05-02 09:27:33.035 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:33.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13bf Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.035 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13c0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.035 UTC [policies] Evaluate -> DEBU 13c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:33.035 UTC [policies] Evaluate -> DEBU 13c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:33.035 UTC [policies] Evaluate -> DEBU 13c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:33.036 UTC [cauthdsl] func1 -> DEBU 13c4 0xc002c58190 gate 1556789253036212000 evaluation starts" +"2019-05-02 09:27:33.036 UTC [cauthdsl] func2 -> DEBU 13c5 0xc002c58190 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.036 UTC [cauthdsl] func2 -> DEBU 13c6 0xc002c58190 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.036 UTC [cauthdsl] func2 -> DEBU 13c7 0xc002c58190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:33.037 UTC [cauthdsl] func2 -> DEBU 13c8 0xc002c58190 principal evaluation fails" +"2019-05-02 09:27:33.037 UTC [cauthdsl] func1 -> DEBU 13c9 0xc002c58190 gate 1556789253036212000 evaluation fails" +"2019-05-02 09:27:33.037 UTC [policies] Evaluate -> DEBU 13ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.037 UTC [policies] Evaluate -> DEBU 13cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.037 UTC [policies] Evaluate -> DEBU 13cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:33.037 UTC [cauthdsl] func1 -> DEBU 13cd 0xc002c589d0 gate 1556789253037762500 evaluation starts" +"2019-05-02 09:27:33.038 UTC [cauthdsl] func2 -> DEBU 13ce 0xc002c589d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.038 UTC [cauthdsl] func2 -> DEBU 13cf 0xc002c589d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.038 UTC [cauthdsl] func2 -> DEBU 13d0 0xc002c589d0 principal matched by identity 0" +"2019-05-02 09:27:33.038 UTC [msp.identity] Verify -> DEBU 13d1 Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +"2019-05-02 09:27:33.038 UTC [msp.identity] Verify -> DEBU 13d2 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +00000040 48 a9 46 d7 ba f7 |H.F...|" +"2019-05-02 09:27:33.039 UTC [gossip.comm] func1 -> DEBU 13d3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:33.040 UTC [cauthdsl] func2 -> DEBU 13d4 0xc002c589d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:33.040 UTC [cauthdsl] func1 -> DEBU 13d5 0xc002c589d0 gate 1556789253037762500 evaluation succeeds" +"2019-05-02 09:27:33.041 UTC [policies] Evaluate -> DEBU 13d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.041 UTC [policies] Evaluate -> DEBU 13d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.041 UTC [policies] Evaluate -> DEBU 13d8 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:33.042 UTC [policies] Evaluate -> DEBU 13d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:33.043 UTC [msp] DeserializeIdentity -> DEBU 13da Obtaining identity" +"2019-05-02 09:27:33.043 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13db Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.043 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13dc Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.043 UTC [policies] Evaluate -> DEBU 13dd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:33.046 UTC [policies] Evaluate -> DEBU 13de This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:33.046 UTC [policies] Evaluate -> DEBU 13df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:33.047 UTC [cauthdsl] func1 -> DEBU 13e0 0xc002c59ab0 gate 1556789253047205100 evaluation starts" +"2019-05-02 09:27:33.047 UTC [cauthdsl] func2 -> DEBU 13e1 0xc002c59ab0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.047 UTC [cauthdsl] func2 -> DEBU 13e2 0xc002c59ab0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.047 UTC [cauthdsl] func2 -> DEBU 13e3 0xc002c59ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:33.048 UTC [cauthdsl] func2 -> DEBU 13e4 0xc002c59ab0 principal evaluation fails" +"2019-05-02 09:27:33.048 UTC [cauthdsl] func1 -> DEBU 13e5 0xc002c59ab0 gate 1556789253047205100 evaluation fails" +"2019-05-02 09:27:33.049 UTC [policies] Evaluate -> DEBU 13e6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.049 UTC [policies] Evaluate -> DEBU 13e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.049 UTC [policies] Evaluate -> DEBU 13e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:33.049 UTC [cauthdsl] func1 -> DEBU 13e9 0xc002fd42f0 gate 1556789253049289000 evaluation starts" +"2019-05-02 09:27:33.049 UTC [cauthdsl] func2 -> DEBU 13ea 0xc002fd42f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.050 UTC [cauthdsl] func2 -> DEBU 13eb 0xc002fd42f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.050 UTC [cauthdsl] func2 -> DEBU 13ec 0xc002fd42f0 principal matched by identity 0" +"2019-05-02 09:27:33.050 UTC [msp.identity] Verify -> DEBU 13ed Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +"2019-05-02 09:27:33.051 UTC [msp.identity] Verify -> DEBU 13ee Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +00000040 48 a9 46 d7 ba f7 |H.F...|" +"2019-05-02 09:27:33.051 UTC [cauthdsl] func2 -> DEBU 13ef 0xc002fd42f0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:33.054 UTC [cauthdsl] func1 -> DEBU 13f0 0xc002fd42f0 gate 1556789253049289000 evaluation succeeds" +"2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f3 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:33.055 UTC [policies] Evaluate -> DEBU 13f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:33.058 UTC [gossip.gossip] handleMessage -> DEBU 13f5 Exiting" +"2019-05-02 09:27:33.059 UTC [gossip.gossip] handleMessage -> DEBU 13f6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:33.059 UTC [msp] DeserializeIdentity -> DEBU 13f7 Obtaining identity" +"2019-05-02 09:27:33.060 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:33.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13f9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13fa Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.064 UTC [msp] DeserializeIdentity -> DEBU 13fb Obtaining identity" +"2019-05-02 09:27:33.064 UTC [msp] DeserializeIdentity -> DEBU 13fc Obtaining identity" +"2019-05-02 09:27:33.064 UTC [gossip.comm] Send -> DEBU 13fd Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" +"2019-05-02 09:27:33.065 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity" +"2019-05-02 09:27:33.065 UTC [msp] DeserializeIdentity -> DEBU 13ff Obtaining identity" +"2019-05-02 09:27:33.066 UTC [gossip.comm] sendToEndpoint -> DEBU 1400 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:33.066 UTC [gossip.comm] sendToEndpoint -> DEBU 1401 Exiting" +"2019-05-02 09:27:33.067 UTC [gossip.comm] sendToEndpoint -> DEBU 1402 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789252614986500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:33.067 UTC [gossip.comm] sendToEndpoint -> DEBU 1403 Exiting" +"2019-05-02 09:27:33.061 UTC [policies] Evaluate -> DEBU 1404 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:33.071 UTC [policies] Evaluate -> DEBU 1405 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:33.071 UTC [policies] Evaluate -> DEBU 1406 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:33.071 UTC [cauthdsl] func1 -> DEBU 1407 0xc002fd5c10 gate 1556789253071235100 evaluation starts" +"2019-05-02 09:27:33.074 UTC [cauthdsl] func2 -> DEBU 1408 0xc002fd5c10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.074 UTC [cauthdsl] func2 -> DEBU 1409 0xc002fd5c10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.074 UTC [cauthdsl] func2 -> DEBU 140a 0xc002fd5c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:33.075 UTC [cauthdsl] func2 -> DEBU 140b 0xc002fd5c10 principal evaluation fails" +"2019-05-02 09:27:33.075 UTC [cauthdsl] func1 -> DEBU 140c 0xc002fd5c10 gate 1556789253071235100 evaluation fails" +"2019-05-02 09:27:33.075 UTC [policies] Evaluate -> DEBU 140d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.075 UTC [policies] Evaluate -> DEBU 140e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.075 UTC [policies] Evaluate -> DEBU 140f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:33.076 UTC [cauthdsl] func1 -> DEBU 1410 0xc00354e450 gate 1556789253076117400 evaluation starts" +"2019-05-02 09:27:33.076 UTC [cauthdsl] func2 -> DEBU 1411 0xc00354e450 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.076 UTC [cauthdsl] func2 -> DEBU 1412 0xc00354e450 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.076 UTC [cauthdsl] func2 -> DEBU 1413 0xc00354e450 principal matched by identity 0" +"2019-05-02 09:27:33.076 UTC [msp.identity] Verify -> DEBU 1414 Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +"2019-05-02 09:27:33.076 UTC [msp.identity] Verify -> DEBU 1415 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +00000040 48 a9 46 d7 ba f7 |H.F...|" +"2019-05-02 09:27:33.077 UTC [cauthdsl] func2 -> DEBU 1416 0xc00354e450 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:33.077 UTC [cauthdsl] func1 -> DEBU 1417 0xc00354e450 gate 1556789253076117400 evaluation succeeds" +"2019-05-02 09:27:33.077 UTC [policies] Evaluate -> DEBU 1418 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.077 UTC [policies] Evaluate -> DEBU 1419 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.078 UTC [policies] Evaluate -> DEBU 141a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:33.078 UTC [policies] Evaluate -> DEBU 141b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:33.078 UTC [msp] DeserializeIdentity -> DEBU 141c Obtaining identity" +"2019-05-02 09:27:33.078 UTC [gossip.gossip] handleMessage -> DEBU 141d Exiting" +"2019-05-02 09:27:33.083 UTC [msp.identity] Sign -> DEBU 141e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151014 " +"2019-05-02 09:27:33.083 UTC [msp.identity] Sign -> DEBU 141f Sign: digest: C7341FCE558934916948EBA451F397BBCD8EB1334C90B5C2BE0FDD59FC916F20 " +"2019-05-02 09:27:33.084 UTC [msp.identity] Sign -> DEBU 1420 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:33.084 UTC [msp.identity] Sign -> DEBU 1421 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:33.084 UTC [gossip.comm] Send -> DEBU 1422 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:33.085 UTC [msp] DeserializeIdentity -> DEBU 1423 Obtaining identity" +"2019-05-02 09:27:33.085 UTC [gossip.comm] Send -> DEBU 1424 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:33.085 UTC [msp] DeserializeIdentity -> DEBU 1425 Obtaining identity" +"2019-05-02 09:27:33.085 UTC [gossip.comm] Send -> DEBU 1426 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:33.086 UTC [gossip.comm] sendToEndpoint -> DEBU 1427 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.086 UTC [gossip.comm] sendToEndpoint -> DEBU 1428 Exiting" +"2019-05-02 09:27:33.086 UTC [gossip.comm] sendToEndpoint -> DEBU 1429 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.087 UTC [gossip.comm] sendToEndpoint -> DEBU 142a Exiting" +"2019-05-02 09:27:33.087 UTC [gossip.comm] sendToEndpoint -> DEBU 142b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.087 UTC [gossip.comm] sendToEndpoint -> DEBU 142c Exiting" +"2019-05-02 09:27:33.094 UTC [gossip.gossip] handleMessage -> DEBU 142d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.094 UTC [gossip.gossip] handleMessage -> DEBU 142e Exiting" +"2019-05-02 09:27:33.095 UTC [gossip.discovery] handleMsgFromComm -> DEBU 142f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.095 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1430 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:33.095 UTC [msp.identity] Verify -> DEBU 1431 Verify: digest = 00000000 28 e3 c7 ef f6 39 26 c9 69 7f de f3 56 21 b3 63 |(....9&.i...V!.c| +00000010 c9 05 70 6a be ac a3 02 e6 39 c0 a6 da c2 f6 7a |..pj.....9.....z|" +"2019-05-02 09:27:33.095 UTC [msp.identity] Verify -> DEBU 1432 Verify: sig = 00000000 30 45 02 21 00 9b dc 4c 9d 3b c5 05 f5 fa a4 0c |0E.!...L.;......| +00000010 5b f8 85 2a ba 0f 5a bf e7 d2 f0 12 72 2a 5d 69 |[..*..Z.....r*]i| +00000020 3d 33 94 08 4a 02 20 2c a5 3f 2a da 8b de 2b 08 |=3..J. ,.?*...+.| +00000030 7b 5d 5a 51 c5 2d e9 44 42 47 aa e5 44 9b 1d 90 |{]ZQ.-.DBG..D...| +00000040 7e 09 8a 22 c7 ac 46 |~.."..F|" +"2019-05-02 09:27:33.096 UTC [gossip.discovery] handleAliveMessage -> DEBU 1433 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.096 UTC [gossip.discovery] handleAliveMessage -> DEBU 1434 Exiting" +"2019-05-02 09:27:33.096 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1435 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:33.097 UTC [msp.identity] Verify -> DEBU 1436 Verify: digest = 00000000 c7 34 1f ce 55 89 34 91 69 48 eb a4 51 f3 97 bb |.4..U.4.iH..Q...| +00000010 cd 8e b1 33 4c 90 b5 c2 be 0f dd 59 fc 91 6f 20 |...3L......Y..o |" +"2019-05-02 09:27:33.097 UTC [msp.identity] Verify -> DEBU 1437 Verify: sig = 00000000 30 45 02 21 00 91 2d 00 1e 7a bc f6 09 62 76 14 |0E.!..-..z...bv.| +00000010 bf 6d 53 a6 8a 03 5f 1e 9c ba 63 aa 9e 34 9c 93 |.mS..._...c..4..| +00000020 14 b5 10 1e a6 02 20 13 bc b1 ee f7 e2 22 1f 39 |...... ......".9| +00000030 1f 96 a9 ae 98 d6 1a 34 de 0d 0e 69 ca d3 88 cc |.......4...i....| +00000040 34 08 a7 4b b1 c3 0d |4..K...|" +"2019-05-02 09:27:33.098 UTC [gossip.discovery] handleAliveMessage -> DEBU 1438 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.098 UTC [gossip.discovery] isSentByMe -> DEBU 1439 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.098 UTC [gossip.discovery] handleAliveMessage -> DEBU 143a Exiting" +"2019-05-02 09:27:33.099 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 143b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:33.099 UTC [msp] DeserializeIdentity -> DEBU 143c Obtaining identity" +"2019-05-02 09:27:33.100 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 143d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:33.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 143e Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 143f Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.101 UTC [policies] Evaluate -> DEBU 1440 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:33.101 UTC [policies] Evaluate -> DEBU 1441 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:33.101 UTC [policies] Evaluate -> DEBU 1442 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:33.101 UTC [cauthdsl] func1 -> DEBU 1443 0xc002463810 gate 1556789253101569700 evaluation starts" +"2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1444 0xc002463810 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1445 0xc002463810 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1446 0xc002463810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:33.101 UTC [cauthdsl] func2 -> DEBU 1447 0xc002463810 principal evaluation fails" +"2019-05-02 09:27:33.101 UTC [cauthdsl] func1 -> DEBU 1448 0xc002463810 gate 1556789253101569700 evaluation fails" +"2019-05-02 09:27:33.102 UTC [policies] Evaluate -> DEBU 1449 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.102 UTC [policies] Evaluate -> DEBU 144a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.102 UTC [policies] Evaluate -> DEBU 144b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:33.102 UTC [cauthdsl] func1 -> DEBU 144c 0xc0024bc050 gate 1556789253102414900 evaluation starts" +"2019-05-02 09:27:33.102 UTC [cauthdsl] func2 -> DEBU 144d 0xc0024bc050 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.104 UTC [cauthdsl] func2 -> DEBU 144e 0xc0024bc050 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.104 UTC [gossip.pull] Hello -> DEBU 144f Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:27:33.104 UTC [gossip.comm] Send -> DEBU 1450 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:33.105 UTC [gossip.pull] Hello -> DEBU 1451 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:33.105 UTC [gossip.comm] Send -> DEBU 1452 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:33.105 UTC [gossip.pull] Hello -> DEBU 1453 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:27:33.105 UTC [gossip.comm] Send -> DEBU 1454 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:33.106 UTC [gossip.comm] sendToEndpoint -> DEBU 1455 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.106 UTC [gossip.comm] sendToEndpoint -> DEBU 1456 Exiting" +"2019-05-02 09:27:33.108 UTC [gossip.comm] sendToEndpoint -> DEBU 1457 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.109 UTC [gossip.comm] sendToEndpoint -> DEBU 1458 Exiting" +"2019-05-02 09:27:33.109 UTC [gossip.comm] sendToEndpoint -> DEBU 1459 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.109 UTC [gossip.comm] sendToEndpoint -> DEBU 145a Exiting" +"2019-05-02 09:27:33.110 UTC [gossip.comm] func1 -> DEBU 145b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.110 UTC [gossip.gossip] handleMessage -> DEBU 145c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.112 UTC [gossip.comm] func1 -> DEBU 145d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10440964464786897320 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.104 UTC [cauthdsl] func2 -> DEBU 145e 0xc0024bc050 principal matched by identity 0" +"2019-05-02 09:27:33.114 UTC [msp.identity] Verify -> DEBU 145f Verify: digest = 00000000 9d 59 25 df 50 a2 aa 38 9d 0b a5 8d 90 bf 58 99 |.Y%.P..8......X.| +00000010 ac 25 ff b9 93 f4 4e 4c 0f 7b ff 98 89 d6 31 46 |.%....NL.{....1F|" +"2019-05-02 09:27:33.114 UTC [msp.identity] Verify -> DEBU 1460 Verify: sig = 00000000 30 44 02 20 0e 22 75 2b e1 07 24 45 1f 71 fa 37 |0D. ."u+..$E.q.7| +00000010 dd 59 0b e0 63 ad 6c 70 eb 0c f5 59 00 ce c8 33 |.Y..c.lp...Y...3| +00000020 03 26 bb d2 02 20 1b 10 c6 df a0 4d e9 1d 1d 8c |.&... .....M....| +00000030 91 5f 9d 4b 16 d8 82 c6 b9 b7 b4 80 25 40 1a 1a |._.K........%@..| +00000040 ad b7 3b 70 81 a7 |..;p..|" +"2019-05-02 09:27:33.115 UTC [cauthdsl] func2 -> DEBU 1461 0xc0024bc050 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:33.115 UTC [cauthdsl] func1 -> DEBU 1462 0xc0024bc050 gate 1556789253102414900 evaluation succeeds" +"2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1463 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1464 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1465 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:33.115 UTC [policies] Evaluate -> DEBU 1466 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:33.116 UTC [gossip.discovery] handleAliveMessage -> DEBU 1467 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:33.116 UTC [gossip.discovery] handleAliveMessage -> DEBU 1468 Exiting" +"2019-05-02 09:27:33.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1469 Exiting" +"2019-05-02 09:27:33.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.117 UTC [gossip.gossip] handleMessage -> DEBU 146b Exiting" +"2019-05-02 09:27:33.117 UTC [gossip.gossip] handleMessage -> DEBU 146c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.117 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 146d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:33.117 UTC [msp] DeserializeIdentity -> DEBU 146e Obtaining identity" +"2019-05-02 09:27:33.118 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 146f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:33.118 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1470 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.118 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1471 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.118 UTC [policies] Evaluate -> DEBU 1472 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:33.118 UTC [policies] Evaluate -> DEBU 1473 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:33.119 UTC [policies] Evaluate -> DEBU 1474 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:33.119 UTC [cauthdsl] func1 -> DEBU 1475 0xc0024bdcb0 gate 1556789253119545200 evaluation starts" +"2019-05-02 09:27:33.119 UTC [cauthdsl] func2 -> DEBU 1476 0xc0024bdcb0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.119 UTC [cauthdsl] func2 -> DEBU 1477 0xc0024bdcb0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.121 UTC [cauthdsl] func2 -> DEBU 1478 0xc0024bdcb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:33.121 UTC [cauthdsl] func2 -> DEBU 1479 0xc0024bdcb0 principal evaluation fails" +"2019-05-02 09:27:33.121 UTC [cauthdsl] func1 -> DEBU 147a 0xc0024bdcb0 gate 1556789253119545200 evaluation fails" +"2019-05-02 09:27:33.122 UTC [policies] Evaluate -> DEBU 147b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.122 UTC [policies] Evaluate -> DEBU 147c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.122 UTC [policies] Evaluate -> DEBU 147d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:33.122 UTC [cauthdsl] func1 -> DEBU 147e 0xc00262e4f0 gate 1556789253122232300 evaluation starts" +"2019-05-02 09:27:33.122 UTC [cauthdsl] func2 -> DEBU 147f 0xc00262e4f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.122 UTC [cauthdsl] func2 -> DEBU 1480 0xc00262e4f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.122 UTC [cauthdsl] func2 -> DEBU 1481 0xc00262e4f0 principal matched by identity 0" +"2019-05-02 09:27:33.122 UTC [msp.identity] Verify -> DEBU 1482 Verify: digest = 00000000 eb f5 bd ff 26 ad b2 3c 7b f7 6b 73 2a f6 0c 88 |....&..<{.ks*...| +00000010 ed 78 44 d8 65 33 ad a9 ad 21 3d f0 b8 9a dc 10 |.xD.e3...!=.....|" +"2019-05-02 09:27:33.123 UTC [msp.identity] Verify -> DEBU 1483 Verify: sig = 00000000 30 45 02 21 00 e4 e0 5f e3 3d 0d 98 50 3f 8d bb |0E.!..._.=..P?..| +00000010 4c 91 91 a1 8e bf 0e bd 7c 4e c3 92 a6 dd a5 1d |L.......|N......| +00000020 f9 bf cc e0 65 02 20 70 70 88 ef 3c 74 11 6f 29 |....e. pp.. DEBU 1484 0xc00262e4f0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:33.124 UTC [cauthdsl] func1 -> DEBU 1485 0xc00262e4f0 gate 1556789253122232300 evaluation succeeds" +"2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1486 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1487 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1488 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:33.124 UTC [policies] Evaluate -> DEBU 1489 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:33.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 148a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 148b Exiting" +"2019-05-02 09:27:33.125 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 148c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:33.125 UTC [msp.identity] Verify -> DEBU 148d Verify: digest = 00000000 c7 34 1f ce 55 89 34 91 69 48 eb a4 51 f3 97 bb |.4..U.4.iH..Q...| +00000010 cd 8e b1 33 4c 90 b5 c2 be 0f dd 59 fc 91 6f 20 |...3L......Y..o |" +"2019-05-02 09:27:33.125 UTC [msp.identity] Verify -> DEBU 148e Verify: sig = 00000000 30 45 02 21 00 91 2d 00 1e 7a bc f6 09 62 76 14 |0E.!..-..z...bv.| +00000010 bf 6d 53 a6 8a 03 5f 1e 9c ba 63 aa 9e 34 9c 93 |.mS..._...c..4..| +00000020 14 b5 10 1e a6 02 20 13 bc b1 ee f7 e2 22 1f 39 |...... ......".9| +00000030 1f 96 a9 ae 98 d6 1a 34 de 0d 0e 69 ca d3 88 cc |.......4...i....| +00000040 34 08 a7 4b b1 c3 0d |4..K...|" +"2019-05-02 09:27:33.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 148f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.126 UTC [gossip.discovery] isSentByMe -> DEBU 1490 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 1491 Exiting" +"2019-05-02 09:27:33.126 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1492 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:33.126 UTC [msp.identity] Verify -> DEBU 1493 Verify: digest = 00000000 28 e3 c7 ef f6 39 26 c9 69 7f de f3 56 21 b3 63 |(....9&.i...V!.c| +00000010 c9 05 70 6a be ac a3 02 e6 39 c0 a6 da c2 f6 7a |..pj.....9.....z|" +"2019-05-02 09:27:33.127 UTC [msp.identity] Verify -> DEBU 1494 Verify: sig = 00000000 30 45 02 21 00 9b dc 4c 9d 3b c5 05 f5 fa a4 0c |0E.!...L.;......| +00000010 5b f8 85 2a ba 0f 5a bf e7 d2 f0 12 72 2a 5d 69 |[..*..Z.....r*]i| +00000020 3d 33 94 08 4a 02 20 2c a5 3f 2a da 8b de 2b 08 |=3..J. ,.?*...+.| +00000030 7b 5d 5a 51 c5 2d e9 44 42 47 aa e5 44 9b 1d 90 |{]ZQ.-.DBG..D...| +00000040 7e 09 8a 22 c7 ac 46 |~.."..F|" +"2019-05-02 09:27:33.127 UTC [gossip.discovery] handleAliveMessage -> DEBU 1495 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.128 UTC [gossip.discovery] handleAliveMessage -> DEBU 1496 Exiting" +"2019-05-02 09:27:33.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1497 Exiting" +"2019-05-02 09:27:33.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1498 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.128 UTC [gossip.gossip] handleMessage -> DEBU 1499 Exiting" +"2019-05-02 09:27:33.128 UTC [gossip.gossip] handleMessage -> DEBU 149a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15873546593035671781 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.129 UTC [gossip.pull] HandleMessage -> DEBU 149b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15873546593035671781 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.129 UTC [gossip.gossip] handleMessage -> DEBU 149c Exiting" +"2019-05-02 09:27:33.129 UTC [gossip.gossip] handleMessage -> DEBU 149d Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10440964464786897320 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.129 UTC [gossip.pull] HandleMessage -> DEBU 149e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10440964464786897320 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.129 UTC [gossip.gossip] handleMessage -> DEBU 149f Exiting" +"2019-05-02 09:27:33.130 UTC [gossip.gossip] handleMessage -> DEBU 14a0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16040923857937586268 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.130 UTC [gossip.pull] HandleMessage -> DEBU 14a1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16040923857937586268 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.130 UTC [gossip.gossip] handleMessage -> DEBU 14a2 Exiting" +"2019-05-02 09:27:33.130 UTC [gossip.gossip] handleMessage -> DEBU 14a3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.130 UTC [gossip.pull] HandleMessage -> DEBU 14a4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.130 UTC [gossip.pull] SendDigest -> DEBU 14a5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:33.131 UTC [gossip.gossip] handleMessage -> DEBU 14a6 Exiting" +"2019-05-02 09:27:33.128 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14a7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14a8 Verify: digest = 00000000 c7 34 1f ce 55 89 34 91 69 48 eb a4 51 f3 97 bb |.4..U.4.iH..Q...| +00000010 cd 8e b1 33 4c 90 b5 c2 be 0f dd 59 fc 91 6f 20 |...3L......Y..o |" +"2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14a9 Verify: sig = 00000000 30 45 02 21 00 91 2d 00 1e 7a bc f6 09 62 76 14 |0E.!..-..z...bv.| +00000010 bf 6d 53 a6 8a 03 5f 1e 9c ba 63 aa 9e 34 9c 93 |.mS..._...c..4..| +00000020 14 b5 10 1e a6 02 20 13 bc b1 ee f7 e2 22 1f 39 |...... ......".9| +00000030 1f 96 a9 ae 98 d6 1a 34 de 0d 0e 69 ca d3 88 cc |.......4...i....| +00000040 34 08 a7 4b b1 c3 0d |4..K...|" +"2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14aa Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:01.968 UTC [msp.identity] Verify -> DEBU 159f Verify: sig = 00000000 30 45 02 21 00 cc 35 63 ae 3a b5 9d ea b2 73 02 |0E.!..5c.:....s.| -00000010 45 2c c0 12 f8 18 5e 58 f4 b0 33 13 60 f6 d3 af |E,....^X..3.`...| -00000020 92 b1 4c 04 12 02 20 51 7e 0a 36 87 1a 99 92 4b |..L... Q~.6....K| -00000030 54 ab 18 bb ab 26 f6 4c 18 0e 72 59 e4 77 cb b9 |T....&.L..rY.w..| -00000040 36 d6 c2 a4 3b 64 7b |6...;d{|" -"2019-05-02 01:31:01.969 UTC [gossip.discovery] handleAliveMessage -> DEBU 15a0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:01.969 UTC [gossip.discovery] isSentByMe -> DEBU 15a1 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:01.969 UTC [gossip.discovery] handleAliveMessage -> DEBU 15a2 Exiting" -"2019-05-02 01:31:01.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a3 Exiting" -"2019-05-02 01:31:01.969 UTC [gossip.gossip] handleMessage -> DEBU 15a4 Exiting" -"2019-05-02 01:31:01.969 UTC [gossip.gossip] handleMessage -> DEBU 15a5 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.970 UTC [gossip.gossip] handleMessage -> DEBU 15a6 Exiting" -"2019-05-02 01:31:01.970 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:01.973 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15a8 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:01.981 UTC [msp.identity] Verify -> DEBU 15a9 Verify: digest = 00000000 96 08 14 24 9b 26 fb e1 5e b9 92 04 85 86 81 6b |...$.&..^......k| -00000010 0f da f1 ab 38 13 78 19 f8 96 c8 60 2b 7b 09 1f |....8.x....`+{..|" -"2019-05-02 01:31:01.981 UTC [msp.identity] Verify -> DEBU 15aa Verify: sig = 00000000 30 45 02 21 00 d6 1b 95 79 d1 4b 95 38 5a a7 99 |0E.!....y.K.8Z..| -00000010 56 9e dd 53 78 ee fa 5e 28 8d d1 89 83 13 57 87 |V..Sx..^(.....W.| -00000020 e3 53 88 0b 5d 02 20 1e 6d ee 24 98 79 d0 35 9b |.S..]. .m.$.y.5.| -00000030 74 c0 29 1d 80 2d c0 af 00 c4 b4 64 0a c3 9f 8d |t.)..-.....d....| -00000040 74 86 66 d8 ea 79 f3 |t.f..y.|" -"2019-05-02 01:31:01.982 UTC [gossip.discovery] handleAliveMessage -> DEBU 15ab Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.982 UTC [gossip.discovery] isSentByMe -> DEBU 15ac Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.982 UTC [gossip.discovery] handleAliveMessage -> DEBU 15ad Exiting" -"2019-05-02 01:31:01.983 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15ae Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:01.988 UTC [msp.identity] Verify -> DEBU 15af Verify: digest = 00000000 60 c3 5c ba c3 da 37 33 42 1a 58 5d fa 58 58 87 |`.\...73B.X].XX.| -00000010 41 70 57 93 6e 37 1f f7 c5 e8 b7 de 3e 20 5c 7a |ApW.n7......> \z|" -"2019-05-02 01:31:01.988 UTC [msp.identity] Verify -> DEBU 15b0 Verify: sig = 00000000 30 45 02 21 00 eb d4 b7 27 51 e9 4e 65 ce 99 ab |0E.!....'Q.Ne...| -00000010 ba ec 46 fb 8d cf 8c 6e a0 1d a4 c3 c2 5b 44 b6 |..F....n.....[D.| -00000020 6e 7d 9a 29 b4 02 20 19 51 69 59 18 1d a9 ab f4 |n}.).. .QiY.....| -00000030 6c 67 96 57 7e 89 e8 15 42 62 aa 33 08 a4 46 3b |lg.W~...Bb.3..F;| -00000040 3c 8f b7 46 61 f1 96 |<..Fa..|" -"2019-05-02 01:31:01.989 UTC [gossip.discovery] handleAliveMessage -> DEBU 15b1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:01.989 UTC [gossip.discovery] handleAliveMessage -> DEBU 15b2 Exiting" -"2019-05-02 01:31:01.989 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15b3 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:01.989 UTC [msp] DeserializeIdentity -> DEBU 15b4 Obtaining identity" -"2019-05-02 01:31:01.989 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:01.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15b6 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15b7 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:01.990 UTC [policies] Evaluate -> DEBU 15b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:01.990 UTC [policies] Evaluate -> DEBU 15b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:01.990 UTC [policies] Evaluate -> DEBU 15ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:01.990 UTC [cauthdsl] func1 -> DEBU 15bb 0xc0039cc640 gate 1556760661990289600 evaluation starts" -"2019-05-02 01:31:01.990 UTC [cauthdsl] func2 -> DEBU 15bc 0xc0039cc640 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:01.990 UTC [cauthdsl] func2 -> DEBU 15bd 0xc0039cc640 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:01.990 UTC [cauthdsl] func2 -> DEBU 15be 0xc0039cc640 principal matched by identity 0" -"2019-05-02 01:31:01.990 UTC [msp.identity] Verify -> DEBU 15bf Verify: digest = 00000000 39 ba 15 2e 21 51 1e 04 d6 10 c1 70 5f 25 e4 4d |9...!Q.....p_%.M| -00000010 ca bd c0 c8 36 db 28 69 10 90 9d 61 eb 52 f4 7b |....6.(i...a.R.{|" -"2019-05-02 01:31:01.990 UTC [msp.identity] Verify -> DEBU 15c0 Verify: sig = 00000000 30 44 02 20 33 81 67 65 ee 2b 37 4c 2f 2c 0a a0 |0D. 3.ge.+7L/,..| -00000010 54 a0 3b 21 72 03 28 57 dc b8 e0 f1 e7 d4 99 cd |T.;!r.(W........| -00000020 87 0f 3f 98 02 20 77 b9 d3 d6 d0 72 26 49 3c 87 |..?.. w....r&I<.| -00000030 2d fd 99 46 18 fa 37 74 a8 22 6a 63 3f 71 78 d3 |-..F..7t."jc?qx.| -00000040 8d 3a 03 26 2e e1 |.:.&..|" -"2019-05-02 01:31:01.991 UTC [cauthdsl] func2 -> DEBU 15c1 0xc0039cc640 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:01.991 UTC [cauthdsl] func1 -> DEBU 15c2 0xc0039cc640 gate 1556760661990289600 evaluation succeeds" -"2019-05-02 01:31:01.991 UTC [policies] Evaluate -> DEBU 15c3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.991 UTC [policies] Evaluate -> DEBU 15c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:01.991 UTC [policies] Evaluate -> DEBU 15c5 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:01.991 UTC [policies] Evaluate -> DEBU 15c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:01.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 15c7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:01.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 15c8 Exiting" -"2019-05-02 01:31:01.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15c9 Exiting" -"2019-05-02 01:31:02.289 UTC [endorser] ProcessProposal -> DEBU 15ca Entering: request from 192.168.240.9:41294" -"2019-05-02 01:31:02.289 UTC [protoutils] ValidateProposalMessage -> DEBU 15cb ValidateProposalMessage starts for signed proposal 0xc003a16190" -"2019-05-02 01:31:02.290 UTC [protoutils] validateChannelHeader -> DEBU 15cc validateChannelHeader info: header type 3" -"2019-05-02 01:31:02.290 UTC [protoutils] checkSignatureFromCreator -> DEBU 15cd begin" -"2019-05-02 01:31:02.290 UTC [msp] GetManagerForChain -> DEBU 15ce Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:02.290 UTC [protoutils] checkSignatureFromCreator -> DEBU 15cf creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:02.291 UTC [protoutils] checkSignatureFromCreator -> DEBU 15d0 creator is valid" -"2019-05-02 01:31:02.292 UTC [msp.identity] Verify -> DEBU 15d1 Verify: digest = 00000000 e2 39 84 21 3c 70 b1 c5 c7 66 8c 8e 17 e9 91 19 |.9.! DEBU 15d2 Verify: sig = 00000000 30 45 02 21 00 a7 5e 04 f6 a7 ed 27 d4 4d 15 db |0E.!..^....'.M..| -00000010 b0 40 8f 08 b7 7d 76 59 35 5f f3 c3 c7 75 15 e7 |.@...}vY5_...u..| -00000020 84 c5 c6 ed e6 02 20 4d ab 59 bd 16 84 35 ba a0 |...... M.Y...5..| -00000030 d5 14 c9 8e c8 bb b6 6a 06 3b af a4 c9 cf 57 7e |.......j.;....W~| -00000040 a3 77 b0 b7 56 42 9c |.w..VB.|" -"2019-05-02 01:31:02.294 UTC [protoutils] checkSignatureFromCreator -> DEBU 15d3 exits successfully" -"2019-05-02 01:31:02.294 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 15d4 validateChaincodeProposalMessage starts for proposal 0xc002f7fea0, header 0xc003a165a0" -"2019-05-02 01:31:02.302 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 15d5 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -"2019-05-02 01:31:02.303 UTC [endorser] preProcess -> DEBU 15d6 [businesschannel][cc8bbfcf] processing txid: cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821" -"2019-05-02 01:31:02.303 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 15d7 retrieveTransactionByID() - txId = [cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821]" -"2019-05-02 01:31:02.305 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 15d8 constructing new tx simulator" -"2019-05-02 01:31:02.305 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 15d9 constructing new tx simulator txid = [cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821]" -"2019-05-02 01:31:02.306 UTC [endorser] SimulateProposal -> DEBU 15da [businesschannel][cc8bbfcf] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:02.307 UTC [endorser] callChaincode -> INFO 15db [businesschannel][cc8bbfcf] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:02.307 UTC [chaincode] Execute -> DEBU 15dc Entry" -"2019-05-02 01:31:02.309 UTC [aclmgmt] CheckACL -> DEBU 15dd acl policy not found in config for resource _lifecycle/QueryApprovalStatus" -"2019-05-02 01:31:02.310 UTC [policies] Evaluate -> DEBU 15de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:02.310 UTC [policies] Evaluate -> DEBU 15df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:02.311 UTC [policies] Evaluate -> DEBU 15e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:02.312 UTC [cauthdsl] func1 -> DEBU 15e1 0xc0039cd950 gate 1556760662311774700 evaluation starts" -"2019-05-02 01:31:02.312 UTC [cauthdsl] func2 -> DEBU 15e2 0xc0039cd950 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:02.312 UTC [cauthdsl] func2 -> DEBU 15e3 0xc0039cd950 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:02.313 UTC [cauthdsl] func2 -> DEBU 15e4 0xc0039cd950 principal matched by identity 0" -"2019-05-02 01:31:02.315 UTC [msp.identity] Verify -> DEBU 15e5 Verify: digest = 00000000 e2 39 84 21 3c 70 b1 c5 c7 66 8c 8e 17 e9 91 19 |.9.! DEBU 15e6 Verify: sig = 00000000 30 45 02 21 00 a7 5e 04 f6 a7 ed 27 d4 4d 15 db |0E.!..^....'.M..| -00000010 b0 40 8f 08 b7 7d 76 59 35 5f f3 c3 c7 75 15 e7 |.@...}vY5_...u..| -00000020 84 c5 c6 ed e6 02 20 4d ab 59 bd 16 84 35 ba a0 |...... M.Y...5..| -00000030 d5 14 c9 8e c8 bb b6 6a 06 3b af a4 c9 cf 57 7e |.......j.;....W~| -00000040 a3 77 b0 b7 56 42 9c |.w..VB.|" -"2019-05-02 01:31:02.318 UTC [cauthdsl] func2 -> DEBU 15e7 0xc0039cd950 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:02.318 UTC [cauthdsl] func1 -> DEBU 15e8 0xc0039cd950 gate 1556760662311774700 evaluation succeeds" -"2019-05-02 01:31:02.318 UTC [policies] Evaluate -> DEBU 15e9 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:02.319 UTC [policies] Evaluate -> DEBU 15ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:02.320 UTC [policies] Evaluate -> DEBU 15eb Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:02.320 UTC [policies] Evaluate -> DEBU 15ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:02.321 UTC [lifecycle] QueryApprovalStatus -> DEBU 15ed received invocation of QueryApprovalStatus on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: false), validation info: (plugin: '', policy: ''), collections: ()'" -"2019-05-02 01:31:02.321 UTC [chaincode] handleMessage -> DEBU 15ee [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:02.321 UTC [chaincode] HandleTransaction -> DEBU 15ef [cc8bbfcf] handling GET_STATE from chaincode" -"2019-05-02 01:31:02.322 UTC [chaincode] HandleGetState -> DEBU 15f0 [cc8bbfcf] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" -"2019-05-02 01:31:02.322 UTC [stateleveldb] GetState -> DEBU 15f1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:02.322 UTC [chaincode] HandleGetState -> DEBU 15f2 [cc8bbfcf] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" -"2019-05-02 01:31:02.323 UTC [chaincode] HandleTransaction -> DEBU 15f3 [cc8bbfcf] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:02.324 UTC [chaincode] handleMessage -> DEBU 15f4 [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:02.324 UTC [chaincode] HandleTransaction -> DEBU 15f5 [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:02.325 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 15f6 [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" -"2019-05-02 01:31:02.325 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 15f7 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:31:02.326 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 15f8 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:31:02.326 UTC [stateleveldb] GetState -> DEBU 15f9 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" -"2019-05-02 01:31:02.326 UTC [chaincode] HandleTransaction -> DEBU 15fa [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:02.327 UTC [chaincode] handleMessage -> DEBU 15fb [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:02.327 UTC [chaincode] HandleTransaction -> DEBU 15fc [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:02.328 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 15fd [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" -"2019-05-02 01:31:02.328 UTC [stateleveldb] GetState -> DEBU 15fe GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" -"2019-05-02 01:31:02.328 UTC [chaincode] HandleTransaction -> DEBU 15ff [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:02.329 UTC [chaincode] handleMessage -> DEBU 1600 [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:02.329 UTC [chaincode] HandleTransaction -> DEBU 1601 [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:02.329 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1602 [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" -"2019-05-02 01:31:02.330 UTC [stateleveldb] GetState -> DEBU 1603 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 1604 [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:02.331 UTC [chaincode] handleMessage -> DEBU 1605 [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:02.332 UTC [chaincode] HandleTransaction -> DEBU 1606 [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:02.337 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1607 [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" -"2019-05-02 01:31:02.337 UTC [stateleveldb] GetState -> DEBU 1608 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -"2019-05-02 01:31:02.342 UTC [chaincode] HandleTransaction -> DEBU 1609 [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:02.343 UTC [chaincode] handleMessage -> DEBU 160a [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:02.344 UTC [chaincode] HandleTransaction -> DEBU 160b [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:02.344 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 160c [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" -"2019-05-02 01:31:02.344 UTC [stateleveldb] GetState -> DEBU 160d GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -"2019-05-02 01:31:02.344 UTC [chaincode] HandleTransaction -> DEBU 160e [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:02.345 UTC [chaincode] handleMessage -> DEBU 160f [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:02.345 UTC [chaincode] HandleTransaction -> DEBU 1610 [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:02.345 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1611 [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" -"2019-05-02 01:31:02.346 UTC [stateleveldb] GetState -> DEBU 1612 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" -"2019-05-02 01:31:02.346 UTC [chaincode] HandleTransaction -> DEBU 1613 [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:02.346 UTC [chaincode] handleMessage -> DEBU 1614 [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:02.346 UTC [chaincode] HandleTransaction -> DEBU 1615 [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:02.346 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1616 [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" -"2019-05-02 01:31:02.347 UTC [stateleveldb] GetState -> DEBU 1617 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1618 [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:02.353 UTC [chaincode] handleMessage -> DEBU 1619 [cc8bbfcf] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:02.353 UTC [chaincode] HandleTransaction -> DEBU 161a [cc8bbfcf] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:02.353 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 161b [cc8bbfcf] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" -"2019-05-02 01:31:02.354 UTC [stateleveldb] GetState -> DEBU 161c GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -"2019-05-02 01:31:02.354 UTC [chaincode] HandleTransaction -> DEBU 161d [cc8bbfcf] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:02.355 UTC [lifecycle] QueryApprovalStatus -> INFO 161e successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" -"2019-05-02 01:31:02.355 UTC [chaincode] handleMessage -> DEBU 161f [cc8bbfcf] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:02.355 UTC [chaincode] Notify -> DEBU 1620 [cc8bbfcf] notifying Txid:cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821, channelID:businesschannel" -"2019-05-02 01:31:02.355 UTC [chaincode] Execute -> DEBU 1621 Exit" -"2019-05-02 01:31:02.355 UTC [endorser] callChaincode -> INFO 1622 [businesschannel][cc8bbfcf] Exit chaincode: name:"_lifecycle" (48ms)" -"2019-05-02 01:31:02.355 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1623 Simulation completed, getting simulation results" -"2019-05-02 01:31:02.356 UTC [lockbasedtxmgr] Done -> DEBU 1624 Done with transaction simulation / query execution [cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821]" -"2019-05-02 01:31:02.356 UTC [endorser] SimulateProposal -> DEBU 1625 [businesschannel][cc8bbfcf] Exit" -"2019-05-02 01:31:02.356 UTC [endorser] endorseProposal -> DEBU 1626 [businesschannel][cc8bbfcf] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:02.356 UTC [endorser] endorseProposal -> DEBU 1627 [businesschannel][cc8bbfcf] escc for chaincode name:"_lifecycle" is escc" -"2019-05-02 01:31:02.356 UTC [endorser] EndorseWithPlugin -> DEBU 1628 Entering endorsement for {plugin: escc, channel: businesschannel, tx: cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821, chaincode: _lifecycle}" -"2019-05-02 01:31:02.356 UTC [msp.identity] Sign -> DEBU 1629 Sign: plaintext: 0A201E70789FDC9B699AE0ADBBC071F0...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:02.357 UTC [msp.identity] Sign -> DEBU 162a Sign: digest: AE80D4311B9B672FF8744471B32AFE812740DA6EB614EADD7C24D7F1649A3B03 " -"2019-05-02 01:31:02.361 UTC [endorser] EndorseWithPlugin -> DEBU 162b Exiting {plugin: escc, channel: businesschannel, tx: cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821, chaincode: _lifecycle}" -"2019-05-02 01:31:02.361 UTC [endorser] endorseProposal -> DEBU 162c [businesschannel][cc8bbfcf] Exit" -"2019-05-02 01:31:02.361 UTC [lockbasedtxmgr] Done -> DEBU 162d Done with transaction simulation / query execution [cc8bbfcf8a031e5b336514c0d8d81ac7287ded37ad672972cbbfa58fe75e4821]" -"2019-05-02 01:31:02.361 UTC [endorser] func1 -> DEBU 162e Exit: request from 192.168.240.9:41294" -"2019-05-02 01:31:02.362 UTC [comm.grpc.server] 1 -> INFO 162f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41294 grpc.code=OK grpc.call_duration=73.2557ms -"2019-05-02 01:31:02.381 UTC [grpc] infof -> DEBU 1630 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:02.384 UTC [grpc] infof -> DEBU 1631 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:03.293 UTC [endorser] ProcessProposal -> DEBU 1632 Entering: request from 192.168.240.9:41302" -"2019-05-02 01:31:03.293 UTC [protoutils] ValidateProposalMessage -> DEBU 1633 ValidateProposalMessage starts for signed proposal 0xc003a17b80" -"2019-05-02 01:31:03.293 UTC [protoutils] validateChannelHeader -> DEBU 1634 validateChannelHeader info: header type 3" -"2019-05-02 01:31:03.293 UTC [protoutils] checkSignatureFromCreator -> DEBU 1635 begin" -"2019-05-02 01:31:03.294 UTC [protoutils] checkSignatureFromCreator -> DEBU 1636 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:03.294 UTC [protoutils] checkSignatureFromCreator -> DEBU 1637 creator is valid" -"2019-05-02 01:31:03.295 UTC [msp.identity] Verify -> DEBU 1638 Verify: digest = 00000000 58 14 70 7c 6d 45 74 f1 5a 1f 96 0b 7b 8e 0f 61 |X.p|mEt.Z...{..a| -00000010 f6 22 ff f8 74 f3 88 74 65 40 93 ac 36 17 de f6 |."..t..te@..6...|" -"2019-05-02 01:31:03.295 UTC [msp.identity] Verify -> DEBU 1639 Verify: sig = 00000000 30 44 02 20 79 dd 2d 8d ec 33 22 8f c4 3e 84 1a |0D. y.-..3"..>..| -00000010 c5 24 f7 e6 f3 a3 81 80 60 55 d4 11 69 bc 0f 14 |.$......`U..i...| -00000020 bb 16 a7 9e 02 20 2c ca e4 22 a5 a7 08 b7 d0 b3 |..... ,.."......| -00000030 92 2d 70 80 53 34 1f 45 8f 1c 7d 71 f6 83 bd b1 |.-p.S4.E..}q....| -00000040 f4 cb b3 20 9e e3 |... ..|" -"2019-05-02 01:31:03.296 UTC [protoutils] checkSignatureFromCreator -> DEBU 163a exits successfully" -"2019-05-02 01:31:03.296 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 163b validateChaincodeProposalMessage starts for proposal 0xc00318aee0, header 0xc003a17f90" -"2019-05-02 01:31:03.298 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 163c validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -"2019-05-02 01:31:03.300 UTC [endorser] preProcess -> DEBU 163d [][eb7c25ca] processing txid: eb7c25ca3c5379120806180ea3e4b2c8d0abb612af02365b8b42e1357c79f419" -"2019-05-02 01:31:03.302 UTC [endorser] SimulateProposal -> DEBU 163e [][eb7c25ca] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:03.302 UTC [endorser] callChaincode -> INFO 163f [][eb7c25ca] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:03.302 UTC [chaincode] Execute -> DEBU 1640 Entry" -"2019-05-02 01:31:03.303 UTC [msp.identity] Verify -> DEBU 1641 Verify: digest = 00000000 58 14 70 7c 6d 45 74 f1 5a 1f 96 0b 7b 8e 0f 61 |X.p|mEt.Z...{..a| -00000010 f6 22 ff f8 74 f3 88 74 65 40 93 ac 36 17 de f6 |."..t..te@..6...|" -"2019-05-02 01:31:03.303 UTC [msp.identity] Verify -> DEBU 1642 Verify: sig = 00000000 30 44 02 20 79 dd 2d 8d ec 33 22 8f c4 3e 84 1a |0D. y.-..3"..>..| -00000010 c5 24 f7 e6 f3 a3 81 80 60 55 d4 11 69 bc 0f 14 |.$......`U..i...| -00000020 bb 16 a7 9e 02 20 2c ca e4 22 a5 a7 08 b7 d0 b3 |..... ,.."......| -00000030 92 2d 70 80 53 34 1f 45 8f 1c 7d 71 f6 83 bd b1 |.-p.S4.E..}q....| -00000040 f4 cb b3 20 9e e3 |... ..|" -"2019-05-02 01:31:03.304 UTC [lifecycle] QueryInstalledChaincodes -> DEBU 1643 received invocation of QueryInstalledChaincodes" -"2019-05-02 01:31:03.305 UTC [chaincode] handleMessage -> DEBU 1644 [eb7c25ca] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:03.305 UTC [chaincode] Notify -> DEBU 1645 [eb7c25ca] notifying Txid:eb7c25ca3c5379120806180ea3e4b2c8d0abb612af02365b8b42e1357c79f419, channelID:" -"2019-05-02 01:31:03.305 UTC [chaincode] Execute -> DEBU 1646 Exit" -"2019-05-02 01:31:03.305 UTC [endorser] callChaincode -> INFO 1647 [][eb7c25ca] Exit chaincode: name:"_lifecycle" (2ms)" -"2019-05-02 01:31:03.305 UTC [endorser] SimulateProposal -> DEBU 1648 [][eb7c25ca] Exit" -"2019-05-02 01:31:03.305 UTC [endorser] func1 -> DEBU 1649 Exit: request from 192.168.240.9:41302" -"2019-05-02 01:31:03.306 UTC [comm.grpc.server] 1 -> INFO 164a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41302 grpc.code=OK grpc.call_duration=12.7764ms -"2019-05-02 01:31:03.312 UTC [grpc] warningf -> DEBU 164b transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41302: read: connection reset by peer" -"2019-05-02 01:31:03.312 UTC [grpc] infof -> DEBU 164c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:03.313 UTC [grpc] infof -> DEBU 164d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:03.432 UTC [gossip.gossip] handleMessage -> DEBU 164e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:03.432 UTC [gossip.gossip] handleMessage -> DEBU 164f Exiting" -"2019-05-02 01:31:03.432 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1650 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:03.432 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1651 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:03.433 UTC [msp.identity] Verify -> DEBU 1652 Verify: digest = 00000000 35 f2 1a 6b 87 bb b9 e8 6c 6e b6 0f fc 46 af 9b |5..k....ln...F..| -00000010 78 69 33 a7 10 e7 2f 83 0d bc 21 9d 25 98 b9 8c |xi3.../...!.%...|" -"2019-05-02 01:31:03.433 UTC [msp.identity] Verify -> DEBU 1653 Verify: sig = 00000000 30 45 02 21 00 b7 d3 32 7f 7d c1 4f 01 b9 10 55 |0E.!...2.}.O...U| -00000010 6f 1c 2f 5d 97 a0 f6 13 c9 5c 52 db dd 7e 9a a8 |o./].....\R..~..| -00000020 dd 1c ee 7a 5f 02 20 55 b4 e7 4a c5 eb d4 66 c5 |...z_. U..J...f.| -00000030 fb 72 91 f1 38 df 18 a7 4d 00 ed d3 bd a6 1c 7d |.r..8...M......}| -00000040 28 8f d8 7b ac a7 4a |(..{..J|" -"2019-05-02 01:31:03.434 UTC [msp.identity] Verify -> DEBU 1654 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:33.131 UTC [msp.identity] Verify -> DEBU 14ab Verify: sig = 00000000 30 45 02 21 00 97 91 fc 75 f8 16 ef f9 ce fd e7 |0E.!....u.......| +00000010 66 74 df 92 0a 63 f4 fe 9e c5 34 6d e0 30 75 b9 |ft...c....4m.0u.| +00000020 54 09 db df f8 02 20 09 a4 84 ef 71 1f f6 17 70 |T..... ....q...p| +00000030 6b fa 25 f0 93 3f 49 92 eb 44 be c6 74 07 f1 f5 |k.%..?I..D..t...| +00000040 2b 87 07 81 fd e4 a4 |+......|" +"2019-05-02 09:27:33.131 UTC [gossip.discovery] handleAliveMessage -> DEBU 14ac Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:33.131 UTC [gossip.discovery] isSentByMe -> DEBU 14ad Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:33.132 UTC [gossip.discovery] handleAliveMessage -> DEBU 14ae Exiting" +"2019-05-02 09:27:33.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14af Exiting" +"2019-05-02 09:27:33.137 UTC [gossip.gossip] handleMessage -> DEBU 14b0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.137 UTC [gossip.gossip] handleMessage -> DEBU 14b1 Exiting" +"2019-05-02 09:27:33.137 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.137 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14b3 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:33.138 UTC [msp.identity] Verify -> DEBU 14b4 Verify: digest = 00000000 dc cc 08 6e f3 da cf d7 32 74 c5 29 44 aa 5c 54 |...n....2t.)D.\T| +00000010 95 e7 59 02 db 07 7b ca 16 30 22 01 7b 4d 33 1d |..Y...{..0".{M3.|" +"2019-05-02 09:27:33.139 UTC [msp.identity] Verify -> DEBU 14b5 Verify: sig = 00000000 30 44 02 20 75 ab 06 ef 97 ff b1 05 b5 6b a4 8d |0D. u........k..| +00000010 50 8c 5d 93 a0 b3 03 32 fe dc 72 91 7e 6d 89 c5 |P.]....2..r.~m..| +00000020 44 32 ac 41 02 20 2f 4e 5a dd 1f 68 b8 52 cf 96 |D2.A. /NZ..h.R..| +00000030 77 02 68 7a 73 82 94 98 ba b9 08 82 fa 8a 65 60 |w.hzs.........e`| +00000040 5d 6a be ee fd 51 |]j...Q|" +"2019-05-02 09:27:33.139 UTC [msp.identity] Verify -> DEBU 14b6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:03.434 UTC [msp.identity] Verify -> DEBU 1655 Verify: sig = 00000000 30 45 02 21 00 b7 9d b0 b4 9c f0 ec 96 0a 19 0e |0E.!............| -00000010 7e b9 27 44 8d 11 b1 e2 2d 45 fe 1a de 9e b0 96 |~.'D....-E......| -00000020 25 df f7 3e 68 02 20 3c aa 67 1d f9 f4 90 8e 82 |%..>h. <.g......| -00000030 1d 55 c0 90 75 d6 70 48 4f e1 f6 56 14 d5 89 83 |.U..u.pHO..V....| -00000040 1f 33 fb 2a 4b b7 3f |.3.*K.?|" -"2019-05-02 01:31:03.435 UTC [gossip.discovery] handleAliveMessage -> DEBU 1656 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:03.435 UTC [gossip.discovery] learnExistingMembers -> DEBU 1657 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:03.435 UTC [gossip.discovery] learnExistingMembers -> DEBU 1658 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 " -"2019-05-02 01:31:03.437 UTC [gossip.discovery] learnExistingMembers -> DEBU 1659 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 " -"2019-05-02 01:31:03.437 UTC [gossip.discovery] learnExistingMembers -> DEBU 165a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:03.442 UTC [gossip.discovery] learnExistingMembers -> DEBU 165b Exiting" -"2019-05-02 01:31:03.449 UTC [gossip.discovery] handleAliveMessage -> DEBU 165c Exiting" -"2019-05-02 01:31:03.450 UTC [gossip.discovery] handleMsgFromComm -> DEBU 165d Exiting" -"2019-05-02 01:31:03.452 UTC [msp] DeserializeIdentity -> DEBU 165e Obtaining identity" -"2019-05-02 01:31:03.456 UTC [msp] DeserializeIdentity -> DEBU 165f Obtaining identity" -"2019-05-02 01:31:03.459 UTC [gossip.comm] func1 -> DEBU 1660 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.462 UTC [msp] DeserializeIdentity -> DEBU 1661 Obtaining identity" -"2019-05-02 01:31:03.459 UTC [gossip.gossip] handleMessage -> DEBU 1662 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.464 UTC [gossip.comm] Send -> DEBU 1664 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:03.464 UTC [msp] DeserializeIdentity -> DEBU 1665 Obtaining identity" -"2019-05-02 01:31:03.463 UTC [gossip.gossip] handleMessage -> DEBU 1663 Exiting" -"2019-05-02 01:31:03.465 UTC [gossip.comm] Send -> DEBU 1666 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:03.465 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1667 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.467 UTC [gossip.discovery] handleMsgFromComm -> DEBU 166a Exiting" -"2019-05-02 01:31:03.466 UTC [gossip.comm] sendToEndpoint -> DEBU 1668 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.467 UTC [gossip.comm] sendToEndpoint -> DEBU 166b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.470 UTC [gossip.comm] sendToEndpoint -> DEBU 166d Exiting" -"2019-05-02 01:31:03.467 UTC [gossip.comm] sendToEndpoint -> DEBU 166c Exiting" -"2019-05-02 01:31:03.466 UTC [gossip.comm] func1 -> DEBU 1669 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.471 UTC [gossip.gossip] handleMessage -> DEBU 166e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.472 UTC [gossip.gossip] handleMessage -> DEBU 166f Exiting" -"2019-05-02 01:31:03.472 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1670 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.472 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1671 Exiting" -"2019-05-02 01:31:03.508 UTC [gossip.comm] func1 -> DEBU 1672 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.510 UTC [gossip.gossip] handleMessage -> DEBU 1673 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.510 UTC [gossip.gossip] handleMessage -> DEBU 1674 Exiting" -"2019-05-02 01:31:03.511 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1675 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.511 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1676 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:03.511 UTC [msp] DeserializeIdentity -> DEBU 1677 Obtaining identity" -"2019-05-02 01:31:03.512 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1678 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:03.512 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1679 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:03.512 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 167a Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:03.512 UTC [policies] Evaluate -> DEBU 167b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:03.513 UTC [policies] Evaluate -> DEBU 167c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:03.513 UTC [policies] Evaluate -> DEBU 167d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:03.514 UTC [cauthdsl] func1 -> DEBU 167e 0xc003aeecf0 gate 1556760663514056600 evaluation starts" -"2019-05-02 01:31:03.514 UTC [cauthdsl] func2 -> DEBU 167f 0xc003aeecf0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:03.514 UTC [cauthdsl] func2 -> DEBU 1680 0xc003aeecf0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:03.515 UTC [cauthdsl] func2 -> DEBU 1681 0xc003aeecf0 principal matched by identity 0" -"2019-05-02 01:31:03.515 UTC [msp.identity] Verify -> DEBU 1682 Verify: digest = 00000000 78 17 5c 58 27 c9 fb 76 c4 86 d5 90 af a1 b3 e2 |x.\X'..v........| -00000010 2c 53 e5 6c a7 64 5d 72 42 80 8a 89 88 aa 3b b8 |,S.l.d]rB.....;.|" -"2019-05-02 01:31:03.515 UTC [msp.identity] Verify -> DEBU 1683 Verify: sig = 00000000 30 45 02 21 00 f8 f7 e2 c5 da 62 ec 4f a0 78 61 |0E.!......b.O.xa| -00000010 ab 02 8c fc da 12 d9 2f ed 9d 27 ca f5 18 9c 3c |......./..'....<| -00000020 1b d6 8e c0 a5 02 20 54 f4 51 02 39 9b a2 3f 46 |...... T.Q.9..?F| -00000030 67 2a 1d 8b 6c c3 fe eb cf ae 59 01 94 a3 ed f4 |g*..l.....Y.....| -00000040 ef 24 e6 eb 01 06 50 |.$....P|" -"2019-05-02 01:31:03.516 UTC [cauthdsl] func2 -> DEBU 1684 0xc003aeecf0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:03.517 UTC [cauthdsl] func1 -> DEBU 1685 0xc003aeecf0 gate 1556760663514056600 evaluation succeeds" -"2019-05-02 01:31:03.517 UTC [policies] Evaluate -> DEBU 1686 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:03.518 UTC [policies] Evaluate -> DEBU 1687 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:03.518 UTC [policies] Evaluate -> DEBU 1688 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:03.518 UTC [policies] Evaluate -> DEBU 1689 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:03.519 UTC [gossip.discovery] handleAliveMessage -> DEBU 168a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 168b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:03.520 UTC [gossip.discovery] learnExistingMembers -> DEBU 168c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 " -"2019-05-02 01:31:03.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 168d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 " -"2019-05-02 01:31:03.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 168e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:03.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 168f Exiting" -"2019-05-02 01:31:03.522 UTC [gossip.discovery] handleAliveMessage -> DEBU 1690 Exiting" -"2019-05-02 01:31:03.522 UTC [gossip.gossip] handleMessage -> DEBU 1691 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1692 Exiting" -"2019-05-02 01:31:03.523 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1693 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.524 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1694 Exiting" -"2019-05-02 01:31:03.524 UTC [gossip.gossip] handleMessage -> DEBU 1695 Exiting" -"2019-05-02 01:31:03.524 UTC [gossip.comm] func1 -> DEBU 1696 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.526 UTC [gossip.gossip] handleMessage -> DEBU 1698 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.526 UTC [gossip.gossip] handleMessage -> DEBU 1699 Exiting" -"2019-05-02 01:31:03.525 UTC [msp] DeserializeIdentity -> DEBU 1697 Obtaining identity" -"2019-05-02 01:31:03.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 169a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 169c Exiting" -"2019-05-02 01:31:03.528 UTC [msp] DeserializeIdentity -> DEBU 169b Obtaining identity" -"2019-05-02 01:31:03.529 UTC [msp] DeserializeIdentity -> DEBU 169d Obtaining identity" -"2019-05-02 01:31:03.530 UTC [msp] DeserializeIdentity -> DEBU 169e Obtaining identity" -"2019-05-02 01:31:03.530 UTC [msp] DeserializeIdentity -> DEBU 169f Obtaining identity" -"2019-05-02 01:31:03.531 UTC [msp] DeserializeIdentity -> DEBU 16a0 Obtaining identity" -"2019-05-02 01:31:03.531 UTC [gossip.comm] Send -> DEBU 16a1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:03.532 UTC [gossip.comm] sendToEndpoint -> DEBU 16a2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.532 UTC [gossip.comm] sendToEndpoint -> DEBU 16a3 Exiting" -"2019-05-02 01:31:03.532 UTC [msp] DeserializeIdentity -> DEBU 16a4 Obtaining identity" -"2019-05-02 01:31:03.534 UTC [msp] DeserializeIdentity -> DEBU 16a5 Obtaining identity" -"2019-05-02 01:31:03.535 UTC [gossip.comm] Send -> DEBU 16a6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:03.536 UTC [gossip.comm] sendToEndpoint -> DEBU 16a7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.536 UTC [gossip.comm] sendToEndpoint -> DEBU 16a8 Exiting" -"2019-05-02 01:31:03.644 UTC [endorser] ProcessProposal -> DEBU 16a9 Entering: request from 192.168.240.9:41306" -"2019-05-02 01:31:03.644 UTC [protoutils] ValidateProposalMessage -> DEBU 16aa ValidateProposalMessage starts for signed proposal 0xc003ae6960" -"2019-05-02 01:31:03.645 UTC [protoutils] validateChannelHeader -> DEBU 16ab validateChannelHeader info: header type 3" -"2019-05-02 01:31:03.645 UTC [protoutils] checkSignatureFromCreator -> DEBU 16ac begin" -"2019-05-02 01:31:03.645 UTC [msp] GetManagerForChain -> DEBU 16ad Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:03.646 UTC [protoutils] checkSignatureFromCreator -> DEBU 16ae creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:03.646 UTC [protoutils] checkSignatureFromCreator -> DEBU 16af creator is valid" -"2019-05-02 01:31:03.646 UTC [msp.identity] Verify -> DEBU 16b0 Verify: digest = 00000000 a0 85 57 15 74 c5 2b cf 59 9b 77 3b d4 50 51 a4 |..W.t.+.Y.w;.PQ.| -00000010 6d 45 9e b5 d0 de d5 05 92 ea e2 87 51 a1 43 6d |mE..........Q.Cm|" -"2019-05-02 01:31:03.646 UTC [msp.identity] Verify -> DEBU 16b1 Verify: sig = 00000000 30 45 02 21 00 84 49 fd 99 6c ed e9 b7 63 4b 91 |0E.!..I..l...cK.| -00000010 27 d7 c5 3e 59 b8 e4 fa 58 4b 31 8f e5 b3 ce 8a |'..>Y...XK1.....| -00000020 ad ec 76 37 9b 02 20 5f 88 84 11 46 59 fa e3 fb |..v7.. _...FY...| -00000030 53 e0 fc d1 e2 25 5e 2a f0 c0 46 ed 57 b0 bd e0 |S....%^*..F.W...| -00000040 01 c6 4d 05 16 60 39 |..M..`9|" -"2019-05-02 01:31:03.647 UTC [protoutils] checkSignatureFromCreator -> DEBU 16b2 exits successfully" -"2019-05-02 01:31:03.647 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 16b3 validateChaincodeProposalMessage starts for proposal 0xc002e3d500, header 0xc003ae6d70" -"2019-05-02 01:31:03.647 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 16b4 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -"2019-05-02 01:31:03.647 UTC [endorser] preProcess -> DEBU 16b5 [businesschannel][c9936150] processing txid: c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf" -"2019-05-02 01:31:03.648 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 16b6 retrieveTransactionByID() - txId = [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf]" -"2019-05-02 01:31:03.648 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 16b7 constructing new tx simulator" -"2019-05-02 01:31:03.648 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 16b8 constructing new tx simulator txid = [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf]" -"2019-05-02 01:31:03.648 UTC [endorser] SimulateProposal -> DEBU 16b9 [businesschannel][c9936150] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:03.649 UTC [endorser] callChaincode -> INFO 16ba [businesschannel][c9936150] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:03.649 UTC [chaincode] Execute -> DEBU 16bb Entry" -"2019-05-02 01:31:03.650 UTC [aclmgmt] CheckACL -> DEBU 16bc acl policy /Channel/Application/Writers found in config for resource _lifecycle/CommitChaincodeDefinition" -"2019-05-02 01:31:03.650 UTC [aclmgmt] CheckACL -> DEBU 16bd acl check(/Channel/Application/Writers)" -"2019-05-02 01:31:03.650 UTC [policies] Evaluate -> DEBU 16be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:03.650 UTC [policies] Evaluate -> DEBU 16bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:03.650 UTC [policies] Evaluate -> DEBU 16c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:03.650 UTC [cauthdsl] func1 -> DEBU 16c1 0xc003b62230 gate 1556760663650913100 evaluation starts" -"2019-05-02 01:31:03.651 UTC [cauthdsl] func2 -> DEBU 16c2 0xc003b62230 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:03.651 UTC [cauthdsl] func2 -> DEBU 16c3 0xc003b62230 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:03.651 UTC [cauthdsl] func2 -> DEBU 16c4 0xc003b62230 principal matched by identity 0" -"2019-05-02 01:31:03.652 UTC [msp.identity] Verify -> DEBU 16c5 Verify: digest = 00000000 a0 85 57 15 74 c5 2b cf 59 9b 77 3b d4 50 51 a4 |..W.t.+.Y.w;.PQ.| -00000010 6d 45 9e b5 d0 de d5 05 92 ea e2 87 51 a1 43 6d |mE..........Q.Cm|" -"2019-05-02 01:31:03.652 UTC [msp.identity] Verify -> DEBU 16c6 Verify: sig = 00000000 30 45 02 21 00 84 49 fd 99 6c ed e9 b7 63 4b 91 |0E.!..I..l...cK.| -00000010 27 d7 c5 3e 59 b8 e4 fa 58 4b 31 8f e5 b3 ce 8a |'..>Y...XK1.....| -00000020 ad ec 76 37 9b 02 20 5f 88 84 11 46 59 fa e3 fb |..v7.. _...FY...| -00000030 53 e0 fc d1 e2 25 5e 2a f0 c0 46 ed 57 b0 bd e0 |S....%^*..F.W...| -00000040 01 c6 4d 05 16 60 39 |..M..`9|" -"2019-05-02 01:31:03.652 UTC [cauthdsl] func2 -> DEBU 16c7 0xc003b62230 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:03.653 UTC [cauthdsl] func1 -> DEBU 16c8 0xc003b62230 gate 1556760663650913100 evaluation succeeds" -"2019-05-02 01:31:03.653 UTC [policies] Evaluate -> DEBU 16c9 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:03.653 UTC [policies] Evaluate -> DEBU 16ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:03.654 UTC [policies] Evaluate -> DEBU 16cb Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:03.654 UTC [policies] Evaluate -> DEBU 16cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:03.654 UTC [lifecycle] CommitChaincodeDefinition -> DEBU 16cd received invocation of CommitChaincodeDefinition on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" -"2019-05-02 01:31:03.655 UTC [chaincode] handleMessage -> DEBU 16ce [c9936150] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:03.655 UTC [chaincode] HandleTransaction -> DEBU 16cf [c9936150] handling GET_STATE from chaincode" -"2019-05-02 01:31:03.655 UTC [chaincode] HandleGetState -> DEBU 16d0 [c9936150] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" -"2019-05-02 01:31:03.656 UTC [stateleveldb] GetState -> DEBU 16d1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:03.656 UTC [chaincode] HandleGetState -> DEBU 16d2 [c9936150] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" -"2019-05-02 01:31:03.656 UTC [chaincode] HandleTransaction -> DEBU 16d3 [c9936150] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:03.657 UTC [chaincode] handleMessage -> DEBU 16d4 [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:03.657 UTC [chaincode] HandleTransaction -> DEBU 16d5 [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:03.658 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16d6 [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" -"2019-05-02 01:31:03.658 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 16d7 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" -"2019-05-02 01:31:03.658 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 16d8 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" -"2019-05-02 01:31:03.659 UTC [stateleveldb] GetState -> DEBU 16d9 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -"2019-05-02 01:31:03.659 UTC [chaincode] HandleTransaction -> DEBU 16da [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:03.659 UTC [chaincode] handleMessage -> DEBU 16db [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:03.660 UTC [chaincode] HandleTransaction -> DEBU 16dc [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:03.660 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16dd [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" -"2019-05-02 01:31:03.660 UTC [stateleveldb] GetState -> DEBU 16de GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" -"2019-05-02 01:31:03.661 UTC [chaincode] HandleTransaction -> DEBU 16df [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:03.661 UTC [chaincode] handleMessage -> DEBU 16e0 [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:03.662 UTC [chaincode] HandleTransaction -> DEBU 16e1 [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:03.662 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16e2 [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" -"2019-05-02 01:31:03.662 UTC [stateleveldb] GetState -> DEBU 16e3 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 16e4 [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:03.663 UTC [chaincode] handleMessage -> DEBU 16e5 [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:03.663 UTC [chaincode] HandleTransaction -> DEBU 16e6 [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:03.663 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16e7 [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" -"2019-05-02 01:31:03.664 UTC [stateleveldb] GetState -> DEBU 16e8 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -"2019-05-02 01:31:03.664 UTC [chaincode] HandleTransaction -> DEBU 16e9 [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:03.664 UTC [chaincode] handleMessage -> DEBU 16ea [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:03.664 UTC [chaincode] HandleTransaction -> DEBU 16eb [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:03.665 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16ec [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" -"2019-05-02 01:31:03.665 UTC [stateleveldb] GetState -> DEBU 16ed GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" -"2019-05-02 01:31:03.665 UTC [chaincode] HandleTransaction -> DEBU 16ee [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:03.666 UTC [chaincode] handleMessage -> DEBU 16ef [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:03.666 UTC [chaincode] HandleTransaction -> DEBU 16f0 [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:03.666 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16f1 [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" -"2019-05-02 01:31:03.667 UTC [stateleveldb] GetState -> DEBU 16f2 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" -"2019-05-02 01:31:03.667 UTC [chaincode] HandleTransaction -> DEBU 16f3 [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:03.667 UTC [chaincode] handleMessage -> DEBU 16f4 [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:03.668 UTC [chaincode] HandleTransaction -> DEBU 16f5 [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:03.668 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16f6 [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" -"2019-05-02 01:31:03.668 UTC [stateleveldb] GetState -> DEBU 16f7 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 16f8 [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:03.669 UTC [chaincode] handleMessage -> DEBU 16f9 [c9936150] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" -"2019-05-02 01:31:03.670 UTC [chaincode] HandleTransaction -> DEBU 16fa [c9936150] handling GET_PRIVATE_DATA_HASH from chaincode" -"2019-05-02 01:31:03.670 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 16fb [c9936150] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" -"2019-05-02 01:31:03.670 UTC [stateleveldb] GetState -> DEBU 16fc GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -"2019-05-02 01:31:03.670 UTC [chaincode] HandleTransaction -> DEBU 16fd [c9936150] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" -"2019-05-02 01:31:03.671 UTC [lifecycle] QueryApprovalStatus -> INFO 16fe successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" -"2019-05-02 01:31:03.671 UTC [chaincode] handleMessage -> DEBU 16ff [c9936150] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:03.672 UTC [chaincode] HandleTransaction -> DEBU 1700 [c9936150] handling GET_STATE from chaincode" -"2019-05-02 01:31:03.672 UTC [chaincode] HandleGetState -> DEBU 1701 [c9936150] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" -"2019-05-02 01:31:03.673 UTC [stateleveldb] GetState -> DEBU 1702 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -"2019-05-02 01:31:03.673 UTC [chaincode] HandleGetState -> DEBU 1703 [c9936150] No state associated with key: namespaces/metadata/exp02. Sending RESPONSE with an empty payload" -"2019-05-02 01:31:03.673 UTC [chaincode] HandleTransaction -> DEBU 1704 [c9936150] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:03.673 UTC [chaincode] handleMessage -> DEBU 1705 [c9936150] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:03.674 UTC [chaincode] HandleTransaction -> DEBU 1706 [c9936150] handling PUT_STATE from chaincode" -"2019-05-02 01:31:03.674 UTC [chaincode] HandleTransaction -> DEBU 1707 [c9936150] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:03.674 UTC [chaincode] handleMessage -> DEBU 1708 [c9936150] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:03.675 UTC [chaincode] HandleTransaction -> DEBU 1709 [c9936150] handling PUT_STATE from chaincode" -"2019-05-02 01:31:03.675 UTC [chaincode] HandleTransaction -> DEBU 170a [c9936150] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:03.675 UTC [chaincode] handleMessage -> DEBU 170b [c9936150] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:03.676 UTC [chaincode] HandleTransaction -> DEBU 170c [c9936150] handling PUT_STATE from chaincode" -"2019-05-02 01:31:03.676 UTC [chaincode] HandleTransaction -> DEBU 170d [c9936150] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:03.677 UTC [chaincode] handleMessage -> DEBU 170e [c9936150] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:03.677 UTC [chaincode] HandleTransaction -> DEBU 170f [c9936150] handling PUT_STATE from chaincode" -"2019-05-02 01:31:03.677 UTC [chaincode] HandleTransaction -> DEBU 1710 [c9936150] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:03.678 UTC [chaincode] handleMessage -> DEBU 1711 [c9936150] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:03.678 UTC [chaincode] HandleTransaction -> DEBU 1712 [c9936150] handling PUT_STATE from chaincode" -"2019-05-02 01:31:03.679 UTC [chaincode] HandleTransaction -> DEBU 1713 [c9936150] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:03.679 UTC [lifecycle] CommitChaincodeDefinition -> INFO 1714 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" -"2019-05-02 01:31:03.679 UTC [chaincode] handleMessage -> DEBU 1715 [c9936150] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:03.680 UTC [chaincode] Notify -> DEBU 1716 [c9936150] notifying Txid:c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, channelID:businesschannel" -"2019-05-02 01:31:03.680 UTC [chaincode] Execute -> DEBU 1717 Exit" -"2019-05-02 01:31:03.680 UTC [endorser] callChaincode -> INFO 1718 [businesschannel][c9936150] Exit chaincode: name:"_lifecycle" (31ms)" -"2019-05-02 01:31:03.680 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1719 Simulation completed, getting simulation results" -"2019-05-02 01:31:03.681 UTC [lockbasedtxmgr] Done -> DEBU 171a Done with transaction simulation / query execution [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf]" -"2019-05-02 01:31:03.681 UTC [endorser] SimulateProposal -> DEBU 171b [businesschannel][c9936150] Exit" -"2019-05-02 01:31:03.681 UTC [endorser] endorseProposal -> DEBU 171c [businesschannel][c9936150] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:03.682 UTC [endorser] endorseProposal -> DEBU 171d [businesschannel][c9936150] escc for chaincode name:"_lifecycle" is escc" -"2019-05-02 01:31:03.682 UTC [endorser] EndorseWithPlugin -> DEBU 171e Entering endorsement for {plugin: escc, channel: businesschannel, tx: c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, chaincode: _lifecycle}" -"2019-05-02 01:31:03.682 UTC [msp.identity] Sign -> DEBU 171f Sign: plaintext: 0A20B52222B2019A87A07F56E111E11B...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:03.683 UTC [msp.identity] Sign -> DEBU 1720 Sign: digest: 57ED09C5E0F901196CCD8E7D83214FC80C989F13C0EEAC98EFE5270E3E41AD4A " -"2019-05-02 01:31:03.683 UTC [endorser] EndorseWithPlugin -> DEBU 1721 Exiting {plugin: escc, channel: businesschannel, tx: c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, chaincode: _lifecycle}" -"2019-05-02 01:31:03.683 UTC [endorser] endorseProposal -> DEBU 1722 [businesschannel][c9936150] Exit" -"2019-05-02 01:31:03.683 UTC [lockbasedtxmgr] Done -> DEBU 1723 Done with transaction simulation / query execution [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf]" -"2019-05-02 01:31:03.684 UTC [endorser] func1 -> DEBU 1724 Exit: request from 192.168.240.9:41306" -"2019-05-02 01:31:03.684 UTC [comm.grpc.server] 1 -> INFO 1725 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41306 grpc.code=OK grpc.call_duration=40.2822ms -"2019-05-02 01:31:03.721 UTC [common.deliverevents] DeliverFiltered -> DEBU 1726 Starting new DeliverFiltered handler" -"2019-05-02 01:31:03.724 UTC [msp.identity] Sign -> DEBU 1727 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151017 " -"2019-05-02 01:31:03.724 UTC [msp.identity] Sign -> DEBU 1728 Sign: digest: 3F234E161921E5608E1E06847E3667D4F5934CB32189FAE241C31E2D33141BCD " -"2019-05-02 01:31:03.724 UTC [msp.identity] Sign -> DEBU 1729 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:03.724 UTC [msp.identity] Sign -> DEBU 172a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:03.726 UTC [gossip.discovery] periodicalSendAlive -> DEBU 172b Sleeping 5s" -"2019-05-02 01:31:03.728 UTC [msp] DeserializeIdentity -> DEBU 172c Obtaining identity" -"2019-05-02 01:31:03.721 UTC [common.deliver] Handle -> DEBU 172d Starting new deliver loop for 192.168.240.9:41308" -"2019-05-02 01:31:03.732 UTC [common.deliver] Handle -> DEBU 172f Attempting to read seek info message from 192.168.240.9:41308" -"2019-05-02 01:31:03.733 UTC [aclmgmt] CheckACL -> DEBU 1730 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" -"2019-05-02 01:31:03.734 UTC [aclmgmt] CheckACL -> DEBU 1731 acl check(/Channel/Application/Readers)" -"2019-05-02 01:31:03.730 UTC [msp] DeserializeIdentity -> DEBU 172e Obtaining identity" -"2019-05-02 01:31:03.737 UTC [msp] DeserializeIdentity -> DEBU 1732 Obtaining identity" -"2019-05-02 01:31:03.738 UTC [gossip.comm] Send -> DEBU 1733 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:03.738 UTC [policies] Evaluate -> DEBU 1734 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:03.741 UTC [policies] Evaluate -> DEBU 1735 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:03.741 UTC [policies] Evaluate -> DEBU 1736 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:03.742 UTC [gossip.comm] Send -> DEBU 1737 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:03.742 UTC [msp] DeserializeIdentity -> DEBU 1738 Obtaining identity" -"2019-05-02 01:31:03.742 UTC [gossip.comm] Send -> DEBU 1739 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func1 -> DEBU 173a 0xc003bb2b70 gate 1556760663742017700 evaluation starts" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 173b 0xc003bb2b70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 173c 0xc003bb2b70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 173d 0xc003bb2b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 173e 0xc003bb2b70 principal evaluation fails" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func1 -> DEBU 173f 0xc003bb2b70 gate 1556760663742017700 evaluation fails" -"2019-05-02 01:31:03.743 UTC [policies] Evaluate -> DEBU 1740 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:03.743 UTC [policies] Evaluate -> DEBU 1741 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:03.743 UTC [policies] Evaluate -> DEBU 1742 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func1 -> DEBU 1743 0xc003bb33b0 gate 1556760663743394900 evaluation starts" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 1744 0xc003bb33b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 1745 0xc003bb33b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 1746 0xc003bb33b0 principal matched by identity 0" -"2019-05-02 01:31:03.743 UTC [msp.identity] Verify -> DEBU 1747 Verify: digest = 00000000 8e 60 8b 21 62 de f4 4e 03 c9 f6 03 61 f4 4e e8 |.`.!b..N....a.N.| -00000010 3d 67 ef b4 3c f5 17 2b 20 54 69 73 96 7f 64 70 |=g..<..+ Tis..dp|" -"2019-05-02 01:31:03.743 UTC [msp.identity] Verify -> DEBU 1748 Verify: sig = 00000000 30 45 02 21 00 ec f0 74 71 94 af f3 50 b2 5f c0 |0E.!...tq...P._.| -00000010 5f 66 9f f6 74 f7 73 03 80 d5 17 50 6e e5 45 03 |_f..t.s....Pn.E.| -00000020 5a 9f 58 9e 57 02 20 3c dd 8b f8 eb bc 7e c5 4b |Z.X.W. <.....~.K| -00000030 b6 07 d7 91 3d f4 d3 30 58 2c 9a 0f ca af 15 1c |....=..0X,......| -00000040 8f 69 11 95 3d fa 1f |.i..=..|" -"2019-05-02 01:31:03.743 UTC [cauthdsl] func2 -> DEBU 1749 0xc003bb33b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:03.744 UTC [cauthdsl] func1 -> DEBU 174a 0xc003bb33b0 gate 1556760663743394900 evaluation succeeds" -"2019-05-02 01:31:03.744 UTC [policies] Evaluate -> DEBU 174b Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:03.744 UTC [policies] Evaluate -> DEBU 174c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:03.744 UTC [policies] Evaluate -> DEBU 174d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:03.744 UTC [policies] Evaluate -> DEBU 174e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:03.744 UTC [common.deliver] deliverBlocks -> DEBU 174f [channel: businesschannel] Received seekInfo (0xc003a19f00) start: > stop: > from 192.168.240.9:41308" -"2019-05-02 01:31:03.744 UTC [fsblkstorage] Next -> DEBU 1750 Initializing block stream for iterator. itr.maxBlockNumAvailable=4" -"2019-05-02 01:31:03.744 UTC [fsblkstorage] newBlockfileStream -> DEBU 1751 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[76086]" -"2019-05-02 01:31:03.744 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1752 Remaining bytes=[4711], Going to peek [8] bytes" -"2019-05-02 01:31:03.744 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1753 Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[76086], bytesOffset=[76088]}" -"2019-05-02 01:31:03.744 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1754 blockbytes [4709] read from file [0]" -"2019-05-02 01:31:03.744 UTC [common.deliver] deliverBlocks -> DEBU 1755 [channel: businesschannel] Delivering block [4] for (0xc003a19f00) for 192.168.240.9:41308" -"2019-05-02 01:31:03.745 UTC [fsblkstorage] waitForBlock -> DEBU 1756 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" -"2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 1757 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 1758 Exiting" -"2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 1759 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 175a Exiting" -"2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 175b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:03.745 UTC [gossip.comm] sendToEndpoint -> DEBU 175c Exiting" -"2019-05-02 01:31:03.766 UTC [gossip.comm] func1 -> DEBU 175d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:03.766 UTC [gossip.gossip] handleMessage -> DEBU 175e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:03.768 UTC [gossip.gossip] handleMessage -> DEBU 175f Exiting" -"2019-05-02 01:31:03.768 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1760 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:03.768 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1761 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:03.770 UTC [msp.identity] Verify -> DEBU 1762 Verify: digest = 00000000 3f 23 4e 16 19 21 e5 60 8e 1e 06 84 7e 36 67 d4 |?#N..!.`....~6g.| -00000010 f5 93 4c b3 21 89 fa e2 41 c3 1e 2d 33 14 1b cd |..L.!...A..-3...|" -"2019-05-02 01:31:03.771 UTC [msp.identity] Verify -> DEBU 1763 Verify: sig = 00000000 30 44 02 20 5f 64 7e bd 80 78 50 42 08 0f a9 f4 |0D. _d~..xPB....| -00000010 5f 9a f2 d6 2f 03 dd fb ca 8a 91 73 29 37 b4 46 |_.../......s)7.F| -00000020 4b 6f de 70 02 20 6e 05 5f 55 21 18 84 27 07 0f |Ko.p. n._U!..'..| -00000030 ad 20 e3 d6 2b b0 89 be 62 99 40 c9 dc 4f a2 65 |. ..+...b.@..O.e| -00000040 2f 50 f6 ec 51 f2 |/P..Q.|" -"2019-05-02 01:31:03.772 UTC [gossip.discovery] isSentByMe -> DEBU 1764 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:03.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1765 Exiting" -"2019-05-02 01:31:03.839 UTC [gossip.comm] func1 -> DEBU 1766 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.841 UTC [gossip.gossip] handleMessage -> DEBU 1767 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.842 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1768 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.842 UTC [gossip.gossip] handleMessage -> DEBU 1769 Exiting" -"2019-05-02 01:31:03.842 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 176a Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:03.842 UTC [msp] DeserializeIdentity -> DEBU 176b Obtaining identity" -"2019-05-02 01:31:03.843 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 176c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:03.843 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 176d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:03.843 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 176e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:03.845 UTC [policies] Evaluate -> DEBU 176f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:03.845 UTC [policies] Evaluate -> DEBU 1770 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:03.846 UTC [policies] Evaluate -> DEBU 1771 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:03.846 UTC [cauthdsl] func1 -> DEBU 1772 0xc003bc9860 gate 1556760663846784700 evaluation starts" -"2019-05-02 01:31:03.850 UTC [cauthdsl] func2 -> DEBU 1774 0xc003bc9860 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:03.849 UTC [gossip.gossip] handleMessage -> DEBU 1773 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.850 UTC [cauthdsl] func2 -> DEBU 1775 0xc003bc9860 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:03.855 UTC [cauthdsl] func2 -> DEBU 1776 0xc003bc9860 principal matched by identity 0" -"2019-05-02 01:31:03.856 UTC [msp.identity] Verify -> DEBU 1777 Verify: digest = 00000000 f0 38 5e 45 f9 30 3e 0f 36 45 62 d2 55 db ce b8 |.8^E.0>.6Eb.U...| -00000010 88 c9 dd a9 46 42 19 5c 8b 96 66 52 a9 98 64 07 |....FB.\..fR..d.|" -"2019-05-02 01:31:03.856 UTC [msp.identity] Verify -> DEBU 1778 Verify: sig = 00000000 30 45 02 21 00 c8 d5 6d 45 fc e5 31 60 bc b3 9f |0E.!...mE..1`...| -00000010 e7 22 63 75 10 74 2b 9e 03 ed 45 5d 8d 1b 72 9e |."cu.t+...E]..r.| -00000020 e2 4c 6b a4 85 02 20 63 4e 9d 10 86 9e 97 09 45 |.Lk... cN......E| -00000030 d0 22 ef b1 80 79 d2 44 a7 7a 58 42 fc 05 3f 0d |."...y.D.zXB..?.| -00000040 77 f9 b5 c2 3d 6a 2e |w...=j.|" -"2019-05-02 01:31:03.861 UTC [cauthdsl] func2 -> DEBU 1779 0xc003bc9860 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:03.862 UTC [cauthdsl] func1 -> DEBU 177a 0xc003bc9860 gate 1556760663846784700 evaluation succeeds" -"2019-05-02 01:31:03.862 UTC [policies] Evaluate -> DEBU 177b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:03.864 UTC [policies] Evaluate -> DEBU 177c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:03.870 UTC [policies] Evaluate -> DEBU 177d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:03.871 UTC [policies] Evaluate -> DEBU 177e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:03.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 177f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 1781 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:03.873 UTC [gossip.comm] func1 -> DEBU 1780 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 1782 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 " -"2019-05-02 01:31:03.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 1783 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 " -"2019-05-02 01:31:03.885 UTC [gossip.discovery] learnExistingMembers -> DEBU 1784 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:03.885 UTC [gossip.discovery] learnExistingMembers -> DEBU 1785 Exiting" -"2019-05-02 01:31:03.886 UTC [gossip.discovery] handleAliveMessage -> DEBU 1786 Exiting" -"2019-05-02 01:31:03.886 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1787 Exiting" -"2019-05-02 01:31:03.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1788 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.888 UTC [gossip.discovery] handleMsgFromComm -> DEBU 178a Exiting" -"2019-05-02 01:31:03.888 UTC [gossip.gossip] handleMessage -> DEBU 1789 Exiting" -"2019-05-02 01:31:03.888 UTC [gossip.gossip] handleMessage -> DEBU 178b Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.889 UTC [gossip.gossip] handleMessage -> DEBU 178c Exiting" -"2019-05-02 01:31:03.889 UTC [gossip.discovery] handleMsgFromComm -> DEBU 178d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.890 UTC [gossip.discovery] handleMsgFromComm -> DEBU 178e Exiting" -"2019-05-02 01:31:03.897 UTC [msp] DeserializeIdentity -> DEBU 178f Obtaining identity" -"2019-05-02 01:31:03.897 UTC [msp] DeserializeIdentity -> DEBU 1790 Obtaining identity" -"2019-05-02 01:31:03.898 UTC [msp] DeserializeIdentity -> DEBU 1791 Obtaining identity" -"2019-05-02 01:31:03.898 UTC [msp] DeserializeIdentity -> DEBU 1792 Obtaining identity" -"2019-05-02 01:31:03.899 UTC [msp] DeserializeIdentity -> DEBU 1793 Obtaining identity" -"2019-05-02 01:31:03.899 UTC [msp] DeserializeIdentity -> DEBU 1794 Obtaining identity" -"2019-05-02 01:31:03.899 UTC [msp] DeserializeIdentity -> DEBU 1795 Obtaining identity" -"2019-05-02 01:31:03.900 UTC [gossip.comm] Send -> DEBU 1796 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:03.900 UTC [msp] DeserializeIdentity -> DEBU 1797 Obtaining identity" -"2019-05-02 01:31:03.900 UTC [gossip.comm] Send -> DEBU 1798 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:03.900 UTC [gossip.comm] sendToEndpoint -> DEBU 1799 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.900 UTC [gossip.comm] sendToEndpoint -> DEBU 179a Exiting" -"2019-05-02 01:31:03.900 UTC [gossip.comm] sendToEndpoint -> DEBU 179b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:03.900 UTC [gossip.comm] sendToEndpoint -> DEBU 179c Exiting" -"2019-05-02 01:31:04.828 UTC [msp] DeserializeIdentity -> DEBU 179d Obtaining identity" -"2019-05-02 01:31:04.828 UTC [msp] DeserializeIdentity -> DEBU 179e Obtaining identity" -"2019-05-02 01:31:04.829 UTC [gossip.comm] Send -> DEBU 179f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:04.829 UTC [gossip.comm] sendToEndpoint -> DEBU 17a0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.830 UTC [gossip.comm] sendToEndpoint -> DEBU 17a1 Exiting" -"2019-05-02 01:31:04.830 UTC [gossip.comm] sendToEndpoint -> DEBU 17a2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.830 UTC [gossip.comm] sendToEndpoint -> DEBU 17a3 Exiting" -"2019-05-02 01:31:04.831 UTC [gossip.comm] sendToEndpoint -> DEBU 17a4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.831 UTC [gossip.comm] sendToEndpoint -> DEBU 17a5 Exiting" -"2019-05-02 01:31:04.833 UTC [gossip.comm] func1 -> DEBU 17a6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.834 UTC [gossip.gossip] handleMessage -> DEBU 17a7 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.834 UTC [msp] DeserializeIdentity -> DEBU 17a8 Obtaining identity" -"2019-05-02 01:31:04.835 UTC [msp.identity] Verify -> DEBU 17a9 Verify: digest = 00000000 62 20 38 e5 ef a2 e5 f2 5a 12 9c 1c e0 ab b8 20 |b 8.....Z...... | -00000010 ee ef d0 09 80 93 8f 39 cd 56 59 46 37 7a ea 2c |.......9.VYF7z.,|" -"2019-05-02 01:31:04.835 UTC [msp.identity] Verify -> DEBU 17aa Verify: sig = 00000000 30 45 02 21 00 a0 72 33 1f bf 7c 3f bc ad 89 09 |0E.!..r3..|?....| -00000010 4a c4 b6 ca 36 cf 5c e9 5d db 3d 4a 6b 26 e9 98 |J...6.\.].=Jk&..| -00000020 14 e5 c4 fd fc 02 20 2d 29 15 91 0c ae 2a 50 d6 |...... -)....*P.| -00000030 46 65 a1 7a 2e bf a4 c3 54 ae ad 60 6f db 12 70 |Fe.z....T..`o..p| -00000040 fe 4c a5 9a 6b 78 2b |.L..kx+|" -"2019-05-02 01:31:04.836 UTC [msp.identity] Verify -> DEBU 17ab Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -"2019-05-02 01:31:04.836 UTC [msp.identity] Verify -> DEBU 17ac Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -"2019-05-02 01:31:04.837 UTC [msp] DeserializeIdentity -> DEBU 17ad Obtaining identity" -"2019-05-02 01:31:04.837 UTC [msp] DeserializeIdentity -> DEBU 17ae Obtaining identity" -"2019-05-02 01:31:04.838 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:04.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17b0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17b1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.839 UTC [policies] Evaluate -> DEBU 17b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:04.839 UTC [policies] Evaluate -> DEBU 17b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:04.840 UTC [policies] Evaluate -> DEBU 17b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:04.840 UTC [cauthdsl] func1 -> DEBU 17b6 0xc003c3c8e0 gate 1556760664840387300 evaluation starts" -"2019-05-02 01:31:04.839 UTC [msp] DeserializeIdentity -> DEBU 17b4 Obtaining identity" -"2019-05-02 01:31:04.841 UTC [cauthdsl] func2 -> DEBU 17b7 0xc003c3c8e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:04.842 UTC [cauthdsl] func2 -> DEBU 17b9 0xc003c3c8e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:04.843 UTC [cauthdsl] func2 -> DEBU 17ba 0xc003c3c8e0 principal matched by identity 0" -"2019-05-02 01:31:04.843 UTC [msp.identity] Verify -> DEBU 17bb Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -"2019-05-02 01:31:04.843 UTC [msp.identity] Verify -> DEBU 17bc Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -00000040 58 07 a6 98 8c c7 |X.....|" -"2019-05-02 01:31:04.844 UTC [cauthdsl] func2 -> DEBU 17bd 0xc003c3c8e0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:04.844 UTC [cauthdsl] func1 -> DEBU 17be 0xc003c3c8e0 gate 1556760664840387300 evaluation succeeds" -"2019-05-02 01:31:04.845 UTC [policies] Evaluate -> DEBU 17bf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.845 UTC [policies] Evaluate -> DEBU 17c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.845 UTC [policies] Evaluate -> DEBU 17c1 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:04.845 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:04.846 UTC [msp] DeserializeIdentity -> DEBU 17c3 Obtaining identity" -"2019-05-02 01:31:04.846 UTC [msp] DeserializeIdentity -> DEBU 17c4 Obtaining identity" -"2019-05-02 01:31:04.847 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17c5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:04.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17c6 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17c7 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.847 UTC [policies] Evaluate -> DEBU 17c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:04.848 UTC [policies] Evaluate -> DEBU 17c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:04.848 UTC [policies] Evaluate -> DEBU 17ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:04.848 UTC [cauthdsl] func1 -> DEBU 17cb 0xc003c56120 gate 1556760664848473600 evaluation starts" -"2019-05-02 01:31:04.849 UTC [cauthdsl] func2 -> DEBU 17cc 0xc003c56120 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:04.849 UTC [cauthdsl] func2 -> DEBU 17cd 0xc003c56120 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:04.842 UTC [gossip.comm] func1 -> DEBU 17b8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.855 UTC [cauthdsl] func2 -> DEBU 17ce 0xc003c56120 principal matched by identity 0" -"2019-05-02 01:31:04.857 UTC [msp.identity] Verify -> DEBU 17cf Verify: digest = 00000000 6e b0 75 c4 51 40 0e aa 99 5b d4 4c e9 2b e8 4b |n.u.Q@...[.L.+.K| -00000010 ef 3b fb 35 be f1 cd 9c a2 03 51 d3 59 0e 44 3f |.;.5......Q.Y.D?|" -"2019-05-02 01:31:04.857 UTC [msp.identity] Verify -> DEBU 17d0 Verify: sig = 00000000 30 44 02 20 03 37 d6 b4 db fc c5 c5 97 d9 b7 82 |0D. .7..........| -00000010 cb 4f 24 2e 01 c9 0e 5c d3 74 96 47 c2 70 5b 15 |.O$....\.t.G.p[.| -00000020 fb c0 c7 e5 02 20 50 5c 72 51 31 e9 74 c2 2b 1c |..... P\rQ1.t.+.| -00000030 3a 93 ab aa 2e 7a 88 04 ea b7 85 74 e0 2a 64 2d |:....z.....t.*d-| -00000040 14 3b 47 ea f2 83 |.;G...|" -"2019-05-02 01:31:04.857 UTC [cauthdsl] func2 -> DEBU 17d1 0xc003c56120 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:04.858 UTC [cauthdsl] func1 -> DEBU 17d2 0xc003c56120 gate 1556760664848473600 evaluation succeeds" -"2019-05-02 01:31:04.858 UTC [policies] Evaluate -> DEBU 17d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.858 UTC [policies] Evaluate -> DEBU 17d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.859 UTC [policies] Evaluate -> DEBU 17d5 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:04.863 UTC [policies] Evaluate -> DEBU 17d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:04.865 UTC [msp] DeserializeIdentity -> DEBU 17d8 Obtaining identity" -"2019-05-02 01:31:04.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17d9 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.863 UTC [msp] DeserializeIdentity -> DEBU 17d6 Obtaining identity" -"2019-05-02 01:31:04.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17da Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.867 UTC [policies] Evaluate -> DEBU 17dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:04.868 UTC [policies] Evaluate -> DEBU 17dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:04.868 UTC [policies] Evaluate -> DEBU 17de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:04.867 UTC [gossip.comm] Send -> DEBU 17db Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" -"2019-05-02 01:31:04.868 UTC [cauthdsl] func1 -> DEBU 17df 0xc003c1ac20 gate 1556760664868545200 evaluation starts" -"2019-05-02 01:31:04.869 UTC [cauthdsl] func2 -> DEBU 17e1 0xc003c1ac20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:04.870 UTC [cauthdsl] func2 -> DEBU 17e2 0xc003c1ac20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:04.871 UTC [cauthdsl] func2 -> DEBU 17e3 0xc003c1ac20 principal matched by identity 0" -"2019-05-02 01:31:04.873 UTC [msp.identity] Verify -> DEBU 17e6 Verify: digest = 00000000 6e b0 75 c4 51 40 0e aa 99 5b d4 4c e9 2b e8 4b |n.u.Q@...[.L.+.K| -00000010 ef 3b fb 35 be f1 cd 9c a2 03 51 d3 59 0e 44 3f |.;.5......Q.Y.D?|" -"2019-05-02 01:31:04.873 UTC [msp.identity] Verify -> DEBU 17e7 Verify: sig = 00000000 30 44 02 20 03 37 d6 b4 db fc c5 c5 97 d9 b7 82 |0D. .7..........| -00000010 cb 4f 24 2e 01 c9 0e 5c d3 74 96 47 c2 70 5b 15 |.O$....\.t.G.p[.| -00000020 fb c0 c7 e5 02 20 50 5c 72 51 31 e9 74 c2 2b 1c |..... P\rQ1.t.+.| -00000030 3a 93 ab aa 2e 7a 88 04 ea b7 85 74 e0 2a 64 2d |:....z.....t.*d-| -00000040 14 3b 47 ea f2 83 |.;G...|" -"2019-05-02 01:31:04.871 UTC [msp] DeserializeIdentity -> DEBU 17e4 Obtaining identity" -"2019-05-02 01:31:04.871 UTC [gossip.comm] sendToEndpoint -> DEBU 17e5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:04.869 UTC [gossip.comm] sendToEndpoint -> DEBU 17e0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:04.875 UTC [gossip.comm] sendToEndpoint -> DEBU 17e8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:04.876 UTC [cauthdsl] func2 -> DEBU 17e9 0xc003c1ac20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:04.876 UTC [msp] DeserializeIdentity -> DEBU 17ea Obtaining identity" -"2019-05-02 01:31:04.877 UTC [gossip.comm] sendToEndpoint -> DEBU 17eb Exiting" -"2019-05-02 01:31:04.880 UTC [gossip.comm] sendToEndpoint -> DEBU 17ec Exiting" -"2019-05-02 01:31:04.881 UTC [gossip.comm] sendToEndpoint -> DEBU 17ed Exiting" -"2019-05-02 01:31:04.882 UTC [cauthdsl] func1 -> DEBU 17ee 0xc003c1ac20 gate 1556760664868545200 evaluation succeeds" -"2019-05-02 01:31:04.884 UTC [policies] Evaluate -> DEBU 17ef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.884 UTC [policies] Evaluate -> DEBU 17f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.885 UTC [policies] Evaluate -> DEBU 17f1 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:04.885 UTC [policies] Evaluate -> DEBU 17f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:04.886 UTC [gossip.gossip] handleMessage -> DEBU 17f3 Exiting" -"2019-05-02 01:31:04.886 UTC [gossip.gossip] handleMessage -> DEBU 17f4 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.891 UTC [msp.identity] Verify -> DEBU 17f5 Verify: digest = 00000000 62 20 38 e5 ef a2 e5 f2 5a 12 9c 1c e0 ab b8 20 |b 8.....Z...... | -00000010 ee ef d0 09 80 93 8f 39 cd 56 59 46 37 7a ea 2c |.......9.VYF7z.,|" -"2019-05-02 01:31:04.892 UTC [msp.identity] Verify -> DEBU 17f6 Verify: sig = 00000000 30 45 02 21 00 a0 72 33 1f bf 7c 3f bc ad 89 09 |0E.!..r3..|?....| -00000010 4a c4 b6 ca 36 cf 5c e9 5d db 3d 4a 6b 26 e9 98 |J...6.\.].=Jk&..| -00000020 14 e5 c4 fd fc 02 20 2d 29 15 91 0c ae 2a 50 d6 |...... -)....*P.| -00000030 46 65 a1 7a 2e bf a4 c3 54 ae ad 60 6f db 12 70 |Fe.z....T..`o..p| -00000040 fe 4c a5 9a 6b 78 2b |.L..kx+|" -"2019-05-02 01:31:04.894 UTC [msp] DeserializeIdentity -> DEBU 17f7 Obtaining identity" -"2019-05-02 01:31:04.896 UTC [msp] DeserializeIdentity -> DEBU 17f8 Obtaining identity" -"2019-05-02 01:31:04.897 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:04.898 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17fa Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.899 UTC [gossip.comm] func1 -> DEBU 17fb Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:04.900 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17fc Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.902 UTC [policies] Evaluate -> DEBU 17fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:04.904 UTC [policies] Evaluate -> DEBU 17fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:04.905 UTC [policies] Evaluate -> DEBU 17ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:04.905 UTC [cauthdsl] func1 -> DEBU 1800 0xc003c6cd40 gate 1556760664905242100 evaluation starts" -"2019-05-02 01:31:04.905 UTC [cauthdsl] func2 -> DEBU 1801 0xc003c6cd40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:04.905 UTC [cauthdsl] func2 -> DEBU 1802 0xc003c6cd40 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:04.905 UTC [cauthdsl] func2 -> DEBU 1803 0xc003c6cd40 principal matched by identity 0" -"2019-05-02 01:31:04.905 UTC [msp.identity] Verify -> DEBU 1804 Verify: digest = 00000000 9d e9 47 45 58 55 ba 08 a7 c1 57 d6 e2 0b 98 a9 |..GEXU....W.....| -00000010 70 2e 25 cd 61 06 ef 5c 24 6d 52 07 20 12 c0 72 |p.%.a..\$mR. ..r|" -"2019-05-02 01:31:04.905 UTC [msp.identity] Verify -> DEBU 1805 Verify: sig = 00000000 30 44 02 20 21 fa 63 73 4d 87 7b 3d 61 8c bb 6c |0D. !.csM.{=a..l| -00000010 4a f2 88 4d 2f d6 9f e4 01 31 93 ed c5 62 ee 74 |J..M/....1...b.t| -00000020 e2 e6 3f f9 02 20 7a 8b de 81 f5 fc 73 7c b1 01 |..?.. z.....s|..| -00000030 27 44 48 aa a2 df 3a e3 d8 45 54 3d 5e a5 25 33 |'DH...:..ET=^.%3| -00000040 a7 5c 29 e1 73 d4 |.\).s.|" -"2019-05-02 01:31:04.906 UTC [cauthdsl] func2 -> DEBU 1806 0xc003c6cd40 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:04.906 UTC [cauthdsl] func1 -> DEBU 1807 0xc003c6cd40 gate 1556760664905242100 evaluation succeeds" -"2019-05-02 01:31:04.906 UTC [policies] Evaluate -> DEBU 1808 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.907 UTC [policies] Evaluate -> DEBU 1809 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.907 UTC [policies] Evaluate -> DEBU 180a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:04.907 UTC [msp] DeserializeIdentity -> DEBU 180b Obtaining identity" -"2019-05-02 01:31:04.908 UTC [msp] DeserializeIdentity -> DEBU 180c Obtaining identity" -"2019-05-02 01:31:04.909 UTC [gossip.pull] Hello -> DEBU 180d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:04.909 UTC [msp] DeserializeIdentity -> DEBU 180e Obtaining identity" -"2019-05-02 01:31:04.909 UTC [msp] DeserializeIdentity -> DEBU 180f Obtaining identity" -"2019-05-02 01:31:04.910 UTC [gossip.comm] Send -> DEBU 1810 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:04.910 UTC [gossip.comm] sendToEndpoint -> DEBU 1811 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.910 UTC [gossip.comm] sendToEndpoint -> DEBU 1812 Exiting" -"2019-05-02 01:31:04.907 UTC [policies] Evaluate -> DEBU 1813 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:04.911 UTC [msp] DeserializeIdentity -> DEBU 1814 Obtaining identity" -"2019-05-02 01:31:04.911 UTC [msp] DeserializeIdentity -> DEBU 1815 Obtaining identity" -"2019-05-02 01:31:04.913 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1816 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:04.914 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1817 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.915 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1818 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.915 UTC [policies] Evaluate -> DEBU 1819 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:04.916 UTC [policies] Evaluate -> DEBU 181a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:04.916 UTC [policies] Evaluate -> DEBU 181b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:04.917 UTC [cauthdsl] func1 -> DEBU 181c 0xc003c96510 gate 1556760664917569600 evaluation starts" -"2019-05-02 01:31:04.918 UTC [cauthdsl] func2 -> DEBU 181d 0xc003c96510 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:04.918 UTC [cauthdsl] func2 -> DEBU 181e 0xc003c96510 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:04.919 UTC [cauthdsl] func2 -> DEBU 181f 0xc003c96510 principal matched by identity 0" -"2019-05-02 01:31:04.920 UTC [msp.identity] Verify -> DEBU 1820 Verify: digest = 00000000 ca cc 75 2f 36 82 80 35 17 ce 6e d0 f0 4f 55 e6 |..u/6..5..n..OU.| -00000010 e3 82 58 9b 74 8d ef 89 74 eb 23 5c e4 e9 fb de |..X.t...t.#\....|" -"2019-05-02 01:31:04.920 UTC [msp.identity] Verify -> DEBU 1821 Verify: sig = 00000000 30 44 02 20 2e 46 a8 a5 4b f8 4e e0 6c 30 a4 78 |0D. .F..K.N.l0.x| -00000010 83 e4 8c 07 f0 70 02 33 06 fd f4 9b 5c e1 a5 38 |.....p.3....\..8| -00000020 33 76 ff 8f 02 20 52 d1 16 82 05 3d 1a 54 b8 bc |3v... R....=.T..| -00000030 8c 84 90 5a d9 62 d7 e4 22 6f 8a 2d 3e 4f 70 eb |...Z.b.."o.->Op.| -00000040 58 07 a6 98 8c c7 |X.....|" -"2019-05-02 01:31:04.921 UTC [cauthdsl] func2 -> DEBU 1822 0xc003c96510 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:04.921 UTC [cauthdsl] func1 -> DEBU 1823 0xc003c96510 gate 1556760664917569600 evaluation succeeds" -"2019-05-02 01:31:04.922 UTC [policies] Evaluate -> DEBU 1824 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.922 UTC [policies] Evaluate -> DEBU 1825 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.923 UTC [policies] Evaluate -> DEBU 1826 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:04.923 UTC [policies] Evaluate -> DEBU 1827 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:04.924 UTC [msp.identity] Verify -> DEBU 1828 Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -"2019-05-02 01:31:04.925 UTC [msp.identity] Verify -> DEBU 1829 Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -"2019-05-02 01:31:04.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 182a Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 182b Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.927 UTC [policies] Evaluate -> DEBU 182c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:04.927 UTC [policies] Evaluate -> DEBU 182d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:04.928 UTC [policies] Evaluate -> DEBU 182e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:04.928 UTC [cauthdsl] func1 -> DEBU 182f 0xc003c97c10 gate 1556760664928842900 evaluation starts" -"2019-05-02 01:31:04.929 UTC [cauthdsl] func2 -> DEBU 1830 0xc003c97c10 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:04.930 UTC [cauthdsl] func2 -> DEBU 1831 0xc003c97c10 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:04.930 UTC [cauthdsl] func2 -> DEBU 1832 0xc003c97c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:04.930 UTC [cauthdsl] func2 -> DEBU 1833 0xc003c97c10 principal evaluation fails" -"2019-05-02 01:31:04.931 UTC [cauthdsl] func1 -> DEBU 1834 0xc003c97c10 gate 1556760664928842900 evaluation fails" -"2019-05-02 01:31:04.931 UTC [policies] Evaluate -> DEBU 1835 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.932 UTC [policies] Evaluate -> DEBU 1836 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.932 UTC [policies] Evaluate -> DEBU 1837 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:04.932 UTC [cauthdsl] func1 -> DEBU 1838 0xc003caa450 gate 1556760664932599300 evaluation starts" -"2019-05-02 01:31:04.932 UTC [cauthdsl] func2 -> DEBU 1839 0xc003caa450 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:04.932 UTC [cauthdsl] func2 -> DEBU 183a 0xc003caa450 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:04.932 UTC [cauthdsl] func2 -> DEBU 183b 0xc003caa450 principal matched by identity 0" -"2019-05-02 01:31:04.932 UTC [msp.identity] Verify -> DEBU 183c Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -"2019-05-02 01:31:04.932 UTC [msp.identity] Verify -> DEBU 183d Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -"2019-05-02 01:31:04.933 UTC [cauthdsl] func2 -> DEBU 183e 0xc003caa450 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:04.933 UTC [cauthdsl] func1 -> DEBU 183f 0xc003caa450 gate 1556760664932599300 evaluation succeeds" -"2019-05-02 01:31:04.933 UTC [policies] Evaluate -> DEBU 1840 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:04.933 UTC [policies] Evaluate -> DEBU 1841 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:04.933 UTC [policies] Evaluate -> DEBU 1842 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:04.933 UTC [policies] Evaluate -> DEBU 1843 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:04.933 UTC [gossip.gossip] handleMessage -> DEBU 1844 Exiting" -"2019-05-02 01:31:04.933 UTC [gossip.gossip] handleMessage -> DEBU 1845 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.933 UTC [msp] DeserializeIdentity -> DEBU 1846 Obtaining identity" -"2019-05-02 01:31:04.934 UTC [msp.identity] Verify -> DEBU 1847 Verify: digest = 00000000 62 20 38 e5 ef a2 e5 f2 5a 12 9c 1c e0 ab b8 20 |b 8.....Z...... | -00000010 ee ef d0 09 80 93 8f 39 cd 56 59 46 37 7a ea 2c |.......9.VYF7z.,|" -"2019-05-02 01:31:04.934 UTC [msp.identity] Verify -> DEBU 1848 Verify: sig = 00000000 30 45 02 21 00 a0 72 33 1f bf 7c 3f bc ad 89 09 |0E.!..r3..|?....| -00000010 4a c4 b6 ca 36 cf 5c e9 5d db 3d 4a 6b 26 e9 98 |J...6.\.].=Jk&..| -00000020 14 e5 c4 fd fc 02 20 2d 29 15 91 0c ae 2a 50 d6 |...... -)....*P.| -00000030 46 65 a1 7a 2e bf a4 c3 54 ae ad 60 6f db 12 70 |Fe.z....T..`o..p| -00000040 fe 4c a5 9a 6b 78 2b |.L..kx+|" -"2019-05-02 01:31:04.934 UTC [msp.identity] Verify -> DEBU 1849 Verify: digest = 00000000 6c a1 55 20 6e 17 61 c2 4d a1 28 d4 5d ca ef 7f |l.U n.a.M.(.]...| -00000010 e7 b5 d5 fc 0e 01 ae 11 41 89 24 14 fe 96 59 c9 |........A.$...Y.|" -"2019-05-02 01:31:04.934 UTC [msp.identity] Verify -> DEBU 184a Verify: sig = 00000000 30 45 02 21 00 c2 cb 39 2d 3b 5f a2 a3 b6 de 6e |0E.!...9-;_....n| -00000010 b3 2f 57 2a e0 a7 e6 8e f1 6e 08 64 e4 7b 62 54 |./W*.....n.d.{bT| -00000020 4c 09 a9 ae 5f 02 20 37 31 0a 8f 40 a0 2e 2a 4d |L..._. 71..@..*M| -00000030 46 69 ef 02 1b b4 17 e4 99 9f a2 17 1b 8f 17 bd |Fi..............| -00000040 3f 7b 09 06 c1 61 9f |?{...a.|" -"2019-05-02 01:31:04.935 UTC [msp] DeserializeIdentity -> DEBU 184b Obtaining identity" -"2019-05-02 01:31:04.935 UTC [msp] DeserializeIdentity -> DEBU 184c Obtaining identity" -"2019-05-02 01:31:04.935 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 184d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:04.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 184e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 184f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.935 UTC [policies] Evaluate -> DEBU 1850 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:04.935 UTC [policies] Evaluate -> DEBU 1851 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:04.935 UTC [policies] Evaluate -> DEBU 1852 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:04.935 UTC [cauthdsl] func1 -> DEBU 1853 0xc003cc0da0 gate 1556760664935842800 evaluation starts" -"2019-05-02 01:31:04.935 UTC [cauthdsl] func2 -> DEBU 1854 0xc003cc0da0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:04.935 UTC [cauthdsl] func2 -> DEBU 1855 0xc003cc0da0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:04.936 UTC [cauthdsl] func2 -> DEBU 1856 0xc003cc0da0 principal matched by identity 0" -"2019-05-02 01:31:04.936 UTC [msp.identity] Verify -> DEBU 1857 Verify: digest = 00000000 9d e9 47 45 58 55 ba 08 a7 c1 57 d6 e2 0b 98 a9 |..GEXU....W.....| -00000010 70 2e 25 cd 61 06 ef 5c 24 6d 52 07 20 12 c0 72 |p.%.a..\$mR. ..r|" -"2019-05-02 01:31:04.936 UTC [msp.identity] Verify -> DEBU 1858 Verify: sig = 00000000 30 44 02 20 21 fa 63 73 4d 87 7b 3d 61 8c bb 6c |0D. !.csM.{=a..l| -00000010 4a f2 88 4d 2f d6 9f e4 01 31 93 ed c5 62 ee 74 |J..M/....1...b.t| -00000020 e2 e6 3f f9 02 20 7a 8b de 81 f5 fc 73 7c b1 01 |..?.. z.....s|..| -00000030 27 44 48 aa a2 df 3a e3 d8 45 54 3d 5e a5 25 33 |'DH...:..ET=^.%3| -00000040 a7 5c 29 e1 73 d4 |.\).s.|" -"2019-05-02 01:31:04.936 UTC [cauthdsl] func2 -> DEBU 1859 0xc003cc0da0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:04.936 UTC [cauthdsl] func1 -> DEBU 185a 0xc003cc0da0 gate 1556760664935842800 evaluation succeeds" -"2019-05-02 01:31:04.936 UTC [policies] Evaluate -> DEBU 185b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.936 UTC [policies] Evaluate -> DEBU 185c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.936 UTC [policies] Evaluate -> DEBU 185d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:04.936 UTC [policies] Evaluate -> DEBU 185e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:04.936 UTC [msp] DeserializeIdentity -> DEBU 185f Obtaining identity" -"2019-05-02 01:31:04.936 UTC [msp] DeserializeIdentity -> DEBU 1860 Obtaining identity" -"2019-05-02 01:31:04.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1861 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:04.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1862 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1863 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.937 UTC [policies] Evaluate -> DEBU 1864 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:04.937 UTC [policies] Evaluate -> DEBU 1865 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:04.937 UTC [policies] Evaluate -> DEBU 1866 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:04.937 UTC [cauthdsl] func1 -> DEBU 1867 0xc003cd6570 gate 1556760664937530000 evaluation starts" -"2019-05-02 01:31:04.937 UTC [cauthdsl] func2 -> DEBU 1868 0xc003cd6570 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:04.937 UTC [cauthdsl] func2 -> DEBU 1869 0xc003cd6570 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:04.938 UTC [cauthdsl] func2 -> DEBU 186a 0xc003cd6570 principal matched by identity 0" -"2019-05-02 01:31:04.940 UTC [msp.identity] Verify -> DEBU 186b Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -"2019-05-02 01:31:04.940 UTC [msp.identity] Verify -> DEBU 186c Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -00000040 29 fe 17 41 ee e9 a4 |)..A...|" -"2019-05-02 01:31:04.941 UTC [cauthdsl] func2 -> DEBU 186d 0xc003cd6570 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:04.942 UTC [cauthdsl] func1 -> DEBU 186e 0xc003cd6570 gate 1556760664937530000 evaluation succeeds" -"2019-05-02 01:31:04.942 UTC [policies] Evaluate -> DEBU 186f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.943 UTC [policies] Evaluate -> DEBU 1870 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.943 UTC [policies] Evaluate -> DEBU 1871 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:04.944 UTC [policies] Evaluate -> DEBU 1872 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:04.944 UTC [msp] DeserializeIdentity -> DEBU 1873 Obtaining identity" -"2019-05-02 01:31:04.944 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1874 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.945 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1875 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:04.945 UTC [policies] Evaluate -> DEBU 1876 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:04.946 UTC [policies] Evaluate -> DEBU 1877 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:04.946 UTC [policies] Evaluate -> DEBU 1878 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:04.946 UTC [cauthdsl] func1 -> DEBU 1879 0xc003cd7650 gate 1556760664946835600 evaluation starts" -"2019-05-02 01:31:04.947 UTC [cauthdsl] func2 -> DEBU 187a 0xc003cd7650 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:04.947 UTC [cauthdsl] func2 -> DEBU 187b 0xc003cd7650 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:04.947 UTC [cauthdsl] func2 -> DEBU 187c 0xc003cd7650 principal matched by identity 0" -"2019-05-02 01:31:04.948 UTC [msp.identity] Verify -> DEBU 187d Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -"2019-05-02 01:31:04.948 UTC [msp.identity] Verify -> DEBU 187e Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -00000040 29 fe 17 41 ee e9 a4 |)..A...|" -"2019-05-02 01:31:04.949 UTC [cauthdsl] func2 -> DEBU 187f 0xc003cd7650 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:04.949 UTC [cauthdsl] func1 -> DEBU 1880 0xc003cd7650 gate 1556760664946835600 evaluation succeeds" -"2019-05-02 01:31:04.950 UTC [policies] Evaluate -> DEBU 1881 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.950 UTC [policies] Evaluate -> DEBU 1882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:04.950 UTC [policies] Evaluate -> DEBU 1883 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:04.950 UTC [policies] Evaluate -> DEBU 1884 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:04.950 UTC [gossip.gossip] handleMessage -> DEBU 1885 Exiting" -"2019-05-02 01:31:04.950 UTC [gossip.gossip] handleMessage -> DEBU 1886 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760661767747700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:04.951 UTC [msp.identity] Verify -> DEBU 1887 Verify: digest = 00000000 51 65 a8 f5 3d 66 bd 4c ea e1 02 f7 5e 30 2f a6 |Qe..=f.L....^0/.| -00000010 55 da ac 09 e9 16 bc e3 88 66 89 a2 a0 ea 8a b9 |U........f......|" -"2019-05-02 01:31:04.952 UTC [msp.identity] Verify -> DEBU 1888 Verify: sig = 00000000 30 44 02 20 71 7c bf 73 a9 07 a1 55 62 45 53 17 |0D. q|.s...UbES.| -00000010 6a 2b f5 6d c7 d1 ec 07 06 c9 cb 70 67 73 a0 39 |j+.m.......pgs.9| -00000020 68 ac 47 72 02 20 78 14 ae 0d d3 31 4a f6 69 be |h.Gr. x....1J.i.| -00000030 d9 18 3c aa 9e bf 90 5b 8c 6b 73 69 80 0c dc 64 |..<....[.ksi...d| -00000040 89 a4 87 bc 1a 1d |......|" -"2019-05-02 01:31:04.952 UTC [msp] DeserializeIdentity -> DEBU 1889 Obtaining identity" -"2019-05-02 01:31:04.953 UTC [gossip.gossip] handleMessage -> DEBU 188a Exiting" -"2019-05-02 01:31:04.953 UTC [gossip.gossip] handleMessage -> DEBU 188b Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10372144665844536393 , Msg_type: BLOCK_MSG, digests: [1 2 3 4], Envelope: 46 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.954 UTC [gossip.pull] HandleMessage -> DEBU 188c GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10372144665844536393 , Msg_type: BLOCK_MSG, digests: [1 2 3 4], Envelope: 46 bytes, Signature: 0 bytes" -"2019-05-02 01:31:04.954 UTC [gossip.gossip] handleMessage -> DEBU 188d Exiting" -"2019-05-02 01:31:05.090 UTC [gossip.gossip] handleMessage -> DEBU 188e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.092 UTC [msp] DeserializeIdentity -> DEBU 188f Obtaining identity" -"2019-05-02 01:31:05.094 UTC [msp] DeserializeIdentity -> DEBU 1890 Obtaining identity" -"2019-05-02 01:31:05.095 UTC [gossip.gossip] handleMessage -> DEBU 1891 Exiting" -"2019-05-02 01:31:05.101 UTC [gossip.gossip] handleMessage -> DEBU 1892 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760661750302400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:05.101 UTC [msp.identity] Verify -> DEBU 1893 Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -"2019-05-02 01:31:05.101 UTC [msp.identity] Verify -> DEBU 1894 Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -"2019-05-02 01:31:05.102 UTC [gossip.gossip] handleMessage -> DEBU 1895 Exiting" -"2019-05-02 01:31:05.109 UTC [gossip.gossip] handleMessage -> DEBU 1896 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.110 UTC [gossip.pull] HandleMessage -> DEBU 1897 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.110 UTC [gossip.pull] SendDigest -> DEBU 1898 Sending BLOCK_MSG digest: [1 2 3 4] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:05.111 UTC [gossip.gossip] handleMessage -> DEBU 1899 Exiting" -"2019-05-02 01:31:05.126 UTC [gossip.comm] func1 -> DEBU 189a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760661750302400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:05.127 UTC [gossip.gossip] handleMessage -> DEBU 189b Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760661750302400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:05.127 UTC [msp.identity] Verify -> DEBU 189c Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -"2019-05-02 01:31:05.128 UTC [msp.identity] Verify -> DEBU 189d Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -"2019-05-02 01:31:05.129 UTC [msp] DeserializeIdentity -> DEBU 189e Obtaining identity" -"2019-05-02 01:31:05.129 UTC [gossip.gossip] handleMessage -> DEBU 189f Exiting" -"2019-05-02 01:31:05.142 UTC [gossip.comm] func1 -> DEBU 18a0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760661750302400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:05.146 UTC [gossip.gossip] handleMessage -> DEBU 18a1 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760661750302400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:05.147 UTC [msp.identity] Verify -> DEBU 18a2 Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -"2019-05-02 01:31:05.148 UTC [msp.identity] Verify -> DEBU 18a3 Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -"2019-05-02 01:31:05.152 UTC [msp] DeserializeIdentity -> DEBU 18a4 Obtaining identity" -"2019-05-02 01:31:05.153 UTC [gossip.gossip] handleMessage -> DEBU 18a5 Exiting" -"2019-05-02 01:31:05.320 UTC [gossip.comm] func1 -> DEBU 18a6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.321 UTC [gossip.gossip] handleMessage -> DEBU 18a7 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.323 UTC [msp] DeserializeIdentity -> DEBU 18a8 Obtaining identity" -"2019-05-02 01:31:05.323 UTC [msp] DeserializeIdentity -> DEBU 18a9 Obtaining identity" -"2019-05-02 01:31:05.324 UTC [msp] DeserializeIdentity -> DEBU 18aa Obtaining identity" -"2019-05-02 01:31:05.325 UTC [gossip.gossip] handleMessage -> DEBU 18ab Exiting" -"2019-05-02 01:31:05.356 UTC [gossip.comm] func1 -> DEBU 18ac Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760661686498500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:05.356 UTC [gossip.gossip] handleMessage -> DEBU 18ad Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760661686498500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:05.356 UTC [msp] DeserializeIdentity -> DEBU 18ae Obtaining identity" -"2019-05-02 01:31:05.356 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:05.358 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18b0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.358 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18b1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.363 UTC [policies] Evaluate -> DEBU 18b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:05.363 UTC [policies] Evaluate -> DEBU 18b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:05.369 UTC [gossip.comm] func1 -> DEBU 18b4 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760661686498500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:05.370 UTC [policies] Evaluate -> DEBU 18b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:05.377 UTC [cauthdsl] func1 -> DEBU 18b6 0xc003d2e090 gate 1556760665377221300 evaluation starts" -"2019-05-02 01:31:05.379 UTC [cauthdsl] func2 -> DEBU 18b7 0xc003d2e090 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:05.379 UTC [cauthdsl] func2 -> DEBU 18b8 0xc003d2e090 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:05.385 UTC [cauthdsl] func2 -> DEBU 18b9 0xc003d2e090 principal matched by identity 0" -"2019-05-02 01:31:05.389 UTC [msp.identity] Verify -> DEBU 18ba Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -"2019-05-02 01:31:05.389 UTC [msp.identity] Verify -> DEBU 18bb Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -00000040 29 fe 17 41 ee e9 a4 |)..A...|" -"2019-05-02 01:31:05.393 UTC [cauthdsl] func2 -> DEBU 18bc 0xc003d2e090 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:05.394 UTC [cauthdsl] func1 -> DEBU 18bd 0xc003d2e090 gate 1556760665377221300 evaluation succeeds" -"2019-05-02 01:31:05.395 UTC [policies] Evaluate -> DEBU 18be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:05.399 UTC [policies] Evaluate -> DEBU 18bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:05.400 UTC [policies] Evaluate -> DEBU 18c0 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:05.403 UTC [policies] Evaluate -> DEBU 18c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:05.404 UTC [msp] DeserializeIdentity -> DEBU 18c2 Obtaining identity" -"2019-05-02 01:31:05.405 UTC [gossip.gossip] handleMessage -> DEBU 18c3 Exiting" -"2019-05-02 01:31:05.405 UTC [gossip.gossip] handleMessage -> DEBU 18c4 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760661686498500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:05.406 UTC [msp] DeserializeIdentity -> DEBU 18c5 Obtaining identity" -"2019-05-02 01:31:05.407 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:05.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18c7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.410 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18c8 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.411 UTC [policies] Evaluate -> DEBU 18c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:05.411 UTC [policies] Evaluate -> DEBU 18ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:05.412 UTC [policies] Evaluate -> DEBU 18cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:05.413 UTC [cauthdsl] func1 -> DEBU 18cc 0xc003d2faa0 gate 1556760665413462000 evaluation starts" -"2019-05-02 01:31:05.413 UTC [cauthdsl] func2 -> DEBU 18cd 0xc003d2faa0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:05.414 UTC [cauthdsl] func2 -> DEBU 18ce 0xc003d2faa0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:05.414 UTC [cauthdsl] func2 -> DEBU 18cf 0xc003d2faa0 principal matched by identity 0" -"2019-05-02 01:31:05.415 UTC [msp.identity] Verify -> DEBU 18d0 Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -"2019-05-02 01:31:05.415 UTC [msp.identity] Verify -> DEBU 18d1 Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -00000040 29 fe 17 41 ee e9 a4 |)..A...|" -"2019-05-02 01:31:05.416 UTC [cauthdsl] func2 -> DEBU 18d2 0xc003d2faa0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:05.417 UTC [cauthdsl] func1 -> DEBU 18d3 0xc003d2faa0 gate 1556760665413462000 evaluation succeeds" -"2019-05-02 01:31:05.417 UTC [policies] Evaluate -> DEBU 18d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:05.418 UTC [policies] Evaluate -> DEBU 18d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:05.418 UTC [policies] Evaluate -> DEBU 18d6 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:05.419 UTC [policies] Evaluate -> DEBU 18d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:05.420 UTC [msp] DeserializeIdentity -> DEBU 18d8 Obtaining identity" -"2019-05-02 01:31:05.420 UTC [gossip.gossip] handleMessage -> DEBU 18d9 Exiting" -"2019-05-02 01:31:05.431 UTC [gossip.gossip] handleMessage -> DEBU 18da Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.431 UTC [gossip.pull] HandleMessage -> DEBU 18db GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.431 UTC [gossip.pull] SendDigest -> DEBU 18dc Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:05.431 UTC [gossip.gossip] handleMessage -> DEBU 18dd Exiting" -"2019-05-02 01:31:05.437 UTC [gossip.gossip] handleMessage -> DEBU 18de Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.437 UTC [gossip.gossip] handleMessage -> DEBU 18df Exiting" -"2019-05-02 01:31:05.437 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18e0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.437 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18e1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:05.437 UTC [msp.identity] Verify -> DEBU 18e2 Verify: digest = 00000000 9c 53 05 c2 e0 ba a2 e0 51 71 27 bd c1 0d 69 87 |.S......Qq'...i.| -00000010 b2 3e 40 46 6e ad 51 68 96 50 6c 29 a9 d6 67 63 |.>@Fn.Qh.Pl)..gc|" -"2019-05-02 01:31:05.438 UTC [msp.identity] Verify -> DEBU 18e3 Verify: sig = 00000000 30 45 02 21 00 cb fa c8 bf d7 cc 06 26 a7 69 91 |0E.!........&.i.| -00000010 b4 13 e8 f8 bd 4f a6 3a 32 09 ff 9d a3 f8 95 d8 |.....O.:2.......| -00000020 13 f4 69 5a f3 02 20 52 41 b8 b5 57 cf 34 5f 68 |..iZ.. RA..W.4_h| -00000030 ec b8 39 4b d5 60 09 90 b3 bf 44 37 ea e2 d9 21 |..9K.`....D7...!| -00000040 42 2d 2b 9a b8 bd 1a |B-+....|" -"2019-05-02 01:31:05.438 UTC [msp.identity] Verify -> DEBU 18e4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:33.140 UTC [msp.identity] Verify -> DEBU 14b7 Verify: sig = 00000000 30 45 02 21 00 c7 0c 84 2c 0e d4 4b ce b1 ab ac |0E.!....,..K....| +00000010 26 60 88 98 a1 bd 0c 62 99 ec 3d 54 ef 0a 8a cb |&`.....b..=T....| +00000020 95 8e 09 b3 ce 02 20 55 de 36 b9 b7 44 ab fc 30 |...... U.6..D..0| +00000030 8a 8f b2 28 ed 43 e6 50 da ff f8 e8 db f3 a8 43 |...(.C.P.......C| +00000040 1c f4 57 57 c6 77 3c |..WW.w<|" +"2019-05-02 09:27:33.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 14b8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14b9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14ba updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 " +"2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14bb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 " +"2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14bc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:33.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 14bd Exiting" +"2019-05-02 09:27:33.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 14be Exiting" +"2019-05-02 09:27:33.141 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14bf Exiting" +"2019-05-02 09:27:33.141 UTC [gossip.discovery] sendMemResponse -> DEBU 14c0 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:33.142 UTC [msp] DeserializeIdentity -> DEBU 14c1 Obtaining identity" +"2019-05-02 09:27:33.142 UTC [msp] DeserializeIdentity -> DEBU 14c2 Obtaining identity" +"2019-05-02 09:27:33.142 UTC [gossip.comm] Send -> DEBU 14c3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:33.143 UTC [gossip.discovery] sendMemResponse -> DEBU 14c4 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:33.143 UTC [gossip.comm] sendToEndpoint -> DEBU 14c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.143 UTC [gossip.comm] sendToEndpoint -> DEBU 14c6 Exiting" +"2019-05-02 09:27:33.196 UTC [gossip.gossip] handleMessage -> DEBU 14c7 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.196 UTC [gossip.pull] HandleMessage -> DEBU 14c8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.196 UTC [msp] DeserializeIdentity -> DEBU 14c9 Obtaining identity" +"2019-05-02 09:27:33.196 UTC [msp] DeserializeIdentity -> DEBU 14ca Obtaining identity" +"2019-05-02 09:27:33.196 UTC [msp] DeserializeIdentity -> DEBU 14cb Obtaining identity" +"2019-05-02 09:27:33.198 UTC [msp] DeserializeIdentity -> DEBU 14cc Obtaining identity" +"2019-05-02 09:27:33.198 UTC [msp] DeserializeIdentity -> DEBU 14cd Obtaining identity" +"2019-05-02 09:27:33.198 UTC [msp] DeserializeIdentity -> DEBU 14ce Obtaining identity" +"2019-05-02 09:27:33.198 UTC [gossip.pull] SendDigest -> DEBU 14cf Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:33.199 UTC [gossip.gossip] handleMessage -> DEBU 14d0 Exiting" +"2019-05-02 09:27:33.204 UTC [gossip.gossip] handleMessage -> DEBU 14d1 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.204 UTC [gossip.gossip] handleMessage -> DEBU 14d2 Exiting" +"2019-05-02 09:27:33.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.206 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14d4 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:33.206 UTC [msp] DeserializeIdentity -> DEBU 14d5 Obtaining identity" +"2019-05-02 09:27:33.206 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:33.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14d7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14d8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.207 UTC [policies] Evaluate -> DEBU 14d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:33.207 UTC [policies] Evaluate -> DEBU 14da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:33.207 UTC [policies] Evaluate -> DEBU 14db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:33.209 UTC [cauthdsl] func1 -> DEBU 14dc 0xc003390090 gate 1556789253209170200 evaluation starts" +"2019-05-02 09:27:33.210 UTC [cauthdsl] func2 -> DEBU 14dd 0xc003390090 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.210 UTC [cauthdsl] func2 -> DEBU 14de 0xc003390090 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.212 UTC [cauthdsl] func2 -> DEBU 14df 0xc003390090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:33.212 UTC [cauthdsl] func2 -> DEBU 14e0 0xc003390090 principal evaluation fails" +"2019-05-02 09:27:33.213 UTC [cauthdsl] func1 -> DEBU 14e1 0xc003390090 gate 1556789253209170200 evaluation fails" +"2019-05-02 09:27:33.213 UTC [policies] Evaluate -> DEBU 14e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.213 UTC [policies] Evaluate -> DEBU 14e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.213 UTC [policies] Evaluate -> DEBU 14e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:33.213 UTC [cauthdsl] func1 -> DEBU 14e5 0xc0033908d0 gate 1556789253213341000 evaluation starts" +"2019-05-02 09:27:33.214 UTC [cauthdsl] func2 -> DEBU 14e6 0xc0033908d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.219 UTC [cauthdsl] func2 -> DEBU 14e7 0xc0033908d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.219 UTC [cauthdsl] func2 -> DEBU 14e8 0xc0033908d0 principal matched by identity 0" +"2019-05-02 09:27:33.219 UTC [msp.identity] Verify -> DEBU 14e9 Verify: digest = 00000000 52 fe c7 74 0a 2c 61 71 73 b3 66 2e 1d af e8 7b |R..t.,aqs.f....{| +00000010 34 d7 22 72 ff 06 e7 53 ba 67 f9 88 8c a4 80 57 |4."r...S.g.....W|" +"2019-05-02 09:27:33.219 UTC [msp.identity] Verify -> DEBU 14ea Verify: sig = 00000000 30 45 02 21 00 8d f1 b9 69 ea 3a 20 8c 60 d8 c6 |0E.!....i.: .`..| +00000010 25 20 4f 72 ce 0a 56 97 9e 6a 4e 61 6a 98 a0 7c |% Or..V..jNaj..|| +00000020 9e 12 bd 4d 44 02 20 04 9b a3 09 a1 44 3b 03 1d |...MD. .....D;..| +00000030 2c 39 d7 67 38 e3 26 d6 cc a8 4b 3e 88 a7 bd 7b |,9.g8.&...K>...{| +00000040 38 b3 bc 96 dc b8 0b |8......|" +"2019-05-02 09:27:33.220 UTC [cauthdsl] func2 -> DEBU 14eb 0xc0033908d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:33.220 UTC [cauthdsl] func1 -> DEBU 14ec 0xc0033908d0 gate 1556789253213341000 evaluation succeeds" +"2019-05-02 09:27:33.221 UTC [policies] Evaluate -> DEBU 14ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.221 UTC [policies] Evaluate -> DEBU 14ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.221 UTC [policies] Evaluate -> DEBU 14ef Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:33.222 UTC [policies] Evaluate -> DEBU 14f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:33.222 UTC [gossip.discovery] handleAliveMessage -> DEBU 14f1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f2 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f3 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 " +"2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f4 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 " +"2019-05-02 09:27:33.223 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f5 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:33.224 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f6 Exiting" +"2019-05-02 09:27:33.224 UTC [gossip.discovery] handleAliveMessage -> DEBU 14f7 Exiting" +"2019-05-02 09:27:33.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f8 Exiting" +"2019-05-02 09:27:33.224 UTC [gossip.discovery] sendMemResponse -> DEBU 14f9 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:33.225 UTC [msp] DeserializeIdentity -> DEBU 14fa Obtaining identity" +"2019-05-02 09:27:33.225 UTC [msp] DeserializeIdentity -> DEBU 14fb Obtaining identity" +"2019-05-02 09:27:33.225 UTC [msp] DeserializeIdentity -> DEBU 14fc Obtaining identity" +"2019-05-02 09:27:33.225 UTC [gossip.comm] Send -> DEBU 14fd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:33.226 UTC [gossip.discovery] sendMemResponse -> DEBU 14fe Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:33.226 UTC [gossip.comm] sendToEndpoint -> DEBU 14ff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:33.227 UTC [gossip.comm] sendToEndpoint -> DEBU 1500 Exiting" +"2019-05-02 09:27:33.307 UTC [endorser] ProcessProposal -> DEBU 1501 Entering: request from 172.18.0.8:57304" +"2019-05-02 09:27:33.307 UTC [protoutils] ValidateProposalMessage -> DEBU 1502 ValidateProposalMessage starts for signed proposal 0xc0034f8be0" +"2019-05-02 09:27:33.307 UTC [protoutils] validateChannelHeader -> DEBU 1503 validateChannelHeader info: header type 3" +"2019-05-02 09:27:33.307 UTC [protoutils] checkSignatureFromCreator -> DEBU 1504 begin" +"2019-05-02 09:27:33.308 UTC [msp] GetManagerForChain -> DEBU 1505 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:33.308 UTC [protoutils] checkSignatureFromCreator -> DEBU 1506 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:33.308 UTC [protoutils] checkSignatureFromCreator -> DEBU 1507 creator is valid" +"2019-05-02 09:27:33.308 UTC [msp.identity] Verify -> DEBU 1508 Verify: digest = 00000000 29 e0 42 1f e6 07 35 c6 3e 9a 0c db f2 1b b7 24 |).B...5.>......$| +00000010 69 91 e6 dd 29 7f f4 0a 20 6c b2 2a 4f 4a 97 bd |i...)... l.*OJ..|" +"2019-05-02 09:27:33.308 UTC [msp.identity] Verify -> DEBU 1509 Verify: sig = 00000000 30 44 02 20 0c 5e fd f2 c9 17 8f 09 c2 75 7e c5 |0D. .^.......u~.| +00000010 a6 58 4c 00 e6 66 b6 0c 4a 26 c4 75 e8 b5 d7 ba |.XL..f..J&.u....| +00000020 f0 9f a8 74 02 20 17 dd 7d 09 bd 30 a2 ad 28 06 |...t. ..}..0..(.| +00000030 ac 4e f0 fb c3 62 ea d9 ed f6 f8 66 a3 c2 3a 49 |.N...b.....f..:I| +00000040 93 c4 68 25 75 40 |..h%u@|" +"2019-05-02 09:27:33.308 UTC [protoutils] checkSignatureFromCreator -> DEBU 150a exits successfully" +"2019-05-02 09:27:33.309 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 150b validateChaincodeProposalMessage starts for proposal 0xc002cdc1c0, header 0xc0034f8ff0" +"2019-05-02 09:27:33.309 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 150c validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-05-02 09:27:33.309 UTC [endorser] preProcess -> DEBU 150d [businesschannel][a1db414e] processing txid: a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db" +"2019-05-02 09:27:33.310 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 150e retrieveTransactionByID() - txId = [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]" +"2019-05-02 09:27:33.311 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 150f constructing new tx simulator" +"2019-05-02 09:27:33.311 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1510 constructing new tx simulator txid = [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]" +"2019-05-02 09:27:33.311 UTC [endorser] SimulateProposal -> DEBU 1511 [businesschannel][a1db414e] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:33.312 UTC [endorser] callChaincode -> INFO 1512 [businesschannel][a1db414e] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:33.313 UTC [chaincode] Execute -> DEBU 1513 Entry" +"2019-05-02 09:27:33.313 UTC [aclmgmt] CheckACL -> DEBU 1514 acl policy not found in config for resource _lifecycle/QueryApprovalStatus" +"2019-05-02 09:27:33.313 UTC [policies] Evaluate -> DEBU 1515 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:33.314 UTC [policies] Evaluate -> DEBU 1516 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:33.314 UTC [policies] Evaluate -> DEBU 1517 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:33.314 UTC [cauthdsl] func1 -> DEBU 1518 0xc003285550 gate 1556789253314302900 evaluation starts" +"2019-05-02 09:27:33.314 UTC [cauthdsl] func2 -> DEBU 1519 0xc003285550 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.314 UTC [cauthdsl] func2 -> DEBU 151a 0xc003285550 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.314 UTC [cauthdsl] func2 -> DEBU 151b 0xc003285550 principal matched by identity 0" +"2019-05-02 09:27:33.314 UTC [msp.identity] Verify -> DEBU 151c Verify: digest = 00000000 29 e0 42 1f e6 07 35 c6 3e 9a 0c db f2 1b b7 24 |).B...5.>......$| +00000010 69 91 e6 dd 29 7f f4 0a 20 6c b2 2a 4f 4a 97 bd |i...)... l.*OJ..|" +"2019-05-02 09:27:33.315 UTC [msp.identity] Verify -> DEBU 151d Verify: sig = 00000000 30 44 02 20 0c 5e fd f2 c9 17 8f 09 c2 75 7e c5 |0D. .^.......u~.| +00000010 a6 58 4c 00 e6 66 b6 0c 4a 26 c4 75 e8 b5 d7 ba |.XL..f..J&.u....| +00000020 f0 9f a8 74 02 20 17 dd 7d 09 bd 30 a2 ad 28 06 |...t. ..}..0..(.| +00000030 ac 4e f0 fb c3 62 ea d9 ed f6 f8 66 a3 c2 3a 49 |.N...b.....f..:I| +00000040 93 c4 68 25 75 40 |..h%u@|" +"2019-05-02 09:27:33.316 UTC [cauthdsl] func2 -> DEBU 151e 0xc003285550 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:33.316 UTC [cauthdsl] func1 -> DEBU 151f 0xc003285550 gate 1556789253314302900 evaluation succeeds" +"2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1520 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1521 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1522 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:33.316 UTC [policies] Evaluate -> DEBU 1523 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:33.317 UTC [lifecycle] QueryApprovalStatus -> DEBU 1524 received invocation of QueryApprovalStatus on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: false), validation info: (plugin: '', policy: ''), collections: ()'" +"2019-05-02 09:27:33.317 UTC [chaincode] handleMessage -> DEBU 1525 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:33.317 UTC [chaincode] HandleTransaction -> DEBU 1526 [a1db414e] handling GET_STATE from chaincode" +"2019-05-02 09:27:33.317 UTC [chaincode] HandleGetState -> DEBU 1527 [a1db414e] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +"2019-05-02 09:27:33.318 UTC [stateleveldb] GetState -> DEBU 1528 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:33.318 UTC [chaincode] HandleGetState -> DEBU 1529 [a1db414e] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +"2019-05-02 09:27:33.318 UTC [chaincode] HandleTransaction -> DEBU 152a [a1db414e] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:33.318 UTC [chaincode] handleMessage -> DEBU 152b [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:33.318 UTC [chaincode] HandleTransaction -> DEBU 152c [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:33.319 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 152d [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +"2019-05-02 09:27:33.319 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 152e retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:33.320 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 152f retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:33.320 UTC [stateleveldb] GetState -> DEBU 1530 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-05-02 09:27:33.320 UTC [chaincode] HandleTransaction -> DEBU 1531 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:33.320 UTC [chaincode] handleMessage -> DEBU 1532 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:33.320 UTC [chaincode] HandleTransaction -> DEBU 1533 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:33.320 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1534 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +"2019-05-02 09:27:33.320 UTC [stateleveldb] GetState -> DEBU 1535 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-05-02 09:27:33.320 UTC [chaincode] HandleTransaction -> DEBU 1536 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:33.320 UTC [chaincode] handleMessage -> DEBU 1537 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:33.321 UTC [chaincode] HandleTransaction -> DEBU 1538 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:33.321 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1539 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +"2019-05-02 09:27:33.322 UTC [stateleveldb] GetState -> DEBU 153a GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 153b [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:33.322 UTC [chaincode] handleMessage -> DEBU 153c [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:33.322 UTC [chaincode] HandleTransaction -> DEBU 153d [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:33.323 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 153e [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +"2019-05-02 09:27:33.323 UTC [stateleveldb] GetState -> DEBU 153f GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-05-02 09:27:33.324 UTC [chaincode] HandleTransaction -> DEBU 1540 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:33.324 UTC [chaincode] handleMessage -> DEBU 1541 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:33.325 UTC [chaincode] HandleTransaction -> DEBU 1542 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:33.325 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1543 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +"2019-05-02 09:27:33.326 UTC [stateleveldb] GetState -> DEBU 1544 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-05-02 09:27:33.326 UTC [chaincode] HandleTransaction -> DEBU 1545 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:33.326 UTC [chaincode] handleMessage -> DEBU 1546 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:33.327 UTC [chaincode] HandleTransaction -> DEBU 1547 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:33.327 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1548 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +"2019-05-02 09:27:33.327 UTC [stateleveldb] GetState -> DEBU 1549 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-05-02 09:27:33.327 UTC [chaincode] HandleTransaction -> DEBU 154a [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:33.327 UTC [chaincode] handleMessage -> DEBU 154b [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:33.327 UTC [chaincode] HandleTransaction -> DEBU 154c [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:33.327 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 154d [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +"2019-05-02 09:27:33.327 UTC [stateleveldb] GetState -> DEBU 154e GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 154f [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:33.328 UTC [chaincode] handleMessage -> DEBU 1550 [a1db414e] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:33.328 UTC [chaincode] HandleTransaction -> DEBU 1551 [a1db414e] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:33.328 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1552 [a1db414e] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +"2019-05-02 09:27:33.328 UTC [stateleveldb] GetState -> DEBU 1553 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-05-02 09:27:33.329 UTC [chaincode] HandleTransaction -> DEBU 1554 [a1db414e] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:33.329 UTC [lifecycle] QueryApprovalStatus -> INFO 1555 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-05-02 09:27:33.329 UTC [chaincode] handleMessage -> DEBU 1556 [a1db414e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:33.330 UTC [chaincode] Notify -> DEBU 1557 [a1db414e] notifying Txid:a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db, channelID:businesschannel" +"2019-05-02 09:27:33.330 UTC [chaincode] Execute -> DEBU 1558 Exit" +"2019-05-02 09:27:33.330 UTC [endorser] callChaincode -> INFO 1559 [businesschannel][a1db414e] Exit chaincode: name:"_lifecycle" (18ms)" +"2019-05-02 09:27:33.331 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 155a Simulation completed, getting simulation results" +"2019-05-02 09:27:33.331 UTC [lockbasedtxmgr] Done -> DEBU 155b Done with transaction simulation / query execution [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]" +"2019-05-02 09:27:33.331 UTC [endorser] SimulateProposal -> DEBU 155c [businesschannel][a1db414e] Exit" +"2019-05-02 09:27:33.331 UTC [endorser] endorseProposal -> DEBU 155d [businesschannel][a1db414e] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:33.331 UTC [endorser] endorseProposal -> DEBU 155e [businesschannel][a1db414e] escc for chaincode name:"_lifecycle" is escc" +"2019-05-02 09:27:33.332 UTC [endorser] EndorseWithPlugin -> DEBU 155f Entering endorsement for {plugin: escc, channel: businesschannel, tx: a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db, chaincode: _lifecycle}" +"2019-05-02 09:27:33.332 UTC [msp.identity] Sign -> DEBU 1560 Sign: plaintext: 0A20FE47358EC6EE2717181BAAE7A5DD...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:33.333 UTC [msp.identity] Sign -> DEBU 1561 Sign: digest: E84B2A758A10207F6988F7971A0D08DF14F8A20D2AACD352036244DEEC74E504 " +"2019-05-02 09:27:33.333 UTC [endorser] EndorseWithPlugin -> DEBU 1562 Exiting {plugin: escc, channel: businesschannel, tx: a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db, chaincode: _lifecycle}" +"2019-05-02 09:27:33.333 UTC [endorser] endorseProposal -> DEBU 1563 [businesschannel][a1db414e] Exit" +"2019-05-02 09:27:33.333 UTC [lockbasedtxmgr] Done -> DEBU 1564 Done with transaction simulation / query execution [a1db414eb68438213e0ca44628ca076c3c8881c120bd14f6f28c8d1bcb04c8db]" +"2019-05-02 09:27:33.333 UTC [endorser] func1 -> DEBU 1565 Exit: request from 172.18.0.8:57304" +"2019-05-02 09:27:33.333 UTC [comm.grpc.server] 1 -> INFO 1566 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57304 grpc.code=OK grpc.call_duration=26.7171ms +"2019-05-02 09:27:33.341 UTC [grpc] infof -> DEBU 1567 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:33.341 UTC [grpc] infof -> DEBU 1568 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:33.843 UTC [gossip.comm] func1 -> DEBU 1569 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.844 UTC [gossip.gossip] handleMessage -> DEBU 156a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.844 UTC [gossip.gossip] handleMessage -> DEBU 156b Exiting" +"2019-05-02 09:27:33.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 156d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:33.844 UTC [msp] DeserializeIdentity -> DEBU 156e Obtaining identity" +"2019-05-02 09:27:33.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 156f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:33.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1570 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1571 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:33.844 UTC [policies] Evaluate -> DEBU 1572 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 1573 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 1574 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:33.845 UTC [cauthdsl] func1 -> DEBU 1575 0xc002f68bf0 gate 1556789253845145500 evaluation starts" +"2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1576 0xc002f68bf0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1577 0xc002f68bf0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1578 0xc002f68bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1579 0xc002f68bf0 principal evaluation fails" +"2019-05-02 09:27:33.845 UTC [cauthdsl] func1 -> DEBU 157a 0xc002f68bf0 gate 1556789253845145500 evaluation fails" +"2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 157b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 157c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:33.845 UTC [policies] Evaluate -> DEBU 157d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:33.845 UTC [cauthdsl] func1 -> DEBU 157e 0xc002f69430 gate 1556789253845739000 evaluation starts" +"2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 157f 0xc002f69430 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1580 0xc002f69430 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:33.845 UTC [cauthdsl] func2 -> DEBU 1581 0xc002f69430 principal matched by identity 0" +"2019-05-02 09:27:33.845 UTC [msp.identity] Verify -> DEBU 1582 Verify: digest = 00000000 2b 3e bf 3c d1 b2 64 f0 70 4c f9 b0 6e ea d0 e5 |+>.<..d.pL..n...| +00000010 ff 3c 9a 63 3a ea bc f6 31 a6 95 57 dc 29 74 da |.<.c:...1..W.)t.|" +"2019-05-02 09:27:33.845 UTC [msp.identity] Verify -> DEBU 1583 Verify: sig = 00000000 30 45 02 21 00 8e 4c 76 39 ba 6b f2 fd 62 b9 c6 |0E.!..Lv9.k..b..| +00000010 ba fc 1f 80 18 a5 6e 70 3f 8b a7 df cc 26 15 82 |......np?....&..| +00000020 fa 66 48 7b 5d 02 20 38 c5 34 41 a8 97 b5 b3 bc |.fH{]. 8.4A.....| +00000030 d3 02 4b c8 69 ac c2 a7 cf f0 9f d4 3e cd c3 4a |..K.i.......>..J| +00000040 12 19 e4 c7 94 1a 2b |......+|" +"2019-05-02 09:27:33.846 UTC [cauthdsl] func2 -> DEBU 1584 0xc002f69430 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:33.846 UTC [cauthdsl] func1 -> DEBU 1585 0xc002f69430 gate 1556789253845739000 evaluation succeeds" +"2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1586 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1587 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1588 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:33.846 UTC [policies] Evaluate -> DEBU 1589 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:33.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 158a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 " +"2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 " +"2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:33.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 158f Exiting" +"2019-05-02 09:27:33.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 1590 Exiting" +"2019-05-02 09:27:33.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1591 Exiting" +"2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1592 Obtaining identity" +"2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1593 Obtaining identity" +"2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1594 Obtaining identity" +"2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1595 Obtaining identity" +"2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1596 Obtaining identity" +"2019-05-02 09:27:33.848 UTC [msp] DeserializeIdentity -> DEBU 1597 Obtaining identity" +"2019-05-02 09:27:33.848 UTC [gossip.comm] Send -> DEBU 1598 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:33.849 UTC [msp] DeserializeIdentity -> DEBU 1599 Obtaining identity" +"2019-05-02 09:27:33.850 UTC [msp] DeserializeIdentity -> DEBU 159a Obtaining identity" +"2019-05-02 09:27:33.851 UTC [gossip.comm] sendToEndpoint -> DEBU 159b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.851 UTC [gossip.comm] Send -> DEBU 159c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:33.851 UTC [gossip.gossip] handleMessage -> DEBU 159f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.851 UTC [gossip.comm] sendToEndpoint -> DEBU 159e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.852 UTC [gossip.gossip] handleMessage -> DEBU 15a0 Exiting" +"2019-05-02 09:27:33.852 UTC [gossip.comm] sendToEndpoint -> DEBU 15a1 Exiting" +"2019-05-02 09:27:33.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.851 UTC [gossip.comm] sendToEndpoint -> DEBU 159d Exiting" +"2019-05-02 09:27:33.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a3 Exiting" +"2019-05-02 09:27:33.856 UTC [gossip.gossip] handleMessage -> DEBU 15a4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.856 UTC [gossip.gossip] handleMessage -> DEBU 15a5 Exiting" +"2019-05-02 09:27:33.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:33.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15a7 Exiting" +"2019-05-02 09:27:34.060 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 15a8 Sleeping 25s" +"2019-05-02 09:27:34.072 UTC [msp.identity] Sign -> DEBU 15a9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151015 " +"2019-05-02 09:27:34.072 UTC [msp.identity] Sign -> DEBU 15aa Sign: digest: A904CBD01281C429B6BD28A7567973D0E1230141D1B53B01D4A9F9990D525EAF " +"2019-05-02 09:27:34.072 UTC [msp.identity] Sign -> DEBU 15ab Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:34.073 UTC [msp.identity] Sign -> DEBU 15ac Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:34.073 UTC [gossip.discovery] periodicalSendAlive -> DEBU 15ad Sleeping 5s" +"2019-05-02 09:27:34.083 UTC [msp] DeserializeIdentity -> DEBU 15ae Obtaining identity" +"2019-05-02 09:27:34.083 UTC [msp] DeserializeIdentity -> DEBU 15af Obtaining identity" +"2019-05-02 09:27:34.084 UTC [msp] DeserializeIdentity -> DEBU 15b0 Obtaining identity" +"2019-05-02 09:27:34.084 UTC [gossip.comm] Send -> DEBU 15b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:34.085 UTC [gossip.comm] Send -> DEBU 15b2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:34.085 UTC [msp] DeserializeIdentity -> DEBU 15b3 Obtaining identity" +"2019-05-02 09:27:34.086 UTC [gossip.comm] Send -> DEBU 15b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:34.085 UTC [gossip.comm] sendToEndpoint -> DEBU 15b4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b8 Exiting" +"2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:34.086 UTC [gossip.comm] sendToEndpoint -> DEBU 15b7 Exiting" +"2019-05-02 09:27:34.089 UTC [gossip.comm] sendToEndpoint -> DEBU 15ba Exiting" +"2019-05-02 09:27:34.113 UTC [endorser] ProcessProposal -> DEBU 15bb Entering: request from 172.18.0.8:57312" +"2019-05-02 09:27:34.113 UTC [protoutils] ValidateProposalMessage -> DEBU 15bc ValidateProposalMessage starts for signed proposal 0xc00355aaf0" +"2019-05-02 09:27:34.114 UTC [protoutils] validateChannelHeader -> DEBU 15bd validateChannelHeader info: header type 3" +"2019-05-02 09:27:34.114 UTC [protoutils] checkSignatureFromCreator -> DEBU 15be begin" +"2019-05-02 09:27:34.114 UTC [protoutils] checkSignatureFromCreator -> DEBU 15bf creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:34.115 UTC [protoutils] checkSignatureFromCreator -> DEBU 15c0 creator is valid" +"2019-05-02 09:27:34.115 UTC [msp.identity] Verify -> DEBU 15c1 Verify: digest = 00000000 e4 ce fb f7 1a 2b 3c c9 47 be 4f f4 73 9f bd fa |.....+<.G.O.s...| +00000010 66 4a b6 8f c4 0b b7 b6 da 38 fd f4 da 27 6d d3 |fJ.......8...'m.|" +"2019-05-02 09:27:34.115 UTC [msp.identity] Verify -> DEBU 15c2 Verify: sig = 00000000 30 45 02 21 00 f6 b0 76 6f 65 20 95 38 c3 1c 37 |0E.!...voe .8..7| +00000010 7f 37 50 77 87 b6 cb 00 81 3d 78 7f 0d 8c 87 aa |.7Pw.....=x.....| +00000020 57 b0 34 36 cc 02 20 1a 2f 82 76 87 93 d8 33 13 |W.46.. ./.v...3.| +00000030 c3 dd 94 e7 44 3e 31 64 6a 11 01 ad d5 f3 5d b2 |....D>1dj.....].| +00000040 00 29 c4 b2 98 03 fa |.).....|" +"2019-05-02 09:27:34.116 UTC [protoutils] checkSignatureFromCreator -> DEBU 15c3 exits successfully" +"2019-05-02 09:27:34.116 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 15c4 validateChaincodeProposalMessage starts for proposal 0xc002e0a9a0, header 0xc00355af00" +"2019-05-02 09:27:34.116 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 15c5 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-05-02 09:27:34.116 UTC [endorser] preProcess -> DEBU 15c6 [][886fbd33] processing txid: 886fbd339aae6c5ef8a6bf897111183a880f515f061050051f85053ae56d5910" +"2019-05-02 09:27:34.117 UTC [endorser] SimulateProposal -> DEBU 15c7 [][886fbd33] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:34.118 UTC [endorser] callChaincode -> INFO 15c8 [][886fbd33] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:34.118 UTC [chaincode] Execute -> DEBU 15c9 Entry" +"2019-05-02 09:27:34.118 UTC [msp.identity] Verify -> DEBU 15ca Verify: digest = 00000000 e4 ce fb f7 1a 2b 3c c9 47 be 4f f4 73 9f bd fa |.....+<.G.O.s...| +00000010 66 4a b6 8f c4 0b b7 b6 da 38 fd f4 da 27 6d d3 |fJ.......8...'m.|" +"2019-05-02 09:27:34.119 UTC [msp.identity] Verify -> DEBU 15cb Verify: sig = 00000000 30 45 02 21 00 f6 b0 76 6f 65 20 95 38 c3 1c 37 |0E.!...voe .8..7| +00000010 7f 37 50 77 87 b6 cb 00 81 3d 78 7f 0d 8c 87 aa |.7Pw.....=x.....| +00000020 57 b0 34 36 cc 02 20 1a 2f 82 76 87 93 d8 33 13 |W.46.. ./.v...3.| +00000030 c3 dd 94 e7 44 3e 31 64 6a 11 01 ad d5 f3 5d b2 |....D>1dj.....].| +00000040 00 29 c4 b2 98 03 fa |.).....|" +"2019-05-02 09:27:34.119 UTC [lifecycle] QueryInstalledChaincodes -> DEBU 15cc received invocation of QueryInstalledChaincodes" +"2019-05-02 09:27:34.120 UTC [chaincode] handleMessage -> DEBU 15cd [886fbd33] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:34.120 UTC [chaincode] Notify -> DEBU 15ce [886fbd33] notifying Txid:886fbd339aae6c5ef8a6bf897111183a880f515f061050051f85053ae56d5910, channelID:" +"2019-05-02 09:27:34.120 UTC [chaincode] Execute -> DEBU 15cf Exit" +"2019-05-02 09:27:34.121 UTC [endorser] callChaincode -> INFO 15d0 [][886fbd33] Exit chaincode: name:"_lifecycle" (3ms)" +"2019-05-02 09:27:34.121 UTC [endorser] SimulateProposal -> DEBU 15d1 [][886fbd33] Exit" +"2019-05-02 09:27:34.121 UTC [endorser] func1 -> DEBU 15d2 Exit: request from 172.18.0.8:57312" +"2019-05-02 09:27:34.122 UTC [comm.grpc.server] 1 -> INFO 15d3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57312 grpc.code=OK grpc.call_duration=9.2835ms +"2019-05-02 09:27:34.129 UTC [gossip.gossip] handleMessage -> DEBU 15d4 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:34.129 UTC [gossip.gossip] handleMessage -> DEBU 15d5 Exiting" +"2019-05-02 09:27:34.129 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:34.129 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15d7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:34.130 UTC [msp.identity] Verify -> DEBU 15d8 Verify: digest = 00000000 f5 f8 70 94 92 a1 f3 96 ff 1e a3 18 d5 20 fd 6a |..p.......... .j| +00000010 44 43 32 6c 49 91 f2 95 63 12 0d 8a cd 1d c4 e5 |DC2lI...c.......|" +"2019-05-02 09:27:34.130 UTC [msp.identity] Verify -> DEBU 15d9 Verify: sig = 00000000 30 44 02 20 7d 7b c1 34 9a c2 05 4d d0 99 53 e6 |0D. }{.4...M..S.| +00000010 46 d8 6f e2 20 14 a8 88 de 9d 17 a4 b0 a0 3d 85 |F.o. .........=.| +00000020 e8 5b 92 50 02 20 2f 45 e4 54 cb bb 0e dd 8c 4d |.[.P. /E.T.....M| +00000030 ba 98 8f 12 48 7c bb fc 84 98 e1 f0 26 86 d8 ff |....H|......&...| +00000040 2e 37 1f ee 0e 99 |.7....|" +"2019-05-02 09:27:34.131 UTC [msp.identity] Verify -> DEBU 15da Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:05.439 UTC [msp.identity] Verify -> DEBU 18e5 Verify: sig = 00000000 30 45 02 21 00 de 64 5d 3a 7b 8a 34 b1 14 ab d6 |0E.!..d]:{.4....| -00000010 4c 56 80 ad 04 85 f8 3d 78 c8 9e 2d 29 60 29 d3 |LV.....=x..-)`).| -00000020 9a f8 4d b8 7a 02 20 66 f8 e1 ea d5 8f 3e 22 2c |..M.z. f.....>",| -00000030 de 16 88 5a e6 b4 8f 71 ed 7c 14 05 55 40 40 95 |...Z...q.|..U@@.| -00000040 fb cd f6 d3 f2 98 55 |......U|" -"2019-05-02 01:31:05.439 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:05.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:05.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e8 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 " -"2019-05-02 01:31:05.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e9 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 " -"2019-05-02 01:31:05.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 18ea Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:05.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 18eb Exiting" -"2019-05-02 01:31:05.440 UTC [gossip.discovery] handleAliveMessage -> DEBU 18ec Exiting" -"2019-05-02 01:31:05.440 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ed Exiting" -"2019-05-02 01:31:05.440 UTC [gossip.discovery] sendMemResponse -> DEBU 18ee Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:05.441 UTC [msp] DeserializeIdentity -> DEBU 18ef Obtaining identity" -"2019-05-02 01:31:05.442 UTC [msp] DeserializeIdentity -> DEBU 18f0 Obtaining identity" -"2019-05-02 01:31:05.442 UTC [gossip.comm] Send -> DEBU 18f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:05.442 UTC [gossip.discovery] sendMemResponse -> DEBU 18f2 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:05.442 UTC [gossip.comm] sendToEndpoint -> DEBU 18f3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.447 UTC [gossip.comm] sendToEndpoint -> DEBU 18f4 Exiting" -"2019-05-02 01:31:05.512 UTC [gossip.comm] func1 -> DEBU 18f5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.513 UTC [gossip.gossip] handleMessage -> DEBU 18f6 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.513 UTC [gossip.pull] HandleMessage -> DEBU 18f7 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.514 UTC [msp] DeserializeIdentity -> DEBU 18f8 Obtaining identity" -"2019-05-02 01:31:05.514 UTC [msp] DeserializeIdentity -> DEBU 18f9 Obtaining identity" -"2019-05-02 01:31:05.515 UTC [msp] DeserializeIdentity -> DEBU 18fa Obtaining identity" -"2019-05-02 01:31:05.526 UTC [msp] DeserializeIdentity -> DEBU 18fb Obtaining identity" -"2019-05-02 01:31:05.527 UTC [msp] DeserializeIdentity -> DEBU 18fc Obtaining identity" -"2019-05-02 01:31:05.527 UTC [msp] DeserializeIdentity -> DEBU 18fd Obtaining identity" -"2019-05-02 01:31:05.528 UTC [gossip.pull] SendDigest -> DEBU 18fe Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:05.528 UTC [gossip.gossip] handleMessage -> DEBU 18ff Exiting" -"2019-05-02 01:31:05.530 UTC [gossip.comm] func1 -> DEBU 1900 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.534 UTC [gossip.gossip] handleMessage -> DEBU 1901 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.535 UTC [gossip.gossip] handleMessage -> DEBU 1902 Exiting" -"2019-05-02 01:31:05.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1903 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.536 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1904 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:05.537 UTC [msp] DeserializeIdentity -> DEBU 1905 Obtaining identity" -"2019-05-02 01:31:05.538 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1906 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:05.542 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1907 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.543 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1908 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.543 UTC [policies] Evaluate -> DEBU 1909 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:05.543 UTC [policies] Evaluate -> DEBU 190a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:05.544 UTC [policies] Evaluate -> DEBU 190b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:05.545 UTC [cauthdsl] func1 -> DEBU 190c 0xc003d84940 gate 1556760665544977700 evaluation starts" -"2019-05-02 01:31:05.546 UTC [cauthdsl] func2 -> DEBU 190d 0xc003d84940 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:05.547 UTC [cauthdsl] func2 -> DEBU 190e 0xc003d84940 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:05.549 UTC [cauthdsl] func2 -> DEBU 190f 0xc003d84940 principal matched by identity 0" -"2019-05-02 01:31:05.550 UTC [msp.identity] Verify -> DEBU 1910 Verify: digest = 00000000 db 77 4b 12 bc 31 76 19 bb b3 97 35 bb 2f 6f ce |.wK..1v....5./o.| -00000010 c3 13 d7 e1 d1 37 77 ae 7f ea ba 96 fa 50 e1 85 |.....7w......P..|" -"2019-05-02 01:31:05.550 UTC [msp.identity] Verify -> DEBU 1911 Verify: sig = 00000000 30 44 02 20 43 5a 8c 61 dc 74 c0 2d c9 80 1a cd |0D. CZ.a.t.-....| -00000010 fd a9 9a c0 07 c7 14 dd 0b cc f3 2b b9 aa 11 e5 |...........+....| -00000020 b6 12 be b6 02 20 33 a9 f0 5e a1 4d f5 41 de be |..... 3..^.M.A..| -00000030 0f 48 3a ee e9 63 ed c8 8b 82 57 cc 33 ec cf 60 |.H:..c....W.3..`| -00000040 f9 44 e0 43 f0 17 |.D.C..|" -"2019-05-02 01:31:05.553 UTC [cauthdsl] func2 -> DEBU 1912 0xc003d84940 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:05.553 UTC [cauthdsl] func1 -> DEBU 1913 0xc003d84940 gate 1556760665544977700 evaluation succeeds" -"2019-05-02 01:31:05.553 UTC [policies] Evaluate -> DEBU 1914 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:05.554 UTC [policies] Evaluate -> DEBU 1915 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:05.555 UTC [policies] Evaluate -> DEBU 1916 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:05.557 UTC [policies] Evaluate -> DEBU 1917 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:05.558 UTC [gossip.discovery] handleAliveMessage -> DEBU 1918 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:05.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1919 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:05.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 191a updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 " -"2019-05-02 01:31:05.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 191b Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 " -"2019-05-02 01:31:05.560 UTC [gossip.discovery] learnExistingMembers -> DEBU 191c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:05.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 191d Exiting" -"2019-05-02 01:31:05.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 191e Exiting" -"2019-05-02 01:31:05.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 191f Exiting" -"2019-05-02 01:31:05.562 UTC [gossip.discovery] sendMemResponse -> DEBU 1920 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:05.564 UTC [msp] DeserializeIdentity -> DEBU 1921 Obtaining identity" -"2019-05-02 01:31:05.565 UTC [msp] DeserializeIdentity -> DEBU 1922 Obtaining identity" -"2019-05-02 01:31:05.566 UTC [msp] DeserializeIdentity -> DEBU 1923 Obtaining identity" -"2019-05-02 01:31:05.566 UTC [gossip.comm] Send -> DEBU 1924 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:05.568 UTC [gossip.comm] sendToEndpoint -> DEBU 1926 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.569 UTC [gossip.comm] sendToEndpoint -> DEBU 1927 Exiting" -"2019-05-02 01:31:05.567 UTC [gossip.discovery] sendMemResponse -> DEBU 1925 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:05.577 UTC [gossip.comm] func1 -> DEBU 1928 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.577 UTC [gossip.comm] func1 -> DEBU 1929 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760661744638500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:05.581 UTC [gossip.gossip] handleMessage -> DEBU 192a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.581 UTC [msp] DeserializeIdentity -> DEBU 192b Obtaining identity" -"2019-05-02 01:31:05.582 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" -"2019-05-02 01:31:05.582 UTC [msp] DeserializeIdentity -> DEBU 192d Obtaining identity" -"2019-05-02 01:31:05.582 UTC [gossip.gossip] handleMessage -> DEBU 192e Exiting" -"2019-05-02 01:31:05.582 UTC [gossip.gossip] handleMessage -> DEBU 192f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760661744638500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:05.582 UTC [msp] DeserializeIdentity -> DEBU 1930 Obtaining identity" -"2019-05-02 01:31:05.583 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1931 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:05.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1932 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1933 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.583 UTC [policies] Evaluate -> DEBU 1934 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:05.583 UTC [policies] Evaluate -> DEBU 1935 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:05.584 UTC [policies] Evaluate -> DEBU 1936 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:05.584 UTC [cauthdsl] func1 -> DEBU 1937 0xc003d95820 gate 1556760665584207800 evaluation starts" -"2019-05-02 01:31:05.584 UTC [cauthdsl] func2 -> DEBU 1938 0xc003d95820 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:05.584 UTC [cauthdsl] func2 -> DEBU 1939 0xc003d95820 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:05.584 UTC [cauthdsl] func2 -> DEBU 193a 0xc003d95820 principal matched by identity 0" -"2019-05-02 01:31:05.584 UTC [msp.identity] Verify -> DEBU 193b Verify: digest = 00000000 6e b0 75 c4 51 40 0e aa 99 5b d4 4c e9 2b e8 4b |n.u.Q@...[.L.+.K| -00000010 ef 3b fb 35 be f1 cd 9c a2 03 51 d3 59 0e 44 3f |.;.5......Q.Y.D?|" -"2019-05-02 01:31:05.585 UTC [msp.identity] Verify -> DEBU 193c Verify: sig = 00000000 30 44 02 20 03 37 d6 b4 db fc c5 c5 97 d9 b7 82 |0D. .7..........| -00000010 cb 4f 24 2e 01 c9 0e 5c d3 74 96 47 c2 70 5b 15 |.O$....\.t.G.p[.| -00000020 fb c0 c7 e5 02 20 50 5c 72 51 31 e9 74 c2 2b 1c |..... P\rQ1.t.+.| -00000030 3a 93 ab aa 2e 7a 88 04 ea b7 85 74 e0 2a 64 2d |:....z.....t.*d-| -00000040 14 3b 47 ea f2 83 |.;G...|" -"2019-05-02 01:31:05.585 UTC [cauthdsl] func2 -> DEBU 193d 0xc003d95820 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:05.585 UTC [cauthdsl] func1 -> DEBU 193e 0xc003d95820 gate 1556760665584207800 evaluation succeeds" -"2019-05-02 01:31:05.585 UTC [policies] Evaluate -> DEBU 193f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:05.585 UTC [policies] Evaluate -> DEBU 1940 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:05.586 UTC [policies] Evaluate -> DEBU 1941 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:05.586 UTC [policies] Evaluate -> DEBU 1942 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:05.586 UTC [msp] DeserializeIdentity -> DEBU 1943 Obtaining identity" -"2019-05-02 01:31:05.586 UTC [gossip.gossip] handleMessage -> DEBU 1944 Exiting" -"2019-05-02 01:31:05.739 UTC [gossip.comm] func1 -> DEBU 1945 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.740 UTC [gossip.gossip] handleMessage -> DEBU 1946 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.744 UTC [gossip.pull] HandleMessage -> DEBU 1947 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.744 UTC [msp] DeserializeIdentity -> DEBU 1948 Obtaining identity" -"2019-05-02 01:31:05.745 UTC [msp] DeserializeIdentity -> DEBU 1949 Obtaining identity" -"2019-05-02 01:31:05.745 UTC [msp] DeserializeIdentity -> DEBU 194a Obtaining identity" -"2019-05-02 01:31:05.766 UTC [msp] DeserializeIdentity -> DEBU 194b Obtaining identity" -"2019-05-02 01:31:05.766 UTC [msp] DeserializeIdentity -> DEBU 194c Obtaining identity" -"2019-05-02 01:31:05.766 UTC [msp] DeserializeIdentity -> DEBU 194d Obtaining identity" -"2019-05-02 01:31:05.767 UTC [gossip.pull] SendDigest -> DEBU 194e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:05.767 UTC [gossip.gossip] handleMessage -> DEBU 194f Exiting" -"2019-05-02 01:31:05.820 UTC [gossip.pull] Hello -> DEBU 1950 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:05.821 UTC [gossip.comm] Send -> DEBU 1951 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:05.822 UTC [gossip.pull] Hello -> DEBU 1952 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:05.823 UTC [gossip.comm] sendToEndpoint -> DEBU 1953 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.823 UTC [gossip.comm] sendToEndpoint -> DEBU 1954 Exiting" -"2019-05-02 01:31:05.823 UTC [gossip.comm] Send -> DEBU 1955 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:05.824 UTC [gossip.pull] Hello -> DEBU 1956 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:05.824 UTC [gossip.comm] sendToEndpoint -> DEBU 1957 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.824 UTC [gossip.comm] sendToEndpoint -> DEBU 1958 Exiting" -"2019-05-02 01:31:05.824 UTC [gossip.comm] Send -> DEBU 1959 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:05.826 UTC [gossip.comm] sendToEndpoint -> DEBU 195a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.827 UTC [gossip.comm] sendToEndpoint -> DEBU 195b Exiting" -"2019-05-02 01:31:05.829 UTC [gossip.comm] func1 -> DEBU 195c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12768357129974227833 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.831 UTC [gossip.gossip] handleMessage -> DEBU 195d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12768357129974227833 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.832 UTC [gossip.pull] HandleMessage -> DEBU 195e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12768357129974227833 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.833 UTC [gossip.gossip] handleMessage -> DEBU 195f Exiting" -"2019-05-02 01:31:05.834 UTC [gossip.gossip] handleMessage -> DEBU 1960 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18088168092701794657 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.835 UTC [gossip.pull] HandleMessage -> DEBU 1961 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18088168092701794657 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.835 UTC [gossip.gossip] handleMessage -> DEBU 1962 Exiting" -"2019-05-02 01:31:05.838 UTC [gossip.comm] func1 -> DEBU 1963 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5543474449212557970 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.839 UTC [gossip.gossip] handleMessage -> DEBU 1964 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5543474449212557970 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.840 UTC [gossip.pull] HandleMessage -> DEBU 1965 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5543474449212557970 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.841 UTC [gossip.gossip] handleMessage -> DEBU 1966 Exiting" -"2019-05-02 01:31:05.901 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1967 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.902 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1968 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.902 UTC [policies] Evaluate -> DEBU 1969 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-05-02 01:31:05.903 UTC [policies] Evaluate -> DEBU 196a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:05.903 UTC [policies] Evaluate -> DEBU 196b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:31:05.904 UTC [cauthdsl] func1 -> DEBU 196c 0xc003dc8f90 gate 1556760665904282900 evaluation starts" -"2019-05-02 01:31:05.904 UTC [cauthdsl] func2 -> DEBU 196d 0xc003dc8f90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:05.905 UTC [cauthdsl] func2 -> DEBU 196e 0xc003dc8f90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:05.905 UTC [cauthdsl] func2 -> DEBU 196f 0xc003dc8f90 principal matched by identity 0" -"2019-05-02 01:31:05.905 UTC [msp.identity] Verify -> DEBU 1970 Verify: digest = 00000000 c3 b0 a3 50 1c 07 20 3c 33 56 54 ff 3a 82 be 01 |...P.. <3VT.:...| -00000010 9d ae 9e b3 7c e1 6e 6d cd 86 11 80 05 3b 01 12 |....|.nm.....;..|" -"2019-05-02 01:31:05.906 UTC [msp.identity] Verify -> DEBU 1971 Verify: sig = 00000000 30 45 02 21 00 96 0f 96 4e 1c cb 82 b2 a5 1b cb |0E.!....N.......| -00000010 9c 5e a9 9a da 30 45 32 39 75 4c 2d d7 03 b6 06 |.^...0E29uL-....| -00000020 d4 65 6b 34 aa 02 20 1e e1 84 4c e0 1e 67 86 64 |.ek4.. ...L..g.d| -00000030 0f 82 d6 7f be bc cb 8b fc 0e 7b 6e f4 5c 59 01 |..........{n.\Y.| -00000040 d9 e0 1b 50 6d 5b 3d |...Pm[=|" -"2019-05-02 01:31:05.907 UTC [cauthdsl] func2 -> DEBU 1972 0xc003dc8f90 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:05.911 UTC [cauthdsl] func1 -> DEBU 1973 0xc003dc8f90 gate 1556760665904282900 evaluation succeeds" -"2019-05-02 01:31:05.912 UTC [policies] Evaluate -> DEBU 1974 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:05.912 UTC [policies] Evaluate -> DEBU 1975 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:05.913 UTC [policies] Evaluate -> DEBU 1976 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:05.913 UTC [policies] Evaluate -> DEBU 1977 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:05.914 UTC [blocksProvider] DeliverBlocks -> DEBU 1978 [businesschannel] Adding payload to local buffer, blockNum = [5]" -"2019-05-02 01:31:05.915 UTC [gossip.state] addPayload -> DEBU 1979 [businesschannel] Adding payload to local buffer, blockNum = [5]" -"2019-05-02 01:31:05.915 UTC [gossip.state] addPayload -> DEBU 197a Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-05-02 01:31:05.916 UTC [blocksProvider] DeliverBlocks -> DEBU 197b [businesschannel] Gossiping block [5], peers number [3]" -"2019-05-02 01:31:05.918 UTC [gossip.channel] AddToMsgStore -> DEBU 197c Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5725 bytes, seq: 5}, Envelope: 5755 bytes, Signature: 0 bytes to the block puller" -"2019-05-02 01:31:05.918 UTC [gossip.pull] Add -> DEBU 197d Added 5, total items: 5" -"2019-05-02 01:31:05.919 UTC [gossip.state] deliverPayloads -> DEBU 197e [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" -"2019-05-02 01:31:05.920 UTC [gossip.state] deliverPayloads -> DEBU 197f [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" -"2019-05-02 01:31:05.923 UTC [gossip.privdata] StoreBlock -> INFO 1980 [businesschannel] Received block [5] from buffer" -"2019-05-02 01:31:05.925 UTC [gossip.privdata] StoreBlock -> DEBU 1981 [businesschannel] Validating block [5]" -"2019-05-02 01:31:05.926 UTC [committer.txvalidator] Validate -> DEBU 1982 [businesschannel] START Block Validation for block [5]" -"2019-05-02 01:31:05.928 UTC [committer.txvalidator] Validate -> DEBU 1983 expecting 1 block validation responses" -"2019-05-02 01:31:05.928 UTC [committer.txvalidator] validateTx -> DEBU 1984 [businesschannel] validateTx starts for block 0xc003b8fec0 env 0xc003dde2d0 txn 0" -"2019-05-02 01:31:05.928 UTC [protoutils] ValidateTransaction -> DEBU 1985 ValidateTransactionEnvelope starts for envelope 0xc003dde2d0" -"2019-05-02 01:31:05.929 UTC [gossip.comm] func1 -> DEBU 1986 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.930 UTC [gossip.gossip] handleMessage -> DEBU 1987 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.929 UTC [protoutils] ValidateTransaction -> DEBU 1988 Header is channel_header:"\010\003\032\014\010\327\220\251\346\005\020\270\310\343\262\002\"\017businesschannel*@c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030J^\243\210y\331\303.\220\330~\t\235\330I\300\023\026\250\262\335\254\344\030" " -"2019-05-02 01:31:05.930 UTC [protoutils] validateChannelHeader -> DEBU 1989 validateChannelHeader info: header type 3" -"2019-05-02 01:31:05.930 UTC [protoutils] checkSignatureFromCreator -> DEBU 198a begin" -"2019-05-02 01:31:05.930 UTC [msp] GetManagerForChain -> DEBU 198b Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:05.930 UTC [protoutils] checkSignatureFromCreator -> DEBU 198c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:05.930 UTC [protoutils] checkSignatureFromCreator -> DEBU 198d creator is valid" -"2019-05-02 01:31:05.930 UTC [msp.identity] Verify -> DEBU 198e Verify: digest = 00000000 03 14 9e 71 a1 36 1e 2d 0f 44 72 fa 0c 27 8f 81 |...q.6.-.Dr..'..| -00000010 23 a1 3c e5 44 3d ed 70 77 c3 f9 01 7c 4d 36 5b |#.<.D=.pw...|M6[|" -"2019-05-02 01:31:05.931 UTC [msp.identity] Verify -> DEBU 198f Verify: sig = 00000000 30 44 02 20 7d 9e 40 85 03 46 bf 49 0c 16 c7 f4 |0D. }.@..F.I....| -00000010 2d 15 37 bc 11 7e 31 6d 41 0b a4 02 37 c3 4d 4e |-.7..~1mA...7.MN| -00000020 67 3a 24 43 02 20 27 53 1c 1b e1 0c ef ef 89 d0 |g:$C. 'S........| -00000030 b0 27 77 60 0b a1 dd 73 6a a9 68 6a b4 b8 47 af |.'w`...sj.hj..G.| -00000040 a2 10 d6 ec 0e 1d |......|" -"2019-05-02 01:31:05.930 UTC [gossip.gossip] handleMessage -> DEBU 1990 Exiting" -"2019-05-02 01:31:05.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1991 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.931 UTC [protoutils] checkSignatureFromCreator -> DEBU 1992 exits successfully" -"2019-05-02 01:31:05.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1993 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:05.932 UTC [msp] DeserializeIdentity -> DEBU 1994 Obtaining identity" -"2019-05-02 01:31:05.932 UTC [protoutils] validateEndorserTransaction -> DEBU 1995 validateEndorserTransaction starts for data 0xc003df4000, header channel_header:"\010\003\032\014\010\327\220\251\346\005\020\270\310\343\262\002\"\017businesschannel*@c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030J^\243\210y\331\303.\220\330~\t\235\330I\300\023\026\250\262\335\254\344\030" " -"2019-05-02 01:31:05.932 UTC [protoutils] validateEndorserTransaction -> DEBU 1996 validateEndorserTransaction info: there are 1 actions" -"2019-05-02 01:31:05.932 UTC [protoutils] validateEndorserTransaction -> DEBU 1997 validateEndorserTransaction info: signature header is valid" -"2019-05-02 01:31:05.932 UTC [protoutils] ValidateTransaction -> DEBU 1998 ValidateTransactionEnvelope returns err %!s()" -"2019-05-02 01:31:05.933 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1999 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:05.933 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 199a Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.933 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 199b Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:05.933 UTC [policies] Evaluate -> DEBU 199c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:05.933 UTC [policies] Evaluate -> DEBU 199d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:05.933 UTC [policies] Evaluate -> DEBU 199e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:05.936 UTC [msp] DeserializeIdentity -> DEBU 199f Obtaining identity" -"2019-05-02 01:31:05.937 UTC [msp] DeserializeIdentity -> DEBU 19a0 Obtaining identity" -"2019-05-02 01:31:05.937 UTC [msp] DeserializeIdentity -> DEBU 19a1 Obtaining identity" -"2019-05-02 01:31:05.938 UTC [msp] DeserializeIdentity -> DEBU 19a2 Obtaining identity" -"2019-05-02 01:31:05.938 UTC [gossip.comm] Send -> DEBU 19a3 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5725 bytes, seq: 5}, Envelope: 5755 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:05.938 UTC [msp] DeserializeIdentity -> DEBU 19a4 Obtaining identity" -"2019-05-02 01:31:05.938 UTC [msp] DeserializeIdentity -> DEBU 19a5 Obtaining identity" -"2019-05-02 01:31:05.938 UTC [gossip.comm] sendToEndpoint -> DEBU 19a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5725 bytes, seq: 5}, Envelope: 5755 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.938 UTC [gossip.comm] sendToEndpoint -> DEBU 19a7 Exiting" -"2019-05-02 01:31:05.933 UTC [committer.txvalidator] validateTx -> DEBU 19a8 Transaction is for channel businesschannel" -"2019-05-02 01:31:05.946 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 19a9 retrieveTransactionByID() - txId = [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf]" -"2019-05-02 01:31:05.946 UTC [committer.txvalidator] validateTx -> DEBU 19aa Validating transaction with plugins" -"2019-05-02 01:31:05.946 UTC [committer.txvalidator] Dispatch -> DEBU 19ab [businesschannel] Dispatch starts for bytes 0xc003ddcc00" -"2019-05-02 01:31:05.947 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19ac constructing new query executor txid = [23bf76f5-a78e-44e0-a620-475f4717b44d]" -"2019-05-02 01:31:05.947 UTC [lockbasedtxmgr] Done -> DEBU 19ad Done with transaction simulation / query execution [23bf76f5-a78e-44e0-a620-475f4717b44d]" -"2019-05-02 01:31:05.933 UTC [cauthdsl] func1 -> DEBU 19ae 0xc003dfd1f0 gate 1556760665933761900 evaluation starts" -"2019-05-02 01:31:05.954 UTC [cauthdsl] func2 -> DEBU 19af 0xc003dfd1f0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:05.955 UTC [cauthdsl] func2 -> DEBU 19b0 0xc003dfd1f0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:05.959 UTC [cauthdsl] func2 -> DEBU 19b2 0xc003dfd1f0 principal matched by identity 0" -"2019-05-02 01:31:05.959 UTC [msp.identity] Verify -> DEBU 19b3 Verify: digest = 00000000 2c 75 3e 60 39 b7 46 71 58 fc b5 58 d9 2c d8 bf |,u>`9.FqX..X.,..| -00000010 48 2b a3 11 66 57 dd 1e 5b 2e ff 62 39 d4 0e a7 |H+..fW..[..b9...|" -"2019-05-02 01:31:05.962 UTC [msp.identity] Verify -> DEBU 19b4 Verify: sig = 00000000 30 45 02 21 00 e8 69 4c 1d 34 59 90 40 bf c5 bf |0E.!..iL.4Y.@...| -00000010 11 d2 02 d7 f6 94 a8 e8 79 06 04 06 6c 3b f5 65 |........y...l;.e| -00000020 68 8e 20 0b 97 02 20 52 42 5b b3 e5 19 93 ce 48 |h. ... RB[.....H| -00000030 e7 ce 6a 25 88 49 06 53 17 d0 77 ba 85 a2 ad a8 |..j%.I.S..w.....| -00000040 d2 dd bd a7 0e 3e a9 |.....>.|" -"2019-05-02 01:31:05.962 UTC [cauthdsl] func2 -> DEBU 19b5 0xc003dfd1f0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:05.962 UTC [cauthdsl] func1 -> DEBU 19b6 0xc003dfd1f0 gate 1556760665933761900 evaluation succeeds" -"2019-05-02 01:31:05.962 UTC [policies] Evaluate -> DEBU 19b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:05.962 UTC [policies] Evaluate -> DEBU 19b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:05.963 UTC [policies] Evaluate -> DEBU 19b9 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:05.964 UTC [policies] Evaluate -> DEBU 19ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:05.947 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 19bb Validating Tx c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" -"2019-05-02 01:31:05.964 UTC [gossip.discovery] handleAliveMessage -> DEBU 19bc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:05.966 UTC [gossip.discovery] learnExistingMembers -> DEBU 19bd Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:05.966 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19be constructing new query executor txid = [49ad6e56-ea6b-44da-b158-ba33205af477]" -"2019-05-02 01:31:05.966 UTC [lockbasedtxmgr] Done -> DEBU 19bf Done with transaction simulation / query execution [49ad6e56-ea6b-44da-b158-ba33205af477]" -"2019-05-02 01:31:05.966 UTC [policies] Evaluate -> DEBU 19c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement ==" -"2019-05-02 01:31:05.966 UTC [policies] Evaluate -> DEBU 19c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:05.966 UTC [policies] Evaluate -> DEBU 19c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" -"2019-05-02 01:31:05.967 UTC [cauthdsl] func1 -> DEBU 19c3 0xc003e4a540 gate 1556760665967024600 evaluation starts" -"2019-05-02 01:31:05.967 UTC [cauthdsl] func2 -> DEBU 19c4 0xc003e4a540 signed by 0 principal evaluation starts (used [false false])" -"2019-05-02 01:31:05.957 UTC [msp.identity] Sign -> DEBU 19b1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151018 " -"2019-05-02 01:31:05.972 UTC [msp.identity] Sign -> DEBU 19c5 Sign: digest: 24142A334A92D44CEF28CD02E8DD5A782BE45A54D8CF3FB587D59CFE16CEF166 " -"2019-05-02 01:31:05.972 UTC [msp.identity] Sign -> DEBU 19c6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:05.972 UTC [msp.identity] Sign -> DEBU 19c7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:05.967 UTC [cauthdsl] func2 -> DEBU 19c8 0xc003e4a540 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:05.972 UTC [cauthdsl] func2 -> DEBU 19c9 0xc003e4a540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:05.972 UTC [cauthdsl] func2 -> DEBU 19ca 0xc003e4a540 processing identity 1 with bytes of 10fffc0" -"2019-05-02 01:31:05.973 UTC [cauthdsl] func2 -> DEBU 19cb 0xc003e4a540 principal matched by identity 1" -"2019-05-02 01:31:05.973 UTC [msp.identity] Verify -> DEBU 19cc Verify: digest = 00000000 aa 74 1e 98 9a 9d 50 67 ea 76 b9 2b 4d ec d7 cb |.t....Pg.v.+M...| -00000010 6d 92 c1 5c ca f5 a1 47 f9 48 45 a0 bb 1d 88 dc |m..\...G.HE.....|" -"2019-05-02 01:31:05.973 UTC [msp.identity] Verify -> DEBU 19cd Verify: sig = 00000000 30 45 02 21 00 fb 93 5c 51 ff 87 c0 c5 11 8b 83 |0E.!...\Q.......| -00000010 65 e4 d7 3a b1 a7 00 89 91 03 9b 93 a9 c6 0a 68 |e..:...........h| -00000020 ae 83 12 63 a3 02 20 31 d8 39 1f c6 a1 ec 53 1f |...c.. 1.9....S.| -00000030 70 51 f7 66 90 b7 94 66 37 c3 0f 2e 5e 6b 97 da |pQ.f...f7...^k..| -00000040 e8 21 bb 95 71 8f 77 |.!..q.w|" -"2019-05-02 01:31:05.971 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ce updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 " -"2019-05-02 01:31:05.974 UTC [gossip.discovery] learnExistingMembers -> DEBU 19d0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 " -"2019-05-02 01:31:05.974 UTC [gossip.discovery] learnExistingMembers -> DEBU 19d1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:05.974 UTC [gossip.discovery] learnExistingMembers -> DEBU 19d2 Exiting" -"2019-05-02 01:31:05.974 UTC [gossip.discovery] handleAliveMessage -> DEBU 19d3 Exiting" -"2019-05-02 01:31:05.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19d4 Exiting" -"2019-05-02 01:31:05.975 UTC [gossip.discovery] sendMemResponse -> DEBU 19d5 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:05.975 UTC [gossip.comm] Send -> DEBU 19d6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:05.976 UTC [msp] DeserializeIdentity -> DEBU 19d7 Obtaining identity" -"2019-05-02 01:31:05.976 UTC [gossip.comm] Send -> DEBU 19d8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:05.977 UTC [msp] DeserializeIdentity -> DEBU 19da Obtaining identity" -"2019-05-02 01:31:05.982 UTC [gossip.comm] sendToEndpoint -> DEBU 19db Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.982 UTC [gossip.comm] sendToEndpoint -> DEBU 19dc Exiting" -"2019-05-02 01:31:05.974 UTC [cauthdsl] func2 -> DEBU 19cf 0xc003e4a540 principal evaluation succeeds for identity 1" -"2019-05-02 01:31:05.982 UTC [cauthdsl] func1 -> DEBU 19dd 0xc003e4a540 gate 1556760665967024600 evaluation succeeds" -"2019-05-02 01:31:05.983 UTC [policies] Evaluate -> DEBU 19de Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:31:05.983 UTC [policies] Evaluate -> DEBU 19df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:31:05.983 UTC [policies] Evaluate -> DEBU 19e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" -"2019-05-02 01:31:05.983 UTC [cauthdsl] func1 -> DEBU 19e1 0xc003e3bca0 gate 1556760665983309300 evaluation starts" -"2019-05-02 01:31:05.983 UTC [cauthdsl] func2 -> DEBU 19e2 0xc003e3bca0 signed by 0 principal evaluation starts (used [false false])" -"2019-05-02 01:31:05.983 UTC [cauthdsl] func2 -> DEBU 19e3 0xc003e3bca0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:05.983 UTC [cauthdsl] func2 -> DEBU 19e4 0xc003e3bca0 principal matched by identity 0" -"2019-05-02 01:31:05.984 UTC [msp.identity] Verify -> DEBU 19e5 Verify: digest = 00000000 57 ed 09 c5 e0 f9 01 19 6c cd 8e 7d 83 21 4f c8 |W.......l..}.!O.| -00000010 0c 98 9f 13 c0 ee ac 98 ef e5 27 0e 3e 41 ad 4a |..........'.>A.J|" -"2019-05-02 01:31:05.984 UTC [msp.identity] Verify -> DEBU 19e6 Verify: sig = 00000000 30 44 02 20 12 44 ae 72 8e 07 e1 8e 9d 5a fc b3 |0D. .D.r.....Z..| -00000010 72 2d bd 48 2d 84 a6 73 c5 f9 ce ec 61 9e e2 c9 |r-.H-..s....a...| -00000020 c1 be 3a 9e 02 20 4f e5 a0 de 61 9f 78 a7 f5 6c |..:.. O...a.x..l| -00000030 8b 9f d3 18 83 78 9d c6 f3 e4 81 f2 e0 9f d3 69 |.....x.........i| -00000040 1f f5 12 e4 42 9b |....B.|" -"2019-05-02 01:31:05.985 UTC [cauthdsl] func2 -> DEBU 19e7 0xc003e3bca0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:05.985 UTC [cauthdsl] func1 -> DEBU 19e8 0xc003e3bca0 gate 1556760665983309300 evaluation succeeds" -"2019-05-02 01:31:05.985 UTC [policies] Evaluate -> DEBU 19e9 Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:31:05.985 UTC [policies] Evaluate -> DEBU 19ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:31:05.985 UTC [policies] Evaluate -> DEBU 19eb Signature set satisfies policy /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:05.985 UTC [policies] Evaluate -> DEBU 19ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:05.985 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19ed constructing new query executor txid = [cad7b638-32a9-4fc6-9c45-bd451c8c922e]" -"2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] Done -> DEBU 19ee Done with transaction simulation / query execution [cad7b638-32a9-4fc6-9c45-bd451c8c922e]" -"2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19ef constructing new query executor txid = [1bfd5d88-4ec1-42bb-a7f5-7245cf2ee23c]" -"2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] Done -> DEBU 19f0 Done with transaction simulation / query execution [1bfd5d88-4ec1-42bb-a7f5-7245cf2ee23c]" -"2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19f1 constructing new query executor txid = [56222f12-3a64-4fb2-a3f8-5a52639e099d]" -"2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] Done -> DEBU 19f2 Done with transaction simulation / query execution [56222f12-3a64-4fb2-a3f8-5a52639e099d]" -"2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 19f3 constructing new query executor txid = [239aa37a-cba1-48c8-afe1-10d71ca2ce26]" -"2019-05-02 01:31:05.986 UTC [lockbasedtxmgr] Done -> DEBU 19f4 Done with transaction simulation / query execution [239aa37a-cba1-48c8-afe1-10d71ca2ce26]" -"2019-05-02 01:31:05.986 UTC [vscc] Validate -> DEBU 19f5 block 5, namespace: _lifecycle, tx 0 validation results is: " -"2019-05-02 01:31:05.987 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 19f6 Transaction c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf appears to be valid" -"2019-05-02 01:31:05.987 UTC [committer.txvalidator] Dispatch -> DEBU 19f7 [businesschannel] Dispatch completes env bytes 0xc003ddcc00" -"2019-05-02 01:31:05.987 UTC [committer.txvalidator] validateTx -> DEBU 19f8 [businesschannel] validateTx completes for block 0xc003b8fec0 env 0xc003dde2d0 txn 0" -"2019-05-02 01:31:05.987 UTC [committer.txvalidator] Validate -> DEBU 19f9 got result for idx 0, code 0" -"2019-05-02 01:31:05.987 UTC [committer.txvalidator] Validate -> INFO 19fa [businesschannel] Validated block [5] in 60ms" -"2019-05-02 01:31:05.991 UTC [gossip.comm] sendToEndpoint -> DEBU 19fb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.991 UTC [gossip.comm] sendToEndpoint -> DEBU 19fc Exiting" -"2019-05-02 01:31:05.975 UTC [msp] DeserializeIdentity -> DEBU 19d9 Obtaining identity" -"2019-05-02 01:31:05.993 UTC [msp] DeserializeIdentity -> DEBU 19fd Obtaining identity" -"2019-05-02 01:31:05.993 UTC [msp] DeserializeIdentity -> DEBU 19fe Obtaining identity" -"2019-05-02 01:31:05.993 UTC [gossip.comm] Send -> DEBU 19ff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:05.995 UTC [gossip.discovery] sendMemResponse -> DEBU 1a00 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:05.996 UTC [gossip.comm] sendToEndpoint -> DEBU 1a01 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.996 UTC [gossip.comm] sendToEndpoint -> DEBU 1a02 Exiting" -"2019-05-02 01:31:05.996 UTC [gossip.comm] Send -> DEBU 1a03 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:05.997 UTC [gossip.comm] sendToEndpoint -> DEBU 1a04 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:05.997 UTC [gossip.comm] sendToEndpoint -> DEBU 1a05 Exiting" -"2019-05-02 01:31:06.004 UTC [gossip.privdata] containsWrites -> DEBU 1a06 HashedRWSet of tx c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, namespace _lifecycle, collection _implicit_org_Org1MSP doesn't contain writes" -"2019-05-02 01:31:06.004 UTC [gossip.privdata] containsWrites -> DEBU 1a07 HashedRWSet of tx c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf, namespace _lifecycle, collection _implicit_org_Org2MSP doesn't contain writes" -"2019-05-02 01:31:06.004 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1a08 Retrieving private write sets for 0 transactions from transient store" -"2019-05-02 01:31:06.004 UTC [gossip.privdata] StoreBlock -> DEBU 1a09 [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-05-02 01:31:06.006 UTC [gossip.comm] func1 -> DEBU 1a0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-05-02 01:31:06.009 UTC [gossip.gossip] handleMessage -> DEBU 1a0c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-05-02 01:31:06.009 UTC [gossip.gossip] handleMessage -> DEBU 1a0d Exiting" -"2019-05-02 01:31:06.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-05-02 01:31:06.009 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a0f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:06.004 UTC [kvledger] CommitWithPvtData -> DEBU 1a0b [businesschannel] Validating state for block [5]" -"2019-05-02 01:31:06.010 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1a10 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:31:06.011 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1a11 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-05-02 01:31:06.012 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1a12 Validating new block with num trans = [1]" -"2019-05-02 01:31:06.012 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1a13 ValidateAndPrepareBatch() for block number = [5]" -"2019-05-02 01:31:06.015 UTC [gossip.gossip] handleMessage -> DEBU 1a16 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:06.011 UTC [msp.identity] Verify -> DEBU 1a14 Verify: digest = 00000000 24 14 2a 33 4a 92 d4 4c ef 28 cd 02 e8 dd 5a 78 |$.*3J..L.(....Zx| -00000010 2b e4 5a 54 d8 cf 3f b5 87 d5 9c fe 16 ce f1 66 |+.ZT..?........f|" -"2019-05-02 01:31:06.015 UTC [msp.identity] Verify -> DEBU 1a17 Verify: sig = 00000000 30 45 02 21 00 f0 69 88 0f 8e cf 0e 30 fa 2e 14 |0E.!..i.....0...| -00000010 ea 91 9a 47 3d a5 fb c4 9d 2c 73 01 02 fd b1 b1 |...G=....,s.....| -00000020 d7 6c f1 59 93 02 20 28 61 72 6e 4b df f3 bf a1 |.l.Y.. (arnK....| -00000030 a9 55 1d 3d 66 8b 8c 4b 15 8a 91 5d 95 b4 ae 08 |.U.=f..K...]....| -00000040 eb 92 cb 02 30 39 ca |....09.|" -"2019-05-02 01:31:06.014 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1a15 preprocessing ProtoBlock..." -"2019-05-02 01:31:06.016 UTC [valimpl] preprocessProtoBlock -> DEBU 1a18 txType=ENDORSER_TRANSACTION" -"2019-05-02 01:31:06.017 UTC [stateleveldb] GetState -> DEBU 1a19 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:06.018 UTC [statebasedval] validateKVRead -> DEBU 1a1a Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -"2019-05-02 01:31:06.018 UTC [stateleveldb] GetState -> DEBU 1a1b GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -"2019-05-02 01:31:06.019 UTC [statebasedval] validateKVRead -> DEBU 1a1c Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -"2019-05-02 01:31:06.019 UTC [stateleveldb] GetState -> DEBU 1a1e GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -"2019-05-02 01:31:06.019 UTC [stateleveldb] GetState -> DEBU 1a1f GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" -"2019-05-02 01:31:06.020 UTC [stateleveldb] GetState -> DEBU 1a20 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1a21 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -"2019-05-02 01:31:06.020 UTC [stateleveldb] GetState -> DEBU 1a22 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -"2019-05-02 01:31:06.020 UTC [stateleveldb] GetState -> DEBU 1a23 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" -"2019-05-02 01:31:06.020 UTC [stateleveldb] GetState -> DEBU 1a24 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 1a25 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" -"2019-05-02 01:31:06.021 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1a26 Block [5] Transaction index [0] TxId [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf] marked as valid by state validator. ContainsPostOrderWrites [false]" -"2019-05-02 01:31:06.021 UTC [valinternal] ApplyWriteSet -> DEBU 1a27 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Collections"}:(*internal.keyOps)(0xc003e0d700), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/EndorsementInfo"}:(*internal.keyOps)(0xc003e0d740), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Sequence"}:(*internal.keyOps)(0xc003e0d780), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/ValidationInfo"}:(*internal.keyOps)(0xc003e0d7c0), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/metadata/exp02"}:(*internal.keyOps)(0xc003e0d800)}" -"2019-05-02 01:31:06.019 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a1d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:06.021 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1a28 validating rwset..." -"2019-05-02 01:31:06.022 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1a2a postprocessing ProtoBlock..." -"2019-05-02 01:31:06.022 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1a2b ValidateAndPrepareBatch() complete" -"2019-05-02 01:31:06.023 UTC [lifecycle] update -> INFO 1a2c Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" -"2019-05-02 01:31:06.024 UTC [stateleveldb] GetState -> DEBU 1a2d GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" -"2019-05-02 01:31:06.024 UTC [stateleveldb] GetState -> DEBU 1a2e GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" -"2019-05-02 01:31:06.024 UTC [stateleveldb] GetState -> DEBU 1a2f GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1a30 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" -"2019-05-02 01:31:06.024 UTC [stateleveldb] GetState -> DEBU 1a31 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" -"2019-05-02 01:31:06.025 UTC [stateleveldb] GetState -> DEBU 1a32 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=� ��=�Y\��}�J=�M#d� ���Ժ�" -"2019-05-02 01:31:06.025 UTC [lifecycle] update -> INFO 1a33 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" -"2019-05-02 01:31:06.025 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1a34 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[exp02:0xc003eb6120] map[4SNrˤ��s�p����oy��&��t��ZM4:exp02 ����>{"+���#b� ��T�H��Won�:exp02 � ��=�Y\��}�J=�M#d� ���Ժ�:exp02 ���R���l� DEBU 1a35 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc003e5b4a0), (*kvrwset.KVWrite)(0xc003e5b4f0), (*kvrwset.KVWrite)(0xc003e5b540), (*kvrwset.KVWrite)(0xc003e5b590), (*kvrwset.KVWrite)(0xc003e5b5e0)}}" -"2019-05-02 01:31:06.026 UTC [cceventmgmt] HandleStateUpdates -> INFO 1a36 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" -"2019-05-02 01:31:06.026 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 1a37 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}]]" -"2019-05-02 01:31:06.027 UTC [gossip.comm] func1 -> DEBU 1a38 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:06.026 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 1a39 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" -"2019-05-02 01:31:06.028 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 1a3a Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" -"2019-05-02 01:31:06.028 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1a3b Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0})}" -"2019-05-02 01:31:06.028 UTC [stateleveldb] GetState -> DEBU 1a3c GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -"2019-05-02 01:31:06.022 UTC [gossip.discovery] isSentByMe -> DEBU 1a29 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:06.028 UTC [stateleveldb] GetState -> DEBU 1a3d GetState(). ns=lscc, key=exp02" -"2019-05-02 01:31:06.030 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1a3f Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 216 129 76 241 69 60 8 51 200 236 230 104 227 112 199 189 219 19 97 23 185 229 62 48 241 59 155 78 13 25 116 13 2 32 116 67 68 156 136 155 15 173 83 249 60 180 13 82 76 31 222 21 132 92 100 178 210 6 255 132 174 31 211 118 30 104]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0025ee400 0xc00255d110 0xc0025a5580})]}" -"2019-05-02 01:31:06.030 UTC [confighistory] add -> DEBU 1a40 add() - {lscc, exp02~collection, 5}" -"2019-05-02 01:31:06.029 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a3e Exiting" -"2019-05-02 01:31:06.031 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a41 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:06.032 UTC [msp.identity] Verify -> DEBU 1a42 Verify: digest = 00000000 9c 53 05 c2 e0 ba a2 e0 51 71 27 bd c1 0d 69 87 |.S......Qq'...i.| -00000010 b2 3e 40 46 6e ad 51 68 96 50 6c 29 a9 d6 67 63 |.>@Fn.Qh.Pl)..gc|" -"2019-05-02 01:31:06.033 UTC [msp.identity] Verify -> DEBU 1a43 Verify: sig = 00000000 30 45 02 21 00 cb fa c8 bf d7 cc 06 26 a7 69 91 |0E.!........&.i.| -00000010 b4 13 e8 f8 bd 4f a6 3a 32 09 ff 9d a3 f8 95 d8 |.....O.:2.......| -00000020 13 f4 69 5a f3 02 20 52 41 b8 b5 57 cf 34 5f 68 |..iZ.. RA..W.4_h| -00000030 ec b8 39 4b d5 60 09 90 b3 bf 44 37 ea e2 d9 21 |..9K.`....D7...!| -00000040 42 2d 2b 9a b8 bd 1a |B-+....|" -"2019-05-02 01:31:06.035 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a44 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:06.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a45 Exiting" -"2019-05-02 01:31:06.037 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a46 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:06.038 UTC [msp] DeserializeIdentity -> DEBU 1a47 Obtaining identity" -"2019-05-02 01:31:06.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a48 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:06.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a49 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:06.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a4a Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:06.060 UTC [policies] Evaluate -> DEBU 1a4b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:06.060 UTC [policies] Evaluate -> DEBU 1a4c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:06.060 UTC [policies] Evaluate -> DEBU 1a4d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:06.061 UTC [cauthdsl] func1 -> DEBU 1a4e 0xc003ed8b90 gate 1556760666061653300 evaluation starts" -"2019-05-02 01:31:06.061 UTC [cauthdsl] func2 -> DEBU 1a4f 0xc003ed8b90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:06.061 UTC [cauthdsl] func2 -> DEBU 1a50 0xc003ed8b90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:06.062 UTC [cauthdsl] func2 -> DEBU 1a51 0xc003ed8b90 principal matched by identity 0" -"2019-05-02 01:31:06.062 UTC [msp.identity] Verify -> DEBU 1a52 Verify: digest = 00000000 2c 75 3e 60 39 b7 46 71 58 fc b5 58 d9 2c d8 bf |,u>`9.FqX..X.,..| -00000010 48 2b a3 11 66 57 dd 1e 5b 2e ff 62 39 d4 0e a7 |H+..fW..[..b9...|" -"2019-05-02 01:31:06.062 UTC [msp.identity] Verify -> DEBU 1a53 Verify: sig = 00000000 30 45 02 21 00 e8 69 4c 1d 34 59 90 40 bf c5 bf |0E.!..iL.4Y.@...| -00000010 11 d2 02 d7 f6 94 a8 e8 79 06 04 06 6c 3b f5 65 |........y...l;.e| -00000020 68 8e 20 0b 97 02 20 52 42 5b b3 e5 19 93 ce 48 |h. ... RB[.....H| -00000030 e7 ce 6a 25 88 49 06 53 17 d0 77 ba 85 a2 ad a8 |..j%.I.S..w.....| -00000040 d2 dd bd a7 0e 3e a9 |.....>.|" -"2019-05-02 01:31:06.064 UTC [cauthdsl] func2 -> DEBU 1a54 0xc003ed8b90 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:06.064 UTC [cauthdsl] func1 -> DEBU 1a55 0xc003ed8b90 gate 1556760666061653300 evaluation succeeds" -"2019-05-02 01:31:06.064 UTC [policies] Evaluate -> DEBU 1a56 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:06.064 UTC [policies] Evaluate -> DEBU 1a57 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:06.064 UTC [policies] Evaluate -> DEBU 1a58 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:06.064 UTC [policies] Evaluate -> DEBU 1a59 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:06.064 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a5a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:06.065 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a5b Exiting" -"2019-05-02 01:31:06.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a5c Exiting" -"2019-05-02 01:31:06.065 UTC [gossip.gossip] handleMessage -> DEBU 1a5d Exiting" -"2019-05-02 01:31:06.065 UTC [gossip.gossip] handleMessage -> DEBU 1a5e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:06.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a5f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:06.066 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a60 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:06.067 UTC [msp.identity] Verify -> DEBU 1a61 Verify: digest = 00000000 24 14 2a 33 4a 92 d4 4c ef 28 cd 02 e8 dd 5a 78 |$.*3J..L.(....Zx| -00000010 2b e4 5a 54 d8 cf 3f b5 87 d5 9c fe 16 ce f1 66 |+.ZT..?........f|" -"2019-05-02 01:31:06.068 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1a62 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00001b740 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000e7c0})}" -"2019-05-02 01:31:06.068 UTC [kvledger] CommitWithPvtData -> DEBU 1a63 [businesschannel] Committing block [5] to storage" -"2019-05-02 01:31:06.069 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1a64 Writing block [5] to pvt block store" -"2019-05-02 01:31:06.067 UTC [msp.identity] Verify -> DEBU 1a65 Verify: sig = 00000000 30 45 02 21 00 f0 69 88 0f 8e cf 0e 30 fa 2e 14 |0E.!..i.....0...| -00000010 ea 91 9a 47 3d a5 fb c4 9d 2c 73 01 02 fd b1 b1 |...G=....,s.....| -00000020 d7 6c f1 59 93 02 20 28 61 72 6e 4b df f3 bf a1 |.l.Y.. (arnK....| -00000030 a9 55 1d 3d 66 8b 8c 4b 15 8a 91 5d 95 b4 ae 08 |.U.=f..K...]....| -00000040 eb 92 cb 02 30 39 ca |....09.|" -"2019-05-02 01:31:06.070 UTC [msp.identity] Verify -> DEBU 1a66 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:06.070 UTC [msp.identity] Verify -> DEBU 1a67 Verify: sig = 00000000 30 44 02 20 0f da 56 98 19 d8 89 b6 7f bf ce f6 |0D. ..V.........| -00000010 d3 e8 4c 6b 2b c4 a3 d2 0d a5 26 03 0e 6e 34 ba |..Lk+.....&..n4.| -00000020 b2 84 d0 28 02 20 3e 88 68 93 b2 6d fb 4e 06 cf |...(. >.h..m.N..| -00000030 89 7a 51 44 5c 2a 41 f1 fb 87 cc 4f d3 f0 31 76 |.zQD\*A....O..1v| -00000040 d3 60 fa 82 b5 33 |.`...3|" -"2019-05-02 01:31:06.071 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a68 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:06.071 UTC [gossip.discovery] isSentByMe -> DEBU 1a69 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:06.071 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a6a Exiting" -"2019-05-02 01:31:06.071 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a6b Exiting" -"2019-05-02 01:31:06.071 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a6c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:06.071 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a6d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:06.073 UTC [pvtdatastorage] Prepare -> DEBU 1a6e Saved 0 private data write sets for block [5]" -"2019-05-02 01:31:06.073 UTC [gossip.gossip] handleMessage -> DEBU 1a6f Exiting" -"2019-05-02 01:31:06.074 UTC [msp.identity] Verify -> DEBU 1a70 Verify: digest = 00000000 24 14 2a 33 4a 92 d4 4c ef 28 cd 02 e8 dd 5a 78 |$.*3J..L.(....Zx| -00000010 2b e4 5a 54 d8 cf 3f b5 87 d5 9c fe 16 ce f1 66 |+.ZT..?........f|" -"2019-05-02 01:31:06.075 UTC [msp.identity] Verify -> DEBU 1a71 Verify: sig = 00000000 30 45 02 21 00 f0 69 88 0f 8e cf 0e 30 fa 2e 14 |0E.!..i.....0...| -00000010 ea 91 9a 47 3d a5 fb c4 9d 2c 73 01 02 fd b1 b1 |...G=....,s.....| -00000020 d7 6c f1 59 93 02 20 28 61 72 6e 4b df f3 bf a1 |.l.Y.. (arnK....| -00000030 a9 55 1d 3d 66 8b 8c 4b 15 8a 91 5d 95 b4 ae 08 |.U.=f..K...]....| -00000040 eb 92 cb 02 30 39 ca |....09.|" -"2019-05-02 01:31:06.075 UTC [fsblkstorage] indexBlock -> DEBU 1a72 Indexing block [blockNum=5, blockHash=[]byte{0x11, 0xe8, 0x9b, 0x88, 0x21, 0x80, 0x3, 0xc4, 0xce, 0x32, 0x91, 0xc, 0x63, 0x34, 0x40, 0x39, 0xf7, 0xd7, 0x36, 0x66, 0x25, 0x30, 0x1a, 0x98, 0xf5, 0x12, 0x6d, 0x91, 0x34, 0x40, 0x38, 0xa8} txOffsets= -txId=c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf locPointer=offset=70, bytesLength=4706 +"2019-05-02 09:27:34.131 UTC [msp.identity] Verify -> DEBU 15db Verify: sig = 00000000 30 45 02 21 00 d9 f4 41 57 df d3 7f 27 e4 c0 85 |0E.!...AW...'...| +00000010 c5 ae 34 6a d0 3d 15 ce f5 80 7e c6 16 27 11 b2 |..4j.=....~..'..| +00000020 c0 36 f8 07 25 02 20 31 fd 8b 18 7b 21 df ad 48 |.6..%. 1...{!..H| +00000030 23 b7 f6 7d 63 9d 2a 11 d7 1a 83 1b 69 70 ac 92 |#..}c.*.....ip..| +00000040 a7 83 1b a9 31 64 42 |....1dB|" +"2019-05-02 09:27:34.132 UTC [gossip.discovery] handleAliveMessage -> DEBU 15dc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15dd Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15de updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 " +"2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15df Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 " +"2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:34.132 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e1 Exiting" +"2019-05-02 09:27:34.132 UTC [gossip.discovery] handleAliveMessage -> DEBU 15e2 Exiting" +"2019-05-02 09:27:34.133 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15e3 Exiting" +"2019-05-02 09:27:34.133 UTC [msp] DeserializeIdentity -> DEBU 15e4 Obtaining identity" +"2019-05-02 09:27:34.133 UTC [msp] DeserializeIdentity -> DEBU 15e5 Obtaining identity" +"2019-05-02 09:27:34.133 UTC [msp] DeserializeIdentity -> DEBU 15e6 Obtaining identity" +"2019-05-02 09:27:34.133 UTC [gossip.comm] Send -> DEBU 15e7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:34.134 UTC [msp] DeserializeIdentity -> DEBU 15e8 Obtaining identity" +"2019-05-02 09:27:34.134 UTC [gossip.comm] Send -> DEBU 15e9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:34.135 UTC [gossip.comm] sendToEndpoint -> DEBU 15ea Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:34.135 UTC [gossip.comm] sendToEndpoint -> DEBU 15eb Exiting" +"2019-05-02 09:27:34.136 UTC [gossip.comm] sendToEndpoint -> DEBU 15ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:34.136 UTC [gossip.comm] sendToEndpoint -> DEBU 15ed Exiting" +"2019-05-02 09:27:34.138 UTC [gossip.comm] func1 -> DEBU 15ee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:34.138 UTC [gossip.gossip] handleMessage -> DEBU 15ef Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:34.138 UTC [gossip.gossip] handleMessage -> DEBU 15f0 Exiting" +"2019-05-02 09:27:34.139 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:34.139 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f2 Exiting" +"2019-05-02 09:27:34.145 UTC [grpc] infof -> DEBU 15f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:34.145 UTC [gossip.gossip] handleMessage -> DEBU 15f4 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:34.145 UTC [gossip.gossip] handleMessage -> DEBU 15f5 Exiting" +"2019-05-02 09:27:34.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:34.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15f7 Exiting" +"2019-05-02 09:27:34.146 UTC [grpc] infof -> DEBU 15f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:34.200 UTC [gossip.gossip] handleMessage -> DEBU 15f9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:34.200 UTC [gossip.gossip] handleMessage -> DEBU 15fa Exiting" +"2019-05-02 09:27:34.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:34.201 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15fc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:34.201 UTC [msp] DeserializeIdentity -> DEBU 15fd Obtaining identity" +"2019-05-02 09:27:34.201 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:34.201 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15ff Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:34.201 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1600 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:34.202 UTC [policies] Evaluate -> DEBU 1601 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:34.202 UTC [policies] Evaluate -> DEBU 1602 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:34.202 UTC [policies] Evaluate -> DEBU 1603 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:34.202 UTC [cauthdsl] func1 -> DEBU 1604 0xc0033301e0 gate 1556789254202182500 evaluation starts" +"2019-05-02 09:27:34.202 UTC [cauthdsl] func2 -> DEBU 1605 0xc0033301e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:34.202 UTC [cauthdsl] func2 -> DEBU 1606 0xc0033301e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:34.202 UTC [cauthdsl] func2 -> DEBU 1607 0xc0033301e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:34.203 UTC [cauthdsl] func2 -> DEBU 1608 0xc0033301e0 principal evaluation fails" +"2019-05-02 09:27:34.204 UTC [cauthdsl] func1 -> DEBU 1609 0xc0033301e0 gate 1556789254202182500 evaluation fails" +"2019-05-02 09:27:34.204 UTC [policies] Evaluate -> DEBU 160a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:34.204 UTC [policies] Evaluate -> DEBU 160b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:34.206 UTC [policies] Evaluate -> DEBU 160c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:34.216 UTC [gossip.comm] func1 -> DEBU 160d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:34.216 UTC [gossip.gossip] handleMessage -> DEBU 160e Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:34.209 UTC [cauthdsl] func1 -> DEBU 160f 0xc003330a20 gate 1556789254209820800 evaluation starts" +"2019-05-02 09:27:34.220 UTC [cauthdsl] func2 -> DEBU 1610 0xc003330a20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:34.220 UTC [cauthdsl] func2 -> DEBU 1611 0xc003330a20 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:34.221 UTC [cauthdsl] func2 -> DEBU 1612 0xc003330a20 principal matched by identity 0" +"2019-05-02 09:27:34.221 UTC [msp.identity] Verify -> DEBU 1613 Verify: digest = 00000000 9d d2 f3 f0 31 89 7e 29 b8 bc 9c bf 2d 06 77 44 |....1.~)....-.wD| +00000010 1d c6 07 c1 26 85 c9 8c 17 6d 0d 10 bd 50 13 e2 |....&....m...P..|" +"2019-05-02 09:27:34.221 UTC [msp.identity] Verify -> DEBU 1614 Verify: sig = 00000000 30 45 02 21 00 e0 01 43 20 01 73 83 de 1f 9c 5c |0E.!...C .s....\| +00000010 aa 34 75 d6 c1 80 39 2d a2 35 41 b1 89 7d 8a b7 |.4u...9-.5A..}..| +00000020 6c 65 3f b5 9a 02 20 4f de c9 b2 a3 e4 43 85 f6 |le?... O.....C..| +00000030 de 4b 43 51 6f 91 58 05 02 bc d7 b5 96 89 45 2d |.KCQo.X.......E-| +00000040 94 ad e4 9c cc 75 81 |.....u.|" +"2019-05-02 09:27:34.222 UTC [cauthdsl] func2 -> DEBU 1615 0xc003330a20 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:34.223 UTC [cauthdsl] func1 -> DEBU 1616 0xc003330a20 gate 1556789254209820800 evaluation succeeds" +"2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 1617 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 1618 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 1619 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:34.223 UTC [policies] Evaluate -> DEBU 161a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:34.224 UTC [gossip.discovery] handleAliveMessage -> DEBU 161b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:34.225 UTC [gossip.discovery] learnExistingMembers -> DEBU 161c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:34.225 UTC [gossip.discovery] learnExistingMembers -> DEBU 161d updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 " +"2019-05-02 09:27:34.226 UTC [gossip.discovery] learnExistingMembers -> DEBU 161e Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 " +"2019-05-02 09:27:34.226 UTC [gossip.discovery] learnExistingMembers -> DEBU 161f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:34.227 UTC [gossip.discovery] learnExistingMembers -> DEBU 1620 Exiting" +"2019-05-02 09:27:34.227 UTC [gossip.discovery] handleAliveMessage -> DEBU 1621 Exiting" +"2019-05-02 09:27:34.227 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1622 Exiting" +"2019-05-02 09:27:34.227 UTC [gossip.gossip] handleMessage -> DEBU 1623 Exiting" +"2019-05-02 09:27:34.227 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1624 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:34.227 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1625 Exiting" +"2019-05-02 09:27:34.232 UTC [msp] DeserializeIdentity -> DEBU 1626 Obtaining identity" +"2019-05-02 09:27:34.232 UTC [msp] DeserializeIdentity -> DEBU 1627 Obtaining identity" +"2019-05-02 09:27:34.232 UTC [msp] DeserializeIdentity -> DEBU 1628 Obtaining identity" +"2019-05-02 09:27:34.233 UTC [msp] DeserializeIdentity -> DEBU 1629 Obtaining identity" +"2019-05-02 09:27:34.233 UTC [msp] DeserializeIdentity -> DEBU 162a Obtaining identity" +"2019-05-02 09:27:34.234 UTC [msp] DeserializeIdentity -> DEBU 162b Obtaining identity" +"2019-05-02 09:27:34.241 UTC [gossip.comm] Send -> DEBU 162c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:34.241 UTC [msp] DeserializeIdentity -> DEBU 162d Obtaining identity" +"2019-05-02 09:27:34.241 UTC [msp] DeserializeIdentity -> DEBU 162e Obtaining identity" +"2019-05-02 09:27:34.241 UTC [gossip.comm] Send -> DEBU 162f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1630 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1631 Exiting" +"2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1632 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:34.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1633 Exiting" +"2019-05-02 09:27:34.243 UTC [gossip.gossip] handleMessage -> DEBU 1634 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:34.243 UTC [gossip.gossip] handleMessage -> DEBU 1635 Exiting" +"2019-05-02 09:27:34.244 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1636 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:34.244 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1637 Exiting" +"2019-05-02 09:27:34.413 UTC [endorser] ProcessProposal -> DEBU 1638 Entering: request from 172.18.0.8:57316" +"2019-05-02 09:27:34.414 UTC [protoutils] ValidateProposalMessage -> DEBU 1639 ValidateProposalMessage starts for signed proposal 0xc003758870" +"2019-05-02 09:27:34.414 UTC [protoutils] validateChannelHeader -> DEBU 163a validateChannelHeader info: header type 3" +"2019-05-02 09:27:34.415 UTC [protoutils] checkSignatureFromCreator -> DEBU 163b begin" +"2019-05-02 09:27:34.415 UTC [msp] GetManagerForChain -> DEBU 163c Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:34.415 UTC [protoutils] checkSignatureFromCreator -> DEBU 163d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:34.416 UTC [protoutils] checkSignatureFromCreator -> DEBU 163e creator is valid" +"2019-05-02 09:27:34.416 UTC [msp.identity] Verify -> DEBU 163f Verify: digest = 00000000 a4 6b 50 6e c8 73 56 22 b1 b9 51 73 a9 da c1 05 |.kPn.sV"..Qs....| +00000010 77 3d 1a 3f c7 af ce 96 76 dd 39 b9 56 ea 49 d4 |w=.?....v.9.V.I.|" +"2019-05-02 09:27:34.416 UTC [msp.identity] Verify -> DEBU 1640 Verify: sig = 00000000 30 44 02 20 10 56 84 67 bb 80 4d 7d 09 37 05 0f |0D. .V.g..M}.7..| +00000010 88 31 49 ce ee 2d 7d b6 f6 49 00 86 39 1e f0 74 |.1I..-}..I..9..t| +00000020 20 e5 8e 7d 02 20 78 1b e2 4c fe 69 49 bc 35 46 | ..}. x..L.iI.5F| +00000030 ac 5f d0 fe 4c fa a5 71 b0 bb 63 e1 fc 67 ff 7c |._..L..q..c..g.|| +00000040 3f 89 3f c3 ef 3f |?.?..?|" +"2019-05-02 09:27:34.417 UTC [protoutils] checkSignatureFromCreator -> DEBU 1641 exits successfully" +"2019-05-02 09:27:34.417 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1642 validateChaincodeProposalMessage starts for proposal 0xc002cdccb0, header 0xc003758cd0" +"2019-05-02 09:27:34.418 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1643 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-05-02 09:27:34.418 UTC [endorser] preProcess -> DEBU 1644 [businesschannel][f6f68e79] processing txid: f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1" +"2019-05-02 09:27:34.418 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1645 retrieveTransactionByID() - txId = [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]" +"2019-05-02 09:27:34.418 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1646 constructing new tx simulator" +"2019-05-02 09:27:34.419 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1647 constructing new tx simulator txid = [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]" +"2019-05-02 09:27:34.419 UTC [endorser] SimulateProposal -> DEBU 1648 [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:34.420 UTC [endorser] callChaincode -> INFO 1649 [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:34.420 UTC [chaincode] Execute -> DEBU 164a Entry" +"2019-05-02 09:27:34.420 UTC [aclmgmt] CheckACL -> DEBU 164b acl policy /Channel/Application/Writers found in config for resource _lifecycle/CommitChaincodeDefinition" +"2019-05-02 09:27:34.420 UTC [aclmgmt] CheckACL -> DEBU 164c acl check(/Channel/Application/Writers)" +"2019-05-02 09:27:34.421 UTC [policies] Evaluate -> DEBU 164d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:34.421 UTC [policies] Evaluate -> DEBU 164e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:34.422 UTC [policies] Evaluate -> DEBU 164f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:34.422 UTC [cauthdsl] func1 -> DEBU 1650 0xc00252b340 gate 1556789254422484900 evaluation starts" +"2019-05-02 09:27:34.422 UTC [cauthdsl] func2 -> DEBU 1651 0xc00252b340 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:34.423 UTC [cauthdsl] func2 -> DEBU 1652 0xc00252b340 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:34.423 UTC [cauthdsl] func2 -> DEBU 1653 0xc00252b340 principal matched by identity 0" +"2019-05-02 09:27:34.424 UTC [msp.identity] Verify -> DEBU 1654 Verify: digest = 00000000 a4 6b 50 6e c8 73 56 22 b1 b9 51 73 a9 da c1 05 |.kPn.sV"..Qs....| +00000010 77 3d 1a 3f c7 af ce 96 76 dd 39 b9 56 ea 49 d4 |w=.?....v.9.V.I.|" +"2019-05-02 09:27:34.424 UTC [msp.identity] Verify -> DEBU 1655 Verify: sig = 00000000 30 44 02 20 10 56 84 67 bb 80 4d 7d 09 37 05 0f |0D. .V.g..M}.7..| +00000010 88 31 49 ce ee 2d 7d b6 f6 49 00 86 39 1e f0 74 |.1I..-}..I..9..t| +00000020 20 e5 8e 7d 02 20 78 1b e2 4c fe 69 49 bc 35 46 | ..}. x..L.iI.5F| +00000030 ac 5f d0 fe 4c fa a5 71 b0 bb 63 e1 fc 67 ff 7c |._..L..q..c..g.|| +00000040 3f 89 3f c3 ef 3f |?.?..?|" +"2019-05-02 09:27:34.425 UTC [cauthdsl] func2 -> DEBU 1656 0xc00252b340 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:34.425 UTC [cauthdsl] func1 -> DEBU 1657 0xc00252b340 gate 1556789254422484900 evaluation succeeds" +"2019-05-02 09:27:34.425 UTC [policies] Evaluate -> DEBU 1658 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:34.426 UTC [policies] Evaluate -> DEBU 1659 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:34.426 UTC [policies] Evaluate -> DEBU 165a Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:34.426 UTC [policies] Evaluate -> DEBU 165b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:34.427 UTC [lifecycle] CommitChaincodeDefinition -> DEBU 165c received invocation of CommitChaincodeDefinition on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" +"2019-05-02 09:27:34.427 UTC [chaincode] handleMessage -> DEBU 165d [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:34.427 UTC [chaincode] HandleTransaction -> DEBU 165e [f6f68e79] handling GET_STATE from chaincode" +"2019-05-02 09:27:34.428 UTC [chaincode] HandleGetState -> DEBU 165f [f6f68e79] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +"2019-05-02 09:27:34.428 UTC [stateleveldb] GetState -> DEBU 1660 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:34.428 UTC [chaincode] HandleGetState -> DEBU 1661 [f6f68e79] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +"2019-05-02 09:27:34.428 UTC [chaincode] HandleTransaction -> DEBU 1662 [f6f68e79] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:34.428 UTC [chaincode] handleMessage -> DEBU 1663 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:34.428 UTC [chaincode] HandleTransaction -> DEBU 1664 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:34.428 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1665 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +"2019-05-02 09:27:34.428 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1666 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-05-02 09:27:34.428 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1667 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-05-02 09:27:34.428 UTC [stateleveldb] GetState -> DEBU 1668 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-05-02 09:27:34.428 UTC [chaincode] HandleTransaction -> DEBU 1669 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 166a [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 166b [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 166c [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +"2019-05-02 09:27:34.429 UTC [stateleveldb] GetState -> DEBU 166d GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 166e [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 166f [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 1670 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1671 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +"2019-05-02 09:27:34.429 UTC [stateleveldb] GetState -> DEBU 1672 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1673 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 1674 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 1675 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1676 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +"2019-05-02 09:27:34.429 UTC [stateleveldb] GetState -> DEBU 1677 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 1678 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:34.429 UTC [chaincode] handleMessage -> DEBU 1679 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:34.429 UTC [chaincode] HandleTransaction -> DEBU 167a [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:34.429 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 167b [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +"2019-05-02 09:27:34.430 UTC [stateleveldb] GetState -> DEBU 167c GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-05-02 09:27:34.430 UTC [chaincode] HandleTransaction -> DEBU 167d [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:34.430 UTC [chaincode] handleMessage -> DEBU 167e [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:34.430 UTC [chaincode] HandleTransaction -> DEBU 167f [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:34.430 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1680 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +"2019-05-02 09:27:34.430 UTC [stateleveldb] GetState -> DEBU 1681 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-05-02 09:27:34.430 UTC [chaincode] HandleTransaction -> DEBU 1682 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:34.430 UTC [chaincode] handleMessage -> DEBU 1683 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:34.431 UTC [chaincode] HandleTransaction -> DEBU 1684 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:34.431 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1685 [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +"2019-05-02 09:27:34.431 UTC [stateleveldb] GetState -> DEBU 1686 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 1687 [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:34.433 UTC [chaincode] handleMessage -> DEBU 1688 [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-05-02 09:27:34.433 UTC [chaincode] HandleTransaction -> DEBU 1689 [f6f68e79] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-05-02 09:27:34.434 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 168a [f6f68e79] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +"2019-05-02 09:27:34.434 UTC [stateleveldb] GetState -> DEBU 168b GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-05-02 09:27:34.435 UTC [chaincode] HandleTransaction -> DEBU 168c [f6f68e79] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-05-02 09:27:34.435 UTC [lifecycle] QueryApprovalStatus -> INFO 168d successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-05-02 09:27:34.436 UTC [chaincode] handleMessage -> DEBU 168e [f6f68e79] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:34.436 UTC [chaincode] HandleTransaction -> DEBU 168f [f6f68e79] handling GET_STATE from chaincode" +"2019-05-02 09:27:34.437 UTC [chaincode] HandleGetState -> DEBU 1690 [f6f68e79] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" +"2019-05-02 09:27:34.437 UTC [stateleveldb] GetState -> DEBU 1691 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-05-02 09:27:34.438 UTC [chaincode] HandleGetState -> DEBU 1692 [f6f68e79] No state associated with key: namespaces/metadata/exp02. Sending RESPONSE with an empty payload" +"2019-05-02 09:27:34.438 UTC [chaincode] HandleTransaction -> DEBU 1693 [f6f68e79] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:34.439 UTC [chaincode] handleMessage -> DEBU 1694 [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:34.439 UTC [chaincode] HandleTransaction -> DEBU 1695 [f6f68e79] handling PUT_STATE from chaincode" +"2019-05-02 09:27:34.440 UTC [chaincode] HandleTransaction -> DEBU 1696 [f6f68e79] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:34.440 UTC [chaincode] handleMessage -> DEBU 1697 [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:34.441 UTC [chaincode] HandleTransaction -> DEBU 1698 [f6f68e79] handling PUT_STATE from chaincode" +"2019-05-02 09:27:34.441 UTC [chaincode] HandleTransaction -> DEBU 1699 [f6f68e79] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:34.442 UTC [chaincode] handleMessage -> DEBU 169a [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:34.443 UTC [chaincode] HandleTransaction -> DEBU 169b [f6f68e79] handling PUT_STATE from chaincode" +"2019-05-02 09:27:34.443 UTC [chaincode] HandleTransaction -> DEBU 169c [f6f68e79] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:34.444 UTC [chaincode] handleMessage -> DEBU 169d [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:34.444 UTC [chaincode] HandleTransaction -> DEBU 169e [f6f68e79] handling PUT_STATE from chaincode" +"2019-05-02 09:27:34.444 UTC [chaincode] HandleTransaction -> DEBU 169f [f6f68e79] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:34.445 UTC [chaincode] handleMessage -> DEBU 16a0 [f6f68e79] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:34.445 UTC [chaincode] HandleTransaction -> DEBU 16a1 [f6f68e79] handling PUT_STATE from chaincode" +"2019-05-02 09:27:34.446 UTC [chaincode] HandleTransaction -> DEBU 16a2 [f6f68e79] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:34.446 UTC [lifecycle] CommitChaincodeDefinition -> INFO 16a3 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-05-02 09:27:34.446 UTC [chaincode] handleMessage -> DEBU 16a4 [f6f68e79] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:34.447 UTC [chaincode] Notify -> DEBU 16a5 [f6f68e79] notifying Txid:f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, channelID:businesschannel" +"2019-05-02 09:27:34.447 UTC [chaincode] Execute -> DEBU 16a6 Exit" +"2019-05-02 09:27:34.447 UTC [endorser] callChaincode -> INFO 16a7 [businesschannel][f6f68e79] Exit chaincode: name:"_lifecycle" (27ms)" +"2019-05-02 09:27:34.447 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 16a8 Simulation completed, getting simulation results" +"2019-05-02 09:27:34.448 UTC [lockbasedtxmgr] Done -> DEBU 16a9 Done with transaction simulation / query execution [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]" +"2019-05-02 09:27:34.448 UTC [endorser] SimulateProposal -> DEBU 16aa [businesschannel][f6f68e79] Exit" +"2019-05-02 09:27:34.448 UTC [endorser] endorseProposal -> DEBU 16ab [businesschannel][f6f68e79] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:34.449 UTC [endorser] endorseProposal -> DEBU 16ac [businesschannel][f6f68e79] escc for chaincode name:"_lifecycle" is escc" +"2019-05-02 09:27:34.449 UTC [endorser] EndorseWithPlugin -> DEBU 16ad Entering endorsement for {plugin: escc, channel: businesschannel, tx: f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, chaincode: _lifecycle}" +"2019-05-02 09:27:34.449 UTC [msp.identity] Sign -> DEBU 16ae Sign: plaintext: 0A20AF1811FEBE0A7A011CB75C185DAC...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:34.450 UTC [msp.identity] Sign -> DEBU 16af Sign: digest: 64E4B5318BFE5590738A9489AEECF0B08EDE71F592071BE975069271FB0687E1 " +"2019-05-02 09:27:34.450 UTC [endorser] EndorseWithPlugin -> DEBU 16b0 Exiting {plugin: escc, channel: businesschannel, tx: f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, chaincode: _lifecycle}" +"2019-05-02 09:27:34.450 UTC [endorser] endorseProposal -> DEBU 16b1 [businesschannel][f6f68e79] Exit" +"2019-05-02 09:27:34.450 UTC [lockbasedtxmgr] Done -> DEBU 16b2 Done with transaction simulation / query execution [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]" +"2019-05-02 09:27:34.451 UTC [endorser] func1 -> DEBU 16b3 Exit: request from 172.18.0.8:57316" +"2019-05-02 09:27:34.451 UTC [comm.grpc.server] 1 -> INFO 16b4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57316 grpc.code=OK grpc.call_duration=38.3784ms +"2019-05-02 09:27:34.469 UTC [common.deliverevents] DeliverFiltered -> DEBU 16b5 Starting new DeliverFiltered handler" +"2019-05-02 09:27:34.469 UTC [common.deliver] Handle -> DEBU 16b6 Starting new deliver loop for 172.18.0.8:57318" +"2019-05-02 09:27:34.469 UTC [common.deliver] Handle -> DEBU 16b7 Attempting to read seek info message from 172.18.0.8:57318" +"2019-05-02 09:27:34.476 UTC [aclmgmt] CheckACL -> DEBU 16b8 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" +"2019-05-02 09:27:34.476 UTC [aclmgmt] CheckACL -> DEBU 16b9 acl check(/Channel/Application/Readers)" +"2019-05-02 09:27:34.476 UTC [policies] Evaluate -> DEBU 16ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:34.476 UTC [policies] Evaluate -> DEBU 16bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:34.477 UTC [policies] Evaluate -> DEBU 16bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:34.477 UTC [cauthdsl] func1 -> DEBU 16bd 0xc003799cb0 gate 1556789254477306600 evaluation starts" +"2019-05-02 09:27:34.477 UTC [cauthdsl] func2 -> DEBU 16be 0xc003799cb0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:34.477 UTC [cauthdsl] func2 -> DEBU 16bf 0xc003799cb0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:34.477 UTC [cauthdsl] func2 -> DEBU 16c0 0xc003799cb0 principal matched by identity 0" +"2019-05-02 09:27:34.478 UTC [msp.identity] Verify -> DEBU 16c1 Verify: digest = 00000000 8f 3c aa 80 37 34 90 21 ef 0a fb d6 96 8e ed 14 |.<..74.!........| +00000010 c1 f6 3f 46 d9 7d 30 b2 d7 40 38 7d fd c5 38 01 |..?F.}0..@8}..8.|" +"2019-05-02 09:27:34.478 UTC [msp.identity] Verify -> DEBU 16c2 Verify: sig = 00000000 30 44 02 20 37 0e 61 4c c7 88 70 67 e3 d2 b7 e8 |0D. 7.aL..pg....| +00000010 63 ef ee c9 e4 60 d0 5f 5d 69 92 02 08 9e 85 b5 |c....`._]i......| +00000020 e7 b4 fb 21 02 20 05 6a b8 6d 96 58 f2 cc b8 a1 |...!. .j.m.X....| +00000030 8a 31 49 cf ae 27 77 69 53 9e e5 ff bf 2b 68 10 |.1I..'wiS....+h.| +00000040 25 88 ab 99 0b 31 |%....1|" +"2019-05-02 09:27:34.478 UTC [cauthdsl] func2 -> DEBU 16c3 0xc003799cb0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:34.478 UTC [cauthdsl] func1 -> DEBU 16c4 0xc003799cb0 gate 1556789254477306600 evaluation succeeds" +"2019-05-02 09:27:34.478 UTC [policies] Evaluate -> DEBU 16c5 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:34.478 UTC [policies] Evaluate -> DEBU 16c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:34.479 UTC [policies] Evaluate -> DEBU 16c7 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:34.479 UTC [policies] Evaluate -> DEBU 16c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:34.479 UTC [common.deliver] deliverBlocks -> DEBU 16c9 [channel: businesschannel] Received seekInfo (0xc0034d26c0) start: > stop: > from 172.18.0.8:57318" +"2019-05-02 09:27:34.480 UTC [fsblkstorage] Next -> DEBU 16ca Initializing block stream for iterator. itr.maxBlockNumAvailable=4" +"2019-05-02 09:27:34.480 UTC [fsblkstorage] newBlockfileStream -> DEBU 16cb newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[76084]" +"2019-05-02 09:27:34.480 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16cc Remaining bytes=[4710], Going to peek [8] bytes" +"2019-05-02 09:27:34.480 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16cd Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[76084], bytesOffset=[76086]}" +"2019-05-02 09:27:34.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16ce blockbytes [4708] read from file [0]" +"2019-05-02 09:27:34.481 UTC [common.deliver] deliverBlocks -> DEBU 16cf [channel: businesschannel] Delivering block [4] for (0xc0034d26c0) for 172.18.0.8:57318" +"2019-05-02 09:27:34.483 UTC [fsblkstorage] waitForBlock -> DEBU 16d0 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +"2019-05-02 09:27:36.285 UTC [msp] DeserializeIdentity -> DEBU 16d1 Obtaining identity" +"2019-05-02 09:27:36.286 UTC [msp] DeserializeIdentity -> DEBU 16d2 Obtaining identity" +"2019-05-02 09:27:36.287 UTC [gossip.comm] Send -> DEBU 16d3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:27:36.287 UTC [gossip.comm] sendToEndpoint -> DEBU 16d4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.288 UTC [gossip.comm] sendToEndpoint -> DEBU 16d5 Exiting" +"2019-05-02 09:27:36.288 UTC [gossip.comm] sendToEndpoint -> DEBU 16d6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.289 UTC [gossip.comm] sendToEndpoint -> DEBU 16d7 Exiting" +"2019-05-02 09:27:36.287 UTC [gossip.comm] sendToEndpoint -> DEBU 16d8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.291 UTC [gossip.comm] func1 -> DEBU 16d9 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.291 UTC [gossip.gossip] handleMessage -> DEBU 16da Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.291 UTC [msp] DeserializeIdentity -> DEBU 16db Obtaining identity" +"2019-05-02 09:27:36.291 UTC [msp] DeserializeIdentity -> DEBU 16dd Obtaining identity" +"2019-05-02 09:27:36.291 UTC [msp] DeserializeIdentity -> DEBU 16de Obtaining identity" +"2019-05-02 09:27:36.291 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:36.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16e0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.291 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16e1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.291 UTC [policies] Evaluate -> DEBU 16e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:36.291 UTC [policies] Evaluate -> DEBU 16e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:36.291 UTC [policies] Evaluate -> DEBU 16e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:36.291 UTC [cauthdsl] func1 -> DEBU 16e5 0xc00312c4c0 gate 1556789256291919500 evaluation starts" +"2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e6 0xc00312c4c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e7 0xc00312c4c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e8 0xc00312c4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16e9 0xc00312c4c0 principal evaluation fails" +"2019-05-02 09:27:36.292 UTC [cauthdsl] func1 -> DEBU 16ea 0xc00312c4c0 gate 1556789256291919500 evaluation fails" +"2019-05-02 09:27:36.292 UTC [policies] Evaluate -> DEBU 16eb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.292 UTC [policies] Evaluate -> DEBU 16ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.292 UTC [policies] Evaluate -> DEBU 16ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:36.292 UTC [cauthdsl] func1 -> DEBU 16ee 0xc00312cd00 gate 1556789256292456700 evaluation starts" +"2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16ef 0xc00312cd00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16f0 0xc00312cd00 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16f1 0xc00312cd00 principal matched by identity 0" +"2019-05-02 09:27:36.292 UTC [msp.identity] Verify -> DEBU 16f2 Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +"2019-05-02 09:27:36.292 UTC [msp.identity] Verify -> DEBU 16f3 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +00000040 48 a9 46 d7 ba f7 |H.F...|" +"2019-05-02 09:27:36.292 UTC [cauthdsl] func2 -> DEBU 16f4 0xc00312cd00 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:36.293 UTC [cauthdsl] func1 -> DEBU 16f5 0xc00312cd00 gate 1556789256292456700 evaluation succeeds" +"2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f8 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:36.293 UTC [msp] DeserializeIdentity -> DEBU 16fa Obtaining identity" +"2019-05-02 09:27:36.293 UTC [msp] DeserializeIdentity -> DEBU 16fb Obtaining identity" +"2019-05-02 09:27:36.293 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:36.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16fd Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16fe Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 16ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 1700 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:36.293 UTC [policies] Evaluate -> DEBU 1701 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:36.293 UTC [cauthdsl] func1 -> DEBU 1702 0xc0034e24d0 gate 1556789256293934400 evaluation starts" +"2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1703 0xc0034e24d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1704 0xc0034e24d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1705 0xc0034e24d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1706 0xc0034e24d0 principal evaluation fails" +"2019-05-02 09:27:36.294 UTC [cauthdsl] func1 -> DEBU 1707 0xc0034e24d0 gate 1556789256293934400 evaluation fails" +"2019-05-02 09:27:36.294 UTC [policies] Evaluate -> DEBU 1708 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.294 UTC [policies] Evaluate -> DEBU 1709 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.294 UTC [policies] Evaluate -> DEBU 170a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:36.294 UTC [cauthdsl] func1 -> DEBU 170b 0xc0034e2d10 gate 1556789256294459000 evaluation starts" +"2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 170c 0xc0034e2d10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 170d 0xc0034e2d10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 170e 0xc0034e2d10 principal matched by identity 0" +"2019-05-02 09:27:36.294 UTC [msp.identity] Verify -> DEBU 170f Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +"2019-05-02 09:27:36.294 UTC [msp.identity] Verify -> DEBU 1710 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +00000040 dc 87 d7 13 63 c7 |....c.|" +"2019-05-02 09:27:36.294 UTC [cauthdsl] func2 -> DEBU 1711 0xc0034e2d10 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:36.295 UTC [cauthdsl] func1 -> DEBU 1712 0xc0034e2d10 gate 1556789256294459000 evaluation succeeds" +"2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1713 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1714 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1715 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:36.295 UTC [policies] Evaluate -> DEBU 1716 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 1717 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..| +00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|" +"2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 1718 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v| +00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E| +00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p| +00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.| +00000040 68 f9 f0 83 f9 50 9b |h....P.|" +"2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 1719 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +"2019-05-02 09:27:36.295 UTC [msp.identity] Verify -> DEBU 171a Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +00000040 57 6e 93 b1 86 0c |Wn....|" +"2019-05-02 09:27:36.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 171b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 171c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 171d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 171e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 171f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:36.296 UTC [cauthdsl] func1 -> DEBU 1720 0xc0020fab30 gate 1556789256296272400 evaluation starts" +"2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1721 0xc0020fab30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1722 0xc0020fab30 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1723 0xc0020fab30 principal matched by identity 0" +"2019-05-02 09:27:36.296 UTC [msp.identity] Verify -> DEBU 1724 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +"2019-05-02 09:27:36.296 UTC [msp.identity] Verify -> DEBU 1725 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +00000040 57 6e 93 b1 86 0c |Wn....|" +"2019-05-02 09:27:36.296 UTC [cauthdsl] func2 -> DEBU 1726 0xc0020fab30 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:36.296 UTC [cauthdsl] func1 -> DEBU 1727 0xc0020fab30 gate 1556789256296272400 evaluation succeeds" +"2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 1728 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.291 UTC [gossip.comm] sendToEndpoint -> DEBU 16dc Exiting" +"2019-05-02 09:27:36.298 UTC [msp] DeserializeIdentity -> DEBU 1729 Obtaining identity" +"2019-05-02 09:27:36.298 UTC [msp] DeserializeIdentity -> DEBU 172a Obtaining identity" +"2019-05-02 09:27:36.299 UTC [gossip.comm] Send -> DEBU 172b Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +"2019-05-02 09:27:36.300 UTC [msp] DeserializeIdentity -> DEBU 172c Obtaining identity" +"2019-05-02 09:27:36.301 UTC [msp] DeserializeIdentity -> DEBU 1731 Obtaining identity" +"2019-05-02 09:27:36.296 UTC [policies] Evaluate -> DEBU 172d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.300 UTC [gossip.comm] sendToEndpoint -> DEBU 172f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:36.300 UTC [gossip.comm] sendToEndpoint -> DEBU 172e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:36.301 UTC [gossip.comm] sendToEndpoint -> DEBU 1730 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789252596760400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:36.301 UTC [policies] Evaluate -> DEBU 1732 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:36.302 UTC [policies] Evaluate -> DEBU 1736 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:36.302 UTC [gossip.gossip] handleMessage -> DEBU 1737 Exiting" +"2019-05-02 09:27:36.303 UTC [gossip.gossip] handleMessage -> DEBU 1738 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.303 UTC [msp] DeserializeIdentity -> DEBU 1739 Obtaining identity" +"2019-05-02 09:27:36.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1734 Exiting" +"2019-05-02 09:27:36.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1735 Exiting" +"2019-05-02 09:27:36.303 UTC [msp] DeserializeIdentity -> DEBU 173a Obtaining identity" +"2019-05-02 09:27:36.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 173b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:36.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 173c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 173d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.304 UTC [policies] Evaluate -> DEBU 173e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:36.304 UTC [policies] Evaluate -> DEBU 173f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:36.304 UTC [policies] Evaluate -> DEBU 1740 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:36.305 UTC [cauthdsl] func1 -> DEBU 1741 0xc0023023d0 gate 1556789256305011400 evaluation starts" +"2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1742 0xc0023023d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1743 0xc0023023d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1744 0xc0023023d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:36.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1733 Exiting" +"2019-05-02 09:27:36.305 UTC [cauthdsl] func2 -> DEBU 1745 0xc0023023d0 principal evaluation fails" +"2019-05-02 09:27:36.308 UTC [cauthdsl] func1 -> DEBU 1746 0xc0023023d0 gate 1556789256305011400 evaluation fails" +"2019-05-02 09:27:36.308 UTC [policies] Evaluate -> DEBU 1747 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.309 UTC [policies] Evaluate -> DEBU 1748 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.309 UTC [policies] Evaluate -> DEBU 1749 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:36.309 UTC [cauthdsl] func1 -> DEBU 174a 0xc002302c10 gate 1556789256309947000 evaluation starts" +"2019-05-02 09:27:36.310 UTC [cauthdsl] func2 -> DEBU 174b 0xc002302c10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.310 UTC [cauthdsl] func2 -> DEBU 174c 0xc002302c10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.311 UTC [cauthdsl] func2 -> DEBU 174d 0xc002302c10 principal matched by identity 0" +"2019-05-02 09:27:36.311 UTC [msp.identity] Verify -> DEBU 174e Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +"2019-05-02 09:27:36.312 UTC [msp.identity] Verify -> DEBU 174f Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +00000040 dc 87 d7 13 63 c7 |....c.|" +"2019-05-02 09:27:36.312 UTC [cauthdsl] func2 -> DEBU 1750 0xc002302c10 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:36.312 UTC [cauthdsl] func1 -> DEBU 1751 0xc002302c10 gate 1556789256309947000 evaluation succeeds" +"2019-05-02 09:27:36.313 UTC [policies] Evaluate -> DEBU 1752 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.313 UTC [policies] Evaluate -> DEBU 1753 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.313 UTC [policies] Evaluate -> DEBU 1754 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:36.314 UTC [policies] Evaluate -> DEBU 1755 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:36.314 UTC [msp.identity] Verify -> DEBU 1756 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..| +00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|" +"2019-05-02 09:27:36.314 UTC [msp.identity] Verify -> DEBU 1757 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v| +00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E| +00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p| +00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.| +00000040 68 f9 f0 83 f9 50 9b |h....P.|" +"2019-05-02 09:27:36.315 UTC [msp.identity] Verify -> DEBU 1758 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +"2019-05-02 09:27:36.315 UTC [msp.identity] Verify -> DEBU 1759 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +00000040 57 6e 93 b1 86 0c |Wn....|" +"2019-05-02 09:27:36.316 UTC [msp] DeserializeIdentity -> DEBU 175a Obtaining identity" +"2019-05-02 09:27:36.316 UTC [msp] DeserializeIdentity -> DEBU 175b Obtaining identity" +"2019-05-02 09:27:36.317 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 175c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:36.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 175d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 175e Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.318 UTC [policies] Evaluate -> DEBU 175f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:36.318 UTC [policies] Evaluate -> DEBU 1760 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:36.318 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:36.319 UTC [cauthdsl] func1 -> DEBU 1762 0xc002319220 gate 1556789256319227300 evaluation starts" +"2019-05-02 09:27:36.319 UTC [cauthdsl] func2 -> DEBU 1763 0xc002319220 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.319 UTC [cauthdsl] func2 -> DEBU 1764 0xc002319220 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 1765 0xc002319220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 1766 0xc002319220 principal evaluation fails" +"2019-05-02 09:27:36.320 UTC [cauthdsl] func1 -> DEBU 1767 0xc002319220 gate 1556789256319227300 evaluation fails" +"2019-05-02 09:27:36.320 UTC [policies] Evaluate -> DEBU 1768 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.320 UTC [policies] Evaluate -> DEBU 1769 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.320 UTC [policies] Evaluate -> DEBU 176a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:36.320 UTC [cauthdsl] func1 -> DEBU 176b 0xc002319a60 gate 1556789256320657400 evaluation starts" +"2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 176c 0xc002319a60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 176d 0xc002319a60 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.320 UTC [cauthdsl] func2 -> DEBU 176e 0xc002319a60 principal matched by identity 0" +"2019-05-02 09:27:36.320 UTC [msp.identity] Verify -> DEBU 176f Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +"2019-05-02 09:27:36.320 UTC [msp.identity] Verify -> DEBU 1770 Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +00000040 48 a9 46 d7 ba f7 |H.F...|" +"2019-05-02 09:27:36.321 UTC [cauthdsl] func2 -> DEBU 1771 0xc002319a60 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:36.321 UTC [cauthdsl] func1 -> DEBU 1772 0xc002319a60 gate 1556789256320657400 evaluation succeeds" +"2019-05-02 09:27:36.321 UTC [policies] Evaluate -> DEBU 1773 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.321 UTC [policies] Evaluate -> DEBU 1774 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.321 UTC [policies] Evaluate -> DEBU 1775 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:36.322 UTC [policies] Evaluate -> DEBU 1776 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:36.323 UTC [gossip.gossip] handleMessage -> DEBU 1777 Exiting" +"2019-05-02 09:27:36.323 UTC [gossip.gossip] handleMessage -> DEBU 1778 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.324 UTC [msp] DeserializeIdentity -> DEBU 1779 Obtaining identity" +"2019-05-02 09:27:36.324 UTC [msp] DeserializeIdentity -> DEBU 177a Obtaining identity" +"2019-05-02 09:27:36.324 UTC [msp] DeserializeIdentity -> DEBU 177b Obtaining identity" +"2019-05-02 09:27:36.325 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 177c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:36.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 177d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 177e Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.325 UTC [policies] Evaluate -> DEBU 177f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:36.326 UTC [policies] Evaluate -> DEBU 1780 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:36.326 UTC [policies] Evaluate -> DEBU 1781 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:36.326 UTC [cauthdsl] func1 -> DEBU 1782 0xc002399570 gate 1556789256326307000 evaluation starts" +"2019-05-02 09:27:36.326 UTC [cauthdsl] func2 -> DEBU 1783 0xc002399570 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.326 UTC [cauthdsl] func2 -> DEBU 1784 0xc002399570 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 1785 0xc002399570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 1786 0xc002399570 principal evaluation fails" +"2019-05-02 09:27:36.327 UTC [cauthdsl] func1 -> DEBU 1787 0xc002399570 gate 1556789256326307000 evaluation fails" +"2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1788 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1789 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 178a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:36.327 UTC [cauthdsl] func1 -> DEBU 178b 0xc002399db0 gate 1556789256327282300 evaluation starts" +"2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 178c 0xc002399db0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 178d 0xc002399db0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 178e 0xc002399db0 principal matched by identity 0" +"2019-05-02 09:27:36.327 UTC [msp.identity] Verify -> DEBU 178f Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +"2019-05-02 09:27:36.327 UTC [msp.identity] Verify -> DEBU 1790 Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +00000040 dc 87 d7 13 63 c7 |....c.|" +"2019-05-02 09:27:36.327 UTC [cauthdsl] func2 -> DEBU 1791 0xc002399db0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:36.327 UTC [cauthdsl] func1 -> DEBU 1792 0xc002399db0 gate 1556789256327282300 evaluation succeeds" +"2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1793 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1794 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1795 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:36.327 UTC [policies] Evaluate -> DEBU 1796 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:36.327 UTC [msp.identity] Verify -> DEBU 1797 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..| +00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|" +"2019-05-02 09:27:36.328 UTC [msp.identity] Verify -> DEBU 1798 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v| +00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E| +00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p| +00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.| +00000040 68 f9 f0 83 f9 50 9b |h....P.|" +"2019-05-02 09:27:36.328 UTC [msp] DeserializeIdentity -> DEBU 1799 Obtaining identity" +"2019-05-02 09:27:36.328 UTC [msp] DeserializeIdentity -> DEBU 179a Obtaining identity" +"2019-05-02 09:27:36.328 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 179b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:36.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 179c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 179d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.328 UTC [policies] Evaluate -> DEBU 179e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:36.328 UTC [policies] Evaluate -> DEBU 179f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:36.328 UTC [policies] Evaluate -> DEBU 17a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:36.330 UTC [cauthdsl] func1 -> DEBU 17a1 0xc0023ddca0 gate 1556789256330252300 evaluation starts" +"2019-05-02 09:27:36.330 UTC [cauthdsl] func2 -> DEBU 17a2 0xc0023ddca0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.331 UTC [cauthdsl] func2 -> DEBU 17a3 0xc0023ddca0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.331 UTC [cauthdsl] func2 -> DEBU 17a4 0xc0023ddca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:36.332 UTC [cauthdsl] func2 -> DEBU 17a5 0xc0023ddca0 principal evaluation fails" +"2019-05-02 09:27:36.332 UTC [cauthdsl] func1 -> DEBU 17a6 0xc0023ddca0 gate 1556789256330252300 evaluation fails" +"2019-05-02 09:27:36.332 UTC [policies] Evaluate -> DEBU 17a7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.333 UTC [policies] Evaluate -> DEBU 17a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.333 UTC [policies] Evaluate -> DEBU 17a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:36.334 UTC [cauthdsl] func1 -> DEBU 17aa 0xc0024364e0 gate 1556789256333837100 evaluation starts" +"2019-05-02 09:27:36.334 UTC [cauthdsl] func2 -> DEBU 17ab 0xc0024364e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.334 UTC [cauthdsl] func2 -> DEBU 17ac 0xc0024364e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.335 UTC [cauthdsl] func2 -> DEBU 17ad 0xc0024364e0 principal matched by identity 0" +"2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17ae Verify: digest = 00000000 17 1d bb 19 e2 c7 82 0a bc 2d 84 aa be a0 4d d8 |.........-....M.| +00000010 99 b2 0e 07 91 d0 ea d6 95 ed 83 bd 9e cb 65 49 |..............eI|" +"2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17af Verify: sig = 00000000 30 44 02 20 45 8e 1d 14 65 08 5f cf 8a 9f 8c 38 |0D. E...e._....8| +00000010 5b 3e 57 ed ca 79 e9 91 8d 3d e3 da 2a f3 7f 0e |[>W..y...=..*...| +00000020 c4 43 90 98 02 20 16 0f 8c a6 35 2f 1f 02 28 d3 |.C... ....5/..(.| +00000030 63 90 a5 c1 d6 a8 76 27 cb a8 27 c9 8c ce ea 10 |c.....v'..'.....| +00000040 48 a9 46 d7 ba f7 |H.F...|" +"2019-05-02 09:27:36.335 UTC [cauthdsl] func2 -> DEBU 17b0 0xc0024364e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:36.335 UTC [cauthdsl] func1 -> DEBU 17b1 0xc0024364e0 gate 1556789256333837100 evaluation succeeds" +"2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b4 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:36.335 UTC [policies] Evaluate -> DEBU 17b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17b6 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +"2019-05-02 09:27:36.335 UTC [msp.identity] Verify -> DEBU 17b7 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +00000040 57 6e 93 b1 86 0c |Wn....|" +"2019-05-02 09:27:36.336 UTC [gossip.gossip] handleMessage -> DEBU 17b8 Exiting" +"2019-05-02 09:27:36.543 UTC [gossip.gossip] handleMessage -> DEBU 17b9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.543 UTC [msp] DeserializeIdentity -> DEBU 17ba Obtaining identity" +"2019-05-02 09:27:36.543 UTC [msp] DeserializeIdentity -> DEBU 17bb Obtaining identity" +"2019-05-02 09:27:36.543 UTC [gossip.gossip] handleMessage -> DEBU 17bc Exiting" +"2019-05-02 09:27:36.554 UTC [gossip.gossip] handleMessage -> DEBU 17bd Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789252680836200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:36.555 UTC [msp.identity] Verify -> DEBU 17be Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +"2019-05-02 09:27:36.555 UTC [msp.identity] Verify -> DEBU 17bf Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +00000040 57 6e 93 b1 86 0c |Wn....|" +"2019-05-02 09:27:36.556 UTC [gossip.gossip] handleMessage -> DEBU 17c0 Exiting" +"2019-05-02 09:27:36.576 UTC [gossip.gossip] handleMessage -> DEBU 17c1 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.577 UTC [gossip.pull] HandleMessage -> DEBU 17c2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.577 UTC [gossip.pull] SendDigest -> DEBU 17c3 Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:36.577 UTC [gossip.gossip] handleMessage -> DEBU 17c4 Exiting" +"2019-05-02 09:27:36.788 UTC [gossip.gossip] handleMessage -> DEBU 17c5 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.788 UTC [msp] DeserializeIdentity -> DEBU 17c6 Obtaining identity" +"2019-05-02 09:27:36.788 UTC [msp] DeserializeIdentity -> DEBU 17c7 Obtaining identity" +"2019-05-02 09:27:36.788 UTC [msp] DeserializeIdentity -> DEBU 17c8 Obtaining identity" +"2019-05-02 09:27:36.788 UTC [gossip.gossip] handleMessage -> DEBU 17c9 Exiting" +"2019-05-02 09:27:36.820 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 17ca Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.820 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 17cb Got block validation policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.820 UTC [policies] Evaluate -> DEBU 17cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-05-02 09:27:36.820 UTC [policies] Evaluate -> DEBU 17cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:36.820 UTC [policies] Evaluate -> DEBU 17ce == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:36.821 UTC [cauthdsl] func1 -> DEBU 17cf 0xc0035cb1e0 gate 1556789256821036100 evaluation starts" +"2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d0 0xc0035cb1e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d1 0xc0035cb1e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d2 0xc0035cb1e0 principal matched by identity 0" +"2019-05-02 09:27:36.821 UTC [msp.identity] Verify -> DEBU 17d3 Verify: digest = 00000000 1b 69 39 fb e0 70 73 f1 5b e0 96 30 08 b2 8d 0e |.i9..ps.[..0....| +00000010 59 cb 9c d4 09 22 a8 98 cc 9b 80 40 78 30 5d 43 |Y....".....@x0]C|" +"2019-05-02 09:27:36.821 UTC [msp.identity] Verify -> DEBU 17d4 Verify: sig = 00000000 30 45 02 21 00 be 35 cb e4 db 2e 15 46 6b c8 12 |0E.!..5.....Fk..| +00000010 05 38 7c a4 fe 7c f8 24 de e6 20 f5 96 a7 a6 60 |.8|..|.$.. ....`| +00000020 2e 80 d2 03 34 02 20 19 43 c1 a8 6a bc 19 32 8a |....4. .C..j..2.| +00000030 6b fe a8 41 71 43 cd 2b 8a e9 d4 42 36 01 cc 76 |k..AqC.+...B6..v| +00000040 7b 80 5a a9 96 13 2c |{.Z...,|" +"2019-05-02 09:27:36.821 UTC [cauthdsl] func2 -> DEBU 17d5 0xc0035cb1e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:36.822 UTC [cauthdsl] func1 -> DEBU 17d6 0xc0035cb1e0 gate 1556789256821036100 evaluation succeeds" +"2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17d7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17d9 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:36.822 UTC [policies] Evaluate -> DEBU 17da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:36.822 UTC [blocksProvider] DeliverBlocks -> DEBU 17db [businesschannel] Adding payload to local buffer, blockNum = [5]" +"2019-05-02 09:27:36.822 UTC [gossip.state] addPayload -> DEBU 17dc [businesschannel] Adding payload to local buffer, blockNum = [5]" +"2019-05-02 09:27:36.822 UTC [gossip.state] addPayload -> DEBU 17dd Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-05-02 09:27:36.822 UTC [blocksProvider] DeliverBlocks -> DEBU 17de [businesschannel] Gossiping block [5], peers number [3]" +"2019-05-02 09:27:36.822 UTC [gossip.channel] AddToMsgStore -> DEBU 17df Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5724 bytes, seq: 5}, Envelope: 5754 bytes, Signature: 0 bytes to the block puller" +"2019-05-02 09:27:36.822 UTC [gossip.pull] Add -> DEBU 17e0 Added 5, total items: 5" +"2019-05-02 09:27:36.823 UTC [gossip.state] deliverPayloads -> DEBU 17e1 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" +"2019-05-02 09:27:36.823 UTC [gossip.state] deliverPayloads -> DEBU 17e2 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" +"2019-05-02 09:27:36.823 UTC [gossip.privdata] StoreBlock -> INFO 17e3 [businesschannel] Received block [5] from buffer" +"2019-05-02 09:27:36.823 UTC [gossip.privdata] StoreBlock -> DEBU 17e4 [businesschannel] Validating block [5]" +"2019-05-02 09:27:36.823 UTC [committer.txvalidator] Validate -> DEBU 17e5 [businesschannel] START Block Validation for block [5]" +"2019-05-02 09:27:36.823 UTC [committer.txvalidator] Validate -> DEBU 17e6 expecting 1 block validation responses" +"2019-05-02 09:27:36.823 UTC [committer.txvalidator] validateTx -> DEBU 17e7 [businesschannel] validateTx starts for block 0xc0033afec0 env 0xc003709f90 txn 0" +"2019-05-02 09:27:36.823 UTC [protoutils] ValidateTransaction -> DEBU 17e8 ValidateTransactionEnvelope starts for envelope 0xc003709f90" +"2019-05-02 09:27:36.823 UTC [protoutils] ValidateTransaction -> DEBU 17e9 Header is channel_header:"\010\003\032\014\010\206\360\252\346\005\020\350\313\321\304\001\"\017businesschannel*@f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\236'#\204\334o\257\315\240#)kB\\\\\345Y\331\372\203~\003\200\322" " +"2019-05-02 09:27:36.824 UTC [protoutils] validateChannelHeader -> DEBU 17ea validateChannelHeader info: header type 3" +"2019-05-02 09:27:36.824 UTC [protoutils] checkSignatureFromCreator -> DEBU 17eb begin" +"2019-05-02 09:27:36.824 UTC [msp] GetManagerForChain -> DEBU 17ec Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:36.824 UTC [protoutils] checkSignatureFromCreator -> DEBU 17ed creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:36.824 UTC [protoutils] checkSignatureFromCreator -> DEBU 17ee creator is valid" +"2019-05-02 09:27:36.824 UTC [msp.identity] Verify -> DEBU 17ef Verify: digest = 00000000 e1 bc 9e ea 26 2e 53 22 7f 18 0b b0 a0 87 2f b7 |....&.S"....../.| +00000010 7d d4 55 a3 5c 3e 56 1a 13 08 07 eb 68 19 cc 23 |}.U.\>V.....h..#|" +"2019-05-02 09:27:36.824 UTC [msp.identity] Verify -> DEBU 17f0 Verify: sig = 00000000 30 44 02 20 5f 33 fb e6 a2 75 d0 8e db 9b 31 61 |0D. _3...u....1a| +00000010 af 03 73 4c 80 1b 5e 9a de a3 10 4c eb 80 6a 29 |..sL..^....L..j)| +00000020 90 1a 05 86 02 20 6c 70 70 d5 9b d0 9c 08 df ab |..... lpp.......| +00000030 8f fb 97 db 2e 62 f8 57 e7 41 2c 2e a6 81 56 32 |.....b.W.A,...V2| +00000040 e6 e4 37 e8 a5 f7 |..7...|" +"2019-05-02 09:27:36.825 UTC [protoutils] checkSignatureFromCreator -> DEBU 17f1 exits successfully" +"2019-05-02 09:27:36.825 UTC [protoutils] validateEndorserTransaction -> DEBU 17f2 validateEndorserTransaction starts for data 0xc0035d5000, header channel_header:"\010\003\032\014\010\206\360\252\346\005\020\350\313\321\304\001\"\017businesschannel*@f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\236'#\204\334o\257\315\240#)kB\\\\\345Y\331\372\203~\003\200\322" " +"2019-05-02 09:27:36.825 UTC [protoutils] validateEndorserTransaction -> DEBU 17f3 validateEndorserTransaction info: there are 1 actions" +"2019-05-02 09:27:36.825 UTC [protoutils] validateEndorserTransaction -> DEBU 17f4 validateEndorserTransaction info: signature header is valid" +"2019-05-02 09:27:36.825 UTC [protoutils] ValidateTransaction -> DEBU 17f5 ValidateTransactionEnvelope returns err %!s()" +"2019-05-02 09:27:36.825 UTC [committer.txvalidator] validateTx -> DEBU 17f6 Transaction is for channel businesschannel" +"2019-05-02 09:27:36.825 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 17f7 retrieveTransactionByID() - txId = [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1]" +"2019-05-02 09:27:36.825 UTC [committer.txvalidator] validateTx -> DEBU 17f8 Validating transaction with plugins" +"2019-05-02 09:27:36.825 UTC [committer.txvalidator] Dispatch -> DEBU 17f9 [businesschannel] Dispatch starts for bytes 0xc0035d7300" +"2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 17fa constructing new query executor txid = [c1fca0ee-90d2-4a85-b1f6-f4279e627420]" +"2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] Done -> DEBU 17fb Done with transaction simulation / query execution [c1fca0ee-90d2-4a85-b1f6-f4279e627420]" +"2019-05-02 09:27:36.825 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 17fc Validating Tx f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" +"2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 17fd constructing new query executor txid = [46d5b075-b956-4fa0-bab6-93512eab1493]" +"2019-05-02 09:27:36.825 UTC [lockbasedtxmgr] Done -> DEBU 17fe Done with transaction simulation / query execution [46d5b075-b956-4fa0-bab6-93512eab1493]" +"2019-05-02 09:27:36.826 UTC [policies] Evaluate -> DEBU 17ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement ==" +"2019-05-02 09:27:36.826 UTC [policies] Evaluate -> DEBU 1800 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:36.826 UTC [policies] Evaluate -> DEBU 1801 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" +"2019-05-02 09:27:36.826 UTC [cauthdsl] func1 -> DEBU 1802 0xc00276a1a0 gate 1556789256826232100 evaluation starts" +"2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1803 0xc00276a1a0 signed by 0 principal evaluation starts (used [false false])" +"2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1804 0xc00276a1a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1805 0xc00276a1a0 principal matched by identity 0" +"2019-05-02 09:27:36.826 UTC [msp.identity] Verify -> DEBU 1806 Verify: digest = 00000000 64 e4 b5 31 8b fe 55 90 73 8a 94 89 ae ec f0 b0 |d..1..U.s.......| +00000010 8e de 71 f5 92 07 1b e9 75 06 92 71 fb 06 87 e1 |..q.....u..q....|" +"2019-05-02 09:27:36.826 UTC [msp.identity] Verify -> DEBU 1807 Verify: sig = 00000000 30 44 02 20 6e fd 30 46 b1 7d 4d d2 77 78 2c 7e |0D. n.0F.}M.wx,~| +00000010 ce 44 f3 a7 bb 07 35 51 a9 a6 95 ff db 45 e3 57 |.D....5Q.....E.W| +00000020 e0 d1 d2 59 02 20 4e b0 9f 48 c7 10 e7 38 92 e5 |...Y. N..H...8..| +00000030 76 4c ba e6 cd e1 b0 5d 91 7b c7 92 60 c9 30 44 |vL.....].{..`.0D| +00000040 83 6d 43 57 30 df |.mCW0.|" +"2019-05-02 09:27:36.826 UTC [cauthdsl] func2 -> DEBU 1808 0xc00276a1a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:36.827 UTC [cauthdsl] func1 -> DEBU 1809 0xc00276a1a0 gate 1556789256826232100 evaluation succeeds" +"2019-05-02 09:27:36.827 UTC [policies] Evaluate -> DEBU 180a Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:36.827 UTC [policies] Evaluate -> DEBU 180b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:27:36.827 UTC [policies] Evaluate -> DEBU 180c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" +"2019-05-02 09:27:36.827 UTC [cauthdsl] func1 -> DEBU 180d 0xc00276ade0 gate 1556789256827589900 evaluation starts" +"2019-05-02 09:27:36.827 UTC [cauthdsl] func2 -> DEBU 180e 0xc00276ade0 signed by 0 principal evaluation starts (used [false false])" +"2019-05-02 09:27:36.827 UTC [cauthdsl] func2 -> DEBU 180f 0xc00276ade0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.828 UTC [cauthdsl] func2 -> DEBU 1810 0xc00276ade0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-05-02 09:27:36.828 UTC [cauthdsl] func2 -> DEBU 1811 0xc00276ade0 processing identity 1 with bytes of 10fffc0" +"2019-05-02 09:27:36.828 UTC [cauthdsl] func2 -> DEBU 1812 0xc00276ade0 principal matched by identity 1" +"2019-05-02 09:27:36.828 UTC [msp.identity] Verify -> DEBU 1813 Verify: digest = 00000000 63 0f 94 61 5c cf 70 eb ab 79 52 8b 39 ce b3 ea |c..a\.p..yR.9...| +00000010 87 1c 67 50 e8 02 a2 a3 64 4b 7e 76 a8 57 ea f9 |..gP....dK~v.W..|" +"2019-05-02 09:27:36.828 UTC [msp.identity] Verify -> DEBU 1814 Verify: sig = 00000000 30 44 02 20 49 e8 bd 2a 99 34 6e 1a 70 a1 4d 63 |0D. I..*.4n.p.Mc| +00000010 71 7c f3 48 dd c9 09 c7 7a a6 c8 30 80 7e 26 e2 |q|.H....z..0.~&.| +00000020 d2 ef 2a 9a 02 20 21 0c 81 fa a1 82 1d 69 6e cf |..*.. !......in.| +00000030 63 6e a0 4c b3 13 14 12 1c bf 7c 5f 63 1e 38 ac |cn.L......|_c.8.| +00000040 cb 55 b5 4e 37 eb |.U.N7.|" +"2019-05-02 09:27:36.829 UTC [cauthdsl] func2 -> DEBU 1815 0xc00276ade0 principal evaluation succeeds for identity 1" +"2019-05-02 09:27:36.829 UTC [cauthdsl] func1 -> DEBU 1816 0xc00276ade0 gate 1556789256827589900 evaluation succeeds" +"2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 1817 Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 1818 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 1819 Signature set satisfies policy /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:36.829 UTC [policies] Evaluate -> DEBU 181a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:27:36.829 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 181b constructing new query executor txid = [8a948209-c29a-46fa-8cbb-4f01770a2ddb]" +"2019-05-02 09:27:36.829 UTC [lockbasedtxmgr] Done -> DEBU 181c Done with transaction simulation / query execution [8a948209-c29a-46fa-8cbb-4f01770a2ddb]" +"2019-05-02 09:27:36.830 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 181d constructing new query executor txid = [bf4839c9-b45c-4566-91e3-00afba3760eb]" +"2019-05-02 09:27:36.830 UTC [lockbasedtxmgr] Done -> DEBU 181e Done with transaction simulation / query execution [bf4839c9-b45c-4566-91e3-00afba3760eb]" +"2019-05-02 09:27:36.830 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity" +"2019-05-02 09:27:36.830 UTC [msp] DeserializeIdentity -> DEBU 1820 Obtaining identity" +"2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1821 Obtaining identity" +"2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1822 Obtaining identity" +"2019-05-02 09:27:36.831 UTC [gossip.comm] Send -> DEBU 1823 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5724 bytes, seq: 5}, Envelope: 5754 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1824 Obtaining identity" +"2019-05-02 09:27:36.831 UTC [msp] DeserializeIdentity -> DEBU 1825 Obtaining identity" +"2019-05-02 09:27:36.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1826 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5724 bytes, seq: 5}, Envelope: 5754 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1827 Exiting" +"2019-05-02 09:27:36.830 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1828 constructing new query executor txid = [69339387-8be9-4cd8-a4bd-d90910597306]" +"2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] Done -> DEBU 1829 Done with transaction simulation / query execution [69339387-8be9-4cd8-a4bd-d90910597306]" +"2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 182a constructing new query executor txid = [61ed8755-2925-49e1-90c1-3ea340992ac9]" +"2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] Done -> DEBU 182b Done with transaction simulation / query execution [61ed8755-2925-49e1-90c1-3ea340992ac9]" +"2019-05-02 09:27:36.832 UTC [vscc] Validate -> DEBU 182c block 5, namespace: _lifecycle, tx 0 validation results is: " +"2019-05-02 09:27:36.832 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 182d Transaction f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1 appears to be valid" +"2019-05-02 09:27:36.832 UTC [committer.txvalidator] Dispatch -> DEBU 182e [businesschannel] Dispatch completes env bytes 0xc0035d7300" +"2019-05-02 09:27:36.832 UTC [committer.txvalidator] validateTx -> DEBU 182f [businesschannel] validateTx completes for block 0xc0033afec0 env 0xc003709f90 txn 0" +"2019-05-02 09:27:36.832 UTC [committer.txvalidator] Validate -> DEBU 1830 got result for idx 0, code 0" +"2019-05-02 09:27:36.832 UTC [committer.txvalidator] Validate -> INFO 1831 [businesschannel] Validated block [5] in 9ms" +"2019-05-02 09:27:36.832 UTC [gossip.privdata] containsWrites -> DEBU 1832 HashedRWSet of tx f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, namespace _lifecycle, collection _implicit_org_Org1MSP doesn't contain writes" +"2019-05-02 09:27:36.832 UTC [gossip.privdata] containsWrites -> DEBU 1833 HashedRWSet of tx f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1, namespace _lifecycle, collection _implicit_org_Org2MSP doesn't contain writes" +"2019-05-02 09:27:36.832 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1834 Retrieving private write sets for 0 transactions from transient store" +"2019-05-02 09:27:36.832 UTC [gossip.privdata] StoreBlock -> DEBU 1835 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-05-02 09:27:36.832 UTC [kvledger] CommitWithPvtData -> DEBU 1836 [businesschannel] Validating state for block [5]" +"2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1837 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1838 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-05-02 09:27:36.832 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1839 Validating new block with num trans = [1]" +"2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 183a ValidateAndPrepareBatch() for block number = [5]" +"2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 183b preprocessing ProtoBlock..." +"2019-05-02 09:27:36.833 UTC [valimpl] preprocessProtoBlock -> DEBU 183c txType=ENDORSER_TRANSACTION" +"2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 183d GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:36.833 UTC [statebasedval] validateKVRead -> DEBU 183e Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 183f GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-05-02 09:27:36.833 UTC [statebasedval] validateKVRead -> DEBU 1840 Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1841 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1842 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1843 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1844 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1845 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1846 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-05-02 09:27:36.833 UTC [stateleveldb] GetState -> DEBU 1847 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 1848 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-05-02 09:27:36.833 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1849 Block [5] Transaction index [0] TxId [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-05-02 09:27:36.833 UTC [valinternal] ApplyWriteSet -> DEBU 184a txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Collections"}:(*internal.keyOps)(0xc003503a40), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/EndorsementInfo"}:(*internal.keyOps)(0xc003503a80), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Sequence"}:(*internal.keyOps)(0xc003503ac0), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/ValidationInfo"}:(*internal.keyOps)(0xc003503b40), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/metadata/exp02"}:(*internal.keyOps)(0xc003503b80)}" +"2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 184b validating rwset..." +"2019-05-02 09:27:36.833 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 184c postprocessing ProtoBlock..." +"2019-05-02 09:27:36.834 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 184d ValidateAndPrepareBatch() complete" +"2019-05-02 09:27:36.834 UTC [lifecycle] update -> INFO 184e Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +"2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 184f GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1850 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1851 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1852 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1853 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +"2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 1854 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=� ��=�Y\��}�J=�M#d� ���Ժ�" +"2019-05-02 09:27:36.834 UTC [lifecycle] update -> INFO 1855 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +"2019-05-02 09:27:36.834 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1856 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[exp02:0xc00326b290] map[4SNrˤ��s�p����oy��&��t��ZM4:exp02 ����>{"+���#b� ��T�H��Won�:exp02 � ��=�Y\��}�J=�M#d� ���Ժ�:exp02 ���R���l� DEBU 1857 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc003262f00), (*kvrwset.KVWrite)(0xc003262f50), (*kvrwset.KVWrite)(0xc003262fa0), (*kvrwset.KVWrite)(0xc003262ff0), (*kvrwset.KVWrite)(0xc003263040)}}" +"2019-05-02 09:27:36.834 UTC [cceventmgmt] HandleStateUpdates -> INFO 1858 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +"2019-05-02 09:27:36.834 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 1859 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}]]" +"2019-05-02 09:27:36.834 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 185a Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +"2019-05-02 09:27:36.834 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 185b Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +"2019-05-02 09:27:36.834 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 185c Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0})}" +"2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 185d GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-05-02 09:27:36.834 UTC [stateleveldb] GetState -> DEBU 185e GetState(). ns=lscc, key=exp02" +"2019-05-02 09:27:36.834 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 185f Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 184 141 138 176 125 192 58 83 1 250 26 202 161 54 104 45 229 195 166 43 96 100 9 159 109 154 254 234 147 189 33 229 2 32 120 2 28 36 139 185 5 29 110 69 153 220 53 183 5 154 146 86 140 197 1 134 231 194 84 112 80 242 124 44 67 58]} 0x153fd30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002604a00 0xc002598700 0xc0025cc980})]}" +"2019-05-02 09:27:36.835 UTC [confighistory] add -> DEBU 1860 add() - {lscc, exp02~collection, 5}" +"2019-05-02 09:27:36.838 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 1861 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc00037af80 0x27475e0}) %!s(*confighistory.dbProvider=&{0xc00000ebc0})}" +"2019-05-02 09:27:36.838 UTC [kvledger] CommitWithPvtData -> DEBU 1862 [businesschannel] Committing block [5] to storage" +"2019-05-02 09:27:36.838 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1863 Writing block [5] to pvt block store" +"2019-05-02 09:27:36.839 UTC [pvtdatastorage] Prepare -> DEBU 1864 Saved 0 private data write sets for block [5]" +"2019-05-02 09:27:36.842 UTC [fsblkstorage] indexBlock -> DEBU 1865 Indexing block [blockNum=5, blockHash=[]byte{0x5f, 0x54, 0x4d, 0xff, 0x12, 0x65, 0x12, 0xe, 0xc5, 0x7f, 0x48, 0x3d, 0x97, 0x19, 0x5b, 0xa3, 0xda, 0x2c, 0x78, 0xea, 0x37, 0x3d, 0x8f, 0xde, 0xaf, 0x84, 0x17, 0xbc, 0xfa, 0xa4, 0xf2, 0xd1} txOffsets= +txId=f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1 locPointer=offset=70, bytesLength=4705 ]" -"2019-05-02 01:31:06.076 UTC [fsblkstorage] indexBlock -> DEBU 1a73 Adding txLoc [fileSuffixNum=0, offset=80867, bytesLength=4706] for tx ID: [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf] to txid-index" -"2019-05-02 01:31:06.076 UTC [fsblkstorage] indexBlock -> DEBU 1a74 Adding txLoc [fileSuffixNum=0, offset=80867, bytesLength=4706] for tx number:[0] ID: [c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf] to blockNumTranNum index" -"2019-05-02 01:31:06.076 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a75 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:06.077 UTC [gossip.discovery] isSentByMe -> DEBU 1a76 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:06.077 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a77 Exiting" -"2019-05-02 01:31:06.078 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a78 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:06.079 UTC [msp.identity] Verify -> DEBU 1a79 Verify: digest = 00000000 9c 53 05 c2 e0 ba a2 e0 51 71 27 bd c1 0d 69 87 |.S......Qq'...i.| -00000010 b2 3e 40 46 6e ad 51 68 96 50 6c 29 a9 d6 67 63 |.>@Fn.Qh.Pl)..gc|" -"2019-05-02 01:31:06.079 UTC [msp.identity] Verify -> DEBU 1a7a Verify: sig = 00000000 30 45 02 21 00 cb fa c8 bf d7 cc 06 26 a7 69 91 |0E.!........&.i.| -00000010 b4 13 e8 f8 bd 4f a6 3a 32 09 ff 9d a3 f8 95 d8 |.....O.:2.......| -00000020 13 f4 69 5a f3 02 20 52 41 b8 b5 57 cf 34 5f 68 |..iZ.. RA..W.4_h| -00000030 ec b8 39 4b d5 60 09 90 b3 bf 44 37 ea e2 d9 21 |..9K.`....D7...!| -00000040 42 2d 2b 9a b8 bd 1a |B-+....|" -"2019-05-02 01:31:06.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a7b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:06.081 UTC [fsblkstorage] updateCheckpoint -> DEBU 1a7c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86511], isChainEmpty=[false], lastBlockNumber=[5]" -"2019-05-02 01:31:06.081 UTC [pvtdatastorage] Commit -> DEBU 1a7d Committing private data for block [5]" -"2019-05-02 01:31:06.081 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a7e Exiting" -"2019-05-02 01:31:06.081 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a7f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:06.082 UTC [msp] DeserializeIdentity -> DEBU 1a80 Obtaining identity" -"2019-05-02 01:31:06.082 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a81 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:06.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a82 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:06.084 UTC [pvtdatastorage] Commit -> DEBU 1a83 Committed private data for block [5]" -"2019-05-02 01:31:06.084 UTC [kvledger] CommitWithPvtData -> DEBU 1a84 [businesschannel] Committing block [5] transactions to state database" -"2019-05-02 01:31:06.084 UTC [lockbasedtxmgr] Commit -> DEBU 1a85 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-05-02 01:31:06.084 UTC [lockbasedtxmgr] Commit -> DEBU 1a86 Committing updates to state database" -"2019-05-02 01:31:06.084 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1a87 Building the expiry schedules based on the update batch" -"2019-05-02 01:31:06.085 UTC [lockbasedtxmgr] Commit -> DEBU 1a88 Write lock acquired for committing updates to state database" -"2019-05-02 01:31:06.085 UTC [stateleveldb] ApplyUpdates -> DEBU 1a89 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" -"2019-05-02 01:31:06.085 UTC [stateleveldb] ApplyUpdates -> DEBU 1a8a Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" -"2019-05-02 01:31:06.085 UTC [stateleveldb] ApplyUpdates -> DEBU 1a8b Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Sequence] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x53, 0x65, 0x71, 0x75, 0x65, 0x6e, 0x63, 0x65}]" -"2019-05-02 01:31:06.085 UTC [stateleveldb] ApplyUpdates -> DEBU 1a8c Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" -"2019-05-02 01:31:06.086 UTC [stateleveldb] ApplyUpdates -> DEBU 1a8d Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/metadata/exp02] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32}]" -"2019-05-02 01:31:06.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a8e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:06.087 UTC [policies] Evaluate -> DEBU 1a8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:06.087 UTC [policies] Evaluate -> DEBU 1a90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:06.088 UTC [policies] Evaluate -> DEBU 1a91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:06.088 UTC [cauthdsl] func1 -> DEBU 1a92 0xc003f03470 gate 1556760666088220900 evaluation starts" -"2019-05-02 01:31:06.089 UTC [cauthdsl] func2 -> DEBU 1a93 0xc003f03470 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:06.089 UTC [cauthdsl] func2 -> DEBU 1a94 0xc003f03470 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:06.090 UTC [lockbasedtxmgr] Commit -> DEBU 1a95 Updates committed to state database and the write lock is released" -"2019-05-02 01:31:06.090 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1a96 Preparing potential purge list working-set for expiringAtBlk [6]" -"2019-05-02 01:31:06.090 UTC [leveldbhelper] GetIterator -> DEBU 1a97 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" -"2019-05-02 01:31:06.091 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1a98 No expiry entry found for expiringAtBlk [6]" -"2019-05-02 01:31:06.091 UTC [lockbasedtxmgr] func1 -> DEBU 1a99 launched the background routine for preparing keys to purge with the next block" -"2019-05-02 01:31:06.091 UTC [kvledger] CommitWithPvtData -> DEBU 1a9a [businesschannel] Committing block [5] transactions to history database" -"2019-05-02 01:31:06.091 UTC [historyleveldb] Commit -> DEBU 1a9b Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" -"2019-05-02 01:31:06.091 UTC [cauthdsl] func2 -> DEBU 1a9c 0xc003f03470 principal matched by identity 0" -"2019-05-02 01:31:06.091 UTC [msp.identity] Verify -> DEBU 1a9d Verify: digest = 00000000 db 77 4b 12 bc 31 76 19 bb b3 97 35 bb 2f 6f ce |.wK..1v....5./o.| -00000010 c3 13 d7 e1 d1 37 77 ae 7f ea ba 96 fa 50 e1 85 |.....7w......P..|" -"2019-05-02 01:31:06.092 UTC [msp.identity] Verify -> DEBU 1a9e Verify: sig = 00000000 30 44 02 20 43 5a 8c 61 dc 74 c0 2d c9 80 1a cd |0D. CZ.a.t.-....| -00000010 fd a9 9a c0 07 c7 14 dd 0b cc f3 2b b9 aa 11 e5 |...........+....| -00000020 b6 12 be b6 02 20 33 a9 f0 5e a1 4d f5 41 de be |..... 3..^.M.A..| -00000030 0f 48 3a ee e9 63 ed c8 8b 82 57 cc 33 ec cf 60 |.H:..c....W.3..`| -00000040 f9 44 e0 43 f0 17 |.D.C..|" -"2019-05-02 01:31:06.092 UTC [cauthdsl] func2 -> DEBU 1a9f 0xc003f03470 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:06.092 UTC [cauthdsl] func1 -> DEBU 1aa0 0xc003f03470 gate 1556760666088220900 evaluation succeeds" -"2019-05-02 01:31:06.092 UTC [policies] Evaluate -> DEBU 1aa1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:06.092 UTC [policies] Evaluate -> DEBU 1aa2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:06.092 UTC [policies] Evaluate -> DEBU 1aa3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:06.092 UTC [policies] Evaluate -> DEBU 1aa4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:06.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 1aa5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:06.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 1aa6 Exiting" -"2019-05-02 01:31:06.092 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aa7 Exiting" -"2019-05-02 01:31:06.093 UTC [fsblkstorage] waitForBlock -> DEBU 1aa8 Came out of wait. maxAvailaBlockNumber=[5]" -"2019-05-02 01:31:06.093 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aa9 Remaining bytes=[5714], Going to peek [8] bytes" -"2019-05-02 01:31:06.093 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aaa Returning blockbytes - length=[5712], placementInfo={fileNum=[0], startOffset=[80797], bytesOffset=[80799]}" -"2019-05-02 01:31:06.093 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aab blockbytes [5712] read from file [0]" -"2019-05-02 01:31:06.094 UTC [historyleveldb] Commit -> DEBU 1aac Channel [businesschannel]: Updates committed to history database for blockNo [5]" -"2019-05-02 01:31:06.095 UTC [kvledger] CommitWithPvtData -> INFO 1aad [businesschannel] Committed block [5] with 1 transaction(s) in 91ms (state_validation=64ms block_commit=15ms state_commit=7ms)" -"2019-05-02 01:31:06.096 UTC [msp.identity] Sign -> DEBU 1aae Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020806 " -"2019-05-02 01:31:06.096 UTC [msp.identity] Sign -> DEBU 1aaf Sign: digest: 666D35FF5BF6A248B9B221484D3A9DB4037E7422C4DB0BB3479A183A9F08BCCA " -"2019-05-02 01:31:06.096 UTC [gossip.state] commitBlock -> DEBU 1ab0 [businesschannel] Committed block [5] with 1 transaction(s)" -"2019-05-02 01:31:06.097 UTC [common.deliver] deliverBlocks -> DEBU 1ab1 [channel: businesschannel] Delivering block [5] for (0xc003a19f00) for 192.168.240.9:41308" -"2019-05-02 01:31:06.097 UTC [fsblkstorage] waitForBlock -> DEBU 1ab2 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-05-02 01:31:06.110 UTC [common.deliver] deliverBlocks -> DEBU 1ab3 Context canceled, aborting wait for next block" -"2019-05-02 01:31:06.110 UTC [common.deliverevents] func1 -> DEBU 1ab4 Closing Deliver stream" -"2019-05-02 01:31:06.111 UTC [comm.grpc.server] 1 -> INFO 1ab5 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T01:31:33.72Z grpc.peer_address=192.168.240.9:41308 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.389477s -"2019-05-02 01:31:06.111 UTC [grpc] infof -> DEBU 1ab6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:06.111 UTC [grpc] infof -> DEBU 1ab7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:06.111 UTC [fsblkstorage] waitForBlock -> DEBU 1ab8 Came out of wait. maxAvailaBlockNumber=[5]" -"2019-05-02 01:31:06.680 UTC [endorser] ProcessProposal -> DEBU 1ab9 Entering: request from 192.168.240.9:41316" -"2019-05-02 01:31:06.681 UTC [protoutils] ValidateProposalMessage -> DEBU 1aba ValidateProposalMessage starts for signed proposal 0xc003e955e0" -"2019-05-02 01:31:06.681 UTC [protoutils] validateChannelHeader -> DEBU 1abb validateChannelHeader info: header type 3" -"2019-05-02 01:31:06.682 UTC [protoutils] checkSignatureFromCreator -> DEBU 1abc begin" -"2019-05-02 01:31:06.682 UTC [msp] GetManagerForChain -> DEBU 1abd Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:06.682 UTC [protoutils] checkSignatureFromCreator -> DEBU 1abe creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:06.682 UTC [protoutils] checkSignatureFromCreator -> DEBU 1abf creator is valid" -"2019-05-02 01:31:06.683 UTC [msp.identity] Verify -> DEBU 1ac0 Verify: digest = 00000000 07 0c ca e7 9a 83 6b ec c7 ae b8 57 5a 27 f7 58 |......k....WZ'.X| -00000010 d7 f4 ae 2a f3 55 ae 99 4e 3c 51 59 1c 86 da c5 |...*.U..N DEBU 1ac1 Verify: sig = 00000000 30 45 02 21 00 c6 3b cb 0d 45 f0 5b b3 36 a9 cb |0E.!..;..E.[.6..| -00000010 fc 78 ce 2b 25 30 fe 18 76 d1 32 fb 8a 21 e4 9c |.x.+%0..v.2..!..| -00000020 0d fc a2 ce 4c 02 20 61 c7 60 8e 9e f3 f2 73 b8 |....L. a.`....s.| -00000030 f3 28 c8 ab 6e c3 a7 00 fd 00 ce b2 f6 7e 7a 5b |.(..n........~z[| -00000040 9e 29 6d f5 0b cc 92 |.)m....|" -"2019-05-02 01:31:06.684 UTC [protoutils] checkSignatureFromCreator -> DEBU 1ac2 exits successfully" -"2019-05-02 01:31:06.684 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1ac3 validateChaincodeProposalMessage starts for proposal 0xc003f1c230, header 0xc003e959f0" -"2019-05-02 01:31:06.685 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1ac4 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " -"2019-05-02 01:31:06.685 UTC [endorser] preProcess -> DEBU 1ac5 [businesschannel][2f938f63] processing txid: 2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8" -"2019-05-02 01:31:06.686 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1ac6 retrieveTransactionByID() - txId = [2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8]" -"2019-05-02 01:31:06.686 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1ac7 constructing new tx simulator" -"2019-05-02 01:31:06.687 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1ac8 constructing new tx simulator txid = [2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8]" -"2019-05-02 01:31:06.687 UTC [endorser] SimulateProposal -> DEBU 1ac9 [businesschannel][2f938f63] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:06.687 UTC [endorser] callChaincode -> INFO 1aca [businesschannel][2f938f63] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:06.688 UTC [chaincode] Execute -> DEBU 1acb Entry" -"2019-05-02 01:31:06.688 UTC [aclmgmt] CheckACL -> DEBU 1acc acl policy /Channel/Application/Readers found in config for resource _lifecycle/QueryChaincodeDefinition" -"2019-05-02 01:31:06.689 UTC [aclmgmt] CheckACL -> DEBU 1acd acl check(/Channel/Application/Readers)" -"2019-05-02 01:31:06.689 UTC [policies] Evaluate -> DEBU 1ace == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:06.689 UTC [policies] Evaluate -> DEBU 1acf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:06.690 UTC [policies] Evaluate -> DEBU 1ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:06.690 UTC [cauthdsl] func1 -> DEBU 1ad1 0xc003f85110 gate 1556760666690820000 evaluation starts" -"2019-05-02 01:31:06.691 UTC [cauthdsl] func2 -> DEBU 1ad2 0xc003f85110 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:06.691 UTC [cauthdsl] func2 -> DEBU 1ad3 0xc003f85110 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:06.692 UTC [cauthdsl] func2 -> DEBU 1ad4 0xc003f85110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:06.692 UTC [cauthdsl] func2 -> DEBU 1ad5 0xc003f85110 principal evaluation fails" -"2019-05-02 01:31:06.692 UTC [cauthdsl] func1 -> DEBU 1ad6 0xc003f85110 gate 1556760666690820000 evaluation fails" -"2019-05-02 01:31:06.693 UTC [policies] Evaluate -> DEBU 1ad7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:06.693 UTC [policies] Evaluate -> DEBU 1ad8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:06.693 UTC [policies] Evaluate -> DEBU 1ad9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:06.694 UTC [cauthdsl] func1 -> DEBU 1ada 0xc003f85950 gate 1556760666694405300 evaluation starts" -"2019-05-02 01:31:06.695 UTC [cauthdsl] func2 -> DEBU 1adb 0xc003f85950 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:06.695 UTC [cauthdsl] func2 -> DEBU 1adc 0xc003f85950 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:06.696 UTC [cauthdsl] func2 -> DEBU 1add 0xc003f85950 principal matched by identity 0" -"2019-05-02 01:31:06.696 UTC [msp.identity] Verify -> DEBU 1ade Verify: digest = 00000000 07 0c ca e7 9a 83 6b ec c7 ae b8 57 5a 27 f7 58 |......k....WZ'.X| -00000010 d7 f4 ae 2a f3 55 ae 99 4e 3c 51 59 1c 86 da c5 |...*.U..N DEBU 1adf Verify: sig = 00000000 30 45 02 21 00 c6 3b cb 0d 45 f0 5b b3 36 a9 cb |0E.!..;..E.[.6..| -00000010 fc 78 ce 2b 25 30 fe 18 76 d1 32 fb 8a 21 e4 9c |.x.+%0..v.2..!..| -00000020 0d fc a2 ce 4c 02 20 61 c7 60 8e 9e f3 f2 73 b8 |....L. a.`....s.| -00000030 f3 28 c8 ab 6e c3 a7 00 fd 00 ce b2 f6 7e 7a 5b |.(..n........~z[| -00000040 9e 29 6d f5 0b cc 92 |.)m....|" -"2019-05-02 01:31:06.697 UTC [cauthdsl] func2 -> DEBU 1ae0 0xc003f85950 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:06.697 UTC [cauthdsl] func1 -> DEBU 1ae1 0xc003f85950 gate 1556760666694405300 evaluation succeeds" -"2019-05-02 01:31:06.698 UTC [policies] Evaluate -> DEBU 1ae2 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:06.698 UTC [policies] Evaluate -> DEBU 1ae3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:06.699 UTC [policies] Evaluate -> DEBU 1ae4 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:06.699 UTC [policies] Evaluate -> DEBU 1ae5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:06.700 UTC [lifecycle] QueryChaincodeDefinition -> DEBU 1ae6 received invocation of QueryChaincodeDefinition on channel 'businesschannel' for chaincode 'exp02'" -"2019-05-02 01:31:06.700 UTC [chaincode] handleMessage -> DEBU 1ae7 [2f938f63] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:06.701 UTC [chaincode] HandleTransaction -> DEBU 1ae8 [2f938f63] handling GET_STATE from chaincode" -"2019-05-02 01:31:06.701 UTC [chaincode] HandleGetState -> DEBU 1ae9 [2f938f63] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" -"2019-05-02 01:31:06.702 UTC [stateleveldb] GetState -> DEBU 1aea GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -"2019-05-02 01:31:06.703 UTC [chaincode] HandleTransaction -> DEBU 1aeb [2f938f63] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:06.703 UTC [chaincode] handleMessage -> DEBU 1aec [2f938f63] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:06.704 UTC [chaincode] HandleTransaction -> DEBU 1aed [2f938f63] handling GET_STATE from chaincode" -"2019-05-02 01:31:06.705 UTC [chaincode] HandleGetState -> DEBU 1aee [2f938f63] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" -"2019-05-02 01:31:06.705 UTC [stateleveldb] GetState -> DEBU 1aef GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:06.706 UTC [chaincode] HandleTransaction -> DEBU 1af0 [2f938f63] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:06.706 UTC [chaincode] handleMessage -> DEBU 1af1 [2f938f63] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:06.707 UTC [chaincode] HandleTransaction -> DEBU 1af2 [2f938f63] handling GET_STATE from chaincode" -"2019-05-02 01:31:06.707 UTC [chaincode] HandleGetState -> DEBU 1af3 [2f938f63] getting state for chaincode _lifecycle, key namespaces/fields/exp02/EndorsementInfo, channel businesschannel" -"2019-05-02 01:31:06.708 UTC [stateleveldb] GetState -> DEBU 1af4 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" -"2019-05-02 01:31:06.708 UTC [chaincode] HandleTransaction -> DEBU 1af5 [2f938f63] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:06.709 UTC [chaincode] handleMessage -> DEBU 1af6 [2f938f63] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:06.709 UTC [chaincode] HandleTransaction -> DEBU 1af7 [2f938f63] handling GET_STATE from chaincode" -"2019-05-02 01:31:06.710 UTC [chaincode] HandleGetState -> DEBU 1af8 [2f938f63] getting state for chaincode _lifecycle, key namespaces/fields/exp02/ValidationInfo, channel businesschannel" -"2019-05-02 01:31:06.711 UTC [stateleveldb] GetState -> DEBU 1af9 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" -"2019-05-02 01:31:06.711 UTC [chaincode] HandleTransaction -> DEBU 1afa [2f938f63] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:06.712 UTC [chaincode] handleMessage -> DEBU 1afb [2f938f63] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:06.712 UTC [chaincode] HandleTransaction -> DEBU 1afc [2f938f63] handling GET_STATE from chaincode" -"2019-05-02 01:31:06.713 UTC [chaincode] HandleGetState -> DEBU 1afd [2f938f63] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Collections, channel businesschannel" -"2019-05-02 01:31:06.713 UTC [stateleveldb] GetState -> DEBU 1afe GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" -"2019-05-02 01:31:06.714 UTC [chaincode] HandleTransaction -> DEBU 1aff [2f938f63] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:06.714 UTC [lifecycle] QueryChaincodeDefinition -> INFO 1b00 successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" -"2019-05-02 01:31:06.715 UTC [chaincode] handleMessage -> DEBU 1b01 [2f938f63] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:06.715 UTC [chaincode] Notify -> DEBU 1b02 [2f938f63] notifying Txid:2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8, channelID:businesschannel" -"2019-05-02 01:31:06.715 UTC [chaincode] Execute -> DEBU 1b03 Exit" -"2019-05-02 01:31:06.716 UTC [endorser] callChaincode -> INFO 1b04 [businesschannel][2f938f63] Exit chaincode: name:"_lifecycle" (28ms)" -"2019-05-02 01:31:06.716 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1b05 Simulation completed, getting simulation results" -"2019-05-02 01:31:06.716 UTC [lockbasedtxmgr] Done -> DEBU 1b06 Done with transaction simulation / query execution [2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8]" -"2019-05-02 01:31:06.717 UTC [endorser] SimulateProposal -> DEBU 1b07 [businesschannel][2f938f63] Exit" -"2019-05-02 01:31:06.717 UTC [endorser] endorseProposal -> DEBU 1b08 [businesschannel][2f938f63] Entry chaincode: name:"_lifecycle" " -"2019-05-02 01:31:06.717 UTC [endorser] endorseProposal -> DEBU 1b09 [businesschannel][2f938f63] escc for chaincode name:"_lifecycle" is escc" -"2019-05-02 01:31:06.718 UTC [endorser] EndorseWithPlugin -> DEBU 1b0a Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8, chaincode: _lifecycle}" -"2019-05-02 01:31:06.718 UTC [msp.identity] Sign -> DEBU 1b0b Sign: plaintext: 0A2041FC13AFCBC3FF912134F2D95E66...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:06.718 UTC [msp.identity] Sign -> DEBU 1b0c Sign: digest: 0C0E4A771A0D912A9CF7D5C9EE00522DDFC5B84108DBE4A6D5034508DE502650 " -"2019-05-02 01:31:06.719 UTC [endorser] EndorseWithPlugin -> DEBU 1b0d Exiting {plugin: escc, channel: businesschannel, tx: 2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8, chaincode: _lifecycle}" -"2019-05-02 01:31:06.719 UTC [endorser] endorseProposal -> DEBU 1b0e [businesschannel][2f938f63] Exit" -"2019-05-02 01:31:06.720 UTC [lockbasedtxmgr] Done -> DEBU 1b0f Done with transaction simulation / query execution [2f938f63755e3330cfb502262ace7249cbfad4bcb78bf457b6d781a678fb74f8]" -"2019-05-02 01:31:06.720 UTC [endorser] func1 -> DEBU 1b10 Exit: request from 192.168.240.9:41316" -"2019-05-02 01:31:06.721 UTC [comm.grpc.server] 1 -> INFO 1b11 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41316 grpc.code=OK grpc.call_duration=41.5122ms -"2019-05-02 01:31:06.734 UTC [grpc] infof -> DEBU 1b12 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:06.734 UTC [grpc] warningf -> DEBU 1b13 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41316: read: connection reset by peer" -"2019-05-02 01:31:06.735 UTC [grpc] infof -> DEBU 1b14 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:06.975 UTC [gossip.election] waitForInterrupt -> DEBU 1b15 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:06.975 UTC [gossip.election] IsLeader -> DEBU 1b16 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:06.976 UTC [msp.identity] Sign -> DEBU 1b17 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510061801 " -"2019-05-02 01:31:06.976 UTC [msp.identity] Sign -> DEBU 1b18 Sign: digest: 94CA125D29A53048540746AB59638DDB4B80263E07841491CFFF703C668D39D5 " -"2019-05-02 01:31:06.976 UTC [gossip.election] waitForInterrupt -> DEBU 1b19 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:06.984 UTC [msp] DeserializeIdentity -> DEBU 1b1a Obtaining identity" -"2019-05-02 01:31:06.985 UTC [msp] DeserializeIdentity -> DEBU 1b1b Obtaining identity" -"2019-05-02 01:31:06.986 UTC [msp] DeserializeIdentity -> DEBU 1b1c Obtaining identity" -"2019-05-02 01:31:06.987 UTC [msp] DeserializeIdentity -> DEBU 1b1d Obtaining identity" -"2019-05-02 01:31:06.988 UTC [gossip.comm] Send -> DEBU 1b1e Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:06.988 UTC [msp] DeserializeIdentity -> DEBU 1b1f Obtaining identity" -"2019-05-02 01:31:06.989 UTC [msp] DeserializeIdentity -> DEBU 1b20 Obtaining identity" -"2019-05-02 01:31:06.989 UTC [gossip.comm] sendToEndpoint -> DEBU 1b21 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -"2019-05-02 01:31:06.989 UTC [gossip.comm] sendToEndpoint -> DEBU 1b22 Exiting" -"2019-05-02 01:31:07.937 UTC [endorser] ProcessProposal -> DEBU 1b23 Entering: request from 192.168.240.9:41324" -"2019-05-02 01:31:07.938 UTC [protoutils] ValidateProposalMessage -> DEBU 1b24 ValidateProposalMessage starts for signed proposal 0xc003ffe000" -"2019-05-02 01:31:07.938 UTC [protoutils] validateChannelHeader -> DEBU 1b25 validateChannelHeader info: header type 3" -"2019-05-02 01:31:07.938 UTC [protoutils] checkSignatureFromCreator -> DEBU 1b26 begin" -"2019-05-02 01:31:07.939 UTC [msp] GetManagerForChain -> DEBU 1b27 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:07.939 UTC [protoutils] checkSignatureFromCreator -> DEBU 1b28 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:07.939 UTC [protoutils] checkSignatureFromCreator -> DEBU 1b29 creator is valid" -"2019-05-02 01:31:07.939 UTC [msp.identity] Verify -> DEBU 1b2a Verify: digest = 00000000 b2 be 29 7c 64 6f c7 6f 10 bc be a1 dc 5c 71 12 |..)|do.o.....\q.| -00000010 4d 49 89 14 11 bf ce c8 ac 46 20 65 63 be bc 48 |MI.......F ec..H|" -"2019-05-02 01:31:07.940 UTC [msp.identity] Verify -> DEBU 1b2b Verify: sig = 00000000 30 44 02 20 39 2d 2e 62 dc 21 00 fc 54 24 ce 1f |0D. 9-.b.!..T$..| -00000010 e4 74 6f 11 77 5a 03 e8 5a 72 be 40 b7 62 d9 08 |.to.wZ..Zr.@.b..| -00000020 55 e8 c5 c0 02 20 0c ab 7c 8e f8 b0 57 32 7a 43 |U.... ..|...W2zC| -00000030 62 e0 f8 95 cb 48 99 93 15 7d 0c 5a 51 cf 71 6a |b....H...}.ZQ.qj| -00000040 3d ea e1 04 94 ae |=.....|" -"2019-05-02 01:31:07.941 UTC [protoutils] checkSignatureFromCreator -> DEBU 1b2c exits successfully" -"2019-05-02 01:31:07.941 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1b2d validateChaincodeProposalMessage starts for proposal 0xc003eb8bd0, header 0xc003ffe410" -"2019-05-02 01:31:07.941 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1b2e validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-05-02 01:31:07.942 UTC [endorser] preProcess -> DEBU 1b2f [businesschannel][13c934fb] processing txid: 13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa" -"2019-05-02 01:31:07.942 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1b30 retrieveTransactionByID() - txId = [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa]" -"2019-05-02 01:31:07.942 UTC [aclmgmt] CheckACL -> DEBU 1b31 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-05-02 01:31:07.943 UTC [aclmgmt] CheckACL -> DEBU 1b32 acl check(/Channel/Application/Writers)" -"2019-05-02 01:31:07.943 UTC [policies] Evaluate -> DEBU 1b33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:07.943 UTC [policies] Evaluate -> DEBU 1b34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:07.944 UTC [policies] Evaluate -> DEBU 1b35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:07.944 UTC [cauthdsl] func1 -> DEBU 1b36 0xc004014290 gate 1556760667944534200 evaluation starts" -"2019-05-02 01:31:07.944 UTC [cauthdsl] func2 -> DEBU 1b37 0xc004014290 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:07.945 UTC [cauthdsl] func2 -> DEBU 1b38 0xc004014290 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:07.945 UTC [cauthdsl] func2 -> DEBU 1b39 0xc004014290 principal matched by identity 0" -"2019-05-02 01:31:07.946 UTC [msp.identity] Verify -> DEBU 1b3a Verify: digest = 00000000 b2 be 29 7c 64 6f c7 6f 10 bc be a1 dc 5c 71 12 |..)|do.o.....\q.| -00000010 4d 49 89 14 11 bf ce c8 ac 46 20 65 63 be bc 48 |MI.......F ec..H|" -"2019-05-02 01:31:07.946 UTC [msp.identity] Verify -> DEBU 1b3b Verify: sig = 00000000 30 44 02 20 39 2d 2e 62 dc 21 00 fc 54 24 ce 1f |0D. 9-.b.!..T$..| -00000010 e4 74 6f 11 77 5a 03 e8 5a 72 be 40 b7 62 d9 08 |.to.wZ..Zr.@.b..| -00000020 55 e8 c5 c0 02 20 0c ab 7c 8e f8 b0 57 32 7a 43 |U.... ..|...W2zC| -00000030 62 e0 f8 95 cb 48 99 93 15 7d 0c 5a 51 cf 71 6a |b....H...}.ZQ.qj| -00000040 3d ea e1 04 94 ae |=.....|" -"2019-05-02 01:31:07.947 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc004014290 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:07.948 UTC [cauthdsl] func1 -> DEBU 1b3d 0xc004014290 gate 1556760667944534200 evaluation succeeds" -"2019-05-02 01:31:07.948 UTC [policies] Evaluate -> DEBU 1b3e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:07.949 UTC [policies] Evaluate -> DEBU 1b3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:07.949 UTC [policies] Evaluate -> DEBU 1b40 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:07.949 UTC [policies] Evaluate -> DEBU 1b41 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:07.950 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1b42 constructing new tx simulator" -"2019-05-02 01:31:07.950 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1b43 constructing new tx simulator txid = [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa]" -"2019-05-02 01:31:07.950 UTC [endorser] SimulateProposal -> DEBU 1b44 [businesschannel][13c934fb] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:07.950 UTC [stateleveldb] GetState -> DEBU 1b45 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:07.950 UTC [endorser] callChaincode -> INFO 1b46 [businesschannel][13c934fb] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:07.950 UTC [stateleveldb] GetState -> DEBU 1b47 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:07.952 UTC [chaincode] LaunchConfig -> DEBU 1b48 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -"2019-05-02 01:31:07.952 UTC [chaincode] Start -> DEBU 1b49 start container: exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" -"2019-05-02 01:31:07.953 UTC [chaincode] Start -> DEBU 1b4a start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -"2019-05-02 01:31:07.953 UTC [chaincode] Start -> DEBU 1b4b start container with env: +"2019-05-02 09:27:36.842 UTC [fsblkstorage] indexBlock -> DEBU 1866 Adding txLoc [fileSuffixNum=0, offset=80864, bytesLength=4705] for tx ID: [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1] to txid-index" +"2019-05-02 09:27:36.842 UTC [fsblkstorage] indexBlock -> DEBU 1867 Adding txLoc [fileSuffixNum=0, offset=80864, bytesLength=4705] for tx number:[0] ID: [f6f68e7996096c42c56dabd08cdb84757305d30c7ca9c031a9d2e23bc1df60f1] to blockNumTranNum index" +"2019-05-02 09:27:36.844 UTC [fsblkstorage] updateCheckpoint -> DEBU 1868 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86507], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-05-02 09:27:36.845 UTC [pvtdatastorage] Commit -> DEBU 1869 Committing private data for block [5]" +"2019-05-02 09:27:36.846 UTC [pvtdatastorage] Commit -> DEBU 186a Committed private data for block [5]" +"2019-05-02 09:27:36.847 UTC [kvledger] CommitWithPvtData -> DEBU 186b [businesschannel] Committing block [5] transactions to state database" +"2019-05-02 09:27:36.847 UTC [lockbasedtxmgr] Commit -> DEBU 186c lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-05-02 09:27:36.847 UTC [lockbasedtxmgr] Commit -> DEBU 186d Committing updates to state database" +"2019-05-02 09:27:36.848 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 186e Building the expiry schedules based on the update batch" +"2019-05-02 09:27:36.848 UTC [lockbasedtxmgr] Commit -> DEBU 186f Write lock acquired for committing updates to state database" +"2019-05-02 09:27:36.848 UTC [stateleveldb] ApplyUpdates -> DEBU 1870 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/metadata/exp02] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32}]" +"2019-05-02 09:27:36.848 UTC [stateleveldb] ApplyUpdates -> DEBU 1871 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" +"2019-05-02 09:27:36.849 UTC [stateleveldb] ApplyUpdates -> DEBU 1872 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" +"2019-05-02 09:27:36.849 UTC [stateleveldb] ApplyUpdates -> DEBU 1873 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Sequence] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x53, 0x65, 0x71, 0x75, 0x65, 0x6e, 0x63, 0x65}]" +"2019-05-02 09:27:36.849 UTC [stateleveldb] ApplyUpdates -> DEBU 1874 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" +"2019-05-02 09:27:36.849 UTC [gossip.comm] func1 -> DEBU 1875 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.849 UTC [gossip.gossip] handleMessage -> DEBU 1876 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.849 UTC [gossip.pull] HandleMessage -> DEBU 1877 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 1878 Obtaining identity" +"2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 1879 Obtaining identity" +"2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 187a Obtaining identity" +"2019-05-02 09:27:36.849 UTC [msp] DeserializeIdentity -> DEBU 187b Obtaining identity" +"2019-05-02 09:27:36.850 UTC [msp] DeserializeIdentity -> DEBU 187c Obtaining identity" +"2019-05-02 09:27:36.850 UTC [msp] DeserializeIdentity -> DEBU 187d Obtaining identity" +"2019-05-02 09:27:36.850 UTC [gossip.pull] SendDigest -> DEBU 187e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:36.850 UTC [gossip.gossip] handleMessage -> DEBU 187f Exiting" +"2019-05-02 09:27:36.851 UTC [fsblkstorage] waitForBlock -> DEBU 1880 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-05-02 09:27:36.851 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1881 Remaining bytes=[5713], Going to peek [8] bytes" +"2019-05-02 09:27:36.854 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1882 Returning blockbytes - length=[5711], placementInfo={fileNum=[0], startOffset=[80794], bytesOffset=[80796]}" +"2019-05-02 09:27:36.854 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1883 blockbytes [5711] read from file [0]" +"2019-05-02 09:27:36.855 UTC [lockbasedtxmgr] Commit -> DEBU 1884 Updates committed to state database and the write lock is released" +"2019-05-02 09:27:36.855 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1885 Preparing potential purge list working-set for expiringAtBlk [6]" +"2019-05-02 09:27:36.855 UTC [lockbasedtxmgr] func1 -> DEBU 1886 launched the background routine for preparing keys to purge with the next block" +"2019-05-02 09:27:36.856 UTC [kvledger] CommitWithPvtData -> DEBU 1887 [businesschannel] Committing block [5] transactions to history database" +"2019-05-02 09:27:36.856 UTC [historyleveldb] Commit -> DEBU 1888 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" +"2019-05-02 09:27:36.856 UTC [leveldbhelper] GetIterator -> DEBU 1889 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" +"2019-05-02 09:27:36.857 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 188a No expiry entry found for expiringAtBlk [6]" +"2019-05-02 09:27:36.859 UTC [gossip.comm] func1 -> DEBU 188b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.859 UTC [gossip.gossip] handleMessage -> DEBU 188c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.859 UTC [gossip.gossip] handleMessage -> DEBU 188d Exiting" +"2019-05-02 09:27:36.859 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.859 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 188f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:36.859 UTC [msp] DeserializeIdentity -> DEBU 1890 Obtaining identity" +"2019-05-02 09:27:36.859 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1891 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:36.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1892 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1893 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:36.859 UTC [policies] Evaluate -> DEBU 1894 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:36.859 UTC [policies] Evaluate -> DEBU 1895 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:36.859 UTC [policies] Evaluate -> DEBU 1896 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:36.859 UTC [cauthdsl] func1 -> DEBU 1897 0xc002f8ce80 gate 1556789256859974400 evaluation starts" +"2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 1898 0xc002f8ce80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 1899 0xc002f8ce80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 189a 0xc002f8ce80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 189b 0xc002f8ce80 principal evaluation fails" +"2019-05-02 09:27:36.860 UTC [cauthdsl] func1 -> DEBU 189c 0xc002f8ce80 gate 1556789256859974400 evaluation fails" +"2019-05-02 09:27:36.860 UTC [policies] Evaluate -> DEBU 189d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.860 UTC [policies] Evaluate -> DEBU 189e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:36.860 UTC [policies] Evaluate -> DEBU 189f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:36.860 UTC [cauthdsl] func1 -> DEBU 18a0 0xc002f8d6c0 gate 1556789256860328500 evaluation starts" +"2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 18a1 0xc002f8d6c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 18a2 0xc002f8d6c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:36.862 UTC [historyleveldb] Commit -> DEBU 18a3 Channel [businesschannel]: Updates committed to history database for blockNo [5]" +"2019-05-02 09:27:36.862 UTC [kvledger] CommitWithPvtData -> INFO 18a4 [businesschannel] Committed block [5] with 1 transaction(s) in 29ms (state_validation=5ms block_commit=9ms state_commit=9ms)" +"2019-05-02 09:27:36.862 UTC [msp.identity] Sign -> DEBU 18a5 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020806 " +"2019-05-02 09:27:36.862 UTC [msp.identity] Sign -> DEBU 18a6 Sign: digest: 18C8659D2BDBC244829233FA82F12F4FE7D980E6B95C6E3F3A1E6BE496F5D8FF " +"2019-05-02 09:27:36.862 UTC [gossip.state] commitBlock -> DEBU 18a7 [businesschannel] Committed block [5] with 1 transaction(s)" +"2019-05-02 09:27:36.862 UTC [common.deliver] deliverBlocks -> DEBU 18a8 [channel: businesschannel] Delivering block [5] for (0xc0034d26c0) for 172.18.0.8:57318" +"2019-05-02 09:27:36.863 UTC [fsblkstorage] waitForBlock -> DEBU 18a9 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-05-02 09:27:36.860 UTC [cauthdsl] func2 -> DEBU 18aa 0xc002f8d6c0 principal matched by identity 0" +"2019-05-02 09:27:36.865 UTC [msp.identity] Verify -> DEBU 18ab Verify: digest = 00000000 7e 36 2b 74 13 45 8f 14 60 07 ed 72 c2 22 cc 88 |~6+t.E..`..r."..| +00000010 aa 38 9c a9 71 2d 5a 2c 15 9d 0f 24 9c c4 67 1a |.8..q-Z,...$..g.|" +"2019-05-02 09:27:36.865 UTC [msp.identity] Verify -> DEBU 18ac Verify: sig = 00000000 30 45 02 21 00 9c 1c 0d 70 36 3d 31 a9 cb 15 3b |0E.!....p6=1...;| +00000010 f4 55 60 0a c1 d0 74 20 11 63 79 e5 a6 2b 56 a6 |.U`...t .cy..+V.| +00000020 5d ed 9a 0e 4c 02 20 73 25 81 4a 88 30 c3 45 25 |]...L. s%.J.0.E%| +00000030 a6 38 d3 6f 43 8d 41 44 d2 06 f3 be b5 31 12 2a |.8.oC.AD.....1.*| +00000040 6b fb cf fb ee d8 97 |k......|" +"2019-05-02 09:27:36.865 UTC [cauthdsl] func2 -> DEBU 18ad 0xc002f8d6c0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:36.865 UTC [cauthdsl] func1 -> DEBU 18ae 0xc002f8d6c0 gate 1556789256860328500 evaluation succeeds" +"2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18af Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18b1 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:36.865 UTC [policies] Evaluate -> DEBU 18b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:36.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 18b3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b5 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 " +"2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 " +"2019-05-02 09:27:36.865 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:36.866 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b8 Exiting" +"2019-05-02 09:27:36.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 18b9 Exiting" +"2019-05-02 09:27:36.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ba Exiting" +"2019-05-02 09:27:36.866 UTC [gossip.discovery] sendMemResponse -> DEBU 18bb Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:36.866 UTC [msp] DeserializeIdentity -> DEBU 18bc Obtaining identity" +"2019-05-02 09:27:36.866 UTC [msp] DeserializeIdentity -> DEBU 18bd Obtaining identity" +"2019-05-02 09:27:36.866 UTC [msp] DeserializeIdentity -> DEBU 18be Obtaining identity" +"2019-05-02 09:27:36.866 UTC [gossip.comm] Send -> DEBU 18bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:36.866 UTC [gossip.discovery] sendMemResponse -> DEBU 18c0 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:36.866 UTC [gossip.comm] sendToEndpoint -> DEBU 18c1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:36.866 UTC [gossip.comm] sendToEndpoint -> DEBU 18c2 Exiting" +"2019-05-02 09:27:36.924 UTC [common.deliver] deliverBlocks -> DEBU 18c3 Context canceled, aborting wait for next block" +"2019-05-02 09:27:36.924 UTC [common.deliverevents] func1 -> DEBU 18c5 Closing Deliver stream" +"2019-05-02 09:27:36.925 UTC [comm.grpc.server] 1 -> INFO 18c7 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-05-02T09:28:04.468Z grpc.peer_address=172.18.0.8:57318 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.4557811s +"2019-05-02 09:27:36.924 UTC [grpc] infof -> DEBU 18c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:36.924 UTC [fsblkstorage] waitForBlock -> DEBU 18c6 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-05-02 09:27:36.932 UTC [grpc] infof -> DEBU 18c8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:37.010 UTC [msp] DeserializeIdentity -> DEBU 18c9 Obtaining identity" +"2019-05-02 09:27:37.010 UTC [msp] DeserializeIdentity -> DEBU 18ca Obtaining identity" +"2019-05-02 09:27:37.010 UTC [gossip.pull] Hello -> DEBU 18cb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:37.011 UTC [msp] DeserializeIdentity -> DEBU 18cc Obtaining identity" +"2019-05-02 09:27:37.011 UTC [msp] DeserializeIdentity -> DEBU 18cd Obtaining identity" +"2019-05-02 09:27:37.011 UTC [gossip.comm] Send -> DEBU 18ce Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:37.011 UTC [gossip.comm] sendToEndpoint -> DEBU 18cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.011 UTC [gossip.comm] sendToEndpoint -> DEBU 18d0 Exiting" +"2019-05-02 09:27:37.015 UTC [gossip.gossip] handleMessage -> DEBU 18d1 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11246267138444085805 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.026 UTC [gossip.pull] HandleMessage -> DEBU 18d3 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11246267138444085805 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.026 UTC [gossip.gossip] handleMessage -> DEBU 18d4 Exiting" +"2019-05-02 09:27:37.018 UTC [gossip.comm] func1 -> DEBU 18d2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.026 UTC [gossip.comm] func1 -> DEBU 18d5 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.026 UTC [gossip.gossip] handleMessage -> DEBU 18d6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.026 UTC [msp] DeserializeIdentity -> DEBU 18d7 Obtaining identity" +"2019-05-02 09:27:37.027 UTC [msp] DeserializeIdentity -> DEBU 18d8 Obtaining identity" +"2019-05-02 09:27:37.027 UTC [msp] DeserializeIdentity -> DEBU 18d9 Obtaining identity" +"2019-05-02 09:27:37.027 UTC [gossip.gossip] handleMessage -> DEBU 18da Exiting" +"2019-05-02 09:27:37.027 UTC [gossip.gossip] handleMessage -> DEBU 18db Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.027 UTC [msp] DeserializeIdentity -> DEBU 18dc Obtaining identity" +"2019-05-02 09:27:37.027 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:37.027 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18de Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.027 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18df Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.027 UTC [policies] Evaluate -> DEBU 18e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:37.027 UTC [policies] Evaluate -> DEBU 18e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:37.027 UTC [policies] Evaluate -> DEBU 18e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:37.028 UTC [cauthdsl] func1 -> DEBU 18e3 0xc0020db600 gate 1556789257028015400 evaluation starts" +"2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e4 0xc0020db600 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e5 0xc0020db600 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e6 0xc0020db600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18e7 0xc0020db600 principal evaluation fails" +"2019-05-02 09:27:37.028 UTC [cauthdsl] func1 -> DEBU 18e8 0xc0020db600 gate 1556789257028015400 evaluation fails" +"2019-05-02 09:27:37.028 UTC [policies] Evaluate -> DEBU 18e9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.028 UTC [policies] Evaluate -> DEBU 18ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.028 UTC [policies] Evaluate -> DEBU 18eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:37.028 UTC [cauthdsl] func1 -> DEBU 18ec 0xc0020dbe40 gate 1556789257028656700 evaluation starts" +"2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18ed 0xc0020dbe40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18ee 0xc0020dbe40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.028 UTC [cauthdsl] func2 -> DEBU 18ef 0xc0020dbe40 principal matched by identity 0" +"2019-05-02 09:27:37.029 UTC [msp.identity] Verify -> DEBU 18f0 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +"2019-05-02 09:27:37.029 UTC [msp.identity] Verify -> DEBU 18f1 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +00000040 6f f6 d4 dd 46 29 |o...F)|" +"2019-05-02 09:27:37.029 UTC [cauthdsl] func2 -> DEBU 18f2 0xc0020dbe40 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:37.029 UTC [cauthdsl] func1 -> DEBU 18f3 0xc0020dbe40 gate 1556789257028656700 evaluation succeeds" +"2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f6 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:37.029 UTC [policies] Evaluate -> DEBU 18f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:37.029 UTC [msp] DeserializeIdentity -> DEBU 18f8 Obtaining identity" +"2019-05-02 09:27:37.029 UTC [msp] DeserializeIdentity -> DEBU 18f9 Obtaining identity" +"2019-05-02 09:27:37.029 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18fa Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18fb Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.030 UTC [policies] Evaluate -> DEBU 18fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:37.030 UTC [policies] Evaluate -> DEBU 18fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:37.030 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:37.030 UTC [cauthdsl] func1 -> DEBU 18ff 0xc0026d1020 gate 1556789257030186500 evaluation starts" +"2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1900 0xc0026d1020 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1901 0xc0026d1020 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1902 0xc0026d1020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:37.030 UTC [cauthdsl] func2 -> DEBU 1903 0xc0026d1020 principal evaluation fails" +"2019-05-02 09:27:37.048 UTC [cauthdsl] func1 -> DEBU 1904 0xc0026d1020 gate 1556789257030186500 evaluation fails" +"2019-05-02 09:27:37.048 UTC [policies] Evaluate -> DEBU 1905 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.048 UTC [policies] Evaluate -> DEBU 1906 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.049 UTC [policies] Evaluate -> DEBU 1907 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:37.049 UTC [cauthdsl] func1 -> DEBU 1908 0xc0020d2920 gate 1556789257049107800 evaluation starts" +"2019-05-02 09:27:37.049 UTC [cauthdsl] func2 -> DEBU 1909 0xc0020d2920 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.049 UTC [cauthdsl] func2 -> DEBU 190a 0xc0020d2920 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.049 UTC [cauthdsl] func2 -> DEBU 190b 0xc0020d2920 principal matched by identity 0" +"2019-05-02 09:27:37.049 UTC [msp.identity] Verify -> DEBU 190c Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +"2019-05-02 09:27:37.049 UTC [msp.identity] Verify -> DEBU 190d Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +00000040 6f f6 d4 dd 46 29 |o...F)|" +"2019-05-02 09:27:37.050 UTC [cauthdsl] func2 -> DEBU 190e 0xc0020d2920 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:37.050 UTC [cauthdsl] func1 -> DEBU 190f 0xc0020d2920 gate 1556789257049107800 evaluation succeeds" +"2019-05-02 09:27:37.050 UTC [policies] Evaluate -> DEBU 1910 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.050 UTC [policies] Evaluate -> DEBU 1911 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.050 UTC [policies] Evaluate -> DEBU 1912 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:37.057 UTC [policies] Evaluate -> DEBU 1913 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:37.057 UTC [gossip.gossip] handleMessage -> DEBU 1914 Exiting" +"2019-05-02 09:27:37.057 UTC [gossip.gossip] handleMessage -> DEBU 1915 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.058 UTC [msp] DeserializeIdentity -> DEBU 1916 Obtaining identity" +"2019-05-02 09:27:37.064 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1917 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:37.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1918 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.073 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1919 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.073 UTC [policies] Evaluate -> DEBU 191a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:37.073 UTC [policies] Evaluate -> DEBU 191b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:37.073 UTC [policies] Evaluate -> DEBU 191c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:37.073 UTC [cauthdsl] func1 -> DEBU 191d 0xc0026ec260 gate 1556789257073691600 evaluation starts" +"2019-05-02 09:27:37.073 UTC [cauthdsl] func2 -> DEBU 191e 0xc0026ec260 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.073 UTC [cauthdsl] func2 -> DEBU 191f 0xc0026ec260 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1920 0xc0026ec260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1921 0xc0026ec260 principal evaluation fails" +"2019-05-02 09:27:37.074 UTC [cauthdsl] func1 -> DEBU 1922 0xc0026ec260 gate 1556789257073691600 evaluation fails" +"2019-05-02 09:27:37.074 UTC [policies] Evaluate -> DEBU 1923 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.074 UTC [policies] Evaluate -> DEBU 1924 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.074 UTC [policies] Evaluate -> DEBU 1925 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:37.074 UTC [cauthdsl] func1 -> DEBU 1926 0xc0026ecaa0 gate 1556789257074441500 evaluation starts" +"2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1927 0xc0026ecaa0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.074 UTC [cauthdsl] func2 -> DEBU 1928 0xc0026ecaa0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.075 UTC [cauthdsl] func2 -> DEBU 1929 0xc0026ecaa0 principal matched by identity 0" +"2019-05-02 09:27:37.075 UTC [msp] DeserializeIdentity -> DEBU 192a Obtaining identity" +"2019-05-02 09:27:37.075 UTC [msp.identity] Verify -> DEBU 192b Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +"2019-05-02 09:27:37.075 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" +"2019-05-02 09:27:37.075 UTC [msp.identity] Verify -> DEBU 192d Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +00000040 6f f6 d4 dd 46 29 |o...F)|" +"2019-05-02 09:27:37.075 UTC [gossip.comm] Send -> DEBU 192e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" +"2019-05-02 09:27:37.075 UTC [msp] DeserializeIdentity -> DEBU 192f Obtaining identity" +"2019-05-02 09:27:37.075 UTC [cauthdsl] func2 -> DEBU 1930 0xc0026ecaa0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:37.076 UTC [cauthdsl] func1 -> DEBU 1931 0xc0026ecaa0 gate 1556789257074441500 evaluation succeeds" +"2019-05-02 09:27:37.076 UTC [msp] DeserializeIdentity -> DEBU 1932 Obtaining identity" +"2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1933 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1934 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1935 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:37.076 UTC [policies] Evaluate -> DEBU 1937 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:37.076 UTC [gossip.comm] sendToEndpoint -> DEBU 1936 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.076 UTC [msp] DeserializeIdentity -> DEBU 1938 Obtaining identity" +"2019-05-02 09:27:37.076 UTC [gossip.comm] sendToEndpoint -> DEBU 1939 Exiting" +"2019-05-02 09:27:37.076 UTC [gossip.gossip] handleMessage -> DEBU 193a Exiting" +"2019-05-02 09:27:37.076 UTC [gossip.gossip] handleMessage -> DEBU 193b Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.076 UTC [msp] DeserializeIdentity -> DEBU 193c Obtaining identity" +"2019-05-02 09:27:37.076 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 193d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:37.077 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 193e Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.077 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 193f Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1940 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1941 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1942 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:37.077 UTC [cauthdsl] func1 -> DEBU 1943 0xc00270a920 gate 1556789257077287400 evaluation starts" +"2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1944 0xc00270a920 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1945 0xc00270a920 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1946 0xc00270a920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 1947 0xc00270a920 principal evaluation fails" +"2019-05-02 09:27:37.077 UTC [cauthdsl] func1 -> DEBU 1948 0xc00270a920 gate 1556789257077287400 evaluation fails" +"2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 1949 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 194a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.077 UTC [policies] Evaluate -> DEBU 194b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:37.077 UTC [cauthdsl] func1 -> DEBU 194c 0xc00270b160 gate 1556789257077808300 evaluation starts" +"2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 194d 0xc00270b160 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.077 UTC [cauthdsl] func2 -> DEBU 194e 0xc00270b160 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.078 UTC [cauthdsl] func2 -> DEBU 194f 0xc00270b160 principal matched by identity 0" +"2019-05-02 09:27:37.078 UTC [msp.identity] Verify -> DEBU 1950 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +"2019-05-02 09:27:37.078 UTC [msp.identity] Verify -> DEBU 1951 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +00000040 6f f6 d4 dd 46 29 |o...F)|" +"2019-05-02 09:27:37.078 UTC [cauthdsl] func2 -> DEBU 1952 0xc00270b160 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:37.078 UTC [cauthdsl] func1 -> DEBU 1953 0xc00270b160 gate 1556789257077808300 evaluation succeeds" +"2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1954 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1955 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1956 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:37.078 UTC [policies] Evaluate -> DEBU 1957 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:37.078 UTC [gossip.gossip] handleMessage -> DEBU 1958 Exiting" +"2019-05-02 09:27:37.078 UTC [gossip.comm] sendToEndpoint -> DEBU 1959 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789256932800200 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.079 UTC [gossip.comm] sendToEndpoint -> DEBU 195a Exiting" +"2019-05-02 09:27:37.121 UTC [gossip.pull] Hello -> DEBU 195b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:37.121 UTC [gossip.comm] Send -> DEBU 195c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:37.121 UTC [gossip.pull] Hello -> DEBU 195d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:27:37.121 UTC [gossip.comm] Send -> DEBU 195e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:37.121 UTC [gossip.pull] Hello -> DEBU 195f Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:27:37.121 UTC [gossip.comm] Send -> DEBU 1960 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:37.121 UTC [gossip.comm] sendToEndpoint -> DEBU 1961 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.121 UTC [gossip.comm] sendToEndpoint -> DEBU 1962 Exiting" +"2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 1963 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151016 " +"2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 1964 Sign: digest: EF7A3BC1C3331D871758D2E0BD699A5307DD180B35BEE6D3A2B817AF4CDE8DB7 " +"2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 1965 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:37.122 UTC [gossip.comm] sendToEndpoint -> DEBU 1966 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.122 UTC [gossip.comm] sendToEndpoint -> DEBU 1967 Exiting" +"2019-05-02 09:27:37.124 UTC [gossip.comm] sendToEndpoint -> DEBU 1968 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.125 UTC [gossip.comm] sendToEndpoint -> DEBU 1969 Exiting" +"2019-05-02 09:27:37.122 UTC [msp.identity] Sign -> DEBU 196a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:37.136 UTC [gossip.comm] Send -> DEBU 196b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:37.136 UTC [msp] DeserializeIdentity -> DEBU 196c Obtaining identity" +"2019-05-02 09:27:37.136 UTC [gossip.comm] Send -> DEBU 196d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:37.136 UTC [msp] DeserializeIdentity -> DEBU 196e Obtaining identity" +"2019-05-02 09:27:37.137 UTC [gossip.comm] Send -> DEBU 196f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1970 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1971 Exiting" +"2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1972 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1973 Exiting" +"2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1974 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.137 UTC [gossip.comm] sendToEndpoint -> DEBU 1975 Exiting" +"2019-05-02 09:27:37.151 UTC [gossip.gossip] handleMessage -> DEBU 1976 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14406783678540006922 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.152 UTC [gossip.pull] HandleMessage -> DEBU 1977 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14406783678540006922 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.152 UTC [gossip.gossip] handleMessage -> DEBU 1978 Exiting" +"2019-05-02 09:27:37.152 UTC [gossip.gossip] handleMessage -> DEBU 1979 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.152 UTC [gossip.gossip] handleMessage -> DEBU 197a Exiting" +"2019-05-02 09:27:37.152 UTC [gossip.discovery] handleMsgFromComm -> DEBU 197b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.152 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 197c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:37.152 UTC [msp.identity] Verify -> DEBU 197d Verify: digest = 00000000 ef 7a 3b c1 c3 33 1d 87 17 58 d2 e0 bd 69 9a 53 |.z;..3...X...i.S| +00000010 07 dd 18 0b 35 be e6 d3 a2 b8 17 af 4c de 8d b7 |....5.......L...|" +"2019-05-02 09:27:37.152 UTC [msp.identity] Verify -> DEBU 197e Verify: sig = 00000000 30 44 02 20 66 a7 c6 35 cd 70 66 a7 71 74 78 6d |0D. f..5.pf.qtxm| +00000010 80 73 a8 61 43 9c 2c 1c 28 13 e9 2a 16 03 02 14 |.s.aC.,.(..*....| +00000020 53 65 aa 05 02 20 4e bd b8 d6 83 1a 13 94 0a 3b |Se... N........;| +00000030 dc 72 b0 a7 64 5b d9 01 57 bf b8 76 a9 97 9b 3f |.r..d[..W..v...?| +00000040 42 a9 b1 78 48 60 |B..xH`|" +"2019-05-02 09:27:37.153 UTC [gossip.discovery] handleAliveMessage -> DEBU 197f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.153 UTC [gossip.discovery] isSentByMe -> DEBU 1980 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.153 UTC [gossip.discovery] handleAliveMessage -> DEBU 1981 Exiting" +"2019-05-02 09:27:37.153 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1982 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:37.153 UTC [msp] DeserializeIdentity -> DEBU 1983 Obtaining identity" +"2019-05-02 09:27:37.153 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1984 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:37.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1985 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1986 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.153 UTC [policies] Evaluate -> DEBU 1987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:37.153 UTC [policies] Evaluate -> DEBU 1988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:37.153 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:37.154 UTC [cauthdsl] func1 -> DEBU 198a 0xc002cafc70 gate 1556789257153991900 evaluation starts" +"2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198b 0xc002cafc70 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198c 0xc002cafc70 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198d 0xc002cafc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 198e 0xc002cafc70 principal evaluation fails" +"2019-05-02 09:27:37.154 UTC [cauthdsl] func1 -> DEBU 198f 0xc002cafc70 gate 1556789257153991900 evaluation fails" +"2019-05-02 09:27:37.154 UTC [policies] Evaluate -> DEBU 1990 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.154 UTC [policies] Evaluate -> DEBU 1991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.154 UTC [policies] Evaluate -> DEBU 1992 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:37.154 UTC [cauthdsl] func1 -> DEBU 1993 0xc0035ac4b0 gate 1556789257154617400 evaluation starts" +"2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 1994 0xc0035ac4b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 1995 0xc0035ac4b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.154 UTC [cauthdsl] func2 -> DEBU 1996 0xc0035ac4b0 principal matched by identity 0" +"2019-05-02 09:27:37.154 UTC [msp.identity] Verify -> DEBU 1997 Verify: digest = 00000000 7e 36 2b 74 13 45 8f 14 60 07 ed 72 c2 22 cc 88 |~6+t.E..`..r."..| +00000010 aa 38 9c a9 71 2d 5a 2c 15 9d 0f 24 9c c4 67 1a |.8..q-Z,...$..g.|" +"2019-05-02 09:27:37.154 UTC [msp.identity] Verify -> DEBU 1998 Verify: sig = 00000000 30 45 02 21 00 9c 1c 0d 70 36 3d 31 a9 cb 15 3b |0E.!....p6=1...;| +00000010 f4 55 60 0a c1 d0 74 20 11 63 79 e5 a6 2b 56 a6 |.U`...t .cy..+V.| +00000020 5d ed 9a 0e 4c 02 20 73 25 81 4a 88 30 c3 45 25 |]...L. s%.J.0.E%| +00000030 a6 38 d3 6f 43 8d 41 44 d2 06 f3 be b5 31 12 2a |.8.oC.AD.....1.*| +00000040 6b fb cf fb ee d8 97 |k......|" +"2019-05-02 09:27:37.155 UTC [cauthdsl] func2 -> DEBU 1999 0xc0035ac4b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:37.155 UTC [cauthdsl] func1 -> DEBU 199a 0xc0035ac4b0 gate 1556789257154617400 evaluation succeeds" +"2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199d Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:37.155 UTC [policies] Evaluate -> DEBU 199e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:37.155 UTC [gossip.discovery] handleAliveMessage -> DEBU 199f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:37.155 UTC [gossip.discovery] handleAliveMessage -> DEBU 19a0 Exiting" +"2019-05-02 09:27:37.155 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19a1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:37.156 UTC [msp.identity] Verify -> DEBU 19a2 Verify: digest = 00000000 3f 8b 8c 94 3e 52 56 4b a5 07 51 1e 9f c1 a8 76 |?...>RVK..Q....v| +00000010 06 65 f8 45 39 c3 5b 0a 98 29 bc 6d b8 29 05 5e |.e.E9.[..).m.).^|" +"2019-05-02 09:27:37.156 UTC [msp.identity] Verify -> DEBU 19a3 Verify: sig = 00000000 30 44 02 20 15 c8 47 f0 8d 33 9d 8f 28 c0 7b 7c |0D. ..G..3..(.{|| +00000010 7e 34 6c 16 c8 84 30 67 fd 47 e7 ff be c8 1b 97 |~4l...0g.G......| +00000020 7f d5 63 d0 02 20 0d bc 23 12 ae 36 52 86 fd d3 |..c.. ..#..6R...| +00000030 38 21 8f c3 39 61 b6 1a fe b2 34 e2 95 1e 56 dc |8!..9a....4...V.| +00000040 55 8c 8c 5e 88 d8 |U..^..|" +"2019-05-02 09:27:37.167 UTC [gossip.comm] func1 -> DEBU 19a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17964909712877384058 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.167 UTC [gossip.comm] func1 -> DEBU 19a5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.167 UTC [gossip.gossip] handleMessage -> DEBU 19a6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17964909712877384058 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.168 UTC [gossip.pull] HandleMessage -> DEBU 19a7 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17964909712877384058 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.169 UTC [gossip.gossip] handleMessage -> DEBU 19a8 Exiting" +"2019-05-02 09:27:37.170 UTC [gossip.gossip] handleMessage -> DEBU 19a9 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 19aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.172 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ab Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:37.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ac updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 " +"2019-05-02 09:27:37.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ad Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 " +"2019-05-02 09:27:37.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ae Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:37.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 19af Exiting" +"2019-05-02 09:27:37.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 19b0 Exiting" +"2019-05-02 09:27:37.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19b1 Exiting" +"2019-05-02 09:27:37.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19b3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:37.174 UTC [msp.identity] Verify -> DEBU 19b4 Verify: digest = 00000000 ef 7a 3b c1 c3 33 1d 87 17 58 d2 e0 bd 69 9a 53 |.z;..3...X...i.S| +00000010 07 dd 18 0b 35 be e6 d3 a2 b8 17 af 4c de 8d b7 |....5.......L...|" +"2019-05-02 09:27:37.174 UTC [msp.identity] Verify -> DEBU 19b5 Verify: sig = 00000000 30 44 02 20 66 a7 c6 35 cd 70 66 a7 71 74 78 6d |0D. f..5.pf.qtxm| +00000010 80 73 a8 61 43 9c 2c 1c 28 13 e9 2a 16 03 02 14 |.s.aC.,.(..*....| +00000020 53 65 aa 05 02 20 4e bd b8 d6 83 1a 13 94 0a 3b |Se... N........;| +00000030 dc 72 b0 a7 64 5b d9 01 57 bf b8 76 a9 97 9b 3f |.r..d[..W..v...?| +00000040 42 a9 b1 78 48 60 |B..xH`|" +"2019-05-02 09:27:37.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 19b6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.174 UTC [gossip.discovery] isSentByMe -> DEBU 19b7 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 19b8 Exiting" +"2019-05-02 09:27:37.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19b9 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19ba Exiting" +"2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19bb Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17288215980809784081 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.175 UTC [gossip.pull] HandleMessage -> DEBU 19bc GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17288215980809784081 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19bd Exiting" +"2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19be Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.175 UTC [gossip.pull] HandleMessage -> DEBU 19bf GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.175 UTC [gossip.pull] SendDigest -> DEBU 19c0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19c1 Exiting" +"2019-05-02 09:27:37.175 UTC [gossip.gossip] handleMessage -> DEBU 19c2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.175 UTC [msp.identity] Verify -> DEBU 19c3 Verify: digest = 00000000 3f 8b 8c 94 3e 52 56 4b a5 07 51 1e 9f c1 a8 76 |?...>RVK..Q....v| +00000010 06 65 f8 45 39 c3 5b 0a 98 29 bc 6d b8 29 05 5e |.e.E9.[..).m.).^|" +"2019-05-02 09:27:37.175 UTC [msp.identity] Verify -> DEBU 19c4 Verify: sig = 00000000 30 44 02 20 15 c8 47 f0 8d 33 9d 8f 28 c0 7b 7c |0D. ..G..3..(.{|| +00000010 7e 34 6c 16 c8 84 30 67 fd 47 e7 ff be c8 1b 97 |~4l...0g.G......| +00000020 7f d5 63 d0 02 20 0d bc 23 12 ae 36 52 86 fd d3 |..c.. ..#..6R...| +00000030 38 21 8f c3 39 61 b6 1a fe b2 34 e2 95 1e 56 dc |8!..9a....4...V.| +00000040 55 8c 8c 5e 88 d8 |U..^..|" +"2019-05-02 09:27:37.176 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:37.176 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c6 Exiting" +"2019-05-02 09:27:37.176 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19c7 Exiting" +"2019-05-02 09:27:37.176 UTC [gossip.gossip] handleMessage -> DEBU 19c8 Exiting" +"2019-05-02 09:27:37.176 UTC [gossip.gossip] handleMessage -> DEBU 19c9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.176 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.176 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19cb Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:37.177 UTC [msp.identity] Verify -> DEBU 19cc Verify: digest = 00000000 3f 8b 8c 94 3e 52 56 4b a5 07 51 1e 9f c1 a8 76 |?...>RVK..Q....v| +00000010 06 65 f8 45 39 c3 5b 0a 98 29 bc 6d b8 29 05 5e |.e.E9.[..).m.).^|" +"2019-05-02 09:27:37.177 UTC [msp.identity] Verify -> DEBU 19cd Verify: sig = 00000000 30 44 02 20 15 c8 47 f0 8d 33 9d 8f 28 c0 7b 7c |0D. ..G..3..(.{|| +00000010 7e 34 6c 16 c8 84 30 67 fd 47 e7 ff be c8 1b 97 |~4l...0g.G......| +00000020 7f d5 63 d0 02 20 0d bc 23 12 ae 36 52 86 fd d3 |..c.. ..#..6R...| +00000030 38 21 8f c3 39 61 b6 1a fe b2 34 e2 95 1e 56 dc |8!..9a....4...V.| +00000040 55 8c 8c 5e 88 d8 |U..^..|" +"2019-05-02 09:27:37.178 UTC [msp.identity] Verify -> DEBU 19ce Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:27:37.178 UTC [msp.identity] Verify -> DEBU 19cf Verify: sig = 00000000 30 45 02 21 00 dc 48 35 01 4d 94 b3 90 84 da ab |0E.!..H5.M......| +00000010 3b 00 de 0e 9c d6 81 65 5e 5f 22 43 35 d1 17 f5 |;......e^_"C5...| +00000020 48 d6 aa ad 17 02 20 52 39 9e 4b 78 07 c5 9c e9 |H..... R9.Kx....| +00000030 98 b4 94 83 cc d3 06 8f cb 70 9b 33 69 3f 05 72 |.........p.3i?.r| +00000040 b4 41 46 6b c6 47 ca |.AFk.G.|" +"2019-05-02 09:27:37.178 UTC [gossip.discovery] handleAliveMessage -> DEBU 19d0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:37.179 UTC [gossip.discovery] handleAliveMessage -> DEBU 19d1 Exiting" +"2019-05-02 09:27:37.179 UTC [gossip.discovery] sendMemResponse -> DEBU 19d2 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:37.179 UTC [msp] DeserializeIdentity -> DEBU 19d3 Obtaining identity" +"2019-05-02 09:27:37.179 UTC [msp] DeserializeIdentity -> DEBU 19d4 Obtaining identity" +"2019-05-02 09:27:37.179 UTC [gossip.comm] Send -> DEBU 19d5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:37.179 UTC [gossip.discovery] sendMemResponse -> DEBU 19d6 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:37.179 UTC [gossip.comm] sendToEndpoint -> DEBU 19d7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.179 UTC [gossip.comm] sendToEndpoint -> DEBU 19d8 Exiting" +"2019-05-02 09:27:37.179 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19d9 Exiting" +"2019-05-02 09:27:37.182 UTC [gossip.gossip] handleMessage -> DEBU 19da Exiting" +"2019-05-02 09:27:37.183 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19dc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:37.184 UTC [msp.identity] Verify -> DEBU 19dd Verify: digest = 00000000 ef 7a 3b c1 c3 33 1d 87 17 58 d2 e0 bd 69 9a 53 |.z;..3...X...i.S| +00000010 07 dd 18 0b 35 be e6 d3 a2 b8 17 af 4c de 8d b7 |....5.......L...|" +"2019-05-02 09:27:37.185 UTC [msp.identity] Verify -> DEBU 19de Verify: sig = 00000000 30 44 02 20 66 a7 c6 35 cd 70 66 a7 71 74 78 6d |0D. f..5.pf.qtxm| +00000010 80 73 a8 61 43 9c 2c 1c 28 13 e9 2a 16 03 02 14 |.s.aC.,.(..*....| +00000020 53 65 aa 05 02 20 4e bd b8 d6 83 1a 13 94 0a 3b |Se... N........;| +00000030 dc 72 b0 a7 64 5b d9 01 57 bf b8 76 a9 97 9b 3f |.r..d[..W..v...?| +00000040 42 a9 b1 78 48 60 |B..xH`|" +"2019-05-02 09:27:37.188 UTC [msp.identity] Verify -> DEBU 19df Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-05-02 09:27:37.188 UTC [msp.identity] Verify -> DEBU 19e0 Verify: sig = 00000000 30 44 02 20 03 ce cf 3f 7f 93 0c a1 a2 a6 0f bc |0D. ...?........| +00000010 be 27 78 ca 90 05 e8 98 88 4f 38 94 58 de ac ca |.'x......O8.X...| +00000020 3d a6 0d 08 02 20 41 e8 8b ca 4e 1a 73 69 b1 2e |=.... A...N.si..| +00000030 a1 d2 0b 22 af 45 fd 97 db 4b 45 78 85 e5 ba 5a |...".E...KEx...Z| +00000040 8d 90 d6 4a 60 28 |...J`(|" +"2019-05-02 09:27:37.189 UTC [gossip.discovery] handleAliveMessage -> DEBU 19e1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:37.189 UTC [gossip.discovery] isSentByMe -> DEBU 19e2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:37.189 UTC [gossip.discovery] handleAliveMessage -> DEBU 19e3 Exiting" +"2019-05-02 09:27:37.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19e4 Exiting" +"2019-05-02 09:27:37.204 UTC [gossip.gossip] handleMessage -> DEBU 19e5 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.204 UTC [gossip.pull] HandleMessage -> DEBU 19e6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.204 UTC [msp] DeserializeIdentity -> DEBU 19e7 Obtaining identity" +"2019-05-02 09:27:37.205 UTC [msp] DeserializeIdentity -> DEBU 19e8 Obtaining identity" +"2019-05-02 09:27:37.205 UTC [msp] DeserializeIdentity -> DEBU 19e9 Obtaining identity" +"2019-05-02 09:27:37.206 UTC [msp] DeserializeIdentity -> DEBU 19ea Obtaining identity" +"2019-05-02 09:27:37.206 UTC [msp] DeserializeIdentity -> DEBU 19eb Obtaining identity" +"2019-05-02 09:27:37.206 UTC [msp] DeserializeIdentity -> DEBU 19ec Obtaining identity" +"2019-05-02 09:27:37.206 UTC [gossip.pull] SendDigest -> DEBU 19ed Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:37.207 UTC [gossip.gossip] handleMessage -> DEBU 19ee Exiting" +"2019-05-02 09:27:37.211 UTC [gossip.gossip] handleMessage -> DEBU 19ef Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.217 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19f0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.217 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19f1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:37.218 UTC [msp] DeserializeIdentity -> DEBU 19f2 Obtaining identity" +"2019-05-02 09:27:37.219 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:37.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19f4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19f5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:37.223 UTC [policies] Evaluate -> DEBU 19f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:37.225 UTC [policies] Evaluate -> DEBU 19f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:37.225 UTC [policies] Evaluate -> DEBU 19f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:37.226 UTC [cauthdsl] func1 -> DEBU 19fa 0xc0036a0b10 gate 1556789257225985100 evaluation starts" +"2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fb 0xc0036a0b10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fc 0xc0036a0b10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fd 0xc0036a0b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:37.226 UTC [cauthdsl] func2 -> DEBU 19fe 0xc0036a0b10 principal evaluation fails" +"2019-05-02 09:27:37.226 UTC [cauthdsl] func1 -> DEBU 19ff 0xc0036a0b10 gate 1556789257225985100 evaluation fails" +"2019-05-02 09:27:37.226 UTC [policies] Evaluate -> DEBU 1a00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.226 UTC [policies] Evaluate -> DEBU 1a01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.226 UTC [policies] Evaluate -> DEBU 1a02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:37.226 UTC [cauthdsl] func1 -> DEBU 1a03 0xc0036a1350 gate 1556789257226546100 evaluation starts" +"2019-05-02 09:27:37.227 UTC [cauthdsl] func2 -> DEBU 1a04 0xc0036a1350 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.228 UTC [cauthdsl] func2 -> DEBU 1a05 0xc0036a1350 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.228 UTC [cauthdsl] func2 -> DEBU 1a06 0xc0036a1350 principal matched by identity 0" +"2019-05-02 09:27:37.228 UTC [msp.identity] Verify -> DEBU 1a07 Verify: digest = 00000000 4a 51 f9 d3 1d 86 6c cc 00 8a 03 00 8c 20 bb 03 |JQ....l...... ..| +00000010 56 fc b2 87 56 45 db 1c ea 71 fa fb 76 b6 10 bd |V...VE...q..v...|" +"2019-05-02 09:27:37.228 UTC [msp.identity] Verify -> DEBU 1a08 Verify: sig = 00000000 30 45 02 21 00 be 43 3e be c0 b7 4f 20 bb 4a 35 |0E.!..C>...O .J5| +00000010 f8 12 79 0c 5b ce 3c a9 bf a4 49 73 50 b5 38 42 |..y.[.<...IsP.8B| +00000020 8f 37 f4 ce 57 02 20 5d d2 7b 94 28 e4 d1 9a aa |.7..W. ].{.(....| +00000030 1a 4d df 0a 9b e2 a8 81 e7 f6 d0 c0 4d 76 b2 0a |.M..........Mv..| +00000040 11 d2 26 c1 d6 2b 9c |..&..+.|" +"2019-05-02 09:27:37.228 UTC [cauthdsl] func2 -> DEBU 1a09 0xc0036a1350 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:37.228 UTC [cauthdsl] func1 -> DEBU 1a0a 0xc0036a1350 gate 1556789257226546100 evaluation succeeds" +"2019-05-02 09:27:37.228 UTC [policies] Evaluate -> DEBU 1a0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.228 UTC [policies] Evaluate -> DEBU 1a0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:37.229 UTC [policies] Evaluate -> DEBU 1a0d Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:37.229 UTC [policies] Evaluate -> DEBU 1a0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:37.231 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a0f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:37.213 UTC [gossip.gossip] handleMessage -> DEBU 19f7 Exiting" +"2019-05-02 09:27:37.231 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a10 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a11 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 " +"2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a12 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 " +"2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a13 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:37.232 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a14 Exiting" +"2019-05-02 09:27:37.232 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a15 Exiting" +"2019-05-02 09:27:37.232 UTC [gossip.discovery] sendMemResponse -> DEBU 1a16 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:37.232 UTC [msp] DeserializeIdentity -> DEBU 1a17 Obtaining identity" +"2019-05-02 09:27:37.232 UTC [msp] DeserializeIdentity -> DEBU 1a18 Obtaining identity" +"2019-05-02 09:27:37.232 UTC [msp] DeserializeIdentity -> DEBU 1a19 Obtaining identity" +"2019-05-02 09:27:37.232 UTC [gossip.comm] Send -> DEBU 1a1a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:37.234 UTC [gossip.discovery] sendMemResponse -> DEBU 1a1b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:37.235 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:37.235 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1d Exiting" +"2019-05-02 09:27:37.232 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a1e Exiting" +"2019-05-02 09:27:37.342 UTC [gossip.election] waitForInterrupt -> DEBU 1a1f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:27:37.342 UTC [gossip.election] IsLeader -> DEBU 1a20 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:27:37.342 UTC [msp.identity] Sign -> DEBU 1a21 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510051801 " +"2019-05-02 09:27:37.343 UTC [msp.identity] Sign -> DEBU 1a22 Sign: digest: 810E30A8E997A8A9AA9C43723F5CC5F64CA5EFB1EE6590C4CC57E5051125EA97 " +"2019-05-02 09:27:37.343 UTC [gossip.election] waitForInterrupt -> DEBU 1a23 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:37.346 UTC [msp] DeserializeIdentity -> DEBU 1a24 Obtaining identity" +"2019-05-02 09:27:37.346 UTC [msp] DeserializeIdentity -> DEBU 1a25 Obtaining identity" +"2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a26 Obtaining identity" +"2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a27 Obtaining identity" +"2019-05-02 09:27:37.347 UTC [gossip.comm] Send -> DEBU 1a28 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a29 Obtaining identity" +"2019-05-02 09:27:37.347 UTC [msp] DeserializeIdentity -> DEBU 1a2a Obtaining identity" +"2019-05-02 09:27:37.347 UTC [gossip.comm] sendToEndpoint -> DEBU 1a2b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-05-02 09:27:37.348 UTC [gossip.comm] sendToEndpoint -> DEBU 1a2c Exiting" +"2019-05-02 09:27:37.509 UTC [endorser] ProcessProposal -> DEBU 1a2d Entering: request from 172.18.0.8:57326" +"2019-05-02 09:27:37.510 UTC [protoutils] ValidateProposalMessage -> DEBU 1a2e ValidateProposalMessage starts for signed proposal 0xc002ca5900" +"2019-05-02 09:27:37.510 UTC [protoutils] validateChannelHeader -> DEBU 1a2f validateChannelHeader info: header type 3" +"2019-05-02 09:27:37.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a30 begin" +"2019-05-02 09:27:37.510 UTC [msp] GetManagerForChain -> DEBU 1a31 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:37.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a32 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:37.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a33 creator is valid" +"2019-05-02 09:27:37.510 UTC [msp.identity] Verify -> DEBU 1a34 Verify: digest = 00000000 e9 a8 68 b3 ba 7b 95 20 c7 1b 49 a8 64 ae 88 09 |..h..{. ..I.d...| +00000010 ee d8 b7 fc d0 3f 20 4f 5c 3a 86 6c 51 3b bf ea |.....? O\:.lQ;..|" +"2019-05-02 09:27:37.510 UTC [msp.identity] Verify -> DEBU 1a35 Verify: sig = 00000000 30 45 02 21 00 de 51 2a 63 f5 8e 51 08 0b 32 1e |0E.!..Q*c..Q..2.| +00000010 82 b2 30 d6 a3 ca ca 51 22 a4 39 3f 54 1f bb 9a |..0....Q".9?T...| +00000020 2e 73 6b 51 00 02 20 70 30 2c b9 76 87 b6 1c db |.skQ.. p0,.v....| +00000030 8c d8 47 40 bc 39 29 92 e8 b0 52 3a 8a a1 f3 4c |..G@.9)...R:...L| +00000040 74 f2 9d 56 35 fe a7 |t..V5..|" +"2019-05-02 09:27:37.511 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a36 exits successfully" +"2019-05-02 09:27:37.511 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a37 validateChaincodeProposalMessage starts for proposal 0xc002f2ea80, header 0xc002ca5d10" +"2019-05-02 09:27:37.511 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a38 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-05-02 09:27:37.511 UTC [endorser] preProcess -> DEBU 1a39 [businesschannel][2a51a49a] processing txid: 2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff" +"2019-05-02 09:27:37.512 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1a3a retrieveTransactionByID() - txId = [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]" +"2019-05-02 09:27:37.512 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1a3b constructing new tx simulator" +"2019-05-02 09:27:37.512 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1a3c constructing new tx simulator txid = [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]" +"2019-05-02 09:27:37.512 UTC [endorser] SimulateProposal -> DEBU 1a3d [businesschannel][2a51a49a] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:37.512 UTC [endorser] callChaincode -> INFO 1a3e [businesschannel][2a51a49a] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:37.512 UTC [chaincode] Execute -> DEBU 1a3f Entry" +"2019-05-02 09:27:37.513 UTC [aclmgmt] CheckACL -> DEBU 1a40 acl policy /Channel/Application/Readers found in config for resource _lifecycle/QueryChaincodeDefinition" +"2019-05-02 09:27:37.513 UTC [aclmgmt] CheckACL -> DEBU 1a41 acl check(/Channel/Application/Readers)" +"2019-05-02 09:27:37.513 UTC [policies] Evaluate -> DEBU 1a42 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:37.513 UTC [policies] Evaluate -> DEBU 1a43 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:37.513 UTC [policies] Evaluate -> DEBU 1a44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:37.514 UTC [cauthdsl] func1 -> DEBU 1a45 0xc003222f10 gate 1556789257514105800 evaluation starts" +"2019-05-02 09:27:37.514 UTC [cauthdsl] func2 -> DEBU 1a46 0xc003222f10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:37.514 UTC [cauthdsl] func2 -> DEBU 1a47 0xc003222f10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:37.514 UTC [cauthdsl] func2 -> DEBU 1a48 0xc003222f10 principal matched by identity 0" +"2019-05-02 09:27:37.514 UTC [msp.identity] Verify -> DEBU 1a49 Verify: digest = 00000000 e9 a8 68 b3 ba 7b 95 20 c7 1b 49 a8 64 ae 88 09 |..h..{. ..I.d...| +00000010 ee d8 b7 fc d0 3f 20 4f 5c 3a 86 6c 51 3b bf ea |.....? O\:.lQ;..|" +"2019-05-02 09:27:37.514 UTC [msp.identity] Verify -> DEBU 1a4a Verify: sig = 00000000 30 45 02 21 00 de 51 2a 63 f5 8e 51 08 0b 32 1e |0E.!..Q*c..Q..2.| +00000010 82 b2 30 d6 a3 ca ca 51 22 a4 39 3f 54 1f bb 9a |..0....Q".9?T...| +00000020 2e 73 6b 51 00 02 20 70 30 2c b9 76 87 b6 1c db |.skQ.. p0,.v....| +00000030 8c d8 47 40 bc 39 29 92 e8 b0 52 3a 8a a1 f3 4c |..G@.9)...R:...L| +00000040 74 f2 9d 56 35 fe a7 |t..V5..|" +"2019-05-02 09:27:37.515 UTC [cauthdsl] func2 -> DEBU 1a4b 0xc003222f10 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:37.515 UTC [cauthdsl] func1 -> DEBU 1a4c 0xc003222f10 gate 1556789257514105800 evaluation succeeds" +"2019-05-02 09:27:37.515 UTC [policies] Evaluate -> DEBU 1a4d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.515 UTC [policies] Evaluate -> DEBU 1a4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:37.515 UTC [policies] Evaluate -> DEBU 1a4f Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:37.516 UTC [policies] Evaluate -> DEBU 1a50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:37.516 UTC [lifecycle] QueryChaincodeDefinition -> DEBU 1a51 received invocation of QueryChaincodeDefinition on channel 'businesschannel' for chaincode 'exp02'" +"2019-05-02 09:27:37.516 UTC [chaincode] handleMessage -> DEBU 1a52 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:37.516 UTC [chaincode] HandleTransaction -> DEBU 1a53 [2a51a49a] handling GET_STATE from chaincode" +"2019-05-02 09:27:37.517 UTC [chaincode] HandleGetState -> DEBU 1a54 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" +"2019-05-02 09:27:37.517 UTC [stateleveldb] GetState -> DEBU 1a55 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-05-02 09:27:37.517 UTC [chaincode] HandleTransaction -> DEBU 1a56 [2a51a49a] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:37.517 UTC [chaincode] handleMessage -> DEBU 1a57 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:37.518 UTC [chaincode] HandleTransaction -> DEBU 1a58 [2a51a49a] handling GET_STATE from chaincode" +"2019-05-02 09:27:37.518 UTC [chaincode] HandleGetState -> DEBU 1a59 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +"2019-05-02 09:27:37.518 UTC [stateleveldb] GetState -> DEBU 1a5a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:37.518 UTC [chaincode] HandleTransaction -> DEBU 1a5b [2a51a49a] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:37.518 UTC [chaincode] handleMessage -> DEBU 1a5c [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:37.518 UTC [chaincode] HandleTransaction -> DEBU 1a5d [2a51a49a] handling GET_STATE from chaincode" +"2019-05-02 09:27:37.519 UTC [chaincode] HandleGetState -> DEBU 1a5e [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/EndorsementInfo, channel businesschannel" +"2019-05-02 09:27:37.519 UTC [stateleveldb] GetState -> DEBU 1a5f GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +"2019-05-02 09:27:37.519 UTC [chaincode] HandleTransaction -> DEBU 1a60 [2a51a49a] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:37.520 UTC [chaincode] handleMessage -> DEBU 1a61 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:37.520 UTC [chaincode] HandleTransaction -> DEBU 1a62 [2a51a49a] handling GET_STATE from chaincode" +"2019-05-02 09:27:37.520 UTC [chaincode] HandleGetState -> DEBU 1a63 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/ValidationInfo, channel businesschannel" +"2019-05-02 09:27:37.520 UTC [stateleveldb] GetState -> DEBU 1a64 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +"2019-05-02 09:27:37.520 UTC [chaincode] HandleTransaction -> DEBU 1a65 [2a51a49a] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:37.521 UTC [chaincode] handleMessage -> DEBU 1a66 [2a51a49a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:37.521 UTC [chaincode] HandleTransaction -> DEBU 1a67 [2a51a49a] handling GET_STATE from chaincode" +"2019-05-02 09:27:37.521 UTC [chaincode] HandleGetState -> DEBU 1a68 [2a51a49a] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Collections, channel businesschannel" +"2019-05-02 09:27:37.522 UTC [stateleveldb] GetState -> DEBU 1a69 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +"2019-05-02 09:27:37.522 UTC [chaincode] HandleTransaction -> DEBU 1a6a [2a51a49a] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:37.522 UTC [lifecycle] QueryChaincodeDefinition -> INFO 1a6b successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +"2019-05-02 09:27:37.523 UTC [chaincode] handleMessage -> DEBU 1a6c [2a51a49a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:37.523 UTC [chaincode] Notify -> DEBU 1a6d [2a51a49a] notifying Txid:2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff, channelID:businesschannel" +"2019-05-02 09:27:37.524 UTC [chaincode] Execute -> DEBU 1a6e Exit" +"2019-05-02 09:27:37.524 UTC [endorser] callChaincode -> INFO 1a6f [businesschannel][2a51a49a] Exit chaincode: name:"_lifecycle" (12ms)" +"2019-05-02 09:27:37.524 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1a70 Simulation completed, getting simulation results" +"2019-05-02 09:27:37.525 UTC [lockbasedtxmgr] Done -> DEBU 1a71 Done with transaction simulation / query execution [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]" +"2019-05-02 09:27:37.525 UTC [endorser] SimulateProposal -> DEBU 1a72 [businesschannel][2a51a49a] Exit" +"2019-05-02 09:27:37.525 UTC [endorser] endorseProposal -> DEBU 1a73 [businesschannel][2a51a49a] Entry chaincode: name:"_lifecycle" " +"2019-05-02 09:27:37.525 UTC [endorser] endorseProposal -> DEBU 1a74 [businesschannel][2a51a49a] escc for chaincode name:"_lifecycle" is escc" +"2019-05-02 09:27:37.526 UTC [endorser] EndorseWithPlugin -> DEBU 1a75 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff, chaincode: _lifecycle}" +"2019-05-02 09:27:37.526 UTC [msp.identity] Sign -> DEBU 1a76 Sign: plaintext: 0A20B348ED120D53BACF7A3C86E9718B...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:37.526 UTC [msp.identity] Sign -> DEBU 1a77 Sign: digest: C553EED6EE12E50E703B964FE3C4765A5066983801BEF1DB8B440E28787F0154 " +"2019-05-02 09:27:37.527 UTC [endorser] EndorseWithPlugin -> DEBU 1a78 Exiting {plugin: escc, channel: businesschannel, tx: 2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff, chaincode: _lifecycle}" +"2019-05-02 09:27:37.527 UTC [endorser] endorseProposal -> DEBU 1a79 [businesschannel][2a51a49a] Exit" +"2019-05-02 09:27:37.527 UTC [lockbasedtxmgr] Done -> DEBU 1a7a Done with transaction simulation / query execution [2a51a49a98f61a029b2ea21763a6f62d98d9902ee2603e8eaa6a4099f6c19dff]" +"2019-05-02 09:27:37.527 UTC [endorser] func1 -> DEBU 1a7b Exit: request from 172.18.0.8:57326" +"2019-05-02 09:27:37.528 UTC [comm.grpc.server] 1 -> INFO 1a7c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57326 grpc.code=OK grpc.call_duration=18.6284ms +"2019-05-02 09:27:37.531 UTC [grpc] infof -> DEBU 1a7d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:37.531 UTC [grpc] warningf -> DEBU 1a7e transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.8:57326: read: connection reset by peer" +"2019-05-02 09:27:37.531 UTC [grpc] infof -> DEBU 1a7f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:38.274 UTC [endorser] ProcessProposal -> DEBU 1a80 Entering: request from 172.18.0.8:57334" +"2019-05-02 09:27:38.274 UTC [protoutils] ValidateProposalMessage -> DEBU 1a81 ValidateProposalMessage starts for signed proposal 0xc0036875e0" +"2019-05-02 09:27:38.274 UTC [protoutils] validateChannelHeader -> DEBU 1a82 validateChannelHeader info: header type 3" +"2019-05-02 09:27:38.274 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a83 begin" +"2019-05-02 09:27:38.274 UTC [msp] GetManagerForChain -> DEBU 1a84 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:38.275 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a85 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:38.275 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a86 creator is valid" +"2019-05-02 09:27:38.275 UTC [msp.identity] Verify -> DEBU 1a87 Verify: digest = 00000000 93 da 45 8a 61 0c ee c7 d7 82 fa 30 30 e3 3e 12 |..E.a......00.>.| +00000010 7d 3d 79 a4 c0 2c 71 fe 1d 84 b6 b5 89 c0 5b 0d |}=y..,q.......[.|" +"2019-05-02 09:27:38.275 UTC [msp.identity] Verify -> DEBU 1a88 Verify: sig = 00000000 30 44 02 20 57 a5 c7 ae 81 47 5f 04 e2 a0 49 22 |0D. W....G_...I"| +00000010 7a d4 57 cd 67 01 f9 ae 23 bf 4b 01 63 cb de 3c |z.W.g...#.K.c..<| +00000020 d1 c0 2b a2 02 20 04 be 2a 62 2a 04 5c a4 e2 03 |..+.. ..*b*.\...| +00000030 d0 fd fd 0d 93 d9 63 59 05 e1 a6 5b ef 0e fc 8c |......cY...[....| +00000040 7f 15 3e 12 d2 13 |..>...|" +"2019-05-02 09:27:38.275 UTC [protoutils] checkSignatureFromCreator -> DEBU 1a89 exits successfully" +"2019-05-02 09:27:38.275 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a8a validateChaincodeProposalMessage starts for proposal 0xc002e6ce00, header 0xc0036879f0" +"2019-05-02 09:27:38.276 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1a8b validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-05-02 09:27:38.276 UTC [endorser] preProcess -> DEBU 1a8c [businesschannel][592858be] processing txid: 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9" +"2019-05-02 09:27:38.276 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1a8d retrieveTransactionByID() - txId = [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]" +"2019-05-02 09:27:38.277 UTC [aclmgmt] CheckACL -> DEBU 1a8e acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-05-02 09:27:38.277 UTC [aclmgmt] CheckACL -> DEBU 1a8f acl check(/Channel/Application/Writers)" +"2019-05-02 09:27:38.278 UTC [policies] Evaluate -> DEBU 1a90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:38.278 UTC [policies] Evaluate -> DEBU 1a91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:38.278 UTC [policies] Evaluate -> DEBU 1a92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:38.279 UTC [cauthdsl] func1 -> DEBU 1a93 0xc00265c340 gate 1556789258278918800 evaluation starts" +"2019-05-02 09:27:38.279 UTC [cauthdsl] func2 -> DEBU 1a94 0xc00265c340 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:38.279 UTC [cauthdsl] func2 -> DEBU 1a95 0xc00265c340 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:38.279 UTC [cauthdsl] func2 -> DEBU 1a96 0xc00265c340 principal matched by identity 0" +"2019-05-02 09:27:38.280 UTC [msp.identity] Verify -> DEBU 1a97 Verify: digest = 00000000 93 da 45 8a 61 0c ee c7 d7 82 fa 30 30 e3 3e 12 |..E.a......00.>.| +00000010 7d 3d 79 a4 c0 2c 71 fe 1d 84 b6 b5 89 c0 5b 0d |}=y..,q.......[.|" +"2019-05-02 09:27:38.280 UTC [msp.identity] Verify -> DEBU 1a98 Verify: sig = 00000000 30 44 02 20 57 a5 c7 ae 81 47 5f 04 e2 a0 49 22 |0D. W....G_...I"| +00000010 7a d4 57 cd 67 01 f9 ae 23 bf 4b 01 63 cb de 3c |z.W.g...#.K.c..<| +00000020 d1 c0 2b a2 02 20 04 be 2a 62 2a 04 5c a4 e2 03 |..+.. ..*b*.\...| +00000030 d0 fd fd 0d 93 d9 63 59 05 e1 a6 5b ef 0e fc 8c |......cY...[....| +00000040 7f 15 3e 12 d2 13 |..>...|" +"2019-05-02 09:27:38.281 UTC [cauthdsl] func2 -> DEBU 1a99 0xc00265c340 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:38.281 UTC [cauthdsl] func1 -> DEBU 1a9a 0xc00265c340 gate 1556789258278918800 evaluation succeeds" +"2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9b Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9d Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:38.281 UTC [policies] Evaluate -> DEBU 1a9e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:38.282 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1a9f constructing new tx simulator" +"2019-05-02 09:27:38.282 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1aa0 constructing new tx simulator txid = [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]" +"2019-05-02 09:27:38.282 UTC [endorser] SimulateProposal -> DEBU 1aa1 [businesschannel][592858be] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:38.283 UTC [stateleveldb] GetState -> DEBU 1aa2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:38.283 UTC [endorser] callChaincode -> INFO 1aa3 [businesschannel][592858be] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:38.284 UTC [stateleveldb] GetState -> DEBU 1aa4 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:38.285 UTC [chaincode] LaunchConfig -> DEBU 1aa5 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-05-02 09:27:38.285 UTC [chaincode] Start -> DEBU 1aa6 start container: exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-05-02 09:27:38.285 UTC [chaincode] Start -> DEBU 1aa7 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-05-02 09:27:38.285 UTC [chaincode] Start -> DEBU 1aa8 start container with env: CORE_CHAINCODE_LOGGING_LEVEL=info CORE_CHAINCODE_LOGGING_SHIM=warning CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} @@ -9510,7512 +9148,7111 @@ txId=c9936150695ce3621e6e5e167d5c031a4b38c5c744720c61d92459a175c033cf locPointer CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -"2019-05-02 01:31:07.953 UTC [container] lockContainer -> DEBU 1b4c waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" -"2019-05-02 01:31:07.953 UTC [container] lockContainer -> DEBU 1b4d got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" -"2019-05-02 01:31:07.953 UTC [dockercontroller] stopInternal -> DEBU 1b4e stopping container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -"2019-05-02 01:31:07.955 UTC [dockercontroller] stopInternal -> DEBU 1b4f stop container result" error="Container not running: peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" -"2019-05-02 01:31:07.955 UTC [dockercontroller] stopInternal -> DEBU 1b50 killing container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -"2019-05-02 01:31:07.966 UTC [dockercontroller] stopInternal -> DEBU 1b51 kill container result" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error="Container not running: peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" -"2019-05-02 01:31:07.966 UTC [dockercontroller] stopInternal -> DEBU 1b52 removing container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -"2019-05-02 01:31:07.976 UTC [dockercontroller] stopInternal -> DEBU 1b53 remove container result" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error=null -"2019-05-02 01:31:07.976 UTC [dockercontroller] createContainer -> DEBU 1b54 create container" imageID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-4acdefc66bb2a0c444e561d45c2067f024fc1e2a95e1b1ce3b104d2106958d25 containerID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -"2019-05-02 01:31:08.088 UTC [dockercontroller] createContainer -> DEBU 1b55 created container" imageID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-4acdefc66bb2a0c444e561d45c2067f024fc1e2a95e1b1ce3b104d2106958d25 containerID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b -"2019-05-02 01:31:08.442 UTC [gossip.gossip] handleMessage -> DEBU 1b56 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:08.442 UTC [gossip.gossip] handleMessage -> DEBU 1b57 Exiting" -"2019-05-02 01:31:08.443 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:08.454 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b59 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:08.454 UTC [msp.identity] Verify -> DEBU 1b5a Verify: digest = 00000000 16 f7 31 4b ee fb 69 9a 17 15 7b 8f 26 7c 2e 6c |..1K..i...{.&|.l| -00000010 22 51 84 b4 fd 5c af 16 7a 96 9d 03 63 1d 88 8a |"Q...\..z...c...|" -"2019-05-02 01:31:08.454 UTC [msp.identity] Verify -> DEBU 1b5b Verify: sig = 00000000 30 45 02 21 00 f8 e2 24 b5 f3 63 e0 31 a0 f5 24 |0E.!...$..c.1..$| -00000010 0e 77 75 8a b1 25 81 d4 1c 6c 1d 8d 76 2d 02 43 |.wu..%...l..v-.C| -00000020 65 b3 c9 18 c1 02 20 10 90 f1 b2 85 ba 13 54 ac |e..... .......T.| -00000030 a0 64 ca ec 46 58 0a 1f 01 c3 a3 4c 8b 89 97 67 |.d..FX.....L...g| -00000040 f0 09 2d 75 aa cf 72 |..-u..r|" -"2019-05-02 01:31:08.455 UTC [msp.identity] Verify -> DEBU 1b5c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:38.287 UTC [container] lockContainer -> DEBU 1aa9 waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +"2019-05-02 09:27:38.287 UTC [container] lockContainer -> DEBU 1aaa got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +"2019-05-02 09:27:38.287 UTC [dockercontroller] stopInternal -> DEBU 1aab stopping container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-05-02 09:27:38.291 UTC [dockercontroller] stopInternal -> DEBU 1aac stop container result" error="Container not running: peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-05-02 09:27:38.291 UTC [dockercontroller] stopInternal -> DEBU 1aad killing container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-05-02 09:27:38.292 UTC [dockercontroller] stopInternal -> DEBU 1aae kill container result" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error="Container not running: peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-05-02 09:27:38.292 UTC [dockercontroller] stopInternal -> DEBU 1aaf removing container" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-05-02 09:27:38.304 UTC [dockercontroller] stopInternal -> DEBU 1ab0 remove container result" id=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error=null +"2019-05-02 09:27:38.304 UTC [dockercontroller] createContainer -> DEBU 1ab1 create container" imageID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-4acdefc66bb2a0c444e561d45c2067f024fc1e2a95e1b1ce3b104d2106958d25 containerID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-05-02 09:27:38.442 UTC [dockercontroller] createContainer -> DEBU 1ab2 created container" imageID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-4acdefc66bb2a0c444e561d45c2067f024fc1e2a95e1b1ce3b104d2106958d25 containerID=peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-05-02 09:27:38.844 UTC [gossip.comm] func1 -> DEBU 1ab3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:38.844 UTC [gossip.gossip] handleMessage -> DEBU 1ab4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:38.844 UTC [gossip.gossip] handleMessage -> DEBU 1ab5 Exiting" +"2019-05-02 09:27:38.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ab6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:38.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ab7 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:38.844 UTC [msp] DeserializeIdentity -> DEBU 1ab8 Obtaining identity" +"2019-05-02 09:27:38.845 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ab9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:38.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aba Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:38.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1abb Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1abc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1abd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1abe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:38.845 UTC [cauthdsl] func1 -> DEBU 1abf 0xc003a4e2b0 gate 1556789258845498500 evaluation starts" +"2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac0 0xc003a4e2b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac1 0xc003a4e2b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc003a4e2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:38.845 UTC [gossip.gossip] handleMessage -> DEBU 1ac3 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1ac4 0xc003a4e2b0 principal evaluation fails" +"2019-05-02 09:27:38.845 UTC [cauthdsl] func1 -> DEBU 1ac5 0xc003a4e2b0 gate 1556789258845498500 evaluation fails" +"2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1ac6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1ac7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:38.845 UTC [policies] Evaluate -> DEBU 1ac8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:38.845 UTC [cauthdsl] func1 -> DEBU 1ac9 0xc003a4eaf0 gate 1556789258845861800 evaluation starts" +"2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1aca 0xc003a4eaf0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1acb 0xc003a4eaf0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:38.845 UTC [cauthdsl] func2 -> DEBU 1acc 0xc003a4eaf0 principal matched by identity 0" +"2019-05-02 09:27:38.846 UTC [msp.identity] Verify -> DEBU 1acd Verify: digest = 00000000 b9 e8 c8 18 6f 9d 3e 6d e4 db 40 ad 21 56 4b 3c |....o.>m..@.!VK<| +00000010 a4 86 b0 50 90 b0 e7 94 fb 55 05 d0 63 1f e9 36 |...P.....U..c..6|" +"2019-05-02 09:27:38.846 UTC [msp.identity] Verify -> DEBU 1ace Verify: sig = 00000000 30 45 02 21 00 fd f3 f0 ec c2 b8 7f 14 9e 03 74 |0E.!...........t| +00000010 04 a9 1c e0 ed 3e a1 2f f3 8e 3e 28 fa 41 c3 51 |.....>./..>(.A.Q| +00000020 76 a2 7b bc c1 02 20 28 7d 04 5a 2c 0e f9 98 8c |v.{... (}.Z,....| +00000030 dc b5 9e 1d 1d b7 0c e3 91 cb b6 35 45 44 89 0d |...........5ED..| +00000040 54 60 40 9c ab 44 85 |T`@..D.|" +"2019-05-02 09:27:38.846 UTC [cauthdsl] func2 -> DEBU 1acf 0xc003a4eaf0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:38.846 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc003a4eaf0 gate 1556789258845861800 evaluation succeeds" +"2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad3 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:38.846 UTC [policies] Evaluate -> DEBU 1ad4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:38.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ad5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad7 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 " +"2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 " +"2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ad9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:38.846 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ada Exiting" +"2019-05-02 09:27:38.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 1adb Exiting" +"2019-05-02 09:27:38.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1adc Exiting" +"2019-05-02 09:27:38.847 UTC [gossip.gossip] handleMessage -> DEBU 1add Exiting" +"2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ade Obtaining identity" +"2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1adf Obtaining identity" +"2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae0 Obtaining identity" +"2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae1 Obtaining identity" +"2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae2 Obtaining identity" +"2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae3 Obtaining identity" +"2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae4 Obtaining identity" +"2019-05-02 09:27:38.847 UTC [gossip.comm] Send -> DEBU 1ae5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:38.847 UTC [msp] DeserializeIdentity -> DEBU 1ae6 Obtaining identity" +"2019-05-02 09:27:38.848 UTC [gossip.comm] Send -> DEBU 1ae7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae9 Exiting" +"2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1aea Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:38.848 UTC [gossip.comm] sendToEndpoint -> DEBU 1aeb Exiting" +"2019-05-02 09:27:38.849 UTC [gossip.gossip] handleMessage -> DEBU 1aec Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:38.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:38.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aee Exiting" +"2019-05-02 09:27:38.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:38.850 UTC [gossip.gossip] handleMessage -> DEBU 1af0 Exiting" +"2019-05-02 09:27:38.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1af1 Exiting" +"2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151017 " +"2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af3 Sign: digest: 5435123D8FCA2ABD2119CACCF8DB800AFA6A0C6422688B3D59B6B1473F5FC6A3 " +"2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:39.074 UTC [msp.identity] Sign -> DEBU 1af5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:39.074 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1af6 Sleeping 5s" +"2019-05-02 09:27:39.083 UTC [msp] DeserializeIdentity -> DEBU 1af7 Obtaining identity" +"2019-05-02 09:27:39.084 UTC [msp] DeserializeIdentity -> DEBU 1af8 Obtaining identity" +"2019-05-02 09:27:39.084 UTC [gossip.comm] Send -> DEBU 1af9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:39.084 UTC [msp] DeserializeIdentity -> DEBU 1afa Obtaining identity" +"2019-05-02 09:27:39.085 UTC [gossip.comm] Send -> DEBU 1afb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1afc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:39.085 UTC [msp] DeserializeIdentity -> DEBU 1afd Obtaining identity" +"2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1afe Exiting" +"2019-05-02 09:27:39.085 UTC [gossip.comm] Send -> DEBU 1aff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b00 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b01 Exiting" +"2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b02 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:39.085 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Exiting" +"2019-05-02 09:27:39.125 UTC [gossip.gossip] handleMessage -> DEBU 1b04 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:39.125 UTC [gossip.gossip] handleMessage -> DEBU 1b05 Exiting" +"2019-05-02 09:27:39.126 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b06 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:39.126 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b07 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:39.126 UTC [msp.identity] Verify -> DEBU 1b08 Verify: digest = 00000000 3a 3f 38 7f fe 97 0e 19 22 b4 02 42 a6 01 d3 41 |:?8....."..B...A| +00000010 87 29 96 17 73 49 a6 63 72 48 ff 18 de d1 e7 21 |.)..sI.crH.....!|" +"2019-05-02 09:27:39.127 UTC [msp.identity] Verify -> DEBU 1b09 Verify: sig = 00000000 30 45 02 21 00 f0 d1 b4 40 7a 46 03 5c 48 ac e2 |0E.!....@zF.\H..| +00000010 90 b2 ef dd f6 2a d4 83 76 77 a4 f8 95 d6 0a bd |.....*..vw......| +00000020 51 43 ec 5f 21 02 20 11 5c ab d8 ad 7c f7 fe 29 |QC._!. .\...|..)| +00000030 66 01 03 a7 3f a8 da 1f 7e 12 31 09 ed e3 ef 80 |f...?...~.1.....| +00000040 68 17 ce 97 0e 5c b2 |h....\.|" +"2019-05-02 09:27:39.127 UTC [msp.identity] Verify -> DEBU 1b0a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:08.455 UTC [msp.identity] Verify -> DEBU 1b5d Verify: sig = 00000000 30 45 02 21 00 af 2d 54 fa 5b d3 2b 3a e9 a0 97 |0E.!..-T.[.+:...| -00000010 1b fa 67 cf 22 3a 2a 02 ac 42 fe 4e 2b 5a e3 b6 |..g.":*..B.N+Z..| -00000020 4f e9 ad 9e dc 02 20 3f 17 31 5c 27 3d c2 2b 90 |O..... ?.1\'=.+.| -00000030 bc 1f db ad b7 a7 90 ca c8 2f f5 3b f5 7d 4f 2e |........./.;.}O.| -00000040 3e 37 6d ef d5 f1 61 |>7m...a|" -"2019-05-02 01:31:08.455 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:08.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:08.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b60 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 " -"2019-05-02 01:31:08.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b61 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 " -"2019-05-02 01:31:08.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b62 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:08.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b63 Exiting" -"2019-05-02 01:31:08.456 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b64 Exiting" -"2019-05-02 01:31:08.456 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b65 Exiting" -"2019-05-02 01:31:08.454 UTC [gossip.comm] func1 -> DEBU 1b66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.457 UTC [gossip.comm] func1 -> DEBU 1b67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.457 UTC [gossip.gossip] handleMessage -> DEBU 1b68 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.457 UTC [gossip.gossip] handleMessage -> DEBU 1b69 Exiting" -"2019-05-02 01:31:08.457 UTC [gossip.gossip] handleMessage -> DEBU 1b6a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b6b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b6c Exiting" -"2019-05-02 01:31:08.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b6d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b6e Exiting" -"2019-05-02 01:31:08.457 UTC [gossip.gossip] handleMessage -> DEBU 1b6f Exiting" -"2019-05-02 01:31:08.465 UTC [msp] DeserializeIdentity -> DEBU 1b70 Obtaining identity" -"2019-05-02 01:31:08.466 UTC [msp] DeserializeIdentity -> DEBU 1b71 Obtaining identity" -"2019-05-02 01:31:08.466 UTC [msp] DeserializeIdentity -> DEBU 1b72 Obtaining identity" -"2019-05-02 01:31:08.466 UTC [gossip.comm] Send -> DEBU 1b73 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:08.466 UTC [msp] DeserializeIdentity -> DEBU 1b74 Obtaining identity" -"2019-05-02 01:31:08.466 UTC [gossip.comm] Send -> DEBU 1b75 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:08.466 UTC [gossip.comm] sendToEndpoint -> DEBU 1b76 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.466 UTC [gossip.comm] sendToEndpoint -> DEBU 1b77 Exiting" -"2019-05-02 01:31:08.466 UTC [gossip.comm] sendToEndpoint -> DEBU 1b78 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.466 UTC [gossip.comm] sendToEndpoint -> DEBU 1b79 Exiting" -"2019-05-02 01:31:08.501 UTC [gossip.comm] func1 -> DEBU 1b7a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.502 UTC [gossip.gossip] handleMessage -> DEBU 1b7b Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.511 UTC [gossip.gossip] handleMessage -> DEBU 1b7c Exiting" -"2019-05-02 01:31:08.508 UTC [gossip.comm] func1 -> DEBU 1b7d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.517 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b7e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.512 UTC [gossip.gossip] handleMessage -> DEBU 1b7f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.519 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b80 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:08.526 UTC [msp] DeserializeIdentity -> DEBU 1b81 Obtaining identity" -"2019-05-02 01:31:08.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b82 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:08.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b83 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b84 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.527 UTC [policies] Evaluate -> DEBU 1b85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.527 UTC [policies] Evaluate -> DEBU 1b86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.527 UTC [policies] Evaluate -> DEBU 1b87 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.527 UTC [cauthdsl] func1 -> DEBU 1b88 0xc0041a8b20 gate 1556760668527427300 evaluation starts" -"2019-05-02 01:31:08.527 UTC [cauthdsl] func2 -> DEBU 1b89 0xc0041a8b20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.527 UTC [cauthdsl] func2 -> DEBU 1b8a 0xc0041a8b20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.527 UTC [cauthdsl] func2 -> DEBU 1b8b 0xc0041a8b20 principal matched by identity 0" -"2019-05-02 01:31:08.527 UTC [msp.identity] Verify -> DEBU 1b8c Verify: digest = 00000000 f6 40 50 5b 45 a1 bd c3 57 9a cd 3d 38 43 7a 34 |.@P[E...W..=8Cz4| -00000010 a5 32 da b2 21 88 59 17 68 56 3d 96 06 a0 77 10 |.2..!.Y.hV=...w.|" -"2019-05-02 01:31:08.527 UTC [msp.identity] Verify -> DEBU 1b8d Verify: sig = 00000000 30 45 02 21 00 ad e1 8a 0b b9 48 43 5e 0e 4a 71 |0E.!......HC^.Jq| -00000010 fb 5c c4 af 81 cb 8b 87 2c d4 a9 f6 b3 dc 48 b7 |.\......,.....H.| -00000020 b6 e7 e0 59 92 02 20 15 62 5b 4c 53 9f de e9 92 |...Y.. .b[LS....| -00000030 62 2e f9 db ed b3 f5 a4 28 32 f6 ed 29 aa 91 28 |b.......(2..)..(| -00000040 0d 13 27 81 a1 6d c7 |..'..m.|" -"2019-05-02 01:31:08.527 UTC [cauthdsl] func2 -> DEBU 1b8e 0xc0041a8b20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.527 UTC [cauthdsl] func1 -> DEBU 1b8f 0xc0041a8b20 gate 1556760668527427300 evaluation succeeds" -"2019-05-02 01:31:08.527 UTC [policies] Evaluate -> DEBU 1b90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.528 UTC [policies] Evaluate -> DEBU 1b91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.528 UTC [policies] Evaluate -> DEBU 1b92 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.528 UTC [policies] Evaluate -> DEBU 1b93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b95 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:08.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b96 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 " -"2019-05-02 01:31:08.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b97 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 " -"2019-05-02 01:31:08.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b98 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:08.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b99 Exiting" -"2019-05-02 01:31:08.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b9a Exiting" -"2019-05-02 01:31:08.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b9b Exiting" -"2019-05-02 01:31:08.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b9c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b9d Exiting" -"2019-05-02 01:31:08.534 UTC [gossip.gossip] handleMessage -> DEBU 1b9e Exiting" -"2019-05-02 01:31:08.534 UTC [gossip.gossip] handleMessage -> DEBU 1b9f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.534 UTC [gossip.gossip] handleMessage -> DEBU 1ba0 Exiting" -"2019-05-02 01:31:08.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba2 Exiting" -"2019-05-02 01:31:08.544 UTC [msp] DeserializeIdentity -> DEBU 1ba3 Obtaining identity" -"2019-05-02 01:31:08.544 UTC [msp] DeserializeIdentity -> DEBU 1ba4 Obtaining identity" -"2019-05-02 01:31:08.547 UTC [msp] DeserializeIdentity -> DEBU 1ba5 Obtaining identity" -"2019-05-02 01:31:08.547 UTC [msp] DeserializeIdentity -> DEBU 1ba6 Obtaining identity" -"2019-05-02 01:31:08.547 UTC [msp] DeserializeIdentity -> DEBU 1ba7 Obtaining identity" -"2019-05-02 01:31:08.549 UTC [msp] DeserializeIdentity -> DEBU 1ba8 Obtaining identity" -"2019-05-02 01:31:08.550 UTC [msp] DeserializeIdentity -> DEBU 1ba9 Obtaining identity" -"2019-05-02 01:31:08.550 UTC [gossip.comm] Send -> DEBU 1baa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:08.551 UTC [msp] DeserializeIdentity -> DEBU 1bab Obtaining identity" -"2019-05-02 01:31:08.551 UTC [gossip.comm] sendToEndpoint -> DEBU 1bac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.551 UTC [gossip.comm] sendToEndpoint -> DEBU 1bad Exiting" -"2019-05-02 01:31:08.551 UTC [gossip.comm] Send -> DEBU 1bae Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:08.552 UTC [gossip.comm] sendToEndpoint -> DEBU 1baf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.553 UTC [gossip.comm] sendToEndpoint -> DEBU 1bb0 Exiting" -"2019-05-02 01:31:08.727 UTC [msp.identity] Sign -> DEBU 1bb1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151019 " -"2019-05-02 01:31:08.727 UTC [msp.identity] Sign -> DEBU 1bb2 Sign: digest: 4D725B5A29686B698367CE4091D0D18C135BB62A9478D6E41B953D20A750E9F0 " -"2019-05-02 01:31:08.727 UTC [msp.identity] Sign -> DEBU 1bb3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:08.727 UTC [msp.identity] Sign -> DEBU 1bb4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:08.727 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1bb5 Sleeping 5s" -"2019-05-02 01:31:08.729 UTC [msp] DeserializeIdentity -> DEBU 1bb6 Obtaining identity" -"2019-05-02 01:31:08.729 UTC [msp] DeserializeIdentity -> DEBU 1bb7 Obtaining identity" -"2019-05-02 01:31:08.729 UTC [msp] DeserializeIdentity -> DEBU 1bb8 Obtaining identity" -"2019-05-02 01:31:08.730 UTC [gossip.comm] Send -> DEBU 1bb9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:08.730 UTC [gossip.comm] Send -> DEBU 1bba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:08.730 UTC [msp] DeserializeIdentity -> DEBU 1bbb Obtaining identity" -"2019-05-02 01:31:08.730 UTC [gossip.comm] Send -> DEBU 1bbc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:08.730 UTC [gossip.comm] sendToEndpoint -> DEBU 1bbd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.730 UTC [gossip.comm] sendToEndpoint -> DEBU 1bbe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.730 UTC [gossip.comm] sendToEndpoint -> DEBU 1bbf Exiting" -"2019-05-02 01:31:08.730 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc0 Exiting" -"2019-05-02 01:31:08.731 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:08.731 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc2 Exiting" -"2019-05-02 01:31:08.827 UTC [msp] DeserializeIdentity -> DEBU 1bc3 Obtaining identity" -"2019-05-02 01:31:08.827 UTC [msp] DeserializeIdentity -> DEBU 1bc4 Obtaining identity" -"2019-05-02 01:31:08.827 UTC [gossip.comm] Send -> DEBU 1bc5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:08.827 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.827 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc7 Exiting" -"2019-05-02 01:31:08.827 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.827 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc9 Exiting" -"2019-05-02 01:31:08.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1bca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcb Exiting" -"2019-05-02 01:31:08.830 UTC [gossip.comm] func1 -> DEBU 1bcc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.830 UTC [gossip.gossip] handleMessage -> DEBU 1bce Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.830 UTC [msp] DeserializeIdentity -> DEBU 1bcf Obtaining identity" -"2019-05-02 01:31:08.832 UTC [msp.identity] Verify -> DEBU 1bd0 Verify: digest = 00000000 51 65 a8 f5 3d 66 bd 4c ea e1 02 f7 5e 30 2f a6 |Qe..=f.L....^0/.| -00000010 55 da ac 09 e9 16 bc e3 88 66 89 a2 a0 ea 8a b9 |U........f......|" -"2019-05-02 01:31:08.832 UTC [msp] DeserializeIdentity -> DEBU 1bd1 Obtaining identity" -"2019-05-02 01:31:08.832 UTC [msp.identity] Verify -> DEBU 1bd2 Verify: sig = 00000000 30 44 02 20 71 7c bf 73 a9 07 a1 55 62 45 53 17 |0D. q|.s...UbES.| -00000010 6a 2b f5 6d c7 d1 ec 07 06 c9 cb 70 67 73 a0 39 |j+.m.......pgs.9| -00000020 68 ac 47 72 02 20 78 14 ae 0d d3 31 4a f6 69 be |h.Gr. x....1J.i.| -00000030 d9 18 3c aa 9e bf 90 5b 8c 6b 73 69 80 0c dc 64 |..<....[.ksi...d| -00000040 89 a4 87 bc 1a 1d |......|" -"2019-05-02 01:31:08.832 UTC [msp] DeserializeIdentity -> DEBU 1bd3 Obtaining identity" -"2019-05-02 01:31:08.830 UTC [gossip.comm] func1 -> DEBU 1bcd Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.834 UTC [gossip.comm] Send -> DEBU 1bd4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760666096098000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" -"2019-05-02 01:31:08.834 UTC [msp] DeserializeIdentity -> DEBU 1bd5 Obtaining identity" -"2019-05-02 01:31:08.834 UTC [msp] DeserializeIdentity -> DEBU 1bd6 Obtaining identity" -"2019-05-02 01:31:08.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1bd7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760666096098000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1bd8 Exiting" -"2019-05-02 01:31:08.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1bd9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760666096098000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1bda Exiting" -"2019-05-02 01:31:08.835 UTC [msp.identity] Verify -> DEBU 1bdb Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -"2019-05-02 01:31:08.835 UTC [msp.identity] Verify -> DEBU 1bdc Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -"2019-05-02 01:31:08.835 UTC [gossip.comm] sendToEndpoint -> DEBU 1bdd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760666096098000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:08.836 UTC [gossip.comm] sendToEndpoint -> DEBU 1bde Exiting" -"2019-05-02 01:31:08.847 UTC [msp] DeserializeIdentity -> DEBU 1bdf Obtaining identity" -"2019-05-02 01:31:08.849 UTC [msp] DeserializeIdentity -> DEBU 1be1 Obtaining identity" -"2019-05-02 01:31:08.851 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1be2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:08.851 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.848 UTC [gossip.comm] func1 -> DEBU 1be0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.851 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.853 UTC [policies] Evaluate -> DEBU 1be5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.853 UTC [policies] Evaluate -> DEBU 1be6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.853 UTC [policies] Evaluate -> DEBU 1be7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.854 UTC [cauthdsl] func1 -> DEBU 1be8 0xc004206eb0 gate 1556760668854341600 evaluation starts" -"2019-05-02 01:31:08.855 UTC [cauthdsl] func2 -> DEBU 1be9 0xc004206eb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.855 UTC [cauthdsl] func2 -> DEBU 1bea 0xc004206eb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.856 UTC [cauthdsl] func2 -> DEBU 1beb 0xc004206eb0 principal matched by identity 0" -"2019-05-02 01:31:08.856 UTC [msp.identity] Verify -> DEBU 1bec Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -"2019-05-02 01:31:08.857 UTC [msp.identity] Verify -> DEBU 1bed Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -00000040 29 fe 17 41 ee e9 a4 |)..A...|" -"2019-05-02 01:31:08.858 UTC [cauthdsl] func2 -> DEBU 1bee 0xc004206eb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.858 UTC [cauthdsl] func1 -> DEBU 1bef 0xc004206eb0 gate 1556760668854341600 evaluation succeeds" -"2019-05-02 01:31:08.858 UTC [policies] Evaluate -> DEBU 1bf0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.858 UTC [policies] Evaluate -> DEBU 1bf1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.860 UTC [policies] Evaluate -> DEBU 1bf2 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.860 UTC [policies] Evaluate -> DEBU 1bf3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.861 UTC [msp] DeserializeIdentity -> DEBU 1bf4 Obtaining identity" -"2019-05-02 01:31:08.862 UTC [msp] DeserializeIdentity -> DEBU 1bf5 Obtaining identity" -"2019-05-02 01:31:08.863 UTC [gossip.comm] func1 -> DEBU 1bf6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.866 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bf7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:08.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bf8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bf9 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.871 UTC [policies] Evaluate -> DEBU 1bfa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.875 UTC [policies] Evaluate -> DEBU 1bfb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.875 UTC [policies] Evaluate -> DEBU 1bfc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.875 UTC [cauthdsl] func1 -> DEBU 1bfd 0xc004220680 gate 1556760668875955500 evaluation starts" -"2019-05-02 01:31:08.876 UTC [cauthdsl] func2 -> DEBU 1bfe 0xc004220680 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.876 UTC [cauthdsl] func2 -> DEBU 1bff 0xc004220680 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.876 UTC [cauthdsl] func2 -> DEBU 1c00 0xc004220680 principal matched by identity 0" -"2019-05-02 01:31:08.886 UTC [msp.identity] Verify -> DEBU 1c01 Verify: digest = 00000000 f5 84 fc 53 b8 bc 29 6c 8d 44 e3 b7 42 34 00 a8 |...S..)l.D..B4..| -00000010 0c dc ce 7d c1 c2 dc 95 95 05 62 fc 36 3f c1 91 |...}......b.6?..|" -"2019-05-02 01:31:08.887 UTC [msp.identity] Verify -> DEBU 1c02 Verify: sig = 00000000 30 44 02 20 1f 6f f9 d2 72 02 ca 23 0a 4d 06 bd |0D. .o..r..#.M..| -00000010 99 74 a4 2c 28 6a 0a 4e df 05 22 60 b5 09 fd 9a |.t.,(j.N.."`....| -00000020 b0 e4 7f 15 02 20 7c 49 fc d6 86 22 76 a5 d3 6f |..... |I..."v..o| -00000030 d8 74 f9 56 85 ac 3b 84 f5 c5 38 e7 da cc 12 7a |.t.V..;...8....z| -00000040 85 81 04 5d d5 23 |...].#|" -"2019-05-02 01:31:08.887 UTC [cauthdsl] func2 -> DEBU 1c03 0xc004220680 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.887 UTC [cauthdsl] func1 -> DEBU 1c04 0xc004220680 gate 1556760668875955500 evaluation succeeds" -"2019-05-02 01:31:08.887 UTC [policies] Evaluate -> DEBU 1c05 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c07 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c08 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.888 UTC [msp] DeserializeIdentity -> DEBU 1c09 Obtaining identity" -"2019-05-02 01:31:08.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c0a Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c0b Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.888 UTC [policies] Evaluate -> DEBU 1c0e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.888 UTC [cauthdsl] func1 -> DEBU 1c0f 0xc004221760 gate 1556760668888681200 evaluation starts" -"2019-05-02 01:31:08.888 UTC [cauthdsl] func2 -> DEBU 1c10 0xc004221760 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.889 UTC [cauthdsl] func2 -> DEBU 1c11 0xc004221760 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.889 UTC [cauthdsl] func2 -> DEBU 1c12 0xc004221760 principal matched by identity 0" -"2019-05-02 01:31:08.889 UTC [msp.identity] Verify -> DEBU 1c13 Verify: digest = 00000000 f5 84 fc 53 b8 bc 29 6c 8d 44 e3 b7 42 34 00 a8 |...S..)l.D..B4..| -00000010 0c dc ce 7d c1 c2 dc 95 95 05 62 fc 36 3f c1 91 |...}......b.6?..|" -"2019-05-02 01:31:08.889 UTC [msp.identity] Verify -> DEBU 1c14 Verify: sig = 00000000 30 44 02 20 1f 6f f9 d2 72 02 ca 23 0a 4d 06 bd |0D. .o..r..#.M..| -00000010 99 74 a4 2c 28 6a 0a 4e df 05 22 60 b5 09 fd 9a |.t.,(j.N.."`....| -00000020 b0 e4 7f 15 02 20 7c 49 fc d6 86 22 76 a5 d3 6f |..... |I..."v..o| -00000030 d8 74 f9 56 85 ac 3b 84 f5 c5 38 e7 da cc 12 7a |.t.V..;...8....z| -00000040 85 81 04 5d d5 23 |...].#|" -"2019-05-02 01:31:08.890 UTC [cauthdsl] func2 -> DEBU 1c15 0xc004221760 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.890 UTC [cauthdsl] func1 -> DEBU 1c16 0xc004221760 gate 1556760668888681200 evaluation succeeds" -"2019-05-02 01:31:08.890 UTC [policies] Evaluate -> DEBU 1c17 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.890 UTC [policies] Evaluate -> DEBU 1c18 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.890 UTC [policies] Evaluate -> DEBU 1c19 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.891 UTC [policies] Evaluate -> DEBU 1c1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.891 UTC [gossip.gossip] handleMessage -> DEBU 1c1b Exiting" -"2019-05-02 01:31:08.892 UTC [gossip.gossip] handleMessage -> DEBU 1c1c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.892 UTC [msp] DeserializeIdentity -> DEBU 1c1d Obtaining identity" -"2019-05-02 01:31:08.893 UTC [msp.identity] Verify -> DEBU 1c1e Verify: digest = 00000000 51 65 a8 f5 3d 66 bd 4c ea e1 02 f7 5e 30 2f a6 |Qe..=f.L....^0/.| -00000010 55 da ac 09 e9 16 bc e3 88 66 89 a2 a0 ea 8a b9 |U........f......|" -"2019-05-02 01:31:08.894 UTC [msp.identity] Verify -> DEBU 1c1f Verify: sig = 00000000 30 44 02 20 71 7c bf 73 a9 07 a1 55 62 45 53 17 |0D. q|.s...UbES.| -00000010 6a 2b f5 6d c7 d1 ec 07 06 c9 cb 70 67 73 a0 39 |j+.m.......pgs.9| -00000020 68 ac 47 72 02 20 78 14 ae 0d d3 31 4a f6 69 be |h.Gr. x....1J.i.| -00000030 d9 18 3c aa 9e bf 90 5b 8c 6b 73 69 80 0c dc 64 |..<....[.ksi...d| -00000040 89 a4 87 bc 1a 1d |......|" -"2019-05-02 01:31:08.900 UTC [msp.identity] Verify -> DEBU 1c20 Verify: digest = 00000000 d6 56 fa fd dd 6c 13 af 1e df 0d 5c 11 ec 18 39 |.V...l.....\...9| -00000010 3f ea c3 41 91 1a 56 df db f6 53 94 37 21 fe ba |?..A..V...S.7!..|" -"2019-05-02 01:31:08.901 UTC [msp.identity] Verify -> DEBU 1c21 Verify: sig = 00000000 30 44 02 20 25 34 70 4a 62 2c d9 0f dd 4f 90 64 |0D. %4pJb,...O.d| -00000010 3a 27 50 b6 40 3b ab 3c 07 f1 d3 3e 1e 6d f0 59 |:'P.@;.<...>.m.Y| -00000020 9e 19 96 ce 02 20 59 a3 cf 72 bc be c0 51 75 5b |..... Y..r...Qu[| -00000030 49 60 2c 68 4a 09 56 73 16 61 25 22 85 38 ec 82 |I`,hJ.Vs.a%".8..| -00000040 bb 0c 5a ce 3e 85 |..Z.>.|" -"2019-05-02 01:31:08.901 UTC [msp] DeserializeIdentity -> DEBU 1c22 Obtaining identity" -"2019-05-02 01:31:08.902 UTC [msp] DeserializeIdentity -> DEBU 1c23 Obtaining identity" -"2019-05-02 01:31:08.903 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:08.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c25 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c26 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.905 UTC [policies] Evaluate -> DEBU 1c27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.905 UTC [policies] Evaluate -> DEBU 1c28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.905 UTC [policies] Evaluate -> DEBU 1c29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.906 UTC [cauthdsl] func1 -> DEBU 1c2a 0xc0042540b0 gate 1556760668906033500 evaluation starts" -"2019-05-02 01:31:08.906 UTC [cauthdsl] func2 -> DEBU 1c2b 0xc0042540b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.906 UTC [cauthdsl] func2 -> DEBU 1c2c 0xc0042540b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.906 UTC [cauthdsl] func2 -> DEBU 1c2d 0xc0042540b0 principal matched by identity 0" -"2019-05-02 01:31:08.906 UTC [msp.identity] Verify -> DEBU 1c2e Verify: digest = 00000000 6e b0 75 c4 51 40 0e aa 99 5b d4 4c e9 2b e8 4b |n.u.Q@...[.L.+.K| -00000010 ef 3b fb 35 be f1 cd 9c a2 03 51 d3 59 0e 44 3f |.;.5......Q.Y.D?|" -"2019-05-02 01:31:08.906 UTC [msp.identity] Verify -> DEBU 1c2f Verify: sig = 00000000 30 44 02 20 03 37 d6 b4 db fc c5 c5 97 d9 b7 82 |0D. .7..........| -00000010 cb 4f 24 2e 01 c9 0e 5c d3 74 96 47 c2 70 5b 15 |.O$....\.t.G.p[.| -00000020 fb c0 c7 e5 02 20 50 5c 72 51 31 e9 74 c2 2b 1c |..... P\rQ1.t.+.| -00000030 3a 93 ab aa 2e 7a 88 04 ea b7 85 74 e0 2a 64 2d |:....z.....t.*d-| -00000040 14 3b 47 ea f2 83 |.;G...|" -"2019-05-02 01:31:08.908 UTC [cauthdsl] func2 -> DEBU 1c30 0xc0042540b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.908 UTC [cauthdsl] func1 -> DEBU 1c31 0xc0042540b0 gate 1556760668906033500 evaluation succeeds" -"2019-05-02 01:31:08.908 UTC [policies] Evaluate -> DEBU 1c32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.908 UTC [policies] Evaluate -> DEBU 1c33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.908 UTC [policies] Evaluate -> DEBU 1c34 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.908 UTC [policies] Evaluate -> DEBU 1c35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.909 UTC [msp] DeserializeIdentity -> DEBU 1c36 Obtaining identity" -"2019-05-02 01:31:08.909 UTC [msp] DeserializeIdentity -> DEBU 1c37 Obtaining identity" -"2019-05-02 01:31:08.911 UTC [msp] DeserializeIdentity -> DEBU 1c39 Obtaining identity" -"2019-05-02 01:31:08.911 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c38 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:08.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c3a Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c3b Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.912 UTC [msp] DeserializeIdentity -> DEBU 1c3c Obtaining identity" -"2019-05-02 01:31:08.912 UTC [policies] Evaluate -> DEBU 1c3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.912 UTC [gossip.pull] Hello -> DEBU 1c3e Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:08.912 UTC [policies] Evaluate -> DEBU 1c3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.912 UTC [policies] Evaluate -> DEBU 1c40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.912 UTC [msp] DeserializeIdentity -> DEBU 1c41 Obtaining identity" -"2019-05-02 01:31:08.912 UTC [cauthdsl] func1 -> DEBU 1c42 0xc004255880 gate 1556760668912727400 evaluation starts" -"2019-05-02 01:31:08.912 UTC [cauthdsl] func2 -> DEBU 1c43 0xc004255880 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.912 UTC [msp] DeserializeIdentity -> DEBU 1c44 Obtaining identity" -"2019-05-02 01:31:08.912 UTC [cauthdsl] func2 -> DEBU 1c45 0xc004255880 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.912 UTC [cauthdsl] func2 -> DEBU 1c46 0xc004255880 principal matched by identity 0" -"2019-05-02 01:31:08.912 UTC [msp.identity] Verify -> DEBU 1c47 Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -"2019-05-02 01:31:08.912 UTC [gossip.comm] Send -> DEBU 1c48 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:08.913 UTC [msp.identity] Verify -> DEBU 1c49 Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -00000040 9e 37 b5 08 86 fb a3 |.7.....|" -"2019-05-02 01:31:08.913 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.913 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4b Exiting" -"2019-05-02 01:31:08.913 UTC [cauthdsl] func2 -> DEBU 1c4c 0xc004255880 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.913 UTC [cauthdsl] func1 -> DEBU 1c4d 0xc004255880 gate 1556760668912727400 evaluation succeeds" -"2019-05-02 01:31:08.913 UTC [policies] Evaluate -> DEBU 1c4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.913 UTC [policies] Evaluate -> DEBU 1c4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.913 UTC [policies] Evaluate -> DEBU 1c50 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.913 UTC [policies] Evaluate -> DEBU 1c51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.913 UTC [msp] DeserializeIdentity -> DEBU 1c52 Obtaining identity" -"2019-05-02 01:31:08.915 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c53 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.915 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c54 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.916 UTC [policies] Evaluate -> DEBU 1c55 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.916 UTC [policies] Evaluate -> DEBU 1c56 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.916 UTC [policies] Evaluate -> DEBU 1c57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.917 UTC [cauthdsl] func1 -> DEBU 1c58 0xc004276960 gate 1556760668917180300 evaluation starts" -"2019-05-02 01:31:08.917 UTC [cauthdsl] func2 -> DEBU 1c59 0xc004276960 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.917 UTC [cauthdsl] func2 -> DEBU 1c5a 0xc004276960 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.918 UTC [cauthdsl] func2 -> DEBU 1c5b 0xc004276960 principal matched by identity 0" -"2019-05-02 01:31:08.918 UTC [msp.identity] Verify -> DEBU 1c5c Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -"2019-05-02 01:31:08.918 UTC [msp.identity] Verify -> DEBU 1c5d Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -00000040 9e 37 b5 08 86 fb a3 |.7.....|" -"2019-05-02 01:31:08.918 UTC [cauthdsl] func2 -> DEBU 1c5e 0xc004276960 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.919 UTC [cauthdsl] func1 -> DEBU 1c5f 0xc004276960 gate 1556760668917180300 evaluation succeeds" -"2019-05-02 01:31:08.919 UTC [policies] Evaluate -> DEBU 1c60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.919 UTC [policies] Evaluate -> DEBU 1c61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.919 UTC [policies] Evaluate -> DEBU 1c62 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.919 UTC [policies] Evaluate -> DEBU 1c63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.919 UTC [gossip.gossip] handleMessage -> DEBU 1c64 Exiting" -"2019-05-02 01:31:08.919 UTC [gossip.gossip] handleMessage -> DEBU 1c65 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.920 UTC [msp.identity] Verify -> DEBU 1c66 Verify: digest = 00000000 51 65 a8 f5 3d 66 bd 4c ea e1 02 f7 5e 30 2f a6 |Qe..=f.L....^0/.| -00000010 55 da ac 09 e9 16 bc e3 88 66 89 a2 a0 ea 8a b9 |U........f......|" -"2019-05-02 01:31:08.920 UTC [msp.identity] Verify -> DEBU 1c67 Verify: sig = 00000000 30 44 02 20 71 7c bf 73 a9 07 a1 55 62 45 53 17 |0D. q|.s...UbES.| -00000010 6a 2b f5 6d c7 d1 ec 07 06 c9 cb 70 67 73 a0 39 |j+.m.......pgs.9| -00000020 68 ac 47 72 02 20 78 14 ae 0d d3 31 4a f6 69 be |h.Gr. x....1J.i.| -00000030 d9 18 3c aa 9e bf 90 5b 8c 6b 73 69 80 0c dc 64 |..<....[.ksi...d| -00000040 89 a4 87 bc 1a 1d |......|" -"2019-05-02 01:31:08.921 UTC [msp] DeserializeIdentity -> DEBU 1c68 Obtaining identity" -"2019-05-02 01:31:08.921 UTC [msp] DeserializeIdentity -> DEBU 1c69 Obtaining identity" -"2019-05-02 01:31:08.921 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:08.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c6b Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c6c Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.922 UTC [policies] Evaluate -> DEBU 1c6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.922 UTC [policies] Evaluate -> DEBU 1c6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.922 UTC [policies] Evaluate -> DEBU 1c6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.922 UTC [cauthdsl] func1 -> DEBU 1c70 0xc00428ca90 gate 1556760668922737500 evaluation starts" -"2019-05-02 01:31:08.923 UTC [cauthdsl] func2 -> DEBU 1c71 0xc00428ca90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.923 UTC [cauthdsl] func2 -> DEBU 1c72 0xc00428ca90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.923 UTC [cauthdsl] func2 -> DEBU 1c73 0xc00428ca90 principal matched by identity 0" -"2019-05-02 01:31:08.923 UTC [msp.identity] Verify -> DEBU 1c74 Verify: digest = 00000000 6e b0 75 c4 51 40 0e aa 99 5b d4 4c e9 2b e8 4b |n.u.Q@...[.L.+.K| -00000010 ef 3b fb 35 be f1 cd 9c a2 03 51 d3 59 0e 44 3f |.;.5......Q.Y.D?|" -"2019-05-02 01:31:08.924 UTC [msp.identity] Verify -> DEBU 1c75 Verify: sig = 00000000 30 44 02 20 03 37 d6 b4 db fc c5 c5 97 d9 b7 82 |0D. .7..........| -00000010 cb 4f 24 2e 01 c9 0e 5c d3 74 96 47 c2 70 5b 15 |.O$....\.t.G.p[.| -00000020 fb c0 c7 e5 02 20 50 5c 72 51 31 e9 74 c2 2b 1c |..... P\rQ1.t.+.| -00000030 3a 93 ab aa 2e 7a 88 04 ea b7 85 74 e0 2a 64 2d |:....z.....t.*d-| -00000040 14 3b 47 ea f2 83 |.;G...|" -"2019-05-02 01:31:08.924 UTC [cauthdsl] func2 -> DEBU 1c76 0xc00428ca90 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.924 UTC [cauthdsl] func1 -> DEBU 1c77 0xc00428ca90 gate 1556760668922737500 evaluation succeeds" -"2019-05-02 01:31:08.924 UTC [policies] Evaluate -> DEBU 1c78 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.924 UTC [policies] Evaluate -> DEBU 1c79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.924 UTC [policies] Evaluate -> DEBU 1c7a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.924 UTC [policies] Evaluate -> DEBU 1c7b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.925 UTC [msp] DeserializeIdentity -> DEBU 1c7c Obtaining identity" -"2019-05-02 01:31:08.926 UTC [msp] DeserializeIdentity -> DEBU 1c7d Obtaining identity" -"2019-05-02 01:31:08.926 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:08.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c80 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.926 UTC [policies] Evaluate -> DEBU 1c81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.927 UTC [policies] Evaluate -> DEBU 1c82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.927 UTC [policies] Evaluate -> DEBU 1c83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.927 UTC [cauthdsl] func1 -> DEBU 1c84 0xc0042a4260 gate 1556760668927282000 evaluation starts" -"2019-05-02 01:31:08.927 UTC [cauthdsl] func2 -> DEBU 1c85 0xc0042a4260 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.927 UTC [cauthdsl] func2 -> DEBU 1c86 0xc0042a4260 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.927 UTC [cauthdsl] func2 -> DEBU 1c87 0xc0042a4260 principal matched by identity 0" -"2019-05-02 01:31:08.927 UTC [msp.identity] Verify -> DEBU 1c88 Verify: digest = 00000000 ae bb d8 f0 e2 1c e2 c3 54 92 ee 5a b4 8a 1e 96 |........T..Z....| -00000010 9c e0 1c 72 31 5e d5 6f ba 70 2e 0b 66 35 b9 33 |...r1^.o.p..f5.3|" -"2019-05-02 01:31:08.927 UTC [msp.identity] Verify -> DEBU 1c89 Verify: sig = 00000000 30 45 02 21 00 98 27 93 02 0a 0b bb a3 94 9c 30 |0E.!..'........0| -00000010 df 66 5c 8f cf 61 e4 17 ef 10 75 b6 47 6f 63 22 |.f\..a....u.Goc"| -00000020 c1 42 ea 22 7f 02 20 25 cc de 8b e3 ce 72 d8 67 |.B.".. %.....r.g| -00000030 51 72 1a c9 98 f3 72 8c b7 71 07 7c 8f 1a 16 d1 |Qr....r..q.|....| -00000040 29 fe 17 41 ee e9 a4 |)..A...|" -"2019-05-02 01:31:08.928 UTC [cauthdsl] func2 -> DEBU 1c8a 0xc0042a4260 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.928 UTC [cauthdsl] func1 -> DEBU 1c8b 0xc0042a4260 gate 1556760668927282000 evaluation succeeds" -"2019-05-02 01:31:08.928 UTC [policies] Evaluate -> DEBU 1c8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.928 UTC [policies] Evaluate -> DEBU 1c8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.928 UTC [policies] Evaluate -> DEBU 1c8e Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.928 UTC [policies] Evaluate -> DEBU 1c8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.930 UTC [msp.identity] Verify -> DEBU 1c90 Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -"2019-05-02 01:31:08.930 UTC [msp.identity] Verify -> DEBU 1c91 Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -00000040 23 02 f1 51 98 85 fe |#..Q...|" -"2019-05-02 01:31:08.932 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c92 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.932 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c93 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.932 UTC [policies] Evaluate -> DEBU 1c94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.932 UTC [policies] Evaluate -> DEBU 1c95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.932 UTC [policies] Evaluate -> DEBU 1c96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.932 UTC [cauthdsl] func1 -> DEBU 1c97 0xc0042a5960 gate 1556760668932630400 evaluation starts" -"2019-05-02 01:31:08.932 UTC [cauthdsl] func2 -> DEBU 1c98 0xc0042a5960 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.933 UTC [cauthdsl] func2 -> DEBU 1c99 0xc0042a5960 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.933 UTC [cauthdsl] func2 -> DEBU 1c9a 0xc0042a5960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:08.933 UTC [cauthdsl] func2 -> DEBU 1c9b 0xc0042a5960 principal evaluation fails" -"2019-05-02 01:31:08.933 UTC [cauthdsl] func1 -> DEBU 1c9c 0xc0042a5960 gate 1556760668932630400 evaluation fails" -"2019-05-02 01:31:08.933 UTC [policies] Evaluate -> DEBU 1c9d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.933 UTC [policies] Evaluate -> DEBU 1c9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.933 UTC [policies] Evaluate -> DEBU 1c9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:08.933 UTC [cauthdsl] func1 -> DEBU 1ca0 0xc0042b41a0 gate 1556760668933720700 evaluation starts" -"2019-05-02 01:31:08.934 UTC [cauthdsl] func2 -> DEBU 1ca1 0xc0042b41a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.934 UTC [cauthdsl] func2 -> DEBU 1ca2 0xc0042b41a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.934 UTC [cauthdsl] func2 -> DEBU 1ca3 0xc0042b41a0 principal matched by identity 0" -"2019-05-02 01:31:08.935 UTC [msp.identity] Verify -> DEBU 1ca4 Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -"2019-05-02 01:31:08.935 UTC [msp.identity] Verify -> DEBU 1ca5 Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -00000040 23 02 f1 51 98 85 fe |#..Q...|" -"2019-05-02 01:31:08.935 UTC [cauthdsl] func2 -> DEBU 1ca6 0xc0042b41a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.936 UTC [cauthdsl] func1 -> DEBU 1ca7 0xc0042b41a0 gate 1556760668933720700 evaluation succeeds" -"2019-05-02 01:31:08.936 UTC [policies] Evaluate -> DEBU 1ca8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:08.936 UTC [policies] Evaluate -> DEBU 1ca9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:08.936 UTC [policies] Evaluate -> DEBU 1caa Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.936 UTC [policies] Evaluate -> DEBU 1cab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.937 UTC [gossip.gossip] handleMessage -> DEBU 1cac Exiting" -"2019-05-02 01:31:08.937 UTC [gossip.gossip] handleMessage -> DEBU 1cad Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.937 UTC [gossip.gossip] handleMessage -> DEBU 1cae Exiting" -"2019-05-02 01:31:08.937 UTC [gossip.gossip] handleMessage -> DEBU 1caf Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.937 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.937 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cb1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:08.937 UTC [msp] DeserializeIdentity -> DEBU 1cb2 Obtaining identity" -"2019-05-02 01:31:08.938 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cb3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:08.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cb4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cb5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:08.938 UTC [policies] Evaluate -> DEBU 1cb6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:08.938 UTC [policies] Evaluate -> DEBU 1cb7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:08.938 UTC [policies] Evaluate -> DEBU 1cb8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:08.938 UTC [cauthdsl] func1 -> DEBU 1cb9 0xc0042b5fa0 gate 1556760668938949500 evaluation starts" -"2019-05-02 01:31:08.939 UTC [cauthdsl] func2 -> DEBU 1cba 0xc0042b5fa0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:08.939 UTC [cauthdsl] func2 -> DEBU 1cbb 0xc0042b5fa0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:08.939 UTC [cauthdsl] func2 -> DEBU 1cbc 0xc0042b5fa0 principal matched by identity 0" -"2019-05-02 01:31:08.939 UTC [msp.identity] Verify -> DEBU 1cbd Verify: digest = 00000000 75 e4 dd ff eb 35 18 e7 fe 9b e4 d9 8c c9 e5 3e |u....5.........>| -00000010 f0 e3 d9 fe 1b 94 b7 94 1b a8 2d da 11 e8 eb 8e |..........-.....|" -"2019-05-02 01:31:08.939 UTC [msp.identity] Verify -> DEBU 1cbe Verify: sig = 00000000 30 44 02 20 6d e7 a3 91 be 80 8b f7 f1 59 26 5e |0D. m........Y&^| -00000010 9f 67 e5 9a 91 a6 0f 28 47 4b 9d 99 a8 cf 4d 94 |.g.....(GK....M.| -00000020 77 b8 8c 4c 02 20 1f 9b e7 1f ff e9 1b d4 8c b0 |w..L. ..........| -00000030 5e 14 92 be 50 2b df d2 6d ff 4c b5 59 8a bf fe |^...P+..m.L.Y...| -00000040 74 97 92 9f d5 db |t.....|" -"2019-05-02 01:31:08.939 UTC [cauthdsl] func2 -> DEBU 1cbf 0xc0042b5fa0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:08.939 UTC [cauthdsl] func1 -> DEBU 1cc0 0xc0042b5fa0 gate 1556760668938949500 evaluation succeeds" -"2019-05-02 01:31:08.939 UTC [policies] Evaluate -> DEBU 1cc1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.939 UTC [policies] Evaluate -> DEBU 1cc2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:08.939 UTC [policies] Evaluate -> DEBU 1cc3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:08.939 UTC [policies] Evaluate -> DEBU 1cc4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:08.940 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cc5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.940 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cc6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:08.940 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cc7 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 " -"2019-05-02 01:31:08.940 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cc8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 " -"2019-05-02 01:31:08.941 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cc9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:08.942 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cca Exiting" -"2019-05-02 01:31:08.942 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ccb Exiting" -"2019-05-02 01:31:08.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ccc Exiting" -"2019-05-02 01:31:08.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ccd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cce Exiting" -"2019-05-02 01:31:08.942 UTC [gossip.gossip] handleMessage -> DEBU 1ccf Exiting" -"2019-05-02 01:31:08.943 UTC [gossip.gossip] handleMessage -> DEBU 1cd0 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.943 UTC [gossip.gossip] handleMessage -> DEBU 1cd1 Exiting" -"2019-05-02 01:31:08.943 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cd2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.943 UTC [gossip.gossip] handleMessage -> DEBU 1cd3 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10642209730754194776 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.943 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cd4 Exiting" -"2019-05-02 01:31:08.943 UTC [gossip.pull] HandleMessage -> DEBU 1cd5 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10642209730754194776 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" -"2019-05-02 01:31:08.943 UTC [gossip.gossip] handleMessage -> DEBU 1cd6 Exiting" -"2019-05-02 01:31:08.950 UTC [msp] DeserializeIdentity -> DEBU 1cd7 Obtaining identity" -"2019-05-02 01:31:08.950 UTC [msp] DeserializeIdentity -> DEBU 1cd8 Obtaining identity" -"2019-05-02 01:31:08.950 UTC [msp] DeserializeIdentity -> DEBU 1cd9 Obtaining identity" -"2019-05-02 01:31:08.950 UTC [msp] DeserializeIdentity -> DEBU 1cda Obtaining identity" -"2019-05-02 01:31:08.951 UTC [msp] DeserializeIdentity -> DEBU 1cdb Obtaining identity" -"2019-05-02 01:31:08.951 UTC [msp] DeserializeIdentity -> DEBU 1cdc Obtaining identity" -"2019-05-02 01:31:08.952 UTC [gossip.comm] Send -> DEBU 1cdd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:08.952 UTC [msp] DeserializeIdentity -> DEBU 1cde Obtaining identity" -"2019-05-02 01:31:08.952 UTC [msp] DeserializeIdentity -> DEBU 1cdf Obtaining identity" -"2019-05-02 01:31:08.952 UTC [gossip.comm] Send -> DEBU 1ce0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:08.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ce1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ce2 Exiting" -"2019-05-02 01:31:08.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ce3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:08.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ce4 Exiting" -"2019-05-02 01:31:09.090 UTC [gossip.gossip] handleMessage -> DEBU 1ce5 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.091 UTC [msp] DeserializeIdentity -> DEBU 1ce6 Obtaining identity" -"2019-05-02 01:31:09.091 UTC [msp] DeserializeIdentity -> DEBU 1ce7 Obtaining identity" -"2019-05-02 01:31:09.091 UTC [gossip.gossip] handleMessage -> DEBU 1ce8 Exiting" -"2019-05-02 01:31:09.102 UTC [gossip.gossip] handleMessage -> DEBU 1ce9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760666001912700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:09.106 UTC [msp.identity] Verify -> DEBU 1cea Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -"2019-05-02 01:31:09.108 UTC [msp.identity] Verify -> DEBU 1ceb Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -00000040 23 02 f1 51 98 85 fe |#..Q...|" -"2019-05-02 01:31:09.111 UTC [gossip.gossip] handleMessage -> DEBU 1ced Exiting" -"2019-05-02 01:31:09.110 UTC [gossip.comm] func1 -> DEBU 1cec Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760666001912700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:09.112 UTC [gossip.gossip] handleMessage -> DEBU 1cee Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760666001912700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:09.112 UTC [msp.identity] Verify -> DEBU 1cef Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -"2019-05-02 01:31:09.112 UTC [msp.identity] Verify -> DEBU 1cf0 Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -00000040 23 02 f1 51 98 85 fe |#..Q...|" -"2019-05-02 01:31:09.113 UTC [msp] DeserializeIdentity -> DEBU 1cf1 Obtaining identity" -"2019-05-02 01:31:09.113 UTC [gossip.gossip] handleMessage -> DEBU 1cf2 Exiting" -"2019-05-02 01:31:09.119 UTC [gossip.comm] func1 -> DEBU 1cf3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760666001912700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:09.119 UTC [gossip.gossip] handleMessage -> DEBU 1cf4 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760666001912700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:09.120 UTC [msp.identity] Verify -> DEBU 1cf5 Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -"2019-05-02 01:31:09.120 UTC [msp.identity] Verify -> DEBU 1cf6 Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -00000040 23 02 f1 51 98 85 fe |#..Q...|" -"2019-05-02 01:31:09.121 UTC [msp] DeserializeIdentity -> DEBU 1cf7 Obtaining identity" -"2019-05-02 01:31:09.121 UTC [gossip.gossip] handleMessage -> DEBU 1cf8 Exiting" -"2019-05-02 01:31:09.121 UTC [gossip.gossip] handleMessage -> DEBU 1cf9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.121 UTC [gossip.pull] HandleMessage -> DEBU 1cfa GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.121 UTC [gossip.pull] SendDigest -> DEBU 1cfb Sending BLOCK_MSG digest: [5 1 2 3 4] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:09.121 UTC [gossip.gossip] handleMessage -> DEBU 1cfc Exiting" -"2019-05-02 01:31:09.177 UTC [dockercontroller] Start -> DEBU 1cfd Started container peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" -"2019-05-02 01:31:09.179 UTC [container] unlockContainer -> DEBU 1cfe container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" -"2019-05-02 01:31:09.179 UTC [container] lockContainer -> DEBU 1cff waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" -"2019-05-02 01:31:09.180 UTC [container] lockContainer -> DEBU 1d00 got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" -"2019-05-02 01:31:09.180 UTC [container] unlockContainer -> DEBU 1d01 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" -"2019-05-02 01:31:09.310 UTC [chaincode.accesscontrol] authenticate -> DEBU 1d02 Chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b 's authentication is authorized" -"2019-05-02 01:31:09.310 UTC [chaincode] handleMessage -> DEBU 1d03 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -"2019-05-02 01:31:09.310 UTC [chaincode] HandleRegister -> DEBU 1d04 Received REGISTER in state created" -"2019-05-02 01:31:09.310 UTC [chaincode] Register -> DEBU 1d05 registered handler complete for chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" -"2019-05-02 01:31:09.311 UTC [chaincode] HandleRegister -> DEBU 1d06 Got REGISTER for chaincodeID = name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" , sending back REGISTERED" -"2019-05-02 01:31:09.312 UTC [chaincode] HandleRegister -> DEBU 1d07 Changed state to established for name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " -"2019-05-02 01:31:09.312 UTC [chaincode] sendReady -> DEBU 1d08 sending READY for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " -"2019-05-02 01:31:09.312 UTC [chaincode] sendReady -> DEBU 1d09 Changed to state ready for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " -"2019-05-02 01:31:09.318 UTC [gossip.comm] func1 -> DEBU 1d0a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.319 UTC [gossip.gossip] handleMessage -> DEBU 1d0b Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.319 UTC [msp] DeserializeIdentity -> DEBU 1d0c Obtaining identity" -"2019-05-02 01:31:09.319 UTC [msp] DeserializeIdentity -> DEBU 1d0d Obtaining identity" -"2019-05-02 01:31:09.320 UTC [msp] DeserializeIdentity -> DEBU 1d0e Obtaining identity" -"2019-05-02 01:31:09.320 UTC [gossip.gossip] handleMessage -> DEBU 1d0f Exiting" -"2019-05-02 01:31:09.313 UTC [chaincode] Launch -> DEBU 1d10 launch complete" -"2019-05-02 01:31:09.322 UTC [stateleveldb] GetState -> DEBU 1d11 GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:09.322 UTC [chaincode] Execute -> DEBU 1d12 Entry" -"2019-05-02 01:31:09.326 UTC [gossip.comm] func1 -> DEBU 1d13 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760665949347200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:09.327 UTC [gossip.gossip] handleMessage -> DEBU 1d14 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760665949347200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:09.328 UTC [msp] DeserializeIdentity -> DEBU 1d15 Obtaining identity" -"2019-05-02 01:31:09.328 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:09.329 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d17 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:09.329 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d18 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:09.329 UTC [policies] Evaluate -> DEBU 1d19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:09.329 UTC [policies] Evaluate -> DEBU 1d1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:09.329 UTC [policies] Evaluate -> DEBU 1d1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:09.329 UTC [cauthdsl] func1 -> DEBU 1d1c 0xc00434eb70 gate 1556760669329923400 evaluation starts" -"2019-05-02 01:31:09.330 UTC [cauthdsl] func2 -> DEBU 1d1d 0xc00434eb70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:09.332 UTC [cauthdsl] func2 -> DEBU 1d1e 0xc00434eb70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:09.333 UTC [cauthdsl] func2 -> DEBU 1d1f 0xc00434eb70 principal matched by identity 0" -"2019-05-02 01:31:09.334 UTC [gossip.comm] func1 -> DEBU 1d20 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760665949347200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:09.334 UTC [msp.identity] Verify -> DEBU 1d21 Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -"2019-05-02 01:31:09.336 UTC [msp.identity] Verify -> DEBU 1d22 Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -00000040 9e 37 b5 08 86 fb a3 |.7.....|" -"2019-05-02 01:31:09.337 UTC [cauthdsl] func2 -> DEBU 1d23 0xc00434eb70 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:09.337 UTC [cauthdsl] func1 -> DEBU 1d24 0xc00434eb70 gate 1556760669329923400 evaluation succeeds" -"2019-05-02 01:31:09.337 UTC [policies] Evaluate -> DEBU 1d25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:09.338 UTC [policies] Evaluate -> DEBU 1d26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:09.338 UTC [policies] Evaluate -> DEBU 1d27 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:09.338 UTC [policies] Evaluate -> DEBU 1d28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:09.339 UTC [chaincode] handleMessage -> DEBU 1d29 [13c934fb] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:09.339 UTC [chaincode] HandleTransaction -> DEBU 1d2a [13c934fb] handling PUT_STATE from chaincode" -"2019-05-02 01:31:09.340 UTC [chaincode] HandleTransaction -> DEBU 1d2b [13c934fb] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:09.338 UTC [msp] DeserializeIdentity -> DEBU 1d2c Obtaining identity" -"2019-05-02 01:31:09.340 UTC [gossip.gossip] handleMessage -> DEBU 1d2d Exiting" -"2019-05-02 01:31:09.341 UTC [gossip.gossip] handleMessage -> DEBU 1d2e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760665949347200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:09.343 UTC [msp] DeserializeIdentity -> DEBU 1d30 Obtaining identity" -"2019-05-02 01:31:09.344 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d31 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:09.344 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d32 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:09.344 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d33 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:09.344 UTC [policies] Evaluate -> DEBU 1d34 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:09.342 UTC [chaincode] handleMessage -> DEBU 1d2f [13c934fb] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:09.345 UTC [chaincode] HandleTransaction -> DEBU 1d36 [13c934fb] handling PUT_STATE from chaincode" -"2019-05-02 01:31:09.345 UTC [chaincode] HandleTransaction -> DEBU 1d37 [13c934fb] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:09.344 UTC [policies] Evaluate -> DEBU 1d35 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:09.348 UTC [chaincode] handleMessage -> DEBU 1d38 [13c934fb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:09.347 UTC [policies] Evaluate -> DEBU 1d39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:09.348 UTC [chaincode] Notify -> DEBU 1d3a [13c934fb] notifying Txid:13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa, channelID:businesschannel" -"2019-05-02 01:31:09.349 UTC [cauthdsl] func1 -> DEBU 1d3b 0xc00436a580 gate 1556760669349030300 evaluation starts" -"2019-05-02 01:31:09.349 UTC [cauthdsl] func2 -> DEBU 1d3d 0xc00436a580 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:09.349 UTC [chaincode] Execute -> DEBU 1d3c Exit" -"2019-05-02 01:31:09.350 UTC [cauthdsl] func2 -> DEBU 1d3e 0xc00436a580 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:09.350 UTC [endorser] callChaincode -> INFO 1d3f [businesschannel][13c934fb] Exit chaincode: name:"exp02" (1400ms)" -"2019-05-02 01:31:09.351 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1d41 Simulation completed, getting simulation results" -"2019-05-02 01:31:09.351 UTC [lockbasedtxmgr] Done -> DEBU 1d42 Done with transaction simulation / query execution [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa]" -"2019-05-02 01:31:09.351 UTC [endorser] SimulateProposal -> DEBU 1d43 [businesschannel][13c934fb] Exit" -"2019-05-02 01:31:09.351 UTC [endorser] endorseProposal -> DEBU 1d44 [businesschannel][13c934fb] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:09.350 UTC [cauthdsl] func2 -> DEBU 1d40 0xc00436a580 principal matched by identity 0" -"2019-05-02 01:31:09.352 UTC [endorser] endorseProposal -> DEBU 1d45 [businesschannel][13c934fb] escc for chaincode name:"exp02" is escc" -"2019-05-02 01:31:09.352 UTC [endorser] EndorseWithPlugin -> DEBU 1d47 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa, chaincode: exp02}" -"2019-05-02 01:31:09.353 UTC [msp.identity] Sign -> DEBU 1d48 Sign: plaintext: 0A205C50CA5E5CDB99559A71E4A14AAF...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:09.353 UTC [msp.identity] Sign -> DEBU 1d49 Sign: digest: F3D2F91D0E93EA84246A644014167A16EB81402888B457DA5587093A91D34B0B " -"2019-05-02 01:31:09.353 UTC [endorser] EndorseWithPlugin -> DEBU 1d4a Exiting {plugin: escc, channel: businesschannel, tx: 13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa, chaincode: exp02}" -"2019-05-02 01:31:09.353 UTC [endorser] endorseProposal -> DEBU 1d4b [businesschannel][13c934fb] Exit" -"2019-05-02 01:31:09.354 UTC [lockbasedtxmgr] Done -> DEBU 1d4c Done with transaction simulation / query execution [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa]" -"2019-05-02 01:31:09.354 UTC [endorser] func1 -> DEBU 1d4d Exit: request from 192.168.240.9:41324" -"2019-05-02 01:31:09.352 UTC [msp.identity] Verify -> DEBU 1d46 Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -"2019-05-02 01:31:09.355 UTC [comm.grpc.server] 1 -> INFO 1d4e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41324 grpc.code=OK grpc.call_duration=1.4176709s -"2019-05-02 01:31:09.356 UTC [msp.identity] Verify -> DEBU 1d4f Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -00000040 9e 37 b5 08 86 fb a3 |.7.....|" -"2019-05-02 01:31:09.358 UTC [cauthdsl] func2 -> DEBU 1d50 0xc00436a580 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:09.359 UTC [cauthdsl] func1 -> DEBU 1d51 0xc00436a580 gate 1556760669349030300 evaluation succeeds" -"2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU 1d52 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU 1d53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:09.360 UTC [policies] Evaluate -> DEBU 1d54 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:09.361 UTC [policies] Evaluate -> DEBU 1d55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:09.361 UTC [msp] DeserializeIdentity -> DEBU 1d56 Obtaining identity" -"2019-05-02 01:31:09.362 UTC [gossip.gossip] handleMessage -> DEBU 1d57 Exiting" -"2019-05-02 01:31:09.373 UTC [grpc] infof -> DEBU 1d58 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:09.390 UTC [grpc] warningf -> DEBU 1d59 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41324: read: connection reset by peer" -"2019-05-02 01:31:09.391 UTC [grpc] infof -> DEBU 1d5a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:09.431 UTC [gossip.gossip] handleMessage -> DEBU 1d5b Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.433 UTC [gossip.pull] HandleMessage -> DEBU 1d5c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.434 UTC [gossip.pull] SendDigest -> DEBU 1d5d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:09.436 UTC [gossip.gossip] handleMessage -> DEBU 1d5e Exiting" -"2019-05-02 01:31:09.443 UTC [gossip.gossip] handleMessage -> DEBU 1d5f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.445 UTC [gossip.gossip] handleMessage -> DEBU 1d60 Exiting" -"2019-05-02 01:31:09.445 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.446 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d62 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:09.447 UTC [msp.identity] Verify -> DEBU 1d63 Verify: digest = 00000000 b4 fb 10 b9 21 31 8a 8d a8 19 82 54 06 4c 04 70 |....!1.....T.L.p| -00000010 e3 b7 28 26 da ca a3 1e 3a a6 af 0e c5 7c 86 18 |..(&....:....|..|" -"2019-05-02 01:31:09.447 UTC [msp.identity] Verify -> DEBU 1d64 Verify: sig = 00000000 30 45 02 21 00 ae 0a 11 32 1e 92 8f 4f 8a b6 ca |0E.!....2...O...| -00000010 97 65 20 fb a2 4a 6a af 7e 41 ca a8 3b 09 02 df |.e ..Jj.~A..;...| -00000020 a2 78 54 79 7a 02 20 79 1a eb db e0 ea b1 92 11 |.xTyz. y........| -00000030 7c 81 5b b7 ee 7e a8 77 16 31 32 4f 78 93 d8 c4 ||.[..~.w.12Ox...| -00000040 d7 95 ec 86 58 d8 cc |....X..|" -"2019-05-02 01:31:09.448 UTC [msp.identity] Verify -> DEBU 1d65 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:39.127 UTC [msp.identity] Verify -> DEBU 1b0b Verify: sig = 00000000 30 44 02 20 17 ee bc d5 e1 16 a9 bf 02 e9 cc 26 |0D. ...........&| +00000010 94 c1 26 18 fc 87 c0 a7 b5 30 2e 53 fd cb 14 b8 |..&......0.S....| +00000020 5a 6f f8 14 02 20 67 54 cf 88 86 d0 ff 0f cd c4 |Zo... gT........| +00000030 d3 e2 7e c9 34 97 3d f7 13 f4 f9 d9 da c6 6a 60 |..~.4.=.......j`| +00000040 3d 19 57 d3 2f 80 |=.W./.|" +"2019-05-02 09:27:39.128 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b0c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:39.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b0d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:27:39.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b0e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 " +"2019-05-02 09:27:39.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b0f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 " +"2019-05-02 09:27:39.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b10 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:39.130 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b11 Exiting" +"2019-05-02 09:27:39.130 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b12 Exiting" +"2019-05-02 09:27:39.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b13 Exiting" +"2019-05-02 09:27:39.131 UTC [msp] DeserializeIdentity -> DEBU 1b14 Obtaining identity" +"2019-05-02 09:27:39.131 UTC [msp] DeserializeIdentity -> DEBU 1b15 Obtaining identity" +"2019-05-02 09:27:39.132 UTC [msp] DeserializeIdentity -> DEBU 1b16 Obtaining identity" +"2019-05-02 09:27:39.132 UTC [gossip.comm] Send -> DEBU 1b17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:39.132 UTC [msp] DeserializeIdentity -> DEBU 1b18 Obtaining identity" +"2019-05-02 09:27:39.133 UTC [gossip.comm] Send -> DEBU 1b19 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:39.133 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:39.133 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1b Exiting" +"2019-05-02 09:27:39.134 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:39.134 UTC [gossip.comm] sendToEndpoint -> DEBU 1b1d Exiting" +"2019-05-02 09:27:39.146 UTC [gossip.gossip] handleMessage -> DEBU 1b1e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:39.146 UTC [gossip.gossip] handleMessage -> DEBU 1b1f Exiting" +"2019-05-02 09:27:39.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b20 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:39.147 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b21 Exiting" +"2019-05-02 09:27:39.199 UTC [gossip.gossip] handleMessage -> DEBU 1b22 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:39.200 UTC [gossip.gossip] handleMessage -> DEBU 1b23 Exiting" +"2019-05-02 09:27:39.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:39.200 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b25 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:39.201 UTC [msp] DeserializeIdentity -> DEBU 1b26 Obtaining identity" +"2019-05-02 09:27:39.201 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b27 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:39.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b28 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:39.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b29 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:39.203 UTC [policies] Evaluate -> DEBU 1b2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:39.203 UTC [policies] Evaluate -> DEBU 1b2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:39.203 UTC [policies] Evaluate -> DEBU 1b2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:39.210 UTC [cauthdsl] func1 -> DEBU 1b2d 0xc003ab68a0 gate 1556789259210092600 evaluation starts" +"2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b2e 0xc003ab68a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b2f 0xc003ab68a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b30 0xc003ab68a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b31 0xc003ab68a0 principal evaluation fails" +"2019-05-02 09:27:39.210 UTC [cauthdsl] func1 -> DEBU 1b32 0xc003ab68a0 gate 1556789259210092600 evaluation fails" +"2019-05-02 09:27:39.210 UTC [policies] Evaluate -> DEBU 1b33 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:39.210 UTC [policies] Evaluate -> DEBU 1b34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:39.210 UTC [policies] Evaluate -> DEBU 1b35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:39.210 UTC [cauthdsl] func1 -> DEBU 1b36 0xc003ab70e0 gate 1556789259210695600 evaluation starts" +"2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b37 0xc003ab70e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b38 0xc003ab70e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:39.210 UTC [cauthdsl] func2 -> DEBU 1b39 0xc003ab70e0 principal matched by identity 0" +"2019-05-02 09:27:39.210 UTC [msp.identity] Verify -> DEBU 1b3a Verify: digest = 00000000 06 38 3f 95 2b 07 df 57 0c 2f c7 f2 2a 16 9c cb |.8?.+..W./..*...| +00000010 dc ec c0 38 6d e0 74 4c f1 4a 37 42 d3 31 60 dc |...8m.tL.J7B.1`.|" +"2019-05-02 09:27:39.210 UTC [msp.identity] Verify -> DEBU 1b3b Verify: sig = 00000000 30 44 02 20 25 dd c0 ef 9d ef c0 b5 fa ee e4 2a |0D. %..........*| +00000010 75 c7 f5 f1 a6 ef 86 f1 20 89 0c c4 6c bf c7 66 |u....... ...l..f| +00000020 f8 9a 3d c3 02 20 49 6e bd 60 4b d3 88 72 bf 97 |..=.. In.`K..r..| +00000030 90 8f 1f fe 4a 7c a6 ca 11 43 a7 e9 d4 a7 11 50 |....J|...C.....P| +00000040 66 d6 1f bd a0 48 |f....H|" +"2019-05-02 09:27:39.211 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc003ab70e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:39.211 UTC [cauthdsl] func1 -> DEBU 1b3d 0xc003ab70e0 gate 1556789259210695600 evaluation succeeds" +"2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b3e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b40 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:39.211 UTC [policies] Evaluate -> DEBU 1b41 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:39.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b42 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b43 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b44 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 " +"2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b45 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 " +"2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b46 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:39.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b47 Exiting" +"2019-05-02 09:27:39.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b48 Exiting" +"2019-05-02 09:27:39.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b49 Exiting" +"2019-05-02 09:27:39.211 UTC [msp] DeserializeIdentity -> DEBU 1b4a Obtaining identity" +"2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4b Obtaining identity" +"2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4c Obtaining identity" +"2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4d Obtaining identity" +"2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4e Obtaining identity" +"2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b4f Obtaining identity" +"2019-05-02 09:27:39.212 UTC [gossip.comm] Send -> DEBU 1b50 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b51 Obtaining identity" +"2019-05-02 09:27:39.212 UTC [msp] DeserializeIdentity -> DEBU 1b52 Obtaining identity" +"2019-05-02 09:27:39.212 UTC [gossip.comm] Send -> DEBU 1b53 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:39.212 UTC [gossip.comm] sendToEndpoint -> DEBU 1b54 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:39.212 UTC [gossip.comm] sendToEndpoint -> DEBU 1b55 Exiting" +"2019-05-02 09:27:39.213 UTC [gossip.comm] sendToEndpoint -> DEBU 1b56 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:39.213 UTC [gossip.comm] sendToEndpoint -> DEBU 1b57 Exiting" +"2019-05-02 09:27:39.226 UTC [gossip.comm] func1 -> DEBU 1b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:39.226 UTC [gossip.gossip] handleMessage -> DEBU 1b59 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:39.226 UTC [gossip.gossip] handleMessage -> DEBU 1b5a Exiting" +"2019-05-02 09:27:39.226 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:39.226 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b5c Exiting" +"2019-05-02 09:27:39.235 UTC [gossip.gossip] handleMessage -> DEBU 1b5d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:39.235 UTC [gossip.gossip] handleMessage -> DEBU 1b5e Exiting" +"2019-05-02 09:27:39.235 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b5f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:39.235 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b60 Exiting" +"2019-05-02 09:27:39.250 UTC [dockercontroller] Start -> DEBU 1b61 Started container peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-05-02 09:27:39.250 UTC [container] unlockContainer -> DEBU 1b62 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" +"2019-05-02 09:27:39.250 UTC [container] lockContainer -> DEBU 1b63 waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +"2019-05-02 09:27:39.250 UTC [container] lockContainer -> DEBU 1b64 got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +"2019-05-02 09:27:39.250 UTC [container] unlockContainer -> DEBU 1b65 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" +"2019-05-02 09:27:39.310 UTC [chaincode.accesscontrol] authenticate -> DEBU 1b66 Chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b 's authentication is authorized" +"2019-05-02 09:27:39.311 UTC [chaincode] handleMessage -> DEBU 1b67 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-05-02 09:27:39.311 UTC [chaincode] HandleRegister -> DEBU 1b68 Received REGISTER in state created" +"2019-05-02 09:27:39.311 UTC [chaincode] Register -> DEBU 1b69 registered handler complete for chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-05-02 09:27:39.311 UTC [chaincode] HandleRegister -> DEBU 1b6a Got REGISTER for chaincodeID = name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" , sending back REGISTERED" +"2019-05-02 09:27:39.311 UTC [chaincode] HandleRegister -> DEBU 1b6b Changed state to established for name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +"2019-05-02 09:27:39.311 UTC [chaincode] sendReady -> DEBU 1b6c sending READY for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +"2019-05-02 09:27:39.311 UTC [chaincode] sendReady -> DEBU 1b6d Changed to state ready for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +"2019-05-02 09:27:39.312 UTC [chaincode] Launch -> DEBU 1b6e launch complete" +"2019-05-02 09:27:39.312 UTC [stateleveldb] GetState -> DEBU 1b6f GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:39.312 UTC [chaincode] Execute -> DEBU 1b70 Entry" +"2019-05-02 09:27:39.313 UTC [chaincode] handleMessage -> DEBU 1b71 [592858be] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:39.314 UTC [chaincode] HandleTransaction -> DEBU 1b72 [592858be] handling PUT_STATE from chaincode" +"2019-05-02 09:27:39.314 UTC [chaincode] HandleTransaction -> DEBU 1b73 [592858be] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:39.315 UTC [chaincode] handleMessage -> DEBU 1b74 [592858be] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:39.315 UTC [chaincode] HandleTransaction -> DEBU 1b75 [592858be] handling PUT_STATE from chaincode" +"2019-05-02 09:27:39.315 UTC [chaincode] HandleTransaction -> DEBU 1b76 [592858be] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:39.316 UTC [chaincode] handleMessage -> DEBU 1b77 [592858be] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:39.317 UTC [chaincode] Notify -> DEBU 1b78 [592858be] notifying Txid:592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, channelID:businesschannel" +"2019-05-02 09:27:39.317 UTC [chaincode] Execute -> DEBU 1b79 Exit" +"2019-05-02 09:27:39.317 UTC [endorser] callChaincode -> INFO 1b7a [businesschannel][592858be] Exit chaincode: name:"exp02" (1034ms)" +"2019-05-02 09:27:39.318 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1b7b Simulation completed, getting simulation results" +"2019-05-02 09:27:39.318 UTC [lockbasedtxmgr] Done -> DEBU 1b7c Done with transaction simulation / query execution [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]" +"2019-05-02 09:27:39.318 UTC [endorser] SimulateProposal -> DEBU 1b7d [businesschannel][592858be] Exit" +"2019-05-02 09:27:39.319 UTC [endorser] endorseProposal -> DEBU 1b7e [businesschannel][592858be] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:39.319 UTC [endorser] endorseProposal -> DEBU 1b7f [businesschannel][592858be] escc for chaincode name:"exp02" is escc" +"2019-05-02 09:27:39.319 UTC [endorser] EndorseWithPlugin -> DEBU 1b80 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, chaincode: exp02}" +"2019-05-02 09:27:39.320 UTC [msp.identity] Sign -> DEBU 1b81 Sign: plaintext: 0A209D4D9AFEF5B3DE6A23F5712CD2CB...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:39.320 UTC [msp.identity] Sign -> DEBU 1b82 Sign: digest: 26D8B924113487C937059D11EFBCBE441B8B07F1F20F249D8B345C4643402A34 " +"2019-05-02 09:27:39.320 UTC [endorser] EndorseWithPlugin -> DEBU 1b83 Exiting {plugin: escc, channel: businesschannel, tx: 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, chaincode: exp02}" +"2019-05-02 09:27:39.321 UTC [endorser] endorseProposal -> DEBU 1b84 [businesschannel][592858be] Exit" +"2019-05-02 09:27:39.321 UTC [lockbasedtxmgr] Done -> DEBU 1b85 Done with transaction simulation / query execution [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]" +"2019-05-02 09:27:39.322 UTC [endorser] func1 -> DEBU 1b86 Exit: request from 172.18.0.8:57334" +"2019-05-02 09:27:39.322 UTC [comm.grpc.server] 1 -> INFO 1b87 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57334 grpc.code=OK grpc.call_duration=1.0480193s +"2019-05-02 09:27:39.334 UTC [grpc] infof -> DEBU 1b88 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:39.334 UTC [grpc] infof -> DEBU 1b89 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:40.284 UTC [msp] DeserializeIdentity -> DEBU 1b8a Obtaining identity" +"2019-05-02 09:27:40.285 UTC [msp] DeserializeIdentity -> DEBU 1b8b Obtaining identity" +"2019-05-02 09:27:40.285 UTC [gossip.comm] Send -> DEBU 1b8c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:27:40.286 UTC [gossip.comm] sendToEndpoint -> DEBU 1b8d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.286 UTC [gossip.comm] sendToEndpoint -> DEBU 1b8e Exiting" +"2019-05-02 09:27:40.287 UTC [gossip.comm] sendToEndpoint -> DEBU 1b8f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1b90 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1b91 Exiting" +"2019-05-02 09:27:40.288 UTC [gossip.comm] sendToEndpoint -> DEBU 1b92 Exiting" +"2019-05-02 09:27:40.289 UTC [gossip.gossip] handleMessage -> DEBU 1b93 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.289 UTC [msp] DeserializeIdentity -> DEBU 1b94 Obtaining identity" +"2019-05-02 09:27:40.289 UTC [msp] DeserializeIdentity -> DEBU 1b95 Obtaining identity" +"2019-05-02 09:27:40.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:40.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b97 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.290 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b98 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.290 UTC [policies] Evaluate -> DEBU 1b99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:40.291 UTC [policies] Evaluate -> DEBU 1b9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:40.291 UTC [policies] Evaluate -> DEBU 1b9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:40.291 UTC [cauthdsl] func1 -> DEBU 1b9c 0xc003b3c5e0 gate 1556789260291828700 evaluation starts" +"2019-05-02 09:27:40.292 UTC [cauthdsl] func2 -> DEBU 1b9d 0xc003b3c5e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.292 UTC [cauthdsl] func2 -> DEBU 1b9e 0xc003b3c5e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.293 UTC [cauthdsl] func2 -> DEBU 1b9f 0xc003b3c5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:40.293 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc003b3c5e0 principal evaluation fails" +"2019-05-02 09:27:40.293 UTC [cauthdsl] func1 -> DEBU 1ba1 0xc003b3c5e0 gate 1556789260291828700 evaluation fails" +"2019-05-02 09:27:40.293 UTC [policies] Evaluate -> DEBU 1ba2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.293 UTC [policies] Evaluate -> DEBU 1ba3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.294 UTC [policies] Evaluate -> DEBU 1ba4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:40.294 UTC [cauthdsl] func1 -> DEBU 1ba5 0xc003b3ce20 gate 1556789260294068300 evaluation starts" +"2019-05-02 09:27:40.294 UTC [cauthdsl] func2 -> DEBU 1ba6 0xc003b3ce20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.294 UTC [cauthdsl] func2 -> DEBU 1ba7 0xc003b3ce20 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.294 UTC [cauthdsl] func2 -> DEBU 1ba8 0xc003b3ce20 principal matched by identity 0" +"2019-05-02 09:27:40.294 UTC [msp.identity] Verify -> DEBU 1ba9 Verify: digest = 00000000 b3 b2 64 25 a1 68 74 b2 6b 2a f1 1f 5c 44 70 9b |..d%.ht.k*..\Dp.| +00000010 84 83 34 e2 86 4d 6a f6 20 32 45 72 a5 a3 cb c7 |..4..Mj. 2Er....|" +"2019-05-02 09:27:40.294 UTC [msp.identity] Verify -> DEBU 1baa Verify: sig = 00000000 30 44 02 20 2b ea cd 44 77 1a 6e 55 92 05 2d 01 |0D. +..Dw.nU..-.| +00000010 a0 e8 dd 76 61 6b e4 94 ef 6e f4 8c 02 34 ee 5f |...vak...n...4._| +00000020 fa 3d 80 de 02 20 79 ec 31 0e 10 aa 73 0a 7c 15 |.=... y.1...s.|.| +00000030 90 c9 f6 15 1b 85 2c c8 0d b7 b7 29 75 aa 56 23 |......,....)u.V#| +00000040 dc 87 d7 13 63 c7 |....c.|" +"2019-05-02 09:27:40.295 UTC [cauthdsl] func2 -> DEBU 1bab 0xc003b3ce20 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:40.295 UTC [cauthdsl] func1 -> DEBU 1bac 0xc003b3ce20 gate 1556789260294068300 evaluation succeeds" +"2019-05-02 09:27:40.295 UTC [policies] Evaluate -> DEBU 1bad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.295 UTC [policies] Evaluate -> DEBU 1bae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.296 UTC [policies] Evaluate -> DEBU 1baf Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:40.296 UTC [policies] Evaluate -> DEBU 1bb0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:40.296 UTC [msp.identity] Verify -> DEBU 1bb1 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..| +00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|" +"2019-05-02 09:27:40.296 UTC [msp.identity] Verify -> DEBU 1bb2 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v| +00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E| +00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p| +00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.| +00000040 68 f9 f0 83 f9 50 9b |h....P.|" +"2019-05-02 09:27:40.297 UTC [msp.identity] Verify -> DEBU 1bb3 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +"2019-05-02 09:27:40.298 UTC [msp.identity] Verify -> DEBU 1bb4 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +"2019-05-02 09:27:40.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bb5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bb6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.299 UTC [policies] Evaluate -> DEBU 1bb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:40.299 UTC [policies] Evaluate -> DEBU 1bb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:40.299 UTC [policies] Evaluate -> DEBU 1bb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:40.299 UTC [cauthdsl] func1 -> DEBU 1bba 0xc003b52c40 gate 1556789260299564700 evaluation starts" +"2019-05-02 09:27:40.299 UTC [cauthdsl] func2 -> DEBU 1bbb 0xc003b52c40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.299 UTC [cauthdsl] func2 -> DEBU 1bbc 0xc003b52c40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.300 UTC [cauthdsl] func2 -> DEBU 1bbd 0xc003b52c40 principal matched by identity 0" +"2019-05-02 09:27:40.300 UTC [msp.identity] Verify -> DEBU 1bbf Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +"2019-05-02 09:27:40.300 UTC [msp.identity] Verify -> DEBU 1bc0 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +"2019-05-02 09:27:40.299 UTC [gossip.comm] func1 -> DEBU 1bbe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.300 UTC [msp] DeserializeIdentity -> DEBU 1bc1 Obtaining identity" +"2019-05-02 09:27:40.300 UTC [msp] DeserializeIdentity -> DEBU 1bc2 Obtaining identity" +"2019-05-02 09:27:40.301 UTC [gossip.comm] Send -> DEBU 1bc3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +"2019-05-02 09:27:40.301 UTC [msp] DeserializeIdentity -> DEBU 1bc4 Obtaining identity" +"2019-05-02 09:27:40.301 UTC [msp] DeserializeIdentity -> DEBU 1bc5 Obtaining identity" +"2019-05-02 09:27:40.301 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:40.301 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc7 Exiting" +"2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc9 Exiting" +"2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789256862404200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:40.302 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcb Exiting" +"2019-05-02 09:27:40.303 UTC [cauthdsl] func2 -> DEBU 1bcc 0xc003b52c40 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:40.304 UTC [cauthdsl] func1 -> DEBU 1bcd 0xc003b52c40 gate 1556789260299564700 evaluation succeeds" +"2019-05-02 09:27:40.304 UTC [policies] Evaluate -> DEBU 1bce Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.305 UTC [policies] Evaluate -> DEBU 1bcf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.305 UTC [policies] Evaluate -> DEBU 1bd0 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:40.306 UTC [policies] Evaluate -> DEBU 1bd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:40.306 UTC [msp] DeserializeIdentity -> DEBU 1bd2 Obtaining identity" +"2019-05-02 09:27:40.307 UTC [msp] DeserializeIdentity -> DEBU 1bd3 Obtaining identity" +"2019-05-02 09:27:40.307 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bd4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:40.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bd5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bd6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.309 UTC [policies] Evaluate -> DEBU 1bd7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:40.309 UTC [policies] Evaluate -> DEBU 1bd8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:40.309 UTC [policies] Evaluate -> DEBU 1bd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:40.310 UTC [cauthdsl] func1 -> DEBU 1bda 0xc003b7c410 gate 1556789260310338200 evaluation starts" +"2019-05-02 09:27:40.310 UTC [cauthdsl] func2 -> DEBU 1bdb 0xc003b7c410 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.311 UTC [cauthdsl] func2 -> DEBU 1bdc 0xc003b7c410 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.311 UTC [cauthdsl] func2 -> DEBU 1bdd 0xc003b7c410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:40.311 UTC [cauthdsl] func2 -> DEBU 1bde 0xc003b7c410 principal evaluation fails" +"2019-05-02 09:27:40.312 UTC [cauthdsl] func1 -> DEBU 1bdf 0xc003b7c410 gate 1556789260310338200 evaluation fails" +"2019-05-02 09:27:40.312 UTC [policies] Evaluate -> DEBU 1be0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.313 UTC [policies] Evaluate -> DEBU 1be1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.313 UTC [policies] Evaluate -> DEBU 1be2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:40.313 UTC [cauthdsl] func1 -> DEBU 1be3 0xc003b7cc50 gate 1556789260313828300 evaluation starts" +"2019-05-02 09:27:40.314 UTC [cauthdsl] func2 -> DEBU 1be4 0xc003b7cc50 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.314 UTC [cauthdsl] func2 -> DEBU 1be5 0xc003b7cc50 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.314 UTC [cauthdsl] func2 -> DEBU 1be6 0xc003b7cc50 principal matched by identity 0" +"2019-05-02 09:27:40.314 UTC [msp.identity] Verify -> DEBU 1be7 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +"2019-05-02 09:27:40.314 UTC [msp.identity] Verify -> DEBU 1be8 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +00000040 6f f6 d4 dd 46 29 |o...F)|" +"2019-05-02 09:27:40.315 UTC [cauthdsl] func2 -> DEBU 1be9 0xc003b7cc50 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:40.316 UTC [cauthdsl] func1 -> DEBU 1bea 0xc003b7cc50 gate 1556789260313828300 evaluation succeeds" +"2019-05-02 09:27:40.316 UTC [policies] Evaluate -> DEBU 1beb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.316 UTC [policies] Evaluate -> DEBU 1bec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.316 UTC [policies] Evaluate -> DEBU 1bed Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:40.317 UTC [policies] Evaluate -> DEBU 1bee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:40.317 UTC [gossip.gossip] handleMessage -> DEBU 1bef Exiting" +"2019-05-02 09:27:40.317 UTC [gossip.gossip] handleMessage -> DEBU 1bf0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.318 UTC [msp] DeserializeIdentity -> DEBU 1bf1 Obtaining identity" +"2019-05-02 09:27:40.320 UTC [msp.identity] Verify -> DEBU 1bf2 Verify: digest = 00000000 08 20 a4 f8 a9 a9 20 34 6e fd e2 59 11 3f b6 88 |. .... 4n..Y.?..| +00000010 cd 3c 1b 3a f1 19 36 4d 48 d5 26 9b de f9 ed 35 |.<.:..6MH.&....5|" +"2019-05-02 09:27:40.320 UTC [msp.identity] Verify -> DEBU 1bf3 Verify: sig = 00000000 30 45 02 21 00 cf f3 c9 bc ee 4c 0a 7d a2 60 76 |0E.!......L.}.`v| +00000010 aa 46 3f bf 78 8f e5 df 5d 00 1a b1 58 71 28 45 |.F?.x...]...Xq(E| +00000020 e2 5e 5c f3 22 02 20 1a c8 8c 78 8a a7 23 99 70 |.^\.". ...x..#.p| +00000030 54 e4 5e 31 47 14 d8 34 e8 06 67 ed 74 ff 25 b3 |T.^1G..4..g.t.%.| +00000040 68 f9 f0 83 f9 50 9b |h....P.|" +"2019-05-02 09:27:40.323 UTC [msp.identity] Verify -> DEBU 1bf4 Verify: digest = 00000000 95 ac 82 fe 27 41 d8 2e a8 31 90 a8 22 44 bd ff |....'A...1.."D..| +00000010 5e b2 73 09 e0 43 af 3b b3 29 d9 41 4a a1 15 51 |^.s..C.;.).AJ..Q|" +"2019-05-02 09:27:40.323 UTC [msp.identity] Verify -> DEBU 1bf5 Verify: sig = 00000000 30 44 02 20 0e eb 3d 92 bf 97 8a cc 41 59 14 c0 |0D. ..=.....AY..| +00000010 70 d9 ef e7 5e 9c 04 7a d8 42 59 db 78 cc 13 84 |p...^..z.BY.x...| +00000020 ef b8 5f ba 02 20 3f 86 b1 67 c8 65 fd bc 60 af |.._.. ?..g.e..`.| +00000030 b9 28 9a af 0a c0 41 1a 6d 04 55 cd aa 55 07 42 |.(....A.m.U..U.B| +00000040 57 6e 93 b1 86 0c |Wn....|" +"2019-05-02 09:27:40.323 UTC [msp] DeserializeIdentity -> DEBU 1bf6 Obtaining identity" +"2019-05-02 09:27:40.324 UTC [msp] DeserializeIdentity -> DEBU 1bf7 Obtaining identity" +"2019-05-02 09:27:40.324 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bf8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:40.324 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bf9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.324 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bfa Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.324 UTC [policies] Evaluate -> DEBU 1bfb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:40.325 UTC [policies] Evaluate -> DEBU 1bfc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:40.325 UTC [policies] Evaluate -> DEBU 1bfd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:40.325 UTC [cauthdsl] func1 -> DEBU 1bfe 0xc003b915a0 gate 1556789260325535300 evaluation starts" +"2019-05-02 09:27:40.325 UTC [cauthdsl] func2 -> DEBU 1bff 0xc003b915a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.325 UTC [cauthdsl] func2 -> DEBU 1c00 0xc003b915a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c01 0xc003b915a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c02 0xc003b915a0 principal evaluation fails" +"2019-05-02 09:27:40.326 UTC [cauthdsl] func1 -> DEBU 1c03 0xc003b915a0 gate 1556789260325535300 evaluation fails" +"2019-05-02 09:27:40.326 UTC [policies] Evaluate -> DEBU 1c04 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.326 UTC [policies] Evaluate -> DEBU 1c05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.326 UTC [policies] Evaluate -> DEBU 1c06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:40.326 UTC [cauthdsl] func1 -> DEBU 1c07 0xc003b91de0 gate 1556789260326613300 evaluation starts" +"2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c08 0xc003b91de0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.326 UTC [cauthdsl] func2 -> DEBU 1c09 0xc003b91de0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.327 UTC [cauthdsl] func2 -> DEBU 1c0a 0xc003b91de0 principal matched by identity 0" +"2019-05-02 09:27:40.327 UTC [msp.identity] Verify -> DEBU 1c0b Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +"2019-05-02 09:27:40.327 UTC [msp.identity] Verify -> DEBU 1c0c Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +00000040 6c 9b e9 95 fc 61 |l....a|" +"2019-05-02 09:27:40.327 UTC [cauthdsl] func2 -> DEBU 1c0d 0xc003b91de0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:40.327 UTC [cauthdsl] func1 -> DEBU 1c0e 0xc003b91de0 gate 1556789260326613300 evaluation succeeds" +"2019-05-02 09:27:40.327 UTC [policies] Evaluate -> DEBU 1c0f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c11 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:40.328 UTC [msp] DeserializeIdentity -> DEBU 1c13 Obtaining identity" +"2019-05-02 09:27:40.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c14 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.328 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c15 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c16 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:40.328 UTC [policies] Evaluate -> DEBU 1c17 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:40.329 UTC [policies] Evaluate -> DEBU 1c18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:40.329 UTC [cauthdsl] func1 -> DEBU 1c19 0xc003ba4ec0 gate 1556789260329112500 evaluation starts" +"2019-05-02 09:27:40.329 UTC [cauthdsl] func2 -> DEBU 1c1a 0xc003ba4ec0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.329 UTC [cauthdsl] func2 -> DEBU 1c1b 0xc003ba4ec0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.330 UTC [cauthdsl] func2 -> DEBU 1c1c 0xc003ba4ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:40.330 UTC [cauthdsl] func2 -> DEBU 1c1d 0xc003ba4ec0 principal evaluation fails" +"2019-05-02 09:27:40.330 UTC [cauthdsl] func1 -> DEBU 1c1e 0xc003ba4ec0 gate 1556789260329112500 evaluation fails" +"2019-05-02 09:27:40.330 UTC [policies] Evaluate -> DEBU 1c1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.330 UTC [policies] Evaluate -> DEBU 1c20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.330 UTC [policies] Evaluate -> DEBU 1c21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:40.330 UTC [cauthdsl] func1 -> DEBU 1c22 0xc003ba5700 gate 1556789260330784200 evaluation starts" +"2019-05-02 09:27:40.331 UTC [cauthdsl] func2 -> DEBU 1c23 0xc003ba5700 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.331 UTC [cauthdsl] func2 -> DEBU 1c24 0xc003ba5700 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.331 UTC [cauthdsl] func2 -> DEBU 1c25 0xc003ba5700 principal matched by identity 0" +"2019-05-02 09:27:40.331 UTC [msp.identity] Verify -> DEBU 1c26 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +"2019-05-02 09:27:40.331 UTC [msp.identity] Verify -> DEBU 1c27 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +00000040 6c 9b e9 95 fc 61 |l....a|" +"2019-05-02 09:27:40.332 UTC [cauthdsl] func2 -> DEBU 1c28 0xc003ba5700 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:40.332 UTC [cauthdsl] func1 -> DEBU 1c29 0xc003ba5700 gate 1556789260330784200 evaluation succeeds" +"2019-05-02 09:27:40.332 UTC [policies] Evaluate -> DEBU 1c2a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.332 UTC [policies] Evaluate -> DEBU 1c2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.332 UTC [policies] Evaluate -> DEBU 1c2c Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:40.333 UTC [policies] Evaluate -> DEBU 1c2d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:40.333 UTC [msp] DeserializeIdentity -> DEBU 1c2e Obtaining identity" +"2019-05-02 09:27:40.333 UTC [msp] DeserializeIdentity -> DEBU 1c2f Obtaining identity" +"2019-05-02 09:27:40.333 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c30 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:40.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c31 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c32 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.334 UTC [policies] Evaluate -> DEBU 1c33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:40.334 UTC [policies] Evaluate -> DEBU 1c34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:40.334 UTC [policies] Evaluate -> DEBU 1c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:40.334 UTC [cauthdsl] func1 -> DEBU 1c36 0xc003bb2ed0 gate 1556789260334562900 evaluation starts" +"2019-05-02 09:27:40.334 UTC [cauthdsl] func2 -> DEBU 1c37 0xc003bb2ed0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.334 UTC [cauthdsl] func2 -> DEBU 1c38 0xc003bb2ed0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.335 UTC [cauthdsl] func2 -> DEBU 1c39 0xc003bb2ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:40.335 UTC [cauthdsl] func2 -> DEBU 1c3a 0xc003bb2ed0 principal evaluation fails" +"2019-05-02 09:27:40.335 UTC [cauthdsl] func1 -> DEBU 1c3b 0xc003bb2ed0 gate 1556789260334562900 evaluation fails" +"2019-05-02 09:27:40.335 UTC [policies] Evaluate -> DEBU 1c3c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.335 UTC [policies] Evaluate -> DEBU 1c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.335 UTC [policies] Evaluate -> DEBU 1c3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:40.335 UTC [cauthdsl] func1 -> DEBU 1c3f 0xc003bb3710 gate 1556789260335788700 evaluation starts" +"2019-05-02 09:27:40.335 UTC [cauthdsl] func2 -> DEBU 1c40 0xc003bb3710 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.336 UTC [cauthdsl] func2 -> DEBU 1c41 0xc003bb3710 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.336 UTC [cauthdsl] func2 -> DEBU 1c42 0xc003bb3710 principal matched by identity 0" +"2019-05-02 09:27:40.336 UTC [msp.identity] Verify -> DEBU 1c43 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +"2019-05-02 09:27:40.336 UTC [msp.identity] Verify -> DEBU 1c44 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +00000040 6f f6 d4 dd 46 29 |o...F)|" +"2019-05-02 09:27:40.336 UTC [cauthdsl] func2 -> DEBU 1c45 0xc003bb3710 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:40.336 UTC [cauthdsl] func1 -> DEBU 1c46 0xc003bb3710 gate 1556789260335788700 evaluation succeeds" +"2019-05-02 09:27:40.336 UTC [policies] Evaluate -> DEBU 1c47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.337 UTC [policies] Evaluate -> DEBU 1c48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.337 UTC [policies] Evaluate -> DEBU 1c49 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:40.337 UTC [policies] Evaluate -> DEBU 1c4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:40.337 UTC [gossip.gossip] handleMessage -> DEBU 1c4b Exiting" +"2019-05-02 09:27:40.337 UTC [gossip.gossip] handleMessage -> DEBU 1c4c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.337 UTC [msp] DeserializeIdentity -> DEBU 1c4d Obtaining identity" +"2019-05-02 09:27:40.338 UTC [msp] DeserializeIdentity -> DEBU 1c4e Obtaining identity" +"2019-05-02 09:27:40.338 UTC [msp] DeserializeIdentity -> DEBU 1c4f Obtaining identity" +"2019-05-02 09:27:40.338 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c50 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:40.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c51 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c52 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.339 UTC [policies] Evaluate -> DEBU 1c53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:40.339 UTC [policies] Evaluate -> DEBU 1c54 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:40.339 UTC [policies] Evaluate -> DEBU 1c55 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:40.339 UTC [cauthdsl] func1 -> DEBU 1c56 0xc003bd1220 gate 1556789260339588400 evaluation starts" +"2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c57 0xc003bd1220 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c58 0xc003bd1220 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c59 0xc003bd1220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:40.339 UTC [cauthdsl] func2 -> DEBU 1c5a 0xc003bd1220 principal evaluation fails" +"2019-05-02 09:27:40.339 UTC [cauthdsl] func1 -> DEBU 1c5b 0xc003bd1220 gate 1556789260339588400 evaluation fails" +"2019-05-02 09:27:40.340 UTC [policies] Evaluate -> DEBU 1c5c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.340 UTC [policies] Evaluate -> DEBU 1c5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.340 UTC [policies] Evaluate -> DEBU 1c5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:40.340 UTC [cauthdsl] func1 -> DEBU 1c5f 0xc003bd1a60 gate 1556789260340489500 evaluation starts" +"2019-05-02 09:27:40.340 UTC [cauthdsl] func2 -> DEBU 1c60 0xc003bd1a60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.340 UTC [cauthdsl] func2 -> DEBU 1c61 0xc003bd1a60 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.340 UTC [cauthdsl] func2 -> DEBU 1c62 0xc003bd1a60 principal matched by identity 0" +"2019-05-02 09:27:40.341 UTC [msp.identity] Verify -> DEBU 1c63 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +"2019-05-02 09:27:40.341 UTC [msp.identity] Verify -> DEBU 1c64 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +00000040 6f f6 d4 dd 46 29 |o...F)|" +"2019-05-02 09:27:40.341 UTC [cauthdsl] func2 -> DEBU 1c65 0xc003bd1a60 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:40.341 UTC [cauthdsl] func1 -> DEBU 1c66 0xc003bd1a60 gate 1556789260340489500 evaluation succeeds" +"2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c67 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c69 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:40.341 UTC [policies] Evaluate -> DEBU 1c6a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:40.342 UTC [msp.identity] Verify -> DEBU 1c6b Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +"2019-05-02 09:27:40.342 UTC [msp.identity] Verify -> DEBU 1c6c Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +"2019-05-02 09:27:40.343 UTC [msp] DeserializeIdentity -> DEBU 1c6d Obtaining identity" +"2019-05-02 09:27:40.343 UTC [msp] DeserializeIdentity -> DEBU 1c6e Obtaining identity" +"2019-05-02 09:27:40.343 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:40.343 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c70 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.343 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c71 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:40.344 UTC [cauthdsl] func1 -> DEBU 1c75 0xc003bdf950 gate 1556789260344414800 evaluation starts" +"2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c76 0xc003bdf950 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c77 0xc003bdf950 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c78 0xc003bdf950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:40.344 UTC [cauthdsl] func2 -> DEBU 1c79 0xc003bdf950 principal evaluation fails" +"2019-05-02 09:27:40.344 UTC [cauthdsl] func1 -> DEBU 1c7a 0xc003bdf950 gate 1556789260344414800 evaluation fails" +"2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.344 UTC [policies] Evaluate -> DEBU 1c7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:40.345 UTC [cauthdsl] func1 -> DEBU 1c7e 0xc003bf8190 gate 1556789260345325700 evaluation starts" +"2019-05-02 09:27:40.345 UTC [cauthdsl] func2 -> DEBU 1c7f 0xc003bf8190 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.345 UTC [cauthdsl] func2 -> DEBU 1c80 0xc003bf8190 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.345 UTC [cauthdsl] func2 -> DEBU 1c81 0xc003bf8190 principal matched by identity 0" +"2019-05-02 09:27:40.345 UTC [msp.identity] Verify -> DEBU 1c82 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +"2019-05-02 09:27:40.345 UTC [msp.identity] Verify -> DEBU 1c83 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +00000040 6c 9b e9 95 fc 61 |l....a|" +"2019-05-02 09:27:40.346 UTC [cauthdsl] func2 -> DEBU 1c84 0xc003bf8190 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:40.346 UTC [cauthdsl] func1 -> DEBU 1c85 0xc003bf8190 gate 1556789260345325700 evaluation succeeds" +"2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c88 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:40.346 UTC [policies] Evaluate -> DEBU 1c89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:40.347 UTC [msp.identity] Verify -> DEBU 1c8a Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O| +00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|" +"2019-05-02 09:27:40.347 UTC [msp.identity] Verify -> DEBU 1c8b Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.| +00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.| +00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.| +00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.| +00000040 0a cc ed c2 59 cc c5 |....Y..|" +"2019-05-02 09:27:40.347 UTC [gossip.gossip] handleMessage -> DEBU 1c8c Exiting" +"2019-05-02 09:27:40.542 UTC [gossip.gossip] handleMessage -> DEBU 1c8d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.542 UTC [msp] DeserializeIdentity -> DEBU 1c8e Obtaining identity" +"2019-05-02 09:27:40.543 UTC [msp] DeserializeIdentity -> DEBU 1c8f Obtaining identity" +"2019-05-02 09:27:40.543 UTC [gossip.gossip] handleMessage -> DEBU 1c90 Exiting" +"2019-05-02 09:27:40.556 UTC [gossip.gossip] handleMessage -> DEBU 1c91 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789256953821500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:40.557 UTC [msp.identity] Verify -> DEBU 1c92 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +"2019-05-02 09:27:40.557 UTC [msp.identity] Verify -> DEBU 1c93 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +"2019-05-02 09:27:40.557 UTC [gossip.gossip] handleMessage -> DEBU 1c94 Exiting" +"2019-05-02 09:27:40.571 UTC [gossip.gossip] handleMessage -> DEBU 1c95 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789256953821500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:40.572 UTC [msp.identity] Verify -> DEBU 1c96 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +"2019-05-02 09:27:40.572 UTC [msp.identity] Verify -> DEBU 1c97 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +"2019-05-02 09:27:40.572 UTC [msp] DeserializeIdentity -> DEBU 1c98 Obtaining identity" +"2019-05-02 09:27:40.572 UTC [gossip.gossip] handleMessage -> DEBU 1c99 Exiting" +"2019-05-02 09:27:40.577 UTC [gossip.gossip] handleMessage -> DEBU 1c9a Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.577 UTC [gossip.pull] HandleMessage -> DEBU 1c9b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.577 UTC [gossip.pull] SendDigest -> DEBU 1c9c Sending BLOCK_MSG digest: [3 4 5 1 2] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:40.578 UTC [gossip.gossip] handleMessage -> DEBU 1c9d Exiting" +"2019-05-02 09:27:40.789 UTC [gossip.gossip] handleMessage -> DEBU 1c9e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.790 UTC [msp] DeserializeIdentity -> DEBU 1c9f Obtaining identity" +"2019-05-02 09:27:40.791 UTC [msp] DeserializeIdentity -> DEBU 1ca0 Obtaining identity" +"2019-05-02 09:27:40.791 UTC [msp] DeserializeIdentity -> DEBU 1ca1 Obtaining identity" +"2019-05-02 09:27:40.792 UTC [gossip.gossip] handleMessage -> DEBU 1ca2 Exiting" +"2019-05-02 09:27:40.795 UTC [gossip.gossip] handleMessage -> DEBU 1ca3 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789256919750900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:40.795 UTC [msp] DeserializeIdentity -> DEBU 1ca4 Obtaining identity" +"2019-05-02 09:27:40.796 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ca5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:40.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.797 UTC [policies] Evaluate -> DEBU 1ca8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:40.797 UTC [policies] Evaluate -> DEBU 1ca9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:40.798 UTC [policies] Evaluate -> DEBU 1caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:40.798 UTC [cauthdsl] func1 -> DEBU 1cab 0xc003c0d510 gate 1556789260798747100 evaluation starts" +"2019-05-02 09:27:40.799 UTC [cauthdsl] func2 -> DEBU 1cac 0xc003c0d510 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.799 UTC [cauthdsl] func2 -> DEBU 1cad 0xc003c0d510 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.800 UTC [cauthdsl] func2 -> DEBU 1cae 0xc003c0d510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:40.800 UTC [cauthdsl] func2 -> DEBU 1caf 0xc003c0d510 principal evaluation fails" +"2019-05-02 09:27:40.800 UTC [cauthdsl] func1 -> DEBU 1cb0 0xc003c0d510 gate 1556789260798747100 evaluation fails" +"2019-05-02 09:27:40.800 UTC [policies] Evaluate -> DEBU 1cb1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.801 UTC [policies] Evaluate -> DEBU 1cb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.801 UTC [policies] Evaluate -> DEBU 1cb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:40.802 UTC [cauthdsl] func1 -> DEBU 1cb4 0xc003c0dd50 gate 1556789260801989700 evaluation starts" +"2019-05-02 09:27:40.803 UTC [cauthdsl] func2 -> DEBU 1cb5 0xc003c0dd50 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.803 UTC [cauthdsl] func2 -> DEBU 1cb6 0xc003c0dd50 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.804 UTC [cauthdsl] func2 -> DEBU 1cb7 0xc003c0dd50 principal matched by identity 0" +"2019-05-02 09:27:40.804 UTC [msp.identity] Verify -> DEBU 1cb8 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +"2019-05-02 09:27:40.804 UTC [msp.identity] Verify -> DEBU 1cb9 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +00000040 6c 9b e9 95 fc 61 |l....a|" +"2019-05-02 09:27:40.807 UTC [cauthdsl] func2 -> DEBU 1cba 0xc003c0dd50 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:40.807 UTC [cauthdsl] func1 -> DEBU 1cbb 0xc003c0dd50 gate 1556789260801989700 evaluation succeeds" +"2019-05-02 09:27:40.808 UTC [policies] Evaluate -> DEBU 1cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.809 UTC [policies] Evaluate -> DEBU 1cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.809 UTC [policies] Evaluate -> DEBU 1cbe Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:40.809 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:40.810 UTC [msp] DeserializeIdentity -> DEBU 1cc0 Obtaining identity" +"2019-05-02 09:27:40.810 UTC [gossip.gossip] handleMessage -> DEBU 1cc1 Exiting" +"2019-05-02 09:27:40.847 UTC [gossip.comm] func1 -> DEBU 1cc2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.847 UTC [gossip.gossip] handleMessage -> DEBU 1cc3 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.847 UTC [gossip.pull] HandleMessage -> DEBU 1cc4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.847 UTC [msp] DeserializeIdentity -> DEBU 1cc5 Obtaining identity" +"2019-05-02 09:27:40.848 UTC [msp] DeserializeIdentity -> DEBU 1cc6 Obtaining identity" +"2019-05-02 09:27:40.848 UTC [msp] DeserializeIdentity -> DEBU 1cc7 Obtaining identity" +"2019-05-02 09:27:40.848 UTC [msp] DeserializeIdentity -> DEBU 1cc8 Obtaining identity" +"2019-05-02 09:27:40.849 UTC [msp] DeserializeIdentity -> DEBU 1cc9 Obtaining identity" +"2019-05-02 09:27:40.849 UTC [msp] DeserializeIdentity -> DEBU 1cca Obtaining identity" +"2019-05-02 09:27:40.849 UTC [gossip.pull] SendDigest -> DEBU 1ccb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:40.849 UTC [gossip.gossip] handleMessage -> DEBU 1ccc Exiting" +"2019-05-02 09:27:40.865 UTC [gossip.comm] func1 -> DEBU 1ccd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.865 UTC [gossip.gossip] handleMessage -> DEBU 1cce Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.865 UTC [gossip.gossip] handleMessage -> DEBU 1ccf Exiting" +"2019-05-02 09:27:40.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cd0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.866 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cd1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:40.866 UTC [msp] DeserializeIdentity -> DEBU 1cd2 Obtaining identity" +"2019-05-02 09:27:40.866 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cd3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:40.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cd4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cd5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:40.867 UTC [policies] Evaluate -> DEBU 1cd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:40.867 UTC [policies] Evaluate -> DEBU 1cd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:40.867 UTC [policies] Evaluate -> DEBU 1cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:40.867 UTC [cauthdsl] func1 -> DEBU 1cd9 0xc003c17500 gate 1556789260867404700 evaluation starts" +"2019-05-02 09:27:40.867 UTC [cauthdsl] func2 -> DEBU 1cda 0xc003c17500 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.867 UTC [cauthdsl] func2 -> DEBU 1cdb 0xc003c17500 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.868 UTC [cauthdsl] func2 -> DEBU 1cdc 0xc003c17500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:40.868 UTC [cauthdsl] func2 -> DEBU 1cdd 0xc003c17500 principal evaluation fails" +"2019-05-02 09:27:40.868 UTC [cauthdsl] func1 -> DEBU 1cde 0xc003c17500 gate 1556789260867404700 evaluation fails" +"2019-05-02 09:27:40.868 UTC [policies] Evaluate -> DEBU 1cdf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.868 UTC [policies] Evaluate -> DEBU 1ce0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:40.868 UTC [policies] Evaluate -> DEBU 1ce1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:40.869 UTC [cauthdsl] func1 -> DEBU 1ce2 0xc003c17d40 gate 1556789260869158300 evaluation starts" +"2019-05-02 09:27:40.869 UTC [cauthdsl] func2 -> DEBU 1ce3 0xc003c17d40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:40.869 UTC [cauthdsl] func2 -> DEBU 1ce4 0xc003c17d40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:40.869 UTC [cauthdsl] func2 -> DEBU 1ce5 0xc003c17d40 principal matched by identity 0" +"2019-05-02 09:27:40.869 UTC [msp.identity] Verify -> DEBU 1ce6 Verify: digest = 00000000 ab a8 42 84 20 22 cb 2f 2f 3e de d1 ff 38 90 3d |..B. ".//>...8.=| +00000010 fa ca 0c 3f 28 62 be c5 5c 86 ca 5e 04 fc 8a 4a |...?(b..\..^...J|" +"2019-05-02 09:27:40.869 UTC [msp.identity] Verify -> DEBU 1ce7 Verify: sig = 00000000 30 44 02 20 57 18 ef 4f 3d 23 98 8a 52 74 e7 19 |0D. W..O=#..Rt..| +00000010 49 83 5e 2a a5 b9 69 a1 a0 73 4f 12 34 1f 5b 1d |I.^*..i..sO.4.[.| +00000020 b9 cb e8 01 02 20 3b 1a 75 cb 62 8e e1 31 de 9d |..... ;.u.b..1..| +00000030 13 81 90 93 74 df ce d5 8e 06 e2 e9 db cf 9d 8e |....t...........| +00000040 28 7e fa 04 8e 0b |(~....|" +"2019-05-02 09:27:40.870 UTC [cauthdsl] func2 -> DEBU 1ce8 0xc003c17d40 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:40.870 UTC [cauthdsl] func1 -> DEBU 1ce9 0xc003c17d40 gate 1556789260869158300 evaluation succeeds" +"2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1cea Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1ceb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1cec Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:40.870 UTC [policies] Evaluate -> DEBU 1ced == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:40.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cee Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:40.871 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cef Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:40.871 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 " +"2019-05-02 09:27:40.871 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 " +"2019-05-02 09:27:40.872 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:40.872 UTC [gossip.discovery] learnExistingMembers -> DEBU 1cf3 Exiting" +"2019-05-02 09:27:40.872 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf4 Exiting" +"2019-05-02 09:27:40.872 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cf5 Exiting" +"2019-05-02 09:27:40.872 UTC [gossip.discovery] sendMemResponse -> DEBU 1cf6 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:40.872 UTC [msp] DeserializeIdentity -> DEBU 1cf7 Obtaining identity" +"2019-05-02 09:27:40.872 UTC [msp] DeserializeIdentity -> DEBU 1cf8 Obtaining identity" +"2019-05-02 09:27:40.873 UTC [msp] DeserializeIdentity -> DEBU 1cf9 Obtaining identity" +"2019-05-02 09:27:40.873 UTC [gossip.comm] Send -> DEBU 1cfa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:40.873 UTC [gossip.discovery] sendMemResponse -> DEBU 1cfb Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:40.873 UTC [gossip.comm] sendToEndpoint -> DEBU 1cfc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:40.873 UTC [gossip.comm] sendToEndpoint -> DEBU 1cfd Exiting" +"2019-05-02 09:27:41.012 UTC [msp] DeserializeIdentity -> DEBU 1cfe Obtaining identity" +"2019-05-02 09:27:41.013 UTC [msp] DeserializeIdentity -> DEBU 1cff Obtaining identity" +"2019-05-02 09:27:41.014 UTC [gossip.pull] Hello -> DEBU 1d00 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:41.014 UTC [msp] DeserializeIdentity -> DEBU 1d01 Obtaining identity" +"2019-05-02 09:27:41.015 UTC [msp] DeserializeIdentity -> DEBU 1d02 Obtaining identity" +"2019-05-02 09:27:41.015 UTC [gossip.comm] Send -> DEBU 1d03 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:41.015 UTC [gossip.comm] sendToEndpoint -> DEBU 1d04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.015 UTC [gossip.comm] sendToEndpoint -> DEBU 1d05 Exiting" +"2019-05-02 09:27:41.017 UTC [gossip.gossip] handleMessage -> DEBU 1d06 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3547945905709500911 , Msg_type: BLOCK_MSG, digests: [5 2 1 3 4], Envelope: 48 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.018 UTC [gossip.pull] HandleMessage -> DEBU 1d07 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3547945905709500911 , Msg_type: BLOCK_MSG, digests: [5 2 1 3 4], Envelope: 48 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.018 UTC [gossip.gossip] handleMessage -> DEBU 1d08 Exiting" +"2019-05-02 09:27:41.020 UTC [gossip.comm] func1 -> DEBU 1d09 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.021 UTC [gossip.gossip] handleMessage -> DEBU 1d0a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.021 UTC [msp] DeserializeIdentity -> DEBU 1d0b Obtaining identity" +"2019-05-02 09:27:41.022 UTC [msp] DeserializeIdentity -> DEBU 1d0c Obtaining identity" +"2019-05-02 09:27:41.022 UTC [msp] DeserializeIdentity -> DEBU 1d0d Obtaining identity" +"2019-05-02 09:27:41.023 UTC [gossip.gossip] handleMessage -> DEBU 1d0e Exiting" +"2019-05-02 09:27:41.122 UTC [gossip.pull] Hello -> DEBU 1d0f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:41.123 UTC [gossip.comm] Send -> DEBU 1d10 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:41.123 UTC [gossip.pull] Hello -> DEBU 1d11 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:27:41.124 UTC [gossip.comm] Send -> DEBU 1d12 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:41.124 UTC [gossip.pull] Hello -> DEBU 1d13 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:27:41.125 UTC [gossip.comm] Send -> DEBU 1d14 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:41.125 UTC [gossip.comm] sendToEndpoint -> DEBU 1d15 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.125 UTC [gossip.comm] sendToEndpoint -> DEBU 1d16 Exiting" +"2019-05-02 09:27:41.126 UTC [gossip.comm] sendToEndpoint -> DEBU 1d17 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.126 UTC [gossip.comm] sendToEndpoint -> DEBU 1d18 Exiting" +"2019-05-02 09:27:41.127 UTC [gossip.comm] sendToEndpoint -> DEBU 1d19 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.127 UTC [gossip.comm] sendToEndpoint -> DEBU 1d1a Exiting" +"2019-05-02 09:27:41.129 UTC [gossip.gossip] handleMessage -> DEBU 1d1b Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17711904648864407508 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.130 UTC [gossip.pull] HandleMessage -> DEBU 1d1c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17711904648864407508 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.130 UTC [gossip.gossip] handleMessage -> DEBU 1d1d Exiting" +"2019-05-02 09:27:41.130 UTC [gossip.comm] func1 -> DEBU 1d1e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795338519098677057 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.134 UTC [gossip.gossip] handleMessage -> DEBU 1d1f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 452822413790425751 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.136 UTC [gossip.pull] HandleMessage -> DEBU 1d20 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 452822413790425751 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.136 UTC [gossip.gossip] handleMessage -> DEBU 1d21 Exiting" +"2019-05-02 09:27:41.137 UTC [gossip.gossip] handleMessage -> DEBU 1d22 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.141 UTC [gossip.pull] HandleMessage -> DEBU 1d23 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.142 UTC [gossip.pull] SendDigest -> DEBU 1d24 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:41.143 UTC [gossip.gossip] handleMessage -> DEBU 1d25 Exiting" +"2019-05-02 09:27:41.145 UTC [msp.identity] Sign -> DEBU 1d26 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151018 " +"2019-05-02 09:27:41.145 UTC [msp.identity] Sign -> DEBU 1d28 Sign: digest: FA58178E144539AB902280544495A83B2DED1A8040F6EC2200578D7FC874FDD0 " +"2019-05-02 09:27:41.145 UTC [msp.identity] Sign -> DEBU 1d29 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:41.146 UTC [msp.identity] Sign -> DEBU 1d2a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:41.145 UTC [gossip.gossip] handleMessage -> DEBU 1d27 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795338519098677057 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.146 UTC [gossip.comm] Send -> DEBU 1d2b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:41.147 UTC [msp] DeserializeIdentity -> DEBU 1d2d Obtaining identity" +"2019-05-02 09:27:41.147 UTC [gossip.comm] Send -> DEBU 1d2e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:41.148 UTC [msp] DeserializeIdentity -> DEBU 1d2f Obtaining identity" +"2019-05-02 09:27:41.149 UTC [gossip.comm] Send -> DEBU 1d30 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:41.149 UTC [gossip.comm] sendToEndpoint -> DEBU 1d31 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.149 UTC [gossip.comm] sendToEndpoint -> DEBU 1d32 Exiting" +"2019-05-02 09:27:41.150 UTC [gossip.comm] sendToEndpoint -> DEBU 1d33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.151 UTC [gossip.comm] sendToEndpoint -> DEBU 1d34 Exiting" +"2019-05-02 09:27:41.153 UTC [gossip.comm] sendToEndpoint -> DEBU 1d35 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.154 UTC [gossip.comm] sendToEndpoint -> DEBU 1d36 Exiting" +"2019-05-02 09:27:41.146 UTC [gossip.pull] HandleMessage -> DEBU 1d2c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795338519098677057 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.157 UTC [gossip.gossip] handleMessage -> DEBU 1d37 Exiting" +"2019-05-02 09:27:41.160 UTC [gossip.gossip] handleMessage -> DEBU 1d38 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d39 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.163 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d3a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:41.164 UTC [msp.identity] Verify -> DEBU 1d3b Verify: digest = 00000000 33 4c 02 0e 3a 2f e4 72 73 44 21 6f 5f e2 24 59 |3L..:/.rsD!o_.$Y| +00000010 c3 72 95 a4 f6 79 bb 26 ab 6a be 85 cc 4b 84 a3 |.r...y.&.j...K..|" +"2019-05-02 09:27:41.164 UTC [msp.identity] Verify -> DEBU 1d3c Verify: sig = 00000000 30 44 02 20 6c db fa 5a ba f6 31 dd 73 8a f1 4e |0D. l..Z..1.s..N| +00000010 56 65 5e e1 88 56 7b 4b dd a0 65 0b e6 8f 66 ec |Ve^..V{K..e...f.| +00000020 b2 23 2d 70 02 20 1d 0f 98 cb ca 2b f4 74 68 ce |.#-p. .....+.th.| +00000030 fc 9d b6 39 43 d6 fe d4 fd 54 f7 9e 56 ff 96 16 |...9C....T..V...| +00000040 ad f2 63 b2 18 8e |..c...|" +"2019-05-02 09:27:41.165 UTC [msp.identity] Verify -> DEBU 1d3d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:09.449 UTC [msp.identity] Verify -> DEBU 1d66 Verify: sig = 00000000 30 44 02 20 49 69 bc 7a 5d 36 3d 7a 89 07 27 b7 |0D. Ii.z]6=z..'.| -00000010 81 58 4a 1d 5d ad 57 59 87 c9 08 7a 4d 20 09 40 |.XJ.].WY...zM .@| -00000020 53 b1 c3 6f 02 20 00 e5 16 2a 19 fd c7 75 a1 32 |S..o. ...*...u.2| -00000030 88 b7 0c 2d a9 3a 8b be a2 ea 23 d6 96 b9 73 9f |...-.:....#...s.| -00000040 e9 21 40 40 d1 25 |.!@@.%|" -"2019-05-02 01:31:09.450 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d67 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:09.451 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d68 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:31:09.451 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d69 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 " -"2019-05-02 01:31:09.452 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d6a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 " -"2019-05-02 01:31:09.453 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d6b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:09.454 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d6c Exiting" -"2019-05-02 01:31:09.454 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d6d Exiting" -"2019-05-02 01:31:09.454 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d6e Exiting" -"2019-05-02 01:31:09.455 UTC [gossip.discovery] sendMemResponse -> DEBU 1d6f Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:09.456 UTC [msp] DeserializeIdentity -> DEBU 1d70 Obtaining identity" -"2019-05-02 01:31:09.457 UTC [msp] DeserializeIdentity -> DEBU 1d71 Obtaining identity" -"2019-05-02 01:31:09.457 UTC [gossip.comm] Send -> DEBU 1d72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:09.458 UTC [gossip.discovery] sendMemResponse -> DEBU 1d73 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:09.458 UTC [gossip.comm] sendToEndpoint -> DEBU 1d74 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.459 UTC [gossip.comm] sendToEndpoint -> DEBU 1d75 Exiting" -"2019-05-02 01:31:09.511 UTC [gossip.comm] func1 -> DEBU 1d76 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.511 UTC [gossip.gossip] handleMessage -> DEBU 1d77 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.511 UTC [gossip.pull] HandleMessage -> DEBU 1d78 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d79 Obtaining identity" -"2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d7a Obtaining identity" -"2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d7b Obtaining identity" -"2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d7c Obtaining identity" -"2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d7d Obtaining identity" -"2019-05-02 01:31:09.512 UTC [msp] DeserializeIdentity -> DEBU 1d7e Obtaining identity" -"2019-05-02 01:31:09.512 UTC [gossip.pull] SendDigest -> DEBU 1d7f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:09.512 UTC [gossip.gossip] handleMessage -> DEBU 1d80 Exiting" -"2019-05-02 01:31:09.525 UTC [gossip.comm] func1 -> DEBU 1d81 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.526 UTC [gossip.gossip] handleMessage -> DEBU 1d82 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.526 UTC [gossip.gossip] handleMessage -> DEBU 1d83 Exiting" -"2019-05-02 01:31:09.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d84 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.527 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d85 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:09.528 UTC [msp] DeserializeIdentity -> DEBU 1d86 Obtaining identity" -"2019-05-02 01:31:09.528 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d87 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:09.529 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d88 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:09.529 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d89 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:09.529 UTC [policies] Evaluate -> DEBU 1d8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:09.530 UTC [policies] Evaluate -> DEBU 1d8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:09.531 UTC [policies] Evaluate -> DEBU 1d8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:09.531 UTC [cauthdsl] func1 -> DEBU 1d8d 0xc0043bc980 gate 1556760669531699200 evaluation starts" -"2019-05-02 01:31:09.532 UTC [cauthdsl] func2 -> DEBU 1d8e 0xc0043bc980 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:09.532 UTC [cauthdsl] func2 -> DEBU 1d8f 0xc0043bc980 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:09.533 UTC [cauthdsl] func2 -> DEBU 1d90 0xc0043bc980 principal matched by identity 0" -"2019-05-02 01:31:09.533 UTC [msp.identity] Verify -> DEBU 1d91 Verify: digest = 00000000 17 b0 0d a9 2e 9b 0c a0 71 0f ec 23 35 9d 1d 42 |........q..#5..B| -00000010 d2 f4 9a 4d 99 18 9e 6e 60 55 64 78 97 c1 10 9d |...M...n`Udx....|" -"2019-05-02 01:31:09.533 UTC [msp.identity] Verify -> DEBU 1d92 Verify: sig = 00000000 30 45 02 21 00 a8 1a 80 26 82 b9 7c 82 74 79 8c |0E.!....&..|.ty.| -00000010 a5 df d7 4b e2 38 5b b3 4e b7 d1 d4 52 26 1d 75 |...K.8[.N...R&.u| -00000020 2b aa d9 05 5f 02 20 0f 38 a3 36 37 73 fb 73 a5 |+..._. .8.67s.s.| -00000030 e0 52 0c 33 f2 e0 e4 bc ab 6d 28 2b 53 62 bd 20 |.R.3.....m(+Sb. | -00000040 d3 4a 7f 29 45 80 be |.J.)E..|" -"2019-05-02 01:31:09.534 UTC [cauthdsl] func2 -> DEBU 1d93 0xc0043bc980 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:09.534 UTC [cauthdsl] func1 -> DEBU 1d94 0xc0043bc980 gate 1556760669531699200 evaluation succeeds" -"2019-05-02 01:31:09.534 UTC [policies] Evaluate -> DEBU 1d95 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:09.535 UTC [policies] Evaluate -> DEBU 1d96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:09.535 UTC [policies] Evaluate -> DEBU 1d97 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:09.536 UTC [policies] Evaluate -> DEBU 1d98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:09.536 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d99 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:09.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d9a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:09.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d9b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 " -"2019-05-02 01:31:09.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d9c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 " -"2019-05-02 01:31:09.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d9d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:09.539 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d9e Exiting" -"2019-05-02 01:31:09.539 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d9f Exiting" -"2019-05-02 01:31:09.557 UTC [gossip.discovery] sendMemResponse -> DEBU 1da0 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:09.558 UTC [msp] DeserializeIdentity -> DEBU 1da1 Obtaining identity" -"2019-05-02 01:31:09.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da2 Exiting" -"2019-05-02 01:31:09.559 UTC [msp] DeserializeIdentity -> DEBU 1da3 Obtaining identity" -"2019-05-02 01:31:09.560 UTC [msp] DeserializeIdentity -> DEBU 1da4 Obtaining identity" -"2019-05-02 01:31:09.561 UTC [gossip.comm] Send -> DEBU 1da5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:09.561 UTC [gossip.discovery] sendMemResponse -> DEBU 1da6 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:09.562 UTC [gossip.comm] sendToEndpoint -> DEBU 1da7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.565 UTC [gossip.comm] sendToEndpoint -> DEBU 1da8 Exiting" -"2019-05-02 01:31:09.577 UTC [gossip.comm] func1 -> DEBU 1da9 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.578 UTC [gossip.gossip] handleMessage -> DEBU 1daa Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.578 UTC [msp] DeserializeIdentity -> DEBU 1dab Obtaining identity" -"2019-05-02 01:31:09.578 UTC [msp] DeserializeIdentity -> DEBU 1dac Obtaining identity" -"2019-05-02 01:31:09.578 UTC [msp] DeserializeIdentity -> DEBU 1dad Obtaining identity" -"2019-05-02 01:31:09.578 UTC [gossip.gossip] handleMessage -> DEBU 1dae Exiting" -"2019-05-02 01:31:09.592 UTC [gossip.comm] func1 -> DEBU 1daf Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760666017201100 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:09.593 UTC [gossip.gossip] handleMessage -> DEBU 1db0 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760666017201100 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:09.593 UTC [msp] DeserializeIdentity -> DEBU 1db1 Obtaining identity" -"2019-05-02 01:31:09.594 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1db2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:09.594 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1db3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:09.595 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1db4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:09.595 UTC [policies] Evaluate -> DEBU 1db5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:09.595 UTC [policies] Evaluate -> DEBU 1db6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:09.596 UTC [policies] Evaluate -> DEBU 1db7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:09.597 UTC [cauthdsl] func1 -> DEBU 1db8 0xc0043cf3a0 gate 1556760669597765500 evaluation starts" -"2019-05-02 01:31:09.598 UTC [cauthdsl] func2 -> DEBU 1db9 0xc0043cf3a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:09.598 UTC [cauthdsl] func2 -> DEBU 1dba 0xc0043cf3a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:09.598 UTC [cauthdsl] func2 -> DEBU 1dbb 0xc0043cf3a0 principal matched by identity 0" -"2019-05-02 01:31:09.599 UTC [msp.identity] Verify -> DEBU 1dbc Verify: digest = 00000000 f5 84 fc 53 b8 bc 29 6c 8d 44 e3 b7 42 34 00 a8 |...S..)l.D..B4..| -00000010 0c dc ce 7d c1 c2 dc 95 95 05 62 fc 36 3f c1 91 |...}......b.6?..|" -"2019-05-02 01:31:09.599 UTC [msp.identity] Verify -> DEBU 1dbd Verify: sig = 00000000 30 44 02 20 1f 6f f9 d2 72 02 ca 23 0a 4d 06 bd |0D. .o..r..#.M..| -00000010 99 74 a4 2c 28 6a 0a 4e df 05 22 60 b5 09 fd 9a |.t.,(j.N.."`....| -00000020 b0 e4 7f 15 02 20 7c 49 fc d6 86 22 76 a5 d3 6f |..... |I..."v..o| -00000030 d8 74 f9 56 85 ac 3b 84 f5 c5 38 e7 da cc 12 7a |.t.V..;...8....z| -00000040 85 81 04 5d d5 23 |...].#|" -"2019-05-02 01:31:09.600 UTC [cauthdsl] func2 -> DEBU 1dbe 0xc0043cf3a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:09.600 UTC [cauthdsl] func1 -> DEBU 1dbf 0xc0043cf3a0 gate 1556760669597765500 evaluation succeeds" -"2019-05-02 01:31:09.601 UTC [policies] Evaluate -> DEBU 1dc0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:09.601 UTC [policies] Evaluate -> DEBU 1dc1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:09.601 UTC [policies] Evaluate -> DEBU 1dc2 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:09.602 UTC [policies] Evaluate -> DEBU 1dc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:09.602 UTC [msp] DeserializeIdentity -> DEBU 1dc4 Obtaining identity" -"2019-05-02 01:31:09.603 UTC [gossip.gossip] handleMessage -> DEBU 1dc5 Exiting" -"2019-05-02 01:31:09.741 UTC [gossip.comm] func1 -> DEBU 1dc6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.741 UTC [gossip.gossip] handleMessage -> DEBU 1dc7 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.741 UTC [gossip.pull] HandleMessage -> DEBU 1dc8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dc9 Obtaining identity" -"2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dca Obtaining identity" -"2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dcb Obtaining identity" -"2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dcc Obtaining identity" -"2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dcd Obtaining identity" -"2019-05-02 01:31:09.741 UTC [msp] DeserializeIdentity -> DEBU 1dce Obtaining identity" -"2019-05-02 01:31:09.742 UTC [gossip.pull] SendDigest -> DEBU 1dcf Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:09.742 UTC [gossip.gossip] handleMessage -> DEBU 1dd0 Exiting" -"2019-05-02 01:31:09.827 UTC [gossip.pull] Hello -> DEBU 1dd1 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:09.827 UTC [gossip.comm] Send -> DEBU 1dd2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:09.827 UTC [gossip.pull] Hello -> DEBU 1dd3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:09.828 UTC [gossip.comm] Send -> DEBU 1dd4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:09.828 UTC [gossip.pull] Hello -> DEBU 1dd5 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:09.828 UTC [gossip.comm] Send -> DEBU 1dd6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:09.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd8 Exiting" -"2019-05-02 01:31:09.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1dda Exiting" -"2019-05-02 01:31:09.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1ddb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1ddc Exiting" -"2019-05-02 01:31:09.830 UTC [gossip.comm] func1 -> DEBU 1ddd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4391479627761310920 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.830 UTC [gossip.gossip] handleMessage -> DEBU 1dde Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4391479627761310920 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.830 UTC [gossip.pull] HandleMessage -> DEBU 1ddf GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4391479627761310920 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.830 UTC [gossip.gossip] handleMessage -> DEBU 1de0 Exiting" -"2019-05-02 01:31:09.840 UTC [gossip.comm] func1 -> DEBU 1de1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4738054507446597177 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.840 UTC [gossip.gossip] handleMessage -> DEBU 1de2 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4738054507446597177 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.840 UTC [gossip.pull] HandleMessage -> DEBU 1de3 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4738054507446597177 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.840 UTC [gossip.gossip] handleMessage -> DEBU 1de4 Exiting" -"2019-05-02 01:31:09.841 UTC [gossip.gossip] handleMessage -> DEBU 1de5 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2600314157982669733 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.841 UTC [gossip.pull] HandleMessage -> DEBU 1de6 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2600314157982669733 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.841 UTC [gossip.gossip] handleMessage -> DEBU 1de7 Exiting" -"2019-05-02 01:31:09.896 UTC [gossip.comm] func1 -> DEBU 1de8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.896 UTC [gossip.gossip] handleMessage -> DEBU 1de9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.896 UTC [gossip.gossip] handleMessage -> DEBU 1dea Exiting" -"2019-05-02 01:31:09.896 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1deb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.896 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dec Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:09.896 UTC [msp] DeserializeIdentity -> DEBU 1ded Obtaining identity" -"2019-05-02 01:31:09.896 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1dee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:09.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1def Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:09.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1df0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1df1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1df2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1df3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:09.897 UTC [cauthdsl] func1 -> DEBU 1df4 0xc00440fb80 gate 1556760669897262400 evaluation starts" -"2019-05-02 01:31:09.897 UTC [cauthdsl] func2 -> DEBU 1df5 0xc00440fb80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:09.897 UTC [cauthdsl] func2 -> DEBU 1df6 0xc00440fb80 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:09.897 UTC [cauthdsl] func2 -> DEBU 1df7 0xc00440fb80 principal matched by identity 0" -"2019-05-02 01:31:09.897 UTC [msp.identity] Verify -> DEBU 1df8 Verify: digest = 00000000 8f bb 93 f9 cb 6e 5a 62 ac d3 9c 3d 8b e5 27 93 |.....nZb...=..'.| -00000010 a6 9a 17 d6 a9 63 f6 bc 95 92 18 ae 65 d9 5d d3 |.....c......e.].|" -"2019-05-02 01:31:09.897 UTC [msp.identity] Verify -> DEBU 1df9 Verify: sig = 00000000 30 44 02 20 75 6a 08 32 22 53 0e 33 17 23 e0 04 |0D. uj.2"S.3.#..| -00000010 94 bb 45 d6 52 f3 e6 ea 06 57 ca f2 eb 6c 4d 04 |..E.R....W...lM.| -00000020 d4 2c c0 55 02 20 30 2d a3 c2 d2 66 89 f2 4b d4 |.,.U. 0-...f..K.| -00000030 dc 7e bc b2 f2 81 b2 3d 84 81 79 54 2f be 12 9b |.~.....=..yT/...| -00000040 c0 7c 4a 4b 2f 0f |.|JK/.|" -"2019-05-02 01:31:09.897 UTC [cauthdsl] func2 -> DEBU 1dfa 0xc00440fb80 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:09.897 UTC [cauthdsl] func1 -> DEBU 1dfb 0xc00440fb80 gate 1556760669897262400 evaluation succeeds" -"2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1dfc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1dfe Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:09.897 UTC [policies] Evaluate -> DEBU 1dff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:09.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e00 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:09.898 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e01 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:09.898 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e02 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 " -"2019-05-02 01:31:09.898 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e03 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 " -"2019-05-02 01:31:09.898 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e04 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:09.898 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e05 Exiting" -"2019-05-02 01:31:09.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e06 Exiting" -"2019-05-02 01:31:09.899 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e07 Exiting" -"2019-05-02 01:31:09.899 UTC [gossip.discovery] sendMemResponse -> DEBU 1e08 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:09.899 UTC [msp] DeserializeIdentity -> DEBU 1e09 Obtaining identity" -"2019-05-02 01:31:09.899 UTC [msp] DeserializeIdentity -> DEBU 1e0a Obtaining identity" -"2019-05-02 01:31:09.899 UTC [msp] DeserializeIdentity -> DEBU 1e0b Obtaining identity" -"2019-05-02 01:31:09.899 UTC [gossip.comm] Send -> DEBU 1e0c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:09.899 UTC [gossip.discovery] sendMemResponse -> DEBU 1e0d Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:09.899 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:09.899 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0f Exiting" -"2019-05-02 01:31:10.000 UTC [msp.identity] Sign -> DEBU 1e10 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101A " -"2019-05-02 01:31:10.000 UTC [msp.identity] Sign -> DEBU 1e11 Sign: digest: E883BA370082EDE773285E2D1FE1FC8D1AB9BD1780A4F7A7248D61E9B25479BA " -"2019-05-02 01:31:10.000 UTC [msp.identity] Sign -> DEBU 1e12 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:10.000 UTC [msp.identity] Sign -> DEBU 1e13 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:10.002 UTC [gossip.comm] Send -> DEBU 1e14 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:10.002 UTC [msp] DeserializeIdentity -> DEBU 1e15 Obtaining identity" -"2019-05-02 01:31:10.003 UTC [gossip.comm] Send -> DEBU 1e16 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:10.004 UTC [msp] DeserializeIdentity -> DEBU 1e17 Obtaining identity" -"2019-05-02 01:31:10.004 UTC [gossip.comm] Send -> DEBU 1e18 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:10.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1e19 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1a Exiting" -"2019-05-02 01:31:10.006 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.006 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1c Exiting" -"2019-05-02 01:31:10.013 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.013 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1e Exiting" -"2019-05-02 01:31:10.022 UTC [gossip.gossip] handleMessage -> DEBU 1e1f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.024 UTC [gossip.gossip] handleMessage -> DEBU 1e20 Exiting" -"2019-05-02 01:31:10.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.029 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e22 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:10.029 UTC [msp.identity] Verify -> DEBU 1e23 Verify: digest = 00000000 e8 83 ba 37 00 82 ed e7 73 28 5e 2d 1f e1 fc 8d |...7....s(^-....| -00000010 1a b9 bd 17 80 a4 f7 a7 24 8d 61 e9 b2 54 79 ba |........$.a..Ty.|" -"2019-05-02 01:31:10.029 UTC [msp.identity] Verify -> DEBU 1e24 Verify: sig = 00000000 30 44 02 20 59 e7 70 b4 55 d4 ba 45 8e 23 e1 12 |0D. Y.p.U..E.#..| -00000010 28 bf cf 39 8e 95 c0 83 7a 87 e0 55 e2 17 ac 3c |(..9....z..U...<| -00000020 b8 99 c0 dd 02 20 0a 0c f2 6b 65 5c 43 3f 72 95 |..... ...ke\C?r.| -00000030 c9 f6 e0 78 02 9f a2 ca 02 f3 e9 da 6f 25 1c 64 |...x........o%.d| -00000040 4e 89 6a 80 f8 ab |N.j...|" -"2019-05-02 01:31:10.030 UTC [msp.identity] Verify -> DEBU 1e25 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:27:41.166 UTC [msp.identity] Verify -> DEBU 1d3e Verify: sig = 00000000 30 44 02 20 2a 04 e7 cf b7 a3 e7 ce 8b a7 97 62 |0D. *..........b| +00000010 97 d0 40 2e cb 6f f3 1f e9 e8 a3 8b e7 da f2 13 |..@..o..........| +00000020 a6 7b 99 d1 02 20 32 fb 5d fc 5b 97 8c fb 0c a7 |.{... 2.].[.....| +00000030 cd 4b ab 37 64 7b 59 cf 93 1c 69 b9 14 59 9e 0a |.K.7d{Y...i..Y..| +00000040 e9 71 71 49 18 57 |.qqI.W|" +"2019-05-02 09:27:41.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d3f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:41.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d40 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:27:41.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d41 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 " +"2019-05-02 09:27:41.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d42 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 " +"2019-05-02 09:27:41.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d43 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:41.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d44 Exiting" +"2019-05-02 09:27:41.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d45 Exiting" +"2019-05-02 09:27:41.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d46 Exiting" +"2019-05-02 09:27:41.161 UTC [gossip.gossip] handleMessage -> DEBU 1d47 Exiting" +"2019-05-02 09:27:41.172 UTC [gossip.gossip] handleMessage -> DEBU 1d4a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.171 UTC [gossip.comm] func1 -> DEBU 1d48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.171 UTC [gossip.discovery] sendMemResponse -> DEBU 1d49 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:41.173 UTC [msp] DeserializeIdentity -> DEBU 1d4b Obtaining identity" +"2019-05-02 09:27:41.173 UTC [msp] DeserializeIdentity -> DEBU 1d4c Obtaining identity" +"2019-05-02 09:27:41.173 UTC [gossip.comm] Send -> DEBU 1d4d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:41.173 UTC [gossip.discovery] sendMemResponse -> DEBU 1d4e Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:41.173 UTC [gossip.comm] sendToEndpoint -> DEBU 1d4f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.173 UTC [gossip.comm] sendToEndpoint -> DEBU 1d50 Exiting" +"2019-05-02 09:27:41.172 UTC [gossip.gossip] handleMessage -> DEBU 1d51 Exiting" +"2019-05-02 09:27:41.174 UTC [gossip.gossip] handleMessage -> DEBU 1d53 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.175 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d54 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:41.176 UTC [msp.identity] Verify -> DEBU 1d55 Verify: digest = 00000000 fa 58 17 8e 14 45 39 ab 90 22 80 54 44 95 a8 3b |.X...E9..".TD..;| +00000010 2d ed 1a 80 40 f6 ec 22 00 57 8d 7f c8 74 fd d0 |-...@..".W...t..|" +"2019-05-02 09:27:41.176 UTC [msp.identity] Verify -> DEBU 1d56 Verify: sig = 00000000 30 44 02 20 37 dc 41 a0 f8 e7 88 a8 45 23 31 80 |0D. 7.A.....E#1.| +00000010 c8 ce 17 66 4d 7f aa 70 8e c5 9a 37 61 6d c5 a4 |...fM..p...7am..| +00000020 0d 07 0d 92 02 20 52 9a dc 53 26 85 69 cd ba 15 |..... R..S&.i...| +00000030 39 5c d6 c6 8c b2 73 a6 c2 cd bd 07 d4 8f e0 7a |9\....s........z| +00000040 e6 b7 03 76 4a 96 |...vJ.|" +"2019-05-02 09:27:41.177 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d57 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:41.178 UTC [gossip.discovery] isSentByMe -> DEBU 1d58 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:41.178 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d59 Exiting" +"2019-05-02 09:27:41.179 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d5a Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:41.179 UTC [msp] DeserializeIdentity -> DEBU 1d5b Obtaining identity" +"2019-05-02 09:27:41.180 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d5c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:41.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d5d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:41.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d5e Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:41.182 UTC [policies] Evaluate -> DEBU 1d5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:41.182 UTC [policies] Evaluate -> DEBU 1d60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:41.183 UTC [policies] Evaluate -> DEBU 1d61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:41.183 UTC [cauthdsl] func1 -> DEBU 1d62 0xc003ccc3d0 gate 1556789261183711000 evaluation starts" +"2019-05-02 09:27:41.184 UTC [cauthdsl] func2 -> DEBU 1d63 0xc003ccc3d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:41.184 UTC [cauthdsl] func2 -> DEBU 1d64 0xc003ccc3d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:41.185 UTC [cauthdsl] func2 -> DEBU 1d65 0xc003ccc3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:41.185 UTC [cauthdsl] func2 -> DEBU 1d66 0xc003ccc3d0 principal evaluation fails" +"2019-05-02 09:27:41.186 UTC [cauthdsl] func1 -> DEBU 1d67 0xc003ccc3d0 gate 1556789261183711000 evaluation fails" +"2019-05-02 09:27:41.186 UTC [policies] Evaluate -> DEBU 1d68 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:41.186 UTC [policies] Evaluate -> DEBU 1d69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:41.186 UTC [policies] Evaluate -> DEBU 1d6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:41.186 UTC [cauthdsl] func1 -> DEBU 1d6b 0xc003cccc10 gate 1556789261186702500 evaluation starts" +"2019-05-02 09:27:41.186 UTC [cauthdsl] func2 -> DEBU 1d6c 0xc003cccc10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:41.186 UTC [cauthdsl] func2 -> DEBU 1d6d 0xc003cccc10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:41.186 UTC [cauthdsl] func2 -> DEBU 1d6e 0xc003cccc10 principal matched by identity 0" +"2019-05-02 09:27:41.186 UTC [msp.identity] Verify -> DEBU 1d6f Verify: digest = 00000000 ab a8 42 84 20 22 cb 2f 2f 3e de d1 ff 38 90 3d |..B. ".//>...8.=| +00000010 fa ca 0c 3f 28 62 be c5 5c 86 ca 5e 04 fc 8a 4a |...?(b..\..^...J|" +"2019-05-02 09:27:41.186 UTC [msp.identity] Verify -> DEBU 1d70 Verify: sig = 00000000 30 44 02 20 57 18 ef 4f 3d 23 98 8a 52 74 e7 19 |0D. W..O=#..Rt..| +00000010 49 83 5e 2a a5 b9 69 a1 a0 73 4f 12 34 1f 5b 1d |I.^*..i..sO.4.[.| +00000020 b9 cb e8 01 02 20 3b 1a 75 cb 62 8e e1 31 de 9d |..... ;.u.b..1..| +00000030 13 81 90 93 74 df ce d5 8e 06 e2 e9 db cf 9d 8e |....t...........| +00000040 28 7e fa 04 8e 0b |(~....|" +"2019-05-02 09:27:41.187 UTC [cauthdsl] func2 -> DEBU 1d71 0xc003cccc10 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:41.187 UTC [cauthdsl] func1 -> DEBU 1d72 0xc003cccc10 gate 1556789261186702500 evaluation succeeds" +"2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d73 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d75 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:41.187 UTC [policies] Evaluate -> DEBU 1d76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d77 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d78 Exiting" +"2019-05-02 09:27:41.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d79 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:41.187 UTC [msp.identity] Verify -> DEBU 1d7a Verify: digest = 00000000 33 4c 02 0e 3a 2f e4 72 73 44 21 6f 5f e2 24 59 |3L..:/.rsD!o_.$Y| +00000010 c3 72 95 a4 f6 79 bb 26 ab 6a be 85 cc 4b 84 a3 |.r...y.&.j...K..|" +"2019-05-02 09:27:41.187 UTC [msp.identity] Verify -> DEBU 1d7b Verify: sig = 00000000 30 44 02 20 6c db fa 5a ba f6 31 dd 73 8a f1 4e |0D. l..Z..1.s..N| +00000010 56 65 5e e1 88 56 7b 4b dd a0 65 0b e6 8f 66 ec |Ve^..V{K..e...f.| +00000020 b2 23 2d 70 02 20 1d 0f 98 cb ca 2b f4 74 68 ce |.#-p. .....+.th.| +00000030 fc 9d b6 39 43 d6 fe d4 fd 54 f7 9e 56 ff 96 16 |...9C....T..V...| +00000040 ad f2 63 b2 18 8e |..c...|" +"2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d7c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:41.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d7d Exiting" +"2019-05-02 09:27:41.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d7e Exiting" +"2019-05-02 09:27:41.189 UTC [gossip.gossip] handleMessage -> DEBU 1d7f Exiting" +"2019-05-02 09:27:41.189 UTC [gossip.gossip] handleMessage -> DEBU 1d80 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d81 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.190 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d82 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:41.192 UTC [msp.identity] Verify -> DEBU 1d83 Verify: digest = 00000000 fa 58 17 8e 14 45 39 ab 90 22 80 54 44 95 a8 3b |.X...E9..".TD..;| +00000010 2d ed 1a 80 40 f6 ec 22 00 57 8d 7f c8 74 fd d0 |-...@..".W...t..|" +"2019-05-02 09:27:41.192 UTC [msp.identity] Verify -> DEBU 1d84 Verify: sig = 00000000 30 44 02 20 37 dc 41 a0 f8 e7 88 a8 45 23 31 80 |0D. 7.A.....E#1.| +00000010 c8 ce 17 66 4d 7f aa 70 8e c5 9a 37 61 6d c5 a4 |...fM..p...7am..| +00000020 0d 07 0d 92 02 20 52 9a dc 53 26 85 69 cd ba 15 |..... R..S&.i...| +00000030 39 5c d6 c6 8c b2 73 a6 c2 cd bd 07 d4 8f e0 7a |9\....s........z| +00000040 e6 b7 03 76 4a 96 |...vJ.|" +"2019-05-02 09:27:41.194 UTC [msp.identity] Verify -> DEBU 1d85 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:10.030 UTC [msp.identity] Verify -> DEBU 1e26 Verify: sig = 00000000 30 45 02 21 00 f8 0b e7 b2 be e7 10 44 58 4e 3f |0E.!........DXN?| -00000010 68 e7 fb cb 22 bc 89 ae 2d 7e b7 12 fc 9b 7c 1b |h..."...-~....|.| -00000020 6b 5d ad 6c 85 02 20 0e 76 78 fb 05 9e 27 0d f8 |k].l.. .vx...'..| -00000030 e5 84 a9 3a 9e f7 e6 6e d8 61 42 5d 60 65 d1 78 |...:...n.aB]`e.x| -00000040 0c 32 6d 33 80 ef 75 |.2m3..u|" -"2019-05-02 01:31:10.030 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e27 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:10.030 UTC [gossip.comm] func1 -> DEBU 1e28 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.030 UTC [gossip.discovery] isSentByMe -> DEBU 1e29 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:10.030 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e2a Exiting" -"2019-05-02 01:31:10.030 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e2b Exiting" -"2019-05-02 01:31:10.030 UTC [gossip.gossip] handleMessage -> DEBU 1e2c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.031 UTC [gossip.gossip] handleMessage -> DEBU 1e2d Exiting" -"2019-05-02 01:31:10.031 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e2e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.033 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e2f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:10.034 UTC [msp.identity] Verify -> DEBU 1e30 Verify: digest = 00000000 e8 83 ba 37 00 82 ed e7 73 28 5e 2d 1f e1 fc 8d |...7....s(^-....| -00000010 1a b9 bd 17 80 a4 f7 a7 24 8d 61 e9 b2 54 79 ba |........$.a..Ty.|" -"2019-05-02 01:31:10.035 UTC [msp.identity] Verify -> DEBU 1e31 Verify: sig = 00000000 30 44 02 20 59 e7 70 b4 55 d4 ba 45 8e 23 e1 12 |0D. Y.p.U..E.#..| -00000010 28 bf cf 39 8e 95 c0 83 7a 87 e0 55 e2 17 ac 3c |(..9....z..U...<| -00000020 b8 99 c0 dd 02 20 0a 0c f2 6b 65 5c 43 3f 72 95 |..... ...ke\C?r.| -00000030 c9 f6 e0 78 02 9f a2 ca 02 f3 e9 da 6f 25 1c 64 |...x........o%.d| -00000040 4e 89 6a 80 f8 ab |N.j...|" -"2019-05-02 01:31:10.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e32 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:10.036 UTC [gossip.discovery] isSentByMe -> DEBU 1e33 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:10.044 UTC [gossip.comm] func1 -> DEBU 1e34 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.045 UTC [gossip.gossip] handleMessage -> DEBU 1e35 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.044 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e36 Exiting" -"2019-05-02 01:31:10.046 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e37 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:10.046 UTC [msp.identity] Verify -> DEBU 1e38 Verify: digest = 00000000 b4 fb 10 b9 21 31 8a 8d a8 19 82 54 06 4c 04 70 |....!1.....T.L.p| -00000010 e3 b7 28 26 da ca a3 1e 3a a6 af 0e c5 7c 86 18 |..(&....:....|..|" -"2019-05-02 01:31:10.046 UTC [msp.identity] Verify -> DEBU 1e39 Verify: sig = 00000000 30 45 02 21 00 ae 0a 11 32 1e 92 8f 4f 8a b6 ca |0E.!....2...O...| -00000010 97 65 20 fb a2 4a 6a af 7e 41 ca a8 3b 09 02 df |.e ..Jj.~A..;...| -00000020 a2 78 54 79 7a 02 20 79 1a eb db e0 ea b1 92 11 |.xTyz. y........| -00000030 7c 81 5b b7 ee 7e a8 77 16 31 32 4f 78 93 d8 c4 ||.[..~.w.12Ox...| -00000040 d7 95 ec 86 58 d8 cc |....X..|" -"2019-05-02 01:31:10.047 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e3a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:10.047 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e3b Exiting" -"2019-05-02 01:31:10.047 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e3c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:10.047 UTC [msp] DeserializeIdentity -> DEBU 1e3d Obtaining identity" -"2019-05-02 01:31:10.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e3e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:10.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e3f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:10.048 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e40 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:10.048 UTC [policies] Evaluate -> DEBU 1e41 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:10.048 UTC [policies] Evaluate -> DEBU 1e42 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:10.048 UTC [policies] Evaluate -> DEBU 1e43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:10.048 UTC [cauthdsl] func1 -> DEBU 1e44 0xc004465640 gate 1556760670048338600 evaluation starts" -"2019-05-02 01:31:10.048 UTC [cauthdsl] func2 -> DEBU 1e45 0xc004465640 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:10.048 UTC [cauthdsl] func2 -> DEBU 1e46 0xc004465640 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:10.048 UTC [cauthdsl] func2 -> DEBU 1e47 0xc004465640 principal matched by identity 0" -"2019-05-02 01:31:10.048 UTC [msp.identity] Verify -> DEBU 1e48 Verify: digest = 00000000 8f bb 93 f9 cb 6e 5a 62 ac d3 9c 3d 8b e5 27 93 |.....nZb...=..'.| -00000010 a6 9a 17 d6 a9 63 f6 bc 95 92 18 ae 65 d9 5d d3 |.....c......e.].|" -"2019-05-02 01:31:10.048 UTC [msp.identity] Verify -> DEBU 1e49 Verify: sig = 00000000 30 44 02 20 75 6a 08 32 22 53 0e 33 17 23 e0 04 |0D. uj.2"S.3.#..| -00000010 94 bb 45 d6 52 f3 e6 ea 06 57 ca f2 eb 6c 4d 04 |..E.R....W...lM.| -00000020 d4 2c c0 55 02 20 30 2d a3 c2 d2 66 89 f2 4b d4 |.,.U. 0-...f..K.| -00000030 dc 7e bc b2 f2 81 b2 3d 84 81 79 54 2f be 12 9b |.~.....=..yT/...| -00000040 c0 7c 4a 4b 2f 0f |.|JK/.|" -"2019-05-02 01:31:10.050 UTC [cauthdsl] func2 -> DEBU 1e4a 0xc004465640 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:10.054 UTC [cauthdsl] func1 -> DEBU 1e4b 0xc004465640 gate 1556760670048338600 evaluation succeeds" -"2019-05-02 01:31:10.054 UTC [policies] Evaluate -> DEBU 1e4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:10.054 UTC [policies] Evaluate -> DEBU 1e4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:10.054 UTC [policies] Evaluate -> DEBU 1e4e Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:10.054 UTC [policies] Evaluate -> DEBU 1e4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:10.055 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e50 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:10.055 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e51 Exiting" -"2019-05-02 01:31:10.055 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e52 Exiting" -"2019-05-02 01:31:10.055 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e53 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:10.063 UTC [gossip.gossip] handleMessage -> DEBU 1e54 Exiting" -"2019-05-02 01:31:10.055 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e55 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:10.071 UTC [msp] DeserializeIdentity -> DEBU 1e56 Obtaining identity" -"2019-05-02 01:31:10.076 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e57 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:10.076 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e58 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:10.076 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e59 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:10.076 UTC [policies] Evaluate -> DEBU 1e5a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:10.076 UTC [policies] Evaluate -> DEBU 1e5b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:10.076 UTC [policies] Evaluate -> DEBU 1e5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:10.076 UTC [cauthdsl] func1 -> DEBU 1e5d 0xc0044792a0 gate 1556760670076743200 evaluation starts" -"2019-05-02 01:31:10.076 UTC [cauthdsl] func2 -> DEBU 1e5e 0xc0044792a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:10.076 UTC [cauthdsl] func2 -> DEBU 1e5f 0xc0044792a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:10.076 UTC [cauthdsl] func2 -> DEBU 1e60 0xc0044792a0 principal matched by identity 0" -"2019-05-02 01:31:10.076 UTC [msp.identity] Verify -> DEBU 1e61 Verify: digest = 00000000 17 b0 0d a9 2e 9b 0c a0 71 0f ec 23 35 9d 1d 42 |........q..#5..B| -00000010 d2 f4 9a 4d 99 18 9e 6e 60 55 64 78 97 c1 10 9d |...M...n`Udx....|" -"2019-05-02 01:31:10.077 UTC [msp.identity] Verify -> DEBU 1e62 Verify: sig = 00000000 30 45 02 21 00 a8 1a 80 26 82 b9 7c 82 74 79 8c |0E.!....&..|.ty.| -00000010 a5 df d7 4b e2 38 5b b3 4e b7 d1 d4 52 26 1d 75 |...K.8[.N...R&.u| -00000020 2b aa d9 05 5f 02 20 0f 38 a3 36 37 73 fb 73 a5 |+..._. .8.67s.s.| -00000030 e0 52 0c 33 f2 e0 e4 bc ab 6d 28 2b 53 62 bd 20 |.R.3.....m(+Sb. | -00000040 d3 4a 7f 29 45 80 be |.J.)E..|" -"2019-05-02 01:31:10.077 UTC [cauthdsl] func2 -> DEBU 1e63 0xc0044792a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:10.077 UTC [cauthdsl] func1 -> DEBU 1e64 0xc0044792a0 gate 1556760670076743200 evaluation succeeds" -"2019-05-02 01:31:10.077 UTC [policies] Evaluate -> DEBU 1e65 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:10.077 UTC [policies] Evaluate -> DEBU 1e66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:10.077 UTC [policies] Evaluate -> DEBU 1e67 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:10.077 UTC [policies] Evaluate -> DEBU 1e68 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:10.077 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e69 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:10.077 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e6a Exiting" -"2019-05-02 01:31:10.077 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e6b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:10.078 UTC [msp.identity] Verify -> DEBU 1e6c Verify: digest = 00000000 e8 83 ba 37 00 82 ed e7 73 28 5e 2d 1f e1 fc 8d |...7....s(^-....| -00000010 1a b9 bd 17 80 a4 f7 a7 24 8d 61 e9 b2 54 79 ba |........$.a..Ty.|" -"2019-05-02 01:31:10.078 UTC [msp.identity] Verify -> DEBU 1e6d Verify: sig = 00000000 30 44 02 20 59 e7 70 b4 55 d4 ba 45 8e 23 e1 12 |0D. Y.p.U..E.#..| -00000010 28 bf cf 39 8e 95 c0 83 7a 87 e0 55 e2 17 ac 3c |(..9....z..U...<| -00000020 b8 99 c0 dd 02 20 0a 0c f2 6b 65 5c 43 3f 72 95 |..... ...ke\C?r.| -00000030 c9 f6 e0 78 02 9f a2 ca 02 f3 e9 da 6f 25 1c 64 |...x........o%.d| -00000040 4e 89 6a 80 f8 ab |N.j...|" -"2019-05-02 01:31:10.078 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e6e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:10.078 UTC [gossip.discovery] isSentByMe -> DEBU 1e6f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:10.078 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e70 Exiting" -"2019-05-02 01:31:10.079 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e71 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:10.079 UTC [msp.identity] Verify -> DEBU 1e72 Verify: digest = 00000000 b4 fb 10 b9 21 31 8a 8d a8 19 82 54 06 4c 04 70 |....!1.....T.L.p| -00000010 e3 b7 28 26 da ca a3 1e 3a a6 af 0e c5 7c 86 18 |..(&....:....|..|" -"2019-05-02 01:31:10.080 UTC [msp.identity] Verify -> DEBU 1e73 Verify: sig = 00000000 30 45 02 21 00 ae 0a 11 32 1e 92 8f 4f 8a b6 ca |0E.!....2...O...| -00000010 97 65 20 fb a2 4a 6a af 7e 41 ca a8 3b 09 02 df |.e ..Jj.~A..;...| -00000020 a2 78 54 79 7a 02 20 79 1a eb db e0 ea b1 92 11 |.xTyz. y........| -00000030 7c 81 5b b7 ee 7e a8 77 16 31 32 4f 78 93 d8 c4 ||.[..~.w.12Ox...| -00000040 d7 95 ec 86 58 d8 cc |....X..|" -"2019-05-02 01:31:10.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e74 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:10.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e75 Exiting" -"2019-05-02 01:31:10.080 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e76 Exiting" -"2019-05-02 01:31:11.402 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1e77 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:11.403 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1e78 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:11.404 UTC [policies] Evaluate -> DEBU 1e79 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-05-02 01:31:11.404 UTC [policies] Evaluate -> DEBU 1e7a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:11.404 UTC [policies] Evaluate -> DEBU 1e7b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:31:11.405 UTC [cauthdsl] func1 -> DEBU 1e7c 0xc0034dc550 gate 1556760671404996300 evaluation starts" -"2019-05-02 01:31:11.405 UTC [cauthdsl] func2 -> DEBU 1e7d 0xc0034dc550 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:11.405 UTC [cauthdsl] func2 -> DEBU 1e7e 0xc0034dc550 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:11.405 UTC [cauthdsl] func2 -> DEBU 1e7f 0xc0034dc550 principal matched by identity 0" -"2019-05-02 01:31:11.405 UTC [msp.identity] Verify -> DEBU 1e80 Verify: digest = 00000000 9a 02 1c 3c d1 03 4a 17 98 40 12 7e 56 f6 9a ff |...<..J..@.~V...| -00000010 64 89 f1 f3 7b 66 67 40 ab 70 e5 49 40 12 52 95 |d...{fg@.p.I@.R.|" -"2019-05-02 01:31:11.406 UTC [msp.identity] Verify -> DEBU 1e81 Verify: sig = 00000000 30 44 02 20 10 96 b4 1e 64 a7 f8 70 8d 1a ab c8 |0D. ....d..p....| -00000010 54 c8 66 d1 85 a8 98 2d 93 21 5c 5d 80 07 84 6d |T.f....-.!\]...m| -00000020 ef c4 36 8f 02 20 73 2e 50 59 a6 32 f9 d9 91 65 |..6.. s.PY.2...e| -00000030 ac bc fd ce 20 54 31 cf 9b 40 a5 40 9c 1f 32 b0 |.... T1..@.@..2.| -00000040 72 8b 6c b9 18 fa |r.l...|" -"2019-05-02 01:31:11.406 UTC [cauthdsl] func2 -> DEBU 1e82 0xc0034dc550 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:11.406 UTC [cauthdsl] func1 -> DEBU 1e83 0xc0034dc550 gate 1556760671404996300 evaluation succeeds" -"2019-05-02 01:31:11.407 UTC [policies] Evaluate -> DEBU 1e84 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:11.407 UTC [policies] Evaluate -> DEBU 1e85 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:11.407 UTC [policies] Evaluate -> DEBU 1e86 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:11.407 UTC [policies] Evaluate -> DEBU 1e87 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:11.408 UTC [blocksProvider] DeliverBlocks -> DEBU 1e88 [businesschannel] Adding payload to local buffer, blockNum = [6]" -"2019-05-02 01:31:11.408 UTC [gossip.state] addPayload -> DEBU 1e89 [businesschannel] Adding payload to local buffer, blockNum = [6]" -"2019-05-02 01:31:11.408 UTC [gossip.state] addPayload -> DEBU 1e8a Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-05-02 01:31:11.410 UTC [blocksProvider] DeliverBlocks -> DEBU 1e8b [businesschannel] Gossiping block [6], peers number [3]" -"2019-05-02 01:31:11.411 UTC [gossip.channel] AddToMsgStore -> DEBU 1e8c Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4071 bytes, seq: 6}, Envelope: 4101 bytes, Signature: 0 bytes to the block puller" -"2019-05-02 01:31:11.411 UTC [gossip.pull] Add -> DEBU 1e8e Added 6, total items: 6" -"2019-05-02 01:31:11.411 UTC [gossip.state] deliverPayloads -> DEBU 1e8d [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" -"2019-05-02 01:31:11.413 UTC [gossip.state] deliverPayloads -> DEBU 1e8f [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" -"2019-05-02 01:31:11.413 UTC [gossip.privdata] StoreBlock -> INFO 1e90 [businesschannel] Received block [6] from buffer" -"2019-05-02 01:31:11.414 UTC [gossip.privdata] StoreBlock -> DEBU 1e91 [businesschannel] Validating block [6]" -"2019-05-02 01:31:11.415 UTC [committer.txvalidator] Validate -> DEBU 1e92 [businesschannel] START Block Validation for block [6]" -"2019-05-02 01:31:11.418 UTC [committer.txvalidator] validateTx -> DEBU 1e93 [businesschannel] validateTx starts for block 0xc0034b6500 env 0xc0034f40a0 txn 0" -"2019-05-02 01:31:11.419 UTC [protoutils] ValidateTransaction -> DEBU 1e94 ValidateTransactionEnvelope starts for envelope 0xc0034f40a0" -"2019-05-02 01:31:11.420 UTC [protoutils] ValidateTransaction -> DEBU 1e95 Header is channel_header:"\010\003\032\014\010\333\220\251\346\005\020\320\316\333\276\003\"\017businesschannel*@13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\005\313I5T\2457\277\372\311\2513<\350R\223U\261\3237N\2774\244" " -"2019-05-02 01:31:11.421 UTC [protoutils] validateChannelHeader -> DEBU 1e96 validateChannelHeader info: header type 3" -"2019-05-02 01:31:11.421 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e97 begin" -"2019-05-02 01:31:11.422 UTC [msp] GetManagerForChain -> DEBU 1e98 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:11.429 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e99 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:11.429 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e9a creator is valid" -"2019-05-02 01:31:11.430 UTC [msp.identity] Verify -> DEBU 1e9b Verify: digest = 00000000 cc 3a cf e1 4b 35 9d 17 a9 e6 85 2b 0b 68 18 e9 |.:..K5.....+.h..| -00000010 77 c3 fe 6e 06 78 10 0b 0b f4 fd 12 77 69 d9 e1 |w..n.x......wi..|" -"2019-05-02 01:31:11.430 UTC [msp.identity] Verify -> DEBU 1e9c Verify: sig = 00000000 30 44 02 20 67 6f e6 58 06 60 f9 c7 a9 d4 28 51 |0D. go.X.`....(Q| -00000010 88 dc d4 b0 e9 12 85 b4 cf 09 57 11 7b 67 b9 a1 |..........W.{g..| -00000020 9e 18 f6 d1 02 20 33 cd ba ab b8 32 12 20 20 1a |..... 3....2. .| -00000030 02 ac 0c 82 b0 2a 5d d6 aa 02 45 f8 5e 92 62 d2 |.....*]...E.^.b.| -00000040 82 9a c0 c8 2a 6d |....*m|" -"2019-05-02 01:31:11.431 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e9d exits successfully" -"2019-05-02 01:31:11.431 UTC [protoutils] validateEndorserTransaction -> DEBU 1e9e validateEndorserTransaction starts for data 0xc0031ab000, header channel_header:"\010\003\032\014\010\333\220\251\346\005\020\320\316\333\276\003\"\017businesschannel*@13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\005\313I5T\2457\277\372\311\2513<\350R\223U\261\3237N\2774\244" " -"2019-05-02 01:31:11.432 UTC [protoutils] validateEndorserTransaction -> DEBU 1e9f validateEndorserTransaction info: there are 1 actions" -"2019-05-02 01:31:11.432 UTC [protoutils] validateEndorserTransaction -> DEBU 1ea0 validateEndorserTransaction info: signature header is valid" -"2019-05-02 01:31:11.432 UTC [protoutils] ValidateTransaction -> DEBU 1ea1 ValidateTransactionEnvelope returns err %!s()" -"2019-05-02 01:31:11.433 UTC [committer.txvalidator] validateTx -> DEBU 1ea2 Transaction is for channel businesschannel" -"2019-05-02 01:31:11.433 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1ea3 retrieveTransactionByID() - txId = [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa]" -"2019-05-02 01:31:11.434 UTC [committer.txvalidator] validateTx -> DEBU 1ea4 Validating transaction with plugins" -"2019-05-02 01:31:11.434 UTC [committer.txvalidator] Dispatch -> DEBU 1ea5 [businesschannel] Dispatch starts for bytes 0xc003427000" -"2019-05-02 01:31:11.435 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1ea6 constructing new query executor txid = [0125ce35-eb59-49fc-a543-0a9ef5902890]" -"2019-05-02 01:31:11.435 UTC [stateleveldb] GetState -> DEBU 1ea7 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -"2019-05-02 01:31:11.435 UTC [stateleveldb] GetState -> DEBU 1ea8 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:11.436 UTC [stateleveldb] GetState -> DEBU 1ea9 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" -"2019-05-02 01:31:11.436 UTC [stateleveldb] GetState -> DEBU 1eaa GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" -"2019-05-02 01:31:11.436 UTC [stateleveldb] GetState -> DEBU 1eab GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" -"2019-05-02 01:31:11.437 UTC [lockbasedtxmgr] Done -> DEBU 1eae Done with transaction simulation / query execution [0125ce35-eb59-49fc-a543-0a9ef5902890]" -"2019-05-02 01:31:11.416 UTC [committer.txvalidator] Validate -> DEBU 1eac expecting 1 block validation responses" -"2019-05-02 01:31:11.437 UTC [msp] DeserializeIdentity -> DEBU 1ead Obtaining identity" -"2019-05-02 01:31:11.438 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 1eaf Validating Tx 13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa, seq 0 out of 1 in block 6 for channel businesschannel with validation plugin vscc with plugin" -"2019-05-02 01:31:11.440 UTC [msp] DeserializeIdentity -> DEBU 1eb0 Obtaining identity" -"2019-05-02 01:31:11.441 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1eb1 constructing new query executor txid = [750afab3-4501-46e6-ac3d-87f2cda85daa]" -"2019-05-02 01:31:11.447 UTC [lockbasedtxmgr] Done -> DEBU 1eb2 Done with transaction simulation / query execution [750afab3-4501-46e6-ac3d-87f2cda85daa]" -"2019-05-02 01:31:11.447 UTC [cauthdsl] func1 -> DEBU 1eb3 0xc0034c4060 gate 1556760671447938300 evaluation starts" -"2019-05-02 01:31:11.449 UTC [cauthdsl] func2 -> DEBU 1eb4 0xc0034c4060 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:11.449 UTC [msp] DeserializeIdentity -> DEBU 1eb5 Obtaining identity" -"2019-05-02 01:31:11.451 UTC [cauthdsl] func2 -> DEBU 1eb6 0xc0034c4060 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:11.452 UTC [msp] DeserializeIdentity -> DEBU 1eb7 Obtaining identity" -"2019-05-02 01:31:11.453 UTC [gossip.comm] Send -> DEBU 1eb9 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4071 bytes, seq: 6}, Envelope: 4101 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:11.453 UTC [msp] DeserializeIdentity -> DEBU 1eba Obtaining identity" -"2019-05-02 01:31:11.454 UTC [msp] DeserializeIdentity -> DEBU 1ebb Obtaining identity" -"2019-05-02 01:31:11.454 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4071 bytes, seq: 6}, Envelope: 4101 bytes, Signature: 0 bytes" -"2019-05-02 01:31:11.454 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebd Exiting" -"2019-05-02 01:31:11.453 UTC [cauthdsl] func2 -> DEBU 1eb8 0xc0034c4060 principal matched by identity 0" -"2019-05-02 01:31:11.463 UTC [msp.identity] Verify -> DEBU 1ebe Verify: digest = 00000000 f3 d2 f9 1d 0e 93 ea 84 24 6a 64 40 14 16 7a 16 |........$jd@..z.| -00000010 eb 81 40 28 88 b4 57 da 55 87 09 3a 91 d3 4b 0b |..@(..W.U..:..K.|" -"2019-05-02 01:31:11.464 UTC [msp.identity] Verify -> DEBU 1ebf Verify: sig = 00000000 30 44 02 20 6c 0b 62 14 1d 94 42 63 58 a6 9c b0 |0D. l.b...BcX...| -00000010 22 68 15 9b b2 2a ef 61 88 58 06 b4 30 1a 00 bf |"h...*.a.X..0...| -00000020 9b 75 40 ce 02 20 6e 19 70 f3 10 f3 fd 28 26 d9 |.u@.. n.p....(&.| -00000030 d1 c6 84 5b 49 45 22 86 17 af 8f 2b bd f9 fe fe |...[IE"....+....| -00000040 b6 a4 94 3f 9e e6 |...?..|" -"2019-05-02 01:31:11.471 UTC [cauthdsl] func2 -> DEBU 1ec0 0xc0034c4060 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:11.477 UTC [cauthdsl] func2 -> DEBU 1ec1 0xc0034c4060 signed by 1 principal evaluation starts (used [true])" -"2019-05-02 01:31:11.477 UTC [cauthdsl] func2 -> DEBU 1ec2 0xc0034c4060 skipping identity 0 because it has already been used" -"2019-05-02 01:31:11.479 UTC [cauthdsl] func2 -> DEBU 1ec3 0xc0034c4060 principal evaluation fails" -"2019-05-02 01:31:11.480 UTC [cauthdsl] func1 -> DEBU 1ec4 0xc0034c4060 gate 1556760671447938300 evaluation succeeds" -"2019-05-02 01:31:11.481 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1ec5 constructing new query executor txid = [65912c5a-05f9-4c9c-9dfe-5882603b986d]" -"2019-05-02 01:31:11.482 UTC [lockbasedtxmgr] Done -> DEBU 1ec6 Done with transaction simulation / query execution [65912c5a-05f9-4c9c-9dfe-5882603b986d]" -"2019-05-02 01:31:11.482 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1ec7 constructing new query executor txid = [86f250bd-cad1-4eda-97a9-c571aa669cf5]" -"2019-05-02 01:31:11.484 UTC [lockbasedtxmgr] Done -> DEBU 1ec8 Done with transaction simulation / query execution [86f250bd-cad1-4eda-97a9-c571aa669cf5]" -"2019-05-02 01:31:11.486 UTC [vscc] Validate -> DEBU 1ec9 block 6, namespace: exp02, tx 0 validation results is: " -"2019-05-02 01:31:11.486 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 1eca Transaction 13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa appears to be valid" -"2019-05-02 01:31:11.487 UTC [committer.txvalidator] Dispatch -> DEBU 1ecb [businesschannel] Dispatch completes env bytes 0xc003427000" -"2019-05-02 01:31:11.488 UTC [committer.txvalidator] Validate -> DEBU 1ecc got result for idx 0, code 0" -"2019-05-02 01:31:11.488 UTC [committer.txvalidator] Validate -> INFO 1ecd [businesschannel] Validated block [6] in 73ms" -"2019-05-02 01:31:11.489 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1ece Retrieving private write sets for 0 transactions from transient store" -"2019-05-02 01:31:11.489 UTC [gossip.privdata] StoreBlock -> DEBU 1ecf [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-05-02 01:31:11.489 UTC [kvledger] CommitWithPvtData -> DEBU 1ed0 [businesschannel] Validating state for block [6]" -"2019-05-02 01:31:11.490 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1ed1 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:31:11.490 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1ed2 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-05-02 01:31:11.490 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1ed3 Validating new block with num trans = [1]" -"2019-05-02 01:31:11.491 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1ed4 ValidateAndPrepareBatch() for block number = [6]" -"2019-05-02 01:31:11.491 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1ed5 preprocessing ProtoBlock..." -"2019-05-02 01:31:11.491 UTC [valimpl] preprocessProtoBlock -> DEBU 1ed6 txType=ENDORSER_TRANSACTION" -"2019-05-02 01:31:11.492 UTC [stateleveldb] GetState -> DEBU 1ed7 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:11.492 UTC [statebasedval] validateKVRead -> DEBU 1ed8 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" -"2019-05-02 01:31:11.492 UTC [stateleveldb] GetState -> DEBU 1ed9 GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:11.493 UTC [statebasedval] validateKVRead -> DEBU 1eda Comparing versions for key [􏿿initialized]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -"2019-05-02 01:31:11.493 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1edb Block [6] Transaction index [0] TxId [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa] marked as valid by state validator. ContainsPostOrderWrites [false]" -"2019-05-02 01:31:11.493 UTC [valinternal] ApplyWriteSet -> DEBU 1edc txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"\x00\U0010ffffinitialized"}:(*internal.keyOps)(0xc0034b6f00), internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0034b6f40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0034b6fc0)}" -"2019-05-02 01:31:11.494 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1edd validating rwset..." -"2019-05-02 01:31:11.496 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1ede postprocessing ProtoBlock..." -"2019-05-02 01:31:11.496 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1edf ValidateAndPrepareBatch() complete" -"2019-05-02 01:31:11.496 UTC [kvledger] CommitWithPvtData -> DEBU 1ee0 [businesschannel] Committing block [6] to storage" -"2019-05-02 01:31:11.497 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1ee1 Writing block [6] to pvt block store" -"2019-05-02 01:31:11.488 UTC [committer.txvalidator] validateTx -> DEBU 1ee2 [businesschannel] validateTx completes for block 0xc0034b6500 env 0xc0034f40a0 txn 0" -"2019-05-02 01:31:11.500 UTC [pvtdatastorage] Prepare -> DEBU 1ee3 Saved 0 private data write sets for block [6]" -"2019-05-02 01:31:11.503 UTC [fsblkstorage] indexBlock -> DEBU 1ee4 Indexing block [blockNum=6, blockHash=[]byte{0x49, 0xe, 0xd3, 0x82, 0x36, 0xc9, 0x80, 0xf6, 0xc4, 0xf3, 0x7b, 0x6f, 0x90, 0xf7, 0xc6, 0xcb, 0x46, 0xe1, 0xdb, 0xf2, 0x2, 0x21, 0xed, 0x35, 0x8f, 0x6e, 0xd0, 0x6c, 0xf4, 0x4, 0xb9, 0xfd} txOffsets= -txId=13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa locPointer=offset=70, bytesLength=3053 +"2019-05-02 09:27:41.195 UTC [msp.identity] Verify -> DEBU 1d86 Verify: sig = 00000000 30 44 02 20 2a d2 c2 12 a8 13 3a 5f 16 fd c4 be |0D. *.....:_....| +00000010 0d d5 ed 0c fa b3 33 59 c3 de 7f cd 5e df 12 43 |......3Y....^..C| +00000020 96 c5 10 0f 02 20 0e eb 19 07 56 59 bd b1 ef 15 |..... ....VY....| +00000030 82 da 0b ef 5e 75 78 7f b1 74 bd 69 c1 92 98 54 |....^ux..t.i...T| +00000040 7a 4d f9 10 54 80 |zM..T.|" +"2019-05-02 09:27:41.195 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:41.196 UTC [gossip.discovery] isSentByMe -> DEBU 1d88 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:41.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d89 Exiting" +"2019-05-02 09:27:41.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d8a Exiting" +"2019-05-02 09:27:41.200 UTC [gossip.gossip] handleMessage -> DEBU 1d8b Exiting" +"2019-05-02 09:27:41.201 UTC [gossip.gossip] handleMessage -> DEBU 1d8c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.201 UTC [gossip.pull] HandleMessage -> DEBU 1d8d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.202 UTC [msp] DeserializeIdentity -> DEBU 1d8e Obtaining identity" +"2019-05-02 09:27:41.202 UTC [msp] DeserializeIdentity -> DEBU 1d8f Obtaining identity" +"2019-05-02 09:27:41.203 UTC [msp] DeserializeIdentity -> DEBU 1d90 Obtaining identity" +"2019-05-02 09:27:41.203 UTC [msp] DeserializeIdentity -> DEBU 1d91 Obtaining identity" +"2019-05-02 09:27:41.204 UTC [msp] DeserializeIdentity -> DEBU 1d92 Obtaining identity" +"2019-05-02 09:27:41.204 UTC [msp] DeserializeIdentity -> DEBU 1d93 Obtaining identity" +"2019-05-02 09:27:41.205 UTC [gossip.pull] SendDigest -> DEBU 1d94 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:41.205 UTC [gossip.gossip] handleMessage -> DEBU 1d95 Exiting" +"2019-05-02 09:27:41.208 UTC [gossip.gossip] handleMessage -> DEBU 1d96 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d97 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.211 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d98 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:41.211 UTC [msp.identity] Verify -> DEBU 1d99 Verify: digest = 00000000 fa 58 17 8e 14 45 39 ab 90 22 80 54 44 95 a8 3b |.X...E9..".TD..;| +00000010 2d ed 1a 80 40 f6 ec 22 00 57 8d 7f c8 74 fd d0 |-...@..".W...t..|" +"2019-05-02 09:27:41.211 UTC [msp.identity] Verify -> DEBU 1d9a Verify: sig = 00000000 30 44 02 20 37 dc 41 a0 f8 e7 88 a8 45 23 31 80 |0D. 7.A.....E#1.| +00000010 c8 ce 17 66 4d 7f aa 70 8e c5 9a 37 61 6d c5 a4 |...fM..p...7am..| +00000020 0d 07 0d 92 02 20 52 9a dc 53 26 85 69 cd ba 15 |..... R..S&.i...| +00000030 39 5c d6 c6 8c b2 73 a6 c2 cd bd 07 d4 8f e0 7a |9\....s........z| +00000040 e6 b7 03 76 4a 96 |...vJ.|" +"2019-05-02 09:27:41.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d9b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:41.213 UTC [gossip.discovery] isSentByMe -> DEBU 1d9c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:41.216 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d9d Exiting" +"2019-05-02 09:27:41.217 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d9e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:41.218 UTC [msp.identity] Verify -> DEBU 1d9f Verify: digest = 00000000 33 4c 02 0e 3a 2f e4 72 73 44 21 6f 5f e2 24 59 |3L..:/.rsD!o_.$Y| +00000010 c3 72 95 a4 f6 79 bb 26 ab 6a be 85 cc 4b 84 a3 |.r...y.&.j...K..|" +"2019-05-02 09:27:41.218 UTC [msp.identity] Verify -> DEBU 1da0 Verify: sig = 00000000 30 44 02 20 6c db fa 5a ba f6 31 dd 73 8a f1 4e |0D. l..Z..1.s..N| +00000010 56 65 5e e1 88 56 7b 4b dd a0 65 0b e6 8f 66 ec |Ve^..V{K..e...f.| +00000020 b2 23 2d 70 02 20 1d 0f 98 cb ca 2b f4 74 68 ce |.#-p. .....+.th.| +00000030 fc 9d b6 39 43 d6 fe d4 fd 54 f7 9e 56 ff 96 16 |...9C....T..V...| +00000040 ad f2 63 b2 18 8e |..c...|" +"2019-05-02 09:27:41.219 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:41.220 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da2 Exiting" +"2019-05-02 09:27:41.220 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da3 Exiting" +"2019-05-02 09:27:41.221 UTC [gossip.gossip] handleMessage -> DEBU 1da4 Exiting" +"2019-05-02 09:27:41.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.222 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1da6 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:41.222 UTC [msp] DeserializeIdentity -> DEBU 1da7 Obtaining identity" +"2019-05-02 09:27:41.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1da8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:41.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1da9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:41.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1daa Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:41.224 UTC [policies] Evaluate -> DEBU 1dab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:41.224 UTC [policies] Evaluate -> DEBU 1dac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:41.225 UTC [policies] Evaluate -> DEBU 1dad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:41.225 UTC [cauthdsl] func1 -> DEBU 1dae 0xc003d14170 gate 1556789261225384700 evaluation starts" +"2019-05-02 09:27:41.225 UTC [cauthdsl] func2 -> DEBU 1daf 0xc003d14170 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:41.226 UTC [cauthdsl] func2 -> DEBU 1db0 0xc003d14170 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:41.226 UTC [cauthdsl] func2 -> DEBU 1db1 0xc003d14170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:41.226 UTC [cauthdsl] func2 -> DEBU 1db2 0xc003d14170 principal evaluation fails" +"2019-05-02 09:27:41.227 UTC [cauthdsl] func1 -> DEBU 1db3 0xc003d14170 gate 1556789261225384700 evaluation fails" +"2019-05-02 09:27:41.227 UTC [policies] Evaluate -> DEBU 1db4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:41.227 UTC [policies] Evaluate -> DEBU 1db5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:41.228 UTC [policies] Evaluate -> DEBU 1db6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:41.229 UTC [cauthdsl] func1 -> DEBU 1db7 0xc003d149b0 gate 1556789261228997600 evaluation starts" +"2019-05-02 09:27:41.229 UTC [cauthdsl] func2 -> DEBU 1db8 0xc003d149b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:41.229 UTC [cauthdsl] func2 -> DEBU 1db9 0xc003d149b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:41.229 UTC [cauthdsl] func2 -> DEBU 1dba 0xc003d149b0 principal matched by identity 0" +"2019-05-02 09:27:41.230 UTC [msp.identity] Verify -> DEBU 1dbb Verify: digest = 00000000 90 bf 7e ad 48 8a 1d b6 5e 7b dc 13 f8 89 be 2c |..~.H...^{.....,| +00000010 1f b7 a5 6a 3c ed 18 74 a5 d1 7d 6b 92 e9 e9 1f |...j<..t..}k....|" +"2019-05-02 09:27:41.231 UTC [msp.identity] Verify -> DEBU 1dbc Verify: sig = 00000000 30 44 02 20 21 b1 f4 ee cc 7e 8c b3 81 27 eb ae |0D. !....~...'..| +00000010 28 db f4 cc ee 59 6c 92 b5 e9 cd 7a 6b e1 1e 8a |(....Yl....zk...| +00000020 44 ae 0c 86 02 20 6b 82 88 ae 32 20 46 a9 0f d4 |D.... k...2 F...| +00000030 05 5d 01 94 06 a2 a3 20 cc 1a 4b e7 d7 cd 86 c8 |.]..... ..K.....| +00000040 0b 3c 9c 95 9c 32 |.<...2|" +"2019-05-02 09:27:41.231 UTC [cauthdsl] func2 -> DEBU 1dbd 0xc003d149b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:41.232 UTC [cauthdsl] func1 -> DEBU 1dbe 0xc003d149b0 gate 1556789261228997600 evaluation succeeds" +"2019-05-02 09:27:41.232 UTC [policies] Evaluate -> DEBU 1dbf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:41.232 UTC [policies] Evaluate -> DEBU 1dc0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:41.233 UTC [policies] Evaluate -> DEBU 1dc1 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:41.233 UTC [policies] Evaluate -> DEBU 1dc2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:41.234 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:41.234 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:41.234 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc5 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 " +"2019-05-02 09:27:41.235 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc6 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 " +"2019-05-02 09:27:41.235 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:41.235 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc8 Exiting" +"2019-05-02 09:27:41.236 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc9 Exiting" +"2019-05-02 09:27:41.236 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dca Exiting" +"2019-05-02 09:27:41.237 UTC [gossip.discovery] sendMemResponse -> DEBU 1dcb Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:41.237 UTC [msp] DeserializeIdentity -> DEBU 1dcc Obtaining identity" +"2019-05-02 09:27:41.237 UTC [msp] DeserializeIdentity -> DEBU 1dcd Obtaining identity" +"2019-05-02 09:27:41.237 UTC [msp] DeserializeIdentity -> DEBU 1dce Obtaining identity" +"2019-05-02 09:27:41.238 UTC [gossip.comm] Send -> DEBU 1dcf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:41.238 UTC [gossip.discovery] sendMemResponse -> DEBU 1dd0 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:41.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd2 Exiting" +"2019-05-02 09:27:41.422 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1dd3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:41.422 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1dd4 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:41.422 UTC [policies] Evaluate -> DEBU 1dd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-05-02 09:27:41.422 UTC [policies] Evaluate -> DEBU 1dd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:41.422 UTC [policies] Evaluate -> DEBU 1dd7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:41.422 UTC [cauthdsl] func1 -> DEBU 1dd8 0xc003ce9d40 gate 1556789261422705000 evaluation starts" +"2019-05-02 09:27:41.422 UTC [cauthdsl] func2 -> DEBU 1dd9 0xc003ce9d40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:41.422 UTC [cauthdsl] func2 -> DEBU 1dda 0xc003ce9d40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:41.422 UTC [cauthdsl] func2 -> DEBU 1ddb 0xc003ce9d40 principal matched by identity 0" +"2019-05-02 09:27:41.423 UTC [msp.identity] Verify -> DEBU 1ddc Verify: digest = 00000000 40 a2 dd 9d 7b 76 d5 1a f2 e4 04 cb 21 91 cc 70 |@...{v......!..p| +00000010 3a 2e 15 32 2d 93 23 20 3c 39 f6 bf 8e 0c ce 7e |:..2-.# <9.....~|" +"2019-05-02 09:27:41.423 UTC [msp.identity] Verify -> DEBU 1ddd Verify: sig = 00000000 30 45 02 21 00 87 e1 c1 bb cd 8b 6c 77 e4 a8 62 |0E.!.......lw..b| +00000010 56 40 c7 0b a4 57 d8 53 42 6e cc 9e f5 bd 2e b6 |V@...W.SBn......| +00000020 13 b4 c9 a5 83 02 20 32 b8 f6 ae c2 1b 1e 9e dc |...... 2........| +00000030 c9 f6 e1 a9 c2 a7 d9 52 df 7f 31 ac 35 e5 67 e4 |.......R..1.5.g.| +00000040 f1 17 a9 e7 00 15 26 |......&|" +"2019-05-02 09:27:41.423 UTC [cauthdsl] func2 -> DEBU 1dde 0xc003ce9d40 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:41.423 UTC [cauthdsl] func1 -> DEBU 1ddf 0xc003ce9d40 gate 1556789261422705000 evaluation succeeds" +"2019-05-02 09:27:41.423 UTC [policies] Evaluate -> DEBU 1de0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:41.423 UTC [policies] Evaluate -> DEBU 1de1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:41.423 UTC [policies] Evaluate -> DEBU 1de2 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:41.424 UTC [policies] Evaluate -> DEBU 1de3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:41.424 UTC [blocksProvider] DeliverBlocks -> DEBU 1de4 [businesschannel] Adding payload to local buffer, blockNum = [6]" +"2019-05-02 09:27:41.424 UTC [gossip.state] addPayload -> DEBU 1de5 [businesschannel] Adding payload to local buffer, blockNum = [6]" +"2019-05-02 09:27:41.424 UTC [gossip.state] addPayload -> DEBU 1de6 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-05-02 09:27:41.424 UTC [blocksProvider] DeliverBlocks -> DEBU 1de7 [businesschannel] Gossiping block [6], peers number [3]" +"2019-05-02 09:27:41.424 UTC [gossip.channel] AddToMsgStore -> DEBU 1de8 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4074 bytes, seq: 6}, Envelope: 4104 bytes, Signature: 0 bytes to the block puller" +"2019-05-02 09:27:41.424 UTC [gossip.pull] Add -> DEBU 1de9 Added 6, total items: 6" +"2019-05-02 09:27:41.424 UTC [gossip.state] deliverPayloads -> DEBU 1dea [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" +"2019-05-02 09:27:41.424 UTC [gossip.state] deliverPayloads -> DEBU 1deb [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" +"2019-05-02 09:27:41.425 UTC [gossip.privdata] StoreBlock -> INFO 1dec [businesschannel] Received block [6] from buffer" +"2019-05-02 09:27:41.425 UTC [gossip.privdata] StoreBlock -> DEBU 1ded [businesschannel] Validating block [6]" +"2019-05-02 09:27:41.425 UTC [committer.txvalidator] Validate -> DEBU 1dee [businesschannel] START Block Validation for block [6]" +"2019-05-02 09:27:41.425 UTC [committer.txvalidator] Validate -> DEBU 1def expecting 1 block validation responses" +"2019-05-02 09:27:41.425 UTC [committer.txvalidator] validateTx -> DEBU 1df0 [businesschannel] validateTx starts for block 0xc003b0d3c0 env 0xc003c4fb80 txn 0" +"2019-05-02 09:27:41.425 UTC [protoutils] ValidateTransaction -> DEBU 1df1 ValidateTransactionEnvelope starts for envelope 0xc003c4fb80" +"2019-05-02 09:27:41.425 UTC [protoutils] ValidateTransaction -> DEBU 1df2 Header is channel_header:"\010\003\032\014\010\212\360\252\346\005\020\334\262\310\202\001\"\017businesschannel*@592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030/\317\236PoE\366\177\237\314e\364\275\233{P\214\325\244!M\365m " " +"2019-05-02 09:27:41.425 UTC [protoutils] validateChannelHeader -> DEBU 1df3 validateChannelHeader info: header type 3" +"2019-05-02 09:27:41.425 UTC [protoutils] checkSignatureFromCreator -> DEBU 1df4 begin" +"2019-05-02 09:27:41.426 UTC [msp] GetManagerForChain -> DEBU 1df5 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:41.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 1df6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:41.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 1df7 creator is valid" +"2019-05-02 09:27:41.426 UTC [msp.identity] Verify -> DEBU 1df8 Verify: digest = 00000000 ee 3b ed f0 66 6a 84 41 a3 33 12 fd f6 cb eb d8 |.;..fj.A.3......| +00000010 14 22 98 43 7a 96 c1 8d 99 84 14 e1 47 90 8f fd |.".Cz.......G...|" +"2019-05-02 09:27:41.426 UTC [msp.identity] Verify -> DEBU 1df9 Verify: sig = 00000000 30 45 02 21 00 bd 46 9a fc 92 4f d4 7e 59 1b dc |0E.!..F...O.~Y..| +00000010 63 67 6c d1 a6 7a 05 97 e6 5a 66 bd a1 3b 6a 8e |cgl..z...Zf..;j.| +00000020 a0 dd 62 9d ed 02 20 0d 44 82 59 1d 36 d1 fe 40 |..b... .D.Y.6..@| +00000030 b7 a5 b2 72 f7 51 72 9f c8 89 8b 76 9f 45 9e 8d |...r.Qr....v.E..| +00000040 ef 22 01 d3 23 c9 7c |."..#.||" +"2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfa Obtaining identity" +"2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfb Obtaining identity" +"2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfc Obtaining identity" +"2019-05-02 09:27:41.427 UTC [msp] DeserializeIdentity -> DEBU 1dfd Obtaining identity" +"2019-05-02 09:27:41.428 UTC [gossip.comm] Send -> DEBU 1dfe Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4074 bytes, seq: 6}, Envelope: 4104 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:41.428 UTC [msp] DeserializeIdentity -> DEBU 1dff Obtaining identity" +"2019-05-02 09:27:41.428 UTC [msp] DeserializeIdentity -> DEBU 1e00 Obtaining identity" +"2019-05-02 09:27:41.428 UTC [gossip.comm] sendToEndpoint -> DEBU 1e01 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4074 bytes, seq: 6}, Envelope: 4104 bytes, Signature: 0 bytes" +"2019-05-02 09:27:41.428 UTC [gossip.comm] sendToEndpoint -> DEBU 1e02 Exiting" +"2019-05-02 09:27:41.429 UTC [protoutils] checkSignatureFromCreator -> DEBU 1e03 exits successfully" +"2019-05-02 09:27:41.429 UTC [protoutils] validateEndorserTransaction -> DEBU 1e04 validateEndorserTransaction starts for data 0xc003051000, header channel_header:"\010\003\032\014\010\212\360\252\346\005\020\334\262\310\202\001\"\017businesschannel*@592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030/\317\236PoE\366\177\237\314e\364\275\233{P\214\325\244!M\365m " " +"2019-05-02 09:27:41.430 UTC [protoutils] validateEndorserTransaction -> DEBU 1e05 validateEndorserTransaction info: there are 1 actions" +"2019-05-02 09:27:41.431 UTC [protoutils] validateEndorserTransaction -> DEBU 1e06 validateEndorserTransaction info: signature header is valid" +"2019-05-02 09:27:41.431 UTC [protoutils] ValidateTransaction -> DEBU 1e07 ValidateTransactionEnvelope returns err %!s()" +"2019-05-02 09:27:41.431 UTC [committer.txvalidator] validateTx -> DEBU 1e08 Transaction is for channel businesschannel" +"2019-05-02 09:27:41.431 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1e09 retrieveTransactionByID() - txId = [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9]" +"2019-05-02 09:27:41.431 UTC [committer.txvalidator] validateTx -> DEBU 1e0a Validating transaction with plugins" +"2019-05-02 09:27:41.431 UTC [committer.txvalidator] Dispatch -> DEBU 1e0b [businesschannel] Dispatch starts for bytes 0xc002cc9c00" +"2019-05-02 09:27:41.432 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e0c constructing new query executor txid = [82160613-2f05-4f49-9d15-830e4c48078d]" +"2019-05-02 09:27:41.433 UTC [stateleveldb] GetState -> DEBU 1e0d GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-05-02 09:27:41.433 UTC [stateleveldb] GetState -> DEBU 1e0e GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:41.434 UTC [stateleveldb] GetState -> DEBU 1e0f GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +"2019-05-02 09:27:41.434 UTC [stateleveldb] GetState -> DEBU 1e10 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +"2019-05-02 09:27:41.434 UTC [stateleveldb] GetState -> DEBU 1e11 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +"2019-05-02 09:27:41.434 UTC [lockbasedtxmgr] Done -> DEBU 1e12 Done with transaction simulation / query execution [82160613-2f05-4f49-9d15-830e4c48078d]" +"2019-05-02 09:27:41.435 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 1e13 Validating Tx 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9, seq 0 out of 1 in block 6 for channel businesschannel with validation plugin vscc with plugin" +"2019-05-02 09:27:41.436 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e14 constructing new query executor txid = [1b438ed2-7905-4f7d-9358-71d56705d63a]" +"2019-05-02 09:27:41.436 UTC [lockbasedtxmgr] Done -> DEBU 1e15 Done with transaction simulation / query execution [1b438ed2-7905-4f7d-9358-71d56705d63a]" +"2019-05-02 09:27:41.436 UTC [cauthdsl] func1 -> DEBU 1e16 0xc003d571b0 gate 1556789261436520600 evaluation starts" +"2019-05-02 09:27:41.436 UTC [cauthdsl] func2 -> DEBU 1e17 0xc003d571b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:41.436 UTC [cauthdsl] func2 -> DEBU 1e18 0xc003d571b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:41.436 UTC [cauthdsl] func2 -> DEBU 1e19 0xc003d571b0 principal matched by identity 0" +"2019-05-02 09:27:41.436 UTC [msp.identity] Verify -> DEBU 1e1a Verify: digest = 00000000 26 d8 b9 24 11 34 87 c9 37 05 9d 11 ef bc be 44 |&..$.4..7......D| +00000010 1b 8b 07 f1 f2 0f 24 9d 8b 34 5c 46 43 40 2a 34 |......$..4\FC@*4|" +"2019-05-02 09:27:41.437 UTC [msp.identity] Verify -> DEBU 1e1b Verify: sig = 00000000 30 45 02 21 00 f5 68 12 4e de 79 d3 5c 88 af 65 |0E.!..h.N.y.\..e| +00000010 96 69 c0 64 55 77 fe 52 ae cd d9 59 9f 02 24 df |.i.dUw.R...Y..$.| +00000020 d7 42 62 8c 26 02 20 12 75 04 26 f2 63 ae 8d d0 |.Bb.&. .u.&.c...| +00000030 99 3e 57 a5 a3 17 0a 83 18 ef e6 a7 cc b7 34 07 |.>W...........4.| +00000040 69 16 4d 84 b8 1a 23 |i.M...#|" +"2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1c 0xc003d571b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1d 0xc003d571b0 signed by 1 principal evaluation starts (used [true])" +"2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1e 0xc003d571b0 skipping identity 0 because it has already been used" +"2019-05-02 09:27:41.439 UTC [cauthdsl] func2 -> DEBU 1e1f 0xc003d571b0 principal evaluation fails" +"2019-05-02 09:27:41.439 UTC [cauthdsl] func1 -> DEBU 1e20 0xc003d571b0 gate 1556789261436520600 evaluation succeeds" +"2019-05-02 09:27:41.440 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e21 constructing new query executor txid = [1e54aab3-f9ce-46e0-a0bb-d91799dc95b1]" +"2019-05-02 09:27:41.440 UTC [lockbasedtxmgr] Done -> DEBU 1e22 Done with transaction simulation / query execution [1e54aab3-f9ce-46e0-a0bb-d91799dc95b1]" +"2019-05-02 09:27:41.441 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1e23 constructing new query executor txid = [701bf816-2815-4547-b6db-4390dc6cb179]" +"2019-05-02 09:27:41.441 UTC [lockbasedtxmgr] Done -> DEBU 1e24 Done with transaction simulation / query execution [701bf816-2815-4547-b6db-4390dc6cb179]" +"2019-05-02 09:27:41.441 UTC [vscc] Validate -> DEBU 1e25 block 6, namespace: exp02, tx 0 validation results is: " +"2019-05-02 09:27:41.441 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 1e26 Transaction 592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9 appears to be valid" +"2019-05-02 09:27:41.442 UTC [committer.txvalidator] Dispatch -> DEBU 1e27 [businesschannel] Dispatch completes env bytes 0xc002cc9c00" +"2019-05-02 09:27:41.442 UTC [committer.txvalidator] validateTx -> DEBU 1e28 [businesschannel] validateTx completes for block 0xc003b0d3c0 env 0xc003c4fb80 txn 0" +"2019-05-02 09:27:41.442 UTC [committer.txvalidator] Validate -> DEBU 1e29 got result for idx 0, code 0" +"2019-05-02 09:27:41.442 UTC [committer.txvalidator] Validate -> INFO 1e2a [businesschannel] Validated block [6] in 17ms" +"2019-05-02 09:27:41.443 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1e2b Retrieving private write sets for 0 transactions from transient store" +"2019-05-02 09:27:41.443 UTC [gossip.privdata] StoreBlock -> DEBU 1e2c [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-05-02 09:27:41.443 UTC [kvledger] CommitWithPvtData -> DEBU 1e2d [businesschannel] Validating state for block [6]" +"2019-05-02 09:27:41.443 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1e2e Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:27:41.443 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1e2f lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-05-02 09:27:41.443 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1e30 Validating new block with num trans = [1]" +"2019-05-02 09:27:41.444 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e31 ValidateAndPrepareBatch() for block number = [6]" +"2019-05-02 09:27:41.444 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e32 preprocessing ProtoBlock..." +"2019-05-02 09:27:41.444 UTC [valimpl] preprocessProtoBlock -> DEBU 1e33 txType=ENDORSER_TRANSACTION" +"2019-05-02 09:27:41.444 UTC [stateleveldb] GetState -> DEBU 1e34 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:41.444 UTC [statebasedval] validateKVRead -> DEBU 1e35 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +"2019-05-02 09:27:41.445 UTC [stateleveldb] GetState -> DEBU 1e36 GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:41.460 UTC [statebasedval] validateKVRead -> DEBU 1e37 Comparing versions for key [􏿿initialized]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-05-02 09:27:41.461 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1e38 Block [6] Transaction index [0] TxId [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-05-02 09:27:41.461 UTC [valinternal] ApplyWriteSet -> DEBU 1e39 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"\x00\U0010ffffinitialized"}:(*internal.keyOps)(0xc003d7c2c0), internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003d7c300), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003d7c340)}" +"2019-05-02 09:27:41.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e3a validating rwset..." +"2019-05-02 09:27:41.462 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e3b postprocessing ProtoBlock..." +"2019-05-02 09:27:41.462 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1e3c ValidateAndPrepareBatch() complete" +"2019-05-02 09:27:41.464 UTC [kvledger] CommitWithPvtData -> DEBU 1e3d [businesschannel] Committing block [6] to storage" +"2019-05-02 09:27:41.464 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1e3e Writing block [6] to pvt block store" +"2019-05-02 09:27:41.467 UTC [pvtdatastorage] Prepare -> DEBU 1e3f Saved 0 private data write sets for block [6]" +"2019-05-02 09:27:41.471 UTC [fsblkstorage] indexBlock -> DEBU 1e40 Indexing block [blockNum=6, blockHash=[]byte{0x13, 0xd2, 0x4, 0x27, 0x55, 0xc2, 0x5f, 0x7c, 0x72, 0x4d, 0x56, 0xe4, 0x30, 0x48, 0x7e, 0xa, 0x6b, 0x2c, 0x6b, 0x68, 0x24, 0x9, 0x99, 0xcd, 0x22, 0x6, 0xb1, 0x32, 0xe5, 0x65, 0x92, 0x6c} txOffsets= +txId=592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9 locPointer=offset=70, bytesLength=3055 ]" -"2019-05-02 01:31:11.503 UTC [fsblkstorage] indexBlock -> DEBU 1ee5 Adding txLoc [fileSuffixNum=0, offset=86581, bytesLength=3053] for tx ID: [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa] to txid-index" -"2019-05-02 01:31:11.504 UTC [fsblkstorage] indexBlock -> DEBU 1ee6 Adding txLoc [fileSuffixNum=0, offset=86581, bytesLength=3053] for tx number:[0] ID: [13c934fb8edb254888d930e84756857ff1f47052a0f5aaa3e31dbdc0f2d58dfa] to blockNumTranNum index" -"2019-05-02 01:31:11.512 UTC [fsblkstorage] updateCheckpoint -> DEBU 1ee7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90571], isChainEmpty=[false], lastBlockNumber=[6]" -"2019-05-02 01:31:11.516 UTC [pvtdatastorage] Commit -> DEBU 1ee8 Committing private data for block [6]" -"2019-05-02 01:31:11.523 UTC [pvtdatastorage] Commit -> DEBU 1ee9 Committed private data for block [6]" -"2019-05-02 01:31:11.523 UTC [kvledger] CommitWithPvtData -> DEBU 1eea [businesschannel] Committing block [6] transactions to state database" -"2019-05-02 01:31:11.523 UTC [lockbasedtxmgr] Commit -> DEBU 1eeb lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-05-02 01:31:11.524 UTC [lockbasedtxmgr] Commit -> DEBU 1eec Committing updates to state database" -"2019-05-02 01:31:11.524 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1eed Building the expiry schedules based on the update batch" -"2019-05-02 01:31:11.524 UTC [lockbasedtxmgr] Commit -> DEBU 1eee Write lock acquired for committing updates to state database" -"2019-05-02 01:31:11.525 UTC [stateleveldb] ApplyUpdates -> DEBU 1eef Channel [businesschannel]: Applying key(string)=[exp02􏿿initialized] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x0, 0xf4, 0x8f, 0xbf, 0xbf, 0x69, 0x6e, 0x69, 0x74, 0x69, 0x61, 0x6c, 0x69, 0x7a, 0x65, 0x64}]" -"2019-05-02 01:31:11.525 UTC [stateleveldb] ApplyUpdates -> DEBU 1ef0 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -"2019-05-02 01:31:11.526 UTC [stateleveldb] ApplyUpdates -> DEBU 1ef1 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -"2019-05-02 01:31:11.539 UTC [lockbasedtxmgr] Commit -> DEBU 1ef2 Updates committed to state database and the write lock is released" -"2019-05-02 01:31:11.555 UTC [lockbasedtxmgr] func1 -> DEBU 1ef3 launched the background routine for preparing keys to purge with the next block" -"2019-05-02 01:31:11.555 UTC [kvledger] CommitWithPvtData -> DEBU 1ef4 [businesschannel] Committing block [6] transactions to history database" -"2019-05-02 01:31:11.555 UTC [historyleveldb] Commit -> DEBU 1ef5 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" -"2019-05-02 01:31:11.556 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1ef6 Preparing potential purge list working-set for expiringAtBlk [7]" -"2019-05-02 01:31:11.556 UTC [leveldbhelper] GetIterator -> DEBU 1ef7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" -"2019-05-02 01:31:11.559 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1ef8 No expiry entry found for expiringAtBlk [7]" -"2019-05-02 01:31:11.560 UTC [historyleveldb] Commit -> DEBU 1ef9 Channel [businesschannel]: Updates committed to history database for blockNo [6]" -"2019-05-02 01:31:11.560 UTC [kvledger] CommitWithPvtData -> INFO 1efa [businesschannel] Committed block [6] with 1 transaction(s) in 70ms (state_validation=6ms block_commit=26ms state_commit=32ms)" -"2019-05-02 01:31:11.563 UTC [msp.identity] Sign -> DEBU 1efb Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020807 " -"2019-05-02 01:31:11.568 UTC [msp.identity] Sign -> DEBU 1efc Sign: digest: FCFF3904735FF2E7228C8D034380103939DE511A504B655FCAE28F95ABB26A11 " -"2019-05-02 01:31:11.568 UTC [gossip.state] commitBlock -> DEBU 1efd [businesschannel] Committed block [6] with 1 transaction(s)" -"2019-05-02 01:31:11.978 UTC [gossip.election] waitForInterrupt -> DEBU 1efe c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:11.978 UTC [gossip.election] IsLeader -> DEBU 1eff c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:11.979 UTC [msp.identity] Sign -> DEBU 1f00 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510071801 " -"2019-05-02 01:31:11.979 UTC [msp.identity] Sign -> DEBU 1f01 Sign: digest: F9CC7595471B44E9D136E3434754233495AAB757151956447E44A7F7F3EE19ED " -"2019-05-02 01:31:11.979 UTC [gossip.election] waitForInterrupt -> DEBU 1f02 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f03 Obtaining identity" -"2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f04 Obtaining identity" -"2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f05 Obtaining identity" -"2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f06 Obtaining identity" -"2019-05-02 01:31:11.982 UTC [gossip.comm] Send -> DEBU 1f07 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f08 Obtaining identity" -"2019-05-02 01:31:11.982 UTC [msp] DeserializeIdentity -> DEBU 1f09 Obtaining identity" -"2019-05-02 01:31:11.982 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -"2019-05-02 01:31:11.983 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0b Exiting" -"2019-05-02 01:31:12.829 UTC [msp] DeserializeIdentity -> DEBU 1f0c Obtaining identity" -"2019-05-02 01:31:12.829 UTC [msp] DeserializeIdentity -> DEBU 1f0d Obtaining identity" -"2019-05-02 01:31:12.829 UTC [gossip.comm] Send -> DEBU 1f0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:12.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1f10 Exiting" -"2019-05-02 01:31:12.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1f11 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1f12 Exiting" -"2019-05-02 01:31:12.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1f13 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1f14 Exiting" -"2019-05-02 01:31:12.832 UTC [gossip.gossip] handleMessage -> DEBU 1f15 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.833 UTC [msp.identity] Verify -> DEBU 1f16 Verify: digest = 00000000 66 6d 35 ff 5b f6 a2 48 b9 b2 21 48 4d 3a 9d b4 |fm5.[..H..!HM:..| -00000010 03 7e 74 22 c4 db 0b b3 47 9a 18 3a 9f 08 bc ca |.~t"....G..:....|" -"2019-05-02 01:31:12.833 UTC [msp.identity] Verify -> DEBU 1f17 Verify: sig = 00000000 30 45 02 21 00 ef 77 a7 42 2b 29 06 d4 8d ea 3b |0E.!..w.B+)....;| -00000010 3a ca 6f 56 44 0c 1c 67 9f 1d e1 d8 53 2e 31 10 |:.oVD..g....S.1.| -00000020 fb 6f b4 0b e5 02 20 60 d0 d3 06 93 7e 55 aa 38 |.o.... `....~U.8| -00000030 b3 a4 13 35 0f b7 5d 97 cc a8 8f 1b 46 15 4f 0c |...5..].....F.O.| -00000040 0d f0 9d 93 08 97 3b |......;|" -"2019-05-02 01:31:12.833 UTC [msp] DeserializeIdentity -> DEBU 1f18 Obtaining identity" -"2019-05-02 01:31:12.834 UTC [msp] DeserializeIdentity -> DEBU 1f19 Obtaining identity" -"2019-05-02 01:31:12.834 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f1a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:12.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f1b Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f1c Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.835 UTC [policies] Evaluate -> DEBU 1f1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:12.835 UTC [policies] Evaluate -> DEBU 1f1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:12.836 UTC [policies] Evaluate -> DEBU 1f20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:12.834 UTC [msp] DeserializeIdentity -> DEBU 1f1d Obtaining identity" -"2019-05-02 01:31:12.836 UTC [cauthdsl] func1 -> DEBU 1f21 0xc003343750 gate 1556760672836589900 evaluation starts" -"2019-05-02 01:31:12.836 UTC [cauthdsl] func2 -> DEBU 1f22 0xc003343750 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:12.837 UTC [cauthdsl] func2 -> DEBU 1f23 0xc003343750 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:12.837 UTC [cauthdsl] func2 -> DEBU 1f24 0xc003343750 principal matched by identity 0" -"2019-05-02 01:31:12.837 UTC [msp.identity] Verify -> DEBU 1f25 Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -"2019-05-02 01:31:12.837 UTC [msp.identity] Verify -> DEBU 1f26 Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -00000040 9e 37 b5 08 86 fb a3 |.7.....|" -"2019-05-02 01:31:12.838 UTC [msp] DeserializeIdentity -> DEBU 1f27 Obtaining identity" -"2019-05-02 01:31:12.838 UTC [cauthdsl] func2 -> DEBU 1f28 0xc003343750 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:12.839 UTC [cauthdsl] func1 -> DEBU 1f2a 0xc003343750 gate 1556760672836589900 evaluation succeeds" -"2019-05-02 01:31:12.839 UTC [gossip.comm] func1 -> DEBU 1f2b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.839 UTC [policies] Evaluate -> DEBU 1f2c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.839 UTC [gossip.comm] func1 -> DEBU 1f2d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.839 UTC [policies] Evaluate -> DEBU 1f2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.839 UTC [policies] Evaluate -> DEBU 1f2f Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:12.839 UTC [policies] Evaluate -> DEBU 1f30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:12.839 UTC [msp] DeserializeIdentity -> DEBU 1f31 Obtaining identity" -"2019-05-02 01:31:12.840 UTC [msp] DeserializeIdentity -> DEBU 1f32 Obtaining identity" -"2019-05-02 01:31:12.839 UTC [gossip.comm] Send -> DEBU 1f29 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" -"2019-05-02 01:31:12.840 UTC [msp] DeserializeIdentity -> DEBU 1f34 Obtaining identity" -"2019-05-02 01:31:12.840 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:12.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f35 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.840 UTC [msp] DeserializeIdentity -> DEBU 1f36 Obtaining identity" -"2019-05-02 01:31:12.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f37 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f38 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:12.841 UTC [policies] Evaluate -> DEBU 1f39 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f3a Exiting" -"2019-05-02 01:31:12.841 UTC [policies] Evaluate -> DEBU 1f3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f3c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:12.841 UTC [policies] Evaluate -> DEBU 1f3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f3e Exiting" -"2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f3f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:12.841 UTC [gossip.comm] sendToEndpoint -> DEBU 1f40 Exiting" -"2019-05-02 01:31:12.841 UTC [cauthdsl] func1 -> DEBU 1f41 0xc003300f30 gate 1556760672841304900 evaluation starts" -"2019-05-02 01:31:12.841 UTC [cauthdsl] func2 -> DEBU 1f42 0xc003300f30 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:12.841 UTC [cauthdsl] func2 -> DEBU 1f43 0xc003300f30 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:12.841 UTC [cauthdsl] func2 -> DEBU 1f44 0xc003300f30 principal matched by identity 0" -"2019-05-02 01:31:12.844 UTC [msp.identity] Verify -> DEBU 1f45 Verify: digest = 00000000 f5 84 fc 53 b8 bc 29 6c 8d 44 e3 b7 42 34 00 a8 |...S..)l.D..B4..| -00000010 0c dc ce 7d c1 c2 dc 95 95 05 62 fc 36 3f c1 91 |...}......b.6?..|" -"2019-05-02 01:31:12.844 UTC [msp.identity] Verify -> DEBU 1f46 Verify: sig = 00000000 30 44 02 20 1f 6f f9 d2 72 02 ca 23 0a 4d 06 bd |0D. .o..r..#.M..| -00000010 99 74 a4 2c 28 6a 0a 4e df 05 22 60 b5 09 fd 9a |.t.,(j.N.."`....| -00000020 b0 e4 7f 15 02 20 7c 49 fc d6 86 22 76 a5 d3 6f |..... |I..."v..o| -00000030 d8 74 f9 56 85 ac 3b 84 f5 c5 38 e7 da cc 12 7a |.t.V..;...8....z| -00000040 85 81 04 5d d5 23 |...].#|" -"2019-05-02 01:31:12.844 UTC [cauthdsl] func2 -> DEBU 1f47 0xc003300f30 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:12.844 UTC [cauthdsl] func1 -> DEBU 1f48 0xc003300f30 gate 1556760672841304900 evaluation succeeds" -"2019-05-02 01:31:12.845 UTC [policies] Evaluate -> DEBU 1f49 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.845 UTC [policies] Evaluate -> DEBU 1f4a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.845 UTC [policies] Evaluate -> DEBU 1f4b Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:12.845 UTC [policies] Evaluate -> DEBU 1f4c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:12.846 UTC [msp.identity] Verify -> DEBU 1f4d Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -"2019-05-02 01:31:12.846 UTC [msp.identity] Verify -> DEBU 1f4e Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -"2019-05-02 01:31:12.846 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f4f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.846 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f50 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.846 UTC [policies] Evaluate -> DEBU 1f51 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:12.846 UTC [policies] Evaluate -> DEBU 1f52 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:12.846 UTC [policies] Evaluate -> DEBU 1f53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:12.846 UTC [cauthdsl] func1 -> DEBU 1f54 0xc003272660 gate 1556760672846861500 evaluation starts" -"2019-05-02 01:31:12.846 UTC [cauthdsl] func2 -> DEBU 1f55 0xc003272660 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:12.847 UTC [cauthdsl] func2 -> DEBU 1f56 0xc003272660 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:12.847 UTC [cauthdsl] func2 -> DEBU 1f57 0xc003272660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:12.847 UTC [cauthdsl] func2 -> DEBU 1f58 0xc003272660 principal evaluation fails" -"2019-05-02 01:31:12.847 UTC [cauthdsl] func1 -> DEBU 1f59 0xc003272660 gate 1556760672846861500 evaluation fails" -"2019-05-02 01:31:12.847 UTC [policies] Evaluate -> DEBU 1f5a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.847 UTC [policies] Evaluate -> DEBU 1f5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.847 UTC [policies] Evaluate -> DEBU 1f5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:12.847 UTC [cauthdsl] func1 -> DEBU 1f5d 0xc003272ea0 gate 1556760672847755600 evaluation starts" -"2019-05-02 01:31:12.847 UTC [cauthdsl] func2 -> DEBU 1f5e 0xc003272ea0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:12.847 UTC [cauthdsl] func2 -> DEBU 1f5f 0xc003272ea0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:12.848 UTC [cauthdsl] func2 -> DEBU 1f60 0xc003272ea0 principal matched by identity 0" -"2019-05-02 01:31:12.848 UTC [msp.identity] Verify -> DEBU 1f61 Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -"2019-05-02 01:31:12.848 UTC [msp.identity] Verify -> DEBU 1f62 Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -"2019-05-02 01:31:12.848 UTC [cauthdsl] func2 -> DEBU 1f63 0xc003272ea0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:12.848 UTC [cauthdsl] func1 -> DEBU 1f64 0xc003272ea0 gate 1556760672847755600 evaluation succeeds" -"2019-05-02 01:31:12.848 UTC [policies] Evaluate -> DEBU 1f65 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:12.848 UTC [policies] Evaluate -> DEBU 1f66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:12.848 UTC [policies] Evaluate -> DEBU 1f67 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:12.848 UTC [policies] Evaluate -> DEBU 1f68 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:12.849 UTC [gossip.gossip] handleMessage -> DEBU 1f69 Exiting" -"2019-05-02 01:31:12.850 UTC [gossip.gossip] handleMessage -> DEBU 1f6a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.850 UTC [msp] DeserializeIdentity -> DEBU 1f6b Obtaining identity" -"2019-05-02 01:31:12.853 UTC [msp.identity] Verify -> DEBU 1f6c Verify: digest = 00000000 66 6d 35 ff 5b f6 a2 48 b9 b2 21 48 4d 3a 9d b4 |fm5.[..H..!HM:..| -00000010 03 7e 74 22 c4 db 0b b3 47 9a 18 3a 9f 08 bc ca |.~t"....G..:....|" -"2019-05-02 01:31:12.853 UTC [msp.identity] Verify -> DEBU 1f6d Verify: sig = 00000000 30 45 02 21 00 ef 77 a7 42 2b 29 06 d4 8d ea 3b |0E.!..w.B+)....;| -00000010 3a ca 6f 56 44 0c 1c 67 9f 1d e1 d8 53 2e 31 10 |:.oVD..g....S.1.| -00000020 fb 6f b4 0b e5 02 20 60 d0 d3 06 93 7e 55 aa 38 |.o.... `....~U.8| -00000030 b3 a4 13 35 0f b7 5d 97 cc a8 8f 1b 46 15 4f 0c |...5..].....F.O.| -00000040 0d f0 9d 93 08 97 3b |......;|" -"2019-05-02 01:31:12.854 UTC [msp.identity] Verify -> DEBU 1f6e Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -"2019-05-02 01:31:12.854 UTC [msp.identity] Verify -> DEBU 1f6f Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -00000040 23 02 f1 51 98 85 fe |#..Q...|" -"2019-05-02 01:31:12.854 UTC [msp] DeserializeIdentity -> DEBU 1f70 Obtaining identity" -"2019-05-02 01:31:12.855 UTC [msp] DeserializeIdentity -> DEBU 1f71 Obtaining identity" -"2019-05-02 01:31:12.855 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:12.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f73 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f74 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.855 UTC [policies] Evaluate -> DEBU 1f75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:12.855 UTC [policies] Evaluate -> DEBU 1f76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:12.855 UTC [policies] Evaluate -> DEBU 1f77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:12.855 UTC [cauthdsl] func1 -> DEBU 1f78 0xc0031db940 gate 1556760672855532600 evaluation starts" -"2019-05-02 01:31:12.855 UTC [cauthdsl] func2 -> DEBU 1f79 0xc0031db940 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:12.855 UTC [cauthdsl] func2 -> DEBU 1f7a 0xc0031db940 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:12.855 UTC [cauthdsl] func2 -> DEBU 1f7b 0xc0031db940 principal matched by identity 0" -"2019-05-02 01:31:12.856 UTC [msp.identity] Verify -> DEBU 1f7c Verify: digest = 00000000 81 eb a5 25 69 07 11 a6 84 4f e2 4f a0 e2 77 40 |...%i....O.O..w@| -00000010 17 a0 7b 7b 5b 2f fc 26 e3 b1 4b 94 ce 98 c5 83 |..{{[/.&..K.....|" -"2019-05-02 01:31:12.856 UTC [msp.identity] Verify -> DEBU 1f7d Verify: sig = 00000000 30 45 02 21 00 fd 23 f9 fb 2d b2 cd 34 67 ab 33 |0E.!..#..-..4g.3| -00000010 07 ca 97 4e 53 fe 36 bb de 2d e7 f3 20 0f 23 21 |...NS.6..-.. .#!| -00000020 e0 86 49 2f 48 02 20 47 29 ca 0e 25 97 f9 0d 17 |..I/H. G)..%....| -00000030 e2 d7 68 ec b9 85 0e be 65 4b 41 11 82 12 19 79 |..h.....eKA....y| -00000040 9e 37 b5 08 86 fb a3 |.7.....|" -"2019-05-02 01:31:12.856 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc0031db940 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:12.856 UTC [cauthdsl] func1 -> DEBU 1f7f 0xc0031db940 gate 1556760672855532600 evaluation succeeds" -"2019-05-02 01:31:12.856 UTC [policies] Evaluate -> DEBU 1f80 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.856 UTC [policies] Evaluate -> DEBU 1f81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.856 UTC [policies] Evaluate -> DEBU 1f82 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:12.856 UTC [policies] Evaluate -> DEBU 1f83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:12.856 UTC [msp] DeserializeIdentity -> DEBU 1f84 Obtaining identity" -"2019-05-02 01:31:12.856 UTC [msp] DeserializeIdentity -> DEBU 1f85 Obtaining identity" -"2019-05-02 01:31:12.857 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f86 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:12.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f87 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f88 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f89 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f8a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:12.858 UTC [cauthdsl] func1 -> DEBU 1f8c 0xc0030df110 gate 1556760672858158300 evaluation starts" -"2019-05-02 01:31:12.858 UTC [cauthdsl] func2 -> DEBU 1f8d 0xc0030df110 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:12.858 UTC [cauthdsl] func2 -> DEBU 1f8e 0xc0030df110 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:12.858 UTC [cauthdsl] func2 -> DEBU 1f8f 0xc0030df110 principal matched by identity 0" -"2019-05-02 01:31:12.858 UTC [msp.identity] Verify -> DEBU 1f90 Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -"2019-05-02 01:31:12.858 UTC [msp.identity] Verify -> DEBU 1f91 Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -00000040 d4 55 93 6a 4b 9f |.U.jK.|" -"2019-05-02 01:31:12.858 UTC [cauthdsl] func2 -> DEBU 1f92 0xc0030df110 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:12.858 UTC [cauthdsl] func1 -> DEBU 1f93 0xc0030df110 gate 1556760672858158300 evaluation succeeds" -"2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f96 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:12.858 UTC [policies] Evaluate -> DEBU 1f97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:12.859 UTC [msp] DeserializeIdentity -> DEBU 1f98 Obtaining identity" -"2019-05-02 01:31:12.860 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f99 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.860 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f9a Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.860 UTC [policies] Evaluate -> DEBU 1f9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:12.860 UTC [policies] Evaluate -> DEBU 1f9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:12.860 UTC [policies] Evaluate -> DEBU 1f9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:12.860 UTC [cauthdsl] func1 -> DEBU 1f9e 0xc003052200 gate 1556760672860628900 evaluation starts" -"2019-05-02 01:31:12.860 UTC [cauthdsl] func2 -> DEBU 1f9f 0xc003052200 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:12.860 UTC [cauthdsl] func2 -> DEBU 1fa0 0xc003052200 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:12.861 UTC [cauthdsl] func2 -> DEBU 1fa1 0xc003052200 principal matched by identity 0" -"2019-05-02 01:31:12.861 UTC [msp.identity] Verify -> DEBU 1fa2 Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -"2019-05-02 01:31:12.861 UTC [msp.identity] Verify -> DEBU 1fa3 Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -00000040 d4 55 93 6a 4b 9f |.U.jK.|" -"2019-05-02 01:31:12.861 UTC [cauthdsl] func2 -> DEBU 1fa4 0xc003052200 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:12.861 UTC [cauthdsl] func1 -> DEBU 1fa5 0xc003052200 gate 1556760672860628900 evaluation succeeds" -"2019-05-02 01:31:12.861 UTC [policies] Evaluate -> DEBU 1fa6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.861 UTC [policies] Evaluate -> DEBU 1fa7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.861 UTC [policies] Evaluate -> DEBU 1fa8 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:12.861 UTC [policies] Evaluate -> DEBU 1fa9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:12.861 UTC [gossip.gossip] handleMessage -> DEBU 1faa Exiting" -"2019-05-02 01:31:12.861 UTC [gossip.gossip] handleMessage -> DEBU 1fab Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.861 UTC [msp] DeserializeIdentity -> DEBU 1fac Obtaining identity" -"2019-05-02 01:31:12.862 UTC [msp.identity] Verify -> DEBU 1fad Verify: digest = 00000000 66 6d 35 ff 5b f6 a2 48 b9 b2 21 48 4d 3a 9d b4 |fm5.[..H..!HM:..| -00000010 03 7e 74 22 c4 db 0b b3 47 9a 18 3a 9f 08 bc ca |.~t"....G..:....|" -"2019-05-02 01:31:12.862 UTC [msp.identity] Verify -> DEBU 1fae Verify: sig = 00000000 30 45 02 21 00 ef 77 a7 42 2b 29 06 d4 8d ea 3b |0E.!..w.B+)....;| -00000010 3a ca 6f 56 44 0c 1c 67 9f 1d e1 d8 53 2e 31 10 |:.oVD..g....S.1.| -00000020 fb 6f b4 0b e5 02 20 60 d0 d3 06 93 7e 55 aa 38 |.o.... `....~U.8| -00000030 b3 a4 13 35 0f b7 5d 97 cc a8 8f 1b 46 15 4f 0c |...5..].....F.O.| -00000040 0d f0 9d 93 08 97 3b |......;|" -"2019-05-02 01:31:12.863 UTC [msp.identity] Verify -> DEBU 1faf Verify: digest = 00000000 7c 51 ed ef 6a 84 bf b7 77 6d b1 2f 66 20 2b 74 ||Q..j...wm./f +t| -00000010 b1 4d da 10 58 e9 a9 70 7b f3 c4 99 37 50 a5 d4 |.M..X..p{...7P..|" -"2019-05-02 01:31:12.864 UTC [gossip.comm] func1 -> DEBU 1fb0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:12.865 UTC [msp.identity] Verify -> DEBU 1fb1 Verify: sig = 00000000 30 45 02 21 00 82 6d d9 aa db 5e 0f 67 dd 28 03 |0E.!..m...^.g.(.| -00000010 64 66 45 c8 3b 50 94 3d 6f 9a 17 c5 fb 8f 86 7c |dfE.;P.=o......|| -00000020 15 6e c9 83 72 02 20 4c 56 d8 0f e9 8a 36 67 52 |.n..r. LV....6gR| -00000030 b1 62 9d ae 7f dd 02 30 83 62 26 8b fc 20 2c fe |.b.....0.b&.. ,.| -00000040 23 02 f1 51 98 85 fe |#..Q...|" -"2019-05-02 01:31:12.866 UTC [msp] DeserializeIdentity -> DEBU 1fb2 Obtaining identity" -"2019-05-02 01:31:12.866 UTC [msp] DeserializeIdentity -> DEBU 1fb3 Obtaining identity" -"2019-05-02 01:31:12.866 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fb4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:12.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.866 UTC [policies] Evaluate -> DEBU 1fb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:12.867 UTC [policies] Evaluate -> DEBU 1fb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:12.867 UTC [policies] Evaluate -> DEBU 1fb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:12.867 UTC [cauthdsl] func1 -> DEBU 1fba 0xc003044c20 gate 1556760672867748900 evaluation starts" -"2019-05-02 01:31:12.867 UTC [cauthdsl] func2 -> DEBU 1fbb 0xc003044c20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:12.867 UTC [cauthdsl] func2 -> DEBU 1fbc 0xc003044c20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:12.868 UTC [cauthdsl] func2 -> DEBU 1fbd 0xc003044c20 principal matched by identity 0" -"2019-05-02 01:31:12.868 UTC [msp.identity] Verify -> DEBU 1fbe Verify: digest = 00000000 f5 84 fc 53 b8 bc 29 6c 8d 44 e3 b7 42 34 00 a8 |...S..)l.D..B4..| -00000010 0c dc ce 7d c1 c2 dc 95 95 05 62 fc 36 3f c1 91 |...}......b.6?..|" -"2019-05-02 01:31:12.868 UTC [msp.identity] Verify -> DEBU 1fbf Verify: sig = 00000000 30 44 02 20 1f 6f f9 d2 72 02 ca 23 0a 4d 06 bd |0D. .o..r..#.M..| -00000010 99 74 a4 2c 28 6a 0a 4e df 05 22 60 b5 09 fd 9a |.t.,(j.N.."`....| -00000020 b0 e4 7f 15 02 20 7c 49 fc d6 86 22 76 a5 d3 6f |..... |I..."v..o| -00000030 d8 74 f9 56 85 ac 3b 84 f5 c5 38 e7 da cc 12 7a |.t.V..;...8....z| -00000040 85 81 04 5d d5 23 |...].#|" -"2019-05-02 01:31:12.869 UTC [cauthdsl] func2 -> DEBU 1fc0 0xc003044c20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:12.869 UTC [cauthdsl] func1 -> DEBU 1fc1 0xc003044c20 gate 1556760672867748900 evaluation succeeds" -"2019-05-02 01:31:12.869 UTC [policies] Evaluate -> DEBU 1fc2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.869 UTC [policies] Evaluate -> DEBU 1fc3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.869 UTC [policies] Evaluate -> DEBU 1fc4 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:12.870 UTC [policies] Evaluate -> DEBU 1fc5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:12.870 UTC [msp] DeserializeIdentity -> DEBU 1fc6 Obtaining identity" -"2019-05-02 01:31:12.871 UTC [msp] DeserializeIdentity -> DEBU 1fc7 Obtaining identity" -"2019-05-02 01:31:12.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fc8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:12.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fc9 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fca Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.872 UTC [policies] Evaluate -> DEBU 1fcb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:12.872 UTC [policies] Evaluate -> DEBU 1fcc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:12.873 UTC [policies] Evaluate -> DEBU 1fcd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:12.873 UTC [cauthdsl] func1 -> DEBU 1fce 0xc003022410 gate 1556760672873286200 evaluation starts" -"2019-05-02 01:31:12.873 UTC [cauthdsl] func2 -> DEBU 1fcf 0xc003022410 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:12.873 UTC [cauthdsl] func2 -> DEBU 1fd0 0xc003022410 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:12.874 UTC [cauthdsl] func2 -> DEBU 1fd1 0xc003022410 principal matched by identity 0" -"2019-05-02 01:31:12.874 UTC [msp.identity] Verify -> DEBU 1fd2 Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -"2019-05-02 01:31:12.874 UTC [msp.identity] Verify -> DEBU 1fd3 Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -00000040 f7 8f 39 95 02 eb |..9...|" -"2019-05-02 01:31:12.875 UTC [cauthdsl] func2 -> DEBU 1fd4 0xc003022410 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:12.875 UTC [cauthdsl] func1 -> DEBU 1fd5 0xc003022410 gate 1556760672873286200 evaluation succeeds" -"2019-05-02 01:31:12.875 UTC [policies] Evaluate -> DEBU 1fd6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.875 UTC [policies] Evaluate -> DEBU 1fd7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.876 UTC [policies] Evaluate -> DEBU 1fd8 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:12.876 UTC [policies] Evaluate -> DEBU 1fd9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:12.876 UTC [msp] DeserializeIdentity -> DEBU 1fda Obtaining identity" -"2019-05-02 01:31:12.876 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fdb Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.876 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fdc Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:12.876 UTC [policies] Evaluate -> DEBU 1fdd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:12.877 UTC [policies] Evaluate -> DEBU 1fde This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:12.877 UTC [policies] Evaluate -> DEBU 1fdf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:12.877 UTC [cauthdsl] func1 -> DEBU 1fe0 0xc003023610 gate 1556760672877326400 evaluation starts" -"2019-05-02 01:31:12.877 UTC [cauthdsl] func2 -> DEBU 1fe1 0xc003023610 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:12.877 UTC [cauthdsl] func2 -> DEBU 1fe2 0xc003023610 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:12.877 UTC [cauthdsl] func2 -> DEBU 1fe3 0xc003023610 principal matched by identity 0" -"2019-05-02 01:31:12.877 UTC [msp.identity] Verify -> DEBU 1fe4 Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -"2019-05-02 01:31:12.877 UTC [msp.identity] Verify -> DEBU 1fe5 Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -00000040 f7 8f 39 95 02 eb |..9...|" -"2019-05-02 01:31:12.878 UTC [cauthdsl] func2 -> DEBU 1fe6 0xc003023610 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:12.878 UTC [cauthdsl] func1 -> DEBU 1fe7 0xc003023610 gate 1556760672877326400 evaluation succeeds" -"2019-05-02 01:31:12.878 UTC [policies] Evaluate -> DEBU 1fe8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.878 UTC [policies] Evaluate -> DEBU 1fe9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:12.879 UTC [policies] Evaluate -> DEBU 1fea Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:12.879 UTC [policies] Evaluate -> DEBU 1feb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:12.879 UTC [gossip.gossip] handleMessage -> DEBU 1fec Exiting" -"2019-05-02 01:31:12.879 UTC [gossip.gossip] handleMessage -> DEBU 1fed Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760671563142700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:12.879 UTC [msp.identity] Verify -> DEBU 1fee Verify: digest = 00000000 fc ff 39 04 73 5f f2 e7 22 8c 8d 03 43 80 10 39 |..9.s_.."...C..9| -00000010 39 de 51 1a 50 4b 65 5f ca e2 8f 95 ab b2 6a 11 |9.Q.PKe_......j.|" -"2019-05-02 01:31:12.880 UTC [msp.identity] Verify -> DEBU 1fef Verify: sig = 00000000 30 44 02 20 31 63 e7 d7 ca 29 06 4b 0c b8 2f d3 |0D. 1c...).K../.| -00000010 cf 33 24 de af a1 d9 80 f5 d6 88 2b be 6e 9b d6 |.3$........+.n..| -00000020 02 56 c7 d3 02 20 37 96 4f d3 5d 67 35 f9 62 31 |.V... 7.O.]g5.b1| -00000030 4e a5 a9 f8 41 75 9e 28 28 65 7f 20 73 9f 6e ce |N...Au.((e. s.n.| -00000040 89 1e b4 1b 9d da |......|" -"2019-05-02 01:31:12.881 UTC [msp] DeserializeIdentity -> DEBU 1ff0 Obtaining identity" -"2019-05-02 01:31:12.881 UTC [gossip.gossip] handleMessage -> DEBU 1ff1 Exiting" -"2019-05-02 01:31:12.914 UTC [msp] DeserializeIdentity -> DEBU 1ff2 Obtaining identity" -"2019-05-02 01:31:12.915 UTC [msp] DeserializeIdentity -> DEBU 1ff3 Obtaining identity" -"2019-05-02 01:31:12.915 UTC [gossip.pull] Hello -> DEBU 1ff4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:12.916 UTC [msp] DeserializeIdentity -> DEBU 1ff5 Obtaining identity" -"2019-05-02 01:31:12.917 UTC [msp] DeserializeIdentity -> DEBU 1ff6 Obtaining identity" -"2019-05-02 01:31:12.917 UTC [gossip.comm] Send -> DEBU 1ff7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:12.918 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.918 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff9 Exiting" -"2019-05-02 01:31:12.920 UTC [gossip.gossip] handleMessage -> DEBU 1ffa Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10850537468822102772 , Msg_type: BLOCK_MSG, digests: [4 5 6 1 2 3], Envelope: 52 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.920 UTC [gossip.pull] HandleMessage -> DEBU 1ffb GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10850537468822102772 , Msg_type: BLOCK_MSG, digests: [4 5 6 1 2 3], Envelope: 52 bytes, Signature: 0 bytes" -"2019-05-02 01:31:12.920 UTC [gossip.gossip] handleMessage -> DEBU 1ffc Exiting" -"2019-05-02 01:31:13.097 UTC [gossip.gossip] handleMessage -> DEBU 1ffd Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.098 UTC [msp] DeserializeIdentity -> DEBU 1ffe Obtaining identity" -"2019-05-02 01:31:13.098 UTC [msp] DeserializeIdentity -> DEBU 1fff Obtaining identity" -"2019-05-02 01:31:13.098 UTC [gossip.gossip] handleMessage -> DEBU 2000 Exiting" -"2019-05-02 01:31:13.098 UTC [gossip.gossip] handleMessage -> DEBU 2001 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760671488233600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.098 UTC [msp.identity] Verify -> DEBU 2002 Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -"2019-05-02 01:31:13.098 UTC [msp.identity] Verify -> DEBU 2003 Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -"2019-05-02 01:31:13.099 UTC [gossip.gossip] handleMessage -> DEBU 2004 Exiting" -"2019-05-02 01:31:13.106 UTC [gossip.comm] func1 -> DEBU 2005 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760671488233600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.107 UTC [gossip.gossip] handleMessage -> DEBU 2007 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760671488233600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.106 UTC [gossip.comm] func1 -> DEBU 2006 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760671488233600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.109 UTC [msp.identity] Verify -> DEBU 2008 Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -"2019-05-02 01:31:13.112 UTC [msp.identity] Verify -> DEBU 2009 Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -"2019-05-02 01:31:13.112 UTC [msp] DeserializeIdentity -> DEBU 200a Obtaining identity" -"2019-05-02 01:31:13.113 UTC [gossip.gossip] handleMessage -> DEBU 200b Exiting" -"2019-05-02 01:31:13.113 UTC [gossip.gossip] handleMessage -> DEBU 200c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760671488233600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.114 UTC [msp.identity] Verify -> DEBU 200d Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -"2019-05-02 01:31:13.114 UTC [msp.identity] Verify -> DEBU 200e Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -"2019-05-02 01:31:13.115 UTC [msp] DeserializeIdentity -> DEBU 200f Obtaining identity" -"2019-05-02 01:31:13.115 UTC [gossip.gossip] handleMessage -> DEBU 2010 Exiting" -"2019-05-02 01:31:13.117 UTC [gossip.gossip] handleMessage -> DEBU 2011 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.118 UTC [gossip.pull] HandleMessage -> DEBU 2012 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.118 UTC [gossip.pull] SendDigest -> DEBU 2013 Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:13.118 UTC [gossip.gossip] handleMessage -> DEBU 2014 Exiting" -"2019-05-02 01:31:13.320 UTC [gossip.comm] func1 -> DEBU 2015 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.320 UTC [gossip.gossip] handleMessage -> DEBU 2016 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.320 UTC [msp] DeserializeIdentity -> DEBU 2017 Obtaining identity" -"2019-05-02 01:31:13.321 UTC [msp] DeserializeIdentity -> DEBU 2018 Obtaining identity" -"2019-05-02 01:31:13.321 UTC [msp] DeserializeIdentity -> DEBU 2019 Obtaining identity" -"2019-05-02 01:31:13.321 UTC [gossip.gossip] handleMessage -> DEBU 201a Exiting" -"2019-05-02 01:31:13.322 UTC [gossip.comm] func1 -> DEBU 201b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760671474447300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.322 UTC [gossip.gossip] handleMessage -> DEBU 201c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760671474447300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.323 UTC [msp] DeserializeIdentity -> DEBU 201d Obtaining identity" -"2019-05-02 01:31:13.323 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 201e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:13.323 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.324 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2020 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.324 UTC [policies] Evaluate -> DEBU 2021 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:13.324 UTC [policies] Evaluate -> DEBU 2022 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:13.324 UTC [policies] Evaluate -> DEBU 2023 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:13.325 UTC [cauthdsl] func1 -> DEBU 2024 0xc002e8c090 gate 1556760673325100000 evaluation starts" -"2019-05-02 01:31:13.325 UTC [cauthdsl] func2 -> DEBU 2025 0xc002e8c090 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:13.325 UTC [cauthdsl] func2 -> DEBU 2026 0xc002e8c090 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:13.325 UTC [cauthdsl] func2 -> DEBU 2027 0xc002e8c090 principal matched by identity 0" -"2019-05-02 01:31:13.326 UTC [msp.identity] Verify -> DEBU 2028 Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -"2019-05-02 01:31:13.326 UTC [msp.identity] Verify -> DEBU 2029 Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -00000040 f7 8f 39 95 02 eb |..9...|" -"2019-05-02 01:31:13.327 UTC [cauthdsl] func2 -> DEBU 202a 0xc002e8c090 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:13.327 UTC [cauthdsl] func1 -> DEBU 202b 0xc002e8c090 gate 1556760673325100000 evaluation succeeds" -"2019-05-02 01:31:13.328 UTC [policies] Evaluate -> DEBU 202c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.328 UTC [policies] Evaluate -> DEBU 202d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.328 UTC [policies] Evaluate -> DEBU 202e Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:13.328 UTC [policies] Evaluate -> DEBU 202f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:13.329 UTC [msp] DeserializeIdentity -> DEBU 2030 Obtaining identity" -"2019-05-02 01:31:13.329 UTC [gossip.gossip] handleMessage -> DEBU 2031 Exiting" -"2019-05-02 01:31:13.331 UTC [gossip.comm] func1 -> DEBU 2032 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760671474447300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.332 UTC [gossip.gossip] handleMessage -> DEBU 2033 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760671474447300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.332 UTC [msp] DeserializeIdentity -> DEBU 2034 Obtaining identity" -"2019-05-02 01:31:13.333 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2035 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:13.333 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2036 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.333 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2037 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2038 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2039 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 203a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:13.333 UTC [cauthdsl] func1 -> DEBU 203b 0xc002e8dcb0 gate 1556760673333332600 evaluation starts" -"2019-05-02 01:31:13.333 UTC [cauthdsl] func2 -> DEBU 203c 0xc002e8dcb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:13.333 UTC [cauthdsl] func2 -> DEBU 203d 0xc002e8dcb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:13.333 UTC [cauthdsl] func2 -> DEBU 203e 0xc002e8dcb0 principal matched by identity 0" -"2019-05-02 01:31:13.333 UTC [msp.identity] Verify -> DEBU 203f Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -"2019-05-02 01:31:13.333 UTC [msp.identity] Verify -> DEBU 2040 Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -00000040 f7 8f 39 95 02 eb |..9...|" -"2019-05-02 01:31:13.333 UTC [cauthdsl] func2 -> DEBU 2041 0xc002e8dcb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:13.333 UTC [cauthdsl] func1 -> DEBU 2042 0xc002e8dcb0 gate 1556760673333332600 evaluation succeeds" -"2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2043 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2044 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2045 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:13.333 UTC [policies] Evaluate -> DEBU 2046 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:13.333 UTC [msp] DeserializeIdentity -> DEBU 2047 Obtaining identity" -"2019-05-02 01:31:13.333 UTC [gossip.gossip] handleMessage -> DEBU 2048 Exiting" -"2019-05-02 01:31:13.433 UTC [gossip.gossip] handleMessage -> DEBU 2049 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.433 UTC [gossip.pull] HandleMessage -> DEBU 204a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.433 UTC [gossip.pull] SendDigest -> DEBU 204b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:13.434 UTC [gossip.gossip] handleMessage -> DEBU 204c Exiting" -"2019-05-02 01:31:13.440 UTC [gossip.gossip] handleMessage -> DEBU 204d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:13.445 UTC [gossip.gossip] handleMessage -> DEBU 204e Exiting" -"2019-05-02 01:31:13.445 UTC [gossip.discovery] handleMsgFromComm -> DEBU 204f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:13.445 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2050 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:13.445 UTC [gossip.gossip] handleMessage -> DEBU 2051 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.446 UTC [msp.identity] Verify -> DEBU 2052 Verify: digest = 00000000 06 d9 05 cb ce 01 38 8c 0d 46 49 1d 16 e0 00 be |......8..FI.....| -00000010 6e a4 dc aa 90 02 a2 e2 3e df 43 7e e2 9f 57 34 |n.......>.C~..W4|" -"2019-05-02 01:31:13.446 UTC [msp.identity] Verify -> DEBU 2053 Verify: sig = 00000000 30 44 02 20 62 37 8f 99 35 96 16 a4 4d 21 d7 0b |0D. b7..5...M!..| -00000010 f9 2e 19 cd 16 de c2 ce b0 38 34 20 6e 80 a8 3b |.........84 n..;| -00000020 fa fe 10 ce 02 20 77 1c 74 82 e5 0c 78 91 d4 64 |..... w.t...x..d| -00000030 d7 cc cd bd 87 2a 4c f4 22 cc 40 0d f4 42 da 3d |.....*L.".@..B.=| -00000040 7a 25 08 c2 40 06 |z%..@.|" -"2019-05-02 01:31:13.447 UTC [msp.identity] Verify -> DEBU 2054 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:41.471 UTC [fsblkstorage] indexBlock -> DEBU 1e41 Adding txLoc [fileSuffixNum=0, offset=86577, bytesLength=3055] for tx ID: [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9] to txid-index" +"2019-05-02 09:27:41.472 UTC [fsblkstorage] indexBlock -> DEBU 1e42 Adding txLoc [fileSuffixNum=0, offset=86577, bytesLength=3055] for tx number:[0] ID: [592858be91bbb86d4b7f21d6850658a88e698f303dc62267f1f9b75d904ad6c9] to blockNumTranNum index" +"2019-05-02 09:27:41.475 UTC [fsblkstorage] updateCheckpoint -> DEBU 1e43 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90570], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-05-02 09:27:41.475 UTC [pvtdatastorage] Commit -> DEBU 1e44 Committing private data for block [6]" +"2019-05-02 09:27:41.479 UTC [pvtdatastorage] Commit -> DEBU 1e45 Committed private data for block [6]" +"2019-05-02 09:27:41.480 UTC [kvledger] CommitWithPvtData -> DEBU 1e46 [businesschannel] Committing block [6] transactions to state database" +"2019-05-02 09:27:41.480 UTC [lockbasedtxmgr] Commit -> DEBU 1e47 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-05-02 09:27:41.480 UTC [lockbasedtxmgr] Commit -> DEBU 1e48 Committing updates to state database" +"2019-05-02 09:27:41.481 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1e49 Building the expiry schedules based on the update batch" +"2019-05-02 09:27:41.481 UTC [lockbasedtxmgr] Commit -> DEBU 1e4a Write lock acquired for committing updates to state database" +"2019-05-02 09:27:41.481 UTC [stateleveldb] ApplyUpdates -> DEBU 1e4b Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-05-02 09:27:41.481 UTC [stateleveldb] ApplyUpdates -> DEBU 1e4c Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-05-02 09:27:41.481 UTC [stateleveldb] ApplyUpdates -> DEBU 1e4d Channel [businesschannel]: Applying key(string)=[exp02􏿿initialized] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x0, 0xf4, 0x8f, 0xbf, 0xbf, 0x69, 0x6e, 0x69, 0x74, 0x69, 0x61, 0x6c, 0x69, 0x7a, 0x65, 0x64}]" +"2019-05-02 09:27:41.484 UTC [lockbasedtxmgr] Commit -> DEBU 1e4e Updates committed to state database and the write lock is released" +"2019-05-02 09:27:41.484 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1e4f Preparing potential purge list working-set for expiringAtBlk [7]" +"2019-05-02 09:27:41.484 UTC [leveldbhelper] GetIterator -> DEBU 1e50 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" +"2019-05-02 09:27:41.485 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1e51 No expiry entry found for expiringAtBlk [7]" +"2019-05-02 09:27:41.485 UTC [lockbasedtxmgr] func1 -> DEBU 1e52 launched the background routine for preparing keys to purge with the next block" +"2019-05-02 09:27:41.485 UTC [kvledger] CommitWithPvtData -> DEBU 1e53 [businesschannel] Committing block [6] transactions to history database" +"2019-05-02 09:27:41.485 UTC [historyleveldb] Commit -> DEBU 1e54 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" +"2019-05-02 09:27:41.487 UTC [historyleveldb] Commit -> DEBU 1e55 Channel [businesschannel]: Updates committed to history database for blockNo [6]" +"2019-05-02 09:27:41.487 UTC [kvledger] CommitWithPvtData -> INFO 1e56 [businesschannel] Committed block [6] with 1 transaction(s) in 44ms (state_validation=19ms block_commit=17ms state_commit=5ms)" +"2019-05-02 09:27:41.488 UTC [msp.identity] Sign -> DEBU 1e57 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020807 " +"2019-05-02 09:27:41.488 UTC [msp.identity] Sign -> DEBU 1e58 Sign: digest: 68A091325825D2E9B4F1F6512D2FD9D16BA54DD8C9B8FFBB598257089B8E949A " +"2019-05-02 09:27:41.488 UTC [gossip.state] commitBlock -> DEBU 1e59 [businesschannel] Committed block [6] with 1 transaction(s)" +"2019-05-02 09:27:42.345 UTC [gossip.election] waitForInterrupt -> DEBU 1e5a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:27:42.346 UTC [gossip.election] IsLeader -> DEBU 1e5b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:27:42.347 UTC [msp.identity] Sign -> DEBU 1e5c Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510061801 " +"2019-05-02 09:27:42.348 UTC [msp.identity] Sign -> DEBU 1e5d Sign: digest: E2F907E5E5A479A34581E8DDBBC40AFC349784B71B0DFE7B145B0B97208EB39A " +"2019-05-02 09:27:42.349 UTC [gossip.election] waitForInterrupt -> DEBU 1e5e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:42.350 UTC [msp] DeserializeIdentity -> DEBU 1e5f Obtaining identity" +"2019-05-02 09:27:42.351 UTC [msp] DeserializeIdentity -> DEBU 1e60 Obtaining identity" +"2019-05-02 09:27:42.352 UTC [msp] DeserializeIdentity -> DEBU 1e61 Obtaining identity" +"2019-05-02 09:27:42.352 UTC [msp] DeserializeIdentity -> DEBU 1e62 Obtaining identity" +"2019-05-02 09:27:42.352 UTC [gossip.comm] Send -> DEBU 1e63 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:42.353 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity" +"2019-05-02 09:27:42.353 UTC [gossip.comm] sendToEndpoint -> DEBU 1e65 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-05-02 09:27:42.353 UTC [msp] DeserializeIdentity -> DEBU 1e66 Obtaining identity" +"2019-05-02 09:27:42.353 UTC [gossip.comm] sendToEndpoint -> DEBU 1e67 Exiting" +"2019-05-02 09:27:43.799 UTC [gossip.comm] func1 -> DEBU 1e68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:43.799 UTC [gossip.gossip] handleMessage -> DEBU 1e69 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:43.800 UTC [gossip.gossip] handleMessage -> DEBU 1e6a Exiting" +"2019-05-02 09:27:43.800 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e6b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:43.801 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e6c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:43.801 UTC [msp] DeserializeIdentity -> DEBU 1e6d Obtaining identity" +"2019-05-02 09:27:43.802 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:43.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e6f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:43.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e70 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:43.803 UTC [policies] Evaluate -> DEBU 1e71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:43.803 UTC [policies] Evaluate -> DEBU 1e72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:43.804 UTC [policies] Evaluate -> DEBU 1e73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:43.805 UTC [cauthdsl] func1 -> DEBU 1e74 0xc003d47d60 gate 1556789263805675500 evaluation starts" +"2019-05-02 09:27:43.806 UTC [cauthdsl] func2 -> DEBU 1e75 0xc003d47d60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:43.806 UTC [cauthdsl] func2 -> DEBU 1e76 0xc003d47d60 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:43.806 UTC [cauthdsl] func2 -> DEBU 1e77 0xc003d47d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:43.807 UTC [cauthdsl] func2 -> DEBU 1e78 0xc003d47d60 principal evaluation fails" +"2019-05-02 09:27:43.807 UTC [cauthdsl] func1 -> DEBU 1e79 0xc003d47d60 gate 1556789263805675500 evaluation fails" +"2019-05-02 09:27:43.807 UTC [policies] Evaluate -> DEBU 1e7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:43.809 UTC [gossip.gossip] handleMessage -> DEBU 1e7b Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:43.810 UTC [policies] Evaluate -> DEBU 1e7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:43.810 UTC [policies] Evaluate -> DEBU 1e7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:43.810 UTC [cauthdsl] func1 -> DEBU 1e7e 0xc003dbe5a0 gate 1556789263810763700 evaluation starts" +"2019-05-02 09:27:43.810 UTC [cauthdsl] func2 -> DEBU 1e7f 0xc003dbe5a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:43.811 UTC [cauthdsl] func2 -> DEBU 1e80 0xc003dbe5a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:43.811 UTC [cauthdsl] func2 -> DEBU 1e81 0xc003dbe5a0 principal matched by identity 0" +"2019-05-02 09:27:43.811 UTC [msp.identity] Verify -> DEBU 1e82 Verify: digest = 00000000 28 46 52 9b b2 72 1a 72 23 4c 78 9b 4e 9c 1b 2d |(FR..r.r#Lx.N..-| +00000010 e7 54 b2 af 7b e5 b8 ab f7 0f 19 46 94 fd 9c 7a |.T..{......F...z|" +"2019-05-02 09:27:43.811 UTC [msp.identity] Verify -> DEBU 1e83 Verify: sig = 00000000 30 45 02 21 00 c5 90 8b 53 6b 52 f3 6f c6 89 7c |0E.!....SkR.o..|| +00000010 48 bb 08 87 bc e2 c5 8d 34 2e 34 98 20 8b b7 3d |H.......4.4. ..=| +00000020 1d 95 0d 03 6a 02 20 24 27 46 dc 7e 33 d5 04 16 |....j. $'F.~3...| +00000030 46 e4 82 b6 8f 81 37 9b ed af d3 0f 23 21 35 6d |F.....7.....#!5m| +00000040 16 5c 28 d8 35 66 b1 |.\(.5f.|" +"2019-05-02 09:27:43.812 UTC [cauthdsl] func2 -> DEBU 1e84 0xc003dbe5a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:43.812 UTC [cauthdsl] func1 -> DEBU 1e85 0xc003dbe5a0 gate 1556789263810763700 evaluation succeeds" +"2019-05-02 09:27:43.812 UTC [policies] Evaluate -> DEBU 1e86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:43.813 UTC [policies] Evaluate -> DEBU 1e87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:43.813 UTC [policies] Evaluate -> DEBU 1e88 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:43.813 UTC [policies] Evaluate -> DEBU 1e89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:43.813 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e8a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:43.813 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:43.814 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 " +"2019-05-02 09:27:43.814 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 " +"2019-05-02 09:27:43.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:43.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e8f Exiting" +"2019-05-02 09:27:43.816 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e90 Exiting" +"2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e91 Exiting" +"2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e93 Exiting" +"2019-05-02 09:27:43.816 UTC [gossip.gossip] handleMessage -> DEBU 1e94 Exiting" +"2019-05-02 09:27:43.816 UTC [gossip.gossip] handleMessage -> DEBU 1e95 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:43.816 UTC [gossip.gossip] handleMessage -> DEBU 1e96 Exiting" +"2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e97 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:43.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e98 Exiting" +"2019-05-02 09:27:43.826 UTC [msp] DeserializeIdentity -> DEBU 1e99 Obtaining identity" +"2019-05-02 09:27:43.827 UTC [msp] DeserializeIdentity -> DEBU 1e9a Obtaining identity" +"2019-05-02 09:27:43.827 UTC [msp] DeserializeIdentity -> DEBU 1e9b Obtaining identity" +"2019-05-02 09:27:43.827 UTC [msp] DeserializeIdentity -> DEBU 1e9c Obtaining identity" +"2019-05-02 09:27:43.828 UTC [msp] DeserializeIdentity -> DEBU 1e9d Obtaining identity" +"2019-05-02 09:27:43.828 UTC [msp] DeserializeIdentity -> DEBU 1e9e Obtaining identity" +"2019-05-02 09:27:43.828 UTC [gossip.comm] Send -> DEBU 1e9f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:43.829 UTC [msp] DeserializeIdentity -> DEBU 1ea0 Obtaining identity" +"2019-05-02 09:27:43.829 UTC [msp] DeserializeIdentity -> DEBU 1ea1 Obtaining identity" +"2019-05-02 09:27:43.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:43.830 UTC [gossip.comm] Send -> DEBU 1ea3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:43.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea6 Exiting" +"2019-05-02 09:27:43.830 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea4 Exiting" +"2019-05-02 09:27:44.039 UTC [msp.identity] Sign -> DEBU 1ea7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151019 " +"2019-05-02 09:27:44.039 UTC [msp.identity] Sign -> DEBU 1ea8 Sign: digest: 9D85DB97449275B80669AFF8894EDE65FDA6104E76700A673CB4A351732B805D " +"2019-05-02 09:27:44.040 UTC [msp.identity] Sign -> DEBU 1ea9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:44.040 UTC [msp.identity] Sign -> DEBU 1eaa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:44.041 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1eab Sleeping 5s" +"2019-05-02 09:27:44.051 UTC [msp] DeserializeIdentity -> DEBU 1eac Obtaining identity" +"2019-05-02 09:27:44.052 UTC [msp] DeserializeIdentity -> DEBU 1ead Obtaining identity" +"2019-05-02 09:27:44.052 UTC [msp] DeserializeIdentity -> DEBU 1eae Obtaining identity" +"2019-05-02 09:27:44.053 UTC [gossip.comm] Send -> DEBU 1eaf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:44.054 UTC [msp] DeserializeIdentity -> DEBU 1eb0 Obtaining identity" +"2019-05-02 09:27:44.054 UTC [gossip.comm] Send -> DEBU 1eb1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:44.054 UTC [gossip.comm] Send -> DEBU 1eb2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:44.054 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:44.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:44.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb5 Exiting" +"2019-05-02 09:27:44.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb6 Exiting" +"2019-05-02 09:27:44.056 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:44.056 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb8 Exiting" +"2019-05-02 09:27:44.088 UTC [gossip.gossip] handleMessage -> DEBU 1eb9 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:44.089 UTC [gossip.gossip] handleMessage -> DEBU 1eba Exiting" +"2019-05-02 09:27:44.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ebb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:44.090 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ebc Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:44.090 UTC [msp.identity] Verify -> DEBU 1ebd Verify: digest = 00000000 04 78 1d ad 0d ea 10 db 10 52 b6 42 fd bc 3d 70 |.x.......R.B..=p| +00000010 78 5f ff c6 02 c1 8b 99 9d 23 89 97 16 e1 3f b5 |x_.......#....?.|" +"2019-05-02 09:27:44.090 UTC [msp.identity] Verify -> DEBU 1ebe Verify: sig = 00000000 30 44 02 20 04 55 80 4c 13 fc f2 38 1b 02 d8 b5 |0D. .U.L...8....| +00000010 ba 04 69 04 c2 e3 8a 2a c4 71 ee c2 2c 07 e9 7c |..i....*.q..,..|| +00000020 9d ac c8 02 02 20 22 a7 f1 e3 51 a6 98 8a 19 fb |..... "...Q.....| +00000030 c2 2f 0f 5a e6 31 c6 f3 92 b6 d8 75 77 e5 50 cc |./.Z.1.....uw.P.| +00000040 7b 99 ee de 4a 6d |{...Jm|" +"2019-05-02 09:27:44.091 UTC [msp.identity] Verify -> DEBU 1ebf Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:13.447 UTC [msp.identity] Verify -> DEBU 2055 Verify: sig = 00000000 30 45 02 21 00 bc df a2 79 3c 55 97 c7 64 d3 06 |0E.!....y DEBU 2056 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:13.448 UTC [gossip.discovery] learnExistingMembers -> DEBU 2057 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:13.449 UTC [gossip.comm] func1 -> DEBU 2059 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 2058 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 " -"2019-05-02 01:31:13.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 205a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 " -"2019-05-02 01:31:13.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 205b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:13.450 UTC [gossip.discovery] learnExistingMembers -> DEBU 205c Exiting" -"2019-05-02 01:31:13.450 UTC [gossip.discovery] handleAliveMessage -> DEBU 205d Exiting" -"2019-05-02 01:31:13.450 UTC [gossip.discovery] handleMsgFromComm -> DEBU 205e Exiting" -"2019-05-02 01:31:13.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 205f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.451 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2061 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:13.451 UTC [gossip.gossip] handleMessage -> DEBU 2060 Exiting" -"2019-05-02 01:31:13.452 UTC [gossip.gossip] handleMessage -> DEBU 2063 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.452 UTC [msp.identity] Verify -> DEBU 2062 Verify: digest = 00000000 2a d2 6f 73 5c ab 32 00 41 1b 66 19 ac c9 8f 19 |*.os\.2.A.f.....| -00000010 29 a6 06 4f b7 3f 4a f6 3a 85 f9 ed 1b e5 dc 75 |)..O.?J.:......u|" -"2019-05-02 01:31:13.452 UTC [msp.identity] Verify -> DEBU 2064 Verify: sig = 00000000 30 44 02 20 41 b3 28 68 52 5d fc da c2 cf 60 25 |0D. A.(hR]....`%| -00000010 6a 93 c3 63 6b f0 f8 16 f5 53 85 5e 79 3f 53 28 |j..ck....S.^y?S(| -00000020 90 ef 82 9a 02 20 6a e8 b9 cf 84 b5 1f 58 f8 15 |..... j......X..| -00000030 0d 10 12 c6 fb ea ca f0 b0 51 a0 db 5f 6e 94 47 |.........Q.._n.G| -00000040 14 38 d2 00 7f 3b |.8...;|" -"2019-05-02 01:31:13.452 UTC [msp.identity] Verify -> DEBU 2065 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:44.091 UTC [msp.identity] Verify -> DEBU 1ec0 Verify: sig = 00000000 30 45 02 21 00 bc ec e2 79 4f 4e 7b 37 ec 9d 70 |0E.!....yON{7..p| +00000010 dd 72 e3 05 82 b4 4e 6c a6 81 55 b2 34 a0 d6 eb |.r....Nl..U.4...| +00000020 0a 3f 11 b7 cd 02 20 4a 53 54 e6 3a 2f 77 86 ef |.?.... JST.:/w..| +00000030 8c f8 4e 6a b5 1f bf 5e 5c 33 a7 34 2f cf 8f ad |..Nj...^\3.4/...| +00000040 10 48 65 d0 b8 54 ab |.He..T.|" +"2019-05-02 09:27:44.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ec1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:44.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec2 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:44.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec3 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 " +"2019-05-02 09:27:44.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 " +"2019-05-02 09:27:44.093 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec5 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:44.093 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ec6 Exiting" +"2019-05-02 09:27:44.094 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ec7 Exiting" +"2019-05-02 09:27:44.094 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec8 Exiting" +"2019-05-02 09:27:44.096 UTC [msp] DeserializeIdentity -> DEBU 1ec9 Obtaining identity" +"2019-05-02 09:27:44.096 UTC [msp] DeserializeIdentity -> DEBU 1eca Obtaining identity" +"2019-05-02 09:27:44.096 UTC [msp] DeserializeIdentity -> DEBU 1ecb Obtaining identity" +"2019-05-02 09:27:44.097 UTC [gossip.comm] Send -> DEBU 1ecc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:44.097 UTC [msp] DeserializeIdentity -> DEBU 1ecd Obtaining identity" +"2019-05-02 09:27:44.097 UTC [gossip.comm] Send -> DEBU 1ece Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:44.098 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.098 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed1 Exiting" +"2019-05-02 09:27:44.097 UTC [gossip.comm] sendToEndpoint -> DEBU 1ecf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.099 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed2 Exiting" +"2019-05-02 09:27:44.101 UTC [gossip.comm] func1 -> DEBU 1ed3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.101 UTC [gossip.gossip] handleMessage -> DEBU 1ed4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.101 UTC [gossip.gossip] handleMessage -> DEBU 1ed5 Exiting" +"2019-05-02 09:27:44.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ed6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ed7 Exiting" +"2019-05-02 09:27:44.112 UTC [gossip.gossip] handleMessage -> DEBU 1ed8 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.112 UTC [gossip.gossip] handleMessage -> DEBU 1ed9 Exiting" +"2019-05-02 09:27:44.112 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1eda Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1edb Exiting" +"2019-05-02 09:27:44.165 UTC [gossip.gossip] handleMessage -> DEBU 1edc Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.166 UTC [gossip.gossip] handleMessage -> DEBU 1edd Exiting" +"2019-05-02 09:27:44.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ede Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1edf Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:44.166 UTC [msp] DeserializeIdentity -> DEBU 1ee0 Obtaining identity" +"2019-05-02 09:27:44.167 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ee1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:44.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ee2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ee3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.168 UTC [policies] Evaluate -> DEBU 1ee4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.168 UTC [policies] Evaluate -> DEBU 1ee5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.168 UTC [policies] Evaluate -> DEBU 1ee6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.169 UTC [cauthdsl] func1 -> DEBU 1ee7 0xc003dd5f60 gate 1556789264169434100 evaluation starts" +"2019-05-02 09:27:44.170 UTC [cauthdsl] func2 -> DEBU 1ee8 0xc003dd5f60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.170 UTC [cauthdsl] func2 -> DEBU 1ee9 0xc003dd5f60 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.171 UTC [cauthdsl] func2 -> DEBU 1eea 0xc003dd5f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.171 UTC [cauthdsl] func2 -> DEBU 1eeb 0xc003dd5f60 principal evaluation fails" +"2019-05-02 09:27:44.171 UTC [cauthdsl] func1 -> DEBU 1eec 0xc003dd5f60 gate 1556789264169434100 evaluation fails" +"2019-05-02 09:27:44.172 UTC [policies] Evaluate -> DEBU 1eed Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.172 UTC [policies] Evaluate -> DEBU 1eee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.172 UTC [policies] Evaluate -> DEBU 1eef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.173 UTC [cauthdsl] func1 -> DEBU 1ef0 0xc003e1a7a0 gate 1556789264173382400 evaluation starts" +"2019-05-02 09:27:44.175 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc003e1a7a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.175 UTC [cauthdsl] func2 -> DEBU 1ef2 0xc003e1a7a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.176 UTC [cauthdsl] func2 -> DEBU 1ef3 0xc003e1a7a0 principal matched by identity 0" +"2019-05-02 09:27:44.176 UTC [msp.identity] Verify -> DEBU 1ef4 Verify: digest = 00000000 50 65 5b 59 6d 12 85 e2 fc 2d 5d 26 c0 09 18 27 |Pe[Ym....-]&...'| +00000010 08 52 6c 4c 25 b4 d6 91 f0 7f f0 dc 74 dd 05 28 |.RlL%.......t..(|" +"2019-05-02 09:27:44.176 UTC [msp.identity] Verify -> DEBU 1ef5 Verify: sig = 00000000 30 44 02 20 79 6f fc 0c fa 91 38 79 90 03 31 74 |0D. yo....8y..1t| +00000010 a9 b0 f7 e8 85 23 c8 2a 5d 4d c2 25 80 da 30 77 |.....#.*]M.%..0w| +00000020 4d 35 46 ff 02 20 2c 58 d8 9f 04 e1 97 8b 6b 7c |M5F.. ,X......k|| +00000030 01 ec 0f 11 97 6c 00 f8 b0 39 1e f4 f1 81 81 2b |.....l...9.....+| +00000040 e0 e9 6f 89 20 49 |..o. I|" +"2019-05-02 09:27:44.177 UTC [cauthdsl] func2 -> DEBU 1ef6 0xc003e1a7a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.177 UTC [cauthdsl] func1 -> DEBU 1ef7 0xc003e1a7a0 gate 1556789264173382400 evaluation succeeds" +"2019-05-02 09:27:44.177 UTC [policies] Evaluate -> DEBU 1ef8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.178 UTC [policies] Evaluate -> DEBU 1ef9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.179 UTC [policies] Evaluate -> DEBU 1efa Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.179 UTC [policies] Evaluate -> DEBU 1efb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.182 UTC [gossip.comm] func1 -> DEBU 1efc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.183 UTC [gossip.gossip] handleMessage -> DEBU 1efd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 1efe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.185 UTC [gossip.discovery] learnExistingMembers -> DEBU 1eff Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:44.185 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f00 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 " +"2019-05-02 09:27:44.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f01 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 " +"2019-05-02 09:27:44.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f02 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:44.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f03 Exiting" +"2019-05-02 09:27:44.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f04 Exiting" +"2019-05-02 09:27:44.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f05 Exiting" +"2019-05-02 09:27:44.187 UTC [gossip.gossip] handleMessage -> DEBU 1f06 Exiting" +"2019-05-02 09:27:44.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f08 Exiting" +"2019-05-02 09:27:44.189 UTC [gossip.gossip] handleMessage -> DEBU 1f09 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.190 UTC [gossip.gossip] handleMessage -> DEBU 1f0a Exiting" +"2019-05-02 09:27:44.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f0b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f0c Exiting" +"2019-05-02 09:27:44.195 UTC [msp] DeserializeIdentity -> DEBU 1f0d Obtaining identity" +"2019-05-02 09:27:44.196 UTC [msp] DeserializeIdentity -> DEBU 1f0e Obtaining identity" +"2019-05-02 09:27:44.196 UTC [msp] DeserializeIdentity -> DEBU 1f0f Obtaining identity" +"2019-05-02 09:27:44.196 UTC [msp] DeserializeIdentity -> DEBU 1f10 Obtaining identity" +"2019-05-02 09:27:44.197 UTC [msp] DeserializeIdentity -> DEBU 1f11 Obtaining identity" +"2019-05-02 09:27:44.197 UTC [msp] DeserializeIdentity -> DEBU 1f12 Obtaining identity" +"2019-05-02 09:27:44.197 UTC [msp] DeserializeIdentity -> DEBU 1f13 Obtaining identity" +"2019-05-02 09:27:44.197 UTC [gossip.comm] Send -> DEBU 1f14 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:44.198 UTC [msp] DeserializeIdentity -> DEBU 1f15 Obtaining identity" +"2019-05-02 09:27:44.198 UTC [gossip.comm] Send -> DEBU 1f17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:44.199 UTC [gossip.comm] sendToEndpoint -> DEBU 1f18 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.198 UTC [gossip.comm] sendToEndpoint -> DEBU 1f16 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.199 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1a Exiting" +"2019-05-02 09:27:44.199 UTC [gossip.comm] sendToEndpoint -> DEBU 1f19 Exiting" +"2019-05-02 09:27:44.247 UTC [msp] DeserializeIdentity -> DEBU 1f1b Obtaining identity" +"2019-05-02 09:27:44.247 UTC [msp] DeserializeIdentity -> DEBU 1f1c Obtaining identity" +"2019-05-02 09:27:44.248 UTC [gossip.comm] Send -> DEBU 1f1d Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:27:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 1f22 Exiting" +"2019-05-02 09:27:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1f20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 1f23 Exiting" +"2019-05-02 09:27:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 1f21 Exiting" +"2019-05-02 09:27:44.251 UTC [gossip.comm] func1 -> DEBU 1f24 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.252 UTC [gossip.gossip] handleMessage -> DEBU 1f25 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.254 UTC [msp] DeserializeIdentity -> DEBU 1f26 Obtaining identity" +"2019-05-02 09:27:44.255 UTC [msp] DeserializeIdentity -> DEBU 1f27 Obtaining identity" +"2019-05-02 09:27:44.256 UTC [msp] DeserializeIdentity -> DEBU 1f28 Obtaining identity" +"2019-05-02 09:27:44.256 UTC [msp] DeserializeIdentity -> DEBU 1f2a Obtaining identity" +"2019-05-02 09:27:44.257 UTC [gossip.comm] Send -> DEBU 1f2b Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +"2019-05-02 09:27:44.257 UTC [msp] DeserializeIdentity -> DEBU 1f2c Obtaining identity" +"2019-05-02 09:27:44.257 UTC [msp] DeserializeIdentity -> DEBU 1f2d Obtaining identity" +"2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f30 Exiting" +"2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:44.256 UTC [msp] DeserializeIdentity -> DEBU 1f29 Obtaining identity" +"2019-05-02 09:27:44.260 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f32 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:44.261 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f33 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.261 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f34 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.261 UTC [policies] Evaluate -> DEBU 1f35 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.261 UTC [policies] Evaluate -> DEBU 1f36 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.262 UTC [policies] Evaluate -> DEBU 1f37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.262 UTC [cauthdsl] func1 -> DEBU 1f38 0xc003e55d90 gate 1556789264262544200 evaluation starts" +"2019-05-02 09:27:44.262 UTC [cauthdsl] func2 -> DEBU 1f39 0xc003e55d90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.263 UTC [cauthdsl] func2 -> DEBU 1f3a 0xc003e55d90 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.263 UTC [cauthdsl] func2 -> DEBU 1f3b 0xc003e55d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.263 UTC [cauthdsl] func2 -> DEBU 1f3c 0xc003e55d90 principal evaluation fails" +"2019-05-02 09:27:44.264 UTC [cauthdsl] func1 -> DEBU 1f3d 0xc003e55d90 gate 1556789264262544200 evaluation fails" +"2019-05-02 09:27:44.264 UTC [policies] Evaluate -> DEBU 1f3e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.265 UTC [policies] Evaluate -> DEBU 1f3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f40 Exiting" +"2019-05-02 09:27:44.265 UTC [policies] Evaluate -> DEBU 1f41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1f31 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:44.267 UTC [gossip.comm] sendToEndpoint -> DEBU 1f42 Exiting" +"2019-05-02 09:27:44.266 UTC [cauthdsl] func1 -> DEBU 1f43 0xc003e34eb0 gate 1556789264266730200 evaluation starts" +"2019-05-02 09:27:44.272 UTC [cauthdsl] func2 -> DEBU 1f44 0xc003e34eb0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.272 UTC [cauthdsl] func2 -> DEBU 1f45 0xc003e34eb0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.272 UTC [cauthdsl] func2 -> DEBU 1f46 0xc003e34eb0 principal matched by identity 0" +"2019-05-02 09:27:44.273 UTC [msp.identity] Verify -> DEBU 1f47 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +"2019-05-02 09:27:44.273 UTC [msp.identity] Verify -> DEBU 1f48 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +00000040 6f f6 d4 dd 46 29 |o...F)|" +"2019-05-02 09:27:44.279 UTC [gossip.comm] func1 -> DEBU 1f49 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:44.280 UTC [cauthdsl] func2 -> DEBU 1f4a 0xc003e34eb0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.281 UTC [cauthdsl] func1 -> DEBU 1f4b 0xc003e34eb0 gate 1556789264266730200 evaluation succeeds" +"2019-05-02 09:27:44.281 UTC [policies] Evaluate -> DEBU 1f4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.282 UTC [policies] Evaluate -> DEBU 1f4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.282 UTC [policies] Evaluate -> DEBU 1f4e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.282 UTC [policies] Evaluate -> DEBU 1f4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.283 UTC [msp.identity] Verify -> DEBU 1f50 Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O| +00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|" +"2019-05-02 09:27:44.284 UTC [msp.identity] Verify -> DEBU 1f51 Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.| +00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.| +00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.| +00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.| +00000040 0a cc ed c2 59 cc c5 |....Y..|" +"2019-05-02 09:27:44.285 UTC [msp.identity] Verify -> DEBU 1f52 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +"2019-05-02 09:27:44.285 UTC [msp.identity] Verify -> DEBU 1f53 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +"2019-05-02 09:27:44.286 UTC [msp] DeserializeIdentity -> DEBU 1f54 Obtaining identity" +"2019-05-02 09:27:44.286 UTC [msp] DeserializeIdentity -> DEBU 1f55 Obtaining identity" +"2019-05-02 09:27:44.287 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:44.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f57 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f58 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.289 UTC [policies] Evaluate -> DEBU 1f59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.289 UTC [policies] Evaluate -> DEBU 1f5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.290 UTC [policies] Evaluate -> DEBU 1f5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.290 UTC [cauthdsl] func1 -> DEBU 1f5c 0xc003e8b4c0 gate 1556789264290953900 evaluation starts" +"2019-05-02 09:27:44.291 UTC [cauthdsl] func2 -> DEBU 1f5d 0xc003e8b4c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.291 UTC [cauthdsl] func2 -> DEBU 1f5e 0xc003e8b4c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.292 UTC [cauthdsl] func2 -> DEBU 1f5f 0xc003e8b4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.293 UTC [cauthdsl] func2 -> DEBU 1f60 0xc003e8b4c0 principal evaluation fails" +"2019-05-02 09:27:44.293 UTC [cauthdsl] func1 -> DEBU 1f61 0xc003e8b4c0 gate 1556789264290953900 evaluation fails" +"2019-05-02 09:27:44.294 UTC [policies] Evaluate -> DEBU 1f62 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.294 UTC [policies] Evaluate -> DEBU 1f63 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.295 UTC [policies] Evaluate -> DEBU 1f64 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.295 UTC [cauthdsl] func1 -> DEBU 1f65 0xc003e8bd00 gate 1556789264295698200 evaluation starts" +"2019-05-02 09:27:44.296 UTC [cauthdsl] func2 -> DEBU 1f66 0xc003e8bd00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.296 UTC [cauthdsl] func2 -> DEBU 1f67 0xc003e8bd00 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.297 UTC [cauthdsl] func2 -> DEBU 1f68 0xc003e8bd00 principal matched by identity 0" +"2019-05-02 09:27:44.297 UTC [msp.identity] Verify -> DEBU 1f69 Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +"2019-05-02 09:27:44.298 UTC [msp.identity] Verify -> DEBU 1f6a Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +00000040 a3 34 89 3e 9c 04 |.4.>..|" +"2019-05-02 09:27:44.298 UTC [cauthdsl] func2 -> DEBU 1f6b 0xc003e8bd00 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.299 UTC [cauthdsl] func1 -> DEBU 1f6c 0xc003e8bd00 gate 1556789264295698200 evaluation succeeds" +"2019-05-02 09:27:44.299 UTC [policies] Evaluate -> DEBU 1f6d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.299 UTC [policies] Evaluate -> DEBU 1f6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.300 UTC [policies] Evaluate -> DEBU 1f6f Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.300 UTC [policies] Evaluate -> DEBU 1f70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.300 UTC [msp] DeserializeIdentity -> DEBU 1f71 Obtaining identity" +"2019-05-02 09:27:44.301 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f72 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.301 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f73 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.301 UTC [policies] Evaluate -> DEBU 1f74 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.305 UTC [policies] Evaluate -> DEBU 1f75 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.305 UTC [policies] Evaluate -> DEBU 1f76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.306 UTC [cauthdsl] func1 -> DEBU 1f77 0xc003e9cde0 gate 1556789264306204300 evaluation starts" +"2019-05-02 09:27:44.306 UTC [cauthdsl] func2 -> DEBU 1f78 0xc003e9cde0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.307 UTC [cauthdsl] func2 -> DEBU 1f79 0xc003e9cde0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.307 UTC [cauthdsl] func2 -> DEBU 1f7a 0xc003e9cde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.307 UTC [cauthdsl] func2 -> DEBU 1f7b 0xc003e9cde0 principal evaluation fails" +"2019-05-02 09:27:44.308 UTC [cauthdsl] func1 -> DEBU 1f7c 0xc003e9cde0 gate 1556789264306204300 evaluation fails" +"2019-05-02 09:27:44.308 UTC [policies] Evaluate -> DEBU 1f7d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.308 UTC [policies] Evaluate -> DEBU 1f7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.308 UTC [policies] Evaluate -> DEBU 1f7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.308 UTC [cauthdsl] func1 -> DEBU 1f80 0xc003e9d620 gate 1556789264308941300 evaluation starts" +"2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f81 0xc003e9d620 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f82 0xc003e9d620 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f83 0xc003e9d620 principal matched by identity 0" +"2019-05-02 09:27:44.309 UTC [msp.identity] Verify -> DEBU 1f84 Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +"2019-05-02 09:27:44.309 UTC [msp.identity] Verify -> DEBU 1f85 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +00000040 a3 34 89 3e 9c 04 |.4.>..|" +"2019-05-02 09:27:44.309 UTC [cauthdsl] func2 -> DEBU 1f86 0xc003e9d620 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.309 UTC [cauthdsl] func1 -> DEBU 1f87 0xc003e9d620 gate 1556789264308941300 evaluation succeeds" +"2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f8a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.309 UTC [policies] Evaluate -> DEBU 1f8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.309 UTC [gossip.gossip] handleMessage -> DEBU 1f8c Exiting" +"2019-05-02 09:27:44.309 UTC [gossip.gossip] handleMessage -> DEBU 1f8d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.310 UTC [msp] DeserializeIdentity -> DEBU 1f8e Obtaining identity" +"2019-05-02 09:27:44.310 UTC [msp] DeserializeIdentity -> DEBU 1f8f Obtaining identity" +"2019-05-02 09:27:44.312 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f90 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:44.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f91 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f92 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.313 UTC [policies] Evaluate -> DEBU 1f93 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.313 UTC [policies] Evaluate -> DEBU 1f94 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.314 UTC [policies] Evaluate -> DEBU 1f95 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.315 UTC [cauthdsl] func1 -> DEBU 1f96 0xc003eb1030 gate 1556789264315836700 evaluation starts" +"2019-05-02 09:27:44.316 UTC [cauthdsl] func2 -> DEBU 1f97 0xc003eb1030 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.317 UTC [cauthdsl] func2 -> DEBU 1f98 0xc003eb1030 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.318 UTC [cauthdsl] func2 -> DEBU 1f99 0xc003eb1030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.319 UTC [cauthdsl] func2 -> DEBU 1f9a 0xc003eb1030 principal evaluation fails" +"2019-05-02 09:27:44.320 UTC [cauthdsl] func1 -> DEBU 1f9b 0xc003eb1030 gate 1556789264315836700 evaluation fails" +"2019-05-02 09:27:44.321 UTC [policies] Evaluate -> DEBU 1f9c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.321 UTC [policies] Evaluate -> DEBU 1f9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.323 UTC [policies] Evaluate -> DEBU 1f9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.324 UTC [cauthdsl] func1 -> DEBU 1f9f 0xc003eb1870 gate 1556789264324374400 evaluation starts" +"2019-05-02 09:27:44.325 UTC [cauthdsl] func2 -> DEBU 1fa0 0xc003eb1870 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.326 UTC [cauthdsl] func2 -> DEBU 1fa1 0xc003eb1870 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.327 UTC [cauthdsl] func2 -> DEBU 1fa2 0xc003eb1870 principal matched by identity 0" +"2019-05-02 09:27:44.327 UTC [msp.identity] Verify -> DEBU 1fa3 Verify: digest = 00000000 90 f7 50 f7 33 84 e3 01 f5 29 81 7a ed 65 43 53 |..P.3....).z.eCS| +00000010 91 90 54 f5 01 44 4c ea 52 1e a9 9f 49 f8 79 9b |..T..DL.R...I.y.|" +"2019-05-02 09:27:44.328 UTC [msp.identity] Verify -> DEBU 1fa4 Verify: sig = 00000000 30 44 02 20 72 19 65 bb 20 e4 fb d9 27 10 f6 25 |0D. r.e. ...'..%| +00000010 ff c0 63 2a 28 9d 0e 0e fc cc ad bb 09 4a ad 72 |..c*(........J.r| +00000020 75 02 4a 92 02 20 40 12 7a 14 65 22 5c f3 84 b5 |u.J.. @.z.e"\...| +00000030 37 06 e7 10 67 ee 82 41 38 5c 8d 9a ac 66 5c 1c |7...g..A8\...f\.| +00000040 6f f6 d4 dd 46 29 |o...F)|" +"2019-05-02 09:27:44.331 UTC [cauthdsl] func2 -> DEBU 1fa5 0xc003eb1870 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.332 UTC [cauthdsl] func1 -> DEBU 1fa6 0xc003eb1870 gate 1556789264324374400 evaluation succeeds" +"2019-05-02 09:27:44.332 UTC [policies] Evaluate -> DEBU 1fa7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.333 UTC [policies] Evaluate -> DEBU 1fa8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.333 UTC [policies] Evaluate -> DEBU 1fa9 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.334 UTC [policies] Evaluate -> DEBU 1faa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.335 UTC [msp.identity] Verify -> DEBU 1fab Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O| +00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|" +"2019-05-02 09:27:44.336 UTC [msp.identity] Verify -> DEBU 1fac Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.| +00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.| +00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.| +00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.| +00000040 0a cc ed c2 59 cc c5 |....Y..|" +"2019-05-02 09:27:44.337 UTC [msp] DeserializeIdentity -> DEBU 1fad Obtaining identity" +"2019-05-02 09:27:44.338 UTC [msp] DeserializeIdentity -> DEBU 1fae Obtaining identity" +"2019-05-02 09:27:44.339 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1faf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:44.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.339 UTC [policies] Evaluate -> DEBU 1fb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.340 UTC [policies] Evaluate -> DEBU 1fb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.340 UTC [policies] Evaluate -> DEBU 1fb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.340 UTC [cauthdsl] func1 -> DEBU 1fb5 0xc003ec9760 gate 1556789264340455500 evaluation starts" +"2019-05-02 09:27:44.340 UTC [cauthdsl] func2 -> DEBU 1fb6 0xc003ec9760 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.341 UTC [cauthdsl] func2 -> DEBU 1fb7 0xc003ec9760 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.342 UTC [cauthdsl] func2 -> DEBU 1fb8 0xc003ec9760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.342 UTC [cauthdsl] func2 -> DEBU 1fb9 0xc003ec9760 principal evaluation fails" +"2019-05-02 09:27:44.343 UTC [cauthdsl] func1 -> DEBU 1fba 0xc003ec9760 gate 1556789264340455500 evaluation fails" +"2019-05-02 09:27:44.343 UTC [policies] Evaluate -> DEBU 1fbb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.344 UTC [policies] Evaluate -> DEBU 1fbc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.345 UTC [policies] Evaluate -> DEBU 1fbd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.345 UTC [cauthdsl] func1 -> DEBU 1fbe 0xc003ec9fa0 gate 1556789264345678000 evaluation starts" +"2019-05-02 09:27:44.345 UTC [cauthdsl] func2 -> DEBU 1fbf 0xc003ec9fa0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.345 UTC [cauthdsl] func2 -> DEBU 1fc0 0xc003ec9fa0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.345 UTC [cauthdsl] func2 -> DEBU 1fc1 0xc003ec9fa0 principal matched by identity 0" +"2019-05-02 09:27:44.345 UTC [msp.identity] Verify -> DEBU 1fc2 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +"2019-05-02 09:27:44.346 UTC [msp.identity] Verify -> DEBU 1fc3 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +00000040 6c 9b e9 95 fc 61 |l....a|" +"2019-05-02 09:27:44.346 UTC [cauthdsl] func2 -> DEBU 1fc4 0xc003ec9fa0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.346 UTC [cauthdsl] func1 -> DEBU 1fc5 0xc003ec9fa0 gate 1556789264345678000 evaluation succeeds" +"2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc8 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.346 UTC [policies] Evaluate -> DEBU 1fc9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.346 UTC [msp.identity] Verify -> DEBU 1fca Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +"2019-05-02 09:27:44.347 UTC [msp.identity] Verify -> DEBU 1fcb Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +00000040 fe 64 5a aa 06 63 |.dZ..c|" +"2019-05-02 09:27:44.347 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fcc Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.347 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fcd Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.348 UTC [cauthdsl] func1 -> DEBU 1fd1 0xc003edf6a0 gate 1556789264348256100 evaluation starts" +"2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd2 0xc003edf6a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd3 0xc003edf6a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd4 0xc003edf6a0 principal matched by identity 0" +"2019-05-02 09:27:44.348 UTC [msp.identity] Verify -> DEBU 1fd5 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +"2019-05-02 09:27:44.348 UTC [msp.identity] Verify -> DEBU 1fd6 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +00000040 fe 64 5a aa 06 63 |.dZ..c|" +"2019-05-02 09:27:44.348 UTC [cauthdsl] func2 -> DEBU 1fd7 0xc003edf6a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.348 UTC [cauthdsl] func1 -> DEBU 1fd8 0xc003edf6a0 gate 1556789264348256100 evaluation succeeds" +"2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fd9 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.348 UTC [policies] Evaluate -> DEBU 1fda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.349 UTC [policies] Evaluate -> DEBU 1fdb Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.349 UTC [policies] Evaluate -> DEBU 1fdc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.349 UTC [gossip.gossip] handleMessage -> DEBU 1fdd Exiting" +"2019-05-02 09:27:44.349 UTC [gossip.gossip] handleMessage -> DEBU 1fde Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.349 UTC [msp] DeserializeIdentity -> DEBU 1fdf Obtaining identity" +"2019-05-02 09:27:44.350 UTC [msp.identity] Verify -> DEBU 1fe0 Verify: digest = 00000000 6d 4a 6e de ac 15 86 63 ca a0 48 a1 41 23 f0 65 |mJn....c..H.A#.e| +00000010 6c bc 2f 88 7c 5b 21 c0 02 cc 58 88 b5 d8 5f 43 |l./.|[!...X..._C|" +"2019-05-02 09:27:44.351 UTC [msp.identity] Verify -> DEBU 1fe1 Verify: sig = 00000000 30 45 02 21 00 d5 38 31 d5 64 39 f5 9a 7e b7 3e |0E.!..81.d9..~.>| +00000010 4e b0 d3 c1 4c 96 90 64 33 86 2e c0 68 e0 14 5c |N...L..d3...h..\| +00000020 45 60 9c 1e bb 02 20 38 ff 75 71 cd 19 43 24 3c |E`.... 8.uq..C$<| +00000030 52 10 a2 11 76 16 d4 14 67 f2 7b f1 8c d5 7c 2e |R...v...g.{...|.| +00000040 03 7b 83 e6 47 b3 c8 |.{..G..|" +"2019-05-02 09:27:44.352 UTC [msp] DeserializeIdentity -> DEBU 1fe2 Obtaining identity" +"2019-05-02 09:27:44.352 UTC [msp] DeserializeIdentity -> DEBU 1fe3 Obtaining identity" +"2019-05-02 09:27:44.353 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fe4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:44.353 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fe5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.354 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fe6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.354 UTC [policies] Evaluate -> DEBU 1fe7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.355 UTC [policies] Evaluate -> DEBU 1fe8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.355 UTC [policies] Evaluate -> DEBU 1fe9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.355 UTC [cauthdsl] func1 -> DEBU 1fea 0xc003eef8d0 gate 1556789264355975300 evaluation starts" +"2019-05-02 09:27:44.356 UTC [cauthdsl] func2 -> DEBU 1feb 0xc003eef8d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.356 UTC [cauthdsl] func2 -> DEBU 1fec 0xc003eef8d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.357 UTC [cauthdsl] func2 -> DEBU 1fed 0xc003eef8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.357 UTC [cauthdsl] func2 -> DEBU 1fee 0xc003eef8d0 principal evaluation fails" +"2019-05-02 09:27:44.358 UTC [cauthdsl] func1 -> DEBU 1fef 0xc003eef8d0 gate 1556789264355975300 evaluation fails" +"2019-05-02 09:27:44.358 UTC [policies] Evaluate -> DEBU 1ff0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.359 UTC [policies] Evaluate -> DEBU 1ff1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.363 UTC [policies] Evaluate -> DEBU 1ff2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.365 UTC [cauthdsl] func1 -> DEBU 1ff3 0xc003f00110 gate 1556789264365401800 evaluation starts" +"2019-05-02 09:27:44.366 UTC [cauthdsl] func2 -> DEBU 1ff4 0xc003f00110 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.367 UTC [cauthdsl] func2 -> DEBU 1ff5 0xc003f00110 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.369 UTC [cauthdsl] func2 -> DEBU 1ff6 0xc003f00110 principal matched by identity 0" +"2019-05-02 09:27:44.370 UTC [msp.identity] Verify -> DEBU 1ff7 Verify: digest = 00000000 57 f8 9d 3a b7 57 2d 48 f4 20 13 5d 26 9d 4f 1c |W..:.W-H. .]&.O.| +00000010 a7 86 65 b0 d6 67 76 6a 1e 40 24 b0 32 f6 37 30 |..e..gvj.@$.2.70|" +"2019-05-02 09:27:44.370 UTC [msp.identity] Verify -> DEBU 1ff8 Verify: sig = 00000000 30 44 02 20 05 7a 7f 2a b3 e8 55 33 5d 51 42 58 |0D. .z.*..U3]QBX| +00000010 8d 5e e0 18 e1 8b ac df d9 3b dc 42 f4 dc c3 73 |.^.......;.B...s| +00000020 9b 5d c1 b7 02 20 0b 6d 14 9a 72 fc 82 01 72 f1 |.]... .m..r...r.| +00000030 59 ff c0 9c e0 4a c9 2f d9 3e cf 3a be 05 05 00 |Y....J./.>.:....| +00000040 6c 9b e9 95 fc 61 |l....a|" +"2019-05-02 09:27:44.371 UTC [cauthdsl] func2 -> DEBU 1ff9 0xc003f00110 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.372 UTC [cauthdsl] func1 -> DEBU 1ffa 0xc003f00110 gate 1556789264365401800 evaluation succeeds" +"2019-05-02 09:27:44.373 UTC [policies] Evaluate -> DEBU 1ffb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.373 UTC [policies] Evaluate -> DEBU 1ffc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.373 UTC [policies] Evaluate -> DEBU 1ffd Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.374 UTC [policies] Evaluate -> DEBU 1ffe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.375 UTC [msp.identity] Verify -> DEBU 1fff Verify: digest = 00000000 18 c8 65 9d 2b db c2 44 82 92 33 fa 82 f1 2f 4f |..e.+..D..3.../O| +00000010 e7 d9 80 e6 b9 5c 6e 3f 3a 1e 6b e4 96 f5 d8 ff |.....\n?:.k.....|" +"2019-05-02 09:27:44.375 UTC [msp.identity] Verify -> DEBU 2000 Verify: sig = 00000000 30 45 02 21 00 ba b0 b3 1b f1 52 f2 8d 07 4c e2 |0E.!......R...L.| +00000010 04 59 c8 bb 30 15 87 3d 1c 32 ce 54 85 eb 53 ed |.Y..0..=.2.T..S.| +00000020 17 7b f5 bc 0e 02 20 42 d6 69 99 19 f7 bb 6d d5 |.{.... B.i....m.| +00000030 31 7e fc 06 a4 12 0e 99 72 c0 99 01 21 e4 77 03 |1~......r...!.w.| +00000040 0a cc ed c2 59 cc c5 |....Y..|" +"2019-05-02 09:27:44.376 UTC [msp] DeserializeIdentity -> DEBU 2001 Obtaining identity" +"2019-05-02 09:27:44.377 UTC [msp] DeserializeIdentity -> DEBU 2002 Obtaining identity" +"2019-05-02 09:27:44.377 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2003 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:44.378 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2004 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.378 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2005 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.378 UTC [policies] Evaluate -> DEBU 2006 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.379 UTC [policies] Evaluate -> DEBU 2007 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.379 UTC [policies] Evaluate -> DEBU 2008 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.379 UTC [cauthdsl] func1 -> DEBU 2009 0xc003f16000 gate 1556789264379774000 evaluation starts" +"2019-05-02 09:27:44.380 UTC [cauthdsl] func2 -> DEBU 200a 0xc003f16000 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.380 UTC [cauthdsl] func2 -> DEBU 200b 0xc003f16000 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.380 UTC [cauthdsl] func2 -> DEBU 200c 0xc003f16000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.381 UTC [cauthdsl] func2 -> DEBU 200d 0xc003f16000 principal evaluation fails" +"2019-05-02 09:27:44.381 UTC [cauthdsl] func1 -> DEBU 200e 0xc003f16000 gate 1556789264379774000 evaluation fails" +"2019-05-02 09:27:44.381 UTC [policies] Evaluate -> DEBU 200f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.382 UTC [policies] Evaluate -> DEBU 2010 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.382 UTC [policies] Evaluate -> DEBU 2011 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.383 UTC [cauthdsl] func1 -> DEBU 2012 0xc003f16840 gate 1556789264383020200 evaluation starts" +"2019-05-02 09:27:44.383 UTC [cauthdsl] func2 -> DEBU 2013 0xc003f16840 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.384 UTC [cauthdsl] func2 -> DEBU 2014 0xc003f16840 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.384 UTC [cauthdsl] func2 -> DEBU 2015 0xc003f16840 principal matched by identity 0" +"2019-05-02 09:27:44.384 UTC [msp.identity] Verify -> DEBU 2016 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.| +00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|" +"2019-05-02 09:27:44.385 UTC [msp.identity] Verify -> DEBU 2017 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..| +00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.| +00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{| +00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.| +00000040 a3 8e ff fc ae d2 |......|" +"2019-05-02 09:27:44.386 UTC [cauthdsl] func2 -> DEBU 2018 0xc003f16840 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.386 UTC [cauthdsl] func1 -> DEBU 2019 0xc003f16840 gate 1556789264383020200 evaluation succeeds" +"2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201c Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.387 UTC [policies] Evaluate -> DEBU 201d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.387 UTC [msp] DeserializeIdentity -> DEBU 201e Obtaining identity" +"2019-05-02 09:27:44.388 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.388 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2020 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 2021 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 2022 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 2023 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 2024 0xc003f17920 gate 1556789264388240100 evaluation starts" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2025 0xc003f17920 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2026 0xc003f17920 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2027 0xc003f17920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2028 0xc003f17920 principal evaluation fails" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 2029 0xc003f17920 gate 1556789264388240100 evaluation fails" +"2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 202a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 202b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.388 UTC [policies] Evaluate -> DEBU 202c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 202d 0xc003f28160 gate 1556789264388604600 evaluation starts" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 202e 0xc003f28160 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 202f 0xc003f28160 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2030 0xc003f28160 principal matched by identity 0" +"2019-05-02 09:27:44.388 UTC [msp.identity] Verify -> DEBU 2031 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.| +00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|" +"2019-05-02 09:27:44.388 UTC [msp.identity] Verify -> DEBU 2032 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..| +00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.| +00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{| +00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.| +00000040 a3 8e ff fc ae d2 |......|" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func2 -> DEBU 2033 0xc003f28160 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.388 UTC [cauthdsl] func1 -> DEBU 2034 0xc003f28160 gate 1556789264388604600 evaluation succeeds" +"2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2035 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2036 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2037 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.389 UTC [policies] Evaluate -> DEBU 2038 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.389 UTC [gossip.gossip] handleMessage -> DEBU 2039 Exiting" +"2019-05-02 09:27:44.389 UTC [gossip.gossip] handleMessage -> DEBU 203a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789261488019300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:44.389 UTC [msp.identity] Verify -> DEBU 203b Verify: digest = 00000000 68 a0 91 32 58 25 d2 e9 b4 f1 f6 51 2d 2f d9 d1 |h..2X%.....Q-/..| +00000010 6b a5 4d d8 c9 b8 ff bb 59 82 57 08 9b 8e 94 9a |k.M.....Y.W.....|" +"2019-05-02 09:27:44.389 UTC [msp.identity] Verify -> DEBU 203c Verify: sig = 00000000 30 45 02 21 00 ed 3d 05 5c 5c 47 80 b3 b3 19 40 |0E.!..=.\\G....@| +00000010 d6 c3 20 7b 98 55 5b c3 19 15 67 b4 27 d4 3e d7 |.. {.U[...g.'.>.| +00000020 16 bd 0f f5 d8 02 20 61 ec e8 6c 5f 0d 36 b4 ba |...... a..l_.6..| +00000030 ff a7 9d 63 23 55 67 1f 9e e9 41 fb 03 6e 7b d4 |...c#Ug...A..n{.| +00000040 7e b3 79 82 f0 9e c8 |~.y....|" +"2019-05-02 09:27:44.389 UTC [msp] DeserializeIdentity -> DEBU 203d Obtaining identity" +"2019-05-02 09:27:44.389 UTC [gossip.gossip] handleMessage -> DEBU 203e Exiting" +"2019-05-02 09:27:44.508 UTC [gossip.gossip] handleMessage -> DEBU 203f Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.510 UTC [msp] DeserializeIdentity -> DEBU 2040 Obtaining identity" +"2019-05-02 09:27:44.512 UTC [msp] DeserializeIdentity -> DEBU 2041 Obtaining identity" +"2019-05-02 09:27:44.514 UTC [gossip.gossip] handleMessage -> DEBU 2042 Exiting" +"2019-05-02 09:27:44.533 UTC [gossip.gossip] handleMessage -> DEBU 2043 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.534 UTC [msp.identity] Verify -> DEBU 2044 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +"2019-05-02 09:27:44.534 UTC [msp.identity] Verify -> DEBU 2045 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +00000040 fe 64 5a aa 06 63 |.dZ..c|" +"2019-05-02 09:27:44.535 UTC [gossip.gossip] handleMessage -> DEBU 2046 Exiting" +"2019-05-02 09:27:44.538 UTC [gossip.comm] func1 -> DEBU 2047 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.539 UTC [gossip.gossip] handleMessage -> DEBU 2048 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.542 UTC [msp.identity] Verify -> DEBU 2049 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +"2019-05-02 09:27:44.543 UTC [msp.identity] Verify -> DEBU 204a Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +00000040 fe 64 5a aa 06 63 |.dZ..c|" +"2019-05-02 09:27:44.545 UTC [msp] DeserializeIdentity -> DEBU 204b Obtaining identity" +"2019-05-02 09:27:44.546 UTC [gossip.gossip] handleMessage -> DEBU 204c Exiting" +"2019-05-02 09:27:44.547 UTC [gossip.gossip] handleMessage -> DEBU 204d Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789261463864700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.550 UTC [msp.identity] Verify -> DEBU 204e Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +"2019-05-02 09:27:44.554 UTC [msp.identity] Verify -> DEBU 204f Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +00000040 fe 64 5a aa 06 63 |.dZ..c|" +"2019-05-02 09:27:44.555 UTC [msp] DeserializeIdentity -> DEBU 2050 Obtaining identity" +"2019-05-02 09:27:44.557 UTC [gossip.gossip] handleMessage -> DEBU 2051 Exiting" +"2019-05-02 09:27:44.558 UTC [gossip.gossip] handleMessage -> DEBU 2052 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.558 UTC [gossip.pull] HandleMessage -> DEBU 2053 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.559 UTC [gossip.pull] SendDigest -> DEBU 2054 Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:44.559 UTC [gossip.gossip] handleMessage -> DEBU 2055 Exiting" +"2019-05-02 09:27:44.597 UTC [endorser] ProcessProposal -> DEBU 2056 Entering: request from 172.18.0.8:57342" +"2019-05-02 09:27:44.598 UTC [protoutils] ValidateProposalMessage -> DEBU 2057 ValidateProposalMessage starts for signed proposal 0xc003f0f4f0" +"2019-05-02 09:27:44.598 UTC [protoutils] validateChannelHeader -> DEBU 2058 validateChannelHeader info: header type 3" +"2019-05-02 09:27:44.599 UTC [protoutils] checkSignatureFromCreator -> DEBU 2059 begin" +"2019-05-02 09:27:44.600 UTC [msp] GetManagerForChain -> DEBU 205a Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:44.600 UTC [protoutils] checkSignatureFromCreator -> DEBU 205b creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:44.600 UTC [protoutils] checkSignatureFromCreator -> DEBU 205c creator is valid" +"2019-05-02 09:27:44.601 UTC [msp.identity] Verify -> DEBU 205d Verify: digest = 00000000 05 b9 fc ac c3 ee 21 f1 43 c8 4a 05 9f 00 46 35 |......!.C.J...F5| +00000010 6d b7 f7 db a4 21 11 69 43 30 ff 70 33 d9 91 e6 |m....!.iC0.p3...|" +"2019-05-02 09:27:44.601 UTC [msp.identity] Verify -> DEBU 205e Verify: sig = 00000000 30 45 02 21 00 8a 9d 4c ce e6 14 46 c2 15 1c da |0E.!...L...F....| +00000010 c3 f9 13 21 69 41 d8 e6 cf 1a 15 50 e0 79 f9 0d |...!iA.....P.y..| +00000020 9a aa 91 d5 b6 02 20 7f ba db a0 5b bd 58 9a d4 |...... ....[.X..| +00000030 85 33 96 73 93 84 07 0d f0 eb 6a 20 d5 23 6d e3 |.3.s......j .#m.| +00000040 d0 d4 38 fb 65 8a e4 |..8.e..|" +"2019-05-02 09:27:44.602 UTC [protoutils] checkSignatureFromCreator -> DEBU 205f exits successfully" +"2019-05-02 09:27:44.603 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2060 validateChaincodeProposalMessage starts for proposal 0xc003169880, header 0xc003f0f900" +"2019-05-02 09:27:44.603 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2061 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-05-02 09:27:44.604 UTC [endorser] preProcess -> DEBU 2062 [businesschannel][6275b52f] processing txid: 6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194" +"2019-05-02 09:27:44.604 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2063 retrieveTransactionByID() - txId = [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]" +"2019-05-02 09:27:44.605 UTC [aclmgmt] CheckACL -> DEBU 2064 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-05-02 09:27:44.605 UTC [aclmgmt] CheckACL -> DEBU 2065 acl check(/Channel/Application/Writers)" +"2019-05-02 09:27:44.606 UTC [policies] Evaluate -> DEBU 2066 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:44.606 UTC [policies] Evaluate -> DEBU 2067 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.606 UTC [policies] Evaluate -> DEBU 2068 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:44.607 UTC [cauthdsl] func1 -> DEBU 2069 0xc003faa430 gate 1556789264607014800 evaluation starts" +"2019-05-02 09:27:44.607 UTC [cauthdsl] func2 -> DEBU 206a 0xc003faa430 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.607 UTC [cauthdsl] func2 -> DEBU 206b 0xc003faa430 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.607 UTC [cauthdsl] func2 -> DEBU 206c 0xc003faa430 principal matched by identity 0" +"2019-05-02 09:27:44.607 UTC [msp.identity] Verify -> DEBU 206d Verify: digest = 00000000 05 b9 fc ac c3 ee 21 f1 43 c8 4a 05 9f 00 46 35 |......!.C.J...F5| +00000010 6d b7 f7 db a4 21 11 69 43 30 ff 70 33 d9 91 e6 |m....!.iC0.p3...|" +"2019-05-02 09:27:44.607 UTC [msp.identity] Verify -> DEBU 206e Verify: sig = 00000000 30 45 02 21 00 8a 9d 4c ce e6 14 46 c2 15 1c da |0E.!...L...F....| +00000010 c3 f9 13 21 69 41 d8 e6 cf 1a 15 50 e0 79 f9 0d |...!iA.....P.y..| +00000020 9a aa 91 d5 b6 02 20 7f ba db a0 5b bd 58 9a d4 |...... ....[.X..| +00000030 85 33 96 73 93 84 07 0d f0 eb 6a 20 d5 23 6d e3 |.3.s......j .#m.| +00000040 d0 d4 38 fb 65 8a e4 |..8.e..|" +"2019-05-02 09:27:44.608 UTC [cauthdsl] func2 -> DEBU 206f 0xc003faa430 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.608 UTC [cauthdsl] func1 -> DEBU 2070 0xc003faa430 gate 1556789264607014800 evaluation succeeds" +"2019-05-02 09:27:44.608 UTC [policies] Evaluate -> DEBU 2071 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:44.608 UTC [policies] Evaluate -> DEBU 2072 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:44.609 UTC [policies] Evaluate -> DEBU 2073 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:44.610 UTC [policies] Evaluate -> DEBU 2074 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:44.611 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2075 constructing new tx simulator" +"2019-05-02 09:27:44.611 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2076 constructing new tx simulator txid = [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]" +"2019-05-02 09:27:44.611 UTC [endorser] SimulateProposal -> DEBU 2077 [businesschannel][6275b52f] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:44.611 UTC [stateleveldb] GetState -> DEBU 2078 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:44.611 UTC [endorser] callChaincode -> INFO 2079 [businesschannel][6275b52f] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:44.611 UTC [stateleveldb] GetState -> DEBU 207a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:44.611 UTC [stateleveldb] GetState -> DEBU 207b GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:44.611 UTC [chaincode] Execute -> DEBU 207c Entry" +"2019-05-02 09:27:44.614 UTC [chaincode] handleMessage -> DEBU 207d [6275b52f] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:44.614 UTC [chaincode] HandleTransaction -> DEBU 207e [6275b52f] handling GET_STATE from chaincode" +"2019-05-02 09:27:44.615 UTC [chaincode] HandleGetState -> DEBU 207f [6275b52f] getting state for chaincode exp02, key a, channel businesschannel" +"2019-05-02 09:27:44.616 UTC [stateleveldb] GetState -> DEBU 2080 GetState(). ns=exp02, key=a" +"2019-05-02 09:27:44.616 UTC [chaincode] HandleTransaction -> DEBU 2081 [6275b52f] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:44.618 UTC [chaincode] handleMessage -> DEBU 2082 [6275b52f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:44.618 UTC [chaincode] Notify -> DEBU 2083 [6275b52f] notifying Txid:6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194, channelID:businesschannel" +"2019-05-02 09:27:44.618 UTC [chaincode] Execute -> DEBU 2084 Exit" +"2019-05-02 09:27:44.619 UTC [endorser] callChaincode -> INFO 2085 [businesschannel][6275b52f] Exit chaincode: name:"exp02" (8ms)" +"2019-05-02 09:27:44.619 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2086 Simulation completed, getting simulation results" +"2019-05-02 09:27:44.619 UTC [lockbasedtxmgr] Done -> DEBU 2087 Done with transaction simulation / query execution [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]" +"2019-05-02 09:27:44.619 UTC [endorser] SimulateProposal -> DEBU 2088 [businesschannel][6275b52f] Exit" +"2019-05-02 09:27:44.619 UTC [endorser] endorseProposal -> DEBU 2089 [businesschannel][6275b52f] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:44.619 UTC [endorser] endorseProposal -> DEBU 208a [businesschannel][6275b52f] escc for chaincode name:"exp02" is escc" +"2019-05-02 09:27:44.619 UTC [endorser] EndorseWithPlugin -> DEBU 208b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194, chaincode: exp02}" +"2019-05-02 09:27:44.619 UTC [msp.identity] Sign -> DEBU 208c Sign: plaintext: 0A2016C9E5582572B616B57E921F3163...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:44.619 UTC [msp.identity] Sign -> DEBU 208d Sign: digest: B643F95F5B181D7978F3F4783F2442A823828DD53166EBEC9053658240DCBA96 " +"2019-05-02 09:27:44.620 UTC [endorser] EndorseWithPlugin -> DEBU 208e Exiting {plugin: escc, channel: businesschannel, tx: 6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194, chaincode: exp02}" +"2019-05-02 09:27:44.620 UTC [endorser] endorseProposal -> DEBU 208f [businesschannel][6275b52f] Exit" +"2019-05-02 09:27:44.620 UTC [lockbasedtxmgr] Done -> DEBU 2090 Done with transaction simulation / query execution [6275b52fdc2eae9fbf50229c7678b385c0ad3e3927f2dd4204966a153e6bd194]" +"2019-05-02 09:27:44.620 UTC [endorser] func1 -> DEBU 2091 Exit: request from 172.18.0.8:57342" +"2019-05-02 09:27:44.620 UTC [comm.grpc.server] 1 -> INFO 2092 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57342 grpc.code=OK grpc.call_duration=23.2448ms +"2019-05-02 09:27:44.626 UTC [grpc] infof -> DEBU 2093 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:44.628 UTC [grpc] infof -> DEBU 2094 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:44.752 UTC [gossip.gossip] handleMessage -> DEBU 2095 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.752 UTC [msp] DeserializeIdentity -> DEBU 2096 Obtaining identity" +"2019-05-02 09:27:44.752 UTC [msp] DeserializeIdentity -> DEBU 2097 Obtaining identity" +"2019-05-02 09:27:44.752 UTC [msp] DeserializeIdentity -> DEBU 2098 Obtaining identity" +"2019-05-02 09:27:44.752 UTC [gossip.gossip] handleMessage -> DEBU 2099 Exiting" +"2019-05-02 09:27:44.758 UTC [gossip.gossip] handleMessage -> DEBU 209a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789261478309200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.759 UTC [msp] DeserializeIdentity -> DEBU 209b Obtaining identity" +"2019-05-02 09:27:44.759 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 209c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:44.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 209d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 209e Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.759 UTC [policies] Evaluate -> DEBU 209f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.759 UTC [policies] Evaluate -> DEBU 20a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.759 UTC [policies] Evaluate -> DEBU 20a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.760 UTC [cauthdsl] func1 -> DEBU 20a2 0xc003fc1da0 gate 1556789264760273600 evaluation starts" +"2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a3 0xc003fc1da0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a4 0xc003fc1da0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a5 0xc003fc1da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.760 UTC [cauthdsl] func2 -> DEBU 20a6 0xc003fc1da0 principal evaluation fails" +"2019-05-02 09:27:44.760 UTC [cauthdsl] func1 -> DEBU 20a7 0xc003fc1da0 gate 1556789264760273600 evaluation fails" +"2019-05-02 09:27:44.760 UTC [policies] Evaluate -> DEBU 20a8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.760 UTC [policies] Evaluate -> DEBU 20a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.760 UTC [policies] Evaluate -> DEBU 20aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.761 UTC [cauthdsl] func1 -> DEBU 20ab 0xc003fd85e0 gate 1556789264760892200 evaluation starts" +"2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20ac 0xc003fd85e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20ad 0xc003fd85e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20ae 0xc003fd85e0 principal matched by identity 0" +"2019-05-02 09:27:44.761 UTC [msp.identity] Verify -> DEBU 20af Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +"2019-05-02 09:27:44.761 UTC [msp.identity] Verify -> DEBU 20b0 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +00000040 a3 34 89 3e 9c 04 |.4.>..|" +"2019-05-02 09:27:44.761 UTC [cauthdsl] func2 -> DEBU 20b1 0xc003fd85e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.761 UTC [cauthdsl] func1 -> DEBU 20b2 0xc003fd85e0 gate 1556789264760892200 evaluation succeeds" +"2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b5 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.762 UTC [policies] Evaluate -> DEBU 20b6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.762 UTC [msp] DeserializeIdentity -> DEBU 20b7 Obtaining identity" +"2019-05-02 09:27:44.762 UTC [gossip.gossip] handleMessage -> DEBU 20b8 Exiting" +"2019-05-02 09:27:44.778 UTC [gossip.comm] func1 -> DEBU 20b9 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789261478309200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.779 UTC [gossip.gossip] handleMessage -> DEBU 20ba Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789261478309200 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.779 UTC [msp] DeserializeIdentity -> DEBU 20bb Obtaining identity" +"2019-05-02 09:27:44.780 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:44.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20bd Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20be Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.780 UTC [policies] Evaluate -> DEBU 20bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.781 UTC [policies] Evaluate -> DEBU 20c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.781 UTC [policies] Evaluate -> DEBU 20c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.782 UTC [cauthdsl] func1 -> DEBU 20c2 0xc003fb9500 gate 1556789264782028100 evaluation starts" +"2019-05-02 09:27:44.782 UTC [cauthdsl] func2 -> DEBU 20c3 0xc003fb9500 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.782 UTC [cauthdsl] func2 -> DEBU 20c4 0xc003fb9500 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.783 UTC [cauthdsl] func2 -> DEBU 20c5 0xc003fb9500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.783 UTC [cauthdsl] func2 -> DEBU 20c6 0xc003fb9500 principal evaluation fails" +"2019-05-02 09:27:44.784 UTC [cauthdsl] func1 -> DEBU 20c7 0xc003fb9500 gate 1556789264782028100 evaluation fails" +"2019-05-02 09:27:44.784 UTC [policies] Evaluate -> DEBU 20c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.784 UTC [policies] Evaluate -> DEBU 20c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.785 UTC [policies] Evaluate -> DEBU 20ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.785 UTC [cauthdsl] func1 -> DEBU 20cb 0xc003fb9d40 gate 1556789264785304500 evaluation starts" +"2019-05-02 09:27:44.785 UTC [cauthdsl] func2 -> DEBU 20cc 0xc003fb9d40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.786 UTC [cauthdsl] func2 -> DEBU 20cd 0xc003fb9d40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.786 UTC [cauthdsl] func2 -> DEBU 20ce 0xc003fb9d40 principal matched by identity 0" +"2019-05-02 09:27:44.787 UTC [msp.identity] Verify -> DEBU 20cf Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +"2019-05-02 09:27:44.787 UTC [msp.identity] Verify -> DEBU 20d0 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +00000040 a3 34 89 3e 9c 04 |.4.>..|" +"2019-05-02 09:27:44.788 UTC [cauthdsl] func2 -> DEBU 20d1 0xc003fb9d40 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.789 UTC [cauthdsl] func1 -> DEBU 20d2 0xc003fb9d40 gate 1556789264785304500 evaluation succeeds" +"2019-05-02 09:27:44.790 UTC [policies] Evaluate -> DEBU 20d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.790 UTC [policies] Evaluate -> DEBU 20d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.791 UTC [policies] Evaluate -> DEBU 20d5 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.791 UTC [policies] Evaluate -> DEBU 20d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.792 UTC [msp] DeserializeIdentity -> DEBU 20d7 Obtaining identity" +"2019-05-02 09:27:44.792 UTC [gossip.gossip] handleMessage -> DEBU 20d8 Exiting" +"2019-05-02 09:27:44.809 UTC [gossip.comm] func1 -> DEBU 20d9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.810 UTC [gossip.gossip] handleMessage -> DEBU 20da Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.811 UTC [gossip.pull] HandleMessage -> DEBU 20db GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.812 UTC [msp] DeserializeIdentity -> DEBU 20dc Obtaining identity" +"2019-05-02 09:27:44.813 UTC [msp] DeserializeIdentity -> DEBU 20dd Obtaining identity" +"2019-05-02 09:27:44.813 UTC [msp] DeserializeIdentity -> DEBU 20de Obtaining identity" +"2019-05-02 09:27:44.816 UTC [msp] DeserializeIdentity -> DEBU 20df Obtaining identity" +"2019-05-02 09:27:44.820 UTC [msp] DeserializeIdentity -> DEBU 20e0 Obtaining identity" +"2019-05-02 09:27:44.821 UTC [msp] DeserializeIdentity -> DEBU 20e1 Obtaining identity" +"2019-05-02 09:27:44.822 UTC [gossip.pull] SendDigest -> DEBU 20e2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:44.828 UTC [gossip.gossip] handleMessage -> DEBU 20e3 Exiting" +"2019-05-02 09:27:44.831 UTC [gossip.comm] func1 -> DEBU 20e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.831 UTC [gossip.gossip] handleMessage -> DEBU 20e5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.831 UTC [gossip.gossip] handleMessage -> DEBU 20e6 Exiting" +"2019-05-02 09:27:44.831 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20e7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.831 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20e8 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:44.831 UTC [msp] DeserializeIdentity -> DEBU 20e9 Obtaining identity" +"2019-05-02 09:27:44.832 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:44.832 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20eb Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.832 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20ec Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:44.832 UTC [policies] Evaluate -> DEBU 20ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:44.832 UTC [policies] Evaluate -> DEBU 20ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.832 UTC [policies] Evaluate -> DEBU 20ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:44.833 UTC [cauthdsl] func1 -> DEBU 20f0 0xc00400a640 gate 1556789264833723500 evaluation starts" +"2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f1 0xc00400a640 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f2 0xc00400a640 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f3 0xc00400a640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:44.834 UTC [cauthdsl] func2 -> DEBU 20f4 0xc00400a640 principal evaluation fails" +"2019-05-02 09:27:44.835 UTC [cauthdsl] func1 -> DEBU 20f5 0xc00400a640 gate 1556789264833723500 evaluation fails" +"2019-05-02 09:27:44.835 UTC [policies] Evaluate -> DEBU 20f6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.836 UTC [policies] Evaluate -> DEBU 20f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:44.836 UTC [policies] Evaluate -> DEBU 20f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:44.837 UTC [cauthdsl] func1 -> DEBU 20f9 0xc00400ae80 gate 1556789264837180600 evaluation starts" +"2019-05-02 09:27:44.837 UTC [cauthdsl] func2 -> DEBU 20fa 0xc00400ae80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.838 UTC [cauthdsl] func2 -> DEBU 20fb 0xc00400ae80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.838 UTC [cauthdsl] func2 -> DEBU 20fc 0xc00400ae80 principal matched by identity 0" +"2019-05-02 09:27:44.838 UTC [msp.identity] Verify -> DEBU 20fd Verify: digest = 00000000 a6 a7 92 68 5a bc 0b 59 b5 18 8f 0c 50 9b 2c 00 |...hZ..Y....P.,.| +00000010 db ed fe d4 cf 42 a0 a0 8d 67 f3 78 01 e0 b3 bf |.....B...g.x....|" +"2019-05-02 09:27:44.838 UTC [msp.identity] Verify -> DEBU 20fe Verify: sig = 00000000 30 44 02 20 02 03 e4 d0 97 3c 8c bc f3 06 74 44 |0D. .....<....tD| +00000010 40 7b 3d d9 9b bf 55 e6 99 75 71 e9 c2 b2 9b fa |@{=...U..uq.....| +00000020 90 30 08 da 02 20 48 50 3e 4e 5f a5 c8 4c c0 61 |.0... HP>N_..L.a| +00000030 42 55 8b e3 28 83 0e 74 b6 02 94 1d 90 a0 6d 7c |BU..(..t......m|| +00000040 45 0c aa 29 2f 38 |E..)/8|" +"2019-05-02 09:27:44.839 UTC [cauthdsl] func2 -> DEBU 20ff 0xc00400ae80 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.840 UTC [cauthdsl] func1 -> DEBU 2100 0xc00400ae80 gate 1556789264837180600 evaluation succeeds" +"2019-05-02 09:27:44.840 UTC [policies] Evaluate -> DEBU 2101 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.840 UTC [policies] Evaluate -> DEBU 2102 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:44.840 UTC [policies] Evaluate -> DEBU 2103 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:44.841 UTC [policies] Evaluate -> DEBU 2104 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:44.842 UTC [gossip.discovery] handleAliveMessage -> DEBU 2105 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.843 UTC [gossip.discovery] learnExistingMembers -> DEBU 2106 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:44.843 UTC [gossip.discovery] learnExistingMembers -> DEBU 2107 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 " +"2019-05-02 09:27:44.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 2108 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 " +"2019-05-02 09:27:44.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 2109 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:44.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 210a Exiting" +"2019-05-02 09:27:44.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 210b Exiting" +"2019-05-02 09:27:44.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 210c Exiting" +"2019-05-02 09:27:44.848 UTC [gossip.discovery] sendMemResponse -> DEBU 210d Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:44.851 UTC [msp] DeserializeIdentity -> DEBU 210e Obtaining identity" +"2019-05-02 09:27:44.855 UTC [msp] DeserializeIdentity -> DEBU 210f Obtaining identity" +"2019-05-02 09:27:44.859 UTC [msp] DeserializeIdentity -> DEBU 2110 Obtaining identity" +"2019-05-02 09:27:44.861 UTC [gossip.comm] Send -> DEBU 2111 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:44.862 UTC [gossip.discovery] sendMemResponse -> DEBU 2112 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:44.863 UTC [gossip.comm] sendToEndpoint -> DEBU 2113 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.863 UTC [gossip.comm] sendToEndpoint -> DEBU 2114 Exiting" +"2019-05-02 09:27:44.935 UTC [endorser] ProcessProposal -> DEBU 2115 Entering: request from 172.18.0.8:57346" +"2019-05-02 09:27:44.935 UTC [protoutils] ValidateProposalMessage -> DEBU 2116 ValidateProposalMessage starts for signed proposal 0xc003ff6a50" +"2019-05-02 09:27:44.935 UTC [protoutils] validateChannelHeader -> DEBU 2117 validateChannelHeader info: header type 3" +"2019-05-02 09:27:44.935 UTC [protoutils] checkSignatureFromCreator -> DEBU 2118 begin" +"2019-05-02 09:27:44.935 UTC [msp] GetManagerForChain -> DEBU 2119 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:44.935 UTC [protoutils] checkSignatureFromCreator -> DEBU 211a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:44.935 UTC [protoutils] checkSignatureFromCreator -> DEBU 211b creator is valid" +"2019-05-02 09:27:44.935 UTC [msp.identity] Verify -> DEBU 211c Verify: digest = 00000000 7b 47 04 43 bc 4c a1 97 74 8c 8c 95 9d 9e 84 19 |{G.C.L..t.......| +00000010 de e0 8c f1 94 9d 53 b8 60 46 13 cc c0 45 30 30 |......S.`F...E00|" +"2019-05-02 09:27:44.935 UTC [msp.identity] Verify -> DEBU 211d Verify: sig = 00000000 30 44 02 20 4f 33 85 1c 6e ab 90 c1 51 95 39 6d |0D. O3..n...Q.9m| +00000010 54 d5 05 b7 37 dd a5 6d 5a b0 14 3b 5e c7 c9 90 |T...7..mZ..;^...| +00000020 eb 9b 9f 38 02 20 61 cd 39 fa 18 39 95 e9 47 1c |...8. a.9..9..G.| +00000030 64 6d 09 15 34 55 3f 4a 01 f2 06 e8 12 11 b7 f6 |dm..4U?J........| +00000040 ca 33 35 5c 97 9c |.35\..|" +"2019-05-02 09:27:44.936 UTC [protoutils] checkSignatureFromCreator -> DEBU 211e exits successfully" +"2019-05-02 09:27:44.936 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 211f validateChaincodeProposalMessage starts for proposal 0xc0034600e0, header 0xc003ff6e60" +"2019-05-02 09:27:44.936 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2120 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-05-02 09:27:44.936 UTC [endorser] preProcess -> DEBU 2121 [businesschannel][91a569c2] processing txid: 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0" +"2019-05-02 09:27:44.936 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2122 retrieveTransactionByID() - txId = [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]" +"2019-05-02 09:27:44.936 UTC [aclmgmt] CheckACL -> DEBU 2123 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-05-02 09:27:44.936 UTC [aclmgmt] CheckACL -> DEBU 2124 acl check(/Channel/Application/Writers)" +"2019-05-02 09:27:44.936 UTC [policies] Evaluate -> DEBU 2125 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:44.936 UTC [policies] Evaluate -> DEBU 2126 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:44.936 UTC [policies] Evaluate -> DEBU 2127 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:44.936 UTC [cauthdsl] func1 -> DEBU 2128 0xc00406f0c0 gate 1556789264936683300 evaluation starts" +"2019-05-02 09:27:44.936 UTC [cauthdsl] func2 -> DEBU 2129 0xc00406f0c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:44.936 UTC [cauthdsl] func2 -> DEBU 212a 0xc00406f0c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:44.936 UTC [cauthdsl] func2 -> DEBU 212b 0xc00406f0c0 principal matched by identity 0" +"2019-05-02 09:27:44.936 UTC [msp.identity] Verify -> DEBU 212c Verify: digest = 00000000 7b 47 04 43 bc 4c a1 97 74 8c 8c 95 9d 9e 84 19 |{G.C.L..t.......| +00000010 de e0 8c f1 94 9d 53 b8 60 46 13 cc c0 45 30 30 |......S.`F...E00|" +"2019-05-02 09:27:44.936 UTC [msp.identity] Verify -> DEBU 212d Verify: sig = 00000000 30 44 02 20 4f 33 85 1c 6e ab 90 c1 51 95 39 6d |0D. O3..n...Q.9m| +00000010 54 d5 05 b7 37 dd a5 6d 5a b0 14 3b 5e c7 c9 90 |T...7..mZ..;^...| +00000020 eb 9b 9f 38 02 20 61 cd 39 fa 18 39 95 e9 47 1c |...8. a.9..9..G.| +00000030 64 6d 09 15 34 55 3f 4a 01 f2 06 e8 12 11 b7 f6 |dm..4U?J........| +00000040 ca 33 35 5c 97 9c |.35\..|" +"2019-05-02 09:27:44.937 UTC [cauthdsl] func2 -> DEBU 212e 0xc00406f0c0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:44.937 UTC [cauthdsl] func1 -> DEBU 212f 0xc00406f0c0 gate 1556789264936683300 evaluation succeeds" +"2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2130 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2131 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2132 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:44.937 UTC [policies] Evaluate -> DEBU 2133 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:44.937 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2134 constructing new tx simulator" +"2019-05-02 09:27:44.937 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2135 constructing new tx simulator txid = [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]" +"2019-05-02 09:27:44.937 UTC [endorser] SimulateProposal -> DEBU 2136 [businesschannel][91a569c2] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:44.937 UTC [stateleveldb] GetState -> DEBU 2137 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:44.937 UTC [endorser] callChaincode -> INFO 2138 [businesschannel][91a569c2] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:44.937 UTC [stateleveldb] GetState -> DEBU 2139 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:44.937 UTC [stateleveldb] GetState -> DEBU 213a GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:44.938 UTC [chaincode] Execute -> DEBU 213b Entry" +"2019-05-02 09:27:44.940 UTC [chaincode] handleMessage -> DEBU 213c [91a569c2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:44.943 UTC [chaincode] HandleTransaction -> DEBU 213d [91a569c2] handling GET_STATE from chaincode" +"2019-05-02 09:27:44.943 UTC [chaincode] HandleGetState -> DEBU 213e [91a569c2] getting state for chaincode exp02, key a, channel businesschannel" +"2019-05-02 09:27:44.943 UTC [stateleveldb] GetState -> DEBU 213f GetState(). ns=exp02, key=a" +"2019-05-02 09:27:44.943 UTC [chaincode] HandleTransaction -> DEBU 2140 [91a569c2] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:44.944 UTC [chaincode] handleMessage -> DEBU 2141 [91a569c2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:44.944 UTC [chaincode] HandleTransaction -> DEBU 2142 [91a569c2] handling GET_STATE from chaincode" +"2019-05-02 09:27:44.945 UTC [chaincode] HandleGetState -> DEBU 2143 [91a569c2] getting state for chaincode exp02, key b, channel businesschannel" +"2019-05-02 09:27:44.945 UTC [stateleveldb] GetState -> DEBU 2144 GetState(). ns=exp02, key=b" +"2019-05-02 09:27:44.945 UTC [chaincode] HandleTransaction -> DEBU 2145 [91a569c2] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:44.946 UTC [chaincode] handleMessage -> DEBU 2146 [91a569c2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:44.946 UTC [chaincode] HandleTransaction -> DEBU 2147 [91a569c2] handling PUT_STATE from chaincode" +"2019-05-02 09:27:44.946 UTC [chaincode] HandleTransaction -> DEBU 2148 [91a569c2] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:44.947 UTC [chaincode] handleMessage -> DEBU 2149 [91a569c2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:44.948 UTC [chaincode] HandleTransaction -> DEBU 214a [91a569c2] handling PUT_STATE from chaincode" +"2019-05-02 09:27:44.948 UTC [chaincode] HandleTransaction -> DEBU 214b [91a569c2] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:44.953 UTC [chaincode] handleMessage -> DEBU 214c [91a569c2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:44.953 UTC [chaincode] Notify -> DEBU 214d [91a569c2] notifying Txid:91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, channelID:businesschannel" +"2019-05-02 09:27:44.953 UTC [chaincode] Execute -> DEBU 214e Exit" +"2019-05-02 09:27:44.954 UTC [endorser] callChaincode -> INFO 214f [businesschannel][91a569c2] Exit chaincode: name:"exp02" (16ms)" +"2019-05-02 09:27:44.954 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2150 Simulation completed, getting simulation results" +"2019-05-02 09:27:44.954 UTC [lockbasedtxmgr] Done -> DEBU 2151 Done with transaction simulation / query execution [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]" +"2019-05-02 09:27:44.954 UTC [endorser] SimulateProposal -> DEBU 2152 [businesschannel][91a569c2] Exit" +"2019-05-02 09:27:44.954 UTC [endorser] endorseProposal -> DEBU 2153 [businesschannel][91a569c2] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:44.954 UTC [endorser] endorseProposal -> DEBU 2154 [businesschannel][91a569c2] escc for chaincode name:"exp02" is escc" +"2019-05-02 09:27:44.954 UTC [endorser] EndorseWithPlugin -> DEBU 2155 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, chaincode: exp02}" +"2019-05-02 09:27:44.954 UTC [msp.identity] Sign -> DEBU 2156 Sign: plaintext: 0A20908C75852A885565668F0D75711B...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:44.954 UTC [msp.identity] Sign -> DEBU 2157 Sign: digest: 9AC01AB8D461550F6863AE2639A725BB3AE3FB9D572FCF35921F0C195B81F48D " +"2019-05-02 09:27:44.954 UTC [endorser] EndorseWithPlugin -> DEBU 2158 Exiting {plugin: escc, channel: businesschannel, tx: 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, chaincode: exp02}" +"2019-05-02 09:27:44.954 UTC [endorser] endorseProposal -> DEBU 2159 [businesschannel][91a569c2] Exit" +"2019-05-02 09:27:44.954 UTC [lockbasedtxmgr] Done -> DEBU 215a Done with transaction simulation / query execution [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]" +"2019-05-02 09:27:44.954 UTC [endorser] func1 -> DEBU 215b Exit: request from 172.18.0.8:57346" +"2019-05-02 09:27:44.954 UTC [comm.grpc.server] 1 -> INFO 215c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57346 grpc.code=OK grpc.call_duration=19.9116ms +"2019-05-02 09:27:44.963 UTC [grpc] infof -> DEBU 215d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:44.964 UTC [grpc] infof -> DEBU 215e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:44.982 UTC [gossip.comm] func1 -> DEBU 215f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.982 UTC [gossip.gossip] handleMessage -> DEBU 2160 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.982 UTC [msp] DeserializeIdentity -> DEBU 2161 Obtaining identity" +"2019-05-02 09:27:44.982 UTC [msp] DeserializeIdentity -> DEBU 2162 Obtaining identity" +"2019-05-02 09:27:44.982 UTC [msp] DeserializeIdentity -> DEBU 2163 Obtaining identity" +"2019-05-02 09:27:44.983 UTC [gossip.gossip] handleMessage -> DEBU 2164 Exiting" +"2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2165 Obtaining identity" +"2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2166 Obtaining identity" +"2019-05-02 09:27:44.984 UTC [gossip.pull] Hello -> DEBU 2167 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2168 Obtaining identity" +"2019-05-02 09:27:44.984 UTC [msp] DeserializeIdentity -> DEBU 2169 Obtaining identity" +"2019-05-02 09:27:44.985 UTC [gossip.comm] Send -> DEBU 216a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:44.985 UTC [gossip.comm] sendToEndpoint -> DEBU 216b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.985 UTC [gossip.comm] sendToEndpoint -> DEBU 216c Exiting" +"2019-05-02 09:27:44.987 UTC [gossip.gossip] handleMessage -> DEBU 216d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18006043574656057052 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6], Envelope: 52 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.988 UTC [gossip.pull] HandleMessage -> DEBU 216e GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18006043574656057052 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6], Envelope: 52 bytes, Signature: 0 bytes" +"2019-05-02 09:27:44.990 UTC [gossip.gossip] handleMessage -> DEBU 216f Exiting" +"2019-05-02 09:27:44.991 UTC [gossip.comm] func1 -> DEBU 2170 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789261482151800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.998 UTC [gossip.gossip] handleMessage -> DEBU 2171 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789261482151800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:44.999 UTC [msp] DeserializeIdentity -> DEBU 2172 Obtaining identity" +"2019-05-02 09:27:44.999 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2173 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:45.000 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2174 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:45.000 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2175 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:45.000 UTC [policies] Evaluate -> DEBU 2176 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:45.001 UTC [policies] Evaluate -> DEBU 2177 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:45.001 UTC [policies] Evaluate -> DEBU 2178 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:45.002 UTC [cauthdsl] func1 -> DEBU 2179 0xc0040ba360 gate 1556789265002127200 evaluation starts" +"2019-05-02 09:27:45.002 UTC [cauthdsl] func2 -> DEBU 217a 0xc0040ba360 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:45.002 UTC [cauthdsl] func2 -> DEBU 217b 0xc0040ba360 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:45.003 UTC [cauthdsl] func2 -> DEBU 217c 0xc0040ba360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:45.003 UTC [cauthdsl] func2 -> DEBU 217d 0xc0040ba360 principal evaluation fails" +"2019-05-02 09:27:45.004 UTC [cauthdsl] func1 -> DEBU 217e 0xc0040ba360 gate 1556789265002127200 evaluation fails" +"2019-05-02 09:27:45.004 UTC [policies] Evaluate -> DEBU 217f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:45.005 UTC [policies] Evaluate -> DEBU 2180 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:45.006 UTC [policies] Evaluate -> DEBU 2181 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:45.006 UTC [cauthdsl] func1 -> DEBU 2182 0xc0040baba0 gate 1556789265006776800 evaluation starts" +"2019-05-02 09:27:45.007 UTC [cauthdsl] func2 -> DEBU 2183 0xc0040baba0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:45.009 UTC [cauthdsl] func2 -> DEBU 2184 0xc0040baba0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:45.010 UTC [cauthdsl] func2 -> DEBU 2185 0xc0040baba0 principal matched by identity 0" +"2019-05-02 09:27:45.011 UTC [msp.identity] Verify -> DEBU 2186 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.| +00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|" +"2019-05-02 09:27:45.011 UTC [msp.identity] Verify -> DEBU 2187 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..| +00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.| +00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{| +00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.| +00000040 a3 8e ff fc ae d2 |......|" +"2019-05-02 09:27:45.014 UTC [cauthdsl] func2 -> DEBU 2188 0xc0040baba0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:45.015 UTC [cauthdsl] func1 -> DEBU 2189 0xc0040baba0 gate 1556789265006776800 evaluation succeeds" +"2019-05-02 09:27:45.015 UTC [policies] Evaluate -> DEBU 218a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:45.020 UTC [policies] Evaluate -> DEBU 218b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:45.020 UTC [policies] Evaluate -> DEBU 218c Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:45.021 UTC [policies] Evaluate -> DEBU 218d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:45.021 UTC [msp] DeserializeIdentity -> DEBU 218e Obtaining identity" +"2019-05-02 09:27:45.022 UTC [gossip.gossip] handleMessage -> DEBU 218f Exiting" +"2019-05-02 09:27:45.089 UTC [gossip.pull] Hello -> DEBU 2190 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:27:45.089 UTC [gossip.comm] Send -> DEBU 2191 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:45.089 UTC [gossip.pull] Hello -> DEBU 2192 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:27:45.089 UTC [gossip.comm] Send -> DEBU 2193 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:45.089 UTC [gossip.pull] Hello -> DEBU 2194 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:45.089 UTC [gossip.comm] Send -> DEBU 2195 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2196 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2197 Exiting" +"2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2198 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 2199 Exiting" +"2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 219a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.090 UTC [gossip.comm] sendToEndpoint -> DEBU 219b Exiting" +"2019-05-02 09:27:45.092 UTC [gossip.gossip] handleMessage -> DEBU 219c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13881127896331448771 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.093 UTC [gossip.pull] HandleMessage -> DEBU 219d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13881127896331448771 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.093 UTC [gossip.gossip] handleMessage -> DEBU 219e Exiting" +"2019-05-02 09:27:45.094 UTC [gossip.gossip] handleMessage -> DEBU 219f Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2785192085220839402 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.098 UTC [gossip.pull] HandleMessage -> DEBU 21a0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2785192085220839402 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.098 UTC [gossip.gossip] handleMessage -> DEBU 21a1 Exiting" +"2019-05-02 09:27:45.098 UTC [gossip.gossip] handleMessage -> DEBU 21a2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.098 UTC [gossip.pull] HandleMessage -> DEBU 21a3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.098 UTC [gossip.pull] SendDigest -> DEBU 21a4 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:45.098 UTC [gossip.gossip] handleMessage -> DEBU 21a5 Exiting" +"2019-05-02 09:27:45.099 UTC [gossip.comm] func1 -> DEBU 21a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7026397414490242265 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.099 UTC [gossip.gossip] handleMessage -> DEBU 21a7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7026397414490242265 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.100 UTC [gossip.pull] HandleMessage -> DEBU 21a8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7026397414490242265 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.100 UTC [gossip.gossip] handleMessage -> DEBU 21a9 Exiting" +"2019-05-02 09:27:45.104 UTC [gossip.gossip] handleMessage -> DEBU 21aa Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.104 UTC [gossip.gossip] handleMessage -> DEBU 21ab Exiting" +"2019-05-02 09:27:45.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.104 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21ad Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:45.104 UTC [msp.identity] Verify -> DEBU 21ae Verify: digest = 00000000 2b b8 6b 30 a6 63 df a7 45 aa a7 ab 76 2f 06 88 |+.k0.c..E...v/..| +00000010 f6 b4 23 fe a0 90 7e 71 fd 2f 60 2b 08 df 26 ba |..#...~q./`+..&.|" +"2019-05-02 09:27:45.105 UTC [msp.identity] Verify -> DEBU 21af Verify: sig = 00000000 30 45 02 21 00 ae 88 d5 57 8c 0d d3 40 50 54 8d |0E.!....W...@PT.| +00000010 87 65 bd bd 0d c9 b8 88 2c 41 ea 8f 5d 07 3a 10 |.e......,A..].:.| +00000020 3c ad bb 35 e1 02 20 78 cc a7 6e 7a ef 65 75 d3 |<..5.. x..nz.eu.| +00000030 d5 83 1b d6 9c bc 21 a1 1d ee 61 19 2e 41 4c bd |......!...a..AL.| +00000040 2b 41 be 7b 18 0d 25 |+A.{..%|" +"2019-05-02 09:27:45.105 UTC [msp.identity] Verify -> DEBU 21b0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:13.452 UTC [msp.identity] Verify -> DEBU 2066 Verify: sig = 00000000 30 45 02 21 00 9e 28 8b 0f 39 cf af 10 8d 10 ec |0E.!..(..9......| -00000010 ca f3 c9 dc 21 05 7c bb 1c 1a 15 c4 c1 0a 0d 6b |....!.|........k| -00000020 a5 af 0c f5 34 02 20 6f 83 29 12 c9 17 81 cf 1d |....4. o.)......| -00000030 e8 d7 2b e4 c8 03 ea 1d 74 55 38 fa ad e4 06 f1 |..+.....tU8.....| -00000040 01 2c 3a 1c d8 f7 32 |.,:...2|" -"2019-05-02 01:31:13.453 UTC [gossip.discovery] handleAliveMessage -> DEBU 2067 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:13.453 UTC [gossip.discovery] learnExistingMembers -> DEBU 2068 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:13.453 UTC [gossip.discovery] learnExistingMembers -> DEBU 2069 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 " -"2019-05-02 01:31:13.453 UTC [gossip.discovery] learnExistingMembers -> DEBU 206a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 " -"2019-05-02 01:31:13.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 206b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:13.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 206c Exiting" -"2019-05-02 01:31:13.456 UTC [gossip.discovery] handleAliveMessage -> DEBU 206d Exiting" -"2019-05-02 01:31:13.456 UTC [gossip.discovery] handleMsgFromComm -> DEBU 206e Exiting" -"2019-05-02 01:31:13.456 UTC [gossip.discovery] handleMsgFromComm -> DEBU 206f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2070 Exiting" -"2019-05-02 01:31:13.457 UTC [gossip.gossip] handleMessage -> DEBU 2071 Exiting" -"2019-05-02 01:31:13.457 UTC [gossip.discovery] sendMemResponse -> DEBU 2072 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:13.457 UTC [msp] DeserializeIdentity -> DEBU 2073 Obtaining identity" -"2019-05-02 01:31:13.457 UTC [msp] DeserializeIdentity -> DEBU 2074 Obtaining identity" -"2019-05-02 01:31:13.457 UTC [gossip.comm] Send -> DEBU 2075 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:13.457 UTC [gossip.discovery] sendMemResponse -> DEBU 2077 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:13.457 UTC [gossip.comm] sendToEndpoint -> DEBU 2078 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.457 UTC [gossip.comm] sendToEndpoint -> DEBU 2079 Exiting" -"2019-05-02 01:31:13.457 UTC [msp] DeserializeIdentity -> DEBU 2076 Obtaining identity" -"2019-05-02 01:31:13.458 UTC [msp] DeserializeIdentity -> DEBU 207a Obtaining identity" -"2019-05-02 01:31:13.459 UTC [msp] DeserializeIdentity -> DEBU 207b Obtaining identity" -"2019-05-02 01:31:13.459 UTC [gossip.comm] Send -> DEBU 207c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:13.460 UTC [msp] DeserializeIdentity -> DEBU 207d Obtaining identity" -"2019-05-02 01:31:13.460 UTC [gossip.comm] Send -> DEBU 207f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:13.461 UTC [gossip.comm] sendToEndpoint -> DEBU 2080 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.460 UTC [gossip.comm] sendToEndpoint -> DEBU 207e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.461 UTC [gossip.comm] func1 -> DEBU 2081 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.462 UTC [gossip.comm] sendToEndpoint -> DEBU 2082 Exiting" -"2019-05-02 01:31:13.463 UTC [gossip.gossip] handleMessage -> DEBU 2083 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.463 UTC [gossip.gossip] handleMessage -> DEBU 2084 Exiting" -"2019-05-02 01:31:13.463 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2085 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.463 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2086 Exiting" -"2019-05-02 01:31:13.463 UTC [gossip.comm] sendToEndpoint -> DEBU 2087 Exiting" -"2019-05-02 01:31:13.506 UTC [gossip.comm] func1 -> DEBU 2088 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.506 UTC [gossip.gossip] handleMessage -> DEBU 2089 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.506 UTC [gossip.gossip] handleMessage -> DEBU 208a Exiting" -"2019-05-02 01:31:13.507 UTC [gossip.discovery] handleMsgFromComm -> DEBU 208b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.507 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 208c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:13.507 UTC [msp] DeserializeIdentity -> DEBU 208d Obtaining identity" -"2019-05-02 01:31:13.507 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 208e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:13.507 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2090 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.508 UTC [policies] Evaluate -> DEBU 2091 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:13.508 UTC [policies] Evaluate -> DEBU 2092 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:13.508 UTC [policies] Evaluate -> DEBU 2093 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:13.508 UTC [cauthdsl] func1 -> DEBU 2094 0xc002db5270 gate 1556760673508763300 evaluation starts" -"2019-05-02 01:31:13.509 UTC [cauthdsl] func2 -> DEBU 2095 0xc002db5270 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:13.509 UTC [cauthdsl] func2 -> DEBU 2096 0xc002db5270 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:13.509 UTC [cauthdsl] func2 -> DEBU 2097 0xc002db5270 principal matched by identity 0" -"2019-05-02 01:31:13.509 UTC [msp.identity] Verify -> DEBU 2098 Verify: digest = 00000000 50 31 ac 81 57 53 76 08 44 15 f5 c3 2b d3 d0 14 |P1..WSv.D...+...| -00000010 7f 57 d7 e6 42 61 13 32 25 ab ed 0b f0 b0 63 c9 |.W..Ba.2%.....c.|" -"2019-05-02 01:31:13.509 UTC [msp.identity] Verify -> DEBU 2099 Verify: sig = 00000000 30 45 02 21 00 d7 18 17 3d 90 54 d3 07 98 47 cd |0E.!....=.T...G.| -00000010 2d 33 2b f4 67 3e ac 9e 99 b6 1d 88 4b 5e 91 9b |-3+.g>......K^..| -00000020 4c 66 9b 73 25 02 20 0a 44 79 f6 24 ac 41 f7 62 |Lf.s%. .Dy.$.A.b| -00000030 12 50 3d 0c 78 42 3c 81 87 5e 73 58 29 c9 7a fa |.P=.xB<..^sX).z.| -00000040 34 5d 76 ae e6 b3 cd |4]v....|" -"2019-05-02 01:31:13.509 UTC [cauthdsl] func2 -> DEBU 209a 0xc002db5270 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:13.509 UTC [cauthdsl] func1 -> DEBU 209b 0xc002db5270 gate 1556760673508763300 evaluation succeeds" -"2019-05-02 01:31:13.509 UTC [policies] Evaluate -> DEBU 209c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.509 UTC [policies] Evaluate -> DEBU 209d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.510 UTC [policies] Evaluate -> DEBU 209e Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:13.510 UTC [policies] Evaluate -> DEBU 209f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:13.510 UTC [gossip.discovery] handleAliveMessage -> DEBU 20a0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.510 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:13.510 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a2 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 " -"2019-05-02 01:31:13.510 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a3 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 " -"2019-05-02 01:31:13.510 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:13.510 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a5 Exiting" -"2019-05-02 01:31:13.511 UTC [gossip.discovery] handleAliveMessage -> DEBU 20a6 Exiting" -"2019-05-02 01:31:13.511 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20a7 Exiting" -"2019-05-02 01:31:13.513 UTC [gossip.comm] func1 -> DEBU 20a8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.513 UTC [gossip.gossip] handleMessage -> DEBU 20a9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.513 UTC [gossip.gossip] handleMessage -> DEBU 20aa Exiting" -"2019-05-02 01:31:13.515 UTC [gossip.gossip] handleMessage -> DEBU 20ab Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.513 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ad Exiting" -"2019-05-02 01:31:13.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20af Exiting" -"2019-05-02 01:31:13.516 UTC [gossip.gossip] handleMessage -> DEBU 20b0 Exiting" -"2019-05-02 01:31:13.517 UTC [gossip.comm] func1 -> DEBU 20b1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.517 UTC [gossip.gossip] handleMessage -> DEBU 20b2 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.517 UTC [gossip.pull] HandleMessage -> DEBU 20b3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.517 UTC [msp] DeserializeIdentity -> DEBU 20b4 Obtaining identity" -"2019-05-02 01:31:13.518 UTC [msp] DeserializeIdentity -> DEBU 20b5 Obtaining identity" -"2019-05-02 01:31:13.518 UTC [msp] DeserializeIdentity -> DEBU 20b6 Obtaining identity" -"2019-05-02 01:31:13.518 UTC [msp] DeserializeIdentity -> DEBU 20b7 Obtaining identity" -"2019-05-02 01:31:13.518 UTC [msp] DeserializeIdentity -> DEBU 20b8 Obtaining identity" -"2019-05-02 01:31:13.518 UTC [msp] DeserializeIdentity -> DEBU 20b9 Obtaining identity" -"2019-05-02 01:31:13.518 UTC [gossip.pull] SendDigest -> DEBU 20ba Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:13.518 UTC [gossip.gossip] handleMessage -> DEBU 20bb Exiting" -"2019-05-02 01:31:13.519 UTC [msp] DeserializeIdentity -> DEBU 20bc Obtaining identity" -"2019-05-02 01:31:13.519 UTC [msp] DeserializeIdentity -> DEBU 20bd Obtaining identity" -"2019-05-02 01:31:13.519 UTC [msp] DeserializeIdentity -> DEBU 20be Obtaining identity" -"2019-05-02 01:31:13.519 UTC [msp] DeserializeIdentity -> DEBU 20bf Obtaining identity" -"2019-05-02 01:31:13.520 UTC [msp] DeserializeIdentity -> DEBU 20c0 Obtaining identity" -"2019-05-02 01:31:13.520 UTC [msp] DeserializeIdentity -> DEBU 20c1 Obtaining identity" -"2019-05-02 01:31:13.520 UTC [msp] DeserializeIdentity -> DEBU 20c2 Obtaining identity" -"2019-05-02 01:31:13.520 UTC [gossip.comm] Send -> DEBU 20c3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:13.520 UTC [msp] DeserializeIdentity -> DEBU 20c4 Obtaining identity" -"2019-05-02 01:31:13.520 UTC [gossip.comm] Send -> DEBU 20c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:13.520 UTC [gossip.comm] sendToEndpoint -> DEBU 20c6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.520 UTC [gossip.comm] sendToEndpoint -> DEBU 20c7 Exiting" -"2019-05-02 01:31:13.521 UTC [gossip.comm] sendToEndpoint -> DEBU 20c8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.521 UTC [gossip.comm] sendToEndpoint -> DEBU 20c9 Exiting" -"2019-05-02 01:31:13.525 UTC [gossip.comm] func1 -> DEBU 20ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.525 UTC [gossip.gossip] handleMessage -> DEBU 20cb Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.526 UTC [gossip.gossip] handleMessage -> DEBU 20cc Exiting" -"2019-05-02 01:31:13.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20cd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.527 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20ce Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:13.527 UTC [msp] DeserializeIdentity -> DEBU 20cf Obtaining identity" -"2019-05-02 01:31:13.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20d0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:13.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20d1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20d2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.529 UTC [policies] Evaluate -> DEBU 20d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:13.529 UTC [policies] Evaluate -> DEBU 20d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:13.530 UTC [policies] Evaluate -> DEBU 20d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:13.530 UTC [cauthdsl] func1 -> DEBU 20d6 0xc002deb930 gate 1556760673530685400 evaluation starts" -"2019-05-02 01:31:13.531 UTC [cauthdsl] func2 -> DEBU 20d7 0xc002deb930 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:13.531 UTC [cauthdsl] func2 -> DEBU 20d8 0xc002deb930 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:13.532 UTC [cauthdsl] func2 -> DEBU 20d9 0xc002deb930 principal matched by identity 0" -"2019-05-02 01:31:13.533 UTC [msp.identity] Verify -> DEBU 20da Verify: digest = 00000000 9c 7c a2 be 2f cf 37 34 98 b4 48 ca 47 25 b4 ab |.|../.74..H.G%..| -00000010 9f a6 ca db ae 91 58 d6 72 5f bc 3f eb 73 32 44 |......X.r_.?.s2D|" -"2019-05-02 01:31:13.533 UTC [msp.identity] Verify -> DEBU 20db Verify: sig = 00000000 30 44 02 20 72 12 e4 3a 8a 16 21 98 0c 7e f8 8d |0D. r..:..!..~..| -00000010 75 54 51 c6 b2 cc 13 1a ba bf c2 7c 87 db b8 98 |uTQ........|....| -00000020 17 78 3a 9c 02 20 2b 75 1a b2 7f 3b 75 ad 4f e5 |.x:.. +u...;u.O.| -00000030 4d 21 c1 19 fd e6 d9 69 e3 c9 f6 0d 0e eb 1a c0 |M!.....i........| -00000040 b1 86 44 8b 96 ff |..D...|" -"2019-05-02 01:31:13.534 UTC [cauthdsl] func2 -> DEBU 20dc 0xc002deb930 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:13.534 UTC [cauthdsl] func1 -> DEBU 20dd 0xc002deb930 gate 1556760673530685400 evaluation succeeds" -"2019-05-02 01:31:13.535 UTC [policies] Evaluate -> DEBU 20de Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.535 UTC [policies] Evaluate -> DEBU 20df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.536 UTC [policies] Evaluate -> DEBU 20e0 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:13.536 UTC [policies] Evaluate -> DEBU 20e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:13.537 UTC [gossip.discovery] handleAliveMessage -> DEBU 20e2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:13.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e4 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 " -"2019-05-02 01:31:13.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e5 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 " -"2019-05-02 01:31:13.539 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:13.539 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e7 Exiting" -"2019-05-02 01:31:13.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 20e8 Exiting" -"2019-05-02 01:31:13.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20e9 Exiting" -"2019-05-02 01:31:13.554 UTC [gossip.discovery] sendMemResponse -> DEBU 20ea Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:13.558 UTC [msp] DeserializeIdentity -> DEBU 20eb Obtaining identity" -"2019-05-02 01:31:13.559 UTC [msp] DeserializeIdentity -> DEBU 20ec Obtaining identity" -"2019-05-02 01:31:13.561 UTC [msp] DeserializeIdentity -> DEBU 20ed Obtaining identity" -"2019-05-02 01:31:13.568 UTC [gossip.comm] Send -> DEBU 20ee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:13.569 UTC [gossip.comm] sendToEndpoint -> DEBU 20ef Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.569 UTC [gossip.discovery] sendMemResponse -> DEBU 20f0 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:13.569 UTC [gossip.comm] sendToEndpoint -> DEBU 20f1 Exiting" -"2019-05-02 01:31:13.587 UTC [gossip.comm] func1 -> DEBU 20f2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.587 UTC [gossip.gossip] handleMessage -> DEBU 20f3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.587 UTC [msp] DeserializeIdentity -> DEBU 20f4 Obtaining identity" -"2019-05-02 01:31:13.587 UTC [msp] DeserializeIdentity -> DEBU 20f5 Obtaining identity" -"2019-05-02 01:31:13.587 UTC [msp] DeserializeIdentity -> DEBU 20f6 Obtaining identity" -"2019-05-02 01:31:13.588 UTC [gossip.gossip] handleMessage -> DEBU 20f7 Exiting" -"2019-05-02 01:31:13.592 UTC [gossip.comm] func1 -> DEBU 20f8 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760671478384500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.593 UTC [gossip.gossip] handleMessage -> DEBU 20f9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760671478384500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.593 UTC [msp] DeserializeIdentity -> DEBU 20fa Obtaining identity" -"2019-05-02 01:31:13.593 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:13.593 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20fc Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.593 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20fd Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.593 UTC [policies] Evaluate -> DEBU 20fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:13.593 UTC [policies] Evaluate -> DEBU 20ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:13.593 UTC [policies] Evaluate -> DEBU 2100 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:13.594 UTC [cauthdsl] func1 -> DEBU 2101 0xc002d5fcf0 gate 1556760673594144300 evaluation starts" -"2019-05-02 01:31:13.594 UTC [cauthdsl] func2 -> DEBU 2102 0xc002d5fcf0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:13.594 UTC [cauthdsl] func2 -> DEBU 2103 0xc002d5fcf0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:13.594 UTC [cauthdsl] func2 -> DEBU 2104 0xc002d5fcf0 principal matched by identity 0" -"2019-05-02 01:31:13.594 UTC [msp.identity] Verify -> DEBU 2105 Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -"2019-05-02 01:31:13.594 UTC [msp.identity] Verify -> DEBU 2106 Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -00000040 d4 55 93 6a 4b 9f |.U.jK.|" -"2019-05-02 01:31:13.595 UTC [cauthdsl] func2 -> DEBU 2107 0xc002d5fcf0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:13.595 UTC [cauthdsl] func1 -> DEBU 2108 0xc002d5fcf0 gate 1556760673594144300 evaluation succeeds" -"2019-05-02 01:31:13.595 UTC [policies] Evaluate -> DEBU 2109 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.595 UTC [policies] Evaluate -> DEBU 210a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.595 UTC [policies] Evaluate -> DEBU 210b Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:13.595 UTC [policies] Evaluate -> DEBU 210c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:13.596 UTC [msp] DeserializeIdentity -> DEBU 210d Obtaining identity" -"2019-05-02 01:31:13.596 UTC [gossip.gossip] handleMessage -> DEBU 210e Exiting" -"2019-05-02 01:31:13.729 UTC [msp.identity] Sign -> DEBU 210f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101B " -"2019-05-02 01:31:13.729 UTC [msp.identity] Sign -> DEBU 2110 Sign: digest: ED8B2481CE0E3FEE8FBB86954F3472213DDB93EF26483ABEE42B0E3263065672 " -"2019-05-02 01:31:13.729 UTC [msp.identity] Sign -> DEBU 2111 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:13.730 UTC [msp.identity] Sign -> DEBU 2112 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:13.730 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2113 Sleeping 5s" -"2019-05-02 01:31:13.740 UTC [msp] DeserializeIdentity -> DEBU 2114 Obtaining identity" -"2019-05-02 01:31:13.740 UTC [msp] DeserializeIdentity -> DEBU 2115 Obtaining identity" -"2019-05-02 01:31:13.742 UTC [gossip.comm] Send -> DEBU 2116 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:13.743 UTC [msp] DeserializeIdentity -> DEBU 2117 Obtaining identity" -"2019-05-02 01:31:13.743 UTC [gossip.comm] Send -> DEBU 2118 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:13.743 UTC [msp] DeserializeIdentity -> DEBU 2119 Obtaining identity" -"2019-05-02 01:31:13.743 UTC [gossip.comm] Send -> DEBU 211a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:13.743 UTC [gossip.comm] sendToEndpoint -> DEBU 211b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 211c Exiting" -"2019-05-02 01:31:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 211d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 211e Exiting" -"2019-05-02 01:31:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 211f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:13.746 UTC [gossip.comm] sendToEndpoint -> DEBU 2120 Exiting" -"2019-05-02 01:31:13.746 UTC [gossip.comm] func1 -> DEBU 2121 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.747 UTC [gossip.gossip] handleMessage -> DEBU 2122 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.747 UTC [gossip.pull] HandleMessage -> DEBU 2123 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.748 UTC [msp] DeserializeIdentity -> DEBU 2124 Obtaining identity" -"2019-05-02 01:31:13.748 UTC [msp] DeserializeIdentity -> DEBU 2125 Obtaining identity" -"2019-05-02 01:31:13.748 UTC [msp] DeserializeIdentity -> DEBU 2126 Obtaining identity" -"2019-05-02 01:31:13.749 UTC [msp] DeserializeIdentity -> DEBU 2127 Obtaining identity" -"2019-05-02 01:31:13.750 UTC [msp] DeserializeIdentity -> DEBU 2128 Obtaining identity" -"2019-05-02 01:31:13.750 UTC [msp] DeserializeIdentity -> DEBU 2129 Obtaining identity" -"2019-05-02 01:31:13.750 UTC [gossip.pull] SendDigest -> DEBU 212a Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:13.751 UTC [gossip.gossip] handleMessage -> DEBU 212b Exiting" -"2019-05-02 01:31:13.829 UTC [gossip.pull] Hello -> DEBU 212c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:13.829 UTC [gossip.comm] Send -> DEBU 212d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:13.830 UTC [gossip.pull] Hello -> DEBU 212e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:13.830 UTC [gossip.comm] Send -> DEBU 212f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:13.830 UTC [gossip.pull] Hello -> DEBU 2130 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:13.830 UTC [gossip.comm] Send -> DEBU 2131 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:13.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2134 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2135 Exiting" -"2019-05-02 01:31:13.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2132 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2136 Exiting" -"2019-05-02 01:31:13.832 UTC [gossip.gossip] handleMessage -> DEBU 2137 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9726439635389445848 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.832 UTC [gossip.pull] HandleMessage -> DEBU 2138 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9726439635389445848 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.832 UTC [gossip.gossip] handleMessage -> DEBU 2139 Exiting" -"2019-05-02 01:31:13.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2133 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.833 UTC [gossip.comm] sendToEndpoint -> DEBU 213a Exiting" -"2019-05-02 01:31:13.834 UTC [gossip.comm] func1 -> DEBU 213b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2805342653033849200 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.834 UTC [gossip.gossip] handleMessage -> DEBU 213c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2805342653033849200 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.835 UTC [gossip.pull] HandleMessage -> DEBU 213d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2805342653033849200 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.835 UTC [gossip.gossip] handleMessage -> DEBU 213e Exiting" -"2019-05-02 01:31:13.839 UTC [gossip.comm] func1 -> DEBU 213f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.839 UTC [gossip.gossip] handleMessage -> DEBU 2140 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.841 UTC [gossip.gossip] handleMessage -> DEBU 2141 Exiting" -"2019-05-02 01:31:13.841 UTC [gossip.gossip] handleMessage -> DEBU 2142 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.841 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2143 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.841 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2144 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:13.841 UTC [msp] DeserializeIdentity -> DEBU 2145 Obtaining identity" -"2019-05-02 01:31:13.842 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2146 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:13.842 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2147 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.842 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2148 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.842 UTC [policies] Evaluate -> DEBU 2149 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:13.842 UTC [policies] Evaluate -> DEBU 214a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:13.842 UTC [policies] Evaluate -> DEBU 214b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:13.843 UTC [cauthdsl] func1 -> DEBU 214c 0xc002c2aa20 gate 1556760673843089800 evaluation starts" -"2019-05-02 01:31:13.843 UTC [cauthdsl] func2 -> DEBU 214d 0xc002c2aa20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:13.843 UTC [cauthdsl] func2 -> DEBU 214e 0xc002c2aa20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:13.843 UTC [cauthdsl] func2 -> DEBU 214f 0xc002c2aa20 principal matched by identity 0" -"2019-05-02 01:31:13.844 UTC [msp.identity] Verify -> DEBU 2150 Verify: digest = 00000000 51 78 c6 fe d5 05 8a 46 cf 1b b2 b3 c2 6b 3b 51 |Qx.....F.....k;Q| -00000010 15 d6 b3 6e f6 56 76 d5 c4 53 f7 55 8e 64 d4 c8 |...n.Vv..S.U.d..|" -"2019-05-02 01:31:13.844 UTC [msp.identity] Verify -> DEBU 2151 Verify: sig = 00000000 30 44 02 20 1a 80 6e 71 86 f8 27 e7 0f de b4 2c |0D. ..nq..'....,| -00000010 c6 ae 12 20 97 e1 9f 7d 8a d5 49 ce 65 64 aa 07 |... ...}..I.ed..| -00000020 eb 6f 28 73 02 20 1f b1 87 cc d5 ba 88 e4 da 92 |.o(s. ..........| -00000030 1e af f8 0f a5 4d 7a a6 ed 74 d9 cd 27 e7 0d 2c |.....Mz..t..'..,| -00000040 7a a7 31 66 66 0c |z.1ff.|" -"2019-05-02 01:31:13.845 UTC [gossip.comm] func1 -> DEBU 2152 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6596337255433348617 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.845 UTC [cauthdsl] func2 -> DEBU 2153 0xc002c2aa20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:13.846 UTC [cauthdsl] func1 -> DEBU 2154 0xc002c2aa20 gate 1556760673843089800 evaluation succeeds" -"2019-05-02 01:31:13.846 UTC [policies] Evaluate -> DEBU 2155 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.846 UTC [policies] Evaluate -> DEBU 2156 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.846 UTC [policies] Evaluate -> DEBU 2157 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:13.847 UTC [policies] Evaluate -> DEBU 2158 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:13.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 2159 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.847 UTC [gossip.discovery] learnExistingMembers -> DEBU 215a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:13.847 UTC [gossip.discovery] learnExistingMembers -> DEBU 215b updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 " -"2019-05-02 01:31:13.848 UTC [gossip.discovery] learnExistingMembers -> DEBU 215c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 " -"2019-05-02 01:31:13.848 UTC [gossip.discovery] learnExistingMembers -> DEBU 215d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:13.848 UTC [gossip.discovery] learnExistingMembers -> DEBU 215e Exiting" -"2019-05-02 01:31:13.849 UTC [gossip.discovery] handleAliveMessage -> DEBU 215f Exiting" -"2019-05-02 01:31:13.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2160 Exiting" -"2019-05-02 01:31:13.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2161 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2162 Exiting" -"2019-05-02 01:31:13.849 UTC [gossip.gossip] handleMessage -> DEBU 2163 Exiting" -"2019-05-02 01:31:13.850 UTC [gossip.gossip] handleMessage -> DEBU 2164 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6596337255433348617 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.850 UTC [gossip.pull] HandleMessage -> DEBU 2165 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6596337255433348617 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.850 UTC [gossip.gossip] handleMessage -> DEBU 2166 Exiting" -"2019-05-02 01:31:13.851 UTC [msp] DeserializeIdentity -> DEBU 2167 Obtaining identity" -"2019-05-02 01:31:13.851 UTC [msp] DeserializeIdentity -> DEBU 2168 Obtaining identity" -"2019-05-02 01:31:13.852 UTC [msp] DeserializeIdentity -> DEBU 2169 Obtaining identity" -"2019-05-02 01:31:13.852 UTC [msp] DeserializeIdentity -> DEBU 216a Obtaining identity" -"2019-05-02 01:31:13.852 UTC [msp] DeserializeIdentity -> DEBU 216b Obtaining identity" -"2019-05-02 01:31:13.853 UTC [msp] DeserializeIdentity -> DEBU 216c Obtaining identity" -"2019-05-02 01:31:13.853 UTC [msp] DeserializeIdentity -> DEBU 216d Obtaining identity" -"2019-05-02 01:31:13.854 UTC [gossip.comm] Send -> DEBU 216e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:13.854 UTC [msp] DeserializeIdentity -> DEBU 216f Obtaining identity" -"2019-05-02 01:31:13.854 UTC [gossip.comm] sendToEndpoint -> DEBU 2170 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.854 UTC [gossip.comm] sendToEndpoint -> DEBU 2171 Exiting" -"2019-05-02 01:31:13.855 UTC [gossip.comm] Send -> DEBU 2172 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:13.855 UTC [gossip.comm] sendToEndpoint -> DEBU 2173 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.855 UTC [gossip.comm] sendToEndpoint -> DEBU 2174 Exiting" -"2019-05-02 01:31:13.857 UTC [gossip.comm] func1 -> DEBU 2175 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.858 UTC [gossip.gossip] handleMessage -> DEBU 2176 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.858 UTC [gossip.gossip] handleMessage -> DEBU 2177 Exiting" -"2019-05-02 01:31:13.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2178 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2179 Exiting" -"2019-05-02 01:31:13.898 UTC [gossip.comm] func1 -> DEBU 217a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.898 UTC [gossip.gossip] handleMessage -> DEBU 217b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.898 UTC [gossip.gossip] handleMessage -> DEBU 217c Exiting" -"2019-05-02 01:31:13.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 217d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 217e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:13.898 UTC [msp] DeserializeIdentity -> DEBU 217f Obtaining identity" -"2019-05-02 01:31:13.898 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2180 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:13.898 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2181 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.898 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2182 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:13.898 UTC [policies] Evaluate -> DEBU 2183 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:13.898 UTC [policies] Evaluate -> DEBU 2184 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:13.899 UTC [policies] Evaluate -> DEBU 2185 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:13.899 UTC [cauthdsl] func1 -> DEBU 2186 0xc0027ed100 gate 1556760673899066900 evaluation starts" -"2019-05-02 01:31:13.899 UTC [cauthdsl] func2 -> DEBU 2187 0xc0027ed100 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:13.899 UTC [cauthdsl] func2 -> DEBU 2188 0xc0027ed100 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:13.899 UTC [cauthdsl] func2 -> DEBU 2189 0xc0027ed100 principal matched by identity 0" -"2019-05-02 01:31:13.899 UTC [msp.identity] Verify -> DEBU 218a Verify: digest = 00000000 c8 5f 9e 2c e9 fd 7e af b0 f2 ea 78 d4 7d ca 0f |._.,..~....x.}..| -00000010 b2 ba 71 2f 39 1b 46 b3 ec 92 a3 a0 ac 56 4d c1 |..q/9.F......VM.|" -"2019-05-02 01:31:13.899 UTC [msp.identity] Verify -> DEBU 218b Verify: sig = 00000000 30 44 02 20 0a 80 a0 a8 de b6 72 d6 a6 41 b5 c5 |0D. ......r..A..| -00000010 ea d9 bb 83 c7 85 a0 d9 e4 80 fd a5 a3 06 74 7d |..............t}| -00000020 35 55 d4 92 02 20 1c ca 29 2d e4 47 cb 3f 29 67 |5U... ..)-.G.?)g| -00000030 1c ee 8f c2 4d a6 7d 99 66 43 f3 fa 43 c1 7a f5 |....M.}.fC..C.z.| -00000040 40 96 fb 0f 24 7e |@...$~|" -"2019-05-02 01:31:13.899 UTC [cauthdsl] func2 -> DEBU 218c 0xc0027ed100 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:13.899 UTC [cauthdsl] func1 -> DEBU 218d 0xc0027ed100 gate 1556760673899066900 evaluation succeeds" -"2019-05-02 01:31:13.899 UTC [policies] Evaluate -> DEBU 218e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.899 UTC [policies] Evaluate -> DEBU 218f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:13.899 UTC [policies] Evaluate -> DEBU 2190 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:13.899 UTC [policies] Evaluate -> DEBU 2191 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:13.899 UTC [gossip.discovery] handleAliveMessage -> DEBU 2192 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:13.899 UTC [gossip.discovery] learnExistingMembers -> DEBU 2193 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:13.899 UTC [gossip.discovery] learnExistingMembers -> DEBU 2194 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 " -"2019-05-02 01:31:13.899 UTC [gossip.discovery] learnExistingMembers -> DEBU 2195 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 " -"2019-05-02 01:31:13.899 UTC [gossip.discovery] learnExistingMembers -> DEBU 2196 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:13.899 UTC [gossip.discovery] learnExistingMembers -> DEBU 2197 Exiting" -"2019-05-02 01:31:13.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 2198 Exiting" -"2019-05-02 01:31:13.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2199 Exiting" -"2019-05-02 01:31:13.900 UTC [gossip.discovery] sendMemResponse -> DEBU 219a Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:13.900 UTC [msp] DeserializeIdentity -> DEBU 219b Obtaining identity" -"2019-05-02 01:31:13.900 UTC [msp] DeserializeIdentity -> DEBU 219c Obtaining identity" -"2019-05-02 01:31:13.900 UTC [msp] DeserializeIdentity -> DEBU 219d Obtaining identity" -"2019-05-02 01:31:13.900 UTC [gossip.comm] Send -> DEBU 219e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:13.900 UTC [gossip.discovery] sendMemResponse -> DEBU 219f Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:13.900 UTC [gossip.comm] sendToEndpoint -> DEBU 21a0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:13.900 UTC [gossip.comm] sendToEndpoint -> DEBU 21a1 Exiting" -"2019-05-02 01:31:14.005 UTC [msp.identity] Sign -> DEBU 21a2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101C " -"2019-05-02 01:31:14.010 UTC [msp.identity] Sign -> DEBU 21a3 Sign: digest: AA04C2178E15855EA12B2D64FD3B7EF23AF3553EA0037A583DAACC34BEE3DD0B " -"2019-05-02 01:31:14.017 UTC [msp.identity] Sign -> DEBU 21a4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:14.018 UTC [msp.identity] Sign -> DEBU 21a5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:14.020 UTC [gossip.comm] Send -> DEBU 21a6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:14.025 UTC [msp] DeserializeIdentity -> DEBU 21a7 Obtaining identity" -"2019-05-02 01:31:14.028 UTC [gossip.comm] Send -> DEBU 21a8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:14.029 UTC [msp] DeserializeIdentity -> DEBU 21a9 Obtaining identity" -"2019-05-02 01:31:14.030 UTC [gossip.comm] sendToEndpoint -> DEBU 21ab Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.030 UTC [gossip.comm] sendToEndpoint -> DEBU 21ac Exiting" -"2019-05-02 01:31:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 21aa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.031 UTC [gossip.comm] sendToEndpoint -> DEBU 21ad Exiting" -"2019-05-02 01:31:14.034 UTC [gossip.gossip] handleMessage -> DEBU 21ae Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.034 UTC [gossip.gossip] handleMessage -> DEBU 21af Exiting" -"2019-05-02 01:31:14.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.034 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21b1 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:14.036 UTC [msp.identity] Verify -> DEBU 21b2 Verify: digest = 00000000 aa 04 c2 17 8e 15 85 5e a1 2b 2d 64 fd 3b 7e f2 |.......^.+-d.;~.| -00000010 3a f3 55 3e a0 03 7a 58 3d aa cc 34 be e3 dd 0b |:.U>..zX=..4....|" -"2019-05-02 01:31:14.037 UTC [msp.identity] Verify -> DEBU 21b3 Verify: sig = 00000000 30 45 02 21 00 cf 12 ae 0c 78 4f 13 2b d9 9a 3f |0E.!.....xO.+..?| -00000010 77 e9 33 b3 33 10 37 3f bd 61 02 4e 14 4e b2 87 |w.3.3.7?.a.N.N..| -00000020 4c 21 96 c3 8a 02 20 22 95 60 f5 87 ed 45 75 87 |L!.... ".`...Eu.| -00000030 12 15 98 13 ef b2 6c 17 0b d1 4f c9 7a 96 c9 0d |......l...O.z...| -00000040 5c 43 92 ff 84 c8 a7 |\C.....|" -"2019-05-02 01:31:14.038 UTC [msp.identity] Verify -> DEBU 21b4 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:27:45.105 UTC [msp.identity] Verify -> DEBU 21b1 Verify: sig = 00000000 30 45 02 21 00 a5 25 fe 94 c7 0d 11 eb ed 47 49 |0E.!..%.......GI| +00000010 88 ca a1 4f 27 aa fe 7d 11 2a 5f 1c d9 36 23 06 |...O'..}.*_..6#.| +00000020 e5 71 3c 79 30 02 20 36 75 18 6b 49 65 24 5b 60 |.q DEBU 21b2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b4 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 " +"2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 " +"2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:45.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 21b7 Exiting" +"2019-05-02 09:27:45.109 UTC [gossip.discovery] handleAliveMessage -> DEBU 21b8 Exiting" +"2019-05-02 09:27:45.110 UTC [gossip.discovery] sendMemResponse -> DEBU 21b9 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:45.110 UTC [msp] DeserializeIdentity -> DEBU 21ba Obtaining identity" +"2019-05-02 09:27:45.110 UTC [msp] DeserializeIdentity -> DEBU 21bb Obtaining identity" +"2019-05-02 09:27:45.110 UTC [gossip.comm] Send -> DEBU 21bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:45.110 UTC [gossip.discovery] sendMemResponse -> DEBU 21bd Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:45.110 UTC [gossip.comm] sendToEndpoint -> DEBU 21be Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.110 UTC [gossip.comm] sendToEndpoint -> DEBU 21bf Exiting" +"2019-05-02 09:27:45.111 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21c0 Exiting" +"2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101A " +"2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c2 Sign: digest: 7CB586E87BFDA30C828413BD4F6FDC5D74552CD642416B1977CDB79AE5A10AD0 " +"2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:45.113 UTC [msp.identity] Sign -> DEBU 21c4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:45.113 UTC [gossip.comm] Send -> DEBU 21c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:45.114 UTC [msp] DeserializeIdentity -> DEBU 21c6 Obtaining identity" +"2019-05-02 09:27:45.114 UTC [gossip.comm] Send -> DEBU 21c7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:45.114 UTC [msp] DeserializeIdentity -> DEBU 21c8 Obtaining identity" +"2019-05-02 09:27:45.114 UTC [gossip.comm] Send -> DEBU 21c9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21ca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cb Exiting" +"2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cd Exiting" +"2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21ce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.115 UTC [gossip.comm] sendToEndpoint -> DEBU 21cf Exiting" +"2019-05-02 09:27:45.120 UTC [gossip.gossip] handleMessage -> DEBU 21d0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.121 UTC [gossip.gossip] handleMessage -> DEBU 21d1 Exiting" +"2019-05-02 09:27:45.121 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.122 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21d3 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:45.122 UTC [msp] DeserializeIdentity -> DEBU 21d4 Obtaining identity" +"2019-05-02 09:27:45.122 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:45.122 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21d6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:45.122 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21d7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:45.122 UTC [policies] Evaluate -> DEBU 21d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:45.122 UTC [policies] Evaluate -> DEBU 21d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:45.122 UTC [policies] Evaluate -> DEBU 21da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:45.122 UTC [cauthdsl] func1 -> DEBU 21db 0xc0041148c0 gate 1556789265122938500 evaluation starts" +"2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21dc 0xc0041148c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21dd 0xc0041148c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21de 0xc0041148c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21df 0xc0041148c0 principal evaluation fails" +"2019-05-02 09:27:45.123 UTC [cauthdsl] func1 -> DEBU 21e0 0xc0041148c0 gate 1556789265122938500 evaluation fails" +"2019-05-02 09:27:45.123 UTC [policies] Evaluate -> DEBU 21e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:45.123 UTC [policies] Evaluate -> DEBU 21e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:45.123 UTC [policies] Evaluate -> DEBU 21e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:45.123 UTC [cauthdsl] func1 -> DEBU 21e4 0xc004115100 gate 1556789265123536700 evaluation starts" +"2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21e5 0xc004115100 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21e6 0xc004115100 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:45.123 UTC [cauthdsl] func2 -> DEBU 21e7 0xc004115100 principal matched by identity 0" +"2019-05-02 09:27:45.123 UTC [msp.identity] Verify -> DEBU 21e8 Verify: digest = 00000000 a6 a7 92 68 5a bc 0b 59 b5 18 8f 0c 50 9b 2c 00 |...hZ..Y....P.,.| +00000010 db ed fe d4 cf 42 a0 a0 8d 67 f3 78 01 e0 b3 bf |.....B...g.x....|" +"2019-05-02 09:27:45.123 UTC [msp.identity] Verify -> DEBU 21e9 Verify: sig = 00000000 30 44 02 20 02 03 e4 d0 97 3c 8c bc f3 06 74 44 |0D. .....<....tD| +00000010 40 7b 3d d9 9b bf 55 e6 99 75 71 e9 c2 b2 9b fa |@{=...U..uq.....| +00000020 90 30 08 da 02 20 48 50 3e 4e 5f a5 c8 4c c0 61 |.0... HP>N_..L.a| +00000030 42 55 8b e3 28 83 0e 74 b6 02 94 1d 90 a0 6d 7c |BU..(..t......m|| +00000040 45 0c aa 29 2f 38 |E..)/8|" +"2019-05-02 09:27:45.124 UTC [cauthdsl] func2 -> DEBU 21ea 0xc004115100 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:45.124 UTC [cauthdsl] func1 -> DEBU 21eb 0xc004115100 gate 1556789265123536700 evaluation succeeds" +"2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ee Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:45.124 UTC [policies] Evaluate -> DEBU 21ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:45.124 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:45.124 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f1 Exiting" +"2019-05-02 09:27:45.124 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21f2 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:45.124 UTC [msp.identity] Verify -> DEBU 21f3 Verify: digest = 00000000 2b b8 6b 30 a6 63 df a7 45 aa a7 ab 76 2f 06 88 |+.k0.c..E...v/..| +00000010 f6 b4 23 fe a0 90 7e 71 fd 2f 60 2b 08 df 26 ba |..#...~q./`+..&.|" +"2019-05-02 09:27:45.125 UTC [msp.identity] Verify -> DEBU 21f4 Verify: sig = 00000000 30 45 02 21 00 ae 88 d5 57 8c 0d d3 40 50 54 8d |0E.!....W...@PT.| +00000010 87 65 bd bd 0d c9 b8 88 2c 41 ea 8f 5d 07 3a 10 |.e......,A..].:.| +00000020 3c ad bb 35 e1 02 20 78 cc a7 6e 7a ef 65 75 d3 |<..5.. x..nz.eu.| +00000030 d5 83 1b d6 9c bc 21 a1 1d ee 61 19 2e 41 4c bd |......!...a..AL.| +00000040 2b 41 be 7b 18 0d 25 |+A.{..%|" +"2019-05-02 09:27:45.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:45.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f6 Exiting" +"2019-05-02 09:27:45.125 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21f7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:45.125 UTC [msp.identity] Verify -> DEBU 21f8 Verify: digest = 00000000 7c b5 86 e8 7b fd a3 0c 82 84 13 bd 4f 6f dc 5d ||...{.......Oo.]| +00000010 74 55 2c d6 42 41 6b 19 77 cd b7 9a e5 a1 0a d0 |tU,.BAk.w.......|" +"2019-05-02 09:27:45.126 UTC [msp.identity] Verify -> DEBU 21f9 Verify: sig = 00000000 30 44 02 20 38 11 34 ca ff 0c da c3 43 1d 72 0c |0D. 8.4.....C.r.| +00000010 81 4d 79 09 fd 7e 87 3f 5d 87 16 2b e9 06 e5 3a |.My..~.?]..+...:| +00000020 c5 b1 61 b4 02 20 48 2d 51 e9 e7 18 da 48 3c cd |..a.. H-Q....H<.| +00000030 e7 3e 1e 14 bc a7 e8 28 5e a1 e3 e0 c4 4c 74 b1 |.>.....(^....Lt.| +00000040 8c 40 2b c8 f5 43 |.@+..C|" +"2019-05-02 09:27:45.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 21fa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:45.126 UTC [gossip.discovery] isSentByMe -> DEBU 21fb Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:45.126 UTC [gossip.discovery] handleAliveMessage -> DEBU 21fc Exiting" +"2019-05-02 09:27:45.126 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21fd Exiting" +"2019-05-02 09:27:45.137 UTC [gossip.comm] func1 -> DEBU 21fe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.137 UTC [gossip.gossip] handleMessage -> DEBU 21ff Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.137 UTC [gossip.gossip] handleMessage -> DEBU 2200 Exiting" +"2019-05-02 09:27:45.137 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2201 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.138 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2202 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:45.139 UTC [gossip.gossip] handleMessage -> DEBU 2203 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.138 UTC [msp.identity] Verify -> DEBU 2204 Verify: digest = 00000000 7c b5 86 e8 7b fd a3 0c 82 84 13 bd 4f 6f dc 5d ||...{.......Oo.]| +00000010 74 55 2c d6 42 41 6b 19 77 cd b7 9a e5 a1 0a d0 |tU,.BAk.w.......|" +"2019-05-02 09:27:45.139 UTC [msp.identity] Verify -> DEBU 2205 Verify: sig = 00000000 30 44 02 20 38 11 34 ca ff 0c da c3 43 1d 72 0c |0D. 8.4.....C.r.| +00000010 81 4d 79 09 fd 7e 87 3f 5d 87 16 2b e9 06 e5 3a |.My..~.?]..+...:| +00000020 c5 b1 61 b4 02 20 48 2d 51 e9 e7 18 da 48 3c cd |..a.. H-Q....H<.| +00000030 e7 3e 1e 14 bc a7 e8 28 5e a1 e3 e0 c4 4c 74 b1 |.>.....(^....Lt.| +00000040 8c 40 2b c8 f5 43 |.@+..C|" +"2019-05-02 09:27:45.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 2206 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:45.140 UTC [gossip.discovery] isSentByMe -> DEBU 2207 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:45.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 2208 Exiting" +"2019-05-02 09:27:45.140 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2209 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:45.141 UTC [msp.identity] Verify -> DEBU 220a Verify: digest = 00000000 2b b8 6b 30 a6 63 df a7 45 aa a7 ab 76 2f 06 88 |+.k0.c..E...v/..| +00000010 f6 b4 23 fe a0 90 7e 71 fd 2f 60 2b 08 df 26 ba |..#...~q./`+..&.|" +"2019-05-02 09:27:45.141 UTC [msp.identity] Verify -> DEBU 220b Verify: sig = 00000000 30 45 02 21 00 ae 88 d5 57 8c 0d d3 40 50 54 8d |0E.!....W...@PT.| +00000010 87 65 bd bd 0d c9 b8 88 2c 41 ea 8f 5d 07 3a 10 |.e......,A..].:.| +00000020 3c ad bb 35 e1 02 20 78 cc a7 6e 7a ef 65 75 d3 |<..5.. x..nz.eu.| +00000030 d5 83 1b d6 9c bc 21 a1 1d ee 61 19 2e 41 4c bd |......!...a..AL.| +00000040 2b 41 be 7b 18 0d 25 |+A.{..%|" +"2019-05-02 09:27:45.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 220c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:45.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 220d Exiting" +"2019-05-02 09:27:45.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 220e Exiting" +"2019-05-02 09:27:45.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 220f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.142 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2210 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:45.142 UTC [gossip.gossip] handleMessage -> DEBU 2211 Exiting" +"2019-05-02 09:27:45.142 UTC [msp.identity] Verify -> DEBU 2212 Verify: digest = 00000000 7c b5 86 e8 7b fd a3 0c 82 84 13 bd 4f 6f dc 5d ||...{.......Oo.]| +00000010 74 55 2c d6 42 41 6b 19 77 cd b7 9a e5 a1 0a d0 |tU,.BAk.w.......|" +"2019-05-02 09:27:45.143 UTC [msp.identity] Verify -> DEBU 2213 Verify: sig = 00000000 30 44 02 20 38 11 34 ca ff 0c da c3 43 1d 72 0c |0D. 8.4.....C.r.| +00000010 81 4d 79 09 fd 7e 87 3f 5d 87 16 2b e9 06 e5 3a |.My..~.?]..+...:| +00000020 c5 b1 61 b4 02 20 48 2d 51 e9 e7 18 da 48 3c cd |..a.. H-Q....H<.| +00000030 e7 3e 1e 14 bc a7 e8 28 5e a1 e3 e0 c4 4c 74 b1 |.>.....(^....Lt.| +00000040 8c 40 2b c8 f5 43 |.@+..C|" +"2019-05-02 09:27:45.144 UTC [msp.identity] Verify -> DEBU 2214 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:14.038 UTC [msp.identity] Verify -> DEBU 21b5 Verify: sig = 00000000 30 44 02 20 17 07 5c dc 74 e7 68 d6 31 3b 47 af |0D. ..\.t.h.1;G.| -00000010 48 a1 2f fb e8 c1 9f 54 79 e6 3a fd ef c3 2c 80 |H./....Ty.:...,.| -00000020 40 91 21 9e 02 20 62 e6 c7 19 bf b4 36 26 45 4c |@.!.. b.....6&EL| -00000030 7e f0 e1 d6 20 7b a3 3a 01 64 8d 12 80 74 75 f5 |~... {.:.d...tu.| -00000040 53 79 03 3a 01 ff |Sy.:..|" -"2019-05-02 01:31:14.042 UTC [gossip.comm] Send -> DEBU 21b6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:14.061 UTC [gossip.discovery] handleAliveMessage -> DEBU 21b7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:14.061 UTC [gossip.discovery] isSentByMe -> DEBU 21b8 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:14.061 UTC [gossip.discovery] handleAliveMessage -> DEBU 21b9 Exiting" -"2019-05-02 01:31:14.065 UTC [gossip.comm] sendToEndpoint -> DEBU 21ba Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.065 UTC [gossip.comm] sendToEndpoint -> DEBU 21bb Exiting" -"2019-05-02 01:31:14.066 UTC [gossip.comm] func1 -> DEBU 21bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.066 UTC [gossip.gossip] handleMessage -> DEBU 21bd Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.073 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21be Exiting" -"2019-05-02 01:31:14.078 UTC [gossip.gossip] handleMessage -> DEBU 21bf Exiting" -"2019-05-02 01:31:14.078 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.082 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21c1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:14.082 UTC [msp] DeserializeIdentity -> DEBU 21c2 Obtaining identity" -"2019-05-02 01:31:14.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:14.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:14.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:14.083 UTC [policies] Evaluate -> DEBU 21c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:14.084 UTC [policies] Evaluate -> DEBU 21c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:14.084 UTC [policies] Evaluate -> DEBU 21c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:14.084 UTC [cauthdsl] func1 -> DEBU 21c9 0xc0026ce2d0 gate 1556760674084398700 evaluation starts" -"2019-05-02 01:31:14.084 UTC [cauthdsl] func2 -> DEBU 21ca 0xc0026ce2d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:14.084 UTC [cauthdsl] func2 -> DEBU 21cb 0xc0026ce2d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:14.084 UTC [cauthdsl] func2 -> DEBU 21cc 0xc0026ce2d0 principal matched by identity 0" -"2019-05-02 01:31:14.085 UTC [msp.identity] Verify -> DEBU 21cd Verify: digest = 00000000 9c 7c a2 be 2f cf 37 34 98 b4 48 ca 47 25 b4 ab |.|../.74..H.G%..| -00000010 9f a6 ca db ae 91 58 d6 72 5f bc 3f eb 73 32 44 |......X.r_.?.s2D|" -"2019-05-02 01:31:14.085 UTC [msp.identity] Verify -> DEBU 21ce Verify: sig = 00000000 30 44 02 20 72 12 e4 3a 8a 16 21 98 0c 7e f8 8d |0D. r..:..!..~..| -00000010 75 54 51 c6 b2 cc 13 1a ba bf c2 7c 87 db b8 98 |uTQ........|....| -00000020 17 78 3a 9c 02 20 2b 75 1a b2 7f 3b 75 ad 4f e5 |.x:.. +u...;u.O.| -00000030 4d 21 c1 19 fd e6 d9 69 e3 c9 f6 0d 0e eb 1a c0 |M!.....i........| -00000040 b1 86 44 8b 96 ff |..D...|" -"2019-05-02 01:31:14.085 UTC [cauthdsl] func2 -> DEBU 21cf 0xc0026ce2d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:14.085 UTC [cauthdsl] func1 -> DEBU 21d0 0xc0026ce2d0 gate 1556760674084398700 evaluation succeeds" -"2019-05-02 01:31:14.085 UTC [policies] Evaluate -> DEBU 21d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:14.086 UTC [policies] Evaluate -> DEBU 21d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:14.086 UTC [policies] Evaluate -> DEBU 21d3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:14.086 UTC [policies] Evaluate -> DEBU 21d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:14.086 UTC [gossip.discovery] handleAliveMessage -> DEBU 21d5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:14.087 UTC [gossip.discovery] handleAliveMessage -> DEBU 21d6 Exiting" -"2019-05-02 01:31:14.087 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21d7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:14.087 UTC [msp.identity] Verify -> DEBU 21d8 Verify: digest = 00000000 aa 04 c2 17 8e 15 85 5e a1 2b 2d 64 fd 3b 7e f2 |.......^.+-d.;~.| -00000010 3a f3 55 3e a0 03 7a 58 3d aa cc 34 be e3 dd 0b |:.U>..zX=..4....|" -"2019-05-02 01:31:14.087 UTC [msp.identity] Verify -> DEBU 21d9 Verify: sig = 00000000 30 45 02 21 00 cf 12 ae 0c 78 4f 13 2b d9 9a 3f |0E.!.....xO.+..?| -00000010 77 e9 33 b3 33 10 37 3f bd 61 02 4e 14 4e b2 87 |w.3.3.7?.a.N.N..| -00000020 4c 21 96 c3 8a 02 20 22 95 60 f5 87 ed 45 75 87 |L!.... ".`...Eu.| -00000030 12 15 98 13 ef b2 6c 17 0b d1 4f c9 7a 96 c9 0d |......l...O.z...| -00000040 5c 43 92 ff 84 c8 a7 |\C.....|" -"2019-05-02 01:31:14.103 UTC [gossip.comm] func1 -> DEBU 21da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 21db Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:14.104 UTC [gossip.discovery] isSentByMe -> DEBU 21dc Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:14.105 UTC [gossip.discovery] handleAliveMessage -> DEBU 21dd Exiting" -"2019-05-02 01:31:14.104 UTC [gossip.gossip] handleMessage -> DEBU 21de Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.105 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21df Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:14.106 UTC [msp.identity] Verify -> DEBU 21e0 Verify: digest = 00000000 2a d2 6f 73 5c ab 32 00 41 1b 66 19 ac c9 8f 19 |*.os\.2.A.f.....| -00000010 29 a6 06 4f b7 3f 4a f6 3a 85 f9 ed 1b e5 dc 75 |)..O.?J.:......u|" -"2019-05-02 01:31:14.106 UTC [msp.identity] Verify -> DEBU 21e1 Verify: sig = 00000000 30 44 02 20 41 b3 28 68 52 5d fc da c2 cf 60 25 |0D. A.(hR]....`%| -00000010 6a 93 c3 63 6b f0 f8 16 f5 53 85 5e 79 3f 53 28 |j..ck....S.^y?S(| -00000020 90 ef 82 9a 02 20 6a e8 b9 cf 84 b5 1f 58 f8 15 |..... j......X..| -00000030 0d 10 12 c6 fb ea ca f0 b0 51 a0 db 5f 6e 94 47 |.........Q.._n.G| -00000040 14 38 d2 00 7f 3b |.8...;|" -"2019-05-02 01:31:14.106 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:14.106 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e3 Exiting" -"2019-05-02 01:31:14.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21e4 Exiting" -"2019-05-02 01:31:14.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:14.106 UTC [gossip.gossip] handleMessage -> DEBU 21e6 Exiting" -"2019-05-02 01:31:14.107 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21e7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:14.107 UTC [msp.identity] Verify -> DEBU 21e8 Verify: digest = 00000000 aa 04 c2 17 8e 15 85 5e a1 2b 2d 64 fd 3b 7e f2 |.......^.+-d.;~.| -00000010 3a f3 55 3e a0 03 7a 58 3d aa cc 34 be e3 dd 0b |:.U>..zX=..4....|" -"2019-05-02 01:31:14.107 UTC [msp.identity] Verify -> DEBU 21e9 Verify: sig = 00000000 30 45 02 21 00 cf 12 ae 0c 78 4f 13 2b d9 9a 3f |0E.!.....xO.+..?| -00000010 77 e9 33 b3 33 10 37 3f bd 61 02 4e 14 4e b2 87 |w.3.3.7?.a.N.N..| -00000020 4c 21 96 c3 8a 02 20 22 95 60 f5 87 ed 45 75 87 |L!.... ".`...Eu.| -00000030 12 15 98 13 ef b2 6c 17 0b d1 4f c9 7a 96 c9 0d |......l...O.z...| -00000040 5c 43 92 ff 84 c8 a7 |\C.....|" -"2019-05-02 01:31:14.107 UTC [gossip.discovery] handleAliveMessage -> DEBU 21ea Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:14.107 UTC [gossip.discovery] isSentByMe -> DEBU 21eb Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:14.108 UTC [gossip.discovery] handleAliveMessage -> DEBU 21ec Exiting" -"2019-05-02 01:31:14.108 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21ed Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:14.108 UTC [msp.identity] Verify -> DEBU 21ee Verify: digest = 00000000 2a d2 6f 73 5c ab 32 00 41 1b 66 19 ac c9 8f 19 |*.os\.2.A.f.....| -00000010 29 a6 06 4f b7 3f 4a f6 3a 85 f9 ed 1b e5 dc 75 |)..O.?J.:......u|" -"2019-05-02 01:31:14.109 UTC [msp.identity] Verify -> DEBU 21ef Verify: sig = 00000000 30 44 02 20 41 b3 28 68 52 5d fc da c2 cf 60 25 |0D. A.(hR]....`%| -00000010 6a 93 c3 63 6b f0 f8 16 f5 53 85 5e 79 3f 53 28 |j..ck....S.^y?S(| -00000020 90 ef 82 9a 02 20 6a e8 b9 cf 84 b5 1f 58 f8 15 |..... j......X..| -00000030 0d 10 12 c6 fb ea ca f0 b0 51 a0 db 5f 6e 94 47 |.........Q.._n.G| -00000040 14 38 d2 00 7f 3b |.8...;|" -"2019-05-02 01:31:14.110 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:14.110 UTC [gossip.discovery] handleAliveMessage -> DEBU 21f1 Exiting" -"2019-05-02 01:31:14.110 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21f2 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:14.110 UTC [msp] DeserializeIdentity -> DEBU 21f3 Obtaining identity" -"2019-05-02 01:31:14.110 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:14.110 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21f5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:14.110 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21f6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:14.110 UTC [policies] Evaluate -> DEBU 21f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:14.110 UTC [policies] Evaluate -> DEBU 21f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:14.110 UTC [policies] Evaluate -> DEBU 21f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:14.111 UTC [cauthdsl] func1 -> DEBU 21fa 0xc0025f6e20 gate 1556760674111101700 evaluation starts" -"2019-05-02 01:31:14.111 UTC [cauthdsl] func2 -> DEBU 21fb 0xc0025f6e20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:14.111 UTC [cauthdsl] func2 -> DEBU 21fc 0xc0025f6e20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:14.111 UTC [cauthdsl] func2 -> DEBU 21fd 0xc0025f6e20 principal matched by identity 0" -"2019-05-02 01:31:14.111 UTC [msp.identity] Verify -> DEBU 21fe Verify: digest = 00000000 c8 5f 9e 2c e9 fd 7e af b0 f2 ea 78 d4 7d ca 0f |._.,..~....x.}..| -00000010 b2 ba 71 2f 39 1b 46 b3 ec 92 a3 a0 ac 56 4d c1 |..q/9.F......VM.|" -"2019-05-02 01:31:14.111 UTC [msp.identity] Verify -> DEBU 21ff Verify: sig = 00000000 30 44 02 20 0a 80 a0 a8 de b6 72 d6 a6 41 b5 c5 |0D. ......r..A..| -00000010 ea d9 bb 83 c7 85 a0 d9 e4 80 fd a5 a3 06 74 7d |..............t}| -00000020 35 55 d4 92 02 20 1c ca 29 2d e4 47 cb 3f 29 67 |5U... ..)-.G.?)g| -00000030 1c ee 8f c2 4d a6 7d 99 66 43 f3 fa 43 c1 7a f5 |....M.}.fC..C.z.| -00000040 40 96 fb 0f 24 7e |@...$~|" -"2019-05-02 01:31:14.112 UTC [cauthdsl] func2 -> DEBU 2200 0xc0025f6e20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:14.112 UTC [cauthdsl] func1 -> DEBU 2201 0xc0025f6e20 gate 1556760674111101700 evaluation succeeds" -"2019-05-02 01:31:14.112 UTC [policies] Evaluate -> DEBU 2202 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:14.112 UTC [policies] Evaluate -> DEBU 2203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:14.112 UTC [policies] Evaluate -> DEBU 2204 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:14.112 UTC [policies] Evaluate -> DEBU 2205 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:14.112 UTC [gossip.discovery] handleAliveMessage -> DEBU 2206 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:14.113 UTC [gossip.discovery] handleAliveMessage -> DEBU 2207 Exiting" -"2019-05-02 01:31:14.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2208 Exiting" -"2019-05-02 01:31:14.562 UTC [endorser] ProcessProposal -> DEBU 2209 Entering: request from 192.168.240.9:41332" -"2019-05-02 01:31:14.562 UTC [protoutils] ValidateProposalMessage -> DEBU 220a ValidateProposalMessage starts for signed proposal 0xc002e1c140" -"2019-05-02 01:31:14.563 UTC [protoutils] validateChannelHeader -> DEBU 220b validateChannelHeader info: header type 3" -"2019-05-02 01:31:14.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 220c begin" -"2019-05-02 01:31:14.564 UTC [msp] GetManagerForChain -> DEBU 220d Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:14.565 UTC [protoutils] checkSignatureFromCreator -> DEBU 220e creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:14.566 UTC [protoutils] checkSignatureFromCreator -> DEBU 220f creator is valid" -"2019-05-02 01:31:14.566 UTC [msp.identity] Verify -> DEBU 2210 Verify: digest = 00000000 2f 61 4c b0 fe 03 3b de b8 4c b2 d3 01 e6 c6 e1 |/aL...;..L......| -00000010 c1 74 34 fb 36 e8 0d d7 f6 9e 98 da 78 26 5e cd |.t4.6.......x&^.|" -"2019-05-02 01:31:14.566 UTC [msp.identity] Verify -> DEBU 2211 Verify: sig = 00000000 30 45 02 21 00 9a ca 3b 87 8c 24 0c 5b 0a 28 c5 |0E.!...;..$.[.(.| -00000010 17 86 52 df 45 74 d7 fe d6 71 98 29 ed d8 d3 f7 |..R.Et...q.)....| -00000020 83 5b f9 33 6d 02 20 1f af 1c 86 f8 f1 24 6f 3e |.[.3m. ......$o>| -00000030 64 fc e0 56 c8 83 39 17 4a 64 67 cb ae f5 9b 5f |d..V..9.Jdg...._| -00000040 21 47 3e b6 16 94 7a |!G>...z|" -"2019-05-02 01:31:14.567 UTC [protoutils] checkSignatureFromCreator -> DEBU 2212 exits successfully" -"2019-05-02 01:31:14.567 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2213 validateChaincodeProposalMessage starts for proposal 0xc003402cb0, header 0xc002e1c550" -"2019-05-02 01:31:14.568 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2214 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-05-02 01:31:14.569 UTC [endorser] preProcess -> DEBU 2215 [businesschannel][6c1f5828] processing txid: 6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e" -"2019-05-02 01:31:14.569 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2216 retrieveTransactionByID() - txId = [6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e]" -"2019-05-02 01:31:14.570 UTC [aclmgmt] CheckACL -> DEBU 2217 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-05-02 01:31:14.570 UTC [aclmgmt] CheckACL -> DEBU 2218 acl check(/Channel/Application/Writers)" -"2019-05-02 01:31:14.570 UTC [policies] Evaluate -> DEBU 2219 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:14.571 UTC [policies] Evaluate -> DEBU 221a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:14.571 UTC [policies] Evaluate -> DEBU 221b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:14.572 UTC [cauthdsl] func1 -> DEBU 221c 0xc0025b5740 gate 1556760674572063200 evaluation starts" -"2019-05-02 01:31:14.572 UTC [cauthdsl] func2 -> DEBU 221d 0xc0025b5740 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:14.572 UTC [cauthdsl] func2 -> DEBU 221e 0xc0025b5740 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:14.573 UTC [cauthdsl] func2 -> DEBU 221f 0xc0025b5740 principal matched by identity 0" -"2019-05-02 01:31:14.573 UTC [msp.identity] Verify -> DEBU 2220 Verify: digest = 00000000 2f 61 4c b0 fe 03 3b de b8 4c b2 d3 01 e6 c6 e1 |/aL...;..L......| -00000010 c1 74 34 fb 36 e8 0d d7 f6 9e 98 da 78 26 5e cd |.t4.6.......x&^.|" -"2019-05-02 01:31:14.574 UTC [msp.identity] Verify -> DEBU 2221 Verify: sig = 00000000 30 45 02 21 00 9a ca 3b 87 8c 24 0c 5b 0a 28 c5 |0E.!...;..$.[.(.| -00000010 17 86 52 df 45 74 d7 fe d6 71 98 29 ed d8 d3 f7 |..R.Et...q.)....| -00000020 83 5b f9 33 6d 02 20 1f af 1c 86 f8 f1 24 6f 3e |.[.3m. ......$o>| -00000030 64 fc e0 56 c8 83 39 17 4a 64 67 cb ae f5 9b 5f |d..V..9.Jdg...._| -00000040 21 47 3e b6 16 94 7a |!G>...z|" -"2019-05-02 01:31:14.575 UTC [cauthdsl] func2 -> DEBU 2222 0xc0025b5740 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:14.575 UTC [cauthdsl] func1 -> DEBU 2223 0xc0025b5740 gate 1556760674572063200 evaluation succeeds" -"2019-05-02 01:31:14.575 UTC [policies] Evaluate -> DEBU 2224 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:14.575 UTC [policies] Evaluate -> DEBU 2225 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:14.576 UTC [policies] Evaluate -> DEBU 2226 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:14.576 UTC [policies] Evaluate -> DEBU 2227 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:14.576 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2228 constructing new tx simulator" -"2019-05-02 01:31:14.576 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2229 constructing new tx simulator txid = [6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e]" -"2019-05-02 01:31:14.576 UTC [endorser] SimulateProposal -> DEBU 222a [businesschannel][6c1f5828] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:14.577 UTC [stateleveldb] GetState -> DEBU 222b GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:14.577 UTC [endorser] callChaincode -> INFO 222c [businesschannel][6c1f5828] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:14.577 UTC [stateleveldb] GetState -> DEBU 222d GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:14.577 UTC [stateleveldb] GetState -> DEBU 222e GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:14.577 UTC [chaincode] Execute -> DEBU 222f Entry" -"2019-05-02 01:31:14.579 UTC [chaincode] handleMessage -> DEBU 2230 [6c1f5828] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:14.580 UTC [chaincode] HandleTransaction -> DEBU 2231 [6c1f5828] handling GET_STATE from chaincode" -"2019-05-02 01:31:14.580 UTC [chaincode] HandleGetState -> DEBU 2232 [6c1f5828] getting state for chaincode exp02, key a, channel businesschannel" -"2019-05-02 01:31:14.581 UTC [stateleveldb] GetState -> DEBU 2233 GetState(). ns=exp02, key=a" -"2019-05-02 01:31:14.581 UTC [chaincode] HandleTransaction -> DEBU 2234 [6c1f5828] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:14.583 UTC [chaincode] handleMessage -> DEBU 2235 [6c1f5828] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:14.583 UTC [chaincode] Notify -> DEBU 2236 [6c1f5828] notifying Txid:6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e, channelID:businesschannel" -"2019-05-02 01:31:14.584 UTC [chaincode] Execute -> DEBU 2237 Exit" -"2019-05-02 01:31:14.584 UTC [endorser] callChaincode -> INFO 2238 [businesschannel][6c1f5828] Exit chaincode: name:"exp02" (7ms)" -"2019-05-02 01:31:14.584 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2239 Simulation completed, getting simulation results" -"2019-05-02 01:31:14.584 UTC [lockbasedtxmgr] Done -> DEBU 223a Done with transaction simulation / query execution [6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e]" -"2019-05-02 01:31:14.584 UTC [endorser] SimulateProposal -> DEBU 223b [businesschannel][6c1f5828] Exit" -"2019-05-02 01:31:14.584 UTC [endorser] endorseProposal -> DEBU 223c [businesschannel][6c1f5828] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:14.584 UTC [endorser] endorseProposal -> DEBU 223d [businesschannel][6c1f5828] escc for chaincode name:"exp02" is escc" -"2019-05-02 01:31:14.584 UTC [endorser] EndorseWithPlugin -> DEBU 223e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e, chaincode: exp02}" -"2019-05-02 01:31:14.585 UTC [msp.identity] Sign -> DEBU 223f Sign: plaintext: 0A20C114D184D1DE162D02FF79D4024A...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:14.585 UTC [msp.identity] Sign -> DEBU 2240 Sign: digest: 5C8F5B7F7303DF365557DE18624F2FC13894E4E07CBE202C2CA5C1B710978F8D " -"2019-05-02 01:31:14.585 UTC [endorser] EndorseWithPlugin -> DEBU 2241 Exiting {plugin: escc, channel: businesschannel, tx: 6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e, chaincode: exp02}" -"2019-05-02 01:31:14.585 UTC [endorser] endorseProposal -> DEBU 2242 [businesschannel][6c1f5828] Exit" -"2019-05-02 01:31:14.585 UTC [lockbasedtxmgr] Done -> DEBU 2243 Done with transaction simulation / query execution [6c1f58280797ed2e7ca81579b18c53137af4d7cb239ef81b0ac64942a6e6de4e]" -"2019-05-02 01:31:14.585 UTC [endorser] func1 -> DEBU 2244 Exit: request from 192.168.240.9:41332" -"2019-05-02 01:31:14.585 UTC [comm.grpc.server] 1 -> INFO 2245 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41332 grpc.code=OK grpc.call_duration=23.9744ms -"2019-05-02 01:31:14.589 UTC [grpc] infof -> DEBU 2246 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:14.590 UTC [grpc] infof -> DEBU 2247 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:14.780 UTC [endorser] ProcessProposal -> DEBU 2248 Entering: request from 192.168.240.9:41336" -"2019-05-02 01:31:14.782 UTC [protoutils] ValidateProposalMessage -> DEBU 2249 ValidateProposalMessage starts for signed proposal 0xc002e1cf00" -"2019-05-02 01:31:14.782 UTC [protoutils] validateChannelHeader -> DEBU 224a validateChannelHeader info: header type 3" -"2019-05-02 01:31:14.783 UTC [protoutils] checkSignatureFromCreator -> DEBU 224b begin" -"2019-05-02 01:31:14.783 UTC [msp] GetManagerForChain -> DEBU 224c Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:14.784 UTC [protoutils] checkSignatureFromCreator -> DEBU 224d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:14.784 UTC [protoutils] checkSignatureFromCreator -> DEBU 224e creator is valid" -"2019-05-02 01:31:14.785 UTC [msp.identity] Verify -> DEBU 224f Verify: digest = 00000000 f0 7d b7 90 b8 01 5b 6e c2 61 bd bb 4a 59 24 ce |.}....[n.a..JY$.| -00000010 81 0f 58 64 1a 4f 26 0f 94 d5 e9 c2 51 3f ef 3d |..Xd.O&.....Q?.=|" -"2019-05-02 01:31:14.785 UTC [msp.identity] Verify -> DEBU 2250 Verify: sig = 00000000 30 45 02 21 00 fa 04 3b 0d 37 b4 4a 8a 9b 7b f0 |0E.!...;.7.J..{.| -00000010 a8 e4 b3 31 58 90 6d b3 7b 0b ba 3e d9 18 1d e6 |...1X.m.{..>....| -00000020 f8 59 f6 19 0a 02 20 26 06 3e cb eb 37 00 cd 51 |.Y.... &.>..7..Q| -00000030 67 f9 88 0b d3 20 2e 2c 66 2e 25 0b c5 e3 cb c1 |g.... .,f.%.....| -00000040 bf 93 1b 4b fb f9 f3 |...K...|" -"2019-05-02 01:31:14.786 UTC [protoutils] checkSignatureFromCreator -> DEBU 2251 exits successfully" -"2019-05-02 01:31:14.786 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2252 validateChaincodeProposalMessage starts for proposal 0xc003403180, header 0xc002e1d310" -"2019-05-02 01:31:14.787 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2253 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-05-02 01:31:14.787 UTC [endorser] preProcess -> DEBU 2254 [businesschannel][1a343f6c] processing txid: 1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183" -"2019-05-02 01:31:14.788 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2255 retrieveTransactionByID() - txId = [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183]" -"2019-05-02 01:31:14.788 UTC [aclmgmt] CheckACL -> DEBU 2256 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-05-02 01:31:14.789 UTC [aclmgmt] CheckACL -> DEBU 2257 acl check(/Channel/Application/Writers)" -"2019-05-02 01:31:14.789 UTC [policies] Evaluate -> DEBU 2258 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:14.789 UTC [policies] Evaluate -> DEBU 2259 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:14.790 UTC [policies] Evaluate -> DEBU 225a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:14.790 UTC [cauthdsl] func1 -> DEBU 225b 0xc0024329e0 gate 1556760674790744100 evaluation starts" -"2019-05-02 01:31:14.791 UTC [cauthdsl] func2 -> DEBU 225c 0xc0024329e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:14.791 UTC [cauthdsl] func2 -> DEBU 225d 0xc0024329e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:14.792 UTC [cauthdsl] func2 -> DEBU 225e 0xc0024329e0 principal matched by identity 0" -"2019-05-02 01:31:14.792 UTC [msp.identity] Verify -> DEBU 225f Verify: digest = 00000000 f0 7d b7 90 b8 01 5b 6e c2 61 bd bb 4a 59 24 ce |.}....[n.a..JY$.| -00000010 81 0f 58 64 1a 4f 26 0f 94 d5 e9 c2 51 3f ef 3d |..Xd.O&.....Q?.=|" -"2019-05-02 01:31:14.793 UTC [msp.identity] Verify -> DEBU 2260 Verify: sig = 00000000 30 45 02 21 00 fa 04 3b 0d 37 b4 4a 8a 9b 7b f0 |0E.!...;.7.J..{.| -00000010 a8 e4 b3 31 58 90 6d b3 7b 0b ba 3e d9 18 1d e6 |...1X.m.{..>....| -00000020 f8 59 f6 19 0a 02 20 26 06 3e cb eb 37 00 cd 51 |.Y.... &.>..7..Q| -00000030 67 f9 88 0b d3 20 2e 2c 66 2e 25 0b c5 e3 cb c1 |g.... .,f.%.....| -00000040 bf 93 1b 4b fb f9 f3 |...K...|" -"2019-05-02 01:31:14.794 UTC [cauthdsl] func2 -> DEBU 2261 0xc0024329e0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:14.794 UTC [cauthdsl] func1 -> DEBU 2262 0xc0024329e0 gate 1556760674790744100 evaluation succeeds" -"2019-05-02 01:31:14.794 UTC [policies] Evaluate -> DEBU 2263 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:14.795 UTC [policies] Evaluate -> DEBU 2264 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:14.795 UTC [policies] Evaluate -> DEBU 2265 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:14.796 UTC [policies] Evaluate -> DEBU 2266 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:14.796 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2267 constructing new tx simulator" -"2019-05-02 01:31:14.796 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2268 constructing new tx simulator txid = [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183]" -"2019-05-02 01:31:14.796 UTC [endorser] SimulateProposal -> DEBU 2269 [businesschannel][1a343f6c] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:14.796 UTC [stateleveldb] GetState -> DEBU 226a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:14.796 UTC [endorser] callChaincode -> INFO 226b [businesschannel][1a343f6c] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:14.796 UTC [stateleveldb] GetState -> DEBU 226c GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:14.796 UTC [stateleveldb] GetState -> DEBU 226d GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:14.796 UTC [chaincode] Execute -> DEBU 226e Entry" -"2019-05-02 01:31:14.798 UTC [chaincode] handleMessage -> DEBU 226f [1a343f6c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:14.798 UTC [chaincode] HandleTransaction -> DEBU 2270 [1a343f6c] handling GET_STATE from chaincode" -"2019-05-02 01:31:14.798 UTC [chaincode] HandleGetState -> DEBU 2271 [1a343f6c] getting state for chaincode exp02, key a, channel businesschannel" -"2019-05-02 01:31:14.798 UTC [stateleveldb] GetState -> DEBU 2272 GetState(). ns=exp02, key=a" -"2019-05-02 01:31:14.798 UTC [chaincode] HandleTransaction -> DEBU 2273 [1a343f6c] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:14.799 UTC [chaincode] handleMessage -> DEBU 2274 [1a343f6c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:14.800 UTC [chaincode] HandleTransaction -> DEBU 2275 [1a343f6c] handling GET_STATE from chaincode" -"2019-05-02 01:31:14.800 UTC [chaincode] HandleGetState -> DEBU 2276 [1a343f6c] getting state for chaincode exp02, key b, channel businesschannel" -"2019-05-02 01:31:14.800 UTC [stateleveldb] GetState -> DEBU 2277 GetState(). ns=exp02, key=b" -"2019-05-02 01:31:14.800 UTC [chaincode] HandleTransaction -> DEBU 2278 [1a343f6c] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:14.801 UTC [chaincode] handleMessage -> DEBU 2279 [1a343f6c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:14.802 UTC [chaincode] HandleTransaction -> DEBU 227a [1a343f6c] handling PUT_STATE from chaincode" -"2019-05-02 01:31:14.802 UTC [chaincode] HandleTransaction -> DEBU 227b [1a343f6c] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:14.803 UTC [chaincode] handleMessage -> DEBU 227c [1a343f6c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:14.803 UTC [chaincode] HandleTransaction -> DEBU 227d [1a343f6c] handling PUT_STATE from chaincode" -"2019-05-02 01:31:14.804 UTC [chaincode] HandleTransaction -> DEBU 227e [1a343f6c] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:14.804 UTC [chaincode] handleMessage -> DEBU 227f [1a343f6c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:14.805 UTC [chaincode] Notify -> DEBU 2280 [1a343f6c] notifying Txid:1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183, channelID:businesschannel" -"2019-05-02 01:31:14.805 UTC [chaincode] Execute -> DEBU 2281 Exit" -"2019-05-02 01:31:14.805 UTC [endorser] callChaincode -> INFO 2282 [businesschannel][1a343f6c] Exit chaincode: name:"exp02" (9ms)" -"2019-05-02 01:31:14.805 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2283 Simulation completed, getting simulation results" -"2019-05-02 01:31:14.805 UTC [lockbasedtxmgr] Done -> DEBU 2284 Done with transaction simulation / query execution [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183]" -"2019-05-02 01:31:14.805 UTC [endorser] SimulateProposal -> DEBU 2285 [businesschannel][1a343f6c] Exit" -"2019-05-02 01:31:14.805 UTC [endorser] endorseProposal -> DEBU 2286 [businesschannel][1a343f6c] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:14.806 UTC [endorser] endorseProposal -> DEBU 2287 [businesschannel][1a343f6c] escc for chaincode name:"exp02" is escc" -"2019-05-02 01:31:14.806 UTC [endorser] EndorseWithPlugin -> DEBU 2288 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183, chaincode: exp02}" -"2019-05-02 01:31:14.806 UTC [msp.identity] Sign -> DEBU 2289 Sign: plaintext: 0A202DACF24DAAAF456C723EB1231EB4...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:14.806 UTC [msp.identity] Sign -> DEBU 228a Sign: digest: ED448A5D28E727D28642A006FE24675225A0358AF52CA4CD2AA3D7C5839E53E6 " -"2019-05-02 01:31:14.806 UTC [endorser] EndorseWithPlugin -> DEBU 228b Exiting {plugin: escc, channel: businesschannel, tx: 1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183, chaincode: exp02}" -"2019-05-02 01:31:14.806 UTC [endorser] endorseProposal -> DEBU 228c [businesschannel][1a343f6c] Exit" -"2019-05-02 01:31:14.806 UTC [lockbasedtxmgr] Done -> DEBU 228d Done with transaction simulation / query execution [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183]" -"2019-05-02 01:31:14.806 UTC [endorser] func1 -> DEBU 228e Exit: request from 192.168.240.9:41336" -"2019-05-02 01:31:14.806 UTC [comm.grpc.server] 1 -> INFO 228f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41336 grpc.code=OK grpc.call_duration=26.9028ms -"2019-05-02 01:31:14.824 UTC [grpc] warningf -> DEBU 2290 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41336: read: connection reset by peer" -"2019-05-02 01:31:14.825 UTC [grpc] infof -> DEBU 2291 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:14.826 UTC [grpc] infof -> DEBU 2292 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:14.998 UTC [endorser] ProcessProposal -> DEBU 2293 Entering: request from 192.168.240.9:41342" -"2019-05-02 01:31:14.999 UTC [protoutils] ValidateProposalMessage -> DEBU 2294 ValidateProposalMessage starts for signed proposal 0xc002e1de00" -"2019-05-02 01:31:14.999 UTC [protoutils] validateChannelHeader -> DEBU 2295 validateChannelHeader info: header type 3" -"2019-05-02 01:31:14.999 UTC [protoutils] checkSignatureFromCreator -> DEBU 2296 begin" -"2019-05-02 01:31:15.000 UTC [msp] GetManagerForChain -> DEBU 2297 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:15.001 UTC [protoutils] checkSignatureFromCreator -> DEBU 2298 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -"2019-05-02 01:31:15.002 UTC [protoutils] checkSignatureFromCreator -> DEBU 2299 creator is valid" -"2019-05-02 01:31:15.002 UTC [msp.identity] Verify -> DEBU 229a Verify: digest = 00000000 01 3a 0c b9 5d 4f 99 a1 f9 16 df 58 96 d7 bd a0 |.:..]O.....X....| -00000010 27 01 9e 2e fb 9b 87 96 56 56 40 aa d2 00 0a 50 |'.......VV@....P|" -"2019-05-02 01:31:15.003 UTC [msp.identity] Verify -> DEBU 229b Verify: sig = 00000000 30 44 02 20 6c 49 ce d6 60 5e aa 57 41 25 74 65 |0D. lI..`^.WA%te| -00000010 0b 76 09 e5 1b ce 86 fe 0e e8 56 ff ef f2 03 78 |.v........V....x| -00000020 fa 95 a0 ed 02 20 18 26 64 4f b7 7b d9 1e 47 70 |..... .&dO.{..Gp| -00000030 73 b9 c3 ce 1e ba 6e 4f fb 2f 9c 82 34 7d 55 3d |s.....nO./..4}U=| -00000040 27 b9 c3 63 f9 e6 |'..c..|" -"2019-05-02 01:31:15.003 UTC [protoutils] checkSignatureFromCreator -> DEBU 229c exits successfully" -"2019-05-02 01:31:15.004 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 229d validateChaincodeProposalMessage starts for proposal 0xc003146af0, header 0xc002dd6cd0" -"2019-05-02 01:31:15.004 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 229e validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-05-02 01:31:15.005 UTC [endorser] preProcess -> DEBU 229f [businesschannel][6a139eca] processing txid: 6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e" -"2019-05-02 01:31:15.005 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 22a0 retrieveTransactionByID() - txId = [6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e]" -"2019-05-02 01:31:15.005 UTC [aclmgmt] CheckACL -> DEBU 22a1 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-05-02 01:31:15.006 UTC [aclmgmt] CheckACL -> DEBU 22a2 acl check(/Channel/Application/Writers)" -"2019-05-02 01:31:15.006 UTC [policies] Evaluate -> DEBU 22a3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:15.007 UTC [policies] Evaluate -> DEBU 22a4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:15.007 UTC [policies] Evaluate -> DEBU 22a5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:15.007 UTC [cauthdsl] func1 -> DEBU 22a6 0xc0022ce510 gate 1556760675007801500 evaluation starts" -"2019-05-02 01:31:15.008 UTC [cauthdsl] func2 -> DEBU 22a7 0xc0022ce510 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:15.008 UTC [cauthdsl] func2 -> DEBU 22a8 0xc0022ce510 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:15.009 UTC [cauthdsl] func2 -> DEBU 22a9 0xc0022ce510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:15.009 UTC [cauthdsl] func2 -> DEBU 22aa 0xc0022ce510 principal evaluation fails" -"2019-05-02 01:31:15.009 UTC [cauthdsl] func1 -> DEBU 22ab 0xc0022ce510 gate 1556760675007801500 evaluation fails" -"2019-05-02 01:31:15.010 UTC [policies] Evaluate -> DEBU 22ac Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:15.010 UTC [policies] Evaluate -> DEBU 22ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:15.010 UTC [policies] Evaluate -> DEBU 22ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:31:15.010 UTC [cauthdsl] func1 -> DEBU 22af 0xc0022ced70 gate 1556760675010522200 evaluation starts" -"2019-05-02 01:31:15.010 UTC [cauthdsl] func2 -> DEBU 22b0 0xc0022ced70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:15.010 UTC [cauthdsl] func2 -> DEBU 22b1 0xc0022ced70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:15.010 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 22b2 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:31:15.010 UTC [msp] Validate -> DEBU 22b3 MSP Org2MSP validating identity" -"2019-05-02 01:31:15.010 UTC [msp] getCertificationChain -> DEBU 22b4 MSP Org2MSP getting certification chain" -"2019-05-02 01:31:15.011 UTC [cauthdsl] func2 -> DEBU 22b5 0xc0022ced70 principal matched by identity 0" -"2019-05-02 01:31:15.011 UTC [msp.identity] Verify -> DEBU 22b6 Verify: digest = 00000000 01 3a 0c b9 5d 4f 99 a1 f9 16 df 58 96 d7 bd a0 |.:..]O.....X....| -00000010 27 01 9e 2e fb 9b 87 96 56 56 40 aa d2 00 0a 50 |'.......VV@....P|" -"2019-05-02 01:31:15.011 UTC [msp.identity] Verify -> DEBU 22b7 Verify: sig = 00000000 30 44 02 20 6c 49 ce d6 60 5e aa 57 41 25 74 65 |0D. lI..`^.WA%te| -00000010 0b 76 09 e5 1b ce 86 fe 0e e8 56 ff ef f2 03 78 |.v........V....x| -00000020 fa 95 a0 ed 02 20 18 26 64 4f b7 7b d9 1e 47 70 |..... .&dO.{..Gp| -00000030 73 b9 c3 ce 1e ba 6e 4f fb 2f 9c 82 34 7d 55 3d |s.....nO./..4}U=| -00000040 27 b9 c3 63 f9 e6 |'..c..|" -"2019-05-02 01:31:15.011 UTC [cauthdsl] func2 -> DEBU 22b8 0xc0022ced70 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:15.011 UTC [cauthdsl] func1 -> DEBU 22b9 0xc0022ced70 gate 1556760675010522200 evaluation succeeds" -"2019-05-02 01:31:15.011 UTC [policies] Evaluate -> DEBU 22ba Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:15.011 UTC [policies] Evaluate -> DEBU 22bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:15.011 UTC [policies] Evaluate -> DEBU 22bc Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:15.011 UTC [policies] Evaluate -> DEBU 22bd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:15.011 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 22be constructing new tx simulator" -"2019-05-02 01:31:15.011 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 22bf constructing new tx simulator txid = [6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e]" -"2019-05-02 01:31:15.011 UTC [endorser] SimulateProposal -> DEBU 22c0 [businesschannel][6a139eca] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:15.011 UTC [stateleveldb] GetState -> DEBU 22c1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:15.011 UTC [endorser] callChaincode -> INFO 22c2 [businesschannel][6a139eca] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:15.011 UTC [stateleveldb] GetState -> DEBU 22c3 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:15.012 UTC [stateleveldb] GetState -> DEBU 22c4 GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:15.012 UTC [chaincode] Execute -> DEBU 22c5 Entry" -"2019-05-02 01:31:15.015 UTC [chaincode] handleMessage -> DEBU 22c6 [6a139eca] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:15.015 UTC [chaincode] HandleTransaction -> DEBU 22c7 [6a139eca] handling GET_STATE from chaincode" -"2019-05-02 01:31:15.015 UTC [chaincode] HandleGetState -> DEBU 22c8 [6a139eca] getting state for chaincode exp02, key a, channel businesschannel" -"2019-05-02 01:31:15.015 UTC [stateleveldb] GetState -> DEBU 22c9 GetState(). ns=exp02, key=a" -"2019-05-02 01:31:15.015 UTC [chaincode] HandleTransaction -> DEBU 22ca [6a139eca] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:15.017 UTC [chaincode] handleMessage -> DEBU 22cb [6a139eca] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:15.017 UTC [chaincode] Notify -> DEBU 22cc [6a139eca] notifying Txid:6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e, channelID:businesschannel" -"2019-05-02 01:31:15.017 UTC [chaincode] Execute -> DEBU 22cd Exit" -"2019-05-02 01:31:15.017 UTC [endorser] callChaincode -> INFO 22ce [businesschannel][6a139eca] Exit chaincode: name:"exp02" (6ms)" -"2019-05-02 01:31:15.018 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 22cf Simulation completed, getting simulation results" -"2019-05-02 01:31:15.018 UTC [lockbasedtxmgr] Done -> DEBU 22d0 Done with transaction simulation / query execution [6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e]" -"2019-05-02 01:31:15.018 UTC [endorser] SimulateProposal -> DEBU 22d1 [businesschannel][6a139eca] Exit" -"2019-05-02 01:31:15.018 UTC [endorser] endorseProposal -> DEBU 22d2 [businesschannel][6a139eca] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:15.018 UTC [endorser] endorseProposal -> DEBU 22d3 [businesschannel][6a139eca] escc for chaincode name:"exp02" is escc" -"2019-05-02 01:31:15.018 UTC [endorser] EndorseWithPlugin -> DEBU 22d4 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e, chaincode: exp02}" -"2019-05-02 01:31:15.018 UTC [msp.identity] Sign -> DEBU 22d5 Sign: plaintext: 0A2044CCCA3C95BA399CD36E668C1DC1...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:15.019 UTC [msp.identity] Sign -> DEBU 22d6 Sign: digest: 0ACCA8F61B914450B551A4961A353EBBD56D887A0D4CD8E05A24E807660BC241 " -"2019-05-02 01:31:15.019 UTC [endorser] EndorseWithPlugin -> DEBU 22d7 Exiting {plugin: escc, channel: businesschannel, tx: 6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e, chaincode: exp02}" -"2019-05-02 01:31:15.019 UTC [endorser] endorseProposal -> DEBU 22d8 [businesschannel][6a139eca] Exit" -"2019-05-02 01:31:15.019 UTC [lockbasedtxmgr] Done -> DEBU 22d9 Done with transaction simulation / query execution [6a139eca4fb577fcf82daca3fe5220be4aeee9a7bd60a78b23fbcb3295ff4b3e]" -"2019-05-02 01:31:15.019 UTC [endorser] func1 -> DEBU 22da Exit: request from 192.168.240.9:41342" -"2019-05-02 01:31:15.019 UTC [comm.grpc.server] 1 -> INFO 22db unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41342 grpc.code=OK grpc.call_duration=21.6484ms -"2019-05-02 01:31:15.024 UTC [grpc] infof -> DEBU 22dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:15.025 UTC [grpc] infof -> DEBU 22dd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:16.829 UTC [msp] DeserializeIdentity -> DEBU 22de Obtaining identity" -"2019-05-02 01:31:16.829 UTC [msp] DeserializeIdentity -> DEBU 22df Obtaining identity" -"2019-05-02 01:31:16.832 UTC [gossip.comm] Send -> DEBU 22e0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:16.832 UTC [gossip.comm] sendToEndpoint -> DEBU 22e1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.832 UTC [gossip.comm] sendToEndpoint -> DEBU 22e2 Exiting" -"2019-05-02 01:31:16.840 UTC [gossip.comm] func1 -> DEBU 22e3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.841 UTC [gossip.comm] sendToEndpoint -> DEBU 22e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.844 UTC [gossip.comm] sendToEndpoint -> DEBU 22e5 Exiting" -"2019-05-02 01:31:16.844 UTC [gossip.gossip] handleMessage -> DEBU 22e6 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.846 UTC [msp] DeserializeIdentity -> DEBU 22e9 Obtaining identity" -"2019-05-02 01:31:16.847 UTC [msp] DeserializeIdentity -> DEBU 22ea Obtaining identity" -"2019-05-02 01:31:16.844 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 22e7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.845 UTC [gossip.comm] sendToEndpoint -> DEBU 22e8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.849 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 22eb Got block validation policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.851 UTC [msp] DeserializeIdentity -> DEBU 22ed Obtaining identity" -"2019-05-02 01:31:16.853 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:16.854 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.855 UTC [policies] Evaluate -> DEBU 22f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:16.856 UTC [policies] Evaluate -> DEBU 22f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:16.856 UTC [policies] Evaluate -> DEBU 22f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:16.857 UTC [cauthdsl] func1 -> DEBU 22f5 0xc002214200 gate 1556760676857092300 evaluation starts" -"2019-05-02 01:31:16.857 UTC [cauthdsl] func2 -> DEBU 22f6 0xc002214200 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:16.857 UTC [cauthdsl] func2 -> DEBU 22f7 0xc002214200 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:16.858 UTC [cauthdsl] func2 -> DEBU 22f8 0xc002214200 principal matched by identity 0" -"2019-05-02 01:31:16.858 UTC [msp.identity] Verify -> DEBU 22f9 Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -"2019-05-02 01:31:16.859 UTC [msp.identity] Verify -> DEBU 22fa Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -00000040 f7 8f 39 95 02 eb |..9...|" -"2019-05-02 01:31:16.859 UTC [cauthdsl] func2 -> DEBU 22fb 0xc002214200 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:16.860 UTC [cauthdsl] func1 -> DEBU 22fc 0xc002214200 gate 1556760676857092300 evaluation succeeds" -"2019-05-02 01:31:16.860 UTC [policies] Evaluate -> DEBU 22fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.861 UTC [policies] Evaluate -> DEBU 22fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.861 UTC [policies] Evaluate -> DEBU 22ff Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:16.861 UTC [policies] Evaluate -> DEBU 2300 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:16.850 UTC [gossip.comm] sendToEndpoint -> DEBU 22ec Exiting" -"2019-05-02 01:31:16.852 UTC [policies] Evaluate -> DEBU 22ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-05-02 01:31:16.868 UTC [policies] Evaluate -> DEBU 2301 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:16.869 UTC [policies] Evaluate -> DEBU 2302 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:31:16.869 UTC [cauthdsl] func1 -> DEBU 2303 0xc002220910 gate 1556760676869899600 evaluation starts" -"2019-05-02 01:31:16.870 UTC [cauthdsl] func2 -> DEBU 2304 0xc002220910 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:16.870 UTC [cauthdsl] func2 -> DEBU 2305 0xc002220910 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:16.871 UTC [cauthdsl] func2 -> DEBU 2306 0xc002220910 principal matched by identity 0" -"2019-05-02 01:31:16.872 UTC [msp.identity] Verify -> DEBU 2307 Verify: digest = 00000000 11 b5 43 c6 fd 00 94 9c 15 b7 d8 66 dd 99 db b6 |..C........f....| -00000010 39 bf f0 a7 8a 3d 06 4e 81 dd 9a 8a dc 4c 2e 06 |9....=.N.....L..|" -"2019-05-02 01:31:16.872 UTC [msp.identity] Verify -> DEBU 2308 Verify: sig = 00000000 30 44 02 20 3c 1f c5 52 b4 ad cf 84 0f 0b 05 fc |0D. <..R........| -00000010 da bc 01 bb 04 95 61 0f 95 04 22 bc 4d 40 c5 80 |......a...".M@..| -00000020 df 12 e9 8b 02 20 67 60 25 b4 95 c0 98 95 9d 78 |..... g`%......x| -00000030 ac 3e 54 fc 8e 18 e7 a7 73 c5 a3 ff cc a1 4e 85 |.>T.....s.....N.| -00000040 b0 26 5f fe 7f ab |.&_...|" -"2019-05-02 01:31:16.873 UTC [cauthdsl] func2 -> DEBU 2309 0xc002220910 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:16.873 UTC [cauthdsl] func1 -> DEBU 230a 0xc002220910 gate 1556760676869899600 evaluation succeeds" -"2019-05-02 01:31:16.874 UTC [policies] Evaluate -> DEBU 230b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:16.876 UTC [policies] Evaluate -> DEBU 230c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:16.876 UTC [policies] Evaluate -> DEBU 230d Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:16.877 UTC [policies] Evaluate -> DEBU 230e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:16.877 UTC [blocksProvider] DeliverBlocks -> DEBU 230f [businesschannel] Adding payload to local buffer, blockNum = [7]" -"2019-05-02 01:31:16.877 UTC [gossip.state] addPayload -> DEBU 2310 [businesschannel] Adding payload to local buffer, blockNum = [7]" -"2019-05-02 01:31:16.878 UTC [gossip.state] addPayload -> DEBU 2311 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-05-02 01:31:16.878 UTC [blocksProvider] DeliverBlocks -> DEBU 2312 [businesschannel] Gossiping block [7], peers number [3]" -"2019-05-02 01:31:16.878 UTC [gossip.channel] AddToMsgStore -> DEBU 2313 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes to the block puller" -"2019-05-02 01:31:16.879 UTC [gossip.pull] Add -> DEBU 2314 Added 7, total items: 7" -"2019-05-02 01:31:16.879 UTC [gossip.state] deliverPayloads -> DEBU 2315 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [7]" -"2019-05-02 01:31:16.879 UTC [gossip.state] deliverPayloads -> DEBU 2316 [businesschannel] Transferring block [7] with 1 transaction(s) to the ledger" -"2019-05-02 01:31:16.880 UTC [gossip.privdata] StoreBlock -> INFO 2317 [businesschannel] Received block [7] from buffer" -"2019-05-02 01:31:16.880 UTC [gossip.privdata] StoreBlock -> DEBU 2318 [businesschannel] Validating block [7]" -"2019-05-02 01:31:16.880 UTC [committer.txvalidator] Validate -> DEBU 2319 [businesschannel] START Block Validation for block [7]" -"2019-05-02 01:31:16.881 UTC [committer.txvalidator] Validate -> DEBU 231c expecting 1 block validation responses" -"2019-05-02 01:31:16.881 UTC [msp.identity] Verify -> DEBU 231a Verify: digest = 00000000 fc ff 39 04 73 5f f2 e7 22 8c 8d 03 43 80 10 39 |..9.s_.."...C..9| -00000010 39 de 51 1a 50 4b 65 5f ca e2 8f 95 ab b2 6a 11 |9.Q.PKe_......j.|" -"2019-05-02 01:31:16.883 UTC [msp.identity] Verify -> DEBU 231e Verify: sig = 00000000 30 44 02 20 31 63 e7 d7 ca 29 06 4b 0c b8 2f d3 |0D. 1c...).K../.| -00000010 cf 33 24 de af a1 d9 80 f5 d6 88 2b be 6e 9b d6 |.3$........+.n..| -00000020 02 56 c7 d3 02 20 37 96 4f d3 5d 67 35 f9 62 31 |.V... 7.O.]g5.b1| -00000030 4e a5 a9 f8 41 75 9e 28 28 65 7f 20 73 9f 6e ce |N...Au.((e. s.n.| -00000040 89 1e b4 1b 9d da |......|" -"2019-05-02 01:31:16.881 UTC [gossip.comm] func1 -> DEBU 231b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.881 UTC [committer.txvalidator] validateTx -> DEBU 231d [businesschannel] validateTx starts for block 0xc0030ddfc0 env 0xc002d2a230 txn 0" -"2019-05-02 01:31:16.884 UTC [protoutils] ValidateTransaction -> DEBU 231f ValidateTransactionEnvelope starts for envelope 0xc002d2a230" -"2019-05-02 01:31:16.885 UTC [protoutils] ValidateTransaction -> DEBU 2320 Header is channel_header:"\010\003\032\014\010\342\220\251\346\005\020\234\223\310\363\002\"\017businesschannel*@1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\246EoS\362g\377\022\267\335\2744f~e\033\217\2667\230\274\357\241\317" " -"2019-05-02 01:31:16.885 UTC [protoutils] validateChannelHeader -> DEBU 2321 validateChannelHeader info: header type 3" -"2019-05-02 01:31:16.885 UTC [protoutils] checkSignatureFromCreator -> DEBU 2322 begin" -"2019-05-02 01:31:16.885 UTC [msp] GetManagerForChain -> DEBU 2323 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:16.885 UTC [protoutils] checkSignatureFromCreator -> DEBU 2324 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:16.885 UTC [protoutils] checkSignatureFromCreator -> DEBU 2325 creator is valid" -"2019-05-02 01:31:16.885 UTC [msp.identity] Verify -> DEBU 2326 Verify: digest = 00000000 ae 68 b2 66 52 f0 23 85 03 d1 e6 d7 a5 7a e1 b1 |.h.fR.#......z..| -00000010 c9 9e 4a 42 17 65 4d 07 2c 58 78 00 bb 50 3b d1 |..JB.eM.,Xx..P;.|" -"2019-05-02 01:31:16.885 UTC [msp.identity] Verify -> DEBU 2327 Verify: sig = 00000000 30 45 02 21 00 de e4 42 2b 7e c5 77 9f 6f 46 48 |0E.!...B+~.w.oFH| -00000010 81 4a aa d6 c3 23 79 c6 9a f9 43 c1 7c 47 0a 1d |.J...#y...C.|G..| -00000020 3b ab f7 cc ec 02 20 7d be 8f 68 b0 dc 63 ed 2b |;..... }..h..c.+| -00000030 fa 38 90 fb c4 6a 77 16 1d 4a 82 fc ef c9 ec 9c |.8...jw..J......| -00000040 a1 3e fb a4 7a 34 d4 |.>..z4.|" -"2019-05-02 01:31:16.886 UTC [protoutils] checkSignatureFromCreator -> DEBU 2328 exits successfully" -"2019-05-02 01:31:16.886 UTC [protoutils] validateEndorserTransaction -> DEBU 2329 validateEndorserTransaction starts for data 0xc0031dc800, header channel_header:"\010\003\032\014\010\342\220\251\346\005\020\234\223\310\363\002\"\017businesschannel*@1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\246EoS\362g\377\022\267\335\2744f~e\033\217\2667\230\274\357\241\317" " -"2019-05-02 01:31:16.886 UTC [protoutils] validateEndorserTransaction -> DEBU 232a validateEndorserTransaction info: there are 1 actions" -"2019-05-02 01:31:16.886 UTC [protoutils] validateEndorserTransaction -> DEBU 232b validateEndorserTransaction info: signature header is valid" -"2019-05-02 01:31:16.886 UTC [protoutils] ValidateTransaction -> DEBU 232c ValidateTransactionEnvelope returns err %!s()" -"2019-05-02 01:31:16.887 UTC [committer.txvalidator] validateTx -> DEBU 232d Transaction is for channel businesschannel" -"2019-05-02 01:31:16.887 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 232e retrieveTransactionByID() - txId = [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183]" -"2019-05-02 01:31:16.887 UTC [committer.txvalidator] validateTx -> DEBU 232f Validating transaction with plugins" -"2019-05-02 01:31:16.887 UTC [committer.txvalidator] Dispatch -> DEBU 2330 [businesschannel] Dispatch starts for bytes 0xc000333000" -"2019-05-02 01:31:16.887 UTC [msp.identity] Verify -> DEBU 2331 Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -"2019-05-02 01:31:16.887 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2332 constructing new query executor txid = [80629d70-6e13-4a48-ae7a-b58983117c56]" -"2019-05-02 01:31:16.887 UTC [msp.identity] Verify -> DEBU 2333 Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -"2019-05-02 01:31:16.887 UTC [stateleveldb] GetState -> DEBU 2334 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -"2019-05-02 01:31:16.887 UTC [stateleveldb] GetState -> DEBU 2335 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:16.887 UTC [stateleveldb] GetState -> DEBU 2336 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" -"2019-05-02 01:31:16.887 UTC [stateleveldb] GetState -> DEBU 2337 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" -"2019-05-02 01:31:16.887 UTC [msp] DeserializeIdentity -> DEBU 2338 Obtaining identity" -"2019-05-02 01:31:16.888 UTC [stateleveldb] GetState -> DEBU 2339 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" -"2019-05-02 01:31:16.888 UTC [lockbasedtxmgr] Done -> DEBU 233a Done with transaction simulation / query execution [80629d70-6e13-4a48-ae7a-b58983117c56]" -"2019-05-02 01:31:16.888 UTC [msp] DeserializeIdentity -> DEBU 233b Obtaining identity" -"2019-05-02 01:31:16.888 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 233c Validating Tx 1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183, seq 0 out of 1 in block 7 for channel businesschannel with validation plugin vscc with plugin" -"2019-05-02 01:31:16.888 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 233d constructing new query executor txid = [cb1bae8d-ee32-4b62-b605-d7d577175e0e]" -"2019-05-02 01:31:16.888 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 233e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:16.888 UTC [lockbasedtxmgr] Done -> DEBU 233f Done with transaction simulation / query execution [cb1bae8d-ee32-4b62-b605-d7d577175e0e]" -"2019-05-02 01:31:16.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2340 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2341 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.888 UTC [policies] Evaluate -> DEBU 2342 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func1 -> DEBU 2343 0xc0021eb220 gate 1556760676888326500 evaluation starts" -"2019-05-02 01:31:16.888 UTC [policies] Evaluate -> DEBU 2344 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2345 0xc0021eb220 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:16.888 UTC [policies] Evaluate -> DEBU 2346 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2347 0xc0021eb220 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func1 -> DEBU 2348 0xc0021d4e20 gate 1556760676888426400 evaluation starts" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2349 0xc0021eb220 principal matched by identity 0" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 234a 0xc0021d4e20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:16.888 UTC [msp.identity] Verify -> DEBU 234b Verify: digest = 00000000 ed 44 8a 5d 28 e7 27 d2 86 42 a0 06 fe 24 67 52 |.D.](.'..B...$gR| -00000010 25 a0 35 8a f5 2c a4 cd 2a a3 d7 c5 83 9e 53 e6 |%.5..,..*.....S.|" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 234c 0xc0021d4e20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:16.888 UTC [msp.identity] Verify -> DEBU 234d Verify: sig = 00000000 30 44 02 20 23 47 83 1e bb 3e be 6c 3a 4a 3b 89 |0D. #G...>.l:J;.| -00000010 84 49 fe 9c af 60 2c c2 23 94 d7 07 15 16 e9 e6 |.I...`,.#.......| -00000020 20 3f ed f9 02 20 62 72 e0 db 5e 78 c4 2e 83 e7 | ?... br..^x....| -00000030 7d d3 2b b9 55 43 88 de 1c 61 3c f5 ba 07 71 a5 |}.+.UC...a<...q.| -00000040 dd 98 f6 48 0f 0f |...H..|" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 234e 0xc0021d4e20 principal matched by identity 0" -"2019-05-02 01:31:16.888 UTC [msp.identity] Verify -> DEBU 234f Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2350 0xc0021eb220 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2351 0xc0021eb220 signed by 1 principal evaluation starts (used [true])" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2352 0xc0021eb220 skipping identity 0 because it has already been used" -"2019-05-02 01:31:16.888 UTC [cauthdsl] func2 -> DEBU 2353 0xc0021eb220 principal evaluation fails" -"2019-05-02 01:31:16.889 UTC [cauthdsl] func1 -> DEBU 2354 0xc0021eb220 gate 1556760676888326500 evaluation succeeds" -"2019-05-02 01:31:16.889 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2355 constructing new query executor txid = [93aebac9-04e8-426b-8fe7-460229bc2e01]" -"2019-05-02 01:31:16.889 UTC [lockbasedtxmgr] Done -> DEBU 2356 Done with transaction simulation / query execution [93aebac9-04e8-426b-8fe7-460229bc2e01]" -"2019-05-02 01:31:16.889 UTC [vscc] Validate -> DEBU 2357 block 7, namespace: exp02, tx 0 validation results is: " -"2019-05-02 01:31:16.889 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2358 Transaction 1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183 appears to be valid" -"2019-05-02 01:31:16.889 UTC [committer.txvalidator] Dispatch -> DEBU 2359 [businesschannel] Dispatch completes env bytes 0xc000333000" -"2019-05-02 01:31:16.890 UTC [committer.txvalidator] validateTx -> DEBU 235a [businesschannel] validateTx completes for block 0xc0030ddfc0 env 0xc002d2a230 txn 0" -"2019-05-02 01:31:16.890 UTC [committer.txvalidator] Validate -> DEBU 235b got result for idx 0, code 0" -"2019-05-02 01:31:16.890 UTC [committer.txvalidator] Validate -> INFO 235c [businesschannel] Validated block [7] in 9ms" -"2019-05-02 01:31:16.890 UTC [gossip.privdata] listMissingPrivateData -> DEBU 235d Retrieving private write sets for 0 transactions from transient store" -"2019-05-02 01:31:16.891 UTC [gossip.privdata] StoreBlock -> DEBU 235e [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-05-02 01:31:16.891 UTC [kvledger] CommitWithPvtData -> DEBU 235f [businesschannel] Validating state for block [7]" -"2019-05-02 01:31:16.891 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2360 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:31:16.891 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2361 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-05-02 01:31:16.891 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2362 Validating new block with num trans = [1]" -"2019-05-02 01:31:16.892 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2363 ValidateAndPrepareBatch() for block number = [7]" -"2019-05-02 01:31:16.892 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2364 preprocessing ProtoBlock..." -"2019-05-02 01:31:16.892 UTC [valimpl] preprocessProtoBlock -> DEBU 2365 txType=ENDORSER_TRANSACTION" -"2019-05-02 01:31:16.893 UTC [stateleveldb] GetState -> DEBU 2366 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:16.893 UTC [statebasedval] validateKVRead -> DEBU 2367 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" -"2019-05-02 01:31:16.893 UTC [stateleveldb] GetState -> DEBU 2368 GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:16.893 UTC [statebasedval] validateKVRead -> DEBU 2369 Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" -"2019-05-02 01:31:16.893 UTC [stateleveldb] GetState -> DEBU 236a GetState(). ns=exp02, key=a" -"2019-05-02 01:31:16.893 UTC [statebasedval] validateKVRead -> DEBU 236b Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" -"2019-05-02 01:31:16.893 UTC [stateleveldb] GetState -> DEBU 236c GetState(). ns=exp02, key=b" -"2019-05-02 01:31:16.894 UTC [statebasedval] validateKVRead -> DEBU 236d Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" -"2019-05-02 01:31:16.894 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 236e Block [7] Transaction index [0] TxId [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183] marked as valid by state validator. ContainsPostOrderWrites [false]" -"2019-05-02 01:31:16.888 UTC [msp.identity] Verify -> DEBU 236f Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -00000040 d4 55 93 6a 4b 9f |.U.jK.|" -"2019-05-02 01:31:16.894 UTC [valinternal] ApplyWriteSet -> DEBU 2370 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002f8f240), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002f8f280)}" -"2019-05-02 01:31:16.894 UTC [cauthdsl] func2 -> DEBU 2371 0xc0021d4e20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:16.894 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2372 validating rwset..." -"2019-05-02 01:31:16.894 UTC [cauthdsl] func1 -> DEBU 2373 0xc0021d4e20 gate 1556760676888426400 evaluation succeeds" -"2019-05-02 01:31:16.894 UTC [policies] Evaluate -> DEBU 2374 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.894 UTC [policies] Evaluate -> DEBU 2375 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.894 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2376 postprocessing ProtoBlock..." -"2019-05-02 01:31:16.894 UTC [policies] Evaluate -> DEBU 2377 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:16.894 UTC [policies] Evaluate -> DEBU 2378 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:16.894 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2379 ValidateAndPrepareBatch() complete" -"2019-05-02 01:31:16.895 UTC [kvledger] CommitWithPvtData -> DEBU 237b [businesschannel] Committing block [7] to storage" -"2019-05-02 01:31:16.895 UTC [ledgerstorage] CommitWithPvtData -> DEBU 237c Writing block [7] to pvt block store" -"2019-05-02 01:31:16.895 UTC [gossip.gossip] handleMessage -> DEBU 237a Exiting" -"2019-05-02 01:31:16.895 UTC [gossip.gossip] handleMessage -> DEBU 237d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.896 UTC [msp.identity] Verify -> DEBU 237e Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -"2019-05-02 01:31:16.896 UTC [msp.identity] Verify -> DEBU 237f Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -"2019-05-02 01:31:16.898 UTC [pvtdatastorage] Prepare -> DEBU 2380 Saved 0 private data write sets for block [7]" -"2019-05-02 01:31:16.899 UTC [msp.identity] Verify -> DEBU 2381 Verify: digest = 00000000 fc ff 39 04 73 5f f2 e7 22 8c 8d 03 43 80 10 39 |..9.s_.."...C..9| -00000010 39 de 51 1a 50 4b 65 5f ca e2 8f 95 ab b2 6a 11 |9.Q.PKe_......j.|" -"2019-05-02 01:31:16.899 UTC [msp.identity] Verify -> DEBU 2382 Verify: sig = 00000000 30 44 02 20 31 63 e7 d7 ca 29 06 4b 0c b8 2f d3 |0D. 1c...).K../.| -00000010 cf 33 24 de af a1 d9 80 f5 d6 88 2b be 6e 9b d6 |.3$........+.n..| -00000020 02 56 c7 d3 02 20 37 96 4f d3 5d 67 35 f9 62 31 |.V... 7.O.]g5.b1| -00000030 4e a5 a9 f8 41 75 9e 28 28 65 7f 20 73 9f 6e ce |N...Au.((e. s.n.| -00000040 89 1e b4 1b 9d da |......|" -"2019-05-02 01:31:16.899 UTC [msp] DeserializeIdentity -> DEBU 2383 Obtaining identity" -"2019-05-02 01:31:16.899 UTC [msp] DeserializeIdentity -> DEBU 2384 Obtaining identity" -"2019-05-02 01:31:16.899 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2385 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:16.902 UTC [fsblkstorage] indexBlock -> DEBU 2386 Indexing block [blockNum=7, blockHash=[]byte{0xbc, 0xfa, 0x3c, 0x5a, 0xf3, 0x9f, 0x56, 0x93, 0x3b, 0x6f, 0xab, 0xd3, 0xf7, 0xd1, 0x48, 0x7b, 0xa0, 0x71, 0x3f, 0x9, 0x7d, 0xfc, 0x8, 0x82, 0xd0, 0xc4, 0xc7, 0x31, 0xfc, 0x30, 0x55, 0x44} txOffsets= -txId=1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183 locPointer=offset=70, bytesLength=3044 +"2019-05-02 09:27:45.144 UTC [msp.identity] Verify -> DEBU 2215 Verify: sig = 00000000 30 45 02 21 00 88 e8 c9 ee a7 1d 17 02 22 75 77 |0E.!........."uw| +00000010 61 24 48 be 3f ab d6 25 c1 0f c2 b6 fb 5c ab d6 |a$H.?..%.....\..| +00000020 40 4d 99 b4 e1 02 20 50 0f b6 9f 16 0d 04 a3 49 |@M.... P.......I| +00000030 dd 0d 3c 95 76 01 6f d7 ac 6f d3 fa 1e 48 f6 52 |..<.v.o..o...H.R| +00000040 47 10 65 6d 9e cb 0f |G.em...|" +"2019-05-02 09:27:45.145 UTC [gossip.discovery] handleAliveMessage -> DEBU 2216 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:45.145 UTC [gossip.discovery] isSentByMe -> DEBU 2217 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:45.146 UTC [gossip.discovery] handleAliveMessage -> DEBU 2218 Exiting" +"2019-05-02 09:27:45.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2219 Exiting" +"2019-05-02 09:27:45.163 UTC [gossip.gossip] handleMessage -> DEBU 221a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.163 UTC [gossip.pull] HandleMessage -> DEBU 221b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221c Obtaining identity" +"2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221d Obtaining identity" +"2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221e Obtaining identity" +"2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 221f Obtaining identity" +"2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 2220 Obtaining identity" +"2019-05-02 09:27:45.164 UTC [msp] DeserializeIdentity -> DEBU 2221 Obtaining identity" +"2019-05-02 09:27:45.165 UTC [gossip.pull] SendDigest -> DEBU 2222 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:45.165 UTC [gossip.gossip] handleMessage -> DEBU 2223 Exiting" +"2019-05-02 09:27:45.172 UTC [gossip.gossip] handleMessage -> DEBU 2224 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.172 UTC [gossip.gossip] handleMessage -> DEBU 2225 Exiting" +"2019-05-02 09:27:45.173 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2226 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.173 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2227 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:45.173 UTC [msp] DeserializeIdentity -> DEBU 2228 Obtaining identity" +"2019-05-02 09:27:45.173 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2229 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:45.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 222a Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:45.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 222b Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:45.173 UTC [policies] Evaluate -> DEBU 222c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:45.173 UTC [policies] Evaluate -> DEBU 222d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:45.173 UTC [policies] Evaluate -> DEBU 222e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:45.173 UTC [cauthdsl] func1 -> DEBU 222f 0xc00416ae50 gate 1556789265173787200 evaluation starts" +"2019-05-02 09:27:45.173 UTC [cauthdsl] func2 -> DEBU 2230 0xc00416ae50 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:45.173 UTC [cauthdsl] func2 -> DEBU 2231 0xc00416ae50 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:45.173 UTC [cauthdsl] func2 -> DEBU 2232 0xc00416ae50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 2233 0xc00416ae50 principal evaluation fails" +"2019-05-02 09:27:45.174 UTC [cauthdsl] func1 -> DEBU 2234 0xc00416ae50 gate 1556789265173787200 evaluation fails" +"2019-05-02 09:27:45.174 UTC [policies] Evaluate -> DEBU 2235 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:45.174 UTC [policies] Evaluate -> DEBU 2236 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:45.174 UTC [policies] Evaluate -> DEBU 2237 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:45.174 UTC [cauthdsl] func1 -> DEBU 2238 0xc00416b690 gate 1556789265174471200 evaluation starts" +"2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 2239 0xc00416b690 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 223a 0xc00416b690 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:45.174 UTC [cauthdsl] func2 -> DEBU 223b 0xc00416b690 principal matched by identity 0" +"2019-05-02 09:27:45.174 UTC [msp.identity] Verify -> DEBU 223c Verify: digest = 00000000 8c c9 77 5f dc 20 1e c0 75 c9 e6 c0 7e 28 ed 6f |..w_. ..u...~(.o| +00000010 8e ec 7f 13 de 3e 35 6c 7f 0d 02 ad 8c 6d ff fd |.....>5l.....m..|" +"2019-05-02 09:27:45.174 UTC [msp.identity] Verify -> DEBU 223d Verify: sig = 00000000 30 44 02 20 38 86 bf 71 09 6b 99 bc 37 b1 97 7b |0D. 8..q.k..7..{| +00000010 59 63 58 fc 5b 10 a2 9d dc 10 9a 45 a5 56 8b 55 |YcX.[......E.V.U| +00000020 9b f8 fe cf 02 20 2d 89 c7 49 58 b9 1e bf ef b2 |..... -..IX.....| +00000030 05 bc 95 f2 a9 81 f2 52 03 22 10 a2 29 ee 06 97 |.......R."..)...| +00000040 9c 37 68 e1 92 b4 |.7h...|" +"2019-05-02 09:27:45.175 UTC [cauthdsl] func2 -> DEBU 223e 0xc00416b690 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:45.175 UTC [cauthdsl] func1 -> DEBU 223f 0xc00416b690 gate 1556789265174471200 evaluation succeeds" +"2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2240 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2241 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2242 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:45.175 UTC [policies] Evaluate -> DEBU 2243 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:45.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 2244 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:45.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2245 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:45.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2246 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 " +"2019-05-02 09:27:45.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2247 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 " +"2019-05-02 09:27:45.179 UTC [gossip.discovery] learnExistingMembers -> DEBU 2248 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:45.184 UTC [gossip.discovery] learnExistingMembers -> DEBU 2249 Exiting" +"2019-05-02 09:27:45.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 224a Exiting" +"2019-05-02 09:27:45.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 224b Exiting" +"2019-05-02 09:27:45.186 UTC [gossip.discovery] sendMemResponse -> DEBU 224c Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:45.187 UTC [msp] DeserializeIdentity -> DEBU 224d Obtaining identity" +"2019-05-02 09:27:45.187 UTC [msp] DeserializeIdentity -> DEBU 224e Obtaining identity" +"2019-05-02 09:27:45.188 UTC [msp] DeserializeIdentity -> DEBU 224f Obtaining identity" +"2019-05-02 09:27:45.189 UTC [gossip.comm] Send -> DEBU 2250 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:45.189 UTC [gossip.discovery] sendMemResponse -> DEBU 2251 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:45.189 UTC [gossip.comm] sendToEndpoint -> DEBU 2252 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:45.194 UTC [gossip.comm] sendToEndpoint -> DEBU 2253 Exiting" +"2019-05-02 09:27:45.322 UTC [endorser] ProcessProposal -> DEBU 2254 Entering: request from 172.18.0.8:57352" +"2019-05-02 09:27:45.322 UTC [protoutils] ValidateProposalMessage -> DEBU 2255 ValidateProposalMessage starts for signed proposal 0xc004137e50" +"2019-05-02 09:27:45.322 UTC [protoutils] validateChannelHeader -> DEBU 2256 validateChannelHeader info: header type 3" +"2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 2257 begin" +"2019-05-02 09:27:45.322 UTC [msp] GetManagerForChain -> DEBU 2258 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 2259 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 225a creator is valid" +"2019-05-02 09:27:45.322 UTC [msp.identity] Verify -> DEBU 225b Verify: digest = 00000000 2d e0 ff d0 2b d5 0d 85 d5 d4 af 5a 7c ad 21 b9 |-...+......Z|.!.| +00000010 24 9c 85 1c e3 b7 f5 62 28 32 08 e7 2d ba a6 0b |$......b(2..-...|" +"2019-05-02 09:27:45.322 UTC [msp.identity] Verify -> DEBU 225c Verify: sig = 00000000 30 45 02 21 00 c4 3b 72 9f 30 b0 15 7c 55 11 b7 |0E.!..;r.0..|U..| +00000010 a6 74 e7 31 2b 5f 4b a0 c0 3e 78 2c 9d ff 0a 61 |.t.1+_K..>x,...a| +00000020 55 b0 8b 91 a1 02 20 01 72 3b 1d cc dc c1 68 ac |U..... .r;....h.| +00000030 c8 0d d8 67 91 7a 3b 0d 93 c7 36 0e b5 c5 4c 3f |...g.z;...6...L?| +00000040 28 5d 38 9f c0 5e 09 |(]8..^.|" +"2019-05-02 09:27:45.322 UTC [protoutils] checkSignatureFromCreator -> DEBU 225d exits successfully" +"2019-05-02 09:27:45.323 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 225e validateChaincodeProposalMessage starts for proposal 0xc00335c0e0, header 0xc0041d8280" +"2019-05-02 09:27:45.323 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 225f validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-05-02 09:27:45.323 UTC [endorser] preProcess -> DEBU 2260 [businesschannel][de605872] processing txid: de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f" +"2019-05-02 09:27:45.323 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2261 retrieveTransactionByID() - txId = [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]" +"2019-05-02 09:27:45.323 UTC [aclmgmt] CheckACL -> DEBU 2262 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-05-02 09:27:45.323 UTC [aclmgmt] CheckACL -> DEBU 2263 acl check(/Channel/Application/Writers)" +"2019-05-02 09:27:45.323 UTC [policies] Evaluate -> DEBU 2264 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:45.323 UTC [policies] Evaluate -> DEBU 2265 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:45.323 UTC [policies] Evaluate -> DEBU 2266 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:45.323 UTC [cauthdsl] func1 -> DEBU 2267 0xc0041f02c0 gate 1556789265323656200 evaluation starts" +"2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 2268 0xc0041f02c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 2269 0xc0041f02c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 226a 0xc0041f02c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:45.323 UTC [cauthdsl] func2 -> DEBU 226b 0xc0041f02c0 principal evaluation fails" +"2019-05-02 09:27:45.323 UTC [cauthdsl] func1 -> DEBU 226c 0xc0041f02c0 gate 1556789265323656200 evaluation fails" +"2019-05-02 09:27:45.324 UTC [policies] Evaluate -> DEBU 226d Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:45.324 UTC [policies] Evaluate -> DEBU 226e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:45.324 UTC [policies] Evaluate -> DEBU 226f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-05-02 09:27:45.324 UTC [cauthdsl] func1 -> DEBU 2270 0xc0041f0b20 gate 1556789265324623400 evaluation starts" +"2019-05-02 09:27:45.324 UTC [cauthdsl] func2 -> DEBU 2271 0xc0041f0b20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:45.324 UTC [cauthdsl] func2 -> DEBU 2272 0xc0041f0b20 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:45.324 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2273 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-05-02 09:27:45.325 UTC [msp] Validate -> DEBU 2274 MSP Org2MSP validating identity" +"2019-05-02 09:27:45.325 UTC [msp] getCertificationChain -> DEBU 2275 MSP Org2MSP getting certification chain" +"2019-05-02 09:27:45.325 UTC [cauthdsl] func2 -> DEBU 2276 0xc0041f0b20 principal matched by identity 0" +"2019-05-02 09:27:45.326 UTC [msp.identity] Verify -> DEBU 2277 Verify: digest = 00000000 2d e0 ff d0 2b d5 0d 85 d5 d4 af 5a 7c ad 21 b9 |-...+......Z|.!.| +00000010 24 9c 85 1c e3 b7 f5 62 28 32 08 e7 2d ba a6 0b |$......b(2..-...|" +"2019-05-02 09:27:45.326 UTC [msp.identity] Verify -> DEBU 2278 Verify: sig = 00000000 30 45 02 21 00 c4 3b 72 9f 30 b0 15 7c 55 11 b7 |0E.!..;r.0..|U..| +00000010 a6 74 e7 31 2b 5f 4b a0 c0 3e 78 2c 9d ff 0a 61 |.t.1+_K..>x,...a| +00000020 55 b0 8b 91 a1 02 20 01 72 3b 1d cc dc c1 68 ac |U..... .r;....h.| +00000030 c8 0d d8 67 91 7a 3b 0d 93 c7 36 0e b5 c5 4c 3f |...g.z;...6...L?| +00000040 28 5d 38 9f c0 5e 09 |(]8..^.|" +"2019-05-02 09:27:45.327 UTC [cauthdsl] func2 -> DEBU 2279 0xc0041f0b20 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:45.327 UTC [cauthdsl] func1 -> DEBU 227a 0xc0041f0b20 gate 1556789265324623400 evaluation succeeds" +"2019-05-02 09:27:45.327 UTC [policies] Evaluate -> DEBU 227b Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:45.327 UTC [policies] Evaluate -> DEBU 227c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:45.328 UTC [policies] Evaluate -> DEBU 227d Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:45.328 UTC [policies] Evaluate -> DEBU 227e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:45.328 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 227f constructing new tx simulator" +"2019-05-02 09:27:45.328 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2280 constructing new tx simulator txid = [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]" +"2019-05-02 09:27:45.328 UTC [endorser] SimulateProposal -> DEBU 2281 [businesschannel][de605872] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:45.328 UTC [stateleveldb] GetState -> DEBU 2282 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:45.329 UTC [endorser] callChaincode -> INFO 2283 [businesschannel][de605872] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:45.329 UTC [stateleveldb] GetState -> DEBU 2284 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:45.329 UTC [stateleveldb] GetState -> DEBU 2285 GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:45.329 UTC [chaincode] Execute -> DEBU 2286 Entry" +"2019-05-02 09:27:45.330 UTC [chaincode] handleMessage -> DEBU 2287 [de605872] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:45.330 UTC [chaincode] HandleTransaction -> DEBU 2288 [de605872] handling GET_STATE from chaincode" +"2019-05-02 09:27:45.330 UTC [chaincode] HandleGetState -> DEBU 2289 [de605872] getting state for chaincode exp02, key a, channel businesschannel" +"2019-05-02 09:27:45.330 UTC [stateleveldb] GetState -> DEBU 228a GetState(). ns=exp02, key=a" +"2019-05-02 09:27:45.330 UTC [chaincode] HandleTransaction -> DEBU 228b [de605872] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:45.331 UTC [chaincode] handleMessage -> DEBU 228c [de605872] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:45.331 UTC [chaincode] Notify -> DEBU 228d [de605872] notifying Txid:de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f, channelID:businesschannel" +"2019-05-02 09:27:45.332 UTC [chaincode] Execute -> DEBU 228e Exit" +"2019-05-02 09:27:45.332 UTC [endorser] callChaincode -> INFO 228f [businesschannel][de605872] Exit chaincode: name:"exp02" (3ms)" +"2019-05-02 09:27:45.332 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2290 Simulation completed, getting simulation results" +"2019-05-02 09:27:45.332 UTC [lockbasedtxmgr] Done -> DEBU 2291 Done with transaction simulation / query execution [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]" +"2019-05-02 09:27:45.332 UTC [endorser] SimulateProposal -> DEBU 2292 [businesschannel][de605872] Exit" +"2019-05-02 09:27:45.332 UTC [endorser] endorseProposal -> DEBU 2293 [businesschannel][de605872] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:45.332 UTC [endorser] endorseProposal -> DEBU 2294 [businesschannel][de605872] escc for chaincode name:"exp02" is escc" +"2019-05-02 09:27:45.332 UTC [endorser] EndorseWithPlugin -> DEBU 2295 Entering endorsement for {plugin: escc, channel: businesschannel, tx: de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f, chaincode: exp02}" +"2019-05-02 09:27:45.333 UTC [msp.identity] Sign -> DEBU 2296 Sign: plaintext: 0A20F6C623970F9D58181ED63FB6D75F...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:45.333 UTC [msp.identity] Sign -> DEBU 2297 Sign: digest: 5A0D03AB58C36305ECE64C8543B56F4EE8D1F3FA8EC3D88057007C7E511C498B " +"2019-05-02 09:27:45.333 UTC [endorser] EndorseWithPlugin -> DEBU 2298 Exiting {plugin: escc, channel: businesschannel, tx: de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f, chaincode: exp02}" +"2019-05-02 09:27:45.333 UTC [endorser] endorseProposal -> DEBU 2299 [businesschannel][de605872] Exit" +"2019-05-02 09:27:45.333 UTC [lockbasedtxmgr] Done -> DEBU 229a Done with transaction simulation / query execution [de6058721e017a0e1198b1cfa5b0dd4e8346320cc51237462df40e375c8e228f]" +"2019-05-02 09:27:45.333 UTC [endorser] func1 -> DEBU 229b Exit: request from 172.18.0.8:57352" +"2019-05-02 09:27:45.334 UTC [comm.grpc.server] 1 -> INFO 229c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57352 grpc.code=OK grpc.call_duration=12.1359ms +"2019-05-02 09:27:45.337 UTC [grpc] infof -> DEBU 229d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:45.338 UTC [grpc] infof -> DEBU 229e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:46.984 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 229f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:46.984 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 22a0 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:46.985 UTC [policies] Evaluate -> DEBU 22a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-05-02 09:27:46.985 UTC [policies] Evaluate -> DEBU 22a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:46.986 UTC [policies] Evaluate -> DEBU 22a3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:46.986 UTC [cauthdsl] func1 -> DEBU 22a4 0xc0041574d0 gate 1556789266986610200 evaluation starts" +"2019-05-02 09:27:46.987 UTC [cauthdsl] func2 -> DEBU 22a5 0xc0041574d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:46.987 UTC [cauthdsl] func2 -> DEBU 22a6 0xc0041574d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:46.987 UTC [cauthdsl] func2 -> DEBU 22a7 0xc0041574d0 principal matched by identity 0" +"2019-05-02 09:27:46.988 UTC [msp.identity] Verify -> DEBU 22a8 Verify: digest = 00000000 d3 92 47 e6 d2 77 f0 f0 95 28 55 b9 1c 06 0b c5 |..G..w...(U.....| +00000010 f5 f3 0a 60 cb c3 a5 20 28 b7 13 7a 99 ca e9 73 |...`... (..z...s|" +"2019-05-02 09:27:46.988 UTC [msp.identity] Verify -> DEBU 22a9 Verify: sig = 00000000 30 45 02 21 00 dd 9a 7a e4 73 fb d3 1b 2e 48 0e |0E.!...z.s....H.| +00000010 37 5a f8 37 28 97 67 32 cd 69 d8 31 90 8d df db |7Z.7(.g2.i.1....| +00000020 f0 de 69 e0 48 02 20 31 e7 d6 c6 97 ec d9 18 53 |..i.H. 1.......S| +00000030 0f 3f d6 b5 2a e3 61 70 a6 bd 80 93 27 3b 0e 6a |.?..*.ap....';.j| +00000040 12 3e 55 9f 88 ea 41 |.>U...A|" +"2019-05-02 09:27:46.989 UTC [cauthdsl] func2 -> DEBU 22aa 0xc0041574d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:46.989 UTC [cauthdsl] func1 -> DEBU 22ab 0xc0041574d0 gate 1556789266986610200 evaluation succeeds" +"2019-05-02 09:27:46.989 UTC [policies] Evaluate -> DEBU 22ac Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:46.989 UTC [policies] Evaluate -> DEBU 22ad == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:46.990 UTC [policies] Evaluate -> DEBU 22ae Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:46.990 UTC [policies] Evaluate -> DEBU 22af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:46.991 UTC [blocksProvider] DeliverBlocks -> DEBU 22b0 [businesschannel] Adding payload to local buffer, blockNum = [7]" +"2019-05-02 09:27:46.991 UTC [gossip.state] addPayload -> DEBU 22b1 [businesschannel] Adding payload to local buffer, blockNum = [7]" +"2019-05-02 09:27:46.992 UTC [gossip.state] deliverPayloads -> DEBU 22b2 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [7]" +"2019-05-02 09:27:46.992 UTC [gossip.state] deliverPayloads -> DEBU 22b3 [businesschannel] Transferring block [7] with 1 transaction(s) to the ledger" +"2019-05-02 09:27:46.992 UTC [gossip.privdata] StoreBlock -> INFO 22b4 [businesschannel] Received block [7] from buffer" +"2019-05-02 09:27:46.992 UTC [gossip.privdata] StoreBlock -> DEBU 22b5 [businesschannel] Validating block [7]" +"2019-05-02 09:27:46.993 UTC [committer.txvalidator] Validate -> DEBU 22b6 [businesschannel] START Block Validation for block [7]" +"2019-05-02 09:27:46.993 UTC [committer.txvalidator] Validate -> DEBU 22b7 expecting 1 block validation responses" +"2019-05-02 09:27:46.994 UTC [committer.txvalidator] validateTx -> DEBU 22b8 [businesschannel] validateTx starts for block 0xc0041d29c0 env 0xc0041d90e0 txn 0" +"2019-05-02 09:27:46.994 UTC [protoutils] ValidateTransaction -> DEBU 22b9 ValidateTransactionEnvelope starts for envelope 0xc0041d90e0" +"2019-05-02 09:27:46.994 UTC [protoutils] ValidateTransaction -> DEBU 22ba Header is channel_header:"\010\003\032\014\010\220\360\252\346\005\020\334\272\367\274\003\"\017businesschannel*@91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\325\267p\330j`&s\353E#\337\215\224N\315o\354\306\363;\032\026(" " +"2019-05-02 09:27:46.995 UTC [protoutils] validateChannelHeader -> DEBU 22bb validateChannelHeader info: header type 3" +"2019-05-02 09:27:46.995 UTC [protoutils] checkSignatureFromCreator -> DEBU 22bc begin" +"2019-05-02 09:27:46.995 UTC [msp] GetManagerForChain -> DEBU 22bd Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:46.996 UTC [protoutils] checkSignatureFromCreator -> DEBU 22be creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:46.996 UTC [protoutils] checkSignatureFromCreator -> DEBU 22bf creator is valid" +"2019-05-02 09:27:46.996 UTC [msp.identity] Verify -> DEBU 22c0 Verify: digest = 00000000 4b 54 f8 96 1e 46 32 1a 3e 10 d7 c7 2f 4b 4e af |KT...F2.>.../KN.| +00000010 64 13 11 09 83 a2 1e 74 33 1e 72 d2 2d 1e 49 33 |d......t3.r.-.I3|" +"2019-05-02 09:27:46.997 UTC [msp.identity] Verify -> DEBU 22c1 Verify: sig = 00000000 30 45 02 21 00 9a 74 50 45 f1 33 ed 80 bc 70 62 |0E.!..tPE.3...pb| +00000010 a6 3b 96 31 9d 46 f9 6f cb c3 bf 48 3c 00 f1 ff |.;.1.F.o...H<...| +00000020 0e ef 32 4e a2 02 20 6f f9 b6 f8 46 5b ad 9b 89 |..2N.. o...F[...| +00000030 9f 71 ee 1f 7e b2 2f e3 88 bf f4 76 96 0a a8 04 |.q..~./....v....| +00000040 fe 64 c2 00 aa 35 b0 |.d...5.|" +"2019-05-02 09:27:46.997 UTC [protoutils] checkSignatureFromCreator -> DEBU 22c2 exits successfully" +"2019-05-02 09:27:46.997 UTC [protoutils] validateEndorserTransaction -> DEBU 22c3 validateEndorserTransaction starts for data 0xc00402f800, header channel_header:"\010\003\032\014\010\220\360\252\346\005\020\334\272\367\274\003\"\017businesschannel*@91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\325\267p\330j`&s\353E#\337\215\224N\315o\354\306\363;\032\026(" " +"2019-05-02 09:27:46.997 UTC [protoutils] validateEndorserTransaction -> DEBU 22c4 validateEndorserTransaction info: there are 1 actions" +"2019-05-02 09:27:46.997 UTC [protoutils] validateEndorserTransaction -> DEBU 22c5 validateEndorserTransaction info: signature header is valid" +"2019-05-02 09:27:46.997 UTC [protoutils] ValidateTransaction -> DEBU 22c6 ValidateTransactionEnvelope returns err %!s()" +"2019-05-02 09:27:46.997 UTC [committer.txvalidator] validateTx -> DEBU 22c7 Transaction is for channel businesschannel" +"2019-05-02 09:27:46.997 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 22c8 retrieveTransactionByID() - txId = [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0]" +"2019-05-02 09:27:46.997 UTC [committer.txvalidator] validateTx -> DEBU 22c9 Validating transaction with plugins" +"2019-05-02 09:27:46.997 UTC [committer.txvalidator] Dispatch -> DEBU 22ca [businesschannel] Dispatch starts for bytes 0xc004213800" +"2019-05-02 09:27:46.997 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22cb constructing new query executor txid = [5714fa25-243e-4135-82b2-fe9a41defd5b]" +"2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22cc GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22cd GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22ce GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +"2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22cf GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +"2019-05-02 09:27:46.997 UTC [stateleveldb] GetState -> DEBU 22d0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +"2019-05-02 09:27:46.998 UTC [lockbasedtxmgr] Done -> DEBU 22d1 Done with transaction simulation / query execution [5714fa25-243e-4135-82b2-fe9a41defd5b]" +"2019-05-02 09:27:46.998 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 22d2 Validating Tx 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0, seq 0 out of 1 in block 7 for channel businesschannel with validation plugin vscc with plugin" +"2019-05-02 09:27:46.998 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22d3 constructing new query executor txid = [4eab909c-d0cf-46c5-9dd6-ffd07f73f019]" +"2019-05-02 09:27:46.998 UTC [lockbasedtxmgr] Done -> DEBU 22d4 Done with transaction simulation / query execution [4eab909c-d0cf-46c5-9dd6-ffd07f73f019]" +"2019-05-02 09:27:46.998 UTC [cauthdsl] func1 -> DEBU 22d5 0xc004223eb0 gate 1556789266998451400 evaluation starts" +"2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22d6 0xc004223eb0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22d7 0xc004223eb0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22d8 0xc004223eb0 principal matched by identity 0" +"2019-05-02 09:27:46.998 UTC [msp.identity] Verify -> DEBU 22d9 Verify: digest = 00000000 9a c0 1a b8 d4 61 55 0f 68 63 ae 26 39 a7 25 bb |.....aU.hc.&9.%.| +00000010 3a e3 fb 9d 57 2f cf 35 92 1f 0c 19 5b 81 f4 8d |:...W/.5....[...|" +"2019-05-02 09:27:46.998 UTC [msp.identity] Verify -> DEBU 22da Verify: sig = 00000000 30 44 02 20 5a 55 d1 09 16 cf f3 36 7f 98 0c ff |0D. ZU.....6....| +00000010 af a2 95 09 ac be d0 3c cd f4 cb 98 2c 09 83 83 |.......<....,...| +00000020 5a 28 70 2f 02 20 74 cc 5c 69 b5 90 20 ba b8 b7 |Z(p/. t.\i.. ...| +00000030 6f 04 bb f6 31 b1 78 ed 2c d0 75 b9 8d de d7 e7 |o...1.x.,.u.....| +00000040 24 f4 b0 c4 23 eb |$...#.|" +"2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22db 0xc004223eb0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22dc 0xc004223eb0 signed by 1 principal evaluation starts (used [true])" +"2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22dd 0xc004223eb0 skipping identity 0 because it has already been used" +"2019-05-02 09:27:46.998 UTC [cauthdsl] func2 -> DEBU 22de 0xc004223eb0 principal evaluation fails" +"2019-05-02 09:27:46.998 UTC [cauthdsl] func1 -> DEBU 22df 0xc004223eb0 gate 1556789266998451400 evaluation succeeds" +"2019-05-02 09:27:46.999 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22e0 constructing new query executor txid = [6d2656e0-315f-4b33-ac46-c67014f3b812]" +"2019-05-02 09:27:46.999 UTC [lockbasedtxmgr] Done -> DEBU 22e1 Done with transaction simulation / query execution [6d2656e0-315f-4b33-ac46-c67014f3b812]" +"2019-05-02 09:27:46.999 UTC [vscc] Validate -> DEBU 22e2 block 7, namespace: exp02, tx 0 validation results is: " +"2019-05-02 09:27:46.999 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 22e3 Transaction 91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0 appears to be valid" +"2019-05-02 09:27:46.999 UTC [committer.txvalidator] Dispatch -> DEBU 22e4 [businesschannel] Dispatch completes env bytes 0xc004213800" +"2019-05-02 09:27:46.999 UTC [committer.txvalidator] validateTx -> DEBU 22e5 [businesschannel] validateTx completes for block 0xc0041d29c0 env 0xc0041d90e0 txn 0" +"2019-05-02 09:27:46.999 UTC [committer.txvalidator] Validate -> DEBU 22e6 got result for idx 0, code 0" +"2019-05-02 09:27:46.999 UTC [committer.txvalidator] Validate -> INFO 22e7 [businesschannel] Validated block [7] in 6ms" +"2019-05-02 09:27:46.999 UTC [gossip.privdata] listMissingPrivateData -> DEBU 22e8 Retrieving private write sets for 0 transactions from transient store" +"2019-05-02 09:27:46.999 UTC [gossip.privdata] StoreBlock -> DEBU 22e9 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-05-02 09:27:47.001 UTC [gossip.state] addPayload -> DEBU 22ea Blocks payloads buffer size for channel [businesschannel] is 0 blocks" +"2019-05-02 09:27:47.001 UTC [blocksProvider] DeliverBlocks -> DEBU 22eb [businesschannel] Gossiping block [7], peers number [3]" +"2019-05-02 09:27:47.002 UTC [gossip.channel] AddToMsgStore -> DEBU 22ec Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 7}, Envelope: 4093 bytes, Signature: 0 bytes to the block puller" +"2019-05-02 09:27:47.002 UTC [gossip.pull] Add -> DEBU 22ee Added 7, total items: 7" +"2019-05-02 09:27:46.999 UTC [kvledger] CommitWithPvtData -> DEBU 22ed [businesschannel] Validating state for block [7]" +"2019-05-02 09:27:47.002 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 22ef Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:27:47.003 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 22f0 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-05-02 09:27:47.003 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 22f1 Validating new block with num trans = [1]" +"2019-05-02 09:27:47.003 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 22f2 ValidateAndPrepareBatch() for block number = [7]" +"2019-05-02 09:27:47.004 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 22f3 preprocessing ProtoBlock..." +"2019-05-02 09:27:47.004 UTC [valimpl] preprocessProtoBlock -> DEBU 22f4 txType=ENDORSER_TRANSACTION" +"2019-05-02 09:27:47.004 UTC [stateleveldb] GetState -> DEBU 22f5 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:47.005 UTC [statebasedval] validateKVRead -> DEBU 22f6 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +"2019-05-02 09:27:47.005 UTC [stateleveldb] GetState -> DEBU 22f7 GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:47.005 UTC [statebasedval] validateKVRead -> DEBU 22f8 Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +"2019-05-02 09:27:47.006 UTC [stateleveldb] GetState -> DEBU 22f9 GetState(). ns=exp02, key=a" +"2019-05-02 09:27:47.006 UTC [statebasedval] validateKVRead -> DEBU 22fa Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +"2019-05-02 09:27:47.006 UTC [stateleveldb] GetState -> DEBU 22fb GetState(). ns=exp02, key=b" +"2019-05-02 09:27:47.006 UTC [statebasedval] validateKVRead -> DEBU 22fc Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +"2019-05-02 09:27:47.006 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 22fd Block [7] Transaction index [0] TxId [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-05-02 09:27:47.006 UTC [valinternal] ApplyWriteSet -> DEBU 22fe txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00407d9c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00407da00)}" +"2019-05-02 09:27:47.006 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 22ff validating rwset..." +"2019-05-02 09:27:47.006 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2300 postprocessing ProtoBlock..." +"2019-05-02 09:27:47.006 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2301 ValidateAndPrepareBatch() complete" +"2019-05-02 09:27:47.006 UTC [kvledger] CommitWithPvtData -> DEBU 2302 [businesschannel] Committing block [7] to storage" +"2019-05-02 09:27:47.006 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2303 Writing block [7] to pvt block store" +"2019-05-02 09:27:47.007 UTC [msp] DeserializeIdentity -> DEBU 2304 Obtaining identity" +"2019-05-02 09:27:47.008 UTC [msp] DeserializeIdentity -> DEBU 2305 Obtaining identity" +"2019-05-02 09:27:47.009 UTC [msp] DeserializeIdentity -> DEBU 2306 Obtaining identity" +"2019-05-02 09:27:47.009 UTC [msp] DeserializeIdentity -> DEBU 2307 Obtaining identity" +"2019-05-02 09:27:47.010 UTC [gossip.comm] Send -> DEBU 2308 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 7}, Envelope: 4093 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:47.010 UTC [gossip.comm] sendToEndpoint -> DEBU 2309 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 7}, Envelope: 4093 bytes, Signature: 0 bytes" +"2019-05-02 09:27:47.010 UTC [gossip.comm] sendToEndpoint -> DEBU 230a Exiting" +"2019-05-02 09:27:47.010 UTC [msp] DeserializeIdentity -> DEBU 230b Obtaining identity" +"2019-05-02 09:27:47.017 UTC [msp] DeserializeIdentity -> DEBU 230c Obtaining identity" +"2019-05-02 09:27:47.017 UTC [pvtdatastorage] Prepare -> DEBU 230d Saved 0 private data write sets for block [7]" +"2019-05-02 09:27:47.020 UTC [fsblkstorage] indexBlock -> DEBU 230e Indexing block [blockNum=7, blockHash=[]byte{0x30, 0xa6, 0xff, 0xc, 0x32, 0x27, 0x9e, 0xbc, 0xbb, 0x79, 0xcc, 0xe2, 0x1a, 0x7f, 0x74, 0x43, 0x84, 0x98, 0x45, 0x15, 0x41, 0x88, 0x33, 0xee, 0x2a, 0x32, 0x97, 0xdb, 0xcf, 0x57, 0x3f, 0x8c} txOffsets= +txId=91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0 locPointer=offset=70, bytesLength=3044 ]" -"2019-05-02 01:31:16.902 UTC [fsblkstorage] indexBlock -> DEBU 2387 Adding txLoc [fileSuffixNum=0, offset=90641, bytesLength=3044] for tx ID: [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183] to txid-index" -"2019-05-02 01:31:16.902 UTC [fsblkstorage] indexBlock -> DEBU 2388 Adding txLoc [fileSuffixNum=0, offset=90641, bytesLength=3044] for tx number:[0] ID: [1a343f6c634d022e5afe57bd1b20a410ca31d0ba6f3e41dc8512ee44028fe183] to blockNumTranNum index" -"2019-05-02 01:31:16.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2389 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.903 UTC [msp] DeserializeIdentity -> DEBU 238a Obtaining identity" -"2019-05-02 01:31:16.905 UTC [msp] DeserializeIdentity -> DEBU 238b Obtaining identity" -"2019-05-02 01:31:16.906 UTC [msp] DeserializeIdentity -> DEBU 238c Obtaining identity" -"2019-05-02 01:31:16.908 UTC [msp] DeserializeIdentity -> DEBU 238d Obtaining identity" -"2019-05-02 01:31:16.909 UTC [fsblkstorage] updateCheckpoint -> DEBU 238e Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94622], isChainEmpty=[false], lastBlockNumber=[7]" -"2019-05-02 01:31:16.909 UTC [pvtdatastorage] Commit -> DEBU 238f Committing private data for block [7]" -"2019-05-02 01:31:16.909 UTC [gossip.comm] Send -> DEBU 2390 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:16.911 UTC [msp] DeserializeIdentity -> DEBU 2391 Obtaining identity" -"2019-05-02 01:31:16.911 UTC [msp] DeserializeIdentity -> DEBU 2392 Obtaining identity" -"2019-05-02 01:31:16.912 UTC [gossip.comm] sendToEndpoint -> DEBU 2393 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.913 UTC [gossip.comm] sendToEndpoint -> DEBU 2395 Exiting" -"2019-05-02 01:31:16.913 UTC [pvtdatastorage] Commit -> DEBU 2396 Committed private data for block [7]" -"2019-05-02 01:31:16.914 UTC [kvledger] CommitWithPvtData -> DEBU 2397 [businesschannel] Committing block [7] transactions to state database" -"2019-05-02 01:31:16.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2394 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.914 UTC [lockbasedtxmgr] Commit -> DEBU 2398 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-05-02 01:31:16.915 UTC [lockbasedtxmgr] Commit -> DEBU 239a Committing updates to state database" -"2019-05-02 01:31:16.916 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 239b Building the expiry schedules based on the update batch" -"2019-05-02 01:31:16.915 UTC [policies] Evaluate -> DEBU 2399 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:16.916 UTC [lockbasedtxmgr] Commit -> DEBU 239c Write lock acquired for committing updates to state database" -"2019-05-02 01:31:16.917 UTC [stateleveldb] ApplyUpdates -> DEBU 239e Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -"2019-05-02 01:31:16.917 UTC [stateleveldb] ApplyUpdates -> DEBU 239f Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -"2019-05-02 01:31:16.917 UTC [policies] Evaluate -> DEBU 239d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:16.918 UTC [msp] DeserializeIdentity -> DEBU 23a0 Obtaining identity" -"2019-05-02 01:31:16.919 UTC [policies] Evaluate -> DEBU 23a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:16.919 UTC [cauthdsl] func1 -> DEBU 23a2 0xc00214f3f0 gate 1556760676919890500 evaluation starts" -"2019-05-02 01:31:16.920 UTC [cauthdsl] func2 -> DEBU 23a3 0xc00214f3f0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:16.920 UTC [cauthdsl] func2 -> DEBU 23a4 0xc00214f3f0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:16.920 UTC [cauthdsl] func2 -> DEBU 23a5 0xc00214f3f0 principal matched by identity 0" -"2019-05-02 01:31:16.921 UTC [msp.identity] Verify -> DEBU 23a6 Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -"2019-05-02 01:31:16.921 UTC [msp.identity] Verify -> DEBU 23a7 Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -00000040 d4 55 93 6a 4b 9f |.U.jK.|" -"2019-05-02 01:31:16.922 UTC [cauthdsl] func2 -> DEBU 23a8 0xc00214f3f0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:16.922 UTC [cauthdsl] func1 -> DEBU 23a9 0xc00214f3f0 gate 1556760676919890500 evaluation succeeds" -"2019-05-02 01:31:16.922 UTC [policies] Evaluate -> DEBU 23aa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.922 UTC [policies] Evaluate -> DEBU 23ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.923 UTC [policies] Evaluate -> DEBU 23ac Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:16.923 UTC [policies] Evaluate -> DEBU 23ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:16.923 UTC [msp] DeserializeIdentity -> DEBU 23ae Obtaining identity" -"2019-05-02 01:31:16.924 UTC [msp] DeserializeIdentity -> DEBU 23af Obtaining identity" -"2019-05-02 01:31:16.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23b0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:16.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23b1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23b2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.926 UTC [policies] Evaluate -> DEBU 23b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:16.926 UTC [policies] Evaluate -> DEBU 23b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:16.927 UTC [policies] Evaluate -> DEBU 23b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:16.927 UTC [cauthdsl] func1 -> DEBU 23b6 0xc002146fe0 gate 1556760676927709500 evaluation starts" -"2019-05-02 01:31:16.928 UTC [cauthdsl] func2 -> DEBU 23b7 0xc002146fe0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:16.928 UTC [cauthdsl] func2 -> DEBU 23b8 0xc002146fe0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:16.928 UTC [cauthdsl] func2 -> DEBU 23b9 0xc002146fe0 principal matched by identity 0" -"2019-05-02 01:31:16.929 UTC [msp.identity] Verify -> DEBU 23ba Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -"2019-05-02 01:31:16.929 UTC [msp.identity] Verify -> DEBU 23bb Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -00000040 f7 8f 39 95 02 eb |..9...|" -"2019-05-02 01:31:16.930 UTC [cauthdsl] func2 -> DEBU 23bc 0xc002146fe0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:16.930 UTC [cauthdsl] func1 -> DEBU 23bd 0xc002146fe0 gate 1556760676927709500 evaluation succeeds" -"2019-05-02 01:31:16.930 UTC [policies] Evaluate -> DEBU 23be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.931 UTC [policies] Evaluate -> DEBU 23bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.931 UTC [policies] Evaluate -> DEBU 23c0 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:16.931 UTC [policies] Evaluate -> DEBU 23c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:16.932 UTC [gossip.gossip] handleMessage -> DEBU 23c2 Exiting" -"2019-05-02 01:31:16.932 UTC [gossip.gossip] handleMessage -> DEBU 23c3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.933 UTC [msp] DeserializeIdentity -> DEBU 23c4 Obtaining identity" -"2019-05-02 01:31:16.933 UTC [msp] DeserializeIdentity -> DEBU 23c5 Obtaining identity" -"2019-05-02 01:31:16.934 UTC [msp] DeserializeIdentity -> DEBU 23c6 Obtaining identity" -"2019-05-02 01:31:16.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:16.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23c9 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23ca Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.919 UTC [msp] DeserializeIdentity -> DEBU 23c8 Obtaining identity" -"2019-05-02 01:31:16.937 UTC [policies] Evaluate -> DEBU 23cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:16.938 UTC [policies] Evaluate -> DEBU 23cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:16.938 UTC [gossip.pull] Hello -> DEBU 23cc Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:16.939 UTC [policies] Evaluate -> DEBU 23ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:16.939 UTC [cauthdsl] func1 -> DEBU 23d1 0xc0002ae2a0 gate 1556760676939954600 evaluation starts" -"2019-05-02 01:31:16.940 UTC [cauthdsl] func2 -> DEBU 23d2 0xc0002ae2a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:16.940 UTC [cauthdsl] func2 -> DEBU 23d3 0xc0002ae2a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:16.939 UTC [msp] DeserializeIdentity -> DEBU 23cf Obtaining identity" -"2019-05-02 01:31:16.939 UTC [lockbasedtxmgr] Commit -> DEBU 23d0 Updates committed to state database and the write lock is released" -"2019-05-02 01:31:16.941 UTC [cauthdsl] func2 -> DEBU 23d4 0xc0002ae2a0 principal matched by identity 0" -"2019-05-02 01:31:16.942 UTC [msp.identity] Verify -> DEBU 23d8 Verify: digest = 00000000 80 96 a3 80 07 38 36 17 b4 1e 95 b1 d5 45 55 07 |.....86......EU.| -00000010 ad 8c e3 7a 8b 73 db d2 d3 51 6a 8d f0 3d 31 8c |...z.s...Qj..=1.|" -"2019-05-02 01:31:16.942 UTC [msp.identity] Verify -> DEBU 23d9 Verify: sig = 00000000 30 44 02 20 39 d4 da fc 35 9c eb df ae 1e 78 1d |0D. 9...5.....x.| -00000010 c3 04 50 87 e3 b6 55 c9 1b 71 5f 37 f1 65 66 22 |..P...U..q_7.ef"| -00000020 9d 74 c2 b5 02 20 39 bf d1 44 13 06 25 70 a2 65 |.t... 9..D..%p.e| -00000030 08 a9 f6 64 d1 aa 1e 9a 97 da 52 16 10 0c bd 65 |...d......R....e| -00000040 d4 55 93 6a 4b 9f |.U.jK.|" -"2019-05-02 01:31:16.941 UTC [msp] DeserializeIdentity -> DEBU 23d5 Obtaining identity" -"2019-05-02 01:31:16.942 UTC [cauthdsl] func2 -> DEBU 23da 0xc0002ae2a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:16.943 UTC [cauthdsl] func1 -> DEBU 23db 0xc0002ae2a0 gate 1556760676939954600 evaluation succeeds" -"2019-05-02 01:31:16.943 UTC [gossip.comm] Send -> DEBU 23dc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:16.943 UTC [policies] Evaluate -> DEBU 23dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.944 UTC [policies] Evaluate -> DEBU 23de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.944 UTC [policies] Evaluate -> DEBU 23e0 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:16.944 UTC [policies] Evaluate -> DEBU 23e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:16.944 UTC [gossip.comm] sendToEndpoint -> DEBU 23df Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.945 UTC [gossip.comm] sendToEndpoint -> DEBU 23e2 Exiting" -"2019-05-02 01:31:16.945 UTC [msp.identity] Verify -> DEBU 23e3 Verify: digest = 00000000 fc ff 39 04 73 5f f2 e7 22 8c 8d 03 43 80 10 39 |..9.s_.."...C..9| -00000010 39 de 51 1a 50 4b 65 5f ca e2 8f 95 ab b2 6a 11 |9.Q.PKe_......j.|" -"2019-05-02 01:31:16.945 UTC [msp.identity] Verify -> DEBU 23e4 Verify: sig = 00000000 30 44 02 20 31 63 e7 d7 ca 29 06 4b 0c b8 2f d3 |0D. 1c...).K../.| -00000010 cf 33 24 de af a1 d9 80 f5 d6 88 2b be 6e 9b d6 |.3$........+.n..| -00000020 02 56 c7 d3 02 20 37 96 4f d3 5d 67 35 f9 62 31 |.V... 7.O.]g5.b1| -00000030 4e a5 a9 f8 41 75 9e 28 28 65 7f 20 73 9f 6e ce |N...Au.((e. s.n.| -00000040 89 1e b4 1b 9d da |......|" -"2019-05-02 01:31:16.942 UTC [lockbasedtxmgr] func1 -> DEBU 23d7 launched the background routine for preparing keys to purge with the next block" -"2019-05-02 01:31:16.942 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 23d6 Preparing potential purge list working-set for expiringAtBlk [8]" -"2019-05-02 01:31:16.946 UTC [msp.identity] Verify -> DEBU 23e5 Verify: digest = 00000000 ff 09 bd dd 0c 1f e5 7a 3d cc 27 ca 5e b6 e2 a9 |.......z=.'.^...| -00000010 d6 4b 14 b6 cb 82 b2 cf 3b 10 ce b4 50 b1 ae 64 |.K......;...P..d|" -"2019-05-02 01:31:16.947 UTC [msp.identity] Verify -> DEBU 23e8 Verify: sig = 00000000 30 45 02 21 00 8d b6 60 15 60 fc b9 16 ff 06 29 |0E.!...`.`.....)| -00000010 d9 99 e9 16 53 08 6c ab cb 02 3c b4 2b eb 79 32 |....S.l...<.+.y2| -00000020 0c b8 c0 a1 6c 02 20 7e ff 47 0b 2e a4 58 ec d9 |....l. ~.G...X..| -00000030 82 c3 8d 0b d9 13 81 f1 04 d2 3f 52 39 6d e7 b2 |..........?R9m..| -00000040 21 3c 26 d5 60 14 9f |!<&.`..|" -"2019-05-02 01:31:16.948 UTC [msp] DeserializeIdentity -> DEBU 23e9 Obtaining identity" -"2019-05-02 01:31:16.948 UTC [msp] DeserializeIdentity -> DEBU 23ea Obtaining identity" -"2019-05-02 01:31:16.947 UTC [kvledger] CommitWithPvtData -> DEBU 23e6 [businesschannel] Committing block [7] transactions to history database" -"2019-05-02 01:31:16.947 UTC [leveldbhelper] GetIterator -> DEBU 23e7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}]" -"2019-05-02 01:31:16.949 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23eb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:16.950 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23ee Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.950 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23ef Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:16.949 UTC [historyleveldb] Commit -> DEBU 23ec Channel [businesschannel]: Updating history database for blockNo [7] with [1] transactions" -"2019-05-02 01:31:16.949 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 23ed No expiry entry found for expiringAtBlk [8]" -"2019-05-02 01:31:16.951 UTC [policies] Evaluate -> DEBU 23f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:16.951 UTC [policies] Evaluate -> DEBU 23f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:16.951 UTC [policies] Evaluate -> DEBU 23f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:16.952 UTC [cauthdsl] func1 -> DEBU 23f3 0xc0002163c0 gate 1556760676952215100 evaluation starts" -"2019-05-02 01:31:16.952 UTC [cauthdsl] func2 -> DEBU 23f4 0xc0002163c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:16.952 UTC [cauthdsl] func2 -> DEBU 23f5 0xc0002163c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:16.952 UTC [cauthdsl] func2 -> DEBU 23f6 0xc0002163c0 principal matched by identity 0" -"2019-05-02 01:31:16.952 UTC [msp.identity] Verify -> DEBU 23f7 Verify: digest = 00000000 20 66 b2 02 af b8 6f a0 12 64 62 89 f7 ee 40 ce | f....o..db...@.| -00000010 74 30 95 02 c6 2f 00 74 4b 51 3e 26 49 3d 13 2d |t0.../.tKQ>&I=.-|" -"2019-05-02 01:31:16.952 UTC [msp.identity] Verify -> DEBU 23f8 Verify: sig = 00000000 30 44 02 20 30 4c 91 5f 17 54 bd 01 ae b8 33 f6 |0D. 0L._.T....3.| -00000010 f9 92 45 0c af aa ea 62 9b a3 48 a1 b1 04 8f 4f |..E....b..H....O| -00000020 58 7a 73 ac 02 20 2e 47 1c 5a 9b 5a ae 84 6f fe |Xzs.. .G.Z.Z..o.| -00000030 76 63 47 24 10 9a 72 dd be 0f b3 be 8d a3 fd a7 |vcG$..r.........| -00000040 f7 8f 39 95 02 eb |..9...|" -"2019-05-02 01:31:16.953 UTC [cauthdsl] func2 -> DEBU 23f9 0xc0002163c0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:16.953 UTC [cauthdsl] func1 -> DEBU 23fa 0xc0002163c0 gate 1556760676952215100 evaluation succeeds" -"2019-05-02 01:31:16.953 UTC [policies] Evaluate -> DEBU 23fb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.954 UTC [policies] Evaluate -> DEBU 23fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:16.954 UTC [policies] Evaluate -> DEBU 23fd Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:16.954 UTC [policies] Evaluate -> DEBU 23fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:16.954 UTC [gossip.gossip] handleMessage -> DEBU 23ff Exiting" -"2019-05-02 01:31:16.954 UTC [gossip.gossip] handleMessage -> DEBU 2400 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3811937157707965733 , Msg_type: BLOCK_MSG, digests: [7 1 2 3 4 5 6], Envelope: 54 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.954 UTC [gossip.pull] HandleMessage -> DEBU 2401 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3811937157707965733 , Msg_type: BLOCK_MSG, digests: [7 1 2 3 4 5 6], Envelope: 54 bytes, Signature: 0 bytes" -"2019-05-02 01:31:16.954 UTC [gossip.gossip] handleMessage -> DEBU 2402 Exiting" -"2019-05-02 01:31:16.955 UTC [historyleveldb] Commit -> DEBU 2403 Channel [businesschannel]: Updates committed to history database for blockNo [7]" -"2019-05-02 01:31:16.955 UTC [kvledger] CommitWithPvtData -> INFO 2404 [businesschannel] Committed block [7] with 1 transaction(s) in 64ms (state_validation=3ms block_commit=19ms state_commit=33ms)" -"2019-05-02 01:31:16.956 UTC [msp.identity] Sign -> DEBU 2405 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020808 " -"2019-05-02 01:31:16.957 UTC [msp.identity] Sign -> DEBU 2406 Sign: digest: C14FEDF2E855610FB923A63BF8848E89273834A9F791DA93D4A0CFCD79935565 " -"2019-05-02 01:31:16.958 UTC [gossip.state] commitBlock -> DEBU 2407 [businesschannel] Committed block [7] with 1 transaction(s)" -"2019-05-02 01:31:16.980 UTC [gossip.election] waitForInterrupt -> DEBU 2408 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:16.980 UTC [gossip.election] IsLeader -> DEBU 2409 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:16.981 UTC [msp.identity] Sign -> DEBU 240a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510081801 " -"2019-05-02 01:31:16.981 UTC [msp.identity] Sign -> DEBU 240b Sign: digest: 0B5DD07478DE45747F36EA13C5FC8CF1D4DD2E2AA47F82AA463B4CEAD692BEC8 " -"2019-05-02 01:31:16.982 UTC [gossip.election] waitForInterrupt -> DEBU 240c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:16.990 UTC [msp] DeserializeIdentity -> DEBU 240d Obtaining identity" -"2019-05-02 01:31:16.990 UTC [msp] DeserializeIdentity -> DEBU 240e Obtaining identity" -"2019-05-02 01:31:16.991 UTC [msp] DeserializeIdentity -> DEBU 240f Obtaining identity" -"2019-05-02 01:31:16.991 UTC [msp] DeserializeIdentity -> DEBU 2410 Obtaining identity" -"2019-05-02 01:31:16.991 UTC [gossip.comm] Send -> DEBU 2411 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:16.992 UTC [msp] DeserializeIdentity -> DEBU 2412 Obtaining identity" -"2019-05-02 01:31:16.992 UTC [msp] DeserializeIdentity -> DEBU 2414 Obtaining identity" -"2019-05-02 01:31:16.992 UTC [gossip.comm] sendToEndpoint -> DEBU 2413 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -"2019-05-02 01:31:16.993 UTC [gossip.comm] sendToEndpoint -> DEBU 2415 Exiting" -"2019-05-02 01:31:17.089 UTC [gossip.gossip] handleMessage -> DEBU 2416 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.090 UTC [msp] DeserializeIdentity -> DEBU 2417 Obtaining identity" -"2019-05-02 01:31:17.090 UTC [msp] DeserializeIdentity -> DEBU 2418 Obtaining identity" -"2019-05-02 01:31:17.091 UTC [gossip.gossip] handleMessage -> DEBU 2419 Exiting" -"2019-05-02 01:31:17.100 UTC [gossip.gossip] handleMessage -> DEBU 241a Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.100 UTC [msp.identity] Verify -> DEBU 241b Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -"2019-05-02 01:31:17.101 UTC [msp.identity] Verify -> DEBU 241c Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -"2019-05-02 01:31:17.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 241d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 241e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.102 UTC [policies] Evaluate -> DEBU 241f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.102 UTC [policies] Evaluate -> DEBU 2420 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.102 UTC [policies] Evaluate -> DEBU 2421 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.102 UTC [cauthdsl] func1 -> DEBU 2422 0xc000421c40 gate 1556760677102942300 evaluation starts" -"2019-05-02 01:31:17.103 UTC [cauthdsl] func2 -> DEBU 2423 0xc000421c40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.103 UTC [cauthdsl] func2 -> DEBU 2424 0xc000421c40 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.103 UTC [cauthdsl] func2 -> DEBU 2425 0xc000421c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:17.104 UTC [cauthdsl] func2 -> DEBU 2426 0xc000421c40 principal evaluation fails" -"2019-05-02 01:31:17.104 UTC [cauthdsl] func1 -> DEBU 2427 0xc000421c40 gate 1556760677102942300 evaluation fails" -"2019-05-02 01:31:17.105 UTC [policies] Evaluate -> DEBU 2428 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.105 UTC [policies] Evaluate -> DEBU 2429 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.105 UTC [policies] Evaluate -> DEBU 242a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:17.106 UTC [cauthdsl] func1 -> DEBU 242b 0xc000472480 gate 1556760677106078800 evaluation starts" -"2019-05-02 01:31:17.106 UTC [cauthdsl] func2 -> DEBU 242c 0xc000472480 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.106 UTC [cauthdsl] func2 -> DEBU 242d 0xc000472480 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.107 UTC [cauthdsl] func2 -> DEBU 242e 0xc000472480 principal matched by identity 0" -"2019-05-02 01:31:17.107 UTC [msp.identity] Verify -> DEBU 242f Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -"2019-05-02 01:31:17.107 UTC [msp.identity] Verify -> DEBU 2430 Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -"2019-05-02 01:31:17.107 UTC [cauthdsl] func2 -> DEBU 2431 0xc000472480 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.108 UTC [cauthdsl] func1 -> DEBU 2432 0xc000472480 gate 1556760677106078800 evaluation succeeds" -"2019-05-02 01:31:17.108 UTC [policies] Evaluate -> DEBU 2433 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:17.108 UTC [policies] Evaluate -> DEBU 2434 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:17.109 UTC [policies] Evaluate -> DEBU 2435 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.109 UTC [policies] Evaluate -> DEBU 2436 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.109 UTC [gossip.gossip] handleMessage -> DEBU 2437 Exiting" -"2019-05-02 01:31:17.111 UTC [gossip.comm] func1 -> DEBU 2438 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.114 UTC [gossip.gossip] handleMessage -> DEBU 243a Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.115 UTC [msp.identity] Verify -> DEBU 243b Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -"2019-05-02 01:31:17.114 UTC [gossip.comm] func1 -> DEBU 2439 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.115 UTC [msp.identity] Verify -> DEBU 243c Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -"2019-05-02 01:31:17.116 UTC [msp] DeserializeIdentity -> DEBU 243d Obtaining identity" -"2019-05-02 01:31:17.117 UTC [gossip.gossip] handleMessage -> DEBU 243e Exiting" -"2019-05-02 01:31:17.117 UTC [gossip.gossip] handleMessage -> DEBU 243f Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.118 UTC [msp.identity] Verify -> DEBU 2440 Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -"2019-05-02 01:31:17.118 UTC [msp.identity] Verify -> DEBU 2442 Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -"2019-05-02 01:31:17.118 UTC [msp] DeserializeIdentity -> DEBU 2441 Obtaining identity" -"2019-05-02 01:31:17.119 UTC [msp] DeserializeIdentity -> DEBU 2443 Obtaining identity" -"2019-05-02 01:31:17.119 UTC [gossip.comm] Send -> DEBU 2444 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes to 2 peers" -"2019-05-02 01:31:17.120 UTC [msp] DeserializeIdentity -> DEBU 2445 Obtaining identity" -"2019-05-02 01:31:17.120 UTC [msp] DeserializeIdentity -> DEBU 2446 Obtaining identity" -"2019-05-02 01:31:17.120 UTC [gossip.comm] sendToEndpoint -> DEBU 2447 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.121 UTC [gossip.comm] sendToEndpoint -> DEBU 2448 Exiting" -"2019-05-02 01:31:17.121 UTC [gossip.comm] sendToEndpoint -> DEBU 2449 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760676940682200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.121 UTC [gossip.comm] sendToEndpoint -> DEBU 244a Exiting" -"2019-05-02 01:31:17.126 UTC [msp] DeserializeIdentity -> DEBU 244b Obtaining identity" -"2019-05-02 01:31:17.126 UTC [gossip.gossip] handleMessage -> DEBU 244c Exiting" -"2019-05-02 01:31:17.126 UTC [gossip.gossip] handleMessage -> DEBU 244d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.127 UTC [gossip.pull] HandleMessage -> DEBU 244e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.127 UTC [gossip.pull] SendDigest -> DEBU 244f Sending BLOCK_MSG digest: [2 3 4 5 6 7 1] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:17.128 UTC [gossip.gossip] handleMessage -> DEBU 2450 Exiting" -"2019-05-02 01:31:17.223 UTC [endorser] ProcessProposal -> DEBU 2451 Entering: request from 192.168.240.9:41346" -"2019-05-02 01:31:17.224 UTC [protoutils] ValidateProposalMessage -> DEBU 2452 ValidateProposalMessage starts for signed proposal 0xc002ce1950" -"2019-05-02 01:31:17.224 UTC [protoutils] validateChannelHeader -> DEBU 2453 validateChannelHeader info: header type 3" -"2019-05-02 01:31:17.224 UTC [protoutils] checkSignatureFromCreator -> DEBU 2454 begin" -"2019-05-02 01:31:17.224 UTC [msp] GetManagerForChain -> DEBU 2455 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:17.225 UTC [protoutils] checkSignatureFromCreator -> DEBU 2456 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -"2019-05-02 01:31:17.225 UTC [protoutils] checkSignatureFromCreator -> DEBU 2457 creator is valid" -"2019-05-02 01:31:17.225 UTC [msp.identity] Verify -> DEBU 2458 Verify: digest = 00000000 81 d0 10 9c 9e 2f 71 ab 43 a1 81 a4 8f 1e 5d 24 |...../q.C.....]$| -00000010 04 55 ab a4 87 51 26 c6 44 41 c1 1b 84 ce 1a 01 |.U...Q&.DA......|" -"2019-05-02 01:31:17.226 UTC [msp.identity] Verify -> DEBU 2459 Verify: sig = 00000000 30 45 02 21 00 86 24 8f f6 1e eb c9 c2 b1 17 a3 |0E.!..$.........| -00000010 d9 5d c6 c9 60 fa e4 6f 91 02 3c f0 5a 5e 68 25 |.]..`..o..<.Z^h%| -00000020 a5 c8 50 9a 72 02 20 23 a9 fb 5e f7 9f 01 e7 48 |..P.r. #..^....H| -00000030 ac 76 a6 c8 b8 bf 39 ee ba ee 47 bf 67 4f 1e 5f |.v....9...G.gO._| -00000040 a3 ed e3 13 23 93 e8 |....#..|" -"2019-05-02 01:31:17.226 UTC [protoutils] checkSignatureFromCreator -> DEBU 245a exits successfully" -"2019-05-02 01:31:17.226 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 245b validateChaincodeProposalMessage starts for proposal 0xc003403a40, header 0xc002ce1d60" -"2019-05-02 01:31:17.227 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 245c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-05-02 01:31:17.227 UTC [endorser] preProcess -> DEBU 245d [businesschannel][c59b53e2] processing txid: c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76" -"2019-05-02 01:31:17.227 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 245e retrieveTransactionByID() - txId = [c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76]" -"2019-05-02 01:31:17.227 UTC [aclmgmt] CheckACL -> DEBU 245f acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-05-02 01:31:17.228 UTC [aclmgmt] CheckACL -> DEBU 2460 acl check(/Channel/Application/Writers)" -"2019-05-02 01:31:17.228 UTC [policies] Evaluate -> DEBU 2461 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:17.229 UTC [policies] Evaluate -> DEBU 2462 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.229 UTC [policies] Evaluate -> DEBU 2463 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:17.229 UTC [cauthdsl] func1 -> DEBU 2464 0xc00017c700 gate 1556760677229619000 evaluation starts" -"2019-05-02 01:31:17.229 UTC [cauthdsl] func2 -> DEBU 2465 0xc00017c700 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.230 UTC [cauthdsl] func2 -> DEBU 2466 0xc00017c700 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.230 UTC [cauthdsl] func2 -> DEBU 2467 0xc00017c700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:17.230 UTC [cauthdsl] func2 -> DEBU 2468 0xc00017c700 principal evaluation fails" -"2019-05-02 01:31:17.230 UTC [cauthdsl] func1 -> DEBU 2469 0xc00017c700 gate 1556760677229619000 evaluation fails" -"2019-05-02 01:31:17.231 UTC [policies] Evaluate -> DEBU 246a Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:17.231 UTC [policies] Evaluate -> DEBU 246b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:17.231 UTC [policies] Evaluate -> DEBU 246c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:31:17.232 UTC [cauthdsl] func1 -> DEBU 246d 0xc00017d480 gate 1556760677231992600 evaluation starts" -"2019-05-02 01:31:17.232 UTC [cauthdsl] func2 -> DEBU 246e 0xc00017d480 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.232 UTC [cauthdsl] func2 -> DEBU 246f 0xc00017d480 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.233 UTC [cauthdsl] func2 -> DEBU 2470 0xc00017d480 principal matched by identity 0" -"2019-05-02 01:31:17.233 UTC [msp.identity] Verify -> DEBU 2471 Verify: digest = 00000000 81 d0 10 9c 9e 2f 71 ab 43 a1 81 a4 8f 1e 5d 24 |...../q.C.....]$| -00000010 04 55 ab a4 87 51 26 c6 44 41 c1 1b 84 ce 1a 01 |.U...Q&.DA......|" -"2019-05-02 01:31:17.233 UTC [msp.identity] Verify -> DEBU 2472 Verify: sig = 00000000 30 45 02 21 00 86 24 8f f6 1e eb c9 c2 b1 17 a3 |0E.!..$.........| -00000010 d9 5d c6 c9 60 fa e4 6f 91 02 3c f0 5a 5e 68 25 |.]..`..o..<.Z^h%| -00000020 a5 c8 50 9a 72 02 20 23 a9 fb 5e f7 9f 01 e7 48 |..P.r. #..^....H| -00000030 ac 76 a6 c8 b8 bf 39 ee ba ee 47 bf 67 4f 1e 5f |.v....9...G.gO._| -00000040 a3 ed e3 13 23 93 e8 |....#..|" -"2019-05-02 01:31:17.234 UTC [cauthdsl] func2 -> DEBU 2473 0xc00017d480 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.234 UTC [cauthdsl] func1 -> DEBU 2474 0xc00017d480 gate 1556760677231992600 evaluation succeeds" -"2019-05-02 01:31:17.235 UTC [policies] Evaluate -> DEBU 2475 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:17.235 UTC [policies] Evaluate -> DEBU 2476 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:17.235 UTC [policies] Evaluate -> DEBU 2477 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:17.235 UTC [policies] Evaluate -> DEBU 2478 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:17.236 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2479 constructing new tx simulator" -"2019-05-02 01:31:17.236 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 247a constructing new tx simulator txid = [c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76]" -"2019-05-02 01:31:17.236 UTC [endorser] SimulateProposal -> DEBU 247b [businesschannel][c59b53e2] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:17.237 UTC [stateleveldb] GetState -> DEBU 247c GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:17.237 UTC [endorser] callChaincode -> INFO 247d [businesschannel][c59b53e2] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:17.237 UTC [stateleveldb] GetState -> DEBU 247e GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:17.238 UTC [stateleveldb] GetState -> DEBU 247f GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:17.238 UTC [chaincode] Execute -> DEBU 2480 Entry" -"2019-05-02 01:31:17.240 UTC [chaincode] handleMessage -> DEBU 2481 [c59b53e2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:17.240 UTC [chaincode] HandleTransaction -> DEBU 2482 [c59b53e2] handling GET_STATE from chaincode" -"2019-05-02 01:31:17.240 UTC [chaincode] HandleGetState -> DEBU 2483 [c59b53e2] getting state for chaincode exp02, key a, channel businesschannel" -"2019-05-02 01:31:17.240 UTC [stateleveldb] GetState -> DEBU 2484 GetState(). ns=exp02, key=a" -"2019-05-02 01:31:17.240 UTC [chaincode] HandleTransaction -> DEBU 2485 [c59b53e2] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:17.242 UTC [chaincode] handleMessage -> DEBU 2486 [c59b53e2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:17.242 UTC [chaincode] Notify -> DEBU 2487 [c59b53e2] notifying Txid:c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76, channelID:businesschannel" -"2019-05-02 01:31:17.242 UTC [chaincode] Execute -> DEBU 2488 Exit" -"2019-05-02 01:31:17.243 UTC [endorser] callChaincode -> INFO 2489 [businesschannel][c59b53e2] Exit chaincode: name:"exp02" (6ms)" -"2019-05-02 01:31:17.243 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 248a Simulation completed, getting simulation results" -"2019-05-02 01:31:17.243 UTC [lockbasedtxmgr] Done -> DEBU 248b Done with transaction simulation / query execution [c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76]" -"2019-05-02 01:31:17.243 UTC [endorser] SimulateProposal -> DEBU 248c [businesschannel][c59b53e2] Exit" -"2019-05-02 01:31:17.243 UTC [endorser] endorseProposal -> DEBU 248d [businesschannel][c59b53e2] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:17.243 UTC [endorser] endorseProposal -> DEBU 248e [businesschannel][c59b53e2] escc for chaincode name:"exp02" is escc" -"2019-05-02 01:31:17.244 UTC [endorser] EndorseWithPlugin -> DEBU 248f Entering endorsement for {plugin: escc, channel: businesschannel, tx: c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76, chaincode: exp02}" -"2019-05-02 01:31:17.244 UTC [msp.identity] Sign -> DEBU 2490 Sign: plaintext: 0A209765B32CA7C2347A87E5B1894AA7...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:17.244 UTC [msp.identity] Sign -> DEBU 2491 Sign: digest: D655DD2BB5305D7C2DF8138305555ADA45EBEC9DB126D2D5FAE26131E51F2A4B " -"2019-05-02 01:31:17.245 UTC [endorser] EndorseWithPlugin -> DEBU 2492 Exiting {plugin: escc, channel: businesschannel, tx: c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76, chaincode: exp02}" -"2019-05-02 01:31:17.245 UTC [endorser] endorseProposal -> DEBU 2493 [businesschannel][c59b53e2] Exit" -"2019-05-02 01:31:17.245 UTC [lockbasedtxmgr] Done -> DEBU 2494 Done with transaction simulation / query execution [c59b53e27953529f9e1218a6aeeedba67f4f853410d09abc1403b31794a43f76]" -"2019-05-02 01:31:17.245 UTC [endorser] func1 -> DEBU 2495 Exit: request from 192.168.240.9:41346" -"2019-05-02 01:31:17.245 UTC [comm.grpc.server] 1 -> INFO 2496 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41346 grpc.code=OK grpc.call_duration=22.432ms -"2019-05-02 01:31:17.250 UTC [grpc] infof -> DEBU 2497 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:17.250 UTC [grpc] warningf -> DEBU 2498 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41346: read: connection reset by peer" -"2019-05-02 01:31:17.250 UTC [grpc] infof -> DEBU 2499 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:17.315 UTC [gossip.comm] func1 -> DEBU 249a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.316 UTC [gossip.gossip] handleMessage -> DEBU 249b Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.317 UTC [msp] DeserializeIdentity -> DEBU 249c Obtaining identity" -"2019-05-02 01:31:17.317 UTC [msp] DeserializeIdentity -> DEBU 249d Obtaining identity" -"2019-05-02 01:31:17.318 UTC [msp] DeserializeIdentity -> DEBU 249e Obtaining identity" -"2019-05-02 01:31:17.319 UTC [gossip.gossip] handleMessage -> DEBU 249f Exiting" -"2019-05-02 01:31:17.334 UTC [gossip.comm] func1 -> DEBU 24a0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:17.335 UTC [gossip.gossip] handleMessage -> DEBU 24a1 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:17.335 UTC [msp] DeserializeIdentity -> DEBU 24a2 Obtaining identity" -"2019-05-02 01:31:17.336 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24a3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:17.337 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24a4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.338 UTC [gossip.comm] func1 -> DEBU 24a5 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:17.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24a6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.339 UTC [policies] Evaluate -> DEBU 24a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.339 UTC [policies] Evaluate -> DEBU 24a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.340 UTC [policies] Evaluate -> DEBU 24a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.340 UTC [cauthdsl] func1 -> DEBU 24aa 0xc00035a410 gate 1556760677340721100 evaluation starts" -"2019-05-02 01:31:17.341 UTC [cauthdsl] func2 -> DEBU 24ab 0xc00035a410 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.341 UTC [cauthdsl] func2 -> DEBU 24ac 0xc00035a410 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.341 UTC [cauthdsl] func2 -> DEBU 24ad 0xc00035a410 principal matched by identity 0" -"2019-05-02 01:31:17.342 UTC [msp.identity] Verify -> DEBU 24ae Verify: digest = 00000000 bf 19 17 87 78 42 db f7 eb cf d0 d9 08 ee e7 15 |....xB..........| -00000010 4b cc a4 95 06 41 81 d5 eb 5f 3a 7d a9 7c 14 8c |K....A..._:}.|..|" -"2019-05-02 01:31:17.342 UTC [msp.identity] Verify -> DEBU 24af Verify: sig = 00000000 30 44 02 20 25 d8 a0 a8 55 64 cf d4 22 95 b0 2b |0D. %...Ud.."..+| -00000010 9d 19 2a 2d f1 ee ab c7 40 00 b0 25 7c 8c 4e e5 |..*-....@..%|.N.| -00000020 f2 77 cf 80 02 20 10 b1 5c d3 47 5b e8 91 ee aa |.w... ..\.G[....| -00000030 61 ae d2 82 b6 50 a4 6d 3d e3 76 f7 db 98 6e 95 |a....P.m=.v...n.| -00000040 5d c2 20 53 e7 b2 |]. S..|" -"2019-05-02 01:31:17.343 UTC [cauthdsl] func2 -> DEBU 24b0 0xc00035a410 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.343 UTC [cauthdsl] func1 -> DEBU 24b1 0xc00035a410 gate 1556760677340721100 evaluation succeeds" -"2019-05-02 01:31:17.343 UTC [policies] Evaluate -> DEBU 24b2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.344 UTC [policies] Evaluate -> DEBU 24b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.344 UTC [policies] Evaluate -> DEBU 24b4 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.344 UTC [policies] Evaluate -> DEBU 24b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.345 UTC [msp] DeserializeIdentity -> DEBU 24b6 Obtaining identity" -"2019-05-02 01:31:17.345 UTC [msp] DeserializeIdentity -> DEBU 24b7 Obtaining identity" -"2019-05-02 01:31:17.345 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24b8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.345 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24b9 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.346 UTC [policies] Evaluate -> DEBU 24ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.346 UTC [policies] Evaluate -> DEBU 24bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.347 UTC [policies] Evaluate -> DEBU 24bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.347 UTC [cauthdsl] func1 -> DEBU 24bd 0xc00035b610 gate 1556760677347734400 evaluation starts" -"2019-05-02 01:31:17.348 UTC [cauthdsl] func2 -> DEBU 24be 0xc00035b610 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.348 UTC [cauthdsl] func2 -> DEBU 24bf 0xc00035b610 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.348 UTC [cauthdsl] func2 -> DEBU 24c0 0xc00035b610 principal matched by identity 0" -"2019-05-02 01:31:17.349 UTC [msp.identity] Verify -> DEBU 24c1 Verify: digest = 00000000 bf 19 17 87 78 42 db f7 eb cf d0 d9 08 ee e7 15 |....xB..........| -00000010 4b cc a4 95 06 41 81 d5 eb 5f 3a 7d a9 7c 14 8c |K....A..._:}.|..|" -"2019-05-02 01:31:17.349 UTC [msp.identity] Verify -> DEBU 24c2 Verify: sig = 00000000 30 44 02 20 25 d8 a0 a8 55 64 cf d4 22 95 b0 2b |0D. %...Ud.."..+| -00000010 9d 19 2a 2d f1 ee ab c7 40 00 b0 25 7c 8c 4e e5 |..*-....@..%|.N.| -00000020 f2 77 cf 80 02 20 10 b1 5c d3 47 5b e8 91 ee aa |.w... ..\.G[....| -00000030 61 ae d2 82 b6 50 a4 6d 3d e3 76 f7 db 98 6e 95 |a....P.m=.v...n.| -00000040 5d c2 20 53 e7 b2 |]. S..|" -"2019-05-02 01:31:17.350 UTC [cauthdsl] func2 -> DEBU 24c3 0xc00035b610 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.350 UTC [cauthdsl] func1 -> DEBU 24c4 0xc00035b610 gate 1556760677347734400 evaluation succeeds" -"2019-05-02 01:31:17.351 UTC [policies] Evaluate -> DEBU 24c5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.351 UTC [policies] Evaluate -> DEBU 24c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.352 UTC [policies] Evaluate -> DEBU 24c7 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.352 UTC [policies] Evaluate -> DEBU 24c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.352 UTC [gossip.gossip] handleMessage -> DEBU 24c9 Exiting" -"2019-05-02 01:31:17.353 UTC [gossip.gossip] handleMessage -> DEBU 24ca Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:17.353 UTC [msp] DeserializeIdentity -> DEBU 24cb Obtaining identity" -"2019-05-02 01:31:17.354 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:17.355 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24cd Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.357 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24cf Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.357 UTC [policies] Evaluate -> DEBU 24d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.357 UTC [msp] DeserializeIdentity -> DEBU 24ce Obtaining identity" -"2019-05-02 01:31:17.358 UTC [policies] Evaluate -> DEBU 24d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.360 UTC [policies] Evaluate -> DEBU 24d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.360 UTC [cauthdsl] func1 -> DEBU 24d3 0xc0002a1260 gate 1556760677360840000 evaluation starts" -"2019-05-02 01:31:17.361 UTC [cauthdsl] func2 -> DEBU 24d4 0xc0002a1260 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.361 UTC [cauthdsl] func2 -> DEBU 24d5 0xc0002a1260 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.361 UTC [cauthdsl] func2 -> DEBU 24d6 0xc0002a1260 principal matched by identity 0" -"2019-05-02 01:31:17.362 UTC [msp.identity] Verify -> DEBU 24d7 Verify: digest = 00000000 bf 19 17 87 78 42 db f7 eb cf d0 d9 08 ee e7 15 |....xB..........| -00000010 4b cc a4 95 06 41 81 d5 eb 5f 3a 7d a9 7c 14 8c |K....A..._:}.|..|" -"2019-05-02 01:31:17.362 UTC [msp.identity] Verify -> DEBU 24d8 Verify: sig = 00000000 30 44 02 20 25 d8 a0 a8 55 64 cf d4 22 95 b0 2b |0D. %...Ud.."..+| -00000010 9d 19 2a 2d f1 ee ab c7 40 00 b0 25 7c 8c 4e e5 |..*-....@..%|.N.| -00000020 f2 77 cf 80 02 20 10 b1 5c d3 47 5b e8 91 ee aa |.w... ..\.G[....| -00000030 61 ae d2 82 b6 50 a4 6d 3d e3 76 f7 db 98 6e 95 |a....P.m=.v...n.| -00000040 5d c2 20 53 e7 b2 |]. S..|" -"2019-05-02 01:31:17.363 UTC [cauthdsl] func2 -> DEBU 24d9 0xc0002a1260 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.363 UTC [cauthdsl] func1 -> DEBU 24da 0xc0002a1260 gate 1556760677360840000 evaluation succeeds" -"2019-05-02 01:31:17.363 UTC [policies] Evaluate -> DEBU 24db Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.364 UTC [policies] Evaluate -> DEBU 24dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.364 UTC [policies] Evaluate -> DEBU 24dd Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.365 UTC [policies] Evaluate -> DEBU 24de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.365 UTC [msp] DeserializeIdentity -> DEBU 24df Obtaining identity" -"2019-05-02 01:31:17.366 UTC [gossip.gossip] handleMessage -> DEBU 24e0 Exiting" -"2019-05-02 01:31:17.367 UTC [msp] DeserializeIdentity -> DEBU 24e1 Obtaining identity" -"2019-05-02 01:31:17.367 UTC [gossip.comm] Send -> DEBU 24e2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" -"2019-05-02 01:31:17.368 UTC [gossip.comm] sendToEndpoint -> DEBU 24e3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:17.374 UTC [gossip.comm] sendToEndpoint -> DEBU 24e4 Exiting" -"2019-05-02 01:31:17.376 UTC [gossip.comm] sendToEndpoint -> DEBU 24e5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760676877206800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:17.377 UTC [gossip.comm] sendToEndpoint -> DEBU 24e6 Exiting" -"2019-05-02 01:31:17.377 UTC [msp] DeserializeIdentity -> DEBU 24e7 Obtaining identity" -"2019-05-02 01:31:17.378 UTC [msp] DeserializeIdentity -> DEBU 24e8 Obtaining identity" -"2019-05-02 01:31:17.433 UTC [gossip.gossip] handleMessage -> DEBU 24e9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.434 UTC [gossip.pull] HandleMessage -> DEBU 24ea GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.434 UTC [gossip.pull] SendDigest -> DEBU 24eb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:17.434 UTC [gossip.gossip] handleMessage -> DEBU 24ec Exiting" -"2019-05-02 01:31:17.444 UTC [gossip.gossip] handleMessage -> DEBU 24ed Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.444 UTC [gossip.gossip] handleMessage -> DEBU 24ee Exiting" -"2019-05-02 01:31:17.445 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24ef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.445 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24f0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:17.445 UTC [msp.identity] Verify -> DEBU 24f1 Verify: digest = 00000000 74 51 fb 04 9f 73 01 c8 d2 5e 0b 04 90 10 3a ee |tQ...s...^....:.| -00000010 fc c8 fc 1b 76 8c 52 8d 2c cb 80 dd 43 54 5e 1b |....v.R.,...CT^.|" -"2019-05-02 01:31:17.446 UTC [msp.identity] Verify -> DEBU 24f2 Verify: sig = 00000000 30 45 02 21 00 81 df 22 86 db ee 77 5c 55 26 98 |0E.!..."...w\U&.| -00000010 e4 ad 80 a5 ec 62 65 17 95 3a f5 a8 96 a9 51 5a |.....be..:....QZ| -00000020 5c 1d 88 de 0d 02 20 5f ed 13 93 4d e1 e2 77 ec |\..... _...M..w.| -00000030 15 3b 53 ad d1 40 66 b6 a9 24 a0 c6 a7 7e 20 6c |.;S..@f..$...~ l| -00000040 bd 4f 7e 2b f2 bb 76 |.O~+..v|" -"2019-05-02 01:31:17.446 UTC [msp.identity] Verify -> DEBU 24f3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:47.021 UTC [fsblkstorage] indexBlock -> DEBU 230f Adding txLoc [fileSuffixNum=0, offset=90640, bytesLength=3044] for tx ID: [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0] to txid-index" +"2019-05-02 09:27:47.021 UTC [fsblkstorage] indexBlock -> DEBU 2310 Adding txLoc [fileSuffixNum=0, offset=90640, bytesLength=3044] for tx number:[0] ID: [91a569c2666b5261853b25919e35a4ac796d85a981691047aaca043d9027c0b0] to blockNumTranNum index" +"2019-05-02 09:27:47.025 UTC [fsblkstorage] updateCheckpoint -> DEBU 2311 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94622], isChainEmpty=[false], lastBlockNumber=[7]" +"2019-05-02 09:27:47.026 UTC [pvtdatastorage] Commit -> DEBU 2312 Committing private data for block [7]" +"2019-05-02 09:27:47.029 UTC [pvtdatastorage] Commit -> DEBU 2313 Committed private data for block [7]" +"2019-05-02 09:27:47.030 UTC [kvledger] CommitWithPvtData -> DEBU 2314 [businesschannel] Committing block [7] transactions to state database" +"2019-05-02 09:27:47.030 UTC [lockbasedtxmgr] Commit -> DEBU 2315 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-05-02 09:27:47.031 UTC [lockbasedtxmgr] Commit -> DEBU 2316 Committing updates to state database" +"2019-05-02 09:27:47.032 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2317 Building the expiry schedules based on the update batch" +"2019-05-02 09:27:47.032 UTC [lockbasedtxmgr] Commit -> DEBU 2318 Write lock acquired for committing updates to state database" +"2019-05-02 09:27:47.033 UTC [stateleveldb] ApplyUpdates -> DEBU 2319 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-05-02 09:27:47.033 UTC [stateleveldb] ApplyUpdates -> DEBU 231a Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-05-02 09:27:47.035 UTC [lockbasedtxmgr] Commit -> DEBU 231b Updates committed to state database and the write lock is released" +"2019-05-02 09:27:47.036 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 231c Preparing potential purge list working-set for expiringAtBlk [8]" +"2019-05-02 09:27:47.036 UTC [leveldbhelper] GetIterator -> DEBU 231e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}]" +"2019-05-02 09:27:47.037 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 231f No expiry entry found for expiringAtBlk [8]" +"2019-05-02 09:27:47.036 UTC [lockbasedtxmgr] func1 -> DEBU 231d launched the background routine for preparing keys to purge with the next block" +"2019-05-02 09:27:47.037 UTC [kvledger] CommitWithPvtData -> DEBU 2320 [businesschannel] Committing block [7] transactions to history database" +"2019-05-02 09:27:47.038 UTC [historyleveldb] Commit -> DEBU 2321 Channel [businesschannel]: Updating history database for blockNo [7] with [1] transactions" +"2019-05-02 09:27:47.041 UTC [historyleveldb] Commit -> DEBU 2322 Channel [businesschannel]: Updates committed to history database for blockNo [7]" +"2019-05-02 09:27:47.041 UTC [kvledger] CommitWithPvtData -> INFO 2323 [businesschannel] Committed block [7] with 1 transaction(s) in 42ms (state_validation=6ms block_commit=23ms state_commit=7ms)" +"2019-05-02 09:27:47.042 UTC [msp.identity] Sign -> DEBU 2324 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020808 " +"2019-05-02 09:27:47.043 UTC [msp.identity] Sign -> DEBU 2325 Sign: digest: E9B3E104B460C51C8CF5740CF1CC998546E1A13A65EAFD0BADB350E62062E1C4 " +"2019-05-02 09:27:47.044 UTC [gossip.state] commitBlock -> DEBU 2326 [businesschannel] Committed block [7] with 1 transaction(s)" +"2019-05-02 09:27:47.314 UTC [gossip.election] waitForInterrupt -> DEBU 2327 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:27:47.314 UTC [gossip.election] IsLeader -> DEBU 2328 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:27:47.314 UTC [msp.identity] Sign -> DEBU 2329 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510071801 " +"2019-05-02 09:27:47.314 UTC [msp.identity] Sign -> DEBU 232a Sign: digest: 5B75D0F8E2F5C9F45C20539EC24FCC4A203E4F0CC95A479BA6304AB53F061FE2 " +"2019-05-02 09:27:47.315 UTC [gossip.election] waitForInterrupt -> DEBU 232b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232c Obtaining identity" +"2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232d Obtaining identity" +"2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232e Obtaining identity" +"2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 232f Obtaining identity" +"2019-05-02 09:27:47.319 UTC [gossip.comm] Send -> DEBU 2330 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 2331 Obtaining identity" +"2019-05-02 09:27:47.319 UTC [msp] DeserializeIdentity -> DEBU 2332 Obtaining identity" +"2019-05-02 09:27:47.320 UTC [gossip.comm] sendToEndpoint -> DEBU 2333 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-05-02 09:27:47.320 UTC [gossip.comm] sendToEndpoint -> DEBU 2334 Exiting" +"2019-05-02 09:27:47.532 UTC [endorser] ProcessProposal -> DEBU 2335 Entering: request from 172.18.0.8:57356" +"2019-05-02 09:27:47.533 UTC [protoutils] ValidateProposalMessage -> DEBU 2336 ValidateProposalMessage starts for signed proposal 0xc004239720" +"2019-05-02 09:27:47.533 UTC [protoutils] validateChannelHeader -> DEBU 2337 validateChannelHeader info: header type 3" +"2019-05-02 09:27:47.534 UTC [protoutils] checkSignatureFromCreator -> DEBU 2338 begin" +"2019-05-02 09:27:47.534 UTC [msp] GetManagerForChain -> DEBU 2339 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:47.535 UTC [protoutils] checkSignatureFromCreator -> DEBU 233a creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-05-02 09:27:47.535 UTC [protoutils] checkSignatureFromCreator -> DEBU 233b creator is valid" +"2019-05-02 09:27:47.535 UTC [msp.identity] Verify -> DEBU 233c Verify: digest = 00000000 c5 90 c5 a7 80 0c 2f 6c 8e d2 5d 91 0b 51 61 7f |....../l..]..Qa.| +00000010 2c ac 06 3c bb a0 fc 16 ba ea 52 da 02 56 fe 95 |,..<......R..V..|" +"2019-05-02 09:27:47.536 UTC [msp.identity] Verify -> DEBU 233d Verify: sig = 00000000 30 44 02 20 53 d4 25 5d d0 01 2a ca 5c ca 62 af |0D. S.%]..*.\.b.| +00000010 e5 9f 87 7d 88 35 29 10 fb 1c 81 a3 31 31 f4 e5 |...}.5).....11..| +00000020 ef 30 64 bb 02 20 0d 1d a1 9c 26 0a 95 f3 90 c2 |.0d.. ....&.....| +00000030 78 81 cb 4a e7 3d c7 13 95 70 cd c1 14 e9 7b b9 |x..J.=...p....{.| +00000040 d7 bb 89 02 2a 50 |....*P|" +"2019-05-02 09:27:47.536 UTC [protoutils] checkSignatureFromCreator -> DEBU 233e exits successfully" +"2019-05-02 09:27:47.537 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 233f validateChaincodeProposalMessage starts for proposal 0xc00335c930, header 0xc004239b30" +"2019-05-02 09:27:47.537 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2340 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-05-02 09:27:47.537 UTC [endorser] preProcess -> DEBU 2341 [businesschannel][7d336586] processing txid: 7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8" +"2019-05-02 09:27:47.538 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2342 retrieveTransactionByID() - txId = [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]" +"2019-05-02 09:27:47.538 UTC [aclmgmt] CheckACL -> DEBU 2343 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-05-02 09:27:47.538 UTC [aclmgmt] CheckACL -> DEBU 2344 acl check(/Channel/Application/Writers)" +"2019-05-02 09:27:47.539 UTC [policies] Evaluate -> DEBU 2345 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:47.539 UTC [policies] Evaluate -> DEBU 2346 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:47.540 UTC [policies] Evaluate -> DEBU 2347 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:47.540 UTC [cauthdsl] func1 -> DEBU 2348 0xc0042cd4c0 gate 1556789267540791800 evaluation starts" +"2019-05-02 09:27:47.541 UTC [cauthdsl] func2 -> DEBU 2349 0xc0042cd4c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:47.541 UTC [cauthdsl] func2 -> DEBU 234a 0xc0042cd4c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:47.541 UTC [cauthdsl] func2 -> DEBU 234b 0xc0042cd4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:47.542 UTC [cauthdsl] func2 -> DEBU 234c 0xc0042cd4c0 principal evaluation fails" +"2019-05-02 09:27:47.542 UTC [cauthdsl] func1 -> DEBU 234d 0xc0042cd4c0 gate 1556789267540791800 evaluation fails" +"2019-05-02 09:27:47.542 UTC [policies] Evaluate -> DEBU 234e Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 234f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 2350 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-05-02 09:27:47.543 UTC [cauthdsl] func1 -> DEBU 2351 0xc0042cdd00 gate 1556789267543337600 evaluation starts" +"2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2352 0xc0042cdd00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2353 0xc0042cdd00 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2354 0xc0042cdd00 principal matched by identity 0" +"2019-05-02 09:27:47.543 UTC [msp.identity] Verify -> DEBU 2355 Verify: digest = 00000000 c5 90 c5 a7 80 0c 2f 6c 8e d2 5d 91 0b 51 61 7f |....../l..]..Qa.| +00000010 2c ac 06 3c bb a0 fc 16 ba ea 52 da 02 56 fe 95 |,..<......R..V..|" +"2019-05-02 09:27:47.543 UTC [msp.identity] Verify -> DEBU 2356 Verify: sig = 00000000 30 44 02 20 53 d4 25 5d d0 01 2a ca 5c ca 62 af |0D. S.%]..*.\.b.| +00000010 e5 9f 87 7d 88 35 29 10 fb 1c 81 a3 31 31 f4 e5 |...}.5).....11..| +00000020 ef 30 64 bb 02 20 0d 1d a1 9c 26 0a 95 f3 90 c2 |.0d.. ....&.....| +00000030 78 81 cb 4a e7 3d c7 13 95 70 cd c1 14 e9 7b b9 |x..J.=...p....{.| +00000040 d7 bb 89 02 2a 50 |....*P|" +"2019-05-02 09:27:47.543 UTC [cauthdsl] func2 -> DEBU 2357 0xc0042cdd00 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:47.543 UTC [cauthdsl] func1 -> DEBU 2358 0xc0042cdd00 gate 1556789267543337600 evaluation succeeds" +"2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 2359 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 235a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 235b Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:47.543 UTC [policies] Evaluate -> DEBU 235c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:47.543 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 235d constructing new tx simulator" +"2019-05-02 09:27:47.543 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 235e constructing new tx simulator txid = [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]" +"2019-05-02 09:27:47.544 UTC [endorser] SimulateProposal -> DEBU 235f [businesschannel][7d336586] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:47.544 UTC [stateleveldb] GetState -> DEBU 2360 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:47.544 UTC [endorser] callChaincode -> INFO 2361 [businesschannel][7d336586] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:47.544 UTC [stateleveldb] GetState -> DEBU 2362 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:47.544 UTC [stateleveldb] GetState -> DEBU 2363 GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:47.544 UTC [chaincode] Execute -> DEBU 2364 Entry" +"2019-05-02 09:27:47.546 UTC [chaincode] handleMessage -> DEBU 2365 [7d336586] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:47.546 UTC [chaincode] HandleTransaction -> DEBU 2366 [7d336586] handling GET_STATE from chaincode" +"2019-05-02 09:27:47.546 UTC [chaincode] HandleGetState -> DEBU 2367 [7d336586] getting state for chaincode exp02, key a, channel businesschannel" +"2019-05-02 09:27:47.546 UTC [stateleveldb] GetState -> DEBU 2368 GetState(). ns=exp02, key=a" +"2019-05-02 09:27:47.546 UTC [chaincode] HandleTransaction -> DEBU 2369 [7d336586] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:47.547 UTC [chaincode] handleMessage -> DEBU 236a [7d336586] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:47.547 UTC [chaincode] Notify -> DEBU 236b [7d336586] notifying Txid:7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8, channelID:businesschannel" +"2019-05-02 09:27:47.548 UTC [chaincode] Execute -> DEBU 236c Exit" +"2019-05-02 09:27:47.549 UTC [endorser] callChaincode -> INFO 236d [businesschannel][7d336586] Exit chaincode: name:"exp02" (5ms)" +"2019-05-02 09:27:47.549 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 236e Simulation completed, getting simulation results" +"2019-05-02 09:27:47.549 UTC [lockbasedtxmgr] Done -> DEBU 236f Done with transaction simulation / query execution [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]" +"2019-05-02 09:27:47.549 UTC [endorser] SimulateProposal -> DEBU 2370 [businesschannel][7d336586] Exit" +"2019-05-02 09:27:47.549 UTC [endorser] endorseProposal -> DEBU 2371 [businesschannel][7d336586] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:47.549 UTC [endorser] endorseProposal -> DEBU 2372 [businesschannel][7d336586] escc for chaincode name:"exp02" is escc" +"2019-05-02 09:27:47.549 UTC [endorser] EndorseWithPlugin -> DEBU 2373 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8, chaincode: exp02}" +"2019-05-02 09:27:47.549 UTC [msp.identity] Sign -> DEBU 2374 Sign: plaintext: 0A2076AB56B6C271AF5B382DA71F12F1...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:47.550 UTC [msp.identity] Sign -> DEBU 2375 Sign: digest: CA42D06E010E44C96A19B02059A4BF578F48C24305243196437C94821E650622 " +"2019-05-02 09:27:47.550 UTC [endorser] EndorseWithPlugin -> DEBU 2376 Exiting {plugin: escc, channel: businesschannel, tx: 7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8, chaincode: exp02}" +"2019-05-02 09:27:47.550 UTC [endorser] endorseProposal -> DEBU 2377 [businesschannel][7d336586] Exit" +"2019-05-02 09:27:47.551 UTC [lockbasedtxmgr] Done -> DEBU 2378 Done with transaction simulation / query execution [7d3365862c1e1220be280ef21d9eda5468f17ff62bca5d71bb83a33caa4458a8]" +"2019-05-02 09:27:47.551 UTC [endorser] func1 -> DEBU 2379 Exit: request from 172.18.0.8:57356" +"2019-05-02 09:27:47.551 UTC [comm.grpc.server] 1 -> INFO 237a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57356 grpc.code=OK grpc.call_duration=19.0782ms +"2019-05-02 09:27:47.555 UTC [grpc] infof -> DEBU 237b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:47.556 UTC [grpc] infof -> DEBU 237c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:47.737 UTC [endorser] ProcessProposal -> DEBU 237d Entering: request from 172.18.0.8:57360" +"2019-05-02 09:27:47.737 UTC [protoutils] ValidateProposalMessage -> DEBU 237e ValidateProposalMessage starts for signed proposal 0xc0042ee730" +"2019-05-02 09:27:47.738 UTC [protoutils] validateChannelHeader -> DEBU 237f validateChannelHeader info: header type 3" +"2019-05-02 09:27:47.738 UTC [protoutils] checkSignatureFromCreator -> DEBU 2380 begin" +"2019-05-02 09:27:47.739 UTC [msp] GetManagerForChain -> DEBU 2381 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:47.739 UTC [protoutils] checkSignatureFromCreator -> DEBU 2382 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-05-02 09:27:47.739 UTC [protoutils] checkSignatureFromCreator -> DEBU 2383 creator is valid" +"2019-05-02 09:27:47.740 UTC [msp.identity] Verify -> DEBU 2384 Verify: digest = 00000000 2b d2 66 7a fb 34 7b 93 cd 18 72 04 33 52 16 23 |+.fz.4{...r.3R.#| +00000010 b0 ed f3 27 5a db f7 da 16 86 79 74 12 9a a8 1c |...'Z.....yt....|" +"2019-05-02 09:27:47.740 UTC [msp.identity] Verify -> DEBU 2385 Verify: sig = 00000000 30 45 02 21 00 a2 82 2e 09 29 4f 00 f2 6b a0 b7 |0E.!.....)O..k..| +00000010 bb 1d 0f 6c 59 06 b3 61 4d ec 7e a4 6e 0e d7 e8 |...lY..aM.~.n...| +00000020 6f 21 37 e1 d1 02 20 3a 07 37 ab 7d 9c ce 30 03 |o!7... :.7.}..0.| +00000030 97 5c fb 63 17 66 e7 34 af cf b6 af fc dc d3 97 |.\.c.f.4........| +00000040 72 3f d9 42 28 68 23 |r?.B(h#|" +"2019-05-02 09:27:47.741 UTC [protoutils] checkSignatureFromCreator -> DEBU 2386 exits successfully" +"2019-05-02 09:27:47.741 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2387 validateChaincodeProposalMessage starts for proposal 0xc003460a80, header 0xc0042eeb40" +"2019-05-02 09:27:47.742 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2388 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-05-02 09:27:47.742 UTC [endorser] preProcess -> DEBU 2389 [businesschannel][f788670e] processing txid: f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176" +"2019-05-02 09:27:47.743 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 238a retrieveTransactionByID() - txId = [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]" +"2019-05-02 09:27:47.743 UTC [aclmgmt] CheckACL -> DEBU 238b acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-05-02 09:27:47.743 UTC [aclmgmt] CheckACL -> DEBU 238c acl check(/Channel/Application/Writers)" +"2019-05-02 09:27:47.744 UTC [policies] Evaluate -> DEBU 238d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:47.744 UTC [policies] Evaluate -> DEBU 238e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:47.745 UTC [policies] Evaluate -> DEBU 238f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:47.745 UTC [cauthdsl] func1 -> DEBU 2390 0xc004334fc0 gate 1556789267745522300 evaluation starts" +"2019-05-02 09:27:47.745 UTC [cauthdsl] func2 -> DEBU 2391 0xc004334fc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 2392 0xc004334fc0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 2393 0xc004334fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 2394 0xc004334fc0 principal evaluation fails" +"2019-05-02 09:27:47.746 UTC [cauthdsl] func1 -> DEBU 2395 0xc004334fc0 gate 1556789267745522300 evaluation fails" +"2019-05-02 09:27:47.746 UTC [policies] Evaluate -> DEBU 2396 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:47.746 UTC [policies] Evaluate -> DEBU 2397 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:47.746 UTC [policies] Evaluate -> DEBU 2398 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-05-02 09:27:47.746 UTC [cauthdsl] func1 -> DEBU 2399 0xc004335800 gate 1556789267746848600 evaluation starts" +"2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 239a 0xc004335800 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:47.746 UTC [cauthdsl] func2 -> DEBU 239b 0xc004335800 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:47.747 UTC [cauthdsl] func2 -> DEBU 239c 0xc004335800 principal matched by identity 0" +"2019-05-02 09:27:47.747 UTC [msp.identity] Verify -> DEBU 239d Verify: digest = 00000000 2b d2 66 7a fb 34 7b 93 cd 18 72 04 33 52 16 23 |+.fz.4{...r.3R.#| +00000010 b0 ed f3 27 5a db f7 da 16 86 79 74 12 9a a8 1c |...'Z.....yt....|" +"2019-05-02 09:27:47.747 UTC [msp.identity] Verify -> DEBU 239e Verify: sig = 00000000 30 45 02 21 00 a2 82 2e 09 29 4f 00 f2 6b a0 b7 |0E.!.....)O..k..| +00000010 bb 1d 0f 6c 59 06 b3 61 4d ec 7e a4 6e 0e d7 e8 |...lY..aM.~.n...| +00000020 6f 21 37 e1 d1 02 20 3a 07 37 ab 7d 9c ce 30 03 |o!7... :.7.}..0.| +00000030 97 5c fb 63 17 66 e7 34 af cf b6 af fc dc d3 97 |.\.c.f.4........| +00000040 72 3f d9 42 28 68 23 |r?.B(h#|" +"2019-05-02 09:27:47.747 UTC [cauthdsl] func2 -> DEBU 239f 0xc004335800 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:47.747 UTC [cauthdsl] func1 -> DEBU 23a0 0xc004335800 gate 1556789267746848600 evaluation succeeds" +"2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a1 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a3 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:47.747 UTC [policies] Evaluate -> DEBU 23a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:47.747 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 23a5 constructing new tx simulator" +"2019-05-02 09:27:47.747 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 23a6 constructing new tx simulator txid = [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]" +"2019-05-02 09:27:47.747 UTC [endorser] SimulateProposal -> DEBU 23a7 [businesschannel][f788670e] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:47.747 UTC [stateleveldb] GetState -> DEBU 23a8 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:47.747 UTC [endorser] callChaincode -> INFO 23a9 [businesschannel][f788670e] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:47.747 UTC [stateleveldb] GetState -> DEBU 23aa GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:47.747 UTC [stateleveldb] GetState -> DEBU 23ab GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:47.747 UTC [chaincode] Execute -> DEBU 23ac Entry" +"2019-05-02 09:27:47.750 UTC [chaincode] handleMessage -> DEBU 23ad [f788670e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:47.750 UTC [chaincode] HandleTransaction -> DEBU 23ae [f788670e] handling GET_STATE from chaincode" +"2019-05-02 09:27:47.750 UTC [chaincode] HandleGetState -> DEBU 23af [f788670e] getting state for chaincode exp02, key a, channel businesschannel" +"2019-05-02 09:27:47.750 UTC [stateleveldb] GetState -> DEBU 23b0 GetState(). ns=exp02, key=a" +"2019-05-02 09:27:47.750 UTC [chaincode] HandleTransaction -> DEBU 23b1 [f788670e] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:47.751 UTC [chaincode] handleMessage -> DEBU 23b2 [f788670e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:47.752 UTC [chaincode] HandleTransaction -> DEBU 23b3 [f788670e] handling GET_STATE from chaincode" +"2019-05-02 09:27:47.752 UTC [chaincode] HandleGetState -> DEBU 23b4 [f788670e] getting state for chaincode exp02, key b, channel businesschannel" +"2019-05-02 09:27:47.752 UTC [stateleveldb] GetState -> DEBU 23b5 GetState(). ns=exp02, key=b" +"2019-05-02 09:27:47.753 UTC [chaincode] HandleTransaction -> DEBU 23b6 [f788670e] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:47.754 UTC [chaincode] handleMessage -> DEBU 23b7 [f788670e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:47.755 UTC [chaincode] HandleTransaction -> DEBU 23b8 [f788670e] handling PUT_STATE from chaincode" +"2019-05-02 09:27:47.755 UTC [chaincode] HandleTransaction -> DEBU 23b9 [f788670e] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:47.757 UTC [chaincode] handleMessage -> DEBU 23ba [f788670e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-05-02 09:27:47.757 UTC [chaincode] HandleTransaction -> DEBU 23bb [f788670e] handling PUT_STATE from chaincode" +"2019-05-02 09:27:47.757 UTC [chaincode] HandleTransaction -> DEBU 23bc [f788670e] Completed PUT_STATE. Sending RESPONSE" +"2019-05-02 09:27:47.758 UTC [chaincode] handleMessage -> DEBU 23bd [f788670e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:47.759 UTC [chaincode] Notify -> DEBU 23be [f788670e] notifying Txid:f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, channelID:businesschannel" +"2019-05-02 09:27:47.759 UTC [chaincode] Execute -> DEBU 23bf Exit" +"2019-05-02 09:27:47.759 UTC [endorser] callChaincode -> INFO 23c0 [businesschannel][f788670e] Exit chaincode: name:"exp02" (12ms)" +"2019-05-02 09:27:47.760 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 23c1 Simulation completed, getting simulation results" +"2019-05-02 09:27:47.760 UTC [lockbasedtxmgr] Done -> DEBU 23c2 Done with transaction simulation / query execution [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]" +"2019-05-02 09:27:47.761 UTC [endorser] SimulateProposal -> DEBU 23c3 [businesschannel][f788670e] Exit" +"2019-05-02 09:27:47.761 UTC [endorser] endorseProposal -> DEBU 23c4 [businesschannel][f788670e] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:47.762 UTC [endorser] endorseProposal -> DEBU 23c5 [businesschannel][f788670e] escc for chaincode name:"exp02" is escc" +"2019-05-02 09:27:47.762 UTC [endorser] EndorseWithPlugin -> DEBU 23c6 Entering endorsement for {plugin: escc, channel: businesschannel, tx: f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, chaincode: exp02}" +"2019-05-02 09:27:47.762 UTC [msp.identity] Sign -> DEBU 23c7 Sign: plaintext: 0A2022CFDDD1D9F03FD9E872A68FBF65...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:47.763 UTC [msp.identity] Sign -> DEBU 23c8 Sign: digest: 7F4D0DB0FB16170EA99B1C9EDC7E0EE04F80FAD320C754C68742499AE98027A0 " +"2019-05-02 09:27:47.763 UTC [endorser] EndorseWithPlugin -> DEBU 23c9 Exiting {plugin: escc, channel: businesschannel, tx: f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, chaincode: exp02}" +"2019-05-02 09:27:47.763 UTC [endorser] endorseProposal -> DEBU 23ca [businesschannel][f788670e] Exit" +"2019-05-02 09:27:47.763 UTC [lockbasedtxmgr] Done -> DEBU 23cb Done with transaction simulation / query execution [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]" +"2019-05-02 09:27:47.763 UTC [endorser] func1 -> DEBU 23cc Exit: request from 172.18.0.8:57360" +"2019-05-02 09:27:47.763 UTC [comm.grpc.server] 1 -> INFO 23cd unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57360 grpc.code=OK grpc.call_duration=26.5353ms +"2019-05-02 09:27:47.781 UTC [grpc] infof -> DEBU 23ce transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:47.782 UTC [grpc] infof -> DEBU 23cf transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:47.980 UTC [endorser] ProcessProposal -> DEBU 23d0 Entering: request from 172.18.0.8:57366" +"2019-05-02 09:27:47.980 UTC [protoutils] ValidateProposalMessage -> DEBU 23d1 ValidateProposalMessage starts for signed proposal 0xc0042ef450" +"2019-05-02 09:27:47.980 UTC [protoutils] validateChannelHeader -> DEBU 23d2 validateChannelHeader info: header type 3" +"2019-05-02 09:27:47.980 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d3 begin" +"2019-05-02 09:27:47.980 UTC [msp] GetManagerForChain -> DEBU 23d4 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:47.981 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d5 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:47.981 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d6 creator is valid" +"2019-05-02 09:27:47.981 UTC [msp.identity] Verify -> DEBU 23d7 Verify: digest = 00000000 e0 ad ec f1 52 d0 9a e6 1d 0a f0 e0 c7 7b 0f 0f |....R........{..| +00000010 13 50 70 eb 56 c3 91 08 2f cd 88 0a cf b7 80 31 |.Pp.V.../......1|" +"2019-05-02 09:27:47.981 UTC [msp.identity] Verify -> DEBU 23d8 Verify: sig = 00000000 30 45 02 21 00 a5 20 b3 ad 07 ea dd be 70 45 6f |0E.!.. ......pEo| +00000010 20 a6 03 f5 ee b4 58 45 75 80 c2 63 9a c5 ac 04 | .....XEu..c....| +00000020 d7 3f 11 20 8e 02 20 4e 2b 6a f7 f9 24 c2 24 0e |.?. .. N+j..$.$.| +00000030 a6 00 e8 66 de f1 86 65 02 e6 fa 6c c8 55 a8 7b |...f...e...l.U.{| +00000040 55 9d ee 03 a6 cc 68 |U.....h|" +"2019-05-02 09:27:47.981 UTC [protoutils] checkSignatureFromCreator -> DEBU 23d9 exits successfully" +"2019-05-02 09:27:47.981 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 23da validateChaincodeProposalMessage starts for proposal 0xc003460e70, header 0xc0042ef860" +"2019-05-02 09:27:47.981 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 23db validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-05-02 09:27:47.981 UTC [endorser] preProcess -> DEBU 23dc [businesschannel][530e2b52] processing txid: 530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d" +"2019-05-02 09:27:47.982 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 23dd retrieveTransactionByID() - txId = [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]" +"2019-05-02 09:27:47.982 UTC [aclmgmt] CheckACL -> DEBU 23de acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-05-02 09:27:47.982 UTC [aclmgmt] CheckACL -> DEBU 23df acl check(/Channel/Application/Writers)" +"2019-05-02 09:27:47.982 UTC [policies] Evaluate -> DEBU 23e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:47.982 UTC [policies] Evaluate -> DEBU 23e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:47.982 UTC [policies] Evaluate -> DEBU 23e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:47.982 UTC [cauthdsl] func1 -> DEBU 23e3 0xc0043b4cc0 gate 1556789267982597500 evaluation starts" +"2019-05-02 09:27:47.982 UTC [cauthdsl] func2 -> DEBU 23e4 0xc0043b4cc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:47.982 UTC [cauthdsl] func2 -> DEBU 23e5 0xc0043b4cc0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:47.982 UTC [cauthdsl] func2 -> DEBU 23e6 0xc0043b4cc0 principal matched by identity 0" +"2019-05-02 09:27:47.983 UTC [msp.identity] Verify -> DEBU 23e7 Verify: digest = 00000000 e0 ad ec f1 52 d0 9a e6 1d 0a f0 e0 c7 7b 0f 0f |....R........{..| +00000010 13 50 70 eb 56 c3 91 08 2f cd 88 0a cf b7 80 31 |.Pp.V.../......1|" +"2019-05-02 09:27:47.983 UTC [msp.identity] Verify -> DEBU 23e8 Verify: sig = 00000000 30 45 02 21 00 a5 20 b3 ad 07 ea dd be 70 45 6f |0E.!.. ......pEo| +00000010 20 a6 03 f5 ee b4 58 45 75 80 c2 63 9a c5 ac 04 | .....XEu..c....| +00000020 d7 3f 11 20 8e 02 20 4e 2b 6a f7 f9 24 c2 24 0e |.?. .. N+j..$.$.| +00000030 a6 00 e8 66 de f1 86 65 02 e6 fa 6c c8 55 a8 7b |...f...e...l.U.{| +00000040 55 9d ee 03 a6 cc 68 |U.....h|" +"2019-05-02 09:27:47.984 UTC [cauthdsl] func2 -> DEBU 23e9 0xc0043b4cc0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:47.984 UTC [cauthdsl] func1 -> DEBU 23ea 0xc0043b4cc0 gate 1556789267982597500 evaluation succeeds" +"2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23eb Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23ed Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:47.984 UTC [policies] Evaluate -> DEBU 23ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:47.984 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 23ef constructing new tx simulator" +"2019-05-02 09:27:47.985 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 23f0 constructing new tx simulator txid = [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]" +"2019-05-02 09:27:47.985 UTC [endorser] SimulateProposal -> DEBU 23f1 [businesschannel][530e2b52] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:47.985 UTC [stateleveldb] GetState -> DEBU 23f2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:47.985 UTC [endorser] callChaincode -> INFO 23f3 [businesschannel][530e2b52] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:47.985 UTC [stateleveldb] GetState -> DEBU 23f4 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:47.985 UTC [stateleveldb] GetState -> DEBU 23f5 GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:47.985 UTC [chaincode] Execute -> DEBU 23f6 Entry" +"2019-05-02 09:27:47.987 UTC [chaincode] handleMessage -> DEBU 23f7 [530e2b52] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:47.988 UTC [chaincode] HandleTransaction -> DEBU 23f8 [530e2b52] handling GET_STATE from chaincode" +"2019-05-02 09:27:47.988 UTC [chaincode] HandleGetState -> DEBU 23f9 [530e2b52] getting state for chaincode exp02, key a, channel businesschannel" +"2019-05-02 09:27:47.988 UTC [stateleveldb] GetState -> DEBU 23fa GetState(). ns=exp02, key=a" +"2019-05-02 09:27:47.988 UTC [chaincode] HandleTransaction -> DEBU 23fb [530e2b52] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:47.990 UTC [chaincode] handleMessage -> DEBU 23fc [530e2b52] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:47.990 UTC [chaincode] Notify -> DEBU 23fd [530e2b52] notifying Txid:530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d, channelID:businesschannel" +"2019-05-02 09:27:47.990 UTC [chaincode] Execute -> DEBU 23fe Exit" +"2019-05-02 09:27:47.990 UTC [endorser] callChaincode -> INFO 23ff [businesschannel][530e2b52] Exit chaincode: name:"exp02" (5ms)" +"2019-05-02 09:27:47.990 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2400 Simulation completed, getting simulation results" +"2019-05-02 09:27:47.990 UTC [lockbasedtxmgr] Done -> DEBU 2401 Done with transaction simulation / query execution [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]" +"2019-05-02 09:27:47.990 UTC [endorser] SimulateProposal -> DEBU 2402 [businesschannel][530e2b52] Exit" +"2019-05-02 09:27:47.991 UTC [endorser] endorseProposal -> DEBU 2403 [businesschannel][530e2b52] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:47.991 UTC [endorser] endorseProposal -> DEBU 2404 [businesschannel][530e2b52] escc for chaincode name:"exp02" is escc" +"2019-05-02 09:27:47.991 UTC [endorser] EndorseWithPlugin -> DEBU 2405 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d, chaincode: exp02}" +"2019-05-02 09:27:47.991 UTC [msp.identity] Sign -> DEBU 2406 Sign: plaintext: 0A202175C709353540E8383BBA807F9D...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:47.991 UTC [msp.identity] Sign -> DEBU 2407 Sign: digest: 13DF92C85D3D98E9660CD59358942D66AA4BB186A238D02DE1B85C13BB2342A5 " +"2019-05-02 09:27:47.991 UTC [endorser] EndorseWithPlugin -> DEBU 2408 Exiting {plugin: escc, channel: businesschannel, tx: 530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d, chaincode: exp02}" +"2019-05-02 09:27:47.991 UTC [endorser] endorseProposal -> DEBU 2409 [businesschannel][530e2b52] Exit" +"2019-05-02 09:27:47.991 UTC [lockbasedtxmgr] Done -> DEBU 240a Done with transaction simulation / query execution [530e2b52197c915000f9dbd92aeb335560f21d054d4ad93fccc08c955b9f920d]" +"2019-05-02 09:27:47.991 UTC [endorser] func1 -> DEBU 240b Exit: request from 172.18.0.8:57366" +"2019-05-02 09:27:47.991 UTC [comm.grpc.server] 1 -> INFO 240c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57366 grpc.code=OK grpc.call_duration=11.6036ms +"2019-05-02 09:27:47.996 UTC [grpc] infof -> DEBU 240e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:47.996 UTC [grpc] infof -> DEBU 240d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:48.248 UTC [msp] DeserializeIdentity -> DEBU 240f Obtaining identity" +"2019-05-02 09:27:48.248 UTC [msp] DeserializeIdentity -> DEBU 2410 Obtaining identity" +"2019-05-02 09:27:48.248 UTC [gossip.comm] Send -> DEBU 2411 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2412 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2413 Exiting" +"2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2414 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2415 Exiting" +"2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2416 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2417 Exiting" +"2019-05-02 09:27:48.250 UTC [gossip.gossip] handleMessage -> DEBU 2418 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.250 UTC [msp.identity] Verify -> DEBU 2419 Verify: digest = 00000000 68 a0 91 32 58 25 d2 e9 b4 f1 f6 51 2d 2f d9 d1 |h..2X%.....Q-/..| +00000010 6b a5 4d d8 c9 b8 ff bb 59 82 57 08 9b 8e 94 9a |k.M.....Y.W.....|" +"2019-05-02 09:27:48.250 UTC [msp.identity] Verify -> DEBU 241a Verify: sig = 00000000 30 45 02 21 00 ed 3d 05 5c 5c 47 80 b3 b3 19 40 |0E.!..=.\\G....@| +00000010 d6 c3 20 7b 98 55 5b c3 19 15 67 b4 27 d4 3e d7 |.. {.U[...g.'.>.| +00000020 16 bd 0f f5 d8 02 20 61 ec e8 6c 5f 0d 36 b4 ba |...... a..l_.6..| +00000030 ff a7 9d 63 23 55 67 1f 9e e9 41 fb 03 6e 7b d4 |...c#Ug...A..n{.| +00000040 7e b3 79 82 f0 9e c8 |~.y....|" +"2019-05-02 09:27:48.250 UTC [msp] DeserializeIdentity -> DEBU 241b Obtaining identity" +"2019-05-02 09:27:48.250 UTC [msp] DeserializeIdentity -> DEBU 241c Obtaining identity" +"2019-05-02 09:27:48.251 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 241d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 241e Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 241f Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2420 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2421 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2422 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.251 UTC [cauthdsl] func1 -> DEBU 2423 0xc0043f28b0 gate 1556789268251419900 evaluation starts" +"2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2424 0xc0043f28b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2425 0xc0043f28b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2426 0xc0043f28b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 2427 0xc0043f28b0 principal evaluation fails" +"2019-05-02 09:27:48.251 UTC [cauthdsl] func1 -> DEBU 2428 0xc0043f28b0 gate 1556789268251419900 evaluation fails" +"2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 2429 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 242a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.251 UTC [policies] Evaluate -> DEBU 242b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.251 UTC [cauthdsl] func1 -> DEBU 242c 0xc0043f30f0 gate 1556789268251817900 evaluation starts" +"2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 242d 0xc0043f30f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 242e 0xc0043f30f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.251 UTC [cauthdsl] func2 -> DEBU 242f 0xc0043f30f0 principal matched by identity 0" +"2019-05-02 09:27:48.252 UTC [msp.identity] Verify -> DEBU 2430 Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +"2019-05-02 09:27:48.252 UTC [msp.identity] Verify -> DEBU 2431 Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +00000040 a3 34 89 3e 9c 04 |.4.>..|" +"2019-05-02 09:27:48.252 UTC [cauthdsl] func2 -> DEBU 2432 0xc0043f30f0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.252 UTC [cauthdsl] func1 -> DEBU 2433 0xc0043f30f0 gate 1556789268251817900 evaluation succeeds" +"2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2434 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2435 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2436 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 2437 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.252 UTC [msp] DeserializeIdentity -> DEBU 2438 Obtaining identity" +"2019-05-02 09:27:48.252 UTC [msp] DeserializeIdentity -> DEBU 2439 Obtaining identity" +"2019-05-02 09:27:48.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 243a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 243b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 243c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.252 UTC [policies] Evaluate -> DEBU 243d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 243e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 243f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.253 UTC [cauthdsl] func1 -> DEBU 2440 0xc0044028c0 gate 1556789268253151500 evaluation starts" +"2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2441 0xc0044028c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2442 0xc0044028c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2443 0xc0044028c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 2444 0xc0044028c0 principal evaluation fails" +"2019-05-02 09:27:48.253 UTC [cauthdsl] func1 -> DEBU 2445 0xc0044028c0 gate 1556789268253151500 evaluation fails" +"2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 2446 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 2447 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.253 UTC [policies] Evaluate -> DEBU 2448 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.253 UTC [cauthdsl] func1 -> DEBU 2449 0xc004403100 gate 1556789268253762800 evaluation starts" +"2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 244a 0xc004403100 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 244b 0xc004403100 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.253 UTC [cauthdsl] func2 -> DEBU 244c 0xc004403100 principal matched by identity 0" +"2019-05-02 09:27:48.254 UTC [msp] DeserializeIdentity -> DEBU 244d Obtaining identity" +"2019-05-02 09:27:48.254 UTC [msp] DeserializeIdentity -> DEBU 244e Obtaining identity" +"2019-05-02 09:27:48.254 UTC [gossip.comm] Send -> DEBU 244f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +"2019-05-02 09:27:48.254 UTC [msp] DeserializeIdentity -> DEBU 2450 Obtaining identity" +"2019-05-02 09:27:48.255 UTC [msp] DeserializeIdentity -> DEBU 2451 Obtaining identity" +"2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2452 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2453 Exiting" +"2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2454 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2455 Exiting" +"2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2456 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:48.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2457 Exiting" +"2019-05-02 09:27:48.254 UTC [msp.identity] Verify -> DEBU 2458 Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.| +00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|" +"2019-05-02 09:27:48.256 UTC [msp.identity] Verify -> DEBU 2459 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..| +00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.| +00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{| +00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.| +00000040 a3 8e ff fc ae d2 |......|" +"2019-05-02 09:27:48.256 UTC [cauthdsl] func2 -> DEBU 245a 0xc004403100 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.257 UTC [cauthdsl] func1 -> DEBU 245b 0xc004403100 gate 1556789268253762800 evaluation succeeds" +"2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.257 UTC [policies] Evaluate -> DEBU 245f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.257 UTC [msp.identity] Verify -> DEBU 2460 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +"2019-05-02 09:27:48.258 UTC [msp.identity] Verify -> DEBU 2461 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +00000040 a6 7f 10 af bd 05 6d |......m|" +"2019-05-02 09:27:48.258 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2462 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.258 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2463 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.258 UTC [policies] Evaluate -> DEBU 2464 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.258 UTC [policies] Evaluate -> DEBU 2465 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.258 UTC [policies] Evaluate -> DEBU 2466 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.258 UTC [cauthdsl] func1 -> DEBU 2467 0xc004426800 gate 1556789268258599200 evaluation starts" +"2019-05-02 09:27:48.258 UTC [cauthdsl] func2 -> DEBU 2468 0xc004426800 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.258 UTC [cauthdsl] func2 -> DEBU 2469 0xc004426800 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.258 UTC [cauthdsl] func2 -> DEBU 246a 0xc004426800 principal matched by identity 0" +"2019-05-02 09:27:48.258 UTC [msp.identity] Verify -> DEBU 246b Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +"2019-05-02 09:27:48.258 UTC [msp.identity] Verify -> DEBU 246c Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +00000040 a6 7f 10 af bd 05 6d |......m|" +"2019-05-02 09:27:48.259 UTC [cauthdsl] func2 -> DEBU 246d 0xc004426800 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.259 UTC [cauthdsl] func1 -> DEBU 246e 0xc004426800 gate 1556789268258599200 evaluation succeeds" +"2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 246f Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 2470 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 2471 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.259 UTC [policies] Evaluate -> DEBU 2472 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.259 UTC [gossip.gossip] handleMessage -> DEBU 2473 Exiting" +"2019-05-02 09:27:48.259 UTC [gossip.gossip] handleMessage -> DEBU 2474 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.259 UTC [msp] DeserializeIdentity -> DEBU 2475 Obtaining identity" +"2019-05-02 09:27:48.259 UTC [msp.identity] Verify -> DEBU 2476 Verify: digest = 00000000 68 a0 91 32 58 25 d2 e9 b4 f1 f6 51 2d 2f d9 d1 |h..2X%.....Q-/..| +00000010 6b a5 4d d8 c9 b8 ff bb 59 82 57 08 9b 8e 94 9a |k.M.....Y.W.....|" +"2019-05-02 09:27:48.259 UTC [msp.identity] Verify -> DEBU 2477 Verify: sig = 00000000 30 45 02 21 00 ed 3d 05 5c 5c 47 80 b3 b3 19 40 |0E.!..=.\\G....@| +00000010 d6 c3 20 7b 98 55 5b c3 19 15 67 b4 27 d4 3e d7 |.. {.U[...g.'.>.| +00000020 16 bd 0f f5 d8 02 20 61 ec e8 6c 5f 0d 36 b4 ba |...... a..l_.6..| +00000030 ff a7 9d 63 23 55 67 1f 9e e9 41 fb 03 6e 7b d4 |...c#Ug...A..n{.| +00000040 7e b3 79 82 f0 9e c8 |~.y....|" +"2019-05-02 09:27:48.260 UTC [msp.identity] Verify -> DEBU 2478 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +"2019-05-02 09:27:48.260 UTC [msp.identity] Verify -> DEBU 2479 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +00000040 fe 64 5a aa 06 63 |.dZ..c|" +"2019-05-02 09:27:48.260 UTC [msp] DeserializeIdentity -> DEBU 247a Obtaining identity" +"2019-05-02 09:27:48.261 UTC [msp] DeserializeIdentity -> DEBU 247b Obtaining identity" +"2019-05-02 09:27:48.262 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 247c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.262 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 247d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.262 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 247e Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.263 UTC [policies] Evaluate -> DEBU 247f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.263 UTC [policies] Evaluate -> DEBU 2480 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.264 UTC [policies] Evaluate -> DEBU 2481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.264 UTC [cauthdsl] func1 -> DEBU 2482 0xc00443f150 gate 1556789268264625900 evaluation starts" +"2019-05-02 09:27:48.264 UTC [cauthdsl] func2 -> DEBU 2483 0xc00443f150 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.264 UTC [cauthdsl] func2 -> DEBU 2484 0xc00443f150 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.265 UTC [cauthdsl] func2 -> DEBU 2485 0xc00443f150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.265 UTC [cauthdsl] func2 -> DEBU 2486 0xc00443f150 principal evaluation fails" +"2019-05-02 09:27:48.265 UTC [cauthdsl] func1 -> DEBU 2487 0xc00443f150 gate 1556789268264625900 evaluation fails" +"2019-05-02 09:27:48.266 UTC [policies] Evaluate -> DEBU 2488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.266 UTC [policies] Evaluate -> DEBU 2489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.266 UTC [policies] Evaluate -> DEBU 248a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.266 UTC [cauthdsl] func1 -> DEBU 248b 0xc00443f990 gate 1556789268266903400 evaluation starts" +"2019-05-02 09:27:48.267 UTC [cauthdsl] func2 -> DEBU 248c 0xc00443f990 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.267 UTC [cauthdsl] func2 -> DEBU 248d 0xc00443f990 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.267 UTC [cauthdsl] func2 -> DEBU 248e 0xc00443f990 principal matched by identity 0" +"2019-05-02 09:27:48.268 UTC [msp.identity] Verify -> DEBU 248f Verify: digest = 00000000 84 a5 61 6d 8b 9b 6a a7 cd d3 ed 13 af f1 6c a3 |..am..j.......l.| +00000010 b0 63 46 4a 1a 7d c8 77 6d f8 85 b3 40 cb 0f a3 |.cFJ.}.wm...@...|" +"2019-05-02 09:27:48.268 UTC [msp.identity] Verify -> DEBU 2490 Verify: sig = 00000000 30 44 02 20 6a e0 5d 36 63 71 c8 57 fa 4f 93 16 |0D. j.]6cq.W.O..| +00000010 e4 50 d3 0d aa 8a e3 90 6b b6 75 91 e2 5a 39 15 |.P......k.u..Z9.| +00000020 9b 1f 4a f0 02 20 45 16 4f 72 ec a4 11 c9 e5 7b |..J.. E.Or.....{| +00000030 42 23 15 3f b4 0c ea d5 cd e6 ed d3 64 92 2c f2 |B#.?........d.,.| +00000040 a3 8e ff fc ae d2 |......|" +"2019-05-02 09:27:48.269 UTC [cauthdsl] func2 -> DEBU 2491 0xc00443f990 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.269 UTC [cauthdsl] func1 -> DEBU 2492 0xc00443f990 gate 1556789268266903400 evaluation succeeds" +"2019-05-02 09:27:48.269 UTC [policies] Evaluate -> DEBU 2493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.269 UTC [policies] Evaluate -> DEBU 2494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.270 UTC [policies] Evaluate -> DEBU 2495 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.270 UTC [policies] Evaluate -> DEBU 2496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.270 UTC [msp] DeserializeIdentity -> DEBU 2497 Obtaining identity" +"2019-05-02 09:27:48.271 UTC [msp] DeserializeIdentity -> DEBU 2498 Obtaining identity" +"2019-05-02 09:27:48.271 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2499 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.271 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 249a Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.272 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 249b Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.272 UTC [policies] Evaluate -> DEBU 249c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.272 UTC [policies] Evaluate -> DEBU 249d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.272 UTC [policies] Evaluate -> DEBU 249e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.273 UTC [cauthdsl] func1 -> DEBU 249f 0xc004453160 gate 1556789268273201000 evaluation starts" +"2019-05-02 09:27:48.273 UTC [cauthdsl] func2 -> DEBU 24a0 0xc004453160 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.273 UTC [cauthdsl] func2 -> DEBU 24a1 0xc004453160 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.274 UTC [cauthdsl] func2 -> DEBU 24a2 0xc004453160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.274 UTC [cauthdsl] func2 -> DEBU 24a3 0xc004453160 principal evaluation fails" +"2019-05-02 09:27:48.274 UTC [cauthdsl] func1 -> DEBU 24a4 0xc004453160 gate 1556789268273201000 evaluation fails" +"2019-05-02 09:27:48.274 UTC [policies] Evaluate -> DEBU 24a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.275 UTC [policies] Evaluate -> DEBU 24a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.275 UTC [policies] Evaluate -> DEBU 24a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.276 UTC [cauthdsl] func1 -> DEBU 24a8 0xc0044539a0 gate 1556789268276482200 evaluation starts" +"2019-05-02 09:27:48.276 UTC [cauthdsl] func2 -> DEBU 24a9 0xc0044539a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.277 UTC [cauthdsl] func2 -> DEBU 24aa 0xc0044539a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.277 UTC [cauthdsl] func2 -> DEBU 24ab 0xc0044539a0 principal matched by identity 0" +"2019-05-02 09:27:48.277 UTC [msp.identity] Verify -> DEBU 24ac Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +"2019-05-02 09:27:48.278 UTC [msp.identity] Verify -> DEBU 24ad Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +"2019-05-02 09:27:48.279 UTC [cauthdsl] func2 -> DEBU 24ae 0xc0044539a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.279 UTC [cauthdsl] func1 -> DEBU 24af 0xc0044539a0 gate 1556789268276482200 evaluation succeeds" +"2019-05-02 09:27:48.279 UTC [policies] Evaluate -> DEBU 24b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.279 UTC [policies] Evaluate -> DEBU 24b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.280 UTC [policies] Evaluate -> DEBU 24b2 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.280 UTC [policies] Evaluate -> DEBU 24b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.280 UTC [msp] DeserializeIdentity -> DEBU 24b4 Obtaining identity" +"2019-05-02 09:27:48.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24b5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24b6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.281 UTC [policies] Evaluate -> DEBU 24b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.281 UTC [policies] Evaluate -> DEBU 24b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.282 UTC [policies] Evaluate -> DEBU 24b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.282 UTC [cauthdsl] func1 -> DEBU 24ba 0xc004464a80 gate 1556789268282587800 evaluation starts" +"2019-05-02 09:27:48.282 UTC [cauthdsl] func2 -> DEBU 24bb 0xc004464a80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.283 UTC [cauthdsl] func2 -> DEBU 24bc 0xc004464a80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.283 UTC [cauthdsl] func2 -> DEBU 24bd 0xc004464a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.284 UTC [cauthdsl] func2 -> DEBU 24be 0xc004464a80 principal evaluation fails" +"2019-05-02 09:27:48.285 UTC [cauthdsl] func1 -> DEBU 24bf 0xc004464a80 gate 1556789268282587800 evaluation fails" +"2019-05-02 09:27:48.285 UTC [policies] Evaluate -> DEBU 24c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.286 UTC [policies] Evaluate -> DEBU 24c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.286 UTC [policies] Evaluate -> DEBU 24c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.286 UTC [cauthdsl] func1 -> DEBU 24c4 0xc0044652c0 gate 1556789268286391400 evaluation starts" +"2019-05-02 09:27:48.285 UTC [gossip.comm] func1 -> DEBU 24c0 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.286 UTC [cauthdsl] func2 -> DEBU 24c5 0xc0044652c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.287 UTC [cauthdsl] func2 -> DEBU 24c6 0xc0044652c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.287 UTC [cauthdsl] func2 -> DEBU 24c7 0xc0044652c0 principal matched by identity 0" +"2019-05-02 09:27:48.287 UTC [msp.identity] Verify -> DEBU 24c8 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +"2019-05-02 09:27:48.288 UTC [msp.identity] Verify -> DEBU 24c9 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +"2019-05-02 09:27:48.288 UTC [cauthdsl] func2 -> DEBU 24ca 0xc0044652c0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.290 UTC [gossip.comm] func1 -> DEBU 24cb Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:48.288 UTC [cauthdsl] func1 -> DEBU 24cc 0xc0044652c0 gate 1556789268286391400 evaluation succeeds" +"2019-05-02 09:27:48.290 UTC [policies] Evaluate -> DEBU 24cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.290 UTC [policies] Evaluate -> DEBU 24ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.291 UTC [policies] Evaluate -> DEBU 24cf Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.291 UTC [policies] Evaluate -> DEBU 24d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.291 UTC [gossip.gossip] handleMessage -> DEBU 24d1 Exiting" +"2019-05-02 09:27:48.291 UTC [gossip.gossip] handleMessage -> DEBU 24d2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.291 UTC [msp] DeserializeIdentity -> DEBU 24d3 Obtaining identity" +"2019-05-02 09:27:48.292 UTC [msp.identity] Verify -> DEBU 24d4 Verify: digest = 00000000 b7 72 13 06 a3 6a 40 1f a4 79 df d7 79 f1 62 9b |.r...j@..y..y.b.| +00000010 55 2e 44 2c 36 d6 cc f6 9a ad ca b4 5b 43 81 61 |U.D,6.......[C.a|" +"2019-05-02 09:27:48.292 UTC [msp.identity] Verify -> DEBU 24d5 Verify: sig = 00000000 30 44 02 20 7f 96 98 60 f3 01 a2 2c 18 dd dd 2d |0D. ...`...,...-| +00000010 da 72 98 98 e3 44 50 f8 07 5a 3e 89 a8 79 bd 95 |.r...DP..Z>..y..| +00000020 24 1d 94 98 02 20 57 0f 9d ca 66 77 e4 85 a7 8f |$.... W...fw....| +00000030 e1 68 e4 47 f5 18 30 b2 69 95 cc 1e 98 f2 7b 13 |.h.G..0.i.....{.| +00000040 fe 64 5a aa 06 63 |.dZ..c|" +"2019-05-02 09:27:48.293 UTC [msp] DeserializeIdentity -> DEBU 24d6 Obtaining identity" +"2019-05-02 09:27:48.293 UTC [msp] DeserializeIdentity -> DEBU 24d7 Obtaining identity" +"2019-05-02 09:27:48.293 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24d8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24d9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.293 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24da Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.294 UTC [policies] Evaluate -> DEBU 24db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.294 UTC [policies] Evaluate -> DEBU 24dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.294 UTC [policies] Evaluate -> DEBU 24dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.294 UTC [cauthdsl] func1 -> DEBU 24de 0xc0044774f0 gate 1556789268294600500 evaluation starts" +"2019-05-02 09:27:48.294 UTC [cauthdsl] func2 -> DEBU 24df 0xc0044774f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.294 UTC [cauthdsl] func2 -> DEBU 24e0 0xc0044774f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.295 UTC [cauthdsl] func2 -> DEBU 24e1 0xc0044774f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.295 UTC [cauthdsl] func2 -> DEBU 24e2 0xc0044774f0 principal evaluation fails" +"2019-05-02 09:27:48.295 UTC [cauthdsl] func1 -> DEBU 24e3 0xc0044774f0 gate 1556789268294600500 evaluation fails" +"2019-05-02 09:27:48.295 UTC [policies] Evaluate -> DEBU 24e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.295 UTC [policies] Evaluate -> DEBU 24e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.295 UTC [policies] Evaluate -> DEBU 24e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.295 UTC [cauthdsl] func1 -> DEBU 24e7 0xc004477d30 gate 1556789268295938500 evaluation starts" +"2019-05-02 09:27:48.296 UTC [cauthdsl] func2 -> DEBU 24e8 0xc004477d30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.296 UTC [cauthdsl] func2 -> DEBU 24e9 0xc004477d30 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.296 UTC [cauthdsl] func2 -> DEBU 24ea 0xc004477d30 principal matched by identity 0" +"2019-05-02 09:27:48.296 UTC [msp.identity] Verify -> DEBU 24eb Verify: digest = 00000000 14 34 4e 51 0d 03 14 a2 eb 55 ff a0 a4 d3 9f 99 |.4NQ.....U......| +00000010 b2 93 e2 b8 e0 3b ba dd f7 6a a9 58 a8 83 d1 8d |.....;...j.X....|" +"2019-05-02 09:27:48.297 UTC [msp.identity] Verify -> DEBU 24ec Verify: sig = 00000000 30 44 02 20 76 3b f0 bd 14 39 6c 27 2e 8d 23 77 |0D. v;...9l'..#w| +00000010 b8 86 a9 5b ef 59 4c 53 17 3e 0a 65 60 17 29 76 |...[.YLS.>.e`.)v| +00000020 80 db f3 93 02 20 08 82 27 06 ff 1a 67 14 fd 42 |..... ..'...g..B| +00000030 1a a1 2b ff c4 f8 76 37 f3 f0 3d 40 df a9 8b f1 |..+...v7..=@....| +00000040 a3 34 89 3e 9c 04 |.4.>..|" +"2019-05-02 09:27:48.297 UTC [cauthdsl] func2 -> DEBU 24ed 0xc004477d30 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.297 UTC [cauthdsl] func1 -> DEBU 24ee 0xc004477d30 gate 1556789268295938500 evaluation succeeds" +"2019-05-02 09:27:48.297 UTC [policies] Evaluate -> DEBU 24ef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.297 UTC [policies] Evaluate -> DEBU 24f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.297 UTC [policies] Evaluate -> DEBU 24f1 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.298 UTC [policies] Evaluate -> DEBU 24f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.298 UTC [msp] DeserializeIdentity -> DEBU 24f3 Obtaining identity" +"2019-05-02 09:27:48.298 UTC [msp] DeserializeIdentity -> DEBU 24f4 Obtaining identity" +"2019-05-02 09:27:48.299 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.299 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24f6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.299 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24f7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.299 UTC [policies] Evaluate -> DEBU 24f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.300 UTC [policies] Evaluate -> DEBU 24f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.300 UTC [policies] Evaluate -> DEBU 24fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.300 UTC [cauthdsl] func1 -> DEBU 24fb 0xc00448f500 gate 1556789268300169100 evaluation starts" +"2019-05-02 09:27:48.300 UTC [cauthdsl] func2 -> DEBU 24fc 0xc00448f500 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.300 UTC [cauthdsl] func2 -> DEBU 24fd 0xc00448f500 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.300 UTC [cauthdsl] func2 -> DEBU 24fe 0xc00448f500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.301 UTC [cauthdsl] func2 -> DEBU 24ff 0xc00448f500 principal evaluation fails" +"2019-05-02 09:27:48.301 UTC [cauthdsl] func1 -> DEBU 2500 0xc00448f500 gate 1556789268300169100 evaluation fails" +"2019-05-02 09:27:48.301 UTC [policies] Evaluate -> DEBU 2501 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.301 UTC [policies] Evaluate -> DEBU 2502 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.301 UTC [policies] Evaluate -> DEBU 2503 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.302 UTC [cauthdsl] func1 -> DEBU 2504 0xc00448fd40 gate 1556789268302168700 evaluation starts" +"2019-05-02 09:27:48.302 UTC [cauthdsl] func2 -> DEBU 2505 0xc00448fd40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.302 UTC [cauthdsl] func2 -> DEBU 2506 0xc00448fd40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.302 UTC [cauthdsl] func2 -> DEBU 2507 0xc00448fd40 principal matched by identity 0" +"2019-05-02 09:27:48.302 UTC [msp.identity] Verify -> DEBU 2508 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.| +00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|" +"2019-05-02 09:27:48.303 UTC [msp.identity] Verify -> DEBU 2509 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. | +00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3| +00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$| +00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E| +00000040 ca 44 3d eb 27 9e 00 |.D=.'..|" +"2019-05-02 09:27:48.303 UTC [cauthdsl] func2 -> DEBU 250a 0xc00448fd40 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.303 UTC [cauthdsl] func1 -> DEBU 250b 0xc00448fd40 gate 1556789268302168700 evaluation succeeds" +"2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.304 UTC [policies] Evaluate -> DEBU 250f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.304 UTC [msp] DeserializeIdentity -> DEBU 2510 Obtaining identity" +"2019-05-02 09:27:48.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2511 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.305 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2512 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.305 UTC [policies] Evaluate -> DEBU 2513 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.305 UTC [policies] Evaluate -> DEBU 2514 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.305 UTC [policies] Evaluate -> DEBU 2515 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.305 UTC [cauthdsl] func1 -> DEBU 2516 0xc0044a2e20 gate 1556789268305827600 evaluation starts" +"2019-05-02 09:27:48.305 UTC [cauthdsl] func2 -> DEBU 2517 0xc0044a2e20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.306 UTC [cauthdsl] func2 -> DEBU 2518 0xc0044a2e20 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.306 UTC [cauthdsl] func2 -> DEBU 2519 0xc0044a2e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.306 UTC [cauthdsl] func2 -> DEBU 251a 0xc0044a2e20 principal evaluation fails" +"2019-05-02 09:27:48.306 UTC [cauthdsl] func1 -> DEBU 251b 0xc0044a2e20 gate 1556789268305827600 evaluation fails" +"2019-05-02 09:27:48.306 UTC [policies] Evaluate -> DEBU 251c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.306 UTC [policies] Evaluate -> DEBU 251d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.306 UTC [policies] Evaluate -> DEBU 251e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.307 UTC [cauthdsl] func1 -> DEBU 251f 0xc0044a3660 gate 1556789268307067800 evaluation starts" +"2019-05-02 09:27:48.307 UTC [cauthdsl] func2 -> DEBU 2520 0xc0044a3660 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.307 UTC [cauthdsl] func2 -> DEBU 2521 0xc0044a3660 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.307 UTC [cauthdsl] func2 -> DEBU 2522 0xc0044a3660 principal matched by identity 0" +"2019-05-02 09:27:48.307 UTC [msp.identity] Verify -> DEBU 2523 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.| +00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|" +"2019-05-02 09:27:48.307 UTC [msp.identity] Verify -> DEBU 2524 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. | +00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3| +00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$| +00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E| +00000040 ca 44 3d eb 27 9e 00 |.D=.'..|" +"2019-05-02 09:27:48.308 UTC [cauthdsl] func2 -> DEBU 2525 0xc0044a3660 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.308 UTC [cauthdsl] func1 -> DEBU 2526 0xc0044a3660 gate 1556789268307067800 evaluation succeeds" +"2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 2527 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 2528 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 2529 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.309 UTC [policies] Evaluate -> DEBU 252a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.309 UTC [msp.identity] Verify -> DEBU 252b Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....| +00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|" +"2019-05-02 09:27:48.310 UTC [msp.identity] Verify -> DEBU 252c Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj| +00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<| +00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&| +00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..| +00000040 97 4a 87 c3 f2 e2 |.J....|" +"2019-05-02 09:27:48.310 UTC [gossip.gossip] handleMessage -> DEBU 252d Exiting" +"2019-05-02 09:27:48.310 UTC [gossip.gossip] handleMessage -> DEBU 252e Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789267042721100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:48.311 UTC [msp.identity] Verify -> DEBU 252f Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....| +00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|" +"2019-05-02 09:27:48.311 UTC [msp.identity] Verify -> DEBU 2530 Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj| +00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<| +00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&| +00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..| +00000040 97 4a 87 c3 f2 e2 |.J....|" +"2019-05-02 09:27:48.311 UTC [msp] DeserializeIdentity -> DEBU 2531 Obtaining identity" +"2019-05-02 09:27:48.312 UTC [gossip.gossip] handleMessage -> DEBU 2532 Exiting" +"2019-05-02 09:27:48.506 UTC [gossip.gossip] handleMessage -> DEBU 2533 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.507 UTC [msp] DeserializeIdentity -> DEBU 2534 Obtaining identity" +"2019-05-02 09:27:48.507 UTC [msp] DeserializeIdentity -> DEBU 2535 Obtaining identity" +"2019-05-02 09:27:48.508 UTC [gossip.gossip] handleMessage -> DEBU 2536 Exiting" +"2019-05-02 09:27:48.515 UTC [gossip.gossip] handleMessage -> DEBU 2537 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.516 UTC [msp.identity] Verify -> DEBU 2538 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +"2019-05-02 09:27:48.516 UTC [msp.identity] Verify -> DEBU 2539 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +00000040 a6 7f 10 af bd 05 6d |......m|" +"2019-05-02 09:27:48.516 UTC [gossip.gossip] handleMessage -> DEBU 253a Exiting" +"2019-05-02 09:27:48.520 UTC [gossip.comm] func1 -> DEBU 253b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.521 UTC [gossip.gossip] handleMessage -> DEBU 253c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.521 UTC [msp.identity] Verify -> DEBU 253d Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +"2019-05-02 09:27:48.521 UTC [msp.identity] Verify -> DEBU 253e Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +00000040 a6 7f 10 af bd 05 6d |......m|" +"2019-05-02 09:27:48.522 UTC [msp] DeserializeIdentity -> DEBU 253f Obtaining identity" +"2019-05-02 09:27:48.522 UTC [gossip.gossip] handleMessage -> DEBU 2540 Exiting" +"2019-05-02 09:27:48.533 UTC [gossip.gossip] handleMessage -> DEBU 2541 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789267033474700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.535 UTC [msp.identity] Verify -> DEBU 2542 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +"2019-05-02 09:27:48.535 UTC [msp.identity] Verify -> DEBU 2543 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +00000040 a6 7f 10 af bd 05 6d |......m|" +"2019-05-02 09:27:48.536 UTC [msp] DeserializeIdentity -> DEBU 2544 Obtaining identity" +"2019-05-02 09:27:48.536 UTC [gossip.gossip] handleMessage -> DEBU 2545 Exiting" +"2019-05-02 09:27:48.556 UTC [gossip.gossip] handleMessage -> DEBU 2546 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.556 UTC [gossip.pull] HandleMessage -> DEBU 2547 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.556 UTC [gossip.pull] SendDigest -> DEBU 2548 Sending BLOCK_MSG digest: [4 5 6 7 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:48.556 UTC [gossip.gossip] handleMessage -> DEBU 2549 Exiting" +"2019-05-02 09:27:48.753 UTC [gossip.gossip] handleMessage -> DEBU 254a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.753 UTC [msp] DeserializeIdentity -> DEBU 254b Obtaining identity" +"2019-05-02 09:27:48.754 UTC [msp] DeserializeIdentity -> DEBU 254c Obtaining identity" +"2019-05-02 09:27:48.754 UTC [msp] DeserializeIdentity -> DEBU 254d Obtaining identity" +"2019-05-02 09:27:48.754 UTC [gossip.gossip] handleMessage -> DEBU 254e Exiting" +"2019-05-02 09:27:48.761 UTC [gossip.gossip] handleMessage -> DEBU 254f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789267062989700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:48.761 UTC [msp] DeserializeIdentity -> DEBU 2550 Obtaining identity" +"2019-05-02 09:27:48.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2551 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.762 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2552 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.762 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2553 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.762 UTC [policies] Evaluate -> DEBU 2554 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.762 UTC [policies] Evaluate -> DEBU 2555 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.762 UTC [policies] Evaluate -> DEBU 2556 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.762 UTC [cauthdsl] func1 -> DEBU 2557 0xc0044f2ed0 gate 1556789268762539800 evaluation starts" +"2019-05-02 09:27:48.762 UTC [cauthdsl] func2 -> DEBU 2558 0xc0044f2ed0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.762 UTC [cauthdsl] func2 -> DEBU 2559 0xc0044f2ed0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.762 UTC [cauthdsl] func2 -> DEBU 255a 0xc0044f2ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 255b 0xc0044f2ed0 principal evaluation fails" +"2019-05-02 09:27:48.763 UTC [cauthdsl] func1 -> DEBU 255c 0xc0044f2ed0 gate 1556789268762539800 evaluation fails" +"2019-05-02 09:27:48.763 UTC [policies] Evaluate -> DEBU 255d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.763 UTC [policies] Evaluate -> DEBU 255e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.763 UTC [policies] Evaluate -> DEBU 255f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.763 UTC [cauthdsl] func1 -> DEBU 2560 0xc0044f3710 gate 1556789268763478500 evaluation starts" +"2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 2561 0xc0044f3710 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 2562 0xc0044f3710 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.763 UTC [cauthdsl] func2 -> DEBU 2563 0xc0044f3710 principal matched by identity 0" +"2019-05-02 09:27:48.763 UTC [msp.identity] Verify -> DEBU 2564 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +"2019-05-02 09:27:48.764 UTC [msp.identity] Verify -> DEBU 2565 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +"2019-05-02 09:27:48.764 UTC [cauthdsl] func2 -> DEBU 2566 0xc0044f3710 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.764 UTC [cauthdsl] func1 -> DEBU 2567 0xc0044f3710 gate 1556789268763478500 evaluation succeeds" +"2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 2568 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 2569 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 256a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.764 UTC [policies] Evaluate -> DEBU 256b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.764 UTC [msp] DeserializeIdentity -> DEBU 256c Obtaining identity" +"2019-05-02 09:27:48.764 UTC [gossip.gossip] handleMessage -> DEBU 256d Exiting" +"2019-05-02 09:27:48.767 UTC [gossip.comm] func1 -> DEBU 256e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789267062989700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:48.767 UTC [gossip.gossip] handleMessage -> DEBU 256f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789267062989700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:48.768 UTC [msp] DeserializeIdentity -> DEBU 2570 Obtaining identity" +"2019-05-02 09:27:48.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2571 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2572 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2573 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 2574 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 2575 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 2576 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.768 UTC [cauthdsl] func1 -> DEBU 2577 0xc004507280 gate 1556789268768569000 evaluation starts" +"2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 2578 0xc004507280 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 2579 0xc004507280 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 257a 0xc004507280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.768 UTC [cauthdsl] func2 -> DEBU 257b 0xc004507280 principal evaluation fails" +"2019-05-02 09:27:48.768 UTC [cauthdsl] func1 -> DEBU 257c 0xc004507280 gate 1556789268768569000 evaluation fails" +"2019-05-02 09:27:48.768 UTC [policies] Evaluate -> DEBU 257d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 257e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 257f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.769 UTC [cauthdsl] func1 -> DEBU 2580 0xc004507ac0 gate 1556789268769127900 evaluation starts" +"2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2581 0xc004507ac0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2582 0xc004507ac0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2583 0xc004507ac0 principal matched by identity 0" +"2019-05-02 09:27:48.769 UTC [msp.identity] Verify -> DEBU 2584 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +"2019-05-02 09:27:48.769 UTC [msp.identity] Verify -> DEBU 2585 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +"2019-05-02 09:27:48.769 UTC [cauthdsl] func2 -> DEBU 2586 0xc004507ac0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.769 UTC [cauthdsl] func1 -> DEBU 2587 0xc004507ac0 gate 1556789268769127900 evaluation succeeds" +"2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 2588 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 2589 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 258a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.769 UTC [policies] Evaluate -> DEBU 258b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.770 UTC [msp] DeserializeIdentity -> DEBU 258c Obtaining identity" +"2019-05-02 09:27:48.770 UTC [gossip.gossip] handleMessage -> DEBU 258d Exiting" +"2019-05-02 09:27:48.802 UTC [gossip.comm] func1 -> DEBU 258e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.802 UTC [gossip.gossip] handleMessage -> DEBU 258f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.802 UTC [gossip.gossip] handleMessage -> DEBU 2590 Exiting" +"2019-05-02 09:27:48.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2591 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.802 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2592 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:48.803 UTC [msp] DeserializeIdentity -> DEBU 2593 Obtaining identity" +"2019-05-02 09:27:48.803 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2594 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2595 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2596 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.803 UTC [policies] Evaluate -> DEBU 2597 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.803 UTC [policies] Evaluate -> DEBU 2598 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.803 UTC [policies] Evaluate -> DEBU 2599 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.803 UTC [cauthdsl] func1 -> DEBU 259a 0xc00451b9b0 gate 1556789268803937500 evaluation starts" +"2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259b 0xc00451b9b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259c 0xc00451b9b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259d 0xc00451b9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 259e 0xc00451b9b0 principal evaluation fails" +"2019-05-02 09:27:48.804 UTC [cauthdsl] func1 -> DEBU 259f 0xc00451b9b0 gate 1556789268803937500 evaluation fails" +"2019-05-02 09:27:48.804 UTC [policies] Evaluate -> DEBU 25a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.804 UTC [policies] Evaluate -> DEBU 25a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.804 UTC [policies] Evaluate -> DEBU 25a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.804 UTC [cauthdsl] func1 -> DEBU 25a3 0xc00452e1f0 gate 1556789268804893200 evaluation starts" +"2019-05-02 09:27:48.804 UTC [cauthdsl] func2 -> DEBU 25a4 0xc00452e1f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.805 UTC [cauthdsl] func2 -> DEBU 25a5 0xc00452e1f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.805 UTC [cauthdsl] func2 -> DEBU 25a6 0xc00452e1f0 principal matched by identity 0" +"2019-05-02 09:27:48.805 UTC [msp.identity] Verify -> DEBU 25a7 Verify: digest = 00000000 7b 98 ff a8 3f da 20 30 17 05 b3 77 64 bc b0 b2 |{...?. 0...wd...| +00000010 0e 41 f2 02 55 9f 6b 22 17 72 47 c0 35 2b d0 00 |.A..U.k".rG.5+..|" +"2019-05-02 09:27:48.805 UTC [msp.identity] Verify -> DEBU 25a8 Verify: sig = 00000000 30 45 02 21 00 ba 38 b9 2d 06 48 b0 09 68 0a ef |0E.!..8.-.H..h..| +00000010 fc 0a 79 2b 7a 6c 56 3a 5c e3 e2 49 34 96 71 20 |..y+zlV:\..I4.q | +00000020 1d 6d 3a da ba 02 20 11 de 87 a6 61 4b 15 d2 a5 |.m:... ....aK...| +00000030 9a 63 f9 94 9d 1a c6 c1 da d1 bf 41 43 64 8c ee |.c.........ACd..| +00000040 4e 69 e5 82 1b e2 6c |Ni....l|" +"2019-05-02 09:27:48.805 UTC [cauthdsl] func2 -> DEBU 25a9 0xc00452e1f0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.805 UTC [cauthdsl] func1 -> DEBU 25aa 0xc00452e1f0 gate 1556789268804893200 evaluation succeeds" +"2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ab Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ad Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.805 UTC [policies] Evaluate -> DEBU 25ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 25af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 " +"2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 " +"2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:48.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 25b4 Exiting" +"2019-05-02 09:27:48.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 25b5 Exiting" +"2019-05-02 09:27:48.806 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25b6 Exiting" +"2019-05-02 09:27:48.807 UTC [msp] DeserializeIdentity -> DEBU 25b7 Obtaining identity" +"2019-05-02 09:27:48.807 UTC [msp] DeserializeIdentity -> DEBU 25b8 Obtaining identity" +"2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25b9 Obtaining identity" +"2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25ba Obtaining identity" +"2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25bb Obtaining identity" +"2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25bc Obtaining identity" +"2019-05-02 09:27:48.808 UTC [gossip.comm] Send -> DEBU 25bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25be Obtaining identity" +"2019-05-02 09:27:48.808 UTC [msp] DeserializeIdentity -> DEBU 25bf Obtaining identity" +"2019-05-02 09:27:48.808 UTC [gossip.comm] Send -> DEBU 25c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c3 Exiting" +"2019-05-02 09:27:48.808 UTC [gossip.comm] sendToEndpoint -> DEBU 25c4 Exiting" +"2019-05-02 09:27:48.813 UTC [gossip.comm] func1 -> DEBU 25c5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.813 UTC [gossip.gossip] handleMessage -> DEBU 25c6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.813 UTC [gossip.pull] HandleMessage -> DEBU 25c7 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.813 UTC [msp] DeserializeIdentity -> DEBU 25c8 Obtaining identity" +"2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25c9 Obtaining identity" +"2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25ca Obtaining identity" +"2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25cb Obtaining identity" +"2019-05-02 09:27:48.814 UTC [msp] DeserializeIdentity -> DEBU 25cc Obtaining identity" +"2019-05-02 09:27:48.815 UTC [msp] DeserializeIdentity -> DEBU 25cd Obtaining identity" +"2019-05-02 09:27:48.815 UTC [gossip.pull] SendDigest -> DEBU 25ce Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:48.815 UTC [gossip.gossip] handleMessage -> DEBU 25cf Exiting" +"2019-05-02 09:27:48.821 UTC [gossip.gossip] handleMessage -> DEBU 25d0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.822 UTC [gossip.gossip] handleMessage -> DEBU 25d1 Exiting" +"2019-05-02 09:27:48.822 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.822 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d3 Exiting" +"2019-05-02 09:27:48.831 UTC [gossip.comm] func1 -> DEBU 25d4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.831 UTC [gossip.gossip] handleMessage -> DEBU 25d5 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.832 UTC [gossip.gossip] handleMessage -> DEBU 25d6 Exiting" +"2019-05-02 09:27:48.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.832 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25d8 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:48.832 UTC [msp] DeserializeIdentity -> DEBU 25d9 Obtaining identity" +"2019-05-02 09:27:48.833 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25da Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25db Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25dc Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.833 UTC [policies] Evaluate -> DEBU 25dd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.833 UTC [policies] Evaluate -> DEBU 25de This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.834 UTC [policies] Evaluate -> DEBU 25df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.834 UTC [cauthdsl] func1 -> DEBU 25e0 0xc00455d010 gate 1556789268834572300 evaluation starts" +"2019-05-02 09:27:48.834 UTC [cauthdsl] func2 -> DEBU 25e1 0xc00455d010 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.835 UTC [cauthdsl] func2 -> DEBU 25e2 0xc00455d010 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.835 UTC [cauthdsl] func2 -> DEBU 25e3 0xc00455d010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.835 UTC [cauthdsl] func2 -> DEBU 25e4 0xc00455d010 principal evaluation fails" +"2019-05-02 09:27:48.835 UTC [cauthdsl] func1 -> DEBU 25e5 0xc00455d010 gate 1556789268834572300 evaluation fails" +"2019-05-02 09:27:48.836 UTC [policies] Evaluate -> DEBU 25e6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.836 UTC [policies] Evaluate -> DEBU 25e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.836 UTC [policies] Evaluate -> DEBU 25e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.836 UTC [cauthdsl] func1 -> DEBU 25e9 0xc00455d850 gate 1556789268836696400 evaluation starts" +"2019-05-02 09:27:48.836 UTC [cauthdsl] func2 -> DEBU 25ea 0xc00455d850 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.837 UTC [cauthdsl] func2 -> DEBU 25eb 0xc00455d850 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.837 UTC [cauthdsl] func2 -> DEBU 25ec 0xc00455d850 principal matched by identity 0" +"2019-05-02 09:27:48.837 UTC [msp.identity] Verify -> DEBU 25ed Verify: digest = 00000000 41 f8 24 e9 c5 5d 4b ef 6d 0c e0 73 af c4 a5 b7 |A.$..]K.m..s....| +00000010 ba 0b b8 1a 71 d0 16 b5 dc 66 fe 4e 0f 3e 0d 74 |....q....f.N.>.t|" +"2019-05-02 09:27:48.837 UTC [msp.identity] Verify -> DEBU 25ee Verify: sig = 00000000 30 44 02 20 71 79 47 c9 31 7a f9 e0 d5 3a 07 3e |0D. qyG.1z...:.>| +00000010 fa 9b 3f c2 e7 8e b8 06 60 43 1c 52 b3 e9 49 65 |..?.....`C.R..Ie| +00000020 53 d5 91 6e 02 20 73 b2 65 d8 af 93 ce 0a 2a 22 |S..n. s.e.....*"| +00000030 ae 3b e5 77 76 2d 21 94 da 6b 81 bf 84 59 8b 86 |.;.wv-!..k...Y..| +00000040 92 76 ab 56 bb ca |.v.V..|" +"2019-05-02 09:27:48.838 UTC [cauthdsl] func2 -> DEBU 25ef 0xc00455d850 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.838 UTC [cauthdsl] func1 -> DEBU 25f0 0xc00455d850 gate 1556789268836696400 evaluation succeeds" +"2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f3 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:48.838 UTC [policies] Evaluate -> DEBU 25f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:48.838 UTC [gossip.discovery] handleAliveMessage -> DEBU 25f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f7 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 " +"2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 " +"2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25f9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:48.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 25fa Exiting" +"2019-05-02 09:27:48.839 UTC [gossip.discovery] handleAliveMessage -> DEBU 25fb Exiting" +"2019-05-02 09:27:48.840 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25fc Exiting" +"2019-05-02 09:27:48.840 UTC [gossip.discovery] sendMemResponse -> DEBU 25fd Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:48.841 UTC [msp] DeserializeIdentity -> DEBU 25fe Obtaining identity" +"2019-05-02 09:27:48.841 UTC [msp] DeserializeIdentity -> DEBU 25ff Obtaining identity" +"2019-05-02 09:27:48.841 UTC [msp] DeserializeIdentity -> DEBU 2600 Obtaining identity" +"2019-05-02 09:27:48.842 UTC [gossip.comm] Send -> DEBU 2601 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:48.842 UTC [gossip.discovery] sendMemResponse -> DEBU 2602 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:48.842 UTC [gossip.comm] sendToEndpoint -> DEBU 2603 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.842 UTC [gossip.comm] sendToEndpoint -> DEBU 2604 Exiting" +"2019-05-02 09:27:48.989 UTC [gossip.comm] func1 -> DEBU 2605 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.989 UTC [gossip.comm] func1 -> DEBU 2606 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789267060314300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.989 UTC [gossip.gossip] handleMessage -> DEBU 2607 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:48.990 UTC [msp] DeserializeIdentity -> DEBU 2608 Obtaining identity" +"2019-05-02 09:27:48.991 UTC [msp] DeserializeIdentity -> DEBU 2609 Obtaining identity" +"2019-05-02 09:27:48.991 UTC [msp] DeserializeIdentity -> DEBU 260a Obtaining identity" +"2019-05-02 09:27:48.991 UTC [gossip.gossip] handleMessage -> DEBU 260b Exiting" +"2019-05-02 09:27:48.992 UTC [gossip.gossip] handleMessage -> DEBU 260c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789267060314300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:48.992 UTC [msp] DeserializeIdentity -> DEBU 260d Obtaining identity" +"2019-05-02 09:27:48.993 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 260e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:48.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 260f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2610 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:48.994 UTC [policies] Evaluate -> DEBU 2611 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:48.994 UTC [policies] Evaluate -> DEBU 2612 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:48.994 UTC [policies] Evaluate -> DEBU 2613 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:48.995 UTC [cauthdsl] func1 -> DEBU 2614 0xc00458ca80 gate 1556789268995205500 evaluation starts" +"2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2615 0xc00458ca80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2616 0xc00458ca80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2617 0xc00458ca80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:48.995 UTC [cauthdsl] func2 -> DEBU 2618 0xc00458ca80 principal evaluation fails" +"2019-05-02 09:27:48.996 UTC [cauthdsl] func1 -> DEBU 2619 0xc00458ca80 gate 1556789268995205500 evaluation fails" +"2019-05-02 09:27:48.996 UTC [policies] Evaluate -> DEBU 261a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.996 UTC [policies] Evaluate -> DEBU 261b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:48.996 UTC [policies] Evaluate -> DEBU 261c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:48.996 UTC [cauthdsl] func1 -> DEBU 261d 0xc00458d2c0 gate 1556789268996959200 evaluation starts" +"2019-05-02 09:27:48.997 UTC [cauthdsl] func2 -> DEBU 261e 0xc00458d2c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:48.997 UTC [cauthdsl] func2 -> DEBU 261f 0xc00458d2c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:48.997 UTC [cauthdsl] func2 -> DEBU 2620 0xc00458d2c0 principal matched by identity 0" +"2019-05-02 09:27:48.997 UTC [msp.identity] Verify -> DEBU 2621 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.| +00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|" +"2019-05-02 09:27:48.998 UTC [msp.identity] Verify -> DEBU 2622 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. | +00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3| +00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$| +00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E| +00000040 ca 44 3d eb 27 9e 00 |.D=.'..|" +"2019-05-02 09:27:48.998 UTC [cauthdsl] func2 -> DEBU 2623 0xc00458d2c0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:48.999 UTC [cauthdsl] func1 -> DEBU 2624 0xc00458d2c0 gate 1556789268996959200 evaluation succeeds" +"2019-05-02 09:27:49.001 UTC [policies] Evaluate -> DEBU 2625 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:49.002 UTC [policies] Evaluate -> DEBU 2626 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:49.002 UTC [policies] Evaluate -> DEBU 2627 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:49.002 UTC [policies] Evaluate -> DEBU 2628 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:49.002 UTC [msp] DeserializeIdentity -> DEBU 2629 Obtaining identity" +"2019-05-02 09:27:49.003 UTC [gossip.gossip] handleMessage -> DEBU 262a Exiting" +"2019-05-02 09:27:49.003 UTC [msp] DeserializeIdentity -> DEBU 262b Obtaining identity" +"2019-05-02 09:27:49.003 UTC [msp] DeserializeIdentity -> DEBU 262c Obtaining identity" +"2019-05-02 09:27:49.004 UTC [gossip.pull] Hello -> DEBU 262d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:49.004 UTC [msp] DeserializeIdentity -> DEBU 262e Obtaining identity" +"2019-05-02 09:27:49.004 UTC [msp] DeserializeIdentity -> DEBU 262f Obtaining identity" +"2019-05-02 09:27:49.005 UTC [gossip.comm] Send -> DEBU 2630 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:49.005 UTC [gossip.comm] sendToEndpoint -> DEBU 2631 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.005 UTC [gossip.comm] sendToEndpoint -> DEBU 2632 Exiting" +"2019-05-02 09:27:49.006 UTC [gossip.gossip] handleMessage -> DEBU 2633 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11370566117805470300 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6 7], Envelope: 55 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.007 UTC [gossip.pull] HandleMessage -> DEBU 2634 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11370566117805470300 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6 7], Envelope: 55 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.007 UTC [gossip.gossip] handleMessage -> DEBU 2635 Exiting" +"2019-05-02 09:27:49.042 UTC [msp.identity] Sign -> DEBU 2636 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101B " +"2019-05-02 09:27:49.042 UTC [msp.identity] Sign -> DEBU 2637 Sign: digest: 3C9763F32527B00797EDDEC06813EDD9B992BECEEB58EAC8B782CF46E6F1E095 " +"2019-05-02 09:27:49.043 UTC [msp.identity] Sign -> DEBU 2638 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:49.043 UTC [msp.identity] Sign -> DEBU 2639 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:49.044 UTC [gossip.discovery] periodicalSendAlive -> DEBU 263a Sleeping 5s" +"2019-05-02 09:27:49.048 UTC [msp] DeserializeIdentity -> DEBU 263b Obtaining identity" +"2019-05-02 09:27:49.049 UTC [msp] DeserializeIdentity -> DEBU 263c Obtaining identity" +"2019-05-02 09:27:49.049 UTC [gossip.comm] Send -> DEBU 263d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:49.050 UTC [msp] DeserializeIdentity -> DEBU 263e Obtaining identity" +"2019-05-02 09:27:49.050 UTC [gossip.comm] Send -> DEBU 263f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:49.050 UTC [gossip.comm] sendToEndpoint -> DEBU 2640 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:49.051 UTC [msp] DeserializeIdentity -> DEBU 2641 Obtaining identity" +"2019-05-02 09:27:49.051 UTC [gossip.comm] sendToEndpoint -> DEBU 2642 Exiting" +"2019-05-02 09:27:49.051 UTC [gossip.comm] Send -> DEBU 2643 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:49.051 UTC [gossip.comm] sendToEndpoint -> DEBU 2644 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2645 Exiting" +"2019-05-02 09:27:49.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2646 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2647 Exiting" +"2019-05-02 09:27:49.090 UTC [gossip.pull] Hello -> DEBU 2648 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:49.091 UTC [gossip.comm] Send -> DEBU 2649 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:49.092 UTC [gossip.pull] Hello -> DEBU 264a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:27:49.096 UTC [gossip.comm] Send -> DEBU 264b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:49.096 UTC [gossip.pull] Hello -> DEBU 264c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:27:49.099 UTC [gossip.comm] Send -> DEBU 264f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:49.099 UTC [gossip.comm] sendToEndpoint -> DEBU 2650 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.099 UTC [gossip.comm] sendToEndpoint -> DEBU 2651 Exiting" +"2019-05-02 09:27:49.098 UTC [gossip.comm] sendToEndpoint -> DEBU 264e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.099 UTC [gossip.comm] sendToEndpoint -> DEBU 2652 Exiting" +"2019-05-02 09:27:49.096 UTC [gossip.comm] sendToEndpoint -> DEBU 264d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.100 UTC [gossip.comm] sendToEndpoint -> DEBU 2653 Exiting" +"2019-05-02 09:27:49.099 UTC [gossip.gossip] handleMessage -> DEBU 2654 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:49.104 UTC [gossip.gossip] handleMessage -> DEBU 2655 Exiting" +"2019-05-02 09:27:49.105 UTC [gossip.gossip] handleMessage -> DEBU 2656 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.107 UTC [gossip.pull] HandleMessage -> DEBU 2658 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2657 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:49.108 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2659 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:49.108 UTC [gossip.pull] SendDigest -> DEBU 265a Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:49.109 UTC [gossip.gossip] handleMessage -> DEBU 265b Exiting" +"2019-05-02 09:27:49.109 UTC [msp.identity] Verify -> DEBU 265c Verify: digest = 00000000 78 5d f0 85 0f 78 62 8e 8d 34 76 97 b8 80 60 0e |x]...xb..4v...`.| +00000010 04 3e ee e3 45 67 42 6a 1d a7 a5 1c 57 13 1c 46 |.>..EgBj....W..F|" +"2019-05-02 09:27:49.110 UTC [msp.identity] Verify -> DEBU 265d Verify: sig = 00000000 30 44 02 20 1e aa 15 e4 2e 04 d6 f0 b4 b0 b0 7b |0D. ...........{| +00000010 49 d0 59 a5 09 9c d7 f0 3f 6e f3 5b 69 3c 63 cc |I.Y.....?n.[i..../....| +00000040 25 51 1a 6f c3 7a |%Q.o.z|" +"2019-05-02 09:27:49.111 UTC [msp.identity] Verify -> DEBU 265f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:17.447 UTC [msp.identity] Verify -> DEBU 24f4 Verify: sig = 00000000 30 44 02 20 3c 99 1a 5e a8 31 e3 65 d0 9e 44 90 |0D. <..^.1.e..D.| -00000010 a2 c9 a0 17 7f 94 55 df 0a 3c 08 02 ce 34 db 09 |......U..<...4..| -00000020 db 37 7c 59 02 20 14 6c ff 82 c2 bf 8b c3 af 1e |.7|Y. .l........| -00000030 2f 6a 6a 2c a4 e6 cb ae eb 05 e6 cd cb 04 99 47 |/jj,...........G| -00000040 d5 2f 69 76 80 9f |./iv..|" -"2019-05-02 01:31:17.447 UTC [gossip.discovery] handleAliveMessage -> DEBU 24f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:17.448 UTC [gossip.discovery] learnExistingMembers -> DEBU 24f6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:31:17.448 UTC [gossip.discovery] learnExistingMembers -> DEBU 24f7 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 " -"2019-05-02 01:31:17.448 UTC [gossip.discovery] learnExistingMembers -> DEBU 24f8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 " -"2019-05-02 01:31:17.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 24f9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:17.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fa Exiting" -"2019-05-02 01:31:17.450 UTC [gossip.discovery] handleAliveMessage -> DEBU 24fb Exiting" -"2019-05-02 01:31:17.452 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24fc Exiting" -"2019-05-02 01:31:17.454 UTC [gossip.discovery] sendMemResponse -> DEBU 24fd Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:17.454 UTC [msp] DeserializeIdentity -> DEBU 24fe Obtaining identity" -"2019-05-02 01:31:17.455 UTC [msp] DeserializeIdentity -> DEBU 24ff Obtaining identity" -"2019-05-02 01:31:17.456 UTC [gossip.comm] Send -> DEBU 2500 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:17.457 UTC [gossip.discovery] sendMemResponse -> DEBU 2501 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:17.458 UTC [gossip.comm] sendToEndpoint -> DEBU 2502 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.462 UTC [gossip.comm] sendToEndpoint -> DEBU 2503 Exiting" -"2019-05-02 01:31:17.516 UTC [gossip.comm] func1 -> DEBU 2504 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.516 UTC [gossip.gossip] handleMessage -> DEBU 2505 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.517 UTC [gossip.pull] HandleMessage -> DEBU 2506 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.517 UTC [msp] DeserializeIdentity -> DEBU 2507 Obtaining identity" -"2019-05-02 01:31:17.517 UTC [msp] DeserializeIdentity -> DEBU 2508 Obtaining identity" -"2019-05-02 01:31:17.518 UTC [msp] DeserializeIdentity -> DEBU 2509 Obtaining identity" -"2019-05-02 01:31:17.518 UTC [msp] DeserializeIdentity -> DEBU 250a Obtaining identity" -"2019-05-02 01:31:17.518 UTC [msp] DeserializeIdentity -> DEBU 250b Obtaining identity" -"2019-05-02 01:31:17.519 UTC [msp] DeserializeIdentity -> DEBU 250c Obtaining identity" -"2019-05-02 01:31:17.519 UTC [gossip.pull] SendDigest -> DEBU 250d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:17.519 UTC [gossip.gossip] handleMessage -> DEBU 250e Exiting" -"2019-05-02 01:31:17.525 UTC [gossip.comm] func1 -> DEBU 250f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.525 UTC [gossip.gossip] handleMessage -> DEBU 2510 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.525 UTC [gossip.gossip] handleMessage -> DEBU 2511 Exiting" -"2019-05-02 01:31:17.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2512 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.526 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2513 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:17.526 UTC [msp] DeserializeIdentity -> DEBU 2514 Obtaining identity" -"2019-05-02 01:31:17.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2515 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:17.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2516 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2517 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.528 UTC [policies] Evaluate -> DEBU 2518 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.528 UTC [policies] Evaluate -> DEBU 2519 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.528 UTC [policies] Evaluate -> DEBU 251a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.529 UTC [cauthdsl] func1 -> DEBU 251b 0xc000378f80 gate 1556760677529091500 evaluation starts" -"2019-05-02 01:31:17.529 UTC [cauthdsl] func2 -> DEBU 251c 0xc000378f80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.529 UTC [cauthdsl] func2 -> DEBU 251d 0xc000378f80 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.530 UTC [cauthdsl] func2 -> DEBU 251e 0xc000378f80 principal matched by identity 0" -"2019-05-02 01:31:17.530 UTC [msp.identity] Verify -> DEBU 251f Verify: digest = 00000000 02 e5 25 46 47 91 7d 93 32 60 d6 a1 5c 19 ba 88 |..%FG.}.2`..\...| -00000010 4a 51 f7 f2 c4 aa 99 d6 4b 0c 50 e7 3c 78 62 91 |JQ......K.P. DEBU 2520 Verify: sig = 00000000 30 45 02 21 00 d5 b7 31 db 27 eb 7f 3f 30 0a bb |0E.!...1.'..?0..| -00000010 fe 1c f3 b3 48 1a cf b7 c9 45 1a ca 8f b0 7a 89 |....H....E....z.| -00000020 04 dd 4b d3 9d 02 20 67 17 25 58 1e 22 10 b0 16 |..K... g.%X."...| -00000030 ae 5c e5 4d d7 e3 c7 12 47 76 dd cd 99 b7 39 40 |.\.M....Gv....9@| -00000040 94 f6 72 01 53 3f 05 |..r.S?.|" -"2019-05-02 01:31:17.531 UTC [cauthdsl] func2 -> DEBU 2521 0xc000378f80 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.531 UTC [cauthdsl] func1 -> DEBU 2522 0xc000378f80 gate 1556760677529091500 evaluation succeeds" -"2019-05-02 01:31:17.533 UTC [policies] Evaluate -> DEBU 2523 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.534 UTC [policies] Evaluate -> DEBU 2524 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.534 UTC [policies] Evaluate -> DEBU 2525 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.534 UTC [policies] Evaluate -> DEBU 2526 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 2527 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 2528 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:17.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 2529 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 " -"2019-05-02 01:31:17.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 252a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 " -"2019-05-02 01:31:17.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 252b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:17.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 252c Exiting" -"2019-05-02 01:31:17.536 UTC [gossip.discovery] handleAliveMessage -> DEBU 252d Exiting" -"2019-05-02 01:31:17.537 UTC [gossip.discovery] sendMemResponse -> DEBU 252e Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:17.537 UTC [msp] DeserializeIdentity -> DEBU 252f Obtaining identity" -"2019-05-02 01:31:17.538 UTC [msp] DeserializeIdentity -> DEBU 2530 Obtaining identity" -"2019-05-02 01:31:17.538 UTC [msp] DeserializeIdentity -> DEBU 2531 Obtaining identity" -"2019-05-02 01:31:17.539 UTC [gossip.comm] Send -> DEBU 2532 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:17.539 UTC [gossip.discovery] sendMemResponse -> DEBU 2533 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:17.540 UTC [gossip.comm] sendToEndpoint -> DEBU 2534 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.547 UTC [gossip.comm] sendToEndpoint -> DEBU 2535 Exiting" -"2019-05-02 01:31:17.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2536 Exiting" -"2019-05-02 01:31:17.563 UTC [endorser] ProcessProposal -> DEBU 2537 Entering: request from 192.168.240.9:41350" -"2019-05-02 01:31:17.563 UTC [protoutils] ValidateProposalMessage -> DEBU 2538 ValidateProposalMessage starts for signed proposal 0xc0025957c0" -"2019-05-02 01:31:17.563 UTC [protoutils] validateChannelHeader -> DEBU 2539 validateChannelHeader info: header type 3" -"2019-05-02 01:31:17.563 UTC [protoutils] checkSignatureFromCreator -> DEBU 253a begin" -"2019-05-02 01:31:17.564 UTC [msp] GetManagerForChain -> DEBU 253b Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:17.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 253c creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -"2019-05-02 01:31:17.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 253d creator is valid" -"2019-05-02 01:31:17.565 UTC [msp.identity] Verify -> DEBU 253e Verify: digest = 00000000 28 5b 1f 97 d5 d0 80 f9 1c 27 ab 57 34 b8 6f 97 |([.......'.W4.o.| -00000010 2e d4 03 c8 10 01 1f c0 b1 14 0e 1b fa 52 74 39 |.............Rt9|" -"2019-05-02 01:31:17.565 UTC [msp.identity] Verify -> DEBU 253f Verify: sig = 00000000 30 44 02 20 5e 41 7d ec 71 7a 50 88 c4 2c 48 2d |0D. ^A}.qzP..,H-| -00000010 f9 98 ba ce a6 7c d1 ad f5 1f 28 cc 45 d2 50 51 |.....|....(.E.PQ| -00000020 f2 91 f7 e5 02 20 17 1e f0 79 27 0e 76 94 23 90 |..... ...y'.v.#.| -00000030 e9 96 4a c0 40 88 70 e8 a5 5c 33 4d 05 3b bc 64 |..J.@.p..\3M.;.d| -00000040 a7 d2 bb e3 d1 3f |.....?|" -"2019-05-02 01:31:17.565 UTC [protoutils] checkSignatureFromCreator -> DEBU 2540 exits successfully" -"2019-05-02 01:31:17.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2541 validateChaincodeProposalMessage starts for proposal 0xc00318a1c0, header 0xc002595bd0" -"2019-05-02 01:31:17.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2542 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-05-02 01:31:17.566 UTC [endorser] preProcess -> DEBU 2543 [businesschannel][ab1c8c2a] processing txid: ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b" -"2019-05-02 01:31:17.567 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2544 retrieveTransactionByID() - txId = [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b]" -"2019-05-02 01:31:17.567 UTC [aclmgmt] CheckACL -> DEBU 2545 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-05-02 01:31:17.568 UTC [aclmgmt] CheckACL -> DEBU 2546 acl check(/Channel/Application/Writers)" -"2019-05-02 01:31:17.568 UTC [policies] Evaluate -> DEBU 2547 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:17.569 UTC [policies] Evaluate -> DEBU 2548 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.569 UTC [policies] Evaluate -> DEBU 2549 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:17.570 UTC [cauthdsl] func1 -> DEBU 254a 0xc002e31c50 gate 1556760677569980000 evaluation starts" -"2019-05-02 01:31:17.570 UTC [cauthdsl] func2 -> DEBU 254b 0xc002e31c50 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.570 UTC [cauthdsl] func2 -> DEBU 254c 0xc002e31c50 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.571 UTC [cauthdsl] func2 -> DEBU 254d 0xc002e31c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:17.571 UTC [cauthdsl] func2 -> DEBU 254e 0xc002e31c50 principal evaluation fails" -"2019-05-02 01:31:17.572 UTC [cauthdsl] func1 -> DEBU 254f 0xc002e31c50 gate 1556760677569980000 evaluation fails" -"2019-05-02 01:31:17.572 UTC [policies] Evaluate -> DEBU 2550 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:17.573 UTC [policies] Evaluate -> DEBU 2551 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:17.573 UTC [policies] Evaluate -> DEBU 2552 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-05-02 01:31:17.573 UTC [cauthdsl] func1 -> DEBU 2553 0xc002fd4490 gate 1556760677573959800 evaluation starts" -"2019-05-02 01:31:17.574 UTC [cauthdsl] func2 -> DEBU 2554 0xc002fd4490 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.574 UTC [cauthdsl] func2 -> DEBU 2555 0xc002fd4490 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.575 UTC [cauthdsl] func2 -> DEBU 2556 0xc002fd4490 principal matched by identity 0" -"2019-05-02 01:31:17.575 UTC [msp.identity] Verify -> DEBU 2557 Verify: digest = 00000000 28 5b 1f 97 d5 d0 80 f9 1c 27 ab 57 34 b8 6f 97 |([.......'.W4.o.| -00000010 2e d4 03 c8 10 01 1f c0 b1 14 0e 1b fa 52 74 39 |.............Rt9|" -"2019-05-02 01:31:17.576 UTC [msp.identity] Verify -> DEBU 2558 Verify: sig = 00000000 30 44 02 20 5e 41 7d ec 71 7a 50 88 c4 2c 48 2d |0D. ^A}.qzP..,H-| -00000010 f9 98 ba ce a6 7c d1 ad f5 1f 28 cc 45 d2 50 51 |.....|....(.E.PQ| -00000020 f2 91 f7 e5 02 20 17 1e f0 79 27 0e 76 94 23 90 |..... ...y'.v.#.| -00000030 e9 96 4a c0 40 88 70 e8 a5 5c 33 4d 05 3b bc 64 |..J.@.p..\3M.;.d| -00000040 a7 d2 bb e3 d1 3f |.....?|" -"2019-05-02 01:31:17.576 UTC [cauthdsl] func2 -> DEBU 2559 0xc002fd4490 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.576 UTC [cauthdsl] func1 -> DEBU 255a 0xc002fd4490 gate 1556760677573959800 evaluation succeeds" -"2019-05-02 01:31:17.576 UTC [policies] Evaluate -> DEBU 255b Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:17.578 UTC [gossip.comm] func1 -> DEBU 255c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.579 UTC [gossip.gossip] handleMessage -> DEBU 255d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.580 UTC [msp] DeserializeIdentity -> DEBU 255e Obtaining identity" -"2019-05-02 01:31:17.580 UTC [msp] DeserializeIdentity -> DEBU 255f Obtaining identity" -"2019-05-02 01:31:17.581 UTC [msp] DeserializeIdentity -> DEBU 2560 Obtaining identity" -"2019-05-02 01:31:17.581 UTC [gossip.gossip] handleMessage -> DEBU 2561 Exiting" -"2019-05-02 01:31:17.587 UTC [gossip.comm] func1 -> DEBU 2562 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760676910574700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.588 UTC [gossip.gossip] handleMessage -> DEBU 2563 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760676910574700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.588 UTC [msp] DeserializeIdentity -> DEBU 2564 Obtaining identity" -"2019-05-02 01:31:17.589 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2565 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:17.589 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2566 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.589 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2567 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.590 UTC [policies] Evaluate -> DEBU 2568 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.590 UTC [policies] Evaluate -> DEBU 2569 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.590 UTC [policies] Evaluate -> DEBU 256a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.591 UTC [cauthdsl] func1 -> DEBU 256b 0xc002f7d110 gate 1556760677591090200 evaluation starts" -"2019-05-02 01:31:17.591 UTC [cauthdsl] func2 -> DEBU 256c 0xc002f7d110 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.591 UTC [cauthdsl] func2 -> DEBU 256d 0xc002f7d110 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.591 UTC [cauthdsl] func2 -> DEBU 256e 0xc002f7d110 principal matched by identity 0" -"2019-05-02 01:31:17.592 UTC [msp.identity] Verify -> DEBU 256f Verify: digest = 00000000 97 fb 2f 6b ab 25 80 a3 0a b1 2e d6 57 48 39 12 |../k.%......WH9.| -00000010 bf 3c ea 49 b9 6e 47 4b 75 67 cc 48 80 fe fd cd |.<.I.nGKug.H....|" -"2019-05-02 01:31:17.592 UTC [msp.identity] Verify -> DEBU 2570 Verify: sig = 00000000 30 45 02 21 00 ae 33 be 2a ec cf 49 46 2d 69 50 |0E.!..3.*..IF-iP| -00000010 70 28 63 a9 89 2f 47 e3 0e 0a 5d 61 26 75 90 cc |p(c../G...]a&u..| -00000020 4a 6a a3 cb b0 02 20 59 c5 4d 33 f8 f6 cf c2 df |Jj.... Y.M3.....| -00000030 28 b4 c3 89 9a 3b 12 d0 7c be 2d a8 c8 5e 8a 87 |(....;..|.-..^..| -00000040 bd 9f 07 5f 99 39 b6 |..._.9.|" -"2019-05-02 01:31:17.592 UTC [cauthdsl] func2 -> DEBU 2571 0xc002f7d110 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.593 UTC [cauthdsl] func1 -> DEBU 2572 0xc002f7d110 gate 1556760677591090200 evaluation succeeds" -"2019-05-02 01:31:17.593 UTC [policies] Evaluate -> DEBU 2573 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.593 UTC [policies] Evaluate -> DEBU 2574 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.593 UTC [policies] Evaluate -> DEBU 2575 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.594 UTC [policies] Evaluate -> DEBU 2576 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.594 UTC [msp] DeserializeIdentity -> DEBU 2577 Obtaining identity" -"2019-05-02 01:31:17.594 UTC [msp] DeserializeIdentity -> DEBU 2578 Obtaining identity" -"2019-05-02 01:31:17.595 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2579 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.595 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 257a Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.596 UTC [policies] Evaluate -> DEBU 257b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.600 UTC [policies] Evaluate -> DEBU 257c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.600 UTC [policies] Evaluate -> DEBU 257d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.602 UTC [cauthdsl] func1 -> DEBU 257e 0xc0022ea330 gate 1556760677602104800 evaluation starts" -"2019-05-02 01:31:17.603 UTC [cauthdsl] func2 -> DEBU 2580 0xc0022ea330 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.577 UTC [policies] Evaluate -> DEBU 257f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:17.603 UTC [policies] Evaluate -> DEBU 2581 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:17.604 UTC [policies] Evaluate -> DEBU 2582 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:17.604 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2583 constructing new tx simulator" -"2019-05-02 01:31:17.604 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2584 constructing new tx simulator txid = [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b]" -"2019-05-02 01:31:17.604 UTC [endorser] SimulateProposal -> DEBU 2585 [businesschannel][ab1c8c2a] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:17.605 UTC [stateleveldb] GetState -> DEBU 2586 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:17.605 UTC [endorser] callChaincode -> INFO 2587 [businesschannel][ab1c8c2a] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:17.605 UTC [stateleveldb] GetState -> DEBU 2588 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:17.606 UTC [stateleveldb] GetState -> DEBU 2589 GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:17.606 UTC [chaincode] Execute -> DEBU 258a Entry" -"2019-05-02 01:31:17.607 UTC [chaincode] handleMessage -> DEBU 258b [ab1c8c2a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:17.607 UTC [chaincode] HandleTransaction -> DEBU 258c [ab1c8c2a] handling GET_STATE from chaincode" -"2019-05-02 01:31:17.608 UTC [chaincode] HandleGetState -> DEBU 258d [ab1c8c2a] getting state for chaincode exp02, key a, channel businesschannel" -"2019-05-02 01:31:17.608 UTC [stateleveldb] GetState -> DEBU 258e GetState(). ns=exp02, key=a" -"2019-05-02 01:31:17.608 UTC [chaincode] HandleTransaction -> DEBU 258f [ab1c8c2a] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:17.606 UTC [cauthdsl] func2 -> DEBU 2590 0xc0022ea330 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.609 UTC [chaincode] handleMessage -> DEBU 2591 [ab1c8c2a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:17.610 UTC [chaincode] HandleTransaction -> DEBU 2592 [ab1c8c2a] handling GET_STATE from chaincode" -"2019-05-02 01:31:17.610 UTC [chaincode] HandleGetState -> DEBU 2593 [ab1c8c2a] getting state for chaincode exp02, key b, channel businesschannel" -"2019-05-02 01:31:17.611 UTC [stateleveldb] GetState -> DEBU 2594 GetState(). ns=exp02, key=b" -"2019-05-02 01:31:17.611 UTC [chaincode] HandleTransaction -> DEBU 2595 [ab1c8c2a] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:17.612 UTC [chaincode] handleMessage -> DEBU 2596 [ab1c8c2a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:17.612 UTC [cauthdsl] func2 -> DEBU 2597 0xc0022ea330 principal matched by identity 0" -"2019-05-02 01:31:17.613 UTC [chaincode] HandleTransaction -> DEBU 2598 [ab1c8c2a] handling PUT_STATE from chaincode" -"2019-05-02 01:31:17.613 UTC [chaincode] HandleTransaction -> DEBU 2599 [ab1c8c2a] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:17.613 UTC [msp.identity] Verify -> DEBU 259a Verify: digest = 00000000 97 fb 2f 6b ab 25 80 a3 0a b1 2e d6 57 48 39 12 |../k.%......WH9.| -00000010 bf 3c ea 49 b9 6e 47 4b 75 67 cc 48 80 fe fd cd |.<.I.nGKug.H....|" -"2019-05-02 01:31:17.614 UTC [chaincode] handleMessage -> DEBU 259c [ab1c8c2a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-05-02 01:31:17.615 UTC [chaincode] HandleTransaction -> DEBU 259d [ab1c8c2a] handling PUT_STATE from chaincode" -"2019-05-02 01:31:17.615 UTC [chaincode] HandleTransaction -> DEBU 259e [ab1c8c2a] Completed PUT_STATE. Sending RESPONSE" -"2019-05-02 01:31:17.614 UTC [msp.identity] Verify -> DEBU 259b Verify: sig = 00000000 30 45 02 21 00 ae 33 be 2a ec cf 49 46 2d 69 50 |0E.!..3.*..IF-iP| -00000010 70 28 63 a9 89 2f 47 e3 0e 0a 5d 61 26 75 90 cc |p(c../G...]a&u..| -00000020 4a 6a a3 cb b0 02 20 59 c5 4d 33 f8 f6 cf c2 df |Jj.... Y.M3.....| -00000030 28 b4 c3 89 9a 3b 12 d0 7c be 2d a8 c8 5e 8a 87 |(....;..|.-..^..| -00000040 bd 9f 07 5f 99 39 b6 |..._.9.|" -"2019-05-02 01:31:17.616 UTC [chaincode] handleMessage -> DEBU 259f [ab1c8c2a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:17.616 UTC [chaincode] Notify -> DEBU 25a0 [ab1c8c2a] notifying Txid:ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b, channelID:businesschannel" -"2019-05-02 01:31:17.617 UTC [chaincode] Execute -> DEBU 25a1 Exit" -"2019-05-02 01:31:17.617 UTC [endorser] callChaincode -> INFO 25a2 [businesschannel][ab1c8c2a] Exit chaincode: name:"exp02" (12ms)" -"2019-05-02 01:31:17.617 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 25a3 Simulation completed, getting simulation results" -"2019-05-02 01:31:17.617 UTC [lockbasedtxmgr] Done -> DEBU 25a4 Done with transaction simulation / query execution [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b]" -"2019-05-02 01:31:17.618 UTC [endorser] SimulateProposal -> DEBU 25a5 [businesschannel][ab1c8c2a] Exit" -"2019-05-02 01:31:17.618 UTC [endorser] endorseProposal -> DEBU 25a6 [businesschannel][ab1c8c2a] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:17.618 UTC [endorser] endorseProposal -> DEBU 25a7 [businesschannel][ab1c8c2a] escc for chaincode name:"exp02" is escc" -"2019-05-02 01:31:17.618 UTC [endorser] EndorseWithPlugin -> DEBU 25a8 Entering endorsement for {plugin: escc, channel: businesschannel, tx: ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b, chaincode: exp02}" -"2019-05-02 01:31:17.619 UTC [msp.identity] Sign -> DEBU 25a9 Sign: plaintext: 0A20F42EBA8357501456F5593ADB059F...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:17.619 UTC [msp.identity] Sign -> DEBU 25aa Sign: digest: CE6D7B6F05A0DE9D4213F21ECBB094F061EECCFCC11C69C6B7EF88B6FFB86B94 " -"2019-05-02 01:31:17.619 UTC [endorser] EndorseWithPlugin -> DEBU 25ab Exiting {plugin: escc, channel: businesschannel, tx: ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b, chaincode: exp02}" -"2019-05-02 01:31:17.619 UTC [endorser] endorseProposal -> DEBU 25ac [businesschannel][ab1c8c2a] Exit" -"2019-05-02 01:31:17.620 UTC [lockbasedtxmgr] Done -> DEBU 25ad Done with transaction simulation / query execution [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b]" -"2019-05-02 01:31:17.620 UTC [endorser] func1 -> DEBU 25ae Exit: request from 192.168.240.9:41350" -"2019-05-02 01:31:17.620 UTC [comm.grpc.server] 1 -> INFO 25af unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41350 grpc.code=OK grpc.call_duration=58.0725ms -"2019-05-02 01:31:17.628 UTC [cauthdsl] func2 -> DEBU 25b0 0xc0022ea330 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.629 UTC [cauthdsl] func1 -> DEBU 25b1 0xc0022ea330 gate 1556760677602104800 evaluation succeeds" -"2019-05-02 01:31:17.630 UTC [policies] Evaluate -> DEBU 25b2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.630 UTC [policies] Evaluate -> DEBU 25b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.632 UTC [policies] Evaluate -> DEBU 25b4 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.633 UTC [policies] Evaluate -> DEBU 25b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.633 UTC [gossip.gossip] handleMessage -> DEBU 25b6 Exiting" -"2019-05-02 01:31:17.639 UTC [grpc] infof -> DEBU 25b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:17.640 UTC [grpc] infof -> DEBU 25b8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:17.642 UTC [msp] DeserializeIdentity -> DEBU 25b9 Obtaining identity" -"2019-05-02 01:31:17.643 UTC [msp] DeserializeIdentity -> DEBU 25ba Obtaining identity" -"2019-05-02 01:31:17.644 UTC [gossip.comm] Send -> DEBU 25bb Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760676910574700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes to 2 peers" -"2019-05-02 01:31:17.645 UTC [gossip.comm] sendToEndpoint -> DEBU 25bc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760676910574700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.645 UTC [gossip.comm] sendToEndpoint -> DEBU 25bd Exiting" -"2019-05-02 01:31:17.645 UTC [msp] DeserializeIdentity -> DEBU 25be Obtaining identity" -"2019-05-02 01:31:17.647 UTC [msp] DeserializeIdentity -> DEBU 25bf Obtaining identity" -"2019-05-02 01:31:17.647 UTC [gossip.comm] sendToEndpoint -> DEBU 25c0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760676910574700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.647 UTC [gossip.comm] sendToEndpoint -> DEBU 25c1 Exiting" -"2019-05-02 01:31:17.743 UTC [gossip.comm] func1 -> DEBU 25c2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.744 UTC [gossip.gossip] handleMessage -> DEBU 25c3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.744 UTC [gossip.pull] HandleMessage -> DEBU 25c4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.745 UTC [msp] DeserializeIdentity -> DEBU 25c5 Obtaining identity" -"2019-05-02 01:31:17.745 UTC [msp] DeserializeIdentity -> DEBU 25c6 Obtaining identity" -"2019-05-02 01:31:17.746 UTC [msp] DeserializeIdentity -> DEBU 25c7 Obtaining identity" -"2019-05-02 01:31:17.747 UTC [msp] DeserializeIdentity -> DEBU 25c8 Obtaining identity" -"2019-05-02 01:31:17.747 UTC [gossip.comm] func1 -> DEBU 25c9 Got message: GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.747 UTC [msp] DeserializeIdentity -> DEBU 25ca Obtaining identity" -"2019-05-02 01:31:17.748 UTC [msp] DeserializeIdentity -> DEBU 25cb Obtaining identity" -"2019-05-02 01:31:17.749 UTC [gossip.pull] SendDigest -> DEBU 25cc Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:17.749 UTC [gossip.gossip] handleMessage -> DEBU 25cd Exiting" -"2019-05-02 01:31:17.750 UTC [gossip.gossip] handleMessage -> DEBU 25ce Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.751 UTC [gossip.gossip] handleMessage -> DEBU 25cf Exiting" -"2019-05-02 01:31:17.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25d0 Got message: GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.752 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25d1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:17.753 UTC [msp] DeserializeIdentity -> DEBU 25d2 Obtaining identity" -"2019-05-02 01:31:17.753 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25d3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:17.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25d4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25d5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.755 UTC [policies] Evaluate -> DEBU 25d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.755 UTC [policies] Evaluate -> DEBU 25d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.755 UTC [policies] Evaluate -> DEBU 25d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.756 UTC [cauthdsl] func1 -> DEBU 25d9 0xc002c83730 gate 1556760677756471100 evaluation starts" -"2019-05-02 01:31:17.757 UTC [cauthdsl] func2 -> DEBU 25da 0xc002c83730 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.757 UTC [cauthdsl] func2 -> DEBU 25db 0xc002c83730 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.757 UTC [cauthdsl] func2 -> DEBU 25dc 0xc002c83730 principal matched by identity 0" -"2019-05-02 01:31:17.758 UTC [msp.identity] Verify -> DEBU 25dd Verify: digest = 00000000 9c 5f 7e 58 f0 34 09 00 93 ae 5d 98 6e 54 8a 6e |._~X.4....].nT.n| -00000010 de ff f9 17 16 3d a3 41 76 58 1e ab 6a 7f 94 a6 |.....=.AvX..j...|" -"2019-05-02 01:31:17.758 UTC [msp.identity] Verify -> DEBU 25de Verify: sig = 00000000 30 44 02 20 41 09 0b c1 19 17 1a 22 88 8f 4c d7 |0D. A......"..L.| -00000010 37 48 5c a3 b2 27 57 d3 63 39 1d 05 c4 c1 87 1e |7H\..'W.c9......| -00000020 36 95 16 6f 02 20 60 5e cf 5a 46 d9 46 53 85 83 |6..o. `^.ZF.FS..| -00000030 91 8d 9b 85 c2 e3 e9 e7 7f 64 9e 91 c7 61 5e fe |.........d...a^.| -00000040 a3 3a 48 b5 bc 58 |.:H..X|" -"2019-05-02 01:31:17.762 UTC [cauthdsl] func2 -> DEBU 25df 0xc002c83730 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.764 UTC [cauthdsl] func1 -> DEBU 25e0 0xc002c83730 gate 1556760677756471100 evaluation succeeds" -"2019-05-02 01:31:17.764 UTC [policies] Evaluate -> DEBU 25e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.764 UTC [policies] Evaluate -> DEBU 25e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.765 UTC [policies] Evaluate -> DEBU 25e3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.765 UTC [policies] Evaluate -> DEBU 25e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25e5 Exiting" -"2019-05-02 01:31:17.767 UTC [gossip.discovery] sendMemResponse -> DEBU 25e6 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:17.768 UTC [msp] DeserializeIdentity -> DEBU 25e7 Obtaining identity" -"2019-05-02 01:31:17.769 UTC [msp] DeserializeIdentity -> DEBU 25e8 Obtaining identity" -"2019-05-02 01:31:17.769 UTC [msp] DeserializeIdentity -> DEBU 25e9 Obtaining identity" -"2019-05-02 01:31:17.770 UTC [gossip.comm] Send -> DEBU 25ea Entering, sending GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:17.771 UTC [gossip.comm] sendToEndpoint -> DEBU 25eb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 13030084626048096668, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.772 UTC [gossip.comm] sendToEndpoint -> DEBU 25ec Exiting" -"2019-05-02 01:31:17.771 UTC [gossip.discovery] sendMemResponse -> DEBU 25ed Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:17.783 UTC [gossip.gossip] handleMessage -> DEBU 25ee Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 1577923502440734265, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 282 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.786 UTC [gossip.gossip] handleMessage -> DEBU 25ef Exiting" -"2019-05-02 01:31:17.787 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25f0 Got message: GossipMessage: Channel: , nonce: 1577923502440734265, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 282 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.787 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25f1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:17.788 UTC [gossip.comm] func1 -> DEBU 25f2 Got message: GossipMessage: Channel: , nonce: 11572900962055261739, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.789 UTC [gossip.gossip] handleMessage -> DEBU 25f3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 11572900962055261739, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.790 UTC [msp.identity] Verify -> DEBU 25f4 Verify: digest = 00000000 d8 50 8e e3 06 a8 9c 88 4c ed 4f cc 13 f8 27 fc |.P......L.O...'.| -00000010 a7 9a 68 b4 c3 50 a5 62 3e f4 ab ce 0f 7a 2e f7 |..h..P.b>....z..|" -"2019-05-02 01:31:17.791 UTC [msp.identity] Verify -> DEBU 25f5 Verify: sig = 00000000 30 45 02 21 00 ec a2 d1 ec e6 c9 a9 59 f6 9f bf |0E.!........Y...| -00000010 d1 60 b9 41 68 a3 fe 06 94 b9 7a 1d 8c be 29 18 |.`.Ah.....z...).| -00000020 aa 0c 9e f4 61 02 20 59 49 39 6c 34 06 1d ae 68 |....a. YI9l4...h| -00000030 04 64 83 b4 22 b6 62 c8 6b 03 a2 fe 65 b6 3e b5 |.d..".b.k...e.>.| -00000040 1f 50 17 3c 77 13 1c |.P. DEBU 25f6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:49.114 UTC [msp.identity] Verify -> DEBU 2660 Verify: sig = 00000000 30 45 02 21 00 a4 fe c1 d1 0d 87 f8 46 f1 47 5f |0E.!........F.G_| +00000010 d6 2c 18 ab 60 e5 e9 90 76 9c 72 e8 c5 90 74 28 |.,..`...v.r...t(| +00000020 67 1d ea 23 59 02 20 08 d7 7a bd aa 24 cd 22 c5 |g..#Y. ..z..$.".| +00000030 92 73 5a e7 4b 92 6e fa 0c 6f 19 31 5f 97 20 8f |.sZ.K.n..o.1_. .| +00000040 46 bd 42 92 ba 7d c1 |F.B..}.|" +"2019-05-02 09:27:49.115 UTC [gossip.discovery] handleAliveMessage -> DEBU 2661 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:49.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2662 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:49.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2663 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 " +"2019-05-02 09:27:49.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2664 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 " +"2019-05-02 09:27:49.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2665 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:49.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2666 Exiting" +"2019-05-02 09:27:49.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 2667 Exiting" +"2019-05-02 09:27:49.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2668 Exiting" +"2019-05-02 09:27:49.109 UTC [gossip.gossip] handleMessage -> DEBU 265e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10473393887253975232 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.118 UTC [gossip.pull] HandleMessage -> DEBU 2669 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10473393887253975232 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.118 UTC [gossip.gossip] handleMessage -> DEBU 266a Exiting" +"2019-05-02 09:27:49.119 UTC [gossip.gossip] handleMessage -> DEBU 266b Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.119 UTC [gossip.gossip] handleMessage -> DEBU 266c Exiting" +"2019-05-02 09:27:49.119 UTC [gossip.gossip] handleMessage -> DEBU 266d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3336650009731732356 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.119 UTC [gossip.pull] HandleMessage -> DEBU 266e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3336650009731732356 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.120 UTC [gossip.gossip] handleMessage -> DEBU 266f Exiting" +"2019-05-02 09:27:49.120 UTC [gossip.gossip] handleMessage -> DEBU 2670 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2671 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2672 Exiting" +"2019-05-02 09:27:49.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2673 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.121 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2674 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:49.122 UTC [msp.identity] Verify -> DEBU 2675 Verify: digest = 00000000 69 59 a1 68 08 4d 75 c9 75 5e 82 05 a6 1c b1 7f |iY.h.Mu.u^......| +00000010 9c ed b4 7a e6 f9 54 5b 10 f6 b9 fc a1 8b 03 98 |...z..T[........|" +"2019-05-02 09:27:49.122 UTC [msp.identity] Verify -> DEBU 2676 Verify: sig = 00000000 30 44 02 20 27 84 7b e8 97 85 09 98 01 c6 9a 4d |0D. '.{........M| +00000010 6c 2a fc 9f c2 e3 fe d4 51 55 9a 60 08 3a 70 da |l*......QU.`.:p.| +00000020 42 c5 fe 57 02 20 0e c3 74 e2 2a 5d 47 cd 9b 1c |B..W. ..t.*]G...| +00000030 b1 e1 e8 99 cd 65 cc 01 1e a6 b9 3c 47 52 bc fb |.....e..... DEBU 2677 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:17.794 UTC [msp.identity] Verify -> DEBU 25f7 Verify: sig = 00000000 30 45 02 21 00 d6 64 af a6 ce 56 c9 39 4a 44 bf |0E.!..d...V.9JD.| -00000010 77 a6 97 2f 44 3a 67 0e 50 d0 6e ec 4f 3a 84 27 |w../D:g.P.n.O:.'| -00000020 b0 85 b2 e9 8f 02 20 7a 68 2f 81 f9 cd 99 2a 2f |...... zh/....*/| -00000030 84 83 a1 ff d4 fb 46 29 b7 49 04 7e ba 9f 9b ec |......F).I.~....| -00000040 52 94 f0 d5 c5 30 f2 |R....0.|" -"2019-05-02 01:31:17.796 UTC [gossip.discovery] sendMemResponse -> DEBU 25f8 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:17.796 UTC [msp] DeserializeIdentity -> DEBU 25f9 Obtaining identity" -"2019-05-02 01:31:17.796 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25fa Exiting" -"2019-05-02 01:31:17.797 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25fc Got message: GossipMessage: Channel: , nonce: 11572900962055261739, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:16 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.797 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25fe Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:17.796 UTC [msp] DeserializeIdentity -> DEBU 25fb Obtaining identity" -"2019-05-02 01:31:17.797 UTC [gossip.gossip] handleMessage -> DEBU 25fd Exiting" -"2019-05-02 01:31:17.798 UTC [msp] DeserializeIdentity -> DEBU 25ff Obtaining identity" -"2019-05-02 01:31:17.799 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2600 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:17.800 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2601 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.800 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2602 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.800 UTC [policies] Evaluate -> DEBU 2603 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.800 UTC [policies] Evaluate -> DEBU 2604 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.801 UTC [policies] Evaluate -> DEBU 2606 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.799 UTC [gossip.comm] Send -> DEBU 2605 Entering, sending GossipMessage: Channel: , nonce: 1577923502440734265, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:17.801 UTC [cauthdsl] func1 -> DEBU 2607 0xc002c95cb0 gate 1556760677801599800 evaluation starts" -"2019-05-02 01:31:17.802 UTC [cauthdsl] func2 -> DEBU 2608 0xc002c95cb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.802 UTC [cauthdsl] func2 -> DEBU 2609 0xc002c95cb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.801 UTC [gossip.discovery] sendMemResponse -> DEBU 260a Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:17.802 UTC [cauthdsl] func2 -> DEBU 260b 0xc002c95cb0 principal matched by identity 0" -"2019-05-02 01:31:17.802 UTC [gossip.comm] sendToEndpoint -> DEBU 260c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1577923502440734265, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.802 UTC [msp.identity] Verify -> DEBU 260d Verify: digest = 00000000 b7 e9 2e d9 2e 92 cf f4 25 43 90 4d 9a 95 eb fc |........%C.M....| -00000010 34 28 29 2c f1 a1 d3 9a b8 8d 7e a0 7c 32 72 0d |4(),......~.|2r.|" -"2019-05-02 01:31:17.803 UTC [msp.identity] Verify -> DEBU 260e Verify: sig = 00000000 30 44 02 20 53 aa 1d f2 2a 11 a2 ad 69 a6 96 6a |0D. S...*...i..j| -00000010 ad 6a b4 ad a0 15 a1 ac ae 23 b1 8b 68 96 30 9d |.j.......#..h.0.| -00000020 cb f3 a1 a9 02 20 0f e8 4e 4a 32 07 39 03 ef 5f |..... ..NJ2.9.._| -00000030 78 17 ca a4 42 28 bc b7 46 a9 4e cc 69 e7 37 ec |x...B(..F.N.i.7.| -00000040 c1 e3 54 d1 81 70 |..T..p|" -"2019-05-02 01:31:17.813 UTC [cauthdsl] func2 -> DEBU 2610 0xc002c95cb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.803 UTC [gossip.comm] sendToEndpoint -> DEBU 260f Exiting" -"2019-05-02 01:31:17.813 UTC [cauthdsl] func1 -> DEBU 2611 0xc002c95cb0 gate 1556760677801599800 evaluation succeeds" -"2019-05-02 01:31:17.814 UTC [policies] Evaluate -> DEBU 2612 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.814 UTC [policies] Evaluate -> DEBU 2613 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.815 UTC [policies] Evaluate -> DEBU 2614 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.815 UTC [policies] Evaluate -> DEBU 2615 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.815 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2616 Exiting" -"2019-05-02 01:31:17.816 UTC [gossip.discovery] sendMemResponse -> DEBU 2617 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:17.817 UTC [msp] DeserializeIdentity -> DEBU 2618 Obtaining identity" -"2019-05-02 01:31:17.818 UTC [msp] DeserializeIdentity -> DEBU 2619 Obtaining identity" -"2019-05-02 01:31:17.819 UTC [msp] DeserializeIdentity -> DEBU 261a Obtaining identity" -"2019-05-02 01:31:17.819 UTC [gossip.comm] Send -> DEBU 261b Entering, sending GossipMessage: Channel: , nonce: 11572900962055261739, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:17.819 UTC [gossip.discovery] sendMemResponse -> DEBU 261c Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:17.820 UTC [gossip.comm] sendToEndpoint -> DEBU 261d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11572900962055261739, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.820 UTC [gossip.comm] sendToEndpoint -> DEBU 261e Exiting" -"2019-05-02 01:31:17.831 UTC [gossip.pull] Hello -> DEBU 261f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:17.832 UTC [gossip.comm] Send -> DEBU 2620 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:17.832 UTC [gossip.pull] Hello -> DEBU 2621 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:17.833 UTC [gossip.comm] Send -> DEBU 2622 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:17.833 UTC [gossip.pull] Hello -> DEBU 2623 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:17.833 UTC [gossip.comm] Send -> DEBU 2624 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:17.834 UTC [gossip.comm] sendToEndpoint -> DEBU 2625 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.834 UTC [gossip.comm] sendToEndpoint -> DEBU 2626 Exiting" -"2019-05-02 01:31:17.835 UTC [gossip.comm] sendToEndpoint -> DEBU 2627 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.835 UTC [gossip.comm] sendToEndpoint -> DEBU 2628 Exiting" -"2019-05-02 01:31:17.835 UTC [gossip.comm] sendToEndpoint -> DEBU 2629 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.836 UTC [gossip.comm] sendToEndpoint -> DEBU 262a Exiting" -"2019-05-02 01:31:17.838 UTC [gossip.comm] func1 -> DEBU 262b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13468049574467298966 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.839 UTC [gossip.gossip] handleMessage -> DEBU 262c Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17447799326776230534 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.839 UTC [gossip.pull] HandleMessage -> DEBU 262d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17447799326776230534 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.839 UTC [gossip.gossip] handleMessage -> DEBU 262e Exiting" -"2019-05-02 01:31:17.839 UTC [gossip.comm] func1 -> DEBU 262f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9183535591814455260 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.839 UTC [gossip.gossip] handleMessage -> DEBU 2630 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13468049574467298966 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.840 UTC [gossip.pull] HandleMessage -> DEBU 2631 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13468049574467298966 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.840 UTC [gossip.gossip] handleMessage -> DEBU 2632 Exiting" -"2019-05-02 01:31:17.841 UTC [gossip.gossip] handleMessage -> DEBU 2633 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9183535591814455260 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.841 UTC [gossip.pull] HandleMessage -> DEBU 2634 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9183535591814455260 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.841 UTC [gossip.gossip] handleMessage -> DEBU 2635 Exiting" -"2019-05-02 01:31:17.863 UTC [endorser] ProcessProposal -> DEBU 2636 Entering: request from 192.168.240.9:41356" -"2019-05-02 01:31:17.864 UTC [protoutils] ValidateProposalMessage -> DEBU 2637 ValidateProposalMessage starts for signed proposal 0xc00243f810" -"2019-05-02 01:31:17.864 UTC [protoutils] validateChannelHeader -> DEBU 2638 validateChannelHeader info: header type 3" -"2019-05-02 01:31:17.864 UTC [protoutils] checkSignatureFromCreator -> DEBU 2639 begin" -"2019-05-02 01:31:17.864 UTC [msp] GetManagerForChain -> DEBU 263a Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:17.864 UTC [protoutils] checkSignatureFromCreator -> DEBU 263b creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:17.864 UTC [protoutils] checkSignatureFromCreator -> DEBU 263c creator is valid" -"2019-05-02 01:31:17.865 UTC [msp.identity] Verify -> DEBU 263d Verify: digest = 00000000 ce cd 5a 65 45 48 ff bf 45 62 18 82 00 fa 52 38 |..ZeEH..Eb....R8| -00000010 e3 eb 5c c2 b0 07 dc 5e 89 d3 78 f2 10 b4 4a ab |..\....^..x...J.|" -"2019-05-02 01:31:17.865 UTC [msp.identity] Verify -> DEBU 263e Verify: sig = 00000000 30 44 02 20 68 0c c6 26 a4 70 0b 98 a9 ae 87 a3 |0D. h..&.p......| -00000010 ff e3 c9 97 11 12 af 49 3c 54 2d 88 2c c8 bd 9b |.......I DEBU 263f exits successfully" -"2019-05-02 01:31:17.866 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2640 validateChaincodeProposalMessage starts for proposal 0xc003147c00, header 0xc00243fc20" -"2019-05-02 01:31:17.867 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2641 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-05-02 01:31:17.867 UTC [endorser] preProcess -> DEBU 2642 [businesschannel][74c0f615] processing txid: 74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41" -"2019-05-02 01:31:17.868 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2643 retrieveTransactionByID() - txId = [74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41]" -"2019-05-02 01:31:17.868 UTC [aclmgmt] CheckACL -> DEBU 2644 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-05-02 01:31:17.868 UTC [aclmgmt] CheckACL -> DEBU 2645 acl check(/Channel/Application/Writers)" -"2019-05-02 01:31:17.869 UTC [policies] Evaluate -> DEBU 2646 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:17.869 UTC [policies] Evaluate -> DEBU 2647 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.869 UTC [policies] Evaluate -> DEBU 2648 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:17.869 UTC [cauthdsl] func1 -> DEBU 2649 0xc0002dbeb0 gate 1556760677869960000 evaluation starts" -"2019-05-02 01:31:17.870 UTC [cauthdsl] func2 -> DEBU 264a 0xc0002dbeb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.870 UTC [cauthdsl] func2 -> DEBU 264b 0xc0002dbeb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.870 UTC [cauthdsl] func2 -> DEBU 264c 0xc0002dbeb0 principal matched by identity 0" -"2019-05-02 01:31:17.870 UTC [msp.identity] Verify -> DEBU 264d Verify: digest = 00000000 ce cd 5a 65 45 48 ff bf 45 62 18 82 00 fa 52 38 |..ZeEH..Eb....R8| -00000010 e3 eb 5c c2 b0 07 dc 5e 89 d3 78 f2 10 b4 4a ab |..\....^..x...J.|" -"2019-05-02 01:31:17.870 UTC [msp.identity] Verify -> DEBU 264e Verify: sig = 00000000 30 44 02 20 68 0c c6 26 a4 70 0b 98 a9 ae 87 a3 |0D. h..&.p......| -00000010 ff e3 c9 97 11 12 af 49 3c 54 2d 88 2c c8 bd 9b |.......I DEBU 264f 0xc0002dbeb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.871 UTC [cauthdsl] func1 -> DEBU 2650 0xc0002dbeb0 gate 1556760677869960000 evaluation succeeds" -"2019-05-02 01:31:17.872 UTC [policies] Evaluate -> DEBU 2651 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:17.872 UTC [policies] Evaluate -> DEBU 2652 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:17.872 UTC [policies] Evaluate -> DEBU 2653 Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:17.873 UTC [policies] Evaluate -> DEBU 2654 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:17.873 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2655 constructing new tx simulator" -"2019-05-02 01:31:17.873 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2656 constructing new tx simulator txid = [74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41]" -"2019-05-02 01:31:17.874 UTC [endorser] SimulateProposal -> DEBU 2657 [businesschannel][74c0f615] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:17.874 UTC [stateleveldb] GetState -> DEBU 2658 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:17.874 UTC [endorser] callChaincode -> INFO 2659 [businesschannel][74c0f615] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:17.875 UTC [stateleveldb] GetState -> DEBU 265a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:17.875 UTC [stateleveldb] GetState -> DEBU 265b GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:17.875 UTC [chaincode] Execute -> DEBU 265c Entry" -"2019-05-02 01:31:17.878 UTC [chaincode] handleMessage -> DEBU 265d [74c0f615] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:17.878 UTC [chaincode] HandleTransaction -> DEBU 265e [74c0f615] handling GET_STATE from chaincode" -"2019-05-02 01:31:17.878 UTC [chaincode] HandleGetState -> DEBU 265f [74c0f615] getting state for chaincode exp02, key a, channel businesschannel" -"2019-05-02 01:31:17.879 UTC [stateleveldb] GetState -> DEBU 2660 GetState(). ns=exp02, key=a" -"2019-05-02 01:31:17.879 UTC [chaincode] HandleTransaction -> DEBU 2661 [74c0f615] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:17.881 UTC [chaincode] handleMessage -> DEBU 2662 [74c0f615] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:17.881 UTC [chaincode] Notify -> DEBU 2663 [74c0f615] notifying Txid:74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41, channelID:businesschannel" -"2019-05-02 01:31:17.881 UTC [chaincode] Execute -> DEBU 2664 Exit" -"2019-05-02 01:31:17.882 UTC [endorser] callChaincode -> INFO 2665 [businesschannel][74c0f615] Exit chaincode: name:"exp02" (7ms)" -"2019-05-02 01:31:17.882 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2666 Simulation completed, getting simulation results" -"2019-05-02 01:31:17.882 UTC [lockbasedtxmgr] Done -> DEBU 2667 Done with transaction simulation / query execution [74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41]" -"2019-05-02 01:31:17.882 UTC [endorser] SimulateProposal -> DEBU 2668 [businesschannel][74c0f615] Exit" -"2019-05-02 01:31:17.883 UTC [endorser] endorseProposal -> DEBU 2669 [businesschannel][74c0f615] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:17.883 UTC [endorser] endorseProposal -> DEBU 266a [businesschannel][74c0f615] escc for chaincode name:"exp02" is escc" -"2019-05-02 01:31:17.883 UTC [endorser] EndorseWithPlugin -> DEBU 266b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41, chaincode: exp02}" -"2019-05-02 01:31:17.884 UTC [msp.identity] Sign -> DEBU 266c Sign: plaintext: 0A20C15987C053221956486970542E0F...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:17.884 UTC [msp.identity] Sign -> DEBU 266d Sign: digest: 77DAA1260EBD5F0006858951DCC4D07EE52F6EE1247373358C7F3330B3937316 " -"2019-05-02 01:31:17.884 UTC [endorser] EndorseWithPlugin -> DEBU 266e Exiting {plugin: escc, channel: businesschannel, tx: 74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41, chaincode: exp02}" -"2019-05-02 01:31:17.885 UTC [endorser] endorseProposal -> DEBU 266f [businesschannel][74c0f615] Exit" -"2019-05-02 01:31:17.885 UTC [lockbasedtxmgr] Done -> DEBU 2670 Done with transaction simulation / query execution [74c0f615e518e24020cdfd7967ac3201f7d4d6f79a914810c8d37863b8f40f41]" -"2019-05-02 01:31:17.885 UTC [endorser] func1 -> DEBU 2671 Exit: request from 192.168.240.9:41356" -"2019-05-02 01:31:17.886 UTC [comm.grpc.server] 1 -> INFO 2672 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41356 grpc.code=OK grpc.call_duration=22.8107ms -"2019-05-02 01:31:17.892 UTC [grpc] infof -> DEBU 2673 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:17.892 UTC [grpc] infof -> DEBU 2674 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:17.900 UTC [gossip.comm] func1 -> DEBU 2675 Got message: GossipMessage: Channel: , nonce: 16229593423600886718, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.900 UTC [gossip.comm] func1 -> DEBU 2676 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.901 UTC [gossip.gossip] handleMessage -> DEBU 2677 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 16229593423600886718, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.902 UTC [gossip.gossip] handleMessage -> DEBU 2678 Exiting" -"2019-05-02 01:31:17.903 UTC [gossip.gossip] handleMessage -> DEBU 2679 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 267a Got message: GossipMessage: Channel: , nonce: 16229593423600886718, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 267b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:17.905 UTC [msp] DeserializeIdentity -> DEBU 267c Obtaining identity" -"2019-05-02 01:31:17.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 267d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:17.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 267e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 267f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.906 UTC [policies] Evaluate -> DEBU 2680 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.906 UTC [policies] Evaluate -> DEBU 2681 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.907 UTC [policies] Evaluate -> DEBU 2682 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.907 UTC [cauthdsl] func1 -> DEBU 2683 0xc00265ecb0 gate 1556760677907636700 evaluation starts" -"2019-05-02 01:31:17.908 UTC [cauthdsl] func2 -> DEBU 2684 0xc00265ecb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.908 UTC [cauthdsl] func2 -> DEBU 2685 0xc00265ecb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.909 UTC [cauthdsl] func2 -> DEBU 2686 0xc00265ecb0 principal matched by identity 0" -"2019-05-02 01:31:17.909 UTC [msp.identity] Verify -> DEBU 2687 Verify: digest = 00000000 4a 65 6d 2b 25 d7 14 a4 d7 e2 60 e4 16 dc de b5 |Jem+%.....`.....| -00000010 21 cd 45 a3 25 96 e9 b7 8f bc f4 a7 2d df 70 b3 |!.E.%.......-.p.|" -"2019-05-02 01:31:17.910 UTC [msp.identity] Verify -> DEBU 2688 Verify: sig = 00000000 30 44 02 20 10 df 5f 4e 13 74 b3 6e 90 6f c9 cd |0D. .._N.t.n.o..| -00000010 68 18 45 00 78 c1 68 c8 c7 5c 95 c4 28 34 00 c9 |h.E.x.h..\..(4..| -00000020 9d ec be 13 02 20 6c 88 e8 82 d3 7f c2 44 7a 64 |..... l......Dzd| -00000030 48 91 16 dc 49 c6 ce f6 49 7c 5a 34 0d 94 f2 3e |H...I...I|Z4...>| -00000040 85 27 f7 e8 87 0d |.'....|" -"2019-05-02 01:31:17.911 UTC [cauthdsl] func2 -> DEBU 2689 0xc00265ecb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.911 UTC [cauthdsl] func1 -> DEBU 268a 0xc00265ecb0 gate 1556760677907636700 evaluation succeeds" -"2019-05-02 01:31:17.911 UTC [policies] Evaluate -> DEBU 268b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.912 UTC [policies] Evaluate -> DEBU 268c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.912 UTC [policies] Evaluate -> DEBU 268d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.912 UTC [policies] Evaluate -> DEBU 268e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.913 UTC [gossip.discovery] sendMemResponse -> DEBU 268f Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:17.914 UTC [msp] DeserializeIdentity -> DEBU 2691 Obtaining identity" -"2019-05-02 01:31:17.913 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2690 Exiting" -"2019-05-02 01:31:17.915 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2692 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2693 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:17.916 UTC [msp] DeserializeIdentity -> DEBU 2694 Obtaining identity" -"2019-05-02 01:31:17.917 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2696 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:17.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2697 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2698 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:17.919 UTC [policies] Evaluate -> DEBU 2699 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:17.919 UTC [policies] Evaluate -> DEBU 269a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:17.920 UTC [policies] Evaluate -> DEBU 269b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:17.921 UTC [cauthdsl] func1 -> DEBU 269c 0xc002505b50 gate 1556760677921504200 evaluation starts" -"2019-05-02 01:31:17.921 UTC [cauthdsl] func2 -> DEBU 269d 0xc002505b50 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:17.922 UTC [cauthdsl] func2 -> DEBU 269e 0xc002505b50 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:17.922 UTC [cauthdsl] func2 -> DEBU 269f 0xc002505b50 principal matched by identity 0" -"2019-05-02 01:31:17.923 UTC [msp.identity] Verify -> DEBU 26a0 Verify: digest = 00000000 33 fe 70 ca 0d c3 77 bf 19 56 40 f5 9a 06 26 14 |3.p...w..V@...&.| -00000010 88 46 47 32 e2 04 64 05 a8 97 03 0d c0 fb 4f 50 |.FG2..d.......OP|" -"2019-05-02 01:31:17.923 UTC [msp.identity] Verify -> DEBU 26a1 Verify: sig = 00000000 30 45 02 21 00 85 ea 0a 5d 68 8d 42 fb b1 54 7c |0E.!....]h.B..T|| -00000010 f2 45 9f cc 28 27 80 e6 43 46 6e 71 17 42 b3 4b |.E..('..CFnq.B.K| -00000020 7b 1f 31 47 2f 02 20 49 61 51 02 32 52 63 62 4f |{.1G/. IaQ.2RcbO| -00000030 93 8d eb 2d e4 6a 7e eb ac 4d cf 68 6a cd c1 f4 |...-.j~..M.hj...| -00000040 2e 47 0f 9c c2 69 da |.G...i.|" -"2019-05-02 01:31:17.924 UTC [cauthdsl] func2 -> DEBU 26a2 0xc002505b50 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:17.925 UTC [cauthdsl] func1 -> DEBU 26a4 0xc002505b50 gate 1556760677921504200 evaluation succeeds" -"2019-05-02 01:31:17.925 UTC [policies] Evaluate -> DEBU 26a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.926 UTC [policies] Evaluate -> DEBU 26a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:17.916 UTC [gossip.gossip] handleMessage -> DEBU 2695 Exiting" -"2019-05-02 01:31:17.924 UTC [msp] DeserializeIdentity -> DEBU 26a3 Obtaining identity" -"2019-05-02 01:31:17.926 UTC [policies] Evaluate -> DEBU 26a7 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:17.931 UTC [policies] Evaluate -> DEBU 26a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:17.932 UTC [msp] DeserializeIdentity -> DEBU 26a9 Obtaining identity" -"2019-05-02 01:31:17.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 26aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:17.932 UTC [gossip.comm] Send -> DEBU 26ab Entering, sending GossipMessage: Channel: , nonce: 16229593423600886718, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:17.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 26ad Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:17.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 26af updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 " -"2019-05-02 01:31:17.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 26b0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 " -"2019-05-02 01:31:17.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 26b1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:17.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 26b2 Exiting" -"2019-05-02 01:31:17.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b3 Exiting" -"2019-05-02 01:31:17.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26b4 Exiting" -"2019-05-02 01:31:17.935 UTC [gossip.discovery] sendMemResponse -> DEBU 26b5 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:17.936 UTC [msp] DeserializeIdentity -> DEBU 26b6 Obtaining identity" -"2019-05-02 01:31:17.937 UTC [msp] DeserializeIdentity -> DEBU 26b7 Obtaining identity" -"2019-05-02 01:31:17.937 UTC [msp] DeserializeIdentity -> DEBU 26b8 Obtaining identity" -"2019-05-02 01:31:17.938 UTC [gossip.comm] Send -> DEBU 26b9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:17.938 UTC [gossip.discovery] sendMemResponse -> DEBU 26ba Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:17.939 UTC [gossip.comm] sendToEndpoint -> DEBU 26bb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.939 UTC [gossip.comm] sendToEndpoint -> DEBU 26bc Exiting" -"2019-05-02 01:31:17.934 UTC [gossip.comm] sendToEndpoint -> DEBU 26ae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 16229593423600886718, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" -"2019-05-02 01:31:17.940 UTC [gossip.comm] sendToEndpoint -> DEBU 26bd Exiting" -"2019-05-02 01:31:17.933 UTC [gossip.discovery] sendMemResponse -> DEBU 26ac Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:18.062 UTC [msp.identity] Sign -> DEBU 26be Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101D " -"2019-05-02 01:31:18.063 UTC [msp.identity] Sign -> DEBU 26bf Sign: digest: 3800F25A30DF3FFDF32CBAB297D558BB3DA55C8805614119722C6428F39B2C82 " -"2019-05-02 01:31:18.063 UTC [msp.identity] Sign -> DEBU 26c0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:18.064 UTC [msp.identity] Sign -> DEBU 26c1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:18.064 UTC [gossip.comm] Send -> DEBU 26c2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:18.064 UTC [msp] DeserializeIdentity -> DEBU 26c3 Obtaining identity" -"2019-05-02 01:31:18.065 UTC [gossip.comm] Send -> DEBU 26c4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:18.065 UTC [msp] DeserializeIdentity -> DEBU 26c5 Obtaining identity" -"2019-05-02 01:31:18.066 UTC [gossip.comm] Send -> DEBU 26c6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:18.066 UTC [gossip.comm] sendToEndpoint -> DEBU 26c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.066 UTC [gossip.comm] sendToEndpoint -> DEBU 26c8 Exiting" -"2019-05-02 01:31:18.067 UTC [gossip.comm] sendToEndpoint -> DEBU 26c9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.067 UTC [gossip.comm] sendToEndpoint -> DEBU 26ca Exiting" -"2019-05-02 01:31:18.068 UTC [gossip.comm] sendToEndpoint -> DEBU 26cb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.068 UTC [gossip.comm] sendToEndpoint -> DEBU 26cc Exiting" -"2019-05-02 01:31:18.071 UTC [gossip.comm] func1 -> DEBU 26cd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.072 UTC [gossip.gossip] handleMessage -> DEBU 26ce Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.072 UTC [gossip.gossip] handleMessage -> DEBU 26cf Exiting" -"2019-05-02 01:31:18.073 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26d0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.073 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26d1 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:18.074 UTC [msp.identity] Verify -> DEBU 26d2 Verify: digest = 00000000 38 00 f2 5a 30 df 3f fd f3 2c ba b2 97 d5 58 bb |8..Z0.?..,....X.| -00000010 3d a5 5c 88 05 61 41 19 72 2c 64 28 f3 9b 2c 82 |=.\..aA.r,d(..,.|" -"2019-05-02 01:31:18.074 UTC [msp.identity] Verify -> DEBU 26d3 Verify: sig = 00000000 30 44 02 20 35 f3 d0 12 37 56 89 1e be 6d 99 3f |0D. 5...7V...m.?| -00000010 31 b1 65 26 0e cf c0 fa ab 43 00 ed 32 31 ac b5 |1.e&.....C..21..| -00000020 04 91 20 bf 02 20 1c d7 04 38 4b 1d 90 2a 99 11 |.. .. ...8K..*..| -00000030 a7 7b 85 1c 0a 8a fd 80 4d 17 68 4e 22 51 24 86 |.{......M.hN"Q$.| -00000040 34 4b e3 bb 46 72 |4K..Fr|" -"2019-05-02 01:31:18.075 UTC [gossip.discovery] handleAliveMessage -> DEBU 26d4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.075 UTC [gossip.discovery] isSentByMe -> DEBU 26d5 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.075 UTC [gossip.discovery] handleAliveMessage -> DEBU 26d6 Exiting" -"2019-05-02 01:31:18.075 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26d7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:18.076 UTC [msp.identity] Verify -> DEBU 26d8 Verify: digest = 00000000 74 51 fb 04 9f 73 01 c8 d2 5e 0b 04 90 10 3a ee |tQ...s...^....:.| -00000010 fc c8 fc 1b 76 8c 52 8d 2c cb 80 dd 43 54 5e 1b |....v.R.,...CT^.|" -"2019-05-02 01:31:18.076 UTC [gossip.gossip] handleMessage -> DEBU 26d9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.076 UTC [msp.identity] Verify -> DEBU 26da Verify: sig = 00000000 30 45 02 21 00 81 df 22 86 db ee 77 5c 55 26 98 |0E.!..."...w\U&.| -00000010 e4 ad 80 a5 ec 62 65 17 95 3a f5 a8 96 a9 51 5a |.....be..:....QZ| -00000020 5c 1d 88 de 0d 02 20 5f ed 13 93 4d e1 e2 77 ec |\..... _...M..w.| -00000030 15 3b 53 ad d1 40 66 b6 a9 24 a0 c6 a7 7e 20 6c |.;S..@f..$...~ l| -00000040 bd 4f 7e 2b f2 bb 76 |.O~+..v|" -"2019-05-02 01:31:18.078 UTC [gossip.discovery] handleAliveMessage -> DEBU 26db Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.080 UTC [gossip.discovery] handleAliveMessage -> DEBU 26dd Exiting" -"2019-05-02 01:31:18.080 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26de Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:18.080 UTC [msp] DeserializeIdentity -> DEBU 26df Obtaining identity" -"2019-05-02 01:31:18.079 UTC [gossip.comm] func1 -> DEBU 26dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.081 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:18.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:18.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:18.082 UTC [policies] Evaluate -> DEBU 26e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:18.083 UTC [policies] Evaluate -> DEBU 26e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:18.083 UTC [policies] Evaluate -> DEBU 26e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:18.083 UTC [cauthdsl] func1 -> DEBU 26e6 0xc00362cde0 gate 1556760678083767400 evaluation starts" -"2019-05-02 01:31:18.084 UTC [cauthdsl] func2 -> DEBU 26e7 0xc00362cde0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:18.084 UTC [cauthdsl] func2 -> DEBU 26e8 0xc00362cde0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:18.084 UTC [cauthdsl] func2 -> DEBU 26e9 0xc00362cde0 principal matched by identity 0" -"2019-05-02 01:31:18.085 UTC [msp.identity] Verify -> DEBU 26ea Verify: digest = 00000000 33 fe 70 ca 0d c3 77 bf 19 56 40 f5 9a 06 26 14 |3.p...w..V@...&.| -00000010 88 46 47 32 e2 04 64 05 a8 97 03 0d c0 fb 4f 50 |.FG2..d.......OP|" -"2019-05-02 01:31:18.085 UTC [msp.identity] Verify -> DEBU 26eb Verify: sig = 00000000 30 45 02 21 00 85 ea 0a 5d 68 8d 42 fb b1 54 7c |0E.!....]h.B..T|| -00000010 f2 45 9f cc 28 27 80 e6 43 46 6e 71 17 42 b3 4b |.E..('..CFnq.B.K| -00000020 7b 1f 31 47 2f 02 20 49 61 51 02 32 52 63 62 4f |{.1G/. IaQ.2RcbO| -00000030 93 8d eb 2d e4 6a 7e eb ac 4d cf 68 6a cd c1 f4 |...-.j~..M.hj...| -00000040 2e 47 0f 9c c2 69 da |.G...i.|" -"2019-05-02 01:31:18.086 UTC [cauthdsl] func2 -> DEBU 26ec 0xc00362cde0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:18.086 UTC [cauthdsl] func1 -> DEBU 26ed 0xc00362cde0 gate 1556760678083767400 evaluation succeeds" -"2019-05-02 01:31:18.086 UTC [policies] Evaluate -> DEBU 26ee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:18.087 UTC [policies] Evaluate -> DEBU 26ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:18.087 UTC [policies] Evaluate -> DEBU 26f0 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:18.087 UTC [policies] Evaluate -> DEBU 26f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:18.088 UTC [gossip.discovery] handleAliveMessage -> DEBU 26f2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.088 UTC [gossip.discovery] handleAliveMessage -> DEBU 26f3 Exiting" -"2019-05-02 01:31:18.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26f4 Exiting" -"2019-05-02 01:31:18.089 UTC [gossip.gossip] handleMessage -> DEBU 26f5 Exiting" -"2019-05-02 01:31:18.089 UTC [gossip.gossip] handleMessage -> DEBU 26f6 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26f7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.090 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26f8 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:18.091 UTC [msp.identity] Verify -> DEBU 26f9 Verify: digest = 00000000 38 00 f2 5a 30 df 3f fd f3 2c ba b2 97 d5 58 bb |8..Z0.?..,....X.| -00000010 3d a5 5c 88 05 61 41 19 72 2c 64 28 f3 9b 2c 82 |=.\..aA.r,d(..,.|" -"2019-05-02 01:31:18.091 UTC [msp.identity] Verify -> DEBU 26fa Verify: sig = 00000000 30 44 02 20 35 f3 d0 12 37 56 89 1e be 6d 99 3f |0D. 5...7V...m.?| -00000010 31 b1 65 26 0e cf c0 fa ab 43 00 ed 32 31 ac b5 |1.e&.....C..21..| -00000020 04 91 20 bf 02 20 1c d7 04 38 4b 1d 90 2a 99 11 |.. .. ...8K..*..| -00000030 a7 7b 85 1c 0a 8a fd 80 4d 17 68 4e 22 51 24 86 |.{......M.hN"Q$.| -00000040 34 4b e3 bb 46 72 |4K..Fr|" -"2019-05-02 01:31:18.092 UTC [msp.identity] Verify -> DEBU 26fb Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:27:49.123 UTC [msp.identity] Verify -> DEBU 2678 Verify: sig = 00000000 30 45 02 21 00 ef 4d 61 a2 d6 91 17 58 da 67 b0 |0E.!..Ma....X.g.| +00000010 e3 f1 82 93 4c 43 a7 45 26 09 09 d7 e4 f0 21 cf |....LC.E&.....!.| +00000020 9d fb 12 c1 20 02 20 74 b7 07 20 bf 91 0a 66 50 |.... . t.. ...fP| +00000030 db 35 c2 01 e8 c5 a9 c1 57 d9 30 2e d1 b0 37 0f |.5......W.0...7.| +00000040 b9 21 c1 7b 58 60 46 |.!.{X`F|" +"2019-05-02 09:27:49.123 UTC [gossip.discovery] handleAliveMessage -> DEBU 2679 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267b updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 " +"2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 " +"2019-05-02 09:27:49.124 UTC [gossip.discovery] learnExistingMembers -> DEBU 267d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:49.125 UTC [gossip.discovery] learnExistingMembers -> DEBU 267e Exiting" +"2019-05-02 09:27:49.125 UTC [gossip.discovery] handleAliveMessage -> DEBU 267f Exiting" +"2019-05-02 09:27:49.125 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2680 Exiting" +"2019-05-02 09:27:49.126 UTC [gossip.discovery] sendMemResponse -> DEBU 2681 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:49.126 UTC [msp] DeserializeIdentity -> DEBU 2682 Obtaining identity" +"2019-05-02 09:27:49.126 UTC [msp] DeserializeIdentity -> DEBU 2683 Obtaining identity" +"2019-05-02 09:27:49.127 UTC [gossip.comm] Send -> DEBU 2684 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:49.127 UTC [gossip.discovery] sendMemResponse -> DEBU 2685 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:49.127 UTC [gossip.comm] sendToEndpoint -> DEBU 2686 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.127 UTC [gossip.comm] sendToEndpoint -> DEBU 2687 Exiting" +"2019-05-02 09:27:49.127 UTC [gossip.gossip] handleMessage -> DEBU 2688 Exiting" +"2019-05-02 09:27:49.128 UTC [msp] DeserializeIdentity -> DEBU 2689 Obtaining identity" +"2019-05-02 09:27:49.128 UTC [msp] DeserializeIdentity -> DEBU 268a Obtaining identity" +"2019-05-02 09:27:49.129 UTC [msp] DeserializeIdentity -> DEBU 268b Obtaining identity" +"2019-05-02 09:27:49.129 UTC [gossip.comm] Send -> DEBU 268c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:49.129 UTC [msp] DeserializeIdentity -> DEBU 268d Obtaining identity" +"2019-05-02 09:27:49.130 UTC [gossip.comm] Send -> DEBU 268e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:49.130 UTC [gossip.comm] sendToEndpoint -> DEBU 268f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.130 UTC [gossip.comm] sendToEndpoint -> DEBU 2690 Exiting" +"2019-05-02 09:27:49.131 UTC [gossip.comm] func1 -> DEBU 2691 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.133 UTC [gossip.comm] func1 -> DEBU 2694 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6061621436322034165 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.133 UTC [gossip.gossip] handleMessage -> DEBU 2695 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.134 UTC [gossip.gossip] handleMessage -> DEBU 2696 Exiting" +"2019-05-02 09:27:49.131 UTC [msp.identity] Sign -> DEBU 2692 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101C " +"2019-05-02 09:27:49.135 UTC [msp.identity] Sign -> DEBU 2699 Sign: digest: BD1BD6FE9C1F80CB993D510424B58C699DF27D8503A07D17D8B1F81C087E00B4 " +"2019-05-02 09:27:49.131 UTC [gossip.comm] sendToEndpoint -> DEBU 2693 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.135 UTC [gossip.gossip] handleMessage -> DEBU 2697 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6061621436322034165 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.135 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2698 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.136 UTC [msp.identity] Sign -> DEBU 269a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:49.137 UTC [msp.identity] Sign -> DEBU 269d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:49.136 UTC [gossip.comm] sendToEndpoint -> DEBU 269e Exiting" +"2019-05-02 09:27:49.137 UTC [gossip.comm] Send -> DEBU 269f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:49.137 UTC [msp] DeserializeIdentity -> DEBU 26a0 Obtaining identity" +"2019-05-02 09:27:49.137 UTC [gossip.comm] Send -> DEBU 26a1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:49.138 UTC [msp] DeserializeIdentity -> DEBU 26a2 Obtaining identity" +"2019-05-02 09:27:49.138 UTC [gossip.comm] Send -> DEBU 26a3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:49.138 UTC [gossip.comm] sendToEndpoint -> DEBU 26a4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.138 UTC [gossip.comm] sendToEndpoint -> DEBU 26a5 Exiting" +"2019-05-02 09:27:49.139 UTC [gossip.comm] sendToEndpoint -> DEBU 26a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.139 UTC [gossip.comm] sendToEndpoint -> DEBU 26a7 Exiting" +"2019-05-02 09:27:49.140 UTC [gossip.comm] sendToEndpoint -> DEBU 26a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.140 UTC [gossip.comm] sendToEndpoint -> DEBU 26a9 Exiting" +"2019-05-02 09:27:49.136 UTC [gossip.pull] HandleMessage -> DEBU 269b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6061621436322034165 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.141 UTC [gossip.gossip] handleMessage -> DEBU 26aa Exiting" +"2019-05-02 09:27:49.136 UTC [gossip.discovery] handleMsgFromComm -> DEBU 269c Exiting" +"2019-05-02 09:27:49.144 UTC [gossip.comm] func1 -> DEBU 26ab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.144 UTC [gossip.gossip] handleMessage -> DEBU 26ac Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.145 UTC [gossip.gossip] handleMessage -> DEBU 26ad Exiting" +"2019-05-02 09:27:49.146 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26ae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.146 UTC [gossip.gossip] handleMessage -> DEBU 26af Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.147 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26b0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:49.148 UTC [msp.identity] Verify -> DEBU 26b1 Verify: digest = 00000000 69 59 a1 68 08 4d 75 c9 75 5e 82 05 a6 1c b1 7f |iY.h.Mu.u^......| +00000010 9c ed b4 7a e6 f9 54 5b 10 f6 b9 fc a1 8b 03 98 |...z..T[........|" +"2019-05-02 09:27:49.148 UTC [msp.identity] Verify -> DEBU 26b2 Verify: sig = 00000000 30 44 02 20 27 84 7b e8 97 85 09 98 01 c6 9a 4d |0D. '.{........M| +00000010 6c 2a fc 9f c2 e3 fe d4 51 55 9a 60 08 3a 70 da |l*......QU.`.:p.| +00000020 42 c5 fe 57 02 20 0e c3 74 e2 2a 5d 47 cd 9b 1c |B..W. ..t.*]G...| +00000030 b1 e1 e8 99 cd 65 cc 01 1e a6 b9 3c 47 52 bc fb |.....e..... DEBU 26b3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.148 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b4 Exiting" +"2019-05-02 09:27:49.148 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26b5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:49.149 UTC [msp.identity] Verify -> DEBU 26b6 Verify: digest = 00000000 bd 1b d6 fe 9c 1f 80 cb 99 3d 51 04 24 b5 8c 69 |.........=Q.$..i| +00000010 9d f2 7d 85 03 a0 7d 17 d8 b1 f8 1c 08 7e 00 b4 |..}...}......~..|" +"2019-05-02 09:27:49.149 UTC [msp.identity] Verify -> DEBU 26b7 Verify: sig = 00000000 30 44 02 20 09 93 30 c4 f6 46 b7 04 bb 5b 33 ca |0D. ..0..F...[3.| +00000010 39 84 57 4f 5e 22 17 4a 90 ed cf 82 ee 49 e9 e7 |9.WO^".J.....I..| +00000020 97 4e 4b 7a 02 20 11 71 59 ed f1 9c 4f 12 f1 19 |.NKz. .qY...O...| +00000030 e9 ec d1 76 c1 67 62 20 79 51 63 95 ef f3 92 0f |...v.gb yQc.....| +00000040 8d 91 60 54 bd 7f |..`T..|" +"2019-05-02 09:27:49.149 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.149 UTC [gossip.discovery] isSentByMe -> DEBU 26b9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.150 UTC [gossip.discovery] handleAliveMessage -> DEBU 26ba Exiting" +"2019-05-02 09:27:49.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26bb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:49.150 UTC [msp] DeserializeIdentity -> DEBU 26bc Obtaining identity" +"2019-05-02 09:27:49.150 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:49.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26be Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:49.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26bf Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:49.150 UTC [policies] Evaluate -> DEBU 26c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:49.151 UTC [policies] Evaluate -> DEBU 26c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:49.151 UTC [policies] Evaluate -> DEBU 26c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:49.151 UTC [cauthdsl] func1 -> DEBU 26c3 0xc0046420e0 gate 1556789269151479200 evaluation starts" +"2019-05-02 09:27:49.151 UTC [cauthdsl] func2 -> DEBU 26c4 0xc0046420e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:49.151 UTC [cauthdsl] func2 -> DEBU 26c5 0xc0046420e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:49.152 UTC [cauthdsl] func2 -> DEBU 26c6 0xc0046420e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:49.152 UTC [cauthdsl] func2 -> DEBU 26c7 0xc0046420e0 principal evaluation fails" +"2019-05-02 09:27:49.152 UTC [cauthdsl] func1 -> DEBU 26c8 0xc0046420e0 gate 1556789269151479200 evaluation fails" +"2019-05-02 09:27:49.152 UTC [policies] Evaluate -> DEBU 26c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:49.152 UTC [policies] Evaluate -> DEBU 26ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:49.152 UTC [policies] Evaluate -> DEBU 26cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:49.153 UTC [cauthdsl] func1 -> DEBU 26cc 0xc004642920 gate 1556789269153026500 evaluation starts" +"2019-05-02 09:27:49.153 UTC [cauthdsl] func2 -> DEBU 26cd 0xc004642920 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:49.153 UTC [cauthdsl] func2 -> DEBU 26ce 0xc004642920 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:49.153 UTC [cauthdsl] func2 -> DEBU 26cf 0xc004642920 principal matched by identity 0" +"2019-05-02 09:27:49.153 UTC [msp.identity] Verify -> DEBU 26d0 Verify: digest = 00000000 41 f8 24 e9 c5 5d 4b ef 6d 0c e0 73 af c4 a5 b7 |A.$..]K.m..s....| +00000010 ba 0b b8 1a 71 d0 16 b5 dc 66 fe 4e 0f 3e 0d 74 |....q....f.N.>.t|" +"2019-05-02 09:27:49.154 UTC [msp.identity] Verify -> DEBU 26d1 Verify: sig = 00000000 30 44 02 20 71 79 47 c9 31 7a f9 e0 d5 3a 07 3e |0D. qyG.1z...:.>| +00000010 fa 9b 3f c2 e7 8e b8 06 60 43 1c 52 b3 e9 49 65 |..?.....`C.R..Ie| +00000020 53 d5 91 6e 02 20 73 b2 65 d8 af 93 ce 0a 2a 22 |S..n. s.e.....*"| +00000030 ae 3b e5 77 76 2d 21 94 da 6b 81 bf 84 59 8b 86 |.;.wv-!..k...Y..| +00000040 92 76 ab 56 bb ca |.v.V..|" +"2019-05-02 09:27:49.155 UTC [cauthdsl] func2 -> DEBU 26d2 0xc004642920 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:49.155 UTC [cauthdsl] func1 -> DEBU 26d3 0xc004642920 gate 1556789269153026500 evaluation succeeds" +"2019-05-02 09:27:49.155 UTC [policies] Evaluate -> DEBU 26d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:49.155 UTC [policies] Evaluate -> DEBU 26d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:49.156 UTC [policies] Evaluate -> DEBU 26d6 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:49.156 UTC [policies] Evaluate -> DEBU 26d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:49.157 UTC [gossip.discovery] handleAliveMessage -> DEBU 26d8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.157 UTC [gossip.discovery] handleAliveMessage -> DEBU 26d9 Exiting" +"2019-05-02 09:27:49.157 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26da Exiting" +"2019-05-02 09:27:49.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.161 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26dc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:49.162 UTC [gossip.gossip] handleMessage -> DEBU 26dd Exiting" +"2019-05-02 09:27:49.165 UTC [gossip.gossip] handleMessage -> DEBU 26de Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.161 UTC [msp] DeserializeIdentity -> DEBU 26df Obtaining identity" +"2019-05-02 09:27:49.167 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:49.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:49.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:49.168 UTC [policies] Evaluate -> DEBU 26e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:49.169 UTC [gossip.comm] func1 -> DEBU 26e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.168 UTC [policies] Evaluate -> DEBU 26e5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:49.169 UTC [policies] Evaluate -> DEBU 26e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:49.170 UTC [cauthdsl] func1 -> DEBU 26e7 0xc004658580 gate 1556789269170286900 evaluation starts" +"2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26e8 0xc004658580 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26e9 0xc004658580 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26ea 0xc004658580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:49.170 UTC [cauthdsl] func2 -> DEBU 26eb 0xc004658580 principal evaluation fails" +"2019-05-02 09:27:49.171 UTC [cauthdsl] func1 -> DEBU 26ec 0xc004658580 gate 1556789269170286900 evaluation fails" +"2019-05-02 09:27:49.171 UTC [policies] Evaluate -> DEBU 26ed Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:49.171 UTC [policies] Evaluate -> DEBU 26ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:49.171 UTC [policies] Evaluate -> DEBU 26ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:49.171 UTC [cauthdsl] func1 -> DEBU 26f0 0xc004658dc0 gate 1556789269171948900 evaluation starts" +"2019-05-02 09:27:49.172 UTC [cauthdsl] func2 -> DEBU 26f1 0xc004658dc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:49.172 UTC [cauthdsl] func2 -> DEBU 26f2 0xc004658dc0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:49.172 UTC [cauthdsl] func2 -> DEBU 26f3 0xc004658dc0 principal matched by identity 0" +"2019-05-02 09:27:49.173 UTC [msp.identity] Verify -> DEBU 26f4 Verify: digest = 00000000 8c c9 77 5f dc 20 1e c0 75 c9 e6 c0 7e 28 ed 6f |..w_. ..u...~(.o| +00000010 8e ec 7f 13 de 3e 35 6c 7f 0d 02 ad 8c 6d ff fd |.....>5l.....m..|" +"2019-05-02 09:27:49.183 UTC [msp.identity] Verify -> DEBU 26f5 Verify: sig = 00000000 30 44 02 20 38 86 bf 71 09 6b 99 bc 37 b1 97 7b |0D. 8..q.k..7..{| +00000010 59 63 58 fc 5b 10 a2 9d dc 10 9a 45 a5 56 8b 55 |YcX.[......E.V.U| +00000020 9b f8 fe cf 02 20 2d 89 c7 49 58 b9 1e bf ef b2 |..... -..IX.....| +00000030 05 bc 95 f2 a9 81 f2 52 03 22 10 a2 29 ee 06 97 |.......R."..)...| +00000040 9c 37 68 e1 92 b4 |.7h...|" +"2019-05-02 09:27:49.184 UTC [cauthdsl] func2 -> DEBU 26f6 0xc004658dc0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:49.184 UTC [cauthdsl] func1 -> DEBU 26f7 0xc004658dc0 gate 1556789269171948900 evaluation succeeds" +"2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26f8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26fa Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:49.185 UTC [policies] Evaluate -> DEBU 26fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:49.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 26fc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 26fd Exiting" +"2019-05-02 09:27:49.186 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26fe Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:49.187 UTC [msp.identity] Verify -> DEBU 26ff Verify: digest = 00000000 bd 1b d6 fe 9c 1f 80 cb 99 3d 51 04 24 b5 8c 69 |.........=Q.$..i| +00000010 9d f2 7d 85 03 a0 7d 17 d8 b1 f8 1c 08 7e 00 b4 |..}...}......~..|" +"2019-05-02 09:27:49.187 UTC [msp.identity] Verify -> DEBU 2700 Verify: sig = 00000000 30 44 02 20 09 93 30 c4 f6 46 b7 04 bb 5b 33 ca |0D. ..0..F...[3.| +00000010 39 84 57 4f 5e 22 17 4a 90 ed cf 82 ee 49 e9 e7 |9.WO^".J.....I..| +00000020 97 4e 4b 7a 02 20 11 71 59 ed f1 9c 4f 12 f1 19 |.NKz. .qY...O...| +00000030 e9 ec d1 76 c1 67 62 20 79 51 63 95 ef f3 92 0f |...v.gb yQc.....| +00000040 8d 91 60 54 bd 7f |..`T..|" +"2019-05-02 09:27:49.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 2701 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.188 UTC [gossip.discovery] isSentByMe -> DEBU 2702 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 2703 Exiting" +"2019-05-02 09:27:49.189 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2704 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:49.193 UTC [msp.identity] Verify -> DEBU 2705 Verify: digest = 00000000 69 59 a1 68 08 4d 75 c9 75 5e 82 05 a6 1c b1 7f |iY.h.Mu.u^......| +00000010 9c ed b4 7a e6 f9 54 5b 10 f6 b9 fc a1 8b 03 98 |...z..T[........|" +"2019-05-02 09:27:49.194 UTC [msp.identity] Verify -> DEBU 2706 Verify: sig = 00000000 30 44 02 20 27 84 7b e8 97 85 09 98 01 c6 9a 4d |0D. '.{........M| +00000010 6c 2a fc 9f c2 e3 fe d4 51 55 9a 60 08 3a 70 da |l*......QU.`.:p.| +00000020 42 c5 fe 57 02 20 0e c3 74 e2 2a 5d 47 cd 9b 1c |B..W. ..t.*]G...| +00000030 b1 e1 e8 99 cd 65 cc 01 1e a6 b9 3c 47 52 bc fb |.....e..... DEBU 2707 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 2708 Exiting" +"2019-05-02 09:27:49.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2709 Exiting" +"2019-05-02 09:27:49.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 270a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 270b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:49.198 UTC [msp.identity] Verify -> DEBU 270c Verify: digest = 00000000 bd 1b d6 fe 9c 1f 80 cb 99 3d 51 04 24 b5 8c 69 |.........=Q.$..i| +00000010 9d f2 7d 85 03 a0 7d 17 d8 b1 f8 1c 08 7e 00 b4 |..}...}......~..|" +"2019-05-02 09:27:49.198 UTC [msp.identity] Verify -> DEBU 270d Verify: sig = 00000000 30 44 02 20 09 93 30 c4 f6 46 b7 04 bb 5b 33 ca |0D. ..0..F...[3.| +00000010 39 84 57 4f 5e 22 17 4a 90 ed cf 82 ee 49 e9 e7 |9.WO^".J.....I..| +00000020 97 4e 4b 7a 02 20 11 71 59 ed f1 9c 4f 12 f1 19 |.NKz. .qY...O...| +00000030 e9 ec d1 76 c1 67 62 20 79 51 63 95 ef f3 92 0f |...v.gb yQc.....| +00000040 8d 91 60 54 bd 7f |..`T..|" +"2019-05-02 09:27:49.199 UTC [msp.identity] Verify -> DEBU 270e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:18.092 UTC [msp.identity] Verify -> DEBU 26fc Verify: sig = 00000000 30 44 02 20 78 3a bb 85 8e 3c c5 d3 0f 5e b5 06 |0D. x:...<...^..| -00000010 01 06 50 ca d2 7e 3b ba 4c a9 38 79 9f 5c 7d f7 |..P..~;.L.8y.\}.| -00000020 33 7d 90 91 02 20 20 9d e7 c7 55 78 b2 f2 a5 21 |3}... ...Ux...!| -00000030 e1 bd 94 09 d8 0b 9e 65 a6 07 b6 13 12 94 a1 b3 |.......e........| -00000040 2c b9 31 f7 41 ff |,.1.A.|" -"2019-05-02 01:31:18.093 UTC [gossip.discovery] handleAliveMessage -> DEBU 26fd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:18.093 UTC [gossip.discovery] isSentByMe -> DEBU 26fe Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:18.093 UTC [gossip.discovery] handleAliveMessage -> DEBU 26ff Exiting" -"2019-05-02 01:31:18.093 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2700 Exiting" -"2019-05-02 01:31:18.094 UTC [gossip.gossip] handleMessage -> DEBU 2701 Exiting" -"2019-05-02 01:31:18.094 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2702 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:18.094 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2703 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:18.095 UTC [msp] DeserializeIdentity -> DEBU 2704 Obtaining identity" -"2019-05-02 01:31:18.095 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2705 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:18.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2706 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:18.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2707 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:18.096 UTC [policies] Evaluate -> DEBU 2708 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:18.096 UTC [policies] Evaluate -> DEBU 2709 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:18.096 UTC [policies] Evaluate -> DEBU 270a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:18.096 UTC [cauthdsl] func1 -> DEBU 270b 0xc00380a0b0 gate 1556760678096758900 evaluation starts" -"2019-05-02 01:31:18.097 UTC [cauthdsl] func2 -> DEBU 270c 0xc00380a0b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:18.097 UTC [cauthdsl] func2 -> DEBU 270d 0xc00380a0b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:18.097 UTC [cauthdsl] func2 -> DEBU 270e 0xc00380a0b0 principal matched by identity 0" -"2019-05-02 01:31:18.097 UTC [msp.identity] Verify -> DEBU 270f Verify: digest = 00000000 02 e5 25 46 47 91 7d 93 32 60 d6 a1 5c 19 ba 88 |..%FG.}.2`..\...| -00000010 4a 51 f7 f2 c4 aa 99 d6 4b 0c 50 e7 3c 78 62 91 |JQ......K.P. DEBU 2710 Verify: sig = 00000000 30 45 02 21 00 d5 b7 31 db 27 eb 7f 3f 30 0a bb |0E.!...1.'..?0..| -00000010 fe 1c f3 b3 48 1a cf b7 c9 45 1a ca 8f b0 7a 89 |....H....E....z.| -00000020 04 dd 4b d3 9d 02 20 67 17 25 58 1e 22 10 b0 16 |..K... g.%X."...| -00000030 ae 5c e5 4d d7 e3 c7 12 47 76 dd cd 99 b7 39 40 |.\.M....Gv....9@| -00000040 94 f6 72 01 53 3f 05 |..r.S?.|" -"2019-05-02 01:31:18.098 UTC [cauthdsl] func2 -> DEBU 2711 0xc00380a0b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:18.098 UTC [cauthdsl] func1 -> DEBU 2712 0xc00380a0b0 gate 1556760678096758900 evaluation succeeds" -"2019-05-02 01:31:18.098 UTC [policies] Evaluate -> DEBU 2713 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:18.098 UTC [policies] Evaluate -> DEBU 2714 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:18.099 UTC [policies] Evaluate -> DEBU 2715 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:18.099 UTC [policies] Evaluate -> DEBU 2716 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:18.099 UTC [gossip.discovery] handleAliveMessage -> DEBU 2717 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.100 UTC [gossip.discovery] handleAliveMessage -> DEBU 2718 Exiting" -"2019-05-02 01:31:18.100 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2719 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:18.101 UTC [msp.identity] Verify -> DEBU 271a Verify: digest = 00000000 38 00 f2 5a 30 df 3f fd f3 2c ba b2 97 d5 58 bb |8..Z0.?..,....X.| -00000010 3d a5 5c 88 05 61 41 19 72 2c 64 28 f3 9b 2c 82 |=.\..aA.r,d(..,.|" -"2019-05-02 01:31:18.101 UTC [msp.identity] Verify -> DEBU 271b Verify: sig = 00000000 30 44 02 20 35 f3 d0 12 37 56 89 1e be 6d 99 3f |0D. 5...7V...m.?| -00000010 31 b1 65 26 0e cf c0 fa ab 43 00 ed 32 31 ac b5 |1.e&.....C..21..| -00000020 04 91 20 bf 02 20 1c d7 04 38 4b 1d 90 2a 99 11 |.. .. ...8K..*..| -00000030 a7 7b 85 1c 0a 8a fd 80 4d 17 68 4e 22 51 24 86 |.{......M.hN"Q$.| -00000040 34 4b e3 bb 46 72 |4K..Fr|" -"2019-05-02 01:31:18.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 271c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.101 UTC [gossip.discovery] isSentByMe -> DEBU 271d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.102 UTC [gossip.discovery] handleAliveMessage -> DEBU 271e Exiting" -"2019-05-02 01:31:18.102 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 271f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:18.102 UTC [msp.identity] Verify -> DEBU 2720 Verify: digest = 00000000 74 51 fb 04 9f 73 01 c8 d2 5e 0b 04 90 10 3a ee |tQ...s...^....:.| -00000010 fc c8 fc 1b 76 8c 52 8d 2c cb 80 dd 43 54 5e 1b |....v.R.,...CT^.|" -"2019-05-02 01:31:18.102 UTC [msp.identity] Verify -> DEBU 2721 Verify: sig = 00000000 30 45 02 21 00 81 df 22 86 db ee 77 5c 55 26 98 |0E.!..."...w\U&.| -00000010 e4 ad 80 a5 ec 62 65 17 95 3a f5 a8 96 a9 51 5a |.....be..:....QZ| -00000020 5c 1d 88 de 0d 02 20 5f ed 13 93 4d e1 e2 77 ec |\..... _...M..w.| -00000030 15 3b 53 ad d1 40 66 b6 a9 24 a0 c6 a7 7e 20 6c |.;S..@f..$...~ l| -00000040 bd 4f 7e 2b f2 bb 76 |.O~+..v|" -"2019-05-02 01:31:18.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 2722 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 2723 Exiting" -"2019-05-02 01:31:18.103 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2724 Exiting" -"2019-05-02 01:31:18.437 UTC [gossip.gossip] handleMessage -> DEBU 2725 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:18.438 UTC [gossip.gossip] handleMessage -> DEBU 2726 Exiting" -"2019-05-02 01:31:18.438 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2727 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:18.438 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2728 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:18.439 UTC [msp.identity] Verify -> DEBU 2729 Verify: digest = 00000000 16 35 ed 1a 10 3c 1f bd 2e 2e 4a 21 69 1a ed d2 |.5...<....J!i...| -00000010 7c f3 1c 07 77 47 72 fb a4 59 6a 54 84 5f 6c b0 ||...wGr..YjT._l.|" -"2019-05-02 01:31:18.439 UTC [msp.identity] Verify -> DEBU 272a Verify: sig = 00000000 30 44 02 20 41 5f 6b 4c 45 15 42 0c 29 00 32 9d |0D. A_kLE.B.).2.| -00000010 45 6e d3 10 57 a9 bd 10 a3 59 02 d8 57 a0 a3 2a |En..W....Y..W..*| -00000020 e3 3a 24 cf 02 20 15 c7 6c 19 f0 e4 bb 6c 3b ac |.:$.. ..l....l;.| -00000030 69 c2 14 c3 19 9a 8d 63 39 ae d5 9d 43 11 2c 6d |i......c9...C.,m| -00000040 51 e5 d6 0f f0 d7 |Q.....|" -"2019-05-02 01:31:18.439 UTC [msp.identity] Verify -> DEBU 272b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:18.439 UTC [msp.identity] Verify -> DEBU 272c Verify: sig = 00000000 30 45 02 21 00 a2 9f 00 31 f3 16 8c b8 8b d9 50 |0E.!....1......P| -00000010 73 81 f2 70 6b b9 83 7e 2d 6e 6f cf ca cc 22 ff |s..pk..~-no...".| -00000020 7d 9a ee 35 98 02 20 0b c0 32 1f 69 b1 3a 47 d8 |}..5.. ..2.i.:G.| -00000030 92 5b c2 ab 59 8e e6 de 68 e8 5a c1 28 85 fd 76 |.[..Y...h.Z.(..v| -00000040 8a 5e 56 8b 21 48 34 |.^V.!H4|" -"2019-05-02 01:31:18.440 UTC [gossip.discovery] handleAliveMessage -> DEBU 272d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:18.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 272e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:18.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 272f updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 " -"2019-05-02 01:31:18.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 2730 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 " -"2019-05-02 01:31:18.442 UTC [gossip.discovery] learnExistingMembers -> DEBU 2731 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:18.442 UTC [gossip.discovery] learnExistingMembers -> DEBU 2732 Exiting" -"2019-05-02 01:31:18.443 UTC [gossip.discovery] handleAliveMessage -> DEBU 2733 Exiting" -"2019-05-02 01:31:18.443 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2734 Exiting" -"2019-05-02 01:31:18.445 UTC [msp] DeserializeIdentity -> DEBU 2735 Obtaining identity" -"2019-05-02 01:31:18.445 UTC [msp] DeserializeIdentity -> DEBU 2736 Obtaining identity" -"2019-05-02 01:31:18.446 UTC [msp] DeserializeIdentity -> DEBU 2737 Obtaining identity" -"2019-05-02 01:31:18.446 UTC [gossip.comm] Send -> DEBU 2738 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:18.447 UTC [msp] DeserializeIdentity -> DEBU 2739 Obtaining identity" -"2019-05-02 01:31:18.447 UTC [gossip.comm] sendToEndpoint -> DEBU 273a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.447 UTC [gossip.comm] Send -> DEBU 273b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:18.447 UTC [gossip.comm] sendToEndpoint -> DEBU 273c Exiting" -"2019-05-02 01:31:18.447 UTC [gossip.comm] sendToEndpoint -> DEBU 273d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.447 UTC [gossip.comm] sendToEndpoint -> DEBU 273e Exiting" -"2019-05-02 01:31:18.450 UTC [gossip.comm] func1 -> DEBU 273f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.450 UTC [gossip.gossip] handleMessage -> DEBU 2740 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.451 UTC [gossip.gossip] handleMessage -> DEBU 2741 Exiting" -"2019-05-02 01:31:18.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2742 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2743 Exiting" -"2019-05-02 01:31:18.457 UTC [gossip.comm] func1 -> DEBU 2744 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.457 UTC [gossip.gossip] handleMessage -> DEBU 2745 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.457 UTC [gossip.gossip] handleMessage -> DEBU 2746 Exiting" -"2019-05-02 01:31:18.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2747 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:18.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2748 Exiting" -"2019-05-02 01:31:18.506 UTC [gossip.comm] func1 -> DEBU 2749 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.506 UTC [gossip.gossip] handleMessage -> DEBU 274a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.507 UTC [gossip.gossip] handleMessage -> DEBU 274b Exiting" -"2019-05-02 01:31:18.507 UTC [gossip.discovery] handleMsgFromComm -> DEBU 274c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.507 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 274d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:18.507 UTC [msp] DeserializeIdentity -> DEBU 274e Obtaining identity" -"2019-05-02 01:31:18.508 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 274f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:18.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2750 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:18.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2751 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:18.508 UTC [policies] Evaluate -> DEBU 2752 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:18.509 UTC [policies] Evaluate -> DEBU 2753 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:18.509 UTC [policies] Evaluate -> DEBU 2754 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:18.509 UTC [cauthdsl] func1 -> DEBU 2755 0xc003a30290 gate 1556760678509609600 evaluation starts" -"2019-05-02 01:31:18.509 UTC [cauthdsl] func2 -> DEBU 2756 0xc003a30290 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:18.510 UTC [cauthdsl] func2 -> DEBU 2757 0xc003a30290 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:18.510 UTC [cauthdsl] func2 -> DEBU 2758 0xc003a30290 principal matched by identity 0" -"2019-05-02 01:31:18.510 UTC [msp.identity] Verify -> DEBU 2759 Verify: digest = 00000000 d8 8e ef 0f eb 5a 74 90 0e 5d 83 64 f9 4c 97 ac |.....Zt..].d.L..| -00000010 72 10 76 6f e3 b3 b2 60 db dc 73 73 b2 9e ae 3d |r.vo...`..ss...=|" -"2019-05-02 01:31:18.510 UTC [msp.identity] Verify -> DEBU 275a Verify: sig = 00000000 30 45 02 21 00 f0 79 43 da 3d c3 9e 22 4e bb 20 |0E.!..yC.=.."N. | -00000010 4e 72 29 bf a5 42 1e c8 34 f0 35 e3 11 42 12 80 |Nr)..B..4.5..B..| -00000020 84 bc 4f 9c 00 02 20 3f 87 4a 95 eb a9 ea 37 09 |..O... ?.J....7.| -00000030 b2 1d ca 3a bc 3e be 63 d0 9d 18 6a 65 a6 2d bd |...:.>.c...je.-.| -00000040 b0 f2 75 43 3e 9c 84 |..uC>..|" -"2019-05-02 01:31:18.511 UTC [cauthdsl] func2 -> DEBU 275b 0xc003a30290 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:18.511 UTC [cauthdsl] func1 -> DEBU 275c 0xc003a30290 gate 1556760678509609600 evaluation succeeds" -"2019-05-02 01:31:18.511 UTC [policies] Evaluate -> DEBU 275d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:18.512 UTC [policies] Evaluate -> DEBU 275e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:18.512 UTC [policies] Evaluate -> DEBU 275f Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:18.516 UTC [policies] Evaluate -> DEBU 2762 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:18.515 UTC [gossip.comm] func1 -> DEBU 2760 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.516 UTC [gossip.gossip] handleMessage -> DEBU 2761 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.517 UTC [gossip.discovery] handleAliveMessage -> DEBU 2763 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2764 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:18.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2765 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 " -"2019-05-02 01:31:18.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2766 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 " -"2019-05-02 01:31:18.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2767 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:18.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2768 Exiting" -"2019-05-02 01:31:18.517 UTC [gossip.discovery] handleAliveMessage -> DEBU 2769 Exiting" -"2019-05-02 01:31:18.518 UTC [gossip.discovery] handleMsgFromComm -> DEBU 276a Exiting" -"2019-05-02 01:31:18.518 UTC [gossip.discovery] handleMsgFromComm -> DEBU 276b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.518 UTC [gossip.discovery] handleMsgFromComm -> DEBU 276c Exiting" -"2019-05-02 01:31:18.518 UTC [gossip.gossip] handleMessage -> DEBU 276d Exiting" -"2019-05-02 01:31:18.518 UTC [gossip.gossip] handleMessage -> DEBU 276e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.518 UTC [gossip.gossip] handleMessage -> DEBU 276f Exiting" -"2019-05-02 01:31:18.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2770 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2771 Exiting" -"2019-05-02 01:31:18.525 UTC [msp] DeserializeIdentity -> DEBU 2772 Obtaining identity" -"2019-05-02 01:31:18.525 UTC [msp] DeserializeIdentity -> DEBU 2773 Obtaining identity" -"2019-05-02 01:31:18.526 UTC [msp] DeserializeIdentity -> DEBU 2774 Obtaining identity" -"2019-05-02 01:31:18.526 UTC [msp] DeserializeIdentity -> DEBU 2775 Obtaining identity" -"2019-05-02 01:31:18.527 UTC [msp] DeserializeIdentity -> DEBU 2776 Obtaining identity" -"2019-05-02 01:31:18.527 UTC [msp] DeserializeIdentity -> DEBU 2777 Obtaining identity" -"2019-05-02 01:31:18.527 UTC [gossip.comm] Send -> DEBU 2778 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:18.528 UTC [msp] DeserializeIdentity -> DEBU 2779 Obtaining identity" -"2019-05-02 01:31:18.528 UTC [msp] DeserializeIdentity -> DEBU 277a Obtaining identity" -"2019-05-02 01:31:18.528 UTC [gossip.comm] Send -> DEBU 277b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:18.528 UTC [gossip.comm] sendToEndpoint -> DEBU 277c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.529 UTC [gossip.comm] sendToEndpoint -> DEBU 277d Exiting" -"2019-05-02 01:31:18.529 UTC [gossip.comm] sendToEndpoint -> DEBU 277e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.530 UTC [gossip.comm] sendToEndpoint -> DEBU 277f Exiting" -"2019-05-02 01:31:18.731 UTC [msp.identity] Sign -> DEBU 2780 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101E " -"2019-05-02 01:31:18.731 UTC [msp.identity] Sign -> DEBU 2781 Sign: digest: A8BD7373C1EB38D4669746EF53EAA0285719E261922132FA8F12FBE043421EC2 " -"2019-05-02 01:31:18.732 UTC [msp.identity] Sign -> DEBU 2782 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:18.732 UTC [msp.identity] Sign -> DEBU 2783 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:18.733 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2784 Sleeping 5s" -"2019-05-02 01:31:18.742 UTC [msp] DeserializeIdentity -> DEBU 2785 Obtaining identity" -"2019-05-02 01:31:18.742 UTC [msp] DeserializeIdentity -> DEBU 2786 Obtaining identity" -"2019-05-02 01:31:18.743 UTC [msp] DeserializeIdentity -> DEBU 2787 Obtaining identity" -"2019-05-02 01:31:18.744 UTC [gossip.comm] Send -> DEBU 2788 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:18.744 UTC [gossip.comm] Send -> DEBU 2789 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:18.744 UTC [msp] DeserializeIdentity -> DEBU 278a Obtaining identity" -"2019-05-02 01:31:18.744 UTC [gossip.comm] Send -> DEBU 278b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:18.745 UTC [gossip.comm] sendToEndpoint -> DEBU 278c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.745 UTC [gossip.comm] sendToEndpoint -> DEBU 278d Exiting" -"2019-05-02 01:31:18.745 UTC [gossip.comm] sendToEndpoint -> DEBU 278e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.745 UTC [gossip.comm] sendToEndpoint -> DEBU 278f Exiting" -"2019-05-02 01:31:18.746 UTC [gossip.comm] sendToEndpoint -> DEBU 2790 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:18.746 UTC [gossip.comm] sendToEndpoint -> DEBU 2791 Exiting" -"2019-05-02 01:31:18.846 UTC [gossip.comm] func1 -> DEBU 2792 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.847 UTC [gossip.gossip] handleMessage -> DEBU 2793 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.847 UTC [gossip.gossip] handleMessage -> DEBU 2794 Exiting" -"2019-05-02 01:31:18.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2795 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2796 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:18.848 UTC [msp] DeserializeIdentity -> DEBU 2797 Obtaining identity" -"2019-05-02 01:31:18.849 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2798 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:18.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2799 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:18.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 279a Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:18.850 UTC [policies] Evaluate -> DEBU 279b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:18.850 UTC [policies] Evaluate -> DEBU 279c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:18.851 UTC [policies] Evaluate -> DEBU 279d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:18.851 UTC [cauthdsl] func1 -> DEBU 279e 0xc003dc91d0 gate 1556760678851297300 evaluation starts" -"2019-05-02 01:31:18.851 UTC [cauthdsl] func2 -> DEBU 279f 0xc003dc91d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:18.852 UTC [cauthdsl] func2 -> DEBU 27a0 0xc003dc91d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:18.853 UTC [cauthdsl] func2 -> DEBU 27a1 0xc003dc91d0 principal matched by identity 0" -"2019-05-02 01:31:18.853 UTC [msp.identity] Verify -> DEBU 27a2 Verify: digest = 00000000 30 04 6d 88 f0 4d cd ac f7 c5 59 a5 ee e5 59 66 |0.m..M....Y...Yf| -00000010 2f 1f 6e 68 4b 11 0d aa bf aa e7 a5 d9 61 c0 e4 |/.nhK........a..|" -"2019-05-02 01:31:18.854 UTC [msp.identity] Verify -> DEBU 27a3 Verify: sig = 00000000 30 45 02 21 00 f1 28 bd c4 85 58 e4 7b ae d4 c4 |0E.!..(...X.{...| -00000010 58 2f 31 31 77 7c 10 ff 13 db 73 f6 5b b8 6e 0d |X/11w|....s.[.n.| -00000020 13 89 ff 5e fe 02 20 43 b3 b9 36 35 29 aa cf 47 |...^.. C..65)..G| -00000030 6d 6f 91 08 5b b4 84 70 9f 4c 5f 8a 3a c8 32 c4 |mo..[..p.L_.:.2.| -00000040 ce b8 bb b8 fa d5 c5 |.......|" -"2019-05-02 01:31:18.855 UTC [cauthdsl] func2 -> DEBU 27a4 0xc003dc91d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:18.855 UTC [cauthdsl] func1 -> DEBU 27a5 0xc003dc91d0 gate 1556760678851297300 evaluation succeeds" -"2019-05-02 01:31:18.856 UTC [policies] Evaluate -> DEBU 27a6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:18.856 UTC [policies] Evaluate -> DEBU 27a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:18.856 UTC [policies] Evaluate -> DEBU 27a8 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:18.857 UTC [policies] Evaluate -> DEBU 27a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:18.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 27aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.857 UTC [gossip.discovery] learnExistingMembers -> DEBU 27ab Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:18.857 UTC [gossip.discovery] learnExistingMembers -> DEBU 27ac updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 " -"2019-05-02 01:31:18.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 27ad Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 " -"2019-05-02 01:31:18.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 27ae Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:18.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 27af Exiting" -"2019-05-02 01:31:18.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 27b0 Exiting" -"2019-05-02 01:31:18.859 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b1 Exiting" -"2019-05-02 01:31:18.859 UTC [gossip.comm] func1 -> DEBU 27b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.859 UTC [gossip.gossip] handleMessage -> DEBU 27b4 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.860 UTC [gossip.gossip] handleMessage -> DEBU 27b5 Exiting" -"2019-05-02 01:31:18.859 UTC [msp] DeserializeIdentity -> DEBU 27b3 Obtaining identity" -"2019-05-02 01:31:18.860 UTC [msp] DeserializeIdentity -> DEBU 27b6 Obtaining identity" -"2019-05-02 01:31:18.860 UTC [gossip.gossip] handleMessage -> DEBU 27b7 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.860 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.861 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27ba Exiting" -"2019-05-02 01:31:18.860 UTC [msp] DeserializeIdentity -> DEBU 27b8 Obtaining identity" -"2019-05-02 01:31:18.861 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27bb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.862 UTC [msp] DeserializeIdentity -> DEBU 27bc Obtaining identity" -"2019-05-02 01:31:18.862 UTC [msp] DeserializeIdentity -> DEBU 27bd Obtaining identity" -"2019-05-02 01:31:18.862 UTC [msp] DeserializeIdentity -> DEBU 27be Obtaining identity" -"2019-05-02 01:31:18.862 UTC [gossip.comm] Send -> DEBU 27bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:18.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27c0 Exiting" -"2019-05-02 01:31:18.862 UTC [msp] DeserializeIdentity -> DEBU 27c1 Obtaining identity" -"2019-05-02 01:31:18.863 UTC [gossip.gossip] handleMessage -> DEBU 27c3 Exiting" -"2019-05-02 01:31:18.863 UTC [gossip.comm] sendToEndpoint -> DEBU 27c2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.863 UTC [gossip.comm] sendToEndpoint -> DEBU 27c4 Exiting" -"2019-05-02 01:31:18.863 UTC [msp] DeserializeIdentity -> DEBU 27c5 Obtaining identity" -"2019-05-02 01:31:18.864 UTC [gossip.comm] Send -> DEBU 27c6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:18.864 UTC [gossip.comm] sendToEndpoint -> DEBU 27c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:18.865 UTC [gossip.comm] sendToEndpoint -> DEBU 27c8 Exiting" -"2019-05-02 01:31:19.663 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27c9 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:19.666 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27ca Got block validation policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:19.666 UTC [policies] Evaluate -> DEBU 27cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-05-02 01:31:19.666 UTC [policies] Evaluate -> DEBU 27cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:19.667 UTC [policies] Evaluate -> DEBU 27cd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:31:19.667 UTC [cauthdsl] func1 -> DEBU 27ce 0xc003f117a0 gate 1556760679667141200 evaluation starts" -"2019-05-02 01:31:19.667 UTC [cauthdsl] func2 -> DEBU 27cf 0xc003f117a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:19.668 UTC [cauthdsl] func2 -> DEBU 27d0 0xc003f117a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:19.668 UTC [cauthdsl] func2 -> DEBU 27d1 0xc003f117a0 principal matched by identity 0" -"2019-05-02 01:31:19.668 UTC [msp.identity] Verify -> DEBU 27d2 Verify: digest = 00000000 c3 f9 8e b4 e1 66 3f c7 04 e2 0d b1 c3 9d 1c af |.....f?.........| -00000010 0a ee a0 68 ca 4d a7 a5 88 20 a3 38 12 a6 32 ac |...h.M... .8..2.|" -"2019-05-02 01:31:19.668 UTC [msp.identity] Verify -> DEBU 27d3 Verify: sig = 00000000 30 44 02 20 0d 3f b7 9e ad 7c 2a ee 79 d7 b7 f3 |0D. .?...|*.y...| -00000010 e3 1a cb c1 31 26 90 05 47 d5 25 ef a0 fd 4d 50 |....1&..G.%...MP| -00000020 f0 a5 c1 3b 02 20 16 08 0c 87 45 36 35 4f 90 2d |...;. ....E65O.-| -00000030 5c 20 ff 19 a9 c7 3a f3 80 2b 18 8c 1a c4 17 ae |\ ....:..+......| -00000040 37 96 fa 71 1a 24 |7..q.$|" -"2019-05-02 01:31:19.669 UTC [cauthdsl] func2 -> DEBU 27d4 0xc003f117a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:19.669 UTC [cauthdsl] func1 -> DEBU 27d5 0xc003f117a0 gate 1556760679667141200 evaluation succeeds" -"2019-05-02 01:31:19.670 UTC [policies] Evaluate -> DEBU 27d6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:19.670 UTC [policies] Evaluate -> DEBU 27d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:19.670 UTC [policies] Evaluate -> DEBU 27d8 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:19.670 UTC [policies] Evaluate -> DEBU 27d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:19.671 UTC [blocksProvider] DeliverBlocks -> DEBU 27da [businesschannel] Adding payload to local buffer, blockNum = [8]" -"2019-05-02 01:31:19.671 UTC [gossip.state] addPayload -> DEBU 27db [businesschannel] Adding payload to local buffer, blockNum = [8]" -"2019-05-02 01:31:19.672 UTC [gossip.state] deliverPayloads -> DEBU 27dc [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [8]" -"2019-05-02 01:31:19.676 UTC [gossip.state] deliverPayloads -> DEBU 27dd [businesschannel] Transferring block [8] with 1 transaction(s) to the ledger" -"2019-05-02 01:31:19.678 UTC [gossip.privdata] StoreBlock -> INFO 27de [businesschannel] Received block [8] from buffer" -"2019-05-02 01:31:19.678 UTC [gossip.privdata] StoreBlock -> DEBU 27df [businesschannel] Validating block [8]" -"2019-05-02 01:31:19.679 UTC [committer.txvalidator] Validate -> DEBU 27e0 [businesschannel] START Block Validation for block [8]" -"2019-05-02 01:31:19.680 UTC [committer.txvalidator] Validate -> DEBU 27e1 expecting 1 block validation responses" -"2019-05-02 01:31:19.680 UTC [committer.txvalidator] validateTx -> DEBU 27e2 [businesschannel] validateTx starts for block 0xc002d99e40 env 0xc0021829b0 txn 0" -"2019-05-02 01:31:19.690 UTC [protoutils] ValidateTransaction -> DEBU 27e3 ValidateTransactionEnvelope starts for envelope 0xc0021829b0" -"2019-05-02 01:31:19.690 UTC [protoutils] ValidateTransaction -> DEBU 27e4 Header is channel_header:"\010\003\032\014\010\345\220\251\346\005\020\260\224\211\214\002\"\017businesschannel*@ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030\000 @{\234\006\n_;\331\014\371AI\342\340\253\025\177P\177\233b" " -"2019-05-02 01:31:19.690 UTC [protoutils] validateChannelHeader -> DEBU 27e5 validateChannelHeader info: header type 3" -"2019-05-02 01:31:19.690 UTC [protoutils] checkSignatureFromCreator -> DEBU 27e6 begin" -"2019-05-02 01:31:19.690 UTC [msp] GetManagerForChain -> DEBU 27e7 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:19.691 UTC [protoutils] checkSignatureFromCreator -> DEBU 27e8 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -"2019-05-02 01:31:19.694 UTC [gossip.state] addPayload -> DEBU 27ea Blocks payloads buffer size for channel [businesschannel] is 0 blocks" -"2019-05-02 01:31:19.693 UTC [protoutils] checkSignatureFromCreator -> DEBU 27e9 creator is valid" -"2019-05-02 01:31:19.694 UTC [blocksProvider] DeliverBlocks -> DEBU 27eb [businesschannel] Gossiping block [8], peers number [3]" -"2019-05-02 01:31:19.695 UTC [msp.identity] Verify -> DEBU 27ec Verify: digest = 00000000 66 e4 f2 de d2 a6 a0 d5 b6 09 1c 1e bd d8 2c fa |f.............,.| -00000010 93 b6 be a4 e5 76 0e 42 ca 72 e6 17 85 c4 ea 76 |.....v.B.r.....v|" -"2019-05-02 01:31:19.700 UTC [msp.identity] Verify -> DEBU 27ed Verify: sig = 00000000 30 44 02 20 78 b3 37 1d ca ba c7 c9 5d 36 6d 83 |0D. x.7.....]6m.| -00000010 42 de 4a 72 50 d3 54 e1 f1 dc 3e e7 99 fb f5 c0 |B.JrP.T...>.....| -00000020 2a c9 95 0a 02 20 20 f0 1d d8 94 c2 2e d9 22 69 |*.... ......."i| -00000030 48 80 cc 13 de 39 9d 40 97 56 24 68 5a c9 8f 6f |H....9.@.V$hZ..o| -00000040 89 51 23 9f 67 ae |.Q#.g.|" -"2019-05-02 01:31:19.697 UTC [gossip.channel] AddToMsgStore -> DEBU 27ee Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes to the block puller" -"2019-05-02 01:31:19.701 UTC [gossip.pull] Add -> DEBU 27ef Added 8, total items: 8" -"2019-05-02 01:31:19.701 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f0 exits successfully" -"2019-05-02 01:31:19.703 UTC [protoutils] validateEndorserTransaction -> DEBU 27f1 validateEndorserTransaction starts for data 0xc002ecb000, header channel_header:"\010\003\032\014\010\345\220\251\346\005\020\260\224\211\214\002\"\017businesschannel*@ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030\000 @{\234\006\n_;\331\014\371AI\342\340\253\025\177P\177\233b" " -"2019-05-02 01:31:19.704 UTC [protoutils] validateEndorserTransaction -> DEBU 27f2 validateEndorserTransaction info: there are 1 actions" -"2019-05-02 01:31:19.704 UTC [protoutils] validateEndorserTransaction -> DEBU 27f3 validateEndorserTransaction info: signature header is valid" -"2019-05-02 01:31:19.704 UTC [protoutils] ValidateTransaction -> DEBU 27f4 ValidateTransactionEnvelope returns err %!s()" -"2019-05-02 01:31:19.704 UTC [committer.txvalidator] validateTx -> DEBU 27f5 Transaction is for channel businesschannel" -"2019-05-02 01:31:19.705 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 27f6 retrieveTransactionByID() - txId = [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b]" -"2019-05-02 01:31:19.706 UTC [committer.txvalidator] validateTx -> DEBU 27f7 Validating transaction with plugins" -"2019-05-02 01:31:19.707 UTC [committer.txvalidator] Dispatch -> DEBU 27f9 [businesschannel] Dispatch starts for bytes 0xc002196000" -"2019-05-02 01:31:19.708 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27fa constructing new query executor txid = [d6f06272-03dc-4ee9-9835-6a745bf5ad6b]" -"2019-05-02 01:31:19.708 UTC [stateleveldb] GetState -> DEBU 27fb GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" -"2019-05-02 01:31:19.706 UTC [msp] DeserializeIdentity -> DEBU 27f8 Obtaining identity" -"2019-05-02 01:31:19.708 UTC [msp] DeserializeIdentity -> DEBU 27fc Obtaining identity" -"2019-05-02 01:31:19.709 UTC [msp] DeserializeIdentity -> DEBU 27fd Obtaining identity" -"2019-05-02 01:31:19.709 UTC [msp] DeserializeIdentity -> DEBU 27fe Obtaining identity" -"2019-05-02 01:31:19.709 UTC [gossip.comm] Send -> DEBU 27ff Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:19.710 UTC [msp] DeserializeIdentity -> DEBU 2800 Obtaining identity" -"2019-05-02 01:31:19.710 UTC [msp] DeserializeIdentity -> DEBU 2802 Obtaining identity" -"2019-05-02 01:31:19.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2803 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes" -"2019-05-02 01:31:19.710 UTC [stateleveldb] GetState -> DEBU 2801 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:19.712 UTC [gossip.comm] sendToEndpoint -> DEBU 2804 Exiting" -"2019-05-02 01:31:19.712 UTC [stateleveldb] GetState -> DEBU 2805 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" -"2019-05-02 01:31:19.713 UTC [stateleveldb] GetState -> DEBU 2806 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" -"2019-05-02 01:31:19.713 UTC [stateleveldb] GetState -> DEBU 2807 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" -"2019-05-02 01:31:19.714 UTC [lockbasedtxmgr] Done -> DEBU 2808 Done with transaction simulation / query execution [d6f06272-03dc-4ee9-9835-6a745bf5ad6b]" -"2019-05-02 01:31:19.714 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 2809 Validating Tx ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b, seq 0 out of 1 in block 8 for channel businesschannel with validation plugin vscc with plugin" -"2019-05-02 01:31:19.714 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 280a constructing new query executor txid = [1175ab5c-27ad-406a-96f5-984d82aeb65d]" -"2019-05-02 01:31:19.715 UTC [lockbasedtxmgr] Done -> DEBU 280b Done with transaction simulation / query execution [1175ab5c-27ad-406a-96f5-984d82aeb65d]" -"2019-05-02 01:31:19.720 UTC [cauthdsl] func1 -> DEBU 280c 0xc003fa5180 gate 1556760679719976300 evaluation starts" -"2019-05-02 01:31:19.720 UTC [cauthdsl] func2 -> DEBU 280d 0xc003fa5180 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:19.721 UTC [cauthdsl] func2 -> DEBU 280e 0xc003fa5180 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:19.722 UTC [cauthdsl] func2 -> DEBU 280f 0xc003fa5180 principal matched by identity 0" -"2019-05-02 01:31:19.722 UTC [msp.identity] Verify -> DEBU 2810 Verify: digest = 00000000 ce 6d 7b 6f 05 a0 de 9d 42 13 f2 1e cb b0 94 f0 |.m{o....B.......| -00000010 61 ee cc fc c1 1c 69 c6 b7 ef 88 b6 ff b8 6b 94 |a.....i.......k.|" -"2019-05-02 01:31:19.725 UTC [msp.identity] Verify -> DEBU 2811 Verify: sig = 00000000 30 45 02 21 00 eb 93 30 77 34 5f 07 bf 6d ff 9b |0E.!...0w4_..m..| -00000010 a7 fe a5 62 27 67 92 54 73 0c 96 06 f3 0b fc 0e |...b'g.Ts.......| -00000020 ea 40 3a a4 a1 02 20 59 dc 36 64 2d c9 4e 1b 81 |.@:... Y.6d-.N..| -00000030 86 a8 de 64 d6 15 b6 31 22 75 2d 31 e4 d5 ae 19 |...d...1"u-1....| -00000040 c2 38 5f 2e ff 9b 5c |.8_...\|" -"2019-05-02 01:31:19.725 UTC [cauthdsl] func2 -> DEBU 2812 0xc003fa5180 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:19.726 UTC [cauthdsl] func2 -> DEBU 2813 0xc003fa5180 signed by 1 principal evaluation starts (used [true])" -"2019-05-02 01:31:19.726 UTC [cauthdsl] func2 -> DEBU 2814 0xc003fa5180 skipping identity 0 because it has already been used" -"2019-05-02 01:31:19.727 UTC [cauthdsl] func2 -> DEBU 2815 0xc003fa5180 principal evaluation fails" -"2019-05-02 01:31:19.728 UTC [cauthdsl] func1 -> DEBU 2816 0xc003fa5180 gate 1556760679719976300 evaluation succeeds" -"2019-05-02 01:31:19.728 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2817 constructing new query executor txid = [fa6515ec-5d33-4b19-990d-cb8f6b8a6e9c]" -"2019-05-02 01:31:19.729 UTC [lockbasedtxmgr] Done -> DEBU 2818 Done with transaction simulation / query execution [fa6515ec-5d33-4b19-990d-cb8f6b8a6e9c]" -"2019-05-02 01:31:19.729 UTC [vscc] Validate -> DEBU 2819 block 8, namespace: exp02, tx 0 validation results is: " -"2019-05-02 01:31:19.729 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 281a Transaction ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b appears to be valid" -"2019-05-02 01:31:19.730 UTC [committer.txvalidator] Dispatch -> DEBU 281b [businesschannel] Dispatch completes env bytes 0xc002196000" -"2019-05-02 01:31:19.731 UTC [committer.txvalidator] Validate -> DEBU 281c got result for idx 0, code 0" -"2019-05-02 01:31:19.732 UTC [committer.txvalidator] Validate -> INFO 281d [businesschannel] Validated block [8] in 52ms" -"2019-05-02 01:31:19.733 UTC [gossip.privdata] listMissingPrivateData -> DEBU 281e Retrieving private write sets for 0 transactions from transient store" -"2019-05-02 01:31:19.734 UTC [gossip.privdata] StoreBlock -> DEBU 281f [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-05-02 01:31:19.736 UTC [kvledger] CommitWithPvtData -> DEBU 2820 [businesschannel] Validating state for block [8]" -"2019-05-02 01:31:19.736 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2821 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:31:19.736 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2822 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-05-02 01:31:19.736 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2823 Validating new block with num trans = [1]" -"2019-05-02 01:31:19.737 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2824 ValidateAndPrepareBatch() for block number = [8]" -"2019-05-02 01:31:19.737 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2825 preprocessing ProtoBlock..." -"2019-05-02 01:31:19.738 UTC [valimpl] preprocessProtoBlock -> DEBU 2827 txType=ENDORSER_TRANSACTION" -"2019-05-02 01:31:19.730 UTC [committer.txvalidator] validateTx -> DEBU 2826 [businesschannel] validateTx completes for block 0xc002d99e40 env 0xc0021829b0 txn 0" -"2019-05-02 01:31:19.739 UTC [stateleveldb] GetState -> DEBU 2828 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:19.739 UTC [statebasedval] validateKVRead -> DEBU 2829 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" -"2019-05-02 01:31:19.739 UTC [stateleveldb] GetState -> DEBU 282a GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:19.739 UTC [statebasedval] validateKVRead -> DEBU 282b Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" -"2019-05-02 01:31:19.740 UTC [stateleveldb] GetState -> DEBU 282c GetState(). ns=exp02, key=a" -"2019-05-02 01:31:19.740 UTC [statebasedval] validateKVRead -> DEBU 282d Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" -"2019-05-02 01:31:19.740 UTC [stateleveldb] GetState -> DEBU 282e GetState(). ns=exp02, key=b" -"2019-05-02 01:31:19.740 UTC [statebasedval] validateKVRead -> DEBU 282f Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" -"2019-05-02 01:31:19.741 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2830 Block [8] Transaction index [0] TxId [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b] marked as valid by state validator. ContainsPostOrderWrites [false]" -"2019-05-02 01:31:19.741 UTC [valinternal] ApplyWriteSet -> DEBU 2831 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0026fe7c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0026fe800)}" -"2019-05-02 01:31:19.741 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2832 validating rwset..." -"2019-05-02 01:31:19.741 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2833 postprocessing ProtoBlock..." -"2019-05-02 01:31:19.742 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2834 ValidateAndPrepareBatch() complete" -"2019-05-02 01:31:19.742 UTC [kvledger] CommitWithPvtData -> DEBU 2835 [businesschannel] Committing block [8] to storage" -"2019-05-02 01:31:19.742 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2836 Writing block [8] to pvt block store" -"2019-05-02 01:31:19.747 UTC [pvtdatastorage] Prepare -> DEBU 2837 Saved 0 private data write sets for block [8]" -"2019-05-02 01:31:19.751 UTC [fsblkstorage] indexBlock -> DEBU 2838 Indexing block [blockNum=8, blockHash=[]byte{0xec, 0x7a, 0xf9, 0x87, 0x2a, 0xf6, 0xf9, 0xf3, 0x9d, 0x8, 0x72, 0xc7, 0xa9, 0xe8, 0x8f, 0xb7, 0xe, 0x92, 0xd, 0x6d, 0x8e, 0xab, 0xc4, 0xfc, 0xd4, 0x86, 0x3b, 0x46, 0x29, 0x92, 0x30, 0x8d} txOffsets= -txId=ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b locPointer=offset=70, bytesLength=3044 +"2019-05-02 09:27:49.199 UTC [msp.identity] Verify -> DEBU 270f Verify: sig = 00000000 30 44 02 20 7c 18 55 c5 f9 ae 5c d3 2a 4a 79 bb |0D. |.U...\.*Jy.| +00000010 55 fc 6a c9 b7 54 32 3d ae 16 06 26 04 63 13 98 |U.j..T2=...&.c..| +00000020 63 94 d8 f8 02 20 03 81 cf 5b 1b 33 29 ba 97 d5 |c.... ...[.3)...| +00000030 5d 03 fe 3d 70 04 49 41 2d 5f 75 84 2f 2b da 82 |]..=p.IA-_u./+..| +00000040 b0 38 ff 76 1a 39 |.8.v.9|" +"2019-05-02 09:27:49.199 UTC [gossip.discovery] handleAliveMessage -> DEBU 2710 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:49.199 UTC [gossip.discovery] isSentByMe -> DEBU 2711 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:49.199 UTC [gossip.discovery] handleAliveMessage -> DEBU 2712 Exiting" +"2019-05-02 09:27:49.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2713 Exiting" +"2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2714 Exiting" +"2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2715 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2716 Exiting" +"2019-05-02 09:27:49.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2717 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.201 UTC [gossip.gossip] handleMessage -> DEBU 2718 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.202 UTC [gossip.pull] HandleMessage -> DEBU 2719 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.202 UTC [msp] DeserializeIdentity -> DEBU 271a Obtaining identity" +"2019-05-02 09:27:49.202 UTC [msp] DeserializeIdentity -> DEBU 271b Obtaining identity" +"2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 271d Obtaining identity" +"2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 271e Obtaining identity" +"2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 271f Obtaining identity" +"2019-05-02 09:27:49.203 UTC [msp] DeserializeIdentity -> DEBU 2720 Obtaining identity" +"2019-05-02 09:27:49.201 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 271c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:49.204 UTC [gossip.pull] SendDigest -> DEBU 2721 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:49.205 UTC [gossip.gossip] handleMessage -> DEBU 2722 Exiting" +"2019-05-02 09:27:49.205 UTC [gossip.gossip] handleMessage -> DEBU 2723 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.204 UTC [msp] DeserializeIdentity -> DEBU 2724 Obtaining identity" +"2019-05-02 09:27:49.206 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2725 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:49.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2726 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:49.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2727 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:49.207 UTC [policies] Evaluate -> DEBU 2728 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:49.207 UTC [policies] Evaluate -> DEBU 2729 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:49.207 UTC [policies] Evaluate -> DEBU 272a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:49.207 UTC [cauthdsl] func1 -> DEBU 272b 0xc004642320 gate 1556789269207666200 evaluation starts" +"2019-05-02 09:27:49.207 UTC [cauthdsl] func2 -> DEBU 272c 0xc004642320 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:49.208 UTC [cauthdsl] func2 -> DEBU 272d 0xc004642320 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:49.208 UTC [cauthdsl] func2 -> DEBU 272e 0xc004642320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:49.208 UTC [cauthdsl] func2 -> DEBU 272f 0xc004642320 principal evaluation fails" +"2019-05-02 09:27:49.208 UTC [cauthdsl] func1 -> DEBU 2730 0xc004642320 gate 1556789269207666200 evaluation fails" +"2019-05-02 09:27:49.208 UTC [policies] Evaluate -> DEBU 2731 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:49.208 UTC [policies] Evaluate -> DEBU 2732 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:49.209 UTC [policies] Evaluate -> DEBU 2733 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:49.209 UTC [cauthdsl] func1 -> DEBU 2734 0xc004642b60 gate 1556789269209224000 evaluation starts" +"2019-05-02 09:27:49.209 UTC [cauthdsl] func2 -> DEBU 2735 0xc004642b60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:49.209 UTC [cauthdsl] func2 -> DEBU 2736 0xc004642b60 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:49.209 UTC [cauthdsl] func2 -> DEBU 2737 0xc004642b60 principal matched by identity 0" +"2019-05-02 09:27:49.209 UTC [msp.identity] Verify -> DEBU 2738 Verify: digest = 00000000 be b6 0e ab a3 44 29 70 3c be c5 26 00 3f d9 9a |.....D)p<..&.?..| +00000010 d0 68 c4 fc 42 20 88 25 1e 22 8d 2a a7 33 5c f9 |.h..B .%.".*.3\.|" +"2019-05-02 09:27:49.209 UTC [msp.identity] Verify -> DEBU 2739 Verify: sig = 00000000 30 44 02 20 44 34 3d 35 9f 83 a9 e3 2a 0a 45 ec |0D. D4=5....*.E.| +00000010 ba e8 d2 07 91 a9 6f 5b 90 7b b2 d1 ff b1 0c 50 |......o[.{.....P| +00000020 d7 4e f8 85 02 20 13 ff 0c b4 43 b8 b9 2a f2 7d |.N... ....C..*.}| +00000030 a4 cc 72 be f6 b4 08 10 18 11 6d f8 ff 4b 5d 0a |..r.......m..K].| +00000040 4c 73 07 21 5c 38 |Ls.!\8|" +"2019-05-02 09:27:49.210 UTC [cauthdsl] func2 -> DEBU 273a 0xc004642b60 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:49.210 UTC [cauthdsl] func1 -> DEBU 273b 0xc004642b60 gate 1556789269209224000 evaluation succeeds" +"2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:49.210 UTC [policies] Evaluate -> DEBU 273f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:49.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 2740 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2741 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2742 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 " +"2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2743 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 " +"2019-05-02 09:27:49.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 2744 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:49.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 2745 Exiting" +"2019-05-02 09:27:49.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 2746 Exiting" +"2019-05-02 09:27:49.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2747 Exiting" +"2019-05-02 09:27:49.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2748 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2749 Exiting" +"2019-05-02 09:27:49.212 UTC [gossip.gossip] handleMessage -> DEBU 274a Exiting" +"2019-05-02 09:27:49.212 UTC [gossip.gossip] handleMessage -> DEBU 274b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.213 UTC [gossip.gossip] handleMessage -> DEBU 274c Exiting" +"2019-05-02 09:27:49.213 UTC [gossip.gossip] handleMessage -> DEBU 274d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 274e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 274f Exiting" +"2019-05-02 09:27:49.214 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2750 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.214 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2751 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:49.214 UTC [msp] DeserializeIdentity -> DEBU 2752 Obtaining identity" +"2019-05-02 09:27:49.214 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2753 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:49.214 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2754 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:49.214 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2755 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:49.214 UTC [policies] Evaluate -> DEBU 2756 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:49.215 UTC [policies] Evaluate -> DEBU 2757 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:49.215 UTC [policies] Evaluate -> DEBU 2758 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:49.215 UTC [cauthdsl] func1 -> DEBU 2759 0xc0045bd860 gate 1556789269215193500 evaluation starts" +"2019-05-02 09:27:49.215 UTC [cauthdsl] func2 -> DEBU 275a 0xc0045bd860 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:49.215 UTC [cauthdsl] func2 -> DEBU 275b 0xc0045bd860 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:49.215 UTC [cauthdsl] func2 -> DEBU 275c 0xc0045bd860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:49.216 UTC [cauthdsl] func2 -> DEBU 275d 0xc0045bd860 principal evaluation fails" +"2019-05-02 09:27:49.216 UTC [cauthdsl] func1 -> DEBU 275e 0xc0045bd860 gate 1556789269215193500 evaluation fails" +"2019-05-02 09:27:49.216 UTC [policies] Evaluate -> DEBU 275f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:49.216 UTC [policies] Evaluate -> DEBU 2760 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:49.216 UTC [policies] Evaluate -> DEBU 2761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:49.217 UTC [cauthdsl] func1 -> DEBU 2762 0xc00451a0a0 gate 1556789269217045700 evaluation starts" +"2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2763 0xc00451a0a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2764 0xc00451a0a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2765 0xc00451a0a0 principal matched by identity 0" +"2019-05-02 09:27:49.217 UTC [msp.identity] Verify -> DEBU 2766 Verify: digest = 00000000 28 f5 bc 9a a9 eb 67 06 76 5d 72 15 6f cf a1 3e |(.....g.v]r.o..>| +00000010 85 1b b0 eb e3 d4 cc 0e 5a f4 06 64 63 92 02 34 |........Z..dc..4|" +"2019-05-02 09:27:49.217 UTC [msp.identity] Verify -> DEBU 2767 Verify: sig = 00000000 30 44 02 20 32 d2 b7 c8 6e 29 a4 89 28 8b be 7e |0D. 2...n)..(..~| +00000010 9a dc ea 69 b8 b2 2e c0 86 5e 35 8d bb da 6a b7 |...i.....^5...j.| +00000020 fc 52 5d 4e 02 20 22 43 71 fd e3 71 47 8b ce 31 |.R]N. "Cq..qG..1| +00000030 ff 74 f0 ac 69 46 c8 b1 d0 69 19 ac ee b1 2b 6c |.t..iF...i....+l| +00000040 4f 21 b8 78 20 06 |O!.x .|" +"2019-05-02 09:27:49.217 UTC [cauthdsl] func2 -> DEBU 2768 0xc00451a0a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:49.217 UTC [cauthdsl] func1 -> DEBU 2769 0xc00451a0a0 gate 1556789269217045700 evaluation succeeds" +"2019-05-02 09:27:49.217 UTC [policies] Evaluate -> DEBU 276a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:49.217 UTC [policies] Evaluate -> DEBU 276b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:49.218 UTC [policies] Evaluate -> DEBU 276c Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:49.218 UTC [policies] Evaluate -> DEBU 276d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:49.218 UTC [gossip.discovery] handleAliveMessage -> DEBU 276e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 276f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2770 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 " +"2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2771 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 " +"2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2772 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:49.218 UTC [gossip.discovery] learnExistingMembers -> DEBU 2773 Exiting" +"2019-05-02 09:27:49.218 UTC [gossip.discovery] handleAliveMessage -> DEBU 2774 Exiting" +"2019-05-02 09:27:49.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2775 Exiting" +"2019-05-02 09:27:49.218 UTC [gossip.discovery] sendMemResponse -> DEBU 2776 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:49.218 UTC [msp] DeserializeIdentity -> DEBU 2777 Obtaining identity" +"2019-05-02 09:27:49.219 UTC [msp] DeserializeIdentity -> DEBU 2778 Obtaining identity" +"2019-05-02 09:27:49.219 UTC [msp] DeserializeIdentity -> DEBU 2779 Obtaining identity" +"2019-05-02 09:27:49.219 UTC [gossip.comm] Send -> DEBU 277a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:49.219 UTC [gossip.discovery] sendMemResponse -> DEBU 277b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:49.219 UTC [gossip.comm] sendToEndpoint -> DEBU 277c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.219 UTC [gossip.comm] sendToEndpoint -> DEBU 277d Exiting" +"2019-05-02 09:27:49.219 UTC [gossip.gossip] handleMessage -> DEBU 277e Exiting" +"2019-05-02 09:27:49.234 UTC [msp] DeserializeIdentity -> DEBU 277f Obtaining identity" +"2019-05-02 09:27:49.234 UTC [msp] DeserializeIdentity -> DEBU 2780 Obtaining identity" +"2019-05-02 09:27:49.235 UTC [msp] DeserializeIdentity -> DEBU 2781 Obtaining identity" +"2019-05-02 09:27:49.235 UTC [msp] DeserializeIdentity -> DEBU 2782 Obtaining identity" +"2019-05-02 09:27:49.235 UTC [msp] DeserializeIdentity -> DEBU 2783 Obtaining identity" +"2019-05-02 09:27:49.236 UTC [msp] DeserializeIdentity -> DEBU 2784 Obtaining identity" +"2019-05-02 09:27:49.236 UTC [msp] DeserializeIdentity -> DEBU 2785 Obtaining identity" +"2019-05-02 09:27:49.236 UTC [gossip.comm] Send -> DEBU 2786 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:49.236 UTC [msp] DeserializeIdentity -> DEBU 2787 Obtaining identity" +"2019-05-02 09:27:49.237 UTC [gossip.comm] Send -> DEBU 2788 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:49.237 UTC [gossip.comm] sendToEndpoint -> DEBU 2789 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.237 UTC [gossip.comm] sendToEndpoint -> DEBU 278a Exiting" +"2019-05-02 09:27:49.238 UTC [gossip.comm] sendToEndpoint -> DEBU 278b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:49.238 UTC [gossip.comm] sendToEndpoint -> DEBU 278c Exiting" +"2019-05-02 09:27:49.806 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 278d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:49.806 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 278e Got block validation policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:49.807 UTC [policies] Evaluate -> DEBU 278f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-05-02 09:27:49.807 UTC [policies] Evaluate -> DEBU 2790 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:49.808 UTC [policies] Evaluate -> DEBU 2791 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:27:49.808 UTC [cauthdsl] func1 -> DEBU 2792 0xc003936510 gate 1556789269808070900 evaluation starts" +"2019-05-02 09:27:49.808 UTC [cauthdsl] func2 -> DEBU 2793 0xc003936510 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:49.808 UTC [cauthdsl] func2 -> DEBU 2794 0xc003936510 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:49.808 UTC [cauthdsl] func2 -> DEBU 2795 0xc003936510 principal matched by identity 0" +"2019-05-02 09:27:49.808 UTC [msp.identity] Verify -> DEBU 2796 Verify: digest = 00000000 27 30 54 77 93 7b bc 69 63 ed d7 aa 5a 8e 0a 5f |'0Tw.{.ic...Z.._| +00000010 84 81 a0 7d ac 0d 90 db c5 c7 d1 61 46 d8 2b 6a |...}.......aF.+j|" +"2019-05-02 09:27:49.809 UTC [msp.identity] Verify -> DEBU 2797 Verify: sig = 00000000 30 44 02 20 31 00 d0 ca 4a 78 30 f4 ca f2 b9 94 |0D. 1...Jx0.....| +00000010 5f e3 d6 22 26 a9 ca c9 e1 48 d5 65 55 c6 98 a5 |_.."&....H.eU...| +00000020 96 9d 9f bd 02 20 7a ce 10 8a 26 35 1b b0 81 81 |..... z...&5....| +00000030 71 b6 57 49 b8 64 f3 45 d6 b6 0e e0 54 db 09 02 |q.WI.d.E....T...| +00000040 7d 1a 38 48 d0 98 |}.8H..|" +"2019-05-02 09:27:49.809 UTC [cauthdsl] func2 -> DEBU 2798 0xc003936510 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:49.810 UTC [cauthdsl] func1 -> DEBU 2799 0xc003936510 gate 1556789269808070900 evaluation succeeds" +"2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279c Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:49.810 UTC [policies] Evaluate -> DEBU 279d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:27:49.811 UTC [blocksProvider] DeliverBlocks -> DEBU 279e [businesschannel] Adding payload to local buffer, blockNum = [8]" +"2019-05-02 09:27:49.811 UTC [gossip.state] addPayload -> DEBU 279f [businesschannel] Adding payload to local buffer, blockNum = [8]" +"2019-05-02 09:27:49.812 UTC [gossip.state] addPayload -> DEBU 27a0 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-05-02 09:27:49.813 UTC [blocksProvider] DeliverBlocks -> DEBU 27a2 [businesschannel] Gossiping block [8], peers number [3]" +"2019-05-02 09:27:49.813 UTC [gossip.state] deliverPayloads -> DEBU 27a1 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [8]" +"2019-05-02 09:27:49.813 UTC [gossip.state] deliverPayloads -> DEBU 27a4 [businesschannel] Transferring block [8] with 1 transaction(s) to the ledger" +"2019-05-02 09:27:49.813 UTC [gossip.privdata] StoreBlock -> INFO 27a5 [businesschannel] Received block [8] from buffer" +"2019-05-02 09:27:49.814 UTC [gossip.privdata] StoreBlock -> DEBU 27a6 [businesschannel] Validating block [8]" +"2019-05-02 09:27:49.813 UTC [gossip.channel] AddToMsgStore -> DEBU 27a3 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes to the block puller" +"2019-05-02 09:27:49.814 UTC [committer.txvalidator] Validate -> DEBU 27a7 [businesschannel] START Block Validation for block [8]" +"2019-05-02 09:27:49.814 UTC [committer.txvalidator] Validate -> DEBU 27a8 expecting 1 block validation responses" +"2019-05-02 09:27:49.814 UTC [committer.txvalidator] validateTx -> DEBU 27a9 [businesschannel] validateTx starts for block 0xc0045e0380 env 0xc00443aaf0 txn 0" +"2019-05-02 09:27:49.815 UTC [protoutils] ValidateTransaction -> DEBU 27ab ValidateTransactionEnvelope starts for envelope 0xc00443aaf0" +"2019-05-02 09:27:49.815 UTC [protoutils] ValidateTransaction -> DEBU 27ac Header is channel_header:"\010\003\032\014\010\223\360\252\346\005\020\240\275\332\336\002\"\017businesschannel*@f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030e\223@\256\202p\003\340j\302=\306\016\303\007\026\372\331\206\021D\207\310" " +"2019-05-02 09:27:49.815 UTC [protoutils] validateChannelHeader -> DEBU 27ad validateChannelHeader info: header type 3" +"2019-05-02 09:27:49.815 UTC [protoutils] checkSignatureFromCreator -> DEBU 27ae begin" +"2019-05-02 09:27:49.815 UTC [msp] GetManagerForChain -> DEBU 27af Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:49.815 UTC [protoutils] checkSignatureFromCreator -> DEBU 27b0 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-05-02 09:27:49.815 UTC [protoutils] checkSignatureFromCreator -> DEBU 27b1 creator is valid" +"2019-05-02 09:27:49.814 UTC [gossip.pull] Add -> DEBU 27aa Added 8, total items: 8" +"2019-05-02 09:27:49.816 UTC [msp.identity] Verify -> DEBU 27b2 Verify: digest = 00000000 9d 1a 32 6d 5f bc 13 f8 45 b8 60 0f 16 f8 bd cf |..2m_...E.`.....| +00000010 c4 1a 80 39 8d 13 0e de 7d 1f 66 83 ff 2d da be |...9....}.f..-..|" +"2019-05-02 09:27:49.816 UTC [msp.identity] Verify -> DEBU 27b3 Verify: sig = 00000000 30 44 02 20 13 0a fa 13 d5 6c 5e 7f b5 37 72 79 |0D. .....l^..7ry| +00000010 2d 47 b9 8d aa ba ae 33 ba 66 86 a4 f4 55 83 9d |-G.....3.f...U..| +00000020 8a 12 53 97 02 20 63 42 a9 84 5f 26 98 76 1f b4 |..S.. cB.._&.v..| +00000030 48 24 eb b5 bc 89 71 b6 f1 f0 97 16 ba 96 06 64 |H$....q........d| +00000040 4f b1 ca 9f 55 1a |O...U.|" +"2019-05-02 09:27:49.817 UTC [protoutils] checkSignatureFromCreator -> DEBU 27b4 exits successfully" +"2019-05-02 09:27:49.817 UTC [protoutils] validateEndorserTransaction -> DEBU 27b5 validateEndorserTransaction starts for data 0xc0033b8800, header channel_header:"\010\003\032\014\010\223\360\252\346\005\020\240\275\332\336\002\"\017businesschannel*@f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030e\223@\256\202p\003\340j\302=\306\016\303\007\026\372\331\206\021D\207\310" " +"2019-05-02 09:27:49.817 UTC [protoutils] validateEndorserTransaction -> DEBU 27b6 validateEndorserTransaction info: there are 1 actions" +"2019-05-02 09:27:49.817 UTC [protoutils] validateEndorserTransaction -> DEBU 27b7 validateEndorserTransaction info: signature header is valid" +"2019-05-02 09:27:49.818 UTC [protoutils] ValidateTransaction -> DEBU 27b8 ValidateTransactionEnvelope returns err %!s()" +"2019-05-02 09:27:49.818 UTC [committer.txvalidator] validateTx -> DEBU 27b9 Transaction is for channel businesschannel" +"2019-05-02 09:27:49.818 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 27ba retrieveTransactionByID() - txId = [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176]" +"2019-05-02 09:27:49.819 UTC [committer.txvalidator] validateTx -> DEBU 27bb Validating transaction with plugins" +"2019-05-02 09:27:49.819 UTC [committer.txvalidator] Dispatch -> DEBU 27bc [businesschannel] Dispatch starts for bytes 0xc002cc8400" +"2019-05-02 09:27:49.819 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27bd constructing new query executor txid = [b343bb2c-5768-4bf7-9e20-81a431852db1]" +"2019-05-02 09:27:49.819 UTC [stateleveldb] GetState -> DEBU 27be GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-05-02 09:27:49.819 UTC [stateleveldb] GetState -> DEBU 27bf GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:49.820 UTC [stateleveldb] GetState -> DEBU 27c0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +"2019-05-02 09:27:49.821 UTC [stateleveldb] GetState -> DEBU 27c1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +"2019-05-02 09:27:49.821 UTC [stateleveldb] GetState -> DEBU 27c2 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +"2019-05-02 09:27:49.821 UTC [lockbasedtxmgr] Done -> DEBU 27c3 Done with transaction simulation / query execution [b343bb2c-5768-4bf7-9e20-81a431852db1]" +"2019-05-02 09:27:49.821 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 27c4 Validating Tx f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176, seq 0 out of 1 in block 8 for channel businesschannel with validation plugin vscc with plugin" +"2019-05-02 09:27:49.822 UTC [msp] DeserializeIdentity -> DEBU 27c5 Obtaining identity" +"2019-05-02 09:27:49.822 UTC [msp] DeserializeIdentity -> DEBU 27c6 Obtaining identity" +"2019-05-02 09:27:49.823 UTC [msp] DeserializeIdentity -> DEBU 27c7 Obtaining identity" +"2019-05-02 09:27:49.823 UTC [msp] DeserializeIdentity -> DEBU 27c9 Obtaining identity" +"2019-05-02 09:27:49.823 UTC [gossip.comm] Send -> DEBU 27ca Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:49.823 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27c8 constructing new query executor txid = [87dca2fc-7cfd-4504-853a-96c521fa4acf]" +"2019-05-02 09:27:49.823 UTC [lockbasedtxmgr] Done -> DEBU 27cc Done with transaction simulation / query execution [87dca2fc-7cfd-4504-853a-96c521fa4acf]" +"2019-05-02 09:27:49.823 UTC [msp] DeserializeIdentity -> DEBU 27cb Obtaining identity" +"2019-05-02 09:27:49.824 UTC [msp] DeserializeIdentity -> DEBU 27cd Obtaining identity" +"2019-05-02 09:27:49.824 UTC [cauthdsl] func1 -> DEBU 27ce 0xc003902bd0 gate 1556789269824356200 evaluation starts" +"2019-05-02 09:27:49.824 UTC [cauthdsl] func2 -> DEBU 27d0 0xc003902bd0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:49.824 UTC [gossip.comm] sendToEndpoint -> DEBU 27cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 8}, Envelope: 4092 bytes, Signature: 0 bytes" +"2019-05-02 09:27:49.824 UTC [cauthdsl] func2 -> DEBU 27d1 0xc003902bd0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:49.824 UTC [gossip.comm] sendToEndpoint -> DEBU 27d2 Exiting" +"2019-05-02 09:27:49.825 UTC [cauthdsl] func2 -> DEBU 27d3 0xc003902bd0 principal matched by identity 0" +"2019-05-02 09:27:49.842 UTC [msp.identity] Verify -> DEBU 27d4 Verify: digest = 00000000 7f 4d 0d b0 fb 16 17 0e a9 9b 1c 9e dc 7e 0e e0 |.M...........~..| +00000010 4f 80 fa d3 20 c7 54 c6 87 42 49 9a e9 80 27 a0 |O... .T..BI...'.|" +"2019-05-02 09:27:49.842 UTC [msp.identity] Verify -> DEBU 27d5 Verify: sig = 00000000 30 45 02 21 00 96 9b ea 15 49 12 69 e6 f6 1e 21 |0E.!.....I.i...!| +00000010 7d f9 18 c3 75 3c 7f 4d 26 d7 18 1b 1c f1 4e 77 |}...u<.M&.....Nw| +00000020 8d 34 c2 7d e6 02 20 1e cf 14 17 97 37 42 5e 2c |.4.}.. .....7B^,| +00000030 3b bc d1 b2 1a f0 61 d0 31 5a 61 8a 6a b1 6d dd |;.....a.1Za.j.m.| +00000040 e6 02 d8 ef 82 6c eb |.....l.|" +"2019-05-02 09:27:49.845 UTC [cauthdsl] func2 -> DEBU 27d6 0xc003902bd0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:49.845 UTC [cauthdsl] func2 -> DEBU 27d7 0xc003902bd0 signed by 1 principal evaluation starts (used [true])" +"2019-05-02 09:27:49.845 UTC [cauthdsl] func2 -> DEBU 27d8 0xc003902bd0 skipping identity 0 because it has already been used" +"2019-05-02 09:27:49.846 UTC [cauthdsl] func2 -> DEBU 27d9 0xc003902bd0 principal evaluation fails" +"2019-05-02 09:27:49.847 UTC [cauthdsl] func1 -> DEBU 27da 0xc003902bd0 gate 1556789269824356200 evaluation succeeds" +"2019-05-02 09:27:49.849 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 27db constructing new query executor txid = [e2780b94-5445-431b-a318-0bb82f332a66]" +"2019-05-02 09:27:49.850 UTC [lockbasedtxmgr] Done -> DEBU 27dc Done with transaction simulation / query execution [e2780b94-5445-431b-a318-0bb82f332a66]" +"2019-05-02 09:27:49.850 UTC [vscc] Validate -> DEBU 27dd block 8, namespace: exp02, tx 0 validation results is: " +"2019-05-02 09:27:49.852 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 27de Transaction f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176 appears to be valid" +"2019-05-02 09:27:49.853 UTC [committer.txvalidator] Dispatch -> DEBU 27df [businesschannel] Dispatch completes env bytes 0xc002cc8400" +"2019-05-02 09:27:49.855 UTC [committer.txvalidator] validateTx -> DEBU 27e0 [businesschannel] validateTx completes for block 0xc0045e0380 env 0xc00443aaf0 txn 0" +"2019-05-02 09:27:49.856 UTC [committer.txvalidator] Validate -> DEBU 27e1 got result for idx 0, code 0" +"2019-05-02 09:27:49.858 UTC [committer.txvalidator] Validate -> INFO 27e2 [businesschannel] Validated block [8] in 44ms" +"2019-05-02 09:27:49.858 UTC [gossip.privdata] listMissingPrivateData -> DEBU 27e3 Retrieving private write sets for 0 transactions from transient store" +"2019-05-02 09:27:49.859 UTC [gossip.privdata] StoreBlock -> DEBU 27e4 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-05-02 09:27:49.860 UTC [kvledger] CommitWithPvtData -> DEBU 27e5 [businesschannel] Validating state for block [8]" +"2019-05-02 09:27:49.860 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 27e6 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:27:49.860 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 27e7 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-05-02 09:27:49.860 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 27e8 Validating new block with num trans = [1]" +"2019-05-02 09:27:49.860 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27e9 ValidateAndPrepareBatch() for block number = [8]" +"2019-05-02 09:27:49.860 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27ea preprocessing ProtoBlock..." +"2019-05-02 09:27:49.861 UTC [valimpl] preprocessProtoBlock -> DEBU 27eb txType=ENDORSER_TRANSACTION" +"2019-05-02 09:27:49.861 UTC [stateleveldb] GetState -> DEBU 27ec GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:49.861 UTC [statebasedval] validateKVRead -> DEBU 27ed Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +"2019-05-02 09:27:49.862 UTC [stateleveldb] GetState -> DEBU 27ee GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:49.862 UTC [statebasedval] validateKVRead -> DEBU 27ef Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +"2019-05-02 09:27:49.862 UTC [stateleveldb] GetState -> DEBU 27f0 GetState(). ns=exp02, key=a" +"2019-05-02 09:27:49.862 UTC [statebasedval] validateKVRead -> DEBU 27f1 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" +"2019-05-02 09:27:49.863 UTC [stateleveldb] GetState -> DEBU 27f2 GetState(). ns=exp02, key=b" +"2019-05-02 09:27:49.863 UTC [statebasedval] validateKVRead -> DEBU 27f3 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" +"2019-05-02 09:27:49.863 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 27f4 Block [8] Transaction index [0] TxId [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-05-02 09:27:49.863 UTC [valinternal] ApplyWriteSet -> DEBU 27f5 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003913840), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003913880)}" +"2019-05-02 09:27:49.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27f6 validating rwset..." +"2019-05-02 09:27:49.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27f7 postprocessing ProtoBlock..." +"2019-05-02 09:27:49.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 27f8 ValidateAndPrepareBatch() complete" +"2019-05-02 09:27:49.864 UTC [kvledger] CommitWithPvtData -> DEBU 27f9 [businesschannel] Committing block [8] to storage" +"2019-05-02 09:27:49.865 UTC [ledgerstorage] CommitWithPvtData -> DEBU 27fa Writing block [8] to pvt block store" +"2019-05-02 09:27:49.867 UTC [pvtdatastorage] Prepare -> DEBU 27fb Saved 0 private data write sets for block [8]" +"2019-05-02 09:27:49.869 UTC [fsblkstorage] indexBlock -> DEBU 27fc Indexing block [blockNum=8, blockHash=[]byte{0x2, 0x24, 0xe7, 0x4a, 0x9c, 0xc4, 0xcd, 0x6e, 0x9e, 0x50, 0x85, 0x1e, 0xb1, 0x9f, 0xf0, 0x6f, 0xcf, 0x12, 0x7a, 0xf4, 0xce, 0xb7, 0xdf, 0x24, 0x6e, 0x20, 0x2e, 0xb6, 0x60, 0x3f, 0x17, 0xec} txOffsets= +txId=f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176 locPointer=offset=70, bytesLength=3044 ]" -"2019-05-02 01:31:19.751 UTC [fsblkstorage] indexBlock -> DEBU 2839 Adding txLoc [fileSuffixNum=0, offset=94692, bytesLength=3044] for tx ID: [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b] to txid-index" -"2019-05-02 01:31:19.752 UTC [fsblkstorage] indexBlock -> DEBU 283a Adding txLoc [fileSuffixNum=0, offset=94692, bytesLength=3044] for tx number:[0] ID: [ab1c8c2a7b6ed1211494deb317ed4015674dde5f98c8a5b35853c2db4901af4b] to blockNumTranNum index" -"2019-05-02 01:31:19.755 UTC [fsblkstorage] updateCheckpoint -> DEBU 283b Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98673], isChainEmpty=[false], lastBlockNumber=[8]" -"2019-05-02 01:31:19.756 UTC [pvtdatastorage] Commit -> DEBU 283c Committing private data for block [8]" -"2019-05-02 01:31:19.759 UTC [pvtdatastorage] Commit -> DEBU 283d Committed private data for block [8]" -"2019-05-02 01:31:19.760 UTC [kvledger] CommitWithPvtData -> DEBU 283e [businesschannel] Committing block [8] transactions to state database" -"2019-05-02 01:31:19.760 UTC [lockbasedtxmgr] Commit -> DEBU 283f lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-05-02 01:31:19.760 UTC [lockbasedtxmgr] Commit -> DEBU 2840 Committing updates to state database" -"2019-05-02 01:31:19.761 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2841 Building the expiry schedules based on the update batch" -"2019-05-02 01:31:19.761 UTC [lockbasedtxmgr] Commit -> DEBU 2842 Write lock acquired for committing updates to state database" -"2019-05-02 01:31:19.761 UTC [stateleveldb] ApplyUpdates -> DEBU 2843 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -"2019-05-02 01:31:19.762 UTC [stateleveldb] ApplyUpdates -> DEBU 2844 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -"2019-05-02 01:31:19.764 UTC [lockbasedtxmgr] Commit -> DEBU 2845 Updates committed to state database and the write lock is released" -"2019-05-02 01:31:19.764 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2846 Preparing potential purge list working-set for expiringAtBlk [9]" -"2019-05-02 01:31:19.764 UTC [leveldbhelper] GetIterator -> DEBU 2847 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}]" -"2019-05-02 01:31:19.764 UTC [lockbasedtxmgr] func1 -> DEBU 2848 launched the background routine for preparing keys to purge with the next block" -"2019-05-02 01:31:19.765 UTC [kvledger] CommitWithPvtData -> DEBU 2849 [businesschannel] Committing block [8] transactions to history database" -"2019-05-02 01:31:19.765 UTC [historyleveldb] Commit -> DEBU 284a Channel [businesschannel]: Updating history database for blockNo [8] with [1] transactions" -"2019-05-02 01:31:19.764 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 284b No expiry entry found for expiringAtBlk [9]" -"2019-05-02 01:31:19.767 UTC [historyleveldb] Commit -> DEBU 284c Channel [businesschannel]: Updates committed to history database for blockNo [8]" -"2019-05-02 01:31:19.768 UTC [kvledger] CommitWithPvtData -> INFO 284d [businesschannel] Committed block [8] with 1 transaction(s) in 31ms (state_validation=6ms block_commit=17ms state_commit=5ms)" -"2019-05-02 01:31:19.768 UTC [msp.identity] Sign -> DEBU 284e Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A020809 " -"2019-05-02 01:31:19.768 UTC [msp.identity] Sign -> DEBU 284f Sign: digest: 687B425FE70DFDEDD8B24639DE13E4DDEBD4234847A4678C0A12FFE8E29C7E2F " -"2019-05-02 01:31:19.769 UTC [gossip.state] commitBlock -> DEBU 2850 [businesschannel] Committed block [8] with 1 transaction(s)" -"2019-05-02 01:31:20.091 UTC [endorser] ProcessProposal -> DEBU 2851 Entering: request from 192.168.240.9:41360" -"2019-05-02 01:31:20.091 UTC [protoutils] ValidateProposalMessage -> DEBU 2852 ValidateProposalMessage starts for signed proposal 0xc002114640" -"2019-05-02 01:31:20.091 UTC [protoutils] validateChannelHeader -> DEBU 2853 validateChannelHeader info: header type 3" -"2019-05-02 01:31:20.091 UTC [protoutils] checkSignatureFromCreator -> DEBU 2854 begin" -"2019-05-02 01:31:20.092 UTC [msp] GetManagerForChain -> DEBU 2855 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:20.092 UTC [protoutils] checkSignatureFromCreator -> DEBU 2856 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:20.092 UTC [protoutils] checkSignatureFromCreator -> DEBU 2857 creator is valid" -"2019-05-02 01:31:20.093 UTC [msp.identity] Verify -> DEBU 2858 Verify: digest = 00000000 3f de 4b 46 1c 54 c3 ea ca ac 4b 08 08 f0 fe 03 |?.KF.T....K.....| -00000010 5d 7d aa 11 8f e4 0a d6 83 1f f1 da 1f 05 d0 fe |]}..............|" -"2019-05-02 01:31:20.093 UTC [msp.identity] Verify -> DEBU 2859 Verify: sig = 00000000 30 45 02 21 00 fa e6 e8 27 d9 39 7d 11 ad a9 ee |0E.!....'.9}....| -00000010 aa 28 78 fa 90 f5 35 cc cb 2a 34 af 90 30 8c 89 |.(x...5..*4..0..| -00000020 b4 73 28 e2 1a 02 20 7b ea c5 41 1c 35 8f 4a c3 |.s(... {..A.5.J.| -00000030 fb 21 32 97 8a 95 9c 7b 08 93 3d 8d 43 d2 60 b4 |.!2....{..=.C.`.| -00000040 35 7b 82 e7 65 8a 17 |5{..e..|" -"2019-05-02 01:31:20.094 UTC [protoutils] checkSignatureFromCreator -> DEBU 285a exits successfully" -"2019-05-02 01:31:20.094 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285b validateChaincodeProposalMessage starts for proposal 0xc002f7e770, header 0xc002114aa0" -"2019-05-02 01:31:20.094 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-05-02 01:31:20.094 UTC [endorser] preProcess -> DEBU 285d [businesschannel][c48ba1de] processing txid: c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd" -"2019-05-02 01:31:20.094 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 285e retrieveTransactionByID() - txId = [c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd]" -"2019-05-02 01:31:20.095 UTC [aclmgmt] CheckACL -> DEBU 285f acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-05-02 01:31:20.095 UTC [aclmgmt] CheckACL -> DEBU 2860 acl check(/Channel/Application/Writers)" -"2019-05-02 01:31:20.095 UTC [policies] Evaluate -> DEBU 2861 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-05-02 01:31:20.095 UTC [policies] Evaluate -> DEBU 2862 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.095 UTC [policies] Evaluate -> DEBU 2863 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-05-02 01:31:20.095 UTC [cauthdsl] func1 -> DEBU 2864 0xc0041ba9a0 gate 1556760680095723800 evaluation starts" -"2019-05-02 01:31:20.095 UTC [cauthdsl] func2 -> DEBU 2865 0xc0041ba9a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.095 UTC [cauthdsl] func2 -> DEBU 2866 0xc0041ba9a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.096 UTC [cauthdsl] func2 -> DEBU 2867 0xc0041ba9a0 principal matched by identity 0" -"2019-05-02 01:31:20.096 UTC [msp.identity] Verify -> DEBU 2868 Verify: digest = 00000000 3f de 4b 46 1c 54 c3 ea ca ac 4b 08 08 f0 fe 03 |?.KF.T....K.....| -00000010 5d 7d aa 11 8f e4 0a d6 83 1f f1 da 1f 05 d0 fe |]}..............|" -"2019-05-02 01:31:20.096 UTC [msp.identity] Verify -> DEBU 2869 Verify: sig = 00000000 30 45 02 21 00 fa e6 e8 27 d9 39 7d 11 ad a9 ee |0E.!....'.9}....| -00000010 aa 28 78 fa 90 f5 35 cc cb 2a 34 af 90 30 8c 89 |.(x...5..*4..0..| -00000020 b4 73 28 e2 1a 02 20 7b ea c5 41 1c 35 8f 4a c3 |.s(... {..A.5.J.| -00000030 fb 21 32 97 8a 95 9c 7b 08 93 3d 8d 43 d2 60 b4 |.!2....{..=.C.`.| -00000040 35 7b 82 e7 65 8a 17 |5{..e..|" -"2019-05-02 01:31:20.096 UTC [cauthdsl] func2 -> DEBU 286a 0xc0041ba9a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.096 UTC [cauthdsl] func1 -> DEBU 286b 0xc0041ba9a0 gate 1556760680095723800 evaluation succeeds" -"2019-05-02 01:31:20.096 UTC [policies] Evaluate -> DEBU 286c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:20.097 UTC [policies] Evaluate -> DEBU 286d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:20.097 UTC [policies] Evaluate -> DEBU 286e Signature set satisfies policy /Channel/Application/Writers" -"2019-05-02 01:31:20.097 UTC [policies] Evaluate -> DEBU 286f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-05-02 01:31:20.097 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2870 constructing new tx simulator" -"2019-05-02 01:31:20.097 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2871 constructing new tx simulator txid = [c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd]" -"2019-05-02 01:31:20.097 UTC [endorser] SimulateProposal -> DEBU 2872 [businesschannel][c48ba1de] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:20.097 UTC [stateleveldb] GetState -> DEBU 2873 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:20.097 UTC [endorser] callChaincode -> INFO 2874 [businesschannel][c48ba1de] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:20.098 UTC [stateleveldb] GetState -> DEBU 2875 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" -"2019-05-02 01:31:20.098 UTC [stateleveldb] GetState -> DEBU 2876 GetState(). ns=exp02, key=􏿿initialized" -"2019-05-02 01:31:20.098 UTC [chaincode] Execute -> DEBU 2877 Entry" -"2019-05-02 01:31:20.099 UTC [chaincode] handleMessage -> DEBU 2878 [c48ba1de] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-05-02 01:31:20.099 UTC [chaincode] HandleTransaction -> DEBU 2879 [c48ba1de] handling GET_STATE from chaincode" -"2019-05-02 01:31:20.099 UTC [chaincode] HandleGetState -> DEBU 287a [c48ba1de] getting state for chaincode exp02, key a, channel businesschannel" -"2019-05-02 01:31:20.099 UTC [stateleveldb] GetState -> DEBU 287b GetState(). ns=exp02, key=a" -"2019-05-02 01:31:20.100 UTC [chaincode] HandleTransaction -> DEBU 287c [c48ba1de] Completed GET_STATE. Sending RESPONSE" -"2019-05-02 01:31:20.100 UTC [chaincode] handleMessage -> DEBU 287d [c48ba1de] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:20.101 UTC [chaincode] Notify -> DEBU 287e [c48ba1de] notifying Txid:c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd, channelID:businesschannel" -"2019-05-02 01:31:20.101 UTC [chaincode] Execute -> DEBU 287f Exit" -"2019-05-02 01:31:20.101 UTC [endorser] callChaincode -> INFO 2880 [businesschannel][c48ba1de] Exit chaincode: name:"exp02" (3ms)" -"2019-05-02 01:31:20.101 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2881 Simulation completed, getting simulation results" -"2019-05-02 01:31:20.101 UTC [lockbasedtxmgr] Done -> DEBU 2882 Done with transaction simulation / query execution [c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd]" -"2019-05-02 01:31:20.101 UTC [endorser] SimulateProposal -> DEBU 2883 [businesschannel][c48ba1de] Exit" -"2019-05-02 01:31:20.102 UTC [endorser] endorseProposal -> DEBU 2884 [businesschannel][c48ba1de] Entry chaincode: name:"exp02" " -"2019-05-02 01:31:20.102 UTC [endorser] endorseProposal -> DEBU 2885 [businesschannel][c48ba1de] escc for chaincode name:"exp02" is escc" -"2019-05-02 01:31:20.102 UTC [endorser] EndorseWithPlugin -> DEBU 2886 Entering endorsement for {plugin: escc, channel: businesschannel, tx: c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd, chaincode: exp02}" -"2019-05-02 01:31:20.102 UTC [msp.identity] Sign -> DEBU 2887 Sign: plaintext: 0A203EC2F07EEAF484EF40A3DA6C3239...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:20.102 UTC [msp.identity] Sign -> DEBU 2888 Sign: digest: 5FD95C4D235AD9D2A2DF6D320DF1994E4F33C7A6BB1A5E22F99AC0E4D5A16A42 " -"2019-05-02 01:31:20.102 UTC [endorser] EndorseWithPlugin -> DEBU 2889 Exiting {plugin: escc, channel: businesschannel, tx: c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd, chaincode: exp02}" -"2019-05-02 01:31:20.102 UTC [endorser] endorseProposal -> DEBU 288a [businesschannel][c48ba1de] Exit" -"2019-05-02 01:31:20.103 UTC [lockbasedtxmgr] Done -> DEBU 288b Done with transaction simulation / query execution [c48ba1de43b4dc816f60ac2ad0e4859e8fd452bebd9b31bbfd0d8b1bccd71bcd]" -"2019-05-02 01:31:20.103 UTC [endorser] func1 -> DEBU 288c Exit: request from 192.168.240.9:41360" -"2019-05-02 01:31:20.103 UTC [comm.grpc.server] 1 -> INFO 288d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41360 grpc.code=OK grpc.call_duration=12.0875ms -"2019-05-02 01:31:20.108 UTC [grpc] infof -> DEBU 288e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:20.108 UTC [grpc] warningf -> DEBU 288f transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41360: read: connection reset by peer" -"2019-05-02 01:31:20.109 UTC [grpc] infof -> DEBU 2890 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:20.621 UTC [endorser] ProcessProposal -> DEBU 2891 Entering: request from 192.168.240.9:41364" -"2019-05-02 01:31:20.621 UTC [protoutils] ValidateProposalMessage -> DEBU 2892 ValidateProposalMessage starts for signed proposal 0xc00036a5a0" -"2019-05-02 01:31:20.621 UTC [protoutils] validateChannelHeader -> DEBU 2893 validateChannelHeader info: header type 3" -"2019-05-02 01:31:20.622 UTC [protoutils] checkSignatureFromCreator -> DEBU 2894 begin" -"2019-05-02 01:31:20.622 UTC [msp] GetManagerForChain -> DEBU 2895 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:20.623 UTC [protoutils] checkSignatureFromCreator -> DEBU 2896 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:20.623 UTC [protoutils] checkSignatureFromCreator -> DEBU 2897 creator is valid" -"2019-05-02 01:31:20.623 UTC [msp.identity] Verify -> DEBU 2898 Verify: digest = 00000000 e5 bd 9c c0 83 82 85 d1 68 f6 e2 c1 f5 10 11 b9 |........h.......| -00000010 57 18 c8 7e 4e c5 26 ab 5e 01 bb a3 4c 1e aa 5c |W..~N.&.^...L..\|" -"2019-05-02 01:31:20.623 UTC [msp.identity] Verify -> DEBU 2899 Verify: sig = 00000000 30 44 02 20 4c 29 b1 90 53 90 f5 2d 1f e5 34 3b |0D. L)..S..-..4;| -00000010 29 cf 84 3f 5b 59 b4 5a 80 79 a4 bd e2 d4 d9 e3 |)..?[Y.Z.y......| -00000020 4e 36 2c 70 02 20 0e 21 df 5f ab eb f7 83 ca 4b |N6,p. .!._.....K| -00000030 26 23 6d db d0 b1 e3 58 d3 72 52 c2 94 8e d7 39 |&#m....X.rR....9| -00000040 6c d1 9f ef 23 16 |l...#.|" -"2019-05-02 01:31:20.624 UTC [protoutils] checkSignatureFromCreator -> DEBU 289a exits successfully" -"2019-05-02 01:31:20.624 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 289b validateChaincodeProposalMessage starts for proposal 0xc00318ad20, header 0xc00036aa50" -"2019-05-02 01:31:20.624 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 289c validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -"2019-05-02 01:31:20.624 UTC [endorser] preProcess -> DEBU 289d [businesschannel][e64d8c1e] processing txid: e64d8c1e8d6d5e7c80060bbcf064e291d59a5beab8611fea916b1a5f5329656c" -"2019-05-02 01:31:20.625 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 289e retrieveTransactionByID() - txId = [e64d8c1e8d6d5e7c80060bbcf064e291d59a5beab8611fea916b1a5f5329656c]" -"2019-05-02 01:31:20.625 UTC [endorser] SimulateProposal -> DEBU 289f [businesschannel][e64d8c1e] Entry chaincode: name:"qscc" " -"2019-05-02 01:31:20.625 UTC [endorser] callChaincode -> INFO 28a0 [businesschannel][e64d8c1e] Entry chaincode: name:"qscc" " -"2019-05-02 01:31:20.625 UTC [chaincode] Execute -> DEBU 28a1 Entry" -"2019-05-02 01:31:20.626 UTC [qscc] Invoke -> DEBU 28a2 Invoke function: GetChainInfo on chain: businesschannel" -"2019-05-02 01:31:20.626 UTC [aclmgmt] CheckACL -> DEBU 28a3 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -"2019-05-02 01:31:20.626 UTC [aclmgmt] CheckACL -> DEBU 28a4 acl check(/Channel/Application/Readers)" -"2019-05-02 01:31:20.626 UTC [policies] Evaluate -> DEBU 28a5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.626 UTC [policies] Evaluate -> DEBU 28a6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.626 UTC [policies] Evaluate -> DEBU 28a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.626 UTC [cauthdsl] func1 -> DEBU 28a8 0xc004205e70 gate 1556760680626789000 evaluation starts" -"2019-05-02 01:31:20.626 UTC [cauthdsl] func2 -> DEBU 28a9 0xc004205e70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.626 UTC [cauthdsl] func2 -> DEBU 28aa 0xc004205e70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.627 UTC [cauthdsl] func2 -> DEBU 28ab 0xc004205e70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:20.627 UTC [cauthdsl] func2 -> DEBU 28ac 0xc004205e70 principal evaluation fails" -"2019-05-02 01:31:20.627 UTC [cauthdsl] func1 -> DEBU 28ad 0xc004205e70 gate 1556760680626789000 evaluation fails" -"2019-05-02 01:31:20.627 UTC [policies] Evaluate -> DEBU 28ae Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.627 UTC [policies] Evaluate -> DEBU 28af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.627 UTC [policies] Evaluate -> DEBU 28b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:20.627 UTC [cauthdsl] func1 -> DEBU 28b1 0xc0042066b0 gate 1556760680627556800 evaluation starts" -"2019-05-02 01:31:20.627 UTC [cauthdsl] func2 -> DEBU 28b2 0xc0042066b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.627 UTC [cauthdsl] func2 -> DEBU 28b3 0xc0042066b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.628 UTC [cauthdsl] func2 -> DEBU 28b4 0xc0042066b0 principal matched by identity 0" -"2019-05-02 01:31:20.628 UTC [msp.identity] Verify -> DEBU 28b5 Verify: digest = 00000000 e5 bd 9c c0 83 82 85 d1 68 f6 e2 c1 f5 10 11 b9 |........h.......| -00000010 57 18 c8 7e 4e c5 26 ab 5e 01 bb a3 4c 1e aa 5c |W..~N.&.^...L..\|" -"2019-05-02 01:31:20.628 UTC [msp.identity] Verify -> DEBU 28b6 Verify: sig = 00000000 30 44 02 20 4c 29 b1 90 53 90 f5 2d 1f e5 34 3b |0D. L)..S..-..4;| -00000010 29 cf 84 3f 5b 59 b4 5a 80 79 a4 bd e2 d4 d9 e3 |)..?[Y.Z.y......| -00000020 4e 36 2c 70 02 20 0e 21 df 5f ab eb f7 83 ca 4b |N6,p. .!._.....K| -00000030 26 23 6d db d0 b1 e3 58 d3 72 52 c2 94 8e d7 39 |&#m....X.rR....9| -00000040 6c d1 9f ef 23 16 |l...#.|" -"2019-05-02 01:31:20.628 UTC [cauthdsl] func2 -> DEBU 28b7 0xc0042066b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.628 UTC [cauthdsl] func1 -> DEBU 28b8 0xc0042066b0 gate 1556760680627556800 evaluation succeeds" -"2019-05-02 01:31:20.629 UTC [policies] Evaluate -> DEBU 28b9 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:20.629 UTC [policies] Evaluate -> DEBU 28ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:20.629 UTC [policies] Evaluate -> DEBU 28bb Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.629 UTC [policies] Evaluate -> DEBU 28bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.629 UTC [chaincode] handleMessage -> DEBU 28bd [e64d8c1e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:20.629 UTC [chaincode] Notify -> DEBU 28be [e64d8c1e] notifying Txid:e64d8c1e8d6d5e7c80060bbcf064e291d59a5beab8611fea916b1a5f5329656c, channelID:businesschannel" -"2019-05-02 01:31:20.630 UTC [chaincode] Execute -> DEBU 28bf Exit" -"2019-05-02 01:31:20.630 UTC [endorser] callChaincode -> INFO 28c0 [businesschannel][e64d8c1e] Exit chaincode: name:"qscc" (4ms)" -"2019-05-02 01:31:20.630 UTC [endorser] SimulateProposal -> DEBU 28c1 [businesschannel][e64d8c1e] Exit" -"2019-05-02 01:31:20.630 UTC [endorser] endorseProposal -> DEBU 28c2 [businesschannel][e64d8c1e] Entry chaincode: name:"qscc" " -"2019-05-02 01:31:20.630 UTC [endorser] endorseProposal -> DEBU 28c3 [businesschannel][e64d8c1e] escc for chaincode name:"qscc" is escc" -"2019-05-02 01:31:20.630 UTC [endorser] EndorseWithPlugin -> DEBU 28c4 Entering endorsement for {plugin: escc, channel: businesschannel, tx: e64d8c1e8d6d5e7c80060bbcf064e291d59a5beab8611fea916b1a5f5329656c, chaincode: qscc}" -"2019-05-02 01:31:20.630 UTC [msp.identity] Sign -> DEBU 28c5 Sign: plaintext: 0A20371D8E8B24EEFE0EBA1EF0E13343...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:20.630 UTC [msp.identity] Sign -> DEBU 28c6 Sign: digest: 5F22031D3B02DB64590503AE77B3ACA4C9715C83A0E5DE0FB46B2C3D31309055 " -"2019-05-02 01:31:20.631 UTC [endorser] EndorseWithPlugin -> DEBU 28c7 Exiting {plugin: escc, channel: businesschannel, tx: e64d8c1e8d6d5e7c80060bbcf064e291d59a5beab8611fea916b1a5f5329656c, chaincode: qscc}" -"2019-05-02 01:31:20.631 UTC [endorser] endorseProposal -> DEBU 28c8 [businesschannel][e64d8c1e] Exit" -"2019-05-02 01:31:20.631 UTC [endorser] func1 -> DEBU 28c9 Exit: request from 192.168.240.9:41364" -"2019-05-02 01:31:20.631 UTC [comm.grpc.server] 1 -> INFO 28ca unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41364 grpc.code=OK grpc.call_duration=9.9846ms -"2019-05-02 01:31:20.635 UTC [grpc] warningf -> DEBU 28cb transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41364: read: connection reset by peer" -"2019-05-02 01:31:20.636 UTC [grpc] infof -> DEBU 28cc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:20.636 UTC [grpc] infof -> DEBU 28cd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:20.826 UTC [msp] DeserializeIdentity -> DEBU 28ce Obtaining identity" -"2019-05-02 01:31:20.827 UTC [msp] DeserializeIdentity -> DEBU 28cf Obtaining identity" -"2019-05-02 01:31:20.827 UTC [gossip.comm] Send -> DEBU 28d0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:20.827 UTC [gossip.comm] sendToEndpoint -> DEBU 28d1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.827 UTC [gossip.comm] sendToEndpoint -> DEBU 28d2 Exiting" -"2019-05-02 01:31:20.828 UTC [gossip.comm] sendToEndpoint -> DEBU 28d3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.828 UTC [gossip.comm] sendToEndpoint -> DEBU 28d4 Exiting" -"2019-05-02 01:31:20.828 UTC [gossip.comm] sendToEndpoint -> DEBU 28d5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.828 UTC [gossip.comm] sendToEndpoint -> DEBU 28d6 Exiting" -"2019-05-02 01:31:20.830 UTC [gossip.comm] func1 -> DEBU 28d7 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.830 UTC [gossip.gossip] handleMessage -> DEBU 28d8 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.830 UTC [msp] DeserializeIdentity -> DEBU 28d9 Obtaining identity" -"2019-05-02 01:31:20.831 UTC [msp.identity] Verify -> DEBU 28da Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -"2019-05-02 01:31:20.831 UTC [msp.identity] Verify -> DEBU 28db Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -"2019-05-02 01:31:20.831 UTC [msp] DeserializeIdentity -> DEBU 28dc Obtaining identity" -"2019-05-02 01:31:20.831 UTC [msp] DeserializeIdentity -> DEBU 28dd Obtaining identity" -"2019-05-02 01:31:20.831 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:20.831 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28df Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.831 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28e0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.831 UTC [policies] Evaluate -> DEBU 28e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.831 UTC [policies] Evaluate -> DEBU 28e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.832 UTC [policies] Evaluate -> DEBU 28e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.832 UTC [cauthdsl] func1 -> DEBU 28e4 0xc0042c8390 gate 1556760680832041400 evaluation starts" -"2019-05-02 01:31:20.832 UTC [cauthdsl] func2 -> DEBU 28e5 0xc0042c8390 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.832 UTC [cauthdsl] func2 -> DEBU 28e6 0xc0042c8390 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.832 UTC [cauthdsl] func2 -> DEBU 28e7 0xc0042c8390 principal matched by identity 0" -"2019-05-02 01:31:20.832 UTC [msp.identity] Verify -> DEBU 28e8 Verify: digest = 00000000 97 fb 2f 6b ab 25 80 a3 0a b1 2e d6 57 48 39 12 |../k.%......WH9.| -00000010 bf 3c ea 49 b9 6e 47 4b 75 67 cc 48 80 fe fd cd |.<.I.nGKug.H....|" -"2019-05-02 01:31:20.832 UTC [msp.identity] Verify -> DEBU 28e9 Verify: sig = 00000000 30 45 02 21 00 ae 33 be 2a ec cf 49 46 2d 69 50 |0E.!..3.*..IF-iP| -00000010 70 28 63 a9 89 2f 47 e3 0e 0a 5d 61 26 75 90 cc |p(c../G...]a&u..| -00000020 4a 6a a3 cb b0 02 20 59 c5 4d 33 f8 f6 cf c2 df |Jj.... Y.M3.....| -00000030 28 b4 c3 89 9a 3b 12 d0 7c be 2d a8 c8 5e 8a 87 |(....;..|.-..^..| -00000040 bd 9f 07 5f 99 39 b6 |..._.9.|" -"2019-05-02 01:31:20.832 UTC [cauthdsl] func2 -> DEBU 28ea 0xc0042c8390 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.833 UTC [cauthdsl] func1 -> DEBU 28eb 0xc0042c8390 gate 1556760680832041400 evaluation succeeds" -"2019-05-02 01:31:20.833 UTC [policies] Evaluate -> DEBU 28ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.833 UTC [policies] Evaluate -> DEBU 28ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.833 UTC [policies] Evaluate -> DEBU 28ee Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.833 UTC [policies] Evaluate -> DEBU 28ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.833 UTC [msp.identity] Verify -> DEBU 28f0 Verify: digest = 00000000 c1 4f ed f2 e8 55 61 0f b9 23 a6 3b f8 84 8e 89 |.O...Ua..#.;....| -00000010 27 38 34 a9 f7 91 da 93 d4 a0 cf cd 79 93 55 65 |'84.........y.Ue|" -"2019-05-02 01:31:20.833 UTC [msp.identity] Verify -> DEBU 28f1 Verify: sig = 00000000 30 44 02 20 5b 06 57 7d 08 9b 49 f9 c0 9a be e0 |0D. [.W}..I.....| -00000010 f4 ef b9 77 01 8c ef cc 4e 0c 7f 36 c2 1b a9 a9 |...w....N..6....| -00000020 a7 17 06 95 02 20 31 6a d3 d7 7f 09 3c 15 55 a7 |..... 1j....<.U.| -00000030 f2 46 76 59 63 05 7e 8b 54 a5 56 00 78 c8 89 ab |.FvYc.~.T.V.x...| -00000040 75 39 ef fd b7 0f |u9....|" -"2019-05-02 01:31:20.833 UTC [msp] DeserializeIdentity -> DEBU 28f2 Obtaining identity" -"2019-05-02 01:31:20.834 UTC [msp] DeserializeIdentity -> DEBU 28f3 Obtaining identity" -"2019-05-02 01:31:20.834 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:20.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.834 UTC [policies] Evaluate -> DEBU 28f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.835 UTC [policies] Evaluate -> DEBU 28f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.835 UTC [policies] Evaluate -> DEBU 28f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.835 UTC [cauthdsl] func1 -> DEBU 28fa 0xc0042d4290 gate 1556760680835215500 evaluation starts" -"2019-05-02 01:31:20.835 UTC [cauthdsl] func2 -> DEBU 28fb 0xc0042d4290 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.835 UTC [gossip.comm] func1 -> DEBU 28fc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.835 UTC [cauthdsl] func2 -> DEBU 28fd 0xc0042d4290 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.835 UTC [cauthdsl] func2 -> DEBU 28fe 0xc0042d4290 principal matched by identity 0" -"2019-05-02 01:31:20.836 UTC [msp.identity] Verify -> DEBU 28ff Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:20.836 UTC [msp.identity] Verify -> DEBU 2900 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:20.836 UTC [cauthdsl] func2 -> DEBU 2901 0xc0042d4290 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.837 UTC [msp] DeserializeIdentity -> DEBU 2902 Obtaining identity" -"2019-05-02 01:31:20.837 UTC [msp] DeserializeIdentity -> DEBU 2903 Obtaining identity" -"2019-05-02 01:31:20.838 UTC [gossip.comm] Send -> DEBU 2904 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760679768439500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" -"2019-05-02 01:31:20.838 UTC [msp] DeserializeIdentity -> DEBU 2905 Obtaining identity" -"2019-05-02 01:31:20.838 UTC [msp] DeserializeIdentity -> DEBU 2906 Obtaining identity" -"2019-05-02 01:31:20.838 UTC [gossip.comm] sendToEndpoint -> DEBU 2907 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760679768439500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:20.838 UTC [gossip.comm] sendToEndpoint -> DEBU 2908 Exiting" -"2019-05-02 01:31:20.839 UTC [gossip.comm] sendToEndpoint -> DEBU 2909 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760679768439500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:20.839 UTC [gossip.comm] sendToEndpoint -> DEBU 290a Exiting" -"2019-05-02 01:31:20.839 UTC [gossip.comm] sendToEndpoint -> DEBU 290b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760679768439500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:20.839 UTC [gossip.comm] sendToEndpoint -> DEBU 290c Exiting" -"2019-05-02 01:31:20.836 UTC [cauthdsl] func1 -> DEBU 290d 0xc0042d4290 gate 1556760680835215500 evaluation succeeds" -"2019-05-02 01:31:20.856 UTC [policies] Evaluate -> DEBU 290e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.856 UTC [policies] Evaluate -> DEBU 290f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.856 UTC [policies] Evaluate -> DEBU 2910 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.856 UTC [policies] Evaluate -> DEBU 2911 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.856 UTC [msp] DeserializeIdentity -> DEBU 2912 Obtaining identity" -"2019-05-02 01:31:20.856 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2913 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.857 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2914 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.857 UTC [policies] Evaluate -> DEBU 2915 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.857 UTC [policies] Evaluate -> DEBU 2916 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.857 UTC [policies] Evaluate -> DEBU 2917 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.857 UTC [cauthdsl] func1 -> DEBU 2918 0xc0042d5370 gate 1556760680857683700 evaluation starts" -"2019-05-02 01:31:20.857 UTC [cauthdsl] func2 -> DEBU 2919 0xc0042d5370 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.857 UTC [cauthdsl] func2 -> DEBU 291a 0xc0042d5370 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.857 UTC [cauthdsl] func2 -> DEBU 291b 0xc0042d5370 principal matched by identity 0" -"2019-05-02 01:31:20.858 UTC [msp.identity] Verify -> DEBU 291c Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:20.858 UTC [msp.identity] Verify -> DEBU 291d Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:20.859 UTC [cauthdsl] func2 -> DEBU 291e 0xc0042d5370 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.859 UTC [cauthdsl] func1 -> DEBU 291f 0xc0042d5370 gate 1556760680857683700 evaluation succeeds" -"2019-05-02 01:31:20.859 UTC [policies] Evaluate -> DEBU 2920 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.859 UTC [policies] Evaluate -> DEBU 2921 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.859 UTC [policies] Evaluate -> DEBU 2922 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.859 UTC [policies] Evaluate -> DEBU 2923 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.860 UTC [gossip.gossip] handleMessage -> DEBU 2924 Exiting" -"2019-05-02 01:31:20.860 UTC [gossip.gossip] handleMessage -> DEBU 2925 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.860 UTC [msp] DeserializeIdentity -> DEBU 2926 Obtaining identity" -"2019-05-02 01:31:20.861 UTC [msp.identity] Verify -> DEBU 2927 Verify: digest = 00000000 c1 6e e7 4c 17 7a 8e 43 cd c5 b5 04 17 7c a1 13 |.n.L.z.C.....|..| -00000010 f6 a1 f6 78 71 70 6b 13 76 47 8e 11 a1 bf 42 0d |...xqpk.vG....B.|" -"2019-05-02 01:31:20.862 UTC [msp.identity] Verify -> DEBU 2928 Verify: sig = 00000000 30 45 02 21 00 bb 97 68 0d ac 3b 8a c0 d8 02 77 |0E.!...h..;....w| -00000010 b2 77 fe c9 4c a9 45 07 00 08 f2 6e dc c8 86 d4 |.w..L.E....n....| -00000020 3b 93 52 c1 cf 02 20 6f e6 fd 4a ea e1 45 2e 1c |;.R... o..J..E..| -00000030 91 97 69 f9 61 73 25 7e 81 ab 3c 9f 1b 5a ee 8f |..i.as%~..<..Z..| -00000040 93 f7 f0 2c 35 f9 3e |...,5.>|" -"2019-05-02 01:31:20.863 UTC [msp] DeserializeIdentity -> DEBU 2929 Obtaining identity" -"2019-05-02 01:31:20.863 UTC [msp] DeserializeIdentity -> DEBU 292a Obtaining identity" -"2019-05-02 01:31:20.865 UTC [endorser] ProcessProposal -> DEBU 292b Entering: request from 192.168.240.9:41368" -"2019-05-02 01:31:20.865 UTC [protoutils] ValidateProposalMessage -> DEBU 292c ValidateProposalMessage starts for signed proposal 0xc00036bef0" -"2019-05-02 01:31:20.865 UTC [protoutils] validateChannelHeader -> DEBU 292d validateChannelHeader info: header type 3" -"2019-05-02 01:31:20.865 UTC [protoutils] checkSignatureFromCreator -> DEBU 292e begin" -"2019-05-02 01:31:20.866 UTC [msp] GetManagerForChain -> DEBU 292f Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:20.866 UTC [protoutils] checkSignatureFromCreator -> DEBU 2930 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:20.866 UTC [protoutils] checkSignatureFromCreator -> DEBU 2931 creator is valid" -"2019-05-02 01:31:20.866 UTC [msp.identity] Verify -> DEBU 2932 Verify: digest = 00000000 2d ce 34 ae 82 77 9a f3 86 2a e0 43 3e 1c 65 f6 |-.4..w...*.C>.e.| -00000010 6a 84 7d b6 c4 13 b6 c3 b1 09 29 a2 ec f5 da 06 |j.}.......).....|" -"2019-05-02 01:31:20.867 UTC [msp.identity] Verify -> DEBU 2933 Verify: sig = 00000000 30 45 02 21 00 c1 be ba ce 87 ce d1 1d a0 11 af |0E.!............| -00000010 c2 7f 4b d7 45 a4 5a 13 c2 22 5a 3b 96 63 17 8b |..K.E.Z.."Z;.c..| -00000020 56 cf a8 66 e6 02 20 40 0f 07 58 46 be e3 73 e0 |V..f.. @..XF..s.| -00000030 2d 0c ac f9 d1 14 69 60 e9 56 a3 d9 ce e6 87 25 |-.....i`.V.....%| -00000040 f7 ea 7b 56 30 61 c8 |..{V0a.|" -"2019-05-02 01:31:20.867 UTC [protoutils] checkSignatureFromCreator -> DEBU 2934 exits successfully" -"2019-05-02 01:31:20.867 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2935 validateChaincodeProposalMessage starts for proposal 0xc00318afc0, header 0xc00014a780" -"2019-05-02 01:31:20.867 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2936 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -"2019-05-02 01:31:20.867 UTC [endorser] preProcess -> DEBU 2937 [businesschannel][babc1182] processing txid: babc1182ed73e524e4080e0f54553684fc823a0e1872f6a9d3c9f844c5ad2566" -"2019-05-02 01:31:20.868 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2938 retrieveTransactionByID() - txId = [babc1182ed73e524e4080e0f54553684fc823a0e1872f6a9d3c9f844c5ad2566]" -"2019-05-02 01:31:20.868 UTC [endorser] SimulateProposal -> DEBU 2939 [businesschannel][babc1182] Entry chaincode: name:"qscc" " -"2019-05-02 01:31:20.868 UTC [endorser] callChaincode -> INFO 293a [businesschannel][babc1182] Entry chaincode: name:"qscc" " -"2019-05-02 01:31:20.868 UTC [chaincode] Execute -> DEBU 293b Entry" -"2019-05-02 01:31:20.868 UTC [qscc] Invoke -> DEBU 293c Invoke function: GetBlockByNumber on chain: businesschannel" -"2019-05-02 01:31:20.868 UTC [aclmgmt] CheckACL -> DEBU 293d acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" -"2019-05-02 01:31:20.868 UTC [aclmgmt] CheckACL -> DEBU 293e acl check(/Channel/Application/Readers)" -"2019-05-02 01:31:20.869 UTC [policies] Evaluate -> DEBU 293f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.869 UTC [policies] Evaluate -> DEBU 2940 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.869 UTC [policies] Evaluate -> DEBU 2941 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.869 UTC [cauthdsl] func1 -> DEBU 2942 0xc004340f10 gate 1556760680869245500 evaluation starts" -"2019-05-02 01:31:20.869 UTC [cauthdsl] func2 -> DEBU 2943 0xc004340f10 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.869 UTC [cauthdsl] func2 -> DEBU 2944 0xc004340f10 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.869 UTC [cauthdsl] func2 -> DEBU 2945 0xc004340f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:20.869 UTC [cauthdsl] func2 -> DEBU 2946 0xc004340f10 principal evaluation fails" -"2019-05-02 01:31:20.869 UTC [cauthdsl] func1 -> DEBU 2947 0xc004340f10 gate 1556760680869245500 evaluation fails" -"2019-05-02 01:31:20.869 UTC [policies] Evaluate -> DEBU 2948 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.870 UTC [policies] Evaluate -> DEBU 2949 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.870 UTC [policies] Evaluate -> DEBU 294a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:20.870 UTC [cauthdsl] func1 -> DEBU 294b 0xc004341850 gate 1556760680870100000 evaluation starts" -"2019-05-02 01:31:20.870 UTC [cauthdsl] func2 -> DEBU 294c 0xc004341850 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.870 UTC [cauthdsl] func2 -> DEBU 294d 0xc004341850 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.870 UTC [cauthdsl] func2 -> DEBU 294e 0xc004341850 principal matched by identity 0" -"2019-05-02 01:31:20.870 UTC [msp.identity] Verify -> DEBU 294f Verify: digest = 00000000 2d ce 34 ae 82 77 9a f3 86 2a e0 43 3e 1c 65 f6 |-.4..w...*.C>.e.| -00000010 6a 84 7d b6 c4 13 b6 c3 b1 09 29 a2 ec f5 da 06 |j.}.......).....|" -"2019-05-02 01:31:20.870 UTC [msp.identity] Verify -> DEBU 2950 Verify: sig = 00000000 30 45 02 21 00 c1 be ba ce 87 ce d1 1d a0 11 af |0E.!............| -00000010 c2 7f 4b d7 45 a4 5a 13 c2 22 5a 3b 96 63 17 8b |..K.E.Z.."Z;.c..| -00000020 56 cf a8 66 e6 02 20 40 0f 07 58 46 be e3 73 e0 |V..f.. @..XF..s.| -00000030 2d 0c ac f9 d1 14 69 60 e9 56 a3 d9 ce e6 87 25 |-.....i`.V.....%| -00000040 f7 ea 7b 56 30 61 c8 |..{V0a.|" -"2019-05-02 01:31:20.871 UTC [cauthdsl] func2 -> DEBU 2951 0xc004341850 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.871 UTC [cauthdsl] func1 -> DEBU 2952 0xc004341850 gate 1556760680870100000 evaluation succeeds" -"2019-05-02 01:31:20.871 UTC [policies] Evaluate -> DEBU 2953 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:20.871 UTC [policies] Evaluate -> DEBU 2954 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:20.871 UTC [policies] Evaluate -> DEBU 2955 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.871 UTC [policies] Evaluate -> DEBU 2956 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.871 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 2957 retrieveBlockByNumber() - blockNum = [2]" -"2019-05-02 01:31:20.871 UTC [fsblkstorage] newBlockfileStream -> DEBU 2958 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47628]" -"2019-05-02 01:31:20.871 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2959 Remaining bytes=[51045], Going to peek [8] bytes" -"2019-05-02 01:31:20.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 295a Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47628], bytesOffset=[47631]}" -"2019-05-02 01:31:20.872 UTC [chaincode] handleMessage -> DEBU 295b [babc1182] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:20.873 UTC [chaincode] Notify -> DEBU 295c [babc1182] notifying Txid:babc1182ed73e524e4080e0f54553684fc823a0e1872f6a9d3c9f844c5ad2566, channelID:businesschannel" -"2019-05-02 01:31:20.873 UTC [chaincode] Execute -> DEBU 295d Exit" -"2019-05-02 01:31:20.873 UTC [endorser] callChaincode -> INFO 295e [businesschannel][babc1182] Exit chaincode: name:"qscc" (5ms)" -"2019-05-02 01:31:20.873 UTC [endorser] SimulateProposal -> DEBU 295f [businesschannel][babc1182] Exit" -"2019-05-02 01:31:20.873 UTC [endorser] endorseProposal -> DEBU 2960 [businesschannel][babc1182] Entry chaincode: name:"qscc" " -"2019-05-02 01:31:20.873 UTC [endorser] endorseProposal -> DEBU 2961 [businesschannel][babc1182] escc for chaincode name:"qscc" is escc" -"2019-05-02 01:31:20.873 UTC [endorser] EndorseWithPlugin -> DEBU 2962 Entering endorsement for {plugin: escc, channel: businesschannel, tx: babc1182ed73e524e4080e0f54553684fc823a0e1872f6a9d3c9f844c5ad2566, chaincode: qscc}" -"2019-05-02 01:31:20.873 UTC [msp.identity] Sign -> DEBU 2963 Sign: plaintext: 0A2078A8CF7F2F68F899EA112B291052...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:20.874 UTC [msp.identity] Sign -> DEBU 2964 Sign: digest: 1F1DA36AE97AD61F24D4C9634C7625AE37DE1BDB56EB4926A441ECE656054EB0 " -"2019-05-02 01:31:20.874 UTC [endorser] EndorseWithPlugin -> DEBU 2965 Exiting {plugin: escc, channel: businesschannel, tx: babc1182ed73e524e4080e0f54553684fc823a0e1872f6a9d3c9f844c5ad2566, chaincode: qscc}" -"2019-05-02 01:31:20.874 UTC [endorser] endorseProposal -> DEBU 2966 [businesschannel][babc1182] Exit" -"2019-05-02 01:31:20.874 UTC [endorser] func1 -> DEBU 2967 Exit: request from 192.168.240.9:41368" -"2019-05-02 01:31:20.874 UTC [comm.grpc.server] 1 -> INFO 2968 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41368 grpc.code=OK grpc.call_duration=8.892ms -"2019-05-02 01:31:20.881 UTC [grpc] warningf -> DEBU 2969 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41368: read: connection reset by peer" -"2019-05-02 01:31:20.881 UTC [grpc] infof -> DEBU 296a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:20.881 UTC [grpc] infof -> DEBU 296b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:20.882 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 296c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:20.882 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 296d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.882 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 296e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.882 UTC [policies] Evaluate -> DEBU 296f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.882 UTC [policies] Evaluate -> DEBU 2970 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.882 UTC [policies] Evaluate -> DEBU 2971 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.882 UTC [cauthdsl] func1 -> DEBU 2972 0xc0042ef730 gate 1556760680882369000 evaluation starts" -"2019-05-02 01:31:20.882 UTC [cauthdsl] func2 -> DEBU 2973 0xc0042ef730 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.882 UTC [cauthdsl] func2 -> DEBU 2974 0xc0042ef730 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.882 UTC [cauthdsl] func2 -> DEBU 2975 0xc0042ef730 principal matched by identity 0" -"2019-05-02 01:31:20.883 UTC [msp.identity] Verify -> DEBU 2976 Verify: digest = 00000000 bf 19 17 87 78 42 db f7 eb cf d0 d9 08 ee e7 15 |....xB..........| -00000010 4b cc a4 95 06 41 81 d5 eb 5f 3a 7d a9 7c 14 8c |K....A..._:}.|..|" -"2019-05-02 01:31:20.883 UTC [msp.identity] Verify -> DEBU 2977 Verify: sig = 00000000 30 44 02 20 25 d8 a0 a8 55 64 cf d4 22 95 b0 2b |0D. %...Ud.."..+| -00000010 9d 19 2a 2d f1 ee ab c7 40 00 b0 25 7c 8c 4e e5 |..*-....@..%|.N.| -00000020 f2 77 cf 80 02 20 10 b1 5c d3 47 5b e8 91 ee aa |.w... ..\.G[....| -00000030 61 ae d2 82 b6 50 a4 6d 3d e3 76 f7 db 98 6e 95 |a....P.m=.v...n.| -00000040 5d c2 20 53 e7 b2 |]. S..|" -"2019-05-02 01:31:20.883 UTC [cauthdsl] func2 -> DEBU 2978 0xc0042ef730 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.883 UTC [cauthdsl] func1 -> DEBU 2979 0xc0042ef730 gate 1556760680882369000 evaluation succeeds" -"2019-05-02 01:31:20.883 UTC [policies] Evaluate -> DEBU 297a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.883 UTC [policies] Evaluate -> DEBU 297b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.883 UTC [policies] Evaluate -> DEBU 297c Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.883 UTC [policies] Evaluate -> DEBU 297d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.884 UTC [msp.identity] Verify -> DEBU 297e Verify: digest = 00000000 c1 4f ed f2 e8 55 61 0f b9 23 a6 3b f8 84 8e 89 |.O...Ua..#.;....| -00000010 27 38 34 a9 f7 91 da 93 d4 a0 cf cd 79 93 55 65 |'84.........y.Ue|" -"2019-05-02 01:31:20.884 UTC [msp.identity] Verify -> DEBU 297f Verify: sig = 00000000 30 44 02 20 5b 06 57 7d 08 9b 49 f9 c0 9a be e0 |0D. [.W}..I.....| -00000010 f4 ef b9 77 01 8c ef cc 4e 0c 7f 36 c2 1b a9 a9 |...w....N..6....| -00000020 a7 17 06 95 02 20 31 6a d3 d7 7f 09 3c 15 55 a7 |..... 1j....<.U.| -00000030 f2 46 76 59 63 05 7e 8b 54 a5 56 00 78 c8 89 ab |.FvYc.~.T.V.x...| -00000040 75 39 ef fd b7 0f |u9....|" -"2019-05-02 01:31:20.884 UTC [msp] DeserializeIdentity -> DEBU 2980 Obtaining identity" -"2019-05-02 01:31:20.884 UTC [msp] DeserializeIdentity -> DEBU 2981 Obtaining identity" -"2019-05-02 01:31:20.884 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2982 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:20.884 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2983 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.884 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2984 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.884 UTC [policies] Evaluate -> DEBU 2985 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.885 UTC [policies] Evaluate -> DEBU 2986 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.885 UTC [policies] Evaluate -> DEBU 2987 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.885 UTC [cauthdsl] func1 -> DEBU 2988 0xc0043f9630 gate 1556760680885279200 evaluation starts" -"2019-05-02 01:31:20.885 UTC [cauthdsl] func2 -> DEBU 2989 0xc0043f9630 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.885 UTC [cauthdsl] func2 -> DEBU 298a 0xc0043f9630 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.885 UTC [cauthdsl] func2 -> DEBU 298b 0xc0043f9630 principal matched by identity 0" -"2019-05-02 01:31:20.885 UTC [msp.identity] Verify -> DEBU 298c Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:20.885 UTC [msp.identity] Verify -> DEBU 298d Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:20.886 UTC [cauthdsl] func2 -> DEBU 298e 0xc0043f9630 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.886 UTC [cauthdsl] func1 -> DEBU 298f 0xc0043f9630 gate 1556760680885279200 evaluation succeeds" -"2019-05-02 01:31:20.886 UTC [policies] Evaluate -> DEBU 2990 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.886 UTC [policies] Evaluate -> DEBU 2991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.887 UTC [policies] Evaluate -> DEBU 2992 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.887 UTC [policies] Evaluate -> DEBU 2993 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.887 UTC [msp] DeserializeIdentity -> DEBU 2994 Obtaining identity" -"2019-05-02 01:31:20.887 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2995 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.887 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2996 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.887 UTC [policies] Evaluate -> DEBU 2997 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.887 UTC [policies] Evaluate -> DEBU 2998 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.887 UTC [policies] Evaluate -> DEBU 2999 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.888 UTC [cauthdsl] func1 -> DEBU 299a 0xc004422710 gate 1556760680888087700 evaluation starts" -"2019-05-02 01:31:20.888 UTC [cauthdsl] func2 -> DEBU 299b 0xc004422710 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.888 UTC [cauthdsl] func2 -> DEBU 299c 0xc004422710 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.888 UTC [cauthdsl] func2 -> DEBU 299d 0xc004422710 principal matched by identity 0" -"2019-05-02 01:31:20.888 UTC [msp.identity] Verify -> DEBU 299e Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:20.889 UTC [msp.identity] Verify -> DEBU 299f Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:20.889 UTC [cauthdsl] func2 -> DEBU 29a0 0xc004422710 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.889 UTC [cauthdsl] func1 -> DEBU 29a1 0xc004422710 gate 1556760680888087700 evaluation succeeds" -"2019-05-02 01:31:20.889 UTC [policies] Evaluate -> DEBU 29a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.889 UTC [policies] Evaluate -> DEBU 29a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.889 UTC [policies] Evaluate -> DEBU 29a4 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.889 UTC [policies] Evaluate -> DEBU 29a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.889 UTC [gossip.gossip] handleMessage -> DEBU 29a6 Exiting" -"2019-05-02 01:31:20.890 UTC [gossip.gossip] handleMessage -> DEBU 29a7 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.890 UTC [msp] DeserializeIdentity -> DEBU 29a8 Obtaining identity" -"2019-05-02 01:31:20.890 UTC [msp] DeserializeIdentity -> DEBU 29a9 Obtaining identity" -"2019-05-02 01:31:20.890 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:20.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29ab Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29ac Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.890 UTC [policies] Evaluate -> DEBU 29ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.890 UTC [policies] Evaluate -> DEBU 29ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.890 UTC [policies] Evaluate -> DEBU 29af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.890 UTC [cauthdsl] func1 -> DEBU 29b0 0xc00448a130 gate 1556760680890940700 evaluation starts" -"2019-05-02 01:31:20.890 UTC [cauthdsl] func2 -> DEBU 29b1 0xc00448a130 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.891 UTC [cauthdsl] func2 -> DEBU 29b2 0xc00448a130 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.891 UTC [cauthdsl] func2 -> DEBU 29b3 0xc00448a130 principal matched by identity 0" -"2019-05-02 01:31:20.891 UTC [msp.identity] Verify -> DEBU 29b4 Verify: digest = 00000000 bf 19 17 87 78 42 db f7 eb cf d0 d9 08 ee e7 15 |....xB..........| -00000010 4b cc a4 95 06 41 81 d5 eb 5f 3a 7d a9 7c 14 8c |K....A..._:}.|..|" -"2019-05-02 01:31:20.891 UTC [msp.identity] Verify -> DEBU 29b5 Verify: sig = 00000000 30 44 02 20 25 d8 a0 a8 55 64 cf d4 22 95 b0 2b |0D. %...Ud.."..+| -00000010 9d 19 2a 2d f1 ee ab c7 40 00 b0 25 7c 8c 4e e5 |..*-....@..%|.N.| -00000020 f2 77 cf 80 02 20 10 b1 5c d3 47 5b e8 91 ee aa |.w... ..\.G[....| -00000030 61 ae d2 82 b6 50 a4 6d 3d e3 76 f7 db 98 6e 95 |a....P.m=.v...n.| -00000040 5d c2 20 53 e7 b2 |]. S..|" -"2019-05-02 01:31:20.891 UTC [cauthdsl] func2 -> DEBU 29b6 0xc00448a130 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.891 UTC [cauthdsl] func1 -> DEBU 29b7 0xc00448a130 gate 1556760680890940700 evaluation succeeds" -"2019-05-02 01:31:20.891 UTC [policies] Evaluate -> DEBU 29b8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.891 UTC [policies] Evaluate -> DEBU 29b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.891 UTC [policies] Evaluate -> DEBU 29ba Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.892 UTC [policies] Evaluate -> DEBU 29bb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.892 UTC [msp] DeserializeIdentity -> DEBU 29bc Obtaining identity" -"2019-05-02 01:31:20.892 UTC [msp] DeserializeIdentity -> DEBU 29bd Obtaining identity" -"2019-05-02 01:31:20.892 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:20.892 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29bf Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.892 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.893 UTC [policies] Evaluate -> DEBU 29c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.893 UTC [policies] Evaluate -> DEBU 29c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.893 UTC [policies] Evaluate -> DEBU 29c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.893 UTC [cauthdsl] func1 -> DEBU 29c4 0xc002666480 gate 1556760680893261500 evaluation starts" -"2019-05-02 01:31:20.893 UTC [cauthdsl] func2 -> DEBU 29c5 0xc002666480 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.893 UTC [cauthdsl] func2 -> DEBU 29c6 0xc002666480 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.893 UTC [cauthdsl] func2 -> DEBU 29c7 0xc002666480 principal matched by identity 0" -"2019-05-02 01:31:20.893 UTC [msp.identity] Verify -> DEBU 29c8 Verify: digest = 00000000 97 fb 2f 6b ab 25 80 a3 0a b1 2e d6 57 48 39 12 |../k.%......WH9.| -00000010 bf 3c ea 49 b9 6e 47 4b 75 67 cc 48 80 fe fd cd |.<.I.nGKug.H....|" -"2019-05-02 01:31:20.893 UTC [msp.identity] Verify -> DEBU 29c9 Verify: sig = 00000000 30 45 02 21 00 ae 33 be 2a ec cf 49 46 2d 69 50 |0E.!..3.*..IF-iP| -00000010 70 28 63 a9 89 2f 47 e3 0e 0a 5d 61 26 75 90 cc |p(c../G...]a&u..| -00000020 4a 6a a3 cb b0 02 20 59 c5 4d 33 f8 f6 cf c2 df |Jj.... Y.M3.....| -00000030 28 b4 c3 89 9a 3b 12 d0 7c be 2d a8 c8 5e 8a 87 |(....;..|.-..^..| -00000040 bd 9f 07 5f 99 39 b6 |..._.9.|" -"2019-05-02 01:31:20.893 UTC [cauthdsl] func2 -> DEBU 29ca 0xc002666480 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.893 UTC [cauthdsl] func1 -> DEBU 29cb 0xc002666480 gate 1556760680893261500 evaluation succeeds" -"2019-05-02 01:31:20.893 UTC [policies] Evaluate -> DEBU 29cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.894 UTC [policies] Evaluate -> DEBU 29cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.894 UTC [policies] Evaluate -> DEBU 29ce Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.894 UTC [policies] Evaluate -> DEBU 29cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.894 UTC [msp.identity] Verify -> DEBU 29d0 Verify: digest = 00000000 c1 4f ed f2 e8 55 61 0f b9 23 a6 3b f8 84 8e 89 |.O...Ua..#.;....| -00000010 27 38 34 a9 f7 91 da 93 d4 a0 cf cd 79 93 55 65 |'84.........y.Ue|" -"2019-05-02 01:31:20.894 UTC [msp.identity] Verify -> DEBU 29d1 Verify: sig = 00000000 30 44 02 20 5b 06 57 7d 08 9b 49 f9 c0 9a be e0 |0D. [.W}..I.....| -00000010 f4 ef b9 77 01 8c ef cc 4e 0c 7f 36 c2 1b a9 a9 |...w....N..6....| -00000020 a7 17 06 95 02 20 31 6a d3 d7 7f 09 3c 15 55 a7 |..... 1j....<.U.| -00000030 f2 46 76 59 63 05 7e 8b 54 a5 56 00 78 c8 89 ab |.FvYc.~.T.V.x...| -00000040 75 39 ef fd b7 0f |u9....|" -"2019-05-02 01:31:20.894 UTC [msp.identity] Verify -> DEBU 29d2 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:20.894 UTC [msp.identity] Verify -> DEBU 29d3 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:20.895 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29d4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.895 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29d5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func1 -> DEBU 29d9 0xc0026c82a0 gate 1556760680895251800 evaluation starts" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29da 0xc0026c82a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29db 0xc0026c82a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29dc 0xc0026c82a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29dd 0xc0026c82a0 principal evaluation fails" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func1 -> DEBU 29de 0xc0026c82a0 gate 1556760680895251800 evaluation fails" -"2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29df Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:20.895 UTC [policies] Evaluate -> DEBU 29e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func1 -> DEBU 29e2 0xc0026c8ae0 gate 1556760680895584700 evaluation starts" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29e3 0xc0026c8ae0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29e4 0xc0026c8ae0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29e5 0xc0026c8ae0 principal matched by identity 0" -"2019-05-02 01:31:20.895 UTC [msp.identity] Verify -> DEBU 29e6 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:20.895 UTC [msp.identity] Verify -> DEBU 29e7 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func2 -> DEBU 29e8 0xc0026c8ae0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:20.895 UTC [cauthdsl] func1 -> DEBU 29e9 0xc0026c8ae0 gate 1556760680895584700 evaluation succeeds" -"2019-05-02 01:31:20.896 UTC [policies] Evaluate -> DEBU 29ea Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:20.896 UTC [policies] Evaluate -> DEBU 29eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:20.896 UTC [policies] Evaluate -> DEBU 29ec Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:20.896 UTC [policies] Evaluate -> DEBU 29ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:20.896 UTC [gossip.gossip] handleMessage -> DEBU 29ee Exiting" -"2019-05-02 01:31:20.944 UTC [msp] DeserializeIdentity -> DEBU 29ef Obtaining identity" -"2019-05-02 01:31:20.944 UTC [msp] DeserializeIdentity -> DEBU 29f0 Obtaining identity" -"2019-05-02 01:31:20.944 UTC [gossip.pull] Hello -> DEBU 29f1 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:20.944 UTC [msp] DeserializeIdentity -> DEBU 29f2 Obtaining identity" -"2019-05-02 01:31:20.944 UTC [msp] DeserializeIdentity -> DEBU 29f3 Obtaining identity" -"2019-05-02 01:31:20.944 UTC [gossip.comm] Send -> DEBU 29f4 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:20.945 UTC [gossip.comm] sendToEndpoint -> DEBU 29f5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.945 UTC [gossip.comm] sendToEndpoint -> DEBU 29f6 Exiting" -"2019-05-02 01:31:20.946 UTC [gossip.gossip] handleMessage -> DEBU 29f7 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14314600018230149931 , Msg_type: BLOCK_MSG, digests: [8 1 2 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.946 UTC [gossip.pull] HandleMessage -> DEBU 29f8 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14314600018230149931 , Msg_type: BLOCK_MSG, digests: [8 1 2 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" -"2019-05-02 01:31:20.946 UTC [gossip.gossip] handleMessage -> DEBU 29f9 Exiting" -"2019-05-02 01:31:21.096 UTC [gossip.gossip] handleMessage -> DEBU 29fa Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.096 UTC [msp] DeserializeIdentity -> DEBU 29fb Obtaining identity" -"2019-05-02 01:31:21.096 UTC [msp] DeserializeIdentity -> DEBU 29fc Obtaining identity" -"2019-05-02 01:31:21.097 UTC [gossip.gossip] handleMessage -> DEBU 29fd Exiting" -"2019-05-02 01:31:21.103 UTC [gossip.comm] func1 -> DEBU 29fe Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760679738375000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:21.104 UTC [gossip.gossip] handleMessage -> DEBU 29ff Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760679738375000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:21.111 UTC [gossip.comm] func1 -> DEBU 2a00 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760679738375000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:21.105 UTC [msp.identity] Verify -> DEBU 2a01 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:21.116 UTC [msp.identity] Verify -> DEBU 2a02 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:21.116 UTC [msp] DeserializeIdentity -> DEBU 2a03 Obtaining identity" -"2019-05-02 01:31:21.116 UTC [gossip.gossip] handleMessage -> DEBU 2a04 Exiting" -"2019-05-02 01:31:21.116 UTC [gossip.gossip] handleMessage -> DEBU 2a05 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760679738375000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:21.117 UTC [msp.identity] Verify -> DEBU 2a06 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:21.117 UTC [msp.identity] Verify -> DEBU 2a07 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:21.117 UTC [msp] DeserializeIdentity -> DEBU 2a08 Obtaining identity" -"2019-05-02 01:31:21.117 UTC [gossip.gossip] handleMessage -> DEBU 2a09 Exiting" -"2019-05-02 01:31:21.118 UTC [gossip.gossip] handleMessage -> DEBU 2a0a Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760679738375000 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:21.118 UTC [msp.identity] Verify -> DEBU 2a0b Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:21.118 UTC [msp.identity] Verify -> DEBU 2a0c Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:21.119 UTC [gossip.gossip] handleMessage -> DEBU 2a0d Exiting" -"2019-05-02 01:31:21.123 UTC [gossip.gossip] handleMessage -> DEBU 2a0e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.123 UTC [gossip.pull] HandleMessage -> DEBU 2a0f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.123 UTC [gossip.pull] SendDigest -> DEBU 2a10 Sending BLOCK_MSG digest: [5 6 7 8 1 2 3 4] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:21.124 UTC [gossip.gossip] handleMessage -> DEBU 2a11 Exiting" -"2019-05-02 01:31:21.316 UTC [gossip.comm] func1 -> DEBU 2a12 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.318 UTC [gossip.comm] func1 -> DEBU 2a13 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760679699759400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:21.318 UTC [gossip.gossip] handleMessage -> DEBU 2a14 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.318 UTC [msp] DeserializeIdentity -> DEBU 2a15 Obtaining identity" -"2019-05-02 01:31:21.320 UTC [msp] DeserializeIdentity -> DEBU 2a16 Obtaining identity" -"2019-05-02 01:31:21.320 UTC [msp] DeserializeIdentity -> DEBU 2a17 Obtaining identity" -"2019-05-02 01:31:21.322 UTC [gossip.gossip] handleMessage -> DEBU 2a18 Exiting" -"2019-05-02 01:31:21.322 UTC [gossip.gossip] handleMessage -> DEBU 2a19 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760679699759400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:21.322 UTC [msp] DeserializeIdentity -> DEBU 2a1a Obtaining identity" -"2019-05-02 01:31:21.323 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:21.323 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a1c Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:21.324 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a1d Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:21.324 UTC [policies] Evaluate -> DEBU 2a1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:21.324 UTC [policies] Evaluate -> DEBU 2a1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:21.324 UTC [policies] Evaluate -> DEBU 2a20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:21.325 UTC [cauthdsl] func1 -> DEBU 2a21 0xc0027c7f90 gate 1556760681325015100 evaluation starts" -"2019-05-02 01:31:21.326 UTC [cauthdsl] func2 -> DEBU 2a22 0xc0027c7f90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:21.326 UTC [cauthdsl] func2 -> DEBU 2a23 0xc0027c7f90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:21.326 UTC [cauthdsl] func2 -> DEBU 2a24 0xc0027c7f90 principal matched by identity 0" -"2019-05-02 01:31:21.327 UTC [msp.identity] Verify -> DEBU 2a25 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:21.327 UTC [msp.identity] Verify -> DEBU 2a26 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:21.327 UTC [cauthdsl] func2 -> DEBU 2a28 0xc0027c7f90 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:21.328 UTC [cauthdsl] func1 -> DEBU 2a29 0xc0027c7f90 gate 1556760681325015100 evaluation succeeds" -"2019-05-02 01:31:21.327 UTC [gossip.comm] func1 -> DEBU 2a27 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760679699759400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:21.329 UTC [policies] Evaluate -> DEBU 2a2a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.329 UTC [policies] Evaluate -> DEBU 2a2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.329 UTC [policies] Evaluate -> DEBU 2a2c Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:21.330 UTC [policies] Evaluate -> DEBU 2a2d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:21.330 UTC [msp] DeserializeIdentity -> DEBU 2a2e Obtaining identity" -"2019-05-02 01:31:21.330 UTC [gossip.gossip] handleMessage -> DEBU 2a2f Exiting" -"2019-05-02 01:31:21.331 UTC [gossip.gossip] handleMessage -> DEBU 2a30 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760679699759400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:21.331 UTC [msp] DeserializeIdentity -> DEBU 2a31 Obtaining identity" -"2019-05-02 01:31:21.332 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a32 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:21.332 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a33 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:21.332 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a34 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:21.332 UTC [policies] Evaluate -> DEBU 2a35 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:21.333 UTC [policies] Evaluate -> DEBU 2a36 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:21.333 UTC [policies] Evaluate -> DEBU 2a37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:21.333 UTC [cauthdsl] func1 -> DEBU 2a38 0xc002fe59b0 gate 1556760681333913600 evaluation starts" -"2019-05-02 01:31:21.334 UTC [cauthdsl] func2 -> DEBU 2a39 0xc002fe59b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:21.334 UTC [cauthdsl] func2 -> DEBU 2a3a 0xc002fe59b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:21.334 UTC [cauthdsl] func2 -> DEBU 2a3b 0xc002fe59b0 principal matched by identity 0" -"2019-05-02 01:31:21.334 UTC [msp.identity] Verify -> DEBU 2a3c Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:21.335 UTC [msp.identity] Verify -> DEBU 2a3d Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:21.335 UTC [cauthdsl] func2 -> DEBU 2a3e 0xc002fe59b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:21.335 UTC [cauthdsl] func1 -> DEBU 2a3f 0xc002fe59b0 gate 1556760681333913600 evaluation succeeds" -"2019-05-02 01:31:21.336 UTC [policies] Evaluate -> DEBU 2a40 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.336 UTC [policies] Evaluate -> DEBU 2a41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.336 UTC [policies] Evaluate -> DEBU 2a42 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:21.338 UTC [policies] Evaluate -> DEBU 2a43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:21.339 UTC [msp] DeserializeIdentity -> DEBU 2a44 Obtaining identity" -"2019-05-02 01:31:21.340 UTC [gossip.gossip] handleMessage -> DEBU 2a45 Exiting" -"2019-05-02 01:31:21.435 UTC [gossip.gossip] handleMessage -> DEBU 2a46 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.435 UTC [gossip.pull] HandleMessage -> DEBU 2a47 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.436 UTC [gossip.pull] SendDigest -> DEBU 2a48 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:21.436 UTC [gossip.gossip] handleMessage -> DEBU 2a49 Exiting" -"2019-05-02 01:31:21.439 UTC [endorser] ProcessProposal -> DEBU 2a4a Entering: request from 192.168.240.9:41372" -"2019-05-02 01:31:21.440 UTC [protoutils] ValidateProposalMessage -> DEBU 2a4b ValidateProposalMessage starts for signed proposal 0xc0025e4140" -"2019-05-02 01:31:21.440 UTC [protoutils] validateChannelHeader -> DEBU 2a4c validateChannelHeader info: header type 3" -"2019-05-02 01:31:21.440 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a4d begin" -"2019-05-02 01:31:21.441 UTC [msp] GetManagerForChain -> DEBU 2a4e Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:21.441 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a4f creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:21.441 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a50 creator is valid" -"2019-05-02 01:31:21.441 UTC [msp.identity] Verify -> DEBU 2a51 Verify: digest = 00000000 7a 48 2d 96 aa c8 69 22 9b 97 a6 8d 72 d9 6f 35 |zH-...i"....r.o5| -00000010 20 84 38 58 3b 1d 47 3d 9c 6d ab 28 ef f9 e3 c1 | .8X;.G=.m.(....|" -"2019-05-02 01:31:21.442 UTC [msp.identity] Verify -> DEBU 2a52 Verify: sig = 00000000 30 44 02 20 57 3f 08 bd cb 24 66 a7 cc 46 8a f9 |0D. W?...$f..F..| -00000010 f1 70 a3 94 89 5a ff 78 fd cc 49 b7 ec 88 bf a2 |.p...Z.x..I.....| -00000020 25 a3 3a 97 02 20 79 ef e1 52 8b 23 81 4c 00 4c |%.:.. y..R.#.L.L| -00000030 bb 71 e2 b4 1b bb 84 b0 6c 4f ba 34 1b 65 bf 10 |.q......lO.4.e..| -00000040 5e fe 69 5d e9 83 |^.i]..|" -"2019-05-02 01:31:21.442 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a53 exits successfully" -"2019-05-02 01:31:21.443 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2a54 validateChaincodeProposalMessage starts for proposal 0xc002f7f1f0, header 0xc0025e4550" -"2019-05-02 01:31:21.443 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2a55 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-05-02 01:31:21.443 UTC [endorser] preProcess -> DEBU 2a56 [businesschannel][cb915c8a] processing txid: cb915c8a1a1c299b96c98f82baec2fc213de3021d08a84dc262205b642e3155c" -"2019-05-02 01:31:21.444 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2a57 retrieveTransactionByID() - txId = [cb915c8a1a1c299b96c98f82baec2fc213de3021d08a84dc262205b642e3155c]" -"2019-05-02 01:31:21.444 UTC [endorser] SimulateProposal -> DEBU 2a58 [businesschannel][cb915c8a] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:21.445 UTC [endorser] callChaincode -> INFO 2a59 [businesschannel][cb915c8a] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:21.446 UTC [chaincode] Execute -> DEBU 2a5a Entry" -"2019-05-02 01:31:21.446 UTC [cscc] Invoke -> DEBU 2a5b Invoke function: GetConfigBlock" -"2019-05-02 01:31:21.447 UTC [aclmgmt] CheckACL -> DEBU 2a5c acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" -"2019-05-02 01:31:21.452 UTC [aclmgmt] CheckACL -> DEBU 2a5e acl check(/Channel/Application/Readers)" -"2019-05-02 01:31:21.447 UTC [gossip.gossip] handleMessage -> DEBU 2a5d Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.452 UTC [policies] Evaluate -> DEBU 2a5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:21.453 UTC [policies] Evaluate -> DEBU 2a62 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:21.453 UTC [policies] Evaluate -> DEBU 2a63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:21.454 UTC [cauthdsl] func1 -> DEBU 2a64 0xc003042520 gate 1556760681453909200 evaluation starts" -"2019-05-02 01:31:21.454 UTC [cauthdsl] func2 -> DEBU 2a65 0xc003042520 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:21.454 UTC [cauthdsl] func2 -> DEBU 2a66 0xc003042520 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:21.454 UTC [cauthdsl] func2 -> DEBU 2a67 0xc003042520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:21.453 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.453 UTC [gossip.gossip] handleMessage -> DEBU 2a60 Exiting" -"2019-05-02 01:31:21.455 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a69 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:21.456 UTC [msp.identity] Verify -> DEBU 2a6a Verify: digest = 00000000 32 7c 02 b3 20 b7 22 b7 bc 8f 19 5a 4a 0a 4d 7d |2|.. ."....ZJ.M}| -00000010 70 94 b3 e6 bb a8 bf 8c 10 50 b2 1d ec ad 63 2a |p........P....c*|" -"2019-05-02 01:31:21.456 UTC [msp.identity] Verify -> DEBU 2a6b Verify: sig = 00000000 30 44 02 20 4c b2 0a c6 7b 9c 32 9f f9 d6 64 76 |0D. L...{.2...dv| -00000010 f4 a9 dc f1 5a 67 f6 86 54 21 05 d6 05 92 7e 25 |....Zg..T!....~%| -00000020 5b 03 d6 30 02 20 68 48 47 ea d5 b7 cd b6 79 c5 |[..0. hHG.....y.| -00000030 5d 72 10 6c 84 51 9a a5 26 b3 9b 6b 06 2a 1d 3c |]r.l.Q..&..k.*.<| -00000040 bd c9 0f 96 1c 28 |.....(|" -"2019-05-02 01:31:21.457 UTC [msp.identity] Verify -> DEBU 2a6c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:49.869 UTC [fsblkstorage] indexBlock -> DEBU 27fd Adding txLoc [fileSuffixNum=0, offset=94692, bytesLength=3044] for tx ID: [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176] to txid-index" +"2019-05-02 09:27:49.869 UTC [fsblkstorage] indexBlock -> DEBU 27fe Adding txLoc [fileSuffixNum=0, offset=94692, bytesLength=3044] for tx number:[0] ID: [f788670ebf894f8037a7c98f712836326d75e6f235cedbe62b89909fd9e38176] to blockNumTranNum index" +"2019-05-02 09:27:49.871 UTC [fsblkstorage] updateCheckpoint -> DEBU 27ff Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98673], isChainEmpty=[false], lastBlockNumber=[8]" +"2019-05-02 09:27:49.871 UTC [pvtdatastorage] Commit -> DEBU 2800 Committing private data for block [8]" +"2019-05-02 09:27:49.874 UTC [pvtdatastorage] Commit -> DEBU 2801 Committed private data for block [8]" +"2019-05-02 09:27:49.874 UTC [kvledger] CommitWithPvtData -> DEBU 2802 [businesschannel] Committing block [8] transactions to state database" +"2019-05-02 09:27:49.874 UTC [lockbasedtxmgr] Commit -> DEBU 2803 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-05-02 09:27:49.874 UTC [lockbasedtxmgr] Commit -> DEBU 2804 Committing updates to state database" +"2019-05-02 09:27:49.874 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2805 Building the expiry schedules based on the update batch" +"2019-05-02 09:27:49.875 UTC [lockbasedtxmgr] Commit -> DEBU 2806 Write lock acquired for committing updates to state database" +"2019-05-02 09:27:49.875 UTC [stateleveldb] ApplyUpdates -> DEBU 2807 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-05-02 09:27:49.875 UTC [stateleveldb] ApplyUpdates -> DEBU 2808 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-05-02 09:27:49.877 UTC [lockbasedtxmgr] Commit -> DEBU 2809 Updates committed to state database and the write lock is released" +"2019-05-02 09:27:49.877 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 280a Preparing potential purge list working-set for expiringAtBlk [9]" +"2019-05-02 09:27:49.877 UTC [leveldbhelper] GetIterator -> DEBU 280c Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}]" +"2019-05-02 09:27:49.877 UTC [lockbasedtxmgr] func1 -> DEBU 280b launched the background routine for preparing keys to purge with the next block" +"2019-05-02 09:27:49.878 UTC [kvledger] CommitWithPvtData -> DEBU 280e [businesschannel] Committing block [8] transactions to history database" +"2019-05-02 09:27:49.878 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 280d No expiry entry found for expiringAtBlk [9]" +"2019-05-02 09:27:49.878 UTC [historyleveldb] Commit -> DEBU 280f Channel [businesschannel]: Updating history database for blockNo [8] with [1] transactions" +"2019-05-02 09:27:49.881 UTC [historyleveldb] Commit -> DEBU 2810 Channel [businesschannel]: Updates committed to history database for blockNo [8]" +"2019-05-02 09:27:49.881 UTC [kvledger] CommitWithPvtData -> INFO 2811 [businesschannel] Committed block [8] with 1 transaction(s) in 21ms (state_validation=4ms block_commit=9ms state_commit=4ms)" +"2019-05-02 09:27:49.882 UTC [msp.identity] Sign -> DEBU 2812 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A020809 " +"2019-05-02 09:27:49.882 UTC [msp.identity] Sign -> DEBU 2813 Sign: digest: A621B06F03D34A0674B18CFCA8E22E1A10C61FB115DB21B02C16B6FB5ED84533 " +"2019-05-02 09:27:49.883 UTC [gossip.state] commitBlock -> DEBU 2814 [businesschannel] Committed block [8] with 1 transaction(s)" +"2019-05-02 09:27:50.189 UTC [endorser] ProcessProposal -> DEBU 2815 Entering: request from 172.18.0.8:57370" +"2019-05-02 09:27:50.189 UTC [protoutils] ValidateProposalMessage -> DEBU 2816 ValidateProposalMessage starts for signed proposal 0xc0038488c0" +"2019-05-02 09:27:50.189 UTC [protoutils] validateChannelHeader -> DEBU 2817 validateChannelHeader info: header type 3" +"[36m2019-05-02 09:27:50.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 2818 begin" +"2019-05-02 09:27:50.189 UTC [msp] GetManagerForChain -> DEBU 2819 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:50.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 281a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:50.190 UTC [protoutils] checkSignatureFromCreator -> DEBU 281b creator is valid" +"2019-05-02 09:27:50.190 UTC [msp.identity] Verify -> DEBU 281c Verify: digest = 00000000 e0 be 15 c6 e1 7b 44 fe a2 cf d8 51 d6 dd 90 bc |.....{D....Q....| +00000010 bb c7 5c 7b 53 c7 cd d3 bb ab 5b 9c b5 18 2c 6e |..\{S.....[...,n|" +"2019-05-02 09:27:50.190 UTC [msp.identity] Verify -> DEBU 281d Verify: sig = 00000000 30 44 02 20 1d f4 8e 8b b9 fe 3d 81 2b f9 6d c8 |0D. ......=.+.m.| +00000010 a6 5c 1e 41 36 9e fa 77 6e e9 6c 68 47 f4 04 5a |.\.A6..wn.lhG..Z| +00000020 e9 e8 1d 0b 02 20 05 73 03 c1 8c 60 d0 f0 05 f9 |..... .s...`....| +00000030 f1 fc ca 2e 9b f6 68 27 f8 1c 9d be 24 6b ee e4 |......h'....$k..| +00000040 07 16 be 7d c3 24 |...}.$|" +"2019-05-02 09:27:50.191 UTC [protoutils] checkSignatureFromCreator -> DEBU 281e exits successfully" +"2019-05-02 09:27:50.191 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 281f validateChaincodeProposalMessage starts for proposal 0xc003168850, header 0xc003848cd0" +"2019-05-02 09:27:50.191 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2820 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-05-02 09:27:50.192 UTC [endorser] preProcess -> DEBU 2821 [businesschannel][64069c4c] processing txid: 64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a" +"2019-05-02 09:27:50.192 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2822 retrieveTransactionByID() - txId = [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]" +"2019-05-02 09:27:50.192 UTC [aclmgmt] CheckACL -> DEBU 2823 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-05-02 09:27:50.192 UTC [aclmgmt] CheckACL -> DEBU 2824 acl check(/Channel/Application/Writers)" +"2019-05-02 09:27:50.192 UTC [policies] Evaluate -> DEBU 2825 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-05-02 09:27:50.192 UTC [policies] Evaluate -> DEBU 2826 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:50.193 UTC [policies] Evaluate -> DEBU 2827 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-05-02 09:27:50.193 UTC [cauthdsl] func1 -> DEBU 2828 0xc0038446d0 gate 1556789270193171500 evaluation starts" +"2019-05-02 09:27:50.193 UTC [cauthdsl] func2 -> DEBU 2829 0xc0038446d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:50.193 UTC [cauthdsl] func2 -> DEBU 282a 0xc0038446d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:50.194 UTC [cauthdsl] func2 -> DEBU 282b 0xc0038446d0 principal matched by identity 0" +"2019-05-02 09:27:50.194 UTC [msp.identity] Verify -> DEBU 282c Verify: digest = 00000000 e0 be 15 c6 e1 7b 44 fe a2 cf d8 51 d6 dd 90 bc |.....{D....Q....| +00000010 bb c7 5c 7b 53 c7 cd d3 bb ab 5b 9c b5 18 2c 6e |..\{S.....[...,n|" +"2019-05-02 09:27:50.194 UTC [msp.identity] Verify -> DEBU 282d Verify: sig = 00000000 30 44 02 20 1d f4 8e 8b b9 fe 3d 81 2b f9 6d c8 |0D. ......=.+.m.| +00000010 a6 5c 1e 41 36 9e fa 77 6e e9 6c 68 47 f4 04 5a |.\.A6..wn.lhG..Z| +00000020 e9 e8 1d 0b 02 20 05 73 03 c1 8c 60 d0 f0 05 f9 |..... .s...`....| +00000030 f1 fc ca 2e 9b f6 68 27 f8 1c 9d be 24 6b ee e4 |......h'....$k..| +00000040 07 16 be 7d c3 24 |...}.$|" +"2019-05-02 09:27:50.195 UTC [cauthdsl] func2 -> DEBU 282e 0xc0038446d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:50.195 UTC [cauthdsl] func1 -> DEBU 282f 0xc0038446d0 gate 1556789270193171500 evaluation succeeds" +"2019-05-02 09:27:50.195 UTC [policies] Evaluate -> DEBU 2830 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:50.196 UTC [policies] Evaluate -> DEBU 2831 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:27:50.196 UTC [policies] Evaluate -> DEBU 2832 Signature set satisfies policy /Channel/Application/Writers" +"2019-05-02 09:27:50.196 UTC [policies] Evaluate -> DEBU 2833 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-05-02 09:27:50.196 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2834 constructing new tx simulator" +"2019-05-02 09:27:50.196 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2835 constructing new tx simulator txid = [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]" +"2019-05-02 09:27:50.196 UTC [endorser] SimulateProposal -> DEBU 2836 [businesschannel][64069c4c] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:50.197 UTC [stateleveldb] GetState -> DEBU 2837 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:50.197 UTC [endorser] callChaincode -> INFO 2838 [businesschannel][64069c4c] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:50.197 UTC [stateleveldb] GetState -> DEBU 2839 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-05-02 09:27:50.198 UTC [stateleveldb] GetState -> DEBU 283a GetState(). ns=exp02, key=􏿿initialized" +"2019-05-02 09:27:50.198 UTC [chaincode] Execute -> DEBU 283b Entry" +"2019-05-02 09:27:50.201 UTC [chaincode] handleMessage -> DEBU 283c [64069c4c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-05-02 09:27:50.201 UTC [chaincode] HandleTransaction -> DEBU 283d [64069c4c] handling GET_STATE from chaincode" +"2019-05-02 09:27:50.202 UTC [chaincode] HandleGetState -> DEBU 283e [64069c4c] getting state for chaincode exp02, key a, channel businesschannel" +"2019-05-02 09:27:50.202 UTC [stateleveldb] GetState -> DEBU 283f GetState(). ns=exp02, key=a" +"2019-05-02 09:27:50.203 UTC [chaincode] HandleTransaction -> DEBU 2840 [64069c4c] Completed GET_STATE. Sending RESPONSE" +"2019-05-02 09:27:50.205 UTC [chaincode] handleMessage -> DEBU 2841 [64069c4c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:50.205 UTC [chaincode] Notify -> DEBU 2842 [64069c4c] notifying Txid:64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a, channelID:businesschannel" +"2019-05-02 09:27:50.206 UTC [chaincode] Execute -> DEBU 2843 Exit" +"2019-05-02 09:27:50.206 UTC [endorser] callChaincode -> INFO 2844 [businesschannel][64069c4c] Exit chaincode: name:"exp02" (9ms)" +"2019-05-02 09:27:50.206 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2845 Simulation completed, getting simulation results" +"2019-05-02 09:27:50.206 UTC [lockbasedtxmgr] Done -> DEBU 2846 Done with transaction simulation / query execution [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]" +"2019-05-02 09:27:50.206 UTC [endorser] SimulateProposal -> DEBU 2847 [businesschannel][64069c4c] Exit" +"2019-05-02 09:27:50.206 UTC [endorser] endorseProposal -> DEBU 2848 [businesschannel][64069c4c] Entry chaincode: name:"exp02" " +"2019-05-02 09:27:50.207 UTC [endorser] endorseProposal -> DEBU 2849 [businesschannel][64069c4c] escc for chaincode name:"exp02" is escc" +"2019-05-02 09:27:50.207 UTC [endorser] EndorseWithPlugin -> DEBU 284a Entering endorsement for {plugin: escc, channel: businesschannel, tx: 64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a, chaincode: exp02}" +"2019-05-02 09:27:50.207 UTC [msp.identity] Sign -> DEBU 284b Sign: plaintext: 0A20CFB7F550DAC8D829265B6FF08392...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:50.207 UTC [msp.identity] Sign -> DEBU 284c Sign: digest: 4B1EDB0672B51A00EF0208881946EB8E3F8CD03514D6A3F4407522E2E3ADF5CE " +"2019-05-02 09:27:50.207 UTC [endorser] EndorseWithPlugin -> DEBU 284d Exiting {plugin: escc, channel: businesschannel, tx: 64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a, chaincode: exp02}" +"2019-05-02 09:27:50.207 UTC [endorser] endorseProposal -> DEBU 284e [businesschannel][64069c4c] Exit" +"2019-05-02 09:27:50.207 UTC [lockbasedtxmgr] Done -> DEBU 284f Done with transaction simulation / query execution [64069c4c9af924f8a722f5d9ac1da59f2128701ab7f6cc3b0e2bea848419719a]" +"2019-05-02 09:27:50.208 UTC [endorser] func1 -> DEBU 2850 Exit: request from 172.18.0.8:57370" +"2019-05-02 09:27:50.208 UTC [comm.grpc.server] 1 -> INFO 2851 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57370 grpc.code=OK grpc.call_duration=19.3263ms +"2019-05-02 09:27:50.211 UTC [grpc] infof -> DEBU 2852 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:50.211 UTC [grpc] infof -> DEBU 2853 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:50.761 UTC [endorser] ProcessProposal -> DEBU 2854 Entering: request from 172.18.0.8:57374" +"2019-05-02 09:27:50.762 UTC [protoutils] ValidateProposalMessage -> DEBU 2855 ValidateProposalMessage starts for signed proposal 0xc0038495e0" +"2019-05-02 09:27:50.762 UTC [protoutils] validateChannelHeader -> DEBU 2856 validateChannelHeader info: header type 3" +"2019-05-02 09:27:50.762 UTC [protoutils] checkSignatureFromCreator -> DEBU 2857 begin" +"2019-05-02 09:27:50.763 UTC [msp] GetManagerForChain -> DEBU 2858 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:50.763 UTC [protoutils] checkSignatureFromCreator -> DEBU 2859 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:50.764 UTC [protoutils] checkSignatureFromCreator -> DEBU 285a creator is valid" +"2019-05-02 09:27:50.764 UTC [msp.identity] Verify -> DEBU 285b Verify: digest = 00000000 0f a4 f6 a2 63 de b8 94 68 54 97 77 75 4e 38 c2 |....c...hT.wuN8.| +00000010 5d b6 07 63 88 fa cf bb 95 05 37 28 3b 03 01 03 |]..c......7(;...|" +"2019-05-02 09:27:50.765 UTC [msp.identity] Verify -> DEBU 285c Verify: sig = 00000000 30 44 02 20 4e 0a 43 ee 5a 8f 79 48 8f 4b bf 08 |0D. N.C.Z.yH.K..| +00000010 c1 ff a0 2f d9 09 22 ca 07 c0 8c 92 7d a4 1f 59 |.../..".....}..Y| +00000020 1b 81 58 64 02 20 57 81 44 8f b7 a2 9b 77 d9 1b |..Xd. W.D....w..| +00000030 da d3 f5 cb ea 5f 5b b1 d6 95 29 de 1c c7 a7 b6 |....._[...).....| +00000040 10 fd 42 a9 42 45 |..B.BE|" +"2019-05-02 09:27:50.765 UTC [protoutils] checkSignatureFromCreator -> DEBU 285d exits successfully" +"2019-05-02 09:27:50.766 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285e validateChaincodeProposalMessage starts for proposal 0xc003168af0, header 0xc0038499f0" +"2019-05-02 09:27:50.766 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285f validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-05-02 09:27:50.766 UTC [endorser] preProcess -> DEBU 2860 [businesschannel][24104060] processing txid: 241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f" +"2019-05-02 09:27:50.767 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2861 retrieveTransactionByID() - txId = [241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f]" +"2019-05-02 09:27:50.767 UTC [endorser] SimulateProposal -> DEBU 2862 [businesschannel][24104060] Entry chaincode: name:"qscc" " +"2019-05-02 09:27:50.768 UTC [endorser] callChaincode -> INFO 2863 [businesschannel][24104060] Entry chaincode: name:"qscc" " +"2019-05-02 09:27:50.768 UTC [chaincode] Execute -> DEBU 2864 Entry" +"2019-05-02 09:27:50.769 UTC [qscc] Invoke -> DEBU 2865 Invoke function: GetChainInfo on chain: businesschannel" +"2019-05-02 09:27:50.769 UTC [aclmgmt] CheckACL -> DEBU 2866 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-05-02 09:27:50.769 UTC [aclmgmt] CheckACL -> DEBU 2867 acl check(/Channel/Application/Readers)" +"2019-05-02 09:27:50.769 UTC [policies] Evaluate -> DEBU 2868 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:50.769 UTC [policies] Evaluate -> DEBU 2869 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:50.770 UTC [policies] Evaluate -> DEBU 286a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:50.770 UTC [cauthdsl] func1 -> DEBU 286b 0xc0037d54e0 gate 1556789270770402200 evaluation starts" +"2019-05-02 09:27:50.770 UTC [cauthdsl] func2 -> DEBU 286c 0xc0037d54e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:50.770 UTC [cauthdsl] func2 -> DEBU 286d 0xc0037d54e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:50.771 UTC [cauthdsl] func2 -> DEBU 286e 0xc0037d54e0 principal matched by identity 0" +"2019-05-02 09:27:50.771 UTC [msp.identity] Verify -> DEBU 286f Verify: digest = 00000000 0f a4 f6 a2 63 de b8 94 68 54 97 77 75 4e 38 c2 |....c...hT.wuN8.| +00000010 5d b6 07 63 88 fa cf bb 95 05 37 28 3b 03 01 03 |]..c......7(;...|" +"2019-05-02 09:27:50.771 UTC [msp.identity] Verify -> DEBU 2870 Verify: sig = 00000000 30 44 02 20 4e 0a 43 ee 5a 8f 79 48 8f 4b bf 08 |0D. N.C.Z.yH.K..| +00000010 c1 ff a0 2f d9 09 22 ca 07 c0 8c 92 7d a4 1f 59 |.../..".....}..Y| +00000020 1b 81 58 64 02 20 57 81 44 8f b7 a2 9b 77 d9 1b |..Xd. W.D....w..| +00000030 da d3 f5 cb ea 5f 5b b1 d6 95 29 de 1c c7 a7 b6 |....._[...).....| +00000040 10 fd 42 a9 42 45 |..B.BE|" +"2019-05-02 09:27:50.771 UTC [cauthdsl] func2 -> DEBU 2871 0xc0037d54e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:50.772 UTC [cauthdsl] func1 -> DEBU 2872 0xc0037d54e0 gate 1556789270770402200 evaluation succeeds" +"2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2873 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2874 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2875 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:50.772 UTC [policies] Evaluate -> DEBU 2876 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:50.773 UTC [chaincode] handleMessage -> DEBU 2877 [24104060] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:50.773 UTC [chaincode] Notify -> DEBU 2878 [24104060] notifying Txid:241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f, channelID:businesschannel" +"2019-05-02 09:27:50.773 UTC [chaincode] Execute -> DEBU 2879 Exit" +"2019-05-02 09:27:50.773 UTC [endorser] callChaincode -> INFO 287a [businesschannel][24104060] Exit chaincode: name:"qscc" (5ms)" +"2019-05-02 09:27:50.774 UTC [endorser] SimulateProposal -> DEBU 287b [businesschannel][24104060] Exit" +"2019-05-02 09:27:50.774 UTC [endorser] endorseProposal -> DEBU 287c [businesschannel][24104060] Entry chaincode: name:"qscc" " +"2019-05-02 09:27:50.774 UTC [endorser] endorseProposal -> DEBU 287d [businesschannel][24104060] escc for chaincode name:"qscc" is escc" +"2019-05-02 09:27:50.775 UTC [endorser] EndorseWithPlugin -> DEBU 287e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f, chaincode: qscc}" +"2019-05-02 09:27:50.776 UTC [msp.identity] Sign -> DEBU 287f Sign: plaintext: 0A209B70645B41BEAE595688F2AD0075...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:50.776 UTC [msp.identity] Sign -> DEBU 2880 Sign: digest: EA378FB334945ABB2C73BB8C79377341F8B4B5298502586042935902DFB47468 " +"2019-05-02 09:27:50.776 UTC [endorser] EndorseWithPlugin -> DEBU 2881 Exiting {plugin: escc, channel: businesschannel, tx: 241040608aeb9f9b2c3d83a923bd5d63c6195427aeebda62cf5c99a61a5dce2f, chaincode: qscc}" +"2019-05-02 09:27:50.776 UTC [endorser] endorseProposal -> DEBU 2882 [businesschannel][24104060] Exit" +"2019-05-02 09:27:50.777 UTC [endorser] func1 -> DEBU 2883 Exit: request from 172.18.0.8:57374" +"2019-05-02 09:27:50.777 UTC [comm.grpc.server] 1 -> INFO 2884 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57374 grpc.code=OK grpc.call_duration=15.5943ms +"2019-05-02 09:27:50.781 UTC [grpc] infof -> DEBU 2885 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:50.781 UTC [grpc] infof -> DEBU 2886 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:50.971 UTC [endorser] ProcessProposal -> DEBU 2887 Entering: request from 172.18.0.8:57378" +"2019-05-02 09:27:50.971 UTC [protoutils] ValidateProposalMessage -> DEBU 2888 ValidateProposalMessage starts for signed proposal 0xc0037ceb40" +"2019-05-02 09:27:50.971 UTC [protoutils] validateChannelHeader -> DEBU 2889 validateChannelHeader info: header type 3" +"2019-05-02 09:27:50.972 UTC [protoutils] checkSignatureFromCreator -> DEBU 288a begin" +"2019-05-02 09:27:50.972 UTC [msp] GetManagerForChain -> DEBU 288b Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:50.972 UTC [protoutils] checkSignatureFromCreator -> DEBU 288c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:50.972 UTC [protoutils] checkSignatureFromCreator -> DEBU 288d creator is valid" +"2019-05-02 09:27:50.973 UTC [msp.identity] Verify -> DEBU 288e Verify: digest = 00000000 ba c2 4b 98 b6 d2 d6 da 18 41 cd fa b8 10 8f 9a |..K......A......| +00000010 83 14 60 40 9b 15 07 ed 7a d0 73 fe 3d 08 28 0b |..`@....z.s.=.(.|" +"2019-05-02 09:27:50.973 UTC [msp.identity] Verify -> DEBU 288f Verify: sig = 00000000 30 45 02 21 00 9c 4f 0e d0 04 3c 06 b0 32 15 7f |0E.!..O...<..2..| +00000010 28 30 1d 7a e1 b1 c7 36 d6 36 04 0c 69 94 19 46 |(0.z...6.6..i..F| +00000020 47 c3 ed fc 8e 02 20 56 5c 84 f2 6e 1b fc d8 ef |G..... V\..n....| +00000030 56 09 48 27 61 9b 15 3f 97 82 8d b9 a6 7f 9a 65 |V.H'a..?.......e| +00000040 86 57 05 3f f6 ca 5f |.W.?.._|" +"2019-05-02 09:27:50.973 UTC [protoutils] checkSignatureFromCreator -> DEBU 2890 exits successfully" +"2019-05-02 09:27:50.974 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2891 validateChaincodeProposalMessage starts for proposal 0xc003168e00, header 0xc0037ceff0" +"2019-05-02 09:27:50.974 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2892 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-05-02 09:27:50.975 UTC [endorser] preProcess -> DEBU 2893 [businesschannel][2df4e9c0] processing txid: 2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44" +"2019-05-02 09:27:50.975 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2894 retrieveTransactionByID() - txId = [2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44]" +"2019-05-02 09:27:50.975 UTC [endorser] SimulateProposal -> DEBU 2895 [businesschannel][2df4e9c0] Entry chaincode: name:"qscc" " +"2019-05-02 09:27:50.975 UTC [endorser] callChaincode -> INFO 2896 [businesschannel][2df4e9c0] Entry chaincode: name:"qscc" " +"2019-05-02 09:27:50.975 UTC [chaincode] Execute -> DEBU 2897 Entry" +"2019-05-02 09:27:50.976 UTC [qscc] Invoke -> DEBU 2898 Invoke function: GetBlockByNumber on chain: businesschannel" +"2019-05-02 09:27:50.976 UTC [aclmgmt] CheckACL -> DEBU 2899 acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" +"2019-05-02 09:27:50.976 UTC [aclmgmt] CheckACL -> DEBU 289a acl check(/Channel/Application/Readers)" +"2019-05-02 09:27:50.976 UTC [policies] Evaluate -> DEBU 289b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:50.977 UTC [policies] Evaluate -> DEBU 289c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:50.977 UTC [policies] Evaluate -> DEBU 289d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:50.977 UTC [cauthdsl] func1 -> DEBU 289e 0xc003774f70 gate 1556789270977536800 evaluation starts" +"2019-05-02 09:27:50.977 UTC [cauthdsl] func2 -> DEBU 289f 0xc003774f70 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:50.977 UTC [cauthdsl] func2 -> DEBU 28a0 0xc003774f70 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:50.978 UTC [cauthdsl] func2 -> DEBU 28a1 0xc003774f70 principal matched by identity 0" +"2019-05-02 09:27:50.978 UTC [msp.identity] Verify -> DEBU 28a2 Verify: digest = 00000000 ba c2 4b 98 b6 d2 d6 da 18 41 cd fa b8 10 8f 9a |..K......A......| +00000010 83 14 60 40 9b 15 07 ed 7a d0 73 fe 3d 08 28 0b |..`@....z.s.=.(.|" +"2019-05-02 09:27:50.978 UTC [msp.identity] Verify -> DEBU 28a3 Verify: sig = 00000000 30 45 02 21 00 9c 4f 0e d0 04 3c 06 b0 32 15 7f |0E.!..O...<..2..| +00000010 28 30 1d 7a e1 b1 c7 36 d6 36 04 0c 69 94 19 46 |(0.z...6.6..i..F| +00000020 47 c3 ed fc 8e 02 20 56 5c 84 f2 6e 1b fc d8 ef |G..... V\..n....| +00000030 56 09 48 27 61 9b 15 3f 97 82 8d b9 a6 7f 9a 65 |V.H'a..?.......e| +00000040 86 57 05 3f f6 ca 5f |.W.?.._|" +"2019-05-02 09:27:50.979 UTC [cauthdsl] func2 -> DEBU 28a4 0xc003774f70 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:50.979 UTC [cauthdsl] func1 -> DEBU 28a5 0xc003774f70 gate 1556789270977536800 evaluation succeeds" +"2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a6 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a8 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:50.980 UTC [policies] Evaluate -> DEBU 28a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:50.981 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 28aa retrieveBlockByNumber() - blockNum = [2]" +"2019-05-02 09:27:50.981 UTC [fsblkstorage] newBlockfileStream -> DEBU 28ab newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47626]" +"2019-05-02 09:27:50.982 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 28ac Remaining bytes=[51047], Going to peek [8] bytes" +"2019-05-02 09:27:50.982 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 28ad Returning blockbytes - length=[23743], placementInfo={fileNum=[0], startOffset=[47626], bytesOffset=[47629]}" +"2019-05-02 09:27:50.983 UTC [chaincode] handleMessage -> DEBU 28ae [2df4e9c0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:50.983 UTC [chaincode] Notify -> DEBU 28af [2df4e9c0] notifying Txid:2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44, channelID:businesschannel" +"2019-05-02 09:27:50.983 UTC [chaincode] Execute -> DEBU 28b0 Exit" +"2019-05-02 09:27:50.984 UTC [endorser] callChaincode -> INFO 28b1 [businesschannel][2df4e9c0] Exit chaincode: name:"qscc" (9ms)" +"2019-05-02 09:27:50.984 UTC [endorser] SimulateProposal -> DEBU 28b2 [businesschannel][2df4e9c0] Exit" +"2019-05-02 09:27:50.985 UTC [endorser] endorseProposal -> DEBU 28b3 [businesschannel][2df4e9c0] Entry chaincode: name:"qscc" " +"2019-05-02 09:27:50.985 UTC [endorser] endorseProposal -> DEBU 28b4 [businesschannel][2df4e9c0] escc for chaincode name:"qscc" is escc" +"2019-05-02 09:27:50.986 UTC [endorser] EndorseWithPlugin -> DEBU 28b5 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44, chaincode: qscc}" +"2019-05-02 09:27:50.986 UTC [msp.identity] Sign -> DEBU 28b6 Sign: plaintext: 0A2016059D49945D8C7832B1426637D1...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:50.986 UTC [msp.identity] Sign -> DEBU 28b7 Sign: digest: 828A231ABBC2A984BCFA1D369556CD17EF40D394F97964C1C6EE762582FD7EF5 " +"2019-05-02 09:27:50.987 UTC [endorser] EndorseWithPlugin -> DEBU 28b8 Exiting {plugin: escc, channel: businesschannel, tx: 2df4e9c0f16cf1e5f11db6ec59bfd03a248cf5d5c205f7ffff962a2aa57b3e44, chaincode: qscc}" +"2019-05-02 09:27:50.987 UTC [endorser] endorseProposal -> DEBU 28b9 [businesschannel][2df4e9c0] Exit" +"2019-05-02 09:27:50.988 UTC [endorser] func1 -> DEBU 28ba Exit: request from 172.18.0.8:57378" +"2019-05-02 09:27:50.988 UTC [comm.grpc.server] 1 -> INFO 28bb unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57378 grpc.code=OK grpc.call_duration=17.2875ms +"2019-05-02 09:27:50.993 UTC [grpc] infof -> DEBU 28bc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:50.993 UTC [grpc] infof -> DEBU 28bd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:51.506 UTC [endorser] ProcessProposal -> DEBU 28be Entering: request from 172.18.0.8:57382" +"2019-05-02 09:27:51.506 UTC [protoutils] ValidateProposalMessage -> DEBU 28bf ValidateProposalMessage starts for signed proposal 0xc0037cff90" +"2019-05-02 09:27:51.506 UTC [protoutils] validateChannelHeader -> DEBU 28c0 validateChannelHeader info: header type 3" +"2019-05-02 09:27:51.506 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c1 begin" +"2019-05-02 09:27:51.507 UTC [msp] GetManagerForChain -> DEBU 28c2 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:51.507 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c3 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:51.507 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c4 creator is valid" +"2019-05-02 09:27:51.507 UTC [msp.identity] Verify -> DEBU 28c5 Verify: digest = 00000000 bd 73 e7 3e d5 29 73 26 92 11 70 4f bb 69 ea a7 |.s.>.)s&..pO.i..| +00000010 3a 16 b7 ef 42 ce 73 1a a5 d9 43 76 62 42 b0 2f |:...B.s...CvbB./|" +"2019-05-02 09:27:51.507 UTC [msp.identity] Verify -> DEBU 28c6 Verify: sig = 00000000 30 45 02 21 00 ac 41 29 63 a2 87 db 9c 4b 49 c8 |0E.!..A)c....KI.| +00000010 97 d5 ea 8a 84 17 f4 ba 59 23 c5 67 04 34 13 1b |........Y#.g.4..| +00000020 1d 13 81 ae 37 02 20 49 e7 96 ce ea 09 cb d3 b5 |....7. I........| +00000030 d9 68 5c 1c 3b 82 de 50 c9 b0 74 33 cf 1b de 9b |.h\.;..P..t3....| +00000040 65 dc 7f ea 7c 97 17 |e...|..|" +"2019-05-02 09:27:51.508 UTC [protoutils] checkSignatureFromCreator -> DEBU 28c7 exits successfully" +"2019-05-02 09:27:51.508 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28c8 validateChaincodeProposalMessage starts for proposal 0xc0031690a0, header 0xc003758410" +"2019-05-02 09:27:51.508 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28c9 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-05-02 09:27:51.509 UTC [endorser] preProcess -> DEBU 28ca [businesschannel][a97e4d2e] processing txid: a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a" +"2019-05-02 09:27:51.509 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28cb retrieveTransactionByID() - txId = [a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a]" +"2019-05-02 09:27:51.509 UTC [endorser] SimulateProposal -> DEBU 28cc [businesschannel][a97e4d2e] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:51.510 UTC [endorser] callChaincode -> INFO 28cd [businesschannel][a97e4d2e] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:51.510 UTC [chaincode] Execute -> DEBU 28ce Entry" +"2019-05-02 09:27:51.510 UTC [cscc] Invoke -> DEBU 28cf Invoke function: GetConfigBlock" +"2019-05-02 09:27:51.511 UTC [aclmgmt] CheckACL -> DEBU 28d0 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +"2019-05-02 09:27:51.511 UTC [aclmgmt] CheckACL -> DEBU 28d1 acl check(/Channel/Application/Readers)" +"2019-05-02 09:27:51.511 UTC [policies] Evaluate -> DEBU 28d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:51.511 UTC [policies] Evaluate -> DEBU 28d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:51.512 UTC [policies] Evaluate -> DEBU 28d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:51.512 UTC [cauthdsl] func1 -> DEBU 28d5 0xc0036f6b30 gate 1556789271512089500 evaluation starts" +"2019-05-02 09:27:51.512 UTC [cauthdsl] func2 -> DEBU 28d6 0xc0036f6b30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:51.512 UTC [cauthdsl] func2 -> DEBU 28d7 0xc0036f6b30 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:51.512 UTC [cauthdsl] func2 -> DEBU 28d8 0xc0036f6b30 principal matched by identity 0" +"2019-05-02 09:27:51.512 UTC [msp.identity] Verify -> DEBU 28d9 Verify: digest = 00000000 bd 73 e7 3e d5 29 73 26 92 11 70 4f bb 69 ea a7 |.s.>.)s&..pO.i..| +00000010 3a 16 b7 ef 42 ce 73 1a a5 d9 43 76 62 42 b0 2f |:...B.s...CvbB./|" +"2019-05-02 09:27:51.513 UTC [msp.identity] Verify -> DEBU 28da Verify: sig = 00000000 30 45 02 21 00 ac 41 29 63 a2 87 db 9c 4b 49 c8 |0E.!..A)c....KI.| +00000010 97 d5 ea 8a 84 17 f4 ba 59 23 c5 67 04 34 13 1b |........Y#.g.4..| +00000020 1d 13 81 ae 37 02 20 49 e7 96 ce ea 09 cb d3 b5 |....7. I........| +00000030 d9 68 5c 1c 3b 82 de 50 c9 b0 74 33 cf 1b de 9b |.h\.;..P..t3....| +00000040 65 dc 7f ea 7c 97 17 |e...|..|" +"2019-05-02 09:27:51.513 UTC [cauthdsl] func2 -> DEBU 28db 0xc0036f6b30 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:51.514 UTC [cauthdsl] func1 -> DEBU 28dc 0xc0036f6b30 gate 1556789271512089500 evaluation succeeds" +"2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28dd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28df Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:51.514 UTC [policies] Evaluate -> DEBU 28e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:51.515 UTC [chaincode] handleMessage -> DEBU 28e1 [a97e4d2e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:51.515 UTC [chaincode] Notify -> DEBU 28e2 [a97e4d2e] notifying Txid:a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a, channelID:businesschannel" +"2019-05-02 09:27:51.515 UTC [chaincode] Execute -> DEBU 28e3 Exit" +"2019-05-02 09:27:51.515 UTC [endorser] callChaincode -> INFO 28e4 [businesschannel][a97e4d2e] Exit chaincode: name:"cscc" (6ms)" +"2019-05-02 09:27:51.515 UTC [endorser] SimulateProposal -> DEBU 28e5 [businesschannel][a97e4d2e] Exit" +"2019-05-02 09:27:51.516 UTC [endorser] endorseProposal -> DEBU 28e6 [businesschannel][a97e4d2e] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:51.516 UTC [endorser] endorseProposal -> DEBU 28e7 [businesschannel][a97e4d2e] escc for chaincode name:"cscc" is escc" +"2019-05-02 09:27:51.516 UTC [endorser] EndorseWithPlugin -> DEBU 28e8 Entering endorsement for {plugin: escc, channel: businesschannel, tx: a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a, chaincode: cscc}" +"2019-05-02 09:27:51.517 UTC [msp.identity] Sign -> DEBU 28e9 Sign: plaintext: 0A2048A4F3E80B8107BCA08ABF3A0D82...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:51.517 UTC [msp.identity] Sign -> DEBU 28ea Sign: digest: 53473CFF231C4119BEB7B7FF9D6F26836A77AC913801EEE2176514D99C80BF06 " +"2019-05-02 09:27:51.517 UTC [endorser] EndorseWithPlugin -> DEBU 28eb Exiting {plugin: escc, channel: businesschannel, tx: a97e4d2e8efb09cd6bd9f42018cd086b113f06186d82642de01e72712c67de2a, chaincode: cscc}" +"2019-05-02 09:27:51.517 UTC [endorser] endorseProposal -> DEBU 28ec [businesschannel][a97e4d2e] Exit" +"2019-05-02 09:27:51.517 UTC [endorser] func1 -> DEBU 28ed Exit: request from 172.18.0.8:57382" +"2019-05-02 09:27:51.518 UTC [comm.grpc.server] 1 -> INFO 28ee unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57382 grpc.code=OK grpc.call_duration=12.6023ms +"2019-05-02 09:27:51.523 UTC [grpc] infof -> DEBU 28ef transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:51.524 UTC [grpc] infof -> DEBU 28f0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:51.711 UTC [endorser] ProcessProposal -> DEBU 28f1 Entering: request from 172.18.0.8:57386" +"2019-05-02 09:27:51.711 UTC [protoutils] ValidateProposalMessage -> DEBU 28f2 ValidateProposalMessage starts for signed proposal 0xc003708140" +"2019-05-02 09:27:51.711 UTC [protoutils] validateChannelHeader -> DEBU 28f3 validateChannelHeader info: header type 3" +"2019-05-02 09:27:51.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 28f4 begin" +"2019-05-02 09:27:51.712 UTC [msp] GetManagerForChain -> DEBU 28f5 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:51.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 28f6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:51.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 28f7 creator is valid" +"2019-05-02 09:27:51.713 UTC [msp.identity] Verify -> DEBU 28f8 Verify: digest = 00000000 ab fc 34 7a b3 c3 81 e6 ad 68 f2 93 c3 02 c6 30 |..4z.....h.....0| +00000010 3b 78 79 b8 4a e1 0b df 63 74 a6 a1 8b 88 82 ae |;xy.J...ct......|" +"2019-05-02 09:27:51.713 UTC [msp.identity] Verify -> DEBU 28f9 Verify: sig = 00000000 30 45 02 21 00 ec 61 4b 72 06 98 49 a4 3f 31 5f |0E.!..aKr..I.?1_| +00000010 c9 39 d7 30 87 35 86 1e 22 34 6d 02 92 e7 b1 86 |.9.0.5.."4m.....| +00000020 6d cf 8f 1e dc 02 20 10 f0 87 ab 09 b9 74 36 19 |m..... ......t6.| +00000030 56 52 1c 92 55 f7 5d 2d 51 da da 3b a7 bd 3c fe |VR..U.]-Q..;..<.| +00000040 d5 04 91 31 1c bc d3 |...1...|" +"2019-05-02 09:27:51.713 UTC [protoutils] checkSignatureFromCreator -> DEBU 28fa exits successfully" +"2019-05-02 09:27:51.713 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28fb validateChaincodeProposalMessage starts for proposal 0xc0034605b0, header 0xc003708550" +"2019-05-02 09:27:51.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28fc validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-05-02 09:27:51.714 UTC [endorser] preProcess -> DEBU 28fd [businesschannel][2ef25060] processing txid: 2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4" +"2019-05-02 09:27:51.714 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28fe retrieveTransactionByID() - txId = [2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4]" +"2019-05-02 09:27:51.715 UTC [endorser] SimulateProposal -> DEBU 28ff [businesschannel][2ef25060] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:51.715 UTC [endorser] callChaincode -> INFO 2900 [businesschannel][2ef25060] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:51.715 UTC [chaincode] Execute -> DEBU 2901 Entry" +"2019-05-02 09:27:51.715 UTC [cscc] Invoke -> DEBU 2902 Invoke function: GetChannels" +"2019-05-02 09:27:51.716 UTC [msp.identity] Verify -> DEBU 2903 Verify: digest = 00000000 ab fc 34 7a b3 c3 81 e6 ad 68 f2 93 c3 02 c6 30 |..4z.....h.....0| +00000010 3b 78 79 b8 4a e1 0b df 63 74 a6 a1 8b 88 82 ae |;xy.J...ct......|" +"2019-05-02 09:27:51.716 UTC [msp.identity] Verify -> DEBU 2904 Verify: sig = 00000000 30 45 02 21 00 ec 61 4b 72 06 98 49 a4 3f 31 5f |0E.!..aKr..I.?1_| +00000010 c9 39 d7 30 87 35 86 1e 22 34 6d 02 92 e7 b1 86 |.9.0.5.."4m.....| +00000020 6d cf 8f 1e dc 02 20 10 f0 87 ab 09 b9 74 36 19 |m..... ......t6.| +00000030 56 52 1c 92 55 f7 5d 2d 51 da da 3b a7 bd 3c fe |VR..U.]-Q..;..<.| +00000040 d5 04 91 31 1c bc d3 |...1...|" +"2019-05-02 09:27:51.717 UTC [chaincode] handleMessage -> DEBU 2905 [2ef25060] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:51.717 UTC [chaincode] Notify -> DEBU 2906 [2ef25060] notifying Txid:2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4, channelID:businesschannel" +"2019-05-02 09:27:51.717 UTC [chaincode] Execute -> DEBU 2907 Exit" +"2019-05-02 09:27:51.717 UTC [endorser] callChaincode -> INFO 2908 [businesschannel][2ef25060] Exit chaincode: name:"cscc" (2ms)" +"2019-05-02 09:27:51.717 UTC [endorser] SimulateProposal -> DEBU 2909 [businesschannel][2ef25060] Exit" +"2019-05-02 09:27:51.717 UTC [endorser] endorseProposal -> DEBU 290a [businesschannel][2ef25060] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:51.718 UTC [endorser] endorseProposal -> DEBU 290b [businesschannel][2ef25060] escc for chaincode name:"cscc" is escc" +"2019-05-02 09:27:51.718 UTC [endorser] EndorseWithPlugin -> DEBU 290c Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4, chaincode: cscc}" +"2019-05-02 09:27:51.718 UTC [msp.identity] Sign -> DEBU 290d Sign: plaintext: 0A206B67B3A204BFF1BC0071B1CC6F8E...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:51.718 UTC [msp.identity] Sign -> DEBU 290e Sign: digest: BB4C7619526B2EDADDE7EE15D90E4B8EF6BF124AF765D67673B4AB3D56217E2E " +"2019-05-02 09:27:51.719 UTC [endorser] EndorseWithPlugin -> DEBU 290f Exiting {plugin: escc, channel: businesschannel, tx: 2ef25060e9cbd16a9f03c3361b0cb028435ce8af34ab2955c29e8617e7d11bf4, chaincode: cscc}" +"2019-05-02 09:27:51.719 UTC [endorser] endorseProposal -> DEBU 2910 [businesschannel][2ef25060] Exit" +"2019-05-02 09:27:51.719 UTC [endorser] func1 -> DEBU 2911 Exit: request from 172.18.0.8:57386" +"2019-05-02 09:27:51.720 UTC [comm.grpc.server] 1 -> INFO 2912 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57386 grpc.code=OK grpc.call_duration=8.8482ms +"2019-05-02 09:27:51.724 UTC [grpc] infof -> DEBU 2913 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:51.725 UTC [grpc] infof -> DEBU 2914 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:51.899 UTC [endorser] ProcessProposal -> DEBU 2915 Entering: request from 172.18.0.8:57390" +"2019-05-02 09:27:51.899 UTC [protoutils] ValidateProposalMessage -> DEBU 2916 ValidateProposalMessage starts for signed proposal 0xc0037094f0" +"2019-05-02 09:27:51.899 UTC [protoutils] validateChannelHeader -> DEBU 2917 validateChannelHeader info: header type 3" +"2019-05-02 09:27:51.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 2918 begin" +"2019-05-02 09:27:51.900 UTC [msp] GetManagerForChain -> DEBU 2919 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:27:51.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 291a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:27:51.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 291b creator is valid" +"2019-05-02 09:27:51.900 UTC [msp.identity] Verify -> DEBU 291c Verify: digest = 00000000 aa 9d 34 d7 4f 0e 2d 5a 14 70 0f 10 f9 1d 6e 74 |..4.O.-Z.p....nt| +00000010 47 ba bc bb 0b 6b 27 55 19 e5 62 eb 1e 4c 57 23 |G....k'U..b..LW#|" +"2019-05-02 09:27:51.900 UTC [msp.identity] Verify -> DEBU 291d Verify: sig = 00000000 30 45 02 21 00 f5 d1 29 0e 9a 96 7a 22 9b b1 f2 |0E.!...)...z"...| +00000010 10 23 20 bc fd 40 59 67 0a ea 52 f0 70 9b 54 d9 |.# ..@Yg..R.p.T.| +00000020 11 64 72 f1 7f 02 20 36 ce fc 81 8a 53 8c 98 4a |.dr... 6....S..J| +00000030 66 62 0b ed 78 89 f5 39 83 c1 9a 45 8b 9b 12 e9 |fb..x..9...E....| +00000040 e9 c9 87 c0 00 2e 69 |......i|" +"2019-05-02 09:27:51.901 UTC [protoutils] checkSignatureFromCreator -> DEBU 291e exits successfully" +"2019-05-02 09:27:51.901 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 291f validateChaincodeProposalMessage starts for proposal 0xc003460850, header 0xc003709950" +"2019-05-02 09:27:51.901 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2920 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-05-02 09:27:51.902 UTC [endorser] preProcess -> DEBU 2921 [businesschannel][3ec1dd6f] processing txid: 3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306" +"2019-05-02 09:27:51.902 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2922 retrieveTransactionByID() - txId = [3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306]" +"2019-05-02 09:27:51.902 UTC [endorser] SimulateProposal -> DEBU 2923 [businesschannel][3ec1dd6f] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:51.902 UTC [endorser] callChaincode -> INFO 2924 [businesschannel][3ec1dd6f] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:51.903 UTC [chaincode] Execute -> DEBU 2925 Entry" +"2019-05-02 09:27:51.903 UTC [cscc] Invoke -> DEBU 2926 Invoke function: GetConfigTree" +"2019-05-02 09:27:51.903 UTC [aclmgmt] CheckACL -> DEBU 2927 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigTree" +"2019-05-02 09:27:51.903 UTC [aclmgmt] CheckACL -> DEBU 2928 acl check(/Channel/Application/Readers)" +"2019-05-02 09:27:51.903 UTC [policies] Evaluate -> DEBU 2929 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:51.904 UTC [policies] Evaluate -> DEBU 292a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:51.904 UTC [policies] Evaluate -> DEBU 292b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:51.904 UTC [cauthdsl] func1 -> DEBU 292c 0xc003543be0 gate 1556789271904780500 evaluation starts" +"2019-05-02 09:27:51.904 UTC [cauthdsl] func2 -> DEBU 292d 0xc003543be0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:51.905 UTC [cauthdsl] func2 -> DEBU 292e 0xc003543be0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:51.905 UTC [cauthdsl] func2 -> DEBU 292f 0xc003543be0 principal matched by identity 0" +"2019-05-02 09:27:51.905 UTC [msp.identity] Verify -> DEBU 2930 Verify: digest = 00000000 aa 9d 34 d7 4f 0e 2d 5a 14 70 0f 10 f9 1d 6e 74 |..4.O.-Z.p....nt| +00000010 47 ba bc bb 0b 6b 27 55 19 e5 62 eb 1e 4c 57 23 |G....k'U..b..LW#|" +"2019-05-02 09:27:51.905 UTC [msp.identity] Verify -> DEBU 2931 Verify: sig = 00000000 30 45 02 21 00 f5 d1 29 0e 9a 96 7a 22 9b b1 f2 |0E.!...)...z"...| +00000010 10 23 20 bc fd 40 59 67 0a ea 52 f0 70 9b 54 d9 |.# ..@Yg..R.p.T.| +00000020 11 64 72 f1 7f 02 20 36 ce fc 81 8a 53 8c 98 4a |.dr... 6....S..J| +00000030 66 62 0b ed 78 89 f5 39 83 c1 9a 45 8b 9b 12 e9 |fb..x..9...E....| +00000040 e9 c9 87 c0 00 2e 69 |......i|" +"2019-05-02 09:27:51.906 UTC [cauthdsl] func2 -> DEBU 2932 0xc003543be0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:51.906 UTC [cauthdsl] func1 -> DEBU 2933 0xc003543be0 gate 1556789271904780500 evaluation succeeds" +"2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2934 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2935 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2936 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:51.906 UTC [policies] Evaluate -> DEBU 2937 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:51.907 UTC [chaincode] handleMessage -> DEBU 2938 [3ec1dd6f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:27:51.907 UTC [chaincode] Notify -> DEBU 2939 [3ec1dd6f] notifying Txid:3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306, channelID:businesschannel" +"2019-05-02 09:27:51.907 UTC [chaincode] Execute -> DEBU 293a Exit" +"2019-05-02 09:27:51.908 UTC [endorser] callChaincode -> INFO 293b [businesschannel][3ec1dd6f] Exit chaincode: name:"cscc" (5ms)" +"2019-05-02 09:27:51.908 UTC [endorser] SimulateProposal -> DEBU 293c [businesschannel][3ec1dd6f] Exit" +"2019-05-02 09:27:51.908 UTC [endorser] endorseProposal -> DEBU 293d [businesschannel][3ec1dd6f] Entry chaincode: name:"cscc" " +"2019-05-02 09:27:51.909 UTC [endorser] endorseProposal -> DEBU 293e [businesschannel][3ec1dd6f] escc for chaincode name:"cscc" is escc" +"2019-05-02 09:27:51.909 UTC [endorser] EndorseWithPlugin -> DEBU 293f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306, chaincode: cscc}" +"2019-05-02 09:27:51.909 UTC [msp.identity] Sign -> DEBU 2940 Sign: plaintext: 0A209037445891E6447F4E4A5C737046...455254494649434154452D2D2D2D2D0A " +"2019-05-02 09:27:51.909 UTC [msp.identity] Sign -> DEBU 2941 Sign: digest: 1C1F089306B22C542D72A6549BEF042EE439AC16B533273D756DD1C2B691BF6E " +"2019-05-02 09:27:51.909 UTC [endorser] EndorseWithPlugin -> DEBU 2942 Exiting {plugin: escc, channel: businesschannel, tx: 3ec1dd6f4a0b5df4cec5da41bd91b81ff96f909c07379eeb4402abc3362a3306, chaincode: cscc}" +"2019-05-02 09:27:51.910 UTC [endorser] endorseProposal -> DEBU 2943 [businesschannel][3ec1dd6f] Exit" +"2019-05-02 09:27:51.910 UTC [endorser] func1 -> DEBU 2944 Exit: request from 172.18.0.8:57390" +"2019-05-02 09:27:51.910 UTC [comm.grpc.server] 1 -> INFO 2945 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57390 grpc.code=OK grpc.call_duration=11.0778ms +"2019-05-02 09:27:51.914 UTC [grpc] infof -> DEBU 2946 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:51.915 UTC [grpc] infof -> DEBU 2947 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:27:52.247 UTC [msp] DeserializeIdentity -> DEBU 2948 Obtaining identity" +"2019-05-02 09:27:52.247 UTC [msp] DeserializeIdentity -> DEBU 2949 Obtaining identity" +"2019-05-02 09:27:52.248 UTC [gossip.comm] Send -> DEBU 294a Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:27:52.249 UTC [gossip.comm] sendToEndpoint -> DEBU 294b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.249 UTC [gossip.comm] sendToEndpoint -> DEBU 294c Exiting" +"2019-05-02 09:27:52.250 UTC [gossip.comm] sendToEndpoint -> DEBU 294d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.250 UTC [gossip.comm] sendToEndpoint -> DEBU 294e Exiting" +"2019-05-02 09:27:52.250 UTC [gossip.comm] sendToEndpoint -> DEBU 294f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.251 UTC [gossip.comm] sendToEndpoint -> DEBU 2950 Exiting" +"2019-05-02 09:27:52.252 UTC [gossip.comm] func1 -> DEBU 2951 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.252 UTC [gossip.gossip] handleMessage -> DEBU 2952 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.252 UTC [msp] DeserializeIdentity -> DEBU 2953 Obtaining identity" +"2019-05-02 09:27:52.252 UTC [msp.identity] Verify -> DEBU 2954 Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....| +00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|" +"2019-05-02 09:27:52.252 UTC [msp.identity] Verify -> DEBU 2955 Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj| +00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<| +00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&| +00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..| +00000040 97 4a 87 c3 f2 e2 |.J....|" +"2019-05-02 09:27:52.253 UTC [msp.identity] Verify -> DEBU 2956 Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +"2019-05-02 09:27:52.253 UTC [msp.identity] Verify -> DEBU 2957 Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +00000040 a6 7f 10 af bd 05 6d |......m|" +"2019-05-02 09:27:52.253 UTC [msp] DeserializeIdentity -> DEBU 2958 Obtaining identity" +"2019-05-02 09:27:52.253 UTC [msp] DeserializeIdentity -> DEBU 2959 Obtaining identity" +"2019-05-02 09:27:52.253 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 295a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:52.253 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 295b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.256 UTC [msp] DeserializeIdentity -> DEBU 295c Obtaining identity" +"2019-05-02 09:27:52.256 UTC [msp] DeserializeIdentity -> DEBU 295d Obtaining identity" +"2019-05-02 09:27:52.256 UTC [gossip.comm] Send -> DEBU 295e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +"2019-05-02 09:27:52.256 UTC [msp] DeserializeIdentity -> DEBU 295f Obtaining identity" +"2019-05-02 09:27:52.257 UTC [msp] DeserializeIdentity -> DEBU 2960 Obtaining identity" +"2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2961 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2962 Exiting" +"2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2963 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2964 Exiting" +"2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2965 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789269882358500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.257 UTC [gossip.comm] sendToEndpoint -> DEBU 2966 Exiting" +"2019-05-02 09:27:52.256 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2967 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.258 UTC [policies] Evaluate -> DEBU 2968 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2969 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 296a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.278 UTC [cauthdsl] func1 -> DEBU 296b 0xc003444a40 gate 1556789272278231700 evaluation starts" +"2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296c 0xc003444a40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296d 0xc003444a40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296e 0xc003444a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 296f 0xc003444a40 principal evaluation fails" +"2019-05-02 09:27:52.278 UTC [cauthdsl] func1 -> DEBU 2970 0xc003444a40 gate 1556789272278231700 evaluation fails" +"2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2971 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2972 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.278 UTC [policies] Evaluate -> DEBU 2973 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.278 UTC [cauthdsl] func1 -> DEBU 2974 0xc003445290 gate 1556789272278689800 evaluation starts" +"2019-05-02 09:27:52.278 UTC [cauthdsl] func2 -> DEBU 2975 0xc003445290 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.279 UTC [cauthdsl] func2 -> DEBU 2976 0xc003445290 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.279 UTC [cauthdsl] func2 -> DEBU 2977 0xc003445290 principal matched by identity 0" +"2019-05-02 09:27:52.279 UTC [msp.identity] Verify -> DEBU 2978 Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +"2019-05-02 09:27:52.279 UTC [msp.identity] Verify -> DEBU 2979 Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +"2019-05-02 09:27:52.279 UTC [cauthdsl] func2 -> DEBU 297a 0xc003445290 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.279 UTC [cauthdsl] func1 -> DEBU 297b 0xc003445290 gate 1556789272278689800 evaluation succeeds" +"2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 297f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.279 UTC [msp] DeserializeIdentity -> DEBU 2980 Obtaining identity" +"2019-05-02 09:27:52.279 UTC [msp] DeserializeIdentity -> DEBU 2981 Obtaining identity" +"2019-05-02 09:27:52.279 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2982 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:52.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2983 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2984 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.279 UTC [policies] Evaluate -> DEBU 2985 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2986 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2987 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 2988 0xc003428aa0 gate 1556789272280100100 evaluation starts" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2989 0xc003428aa0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 298a 0xc003428aa0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 298b 0xc003428aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 298c 0xc003428aa0 principal evaluation fails" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 298d 0xc003428aa0 gate 1556789272280100100 evaluation fails" +"2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 298e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 298f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2990 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 2991 0xc003429420 gate 1556789272280452300 evaluation starts" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2992 0xc003429420 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2993 0xc003429420 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2994 0xc003429420 principal matched by identity 0" +"2019-05-02 09:27:52.280 UTC [msp.identity] Verify -> DEBU 2995 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:27:52.280 UTC [msp.identity] Verify -> DEBU 2996 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func2 -> DEBU 2997 0xc003429420 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.280 UTC [cauthdsl] func1 -> DEBU 2998 0xc003429420 gate 1556789272280452300 evaluation succeeds" +"2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 2999 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 299a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 299b Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.280 UTC [policies] Evaluate -> DEBU 299c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.281 UTC [msp] DeserializeIdentity -> DEBU 299d Obtaining identity" +"2019-05-02 09:27:52.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 299e Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 299f Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func1 -> DEBU 29a3 0xc0033f8600 gate 1556789272281280100 evaluation starts" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a4 0xc0033f8600 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a5 0xc0033f8600 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a6 0xc0033f8600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29a7 0xc0033f8600 principal evaluation fails" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func1 -> DEBU 29a8 0xc0033f8600 gate 1556789272281280100 evaluation fails" +"2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.281 UTC [policies] Evaluate -> DEBU 29ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func1 -> DEBU 29ac 0xc0033f8e70 gate 1556789272281606900 evaluation starts" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29ad 0xc0033f8e70 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29ae 0xc0033f8e70 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29af 0xc0033f8e70 principal matched by identity 0" +"2019-05-02 09:27:52.281 UTC [msp.identity] Verify -> DEBU 29b0 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:27:52.281 UTC [msp.identity] Verify -> DEBU 29b1 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:27:52.281 UTC [cauthdsl] func2 -> DEBU 29b2 0xc0033f8e70 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.282 UTC [cauthdsl] func1 -> DEBU 29b3 0xc0033f8e70 gate 1556789272281606900 evaluation succeeds" +"2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b6 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.282 UTC [policies] Evaluate -> DEBU 29b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.282 UTC [gossip.gossip] handleMessage -> DEBU 29b8 Exiting" +"2019-05-02 09:27:52.282 UTC [gossip.gossip] handleMessage -> DEBU 29b9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.282 UTC [msp] DeserializeIdentity -> DEBU 29ba Obtaining identity" +"2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29bb Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....| +00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|" +"2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29bc Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj| +00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<| +00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&| +00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..| +00000040 97 4a 87 c3 f2 e2 |.J....|" +"2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29bd Verify: digest = 00000000 50 8c 52 36 c8 85 1c 4e d0 a8 18 f2 38 36 9e 8f |P.R6...N....86..| +00000010 a1 25 9f e6 52 7b a2 28 10 92 7a 8b af 34 6e a9 |.%..R{.(..z..4n.|" +"2019-05-02 09:27:52.282 UTC [msp.identity] Verify -> DEBU 29be Verify: sig = 00000000 30 45 02 21 00 de 7c be 8f 93 47 b2 2e d7 b2 b3 |0E.!..|...G.....| +00000010 fe 9e ef 56 8c c0 3f 51 7e fa 3a 20 b9 9c cd 39 |...V..?Q~.: ...9| +00000020 8a 49 40 c6 bd 02 20 53 3c 31 dd f4 78 5d 60 73 |.I@... S<1..x]`s| +00000030 9c ff 45 70 2e e7 94 c4 69 6f ba 3b 20 1f 0c ab |..Ep....io.; ...| +00000040 a6 7f 10 af bd 05 6d |......m|" +"2019-05-02 09:27:52.282 UTC [msp] DeserializeIdentity -> DEBU 29bf Obtaining identity" +"2019-05-02 09:27:52.283 UTC [msp] DeserializeIdentity -> DEBU 29c0 Obtaining identity" +"2019-05-02 09:27:52.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:52.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.283 UTC [cauthdsl] func1 -> DEBU 29c7 0xc0033d9c60 gate 1556789272283411600 evaluation starts" +"2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29c8 0xc0033d9c60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29c9 0xc0033d9c60 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29ca 0xc0033d9c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29cb 0xc0033d9c60 principal evaluation fails" +"2019-05-02 09:27:52.283 UTC [cauthdsl] func1 -> DEBU 29cc 0xc0033d9c60 gate 1556789272283411600 evaluation fails" +"2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29cd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.283 UTC [policies] Evaluate -> DEBU 29cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.283 UTC [cauthdsl] func1 -> DEBU 29d0 0xc0033ca4a0 gate 1556789272283751800 evaluation starts" +"2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29d1 0xc0033ca4a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29d2 0xc0033ca4a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.283 UTC [cauthdsl] func2 -> DEBU 29d3 0xc0033ca4a0 principal matched by identity 0" +"2019-05-02 09:27:52.283 UTC [msp.identity] Verify -> DEBU 29d4 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.| +00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|" +"2019-05-02 09:27:52.283 UTC [msp.identity] Verify -> DEBU 29d5 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. | +00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3| +00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$| +00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E| +00000040 ca 44 3d eb 27 9e 00 |.D=.'..|" +"2019-05-02 09:27:52.292 UTC [cauthdsl] func2 -> DEBU 29d6 0xc0033ca4a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.292 UTC [cauthdsl] func1 -> DEBU 29d7 0xc0033ca4a0 gate 1556789272283751800 evaluation succeeds" +"2019-05-02 09:27:52.293 UTC [policies] Evaluate -> DEBU 29d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.293 UTC [policies] Evaluate -> DEBU 29d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.295 UTC [policies] Evaluate -> DEBU 29da Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.296 UTC [policies] Evaluate -> DEBU 29db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.297 UTC [msp] DeserializeIdentity -> DEBU 29dc Obtaining identity" +"2019-05-02 09:27:52.298 UTC [msp] DeserializeIdentity -> DEBU 29dd Obtaining identity" +"2019-05-02 09:27:52.300 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:52.301 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29df Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29e0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.303 UTC [policies] Evaluate -> DEBU 29e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.304 UTC [policies] Evaluate -> DEBU 29e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.304 UTC [policies] Evaluate -> DEBU 29e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.306 UTC [cauthdsl] func1 -> DEBU 29e4 0xc0033cbcd0 gate 1556789272306047300 evaluation starts" +"2019-05-02 09:27:52.306 UTC [cauthdsl] func2 -> DEBU 29e5 0xc0033cbcd0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.306 UTC [cauthdsl] func2 -> DEBU 29e6 0xc0033cbcd0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.306 UTC [cauthdsl] func2 -> DEBU 29e7 0xc0033cbcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.307 UTC [cauthdsl] func2 -> DEBU 29e8 0xc0033cbcd0 principal evaluation fails" +"2019-05-02 09:27:52.307 UTC [cauthdsl] func1 -> DEBU 29e9 0xc0033cbcd0 gate 1556789272306047300 evaluation fails" +"2019-05-02 09:27:52.307 UTC [policies] Evaluate -> DEBU 29ea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.307 UTC [policies] Evaluate -> DEBU 29eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.307 UTC [policies] Evaluate -> DEBU 29ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.307 UTC [cauthdsl] func1 -> DEBU 29ed 0xc0032f4720 gate 1556789272307897900 evaluation starts" +"2019-05-02 09:27:52.307 UTC [cauthdsl] func2 -> DEBU 29ee 0xc0032f4720 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.307 UTC [cauthdsl] func2 -> DEBU 29ef 0xc0032f4720 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.308 UTC [cauthdsl] func2 -> DEBU 29f0 0xc0032f4720 principal matched by identity 0" +"2019-05-02 09:27:52.308 UTC [msp.identity] Verify -> DEBU 29f1 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:27:52.308 UTC [msp.identity] Verify -> DEBU 29f2 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:27:52.308 UTC [cauthdsl] func2 -> DEBU 29f3 0xc0032f4720 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.308 UTC [cauthdsl] func1 -> DEBU 29f4 0xc0032f4720 gate 1556789272307897900 evaluation succeeds" +"2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f7 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.308 UTC [msp] DeserializeIdentity -> DEBU 29f9 Obtaining identity" +"2019-05-02 09:27:52.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29fa Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29fb Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.308 UTC [policies] Evaluate -> DEBU 29fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.309 UTC [policies] Evaluate -> DEBU 29fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.309 UTC [policies] Evaluate -> DEBU 29fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.309 UTC [cauthdsl] func1 -> DEBU 29ff 0xc0032f5810 gate 1556789272309496700 evaluation starts" +"2019-05-02 09:27:52.309 UTC [cauthdsl] func2 -> DEBU 2a00 0xc0032f5810 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.311 UTC [cauthdsl] func2 -> DEBU 2a01 0xc0032f5810 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.312 UTC [cauthdsl] func2 -> DEBU 2a02 0xc0032f5810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.312 UTC [cauthdsl] func2 -> DEBU 2a03 0xc0032f5810 principal evaluation fails" +"2019-05-02 09:27:52.313 UTC [cauthdsl] func1 -> DEBU 2a04 0xc0032f5810 gate 1556789272309496700 evaluation fails" +"2019-05-02 09:27:52.313 UTC [policies] Evaluate -> DEBU 2a05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.313 UTC [policies] Evaluate -> DEBU 2a06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.314 UTC [policies] Evaluate -> DEBU 2a07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.314 UTC [cauthdsl] func1 -> DEBU 2a08 0xc0032b4060 gate 1556789272314300100 evaluation starts" +"2019-05-02 09:27:52.314 UTC [cauthdsl] func2 -> DEBU 2a09 0xc0032b4060 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.314 UTC [cauthdsl] func2 -> DEBU 2a0a 0xc0032b4060 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.314 UTC [cauthdsl] func2 -> DEBU 2a0b 0xc0032b4060 principal matched by identity 0" +"2019-05-02 09:27:52.314 UTC [msp.identity] Verify -> DEBU 2a0c Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:27:52.314 UTC [msp.identity] Verify -> DEBU 2a0d Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:27:52.316 UTC [gossip.election] waitForInterrupt -> DEBU 2a0e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:27:52.317 UTC [gossip.election] IsLeader -> DEBU 2a0f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:27:52.317 UTC [msp.identity] Sign -> DEBU 2a10 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510081801 " +"2019-05-02 09:27:52.318 UTC [msp.identity] Sign -> DEBU 2a11 Sign: digest: 094146C0F2228C9D7DB4175481F7A1B1DDF73F04769F4BD9E74919884DB59756 " +"2019-05-02 09:27:52.319 UTC [gossip.election] waitForInterrupt -> DEBU 2a12 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a13 Obtaining identity" +"2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a14 Obtaining identity" +"2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a15 Obtaining identity" +"2019-05-02 09:27:52.324 UTC [msp] DeserializeIdentity -> DEBU 2a16 Obtaining identity" +"2019-05-02 09:27:52.325 UTC [gossip.comm] Send -> DEBU 2a17 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:52.325 UTC [msp] DeserializeIdentity -> DEBU 2a18 Obtaining identity" +"2019-05-02 09:27:52.325 UTC [msp] DeserializeIdentity -> DEBU 2a19 Obtaining identity" +"2019-05-02 09:27:52.325 UTC [gossip.comm] sendToEndpoint -> DEBU 2a1a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.325 UTC [gossip.comm] sendToEndpoint -> DEBU 2a1b Exiting" +"2019-05-02 09:27:52.320 UTC [cauthdsl] func2 -> DEBU 2a1c 0xc0032b4060 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.327 UTC [cauthdsl] func1 -> DEBU 2a1d 0xc0032b4060 gate 1556789272314300100 evaluation succeeds" +"2019-05-02 09:27:52.327 UTC [policies] Evaluate -> DEBU 2a1e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.328 UTC [policies] Evaluate -> DEBU 2a1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.328 UTC [policies] Evaluate -> DEBU 2a20 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.328 UTC [policies] Evaluate -> DEBU 2a21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.328 UTC [gossip.gossip] handleMessage -> DEBU 2a22 Exiting" +"2019-05-02 09:27:52.328 UTC [gossip.gossip] handleMessage -> DEBU 2a23 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.328 UTC [msp.identity] Verify -> DEBU 2a24 Verify: digest = 00000000 e9 b3 e1 04 b4 60 c5 1c 8c f5 74 0c f1 cc 99 85 |.....`....t.....| +00000010 46 e1 a1 3a 65 ea fd 0b ad b3 50 e6 20 62 e1 c4 |F..:e.....P. b..|" +"2019-05-02 09:27:52.328 UTC [msp.identity] Verify -> DEBU 2a25 Verify: sig = 00000000 30 44 02 20 64 c5 c3 03 4b ec 2b c5 ae 92 50 6a |0D. d...K.+...Pj| +00000010 eb 91 31 c2 db 10 41 ec d1 55 80 1d 81 45 ea 3c |..1...A..U...E.<| +00000020 ba 55 a9 3b 02 20 15 bb 92 91 69 45 d5 b6 1d 26 |.U.;. ....iE...&| +00000030 58 31 28 56 5d d0 b3 ec 9f ea b7 e5 9a 21 d1 87 |X1(V]........!..| +00000040 97 4a 87 c3 f2 e2 |.J....|" +"2019-05-02 09:27:52.328 UTC [msp] DeserializeIdentity -> DEBU 2a26 Obtaining identity" +"2019-05-02 09:27:52.328 UTC [msp] DeserializeIdentity -> DEBU 2a27 Obtaining identity" +"2019-05-02 09:27:52.334 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a28 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:52.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a29 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.334 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a2a Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.334 UTC [policies] Evaluate -> DEBU 2a2b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.334 UTC [policies] Evaluate -> DEBU 2a2c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.334 UTC [policies] Evaluate -> DEBU 2a2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.335 UTC [cauthdsl] func1 -> DEBU 2a2e 0xc003108280 gate 1556789272335306700 evaluation starts" +"2019-05-02 09:27:52.335 UTC [cauthdsl] func2 -> DEBU 2a2f 0xc003108280 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.335 UTC [cauthdsl] func2 -> DEBU 2a30 0xc003108280 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.335 UTC [cauthdsl] func2 -> DEBU 2a31 0xc003108280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.336 UTC [cauthdsl] func2 -> DEBU 2a32 0xc003108280 principal evaluation fails" +"2019-05-02 09:27:52.336 UTC [cauthdsl] func1 -> DEBU 2a33 0xc003108280 gate 1556789272335306700 evaluation fails" +"2019-05-02 09:27:52.336 UTC [policies] Evaluate -> DEBU 2a34 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.336 UTC [policies] Evaluate -> DEBU 2a35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.336 UTC [policies] Evaluate -> DEBU 2a36 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.336 UTC [cauthdsl] func1 -> DEBU 2a37 0xc003108ac0 gate 1556789272336935700 evaluation starts" +"2019-05-02 09:27:52.336 UTC [cauthdsl] func2 -> DEBU 2a38 0xc003108ac0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.337 UTC [cauthdsl] func2 -> DEBU 2a39 0xc003108ac0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.337 UTC [cauthdsl] func2 -> DEBU 2a3a 0xc003108ac0 principal matched by identity 0" +"2019-05-02 09:27:52.337 UTC [msp.identity] Verify -> DEBU 2a3b Verify: digest = 00000000 e5 bd ca bf f4 5c 99 2d af 0b 20 93 be ae 11 70 |.....\.-.. ....p| +00000010 10 b5 2a 27 c9 6e 52 3d d2 b6 f8 9a 73 d4 4b c9 |..*'.nR=....s.K.|" +"2019-05-02 09:27:52.337 UTC [msp.identity] Verify -> DEBU 2a3c Verify: sig = 00000000 30 44 02 20 20 4c 84 d6 49 25 67 20 74 2b 37 48 |0D. L..I%g t+7H| +00000010 28 11 40 6c 84 ab 91 bd d2 d6 a5 12 cd 07 0d 4e |(.@l...........N| +00000020 79 57 c5 b0 02 20 32 af 53 90 a1 ad ca 5c 37 52 |yW... 2.S....\7R| +00000030 2d c7 a2 7a ba f9 26 37 a1 a5 a4 7c 5f 53 2b ce |-..z..&7...|_S+.| +00000040 ce 7d 53 ed 3d 8c |.}S.=.|" +"2019-05-02 09:27:52.337 UTC [cauthdsl] func2 -> DEBU 2a3d 0xc003108ac0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.337 UTC [cauthdsl] func1 -> DEBU 2a3e 0xc003108ac0 gate 1556789272336935700 evaluation succeeds" +"2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a3f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a40 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a41 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a42 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.337 UTC [msp] DeserializeIdentity -> DEBU 2a43 Obtaining identity" +"2019-05-02 09:27:52.337 UTC [msp] DeserializeIdentity -> DEBU 2a44 Obtaining identity" +"2019-05-02 09:27:52.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:52.337 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a46 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.337 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a47 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a48 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.337 UTC [policies] Evaluate -> DEBU 2a49 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.338 UTC [cauthdsl] func1 -> DEBU 2a4b 0xc00301a410 gate 1556789272338052200 evaluation starts" +"2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4c 0xc00301a410 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4d 0xc00301a410 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4e 0xc00301a410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a4f 0xc00301a410 principal evaluation fails" +"2019-05-02 09:27:52.338 UTC [cauthdsl] func1 -> DEBU 2a50 0xc00301a410 gate 1556789272338052200 evaluation fails" +"2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.338 UTC [policies] Evaluate -> DEBU 2a53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.338 UTC [cauthdsl] func1 -> DEBU 2a54 0xc00301ac50 gate 1556789272338501400 evaluation starts" +"2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a55 0xc00301ac50 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a56 0xc00301ac50 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.338 UTC [cauthdsl] func2 -> DEBU 2a57 0xc00301ac50 principal matched by identity 0" +"2019-05-02 09:27:52.338 UTC [msp.identity] Verify -> DEBU 2a58 Verify: digest = 00000000 e8 5e b9 db 71 f1 d4 4f 32 cc d6 19 8b 17 2d bd |.^..q..O2.....-.| +00000010 c3 c0 d7 f8 9a 79 c6 c0 bd 82 ec bc 47 7e 99 3d |.....y......G~.=|" +"2019-05-02 09:27:52.338 UTC [msp.identity] Verify -> DEBU 2a59 Verify: sig = 00000000 30 45 02 21 00 c7 79 07 76 3a 6d f1 18 76 a2 20 |0E.!..y.v:m..v. | +00000010 50 8b a6 48 33 3b 16 9e 22 15 33 fa 39 b5 03 33 |P..H3;..".3.9..3| +00000020 e1 ea b5 93 88 02 20 6e 0d 2f 64 73 1e 74 aa 24 |...... n./ds.t.$| +00000030 16 34 16 bc c9 c5 8d ac 41 87 2a 0b 4b bc 97 45 |.4......A.*.K..E| +00000040 ca 44 3d eb 27 9e 00 |.D=.'..|" +"2019-05-02 09:27:52.339 UTC [cauthdsl] func2 -> DEBU 2a5a 0xc00301ac50 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.339 UTC [cauthdsl] func1 -> DEBU 2a5b 0xc00301ac50 gate 1556789272338501400 evaluation succeeds" +"2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.339 UTC [msp.identity] Verify -> DEBU 2a60 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:27:52.339 UTC [msp.identity] Verify -> DEBU 2a61 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:27:52.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a62 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a63 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.339 UTC [policies] Evaluate -> DEBU 2a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.340 UTC [policies] Evaluate -> DEBU 2a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.340 UTC [policies] Evaluate -> DEBU 2a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.340 UTC [cauthdsl] func1 -> DEBU 2a67 0xc002f84350 gate 1556789272340508100 evaluation starts" +"2019-05-02 09:27:52.340 UTC [cauthdsl] func2 -> DEBU 2a68 0xc002f84350 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.340 UTC [cauthdsl] func2 -> DEBU 2a69 0xc002f84350 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.340 UTC [cauthdsl] func2 -> DEBU 2a6a 0xc002f84350 principal matched by identity 0" +"2019-05-02 09:27:52.341 UTC [msp.identity] Verify -> DEBU 2a6b Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:27:52.341 UTC [msp.identity] Verify -> DEBU 2a6c Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:27:52.341 UTC [cauthdsl] func2 -> DEBU 2a6d 0xc002f84350 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.342 UTC [cauthdsl] func1 -> DEBU 2a6e 0xc002f84350 gate 1556789272340508100 evaluation succeeds" +"2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a6f Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a71 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.342 UTC [policies] Evaluate -> DEBU 2a72 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.343 UTC [gossip.gossip] handleMessage -> DEBU 2a73 Exiting" +"2019-05-02 09:27:52.391 UTC [gossip.gossip] handleMessage -> DEBU 2a74 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 282 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a75 Got message: GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 282 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.392 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a76 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:52.393 UTC [msp.identity] Verify -> DEBU 2a77 Verify: digest = 00000000 3f f3 7b 01 4b 67 e4 ae d4 80 79 f9 d5 b1 2b e4 |?.{.Kg....y...+.| +00000010 0c 6f 9d 0c 3c 63 0a b4 63 94 de 7f 92 56 fb 0d |.o.. DEBU 2a78 Verify: sig = 00000000 30 45 02 21 00 be 57 96 1e ac ab f2 00 a2 c6 b4 |0E.!..W.........| +00000010 e4 37 61 4e a9 c2 4a 6b 5a cc e8 c7 46 c0 9e 58 |.7aN..JkZ...F..X| +00000020 ef e6 e3 40 f2 02 20 1b f5 cb 8b 68 ab 00 1c 9f |...@.. ....h....| +00000030 f0 31 0f 0e c5 b9 bc f0 65 6f 9f 31 58 53 cf d4 |.1......eo.1XS..| +00000040 d2 3b d1 8f fa 22 6e |.;..."n|" +"2019-05-02 09:27:52.394 UTC [msp.identity] Verify -> DEBU 2a79 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:21.457 UTC [msp.identity] Verify -> DEBU 2a6d Verify: sig = 00000000 30 44 02 20 3d c4 d1 89 19 f9 fb 05 17 09 e6 00 |0D. =...........| -00000010 55 30 12 ce a1 3d d6 4a 9b 17 a6 06 64 2e 39 30 |U0...=.J....d.90| -00000020 e5 ef 44 d0 02 20 17 a1 86 fb 33 f3 c7 c0 e2 33 |..D.. ....3....3| -00000030 e7 4d 05 30 ff c8 5f 67 1a 0a 16 6f b5 2a 20 c5 |.M.0.._g...o.* .| -00000040 29 fc c0 d7 4f bf |)...O.|" -"2019-05-02 01:31:21.457 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a6e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:21.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a6f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:31:21.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a70 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 " -"2019-05-02 01:31:21.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a71 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 " -"2019-05-02 01:31:21.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a72 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:21.458 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a73 Exiting" -"2019-05-02 01:31:21.459 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a74 Exiting" -"2019-05-02 01:31:21.459 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a75 Exiting" -"2019-05-02 01:31:21.459 UTC [gossip.discovery] sendMemResponse -> DEBU 2a76 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:21.459 UTC [msp] DeserializeIdentity -> DEBU 2a77 Obtaining identity" -"2019-05-02 01:31:21.454 UTC [cauthdsl] func2 -> DEBU 2a68 0xc003042520 principal evaluation fails" -"2019-05-02 01:31:21.460 UTC [cauthdsl] func1 -> DEBU 2a79 0xc003042520 gate 1556760681453909200 evaluation fails" -"2019-05-02 01:31:21.460 UTC [policies] Evaluate -> DEBU 2a7a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.460 UTC [policies] Evaluate -> DEBU 2a7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.459 UTC [msp] DeserializeIdentity -> DEBU 2a78 Obtaining identity" -"2019-05-02 01:31:21.460 UTC [gossip.comm] Send -> DEBU 2a7c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:21.460 UTC [gossip.discovery] sendMemResponse -> DEBU 2a7d Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:21.460 UTC [gossip.comm] sendToEndpoint -> DEBU 2a7e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.460 UTC [policies] Evaluate -> DEBU 2a7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:21.461 UTC [cauthdsl] func1 -> DEBU 2a81 0xc003042d60 gate 1556760681461493200 evaluation starts" -"2019-05-02 01:31:21.461 UTC [cauthdsl] func2 -> DEBU 2a82 0xc003042d60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:21.461 UTC [cauthdsl] func2 -> DEBU 2a83 0xc003042d60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:21.462 UTC [cauthdsl] func2 -> DEBU 2a84 0xc003042d60 principal matched by identity 0" -"2019-05-02 01:31:21.462 UTC [msp.identity] Verify -> DEBU 2a85 Verify: digest = 00000000 7a 48 2d 96 aa c8 69 22 9b 97 a6 8d 72 d9 6f 35 |zH-...i"....r.o5| -00000010 20 84 38 58 3b 1d 47 3d 9c 6d ab 28 ef f9 e3 c1 | .8X;.G=.m.(....|" -"2019-05-02 01:31:21.462 UTC [msp.identity] Verify -> DEBU 2a86 Verify: sig = 00000000 30 44 02 20 57 3f 08 bd cb 24 66 a7 cc 46 8a f9 |0D. W?...$f..F..| -00000010 f1 70 a3 94 89 5a ff 78 fd cc 49 b7 ec 88 bf a2 |.p...Z.x..I.....| -00000020 25 a3 3a 97 02 20 79 ef e1 52 8b 23 81 4c 00 4c |%.:.. y..R.#.L.L| -00000030 bb 71 e2 b4 1b bb 84 b0 6c 4f ba 34 1b 65 bf 10 |.q......lO.4.e..| -00000040 5e fe 69 5d e9 83 |^.i]..|" -"2019-05-02 01:31:21.461 UTC [gossip.comm] sendToEndpoint -> DEBU 2a80 Exiting" -"2019-05-02 01:31:21.463 UTC [cauthdsl] func2 -> DEBU 2a87 0xc003042d60 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:21.464 UTC [cauthdsl] func1 -> DEBU 2a88 0xc003042d60 gate 1556760681461493200 evaluation succeeds" -"2019-05-02 01:31:21.465 UTC [policies] Evaluate -> DEBU 2a89 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:21.465 UTC [policies] Evaluate -> DEBU 2a8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:21.465 UTC [policies] Evaluate -> DEBU 2a8b Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:21.465 UTC [policies] Evaluate -> DEBU 2a8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:21.465 UTC [chaincode] handleMessage -> DEBU 2a8d [cb915c8a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:21.465 UTC [chaincode] Notify -> DEBU 2a8e [cb915c8a] notifying Txid:cb915c8a1a1c299b96c98f82baec2fc213de3021d08a84dc262205b642e3155c, channelID:businesschannel" -"2019-05-02 01:31:21.466 UTC [chaincode] Execute -> DEBU 2a8f Exit" -"2019-05-02 01:31:21.466 UTC [endorser] callChaincode -> INFO 2a90 [businesschannel][cb915c8a] Exit chaincode: name:"cscc" (20ms)" -"2019-05-02 01:31:21.466 UTC [endorser] SimulateProposal -> DEBU 2a91 [businesschannel][cb915c8a] Exit" -"2019-05-02 01:31:21.467 UTC [endorser] endorseProposal -> DEBU 2a92 [businesschannel][cb915c8a] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:21.467 UTC [endorser] endorseProposal -> DEBU 2a93 [businesschannel][cb915c8a] escc for chaincode name:"cscc" is escc" -"2019-05-02 01:31:21.467 UTC [endorser] EndorseWithPlugin -> DEBU 2a94 Entering endorsement for {plugin: escc, channel: businesschannel, tx: cb915c8a1a1c299b96c98f82baec2fc213de3021d08a84dc262205b642e3155c, chaincode: cscc}" -"2019-05-02 01:31:21.468 UTC [msp.identity] Sign -> DEBU 2a95 Sign: plaintext: 0A20C0CA79A9E1DC9CC91BE619F31102...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:21.468 UTC [msp.identity] Sign -> DEBU 2a96 Sign: digest: 89C3F4AEF53F16E2A79F3FD138D3C70F01CE258E5C690735E2517E51A1F24F8A " -"2019-05-02 01:31:21.468 UTC [endorser] EndorseWithPlugin -> DEBU 2a97 Exiting {plugin: escc, channel: businesschannel, tx: cb915c8a1a1c299b96c98f82baec2fc213de3021d08a84dc262205b642e3155c, chaincode: cscc}" -"2019-05-02 01:31:21.469 UTC [endorser] endorseProposal -> DEBU 2a98 [businesschannel][cb915c8a] Exit" -"2019-05-02 01:31:21.469 UTC [endorser] func1 -> DEBU 2a99 Exit: request from 192.168.240.9:41372" -"2019-05-02 01:31:21.469 UTC [comm.grpc.server] 1 -> INFO 2a9a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41372 grpc.code=OK grpc.call_duration=29.8312ms -"2019-05-02 01:31:21.474 UTC [grpc] infof -> DEBU 2a9b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:21.475 UTC [grpc] infof -> DEBU 2a9c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:21.516 UTC [gossip.comm] func1 -> DEBU 2a9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.519 UTC [gossip.gossip] handleMessage -> DEBU 2a9e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.519 UTC [gossip.pull] HandleMessage -> DEBU 2a9f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.520 UTC [msp] DeserializeIdentity -> DEBU 2aa0 Obtaining identity" -"2019-05-02 01:31:21.520 UTC [msp] DeserializeIdentity -> DEBU 2aa1 Obtaining identity" -"2019-05-02 01:31:21.521 UTC [msp] DeserializeIdentity -> DEBU 2aa2 Obtaining identity" -"2019-05-02 01:31:21.521 UTC [msp] DeserializeIdentity -> DEBU 2aa3 Obtaining identity" -"2019-05-02 01:31:21.522 UTC [msp] DeserializeIdentity -> DEBU 2aa4 Obtaining identity" -"2019-05-02 01:31:21.522 UTC [msp] DeserializeIdentity -> DEBU 2aa5 Obtaining identity" -"2019-05-02 01:31:21.522 UTC [gossip.pull] SendDigest -> DEBU 2aa6 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:21.523 UTC [gossip.gossip] handleMessage -> DEBU 2aa7 Exiting" -"2019-05-02 01:31:21.527 UTC [gossip.comm] func1 -> DEBU 2aa8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.527 UTC [gossip.gossip] handleMessage -> DEBU 2aa9 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.530 UTC [gossip.gossip] handleMessage -> DEBU 2aaa Exiting" -"2019-05-02 01:31:21.530 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.530 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aac Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:21.530 UTC [msp] DeserializeIdentity -> DEBU 2aad Obtaining identity" -"2019-05-02 01:31:21.531 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2aae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:21.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2aaf Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:21.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ab0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:21.532 UTC [policies] Evaluate -> DEBU 2ab1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:21.533 UTC [policies] Evaluate -> DEBU 2ab2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:21.533 UTC [policies] Evaluate -> DEBU 2ab3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:21.533 UTC [cauthdsl] func1 -> DEBU 2ab4 0xc0033a1cd0 gate 1556760681533282700 evaluation starts" -"2019-05-02 01:31:21.533 UTC [cauthdsl] func2 -> DEBU 2ab5 0xc0033a1cd0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:21.533 UTC [cauthdsl] func2 -> DEBU 2ab6 0xc0033a1cd0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:21.533 UTC [cauthdsl] func2 -> DEBU 2ab7 0xc0033a1cd0 principal matched by identity 0" -"2019-05-02 01:31:21.533 UTC [msp.identity] Verify -> DEBU 2ab8 Verify: digest = 00000000 30 c5 d1 f6 30 2f e5 19 26 51 3d 31 38 f8 e4 cf |0...0/..&Q=18...| -00000010 1e 26 99 39 cc 02 04 dc be 6b 95 33 70 3b 89 73 |.&.9.....k.3p;.s|" -"2019-05-02 01:31:21.533 UTC [msp.identity] Verify -> DEBU 2ab9 Verify: sig = 00000000 30 44 02 20 58 d5 c0 5b ca a6 29 66 f9 27 d4 cd |0D. X..[..)f.'..| -00000010 b3 ff ed 4d 0c f6 01 28 cf b7 6d 4d e6 99 f1 eb |...M...(..mM....| -00000020 c2 71 e5 be 02 20 3f 4e 0a ca d0 98 f3 05 c1 2b |.q... ?N.......+| -00000030 d7 fe f1 ad 0a 54 37 10 a4 66 4f cb 4d a5 44 9a |.....T7..fO.M.D.| -00000040 33 3d 5c 6c a7 74 |3=\l.t|" -"2019-05-02 01:31:21.534 UTC [cauthdsl] func2 -> DEBU 2aba 0xc0033a1cd0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:21.534 UTC [cauthdsl] func1 -> DEBU 2abb 0xc0033a1cd0 gate 1556760681533282700 evaluation succeeds" -"2019-05-02 01:31:21.534 UTC [policies] Evaluate -> DEBU 2abc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.534 UTC [policies] Evaluate -> DEBU 2abd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.535 UTC [policies] Evaluate -> DEBU 2abe Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:21.535 UTC [policies] Evaluate -> DEBU 2abf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:21.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ac0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:21.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ac1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:21.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ac2 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 " -"2019-05-02 01:31:21.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ac3 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 " -"2019-05-02 01:31:21.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ac4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:21.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ac5 Exiting" -"2019-05-02 01:31:21.536 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ac6 Exiting" -"2019-05-02 01:31:21.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ac7 Exiting" -"2019-05-02 01:31:21.537 UTC [gossip.discovery] sendMemResponse -> DEBU 2ac8 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:21.537 UTC [msp] DeserializeIdentity -> DEBU 2ac9 Obtaining identity" -"2019-05-02 01:31:21.537 UTC [msp] DeserializeIdentity -> DEBU 2aca Obtaining identity" -"2019-05-02 01:31:21.537 UTC [msp] DeserializeIdentity -> DEBU 2acb Obtaining identity" -"2019-05-02 01:31:21.538 UTC [gossip.comm] Send -> DEBU 2acc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:21.538 UTC [gossip.discovery] sendMemResponse -> DEBU 2acd Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:21.538 UTC [gossip.comm] sendToEndpoint -> DEBU 2ace Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.539 UTC [gossip.comm] sendToEndpoint -> DEBU 2acf Exiting" -"2019-05-02 01:31:21.577 UTC [gossip.comm] func1 -> DEBU 2ad0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.578 UTC [gossip.gossip] handleMessage -> DEBU 2ad1 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.578 UTC [msp] DeserializeIdentity -> DEBU 2ad2 Obtaining identity" -"2019-05-02 01:31:21.579 UTC [msp] DeserializeIdentity -> DEBU 2ad3 Obtaining identity" -"2019-05-02 01:31:21.581 UTC [msp] DeserializeIdentity -> DEBU 2ad4 Obtaining identity" -"2019-05-02 01:31:21.581 UTC [gossip.gossip] handleMessage -> DEBU 2ad5 Exiting" -"2019-05-02 01:31:21.583 UTC [gossip.comm] func1 -> DEBU 2ad6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760679716440800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:21.583 UTC [gossip.gossip] handleMessage -> DEBU 2ad7 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760679716440800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:21.585 UTC [msp] DeserializeIdentity -> DEBU 2ad8 Obtaining identity" -"2019-05-02 01:31:21.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ad9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:21.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ada Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:21.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2adb Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:21.586 UTC [policies] Evaluate -> DEBU 2adc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:21.586 UTC [policies] Evaluate -> DEBU 2add This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:21.587 UTC [policies] Evaluate -> DEBU 2ade == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:21.587 UTC [cauthdsl] func1 -> DEBU 2adf 0xc003ace040 gate 1556760681587131000 evaluation starts" -"2019-05-02 01:31:21.587 UTC [cauthdsl] func2 -> DEBU 2ae0 0xc003ace040 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:21.587 UTC [cauthdsl] func2 -> DEBU 2ae1 0xc003ace040 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:21.587 UTC [cauthdsl] func2 -> DEBU 2ae2 0xc003ace040 principal matched by identity 0" -"2019-05-02 01:31:21.587 UTC [msp.identity] Verify -> DEBU 2ae3 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:21.587 UTC [msp.identity] Verify -> DEBU 2ae4 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:21.588 UTC [cauthdsl] func2 -> DEBU 2ae5 0xc003ace040 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:21.597 UTC [cauthdsl] func1 -> DEBU 2ae6 0xc003ace040 gate 1556760681587131000 evaluation succeeds" -"2019-05-02 01:31:21.597 UTC [policies] Evaluate -> DEBU 2ae7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.598 UTC [policies] Evaluate -> DEBU 2ae8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.598 UTC [policies] Evaluate -> DEBU 2ae9 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:21.598 UTC [policies] Evaluate -> DEBU 2aea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:21.598 UTC [msp] DeserializeIdentity -> DEBU 2aeb Obtaining identity" -"2019-05-02 01:31:21.599 UTC [gossip.gossip] handleMessage -> DEBU 2aec Exiting" -"2019-05-02 01:31:21.716 UTC [endorser] ProcessProposal -> DEBU 2aed Entering: request from 192.168.240.9:41376" -"2019-05-02 01:31:21.716 UTC [protoutils] ValidateProposalMessage -> DEBU 2aee ValidateProposalMessage starts for signed proposal 0xc0027583c0" -"2019-05-02 01:31:21.716 UTC [protoutils] validateChannelHeader -> DEBU 2aef validateChannelHeader info: header type 3" -"2019-05-02 01:31:21.716 UTC [protoutils] checkSignatureFromCreator -> DEBU 2af0 begin" -"2019-05-02 01:31:21.716 UTC [msp] GetManagerForChain -> DEBU 2af1 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:21.716 UTC [protoutils] checkSignatureFromCreator -> DEBU 2af2 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:21.717 UTC [protoutils] checkSignatureFromCreator -> DEBU 2af3 creator is valid" -"2019-05-02 01:31:21.717 UTC [msp.identity] Verify -> DEBU 2af4 Verify: digest = 00000000 0a 70 ef e6 e5 40 95 d5 c1 ec 78 86 42 54 b7 23 |.p...@....x.BT.#| -00000010 23 69 7a a8 37 ce ad b3 87 17 0a c8 d8 4e b9 34 |#iz.7........N.4|" -"2019-05-02 01:31:21.717 UTC [msp.identity] Verify -> DEBU 2af5 Verify: sig = 00000000 30 45 02 21 00 c3 c8 4e 5e 8d f8 c1 ad fd a6 e0 |0E.!...N^.......| -00000010 63 20 25 11 78 53 a8 9d 8c c0 ef 14 34 d9 93 4d |c %.xS......4..M| -00000020 8d 85 04 53 89 02 20 66 e0 c1 fe 5a 68 38 92 eb |...S.. f...Zh8..| -00000030 a1 e8 3e 40 61 48 1b ac 26 b3 2b 21 40 7a ba 8f |..>@aH..&.+!@z..| -00000040 33 d3 60 43 f2 bb e3 |3.`C...|" -"2019-05-02 01:31:21.717 UTC [protoutils] checkSignatureFromCreator -> DEBU 2af6 exits successfully" -"2019-05-02 01:31:21.717 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2af7 validateChaincodeProposalMessage starts for proposal 0xc002f7f570, header 0xc0027587d0" -"2019-05-02 01:31:21.717 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2af8 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-05-02 01:31:21.717 UTC [endorser] preProcess -> DEBU 2af9 [businesschannel][d745219f] processing txid: d745219f6e4dff1e5640a303b7103cb6924243d8ef1b645c5ab2f3972b13f157" -"2019-05-02 01:31:21.717 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2afa retrieveTransactionByID() - txId = [d745219f6e4dff1e5640a303b7103cb6924243d8ef1b645c5ab2f3972b13f157]" -"2019-05-02 01:31:21.717 UTC [endorser] SimulateProposal -> DEBU 2afb [businesschannel][d745219f] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:21.718 UTC [endorser] callChaincode -> INFO 2afc [businesschannel][d745219f] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:21.718 UTC [chaincode] Execute -> DEBU 2afd Entry" -"2019-05-02 01:31:21.718 UTC [cscc] Invoke -> DEBU 2afe Invoke function: GetChannels" -"2019-05-02 01:31:21.718 UTC [msp.identity] Verify -> DEBU 2aff Verify: digest = 00000000 0a 70 ef e6 e5 40 95 d5 c1 ec 78 86 42 54 b7 23 |.p...@....x.BT.#| -00000010 23 69 7a a8 37 ce ad b3 87 17 0a c8 d8 4e b9 34 |#iz.7........N.4|" -"2019-05-02 01:31:21.719 UTC [msp.identity] Verify -> DEBU 2b00 Verify: sig = 00000000 30 45 02 21 00 c3 c8 4e 5e 8d f8 c1 ad fd a6 e0 |0E.!...N^.......| -00000010 63 20 25 11 78 53 a8 9d 8c c0 ef 14 34 d9 93 4d |c %.xS......4..M| -00000020 8d 85 04 53 89 02 20 66 e0 c1 fe 5a 68 38 92 eb |...S.. f...Zh8..| -00000030 a1 e8 3e 40 61 48 1b ac 26 b3 2b 21 40 7a ba 8f |..>@aH..&.+!@z..| -00000040 33 d3 60 43 f2 bb e3 |3.`C...|" -"2019-05-02 01:31:21.719 UTC [chaincode] handleMessage -> DEBU 2b01 [d745219f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:21.720 UTC [chaincode] Notify -> DEBU 2b02 [d745219f] notifying Txid:d745219f6e4dff1e5640a303b7103cb6924243d8ef1b645c5ab2f3972b13f157, channelID:businesschannel" -"2019-05-02 01:31:21.720 UTC [chaincode] Execute -> DEBU 2b03 Exit" -"2019-05-02 01:31:21.720 UTC [endorser] callChaincode -> INFO 2b04 [businesschannel][d745219f] Exit chaincode: name:"cscc" (2ms)" -"2019-05-02 01:31:21.720 UTC [endorser] SimulateProposal -> DEBU 2b05 [businesschannel][d745219f] Exit" -"2019-05-02 01:31:21.720 UTC [endorser] endorseProposal -> DEBU 2b06 [businesschannel][d745219f] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:21.721 UTC [endorser] endorseProposal -> DEBU 2b07 [businesschannel][d745219f] escc for chaincode name:"cscc" is escc" -"2019-05-02 01:31:21.721 UTC [endorser] EndorseWithPlugin -> DEBU 2b08 Entering endorsement for {plugin: escc, channel: businesschannel, tx: d745219f6e4dff1e5640a303b7103cb6924243d8ef1b645c5ab2f3972b13f157, chaincode: cscc}" -"2019-05-02 01:31:21.721 UTC [msp.identity] Sign -> DEBU 2b09 Sign: plaintext: 0A209E27AEDE38781449A9E59A7304F6...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:21.721 UTC [msp.identity] Sign -> DEBU 2b0a Sign: digest: C4A564B367240E9958534B0B0DE76E9D00055050452B30BFF1FA5BD294EF76F6 " -"2019-05-02 01:31:21.721 UTC [endorser] EndorseWithPlugin -> DEBU 2b0b Exiting {plugin: escc, channel: businesschannel, tx: d745219f6e4dff1e5640a303b7103cb6924243d8ef1b645c5ab2f3972b13f157, chaincode: cscc}" -"2019-05-02 01:31:21.722 UTC [endorser] endorseProposal -> DEBU 2b0c [businesschannel][d745219f] Exit" -"2019-05-02 01:31:21.722 UTC [endorser] func1 -> DEBU 2b0d Exit: request from 192.168.240.9:41376" -"2019-05-02 01:31:21.722 UTC [comm.grpc.server] 1 -> INFO 2b0e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41376 grpc.code=OK grpc.call_duration=6.8143ms -"2019-05-02 01:31:21.726 UTC [grpc] infof -> DEBU 2b0f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:21.727 UTC [grpc] infof -> DEBU 2b10 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:21.747 UTC [gossip.comm] func1 -> DEBU 2b11 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.747 UTC [gossip.gossip] handleMessage -> DEBU 2b12 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.748 UTC [gossip.pull] HandleMessage -> DEBU 2b13 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.749 UTC [msp] DeserializeIdentity -> DEBU 2b14 Obtaining identity" -"2019-05-02 01:31:21.749 UTC [msp] DeserializeIdentity -> DEBU 2b15 Obtaining identity" -"2019-05-02 01:31:21.749 UTC [msp] DeserializeIdentity -> DEBU 2b16 Obtaining identity" -"2019-05-02 01:31:21.750 UTC [msp] DeserializeIdentity -> DEBU 2b17 Obtaining identity" -"2019-05-02 01:31:21.750 UTC [msp] DeserializeIdentity -> DEBU 2b18 Obtaining identity" -"2019-05-02 01:31:21.750 UTC [msp] DeserializeIdentity -> DEBU 2b19 Obtaining identity" -"2019-05-02 01:31:21.750 UTC [gossip.pull] SendDigest -> DEBU 2b1a Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:21.750 UTC [gossip.gossip] handleMessage -> DEBU 2b1b Exiting" -"2019-05-02 01:31:21.834 UTC [gossip.pull] Hello -> DEBU 2b1c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:21.834 UTC [gossip.comm] Send -> DEBU 2b1d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:21.835 UTC [gossip.pull] Hello -> DEBU 2b1e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:21.835 UTC [gossip.comm] Send -> DEBU 2b1f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:21.835 UTC [gossip.pull] Hello -> DEBU 2b20 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:21.835 UTC [gossip.comm] Send -> DEBU 2b21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:21.836 UTC [gossip.comm] sendToEndpoint -> DEBU 2b23 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.836 UTC [gossip.comm] sendToEndpoint -> DEBU 2b24 Exiting" -"2019-05-02 01:31:21.836 UTC [gossip.comm] sendToEndpoint -> DEBU 2b22 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.836 UTC [gossip.comm] sendToEndpoint -> DEBU 2b26 Exiting" -"2019-05-02 01:31:21.836 UTC [gossip.comm] sendToEndpoint -> DEBU 2b25 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2b27 Exiting" -"2019-05-02 01:31:21.838 UTC [gossip.gossip] handleMessage -> DEBU 2b28 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 685915821136162430 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.838 UTC [gossip.pull] HandleMessage -> DEBU 2b29 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 685915821136162430 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.840 UTC [gossip.gossip] handleMessage -> DEBU 2b2a Exiting" -"2019-05-02 01:31:21.841 UTC [gossip.comm] func1 -> DEBU 2b2b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14910239388316555611 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.841 UTC [gossip.gossip] handleMessage -> DEBU 2b2c Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14910239388316555611 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.841 UTC [gossip.comm] func1 -> DEBU 2b2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17474648981611143055 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.841 UTC [gossip.pull] HandleMessage -> DEBU 2b2e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14910239388316555611 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.842 UTC [gossip.gossip] handleMessage -> DEBU 2b2f Exiting" -"2019-05-02 01:31:21.842 UTC [gossip.gossip] handleMessage -> DEBU 2b30 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17474648981611143055 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.842 UTC [gossip.pull] HandleMessage -> DEBU 2b31 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17474648981611143055 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.842 UTC [gossip.gossip] handleMessage -> DEBU 2b32 Exiting" -"2019-05-02 01:31:21.898 UTC [gossip.comm] func1 -> DEBU 2b33 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.898 UTC [gossip.gossip] handleMessage -> DEBU 2b34 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.898 UTC [gossip.gossip] handleMessage -> DEBU 2b35 Exiting" -"2019-05-02 01:31:21.899 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b36 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.899 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b37 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:21.899 UTC [msp] DeserializeIdentity -> DEBU 2b38 Obtaining identity" -"2019-05-02 01:31:21.900 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:21.900 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b3a Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:21.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b3b Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:21.901 UTC [policies] Evaluate -> DEBU 2b3c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:21.901 UTC [policies] Evaluate -> DEBU 2b3d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:21.902 UTC [policies] Evaluate -> DEBU 2b3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:21.902 UTC [cauthdsl] func1 -> DEBU 2b3f 0xc003eb50c0 gate 1556760681902518700 evaluation starts" -"2019-05-02 01:31:21.902 UTC [cauthdsl] func2 -> DEBU 2b40 0xc003eb50c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:21.903 UTC [cauthdsl] func2 -> DEBU 2b41 0xc003eb50c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:21.906 UTC [cauthdsl] func2 -> DEBU 2b42 0xc003eb50c0 principal matched by identity 0" -"2019-05-02 01:31:21.906 UTC [msp.identity] Verify -> DEBU 2b43 Verify: digest = 00000000 b7 47 2c c4 07 9a 83 ae 21 9b d0 28 70 ef 98 a8 |.G,.....!..(p...| -00000010 92 ed a8 5a a6 4c 43 53 64 5d e7 aa 10 5d c9 ea |...Z.LCSd]...]..|" -"2019-05-02 01:31:21.906 UTC [msp.identity] Verify -> DEBU 2b44 Verify: sig = 00000000 30 45 02 21 00 f9 31 6c 1a f7 00 c3 51 2a 4e 6d |0E.!..1l....Q*Nm| -00000010 5a fb 80 31 9e d1 7a 49 4b a1 47 62 7a 31 ae c7 |Z..1..zIK.Gbz1..| -00000020 7a 66 7c ea 71 02 20 27 10 40 1a 78 62 9d 91 1d |zf|.q. '.@.xb...| -00000030 4e 05 5f 11 46 d7 40 48 5d 04 dd 9f ed 9f 31 72 |N._.F.@H].....1r| -00000040 fb ce 55 cf ed dd 85 |..U....|" -"2019-05-02 01:31:21.907 UTC [cauthdsl] func2 -> DEBU 2b45 0xc003eb50c0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:21.907 UTC [cauthdsl] func1 -> DEBU 2b46 0xc003eb50c0 gate 1556760681902518700 evaluation succeeds" -"2019-05-02 01:31:21.907 UTC [policies] Evaluate -> DEBU 2b47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.907 UTC [policies] Evaluate -> DEBU 2b48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.907 UTC [policies] Evaluate -> DEBU 2b49 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:21.908 UTC [policies] Evaluate -> DEBU 2b4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:21.908 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b4b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:21.908 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b4c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:21.908 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b4d updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 " -"2019-05-02 01:31:21.908 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b4e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 " -"2019-05-02 01:31:21.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b4f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:21.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b50 Exiting" -"2019-05-02 01:31:21.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b51 Exiting" -"2019-05-02 01:31:21.909 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b52 Exiting" -"2019-05-02 01:31:21.909 UTC [gossip.discovery] sendMemResponse -> DEBU 2b53 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:21.909 UTC [msp] DeserializeIdentity -> DEBU 2b54 Obtaining identity" -"2019-05-02 01:31:21.910 UTC [msp] DeserializeIdentity -> DEBU 2b55 Obtaining identity" -"2019-05-02 01:31:21.910 UTC [msp] DeserializeIdentity -> DEBU 2b56 Obtaining identity" -"2019-05-02 01:31:21.910 UTC [gossip.comm] Send -> DEBU 2b57 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:21.910 UTC [gossip.discovery] sendMemResponse -> DEBU 2b58 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:21.910 UTC [gossip.comm] sendToEndpoint -> DEBU 2b59 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:21.910 UTC [gossip.comm] sendToEndpoint -> DEBU 2b5a Exiting" -"2019-05-02 01:31:21.947 UTC [endorser] ProcessProposal -> DEBU 2b5b Entering: request from 192.168.240.9:41380" -"2019-05-02 01:31:21.947 UTC [protoutils] ValidateProposalMessage -> DEBU 2b5c ValidateProposalMessage starts for signed proposal 0xc0027599f0" -"2019-05-02 01:31:21.947 UTC [protoutils] validateChannelHeader -> DEBU 2b5d validateChannelHeader info: header type 3" -"2019-05-02 01:31:21.947 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b5e begin" -"2019-05-02 01:31:21.948 UTC [msp] GetManagerForChain -> DEBU 2b5f Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:21.948 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b60 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:21.948 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b61 creator is valid" -"2019-05-02 01:31:21.949 UTC [msp.identity] Verify -> DEBU 2b62 Verify: digest = 00000000 23 58 b7 a1 b1 89 02 0b f1 3b b7 1c 01 35 9d ab |#X.......;...5..| -00000010 52 48 50 3e fd c5 93 4c 7a 4f ba df df 7c 02 4e |RHP>...LzO...|.N|" -"2019-05-02 01:31:21.949 UTC [msp.identity] Verify -> DEBU 2b63 Verify: sig = 00000000 30 45 02 21 00 a4 54 e0 60 21 3b 13 10 ab ed e3 |0E.!..T.`!;.....| -00000010 72 cb 1e b9 eb 1e b7 a7 9c e4 d8 e4 b2 f0 15 18 |r...............| -00000020 65 88 f0 b6 33 02 20 1a dc a2 60 29 19 42 b5 0d |e...3. ...`).B..| -00000030 df 5f 88 85 34 4b 7f b1 8b 8f b4 71 3b 18 68 0b |._..4K.....q;.h.| -00000040 f5 c1 c9 8e 32 c1 e5 |....2..|" -"2019-05-02 01:31:21.949 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b64 exits successfully" -"2019-05-02 01:31:21.949 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b65 validateChaincodeProposalMessage starts for proposal 0xc002f7f880, header 0xc002759e00" -"2019-05-02 01:31:21.950 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b66 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-05-02 01:31:21.950 UTC [endorser] preProcess -> DEBU 2b67 [businesschannel][5ffdb7ee] processing txid: 5ffdb7ee9267a3710c8d6be8e279f4577fc825d230db5bc792c9788e0874acd5" -"2019-05-02 01:31:21.950 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2b68 retrieveTransactionByID() - txId = [5ffdb7ee9267a3710c8d6be8e279f4577fc825d230db5bc792c9788e0874acd5]" -"2019-05-02 01:31:21.950 UTC [endorser] SimulateProposal -> DEBU 2b69 [businesschannel][5ffdb7ee] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:21.950 UTC [endorser] callChaincode -> INFO 2b6a [businesschannel][5ffdb7ee] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:21.951 UTC [chaincode] Execute -> DEBU 2b6b Entry" -"2019-05-02 01:31:21.951 UTC [cscc] Invoke -> DEBU 2b6c Invoke function: GetConfigTree" -"2019-05-02 01:31:21.952 UTC [aclmgmt] CheckACL -> DEBU 2b6d acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigTree" -"2019-05-02 01:31:21.953 UTC [aclmgmt] CheckACL -> DEBU 2b6e acl check(/Channel/Application/Readers)" -"2019-05-02 01:31:21.953 UTC [policies] Evaluate -> DEBU 2b6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:21.953 UTC [policies] Evaluate -> DEBU 2b70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:21.953 UTC [policies] Evaluate -> DEBU 2b71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:21.953 UTC [cauthdsl] func1 -> DEBU 2b72 0xc0044145e0 gate 1556760681953554500 evaluation starts" -"2019-05-02 01:31:21.953 UTC [cauthdsl] func2 -> DEBU 2b73 0xc0044145e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:21.954 UTC [cauthdsl] func2 -> DEBU 2b74 0xc0044145e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:21.954 UTC [cauthdsl] func2 -> DEBU 2b75 0xc0044145e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:21.954 UTC [cauthdsl] func2 -> DEBU 2b76 0xc0044145e0 principal evaluation fails" -"2019-05-02 01:31:21.954 UTC [cauthdsl] func1 -> DEBU 2b77 0xc0044145e0 gate 1556760681953554500 evaluation fails" -"2019-05-02 01:31:21.954 UTC [policies] Evaluate -> DEBU 2b78 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.955 UTC [policies] Evaluate -> DEBU 2b79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:21.955 UTC [policies] Evaluate -> DEBU 2b7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:21.956 UTC [cauthdsl] func1 -> DEBU 2b7b 0xc004414e20 gate 1556760681955910500 evaluation starts" -"2019-05-02 01:31:21.956 UTC [cauthdsl] func2 -> DEBU 2b7c 0xc004414e20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:21.956 UTC [cauthdsl] func2 -> DEBU 2b7d 0xc004414e20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:21.956 UTC [cauthdsl] func2 -> DEBU 2b7e 0xc004414e20 principal matched by identity 0" -"2019-05-02 01:31:21.956 UTC [msp.identity] Verify -> DEBU 2b7f Verify: digest = 00000000 23 58 b7 a1 b1 89 02 0b f1 3b b7 1c 01 35 9d ab |#X.......;...5..| -00000010 52 48 50 3e fd c5 93 4c 7a 4f ba df df 7c 02 4e |RHP>...LzO...|.N|" -"2019-05-02 01:31:21.956 UTC [msp.identity] Verify -> DEBU 2b80 Verify: sig = 00000000 30 45 02 21 00 a4 54 e0 60 21 3b 13 10 ab ed e3 |0E.!..T.`!;.....| -00000010 72 cb 1e b9 eb 1e b7 a7 9c e4 d8 e4 b2 f0 15 18 |r...............| -00000020 65 88 f0 b6 33 02 20 1a dc a2 60 29 19 42 b5 0d |e...3. ...`).B..| -00000030 df 5f 88 85 34 4b 7f b1 8b 8f b4 71 3b 18 68 0b |._..4K.....q;.h.| -00000040 f5 c1 c9 8e 32 c1 e5 |....2..|" -"2019-05-02 01:31:21.957 UTC [cauthdsl] func2 -> DEBU 2b81 0xc004414e20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:21.957 UTC [cauthdsl] func1 -> DEBU 2b82 0xc004414e20 gate 1556760681955910500 evaluation succeeds" -"2019-05-02 01:31:21.958 UTC [policies] Evaluate -> DEBU 2b83 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:21.958 UTC [policies] Evaluate -> DEBU 2b84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:21.958 UTC [policies] Evaluate -> DEBU 2b85 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:21.958 UTC [policies] Evaluate -> DEBU 2b86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:21.959 UTC [chaincode] handleMessage -> DEBU 2b87 [5ffdb7ee] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:21.959 UTC [chaincode] Notify -> DEBU 2b88 [5ffdb7ee] notifying Txid:5ffdb7ee9267a3710c8d6be8e279f4577fc825d230db5bc792c9788e0874acd5, channelID:businesschannel" -"2019-05-02 01:31:21.959 UTC [chaincode] Execute -> DEBU 2b89 Exit" -"2019-05-02 01:31:21.959 UTC [endorser] callChaincode -> INFO 2b8a [businesschannel][5ffdb7ee] Exit chaincode: name:"cscc" (8ms)" -"2019-05-02 01:31:21.959 UTC [endorser] SimulateProposal -> DEBU 2b8b [businesschannel][5ffdb7ee] Exit" -"2019-05-02 01:31:21.959 UTC [endorser] endorseProposal -> DEBU 2b8c [businesschannel][5ffdb7ee] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:21.960 UTC [endorser] endorseProposal -> DEBU 2b8d [businesschannel][5ffdb7ee] escc for chaincode name:"cscc" is escc" -"2019-05-02 01:31:21.960 UTC [endorser] EndorseWithPlugin -> DEBU 2b8e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 5ffdb7ee9267a3710c8d6be8e279f4577fc825d230db5bc792c9788e0874acd5, chaincode: cscc}" -"2019-05-02 01:31:21.960 UTC [msp.identity] Sign -> DEBU 2b8f Sign: plaintext: 0A20E90A864FB1965C22EBDA382B7EAA...455254494649434154452D2D2D2D2D0A " -"2019-05-02 01:31:21.960 UTC [msp.identity] Sign -> DEBU 2b90 Sign: digest: 0C9C0682AC0077138A785598301515EB8DBDC96EFF5196D7F00BA5F2294C4EE9 " -"2019-05-02 01:31:21.961 UTC [endorser] EndorseWithPlugin -> DEBU 2b91 Exiting {plugin: escc, channel: businesschannel, tx: 5ffdb7ee9267a3710c8d6be8e279f4577fc825d230db5bc792c9788e0874acd5, chaincode: cscc}" -"2019-05-02 01:31:21.961 UTC [endorser] endorseProposal -> DEBU 2b92 [businesschannel][5ffdb7ee] Exit" -"2019-05-02 01:31:21.961 UTC [endorser] func1 -> DEBU 2b93 Exit: request from 192.168.240.9:41380" -"2019-05-02 01:31:21.961 UTC [comm.grpc.server] 1 -> INFO 2b94 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41380 grpc.code=OK grpc.call_duration=14.4058ms -"2019-05-02 01:31:21.967 UTC [grpc] infof -> DEBU 2b95 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:21.967 UTC [grpc] infof -> DEBU 2b96 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:21.983 UTC [gossip.election] waitForInterrupt -> DEBU 2b97 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:21.983 UTC [gossip.election] IsLeader -> DEBU 2b98 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:21.983 UTC [msp.identity] Sign -> DEBU 2b99 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD1510091801 " -"2019-05-02 01:31:21.983 UTC [msp.identity] Sign -> DEBU 2b9a Sign: digest: E30F48869DFE060D4EC0F2C02962365C69C96CAF42C83AC0A2554C89558D45A1 " -"2019-05-02 01:31:21.983 UTC [gossip.election] waitForInterrupt -> DEBU 2b9b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:21.988 UTC [msp] DeserializeIdentity -> DEBU 2b9c Obtaining identity" -"2019-05-02 01:31:21.988 UTC [msp] DeserializeIdentity -> DEBU 2b9d Obtaining identity" -"2019-05-02 01:31:21.988 UTC [msp] DeserializeIdentity -> DEBU 2b9e Obtaining identity" -"2019-05-02 01:31:21.988 UTC [msp] DeserializeIdentity -> DEBU 2b9f Obtaining identity" -"2019-05-02 01:31:21.988 UTC [gossip.comm] Send -> DEBU 2ba0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:21.989 UTC [msp] DeserializeIdentity -> DEBU 2ba1 Obtaining identity" -"2019-05-02 01:31:21.989 UTC [msp] DeserializeIdentity -> DEBU 2ba2 Obtaining identity" -"2019-05-02 01:31:21.989 UTC [gossip.comm] sendToEndpoint -> DEBU 2ba3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -"2019-05-02 01:31:21.989 UTC [gossip.comm] sendToEndpoint -> DEBU 2ba4 Exiting" -"2019-05-02 01:31:22.067 UTC [msp.identity] Sign -> DEBU 2ba5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15101F " -"2019-05-02 01:31:22.067 UTC [msp.identity] Sign -> DEBU 2ba6 Sign: digest: 9C87865A50B0235A7D978FF37F5BCA502998A16CB3A9C77D17E653FB020E1275 " -"2019-05-02 01:31:22.067 UTC [msp.identity] Sign -> DEBU 2ba7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:22.067 UTC [msp.identity] Sign -> DEBU 2ba8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:22.068 UTC [gossip.comm] Send -> DEBU 2ba9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:22.068 UTC [msp] DeserializeIdentity -> DEBU 2baa Obtaining identity" -"2019-05-02 01:31:22.069 UTC [gossip.comm] Send -> DEBU 2bab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:22.069 UTC [msp] DeserializeIdentity -> DEBU 2bac Obtaining identity" -"2019-05-02 01:31:22.069 UTC [gossip.comm] sendToEndpoint -> DEBU 2bad Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.069 UTC [gossip.comm] sendToEndpoint -> DEBU 2bae Exiting" -"2019-05-02 01:31:22.069 UTC [gossip.comm] Send -> DEBU 2baf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:22.069 UTC [gossip.comm] sendToEndpoint -> DEBU 2bb0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.069 UTC [gossip.comm] sendToEndpoint -> DEBU 2bb1 Exiting" -"2019-05-02 01:31:22.075 UTC [gossip.comm] func1 -> DEBU 2bb2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.075 UTC [gossip.gossip] handleMessage -> DEBU 2bb3 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.075 UTC [gossip.gossip] handleMessage -> DEBU 2bb4 Exiting" -"2019-05-02 01:31:22.075 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bb5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.075 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bb6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:22.075 UTC [msp.identity] Verify -> DEBU 2bb7 Verify: digest = 00000000 32 7c 02 b3 20 b7 22 b7 bc 8f 19 5a 4a 0a 4d 7d |2|.. ."....ZJ.M}| -00000010 70 94 b3 e6 bb a8 bf 8c 10 50 b2 1d ec ad 63 2a |p........P....c*|" -"2019-05-02 01:31:22.076 UTC [msp.identity] Verify -> DEBU 2bb8 Verify: sig = 00000000 30 44 02 20 4c b2 0a c6 7b 9c 32 9f f9 d6 64 76 |0D. L...{.2...dv| -00000010 f4 a9 dc f1 5a 67 f6 86 54 21 05 d6 05 92 7e 25 |....Zg..T!....~%| -00000020 5b 03 d6 30 02 20 68 48 47 ea d5 b7 cd b6 79 c5 |[..0. hHG.....y.| -00000030 5d 72 10 6c 84 51 9a a5 26 b3 9b 6b 06 2a 1d 3c |]r.l.Q..&..k.*.<| -00000040 bd c9 0f 96 1c 28 |.....(|" -"2019-05-02 01:31:22.081 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bb9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:22.081 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bba Exiting" -"2019-05-02 01:31:22.081 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bbb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:22.081 UTC [msp] DeserializeIdentity -> DEBU 2bbc Obtaining identity" -"2019-05-02 01:31:22.082 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bbd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:22.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bbe Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:22.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bbf Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:22.082 UTC [policies] Evaluate -> DEBU 2bc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:22.083 UTC [policies] Evaluate -> DEBU 2bc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:22.083 UTC [policies] Evaluate -> DEBU 2bc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:22.083 UTC [cauthdsl] func1 -> DEBU 2bc3 0xc0026f6570 gate 1556760682083219300 evaluation starts" -"2019-05-02 01:31:22.083 UTC [cauthdsl] func2 -> DEBU 2bc4 0xc0026f6570 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:22.083 UTC [cauthdsl] func2 -> DEBU 2bc5 0xc0026f6570 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:22.083 UTC [cauthdsl] func2 -> DEBU 2bc6 0xc0026f6570 principal matched by identity 0" -"2019-05-02 01:31:22.083 UTC [msp.identity] Verify -> DEBU 2bc7 Verify: digest = 00000000 b7 47 2c c4 07 9a 83 ae 21 9b d0 28 70 ef 98 a8 |.G,.....!..(p...| -00000010 92 ed a8 5a a6 4c 43 53 64 5d e7 aa 10 5d c9 ea |...Z.LCSd]...]..|" -"2019-05-02 01:31:22.083 UTC [msp.identity] Verify -> DEBU 2bc8 Verify: sig = 00000000 30 45 02 21 00 f9 31 6c 1a f7 00 c3 51 2a 4e 6d |0E.!..1l....Q*Nm| -00000010 5a fb 80 31 9e d1 7a 49 4b a1 47 62 7a 31 ae c7 |Z..1..zIK.Gbz1..| -00000020 7a 66 7c ea 71 02 20 27 10 40 1a 78 62 9d 91 1d |zf|.q. '.@.xb...| -00000030 4e 05 5f 11 46 d7 40 48 5d 04 dd 9f ed 9f 31 72 |N._.F.@H].....1r| -00000040 fb ce 55 cf ed dd 85 |..U....|" -"2019-05-02 01:31:22.083 UTC [cauthdsl] func2 -> DEBU 2bc9 0xc0026f6570 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:22.083 UTC [cauthdsl] func1 -> DEBU 2bca 0xc0026f6570 gate 1556760682083219300 evaluation succeeds" -"2019-05-02 01:31:22.083 UTC [policies] Evaluate -> DEBU 2bcb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:22.083 UTC [policies] Evaluate -> DEBU 2bcc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:22.084 UTC [policies] Evaluate -> DEBU 2bcd Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:22.084 UTC [policies] Evaluate -> DEBU 2bce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:22.084 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bcf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:22.084 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bd0 Exiting" -"2019-05-02 01:31:22.084 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bd1 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:22.084 UTC [msp.identity] Verify -> DEBU 2bd2 Verify: digest = 00000000 9c 87 86 5a 50 b0 23 5a 7d 97 8f f3 7f 5b ca 50 |...ZP.#Z}....[.P| -00000010 29 98 a1 6c b3 a9 c7 7d 17 e6 53 fb 02 0e 12 75 |)..l...}..S....u|" -"2019-05-02 01:31:22.084 UTC [msp.identity] Verify -> DEBU 2bd3 Verify: sig = 00000000 30 45 02 21 00 c0 03 74 eb b2 17 1d fd 62 d4 95 |0E.!...t.....b..| -00000010 de 01 f8 2e 3c 72 f0 48 18 df 2e 30 6d 5e a5 37 |.... DEBU 2bd4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:22.084 UTC [gossip.discovery] isSentByMe -> DEBU 2bd5 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:22.084 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bd6 Exiting" -"2019-05-02 01:31:22.084 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd7 Exiting" -"2019-05-02 01:31:22.085 UTC [gossip.gossip] handleMessage -> DEBU 2bd8 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.085 UTC [gossip.gossip] handleMessage -> DEBU 2bd9 Exiting" -"2019-05-02 01:31:22.085 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bda Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.085 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bdb Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:22.085 UTC [msp.identity] Verify -> DEBU 2bdc Verify: digest = 00000000 9c 87 86 5a 50 b0 23 5a 7d 97 8f f3 7f 5b ca 50 |...ZP.#Z}....[.P| -00000010 29 98 a1 6c b3 a9 c7 7d 17 e6 53 fb 02 0e 12 75 |)..l...}..S....u|" -"2019-05-02 01:31:22.085 UTC [msp.identity] Verify -> DEBU 2bdd Verify: sig = 00000000 30 45 02 21 00 c0 03 74 eb b2 17 1d fd 62 d4 95 |0E.!...t.....b..| -00000010 de 01 f8 2e 3c 72 f0 48 18 df 2e 30 6d 5e a5 37 |.... DEBU 2bde Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.089 UTC [gossip.comm] sendToEndpoint -> DEBU 2bdf Exiting" -"2019-05-02 01:31:22.086 UTC [msp.identity] Verify -> DEBU 2be0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:27:52.394 UTC [msp.identity] Verify -> DEBU 2a7a Verify: sig = 00000000 30 44 02 20 0c 06 0f 84 b0 9e 4f e5 d1 98 3d 7a |0D. ......O...=z| +00000010 d1 0e d7 8d e4 4c 4c 6e 83 91 b6 d9 ee 11 48 02 |.....LLn......H.| +00000020 ee 00 97 4b 02 20 0b 54 fc ee 22 eb 98 0b 50 b1 |...K. .T.."...P.| +00000030 05 35 52 2e 70 a6 c7 11 be ca 1a 57 b7 75 49 8f |.5R.p......W.uI.| +00000040 a7 03 ae ab 64 57 |....dW|" +"2019-05-02 09:27:52.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a7b Exiting" +"2019-05-02 09:27:52.395 UTC [gossip.discovery] sendMemResponse -> DEBU 2a7c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:52.396 UTC [msp] DeserializeIdentity -> DEBU 2a7d Obtaining identity" +"2019-05-02 09:27:52.396 UTC [msp] DeserializeIdentity -> DEBU 2a7e Obtaining identity" +"2019-05-02 09:27:52.396 UTC [gossip.comm] Send -> DEBU 2a7f Entering, sending GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:52.396 UTC [gossip.discovery] sendMemResponse -> DEBU 2a80 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:52.397 UTC [gossip.comm] sendToEndpoint -> DEBU 2a81 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9965126687296294640, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.397 UTC [gossip.comm] sendToEndpoint -> DEBU 2a82 Exiting" +"2019-05-02 09:27:52.397 UTC [gossip.gossip] handleMessage -> DEBU 2a83 Exiting" +"2019-05-02 09:27:52.504 UTC [gossip.gossip] handleMessage -> DEBU 2a84 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.506 UTC [msp] DeserializeIdentity -> DEBU 2a85 Obtaining identity" +"2019-05-02 09:27:52.506 UTC [msp] DeserializeIdentity -> DEBU 2a86 Obtaining identity" +"2019-05-02 09:27:52.507 UTC [gossip.gossip] handleMessage -> DEBU 2a87 Exiting" +"2019-05-02 09:27:52.518 UTC [gossip.gossip] handleMessage -> DEBU 2a88 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.522 UTC [msp.identity] Verify -> DEBU 2a89 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:27:52.522 UTC [msp.identity] Verify -> DEBU 2a8a Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:27:52.523 UTC [gossip.gossip] handleMessage -> DEBU 2a8b Exiting" +"2019-05-02 09:27:52.523 UTC [gossip.gossip] handleMessage -> DEBU 2a8c Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.523 UTC [msp.identity] Verify -> DEBU 2a8d Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:27:52.523 UTC [msp.identity] Verify -> DEBU 2a8e Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:27:52.524 UTC [msp] DeserializeIdentity -> DEBU 2a8f Obtaining identity" +"2019-05-02 09:27:52.524 UTC [gossip.gossip] handleMessage -> DEBU 2a90 Exiting" +"2019-05-02 09:27:52.530 UTC [gossip.comm] func1 -> DEBU 2a91 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.530 UTC [gossip.gossip] handleMessage -> DEBU 2a92 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789269857613300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.531 UTC [msp.identity] Verify -> DEBU 2a93 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:27:52.531 UTC [msp.identity] Verify -> DEBU 2a94 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:27:52.531 UTC [msp] DeserializeIdentity -> DEBU 2a95 Obtaining identity" +"2019-05-02 09:27:52.531 UTC [gossip.gossip] handleMessage -> DEBU 2a96 Exiting" +"2019-05-02 09:27:52.557 UTC [gossip.gossip] handleMessage -> DEBU 2a97 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.558 UTC [gossip.pull] HandleMessage -> DEBU 2a98 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.558 UTC [gossip.pull] SendDigest -> DEBU 2a99 Sending BLOCK_MSG digest: [4 5 6 7 8 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:52.559 UTC [gossip.gossip] handleMessage -> DEBU 2a9a Exiting" +"2019-05-02 09:27:52.751 UTC [gossip.gossip] handleMessage -> DEBU 2a9b Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.751 UTC [msp] DeserializeIdentity -> DEBU 2a9c Obtaining identity" +"2019-05-02 09:27:52.752 UTC [msp] DeserializeIdentity -> DEBU 2a9d Obtaining identity" +"2019-05-02 09:27:52.752 UTC [msp] DeserializeIdentity -> DEBU 2a9e Obtaining identity" +"2019-05-02 09:27:52.753 UTC [gossip.gossip] handleMessage -> DEBU 2a9f Exiting" +"2019-05-02 09:27:52.762 UTC [gossip.gossip] handleMessage -> DEBU 2aa0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789269839972700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.766 UTC [msp] DeserializeIdentity -> DEBU 2aa1 Obtaining identity" +"2019-05-02 09:27:52.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2aa2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:52.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2aa3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2aa4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.769 UTC [policies] Evaluate -> DEBU 2aa5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.770 UTC [policies] Evaluate -> DEBU 2aa6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.770 UTC [policies] Evaluate -> DEBU 2aa7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.771 UTC [cauthdsl] func1 -> DEBU 2aa8 0xc002ee0090 gate 1556789272770718900 evaluation starts" +"2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aa9 0xc002ee0090 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aaa 0xc002ee0090 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aab 0xc002ee0090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.772 UTC [cauthdsl] func2 -> DEBU 2aac 0xc002ee0090 principal evaluation fails" +"2019-05-02 09:27:52.772 UTC [cauthdsl] func1 -> DEBU 2aad 0xc002ee0090 gate 1556789272770718900 evaluation fails" +"2019-05-02 09:27:52.772 UTC [policies] Evaluate -> DEBU 2aae Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.772 UTC [policies] Evaluate -> DEBU 2aaf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.773 UTC [policies] Evaluate -> DEBU 2ab0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.774 UTC [cauthdsl] func1 -> DEBU 2ab1 0xc002ee08d0 gate 1556789272773770200 evaluation starts" +"2019-05-02 09:27:52.774 UTC [cauthdsl] func2 -> DEBU 2ab2 0xc002ee08d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.774 UTC [cauthdsl] func2 -> DEBU 2ab3 0xc002ee08d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.775 UTC [cauthdsl] func2 -> DEBU 2ab4 0xc002ee08d0 principal matched by identity 0" +"2019-05-02 09:27:52.775 UTC [msp.identity] Verify -> DEBU 2ab5 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:27:52.775 UTC [msp.identity] Verify -> DEBU 2ab6 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:27:52.776 UTC [cauthdsl] func2 -> DEBU 2ab7 0xc002ee08d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.776 UTC [cauthdsl] func1 -> DEBU 2ab8 0xc002ee08d0 gate 1556789272773770200 evaluation succeeds" +"2019-05-02 09:27:52.776 UTC [policies] Evaluate -> DEBU 2ab9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU 2aba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU 2abb Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.777 UTC [policies] Evaluate -> DEBU 2abc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.777 UTC [msp] DeserializeIdentity -> DEBU 2abd Obtaining identity" +"2019-05-02 09:27:52.778 UTC [gossip.gossip] handleMessage -> DEBU 2abe Exiting" +"2019-05-02 09:27:52.782 UTC [gossip.comm] func1 -> DEBU 2abf Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789269839972700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.782 UTC [gossip.gossip] handleMessage -> DEBU 2ac0 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789269839972700 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:27:52.782 UTC [msp] DeserializeIdentity -> DEBU 2ac1 Obtaining identity" +"2019-05-02 09:27:52.783 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ac2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:52.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ac3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ac4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.783 UTC [policies] Evaluate -> DEBU 2ac5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.784 UTC [policies] Evaluate -> DEBU 2ac6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.784 UTC [policies] Evaluate -> DEBU 2ac7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.784 UTC [cauthdsl] func1 -> DEBU 2ac8 0xc002ea6590 gate 1556789272784549100 evaluation starts" +"2019-05-02 09:27:52.784 UTC [cauthdsl] func2 -> DEBU 2ac9 0xc002ea6590 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.785 UTC [cauthdsl] func2 -> DEBU 2aca 0xc002ea6590 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.785 UTC [cauthdsl] func2 -> DEBU 2acb 0xc002ea6590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.785 UTC [cauthdsl] func2 -> DEBU 2acc 0xc002ea6590 principal evaluation fails" +"2019-05-02 09:27:52.786 UTC [cauthdsl] func1 -> DEBU 2acd 0xc002ea6590 gate 1556789272784549100 evaluation fails" +"2019-05-02 09:27:52.786 UTC [policies] Evaluate -> DEBU 2ace Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.786 UTC [policies] Evaluate -> DEBU 2acf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.786 UTC [policies] Evaluate -> DEBU 2ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.787 UTC [cauthdsl] func1 -> DEBU 2ad1 0xc002ea6f00 gate 1556789272787102400 evaluation starts" +"2019-05-02 09:27:52.787 UTC [cauthdsl] func2 -> DEBU 2ad2 0xc002ea6f00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.787 UTC [cauthdsl] func2 -> DEBU 2ad3 0xc002ea6f00 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.787 UTC [cauthdsl] func2 -> DEBU 2ad4 0xc002ea6f00 principal matched by identity 0" +"2019-05-02 09:27:52.788 UTC [msp.identity] Verify -> DEBU 2ad5 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:27:52.788 UTC [msp.identity] Verify -> DEBU 2ad6 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:27:52.789 UTC [cauthdsl] func2 -> DEBU 2ad7 0xc002ea6f00 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.789 UTC [cauthdsl] func1 -> DEBU 2ad8 0xc002ea6f00 gate 1556789272787102400 evaluation succeeds" +"2019-05-02 09:27:52.790 UTC [policies] Evaluate -> DEBU 2ad9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.791 UTC [policies] Evaluate -> DEBU 2ada == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.792 UTC [policies] Evaluate -> DEBU 2adb Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.792 UTC [policies] Evaluate -> DEBU 2adc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.792 UTC [msp] DeserializeIdentity -> DEBU 2add Obtaining identity" +"2019-05-02 09:27:52.793 UTC [gossip.gossip] handleMessage -> DEBU 2ade Exiting" +"2019-05-02 09:27:52.815 UTC [gossip.comm] func1 -> DEBU 2adf Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.815 UTC [gossip.gossip] handleMessage -> DEBU 2ae0 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.818 UTC [gossip.pull] HandleMessage -> DEBU 2ae1 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.819 UTC [msp] DeserializeIdentity -> DEBU 2ae2 Obtaining identity" +"2019-05-02 09:27:52.820 UTC [msp] DeserializeIdentity -> DEBU 2ae3 Obtaining identity" +"2019-05-02 09:27:52.821 UTC [msp] DeserializeIdentity -> DEBU 2ae4 Obtaining identity" +"2019-05-02 09:27:52.821 UTC [msp] DeserializeIdentity -> DEBU 2ae5 Obtaining identity" +"2019-05-02 09:27:52.822 UTC [msp] DeserializeIdentity -> DEBU 2ae6 Obtaining identity" +"2019-05-02 09:27:52.822 UTC [msp] DeserializeIdentity -> DEBU 2ae7 Obtaining identity" +"2019-05-02 09:27:52.823 UTC [gossip.pull] SendDigest -> DEBU 2ae8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:52.823 UTC [gossip.gossip] handleMessage -> DEBU 2ae9 Exiting" +"2019-05-02 09:27:52.834 UTC [gossip.comm] func1 -> DEBU 2aea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.834 UTC [gossip.gossip] handleMessage -> DEBU 2aeb Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.835 UTC [gossip.gossip] handleMessage -> DEBU 2aec Exiting" +"2019-05-02 09:27:52.836 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.837 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aee Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:52.837 UTC [msp] DeserializeIdentity -> DEBU 2aef Obtaining identity" +"2019-05-02 09:27:52.838 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2af0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:52.839 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2af1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2af2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.842 UTC [policies] Evaluate -> DEBU 2af3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.842 UTC [policies] Evaluate -> DEBU 2af4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.842 UTC [policies] Evaluate -> DEBU 2af5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.846 UTC [cauthdsl] func1 -> DEBU 2af6 0xc002e59910 gate 1556789272843494600 evaluation starts" +"2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2af7 0xc002e59910 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2af8 0xc002e59910 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2af9 0xc002e59910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.846 UTC [cauthdsl] func2 -> DEBU 2afa 0xc002e59910 principal evaluation fails" +"2019-05-02 09:27:52.846 UTC [cauthdsl] func1 -> DEBU 2afb 0xc002e59910 gate 1556789272843494600 evaluation fails" +"2019-05-02 09:27:52.846 UTC [policies] Evaluate -> DEBU 2afc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.847 UTC [policies] Evaluate -> DEBU 2afd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.847 UTC [policies] Evaluate -> DEBU 2afe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.847 UTC [cauthdsl] func1 -> DEBU 2aff 0xc002e42170 gate 1556789272847526700 evaluation starts" +"2019-05-02 09:27:52.847 UTC [cauthdsl] func2 -> DEBU 2b00 0xc002e42170 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.848 UTC [cauthdsl] func2 -> DEBU 2b01 0xc002e42170 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.848 UTC [cauthdsl] func2 -> DEBU 2b02 0xc002e42170 principal matched by identity 0" +"2019-05-02 09:27:52.848 UTC [msp.identity] Verify -> DEBU 2b03 Verify: digest = 00000000 aa dd c4 28 04 7b e8 7f ee 60 d5 11 ef d5 b6 9c |...(.{...`......| +00000010 05 1a 30 65 4e 65 1c 84 8e 73 63 5c b3 7a b3 3c |..0eNe...sc\.z.<|" +"2019-05-02 09:27:52.848 UTC [msp.identity] Verify -> DEBU 2b04 Verify: sig = 00000000 30 44 02 20 31 36 16 86 3a 1f 47 9b ed ee e2 8e |0D. 16..:.G.....| +00000010 87 e8 03 8d 95 10 41 0b d6 15 bb 6e cd dd d1 8d |......A....n....| +00000020 0a 13 f0 6e 02 20 10 6a 41 fb 11 d0 f2 35 21 c9 |...n. .jA....5!.| +00000030 b8 08 64 ac 50 cf b1 7d eb 21 f9 f2 f0 ee a6 ce |..d.P..}.!......| +00000040 72 8c e1 c3 66 83 |r...f.|" +"2019-05-02 09:27:52.849 UTC [cauthdsl] func2 -> DEBU 2b05 0xc002e42170 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.849 UTC [cauthdsl] func1 -> DEBU 2b06 0xc002e42170 gate 1556789272847526700 evaluation succeeds" +"2019-05-02 09:27:52.849 UTC [policies] Evaluate -> DEBU 2b07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.850 UTC [policies] Evaluate -> DEBU 2b08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:52.850 UTC [policies] Evaluate -> DEBU 2b09 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:52.850 UTC [policies] Evaluate -> DEBU 2b0a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:52.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b0b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:52.850 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:52.850 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0d updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 " +"2019-05-02 09:27:52.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 " +"2019-05-02 09:27:52.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b0f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:52.852 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b10 Exiting" +"2019-05-02 09:27:52.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b11 Exiting" +"2019-05-02 09:27:52.853 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b12 Exiting" +"2019-05-02 09:27:52.853 UTC [gossip.discovery] sendMemResponse -> DEBU 2b13 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:52.853 UTC [msp] DeserializeIdentity -> DEBU 2b14 Obtaining identity" +"2019-05-02 09:27:52.854 UTC [msp] DeserializeIdentity -> DEBU 2b15 Obtaining identity" +"2019-05-02 09:27:52.855 UTC [msp] DeserializeIdentity -> DEBU 2b16 Obtaining identity" +"2019-05-02 09:27:52.856 UTC [gossip.comm] Send -> DEBU 2b17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:52.857 UTC [gossip.discovery] sendMemResponse -> DEBU 2b18 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:52.858 UTC [gossip.comm] sendToEndpoint -> DEBU 2b19 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.858 UTC [gossip.comm] sendToEndpoint -> DEBU 2b1a Exiting" +"2019-05-02 09:27:52.983 UTC [gossip.comm] func1 -> DEBU 2b1b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.984 UTC [gossip.gossip] handleMessage -> DEBU 2b1c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:52.985 UTC [msp] DeserializeIdentity -> DEBU 2b1d Obtaining identity" +"2019-05-02 09:27:52.986 UTC [msp] DeserializeIdentity -> DEBU 2b1e Obtaining identity" +"2019-05-02 09:27:52.986 UTC [msp] DeserializeIdentity -> DEBU 2b1f Obtaining identity" +"2019-05-02 09:27:52.986 UTC [gossip.gossip] handleMessage -> DEBU 2b20 Exiting" +"2019-05-02 09:27:52.993 UTC [gossip.comm] func1 -> DEBU 2b21 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789269860040500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:52.993 UTC [gossip.gossip] handleMessage -> DEBU 2b22 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789269860040500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:27:52.993 UTC [msp] DeserializeIdentity -> DEBU 2b23 Obtaining identity" +"2019-05-02 09:27:52.994 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:52.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b25 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b26 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:52.994 UTC [policies] Evaluate -> DEBU 2b27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:52.995 UTC [policies] Evaluate -> DEBU 2b28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:52.995 UTC [policies] Evaluate -> DEBU 2b29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:52.995 UTC [cauthdsl] func1 -> DEBU 2b2a 0xc002e174f0 gate 1556789272995559700 evaluation starts" +"2019-05-02 09:27:52.995 UTC [cauthdsl] func2 -> DEBU 2b2b 0xc002e174f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.995 UTC [cauthdsl] func2 -> DEBU 2b2c 0xc002e174f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.996 UTC [cauthdsl] func2 -> DEBU 2b2d 0xc002e174f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:52.996 UTC [cauthdsl] func2 -> DEBU 2b2e 0xc002e174f0 principal evaluation fails" +"2019-05-02 09:27:52.996 UTC [cauthdsl] func1 -> DEBU 2b2f 0xc002e174f0 gate 1556789272995559700 evaluation fails" +"2019-05-02 09:27:52.996 UTC [policies] Evaluate -> DEBU 2b30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.997 UTC [policies] Evaluate -> DEBU 2b31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:52.997 UTC [policies] Evaluate -> DEBU 2b32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:52.997 UTC [cauthdsl] func1 -> DEBU 2b33 0xc002e17ef0 gate 1556789272997487300 evaluation starts" +"2019-05-02 09:27:52.997 UTC [cauthdsl] func2 -> DEBU 2b34 0xc002e17ef0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:52.997 UTC [cauthdsl] func2 -> DEBU 2b35 0xc002e17ef0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:52.998 UTC [cauthdsl] func2 -> DEBU 2b36 0xc002e17ef0 principal matched by identity 0" +"2019-05-02 09:27:52.998 UTC [msp.identity] Verify -> DEBU 2b37 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:27:52.998 UTC [msp.identity] Verify -> DEBU 2b38 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:27:52.999 UTC [cauthdsl] func2 -> DEBU 2b39 0xc002e17ef0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:52.999 UTC [cauthdsl] func1 -> DEBU 2b3a 0xc002e17ef0 gate 1556789272997487300 evaluation succeeds" +"2019-05-02 09:27:52.999 UTC [policies] Evaluate -> DEBU 2b3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.000 UTC [policies] Evaluate -> DEBU 2b3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.000 UTC [policies] Evaluate -> DEBU 2b3d Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:53.000 UTC [policies] Evaluate -> DEBU 2b3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:53.000 UTC [msp] DeserializeIdentity -> DEBU 2b3f Obtaining identity" +"2019-05-02 09:27:53.001 UTC [gossip.gossip] handleMessage -> DEBU 2b40 Exiting" +"2019-05-02 09:27:53.005 UTC [msp] DeserializeIdentity -> DEBU 2b41 Obtaining identity" +"2019-05-02 09:27:53.006 UTC [msp] DeserializeIdentity -> DEBU 2b42 Obtaining identity" +"2019-05-02 09:27:53.006 UTC [gossip.pull] Hello -> DEBU 2b43 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:53.006 UTC [msp] DeserializeIdentity -> DEBU 2b44 Obtaining identity" +"2019-05-02 09:27:53.007 UTC [msp] DeserializeIdentity -> DEBU 2b45 Obtaining identity" +"2019-05-02 09:27:53.007 UTC [gossip.comm] Send -> DEBU 2b46 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:53.007 UTC [gossip.comm] sendToEndpoint -> DEBU 2b47 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.008 UTC [gossip.comm] sendToEndpoint -> DEBU 2b48 Exiting" +"2019-05-02 09:27:53.010 UTC [gossip.gossip] handleMessage -> DEBU 2b49 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15349309374599361185 , Msg_type: BLOCK_MSG, digests: [3 4 5 6 7 8 2 1], Envelope: 58 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.011 UTC [gossip.pull] HandleMessage -> DEBU 2b4a GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15349309374599361185 , Msg_type: BLOCK_MSG, digests: [3 4 5 6 7 8 2 1], Envelope: 58 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.011 UTC [gossip.gossip] handleMessage -> DEBU 2b4b Exiting" +"2019-05-02 09:27:53.099 UTC [gossip.gossip] handleMessage -> DEBU 2b4c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.100 UTC [gossip.pull] Hello -> DEBU 2b4d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:53.100 UTC [gossip.pull] HandleMessage -> DEBU 2b4e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.101 UTC [gossip.pull] SendDigest -> DEBU 2b4f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:53.101 UTC [gossip.gossip] handleMessage -> DEBU 2b50 Exiting" +"2019-05-02 09:27:53.102 UTC [gossip.comm] Send -> DEBU 2b51 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:53.102 UTC [gossip.pull] Hello -> DEBU 2b52 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:27:53.102 UTC [gossip.comm] Send -> DEBU 2b53 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:53.102 UTC [gossip.comm] sendToEndpoint -> DEBU 2b54 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.102 UTC [gossip.comm] sendToEndpoint -> DEBU 2b55 Exiting" +"2019-05-02 09:27:53.103 UTC [gossip.comm] sendToEndpoint -> DEBU 2b56 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.103 UTC [gossip.comm] sendToEndpoint -> DEBU 2b57 Exiting" +"2019-05-02 09:27:53.102 UTC [gossip.pull] Hello -> DEBU 2b58 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:27:53.104 UTC [gossip.comm] Send -> DEBU 2b59 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:53.106 UTC [gossip.gossip] handleMessage -> DEBU 2b5a Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7835840832422763451 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.106 UTC [gossip.pull] HandleMessage -> DEBU 2b5b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7835840832422763451 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.106 UTC [gossip.gossip] handleMessage -> DEBU 2b5c Exiting" +"2019-05-02 09:27:53.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2b5d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.107 UTC [gossip.gossip] handleMessage -> DEBU 2b5e Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4201595857500789673 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.107 UTC [gossip.pull] HandleMessage -> DEBU 2b5f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4201595857500789673 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.108 UTC [gossip.gossip] handleMessage -> DEBU 2b60 Exiting" +"2019-05-02 09:27:53.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2b61 Exiting" +"2019-05-02 09:27:53.114 UTC [gossip.comm] func1 -> DEBU 2b62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17072324767179249031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.114 UTC [gossip.gossip] handleMessage -> DEBU 2b63 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17072324767179249031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.115 UTC [gossip.pull] HandleMessage -> DEBU 2b64 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17072324767179249031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.115 UTC [gossip.gossip] handleMessage -> DEBU 2b65 Exiting" +"2019-05-02 09:27:53.119 UTC [gossip.gossip] handleMessage -> DEBU 2b66 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.119 UTC [gossip.gossip] handleMessage -> DEBU 2b67 Exiting" +"2019-05-02 09:27:53.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.120 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b69 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:53.120 UTC [msp.identity] Verify -> DEBU 2b6a Verify: digest = 00000000 c3 26 b9 f7 ff 1b f2 49 c1 e6 ad 8c 4b 38 97 b3 |.&.....I....K8..| +00000010 c5 e3 22 e3 72 57 43 5d 3f 87 d2 47 cc fe 50 d3 |..".rWC]?..G..P.|" +"2019-05-02 09:27:53.120 UTC [msp.identity] Verify -> DEBU 2b6b Verify: sig = 00000000 30 45 02 21 00 bd bb e9 66 0a cb e8 79 d0 17 22 |0E.!....f...y.."| +00000010 48 7d 01 9b ae b9 d2 62 4f a6 b6 f5 90 36 f1 b2 |H}.....bO....6..| +00000020 40 db b1 27 7b 02 20 52 55 7c 4a be de 05 31 6f |@..'{. RU|J...1o| +00000030 a1 bb 0d 64 7e ab bb fe af 87 d6 01 83 2a 3e 6f |...d~........*>o| +00000040 33 19 d2 04 61 37 7a |3...a7z|" +"2019-05-02 09:27:53.121 UTC [msp.identity] Verify -> DEBU 2b6c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:27:53.122 UTC [msp.identity] Verify -> DEBU 2b6d Verify: sig = 00000000 30 45 02 21 00 9d 65 6d 7f 52 4d f0 0d da 17 96 |0E.!..em.RM.....| +00000010 18 3d 48 25 85 ca 9b b8 3b ee 4b 9b 8b b3 f0 dd |.=H%....;.K.....| +00000020 82 7c d8 26 55 02 20 54 f4 de 62 3a 11 23 31 57 |.|.&U. T..b:.#1W| +00000030 9b 56 72 0b 25 89 da 3a fe 0d 8c 25 94 d6 91 ad |.Vr.%..:...%....| +00000040 a9 4f d1 7f c4 18 37 |.O....7|" +"2019-05-02 09:27:53.123 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b6e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:53.123 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b6f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:53.127 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b70 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 " +"2019-05-02 09:27:53.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b71 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 " +"2019-05-02 09:27:53.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b72 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:53.129 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b73 Exiting" +"2019-05-02 09:27:53.129 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b74 Exiting" +"2019-05-02 09:27:53.140 UTC [gossip.discovery] sendMemResponse -> DEBU 2b75 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:53.141 UTC [msp] DeserializeIdentity -> DEBU 2b76 Obtaining identity" +"2019-05-02 09:27:53.142 UTC [msp] DeserializeIdentity -> DEBU 2b77 Obtaining identity" +"2019-05-02 09:27:53.143 UTC [gossip.comm] Send -> DEBU 2b78 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:53.143 UTC [gossip.discovery] sendMemResponse -> DEBU 2b79 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:53.146 UTC [gossip.comm] sendToEndpoint -> DEBU 2b7a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.146 UTC [gossip.comm] sendToEndpoint -> DEBU 2b7b Exiting" +"2019-05-02 09:27:53.148 UTC [msp.identity] Sign -> DEBU 2b7c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101D " +"2019-05-02 09:27:53.148 UTC [msp.identity] Sign -> DEBU 2b7d Sign: digest: 3467A9C1608A1F692B5BFA73C18A48C458F06FECEAA4FE00F7B6405167B2D245 " +"2019-05-02 09:27:53.149 UTC [msp.identity] Sign -> DEBU 2b7e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:53.149 UTC [msp.identity] Sign -> DEBU 2b7f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:53.150 UTC [msp] DeserializeIdentity -> DEBU 2b80 Obtaining identity" +"2019-05-02 09:27:53.151 UTC [gossip.comm] Send -> DEBU 2b81 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:53.151 UTC [msp] DeserializeIdentity -> DEBU 2b82 Obtaining identity" +"2019-05-02 09:27:53.152 UTC [gossip.comm] Send -> DEBU 2b83 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:53.152 UTC [gossip.comm] Send -> DEBU 2b84 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:53.153 UTC [gossip.comm] sendToEndpoint -> DEBU 2b85 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.153 UTC [gossip.comm] sendToEndpoint -> DEBU 2b86 Exiting" +"2019-05-02 09:27:53.154 UTC [gossip.comm] sendToEndpoint -> DEBU 2b87 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.154 UTC [gossip.comm] sendToEndpoint -> DEBU 2b88 Exiting" +"2019-05-02 09:27:53.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b89 Exiting" +"2019-05-02 09:27:53.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8b Exiting" +"2019-05-02 09:27:53.158 UTC [gossip.gossip] handleMessage -> DEBU 2b8c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.162 UTC [gossip.gossip] handleMessage -> DEBU 2b8d Exiting" +"2019-05-02 09:27:53.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.162 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b8f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:53.163 UTC [msp.identity] Verify -> DEBU 2b90 Verify: digest = 00000000 34 67 a9 c1 60 8a 1f 69 2b 5b fa 73 c1 8a 48 c4 |4g..`..i+[.s..H.| +00000010 58 f0 6f ec ea a4 fe 00 f7 b6 40 51 67 b2 d2 45 |X.o.......@Qg..E|" +"2019-05-02 09:27:53.163 UTC [msp.identity] Verify -> DEBU 2b91 Verify: sig = 00000000 30 45 02 21 00 aa b6 bb 74 0c 56 31 5d 95 0e 14 |0E.!....t.V1]...| +00000010 61 c5 a7 ee 06 0d ca 6a 90 2c a2 03 02 9e 1a b1 |a......j.,......| +00000020 41 53 e7 da d5 02 20 68 55 e0 86 6e b3 4c 88 25 |AS.... hU..n.L.%| +00000030 05 a7 48 e3 07 4d 31 83 8a fb f7 e3 25 45 8f 8d |..H..M1.....%E..| +00000040 18 e7 98 e3 64 67 d5 |....dg.|" +"2019-05-02 09:27:53.164 UTC [msp.identity] Verify -> DEBU 2b92 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:22.091 UTC [msp.identity] Verify -> DEBU 2be1 Verify: sig = 00000000 30 44 02 20 48 a5 0b ce 13 d8 fc 57 8d b6 cb 0d |0D. H......W....| -00000010 59 37 d0 f4 b7 37 89 56 22 02 41 6a 26 4c 5a f9 |Y7...7.V".Aj&LZ.| -00000020 95 82 d4 ea 02 20 09 8a 0a 10 c8 33 89 8d 0a 91 |..... .....3....| -00000030 ea ba cf 89 36 b6 b2 76 6e 1b 54 c4 f2 28 0e 2c |....6..vn.T..(.,| -00000040 1b be 36 fe 77 a3 |..6.w.|" -"2019-05-02 01:31:22.093 UTC [gossip.discovery] handleAliveMessage -> DEBU 2be2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:22.093 UTC [gossip.discovery] isSentByMe -> DEBU 2be3 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:22.094 UTC [gossip.discovery] handleAliveMessage -> DEBU 2be4 Exiting" -"2019-05-02 01:31:22.096 UTC [gossip.comm] func1 -> DEBU 2be5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.096 UTC [gossip.gossip] handleMessage -> DEBU 2be6 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.094 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2be7 Exiting" -"2019-05-02 01:31:22.097 UTC [gossip.gossip] handleMessage -> DEBU 2be8 Exiting" -"2019-05-02 01:31:22.097 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2be9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:22.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bea Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:22.098 UTC [msp] DeserializeIdentity -> DEBU 2beb Obtaining identity" -"2019-05-02 01:31:22.099 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bec Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:22.099 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bed Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:22.099 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bee Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:22.100 UTC [policies] Evaluate -> DEBU 2bef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:22.100 UTC [policies] Evaluate -> DEBU 2bf0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:22.100 UTC [policies] Evaluate -> DEBU 2bf1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:22.100 UTC [cauthdsl] func1 -> DEBU 2bf2 0xc002c2c550 gate 1556760682100385200 evaluation starts" -"2019-05-02 01:31:22.101 UTC [cauthdsl] func2 -> DEBU 2bf3 0xc002c2c550 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:22.101 UTC [cauthdsl] func2 -> DEBU 2bf4 0xc002c2c550 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:22.101 UTC [cauthdsl] func2 -> DEBU 2bf5 0xc002c2c550 principal matched by identity 0" -"2019-05-02 01:31:22.101 UTC [msp.identity] Verify -> DEBU 2bf6 Verify: digest = 00000000 30 c5 d1 f6 30 2f e5 19 26 51 3d 31 38 f8 e4 cf |0...0/..&Q=18...| -00000010 1e 26 99 39 cc 02 04 dc be 6b 95 33 70 3b 89 73 |.&.9.....k.3p;.s|" -"2019-05-02 01:31:22.101 UTC [msp.identity] Verify -> DEBU 2bf7 Verify: sig = 00000000 30 44 02 20 58 d5 c0 5b ca a6 29 66 f9 27 d4 cd |0D. X..[..)f.'..| -00000010 b3 ff ed 4d 0c f6 01 28 cf b7 6d 4d e6 99 f1 eb |...M...(..mM....| -00000020 c2 71 e5 be 02 20 3f 4e 0a ca d0 98 f3 05 c1 2b |.q... ?N.......+| -00000030 d7 fe f1 ad 0a 54 37 10 a4 66 4f cb 4d a5 44 9a |.....T7..fO.M.D.| -00000040 33 3d 5c 6c a7 74 |3=\l.t|" -"2019-05-02 01:31:22.101 UTC [cauthdsl] func2 -> DEBU 2bf8 0xc002c2c550 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:22.101 UTC [cauthdsl] func1 -> DEBU 2bf9 0xc002c2c550 gate 1556760682100385200 evaluation succeeds" -"2019-05-02 01:31:22.101 UTC [policies] Evaluate -> DEBU 2bfa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:22.101 UTC [policies] Evaluate -> DEBU 2bfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:22.101 UTC [policies] Evaluate -> DEBU 2bfc Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:22.101 UTC [policies] Evaluate -> DEBU 2bfd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:22.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bfe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:22.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bff Exiting" -"2019-05-02 01:31:22.101 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c00 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:22.103 UTC [msp.identity] Verify -> DEBU 2c01 Verify: digest = 00000000 9c 87 86 5a 50 b0 23 5a 7d 97 8f f3 7f 5b ca 50 |...ZP.#Z}....[.P| -00000010 29 98 a1 6c b3 a9 c7 7d 17 e6 53 fb 02 0e 12 75 |)..l...}..S....u|" -"2019-05-02 01:31:22.104 UTC [msp.identity] Verify -> DEBU 2c02 Verify: sig = 00000000 30 45 02 21 00 c0 03 74 eb b2 17 1d fd 62 d4 95 |0E.!...t.....b..| -00000010 de 01 f8 2e 3c 72 f0 48 18 df 2e 30 6d 5e a5 37 |.... DEBU 2c03 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:22.104 UTC [gossip.discovery] isSentByMe -> DEBU 2c04 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:22.104 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c05 Exiting" -"2019-05-02 01:31:22.105 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c06 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:22.105 UTC [msp.identity] Verify -> DEBU 2c07 Verify: digest = 00000000 32 7c 02 b3 20 b7 22 b7 bc 8f 19 5a 4a 0a 4d 7d |2|.. ."....ZJ.M}| -00000010 70 94 b3 e6 bb a8 bf 8c 10 50 b2 1d ec ad 63 2a |p........P....c*|" -"2019-05-02 01:31:22.105 UTC [msp.identity] Verify -> DEBU 2c08 Verify: sig = 00000000 30 44 02 20 4c b2 0a c6 7b 9c 32 9f f9 d6 64 76 |0D. L...{.2...dv| -00000010 f4 a9 dc f1 5a 67 f6 86 54 21 05 d6 05 92 7e 25 |....Zg..T!....~%| -00000020 5b 03 d6 30 02 20 68 48 47 ea d5 b7 cd b6 79 c5 |[..0. hHG.....y.| -00000030 5d 72 10 6c 84 51 9a a5 26 b3 9b 6b 06 2a 1d 3c |]r.l.Q..&..k.*.<| -00000040 bd c9 0f 96 1c 28 |.....(|" -"2019-05-02 01:31:22.106 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c09 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:22.109 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c0a Exiting" -"2019-05-02 01:31:22.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c0b Exiting" -"2019-05-02 01:31:23.435 UTC [gossip.gossip] handleMessage -> DEBU 2c0c Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:23.437 UTC [gossip.gossip] handleMessage -> DEBU 2c0d Exiting" -"2019-05-02 01:31:23.438 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:23.438 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c0f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:23.440 UTC [msp.identity] Verify -> DEBU 2c10 Verify: digest = 00000000 c0 5c ac df d1 c6 3a 05 96 30 8f 48 15 0a d4 53 |.\....:..0.H...S| -00000010 1e e3 ac df 7b b1 09 af 61 8e 30 a5 ca 56 86 83 |....{...a.0..V..|" -"2019-05-02 01:31:23.440 UTC [msp.identity] Verify -> DEBU 2c11 Verify: sig = 00000000 30 45 02 21 00 d3 9b 98 2e 82 b8 ca 09 98 12 92 |0E.!............| -00000010 dc af e0 d1 af 7a 5e a8 62 b2 92 f7 2d 36 81 1e |.....z^.b...-6..| -00000020 0f 45 3f 0a 5d 02 20 13 09 88 f9 d0 cb 5b 99 67 |.E?.]. ......[.g| -00000030 2c 4e 8a 10 2f c5 d3 21 e5 36 27 3b 63 cb 11 dc |,N../..!.6';c...| -00000040 c1 f6 16 69 7f ba c1 |...i...|" -"2019-05-02 01:31:23.441 UTC [gossip.comm] func1 -> DEBU 2c12 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.441 UTC [gossip.gossip] handleMessage -> DEBU 2c13 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.442 UTC [msp.identity] Verify -> DEBU 2c14 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:53.164 UTC [msp.identity] Verify -> DEBU 2b93 Verify: sig = 00000000 30 45 02 21 00 94 43 3a f2 d3 fc 95 92 6f 85 b2 |0E.!..C:.....o..| +00000010 5e 7d 68 b7 dc 0b 91 0a 0c d9 73 a2 80 92 e9 34 |^}h.......s....4| +00000020 d4 6a fc 8c f9 02 20 6b a9 94 18 6f 77 4a 59 84 |.j.... k...owJY.| +00000030 58 51 df d4 5f 6c c0 d7 24 77 42 3e ba 88 3f e5 |XQ.._l..$wB>..?.| +00000040 c6 b7 2b c8 ff b4 f8 |..+....|" +"2019-05-02 09:27:53.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:53.165 UTC [gossip.discovery] isSentByMe -> DEBU 2b95 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:53.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b96 Exiting" +"2019-05-02 09:27:53.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b97 Exiting" +"2019-05-02 09:27:53.170 UTC [gossip.comm] func1 -> DEBU 2b98 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.170 UTC [gossip.gossip] handleMessage -> DEBU 2b99 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.170 UTC [gossip.gossip] handleMessage -> DEBU 2b9a Exiting" +"2019-05-02 09:27:53.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b9b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b9c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:53.171 UTC [msp] DeserializeIdentity -> DEBU 2b9d Obtaining identity" +"2019-05-02 09:27:53.172 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:53.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:53.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:53.173 UTC [policies] Evaluate -> DEBU 2ba1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:53.173 UTC [policies] Evaluate -> DEBU 2ba2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.175 UTC [policies] Evaluate -> DEBU 2ba3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:53.175 UTC [cauthdsl] func1 -> DEBU 2ba4 0xc002c75ca0 gate 1556789273175513400 evaluation starts" +"2019-05-02 09:27:53.175 UTC [cauthdsl] func2 -> DEBU 2ba5 0xc002c75ca0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.176 UTC [cauthdsl] func2 -> DEBU 2ba6 0xc002c75ca0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:53.176 UTC [cauthdsl] func2 -> DEBU 2ba7 0xc002c75ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:53.176 UTC [cauthdsl] func2 -> DEBU 2ba8 0xc002c75ca0 principal evaluation fails" +"2019-05-02 09:27:53.176 UTC [cauthdsl] func1 -> DEBU 2ba9 0xc002c75ca0 gate 1556789273175513400 evaluation fails" +"2019-05-02 09:27:53.176 UTC [policies] Evaluate -> DEBU 2baa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.176 UTC [policies] Evaluate -> DEBU 2bab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.188 UTC [policies] Evaluate -> DEBU 2bac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:53.193 UTC [cauthdsl] func1 -> DEBU 2bad 0xc002c424e0 gate 1556789273193434500 evaluation starts" +"2019-05-02 09:27:53.193 UTC [cauthdsl] func2 -> DEBU 2bae 0xc002c424e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.194 UTC [cauthdsl] func2 -> DEBU 2baf 0xc002c424e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:53.194 UTC [cauthdsl] func2 -> DEBU 2bb0 0xc002c424e0 principal matched by identity 0" +"2019-05-02 09:27:53.194 UTC [msp.identity] Verify -> DEBU 2bb1 Verify: digest = 00000000 28 f5 bc 9a a9 eb 67 06 76 5d 72 15 6f cf a1 3e |(.....g.v]r.o..>| +00000010 85 1b b0 eb e3 d4 cc 0e 5a f4 06 64 63 92 02 34 |........Z..dc..4|" +"2019-05-02 09:27:53.195 UTC [msp.identity] Verify -> DEBU 2bb2 Verify: sig = 00000000 30 44 02 20 32 d2 b7 c8 6e 29 a4 89 28 8b be 7e |0D. 2...n)..(..~| +00000010 9a dc ea 69 b8 b2 2e c0 86 5e 35 8d bb da 6a b7 |...i.....^5...j.| +00000020 fc 52 5d 4e 02 20 22 43 71 fd e3 71 47 8b ce 31 |.R]N. "Cq..qG..1| +00000030 ff 74 f0 ac 69 46 c8 b1 d0 69 19 ac ee b1 2b 6c |.t..iF...i....+l| +00000040 4f 21 b8 78 20 06 |O!.x .|" +"2019-05-02 09:27:53.195 UTC [cauthdsl] func2 -> DEBU 2bb3 0xc002c424e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:53.195 UTC [cauthdsl] func1 -> DEBU 2bb4 0xc002c424e0 gate 1556789273193434500 evaluation succeeds" +"2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb7 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:53.196 UTC [policies] Evaluate -> DEBU 2bb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:53.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bb9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:53.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bba Exiting" +"2019-05-02 09:27:53.197 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bbb Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:53.197 UTC [msp.identity] Verify -> DEBU 2bbc Verify: digest = 00000000 34 67 a9 c1 60 8a 1f 69 2b 5b fa 73 c1 8a 48 c4 |4g..`..i+[.s..H.| +00000010 58 f0 6f ec ea a4 fe 00 f7 b6 40 51 67 b2 d2 45 |X.o.......@Qg..E|" +"2019-05-02 09:27:53.197 UTC [msp.identity] Verify -> DEBU 2bbd Verify: sig = 00000000 30 45 02 21 00 aa b6 bb 74 0c 56 31 5d 95 0e 14 |0E.!....t.V1]...| +00000010 61 c5 a7 ee 06 0d ca 6a 90 2c a2 03 02 9e 1a b1 |a......j.,......| +00000020 41 53 e7 da d5 02 20 68 55 e0 86 6e b3 4c 88 25 |AS.... hU..n.L.%| +00000030 05 a7 48 e3 07 4d 31 83 8a fb f7 e3 25 45 8f 8d |..H..M1.....%E..| +00000040 18 e7 98 e3 64 67 d5 |....dg.|" +"2019-05-02 09:27:53.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bbe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.198 UTC [gossip.discovery] isSentByMe -> DEBU 2bbf Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bc0 Exiting" +"2019-05-02 09:27:53.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bc1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:53.200 UTC [msp.identity] Verify -> DEBU 2bc2 Verify: digest = 00000000 c3 26 b9 f7 ff 1b f2 49 c1 e6 ad 8c 4b 38 97 b3 |.&.....I....K8..| +00000010 c5 e3 22 e3 72 57 43 5d 3f 87 d2 47 cc fe 50 d3 |..".rWC]?..G..P.|" +"2019-05-02 09:27:53.200 UTC [msp.identity] Verify -> DEBU 2bc3 Verify: sig = 00000000 30 45 02 21 00 bd bb e9 66 0a cb e8 79 d0 17 22 |0E.!....f...y.."| +00000010 48 7d 01 9b ae b9 d2 62 4f a6 b6 f5 90 36 f1 b2 |H}.....bO....6..| +00000020 40 db b1 27 7b 02 20 52 55 7c 4a be de 05 31 6f |@..'{. RU|J...1o| +00000030 a1 bb 0d 64 7e ab bb fe af 87 d6 01 83 2a 3e 6f |...d~........*>o| +00000040 33 19 d2 04 61 37 7a |3...a7z|" +"2019-05-02 09:27:53.201 UTC [gossip.gossip] handleMessage -> DEBU 2bc4 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.206 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bc5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.207 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bc6 Exiting" +"2019-05-02 09:27:53.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bc7 Exiting" +"2019-05-02 09:27:53.208 UTC [gossip.gossip] handleMessage -> DEBU 2bc8 Exiting" +"2019-05-02 09:27:53.208 UTC [gossip.gossip] handleMessage -> DEBU 2bc9 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.209 UTC [gossip.pull] HandleMessage -> DEBU 2bca GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.209 UTC [msp] DeserializeIdentity -> DEBU 2bcb Obtaining identity" +"2019-05-02 09:27:53.210 UTC [msp] DeserializeIdentity -> DEBU 2bcc Obtaining identity" +"2019-05-02 09:27:53.211 UTC [msp] DeserializeIdentity -> DEBU 2bcd Obtaining identity" +"2019-05-02 09:27:53.211 UTC [msp] DeserializeIdentity -> DEBU 2bce Obtaining identity" +"2019-05-02 09:27:53.211 UTC [msp] DeserializeIdentity -> DEBU 2bcf Obtaining identity" +"2019-05-02 09:27:53.212 UTC [msp] DeserializeIdentity -> DEBU 2bd0 Obtaining identity" +"2019-05-02 09:27:53.212 UTC [gossip.pull] SendDigest -> DEBU 2bd1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:53.212 UTC [gossip.gossip] handleMessage -> DEBU 2bd2 Exiting" +"2019-05-02 09:27:53.212 UTC [gossip.gossip] handleMessage -> DEBU 2bd3 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.221 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bd5 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:53.225 UTC [msp.identity] Verify -> DEBU 2bd6 Verify: digest = 00000000 c3 26 b9 f7 ff 1b f2 49 c1 e6 ad 8c 4b 38 97 b3 |.&.....I....K8..| +00000010 c5 e3 22 e3 72 57 43 5d 3f 87 d2 47 cc fe 50 d3 |..".rWC]?..G..P.|" +"2019-05-02 09:27:53.226 UTC [msp.identity] Verify -> DEBU 2bd8 Verify: sig = 00000000 30 45 02 21 00 bd bb e9 66 0a cb e8 79 d0 17 22 |0E.!....f...y.."| +00000010 48 7d 01 9b ae b9 d2 62 4f a6 b6 f5 90 36 f1 b2 |H}.....bO....6..| +00000020 40 db b1 27 7b 02 20 52 55 7c 4a be de 05 31 6f |@..'{. RU|J...1o| +00000030 a1 bb 0d 64 7e ab bb fe af 87 d6 01 83 2a 3e 6f |...d~........*>o| +00000040 33 19 d2 04 61 37 7a |3...a7z|" +"2019-05-02 09:27:53.225 UTC [gossip.comm] func1 -> DEBU 2bd7 Got message: GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.230 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.231 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bda Exiting" +"2019-05-02 09:27:53.231 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bdb Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:53.232 UTC [msp.identity] Verify -> DEBU 2bdc Verify: digest = 00000000 34 67 a9 c1 60 8a 1f 69 2b 5b fa 73 c1 8a 48 c4 |4g..`..i+[.s..H.| +00000010 58 f0 6f ec ea a4 fe 00 f7 b6 40 51 67 b2 d2 45 |X.o.......@Qg..E|" +"2019-05-02 09:27:53.232 UTC [msp.identity] Verify -> DEBU 2bdd Verify: sig = 00000000 30 45 02 21 00 aa b6 bb 74 0c 56 31 5d 95 0e 14 |0E.!....t.V1]...| +00000010 61 c5 a7 ee 06 0d ca 6a 90 2c a2 03 02 9e 1a b1 |a......j.,......| +00000020 41 53 e7 da d5 02 20 68 55 e0 86 6e b3 4c 88 25 |AS.... hU..n.L.%| +00000030 05 a7 48 e3 07 4d 31 83 8a fb f7 e3 25 45 8f 8d |..H..M1.....%E..| +00000040 18 e7 98 e3 64 67 d5 |....dg.|" +"2019-05-02 09:27:53.232 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bde Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.233 UTC [gossip.discovery] isSentByMe -> DEBU 2bdf Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.233 UTC [gossip.discovery] handleAliveMessage -> DEBU 2be0 Exiting" +"2019-05-02 09:27:53.233 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2be1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:53.233 UTC [msp] DeserializeIdentity -> DEBU 2be2 Obtaining identity" +"2019-05-02 09:27:53.234 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2be3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:53.234 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:53.235 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:53.235 UTC [policies] Evaluate -> DEBU 2be6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:53.235 UTC [policies] Evaluate -> DEBU 2be7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.236 UTC [policies] Evaluate -> DEBU 2be8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:53.236 UTC [cauthdsl] func1 -> DEBU 2be9 0xc002808ed0 gate 1556789273236414500 evaluation starts" +"2019-05-02 09:27:53.236 UTC [cauthdsl] func2 -> DEBU 2bea 0xc002808ed0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.236 UTC [cauthdsl] func2 -> DEBU 2beb 0xc002808ed0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:53.237 UTC [cauthdsl] func2 -> DEBU 2bec 0xc002808ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:53.237 UTC [cauthdsl] func2 -> DEBU 2bed 0xc002808ed0 principal evaluation fails" +"2019-05-02 09:27:53.238 UTC [cauthdsl] func1 -> DEBU 2bee 0xc002808ed0 gate 1556789273236414500 evaluation fails" +"2019-05-02 09:27:53.241 UTC [policies] Evaluate -> DEBU 2bef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.241 UTC [policies] Evaluate -> DEBU 2bf0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.242 UTC [policies] Evaluate -> DEBU 2bf1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:53.242 UTC [cauthdsl] func1 -> DEBU 2bf2 0xc002809710 gate 1556789273242201000 evaluation starts" +"2019-05-02 09:27:53.242 UTC [cauthdsl] func2 -> DEBU 2bf3 0xc002809710 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.243 UTC [cauthdsl] func2 -> DEBU 2bf4 0xc002809710 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:53.243 UTC [cauthdsl] func2 -> DEBU 2bf5 0xc002809710 principal matched by identity 0" +"2019-05-02 09:27:53.243 UTC [msp.identity] Verify -> DEBU 2bf6 Verify: digest = 00000000 aa dd c4 28 04 7b e8 7f ee 60 d5 11 ef d5 b6 9c |...(.{...`......| +00000010 05 1a 30 65 4e 65 1c 84 8e 73 63 5c b3 7a b3 3c |..0eNe...sc\.z.<|" +"2019-05-02 09:27:53.244 UTC [msp.identity] Verify -> DEBU 2bf7 Verify: sig = 00000000 30 44 02 20 31 36 16 86 3a 1f 47 9b ed ee e2 8e |0D. 16..:.G.....| +00000010 87 e8 03 8d 95 10 41 0b d6 15 bb 6e cd dd d1 8d |......A....n....| +00000020 0a 13 f0 6e 02 20 10 6a 41 fb 11 d0 f2 35 21 c9 |...n. .jA....5!.| +00000030 b8 08 64 ac 50 cf b1 7d eb 21 f9 f2 f0 ee a6 ce |..d.P..}.!......| +00000040 72 8c e1 c3 66 83 |r...f.|" +"2019-05-02 09:27:53.245 UTC [cauthdsl] func2 -> DEBU 2bf8 0xc002809710 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:53.245 UTC [cauthdsl] func1 -> DEBU 2bf9 0xc002809710 gate 1556789273242201000 evaluation succeeds" +"2019-05-02 09:27:53.245 UTC [policies] Evaluate -> DEBU 2bfa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.245 UTC [policies] Evaluate -> DEBU 2bfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.246 UTC [policies] Evaluate -> DEBU 2bfc Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:53.246 UTC [policies] Evaluate -> DEBU 2bfd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:53.246 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bfe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:53.248 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bff Exiting" +"2019-05-02 09:27:53.248 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c00 Exiting" +"2019-05-02 09:27:53.248 UTC [gossip.gossip] handleMessage -> DEBU 2c01 Exiting" +"2019-05-02 09:27:53.248 UTC [gossip.gossip] handleMessage -> DEBU 2c02 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.248 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c03 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.249 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c04 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:53.252 UTC [msp] DeserializeIdentity -> DEBU 2c05 Obtaining identity" +"2019-05-02 09:27:53.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:53.253 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c07 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:53.253 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c08 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:53.253 UTC [policies] Evaluate -> DEBU 2c09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:53.253 UTC [policies] Evaluate -> DEBU 2c0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.253 UTC [policies] Evaluate -> DEBU 2c0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:53.254 UTC [cauthdsl] func1 -> DEBU 2c0c 0xc0027c7540 gate 1556789273254075400 evaluation starts" +"2019-05-02 09:27:53.254 UTC [cauthdsl] func2 -> DEBU 2c0d 0xc0027c7540 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.254 UTC [cauthdsl] func2 -> DEBU 2c0e 0xc0027c7540 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:53.254 UTC [cauthdsl] func2 -> DEBU 2c0f 0xc0027c7540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:53.255 UTC [cauthdsl] func2 -> DEBU 2c10 0xc0027c7540 principal evaluation fails" +"2019-05-02 09:27:53.255 UTC [cauthdsl] func1 -> DEBU 2c11 0xc0027c7540 gate 1556789273254075400 evaluation fails" +"2019-05-02 09:27:53.255 UTC [policies] Evaluate -> DEBU 2c12 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.255 UTC [policies] Evaluate -> DEBU 2c13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.255 UTC [policies] Evaluate -> DEBU 2c14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:53.256 UTC [cauthdsl] func1 -> DEBU 2c15 0xc0027c7d80 gate 1556789273256226800 evaluation starts" +"2019-05-02 09:27:53.256 UTC [cauthdsl] func2 -> DEBU 2c16 0xc0027c7d80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.256 UTC [cauthdsl] func2 -> DEBU 2c17 0xc0027c7d80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:53.256 UTC [cauthdsl] func2 -> DEBU 2c18 0xc0027c7d80 principal matched by identity 0" +"2019-05-02 09:27:53.256 UTC [msp.identity] Verify -> DEBU 2c19 Verify: digest = 00000000 54 60 c8 b5 48 bf a9 92 d6 f5 15 1c 36 e5 1c 30 |T`..H.......6..0| +00000010 74 f9 d3 c3 8c ba b2 28 3b 5c 36 b2 4d a2 93 56 |t......(;\6.M..V|" +"2019-05-02 09:27:53.257 UTC [msp.identity] Verify -> DEBU 2c1a Verify: sig = 00000000 30 44 02 20 70 3b bb 6a 4a 62 d2 53 e1 44 1a 93 |0D. p;.jJb.S.D..| +00000010 da e5 2d b3 d6 d4 3a 51 a7 2e f5 6a 76 63 a8 94 |..-...:Q...jvc..| +00000020 22 17 96 38 02 20 41 91 02 39 c3 49 b7 b6 17 7f |"..8. A..9.I....| +00000030 ee 72 5e e2 1e 60 66 3a b2 9a ee 48 ca c4 b8 19 |.r^..`f:...H....| +00000040 05 98 3a 77 9d 60 |..:w.`|" +"2019-05-02 09:27:53.257 UTC [cauthdsl] func2 -> DEBU 2c1b 0xc0027c7d80 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:53.258 UTC [cauthdsl] func1 -> DEBU 2c1c 0xc0027c7d80 gate 1556789273256226800 evaluation succeeds" +"2019-05-02 09:27:53.258 UTC [policies] Evaluate -> DEBU 2c1d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.258 UTC [policies] Evaluate -> DEBU 2c1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.259 UTC [policies] Evaluate -> DEBU 2c1f Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:53.259 UTC [policies] Evaluate -> DEBU 2c20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:53.259 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c21 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:53.260 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c22 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:53.260 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c23 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 " +"2019-05-02 09:27:53.261 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c24 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 " +"2019-05-02 09:27:53.262 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c25 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:53.263 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c26 Exiting" +"2019-05-02 09:27:53.263 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c27 Exiting" +"2019-05-02 09:27:53.263 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c28 Exiting" +"2019-05-02 09:27:53.263 UTC [gossip.discovery] sendMemResponse -> DEBU 2c29 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:53.264 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Exiting" +"2019-05-02 09:27:53.264 UTC [msp] DeserializeIdentity -> DEBU 2c2c Obtaining identity" +"2019-05-02 09:27:53.265 UTC [msp] DeserializeIdentity -> DEBU 2c2d Obtaining identity" +"2019-05-02 09:27:53.265 UTC [msp] DeserializeIdentity -> DEBU 2c2e Obtaining identity" +"2019-05-02 09:27:53.265 UTC [gossip.comm] Send -> DEBU 2c2f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:53.264 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c2a Got message: GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.267 UTC [gossip.discovery] sendMemResponse -> DEBU 2c30 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:53.268 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c31 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:53.267 UTC [gossip.comm] sendToEndpoint -> DEBU 2c32 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.270 UTC [msp] DeserializeIdentity -> DEBU 2c33 Obtaining identity" +"2019-05-02 09:27:53.271 UTC [gossip.comm] sendToEndpoint -> DEBU 2c34 Exiting" +"2019-05-02 09:27:53.272 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c35 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:53.273 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c36 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:53.273 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c37 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:53.273 UTC [policies] Evaluate -> DEBU 2c38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:53.276 UTC [policies] Evaluate -> DEBU 2c39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.276 UTC [policies] Evaluate -> DEBU 2c3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:53.276 UTC [cauthdsl] func1 -> DEBU 2c3b 0xc002614b10 gate 1556789273276304000 evaluation starts" +"2019-05-02 09:27:53.276 UTC [cauthdsl] func2 -> DEBU 2c3c 0xc002614b10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.277 UTC [cauthdsl] func2 -> DEBU 2c3d 0xc002614b10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:53.277 UTC [cauthdsl] func2 -> DEBU 2c3e 0xc002614b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:53.277 UTC [cauthdsl] func2 -> DEBU 2c3f 0xc002614b10 principal evaluation fails" +"2019-05-02 09:27:53.278 UTC [cauthdsl] func1 -> DEBU 2c40 0xc002614b10 gate 1556789273276304000 evaluation fails" +"2019-05-02 09:27:53.278 UTC [policies] Evaluate -> DEBU 2c41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.278 UTC [policies] Evaluate -> DEBU 2c42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.278 UTC [policies] Evaluate -> DEBU 2c43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:53.278 UTC [cauthdsl] func1 -> DEBU 2c44 0xc002615350 gate 1556789273278938200 evaluation starts" +"2019-05-02 09:27:53.278 UTC [cauthdsl] func2 -> DEBU 2c45 0xc002615350 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.279 UTC [cauthdsl] func2 -> DEBU 2c46 0xc002615350 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:53.280 UTC [cauthdsl] func2 -> DEBU 2c47 0xc002615350 principal matched by identity 0" +"2019-05-02 09:27:53.280 UTC [msp.identity] Verify -> DEBU 2c48 Verify: digest = 00000000 80 94 d8 5e f1 18 0f 6d 05 9e cc e7 c7 2d 7e a5 |...^...m.....-~.| +00000010 c1 d3 e9 bc 57 95 dd a7 b2 a5 6c 34 c4 86 c8 df |....W.....l4....|" +"2019-05-02 09:27:53.280 UTC [msp.identity] Verify -> DEBU 2c49 Verify: sig = 00000000 30 45 02 21 00 b1 c9 4e 4b 22 bf 7d a5 b2 4a 33 |0E.!...NK".}..J3| +00000010 60 f0 8e ea 40 06 73 24 ee 8d a0 ff 9f 3f 28 69 |`...@.s$.....?(i| +00000020 06 0b a6 80 15 02 20 25 45 22 66 5f 08 ad 02 7f |...... %E"f_....| +00000030 d5 e2 8c 7f 52 06 3b 31 fd 48 ab 0b 8f 83 b0 cd |....R.;1.H......| +00000040 16 81 d6 f0 66 8b 5d |....f.]|" +"2019-05-02 09:27:53.280 UTC [cauthdsl] func2 -> DEBU 2c4a 0xc002615350 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:53.280 UTC [cauthdsl] func1 -> DEBU 2c4b 0xc002615350 gate 1556789273278938200 evaluation succeeds" +"2019-05-02 09:27:53.280 UTC [policies] Evaluate -> DEBU 2c4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.281 UTC [policies] Evaluate -> DEBU 2c4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.281 UTC [policies] Evaluate -> DEBU 2c4e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:53.281 UTC [policies] Evaluate -> DEBU 2c4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:53.281 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c50 Exiting" +"2019-05-02 09:27:53.281 UTC [gossip.discovery] sendMemResponse -> DEBU 2c51 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:53.282 UTC [msp] DeserializeIdentity -> DEBU 2c52 Obtaining identity" +"2019-05-02 09:27:53.286 UTC [msp] DeserializeIdentity -> DEBU 2c53 Obtaining identity" +"2019-05-02 09:27:53.286 UTC [msp] DeserializeIdentity -> DEBU 2c54 Obtaining identity" +"2019-05-02 09:27:53.286 UTC [gossip.comm] Send -> DEBU 2c55 Entering, sending GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:53.287 UTC [gossip.discovery] sendMemResponse -> DEBU 2c56 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:53.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2c57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7530466191730476110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-05-02 09:27:53.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2c58 Exiting" +"2019-05-02 09:27:53.810 UTC [gossip.comm] func1 -> DEBU 2c59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.810 UTC [gossip.gossip] handleMessage -> DEBU 2c5a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.812 UTC [gossip.gossip] handleMessage -> DEBU 2c5b Exiting" +"2019-05-02 09:27:53.812 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.813 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c5d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:53.813 UTC [msp] DeserializeIdentity -> DEBU 2c5e Obtaining identity" +"2019-05-02 09:27:53.814 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c5f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:53.814 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c60 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:53.814 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c61 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:53.814 UTC [policies] Evaluate -> DEBU 2c62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:53.815 UTC [policies] Evaluate -> DEBU 2c63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:53.815 UTC [policies] Evaluate -> DEBU 2c64 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:53.816 UTC [cauthdsl] func1 -> DEBU 2c65 0xc0025d5bc0 gate 1556789273816100700 evaluation starts" +"2019-05-02 09:27:53.816 UTC [cauthdsl] func2 -> DEBU 2c66 0xc0025d5bc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.816 UTC [cauthdsl] func2 -> DEBU 2c67 0xc0025d5bc0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:53.817 UTC [cauthdsl] func2 -> DEBU 2c68 0xc0025d5bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:53.818 UTC [cauthdsl] func2 -> DEBU 2c69 0xc0025d5bc0 principal evaluation fails" +"2019-05-02 09:27:53.818 UTC [cauthdsl] func1 -> DEBU 2c6a 0xc0025d5bc0 gate 1556789273816100700 evaluation fails" +"2019-05-02 09:27:53.818 UTC [policies] Evaluate -> DEBU 2c6b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.818 UTC [policies] Evaluate -> DEBU 2c6c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:53.818 UTC [policies] Evaluate -> DEBU 2c6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:53.819 UTC [cauthdsl] func1 -> DEBU 2c6e 0xc002566400 gate 1556789273818896100 evaluation starts" +"2019-05-02 09:27:53.819 UTC [cauthdsl] func2 -> DEBU 2c6f 0xc002566400 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:53.819 UTC [cauthdsl] func2 -> DEBU 2c70 0xc002566400 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:53.819 UTC [cauthdsl] func2 -> DEBU 2c71 0xc002566400 principal matched by identity 0" +"2019-05-02 09:27:53.819 UTC [msp.identity] Verify -> DEBU 2c72 Verify: digest = 00000000 c7 ea 98 ae dd 49 1d c3 5a a2 59 45 cb 57 32 20 |.....I..Z.YE.W2 | +00000010 d2 d4 25 a2 07 34 34 fe 75 77 36 54 6a 69 81 0a |..%..44.uw6Tji..|" +"2019-05-02 09:27:53.820 UTC [msp.identity] Verify -> DEBU 2c73 Verify: sig = 00000000 30 45 02 21 00 93 3d ca a3 f6 16 cd b9 de 79 77 |0E.!..=.......yw| +00000010 8d b6 bb 52 f5 4d 6f 89 5c c7 51 78 96 d9 ab 83 |...R.Mo.\.Qx....| +00000020 cf 22 be 6e 7c 02 20 06 66 14 b6 b1 c4 00 f4 16 |.".n|. .f.......| +00000030 23 7e a0 ec 4e 1b 34 c1 4a 26 71 63 b6 08 6e c2 |#~..N.4.J&qc..n.| +00000040 f7 3a 98 96 7e 4c dc |.:..~L.|" +"2019-05-02 09:27:53.821 UTC [cauthdsl] func2 -> DEBU 2c74 0xc002566400 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:53.821 UTC [cauthdsl] func1 -> DEBU 2c75 0xc002566400 gate 1556789273818896100 evaluation succeeds" +"2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c76 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c78 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:53.821 UTC [policies] Evaluate -> DEBU 2c79 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:53.822 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c7a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 " +"2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 " +"2019-05-02 09:27:53.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:53.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c7f Exiting" +"2019-05-02 09:27:53.823 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c80 Exiting" +"2019-05-02 09:27:53.823 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c81 Exiting" +"2019-05-02 09:27:53.823 UTC [msp] DeserializeIdentity -> DEBU 2c82 Obtaining identity" +"2019-05-02 09:27:53.824 UTC [msp] DeserializeIdentity -> DEBU 2c83 Obtaining identity" +"2019-05-02 09:27:53.824 UTC [msp] DeserializeIdentity -> DEBU 2c84 Obtaining identity" +"2019-05-02 09:27:53.824 UTC [msp] DeserializeIdentity -> DEBU 2c86 Obtaining identity" +"2019-05-02 09:27:53.825 UTC [msp] DeserializeIdentity -> DEBU 2c87 Obtaining identity" +"2019-05-02 09:27:53.825 UTC [msp] DeserializeIdentity -> DEBU 2c88 Obtaining identity" +"2019-05-02 09:27:53.825 UTC [msp] DeserializeIdentity -> DEBU 2c89 Obtaining identity" +"2019-05-02 09:27:53.826 UTC [gossip.comm] Send -> DEBU 2c8a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:53.824 UTC [gossip.gossip] handleMessage -> DEBU 2c85 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.826 UTC [msp] DeserializeIdentity -> DEBU 2c8b Obtaining identity" +"2019-05-02 09:27:53.826 UTC [gossip.gossip] handleMessage -> DEBU 2c8c Exiting" +"2019-05-02 09:27:53.826 UTC [gossip.comm] Send -> DEBU 2c8d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:53.826 UTC [gossip.gossip] handleMessage -> DEBU 2c8f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.827 UTC [gossip.comm] sendToEndpoint -> DEBU 2c8e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.827 UTC [gossip.comm] sendToEndpoint -> DEBU 2c90 Exiting" +"2019-05-02 09:27:53.827 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c91 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.828 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c92 Exiting" +"2019-05-02 09:27:53.828 UTC [gossip.comm] sendToEndpoint -> DEBU 2c93 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.828 UTC [gossip.comm] sendToEndpoint -> DEBU 2c94 Exiting" +"2019-05-02 09:27:53.828 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c95 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:53.829 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c96 Exiting" +"2019-05-02 09:27:53.829 UTC [gossip.gossip] handleMessage -> DEBU 2c97 Exiting" +"2019-05-02 09:27:54.045 UTC [msp.identity] Sign -> DEBU 2c98 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101E " +"2019-05-02 09:27:54.045 UTC [msp.identity] Sign -> DEBU 2c99 Sign: digest: C6C4B52E1E86197CF13CA2D018E3C6F21F2242615E7EEAB488E7A883173577B1 " +"2019-05-02 09:27:54.046 UTC [msp.identity] Sign -> DEBU 2c9a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:54.047 UTC [msp.identity] Sign -> DEBU 2c9b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:54.048 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2c9c Sleeping 5s" +"2019-05-02 09:27:54.049 UTC [msp] DeserializeIdentity -> DEBU 2c9d Obtaining identity" +"2019-05-02 09:27:54.049 UTC [msp] DeserializeIdentity -> DEBU 2c9e Obtaining identity" +"2019-05-02 09:27:54.050 UTC [gossip.comm] Send -> DEBU 2c9f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:54.050 UTC [msp] DeserializeIdentity -> DEBU 2ca0 Obtaining identity" +"2019-05-02 09:27:54.050 UTC [gossip.comm] Send -> DEBU 2ca2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:54.050 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:54.051 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca3 Exiting" +"2019-05-02 09:27:54.051 UTC [msp] DeserializeIdentity -> DEBU 2ca4 Obtaining identity" +"2019-05-02 09:27:54.051 UTC [gossip.comm] Send -> DEBU 2ca5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:54.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:54.052 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca7 Exiting" +"2019-05-02 09:27:54.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:54.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca9 Exiting" +"2019-05-02 09:27:54.090 UTC [gossip.gossip] handleMessage -> DEBU 2caa Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:54.091 UTC [gossip.gossip] handleMessage -> DEBU 2cab Exiting" +"2019-05-02 09:27:54.092 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:54.092 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2cad Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:54.093 UTC [msp.identity] Verify -> DEBU 2cae Verify: digest = 00000000 f2 5d 27 ab c1 e0 9c db 76 dd 3a a5 c4 05 82 ff |.]'.....v.:.....| +00000010 3f 52 39 a5 02 ed 24 c9 46 5c 66 5e 77 04 8f 58 |?R9...$.F\f^w..X|" +"2019-05-02 09:27:54.093 UTC [msp.identity] Verify -> DEBU 2caf Verify: sig = 00000000 30 44 02 20 18 54 a2 d3 e8 a7 31 b7 f9 30 98 1b |0D. .T....1..0..| +00000010 f2 59 18 89 25 54 06 13 d8 90 be c1 c4 39 31 ae |.Y..%T.......91.| +00000020 29 f3 59 1d 02 20 15 4a 37 78 68 2a 09 d2 0e 7d |).Y.. .J7xh*...}| +00000030 4e 7c f1 5d df 3b 96 dd fb b9 2f 86 9b 3a 9c 90 |N|.].;..../..:..| +00000040 5e ed a8 23 31 e0 |^..#1.|" +"2019-05-02 09:27:54.094 UTC [msp.identity] Verify -> DEBU 2cb0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:23.442 UTC [msp.identity] Verify -> DEBU 2c15 Verify: sig = 00000000 30 45 02 21 00 98 bf 20 4c 73 d6 bb 18 a6 ff fb |0E.!... Ls......| -00000010 22 16 57 5d 2d fd 92 d0 70 58 2d 39 0c aa ef 8d |".W]-...pX-9....| -00000020 d2 87 d3 b0 72 02 20 6a 02 0a 47 43 e8 1f e7 49 |....r. j..GC...I| -00000030 01 57 08 22 35 cf e6 46 a0 d3 60 3f 12 75 d0 21 |.W."5..F..`?.u.!| -00000040 8b 5b 35 d2 b8 fe cd |.[5....|" -"2019-05-02 01:31:23.443 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c16 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:23.444 UTC [gossip.comm] func1 -> DEBU 2c17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.445 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c18 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:23.445 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c19 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 " -"2019-05-02 01:31:23.446 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c1a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 " -"2019-05-02 01:31:23.446 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c1b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:23.446 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c1c Exiting" -"2019-05-02 01:31:23.447 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c1d Exiting" -"2019-05-02 01:31:23.447 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c1e Exiting" -"2019-05-02 01:31:23.447 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c1f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.448 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c22 Exiting" -"2019-05-02 01:31:23.448 UTC [gossip.gossip] handleMessage -> DEBU 2c20 Exiting" -"2019-05-02 01:31:23.448 UTC [msp] DeserializeIdentity -> DEBU 2c21 Obtaining identity" -"2019-05-02 01:31:23.450 UTC [msp] DeserializeIdentity -> DEBU 2c24 Obtaining identity" -"2019-05-02 01:31:23.449 UTC [gossip.gossip] handleMessage -> DEBU 2c23 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.450 UTC [gossip.gossip] handleMessage -> DEBU 2c25 Exiting" -"2019-05-02 01:31:23.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c27 Exiting" -"2019-05-02 01:31:23.451 UTC [msp] DeserializeIdentity -> DEBU 2c28 Obtaining identity" -"2019-05-02 01:31:23.452 UTC [gossip.comm] Send -> DEBU 2c29 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:23.453 UTC [gossip.comm] sendToEndpoint -> DEBU 2c2a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.453 UTC [gossip.comm] sendToEndpoint -> DEBU 2c2b Exiting" -"2019-05-02 01:31:23.455 UTC [msp] DeserializeIdentity -> DEBU 2c2c Obtaining identity" -"2019-05-02 01:31:23.455 UTC [gossip.comm] Send -> DEBU 2c2d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:23.456 UTC [gossip.comm] sendToEndpoint -> DEBU 2c2e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.457 UTC [gossip.comm] sendToEndpoint -> DEBU 2c2f Exiting" -"2019-05-02 01:31:23.512 UTC [gossip.comm] func1 -> DEBU 2c30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.513 UTC [gossip.gossip] handleMessage -> DEBU 2c31 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.513 UTC [gossip.gossip] handleMessage -> DEBU 2c32 Exiting" -"2019-05-02 01:31:23.514 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c33 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.515 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c34 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:23.516 UTC [msp] DeserializeIdentity -> DEBU 2c35 Obtaining identity" -"2019-05-02 01:31:23.519 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c36 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:23.520 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c38 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:23.521 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c39 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:23.520 UTC [gossip.gossip] handleMessage -> DEBU 2c37 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.522 UTC [policies] Evaluate -> DEBU 2c3a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:23.526 UTC [policies] Evaluate -> DEBU 2c3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:23.526 UTC [policies] Evaluate -> DEBU 2c3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:23.527 UTC [cauthdsl] func1 -> DEBU 2c3d 0xc002e52a20 gate 1556760683527208700 evaluation starts" -"2019-05-02 01:31:23.527 UTC [cauthdsl] func2 -> DEBU 2c3e 0xc002e52a20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:23.530 UTC [cauthdsl] func2 -> DEBU 2c40 0xc002e52a20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:23.529 UTC [gossip.comm] func1 -> DEBU 2c3f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.530 UTC [cauthdsl] func2 -> DEBU 2c41 0xc002e52a20 principal matched by identity 0" -"2019-05-02 01:31:23.531 UTC [msp.identity] Verify -> DEBU 2c42 Verify: digest = 00000000 6e 95 b6 b0 c7 91 d7 10 c2 21 da 73 da 0d 75 d7 |n........!.s..u.| -00000010 8f d2 6e 0f a7 34 88 04 26 2d c9 a7 88 60 f6 3a |..n..4..&-...`.:|" -"2019-05-02 01:31:23.531 UTC [msp.identity] Verify -> DEBU 2c43 Verify: sig = 00000000 30 44 02 20 74 26 1b 9e 5e ae 1f b2 28 23 6b 59 |0D. t&..^...(#kY| -00000010 60 69 a6 32 b9 59 8a 21 ca 55 77 03 6e cc d2 14 |`i.2.Y.!.Uw.n...| -00000020 7f 38 19 ef 02 20 03 8e 1e 07 46 3b e7 f1 7c 89 |.8... ....F;..|.| -00000030 0a 54 cc 42 5b 2e fb e8 b0 aa 33 93 e0 c8 c0 ab |.T.B[.....3.....| -00000040 b3 c5 c8 6c 0e 0f |...l..|" -"2019-05-02 01:31:23.531 UTC [cauthdsl] func2 -> DEBU 2c44 0xc002e52a20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:23.531 UTC [cauthdsl] func1 -> DEBU 2c45 0xc002e52a20 gate 1556760683527208700 evaluation succeeds" -"2019-05-02 01:31:23.532 UTC [policies] Evaluate -> DEBU 2c46 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:23.532 UTC [policies] Evaluate -> DEBU 2c47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:23.532 UTC [policies] Evaluate -> DEBU 2c48 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:23.532 UTC [policies] Evaluate -> DEBU 2c49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:23.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c4a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c4b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:23.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c4c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 " -"2019-05-02 01:31:23.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c4d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 " -"2019-05-02 01:31:23.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c4e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:23.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c4f Exiting" -"2019-05-02 01:31:23.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c50 Exiting" -"2019-05-02 01:31:23.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c51 Exiting" -"2019-05-02 01:31:23.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c53 Exiting" -"2019-05-02 01:31:23.534 UTC [gossip.gossip] handleMessage -> DEBU 2c54 Exiting" -"2019-05-02 01:31:23.534 UTC [gossip.gossip] handleMessage -> DEBU 2c55 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.534 UTC [gossip.gossip] handleMessage -> DEBU 2c56 Exiting" -"2019-05-02 01:31:23.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c57 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c58 Exiting" -"2019-05-02 01:31:23.552 UTC [msp] DeserializeIdentity -> DEBU 2c59 Obtaining identity" -"2019-05-02 01:31:23.555 UTC [msp] DeserializeIdentity -> DEBU 2c5a Obtaining identity" -"2019-05-02 01:31:23.556 UTC [msp] DeserializeIdentity -> DEBU 2c5b Obtaining identity" -"2019-05-02 01:31:23.556 UTC [msp] DeserializeIdentity -> DEBU 2c5c Obtaining identity" -"2019-05-02 01:31:23.558 UTC [msp] DeserializeIdentity -> DEBU 2c5d Obtaining identity" -"2019-05-02 01:31:23.558 UTC [msp] DeserializeIdentity -> DEBU 2c5e Obtaining identity" -"2019-05-02 01:31:23.559 UTC [gossip.comm] Send -> DEBU 2c5f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:23.559 UTC [msp] DeserializeIdentity -> DEBU 2c60 Obtaining identity" -"2019-05-02 01:31:23.560 UTC [msp] DeserializeIdentity -> DEBU 2c61 Obtaining identity" -"2019-05-02 01:31:23.560 UTC [gossip.comm] Send -> DEBU 2c63 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:23.560 UTC [gossip.comm] sendToEndpoint -> DEBU 2c62 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.561 UTC [gossip.comm] sendToEndpoint -> DEBU 2c64 Exiting" -"2019-05-02 01:31:23.561 UTC [gossip.comm] sendToEndpoint -> DEBU 2c65 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:23.562 UTC [gossip.comm] sendToEndpoint -> DEBU 2c66 Exiting" -"2019-05-02 01:31:23.584 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 2c67 Sleeping 25s" -"2019-05-02 01:31:23.734 UTC [msp.identity] Sign -> DEBU 2c68 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151020 " -"2019-05-02 01:31:23.735 UTC [msp.identity] Sign -> DEBU 2c69 Sign: digest: 59A9AA61B8E22D39749EF8E08079F619392C601F669D880D80EF7F75EB8852D2 " -"2019-05-02 01:31:23.735 UTC [msp.identity] Sign -> DEBU 2c6a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:23.735 UTC [msp.identity] Sign -> DEBU 2c6b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:23.736 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2c6c Sleeping 5s" -"2019-05-02 01:31:23.744 UTC [msp] DeserializeIdentity -> DEBU 2c6d Obtaining identity" -"2019-05-02 01:31:23.745 UTC [msp] DeserializeIdentity -> DEBU 2c6e Obtaining identity" -"2019-05-02 01:31:23.746 UTC [gossip.comm] Send -> DEBU 2c6f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:23.746 UTC [msp] DeserializeIdentity -> DEBU 2c70 Obtaining identity" -"2019-05-02 01:31:23.746 UTC [gossip.comm] sendToEndpoint -> DEBU 2c71 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:23.746 UTC [gossip.comm] sendToEndpoint -> DEBU 2c72 Exiting" -"2019-05-02 01:31:23.747 UTC [gossip.comm] Send -> DEBU 2c73 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:23.749 UTC [gossip.comm] sendToEndpoint -> DEBU 2c74 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.750 UTC [gossip.comm] sendToEndpoint -> DEBU 2c75 Exiting" -"2019-05-02 01:31:23.750 UTC [msp] DeserializeIdentity -> DEBU 2c76 Obtaining identity" -"2019-05-02 01:31:23.751 UTC [gossip.comm] Send -> DEBU 2c77 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:23.752 UTC [gossip.comm] sendToEndpoint -> DEBU 2c78 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.753 UTC [gossip.comm] sendToEndpoint -> DEBU 2c79 Exiting" -"2019-05-02 01:31:23.848 UTC [gossip.comm] func1 -> DEBU 2c7a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.849 UTC [gossip.gossip] handleMessage -> DEBU 2c7b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c7c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.850 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c7e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:23.851 UTC [msp] DeserializeIdentity -> DEBU 2c7f Obtaining identity" -"2019-05-02 01:31:23.849 UTC [gossip.gossip] handleMessage -> DEBU 2c7d Exiting" -"2019-05-02 01:31:23.854 UTC [gossip.gossip] handleMessage -> DEBU 2c80 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.855 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c81 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:23.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c82 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:23.856 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c83 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:23.858 UTC [policies] Evaluate -> DEBU 2c84 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:23.859 UTC [policies] Evaluate -> DEBU 2c85 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:23.859 UTC [policies] Evaluate -> DEBU 2c86 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:23.860 UTC [cauthdsl] func1 -> DEBU 2c87 0xc003084f90 gate 1556760683860388800 evaluation starts" -"2019-05-02 01:31:23.860 UTC [cauthdsl] func2 -> DEBU 2c88 0xc003084f90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:23.861 UTC [cauthdsl] func2 -> DEBU 2c89 0xc003084f90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:23.861 UTC [cauthdsl] func2 -> DEBU 2c8a 0xc003084f90 principal matched by identity 0" -"2019-05-02 01:31:23.862 UTC [msp.identity] Verify -> DEBU 2c8b Verify: digest = 00000000 17 7b 4c e1 47 f4 a4 bd d2 66 a7 99 b1 f5 de 29 |.{L.G....f.....)| -00000010 c6 7b b4 35 5e 0f d3 c2 3f 27 7c 20 a8 40 28 75 |.{.5^...?'| .@(u|" -"2019-05-02 01:31:23.862 UTC [msp.identity] Verify -> DEBU 2c8c Verify: sig = 00000000 30 45 02 21 00 93 e2 9c 38 2c 9d 96 b1 48 06 a2 |0E.!....8,...H..| -00000010 ef 07 06 89 5e d3 86 5f 1d 32 e8 64 9e d6 95 e1 |....^.._.2.d....| -00000020 dd 08 0d 22 1a 02 20 64 ec 58 71 b4 bf be 18 3f |...".. d.Xq....?| -00000030 f5 f8 90 18 62 cb 80 b0 85 82 a0 9e ae 6a 9b 6c |....b........j.l| -00000040 66 a5 67 df 79 e1 02 |f.g.y..|" -"2019-05-02 01:31:23.863 UTC [cauthdsl] func2 -> DEBU 2c8d 0xc003084f90 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:23.864 UTC [cauthdsl] func1 -> DEBU 2c8e 0xc003084f90 gate 1556760683860388800 evaluation succeeds" -"2019-05-02 01:31:23.864 UTC [gossip.comm] func1 -> DEBU 2c8f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.865 UTC [policies] Evaluate -> DEBU 2c90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:23.866 UTC [policies] Evaluate -> DEBU 2c91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:23.866 UTC [policies] Evaluate -> DEBU 2c92 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:23.867 UTC [policies] Evaluate -> DEBU 2c93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:23.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.868 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c95 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:23.868 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c96 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 " -"2019-05-02 01:31:23.869 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c97 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 " -"2019-05-02 01:31:23.869 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c98 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:23.870 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c99 Exiting" -"2019-05-02 01:31:23.870 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c9a Exiting" -"2019-05-02 01:31:23.870 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c9b Exiting" -"2019-05-02 01:31:23.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c9c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c9e Exiting" -"2019-05-02 01:31:23.871 UTC [gossip.gossip] handleMessage -> DEBU 2c9d Exiting" -"2019-05-02 01:31:23.872 UTC [gossip.gossip] handleMessage -> DEBU 2c9f Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.879 UTC [gossip.gossip] handleMessage -> DEBU 2ca0 Exiting" -"2019-05-02 01:31:23.881 UTC [msp] DeserializeIdentity -> DEBU 2ca1 Obtaining identity" -"2019-05-02 01:31:23.884 UTC [msp] DeserializeIdentity -> DEBU 2ca2 Obtaining identity" -"2019-05-02 01:31:23.886 UTC [msp] DeserializeIdentity -> DEBU 2ca3 Obtaining identity" -"2019-05-02 01:31:23.887 UTC [msp] DeserializeIdentity -> DEBU 2ca4 Obtaining identity" -"2019-05-02 01:31:23.889 UTC [msp] DeserializeIdentity -> DEBU 2ca5 Obtaining identity" -"2019-05-02 01:31:23.890 UTC [msp] DeserializeIdentity -> DEBU 2ca7 Obtaining identity" -"2019-05-02 01:31:23.889 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ca6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ca8 Exiting" -"2019-05-02 01:31:23.893 UTC [gossip.comm] Send -> DEBU 2ca9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:23.894 UTC [msp] DeserializeIdentity -> DEBU 2caa Obtaining identity" -"2019-05-02 01:31:23.896 UTC [msp] DeserializeIdentity -> DEBU 2cac Obtaining identity" -"2019-05-02 01:31:23.894 UTC [gossip.comm] sendToEndpoint -> DEBU 2cab Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.899 UTC [gossip.comm] sendToEndpoint -> DEBU 2cad Exiting" -"2019-05-02 01:31:23.899 UTC [gossip.comm] Send -> DEBU 2cae Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:23.902 UTC [gossip.comm] sendToEndpoint -> DEBU 2caf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:23.902 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb0 Exiting" -"2019-05-02 01:31:24.827 UTC [msp] DeserializeIdentity -> DEBU 2cb1 Obtaining identity" -"2019-05-02 01:31:24.828 UTC [msp] DeserializeIdentity -> DEBU 2cb2 Obtaining identity" -"2019-05-02 01:31:24.829 UTC [gossip.comm] Send -> DEBU 2cb3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:24.829 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.830 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb5 Exiting" -"2019-05-02 01:31:24.830 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.830 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb7 Exiting" -"2019-05-02 01:31:24.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.833 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb9 Exiting" -"2019-05-02 01:31:24.833 UTC [gossip.gossip] handleMessage -> DEBU 2cba Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.836 UTC [gossip.comm] func1 -> DEBU 2cbc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.834 UTC [gossip.comm] func1 -> DEBU 2cbb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.837 UTC [msp.identity] Verify -> DEBU 2cbd Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:24.838 UTC [msp.identity] Verify -> DEBU 2cbe Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:24.840 UTC [msp.identity] Verify -> DEBU 2cbf Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:24.840 UTC [msp.identity] Verify -> DEBU 2cc0 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:24.841 UTC [msp] DeserializeIdentity -> DEBU 2cc1 Obtaining identity" -"2019-05-02 01:31:24.841 UTC [msp] DeserializeIdentity -> DEBU 2cc2 Obtaining identity" -"2019-05-02 01:31:24.842 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cc3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:24.843 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cc4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.843 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cc5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.844 UTC [policies] Evaluate -> DEBU 2cc6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:24.846 UTC [policies] Evaluate -> DEBU 2cc7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.846 UTC [policies] Evaluate -> DEBU 2cc8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:24.847 UTC [cauthdsl] func1 -> DEBU 2cc9 0xc0033a5390 gate 1556760684847139800 evaluation starts" -"2019-05-02 01:31:24.847 UTC [cauthdsl] func2 -> DEBU 2cca 0xc0033a5390 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:24.848 UTC [cauthdsl] func2 -> DEBU 2ccb 0xc0033a5390 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:24.849 UTC [cauthdsl] func2 -> DEBU 2ccc 0xc0033a5390 principal matched by identity 0" -"2019-05-02 01:31:24.850 UTC [msp.identity] Verify -> DEBU 2ccd Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:24.851 UTC [msp.identity] Verify -> DEBU 2cce Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:24.851 UTC [cauthdsl] func2 -> DEBU 2ccf 0xc0033a5390 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:24.852 UTC [cauthdsl] func1 -> DEBU 2cd0 0xc0033a5390 gate 1556760684847139800 evaluation succeeds" -"2019-05-02 01:31:24.852 UTC [policies] Evaluate -> DEBU 2cd1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.854 UTC [policies] Evaluate -> DEBU 2cd2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.854 UTC [policies] Evaluate -> DEBU 2cd3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:24.855 UTC [policies] Evaluate -> DEBU 2cd4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:24.856 UTC [msp] DeserializeIdentity -> DEBU 2cd5 Obtaining identity" -"2019-05-02 01:31:24.857 UTC [msp] DeserializeIdentity -> DEBU 2cd6 Obtaining identity" -"2019-05-02 01:31:24.858 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cd7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:24.858 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd9 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.859 UTC [policies] Evaluate -> DEBU 2cda == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:24.860 UTC [policies] Evaluate -> DEBU 2cdb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.860 UTC [policies] Evaluate -> DEBU 2cdc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:24.861 UTC [cauthdsl] func1 -> DEBU 2cdd 0xc0033eeb60 gate 1556760684861516300 evaluation starts" -"2019-05-02 01:31:24.862 UTC [cauthdsl] func2 -> DEBU 2cde 0xc0033eeb60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:24.862 UTC [cauthdsl] func2 -> DEBU 2cdf 0xc0033eeb60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:24.862 UTC [cauthdsl] func2 -> DEBU 2ce0 0xc0033eeb60 principal matched by identity 0" -"2019-05-02 01:31:24.863 UTC [msp.identity] Verify -> DEBU 2ce1 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:24.863 UTC [msp.identity] Verify -> DEBU 2ce2 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:24.864 UTC [cauthdsl] func2 -> DEBU 2ce3 0xc0033eeb60 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:24.865 UTC [cauthdsl] func1 -> DEBU 2ce4 0xc0033eeb60 gate 1556760684861516300 evaluation succeeds" -"2019-05-02 01:31:24.865 UTC [policies] Evaluate -> DEBU 2ce5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.865 UTC [policies] Evaluate -> DEBU 2ce6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.866 UTC [policies] Evaluate -> DEBU 2ce7 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:24.867 UTC [policies] Evaluate -> DEBU 2ce8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:24.867 UTC [gossip.gossip] handleMessage -> DEBU 2ce9 Exiting" -"2019-05-02 01:31:24.867 UTC [gossip.gossip] handleMessage -> DEBU 2cea Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.868 UTC [msp] DeserializeIdentity -> DEBU 2ceb Obtaining identity" -"2019-05-02 01:31:24.869 UTC [msp] DeserializeIdentity -> DEBU 2cec Obtaining identity" -"2019-05-02 01:31:24.869 UTC [msp] DeserializeIdentity -> DEBU 2ced Obtaining identity" -"2019-05-02 01:31:24.870 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:24.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cef Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cf0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.873 UTC [policies] Evaluate -> DEBU 2cf1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:24.873 UTC [policies] Evaluate -> DEBU 2cf2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.874 UTC [policies] Evaluate -> DEBU 2cf3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:24.874 UTC [cauthdsl] func1 -> DEBU 2cf4 0xc003564670 gate 1556760684874948200 evaluation starts" -"2019-05-02 01:31:24.875 UTC [cauthdsl] func2 -> DEBU 2cf5 0xc003564670 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:24.875 UTC [cauthdsl] func2 -> DEBU 2cf6 0xc003564670 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:24.876 UTC [cauthdsl] func2 -> DEBU 2cf7 0xc003564670 principal matched by identity 0" -"2019-05-02 01:31:24.876 UTC [msp.identity] Verify -> DEBU 2cf8 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:24.877 UTC [msp.identity] Verify -> DEBU 2cf9 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:24.878 UTC [cauthdsl] func2 -> DEBU 2cfa 0xc003564670 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:24.878 UTC [cauthdsl] func1 -> DEBU 2cfb 0xc003564670 gate 1556760684874948200 evaluation succeeds" -"2019-05-02 01:31:24.878 UTC [policies] Evaluate -> DEBU 2cfc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.879 UTC [policies] Evaluate -> DEBU 2cfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.880 UTC [policies] Evaluate -> DEBU 2cfe Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:24.880 UTC [policies] Evaluate -> DEBU 2cff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:24.881 UTC [msp.identity] Verify -> DEBU 2d00 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:24.881 UTC [msp.identity] Verify -> DEBU 2d01 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:24.883 UTC [msp.identity] Verify -> DEBU 2d02 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:24.883 UTC [msp.identity] Verify -> DEBU 2d03 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:24.884 UTC [msp] DeserializeIdentity -> DEBU 2d04 Obtaining identity" -"2019-05-02 01:31:24.885 UTC [msp] DeserializeIdentity -> DEBU 2d05 Obtaining identity" -"2019-05-02 01:31:24.886 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:24.886 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d07 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.886 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d08 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.887 UTC [policies] Evaluate -> DEBU 2d09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:24.887 UTC [policies] Evaluate -> DEBU 2d0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.888 UTC [policies] Evaluate -> DEBU 2d0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:24.888 UTC [cauthdsl] func1 -> DEBU 2d0c 0xc003806c80 gate 1556760684888447300 evaluation starts" -"2019-05-02 01:31:24.888 UTC [cauthdsl] func2 -> DEBU 2d0d 0xc003806c80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:24.889 UTC [cauthdsl] func2 -> DEBU 2d0e 0xc003806c80 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:24.889 UTC [cauthdsl] func2 -> DEBU 2d0f 0xc003806c80 principal matched by identity 0" -"2019-05-02 01:31:24.890 UTC [msp.identity] Verify -> DEBU 2d10 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:24.890 UTC [msp.identity] Verify -> DEBU 2d11 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:24.891 UTC [cauthdsl] func2 -> DEBU 2d12 0xc003806c80 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:24.891 UTC [cauthdsl] func1 -> DEBU 2d13 0xc003806c80 gate 1556760684888447300 evaluation succeeds" -"2019-05-02 01:31:24.891 UTC [policies] Evaluate -> DEBU 2d14 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.892 UTC [policies] Evaluate -> DEBU 2d15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.893 UTC [policies] Evaluate -> DEBU 2d16 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:24.893 UTC [policies] Evaluate -> DEBU 2d17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:24.894 UTC [gossip.gossip] handleMessage -> DEBU 2d18 Exiting" -"2019-05-02 01:31:24.894 UTC [gossip.gossip] handleMessage -> DEBU 2d19 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.894 UTC [msp] DeserializeIdentity -> DEBU 2d1a Obtaining identity" -"2019-05-02 01:31:24.895 UTC [msp] DeserializeIdentity -> DEBU 2d1b Obtaining identity" -"2019-05-02 01:31:24.895 UTC [msp] DeserializeIdentity -> DEBU 2d1c Obtaining identity" -"2019-05-02 01:31:24.896 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d1d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:24.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d1e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.897 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d1f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.897 UTC [policies] Evaluate -> DEBU 2d20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:24.898 UTC [policies] Evaluate -> DEBU 2d21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.898 UTC [policies] Evaluate -> DEBU 2d22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:24.899 UTC [cauthdsl] func1 -> DEBU 2d23 0xc003af2790 gate 1556760684899407000 evaluation starts" -"2019-05-02 01:31:24.899 UTC [cauthdsl] func2 -> DEBU 2d24 0xc003af2790 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:24.900 UTC [cauthdsl] func2 -> DEBU 2d25 0xc003af2790 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:24.900 UTC [cauthdsl] func2 -> DEBU 2d26 0xc003af2790 principal matched by identity 0" -"2019-05-02 01:31:24.901 UTC [msp.identity] Verify -> DEBU 2d27 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:24.901 UTC [msp.identity] Verify -> DEBU 2d28 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:24.902 UTC [cauthdsl] func2 -> DEBU 2d29 0xc003af2790 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:24.902 UTC [cauthdsl] func1 -> DEBU 2d2a 0xc003af2790 gate 1556760684899407000 evaluation succeeds" -"2019-05-02 01:31:24.903 UTC [policies] Evaluate -> DEBU 2d2b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.903 UTC [policies] Evaluate -> DEBU 2d2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.904 UTC [policies] Evaluate -> DEBU 2d2d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:24.905 UTC [policies] Evaluate -> DEBU 2d2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:24.905 UTC [msp.identity] Verify -> DEBU 2d2f Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:24.906 UTC [msp.identity] Verify -> DEBU 2d30 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:24.907 UTC [msp.identity] Verify -> DEBU 2d31 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:24.907 UTC [msp.identity] Verify -> DEBU 2d32 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:24.907 UTC [msp] DeserializeIdentity -> DEBU 2d33 Obtaining identity" -"2019-05-02 01:31:24.908 UTC [msp] DeserializeIdentity -> DEBU 2d34 Obtaining identity" -"2019-05-02 01:31:24.908 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d35 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:24.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d36 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d37 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:24.909 UTC [policies] Evaluate -> DEBU 2d38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:24.909 UTC [policies] Evaluate -> DEBU 2d39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:24.910 UTC [policies] Evaluate -> DEBU 2d3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:24.910 UTC [cauthdsl] func1 -> DEBU 2d3b 0xc003b06da0 gate 1556760684910711200 evaluation starts" -"2019-05-02 01:31:24.910 UTC [cauthdsl] func2 -> DEBU 2d3c 0xc003b06da0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:24.911 UTC [cauthdsl] func2 -> DEBU 2d3d 0xc003b06da0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:24.911 UTC [cauthdsl] func2 -> DEBU 2d3e 0xc003b06da0 principal matched by identity 0" -"2019-05-02 01:31:24.911 UTC [msp.identity] Verify -> DEBU 2d3f Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:24.912 UTC [msp.identity] Verify -> DEBU 2d40 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:24.912 UTC [cauthdsl] func2 -> DEBU 2d41 0xc003b06da0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:24.913 UTC [cauthdsl] func1 -> DEBU 2d42 0xc003b06da0 gate 1556760684910711200 evaluation succeeds" -"2019-05-02 01:31:24.913 UTC [policies] Evaluate -> DEBU 2d43 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.914 UTC [policies] Evaluate -> DEBU 2d44 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:24.914 UTC [policies] Evaluate -> DEBU 2d45 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:24.914 UTC [policies] Evaluate -> DEBU 2d46 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:24.914 UTC [gossip.gossip] handleMessage -> DEBU 2d47 Exiting" -"2019-05-02 01:31:24.945 UTC [msp] DeserializeIdentity -> DEBU 2d48 Obtaining identity" -"2019-05-02 01:31:24.946 UTC [msp] DeserializeIdentity -> DEBU 2d49 Obtaining identity" -"2019-05-02 01:31:24.947 UTC [gossip.pull] Hello -> DEBU 2d4a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:24.948 UTC [msp] DeserializeIdentity -> DEBU 2d4b Obtaining identity" -"2019-05-02 01:31:24.949 UTC [msp] DeserializeIdentity -> DEBU 2d4c Obtaining identity" -"2019-05-02 01:31:24.949 UTC [gossip.comm] Send -> DEBU 2d4d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:24.951 UTC [gossip.comm] sendToEndpoint -> DEBU 2d4e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.951 UTC [gossip.comm] sendToEndpoint -> DEBU 2d4f Exiting" -"2019-05-02 01:31:24.954 UTC [gossip.gossip] handleMessage -> DEBU 2d50 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9383867273750908648 , Msg_type: BLOCK_MSG, digests: [2 3 4 5 6 7 8 1], Envelope: 58 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.954 UTC [gossip.pull] HandleMessage -> DEBU 2d51 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9383867273750908648 , Msg_type: BLOCK_MSG, digests: [2 3 4 5 6 7 8 1], Envelope: 58 bytes, Signature: 0 bytes" -"2019-05-02 01:31:24.955 UTC [gossip.gossip] handleMessage -> DEBU 2d52 Exiting" -"2019-05-02 01:31:25.090 UTC [gossip.gossip] handleMessage -> DEBU 2d53 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.090 UTC [msp] DeserializeIdentity -> DEBU 2d54 Obtaining identity" -"2019-05-02 01:31:25.090 UTC [msp] DeserializeIdentity -> DEBU 2d55 Obtaining identity" -"2019-05-02 01:31:25.090 UTC [gossip.gossip] handleMessage -> DEBU 2d56 Exiting" -"2019-05-02 01:31:25.125 UTC [gossip.gossip] handleMessage -> DEBU 2d57 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.126 UTC [gossip.pull] HandleMessage -> DEBU 2d58 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.126 UTC [gossip.pull] SendDigest -> DEBU 2d59 Sending BLOCK_MSG digest: [8 1 2 3 4 5 6 7] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:25.126 UTC [gossip.gossip] handleMessage -> DEBU 2d5a Exiting" -"2019-05-02 01:31:25.356 UTC [gossip.comm] func1 -> DEBU 2d5b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.359 UTC [gossip.gossip] handleMessage -> DEBU 2d5c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.367 UTC [msp] DeserializeIdentity -> DEBU 2d5d Obtaining identity" -"2019-05-02 01:31:25.368 UTC [msp] DeserializeIdentity -> DEBU 2d5e Obtaining identity" -"2019-05-02 01:31:25.370 UTC [msp] DeserializeIdentity -> DEBU 2d5f Obtaining identity" -"2019-05-02 01:31:25.373 UTC [gossip.gossip] handleMessage -> DEBU 2d60 Exiting" -"2019-05-02 01:31:25.436 UTC [gossip.gossip] handleMessage -> DEBU 2d61 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.438 UTC [gossip.pull] HandleMessage -> DEBU 2d62 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.439 UTC [gossip.pull] SendDigest -> DEBU 2d63 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:25.439 UTC [gossip.gossip] handleMessage -> DEBU 2d64 Exiting" -"2019-05-02 01:31:25.450 UTC [gossip.gossip] handleMessage -> DEBU 2d65 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.452 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d67 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:25.452 UTC [msp.identity] Verify -> DEBU 2d68 Verify: digest = 00000000 f4 72 c5 fd 97 6b 27 a8 b0 ab 5f 86 dd 06 ab 0f |.r...k'..._.....| -00000010 4a f0 f5 aa df bf 90 11 15 e0 6c 6f 57 1e d1 b2 |J.........loW...|" -"2019-05-02 01:31:25.452 UTC [msp.identity] Verify -> DEBU 2d69 Verify: sig = 00000000 30 44 02 20 28 b0 34 fe 1b c3 1e ed d8 76 9d b4 |0D. (.4......v..| -00000010 c7 88 37 3c 2a 76 3e fa 41 aa 2a 6e 26 a7 6b 85 |..7<*v>.A.*n&.k.| -00000020 57 86 d8 46 02 20 38 6d a5 66 57 b2 80 92 99 85 |W..F. 8m.fW.....| -00000030 0b 92 b9 4e 66 b1 3a 23 02 e5 db 40 ec e5 27 e0 |...Nf.:#...@..'.| -00000040 9b 2e b9 1f 40 df |....@.|" -"2019-05-02 01:31:25.454 UTC [msp.identity] Verify -> DEBU 2d6a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:54.094 UTC [msp.identity] Verify -> DEBU 2cb1 Verify: sig = 00000000 30 45 02 21 00 9f be 4d b8 64 d0 91 c8 ac a4 46 |0E.!...M.d.....F| +00000010 bb cc c8 65 67 16 c4 02 6e f7 eb 94 ee 91 83 d8 |...eg...n.......| +00000020 d1 d5 04 09 ec 02 20 5e ab d7 67 1f 7d 80 07 c0 |...... ^..g.}...| +00000030 f6 6c 50 74 bf f0 24 c8 fc e4 b7 4f c3 5c b3 95 |.lPt..$....O.\..| +00000040 5f f4 10 29 bc f5 9f |_..)...|" +"2019-05-02 09:27:54.095 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cb2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb4 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 " +"2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 " +"2019-05-02 09:27:54.095 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:54.096 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cb7 Exiting" +"2019-05-02 09:27:54.096 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cb8 Exiting" +"2019-05-02 09:27:54.096 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cb9 Exiting" +"2019-05-02 09:27:54.100 UTC [gossip.gossip] handleMessage -> DEBU 2cba Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.100 UTC [gossip.gossip] handleMessage -> DEBU 2cbb Exiting" +"2019-05-02 09:27:54.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cbc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cbd Exiting" +"2019-05-02 09:27:54.101 UTC [gossip.comm] func1 -> DEBU 2cbe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.101 UTC [gossip.gossip] handleMessage -> DEBU 2cbf Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.101 UTC [gossip.gossip] handleMessage -> DEBU 2cc0 Exiting" +"2019-05-02 09:27:54.101 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cc1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cc2 Exiting" +"2019-05-02 09:27:54.104 UTC [msp] DeserializeIdentity -> DEBU 2cc3 Obtaining identity" +"2019-05-02 09:27:54.105 UTC [msp] DeserializeIdentity -> DEBU 2cc4 Obtaining identity" +"2019-05-02 09:27:54.105 UTC [msp] DeserializeIdentity -> DEBU 2cc5 Obtaining identity" +"2019-05-02 09:27:54.106 UTC [gossip.comm] Send -> DEBU 2cc6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:54.106 UTC [msp] DeserializeIdentity -> DEBU 2cc7 Obtaining identity" +"2019-05-02 09:27:54.107 UTC [gossip.comm] Send -> DEBU 2cc8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:54.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2cc9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2cca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2ccb Exiting" +"2019-05-02 09:27:54.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2ccc Exiting" +"2019-05-02 09:27:54.169 UTC [gossip.gossip] handleMessage -> DEBU 2ccd Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.169 UTC [gossip.gossip] handleMessage -> DEBU 2cce Exiting" +"2019-05-02 09:27:54.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ccf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.170 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2cd0 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:54.170 UTC [msp] DeserializeIdentity -> DEBU 2cd1 Obtaining identity" +"2019-05-02 09:27:54.171 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cd2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:54.171 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:54.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:54.172 UTC [policies] Evaluate -> DEBU 2cd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:54.173 UTC [policies] Evaluate -> DEBU 2cd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:54.173 UTC [policies] Evaluate -> DEBU 2cd7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:54.174 UTC [cauthdsl] func1 -> DEBU 2cd8 0xc0024489f0 gate 1556789274174389000 evaluation starts" +"2019-05-02 09:27:54.175 UTC [cauthdsl] func2 -> DEBU 2cd9 0xc0024489f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.176 UTC [cauthdsl] func2 -> DEBU 2cda 0xc0024489f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:54.176 UTC [cauthdsl] func2 -> DEBU 2cdb 0xc0024489f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:54.177 UTC [cauthdsl] func2 -> DEBU 2cdc 0xc0024489f0 principal evaluation fails" +"2019-05-02 09:27:54.179 UTC [gossip.gossip] handleMessage -> DEBU 2cdd Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.179 UTC [gossip.comm] func1 -> DEBU 2cde Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.180 UTC [cauthdsl] func1 -> DEBU 2cdf 0xc0024489f0 gate 1556789274174389000 evaluation fails" +"2019-05-02 09:27:54.183 UTC [policies] Evaluate -> DEBU 2ce0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:54.183 UTC [policies] Evaluate -> DEBU 2ce1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:54.184 UTC [policies] Evaluate -> DEBU 2ce2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:54.184 UTC [cauthdsl] func1 -> DEBU 2ce3 0xc002449630 gate 1556789274184562900 evaluation starts" +"2019-05-02 09:27:54.185 UTC [cauthdsl] func2 -> DEBU 2ce4 0xc002449630 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:54.185 UTC [cauthdsl] func2 -> DEBU 2ce5 0xc002449630 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:54.186 UTC [cauthdsl] func2 -> DEBU 2ce6 0xc002449630 principal matched by identity 0" +"2019-05-02 09:27:54.188 UTC [msp.identity] Verify -> DEBU 2ce7 Verify: digest = 00000000 cf 51 72 cc 05 64 23 d4 f6 e4 07 62 c5 6b fb 4f |.Qr..d#....b.k.O| +00000010 81 96 68 ce bf db 48 61 f6 2c 61 97 0b ad 2d b2 |..h...Ha.,a...-.|" +"2019-05-02 09:27:54.188 UTC [msp.identity] Verify -> DEBU 2ce8 Verify: sig = 00000000 30 44 02 20 7b e9 0e fa 5e ce 6a d1 a3 0a 06 40 |0D. {...^.j....@| +00000010 de a2 77 4b 1a b9 bb df fb ba c2 f4 5c 93 73 09 |..wK........\.s.| +00000020 fa 23 9d 9f 02 20 77 7f 15 0e eb dc 36 c8 9b f8 |.#... w.....6...| +00000030 dc c0 6f f1 a2 79 86 4f c1 63 f1 64 e5 46 85 d9 |..o..y.O.c.d.F..| +00000040 d7 ed 9b 70 0c a6 |...p..|" +"2019-05-02 09:27:54.189 UTC [cauthdsl] func2 -> DEBU 2ce9 0xc002449630 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:54.191 UTC [cauthdsl] func1 -> DEBU 2cea 0xc002449630 gate 1556789274184562900 evaluation succeeds" +"2019-05-02 09:27:54.191 UTC [policies] Evaluate -> DEBU 2ceb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:54.191 UTC [policies] Evaluate -> DEBU 2cec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:54.192 UTC [policies] Evaluate -> DEBU 2ced Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:54.193 UTC [policies] Evaluate -> DEBU 2cee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:54.193 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cef Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:54.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf1 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 " +"2019-05-02 09:27:54.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf2 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 " +"2019-05-02 09:27:54.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:54.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2cf4 Exiting" +"2019-05-02 09:27:54.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 2cf5 Exiting" +"2019-05-02 09:27:54.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cf6 Exiting" +"2019-05-02 09:27:54.199 UTC [gossip.gossip] handleMessage -> DEBU 2cf7 Exiting" +"2019-05-02 09:27:54.200 UTC [gossip.gossip] handleMessage -> DEBU 2cf8 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.201 UTC [msp] DeserializeIdentity -> DEBU 2cf9 Obtaining identity" +"2019-05-02 09:27:54.201 UTC [msp] DeserializeIdentity -> DEBU 2cfa Obtaining identity" +"2019-05-02 09:27:54.202 UTC [msp] DeserializeIdentity -> DEBU 2cfb Obtaining identity" +"2019-05-02 09:27:54.203 UTC [msp] DeserializeIdentity -> DEBU 2cfc Obtaining identity" +"2019-05-02 09:27:54.204 UTC [msp] DeserializeIdentity -> DEBU 2cfd Obtaining identity" +"2019-05-02 09:27:54.205 UTC [msp] DeserializeIdentity -> DEBU 2cfe Obtaining identity" +"2019-05-02 09:27:54.207 UTC [gossip.comm] Send -> DEBU 2cff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:54.208 UTC [msp] DeserializeIdentity -> DEBU 2d00 Obtaining identity" +"2019-05-02 09:27:54.209 UTC [msp] DeserializeIdentity -> DEBU 2d01 Obtaining identity" +"2019-05-02 09:27:54.209 UTC [gossip.comm] Send -> DEBU 2d02 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:54.209 UTC [gossip.comm] sendToEndpoint -> DEBU 2d03 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.209 UTC [gossip.comm] sendToEndpoint -> DEBU 2d04 Exiting" +"2019-05-02 09:27:54.210 UTC [gossip.comm] sendToEndpoint -> DEBU 2d05 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.210 UTC [gossip.comm] sendToEndpoint -> DEBU 2d06 Exiting" +"2019-05-02 09:27:54.199 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.219 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d08 Exiting" +"2019-05-02 09:27:54.221 UTC [gossip.gossip] handleMessage -> DEBU 2d09 Exiting" +"2019-05-02 09:27:54.223 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:54.223 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d0b Exiting" +"2019-05-02 09:27:56.247 UTC [msp] DeserializeIdentity -> DEBU 2d0c Obtaining identity" +"2019-05-02 09:27:56.247 UTC [msp] DeserializeIdentity -> DEBU 2d0d Obtaining identity" +"2019-05-02 09:27:56.247 UTC [gossip.comm] Send -> DEBU 2d0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d0f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d10 Exiting" +"2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d11 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d12 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d13 Exiting" +"2019-05-02 09:27:56.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2d14 Exiting" +"2019-05-02 09:27:56.249 UTC [gossip.comm] func1 -> DEBU 2d15 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.249 UTC [gossip.gossip] handleMessage -> DEBU 2d16 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d17 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d18 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d19 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +"2019-05-02 09:27:56.250 UTC [msp.identity] Verify -> DEBU 2d1a Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +"2019-05-02 09:27:56.251 UTC [msp] DeserializeIdentity -> DEBU 2d1b Obtaining identity" +"2019-05-02 09:27:56.251 UTC [msp] DeserializeIdentity -> DEBU 2d1c Obtaining identity" +"2019-05-02 09:27:56.251 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d1d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:56.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d1e Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d1f Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.251 UTC [policies] Evaluate -> DEBU 2d20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:56.251 UTC [policies] Evaluate -> DEBU 2d21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:56.251 UTC [policies] Evaluate -> DEBU 2d22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:56.251 UTC [cauthdsl] func1 -> DEBU 2d23 0xc002353440 gate 1556789276251913000 evaluation starts" +"2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d24 0xc002353440 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d25 0xc002353440 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d26 0xc002353440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d27 0xc002353440 principal evaluation fails" +"2019-05-02 09:27:56.252 UTC [cauthdsl] func1 -> DEBU 2d28 0xc002353440 gate 1556789276251913000 evaluation fails" +"2019-05-02 09:27:56.252 UTC [policies] Evaluate -> DEBU 2d29 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.252 UTC [policies] Evaluate -> DEBU 2d2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.252 UTC [policies] Evaluate -> DEBU 2d2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:56.252 UTC [cauthdsl] func1 -> DEBU 2d2c 0xc002353cd0 gate 1556789276252565300 evaluation starts" +"2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d2d 0xc002353cd0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d2e 0xc002353cd0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.252 UTC [cauthdsl] func2 -> DEBU 2d2f 0xc002353cd0 principal matched by identity 0" +"2019-05-02 09:27:56.252 UTC [msp.identity] Verify -> DEBU 2d30 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:27:56.252 UTC [msp.identity] Verify -> DEBU 2d31 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:27:56.257 UTC [cauthdsl] func2 -> DEBU 2d32 0xc002353cd0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:56.257 UTC [cauthdsl] func1 -> DEBU 2d33 0xc002353cd0 gate 1556789276252565300 evaluation succeeds" +"2019-05-02 09:27:56.258 UTC [policies] Evaluate -> DEBU 2d34 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.258 UTC [policies] Evaluate -> DEBU 2d35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.258 UTC [policies] Evaluate -> DEBU 2d36 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:56.259 UTC [policies] Evaluate -> DEBU 2d37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:56.259 UTC [msp] DeserializeIdentity -> DEBU 2d38 Obtaining identity" +"2019-05-02 09:27:56.260 UTC [msp] DeserializeIdentity -> DEBU 2d39 Obtaining identity" +"2019-05-02 09:27:56.260 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:56.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d3b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d3c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.261 UTC [policies] Evaluate -> DEBU 2d3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:56.261 UTC [policies] Evaluate -> DEBU 2d3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:56.261 UTC [policies] Evaluate -> DEBU 2d3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:56.262 UTC [cauthdsl] func1 -> DEBU 2d40 0xc0022546b0 gate 1556789276261784300 evaluation starts" +"2019-05-02 09:27:56.262 UTC [cauthdsl] func2 -> DEBU 2d41 0xc0022546b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.262 UTC [cauthdsl] func2 -> DEBU 2d42 0xc0022546b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.263 UTC [cauthdsl] func2 -> DEBU 2d43 0xc0022546b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:56.263 UTC [cauthdsl] func2 -> DEBU 2d44 0xc0022546b0 principal evaluation fails" +"2019-05-02 09:27:56.264 UTC [cauthdsl] func1 -> DEBU 2d45 0xc0022546b0 gate 1556789276261784300 evaluation fails" +"2019-05-02 09:27:56.265 UTC [policies] Evaluate -> DEBU 2d46 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.265 UTC [policies] Evaluate -> DEBU 2d47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.265 UTC [policies] Evaluate -> DEBU 2d48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:56.265 UTC [cauthdsl] func1 -> DEBU 2d49 0xc002254f20 gate 1556789276265797700 evaluation starts" +"2019-05-02 09:27:56.265 UTC [cauthdsl] func2 -> DEBU 2d4a 0xc002254f20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.265 UTC [cauthdsl] func2 -> DEBU 2d4b 0xc002254f20 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.265 UTC [cauthdsl] func2 -> DEBU 2d4c 0xc002254f20 principal matched by identity 0" +"2019-05-02 09:27:56.266 UTC [msp.identity] Verify -> DEBU 2d4d Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:27:56.266 UTC [msp.identity] Verify -> DEBU 2d4e Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:27:56.268 UTC [cauthdsl] func2 -> DEBU 2d4f 0xc002254f20 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:56.269 UTC [cauthdsl] func1 -> DEBU 2d50 0xc002254f20 gate 1556789276265797700 evaluation succeeds" +"2019-05-02 09:27:56.269 UTC [policies] Evaluate -> DEBU 2d51 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.269 UTC [policies] Evaluate -> DEBU 2d52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.270 UTC [policies] Evaluate -> DEBU 2d53 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:56.271 UTC [policies] Evaluate -> DEBU 2d54 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:56.271 UTC [gossip.gossip] handleMessage -> DEBU 2d55 Exiting" +"2019-05-02 09:27:56.271 UTC [gossip.gossip] handleMessage -> DEBU 2d56 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.271 UTC [msp] DeserializeIdentity -> DEBU 2d57 Obtaining identity" +"2019-05-02 09:27:56.271 UTC [msp] DeserializeIdentity -> DEBU 2d58 Obtaining identity" +"2019-05-02 09:27:56.272 UTC [msp] DeserializeIdentity -> DEBU 2d59 Obtaining identity" +"2019-05-02 09:27:56.273 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d5a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:56.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d5b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d5c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.275 UTC [policies] Evaluate -> DEBU 2d5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:56.276 UTC [policies] Evaluate -> DEBU 2d5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:56.276 UTC [policies] Evaluate -> DEBU 2d5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:56.277 UTC [cauthdsl] func1 -> DEBU 2d60 0xc002238bd0 gate 1556789276277150800 evaluation starts" +"2019-05-02 09:27:56.277 UTC [cauthdsl] func2 -> DEBU 2d61 0xc002238bd0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.278 UTC [cauthdsl] func2 -> DEBU 2d62 0xc002238bd0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.278 UTC [cauthdsl] func2 -> DEBU 2d63 0xc002238bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:56.278 UTC [cauthdsl] func2 -> DEBU 2d64 0xc002238bd0 principal evaluation fails" +"2019-05-02 09:27:56.278 UTC [cauthdsl] func1 -> DEBU 2d65 0xc002238bd0 gate 1556789276277150800 evaluation fails" +"2019-05-02 09:27:56.279 UTC [policies] Evaluate -> DEBU 2d66 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.279 UTC [policies] Evaluate -> DEBU 2d67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.280 UTC [policies] Evaluate -> DEBU 2d68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:56.281 UTC [cauthdsl] func1 -> DEBU 2d69 0xc002239420 gate 1556789276280966900 evaluation starts" +"2019-05-02 09:27:56.281 UTC [cauthdsl] func2 -> DEBU 2d6a 0xc002239420 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.281 UTC [cauthdsl] func2 -> DEBU 2d6b 0xc002239420 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.281 UTC [cauthdsl] func2 -> DEBU 2d6c 0xc002239420 principal matched by identity 0" +"2019-05-02 09:27:56.281 UTC [msp.identity] Verify -> DEBU 2d6d Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:27:56.282 UTC [msp.identity] Verify -> DEBU 2d6e Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:27:56.283 UTC [cauthdsl] func2 -> DEBU 2d6f 0xc002239420 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:56.283 UTC [cauthdsl] func1 -> DEBU 2d70 0xc002239420 gate 1556789276280966900 evaluation succeeds" +"2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d71 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d72 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d73 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:56.283 UTC [policies] Evaluate -> DEBU 2d74 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:56.283 UTC [msp.identity] Verify -> DEBU 2d75 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +"2019-05-02 09:27:56.284 UTC [msp.identity] Verify -> DEBU 2d76 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +"2019-05-02 09:27:56.284 UTC [msp.identity] Verify -> DEBU 2d77 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:27:56.284 UTC [msp.identity] Verify -> DEBU 2d78 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:27:56.285 UTC [msp] DeserializeIdentity -> DEBU 2d79 Obtaining identity" +"2019-05-02 09:27:56.286 UTC [msp] DeserializeIdentity -> DEBU 2d7a Obtaining identity" +"2019-05-02 09:27:56.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d7c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d7d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.287 UTC [policies] Evaluate -> DEBU 2d7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:56.287 UTC [policies] Evaluate -> DEBU 2d7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:56.287 UTC [policies] Evaluate -> DEBU 2d80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:56.287 UTC [cauthdsl] func1 -> DEBU 2d81 0xc002217a80 gate 1556789276287691700 evaluation starts" +"2019-05-02 09:27:56.288 UTC [cauthdsl] func2 -> DEBU 2d82 0xc002217a80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.288 UTC [cauthdsl] func2 -> DEBU 2d83 0xc002217a80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.288 UTC [cauthdsl] func2 -> DEBU 2d84 0xc002217a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d85 0xc002217a80 principal evaluation fails" +"2019-05-02 09:27:56.289 UTC [cauthdsl] func1 -> DEBU 2d86 0xc002217a80 gate 1556789276287691700 evaluation fails" +"2019-05-02 09:27:56.289 UTC [policies] Evaluate -> DEBU 2d87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.289 UTC [policies] Evaluate -> DEBU 2d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.289 UTC [policies] Evaluate -> DEBU 2d89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:56.289 UTC [cauthdsl] func1 -> DEBU 2d8a 0xc002204480 gate 1556789276289635800 evaluation starts" +"2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d8b 0xc002204480 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d8c 0xc002204480 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.289 UTC [cauthdsl] func2 -> DEBU 2d8d 0xc002204480 principal matched by identity 0" +"2019-05-02 09:27:56.289 UTC [msp.identity] Verify -> DEBU 2d8e Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:27:56.289 UTC [msp.identity] Verify -> DEBU 2d8f Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:27:56.291 UTC [cauthdsl] func2 -> DEBU 2d90 0xc002204480 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:56.291 UTC [cauthdsl] func1 -> DEBU 2d91 0xc002204480 gate 1556789276289635800 evaluation succeeds" +"2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d94 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:56.291 UTC [policies] Evaluate -> DEBU 2d95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:56.291 UTC [gossip.gossip] handleMessage -> DEBU 2d96 Exiting" +"2019-05-02 09:27:56.292 UTC [gossip.gossip] handleMessage -> DEBU 2d97 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.292 UTC [msp] DeserializeIdentity -> DEBU 2d98 Obtaining identity" +"2019-05-02 09:27:56.293 UTC [msp] DeserializeIdentity -> DEBU 2d99 Obtaining identity" +"2019-05-02 09:27:56.293 UTC [msp] DeserializeIdentity -> DEBU 2d9a Obtaining identity" +"2019-05-02 09:27:56.294 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:56.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d9c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.295 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d9d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.295 UTC [policies] Evaluate -> DEBU 2d9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:56.295 UTC [policies] Evaluate -> DEBU 2d9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:56.296 UTC [policies] Evaluate -> DEBU 2da0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:56.296 UTC [cauthdsl] func1 -> DEBU 2da1 0xc002205fb0 gate 1556789276296453500 evaluation starts" +"2019-05-02 09:27:56.296 UTC [cauthdsl] func2 -> DEBU 2da2 0xc002205fb0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.296 UTC [cauthdsl] func2 -> DEBU 2da3 0xc002205fb0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.296 UTC [cauthdsl] func2 -> DEBU 2da4 0xc002205fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:56.297 UTC [cauthdsl] func2 -> DEBU 2da5 0xc002205fb0 principal evaluation fails" +"2019-05-02 09:27:56.297 UTC [cauthdsl] func1 -> DEBU 2da6 0xc002205fb0 gate 1556789276296453500 evaluation fails" +"2019-05-02 09:27:56.297 UTC [policies] Evaluate -> DEBU 2da7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.297 UTC [policies] Evaluate -> DEBU 2da8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.297 UTC [policies] Evaluate -> DEBU 2da9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:56.298 UTC [cauthdsl] func1 -> DEBU 2daa 0xc0021c27f0 gate 1556789276298112300 evaluation starts" +"2019-05-02 09:27:56.298 UTC [cauthdsl] func2 -> DEBU 2dab 0xc0021c27f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.298 UTC [cauthdsl] func2 -> DEBU 2dac 0xc0021c27f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.298 UTC [cauthdsl] func2 -> DEBU 2dad 0xc0021c27f0 principal matched by identity 0" +"2019-05-02 09:27:56.298 UTC [msp.identity] Verify -> DEBU 2dae Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:27:56.299 UTC [msp.identity] Verify -> DEBU 2daf Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:27:56.299 UTC [cauthdsl] func2 -> DEBU 2db0 0xc0021c27f0 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:56.299 UTC [cauthdsl] func1 -> DEBU 2db1 0xc0021c27f0 gate 1556789276298112300 evaluation succeeds" +"2019-05-02 09:27:56.299 UTC [policies] Evaluate -> DEBU 2db2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.300 UTC [policies] Evaluate -> DEBU 2db3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.300 UTC [policies] Evaluate -> DEBU 2db4 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:56.300 UTC [policies] Evaluate -> DEBU 2db5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:56.301 UTC [msp.identity] Verify -> DEBU 2db6 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +"2019-05-02 09:27:56.301 UTC [msp.identity] Verify -> DEBU 2db7 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +"2019-05-02 09:27:56.302 UTC [msp.identity] Verify -> DEBU 2db8 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:27:56.302 UTC [msp.identity] Verify -> DEBU 2db9 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:27:56.303 UTC [msp] DeserializeIdentity -> DEBU 2dba Obtaining identity" +"2019-05-02 09:27:56.303 UTC [msp] DeserializeIdentity -> DEBU 2dbb Obtaining identity" +"2019-05-02 09:27:56.303 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2dbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:56.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dbd Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dbe Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.303 UTC [policies] Evaluate -> DEBU 2dbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:56.304 UTC [policies] Evaluate -> DEBU 2dc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:56.304 UTC [policies] Evaluate -> DEBU 2dc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:56.305 UTC [cauthdsl] func1 -> DEBU 2dc2 0xc00218af00 gate 1556789276305004400 evaluation starts" +"2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc00218af00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc4 0xc00218af00 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc5 0xc00218af00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:56.305 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc00218af00 principal evaluation fails" +"2019-05-02 09:27:56.306 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc00218af00 gate 1556789276305004400 evaluation fails" +"2019-05-02 09:27:56.306 UTC [policies] Evaluate -> DEBU 2dc8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.306 UTC [policies] Evaluate -> DEBU 2dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.307 UTC [policies] Evaluate -> DEBU 2dca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:56.307 UTC [cauthdsl] func1 -> DEBU 2dcb 0xc00218b740 gate 1556789276307255500 evaluation starts" +"2019-05-02 09:27:56.307 UTC [cauthdsl] func2 -> DEBU 2dcc 0xc00218b740 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.307 UTC [cauthdsl] func2 -> DEBU 2dcd 0xc00218b740 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.307 UTC [cauthdsl] func2 -> DEBU 2dce 0xc00218b740 principal matched by identity 0" +"2019-05-02 09:27:56.307 UTC [msp.identity] Verify -> DEBU 2dcf Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:27:56.308 UTC [msp.identity] Verify -> DEBU 2dd0 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:27:56.308 UTC [cauthdsl] func2 -> DEBU 2dd1 0xc00218b740 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:56.309 UTC [cauthdsl] func1 -> DEBU 2dd2 0xc00218b740 gate 1556789276307255500 evaluation succeeds" +"2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd5 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:56.309 UTC [policies] Evaluate -> DEBU 2dd6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:56.309 UTC [gossip.gossip] handleMessage -> DEBU 2dd7 Exiting" +"2019-05-02 09:27:56.504 UTC [gossip.gossip] handleMessage -> DEBU 2dd8 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.504 UTC [msp] DeserializeIdentity -> DEBU 2dd9 Obtaining identity" +"2019-05-02 09:27:56.505 UTC [msp] DeserializeIdentity -> DEBU 2dda Obtaining identity" +"2019-05-02 09:27:56.505 UTC [gossip.gossip] handleMessage -> DEBU 2ddb Exiting" +"2019-05-02 09:27:56.558 UTC [gossip.gossip] handleMessage -> DEBU 2ddc Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.558 UTC [gossip.pull] HandleMessage -> DEBU 2ddd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.558 UTC [gossip.pull] SendDigest -> DEBU 2dde Sending BLOCK_MSG digest: [4 5 6 7 8 1 2 3] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:56.558 UTC [gossip.gossip] handleMessage -> DEBU 2ddf Exiting" +"2019-05-02 09:27:56.751 UTC [gossip.gossip] handleMessage -> DEBU 2de0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.751 UTC [msp] DeserializeIdentity -> DEBU 2de1 Obtaining identity" +"2019-05-02 09:27:56.751 UTC [msp] DeserializeIdentity -> DEBU 2de2 Obtaining identity" +"2019-05-02 09:27:56.751 UTC [msp] DeserializeIdentity -> DEBU 2de3 Obtaining identity" +"2019-05-02 09:27:56.751 UTC [gossip.gossip] handleMessage -> DEBU 2de4 Exiting" +"2019-05-02 09:27:56.816 UTC [gossip.comm] func1 -> DEBU 2de5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.816 UTC [gossip.gossip] handleMessage -> DEBU 2de6 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.816 UTC [gossip.pull] HandleMessage -> DEBU 2de7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.816 UTC [msp] DeserializeIdentity -> DEBU 2de8 Obtaining identity" +"2019-05-02 09:27:56.816 UTC [msp] DeserializeIdentity -> DEBU 2de9 Obtaining identity" +"2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2dea Obtaining identity" +"2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2deb Obtaining identity" +"2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2dec Obtaining identity" +"2019-05-02 09:27:56.817 UTC [msp] DeserializeIdentity -> DEBU 2ded Obtaining identity" +"2019-05-02 09:27:56.817 UTC [gossip.pull] SendDigest -> DEBU 2dee Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:56.817 UTC [gossip.gossip] handleMessage -> DEBU 2def Exiting" +"2019-05-02 09:27:56.835 UTC [gossip.comm] func1 -> DEBU 2df0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.835 UTC [gossip.gossip] handleMessage -> DEBU 2df1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.835 UTC [gossip.gossip] handleMessage -> DEBU 2df2 Exiting" +"2019-05-02 09:27:56.835 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2df3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.835 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2df4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:56.836 UTC [msp] DeserializeIdentity -> DEBU 2df5 Obtaining identity" +"2019-05-02 09:27:56.836 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2df6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:56.836 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2df7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.836 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2df8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:56.837 UTC [policies] Evaluate -> DEBU 2df9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:56.837 UTC [policies] Evaluate -> DEBU 2dfa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:56.837 UTC [policies] Evaluate -> DEBU 2dfb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:56.837 UTC [cauthdsl] func1 -> DEBU 2dfc 0xc002177c10 gate 1556789276837575500 evaluation starts" +"2019-05-02 09:27:56.837 UTC [cauthdsl] func2 -> DEBU 2dfd 0xc002177c10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.837 UTC [cauthdsl] func2 -> DEBU 2dfe 0xc002177c10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.838 UTC [cauthdsl] func2 -> DEBU 2dff 0xc002177c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:56.838 UTC [cauthdsl] func2 -> DEBU 2e00 0xc002177c10 principal evaluation fails" +"2019-05-02 09:27:56.840 UTC [cauthdsl] func1 -> DEBU 2e01 0xc002177c10 gate 1556789276837575500 evaluation fails" +"2019-05-02 09:27:56.840 UTC [policies] Evaluate -> DEBU 2e02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.841 UTC [policies] Evaluate -> DEBU 2e03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:56.841 UTC [policies] Evaluate -> DEBU 2e04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:56.841 UTC [cauthdsl] func1 -> DEBU 2e05 0xc002152450 gate 1556789276841318900 evaluation starts" +"2019-05-02 09:27:56.841 UTC [cauthdsl] func2 -> DEBU 2e06 0xc002152450 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:56.842 UTC [cauthdsl] func2 -> DEBU 2e07 0xc002152450 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:56.842 UTC [cauthdsl] func2 -> DEBU 2e08 0xc002152450 principal matched by identity 0" +"2019-05-02 09:27:56.842 UTC [msp.identity] Verify -> DEBU 2e09 Verify: digest = 00000000 8e ab 79 f9 33 76 ca 73 af 46 a7 01 7f 37 05 8f |..y.3v.s.F...7..| +00000010 f8 ff 78 29 20 d2 5c e5 c3 a2 84 78 49 e7 68 90 |..x) .\....xI.h.|" +"2019-05-02 09:27:56.842 UTC [msp.identity] Verify -> DEBU 2e0a Verify: sig = 00000000 30 45 02 21 00 ce 88 b2 fa ff 08 3c df 52 7a 50 |0E.!.......<.RzP| +00000010 d3 6b 47 b6 8d fb 53 e3 4e 8d 4e 5a 1f ce fd 3c |.kG...S.N.NZ...<| +00000020 7a 9a c9 19 f9 02 20 4b 0b 2d 8b c3 63 8b 85 8c |z..... K.-..c...| +00000030 25 6a 36 e5 da fe 4c 90 c0 55 4a 0e 7d 0c 98 57 |%j6...L..UJ.}..W| +00000040 cd 97 3a f0 2b 03 e9 |..:.+..|" +"2019-05-02 09:27:56.843 UTC [cauthdsl] func2 -> DEBU 2e0b 0xc002152450 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:56.843 UTC [cauthdsl] func1 -> DEBU 2e0c 0xc002152450 gate 1556789276841318900 evaluation succeeds" +"2019-05-02 09:27:56.843 UTC [policies] Evaluate -> DEBU 2e0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.843 UTC [policies] Evaluate -> DEBU 2e0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:56.844 UTC [policies] Evaluate -> DEBU 2e0f Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:56.844 UTC [policies] Evaluate -> DEBU 2e10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:56.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e12 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e13 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 " +"2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e14 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 " +"2019-05-02 09:27:56.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e15 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:56.847 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e16 Exiting" +"2019-05-02 09:27:56.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e17 Exiting" +"2019-05-02 09:27:56.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e18 Exiting" +"2019-05-02 09:27:56.848 UTC [gossip.discovery] sendMemResponse -> DEBU 2e19 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:27:56.848 UTC [msp] DeserializeIdentity -> DEBU 2e1a Obtaining identity" +"2019-05-02 09:27:56.849 UTC [msp] DeserializeIdentity -> DEBU 2e1b Obtaining identity" +"2019-05-02 09:27:56.849 UTC [msp] DeserializeIdentity -> DEBU 2e1c Obtaining identity" +"2019-05-02 09:27:56.850 UTC [gossip.comm] Send -> DEBU 2e1d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:56.850 UTC [gossip.discovery] sendMemResponse -> DEBU 2e1e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:56.851 UTC [gossip.comm] sendToEndpoint -> DEBU 2e1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.853 UTC [gossip.comm] sendToEndpoint -> DEBU 2e20 Exiting" +"2019-05-02 09:27:56.980 UTC [gossip.comm] func1 -> DEBU 2e21 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.980 UTC [gossip.gossip] handleMessage -> DEBU 2e22 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:27:56.981 UTC [msp] DeserializeIdentity -> DEBU 2e23 Obtaining identity" +"2019-05-02 09:27:56.981 UTC [msp] DeserializeIdentity -> DEBU 2e24 Obtaining identity" +"2019-05-02 09:27:56.982 UTC [msp] DeserializeIdentity -> DEBU 2e25 Obtaining identity" +"2019-05-02 09:27:56.983 UTC [gossip.gossip] handleMessage -> DEBU 2e26 Exiting" +"2019-05-02 09:27:57.008 UTC [msp] DeserializeIdentity -> DEBU 2e27 Obtaining identity" +"2019-05-02 09:27:57.008 UTC [msp] DeserializeIdentity -> DEBU 2e28 Obtaining identity" +"2019-05-02 09:27:57.008 UTC [gossip.pull] Hello -> DEBU 2e29 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:57.008 UTC [msp] DeserializeIdentity -> DEBU 2e2a Obtaining identity" +"2019-05-02 09:27:57.009 UTC [msp] DeserializeIdentity -> DEBU 2e2b Obtaining identity" +"2019-05-02 09:27:57.010 UTC [gossip.comm] Send -> DEBU 2e2c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:57.010 UTC [gossip.comm] sendToEndpoint -> DEBU 2e2d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.010 UTC [gossip.comm] sendToEndpoint -> DEBU 2e2e Exiting" +"2019-05-02 09:27:57.013 UTC [gossip.gossip] handleMessage -> DEBU 2e2f Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18423874894943821565 , Msg_type: BLOCK_MSG, digests: [8 2 1 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.013 UTC [gossip.pull] HandleMessage -> DEBU 2e30 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18423874894943821565 , Msg_type: BLOCK_MSG, digests: [8 2 1 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.013 UTC [gossip.gossip] handleMessage -> DEBU 2e31 Exiting" +"2019-05-02 09:27:57.101 UTC [gossip.gossip] handleMessage -> DEBU 2e32 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.101 UTC [gossip.pull] HandleMessage -> DEBU 2e33 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.101 UTC [gossip.pull] SendDigest -> DEBU 2e34 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:57.101 UTC [gossip.gossip] handleMessage -> DEBU 2e35 Exiting" +"2019-05-02 09:27:57.107 UTC [gossip.pull] Hello -> DEBU 2e36 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:27:57.107 UTC [gossip.comm] Send -> DEBU 2e37 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:57.107 UTC [gossip.pull] Hello -> DEBU 2e38 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:27:57.107 UTC [gossip.comm] Send -> DEBU 2e39 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:57.107 UTC [gossip.pull] Hello -> DEBU 2e3a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:27:57.107 UTC [gossip.comm] Send -> DEBU 2e3b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:57.107 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3d Exiting" +"2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3f Exiting" +"2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e40 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.108 UTC [gossip.comm] sendToEndpoint -> DEBU 2e41 Exiting" +"2019-05-02 09:27:57.109 UTC [gossip.gossip] handleMessage -> DEBU 2e42 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15705107216210067546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.109 UTC [gossip.pull] HandleMessage -> DEBU 2e43 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15705107216210067546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.109 UTC [gossip.gossip] handleMessage -> DEBU 2e44 Exiting" +"2019-05-02 09:27:57.110 UTC [gossip.gossip] handleMessage -> DEBU 2e45 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7030554139193622813 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.110 UTC [gossip.pull] HandleMessage -> DEBU 2e46 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7030554139193622813 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.110 UTC [gossip.gossip] handleMessage -> DEBU 2e47 Exiting" +"2019-05-02 09:27:57.111 UTC [gossip.comm] func1 -> DEBU 2e48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16480138393559414308 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.111 UTC [gossip.gossip] handleMessage -> DEBU 2e49 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16480138393559414308 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.112 UTC [gossip.pull] HandleMessage -> DEBU 2e4a GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16480138393559414308 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.112 UTC [gossip.gossip] handleMessage -> DEBU 2e4b Exiting" +"2019-05-02 09:27:57.119 UTC [gossip.gossip] handleMessage -> DEBU 2e4c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.119 UTC [gossip.gossip] handleMessage -> DEBU 2e4d Exiting" +"2019-05-02 09:27:57.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e4e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e4f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:57.119 UTC [msp.identity] Verify -> DEBU 2e50 Verify: digest = 00000000 a0 8d 9c cc b8 52 25 4f 46 56 80 5e 8a d2 26 6d |.....R%OFV.^..&m| +00000010 b0 04 b6 0a f6 49 b2 5a b0 2d 5c e0 4b 98 3c 74 |.....I.Z.-\.K. DEBU 2e51 Verify: sig = 00000000 30 44 02 20 00 f6 bd 00 be 9d 17 d5 42 13 bc d6 |0D. ........B...| +00000010 b8 02 63 9c 5c 03 3e d5 bd f0 ac 4f 13 56 cd 36 |..c.\.>....O.V.6| +00000020 df 8d 17 e1 02 20 07 30 2a d9 a4 16 25 77 fb 9c |..... .0*...%w..| +00000030 28 8b 4b b1 42 92 2c 89 08 da 0c d5 c0 04 cf ad |(.K.B.,.........| +00000040 74 cf e4 2e 77 31 |t...w1|" +"2019-05-02 09:27:57.120 UTC [msp.identity] Verify -> DEBU 2e52 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:25.454 UTC [msp.identity] Verify -> DEBU 2d6b Verify: sig = 00000000 30 44 02 20 6a e1 53 f5 38 07 d3 03 3d 28 a9 08 |0D. j.S.8...=(..| -00000010 b5 39 b6 00 2a 8f 91 08 d0 dc c3 52 a3 d9 9c cb |.9..*......R....| -00000020 01 73 f3 f5 02 20 1b d7 cb 27 18 c5 a7 f2 88 d1 |.s... ...'......| -00000030 f8 02 dd 10 5a 8b f6 f2 f8 f0 52 96 fc fc 73 40 |....Z.....R...s@| -00000040 4f 94 60 a7 9a 11 |O.`...|" -"2019-05-02 01:31:25.455 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d6c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:25.455 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d6d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:31:25.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d6e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 " -"2019-05-02 01:31:25.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d6f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 " -"2019-05-02 01:31:25.456 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d70 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:25.457 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d71 Exiting" -"2019-05-02 01:31:25.457 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d72 Exiting" -"2019-05-02 01:31:25.457 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d73 Exiting" -"2019-05-02 01:31:25.457 UTC [gossip.discovery] sendMemResponse -> DEBU 2d74 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:25.458 UTC [msp] DeserializeIdentity -> DEBU 2d76 Obtaining identity" -"2019-05-02 01:31:25.458 UTC [msp] DeserializeIdentity -> DEBU 2d77 Obtaining identity" -"2019-05-02 01:31:25.458 UTC [gossip.comm] Send -> DEBU 2d78 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:25.459 UTC [gossip.discovery] sendMemResponse -> DEBU 2d79 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:25.459 UTC [gossip.comm] sendToEndpoint -> DEBU 2d7a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.459 UTC [gossip.comm] sendToEndpoint -> DEBU 2d7b Exiting" -"2019-05-02 01:31:25.451 UTC [gossip.gossip] handleMessage -> DEBU 2d75 Exiting" -"2019-05-02 01:31:25.525 UTC [gossip.comm] func1 -> DEBU 2d7c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.526 UTC [gossip.gossip] handleMessage -> DEBU 2d7d Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.526 UTC [gossip.pull] HandleMessage -> DEBU 2d7e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.527 UTC [msp] DeserializeIdentity -> DEBU 2d7f Obtaining identity" -"2019-05-02 01:31:25.528 UTC [msp] DeserializeIdentity -> DEBU 2d80 Obtaining identity" -"2019-05-02 01:31:25.534 UTC [msp] DeserializeIdentity -> DEBU 2d82 Obtaining identity" -"2019-05-02 01:31:25.528 UTC [gossip.comm] func1 -> DEBU 2d81 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.536 UTC [msp] DeserializeIdentity -> DEBU 2d83 Obtaining identity" -"2019-05-02 01:31:25.539 UTC [msp] DeserializeIdentity -> DEBU 2d84 Obtaining identity" -"2019-05-02 01:31:25.561 UTC [msp] DeserializeIdentity -> DEBU 2d85 Obtaining identity" -"2019-05-02 01:31:25.563 UTC [gossip.pull] SendDigest -> DEBU 2d86 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:25.564 UTC [gossip.gossip] handleMessage -> DEBU 2d87 Exiting" -"2019-05-02 01:31:25.566 UTC [gossip.gossip] handleMessage -> DEBU 2d88 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.566 UTC [gossip.gossip] handleMessage -> DEBU 2d89 Exiting" -"2019-05-02 01:31:25.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d8a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.566 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d8b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:25.566 UTC [msp] DeserializeIdentity -> DEBU 2d8c Obtaining identity" -"2019-05-02 01:31:25.582 UTC [gossip.comm] func1 -> DEBU 2d8d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.583 UTC [gossip.gossip] handleMessage -> DEBU 2d8e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.585 UTC [msp] DeserializeIdentity -> DEBU 2d8f Obtaining identity" -"2019-05-02 01:31:25.585 UTC [msp] DeserializeIdentity -> DEBU 2d90 Obtaining identity" -"2019-05-02 01:31:25.586 UTC [msp] DeserializeIdentity -> DEBU 2d91 Obtaining identity" -"2019-05-02 01:31:25.586 UTC [gossip.gossip] handleMessage -> DEBU 2d92 Exiting" -"2019-05-02 01:31:25.587 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:25.588 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d94 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:25.588 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d95 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:25.589 UTC [policies] Evaluate -> DEBU 2d96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:25.589 UTC [policies] Evaluate -> DEBU 2d97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:25.590 UTC [policies] Evaluate -> DEBU 2d98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:25.593 UTC [cauthdsl] func1 -> DEBU 2d99 0xc0042347a0 gate 1556760685593140700 evaluation starts" -"2019-05-02 01:31:25.593 UTC [cauthdsl] func2 -> DEBU 2d9a 0xc0042347a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:25.594 UTC [cauthdsl] func2 -> DEBU 2d9b 0xc0042347a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:25.594 UTC [cauthdsl] func2 -> DEBU 2d9c 0xc0042347a0 principal matched by identity 0" -"2019-05-02 01:31:25.595 UTC [msp.identity] Verify -> DEBU 2d9d Verify: digest = 00000000 83 14 bc c6 ce 8d 4d 4a 49 f0 0d 2c 09 90 7e a4 |......MJI..,..~.| -00000010 ab 81 58 0f 97 ca 1b 1f 97 41 59 7d 01 28 fc de |..X......AY}.(..|" -"2019-05-02 01:31:25.596 UTC [msp.identity] Verify -> DEBU 2d9e Verify: sig = 00000000 30 45 02 21 00 ca 4d 36 af 1c b2 cb d8 fc 9e 09 |0E.!..M6........| -00000010 4c 78 51 24 48 18 72 6e 08 a9 cb 41 03 d8 2d 83 |LxQ$H.rn...A..-.| -00000020 f5 6e cc a4 85 02 20 33 d2 d2 a8 b6 ae 65 56 8e |.n.... 3.....eV.| -00000030 f3 43 b1 bc 44 3b dd d5 3c e9 a9 0b 07 0b ef b9 |.C..D;..<.......| -00000040 ac 91 3f f0 05 aa 2a |..?...*|" -"2019-05-02 01:31:25.598 UTC [cauthdsl] func2 -> DEBU 2d9f 0xc0042347a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:25.599 UTC [cauthdsl] func1 -> DEBU 2da0 0xc0042347a0 gate 1556760685593140700 evaluation succeeds" -"2019-05-02 01:31:25.603 UTC [policies] Evaluate -> DEBU 2da1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:25.604 UTC [policies] Evaluate -> DEBU 2da2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:25.608 UTC [policies] Evaluate -> DEBU 2da3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:25.609 UTC [policies] Evaluate -> DEBU 2da4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:25.618 UTC [gossip.discovery] handleAliveMessage -> DEBU 2da5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:25.619 UTC [gossip.discovery] learnExistingMembers -> DEBU 2da6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:25.619 UTC [gossip.discovery] learnExistingMembers -> DEBU 2da7 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 " -"2019-05-02 01:31:25.619 UTC [gossip.discovery] learnExistingMembers -> DEBU 2da8 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 " -"2019-05-02 01:31:25.619 UTC [gossip.discovery] learnExistingMembers -> DEBU 2da9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:25.620 UTC [gossip.discovery] learnExistingMembers -> DEBU 2daa Exiting" -"2019-05-02 01:31:25.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 2dab Exiting" -"2019-05-02 01:31:25.620 UTC [gossip.discovery] sendMemResponse -> DEBU 2dac Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:25.620 UTC [msp] DeserializeIdentity -> DEBU 2dad Obtaining identity" -"2019-05-02 01:31:25.621 UTC [msp] DeserializeIdentity -> DEBU 2dae Obtaining identity" -"2019-05-02 01:31:25.621 UTC [msp] DeserializeIdentity -> DEBU 2daf Obtaining identity" -"2019-05-02 01:31:25.622 UTC [gossip.comm] Send -> DEBU 2db0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:25.622 UTC [gossip.discovery] sendMemResponse -> DEBU 2db1 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:25.622 UTC [gossip.comm] sendToEndpoint -> DEBU 2db2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.622 UTC [gossip.comm] sendToEndpoint -> DEBU 2db3 Exiting" -"2019-05-02 01:31:25.620 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2db4 Exiting" -"2019-05-02 01:31:25.754 UTC [gossip.comm] func1 -> DEBU 2db5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.755 UTC [gossip.gossip] handleMessage -> DEBU 2db6 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.755 UTC [gossip.pull] HandleMessage -> DEBU 2db7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.755 UTC [msp] DeserializeIdentity -> DEBU 2db8 Obtaining identity" -"2019-05-02 01:31:25.810 UTC [msp] DeserializeIdentity -> DEBU 2db9 Obtaining identity" -"2019-05-02 01:31:25.831 UTC [msp] DeserializeIdentity -> DEBU 2dba Obtaining identity" -"2019-05-02 01:31:25.831 UTC [msp] DeserializeIdentity -> DEBU 2dbb Obtaining identity" -"2019-05-02 01:31:25.831 UTC [msp] DeserializeIdentity -> DEBU 2dbc Obtaining identity" -"2019-05-02 01:31:25.831 UTC [msp] DeserializeIdentity -> DEBU 2dbd Obtaining identity" -"2019-05-02 01:31:25.832 UTC [gossip.pull] SendDigest -> DEBU 2dbe Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:25.832 UTC [gossip.gossip] handleMessage -> DEBU 2dbf Exiting" -"2019-05-02 01:31:25.841 UTC [gossip.pull] Hello -> DEBU 2dc0 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:25.841 UTC [gossip.comm] Send -> DEBU 2dc1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:25.841 UTC [gossip.pull] Hello -> DEBU 2dc2 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:25.841 UTC [gossip.comm] Send -> DEBU 2dc3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:25.841 UTC [gossip.pull] Hello -> DEBU 2dc4 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:25.841 UTC [gossip.comm] Send -> DEBU 2dc5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:25.841 UTC [gossip.comm] sendToEndpoint -> DEBU 2dc6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.841 UTC [gossip.comm] sendToEndpoint -> DEBU 2dc7 Exiting" -"2019-05-02 01:31:25.844 UTC [gossip.comm] sendToEndpoint -> DEBU 2dc8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.845 UTC [gossip.comm] sendToEndpoint -> DEBU 2dc9 Exiting" -"2019-05-02 01:31:25.845 UTC [gossip.comm] sendToEndpoint -> DEBU 2dca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.845 UTC [gossip.comm] sendToEndpoint -> DEBU 2dcb Exiting" -"2019-05-02 01:31:25.858 UTC [gossip.comm] func1 -> DEBU 2dcc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 678670819967269889 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.874 UTC [gossip.gossip] handleMessage -> DEBU 2dcd Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 678670819967269889 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.898 UTC [gossip.pull] HandleMessage -> DEBU 2dce GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 678670819967269889 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.899 UTC [gossip.gossip] handleMessage -> DEBU 2dcf Exiting" -"2019-05-02 01:31:25.899 UTC [gossip.gossip] handleMessage -> DEBU 2dd0 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 274374443046850088 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.901 UTC [gossip.pull] HandleMessage -> DEBU 2dd1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 274374443046850088 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.901 UTC [gossip.gossip] handleMessage -> DEBU 2dd2 Exiting" -"2019-05-02 01:31:25.907 UTC [gossip.comm] func1 -> DEBU 2dd3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3044112139728553460 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.908 UTC [gossip.gossip] handleMessage -> DEBU 2dd4 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3044112139728553460 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.908 UTC [gossip.pull] HandleMessage -> DEBU 2dd5 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3044112139728553460 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.908 UTC [gossip.gossip] handleMessage -> DEBU 2dd6 Exiting" -"2019-05-02 01:31:25.924 UTC [gossip.comm] func1 -> DEBU 2dd7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.925 UTC [gossip.gossip] handleMessage -> DEBU 2dd8 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.929 UTC [gossip.gossip] handleMessage -> DEBU 2dd9 Exiting" -"2019-05-02 01:31:25.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2dda Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:25.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ddb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:25.955 UTC [msp] DeserializeIdentity -> DEBU 2ddc Obtaining identity" -"2019-05-02 01:31:25.955 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ddd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:25.955 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dde Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:25.955 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ddf Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:25.955 UTC [policies] Evaluate -> DEBU 2de0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:25.955 UTC [policies] Evaluate -> DEBU 2de1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:25.955 UTC [policies] Evaluate -> DEBU 2de2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:25.955 UTC [cauthdsl] func1 -> DEBU 2de3 0xc004496270 gate 1556760685955964300 evaluation starts" -"2019-05-02 01:31:25.956 UTC [cauthdsl] func2 -> DEBU 2de4 0xc004496270 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:25.956 UTC [cauthdsl] func2 -> DEBU 2de5 0xc004496270 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:25.956 UTC [cauthdsl] func2 -> DEBU 2de6 0xc004496270 principal matched by identity 0" -"2019-05-02 01:31:25.956 UTC [msp.identity] Verify -> DEBU 2de7 Verify: digest = 00000000 3e 65 b1 1f 8c 7a 6d 97 81 74 2b 57 7d 60 82 84 |>e...zm..t+W}`..| -00000010 29 e7 b4 12 2e 35 e3 16 8d c6 e2 c4 c5 04 f8 96 |)....5..........|" -"2019-05-02 01:31:26.000 UTC [msp.identity] Verify -> DEBU 2de8 Verify: sig = 00000000 30 45 02 21 00 ca ec 8c db 5d b6 c2 37 15 3f c8 |0E.!.....]..7.?.| -00000010 05 6f b7 63 d9 dd 9a 33 78 30 45 e9 cc 66 5a 87 |.o.c...3x0E..fZ.| -00000020 5a 84 3b 6f f5 02 20 27 55 34 b8 9c 34 ac ec 93 |Z.;o.. 'U4..4...| -00000030 3f a9 15 e6 59 82 18 21 8b e8 b6 ad 9a 4d 24 8f |?...Y..!.....M$.| -00000040 ac 08 bf 5b d1 a0 4a |...[..J|" -"2019-05-02 01:31:26.001 UTC [cauthdsl] func2 -> DEBU 2de9 0xc004496270 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:26.002 UTC [cauthdsl] func1 -> DEBU 2dea 0xc004496270 gate 1556760685955964300 evaluation succeeds" -"2019-05-02 01:31:26.030 UTC [policies] Evaluate -> DEBU 2deb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:26.032 UTC [policies] Evaluate -> DEBU 2dec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:26.039 UTC [policies] Evaluate -> DEBU 2ded Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:26.053 UTC [policies] Evaluate -> DEBU 2dee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:26.058 UTC [gossip.discovery] handleAliveMessage -> DEBU 2def Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:26.060 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:26.119 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df2 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 " -"2019-05-02 01:31:26.119 UTC [msp.identity] Sign -> DEBU 2df1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151021 " -"2019-05-02 01:31:26.163 UTC [msp.identity] Sign -> DEBU 2df3 Sign: digest: 066A17F2A96462C9B7A4D765A726A2B2B254549312785C897513DCEB722F26A0 " -"2019-05-02 01:31:26.165 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 " -"2019-05-02 01:31:26.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df5 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:26.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df6 Exiting" -"2019-05-02 01:31:26.168 UTC [gossip.discovery] handleAliveMessage -> DEBU 2df7 Exiting" -"2019-05-02 01:31:26.168 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2df8 Exiting" -"2019-05-02 01:31:26.166 UTC [msp.identity] Sign -> DEBU 2df9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:26.169 UTC [msp.identity] Sign -> DEBU 2dfa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:26.169 UTC [gossip.discovery] sendMemResponse -> DEBU 2dfb Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:26.170 UTC [msp] DeserializeIdentity -> DEBU 2dfc Obtaining identity" -"2019-05-02 01:31:26.170 UTC [msp] DeserializeIdentity -> DEBU 2dfd Obtaining identity" -"2019-05-02 01:31:26.172 UTC [msp] DeserializeIdentity -> DEBU 2dfe Obtaining identity" -"2019-05-02 01:31:26.172 UTC [gossip.comm] Send -> DEBU 2dff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:26.174 UTC [gossip.discovery] sendMemResponse -> DEBU 2e00 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:26.175 UTC [gossip.comm] sendToEndpoint -> DEBU 2e01 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.177 UTC [gossip.comm] sendToEndpoint -> DEBU 2e02 Exiting" -"2019-05-02 01:31:26.180 UTC [msp] DeserializeIdentity -> DEBU 2e03 Obtaining identity" -"2019-05-02 01:31:26.181 UTC [gossip.comm] Send -> DEBU 2e04 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:26.182 UTC [gossip.comm] Send -> DEBU 2e05 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:26.183 UTC [msp] DeserializeIdentity -> DEBU 2e06 Obtaining identity" -"2019-05-02 01:31:26.185 UTC [gossip.comm] Send -> DEBU 2e09 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:26.184 UTC [gossip.comm] sendToEndpoint -> DEBU 2e07 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.184 UTC [gossip.comm] sendToEndpoint -> DEBU 2e08 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.186 UTC [gossip.comm] sendToEndpoint -> DEBU 2e0a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.188 UTC [gossip.comm] sendToEndpoint -> DEBU 2e0c Exiting" -"2019-05-02 01:31:26.188 UTC [gossip.comm] sendToEndpoint -> DEBU 2e0b Exiting" -"2019-05-02 01:31:26.189 UTC [gossip.comm] sendToEndpoint -> DEBU 2e0d Exiting" -"2019-05-02 01:31:26.196 UTC [gossip.comm] func1 -> DEBU 2e0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.196 UTC [gossip.gossip] handleMessage -> DEBU 2e0f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.201 UTC [gossip.gossip] handleMessage -> DEBU 2e10 Exiting" -"2019-05-02 01:31:26.202 UTC [gossip.gossip] handleMessage -> DEBU 2e12 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e11 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.205 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e13 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:26.207 UTC [msp.identity] Verify -> DEBU 2e14 Verify: digest = 00000000 06 6a 17 f2 a9 64 62 c9 b7 a4 d7 65 a7 26 a2 b2 |.j...db....e.&..| -00000010 b2 54 54 93 12 78 5c 89 75 13 dc eb 72 2f 26 a0 |.TT..x\.u...r/&.|" -"2019-05-02 01:31:26.208 UTC [msp.identity] Verify -> DEBU 2e15 Verify: sig = 00000000 30 44 02 20 1d 29 e2 fc c6 15 ab e9 fa 01 04 c6 |0D. .)..........| -00000010 96 60 ae 40 81 cb 53 a0 a7 98 4d 7f ab 54 b9 02 |.`.@..S...M..T..| -00000020 a6 38 34 ec 02 20 65 52 f9 8e 80 8d 13 32 f5 50 |.84.. eR.....2.P| -00000030 cb 83 29 55 32 f4 14 46 aa de 42 ec 6e 82 4f 71 |..)U2..F..B.n.Oq| -00000040 36 cc 4d 37 ad 6c |6.M7.l|" -"2019-05-02 01:31:26.211 UTC [msp.identity] Verify -> DEBU 2e16 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:27:57.120 UTC [msp.identity] Verify -> DEBU 2e53 Verify: sig = 00000000 30 45 02 21 00 91 6d 90 e3 8f d0 7a 64 a1 c4 b1 |0E.!..m....zd...| +00000010 ef 90 ca 71 06 63 7c cb 00 72 07 dc e5 f5 41 74 |...q.c|..r....At| +00000020 11 93 da 55 9d 02 20 0e 57 85 06 f5 6b f4 75 47 |...U.. .W...k.uG| +00000030 6f 73 86 27 d4 ab d6 b5 da 9c 9f d7 a2 97 1e 47 |os.'...........G| +00000040 16 cf 10 f2 3b ab b7 |....;..|" +"2019-05-02 09:27:57.120 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e54 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e55 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e56 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 " +"2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e57 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 " +"2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e58 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:57.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e59 Exiting" +"2019-05-02 09:27:57.120 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e5a Exiting" +"2019-05-02 09:27:57.120 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e5b Exiting" +"2019-05-02 09:27:57.120 UTC [gossip.discovery] sendMemResponse -> DEBU 2e5c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:27:57.120 UTC [msp] DeserializeIdentity -> DEBU 2e5d Obtaining identity" +"2019-05-02 09:27:57.120 UTC [msp] DeserializeIdentity -> DEBU 2e5e Obtaining identity" +"2019-05-02 09:27:57.120 UTC [gossip.comm] Send -> DEBU 2e5f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:57.120 UTC [gossip.discovery] sendMemResponse -> DEBU 2e60 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:27:57.121 UTC [gossip.comm] sendToEndpoint -> DEBU 2e61 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.121 UTC [gossip.comm] sendToEndpoint -> DEBU 2e62 Exiting" +"2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e63 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15101F " +"2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e64 Sign: digest: 6B0A58B13013B23FF775E1CEC33391F5B408A02DEB67E06DA5A846E2FAE1E90C " +"2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e65 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:57.154 UTC [msp.identity] Sign -> DEBU 2e66 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:57.154 UTC [msp] DeserializeIdentity -> DEBU 2e67 Obtaining identity" +"2019-05-02 09:27:57.155 UTC [gossip.comm] Send -> DEBU 2e68 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:57.155 UTC [msp] DeserializeIdentity -> DEBU 2e69 Obtaining identity" +"2019-05-02 09:27:57.155 UTC [gossip.comm] Send -> DEBU 2e6a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:57.155 UTC [gossip.comm] Send -> DEBU 2e6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6d Exiting" +"2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e6f Exiting" +"2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e70 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.155 UTC [gossip.comm] sendToEndpoint -> DEBU 2e71 Exiting" +"2019-05-02 09:27:57.165 UTC [gossip.comm] func1 -> DEBU 2e72 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.165 UTC [gossip.gossip] handleMessage -> DEBU 2e73 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.165 UTC [gossip.gossip] handleMessage -> DEBU 2e74 Exiting" +"2019-05-02 09:27:57.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e76 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:57.165 UTC [msp.identity] Verify -> DEBU 2e77 Verify: digest = 00000000 a0 8d 9c cc b8 52 25 4f 46 56 80 5e 8a d2 26 6d |.....R%OFV.^..&m| +00000010 b0 04 b6 0a f6 49 b2 5a b0 2d 5c e0 4b 98 3c 74 |.....I.Z.-\.K. DEBU 2e78 Verify: sig = 00000000 30 44 02 20 00 f6 bd 00 be 9d 17 d5 42 13 bc d6 |0D. ........B...| +00000010 b8 02 63 9c 5c 03 3e d5 bd f0 ac 4f 13 56 cd 36 |..c.\.>....O.V.6| +00000020 df 8d 17 e1 02 20 07 30 2a d9 a4 16 25 77 fb 9c |..... .0*...%w..| +00000030 28 8b 4b b1 42 92 2c 89 08 da 0c d5 c0 04 cf ad |(.K.B.,.........| +00000040 74 cf e4 2e 77 31 |t...w1|" +"2019-05-02 09:27:57.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e79 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:57.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e7a Exiting" +"2019-05-02 09:27:57.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e7b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e7c Verify: digest = 00000000 6b 0a 58 b1 30 13 b2 3f f7 75 e1 ce c3 33 91 f5 |k.X.0..?.u...3..| +00000010 b4 08 a0 2d eb 67 e0 6d a5 a8 46 e2 fa e1 e9 0c |...-.g.m..F.....|" +"2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e7d Verify: sig = 00000000 30 45 02 21 00 fc ef ed 74 b5 a9 e0 55 f5 a9 cf |0E.!....t...U...| +00000010 3a 39 aa 92 51 ba 31 e4 55 37 01 7e 4b 40 2f 9f |:9..Q.1.U7.~K@/.| +00000020 36 f3 e0 76 27 02 20 3b 80 29 5c f0 01 12 51 da |6..v'. ;.)\...Q.| +00000030 99 25 2e db 35 30 ae 11 8d d5 54 ef 08 e1 00 7b |.%..50....T....{| +00000040 cf 5c be f3 7c 0d a8 |.\..|..|" +"2019-05-02 09:27:57.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e7e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:57.166 UTC [gossip.discovery] isSentByMe -> DEBU 2e7f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:57.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e80 Exiting" +"2019-05-02 09:27:57.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e81 Exiting" +"2019-05-02 09:27:57.166 UTC [gossip.gossip] handleMessage -> DEBU 2e82 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.166 UTC [gossip.gossip] handleMessage -> DEBU 2e83 Exiting" +"2019-05-02 09:27:57.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e84 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e85 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e86 Verify: digest = 00000000 6b 0a 58 b1 30 13 b2 3f f7 75 e1 ce c3 33 91 f5 |k.X.0..?.u...3..| +00000010 b4 08 a0 2d eb 67 e0 6d a5 a8 46 e2 fa e1 e9 0c |...-.g.m..F.....|" +"2019-05-02 09:27:57.166 UTC [msp.identity] Verify -> DEBU 2e87 Verify: sig = 00000000 30 45 02 21 00 fc ef ed 74 b5 a9 e0 55 f5 a9 cf |0E.!....t...U...| +00000010 3a 39 aa 92 51 ba 31 e4 55 37 01 7e 4b 40 2f 9f |:9..Q.1.U7.~K@/.| +00000020 36 f3 e0 76 27 02 20 3b 80 29 5c f0 01 12 51 da |6..v'. ;.)\...Q.| +00000030 99 25 2e db 35 30 ae 11 8d d5 54 ef 08 e1 00 7b |.%..50....T....{| +00000040 cf 5c be f3 7c 0d a8 |.\..|..|" +"2019-05-02 09:27:57.167 UTC [msp.identity] Verify -> DEBU 2e88 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:26.213 UTC [msp.identity] Verify -> DEBU 2e17 Verify: sig = 00000000 30 45 02 21 00 e7 6a 24 d2 6d 5e 53 49 65 15 81 |0E.!..j$.m^SIe..| -00000010 cd 60 71 81 d1 c9 58 b2 e3 4a 7c 13 18 2e 08 d4 |.`q...X..J|.....| -00000020 65 a8 62 af 79 02 20 18 7c bd e0 60 a5 58 12 33 |e.b.y. .|..`.X.3| -00000030 73 ed 03 55 53 27 9c f2 ac 51 00 21 04 b6 ce 99 |s..US'...Q.!....| -00000040 40 ff bc f3 24 53 dd |@...$S.|" -"2019-05-02 01:31:26.215 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e18 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:26.215 UTC [gossip.discovery] isSentByMe -> DEBU 2e19 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:26.216 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e1a Exiting" -"2019-05-02 01:31:26.217 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e1b Exiting" -"2019-05-02 01:31:26.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e1c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.219 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e1e Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:26.219 UTC [msp] DeserializeIdentity -> DEBU 2e1f Obtaining identity" -"2019-05-02 01:31:26.218 UTC [gossip.gossip] handleMessage -> DEBU 2e1d Exiting" -"2019-05-02 01:31:26.220 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e20 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:26.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e21 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:26.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e22 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:26.222 UTC [policies] Evaluate -> DEBU 2e23 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:26.223 UTC [policies] Evaluate -> DEBU 2e24 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:26.223 UTC [policies] Evaluate -> DEBU 2e25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:26.223 UTC [cauthdsl] func1 -> DEBU 2e26 0xc002480630 gate 1556760686223913500 evaluation starts" -"2019-05-02 01:31:26.224 UTC [cauthdsl] func2 -> DEBU 2e27 0xc002480630 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:26.224 UTC [cauthdsl] func2 -> DEBU 2e28 0xc002480630 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:26.225 UTC [cauthdsl] func2 -> DEBU 2e29 0xc002480630 principal matched by identity 0" -"2019-05-02 01:31:26.225 UTC [msp.identity] Verify -> DEBU 2e2a Verify: digest = 00000000 83 14 bc c6 ce 8d 4d 4a 49 f0 0d 2c 09 90 7e a4 |......MJI..,..~.| -00000010 ab 81 58 0f 97 ca 1b 1f 97 41 59 7d 01 28 fc de |..X......AY}.(..|" -"2019-05-02 01:31:26.226 UTC [msp.identity] Verify -> DEBU 2e2b Verify: sig = 00000000 30 45 02 21 00 ca 4d 36 af 1c b2 cb d8 fc 9e 09 |0E.!..M6........| -00000010 4c 78 51 24 48 18 72 6e 08 a9 cb 41 03 d8 2d 83 |LxQ$H.rn...A..-.| -00000020 f5 6e cc a4 85 02 20 33 d2 d2 a8 b6 ae 65 56 8e |.n.... 3.....eV.| -00000030 f3 43 b1 bc 44 3b dd d5 3c e9 a9 0b 07 0b ef b9 |.C..D;..<.......| -00000040 ac 91 3f f0 05 aa 2a |..?...*|" -"2019-05-02 01:31:26.226 UTC [cauthdsl] func2 -> DEBU 2e2c 0xc002480630 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:26.227 UTC [cauthdsl] func1 -> DEBU 2e2d 0xc002480630 gate 1556760686223913500 evaluation succeeds" -"2019-05-02 01:31:26.228 UTC [policies] Evaluate -> DEBU 2e2e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:26.228 UTC [policies] Evaluate -> DEBU 2e2f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:26.229 UTC [policies] Evaluate -> DEBU 2e30 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:26.229 UTC [policies] Evaluate -> DEBU 2e31 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:26.230 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e32 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:26.230 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e33 Exiting" -"2019-05-02 01:31:26.231 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e34 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:26.231 UTC [msp.identity] Verify -> DEBU 2e35 Verify: digest = 00000000 06 6a 17 f2 a9 64 62 c9 b7 a4 d7 65 a7 26 a2 b2 |.j...db....e.&..| -00000010 b2 54 54 93 12 78 5c 89 75 13 dc eb 72 2f 26 a0 |.TT..x\.u...r/&.|" -"2019-05-02 01:31:26.232 UTC [msp.identity] Verify -> DEBU 2e36 Verify: sig = 00000000 30 44 02 20 1d 29 e2 fc c6 15 ab e9 fa 01 04 c6 |0D. .)..........| -00000010 96 60 ae 40 81 cb 53 a0 a7 98 4d 7f ab 54 b9 02 |.`.@..S...M..T..| -00000020 a6 38 34 ec 02 20 65 52 f9 8e 80 8d 13 32 f5 50 |.84.. eR.....2.P| -00000030 cb 83 29 55 32 f4 14 46 aa de 42 ec 6e 82 4f 71 |..)U2..F..B.n.Oq| -00000040 36 cc 4d 37 ad 6c |6.M7.l|" -"2019-05-02 01:31:26.233 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e37 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:26.233 UTC [gossip.discovery] isSentByMe -> DEBU 2e38 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:26.234 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e39 Exiting" -"2019-05-02 01:31:26.234 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e3a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:26.235 UTC [msp.identity] Verify -> DEBU 2e3b Verify: digest = 00000000 f4 72 c5 fd 97 6b 27 a8 b0 ab 5f 86 dd 06 ab 0f |.r...k'..._.....| -00000010 4a f0 f5 aa df bf 90 11 15 e0 6c 6f 57 1e d1 b2 |J.........loW...|" -"2019-05-02 01:31:26.235 UTC [msp.identity] Verify -> DEBU 2e3c Verify: sig = 00000000 30 44 02 20 28 b0 34 fe 1b c3 1e ed d8 76 9d b4 |0D. (.4......v..| -00000010 c7 88 37 3c 2a 76 3e fa 41 aa 2a 6e 26 a7 6b 85 |..7<*v>.A.*n&.k.| -00000020 57 86 d8 46 02 20 38 6d a5 66 57 b2 80 92 99 85 |W..F. 8m.fW.....| -00000030 0b 92 b9 4e 66 b1 3a 23 02 e5 db 40 ec e5 27 e0 |...Nf.:#...@..'.| -00000040 9b 2e b9 1f 40 df |....@.|" -"2019-05-02 01:31:26.236 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e3d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:26.237 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e3e Exiting" -"2019-05-02 01:31:26.237 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e3f Exiting" -"2019-05-02 01:31:26.242 UTC [gossip.comm] func1 -> DEBU 2e40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.243 UTC [gossip.gossip] handleMessage -> DEBU 2e41 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.243 UTC [gossip.gossip] handleMessage -> DEBU 2e42 Exiting" -"2019-05-02 01:31:26.244 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:26.244 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e44 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:26.245 UTC [msp.identity] Verify -> DEBU 2e45 Verify: digest = 00000000 06 6a 17 f2 a9 64 62 c9 b7 a4 d7 65 a7 26 a2 b2 |.j...db....e.&..| -00000010 b2 54 54 93 12 78 5c 89 75 13 dc eb 72 2f 26 a0 |.TT..x\.u...r/&.|" -"2019-05-02 01:31:26.245 UTC [msp.identity] Verify -> DEBU 2e46 Verify: sig = 00000000 30 44 02 20 1d 29 e2 fc c6 15 ab e9 fa 01 04 c6 |0D. .)..........| -00000010 96 60 ae 40 81 cb 53 a0 a7 98 4d 7f ab 54 b9 02 |.`.@..S...M..T..| -00000020 a6 38 34 ec 02 20 65 52 f9 8e 80 8d 13 32 f5 50 |.84.. eR.....2.P| -00000030 cb 83 29 55 32 f4 14 46 aa de 42 ec 6e 82 4f 71 |..)U2..F..B.n.Oq| -00000040 36 cc 4d 37 ad 6c |6.M7.l|" -"2019-05-02 01:31:26.246 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e47 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:26.247 UTC [gossip.discovery] isSentByMe -> DEBU 2e48 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:26.247 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e49 Exiting" -"2019-05-02 01:31:26.249 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e4a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:26.250 UTC [msp.identity] Verify -> DEBU 2e4b Verify: digest = 00000000 f4 72 c5 fd 97 6b 27 a8 b0 ab 5f 86 dd 06 ab 0f |.r...k'..._.....| -00000010 4a f0 f5 aa df bf 90 11 15 e0 6c 6f 57 1e d1 b2 |J.........loW...|" -"2019-05-02 01:31:26.250 UTC [msp.identity] Verify -> DEBU 2e4c Verify: sig = 00000000 30 44 02 20 28 b0 34 fe 1b c3 1e ed d8 76 9d b4 |0D. (.4......v..| -00000010 c7 88 37 3c 2a 76 3e fa 41 aa 2a 6e 26 a7 6b 85 |..7<*v>.A.*n&.k.| -00000020 57 86 d8 46 02 20 38 6d a5 66 57 b2 80 92 99 85 |W..F. 8m.fW.....| -00000030 0b 92 b9 4e 66 b1 3a 23 02 e5 db 40 ec e5 27 e0 |...Nf.:#...@..'.| -00000040 9b 2e b9 1f 40 df |....@.|" -"2019-05-02 01:31:26.251 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e4d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:26.251 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e4e Exiting" -"2019-05-02 01:31:26.252 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e4f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:26.253 UTC [msp] DeserializeIdentity -> DEBU 2e50 Obtaining identity" -"2019-05-02 01:31:26.253 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e51 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:26.254 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e52 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:26.255 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e53 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:26.255 UTC [policies] Evaluate -> DEBU 2e54 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:26.256 UTC [policies] Evaluate -> DEBU 2e55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:26.257 UTC [policies] Evaluate -> DEBU 2e56 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:26.258 UTC [cauthdsl] func1 -> DEBU 2e57 0xc002659330 gate 1556760686258164500 evaluation starts" -"2019-05-02 01:31:26.259 UTC [cauthdsl] func2 -> DEBU 2e58 0xc002659330 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:26.260 UTC [cauthdsl] func2 -> DEBU 2e59 0xc002659330 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:26.261 UTC [cauthdsl] func2 -> DEBU 2e5a 0xc002659330 principal matched by identity 0" -"2019-05-02 01:31:26.261 UTC [msp.identity] Verify -> DEBU 2e5b Verify: digest = 00000000 3e 65 b1 1f 8c 7a 6d 97 81 74 2b 57 7d 60 82 84 |>e...zm..t+W}`..| -00000010 29 e7 b4 12 2e 35 e3 16 8d c6 e2 c4 c5 04 f8 96 |)....5..........|" -"2019-05-02 01:31:26.261 UTC [msp.identity] Verify -> DEBU 2e5c Verify: sig = 00000000 30 45 02 21 00 ca ec 8c db 5d b6 c2 37 15 3f c8 |0E.!.....]..7.?.| -00000010 05 6f b7 63 d9 dd 9a 33 78 30 45 e9 cc 66 5a 87 |.o.c...3x0E..fZ.| -00000020 5a 84 3b 6f f5 02 20 27 55 34 b8 9c 34 ac ec 93 |Z.;o.. 'U4..4...| -00000030 3f a9 15 e6 59 82 18 21 8b e8 b6 ad 9a 4d 24 8f |?...Y..!.....M$.| -00000040 ac 08 bf 5b d1 a0 4a |...[..J|" -"2019-05-02 01:31:26.262 UTC [cauthdsl] func2 -> DEBU 2e5d 0xc002659330 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:26.262 UTC [cauthdsl] func1 -> DEBU 2e5e 0xc002659330 gate 1556760686258164500 evaluation succeeds" -"2019-05-02 01:31:26.263 UTC [policies] Evaluate -> DEBU 2e5f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:26.263 UTC [policies] Evaluate -> DEBU 2e60 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:26.263 UTC [policies] Evaluate -> DEBU 2e61 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:26.264 UTC [policies] Evaluate -> DEBU 2e62 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:26.264 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e63 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:26.264 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e64 Exiting" -"2019-05-02 01:31:26.265 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e65 Exiting" -"2019-05-02 01:31:26.984 UTC [gossip.election] waitForInterrupt -> DEBU 2e66 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:26.984 UTC [gossip.election] IsLeader -> DEBU 2e67 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:26.986 UTC [msp.identity] Sign -> DEBU 2e68 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100A1801 " -"2019-05-02 01:31:26.986 UTC [msp.identity] Sign -> DEBU 2e69 Sign: digest: D7B1144E5500999DF856CF4132130218D7E02293C37D70D262DD52B224D7EA99 " -"2019-05-02 01:31:26.988 UTC [gossip.election] waitForInterrupt -> DEBU 2e6a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:26.990 UTC [msp] DeserializeIdentity -> DEBU 2e6b Obtaining identity" -"2019-05-02 01:31:26.991 UTC [msp] DeserializeIdentity -> DEBU 2e6c Obtaining identity" -"2019-05-02 01:31:26.992 UTC [msp] DeserializeIdentity -> DEBU 2e6d Obtaining identity" -"2019-05-02 01:31:26.993 UTC [msp] DeserializeIdentity -> DEBU 2e6e Obtaining identity" -"2019-05-02 01:31:26.996 UTC [gossip.comm] Send -> DEBU 2e6f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:27.000 UTC [gossip.comm] sendToEndpoint -> DEBU 2e70 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -"2019-05-02 01:31:27.001 UTC [gossip.comm] sendToEndpoint -> DEBU 2e71 Exiting" -"2019-05-02 01:31:27.001 UTC [msp] DeserializeIdentity -> DEBU 2e72 Obtaining identity" -"2019-05-02 01:31:27.001 UTC [msp] DeserializeIdentity -> DEBU 2e73 Obtaining identity" -"2019-05-02 01:31:28.397 UTC [gossip.gossip] handleMessage -> DEBU 2e74 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:28.397 UTC [gossip.gossip] handleMessage -> DEBU 2e75 Exiting" -"2019-05-02 01:31:28.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e76 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:28.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e77 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:28.397 UTC [msp.identity] Verify -> DEBU 2e78 Verify: digest = 00000000 df 1c 79 44 af e0 b1 61 26 1c d1 2e de 6e 80 94 |..yD...a&....n..| -00000010 70 0e 73 f4 04 02 19 91 e0 1c 2c e6 c4 ff 31 47 |p.s.......,...1G|" -"2019-05-02 01:31:28.398 UTC [msp.identity] Verify -> DEBU 2e79 Verify: sig = 00000000 30 45 02 21 00 fb 90 45 af cb 50 d2 d7 3d 78 97 |0E.!...E..P..=x.| -00000010 9a c8 f4 a8 7d 97 ab 42 ee 13 57 68 e0 8f 1c 14 |....}..B..Wh....| -00000020 8b 4a 40 23 7d 02 20 4a 7b 01 3b ee aa 08 0a 35 |.J@#}. J{.;....5| -00000030 cc bb 5b ac 12 06 4e f5 3c 7f 61 14 54 54 21 95 |..[...N.<.a.TT!.| -00000040 97 5b 87 d0 d1 b7 ff |.[.....|" -"2019-05-02 01:31:28.398 UTC [msp.identity] Verify -> DEBU 2e7a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:27:57.167 UTC [msp.identity] Verify -> DEBU 2e89 Verify: sig = 00000000 30 44 02 20 32 a2 79 ad c6 1f 0f 61 cb c2 bf b5 |0D. 2.y....a....| +00000010 d7 fe 41 47 77 a9 95 ce eb 6f e1 a9 83 18 fd 33 |..AGw....o.....3| +00000020 d4 bd d6 9c 02 20 52 02 53 e0 e7 60 b8 1d 2c df |..... R.S..`..,.| +00000030 99 33 73 b6 51 91 41 33 d6 2e d2 0e 92 10 da 39 |.3s.Q.A3.......9| +00000040 89 1a 5d 8e ce 76 |..]..v|" +"2019-05-02 09:27:57.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e8a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:57.167 UTC [gossip.discovery] isSentByMe -> DEBU 2e8b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:57.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e8c Exiting" +"2019-05-02 09:27:57.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e8d Exiting" +"2019-05-02 09:27:57.167 UTC [gossip.gossip] handleMessage -> DEBU 2e8e Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.167 UTC [gossip.gossip] handleMessage -> DEBU 2e8f Exiting" +"2019-05-02 09:27:57.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e90 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e91 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:57.167 UTC [msp] DeserializeIdentity -> DEBU 2e92 Obtaining identity" +"2019-05-02 09:27:57.168 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:57.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e94 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:57.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e95 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2e99 0xc0003a4be0 gate 1556789277168239700 evaluation starts" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9a 0xc0003a4be0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9b 0xc0003a4be0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9c 0xc0003a4be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2e9d 0xc0003a4be0 principal evaluation fails" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2e9e 0xc0003a4be0 gate 1556789277168239700 evaluation fails" +"2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2e9f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2ea0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:57.168 UTC [policies] Evaluate -> DEBU 2ea1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2ea2 0xc0003a5430 gate 1556789277168593100 evaluation starts" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea3 0xc0003a5430 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea4 0xc0003a5430 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea5 0xc0003a5430 principal matched by identity 0" +"2019-05-02 09:27:57.168 UTC [msp.identity] Verify -> DEBU 2ea6 Verify: digest = 00000000 8e ab 79 f9 33 76 ca 73 af 46 a7 01 7f 37 05 8f |..y.3v.s.F...7..| +00000010 f8 ff 78 29 20 d2 5c e5 c3 a2 84 78 49 e7 68 90 |..x) .\....xI.h.|" +"2019-05-02 09:27:57.168 UTC [msp.identity] Verify -> DEBU 2ea7 Verify: sig = 00000000 30 45 02 21 00 ce 88 b2 fa ff 08 3c df 52 7a 50 |0E.!.......<.RzP| +00000010 d3 6b 47 b6 8d fb 53 e3 4e 8d 4e 5a 1f ce fd 3c |.kG...S.N.NZ...<| +00000020 7a 9a c9 19 f9 02 20 4b 0b 2d 8b c3 63 8b 85 8c |z..... K.-..c...| +00000030 25 6a 36 e5 da fe 4c 90 c0 55 4a 0e 7d 0c 98 57 |%j6...L..UJ.}..W| +00000040 cd 97 3a f0 2b 03 e9 |..:.+..|" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func2 -> DEBU 2ea8 0xc0003a5430 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:57.168 UTC [cauthdsl] func1 -> DEBU 2ea9 0xc0003a5430 gate 1556789277168593100 evaluation succeeds" +"2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2eaa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2eac Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:57.169 UTC [policies] Evaluate -> DEBU 2ead == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eaf Exiting" +"2019-05-02 09:27:57.169 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2eb0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:57.169 UTC [msp.identity] Verify -> DEBU 2eb1 Verify: digest = 00000000 a0 8d 9c cc b8 52 25 4f 46 56 80 5e 8a d2 26 6d |.....R%OFV.^..&m| +00000010 b0 04 b6 0a f6 49 b2 5a b0 2d 5c e0 4b 98 3c 74 |.....I.Z.-\.K. DEBU 2eb2 Verify: sig = 00000000 30 44 02 20 00 f6 bd 00 be 9d 17 d5 42 13 bc d6 |0D. ........B...| +00000010 b8 02 63 9c 5c 03 3e d5 bd f0 ac 4f 13 56 cd 36 |..c.\.>....O.V.6| +00000020 df 8d 17 e1 02 20 07 30 2a d9 a4 16 25 77 fb 9c |..... .0*...%w..| +00000030 28 8b 4b b1 42 92 2c 89 08 da 0c d5 c0 04 cf ad |(.K.B.,.........| +00000040 74 cf e4 2e 77 31 |t...w1|" +"2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:57.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb4 Exiting" +"2019-05-02 09:27:57.169 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2eb5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:27:57.169 UTC [msp.identity] Verify -> DEBU 2eb6 Verify: digest = 00000000 6b 0a 58 b1 30 13 b2 3f f7 75 e1 ce c3 33 91 f5 |k.X.0..?.u...3..| +00000010 b4 08 a0 2d eb 67 e0 6d a5 a8 46 e2 fa e1 e9 0c |...-.g.m..F.....|" +"2019-05-02 09:27:57.169 UTC [msp.identity] Verify -> DEBU 2eb7 Verify: sig = 00000000 30 45 02 21 00 fc ef ed 74 b5 a9 e0 55 f5 a9 cf |0E.!....t...U...| +00000010 3a 39 aa 92 51 ba 31 e4 55 37 01 7e 4b 40 2f 9f |:9..Q.1.U7.~K@/.| +00000020 36 f3 e0 76 27 02 20 3b 80 29 5c f0 01 12 51 da |6..v'. ;.)\...Q.| +00000030 99 25 2e db 35 30 ae 11 8d d5 54 ef 08 e1 00 7b |.%..50....T....{| +00000040 cf 5c be f3 7c 0d a8 |.\..|..|" +"2019-05-02 09:27:57.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:57.170 UTC [gossip.discovery] isSentByMe -> DEBU 2eb9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:57.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eba Exiting" +"2019-05-02 09:27:57.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ebb Exiting" +"2019-05-02 09:27:57.194 UTC [gossip.gossip] handleMessage -> DEBU 2ebc Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.195 UTC [gossip.gossip] handleMessage -> DEBU 2ebd Exiting" +"2019-05-02 09:27:57.195 UTC [gossip.gossip] handleMessage -> DEBU 2ebe Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.195 UTC [gossip.pull] HandleMessage -> DEBU 2ebf GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec0 Obtaining identity" +"2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec1 Obtaining identity" +"2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec2 Obtaining identity" +"2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec3 Obtaining identity" +"2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec4 Obtaining identity" +"2019-05-02 09:27:57.195 UTC [msp] DeserializeIdentity -> DEBU 2ec5 Obtaining identity" +"2019-05-02 09:27:57.195 UTC [gossip.pull] SendDigest -> DEBU 2ec6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:57.195 UTC [gossip.gossip] handleMessage -> DEBU 2ec7 Exiting" +"2019-05-02 09:27:57.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ec8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ec9 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:57.198 UTC [msp] DeserializeIdentity -> DEBU 2eca Obtaining identity" +"2019-05-02 09:27:57.198 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ecb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:57.198 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ecc Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:57.198 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ecd Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:57.198 UTC [policies] Evaluate -> DEBU 2ece == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ecf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2ed1 0xc00030a230 gate 1556789277199077300 evaluation starts" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed2 0xc00030a230 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed3 0xc00030a230 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed4 0xc00030a230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ed5 0xc00030a230 principal evaluation fails" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2ed6 0xc00030a230 gate 1556789277199077300 evaluation fails" +"2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ed9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2eda 0xc00030af70 gate 1556789277199421000 evaluation starts" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2edb 0xc00030af70 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2edc 0xc00030af70 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2edd 0xc00030af70 principal matched by identity 0" +"2019-05-02 09:27:57.199 UTC [msp.identity] Verify -> DEBU 2ede Verify: digest = 00000000 9d 84 f9 c6 2f 0e e1 a8 68 f4 96 d0 f2 60 0d 87 |..../...h....`..| +00000010 93 5c 81 bb cb 10 dc 2e 72 96 7a 59 5b bb 78 18 |.\......r.zY[.x.|" +"2019-05-02 09:27:57.199 UTC [msp.identity] Verify -> DEBU 2edf Verify: sig = 00000000 30 44 02 20 3c 5e ad dc 85 4b 7c 5d e8 36 7a d3 |0D. <^...K|].6z.| +00000010 30 3b ac 40 88 88 bf b0 17 6b b6 de d0 2d b1 a0 |0;.@.....k...-..| +00000020 af a9 21 e6 02 20 64 e3 0c 2b 28 f2 71 5f 0d 6a |..!.. d..+(.q_.j| +00000030 cb d6 3d e9 a0 7c b2 a7 ad f3 a7 06 c5 cd 82 55 |..=..|.........U| +00000040 ce d6 f6 6e 89 b2 |...n..|" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func2 -> DEBU 2ee0 0xc00030af70 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:57.199 UTC [cauthdsl] func1 -> DEBU 2ee1 0xc00030af70 gate 1556789277199421000 evaluation succeeds" +"2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee4 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:57.199 UTC [policies] Evaluate -> DEBU 2ee5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:57.200 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ee6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ee7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ee8 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 " +"2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ee9 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 " +"2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eea Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:57.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eeb Exiting" +"2019-05-02 09:27:57.200 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eec Exiting" +"2019-05-02 09:27:57.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2eed Exiting" +"2019-05-02 09:27:57.200 UTC [gossip.discovery] sendMemResponse -> DEBU 2eee Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:27:57.200 UTC [msp] DeserializeIdentity -> DEBU 2eef Obtaining identity" +"2019-05-02 09:27:57.200 UTC [msp] DeserializeIdentity -> DEBU 2ef0 Obtaining identity" +"2019-05-02 09:27:57.200 UTC [msp] DeserializeIdentity -> DEBU 2ef1 Obtaining identity" +"2019-05-02 09:27:57.200 UTC [gossip.comm] Send -> DEBU 2ef2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:27:57.200 UTC [gossip.discovery] sendMemResponse -> DEBU 2ef3 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:27:57.200 UTC [gossip.comm] sendToEndpoint -> DEBU 2ef4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:27:57.200 UTC [gossip.comm] sendToEndpoint -> DEBU 2ef5 Exiting" +"2019-05-02 09:27:57.320 UTC [gossip.election] waitForInterrupt -> DEBU 2ef6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:27:57.320 UTC [gossip.election] IsLeader -> DEBU 2ef7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:27:57.320 UTC [msp.identity] Sign -> DEBU 2ef8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD1510091801 " +"2019-05-02 09:27:57.320 UTC [msp.identity] Sign -> DEBU 2ef9 Sign: digest: 462B319F16B820A244F548AB2D0FE497F7815E8C73F97D1EC0E3C8EA6A1E9F47 " +"2019-05-02 09:27:57.321 UTC [gossip.election] waitForInterrupt -> DEBU 2efa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efb Obtaining identity" +"2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efc Obtaining identity" +"2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efd Obtaining identity" +"2019-05-02 09:27:57.326 UTC [msp] DeserializeIdentity -> DEBU 2efe Obtaining identity" +"2019-05-02 09:27:57.327 UTC [gossip.comm] Send -> DEBU 2eff Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:57.327 UTC [msp] DeserializeIdentity -> DEBU 2f00 Obtaining identity" +"2019-05-02 09:27:57.327 UTC [msp] DeserializeIdentity -> DEBU 2f01 Obtaining identity" +"2019-05-02 09:27:57.327 UTC [gossip.comm] sendToEndpoint -> DEBU 2f02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-05-02 09:27:57.327 UTC [gossip.comm] sendToEndpoint -> DEBU 2f03 Exiting" +"2019-05-02 09:27:58.804 UTC [gossip.comm] func1 -> DEBU 2f04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:58.804 UTC [gossip.gossip] handleMessage -> DEBU 2f05 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:58.804 UTC [gossip.gossip] handleMessage -> DEBU 2f06 Exiting" +"2019-05-02 09:27:58.804 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:58.804 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f08 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:27:58.804 UTC [msp] DeserializeIdentity -> DEBU 2f09 Obtaining identity" +"2019-05-02 09:27:58.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:58.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f0b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:58.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f0c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:58.805 UTC [cauthdsl] func1 -> DEBU 2f10 0xc000394bd0 gate 1556789278805217700 evaluation starts" +"2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f11 0xc000394bd0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f12 0xc000394bd0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f13 0xc000394bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f14 0xc000394bd0 principal evaluation fails" +"2019-05-02 09:27:58.805 UTC [cauthdsl] func1 -> DEBU 2f15 0xc000394bd0 gate 1556789278805217700 evaluation fails" +"2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f16 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:58.805 UTC [policies] Evaluate -> DEBU 2f18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:58.805 UTC [cauthdsl] func1 -> DEBU 2f19 0xc000395410 gate 1556789278805645500 evaluation starts" +"2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f1a 0xc000395410 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f1b 0xc000395410 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:58.805 UTC [cauthdsl] func2 -> DEBU 2f1c 0xc000395410 principal matched by identity 0" +"2019-05-02 09:27:58.805 UTC [msp.identity] Verify -> DEBU 2f1d Verify: digest = 00000000 3f 3d a0 cd ab c9 e0 2f 55 b1 2c 4d 34 fa 18 04 |?=...../U.,M4...| +00000010 0a bf 9d 8a b1 79 63 21 85 8e 2e 09 3f 72 23 df |.....yc!....?r#.|" +"2019-05-02 09:27:58.805 UTC [msp.identity] Verify -> DEBU 2f1e Verify: sig = 00000000 30 45 02 21 00 af 91 78 d9 62 a8 61 d8 ab 11 f7 |0E.!...x.b.a....| +00000010 cf 50 d6 b1 a5 dc ed a4 58 0a aa 1a 4e b7 68 bf |.P......X...N.h.| +00000020 88 b4 73 f9 66 02 20 5a a1 1e 0c c1 59 a6 7d ad |..s.f. Z....Y.}.| +00000030 92 b5 1e 33 73 8d c2 d8 af 65 38 47 39 ac 6a e2 |...3s....e8G9.j.| +00000040 b6 b0 48 b4 0e bd ce |..H....|" +"2019-05-02 09:27:58.806 UTC [cauthdsl] func2 -> DEBU 2f1f 0xc000395410 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:58.806 UTC [cauthdsl] func1 -> DEBU 2f20 0xc000395410 gate 1556789278805645500 evaluation succeeds" +"2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f21 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f23 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:58.806 UTC [policies] Evaluate -> DEBU 2f24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:58.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f25 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f26 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f27 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 " +"2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f28 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 " +"2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f29 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:58.806 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f2a Exiting" +"2019-05-02 09:27:58.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f2b Exiting" +"2019-05-02 09:27:58.806 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f2c Exiting" +"2019-05-02 09:27:58.815 UTC [gossip.gossip] handleMessage -> DEBU 2f2d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:58.815 UTC [gossip.gossip] handleMessage -> DEBU 2f2e Exiting" +"2019-05-02 09:27:58.815 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f2f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:58.815 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f30 Exiting" +"2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f31 Obtaining identity" +"2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f32 Obtaining identity" +"2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f33 Obtaining identity" +"2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f34 Obtaining identity" +"2019-05-02 09:27:58.815 UTC [msp] DeserializeIdentity -> DEBU 2f35 Obtaining identity" +"2019-05-02 09:27:58.816 UTC [msp] DeserializeIdentity -> DEBU 2f36 Obtaining identity" +"2019-05-02 09:27:58.816 UTC [gossip.comm] Send -> DEBU 2f37 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:58.816 UTC [msp] DeserializeIdentity -> DEBU 2f38 Obtaining identity" +"2019-05-02 09:27:58.816 UTC [msp] DeserializeIdentity -> DEBU 2f39 Obtaining identity" +"2019-05-02 09:27:58.816 UTC [gossip.comm] Send -> DEBU 2f3a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3c Exiting" +"2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:58.816 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3e Exiting" +"2019-05-02 09:27:58.818 UTC [gossip.gossip] handleMessage -> DEBU 2f3f Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:58.818 UTC [gossip.gossip] handleMessage -> DEBU 2f40 Exiting" +"2019-05-02 09:27:58.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f41 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:58.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f42 Exiting" +"2019-05-02 09:27:59.026 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 2f43 Sleeping 25s" +"2019-05-02 09:27:59.050 UTC [msp.identity] Sign -> DEBU 2f44 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151020 " +"2019-05-02 09:27:59.051 UTC [msp.identity] Sign -> DEBU 2f45 Sign: digest: 8B0F1721906A1A7B8E6E66FD82887B64909157F0976BA494FC42849BF2C88A79 " +"2019-05-02 09:27:59.052 UTC [msp.identity] Sign -> DEBU 2f46 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:27:59.052 UTC [msp.identity] Sign -> DEBU 2f47 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:27:59.053 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2f48 Sleeping 5s" +"2019-05-02 09:27:59.063 UTC [msp] DeserializeIdentity -> DEBU 2f49 Obtaining identity" +"2019-05-02 09:27:59.063 UTC [msp] DeserializeIdentity -> DEBU 2f4a Obtaining identity" +"2019-05-02 09:27:59.063 UTC [msp] DeserializeIdentity -> DEBU 2f4b Obtaining identity" +"2019-05-02 09:27:59.063 UTC [gossip.comm] Send -> DEBU 2f4c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:59.064 UTC [msp] DeserializeIdentity -> DEBU 2f4d Obtaining identity" +"2019-05-02 09:27:59.064 UTC [gossip.comm] Send -> DEBU 2f4e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:59.064 UTC [gossip.comm] Send -> DEBU 2f4f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:59.064 UTC [gossip.comm] sendToEndpoint -> DEBU 2f50 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:59.064 UTC [gossip.comm] sendToEndpoint -> DEBU 2f51 Exiting" +"2019-05-02 09:27:59.064 UTC [gossip.comm] sendToEndpoint -> DEBU 2f52 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:59.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2f53 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:59.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2f55 Exiting" +"2019-05-02 09:27:59.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2f54 Exiting" +"2019-05-02 09:27:59.098 UTC [gossip.gossip] handleMessage -> DEBU 2f56 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:59.098 UTC [gossip.gossip] handleMessage -> DEBU 2f57 Exiting" +"2019-05-02 09:27:59.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:59.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f59 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5a Verify: digest = 00000000 ea 8e ed bf 77 a0 19 87 89 80 3b 3d 86 c9 81 d4 |....w.....;=....| +00000010 e4 ff 64 bf ae 1e 34 8c a7 b6 3f 8f 55 03 4c 83 |..d...4...?.U.L.|" +"2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5b Verify: sig = 00000000 30 45 02 21 00 b7 ff 09 99 cd 32 b8 fd 9f c6 b8 |0E.!......2.....| +00000010 96 37 00 e8 6f 79 c6 dc 46 21 e4 fa 4d 7d 91 15 |.7..oy..F!..M}..| +00000020 47 aa 86 04 b0 02 20 6f a1 e9 44 a0 4f 5e 25 6c |G..... o..D.O^%l| +00000030 c6 be f7 87 b9 99 91 25 93 d5 99 1f a9 88 b7 fa |.......%........| +00000040 67 d3 af 10 17 8b 62 |g.....b|" +"2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:28.398 UTC [msp.identity] Verify -> DEBU 2e7b Verify: sig = 00000000 30 45 02 21 00 d2 77 3a c4 61 ee aa fc 95 b5 52 |0E.!..w:.a.....R| -00000010 07 5e ba 13 9d b3 35 21 c8 01 73 2c 73 42 18 e1 |.^....5!..s,sB..| -00000020 68 7e 03 6c 49 02 20 5f c6 b5 88 8c a0 1e 79 76 |h~.lI. _......yv| -00000030 c3 f0 d9 2d 8b 44 b6 a9 49 f7 24 7a dc 26 60 fe |...-.D..I.$z.&`.| -00000040 c2 8b 9a 2d e8 8d 8e |...-...|" -"2019-05-02 01:31:28.398 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e7c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:28.398 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e7d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:28.398 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e7e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 " -"2019-05-02 01:31:28.398 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e7f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 " -"2019-05-02 01:31:28.398 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e80 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:28.398 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e81 Exiting" -"2019-05-02 01:31:28.398 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e82 Exiting" -"2019-05-02 01:31:28.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e83 Exiting" -"2019-05-02 01:31:28.406 UTC [msp] DeserializeIdentity -> DEBU 2e84 Obtaining identity" -"2019-05-02 01:31:28.407 UTC [msp] DeserializeIdentity -> DEBU 2e85 Obtaining identity" -"2019-05-02 01:31:28.407 UTC [msp] DeserializeIdentity -> DEBU 2e86 Obtaining identity" -"2019-05-02 01:31:28.407 UTC [gossip.comm] Send -> DEBU 2e87 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:28.407 UTC [msp] DeserializeIdentity -> DEBU 2e88 Obtaining identity" -"2019-05-02 01:31:28.407 UTC [gossip.comm] Send -> DEBU 2e89 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:28.407 UTC [gossip.comm] sendToEndpoint -> DEBU 2e8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.407 UTC [gossip.comm] sendToEndpoint -> DEBU 2e8b Exiting" -"2019-05-02 01:31:28.407 UTC [gossip.comm] func1 -> DEBU 2e8c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.407 UTC [gossip.gossip] handleMessage -> DEBU 2e8d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.407 UTC [gossip.gossip] handleMessage -> DEBU 2e8e Exiting" -"2019-05-02 01:31:28.407 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e8f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.407 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e90 Exiting" -"2019-05-02 01:31:28.407 UTC [gossip.comm] sendToEndpoint -> DEBU 2e91 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.408 UTC [gossip.comm] sendToEndpoint -> DEBU 2e92 Exiting" -"2019-05-02 01:31:28.408 UTC [gossip.comm] func1 -> DEBU 2e93 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.409 UTC [gossip.gossip] handleMessage -> DEBU 2e94 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.409 UTC [gossip.gossip] handleMessage -> DEBU 2e95 Exiting" -"2019-05-02 01:31:28.409 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e96 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.409 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e97 Exiting" -"2019-05-02 01:31:28.473 UTC [gossip.comm] func1 -> DEBU 2e98 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.473 UTC [gossip.gossip] handleMessage -> DEBU 2e99 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.473 UTC [gossip.gossip] handleMessage -> DEBU 2e9a Exiting" -"2019-05-02 01:31:28.473 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e9b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.473 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e9c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:28.473 UTC [msp] DeserializeIdentity -> DEBU 2e9d Obtaining identity" -"2019-05-02 01:31:28.473 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:28.473 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e9f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.473 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ea0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.473 UTC [policies] Evaluate -> DEBU 2ea1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:28.473 UTC [policies] Evaluate -> DEBU 2ea2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:28.473 UTC [policies] Evaluate -> DEBU 2ea3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:28.473 UTC [cauthdsl] func1 -> DEBU 2ea4 0xc00324f680 gate 1556760688473908800 evaluation starts" -"2019-05-02 01:31:28.473 UTC [cauthdsl] func2 -> DEBU 2ea5 0xc00324f680 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:28.474 UTC [cauthdsl] func2 -> DEBU 2ea6 0xc00324f680 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:28.474 UTC [cauthdsl] func2 -> DEBU 2ea7 0xc00324f680 principal matched by identity 0" -"2019-05-02 01:31:28.474 UTC [msp.identity] Verify -> DEBU 2ea8 Verify: digest = 00000000 70 79 b6 b0 93 d2 1d 8d f6 5d 8a 91 9a c8 37 63 |py.......]....7c| -00000010 32 05 ee ad 5c 6e 12 e4 4c 4a 2f d4 e4 cb 52 66 |2...\n..LJ/...Rf|" -"2019-05-02 01:31:28.474 UTC [msp.identity] Verify -> DEBU 2ea9 Verify: sig = 00000000 30 45 02 21 00 f1 b5 f5 e8 50 6f 6f c5 41 34 6f |0E.!.....Poo.A4o| -00000010 0e 3c f5 f5 9c 03 62 16 19 39 3c c7 4e 7e dd 2e |.<....b..9<.N~..| -00000020 6f 39 8f ef b8 02 20 14 61 0a 1e 05 9e e8 ee 0b |o9.... .a.......| -00000030 34 82 00 7c 3e f2 99 23 b0 6b 25 c3 27 ce d2 0a |4..|>..#.k%.'...| -00000040 6d a5 f6 0f 80 47 72 |m....Gr|" -"2019-05-02 01:31:28.474 UTC [cauthdsl] func2 -> DEBU 2eaa 0xc00324f680 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:28.474 UTC [cauthdsl] func1 -> DEBU 2eab 0xc00324f680 gate 1556760688473908800 evaluation succeeds" -"2019-05-02 01:31:28.474 UTC [policies] Evaluate -> DEBU 2eac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.475 UTC [policies] Evaluate -> DEBU 2ead == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.475 UTC [policies] Evaluate -> DEBU 2eae Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:28.475 UTC [policies] Evaluate -> DEBU 2eaf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:28.475 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eb1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:28.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eb2 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 " -"2019-05-02 01:31:28.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eb3 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 " -"2019-05-02 01:31:28.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eb4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:28.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 2eb5 Exiting" -"2019-05-02 01:31:28.476 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eb6 Exiting" -"2019-05-02 01:31:28.476 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2eb7 Exiting" -"2019-05-02 01:31:28.483 UTC [gossip.comm] func1 -> DEBU 2eb8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.483 UTC [gossip.gossip] handleMessage -> DEBU 2eb9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.483 UTC [gossip.gossip] handleMessage -> DEBU 2eba Exiting" -"2019-05-02 01:31:28.483 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ebb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.483 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ebc Exiting" -"2019-05-02 01:31:28.483 UTC [gossip.gossip] handleMessage -> DEBU 2ebd Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.483 UTC [gossip.gossip] handleMessage -> DEBU 2ebe Exiting" -"2019-05-02 01:31:28.483 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ebf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec1 Obtaining identity" -"2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec2 Obtaining identity" -"2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec3 Obtaining identity" -"2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec4 Obtaining identity" -"2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec5 Obtaining identity" -"2019-05-02 01:31:28.484 UTC [msp] DeserializeIdentity -> DEBU 2ec6 Obtaining identity" -"2019-05-02 01:31:28.485 UTC [msp] DeserializeIdentity -> DEBU 2ec7 Obtaining identity" -"2019-05-02 01:31:28.485 UTC [gossip.comm] Send -> DEBU 2ec8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:28.485 UTC [msp] DeserializeIdentity -> DEBU 2ec9 Obtaining identity" -"2019-05-02 01:31:28.485 UTC [gossip.comm] Send -> DEBU 2eca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:28.485 UTC [gossip.comm] sendToEndpoint -> DEBU 2ecb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.485 UTC [gossip.comm] sendToEndpoint -> DEBU 2ecc Exiting" -"2019-05-02 01:31:28.486 UTC [gossip.comm] sendToEndpoint -> DEBU 2ecd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.486 UTC [gossip.comm] sendToEndpoint -> DEBU 2ece Exiting" -"2019-05-02 01:31:28.483 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ec0 Exiting" -"2019-05-02 01:31:28.696 UTC [msp.identity] Sign -> DEBU 2ecf Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151022 " -"2019-05-02 01:31:28.696 UTC [msp.identity] Sign -> DEBU 2ed0 Sign: digest: B1C5B6D779F889C4C5FB60FF7818CDD47F1CCAF34267F3951FACD6EAD0950661 " -"2019-05-02 01:31:28.696 UTC [msp.identity] Sign -> DEBU 2ed1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:28.696 UTC [msp.identity] Sign -> DEBU 2ed2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:28.697 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2ed3 Sleeping 5s" -"2019-05-02 01:31:28.707 UTC [msp] DeserializeIdentity -> DEBU 2ed4 Obtaining identity" -"2019-05-02 01:31:28.707 UTC [msp] DeserializeIdentity -> DEBU 2ed5 Obtaining identity" -"2019-05-02 01:31:28.707 UTC [gossip.comm] Send -> DEBU 2ed6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:28.708 UTC [msp] DeserializeIdentity -> DEBU 2ed7 Obtaining identity" -"2019-05-02 01:31:28.708 UTC [gossip.comm] Send -> DEBU 2ed8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:28.708 UTC [msp] DeserializeIdentity -> DEBU 2ed9 Obtaining identity" -"2019-05-02 01:31:28.708 UTC [gossip.comm] Send -> DEBU 2eda Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:28.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2edb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:28.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2edd Exiting" -"2019-05-02 01:31:28.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2edc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2ede Exiting" -"2019-05-02 01:31:28.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2edf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:28.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee0 Exiting" -"2019-05-02 01:31:28.787 UTC [msp] DeserializeIdentity -> DEBU 2ee1 Obtaining identity" -"2019-05-02 01:31:28.787 UTC [msp] DeserializeIdentity -> DEBU 2ee2 Obtaining identity" -"2019-05-02 01:31:28.787 UTC [gossip.comm] Send -> DEBU 2ee3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee5 Exiting" -"2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee7 Exiting" -"2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.788 UTC [gossip.comm] sendToEndpoint -> DEBU 2ee9 Exiting" -"2019-05-02 01:31:28.791 UTC [gossip.gossip] handleMessage -> DEBU 2eea Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.791 UTC [gossip.comm] func1 -> DEBU 2eeb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.791 UTC [msp.identity] Verify -> DEBU 2eec Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:28.792 UTC [msp.identity] Verify -> DEBU 2eed Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:28.793 UTC [msp.identity] Verify -> DEBU 2eee Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:28.793 UTC [msp.identity] Verify -> DEBU 2eef Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:28.794 UTC [msp] DeserializeIdentity -> DEBU 2ef0 Obtaining identity" -"2019-05-02 01:31:28.795 UTC [msp] DeserializeIdentity -> DEBU 2ef1 Obtaining identity" -"2019-05-02 01:31:28.795 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ef2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:28.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ef3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ef4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.799 UTC [policies] Evaluate -> DEBU 2ef5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:28.799 UTC [policies] Evaluate -> DEBU 2ef6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:28.799 UTC [policies] Evaluate -> DEBU 2ef7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:28.799 UTC [cauthdsl] func1 -> DEBU 2ef8 0xc0041d0060 gate 1556760688799459900 evaluation starts" -"2019-05-02 01:31:28.799 UTC [cauthdsl] func2 -> DEBU 2ef9 0xc0041d0060 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:28.799 UTC [cauthdsl] func2 -> DEBU 2efa 0xc0041d0060 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:28.800 UTC [cauthdsl] func2 -> DEBU 2efb 0xc0041d0060 principal matched by identity 0" -"2019-05-02 01:31:28.800 UTC [msp.identity] Verify -> DEBU 2efc Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:28.800 UTC [msp.identity] Verify -> DEBU 2efd Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:28.800 UTC [cauthdsl] func2 -> DEBU 2efe 0xc0041d0060 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:28.800 UTC [cauthdsl] func1 -> DEBU 2eff 0xc0041d0060 gate 1556760688799459900 evaluation succeeds" -"2019-05-02 01:31:28.800 UTC [policies] Evaluate -> DEBU 2f00 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.800 UTC [policies] Evaluate -> DEBU 2f01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.800 UTC [policies] Evaluate -> DEBU 2f02 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:28.803 UTC [policies] Evaluate -> DEBU 2f03 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:28.803 UTC [msp] DeserializeIdentity -> DEBU 2f04 Obtaining identity" -"2019-05-02 01:31:28.803 UTC [msp] DeserializeIdentity -> DEBU 2f05 Obtaining identity" -"2019-05-02 01:31:28.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:28.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f07 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f08 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.804 UTC [policies] Evaluate -> DEBU 2f09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:28.805 UTC [policies] Evaluate -> DEBU 2f0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:28.805 UTC [policies] Evaluate -> DEBU 2f0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:28.805 UTC [cauthdsl] func1 -> DEBU 2f0c 0xc0041d1830 gate 1556760688805811700 evaluation starts" -"2019-05-02 01:31:28.806 UTC [cauthdsl] func2 -> DEBU 2f0d 0xc0041d1830 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:28.806 UTC [cauthdsl] func2 -> DEBU 2f0e 0xc0041d1830 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:28.806 UTC [cauthdsl] func2 -> DEBU 2f0f 0xc0041d1830 principal matched by identity 0" -"2019-05-02 01:31:28.807 UTC [msp.identity] Verify -> DEBU 2f10 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:28.807 UTC [msp.identity] Verify -> DEBU 2f11 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:28.808 UTC [cauthdsl] func2 -> DEBU 2f12 0xc0041d1830 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:28.808 UTC [cauthdsl] func1 -> DEBU 2f13 0xc0041d1830 gate 1556760688805811700 evaluation succeeds" -"2019-05-02 01:31:28.809 UTC [policies] Evaluate -> DEBU 2f14 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.809 UTC [policies] Evaluate -> DEBU 2f15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.809 UTC [policies] Evaluate -> DEBU 2f16 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:28.810 UTC [policies] Evaluate -> DEBU 2f17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:28.810 UTC [gossip.gossip] handleMessage -> DEBU 2f18 Exiting" -"2019-05-02 01:31:28.811 UTC [gossip.gossip] handleMessage -> DEBU 2f19 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.811 UTC [msp] DeserializeIdentity -> DEBU 2f1a Obtaining identity" -"2019-05-02 01:31:28.811 UTC [msp] DeserializeIdentity -> DEBU 2f1b Obtaining identity" -"2019-05-02 01:31:28.812 UTC [msp] DeserializeIdentity -> DEBU 2f1c Obtaining identity" -"2019-05-02 01:31:28.812 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f1d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:28.813 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f1e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.813 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f1f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.813 UTC [policies] Evaluate -> DEBU 2f20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:28.813 UTC [policies] Evaluate -> DEBU 2f21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:28.813 UTC [policies] Evaluate -> DEBU 2f22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:28.814 UTC [cauthdsl] func1 -> DEBU 2f23 0xc004289340 gate 1556760688814025400 evaluation starts" -"2019-05-02 01:31:28.814 UTC [cauthdsl] func2 -> DEBU 2f24 0xc004289340 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:28.814 UTC [cauthdsl] func2 -> DEBU 2f25 0xc004289340 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:28.815 UTC [cauthdsl] func2 -> DEBU 2f26 0xc004289340 principal matched by identity 0" -"2019-05-02 01:31:28.816 UTC [msp.identity] Verify -> DEBU 2f27 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:28.816 UTC [msp.identity] Verify -> DEBU 2f28 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:28.817 UTC [cauthdsl] func2 -> DEBU 2f29 0xc004289340 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:28.817 UTC [cauthdsl] func1 -> DEBU 2f2a 0xc004289340 gate 1556760688814025400 evaluation succeeds" -"2019-05-02 01:31:28.817 UTC [policies] Evaluate -> DEBU 2f2b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.818 UTC [policies] Evaluate -> DEBU 2f2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.818 UTC [policies] Evaluate -> DEBU 2f2d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:28.818 UTC [policies] Evaluate -> DEBU 2f2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:28.819 UTC [msp.identity] Verify -> DEBU 2f2f Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:28.819 UTC [msp.identity] Verify -> DEBU 2f30 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:28.819 UTC [msp.identity] Verify -> DEBU 2f31 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:28.819 UTC [msp.identity] Verify -> DEBU 2f32 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:28.820 UTC [msp] DeserializeIdentity -> DEBU 2f33 Obtaining identity" -"2019-05-02 01:31:28.820 UTC [msp] DeserializeIdentity -> DEBU 2f34 Obtaining identity" -"2019-05-02 01:31:28.821 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f35 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:28.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f36 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f37 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.821 UTC [policies] Evaluate -> DEBU 2f38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:28.821 UTC [gossip.comm] func1 -> DEBU 2f39 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.821 UTC [policies] Evaluate -> DEBU 2f3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:28.822 UTC [policies] Evaluate -> DEBU 2f3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:28.822 UTC [cauthdsl] func1 -> DEBU 2f3c 0xc0002b5950 gate 1556760688822228700 evaluation starts" -"2019-05-02 01:31:28.822 UTC [cauthdsl] func2 -> DEBU 2f3d 0xc0002b5950 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:28.822 UTC [cauthdsl] func2 -> DEBU 2f3e 0xc0002b5950 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:28.822 UTC [cauthdsl] func2 -> DEBU 2f3f 0xc0002b5950 principal matched by identity 0" -"2019-05-02 01:31:28.823 UTC [msp.identity] Verify -> DEBU 2f40 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:28.823 UTC [msp.identity] Verify -> DEBU 2f41 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:28.824 UTC [cauthdsl] func2 -> DEBU 2f42 0xc0002b5950 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:28.824 UTC [cauthdsl] func1 -> DEBU 2f43 0xc0002b5950 gate 1556760688822228700 evaluation succeeds" -"2019-05-02 01:31:28.824 UTC [policies] Evaluate -> DEBU 2f44 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.825 UTC [policies] Evaluate -> DEBU 2f45 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.825 UTC [policies] Evaluate -> DEBU 2f46 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:28.825 UTC [policies] Evaluate -> DEBU 2f47 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:28.826 UTC [gossip.gossip] handleMessage -> DEBU 2f48 Exiting" -"2019-05-02 01:31:28.826 UTC [gossip.gossip] handleMessage -> DEBU 2f49 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.826 UTC [gossip.gossip] handleMessage -> DEBU 2f4a Exiting" -"2019-05-02 01:31:28.826 UTC [gossip.gossip] handleMessage -> DEBU 2f4b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.827 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.827 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f4d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:28.827 UTC [msp] DeserializeIdentity -> DEBU 2f4f Obtaining identity" -"2019-05-02 01:31:28.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f50 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:28.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f51 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.828 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f52 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.828 UTC [policies] Evaluate -> DEBU 2f53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:28.827 UTC [gossip.comm] func1 -> DEBU 2f4e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.828 UTC [policies] Evaluate -> DEBU 2f54 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:28.828 UTC [policies] Evaluate -> DEBU 2f55 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:28.828 UTC [cauthdsl] func1 -> DEBU 2f56 0xc002101750 gate 1556760688828809400 evaluation starts" -"2019-05-02 01:31:28.828 UTC [cauthdsl] func2 -> DEBU 2f57 0xc002101750 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:28.829 UTC [cauthdsl] func2 -> DEBU 2f58 0xc002101750 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:28.829 UTC [cauthdsl] func2 -> DEBU 2f59 0xc002101750 principal matched by identity 0" -"2019-05-02 01:31:28.829 UTC [msp.identity] Verify -> DEBU 2f5a Verify: digest = 00000000 35 9d 41 0c b8 45 40 24 0e 3f ce a1 5f 1d 88 c3 |5.A..E@$.?.._...| -00000010 a9 4f d8 2e a2 59 ef 10 4e b9 73 1d ae be 08 6b |.O...Y..N.s....k|" -"2019-05-02 01:31:28.829 UTC [msp.identity] Verify -> DEBU 2f5b Verify: sig = 00000000 30 44 02 20 30 43 d1 53 84 58 15 99 84 cc f6 4f |0D. 0C.S.X.....O| -00000010 a6 ac e7 50 22 61 3d 1b fc 58 5b be df 9c 95 da |...P"a=..X[.....| -00000020 26 cb 0f 06 02 20 45 18 ed 08 a7 7a 2a 8b ea 10 |&.... E....z*...| -00000030 98 e2 3a 7c 05 33 37 aa 90 9d 0d 69 f2 b7 27 57 |..:|.37....i..'W| -00000040 c1 bc 90 6b 13 61 |...k.a|" -"2019-05-02 01:31:28.829 UTC [cauthdsl] func2 -> DEBU 2f5c 0xc002101750 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:28.829 UTC [cauthdsl] func1 -> DEBU 2f5d 0xc002101750 gate 1556760688828809400 evaluation succeeds" -"2019-05-02 01:31:28.830 UTC [policies] Evaluate -> DEBU 2f5e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.830 UTC [policies] Evaluate -> DEBU 2f5f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.831 UTC [policies] Evaluate -> DEBU 2f60 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:28.831 UTC [policies] Evaluate -> DEBU 2f61 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:28.831 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f62 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.832 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f63 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:28.832 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f64 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 " -"2019-05-02 01:31:28.833 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f65 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 " -"2019-05-02 01:31:28.833 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f66 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:28.833 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f67 Exiting" -"2019-05-02 01:31:28.834 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f68 Exiting" -"2019-05-02 01:31:28.834 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f69 Exiting" -"2019-05-02 01:31:28.834 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.834 UTC [gossip.gossip] handleMessage -> DEBU 2f6b Exiting" -"2019-05-02 01:31:28.835 UTC [gossip.gossip] handleMessage -> DEBU 2f6d Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.835 UTC [msp] DeserializeIdentity -> DEBU 2f6e Obtaining identity" -"2019-05-02 01:31:28.835 UTC [msp] DeserializeIdentity -> DEBU 2f6f Obtaining identity" -"2019-05-02 01:31:28.835 UTC [msp] DeserializeIdentity -> DEBU 2f70 Obtaining identity" -"2019-05-02 01:31:28.835 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f71 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:28.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f72 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f73 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.835 UTC [policies] Evaluate -> DEBU 2f74 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:28.835 UTC [policies] Evaluate -> DEBU 2f75 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:28.835 UTC [policies] Evaluate -> DEBU 2f76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:28.835 UTC [cauthdsl] func1 -> DEBU 2f77 0xc002c5c230 gate 1556760688835741800 evaluation starts" -"2019-05-02 01:31:28.835 UTC [cauthdsl] func2 -> DEBU 2f78 0xc002c5c230 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:28.835 UTC [cauthdsl] func2 -> DEBU 2f79 0xc002c5c230 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:28.835 UTC [cauthdsl] func2 -> DEBU 2f7a 0xc002c5c230 principal matched by identity 0" -"2019-05-02 01:31:28.835 UTC [msp.identity] Verify -> DEBU 2f7b Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:28.835 UTC [msp.identity] Verify -> DEBU 2f7c Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:28.836 UTC [cauthdsl] func2 -> DEBU 2f7d 0xc002c5c230 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:28.836 UTC [cauthdsl] func1 -> DEBU 2f7e 0xc002c5c230 gate 1556760688835741800 evaluation succeeds" -"2019-05-02 01:31:28.836 UTC [policies] Evaluate -> DEBU 2f7f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.836 UTC [policies] Evaluate -> DEBU 2f80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.836 UTC [policies] Evaluate -> DEBU 2f81 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:28.836 UTC [policies] Evaluate -> DEBU 2f82 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:28.836 UTC [msp.identity] Verify -> DEBU 2f83 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:28.836 UTC [msp.identity] Verify -> DEBU 2f84 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:28.839 UTC [msp.identity] Verify -> DEBU 2f85 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:28.839 UTC [msp.identity] Verify -> DEBU 2f86 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:28.854 UTC [msp] DeserializeIdentity -> DEBU 2f87 Obtaining identity" -"2019-05-02 01:31:28.854 UTC [msp] DeserializeIdentity -> DEBU 2f88 Obtaining identity" -"2019-05-02 01:31:28.854 UTC [msp] DeserializeIdentity -> DEBU 2f89 Obtaining identity" -"2019-05-02 01:31:28.854 UTC [msp] DeserializeIdentity -> DEBU 2f8a Obtaining identity" -"2019-05-02 01:31:28.854 UTC [msp] DeserializeIdentity -> DEBU 2f8b Obtaining identity" -"2019-05-02 01:31:28.855 UTC [msp] DeserializeIdentity -> DEBU 2f8c Obtaining identity" -"2019-05-02 01:31:28.855 UTC [msp] DeserializeIdentity -> DEBU 2f8d Obtaining identity" -"2019-05-02 01:31:28.855 UTC [gossip.comm] Send -> DEBU 2f8e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:28.855 UTC [msp] DeserializeIdentity -> DEBU 2f8f Obtaining identity" -"2019-05-02 01:31:28.855 UTC [msp] DeserializeIdentity -> DEBU 2f90 Obtaining identity" -"2019-05-02 01:31:28.855 UTC [gossip.comm] Send -> DEBU 2f91 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:28.834 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6c Exiting" -"2019-05-02 01:31:28.856 UTC [gossip.comm] func1 -> DEBU 2f92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.840 UTC [msp] DeserializeIdentity -> DEBU 2f93 Obtaining identity" -"2019-05-02 01:31:28.857 UTC [msp] DeserializeIdentity -> DEBU 2f94 Obtaining identity" -"2019-05-02 01:31:28.862 UTC [gossip.comm] sendToEndpoint -> DEBU 2f95 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.862 UTC [gossip.comm] sendToEndpoint -> DEBU 2f96 Exiting" -"2019-05-02 01:31:28.864 UTC [gossip.comm] sendToEndpoint -> DEBU 2f97 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.864 UTC [gossip.comm] sendToEndpoint -> DEBU 2f98 Exiting" -"2019-05-02 01:31:28.861 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f99 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:28.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f9a Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f9b Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:28.867 UTC [policies] Evaluate -> DEBU 2f9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:28.867 UTC [policies] Evaluate -> DEBU 2f9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:28.867 UTC [policies] Evaluate -> DEBU 2f9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:28.867 UTC [cauthdsl] func1 -> DEBU 2f9f 0xc00315e6a0 gate 1556760688867888900 evaluation starts" -"2019-05-02 01:31:28.867 UTC [cauthdsl] func2 -> DEBU 2fa0 0xc00315e6a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:28.868 UTC [cauthdsl] func2 -> DEBU 2fa1 0xc00315e6a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:28.868 UTC [cauthdsl] func2 -> DEBU 2fa2 0xc00315e6a0 principal matched by identity 0" -"2019-05-02 01:31:28.868 UTC [msp.identity] Verify -> DEBU 2fa3 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:28.868 UTC [msp.identity] Verify -> DEBU 2fa4 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:28.868 UTC [cauthdsl] func2 -> DEBU 2fa5 0xc00315e6a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:28.868 UTC [cauthdsl] func1 -> DEBU 2fa6 0xc00315e6a0 gate 1556760688867888900 evaluation succeeds" -"2019-05-02 01:31:28.868 UTC [policies] Evaluate -> DEBU 2fa7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.869 UTC [policies] Evaluate -> DEBU 2fa8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:28.869 UTC [policies] Evaluate -> DEBU 2fa9 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:28.869 UTC [policies] Evaluate -> DEBU 2faa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:28.869 UTC [gossip.gossip] handleMessage -> DEBU 2fab Exiting" -"2019-05-02 01:31:28.871 UTC [gossip.gossip] handleMessage -> DEBU 2fac Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.871 UTC [gossip.gossip] handleMessage -> DEBU 2fad Exiting" -"2019-05-02 01:31:28.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:28.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2faf Exiting" -"2019-05-02 01:31:28.910 UTC [msp] DeserializeIdentity -> DEBU 2fb0 Obtaining identity" -"2019-05-02 01:31:28.911 UTC [msp] DeserializeIdentity -> DEBU 2fb1 Obtaining identity" -"2019-05-02 01:31:28.911 UTC [gossip.pull] Hello -> DEBU 2fb2 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:28.911 UTC [msp] DeserializeIdentity -> DEBU 2fb3 Obtaining identity" -"2019-05-02 01:31:28.911 UTC [msp] DeserializeIdentity -> DEBU 2fb4 Obtaining identity" -"2019-05-02 01:31:28.911 UTC [gossip.comm] Send -> DEBU 2fb5 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:28.911 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.912 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb7 Exiting" -"2019-05-02 01:31:28.919 UTC [gossip.gossip] handleMessage -> DEBU 2fb8 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13619195538211538949 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.919 UTC [gossip.pull] HandleMessage -> DEBU 2fb9 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13619195538211538949 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes" -"2019-05-02 01:31:28.919 UTC [gossip.gossip] handleMessage -> DEBU 2fba Exiting" -"2019-05-02 01:31:29.054 UTC [gossip.gossip] handleMessage -> DEBU 2fbb Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.055 UTC [msp] DeserializeIdentity -> DEBU 2fbc Obtaining identity" -"2019-05-02 01:31:29.055 UTC [msp] DeserializeIdentity -> DEBU 2fbd Obtaining identity" -"2019-05-02 01:31:29.056 UTC [gossip.gossip] handleMessage -> DEBU 2fbe Exiting" -"2019-05-02 01:31:29.087 UTC [gossip.gossip] handleMessage -> DEBU 2fbf Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.092 UTC [gossip.pull] HandleMessage -> DEBU 2fc0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.092 UTC [gossip.pull] SendDigest -> DEBU 2fc1 Sending BLOCK_MSG digest: [3 4 5 6 7 8 1 2] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:29.093 UTC [gossip.gossip] handleMessage -> DEBU 2fc2 Exiting" -"2019-05-02 01:31:29.287 UTC [gossip.comm] func1 -> DEBU 2fc3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.287 UTC [gossip.gossip] handleMessage -> DEBU 2fc4 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.287 UTC [msp] DeserializeIdentity -> DEBU 2fc5 Obtaining identity" -"2019-05-02 01:31:29.287 UTC [msp] DeserializeIdentity -> DEBU 2fc6 Obtaining identity" -"2019-05-02 01:31:29.288 UTC [msp] DeserializeIdentity -> DEBU 2fc7 Obtaining identity" -"2019-05-02 01:31:29.289 UTC [gossip.gossip] handleMessage -> DEBU 2fc8 Exiting" -"2019-05-02 01:31:29.396 UTC [gossip.gossip] handleMessage -> DEBU 2fc9 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.396 UTC [gossip.pull] HandleMessage -> DEBU 2fca GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.396 UTC [gossip.pull] SendDigest -> DEBU 2fcb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:29.398 UTC [gossip.gossip] handleMessage -> DEBU 2fcc Exiting" -"2019-05-02 01:31:29.412 UTC [gossip.gossip] handleMessage -> DEBU 2fcd Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.412 UTC [gossip.gossip] handleMessage -> DEBU 2fce Exiting" -"2019-05-02 01:31:29.412 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.412 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fd0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:29.413 UTC [msp.identity] Verify -> DEBU 2fd1 Verify: digest = 00000000 c0 4b 1c fb 23 85 f5 10 2f 2d 51 21 8c e6 78 10 |.K..#.../-Q!..x.| -00000010 92 c9 a9 dd be 61 e3 bf 8c eb f5 c5 ef 9b b2 2e |.....a..........|" -"2019-05-02 01:31:29.413 UTC [msp.identity] Verify -> DEBU 2fd2 Verify: sig = 00000000 30 45 02 21 00 fc 84 b7 78 2c fc dd 1f 45 fb 3f |0E.!....x,...E.?| -00000010 59 4e 1c cc 60 7f dc f9 d0 98 03 c1 1d 34 d3 6e |YN..`........4.n| -00000020 92 41 6c 64 64 02 20 20 75 18 f3 b4 a7 03 91 e3 |.Aldd. u.......| -00000030 ed dd 58 67 68 a3 80 0c 73 3a 79 ad 0f fb dd c8 |..Xgh...s:y.....| -00000040 3c 32 2e 79 fc 64 cd |<2.y.d.|" -"2019-05-02 01:31:29.414 UTC [msp.identity] Verify -> DEBU 2fd3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:29.415 UTC [msp.identity] Verify -> DEBU 2fd4 Verify: sig = 00000000 30 44 02 20 7b 07 e8 d0 cd 9e f3 d5 e5 a6 f5 4e |0D. {..........N| -00000010 6b 21 67 05 5a 2a b3 b5 44 24 c4 50 76 5b c8 6b |k!g.Z*..D$.Pv[.k| -00000020 b0 5b 0a 49 02 20 60 45 1e b9 71 ab 93 71 19 ce |.[.I. `E..q..q..| -00000030 da 07 a9 8e b1 d6 20 8b 44 6f c4 57 ee 06 83 a0 |...... .Do.W....| -00000040 10 45 10 7e d2 44 |.E.~.D|" -"2019-05-02 01:31:29.415 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fd5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:29.416 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fd6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:31:29.416 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fd7 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 " -"2019-05-02 01:31:29.416 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fd8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 " -"2019-05-02 01:31:29.417 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fd9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:29.417 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fda Exiting" -"2019-05-02 01:31:29.421 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fdb Exiting" -"2019-05-02 01:31:29.421 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fdc Exiting" -"2019-05-02 01:31:29.421 UTC [gossip.discovery] sendMemResponse -> DEBU 2fdd Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:29.421 UTC [msp] DeserializeIdentity -> DEBU 2fde Obtaining identity" -"2019-05-02 01:31:29.427 UTC [msp] DeserializeIdentity -> DEBU 2fdf Obtaining identity" -"2019-05-02 01:31:29.428 UTC [gossip.comm] Send -> DEBU 2fe0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:29.428 UTC [gossip.discovery] sendMemResponse -> DEBU 2fe1 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:29.428 UTC [gossip.comm] sendToEndpoint -> DEBU 2fe2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.429 UTC [gossip.comm] sendToEndpoint -> DEBU 2fe3 Exiting" -"2019-05-02 01:31:29.482 UTC [gossip.comm] func1 -> DEBU 2fe4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.482 UTC [gossip.gossip] handleMessage -> DEBU 2fe5 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.482 UTC [gossip.pull] HandleMessage -> DEBU 2fe6 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.482 UTC [msp] DeserializeIdentity -> DEBU 2fe7 Obtaining identity" -"2019-05-02 01:31:29.482 UTC [msp] DeserializeIdentity -> DEBU 2fe8 Obtaining identity" -"2019-05-02 01:31:29.482 UTC [msp] DeserializeIdentity -> DEBU 2fe9 Obtaining identity" -"2019-05-02 01:31:29.482 UTC [msp] DeserializeIdentity -> DEBU 2fea Obtaining identity" -"2019-05-02 01:31:29.482 UTC [msp] DeserializeIdentity -> DEBU 2feb Obtaining identity" -"2019-05-02 01:31:29.483 UTC [msp] DeserializeIdentity -> DEBU 2fec Obtaining identity" -"2019-05-02 01:31:29.483 UTC [gossip.pull] SendDigest -> DEBU 2fed Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:29.483 UTC [gossip.gossip] handleMessage -> DEBU 2fee Exiting" -"2019-05-02 01:31:29.522 UTC [gossip.comm] func1 -> DEBU 2fef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.522 UTC [gossip.gossip] handleMessage -> DEBU 2ff0 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.522 UTC [gossip.gossip] handleMessage -> DEBU 2ff1 Exiting" -"2019-05-02 01:31:29.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ff2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.522 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ff3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:29.522 UTC [msp] DeserializeIdentity -> DEBU 2ff4 Obtaining identity" -"2019-05-02 01:31:29.522 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ff5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:29.522 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ff6 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:29.522 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ff7 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:29.522 UTC [policies] Evaluate -> DEBU 2ff8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:29.522 UTC [policies] Evaluate -> DEBU 2ff9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:29.522 UTC [policies] Evaluate -> DEBU 2ffa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:29.522 UTC [cauthdsl] func1 -> DEBU 2ffb 0xc003dbc840 gate 1556760689522769700 evaluation starts" -"2019-05-02 01:31:29.522 UTC [cauthdsl] func2 -> DEBU 2ffc 0xc003dbc840 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:29.522 UTC [cauthdsl] func2 -> DEBU 2ffd 0xc003dbc840 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:29.522 UTC [cauthdsl] func2 -> DEBU 2ffe 0xc003dbc840 principal matched by identity 0" -"2019-05-02 01:31:29.522 UTC [msp.identity] Verify -> DEBU 2fff Verify: digest = 00000000 78 51 d8 3a 1e 30 1a cb 8b 90 7e a0 58 6f 3d 19 |xQ.:.0....~.Xo=.| -00000010 b2 ea 9f 8c 37 eb 6d ad dd 6e 0e 41 a0 04 1b 9c |....7.m..n.A....|" -"2019-05-02 01:31:29.522 UTC [msp.identity] Verify -> DEBU 3000 Verify: sig = 00000000 30 45 02 21 00 bf 26 74 e0 a7 c5 18 d5 50 9c 79 |0E.!..&t.....P.y| -00000010 1f e0 0a 78 7a e7 6c 42 52 66 2e f8 d6 95 f1 e1 |...xz.lBRf......| -00000020 a0 90 fc 56 67 02 20 01 82 a9 5c 1f 55 e2 5a 59 |...Vg. ...\.U.ZY| -00000030 73 03 74 06 ab 3f ae 34 b1 7e 5e 5d c6 22 ee eb |s.t..?.4.~^]."..| -00000040 73 79 71 e4 22 0e 8d |syq."..|" -"2019-05-02 01:31:29.523 UTC [cauthdsl] func2 -> DEBU 3001 0xc003dbc840 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:29.523 UTC [cauthdsl] func1 -> DEBU 3002 0xc003dbc840 gate 1556760689522769700 evaluation succeeds" -"2019-05-02 01:31:29.523 UTC [policies] Evaluate -> DEBU 3003 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:29.523 UTC [policies] Evaluate -> DEBU 3004 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:29.523 UTC [policies] Evaluate -> DEBU 3005 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:29.523 UTC [policies] Evaluate -> DEBU 3006 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:29.523 UTC [gossip.discovery] handleAliveMessage -> DEBU 3007 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:29.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 3008 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:29.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 3009 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 " -"2019-05-02 01:31:29.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 300a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 " -"2019-05-02 01:31:29.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 300b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:29.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 300c Exiting" -"2019-05-02 01:31:29.523 UTC [gossip.discovery] handleAliveMessage -> DEBU 300d Exiting" -"2019-05-02 01:31:29.523 UTC [gossip.discovery] handleMsgFromComm -> DEBU 300e Exiting" -"2019-05-02 01:31:29.524 UTC [gossip.discovery] sendMemResponse -> DEBU 300f Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:29.524 UTC [msp] DeserializeIdentity -> DEBU 3010 Obtaining identity" -"2019-05-02 01:31:29.524 UTC [msp] DeserializeIdentity -> DEBU 3011 Obtaining identity" -"2019-05-02 01:31:29.526 UTC [msp] DeserializeIdentity -> DEBU 3012 Obtaining identity" -"2019-05-02 01:31:29.536 UTC [gossip.comm] Send -> DEBU 3013 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:29.536 UTC [gossip.discovery] sendMemResponse -> DEBU 3014 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:29.536 UTC [gossip.comm] sendToEndpoint -> DEBU 3015 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.536 UTC [gossip.comm] sendToEndpoint -> DEBU 3016 Exiting" -"2019-05-02 01:31:29.538 UTC [gossip.comm] func1 -> DEBU 3017 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.538 UTC [gossip.gossip] handleMessage -> DEBU 3018 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.538 UTC [msp] DeserializeIdentity -> DEBU 3019 Obtaining identity" -"2019-05-02 01:31:29.538 UTC [msp] DeserializeIdentity -> DEBU 301a Obtaining identity" -"2019-05-02 01:31:29.539 UTC [msp] DeserializeIdentity -> DEBU 301b Obtaining identity" -"2019-05-02 01:31:29.539 UTC [gossip.gossip] handleMessage -> DEBU 301c Exiting" -"2019-05-02 01:31:29.708 UTC [gossip.comm] func1 -> DEBU 301d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.709 UTC [gossip.gossip] handleMessage -> DEBU 301e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.711 UTC [gossip.pull] HandleMessage -> DEBU 301f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.712 UTC [msp] DeserializeIdentity -> DEBU 3020 Obtaining identity" -"2019-05-02 01:31:29.712 UTC [msp] DeserializeIdentity -> DEBU 3021 Obtaining identity" -"2019-05-02 01:31:29.713 UTC [msp] DeserializeIdentity -> DEBU 3022 Obtaining identity" -"2019-05-02 01:31:29.714 UTC [msp] DeserializeIdentity -> DEBU 3023 Obtaining identity" -"2019-05-02 01:31:29.715 UTC [msp] DeserializeIdentity -> DEBU 3024 Obtaining identity" -"2019-05-02 01:31:29.715 UTC [msp] DeserializeIdentity -> DEBU 3025 Obtaining identity" -"2019-05-02 01:31:29.716 UTC [gossip.pull] SendDigest -> DEBU 3026 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:29.716 UTC [gossip.gossip] handleMessage -> DEBU 3027 Exiting" -"2019-05-02 01:31:29.803 UTC [gossip.pull] Hello -> DEBU 3028 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:29.804 UTC [gossip.comm] Send -> DEBU 3029 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:29.804 UTC [gossip.pull] Hello -> DEBU 302a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:29.804 UTC [gossip.comm] Send -> DEBU 302b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:29.805 UTC [gossip.pull] Hello -> DEBU 302c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:29.805 UTC [gossip.comm] Send -> DEBU 302d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:29.807 UTC [gossip.comm] sendToEndpoint -> DEBU 302e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.807 UTC [gossip.comm] sendToEndpoint -> DEBU 302f Exiting" -"2019-05-02 01:31:29.811 UTC [gossip.comm] sendToEndpoint -> DEBU 3030 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.811 UTC [gossip.comm] sendToEndpoint -> DEBU 3031 Exiting" -"2019-05-02 01:31:29.813 UTC [gossip.comm] sendToEndpoint -> DEBU 3032 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.813 UTC [gossip.comm] sendToEndpoint -> DEBU 3033 Exiting" -"2019-05-02 01:31:29.817 UTC [gossip.comm] func1 -> DEBU 3034 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10806421602508115866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.817 UTC [gossip.gossip] handleMessage -> DEBU 3035 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13759576198104303997 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.818 UTC [gossip.pull] HandleMessage -> DEBU 3036 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13759576198104303997 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.818 UTC [gossip.gossip] handleMessage -> DEBU 3037 Exiting" -"2019-05-02 01:31:29.818 UTC [gossip.gossip] handleMessage -> DEBU 3038 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10806421602508115866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.819 UTC [gossip.pull] HandleMessage -> DEBU 3039 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10806421602508115866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.822 UTC [gossip.gossip] handleMessage -> DEBU 303a Exiting" -"2019-05-02 01:31:29.824 UTC [gossip.comm] func1 -> DEBU 303b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17858937335778240002 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.824 UTC [gossip.gossip] handleMessage -> DEBU 303c Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17858937335778240002 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.824 UTC [gossip.pull] HandleMessage -> DEBU 303d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17858937335778240002 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.825 UTC [gossip.gossip] handleMessage -> DEBU 303e Exiting" -"2019-05-02 01:31:29.870 UTC [gossip.comm] func1 -> DEBU 303f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.870 UTC [gossip.gossip] handleMessage -> DEBU 3040 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.871 UTC [gossip.gossip] handleMessage -> DEBU 3041 Exiting" -"2019-05-02 01:31:29.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3042 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.871 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3043 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:29.872 UTC [msp] DeserializeIdentity -> DEBU 3044 Obtaining identity" -"2019-05-02 01:31:29.873 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3045 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:29.873 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3046 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:29.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3047 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:29.874 UTC [policies] Evaluate -> DEBU 3048 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:29.874 UTC [policies] Evaluate -> DEBU 3049 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:29.874 UTC [policies] Evaluate -> DEBU 304a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:29.874 UTC [cauthdsl] func1 -> DEBU 304b 0xc0031c6d40 gate 1556760689874831600 evaluation starts" -"2019-05-02 01:31:29.874 UTC [cauthdsl] func2 -> DEBU 304c 0xc0031c6d40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:29.875 UTC [cauthdsl] func2 -> DEBU 304d 0xc0031c6d40 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:29.875 UTC [cauthdsl] func2 -> DEBU 304e 0xc0031c6d40 principal matched by identity 0" -"2019-05-02 01:31:29.875 UTC [msp.identity] Verify -> DEBU 304f Verify: digest = 00000000 01 24 f0 60 c8 80 ba 3e f2 96 ea 53 e3 77 57 11 |.$.`...>...S.wW.| -00000010 c6 77 c0 14 ba 7f 2c e7 fc da 9a ac 30 a3 ed e5 |.w....,.....0...|" -"2019-05-02 01:31:29.875 UTC [msp.identity] Verify -> DEBU 3050 Verify: sig = 00000000 30 45 02 21 00 ec 13 3e 3f e2 4c 73 52 66 95 35 |0E.!...>?.LsRf.5| -00000010 fe 9c d4 6c 06 49 15 5d 8a 8b 37 46 8e c9 e9 aa |...l.I.]..7F....| -00000020 b8 dd 3d 3f 7f 02 20 45 f0 24 0a bd 29 3b db 53 |..=?.. E.$..);.S| -00000030 4d 54 09 4a 78 85 dd f3 87 be 40 a1 b3 61 64 ea |MT.Jx.....@..ad.| -00000040 f3 71 d1 f2 5d b5 df |.q..]..|" -"2019-05-02 01:31:29.875 UTC [cauthdsl] func2 -> DEBU 3051 0xc0031c6d40 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:29.876 UTC [cauthdsl] func1 -> DEBU 3052 0xc0031c6d40 gate 1556760689874831600 evaluation succeeds" -"2019-05-02 01:31:29.876 UTC [policies] Evaluate -> DEBU 3053 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:29.876 UTC [policies] Evaluate -> DEBU 3054 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:29.876 UTC [policies] Evaluate -> DEBU 3055 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:29.876 UTC [policies] Evaluate -> DEBU 3056 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:29.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 3057 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:29.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 3058 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:29.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 3059 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 " -"2019-05-02 01:31:29.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 305a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 " -"2019-05-02 01:31:29.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 305b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:29.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 305c Exiting" -"2019-05-02 01:31:29.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 305d Exiting" -"2019-05-02 01:31:29.877 UTC [gossip.discovery] handleMsgFromComm -> DEBU 305e Exiting" -"2019-05-02 01:31:29.877 UTC [gossip.discovery] sendMemResponse -> DEBU 305f Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:29.878 UTC [msp] DeserializeIdentity -> DEBU 3060 Obtaining identity" -"2019-05-02 01:31:29.878 UTC [msp] DeserializeIdentity -> DEBU 3061 Obtaining identity" -"2019-05-02 01:31:29.878 UTC [msp] DeserializeIdentity -> DEBU 3062 Obtaining identity" -"2019-05-02 01:31:29.878 UTC [gossip.comm] Send -> DEBU 3063 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:29.878 UTC [gossip.discovery] sendMemResponse -> DEBU 3064 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:29.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3065 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-05-02 01:31:29.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3066 Exiting" -"2019-05-02 01:31:30.147 UTC [msp.identity] Sign -> DEBU 3067 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151023 " -"2019-05-02 01:31:30.147 UTC [msp.identity] Sign -> DEBU 3068 Sign: digest: B7F2303B55FBF805F25A8369888F5E2ECAAA585A790C2086EE59906B9E679C70 " -"2019-05-02 01:31:30.147 UTC [msp.identity] Sign -> DEBU 3069 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:30.148 UTC [msp.identity] Sign -> DEBU 306a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:30.148 UTC [gossip.comm] Send -> DEBU 306b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:30.148 UTC [msp] DeserializeIdentity -> DEBU 306c Obtaining identity" -"2019-05-02 01:31:30.148 UTC [gossip.comm] Send -> DEBU 306d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:30.149 UTC [gossip.comm] sendToEndpoint -> DEBU 306e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.149 UTC [msp] DeserializeIdentity -> DEBU 306f Obtaining identity" -"2019-05-02 01:31:30.149 UTC [gossip.comm] sendToEndpoint -> DEBU 3070 Exiting" -"2019-05-02 01:31:30.149 UTC [gossip.comm] Send -> DEBU 3071 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:30.150 UTC [gossip.comm] sendToEndpoint -> DEBU 3072 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.150 UTC [gossip.comm] sendToEndpoint -> DEBU 3073 Exiting" -"2019-05-02 01:31:30.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3074 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3075 Exiting" -"2019-05-02 01:31:30.156 UTC [gossip.comm] func1 -> DEBU 3076 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.156 UTC [gossip.gossip] handleMessage -> DEBU 3077 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.156 UTC [gossip.gossip] handleMessage -> DEBU 3078 Exiting" -"2019-05-02 01:31:30.156 UTC [gossip.gossip] handleMessage -> DEBU 3079 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 307a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.157 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 307b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:30.158 UTC [msp.identity] Verify -> DEBU 307c Verify: digest = 00000000 b7 f2 30 3b 55 fb f8 05 f2 5a 83 69 88 8f 5e 2e |..0;U....Z.i..^.| -00000010 ca aa 58 5a 79 0c 20 86 ee 59 90 6b 9e 67 9c 70 |..XZy. ..Y.k.g.p|" -"2019-05-02 01:31:30.158 UTC [msp.identity] Verify -> DEBU 307d Verify: sig = 00000000 30 45 02 21 00 ac f4 43 76 3e 8a 65 77 ac 30 12 |0E.!...Cv>.ew.0.| -00000010 89 48 66 36 51 b5 3b 32 56 6f 26 cb 41 34 03 a2 |.Hf6Q.;2Vo&.A4..| -00000020 f2 9a bd 85 88 02 20 11 67 c1 ff 1f 6d 7f f7 05 |...... .g...m...| -00000030 49 92 50 a6 25 3c b1 43 4f 28 80 0b 24 00 21 03 |I.P.%<.CO(..$.!.| -00000040 0e 44 fd 62 f8 52 5c |.D.b.R\|" -"2019-05-02 01:31:30.159 UTC [msp.identity] Verify -> DEBU 307e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:27:59.099 UTC [msp.identity] Verify -> DEBU 2f5d Verify: sig = 00000000 30 44 02 20 1d c0 36 96 a4 a3 ce 74 17 fa eb 16 |0D. ..6....t....| +00000010 b1 03 16 20 58 69 f1 2a a5 1b 3f 19 41 f2 56 17 |... Xi.*..?.A.V.| +00000020 72 c6 c2 1c 02 20 42 19 6f 02 2c 47 fe 39 ae 7b |r.... B.o.,G.9.{| +00000030 fe 7f b3 f5 03 01 16 cc 3f ec 36 7b e5 70 a9 b9 |........?.6{.p..| +00000040 43 38 88 fb f4 1f |C8....|" +"2019-05-02 09:27:59.100 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f5e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f60 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 " +"2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f61 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 " +"2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f62 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:27:59.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f63 Exiting" +"2019-05-02 09:27:59.100 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f64 Exiting" +"2019-05-02 09:27:59.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f65 Exiting" +"2019-05-02 09:27:59.103 UTC [gossip.comm] func1 -> DEBU 2f66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:59.104 UTC [gossip.gossip] handleMessage -> DEBU 2f67 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:59.104 UTC [gossip.gossip] handleMessage -> DEBU 2f68 Exiting" +"2019-05-02 09:27:59.105 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:59.105 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6a Exiting" +"2019-05-02 09:27:59.106 UTC [msp] DeserializeIdentity -> DEBU 2f6b Obtaining identity" +"2019-05-02 09:27:59.107 UTC [msp] DeserializeIdentity -> DEBU 2f6c Obtaining identity" +"2019-05-02 09:27:59.107 UTC [gossip.gossip] handleMessage -> DEBU 2f6d Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:59.107 UTC [gossip.gossip] handleMessage -> DEBU 2f6e Exiting" +"2019-05-02 09:27:59.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:59.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f70 Exiting" +"2019-05-02 09:27:59.108 UTC [msp] DeserializeIdentity -> DEBU 2f71 Obtaining identity" +"2019-05-02 09:27:59.108 UTC [gossip.comm] Send -> DEBU 2f72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:59.108 UTC [msp] DeserializeIdentity -> DEBU 2f73 Obtaining identity" +"2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f74 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f75 Exiting" +"2019-05-02 09:27:59.109 UTC [gossip.comm] Send -> DEBU 2f76 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f77 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:27:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 2f78 Exiting" +"2019-05-02 09:27:59.164 UTC [gossip.gossip] handleMessage -> DEBU 2f79 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:59.164 UTC [gossip.gossip] handleMessage -> DEBU 2f7a Exiting" +"2019-05-02 09:27:59.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:59.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f7c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:27:59.166 UTC [msp] DeserializeIdentity -> DEBU 2f7d Obtaining identity" +"2019-05-02 09:27:59.166 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:27:59.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f7f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:59.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f80 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:27:59.166 UTC [policies] Evaluate -> DEBU 2f81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:27:59.166 UTC [policies] Evaluate -> DEBU 2f82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:27:59.166 UTC [policies] Evaluate -> DEBU 2f83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:27:59.167 UTC [cauthdsl] func1 -> DEBU 2f84 0xc0003cfff0 gate 1556789279167003300 evaluation starts" +"2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f85 0xc0003cfff0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f86 0xc0003cfff0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f87 0xc0003cfff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:27:59.167 UTC [cauthdsl] func2 -> DEBU 2f88 0xc0003cfff0 principal evaluation fails" +"2019-05-02 09:27:59.167 UTC [cauthdsl] func1 -> DEBU 2f89 0xc0003cfff0 gate 1556789279167003300 evaluation fails" +"2019-05-02 09:27:59.167 UTC [policies] Evaluate -> DEBU 2f8a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:59.167 UTC [policies] Evaluate -> DEBU 2f8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:27:59.167 UTC [policies] Evaluate -> DEBU 2f8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:27:59.168 UTC [cauthdsl] func1 -> DEBU 2f8d 0xc000259f00 gate 1556789279167854300 evaluation starts" +"2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f8f 0xc000259f00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f90 0xc000259f00 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f91 0xc000259f00 principal matched by identity 0" +"2019-05-02 09:27:59.169 UTC [msp.identity] Verify -> DEBU 2f92 Verify: digest = 00000000 5b 6d 36 c7 b1 e1 9b 57 5e 59 2d 60 43 d2 38 d5 |[m6....W^Y-`C.8.| +00000010 26 40 f4 06 37 57 00 91 0f 3a 6a 5b 4f 9e 32 ed |&@..7W...:j[O.2.|" +"2019-05-02 09:27:59.169 UTC [msp.identity] Verify -> DEBU 2f93 Verify: sig = 00000000 30 44 02 20 00 b3 a1 9b c5 32 0f ce b8 61 e6 6a |0D. .....2...a.j| +00000010 6e cd 9f 39 79 bb ab 5b ad a2 ad 3f f3 8a 47 f1 |n..9y..[...?..G.| +00000020 d5 46 2b cf 02 20 37 e3 65 ad 8f b4 f7 ce b5 d1 |.F+.. 7.e.......| +00000030 a2 e1 44 61 5d 75 5c 5c a7 f9 3a b5 5a 3f da fb |..Da]u\\..:.Z?..| +00000040 fd b3 b5 d9 39 94 |....9.|" +"2019-05-02 09:27:59.169 UTC [cauthdsl] func2 -> DEBU 2f94 0xc000259f00 principal evaluation succeeds for identity 0" +"2019-05-02 09:27:59.169 UTC [cauthdsl] func1 -> DEBU 2f95 0xc000259f00 gate 1556789279167854300 evaluation succeeds" +"2019-05-02 09:27:59.169 UTC [policies] Evaluate -> DEBU 2f96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:59.169 UTC [policies] Evaluate -> DEBU 2f97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:27:59.169 UTC [policies] Evaluate -> DEBU 2f98 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:27:59.170 UTC [policies] Evaluate -> DEBU 2f99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:27:59.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f9a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 " +"2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 " +"2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:27:59.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f9f Exiting" +"2019-05-02 09:27:59.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fa0 Exiting" +"2019-05-02 09:27:59.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa1 Exiting" +"2019-05-02 09:27:59.168 UTC [gossip.comm] func1 -> DEBU 2f8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:59.171 UTC [gossip.gossip] handleMessage -> DEBU 2fa2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:59.171 UTC [gossip.gossip] handleMessage -> DEBU 2fa3 Exiting" +"2019-05-02 09:27:59.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:59.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa5 Exiting" +"2019-05-02 09:27:59.182 UTC [msp] DeserializeIdentity -> DEBU 2fa6 Obtaining identity" +"2019-05-02 09:27:59.183 UTC [msp] DeserializeIdentity -> DEBU 2fa7 Obtaining identity" +"2019-05-02 09:27:59.183 UTC [msp] DeserializeIdentity -> DEBU 2fa8 Obtaining identity" +"2019-05-02 09:27:59.184 UTC [msp] DeserializeIdentity -> DEBU 2fa9 Obtaining identity" +"2019-05-02 09:27:59.185 UTC [msp] DeserializeIdentity -> DEBU 2faa Obtaining identity" +"2019-05-02 09:27:59.185 UTC [msp] DeserializeIdentity -> DEBU 2fab Obtaining identity" +"2019-05-02 09:27:59.186 UTC [gossip.comm] Send -> DEBU 2fac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:59.186 UTC [msp] DeserializeIdentity -> DEBU 2fad Obtaining identity" +"2019-05-02 09:27:59.187 UTC [msp] DeserializeIdentity -> DEBU 2fae Obtaining identity" +"2019-05-02 09:27:59.188 UTC [gossip.comm] Send -> DEBU 2faf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:27:59.188 UTC [gossip.gossip] handleMessage -> DEBU 2fb0 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:59.189 UTC [gossip.gossip] handleMessage -> DEBU 2fb2 Exiting" +"2019-05-02 09:27:59.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:59.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb4 Exiting" +"2019-05-02 09:27:59.188 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:59.189 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb5 Exiting" +"2019-05-02 09:27:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:27:59.191 UTC [gossip.comm] sendToEndpoint -> DEBU 2fb7 Exiting" +"2019-05-02 09:28:00.247 UTC [msp] DeserializeIdentity -> DEBU 2fb8 Obtaining identity" +"2019-05-02 09:28:00.247 UTC [msp] DeserializeIdentity -> DEBU 2fb9 Obtaining identity" +"2019-05-02 09:28:00.247 UTC [gossip.comm] Send -> DEBU 2fba Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:28:00.247 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbc Exiting" +"2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbe Exiting" +"2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fbf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:00.248 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc0 Exiting" +"2019-05-02 09:28:00.251 UTC [gossip.comm] func1 -> DEBU 2fc1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:00.251 UTC [gossip.gossip] handleMessage -> DEBU 2fc2 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:00.251 UTC [msp] DeserializeIdentity -> DEBU 2fc3 Obtaining identity" +"2019-05-02 09:28:00.251 UTC [msp] DeserializeIdentity -> DEBU 2fc4 Obtaining identity" +"2019-05-02 09:28:00.251 UTC [msp] DeserializeIdentity -> DEBU 2fc5 Obtaining identity" +"2019-05-02 09:28:00.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fc6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:00.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fc7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fc8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fc9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fcb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func1 -> DEBU 2fcc 0xc002d965a0 gate 1556789280252279900 evaluation starts" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fcd 0xc002d965a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fce 0xc002d965a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fcf 0xc002d965a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd0 0xc002d965a0 principal evaluation fails" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func1 -> DEBU 2fd1 0xc002d965a0 gate 1556789280252279900 evaluation fails" +"2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fd2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.252 UTC [policies] Evaluate -> DEBU 2fd4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func1 -> DEBU 2fd5 0xc002d96e10 gate 1556789280252630800 evaluation starts" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd6 0xc002d96e10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd7 0xc002d96e10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fd8 0xc002d96e10 principal matched by identity 0" +"2019-05-02 09:28:00.252 UTC [msp.identity] Verify -> DEBU 2fd9 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:28:00.252 UTC [msp.identity] Verify -> DEBU 2fda Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:28:00.252 UTC [cauthdsl] func2 -> DEBU 2fdb 0xc002d96e10 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:00.253 UTC [cauthdsl] func1 -> DEBU 2fdc 0xc002d96e10 gate 1556789280252630800 evaluation succeeds" +"2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fdd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fde == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fdf Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:00.253 UTC [policies] Evaluate -> DEBU 2fe0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe1 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +"2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe2 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +"2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe3 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:28:00.253 UTC [msp.identity] Verify -> DEBU 2fe4 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:28:00.254 UTC [msp] DeserializeIdentity -> DEBU 2fe5 Obtaining identity" +"2019-05-02 09:28:00.254 UTC [msp] DeserializeIdentity -> DEBU 2fe6 Obtaining identity" +"2019-05-02 09:28:00.254 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fe7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:00.254 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.254 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.254 UTC [policies] Evaluate -> DEBU 2fea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:00.265 UTC [policies] Evaluate -> DEBU 2feb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:00.265 UTC [policies] Evaluate -> DEBU 2fec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:00.265 UTC [cauthdsl] func1 -> DEBU 2fed 0xc0025d7590 gate 1556789280265584100 evaluation starts" +"2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2fee 0xc0025d7590 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2fef 0xc0025d7590 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2ff0 0xc0025d7590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:00.265 UTC [cauthdsl] func2 -> DEBU 2ff1 0xc0025d7590 principal evaluation fails" +"2019-05-02 09:28:00.265 UTC [cauthdsl] func1 -> DEBU 2ff2 0xc0025d7590 gate 1556789280265584100 evaluation fails" +"2019-05-02 09:28:00.266 UTC [policies] Evaluate -> DEBU 2ff3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.266 UTC [policies] Evaluate -> DEBU 2ff4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.266 UTC [policies] Evaluate -> DEBU 2ff5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:00.266 UTC [cauthdsl] func1 -> DEBU 2ff6 0xc0025d7dd0 gate 1556789280266231600 evaluation starts" +"2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ff7 0xc0025d7dd0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ff8 0xc0025d7dd0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ff9 0xc0025d7dd0 principal matched by identity 0" +"2019-05-02 09:28:00.266 UTC [msp.identity] Verify -> DEBU 2ffa Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:28:00.266 UTC [msp.identity] Verify -> DEBU 2ffb Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:28:00.266 UTC [cauthdsl] func2 -> DEBU 2ffc 0xc0025d7dd0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:00.267 UTC [cauthdsl] func1 -> DEBU 2ffd 0xc0025d7dd0 gate 1556789280266231600 evaluation succeeds" +"2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 2ffe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 2fff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 3000 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:00.267 UTC [policies] Evaluate -> DEBU 3001 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:00.267 UTC [gossip.gossip] handleMessage -> DEBU 3002 Exiting" +"2019-05-02 09:28:00.267 UTC [gossip.gossip] handleMessage -> DEBU 3003 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3004 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3005 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3006 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +"2019-05-02 09:28:00.267 UTC [msp.identity] Verify -> DEBU 3007 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +"2019-05-02 09:28:00.268 UTC [msp] DeserializeIdentity -> DEBU 3008 Obtaining identity" +"2019-05-02 09:28:00.268 UTC [msp] DeserializeIdentity -> DEBU 3009 Obtaining identity" +"2019-05-02 09:28:00.268 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 300a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:00.268 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 300b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.268 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 300c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 300d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 300e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 300f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:00.268 UTC [cauthdsl] func1 -> DEBU 3010 0xc00248a640 gate 1556789280268613600 evaluation starts" +"2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3011 0xc00248a640 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3012 0xc00248a640 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3013 0xc00248a640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:00.268 UTC [cauthdsl] func2 -> DEBU 3014 0xc00248a640 principal evaluation fails" +"2019-05-02 09:28:00.268 UTC [cauthdsl] func1 -> DEBU 3015 0xc00248a640 gate 1556789280268613600 evaluation fails" +"2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 3016 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 3017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.268 UTC [policies] Evaluate -> DEBU 3018 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:00.268 UTC [cauthdsl] func1 -> DEBU 3019 0xc00248ae90 gate 1556789280268968200 evaluation starts" +"2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301a 0xc00248ae90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301b 0xc00248ae90 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301c 0xc00248ae90 principal matched by identity 0" +"2019-05-02 09:28:00.269 UTC [msp.identity] Verify -> DEBU 301d Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:28:00.269 UTC [msp.identity] Verify -> DEBU 301e Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:28:00.269 UTC [cauthdsl] func2 -> DEBU 301f 0xc00248ae90 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:00.269 UTC [cauthdsl] func1 -> DEBU 3020 0xc00248ae90 gate 1556789280268968200 evaluation succeeds" +"2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3021 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3022 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3023 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:00.269 UTC [policies] Evaluate -> DEBU 3024 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:00.269 UTC [msp] DeserializeIdentity -> DEBU 3025 Obtaining identity" +"2019-05-02 09:28:00.269 UTC [msp] DeserializeIdentity -> DEBU 3026 Obtaining identity" +"2019-05-02 09:28:00.270 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3027 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:00.270 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3028 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.273 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3029 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.273 UTC [policies] Evaluate -> DEBU 302a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:00.273 UTC [policies] Evaluate -> DEBU 302b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:00.274 UTC [policies] Evaluate -> DEBU 302c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:00.274 UTC [cauthdsl] func1 -> DEBU 302d 0xc00252a660 gate 1556789280274445000 evaluation starts" +"2019-05-02 09:28:00.274 UTC [cauthdsl] func2 -> DEBU 302e 0xc00252a660 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.275 UTC [cauthdsl] func2 -> DEBU 302f 0xc00252a660 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.275 UTC [cauthdsl] func2 -> DEBU 3030 0xc00252a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:00.275 UTC [cauthdsl] func2 -> DEBU 3031 0xc00252a660 principal evaluation fails" +"2019-05-02 09:28:00.275 UTC [cauthdsl] func1 -> DEBU 3032 0xc00252a660 gate 1556789280274445000 evaluation fails" +"2019-05-02 09:28:00.275 UTC [policies] Evaluate -> DEBU 3033 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.275 UTC [policies] Evaluate -> DEBU 3034 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.276 UTC [policies] Evaluate -> DEBU 3035 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:00.276 UTC [cauthdsl] func1 -> DEBU 3036 0xc00252aea0 gate 1556789280276085900 evaluation starts" +"2019-05-02 09:28:00.276 UTC [cauthdsl] func2 -> DEBU 3037 0xc00252aea0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.276 UTC [cauthdsl] func2 -> DEBU 3038 0xc00252aea0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.277 UTC [cauthdsl] func2 -> DEBU 3039 0xc00252aea0 principal matched by identity 0" +"2019-05-02 09:28:00.277 UTC [msp.identity] Verify -> DEBU 303a Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:28:00.277 UTC [msp.identity] Verify -> DEBU 303b Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:28:00.278 UTC [cauthdsl] func2 -> DEBU 303c 0xc00252aea0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:00.278 UTC [cauthdsl] func1 -> DEBU 303d 0xc00252aea0 gate 1556789280276085900 evaluation succeeds" +"2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 303e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 303f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 3040 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:00.278 UTC [policies] Evaluate -> DEBU 3041 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:00.278 UTC [gossip.gossip] handleMessage -> DEBU 3042 Exiting" +"2019-05-02 09:28:00.279 UTC [gossip.gossip] handleMessage -> DEBU 3043 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:00.279 UTC [msp] DeserializeIdentity -> DEBU 3044 Obtaining identity" +"2019-05-02 09:28:00.279 UTC [msp] DeserializeIdentity -> DEBU 3045 Obtaining identity" +"2019-05-02 09:28:00.280 UTC [msp] DeserializeIdentity -> DEBU 3046 Obtaining identity" +"2019-05-02 09:28:00.280 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3047 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:00.280 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3048 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.280 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3049 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.281 UTC [policies] Evaluate -> DEBU 304a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:00.281 UTC [policies] Evaluate -> DEBU 304b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:00.281 UTC [policies] Evaluate -> DEBU 304c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:00.281 UTC [cauthdsl] func1 -> DEBU 304d 0xc00370aa20 gate 1556789280281536300 evaluation starts" +"2019-05-02 09:28:00.281 UTC [cauthdsl] func2 -> DEBU 304e 0xc00370aa20 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.281 UTC [cauthdsl] func2 -> DEBU 304f 0xc00370aa20 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.291 UTC [cauthdsl] func2 -> DEBU 3050 0xc00370aa20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:00.291 UTC [cauthdsl] func2 -> DEBU 3051 0xc00370aa20 principal evaluation fails" +"2019-05-02 09:28:00.292 UTC [cauthdsl] func1 -> DEBU 3052 0xc00370aa20 gate 1556789280281536300 evaluation fails" +"2019-05-02 09:28:00.292 UTC [policies] Evaluate -> DEBU 3053 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.296 UTC [policies] Evaluate -> DEBU 3054 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.296 UTC [policies] Evaluate -> DEBU 3055 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:00.297 UTC [cauthdsl] func1 -> DEBU 3056 0xc00370b260 gate 1556789280296953500 evaluation starts" +"2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 3057 0xc00370b260 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 3058 0xc00370b260 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 3059 0xc00370b260 principal matched by identity 0" +"2019-05-02 09:28:00.297 UTC [msp.identity] Verify -> DEBU 305a Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:28:00.297 UTC [msp.identity] Verify -> DEBU 305b Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:28:00.297 UTC [cauthdsl] func2 -> DEBU 305c 0xc00370b260 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:00.297 UTC [cauthdsl] func1 -> DEBU 305d 0xc00370b260 gate 1556789280296953500 evaluation succeeds" +"2019-05-02 09:28:00.297 UTC [policies] Evaluate -> DEBU 305e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.297 UTC [policies] Evaluate -> DEBU 305f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.297 UTC [policies] Evaluate -> DEBU 3060 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:00.300 UTC [policies] Evaluate -> DEBU 3061 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:00.301 UTC [msp.identity] Verify -> DEBU 3062 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +"2019-05-02 09:28:00.302 UTC [msp.identity] Verify -> DEBU 3063 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +"2019-05-02 09:28:00.302 UTC [msp.identity] Verify -> DEBU 3064 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:28:00.303 UTC [msp.identity] Verify -> DEBU 3065 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:28:00.303 UTC [msp] DeserializeIdentity -> DEBU 3066 Obtaining identity" +"2019-05-02 09:28:00.304 UTC [msp] DeserializeIdentity -> DEBU 3067 Obtaining identity" +"2019-05-02 09:28:00.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3068 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:00.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3069 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.304 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 306a Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:00.304 UTC [policies] Evaluate -> DEBU 306b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:00.304 UTC [policies] Evaluate -> DEBU 306c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:00.304 UTC [policies] Evaluate -> DEBU 306d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:00.304 UTC [cauthdsl] func1 -> DEBU 306e 0xc0031d3890 gate 1556789280304762700 evaluation starts" +"2019-05-02 09:28:00.304 UTC [cauthdsl] func2 -> DEBU 306f 0xc0031d3890 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.304 UTC [cauthdsl] func2 -> DEBU 3070 0xc0031d3890 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.304 UTC [cauthdsl] func2 -> DEBU 3071 0xc0031d3890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 3072 0xc0031d3890 principal evaluation fails" +"2019-05-02 09:28:00.305 UTC [cauthdsl] func1 -> DEBU 3073 0xc0031d3890 gate 1556789280304762700 evaluation fails" +"2019-05-02 09:28:00.305 UTC [policies] Evaluate -> DEBU 3074 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.305 UTC [policies] Evaluate -> DEBU 3075 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:00.305 UTC [policies] Evaluate -> DEBU 3076 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:00.305 UTC [cauthdsl] func1 -> DEBU 3077 0xc0032220d0 gate 1556789280305516800 evaluation starts" +"2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 3078 0xc0032220d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 3079 0xc0032220d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:00.305 UTC [cauthdsl] func2 -> DEBU 307a 0xc0032220d0 principal matched by identity 0" +"2019-05-02 09:28:00.305 UTC [msp.identity] Verify -> DEBU 307b Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:28:00.305 UTC [msp.identity] Verify -> DEBU 307c Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:28:00.306 UTC [cauthdsl] func2 -> DEBU 307d 0xc0032220d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:00.307 UTC [cauthdsl] func1 -> DEBU 307e 0xc0032220d0 gate 1556789280305516800 evaluation succeeds" +"2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 307f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 3080 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 3081 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:00.307 UTC [policies] Evaluate -> DEBU 3082 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:00.307 UTC [gossip.gossip] handleMessage -> DEBU 3083 Exiting" +"2019-05-02 09:28:00.513 UTC [gossip.gossip] handleMessage -> DEBU 3084 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:00.513 UTC [msp] DeserializeIdentity -> DEBU 3085 Obtaining identity" +"2019-05-02 09:28:00.513 UTC [msp] DeserializeIdentity -> DEBU 3086 Obtaining identity" +"2019-05-02 09:28:00.513 UTC [gossip.gossip] handleMessage -> DEBU 3087 Exiting" +"2019-05-02 09:28:00.570 UTC [gossip.gossip] handleMessage -> DEBU 3088 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:00.571 UTC [gossip.pull] HandleMessage -> DEBU 3089 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:00.571 UTC [gossip.pull] SendDigest -> DEBU 308a Sending BLOCK_MSG digest: [1 2 3 4 5 6 7 8] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:00.571 UTC [gossip.gossip] handleMessage -> DEBU 308b Exiting" +"2019-05-02 09:28:01.604 UTC [msp.identity] Sign -> DEBU 308c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151021 " +"2019-05-02 09:28:01.604 UTC [msp.identity] Sign -> DEBU 308d Sign: digest: 6CEFE7D0473B4E118851FB15DB8292827AA4E55AA097DF10B2FA116BB361EB8E " +"2019-05-02 09:28:01.605 UTC [msp.identity] Sign -> DEBU 308e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:28:01.605 UTC [msp.identity] Sign -> DEBU 308f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:28:01.605 UTC [msp] DeserializeIdentity -> DEBU 3090 Obtaining identity" +"2019-05-02 09:28:01.605 UTC [gossip.comm] Send -> DEBU 3091 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:01.605 UTC [msp] DeserializeIdentity -> DEBU 3092 Obtaining identity" +"2019-05-02 09:28:01.605 UTC [gossip.comm] Send -> DEBU 3093 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:01.605 UTC [gossip.comm] Send -> DEBU 3094 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3095 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3096 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3097 Exiting" +"2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3098 Exiting" +"2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 3099 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.605 UTC [gossip.comm] sendToEndpoint -> DEBU 309a Exiting" +"2019-05-02 09:28:01.625 UTC [gossip.comm] func1 -> DEBU 309b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.625 UTC [gossip.gossip] handleMessage -> DEBU 309c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.625 UTC [gossip.gossip] handleMessage -> DEBU 309d Exiting" +"2019-05-02 09:28:01.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 309e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.625 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 309f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:01.626 UTC [msp.identity] Verify -> DEBU 30a0 Verify: digest = 00000000 6c ef e7 d0 47 3b 4e 11 88 51 fb 15 db 82 92 82 |l...G;N..Q......| +00000010 7a a4 e5 5a a0 97 df 10 b2 fa 11 6b b3 61 eb 8e |z..Z.......k.a..|" +"2019-05-02 09:28:01.626 UTC [msp.identity] Verify -> DEBU 30a1 Verify: sig = 00000000 30 44 02 20 6b d7 43 74 6b 3e 93 33 78 03 ea cb |0D. k.Ctk>.3x...| +00000010 fa 91 ee f7 f8 9f 92 5e 72 06 7f 91 c8 00 1f ef |.......^r.......| +00000020 af fd b2 a6 02 20 2e e8 95 7e d8 a1 92 1d 04 8d |..... ...~......| +00000030 c9 af bb ec 04 8a b1 cc 51 2b 84 c4 70 50 e6 c1 |........Q+..pP..| +00000040 6d bb 54 75 e6 f9 |m.Tu..|" +"2019-05-02 09:28:01.647 UTC [gossip.gossip] handleMessage -> DEBU 30a2 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.647 UTC [gossip.pull] HandleMessage -> DEBU 30a3 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a4 Obtaining identity" +"2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a5 Obtaining identity" +"2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a6 Obtaining identity" +"2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a7 Obtaining identity" +"2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a8 Obtaining identity" +"2019-05-02 09:28:01.647 UTC [msp] DeserializeIdentity -> DEBU 30a9 Obtaining identity" +"2019-05-02 09:28:01.647 UTC [gossip.pull] SendDigest -> DEBU 30aa Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:01.647 UTC [gossip.gossip] handleMessage -> DEBU 30ab Exiting" +"2019-05-02 09:28:01.647 UTC [gossip.gossip] handleMessage -> DEBU 30ac Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ad Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:01.648 UTC [gossip.discovery] isSentByMe -> DEBU 30ae Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:01.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 30af Exiting" +"2019-05-02 09:28:01.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b0 Exiting" +"2019-05-02 09:28:01.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.648 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30b2 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:01.648 UTC [msp] DeserializeIdentity -> DEBU 30b3 Obtaining identity" +"2019-05-02 09:28:01.648 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:01.648 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30b5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:01.648 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30b6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:01.648 UTC [policies] Evaluate -> DEBU 30b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:01.648 UTC [policies] Evaluate -> DEBU 30b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:01.648 UTC [policies] Evaluate -> DEBU 30b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:01.648 UTC [cauthdsl] func1 -> DEBU 30ba 0xc00268cc40 gate 1556789281648918000 evaluation starts" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30bb 0xc00268cc40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30bc 0xc00268cc40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30bd 0xc00268cc40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30be 0xc00268cc40 principal evaluation fails" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func1 -> DEBU 30bf 0xc00268cc40 gate 1556789281648918000 evaluation fails" +"2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func1 -> DEBU 30c3 0xc00268d480 gate 1556789281649313100 evaluation starts" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c4 0xc00268d480 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c5 0xc00268d480 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c6 0xc00268d480 principal matched by identity 0" +"2019-05-02 09:28:01.649 UTC [msp.identity] Verify -> DEBU 30c7 Verify: digest = 00000000 d0 ef 71 3c 59 d2 9a e9 ce 07 8f 2d ef 23 1e 4f |..q DEBU 30c8 Verify: sig = 00000000 30 45 02 21 00 b6 df 1c c9 fa 2f 0c e5 da 0d 89 |0E.!....../.....| +00000010 89 79 4e 26 51 9b af 8f 22 ea 3a 6a 6c aa a2 b0 |.yN&Q...".:jl...| +00000020 4d f8 b5 dd 06 02 20 73 77 da d5 7e 80 1f fb f5 |M..... sw..~....| +00000030 ec ef b8 ea 2e 84 01 cf 2e 4f b9 fd bb 8d 1d be |.........O......| +00000040 61 9d e1 82 21 48 7d |a...!H}|" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func2 -> DEBU 30c9 0xc00268d480 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:01.649 UTC [cauthdsl] func1 -> DEBU 30ca 0xc00268d480 gate 1556789281649313100 evaluation succeeds" +"2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30cd Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:01.649 UTC [policies] Evaluate -> DEBU 30ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:01.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 30cf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d1 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 " +"2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d2 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 " +"2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:01.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 30d4 Exiting" +"2019-05-02 09:28:01.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 30d5 Exiting" +"2019-05-02 09:28:01.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30d6 Exiting" +"2019-05-02 09:28:01.650 UTC [gossip.discovery] sendMemResponse -> DEBU 30d7 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:01.650 UTC [msp] DeserializeIdentity -> DEBU 30d8 Obtaining identity" +"2019-05-02 09:28:01.650 UTC [msp] DeserializeIdentity -> DEBU 30d9 Obtaining identity" +"2019-05-02 09:28:01.650 UTC [msp] DeserializeIdentity -> DEBU 30da Obtaining identity" +"2019-05-02 09:28:01.650 UTC [gossip.comm] Send -> DEBU 30db Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:01.650 UTC [gossip.discovery] sendMemResponse -> DEBU 30dc Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:01.650 UTC [gossip.comm] sendToEndpoint -> DEBU 30dd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.650 UTC [gossip.comm] sendToEndpoint -> DEBU 30de Exiting" +"2019-05-02 09:28:01.650 UTC [gossip.gossip] handleMessage -> DEBU 30df Exiting" +"2019-05-02 09:28:01.650 UTC [gossip.gossip] handleMessage -> DEBU 30e0 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.651 UTC [msp] DeserializeIdentity -> DEBU 30e1 Obtaining identity" +"2019-05-02 09:28:01.651 UTC [msp] DeserializeIdentity -> DEBU 30e2 Obtaining identity" +"2019-05-02 09:28:01.651 UTC [msp] DeserializeIdentity -> DEBU 30e3 Obtaining identity" +"2019-05-02 09:28:01.651 UTC [gossip.gossip] handleMessage -> DEBU 30e4 Exiting" +"2019-05-02 09:28:01.651 UTC [gossip.gossip] handleMessage -> DEBU 30e5 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.651 UTC [gossip.gossip] handleMessage -> DEBU 30e6 Exiting" +"2019-05-02 09:28:01.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30e7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.651 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30e8 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:01.651 UTC [msp.identity] Verify -> DEBU 30e9 Verify: digest = 00000000 6c ef e7 d0 47 3b 4e 11 88 51 fb 15 db 82 92 82 |l...G;N..Q......| +00000010 7a a4 e5 5a a0 97 df 10 b2 fa 11 6b b3 61 eb 8e |z..Z.......k.a..|" +"2019-05-02 09:28:01.651 UTC [msp.identity] Verify -> DEBU 30ea Verify: sig = 00000000 30 44 02 20 6b d7 43 74 6b 3e 93 33 78 03 ea cb |0D. k.Ctk>.3x...| +00000010 fa 91 ee f7 f8 9f 92 5e 72 06 7f 91 c8 00 1f ef |.......^r.......| +00000020 af fd b2 a6 02 20 2e e8 95 7e d8 a1 92 1d 04 8d |..... ...~......| +00000030 c9 af bb ec 04 8a b1 cc 51 2b 84 c4 70 50 e6 c1 |........Q+..pP..| +00000040 6d bb 54 75 e6 f9 |m.Tu..|" +"2019-05-02 09:28:01.651 UTC [gossip.discovery] handleAliveMessage -> DEBU 30eb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:01.651 UTC [gossip.discovery] isSentByMe -> DEBU 30ec Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:01.651 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ed Exiting" +"2019-05-02 09:28:01.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ee Exiting" +"2019-05-02 09:28:01.652 UTC [gossip.comm] func1 -> DEBU 30ef Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.652 UTC [gossip.gossip] handleMessage -> DEBU 30f0 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.652 UTC [gossip.pull] HandleMessage -> DEBU 30f1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f2 Obtaining identity" +"2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f3 Obtaining identity" +"2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f4 Obtaining identity" +"2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f5 Obtaining identity" +"2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f6 Obtaining identity" +"2019-05-02 09:28:01.652 UTC [msp] DeserializeIdentity -> DEBU 30f7 Obtaining identity" +"2019-05-02 09:28:01.652 UTC [gossip.pull] SendDigest -> DEBU 30f8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:01.653 UTC [gossip.gossip] handleMessage -> DEBU 30f9 Exiting" +"2019-05-02 09:28:01.653 UTC [gossip.gossip] handleMessage -> DEBU 30fa Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.653 UTC [gossip.gossip] handleMessage -> DEBU 30fb Exiting" +"2019-05-02 09:28:01.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30fc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.653 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30fd Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 30fe Verify: digest = 00000000 6c ef e7 d0 47 3b 4e 11 88 51 fb 15 db 82 92 82 |l...G;N..Q......| +00000010 7a a4 e5 5a a0 97 df 10 b2 fa 11 6b b3 61 eb 8e |z..Z.......k.a..|" +"2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 30ff Verify: sig = 00000000 30 44 02 20 6b d7 43 74 6b 3e 93 33 78 03 ea cb |0D. k.Ctk>.3x...| +00000010 fa 91 ee f7 f8 9f 92 5e 72 06 7f 91 c8 00 1f ef |.......^r.......| +00000020 af fd b2 a6 02 20 2e e8 95 7e d8 a1 92 1d 04 8d |..... ...~......| +00000030 c9 af bb ec 04 8a b1 cc 51 2b 84 c4 70 50 e6 c1 |........Q+..pP..| +00000040 6d bb 54 75 e6 f9 |m.Tu..|" +"2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 3100 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:30.159 UTC [msp.identity] Verify -> DEBU 307f Verify: sig = 00000000 30 45 02 21 00 cd 83 bd 8c 67 31 ed b0 a3 59 fe |0E.!.....g1...Y.| -00000010 d2 26 c4 ef 86 03 f0 48 f4 ad 0e 96 a8 23 15 ce |.&.....H.....#..| -00000020 97 38 3c 20 d0 02 20 29 0c da c7 f9 3d c1 3a a7 |.8< .. )....=.:.| -00000030 11 3a 97 e3 24 b1 c2 48 6a 07 ba 41 48 57 c0 f2 |.:..$..Hj..AHW..| -00000040 7e 36 3b 37 ad b6 49 |~6;7..I|" -"2019-05-02 01:31:30.159 UTC [gossip.discovery] handleAliveMessage -> DEBU 3080 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:30.162 UTC [gossip.discovery] isSentByMe -> DEBU 3081 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:30.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 3082 Exiting" -"2019-05-02 01:31:30.163 UTC [gossip.comm] func1 -> DEBU 3083 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3084 Exiting" -"2019-05-02 01:31:30.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3085 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.163 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3086 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:30.164 UTC [gossip.gossip] handleMessage -> DEBU 3087 Exiting" -"2019-05-02 01:31:30.164 UTC [gossip.gossip] handleMessage -> DEBU 3088 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.164 UTC [msp.identity] Verify -> DEBU 3089 Verify: digest = 00000000 b7 f2 30 3b 55 fb f8 05 f2 5a 83 69 88 8f 5e 2e |..0;U....Z.i..^.| -00000010 ca aa 58 5a 79 0c 20 86 ee 59 90 6b 9e 67 9c 70 |..XZy. ..Y.k.g.p|" -"2019-05-02 01:31:30.164 UTC [msp.identity] Verify -> DEBU 308a Verify: sig = 00000000 30 45 02 21 00 ac f4 43 76 3e 8a 65 77 ac 30 12 |0E.!...Cv>.ew.0.| -00000010 89 48 66 36 51 b5 3b 32 56 6f 26 cb 41 34 03 a2 |.Hf6Q.;2Vo&.A4..| -00000020 f2 9a bd 85 88 02 20 11 67 c1 ff 1f 6d 7f f7 05 |...... .g...m...| -00000030 49 92 50 a6 25 3c b1 43 4f 28 80 0b 24 00 21 03 |I.P.%<.CO(..$.!.| -00000040 0e 44 fd 62 f8 52 5c |.D.b.R\|" -"2019-05-02 01:31:30.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 308b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:30.166 UTC [gossip.discovery] isSentByMe -> DEBU 308c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:30.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 308d Exiting" -"2019-05-02 01:31:30.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 308e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:30.167 UTC [msp.identity] Verify -> DEBU 308f Verify: digest = 00000000 c0 4b 1c fb 23 85 f5 10 2f 2d 51 21 8c e6 78 10 |.K..#.../-Q!..x.| -00000010 92 c9 a9 dd be 61 e3 bf 8c eb f5 c5 ef 9b b2 2e |.....a..........|" -"2019-05-02 01:31:30.167 UTC [msp.identity] Verify -> DEBU 3090 Verify: sig = 00000000 30 45 02 21 00 fc 84 b7 78 2c fc dd 1f 45 fb 3f |0E.!....x,...E.?| -00000010 59 4e 1c cc 60 7f dc f9 d0 98 03 c1 1d 34 d3 6e |YN..`........4.n| -00000020 92 41 6c 64 64 02 20 20 75 18 f3 b4 a7 03 91 e3 |.Aldd. u.......| -00000030 ed dd 58 67 68 a3 80 0c 73 3a 79 ad 0f fb dd c8 |..Xgh...s:y.....| -00000040 3c 32 2e 79 fc 64 cd |<2.y.d.|" -"2019-05-02 01:31:30.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 3091 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:30.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 3092 Exiting" -"2019-05-02 01:31:30.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3093 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:30.168 UTC [msp] DeserializeIdentity -> DEBU 3094 Obtaining identity" -"2019-05-02 01:31:30.168 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3095 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:30.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3096 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:30.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3097 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:30.168 UTC [policies] Evaluate -> DEBU 3098 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:30.169 UTC [policies] Evaluate -> DEBU 3099 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:30.169 UTC [policies] Evaluate -> DEBU 309a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:30.169 UTC [cauthdsl] func1 -> DEBU 309b 0xc002240370 gate 1556760690169397300 evaluation starts" -"2019-05-02 01:31:30.169 UTC [cauthdsl] func2 -> DEBU 309c 0xc002240370 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:30.169 UTC [cauthdsl] func2 -> DEBU 309d 0xc002240370 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:30.170 UTC [cauthdsl] func2 -> DEBU 309e 0xc002240370 principal matched by identity 0" -"2019-05-02 01:31:30.170 UTC [msp.identity] Verify -> DEBU 309f Verify: digest = 00000000 01 24 f0 60 c8 80 ba 3e f2 96 ea 53 e3 77 57 11 |.$.`...>...S.wW.| -00000010 c6 77 c0 14 ba 7f 2c e7 fc da 9a ac 30 a3 ed e5 |.w....,.....0...|" -"2019-05-02 01:31:30.170 UTC [msp.identity] Verify -> DEBU 30a0 Verify: sig = 00000000 30 45 02 21 00 ec 13 3e 3f e2 4c 73 52 66 95 35 |0E.!...>?.LsRf.5| -00000010 fe 9c d4 6c 06 49 15 5d 8a 8b 37 46 8e c9 e9 aa |...l.I.]..7F....| -00000020 b8 dd 3d 3f 7f 02 20 45 f0 24 0a bd 29 3b db 53 |..=?.. E.$..);.S| -00000030 4d 54 09 4a 78 85 dd f3 87 be 40 a1 b3 61 64 ea |MT.Jx.....@..ad.| -00000040 f3 71 d1 f2 5d b5 df |.q..]..|" -"2019-05-02 01:31:30.171 UTC [cauthdsl] func2 -> DEBU 30a1 0xc002240370 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:30.171 UTC [cauthdsl] func1 -> DEBU 30a2 0xc002240370 gate 1556760690169397300 evaluation succeeds" -"2019-05-02 01:31:30.171 UTC [policies] Evaluate -> DEBU 30a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:30.171 UTC [policies] Evaluate -> DEBU 30a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:30.171 UTC [policies] Evaluate -> DEBU 30a5 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:30.171 UTC [policies] Evaluate -> DEBU 30a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:30.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 30a7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:30.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 30a8 Exiting" -"2019-05-02 01:31:30.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30a9 Exiting" -"2019-05-02 01:31:30.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:30.173 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30ac Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:30.173 UTC [gossip.gossip] handleMessage -> DEBU 30ab Exiting" -"2019-05-02 01:31:30.173 UTC [msp.identity] Verify -> DEBU 30ad Verify: digest = 00000000 c0 4b 1c fb 23 85 f5 10 2f 2d 51 21 8c e6 78 10 |.K..#.../-Q!..x.| -00000010 92 c9 a9 dd be 61 e3 bf 8c eb f5 c5 ef 9b b2 2e |.....a..........|" -"2019-05-02 01:31:30.174 UTC [msp.identity] Verify -> DEBU 30ae Verify: sig = 00000000 30 45 02 21 00 fc 84 b7 78 2c fc dd 1f 45 fb 3f |0E.!....x,...E.?| -00000010 59 4e 1c cc 60 7f dc f9 d0 98 03 c1 1d 34 d3 6e |YN..`........4.n| -00000020 92 41 6c 64 64 02 20 20 75 18 f3 b4 a7 03 91 e3 |.Aldd. u.......| -00000030 ed dd 58 67 68 a3 80 0c 73 3a 79 ad 0f fb dd c8 |..Xgh...s:y.....| -00000040 3c 32 2e 79 fc 64 cd |<2.y.d.|" -"2019-05-02 01:31:30.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 30af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:30.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 30b0 Exiting" -"2019-05-02 01:31:30.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30b1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:30.175 UTC [msp] DeserializeIdentity -> DEBU 30b2 Obtaining identity" -"2019-05-02 01:31:30.175 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30b3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:30.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30b4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:30.177 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30b5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:30.177 UTC [policies] Evaluate -> DEBU 30b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:30.177 UTC [policies] Evaluate -> DEBU 30b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:30.178 UTC [policies] Evaluate -> DEBU 30b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:30.178 UTC [cauthdsl] func1 -> DEBU 30b9 0xc0022d8a50 gate 1556760690178323800 evaluation starts" -"2019-05-02 01:31:30.178 UTC [cauthdsl] func2 -> DEBU 30ba 0xc0022d8a50 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:30.179 UTC [cauthdsl] func2 -> DEBU 30bb 0xc0022d8a50 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:30.179 UTC [cauthdsl] func2 -> DEBU 30bc 0xc0022d8a50 principal matched by identity 0" -"2019-05-02 01:31:30.179 UTC [msp.identity] Verify -> DEBU 30bd Verify: digest = 00000000 78 51 d8 3a 1e 30 1a cb 8b 90 7e a0 58 6f 3d 19 |xQ.:.0....~.Xo=.| -00000010 b2 ea 9f 8c 37 eb 6d ad dd 6e 0e 41 a0 04 1b 9c |....7.m..n.A....|" -"2019-05-02 01:31:30.179 UTC [msp.identity] Verify -> DEBU 30be Verify: sig = 00000000 30 45 02 21 00 bf 26 74 e0 a7 c5 18 d5 50 9c 79 |0E.!..&t.....P.y| -00000010 1f e0 0a 78 7a e7 6c 42 52 66 2e f8 d6 95 f1 e1 |...xz.lBRf......| -00000020 a0 90 fc 56 67 02 20 01 82 a9 5c 1f 55 e2 5a 59 |...Vg. ...\.U.ZY| -00000030 73 03 74 06 ab 3f ae 34 b1 7e 5e 5d c6 22 ee eb |s.t..?.4.~^]."..| -00000040 73 79 71 e4 22 0e 8d |syq."..|" -"2019-05-02 01:31:30.180 UTC [cauthdsl] func2 -> DEBU 30bf 0xc0022d8a50 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:30.180 UTC [cauthdsl] func1 -> DEBU 30c0 0xc0022d8a50 gate 1556760690178323800 evaluation succeeds" -"2019-05-02 01:31:30.180 UTC [policies] Evaluate -> DEBU 30c1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:30.181 UTC [policies] Evaluate -> DEBU 30c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:30.181 UTC [policies] Evaluate -> DEBU 30c3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:30.182 UTC [policies] Evaluate -> DEBU 30c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:30.182 UTC [gossip.discovery] handleAliveMessage -> DEBU 30c5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:30.182 UTC [gossip.discovery] handleAliveMessage -> DEBU 30c6 Exiting" -"2019-05-02 01:31:30.182 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30c7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:30.183 UTC [msp.identity] Verify -> DEBU 30c8 Verify: digest = 00000000 b7 f2 30 3b 55 fb f8 05 f2 5a 83 69 88 8f 5e 2e |..0;U....Z.i..^.| -00000010 ca aa 58 5a 79 0c 20 86 ee 59 90 6b 9e 67 9c 70 |..XZy. ..Y.k.g.p|" -"2019-05-02 01:31:30.183 UTC [msp.identity] Verify -> DEBU 30c9 Verify: sig = 00000000 30 45 02 21 00 ac f4 43 76 3e 8a 65 77 ac 30 12 |0E.!...Cv>.ew.0.| -00000010 89 48 66 36 51 b5 3b 32 56 6f 26 cb 41 34 03 a2 |.Hf6Q.;2Vo&.A4..| -00000020 f2 9a bd 85 88 02 20 11 67 c1 ff 1f 6d 7f f7 05 |...... .g...m...| -00000030 49 92 50 a6 25 3c b1 43 4f 28 80 0b 24 00 21 03 |I.P.%<.CO(..$.!.| -00000040 0e 44 fd 62 f8 52 5c |.D.b.R\|" -"2019-05-02 01:31:30.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ca Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:30.184 UTC [gossip.discovery] isSentByMe -> DEBU 30cb Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:30.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 30cc Exiting" -"2019-05-02 01:31:30.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30cd Exiting" -"2019-05-02 01:31:31.948 UTC [gossip.election] waitForInterrupt -> DEBU 30ce c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:31.948 UTC [gossip.election] IsLeader -> DEBU 30cf c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:31.948 UTC [msp.identity] Sign -> DEBU 30d0 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100B1801 " -"2019-05-02 01:31:31.948 UTC [msp.identity] Sign -> DEBU 30d1 Sign: digest: A7B31CFA6076D5063CEEDA15738E21BE87A1EB8D93E662FF48E29DDDC6A2FDE1 " -"2019-05-02 01:31:31.949 UTC [gossip.election] waitForInterrupt -> DEBU 30d2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:31.951 UTC [msp] DeserializeIdentity -> DEBU 30d3 Obtaining identity" -"2019-05-02 01:31:31.951 UTC [msp] DeserializeIdentity -> DEBU 30d4 Obtaining identity" -"2019-05-02 01:31:31.952 UTC [msp] DeserializeIdentity -> DEBU 30d5 Obtaining identity" -"2019-05-02 01:31:31.952 UTC [msp] DeserializeIdentity -> DEBU 30d6 Obtaining identity" -"2019-05-02 01:31:31.952 UTC [gossip.comm] Send -> DEBU 30d7 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:31.953 UTC [msp] DeserializeIdentity -> DEBU 30d8 Obtaining identity" -"2019-05-02 01:31:31.953 UTC [msp] DeserializeIdentity -> DEBU 30d9 Obtaining identity" -"2019-05-02 01:31:31.953 UTC [gossip.comm] sendToEndpoint -> DEBU 30da Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -"2019-05-02 01:31:31.953 UTC [gossip.comm] sendToEndpoint -> DEBU 30db Exiting" -"2019-05-02 01:31:32.786 UTC [msp] DeserializeIdentity -> DEBU 30dc Obtaining identity" -"2019-05-02 01:31:32.786 UTC [msp] DeserializeIdentity -> DEBU 30dd Obtaining identity" -"2019-05-02 01:31:32.786 UTC [gossip.comm] Send -> DEBU 30de Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30df Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30e0 Exiting" -"2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30e1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30e2 Exiting" -"2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.786 UTC [gossip.comm] sendToEndpoint -> DEBU 30e4 Exiting" -"2019-05-02 01:31:32.789 UTC [gossip.comm] func1 -> DEBU 30e5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.789 UTC [gossip.gossip] handleMessage -> DEBU 30e6 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.789 UTC [msp] DeserializeIdentity -> DEBU 30e7 Obtaining identity" -"2019-05-02 01:31:32.790 UTC [msp] DeserializeIdentity -> DEBU 30e8 Obtaining identity" -"2019-05-02 01:31:32.790 UTC [msp] DeserializeIdentity -> DEBU 30e9 Obtaining identity" -"2019-05-02 01:31:32.790 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:32.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30eb Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.791 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30ec Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.791 UTC [policies] Evaluate -> DEBU 30ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:32.791 UTC [policies] Evaluate -> DEBU 30ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:32.791 UTC [policies] Evaluate -> DEBU 30ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:32.791 UTC [cauthdsl] func1 -> DEBU 30f0 0xc002d7def0 gate 1556760692791281800 evaluation starts" -"2019-05-02 01:31:32.791 UTC [cauthdsl] func2 -> DEBU 30f1 0xc002d7def0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:32.791 UTC [cauthdsl] func2 -> DEBU 30f2 0xc002d7def0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:32.791 UTC [cauthdsl] func2 -> DEBU 30f3 0xc002d7def0 principal matched by identity 0" -"2019-05-02 01:31:32.791 UTC [msp.identity] Verify -> DEBU 30f4 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:32.791 UTC [msp.identity] Verify -> DEBU 30f5 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:32.791 UTC [cauthdsl] func2 -> DEBU 30f6 0xc002d7def0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:32.791 UTC [cauthdsl] func1 -> DEBU 30f7 0xc002d7def0 gate 1556760692791281800 evaluation succeeds" -"2019-05-02 01:31:32.792 UTC [policies] Evaluate -> DEBU 30f8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.792 UTC [policies] Evaluate -> DEBU 30f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.792 UTC [policies] Evaluate -> DEBU 30fa Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:32.792 UTC [policies] Evaluate -> DEBU 30fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:32.792 UTC [msp.identity] Verify -> DEBU 30fc Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:32.792 UTC [msp.identity] Verify -> DEBU 30fd Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:32.793 UTC [msp.identity] Verify -> DEBU 30fe Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:32.793 UTC [msp.identity] Verify -> DEBU 30ff Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:32.793 UTC [msp] DeserializeIdentity -> DEBU 3100 Obtaining identity" -"2019-05-02 01:31:32.793 UTC [msp] DeserializeIdentity -> DEBU 3101 Obtaining identity" -"2019-05-02 01:31:32.793 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3102 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:32.794 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3103 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.794 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3104 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.794 UTC [policies] Evaluate -> DEBU 3105 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:32.794 UTC [policies] Evaluate -> DEBU 3106 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:32.794 UTC [policies] Evaluate -> DEBU 3107 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:32.794 UTC [cauthdsl] func1 -> DEBU 3108 0xc00387c500 gate 1556760692794433800 evaluation starts" -"2019-05-02 01:31:32.794 UTC [cauthdsl] func2 -> DEBU 3109 0xc00387c500 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:32.794 UTC [cauthdsl] func2 -> DEBU 310a 0xc00387c500 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:32.794 UTC [cauthdsl] func2 -> DEBU 310b 0xc00387c500 principal matched by identity 0" -"2019-05-02 01:31:32.794 UTC [msp.identity] Verify -> DEBU 310c Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:32.794 UTC [msp.identity] Verify -> DEBU 310d Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:32.795 UTC [cauthdsl] func2 -> DEBU 310e 0xc00387c500 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:32.795 UTC [cauthdsl] func1 -> DEBU 310f 0xc00387c500 gate 1556760692794433800 evaluation succeeds" -"2019-05-02 01:31:32.795 UTC [policies] Evaluate -> DEBU 3110 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.795 UTC [policies] Evaluate -> DEBU 3111 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.795 UTC [policies] Evaluate -> DEBU 3112 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:32.795 UTC [policies] Evaluate -> DEBU 3113 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:32.795 UTC [gossip.gossip] handleMessage -> DEBU 3114 Exiting" -"2019-05-02 01:31:32.795 UTC [gossip.gossip] handleMessage -> DEBU 3115 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.796 UTC [msp.identity] Verify -> DEBU 3116 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:32.796 UTC [msp.identity] Verify -> DEBU 3117 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:32.796 UTC [msp.identity] Verify -> DEBU 3118 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:32.796 UTC [msp.identity] Verify -> DEBU 3119 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:32.796 UTC [msp] DeserializeIdentity -> DEBU 311a Obtaining identity" -"2019-05-02 01:31:32.796 UTC [msp] DeserializeIdentity -> DEBU 311b Obtaining identity" -"2019-05-02 01:31:32.797 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 311c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:32.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 311d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 311e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.797 UTC [policies] Evaluate -> DEBU 311f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:32.797 UTC [policies] Evaluate -> DEBU 3120 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:32.797 UTC [policies] Evaluate -> DEBU 3121 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:32.798 UTC [cauthdsl] func1 -> DEBU 3122 0xc003976d80 gate 1556760692797437000 evaluation starts" -"2019-05-02 01:31:32.798 UTC [gossip.comm] func1 -> DEBU 3123 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.798 UTC [cauthdsl] func2 -> DEBU 3124 0xc003976d80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:32.798 UTC [cauthdsl] func2 -> DEBU 3125 0xc003976d80 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:32.799 UTC [cauthdsl] func2 -> DEBU 3126 0xc003976d80 principal matched by identity 0" -"2019-05-02 01:31:32.799 UTC [msp.identity] Verify -> DEBU 3127 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:32.799 UTC [msp.identity] Verify -> DEBU 3128 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:32.800 UTC [cauthdsl] func2 -> DEBU 3129 0xc003976d80 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:32.801 UTC [cauthdsl] func1 -> DEBU 312a 0xc003976d80 gate 1556760692797437000 evaluation succeeds" -"2019-05-02 01:31:32.801 UTC [policies] Evaluate -> DEBU 312b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.802 UTC [policies] Evaluate -> DEBU 312c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.803 UTC [policies] Evaluate -> DEBU 312d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:32.804 UTC [policies] Evaluate -> DEBU 312e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:32.804 UTC [msp] DeserializeIdentity -> DEBU 312f Obtaining identity" -"2019-05-02 01:31:32.805 UTC [msp] DeserializeIdentity -> DEBU 3130 Obtaining identity" -"2019-05-02 01:31:32.806 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3131 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:32.812 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3132 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.812 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3133 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.813 UTC [policies] Evaluate -> DEBU 3134 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:32.813 UTC [policies] Evaluate -> DEBU 3135 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:32.813 UTC [policies] Evaluate -> DEBU 3136 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:32.813 UTC [cauthdsl] func1 -> DEBU 3137 0xc003e46550 gate 1556760692813806700 evaluation starts" -"2019-05-02 01:31:32.814 UTC [cauthdsl] func2 -> DEBU 3138 0xc003e46550 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:32.814 UTC [cauthdsl] func2 -> DEBU 3139 0xc003e46550 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:32.814 UTC [cauthdsl] func2 -> DEBU 313a 0xc003e46550 principal matched by identity 0" -"2019-05-02 01:31:32.814 UTC [msp.identity] Verify -> DEBU 313b Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:32.814 UTC [msp.identity] Verify -> DEBU 313c Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:32.814 UTC [cauthdsl] func2 -> DEBU 313d 0xc003e46550 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:32.815 UTC [cauthdsl] func1 -> DEBU 313e 0xc003e46550 gate 1556760692813806700 evaluation succeeds" -"2019-05-02 01:31:32.815 UTC [policies] Evaluate -> DEBU 313f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.815 UTC [policies] Evaluate -> DEBU 3140 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.815 UTC [policies] Evaluate -> DEBU 3141 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:32.815 UTC [policies] Evaluate -> DEBU 3142 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:32.815 UTC [gossip.gossip] handleMessage -> DEBU 3143 Exiting" -"2019-05-02 01:31:32.815 UTC [gossip.gossip] handleMessage -> DEBU 3144 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.815 UTC [msp] DeserializeIdentity -> DEBU 3145 Obtaining identity" -"2019-05-02 01:31:32.815 UTC [msp] DeserializeIdentity -> DEBU 3146 Obtaining identity" -"2019-05-02 01:31:32.815 UTC [msp] DeserializeIdentity -> DEBU 3147 Obtaining identity" -"2019-05-02 01:31:32.816 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3148 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:32.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3149 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 314a Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.816 UTC [policies] Evaluate -> DEBU 314b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:32.816 UTC [policies] Evaluate -> DEBU 314c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:32.816 UTC [policies] Evaluate -> DEBU 314d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:32.816 UTC [cauthdsl] func1 -> DEBU 314e 0xc004180060 gate 1556760692816660000 evaluation starts" -"2019-05-02 01:31:32.816 UTC [cauthdsl] func2 -> DEBU 314f 0xc004180060 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:32.816 UTC [cauthdsl] func2 -> DEBU 3150 0xc004180060 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:32.817 UTC [cauthdsl] func2 -> DEBU 3151 0xc004180060 principal matched by identity 0" -"2019-05-02 01:31:32.817 UTC [msp.identity] Verify -> DEBU 3152 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:32.817 UTC [msp.identity] Verify -> DEBU 3153 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:32.817 UTC [cauthdsl] func2 -> DEBU 3154 0xc004180060 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:32.817 UTC [cauthdsl] func1 -> DEBU 3155 0xc004180060 gate 1556760692816660000 evaluation succeeds" -"2019-05-02 01:31:32.817 UTC [policies] Evaluate -> DEBU 3156 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.817 UTC [policies] Evaluate -> DEBU 3157 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.817 UTC [policies] Evaluate -> DEBU 3158 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:32.817 UTC [policies] Evaluate -> DEBU 3159 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:32.818 UTC [msp.identity] Verify -> DEBU 315a Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:32.818 UTC [msp.identity] Verify -> DEBU 315b Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:32.819 UTC [msp.identity] Verify -> DEBU 315c Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:32.819 UTC [msp.identity] Verify -> DEBU 315d Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:32.827 UTC [msp] DeserializeIdentity -> DEBU 315e Obtaining identity" -"2019-05-02 01:31:32.827 UTC [msp] DeserializeIdentity -> DEBU 315f Obtaining identity" -"2019-05-02 01:31:32.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3160 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:32.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3161 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3162 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:32.827 UTC [policies] Evaluate -> DEBU 3163 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:32.827 UTC [policies] Evaluate -> DEBU 3164 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:32.828 UTC [policies] Evaluate -> DEBU 3165 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:32.828 UTC [cauthdsl] func1 -> DEBU 3166 0xc00425c670 gate 1556760692828069600 evaluation starts" -"2019-05-02 01:31:32.828 UTC [cauthdsl] func2 -> DEBU 3167 0xc00425c670 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:32.828 UTC [cauthdsl] func2 -> DEBU 3168 0xc00425c670 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:32.828 UTC [cauthdsl] func2 -> DEBU 3169 0xc00425c670 principal matched by identity 0" -"2019-05-02 01:31:32.828 UTC [msp.identity] Verify -> DEBU 316a Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:32.828 UTC [msp.identity] Verify -> DEBU 316b Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:32.828 UTC [cauthdsl] func2 -> DEBU 316c 0xc00425c670 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:32.828 UTC [cauthdsl] func1 -> DEBU 316d 0xc00425c670 gate 1556760692828069600 evaluation succeeds" -"2019-05-02 01:31:32.828 UTC [policies] Evaluate -> DEBU 316e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.828 UTC [policies] Evaluate -> DEBU 316f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:32.829 UTC [policies] Evaluate -> DEBU 3170 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:32.829 UTC [policies] Evaluate -> DEBU 3171 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:32.829 UTC [gossip.gossip] handleMessage -> DEBU 3172 Exiting" -"2019-05-02 01:31:32.912 UTC [msp] DeserializeIdentity -> DEBU 3173 Obtaining identity" -"2019-05-02 01:31:32.912 UTC [msp] DeserializeIdentity -> DEBU 3174 Obtaining identity" -"2019-05-02 01:31:32.913 UTC [gossip.pull] Hello -> DEBU 3175 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:32.913 UTC [msp] DeserializeIdentity -> DEBU 3176 Obtaining identity" -"2019-05-02 01:31:32.913 UTC [msp] DeserializeIdentity -> DEBU 3177 Obtaining identity" -"2019-05-02 01:31:32.913 UTC [gossip.comm] Send -> DEBU 3178 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:32.913 UTC [gossip.comm] sendToEndpoint -> DEBU 3179 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.913 UTC [gossip.comm] sendToEndpoint -> DEBU 317a Exiting" -"2019-05-02 01:31:32.916 UTC [gossip.gossip] handleMessage -> DEBU 317b Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1047611352146353449 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 57 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.916 UTC [gossip.pull] HandleMessage -> DEBU 317c GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1047611352146353449 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 57 bytes, Signature: 0 bytes" -"2019-05-02 01:31:32.916 UTC [gossip.gossip] handleMessage -> DEBU 317d Exiting" -"2019-05-02 01:31:33.049 UTC [gossip.gossip] handleMessage -> DEBU 317e Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.050 UTC [msp] DeserializeIdentity -> DEBU 317f Obtaining identity" -"2019-05-02 01:31:33.050 UTC [msp] DeserializeIdentity -> DEBU 3180 Obtaining identity" -"2019-05-02 01:31:33.056 UTC [gossip.gossip] handleMessage -> DEBU 3181 Exiting" -"2019-05-02 01:31:33.090 UTC [gossip.gossip] handleMessage -> DEBU 3182 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.092 UTC [gossip.pull] HandleMessage -> DEBU 3183 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.095 UTC [gossip.pull] SendDigest -> DEBU 3184 Sending BLOCK_MSG digest: [1 2 3 4 5 6 7 8] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:33.095 UTC [gossip.gossip] handleMessage -> DEBU 3185 Exiting" -"2019-05-02 01:31:33.276 UTC [gossip.comm] func1 -> DEBU 3186 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.276 UTC [gossip.gossip] handleMessage -> DEBU 3187 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.276 UTC [msp] DeserializeIdentity -> DEBU 3188 Obtaining identity" -"2019-05-02 01:31:33.276 UTC [msp] DeserializeIdentity -> DEBU 3189 Obtaining identity" -"2019-05-02 01:31:33.277 UTC [msp] DeserializeIdentity -> DEBU 318a Obtaining identity" -"2019-05-02 01:31:33.277 UTC [gossip.gossip] handleMessage -> DEBU 318b Exiting" -"2019-05-02 01:31:33.400 UTC [gossip.gossip] handleMessage -> DEBU 318c Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.401 UTC [gossip.pull] HandleMessage -> DEBU 318d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.401 UTC [gossip.pull] SendDigest -> DEBU 318e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:33.402 UTC [gossip.gossip] handleMessage -> DEBU 318f Exiting" -"2019-05-02 01:31:33.408 UTC [gossip.gossip] handleMessage -> DEBU 3190 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:33.409 UTC [gossip.gossip] handleMessage -> DEBU 3191 Exiting" -"2019-05-02 01:31:33.410 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3192 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:33.411 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3193 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:33.411 UTC [msp.identity] Verify -> DEBU 3194 Verify: digest = 00000000 66 21 6d 8a ca 7b 57 1b 78 69 c1 6a a2 c0 a5 66 |f!m..{W.xi.j...f| -00000010 b2 d7 70 56 c5 86 18 8d 93 a2 1a 6d 1a 55 36 b7 |..pV.......m.U6.|" -"2019-05-02 01:31:33.411 UTC [msp.identity] Verify -> DEBU 3195 Verify: sig = 00000000 30 44 02 20 61 50 17 50 3b f1 f6 09 d2 90 5c ad |0D. aP.P;.....\.| -00000010 fd fe 48 05 04 68 31 dc 8c ba 6d e8 ab 57 0b 32 |..H..h1...m..W.2| -00000020 e1 21 ac ce 02 20 23 7c 96 3e 4d cb f0 22 ad ba |.!... #|.>M.."..| -00000030 89 3e 26 53 7a de 46 09 10 e7 3e be 5f dc 7d 3a |.>&Sz.F...>._.}:| -00000040 05 b0 81 a6 63 75 |....cu|" -"2019-05-02 01:31:33.412 UTC [msp.identity] Verify -> DEBU 3196 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:28:01.653 UTC [msp.identity] Verify -> DEBU 3101 Verify: sig = 00000000 30 44 02 21 00 e2 28 8d 93 0e 5f e2 37 61 8b 26 |0D.!..(..._.7a.&| +00000010 c6 79 d6 da 50 72 8b 9f 4b 65 41 2e cb 16 d7 95 |.y..Pr..KeA.....| +00000020 fa af 3a 35 f8 02 1f 55 77 32 2c 63 1c c5 f3 49 |..:5...Uw2,c...I| +00000030 b4 7c df 00 c5 46 1f d8 fc 1e c7 46 ac e1 d8 27 |.|...F.....F...'| +00000040 81 b8 fc b5 d7 b9 |......|" +"2019-05-02 09:28:01.653 UTC [gossip.discovery] handleAliveMessage -> DEBU 3102 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:01.654 UTC [gossip.discovery] isSentByMe -> DEBU 3103 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:01.685 UTC [gossip.gossip] handleMessage -> DEBU 3104 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.685 UTC [gossip.pull] HandleMessage -> DEBU 3105 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.685 UTC [gossip.pull] SendDigest -> DEBU 3106 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:01.685 UTC [gossip.gossip] handleMessage -> DEBU 3107 Exiting" +"2019-05-02 09:28:01.686 UTC [gossip.gossip] handleMessage -> DEBU 3108 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.687 UTC [gossip.comm] func1 -> DEBU 3109 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.699 UTC [msp] DeserializeIdentity -> DEBU 310a Obtaining identity" +"2019-05-02 09:28:01.699 UTC [msp] DeserializeIdentity -> DEBU 310b Obtaining identity" +"2019-05-02 09:28:01.699 UTC [gossip.pull] Hello -> DEBU 310c Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:28:01.702 UTC [msp] DeserializeIdentity -> DEBU 310d Obtaining identity" +"2019-05-02 09:28:01.702 UTC [msp] DeserializeIdentity -> DEBU 310e Obtaining identity" +"2019-05-02 09:28:01.702 UTC [gossip.comm] Send -> DEBU 310f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:01.703 UTC [gossip.comm] sendToEndpoint -> DEBU 3110 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.703 UTC [gossip.comm] sendToEndpoint -> DEBU 3111 Exiting" +"2019-05-02 09:28:01.704 UTC [gossip.pull] Hello -> DEBU 3112 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:28:01.704 UTC [gossip.comm] Send -> DEBU 3113 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:01.704 UTC [gossip.pull] Hello -> DEBU 3114 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:28:01.704 UTC [gossip.comm] Send -> DEBU 3115 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:01.704 UTC [gossip.pull] Hello -> DEBU 3116 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:28:01.704 UTC [gossip.comm] Send -> DEBU 3117 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:01.704 UTC [gossip.comm] sendToEndpoint -> DEBU 3118 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.704 UTC [gossip.comm] sendToEndpoint -> DEBU 3119 Exiting" +"2019-05-02 09:28:01.706 UTC [gossip.comm] sendToEndpoint -> DEBU 311a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.706 UTC [gossip.comm] sendToEndpoint -> DEBU 311b Exiting" +"2019-05-02 09:28:01.706 UTC [gossip.comm] sendToEndpoint -> DEBU 311c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.711 UTC [gossip.comm] sendToEndpoint -> DEBU 311d Exiting" +"2019-05-02 09:28:01.711 UTC [gossip.comm] func1 -> DEBU 311e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 311f Exiting" +"2019-05-02 09:28:01.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3120 Exiting" +"2019-05-02 09:28:01.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3121 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.712 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3122 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3123 Verify: digest = 00000000 48 53 ee 5c 4c 3e e4 d3 4e 8f 96 84 9a ac a3 8d |HS.\L>..N.......| +00000010 ed 53 4d 86 94 cc 76 25 b4 41 f7 f1 89 1d d7 b0 |.SM...v%.A......|" +"2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3124 Verify: sig = 00000000 30 45 02 21 00 9c d7 15 31 f6 45 24 c3 70 48 39 |0E.!....1.E$.pH9| +00000010 ae bd b8 f1 03 40 47 26 45 f2 76 4d f6 20 3c ee |.....@G&E.vM. <.| +00000020 bc 6c 4f 63 5c 02 20 33 c3 d3 9b c6 0f 71 67 02 |.lOc\. 3.....qg.| +00000030 11 1b cb a9 22 ac 27 48 24 82 57 36 a3 96 3e c0 |....".'H$.W6..>.| +00000040 40 aa 4c 75 58 84 2f |@.LuX./|" +"2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3125 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:33.412 UTC [msp.identity] Verify -> DEBU 3197 Verify: sig = 00000000 30 44 02 20 4f 29 e8 5a 73 f8 99 e1 a4 29 96 79 |0D. O).Zs....).y| -00000010 87 f2 1b 3f 20 45 2d aa 2e c2 c7 48 80 05 77 13 |...? E-....H..w.| -00000020 a8 fe 57 46 02 20 08 8f 58 91 c5 ec 6a c6 8d 12 |..WF. ..X...j...| -00000030 2f fe 9a fc a9 3b e1 e9 70 ac 85 9e aa 85 4e 58 |/....;..p.....NX| -00000040 e0 1d 34 de e0 fc |..4...|" -"2019-05-02 01:31:33.413 UTC [gossip.discovery] handleAliveMessage -> DEBU 3198 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:33.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3199 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:31:33.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 319a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 " -"2019-05-02 01:31:33.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 319b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 " -"2019-05-02 01:31:33.414 UTC [gossip.discovery] learnExistingMembers -> DEBU 319c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:33.414 UTC [gossip.discovery] learnExistingMembers -> DEBU 319d Exiting" -"2019-05-02 01:31:33.414 UTC [gossip.discovery] handleAliveMessage -> DEBU 319e Exiting" -"2019-05-02 01:31:33.414 UTC [gossip.discovery] handleMsgFromComm -> DEBU 319f Exiting" -"2019-05-02 01:31:33.419 UTC [msp] DeserializeIdentity -> DEBU 31a0 Obtaining identity" -"2019-05-02 01:31:33.420 UTC [msp] DeserializeIdentity -> DEBU 31a1 Obtaining identity" -"2019-05-02 01:31:33.421 UTC [msp] DeserializeIdentity -> DEBU 31a2 Obtaining identity" -"2019-05-02 01:31:33.421 UTC [gossip.comm] Send -> DEBU 31a3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:33.421 UTC [msp] DeserializeIdentity -> DEBU 31a4 Obtaining identity" -"2019-05-02 01:31:33.421 UTC [gossip.comm] Send -> DEBU 31a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:33.421 UTC [gossip.comm] sendToEndpoint -> DEBU 31a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.421 UTC [gossip.comm] sendToEndpoint -> DEBU 31a7 Exiting" -"2019-05-02 01:31:33.422 UTC [gossip.comm] sendToEndpoint -> DEBU 31a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.426 UTC [gossip.comm] sendToEndpoint -> DEBU 31a9 Exiting" -"2019-05-02 01:31:33.427 UTC [gossip.gossip] handleMessage -> DEBU 31aa Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.427 UTC [gossip.gossip] handleMessage -> DEBU 31ab Exiting" -"2019-05-02 01:31:33.427 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.427 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 31ad Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:33.427 UTC [msp.identity] Verify -> DEBU 31ae Verify: digest = 00000000 65 b3 a2 c8 ff 0b bd d1 f8 b2 40 8d 2e d5 fb 12 |e.........@.....| -00000010 16 0a 22 1c e0 38 36 67 4a f1 26 f3 0e 73 9c d1 |.."..86gJ.&..s..|" -"2019-05-02 01:31:33.427 UTC [msp.identity] Verify -> DEBU 31af Verify: sig = 00000000 30 45 02 21 00 fb d5 8b 10 b0 47 52 48 d2 81 13 |0E.!......GRH...| -00000010 f7 83 3c d7 3b 33 a8 ee 6d ae 58 4b 56 35 11 ad |..<.;3..m.XKV5..| -00000020 01 af 8a 88 a1 02 20 48 64 6e 90 f5 06 94 67 b6 |...... Hdn....g.| -00000030 b4 cc 4e 52 66 8b 3a 9c fa 17 b4 20 7a 0e 04 50 |..NRf.:.... z..P| -00000040 72 27 19 d4 4c e4 67 |r'..L.g|" -"2019-05-02 01:31:33.427 UTC [msp.identity] Verify -> DEBU 31b0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:33.427 UTC [msp.identity] Verify -> DEBU 31b1 Verify: sig = 00000000 30 45 02 21 00 b3 73 a8 fc cc 58 28 74 99 bd 07 |0E.!..s...X(t...| -00000010 28 87 b3 65 6e b3 ba 40 e1 28 e8 29 4a 29 1e dc |(..en..@.(.)J)..| -00000020 4a 22 d4 d1 40 02 20 1e 21 1b 25 17 2c 94 6f 11 |J"..@. .!.%.,.o.| -00000030 6c 41 7f 41 8f c7 3d 3b eb e0 81 1f de 5d 2c d1 |lA.A..=;.....],.| -00000040 8a 32 53 f9 03 93 e2 |.2S....|" -"2019-05-02 01:31:33.432 UTC [gossip.comm] func1 -> DEBU 31b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.433 UTC [gossip.gossip] handleMessage -> DEBU 31b3 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.434 UTC [gossip.discovery] handleAliveMessage -> DEBU 31b4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:33.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 31b5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:33.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 31b6 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 " -"2019-05-02 01:31:33.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 31b7 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 " -"2019-05-02 01:31:33.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 31b8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:33.434 UTC [gossip.discovery] learnExistingMembers -> DEBU 31b9 Exiting" -"2019-05-02 01:31:33.434 UTC [gossip.discovery] handleAliveMessage -> DEBU 31ba Exiting" -"2019-05-02 01:31:33.434 UTC [gossip.discovery] sendMemResponse -> DEBU 31bb Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:33.435 UTC [msp] DeserializeIdentity -> DEBU 31bc Obtaining identity" -"2019-05-02 01:31:33.435 UTC [msp] DeserializeIdentity -> DEBU 31bd Obtaining identity" -"2019-05-02 01:31:33.436 UTC [gossip.comm] Send -> DEBU 31be Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:33.436 UTC [gossip.discovery] sendMemResponse -> DEBU 31bf Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:33.438 UTC [gossip.comm] sendToEndpoint -> DEBU 31c0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.438 UTC [gossip.comm] sendToEndpoint -> DEBU 31c1 Exiting" -"2019-05-02 01:31:33.434 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c2 Exiting" -"2019-05-02 01:31:33.441 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.441 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c4 Exiting" -"2019-05-02 01:31:33.442 UTC [gossip.gossip] handleMessage -> DEBU 31c5 Exiting" -"2019-05-02 01:31:33.452 UTC [gossip.comm] func1 -> DEBU 31c6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.452 UTC [gossip.gossip] handleMessage -> DEBU 31c7 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.452 UTC [gossip.gossip] handleMessage -> DEBU 31c8 Exiting" -"2019-05-02 01:31:33.452 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.452 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31ca Exiting" -"2019-05-02 01:31:33.475 UTC [gossip.comm] func1 -> DEBU 31cb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.475 UTC [gossip.gossip] handleMessage -> DEBU 31cc Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.475 UTC [gossip.gossip] handleMessage -> DEBU 31cd Exiting" -"2019-05-02 01:31:33.475 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31ce Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.475 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 31cf Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:33.475 UTC [msp] DeserializeIdentity -> DEBU 31d0 Obtaining identity" -"2019-05-02 01:31:33.475 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31d1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:33.475 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d2 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:33.475 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d3 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:33.475 UTC [policies] Evaluate -> DEBU 31d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:33.475 UTC [policies] Evaluate -> DEBU 31d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:33.475 UTC [policies] Evaluate -> DEBU 31d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:33.476 UTC [cauthdsl] func1 -> DEBU 31d7 0xc00040c2a0 gate 1556760693476001300 evaluation starts" -"2019-05-02 01:31:33.476 UTC [cauthdsl] func2 -> DEBU 31d8 0xc00040c2a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:33.476 UTC [cauthdsl] func2 -> DEBU 31d9 0xc00040c2a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:33.476 UTC [cauthdsl] func2 -> DEBU 31da 0xc00040c2a0 principal matched by identity 0" -"2019-05-02 01:31:33.476 UTC [msp.identity] Verify -> DEBU 31db Verify: digest = 00000000 e7 35 42 ed 6f f1 b5 be b3 6f 24 9c fa a0 11 f8 |.5B.o....o$.....| -00000010 5d 78 a4 90 e4 38 a9 b1 67 32 9f 3e 75 f2 b5 93 |]x...8..g2.>u...|" -"2019-05-02 01:31:33.476 UTC [msp.identity] Verify -> DEBU 31dc Verify: sig = 00000000 30 45 02 21 00 c0 fe fa c5 4b 66 e5 92 74 0e be |0E.!.....Kf..t..| -00000010 6d 66 5c 5f 45 a3 b2 54 64 bc 17 d5 66 9a d0 0f |mf\_E..Td...f...| -00000020 ea c0 0d a4 37 02 20 0c da 7f 75 cb 28 6a 47 46 |....7. ...u.(jGF| -00000030 2e 70 8d 77 93 d6 8e 56 f0 8e da 27 88 77 ca 14 |.p.w...V...'.w..| -00000040 e0 ab 23 a7 ef b4 36 |..#...6|" -"2019-05-02 01:31:33.476 UTC [cauthdsl] func2 -> DEBU 31dd 0xc00040c2a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:33.476 UTC [cauthdsl] func1 -> DEBU 31de 0xc00040c2a0 gate 1556760693476001300 evaluation succeeds" -"2019-05-02 01:31:33.476 UTC [policies] Evaluate -> DEBU 31df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:33.476 UTC [policies] Evaluate -> DEBU 31e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:33.476 UTC [policies] Evaluate -> DEBU 31e1 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:33.476 UTC [policies] Evaluate -> DEBU 31e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:33.476 UTC [gossip.discovery] handleAliveMessage -> DEBU 31e3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 31e4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:33.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 31e5 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 " -"2019-05-02 01:31:33.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 31e6 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 " -"2019-05-02 01:31:33.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 31e7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:33.476 UTC [gossip.discovery] learnExistingMembers -> DEBU 31e8 Exiting" -"2019-05-02 01:31:33.476 UTC [gossip.discovery] handleAliveMessage -> DEBU 31e9 Exiting" -"2019-05-02 01:31:33.476 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31ea Exiting" -"2019-05-02 01:31:33.483 UTC [gossip.gossip] handleMessage -> DEBU 31eb Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31ec Obtaining identity" -"2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31ed Obtaining identity" -"2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31ee Obtaining identity" -"2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31ef Obtaining identity" -"2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31f0 Obtaining identity" -"2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31f1 Obtaining identity" -"2019-05-02 01:31:33.485 UTC [gossip.comm] Send -> DEBU 31f2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31f3 Obtaining identity" -"2019-05-02 01:31:33.485 UTC [msp] DeserializeIdentity -> DEBU 31f4 Obtaining identity" -"2019-05-02 01:31:33.485 UTC [gossip.comm] Send -> DEBU 31f5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:33.485 UTC [gossip.comm] sendToEndpoint -> DEBU 31f6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.485 UTC [gossip.comm] sendToEndpoint -> DEBU 31f7 Exiting" -"2019-05-02 01:31:33.485 UTC [gossip.comm] sendToEndpoint -> DEBU 31f8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.485 UTC [gossip.comm] sendToEndpoint -> DEBU 31f9 Exiting" -"2019-05-02 01:31:33.483 UTC [gossip.gossip] handleMessage -> DEBU 31fa Exiting" -"2019-05-02 01:31:33.486 UTC [gossip.comm] func1 -> DEBU 31fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.486 UTC [gossip.gossip] handleMessage -> DEBU 31fc Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.486 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.487 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31fe Exiting" -"2019-05-02 01:31:33.488 UTC [gossip.gossip] handleMessage -> DEBU 31ff Exiting" -"2019-05-02 01:31:33.487 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3200 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.490 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3201 Exiting" -"2019-05-02 01:31:33.498 UTC [gossip.comm] func1 -> DEBU 3202 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.498 UTC [gossip.gossip] handleMessage -> DEBU 3203 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.498 UTC [gossip.pull] HandleMessage -> DEBU 3204 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 3205 Obtaining identity" -"2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 3206 Obtaining identity" -"2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 3207 Obtaining identity" -"2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 3208 Obtaining identity" -"2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 3209 Obtaining identity" -"2019-05-02 01:31:33.498 UTC [msp] DeserializeIdentity -> DEBU 320a Obtaining identity" -"2019-05-02 01:31:33.498 UTC [gossip.pull] SendDigest -> DEBU 320b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:33.498 UTC [gossip.gossip] handleMessage -> DEBU 320c Exiting" -"2019-05-02 01:31:33.521 UTC [gossip.comm] func1 -> DEBU 320d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.526 UTC [gossip.gossip] handleMessage -> DEBU 320e Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.526 UTC [gossip.gossip] handleMessage -> DEBU 320f Exiting" -"2019-05-02 01:31:33.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3210 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.526 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3211 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:33.526 UTC [msp] DeserializeIdentity -> DEBU 3212 Obtaining identity" -"2019-05-02 01:31:33.526 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3213 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:33.526 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3214 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:33.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3215 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:33.527 UTC [policies] Evaluate -> DEBU 3216 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:33.527 UTC [policies] Evaluate -> DEBU 3217 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:33.527 UTC [policies] Evaluate -> DEBU 3218 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:33.527 UTC [cauthdsl] func1 -> DEBU 3219 0xc00020dd90 gate 1556760693527256100 evaluation starts" -"2019-05-02 01:31:33.527 UTC [cauthdsl] func2 -> DEBU 321a 0xc00020dd90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:33.527 UTC [cauthdsl] func2 -> DEBU 321b 0xc00020dd90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:33.532 UTC [cauthdsl] func2 -> DEBU 321c 0xc00020dd90 principal matched by identity 0" -"2019-05-02 01:31:33.532 UTC [msp.identity] Verify -> DEBU 321d Verify: digest = 00000000 d0 13 df ae 07 68 85 c6 f8 a1 a1 d8 19 67 3f 3c |.....h.......g?<| -00000010 8f 04 72 84 e7 35 78 e1 85 08 ab 2c 62 c9 e3 84 |..r..5x....,b...|" -"2019-05-02 01:31:33.532 UTC [msp.identity] Verify -> DEBU 321e Verify: sig = 00000000 30 45 02 21 00 8d 6b 7e 52 02 e6 61 9c 20 99 b1 |0E.!..k~R..a. ..| -00000010 99 0a fd 85 2e b1 c9 31 11 f6 f1 3f f3 dc 43 c2 |.......1...?..C.| -00000020 3a 54 2b f1 a7 02 20 75 4c 1d e0 bf 90 71 86 50 |:T+... uL....q.P| -00000030 52 5f cf f9 5c a8 e7 b8 97 1d 11 90 ce 64 44 f1 |R_..\........dD.| -00000040 54 32 ad 6a 1f 93 91 |T2.j...|" -"2019-05-02 01:31:33.533 UTC [cauthdsl] func2 -> DEBU 321f 0xc00020dd90 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:33.533 UTC [cauthdsl] func1 -> DEBU 3220 0xc00020dd90 gate 1556760693527256100 evaluation succeeds" -"2019-05-02 01:31:33.533 UTC [policies] Evaluate -> DEBU 3221 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:33.533 UTC [policies] Evaluate -> DEBU 3222 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:33.533 UTC [policies] Evaluate -> DEBU 3223 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:33.533 UTC [policies] Evaluate -> DEBU 3224 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:33.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 3225 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:33.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3226 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:33.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3227 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 " -"2019-05-02 01:31:33.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3228 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 " -"2019-05-02 01:31:33.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 3229 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:33.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 322a Exiting" -"2019-05-02 01:31:33.536 UTC [gossip.discovery] handleAliveMessage -> DEBU 322b Exiting" -"2019-05-02 01:31:33.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU 322c Exiting" -"2019-05-02 01:31:33.536 UTC [gossip.discovery] sendMemResponse -> DEBU 322d Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:33.536 UTC [msp] DeserializeIdentity -> DEBU 322e Obtaining identity" -"2019-05-02 01:31:33.536 UTC [msp] DeserializeIdentity -> DEBU 322f Obtaining identity" -"2019-05-02 01:31:33.536 UTC [gossip.comm] func1 -> DEBU 3230 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.536 UTC [gossip.gossip] handleMessage -> DEBU 3231 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.536 UTC [msp] DeserializeIdentity -> DEBU 3232 Obtaining identity" -"2019-05-02 01:31:33.537 UTC [msp] DeserializeIdentity -> DEBU 3233 Obtaining identity" -"2019-05-02 01:31:33.537 UTC [msp] DeserializeIdentity -> DEBU 3234 Obtaining identity" -"2019-05-02 01:31:33.537 UTC [gossip.gossip] handleMessage -> DEBU 3235 Exiting" -"2019-05-02 01:31:33.536 UTC [msp] DeserializeIdentity -> DEBU 3236 Obtaining identity" -"2019-05-02 01:31:33.550 UTC [gossip.comm] Send -> DEBU 3237 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:33.550 UTC [gossip.discovery] sendMemResponse -> DEBU 3238 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:33.550 UTC [gossip.comm] sendToEndpoint -> DEBU 3239 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.550 UTC [gossip.comm] sendToEndpoint -> DEBU 323a Exiting" -"2019-05-02 01:31:33.697 UTC [msp.identity] Sign -> DEBU 323b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151024 " -"2019-05-02 01:31:33.697 UTC [msp.identity] Sign -> DEBU 323c Sign: digest: B5DEA04106AD6530B5FE87C0106DC5543120137253C2A2038859882276691DBC " -"2019-05-02 01:31:33.697 UTC [msp.identity] Sign -> DEBU 323d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:33.697 UTC [msp.identity] Sign -> DEBU 323e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:33.698 UTC [gossip.discovery] periodicalSendAlive -> DEBU 323f Sleeping 5s" -"2019-05-02 01:31:33.704 UTC [msp] DeserializeIdentity -> DEBU 3240 Obtaining identity" -"2019-05-02 01:31:33.704 UTC [msp] DeserializeIdentity -> DEBU 3241 Obtaining identity" -"2019-05-02 01:31:33.705 UTC [msp] DeserializeIdentity -> DEBU 3242 Obtaining identity" -"2019-05-02 01:31:33.705 UTC [gossip.comm] Send -> DEBU 3243 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:33.705 UTC [gossip.comm] Send -> DEBU 3244 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:33.705 UTC [msp] DeserializeIdentity -> DEBU 3245 Obtaining identity" -"2019-05-02 01:31:33.705 UTC [gossip.comm] Send -> DEBU 3246 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3247 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3248 Exiting" -"2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3249 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 324a Exiting" -"2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 324b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:33.705 UTC [gossip.comm] sendToEndpoint -> DEBU 324c Exiting" -"2019-05-02 01:31:33.709 UTC [gossip.comm] func1 -> DEBU 324d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.709 UTC [gossip.gossip] handleMessage -> DEBU 324e Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.710 UTC [gossip.pull] HandleMessage -> DEBU 324f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3250 Obtaining identity" -"2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3251 Obtaining identity" -"2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3252 Obtaining identity" -"2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3253 Obtaining identity" -"2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3254 Obtaining identity" -"2019-05-02 01:31:33.710 UTC [msp] DeserializeIdentity -> DEBU 3255 Obtaining identity" -"2019-05-02 01:31:33.710 UTC [gossip.pull] SendDigest -> DEBU 3256 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:33.710 UTC [gossip.gossip] handleMessage -> DEBU 3257 Exiting" -"2019-05-02 01:31:33.807 UTC [gossip.pull] Hello -> DEBU 3258 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:33.807 UTC [gossip.comm] Send -> DEBU 3259 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:33.808 UTC [gossip.pull] Hello -> DEBU 325a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:33.808 UTC [gossip.comm] Send -> DEBU 325b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:33.808 UTC [gossip.pull] Hello -> DEBU 325c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:33.808 UTC [gossip.comm] Send -> DEBU 325d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:33.808 UTC [gossip.comm] sendToEndpoint -> DEBU 325e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.809 UTC [gossip.comm] sendToEndpoint -> DEBU 325f Exiting" -"2019-05-02 01:31:33.809 UTC [gossip.comm] sendToEndpoint -> DEBU 3260 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.809 UTC [gossip.comm] sendToEndpoint -> DEBU 3261 Exiting" -"2019-05-02 01:31:33.809 UTC [gossip.comm] sendToEndpoint -> DEBU 3262 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.809 UTC [gossip.comm] sendToEndpoint -> DEBU 3263 Exiting" -"2019-05-02 01:31:33.811 UTC [gossip.comm] func1 -> DEBU 3264 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.811 UTC [gossip.gossip] handleMessage -> DEBU 3265 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.811 UTC [gossip.gossip] handleMessage -> DEBU 3266 Exiting" -"2019-05-02 01:31:33.812 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3267 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.812 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3268 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:33.812 UTC [msp] DeserializeIdentity -> DEBU 3269 Obtaining identity" -"2019-05-02 01:31:33.812 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 326a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:33.812 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326b Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:33.812 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326c Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:33.813 UTC [policies] Evaluate -> DEBU 326d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:33.813 UTC [policies] Evaluate -> DEBU 326e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:33.813 UTC [policies] Evaluate -> DEBU 326f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:33.813 UTC [cauthdsl] func1 -> DEBU 3270 0xc003ea6100 gate 1556760693813666800 evaluation starts" -"2019-05-02 01:31:33.813 UTC [cauthdsl] func2 -> DEBU 3271 0xc003ea6100 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:33.813 UTC [cauthdsl] func2 -> DEBU 3272 0xc003ea6100 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:33.814 UTC [cauthdsl] func2 -> DEBU 3273 0xc003ea6100 principal matched by identity 0" -"2019-05-02 01:31:33.814 UTC [msp.identity] Verify -> DEBU 3274 Verify: digest = 00000000 90 bf 7c 39 21 fd 63 b9 e2 64 3c 36 c5 07 67 22 |..|9!.c..d<6..g"| -00000010 aa 0b b9 61 f9 37 51 0e 1f 7f d7 6f 5b 85 cb d0 |...a.7Q....o[...|" -"2019-05-02 01:31:33.814 UTC [msp.identity] Verify -> DEBU 3275 Verify: sig = 00000000 30 44 02 20 4b b3 ba 9c b9 c4 8b f6 15 0d 21 3c |0D. K.........!<| -00000010 6f d1 77 75 94 4e c3 13 b4 e1 25 62 78 c4 01 65 |o.wu.N....%bx..e| -00000020 82 89 01 76 02 20 4f d7 03 1e f2 df 4e c0 e8 24 |...v. O.....N..$| -00000030 3e 72 34 94 16 c6 4d 44 8f 27 b4 9d ca 64 4a 8e |>r4...MD.'...dJ.| -00000040 33 3c a8 d1 79 ba |3<..y.|" -"2019-05-02 01:31:33.814 UTC [cauthdsl] func2 -> DEBU 3276 0xc003ea6100 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:33.815 UTC [cauthdsl] func1 -> DEBU 3277 0xc003ea6100 gate 1556760693813666800 evaluation succeeds" -"2019-05-02 01:31:33.815 UTC [policies] Evaluate -> DEBU 3278 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:33.815 UTC [policies] Evaluate -> DEBU 3279 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:33.815 UTC [policies] Evaluate -> DEBU 327a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:33.815 UTC [policies] Evaluate -> DEBU 327b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:33.815 UTC [gossip.discovery] handleAliveMessage -> DEBU 327c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 327d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:33.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 327e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 " -"2019-05-02 01:31:33.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 327f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 " -"2019-05-02 01:31:33.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 3280 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:33.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 3281 Exiting" -"2019-05-02 01:31:33.816 UTC [gossip.discovery] handleAliveMessage -> DEBU 3282 Exiting" -"2019-05-02 01:31:33.817 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3283 Exiting" -"2019-05-02 01:31:33.817 UTC [gossip.gossip] handleMessage -> DEBU 3284 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6263043557307600289 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.817 UTC [gossip.pull] HandleMessage -> DEBU 3285 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6263043557307600289 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.817 UTC [gossip.gossip] handleMessage -> DEBU 3286 Exiting" -"2019-05-02 01:31:33.819 UTC [gossip.comm] func1 -> DEBU 3287 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4251242008394749493 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.820 UTC [gossip.gossip] handleMessage -> DEBU 3288 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4251242008394749493 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.820 UTC [gossip.pull] HandleMessage -> DEBU 3289 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4251242008394749493 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.820 UTC [gossip.gossip] handleMessage -> DEBU 328a Exiting" -"2019-05-02 01:31:33.820 UTC [gossip.comm] func1 -> DEBU 328b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2750782800215786011 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.820 UTC [gossip.gossip] handleMessage -> DEBU 328c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2750782800215786011 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.821 UTC [gossip.pull] HandleMessage -> DEBU 328d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2750782800215786011 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.821 UTC [gossip.gossip] handleMessage -> DEBU 328e Exiting" -"2019-05-02 01:31:33.822 UTC [gossip.gossip] handleMessage -> DEBU 328f Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.822 UTC [gossip.gossip] handleMessage -> DEBU 3290 Exiting" -"2019-05-02 01:31:33.822 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3291 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.822 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3292 Exiting" -"2019-05-02 01:31:33.823 UTC [msp] DeserializeIdentity -> DEBU 3293 Obtaining identity" -"2019-05-02 01:31:33.824 UTC [msp] DeserializeIdentity -> DEBU 3294 Obtaining identity" -"2019-05-02 01:31:33.825 UTC [gossip.comm] func1 -> DEBU 3295 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.825 UTC [gossip.gossip] handleMessage -> DEBU 3296 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.825 UTC [gossip.gossip] handleMessage -> DEBU 3298 Exiting" -"2019-05-02 01:31:33.825 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3299 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.825 UTC [gossip.discovery] handleMsgFromComm -> DEBU 329a Exiting" -"2019-05-02 01:31:33.825 UTC [msp] DeserializeIdentity -> DEBU 3297 Obtaining identity" -"2019-05-02 01:31:33.825 UTC [msp] DeserializeIdentity -> DEBU 329b Obtaining identity" -"2019-05-02 01:31:33.826 UTC [msp] DeserializeIdentity -> DEBU 329c Obtaining identity" -"2019-05-02 01:31:33.826 UTC [msp] DeserializeIdentity -> DEBU 329d Obtaining identity" -"2019-05-02 01:31:33.826 UTC [msp] DeserializeIdentity -> DEBU 329e Obtaining identity" -"2019-05-02 01:31:33.826 UTC [gossip.comm] Send -> DEBU 329f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:33.826 UTC [gossip.comm] sendToEndpoint -> DEBU 32a0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.826 UTC [gossip.comm] sendToEndpoint -> DEBU 32a1 Exiting" -"2019-05-02 01:31:33.827 UTC [msp] DeserializeIdentity -> DEBU 32a2 Obtaining identity" -"2019-05-02 01:31:33.827 UTC [gossip.comm] Send -> DEBU 32a3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:33.827 UTC [gossip.comm] sendToEndpoint -> DEBU 32a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.827 UTC [gossip.comm] sendToEndpoint -> DEBU 32a5 Exiting" -"2019-05-02 01:31:33.868 UTC [gossip.comm] func1 -> DEBU 32a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.868 UTC [gossip.gossip] handleMessage -> DEBU 32a7 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.869 UTC [gossip.gossip] handleMessage -> DEBU 32a8 Exiting" -"2019-05-02 01:31:33.870 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32a9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.870 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32aa Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:33.871 UTC [msp] DeserializeIdentity -> DEBU 32ab Obtaining identity" -"2019-05-02 01:31:33.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32ac Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:33.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32ad Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:33.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32ae Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:33.872 UTC [policies] Evaluate -> DEBU 32af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:33.875 UTC [policies] Evaluate -> DEBU 32b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:33.876 UTC [policies] Evaluate -> DEBU 32b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:33.877 UTC [cauthdsl] func1 -> DEBU 32b2 0xc003ef7a80 gate 1556760693876313000 evaluation starts" -"2019-05-02 01:31:33.877 UTC [cauthdsl] func2 -> DEBU 32b3 0xc003ef7a80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:33.878 UTC [cauthdsl] func2 -> DEBU 32b4 0xc003ef7a80 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:33.879 UTC [cauthdsl] func2 -> DEBU 32b5 0xc003ef7a80 principal matched by identity 0" -"2019-05-02 01:31:33.880 UTC [msp.identity] Verify -> DEBU 32b6 Verify: digest = 00000000 0d d2 87 9b 4e da e0 f5 f0 42 15 d0 8d 88 18 93 |....N....B......| -00000010 25 d0 95 6d a0 76 e9 e1 31 a8 0d 46 7f 3c 2b e4 |%..m.v..1..F.<+.|" -"2019-05-02 01:31:33.884 UTC [msp.identity] Verify -> DEBU 32b7 Verify: sig = 00000000 30 44 02 20 7e 58 84 2c 19 12 bc c8 31 fe 59 a8 |0D. ~X.,....1.Y.| -00000010 5e 36 69 31 de 33 9a 7b 14 5a ba 19 ee eb 6c 4b |^6i1.3.{.Z....lK| -00000020 81 c0 2d 12 02 20 63 69 7a d3 14 94 95 6e 35 48 |..-.. ciz....n5H| -00000030 f0 7d 3c da f2 8a 8a 81 2d cf 40 95 93 3d 16 b2 |.}<.....-.@..=..| -00000040 99 25 1e 0b b1 db |.%....|" -"2019-05-02 01:31:33.886 UTC [cauthdsl] func2 -> DEBU 32b8 0xc003ef7a80 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:33.886 UTC [cauthdsl] func1 -> DEBU 32b9 0xc003ef7a80 gate 1556760693876313000 evaluation succeeds" -"2019-05-02 01:31:33.887 UTC [policies] Evaluate -> DEBU 32ba Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:33.887 UTC [policies] Evaluate -> DEBU 32bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:33.888 UTC [policies] Evaluate -> DEBU 32bc Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:33.888 UTC [policies] Evaluate -> DEBU 32bd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:33.889 UTC [gossip.discovery] handleAliveMessage -> DEBU 32be Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:33.889 UTC [gossip.discovery] learnExistingMembers -> DEBU 32bf Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:33.889 UTC [gossip.discovery] learnExistingMembers -> DEBU 32c0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 " -"2019-05-02 01:31:33.889 UTC [gossip.discovery] learnExistingMembers -> DEBU 32c1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 " -"2019-05-02 01:31:33.890 UTC [gossip.discovery] learnExistingMembers -> DEBU 32c2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:33.890 UTC [gossip.discovery] learnExistingMembers -> DEBU 32c3 Exiting" -"2019-05-02 01:31:33.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 32c4 Exiting" -"2019-05-02 01:31:33.891 UTC [gossip.discovery] sendMemResponse -> DEBU 32c5 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:33.891 UTC [msp] DeserializeIdentity -> DEBU 32c7 Obtaining identity" -"2019-05-02 01:31:33.892 UTC [msp] DeserializeIdentity -> DEBU 32c8 Obtaining identity" -"2019-05-02 01:31:33.892 UTC [msp] DeserializeIdentity -> DEBU 32c9 Obtaining identity" -"2019-05-02 01:31:33.892 UTC [gossip.comm] Send -> DEBU 32ca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:33.892 UTC [gossip.discovery] sendMemResponse -> DEBU 32cb Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:33.892 UTC [gossip.comm] sendToEndpoint -> DEBU 32cc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:33.892 UTC [gossip.comm] sendToEndpoint -> DEBU 32cd Exiting" -"2019-05-02 01:31:33.891 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32c6 Exiting" -"2019-05-02 01:31:34.150 UTC [msp.identity] Sign -> DEBU 32ce Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151025 " -"2019-05-02 01:31:34.151 UTC [msp.identity] Sign -> DEBU 32cf Sign: digest: 5858C329ED8041900FC479312BB64E8591CA3B302BECCDD48FDA5707D62E1C53 " -"2019-05-02 01:31:34.151 UTC [msp.identity] Sign -> DEBU 32d0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:34.151 UTC [msp.identity] Sign -> DEBU 32d1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:34.151 UTC [gossip.comm] Send -> DEBU 32d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:34.151 UTC [msp] DeserializeIdentity -> DEBU 32d3 Obtaining identity" -"2019-05-02 01:31:34.152 UTC [gossip.comm] Send -> DEBU 32d4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:34.152 UTC [msp] DeserializeIdentity -> DEBU 32d5 Obtaining identity" -"2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32d6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32d7 Exiting" -"2019-05-02 01:31:34.152 UTC [gossip.comm] Send -> DEBU 32d8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32d9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32da Exiting" -"2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32db Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.152 UTC [gossip.comm] sendToEndpoint -> DEBU 32dc Exiting" -"2019-05-02 01:31:34.155 UTC [gossip.comm] func1 -> DEBU 32dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.155 UTC [gossip.gossip] handleMessage -> DEBU 32de Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.155 UTC [gossip.gossip] handleMessage -> DEBU 32df Exiting" -"2019-05-02 01:31:34.155 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32e0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.156 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32e1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:34.156 UTC [msp] DeserializeIdentity -> DEBU 32e2 Obtaining identity" -"2019-05-02 01:31:34.156 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:34.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32e4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:34.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32e5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:34.156 UTC [cauthdsl] func1 -> DEBU 32e9 0xc00278cf60 gate 1556760694156419900 evaluation starts" -"2019-05-02 01:31:34.156 UTC [cauthdsl] func2 -> DEBU 32ea 0xc00278cf60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:34.156 UTC [cauthdsl] func2 -> DEBU 32eb 0xc00278cf60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:34.156 UTC [cauthdsl] func2 -> DEBU 32ec 0xc00278cf60 principal matched by identity 0" -"2019-05-02 01:31:34.156 UTC [msp.identity] Verify -> DEBU 32ed Verify: digest = 00000000 d0 13 df ae 07 68 85 c6 f8 a1 a1 d8 19 67 3f 3c |.....h.......g?<| -00000010 8f 04 72 84 e7 35 78 e1 85 08 ab 2c 62 c9 e3 84 |..r..5x....,b...|" -"2019-05-02 01:31:34.156 UTC [msp.identity] Verify -> DEBU 32ee Verify: sig = 00000000 30 45 02 21 00 8d 6b 7e 52 02 e6 61 9c 20 99 b1 |0E.!..k~R..a. ..| -00000010 99 0a fd 85 2e b1 c9 31 11 f6 f1 3f f3 dc 43 c2 |.......1...?..C.| -00000020 3a 54 2b f1 a7 02 20 75 4c 1d e0 bf 90 71 86 50 |:T+... uL....q.P| -00000030 52 5f cf f9 5c a8 e7 b8 97 1d 11 90 ce 64 44 f1 |R_..\........dD.| -00000040 54 32 ad 6a 1f 93 91 |T2.j...|" -"2019-05-02 01:31:34.156 UTC [cauthdsl] func2 -> DEBU 32ef 0xc00278cf60 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:34.156 UTC [cauthdsl] func1 -> DEBU 32f0 0xc00278cf60 gate 1556760694156419900 evaluation succeeds" -"2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32f3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:34.156 UTC [policies] Evaluate -> DEBU 32f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:34.156 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:34.157 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f6 Exiting" -"2019-05-02 01:31:34.157 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32f7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:34.157 UTC [msp.identity] Verify -> DEBU 32f8 Verify: digest = 00000000 58 58 c3 29 ed 80 41 90 0f c4 79 31 2b b6 4e 85 |XX.)..A...y1+.N.| -00000010 91 ca 3b 30 2b ec cd d4 8f da 57 07 d6 2e 1c 53 |..;0+.....W....S|" -"2019-05-02 01:31:34.157 UTC [msp.identity] Verify -> DEBU 32f9 Verify: sig = 00000000 30 44 02 20 26 b0 bb 5e e1 52 1a 36 c2 a5 e7 35 |0D. &..^.R.6...5| -00000010 a8 bb d4 c2 e5 50 ca 85 c0 ca 94 be ec ca 54 43 |.....P........TC| -00000020 4b 03 58 eb 02 20 75 60 73 b1 73 0f e0 13 05 d6 |K.X.. u`s.s.....| -00000030 41 d6 ad 0e 18 04 76 38 d6 e7 70 47 a0 c5 26 f7 |A.....v8..pG..&.| -00000040 4b 9b d7 ff 51 59 |K...QY|" -"2019-05-02 01:31:34.157 UTC [gossip.discovery] handleAliveMessage -> DEBU 32fa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:34.157 UTC [gossip.comm] func1 -> DEBU 32fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.157 UTC [gossip.discovery] isSentByMe -> DEBU 32fc Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:34.157 UTC [gossip.gossip] handleMessage -> DEBU 32fd Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 32fe Exiting" -"2019-05-02 01:31:34.160 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32ff Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:34.161 UTC [msp.identity] Verify -> DEBU 3300 Verify: digest = 00000000 65 b3 a2 c8 ff 0b bd d1 f8 b2 40 8d 2e d5 fb 12 |e.........@.....| -00000010 16 0a 22 1c e0 38 36 67 4a f1 26 f3 0e 73 9c d1 |.."..86gJ.&..s..|" -"2019-05-02 01:31:34.161 UTC [msp.identity] Verify -> DEBU 3301 Verify: sig = 00000000 30 45 02 21 00 fb d5 8b 10 b0 47 52 48 d2 81 13 |0E.!......GRH...| -00000010 f7 83 3c d7 3b 33 a8 ee 6d ae 58 4b 56 35 11 ad |..<.;3..m.XKV5..| -00000020 01 af 8a 88 a1 02 20 48 64 6e 90 f5 06 94 67 b6 |...... Hdn....g.| -00000030 b4 cc 4e 52 66 8b 3a 9c fa 17 b4 20 7a 0e 04 50 |..NRf.:.... z..P| -00000040 72 27 19 d4 4c e4 67 |r'..L.g|" -"2019-05-02 01:31:34.161 UTC [gossip.discovery] handleAliveMessage -> DEBU 3302 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:34.161 UTC [gossip.discovery] handleAliveMessage -> DEBU 3303 Exiting" -"2019-05-02 01:31:34.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3304 Exiting" -"2019-05-02 01:31:34.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3305 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.161 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3306 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:34.162 UTC [msp.identity] Verify -> DEBU 3307 Verify: digest = 00000000 58 58 c3 29 ed 80 41 90 0f c4 79 31 2b b6 4e 85 |XX.)..A...y1+.N.| -00000010 91 ca 3b 30 2b ec cd d4 8f da 57 07 d6 2e 1c 53 |..;0+.....W....S|" -"2019-05-02 01:31:34.162 UTC [msp.identity] Verify -> DEBU 3308 Verify: sig = 00000000 30 44 02 20 26 b0 bb 5e e1 52 1a 36 c2 a5 e7 35 |0D. &..^.R.6...5| -00000010 a8 bb d4 c2 e5 50 ca 85 c0 ca 94 be ec ca 54 43 |.....P........TC| -00000020 4b 03 58 eb 02 20 75 60 73 b1 73 0f e0 13 05 d6 |K.X.. u`s.s.....| -00000030 41 d6 ad 0e 18 04 76 38 d6 e7 70 47 a0 c5 26 f7 |A.....v8..pG..&.| -00000040 4b 9b d7 ff 51 59 |K...QY|" -"2019-05-02 01:31:34.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 3309 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:34.162 UTC [gossip.discovery] isSentByMe -> DEBU 330a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:34.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 330b Exiting" -"2019-05-02 01:31:34.162 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 330c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:34.162 UTC [msp.identity] Verify -> DEBU 330d Verify: digest = 00000000 65 b3 a2 c8 ff 0b bd d1 f8 b2 40 8d 2e d5 fb 12 |e.........@.....| -00000010 16 0a 22 1c e0 38 36 67 4a f1 26 f3 0e 73 9c d1 |.."..86gJ.&..s..|" -"2019-05-02 01:31:34.162 UTC [msp.identity] Verify -> DEBU 330e Verify: sig = 00000000 30 45 02 21 00 fb d5 8b 10 b0 47 52 48 d2 81 13 |0E.!......GRH...| -00000010 f7 83 3c d7 3b 33 a8 ee 6d ae 58 4b 56 35 11 ad |..<.;3..m.XKV5..| -00000020 01 af 8a 88 a1 02 20 48 64 6e 90 f5 06 94 67 b6 |...... Hdn....g.| -00000030 b4 cc 4e 52 66 8b 3a 9c fa 17 b4 20 7a 0e 04 50 |..NRf.:.... z..P| -00000040 72 27 19 d4 4c e4 67 |r'..L.g|" -"2019-05-02 01:31:34.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 330f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:34.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 3310 Exiting" -"2019-05-02 01:31:34.162 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3311 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:34.162 UTC [msp] DeserializeIdentity -> DEBU 3312 Obtaining identity" -"2019-05-02 01:31:34.163 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3313 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:34.163 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3314 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:34.163 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3315 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3316 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3317 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3318 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:34.163 UTC [cauthdsl] func1 -> DEBU 3319 0xc00416f880 gate 1556760694163295200 evaluation starts" -"2019-05-02 01:31:34.163 UTC [cauthdsl] func2 -> DEBU 331a 0xc00416f880 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:34.163 UTC [cauthdsl] func2 -> DEBU 331b 0xc00416f880 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:34.163 UTC [cauthdsl] func2 -> DEBU 331c 0xc00416f880 principal matched by identity 0" -"2019-05-02 01:31:34.163 UTC [msp.identity] Verify -> DEBU 331d Verify: digest = 00000000 0d d2 87 9b 4e da e0 f5 f0 42 15 d0 8d 88 18 93 |....N....B......| -00000010 25 d0 95 6d a0 76 e9 e1 31 a8 0d 46 7f 3c 2b e4 |%..m.v..1..F.<+.|" -"2019-05-02 01:31:34.163 UTC [msp.identity] Verify -> DEBU 331e Verify: sig = 00000000 30 44 02 20 7e 58 84 2c 19 12 bc c8 31 fe 59 a8 |0D. ~X.,....1.Y.| -00000010 5e 36 69 31 de 33 9a 7b 14 5a ba 19 ee eb 6c 4b |^6i1.3.{.Z....lK| -00000020 81 c0 2d 12 02 20 63 69 7a d3 14 94 95 6e 35 48 |..-.. ciz....n5H| -00000030 f0 7d 3c da f2 8a 8a 81 2d cf 40 95 93 3d 16 b2 |.}<.....-.@..=..| -00000040 99 25 1e 0b b1 db |.%....|" -"2019-05-02 01:31:34.163 UTC [cauthdsl] func2 -> DEBU 331f 0xc00416f880 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:34.163 UTC [cauthdsl] func1 -> DEBU 3320 0xc00416f880 gate 1556760694163295200 evaluation succeeds" -"2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3321 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3322 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3323 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:34.163 UTC [policies] Evaluate -> DEBU 3324 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:34.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 3325 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:34.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 3326 Exiting" -"2019-05-02 01:31:34.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3327 Exiting" -"2019-05-02 01:31:34.164 UTC [gossip.gossip] handleMessage -> DEBU 3328 Exiting" -"2019-05-02 01:31:34.164 UTC [gossip.gossip] handleMessage -> DEBU 3329 Entering, 192.168.240.6:44982 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.164 UTC [gossip.gossip] handleMessage -> DEBU 332a Exiting" -"2019-05-02 01:31:34.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 332b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" -"2019-05-02 01:31:34.164 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 332c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:34.164 UTC [msp.identity] Verify -> DEBU 332d Verify: digest = 00000000 58 58 c3 29 ed 80 41 90 0f c4 79 31 2b b6 4e 85 |XX.)..A...y1+.N.| -00000010 91 ca 3b 30 2b ec cd d4 8f da 57 07 d6 2e 1c 53 |..;0+.....W....S|" -"2019-05-02 01:31:34.164 UTC [msp.identity] Verify -> DEBU 332e Verify: sig = 00000000 30 44 02 20 26 b0 bb 5e e1 52 1a 36 c2 a5 e7 35 |0D. &..^.R.6...5| -00000010 a8 bb d4 c2 e5 50 ca 85 c0 ca 94 be ec ca 54 43 |.....P........TC| -00000020 4b 03 58 eb 02 20 75 60 73 b1 73 0f e0 13 05 d6 |K.X.. u`s.s.....| -00000030 41 d6 ad 0e 18 04 76 38 d6 e7 70 47 a0 c5 26 f7 |A.....v8..pG..&.| -00000040 4b 9b d7 ff 51 59 |K...QY|" -"2019-05-02 01:31:34.164 UTC [msp.identity] Verify -> DEBU 332f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:34.164 UTC [msp.identity] Verify -> DEBU 3330 Verify: sig = 00000000 30 44 02 20 16 99 b6 60 b6 91 48 d8 a8 04 66 2e |0D. ...`..H...f.| -00000010 40 1f 82 48 86 99 84 4e 2f 6f 38 d9 52 94 3b b4 |@..H...N/o8.R.;.| -00000020 0f 91 6a ca 02 20 08 1d e0 54 84 be 89 38 69 18 |..j.. ...T...8i.| -00000030 aa ae cc 6a 67 9a 62 9c cc 6a 2d ec a8 b8 96 c3 |...jg.b..j-.....| -00000040 9c 7b 1b 19 e6 e4 |.{....|" -"2019-05-02 01:31:34.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 3331 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:34.164 UTC [gossip.discovery] isSentByMe -> DEBU 3332 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:34.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 3333 Exiting" -"2019-05-02 01:31:34.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3334 Exiting" -"2019-05-02 01:31:35.136 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3335 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.137 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3336 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.137 UTC [policies] Evaluate -> DEBU 3337 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-05-02 01:31:35.137 UTC [policies] Evaluate -> DEBU 3338 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.138 UTC [policies] Evaluate -> DEBU 3339 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-05-02 01:31:35.139 UTC [cauthdsl] func1 -> DEBU 333a 0xc003a8c5c0 gate 1556760695138858500 evaluation starts" -"2019-05-02 01:31:35.139 UTC [cauthdsl] func2 -> DEBU 333b 0xc003a8c5c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.139 UTC [cauthdsl] func2 -> DEBU 333c 0xc003a8c5c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.139 UTC [cauthdsl] func2 -> DEBU 333d 0xc003a8c5c0 principal matched by identity 0" -"2019-05-02 01:31:35.139 UTC [msp.identity] Verify -> DEBU 333e Verify: digest = 00000000 ca 3f cc 53 0d 60 63 d0 40 56 6e 78 d2 62 67 1a |.?.S.`c.@Vnx.bg.| -00000010 ba 4e 2c a2 cb 95 4d d3 7a 6a 0b 78 11 5c bc e4 |.N,...M.zj.x.\..|" -"2019-05-02 01:31:35.139 UTC [msp.identity] Verify -> DEBU 333f Verify: sig = 00000000 30 45 02 21 00 d6 b8 6d b6 2c 16 d2 68 fb 8a 9b |0E.!...m.,..h...| -00000010 51 c7 63 29 9c b8 fc 3b 14 ba a2 6f ec 43 59 70 |Q.c)...;...o.CYp| -00000020 b7 37 e2 95 3e 02 20 0f 68 8e a3 43 1d 29 02 0a |.7..>. .h..C.)..| -00000030 04 e4 73 71 5c 2f d0 b7 93 0d 3e 80 59 7f b8 5c |..sq\/....>.Y..\| -00000040 3c 8e 90 5f b9 50 d0 |<.._.P.|" -"2019-05-02 01:31:35.140 UTC [cauthdsl] func2 -> DEBU 3340 0xc003a8c5c0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.140 UTC [cauthdsl] func1 -> DEBU 3341 0xc003a8c5c0 gate 1556760695138858500 evaluation succeeds" -"2019-05-02 01:31:35.140 UTC [policies] Evaluate -> DEBU 3342 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:35.140 UTC [policies] Evaluate -> DEBU 3343 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:35.141 UTC [policies] Evaluate -> DEBU 3344 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:35.141 UTC [policies] Evaluate -> DEBU 3345 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:35.141 UTC [blocksProvider] DeliverBlocks -> DEBU 3346 [businesschannel] Adding payload to local buffer, blockNum = [9]" -"2019-05-02 01:31:35.141 UTC [gossip.state] addPayload -> DEBU 3347 [businesschannel] Adding payload to local buffer, blockNum = [9]" -"2019-05-02 01:31:35.142 UTC [gossip.state] addPayload -> DEBU 3348 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-05-02 01:31:35.142 UTC [blocksProvider] DeliverBlocks -> DEBU 3349 [businesschannel] Gossiping block [9], peers number [3]" -"2019-05-02 01:31:35.142 UTC [gossip.channel] AddToMsgStore -> DEBU 334a Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35012 bytes, seq: 9}, Envelope: 35045 bytes, Signature: 0 bytes to the block puller" -"2019-05-02 01:31:35.142 UTC [gossip.pull] Add -> DEBU 334b Added 9, total items: 9" -"2019-05-02 01:31:35.142 UTC [gossip.state] deliverPayloads -> DEBU 334c [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [9]" -"2019-05-02 01:31:35.142 UTC [gossip.state] deliverPayloads -> DEBU 334d [businesschannel] Transferring block [9] with 1 transaction(s) to the ledger" -"2019-05-02 01:31:35.143 UTC [gossip.privdata] StoreBlock -> INFO 334e [businesschannel] Received block [9] from buffer" -"2019-05-02 01:31:35.143 UTC [gossip.privdata] StoreBlock -> DEBU 334f [businesschannel] Validating block [9]" -"2019-05-02 01:31:35.143 UTC [committer.txvalidator] Validate -> DEBU 3350 [businesschannel] START Block Validation for block [9]" -"2019-05-02 01:31:35.144 UTC [committer.txvalidator] Validate -> DEBU 3351 expecting 1 block validation responses" -"2019-05-02 01:31:35.144 UTC [committer.txvalidator] validateTx -> DEBU 3352 [businesschannel] validateTx starts for block 0xc00382f440 env 0xc0044452c0 txn 0" -"2019-05-02 01:31:35.144 UTC [protoutils] ValidateTransaction -> DEBU 3353 ValidateTransactionEnvelope starts for envelope 0xc0044452c0" -"2019-05-02 01:31:35.144 UTC [protoutils] ValidateTransaction -> DEBU 3354 Header is channel_header:"\010\001\032\006\010\366\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\342\231\345\226\0025\271\2400`k\010\002\376=~\236\377\001X\304\311\352J" " -"2019-05-02 01:31:35.144 UTC [protoutils] validateChannelHeader -> DEBU 3355 validateChannelHeader info: header type 1" -"2019-05-02 01:31:35.144 UTC [msp] DeserializeIdentity -> DEBU 3356 Obtaining identity" -"2019-05-02 01:31:35.144 UTC [protoutils] checkSignatureFromCreator -> DEBU 3357 begin" -"2019-05-02 01:31:35.144 UTC [msp] GetManagerForChain -> DEBU 3358 Returning existing manager for channel 'businesschannel'" -"2019-05-02 01:31:35.144 UTC [msp] DeserializeIdentity -> DEBU 3359 Obtaining identity" -"2019-05-02 01:31:35.144 UTC [msp] DeserializeIdentity -> DEBU 335a Obtaining identity" -"2019-05-02 01:31:35.144 UTC [msp.identity] newIdentity -> DEBU 335b Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:01.712 UTC [msp.identity] Verify -> DEBU 3126 Verify: sig = 00000000 30 44 02 20 14 d7 8d c3 c1 30 71 df cd b8 41 10 |0D. .....0q...A.| +00000010 95 8d 4a c4 e4 23 5b 54 f9 c9 23 3d 93 17 3d ea |..J..#[T..#=..=.| +00000020 0e 20 c9 6d 02 20 27 65 aa 8c 81 7e 2f 11 d5 b1 |. .m. 'e...~/...| +00000030 cd d1 f1 44 cd 61 45 e4 ae 33 e8 c2 50 3d 9a 93 |...D.aE..3..P=..| +00000040 e5 ce bf 36 d4 17 |...6..|" +"2019-05-02 09:28:01.712 UTC [gossip.discovery] handleAliveMessage -> DEBU 3127 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:01.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3128 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:28:01.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3129 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 " +"2019-05-02 09:28:01.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 312a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 " +"2019-05-02 09:28:01.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 312b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:01.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 312c Exiting" +"2019-05-02 09:28:01.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 312d Exiting" +"2019-05-02 09:28:01.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 312e Exiting" +"2019-05-02 09:28:01.713 UTC [gossip.discovery] sendMemResponse -> DEBU 312f Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:01.713 UTC [msp] DeserializeIdentity -> DEBU 3130 Obtaining identity" +"2019-05-02 09:28:01.713 UTC [msp] DeserializeIdentity -> DEBU 3131 Obtaining identity" +"2019-05-02 09:28:01.713 UTC [gossip.comm] Send -> DEBU 3132 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3133 Exiting" +"2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3134 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 3135 Obtaining identity" +"2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 3136 Obtaining identity" +"2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 3137 Obtaining identity" +"2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3138 Exiting" +"2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 3139 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.714 UTC [gossip.gossip] handleMessage -> DEBU 313a Exiting" +"2019-05-02 09:28:01.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 313b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.714 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 313c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:01.714 UTC [msp] DeserializeIdentity -> DEBU 313d Obtaining identity" +"2019-05-02 09:28:01.714 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 313e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:01.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 313f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:01.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3140 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3141 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3142 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3143 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:01.715 UTC [cauthdsl] func1 -> DEBU 3144 0xc003d94e10 gate 1556789281715104400 evaluation starts" +"2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3145 0xc003d94e10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3146 0xc003d94e10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3147 0xc003d94e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:01.715 UTC [cauthdsl] func2 -> DEBU 3148 0xc003d94e10 principal evaluation fails" +"2019-05-02 09:28:01.715 UTC [cauthdsl] func1 -> DEBU 3149 0xc003d94e10 gate 1556789281715104400 evaluation fails" +"2019-05-02 09:28:01.714 UTC [gossip.discovery] sendMemResponse -> DEBU 314a Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:28:01.719 UTC [gossip.comm] sendToEndpoint -> DEBU 314b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.719 UTC [gossip.comm] sendToEndpoint -> DEBU 314c Exiting" +"2019-05-02 09:28:01.719 UTC [gossip.gossip] handleMessage -> DEBU 314d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9695688311555706345 , Msg_type: BLOCK_MSG, digests: [1 3 4 5 6 7 8 2], Envelope: 58 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.720 UTC [gossip.pull] HandleMessage -> DEBU 314e GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9695688311555706345 , Msg_type: BLOCK_MSG, digests: [1 3 4 5 6 7 8 2], Envelope: 58 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 314f Exiting" +"2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3150 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7896500689143047538 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.720 UTC [gossip.pull] HandleMessage -> DEBU 3151 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7896500689143047538 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3152 Exiting" +"2019-05-02 09:28:01.720 UTC [gossip.comm] func1 -> DEBU 3153 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10766680169397763346 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3154 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10766680169397763346 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.720 UTC [gossip.pull] HandleMessage -> DEBU 3155 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10766680169397763346 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.720 UTC [gossip.gossip] handleMessage -> DEBU 3156 Exiting" +"2019-05-02 09:28:01.715 UTC [policies] Evaluate -> DEBU 3157 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3158 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3159 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:01.724 UTC [cauthdsl] func1 -> DEBU 315a 0xc003d956d0 gate 1556789281724493100 evaluation starts" +"2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 315b 0xc003d956d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 315c 0xc003d956d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 315d 0xc003d956d0 principal matched by identity 0" +"2019-05-02 09:28:01.724 UTC [msp.identity] Verify -> DEBU 315e Verify: digest = 00000000 56 97 ff ce ca 60 9d ee 53 04 d7 ae 73 80 31 93 |V....`..S...s.1.| +00000010 9f d2 cf 79 d3 74 2a af c1 f1 19 59 62 42 52 50 |...y.t*....YbBRP|" +"2019-05-02 09:28:01.724 UTC [msp.identity] Verify -> DEBU 315f Verify: sig = 00000000 30 45 02 21 00 a5 ce 70 09 cf 42 3d 9d d1 55 cd |0E.!...p..B=..U.| +00000010 a7 2f 28 50 65 e8 72 4e bf 61 09 6b ae 51 04 59 |./(Pe.rN.a.k.Q.Y| +00000020 5a b9 2f bf 5d 02 20 1b 61 2d 29 13 9b b9 88 54 |Z./.]. .a-)....T| +00000030 21 6f 85 5e d0 c3 d7 89 83 29 f5 f5 0b a0 77 84 |!o.^.....)....w.| +00000040 0c 31 69 cf 79 7f e3 |.1i.y..|" +"2019-05-02 09:28:01.724 UTC [cauthdsl] func2 -> DEBU 3160 0xc003d956d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:01.724 UTC [cauthdsl] func1 -> DEBU 3161 0xc003d956d0 gate 1556789281724493100 evaluation succeeds" +"2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3162 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:01.724 UTC [policies] Evaluate -> DEBU 3163 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:01.725 UTC [policies] Evaluate -> DEBU 3164 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:01.725 UTC [policies] Evaluate -> DEBU 3165 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:01.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 3166 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 3167 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 3168 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 " +"2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 3169 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 " +"2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 316a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:01.725 UTC [gossip.discovery] learnExistingMembers -> DEBU 316b Exiting" +"2019-05-02 09:28:01.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 316c Exiting" +"2019-05-02 09:28:01.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 316d Exiting" +"2019-05-02 09:28:01.725 UTC [gossip.discovery] sendMemResponse -> DEBU 316e Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:01.725 UTC [msp] DeserializeIdentity -> DEBU 316f Obtaining identity" +"2019-05-02 09:28:01.725 UTC [msp] DeserializeIdentity -> DEBU 3170 Obtaining identity" +"2019-05-02 09:28:01.725 UTC [msp] DeserializeIdentity -> DEBU 3171 Obtaining identity" +"2019-05-02 09:28:01.725 UTC [gossip.comm] Send -> DEBU 3172 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:01.725 UTC [gossip.discovery] sendMemResponse -> DEBU 3173 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:01.725 UTC [gossip.comm] sendToEndpoint -> DEBU 3174 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.726 UTC [gossip.comm] sendToEndpoint -> DEBU 3175 Exiting" +"2019-05-02 09:28:01.737 UTC [gossip.gossip] handleMessage -> DEBU 3176 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 357036938197498236 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.737 UTC [gossip.pull] HandleMessage -> DEBU 3177 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 357036938197498236 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:01.737 UTC [gossip.gossip] handleMessage -> DEBU 3178 Exiting" +"2019-05-02 09:28:02.321 UTC [gossip.election] waitForInterrupt -> DEBU 3179 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:28:02.321 UTC [gossip.election] IsLeader -> DEBU 317a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:28:02.321 UTC [msp.identity] Sign -> DEBU 317b Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100A1801 " +"2019-05-02 09:28:02.321 UTC [msp.identity] Sign -> DEBU 317c Sign: digest: 39011A784D8265CF26E4949B56D8EADCEAC3516E1B7DE5319533E33B891E4D76 " +"2019-05-02 09:28:02.321 UTC [gossip.election] waitForInterrupt -> DEBU 317d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 317e Obtaining identity" +"2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 317f Obtaining identity" +"2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3180 Obtaining identity" +"2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3181 Obtaining identity" +"2019-05-02 09:28:02.329 UTC [gossip.comm] Send -> DEBU 3182 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3183 Obtaining identity" +"2019-05-02 09:28:02.329 UTC [msp] DeserializeIdentity -> DEBU 3184 Obtaining identity" +"2019-05-02 09:28:02.330 UTC [gossip.comm] sendToEndpoint -> DEBU 3185 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-05-02 09:28:02.330 UTC [gossip.comm] sendToEndpoint -> DEBU 3186 Exiting" +"2019-05-02 09:28:03.803 UTC [gossip.comm] func1 -> DEBU 3187 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:03.804 UTC [gossip.gossip] handleMessage -> DEBU 3188 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:03.804 UTC [gossip.gossip] handleMessage -> DEBU 3189 Exiting" +"2019-05-02 09:28:03.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 318a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:03.805 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 318b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:03.806 UTC [msp] DeserializeIdentity -> DEBU 318c Obtaining identity" +"2019-05-02 09:28:03.807 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 318d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:03.807 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 318e Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:03.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 318f Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:03.809 UTC [policies] Evaluate -> DEBU 3190 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:03.809 UTC [policies] Evaluate -> DEBU 3191 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:03.810 UTC [policies] Evaluate -> DEBU 3192 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:03.810 UTC [cauthdsl] func1 -> DEBU 3193 0xc00421efe0 gate 1556789283810632600 evaluation starts" +"2019-05-02 09:28:03.811 UTC [cauthdsl] func2 -> DEBU 3194 0xc00421efe0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:03.811 UTC [cauthdsl] func2 -> DEBU 3195 0xc00421efe0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:03.816 UTC [cauthdsl] func2 -> DEBU 3197 0xc00421efe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:03.816 UTC [cauthdsl] func2 -> DEBU 3198 0xc00421efe0 principal evaluation fails" +"2019-05-02 09:28:03.815 UTC [gossip.gossip] handleMessage -> DEBU 3196 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:03.817 UTC [cauthdsl] func1 -> DEBU 3199 0xc00421efe0 gate 1556789283810632600 evaluation fails" +"2019-05-02 09:28:03.819 UTC [policies] Evaluate -> DEBU 319a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:03.819 UTC [policies] Evaluate -> DEBU 319b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:03.820 UTC [policies] Evaluate -> DEBU 319c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:03.821 UTC [cauthdsl] func1 -> DEBU 319d 0xc00421f820 gate 1556789283821644400 evaluation starts" +"2019-05-02 09:28:03.822 UTC [cauthdsl] func2 -> DEBU 319e 0xc00421f820 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:03.823 UTC [cauthdsl] func2 -> DEBU 319f 0xc00421f820 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:03.824 UTC [cauthdsl] func2 -> DEBU 31a0 0xc00421f820 principal matched by identity 0" +"2019-05-02 09:28:03.825 UTC [msp.identity] Verify -> DEBU 31a1 Verify: digest = 00000000 df 2b 57 44 7e 39 a4 59 4c 87 2a f5 02 ea f2 c8 |.+WD~9.YL.*.....| +00000010 7a 90 8d 5a b8 a9 a4 e6 b6 0f 58 df 95 34 dc ff |z..Z......X..4..|" +"2019-05-02 09:28:03.826 UTC [msp.identity] Verify -> DEBU 31a2 Verify: sig = 00000000 30 45 02 21 00 c4 c1 07 41 6a d9 6c 75 ba b4 ee |0E.!....Aj.lu...| +00000010 5f 0b 0c 3a 5d fe a3 9c a4 19 b5 95 57 a0 53 51 |_..:].......W.SQ| +00000020 6b 1b 26 22 37 02 20 04 6d 8d 5a 22 8b f2 95 d5 |k.&"7. .m.Z"....| +00000030 3b 6d 58 87 6a 17 9b 80 f9 a7 1c 33 ec bc 9e 51 |;mX.j......3...Q| +00000040 ce da 4c 0c af 59 a8 |..L..Y.|" +"2019-05-02 09:28:03.828 UTC [cauthdsl] func2 -> DEBU 31a3 0xc00421f820 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:03.829 UTC [cauthdsl] func1 -> DEBU 31a4 0xc00421f820 gate 1556789283821644400 evaluation succeeds" +"2019-05-02 09:28:03.830 UTC [policies] Evaluate -> DEBU 31a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:03.830 UTC [policies] Evaluate -> DEBU 31a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:03.832 UTC [policies] Evaluate -> DEBU 31a7 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:03.832 UTC [policies] Evaluate -> DEBU 31a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:03.833 UTC [gossip.discovery] handleAliveMessage -> DEBU 31a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:03.834 UTC [gossip.discovery] learnExistingMembers -> DEBU 31aa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:28:03.835 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ab updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 " +"2019-05-02 09:28:03.836 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ac Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 " +"2019-05-02 09:28:03.837 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ad Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:03.838 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ae Exiting" +"2019-05-02 09:28:03.840 UTC [gossip.discovery] handleAliveMessage -> DEBU 31af Exiting" +"2019-05-02 09:28:03.842 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31b0 Exiting" +"2019-05-02 09:28:03.843 UTC [msp] DeserializeIdentity -> DEBU 31b1 Obtaining identity" +"2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b2 Obtaining identity" +"2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b3 Obtaining identity" +"2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b4 Obtaining identity" +"2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b5 Obtaining identity" +"2019-05-02 09:28:03.844 UTC [msp] DeserializeIdentity -> DEBU 31b6 Obtaining identity" +"2019-05-02 09:28:03.845 UTC [gossip.comm] Send -> DEBU 31b7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:03.845 UTC [msp] DeserializeIdentity -> DEBU 31b8 Obtaining identity" +"2019-05-02 09:28:03.845 UTC [msp] DeserializeIdentity -> DEBU 31b9 Obtaining identity" +"2019-05-02 09:28:03.845 UTC [gossip.comm] Send -> DEBU 31ba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:03.845 UTC [gossip.comm] sendToEndpoint -> DEBU 31bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:03.845 UTC [gossip.comm] sendToEndpoint -> DEBU 31bc Exiting" +"2019-05-02 09:28:03.845 UTC [gossip.comm] sendToEndpoint -> DEBU 31bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:03.846 UTC [gossip.comm] sendToEndpoint -> DEBU 31be Exiting" +"2019-05-02 09:28:03.843 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31bf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:03.847 UTC [gossip.gossip] handleMessage -> DEBU 31c0 Exiting" +"2019-05-02 09:28:03.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c1 Exiting" +"2019-05-02 09:28:03.849 UTC [gossip.gossip] handleMessage -> DEBU 31c2 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:03.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:03.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c5 Exiting" +"2019-05-02 09:28:03.851 UTC [gossip.gossip] handleMessage -> DEBU 31c4 Exiting" +"2019-05-02 09:28:04.049 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 31c6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.049 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 31c7 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.049 UTC [policies] Evaluate -> DEBU 31c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-05-02 09:28:04.049 UTC [policies] Evaluate -> DEBU 31c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.049 UTC [policies] Evaluate -> DEBU 31ca == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-05-02 09:28:04.049 UTC [cauthdsl] func1 -> DEBU 31cb 0xc00426f550 gate 1556789284049776900 evaluation starts" +"2019-05-02 09:28:04.049 UTC [cauthdsl] func2 -> DEBU 31cc 0xc00426f550 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.049 UTC [cauthdsl] func2 -> DEBU 31cd 0xc00426f550 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.049 UTC [cauthdsl] func2 -> DEBU 31ce 0xc00426f550 principal matched by identity 0" +"2019-05-02 09:28:04.050 UTC [msp.identity] Verify -> DEBU 31cf Verify: digest = 00000000 d4 e6 12 2a c2 c7 5b 23 94 4d f6 22 c9 25 13 0f |...*..[#.M.".%..| +00000010 c1 12 c9 e8 b1 26 4c de 4b 77 d2 92 4b 51 b6 14 |.....&L.Kw..KQ..|" +"2019-05-02 09:28:04.050 UTC [msp.identity] Verify -> DEBU 31d0 Verify: sig = 00000000 30 45 02 21 00 d4 df 00 4d 03 fb af 6e 74 41 d9 |0E.!....M...ntA.| +00000010 64 60 25 3a 01 68 00 be d9 80 46 4a 39 aa b6 6c |d`%:.h....FJ9..l| +00000020 79 f3 2e e6 ee 02 20 69 59 df 5b e5 20 00 55 b5 |y..... iY.[. .U.| +00000030 36 5d db dc dd 7e dd 8e 2e 81 11 c2 7d 37 34 c3 |6]...~......}74.| +00000040 d1 c1 f1 c3 82 03 fe |.......|" +"2019-05-02 09:28:04.050 UTC [cauthdsl] func2 -> DEBU 31d1 0xc00426f550 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.050 UTC [cauthdsl] func1 -> DEBU 31d2 0xc00426f550 gate 1556789284049776900 evaluation succeeds" +"2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d5 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:28:04.050 UTC [policies] Evaluate -> DEBU 31d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-05-02 09:28:04.050 UTC [blocksProvider] DeliverBlocks -> DEBU 31d7 [businesschannel] Adding payload to local buffer, blockNum = [9]" +"2019-05-02 09:28:04.051 UTC [gossip.state] addPayload -> DEBU 31d8 [businesschannel] Adding payload to local buffer, blockNum = [9]" +"2019-05-02 09:28:04.051 UTC [gossip.state] addPayload -> DEBU 31d9 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-05-02 09:28:04.051 UTC [blocksProvider] DeliverBlocks -> DEBU 31da [businesschannel] Gossiping block [9], peers number [3]" +"2019-05-02 09:28:04.051 UTC [gossip.channel] AddToMsgStore -> DEBU 31db Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34890 bytes, seq: 9}, Envelope: 34923 bytes, Signature: 0 bytes to the block puller" +"2019-05-02 09:28:04.051 UTC [gossip.pull] Add -> DEBU 31dc Added 9, total items: 9" +"2019-05-02 09:28:04.051 UTC [gossip.state] deliverPayloads -> DEBU 31dd [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [9]" +"2019-05-02 09:28:04.051 UTC [gossip.state] deliverPayloads -> DEBU 31de [businesschannel] Transferring block [9] with 1 transaction(s) to the ledger" +"2019-05-02 09:28:04.051 UTC [gossip.privdata] StoreBlock -> INFO 31df [businesschannel] Received block [9] from buffer" +"2019-05-02 09:28:04.052 UTC [gossip.privdata] StoreBlock -> DEBU 31e0 [businesschannel] Validating block [9]" +"2019-05-02 09:28:04.052 UTC [committer.txvalidator] Validate -> DEBU 31e1 [businesschannel] START Block Validation for block [9]" +"2019-05-02 09:28:04.052 UTC [committer.txvalidator] Validate -> DEBU 31e2 expecting 1 block validation responses" +"2019-05-02 09:28:04.052 UTC [committer.txvalidator] validateTx -> DEBU 31e3 [businesschannel] validateTx starts for block 0xc0033af8c0 env 0xc0023f2190 txn 0" +"2019-05-02 09:28:04.052 UTC [protoutils] ValidateTransaction -> DEBU 31e4 ValidateTransactionEnvelope starts for envelope 0xc0023f2190" +"2019-05-02 09:28:04.053 UTC [protoutils] ValidateTransaction -> DEBU 31e5 Header is channel_header:"\010\001\032\006\010\243\360\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030n\\\350s\236\316i\321\200\245E\241v\323\357b\221\266\256\307[\221\004\247" " +"2019-05-02 09:28:04.053 UTC [protoutils] validateChannelHeader -> DEBU 31e6 validateChannelHeader info: header type 1" +"2019-05-02 09:28:04.053 UTC [protoutils] checkSignatureFromCreator -> DEBU 31e7 begin" +"2019-05-02 09:28:04.053 UTC [msp] GetManagerForChain -> DEBU 31e8 Returning existing manager for channel 'businesschannel'" +"2019-05-02 09:28:04.053 UTC [msp] DeserializeIdentity -> DEBU 31e9 Obtaining identity" +"2019-05-02 09:28:04.053 UTC [msp.identity] newIdentity -> DEBU 31ea Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -17029,202 +16266,220 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-05-02 01:31:35.144 UTC [msp] DeserializeIdentity -> DEBU 335c Obtaining identity" -"2019-05-02 01:31:35.145 UTC [msp] DeserializeIdentity -> DEBU 335d Obtaining identity" -"2019-05-02 01:31:35.145 UTC [gossip.comm] Send -> DEBU 335e Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35012 bytes, seq: 9}, Envelope: 35045 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:35.145 UTC [protoutils] checkSignatureFromCreator -> DEBU 335f creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -"2019-05-02 01:31:35.145 UTC [msp] Validate -> DEBU 3360 MSP OrdererMSP validating identity" -"2019-05-02 01:31:35.145 UTC [msp] DeserializeIdentity -> DEBU 3361 Obtaining identity" -"2019-05-02 01:31:35.145 UTC [msp] DeserializeIdentity -> DEBU 3362 Obtaining identity" -"2019-05-02 01:31:35.145 UTC [protoutils] checkSignatureFromCreator -> DEBU 3363 creator is valid" -"2019-05-02 01:31:35.145 UTC [gossip.comm] sendToEndpoint -> DEBU 3364 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35012 bytes, seq: 9}, Envelope: 35045 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.145 UTC [gossip.comm] sendToEndpoint -> DEBU 3365 Exiting" -"2019-05-02 01:31:35.145 UTC [msp.identity] Verify -> DEBU 3366 Verify: digest = 00000000 7b 27 d9 8e c5 a9 c1 38 db 98 9b 54 c4 34 72 66 |{'.....8...T.4rf| -00000010 fe 0d 3d 0f 4a 95 b0 99 26 9b 68 bc cf 58 5b 53 |..=.J...&.h..X[S|" -"2019-05-02 01:31:35.145 UTC [msp.identity] Verify -> DEBU 3367 Verify: sig = 00000000 30 44 02 20 17 fb 96 95 cf 78 11 ee f6 f6 bf 00 |0D. .....x......| -00000010 86 65 7e 97 5b 5f 51 43 e4 6a fa 3e d0 8f 80 95 |.e~.[_QC.j.>....| -00000020 5c 30 f3 79 02 20 31 03 e1 81 80 b3 8e 6d 77 9c |\0.y. 1......mw.| -00000030 df 06 16 94 09 13 bc 5f 75 84 4c 0a d7 71 fa 74 |......._u.L..q.t| -00000040 df de 6e 9d 1c cb |..n...|" -"2019-05-02 01:31:35.145 UTC [protoutils] checkSignatureFromCreator -> DEBU 3368 exits successfully" -"2019-05-02 01:31:35.145 UTC [protoutils] validateConfigTransaction -> DEBU 3369 validateConfigTransaction starts for data 0xc0026d0000, header channel_header:"\010\001\032\006\010\366\220\251\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\342\231\345\226\0025\271\2400`k\010\002\376=~\236\377\001X\304\311\352J" " -"2019-05-02 01:31:35.145 UTC [committer.txvalidator] validateTx -> DEBU 336a Transaction is for channel businesschannel" -"2019-05-02 01:31:35.152 UTC [common.configtx] addToMap -> DEBU 336b Adding to config map: [Group] /Channel" -"2019-05-02 01:31:35.152 UTC [common.configtx] addToMap -> DEBU 336c Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:31:35.152 UTC [common.configtx] addToMap -> DEBU 336d Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 336e Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 336f Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 3370 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 3371 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 3372 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:31:35.153 UTC [common.configtx] addToMap -> DEBU 3373 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:31:35.155 UTC [common.configtx] addToMap -> DEBU 3374 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:35.155 UTC [common.configtx] addToMap -> DEBU 3375 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:31:35.155 UTC [common.configtx] addToMap -> DEBU 3376 Adding to config map: [Group] /Channel" -"2019-05-02 01:31:35.155 UTC [common.configtx] addToMap -> DEBU 3377 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 3378 Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 3379 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 337a Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 337b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 337c Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 337d Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-05-02 01:31:35.156 UTC [common.configtx] addToMap -> DEBU 337e Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:31:35.157 UTC [common.configtx] addToMap -> DEBU 337f Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:31:35.157 UTC [common.configtx] addToMap -> DEBU 3380 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:31:35.157 UTC [common.configtx] addToMap -> DEBU 3381 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:31:35.158 UTC [common.configtx] addToMap -> DEBU 3382 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:31:35.158 UTC [common.configtx] addToMap -> DEBU 3383 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:31:35.158 UTC [common.configtx] addToMap -> DEBU 3384 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:31:35.158 UTC [common.configtx] addToMap -> DEBU 3385 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:35.159 UTC [common.configtx] addToMap -> DEBU 3386 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:31:35.160 UTC [common.configtx] verifyDeltaSet -> DEBU 3387 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-05-02 01:31:35.160 UTC [common.configtx] verifyDeltaSet -> DEBU 3388 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:35.162 UTC [common.configtx] verifyDeltaSet -> DEBU 3389 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-05-02 01:31:35.162 UTC [common.configtx] verifyDeltaSet -> DEBU 338a Processing change to key: [Group] /Channel/Application/Org3MSP" -"2019-05-02 01:31:35.162 UTC [common.configtx] verifyDeltaSet -> DEBU 338b Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -"2019-05-02 01:31:35.162 UTC [common.configtx] verifyDeltaSet -> DEBU 338c Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-05-02 01:31:35.163 UTC [common.configtx] verifyDeltaSet -> DEBU 338d Processing change to key: [Group] /Channel/Application" -"2019-05-02 01:31:35.163 UTC [common.configtx] policyForItem -> DEBU 338e Getting policy for item Application with mod_policy Admins" -"2019-05-02 01:31:35.164 UTC [policies] Manager -> DEBU 338f Manager Channel looking up path []" -"2019-05-02 01:31:35.164 UTC [policies] Manager -> DEBU 3390 Manager Channel has managers Orderer" -"2019-05-02 01:31:35.164 UTC [policies] Manager -> DEBU 3391 Manager Channel has managers Application" -"2019-05-02 01:31:35.165 UTC [policies] Manager -> DEBU 3392 Manager Channel looking up path [Application]" -"2019-05-02 01:31:35.165 UTC [policies] Manager -> DEBU 3393 Manager Channel has managers Orderer" -"2019-05-02 01:31:35.165 UTC [policies] Manager -> DEBU 3394 Manager Channel has managers Application" -"2019-05-02 01:31:35.165 UTC [policies] Manager -> DEBU 3395 Manager Channel/Application looking up path []" -"2019-05-02 01:31:35.165 UTC [policies] Manager -> DEBU 3396 Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:31:35.166 UTC [policies] Manager -> DEBU 3397 Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:31:35.166 UTC [policies] Evaluate -> DEBU 3398 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -"2019-05-02 01:31:35.166 UTC [policies] Evaluate -> DEBU 3399 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.167 UTC [policies] Evaluate -> DEBU 339a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-05-02 01:31:35.167 UTC [cauthdsl] deduplicate -> WARN 339b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-05-02 01:31:35.167 UTC [cauthdsl] func1 -> DEBU 339c 0xc0039cf5c0 gate 1556760695167735400 evaluation starts" -"2019-05-02 01:31:35.167 UTC [cauthdsl] func2 -> DEBU 339d 0xc0039cf5c0 signed by 0 principal evaluation starts (used [false false false])" -"2019-05-02 01:31:35.168 UTC [cauthdsl] func2 -> DEBU 339e 0xc0039cf5c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.170 UTC [cauthdsl] func2 -> DEBU 339f 0xc0039cf5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:35.171 UTC [cauthdsl] func2 -> DEBU 33a0 0xc0039cf5c0 processing identity 1 with bytes of 10fffc0" -"2019-05-02 01:31:35.171 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 33a1 Checking if identity satisfies ADMIN role for Org2MSP" -"2019-05-02 01:31:35.171 UTC [cauthdsl] func2 -> DEBU 33a2 0xc0039cf5c0 principal matched by identity 1" -"2019-05-02 01:31:35.171 UTC [msp.identity] Verify -> DEBU 33a3 Verify: digest = 00000000 0a 93 54 f3 ca 50 66 cd 2e b2 91 c4 a1 99 4b fe |..T..Pf.......K.| -00000010 78 04 08 22 86 5c 95 44 eb 44 40 b9 7f 21 df a9 |x..".\.D.D@..!..|" -"2019-05-02 01:31:35.171 UTC [msp.identity] Verify -> DEBU 33a4 Verify: sig = 00000000 30 44 02 20 73 e6 28 8c bd 51 8c f6 e4 26 ca 3c |0D. s.(..Q...&.<| -00000010 a7 51 9f 0f f8 98 78 97 9a 0a 5b de 1d 2f 26 8a |.Q....x...[../&.| -00000020 4a bd b1 0a 02 20 7d 21 70 08 83 04 6d 41 e4 2d |J.... }!p...mA.-| -00000030 97 f9 e7 46 95 6f 32 34 86 6a f5 6d 90 57 38 e1 |...F.o24.j.m.W8.| -00000040 82 3f 3a 29 69 89 |.?:)i.|" -"2019-05-02 01:31:35.172 UTC [cauthdsl] func2 -> DEBU 33a5 0xc0039cf5c0 principal evaluation succeeds for identity 1" -"2019-05-02 01:31:35.173 UTC [cauthdsl] func1 -> DEBU 33a6 0xc0039cf5c0 gate 1556760695167735400 evaluation succeeds" -"2019-05-02 01:31:35.173 UTC [policies] Evaluate -> DEBU 33a7 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:31:35.173 UTC [policies] Evaluate -> DEBU 33a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:31:35.173 UTC [policies] Evaluate -> DEBU 33a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-05-02 01:31:35.173 UTC [cauthdsl] deduplicate -> WARN 33aa De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-05-02 01:31:35.174 UTC [cauthdsl] func1 -> DEBU 33ab 0xc0039cfcb0 gate 1556760695174108600 evaluation starts" -"2019-05-02 01:31:35.174 UTC [cauthdsl] func2 -> DEBU 33ac 0xc0039cfcb0 signed by 0 principal evaluation starts (used [false false false])" -"2019-05-02 01:31:35.175 UTC [cauthdsl] func2 -> DEBU 33ad 0xc0039cfcb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.175 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 33ae Checking if identity satisfies ADMIN role for Org1MSP" -"2019-05-02 01:31:35.176 UTC [cauthdsl] func2 -> DEBU 33af 0xc0039cfcb0 principal matched by identity 0" -"2019-05-02 01:31:35.176 UTC [msp.identity] Verify -> DEBU 33b0 Verify: digest = 00000000 96 5b d6 35 6e 24 ba 8d ea c0 f3 54 be 64 a0 8e |.[.5n$.....T.d..| -00000010 d7 2c 6e 83 3b c0 ba 63 fa 91 e5 8e d7 f6 d2 45 |.,n.;..c.......E|" -"2019-05-02 01:31:35.176 UTC [msp.identity] Verify -> DEBU 33b1 Verify: sig = 00000000 30 44 02 20 06 17 d3 85 97 6c 5b f8 2b ee 4f 8b |0D. .....l[.+.O.| -00000010 ef 9b 4d fa 3e e1 e8 50 ac 6a 0b 7c dd d7 cd af |..M.>..P.j.|....| -00000020 ef 6f e1 14 02 20 7a 9c e6 c9 a1 11 d2 73 46 49 |.o... z......sFI| -00000030 45 b3 5c 7b 74 db 4e 00 94 b3 b0 43 5c b9 74 72 |E.\{t.N....C\.tr| -00000040 0b fb bb cd 10 b7 |......|" -"2019-05-02 01:31:35.177 UTC [cauthdsl] func2 -> DEBU 33b2 0xc0039cfcb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.178 UTC [cauthdsl] func1 -> DEBU 33b3 0xc0039cfcb0 gate 1556760695174108600 evaluation succeeds" -"2019-05-02 01:31:35.178 UTC [policies] Evaluate -> DEBU 33b4 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:31:35.178 UTC [policies] Evaluate -> DEBU 33b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:31:35.179 UTC [policies] Evaluate -> DEBU 33b6 Signature set satisfies policy /Channel/Application/Admins" -"2019-05-02 01:31:35.179 UTC [policies] Evaluate -> DEBU 33b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -"2019-05-02 01:31:35.179 UTC [common.configtx] recurseConfigMap -> DEBU 33b8 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.180 UTC [common.configtx] recurseConfigMap -> DEBU 33b9 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.188 UTC [common.configtx] recurseConfigMap -> DEBU 33ba Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.189 UTC [common.configtx] recurseConfigMap -> DEBU 33bb Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.190 UTC [common.configtx] recurseConfigMap -> DEBU 33bc Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.191 UTC [common.configtx] recurseConfigMap -> DEBU 33bd Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.193 UTC [common.configtx] recurseConfigMap -> DEBU 33be Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.195 UTC [common.configtx] recurseConfigMap -> DEBU 33bf Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.196 UTC [common.configtx] recurseConfigMap -> DEBU 33c0 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.197 UTC [common.configtx] recurseConfigMap -> DEBU 33c1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.200 UTC [common.configtx] recurseConfigMap -> DEBU 33c2 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.200 UTC [common.configtx] recurseConfigMap -> DEBU 33c3 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.201 UTC [common.configtx] recurseConfigMap -> DEBU 33c4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.201 UTC [common.configtx] recurseConfigMap -> DEBU 33c5 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.203 UTC [common.configtx] recurseConfigMap -> DEBU 33c6 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.203 UTC [common.configtx] recurseConfigMap -> DEBU 33c7 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.203 UTC [common.configtx] recurseConfigMap -> DEBU 33c8 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.204 UTC [common.configtx] recurseConfigMap -> DEBU 33c9 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.208 UTC [common.configtx] recurseConfigMap -> DEBU 33ca Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.208 UTC [common.configtx] recurseConfigMap -> DEBU 33cb Setting policy for key Admins to " -"2019-05-02 01:31:35.208 UTC [common.configtx] recurseConfigMap -> DEBU 33cc Setting policy for key Endorsement to " -"2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33cd Setting policy for key LifecycleEndorsement to " -"2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33ce Setting policy for key Readers to " -"2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33cf Setting policy for key Writers to " -"2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33d0 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33d1 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.209 UTC [common.configtx] recurseConfigMap -> DEBU 33d2 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-05-02 01:31:35.210 UTC [common.channelconfig] NewStandardValues -> DEBU 33d3 Initializing protos for *channelconfig.ChannelProtos" -"2019-05-02 01:31:35.210 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d4 Processing field: HashingAlgorithm" -"2019-05-02 01:31:35.210 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d5 Processing field: BlockDataHashingStructure" -"2019-05-02 01:31:35.215 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d6 Processing field: OrdererAddresses" -"2019-05-02 01:31:35.215 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d7 Processing field: Consortium" -"2019-05-02 01:31:35.216 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d8 Processing field: Capabilities" -"2019-05-02 01:31:35.216 UTC [common.channelconfig] NewStandardValues -> DEBU 33d9 Initializing protos for *channelconfig.OrdererProtos" -"2019-05-02 01:31:35.216 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33da Processing field: ConsensusType" -"2019-05-02 01:31:35.216 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33db Processing field: BatchSize" -"2019-05-02 01:31:35.216 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33dc Processing field: BatchTimeout" -"2019-05-02 01:31:35.217 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33dd Processing field: KafkaBrokers" -"2019-05-02 01:31:35.217 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33de Processing field: ChannelRestrictions" -"2019-05-02 01:31:35.217 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33df Processing field: Capabilities" -"2019-05-02 01:31:35.217 UTC [common.channelconfig] NewStandardValues -> DEBU 33e0 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-05-02 01:31:35.217 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33e1 Processing field: Endpoints" -"2019-05-02 01:31:35.217 UTC [common.channelconfig] NewStandardValues -> DEBU 33e2 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:35.217 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33e3 Processing field: MSP" -"2019-05-02 01:31:35.218 UTC [common.channelconfig] validateMSP -> DEBU 33e4 Setting up MSP for org OrdererOrg" -"2019-05-02 01:31:35.218 UTC [msp] newBccspMsp -> DEBU 33e5 Creating BCCSP-based MSP instance" -"2019-05-02 01:31:35.218 UTC [msp] New -> DEBU 33e6 Creating Cache-MSP instance" -"2019-05-02 01:31:35.218 UTC [msp] Setup -> DEBU 33e7 Setting up MSP instance OrdererMSP" -"2019-05-02 01:31:35.218 UTC [msp.identity] newIdentity -> DEBU 33e8 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +"2019-05-02 09:28:04.053 UTC [msp.identity] Sign -> DEBU 31eb Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151022 " +"2019-05-02 09:28:04.054 UTC [msp.identity] Sign -> DEBU 31ec Sign: digest: 5B60D2C483522D448385F8ECC85BE48D24592C7B9EE0507D39B1BBA9FCB594AC " +"2019-05-02 09:28:04.054 UTC [protoutils] checkSignatureFromCreator -> DEBU 31ed creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-05-02 09:28:04.054 UTC [msp.identity] Sign -> DEBU 31ee Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:28:04.054 UTC [msp] Validate -> DEBU 31ef MSP OrdererMSP validating identity" +"2019-05-02 09:28:04.054 UTC [msp.identity] Sign -> DEBU 31f0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:28:04.054 UTC [gossip.discovery] periodicalSendAlive -> DEBU 31f1 Sleeping 5s" +"2019-05-02 09:28:04.054 UTC [protoutils] checkSignatureFromCreator -> DEBU 31f2 creator is valid" +"2019-05-02 09:28:04.055 UTC [msp.identity] Verify -> DEBU 31f3 Verify: digest = 00000000 ee 16 cd a5 d4 21 24 67 68 81 7d 03 6e 9c 38 ef |.....!$gh.}.n.8.| +00000010 e9 00 7f a0 5b 31 09 e4 f2 2a c3 f4 8c 3f 33 f6 |....[1...*...?3.|" +"2019-05-02 09:28:04.055 UTC [msp.identity] Verify -> DEBU 31f4 Verify: sig = 00000000 30 45 02 21 00 b5 41 bd ed 21 97 bc c2 3a d9 a4 |0E.!..A..!...:..| +00000010 5d 1d 40 a2 44 9c 84 8a 70 3a 7d 04 cf 03 5f 51 |].@.D...p:}..._Q| +00000020 60 44 a8 fb e8 02 20 0a d3 c5 d1 4b 45 a6 76 26 |`D.... ....KE.v&| +00000030 f3 8a f0 be 0d 0d e8 b9 fd 97 27 13 40 da ef 59 |..........'.@..Y| +00000040 9b 10 bb ec fa 93 92 |.......|" +"2019-05-02 09:28:04.055 UTC [protoutils] checkSignatureFromCreator -> DEBU 31f5 exits successfully" +"2019-05-02 09:28:04.056 UTC [protoutils] validateConfigTransaction -> DEBU 31f6 validateConfigTransaction starts for data 0xc004578000, header channel_header:"\010\001\032\006\010\243\360\252\346\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030n\\\350s\236\316i\321\200\245E\241v\323\357b\221\266\256\307[\221\004\247" " +"2019-05-02 09:28:04.056 UTC [committer.txvalidator] validateTx -> DEBU 31f7 Transaction is for channel businesschannel" +"2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31f8 Adding to config map: [Group] /Channel" +"2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31f9 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31fa Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:28:04.056 UTC [msp] DeserializeIdentity -> DEBU 31fb Obtaining identity" +"2019-05-02 09:28:04.057 UTC [msp] DeserializeIdentity -> DEBU 31fd Obtaining identity" +"2019-05-02 09:28:04.056 UTC [common.configtx] addToMap -> DEBU 31fc Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:28:04.057 UTC [msp] DeserializeIdentity -> DEBU 31fe Obtaining identity" +"2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 31ff Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3200 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:28:04.057 UTC [msp] DeserializeIdentity -> DEBU 3201 Obtaining identity" +"2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3202 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3203 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3204 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:28:04.057 UTC [common.configtx] addToMap -> DEBU 3205 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3207 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:28:04.057 UTC [gossip.comm] Send -> DEBU 3206 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34890 bytes, seq: 9}, Envelope: 34923 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3208 Adding to config map: [Group] /Channel" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3209 Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 320a Obtaining identity" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320b Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320c Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 320d Obtaining identity" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 320f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3210 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 3211 Obtaining identity" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3212 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3213 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:28:04.058 UTC [gossip.comm] Send -> DEBU 3214 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3215 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3216 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:28:04.058 UTC [msp] DeserializeIdentity -> DEBU 3217 Obtaining identity" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 3218 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:28:04.058 UTC [gossip.comm] Send -> DEBU 3219 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321a Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:28:04.058 UTC [gossip.comm] Send -> DEBU 321d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321e Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:28:04.058 UTC [common.configtx] addToMap -> DEBU 321f Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3220 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:04.058 UTC [common.configtx] verifyDeltaSet -> DEBU 3221 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3222 Exiting" +"2019-05-02 09:28:04.058 UTC [common.configtx] verifyDeltaSet -> DEBU 3223 Processing change to key: [Group] /Channel/Application" +"2019-05-02 09:28:04.058 UTC [common.configtx] policyForItem -> DEBU 3224 Getting policy for item Application with mod_policy Admins" +"2019-05-02 09:28:04.058 UTC [policies] Manager -> DEBU 3225 Manager Channel looking up path []" +"2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3226 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34890 bytes, seq: 9}, Envelope: 34923 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.058 UTC [policies] Manager -> DEBU 3227 Manager Channel has managers Orderer" +"2019-05-02 09:28:04.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3228 Exiting" +"2019-05-02 09:28:04.058 UTC [policies] Manager -> DEBU 3229 Manager Channel has managers Application" +"2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322b Exiting" +"2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.063 UTC [gossip.comm] sendToEndpoint -> DEBU 322d Exiting" +"2019-05-02 09:28:04.059 UTC [policies] Manager -> DEBU 322e Manager Channel looking up path [Application]" +"2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 322f Manager Channel has managers Orderer" +"2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 3230 Manager Channel has managers Application" +"2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 3231 Manager Channel/Application looking up path []" +"2019-05-02 09:28:04.071 UTC [policies] Manager -> DEBU 3232 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:28:04.072 UTC [policies] Manager -> DEBU 3233 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:28:04.072 UTC [policies] Evaluate -> DEBU 3234 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-05-02 09:28:04.074 UTC [policies] Evaluate -> DEBU 3235 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.074 UTC [policies] Evaluate -> DEBU 3236 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-05-02 09:28:04.075 UTC [cauthdsl] deduplicate -> WARN 3237 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-05-02 09:28:04.075 UTC [cauthdsl] func1 -> DEBU 3238 0xc00036a2d0 gate 1556789284075449700 evaluation starts" +"2019-05-02 09:28:04.075 UTC [cauthdsl] func2 -> DEBU 3239 0xc00036a2d0 signed by 0 principal evaluation starts (used [false false false])" +"2019-05-02 09:28:04.075 UTC [cauthdsl] func2 -> DEBU 323a 0xc00036a2d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.076 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 323b Checking if identity satisfies ADMIN role for Org1MSP" +"2019-05-02 09:28:04.076 UTC [cauthdsl] func2 -> DEBU 323c 0xc00036a2d0 principal matched by identity 0" +"2019-05-02 09:28:04.076 UTC [msp.identity] Verify -> DEBU 323d Verify: digest = 00000000 55 f0 c2 94 3a 37 23 eb d0 1b da 18 4a 66 45 b5 |U...:7#.....JfE.| +00000010 54 12 61 d1 4b ae fe 57 e9 51 94 57 aa af 68 17 |T.a.K..W.Q.W..h.|" +"2019-05-02 09:28:04.076 UTC [msp.identity] Verify -> DEBU 323e Verify: sig = 00000000 30 45 02 21 00 ef 26 69 f6 43 cc ea 70 a5 61 8d |0E.!..&i.C..p.a.| +00000010 ff a4 ff 24 9b 2c 47 7c 14 f4 82 75 2d 27 b6 b0 |...$.,G|...u-'..| +00000020 a2 6a 68 25 32 02 20 23 80 40 b2 b7 b1 c9 60 08 |.jh%2. #.@....`.| +00000030 cd 4e 09 a9 3c 63 75 29 2f 85 61 35 08 11 df c6 |.N.. DEBU 323f 0xc00036a2d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.077 UTC [cauthdsl] func1 -> DEBU 3240 0xc00036a2d0 gate 1556789284075449700 evaluation succeeds" +"2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3241 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3242 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-05-02 09:28:04.077 UTC [cauthdsl] deduplicate -> WARN 3244 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-05-02 09:28:04.077 UTC [cauthdsl] func1 -> DEBU 3245 0xc00036a9c0 gate 1556789284077249100 evaluation starts" +"2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3246 0xc00036a9c0 signed by 0 principal evaluation starts (used [false false false])" +"2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3247 0xc00036a9c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3248 0xc00036a9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 3249 0xc00036a9c0 processing identity 1 with bytes of 10fffc0" +"2019-05-02 09:28:04.077 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 324a Checking if identity satisfies ADMIN role for Org2MSP" +"2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 324b 0xc00036a9c0 principal matched by identity 1" +"2019-05-02 09:28:04.077 UTC [msp.identity] Verify -> DEBU 324c Verify: digest = 00000000 70 27 54 c7 10 65 06 23 74 50 fc 01 20 7a 9f 22 |p'T..e.#tP.. z."| +00000010 df 75 70 9a b8 8e 15 04 cc 2d a3 ad 5e 15 ee 89 |.up......-..^...|" +"2019-05-02 09:28:04.077 UTC [msp.identity] Verify -> DEBU 324d Verify: sig = 00000000 30 44 02 20 3e 34 30 a7 7a 34 94 d8 b3 73 97 db |0D. >40.z4...s..| +00000010 96 da 10 13 46 64 57 5e af 8c ec ad 13 2e 72 23 |....FdW^......r#| +00000020 12 36 e1 a7 02 20 67 6b 69 65 0e 27 d7 39 1b e1 |.6... gkie.'.9..| +00000030 07 2a cf 5f b4 cf 8d 8d 2e 70 bf ed ec 66 7c 6b |.*._.....p...f|k| +00000040 a3 af 89 d2 b2 af |......|" +"2019-05-02 09:28:04.077 UTC [cauthdsl] func2 -> DEBU 324e 0xc00036a9c0 principal evaluation succeeds for identity 1" +"2019-05-02 09:28:04.077 UTC [cauthdsl] func1 -> DEBU 324f 0xc00036a9c0 gate 1556789284077249100 evaluation succeeds" +"2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3250 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3251 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3252 Signature set satisfies policy /Channel/Application/Admins" +"2019-05-02 09:28:04.077 UTC [policies] Evaluate -> DEBU 3253 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-05-02 09:28:04.077 UTC [common.configtx] verifyDeltaSet -> DEBU 3254 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3255 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3256 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3257 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-05-02 09:28:04.078 UTC [common.configtx] verifyDeltaSet -> DEBU 3258 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3259 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 325f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3260 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3261 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3262 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3263 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3264 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3265 Setting policy for key Endorsement to " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3266 Setting policy for key LifecycleEndorsement to " +"2019-05-02 09:28:04.078 UTC [common.configtx] recurseConfigMap -> DEBU 3267 Setting policy for key Readers to " +"2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 3268 Setting policy for key Writers to " +"2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 3269 Setting policy for key Admins to " +"2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 326f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.079 UTC [common.configtx] recurseConfigMap -> DEBU 3270 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 3271 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.097 UTC [common.configtx] recurseConfigMap -> DEBU 3272 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.098 UTC [common.configtx] recurseConfigMap -> DEBU 3273 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-05-02 09:28:04.098 UTC [common.channelconfig] NewStandardValues -> DEBU 3274 Initializing protos for *channelconfig.ChannelProtos" +"2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3275 Processing field: HashingAlgorithm" +"2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3276 Processing field: BlockDataHashingStructure" +"2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3277 Processing field: OrdererAddresses" +"2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3278 Processing field: Consortium" +"2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3279 Processing field: Capabilities" +"2019-05-02 09:28:04.098 UTC [common.channelconfig] NewStandardValues -> DEBU 327a Initializing protos for *channelconfig.ApplicationProtos" +"2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 327b Processing field: ACLs" +"2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 327c Processing field: Capabilities" +"2019-05-02 09:28:04.098 UTC [common.channelconfig] NewStandardValues -> DEBU 327d Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:28:04.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 327e Processing field: AnchorPeers" +"2019-05-02 09:28:04.099 UTC [common.channelconfig] NewStandardValues -> DEBU 327f Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:04.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3280 Processing field: MSP" +"2019-05-02 09:28:04.099 UTC [common.channelconfig] Validate -> DEBU 3281 Anchor peers for org Org2MSP are anchor_peers: " +"2019-05-02 09:28:04.099 UTC [common.channelconfig] validateMSP -> DEBU 3282 Setting up MSP for org Org2MSP" +"2019-05-02 09:28:04.099 UTC [msp] newBccspMsp -> DEBU 3283 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:04.099 UTC [msp] New -> DEBU 3284 Creating Cache-MSP instance" +"2019-05-02 09:28:04.099 UTC [msp] Setup -> DEBU 3285 Setting up MSP instance Org2MSP" +"2019-05-02 09:28:04.099 UTC [msp.identity] newIdentity -> DEBU 3286 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-05-02 01:31:35.219 UTC [msp.identity] newIdentity -> DEBU 33e9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +"2019-05-02 09:28:04.104 UTC [msp.identity] newIdentity -> DEBU 3287 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-05-02 01:31:35.219 UTC [msp] Validate -> DEBU 33ea MSP OrdererMSP validating identity" -"2019-05-02 01:31:35.220 UTC [common.channelconfig] NewStandardValues -> DEBU 33eb Initializing protos for *channelconfig.ApplicationProtos" -"2019-05-02 01:31:35.220 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33ec Processing field: ACLs" -"2019-05-02 01:31:35.220 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33ed Processing field: Capabilities" -"2019-05-02 01:31:35.220 UTC [common.channelconfig] NewStandardValues -> DEBU 33ee Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:31:35.220 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33ef Processing field: AnchorPeers" -"2019-05-02 01:31:35.220 UTC [common.channelconfig] NewStandardValues -> DEBU 33f0 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:35.220 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33f1 Processing field: MSP" -"2019-05-02 01:31:35.221 UTC [common.channelconfig] Validate -> DEBU 33f2 Anchor peers for org Org3MSP are " -"2019-05-02 01:31:35.221 UTC [common.channelconfig] validateMSP -> DEBU 33f3 Setting up MSP for org Org3MSP" -"2019-05-02 01:31:35.222 UTC [msp] newBccspMsp -> DEBU 33f4 Creating BCCSP-based MSP instance" -"2019-05-02 01:31:35.222 UTC [msp] New -> DEBU 33f5 Creating Cache-MSP instance" -"2019-05-02 01:31:35.223 UTC [msp] Setup -> DEBU 33f6 Setting up MSP instance Org3MSP" -"2019-05-02 01:31:35.223 UTC [msp.identity] newIdentity -> DEBU 33f7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:04.105 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3288 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-05-02 09:28:04.105 UTC [msp] Validate -> DEBU 3289 MSP Org2MSP validating identity" +"2019-05-02 09:28:04.105 UTC [msp] getCertificationChain -> DEBU 328a MSP Org2MSP getting certification chain" +"2019-05-02 09:28:04.105 UTC [msp] hasOURole -> DEBU 328b MSP Org2MSP checking if the identity is a client" +"2019-05-02 09:28:04.105 UTC [msp] getCertificationChain -> DEBU 328c MSP Org2MSP getting certification chain" +"2019-05-02 09:28:04.105 UTC [common.channelconfig] NewStandardValues -> DEBU 328d Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:28:04.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 328e Processing field: AnchorPeers" +"2019-05-02 09:28:04.105 UTC [common.channelconfig] NewStandardValues -> DEBU 328f Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:04.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3290 Processing field: MSP" +"2019-05-02 09:28:04.105 UTC [common.channelconfig] Validate -> DEBU 3291 Anchor peers for org Org3MSP are " +"2019-05-02 09:28:04.105 UTC [common.channelconfig] validateMSP -> DEBU 3292 Setting up MSP for org Org3MSP" +"2019-05-02 09:28:04.106 UTC [msp] newBccspMsp -> DEBU 3293 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:04.106 UTC [msp] New -> DEBU 3294 Creating Cache-MSP instance" +"2019-05-02 09:28:04.106 UTC [msp] Setup -> DEBU 3295 Setting up MSP instance Org3MSP" +"2019-05-02 09:28:04.106 UTC [msp.identity] newIdentity -> DEBU 3296 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -17239,7 +16494,7 @@ rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== -----END CERTIFICATE-----" -"2019-05-02 01:31:35.224 UTC [msp.identity] newIdentity -> DEBU 33f8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:04.106 UTC [msp.identity] newIdentity -> DEBU 3297 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -17253,21 +16508,21 @@ HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= -----END CERTIFICATE-----" -"2019-05-02 01:31:35.225 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 33f9 Checking if identity satisfies role [CLIENT] for Org3MSP" -"2019-05-02 01:31:35.226 UTC [msp] Validate -> DEBU 33fa MSP Org3MSP validating identity" -"2019-05-02 01:31:35.226 UTC [msp] getCertificationChain -> DEBU 33fb MSP Org3MSP getting certification chain" -"2019-05-02 01:31:35.228 UTC [msp] hasOURole -> DEBU 33fc MSP Org3MSP checking if the identity is a client" -"2019-05-02 01:31:35.228 UTC [msp] getCertificationChain -> DEBU 33fd MSP Org3MSP getting certification chain" -"2019-05-02 01:31:35.228 UTC [common.channelconfig] NewStandardValues -> DEBU 33fe Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:31:35.228 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33ff Processing field: AnchorPeers" -"2019-05-02 01:31:35.229 UTC [common.channelconfig] NewStandardValues -> DEBU 3400 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:35.229 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3401 Processing field: MSP" -"2019-05-02 01:31:35.232 UTC [common.channelconfig] Validate -> DEBU 3402 Anchor peers for org Org1MSP are anchor_peers: " -"2019-05-02 01:31:35.232 UTC [common.channelconfig] validateMSP -> DEBU 3403 Setting up MSP for org Org1MSP" -"2019-05-02 01:31:35.235 UTC [msp] newBccspMsp -> DEBU 3404 Creating BCCSP-based MSP instance" -"2019-05-02 01:31:35.235 UTC [msp] New -> DEBU 3405 Creating Cache-MSP instance" -"2019-05-02 01:31:35.236 UTC [msp] Setup -> DEBU 3406 Setting up MSP instance Org1MSP" -"2019-05-02 01:31:35.239 UTC [msp.identity] newIdentity -> DEBU 3407 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:04.106 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3298 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-05-02 09:28:04.106 UTC [msp] Validate -> DEBU 3299 MSP Org3MSP validating identity" +"2019-05-02 09:28:04.107 UTC [msp] getCertificationChain -> DEBU 329a MSP Org3MSP getting certification chain" +"2019-05-02 09:28:04.107 UTC [msp] hasOURole -> DEBU 329b MSP Org3MSP checking if the identity is a client" +"2019-05-02 09:28:04.107 UTC [msp] getCertificationChain -> DEBU 329c MSP Org3MSP getting certification chain" +"2019-05-02 09:28:04.107 UTC [common.channelconfig] NewStandardValues -> DEBU 329d Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-05-02 09:28:04.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 329e Processing field: AnchorPeers" +"2019-05-02 09:28:04.107 UTC [common.channelconfig] NewStandardValues -> DEBU 329f Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:04.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32a0 Processing field: MSP" +"2019-05-02 09:28:04.107 UTC [common.channelconfig] Validate -> DEBU 32a1 Anchor peers for org Org1MSP are anchor_peers: " +"2019-05-02 09:28:04.107 UTC [common.channelconfig] validateMSP -> DEBU 32a2 Setting up MSP for org Org1MSP" +"2019-05-02 09:28:04.107 UTC [msp] newBccspMsp -> DEBU 32a3 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:04.107 UTC [msp] New -> DEBU 32a4 Creating Cache-MSP instance" +"2019-05-02 09:28:04.107 UTC [msp] Setup -> DEBU 32a5 Setting up MSP instance Org1MSP" +"2019-05-02 09:28:04.108 UTC [msp.identity] newIdentity -> DEBU 32a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -17282,7 +16537,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-05-02 01:31:35.239 UTC [msp.identity] newIdentity -> DEBU 3408 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:04.108 UTC [msp.identity] newIdentity -> DEBU 32a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -17296,387 +16551,476 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:31:35.240 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3409 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-05-02 01:31:35.241 UTC [msp] Validate -> DEBU 340a MSP Org1MSP validating identity" -"2019-05-02 01:31:35.242 UTC [msp] getCertificationChain -> DEBU 340b MSP Org1MSP getting certification chain" -"2019-05-02 01:31:35.242 UTC [msp] hasOURole -> DEBU 340c MSP Org1MSP checking if the identity is a client" -"2019-05-02 01:31:35.242 UTC [msp] getCertificationChain -> DEBU 340d MSP Org1MSP getting certification chain" -"2019-05-02 01:31:35.243 UTC [common.channelconfig] NewStandardValues -> DEBU 340e Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-05-02 01:31:35.243 UTC [common.channelconfig] initializeProtosStruct -> DEBU 340f Processing field: AnchorPeers" -"2019-05-02 01:31:35.244 UTC [common.channelconfig] NewStandardValues -> DEBU 3410 Initializing protos for *channelconfig.OrganizationProtos" -"2019-05-02 01:31:35.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3412 Processing field: MSP" -"2019-05-02 01:31:35.246 UTC [common.channelconfig] Validate -> DEBU 3413 Anchor peers for org Org2MSP are anchor_peers: " -"2019-05-02 01:31:35.247 UTC [common.channelconfig] validateMSP -> DEBU 3414 Setting up MSP for org Org2MSP" -"2019-05-02 01:31:35.247 UTC [msp] newBccspMsp -> DEBU 3415 Creating BCCSP-based MSP instance" -"2019-05-02 01:31:35.247 UTC [msp] New -> DEBU 3416 Creating Cache-MSP instance" -"2019-05-02 01:31:35.245 UTC [comm.grpc.server] 1 -> INFO 3411 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.245Z grpc.peer_address=192.168.240.6:45148 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=125.6µs -"2019-05-02 01:31:35.247 UTC [msp] Setup -> DEBU 3417 Setting up MSP instance Org2MSP" -"2019-05-02 01:31:35.250 UTC [msp.identity] newIdentity -> DEBU 3418 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-05-02 01:31:35.251 UTC [msp.identity] newIdentity -> DEBU 3419 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-05-02 01:31:35.251 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 341a Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-05-02 01:31:35.251 UTC [msp] Validate -> DEBU 341b MSP Org2MSP validating identity" -"2019-05-02 01:31:35.251 UTC [msp] getCertificationChain -> DEBU 341c MSP Org2MSP getting certification chain" -"2019-05-02 01:31:35.252 UTC [msp] hasOURole -> DEBU 341d MSP Org2MSP checking if the identity is a client" -"2019-05-02 01:31:35.252 UTC [msp] getCertificationChain -> DEBU 341e MSP Org2MSP getting certification chain" -"2019-05-02 01:31:35.252 UTC [msp] Setup -> DEBU 341f Setting up the MSP manager (4 msps)" -"2019-05-02 01:31:35.252 UTC [msp] Setup -> DEBU 3420 MSP manager setup complete, setup 4 msps" -"2019-05-02 01:31:35.252 UTC [policies] NewManagerImpl -> DEBU 3421 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:35.253 UTC [policies] NewManagerImpl -> DEBU 3422 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:35.253 UTC [policies] NewManagerImpl -> DEBU 3423 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:35.253 UTC [policies] NewManagerImpl -> DEBU 3424 Proposed new policy Writers for Channel/Orderer" -"2019-05-02 01:31:35.253 UTC [policies] NewManagerImpl -> DEBU 3425 Proposed new policy Admins for Channel/Orderer" -"2019-05-02 01:31:35.254 UTC [policies] NewManagerImpl -> DEBU 3426 Proposed new policy BlockValidation for Channel/Orderer" -"2019-05-02 01:31:35.254 UTC [policies] NewManagerImpl -> DEBU 3427 Proposed new policy Readers for Channel/Orderer" -"2019-05-02 01:31:35.254 UTC [policies] NewManagerImpl -> DEBU 3428 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-05-02 01:31:35.254 UTC [policies] NewManagerImpl -> DEBU 3429 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-05-02 01:31:35.254 UTC [policies] NewManagerImpl -> DEBU 342a Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-05-02 01:31:35.255 UTC [policies] NewManagerImpl -> DEBU 342b Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-05-02 01:31:35.255 UTC [policies] NewManagerImpl -> DEBU 342c Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-05-02 01:31:35.256 UTC [policies] NewManagerImpl -> DEBU 342d Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-05-02 01:31:35.256 UTC [policies] NewManagerImpl -> DEBU 342e Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-05-02 01:31:35.256 UTC [policies] NewManagerImpl -> DEBU 342f Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-05-02 01:31:35.256 UTC [policies] NewManagerImpl -> DEBU 3430 Proposed new policy Readers for Channel/Application/Org3MSP" -"2019-05-02 01:31:35.256 UTC [policies] NewManagerImpl -> DEBU 3431 Proposed new policy Writers for Channel/Application/Org3MSP" -"2019-05-02 01:31:35.258 UTC [policies] NewManagerImpl -> DEBU 3432 Proposed new policy Admins for Channel/Application/Org3MSP" -"2019-05-02 01:31:35.258 UTC [policies] NewManagerImpl -> DEBU 3433 Proposed new policy Endorsement for Channel/Application/Org3MSP" -"2019-05-02 01:31:35.259 UTC [policies] NewManagerImpl -> DEBU 3434 Proposed new policy Writers for Channel/Application" -"2019-05-02 01:31:35.259 UTC [policies] NewManagerImpl -> DEBU 3435 Proposed new policy Admins for Channel/Application" -"2019-05-02 01:31:35.259 UTC [policies] NewManagerImpl -> DEBU 3436 Proposed new policy Endorsement for Channel/Application" -"2019-05-02 01:31:35.259 UTC [policies] NewManagerImpl -> DEBU 3437 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-05-02 01:31:35.260 UTC [policies] NewManagerImpl -> DEBU 3438 Proposed new policy Readers for Channel/Application" -"2019-05-02 01:31:35.260 UTC [policies] NewManagerImpl -> DEBU 3439 Proposed new policy Admins for Channel" -"2019-05-02 01:31:35.260 UTC [policies] NewManagerImpl -> DEBU 343a Proposed new policy Readers for Channel" -"2019-05-02 01:31:35.261 UTC [policies] NewManagerImpl -> DEBU 343b Proposed new policy Writers for Channel" -"2019-05-02 01:31:35.262 UTC [common.configtx] addToMap -> DEBU 343c Adding to config map: [Group] /Channel" -"2019-05-02 01:31:35.263 UTC [common.configtx] addToMap -> DEBU 343d Adding to config map: [Group] /Channel/Orderer" -"2019-05-02 01:31:35.266 UTC [common.configtx] addToMap -> DEBU 343e Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-05-02 01:31:35.272 UTC [common.configtx] addToMap -> DEBU 343f Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-05-02 01:31:35.273 UTC [common.configtx] addToMap -> DEBU 3440 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-05-02 01:31:35.273 UTC [common.configtx] addToMap -> DEBU 3441 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-05-02 01:31:35.274 UTC [common.configtx] addToMap -> DEBU 3442 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-05-02 01:31:35.276 UTC [common.configtx] addToMap -> DEBU 3443 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-05-02 01:31:35.277 UTC [common.configtx] addToMap -> DEBU 3444 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-05-02 01:31:35.277 UTC [common.configtx] addToMap -> DEBU 3445 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-05-02 01:31:35.277 UTC [msp.identity] Sign -> DEBU 3446 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:31:35.278 UTC [msp.identity] Sign -> DEBU 3447 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:31:35.278 UTC [common.configtx] addToMap -> DEBU 3448 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-05-02 01:31:35.279 UTC [common.configtx] addToMap -> DEBU 3449 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-05-02 01:31:35.279 UTC [common.configtx] addToMap -> DEBU 344b Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-05-02 01:31:35.279 UTC [gossip.comm] authenticateRemotePeer -> DEBU 344a Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.6:45148" -"2019-05-02 01:31:35.279 UTC [common.configtx] addToMap -> DEBU 344c Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-05-02 01:31:35.280 UTC [common.configtx] addToMap -> DEBU 344d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-05-02 01:31:35.281 UTC [gossip.comm] authenticateRemotePeer -> DEBU 344e Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:45148" -"2019-05-02 01:31:35.281 UTC [msp.identity] Verify -> DEBU 344f Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-05-02 01:31:35.282 UTC [msp.identity] Verify -> DEBU 3450 Verify: sig = 00000000 30 45 02 21 00 b5 8c cf 64 6a ac 61 df 29 31 19 |0E.!....dj.a.)1.| -00000010 55 1b 70 99 06 cb 8c 24 bf 9b 06 bc ee fb f9 22 |U.p....$......."| -00000020 3f 77 c2 57 32 02 20 2c 10 c6 75 b2 5e 0d 2c 8b |?w.W2. ,..u.^.,.| -00000030 da 5d d9 e1 6e e8 5f be e9 4b b0 e7 cb dc d3 8a |.]..n._..K......| -00000040 a6 ca 59 6a 10 64 2f |..Yj.d/|" -"2019-05-02 01:31:35.282 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3451 Authenticated 192.168.240.6:45148" -"2019-05-02 01:31:35.282 UTC [gossip.comm] GossipStream -> DEBU 3452 Servicing 192.168.240.6:45148" -"2019-05-02 01:31:35.280 UTC [common.configtx] addToMap -> DEBU 3453 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-05-02 01:31:35.283 UTC [gossip.comm] serviceConnection -> DEBU 3454 Closing reading from stream" -"2019-05-02 01:31:35.283 UTC [gossip.comm] func2 -> DEBU 3455 Client 192.168.240.6:44982 disconnected" -"2019-05-02 01:31:35.283 UTC [comm.grpc.server] 1 -> INFO 3456 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.240.6:44982 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=46.8952627s -"2019-05-02 01:31:35.286 UTC [common.configtx] addToMap -> DEBU 3457 Adding to config map: [Group] /Channel/Application" -"2019-05-02 01:31:35.286 UTC [gossip.comm] writeToStream -> DEBU 3458 Closing writing to stream" -"2019-05-02 01:31:35.287 UTC [gossip.comm] serviceConnection -> DEBU 3459 Closing reading from stream" -"2019-05-02 01:31:35.288 UTC [gossip.comm] readFromStream -> DEBU 345b a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -"2019-05-02 01:31:35.287 UTC [gossip.comm] func2 -> DEBU 345c Client 192.168.240.6:45148 disconnected" -"2019-05-02 01:31:35.288 UTC [grpc] infof -> DEBU 345f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:35.289 UTC [comm.grpc.server] 1 -> INFO 3460 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:31:45.276Z grpc.peer_address=192.168.240.6:45148 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.1758ms -"2019-05-02 01:31:35.288 UTC [gossip.comm] writeToStream -> DEBU 345d Closing writing to stream" -"2019-05-02 01:31:35.288 UTC [gossip.comm] readFromStream -> DEBU 345e a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -"2019-05-02 01:31:35.286 UTC [common.configtx] addToMap -> DEBU 345a Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-05-02 01:31:35.292 UTC [common.configtx] addToMap -> DEBU 3461 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-05-02 01:31:35.293 UTC [common.configtx] addToMap -> DEBU 3462 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-05-02 01:31:35.293 UTC [common.configtx] addToMap -> DEBU 3463 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-05-02 01:31:35.294 UTC [common.configtx] addToMap -> DEBU 3464 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-05-02 01:31:35.294 UTC [common.configtx] addToMap -> DEBU 3465 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-05-02 01:31:35.294 UTC [common.configtx] addToMap -> DEBU 3466 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-05-02 01:31:35.295 UTC [common.configtx] addToMap -> DEBU 3467 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-05-02 01:31:35.295 UTC [common.configtx] addToMap -> DEBU 3468 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-05-02 01:31:35.295 UTC [common.configtx] addToMap -> DEBU 3469 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-05-02 01:31:35.295 UTC [common.configtx] addToMap -> DEBU 346a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.296 UTC [common.configtx] addToMap -> DEBU 346b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-05-02 01:31:35.296 UTC [common.configtx] addToMap -> DEBU 346c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-05-02 01:31:35.297 UTC [common.configtx] addToMap -> DEBU 346d Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-05-02 01:31:35.298 UTC [grpc] infof -> DEBU 346e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:35.298 UTC [common.configtx] addToMap -> DEBU 346f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-05-02 01:31:35.299 UTC [common.configtx] addToMap -> DEBU 3470 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-05-02 01:31:35.299 UTC [common.configtx] addToMap -> DEBU 3471 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-05-02 01:31:35.299 UTC [common.configtx] addToMap -> DEBU 3472 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.299 UTC [common.configtx] addToMap -> DEBU 3473 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-05-02 01:31:35.300 UTC [common.configtx] addToMap -> DEBU 3474 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-05-02 01:31:35.300 UTC [common.configtx] addToMap -> DEBU 3475 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-05-02 01:31:35.300 UTC [common.configtx] addToMap -> DEBU 3476 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-05-02 01:31:35.301 UTC [common.configtx] addToMap -> DEBU 3477 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-05-02 01:31:35.302 UTC [common.configtx] addToMap -> DEBU 3478 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-05-02 01:31:35.302 UTC [common.configtx] addToMap -> DEBU 3479 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-05-02 01:31:35.302 UTC [common.configtx] addToMap -> DEBU 347a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-05-02 01:31:35.302 UTC [common.configtx] addToMap -> DEBU 347b Adding to config map: [Policy] /Channel/Application/Readers" -"2019-05-02 01:31:35.302 UTC [common.configtx] addToMap -> DEBU 347c Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-05-02 01:31:35.303 UTC [common.configtx] addToMap -> DEBU 347d Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-05-02 01:31:35.303 UTC [common.configtx] addToMap -> DEBU 347e Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-05-02 01:31:35.304 UTC [common.configtx] addToMap -> DEBU 347f Adding to config map: [Value] /Channel/Capabilities" -"2019-05-02 01:31:35.304 UTC [common.configtx] addToMap -> DEBU 3480 Adding to config map: [Value] /Channel/Consortium" -"2019-05-02 01:31:35.304 UTC [common.configtx] addToMap -> DEBU 3481 Adding to config map: [Policy] /Channel/Readers" -"2019-05-02 01:31:35.304 UTC [common.configtx] addToMap -> DEBU 3482 Adding to config map: [Policy] /Channel/Writers" -"2019-05-02 01:31:35.304 UTC [common.configtx] addToMap -> DEBU 3483 Adding to config map: [Policy] /Channel/Admins" -"2019-05-02 01:31:35.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 3484 As expected, current configuration has policy '/Channel/Readers'" -"2019-05-02 01:31:35.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 3485 As expected, current configuration has policy '/Channel/Writers'" -"2019-05-02 01:31:35.305 UTC [policies] Manager -> DEBU 3486 Manager Channel looking up path [Application]" -"2019-05-02 01:31:35.307 UTC [policies] Manager -> DEBU 3487 Manager Channel has managers Orderer" -"2019-05-02 01:31:35.307 UTC [policies] Manager -> DEBU 3488 Manager Channel has managers Application" -"2019-05-02 01:31:35.307 UTC [policies] Manager -> DEBU 3489 Manager Channel/Application looking up path []" -"2019-05-02 01:31:35.308 UTC [policies] Manager -> DEBU 348a Manager Channel/Application has managers Org1MSP" -"2019-05-02 01:31:35.308 UTC [policies] Manager -> DEBU 348b Manager Channel/Application has managers Org2MSP" -"2019-05-02 01:31:35.308 UTC [policies] Manager -> DEBU 348c Manager Channel/Application has managers Org3MSP" -"2019-05-02 01:31:35.309 UTC [common.channelconfig] LogSanityChecks -> DEBU 348d As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-05-02 01:31:35.309 UTC [common.channelconfig] LogSanityChecks -> DEBU 348e As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-05-02 01:31:35.309 UTC [common.channelconfig] LogSanityChecks -> DEBU 348f As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-05-02 01:31:35.310 UTC [policies] Manager -> DEBU 3490 Manager Channel looking up path [Orderer]" -"2019-05-02 01:31:35.310 UTC [policies] Manager -> DEBU 3491 Manager Channel has managers Orderer" -"2019-05-02 01:31:35.310 UTC [policies] Manager -> DEBU 3492 Manager Channel has managers Application" -"2019-05-02 01:31:35.310 UTC [policies] Manager -> DEBU 3493 Manager Channel/Orderer looking up path []" -"2019-05-02 01:31:35.311 UTC [policies] Manager -> DEBU 3494 Manager Channel/Orderer has managers OrdererOrg" -"2019-05-02 01:31:35.311 UTC [common.channelconfig] LogSanityChecks -> DEBU 3495 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-05-02 01:31:35.311 UTC [common.capabilities] Supported -> DEBU 3496 Application capability V2_0 is supported and is enabled" -"2019-05-02 01:31:35.311 UTC [common.capabilities] Supported -> DEBU 3497 Channel capability V2_0 is supported and is enabled" -"2019-05-02 01:31:35.312 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3498 Processing new config for channel businesschannel" -"2019-05-02 01:31:35.315 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3499 Calling out because config was updated for channel businesschannel" -"2019-05-02 01:31:35.315 UTC [gossip.service] updateAnchors -> DEBU 349a Org3MSP anchor peers: []" -"2019-05-02 01:31:35.315 UTC [gossip.service] updateAnchors -> DEBU 349b Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -"2019-05-02 01:31:35.316 UTC [gossip.service] updateAnchors -> DEBU 349c Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" -"2019-05-02 01:31:35.316 UTC [gossip.service] updateAnchors -> DEBU 349d Creating state provider for chainID businesschannel" -"2019-05-02 01:31:35.316 UTC [msp] DeserializeIdentity -> DEBU 349e Obtaining identity" -"2019-05-02 01:31:35.316 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 349f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.316 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.316 UTC [policies] Evaluate -> DEBU 34a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.320 UTC [policies] Evaluate -> DEBU 34a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.318 UTC [comm.grpc.server] 1 -> INFO 34a2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.314Z grpc.peer_address=192.168.240.5:55380 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=116.7µs -"2019-05-02 01:31:35.320 UTC [policies] Evaluate -> DEBU 34a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.321 UTC [cauthdsl] func1 -> DEBU 34a5 0xc003f6d2d0 gate 1556760695321137300 evaluation starts" -"2019-05-02 01:31:35.321 UTC [cauthdsl] func2 -> DEBU 34a6 0xc003f6d2d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.321 UTC [cauthdsl] func2 -> DEBU 34a7 0xc003f6d2d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.321 UTC [cauthdsl] func2 -> DEBU 34a8 0xc003f6d2d0 principal matched by identity 0" -"2019-05-02 01:31:35.321 UTC [msp.identity] Verify -> DEBU 34a9 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:35.322 UTC [msp.identity] Verify -> DEBU 34aa Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:35.322 UTC [cauthdsl] func2 -> DEBU 34ab 0xc003f6d2d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.323 UTC [cauthdsl] func1 -> DEBU 34ac 0xc003f6d2d0 gate 1556760695321137300 evaluation succeeds" -"2019-05-02 01:31:35.323 UTC [policies] Evaluate -> DEBU 34ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.324 UTC [policies] Evaluate -> DEBU 34ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.324 UTC [policies] Evaluate -> DEBU 34af Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.324 UTC [policies] Evaluate -> DEBU 34b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.325 UTC [msp] DeserializeIdentity -> DEBU 34b1 Obtaining identity" -"2019-05-02 01:31:35.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b2 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b3 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.327 UTC [policies] Evaluate -> DEBU 34b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.327 UTC [policies] Evaluate -> DEBU 34b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.327 UTC [policies] Evaluate -> DEBU 34b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.327 UTC [cauthdsl] func1 -> DEBU 34b7 0xc00370c3b0 gate 1556760695327806100 evaluation starts" -"2019-05-02 01:31:35.328 UTC [cauthdsl] func2 -> DEBU 34b8 0xc00370c3b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.328 UTC [cauthdsl] func2 -> DEBU 34b9 0xc00370c3b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.328 UTC [cauthdsl] func2 -> DEBU 34ba 0xc00370c3b0 principal matched by identity 0" -"2019-05-02 01:31:35.335 UTC [msp.identity] Verify -> DEBU 34bc Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:35.331 UTC [msp.identity] Sign -> DEBU 34bb Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:31:35.336 UTC [msp.identity] Verify -> DEBU 34bd Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:35.337 UTC [cauthdsl] func2 -> DEBU 34bf 0xc00370c3b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.336 UTC [msp.identity] Sign -> DEBU 34be Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:31:35.337 UTC [cauthdsl] func1 -> DEBU 34c0 0xc00370c3b0 gate 1556760695327806100 evaluation succeeds" -"2019-05-02 01:31:35.337 UTC [policies] Evaluate -> DEBU 34c1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.340 UTC [policies] Evaluate -> DEBU 34c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.338 UTC [gossip.comm] authenticateRemotePeer -> DEBU 34c2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:55380" -"2019-05-02 01:31:35.340 UTC [gossip.comm] authenticateRemotePeer -> DEBU 34c5 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:55380" -"2019-05-02 01:31:35.341 UTC [msp] DeserializeIdentity -> DEBU 34c6 Obtaining identity" -"2019-05-02 01:31:35.340 UTC [policies] Evaluate -> DEBU 34c4 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.341 UTC [policies] Evaluate -> DEBU 34c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.341 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34c8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.342 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34ca Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.341 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.342 UTC [policies] Evaluate -> DEBU 34cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.342 UTC [policies] Evaluate -> DEBU 34cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.342 UTC [policies] Evaluate -> DEBU 34ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.342 UTC [msp] DeserializeIdentity -> DEBU 34cb Obtaining identity" -"2019-05-02 01:31:35.343 UTC [cauthdsl] func1 -> DEBU 34cf 0xc00370d470 gate 1556760695342908900 evaluation starts" -"2019-05-02 01:31:35.343 UTC [cauthdsl] func2 -> DEBU 34d0 0xc00370d470 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.343 UTC [cauthdsl] func2 -> DEBU 34d1 0xc00370d470 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.343 UTC [cauthdsl] func2 -> DEBU 34d3 0xc00370d470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-05-02 01:31:35.343 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.343 UTC [cauthdsl] func2 -> DEBU 34d4 0xc00370d470 principal evaluation fails" -"2019-05-02 01:31:35.344 UTC [cauthdsl] func1 -> DEBU 34d5 0xc00370d470 gate 1556760695342908900 evaluation fails" -"2019-05-02 01:31:35.344 UTC [policies] Evaluate -> DEBU 34d7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.344 UTC [policies] Evaluate -> DEBU 34d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.344 UTC [policies] Evaluate -> DEBU 34d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:35.344 UTC [cauthdsl] func1 -> DEBU 34da 0xc00370dcb0 gate 1556760695344872500 evaluation starts" -"2019-05-02 01:31:35.343 UTC [msp] DeserializeIdentity -> DEBU 34d6 Obtaining identity" -"2019-05-02 01:31:35.345 UTC [cauthdsl] func2 -> DEBU 34db 0xc00370dcb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.345 UTC [cauthdsl] func2 -> DEBU 34dc 0xc00370dcb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.345 UTC [cauthdsl] func2 -> DEBU 34dd 0xc00370dcb0 principal matched by identity 0" -"2019-05-02 01:31:35.345 UTC [msp.identity] Verify -> DEBU 34de Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:35.346 UTC [msp.identity] Verify -> DEBU 34df Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:35.346 UTC [cauthdsl] func2 -> DEBU 34e1 0xc00370dcb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.348 UTC [cauthdsl] func1 -> DEBU 34e2 0xc00370dcb0 gate 1556760695344872500 evaluation succeeds" -"2019-05-02 01:31:35.345 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.348 UTC [policies] Evaluate -> DEBU 34e3 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.349 UTC [policies] Evaluate -> DEBU 34e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.350 UTC [policies] Evaluate -> DEBU 34e6 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.352 UTC [policies] Evaluate -> DEBU 34e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.352 UTC [gossip.gossip] JoinChan -> INFO 34e8 Joining gossip network of channel businesschannel with 3 organizations" -"2019-05-02 01:31:35.353 UTC [gossip.gossip] learnAnchorPeers -> INFO 34ea Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -"2019-05-02 01:31:35.353 UTC [gossip.discovery] Connect -> DEBU 34eb Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " -"2019-05-02 01:31:35.354 UTC [gossip.discovery] Connect -> DEBU 34ec Exiting" -"2019-05-02 01:31:35.349 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34e4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.354 UTC [gossip.gossip] learnAnchorPeers -> INFO 34ed No configured anchor peers of Org3MSP for channel businesschannel to learn about" -"2019-05-02 01:31:35.354 UTC [gossip.gossip] learnAnchorPeers -> INFO 34ee Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -"2019-05-02 01:31:35.355 UTC [gossip.gossip] learnAnchorPeers -> INFO 34ef Anchor peer with same endpoint, skipping connecting to myself" -"2019-05-02 01:31:35.355 UTC [gossip.service] updateEndpoints -> DEBU 34f0 Updating endpoints for chainID%!(EXTRA string=businesschannel)" -"2019-05-02 01:31:35.354 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34f1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.355 UTC [policies] Evaluate -> DEBU 34f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.356 UTC [msp] DeserializeIdentity -> DEBU 34f3 Obtaining identity" -"2019-05-02 01:31:35.357 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.357 UTC [msp] DeserializeIdentity -> DEBU 34f6 Obtaining identity" -"2019-05-02 01:31:35.358 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34f7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.359 UTC [peer] updateTrustedRoots -> DEBU 34f8 Updating trusted root authorities for channel businesschannel" -"2019-05-02 01:31:35.367 UTC [grpc] DialContext -> DEBU 34f9 parsed scheme: """ -"2019-05-02 01:31:35.367 UTC [grpc] DialContext -> DEBU 34fa scheme "" not registered, fallback to default scheme" -"2019-05-02 01:31:35.368 UTC [grpc] UpdateState -> DEBU 34fb ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" -"2019-05-02 01:31:35.368 UTC [grpc] switchBalancer -> DEBU 34fc ClientConn switching balancer to "pick_first"" -"2019-05-02 01:31:35.369 UTC [grpc] HandleSubConnStateChange -> DEBU 34fd pickfirstBalancer: HandleSubConnStateChange: 0xc002fbd670, CONNECTING" -"2019-05-02 01:31:35.372 UTC [gossip.comm] func1 -> DEBU 34fe Got message: GossipMessage: Channel: , nonce: 5439724871213563240, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.372 UTC [gossip.gossip] handleMessage -> DEBU 34ff Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 5439724871213563240, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.373 UTC [gossip.gossip] handleMessage -> DEBU 3500 Exiting" -"2019-05-02 01:31:35.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3501 Got message: GossipMessage: Channel: , nonce: 5439724871213563240, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.376 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3502 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:35.376 UTC [msp] DeserializeIdentity -> DEBU 3503 Obtaining identity" -"2019-05-02 01:31:35.377 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3504 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3505 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3506 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.378 UTC [policies] Evaluate -> DEBU 3507 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.378 UTC [policies] Evaluate -> DEBU 3508 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.378 UTC [policies] Evaluate -> DEBU 3509 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.379 UTC [cauthdsl] func1 -> DEBU 350a 0xc003b3aba0 gate 1556760695378997800 evaluation starts" -"2019-05-02 01:31:35.379 UTC [cauthdsl] func2 -> DEBU 350b 0xc003b3aba0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.379 UTC [peer] buildTrustedRootsForChain -> DEBU 350c updating root CAs for channel [businesschannel]" -"2019-05-02 01:31:35.380 UTC [peer] buildTrustedRootsForChain -> DEBU 350d adding app root CAs for MSP [Org2MSP]" -"2019-05-02 01:31:35.380 UTC [peer] buildTrustedRootsForChain -> DEBU 350e adding orderer root CAs for MSP [OrdererMSP]" -"2019-05-02 01:31:35.380 UTC [peer] buildTrustedRootsForChain -> DEBU 350f adding app root CAs for MSP [Org3MSP]" -"2019-05-02 01:31:35.380 UTC [peer] buildTrustedRootsForChain -> DEBU 3510 adding app root CAs for MSP [Org1MSP]" -"2019-05-02 01:31:35.381 UTC [cauthdsl] func2 -> DEBU 3511 0xc003b3aba0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.382 UTC [cauthdsl] func2 -> DEBU 3512 0xc003b3aba0 principal matched by identity 0" -"2019-05-02 01:31:35.383 UTC [msp.identity] Verify -> DEBU 3513 Verify: digest = 00000000 4d 41 c5 85 aa 12 fe 69 1d be d6 e8 c0 4c cd a6 |MA.....i.....L..| -00000010 03 ae 31 6a d5 4e 88 a3 79 d7 18 61 b8 b7 da bb |..1j.N..y..a....|" -"2019-05-02 01:31:35.383 UTC [msp.identity] Verify -> DEBU 3514 Verify: sig = 00000000 30 45 02 21 00 d2 d8 16 13 4c 7f e3 d5 f5 c0 ae |0E.!.....L......| -00000010 f7 d3 cc 20 d0 cc 9d 4c 98 53 77 8e c6 bd 89 0b |... ...L.Sw.....| -00000020 a7 d7 41 8a 50 02 20 58 f4 b5 93 08 bd 37 e2 88 |..A.P. X.....7..| -00000030 70 6b f3 02 42 48 b5 bf f0 4a 24 32 c5 f7 38 b8 |pk..BH...J$2..8.| -00000040 4a ae 8a e7 bf bd a6 |J......|" -"2019-05-02 01:31:35.384 UTC [committer.txvalidator] validateTx -> DEBU 3515 config transaction received for chain businesschannel" -"2019-05-02 01:31:35.385 UTC [committer.txvalidator] validateTx -> DEBU 3516 [businesschannel] validateTx completes for block 0xc00382f440 env 0xc0044452c0 txn 0" -"2019-05-02 01:31:35.385 UTC [committer.txvalidator] Validate -> DEBU 3517 got result for idx 0, code 0" -"2019-05-02 01:31:35.386 UTC [committer.txvalidator] Validate -> INFO 3518 [businesschannel] Validated block [9] in 242ms" -"2019-05-02 01:31:35.388 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3519 Retrieving private write sets for 0 transactions from transient store" -"2019-05-02 01:31:35.388 UTC [gossip.privdata] StoreBlock -> DEBU 351a [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-05-02 01:31:35.389 UTC [committer] preCommit -> DEBU 351b Received configuration update, calling CSCC ConfigUpdate" -"2019-05-02 01:31:35.389 UTC [kvledger] CommitWithPvtData -> DEBU 351c [businesschannel] Validating state for block [9]" -"2019-05-02 01:31:35.390 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 351d Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-05-02 01:31:35.391 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 351e lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-05-02 01:31:35.392 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 351f Validating new block with num trans = [1]" -"2019-05-02 01:31:35.392 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3520 ValidateAndPrepareBatch() for block number = [9]" -"2019-05-02 01:31:35.393 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3521 preprocessing ProtoBlock..." -"2019-05-02 01:31:35.393 UTC [grpc] infof -> DEBU 3522 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:35.395 UTC [cauthdsl] func2 -> DEBU 3523 0xc003b3aba0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.395 UTC [cauthdsl] func1 -> DEBU 3524 0xc003b3aba0 gate 1556760695378997800 evaluation succeeds" -"2019-05-02 01:31:35.393 UTC [valimpl] preprocessProtoBlock -> DEBU 3525 txType=CONFIG" -"2019-05-02 01:31:35.395 UTC [valimpl] processNonEndorserTx -> DEBU 3526 Performing custom processing for transaction [txid=], [txType=CONFIG]" -"2019-05-02 01:31:35.395 UTC [valimpl] processNonEndorserTx -> DEBU 3527 Processor for custom tx processing:&peer.configtxProcessor{}" -"2019-05-02 01:31:35.395 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3528 constructing new tx simulator" -"2019-05-02 01:31:35.396 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3529 constructing new tx simulator txid = []" -"2019-05-02 01:31:35.396 UTC [peer] GenerateSimulationResults -> DEBU 352a Processing CONFIG" -"2019-05-02 01:31:35.353 UTC [comm.grpc.server] 1 -> INFO 34e9 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T01:31:37.351Z grpc.peer_address=192.168.240.8:38992 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.0229ms -"2019-05-02 01:31:35.355 UTC [policies] Evaluate -> DEBU 34f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.398 UTC [policies] Evaluate -> DEBU 352c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.398 UTC [cauthdsl] func1 -> DEBU 352d 0xc003b3b6b0 gate 1556760695398680300 evaluation starts" -"2019-05-02 01:31:35.398 UTC [cauthdsl] func2 -> DEBU 352e 0xc003b3b6b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.398 UTC [peer] processChannelConfigTx -> DEBU 352f channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -"2019-05-02 01:31:35.401 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3531 Simulation completed, getting simulation results" -"2019-05-02 01:31:35.401 UTC [lockbasedtxmgr] Done -> DEBU 3532 Done with transaction simulation / query execution []" -"2019-05-02 01:31:35.401 UTC [grpc] HandleSubConnStateChange -> DEBU 3533 pickfirstBalancer: HandleSubConnStateChange: 0xc002fbd670, READY" -"2019-05-02 01:31:35.396 UTC [policies] Evaluate -> DEBU 352b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.404 UTC [policies] Evaluate -> DEBU 3536 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.405 UTC [policies] Evaluate -> DEBU 3537 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.405 UTC [policies] Evaluate -> DEBU 3538 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 3539 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:35.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 353a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:35.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 353b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 " -"2019-05-02 01:31:35.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 353c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 " -"2019-05-02 01:31:35.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 353d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:35.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 353e Exiting" -"2019-05-02 01:31:35.407 UTC [gossip.discovery] handleAliveMessage -> DEBU 353f Exiting" -"2019-05-02 01:31:35.407 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3540 Exiting" -"2019-05-02 01:31:35.407 UTC [gossip.discovery] sendMemResponse -> DEBU 3541 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:35.407 UTC [msp] DeserializeIdentity -> DEBU 3542 Obtaining identity" -"2019-05-02 01:31:35.408 UTC [msp] DeserializeIdentity -> DEBU 3543 Obtaining identity" -"2019-05-02 01:31:35.408 UTC [msp.identity] newIdentity -> DEBU 3544 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +"2019-05-02 09:28:04.108 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 32a8 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-05-02 09:28:04.108 UTC [msp] Validate -> DEBU 32a9 MSP Org1MSP validating identity" +"2019-05-02 09:28:04.108 UTC [msp] getCertificationChain -> DEBU 32aa MSP Org1MSP getting certification chain" +"2019-05-02 09:28:04.108 UTC [msp] hasOURole -> DEBU 32ab MSP Org1MSP checking if the identity is a client" +"2019-05-02 09:28:04.109 UTC [msp] getCertificationChain -> DEBU 32ac MSP Org1MSP getting certification chain" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] NewStandardValues -> DEBU 32ad Initializing protos for *channelconfig.OrdererProtos" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32ae Processing field: ConsensusType" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32af Processing field: BatchSize" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b0 Processing field: BatchTimeout" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b1 Processing field: KafkaBrokers" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b2 Processing field: ChannelRestrictions" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b3 Processing field: Capabilities" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] NewStandardValues -> DEBU 32b4 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b5 Processing field: Endpoints" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] NewStandardValues -> DEBU 32b6 Initializing protos for *channelconfig.OrganizationProtos" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 32b7 Processing field: MSP" +"2019-05-02 09:28:04.109 UTC [common.channelconfig] validateMSP -> DEBU 32b8 Setting up MSP for org OrdererOrg" +"2019-05-02 09:28:04.109 UTC [msp] newBccspMsp -> DEBU 32b9 Creating BCCSP-based MSP instance" +"2019-05-02 09:28:04.109 UTC [msp] New -> DEBU 32ba Creating Cache-MSP instance" +"2019-05-02 09:28:04.109 UTC [msp] Setup -> DEBU 32bb Setting up MSP instance OrdererMSP" +"2019-05-02 09:28:04.110 UTC [msp.identity] newIdentity -> DEBU 32bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-05-02 01:31:35.409 UTC [msp] DeserializeIdentity -> DEBU 3545 Obtaining identity" -"2019-05-02 01:31:35.409 UTC [msp] DeserializeIdentity -> DEBU 3546 Obtaining identity" -"2019-05-02 01:31:35.410 UTC [msp.identity] newIdentity -> DEBU 3547 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:04.110 UTC [msp.identity] newIdentity -> DEBU 32bd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-05-02 09:28:04.110 UTC [msp] Validate -> DEBU 32be MSP OrdererMSP validating identity" +"2019-05-02 09:28:04.130 UTC [msp] Setup -> DEBU 32bf Setting up the MSP manager (4 msps)" +"2019-05-02 09:28:04.131 UTC [msp] Setup -> DEBU 32c0 MSP manager setup complete, setup 4 msps" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c1 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c2 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c3 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c4 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c5 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c6 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c7 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c8 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32c9 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32ca Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cb Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cc Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cd Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32ce Proposed new policy Readers for Channel/Application" +"2019-05-02 09:28:04.131 UTC [policies] NewManagerImpl -> DEBU 32cf Proposed new policy Writers for Channel/Application" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d0 Proposed new policy Admins for Channel/Application" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d1 Proposed new policy Endorsement for Channel/Application" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d3 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d4 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d5 Proposed new policy Readers for Channel/Orderer" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d6 Proposed new policy Writers for Channel/Orderer" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d7 Proposed new policy Admins for Channel/Orderer" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d8 Proposed new policy BlockValidation for Channel/Orderer" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32d9 Proposed new policy Admins for Channel" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32da Proposed new policy Readers for Channel" +"2019-05-02 09:28:04.132 UTC [policies] NewManagerImpl -> DEBU 32db Proposed new policy Writers for Channel" +"2019-05-02 09:28:04.132 UTC [common.configtx] addToMap -> DEBU 32dc Adding to config map: [Group] /Channel" +"2019-05-02 09:28:04.132 UTC [common.configtx] addToMap -> DEBU 32dd Adding to config map: [Group] /Channel/Application" +"2019-05-02 09:28:04.132 UTC [common.configtx] addToMap -> DEBU 32de Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32df Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e5 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e6 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32e9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ea Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32eb Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ec Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ed Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ee Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32ef Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.133 UTC [common.configtx] addToMap -> DEBU 32f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-05-02 09:28:04.140 UTC [common.configtx] addToMap -> DEBU 32f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-05-02 09:28:04.139 UTC [gossip.comm] func1 -> DEBU 32f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.140 UTC [gossip.gossip] handleMessage -> DEBU 32f3 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.140 UTC [gossip.gossip] handleMessage -> DEBU 32f4 Exiting" +"2019-05-02 09:28:04.140 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.140 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32f6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:04.141 UTC [msp.identity] Verify -> DEBU 32f7 Verify: digest = 00000000 75 83 f6 94 57 c7 45 0f 0e 53 f0 09 37 54 0f de |u...W.E..S..7T..| +00000010 19 8a 7b 91 0a f0 59 14 f2 2f d0 dd 2b 5e 82 3d |..{...Y../..+^.=|" +"2019-05-02 09:28:04.141 UTC [msp.identity] Verify -> DEBU 32f8 Verify: sig = 00000000 30 45 02 21 00 ee da e1 93 0a 08 cf 00 ba 07 2e |0E.!............| +00000010 43 46 5c 6a ab 97 5d 0c 16 00 c5 54 53 7a 69 9d |CF\j..]....TSzi.| +00000020 80 c3 9f bc 23 02 20 13 e3 48 2b 19 2c f4 2b 1f |....#. ..H+.,.+.| +00000030 1e 7b 63 88 ad 37 91 7a 40 f2 e5 cd 2e 3b ff 47 |.{c..7.z@....;.G| +00000040 2d 08 7f f0 9a f1 e9 |-......|" +"2019-05-02 09:28:04.141 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:28:04.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fb updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 " +"2019-05-02 09:28:04.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fc Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 " +"2019-05-02 09:28:04.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fd Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:04.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 32fe Exiting" +"2019-05-02 09:28:04.142 UTC [gossip.discovery] handleAliveMessage -> DEBU 32ff Exiting" +"2019-05-02 09:28:04.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3300 Exiting" +"2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3301 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3302 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3303 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3304 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3305 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3306 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3307 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3308 Adding to config map: [Group] /Channel/Orderer" +"2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 3309 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-05-02 09:28:04.142 UTC [common.configtx] addToMap -> DEBU 330a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 330f Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3310 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3311 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3312 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-05-02 09:28:04.143 UTC [common.configtx] addToMap -> DEBU 3313 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3314 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3315 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3316 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3317 Adding to config map: [Value] /Channel/Capabilities" +"2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3318 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 3319 Adding to config map: [Value] /Channel/Consortium" +"2019-05-02 09:28:04.144 UTC [common.configtx] addToMap -> DEBU 331a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331b Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331c Adding to config map: [Policy] /Channel/Admins" +"2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331d Adding to config map: [Policy] /Channel/Readers" +"2019-05-02 09:28:04.145 UTC [common.configtx] addToMap -> DEBU 331e Adding to config map: [Policy] /Channel/Writers" +"2019-05-02 09:28:04.145 UTC [common.channelconfig] LogSanityChecks -> DEBU 331f As expected, current configuration has policy '/Channel/Readers'" +"2019-05-02 09:28:04.145 UTC [common.channelconfig] LogSanityChecks -> DEBU 3320 As expected, current configuration has policy '/Channel/Writers'" +"2019-05-02 09:28:04.145 UTC [policies] Manager -> DEBU 3321 Manager Channel looking up path [Application]" +"2019-05-02 09:28:04.145 UTC [policies] Manager -> DEBU 3322 Manager Channel has managers Application" +"2019-05-02 09:28:04.145 UTC [policies] Manager -> DEBU 3323 Manager Channel has managers Orderer" +"2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3324 Manager Channel/Application looking up path []" +"2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3325 Manager Channel/Application has managers Org2MSP" +"2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3326 Manager Channel/Application has managers Org3MSP" +"2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 3327 Manager Channel/Application has managers Org1MSP" +"2019-05-02 09:28:04.146 UTC [common.channelconfig] LogSanityChecks -> DEBU 3328 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-05-02 09:28:04.146 UTC [common.channelconfig] LogSanityChecks -> DEBU 3329 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-05-02 09:28:04.146 UTC [common.channelconfig] LogSanityChecks -> DEBU 332a As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-05-02 09:28:04.146 UTC [policies] Manager -> DEBU 332b Manager Channel looking up path [Orderer]" +"2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332c Manager Channel has managers Application" +"2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332d Manager Channel has managers Orderer" +"2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332e Manager Channel/Orderer looking up path []" +"2019-05-02 09:28:04.147 UTC [policies] Manager -> DEBU 332f Manager Channel/Orderer has managers OrdererOrg" +"2019-05-02 09:28:04.147 UTC [common.channelconfig] LogSanityChecks -> DEBU 3330 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-05-02 09:28:04.147 UTC [common.capabilities] Supported -> DEBU 3331 Application capability V2_0 is supported and is enabled" +"2019-05-02 09:28:04.148 UTC [common.capabilities] Supported -> DEBU 3332 Channel capability V2_0 is supported and is enabled" +"2019-05-02 09:28:04.148 UTC [msp] DeserializeIdentity -> DEBU 3333 Obtaining identity" +"2019-05-02 09:28:04.148 UTC [msp] DeserializeIdentity -> DEBU 3334 Obtaining identity" +"2019-05-02 09:28:04.148 UTC [msp] DeserializeIdentity -> DEBU 3335 Obtaining identity" +"2019-05-02 09:28:04.148 UTC [gossip.comm] Send -> DEBU 3336 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:04.148 UTC [gossip.comm] Send -> DEBU 3337 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 3338 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 3339 Exiting" +"2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 333a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 333b Exiting" +"2019-05-02 09:28:04.150 UTC [gossip.gossip] handleMessage -> DEBU 333c Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:04.150 UTC [gossip.gossip] handleMessage -> DEBU 333d Exiting" +"2019-05-02 09:28:04.153 UTC [gossip.discovery] handleMsgFromComm -> DEBU 333e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:04.153 UTC [gossip.discovery] handleMsgFromComm -> DEBU 333f Exiting" +"2019-05-02 09:28:04.148 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3340 Processing new config for channel businesschannel" +"2019-05-02 09:28:04.153 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3341 Calling out because config was updated for channel businesschannel" +"2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3342 Org3MSP anchor peers: []" +"2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3343 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3344 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +"2019-05-02 09:28:04.153 UTC [gossip.service] updateAnchors -> DEBU 3345 Creating state provider for chainID businesschannel" +"2019-05-02 09:28:04.153 UTC [msp] DeserializeIdentity -> DEBU 3346 Obtaining identity" +"2019-05-02 09:28:04.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3347 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.153 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3348 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.153 UTC [policies] Evaluate -> DEBU 3349 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.153 UTC [policies] Evaluate -> DEBU 334a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.154 UTC [policies] Evaluate -> DEBU 334b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:04.154 UTC [cauthdsl] func1 -> DEBU 334c 0xc00264f900 gate 1556789284154067400 evaluation starts" +"2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 334d 0xc00264f900 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 334e 0xc00264f900 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 334f 0xc00264f900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:04.154 UTC [cauthdsl] func2 -> DEBU 3350 0xc00264f900 principal evaluation fails" +"2019-05-02 09:28:04.154 UTC [cauthdsl] func1 -> DEBU 3351 0xc00264f900 gate 1556789284154067400 evaluation fails" +"2019-05-02 09:28:04.155 UTC [policies] Evaluate -> DEBU 3352 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.155 UTC [policies] Evaluate -> DEBU 3353 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.155 UTC [policies] Evaluate -> DEBU 3354 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.155 UTC [cauthdsl] func1 -> DEBU 3355 0xc002cf4140 gate 1556789284155465100 evaluation starts" +"2019-05-02 09:28:04.155 UTC [cauthdsl] func2 -> DEBU 3356 0xc002cf4140 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.155 UTC [cauthdsl] func2 -> DEBU 3357 0xc002cf4140 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.155 UTC [cauthdsl] func2 -> DEBU 3358 0xc002cf4140 principal matched by identity 0" +"2019-05-02 09:28:04.155 UTC [msp.identity] Verify -> DEBU 3359 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:28:04.155 UTC [msp.identity] Verify -> DEBU 335a Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 335b 0xc002cf4140 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 335c 0xc002cf4140 gate 1556789284155465100 evaluation succeeds" +"2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 335d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 335e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 335f Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3360 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.156 UTC [msp] DeserializeIdentity -> DEBU 3361 Obtaining identity" +"2019-05-02 09:28:04.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3362 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3363 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3364 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3365 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 3366 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 3367 0xc002cf5220 gate 1556789284156479200 evaluation starts" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3368 0xc002cf5220 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3369 0xc002cf5220 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 336a 0xc002cf5220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 336b 0xc002cf5220 principal evaluation fails" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 336c 0xc002cf5220 gate 1556789284156479200 evaluation fails" +"2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 336d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 336e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.156 UTC [policies] Evaluate -> DEBU 336f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func1 -> DEBU 3370 0xc002cf5a60 gate 1556789284156813000 evaluation starts" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3371 0xc002cf5a60 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3372 0xc002cf5a60 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.156 UTC [cauthdsl] func2 -> DEBU 3373 0xc002cf5a60 principal matched by identity 0" +"2019-05-02 09:28:04.156 UTC [msp.identity] Verify -> DEBU 3374 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:28:04.157 UTC [msp.identity] Verify -> DEBU 3375 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3376 0xc002cf5a60 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.157 UTC [cauthdsl] func1 -> DEBU 3377 0xc002cf5a60 gate 1556789284156813000 evaluation succeeds" +"2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 3378 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 3379 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.157 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 337c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.157 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 337d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 337f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.157 UTC [policies] Evaluate -> DEBU 3380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:04.157 UTC [cauthdsl] func1 -> DEBU 3381 0xc00303ca40 gate 1556789284157548500 evaluation starts" +"2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3382 0xc00303ca40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3383 0xc00303ca40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.157 UTC [cauthdsl] func2 -> DEBU 3384 0xc00303ca40 principal matched by identity 0" +"2019-05-02 09:28:04.157 UTC [msp.identity] Verify -> DEBU 3385 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:28:04.157 UTC [msp.identity] Verify -> DEBU 3386 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:28:04.158 UTC [cauthdsl] func2 -> DEBU 3387 0xc00303ca40 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.159 UTC [cauthdsl] func1 -> DEBU 3388 0xc00303ca40 gate 1556789284157548500 evaluation succeeds" +"2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 3389 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 338a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 338b Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.159 UTC [policies] Evaluate -> DEBU 338c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.159 UTC [gossip.gossip] JoinChan -> INFO 338d Joining gossip network of channel businesschannel with 3 organizations" +"2019-05-02 09:28:04.159 UTC [gossip.gossip] learnAnchorPeers -> INFO 338e Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-05-02 09:28:04.159 UTC [gossip.discovery] Connect -> DEBU 338f Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +"2019-05-02 09:28:04.168 UTC [gossip.gossip] handleMessage -> DEBU 3390 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.170 UTC [gossip.gossip] handleMessage -> DEBU 3391 Exiting" +"2019-05-02 09:28:04.170 UTC [gossip.gossip] handleMessage -> DEBU 3392 Entering, 172.18.0.9:42018 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3393 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3394 Exiting" +"2019-05-02 09:28:04.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3395 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.170 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3396 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:04.170 UTC [msp] DeserializeIdentity -> DEBU 3397 Obtaining identity" +"2019-05-02 09:28:04.170 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3398 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.180 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 339c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.180 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 339d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 339e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 339f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 33a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:04.180 UTC [cauthdsl] func1 -> DEBU 33a1 0xc003606160 gate 1556789284180530600 evaluation starts" +"2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a2 0xc003606160 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a3 0xc003606160 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a4 0xc003606160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:04.180 UTC [cauthdsl] func2 -> DEBU 33a5 0xc003606160 principal evaluation fails" +"2019-05-02 09:28:04.180 UTC [cauthdsl] func1 -> DEBU 33a6 0xc003606160 gate 1556789284180530600 evaluation fails" +"2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 33a7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.180 UTC [policies] Evaluate -> DEBU 33a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.181 UTC [cauthdsl] func1 -> DEBU 33aa 0xc0036069a0 gate 1556789284181093500 evaluation starts" +"2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33ab 0xc0036069a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33ac 0xc0036069a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33ad 0xc0036069a0 principal matched by identity 0" +"2019-05-02 09:28:04.181 UTC [msp.identity] Verify -> DEBU 33ae Verify: digest = 00000000 0a 22 f0 7b 96 0a ac bc d7 0f 52 c5 e3 cc 2d a7 |.".{......R...-.| +00000010 87 f1 1e e7 77 b1 c5 d6 72 23 4e 39 d5 c3 64 1a |....w...r#N9..d.|" +"2019-05-02 09:28:04.181 UTC [msp.identity] Verify -> DEBU 33af Verify: sig = 00000000 30 45 02 21 00 d1 90 5b 08 95 ac 58 ec af c0 89 |0E.!...[...X....| +00000010 f5 f6 33 11 d0 3c 01 85 5f f5 b2 89 e3 01 10 a1 |..3..<.._.......| +00000020 17 9c 39 be a5 02 20 2f 7b e5 7d 75 6b ea 70 e8 |..9... /{.}uk.p.| +00000030 59 f6 4d 65 e8 f0 fb 0d 6f f3 e9 7b 21 32 56 c7 |Y.Me....o..{!2V.| +00000040 0b 25 7e 5c fe c9 fd |.%~\...|" +"2019-05-02 09:28:04.181 UTC [cauthdsl] func2 -> DEBU 33b0 0xc0036069a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.181 UTC [cauthdsl] func1 -> DEBU 33b1 0xc0036069a0 gate 1556789284181093500 evaluation succeeds" +"2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b4 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.181 UTC [policies] Evaluate -> DEBU 33b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 33b6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:28:04.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b8 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 " +"2019-05-02 09:28:04.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b9 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 " +"2019-05-02 09:28:04.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ba Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:04.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 33bb Exiting" +"2019-05-02 09:28:04.191 UTC [gossip.discovery] handleAliveMessage -> DEBU 33bc Exiting" +"2019-05-02 09:28:04.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33bd Exiting" +"2019-05-02 09:28:04.172 UTC [gossip.gossip] handleMessage -> DEBU 3399 Exiting" +"2019-05-02 09:28:04.180 UTC [grpc] DialContext -> DEBU 339b parsed scheme: """ +"2019-05-02 09:28:04.196 UTC [grpc] DialContext -> DEBU 33be scheme "" not registered, fallback to default scheme" +"2019-05-02 09:28:04.169 UTC [gossip.discovery] Connect -> DEBU 339a Exiting" +"2019-05-02 09:28:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 33bf No configured anchor peers of Org3MSP for channel businesschannel to learn about" +"2019-05-02 09:28:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 33c0 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-05-02 09:28:04.197 UTC [grpc] UpdateState -> DEBU 33c1 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" +"2019-05-02 09:28:04.198 UTC [grpc] switchBalancer -> DEBU 33c2 ClientConn switching balancer to "pick_first"" +"2019-05-02 09:28:04.198 UTC [grpc] HandleSubConnStateChange -> DEBU 33c3 pickfirstBalancer: HandleSubConnStateChange: 0xc0036ce130, CONNECTING" +"2019-05-02 09:28:04.198 UTC [msp] DeserializeIdentity -> DEBU 33c4 Obtaining identity" +"2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c5 Obtaining identity" +"2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c6 Obtaining identity" +"2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c7 Obtaining identity" +"2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c8 Obtaining identity" +"2019-05-02 09:28:04.202 UTC [msp] DeserializeIdentity -> DEBU 33c9 Obtaining identity" +"2019-05-02 09:28:04.203 UTC [gossip.comm] Send -> DEBU 33ca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:04.203 UTC [msp] DeserializeIdentity -> DEBU 33cb Obtaining identity" +"2019-05-02 09:28:04.203 UTC [msp] DeserializeIdentity -> DEBU 33cc Obtaining identity" +"2019-05-02 09:28:04.203 UTC [gossip.comm] Send -> DEBU 33cd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:04.207 UTC [gossip.comm] sendToEndpoint -> DEBU 33ce Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.207 UTC [gossip.comm] sendToEndpoint -> DEBU 33cf Exiting" +"2019-05-02 09:28:04.210 UTC [gossip.comm] sendToEndpoint -> DEBU 33d0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.210 UTC [gossip.comm] sendToEndpoint -> DEBU 33d1 Exiting" +"2019-05-02 09:28:04.211 UTC [gossip.comm] func1 -> DEBU 33d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.211 UTC [gossip.gossip] handleMessage -> DEBU 33d3 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.211 UTC [gossip.gossip] handleMessage -> DEBU 33d4 Exiting" +"2019-05-02 09:28:04.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33d5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33d6 Exiting" +"2019-05-02 09:28:04.220 UTC [comm.grpc.server] 1 -> INFO 33d7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.219Z grpc.peer_address=172.18.0.5:57068 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=180.2µs +"2019-05-02 09:28:04.223 UTC [gossip.gossip] handleMessage -> DEBU 33d8 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.223 UTC [gossip.gossip] handleMessage -> DEBU 33d9 Exiting" +"2019-05-02 09:28:04.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.224 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33db Exiting" +"2019-05-02 09:28:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 33dc Anchor peer with same endpoint, skipping connecting to myself" +"2019-05-02 09:28:04.225 UTC [gossip.service] updateEndpoints -> DEBU 33dd Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-05-02 09:28:04.226 UTC [msp] DeserializeIdentity -> DEBU 33de Obtaining identity" +"2019-05-02 09:28:04.235 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.253 UTC [msp] DeserializeIdentity -> DEBU 33e0 Obtaining identity" +"2019-05-02 09:28:04.255 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33e1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.256 UTC [peer] updateTrustedRoots -> DEBU 33e2 Updating trusted root authorities for channel businesschannel" +"2019-05-02 09:28:04.261 UTC [msp.identity] Sign -> DEBU 33e3 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:28:04.262 UTC [msp.identity] Sign -> DEBU 33e4 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:28:04.268 UTC [grpc] HandleSubConnStateChange -> DEBU 33e5 pickfirstBalancer: HandleSubConnStateChange: 0xc0036ce130, READY" +"2019-05-02 09:28:04.276 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33e6 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:57068" +"2019-05-02 09:28:04.277 UTC [msp.identity] Sign -> DEBU 33e8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:28:04.278 UTC [msp.identity] Sign -> DEBU 33e9 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:28:04.278 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33ea Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +"2019-05-02 09:28:04.283 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33eb Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:57068" +"2019-05-02 09:28:04.284 UTC [grpc] infof -> DEBU 33ec transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:04.284 UTC [gossip.comm] readFromStream -> DEBU 33ed Got error, aborting: EOF" +"2019-05-02 09:28:04.284 UTC [gossip.comm] func2 -> DEBU 33ee Client 172.18.0.9:42018 disconnected" +"2019-05-02 09:28:04.285 UTC [gossip.comm] authenticateRemotePeer -> DEBU 33ef Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051" +"2019-05-02 09:28:04.297 UTC [msp] DeserializeIdentity -> DEBU 33f3 Obtaining identity" +"2019-05-02 09:28:04.299 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.301 UTC [msp] DeserializeIdentity -> DEBU 33f5 Obtaining identity" +"2019-05-02 09:28:04.294 UTC [comm.grpc.server] 1 -> INFO 33f6 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:42018 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=41.3789506s +"2019-05-02 09:28:04.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33f7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.276 UTC [msp] DeserializeIdentity -> DEBU 33e7 Obtaining identity" +"2019-05-02 09:28:04.291 UTC [gossip.comm] func1 -> DEBU 33f0 Got message: GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.291 UTC [grpc] infof -> DEBU 33f1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:04.291 UTC [msp] DeserializeIdentity -> DEBU 33f2 Obtaining identity" +"2019-05-02 09:28:04.304 UTC [gossip.comm] writeToStream -> DEBU 33f8 Closing writing to stream" +"2019-05-02 09:28:04.306 UTC [msp] DeserializeIdentity -> DEBU 33f9 Obtaining identity" +"2019-05-02 09:28:04.307 UTC [msp] DeserializeIdentity -> DEBU 33fa Obtaining identity" +"2019-05-02 09:28:04.315 UTC [peer] buildTrustedRootsForChain -> DEBU 33fb updating root CAs for channel [businesschannel]" +"2019-05-02 09:28:04.318 UTC [comm.grpc.server] 1 -> INFO 33fc unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.318Z grpc.peer_address=172.18.0.6:53420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=127.9µs +"2019-05-02 09:28:04.316 UTC [gossip.gossip] handleMessage -> DEBU 33fd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.320 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.320 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33ff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.320 UTC [gossip.comm] Send -> DEBU 3400 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:28:04.321 UTC [peer] buildTrustedRootsForChain -> DEBU 3401 adding app root CAs for MSP [Org1MSP]" +"2019-05-02 09:28:04.322 UTC [gossip.gossip] handleMessage -> DEBU 3402 Exiting" +"2019-05-02 09:28:04.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3403 Got message: GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.324 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3408 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:04.324 UTC [msp] DeserializeIdentity -> DEBU 3409 Obtaining identity" +"2019-05-02 09:28:04.325 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 340a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 340b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.325 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 340c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.327 UTC [policies] Evaluate -> DEBU 340d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.327 UTC [policies] Evaluate -> DEBU 340e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.327 UTC [policies] Evaluate -> DEBU 340f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:04.327 UTC [cauthdsl] func1 -> DEBU 3410 0xc00423e9d0 gate 1556789284327939700 evaluation starts" +"2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3411 0xc00423e9d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3412 0xc00423e9d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3413 0xc00423e9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:04.328 UTC [cauthdsl] func2 -> DEBU 3414 0xc00423e9d0 principal evaluation fails" +"2019-05-02 09:28:04.328 UTC [cauthdsl] func1 -> DEBU 3415 0xc00423e9d0 gate 1556789284327939700 evaluation fails" +"2019-05-02 09:28:04.328 UTC [policies] Evaluate -> DEBU 3416 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.328 UTC [policies] Evaluate -> DEBU 3417 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.328 UTC [policies] Evaluate -> DEBU 3418 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.330 UTC [cauthdsl] func1 -> DEBU 3419 0xc00423f210 gate 1556789284330064200 evaluation starts" +"2019-05-02 09:28:04.330 UTC [cauthdsl] func2 -> DEBU 341a 0xc00423f210 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.323 UTC [msp] DeserializeIdentity -> DEBU 3404 Obtaining identity" +"2019-05-02 09:28:04.323 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3405 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.323 UTC [gossip.comm] sendToEndpoint -> DEBU 3406 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.323 UTC [peer] buildTrustedRootsForChain -> DEBU 3407 adding orderer root CAs for MSP [OrdererMSP]" +"2019-05-02 09:28:04.333 UTC [gossip.comm] sendToEndpoint -> DEBU 341b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.333 UTC [gossip.comm] sendToEndpoint -> DEBU 341c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.334 UTC [cauthdsl] func2 -> DEBU 341d 0xc00423f210 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.337 UTC [msp.identity] Sign -> DEBU 341e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:28:04.340 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 341f Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.340 UTC [gossip.comm] sendToEndpoint -> DEBU 3420 Exiting" +"2019-05-02 09:28:04.344 UTC [peer] buildTrustedRootsForChain -> DEBU 3421 adding app root CAs for MSP [Org2MSP]" +"2019-05-02 09:28:04.344 UTC [gossip.comm] sendToEndpoint -> DEBU 3422 Exiting" +"2019-05-02 09:28:04.347 UTC [gossip.comm] createConnection -> DEBU 3423 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:04.349 UTC [cauthdsl] func2 -> DEBU 3424 0xc00423f210 principal matched by identity 0" +"2019-05-02 09:28:04.350 UTC [msp.identity] Sign -> DEBU 3425 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:28:04.352 UTC [policies] Evaluate -> DEBU 3426 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.354 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3427 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.354 UTC [gossip.comm] func1 -> DEBU 3428 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 727 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.355 UTC [comm.grpc.server] 1 -> INFO 3429 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-05-02T09:28:06.354Z grpc.peer_address=172.18.0.9:42206 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147µs +"2019-05-02 09:28:04.355 UTC [peer] buildTrustedRootsForChain -> DEBU 342a adding app root CAs for MSP [Org3MSP]" +"2019-05-02 09:28:04.357 UTC [msp.identity] Verify -> DEBU 342b Verify: digest = 00000000 6c 9b 11 78 32 10 3a c0 47 06 89 0f de 4e db a7 |l..x2.:.G....N..| +00000010 b6 2c d4 db 51 a0 a9 a4 a8 52 59 83 d5 0c 4e 8e |.,..Q....RY...N.|" +"2019-05-02 09:28:04.360 UTC [gossip.comm] authenticateRemotePeer -> DEBU 342c Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53420" +"2019-05-02 09:28:04.360 UTC [gossip.gossip] handleMessage -> DEBU 342d Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.361 UTC [policies] Evaluate -> DEBU 342e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.364 UTC [msp] DeserializeIdentity -> DEBU 342f Obtaining identity" +"2019-05-02 09:28:04.364 UTC [committer.txvalidator] validateTx -> DEBU 3430 config transaction received for chain businesschannel" +"2019-05-02 09:28:04.364 UTC [msp.identity] Verify -> DEBU 3431 Verify: sig = 00000000 30 44 02 20 38 57 22 43 d5 4e 72 41 bc e0 90 e4 |0D. 8W"C.NrA....| +00000010 6e 54 21 d2 52 29 95 d3 08 24 fe b4 28 ce 31 b3 |nT!.R)...$..(.1.| +00000020 64 21 b7 ab 02 20 3c df 10 32 c3 77 f1 d2 7d b2 |d!... <..2.w..}.| +00000030 71 16 ac a3 0f 99 fe f3 94 9e 90 04 54 39 58 b6 |q...........T9X.| +00000040 76 d0 a2 77 21 75 |v..w!u|" +"2019-05-02 09:28:04.366 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3432 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:53420" +"2019-05-02 09:28:04.367 UTC [msp.identity] Verify -> DEBU 3433 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:28:04.367 UTC [grpc] DialContext -> DEBU 3434 parsed scheme: """ +"2019-05-02 09:28:04.368 UTC [policies] Evaluate -> DEBU 3435 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:04.370 UTC [msp] DeserializeIdentity -> DEBU 3436 Obtaining identity" +"2019-05-02 09:28:04.370 UTC [grpc] infof -> DEBU 3437 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:04.370 UTC [committer.txvalidator] validateTx -> DEBU 3438 [businesschannel] validateTx completes for block 0xc0033af8c0 env 0xc0023f2190 txn 0" +"2019-05-02 09:28:04.370 UTC [committer.txvalidator] Validate -> DEBU 3439 got result for idx 0, code 0" +"2019-05-02 09:28:04.370 UTC [cauthdsl] func2 -> DEBU 343a 0xc00423f210 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.371 UTC [msp.identity] Verify -> DEBU 343b Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-05-02 09:28:04.372 UTC [msp.identity] Verify -> DEBU 343c Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:28:04.373 UTC [grpc] DialContext -> DEBU 343d scheme "" not registered, fallback to default scheme" +"2019-05-02 09:28:04.373 UTC [msp.identity] Sign -> DEBU 343e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:28:04.373 UTC [cauthdsl] func1 -> DEBU 343f 0xc0042e9de0 gate 1556789284373865000 evaluation starts" +"2019-05-02 09:28:04.375 UTC [msp.identity] newIdentity -> DEBU 3440 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -17690,769 +17034,655 @@ BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -----END CERTIFICATE-----" -"2019-05-02 01:31:35.410 UTC [msp] DeserializeIdentity -> DEBU 3548 Obtaining identity" -"2019-05-02 01:31:35.411 UTC [gossip.comm] Send -> DEBU 3549 Entering, sending GossipMessage: Channel: , nonce: 5439724871213563240, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:35.411 UTC [gossip.discovery] sendMemResponse -> DEBU 354a Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:35.411 UTC [gossip.comm] sendToEndpoint -> DEBU 354b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5439724871213563240, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.412 UTC [gossip.comm] sendToEndpoint -> DEBU 354c Exiting" -"2019-05-02 01:31:35.402 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 3534 Block [9] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" -"2019-05-02 01:31:35.413 UTC [valinternal] ApplyWriteSet -> DEBU 354d txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003f16740)}" -"2019-05-02 01:31:35.413 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 354e validating rwset..." -"2019-05-02 01:31:35.413 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 354f postprocessing ProtoBlock..." -"2019-05-02 01:31:35.413 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3550 ValidateAndPrepareBatch() complete" -"2019-05-02 01:31:35.414 UTC [kvledger] CommitWithPvtData -> DEBU 3551 [businesschannel] Committing block [9] to storage" -"2019-05-02 01:31:35.414 UTC [ledgerstorage] CommitWithPvtData -> DEBU 3552 Writing block [9] to pvt block store" -"2019-05-02 01:31:35.398 UTC [cauthdsl] func2 -> DEBU 3530 0xc003b3b6b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.419 UTC [pvtdatastorage] Prepare -> DEBU 3553 Saved 0 private data write sets for block [9]" -"2019-05-02 01:31:35.419 UTC [cauthdsl] func2 -> DEBU 3554 0xc003b3b6b0 principal matched by identity 0" -"2019-05-02 01:31:35.423 UTC [msp.identity] Verify -> DEBU 3555 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +"2019-05-02 09:28:04.375 UTC [committer.txvalidator] Validate -> INFO 3441 [businesschannel] Validated block [9] in 323ms" +"2019-05-02 09:28:04.375 UTC [cauthdsl] func1 -> DEBU 3442 0xc00423f210 gate 1556789284330064200 evaluation succeeds" +"2019-05-02 09:28:04.376 UTC [msp.identity] Verify -> DEBU 3443 Verify: sig = 00000000 30 44 02 20 54 ba d4 9b 33 a4 a2 cb 1b 20 6a 8a |0D. T...3.... j.| +00000010 03 d7 18 00 49 e3 fa be 26 85 d5 2b a3 8d 0c 26 |....I...&..+...&| +00000020 3b 3e 2f 07 02 20 64 92 23 0c 74 f5 36 42 9e 61 |;>/.. d.#.t.6B.a| +00000030 98 3d 4c 56 c9 9e bc 68 4b cc 54 6b a2 90 67 32 |.=LV...hK.Tk..g2| +00000040 e2 41 2b 3c 81 6c |.A+<.l|" +"2019-05-02 09:28:04.377 UTC [msp.identity] Verify -> DEBU 3444 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +"2019-05-02 09:28:04.377 UTC [grpc] UpdateState -> DEBU 3445 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" +"2019-05-02 09:28:04.377 UTC [msp.identity] Sign -> DEBU 3446 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:28:04.377 UTC [cauthdsl] func2 -> DEBU 3447 0xc0042e9de0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.378 UTC [msp] Validate -> DEBU 3448 MSP Org2MSP validating identity" +"2019-05-02 09:28:04.379 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3449 Retrieving private write sets for 0 transactions from transient store" +"2019-05-02 09:28:04.379 UTC [policies] Evaluate -> DEBU 344a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.380 UTC [msp.identity] Verify -> DEBU 344b Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +"2019-05-02 09:28:04.380 UTC [gossip.comm] authenticateRemotePeer -> DEBU 344c Authenticated 172.18.0.6:53420" +"2019-05-02 09:28:04.380 UTC [grpc] switchBalancer -> DEBU 344d ClientConn switching balancer to "pick_first"" +"2019-05-02 09:28:04.381 UTC [gossip.comm] authenticateRemotePeer -> DEBU 344e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:42206" +"2019-05-02 09:28:04.381 UTC [cauthdsl] func2 -> DEBU 344f 0xc0042e9de0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.382 UTC [msp] getCertificationChain -> DEBU 3450 MSP Org2MSP getting certification chain" +"2019-05-02 09:28:04.382 UTC [gossip.privdata] StoreBlock -> DEBU 3451 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-05-02 09:28:04.382 UTC [policies] Evaluate -> DEBU 3452 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.383 UTC [msp] DeserializeIdentity -> DEBU 3453 Obtaining identity" +"2019-05-02 09:28:04.383 UTC [gossip.comm] GossipStream -> DEBU 3454 Servicing 172.18.0.6:53420" +"2019-05-02 09:28:04.383 UTC [grpc] HandleSubConnStateChange -> DEBU 3455 pickfirstBalancer: HandleSubConnStateChange: 0xc0045cf780, CONNECTING" +"2019-05-02 09:28:04.385 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3456 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:42206" +"2019-05-02 09:28:04.385 UTC [cauthdsl] func2 -> DEBU 3457 0xc0042e9de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-05-02 09:28:04.387 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3458 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.387 UTC [committer] preCommit -> DEBU 3459 Received configuration update, calling CSCC ConfigUpdate" +"2019-05-02 09:28:04.388 UTC [policies] Evaluate -> DEBU 345a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.388 UTC [msp] DeserializeIdentity -> DEBU 345b Obtaining identity" +"2019-05-02 09:28:04.389 UTC [gossip.comm] writeToStream -> DEBU 345c Closing writing to stream" +"2019-05-02 09:28:04.390 UTC [gossip.comm] readFromStream -> DEBU 345d Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:04.390 UTC [grpc] infof -> DEBU 345e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:04.390 UTC [msp] DeserializeIdentity -> DEBU 345f Obtaining identity" +"2019-05-02 09:28:04.390 UTC [cauthdsl] func2 -> DEBU 3460 0xc0042e9de0 principal evaluation fails" +"2019-05-02 09:28:04.391 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3461 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.391 UTC [kvledger] CommitWithPvtData -> DEBU 3462 [businesschannel] Validating state for block [9]" +"2019-05-02 09:28:04.391 UTC [policies] Evaluate -> DEBU 3463 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.391 UTC [msp.identity] newIdentity -> DEBU 3464 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-05-02 09:28:04.393 UTC [msp] DeserializeIdentity -> DEBU 346b Obtaining identity" +"2019-05-02 09:28:04.393 UTC [msp] Validate -> DEBU 346c MSP Org2MSP validating identity" +"2019-05-02 09:28:04.393 UTC [msp] getCertificationChain -> DEBU 346d MSP Org2MSP getting certification chain" +"2019-05-02 09:28:04.393 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 346e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.393 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 346f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.393 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3470 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.394 UTC [policies] Evaluate -> DEBU 3471 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.394 UTC [policies] Evaluate -> DEBU 3472 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.394 UTC [policies] Evaluate -> DEBU 3473 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.394 UTC [cauthdsl] func1 -> DEBU 3474 0xc003165b90 gate 1556789284394321400 evaluation starts" +"2019-05-02 09:28:04.394 UTC [cauthdsl] func2 -> DEBU 3475 0xc003165b90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.394 UTC [cauthdsl] func2 -> DEBU 3476 0xc003165b90 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.394 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3477 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-05-02 09:28:04.394 UTC [msp] Validate -> DEBU 3478 MSP Org2MSP validating identity" +"2019-05-02 09:28:04.394 UTC [msp] getCertificationChain -> DEBU 3479 MSP Org2MSP getting certification chain" +"2019-05-02 09:28:04.395 UTC [cauthdsl] func2 -> DEBU 347a 0xc003165b90 principal matched by identity 0" +"2019-05-02 09:28:04.395 UTC [msp.identity] Verify -> DEBU 347b Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:28:04.395 UTC [msp.identity] Verify -> DEBU 347c Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:28:04.395 UTC [cauthdsl] func2 -> DEBU 347d 0xc003165b90 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.395 UTC [cauthdsl] func1 -> DEBU 347e 0xc003165b90 gate 1556789284394321400 evaluation succeeds" +"2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 347f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 3480 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 3481 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.395 UTC [policies] Evaluate -> DEBU 3482 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.396 UTC [msp] DeserializeIdentity -> DEBU 3483 Obtaining identity" +"2019-05-02 09:28:04.396 UTC [msp] DeserializeIdentity -> DEBU 3484 Obtaining identity" +"2019-05-02 09:28:04.396 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3485 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3486 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3487 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.396 UTC [policies] Evaluate -> DEBU 3488 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.396 UTC [policies] Evaluate -> DEBU 3489 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.396 UTC [policies] Evaluate -> DEBU 348a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.397 UTC [cauthdsl] func1 -> DEBU 348b 0xc00313d6e0 gate 1556789284397003900 evaluation starts" +"2019-05-02 09:28:04.397 UTC [cauthdsl] func2 -> DEBU 348c 0xc00313d6e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.397 UTC [cauthdsl] func2 -> DEBU 348d 0xc00313d6e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.397 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 348e Checking if identity satisfies MEMBER role for Org2MSP" +"2019-05-02 09:28:04.397 UTC [msp] Validate -> DEBU 348f MSP Org2MSP validating identity" +"2019-05-02 09:28:04.397 UTC [msp] getCertificationChain -> DEBU 3490 MSP Org2MSP getting certification chain" +"2019-05-02 09:28:04.398 UTC [cauthdsl] func2 -> DEBU 3491 0xc00313d6e0 principal matched by identity 0" +"2019-05-02 09:28:04.398 UTC [msp.identity] Verify -> DEBU 3492 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:28:04.398 UTC [msp.identity] Verify -> DEBU 3493 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:28:04.398 UTC [cauthdsl] func2 -> DEBU 3494 0xc00313d6e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.398 UTC [cauthdsl] func1 -> DEBU 3495 0xc00313d6e0 gate 1556789284397003900 evaluation succeeds" +"2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3496 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3498 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.398 UTC [policies] Evaluate -> DEBU 3499 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.398 UTC [gossip.gossip] handleMessage -> DEBU 349a Exiting" +"2019-05-02 09:28:04.399 UTC [gossip.gossip] handleMessage -> DEBU 349b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 727 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.399 UTC [msp] DeserializeIdentity -> DEBU 349c Obtaining identity" +"2019-05-02 09:28:04.399 UTC [msp.identity] Verify -> DEBU 349d Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +"2019-05-02 09:28:04.399 UTC [msp.identity] Verify -> DEBU 349e Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +"2019-05-02 09:28:04.400 UTC [msp.identity] Verify -> DEBU 349f Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:28:04.400 UTC [msp.identity] Verify -> DEBU 34a0 Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:28:04.400 UTC [msp] DeserializeIdentity -> DEBU 34a1 Obtaining identity" +"2019-05-02 09:28:04.400 UTC [gossip.comm] func2 -> DEBU 34a2 Client 172.18.0.6:53420 disconnected" +"2019-05-02 09:28:04.400 UTC [comm.grpc.server] 1 -> INFO 34a3 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.335Z grpc.peer_address=172.18.0.6:53420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=62.9613ms +"2019-05-02 09:28:04.400 UTC [msp] DeserializeIdentity -> DEBU 34a4 Obtaining identity" +"2019-05-02 09:28:04.400 UTC [gossip.comm] writeToStream -> DEBU 34a5 Closing writing to stream" +"2019-05-02 09:28:04.400 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.400 UTC [policies] Evaluate -> DEBU 34a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.400 UTC [policies] Evaluate -> DEBU 34aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.400 UTC [policies] Evaluate -> DEBU 34ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.400 UTC [cauthdsl] func1 -> DEBU 34ac 0xc00341a3b0 gate 1556789284400975900 evaluation starts" +"2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34ad 0xc00341a3b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34ae 0xc00341a3b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34af 0xc00341a3b0 principal matched by identity 0" +"2019-05-02 09:28:04.401 UTC [msp.identity] Verify -> DEBU 34b0 Verify: digest = 00000000 bd 87 c9 f3 b5 7e 6e 32 ec fc 21 8e 34 73 02 d9 |.....~n2..!.4s..| +00000010 45 9a 36 88 2f 42 14 a3 22 cf f9 6f 87 11 a9 dd |E.6./B.."..o....|" +"2019-05-02 09:28:04.401 UTC [msp.identity] Verify -> DEBU 34b1 Verify: sig = 00000000 30 45 02 21 00 da 1b d3 ff b5 26 a2 51 85 37 af |0E.!......&.Q.7.| +00000010 4a 79 6e 4b fd 77 06 7c b8 1c a0 fa 40 10 7f fa |JynK.w.|....@...| +00000020 4e 33 0b f1 9a 02 20 1e a1 88 7f 1e b1 15 5f b5 |N3.... ......._.| +00000030 f6 7a 59 00 db c6 be d9 33 26 19 78 03 1d 9b e3 |.zY.....3&.x....| +00000040 e8 e2 52 fd c9 56 9d |..R..V.|" +"2019-05-02 09:28:04.401 UTC [cauthdsl] func2 -> DEBU 34b2 0xc00341a3b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.401 UTC [cauthdsl] func1 -> DEBU 34b3 0xc00341a3b0 gate 1556789284400975900 evaluation succeeds" +"2019-05-02 09:28:04.401 UTC [policies] Evaluate -> DEBU 34b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.401 UTC [policies] Evaluate -> DEBU 34b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.402 UTC [grpc] HandleSubConnStateChange -> DEBU 34b6 pickfirstBalancer: HandleSubConnStateChange: 0xc0045cf780, READY" +"2019-05-02 09:28:04.392 UTC [gossip.comm] serviceConnection -> DEBU 3465 Closing reading from stream" +"2019-05-02 09:28:04.402 UTC [gossip.comm] func2 -> DEBU 34b7 Client 172.18.0.6:53224 disconnected" +"2019-05-02 09:28:04.403 UTC [comm.grpc.server] 1 -> INFO 34b8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:53224 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=41.8966157s +"2019-05-02 09:28:04.392 UTC [cauthdsl] func1 -> DEBU 3467 0xc0042e9de0 gate 1556789284373865000 evaluation fails" +"2019-05-02 09:28:04.403 UTC [policies] Evaluate -> DEBU 34b9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.403 UTC [policies] Evaluate -> DEBU 34ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.403 UTC [policies] Evaluate -> DEBU 34bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.403 UTC [cauthdsl] func1 -> DEBU 34bc 0xc003459080 gate 1556789284403603300 evaluation starts" +"2019-05-02 09:28:04.403 UTC [cauthdsl] func2 -> DEBU 34bd 0xc003459080 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.403 UTC [cauthdsl] func2 -> DEBU 34be 0xc003459080 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.404 UTC [cauthdsl] func2 -> DEBU 34bf 0xc003459080 principal matched by identity 0" +"2019-05-02 09:28:04.404 UTC [msp.identity] Verify -> DEBU 34c0 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-05-02 01:31:35.425 UTC [fsblkstorage] indexBlock -> DEBU 3556 Indexing block [blockNum=9, blockHash=[]byte{0x9a, 0x83, 0x39, 0x88, 0xb6, 0x7a, 0x70, 0x8, 0xe7, 0x16, 0x79, 0x57, 0x8, 0x1e, 0x62, 0x7b, 0xd4, 0x43, 0x19, 0x39, 0xb0, 0x8, 0xfe, 0x2, 0x20, 0xae, 0x67, 0xae, 0xf2, 0x52, 0x17, 0x2b} txOffsets= -txId= locPointer=offset=71, bytesLength=33992 +"2019-05-02 09:28:04.404 UTC [msp.identity] Verify -> DEBU 34c1 Verify: sig = 00000000 30 45 02 21 00 91 b9 ca 97 ad 28 01 e4 1f 2d a4 |0E.!......(...-.| +00000010 31 06 fe f6 0c 30 1e fe c0 1b 8c c7 15 3f 8b 03 |1....0.......?..| +00000020 fa 68 27 2b 15 02 20 75 68 b3 5a 59 3a 3e c1 76 |.h'+.. uh.ZY:>.v| +00000030 4b 5c d5 59 a5 e4 62 91 e4 a6 70 37 67 10 83 84 |K\.Y..b...p7g...| +00000040 85 ff d3 5a a2 0c f4 |...Z...|" +"2019-05-02 09:28:04.404 UTC [cauthdsl] func2 -> DEBU 34c2 0xc003459080 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.404 UTC [cauthdsl] func1 -> DEBU 34c3 0xc003459080 gate 1556789284403603300 evaluation succeeds" +"2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c6 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.404 UTC [policies] Evaluate -> DEBU 34c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.404 UTC [gossip.comm] authenticateRemotePeer -> DEBU 34c8 Authenticated 172.18.0.9:7051" +"2019-05-02 09:28:04.405 UTC [msp] DeserializeIdentity -> DEBU 34c9 Obtaining identity" +"2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34ca Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151027 " +"2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34cb Sign: digest: 469FBC171A97132299A85FD1EFA9BED2C2A44D77EF8DD074607E47FEA82F0189 " +"2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34cc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:28:04.405 UTC [msp.identity] Sign -> DEBU 34cd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:28:04.405 UTC [msp] DeserializeIdentity -> DEBU 34ce Obtaining identity" +"2019-05-02 09:28:04.406 UTC [gossip.comm] Send -> DEBU 34cf Entering, sending GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:04.406 UTC [gossip.comm] sendToEndpoint -> DEBU 34d0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.406 UTC [gossip.comm] readFromStream -> DEBU 34d1 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-05-02 09:28:04.392 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3468 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.406 UTC [policies] Evaluate -> DEBU 34d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.406 UTC [policies] Evaluate -> DEBU 34d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.406 UTC [policies] Evaluate -> DEBU 34d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.406 UTC [cauthdsl] func1 -> DEBU 34d5 0xc00373eab0 gate 1556789284406645700 evaluation starts" +"2019-05-02 09:28:04.406 UTC [cauthdsl] func2 -> DEBU 34d6 0xc00373eab0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.406 UTC [cauthdsl] func2 -> DEBU 34d7 0xc00373eab0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.406 UTC [cauthdsl] func2 -> DEBU 34d8 0xc00373eab0 principal matched by identity 0" +"2019-05-02 09:28:04.406 UTC [msp.identity] Verify -> DEBU 34d9 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-05-02 09:28:04.406 UTC [msp.identity] Verify -> DEBU 34da Verify: sig = 00000000 30 44 02 20 64 fa 7b a8 f7 01 b8 ff 50 55 19 63 |0D. d.{.....PU.c| +00000010 7d 3b f8 9e d0 55 30 ae 22 bc 9b 8e e2 aa 95 b6 |};...U0.".......| +00000020 cb 89 c7 13 02 20 2a 1b 2f db b7 7a ab a4 c4 fa |..... *./..z....| +00000030 1a 94 62 88 ac 2f 25 f4 37 62 9b e4 a3 21 82 38 |..b../%.7b...!.8| +00000040 fa 52 69 12 f2 f9 |.Ri...|" +"2019-05-02 09:28:04.407 UTC [cauthdsl] func2 -> DEBU 34db 0xc00373eab0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.407 UTC [cauthdsl] func1 -> DEBU 34dc 0xc00373eab0 gate 1556789284406645700 evaluation succeeds" +"2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34df Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.407 UTC [policies] Evaluate -> DEBU 34e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.407 UTC [gossip.comm] authenticateRemotePeer -> DEBU 34e1 Authenticated 172.18.0.5:57068" +"2019-05-02 09:28:04.407 UTC [gossip.comm] GossipStream -> DEBU 34e2 Servicing 172.18.0.5:57068" +"2019-05-02 09:28:04.407 UTC [gossip.comm] writeToStream -> DEBU 34e3 Closing writing to stream" +"2019-05-02 09:28:04.392 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3469 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-05-02 09:28:04.407 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 34e4 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-05-02 09:28:04.407 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 34e5 Validating new block with num trans = [1]" +"2019-05-02 09:28:04.407 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34e6 ValidateAndPrepareBatch() for block number = [9]" +"2019-05-02 09:28:04.408 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34e7 preprocessing ProtoBlock..." +"2019-05-02 09:28:04.408 UTC [valimpl] preprocessProtoBlock -> DEBU 34e8 txType=CONFIG" +"2019-05-02 09:28:04.408 UTC [valimpl] processNonEndorserTx -> DEBU 34e9 Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-05-02 09:28:04.408 UTC [valimpl] processNonEndorserTx -> DEBU 34ea Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-05-02 09:28:04.408 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 34eb constructing new tx simulator" +"2019-05-02 09:28:04.408 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 34ec constructing new tx simulator txid = []" +"2019-05-02 09:28:04.408 UTC [peer] GenerateSimulationResults -> DEBU 34ed Processing CONFIG" +"2019-05-02 09:28:04.409 UTC [peer] processChannelConfigTx -> DEBU 34ee channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-05-02 09:28:04.409 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 34ef Simulation completed, getting simulation results" +"2019-05-02 09:28:04.409 UTC [lockbasedtxmgr] Done -> DEBU 34f0 Done with transaction simulation / query execution []" +"2019-05-02 09:28:04.409 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 34f1 Block [9] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +"2019-05-02 09:28:04.409 UTC [valinternal] ApplyWriteSet -> DEBU 34f2 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002549380)}" +"2019-05-02 09:28:04.410 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34f3 validating rwset..." +"2019-05-02 09:28:04.392 UTC [msp] DeserializeIdentity -> DEBU 3466 Obtaining identity" +"2019-05-02 09:28:04.410 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34f4 postprocessing ProtoBlock..." +"2019-05-02 09:28:04.410 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 34f5 ValidateAndPrepareBatch() complete" +"2019-05-02 09:28:04.410 UTC [kvledger] CommitWithPvtData -> DEBU 34f6 [businesschannel] Committing block [9] to storage" +"2019-05-02 09:28:04.410 UTC [ledgerstorage] CommitWithPvtData -> DEBU 34f7 Writing block [9] to pvt block store" +"2019-05-02 09:28:04.410 UTC [msp.identity] newIdentity -> DEBU 34f8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-05-02 09:28:04.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.411 UTC [msp] DeserializeIdentity -> DEBU 34fa Obtaining identity" +"2019-05-02 09:28:04.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.411 UTC [msp] DeserializeIdentity -> DEBU 34fc Obtaining identity" +"2019-05-02 09:28:04.412 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34fe Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34ff Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.412 UTC [policies] Evaluate -> DEBU 3500 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.412 UTC [policies] Evaluate -> DEBU 3501 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.412 UTC [policies] Evaluate -> DEBU 3502 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.413 UTC [cauthdsl] func1 -> DEBU 3503 0xc003246da0 gate 1556789284412996700 evaluation starts" +"2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3504 0xc003246da0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3505 0xc003246da0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3506 0xc003246da0 principal matched by identity 0" +"2019-05-02 09:28:04.413 UTC [msp.identity] Verify -> DEBU 3507 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-05-02 09:28:04.413 UTC [msp.identity] Verify -> DEBU 3508 Verify: sig = 00000000 30 45 02 21 00 b4 65 91 85 7e a4 72 50 cf d4 3a |0E.!..e..~.rP..:| +00000010 6b 92 51 e5 cc 75 ad 3a 9a 6b 1c 9c 1d e8 db e1 |k.Q..u.:.k......| +00000020 83 f1 1e d3 91 02 20 38 61 b4 a2 e3 7e 13 84 44 |...... 8a...~..D| +00000030 2a 51 3c f4 fc 6b bf 85 b2 75 82 90 68 75 3e 65 |*Q<..k...u..hu>e| +00000040 e7 1b 9f 95 8c d0 6b |......k|" +"2019-05-02 09:28:04.413 UTC [cauthdsl] func2 -> DEBU 3509 0xc003246da0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.413 UTC [cauthdsl] func1 -> DEBU 350a 0xc003246da0 gate 1556789284412996700 evaluation succeeds" +"2019-05-02 09:28:04.414 UTC [pvtdatastorage] Prepare -> DEBU 350b Saved 0 private data write sets for block [9]" +"2019-05-02 09:28:04.413 UTC [policies] Evaluate -> DEBU 350c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.414 UTC [policies] Evaluate -> DEBU 350d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.414 UTC [policies] Evaluate -> DEBU 350e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.414 UTC [policies] Evaluate -> DEBU 350f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.414 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3510 Authenticated 172.18.0.9:42206" +"2019-05-02 09:28:04.414 UTC [gossip.comm] GossipStream -> DEBU 3511 Servicing 172.18.0.9:42206" +"2019-05-02 09:28:04.415 UTC [gossip.comm] readFromStream -> DEBU 3512 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:04.415 UTC [gossip.comm] func2 -> DEBU 3513 Client 172.18.0.9:42206 disconnected" +"2019-05-02 09:28:04.415 UTC [comm.grpc.server] 1 -> INFO 3514 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.372Z grpc.peer_address=172.18.0.9:42206 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.6834ms +"2019-05-02 09:28:04.416 UTC [gossip.comm] writeToStream -> DEBU 3515 Closing writing to stream" +"2019-05-02 09:28:04.416 UTC [grpc] infof -> DEBU 3516 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:04.418 UTC [msp.identity] Sign -> DEBU 3517 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:28:04.418 UTC [msp.identity] Sign -> DEBU 3518 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:28:04.419 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3519 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:7051" +"2019-05-02 09:28:04.401 UTC [policies] Evaluate -> DEBU 351a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.419 UTC [policies] Evaluate -> DEBU 351b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.419 UTC [msp] DeserializeIdentity -> DEBU 351c Obtaining identity" +"2019-05-02 09:28:04.419 UTC [msp] DeserializeIdentity -> DEBU 351d Obtaining identity" +"2019-05-02 09:28:04.420 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 351e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.420 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 351f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.420 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3520 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.420 UTC [policies] Evaluate -> DEBU 3521 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.420 UTC [policies] Evaluate -> DEBU 3522 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.420 UTC [policies] Evaluate -> DEBU 3523 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.420 UTC [cauthdsl] func1 -> DEBU 3524 0xc002f55260 gate 1556789284420649300 evaluation starts" +"2019-05-02 09:28:04.420 UTC [cauthdsl] func2 -> DEBU 3525 0xc002f55260 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.420 UTC [cauthdsl] func2 -> DEBU 3526 0xc002f55260 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.420 UTC [cauthdsl] func2 -> DEBU 3527 0xc002f55260 principal matched by identity 0" +"2019-05-02 09:28:04.421 UTC [msp.identity] Verify -> DEBU 3528 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:04.421 UTC [msp.identity] Verify -> DEBU 3529 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:04.421 UTC [cauthdsl] func2 -> DEBU 352a 0xc002f55260 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.421 UTC [cauthdsl] func1 -> DEBU 352b 0xc002f55260 gate 1556789284420649300 evaluation succeeds" +"2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 352f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.421 UTC [msp] DeserializeIdentity -> DEBU 3530 Obtaining identity" +"2019-05-02 09:28:04.421 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3531 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.421 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3532 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.421 UTC [fsblkstorage] indexBlock -> DEBU 3533 Indexing block [blockNum=9, blockHash=[]byte{0xae, 0x40, 0xdc, 0x77, 0x8f, 0x7a, 0x6, 0x29, 0xa2, 0x2c, 0x4f, 0x45, 0x7, 0xc4, 0x6e, 0xb1, 0x3c, 0xef, 0x36, 0xd4, 0x2, 0xad, 0x6a, 0x15, 0xaf, 0x8a, 0xbf, 0xad, 0xa7, 0x18, 0xe2, 0x5} txOffsets= +txId= locPointer=offset=71, bytesLength=33870 ]" -"2019-05-02 01:31:35.427 UTC [fsblkstorage] indexBlock -> DEBU 3557 txid [] is a duplicate of a previous tx. Not indexing in txid-index" -"2019-05-02 01:31:35.427 UTC [fsblkstorage] indexBlock -> DEBU 3558 Adding txLoc [fileSuffixNum=0, offset=98744, bytesLength=33992] for tx number:[0] ID: [] to blockNumTranNum index" -"2019-05-02 01:31:35.424 UTC [msp.identity] Verify -> DEBU 3559 Verify: sig = 00000000 30 45 02 21 00 b4 bd 8a 35 49 d6 02 87 25 a4 48 |0E.!....5I...%.H| -00000010 90 06 41 bf 25 9d bd 51 c9 94 64 20 1a 00 4f f7 |..A.%..Q..d ..O.| -00000020 aa 89 8a 0f 3f 02 20 48 89 8a 0f a4 6a f1 cd 99 |....?. H....j...| -00000030 00 b6 4f 35 e4 97 3e 88 f7 46 d9 e1 00 a8 76 d2 |..O5..>..F....v.| -00000040 fd eb 1b b9 c3 65 e5 |.....e.|" -"2019-05-02 01:31:35.429 UTC [cauthdsl] func2 -> DEBU 355a 0xc003b3b6b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.429 UTC [cauthdsl] func1 -> DEBU 355b 0xc003b3b6b0 gate 1556760695398680300 evaluation succeeds" -"2019-05-02 01:31:35.431 UTC [policies] Evaluate -> DEBU 355c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.433 UTC [policies] Evaluate -> DEBU 355d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.433 UTC [policies] Evaluate -> DEBU 355e Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.433 UTC [policies] Evaluate -> DEBU 355f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.433 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3560 Authenticated 192.168.240.5:55380" -"2019-05-02 01:31:35.435 UTC [gossip.comm] GossipStream -> DEBU 3562 Servicing 192.168.240.5:55380" -"2019-05-02 01:31:35.435 UTC [gossip.comm] serviceConnection -> DEBU 3563 Closing reading from stream" -"2019-05-02 01:31:35.435 UTC [gossip.comm] writeToStream -> DEBU 3564 Closing writing to stream" -"2019-05-02 01:31:35.404 UTC [msp.identity] Sign -> DEBU 3535 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:31:35.436 UTC [msp.identity] Sign -> DEBU 3565 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:31:35.436 UTC [msp.identity] Sign -> DEBU 3566 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:31:35.436 UTC [msp.identity] Sign -> DEBU 3567 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:31:35.436 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3568 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:7051" -"2019-05-02 01:31:35.434 UTC [fsblkstorage] updateCheckpoint -> DEBU 3561 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133674], isChainEmpty=[false], lastBlockNumber=[9]" -"2019-05-02 01:31:35.440 UTC [pvtdatastorage] Commit -> DEBU 356e Committing private data for block [9]" -"2019-05-02 01:31:35.441 UTC [gossip.comm] authenticateRemotePeer -> DEBU 356f Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:7051" -"2019-05-02 01:31:35.443 UTC [msp] DeserializeIdentity -> DEBU 3570 Obtaining identity" -"2019-05-02 01:31:35.444 UTC [msp] Validate -> DEBU 3571 MSP Org2MSP validating identity" -"2019-05-02 01:31:35.444 UTC [pvtdatastorage] Commit -> DEBU 3572 Committed private data for block [9]" -"2019-05-02 01:31:35.444 UTC [kvledger] CommitWithPvtData -> DEBU 3573 [businesschannel] Committing block [9] transactions to state database" -"2019-05-02 01:31:35.444 UTC [lockbasedtxmgr] Commit -> DEBU 3574 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-05-02 01:31:35.444 UTC [lockbasedtxmgr] Commit -> DEBU 3575 Committing updates to state database" -"2019-05-02 01:31:35.445 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 3576 Building the expiry schedules based on the update batch" -"2019-05-02 01:31:35.445 UTC [lockbasedtxmgr] Commit -> DEBU 3577 Write lock acquired for committing updates to state database" -"2019-05-02 01:31:35.445 UTC [stateleveldb] ApplyUpdates -> DEBU 3578 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -"2019-05-02 01:31:35.446 UTC [msp] getCertificationChain -> DEBU 3579 MSP Org2MSP getting certification chain" -"2019-05-02 01:31:35.449 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 357a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.449 UTC [msp] DeserializeIdentity -> DEBU 357b Obtaining identity" -"2019-05-02 01:31:35.452 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 357c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.453 UTC [lockbasedtxmgr] Commit -> DEBU 357d Updates committed to state database and the write lock is released" -"2019-05-02 01:31:35.453 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 357e Preparing potential purge list working-set for expiringAtBlk [10]" -"2019-05-02 01:31:35.453 UTC [leveldbhelper] GetIterator -> DEBU 357f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xb, 0x0}]" -"2019-05-02 01:31:35.453 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3580 No expiry entry found for expiringAtBlk [10]" -"2019-05-02 01:31:35.453 UTC [lockbasedtxmgr] func1 -> DEBU 3581 launched the background routine for preparing keys to purge with the next block" -"2019-05-02 01:31:35.454 UTC [kvledger] CommitWithPvtData -> DEBU 3582 [businesschannel] Committing block [9] transactions to history database" -"2019-05-02 01:31:35.454 UTC [historyleveldb] Commit -> DEBU 3583 Channel [businesschannel]: Updating history database for blockNo [9] with [1] transactions" -"2019-05-02 01:31:35.454 UTC [historyleveldb] Commit -> DEBU 3584 Skipping transaction [0] since it is not an endorsement transaction" -"2019-05-02 01:31:35.452 UTC [msp] DeserializeIdentity -> DEBU 3585 Obtaining identity" -"2019-05-02 01:31:35.458 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3586 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3587 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3588 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.459 UTC [policies] Evaluate -> DEBU 3589 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.459 UTC [policies] Evaluate -> DEBU 358a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.460 UTC [policies] Evaluate -> DEBU 358c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:35.461 UTC [cauthdsl] func1 -> DEBU 358d 0xc003c5b580 gate 1556760695461041100 evaluation starts" -"2019-05-02 01:31:35.459 UTC [historyleveldb] Commit -> DEBU 358b Channel [businesschannel]: Updates committed to history database for blockNo [9]" -"2019-05-02 01:31:35.437 UTC [gossip.comm] readFromStream -> DEBU 356a 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -"2019-05-02 01:31:35.438 UTC [gossip.comm] readFromStream -> DEBU 356b Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:35.438 UTC [gossip.comm] func2 -> DEBU 356c Client 192.168.240.5:55380 disconnected" -"2019-05-02 01:31:35.438 UTC [grpc] infof -> DEBU 356d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:35.437 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3569 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.8:38992" -"2019-05-02 01:31:35.462 UTC [kvledger] CommitWithPvtData -> INFO 358f [businesschannel] Committed block [9] with 1 transaction(s) in 72ms (state_validation=24ms block_commit=30ms state_commit=9ms)" -"2019-05-02 01:31:35.462 UTC [comm.grpc.server] 1 -> INFO 3590 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:31:45.33Z grpc.peer_address=192.168.240.5:55380 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=131.723ms -"2019-05-02 01:31:35.463 UTC [gossip.comm] writeToStream -> DEBU 3591 Closing writing to stream" -"2019-05-02 01:31:35.464 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3592 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:38992" -"2019-05-02 01:31:35.464 UTC [msp.identity] Sign -> DEBU 3593 Sign: plaintext: 18057A5E121408B0F6E6B6E0B1AECD15...624D0F542C442AB5FE8C65C22A02080A " -"2019-05-02 01:31:35.461 UTC [cauthdsl] func2 -> DEBU 358e 0xc003c5b580 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.465 UTC [msp] DeserializeIdentity -> DEBU 3594 Obtaining identity" -"2019-05-02 01:31:35.468 UTC [msp] Validate -> DEBU 3596 MSP Org2MSP validating identity" -"2019-05-02 01:31:35.467 UTC [msp.identity] Sign -> DEBU 3597 Sign: digest: 66BE258928477A11D949B0D67C979B00D929BE7BDC6E1DF683571101224BD961 " -"2019-05-02 01:31:35.469 UTC [gossip.state] commitBlock -> DEBU 3598 [businesschannel] Committed block [9] with 1 transaction(s)" -"2019-05-02 01:31:35.469 UTC [msp] getCertificationChain -> DEBU 3599 MSP Org2MSP getting certification chain" -"2019-05-02 01:31:35.468 UTC [cauthdsl] func2 -> DEBU 3595 0xc003c5b580 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.470 UTC [cauthdsl] func2 -> DEBU 359a 0xc003c5b580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:35.470 UTC [cauthdsl] func2 -> DEBU 359c 0xc003c5b580 principal evaluation fails" -"2019-05-02 01:31:35.470 UTC [cauthdsl] func1 -> DEBU 359d 0xc003c5b580 gate 1556760695461041100 evaluation fails" -"2019-05-02 01:31:35.471 UTC [policies] Evaluate -> DEBU 359e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.471 UTC [policies] Evaluate -> DEBU 359f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.471 UTC [policies] Evaluate -> DEBU 35a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.471 UTC [cauthdsl] func1 -> DEBU 35a1 0xc003c29fb0 gate 1556760695471646600 evaluation starts" -"2019-05-02 01:31:35.471 UTC [cauthdsl] func2 -> DEBU 35a2 0xc003c29fb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.471 UTC [cauthdsl] func2 -> DEBU 35a3 0xc003c29fb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.472 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 35a4 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:31:35.472 UTC [msp] Validate -> DEBU 35a5 MSP Org2MSP validating identity" -"2019-05-02 01:31:35.472 UTC [msp] getCertificationChain -> DEBU 35a6 MSP Org2MSP getting certification chain" -"2019-05-02 01:31:35.472 UTC [cauthdsl] func2 -> DEBU 35a7 0xc003c29fb0 principal matched by identity 0" -"2019-05-02 01:31:35.473 UTC [msp.identity] Verify -> DEBU 35a8 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +"2019-05-02 09:28:04.421 UTC [fsblkstorage] indexBlock -> DEBU 3534 txid [] is a duplicate of a previous tx. Not indexing in txid-index" +"2019-05-02 09:28:04.421 UTC [fsblkstorage] indexBlock -> DEBU 3535 Adding txLoc [fileSuffixNum=0, offset=98744, bytesLength=33870] for tx number:[0] ID: [] to blockNumTranNum index" +"2019-05-02 09:28:04.421 UTC [policies] Evaluate -> DEBU 3536 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.422 UTC [policies] Evaluate -> DEBU 3537 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.422 UTC [policies] Evaluate -> DEBU 3538 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.422 UTC [cauthdsl] func1 -> DEBU 3539 0xc00448c340 gate 1556789284422433700 evaluation starts" +"2019-05-02 09:28:04.422 UTC [cauthdsl] func2 -> DEBU 353a 0xc00448c340 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.422 UTC [cauthdsl] func2 -> DEBU 353b 0xc00448c340 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.422 UTC [cauthdsl] func2 -> DEBU 353c 0xc00448c340 principal matched by identity 0" +"2019-05-02 09:28:04.422 UTC [msp.identity] Verify -> DEBU 353d Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:04.422 UTC [msp.identity] Verify -> DEBU 353e Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:04.423 UTC [cauthdsl] func2 -> DEBU 353f 0xc00448c340 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.423 UTC [cauthdsl] func1 -> DEBU 3540 0xc00448c340 gate 1556789284422433700 evaluation succeeds" +"2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3541 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3542 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3543 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.423 UTC [policies] Evaluate -> DEBU 3544 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.423 UTC [gossip.gossip] handleMessage -> DEBU 3545 Exiting" +"2019-05-02 09:28:04.424 UTC [fsblkstorage] updateCheckpoint -> DEBU 3546 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133552], isChainEmpty=[false], lastBlockNumber=[9]" +"2019-05-02 09:28:04.424 UTC [pvtdatastorage] Commit -> DEBU 3547 Committing private data for block [9]" +"2019-05-02 09:28:04.424 UTC [gossip.gossip] handleMessage -> DEBU 3548 Entering, 172.18.0.6:53224 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.428 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3549 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.9:7051" +"2019-05-02 09:28:04.428 UTC [msp] DeserializeIdentity -> DEBU 354a Obtaining identity" +"2019-05-02 09:28:04.428 UTC [pvtdatastorage] Commit -> DEBU 354b Committed private data for block [9]" +"2019-05-02 09:28:04.428 UTC [kvledger] CommitWithPvtData -> DEBU 354c [businesschannel] Committing block [9] transactions to state database" +"2019-05-02 09:28:04.428 UTC [lockbasedtxmgr] Commit -> DEBU 354d lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-05-02 09:28:04.428 UTC [lockbasedtxmgr] Commit -> DEBU 354e Committing updates to state database" +"2019-05-02 09:28:04.428 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 354f Building the expiry schedules based on the update batch" +"2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3550 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.429 UTC [lockbasedtxmgr] Commit -> DEBU 3551 Write lock acquired for committing updates to state database" +"2019-05-02 09:28:04.429 UTC [msp] DeserializeIdentity -> DEBU 3552 Obtaining identity" +"2019-05-02 09:28:04.429 UTC [stateleveldb] ApplyUpdates -> DEBU 3553 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3554 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.429 UTC [msp] DeserializeIdentity -> DEBU 3555 Obtaining identity" +"2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3556 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3557 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3558 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.429 UTC [policies] Evaluate -> DEBU 3559 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.429 UTC [policies] Evaluate -> DEBU 355a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.429 UTC [policies] Evaluate -> DEBU 355b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.430 UTC [cauthdsl] func1 -> DEBU 355c 0xc000244bc0 gate 1556789284430008600 evaluation starts" +"2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 355d 0xc000244bc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 355e 0xc000244bc0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 355f 0xc000244bc0 principal matched by identity 0" +"2019-05-02 09:28:04.430 UTC [msp.identity] Verify -> DEBU 3560 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-05-02 01:31:35.473 UTC [msp.identity] Verify -> DEBU 35a9 Verify: sig = 00000000 30 45 02 21 00 e7 53 e4 11 4a ac 4c a3 33 33 e8 |0E.!..S..J.L.33.| -00000010 3a 38 43 13 8d 0e 03 1a ca ce 18 a4 ba 95 f8 ed |:8C.............| -00000020 94 24 e0 7f 84 02 20 39 af fe c4 c7 18 c8 72 cd |.$.... 9......r.| -00000030 c7 40 3c 27 cb 2f 7b 8c 01 f5 fa 88 a2 d8 18 69 |.@<'./{........i| -00000040 e6 d6 88 e0 38 4f 50 |....8OP|" -"2019-05-02 01:31:35.473 UTC [cauthdsl] func2 -> DEBU 35aa 0xc003c29fb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.473 UTC [cauthdsl] func1 -> DEBU 35ab 0xc003c29fb0 gate 1556760695471646600 evaluation succeeds" -"2019-05-02 01:31:35.473 UTC [policies] Evaluate -> DEBU 35ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.470 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 359b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.473 UTC [policies] Evaluate -> DEBU 35ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.474 UTC [policies] Evaluate -> DEBU 35ae Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.474 UTC [policies] Evaluate -> DEBU 35af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.474 UTC [msp] DeserializeIdentity -> DEBU 35b0 Obtaining identity" -"2019-05-02 01:31:35.475 UTC [gossip.comm] authenticateRemotePeer -> DEBU 35b1 Authenticated 192.168.240.5:7051" -"2019-05-02 01:31:35.475 UTC [msp] DeserializeIdentity -> DEBU 35b2 Obtaining identity" -"2019-05-02 01:31:35.475 UTC [msp.identity] Sign -> DEBU 35b3 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102A " -"2019-05-02 01:31:35.475 UTC [msp.identity] Sign -> DEBU 35b4 Sign: digest: F378A7FC2FD518DA1FD4B7EF06D7648D8F0095368ED366CD5914912F1DE5C569 " -"2019-05-02 01:31:35.475 UTC [msp.identity] Sign -> DEBU 35b5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:35.475 UTC [msp.identity] Sign -> DEBU 35b6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:35.476 UTC [msp] DeserializeIdentity -> DEBU 35b7 Obtaining identity" -"2019-05-02 01:31:35.476 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35b8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.477 UTC [gossip.comm] Send -> DEBU 35b9 Entering, sending GossipMessage: Channel: , nonce: 164773237808944302, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:35.478 UTC [gossip.comm] sendToEndpoint -> DEBU 35bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 164773237808944302, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.478 UTC [gossip.comm] createConnection -> DEBU 35bd Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:35.479 UTC [grpc] DialContext -> DEBU 35be parsed scheme: """ -"2019-05-02 01:31:35.479 UTC [grpc] DialContext -> DEBU 35bf scheme "" not registered, fallback to default scheme" -"2019-05-02 01:31:35.479 UTC [grpc] UpdateState -> DEBU 35c0 ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 }] }" -"2019-05-02 01:31:35.478 UTC [msp] DeserializeIdentity -> DEBU 35bc Obtaining identity" -"2019-05-02 01:31:35.477 UTC [grpc] infof -> DEBU 35ba transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:35.480 UTC [grpc] switchBalancer -> DEBU 35c1 ClientConn switching balancer to "pick_first"" -"2019-05-02 01:31:35.480 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.481 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35c3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.481 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35c4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.482 UTC [policies] Evaluate -> DEBU 35c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.482 UTC [policies] Evaluate -> DEBU 35c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.482 UTC [policies] Evaluate -> DEBU 35c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:35.481 UTC [grpc] HandleSubConnStateChange -> DEBU 35c9 pickfirstBalancer: HandleSubConnStateChange: 0xc003cb0880, CONNECTING" -"2019-05-02 01:31:35.482 UTC [cauthdsl] func1 -> DEBU 35c8 0xc0037483b0 gate 1556760695482766100 evaluation starts" -"2019-05-02 01:31:35.483 UTC [cauthdsl] func2 -> DEBU 35ca 0xc0037483b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.483 UTC [cauthdsl] func2 -> DEBU 35cb 0xc0037483b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.484 UTC [cauthdsl] func2 -> DEBU 35cc 0xc0037483b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:35.484 UTC [cauthdsl] func2 -> DEBU 35cd 0xc0037483b0 principal evaluation fails" -"2019-05-02 01:31:35.484 UTC [cauthdsl] func1 -> DEBU 35ce 0xc0037483b0 gate 1556760695482766100 evaluation fails" -"2019-05-02 01:31:35.485 UTC [policies] Evaluate -> DEBU 35cf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.485 UTC [policies] Evaluate -> DEBU 35d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.485 UTC [policies] Evaluate -> DEBU 35d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.485 UTC [cauthdsl] func1 -> DEBU 35d2 0xc003748c10 gate 1556760695485746500 evaluation starts" -"2019-05-02 01:31:35.487 UTC [cauthdsl] func2 -> DEBU 35d3 0xc003748c10 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.488 UTC [cauthdsl] func2 -> DEBU 35d4 0xc003748c10 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.489 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 35d5 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-05-02 01:31:35.489 UTC [msp] Validate -> DEBU 35d6 MSP Org2MSP validating identity" -"2019-05-02 01:31:35.495 UTC [msp] getCertificationChain -> DEBU 35d7 MSP Org2MSP getting certification chain" -"2019-05-02 01:31:35.496 UTC [cauthdsl] func2 -> DEBU 35d8 0xc003748c10 principal matched by identity 0" -"2019-05-02 01:31:35.496 UTC [msp.identity] Verify -> DEBU 35d9 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +"2019-05-02 09:28:04.430 UTC [msp.identity] Verify -> DEBU 3561 Verify: sig = 00000000 30 45 02 21 00 99 9f 28 b3 c8 5a 89 ae 0c 49 3b |0E.!...(..Z...I;| +00000010 12 fa cc 29 11 5c 53 29 20 29 0e 9f 28 61 5d ed |...).\S) )..(a].| +00000020 ae 03 53 d5 8f 02 20 6d a9 89 9e 36 78 8d 81 72 |..S... m...6x..r| +00000030 4d 0a 4f 7a 27 e0 5e 0e 71 98 ab eb ef 60 79 fb |M.Oz'.^.q....`y.| +00000040 4a c4 a5 e7 66 02 ef |J...f..|" +"2019-05-02 09:28:04.430 UTC [cauthdsl] func2 -> DEBU 3562 0xc000244bc0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.430 UTC [cauthdsl] func1 -> DEBU 3563 0xc000244bc0 gate 1556789284430008600 evaluation succeeds" +"2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3564 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3565 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3566 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.431 UTC [lockbasedtxmgr] Commit -> DEBU 3567 Updates committed to state database and the write lock is released" +"2019-05-02 09:28:04.431 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3568 Preparing potential purge list working-set for expiringAtBlk [10]" +"2019-05-02 09:28:04.431 UTC [leveldbhelper] GetIterator -> DEBU 3569 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xb, 0x0}]" +"2019-05-02 09:28:04.431 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 356a No expiry entry found for expiringAtBlk [10]" +"2019-05-02 09:28:04.432 UTC [lockbasedtxmgr] func1 -> DEBU 356b launched the background routine for preparing keys to purge with the next block" +"2019-05-02 09:28:04.432 UTC [kvledger] CommitWithPvtData -> DEBU 356c [businesschannel] Committing block [9] transactions to history database" +"2019-05-02 09:28:04.432 UTC [historyleveldb] Commit -> DEBU 356d Channel [businesschannel]: Updating history database for blockNo [9] with [1] transactions" +"2019-05-02 09:28:04.432 UTC [historyleveldb] Commit -> DEBU 356e Skipping transaction [0] since it is not an endorsement transaction" +"2019-05-02 09:28:04.434 UTC [historyleveldb] Commit -> DEBU 356f Channel [businesschannel]: Updates committed to history database for blockNo [9]" +"2019-05-02 09:28:04.434 UTC [kvledger] CommitWithPvtData -> INFO 3570 [businesschannel] Committed block [9] with 1 transaction(s) in 43ms (state_validation=19ms block_commit=18ms state_commit=3ms)" +"2019-05-02 09:28:04.434 UTC [msp.identity] Sign -> DEBU 3571 Sign: plaintext: 18057A5E121408B0DEB7D6FEF1B4CD15...624D0F542C442AB5FE8C65C22A02080A " +"2019-05-02 09:28:04.434 UTC [msp.identity] Sign -> DEBU 3572 Sign: digest: 5A6ADC83E89FA0299A699739CD6E79AAA80486E8AFEA08E44B48F1B1F8A0A2AD " +"2019-05-02 09:28:04.434 UTC [gossip.state] commitBlock -> DEBU 3573 [businesschannel] Committed block [9] with 1 transaction(s)" +"2019-05-02 09:28:04.434 UTC [gossip.comm] serviceConnection -> DEBU 3574 Closing reading from stream" +"2019-05-02 09:28:04.435 UTC [gossip.comm] readFromStream -> DEBU 3575 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +"2019-05-02 09:28:04.435 UTC [gossip.comm] readFromStream -> DEBU 3576 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-05-02 09:28:04.435 UTC [gossip.comm] func2 -> DEBU 3577 Client 172.18.0.5:57068 disconnected" +"2019-05-02 09:28:04.435 UTC [comm.grpc.server] 1 -> INFO 3578 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T09:28:14.258Z grpc.peer_address=172.18.0.5:57068 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=173.6968ms +"2019-05-02 09:28:04.430 UTC [policies] Evaluate -> DEBU 3579 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.435 UTC [gossip.comm] authenticateRemotePeer -> DEBU 357a Authenticated 172.18.0.9:7051" +"2019-05-02 09:28:04.392 UTC [gossip.discovery] handleAliveMessage -> DEBU 346a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:04.435 UTC [gossip.comm] createConnection -> DEBU 357b Exiting" +"2019-05-02 09:28:04.436 UTC [gossip.comm] sendToEndpoint -> DEBU 357c Exiting" +"2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 357d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 357e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 " +"2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 357f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 " +"2019-05-02 09:28:04.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3580 Exiting" +"2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 3581 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:04.436 UTC [gossip.discovery] learnExistingMembers -> DEBU 3582 Exiting" +"2019-05-02 09:28:04.436 UTC [gossip.discovery] handleAliveMessage -> DEBU 3583 Exiting" +"2019-05-02 09:28:04.436 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3584 Exiting" +"2019-05-02 09:28:04.440 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3589 Got message: GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.440 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 358a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:04.437 UTC [grpc] infof -> DEBU 3585 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 358b Verify: digest = 00000000 ef 8f f9 c9 84 da a4 78 5c 6b 28 82 09 9e 01 15 |.......x\k(.....| +00000010 0a cd 9d cd 70 56 89 01 2c 81 69 06 ff 14 80 89 |....pV..,.i.....|" +"2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 358c Verify: sig = 00000000 30 45 02 21 00 be 0d e7 61 f0 f8 fc 7c 89 5e 8d |0E.!....a...|.^.| +00000010 16 63 bd cf cf 74 c6 d4 91 37 3a 0f 65 4f b5 fe |.c...t...7:.eO..| +00000020 82 9e b1 10 3c 02 20 53 d4 94 e8 4c 78 33 02 3e |....<. S...Lx3.>| +00000030 21 8d 15 ed 8e b4 18 73 cf 86 3b 00 69 be 1b 95 |!......s..;.i...| +00000040 1b 99 50 89 d8 5d 8a |..P..].|" +"2019-05-02 09:28:04.440 UTC [gossip.comm] func1 -> DEBU 3586 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.441 UTC [gossip.comm] func1 -> DEBU 358d Got message: GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.440 UTC [gossip.comm] writeToStream -> DEBU 3587 Closing writing to stream" +"2019-05-02 09:28:04.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3588 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 358e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:28:04.441 UTC [msp] DeserializeIdentity -> DEBU 358f Obtaining identity" +"2019-05-02 09:28:04.441 UTC [msp.identity] Verify -> DEBU 3590 Verify: sig = 00000000 30 44 02 20 58 12 c4 7a e9 d9 77 95 af ce f8 07 |0D. X..z..w.....| +00000010 40 88 1b 14 a8 9d c4 7d 9e 22 70 72 0d 6e 63 97 |@......}."pr.nc.| +00000020 88 b1 17 db 02 20 46 12 d7 71 d0 a4 a1 b8 fe 39 |..... F..q.....9| +00000030 3c 38 cf 00 cc dd fb 10 8f 39 bd 81 58 1c 0f 1a |<8.......9..X...| +00000040 cd 3e 0b 27 43 06 |.>.'C.|" +"2019-05-02 09:28:04.441 UTC [msp] DeserializeIdentity -> DEBU 3591 Obtaining identity" +"2019-05-02 09:28:04.441 UTC [gossip.discovery] handleAliveMessage -> DEBU 3592 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:04.441 UTC [msp] DeserializeIdentity -> DEBU 3593 Obtaining identity" +"2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 3594 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:28:04.441 UTC [gossip.comm] Send -> DEBU 3595 Entering, sending GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 3596 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 " +"2019-05-02 09:28:04.441 UTC [gossip.discovery] sendMemResponse -> DEBU 3597 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 3598 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 " +"2019-05-02 09:28:04.441 UTC [gossip.comm] sendToEndpoint -> DEBU 3599 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6741287829657700763, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 359a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:04.441 UTC [gossip.comm] createConnection -> DEBU 359b Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:04.441 UTC [gossip.discovery] learnExistingMembers -> DEBU 359c Exiting" +"2019-05-02 09:28:04.441 UTC [gossip.discovery] handleAliveMessage -> DEBU 359d Exiting" +"2019-05-02 09:28:04.441 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359e Exiting" +"2019-05-02 09:28:04.442 UTC [gossip.discovery] sendMemResponse -> DEBU 359f Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:04.442 UTC [msp] DeserializeIdentity -> DEBU 35a0 Obtaining identity" +"2019-05-02 09:28:04.442 UTC [msp] DeserializeIdentity -> DEBU 35a1 Obtaining identity" +"2019-05-02 09:28:04.442 UTC [gossip.comm] Send -> DEBU 35a2 Entering, sending GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:04.442 UTC [gossip.discovery] sendMemResponse -> DEBU 35a3 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:28:04.442 UTC [gossip.comm] sendToEndpoint -> DEBU 35a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5647471799641847976, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.442 UTC [gossip.comm] createConnection -> DEBU 35a5 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35a6 parsed scheme: """ +"2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35a7 scheme "" not registered, fallback to default scheme" +"2019-05-02 09:28:04.443 UTC [grpc] UpdateState -> DEBU 35a8 ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 }] }" +"2019-05-02 09:28:04.443 UTC [grpc] switchBalancer -> DEBU 35a9 ClientConn switching balancer to "pick_first"" +"2019-05-02 09:28:04.443 UTC [grpc] HandleSubConnStateChange -> DEBU 35aa pickfirstBalancer: HandleSubConnStateChange: 0xc002f72570, CONNECTING" +"2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35ab parsed scheme: """ +"2019-05-02 09:28:04.443 UTC [grpc] DialContext -> DEBU 35ac scheme "" not registered, fallback to default scheme" +"2019-05-02 09:28:04.443 UTC [grpc] UpdateState -> DEBU 35ad ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 }] }" +"2019-05-02 09:28:04.443 UTC [grpc] switchBalancer -> DEBU 35ae ClientConn switching balancer to "pick_first"" +"2019-05-02 09:28:04.447 UTC [grpc] HandleSubConnStateChange -> DEBU 35af pickfirstBalancer: HandleSubConnStateChange: 0xc002f72570, READY" +"2019-05-02 09:28:04.449 UTC [msp.identity] Sign -> DEBU 35b0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:28:04.449 UTC [msp.identity] Sign -> DEBU 35b1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:28:04.449 UTC [gossip.comm] authenticateRemotePeer -> DEBU 35b2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:7051" +"2019-05-02 09:28:04.443 UTC [grpc] HandleSubConnStateChange -> DEBU 35b3 pickfirstBalancer: HandleSubConnStateChange: 0xc00308aab0, CONNECTING" +"2019-05-02 09:28:04.456 UTC [gossip.gossip] handleMessage -> DEBU 35b4 Exiting" +"2019-05-02 09:28:04.456 UTC [gossip.gossip] handleMessage -> DEBU 35b5 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.456 UTC [msp] DeserializeIdentity -> DEBU 35b6 Obtaining identity" +"2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35b7 Verify: digest = 00000000 a6 21 b0 6f 03 d3 4a 06 74 b1 8c fc a8 e2 2e 1a |.!.o..J.t.......| +00000010 10 c6 1f b1 15 db 21 b0 2c 16 b6 fb 5e d8 45 33 |......!.,...^.E3|" +"2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35b8 Verify: sig = 00000000 30 45 02 21 00 f9 42 a5 5e bf a0 10 fc 49 06 cf |0E.!..B.^....I..| +00000010 e2 d8 6f 98 4a b3 94 3e 8c 24 b3 e2 30 2f b1 91 |..o.J..>.$..0/..| +00000020 92 ea 37 4b ed 02 20 79 26 71 ee a3 d5 14 e5 a5 |..7K.. y&q......| +00000030 17 c7 94 93 28 08 02 0f 37 2e 4b 25 91 20 9d 21 |....(...7.K%. .!| +00000040 62 6c a8 1b 43 73 38 |bl..Cs8|" +"2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35b9 Verify: digest = 00000000 af 86 a2 d2 44 fc f2 b0 1e 13 91 f6 4e a6 65 8a |....D.......N.e.| +00000010 38 1c bb 91 7b 9f af 25 03 3f 20 05 dc 03 0f ce |8...{..%.? .....|" +"2019-05-02 09:28:04.457 UTC [msp.identity] Verify -> DEBU 35ba Verify: sig = 00000000 30 45 02 21 00 c6 20 a9 56 fe ec 33 d8 04 30 62 |0E.!.. .V..3..0b| +00000010 a0 48 b6 25 aa c6 b9 ba 97 3d 87 75 73 ca bc df |.H.%.....=.us...| +00000020 b8 7a ed 14 3b 02 20 41 9f 1e b5 dd f1 1b d7 e7 |.z..;. A........| +00000030 07 88 71 d6 d6 37 32 97 a4 a9 04 00 61 25 05 8c |..q..72.....a%..| +00000040 af d1 6d 1e fb 48 b3 |..m..H.|" +"2019-05-02 09:28:04.457 UTC [msp] DeserializeIdentity -> DEBU 35bb Obtaining identity" +"2019-05-02 09:28:04.458 UTC [msp] DeserializeIdentity -> DEBU 35bc Obtaining identity" +"2019-05-02 09:28:04.458 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35be Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35bf Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.458 UTC [policies] Evaluate -> DEBU 35c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.458 UTC [policies] Evaluate -> DEBU 35c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.458 UTC [policies] Evaluate -> DEBU 35c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.458 UTC [cauthdsl] func1 -> DEBU 35c3 0xc0038f09e0 gate 1556789284458739100 evaluation starts" +"2019-05-02 09:28:04.458 UTC [cauthdsl] func2 -> DEBU 35c4 0xc0038f09e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.458 UTC [cauthdsl] func2 -> DEBU 35c5 0xc0038f09e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.458 UTC [cauthdsl] func2 -> DEBU 35c6 0xc0038f09e0 principal matched by identity 0" +"2019-05-02 09:28:04.459 UTC [msp.identity] Verify -> DEBU 35c7 Verify: digest = 00000000 ef ed 4e 5d 00 97 dc 8b 1c 24 cf fe 82 37 7a ea |..N].....$...7z.| +00000010 de 82 93 aa 0c 78 86 60 f6 fc a2 f6 9c 77 20 9c |.....x.`.....w .|" +"2019-05-02 09:28:04.459 UTC [msp.identity] Verify -> DEBU 35c8 Verify: sig = 00000000 30 44 02 20 4c 11 55 9e 01 c2 8c 63 ba 48 f6 e5 |0D. L.U....c.H..| +00000010 09 8a c8 7e 5a 20 38 ae dd 7d 75 8c 46 54 09 1e |...~Z 8..}u.FT..| +00000020 40 28 05 23 02 20 11 98 52 61 5b 64 14 61 f4 0b |@(.#. ..Ra[d.a..| +00000030 28 71 8c d1 06 07 1c f9 d9 a3 a1 22 79 a0 f3 d3 |(q........."y...| +00000040 40 6f 9d c2 22 6e |@o.."n|" +"2019-05-02 09:28:04.459 UTC [cauthdsl] func2 -> DEBU 35c9 0xc0038f09e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.459 UTC [cauthdsl] func1 -> DEBU 35ca 0xc0038f09e0 gate 1556789284458739100 evaluation succeeds" +"2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35cd Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.459 UTC [policies] Evaluate -> DEBU 35ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.459 UTC [msp] DeserializeIdentity -> DEBU 35cf Obtaining identity" +"2019-05-02 09:28:04.460 UTC [msp] DeserializeIdentity -> DEBU 35d0 Obtaining identity" +"2019-05-02 09:28:04.460 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35d1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.460 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35d2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.460 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35d3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.460 UTC [policies] Evaluate -> DEBU 35d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.460 UTC [policies] Evaluate -> DEBU 35d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.460 UTC [policies] Evaluate -> DEBU 35d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.460 UTC [cauthdsl] func1 -> DEBU 35d7 0xc0039281b0 gate 1556789284460649900 evaluation starts" +"2019-05-02 09:28:04.460 UTC [cauthdsl] func2 -> DEBU 35d8 0xc0039281b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.460 UTC [cauthdsl] func2 -> DEBU 35d9 0xc0039281b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.460 UTC [cauthdsl] func2 -> DEBU 35da 0xc0039281b0 principal matched by identity 0" +"2019-05-02 09:28:04.460 UTC [msp.identity] Verify -> DEBU 35db Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:04.460 UTC [msp.identity] Verify -> DEBU 35dc Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:04.461 UTC [cauthdsl] func2 -> DEBU 35dd 0xc0039281b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.461 UTC [cauthdsl] func1 -> DEBU 35de 0xc0039281b0 gate 1556789284460649900 evaluation succeeds" +"2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35e1 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.461 UTC [policies] Evaluate -> DEBU 35e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.461 UTC [msp] DeserializeIdentity -> DEBU 35e3 Obtaining identity" +"2019-05-02 09:28:04.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35e4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35e5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.462 UTC [policies] Evaluate -> DEBU 35e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.462 UTC [policies] Evaluate -> DEBU 35e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.462 UTC [policies] Evaluate -> DEBU 35e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.462 UTC [cauthdsl] func1 -> DEBU 35e9 0xc003929290 gate 1556789284462225900 evaluation starts" +"2019-05-02 09:28:04.462 UTC [cauthdsl] func2 -> DEBU 35ea 0xc003929290 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.462 UTC [cauthdsl] func2 -> DEBU 35eb 0xc003929290 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.462 UTC [cauthdsl] func2 -> DEBU 35ec 0xc003929290 principal matched by identity 0" +"2019-05-02 09:28:04.462 UTC [msp.identity] Verify -> DEBU 35ed Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:04.462 UTC [msp.identity] Verify -> DEBU 35ee Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:04.463 UTC [cauthdsl] func2 -> DEBU 35ef 0xc003929290 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.463 UTC [cauthdsl] func1 -> DEBU 35f0 0xc003929290 gate 1556789284462225900 evaluation succeeds" +"2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f3 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.463 UTC [policies] Evaluate -> DEBU 35f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.463 UTC [gossip.gossip] handleMessage -> DEBU 35f5 Exiting" +"2019-05-02 09:28:04.463 UTC [gossip.gossip] handleMessage -> DEBU 35f6 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.463 UTC [gossip.gossip] handleMessage -> DEBU 35f7 Exiting" +"2019-05-02 09:28:04.463 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35f8 Got message: GossipMessage: Channel: , nonce: 8356403637377680477, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.463 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35f9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:04.463 UTC [msp.identity] Verify -> DEBU 35fa Verify: digest = 00000000 46 9f bc 17 1a 97 13 22 99 a8 5f d1 ef a9 be d2 |F......".._.....| +00000010 c2 a4 4d 77 ef 8d d0 74 60 7e 47 fe a8 2f 01 89 |..Mw...t`~G../..|" +"2019-05-02 09:28:04.464 UTC [msp.identity] Verify -> DEBU 35fb Verify: sig = 00000000 30 44 02 20 67 f3 86 7e 34 5e 52 aa 09 3e 66 2b |0D. g..~4^R..>f+| +00000010 72 6c 2b 60 72 fd fe 6d 80 e5 9a fb dd 86 ad c4 |rl+`r..m........| +00000020 ab 24 6e 44 02 20 48 9a d6 96 cf 20 2b 9d 24 72 |.$nD. H.... +.$r| +00000030 d8 ee 7f 3f 5f 99 d4 ef 7d 4f d9 78 77 0b cb 04 |...?_...}O.xw...| +00000040 79 e6 a8 d4 e3 03 |y.....|" +"2019-05-02 09:28:04.464 UTC [gossip.discovery] handleAliveMessage -> DEBU 35fc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:04.464 UTC [gossip.discovery] isSentByMe -> DEBU 35fd Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:04.464 UTC [gossip.discovery] handleAliveMessage -> DEBU 35fe Exiting" +"2019-05-02 09:28:04.464 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35ff Exiting" +"2019-05-02 09:28:04.464 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3600 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.5:7051" +"2019-05-02 09:28:04.464 UTC [msp] DeserializeIdentity -> DEBU 3601 Obtaining identity" +"2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3602 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.464 UTC [msp] DeserializeIdentity -> DEBU 3603 Obtaining identity" +"2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3604 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.464 UTC [msp] DeserializeIdentity -> DEBU 3605 Obtaining identity" +"2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3606 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3607 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.464 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3608 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.465 UTC [policies] Evaluate -> DEBU 3609 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.465 UTC [policies] Evaluate -> DEBU 360a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.465 UTC [policies] Evaluate -> DEBU 360b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.465 UTC [cauthdsl] func1 -> DEBU 360c 0xc0044a92d0 gate 1556789284465124200 evaluation starts" +"2019-05-02 09:28:04.465 UTC [cauthdsl] func2 -> DEBU 360d 0xc0044a92d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.465 UTC [cauthdsl] func2 -> DEBU 360e 0xc0044a92d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.465 UTC [cauthdsl] func2 -> DEBU 360f 0xc0044a92d0 principal matched by identity 0" +"2019-05-02 09:28:04.465 UTC [msp.identity] Verify -> DEBU 3610 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-05-02 01:31:35.496 UTC [msp.identity] Verify -> DEBU 35da Verify: sig = 00000000 30 45 02 21 00 ab 2c 8e 52 d8 1f 54 d3 6a c5 a4 |0E.!..,.R..T.j..| -00000010 8f 79 89 72 c8 4e ad 73 cb 74 a6 f4 b0 bc 21 f3 |.y.r.N.s.t....!.| -00000020 09 3c 70 19 ac 02 20 2c cd 14 c9 83 33 bf 4c 29 |..8\o.....| -00000040 f5 87 f4 2e 2a 38 d1 |....*8.|" -"2019-05-02 01:31:35.497 UTC [cauthdsl] func2 -> DEBU 35db 0xc003748c10 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.497 UTC [cauthdsl] func1 -> DEBU 35dc 0xc003748c10 gate 1556760695485746500 evaluation succeeds" -"2019-05-02 01:31:35.497 UTC [policies] Evaluate -> DEBU 35dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.497 UTC [policies] Evaluate -> DEBU 35de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.498 UTC [gossip.comm] func1 -> DEBU 35df Got message: GossipMessage: Channel: , nonce: 9964179666323823934, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.498 UTC [gossip.gossip] handleMessage -> DEBU 35e0 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 9964179666323823934, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.505 UTC [gossip.gossip] handleMessage -> DEBU 35e1 Exiting" -"2019-05-02 01:31:35.505 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35e2 Got message: GossipMessage: Channel: , nonce: 9964179666323823934, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.512 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35e6 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:35.498 UTC [policies] Evaluate -> DEBU 35e3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.513 UTC [policies] Evaluate -> DEBU 35e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.513 UTC [gossip.comm] authenticateRemotePeer -> DEBU 35e8 Authenticated 192.168.240.8:38992" -"2019-05-02 01:31:35.512 UTC [msp] DeserializeIdentity -> DEBU 35e9 Obtaining identity" -"2019-05-02 01:31:35.514 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35eb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ec Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ed Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.514 UTC [policies] Evaluate -> DEBU 35ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.514 UTC [policies] Evaluate -> DEBU 35ef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.514 UTC [policies] Evaluate -> DEBU 35f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:35.513 UTC [gossip.comm] GossipStream -> DEBU 35ea Servicing 192.168.240.8:38992" -"2019-05-02 01:31:35.511 UTC [grpc] HandleSubConnStateChange -> DEBU 35e5 pickfirstBalancer: HandleSubConnStateChange: 0xc003cb0880, READY" -"2019-05-02 01:31:35.510 UTC [grpc] infof -> DEBU 35e4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:35.515 UTC [cauthdsl] func1 -> DEBU 35f1 0xc003782c60 gate 1556760695514863800 evaluation starts" -"2019-05-02 01:31:35.515 UTC [cauthdsl] func2 -> DEBU 35f3 0xc003782c60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.515 UTC [cauthdsl] func2 -> DEBU 35f4 0xc003782c60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.516 UTC [cauthdsl] func2 -> DEBU 35f5 0xc003782c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:35.516 UTC [cauthdsl] func2 -> DEBU 35f6 0xc003782c60 principal evaluation fails" -"2019-05-02 01:31:35.516 UTC [cauthdsl] func1 -> DEBU 35f7 0xc003782c60 gate 1556760695514863800 evaluation fails" -"2019-05-02 01:31:35.516 UTC [policies] Evaluate -> DEBU 35f8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.517 UTC [policies] Evaluate -> DEBU 35f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.517 UTC [policies] Evaluate -> DEBU 35fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.518 UTC [cauthdsl] func1 -> DEBU 35fb 0xc0037922b0 gate 1556760695518048400 evaluation starts" -"2019-05-02 01:31:35.518 UTC [cauthdsl] func2 -> DEBU 35fc 0xc0037922b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.518 UTC [cauthdsl] func2 -> DEBU 35fd 0xc0037922b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.515 UTC [gossip.comm] writeToStream -> DEBU 35f2 Closing writing to stream" -"2019-05-02 01:31:35.519 UTC [gossip.comm] serviceConnection -> DEBU 35fe Closing reading from stream" -"2019-05-02 01:31:35.520 UTC [gossip.comm] readFromStream -> DEBU 35ff 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" -"2019-05-02 01:31:35.521 UTC [gossip.comm] readFromStream -> DEBU 3600 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-05-02 01:31:35.521 UTC [gossip.comm] func2 -> DEBU 3601 Client 192.168.240.8:38992 disconnected" -"2019-05-02 01:31:35.521 UTC [comm.grpc.server] 1 -> INFO 3602 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-05-02T01:31:45.403Z grpc.peer_address=192.168.240.8:38992 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=117.348ms -"2019-05-02 01:31:35.522 UTC [gossip.comm] writeToStream -> DEBU 3603 Closing writing to stream" -"2019-05-02 01:31:35.522 UTC [grpc] infof -> DEBU 3604 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:35.523 UTC [msp.identity] Sign -> DEBU 3605 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:31:35.523 UTC [msp.identity] Sign -> DEBU 3606 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:31:35.524 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3607 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.240.5:7051" -"2019-05-02 01:31:35.527 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3608 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.240.5:7051" -"2019-05-02 01:31:35.527 UTC [msp] DeserializeIdentity -> DEBU 3609 Obtaining identity" -"2019-05-02 01:31:35.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 360a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.527 UTC [msp] DeserializeIdentity -> DEBU 360b Obtaining identity" -"2019-05-02 01:31:35.529 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 360c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.529 UTC [msp] DeserializeIdentity -> DEBU 360d Obtaining identity" -"2019-05-02 01:31:35.530 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 360e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.530 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 360f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.530 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3610 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.530 UTC [policies] Evaluate -> DEBU 3611 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.531 UTC [policies] Evaluate -> DEBU 3612 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.531 UTC [policies] Evaluate -> DEBU 3613 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:35.531 UTC [cauthdsl] func1 -> DEBU 3614 0xc0040af4b0 gate 1556760695531238700 evaluation starts" -"2019-05-02 01:31:35.531 UTC [cauthdsl] func2 -> DEBU 3615 0xc0040af4b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.531 UTC [cauthdsl] func2 -> DEBU 3616 0xc0040af4b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.532 UTC [cauthdsl] func2 -> DEBU 3617 0xc0040af4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:35.532 UTC [cauthdsl] func2 -> DEBU 3618 0xc0040af4b0 principal evaluation fails" -"2019-05-02 01:31:35.532 UTC [cauthdsl] func1 -> DEBU 3619 0xc0040af4b0 gate 1556760695531238700 evaluation fails" -"2019-05-02 01:31:35.532 UTC [policies] Evaluate -> DEBU 361a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.532 UTC [policies] Evaluate -> DEBU 361b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.532 UTC [policies] Evaluate -> DEBU 361c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.533 UTC [cauthdsl] func1 -> DEBU 361d 0xc0040afcf0 gate 1556760695532944800 evaluation starts" -"2019-05-02 01:31:35.533 UTC [cauthdsl] func2 -> DEBU 361e 0xc0040afcf0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.533 UTC [cauthdsl] func2 -> DEBU 361f 0xc0040afcf0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.533 UTC [cauthdsl] func2 -> DEBU 3620 0xc0040afcf0 principal matched by identity 0" -"2019-05-02 01:31:35.534 UTC [msp.identity] Verify -> DEBU 3621 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-05-02 01:31:35.534 UTC [msp.identity] Verify -> DEBU 3622 Verify: sig = 00000000 30 45 02 21 00 91 c4 52 e0 a5 f3 d2 30 c2 bb 01 |0E.!...R....0...| -00000010 2d 1c e2 f8 df 33 ad 23 b8 7c 68 27 3d 9d 7c d6 |-....3.#.|h'=.|.| -00000020 9e 61 16 c7 f6 02 20 4b 4d d6 11 67 77 96 28 f0 |.a.... KM..gw.(.| -00000030 f5 02 50 b6 70 15 23 33 cf f7 59 ff 6d 33 86 43 |..P.p.#3..Y.m3.C| -00000040 90 e7 e8 35 8e c7 94 |...5...|" -"2019-05-02 01:31:35.534 UTC [cauthdsl] func2 -> DEBU 3623 0xc0040afcf0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.534 UTC [cauthdsl] func1 -> DEBU 3624 0xc0040afcf0 gate 1556760695532944800 evaluation succeeds" -"2019-05-02 01:31:35.534 UTC [policies] Evaluate -> DEBU 3625 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.535 UTC [policies] Evaluate -> DEBU 3626 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.535 UTC [policies] Evaluate -> DEBU 3627 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.518 UTC [cauthdsl] func2 -> DEBU 3628 0xc0037922b0 principal matched by identity 0" -"2019-05-02 01:31:35.536 UTC [msp.identity] Verify -> DEBU 3629 Verify: digest = 00000000 b4 97 11 7b d1 be aa a3 cf a7 f5 0c 4b 63 35 35 |...{........Kc55| -00000010 67 06 7a db a2 f8 62 a0 db 90 dc a4 0b a0 25 d3 |g.z...b.......%.|" -"2019-05-02 01:31:35.536 UTC [msp.identity] Verify -> DEBU 362a Verify: sig = 00000000 30 44 02 20 2f cb 05 37 97 6b 46 e2 9a 85 5d dc |0D. /..7.kF...].| -00000010 ec 10 00 26 71 9c cd b9 da 13 67 8f 6c ab ad 92 |...&q.....g.l...| -00000020 47 43 ae 5a 02 20 0e 0d 44 54 c0 51 5c 33 ec 08 |GC.Z. ..DT.Q\3..| -00000030 f0 3d 0e b0 c2 63 66 07 52 12 21 4e ce 4f 0b b9 |.=...cf.R.!N.O..| -00000040 0a 6a 14 ab 8a e9 |.j....|" -"2019-05-02 01:31:35.536 UTC [cauthdsl] func2 -> DEBU 362b 0xc0037922b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.536 UTC [cauthdsl] func1 -> DEBU 362c 0xc0037922b0 gate 1556760695518048400 evaluation succeeds" -"2019-05-02 01:31:35.536 UTC [policies] Evaluate -> DEBU 362d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.537 UTC [policies] Evaluate -> DEBU 362e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.537 UTC [policies] Evaluate -> DEBU 362f Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.537 UTC [policies] Evaluate -> DEBU 3630 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.537 UTC [gossip.discovery] handleAliveMessage -> DEBU 3631 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:35.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 3632 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:35.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 3633 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 " -"2019-05-02 01:31:35.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 3634 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 " -"2019-05-02 01:31:35.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 3635 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:35.538 UTC [gossip.discovery] learnExistingMembers -> DEBU 3636 Exiting" -"2019-05-02 01:31:35.539 UTC [gossip.discovery] handleAliveMessage -> DEBU 3637 Exiting" -"2019-05-02 01:31:35.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3638 Exiting" -"2019-05-02 01:31:35.539 UTC [gossip.discovery] sendMemResponse -> DEBU 3639 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:35.540 UTC [msp] DeserializeIdentity -> DEBU 363a Obtaining identity" -"2019-05-02 01:31:35.535 UTC [policies] Evaluate -> DEBU 363b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.541 UTC [gossip.comm] authenticateRemotePeer -> DEBU 363c Authenticated 192.168.240.5:7051" -"2019-05-02 01:31:35.541 UTC [gossip.comm] createConnection -> DEBU 363d Exiting" -"2019-05-02 01:31:35.541 UTC [gossip.comm] sendToEndpoint -> DEBU 363e Exiting" -"2019-05-02 01:31:35.540 UTC [msp] DeserializeIdentity -> DEBU 363f Obtaining identity" -"2019-05-02 01:31:35.542 UTC [msp] DeserializeIdentity -> DEBU 3640 Obtaining identity" -"2019-05-02 01:31:35.542 UTC [gossip.comm] Send -> DEBU 3641 Entering, sending GossipMessage: Channel: , nonce: 9964179666323823934, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:35.543 UTC [gossip.discovery] sendMemResponse -> DEBU 3642 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:35.543 UTC [gossip.comm] sendToEndpoint -> DEBU 3643 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9964179666323823934, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.543 UTC [gossip.comm] createConnection -> DEBU 3644 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:35.545 UTC [gossip.comm] func1 -> DEBU 3645 Got message: GossipMessage: Channel: , nonce: 164773237808944302, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.545 UTC [gossip.gossip] handleMessage -> DEBU 3646 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 164773237808944302, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.545 UTC [gossip.gossip] handleMessage -> DEBU 3647 Exiting" -"2019-05-02 01:31:35.546 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3648 Got message: GossipMessage: Channel: , nonce: 164773237808944302, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" -"2019-05-02 01:31:35.546 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3649 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:35.546 UTC [msp.identity] Verify -> DEBU 364a Verify: digest = 00000000 f3 78 a7 fc 2f d5 18 da 1f d4 b7 ef 06 d7 64 8d |.x../.........d.| -00000010 8f 00 95 36 8e d3 66 cd 59 14 91 2f 1d e5 c5 69 |...6..f.Y../...i|" -"2019-05-02 01:31:35.546 UTC [msp.identity] Verify -> DEBU 364b Verify: sig = 00000000 30 44 02 20 44 2a 5c fa 3c f6 73 2c d8 4a 6d 5a |0D. D*\.<.s,.JmZ| -00000010 4d 82 51 79 ca ef 5e 63 e0 ee 23 62 db 46 e7 81 |M.Qy..^c..#b.F..| -00000020 d1 80 10 c6 02 20 2d 16 6c 6c 09 e7 88 d5 1f 25 |..... -.ll.....%| -00000030 17 15 1d fa 16 b4 a7 05 a9 d6 ab f2 c8 34 7c d8 |.............4|.| -00000040 68 c0 97 21 42 20 |h..!B |" -"2019-05-02 01:31:35.547 UTC [gossip.discovery] handleAliveMessage -> DEBU 364c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:35.547 UTC [gossip.discovery] isSentByMe -> DEBU 364d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:35.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 364e Exiting" -"2019-05-02 01:31:35.548 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 364f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:35.550 UTC [grpc] DialContext -> DEBU 3650 parsed scheme: """ -"2019-05-02 01:31:35.550 UTC [grpc] DialContext -> DEBU 3651 scheme "" not registered, fallback to default scheme" -"2019-05-02 01:31:35.550 UTC [msp.identity] Verify -> DEBU 3652 Verify: digest = 00000000 65 b3 a2 c8 ff 0b bd d1 f8 b2 40 8d 2e d5 fb 12 |e.........@.....| -00000010 16 0a 22 1c e0 38 36 67 4a f1 26 f3 0e 73 9c d1 |.."..86gJ.&..s..|" -"2019-05-02 01:31:35.551 UTC [msp.identity] Verify -> DEBU 3653 Verify: sig = 00000000 30 45 02 21 00 fb d5 8b 10 b0 47 52 48 d2 81 13 |0E.!......GRH...| -00000010 f7 83 3c d7 3b 33 a8 ee 6d ae 58 4b 56 35 11 ad |..<.;3..m.XKV5..| -00000020 01 af 8a 88 a1 02 20 48 64 6e 90 f5 06 94 67 b6 |...... Hdn....g.| -00000030 b4 cc 4e 52 66 8b 3a 9c fa 17 b4 20 7a 0e 04 50 |..NRf.:.... z..P| -00000040 72 27 19 d4 4c e4 67 |r'..L.g|" -"2019-05-02 01:31:35.551 UTC [gossip.discovery] handleAliveMessage -> DEBU 3654 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:35.551 UTC [gossip.discovery] handleAliveMessage -> DEBU 3655 Exiting" -"2019-05-02 01:31:35.551 UTC [grpc] UpdateState -> DEBU 3656 ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 }] }" -"2019-05-02 01:31:35.552 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3657 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:35.552 UTC [msp] DeserializeIdentity -> DEBU 3658 Obtaining identity" -"2019-05-02 01:31:35.552 UTC [grpc] switchBalancer -> DEBU 3659 ClientConn switching balancer to "pick_first"" -"2019-05-02 01:31:35.553 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 365a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.553 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 365b Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.553 UTC [grpc] HandleSubConnStateChange -> DEBU 365c pickfirstBalancer: HandleSubConnStateChange: 0xc0040f5d10, CONNECTING" -"2019-05-02 01:31:35.553 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 365d Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.554 UTC [policies] Evaluate -> DEBU 365e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.554 UTC [policies] Evaluate -> DEBU 365f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.555 UTC [policies] Evaluate -> DEBU 3660 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:35.555 UTC [cauthdsl] func1 -> DEBU 3661 0xc0040f92e0 gate 1556760695555623300 evaluation starts" -"2019-05-02 01:31:35.556 UTC [cauthdsl] func2 -> DEBU 3662 0xc0040f92e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.556 UTC [cauthdsl] func2 -> DEBU 3663 0xc0040f92e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.556 UTC [cauthdsl] func2 -> DEBU 3664 0xc0040f92e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:35.557 UTC [cauthdsl] func2 -> DEBU 3665 0xc0040f92e0 principal evaluation fails" -"2019-05-02 01:31:35.558 UTC [cauthdsl] func1 -> DEBU 3666 0xc0040f92e0 gate 1556760695555623300 evaluation fails" -"2019-05-02 01:31:35.558 UTC [policies] Evaluate -> DEBU 3667 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.558 UTC [policies] Evaluate -> DEBU 3668 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.558 UTC [policies] Evaluate -> DEBU 3669 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.559 UTC [cauthdsl] func1 -> DEBU 366a 0xc0040f9b20 gate 1556760695559083700 evaluation starts" -"2019-05-02 01:31:35.559 UTC [cauthdsl] func2 -> DEBU 366b 0xc0040f9b20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.559 UTC [cauthdsl] func2 -> DEBU 366c 0xc0040f9b20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.559 UTC [cauthdsl] func2 -> DEBU 366d 0xc0040f9b20 principal matched by identity 0" -"2019-05-02 01:31:35.560 UTC [msp.identity] Verify -> DEBU 366e Verify: digest = 00000000 0d d2 87 9b 4e da e0 f5 f0 42 15 d0 8d 88 18 93 |....N....B......| -00000010 25 d0 95 6d a0 76 e9 e1 31 a8 0d 46 7f 3c 2b e4 |%..m.v..1..F.<+.|" -"2019-05-02 01:31:35.560 UTC [msp.identity] Verify -> DEBU 366f Verify: sig = 00000000 30 44 02 20 7e 58 84 2c 19 12 bc c8 31 fe 59 a8 |0D. ~X.,....1.Y.| -00000010 5e 36 69 31 de 33 9a 7b 14 5a ba 19 ee eb 6c 4b |^6i1.3.{.Z....lK| -00000020 81 c0 2d 12 02 20 63 69 7a d3 14 94 95 6e 35 48 |..-.. ciz....n5H| -00000030 f0 7d 3c da f2 8a 8a 81 2d cf 40 95 93 3d 16 b2 |.}<.....-.@..=..| -00000040 99 25 1e 0b b1 db |.%....|" -"2019-05-02 01:31:35.561 UTC [cauthdsl] func2 -> DEBU 3670 0xc0040f9b20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.561 UTC [cauthdsl] func1 -> DEBU 3671 0xc0040f9b20 gate 1556760695559083700 evaluation succeeds" -"2019-05-02 01:31:35.561 UTC [policies] Evaluate -> DEBU 3672 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.562 UTC [policies] Evaluate -> DEBU 3673 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.562 UTC [grpc] HandleSubConnStateChange -> DEBU 3674 pickfirstBalancer: HandleSubConnStateChange: 0xc0040f5d10, READY" -"2019-05-02 01:31:35.563 UTC [policies] Evaluate -> DEBU 3675 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.563 UTC [policies] Evaluate -> DEBU 3676 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3677 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:35.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3678 got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1556760633753242000, 47 but got ts: inc_num:1556760633753242000 seq_num:40 " -"2019-05-02 01:31:35.564 UTC [gossip.discovery] handleAliveMessage -> DEBU 3679 Exiting" -"2019-05-02 01:31:35.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 367a Exiting" -"2019-05-02 01:31:35.565 UTC [msp.identity] Sign -> DEBU 367b Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:31:35.566 UTC [msp.identity] Sign -> DEBU 367c Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:31:35.566 UTC [gossip.comm] authenticateRemotePeer -> DEBU 367d Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.8:7051" -"2019-05-02 01:31:35.567 UTC [gossip.comm] authenticateRemotePeer -> DEBU 367e Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.240.8:7051" -"2019-05-02 01:31:35.569 UTC [msp] DeserializeIdentity -> DEBU 367f Obtaining identity" -"2019-05-02 01:31:35.569 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3680 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.569 UTC [msp] DeserializeIdentity -> DEBU 3681 Obtaining identity" -"2019-05-02 01:31:35.570 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3682 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.570 UTC [msp] DeserializeIdentity -> DEBU 3683 Obtaining identity" -"2019-05-02 01:31:35.570 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3684 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:35.570 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3685 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.570 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3686 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:35.571 UTC [policies] Evaluate -> DEBU 3687 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:35.571 UTC [policies] Evaluate -> DEBU 3688 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:35.571 UTC [policies] Evaluate -> DEBU 3689 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:35.571 UTC [cauthdsl] func1 -> DEBU 368a 0xc0044b48c0 gate 1556760695571735400 evaluation starts" -"2019-05-02 01:31:35.572 UTC [cauthdsl] func2 -> DEBU 368b 0xc0044b48c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.572 UTC [cauthdsl] func2 -> DEBU 368c 0xc0044b48c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.572 UTC [cauthdsl] func2 -> DEBU 368d 0xc0044b48c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:35.572 UTC [cauthdsl] func2 -> DEBU 368e 0xc0044b48c0 principal evaluation fails" -"2019-05-02 01:31:35.572 UTC [cauthdsl] func1 -> DEBU 368f 0xc0044b48c0 gate 1556760695571735400 evaluation fails" -"2019-05-02 01:31:35.573 UTC [policies] Evaluate -> DEBU 3690 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.573 UTC [policies] Evaluate -> DEBU 3691 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:35.573 UTC [policies] Evaluate -> DEBU 3692 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:35.573 UTC [cauthdsl] func1 -> DEBU 3693 0xc0044b5100 gate 1556760695573650600 evaluation starts" -"2019-05-02 01:31:35.573 UTC [cauthdsl] func2 -> DEBU 3694 0xc0044b5100 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:35.573 UTC [cauthdsl] func2 -> DEBU 3695 0xc0044b5100 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:35.574 UTC [cauthdsl] func2 -> DEBU 3696 0xc0044b5100 principal matched by identity 0" -"2019-05-02 01:31:35.574 UTC [msp.identity] Verify -> DEBU 3697 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-05-02 01:31:35.574 UTC [msp.identity] Verify -> DEBU 3698 Verify: sig = 00000000 30 45 02 21 00 c8 35 08 7e dc af 5e fe 9d 49 e7 |0E.!..5.~..^..I.| -00000010 51 0c 32 e4 a0 cc 30 e3 46 e6 1d c9 72 03 62 ca |Q.2...0.F...r.b.| -00000020 fa 8a e9 bb fe 02 20 70 1f c4 af 75 5a 7e 53 0a |...... p...uZ~S.| -00000030 1a 33 cf 9b b3 c3 01 8c 36 f6 09 36 25 bf 31 45 |.3......6..6%.1E| -00000040 84 36 cf fe 6f 5a 11 |.6..oZ.|" -"2019-05-02 01:31:35.574 UTC [cauthdsl] func2 -> DEBU 3699 0xc0044b5100 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:35.575 UTC [cauthdsl] func1 -> DEBU 369a 0xc0044b5100 gate 1556760695573650600 evaluation succeeds" -"2019-05-02 01:31:35.575 UTC [policies] Evaluate -> DEBU 369b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.575 UTC [policies] Evaluate -> DEBU 369c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:35.575 UTC [policies] Evaluate -> DEBU 369d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:35.576 UTC [policies] Evaluate -> DEBU 369e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:35.576 UTC [gossip.comm] authenticateRemotePeer -> DEBU 369f Authenticated 192.168.240.8:7051" -"2019-05-02 01:31:35.576 UTC [gossip.comm] createConnection -> DEBU 36a0 Exiting" -"2019-05-02 01:31:35.576 UTC [gossip.comm] sendToEndpoint -> DEBU 36a1 Exiting" -"2019-05-02 01:31:36.787 UTC [msp] DeserializeIdentity -> DEBU 36a2 Obtaining identity" -"2019-05-02 01:31:36.788 UTC [msp] DeserializeIdentity -> DEBU 36a3 Obtaining identity" -"2019-05-02 01:31:36.789 UTC [gossip.comm] Send -> DEBU 36a4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:36.789 UTC [gossip.comm] sendToEndpoint -> DEBU 36a5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.790 UTC [gossip.comm] sendToEndpoint -> DEBU 36a6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.790 UTC [gossip.comm] sendToEndpoint -> DEBU 36a7 Exiting" -"2019-05-02 01:31:36.790 UTC [gossip.comm] createConnection -> DEBU 36a8 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:36.792 UTC [grpc] DialContext -> DEBU 36ab parsed scheme: """ -"2019-05-02 01:31:36.790 UTC [msp] DeserializeIdentity -> DEBU 36a9 Obtaining identity" -"2019-05-02 01:31:36.790 UTC [gossip.comm] sendToEndpoint -> DEBU 36aa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.793 UTC [msp] DeserializeIdentity -> DEBU 36ac Obtaining identity" -"2019-05-02 01:31:36.793 UTC [gossip.comm] Send -> DEBU 36ae Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760695464671900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" -"2019-05-02 01:31:36.794 UTC [msp] DeserializeIdentity -> DEBU 36af Obtaining identity" -"2019-05-02 01:31:36.794 UTC [msp] DeserializeIdentity -> DEBU 36b0 Obtaining identity" -"2019-05-02 01:31:36.794 UTC [gossip.comm] sendToEndpoint -> DEBU 36b1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760695464671900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:36.795 UTC [gossip.comm] sendToEndpoint -> DEBU 36b2 Exiting" -"2019-05-02 01:31:36.793 UTC [gossip.comm] sendToEndpoint -> DEBU 36ad Exiting" -"2019-05-02 01:31:36.795 UTC [gossip.comm] sendToEndpoint -> DEBU 36b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760695464671900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:36.795 UTC [gossip.comm] sendToEndpoint -> DEBU 36b4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760640861354800 seq_num:1556760695464671900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" -"2019-05-02 01:31:36.796 UTC [gossip.comm] sendToEndpoint -> DEBU 36b5 Exiting" -"2019-05-02 01:31:36.792 UTC [grpc] DialContext -> DEBU 36b6 scheme "" not registered, fallback to default scheme" -"2019-05-02 01:31:36.797 UTC [grpc] UpdateState -> DEBU 36b7 ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 }] }" -"2019-05-02 01:31:36.797 UTC [grpc] switchBalancer -> DEBU 36b8 ClientConn switching balancer to "pick_first"" -"2019-05-02 01:31:36.798 UTC [grpc] HandleSubConnStateChange -> DEBU 36b9 pickfirstBalancer: HandleSubConnStateChange: 0xc0044e2d60, CONNECTING" -"2019-05-02 01:31:36.804 UTC [gossip.comm] func1 -> DEBU 36ba Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.805 UTC [grpc] HandleSubConnStateChange -> DEBU 36bb pickfirstBalancer: HandleSubConnStateChange: 0xc0044e2d60, READY" -"2019-05-02 01:31:36.805 UTC [gossip.gossip] handleMessage -> DEBU 36bc Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.806 UTC [msp] DeserializeIdentity -> DEBU 36bd Obtaining identity" -"2019-05-02 01:31:36.808 UTC [msp.identity] Sign -> DEBU 36be Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-05-02 01:31:36.808 UTC [msp.identity] Sign -> DEBU 36bf Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-05-02 01:31:36.808 UTC [msp.identity] Verify -> DEBU 36c0 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:36.808 UTC [gossip.comm] authenticateRemotePeer -> DEBU 36c1 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.240.6:7051" -"2019-05-02 01:31:36.808 UTC [msp.identity] Verify -> DEBU 36c2 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:36.811 UTC [msp.identity] Verify -> DEBU 36c3 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:36.812 UTC [msp.identity] Verify -> DEBU 36c4 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:36.813 UTC [msp] DeserializeIdentity -> DEBU 36c5 Obtaining identity" -"2019-05-02 01:31:36.815 UTC [msp] DeserializeIdentity -> DEBU 36c6 Obtaining identity" -"2019-05-02 01:31:36.816 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:36.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36c8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36c9 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.816 UTC [policies] Evaluate -> DEBU 36ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:36.816 UTC [policies] Evaluate -> DEBU 36cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:36.817 UTC [policies] Evaluate -> DEBU 36cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:36.817 UTC [cauthdsl] func1 -> DEBU 36cd 0xc00454cda0 gate 1556760696817569600 evaluation starts" -"2019-05-02 01:31:36.817 UTC [cauthdsl] func2 -> DEBU 36ce 0xc00454cda0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.817 UTC [cauthdsl] func2 -> DEBU 36cf 0xc00454cda0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.818 UTC [cauthdsl] func2 -> DEBU 36d0 0xc00454cda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:36.818 UTC [cauthdsl] func2 -> DEBU 36d1 0xc00454cda0 principal evaluation fails" -"2019-05-02 01:31:36.818 UTC [gossip.comm] authenticateRemotePeer -> DEBU 36d3 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.240.6:7051" -"2019-05-02 01:31:36.818 UTC [cauthdsl] func1 -> DEBU 36d2 0xc00454cda0 gate 1556760696817569600 evaluation fails" -"2019-05-02 01:31:36.820 UTC [policies] Evaluate -> DEBU 36d4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.820 UTC [policies] Evaluate -> DEBU 36d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.820 UTC [policies] Evaluate -> DEBU 36d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:36.820 UTC [cauthdsl] func1 -> DEBU 36d7 0xc00454d5e0 gate 1556760696820873100 evaluation starts" -"2019-05-02 01:31:36.821 UTC [cauthdsl] func2 -> DEBU 36d8 0xc00454d5e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.821 UTC [cauthdsl] func2 -> DEBU 36da 0xc00454d5e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.821 UTC [cauthdsl] func2 -> DEBU 36db 0xc00454d5e0 principal matched by identity 0" -"2019-05-02 01:31:36.823 UTC [msp.identity] Verify -> DEBU 36dc Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:36.823 UTC [msp.identity] Verify -> DEBU 36dd Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:36.823 UTC [gossip.comm] func1 -> DEBU 36de Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.824 UTC [cauthdsl] func2 -> DEBU 36df 0xc00454d5e0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:36.821 UTC [msp.identity] Verify -> DEBU 36d9 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +"2019-05-02 09:28:04.465 UTC [msp.identity] Verify -> DEBU 3611 Verify: sig = 00000000 30 45 02 21 00 ef 71 9d 80 d2 c7 f7 33 64 7b 79 |0E.!..q.....3d{y| +00000010 6f e0 41 b0 94 29 eb 66 f5 6a 79 70 6d 25 4d 04 |o.A..).f.jypm%M.| +00000020 75 99 52 26 9a 02 20 13 cb 56 a3 7e fc c6 1f c2 |u.R&.. ..V.~....| +00000030 e3 a6 62 4a 4a d2 60 65 fa 3e d6 da 86 dd 6c 5c |..bJJ.`e.>....l\| +00000040 73 b2 7b 29 c6 79 02 |s.{).y.|" +"2019-05-02 09:28:04.474 UTC [grpc] HandleSubConnStateChange -> DEBU 3612 pickfirstBalancer: HandleSubConnStateChange: 0xc00308aab0, READY" +"2019-05-02 09:28:04.473 UTC [cauthdsl] func2 -> DEBU 3613 0xc0044a92d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.477 UTC [msp.identity] Sign -> DEBU 3614 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-05-02 09:28:04.478 UTC [msp.identity] Sign -> DEBU 3615 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-05-02 09:28:04.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3616 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +"2019-05-02 09:28:04.479 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3617 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:7051" +"2019-05-02 09:28:04.480 UTC [msp.identity] Verify -> DEBU 3618 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-05-02 01:31:36.824 UTC [cauthdsl] func1 -> DEBU 36e0 0xc00454d5e0 gate 1556760696820873100 evaluation succeeds" -"2019-05-02 01:31:36.825 UTC [policies] Evaluate -> DEBU 36e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.825 UTC [policies] Evaluate -> DEBU 36e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.826 UTC [policies] Evaluate -> DEBU 36e4 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:36.826 UTC [policies] Evaluate -> DEBU 36e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:36.824 UTC [msp.identity] Verify -> DEBU 36e1 Verify: sig = 00000000 30 44 02 20 65 5a f0 0f a4 96 88 00 6b 73 40 7c |0D. eZ......ks@|| -00000010 0e 23 20 fd f0 92 4a 31 28 e4 92 a0 29 d4 2c 19 |.# ...J1(...).,.| -00000020 e0 4a a6 db 02 20 49 a2 80 e1 69 2a 60 3e 9a e1 |.J... I...i*`>..| -00000030 a9 00 4e ff 89 15 84 4d 3f 88 47 60 f3 33 ef f6 |..N....M?.G`.3..| -00000040 1b 0a 02 0a 68 6c |....hl|" -"2019-05-02 01:31:36.828 UTC [gossip.comm] authenticateRemotePeer -> DEBU 36e7 Authenticated 192.168.240.6:7051" -"2019-05-02 01:31:36.828 UTC [gossip.comm] createConnection -> DEBU 36e8 Exiting" -"2019-05-02 01:31:36.828 UTC [msp] DeserializeIdentity -> DEBU 36e6 Obtaining identity" -"2019-05-02 01:31:36.829 UTC [gossip.comm] sendToEndpoint -> DEBU 36e9 Exiting" -"2019-05-02 01:31:36.829 UTC [msp] DeserializeIdentity -> DEBU 36ea Obtaining identity" -"2019-05-02 01:31:36.829 UTC [gossip.comm] sendToEndpoint -> DEBU 36eb Exiting" -"2019-05-02 01:31:36.833 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36ec Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:36.833 UTC [gossip.comm] func1 -> DEBU 36ee Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ed Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ef Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.835 UTC [policies] Evaluate -> DEBU 36f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:36.835 UTC [policies] Evaluate -> DEBU 36f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:36.836 UTC [policies] Evaluate -> DEBU 36f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:36.836 UTC [cauthdsl] func1 -> DEBU 36f3 0xc00457e5d0 gate 1556760696836274400 evaluation starts" -"2019-05-02 01:31:36.836 UTC [cauthdsl] func2 -> DEBU 36f4 0xc00457e5d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.837 UTC [cauthdsl] func2 -> DEBU 36f5 0xc00457e5d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.840 UTC [cauthdsl] func2 -> DEBU 36f6 0xc00457e5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:36.841 UTC [cauthdsl] func2 -> DEBU 36f7 0xc00457e5d0 principal evaluation fails" -"2019-05-02 01:31:36.841 UTC [cauthdsl] func1 -> DEBU 36f8 0xc00457e5d0 gate 1556760696836274400 evaluation fails" -"2019-05-02 01:31:36.842 UTC [policies] Evaluate -> DEBU 36f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.843 UTC [policies] Evaluate -> DEBU 36fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.843 UTC [policies] Evaluate -> DEBU 36fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:36.844 UTC [cauthdsl] func1 -> DEBU 36fc 0xc00457ee10 gate 1556760696844162700 evaluation starts" -"2019-05-02 01:31:36.844 UTC [cauthdsl] func2 -> DEBU 36fd 0xc00457ee10 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.845 UTC [cauthdsl] func2 -> DEBU 36fe 0xc00457ee10 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.845 UTC [cauthdsl] func2 -> DEBU 36ff 0xc00457ee10 principal matched by identity 0" -"2019-05-02 01:31:36.846 UTC [msp.identity] Verify -> DEBU 3700 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:36.847 UTC [msp.identity] Verify -> DEBU 3701 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:36.848 UTC [cauthdsl] func2 -> DEBU 3702 0xc00457ee10 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:36.848 UTC [cauthdsl] func1 -> DEBU 3703 0xc00457ee10 gate 1556760696844162700 evaluation succeeds" -"2019-05-02 01:31:36.848 UTC [policies] Evaluate -> DEBU 3704 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.849 UTC [policies] Evaluate -> DEBU 3705 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.849 UTC [policies] Evaluate -> DEBU 3706 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:36.849 UTC [policies] Evaluate -> DEBU 3707 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:36.850 UTC [msp] DeserializeIdentity -> DEBU 3708 Obtaining identity" -"2019-05-02 01:31:36.850 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3709 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.850 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 370a Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.851 UTC [policies] Evaluate -> DEBU 370b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:36.851 UTC [policies] Evaluate -> DEBU 370c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:36.851 UTC [policies] Evaluate -> DEBU 370d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:36.852 UTC [cauthdsl] func1 -> DEBU 370e 0xc00457fef0 gate 1556760696851723400 evaluation starts" -"2019-05-02 01:31:36.852 UTC [cauthdsl] func2 -> DEBU 370f 0xc00457fef0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.852 UTC [cauthdsl] func2 -> DEBU 3710 0xc00457fef0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.855 UTC [cauthdsl] func2 -> DEBU 3711 0xc00457fef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:36.855 UTC [cauthdsl] func2 -> DEBU 3712 0xc00457fef0 principal evaluation fails" -"2019-05-02 01:31:36.855 UTC [cauthdsl] func1 -> DEBU 3713 0xc00457fef0 gate 1556760696851723400 evaluation fails" -"2019-05-02 01:31:36.856 UTC [policies] Evaluate -> DEBU 3714 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.856 UTC [policies] Evaluate -> DEBU 3715 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.856 UTC [policies] Evaluate -> DEBU 3716 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:36.857 UTC [cauthdsl] func1 -> DEBU 3717 0xc004594730 gate 1556760696857048100 evaluation starts" -"2019-05-02 01:31:36.857 UTC [cauthdsl] func2 -> DEBU 3718 0xc004594730 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.858 UTC [cauthdsl] func2 -> DEBU 3719 0xc004594730 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.858 UTC [cauthdsl] func2 -> DEBU 371a 0xc004594730 principal matched by identity 0" -"2019-05-02 01:31:36.858 UTC [msp.identity] Verify -> DEBU 371b Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:36.859 UTC [msp.identity] Verify -> DEBU 371c Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:36.859 UTC [cauthdsl] func2 -> DEBU 371d 0xc004594730 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:36.859 UTC [cauthdsl] func1 -> DEBU 371e 0xc004594730 gate 1556760696857048100 evaluation succeeds" -"2019-05-02 01:31:36.860 UTC [policies] Evaluate -> DEBU 371f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.860 UTC [policies] Evaluate -> DEBU 3720 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.860 UTC [policies] Evaluate -> DEBU 3721 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:36.860 UTC [policies] Evaluate -> DEBU 3722 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:36.861 UTC [gossip.gossip] handleMessage -> DEBU 3723 Exiting" -"2019-05-02 01:31:36.861 UTC [gossip.gossip] handleMessage -> DEBU 3724 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.861 UTC [msp] DeserializeIdentity -> DEBU 3725 Obtaining identity" -"2019-05-02 01:31:36.861 UTC [msp.identity] Verify -> DEBU 3726 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:36.862 UTC [msp.identity] Verify -> DEBU 3727 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:36.863 UTC [msp.identity] Verify -> DEBU 3728 Verify: digest = 00000000 3f 87 b3 13 2b 14 27 72 67 00 67 40 88 36 93 35 |?...+.'rg.g@.6.5| -00000010 06 1b f9 30 65 e6 d1 95 57 c9 d6 2b 27 fb a5 4d |...0e...W..+'..M|" -"2019-05-02 01:31:36.863 UTC [msp.identity] Verify -> DEBU 3729 Verify: sig = 00000000 30 45 02 21 00 d8 b7 0c 6e 43 5a 7c 15 d2 ea 07 |0E.!....nCZ|....| -00000010 d0 e1 1c 2a 8e 39 58 f0 67 12 6a e5 b7 9d cf 88 |...*.9X.g.j.....| -00000020 dc cc f0 33 f3 02 20 7d 85 1d 5d 33 eb f2 9e a7 |...3.. }..]3....| -00000030 41 9f 93 f9 c6 c6 19 16 f1 6e 6c e8 2e 13 c6 3a |A........nl....:| -00000040 d9 26 a0 67 09 b7 d3 |.&.g...|" -"2019-05-02 01:31:36.864 UTC [msp] DeserializeIdentity -> DEBU 372a Obtaining identity" -"2019-05-02 01:31:36.864 UTC [msp] DeserializeIdentity -> DEBU 372b Obtaining identity" -"2019-05-02 01:31:36.864 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 372c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:36.865 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 372d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.865 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 372e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.865 UTC [policies] Evaluate -> DEBU 372f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:36.866 UTC [policies] Evaluate -> DEBU 3730 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:36.866 UTC [policies] Evaluate -> DEBU 3731 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:36.866 UTC [cauthdsl] func1 -> DEBU 3732 0xc0045a7080 gate 1556760696866477500 evaluation starts" -"2019-05-02 01:31:36.866 UTC [cauthdsl] func2 -> DEBU 3733 0xc0045a7080 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.866 UTC [cauthdsl] func2 -> DEBU 3734 0xc0045a7080 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.867 UTC [cauthdsl] func2 -> DEBU 3735 0xc0045a7080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:36.867 UTC [cauthdsl] func2 -> DEBU 3736 0xc0045a7080 principal evaluation fails" -"2019-05-02 01:31:36.867 UTC [cauthdsl] func1 -> DEBU 3737 0xc0045a7080 gate 1556760696866477500 evaluation fails" -"2019-05-02 01:31:36.868 UTC [policies] Evaluate -> DEBU 3738 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.868 UTC [policies] Evaluate -> DEBU 3739 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.869 UTC [policies] Evaluate -> DEBU 373a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:36.869 UTC [cauthdsl] func1 -> DEBU 373b 0xc0045a78c0 gate 1556760696869338100 evaluation starts" -"2019-05-02 01:31:36.869 UTC [cauthdsl] func2 -> DEBU 373c 0xc0045a78c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.869 UTC [cauthdsl] func2 -> DEBU 373d 0xc0045a78c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.870 UTC [cauthdsl] func2 -> DEBU 373e 0xc0045a78c0 principal matched by identity 0" -"2019-05-02 01:31:36.870 UTC [msp.identity] Verify -> DEBU 373f Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:36.870 UTC [msp.identity] Verify -> DEBU 3740 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:36.871 UTC [cauthdsl] func2 -> DEBU 3741 0xc0045a78c0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:36.871 UTC [cauthdsl] func1 -> DEBU 3742 0xc0045a78c0 gate 1556760696869338100 evaluation succeeds" -"2019-05-02 01:31:36.871 UTC [policies] Evaluate -> DEBU 3743 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.872 UTC [policies] Evaluate -> DEBU 3744 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.872 UTC [policies] Evaluate -> DEBU 3745 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:36.872 UTC [policies] Evaluate -> DEBU 3746 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:36.873 UTC [msp] DeserializeIdentity -> DEBU 3747 Obtaining identity" -"2019-05-02 01:31:36.873 UTC [msp] DeserializeIdentity -> DEBU 3748 Obtaining identity" -"2019-05-02 01:31:36.874 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3749 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:36.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 374a Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 374b Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.874 UTC [policies] Evaluate -> DEBU 374c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:36.875 UTC [policies] Evaluate -> DEBU 374d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:36.875 UTC [policies] Evaluate -> DEBU 374e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:36.875 UTC [cauthdsl] func1 -> DEBU 374f 0xc0045b9090 gate 1556760696875439500 evaluation starts" -"2019-05-02 01:31:36.875 UTC [cauthdsl] func2 -> DEBU 3750 0xc0045b9090 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.876 UTC [cauthdsl] func2 -> DEBU 3751 0xc0045b9090 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.876 UTC [cauthdsl] func2 -> DEBU 3752 0xc0045b9090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:36.876 UTC [cauthdsl] func2 -> DEBU 3753 0xc0045b9090 principal evaluation fails" -"2019-05-02 01:31:36.876 UTC [cauthdsl] func1 -> DEBU 3754 0xc0045b9090 gate 1556760696875439500 evaluation fails" -"2019-05-02 01:31:36.877 UTC [policies] Evaluate -> DEBU 3755 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.877 UTC [policies] Evaluate -> DEBU 3756 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.877 UTC [policies] Evaluate -> DEBU 3757 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:36.877 UTC [cauthdsl] func1 -> DEBU 3758 0xc0045b98d0 gate 1556760696877709100 evaluation starts" -"2019-05-02 01:31:36.878 UTC [cauthdsl] func2 -> DEBU 3759 0xc0045b98d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.878 UTC [cauthdsl] func2 -> DEBU 375a 0xc0045b98d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.878 UTC [cauthdsl] func2 -> DEBU 375b 0xc0045b98d0 principal matched by identity 0" -"2019-05-02 01:31:36.878 UTC [msp.identity] Verify -> DEBU 375c Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:36.878 UTC [msp.identity] Verify -> DEBU 375d Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:36.879 UTC [cauthdsl] func2 -> DEBU 375e 0xc0045b98d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:36.879 UTC [cauthdsl] func1 -> DEBU 375f 0xc0045b98d0 gate 1556760696877709100 evaluation succeeds" -"2019-05-02 01:31:36.879 UTC [policies] Evaluate -> DEBU 3760 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.879 UTC [policies] Evaluate -> DEBU 3761 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.879 UTC [policies] Evaluate -> DEBU 3762 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:36.880 UTC [policies] Evaluate -> DEBU 3763 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:36.880 UTC [msp] DeserializeIdentity -> DEBU 3764 Obtaining identity" -"2019-05-02 01:31:36.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3765 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.881 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3766 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3767 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3768 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3769 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:36.881 UTC [cauthdsl] func1 -> DEBU 376a 0xc0045c89b0 gate 1556760696881291200 evaluation starts" -"2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 376b 0xc0045c89b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 376c 0xc0045c89b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 376d 0xc0045c89b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 376e 0xc0045c89b0 principal evaluation fails" -"2019-05-02 01:31:36.881 UTC [cauthdsl] func1 -> DEBU 376f 0xc0045c89b0 gate 1556760696881291200 evaluation fails" -"2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3770 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3771 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.881 UTC [policies] Evaluate -> DEBU 3772 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:36.881 UTC [cauthdsl] func1 -> DEBU 3773 0xc0045c91f0 gate 1556760696881653800 evaluation starts" -"2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 3774 0xc0045c91f0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 3775 0xc0045c91f0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.881 UTC [cauthdsl] func2 -> DEBU 3776 0xc0045c91f0 principal matched by identity 0" -"2019-05-02 01:31:36.881 UTC [msp.identity] Verify -> DEBU 3777 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:36.881 UTC [msp.identity] Verify -> DEBU 3778 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:36.882 UTC [cauthdsl] func2 -> DEBU 3779 0xc0045c91f0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:36.882 UTC [cauthdsl] func1 -> DEBU 377a 0xc0045c91f0 gate 1556760696881653800 evaluation succeeds" -"2019-05-02 01:31:36.882 UTC [policies] Evaluate -> DEBU 377b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.882 UTC [policies] Evaluate -> DEBU 377c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.882 UTC [policies] Evaluate -> DEBU 377d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:36.882 UTC [policies] Evaluate -> DEBU 377e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:36.882 UTC [gossip.gossip] handleMessage -> DEBU 377f Exiting" -"2019-05-02 01:31:36.882 UTC [gossip.gossip] handleMessage -> DEBU 3780 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.882 UTC [msp.identity] Verify -> DEBU 3781 Verify: digest = 00000000 68 7b 42 5f e7 0d fd ed d8 b2 46 39 de 13 e4 dd |h{B_......F9....| -00000010 eb d4 23 48 47 a4 67 8c 0a 12 ff e8 e2 9c 7e 2f |..#HG.g.......~/|" -"2019-05-02 01:31:36.882 UTC [msp.identity] Verify -> DEBU 3782 Verify: sig = 00000000 30 44 02 20 7c d7 28 b8 3a b6 9c 54 83 6d bc 95 |0D. |.(.:..T.m..| -00000010 ab ee 1e cf 00 a1 82 86 b6 c8 f8 36 ba 5f a7 b0 |...........6._..| -00000020 0f e4 6c 7c 02 20 5a 6f aa d0 59 c3 a6 05 37 8d |..l|. Zo..Y...7.| -00000030 6d 84 67 3e d1 ce 30 7a 5e 15 56 eb 7f 80 20 1d |m.g>..0z^.V... .| -00000040 d8 d7 e8 1b cd f3 |......|" -"2019-05-02 01:31:36.882 UTC [msp] DeserializeIdentity -> DEBU 3783 Obtaining identity" -"2019-05-02 01:31:36.882 UTC [msp] DeserializeIdentity -> DEBU 3784 Obtaining identity" -"2019-05-02 01:31:36.882 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3785 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:36.883 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3786 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.883 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3787 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 3788 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 3789 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 378a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func1 -> DEBU 378b 0xc0045df320 gate 1556760696883205600 evaluation starts" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 378c 0xc0045df320 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 378d 0xc0045df320 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 378e 0xc0045df320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 378f 0xc0045df320 principal evaluation fails" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func1 -> DEBU 3790 0xc0045df320 gate 1556760696883205600 evaluation fails" -"2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 3791 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 3792 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.883 UTC [policies] Evaluate -> DEBU 3793 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func1 -> DEBU 3794 0xc0045dfb60 gate 1556760696883552200 evaluation starts" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 3795 0xc0045dfb60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 3796 0xc0045dfb60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 3797 0xc0045dfb60 principal matched by identity 0" -"2019-05-02 01:31:36.883 UTC [msp.identity] Verify -> DEBU 3798 Verify: digest = 00000000 cd 3b 03 70 6f 2e a5 80 3a b2 56 99 50 1d ed f2 |.;.po...:.V.P...| -00000010 03 3a e0 18 00 aa 09 2c 5b 82 1b 29 10 95 33 1a |.:.....,[..)..3.|" -"2019-05-02 01:31:36.883 UTC [msp.identity] Verify -> DEBU 3799 Verify: sig = 00000000 30 45 02 21 00 98 b9 2e 5a 1a 35 a4 83 ec 96 47 |0E.!....Z.5....G| -00000010 72 e9 17 0c 0f da 0a 17 57 d8 64 b4 ae 8f 16 c4 |r.......W.d.....| -00000020 53 aa ae 9c 4e 02 20 6f 02 2a 64 17 cd ed 09 f1 |S...N. o.*d.....| -00000030 66 8a 05 5c 21 be 8a 6c c9 c9 d2 e0 4d 19 06 2b |f..\!..l....M..+| -00000040 b5 6b 64 72 b0 d8 92 |.kdr...|" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func2 -> DEBU 379a 0xc0045dfb60 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:36.883 UTC [cauthdsl] func1 -> DEBU 379b 0xc0045dfb60 gate 1556760696883552200 evaluation succeeds" -"2019-05-02 01:31:36.886 UTC [policies] Evaluate -> DEBU 379c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.886 UTC [policies] Evaluate -> DEBU 379d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.886 UTC [policies] Evaluate -> DEBU 379e Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:36.886 UTC [policies] Evaluate -> DEBU 379f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:36.887 UTC [msp] DeserializeIdentity -> DEBU 37a0 Obtaining identity" -"2019-05-02 01:31:36.887 UTC [msp] DeserializeIdentity -> DEBU 37a1 Obtaining identity" -"2019-05-02 01:31:36.887 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37a2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:36.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37a3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37a4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.888 UTC [policies] Evaluate -> DEBU 37a5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:36.888 UTC [policies] Evaluate -> DEBU 37a6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:36.888 UTC [policies] Evaluate -> DEBU 37a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:36.889 UTC [cauthdsl] func1 -> DEBU 37a8 0xc0045f7330 gate 1556760696889098500 evaluation starts" -"2019-05-02 01:31:36.889 UTC [cauthdsl] func2 -> DEBU 37a9 0xc0045f7330 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.889 UTC [cauthdsl] func2 -> DEBU 37aa 0xc0045f7330 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.889 UTC [cauthdsl] func2 -> DEBU 37ab 0xc0045f7330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:36.890 UTC [cauthdsl] func2 -> DEBU 37ac 0xc0045f7330 principal evaluation fails" -"2019-05-02 01:31:36.890 UTC [cauthdsl] func1 -> DEBU 37ad 0xc0045f7330 gate 1556760696889098500 evaluation fails" -"2019-05-02 01:31:36.890 UTC [policies] Evaluate -> DEBU 37ae Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.890 UTC [policies] Evaluate -> DEBU 37af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.891 UTC [policies] Evaluate -> DEBU 37b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:36.891 UTC [cauthdsl] func1 -> DEBU 37b1 0xc0045f7b70 gate 1556760696891182200 evaluation starts" -"2019-05-02 01:31:36.891 UTC [cauthdsl] func2 -> DEBU 37b2 0xc0045f7b70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.891 UTC [cauthdsl] func2 -> DEBU 37b3 0xc0045f7b70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.891 UTC [cauthdsl] func2 -> DEBU 37b4 0xc0045f7b70 principal matched by identity 0" -"2019-05-02 01:31:36.891 UTC [msp.identity] Verify -> DEBU 37b5 Verify: digest = 00000000 e0 ad de d3 a8 2a 02 af df 53 28 d4 ab 12 bd ae |.....*...S(.....| -00000010 4e b4 11 80 41 d5 75 d5 d0 ea e6 3f 01 7f 5c 02 |N...A.u....?..\.|" -"2019-05-02 01:31:36.892 UTC [msp.identity] Verify -> DEBU 37b6 Verify: sig = 00000000 30 44 02 20 44 54 86 fb c6 2c f7 e3 77 a2 b4 9c |0D. DT...,..w...| -00000010 da 81 60 d0 a5 b7 ca de 7c 9f 5a fe 47 8b 37 2a |..`.....|.Z.G.7*| -00000020 81 e1 aa f2 02 20 18 dc 52 8b 4a 7a 2a 6c 88 09 |..... ..R.Jz*l..| -00000030 da e7 4d 0a f8 33 7e d1 89 52 3a 53 ab 8a cf 1b |..M..3~..R:S....| -00000040 66 24 7c dc 78 ff |f$|.x.|" -"2019-05-02 01:31:36.892 UTC [cauthdsl] func2 -> DEBU 37b7 0xc0045f7b70 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:36.892 UTC [cauthdsl] func1 -> DEBU 37b8 0xc0045f7b70 gate 1556760696891182200 evaluation succeeds" -"2019-05-02 01:31:36.892 UTC [policies] Evaluate -> DEBU 37b9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.893 UTC [policies] Evaluate -> DEBU 37ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:36.893 UTC [policies] Evaluate -> DEBU 37bb Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:36.893 UTC [policies] Evaluate -> DEBU 37bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:36.893 UTC [msp.identity] Verify -> DEBU 37bd Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:36.894 UTC [msp.identity] Verify -> DEBU 37be Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:36.894 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37bf Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.894 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37c0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:36.895 UTC [policies] Evaluate -> DEBU 37c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:36.895 UTC [policies] Evaluate -> DEBU 37c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:36.895 UTC [policies] Evaluate -> DEBU 37c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:36.895 UTC [msp] DeserializeIdentity -> DEBU 37c4 Obtaining identity" -"2019-05-02 01:31:36.895 UTC [msp.identity] newIdentity -> DEBU 37c5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:04.480 UTC [msp.identity] Verify -> DEBU 3619 Verify: sig = 00000000 30 44 02 20 34 6a de 18 86 d6 cf 36 41 ca 8e d9 |0D. 4j.....6A...| +00000010 95 ad 74 02 22 19 2d 56 87 a0 72 d2 eb 57 a9 9c |..t.".-V..r..W..| +00000020 88 84 30 71 02 20 70 e0 0f 48 34 44 e2 71 09 b7 |..0q. p..H4D.q..| +00000030 8f e1 db 9b 10 af 37 84 d1 3a 21 16 a1 02 c9 68 |......7..:!....h| +00000040 13 a8 63 31 f9 6c |..c1.l|" +"2019-05-02 09:28:04.480 UTC [gossip.comm] authenticateRemotePeer -> DEBU 361a Authenticated 172.18.0.6:7051" +"2019-05-02 09:28:04.480 UTC [gossip.comm] createConnection -> DEBU 361b Exiting" +"2019-05-02 09:28:04.480 UTC [gossip.comm] sendToEndpoint -> DEBU 361c Exiting" +"2019-05-02 09:28:04.478 UTC [cauthdsl] func1 -> DEBU 361d 0xc0044a92d0 gate 1556789284465124200 evaluation succeeds" +"2019-05-02 09:28:04.484 UTC [grpc] infof -> DEBU 361e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:04.484 UTC [policies] Evaluate -> DEBU 361f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.484 UTC [policies] Evaluate -> DEBU 3620 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.485 UTC [policies] Evaluate -> DEBU 3621 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.485 UTC [policies] Evaluate -> DEBU 3622 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.485 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3623 Authenticated 172.18.0.5:7051" +"2019-05-02 09:28:04.485 UTC [gossip.comm] createConnection -> DEBU 3624 Exiting" +"2019-05-02 09:28:04.485 UTC [gossip.comm] sendToEndpoint -> DEBU 3625 Exiting" +"2019-05-02 09:28:04.508 UTC [gossip.comm] func1 -> DEBU 3626 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.508 UTC [gossip.gossip] handleMessage -> DEBU 3627 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.509 UTC [msp] DeserializeIdentity -> DEBU 3628 Obtaining identity" +"2019-05-02 09:28:04.509 UTC [msp] DeserializeIdentity -> DEBU 3629 Obtaining identity" +"2019-05-02 09:28:04.510 UTC [gossip.gossip] handleMessage -> DEBU 362a Exiting" +"2019-05-02 09:28:04.517 UTC [gossip.comm] func1 -> DEBU 362b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.518 UTC [gossip.gossip] handleMessage -> DEBU 362c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.518 UTC [msp.identity] Verify -> DEBU 362d Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:04.519 UTC [msp.identity] Verify -> DEBU 362e Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:04.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 362f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.520 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3630 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.520 UTC [policies] Evaluate -> DEBU 3631 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.521 UTC [policies] Evaluate -> DEBU 3632 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.521 UTC [gossip.comm] func1 -> DEBU 3633 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.521 UTC [policies] Evaluate -> DEBU 3634 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.522 UTC [msp] DeserializeIdentity -> DEBU 3635 Obtaining identity" +"2019-05-02 09:28:04.522 UTC [msp.identity] newIdentity -> DEBU 3636 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -18466,3200 +17696,2746 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE-----" -"2019-05-02 01:31:36.895 UTC [cauthdsl] func1 -> DEBU 37c6 0xc00460d270 gate 1556760696895586700 evaluation starts" -"2019-05-02 01:31:36.895 UTC [cauthdsl] func2 -> DEBU 37c7 0xc00460d270 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:36.895 UTC [cauthdsl] func2 -> DEBU 37c8 0xc00460d270 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:36.895 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 37c9 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:31:36.895 UTC [msp] Validate -> DEBU 37ca MSP Org1MSP validating identity" -"2019-05-02 01:31:36.895 UTC [msp] getCertificationChain -> DEBU 37cb MSP Org1MSP getting certification chain" -"2019-05-02 01:31:36.896 UTC [cauthdsl] func2 -> DEBU 37cc 0xc00460d270 principal matched by identity 0" -"2019-05-02 01:31:36.896 UTC [msp.identity] Verify -> DEBU 37cd Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:36.896 UTC [msp.identity] Verify -> DEBU 37ce Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:36.896 UTC [cauthdsl] func2 -> DEBU 37cf 0xc00460d270 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:36.896 UTC [cauthdsl] func1 -> DEBU 37d0 0xc00460d270 gate 1556760696895586700 evaluation succeeds" -"2019-05-02 01:31:36.896 UTC [policies] Evaluate -> DEBU 37d1 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.896 UTC [policies] Evaluate -> DEBU 37d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:36.896 UTC [policies] Evaluate -> DEBU 37d3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:36.896 UTC [policies] Evaluate -> DEBU 37d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:36.898 UTC [gossip.gossip] handleMessage -> DEBU 37d5 Exiting" -"2019-05-02 01:31:36.914 UTC [msp] DeserializeIdentity -> DEBU 37d6 Obtaining identity" -"2019-05-02 01:31:36.914 UTC [msp] DeserializeIdentity -> DEBU 37d7 Obtaining identity" -"2019-05-02 01:31:36.915 UTC [gossip.pull] Hello -> DEBU 37d8 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:36.915 UTC [msp] DeserializeIdentity -> DEBU 37d9 Obtaining identity" -"2019-05-02 01:31:36.915 UTC [msp] DeserializeIdentity -> DEBU 37da Obtaining identity" -"2019-05-02 01:31:36.915 UTC [gossip.comm] Send -> DEBU 37db Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:36.915 UTC [gossip.comm] sendToEndpoint -> DEBU 37dc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.915 UTC [gossip.comm] sendToEndpoint -> DEBU 37dd Exiting" -"2019-05-02 01:31:36.917 UTC [gossip.comm] func1 -> DEBU 37de Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4636327806519350883 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 5 6 8 4 7], Envelope: 60 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.917 UTC [gossip.gossip] handleMessage -> DEBU 37df Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4636327806519350883 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 5 6 8 4 7], Envelope: 60 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.917 UTC [gossip.pull] HandleMessage -> DEBU 37e0 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4636327806519350883 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 5 6 8 4 7], Envelope: 60 bytes, Signature: 0 bytes" -"2019-05-02 01:31:36.917 UTC [gossip.gossip] handleMessage -> DEBU 37e1 Exiting" -"2019-05-02 01:31:36.949 UTC [gossip.election] waitForInterrupt -> DEBU 37e2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:36.950 UTC [gossip.election] IsLeader -> DEBU 37e3 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:36.951 UTC [msp.identity] Sign -> DEBU 37e4 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100C1801 " -"2019-05-02 01:31:36.951 UTC [msp.identity] Sign -> DEBU 37e5 Sign: digest: 6A1921AF613ED453CF35773B6F6FDC7E6576801230CF4F132C579439ABCAC6E3 " -"2019-05-02 01:31:36.952 UTC [gossip.election] waitForInterrupt -> DEBU 37e6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:36.955 UTC [msp] DeserializeIdentity -> DEBU 37e7 Obtaining identity" -"2019-05-02 01:31:36.955 UTC [msp] DeserializeIdentity -> DEBU 37e8 Obtaining identity" -"2019-05-02 01:31:36.956 UTC [msp] DeserializeIdentity -> DEBU 37e9 Obtaining identity" -"2019-05-02 01:31:36.956 UTC [msp] DeserializeIdentity -> DEBU 37ea Obtaining identity" -"2019-05-02 01:31:36.958 UTC [gossip.comm] Send -> DEBU 37eb Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:36.959 UTC [msp] DeserializeIdentity -> DEBU 37ec Obtaining identity" -"2019-05-02 01:31:36.959 UTC [msp] DeserializeIdentity -> DEBU 37ed Obtaining identity" -"2019-05-02 01:31:36.963 UTC [gossip.comm] sendToEndpoint -> DEBU 37ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -"2019-05-02 01:31:36.963 UTC [gossip.comm] sendToEndpoint -> DEBU 37ef Exiting" -"2019-05-02 01:31:37.063 UTC [gossip.comm] func1 -> DEBU 37f0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760695275830100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:37.063 UTC [gossip.gossip] handleMessage -> DEBU 37f1 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641122728800 seq_num:1556760695275830100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:37.064 UTC [msp.identity] Verify -> DEBU 37f2 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:37.064 UTC [msp.identity] Verify -> DEBU 37f3 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:37.065 UTC [msp] DeserializeIdentity -> DEBU 37f4 Obtaining identity" -"2019-05-02 01:31:37.065 UTC [gossip.gossip] handleMessage -> DEBU 37f5 Exiting" -"2019-05-02 01:31:37.274 UTC [gossip.comm] func1 -> DEBU 37f6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.275 UTC [gossip.gossip] handleMessage -> DEBU 37f7 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.276 UTC [msp] DeserializeIdentity -> DEBU 37f8 Obtaining identity" -"2019-05-02 01:31:37.276 UTC [msp] DeserializeIdentity -> DEBU 37f9 Obtaining identity" -"2019-05-02 01:31:37.277 UTC [msp] DeserializeIdentity -> DEBU 37fa Obtaining identity" -"2019-05-02 01:31:37.277 UTC [gossip.gossip] handleMessage -> DEBU 37fb Exiting" -"2019-05-02 01:31:37.283 UTC [gossip.comm] func1 -> DEBU 37fc Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760695394641900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:37.285 UTC [gossip.gossip] handleMessage -> DEBU 37fd Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760695394641900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:37.286 UTC [msp] DeserializeIdentity -> DEBU 37fe Obtaining identity" -"2019-05-02 01:31:37.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37ff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:37.287 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3800 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:37.287 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3801 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:37.288 UTC [policies] Evaluate -> DEBU 3802 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:37.288 UTC [policies] Evaluate -> DEBU 3803 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.289 UTC [policies] Evaluate -> DEBU 3804 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:37.289 UTC [cauthdsl] func1 -> DEBU 3805 0xc00464b7f0 gate 1556760697289528500 evaluation starts" -"2019-05-02 01:31:37.290 UTC [cauthdsl] func2 -> DEBU 3806 0xc00464b7f0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.290 UTC [cauthdsl] func2 -> DEBU 3807 0xc00464b7f0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:37.290 UTC [cauthdsl] func2 -> DEBU 3808 0xc00464b7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:37.291 UTC [cauthdsl] func2 -> DEBU 3809 0xc00464b7f0 principal evaluation fails" -"2019-05-02 01:31:37.293 UTC [cauthdsl] func1 -> DEBU 380a 0xc00464b7f0 gate 1556760697289528500 evaluation fails" -"2019-05-02 01:31:37.293 UTC [policies] Evaluate -> DEBU 380b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:37.293 UTC [policies] Evaluate -> DEBU 380c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:37.294 UTC [policies] Evaluate -> DEBU 380d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:37.294 UTC [cauthdsl] func1 -> DEBU 380e 0xc00465c030 gate 1556760697294595300 evaluation starts" -"2019-05-02 01:31:37.294 UTC [cauthdsl] func2 -> DEBU 380f 0xc00465c030 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.295 UTC [cauthdsl] func2 -> DEBU 3810 0xc00465c030 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:37.295 UTC [cauthdsl] func2 -> DEBU 3811 0xc00465c030 principal matched by identity 0" -"2019-05-02 01:31:37.296 UTC [msp.identity] Verify -> DEBU 3812 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:37.296 UTC [msp.identity] Verify -> DEBU 3813 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:37.297 UTC [gossip.comm] func1 -> DEBU 3814 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760695394641900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:37.297 UTC [cauthdsl] func2 -> DEBU 3815 0xc00465c030 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:37.297 UTC [cauthdsl] func1 -> DEBU 3816 0xc00465c030 gate 1556760697294595300 evaluation succeeds" -"2019-05-02 01:31:37.301 UTC [policies] Evaluate -> DEBU 3817 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:37.301 UTC [policies] Evaluate -> DEBU 3818 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:37.301 UTC [policies] Evaluate -> DEBU 3819 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:37.302 UTC [policies] Evaluate -> DEBU 381a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:37.302 UTC [msp] DeserializeIdentity -> DEBU 381b Obtaining identity" -"2019-05-02 01:31:37.302 UTC [gossip.gossip] handleMessage -> DEBU 381c Exiting" -"2019-05-02 01:31:37.302 UTC [gossip.gossip] handleMessage -> DEBU 381d Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641348616700 seq_num:1556760695394641900 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:37.303 UTC [msp] DeserializeIdentity -> DEBU 381e Obtaining identity" -"2019-05-02 01:31:37.303 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 381f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:37.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3820 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:37.303 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3821 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:37.304 UTC [policies] Evaluate -> DEBU 3822 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:37.304 UTC [policies] Evaluate -> DEBU 3823 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.304 UTC [policies] Evaluate -> DEBU 3824 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:37.304 UTC [cauthdsl] func1 -> DEBU 3825 0xc00465da40 gate 1556760697304659800 evaluation starts" -"2019-05-02 01:31:37.304 UTC [cauthdsl] func2 -> DEBU 3826 0xc00465da40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.305 UTC [cauthdsl] func2 -> DEBU 3827 0xc00465da40 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:37.305 UTC [cauthdsl] func2 -> DEBU 3828 0xc00465da40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:37.305 UTC [cauthdsl] func2 -> DEBU 3829 0xc00465da40 principal evaluation fails" -"2019-05-02 01:31:37.305 UTC [cauthdsl] func1 -> DEBU 382a 0xc00465da40 gate 1556760697304659800 evaluation fails" -"2019-05-02 01:31:37.308 UTC [policies] Evaluate -> DEBU 382b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:37.308 UTC [policies] Evaluate -> DEBU 382c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:37.309 UTC [policies] Evaluate -> DEBU 382d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:37.309 UTC [cauthdsl] func1 -> DEBU 382e 0xc004670280 gate 1556760697309519400 evaluation starts" -"2019-05-02 01:31:37.309 UTC [cauthdsl] func2 -> DEBU 382f 0xc004670280 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.310 UTC [cauthdsl] func2 -> DEBU 3830 0xc004670280 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:37.310 UTC [cauthdsl] func2 -> DEBU 3831 0xc004670280 principal matched by identity 0" -"2019-05-02 01:31:37.310 UTC [msp.identity] Verify -> DEBU 3832 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:37.310 UTC [msp.identity] Verify -> DEBU 3833 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:37.311 UTC [cauthdsl] func2 -> DEBU 3834 0xc004670280 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:37.311 UTC [cauthdsl] func1 -> DEBU 3835 0xc004670280 gate 1556760697309519400 evaluation succeeds" -"2019-05-02 01:31:37.311 UTC [policies] Evaluate -> DEBU 3836 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:37.312 UTC [policies] Evaluate -> DEBU 3837 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:37.312 UTC [policies] Evaluate -> DEBU 3838 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:37.312 UTC [policies] Evaluate -> DEBU 3839 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:37.312 UTC [msp] DeserializeIdentity -> DEBU 383a Obtaining identity" -"2019-05-02 01:31:37.315 UTC [gossip.gossip] handleMessage -> DEBU 383b Exiting" -"2019-05-02 01:31:37.496 UTC [gossip.comm] func1 -> DEBU 383c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.497 UTC [gossip.gossip] handleMessage -> DEBU 383d Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.497 UTC [gossip.pull] HandleMessage -> DEBU 383e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.497 UTC [msp] DeserializeIdentity -> DEBU 383f Obtaining identity" -"2019-05-02 01:31:37.497 UTC [msp] DeserializeIdentity -> DEBU 3840 Obtaining identity" -"2019-05-02 01:31:37.497 UTC [msp] DeserializeIdentity -> DEBU 3841 Obtaining identity" -"2019-05-02 01:31:37.497 UTC [msp] DeserializeIdentity -> DEBU 3842 Obtaining identity" -"2019-05-02 01:31:37.498 UTC [msp] DeserializeIdentity -> DEBU 3843 Obtaining identity" -"2019-05-02 01:31:37.498 UTC [msp] DeserializeIdentity -> DEBU 3844 Obtaining identity" -"2019-05-02 01:31:37.498 UTC [gossip.pull] SendDigest -> DEBU 3845 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:37.498 UTC [gossip.gossip] handleMessage -> DEBU 3846 Exiting" -"2019-05-02 01:31:37.521 UTC [gossip.comm] func1 -> DEBU 3847 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.522 UTC [gossip.gossip] handleMessage -> DEBU 3848 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.522 UTC [gossip.gossip] handleMessage -> DEBU 3849 Exiting" -"2019-05-02 01:31:37.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.522 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 384b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:37.522 UTC [msp] DeserializeIdentity -> DEBU 384c Obtaining identity" -"2019-05-02 01:31:37.522 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 384d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 384e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 384f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 3850 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 3851 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 3852 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:37.523 UTC [cauthdsl] func1 -> DEBU 3853 0xc00468ee70 gate 1556760697523340900 evaluation starts" -"2019-05-02 01:31:37.523 UTC [cauthdsl] func2 -> DEBU 3854 0xc00468ee70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.523 UTC [cauthdsl] func2 -> DEBU 3855 0xc00468ee70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:37.523 UTC [cauthdsl] func2 -> DEBU 3856 0xc00468ee70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:37.523 UTC [cauthdsl] func2 -> DEBU 3857 0xc00468ee70 principal evaluation fails" -"2019-05-02 01:31:37.523 UTC [cauthdsl] func1 -> DEBU 3858 0xc00468ee70 gate 1556760697523340900 evaluation fails" -"2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 3859 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 385a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:37.523 UTC [policies] Evaluate -> DEBU 385b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:37.523 UTC [cauthdsl] func1 -> DEBU 385c 0xc00468f6b0 gate 1556760697523938600 evaluation starts" -"2019-05-02 01:31:37.524 UTC [cauthdsl] func2 -> DEBU 385d 0xc00468f6b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.524 UTC [cauthdsl] func2 -> DEBU 385e 0xc00468f6b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:37.524 UTC [cauthdsl] func2 -> DEBU 385f 0xc00468f6b0 principal matched by identity 0" -"2019-05-02 01:31:37.524 UTC [msp.identity] Verify -> DEBU 3860 Verify: digest = 00000000 6d 36 55 e9 25 c0 f2 00 9b db 34 e9 ce 3b c3 47 |m6U.%.....4..;.G| -00000010 6d 0f d5 4f da 69 77 1c 64 79 1e a0 b6 0d 4d c4 |m..O.iw.dy....M.|" -"2019-05-02 01:31:37.524 UTC [msp.identity] Verify -> DEBU 3861 Verify: sig = 00000000 30 45 02 21 00 a8 6c fc 99 d9 a7 78 b4 a9 c8 ab |0E.!..l....x....| -00000010 83 62 f1 6c 3f bf 8b 46 44 23 fe 8b 2d b6 bb ea |.b.l?..FD#..-...| -00000020 5b a5 2b 36 ca 02 20 2d 6f 0e 43 ac d8 e0 63 4b |[.+6.. -o.C...cK| -00000030 2e 99 9a c9 48 0d a0 d1 88 22 30 c9 8d 7d db 94 |....H...."0..}..| -00000040 cd 42 ef 95 65 df dc |.B..e..|" -"2019-05-02 01:31:37.524 UTC [cauthdsl] func2 -> DEBU 3862 0xc00468f6b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:37.524 UTC [cauthdsl] func1 -> DEBU 3863 0xc00468f6b0 gate 1556760697523938600 evaluation succeeds" -"2019-05-02 01:31:37.524 UTC [policies] Evaluate -> DEBU 3864 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:37.524 UTC [policies] Evaluate -> DEBU 3865 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:37.524 UTC [policies] Evaluate -> DEBU 3866 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:37.524 UTC [policies] Evaluate -> DEBU 3867 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:37.525 UTC [gossip.discovery] handleAliveMessage -> DEBU 3868 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:37.525 UTC [gossip.discovery] learnExistingMembers -> DEBU 3869 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:37.525 UTC [gossip.discovery] learnExistingMembers -> DEBU 386a updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 " -"2019-05-02 01:31:37.525 UTC [gossip.discovery] learnExistingMembers -> DEBU 386b Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 " -"2019-05-02 01:31:37.525 UTC [gossip.discovery] learnExistingMembers -> DEBU 386c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:37.525 UTC [gossip.discovery] learnExistingMembers -> DEBU 386d Exiting" -"2019-05-02 01:31:37.525 UTC [gossip.discovery] handleAliveMessage -> DEBU 386e Exiting" -"2019-05-02 01:31:37.525 UTC [gossip.discovery] handleMsgFromComm -> DEBU 386f Exiting" -"2019-05-02 01:31:37.525 UTC [gossip.discovery] sendMemResponse -> DEBU 3870 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:37.525 UTC [msp] DeserializeIdentity -> DEBU 3871 Obtaining identity" -"2019-05-02 01:31:37.526 UTC [msp] DeserializeIdentity -> DEBU 3872 Obtaining identity" -"2019-05-02 01:31:37.526 UTC [msp] DeserializeIdentity -> DEBU 3873 Obtaining identity" -"2019-05-02 01:31:37.526 UTC [gossip.comm] Send -> DEBU 3874 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:37.526 UTC [gossip.discovery] sendMemResponse -> DEBU 3875 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:37.526 UTC [gossip.comm] sendToEndpoint -> DEBU 3876 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.526 UTC [gossip.comm] sendToEndpoint -> DEBU 3877 Exiting" -"2019-05-02 01:31:37.537 UTC [gossip.comm] func1 -> DEBU 3878 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.537 UTC [gossip.gossip] handleMessage -> DEBU 3879 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.538 UTC [msp] DeserializeIdentity -> DEBU 387a Obtaining identity" -"2019-05-02 01:31:37.538 UTC [msp] DeserializeIdentity -> DEBU 387b Obtaining identity" -"2019-05-02 01:31:37.538 UTC [msp] DeserializeIdentity -> DEBU 387c Obtaining identity" -"2019-05-02 01:31:37.538 UTC [gossip.gossip] handleMessage -> DEBU 387d Exiting" -"2019-05-02 01:31:37.549 UTC [gossip.comm] func1 -> DEBU 387e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760695462313000 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:37.549 UTC [gossip.gossip] handleMessage -> DEBU 387f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556760641610467300 seq_num:1556760695462313000 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" -"2019-05-02 01:31:37.549 UTC [msp] DeserializeIdentity -> DEBU 3880 Obtaining identity" -"2019-05-02 01:31:37.549 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3881 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:37.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3882 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:37.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3883 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:37.549 UTC [policies] Evaluate -> DEBU 3884 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:37.550 UTC [policies] Evaluate -> DEBU 3885 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.550 UTC [policies] Evaluate -> DEBU 3886 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:37.550 UTC [cauthdsl] func1 -> DEBU 3887 0xc0046ba8e0 gate 1556760697550175900 evaluation starts" -"2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 3888 0xc0046ba8e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 3889 0xc0046ba8e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 388a 0xc0046ba8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 388b 0xc0046ba8e0 principal evaluation fails" -"2019-05-02 01:31:37.550 UTC [cauthdsl] func1 -> DEBU 388c 0xc0046ba8e0 gate 1556760697550175900 evaluation fails" -"2019-05-02 01:31:37.550 UTC [policies] Evaluate -> DEBU 388d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:37.550 UTC [policies] Evaluate -> DEBU 388e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:37.550 UTC [policies] Evaluate -> DEBU 388f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:37.550 UTC [cauthdsl] func1 -> DEBU 3890 0xc0046bb120 gate 1556760697550772700 evaluation starts" -"2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 3891 0xc0046bb120 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 3892 0xc0046bb120 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:37.550 UTC [cauthdsl] func2 -> DEBU 3893 0xc0046bb120 principal matched by identity 0" -"2019-05-02 01:31:37.551 UTC [msp.identity] Verify -> DEBU 3894 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:37.551 UTC [msp.identity] Verify -> DEBU 3895 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:37.551 UTC [cauthdsl] func2 -> DEBU 3896 0xc0046bb120 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:37.551 UTC [cauthdsl] func1 -> DEBU 3897 0xc0046bb120 gate 1556760697550772700 evaluation succeeds" -"2019-05-02 01:31:37.551 UTC [policies] Evaluate -> DEBU 3898 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:37.551 UTC [policies] Evaluate -> DEBU 3899 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:37.551 UTC [policies] Evaluate -> DEBU 389a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:37.551 UTC [policies] Evaluate -> DEBU 389b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:37.551 UTC [msp] DeserializeIdentity -> DEBU 389c Obtaining identity" -"2019-05-02 01:31:37.551 UTC [gossip.gossip] handleMessage -> DEBU 389d Exiting" -"2019-05-02 01:31:37.710 UTC [gossip.comm] func1 -> DEBU 389e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.711 UTC [gossip.gossip] handleMessage -> DEBU 389f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.711 UTC [gossip.pull] HandleMessage -> DEBU 38a0 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.711 UTC [msp] DeserializeIdentity -> DEBU 38a1 Obtaining identity" -"2019-05-02 01:31:37.711 UTC [msp] DeserializeIdentity -> DEBU 38a2 Obtaining identity" -"2019-05-02 01:31:37.712 UTC [msp] DeserializeIdentity -> DEBU 38a3 Obtaining identity" -"2019-05-02 01:31:37.712 UTC [msp] DeserializeIdentity -> DEBU 38a4 Obtaining identity" -"2019-05-02 01:31:37.712 UTC [msp] DeserializeIdentity -> DEBU 38a5 Obtaining identity" -"2019-05-02 01:31:37.713 UTC [msp] DeserializeIdentity -> DEBU 38a6 Obtaining identity" -"2019-05-02 01:31:37.713 UTC [gossip.pull] SendDigest -> DEBU 38a7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:37.713 UTC [gossip.gossip] handleMessage -> DEBU 38a8 Exiting" -"2019-05-02 01:31:37.809 UTC [gossip.pull] Hello -> DEBU 38a9 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:37.810 UTC [gossip.comm] Send -> DEBU 38aa Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:37.811 UTC [gossip.pull] Hello -> DEBU 38ab Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:37.811 UTC [gossip.comm] sendToEndpoint -> DEBU 38ac Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.812 UTC [gossip.comm] Send -> DEBU 38ad Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:37.814 UTC [gossip.pull] Hello -> DEBU 38ae Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:37.815 UTC [gossip.comm] Send -> DEBU 38b0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:37.816 UTC [gossip.comm] sendToEndpoint -> DEBU 38b2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.814 UTC [gossip.comm] sendToEndpoint -> DEBU 38af Exiting" -"2019-05-02 01:31:37.816 UTC [gossip.comm] func1 -> DEBU 38b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10132650898837163274 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.817 UTC [gossip.comm] sendToEndpoint -> DEBU 38b3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.817 UTC [gossip.comm] sendToEndpoint -> DEBU 38b4 Exiting" -"2019-05-02 01:31:37.821 UTC [gossip.gossip] handleMessage -> DEBU 38b5 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10132650898837163274 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.822 UTC [gossip.pull] HandleMessage -> DEBU 38b8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10132650898837163274 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.822 UTC [gossip.comm] sendToEndpoint -> DEBU 38b7 Exiting" -"2019-05-02 01:31:37.822 UTC [gossip.comm] func1 -> DEBU 38b6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13601322340241378240 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.826 UTC [gossip.comm] func1 -> DEBU 38b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14678095156928737736 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.823 UTC [gossip.gossip] handleMessage -> DEBU 38ba Exiting" -"2019-05-02 01:31:37.828 UTC [gossip.gossip] handleMessage -> DEBU 38bb Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13601322340241378240 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.828 UTC [gossip.pull] HandleMessage -> DEBU 38bc GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13601322340241378240 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.829 UTC [gossip.gossip] handleMessage -> DEBU 38bd Exiting" -"2019-05-02 01:31:37.830 UTC [gossip.gossip] handleMessage -> DEBU 38be Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14678095156928737736 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.830 UTC [gossip.pull] HandleMessage -> DEBU 38bf GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14678095156928737736 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.831 UTC [gossip.gossip] handleMessage -> DEBU 38c0 Exiting" -"2019-05-02 01:31:37.869 UTC [gossip.comm] func1 -> DEBU 38c1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.869 UTC [gossip.gossip] handleMessage -> DEBU 38c2 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.869 UTC [gossip.gossip] handleMessage -> DEBU 38c3 Exiting" -"2019-05-02 01:31:37.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38c4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.870 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38c5 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:37.870 UTC [msp] DeserializeIdentity -> DEBU 38c6 Obtaining identity" -"2019-05-02 01:31:37.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:37.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38c8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:37.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38c9 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:37.871 UTC [policies] Evaluate -> DEBU 38ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:37.871 UTC [policies] Evaluate -> DEBU 38cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:37.872 UTC [policies] Evaluate -> DEBU 38cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:37.872 UTC [cauthdsl] func1 -> DEBU 38cd 0xc0046f3320 gate 1556760697872373300 evaluation starts" -"2019-05-02 01:31:37.872 UTC [cauthdsl] func2 -> DEBU 38ce 0xc0046f3320 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.872 UTC [cauthdsl] func2 -> DEBU 38cf 0xc0046f3320 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:37.873 UTC [cauthdsl] func2 -> DEBU 38d0 0xc0046f3320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:37.873 UTC [cauthdsl] func2 -> DEBU 38d1 0xc0046f3320 principal evaluation fails" -"2019-05-02 01:31:37.873 UTC [cauthdsl] func1 -> DEBU 38d2 0xc0046f3320 gate 1556760697872373300 evaluation fails" -"2019-05-02 01:31:37.873 UTC [policies] Evaluate -> DEBU 38d3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:37.873 UTC [policies] Evaluate -> DEBU 38d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:37.873 UTC [policies] Evaluate -> DEBU 38d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:37.874 UTC [cauthdsl] func1 -> DEBU 38d6 0xc0046f3b60 gate 1556760697873899100 evaluation starts" -"2019-05-02 01:31:37.874 UTC [cauthdsl] func2 -> DEBU 38d7 0xc0046f3b60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:37.874 UTC [cauthdsl] func2 -> DEBU 38d8 0xc0046f3b60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:37.874 UTC [cauthdsl] func2 -> DEBU 38d9 0xc0046f3b60 principal matched by identity 0" -"2019-05-02 01:31:37.874 UTC [msp.identity] Verify -> DEBU 38da Verify: digest = 00000000 b4 6f 32 22 86 df bd 85 51 49 81 8f c3 24 f4 6f |.o2"....QI...$.o| -00000010 cb 57 58 e5 56 67 d2 c6 67 eb 16 af 58 99 81 95 |.WX.Vg..g...X...|" -"2019-05-02 01:31:37.875 UTC [msp.identity] Verify -> DEBU 38db Verify: sig = 00000000 30 45 02 21 00 97 72 c0 95 97 1a 04 d7 83 92 e8 |0E.!..r.........| -00000010 dc 89 31 a4 64 c3 d0 d1 b0 ed 37 d5 26 3b d9 2a |..1.d.....7.&;.*| -00000020 27 3c 0e 66 b9 02 20 34 93 1c d8 0c 21 5a 97 de |'<.f.. 4....!Z..| -00000030 59 e0 bd 37 fc 65 35 ee 3f 39 70 b2 84 db 29 7a |Y..7.e5.?9p...)z| -00000040 3c 24 80 d5 e3 c7 cd |<$.....|" -"2019-05-02 01:31:37.876 UTC [cauthdsl] func2 -> DEBU 38dc 0xc0046f3b60 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:37.876 UTC [cauthdsl] func1 -> DEBU 38dd 0xc0046f3b60 gate 1556760697873899100 evaluation succeeds" -"2019-05-02 01:31:37.877 UTC [policies] Evaluate -> DEBU 38de Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:37.877 UTC [policies] Evaluate -> DEBU 38df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:37.878 UTC [policies] Evaluate -> DEBU 38e0 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:37.878 UTC [policies] Evaluate -> DEBU 38e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:37.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:37.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:37.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e4 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 " -"2019-05-02 01:31:37.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 " -"2019-05-02 01:31:37.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:37.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e7 Exiting" -"2019-05-02 01:31:37.883 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e8 Exiting" -"2019-05-02 01:31:37.884 UTC [gossip.discovery] sendMemResponse -> DEBU 38e9 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:37.884 UTC [msp] DeserializeIdentity -> DEBU 38ea Obtaining identity" -"2019-05-02 01:31:37.886 UTC [msp] DeserializeIdentity -> DEBU 38eb Obtaining identity" -"2019-05-02 01:31:37.886 UTC [msp] DeserializeIdentity -> DEBU 38ec Obtaining identity" -"2019-05-02 01:31:37.886 UTC [gossip.comm] Send -> DEBU 38ed Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:37.886 UTC [gossip.discovery] sendMemResponse -> DEBU 38ee Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:37.887 UTC [gossip.comm] sendToEndpoint -> DEBU 38ef Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:37.887 UTC [gossip.comm] sendToEndpoint -> DEBU 38f0 Exiting" -"2019-05-02 01:31:37.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f1 Exiting" -"2019-05-02 01:31:38.152 UTC [msp.identity] Sign -> DEBU 38f2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102B " -"2019-05-02 01:31:38.153 UTC [msp.identity] Sign -> DEBU 38f3 Sign: digest: AC143EE0F1959E3732B56563E199CCAA993DDEDEB1F691E1309C3A14F45B68BF " -"2019-05-02 01:31:38.153 UTC [msp.identity] Sign -> DEBU 38f4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:38.153 UTC [msp.identity] Sign -> DEBU 38f5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:38.153 UTC [msp] DeserializeIdentity -> DEBU 38f6 Obtaining identity" -"2019-05-02 01:31:38.154 UTC [gossip.comm] Send -> DEBU 38f7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:38.154 UTC [msp] DeserializeIdentity -> DEBU 38f8 Obtaining identity" -"2019-05-02 01:31:38.154 UTC [gossip.comm] Send -> DEBU 38f9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:38.155 UTC [gossip.comm] Send -> DEBU 38fa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:38.156 UTC [gossip.comm] sendToEndpoint -> DEBU 38fb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.156 UTC [gossip.comm] sendToEndpoint -> DEBU 38fc Exiting" -"2019-05-02 01:31:38.158 UTC [gossip.comm] sendToEndpoint -> DEBU 38fd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.158 UTC [gossip.comm] sendToEndpoint -> DEBU 38fe Exiting" -"2019-05-02 01:31:38.158 UTC [gossip.comm] sendToEndpoint -> DEBU 38ff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3900 Exiting" -"2019-05-02 01:31:38.167 UTC [gossip.comm] func1 -> DEBU 3901 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.167 UTC [gossip.gossip] handleMessage -> DEBU 3902 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.167 UTC [gossip.gossip] handleMessage -> DEBU 3903 Exiting" -"2019-05-02 01:31:38.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3904 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.168 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3905 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:38.168 UTC [msp] DeserializeIdentity -> DEBU 3906 Obtaining identity" -"2019-05-02 01:31:38.169 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3907 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:38.169 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3908 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:38.169 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3909 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:38.169 UTC [policies] Evaluate -> DEBU 390a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:38.170 UTC [policies] Evaluate -> DEBU 390b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.170 UTC [policies] Evaluate -> DEBU 390c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:38.170 UTC [cauthdsl] func1 -> DEBU 390d 0xc004748160 gate 1556760698170470900 evaluation starts" -"2019-05-02 01:31:38.170 UTC [cauthdsl] func2 -> DEBU 390e 0xc004748160 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.172 UTC [cauthdsl] func2 -> DEBU 3911 0xc004748160 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:38.173 UTC [cauthdsl] func2 -> DEBU 3912 0xc004748160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:38.173 UTC [cauthdsl] func2 -> DEBU 3913 0xc004748160 principal evaluation fails" -"2019-05-02 01:31:38.174 UTC [cauthdsl] func1 -> DEBU 3914 0xc004748160 gate 1556760698170470900 evaluation fails" -"2019-05-02 01:31:38.175 UTC [policies] Evaluate -> DEBU 3915 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:38.175 UTC [policies] Evaluate -> DEBU 3916 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:38.176 UTC [policies] Evaluate -> DEBU 3917 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:38.176 UTC [cauthdsl] func1 -> DEBU 3918 0xc0046d2130 gate 1556760698176180000 evaluation starts" -"2019-05-02 01:31:38.176 UTC [cauthdsl] func2 -> DEBU 3919 0xc0046d2130 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.176 UTC [cauthdsl] func2 -> DEBU 391a 0xc0046d2130 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:38.176 UTC [cauthdsl] func2 -> DEBU 391b 0xc0046d2130 principal matched by identity 0" -"2019-05-02 01:31:38.176 UTC [msp.identity] Verify -> DEBU 391c Verify: digest = 00000000 6d 36 55 e9 25 c0 f2 00 9b db 34 e9 ce 3b c3 47 |m6U.%.....4..;.G| -00000010 6d 0f d5 4f da 69 77 1c 64 79 1e a0 b6 0d 4d c4 |m..O.iw.dy....M.|" -"2019-05-02 01:31:38.176 UTC [msp.identity] Verify -> DEBU 391d Verify: sig = 00000000 30 45 02 21 00 a8 6c fc 99 d9 a7 78 b4 a9 c8 ab |0E.!..l....x....| -00000010 83 62 f1 6c 3f bf 8b 46 44 23 fe 8b 2d b6 bb ea |.b.l?..FD#..-...| -00000020 5b a5 2b 36 ca 02 20 2d 6f 0e 43 ac d8 e0 63 4b |[.+6.. -o.C...cK| -00000030 2e 99 9a c9 48 0d a0 d1 88 22 30 c9 8d 7d db 94 |....H...."0..}..| -00000040 cd 42 ef 95 65 df dc |.B..e..|" -"2019-05-02 01:31:38.177 UTC [cauthdsl] func2 -> DEBU 391e 0xc0046d2130 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:38.177 UTC [cauthdsl] func1 -> DEBU 391f 0xc0046d2130 gate 1556760698176180000 evaluation succeeds" -"2019-05-02 01:31:38.177 UTC [policies] Evaluate -> DEBU 3920 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:38.177 UTC [policies] Evaluate -> DEBU 3921 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:38.178 UTC [policies] Evaluate -> DEBU 3922 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:38.171 UTC [gossip.comm] func1 -> DEBU 390f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.179 UTC [gossip.gossip] handleMessage -> DEBU 3924 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.171 UTC [gossip.comm] func1 -> DEBU 3910 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.179 UTC [policies] Evaluate -> DEBU 3923 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:38.180 UTC [gossip.discovery] handleAliveMessage -> DEBU 3925 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.180 UTC [gossip.discovery] handleAliveMessage -> DEBU 3926 Exiting" -"2019-05-02 01:31:38.181 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3927 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:38.181 UTC [msp.identity] Verify -> DEBU 3928 Verify: digest = 00000000 ac 14 3e e0 f1 95 9e 37 32 b5 65 63 e1 99 cc aa |..>....72.ec....| -00000010 99 3d de de b1 f6 91 e1 30 9c 3a 14 f4 5b 68 bf |.=......0.:..[h.|" -"2019-05-02 01:31:38.182 UTC [msp.identity] Verify -> DEBU 3929 Verify: sig = 00000000 30 44 02 20 17 2a e5 b5 5f d2 6b 2f cc 0f 67 a8 |0D. .*.._.k/..g.| -00000010 d4 bf e5 03 2b cc db 41 94 50 0c b9 f2 d5 0c 98 |....+..A.P......| -00000020 36 e8 93 27 02 20 7f d2 8a 80 22 e5 85 aa cf 21 |6..'. ...."....!| -00000030 ff dc 3e 35 1b bc d4 1e 54 69 dd 4e c0 ae e8 ba |..>5....Ti.N....| -00000040 ff 5d 1a 59 c9 36 |.].Y.6|" -"2019-05-02 01:31:38.182 UTC [gossip.discovery] handleAliveMessage -> DEBU 392a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.182 UTC [gossip.discovery] isSentByMe -> DEBU 392b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 392c Exiting" -"2019-05-02 01:31:38.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 392d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:38.183 UTC [msp.identity] Verify -> DEBU 392e Verify: digest = 00000000 58 c5 74 76 73 6c 98 d5 f9 fa c4 e3 d8 12 bb c5 |X.tvsl..........| -00000010 e1 c7 48 63 21 6c 67 2c 60 5c f2 5e 4f 2f e1 c1 |..Hc!lg,`\.^O/..|" -"2019-05-02 01:31:38.183 UTC [msp.identity] Verify -> DEBU 392f Verify: sig = 00000000 30 45 02 21 00 ec 59 c0 69 dc 6e f8 05 3a b5 2e |0E.!..Y.i.n..:..| -00000010 1f c6 9f 71 ff 5b f7 81 7f 5e de 39 bf 65 40 f0 |...q.[...^.9.e@.| -00000020 6a 97 40 b5 dc 02 20 01 31 5c a3 a0 33 f4 a2 38 |j.@... .1\..3..8| -00000030 40 bd a1 4d 32 00 b3 47 8f 96 c6 6f 43 b7 f4 37 |@..M2..G...oC..7| -00000040 47 dc 2c ac 51 b9 6b |G.,.Q.k|" -"2019-05-02 01:31:38.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 3930 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3931 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:38.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3932 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:49 " -"2019-05-02 01:31:38.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3933 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:49 " -"2019-05-02 01:31:38.184 UTC [gossip.discovery] learnExistingMembers -> DEBU 3934 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:38.184 UTC [gossip.discovery] learnExistingMembers -> DEBU 3935 Exiting" -"2019-05-02 01:31:38.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 3936 Exiting" -"2019-05-02 01:31:38.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3937 Exiting" -"2019-05-02 01:31:38.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3938 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.184 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3939 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:38.184 UTC [msp.identity] Verify -> DEBU 393a Verify: digest = 00000000 ac 14 3e e0 f1 95 9e 37 32 b5 65 63 e1 99 cc aa |..>....72.ec....| -00000010 99 3d de de b1 f6 91 e1 30 9c 3a 14 f4 5b 68 bf |.=......0.:..[h.|" -"2019-05-02 01:31:38.184 UTC [msp.identity] Verify -> DEBU 393b Verify: sig = 00000000 30 44 02 20 17 2a e5 b5 5f d2 6b 2f cc 0f 67 a8 |0D. .*.._.k/..g.| -00000010 d4 bf e5 03 2b cc db 41 94 50 0c b9 f2 d5 0c 98 |....+..A.P......| -00000020 36 e8 93 27 02 20 7f d2 8a 80 22 e5 85 aa cf 21 |6..'. ...."....!| -00000030 ff dc 3e 35 1b bc d4 1e 54 69 dd 4e c0 ae e8 ba |..>5....Ti.N....| -00000040 ff 5d 1a 59 c9 36 |.].Y.6|" -"2019-05-02 01:31:38.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 393c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.184 UTC [gossip.discovery] isSentByMe -> DEBU 393d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 393e Exiting" -"2019-05-02 01:31:38.184 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 393f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:38.184 UTC [msp.identity] Verify -> DEBU 3940 Verify: digest = 00000000 65 b3 a2 c8 ff 0b bd d1 f8 b2 40 8d 2e d5 fb 12 |e.........@.....| -00000010 16 0a 22 1c e0 38 36 67 4a f1 26 f3 0e 73 9c d1 |.."..86gJ.&..s..|" -"2019-05-02 01:31:38.184 UTC [msp.identity] Verify -> DEBU 3941 Verify: sig = 00000000 30 45 02 21 00 fb d5 8b 10 b0 47 52 48 d2 81 13 |0E.!......GRH...| -00000010 f7 83 3c d7 3b 33 a8 ee 6d ae 58 4b 56 35 11 ad |..<.;3..m.XKV5..| -00000020 01 af 8a 88 a1 02 20 48 64 6e 90 f5 06 94 67 b6 |...... Hdn....g.| -00000030 b4 cc 4e 52 66 8b 3a 9c fa 17 b4 20 7a 0e 04 50 |..NRf.:.... z..P| -00000040 72 27 19 d4 4c e4 67 |r'..L.g|" -"2019-05-02 01:31:38.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 3942 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 3943 got old alive message about alive peer Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 lastAliveTS: 1556760633448248700, 49 but got ts: inc_num:1556760633448248700 seq_num:41 " -"2019-05-02 01:31:38.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 3944 Exiting" -"2019-05-02 01:31:38.185 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3945 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:38.185 UTC [msp] DeserializeIdentity -> DEBU 3946 Obtaining identity" -"2019-05-02 01:31:38.185 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3947 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:38.185 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3948 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:38.185 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3949 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:38.185 UTC [policies] Evaluate -> DEBU 394a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:38.185 UTC [policies] Evaluate -> DEBU 394b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.185 UTC [policies] Evaluate -> DEBU 394c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:38.185 UTC [cauthdsl] func1 -> DEBU 394d 0xc003fc5420 gate 1556760698185956000 evaluation starts" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 394e 0xc003fc5420 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 394f 0xc003fc5420 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 3950 0xc003fc5420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 3951 0xc003fc5420 principal evaluation fails" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func1 -> DEBU 3952 0xc003fc5420 gate 1556760698185956000 evaluation fails" -"2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 3953 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 3954 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 3955 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func1 -> DEBU 3956 0xc003fc5c60 gate 1556760698186298800 evaluation starts" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 3957 0xc003fc5c60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 3958 0xc003fc5c60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 3959 0xc003fc5c60 principal matched by identity 0" -"2019-05-02 01:31:38.186 UTC [msp.identity] Verify -> DEBU 395a Verify: digest = 00000000 b4 6f 32 22 86 df bd 85 51 49 81 8f c3 24 f4 6f |.o2"....QI...$.o| -00000010 cb 57 58 e5 56 67 d2 c6 67 eb 16 af 58 99 81 95 |.WX.Vg..g...X...|" -"2019-05-02 01:31:38.186 UTC [msp.identity] Verify -> DEBU 395b Verify: sig = 00000000 30 45 02 21 00 97 72 c0 95 97 1a 04 d7 83 92 e8 |0E.!..r.........| -00000010 dc 89 31 a4 64 c3 d0 d1 b0 ed 37 d5 26 3b d9 2a |..1.d.....7.&;.*| -00000020 27 3c 0e 66 b9 02 20 34 93 1c d8 0c 21 5a 97 de |'<.f.. 4....!Z..| -00000030 59 e0 bd 37 fc 65 35 ee 3f 39 70 b2 84 db 29 7a |Y..7.e5.?9p...)z| -00000040 3c 24 80 d5 e3 c7 cd |<$.....|" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func2 -> DEBU 395c 0xc003fc5c60 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:38.186 UTC [cauthdsl] func1 -> DEBU 395d 0xc003fc5c60 gate 1556760698186298800 evaluation succeeds" -"2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 395e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 395f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 3960 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:38.186 UTC [policies] Evaluate -> DEBU 3961 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:38.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 3962 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 3963 Exiting" -"2019-05-02 01:31:38.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3964 Exiting" -"2019-05-02 01:31:38.186 UTC [gossip.gossip] handleMessage -> DEBU 3965 Exiting" -"2019-05-02 01:31:38.187 UTC [gossip.gossip] handleMessage -> DEBU 3966 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.187 UTC [gossip.gossip] handleMessage -> DEBU 3967 Exiting" -"2019-05-02 01:31:38.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3968 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" -"2019-05-02 01:31:38.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3969 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:38.187 UTC [msp.identity] Verify -> DEBU 396a Verify: digest = 00000000 ac 14 3e e0 f1 95 9e 37 32 b5 65 63 e1 99 cc aa |..>....72.ec....| -00000010 99 3d de de b1 f6 91 e1 30 9c 3a 14 f4 5b 68 bf |.=......0.:..[h.|" -"2019-05-02 01:31:38.187 UTC [msp.identity] Verify -> DEBU 396b Verify: sig = 00000000 30 44 02 20 17 2a e5 b5 5f d2 6b 2f cc 0f 67 a8 |0D. .*.._.k/..g.| -00000010 d4 bf e5 03 2b cc db 41 94 50 0c b9 f2 d5 0c 98 |....+..A.P......| -00000020 36 e8 93 27 02 20 7f d2 8a 80 22 e5 85 aa cf 21 |6..'. ...."....!| -00000030 ff dc 3e 35 1b bc d4 1e 54 69 dd 4e c0 ae e8 ba |..>5....Ti.N....| -00000040 ff 5d 1a 59 c9 36 |.].Y.6|" -"2019-05-02 01:31:38.187 UTC [msp.identity] Verify -> DEBU 396c Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:28:04.523 UTC [cauthdsl] func1 -> DEBU 3637 0xc00244d0d0 gate 1556789284523506100 evaluation starts" +"2019-05-02 09:28:04.523 UTC [cauthdsl] func2 -> DEBU 3638 0xc00244d0d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.524 UTC [cauthdsl] func2 -> DEBU 3639 0xc00244d0d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.524 UTC [cauthdsl] func2 -> DEBU 363a 0xc00244d0d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-05-02 09:28:04.524 UTC [cauthdsl] func2 -> DEBU 363b 0xc00244d0d0 principal evaluation fails" +"2019-05-02 09:28:04.524 UTC [cauthdsl] func1 -> DEBU 363c 0xc00244d0d0 gate 1556789284523506100 evaluation fails" +"2019-05-02 09:28:04.525 UTC [policies] Evaluate -> DEBU 363d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.525 UTC [policies] Evaluate -> DEBU 363e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.527 UTC [policies] Evaluate -> DEBU 363f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:04.527 UTC [cauthdsl] func1 -> DEBU 3640 0xc002e8a250 gate 1556789284527722500 evaluation starts" +"2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3641 0xc002e8a250 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3642 0xc002e8a250 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3643 0xc002e8a250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +"2019-05-02 09:28:04.528 UTC [cauthdsl] func2 -> DEBU 3644 0xc002e8a250 principal evaluation fails" +"2019-05-02 09:28:04.528 UTC [cauthdsl] func1 -> DEBU 3645 0xc002e8a250 gate 1556789284527722500 evaluation fails" +"2019-05-02 09:28:04.529 UTC [policies] Evaluate -> DEBU 3646 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:04.529 UTC [policies] Evaluate -> DEBU 3647 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:04.530 UTC [policies] Evaluate -> DEBU 3648 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:04.534 UTC [cauthdsl] func1 -> DEBU 3649 0xc002e8aab0 gate 1556789284534150800 evaluation starts" +"2019-05-02 09:28:04.534 UTC [cauthdsl] func2 -> DEBU 364a 0xc002e8aab0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.534 UTC [cauthdsl] func2 -> DEBU 364b 0xc002e8aab0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.534 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 364c Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:28:04.535 UTC [msp] Validate -> DEBU 364d MSP Org1MSP validating identity" +"2019-05-02 09:28:04.535 UTC [msp] getCertificationChain -> DEBU 364e MSP Org1MSP getting certification chain" +"2019-05-02 09:28:04.536 UTC [cauthdsl] func2 -> DEBU 364f 0xc002e8aab0 principal matched by identity 0" +"2019-05-02 09:28:04.536 UTC [msp.identity] Verify -> DEBU 3650 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:04.536 UTC [msp.identity] Verify -> DEBU 3651 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:04.537 UTC [cauthdsl] func2 -> DEBU 3652 0xc002e8aab0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.537 UTC [cauthdsl] func1 -> DEBU 3653 0xc002e8aab0 gate 1556789284534150800 evaluation succeeds" +"2019-05-02 09:28:04.537 UTC [policies] Evaluate -> DEBU 3654 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.538 UTC [policies] Evaluate -> DEBU 3655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:04.538 UTC [policies] Evaluate -> DEBU 3656 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.538 UTC [policies] Evaluate -> DEBU 3657 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.539 UTC [gossip.gossip] handleMessage -> DEBU 3658 Exiting" +"2019-05-02 09:28:04.539 UTC [gossip.gossip] handleMessage -> DEBU 3659 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.540 UTC [msp.identity] Verify -> DEBU 365a Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:04.543 UTC [msp.identity] Verify -> DEBU 365c Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:04.542 UTC [msp] DeserializeIdentity -> DEBU 365b Obtaining identity" +"2019-05-02 09:28:04.543 UTC [msp] DeserializeIdentity -> DEBU 365d Obtaining identity" +"2019-05-02 09:28:04.544 UTC [msp] DeserializeIdentity -> DEBU 365e Obtaining identity" +"2019-05-02 09:28:04.544 UTC [gossip.gossip] handleMessage -> DEBU 365f Exiting" +"2019-05-02 09:28:04.544 UTC [gossip.comm] Send -> DEBU 3660 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes to 2 peers" +"2019-05-02 09:28:04.545 UTC [msp] DeserializeIdentity -> DEBU 3661 Obtaining identity" +"2019-05-02 09:28:04.545 UTC [gossip.comm] sendToEndpoint -> DEBU 3662 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.545 UTC [gossip.comm] sendToEndpoint -> DEBU 3663 Exiting" +"2019-05-02 09:28:04.545 UTC [msp] DeserializeIdentity -> DEBU 3664 Obtaining identity" +"2019-05-02 09:28:04.546 UTC [gossip.comm] sendToEndpoint -> DEBU 3665 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236539113400 seq_num:1556789284367786700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.546 UTC [gossip.comm] sendToEndpoint -> DEBU 3666 Exiting" +"2019-05-02 09:28:04.570 UTC [gossip.comm] func1 -> DEBU 3667 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.571 UTC [gossip.gossip] handleMessage -> DEBU 3668 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.571 UTC [gossip.pull] HandleMessage -> DEBU 3669 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.572 UTC [gossip.pull] SendDigest -> DEBU 366a Sending BLOCK_MSG digest: [9 1 2 3 4 5 6 7 8] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:04.572 UTC [gossip.gossip] handleMessage -> DEBU 366b Exiting" +"2019-05-02 09:28:04.752 UTC [gossip.comm] func1 -> DEBU 366c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.752 UTC [gossip.gossip] handleMessage -> DEBU 366d Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.753 UTC [msp] DeserializeIdentity -> DEBU 366e Obtaining identity" +"2019-05-02 09:28:04.753 UTC [msp] DeserializeIdentity -> DEBU 366f Obtaining identity" +"2019-05-02 09:28:04.753 UTC [msp] DeserializeIdentity -> DEBU 3670 Obtaining identity" +"2019-05-02 09:28:04.756 UTC [gossip.gossip] handleMessage -> DEBU 3671 Exiting" +"2019-05-02 09:28:04.758 UTC [gossip.comm] func1 -> DEBU 3672 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.758 UTC [gossip.gossip] handleMessage -> DEBU 3673 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.759 UTC [msp] DeserializeIdentity -> DEBU 3674 Obtaining identity" +"2019-05-02 09:28:04.759 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3675 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3676 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.759 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3677 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.760 UTC [policies] Evaluate -> DEBU 3678 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.760 UTC [policies] Evaluate -> DEBU 3679 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.760 UTC [policies] Evaluate -> DEBU 367a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.761 UTC [cauthdsl] func1 -> DEBU 367b 0xc002fd96c0 gate 1556789284760892500 evaluation starts" +"2019-05-02 09:28:04.761 UTC [cauthdsl] func2 -> DEBU 367c 0xc002fd96c0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.761 UTC [cauthdsl] func2 -> DEBU 367d 0xc002fd96c0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.761 UTC [cauthdsl] func2 -> DEBU 367e 0xc002fd96c0 principal matched by identity 0" +"2019-05-02 09:28:04.761 UTC [msp.identity] Verify -> DEBU 367f Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:04.761 UTC [msp.identity] Verify -> DEBU 3680 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:04.762 UTC [cauthdsl] func2 -> DEBU 3681 0xc002fd96c0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.762 UTC [cauthdsl] func1 -> DEBU 3682 0xc002fd96c0 gate 1556789284760892500 evaluation succeeds" +"2019-05-02 09:28:04.762 UTC [policies] Evaluate -> DEBU 3683 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.762 UTC [policies] Evaluate -> DEBU 3684 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.763 UTC [policies] Evaluate -> DEBU 3685 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.763 UTC [policies] Evaluate -> DEBU 3686 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.763 UTC [msp] DeserializeIdentity -> DEBU 3687 Obtaining identity" +"2019-05-02 09:28:04.765 UTC [gossip.comm] func1 -> DEBU 3688 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.770 UTC [gossip.gossip] handleMessage -> DEBU 3689 Exiting" +"2019-05-02 09:28:04.770 UTC [gossip.gossip] handleMessage -> DEBU 368a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236786304300 seq_num:1556789284353452800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.771 UTC [msp] DeserializeIdentity -> DEBU 368b Obtaining identity" +"2019-05-02 09:28:04.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 368c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 368d Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 368e Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.773 UTC [policies] Evaluate -> DEBU 368f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.773 UTC [policies] Evaluate -> DEBU 3690 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.773 UTC [policies] Evaluate -> DEBU 3691 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.774 UTC [cauthdsl] func1 -> DEBU 3692 0xc0035f10d0 gate 1556789284774089100 evaluation starts" +"2019-05-02 09:28:04.774 UTC [cauthdsl] func2 -> DEBU 3693 0xc0035f10d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.774 UTC [cauthdsl] func2 -> DEBU 3694 0xc0035f10d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.775 UTC [cauthdsl] func2 -> DEBU 3695 0xc0035f10d0 principal matched by identity 0" +"2019-05-02 09:28:04.775 UTC [msp.identity] Verify -> DEBU 3696 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:04.776 UTC [msp.identity] Verify -> DEBU 3697 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:04.776 UTC [cauthdsl] func2 -> DEBU 3698 0xc0035f10d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.776 UTC [cauthdsl] func1 -> DEBU 3699 0xc0035f10d0 gate 1556789284774089100 evaluation succeeds" +"2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369c Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.777 UTC [policies] Evaluate -> DEBU 369d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.778 UTC [msp] DeserializeIdentity -> DEBU 369e Obtaining identity" +"2019-05-02 09:28:04.778 UTC [gossip.gossip] handleMessage -> DEBU 369f Exiting" +"2019-05-02 09:28:04.980 UTC [gossip.comm] func1 -> DEBU 36a0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.981 UTC [gossip.gossip] handleMessage -> DEBU 36a1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:04.982 UTC [msp] DeserializeIdentity -> DEBU 36a2 Obtaining identity" +"2019-05-02 09:28:04.982 UTC [msp] DeserializeIdentity -> DEBU 36a3 Obtaining identity" +"2019-05-02 09:28:04.982 UTC [msp] DeserializeIdentity -> DEBU 36a4 Obtaining identity" +"2019-05-02 09:28:04.983 UTC [gossip.gossip] handleMessage -> DEBU 36a5 Exiting" +"2019-05-02 09:28:04.990 UTC [gossip.comm] func1 -> DEBU 36a6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789284200243300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.990 UTC [gossip.gossip] handleMessage -> DEBU 36a7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789237015120300 seq_num:1556789284200243300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-05-02 09:28:04.991 UTC [msp] DeserializeIdentity -> DEBU 36a8 Obtaining identity" +"2019-05-02 09:28:04.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:04.992 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36aa Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.992 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ab Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:04.992 UTC [policies] Evaluate -> DEBU 36ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:04.993 UTC [policies] Evaluate -> DEBU 36ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:04.993 UTC [policies] Evaluate -> DEBU 36ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:04.993 UTC [cauthdsl] func1 -> DEBU 36af 0xc003e6b320 gate 1556789284993571600 evaluation starts" +"2019-05-02 09:28:04.993 UTC [cauthdsl] func2 -> DEBU 36b0 0xc003e6b320 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:04.994 UTC [cauthdsl] func2 -> DEBU 36b1 0xc003e6b320 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:04.994 UTC [cauthdsl] func2 -> DEBU 36b2 0xc003e6b320 principal matched by identity 0" +"2019-05-02 09:28:04.995 UTC [msp.identity] Verify -> DEBU 36b3 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:04.995 UTC [msp.identity] Verify -> DEBU 36b4 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:04.995 UTC [cauthdsl] func2 -> DEBU 36b5 0xc003e6b320 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:04.996 UTC [cauthdsl] func1 -> DEBU 36b6 0xc003e6b320 gate 1556789284993571600 evaluation succeeds" +"2019-05-02 09:28:04.996 UTC [policies] Evaluate -> DEBU 36b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.996 UTC [policies] Evaluate -> DEBU 36b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:04.997 UTC [policies] Evaluate -> DEBU 36b9 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:04.997 UTC [policies] Evaluate -> DEBU 36ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:04.997 UTC [msp] DeserializeIdentity -> DEBU 36bb Obtaining identity" +"2019-05-02 09:28:04.998 UTC [gossip.gossip] handleMessage -> DEBU 36bc Exiting" +"2019-05-02 09:28:05.607 UTC [msp.identity] Sign -> DEBU 36bd Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151028 " +"2019-05-02 09:28:05.607 UTC [msp.identity] Sign -> DEBU 36be Sign: digest: 80087D267E5F5F113D94F3674E6B1C812887033DC10ABD3A76F6DB510C95C6D4 " +"2019-05-02 09:28:05.608 UTC [msp.identity] Sign -> DEBU 36bf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:28:05.609 UTC [msp.identity] Sign -> DEBU 36c0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:28:05.610 UTC [gossip.comm] Send -> DEBU 36c1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:05.610 UTC [msp] DeserializeIdentity -> DEBU 36c2 Obtaining identity" +"2019-05-02 09:28:05.611 UTC [gossip.comm] sendToEndpoint -> DEBU 36c3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.611 UTC [gossip.comm] sendToEndpoint -> DEBU 36c4 Exiting" +"2019-05-02 09:28:05.611 UTC [gossip.comm] Send -> DEBU 36c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:05.612 UTC [msp] DeserializeIdentity -> DEBU 36c6 Obtaining identity" +"2019-05-02 09:28:05.612 UTC [gossip.comm] sendToEndpoint -> DEBU 36c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.613 UTC [gossip.comm] sendToEndpoint -> DEBU 36c9 Exiting" +"2019-05-02 09:28:05.612 UTC [gossip.comm] Send -> DEBU 36c8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:05.613 UTC [gossip.comm] sendToEndpoint -> DEBU 36ca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.613 UTC [gossip.comm] sendToEndpoint -> DEBU 36cb Exiting" +"2019-05-02 09:28:05.618 UTC [gossip.comm] func1 -> DEBU 36cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 649 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.618 UTC [gossip.gossip] handleMessage -> DEBU 36cd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 649 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.618 UTC [gossip.gossip] handleMessage -> DEBU 36ce Exiting" +"2019-05-02 09:28:05.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 649 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.619 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36d0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:05.619 UTC [msp.identity] Verify -> DEBU 36d1 Verify: digest = 00000000 80 08 7d 26 7e 5f 5f 11 3d 94 f3 67 4e 6b 1c 81 |..}&~__.=..gNk..| +00000010 28 87 03 3d c1 0a bd 3a 76 f6 db 51 0c 95 c6 d4 |(..=...:v..Q....|" +"2019-05-02 09:28:05.619 UTC [msp.identity] Verify -> DEBU 36d2 Verify: sig = 00000000 30 45 02 21 00 f5 66 3d 18 73 85 2f aa 69 17 80 |0E.!..f=.s./.i..| +00000010 d9 58 8e c2 ab 05 ca 86 23 8d f8 b8 ea 90 9a c1 |.X......#.......| +00000020 79 26 17 1f 9a 02 20 1d d1 27 9e 20 f0 0a ea f8 |y&.... ..'. ....| +00000030 8e a7 8c 63 4f 0e 52 c9 76 c8 3f 16 03 bb 39 1d |...cO.R.v.?...9.| +00000040 9a 8c 7b 02 22 78 6a |..{."xj|" +"2019-05-02 09:28:05.619 UTC [gossip.discovery] handleAliveMessage -> DEBU 36d3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:05.619 UTC [gossip.discovery] isSentByMe -> DEBU 36d4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:05.619 UTC [gossip.discovery] handleAliveMessage -> DEBU 36d5 Exiting" +"2019-05-02 09:28:05.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36d6 Exiting" +"2019-05-02 09:28:05.619 UTC [gossip.comm] func1 -> DEBU 36d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.619 UTC [gossip.gossip] handleMessage -> DEBU 36d8 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.619 UTC [gossip.gossip] handleMessage -> DEBU 36d9 Exiting" +"2019-05-02 09:28:05.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.619 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36db Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:05.620 UTC [msp.identity] Verify -> DEBU 36dc Verify: digest = 00000000 80 08 7d 26 7e 5f 5f 11 3d 94 f3 67 4e 6b 1c 81 |..}&~__.=..gNk..| +00000010 28 87 03 3d c1 0a bd 3a 76 f6 db 51 0c 95 c6 d4 |(..=...:v..Q....|" +"2019-05-02 09:28:05.620 UTC [msp.identity] Verify -> DEBU 36dd Verify: sig = 00000000 30 45 02 21 00 f5 66 3d 18 73 85 2f aa 69 17 80 |0E.!..f=.s./.i..| +00000010 d9 58 8e c2 ab 05 ca 86 23 8d f8 b8 ea 90 9a c1 |.X......#.......| +00000020 79 26 17 1f 9a 02 20 1d d1 27 9e 20 f0 0a ea f8 |y&.... ..'. ....| +00000030 8e a7 8c 63 4f 0e 52 c9 76 c8 3f 16 03 bb 39 1d |...cO.R.v.?...9.| +00000040 9a 8c 7b 02 22 78 6a |..{."xj|" +"2019-05-02 09:28:05.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 36de Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:05.620 UTC [gossip.discovery] isSentByMe -> DEBU 36df Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:05.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 36e0 Exiting" +"2019-05-02 09:28:05.620 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36e1 Exiting" +"2019-05-02 09:28:05.620 UTC [gossip.comm] func1 -> DEBU 36e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.620 UTC [gossip.gossip] handleMessage -> DEBU 36e3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.620 UTC [gossip.gossip] handleMessage -> DEBU 36e4 Exiting" +"2019-05-02 09:28:05.620 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.620 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36e6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36e7 Verify: digest = 00000000 80 08 7d 26 7e 5f 5f 11 3d 94 f3 67 4e 6b 1c 81 |..}&~__.=..gNk..| +00000010 28 87 03 3d c1 0a bd 3a 76 f6 db 51 0c 95 c6 d4 |(..=...:v..Q....|" +"2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36e8 Verify: sig = 00000000 30 45 02 21 00 f5 66 3d 18 73 85 2f aa 69 17 80 |0E.!..f=.s./.i..| +00000010 d9 58 8e c2 ab 05 ca 86 23 8d f8 b8 ea 90 9a c1 |.X......#.......| +00000020 79 26 17 1f 9a 02 20 1d d1 27 9e 20 f0 0a ea f8 |y&.... ..'. ....| +00000030 8e a7 8c 63 4f 0e 52 c9 76 c8 3f 16 03 bb 39 1d |...cO.R.v.?...9.| +00000040 9a 8c 7b 02 22 78 6a |..{."xj|" +"2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36e9 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:38.187 UTC [msp.identity] Verify -> DEBU 396d Verify: sig = 00000000 30 44 02 20 76 4a e3 dc e4 4e 6c 17 29 be 45 12 |0D. vJ...Nl.).E.| -00000010 da 3a cb bd dc cf 3f 92 3c d6 72 21 66 c0 87 e7 |.:....?.<.r!f...| -00000020 2f 05 3a e6 02 20 5a b6 4c 88 5b f1 4a a0 95 70 |/.:.. Z.L.[.J..p| -00000030 d8 3e 4e d4 92 91 9b 5c bd bf f3 af e0 00 be 8b |.>N....\........| -00000040 e0 5d f3 85 d7 0f |.]....|" -"2019-05-02 01:31:38.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 396e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:38.187 UTC [gossip.discovery] isSentByMe -> DEBU 396f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:38.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 3970 Exiting" -"2019-05-02 01:31:38.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3971 Exiting" -"2019-05-02 01:31:38.411 UTC [gossip.comm] func1 -> DEBU 3972 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:38.413 UTC [gossip.gossip] handleMessage -> DEBU 3973 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:38.414 UTC [gossip.gossip] handleMessage -> DEBU 3974 Exiting" -"2019-05-02 01:31:38.414 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3975 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:38.415 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3976 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:38.416 UTC [msp.identity] Verify -> DEBU 3977 Verify: digest = 00000000 81 ae 97 b0 b4 b1 27 e3 7f 44 c1 19 6b 5c 93 3d |......'..D..k\.=| -00000010 da 1f 19 70 b0 f3 4a 15 28 00 90 02 34 b8 bf c0 |...p..J.(...4...|" -"2019-05-02 01:31:38.417 UTC [msp.identity] Verify -> DEBU 3978 Verify: sig = 00000000 30 45 02 21 00 a5 8c 38 45 f7 f2 48 04 db ac 95 |0E.!...8E..H....| -00000010 e3 c6 57 a1 01 9b c5 3c ff 38 03 45 cb d5 bb 23 |..W....<.8.E...#| -00000020 8c f9 3c 44 6c 02 20 05 2f 07 5d 49 4b 68 95 e5 |.. DEBU 3979 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.423 UTC [gossip.comm] func1 -> DEBU 397a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.423 UTC [msp.identity] Verify -> DEBU 397b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:28:05.621 UTC [msp.identity] Verify -> DEBU 36ea Verify: sig = 00000000 30 44 02 20 32 68 4e c8 56 1b 5b 8e 54 b7 b0 d7 |0D. 2hN.V.[.T...| +00000010 d6 5e e7 9d f9 98 40 b9 78 26 cf 74 56 ee 48 7c |.^....@.x&.tV.H|| +00000020 80 c7 20 86 02 20 04 89 58 5b d8 38 9f 55 15 2a |.. .. ..X[.8.U.*| +00000030 e3 3a f4 c8 64 d9 0f 36 d4 95 f2 4d 2e da aa af |.:..d..6...M....| +00000040 33 ce a6 b0 d1 58 |3....X|" +"2019-05-02 09:28:05.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 36eb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:05.621 UTC [gossip.discovery] isSentByMe -> DEBU 36ec Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:05.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 36ed Exiting" +"2019-05-02 09:28:05.621 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36ee Exiting" +"2019-05-02 09:28:05.625 UTC [gossip.comm] func1 -> DEBU 36ef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.625 UTC [gossip.gossip] handleMessage -> DEBU 36f0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.625 UTC [gossip.gossip] handleMessage -> DEBU 36f1 Exiting" +"2019-05-02 09:28:05.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36f2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.625 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36f3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:05.625 UTC [msp] DeserializeIdentity -> DEBU 36f4 Obtaining identity" +"2019-05-02 09:28:05.625 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:05.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36f6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:05.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36f7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:05.625 UTC [policies] Evaluate -> DEBU 36f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:05.625 UTC [policies] Evaluate -> DEBU 36f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:05.625 UTC [policies] Evaluate -> DEBU 36fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:05.625 UTC [cauthdsl] func1 -> DEBU 36fb 0xc00419fb80 gate 1556789285625972700 evaluation starts" +"2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 36fc 0xc00419fb80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 36fd 0xc00419fb80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 36fe 0xc00419fb80 principal matched by identity 0" +"2019-05-02 09:28:05.626 UTC [msp.identity] Verify -> DEBU 36ff Verify: digest = 00000000 fa a0 9b 03 9a 54 97 2d fe f5 21 b0 77 43 11 c7 |.....T.-..!.wC..| +00000010 44 07 9a e5 b2 10 76 1f f8 aa 56 f7 2f 0c 3e 8f |D.....v...V./.>.|" +"2019-05-02 09:28:05.626 UTC [msp.identity] Verify -> DEBU 3700 Verify: sig = 00000000 30 44 02 20 17 10 ee 8b 8d 75 a8 d5 1b 2c db 8e |0D. .....u...,..| +00000010 45 30 5f 20 3e 71 ab 67 39 41 b2 51 d8 3a 76 43 |E0_ >q.g9A.Q.:vC| +00000020 ec ee 89 c0 02 20 4c 3a 8c de e0 e3 09 b4 96 47 |..... L:.......G| +00000030 8e 79 84 af 16 31 04 93 51 d1 7f 32 a0 13 75 13 |.y...1..Q..2..u.| +00000040 c7 82 92 b0 63 2b |....c+|" +"2019-05-02 09:28:05.626 UTC [cauthdsl] func2 -> DEBU 3701 0xc00419fb80 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:05.626 UTC [cauthdsl] func1 -> DEBU 3702 0xc00419fb80 gate 1556789285625972700 evaluation succeeds" +"2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3703 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3704 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3705 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:05.626 UTC [policies] Evaluate -> DEBU 3706 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:05.626 UTC [gossip.discovery] handleAliveMessage -> DEBU 3707 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 3708 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 3709 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 " +"2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 370a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 " +"2019-05-02 09:28:05.626 UTC [gossip.discovery] learnExistingMembers -> DEBU 370b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:05.627 UTC [gossip.discovery] learnExistingMembers -> DEBU 370c Exiting" +"2019-05-02 09:28:05.627 UTC [gossip.discovery] handleAliveMessage -> DEBU 370d Exiting" +"2019-05-02 09:28:05.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 370e Exiting" +"2019-05-02 09:28:05.627 UTC [gossip.discovery] sendMemResponse -> DEBU 370f Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:05.627 UTC [msp] DeserializeIdentity -> DEBU 3710 Obtaining identity" +"2019-05-02 09:28:05.627 UTC [msp] DeserializeIdentity -> DEBU 3711 Obtaining identity" +"2019-05-02 09:28:05.627 UTC [msp] DeserializeIdentity -> DEBU 3712 Obtaining identity" +"2019-05-02 09:28:05.627 UTC [gossip.comm] Send -> DEBU 3713 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:05.627 UTC [gossip.discovery] sendMemResponse -> DEBU 3714 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:05.627 UTC [gossip.comm] sendToEndpoint -> DEBU 3715 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.627 UTC [gossip.comm] sendToEndpoint -> DEBU 3716 Exiting" +"2019-05-02 09:28:05.631 UTC [gossip.comm] func1 -> DEBU 3717 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.631 UTC [gossip.gossip] handleMessage -> DEBU 3718 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.631 UTC [gossip.pull] HandleMessage -> DEBU 3719 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.631 UTC [msp] DeserializeIdentity -> DEBU 371a Obtaining identity" +"2019-05-02 09:28:05.631 UTC [msp] DeserializeIdentity -> DEBU 371b Obtaining identity" +"2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371c Obtaining identity" +"2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371d Obtaining identity" +"2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371e Obtaining identity" +"2019-05-02 09:28:05.632 UTC [msp] DeserializeIdentity -> DEBU 371f Obtaining identity" +"2019-05-02 09:28:05.632 UTC [gossip.pull] SendDigest -> DEBU 3720 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:05.632 UTC [gossip.gossip] handleMessage -> DEBU 3721 Exiting" +"2019-05-02 09:28:05.644 UTC [gossip.comm] func1 -> DEBU 3722 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.644 UTC [gossip.gossip] handleMessage -> DEBU 3723 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.644 UTC [gossip.pull] HandleMessage -> DEBU 3724 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3725 Obtaining identity" +"2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3726 Obtaining identity" +"2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3727 Obtaining identity" +"2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3728 Obtaining identity" +"2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 3729 Obtaining identity" +"2019-05-02 09:28:05.645 UTC [msp] DeserializeIdentity -> DEBU 372a Obtaining identity" +"2019-05-02 09:28:05.645 UTC [gossip.pull] SendDigest -> DEBU 372b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:05.645 UTC [gossip.gossip] handleMessage -> DEBU 372c Exiting" +"2019-05-02 09:28:05.671 UTC [gossip.comm] func1 -> DEBU 372d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.671 UTC [gossip.comm] func1 -> DEBU 372e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.672 UTC [gossip.gossip] handleMessage -> DEBU 372f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.672 UTC [gossip.pull] HandleMessage -> DEBU 3730 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.672 UTC [gossip.pull] SendDigest -> DEBU 3731 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:05.673 UTC [gossip.gossip] handleMessage -> DEBU 3732 Exiting" +"2019-05-02 09:28:05.673 UTC [gossip.gossip] handleMessage -> DEBU 3733 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.674 UTC [gossip.gossip] handleMessage -> DEBU 3734 Exiting" +"2019-05-02 09:28:05.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3735 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.674 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3736 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:05.674 UTC [msp.identity] Verify -> DEBU 3737 Verify: digest = 00000000 a8 ad bf 04 eb 1e c7 38 ac ef 02 9a 41 6a de 26 |.......8....Aj.&| +00000010 29 03 06 7d ce 8c c2 77 62 56 bf 86 d9 7d b5 54 |)..}...wbV...}.T|" +"2019-05-02 09:28:05.674 UTC [msp.identity] Verify -> DEBU 3738 Verify: sig = 00000000 30 44 02 20 30 f4 a0 c3 85 70 46 b3 8d 41 09 f1 |0D. 0....pF..A..| +00000010 55 d3 bb 5a 38 4a fb d6 24 bf 1a 2e c4 31 90 3b |U..Z8J..$....1.;| +00000020 73 ff 1f d1 02 20 43 fd 52 05 89 00 4a 35 66 2a |s.... C.R...J5f*| +00000030 9a 74 8c 53 ab 7d 14 ee 33 aa 22 03 09 35 c7 5f |.t.S.}..3."..5._| +00000040 9f 34 49 b8 2d d8 |.4I.-.|" +"2019-05-02 09:28:05.675 UTC [msp.identity] Verify -> DEBU 3739 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:38.424 UTC [msp.identity] Verify -> DEBU 397d Verify: sig = 00000000 30 45 02 21 00 a8 01 bf 5c 90 07 f9 e7 d3 f7 bf |0E.!....\.......| -00000010 a4 2d 7b d1 3a 05 6a 0b fb c2 d0 7a 07 14 c9 9e |.-{.:.j....z....| -00000020 74 3b 53 9d 2d 02 20 53 10 c9 37 20 07 55 d8 79 |t;S.-. S..7 .U.y| -00000030 c2 0a eb a4 64 c2 f3 f5 8b b5 fb 0d ac fa 28 8e |....d.........(.| -00000040 bd a7 c8 ab 5e 6a d6 |....^j.|" -"2019-05-02 01:31:38.423 UTC [gossip.gossip] handleMessage -> DEBU 397c Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.426 UTC [gossip.discovery] handleAliveMessage -> DEBU 397e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:38.426 UTC [gossip.discovery] learnExistingMembers -> DEBU 397f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:38.427 UTC [gossip.discovery] learnExistingMembers -> DEBU 3980 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 " -"2019-05-02 01:31:38.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3981 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 " -"2019-05-02 01:31:38.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3982 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:38.429 UTC [gossip.discovery] learnExistingMembers -> DEBU 3983 Exiting" -"2019-05-02 01:31:38.430 UTC [gossip.discovery] handleAliveMessage -> DEBU 3984 Exiting" -"2019-05-02 01:31:38.431 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3985 Exiting" -"2019-05-02 01:31:38.432 UTC [gossip.gossip] handleMessage -> DEBU 3986 Exiting" -"2019-05-02 01:31:38.432 UTC [gossip.gossip] handleMessage -> DEBU 3987 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.432 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3988 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.433 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3989 Exiting" -"2019-05-02 01:31:38.434 UTC [gossip.gossip] handleMessage -> DEBU 398a Exiting" -"2019-05-02 01:31:38.434 UTC [gossip.discovery] handleMsgFromComm -> DEBU 398b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.435 UTC [gossip.discovery] handleMsgFromComm -> DEBU 398c Exiting" -"2019-05-02 01:31:38.436 UTC [msp] DeserializeIdentity -> DEBU 398d Obtaining identity" -"2019-05-02 01:31:38.437 UTC [msp] DeserializeIdentity -> DEBU 398e Obtaining identity" -"2019-05-02 01:31:38.437 UTC [msp] DeserializeIdentity -> DEBU 398f Obtaining identity" -"2019-05-02 01:31:38.438 UTC [gossip.comm] Send -> DEBU 3990 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:38.439 UTC [msp] DeserializeIdentity -> DEBU 3991 Obtaining identity" -"2019-05-02 01:31:38.439 UTC [gossip.comm] sendToEndpoint -> DEBU 3992 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.440 UTC [gossip.comm] sendToEndpoint -> DEBU 3993 Exiting" -"2019-05-02 01:31:38.440 UTC [gossip.comm] Send -> DEBU 3994 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:38.444 UTC [gossip.comm] sendToEndpoint -> DEBU 3995 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.444 UTC [gossip.comm] sendToEndpoint -> DEBU 3996 Exiting" -"2019-05-02 01:31:38.479 UTC [gossip.comm] func1 -> DEBU 3997 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.479 UTC [gossip.gossip] handleMessage -> DEBU 3998 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.479 UTC [gossip.gossip] handleMessage -> DEBU 3999 Exiting" -"2019-05-02 01:31:38.479 UTC [gossip.discovery] handleMsgFromComm -> DEBU 399a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.480 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 399b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:38.480 UTC [msp] DeserializeIdentity -> DEBU 399c Obtaining identity" -"2019-05-02 01:31:38.480 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 399d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:38.480 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 399e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:38.480 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 399f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:38.480 UTC [policies] Evaluate -> DEBU 39a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:38.480 UTC [policies] Evaluate -> DEBU 39a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.480 UTC [policies] Evaluate -> DEBU 39a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:38.481 UTC [cauthdsl] func1 -> DEBU 39a3 0xc0043401c0 gate 1556760698480996500 evaluation starts" -"2019-05-02 01:31:38.481 UTC [cauthdsl] func2 -> DEBU 39a4 0xc0043401c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.482 UTC [cauthdsl] func2 -> DEBU 39a5 0xc0043401c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:38.482 UTC [cauthdsl] func2 -> DEBU 39a6 0xc0043401c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:38.482 UTC [cauthdsl] func2 -> DEBU 39a7 0xc0043401c0 principal evaluation fails" -"2019-05-02 01:31:38.483 UTC [cauthdsl] func1 -> DEBU 39a8 0xc0043401c0 gate 1556760698480996500 evaluation fails" -"2019-05-02 01:31:38.483 UTC [policies] Evaluate -> DEBU 39a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:38.483 UTC [policies] Evaluate -> DEBU 39aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:38.483 UTC [policies] Evaluate -> DEBU 39ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:38.483 UTC [cauthdsl] func1 -> DEBU 39ac 0xc004340ac0 gate 1556760698483415100 evaluation starts" -"2019-05-02 01:31:38.484 UTC [cauthdsl] func2 -> DEBU 39ad 0xc004340ac0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.484 UTC [cauthdsl] func2 -> DEBU 39ae 0xc004340ac0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:38.484 UTC [cauthdsl] func2 -> DEBU 39af 0xc004340ac0 principal matched by identity 0" -"2019-05-02 01:31:38.484 UTC [msp.identity] Verify -> DEBU 39b0 Verify: digest = 00000000 e5 1a e9 75 af 78 0f 4a 09 e2 fb 21 46 6a 3d 3b |...u.x.J...!Fj=;| -00000010 be c7 cc 65 26 17 15 e5 23 b4 da 79 c4 46 b8 5a |...e&...#..y.F.Z|" -"2019-05-02 01:31:38.484 UTC [msp.identity] Verify -> DEBU 39b1 Verify: sig = 00000000 30 45 02 21 00 fc 71 8d 99 db 91 31 01 30 c7 d0 |0E.!..q....1.0..| -00000010 72 a9 5a ac 6e 8d 43 41 79 48 bd 4b 2a 3e c3 96 |r.Z.n.CAyH.K*>..| -00000020 9f f2 30 d4 8f 02 20 2b 70 12 b8 6e f2 81 b5 e8 |..0... +p..n....| -00000030 d2 4e 8e dc c0 81 4c 8f 69 9f 6a 26 a0 ca 1c 7f |.N....L.i.j&....| -00000040 35 23 c0 16 51 83 a7 |5#..Q..|" -"2019-05-02 01:31:38.484 UTC [cauthdsl] func2 -> DEBU 39b2 0xc004340ac0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:38.488 UTC [cauthdsl] func1 -> DEBU 39b3 0xc004340ac0 gate 1556760698483415100 evaluation succeeds" -"2019-05-02 01:31:38.488 UTC [policies] Evaluate -> DEBU 39b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:38.489 UTC [policies] Evaluate -> DEBU 39b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:38.489 UTC [policies] Evaluate -> DEBU 39b6 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:38.489 UTC [policies] Evaluate -> DEBU 39b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:38.490 UTC [gossip.discovery] handleAliveMessage -> DEBU 39b8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.490 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:38.490 UTC [gossip.comm] func1 -> DEBU 39ba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.490 UTC [gossip.comm] func1 -> DEBU 39bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.490 UTC [gossip.discovery] learnExistingMembers -> DEBU 39bb updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 " -"2019-05-02 01:31:38.492 UTC [gossip.discovery] learnExistingMembers -> DEBU 39be Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 " -"2019-05-02 01:31:38.492 UTC [gossip.discovery] learnExistingMembers -> DEBU 39bf Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:38.492 UTC [gossip.discovery] learnExistingMembers -> DEBU 39c0 Exiting" -"2019-05-02 01:31:38.492 UTC [gossip.discovery] handleAliveMessage -> DEBU 39c1 Exiting" -"2019-05-02 01:31:38.492 UTC [gossip.gossip] handleMessage -> DEBU 39bd Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.493 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c2 Exiting" -"2019-05-02 01:31:38.496 UTC [gossip.gossip] handleMessage -> DEBU 39c3 Exiting" -"2019-05-02 01:31:38.496 UTC [gossip.gossip] handleMessage -> DEBU 39c4 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.497 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.497 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c6 Exiting" -"2019-05-02 01:31:38.498 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.498 UTC [gossip.gossip] handleMessage -> DEBU 39c8 Exiting" -"2019-05-02 01:31:38.498 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c9 Exiting" -"2019-05-02 01:31:38.511 UTC [msp] DeserializeIdentity -> DEBU 39ca Obtaining identity" -"2019-05-02 01:31:38.513 UTC [msp] DeserializeIdentity -> DEBU 39cb Obtaining identity" -"2019-05-02 01:31:38.513 UTC [msp] DeserializeIdentity -> DEBU 39cc Obtaining identity" -"2019-05-02 01:31:38.514 UTC [msp] DeserializeIdentity -> DEBU 39cd Obtaining identity" -"2019-05-02 01:31:38.514 UTC [msp] DeserializeIdentity -> DEBU 39ce Obtaining identity" -"2019-05-02 01:31:38.515 UTC [msp] DeserializeIdentity -> DEBU 39cf Obtaining identity" -"2019-05-02 01:31:38.516 UTC [gossip.comm] Send -> DEBU 39d0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:38.516 UTC [msp] DeserializeIdentity -> DEBU 39d1 Obtaining identity" -"2019-05-02 01:31:38.516 UTC [gossip.comm] sendToEndpoint -> DEBU 39d2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.517 UTC [gossip.comm] sendToEndpoint -> DEBU 39d3 Exiting" -"2019-05-02 01:31:38.519 UTC [msp] DeserializeIdentity -> DEBU 39d4 Obtaining identity" -"2019-05-02 01:31:38.520 UTC [gossip.comm] Send -> DEBU 39d5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:38.520 UTC [gossip.comm] sendToEndpoint -> DEBU 39d6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:38.521 UTC [gossip.comm] sendToEndpoint -> DEBU 39d7 Exiting" -"2019-05-02 01:31:38.698 UTC [msp.identity] Sign -> DEBU 39d8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102C " -"2019-05-02 01:31:38.698 UTC [msp.identity] Sign -> DEBU 39d9 Sign: digest: 50BA618F6337171F01B1E532D00B601A1B0BC1A5D9E841450B3FC89B50810877 " -"2019-05-02 01:31:38.698 UTC [msp.identity] Sign -> DEBU 39da Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:38.699 UTC [msp.identity] Sign -> DEBU 39db Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:38.699 UTC [gossip.discovery] periodicalSendAlive -> DEBU 39dc Sleeping 5s" -"2019-05-02 01:31:38.708 UTC [msp] DeserializeIdentity -> DEBU 39dd Obtaining identity" -"2019-05-02 01:31:38.708 UTC [msp] DeserializeIdentity -> DEBU 39de Obtaining identity" -"2019-05-02 01:31:38.708 UTC [msp] DeserializeIdentity -> DEBU 39df Obtaining identity" -"2019-05-02 01:31:38.708 UTC [gossip.comm] Send -> DEBU 39e0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:38.708 UTC [gossip.comm] Send -> DEBU 39e1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:38.708 UTC [msp] DeserializeIdentity -> DEBU 39e2 Obtaining identity" -"2019-05-02 01:31:38.708 UTC [gossip.comm] Send -> DEBU 39e4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:38.708 UTC [gossip.comm] sendToEndpoint -> DEBU 39e3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.709 UTC [gossip.comm] sendToEndpoint -> DEBU 39e5 Exiting" -"2019-05-02 01:31:38.709 UTC [gossip.comm] sendToEndpoint -> DEBU 39e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.709 UTC [gossip.comm] sendToEndpoint -> DEBU 39e7 Exiting" -"2019-05-02 01:31:38.709 UTC [gossip.comm] sendToEndpoint -> DEBU 39e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:38.709 UTC [gossip.comm] sendToEndpoint -> DEBU 39e9 Exiting" -"2019-05-02 01:31:38.816 UTC [gossip.comm] func1 -> DEBU 39ea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.817 UTC [gossip.gossip] handleMessage -> DEBU 39eb Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.818 UTC [gossip.gossip] handleMessage -> DEBU 39ec Exiting" -"2019-05-02 01:31:38.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39ed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.819 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39ee Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:38.819 UTC [msp] DeserializeIdentity -> DEBU 39ef Obtaining identity" -"2019-05-02 01:31:38.820 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39f0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:38.820 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39f1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:38.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39f2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:38.821 UTC [policies] Evaluate -> DEBU 39f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:38.821 UTC [policies] Evaluate -> DEBU 39f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:38.822 UTC [policies] Evaluate -> DEBU 39f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:38.822 UTC [cauthdsl] func1 -> DEBU 39f6 0xc0042efcc0 gate 1556760698822581600 evaluation starts" -"2019-05-02 01:31:38.823 UTC [cauthdsl] func2 -> DEBU 39f7 0xc0042efcc0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.823 UTC [cauthdsl] func2 -> DEBU 39f8 0xc0042efcc0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:38.823 UTC [cauthdsl] func2 -> DEBU 39f9 0xc0042efcc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:38.824 UTC [gossip.comm] func1 -> DEBU 39fa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.825 UTC [gossip.gossip] handleMessage -> DEBU 39fb Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.824 UTC [cauthdsl] func2 -> DEBU 39fc 0xc0042efcc0 principal evaluation fails" -"2019-05-02 01:31:38.827 UTC [cauthdsl] func1 -> DEBU 39fe 0xc0042efcc0 gate 1556760698822581600 evaluation fails" -"2019-05-02 01:31:38.826 UTC [gossip.comm] func1 -> DEBU 39fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.827 UTC [policies] Evaluate -> DEBU 39ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:38.828 UTC [policies] Evaluate -> DEBU 3a00 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:38.829 UTC [policies] Evaluate -> DEBU 3a01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:38.829 UTC [cauthdsl] func1 -> DEBU 3a02 0xc004254500 gate 1556760698829350600 evaluation starts" -"2019-05-02 01:31:38.829 UTC [cauthdsl] func2 -> DEBU 3a03 0xc004254500 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:38.830 UTC [cauthdsl] func2 -> DEBU 3a04 0xc004254500 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:38.830 UTC [cauthdsl] func2 -> DEBU 3a05 0xc004254500 principal matched by identity 0" -"2019-05-02 01:31:38.831 UTC [msp.identity] Verify -> DEBU 3a06 Verify: digest = 00000000 e5 93 b4 26 5d ba eb 35 a1 c6 82 e0 04 e8 5a f8 |...&]..5......Z.| -00000010 d7 49 8a d2 d1 60 c0 53 0b 33 1a 1c 67 ed bb f0 |.I...`.S.3..g...|" -"2019-05-02 01:31:38.831 UTC [msp.identity] Verify -> DEBU 3a07 Verify: sig = 00000000 30 44 02 20 30 43 6d eb cd ae ea 7d 01 e7 b4 63 |0D. 0Cm....}...c| -00000010 9e 1d 63 14 43 d9 61 4d 98 c2 3c a8 85 c4 34 97 |..c.C.aM..<...4.| -00000020 07 fa e6 b2 02 20 1a 5d d0 68 c3 bd 39 97 04 91 |..... .].h..9...| -00000030 c1 d8 60 25 43 cc 10 61 5a cd b2 a8 b3 f6 c1 8f |..`%C..aZ.......| -00000040 3c 9a 24 60 af ca |<.$`..|" -"2019-05-02 01:31:38.832 UTC [cauthdsl] func2 -> DEBU 3a08 0xc004254500 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:38.832 UTC [cauthdsl] func1 -> DEBU 3a09 0xc004254500 gate 1556760698829350600 evaluation succeeds" -"2019-05-02 01:31:38.832 UTC [policies] Evaluate -> DEBU 3a0a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:38.832 UTC [policies] Evaluate -> DEBU 3a0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:38.833 UTC [policies] Evaluate -> DEBU 3a0c Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:38.833 UTC [policies] Evaluate -> DEBU 3a0d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:38.833 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a0e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.833 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:38.833 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a10 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 " -"2019-05-02 01:31:38.834 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a11 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 " -"2019-05-02 01:31:38.835 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a12 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:38.835 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a13 Exiting" -"2019-05-02 01:31:38.836 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a14 Exiting" -"2019-05-02 01:31:38.836 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a15 Exiting" -"2019-05-02 01:31:38.837 UTC [gossip.gossip] handleMessage -> DEBU 3a16 Exiting" -"2019-05-02 01:31:38.837 UTC [gossip.gossip] handleMessage -> DEBU 3a18 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.837 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.838 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a19 Exiting" -"2019-05-02 01:31:38.839 UTC [gossip.gossip] handleMessage -> DEBU 3a1a Exiting" -"2019-05-02 01:31:38.839 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a1b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.840 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a1c Exiting" -"2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a1d Obtaining identity" -"2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a1e Obtaining identity" -"2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a1f Obtaining identity" -"2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a20 Obtaining identity" -"2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a21 Obtaining identity" -"2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a22 Obtaining identity" -"2019-05-02 01:31:38.844 UTC [gossip.comm] Send -> DEBU 3a23 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:38.844 UTC [msp] DeserializeIdentity -> DEBU 3a24 Obtaining identity" -"2019-05-02 01:31:38.845 UTC [msp] DeserializeIdentity -> DEBU 3a25 Obtaining identity" -"2019-05-02 01:31:38.845 UTC [gossip.comm] Send -> DEBU 3a26 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:38.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3a27 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3a28 Exiting" -"2019-05-02 01:31:38.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3a29 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:38.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3a2a Exiting" -"2019-05-02 01:31:40.786 UTC [msp] DeserializeIdentity -> DEBU 3a2b Obtaining identity" -"2019-05-02 01:31:40.786 UTC [msp] DeserializeIdentity -> DEBU 3a2c Obtaining identity" -"2019-05-02 01:31:40.786 UTC [gossip.comm] Send -> DEBU 3a2d Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:40.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3a2e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3a2f Exiting" -"2019-05-02 01:31:40.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3a30 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3a31 Exiting" -"2019-05-02 01:31:40.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3a32 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3a33 Exiting" -"2019-05-02 01:31:40.789 UTC [gossip.comm] func1 -> DEBU 3a34 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.790 UTC [gossip.gossip] handleMessage -> DEBU 3a35 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.791 UTC [msp] DeserializeIdentity -> DEBU 3a38 Obtaining identity" -"2019-05-02 01:31:40.790 UTC [gossip.comm] func1 -> DEBU 3a36 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.790 UTC [gossip.comm] func1 -> DEBU 3a37 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.792 UTC [msp] DeserializeIdentity -> DEBU 3a39 Obtaining identity" -"2019-05-02 01:31:40.793 UTC [msp] DeserializeIdentity -> DEBU 3a3a Obtaining identity" -"2019-05-02 01:31:40.795 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:40.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a3c Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a3d Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.797 UTC [policies] Evaluate -> DEBU 3a3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:40.798 UTC [policies] Evaluate -> DEBU 3a3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.799 UTC [policies] Evaluate -> DEBU 3a40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:40.799 UTC [cauthdsl] func1 -> DEBU 3a41 0xc003fa4520 gate 1556760700799623100 evaluation starts" -"2019-05-02 01:31:40.800 UTC [cauthdsl] func2 -> DEBU 3a42 0xc003fa4520 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.800 UTC [cauthdsl] func2 -> DEBU 3a43 0xc003fa4520 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.801 UTC [cauthdsl] func2 -> DEBU 3a44 0xc003fa4520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:40.802 UTC [cauthdsl] func2 -> DEBU 3a45 0xc003fa4520 principal evaluation fails" -"2019-05-02 01:31:40.802 UTC [cauthdsl] func1 -> DEBU 3a46 0xc003fa4520 gate 1556760700799623100 evaluation fails" -"2019-05-02 01:31:40.802 UTC [policies] Evaluate -> DEBU 3a47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.802 UTC [policies] Evaluate -> DEBU 3a48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.802 UTC [policies] Evaluate -> DEBU 3a49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:40.803 UTC [cauthdsl] func1 -> DEBU 3a4a 0xc003fa4d80 gate 1556760700803020400 evaluation starts" -"2019-05-02 01:31:40.803 UTC [cauthdsl] func2 -> DEBU 3a4b 0xc003fa4d80 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.803 UTC [cauthdsl] func2 -> DEBU 3a4c 0xc003fa4d80 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.803 UTC [cauthdsl] func2 -> DEBU 3a4d 0xc003fa4d80 principal matched by identity 0" -"2019-05-02 01:31:40.803 UTC [msp.identity] Verify -> DEBU 3a4e Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:40.804 UTC [msp.identity] Verify -> DEBU 3a4f Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:40.804 UTC [cauthdsl] func2 -> DEBU 3a50 0xc003fa4d80 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.805 UTC [cauthdsl] func1 -> DEBU 3a51 0xc003fa4d80 gate 1556760700803020400 evaluation succeeds" -"2019-05-02 01:31:40.805 UTC [policies] Evaluate -> DEBU 3a52 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.806 UTC [policies] Evaluate -> DEBU 3a53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.807 UTC [policies] Evaluate -> DEBU 3a54 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:40.808 UTC [policies] Evaluate -> DEBU 3a55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:40.813 UTC [msp.identity] Verify -> DEBU 3a56 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:40.814 UTC [msp.identity] Verify -> DEBU 3a57 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:40.815 UTC [msp.identity] Verify -> DEBU 3a58 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:40.816 UTC [msp.identity] Verify -> DEBU 3a59 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:40.816 UTC [gossip.privdata] run -> DEBU 3a5a Start reconcile missing private info" -"2019-05-02 01:31:40.817 UTC [msp] DeserializeIdentity -> DEBU 3a5b Obtaining identity" -"2019-05-02 01:31:40.817 UTC [msp] DeserializeIdentity -> DEBU 3a5c Obtaining identity" -"2019-05-02 01:31:40.818 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a5d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:40.818 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a5e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.818 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a5f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.819 UTC [policies] Evaluate -> DEBU 3a60 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:40.819 UTC [policies] Evaluate -> DEBU 3a61 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.819 UTC [policies] Evaluate -> DEBU 3a62 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:40.820 UTC [cauthdsl] func1 -> DEBU 3a63 0xc003f10630 gate 1556760700820488100 evaluation starts" -"2019-05-02 01:31:40.820 UTC [cauthdsl] func2 -> DEBU 3a64 0xc003f10630 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.820 UTC [cauthdsl] func2 -> DEBU 3a65 0xc003f10630 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.821 UTC [cauthdsl] func2 -> DEBU 3a66 0xc003f10630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:40.821 UTC [cauthdsl] func2 -> DEBU 3a67 0xc003f10630 principal evaluation fails" -"2019-05-02 01:31:40.821 UTC [cauthdsl] func1 -> DEBU 3a68 0xc003f10630 gate 1556760700820488100 evaluation fails" -"2019-05-02 01:31:40.821 UTC [policies] Evaluate -> DEBU 3a69 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.821 UTC [policies] Evaluate -> DEBU 3a6a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.821 UTC [policies] Evaluate -> DEBU 3a6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:40.822 UTC [cauthdsl] func1 -> DEBU 3a6c 0xc003f10e70 gate 1556760700822161200 evaluation starts" -"2019-05-02 01:31:40.822 UTC [cauthdsl] func2 -> DEBU 3a6d 0xc003f10e70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.822 UTC [cauthdsl] func2 -> DEBU 3a6e 0xc003f10e70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.822 UTC [cauthdsl] func2 -> DEBU 3a6f 0xc003f10e70 principal matched by identity 0" -"2019-05-02 01:31:40.822 UTC [msp.identity] Verify -> DEBU 3a70 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:40.822 UTC [msp.identity] Verify -> DEBU 3a71 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:40.823 UTC [cauthdsl] func2 -> DEBU 3a72 0xc003f10e70 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.823 UTC [cauthdsl] func1 -> DEBU 3a73 0xc003f10e70 gate 1556760700822161200 evaluation succeeds" -"2019-05-02 01:31:40.824 UTC [policies] Evaluate -> DEBU 3a74 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.824 UTC [policies] Evaluate -> DEBU 3a75 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.824 UTC [policies] Evaluate -> DEBU 3a76 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:40.824 UTC [policies] Evaluate -> DEBU 3a77 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:40.824 UTC [gossip.gossip] handleMessage -> DEBU 3a78 Exiting" -"2019-05-02 01:31:40.824 UTC [leveldbhelper] GetIterator -> DEBU 3a79 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xf6}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" -"2019-05-02 01:31:40.824 UTC [gossip.gossip] handleMessage -> DEBU 3a7a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.824 UTC [gossip.privdata] reconcile -> DEBU 3a7b Reconciliation cycle finished successfully. no items to reconcile" -"2019-05-02 01:31:40.824 UTC [msp] DeserializeIdentity -> DEBU 3a7c Obtaining identity" -"2019-05-02 01:31:40.825 UTC [msp] DeserializeIdentity -> DEBU 3a7d Obtaining identity" -"2019-05-02 01:31:40.826 UTC [msp] DeserializeIdentity -> DEBU 3a7e Obtaining identity" -"2019-05-02 01:31:40.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a7f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:40.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a80 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a81 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.827 UTC [policies] Evaluate -> DEBU 3a82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:40.827 UTC [policies] Evaluate -> DEBU 3a83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.828 UTC [policies] Evaluate -> DEBU 3a84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:40.828 UTC [cauthdsl] func1 -> DEBU 3a85 0xc003dc89a0 gate 1556760700828120500 evaluation starts" -"2019-05-02 01:31:40.828 UTC [cauthdsl] func2 -> DEBU 3a86 0xc003dc89a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.828 UTC [cauthdsl] func2 -> DEBU 3a87 0xc003dc89a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.828 UTC [cauthdsl] func2 -> DEBU 3a88 0xc003dc89a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:40.828 UTC [cauthdsl] func2 -> DEBU 3a89 0xc003dc89a0 principal evaluation fails" -"2019-05-02 01:31:40.828 UTC [cauthdsl] func1 -> DEBU 3a8a 0xc003dc89a0 gate 1556760700828120500 evaluation fails" -"2019-05-02 01:31:40.828 UTC [policies] Evaluate -> DEBU 3a8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.828 UTC [policies] Evaluate -> DEBU 3a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.828 UTC [policies] Evaluate -> DEBU 3a8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:40.828 UTC [cauthdsl] func1 -> DEBU 3a8e 0xc003dc91e0 gate 1556760700828955200 evaluation starts" -"2019-05-02 01:31:40.829 UTC [cauthdsl] func2 -> DEBU 3a8f 0xc003dc91e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.829 UTC [cauthdsl] func2 -> DEBU 3a90 0xc003dc91e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.829 UTC [cauthdsl] func2 -> DEBU 3a91 0xc003dc91e0 principal matched by identity 0" -"2019-05-02 01:31:40.829 UTC [msp.identity] Verify -> DEBU 3a92 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:40.829 UTC [msp.identity] Verify -> DEBU 3a93 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:40.829 UTC [cauthdsl] func2 -> DEBU 3a94 0xc003dc91e0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.829 UTC [cauthdsl] func1 -> DEBU 3a95 0xc003dc91e0 gate 1556760700828955200 evaluation succeeds" -"2019-05-02 01:31:40.829 UTC [policies] Evaluate -> DEBU 3a96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.830 UTC [policies] Evaluate -> DEBU 3a97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.830 UTC [policies] Evaluate -> DEBU 3a98 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:40.830 UTC [policies] Evaluate -> DEBU 3a99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:40.831 UTC [msp.identity] Verify -> DEBU 3a9a Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:40.831 UTC [msp.identity] Verify -> DEBU 3a9b Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:40.831 UTC [msp] DeserializeIdentity -> DEBU 3a9c Obtaining identity" -"2019-05-02 01:31:40.831 UTC [msp] DeserializeIdentity -> DEBU 3a9d Obtaining identity" -"2019-05-02 01:31:40.831 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:40.831 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a9f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.832 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3aa0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.832 UTC [policies] Evaluate -> DEBU 3aa1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:40.832 UTC [policies] Evaluate -> DEBU 3aa2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.832 UTC [policies] Evaluate -> DEBU 3aa3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:40.832 UTC [cauthdsl] func1 -> DEBU 3aa4 0xc003b63140 gate 1556760700832502200 evaluation starts" -"2019-05-02 01:31:40.832 UTC [cauthdsl] func2 -> DEBU 3aa5 0xc003b63140 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.832 UTC [cauthdsl] func2 -> DEBU 3aa6 0xc003b63140 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.832 UTC [cauthdsl] func2 -> DEBU 3aa7 0xc003b63140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:40.832 UTC [cauthdsl] func2 -> DEBU 3aa8 0xc003b63140 principal evaluation fails" -"2019-05-02 01:31:40.832 UTC [cauthdsl] func1 -> DEBU 3aa9 0xc003b63140 gate 1556760700832502200 evaluation fails" -"2019-05-02 01:31:40.833 UTC [policies] Evaluate -> DEBU 3aaa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.833 UTC [policies] Evaluate -> DEBU 3aab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.833 UTC [policies] Evaluate -> DEBU 3aac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:40.833 UTC [cauthdsl] func1 -> DEBU 3aad 0xc003b63980 gate 1556760700833403600 evaluation starts" -"2019-05-02 01:31:40.833 UTC [cauthdsl] func2 -> DEBU 3aae 0xc003b63980 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.833 UTC [cauthdsl] func2 -> DEBU 3aaf 0xc003b63980 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.833 UTC [cauthdsl] func2 -> DEBU 3ab0 0xc003b63980 principal matched by identity 0" -"2019-05-02 01:31:40.833 UTC [msp.identity] Verify -> DEBU 3ab1 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:40.833 UTC [msp.identity] Verify -> DEBU 3ab2 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:40.834 UTC [cauthdsl] func2 -> DEBU 3ab3 0xc003b63980 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.834 UTC [cauthdsl] func1 -> DEBU 3ab4 0xc003b63980 gate 1556760700833403600 evaluation succeeds" -"2019-05-02 01:31:40.834 UTC [policies] Evaluate -> DEBU 3ab5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.834 UTC [policies] Evaluate -> DEBU 3ab6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.834 UTC [policies] Evaluate -> DEBU 3ab7 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:40.834 UTC [policies] Evaluate -> DEBU 3ab8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:40.835 UTC [msp.identity] Verify -> DEBU 3ab9 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:40.835 UTC [msp.identity] Verify -> DEBU 3aba Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:40.835 UTC [gossip.gossip] handleMessage -> DEBU 3abb Exiting" -"2019-05-02 01:31:40.836 UTC [gossip.gossip] handleMessage -> DEBU 3abc Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.837 UTC [msp.identity] Verify -> DEBU 3abd Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:40.838 UTC [msp.identity] Verify -> DEBU 3abe Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:40.838 UTC [msp.identity] Verify -> DEBU 3abf Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:40.838 UTC [msp.identity] Verify -> DEBU 3ac0 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:40.839 UTC [msp] DeserializeIdentity -> DEBU 3ac1 Obtaining identity" -"2019-05-02 01:31:40.839 UTC [msp] DeserializeIdentity -> DEBU 3ac2 Obtaining identity" -"2019-05-02 01:31:40.840 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ac3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:40.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ac4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ac5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.840 UTC [policies] Evaluate -> DEBU 3ac6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:40.840 UTC [policies] Evaluate -> DEBU 3ac7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.840 UTC [policies] Evaluate -> DEBU 3ac8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:40.840 UTC [cauthdsl] func1 -> DEBU 3ac9 0xc003a30a90 gate 1556760700840754700 evaluation starts" -"2019-05-02 01:31:40.841 UTC [cauthdsl] func2 -> DEBU 3aca 0xc003a30a90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.841 UTC [cauthdsl] func2 -> DEBU 3acb 0xc003a30a90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.841 UTC [cauthdsl] func2 -> DEBU 3acc 0xc003a30a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:40.841 UTC [cauthdsl] func2 -> DEBU 3acd 0xc003a30a90 principal evaluation fails" -"2019-05-02 01:31:40.841 UTC [cauthdsl] func1 -> DEBU 3ace 0xc003a30a90 gate 1556760700840754700 evaluation fails" -"2019-05-02 01:31:40.841 UTC [policies] Evaluate -> DEBU 3acf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.842 UTC [policies] Evaluate -> DEBU 3ad0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.842 UTC [policies] Evaluate -> DEBU 3ad1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:40.842 UTC [cauthdsl] func1 -> DEBU 3ad2 0xc003a312d0 gate 1556760700842295800 evaluation starts" -"2019-05-02 01:31:40.842 UTC [cauthdsl] func2 -> DEBU 3ad3 0xc003a312d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.842 UTC [cauthdsl] func2 -> DEBU 3ad4 0xc003a312d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.842 UTC [cauthdsl] func2 -> DEBU 3ad5 0xc003a312d0 principal matched by identity 0" -"2019-05-02 01:31:40.842 UTC [msp.identity] Verify -> DEBU 3ad6 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:40.842 UTC [msp.identity] Verify -> DEBU 3ad7 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:40.843 UTC [cauthdsl] func2 -> DEBU 3ad8 0xc003a312d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.843 UTC [cauthdsl] func1 -> DEBU 3ad9 0xc003a312d0 gate 1556760700842295800 evaluation succeeds" -"2019-05-02 01:31:40.843 UTC [policies] Evaluate -> DEBU 3ada Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.843 UTC [policies] Evaluate -> DEBU 3adb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.843 UTC [policies] Evaluate -> DEBU 3adc Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:40.843 UTC [policies] Evaluate -> DEBU 3add == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:40.843 UTC [msp] DeserializeIdentity -> DEBU 3ade Obtaining identity" -"2019-05-02 01:31:40.843 UTC [msp] DeserializeIdentity -> DEBU 3adf Obtaining identity" -"2019-05-02 01:31:40.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ae0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:40.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ae1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ae2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:40.844 UTC [policies] Evaluate -> DEBU 3ae3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:40.844 UTC [policies] Evaluate -> DEBU 3ae4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:40.844 UTC [policies] Evaluate -> DEBU 3ae5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:40.845 UTC [cauthdsl] func1 -> DEBU 3ae6 0xc0038a0ac0 gate 1556760700844940300 evaluation starts" -"2019-05-02 01:31:40.845 UTC [cauthdsl] func2 -> DEBU 3ae7 0xc0038a0ac0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.845 UTC [cauthdsl] func2 -> DEBU 3ae8 0xc0038a0ac0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.845 UTC [cauthdsl] func2 -> DEBU 3ae9 0xc0038a0ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:40.845 UTC [cauthdsl] func2 -> DEBU 3aea 0xc0038a0ac0 principal evaluation fails" -"2019-05-02 01:31:40.845 UTC [cauthdsl] func1 -> DEBU 3aeb 0xc0038a0ac0 gate 1556760700844940300 evaluation fails" -"2019-05-02 01:31:40.845 UTC [policies] Evaluate -> DEBU 3aec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.846 UTC [policies] Evaluate -> DEBU 3aed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:40.846 UTC [policies] Evaluate -> DEBU 3aee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:40.846 UTC [cauthdsl] func1 -> DEBU 3aef 0xc0038a1300 gate 1556760700846128600 evaluation starts" -"2019-05-02 01:31:40.846 UTC [cauthdsl] func2 -> DEBU 3af0 0xc0038a1300 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:40.846 UTC [cauthdsl] func2 -> DEBU 3af1 0xc0038a1300 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:40.847 UTC [cauthdsl] func2 -> DEBU 3af2 0xc0038a1300 principal matched by identity 0" -"2019-05-02 01:31:40.847 UTC [msp.identity] Verify -> DEBU 3af3 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:40.847 UTC [msp.identity] Verify -> DEBU 3af4 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:40.848 UTC [cauthdsl] func2 -> DEBU 3af5 0xc0038a1300 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:40.848 UTC [cauthdsl] func1 -> DEBU 3af6 0xc0038a1300 gate 1556760700846128600 evaluation succeeds" -"2019-05-02 01:31:40.848 UTC [policies] Evaluate -> DEBU 3af7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.848 UTC [policies] Evaluate -> DEBU 3af8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:40.848 UTC [policies] Evaluate -> DEBU 3af9 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:40.849 UTC [policies] Evaluate -> DEBU 3afa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:40.849 UTC [gossip.gossip] handleMessage -> DEBU 3afb Exiting" -"2019-05-02 01:31:40.916 UTC [msp] DeserializeIdentity -> DEBU 3afc Obtaining identity" -"2019-05-02 01:31:40.917 UTC [msp] DeserializeIdentity -> DEBU 3afd Obtaining identity" -"2019-05-02 01:31:40.917 UTC [gossip.pull] Hello -> DEBU 3afe Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:40.917 UTC [msp] DeserializeIdentity -> DEBU 3aff Obtaining identity" -"2019-05-02 01:31:40.917 UTC [msp] DeserializeIdentity -> DEBU 3b00 Obtaining identity" -"2019-05-02 01:31:40.918 UTC [gossip.comm] Send -> DEBU 3b01 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:40.918 UTC [gossip.comm] sendToEndpoint -> DEBU 3b02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.918 UTC [gossip.comm] sendToEndpoint -> DEBU 3b03 Exiting" -"2019-05-02 01:31:40.919 UTC [gossip.comm] func1 -> DEBU 3b04 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16780712577794422265 , Msg_type: BLOCK_MSG, digests: [4 7 5 6 8 9 1 2 3], Envelope: 61 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.920 UTC [gossip.gossip] handleMessage -> DEBU 3b05 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16780712577794422265 , Msg_type: BLOCK_MSG, digests: [4 7 5 6 8 9 1 2 3], Envelope: 61 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.921 UTC [gossip.pull] HandleMessage -> DEBU 3b06 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16780712577794422265 , Msg_type: BLOCK_MSG, digests: [4 7 5 6 8 9 1 2 3], Envelope: 61 bytes, Signature: 0 bytes" -"2019-05-02 01:31:40.921 UTC [gossip.gossip] handleMessage -> DEBU 3b07 Exiting" -"2019-05-02 01:31:41.050 UTC [gossip.comm] func1 -> DEBU 3b08 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.050 UTC [gossip.gossip] handleMessage -> DEBU 3b09 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.050 UTC [msp] DeserializeIdentity -> DEBU 3b0a Obtaining identity" -"2019-05-02 01:31:41.051 UTC [msp] DeserializeIdentity -> DEBU 3b0b Obtaining identity" -"2019-05-02 01:31:41.051 UTC [gossip.gossip] handleMessage -> DEBU 3b0c Exiting" -"2019-05-02 01:31:41.090 UTC [gossip.comm] func1 -> DEBU 3b0d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.090 UTC [gossip.gossip] handleMessage -> DEBU 3b0e Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.090 UTC [gossip.pull] HandleMessage -> DEBU 3b0f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.090 UTC [gossip.pull] SendDigest -> DEBU 3b10 Sending BLOCK_MSG digest: [3 4 2 5 6 7 8 9 1] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:41.090 UTC [gossip.gossip] handleMessage -> DEBU 3b11 Exiting" -"2019-05-02 01:31:41.276 UTC [gossip.comm] func1 -> DEBU 3b12 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.276 UTC [gossip.gossip] handleMessage -> DEBU 3b13 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.276 UTC [msp] DeserializeIdentity -> DEBU 3b14 Obtaining identity" -"2019-05-02 01:31:41.276 UTC [msp] DeserializeIdentity -> DEBU 3b15 Obtaining identity" -"2019-05-02 01:31:41.276 UTC [msp] DeserializeIdentity -> DEBU 3b16 Obtaining identity" -"2019-05-02 01:31:41.276 UTC [gossip.gossip] handleMessage -> DEBU 3b17 Exiting" -"2019-05-02 01:31:41.402 UTC [gossip.comm] func1 -> DEBU 3b18 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.402 UTC [gossip.gossip] handleMessage -> DEBU 3b19 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.403 UTC [gossip.pull] HandleMessage -> DEBU 3b1a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.404 UTC [gossip.pull] SendDigest -> DEBU 3b1b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:41.408 UTC [gossip.gossip] handleMessage -> DEBU 3b1c Exiting" -"2019-05-02 01:31:41.436 UTC [gossip.comm] func1 -> DEBU 3b1d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.436 UTC [gossip.gossip] handleMessage -> DEBU 3b1e Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.436 UTC [gossip.gossip] handleMessage -> DEBU 3b1f Exiting" -"2019-05-02 01:31:41.436 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b20 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.436 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b21 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:41.436 UTC [msp.identity] Verify -> DEBU 3b22 Verify: digest = 00000000 82 2d ab 24 09 38 af 3d fa 5a 82 a1 df 32 fd 4b |.-.$.8.=.Z...2.K| -00000010 91 b6 3b 9f 18 0b 94 25 72 13 dc b5 51 2d 9e 7a |..;....%r...Q-.z|" -"2019-05-02 01:31:41.436 UTC [msp.identity] Verify -> DEBU 3b23 Verify: sig = 00000000 30 45 02 21 00 9e c7 89 a6 55 56 d3 e3 16 4c 3a |0E.!.....UV...L:| -00000010 cb 50 51 fa c5 37 50 2d fd 95 8b b5 d0 01 47 5f |.PQ..7P-......G_| -00000020 12 28 1a 72 00 02 20 1d 45 da 54 47 84 7a 10 bb |.(.r.. .E.TG.z..| -00000030 3b 1d a6 0f d3 e8 6f 5f 6d 76 9a 8b 64 0f b3 a9 |;.....o_mv..d...| -00000040 c7 08 c2 f6 9e 2f bd |...../.|" -"2019-05-02 01:31:41.436 UTC [msp.identity] Verify -> DEBU 3b24 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:28:05.675 UTC [msp.identity] Verify -> DEBU 373a Verify: sig = 00000000 30 45 02 21 00 af 59 0a ed 19 99 7f 10 71 0a 09 |0E.!..Y......q..| +00000010 ef e0 78 a0 ab 3c 4a 5c 35 00 62 cc 0b e3 8f dc |..x.. DEBU 373b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373d updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 " +"2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 " +"2019-05-02 09:28:05.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 373f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:05.676 UTC [gossip.discovery] learnExistingMembers -> DEBU 3740 Exiting" +"2019-05-02 09:28:05.676 UTC [gossip.discovery] handleAliveMessage -> DEBU 3741 Exiting" +"2019-05-02 09:28:05.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3742 Exiting" +"2019-05-02 09:28:05.676 UTC [gossip.discovery] sendMemResponse -> DEBU 3743 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:05.676 UTC [msp] DeserializeIdentity -> DEBU 3744 Obtaining identity" +"2019-05-02 09:28:05.676 UTC [msp] DeserializeIdentity -> DEBU 3745 Obtaining identity" +"2019-05-02 09:28:05.676 UTC [gossip.comm] Send -> DEBU 3746 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:05.677 UTC [gossip.discovery] sendMemResponse -> DEBU 3747 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:28:05.677 UTC [gossip.comm] sendToEndpoint -> DEBU 3748 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.677 UTC [gossip.comm] sendToEndpoint -> DEBU 3749 Exiting" +"2019-05-02 09:28:05.694 UTC [gossip.comm] func1 -> DEBU 374a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.697 UTC [gossip.gossip] handleMessage -> DEBU 374b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.698 UTC [gossip.gossip] handleMessage -> DEBU 374c Exiting" +"2019-05-02 09:28:05.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 374d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.699 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 374e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:05.700 UTC [msp] DeserializeIdentity -> DEBU 374f Obtaining identity" +"2019-05-02 09:28:05.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3750 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:05.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3751 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:05.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3752 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:05.701 UTC [policies] Evaluate -> DEBU 3753 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:05.702 UTC [policies] Evaluate -> DEBU 3754 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:05.702 UTC [policies] Evaluate -> DEBU 3755 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:05.703 UTC [cauthdsl] func1 -> DEBU 3756 0xc0026291d0 gate 1556789285703406500 evaluation starts" +"2019-05-02 09:28:05.703 UTC [msp] DeserializeIdentity -> DEBU 3757 Obtaining identity" +"2019-05-02 09:28:05.703 UTC [msp] DeserializeIdentity -> DEBU 3758 Obtaining identity" +"2019-05-02 09:28:05.704 UTC [gossip.pull] Hello -> DEBU 3759 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:28:05.704 UTC [msp] DeserializeIdentity -> DEBU 375a Obtaining identity" +"2019-05-02 09:28:05.704 UTC [msp] DeserializeIdentity -> DEBU 375b Obtaining identity" +"2019-05-02 09:28:05.704 UTC [gossip.comm] Send -> DEBU 375d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:05.704 UTC [gossip.comm] sendToEndpoint -> DEBU 375e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.705 UTC [gossip.comm] sendToEndpoint -> DEBU 375f Exiting" +"2019-05-02 09:28:05.705 UTC [gossip.pull] Hello -> DEBU 3760 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:28:05.705 UTC [gossip.comm] Send -> DEBU 3761 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:05.705 UTC [gossip.pull] Hello -> DEBU 3762 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:28:05.705 UTC [gossip.comm] Send -> DEBU 3763 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:05.705 UTC [gossip.pull] Hello -> DEBU 3764 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:28:05.705 UTC [gossip.comm] Send -> DEBU 3765 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3766 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3767 Exiting" +"2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3768 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3769 Exiting" +"2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 376a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.706 UTC [gossip.comm] sendToEndpoint -> DEBU 376b Exiting" +"2019-05-02 09:28:05.703 UTC [cauthdsl] func2 -> DEBU 375c 0xc0026291d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:05.708 UTC [cauthdsl] func2 -> DEBU 376c 0xc0026291d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:05.708 UTC [gossip.comm] func1 -> DEBU 376d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2621721536798222730 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.708 UTC [gossip.gossip] handleMessage -> DEBU 376e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2621721536798222730 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.708 UTC [gossip.pull] HandleMessage -> DEBU 376f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2621721536798222730 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.708 UTC [gossip.gossip] handleMessage -> DEBU 3770 Exiting" +"2019-05-02 09:28:05.709 UTC [gossip.comm] func1 -> DEBU 3771 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16145687940009107059 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.709 UTC [gossip.gossip] handleMessage -> DEBU 3772 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16145687940009107059 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.709 UTC [gossip.pull] HandleMessage -> DEBU 3773 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16145687940009107059 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.709 UTC [gossip.gossip] handleMessage -> DEBU 3774 Exiting" +"2019-05-02 09:28:05.708 UTC [cauthdsl] func2 -> DEBU 3775 0xc0026291d0 principal matched by identity 0" +"2019-05-02 09:28:05.709 UTC [msp.identity] Verify -> DEBU 3776 Verify: digest = 00000000 27 b1 36 fb 51 6b 55 ff 98 b2 e5 ab 39 23 4f 33 |'.6.QkU.....9#O3| +00000010 50 92 ad 32 b1 6b e6 ce c5 b3 c9 e6 03 1c c4 e3 |P..2.k..........|" +"2019-05-02 09:28:05.709 UTC [msp.identity] Verify -> DEBU 3777 Verify: sig = 00000000 30 44 02 20 62 76 55 fd 27 ec 91 79 7b f7 78 72 |0D. bvU.'..y{.xr| +00000010 af da ee 51 00 33 4b cc d7 e5 96 1b 74 5e cc 59 |...Q.3K.....t^.Y| +00000020 4d 0a a8 0f 02 20 66 44 86 07 5a be ec 10 21 ca |M.... fD..Z...!.| +00000030 d3 a2 cb eb a1 78 6a 76 5e 81 b9 f3 26 f4 96 b4 |.....xjv^...&...| +00000040 18 8f 2f 93 bd 8c |../...|" +"2019-05-02 09:28:05.709 UTC [cauthdsl] func2 -> DEBU 3778 0xc0026291d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:05.709 UTC [cauthdsl] func1 -> DEBU 3779 0xc0026291d0 gate 1556789285703406500 evaluation succeeds" +"2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377c Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:05.710 UTC [policies] Evaluate -> DEBU 377d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:05.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 377e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 377f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3780 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 " +"2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3781 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 " +"2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3782 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:05.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 3783 Exiting" +"2019-05-02 09:28:05.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 3784 Exiting" +"2019-05-02 09:28:05.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3785 Exiting" +"2019-05-02 09:28:05.710 UTC [gossip.discovery] sendMemResponse -> DEBU 3786 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:05.710 UTC [msp] DeserializeIdentity -> DEBU 3787 Obtaining identity" +"2019-05-02 09:28:05.710 UTC [msp] DeserializeIdentity -> DEBU 3788 Obtaining identity" +"2019-05-02 09:28:05.710 UTC [msp] DeserializeIdentity -> DEBU 3789 Obtaining identity" +"2019-05-02 09:28:05.710 UTC [gossip.comm] Send -> DEBU 378a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:05.710 UTC [gossip.discovery] sendMemResponse -> DEBU 378b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:05.711 UTC [gossip.comm] sendToEndpoint -> DEBU 378c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.712 UTC [gossip.comm] sendToEndpoint -> DEBU 378d Exiting" +"2019-05-02 09:28:05.714 UTC [gossip.comm] func1 -> DEBU 378e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11157422678022721553 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.714 UTC [gossip.comm] func1 -> DEBU 378f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13684990153607220555 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.714 UTC [gossip.gossip] handleMessage -> DEBU 3790 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11157422678022721553 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.715 UTC [gossip.pull] HandleMessage -> DEBU 3791 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11157422678022721553 , Msg_type: BLOCK_MSG, digests: [8 2 4 6 7 9 1 3 5], Envelope: 61 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.715 UTC [gossip.gossip] handleMessage -> DEBU 3792 Exiting" +"2019-05-02 09:28:05.716 UTC [gossip.gossip] handleMessage -> DEBU 3793 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13684990153607220555 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.716 UTC [gossip.pull] HandleMessage -> DEBU 3794 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13684990153607220555 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:05.716 UTC [gossip.gossip] handleMessage -> DEBU 3795 Exiting" +"2019-05-02 09:28:07.322 UTC [gossip.election] waitForInterrupt -> DEBU 3796 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:28:07.322 UTC [gossip.election] IsLeader -> DEBU 3797 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:28:07.322 UTC [msp.identity] Sign -> DEBU 3798 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100B1801 " +"2019-05-02 09:28:07.322 UTC [msp.identity] Sign -> DEBU 3799 Sign: digest: 7F30746E3538A71E84D333B12392F6BDF8AF53624F0CEFB266DE0033E741D1B0 " +"2019-05-02 09:28:07.322 UTC [gossip.election] waitForInterrupt -> DEBU 379a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379b Obtaining identity" +"2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379c Obtaining identity" +"2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379d Obtaining identity" +"2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 379e Obtaining identity" +"2019-05-02 09:28:07.329 UTC [gossip.comm] Send -> DEBU 379f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 37a0 Obtaining identity" +"2019-05-02 09:28:07.329 UTC [msp] DeserializeIdentity -> DEBU 37a1 Obtaining identity" +"2019-05-02 09:28:07.329 UTC [gossip.comm] sendToEndpoint -> DEBU 37a2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-05-02 09:28:07.330 UTC [gossip.comm] sendToEndpoint -> DEBU 37a3 Exiting" +"2019-05-02 09:28:08.247 UTC [msp] DeserializeIdentity -> DEBU 37a4 Obtaining identity" +"2019-05-02 09:28:08.247 UTC [msp] DeserializeIdentity -> DEBU 37a5 Obtaining identity" +"2019-05-02 09:28:08.248 UTC [gossip.comm] Send -> DEBU 37a6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37a7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37a8 Exiting" +"2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37aa Exiting" +"2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37ab Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 37ac Exiting" +"2019-05-02 09:28:08.250 UTC [gossip.comm] func1 -> DEBU 37ad Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.252 UTC [gossip.gossip] handleMessage -> DEBU 37b0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.253 UTC [msp] DeserializeIdentity -> DEBU 37b1 Obtaining identity" +"2019-05-02 09:28:08.251 UTC [gossip.comm] func1 -> DEBU 37ae Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.251 UTC [gossip.comm] func1 -> DEBU 37af Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.254 UTC [msp] DeserializeIdentity -> DEBU 37b2 Obtaining identity" +"2019-05-02 09:28:08.255 UTC [msp] DeserializeIdentity -> DEBU 37b3 Obtaining identity" +"2019-05-02 09:28:08.255 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:08.255 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.256 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.256 UTC [policies] Evaluate -> DEBU 37b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.257 UTC [policies] Evaluate -> DEBU 37b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.257 UTC [policies] Evaluate -> DEBU 37b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37ba Obtaining identity" +"2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37bb Obtaining identity" +"2019-05-02 09:28:08.258 UTC [gossip.comm] Send -> DEBU 37bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +"2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37bd Obtaining identity" +"2019-05-02 09:28:08.258 UTC [msp] DeserializeIdentity -> DEBU 37be Obtaining identity" +"2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c0 Exiting" +"2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c2 Exiting" +"2019-05-02 09:28:08.259 UTC [gossip.comm] sendToEndpoint -> DEBU 37c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1556789236283076400 seq_num:1556789284434455700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-05-02 09:28:08.260 UTC [gossip.comm] sendToEndpoint -> DEBU 37c4 Exiting" +"2019-05-02 09:28:08.261 UTC [cauthdsl] func1 -> DEBU 37c5 0xc00328b390 gate 1556789288261762500 evaluation starts" +"2019-05-02 09:28:08.262 UTC [cauthdsl] func2 -> DEBU 37c6 0xc00328b390 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.262 UTC [cauthdsl] func2 -> DEBU 37c7 0xc00328b390 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:08.263 UTC [cauthdsl] func2 -> DEBU 37c8 0xc00328b390 principal matched by identity 0" +"2019-05-02 09:28:08.263 UTC [msp.identity] Verify -> DEBU 37c9 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:08.264 UTC [msp.identity] Verify -> DEBU 37ca Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:08.265 UTC [cauthdsl] func2 -> DEBU 37cb 0xc00328b390 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.265 UTC [cauthdsl] func1 -> DEBU 37cc 0xc00328b390 gate 1556789288261762500 evaluation succeeds" +"2019-05-02 09:28:08.265 UTC [policies] Evaluate -> DEBU 37cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.266 UTC [policies] Evaluate -> DEBU 37ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.266 UTC [policies] Evaluate -> DEBU 37cf Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:08.266 UTC [policies] Evaluate -> DEBU 37d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.267 UTC [msp.identity] Verify -> DEBU 37d1 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:08.267 UTC [msp.identity] Verify -> DEBU 37d2 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:08.268 UTC [msp] DeserializeIdentity -> DEBU 37d3 Obtaining identity" +"2019-05-02 09:28:08.268 UTC [msp] DeserializeIdentity -> DEBU 37d4 Obtaining identity" +"2019-05-02 09:28:08.269 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:08.269 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37d6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.269 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37d7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.269 UTC [policies] Evaluate -> DEBU 37d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.269 UTC [policies] Evaluate -> DEBU 37d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.269 UTC [policies] Evaluate -> DEBU 37da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.269 UTC [cauthdsl] func1 -> DEBU 37db 0xc0042d3280 gate 1556789288269829900 evaluation starts" +"2019-05-02 09:28:08.269 UTC [cauthdsl] func2 -> DEBU 37dc 0xc0042d3280 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.269 UTC [cauthdsl] func2 -> DEBU 37dd 0xc0042d3280 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:08.269 UTC [cauthdsl] func2 -> DEBU 37de 0xc0042d3280 principal matched by identity 0" +"2019-05-02 09:28:08.270 UTC [msp.identity] Verify -> DEBU 37df Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:08.270 UTC [msp.identity] Verify -> DEBU 37e0 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:08.270 UTC [cauthdsl] func2 -> DEBU 37e1 0xc0042d3280 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.270 UTC [cauthdsl] func1 -> DEBU 37e2 0xc0042d3280 gate 1556789288269829900 evaluation succeeds" +"2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e5 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:08.270 UTC [policies] Evaluate -> DEBU 37e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.273 UTC [msp.identity] Verify -> DEBU 37e7 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +"2019-05-02 09:28:08.274 UTC [msp.identity] Verify -> DEBU 37e8 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +00000040 b0 a3 de d0 53 b0 |....S.|" +"2019-05-02 09:28:08.275 UTC [gossip.gossip] handleMessage -> DEBU 37e9 Exiting" +"2019-05-02 09:28:08.275 UTC [gossip.gossip] handleMessage -> DEBU 37ea Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.275 UTC [msp] DeserializeIdentity -> DEBU 37eb Obtaining identity" +"2019-05-02 09:28:08.276 UTC [msp] DeserializeIdentity -> DEBU 37ec Obtaining identity" +"2019-05-02 09:28:08.277 UTC [msp] DeserializeIdentity -> DEBU 37ed Obtaining identity" +"2019-05-02 09:28:08.278 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37ee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:08.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ef Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37f0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.281 UTC [policies] Evaluate -> DEBU 37f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.282 UTC [policies] Evaluate -> DEBU 37f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.282 UTC [policies] Evaluate -> DEBU 37f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.283 UTC [cauthdsl] func1 -> DEBU 37f4 0xc0024b94b0 gate 1556789288283540800 evaluation starts" +"2019-05-02 09:28:08.283 UTC [cauthdsl] func2 -> DEBU 37f5 0xc0024b94b0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.284 UTC [cauthdsl] func2 -> DEBU 37f6 0xc0024b94b0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:08.286 UTC [cauthdsl] func2 -> DEBU 37f7 0xc0024b94b0 principal matched by identity 0" +"2019-05-02 09:28:08.286 UTC [msp.identity] Verify -> DEBU 37f8 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:08.287 UTC [msp.identity] Verify -> DEBU 37f9 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:08.288 UTC [cauthdsl] func2 -> DEBU 37fa 0xc0024b94b0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.289 UTC [cauthdsl] func1 -> DEBU 37fb 0xc0024b94b0 gate 1556789288283540800 evaluation succeeds" +"2019-05-02 09:28:08.292 UTC [policies] Evaluate -> DEBU 37fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.292 UTC [policies] Evaluate -> DEBU 37fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.293 UTC [policies] Evaluate -> DEBU 37fe Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:08.293 UTC [policies] Evaluate -> DEBU 37ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.294 UTC [msp.identity] Verify -> DEBU 3800 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:08.295 UTC [msp.identity] Verify -> DEBU 3801 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:08.295 UTC [msp] DeserializeIdentity -> DEBU 3802 Obtaining identity" +"2019-05-02 09:28:08.296 UTC [msp] DeserializeIdentity -> DEBU 3803 Obtaining identity" +"2019-05-02 09:28:08.296 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3804 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:08.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3805 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.297 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3806 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.298 UTC [policies] Evaluate -> DEBU 3807 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.298 UTC [policies] Evaluate -> DEBU 3808 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.299 UTC [policies] Evaluate -> DEBU 3809 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.300 UTC [cauthdsl] func1 -> DEBU 380a 0xc0025013a0 gate 1556789288300251500 evaluation starts" +"2019-05-02 09:28:08.300 UTC [cauthdsl] func2 -> DEBU 380b 0xc0025013a0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.301 UTC [cauthdsl] func2 -> DEBU 380c 0xc0025013a0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:08.302 UTC [cauthdsl] func2 -> DEBU 380d 0xc0025013a0 principal matched by identity 0" +"2019-05-02 09:28:08.303 UTC [msp.identity] Verify -> DEBU 380e Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:08.304 UTC [msp.identity] Verify -> DEBU 380f Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:08.305 UTC [cauthdsl] func2 -> DEBU 3810 0xc0025013a0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.306 UTC [cauthdsl] func1 -> DEBU 3811 0xc0025013a0 gate 1556789288300251500 evaluation succeeds" +"2019-05-02 09:28:08.306 UTC [policies] Evaluate -> DEBU 3812 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.307 UTC [policies] Evaluate -> DEBU 3813 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.307 UTC [policies] Evaluate -> DEBU 3814 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:08.308 UTC [policies] Evaluate -> DEBU 3815 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.309 UTC [msp.identity] Verify -> DEBU 3816 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +"2019-05-02 09:28:08.311 UTC [msp.identity] Verify -> DEBU 3817 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +00000040 b0 a3 de d0 53 b0 |....S.|" +"2019-05-02 09:28:08.313 UTC [gossip.gossip] handleMessage -> DEBU 3818 Exiting" +"2019-05-02 09:28:08.314 UTC [gossip.gossip] handleMessage -> DEBU 3819 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.315 UTC [msp.identity] Verify -> DEBU 381a Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:08.316 UTC [msp.identity] Verify -> DEBU 381b Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:08.317 UTC [msp] DeserializeIdentity -> DEBU 381c Obtaining identity" +"2019-05-02 09:28:08.317 UTC [msp] DeserializeIdentity -> DEBU 381d Obtaining identity" +"2019-05-02 09:28:08.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 381e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:08.319 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 381f Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.319 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3820 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.320 UTC [policies] Evaluate -> DEBU 3821 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.320 UTC [policies] Evaluate -> DEBU 3822 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.320 UTC [policies] Evaluate -> DEBU 3823 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.321 UTC [cauthdsl] func1 -> DEBU 3824 0xc002c65bf0 gate 1556789288321352000 evaluation starts" +"2019-05-02 09:28:08.321 UTC [cauthdsl] func2 -> DEBU 3825 0xc002c65bf0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.322 UTC [cauthdsl] func2 -> DEBU 3826 0xc002c65bf0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:08.322 UTC [cauthdsl] func2 -> DEBU 3827 0xc002c65bf0 principal matched by identity 0" +"2019-05-02 09:28:08.322 UTC [msp.identity] Verify -> DEBU 3828 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:08.324 UTC [msp.identity] Verify -> DEBU 3829 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:08.325 UTC [cauthdsl] func2 -> DEBU 382a 0xc002c65bf0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.326 UTC [cauthdsl] func1 -> DEBU 382b 0xc002c65bf0 gate 1556789288321352000 evaluation succeeds" +"2019-05-02 09:28:08.327 UTC [policies] Evaluate -> DEBU 382c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.327 UTC [policies] Evaluate -> DEBU 382d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.327 UTC [policies] Evaluate -> DEBU 382e Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:08.328 UTC [policies] Evaluate -> DEBU 382f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.329 UTC [msp.identity] Verify -> DEBU 3830 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +"2019-05-02 09:28:08.329 UTC [msp.identity] Verify -> DEBU 3831 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +00000040 b0 a3 de d0 53 b0 |....S.|" +"2019-05-02 09:28:08.330 UTC [msp] DeserializeIdentity -> DEBU 3832 Obtaining identity" +"2019-05-02 09:28:08.331 UTC [msp] DeserializeIdentity -> DEBU 3833 Obtaining identity" +"2019-05-02 09:28:08.331 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3834 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:08.332 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3835 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.332 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3836 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.334 UTC [policies] Evaluate -> DEBU 3837 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.335 UTC [policies] Evaluate -> DEBU 3838 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.336 UTC [policies] Evaluate -> DEBU 3839 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.336 UTC [cauthdsl] func1 -> DEBU 383a 0xc003077ae0 gate 1556789288336687100 evaluation starts" +"2019-05-02 09:28:08.337 UTC [cauthdsl] func2 -> DEBU 383b 0xc003077ae0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.337 UTC [cauthdsl] func2 -> DEBU 383c 0xc003077ae0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:08.338 UTC [cauthdsl] func2 -> DEBU 383d 0xc003077ae0 principal matched by identity 0" +"2019-05-02 09:28:08.338 UTC [msp.identity] Verify -> DEBU 383e Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:08.338 UTC [msp.identity] Verify -> DEBU 383f Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:08.339 UTC [cauthdsl] func2 -> DEBU 3840 0xc003077ae0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.340 UTC [cauthdsl] func1 -> DEBU 3841 0xc003077ae0 gate 1556789288336687100 evaluation succeeds" +"2019-05-02 09:28:08.340 UTC [policies] Evaluate -> DEBU 3842 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.340 UTC [policies] Evaluate -> DEBU 3843 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.341 UTC [policies] Evaluate -> DEBU 3844 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:08.341 UTC [policies] Evaluate -> DEBU 3845 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.341 UTC [gossip.gossip] handleMessage -> DEBU 3846 Exiting" +"2019-05-02 09:28:08.504 UTC [gossip.comm] func1 -> DEBU 3847 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.504 UTC [gossip.gossip] handleMessage -> DEBU 3848 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.505 UTC [msp] DeserializeIdentity -> DEBU 3849 Obtaining identity" +"2019-05-02 09:28:08.505 UTC [msp] DeserializeIdentity -> DEBU 384a Obtaining identity" +"2019-05-02 09:28:08.506 UTC [gossip.gossip] handleMessage -> DEBU 384b Exiting" +"2019-05-02 09:28:08.567 UTC [gossip.comm] func1 -> DEBU 384c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.567 UTC [gossip.gossip] handleMessage -> DEBU 384d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.568 UTC [gossip.pull] HandleMessage -> DEBU 384e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.568 UTC [gossip.pull] SendDigest -> DEBU 384f Sending BLOCK_MSG digest: [6 7 8 1 2 3 4 5 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:08.568 UTC [gossip.gossip] handleMessage -> DEBU 3850 Exiting" +"2019-05-02 09:28:08.753 UTC [gossip.comm] func1 -> DEBU 3851 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.754 UTC [gossip.gossip] handleMessage -> DEBU 3852 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.755 UTC [msp] DeserializeIdentity -> DEBU 3853 Obtaining identity" +"2019-05-02 09:28:08.755 UTC [msp] DeserializeIdentity -> DEBU 3854 Obtaining identity" +"2019-05-02 09:28:08.755 UTC [msp] DeserializeIdentity -> DEBU 3855 Obtaining identity" +"2019-05-02 09:28:08.755 UTC [gossip.gossip] handleMessage -> DEBU 3856 Exiting" +"2019-05-02 09:28:08.807 UTC [gossip.comm] func1 -> DEBU 3857 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.807 UTC [gossip.gossip] handleMessage -> DEBU 3858 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.807 UTC [gossip.gossip] handleMessage -> DEBU 3859 Exiting" +"2019-05-02 09:28:08.807 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.807 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 385b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:08.808 UTC [msp] DeserializeIdentity -> DEBU 385c Obtaining identity" +"2019-05-02 09:28:08.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 385d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:08.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 385e Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 385f Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:08.808 UTC [policies] Evaluate -> DEBU 3860 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:08.808 UTC [policies] Evaluate -> DEBU 3861 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:08.809 UTC [policies] Evaluate -> DEBU 3862 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:08.809 UTC [cauthdsl] func1 -> DEBU 3863 0xc003f098d0 gate 1556789288809414900 evaluation starts" +"2019-05-02 09:28:08.809 UTC [cauthdsl] func2 -> DEBU 3864 0xc003f098d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:08.809 UTC [cauthdsl] func2 -> DEBU 3865 0xc003f098d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:08.809 UTC [cauthdsl] func2 -> DEBU 3866 0xc003f098d0 principal matched by identity 0" +"2019-05-02 09:28:08.810 UTC [msp.identity] Verify -> DEBU 3867 Verify: digest = 00000000 a1 75 1b 11 26 e1 38 06 9a 6f a3 62 38 56 57 94 |.u..&.8..o.b8VW.| +00000010 0b ca 59 e6 19 28 49 fe 27 9b 1a c6 4d 33 7d f9 |..Y..(I.'...M3}.|" +"2019-05-02 09:28:08.810 UTC [msp.identity] Verify -> DEBU 3868 Verify: sig = 00000000 30 45 02 21 00 f2 11 27 85 de f2 2b 3d 77 4e c9 |0E.!...'...+=wN.| +00000010 b3 da 02 e6 b2 05 10 e4 fa a3 77 5e 17 40 ab 14 |..........w^.@..| +00000020 6e e0 f4 64 35 02 20 46 16 b5 c7 ea 1a 54 7b 38 |n..d5. F.....T{8| +00000030 37 92 21 c3 42 94 76 aa fe 15 43 5c b1 8f 45 a9 |7.!.B.v...C\..E.| +00000040 47 dd 46 72 eb 70 57 |G.Fr.pW|" +"2019-05-02 09:28:08.810 UTC [cauthdsl] func2 -> DEBU 3869 0xc003f098d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:08.811 UTC [cauthdsl] func1 -> DEBU 386a 0xc003f098d0 gate 1556789288809414900 evaluation succeeds" +"2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386d Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:08.811 UTC [policies] Evaluate -> DEBU 386e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:08.811 UTC [gossip.discovery] handleAliveMessage -> DEBU 386f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3870 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3871 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 " +"2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3872 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 " +"2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3873 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:08.812 UTC [gossip.discovery] learnExistingMembers -> DEBU 3874 Exiting" +"2019-05-02 09:28:08.812 UTC [gossip.discovery] handleAliveMessage -> DEBU 3875 Exiting" +"2019-05-02 09:28:08.813 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3876 Exiting" +"2019-05-02 09:28:08.817 UTC [gossip.comm] func1 -> DEBU 3877 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.817 UTC [gossip.gossip] handleMessage -> DEBU 3879 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.818 UTC [gossip.gossip] handleMessage -> DEBU 387a Exiting" +"2019-05-02 09:28:08.817 UTC [gossip.comm] func1 -> DEBU 3878 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.818 UTC [gossip.discovery] handleMsgFromComm -> DEBU 387b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.819 UTC [gossip.discovery] handleMsgFromComm -> DEBU 387e Exiting" +"2019-05-02 09:28:08.818 UTC [msp] DeserializeIdentity -> DEBU 387c Obtaining identity" +"2019-05-02 09:28:08.819 UTC [msp] DeserializeIdentity -> DEBU 387f Obtaining identity" +"2019-05-02 09:28:08.819 UTC [gossip.gossip] handleMessage -> DEBU 387d Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.820 UTC [gossip.gossip] handleMessage -> DEBU 3881 Exiting" +"2019-05-02 09:28:08.819 UTC [msp] DeserializeIdentity -> DEBU 3880 Obtaining identity" +"2019-05-02 09:28:08.820 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3882 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.820 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3883 Exiting" +"2019-05-02 09:28:08.821 UTC [msp] DeserializeIdentity -> DEBU 3884 Obtaining identity" +"2019-05-02 09:28:08.821 UTC [msp] DeserializeIdentity -> DEBU 3885 Obtaining identity" +"2019-05-02 09:28:08.821 UTC [msp] DeserializeIdentity -> DEBU 3886 Obtaining identity" +"2019-05-02 09:28:08.822 UTC [msp] DeserializeIdentity -> DEBU 3887 Obtaining identity" +"2019-05-02 09:28:08.822 UTC [gossip.comm] Send -> DEBU 3888 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:08.822 UTC [gossip.comm] sendToEndpoint -> DEBU 3889 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.823 UTC [gossip.comm] sendToEndpoint -> DEBU 388a Exiting" +"2019-05-02 09:28:08.823 UTC [msp] DeserializeIdentity -> DEBU 388b Obtaining identity" +"2019-05-02 09:28:08.823 UTC [gossip.comm] Send -> DEBU 388c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:08.824 UTC [gossip.comm] sendToEndpoint -> DEBU 388d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:08.825 UTC [gossip.comm] sendToEndpoint -> DEBU 388e Exiting" +"2019-05-02 09:28:08.981 UTC [gossip.comm] func1 -> DEBU 388f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.981 UTC [gossip.gossip] handleMessage -> DEBU 3890 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:08.981 UTC [msp] DeserializeIdentity -> DEBU 3891 Obtaining identity" +"2019-05-02 09:28:08.981 UTC [msp] DeserializeIdentity -> DEBU 3892 Obtaining identity" +"2019-05-02 09:28:08.982 UTC [msp] DeserializeIdentity -> DEBU 3893 Obtaining identity" +"2019-05-02 09:28:08.982 UTC [gossip.gossip] handleMessage -> DEBU 3894 Exiting" +"2019-05-02 09:28:09.054 UTC [msp.identity] Sign -> DEBU 3895 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD151029 " +"2019-05-02 09:28:09.054 UTC [msp.identity] Sign -> DEBU 3896 Sign: digest: 73B8DC8ED20B5D216C16DA8D0769521CD788ED38DA01E5477397329AE90110EF " +"2019-05-02 09:28:09.055 UTC [msp.identity] Sign -> DEBU 3897 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:28:09.055 UTC [msp.identity] Sign -> DEBU 3898 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:28:09.055 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3899 Sleeping 5s" +"2019-05-02 09:28:09.060 UTC [msp] DeserializeIdentity -> DEBU 389a Obtaining identity" +"2019-05-02 09:28:09.060 UTC [msp] DeserializeIdentity -> DEBU 389b Obtaining identity" +"2019-05-02 09:28:09.061 UTC [msp] DeserializeIdentity -> DEBU 389c Obtaining identity" +"2019-05-02 09:28:09.061 UTC [gossip.comm] Send -> DEBU 389d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:09.061 UTC [gossip.comm] Send -> DEBU 389e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:09.061 UTC [msp] DeserializeIdentity -> DEBU 389f Obtaining identity" +"2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:09.062 UTC [gossip.comm] Send -> DEBU 38a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.061 UTC [gossip.comm] sendToEndpoint -> DEBU 38a0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a6 Exiting" +"2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a3 Exiting" +"2019-05-02 09:28:09.062 UTC [gossip.comm] sendToEndpoint -> DEBU 38a5 Exiting" +"2019-05-02 09:28:09.097 UTC [gossip.comm] func1 -> DEBU 38a7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:09.097 UTC [gossip.gossip] handleMessage -> DEBU 38a8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:09.097 UTC [gossip.gossip] handleMessage -> DEBU 38a9 Exiting" +"2019-05-02 09:28:09.097 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:09.098 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38ab Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:09.099 UTC [msp.identity] Verify -> DEBU 38ac Verify: digest = 00000000 34 1f 66 70 48 e7 de d8 4a 0e f1 8d 7f 75 4d 83 |4.fpH...J....uM.| +00000010 a6 16 25 4e 7b a6 bf 83 e4 98 ca 88 c8 4c f3 f0 |..%N{........L..|" +"2019-05-02 09:28:09.099 UTC [msp.identity] Verify -> DEBU 38ad Verify: sig = 00000000 30 45 02 21 00 b1 e3 f6 11 c6 94 b5 1b 98 9c b6 |0E.!............| +00000010 0d 2a 6c d4 7c 98 a6 0e e9 f5 8e fb f6 39 4d 36 |.*l.|........9M6| +00000020 82 10 9a 90 0f 02 20 18 af e8 d6 1a f8 b9 bb 88 |...... .........| +00000030 43 19 ab 8f df 9e 28 d2 cd 45 bd f9 b2 56 0f a2 |C.....(..E...V..| +00000040 bb b3 af 5c 1a 18 24 |...\..$|" +"2019-05-02 09:28:09.100 UTC [msp.identity] Verify -> DEBU 38ae Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:41.437 UTC [msp.identity] Verify -> DEBU 3b25 Verify: sig = 00000000 30 44 02 20 66 b1 2d b6 cf e9 4b 71 ab cc 4c 46 |0D. f.-...Kq..LF| -00000010 0f 94 78 4a a4 fe 31 09 fa 24 c6 c4 2e 4f 92 83 |..xJ..1..$...O..| -00000020 2d 60 f3 0e 02 20 1f 27 cf 8e 4c 71 52 32 72 db |-`... .'..LqR2r.| -00000030 8f a7 0d 74 e1 83 36 dd 47 d1 93 cf 4d 4c 6a d8 |...t..6.G...MLj.| -00000040 b1 53 80 f1 20 60 |.S.. `|" -"2019-05-02 01:31:41.437 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b26 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:41.437 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b27 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:31:41.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b28 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 " -"2019-05-02 01:31:41.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b29 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 " -"2019-05-02 01:31:41.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b2a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:41.440 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b2b Exiting" -"2019-05-02 01:31:41.440 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b2c Exiting" -"2019-05-02 01:31:41.440 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b2d Exiting" -"2019-05-02 01:31:41.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3b2e Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:41.440 UTC [msp] DeserializeIdentity -> DEBU 3b2f Obtaining identity" -"2019-05-02 01:31:41.440 UTC [msp] DeserializeIdentity -> DEBU 3b30 Obtaining identity" -"2019-05-02 01:31:41.440 UTC [gossip.comm] Send -> DEBU 3b31 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:41.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3b32 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:41.441 UTC [gossip.comm] sendToEndpoint -> DEBU 3b33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.441 UTC [gossip.comm] sendToEndpoint -> DEBU 3b34 Exiting" -"2019-05-02 01:31:41.497 UTC [gossip.comm] func1 -> DEBU 3b35 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.497 UTC [gossip.gossip] handleMessage -> DEBU 3b36 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.497 UTC [gossip.pull] HandleMessage -> DEBU 3b37 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.497 UTC [msp] DeserializeIdentity -> DEBU 3b38 Obtaining identity" -"2019-05-02 01:31:41.497 UTC [msp] DeserializeIdentity -> DEBU 3b39 Obtaining identity" -"2019-05-02 01:31:41.497 UTC [msp] DeserializeIdentity -> DEBU 3b3a Obtaining identity" -"2019-05-02 01:31:41.497 UTC [msp] DeserializeIdentity -> DEBU 3b3b Obtaining identity" -"2019-05-02 01:31:41.497 UTC [msp] DeserializeIdentity -> DEBU 3b3c Obtaining identity" -"2019-05-02 01:31:41.498 UTC [msp] DeserializeIdentity -> DEBU 3b3d Obtaining identity" -"2019-05-02 01:31:41.498 UTC [gossip.pull] SendDigest -> DEBU 3b3e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:41.498 UTC [gossip.gossip] handleMessage -> DEBU 3b3f Exiting" -"2019-05-02 01:31:41.525 UTC [gossip.comm] func1 -> DEBU 3b40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.525 UTC [gossip.gossip] handleMessage -> DEBU 3b41 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.525 UTC [gossip.gossip] handleMessage -> DEBU 3b42 Exiting" -"2019-05-02 01:31:41.525 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.526 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b44 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:41.526 UTC [msp] DeserializeIdentity -> DEBU 3b45 Obtaining identity" -"2019-05-02 01:31:41.526 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:41.526 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b47 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:41.526 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b48 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b49 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b4a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:41.526 UTC [cauthdsl] func1 -> DEBU 3b4c 0xc0035cd280 gate 1556760701526437900 evaluation starts" -"2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b4d 0xc0035cd280 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b4e 0xc0035cd280 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b4f 0xc0035cd280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b50 0xc0035cd280 principal evaluation fails" -"2019-05-02 01:31:41.526 UTC [cauthdsl] func1 -> DEBU 3b51 0xc0035cd280 gate 1556760701526437900 evaluation fails" -"2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b52 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:41.526 UTC [policies] Evaluate -> DEBU 3b54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:41.526 UTC [cauthdsl] func1 -> DEBU 3b55 0xc0035cdaf0 gate 1556760701526783300 evaluation starts" -"2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b56 0xc0035cdaf0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b57 0xc0035cdaf0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:41.526 UTC [cauthdsl] func2 -> DEBU 3b58 0xc0035cdaf0 principal matched by identity 0" -"2019-05-02 01:31:41.526 UTC [msp.identity] Verify -> DEBU 3b59 Verify: digest = 00000000 69 95 5e e9 5d f4 dc 43 93 b8 7f 5d e1 69 ff 34 |i.^.]..C...].i.4| -00000010 ec fa a2 32 8b 7a 9d fd 17 60 57 8c fc 0d a2 f5 |...2.z...`W.....|" -"2019-05-02 01:31:41.526 UTC [msp.identity] Verify -> DEBU 3b5a Verify: sig = 00000000 30 45 02 21 00 fe e6 eb db 19 12 e9 91 3b ea 32 |0E.!.........;.2| -00000010 3c a1 e6 6b 78 56 ee 31 ce c6 3c c0 c2 93 05 92 |<..kxV.1..<.....| -00000020 00 78 de 01 c0 02 20 6a 67 78 8b df dd 09 9c 80 |.x.... jgx......| -00000030 e6 23 9d 95 6d 76 71 b6 45 5b a2 33 f5 c0 10 87 |.#..mvq.E[.3....| -00000040 60 f8 ab f8 4e 56 ef |`...NV.|" -"2019-05-02 01:31:41.527 UTC [cauthdsl] func2 -> DEBU 3b5b 0xc0035cdaf0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:41.527 UTC [cauthdsl] func1 -> DEBU 3b5c 0xc0035cdaf0 gate 1556760701526783300 evaluation succeeds" -"2019-05-02 01:31:41.527 UTC [policies] Evaluate -> DEBU 3b5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:41.527 UTC [policies] Evaluate -> DEBU 3b5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:41.527 UTC [policies] Evaluate -> DEBU 3b5f Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:41.527 UTC [policies] Evaluate -> DEBU 3b60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:41.527 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b61 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:41.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b62 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:41.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b63 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 " -"2019-05-02 01:31:41.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b64 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 " -"2019-05-02 01:31:41.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b65 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:41.527 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b66 Exiting" -"2019-05-02 01:31:41.527 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b67 Exiting" -"2019-05-02 01:31:41.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b68 Exiting" -"2019-05-02 01:31:41.527 UTC [gossip.discovery] sendMemResponse -> DEBU 3b69 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:41.527 UTC [msp] DeserializeIdentity -> DEBU 3b6a Obtaining identity" -"2019-05-02 01:31:41.533 UTC [msp] DeserializeIdentity -> DEBU 3b6b Obtaining identity" -"2019-05-02 01:31:41.533 UTC [msp] DeserializeIdentity -> DEBU 3b6c Obtaining identity" -"2019-05-02 01:31:41.533 UTC [gossip.comm] Send -> DEBU 3b6d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:41.533 UTC [gossip.discovery] sendMemResponse -> DEBU 3b6e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:41.533 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.533 UTC [gossip.comm] sendToEndpoint -> DEBU 3b70 Exiting" -"2019-05-02 01:31:41.540 UTC [gossip.comm] func1 -> DEBU 3b71 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.541 UTC [gossip.gossip] handleMessage -> DEBU 3b72 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.542 UTC [msp] DeserializeIdentity -> DEBU 3b73 Obtaining identity" -"2019-05-02 01:31:41.542 UTC [msp] DeserializeIdentity -> DEBU 3b74 Obtaining identity" -"2019-05-02 01:31:41.543 UTC [msp] DeserializeIdentity -> DEBU 3b75 Obtaining identity" -"2019-05-02 01:31:41.559 UTC [gossip.gossip] handleMessage -> DEBU 3b76 Exiting" -"2019-05-02 01:31:41.713 UTC [gossip.comm] func1 -> DEBU 3b77 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.713 UTC [gossip.gossip] handleMessage -> DEBU 3b78 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.713 UTC [gossip.pull] HandleMessage -> DEBU 3b79 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7a Obtaining identity" -"2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7b Obtaining identity" -"2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7c Obtaining identity" -"2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7d Obtaining identity" -"2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7e Obtaining identity" -"2019-05-02 01:31:41.713 UTC [msp] DeserializeIdentity -> DEBU 3b7f Obtaining identity" -"2019-05-02 01:31:41.713 UTC [gossip.pull] SendDigest -> DEBU 3b80 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:41.713 UTC [gossip.gossip] handleMessage -> DEBU 3b81 Exiting" -"2019-05-02 01:31:41.817 UTC [gossip.pull] Hello -> DEBU 3b82 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:41.818 UTC [gossip.comm] Send -> DEBU 3b83 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:41.818 UTC [gossip.pull] Hello -> DEBU 3b84 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:41.818 UTC [gossip.comm] Send -> DEBU 3b85 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:41.818 UTC [gossip.pull] Hello -> DEBU 3b86 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:41.818 UTC [gossip.comm] Send -> DEBU 3b87 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b88 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b89 Exiting" -"2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8b Exiting" -"2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.818 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8d Exiting" -"2019-05-02 01:31:41.821 UTC [gossip.comm] func1 -> DEBU 3b8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12624842504188450777 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.821 UTC [gossip.gossip] handleMessage -> DEBU 3b8f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12624842504188450777 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.821 UTC [gossip.pull] HandleMessage -> DEBU 3b90 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12624842504188450777 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.821 UTC [gossip.gossip] handleMessage -> DEBU 3b91 Exiting" -"2019-05-02 01:31:41.821 UTC [gossip.comm] func1 -> DEBU 3b92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4313158200747421519 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.821 UTC [gossip.gossip] handleMessage -> DEBU 3b93 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4313158200747421519 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.821 UTC [gossip.pull] HandleMessage -> DEBU 3b94 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4313158200747421519 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.822 UTC [gossip.gossip] handleMessage -> DEBU 3b95 Exiting" -"2019-05-02 01:31:41.824 UTC [gossip.comm] func1 -> DEBU 3b96 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11644631687202618761 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.825 UTC [gossip.gossip] handleMessage -> DEBU 3b97 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11644631687202618761 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.825 UTC [gossip.pull] HandleMessage -> DEBU 3b98 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11644631687202618761 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.825 UTC [gossip.gossip] handleMessage -> DEBU 3b99 Exiting" -"2019-05-02 01:31:41.874 UTC [gossip.comm] func1 -> DEBU 3b9a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.874 UTC [gossip.gossip] handleMessage -> DEBU 3b9b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.874 UTC [gossip.gossip] handleMessage -> DEBU 3b9c Exiting" -"2019-05-02 01:31:41.874 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b9d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b9e Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:41.874 UTC [msp] DeserializeIdentity -> DEBU 3b9f Obtaining identity" -"2019-05-02 01:31:41.874 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ba0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:41.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:41.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3ba3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3ba4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3ba5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:41.875 UTC [cauthdsl] func1 -> DEBU 3ba6 0xc0025049a0 gate 1556760701875117700 evaluation starts" -"2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3ba7 0xc0025049a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3ba8 0xc0025049a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3ba9 0xc0025049a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3baa 0xc0025049a0 principal evaluation fails" -"2019-05-02 01:31:41.875 UTC [cauthdsl] func1 -> DEBU 3bab 0xc0025049a0 gate 1556760701875117700 evaluation fails" -"2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3bac Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3bad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:41.875 UTC [policies] Evaluate -> DEBU 3bae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:41.875 UTC [cauthdsl] func1 -> DEBU 3baf 0xc0025051e0 gate 1556760701875463600 evaluation starts" -"2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3bb0 0xc0025051e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3bb1 0xc0025051e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:41.875 UTC [cauthdsl] func2 -> DEBU 3bb2 0xc0025051e0 principal matched by identity 0" -"2019-05-02 01:31:41.875 UTC [msp.identity] Verify -> DEBU 3bb3 Verify: digest = 00000000 f2 99 3b 66 c5 e4 eb 9e 50 6c 98 2a 21 cb fb 0a |..;f....Pl.*!...| -00000010 e7 dc ea 95 49 40 92 9b 99 cc 9d f8 3b d6 50 88 |....I@......;.P.|" -"2019-05-02 01:31:41.875 UTC [msp.identity] Verify -> DEBU 3bb4 Verify: sig = 00000000 30 44 02 20 46 11 56 a9 d9 51 9c f9 a7 ae 86 39 |0D. F.V..Q.....9| -00000010 48 9f d9 bd b1 cf 7a 2d 3e 15 7d 2b dd e9 ae e7 |H.....z->.}+....| -00000020 5f d8 b5 46 02 20 5e cf ba 7b 86 8d 6f be b1 af |_..F. ^..{..o...| -00000030 06 d0 b4 a0 c6 2d ac 8e 9b be 21 3f a0 cf bd 50 |.....-....!?...P| -00000040 f0 1f d7 e5 1b d0 |......|" -"2019-05-02 01:31:41.876 UTC [cauthdsl] func2 -> DEBU 3bb5 0xc0025051e0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:41.876 UTC [cauthdsl] func1 -> DEBU 3bb6 0xc0025051e0 gate 1556760701875463600 evaluation succeeds" -"2019-05-02 01:31:41.876 UTC [policies] Evaluate -> DEBU 3bb7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:41.876 UTC [policies] Evaluate -> DEBU 3bb8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:41.876 UTC [policies] Evaluate -> DEBU 3bb9 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:41.876 UTC [policies] Evaluate -> DEBU 3bba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:41.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bbb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:41.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bbc Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:41.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bbd updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 " -"2019-05-02 01:31:41.876 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bbe Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 " -"2019-05-02 01:31:41.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bbf Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:41.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc0 Exiting" -"2019-05-02 01:31:41.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bc1 Exiting" -"2019-05-02 01:31:41.877 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bc2 Exiting" -"2019-05-02 01:31:41.877 UTC [gossip.discovery] sendMemResponse -> DEBU 3bc3 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:41.877 UTC [msp] DeserializeIdentity -> DEBU 3bc4 Obtaining identity" -"2019-05-02 01:31:41.877 UTC [msp] DeserializeIdentity -> DEBU 3bc5 Obtaining identity" -"2019-05-02 01:31:41.877 UTC [msp] DeserializeIdentity -> DEBU 3bc6 Obtaining identity" -"2019-05-02 01:31:41.877 UTC [gossip.comm] Send -> DEBU 3bc7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:41.877 UTC [gossip.discovery] sendMemResponse -> DEBU 3bc8 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:41.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3bc9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:41.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3bca Exiting" -"2019-05-02 01:31:41.954 UTC [gossip.election] waitForInterrupt -> DEBU 3bcb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:41.954 UTC [gossip.election] IsLeader -> DEBU 3bcc c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:41.954 UTC [msp.identity] Sign -> DEBU 3bcd Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100D1801 " -"2019-05-02 01:31:41.954 UTC [msp.identity] Sign -> DEBU 3bce Sign: digest: 02D8C61AB14BE7B1E66969D7558E6636FE56D4DDF098E0BB6B2641EFBCEF7B3D " -"2019-05-02 01:31:41.955 UTC [gossip.election] waitForInterrupt -> DEBU 3bcf c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:41.963 UTC [msp] DeserializeIdentity -> DEBU 3bd0 Obtaining identity" -"2019-05-02 01:31:41.965 UTC [msp] DeserializeIdentity -> DEBU 3bd1 Obtaining identity" -"2019-05-02 01:31:41.965 UTC [msp] DeserializeIdentity -> DEBU 3bd2 Obtaining identity" -"2019-05-02 01:31:41.967 UTC [msp] DeserializeIdentity -> DEBU 3bd3 Obtaining identity" -"2019-05-02 01:31:41.968 UTC [gossip.comm] Send -> DEBU 3bd4 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:41.968 UTC [msp] DeserializeIdentity -> DEBU 3bd5 Obtaining identity" -"2019-05-02 01:31:41.968 UTC [msp] DeserializeIdentity -> DEBU 3bd6 Obtaining identity" -"2019-05-02 01:31:41.969 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -"2019-05-02 01:31:41.969 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd8 Exiting" -"2019-05-02 01:31:42.156 UTC [msp.identity] Sign -> DEBU 3bd9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102D " -"2019-05-02 01:31:42.156 UTC [msp.identity] Sign -> DEBU 3bda Sign: digest: EBC276C775C07EE088A85B4A5F569D1C7DB849C1C5A5C0FBDD66126CCFE4063A " -"2019-05-02 01:31:42.157 UTC [msp.identity] Sign -> DEBU 3bdb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:42.157 UTC [msp.identity] Sign -> DEBU 3bdc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:42.158 UTC [gossip.comm] Send -> DEBU 3bdd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:42.158 UTC [msp] DeserializeIdentity -> DEBU 3bde Obtaining identity" -"2019-05-02 01:31:42.158 UTC [gossip.comm] Send -> DEBU 3bdf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:42.158 UTC [msp] DeserializeIdentity -> DEBU 3be0 Obtaining identity" -"2019-05-02 01:31:42.158 UTC [gossip.comm] Send -> DEBU 3be1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be3 Exiting" -"2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be5 Exiting" -"2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.158 UTC [gossip.comm] sendToEndpoint -> DEBU 3be7 Exiting" -"2019-05-02 01:31:42.161 UTC [gossip.comm] func1 -> DEBU 3be8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.162 UTC [gossip.gossip] handleMessage -> DEBU 3be9 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.162 UTC [gossip.gossip] handleMessage -> DEBU 3bea Exiting" -"2019-05-02 01:31:42.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3beb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.163 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bec Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:42.163 UTC [msp.identity] Verify -> DEBU 3bed Verify: digest = 00000000 eb c2 76 c7 75 c0 7e e0 88 a8 5b 4a 5f 56 9d 1c |..v.u.~...[J_V..| -00000010 7d b8 49 c1 c5 a5 c0 fb dd 66 12 6c cf e4 06 3a |}.I......f.l...:|" -"2019-05-02 01:31:42.163 UTC [msp.identity] Verify -> DEBU 3bee Verify: sig = 00000000 30 44 02 20 60 84 7a d1 11 f6 f7 78 53 fc 61 27 |0D. `.z....xS.a'| -00000010 20 59 3d 53 1b 5e 01 61 d7 3a 78 11 be ff 69 88 | Y=S.^.a.:x...i.| -00000020 4d 28 2c 8c 02 20 2b df 27 5c 6f dc cb d0 93 c5 |M(,.. +.'\o.....| -00000030 f6 b6 9f e8 10 8c 8c 61 33 44 0d af 25 64 b0 6a |.......a3D..%d.j| -00000040 d5 1d 15 ee 76 5c |....v\|" -"2019-05-02 01:31:42.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bef Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:42.164 UTC [gossip.discovery] isSentByMe -> DEBU 3bf0 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:42.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bf1 Exiting" -"2019-05-02 01:31:42.164 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bf2 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:42.165 UTC [msp.identity] Verify -> DEBU 3bf3 Verify: digest = 00000000 82 2d ab 24 09 38 af 3d fa 5a 82 a1 df 32 fd 4b |.-.$.8.=.Z...2.K| -00000010 91 b6 3b 9f 18 0b 94 25 72 13 dc b5 51 2d 9e 7a |..;....%r...Q-.z|" -"2019-05-02 01:31:42.165 UTC [msp.identity] Verify -> DEBU 3bf4 Verify: sig = 00000000 30 45 02 21 00 9e c7 89 a6 55 56 d3 e3 16 4c 3a |0E.!.....UV...L:| -00000010 cb 50 51 fa c5 37 50 2d fd 95 8b b5 d0 01 47 5f |.PQ..7P-......G_| -00000020 12 28 1a 72 00 02 20 1d 45 da 54 47 84 7a 10 bb |.(.r.. .E.TG.z..| -00000030 3b 1d a6 0f d3 e8 6f 5f 6d 76 9a 8b 64 0f b3 a9 |;.....o_mv..d...| -00000040 c7 08 c2 f6 9e 2f bd |...../.|" -"2019-05-02 01:31:42.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bf5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:42.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bf6 Exiting" -"2019-05-02 01:31:42.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bf7 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:42.165 UTC [msp] DeserializeIdentity -> DEBU 3bf8 Obtaining identity" -"2019-05-02 01:31:42.165 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3bf9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:42.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bfa Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:42.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bfb Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:42.165 UTC [policies] Evaluate -> DEBU 3bfc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:42.165 UTC [policies] Evaluate -> DEBU 3bfd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:42.165 UTC [policies] Evaluate -> DEBU 3bfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:42.165 UTC [cauthdsl] func1 -> DEBU 3bff 0xc0020e1ae0 gate 1556760702165841000 evaluation starts" -"2019-05-02 01:31:42.165 UTC [cauthdsl] func2 -> DEBU 3c00 0xc0020e1ae0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:42.165 UTC [cauthdsl] func2 -> DEBU 3c01 0xc0020e1ae0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:42.165 UTC [cauthdsl] func2 -> DEBU 3c02 0xc0020e1ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:42.166 UTC [cauthdsl] func2 -> DEBU 3c03 0xc0020e1ae0 principal evaluation fails" -"2019-05-02 01:31:42.166 UTC [cauthdsl] func1 -> DEBU 3c04 0xc0020e1ae0 gate 1556760702165841000 evaluation fails" -"2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:42.166 UTC [cauthdsl] func1 -> DEBU 3c08 0xc0025ce320 gate 1556760702166196400 evaluation starts" -"2019-05-02 01:31:42.166 UTC [cauthdsl] func2 -> DEBU 3c09 0xc0025ce320 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:42.166 UTC [cauthdsl] func2 -> DEBU 3c0a 0xc0025ce320 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:42.166 UTC [cauthdsl] func2 -> DEBU 3c0b 0xc0025ce320 principal matched by identity 0" -"2019-05-02 01:31:42.166 UTC [msp.identity] Verify -> DEBU 3c0c Verify: digest = 00000000 f2 99 3b 66 c5 e4 eb 9e 50 6c 98 2a 21 cb fb 0a |..;f....Pl.*!...| -00000010 e7 dc ea 95 49 40 92 9b 99 cc 9d f8 3b d6 50 88 |....I@......;.P.|" -"2019-05-02 01:31:42.166 UTC [msp.identity] Verify -> DEBU 3c0d Verify: sig = 00000000 30 44 02 20 46 11 56 a9 d9 51 9c f9 a7 ae 86 39 |0D. F.V..Q.....9| -00000010 48 9f d9 bd b1 cf 7a 2d 3e 15 7d 2b dd e9 ae e7 |H.....z->.}+....| -00000020 5f d8 b5 46 02 20 5e cf ba 7b 86 8d 6f be b1 af |_..F. ^..{..o...| -00000030 06 d0 b4 a0 c6 2d ac 8e 9b be 21 3f a0 cf bd 50 |.....-....!?...P| -00000040 f0 1f d7 e5 1b d0 |......|" -"2019-05-02 01:31:42.166 UTC [cauthdsl] func2 -> DEBU 3c0e 0xc0025ce320 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:42.166 UTC [cauthdsl] func1 -> DEBU 3c0f 0xc0025ce320 gate 1556760702166196400 evaluation succeeds" -"2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c12 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:42.166 UTC [policies] Evaluate -> DEBU 3c13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:42.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c14 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:42.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c15 Exiting" -"2019-05-02 01:31:42.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c16 Exiting" -"2019-05-02 01:31:42.169 UTC [gossip.comm] func1 -> DEBU 3c17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.169 UTC [gossip.gossip] handleMessage -> DEBU 3c18 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.169 UTC [gossip.gossip] handleMessage -> DEBU 3c19 Exiting" -"2019-05-02 01:31:42.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c1a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.169 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c1b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:42.169 UTC [msp] DeserializeIdentity -> DEBU 3c1c Obtaining identity" -"2019-05-02 01:31:42.170 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:42.170 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:42.170 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:42.170 UTC [cauthdsl] func1 -> DEBU 3c23 0xc00251e690 gate 1556760702170310600 evaluation starts" -"2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c24 0xc00251e690 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c25 0xc00251e690 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c26 0xc00251e690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c27 0xc00251e690 principal evaluation fails" -"2019-05-02 01:31:42.170 UTC [cauthdsl] func1 -> DEBU 3c28 0xc00251e690 gate 1556760702170310600 evaluation fails" -"2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c29 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:42.170 UTC [policies] Evaluate -> DEBU 3c2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:42.170 UTC [cauthdsl] func1 -> DEBU 3c2c 0xc00251eed0 gate 1556760702170660800 evaluation starts" -"2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c2d 0xc00251eed0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c2e 0xc00251eed0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:42.170 UTC [cauthdsl] func2 -> DEBU 3c2f 0xc00251eed0 principal matched by identity 0" -"2019-05-02 01:31:42.170 UTC [msp.identity] Verify -> DEBU 3c30 Verify: digest = 00000000 69 95 5e e9 5d f4 dc 43 93 b8 7f 5d e1 69 ff 34 |i.^.]..C...].i.4| -00000010 ec fa a2 32 8b 7a 9d fd 17 60 57 8c fc 0d a2 f5 |...2.z...`W.....|" -"2019-05-02 01:31:42.170 UTC [msp.identity] Verify -> DEBU 3c31 Verify: sig = 00000000 30 45 02 21 00 fe e6 eb db 19 12 e9 91 3b ea 32 |0E.!.........;.2| -00000010 3c a1 e6 6b 78 56 ee 31 ce c6 3c c0 c2 93 05 92 |<..kxV.1..<.....| -00000020 00 78 de 01 c0 02 20 6a 67 78 8b df dd 09 9c 80 |.x.... jgx......| -00000030 e6 23 9d 95 6d 76 71 b6 45 5b a2 33 f5 c0 10 87 |.#..mvq.E[.3....| -00000040 60 f8 ab f8 4e 56 ef |`...NV.|" -"2019-05-02 01:31:42.171 UTC [cauthdsl] func2 -> DEBU 3c32 0xc00251eed0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:42.171 UTC [cauthdsl] func1 -> DEBU 3c33 0xc00251eed0 gate 1556760702170660800 evaluation succeeds" -"2019-05-02 01:31:42.171 UTC [policies] Evaluate -> DEBU 3c34 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:42.171 UTC [policies] Evaluate -> DEBU 3c35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:42.171 UTC [policies] Evaluate -> DEBU 3c36 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:42.171 UTC [policies] Evaluate -> DEBU 3c37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:42.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c38 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:42.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c39 Exiting" -"2019-05-02 01:31:42.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c3a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:42.171 UTC [msp.identity] Verify -> DEBU 3c3b Verify: digest = 00000000 eb c2 76 c7 75 c0 7e e0 88 a8 5b 4a 5f 56 9d 1c |..v.u.~...[J_V..| -00000010 7d b8 49 c1 c5 a5 c0 fb dd 66 12 6c cf e4 06 3a |}.I......f.l...:|" -"2019-05-02 01:31:42.171 UTC [msp.identity] Verify -> DEBU 3c3c Verify: sig = 00000000 30 44 02 20 60 84 7a d1 11 f6 f7 78 53 fc 61 27 |0D. `.z....xS.a'| -00000010 20 59 3d 53 1b 5e 01 61 d7 3a 78 11 be ff 69 88 | Y=S.^.a.:x...i.| -00000020 4d 28 2c 8c 02 20 2b df 27 5c 6f dc cb d0 93 c5 |M(,.. +.'\o.....| -00000030 f6 b6 9f e8 10 8c 8c 61 33 44 0d af 25 64 b0 6a |.......a3D..%d.j| -00000040 d5 1d 15 ee 76 5c |....v\|" -"2019-05-02 01:31:42.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c3d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:42.171 UTC [gossip.discovery] isSentByMe -> DEBU 3c3e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:42.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c3f Exiting" -"2019-05-02 01:31:42.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c40 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:42.174 UTC [msp.identity] Verify -> DEBU 3c41 Verify: digest = 00000000 82 2d ab 24 09 38 af 3d fa 5a 82 a1 df 32 fd 4b |.-.$.8.=.Z...2.K| -00000010 91 b6 3b 9f 18 0b 94 25 72 13 dc b5 51 2d 9e 7a |..;....%r...Q-.z|" -"2019-05-02 01:31:42.174 UTC [msp.identity] Verify -> DEBU 3c42 Verify: sig = 00000000 30 45 02 21 00 9e c7 89 a6 55 56 d3 e3 16 4c 3a |0E.!.....UV...L:| -00000010 cb 50 51 fa c5 37 50 2d fd 95 8b b5 d0 01 47 5f |.PQ..7P-......G_| -00000020 12 28 1a 72 00 02 20 1d 45 da 54 47 84 7a 10 bb |.(.r.. .E.TG.z..| -00000030 3b 1d a6 0f d3 e8 6f 5f 6d 76 9a 8b 64 0f b3 a9 |;.....o_mv..d...| -00000040 c7 08 c2 f6 9e 2f bd |...../.|" -"2019-05-02 01:31:42.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c43 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:42.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c44 Exiting" -"2019-05-02 01:31:42.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c45 Exiting" -"2019-05-02 01:31:42.174 UTC [gossip.comm] func1 -> DEBU 3c46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.175 UTC [gossip.gossip] handleMessage -> DEBU 3c47 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.175 UTC [gossip.gossip] handleMessage -> DEBU 3c48 Exiting" -"2019-05-02 01:31:42.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:42.175 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c4a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:42.175 UTC [msp.identity] Verify -> DEBU 3c4b Verify: digest = 00000000 eb c2 76 c7 75 c0 7e e0 88 a8 5b 4a 5f 56 9d 1c |..v.u.~...[J_V..| -00000010 7d b8 49 c1 c5 a5 c0 fb dd 66 12 6c cf e4 06 3a |}.I......f.l...:|" -"2019-05-02 01:31:42.175 UTC [msp.identity] Verify -> DEBU 3c4c Verify: sig = 00000000 30 44 02 20 60 84 7a d1 11 f6 f7 78 53 fc 61 27 |0D. `.z....xS.a'| -00000010 20 59 3d 53 1b 5e 01 61 d7 3a 78 11 be ff 69 88 | Y=S.^.a.:x...i.| -00000020 4d 28 2c 8c 02 20 2b df 27 5c 6f dc cb d0 93 c5 |M(,.. +.'\o.....| -00000030 f6 b6 9f e8 10 8c 8c 61 33 44 0d af 25 64 b0 6a |.......a3D..%d.j| -00000040 d5 1d 15 ee 76 5c |....v\|" -"2019-05-02 01:31:42.175 UTC [msp.identity] Verify -> DEBU 3c4d Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:28:09.100 UTC [msp.identity] Verify -> DEBU 38af Verify: sig = 00000000 30 45 02 21 00 a2 ce b0 77 99 5a e2 eb 9b 95 d2 |0E.!....w.Z.....| +00000010 84 7e ea 01 6e 1f 91 d9 7a b0 ee 91 c0 e7 85 c1 |.~..n...z.......| +00000020 63 da 25 bf 20 02 20 48 e3 cc e5 c9 c2 59 b7 c2 |c.%. . H.....Y..| +00000030 1b ea 17 7d 87 cd 37 2a 94 4b 9a 84 98 30 59 e8 |...}..7*.K...0Y.| +00000040 75 d5 77 d0 a3 6a aa |u.w..j.|" +"2019-05-02 09:28:09.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 38b0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:09.101 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:28:09.106 UTC [gossip.comm] func1 -> DEBU 38b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b3 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 " +"2019-05-02 09:28:09.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 " +"2019-05-02 09:28:09.107 UTC [gossip.gossip] handleMessage -> DEBU 38b5 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.106 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:09.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 38b7 Exiting" +"2019-05-02 09:28:09.107 UTC [gossip.discovery] handleAliveMessage -> DEBU 38b8 Exiting" +"2019-05-02 09:28:09.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38b9 Exiting" +"2019-05-02 09:28:09.108 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.109 UTC [gossip.comm] func1 -> DEBU 38bb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.109 UTC [gossip.gossip] handleMessage -> DEBU 38bc Exiting" +"2019-05-02 09:28:09.110 UTC [gossip.gossip] handleMessage -> DEBU 38bd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.110 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38be Exiting" +"2019-05-02 09:28:09.110 UTC [gossip.gossip] handleMessage -> DEBU 38bf Exiting" +"2019-05-02 09:28:09.111 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.111 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38c1 Exiting" +"2019-05-02 09:28:09.118 UTC [msp] DeserializeIdentity -> DEBU 38c2 Obtaining identity" +"2019-05-02 09:28:09.119 UTC [msp] DeserializeIdentity -> DEBU 38c3 Obtaining identity" +"2019-05-02 09:28:09.120 UTC [msp] DeserializeIdentity -> DEBU 38c4 Obtaining identity" +"2019-05-02 09:28:09.120 UTC [gossip.comm] Send -> DEBU 38c5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:09.120 UTC [msp] DeserializeIdentity -> DEBU 38c6 Obtaining identity" +"2019-05-02 09:28:09.121 UTC [gossip.comm] Send -> DEBU 38c7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:09.121 UTC [gossip.comm] sendToEndpoint -> DEBU 38c8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.121 UTC [gossip.comm] sendToEndpoint -> DEBU 38c9 Exiting" +"2019-05-02 09:28:09.121 UTC [gossip.comm] sendToEndpoint -> DEBU 38ca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.122 UTC [gossip.comm] sendToEndpoint -> DEBU 38cb Exiting" +"2019-05-02 09:28:09.172 UTC [gossip.comm] func1 -> DEBU 38cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.172 UTC [gossip.gossip] handleMessage -> DEBU 38cd Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.173 UTC [gossip.gossip] handleMessage -> DEBU 38ce Exiting" +"2019-05-02 09:28:09.173 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38d0 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:09.175 UTC [msp] DeserializeIdentity -> DEBU 38d1 Obtaining identity" +"2019-05-02 09:28:09.176 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:09.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38d3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:09.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38d4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:09.177 UTC [policies] Evaluate -> DEBU 38d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:09.178 UTC [policies] Evaluate -> DEBU 38d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.180 UTC [policies] Evaluate -> DEBU 38d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:09.181 UTC [cauthdsl] func1 -> DEBU 38d8 0xc003d68920 gate 1556789289181739600 evaluation starts" +"2019-05-02 09:28:09.182 UTC [cauthdsl] func2 -> DEBU 38d9 0xc003d68920 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.183 UTC [cauthdsl] func2 -> DEBU 38da 0xc003d68920 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:09.184 UTC [cauthdsl] func2 -> DEBU 38db 0xc003d68920 principal matched by identity 0" +"2019-05-02 09:28:09.184 UTC [msp.identity] Verify -> DEBU 38dc Verify: digest = 00000000 37 ad 16 38 c1 22 77 1c 31 b6 4d 36 93 80 be 04 |7..8."w.1.M6....| +00000010 1b a3 b8 ff 3f 87 e7 a4 36 65 7d d5 d1 ef c6 5b |....?...6e}....[|" +"2019-05-02 09:28:09.186 UTC [gossip.comm] func1 -> DEBU 38dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.186 UTC [gossip.gossip] handleMessage -> DEBU 38df Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.186 UTC [msp.identity] Verify -> DEBU 38de Verify: sig = 00000000 30 44 02 20 7b f6 8a 22 29 b4 de dd 48 05 b6 5f |0D. {..")...H.._| +00000010 e1 1f 1e 44 4c 4e 66 98 84 f9 a5 09 79 1c 40 9c |...DLNf.....y.@.| +00000020 af c6 0c a3 02 20 30 6f f4 a5 f8 04 dd a0 c4 3c |..... 0o.......<| +00000030 bc aa e7 0e 53 dc 1c 7d 24 f1 29 ea 83 ef c4 25 |....S..}$.)....%| +00000040 9c ee 1a 0b dd a5 |......|" +"2019-05-02 09:28:09.188 UTC [cauthdsl] func2 -> DEBU 38e0 0xc003d68920 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:09.188 UTC [cauthdsl] func1 -> DEBU 38e1 0xc003d68920 gate 1556789289181739600 evaluation succeeds" +"2019-05-02 09:28:09.189 UTC [policies] Evaluate -> DEBU 38e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.189 UTC [policies] Evaluate -> DEBU 38e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.192 UTC [gossip.comm] func1 -> DEBU 38e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.190 UTC [policies] Evaluate -> DEBU 38e4 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:09.192 UTC [policies] Evaluate -> DEBU 38e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:09.192 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:09.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 38e9 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 " +"2019-05-02 09:28:09.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 38ea Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 " +"2019-05-02 09:28:09.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 38eb Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:09.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 38ec Exiting" +"2019-05-02 09:28:09.193 UTC [gossip.discovery] handleAliveMessage -> DEBU 38ed Exiting" +"2019-05-02 09:28:09.193 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ee Exiting" +"2019-05-02 09:28:09.194 UTC [gossip.gossip] handleMessage -> DEBU 38ef Exiting" +"2019-05-02 09:28:09.194 UTC [gossip.gossip] handleMessage -> DEBU 38f0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f2 Exiting" +"2019-05-02 09:28:09.194 UTC [gossip.gossip] handleMessage -> DEBU 38f3 Exiting" +"2019-05-02 09:28:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.197 UTC [msp] DeserializeIdentity -> DEBU 38f5 Obtaining identity" +"2019-05-02 09:28:09.201 UTC [msp] DeserializeIdentity -> DEBU 38f6 Obtaining identity" +"2019-05-02 09:28:09.206 UTC [msp] DeserializeIdentity -> DEBU 38f7 Obtaining identity" +"2019-05-02 09:28:09.207 UTC [msp] DeserializeIdentity -> DEBU 38f8 Obtaining identity" +"2019-05-02 09:28:09.208 UTC [msp] DeserializeIdentity -> DEBU 38f9 Obtaining identity" +"2019-05-02 09:28:09.209 UTC [msp] DeserializeIdentity -> DEBU 38fb Obtaining identity" +"2019-05-02 09:28:09.210 UTC [gossip.comm] Send -> DEBU 38fc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:09.210 UTC [msp] DeserializeIdentity -> DEBU 38fd Obtaining identity" +"2019-05-02 09:28:09.209 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38fa Exiting" +"2019-05-02 09:28:09.210 UTC [gossip.comm] sendToEndpoint -> DEBU 38fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.211 UTC [gossip.comm] sendToEndpoint -> DEBU 3900 Exiting" +"2019-05-02 09:28:09.210 UTC [msp] DeserializeIdentity -> DEBU 38ff Obtaining identity" +"2019-05-02 09:28:09.214 UTC [gossip.comm] Send -> DEBU 3901 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:09.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3902 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3903 Exiting" +"2019-05-02 09:28:09.613 UTC [msp.identity] Sign -> DEBU 3904 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102A " +"2019-05-02 09:28:09.614 UTC [msp.identity] Sign -> DEBU 3905 Sign: digest: F7DE0249F4584EFE2D0BC0F49C32E173DBC309588E5D22168386C156B5A2A574 " +"2019-05-02 09:28:09.615 UTC [msp.identity] Sign -> DEBU 3906 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:28:09.616 UTC [msp.identity] Sign -> DEBU 3907 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:28:09.619 UTC [gossip.comm] Send -> DEBU 3908 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:09.619 UTC [msp] DeserializeIdentity -> DEBU 3909 Obtaining identity" +"2019-05-02 09:28:09.620 UTC [gossip.comm] Send -> DEBU 390a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:09.621 UTC [msp] DeserializeIdentity -> DEBU 390b Obtaining identity" +"2019-05-02 09:28:09.622 UTC [gossip.comm] Send -> DEBU 390c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:09.632 UTC [gossip.comm] sendToEndpoint -> DEBU 390d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.632 UTC [gossip.comm] sendToEndpoint -> DEBU 390e Exiting" +"2019-05-02 09:28:09.632 UTC [gossip.comm] sendToEndpoint -> DEBU 390f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.633 UTC [gossip.comm] sendToEndpoint -> DEBU 3910 Exiting" +"2019-05-02 09:28:09.634 UTC [gossip.comm] sendToEndpoint -> DEBU 3911 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.634 UTC [gossip.comm] sendToEndpoint -> DEBU 3912 Exiting" +"2019-05-02 09:28:09.637 UTC [gossip.comm] func1 -> DEBU 3913 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.638 UTC [gossip.comm] func1 -> DEBU 3914 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.639 UTC [gossip.gossip] handleMessage -> DEBU 3915 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.639 UTC [gossip.gossip] handleMessage -> DEBU 3916 Exiting" +"2019-05-02 09:28:09.641 UTC [gossip.gossip] handleMessage -> DEBU 3917 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.658 UTC [gossip.comm] func1 -> DEBU 391a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.658 UTC [gossip.comm] func1 -> DEBU 391b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.642 UTC [gossip.comm] func1 -> DEBU 3918 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.659 UTC [gossip.comm] func1 -> DEBU 391c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3919 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.659 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 391d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:09.659 UTC [msp] DeserializeIdentity -> DEBU 391e Obtaining identity" +"2019-05-02 09:28:09.660 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 391f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:09.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3920 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:09.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3921 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:09.660 UTC [policies] Evaluate -> DEBU 3922 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:09.660 UTC [policies] Evaluate -> DEBU 3923 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.661 UTC [policies] Evaluate -> DEBU 3924 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:09.661 UTC [cauthdsl] func1 -> DEBU 3925 0xc002534e10 gate 1556789289661227400 evaluation starts" +"2019-05-02 09:28:09.661 UTC [cauthdsl] func2 -> DEBU 3926 0xc002534e10 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.661 UTC [cauthdsl] func2 -> DEBU 3927 0xc002534e10 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:09.661 UTC [cauthdsl] func2 -> DEBU 3928 0xc002534e10 principal matched by identity 0" +"2019-05-02 09:28:09.661 UTC [msp.identity] Verify -> DEBU 3929 Verify: digest = 00000000 7b 6e 12 89 dd 80 a7 4b df 68 c5 8e b0 91 55 4c |{n.....K.h....UL| +00000010 e7 39 c3 da 02 63 42 71 3c 4a 60 24 57 93 1c 1f |.9...cBq DEBU 392a Verify: sig = 00000000 30 44 02 20 0e b1 3a 27 60 c0 d4 9d 00 03 d6 a8 |0D. ..:'`.......| +00000010 b1 af 90 d2 3c 12 90 1f 35 89 2a 52 20 8f 6c 47 |....<...5.*R .lG| +00000020 5d 4e 5c f7 02 20 57 18 38 f6 83 95 cd 4b 28 0e |]N\.. W.8....K(.| +00000030 ea 6a ea 01 4c 49 ca 23 f7 7a 6e d7 c1 4e 79 42 |.j..LI.#.zn..NyB| +00000040 42 bb c7 8b 68 9e |B...h.|" +"2019-05-02 09:28:09.662 UTC [cauthdsl] func2 -> DEBU 392b 0xc002534e10 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:09.662 UTC [cauthdsl] func1 -> DEBU 392c 0xc002534e10 gate 1556789289661227400 evaluation succeeds" +"2019-05-02 09:28:09.662 UTC [policies] Evaluate -> DEBU 392d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.662 UTC [policies] Evaluate -> DEBU 392e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.663 UTC [policies] Evaluate -> DEBU 392f Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:09.663 UTC [policies] Evaluate -> DEBU 3930 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:09.663 UTC [gossip.discovery] handleAliveMessage -> DEBU 3931 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3932 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3933 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 " +"2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3934 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 " +"2019-05-02 09:28:09.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3935 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:09.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 3936 Exiting" +"2019-05-02 09:28:09.664 UTC [gossip.discovery] handleAliveMessage -> DEBU 3937 Exiting" +"2019-05-02 09:28:09.664 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3938 Exiting" +"2019-05-02 09:28:09.664 UTC [gossip.discovery] sendMemResponse -> DEBU 3939 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:09.664 UTC [msp] DeserializeIdentity -> DEBU 393a Obtaining identity" +"2019-05-02 09:28:09.664 UTC [msp] DeserializeIdentity -> DEBU 393b Obtaining identity" +"2019-05-02 09:28:09.664 UTC [msp] DeserializeIdentity -> DEBU 393c Obtaining identity" +"2019-05-02 09:28:09.664 UTC [gossip.comm] Send -> DEBU 393d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:09.664 UTC [gossip.discovery] sendMemResponse -> DEBU 393e Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:09.664 UTC [gossip.comm] sendToEndpoint -> DEBU 393f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.664 UTC [gossip.comm] sendToEndpoint -> DEBU 3940 Exiting" +"2019-05-02 09:28:09.671 UTC [gossip.comm] func1 -> DEBU 3941 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.676 UTC [gossip.pull] HandleMessage -> DEBU 3942 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.686 UTC [msp] DeserializeIdentity -> DEBU 3943 Obtaining identity" +"2019-05-02 09:28:09.686 UTC [msp] DeserializeIdentity -> DEBU 3944 Obtaining identity" +"2019-05-02 09:28:09.687 UTC [msp] DeserializeIdentity -> DEBU 3945 Obtaining identity" +"2019-05-02 09:28:09.687 UTC [msp] DeserializeIdentity -> DEBU 3946 Obtaining identity" +"2019-05-02 09:28:09.688 UTC [msp] DeserializeIdentity -> DEBU 3947 Obtaining identity" +"2019-05-02 09:28:09.688 UTC [msp] DeserializeIdentity -> DEBU 3948 Obtaining identity" +"2019-05-02 09:28:09.688 UTC [gossip.pull] SendDigest -> DEBU 3949 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:09.693 UTC [gossip.gossip] handleMessage -> DEBU 394a Exiting" +"2019-05-02 09:28:09.693 UTC [gossip.gossip] handleMessage -> DEBU 394b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.693 UTC [gossip.gossip] handleMessage -> DEBU 394c Exiting" +"2019-05-02 09:28:09.694 UTC [gossip.gossip] handleMessage -> DEBU 394e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 394d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 394f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:09.695 UTC [msp.identity] Verify -> DEBU 3950 Verify: digest = 00000000 f7 de 02 49 f4 58 4e fe 2d 0b c0 f4 9c 32 e1 73 |...I.XN.-....2.s| +00000010 db c3 09 58 8e 5d 22 16 83 86 c1 56 b5 a2 a5 74 |...X.]"....V...t|" +"2019-05-02 09:28:09.695 UTC [msp.identity] Verify -> DEBU 3951 Verify: sig = 00000000 30 45 02 21 00 9c e2 f3 eb c2 5b f0 00 2a 7b 9f |0E.!......[..*{.| +00000010 e2 be 4a 38 a9 4a 8d b7 47 a8 b0 0f e4 2d a1 66 |..J8.J..G....-.f| +00000020 4d e1 79 12 b4 02 20 77 de 6e 56 d3 96 15 17 93 |M.y... w.nV.....| +00000030 7f 8b 87 46 88 81 d9 1c 66 a8 bc 51 d8 d6 21 bc |...F....f..Q..!.| +00000040 55 7e 22 fa 6e 06 19 |U~".n..|" +"2019-05-02 09:28:09.696 UTC [msp.identity] Verify -> DEBU 3952 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:42.175 UTC [msp.identity] Verify -> DEBU 3c4e Verify: sig = 00000000 30 45 02 21 00 eb 7e 0b c7 09 d4 7d 0b ec b3 1b |0E.!..~....}....| -00000010 c2 d6 7c 23 29 59 3a 1f 4b 87 58 ec de 89 7a f9 |..|#)Y:.K.X...z.| -00000020 75 aa 2b 4e 82 02 20 53 15 ff 90 11 f8 88 70 61 |u.+N.. S......pa| -00000030 63 13 21 a8 2d 5a 1d dd ff de 3b d6 a1 c6 dd 89 |c.!.-Z....;.....| -00000040 09 76 1a dd dc 45 6e |.v...En|" -"2019-05-02 01:31:42.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c4f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:42.175 UTC [gossip.discovery] isSentByMe -> DEBU 3c50 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:42.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c51 Exiting" -"2019-05-02 01:31:42.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c52 Exiting" -"2019-05-02 01:31:43.407 UTC [gossip.comm] func1 -> DEBU 3c53 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:43.407 UTC [gossip.gossip] handleMessage -> DEBU 3c54 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:43.408 UTC [gossip.gossip] handleMessage -> DEBU 3c55 Exiting" -"2019-05-02 01:31:43.408 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:43.408 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c57 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:43.408 UTC [msp.identity] Verify -> DEBU 3c58 Verify: digest = 00000000 85 74 47 e3 15 67 d7 19 29 65 ac 1a c9 f1 99 76 |.tG..g..)e.....v| -00000010 4c bc 9e 72 5e 5b da 4c 96 47 11 80 8e 23 43 b0 |L..r^[.L.G...#C.|" -"2019-05-02 01:31:43.408 UTC [msp.identity] Verify -> DEBU 3c59 Verify: sig = 00000000 30 44 02 20 66 ee 9c 43 19 bd 2c c9 0f 7f fb 3c |0D. f..C..,....<| -00000010 7f 7c b0 0b a6 8a 0d 89 1b b5 3c 3c 6f 50 11 33 |.|........< DEBU 3c5a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:28:09.698 UTC [msp.identity] Verify -> DEBU 3953 Verify: sig = 00000000 30 44 02 20 1c f6 13 da 70 99 f0 f8 0e 5c 10 7f |0D. ....p....\..| +00000010 ad 79 d7 ca 85 4a 32 2b e2 11 ab 6b 54 05 7e bc |.y...J2+...kT.~.| +00000020 27 b9 1a dc 02 20 71 ee 61 49 c3 e9 53 b5 b0 c2 |'.... q.aI..S...| +00000030 00 55 bb a9 12 39 4c d4 dd 04 e8 0e 95 5e 23 01 |.U...9L......^#.| +00000040 74 5d d8 6a 52 4d |t].jRM|" +"2019-05-02 09:28:09.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 3954 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:09.699 UTC [gossip.discovery] isSentByMe -> DEBU 3955 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:09.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 3956 Exiting" +"2019-05-02 09:28:09.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3957 Exiting" +"2019-05-02 09:28:09.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3958 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.700 UTC [gossip.gossip] handleMessage -> DEBU 3959 Exiting" +"2019-05-02 09:28:09.700 UTC [gossip.gossip] handleMessage -> DEBU 395a Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.700 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 395b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:09.701 UTC [msp.identity] Verify -> DEBU 395c Verify: digest = 00000000 f7 de 02 49 f4 58 4e fe 2d 0b c0 f4 9c 32 e1 73 |...I.XN.-....2.s| +00000010 db c3 09 58 8e 5d 22 16 83 86 c1 56 b5 a2 a5 74 |...X.]"....V...t|" +"2019-05-02 09:28:09.703 UTC [msp.identity] Verify -> DEBU 395d Verify: sig = 00000000 30 45 02 21 00 9c e2 f3 eb c2 5b f0 00 2a 7b 9f |0E.!......[..*{.| +00000010 e2 be 4a 38 a9 4a 8d b7 47 a8 b0 0f e4 2d a1 66 |..J8.J..G....-.f| +00000020 4d e1 79 12 b4 02 20 77 de 6e 56 d3 96 15 17 93 |M.y... w.nV.....| +00000030 7f 8b 87 46 88 81 d9 1c 66 a8 bc 51 d8 d6 21 bc |...F....f..Q..!.| +00000040 55 7e 22 fa 6e 06 19 |U~".n..|" +"2019-05-02 09:28:09.703 UTC [gossip.discovery] handleAliveMessage -> DEBU 395e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.706 UTC [gossip.discovery] isSentByMe -> DEBU 395f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 3960 Exiting" +"2019-05-02 09:28:09.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3962 Exiting" +"2019-05-02 09:28:09.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3963 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.707 UTC [gossip.comm] func1 -> DEBU 3961 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.709 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3964 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:09.710 UTC [msp] DeserializeIdentity -> DEBU 3968 Obtaining identity" +"2019-05-02 09:28:09.711 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 396a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:09.710 UTC [gossip.gossip] handleMessage -> DEBU 3969 Exiting" +"2019-05-02 09:28:09.713 UTC [gossip.gossip] handleMessage -> DEBU 396c Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.710 UTC [gossip.pull] Hello -> DEBU 3966 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:28:09.713 UTC [gossip.comm] Send -> DEBU 396d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:09.713 UTC [gossip.pull] HandleMessage -> DEBU 396e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.713 UTC [msp] DeserializeIdentity -> DEBU 396f Obtaining identity" +"2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3971 Obtaining identity" +"2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3972 Obtaining identity" +"2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3974 Obtaining identity" +"2019-05-02 09:28:09.714 UTC [msp] DeserializeIdentity -> DEBU 3975 Obtaining identity" +"2019-05-02 09:28:09.715 UTC [msp] DeserializeIdentity -> DEBU 3976 Obtaining identity" +"2019-05-02 09:28:09.715 UTC [gossip.pull] SendDigest -> DEBU 3977 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:09.715 UTC [gossip.gossip] handleMessage -> DEBU 3978 Exiting" +"2019-05-02 09:28:09.716 UTC [gossip.gossip] handleMessage -> DEBU 3979 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.716 UTC [gossip.pull] HandleMessage -> DEBU 397a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3973 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.716 UTC [gossip.pull] SendDigest -> DEBU 397b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:09.717 UTC [gossip.gossip] handleMessage -> DEBU 397c Exiting" +"2019-05-02 09:28:09.717 UTC [gossip.gossip] handleMessage -> DEBU 397d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.713 UTC [gossip.pull] Hello -> DEBU 3970 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:28:09.718 UTC [gossip.comm] Send -> DEBU 397e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:09.718 UTC [gossip.pull] Hello -> DEBU 397f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:28:09.718 UTC [gossip.comm] Send -> DEBU 3981 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:09.720 UTC [gossip.comm] sendToEndpoint -> DEBU 3983 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.720 UTC [gossip.comm] sendToEndpoint -> DEBU 3984 Exiting" +"2019-05-02 09:28:09.716 UTC [gossip.comm] sendToEndpoint -> DEBU 3980 Exiting" +"2019-05-02 09:28:09.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 396b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:09.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3985 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:09.710 UTC [gossip.comm] func1 -> DEBU 3967 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.710 UTC [msp] DeserializeIdentity -> DEBU 3965 Obtaining identity" +"2019-05-02 09:28:09.721 UTC [policies] Evaluate -> DEBU 3986 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:09.722 UTC [policies] Evaluate -> DEBU 3987 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.722 UTC [policies] Evaluate -> DEBU 3988 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:09.723 UTC [cauthdsl] func1 -> DEBU 3989 0xc00352e360 gate 1556789289723314300 evaluation starts" +"2019-05-02 09:28:09.723 UTC [cauthdsl] func2 -> DEBU 398a 0xc00352e360 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.723 UTC [cauthdsl] func2 -> DEBU 398b 0xc00352e360 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:09.724 UTC [cauthdsl] func2 -> DEBU 398c 0xc00352e360 principal matched by identity 0" +"2019-05-02 09:28:09.724 UTC [msp.identity] Verify -> DEBU 398d Verify: digest = 00000000 7b 6e 12 89 dd 80 a7 4b df 68 c5 8e b0 91 55 4c |{n.....K.h....UL| +00000010 e7 39 c3 da 02 63 42 71 3c 4a 60 24 57 93 1c 1f |.9...cBq DEBU 398f Verify: sig = 00000000 30 44 02 20 0e b1 3a 27 60 c0 d4 9d 00 03 d6 a8 |0D. ..:'`.......| +00000010 b1 af 90 d2 3c 12 90 1f 35 89 2a 52 20 8f 6c 47 |....<...5.*R .lG| +00000020 5d 4e 5c f7 02 20 57 18 38 f6 83 95 cd 4b 28 0e |]N\.. W.8....K(.| +00000030 ea 6a ea 01 4c 49 ca 23 f7 7a 6e d7 c1 4e 79 42 |.j..LI.#.zn..NyB| +00000040 42 bb c7 8b 68 9e |B...h.|" +"2019-05-02 09:28:09.725 UTC [cauthdsl] func2 -> DEBU 3990 0xc00352e360 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:09.725 UTC [cauthdsl] func1 -> DEBU 3991 0xc00352e360 gate 1556789289723314300 evaluation succeeds" +"2019-05-02 09:28:09.724 UTC [msp] DeserializeIdentity -> DEBU 398e Obtaining identity" +"2019-05-02 09:28:09.725 UTC [policies] Evaluate -> DEBU 3992 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.726 UTC [policies] Evaluate -> DEBU 3994 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.726 UTC [policies] Evaluate -> DEBU 3995 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:09.726 UTC [policies] Evaluate -> DEBU 3996 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:09.726 UTC [gossip.discovery] handleAliveMessage -> DEBU 3997 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:09.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 3998 Exiting" +"2019-05-02 09:28:09.727 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3999 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:09.727 UTC [msp.identity] Verify -> DEBU 399a Verify: digest = 00000000 f7 de 02 49 f4 58 4e fe 2d 0b c0 f4 9c 32 e1 73 |...I.XN.-....2.s| +00000010 db c3 09 58 8e 5d 22 16 83 86 c1 56 b5 a2 a5 74 |...X.]"....V...t|" +"2019-05-02 09:28:09.727 UTC [msp.identity] Verify -> DEBU 399b Verify: sig = 00000000 30 45 02 21 00 9c e2 f3 eb c2 5b f0 00 2a 7b 9f |0E.!......[..*{.| +00000010 e2 be 4a 38 a9 4a 8d b7 47 a8 b0 0f e4 2d a1 66 |..J8.J..G....-.f| +00000020 4d e1 79 12 b4 02 20 77 de 6e 56 d3 96 15 17 93 |M.y... w.nV.....| +00000030 7f 8b 87 46 88 81 d9 1c 66 a8 bc 51 d8 d6 21 bc |...F....f..Q..!.| +00000040 55 7e 22 fa 6e 06 19 |U~".n..|" +"2019-05-02 09:28:09.728 UTC [gossip.discovery] handleAliveMessage -> DEBU 399c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.728 UTC [gossip.discovery] isSentByMe -> DEBU 399d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.728 UTC [gossip.discovery] handleAliveMessage -> DEBU 399e Exiting" +"2019-05-02 09:28:09.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 399f Exiting" +"2019-05-02 09:28:09.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39a0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39a1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:09.729 UTC [msp.identity] Verify -> DEBU 39a2 Verify: digest = 00000000 8f 68 76 c3 0c e0 b0 37 7c f6 29 61 e4 27 35 e2 |.hv....7|.)a.'5.| +00000010 c7 87 68 18 6d f4 3f 7f 4f 74 b4 12 21 52 ed 7f |..h.m.?.Ot..!R..|" +"2019-05-02 09:28:09.729 UTC [msp.identity] Verify -> DEBU 39a3 Verify: sig = 00000000 30 44 02 20 18 0a e6 41 8b 1a 99 6d 30 a2 52 1c |0D. ...A...m0.R.| +00000010 21 84 21 36 cc 86 4f a1 48 23 f7 16 05 1a 9e ce |!.!6..O.H#......| +00000020 54 dc 83 1a 02 20 34 d8 6d 56 a8 31 3c 75 88 32 |T.... 4.mV.1 DEBU 39a4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:43.408 UTC [msp.identity] Verify -> DEBU 3c5b Verify: sig = 00000000 30 45 02 21 00 d9 74 8b fd a3 1f 4b c7 83 39 3a |0E.!..t....K..9:| -00000010 57 62 e2 5f a4 b5 7a 6b 29 86 0b e2 9d 55 96 cc |Wb._..zk)....U..| -00000020 1a e6 19 50 d1 02 20 1d f1 1a 39 9c f7 96 b1 e4 |...P.. ...9.....| -00000030 e7 43 a2 e4 de 5b bf 89 d4 03 4e 20 4d 49 5e 81 |.C...[....N MI^.| -00000040 f0 37 a8 da bc 81 5f |.7...._|" -"2019-05-02 01:31:43.409 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c5c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:43.409 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c5d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:43.409 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c5e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 " -"2019-05-02 01:31:43.409 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c5f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 " -"2019-05-02 01:31:43.409 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c60 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:43.409 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c61 Exiting" -"2019-05-02 01:31:43.409 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c62 Exiting" -"2019-05-02 01:31:43.409 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c63 Exiting" -"2019-05-02 01:31:43.412 UTC [msp] DeserializeIdentity -> DEBU 3c64 Obtaining identity" -"2019-05-02 01:31:43.412 UTC [msp] DeserializeIdentity -> DEBU 3c65 Obtaining identity" -"2019-05-02 01:31:43.412 UTC [msp] DeserializeIdentity -> DEBU 3c66 Obtaining identity" -"2019-05-02 01:31:43.412 UTC [gossip.comm] Send -> DEBU 3c67 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:43.412 UTC [msp] DeserializeIdentity -> DEBU 3c68 Obtaining identity" -"2019-05-02 01:31:43.412 UTC [gossip.comm] Send -> DEBU 3c69 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:43.412 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.412 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6b Exiting" -"2019-05-02 01:31:43.412 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.412 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6d Exiting" -"2019-05-02 01:31:43.414 UTC [gossip.comm] func1 -> DEBU 3c6e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.414 UTC [gossip.gossip] handleMessage -> DEBU 3c6f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.414 UTC [gossip.gossip] handleMessage -> DEBU 3c70 Exiting" -"2019-05-02 01:31:43.414 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c71 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.414 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c72 Exiting" -"2019-05-02 01:31:43.419 UTC [gossip.comm] func1 -> DEBU 3c73 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.419 UTC [gossip.gossip] handleMessage -> DEBU 3c74 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.419 UTC [gossip.gossip] handleMessage -> DEBU 3c75 Exiting" -"2019-05-02 01:31:43.419 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c76 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.419 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c77 Exiting" -"2019-05-02 01:31:43.473 UTC [gossip.comm] func1 -> DEBU 3c78 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.473 UTC [gossip.gossip] handleMessage -> DEBU 3c79 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.473 UTC [gossip.gossip] handleMessage -> DEBU 3c7a Exiting" -"2019-05-02 01:31:43.473 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.473 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c7c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:43.473 UTC [msp] DeserializeIdentity -> DEBU 3c7d Obtaining identity" -"2019-05-02 01:31:43.473 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:43.473 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c7f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:43.474 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c80 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:43.474 UTC [cauthdsl] func1 -> DEBU 3c84 0xc002f7d510 gate 1556760703474155100 evaluation starts" -"2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c85 0xc002f7d510 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c86 0xc002f7d510 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c87 0xc002f7d510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c88 0xc002f7d510 principal evaluation fails" -"2019-05-02 01:31:43.474 UTC [cauthdsl] func1 -> DEBU 3c89 0xc002f7d510 gate 1556760703474155100 evaluation fails" -"2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c8a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:43.474 UTC [policies] Evaluate -> DEBU 3c8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:43.474 UTC [cauthdsl] func1 -> DEBU 3c8d 0xc002f7dd90 gate 1556760703474609500 evaluation starts" -"2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c8e 0xc002f7dd90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c8f 0xc002f7dd90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:43.474 UTC [cauthdsl] func2 -> DEBU 3c90 0xc002f7dd90 principal matched by identity 0" -"2019-05-02 01:31:43.474 UTC [msp.identity] Verify -> DEBU 3c91 Verify: digest = 00000000 8a 92 dc 2a c0 73 01 e4 ea 32 75 b4 aa e9 db 13 |...*.s...2u.....| -00000010 a7 89 40 7e 3d 28 af ec fb 75 e5 3d 3d bf 6c 52 |..@~=(...u.==.lR|" -"2019-05-02 01:31:43.474 UTC [msp.identity] Verify -> DEBU 3c92 Verify: sig = 00000000 30 44 02 20 0f 14 36 63 15 6f 93 24 bd 7c 50 d8 |0D. ..6c.o.$.|P.| -00000010 06 bc 22 1c f3 ef fc 33 7e 71 97 f6 89 5c 77 36 |.."....3~q...\w6| -00000020 9b 12 d1 f5 02 20 0b aa cd ce 4d 58 76 01 55 21 |..... ....MXv.U!| -00000030 84 7c 97 97 52 b4 19 80 92 01 1b 42 b0 98 ad 4a |.|..R......B...J| -00000040 f5 16 46 76 31 4a |..Fv1J|" -"2019-05-02 01:31:43.475 UTC [cauthdsl] func2 -> DEBU 3c93 0xc002f7dd90 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:43.475 UTC [cauthdsl] func1 -> DEBU 3c94 0xc002f7dd90 gate 1556760703474609500 evaluation succeeds" -"2019-05-02 01:31:43.475 UTC [policies] Evaluate -> DEBU 3c95 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:43.475 UTC [policies] Evaluate -> DEBU 3c96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:43.475 UTC [policies] Evaluate -> DEBU 3c97 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:43.475 UTC [policies] Evaluate -> DEBU 3c98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:43.475 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c99 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:43.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 " -"2019-05-02 01:31:43.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 " -"2019-05-02 01:31:43.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:43.475 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9e Exiting" -"2019-05-02 01:31:43.475 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c9f Exiting" -"2019-05-02 01:31:43.475 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca0 Exiting" -"2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca1 Obtaining identity" -"2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca2 Obtaining identity" -"2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca3 Obtaining identity" -"2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca4 Obtaining identity" -"2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca5 Obtaining identity" -"2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca6 Obtaining identity" -"2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca7 Obtaining identity" -"2019-05-02 01:31:43.478 UTC [gossip.comm] Send -> DEBU 3ca8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:43.478 UTC [msp] DeserializeIdentity -> DEBU 3ca9 Obtaining identity" -"2019-05-02 01:31:43.479 UTC [gossip.comm] Send -> DEBU 3caa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:43.479 UTC [gossip.comm] sendToEndpoint -> DEBU 3cab Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.479 UTC [gossip.comm] sendToEndpoint -> DEBU 3cac Exiting" -"2019-05-02 01:31:43.479 UTC [gossip.comm] sendToEndpoint -> DEBU 3cad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.479 UTC [gossip.comm] sendToEndpoint -> DEBU 3cae Exiting" -"2019-05-02 01:31:43.480 UTC [gossip.comm] func1 -> DEBU 3caf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.480 UTC [gossip.gossip] handleMessage -> DEBU 3cb0 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.480 UTC [gossip.gossip] handleMessage -> DEBU 3cb1 Exiting" -"2019-05-02 01:31:43.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.480 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb3 Exiting" -"2019-05-02 01:31:43.485 UTC [gossip.comm] func1 -> DEBU 3cb4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.485 UTC [gossip.gossip] handleMessage -> DEBU 3cb5 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.485 UTC [gossip.gossip] handleMessage -> DEBU 3cb6 Exiting" -"2019-05-02 01:31:43.485 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:43.485 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb8 Exiting" -"2019-05-02 01:31:43.699 UTC [msp.identity] Sign -> DEBU 3cb9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102E " -"2019-05-02 01:31:43.699 UTC [msp.identity] Sign -> DEBU 3cba Sign: digest: EBAADADE9CF578AC89CBD4309DC0C142C9EDB25940F77CE7C9BB737ECB846EFD " -"2019-05-02 01:31:43.700 UTC [msp.identity] Sign -> DEBU 3cbb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:43.700 UTC [msp.identity] Sign -> DEBU 3cbc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:43.700 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3cbd Sleeping 5s" -"2019-05-02 01:31:43.708 UTC [msp] DeserializeIdentity -> DEBU 3cbe Obtaining identity" -"2019-05-02 01:31:43.708 UTC [msp] DeserializeIdentity -> DEBU 3cbf Obtaining identity" -"2019-05-02 01:31:43.709 UTC [gossip.comm] Send -> DEBU 3cc0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:43.709 UTC [msp] DeserializeIdentity -> DEBU 3cc1 Obtaining identity" -"2019-05-02 01:31:43.709 UTC [gossip.comm] Send -> DEBU 3cc2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:43.709 UTC [msp] DeserializeIdentity -> DEBU 3cc3 Obtaining identity" -"2019-05-02 01:31:43.709 UTC [gossip.comm] Send -> DEBU 3cc4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cc5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cc6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cc7 Exiting" -"2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cc8 Exiting" -"2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cc9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.709 UTC [gossip.comm] sendToEndpoint -> DEBU 3cca Exiting" -"2019-05-02 01:31:43.820 UTC [gossip.comm] func1 -> DEBU 3ccb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.821 UTC [gossip.gossip] handleMessage -> DEBU 3ccc Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.821 UTC [gossip.gossip] handleMessage -> DEBU 3ccd Exiting" -"2019-05-02 01:31:43.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cce Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.821 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ccf Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:43.821 UTC [msp] DeserializeIdentity -> DEBU 3cd0 Obtaining identity" -"2019-05-02 01:31:43.821 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cd1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:43.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd2 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:43.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd3 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cd4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cd5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cd6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:43.821 UTC [cauthdsl] func1 -> DEBU 3cd7 0xc002e31db0 gate 1556760703821609600 evaluation starts" -"2019-05-02 01:31:43.821 UTC [cauthdsl] func2 -> DEBU 3cd8 0xc002e31db0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:43.821 UTC [cauthdsl] func2 -> DEBU 3cd9 0xc002e31db0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:43.821 UTC [cauthdsl] func2 -> DEBU 3cda 0xc002e31db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:43.821 UTC [cauthdsl] func2 -> DEBU 3cdb 0xc002e31db0 principal evaluation fails" -"2019-05-02 01:31:43.821 UTC [cauthdsl] func1 -> DEBU 3cdc 0xc002e31db0 gate 1556760703821609600 evaluation fails" -"2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cdd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cde == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:43.821 UTC [policies] Evaluate -> DEBU 3cdf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:43.821 UTC [cauthdsl] func1 -> DEBU 3ce0 0xc00038e740 gate 1556760703821967500 evaluation starts" -"2019-05-02 01:31:43.822 UTC [cauthdsl] func2 -> DEBU 3ce1 0xc00038e740 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:43.822 UTC [cauthdsl] func2 -> DEBU 3ce2 0xc00038e740 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:43.822 UTC [cauthdsl] func2 -> DEBU 3ce3 0xc00038e740 principal matched by identity 0" -"2019-05-02 01:31:43.822 UTC [msp.identity] Verify -> DEBU 3ce4 Verify: digest = 00000000 41 fd 78 2f b1 67 08 b2 df c9 08 ea 96 34 d8 d9 |A.x/.g.......4..| -00000010 cc a2 32 eb c7 81 d2 76 71 7b 41 50 7f 2d 5f 49 |..2....vq{AP.-_I|" -"2019-05-02 01:31:43.822 UTC [msp.identity] Verify -> DEBU 3ce5 Verify: sig = 00000000 30 45 02 21 00 fc 3e 42 94 cb 3a b3 2b ec 3f 2b |0E.!..>B..:.+.?+| -00000010 55 b8 c8 a3 5c 28 60 7f 11 32 19 df 46 00 c6 d9 |U...\(`..2..F...| -00000020 d2 05 94 58 e9 02 20 11 57 c4 12 77 5f 26 0d 4a |...X.. .W..w_&.J| -00000030 0e dd 43 26 23 8e 18 0d 6a 5c ba 88 50 5c 24 0c |..C&#...j\..P\$.| -00000040 9d df 59 5e 10 26 96 |..Y^.&.|" -"2019-05-02 01:31:43.822 UTC [cauthdsl] func2 -> DEBU 3ce6 0xc00038e740 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:43.824 UTC [cauthdsl] func1 -> DEBU 3ce7 0xc00038e740 gate 1556760703821967500 evaluation succeeds" -"2019-05-02 01:31:43.824 UTC [policies] Evaluate -> DEBU 3ce8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:43.824 UTC [policies] Evaluate -> DEBU 3ce9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:43.824 UTC [policies] Evaluate -> DEBU 3cea Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:43.824 UTC [policies] Evaluate -> DEBU 3ceb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:43.824 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cec Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ced Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:43.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cee updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 " -"2019-05-02 01:31:43.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cef Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 " -"2019-05-02 01:31:43.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cf0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:43.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cf1 Exiting" -"2019-05-02 01:31:43.826 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cf2 Exiting" -"2019-05-02 01:31:43.826 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cf3 Exiting" -"2019-05-02 01:31:43.829 UTC [msp] DeserializeIdentity -> DEBU 3cf4 Obtaining identity" -"2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cf5 Obtaining identity" -"2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cf6 Obtaining identity" -"2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cf7 Obtaining identity" -"2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cf8 Obtaining identity" -"2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cf9 Obtaining identity" -"2019-05-02 01:31:43.830 UTC [gossip.comm] Send -> DEBU 3cfa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cfb Obtaining identity" -"2019-05-02 01:31:43.830 UTC [msp] DeserializeIdentity -> DEBU 3cfc Obtaining identity" -"2019-05-02 01:31:43.830 UTC [gossip.comm] Send -> DEBU 3cfd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 3cfe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 3cff Exiting" -"2019-05-02 01:31:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 3d00 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.831 UTC [gossip.comm] sendToEndpoint -> DEBU 3d01 Exiting" -"2019-05-02 01:31:43.833 UTC [gossip.comm] func1 -> DEBU 3d02 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.833 UTC [gossip.gossip] handleMessage -> DEBU 3d03 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.833 UTC [gossip.gossip] handleMessage -> DEBU 3d04 Exiting" -"2019-05-02 01:31:43.833 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d05 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.833 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d06 Exiting" -"2019-05-02 01:31:43.835 UTC [gossip.comm] func1 -> DEBU 3d07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.836 UTC [gossip.gossip] handleMessage -> DEBU 3d08 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.836 UTC [gossip.gossip] handleMessage -> DEBU 3d09 Exiting" -"2019-05-02 01:31:43.836 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:43.837 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d0b Exiting" -"2019-05-02 01:31:44.787 UTC [msp] DeserializeIdentity -> DEBU 3d0c Obtaining identity" -"2019-05-02 01:31:44.787 UTC [msp] DeserializeIdentity -> DEBU 3d0d Obtaining identity" -"2019-05-02 01:31:44.787 UTC [gossip.comm] Send -> DEBU 3d0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:44.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3d0f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3d10 Exiting" -"2019-05-02 01:31:44.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3d11 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3d12 Exiting" -"2019-05-02 01:31:44.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3d13 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3d14 Exiting" -"2019-05-02 01:31:44.790 UTC [gossip.comm] func1 -> DEBU 3d15 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.790 UTC [gossip.gossip] handleMessage -> DEBU 3d16 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.791 UTC [msp.identity] Verify -> DEBU 3d17 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:44.791 UTC [msp.identity] Verify -> DEBU 3d18 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:44.792 UTC [gossip.comm] func1 -> DEBU 3d19 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.794 UTC [msp.identity] Verify -> DEBU 3d1a Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:44.795 UTC [msp.identity] Verify -> DEBU 3d1b Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:44.797 UTC [msp] DeserializeIdentity -> DEBU 3d1c Obtaining identity" -"2019-05-02 01:31:44.799 UTC [msp] DeserializeIdentity -> DEBU 3d1e Obtaining identity" -"2019-05-02 01:31:44.798 UTC [gossip.comm] func1 -> DEBU 3d1d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.801 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d1f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:44.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d20 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d21 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.803 UTC [policies] Evaluate -> DEBU 3d22 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:44.803 UTC [policies] Evaluate -> DEBU 3d23 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:44.804 UTC [policies] Evaluate -> DEBU 3d24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:44.804 UTC [cauthdsl] func1 -> DEBU 3d25 0xc0003b1bd0 gate 1556760704804816400 evaluation starts" -"2019-05-02 01:31:44.805 UTC [cauthdsl] func2 -> DEBU 3d26 0xc0003b1bd0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.805 UTC [cauthdsl] func2 -> DEBU 3d27 0xc0003b1bd0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.805 UTC [cauthdsl] func2 -> DEBU 3d28 0xc0003b1bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:44.806 UTC [cauthdsl] func2 -> DEBU 3d29 0xc0003b1bd0 principal evaluation fails" -"2019-05-02 01:31:44.806 UTC [cauthdsl] func1 -> DEBU 3d2a 0xc0003b1bd0 gate 1556760704804816400 evaluation fails" -"2019-05-02 01:31:44.807 UTC [policies] Evaluate -> DEBU 3d2b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.807 UTC [policies] Evaluate -> DEBU 3d2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.807 UTC [policies] Evaluate -> DEBU 3d2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:44.808 UTC [cauthdsl] func1 -> DEBU 3d2e 0xc00035a420 gate 1556760704808154000 evaluation starts" -"2019-05-02 01:31:44.808 UTC [cauthdsl] func2 -> DEBU 3d2f 0xc00035a420 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.808 UTC [cauthdsl] func2 -> DEBU 3d30 0xc00035a420 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.809 UTC [cauthdsl] func2 -> DEBU 3d31 0xc00035a420 principal matched by identity 0" -"2019-05-02 01:31:44.809 UTC [msp.identity] Verify -> DEBU 3d32 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:44.809 UTC [msp.identity] Verify -> DEBU 3d33 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:44.810 UTC [cauthdsl] func2 -> DEBU 3d34 0xc00035a420 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:44.810 UTC [cauthdsl] func1 -> DEBU 3d35 0xc00035a420 gate 1556760704808154000 evaluation succeeds" -"2019-05-02 01:31:44.810 UTC [policies] Evaluate -> DEBU 3d36 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.811 UTC [policies] Evaluate -> DEBU 3d37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.811 UTC [policies] Evaluate -> DEBU 3d38 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:44.812 UTC [policies] Evaluate -> DEBU 3d39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:44.812 UTC [msp] DeserializeIdentity -> DEBU 3d3a Obtaining identity" -"2019-05-02 01:31:44.812 UTC [msp] DeserializeIdentity -> DEBU 3d3b Obtaining identity" -"2019-05-02 01:31:44.813 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d3c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:44.813 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d3d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.813 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d3e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:44.814 UTC [cauthdsl] func1 -> DEBU 3d42 0xc00035bc70 gate 1556760704814414200 evaluation starts" -"2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d43 0xc00035bc70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d44 0xc00035bc70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d45 0xc00035bc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d46 0xc00035bc70 principal evaluation fails" -"2019-05-02 01:31:44.814 UTC [cauthdsl] func1 -> DEBU 3d47 0xc00035bc70 gate 1556760704814414200 evaluation fails" -"2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d48 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.814 UTC [policies] Evaluate -> DEBU 3d4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:44.814 UTC [cauthdsl] func1 -> DEBU 3d4b 0xc00043c760 gate 1556760704814747500 evaluation starts" -"2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d4c 0xc00043c760 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d4d 0xc00043c760 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.814 UTC [cauthdsl] func2 -> DEBU 3d4e 0xc00043c760 principal matched by identity 0" -"2019-05-02 01:31:44.814 UTC [msp.identity] Verify -> DEBU 3d4f Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:44.814 UTC [msp.identity] Verify -> DEBU 3d50 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:44.815 UTC [cauthdsl] func2 -> DEBU 3d51 0xc00043c760 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:44.815 UTC [cauthdsl] func1 -> DEBU 3d52 0xc00043c760 gate 1556760704814747500 evaluation succeeds" -"2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d53 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d54 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d55 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d56 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:44.815 UTC [gossip.gossip] handleMessage -> DEBU 3d57 Exiting" -"2019-05-02 01:31:44.815 UTC [gossip.gossip] handleMessage -> DEBU 3d58 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.815 UTC [msp] DeserializeIdentity -> DEBU 3d59 Obtaining identity" -"2019-05-02 01:31:44.815 UTC [msp] DeserializeIdentity -> DEBU 3d5a Obtaining identity" -"2019-05-02 01:31:44.815 UTC [msp] DeserializeIdentity -> DEBU 3d5b Obtaining identity" -"2019-05-02 01:31:44.815 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d5c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:44.815 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d5d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.815 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d5e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:44.815 UTC [policies] Evaluate -> DEBU 3d61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:44.815 UTC [cauthdsl] func1 -> DEBU 3d62 0xc0002e6e90 gate 1556760704815915300 evaluation starts" -"2019-05-02 01:31:44.815 UTC [cauthdsl] func2 -> DEBU 3d63 0xc0002e6e90 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d64 0xc0002e6e90 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d65 0xc0002e6e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d66 0xc0002e6e90 principal evaluation fails" -"2019-05-02 01:31:44.816 UTC [cauthdsl] func1 -> DEBU 3d67 0xc0002e6e90 gate 1556760704815915300 evaluation fails" -"2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d68 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:44.816 UTC [cauthdsl] func1 -> DEBU 3d6b 0xc0002e78d0 gate 1556760704816251500 evaluation starts" -"2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d6c 0xc0002e78d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d6d 0xc0002e78d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d6e 0xc0002e78d0 principal matched by identity 0" -"2019-05-02 01:31:44.816 UTC [msp.identity] Verify -> DEBU 3d6f Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:44.816 UTC [msp.identity] Verify -> DEBU 3d70 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:44.816 UTC [cauthdsl] func2 -> DEBU 3d71 0xc0002e78d0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:44.816 UTC [cauthdsl] func1 -> DEBU 3d72 0xc0002e78d0 gate 1556760704816251500 evaluation succeeds" -"2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d73 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d75 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:44.816 UTC [policies] Evaluate -> DEBU 3d76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:44.816 UTC [msp.identity] Verify -> DEBU 3d77 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:44.816 UTC [msp.identity] Verify -> DEBU 3d78 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:44.817 UTC [msp.identity] Verify -> DEBU 3d79 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:44.817 UTC [msp.identity] Verify -> DEBU 3d7a Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:44.817 UTC [msp] DeserializeIdentity -> DEBU 3d7b Obtaining identity" -"2019-05-02 01:31:44.817 UTC [msp] DeserializeIdentity -> DEBU 3d7c Obtaining identity" -"2019-05-02 01:31:44.817 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d7d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:44.817 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d7e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.817 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d7f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.817 UTC [policies] Evaluate -> DEBU 3d80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:44.817 UTC [policies] Evaluate -> DEBU 3d81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:44.817 UTC [policies] Evaluate -> DEBU 3d82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:44.818 UTC [cauthdsl] func1 -> DEBU 3d83 0xc0002a0510 gate 1556760704817859000 evaluation starts" -"2019-05-02 01:31:44.819 UTC [cauthdsl] func2 -> DEBU 3d84 0xc0002a0510 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.819 UTC [cauthdsl] func2 -> DEBU 3d85 0xc0002a0510 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.819 UTC [cauthdsl] func2 -> DEBU 3d86 0xc0002a0510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:44.820 UTC [cauthdsl] func2 -> DEBU 3d87 0xc0002a0510 principal evaluation fails" -"2019-05-02 01:31:44.820 UTC [cauthdsl] func1 -> DEBU 3d88 0xc0002a0510 gate 1556760704817859000 evaluation fails" -"2019-05-02 01:31:44.821 UTC [policies] Evaluate -> DEBU 3d89 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.821 UTC [policies] Evaluate -> DEBU 3d8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.821 UTC [policies] Evaluate -> DEBU 3d8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:44.822 UTC [cauthdsl] func1 -> DEBU 3d8c 0xc0002a0db0 gate 1556760704822064200 evaluation starts" -"2019-05-02 01:31:44.822 UTC [cauthdsl] func2 -> DEBU 3d8d 0xc0002a0db0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.822 UTC [cauthdsl] func2 -> DEBU 3d8e 0xc0002a0db0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.823 UTC [cauthdsl] func2 -> DEBU 3d8f 0xc0002a0db0 principal matched by identity 0" -"2019-05-02 01:31:44.823 UTC [msp.identity] Verify -> DEBU 3d90 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:44.823 UTC [msp.identity] Verify -> DEBU 3d91 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:44.824 UTC [cauthdsl] func2 -> DEBU 3d92 0xc0002a0db0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:44.824 UTC [cauthdsl] func1 -> DEBU 3d93 0xc0002a0db0 gate 1556760704822064200 evaluation succeeds" -"2019-05-02 01:31:44.825 UTC [policies] Evaluate -> DEBU 3d94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.825 UTC [policies] Evaluate -> DEBU 3d95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.826 UTC [policies] Evaluate -> DEBU 3d96 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:44.826 UTC [policies] Evaluate -> DEBU 3d97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:44.826 UTC [gossip.gossip] handleMessage -> DEBU 3d98 Exiting" -"2019-05-02 01:31:44.827 UTC [gossip.gossip] handleMessage -> DEBU 3d99 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.827 UTC [msp] DeserializeIdentity -> DEBU 3d9a Obtaining identity" -"2019-05-02 01:31:44.827 UTC [msp] DeserializeIdentity -> DEBU 3d9b Obtaining identity" -"2019-05-02 01:31:44.828 UTC [msp] DeserializeIdentity -> DEBU 3d9c Obtaining identity" -"2019-05-02 01:31:44.828 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d9d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:44.829 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d9e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.829 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d9f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.829 UTC [policies] Evaluate -> DEBU 3da0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:44.830 UTC [policies] Evaluate -> DEBU 3da1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:44.830 UTC [policies] Evaluate -> DEBU 3da2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:44.831 UTC [cauthdsl] func1 -> DEBU 3da3 0xc000390a10 gate 1556760704830992300 evaluation starts" -"2019-05-02 01:31:44.831 UTC [cauthdsl] func2 -> DEBU 3da4 0xc000390a10 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.831 UTC [cauthdsl] func2 -> DEBU 3da5 0xc000390a10 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.832 UTC [cauthdsl] func2 -> DEBU 3da6 0xc000390a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:44.832 UTC [cauthdsl] func2 -> DEBU 3da7 0xc000390a10 principal evaluation fails" -"2019-05-02 01:31:44.832 UTC [cauthdsl] func1 -> DEBU 3da8 0xc000390a10 gate 1556760704830992300 evaluation fails" -"2019-05-02 01:31:44.832 UTC [policies] Evaluate -> DEBU 3da9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.833 UTC [policies] Evaluate -> DEBU 3daa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.833 UTC [policies] Evaluate -> DEBU 3dab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:44.834 UTC [cauthdsl] func1 -> DEBU 3dac 0xc000391250 gate 1556760704833924000 evaluation starts" -"2019-05-02 01:31:44.834 UTC [cauthdsl] func2 -> DEBU 3dad 0xc000391250 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.834 UTC [cauthdsl] func2 -> DEBU 3dae 0xc000391250 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.834 UTC [cauthdsl] func2 -> DEBU 3daf 0xc000391250 principal matched by identity 0" -"2019-05-02 01:31:44.835 UTC [msp.identity] Verify -> DEBU 3db0 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:44.835 UTC [msp.identity] Verify -> DEBU 3db1 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:44.836 UTC [cauthdsl] func2 -> DEBU 3db2 0xc000391250 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:44.836 UTC [cauthdsl] func1 -> DEBU 3db3 0xc000391250 gate 1556760704833924000 evaluation succeeds" -"2019-05-02 01:31:44.836 UTC [policies] Evaluate -> DEBU 3db4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.836 UTC [policies] Evaluate -> DEBU 3db5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.837 UTC [policies] Evaluate -> DEBU 3db6 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:44.837 UTC [policies] Evaluate -> DEBU 3db7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:44.837 UTC [msp.identity] Verify -> DEBU 3db8 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:44.837 UTC [msp.identity] Verify -> DEBU 3db9 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:44.837 UTC [msp] DeserializeIdentity -> DEBU 3dba Obtaining identity" -"2019-05-02 01:31:44.838 UTC [msp] DeserializeIdentity -> DEBU 3dbb Obtaining identity" -"2019-05-02 01:31:44.838 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:44.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dbd Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.839 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dbe Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:44.839 UTC [policies] Evaluate -> DEBU 3dbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:44.840 UTC [policies] Evaluate -> DEBU 3dc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:44.840 UTC [policies] Evaluate -> DEBU 3dc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:44.840 UTC [cauthdsl] func1 -> DEBU 3dc2 0xc000473220 gate 1556760704840793000 evaluation starts" -"2019-05-02 01:31:44.841 UTC [cauthdsl] func2 -> DEBU 3dc3 0xc000473220 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.841 UTC [cauthdsl] func2 -> DEBU 3dc4 0xc000473220 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.841 UTC [cauthdsl] func2 -> DEBU 3dc5 0xc000473220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:44.842 UTC [cauthdsl] func2 -> DEBU 3dc6 0xc000473220 principal evaluation fails" -"2019-05-02 01:31:44.842 UTC [cauthdsl] func1 -> DEBU 3dc7 0xc000473220 gate 1556760704840793000 evaluation fails" -"2019-05-02 01:31:44.842 UTC [policies] Evaluate -> DEBU 3dc8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.842 UTC [policies] Evaluate -> DEBU 3dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:44.842 UTC [policies] Evaluate -> DEBU 3dca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:44.842 UTC [cauthdsl] func1 -> DEBU 3dcb 0xc000473a60 gate 1556760704842638200 evaluation starts" -"2019-05-02 01:31:44.842 UTC [cauthdsl] func2 -> DEBU 3dcc 0xc000473a60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:44.842 UTC [cauthdsl] func2 -> DEBU 3dcd 0xc000473a60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:44.842 UTC [cauthdsl] func2 -> DEBU 3dce 0xc000473a60 principal matched by identity 0" -"2019-05-02 01:31:44.842 UTC [msp.identity] Verify -> DEBU 3dcf Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:44.842 UTC [msp.identity] Verify -> DEBU 3dd0 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:44.842 UTC [cauthdsl] func2 -> DEBU 3dd1 0xc000473a60 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:44.843 UTC [cauthdsl] func1 -> DEBU 3dd2 0xc000473a60 gate 1556760704842638200 evaluation succeeds" -"2019-05-02 01:31:44.843 UTC [policies] Evaluate -> DEBU 3dd3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.843 UTC [policies] Evaluate -> DEBU 3dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:44.843 UTC [policies] Evaluate -> DEBU 3dd5 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:44.843 UTC [policies] Evaluate -> DEBU 3dd6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:44.843 UTC [msp.identity] Verify -> DEBU 3dd7 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:44.843 UTC [msp.identity] Verify -> DEBU 3dd8 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:44.843 UTC [gossip.gossip] handleMessage -> DEBU 3dd9 Exiting" -"2019-05-02 01:31:44.919 UTC [msp] DeserializeIdentity -> DEBU 3dda Obtaining identity" -"2019-05-02 01:31:44.919 UTC [msp] DeserializeIdentity -> DEBU 3ddb Obtaining identity" -"2019-05-02 01:31:44.919 UTC [gossip.pull] Hello -> DEBU 3ddc Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:44.919 UTC [msp] DeserializeIdentity -> DEBU 3ddd Obtaining identity" -"2019-05-02 01:31:44.919 UTC [msp] DeserializeIdentity -> DEBU 3dde Obtaining identity" -"2019-05-02 01:31:44.920 UTC [gossip.comm] Send -> DEBU 3ddf Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:44.920 UTC [gossip.comm] sendToEndpoint -> DEBU 3de0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.921 UTC [gossip.comm] sendToEndpoint -> DEBU 3de1 Exiting" -"2019-05-02 01:31:44.922 UTC [gossip.comm] func1 -> DEBU 3de2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15432964767498107510 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 61 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.922 UTC [gossip.gossip] handleMessage -> DEBU 3de3 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15432964767498107510 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 61 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.922 UTC [gossip.pull] HandleMessage -> DEBU 3de4 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15432964767498107510 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 61 bytes, Signature: 0 bytes" -"2019-05-02 01:31:44.922 UTC [gossip.gossip] handleMessage -> DEBU 3de5 Exiting" -"2019-05-02 01:31:45.050 UTC [gossip.comm] func1 -> DEBU 3de6 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.056 UTC [gossip.gossip] handleMessage -> DEBU 3de7 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.057 UTC [msp] DeserializeIdentity -> DEBU 3de8 Obtaining identity" -"2019-05-02 01:31:45.058 UTC [msp] DeserializeIdentity -> DEBU 3de9 Obtaining identity" -"2019-05-02 01:31:45.058 UTC [gossip.gossip] handleMessage -> DEBU 3dea Exiting" -"2019-05-02 01:31:45.091 UTC [gossip.comm] func1 -> DEBU 3deb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.092 UTC [gossip.gossip] handleMessage -> DEBU 3dec Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.093 UTC [gossip.pull] HandleMessage -> DEBU 3ded GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.093 UTC [gossip.pull] SendDigest -> DEBU 3dee Sending BLOCK_MSG digest: [2 3 4 9 1 5 6 7 8] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:45.093 UTC [gossip.gossip] handleMessage -> DEBU 3def Exiting" -"2019-05-02 01:31:45.275 UTC [gossip.comm] func1 -> DEBU 3df0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.276 UTC [gossip.gossip] handleMessage -> DEBU 3df1 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.276 UTC [msp] DeserializeIdentity -> DEBU 3df2 Obtaining identity" -"2019-05-02 01:31:45.276 UTC [msp] DeserializeIdentity -> DEBU 3df3 Obtaining identity" -"2019-05-02 01:31:45.276 UTC [msp] DeserializeIdentity -> DEBU 3df4 Obtaining identity" -"2019-05-02 01:31:45.276 UTC [gossip.gossip] handleMessage -> DEBU 3df5 Exiting" -"2019-05-02 01:31:45.400 UTC [gossip.comm] func1 -> DEBU 3df6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.400 UTC [gossip.gossip] handleMessage -> DEBU 3df7 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.401 UTC [gossip.pull] HandleMessage -> DEBU 3df8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.401 UTC [gossip.pull] SendDigest -> DEBU 3df9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:45.401 UTC [gossip.gossip] handleMessage -> DEBU 3dfa Exiting" -"2019-05-02 01:31:45.438 UTC [gossip.comm] func1 -> DEBU 3dfb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.438 UTC [gossip.gossip] handleMessage -> DEBU 3dfc Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.438 UTC [gossip.gossip] handleMessage -> DEBU 3dfd Exiting" -"2019-05-02 01:31:45.438 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dfe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.438 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dff Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:45.438 UTC [msp.identity] Verify -> DEBU 3e00 Verify: digest = 00000000 7d 61 2e e2 87 88 f7 00 6a 24 c7 54 1f d0 29 76 |}a......j$.T..)v| -00000010 d6 b5 b9 2a f9 e3 51 30 4e d3 08 12 28 27 c2 7d |...*..Q0N...('.}|" -"2019-05-02 01:31:45.439 UTC [msp.identity] Verify -> DEBU 3e01 Verify: sig = 00000000 30 45 02 21 00 a5 45 e3 19 cb 21 a9 bb 6d a2 fe |0E.!..E...!..m..| -00000010 39 40 20 69 2f dc 71 c4 38 fc 13 99 93 14 85 48 |9@ i/.q.8......H| -00000020 04 16 b9 7e 61 02 20 63 14 54 8b 12 a4 d3 1a 08 |...~a. c.T......| -00000030 5a 27 0c d7 bd 42 54 03 11 db 7a f2 80 bf 23 6e |Z'...BT...z...#n| -00000040 4f 0e 6a 25 80 9d df |O.j%...|" -"2019-05-02 01:31:45.439 UTC [msp.identity] Verify -> DEBU 3e02 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:45.439 UTC [msp.identity] Verify -> DEBU 3e03 Verify: sig = 00000000 30 44 02 20 0b 54 84 99 8a b4 67 4f 74 85 e8 be |0D. .T....gOt...| -00000010 d0 87 03 5f 7f 20 a5 8e 8b bb 34 75 d7 86 08 49 |..._. ....4u...I| -00000020 aa db 0f 78 02 20 7e dd 99 78 b2 3f 28 a6 cf b4 |...x. ~..x.?(...| -00000030 d6 b3 02 b5 37 c7 e8 ae b9 a4 b7 7e 44 ff c0 ec |....7......~D...| -00000040 62 ef 9d bc 61 a8 |b...a.|" -"2019-05-02 01:31:45.439 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e04 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:45.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e05 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:31:45.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e06 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 " -"2019-05-02 01:31:45.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e07 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 " -"2019-05-02 01:31:45.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e08 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:45.439 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e09 Exiting" -"2019-05-02 01:31:45.440 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e0a Exiting" -"2019-05-02 01:31:45.440 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e0b Exiting" -"2019-05-02 01:31:45.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3e0c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:45.440 UTC [msp] DeserializeIdentity -> DEBU 3e0d Obtaining identity" -"2019-05-02 01:31:45.440 UTC [msp] DeserializeIdentity -> DEBU 3e0e Obtaining identity" -"2019-05-02 01:31:45.440 UTC [gossip.comm] Send -> DEBU 3e0f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:45.440 UTC [gossip.discovery] sendMemResponse -> DEBU 3e10 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:45.440 UTC [gossip.comm] sendToEndpoint -> DEBU 3e11 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.440 UTC [gossip.comm] sendToEndpoint -> DEBU 3e12 Exiting" -"2019-05-02 01:31:45.498 UTC [gossip.comm] func1 -> DEBU 3e13 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.498 UTC [gossip.gossip] handleMessage -> DEBU 3e14 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.498 UTC [gossip.pull] HandleMessage -> DEBU 3e15 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.498 UTC [msp] DeserializeIdentity -> DEBU 3e16 Obtaining identity" -"2019-05-02 01:31:45.499 UTC [msp] DeserializeIdentity -> DEBU 3e17 Obtaining identity" -"2019-05-02 01:31:45.499 UTC [msp] DeserializeIdentity -> DEBU 3e18 Obtaining identity" -"2019-05-02 01:31:45.499 UTC [msp] DeserializeIdentity -> DEBU 3e19 Obtaining identity" -"2019-05-02 01:31:45.499 UTC [msp] DeserializeIdentity -> DEBU 3e1a Obtaining identity" -"2019-05-02 01:31:45.499 UTC [msp] DeserializeIdentity -> DEBU 3e1b Obtaining identity" -"2019-05-02 01:31:45.499 UTC [gossip.pull] SendDigest -> DEBU 3e1c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:45.499 UTC [gossip.gossip] handleMessage -> DEBU 3e1d Exiting" -"2019-05-02 01:31:45.524 UTC [gossip.comm] func1 -> DEBU 3e1e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.525 UTC [gossip.gossip] handleMessage -> DEBU 3e1f Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.525 UTC [gossip.gossip] handleMessage -> DEBU 3e20 Exiting" -"2019-05-02 01:31:45.525 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.526 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e22 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:45.527 UTC [msp] DeserializeIdentity -> DEBU 3e23 Obtaining identity" -"2019-05-02 01:31:45.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:45.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e25 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:45.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e26 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:45.528 UTC [policies] Evaluate -> DEBU 3e27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:45.529 UTC [policies] Evaluate -> DEBU 3e28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:45.529 UTC [policies] Evaluate -> DEBU 3e29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:45.529 UTC [cauthdsl] func1 -> DEBU 3e2a 0xc002146350 gate 1556760705529469000 evaluation starts" -"2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e2b 0xc002146350 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e2c 0xc002146350 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e2d 0xc002146350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e2e 0xc002146350 principal evaluation fails" -"2019-05-02 01:31:45.529 UTC [cauthdsl] func1 -> DEBU 3e2f 0xc002146350 gate 1556760705529469000 evaluation fails" -"2019-05-02 01:31:45.529 UTC [policies] Evaluate -> DEBU 3e30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:45.529 UTC [policies] Evaluate -> DEBU 3e31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:45.529 UTC [policies] Evaluate -> DEBU 3e32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:45.529 UTC [cauthdsl] func1 -> DEBU 3e33 0xc002146fb0 gate 1556760705529789500 evaluation starts" -"2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e34 0xc002146fb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e35 0xc002146fb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:45.529 UTC [cauthdsl] func2 -> DEBU 3e36 0xc002146fb0 principal matched by identity 0" -"2019-05-02 01:31:45.529 UTC [msp.identity] Verify -> DEBU 3e37 Verify: digest = 00000000 a0 d1 41 53 a1 70 71 ce 68 df b7 c7 08 8c 2c 1c |..AS.pq.h.....,.| -00000010 67 61 93 06 e4 d1 f6 f3 c9 ec c9 81 97 0b 97 75 |ga.............u|" -"2019-05-02 01:31:45.529 UTC [msp.identity] Verify -> DEBU 3e38 Verify: sig = 00000000 30 45 02 21 00 d8 ee 77 4d 06 d0 c7 b8 45 82 e6 |0E.!...wM....E..| -00000010 81 47 56 5b c7 5e 9b 1d 53 8e 07 4e 12 68 0f 1c |.GV[.^..S..N.h..| -00000020 40 f2 58 4c 0a 02 20 54 71 ee 2a 4e 23 7b 53 c0 |@.XL.. Tq.*N#{S.| -00000030 09 fd 27 a8 5d cb 9c 2a 1b c2 c4 7f 17 1f f9 65 |..'.]..*.......e| -00000040 26 f1 d0 4d 3e ed 4e |&..M>.N|" -"2019-05-02 01:31:45.530 UTC [cauthdsl] func2 -> DEBU 3e39 0xc002146fb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:45.530 UTC [cauthdsl] func1 -> DEBU 3e3a 0xc002146fb0 gate 1556760705529789500 evaluation succeeds" -"2019-05-02 01:31:45.530 UTC [policies] Evaluate -> DEBU 3e3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:45.530 UTC [policies] Evaluate -> DEBU 3e3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:45.530 UTC [policies] Evaluate -> DEBU 3e3d Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:45.530 UTC [policies] Evaluate -> DEBU 3e3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:45.530 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:45.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e40 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:45.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e41 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 " -"2019-05-02 01:31:45.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e42 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 " -"2019-05-02 01:31:45.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e43 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:45.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e44 Exiting" -"2019-05-02 01:31:45.530 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e45 Exiting" -"2019-05-02 01:31:45.531 UTC [gossip.discovery] sendMemResponse -> DEBU 3e46 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:45.531 UTC [msp] DeserializeIdentity -> DEBU 3e47 Obtaining identity" -"2019-05-02 01:31:45.531 UTC [msp] DeserializeIdentity -> DEBU 3e48 Obtaining identity" -"2019-05-02 01:31:45.531 UTC [msp] DeserializeIdentity -> DEBU 3e49 Obtaining identity" -"2019-05-02 01:31:45.531 UTC [gossip.comm] Send -> DEBU 3e4a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:45.531 UTC [gossip.discovery] sendMemResponse -> DEBU 3e4b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:45.531 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.531 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4d Exiting" -"2019-05-02 01:31:45.530 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e4e Exiting" -"2019-05-02 01:31:45.536 UTC [gossip.comm] func1 -> DEBU 3e4f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.536 UTC [gossip.gossip] handleMessage -> DEBU 3e50 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.536 UTC [msp] DeserializeIdentity -> DEBU 3e51 Obtaining identity" -"2019-05-02 01:31:45.536 UTC [msp] DeserializeIdentity -> DEBU 3e52 Obtaining identity" -"2019-05-02 01:31:45.536 UTC [msp] DeserializeIdentity -> DEBU 3e53 Obtaining identity" -"2019-05-02 01:31:45.537 UTC [gossip.gossip] handleMessage -> DEBU 3e54 Exiting" -"2019-05-02 01:31:45.712 UTC [gossip.comm] func1 -> DEBU 3e55 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.713 UTC [gossip.gossip] handleMessage -> DEBU 3e56 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.713 UTC [gossip.pull] HandleMessage -> DEBU 3e57 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e58 Obtaining identity" -"2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e59 Obtaining identity" -"2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e5a Obtaining identity" -"2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e5b Obtaining identity" -"2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e5c Obtaining identity" -"2019-05-02 01:31:45.713 UTC [msp] DeserializeIdentity -> DEBU 3e5d Obtaining identity" -"2019-05-02 01:31:45.713 UTC [gossip.pull] SendDigest -> DEBU 3e5e Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:45.713 UTC [gossip.gossip] handleMessage -> DEBU 3e5f Exiting" -"2019-05-02 01:31:45.818 UTC [gossip.pull] Hello -> DEBU 3e60 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:45.819 UTC [gossip.comm] Send -> DEBU 3e61 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:45.819 UTC [gossip.pull] Hello -> DEBU 3e62 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:45.820 UTC [gossip.comm] Send -> DEBU 3e63 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:45.820 UTC [gossip.pull] Hello -> DEBU 3e64 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:45.820 UTC [gossip.comm] sendToEndpoint -> DEBU 3e65 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.820 UTC [gossip.comm] sendToEndpoint -> DEBU 3e66 Exiting" -"2019-05-02 01:31:45.820 UTC [gossip.comm] Send -> DEBU 3e67 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:45.820 UTC [gossip.comm] sendToEndpoint -> DEBU 3e68 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.820 UTC [gossip.comm] sendToEndpoint -> DEBU 3e69 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.822 UTC [gossip.comm] func1 -> DEBU 3e6a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3369004806053908598 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.822 UTC [gossip.gossip] handleMessage -> DEBU 3e6b Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3369004806053908598 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.822 UTC [gossip.pull] HandleMessage -> DEBU 3e6c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3369004806053908598 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.822 UTC [gossip.gossip] handleMessage -> DEBU 3e6d Exiting" -"2019-05-02 01:31:45.823 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6e Exiting" -"2019-05-02 01:31:45.823 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6f Exiting" -"2019-05-02 01:31:45.825 UTC [gossip.comm] func1 -> DEBU 3e70 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12841444216908479344 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.825 UTC [gossip.gossip] handleMessage -> DEBU 3e71 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12841444216908479344 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.825 UTC [gossip.pull] HandleMessage -> DEBU 3e72 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12841444216908479344 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.825 UTC [gossip.gossip] handleMessage -> DEBU 3e73 Exiting" -"2019-05-02 01:31:45.825 UTC [gossip.comm] func1 -> DEBU 3e74 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13095961533477278849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.825 UTC [gossip.gossip] handleMessage -> DEBU 3e75 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13095961533477278849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.825 UTC [gossip.pull] HandleMessage -> DEBU 3e76 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13095961533477278849 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.825 UTC [gossip.gossip] handleMessage -> DEBU 3e77 Exiting" -"2019-05-02 01:31:45.878 UTC [gossip.comm] func1 -> DEBU 3e78 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.878 UTC [gossip.gossip] handleMessage -> DEBU 3e79 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.878 UTC [gossip.gossip] handleMessage -> DEBU 3e7a Exiting" -"2019-05-02 01:31:45.878 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.878 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e7c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:45.878 UTC [msp] DeserializeIdentity -> DEBU 3e7d Obtaining identity" -"2019-05-02 01:31:45.879 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:45.879 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:45.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e80 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:45.880 UTC [cauthdsl] func1 -> DEBU 3e84 0xc0021d4860 gate 1556760705880397400 evaluation starts" -"2019-05-02 01:31:45.880 UTC [cauthdsl] func2 -> DEBU 3e85 0xc0021d4860 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:45.880 UTC [cauthdsl] func2 -> DEBU 3e86 0xc0021d4860 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:45.880 UTC [cauthdsl] func2 -> DEBU 3e87 0xc0021d4860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:45.880 UTC [cauthdsl] func2 -> DEBU 3e88 0xc0021d4860 principal evaluation fails" -"2019-05-02 01:31:45.880 UTC [cauthdsl] func1 -> DEBU 3e89 0xc0021d4860 gate 1556760705880397400 evaluation fails" -"2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e8a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:45.880 UTC [policies] Evaluate -> DEBU 3e8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:45.881 UTC [cauthdsl] func1 -> DEBU 3e8d 0xc0021d50a0 gate 1556760705881064200 evaluation starts" -"2019-05-02 01:31:45.881 UTC [cauthdsl] func2 -> DEBU 3e8e 0xc0021d50a0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:45.881 UTC [cauthdsl] func2 -> DEBU 3e8f 0xc0021d50a0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:45.881 UTC [cauthdsl] func2 -> DEBU 3e90 0xc0021d50a0 principal matched by identity 0" -"2019-05-02 01:31:45.881 UTC [msp.identity] Verify -> DEBU 3e91 Verify: digest = 00000000 cc f0 d6 69 4c 6a 90 19 3b 3b 6f 4d 81 e9 eb b6 |...iLj..;;oM....| -00000010 58 f7 5b a0 8e e8 04 37 72 01 80 ac cb 29 6f 25 |X.[....7r....)o%|" -"2019-05-02 01:31:45.881 UTC [msp.identity] Verify -> DEBU 3e92 Verify: sig = 00000000 30 44 02 20 12 2a 55 56 c7 d2 6e 6f 4d 77 fd 59 |0D. .*UV..noMw.Y| -00000010 47 8b 5d 71 35 4f d6 27 f0 9d fa 08 b9 78 11 4f |G.]q5O.'.....x.O| -00000020 12 8e d6 8f 02 20 5a 0b aa 25 ff e7 35 6c 60 18 |..... Z..%..5l`.| -00000030 ef 78 4e 6b e1 65 3b 8b e6 63 b3 c9 eb 9f 69 24 |.xNk.e;..c....i$| -00000040 1a d2 f6 96 b2 2b |.....+|" -"2019-05-02 01:31:45.881 UTC [cauthdsl] func2 -> DEBU 3e93 0xc0021d50a0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:45.881 UTC [cauthdsl] func1 -> DEBU 3e94 0xc0021d50a0 gate 1556760705881064200 evaluation succeeds" -"2019-05-02 01:31:45.881 UTC [policies] Evaluate -> DEBU 3e95 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:45.881 UTC [policies] Evaluate -> DEBU 3e96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:45.881 UTC [policies] Evaluate -> DEBU 3e97 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:45.881 UTC [policies] Evaluate -> DEBU 3e98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:45.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e99 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:45.881 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:45.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9b updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 " -"2019-05-02 01:31:45.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 " -"2019-05-02 01:31:45.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:45.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9e Exiting" -"2019-05-02 01:31:45.882 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e9f Exiting" -"2019-05-02 01:31:45.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ea0 Exiting" -"2019-05-02 01:31:45.882 UTC [gossip.discovery] sendMemResponse -> DEBU 3ea1 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:45.882 UTC [msp] DeserializeIdentity -> DEBU 3ea2 Obtaining identity" -"2019-05-02 01:31:45.882 UTC [msp] DeserializeIdentity -> DEBU 3ea3 Obtaining identity" -"2019-05-02 01:31:45.882 UTC [msp] DeserializeIdentity -> DEBU 3ea4 Obtaining identity" -"2019-05-02 01:31:45.882 UTC [gossip.comm] Send -> DEBU 3ea5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:45.882 UTC [gossip.discovery] sendMemResponse -> DEBU 3ea6 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:45.883 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:45.883 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea8 Exiting" -"2019-05-02 01:31:46.159 UTC [msp.identity] Sign -> DEBU 3ea9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD15102F " -"2019-05-02 01:31:46.159 UTC [msp.identity] Sign -> DEBU 3eaa Sign: digest: 1196203EEFC4B02BC8032A14283F35D11209D056F7480B1CEE72E827E76410C7 " -"2019-05-02 01:31:46.159 UTC [msp.identity] Sign -> DEBU 3eab Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:46.159 UTC [msp.identity] Sign -> DEBU 3eac Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:46.159 UTC [gossip.comm] Send -> DEBU 3ead Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:46.159 UTC [msp] DeserializeIdentity -> DEBU 3eae Obtaining identity" -"2019-05-02 01:31:46.160 UTC [gossip.comm] Send -> DEBU 3eaf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:46.160 UTC [msp] DeserializeIdentity -> DEBU 3eb0 Obtaining identity" -"2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb2 Exiting" -"2019-05-02 01:31:46.160 UTC [gossip.comm] Send -> DEBU 3eb3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb5 Exiting" -"2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.160 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb7 Exiting" -"2019-05-02 01:31:46.163 UTC [gossip.comm] func1 -> DEBU 3eb8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.163 UTC [gossip.gossip] handleMessage -> DEBU 3eb9 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.163 UTC [gossip.gossip] handleMessage -> DEBU 3eba Exiting" -"2019-05-02 01:31:46.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ebb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.163 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ebc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:46.164 UTC [msp.identity] Verify -> DEBU 3ebd Verify: digest = 00000000 11 96 20 3e ef c4 b0 2b c8 03 2a 14 28 3f 35 d1 |.. >...+..*.(?5.| -00000010 12 09 d0 56 f7 48 0b 1c ee 72 e8 27 e7 64 10 c7 |...V.H...r.'.d..|" -"2019-05-02 01:31:46.164 UTC [msp.identity] Verify -> DEBU 3ebe Verify: sig = 00000000 30 44 02 20 39 0d d3 19 75 ff 16 2e 04 41 20 d8 |0D. 9...u....A .| -00000010 c7 48 ee 87 fd 72 1b 4f 4c 4b 45 b0 80 67 31 d8 |.H...r.OLKE..g1.| -00000020 3b 71 32 e3 02 20 7c de 3e 2f 13 87 7d cb 34 27 |;q2.. |.>/..}.4'| -00000030 90 38 a1 24 98 80 dd 06 f6 ca 72 23 99 ea 9d c7 |.8.$......r#....| -00000040 4a c9 13 ab 96 bf |J.....|" -"2019-05-02 01:31:46.164 UTC [msp.identity] Verify -> DEBU 3ebf Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:28:09.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3982 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.726 UTC [gossip.pull] Hello -> DEBU 3993 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:28:09.731 UTC [msp.identity] Verify -> DEBU 39a5 Verify: sig = 00000000 30 44 02 20 22 e2 72 2e 41 92 eb 36 a3 fd 12 0d |0D. ".r.A..6....| +00000010 68 c2 81 db 04 cb e9 3f c9 e5 37 c0 c6 4b 85 8c |h......?..7..K..| +00000020 8a 1b 7e b9 02 20 60 48 8b 66 6d 05 36 92 aa 40 |..~.. `H.fm.6..@| +00000030 72 42 a7 f7 05 80 17 3e 8d 3e 1a 82 d4 95 50 dd |rB.....>.>....P.| +00000040 2b 0f 76 01 e8 45 |+.v..E|" +"2019-05-02 09:28:09.732 UTC [gossip.discovery] handleAliveMessage -> DEBU 39a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:09.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 39aa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:28:09.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ab updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 " +"2019-05-02 09:28:09.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ac Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 " +"2019-05-02 09:28:09.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ad Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:09.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ae Exiting" +"2019-05-02 09:28:09.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 39af Exiting" +"2019-05-02 09:28:09.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39b0 Exiting" +"2019-05-02 09:28:09.735 UTC [gossip.discovery] sendMemResponse -> DEBU 39b1 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:09.735 UTC [msp] DeserializeIdentity -> DEBU 39b2 Obtaining identity" +"2019-05-02 09:28:09.736 UTC [msp] DeserializeIdentity -> DEBU 39b3 Obtaining identity" +"2019-05-02 09:28:09.736 UTC [gossip.comm] Send -> DEBU 39b4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:09.736 UTC [gossip.discovery] sendMemResponse -> DEBU 39b5 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:28:09.736 UTC [gossip.comm] sendToEndpoint -> DEBU 39b6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.737 UTC [gossip.comm] sendToEndpoint -> DEBU 39b7 Exiting" +"2019-05-02 09:28:09.737 UTC [gossip.comm] func1 -> DEBU 39b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4841735105627059395 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.731 UTC [gossip.comm] sendToEndpoint -> DEBU 39a7 Exiting" +"2019-05-02 09:28:09.732 UTC [msp] DeserializeIdentity -> DEBU 39a8 Obtaining identity" +"2019-05-02 09:28:09.742 UTC [msp] DeserializeIdentity -> DEBU 39bb Obtaining identity" +"2019-05-02 09:28:09.731 UTC [gossip.gossip] handleMessage -> DEBU 39a6 Exiting" +"2019-05-02 09:28:09.741 UTC [gossip.comm] func1 -> DEBU 39b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1355778949748241885 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.742 UTC [gossip.comm] func1 -> DEBU 39ba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2948271416903558199 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.743 UTC [gossip.comm] Send -> DEBU 39bc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:09.744 UTC [gossip.gossip] handleMessage -> DEBU 39bd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.744 UTC [gossip.gossip] handleMessage -> DEBU 39bf Exiting" +"2019-05-02 09:28:09.745 UTC [gossip.gossip] handleMessage -> DEBU 39c1 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4841735105627059395 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.745 UTC [gossip.pull] HandleMessage -> DEBU 39c2 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4841735105627059395 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.745 UTC [gossip.gossip] handleMessage -> DEBU 39c3 Exiting" +"2019-05-02 09:28:09.746 UTC [gossip.gossip] handleMessage -> DEBU 39c4 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1355778949748241885 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.746 UTC [gossip.pull] HandleMessage -> DEBU 39c5 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1355778949748241885 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.746 UTC [gossip.gossip] handleMessage -> DEBU 39c6 Exiting" +"2019-05-02 09:28:09.746 UTC [gossip.gossip] handleMessage -> DEBU 39c7 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2948271416903558199 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.747 UTC [gossip.pull] HandleMessage -> DEBU 39c8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2948271416903558199 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.747 UTC [gossip.gossip] handleMessage -> DEBU 39c9 Exiting" +"2019-05-02 09:28:09.744 UTC [gossip.comm] sendToEndpoint -> DEBU 39be Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.747 UTC [gossip.comm] sendToEndpoint -> DEBU 39ca Exiting" +"2019-05-02 09:28:09.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.749 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39cb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:09.749 UTC [msp] DeserializeIdentity -> DEBU 39cc Obtaining identity" +"2019-05-02 09:28:09.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39cd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:09.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39ce Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:09.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39cf Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:09.751 UTC [policies] Evaluate -> DEBU 39d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:09.751 UTC [policies] Evaluate -> DEBU 39d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:09.751 UTC [policies] Evaluate -> DEBU 39d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:09.752 UTC [cauthdsl] func1 -> DEBU 39d3 0xc0043edbd0 gate 1556789289752181000 evaluation starts" +"2019-05-02 09:28:09.752 UTC [cauthdsl] func2 -> DEBU 39d4 0xc0043edbd0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:09.752 UTC [cauthdsl] func2 -> DEBU 39d5 0xc0043edbd0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:09.752 UTC [cauthdsl] func2 -> DEBU 39d6 0xc0043edbd0 principal matched by identity 0" +"2019-05-02 09:28:09.753 UTC [msp.identity] Verify -> DEBU 39d7 Verify: digest = 00000000 43 7e 96 3a d4 64 a7 88 4a 57 9b 29 24 d1 02 1e |C~.:.d..JW.)$...| +00000010 3f a0 e0 a0 0f 95 06 5b 67 e8 38 42 fe 10 0b c5 |?......[g.8B....|" +"2019-05-02 09:28:09.753 UTC [msp.identity] Verify -> DEBU 39d8 Verify: sig = 00000000 30 45 02 21 00 86 ac 9f 8f a0 ec f0 c1 c3 51 39 |0E.!..........Q9| +00000010 25 ec 28 33 45 94 20 6c f4 04 0d 15 67 b2 32 1a |%.(3E. l....g.2.| +00000020 72 e5 cb 26 39 02 20 77 4d bc 7e 5c 45 dc 7e f4 |r..&9. wM.~\E.~.| +00000030 57 c7 83 d4 b9 25 79 4e f1 45 54 39 60 81 20 e1 |W....%yN.ET9`. .| +00000040 b5 b7 7f 38 7e 61 1c |...8~a.|" +"2019-05-02 09:28:09.754 UTC [cauthdsl] func2 -> DEBU 39d9 0xc0043edbd0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:09.754 UTC [cauthdsl] func1 -> DEBU 39da 0xc0043edbd0 gate 1556789289752181000 evaluation succeeds" +"2019-05-02 09:28:09.754 UTC [policies] Evaluate -> DEBU 39db Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.755 UTC [policies] Evaluate -> DEBU 39dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:09.755 UTC [policies] Evaluate -> DEBU 39dd Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:09.755 UTC [policies] Evaluate -> DEBU 39de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:09.756 UTC [gossip.discovery] handleAliveMessage -> DEBU 39df Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:09.756 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:28:09.756 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 " +"2019-05-02 09:28:09.757 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 " +"2019-05-02 09:28:09.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:09.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 39e4 Exiting" +"2019-05-02 09:28:09.758 UTC [gossip.discovery] handleAliveMessage -> DEBU 39e5 Exiting" +"2019-05-02 09:28:09.759 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39e6 Exiting" +"2019-05-02 09:28:09.760 UTC [gossip.discovery] sendMemResponse -> DEBU 39e7 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:09.760 UTC [msp] DeserializeIdentity -> DEBU 39e8 Obtaining identity" +"2019-05-02 09:28:09.761 UTC [msp] DeserializeIdentity -> DEBU 39e9 Obtaining identity" +"2019-05-02 09:28:09.762 UTC [msp] DeserializeIdentity -> DEBU 39ea Obtaining identity" +"2019-05-02 09:28:09.762 UTC [gossip.comm] Send -> DEBU 39eb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:09.762 UTC [gossip.discovery] sendMemResponse -> DEBU 39ec Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:09.763 UTC [gossip.comm] sendToEndpoint -> DEBU 39ed Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.763 UTC [gossip.comm] sendToEndpoint -> DEBU 39ee Exiting" +"2019-05-02 09:28:09.768 UTC [gossip.comm] func1 -> DEBU 39ef Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1437820415744880594 , Msg_type: BLOCK_MSG, digests: [7 9 1 3 5 8 2 4 6], Envelope: 60 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.768 UTC [gossip.gossip] handleMessage -> DEBU 39f0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1437820415744880594 , Msg_type: BLOCK_MSG, digests: [7 9 1 3 5 8 2 4 6], Envelope: 60 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.769 UTC [gossip.pull] HandleMessage -> DEBU 39f1 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1437820415744880594 , Msg_type: BLOCK_MSG, digests: [7 9 1 3 5 8 2 4 6], Envelope: 60 bytes, Signature: 0 bytes" +"2019-05-02 09:28:09.770 UTC [gossip.gossip] handleMessage -> DEBU 39f2 Exiting" +"2019-05-02 09:28:12.247 UTC [msp] DeserializeIdentity -> DEBU 39f3 Obtaining identity" +"2019-05-02 09:28:12.247 UTC [msp] DeserializeIdentity -> DEBU 39f4 Obtaining identity" +"2019-05-02 09:28:12.247 UTC [gossip.comm] Send -> DEBU 39f5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:28:12.247 UTC [gossip.comm] sendToEndpoint -> DEBU 39f6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39f7 Exiting" +"2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39f8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39f9 Exiting" +"2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.248 UTC [gossip.comm] sendToEndpoint -> DEBU 39fb Exiting" +"2019-05-02 09:28:12.251 UTC [gossip.comm] func1 -> DEBU 39fc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.251 UTC [gossip.gossip] handleMessage -> DEBU 39fd Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.251 UTC [msp] DeserializeIdentity -> DEBU 39fe Obtaining identity" +"2019-05-02 09:28:12.251 UTC [msp] DeserializeIdentity -> DEBU 39ff Obtaining identity" +"2019-05-02 09:28:12.252 UTC [msp] DeserializeIdentity -> DEBU 3a00 Obtaining identity" +"2019-05-02 09:28:12.252 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:12.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a02 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.252 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a03 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.253 UTC [policies] Evaluate -> DEBU 3a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:12.253 UTC [policies] Evaluate -> DEBU 3a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:12.253 UTC [policies] Evaluate -> DEBU 3a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:12.253 UTC [cauthdsl] func1 -> DEBU 3a07 0xc003617040 gate 1556789292253253000 evaluation starts" +"2019-05-02 09:28:12.253 UTC [cauthdsl] func2 -> DEBU 3a08 0xc003617040 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:12.253 UTC [cauthdsl] func2 -> DEBU 3a09 0xc003617040 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:12.253 UTC [cauthdsl] func2 -> DEBU 3a0a 0xc003617040 principal matched by identity 0" +"2019-05-02 09:28:12.253 UTC [msp.identity] Verify -> DEBU 3a0b Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:12.253 UTC [msp.identity] Verify -> DEBU 3a0c Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:12.262 UTC [gossip.comm] func1 -> DEBU 3a0d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.262 UTC [gossip.comm] func1 -> DEBU 3a0e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.265 UTC [cauthdsl] func2 -> DEBU 3a0f 0xc003617040 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:12.265 UTC [cauthdsl] func1 -> DEBU 3a10 0xc003617040 gate 1556789292253253000 evaluation succeeds" +"2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a11 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a13 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:12.265 UTC [policies] Evaluate -> DEBU 3a14 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:12.266 UTC [msp.identity] Verify -> DEBU 3a15 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:12.266 UTC [msp.identity] Verify -> DEBU 3a16 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:12.266 UTC [msp] DeserializeIdentity -> DEBU 3a17 Obtaining identity" +"2019-05-02 09:28:12.266 UTC [msp] DeserializeIdentity -> DEBU 3a18 Obtaining identity" +"2019-05-02 09:28:12.266 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a19 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:12.266 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a1a Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.269 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a1b Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.272 UTC [policies] Evaluate -> DEBU 3a1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:12.273 UTC [policies] Evaluate -> DEBU 3a1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:12.273 UTC [policies] Evaluate -> DEBU 3a1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:12.273 UTC [cauthdsl] func1 -> DEBU 3a1f 0xc003a76f30 gate 1556789292273744800 evaluation starts" +"2019-05-02 09:28:12.274 UTC [cauthdsl] func2 -> DEBU 3a20 0xc003a76f30 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:12.274 UTC [cauthdsl] func2 -> DEBU 3a21 0xc003a76f30 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:12.274 UTC [cauthdsl] func2 -> DEBU 3a22 0xc003a76f30 principal matched by identity 0" +"2019-05-02 09:28:12.275 UTC [msp.identity] Verify -> DEBU 3a23 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:12.315 UTC [msp.identity] Verify -> DEBU 3a24 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:12.327 UTC [gossip.election] waitForInterrupt -> DEBU 3a25 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:28:12.328 UTC [gossip.election] IsLeader -> DEBU 3a26 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:28:12.328 UTC [msp.identity] Sign -> DEBU 3a27 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100C1801 " +"2019-05-02 09:28:12.329 UTC [msp.identity] Sign -> DEBU 3a28 Sign: digest: F18829B3F517D100D3F9D0AA3660444C4D35DBEE50C01F3A1E3486C249A526F3 " +"2019-05-02 09:28:12.330 UTC [gossip.election] waitForInterrupt -> DEBU 3a29 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:28:12.355 UTC [msp] DeserializeIdentity -> DEBU 3a2a Obtaining identity" +"2019-05-02 09:28:12.356 UTC [msp] DeserializeIdentity -> DEBU 3a2b Obtaining identity" +"2019-05-02 09:28:12.316 UTC [cauthdsl] func2 -> DEBU 3a2c 0xc003a76f30 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:12.357 UTC [cauthdsl] func1 -> DEBU 3a2d 0xc003a76f30 gate 1556789292273744800 evaluation succeeds" +"2019-05-02 09:28:12.369 UTC [msp] DeserializeIdentity -> DEBU 3a2e Obtaining identity" +"2019-05-02 09:28:12.368 UTC [policies] Evaluate -> DEBU 3a2f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.369 UTC [policies] Evaluate -> DEBU 3a30 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.369 UTC [policies] Evaluate -> DEBU 3a31 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:12.370 UTC [policies] Evaluate -> DEBU 3a33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:12.371 UTC [msp.identity] Verify -> DEBU 3a34 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +"2019-05-02 09:28:12.371 UTC [msp.identity] Verify -> DEBU 3a35 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +00000040 b0 a3 de d0 53 b0 |....S.|" +"2019-05-02 09:28:12.371 UTC [gossip.gossip] handleMessage -> DEBU 3a36 Exiting" +"2019-05-02 09:28:12.372 UTC [gossip.gossip] handleMessage -> DEBU 3a37 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.372 UTC [msp] DeserializeIdentity -> DEBU 3a38 Obtaining identity" +"2019-05-02 09:28:12.372 UTC [msp] DeserializeIdentity -> DEBU 3a39 Obtaining identity" +"2019-05-02 09:28:12.373 UTC [msp] DeserializeIdentity -> DEBU 3a3a Obtaining identity" +"2019-05-02 09:28:12.369 UTC [msp] DeserializeIdentity -> DEBU 3a32 Obtaining identity" +"2019-05-02 09:28:12.378 UTC [gossip.comm] Send -> DEBU 3a3b Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:12.378 UTC [msp] DeserializeIdentity -> DEBU 3a3c Obtaining identity" +"2019-05-02 09:28:12.378 UTC [msp] DeserializeIdentity -> DEBU 3a3d Obtaining identity" +"2019-05-02 09:28:12.379 UTC [gossip.comm] sendToEndpoint -> DEBU 3a3e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-05-02 09:28:12.379 UTC [gossip.comm] sendToEndpoint -> DEBU 3a3f Exiting" +"2019-05-02 09:28:12.379 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:12.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a41 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a42 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.380 UTC [policies] Evaluate -> DEBU 3a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:12.380 UTC [policies] Evaluate -> DEBU 3a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:12.380 UTC [policies] Evaluate -> DEBU 3a45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:12.381 UTC [cauthdsl] func1 -> DEBU 3a46 0xc003da5910 gate 1556789292381536800 evaluation starts" +"2019-05-02 09:28:12.388 UTC [cauthdsl] func2 -> DEBU 3a47 0xc003da5910 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:12.388 UTC [cauthdsl] func2 -> DEBU 3a48 0xc003da5910 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:12.388 UTC [cauthdsl] func2 -> DEBU 3a49 0xc003da5910 principal matched by identity 0" +"2019-05-02 09:28:12.388 UTC [msp.identity] Verify -> DEBU 3a4a Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:12.389 UTC [msp.identity] Verify -> DEBU 3a4b Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:12.390 UTC [cauthdsl] func2 -> DEBU 3a4c 0xc003da5910 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:12.390 UTC [cauthdsl] func1 -> DEBU 3a4d 0xc003da5910 gate 1556789292381536800 evaluation succeeds" +"2019-05-02 09:28:12.390 UTC [policies] Evaluate -> DEBU 3a4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.390 UTC [policies] Evaluate -> DEBU 3a4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.391 UTC [policies] Evaluate -> DEBU 3a50 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:12.391 UTC [policies] Evaluate -> DEBU 3a51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:12.391 UTC [msp.identity] Verify -> DEBU 3a52 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:12.391 UTC [msp.identity] Verify -> DEBU 3a53 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:12.391 UTC [msp] DeserializeIdentity -> DEBU 3a54 Obtaining identity" +"2019-05-02 09:28:12.391 UTC [msp] DeserializeIdentity -> DEBU 3a55 Obtaining identity" +"2019-05-02 09:28:12.399 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:12.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a57 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.400 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a58 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.400 UTC [policies] Evaluate -> DEBU 3a59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:12.400 UTC [policies] Evaluate -> DEBU 3a5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:12.400 UTC [policies] Evaluate -> DEBU 3a5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:12.400 UTC [cauthdsl] func1 -> DEBU 3a5c 0xc004265800 gate 1556789292400491900 evaluation starts" +"2019-05-02 09:28:12.400 UTC [cauthdsl] func2 -> DEBU 3a5d 0xc004265800 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:12.400 UTC [cauthdsl] func2 -> DEBU 3a5e 0xc004265800 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:12.400 UTC [cauthdsl] func2 -> DEBU 3a5f 0xc004265800 principal matched by identity 0" +"2019-05-02 09:28:12.401 UTC [msp.identity] Verify -> DEBU 3a60 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:12.401 UTC [msp.identity] Verify -> DEBU 3a61 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:12.401 UTC [cauthdsl] func2 -> DEBU 3a62 0xc004265800 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:12.401 UTC [cauthdsl] func1 -> DEBU 3a63 0xc004265800 gate 1556789292400491900 evaluation succeeds" +"2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a64 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a66 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:12.401 UTC [policies] Evaluate -> DEBU 3a67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a68 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +"2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a69 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +00000040 b0 a3 de d0 53 b0 |....S.|" +"2019-05-02 09:28:12.402 UTC [gossip.gossip] handleMessage -> DEBU 3a6a Exiting" +"2019-05-02 09:28:12.402 UTC [gossip.gossip] handleMessage -> DEBU 3a6b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a6c Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:12.402 UTC [msp.identity] Verify -> DEBU 3a6d Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:12.403 UTC [msp] DeserializeIdentity -> DEBU 3a6e Obtaining identity" +"2019-05-02 09:28:12.403 UTC [msp] DeserializeIdentity -> DEBU 3a6f Obtaining identity" +"2019-05-02 09:28:12.403 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a70 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:12.403 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a71 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.403 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a72 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.403 UTC [policies] Evaluate -> DEBU 3a73 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:12.403 UTC [policies] Evaluate -> DEBU 3a74 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:12.403 UTC [policies] Evaluate -> DEBU 3a75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:12.405 UTC [cauthdsl] func1 -> DEBU 3a76 0xc00228c050 gate 1556789292404990600 evaluation starts" +"2019-05-02 09:28:12.405 UTC [cauthdsl] func2 -> DEBU 3a77 0xc00228c050 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:12.405 UTC [cauthdsl] func2 -> DEBU 3a78 0xc00228c050 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:12.405 UTC [cauthdsl] func2 -> DEBU 3a79 0xc00228c050 principal matched by identity 0" +"2019-05-02 09:28:12.412 UTC [msp.identity] Verify -> DEBU 3a7a Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:12.419 UTC [msp.identity] Verify -> DEBU 3a7b Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:12.420 UTC [cauthdsl] func2 -> DEBU 3a7c 0xc00228c050 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:12.421 UTC [cauthdsl] func1 -> DEBU 3a7d 0xc00228c050 gate 1556789292404990600 evaluation succeeds" +"2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a80 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:12.421 UTC [policies] Evaluate -> DEBU 3a81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:12.426 UTC [msp.identity] Verify -> DEBU 3a82 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +"2019-05-02 09:28:12.427 UTC [msp.identity] Verify -> DEBU 3a83 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +00000040 b0 a3 de d0 53 b0 |....S.|" +"2019-05-02 09:28:12.427 UTC [msp] DeserializeIdentity -> DEBU 3a84 Obtaining identity" +"2019-05-02 09:28:12.427 UTC [msp] DeserializeIdentity -> DEBU 3a85 Obtaining identity" +"2019-05-02 09:28:12.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a86 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:12.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a87 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a88 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:12.430 UTC [policies] Evaluate -> DEBU 3a89 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:12.430 UTC [policies] Evaluate -> DEBU 3a8a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:12.431 UTC [cauthdsl] func1 -> DEBU 3a8c 0xc00228df40 gate 1556789292431164200 evaluation starts" +"2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a8d 0xc00228df40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a8e 0xc00228df40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a8f 0xc00228df40 principal matched by identity 0" +"2019-05-02 09:28:12.431 UTC [msp.identity] Verify -> DEBU 3a90 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:12.431 UTC [msp.identity] Verify -> DEBU 3a91 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:12.431 UTC [cauthdsl] func2 -> DEBU 3a92 0xc00228df40 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:12.431 UTC [cauthdsl] func1 -> DEBU 3a93 0xc00228df40 gate 1556789292431164200 evaluation succeeds" +"2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a96 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:12.431 UTC [policies] Evaluate -> DEBU 3a97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:12.431 UTC [gossip.gossip] handleMessage -> DEBU 3a98 Exiting" +"2019-05-02 09:28:12.537 UTC [gossip.comm] func1 -> DEBU 3a99 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.537 UTC [gossip.gossip] handleMessage -> DEBU 3a9a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.537 UTC [msp] DeserializeIdentity -> DEBU 3a9b Obtaining identity" +"2019-05-02 09:28:12.537 UTC [msp] DeserializeIdentity -> DEBU 3a9c Obtaining identity" +"2019-05-02 09:28:12.538 UTC [gossip.gossip] handleMessage -> DEBU 3a9d Exiting" +"2019-05-02 09:28:12.578 UTC [gossip.comm] func1 -> DEBU 3a9e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.578 UTC [gossip.gossip] handleMessage -> DEBU 3a9f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.579 UTC [gossip.pull] HandleMessage -> DEBU 3aa0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.579 UTC [gossip.pull] SendDigest -> DEBU 3aa1 Sending BLOCK_MSG digest: [7 8 1 2 3 4 5 6 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:12.579 UTC [gossip.gossip] handleMessage -> DEBU 3aa2 Exiting" +"2019-05-02 09:28:12.762 UTC [gossip.comm] func1 -> DEBU 3aa3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.764 UTC [gossip.gossip] handleMessage -> DEBU 3aa4 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:12.765 UTC [msp] DeserializeIdentity -> DEBU 3aa5 Obtaining identity" +"2019-05-02 09:28:12.766 UTC [msp] DeserializeIdentity -> DEBU 3aa6 Obtaining identity" +"2019-05-02 09:28:12.767 UTC [msp] DeserializeIdentity -> DEBU 3aa7 Obtaining identity" +"2019-05-02 09:28:12.769 UTC [gossip.gossip] handleMessage -> DEBU 3aa8 Exiting" +"2019-05-02 09:28:13.007 UTC [gossip.comm] func1 -> DEBU 3aa9 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.007 UTC [gossip.gossip] handleMessage -> DEBU 3aaa Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.007 UTC [msp] DeserializeIdentity -> DEBU 3aab Obtaining identity" +"2019-05-02 09:28:13.008 UTC [msp] DeserializeIdentity -> DEBU 3aac Obtaining identity" +"2019-05-02 09:28:13.008 UTC [msp] DeserializeIdentity -> DEBU 3aad Obtaining identity" +"2019-05-02 09:28:13.008 UTC [gossip.gossip] handleMessage -> DEBU 3aae Exiting" +"2019-05-02 09:28:13.592 UTC [gossip.comm] func1 -> DEBU 3aaf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.592 UTC [gossip.gossip] handleMessage -> DEBU 3ab0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.593 UTC [gossip.gossip] handleMessage -> DEBU 3ab1 Exiting" +"2019-05-02 09:28:13.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ab2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.594 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ab3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:13.595 UTC [msp] DeserializeIdentity -> DEBU 3ab4 Obtaining identity" +"2019-05-02 09:28:13.596 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ab5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:13.596 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ab6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:13.597 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ab7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:13.597 UTC [policies] Evaluate -> DEBU 3ab8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:13.597 UTC [policies] Evaluate -> DEBU 3ab9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:13.598 UTC [policies] Evaluate -> DEBU 3aba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:13.598 UTC [cauthdsl] func1 -> DEBU 3abb 0xc00363afa0 gate 1556789293598417900 evaluation starts" +"2019-05-02 09:28:13.607 UTC [cauthdsl] func2 -> DEBU 3abc 0xc00363afa0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:13.607 UTC [cauthdsl] func2 -> DEBU 3abd 0xc00363afa0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:13.607 UTC [cauthdsl] func2 -> DEBU 3abe 0xc00363afa0 principal matched by identity 0" +"2019-05-02 09:28:13.607 UTC [msp.identity] Verify -> DEBU 3abf Verify: digest = 00000000 0e 29 48 69 64 4d 5a af aa 6d bb 6b 10 44 7e 56 |.)HidMZ..m.k.D~V| +00000010 7a 70 1a be 8c b2 0a 0e 1f 17 ab 53 d8 78 66 09 |zp.........S.xf.|" +"2019-05-02 09:28:13.608 UTC [msp.identity] Verify -> DEBU 3ac0 Verify: sig = 00000000 30 44 02 20 5f f9 d1 54 69 54 25 9a 74 b0 ca 5b |0D. _..TiT%.t..[| +00000010 b1 87 6e 0a e7 81 70 06 14 b4 95 a0 09 40 69 6c |..n...p......@il| +00000020 f0 bc d4 d9 02 20 40 16 78 ad 52 04 4a 36 ce 00 |..... @.x.R.J6..| +00000030 bc 69 81 c9 a3 df 04 1a fd c7 65 c6 3c 7d f6 54 |.i........e.<}.T| +00000040 89 bb 53 c5 4e 51 |..S.NQ|" +"2019-05-02 09:28:13.608 UTC [cauthdsl] func2 -> DEBU 3ac1 0xc00363afa0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:13.608 UTC [cauthdsl] func1 -> DEBU 3ac2 0xc00363afa0 gate 1556789293598417900 evaluation succeeds" +"2019-05-02 09:28:13.608 UTC [policies] Evaluate -> DEBU 3ac3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:13.609 UTC [policies] Evaluate -> DEBU 3ac4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:13.609 UTC [policies] Evaluate -> DEBU 3ac5 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:13.612 UTC [gossip.comm] func1 -> DEBU 3ac6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.613 UTC [gossip.gossip] handleMessage -> DEBU 3ac7 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.613 UTC [gossip.pull] HandleMessage -> DEBU 3ac8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.613 UTC [msp] DeserializeIdentity -> DEBU 3ac9 Obtaining identity" +"2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3aca Obtaining identity" +"2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3acb Obtaining identity" +"2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3acc Obtaining identity" +"2019-05-02 09:28:13.614 UTC [msp] DeserializeIdentity -> DEBU 3acd Obtaining identity" +"2019-05-02 09:28:13.617 UTC [msp] DeserializeIdentity -> DEBU 3ace Obtaining identity" +"2019-05-02 09:28:13.618 UTC [gossip.pull] SendDigest -> DEBU 3acf Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:13.618 UTC [gossip.gossip] handleMessage -> DEBU 3ad0 Exiting" +"2019-05-02 09:28:13.621 UTC [policies] Evaluate -> DEBU 3ad1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:13.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ad2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:13.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad4 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 " +"2019-05-02 09:28:13.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad5 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 " +"2019-05-02 09:28:13.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:13.623 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad7 Exiting" +"2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3ad8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102B " +"2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3ad9 Sign: digest: F05B313F24126515C171AC32D2C41D0112118C5D6B111DC167604649DFB72F26 " +"2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3ada Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:28:13.624 UTC [msp.identity] Sign -> DEBU 3adb Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:28:13.629 UTC [gossip.comm] Send -> DEBU 3adc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:13.630 UTC [msp] DeserializeIdentity -> DEBU 3add Obtaining identity" +"2019-05-02 09:28:13.630 UTC [gossip.comm] Send -> DEBU 3ade Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:13.630 UTC [msp] DeserializeIdentity -> DEBU 3adf Obtaining identity" +"2019-05-02 09:28:13.630 UTC [gossip.comm] Send -> DEBU 3ae0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae2 Exiting" +"2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae4 Exiting" +"2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.630 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae6 Exiting" +"2019-05-02 09:28:13.631 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ae7 Exiting" +"2019-05-02 09:28:13.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ae8 Exiting" +"2019-05-02 09:28:13.631 UTC [gossip.discovery] sendMemResponse -> DEBU 3ae9 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:13.631 UTC [msp] DeserializeIdentity -> DEBU 3aea Obtaining identity" +"2019-05-02 09:28:13.631 UTC [msp] DeserializeIdentity -> DEBU 3aeb Obtaining identity" +"2019-05-02 09:28:13.631 UTC [msp] DeserializeIdentity -> DEBU 3aec Obtaining identity" +"2019-05-02 09:28:13.631 UTC [gossip.comm] Send -> DEBU 3aed Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:13.631 UTC [gossip.discovery] sendMemResponse -> DEBU 3aee Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:13.631 UTC [gossip.comm] sendToEndpoint -> DEBU 3aef Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3af0 Exiting" +"2019-05-02 09:28:13.639 UTC [gossip.comm] func1 -> DEBU 3af1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.639 UTC [gossip.comm] func1 -> DEBU 3af2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.639 UTC [gossip.gossip] handleMessage -> DEBU 3af3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.645 UTC [gossip.pull] HandleMessage -> DEBU 3af4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.646 UTC [gossip.pull] SendDigest -> DEBU 3af5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:13.648 UTC [gossip.gossip] handleMessage -> DEBU 3af6 Exiting" +"2019-05-02 09:28:13.649 UTC [gossip.gossip] handleMessage -> DEBU 3af7 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.653 UTC [gossip.comm] func1 -> DEBU 3af8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.654 UTC [gossip.comm] func1 -> DEBU 3af9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.656 UTC [gossip.gossip] handleMessage -> DEBU 3afa Exiting" +"2019-05-02 09:28:13.656 UTC [gossip.gossip] handleMessage -> DEBU 3afb Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.659 UTC [gossip.comm] func1 -> DEBU 3afc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.657 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3afd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.661 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3afe Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:13.663 UTC [msp.identity] Verify -> DEBU 3aff Verify: digest = 00000000 f0 5b 31 3f 24 12 65 15 c1 71 ac 32 d2 c4 1d 01 |.[1?$.e..q.2....| +00000010 12 11 8c 5d 6b 11 1d c1 67 60 46 49 df b7 2f 26 |...]k...g`FI../&|" +"2019-05-02 09:28:13.663 UTC [msp.identity] Verify -> DEBU 3b00 Verify: sig = 00000000 30 44 02 20 3a ff 2b b9 d3 c7 c6 ff 28 81 90 13 |0D. :.+.....(...| +00000010 9d 67 c7 df bd c2 19 f6 f0 92 38 b8 ff a1 50 60 |.g........8...P`| +00000020 91 17 83 23 02 20 66 83 d1 4c d8 91 98 bb cb 35 |...#. f..L.....5| +00000030 d3 a1 20 02 5b 0e a4 6d d1 10 80 69 79 65 b3 c0 |.. .[..m...iye..| +00000040 8c c5 3b ea 75 cb |..;.u.|" +"2019-05-02 09:28:13.664 UTC [msp.identity] Verify -> DEBU 3b01 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:46.164 UTC [msp.identity] Verify -> DEBU 3ec0 Verify: sig = 00000000 30 45 02 21 00 81 dc ca 08 88 3a 0a 8d 9c cd cc |0E.!......:.....| -00000010 90 9e b2 86 23 e3 c0 50 72 9a 02 e6 08 be f9 93 |....#..Pr.......| -00000020 46 1b d8 71 4d 02 20 79 9f 2c 43 62 82 f2 10 1d |F..qM. y.,Cb....| -00000030 30 a9 5c 3a 2b d1 04 cf 62 09 32 b6 fc 42 c3 70 |0.\:+...b.2..B.p| -00000040 97 43 cb d9 1e ed 2d |.C....-|" -"2019-05-02 01:31:46.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ec1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:46.165 UTC [gossip.discovery] isSentByMe -> DEBU 3ec2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:46.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ec3 Exiting" -"2019-05-02 01:31:46.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ec4 Exiting" -"2019-05-02 01:31:46.165 UTC [gossip.comm] func1 -> DEBU 3ec5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.165 UTC [gossip.gossip] handleMessage -> DEBU 3ec6 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.165 UTC [gossip.gossip] handleMessage -> DEBU 3ec7 Exiting" -"2019-05-02 01:31:46.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ec8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ec9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:46.165 UTC [msp.identity] Verify -> DEBU 3eca Verify: digest = 00000000 11 96 20 3e ef c4 b0 2b c8 03 2a 14 28 3f 35 d1 |.. >...+..*.(?5.| -00000010 12 09 d0 56 f7 48 0b 1c ee 72 e8 27 e7 64 10 c7 |...V.H...r.'.d..|" -"2019-05-02 01:31:46.166 UTC [msp.identity] Verify -> DEBU 3ecb Verify: sig = 00000000 30 44 02 20 39 0d d3 19 75 ff 16 2e 04 41 20 d8 |0D. 9...u....A .| -00000010 c7 48 ee 87 fd 72 1b 4f 4c 4b 45 b0 80 67 31 d8 |.H...r.OLKE..g1.| -00000020 3b 71 32 e3 02 20 7c de 3e 2f 13 87 7d cb 34 27 |;q2.. |.>/..}.4'| -00000030 90 38 a1 24 98 80 dd 06 f6 ca 72 23 99 ea 9d c7 |.8.$......r#....| -00000040 4a c9 13 ab 96 bf |J.....|" -"2019-05-02 01:31:46.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ecc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:46.166 UTC [gossip.discovery] isSentByMe -> DEBU 3ecd Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:46.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ece Exiting" -"2019-05-02 01:31:46.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ecf Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:46.166 UTC [msp.identity] Verify -> DEBU 3ed0 Verify: digest = 00000000 7d 61 2e e2 87 88 f7 00 6a 24 c7 54 1f d0 29 76 |}a......j$.T..)v| -00000010 d6 b5 b9 2a f9 e3 51 30 4e d3 08 12 28 27 c2 7d |...*..Q0N...('.}|" -"2019-05-02 01:31:46.166 UTC [msp.identity] Verify -> DEBU 3ed1 Verify: sig = 00000000 30 45 02 21 00 a5 45 e3 19 cb 21 a9 bb 6d a2 fe |0E.!..E...!..m..| -00000010 39 40 20 69 2f dc 71 c4 38 fc 13 99 93 14 85 48 |9@ i/.q.8......H| -00000020 04 16 b9 7e 61 02 20 63 14 54 8b 12 a4 d3 1a 08 |...~a. c.T......| -00000030 5a 27 0c d7 bd 42 54 03 11 db 7a f2 80 bf 23 6e |Z'...BT...z...#n| -00000040 4f 0e 6a 25 80 9d df |O.j%...|" -"2019-05-02 01:31:46.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:46.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed3 Exiting" -"2019-05-02 01:31:46.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ed4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:46.166 UTC [msp] DeserializeIdentity -> DEBU 3ed5 Obtaining identity" -"2019-05-02 01:31:46.166 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ed6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:46.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:46.167 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed8 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:46.167 UTC [policies] Evaluate -> DEBU 3ed9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:46.167 UTC [policies] Evaluate -> DEBU 3eda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:46.167 UTC [policies] Evaluate -> DEBU 3edb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:46.167 UTC [cauthdsl] func1 -> DEBU 3edc 0xc002220da0 gate 1556760706167234700 evaluation starts" -"2019-05-02 01:31:46.167 UTC [cauthdsl] func2 -> DEBU 3edd 0xc002220da0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:46.167 UTC [cauthdsl] func2 -> DEBU 3ede 0xc002220da0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:46.176 UTC [gossip.comm] func1 -> DEBU 3edf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.181 UTC [gossip.gossip] handleMessage -> DEBU 3ee0 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.182 UTC [cauthdsl] func2 -> DEBU 3ee1 0xc002220da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:46.182 UTC [cauthdsl] func2 -> DEBU 3ee2 0xc002220da0 principal evaluation fails" -"2019-05-02 01:31:46.182 UTC [cauthdsl] func1 -> DEBU 3ee3 0xc002220da0 gate 1556760706167234700 evaluation fails" -"2019-05-02 01:31:46.182 UTC [policies] Evaluate -> DEBU 3ee4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:46.182 UTC [policies] Evaluate -> DEBU 3ee5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:46.182 UTC [policies] Evaluate -> DEBU 3ee6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:46.182 UTC [cauthdsl] func1 -> DEBU 3ee7 0xc002221650 gate 1556760706182530700 evaluation starts" -"2019-05-02 01:31:46.182 UTC [cauthdsl] func2 -> DEBU 3ee8 0xc002221650 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:46.182 UTC [cauthdsl] func2 -> DEBU 3ee9 0xc002221650 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:46.182 UTC [cauthdsl] func2 -> DEBU 3eea 0xc002221650 principal matched by identity 0" -"2019-05-02 01:31:46.182 UTC [msp.identity] Verify -> DEBU 3eeb Verify: digest = 00000000 cc f0 d6 69 4c 6a 90 19 3b 3b 6f 4d 81 e9 eb b6 |...iLj..;;oM....| -00000010 58 f7 5b a0 8e e8 04 37 72 01 80 ac cb 29 6f 25 |X.[....7r....)o%|" -"2019-05-02 01:31:46.182 UTC [msp.identity] Verify -> DEBU 3eec Verify: sig = 00000000 30 44 02 20 12 2a 55 56 c7 d2 6e 6f 4d 77 fd 59 |0D. .*UV..noMw.Y| -00000010 47 8b 5d 71 35 4f d6 27 f0 9d fa 08 b9 78 11 4f |G.]q5O.'.....x.O| -00000020 12 8e d6 8f 02 20 5a 0b aa 25 ff e7 35 6c 60 18 |..... Z..%..5l`.| -00000030 ef 78 4e 6b e1 65 3b 8b e6 63 b3 c9 eb 9f 69 24 |.xNk.e;..c....i$| -00000040 1a d2 f6 96 b2 2b |.....+|" -"2019-05-02 01:31:46.183 UTC [cauthdsl] func2 -> DEBU 3eed 0xc002221650 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:46.183 UTC [cauthdsl] func1 -> DEBU 3eee 0xc002221650 gate 1556760706182530700 evaluation succeeds" -"2019-05-02 01:31:46.183 UTC [policies] Evaluate -> DEBU 3eef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:46.183 UTC [policies] Evaluate -> DEBU 3ef0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:46.186 UTC [policies] Evaluate -> DEBU 3ef1 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:46.187 UTC [policies] Evaluate -> DEBU 3ef2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:46.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ef3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:46.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ef4 Exiting" -"2019-05-02 01:31:46.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ef5 Exiting" -"2019-05-02 01:31:46.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ef6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-05-02 01:31:46.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:46.187 UTC [gossip.gossip] handleMessage -> DEBU 3ef8 Exiting" -"2019-05-02 01:31:46.188 UTC [msp.identity] Verify -> DEBU 3ef9 Verify: digest = 00000000 7d 61 2e e2 87 88 f7 00 6a 24 c7 54 1f d0 29 76 |}a......j$.T..)v| -00000010 d6 b5 b9 2a f9 e3 51 30 4e d3 08 12 28 27 c2 7d |...*..Q0N...('.}|" -"2019-05-02 01:31:46.188 UTC [msp.identity] Verify -> DEBU 3efa Verify: sig = 00000000 30 45 02 21 00 a5 45 e3 19 cb 21 a9 bb 6d a2 fe |0E.!..E...!..m..| -00000010 39 40 20 69 2f dc 71 c4 38 fc 13 99 93 14 85 48 |9@ i/.q.8......H| -00000020 04 16 b9 7e 61 02 20 63 14 54 8b 12 a4 d3 1a 08 |...~a. c.T......| -00000030 5a 27 0c d7 bd 42 54 03 11 db 7a f2 80 bf 23 6e |Z'...BT...z...#n| -00000040 4f 0e 6a 25 80 9d df |O.j%...|" -"2019-05-02 01:31:46.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 3efb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:46.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 3efc Exiting" -"2019-05-02 01:31:46.188 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3efd Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:46.188 UTC [msp] DeserializeIdentity -> DEBU 3efe Obtaining identity" -"2019-05-02 01:31:46.190 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3eff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:46.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f00 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:46.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f01 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:46.190 UTC [policies] Evaluate -> DEBU 3f02 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:46.191 UTC [policies] Evaluate -> DEBU 3f03 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:46.191 UTC [policies] Evaluate -> DEBU 3f04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:46.191 UTC [cauthdsl] func1 -> DEBU 3f05 0xc0022a5ac0 gate 1556760706191388500 evaluation starts" -"2019-05-02 01:31:46.191 UTC [cauthdsl] func2 -> DEBU 3f06 0xc0022a5ac0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:46.191 UTC [cauthdsl] func2 -> DEBU 3f07 0xc0022a5ac0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:46.191 UTC [cauthdsl] func2 -> DEBU 3f08 0xc0022a5ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:46.192 UTC [cauthdsl] func2 -> DEBU 3f09 0xc0022a5ac0 principal evaluation fails" -"2019-05-02 01:31:46.192 UTC [cauthdsl] func1 -> DEBU 3f0a 0xc0022a5ac0 gate 1556760706191388500 evaluation fails" -"2019-05-02 01:31:46.192 UTC [policies] Evaluate -> DEBU 3f0b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:46.192 UTC [policies] Evaluate -> DEBU 3f0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:46.192 UTC [policies] Evaluate -> DEBU 3f0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:46.192 UTC [cauthdsl] func1 -> DEBU 3f0e 0xc0022ce3f0 gate 1556760706192695400 evaluation starts" -"2019-05-02 01:31:46.192 UTC [cauthdsl] func2 -> DEBU 3f0f 0xc0022ce3f0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:46.192 UTC [cauthdsl] func2 -> DEBU 3f10 0xc0022ce3f0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:46.193 UTC [cauthdsl] func2 -> DEBU 3f11 0xc0022ce3f0 principal matched by identity 0" -"2019-05-02 01:31:46.193 UTC [msp.identity] Verify -> DEBU 3f12 Verify: digest = 00000000 a0 d1 41 53 a1 70 71 ce 68 df b7 c7 08 8c 2c 1c |..AS.pq.h.....,.| -00000010 67 61 93 06 e4 d1 f6 f3 c9 ec c9 81 97 0b 97 75 |ga.............u|" -"2019-05-02 01:31:46.193 UTC [msp.identity] Verify -> DEBU 3f13 Verify: sig = 00000000 30 45 02 21 00 d8 ee 77 4d 06 d0 c7 b8 45 82 e6 |0E.!...wM....E..| -00000010 81 47 56 5b c7 5e 9b 1d 53 8e 07 4e 12 68 0f 1c |.GV[.^..S..N.h..| -00000020 40 f2 58 4c 0a 02 20 54 71 ee 2a 4e 23 7b 53 c0 |@.XL.. Tq.*N#{S.| -00000030 09 fd 27 a8 5d cb 9c 2a 1b c2 c4 7f 17 1f f9 65 |..'.]..*.......e| -00000040 26 f1 d0 4d 3e ed 4e |&..M>.N|" -"2019-05-02 01:31:46.194 UTC [cauthdsl] func2 -> DEBU 3f14 0xc0022ce3f0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:46.194 UTC [cauthdsl] func1 -> DEBU 3f15 0xc0022ce3f0 gate 1556760706192695400 evaluation succeeds" -"2019-05-02 01:31:46.195 UTC [policies] Evaluate -> DEBU 3f16 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:46.195 UTC [policies] Evaluate -> DEBU 3f17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:46.195 UTC [policies] Evaluate -> DEBU 3f18 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:46.195 UTC [policies] Evaluate -> DEBU 3f19 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:46.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f1a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:46.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f1b Exiting" -"2019-05-02 01:31:46.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f1c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:46.198 UTC [msp.identity] Verify -> DEBU 3f1d Verify: digest = 00000000 11 96 20 3e ef c4 b0 2b c8 03 2a 14 28 3f 35 d1 |.. >...+..*.(?5.| -00000010 12 09 d0 56 f7 48 0b 1c ee 72 e8 27 e7 64 10 c7 |...V.H...r.'.d..|" -"2019-05-02 01:31:46.198 UTC [msp.identity] Verify -> DEBU 3f1e Verify: sig = 00000000 30 44 02 20 39 0d d3 19 75 ff 16 2e 04 41 20 d8 |0D. 9...u....A .| -00000010 c7 48 ee 87 fd 72 1b 4f 4c 4b 45 b0 80 67 31 d8 |.H...r.OLKE..g1.| -00000020 3b 71 32 e3 02 20 7c de 3e 2f 13 87 7d cb 34 27 |;q2.. |.>/..}.4'| -00000030 90 38 a1 24 98 80 dd 06 f6 ca 72 23 99 ea 9d c7 |.8.$......r#....| -00000040 4a c9 13 ab 96 bf |J.....|" -"2019-05-02 01:31:46.199 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f1f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:46.199 UTC [gossip.discovery] isSentByMe -> DEBU 3f20 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:46.199 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f21 Exiting" -"2019-05-02 01:31:46.199 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f22 Exiting" -"2019-05-02 01:31:46.956 UTC [gossip.election] waitForInterrupt -> DEBU 3f23 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:46.956 UTC [gossip.election] IsLeader -> DEBU 3f24 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:46.957 UTC [msp.identity] Sign -> DEBU 3f25 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100E1801 " -"2019-05-02 01:31:46.958 UTC [msp.identity] Sign -> DEBU 3f26 Sign: digest: 4F356A89DD05A251570A68D150DF421CFEF6D4606901C9BCA8CE2AE5854608E8 " -"2019-05-02 01:31:46.959 UTC [gossip.election] waitForInterrupt -> DEBU 3f27 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:46.965 UTC [msp] DeserializeIdentity -> DEBU 3f28 Obtaining identity" -"2019-05-02 01:31:46.966 UTC [msp] DeserializeIdentity -> DEBU 3f29 Obtaining identity" -"2019-05-02 01:31:46.967 UTC [msp] DeserializeIdentity -> DEBU 3f2a Obtaining identity" -"2019-05-02 01:31:46.967 UTC [msp] DeserializeIdentity -> DEBU 3f2b Obtaining identity" -"2019-05-02 01:31:46.967 UTC [gossip.comm] Send -> DEBU 3f2c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:46.967 UTC [msp] DeserializeIdentity -> DEBU 3f2d Obtaining identity" -"2019-05-02 01:31:46.967 UTC [msp] DeserializeIdentity -> DEBU 3f2e Obtaining identity" -"2019-05-02 01:31:46.967 UTC [gossip.comm] sendToEndpoint -> DEBU 3f2f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" -"2019-05-02 01:31:46.968 UTC [gossip.comm] sendToEndpoint -> DEBU 3f30 Exiting" -"2019-05-02 01:31:48.411 UTC [gossip.comm] func1 -> DEBU 3f31 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:48.412 UTC [gossip.gossip] handleMessage -> DEBU 3f32 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:48.412 UTC [gossip.gossip] handleMessage -> DEBU 3f33 Exiting" -"2019-05-02 01:31:48.412 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f34 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:48.412 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f35 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:48.412 UTC [msp.identity] Verify -> DEBU 3f36 Verify: digest = 00000000 e5 fa 7d c5 41 65 48 04 b6 c2 41 2b c3 d5 8a 4b |..}.AeH...A+...K| -00000010 a5 5d 54 9c 02 2c c0 35 e0 97 90 80 0a 7e d7 d3 |.]T..,.5.....~..|" -"2019-05-02 01:31:48.412 UTC [msp.identity] Verify -> DEBU 3f37 Verify: sig = 00000000 30 45 02 21 00 fd da 77 b9 b5 3a 5e b2 42 4d db |0E.!...w..:^.BM.| -00000010 6a 3a 86 67 6b 57 3d 9a 93 a4 1b 2c 21 ea e7 a2 |j:.gkW=....,!...| -00000020 7d 01 cf a2 fc 02 20 46 26 91 2f 31 a4 d9 1a 1d |}..... F&./1....| -00000030 6b bc 91 19 73 23 b2 dd af e6 e1 ed 4a 4a 10 4b |k...s#......JJ.K| -00000040 9e c5 6b 75 78 08 ca |..kux..|" -"2019-05-02 01:31:48.413 UTC [msp.identity] Verify -> DEBU 3f38 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:28:13.664 UTC [msp.identity] Verify -> DEBU 3b02 Verify: sig = 00000000 30 44 02 20 3e 3d 7d 57 33 da b5 3a 15 0d 9c a3 |0D. >=}W3..:....| +00000010 42 47 a1 59 e3 5b 4b eb 2c a2 b1 82 59 c6 fd e9 |BG.Y.[K.,...Y...| +00000020 00 61 74 e2 02 20 5f 66 2d 4f 6b 63 64 7d ca a4 |.at.. _f-Okcd}..| +00000030 5a 19 9a 4e d2 92 55 bb 8c 93 da ff f1 c1 05 e1 |Z..N..U.........| +00000040 b4 bf f4 3d 7b 58 |...={X|" +"2019-05-02 09:28:13.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b03 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:13.665 UTC [gossip.discovery] isSentByMe -> DEBU 3b04 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:13.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b05 Exiting" +"2019-05-02 09:28:13.670 UTC [gossip.comm] func1 -> DEBU 3b06 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.679 UTC [gossip.comm] func1 -> DEBU 3b07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b08 Exiting" +"2019-05-02 09:28:13.680 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b09 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.680 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b0a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:13.680 UTC [msp.identity] Verify -> DEBU 3b0b Verify: digest = 00000000 8f 68 76 c3 0c e0 b0 37 7c f6 29 61 e4 27 35 e2 |.hv....7|.)a.'5.| +00000010 c7 87 68 18 6d f4 3f 7f 4f 74 b4 12 21 52 ed 7f |..h.m.?.Ot..!R..|" +"2019-05-02 09:28:13.681 UTC [msp.identity] Verify -> DEBU 3b0c Verify: sig = 00000000 30 44 02 20 18 0a e6 41 8b 1a 99 6d 30 a2 52 1c |0D. ...A...m0.R.| +00000010 21 84 21 36 cc 86 4f a1 48 23 f7 16 05 1a 9e ce |!.!6..O.H#......| +00000020 54 dc 83 1a 02 20 34 d8 6d 56 a8 31 3c 75 88 32 |T.... 4.mV.1 DEBU 3b0d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.681 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b0e Exiting" +"2019-05-02 09:28:13.682 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b0f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:13.683 UTC [msp.identity] Verify -> DEBU 3b10 Verify: digest = 00000000 f0 5b 31 3f 24 12 65 15 c1 71 ac 32 d2 c4 1d 01 |.[1?$.e..q.2....| +00000010 12 11 8c 5d 6b 11 1d c1 67 60 46 49 df b7 2f 26 |...]k...g`FI../&|" +"2019-05-02 09:28:13.683 UTC [msp.identity] Verify -> DEBU 3b11 Verify: sig = 00000000 30 44 02 20 3a ff 2b b9 d3 c7 c6 ff 28 81 90 13 |0D. :.+.....(...| +00000010 9d 67 c7 df bd c2 19 f6 f0 92 38 b8 ff a1 50 60 |.g........8...P`| +00000020 91 17 83 23 02 20 66 83 d1 4c d8 91 98 bb cb 35 |...#. f..L.....5| +00000030 d3 a1 20 02 5b 0e a4 6d d1 10 80 69 79 65 b3 c0 |.. .[..m...iye..| +00000040 8c c5 3b ea 75 cb |..;.u.|" +"2019-05-02 09:28:13.684 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b12 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.684 UTC [gossip.discovery] isSentByMe -> DEBU 3b13 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.684 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b14 Exiting" +"2019-05-02 09:28:13.685 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b15 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:13.685 UTC [msp] DeserializeIdentity -> DEBU 3b16 Obtaining identity" +"2019-05-02 09:28:13.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b17 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:13.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b18 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:13.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b19 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:13.687 UTC [policies] Evaluate -> DEBU 3b1a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:13.687 UTC [policies] Evaluate -> DEBU 3b1b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:13.687 UTC [policies] Evaluate -> DEBU 3b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:13.687 UTC [cauthdsl] func1 -> DEBU 3b1d 0xc0041187e0 gate 1556789293687555000 evaluation starts" +"2019-05-02 09:28:13.687 UTC [cauthdsl] func2 -> DEBU 3b1e 0xc0041187e0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:13.688 UTC [cauthdsl] func2 -> DEBU 3b1f 0xc0041187e0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:13.688 UTC [cauthdsl] func2 -> DEBU 3b20 0xc0041187e0 principal matched by identity 0" +"2019-05-02 09:28:13.690 UTC [msp.identity] Verify -> DEBU 3b21 Verify: digest = 00000000 43 7e 96 3a d4 64 a7 88 4a 57 9b 29 24 d1 02 1e |C~.:.d..JW.)$...| +00000010 3f a0 e0 a0 0f 95 06 5b 67 e8 38 42 fe 10 0b c5 |?......[g.8B....|" +"2019-05-02 09:28:13.690 UTC [msp.identity] Verify -> DEBU 3b22 Verify: sig = 00000000 30 45 02 21 00 86 ac 9f 8f a0 ec f0 c1 c3 51 39 |0E.!..........Q9| +00000010 25 ec 28 33 45 94 20 6c f4 04 0d 15 67 b2 32 1a |%.(3E. l....g.2.| +00000020 72 e5 cb 26 39 02 20 77 4d bc 7e 5c 45 dc 7e f4 |r..&9. wM.~\E.~.| +00000030 57 c7 83 d4 b9 25 79 4e f1 45 54 39 60 81 20 e1 |W....%yN.ET9`. .| +00000040 b5 b7 7f 38 7e 61 1c |...8~a.|" +"2019-05-02 09:28:13.691 UTC [cauthdsl] func2 -> DEBU 3b23 0xc0041187e0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:13.691 UTC [cauthdsl] func1 -> DEBU 3b24 0xc0041187e0 gate 1556789293687555000 evaluation succeeds" +"2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b27 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:13.692 UTC [policies] Evaluate -> DEBU 3b28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:13.692 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b29 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:13.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b2a Exiting" +"2019-05-02 09:28:13.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b2b Exiting" +"2019-05-02 09:28:13.693 UTC [gossip.gossip] handleMessage -> DEBU 3b2c Exiting" +"2019-05-02 09:28:13.694 UTC [gossip.gossip] handleMessage -> DEBU 3b2d Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.694 UTC [gossip.pull] HandleMessage -> DEBU 3b2e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.694 UTC [msp] DeserializeIdentity -> DEBU 3b2f Obtaining identity" +"2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b30 Obtaining identity" +"2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b31 Obtaining identity" +"2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b32 Obtaining identity" +"2019-05-02 09:28:13.695 UTC [msp] DeserializeIdentity -> DEBU 3b33 Obtaining identity" +"2019-05-02 09:28:13.696 UTC [msp] DeserializeIdentity -> DEBU 3b34 Obtaining identity" +"2019-05-02 09:28:13.696 UTC [gossip.pull] SendDigest -> DEBU 3b35 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:13.696 UTC [gossip.gossip] handleMessage -> DEBU 3b36 Exiting" +"2019-05-02 09:28:13.696 UTC [gossip.gossip] handleMessage -> DEBU 3b37 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.697 UTC [gossip.gossip] handleMessage -> DEBU 3b38 Exiting" +"2019-05-02 09:28:13.697 UTC [gossip.gossip] handleMessage -> DEBU 3b39 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b3a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.698 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b3b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:13.698 UTC [msp.identity] Verify -> DEBU 3b3c Verify: digest = 00000000 91 b3 1b f5 b1 b2 4f c1 f7 e1 40 3c dc d4 54 5b |......O...@<..T[| +00000010 5c ba 89 2f 8b 8a 44 49 0d 0a a2 d0 a5 71 10 fb |\../..DI.....q..|" +"2019-05-02 09:28:13.698 UTC [msp.identity] Verify -> DEBU 3b3d Verify: sig = 00000000 30 44 02 20 56 13 31 da c5 76 11 81 ec 10 04 18 |0D. V.1..v......| +00000010 ea 18 97 5f cb 95 c1 bc 49 bd 31 03 3b a8 d8 a1 |..._....I.1.;...| +00000020 10 16 9b 84 02 20 09 21 29 ff b1 9c 95 20 01 94 |..... .!).... ..| +00000030 4e 28 c8 00 18 45 e1 3f ee 64 e6 5b 54 36 8b 03 |N(...E.?.d.[T6..| +00000040 6c 80 78 51 9f 1c |l.xQ..|" +"2019-05-02 09:28:13.699 UTC [msp.identity] Verify -> DEBU 3b3e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:48.413 UTC [msp.identity] Verify -> DEBU 3f39 Verify: sig = 00000000 30 45 02 21 00 ac d2 3f 76 5a 8b 5b 4a 70 91 6e |0E.!...?vZ.[Jp.n| -00000010 4e d0 8c 13 85 07 ae a6 25 c8 f6 56 09 6b 4b 5a |N.......%..V.kKZ| -00000020 c8 4f 16 36 8a 02 20 1d 5a b0 e5 43 99 3b 26 85 |.O.6.. .Z..C.;&.| -00000030 c4 b7 3c 70 f6 16 30 7e ec 21 05 23 8e c4 80 b7 |.. DEBU 3f3a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:48.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-05-02 01:31:48.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3c updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 " -"2019-05-02 01:31:48.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 " -"2019-05-02 01:31:48.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:48.413 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3f Exiting" -"2019-05-02 01:31:48.413 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f40 Exiting" -"2019-05-02 01:31:48.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f41 Exiting" -"2019-05-02 01:31:48.422 UTC [msp] DeserializeIdentity -> DEBU 3f42 Obtaining identity" -"2019-05-02 01:31:48.422 UTC [msp] DeserializeIdentity -> DEBU 3f43 Obtaining identity" -"2019-05-02 01:31:48.422 UTC [msp] DeserializeIdentity -> DEBU 3f44 Obtaining identity" -"2019-05-02 01:31:48.422 UTC [gossip.comm] Send -> DEBU 3f45 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:48.422 UTC [gossip.comm] func1 -> DEBU 3f46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.422 UTC [msp] DeserializeIdentity -> DEBU 3f47 Obtaining identity" -"2019-05-02 01:31:48.422 UTC [gossip.gossip] handleMessage -> DEBU 3f48 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.422 UTC [gossip.gossip] handleMessage -> DEBU 3f49 Exiting" -"2019-05-02 01:31:48.422 UTC [gossip.comm] Send -> DEBU 3f4a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:48.422 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.422 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.423 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4d Exiting" -"2019-05-02 01:31:48.422 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f4e Exiting" -"2019-05-02 01:31:48.423 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.423 UTC [gossip.comm] sendToEndpoint -> DEBU 3f50 Exiting" -"2019-05-02 01:31:48.426 UTC [gossip.comm] func1 -> DEBU 3f51 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.427 UTC [gossip.gossip] handleMessage -> DEBU 3f52 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.427 UTC [gossip.gossip] handleMessage -> DEBU 3f53 Exiting" -"2019-05-02 01:31:48.427 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f54 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.427 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f55 Exiting" -"2019-05-02 01:31:48.475 UTC [gossip.comm] func1 -> DEBU 3f56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.475 UTC [gossip.gossip] handleMessage -> DEBU 3f57 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.475 UTC [gossip.gossip] handleMessage -> DEBU 3f58 Exiting" -"2019-05-02 01:31:48.475 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.475 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f5a Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:48.475 UTC [msp] DeserializeIdentity -> DEBU 3f5b Obtaining identity" -"2019-05-02 01:31:48.476 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f5c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:48.476 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f5d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.476 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f5e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.476 UTC [policies] Evaluate -> DEBU 3f5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:48.476 UTC [policies] Evaluate -> DEBU 3f60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:48.476 UTC [policies] Evaluate -> DEBU 3f61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:48.476 UTC [cauthdsl] func1 -> DEBU 3f62 0xc002433400 gate 1556760708476594200 evaluation starts" -"2019-05-02 01:31:48.476 UTC [cauthdsl] func2 -> DEBU 3f63 0xc002433400 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.476 UTC [cauthdsl] func2 -> DEBU 3f64 0xc002433400 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.476 UTC [cauthdsl] func2 -> DEBU 3f65 0xc002433400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:48.476 UTC [cauthdsl] func2 -> DEBU 3f66 0xc002433400 principal evaluation fails" -"2019-05-02 01:31:48.476 UTC [cauthdsl] func1 -> DEBU 3f67 0xc002433400 gate 1556760708476594200 evaluation fails" -"2019-05-02 01:31:48.476 UTC [policies] Evaluate -> DEBU 3f68 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.477 UTC [policies] Evaluate -> DEBU 3f69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.477 UTC [policies] Evaluate -> DEBU 3f6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:48.477 UTC [cauthdsl] func1 -> DEBU 3f6b 0xc002433c40 gate 1556760708477385800 evaluation starts" -"2019-05-02 01:31:48.480 UTC [cauthdsl] func2 -> DEBU 3f6c 0xc002433c40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.480 UTC [cauthdsl] func2 -> DEBU 3f6d 0xc002433c40 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.480 UTC [cauthdsl] func2 -> DEBU 3f6e 0xc002433c40 principal matched by identity 0" -"2019-05-02 01:31:48.480 UTC [msp.identity] Verify -> DEBU 3f6f Verify: digest = 00000000 2e 9a 4e 8c 1f 3a 74 37 8d f8 25 af 4d a7 7e 02 |..N..:t7..%.M.~.| -00000010 97 c4 19 51 90 b6 7a 3a ce ee 1d 5c ff f4 c9 4a |...Q..z:...\...J|" -"2019-05-02 01:31:48.480 UTC [msp.identity] Verify -> DEBU 3f70 Verify: sig = 00000000 30 45 02 21 00 95 6e 93 88 31 48 35 db 86 15 ce |0E.!..n..1H5....| -00000010 1b 9f d2 b2 0c 03 00 30 1f d3 7f 7a 36 88 ef 59 |.......0...z6..Y| -00000020 0f 1b d2 28 60 02 20 5e cf f3 38 5d 0c 1d e0 05 |...(`. ^..8]....| -00000030 a3 34 cc 7e 1d 1f bc 16 ed 77 37 65 0b 23 ff 05 |.4.~.....w7e.#..| -00000040 31 b7 80 74 68 f4 03 |1..th..|" -"2019-05-02 01:31:48.480 UTC [cauthdsl] func2 -> DEBU 3f71 0xc002433c40 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:48.480 UTC [cauthdsl] func1 -> DEBU 3f72 0xc002433c40 gate 1556760708477385800 evaluation succeeds" -"2019-05-02 01:31:48.480 UTC [policies] Evaluate -> DEBU 3f73 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.480 UTC [policies] Evaluate -> DEBU 3f74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.480 UTC [policies] Evaluate -> DEBU 3f75 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:48.480 UTC [policies] Evaluate -> DEBU 3f76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:48.481 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f77 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.481 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f78 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-05-02 01:31:48.481 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f79 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 " -"2019-05-02 01:31:48.481 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f7a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 " -"2019-05-02 01:31:48.481 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f7b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:48.481 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f7c Exiting" -"2019-05-02 01:31:48.481 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f7d Exiting" -"2019-05-02 01:31:48.481 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f7e Exiting" -"2019-05-02 01:31:48.486 UTC [gossip.comm] func1 -> DEBU 3f7f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.486 UTC [gossip.gossip] handleMessage -> DEBU 3f80 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.486 UTC [gossip.gossip] handleMessage -> DEBU 3f81 Exiting" -"2019-05-02 01:31:48.486 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f82 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.486 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f83 Exiting" -"2019-05-02 01:31:48.490 UTC [msp] DeserializeIdentity -> DEBU 3f84 Obtaining identity" -"2019-05-02 01:31:48.490 UTC [msp] DeserializeIdentity -> DEBU 3f85 Obtaining identity" -"2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f86 Obtaining identity" -"2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f87 Obtaining identity" -"2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f88 Obtaining identity" -"2019-05-02 01:31:48.491 UTC [gossip.comm] func1 -> DEBU 3f89 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f8a Obtaining identity" -"2019-05-02 01:31:48.491 UTC [gossip.gossip] handleMessage -> DEBU 3f8b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f8c Obtaining identity" -"2019-05-02 01:31:48.491 UTC [gossip.gossip] handleMessage -> DEBU 3f8d Exiting" -"2019-05-02 01:31:48.491 UTC [gossip.comm] Send -> DEBU 3f8e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:48.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f8f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.491 UTC [msp] DeserializeIdentity -> DEBU 3f90 Obtaining identity" -"2019-05-02 01:31:48.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f91 Exiting" -"2019-05-02 01:31:48.491 UTC [gossip.comm] Send -> DEBU 3f92 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:48.491 UTC [gossip.comm] sendToEndpoint -> DEBU 3f93 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.491 UTC [gossip.comm] sendToEndpoint -> DEBU 3f94 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:48.491 UTC [gossip.comm] sendToEndpoint -> DEBU 3f95 Exiting" -"2019-05-02 01:31:48.491 UTC [gossip.comm] sendToEndpoint -> DEBU 3f96 Exiting" -"2019-05-02 01:31:48.543 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 3f97 Sleeping 25s" -"2019-05-02 01:31:48.700 UTC [msp.identity] Sign -> DEBU 3f98 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151030 " -"2019-05-02 01:31:48.700 UTC [msp.identity] Sign -> DEBU 3f99 Sign: digest: 688C85DD5E321C6043BC0E7C80F5322804F6223AD5D1EA345F6AFA795557A7A5 " -"2019-05-02 01:31:48.701 UTC [msp.identity] Sign -> DEBU 3f9a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:48.701 UTC [msp.identity] Sign -> DEBU 3f9b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:48.702 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3f9c Sleeping 5s" -"2019-05-02 01:31:48.709 UTC [msp] DeserializeIdentity -> DEBU 3f9d Obtaining identity" -"2019-05-02 01:31:48.710 UTC [msp] DeserializeIdentity -> DEBU 3f9e Obtaining identity" -"2019-05-02 01:31:48.711 UTC [msp] DeserializeIdentity -> DEBU 3f9f Obtaining identity" -"2019-05-02 01:31:48.712 UTC [gossip.comm] Send -> DEBU 3fa0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:48.712 UTC [gossip.comm] Send -> DEBU 3fa1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -"2019-05-02 01:31:48.713 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.713 UTC [msp] DeserializeIdentity -> DEBU 3fa3 Obtaining identity" -"2019-05-02 01:31:48.713 UTC [gossip.comm] Send -> DEBU 3fa5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:48.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:48.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa7 Exiting" -"2019-05-02 01:31:48.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa9 Exiting" -"2019-05-02 01:31:48.713 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa4 Exiting" -"2019-05-02 01:31:48.786 UTC [msp] DeserializeIdentity -> DEBU 3faa Obtaining identity" -"2019-05-02 01:31:48.786 UTC [msp] DeserializeIdentity -> DEBU 3fab Obtaining identity" -"2019-05-02 01:31:48.786 UTC [gossip.comm] Send -> DEBU 3fac Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:48.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fae Exiting" -"2019-05-02 01:31:48.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3faf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.787 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb0 Exiting" -"2019-05-02 01:31:48.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.788 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb2 Exiting" -"2019-05-02 01:31:48.790 UTC [gossip.comm] func1 -> DEBU 3fb3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.791 UTC [gossip.gossip] handleMessage -> DEBU 3fb4 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.792 UTC [msp.identity] Verify -> DEBU 3fb5 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:48.792 UTC [msp.identity] Verify -> DEBU 3fb6 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:48.792 UTC [gossip.comm] func1 -> DEBU 3fb7 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.796 UTC [msp.identity] Verify -> DEBU 3fb8 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:48.798 UTC [msp.identity] Verify -> DEBU 3fb9 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:48.800 UTC [msp] DeserializeIdentity -> DEBU 3fba Obtaining identity" -"2019-05-02 01:31:48.801 UTC [msp] DeserializeIdentity -> DEBU 3fbb Obtaining identity" -"2019-05-02 01:31:48.803 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fbd Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fbe Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.805 UTC [policies] Evaluate -> DEBU 3fbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:48.806 UTC [policies] Evaluate -> DEBU 3fc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:48.807 UTC [policies] Evaluate -> DEBU 3fc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:48.808 UTC [cauthdsl] func1 -> DEBU 3fc3 0xc0026781d0 gate 1556760708808243500 evaluation starts" -"2019-05-02 01:31:48.808 UTC [cauthdsl] func2 -> DEBU 3fc4 0xc0026781d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.807 UTC [gossip.comm] func1 -> DEBU 3fc2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.810 UTC [cauthdsl] func2 -> DEBU 3fc5 0xc0026781d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.811 UTC [cauthdsl] func2 -> DEBU 3fc6 0xc0026781d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:48.811 UTC [cauthdsl] func2 -> DEBU 3fc7 0xc0026781d0 principal evaluation fails" -"2019-05-02 01:31:48.812 UTC [cauthdsl] func1 -> DEBU 3fc8 0xc0026781d0 gate 1556760708808243500 evaluation fails" -"2019-05-02 01:31:48.812 UTC [policies] Evaluate -> DEBU 3fc9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.813 UTC [policies] Evaluate -> DEBU 3fca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.818 UTC [policies] Evaluate -> DEBU 3fcc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:48.816 UTC [gossip.comm] func1 -> DEBU 3fcb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.822 UTC [gossip.comm] func1 -> DEBU 3fcd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.820 UTC [cauthdsl] func1 -> DEBU 3fce 0xc002678a40 gate 1556760708819805600 evaluation starts" -"2019-05-02 01:31:48.826 UTC [cauthdsl] func2 -> DEBU 3fcf 0xc002678a40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.826 UTC [cauthdsl] func2 -> DEBU 3fd0 0xc002678a40 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.827 UTC [gossip.comm] func1 -> DEBU 3fd1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.828 UTC [cauthdsl] func2 -> DEBU 3fd2 0xc002678a40 principal matched by identity 0" -"2019-05-02 01:31:48.830 UTC [msp.identity] Verify -> DEBU 3fd3 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:48.830 UTC [msp.identity] Verify -> DEBU 3fd4 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:48.831 UTC [cauthdsl] func2 -> DEBU 3fd5 0xc002678a40 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:48.831 UTC [cauthdsl] func1 -> DEBU 3fd6 0xc002678a40 gate 1556760708819805600 evaluation succeeds" -"2019-05-02 01:31:48.831 UTC [policies] Evaluate -> DEBU 3fd7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.831 UTC [policies] Evaluate -> DEBU 3fd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.832 UTC [policies] Evaluate -> DEBU 3fd9 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:48.832 UTC [policies] Evaluate -> DEBU 3fda == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:48.833 UTC [msp] DeserializeIdentity -> DEBU 3fdb Obtaining identity" -"2019-05-02 01:31:48.833 UTC [msp] DeserializeIdentity -> DEBU 3fdc Obtaining identity" -"2019-05-02 01:31:48.834 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fdd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:48.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fde Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fdf Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.835 UTC [policies] Evaluate -> DEBU 3fe0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:48.835 UTC [policies] Evaluate -> DEBU 3fe1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:48.835 UTC [policies] Evaluate -> DEBU 3fe2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:48.836 UTC [cauthdsl] func1 -> DEBU 3fe3 0xc0026ce3e0 gate 1556760708836242100 evaluation starts" -"2019-05-02 01:31:48.836 UTC [cauthdsl] func2 -> DEBU 3fe4 0xc0026ce3e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.836 UTC [cauthdsl] func2 -> DEBU 3fe5 0xc0026ce3e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.837 UTC [cauthdsl] func2 -> DEBU 3fe6 0xc0026ce3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:48.837 UTC [cauthdsl] func2 -> DEBU 3fe7 0xc0026ce3e0 principal evaluation fails" -"2019-05-02 01:31:48.837 UTC [cauthdsl] func1 -> DEBU 3fe8 0xc0026ce3e0 gate 1556760708836242100 evaluation fails" -"2019-05-02 01:31:48.838 UTC [policies] Evaluate -> DEBU 3fe9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.838 UTC [policies] Evaluate -> DEBU 3fea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.838 UTC [policies] Evaluate -> DEBU 3feb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:48.838 UTC [cauthdsl] func1 -> DEBU 3fec 0xc0026cec20 gate 1556760708838832200 evaluation starts" -"2019-05-02 01:31:48.839 UTC [cauthdsl] func2 -> DEBU 3fed 0xc0026cec20 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.839 UTC [cauthdsl] func2 -> DEBU 3fee 0xc0026cec20 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.839 UTC [cauthdsl] func2 -> DEBU 3fef 0xc0026cec20 principal matched by identity 0" -"2019-05-02 01:31:48.839 UTC [msp.identity] Verify -> DEBU 3ff0 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:48.840 UTC [msp.identity] Verify -> DEBU 3ff1 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:48.840 UTC [cauthdsl] func2 -> DEBU 3ff2 0xc0026cec20 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:48.840 UTC [cauthdsl] func1 -> DEBU 3ff3 0xc0026cec20 gate 1556760708838832200 evaluation succeeds" -"2019-05-02 01:31:48.841 UTC [policies] Evaluate -> DEBU 3ff4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.841 UTC [policies] Evaluate -> DEBU 3ff5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.841 UTC [policies] Evaluate -> DEBU 3ff6 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:48.842 UTC [policies] Evaluate -> DEBU 3ff7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:48.842 UTC [gossip.gossip] handleMessage -> DEBU 3ff8 Exiting" -"2019-05-02 01:31:48.842 UTC [gossip.gossip] handleMessage -> DEBU 3ff9 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.843 UTC [msp] DeserializeIdentity -> DEBU 3ffa Obtaining identity" -"2019-05-02 01:31:48.843 UTC [msp] DeserializeIdentity -> DEBU 3ffb Obtaining identity" -"2019-05-02 01:31:48.844 UTC [msp] DeserializeIdentity -> DEBU 3ffc Obtaining identity" -"2019-05-02 01:31:48.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ffd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:48.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ffe Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fff Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.845 UTC [policies] Evaluate -> DEBU 4000 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:48.845 UTC [policies] Evaluate -> DEBU 4001 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:48.845 UTC [policies] Evaluate -> DEBU 4002 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:48.846 UTC [cauthdsl] func1 -> DEBU 4003 0xc0027aa730 gate 1556760708846266400 evaluation starts" -"2019-05-02 01:31:48.846 UTC [cauthdsl] func2 -> DEBU 4004 0xc0027aa730 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.847 UTC [cauthdsl] func2 -> DEBU 4005 0xc0027aa730 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.847 UTC [cauthdsl] func2 -> DEBU 4006 0xc0027aa730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:48.847 UTC [cauthdsl] func2 -> DEBU 4007 0xc0027aa730 principal evaluation fails" -"2019-05-02 01:31:48.848 UTC [cauthdsl] func1 -> DEBU 4008 0xc0027aa730 gate 1556760708846266400 evaluation fails" -"2019-05-02 01:31:48.848 UTC [policies] Evaluate -> DEBU 4009 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.849 UTC [policies] Evaluate -> DEBU 400a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.849 UTC [policies] Evaluate -> DEBU 400b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:48.849 UTC [cauthdsl] func1 -> DEBU 400c 0xc0027aaf70 gate 1556760708849908900 evaluation starts" -"2019-05-02 01:31:48.850 UTC [cauthdsl] func2 -> DEBU 400d 0xc0027aaf70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.850 UTC [cauthdsl] func2 -> DEBU 400e 0xc0027aaf70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.851 UTC [cauthdsl] func2 -> DEBU 400f 0xc0027aaf70 principal matched by identity 0" -"2019-05-02 01:31:48.851 UTC [msp.identity] Verify -> DEBU 4010 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:48.852 UTC [msp.identity] Verify -> DEBU 4011 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:48.852 UTC [cauthdsl] func2 -> DEBU 4012 0xc0027aaf70 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:48.853 UTC [cauthdsl] func1 -> DEBU 4013 0xc0027aaf70 gate 1556760708849908900 evaluation succeeds" -"2019-05-02 01:31:48.853 UTC [policies] Evaluate -> DEBU 4014 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.854 UTC [policies] Evaluate -> DEBU 4015 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.854 UTC [policies] Evaluate -> DEBU 4016 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:48.854 UTC [policies] Evaluate -> DEBU 4017 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:48.855 UTC [msp.identity] Verify -> DEBU 4018 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:48.855 UTC [msp.identity] Verify -> DEBU 4019 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:48.856 UTC [msp.identity] Verify -> DEBU 401a Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:48.856 UTC [msp.identity] Verify -> DEBU 401b Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:48.857 UTC [msp] DeserializeIdentity -> DEBU 401c Obtaining identity" -"2019-05-02 01:31:48.857 UTC [msp] DeserializeIdentity -> DEBU 401d Obtaining identity" -"2019-05-02 01:31:48.859 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 401e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:48.860 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 401f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.861 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4020 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.861 UTC [policies] Evaluate -> DEBU 4021 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:48.861 UTC [policies] Evaluate -> DEBU 4022 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:48.862 UTC [policies] Evaluate -> DEBU 4023 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:48.862 UTC [cauthdsl] func1 -> DEBU 4024 0xc0027b76b0 gate 1556760708862827300 evaluation starts" -"2019-05-02 01:31:48.863 UTC [cauthdsl] func2 -> DEBU 4025 0xc0027b76b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.863 UTC [cauthdsl] func2 -> DEBU 4026 0xc0027b76b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.863 UTC [cauthdsl] func2 -> DEBU 4027 0xc0027b76b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:48.864 UTC [cauthdsl] func2 -> DEBU 4028 0xc0027b76b0 principal evaluation fails" -"2019-05-02 01:31:48.864 UTC [cauthdsl] func1 -> DEBU 4029 0xc0027b76b0 gate 1556760708862827300 evaluation fails" -"2019-05-02 01:31:48.864 UTC [policies] Evaluate -> DEBU 402a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.865 UTC [policies] Evaluate -> DEBU 402b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.865 UTC [policies] Evaluate -> DEBU 402c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:48.865 UTC [cauthdsl] func1 -> DEBU 402d 0xc0027b7ef0 gate 1556760708865647000 evaluation starts" -"2019-05-02 01:31:48.865 UTC [cauthdsl] func2 -> DEBU 402e 0xc0027b7ef0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.866 UTC [cauthdsl] func2 -> DEBU 402f 0xc0027b7ef0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.866 UTC [cauthdsl] func2 -> DEBU 4030 0xc0027b7ef0 principal matched by identity 0" -"2019-05-02 01:31:48.866 UTC [msp.identity] Verify -> DEBU 4031 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:48.867 UTC [msp.identity] Verify -> DEBU 4032 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:48.867 UTC [cauthdsl] func2 -> DEBU 4033 0xc0027b7ef0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:48.867 UTC [cauthdsl] func1 -> DEBU 4034 0xc0027b7ef0 gate 1556760708865647000 evaluation succeeds" -"2019-05-02 01:31:48.868 UTC [policies] Evaluate -> DEBU 4035 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.868 UTC [policies] Evaluate -> DEBU 4036 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.868 UTC [policies] Evaluate -> DEBU 4037 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:48.869 UTC [policies] Evaluate -> DEBU 4038 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:48.869 UTC [gossip.gossip] handleMessage -> DEBU 4039 Exiting" -"2019-05-02 01:31:48.869 UTC [gossip.gossip] handleMessage -> DEBU 403a Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.870 UTC [msp] DeserializeIdentity -> DEBU 403b Obtaining identity" -"2019-05-02 01:31:48.870 UTC [msp] DeserializeIdentity -> DEBU 403c Obtaining identity" -"2019-05-02 01:31:48.871 UTC [msp] DeserializeIdentity -> DEBU 403d Obtaining identity" -"2019-05-02 01:31:48.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 403e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:48.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 403f Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4040 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.872 UTC [policies] Evaluate -> DEBU 4041 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:48.872 UTC [policies] Evaluate -> DEBU 4042 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:48.873 UTC [policies] Evaluate -> DEBU 4043 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:48.873 UTC [cauthdsl] func1 -> DEBU 4044 0xc0027eda00 gate 1556760708873382800 evaluation starts" -"2019-05-02 01:31:48.873 UTC [cauthdsl] func2 -> DEBU 4045 0xc0027eda00 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.873 UTC [cauthdsl] func2 -> DEBU 4046 0xc0027eda00 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.874 UTC [cauthdsl] func2 -> DEBU 4047 0xc0027eda00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:48.874 UTC [cauthdsl] func2 -> DEBU 4048 0xc0027eda00 principal evaluation fails" -"2019-05-02 01:31:48.875 UTC [cauthdsl] func1 -> DEBU 4049 0xc0027eda00 gate 1556760708873382800 evaluation fails" -"2019-05-02 01:31:48.875 UTC [policies] Evaluate -> DEBU 404a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.875 UTC [policies] Evaluate -> DEBU 404b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.876 UTC [policies] Evaluate -> DEBU 404c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:48.877 UTC [cauthdsl] func1 -> DEBU 404d 0xc0027fa280 gate 1556760708877059700 evaluation starts" -"2019-05-02 01:31:48.877 UTC [cauthdsl] func2 -> DEBU 404e 0xc0027fa280 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.878 UTC [cauthdsl] func2 -> DEBU 404f 0xc0027fa280 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.878 UTC [cauthdsl] func2 -> DEBU 4050 0xc0027fa280 principal matched by identity 0" -"2019-05-02 01:31:48.878 UTC [msp.identity] Verify -> DEBU 4051 Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:48.879 UTC [msp.identity] Verify -> DEBU 4052 Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:48.879 UTC [cauthdsl] func2 -> DEBU 4053 0xc0027fa280 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:48.879 UTC [cauthdsl] func1 -> DEBU 4054 0xc0027fa280 gate 1556760708877059700 evaluation succeeds" -"2019-05-02 01:31:48.880 UTC [policies] Evaluate -> DEBU 4055 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.880 UTC [policies] Evaluate -> DEBU 4056 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.880 UTC [policies] Evaluate -> DEBU 4057 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:48.880 UTC [policies] Evaluate -> DEBU 4058 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:48.881 UTC [msp.identity] Verify -> DEBU 4059 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:48.881 UTC [msp.identity] Verify -> DEBU 405a Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:48.885 UTC [msp] DeserializeIdentity -> DEBU 405b Obtaining identity" -"2019-05-02 01:31:48.885 UTC [msp] DeserializeIdentity -> DEBU 405c Obtaining identity" -"2019-05-02 01:31:48.885 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 405d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:48.885 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 405e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.885 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 405f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.885 UTC [policies] Evaluate -> DEBU 4060 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:48.886 UTC [policies] Evaluate -> DEBU 4061 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:48.886 UTC [policies] Evaluate -> DEBU 4062 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:48.886 UTC [cauthdsl] func1 -> DEBU 4063 0xc002c2a1c0 gate 1556760708886105400 evaluation starts" -"2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 4064 0xc002c2a1c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 4065 0xc002c2a1c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 4066 0xc002c2a1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 4067 0xc002c2a1c0 principal evaluation fails" -"2019-05-02 01:31:48.886 UTC [cauthdsl] func1 -> DEBU 4068 0xc002c2a1c0 gate 1556760708886105400 evaluation fails" -"2019-05-02 01:31:48.886 UTC [policies] Evaluate -> DEBU 4069 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.886 UTC [policies] Evaluate -> DEBU 406a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.886 UTC [policies] Evaluate -> DEBU 406b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:48.886 UTC [cauthdsl] func1 -> DEBU 406c 0xc002c2aa00 gate 1556760708886547500 evaluation starts" -"2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 406d 0xc002c2aa00 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 406e 0xc002c2aa00 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.886 UTC [cauthdsl] func2 -> DEBU 406f 0xc002c2aa00 principal matched by identity 0" -"2019-05-02 01:31:48.886 UTC [msp.identity] Verify -> DEBU 4070 Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:48.886 UTC [msp.identity] Verify -> DEBU 4071 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:48.887 UTC [cauthdsl] func2 -> DEBU 4072 0xc002c2aa00 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:48.887 UTC [cauthdsl] func1 -> DEBU 4073 0xc002c2aa00 gate 1556760708886547500 evaluation succeeds" -"2019-05-02 01:31:48.887 UTC [policies] Evaluate -> DEBU 4074 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.887 UTC [policies] Evaluate -> DEBU 4075 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.887 UTC [policies] Evaluate -> DEBU 4076 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:48.887 UTC [policies] Evaluate -> DEBU 4077 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:48.887 UTC [msp.identity] Verify -> DEBU 4078 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:48.887 UTC [msp.identity] Verify -> DEBU 4079 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:48.887 UTC [gossip.gossip] handleMessage -> DEBU 407a Exiting" -"2019-05-02 01:31:48.888 UTC [gossip.gossip] handleMessage -> DEBU 407b Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.889 UTC [gossip.gossip] handleMessage -> DEBU 407c Exiting" -"2019-05-02 01:31:48.889 UTC [gossip.gossip] handleMessage -> DEBU 407d Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.890 UTC [gossip.discovery] handleMsgFromComm -> DEBU 407e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.890 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 407f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:48.890 UTC [msp] DeserializeIdentity -> DEBU 4080 Obtaining identity" -"2019-05-02 01:31:48.890 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4081 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:48.891 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4082 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.891 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4083 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:48.891 UTC [policies] Evaluate -> DEBU 4084 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:48.891 UTC [policies] Evaluate -> DEBU 4085 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:48.891 UTC [policies] Evaluate -> DEBU 4086 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func1 -> DEBU 4087 0xc002c56f50 gate 1556760708892205500 evaluation starts" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4088 0xc002c56f50 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4089 0xc002c56f50 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 408a 0xc002c56f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 408b 0xc002c56f50 principal evaluation fails" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func1 -> DEBU 408c 0xc002c56f50 gate 1556760708892205500 evaluation fails" -"2019-05-02 01:31:48.892 UTC [policies] Evaluate -> DEBU 408d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.892 UTC [policies] Evaluate -> DEBU 408e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:48.892 UTC [policies] Evaluate -> DEBU 408f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func1 -> DEBU 4090 0xc002c577b0 gate 1556760708892612900 evaluation starts" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4091 0xc002c577b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4092 0xc002c577b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4093 0xc002c577b0 principal matched by identity 0" -"2019-05-02 01:31:48.892 UTC [msp.identity] Verify -> DEBU 4094 Verify: digest = 00000000 5c a4 8a ca c5 3e 3e ce 0d e2 28 90 74 05 08 71 |\....>>...(.t..q| -00000010 1d 5a da 89 fe 71 f3 08 63 a2 21 32 f3 ce f0 ed |.Z...q..c.!2....|" -"2019-05-02 01:31:48.892 UTC [msp.identity] Verify -> DEBU 4095 Verify: sig = 00000000 30 44 02 20 46 05 f9 f1 77 2b 31 e0 2b 31 38 8d |0D. F...w+1.+18.| -00000010 57 5f ff f4 d9 f7 d0 82 4a c3 4d e9 39 cb 79 b2 |W_......J.M.9.y.| -00000020 97 41 03 8d 02 20 14 41 17 8e 99 72 f8 7f 3c 10 |.A... .A...r..<.| -00000030 59 7d 8a 3e 91 44 a3 b7 40 58 e0 ae b5 c6 5f ee |Y}.>.D..@X...._.| -00000040 d9 04 9a 28 58 33 |...(X3|" -"2019-05-02 01:31:48.892 UTC [cauthdsl] func2 -> DEBU 4096 0xc002c577b0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:48.893 UTC [cauthdsl] func1 -> DEBU 4097 0xc002c577b0 gate 1556760708892612900 evaluation succeeds" -"2019-05-02 01:31:48.893 UTC [policies] Evaluate -> DEBU 4098 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.893 UTC [policies] Evaluate -> DEBU 4099 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:48.893 UTC [policies] Evaluate -> DEBU 409a Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:48.893 UTC [policies] Evaluate -> DEBU 409b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:48.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 409c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 409d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:48.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 409e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 " -"2019-05-02 01:31:48.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 409f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 " -"2019-05-02 01:31:48.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:48.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a1 Exiting" -"2019-05-02 01:31:48.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 40a2 Exiting" -"2019-05-02 01:31:48.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a3 Exiting" -"2019-05-02 01:31:48.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a5 Exiting" -"2019-05-02 01:31:48.893 UTC [gossip.gossip] handleMessage -> DEBU 40a6 Exiting" -"2019-05-02 01:31:48.893 UTC [msp] DeserializeIdentity -> DEBU 40a7 Obtaining identity" -"2019-05-02 01:31:48.893 UTC [gossip.gossip] handleMessage -> DEBU 40a8 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.893 UTC [gossip.gossip] handleMessage -> DEBU 40a9 Exiting" -"2019-05-02 01:31:48.893 UTC [msp] DeserializeIdentity -> DEBU 40aa Obtaining identity" -"2019-05-02 01:31:48.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40ab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.893 UTC [msp] DeserializeIdentity -> DEBU 40ac Obtaining identity" -"2019-05-02 01:31:48.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40ad Exiting" -"2019-05-02 01:31:48.894 UTC [msp] DeserializeIdentity -> DEBU 40ae Obtaining identity" -"2019-05-02 01:31:48.894 UTC [msp] DeserializeIdentity -> DEBU 40af Obtaining identity" -"2019-05-02 01:31:48.894 UTC [msp] DeserializeIdentity -> DEBU 40b0 Obtaining identity" -"2019-05-02 01:31:48.894 UTC [msp] DeserializeIdentity -> DEBU 40b1 Obtaining identity" -"2019-05-02 01:31:48.894 UTC [gossip.comm] Send -> DEBU 40b2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:48.894 UTC [msp] DeserializeIdentity -> DEBU 40b3 Obtaining identity" -"2019-05-02 01:31:48.894 UTC [gossip.comm] Send -> DEBU 40b4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:48.894 UTC [gossip.comm] sendToEndpoint -> DEBU 40b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.894 UTC [gossip.comm] sendToEndpoint -> DEBU 40b6 Exiting" -"2019-05-02 01:31:48.894 UTC [gossip.comm] sendToEndpoint -> DEBU 40b7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:48.894 UTC [gossip.comm] sendToEndpoint -> DEBU 40b8 Exiting" -"2019-05-02 01:31:48.920 UTC [msp] DeserializeIdentity -> DEBU 40b9 Obtaining identity" -"2019-05-02 01:31:48.920 UTC [msp] DeserializeIdentity -> DEBU 40ba Obtaining identity" -"2019-05-02 01:31:48.920 UTC [gossip.pull] Hello -> DEBU 40bb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:48.921 UTC [msp] DeserializeIdentity -> DEBU 40bc Obtaining identity" -"2019-05-02 01:31:48.921 UTC [msp] DeserializeIdentity -> DEBU 40bd Obtaining identity" -"2019-05-02 01:31:48.921 UTC [gossip.comm] Send -> DEBU 40be Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:48.921 UTC [gossip.comm] sendToEndpoint -> DEBU 40bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.921 UTC [gossip.comm] sendToEndpoint -> DEBU 40c0 Exiting" -"2019-05-02 01:31:48.922 UTC [gossip.comm] func1 -> DEBU 40c1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10457489009539221300 , Msg_type: BLOCK_MSG, digests: [7 4 2 3 5 6 8 9 1], Envelope: 61 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.922 UTC [gossip.gossip] handleMessage -> DEBU 40c2 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10457489009539221300 , Msg_type: BLOCK_MSG, digests: [7 4 2 3 5 6 8 9 1], Envelope: 61 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.922 UTC [gossip.pull] HandleMessage -> DEBU 40c3 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10457489009539221300 , Msg_type: BLOCK_MSG, digests: [7 4 2 3 5 6 8 9 1], Envelope: 61 bytes, Signature: 0 bytes" -"2019-05-02 01:31:48.922 UTC [gossip.gossip] handleMessage -> DEBU 40c4 Exiting" -"2019-05-02 01:31:49.051 UTC [gossip.comm] func1 -> DEBU 40c5 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.051 UTC [gossip.gossip] handleMessage -> DEBU 40c6 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.054 UTC [msp] DeserializeIdentity -> DEBU 40c7 Obtaining identity" -"2019-05-02 01:31:49.054 UTC [msp] DeserializeIdentity -> DEBU 40c8 Obtaining identity" -"2019-05-02 01:31:49.054 UTC [gossip.gossip] handleMessage -> DEBU 40c9 Exiting" -"2019-05-02 01:31:49.093 UTC [gossip.comm] func1 -> DEBU 40ca Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.093 UTC [gossip.gossip] handleMessage -> DEBU 40cb Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.093 UTC [gossip.pull] HandleMessage -> DEBU 40cc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.093 UTC [gossip.pull] SendDigest -> DEBU 40cd Sending BLOCK_MSG digest: [2 3 4 1 5 6 7 8 9] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:49.093 UTC [gossip.gossip] handleMessage -> DEBU 40ce Exiting" -"2019-05-02 01:31:49.274 UTC [gossip.comm] func1 -> DEBU 40cf Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.274 UTC [gossip.gossip] handleMessage -> DEBU 40d0 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.274 UTC [msp] DeserializeIdentity -> DEBU 40d1 Obtaining identity" -"2019-05-02 01:31:49.274 UTC [msp] DeserializeIdentity -> DEBU 40d2 Obtaining identity" -"2019-05-02 01:31:49.274 UTC [msp] DeserializeIdentity -> DEBU 40d3 Obtaining identity" -"2019-05-02 01:31:49.274 UTC [gossip.gossip] handleMessage -> DEBU 40d4 Exiting" -"2019-05-02 01:31:49.404 UTC [gossip.comm] func1 -> DEBU 40d5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.404 UTC [gossip.gossip] handleMessage -> DEBU 40d6 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.404 UTC [gossip.pull] HandleMessage -> DEBU 40d7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.405 UTC [gossip.pull] SendDigest -> DEBU 40d8 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:49.405 UTC [gossip.gossip] handleMessage -> DEBU 40d9 Exiting" -"2019-05-02 01:31:49.460 UTC [gossip.comm] func1 -> DEBU 40da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.461 UTC [gossip.gossip] handleMessage -> DEBU 40db Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.461 UTC [gossip.gossip] handleMessage -> DEBU 40dc Exiting" -"2019-05-02 01:31:49.461 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.461 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 40de Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:49.461 UTC [msp.identity] Verify -> DEBU 40df Verify: digest = 00000000 1e 39 81 c1 ec ca e7 23 8e 01 5e 62 9f 7c d0 4e |.9.....#..^b.|.N| -00000010 e3 17 0a 6f a7 a7 d9 7e 59 c8 f5 dd 63 85 3d 1e |...o...~Y...c.=.|" -"2019-05-02 01:31:49.461 UTC [msp.identity] Verify -> DEBU 40e0 Verify: sig = 00000000 30 44 02 20 53 2d af 96 8b 4e 76 73 31 bd eb 4e |0D. S-...Nvs1..N| -00000010 83 6a 14 c8 c7 84 3d c5 56 1e 1f 26 4a c9 4b 5a |.j....=.V..&J.KZ| -00000020 48 0f 5d 13 02 20 08 cb a3 7f 67 34 e8 2f f1 c2 |H.].. ....g4./..| -00000030 4b b4 04 df d9 62 75 c8 d1 5b d2 c9 48 05 4a 2a |K....bu..[..H.J*| -00000040 53 2b b7 f6 7b 98 |S+..{.|" -"2019-05-02 01:31:49.462 UTC [msp.identity] Verify -> DEBU 40e1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-05-02 09:28:13.700 UTC [msp.identity] Verify -> DEBU 3b3f Verify: sig = 00000000 30 44 02 20 3f a4 21 18 e3 6c c1 a9 0d 99 00 98 |0D. ?.!..l......| +00000010 89 c3 0e d4 84 b3 12 57 b5 1f 3b e0 ac 87 d4 23 |.......W..;....#| +00000020 b4 aa 5d ce 02 20 7e eb c3 76 b7 71 5b b7 d0 39 |..].. ~..v.q[..9| +00000030 69 f2 26 74 d5 fb e5 61 00 95 fb f8 e9 96 ef 34 |i.&t...a.......4| +00000040 30 0c 04 28 0a 3d |0..(.=|" +"2019-05-02 09:28:13.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:13.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b41 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:28:13.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b42 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 " +"2019-05-02 09:28:13.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b43 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 " +"2019-05-02 09:28:13.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b44 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:13.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b45 Exiting" +"2019-05-02 09:28:13.703 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b46 Exiting" +"2019-05-02 09:28:13.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b47 Exiting" +"2019-05-02 09:28:13.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b49 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:13.705 UTC [msp] DeserializeIdentity -> DEBU 3b4a Obtaining identity" +"2019-05-02 09:28:13.706 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b4b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:13.706 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b4c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:13.706 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b4d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:13.706 UTC [policies] Evaluate -> DEBU 3b4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:13.706 UTC [policies] Evaluate -> DEBU 3b4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:13.707 UTC [policies] Evaluate -> DEBU 3b50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:13.707 UTC [cauthdsl] func1 -> DEBU 3b51 0xc0041bcfb0 gate 1556789293707387900 evaluation starts" +"2019-05-02 09:28:13.708 UTC [cauthdsl] func2 -> DEBU 3b52 0xc0041bcfb0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:13.708 UTC [cauthdsl] func2 -> DEBU 3b53 0xc0041bcfb0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:13.709 UTC [cauthdsl] func2 -> DEBU 3b54 0xc0041bcfb0 principal matched by identity 0" +"2019-05-02 09:28:13.709 UTC [msp.identity] Verify -> DEBU 3b55 Verify: digest = 00000000 a1 24 f4 01 ff 3e 39 31 ab 8e bd 16 8d de fe ed |.$...>91........| +00000010 c1 9d 9c 4b 55 5e 86 75 bb 71 96 0d 40 dd 63 b1 |...KU^.u.q..@.c.|" +"2019-05-02 09:28:13.709 UTC [msp.identity] Verify -> DEBU 3b56 Verify: sig = 00000000 30 44 02 20 62 e5 16 b4 05 b5 6f c7 6f 01 f4 4f |0D. b.....o.o..O| +00000010 31 69 45 75 9f 76 4f c5 ef 3d 9e 03 1d 56 f3 80 |1iEu.vO..=...V..| +00000020 cc 79 4b 96 02 20 66 bd 6f b2 f8 0b 91 9a 2b ac |.yK.. f.o.....+.| +00000030 89 37 74 4f 4b 69 39 fe 9b c0 4a 9d 8b ca c8 34 |.7tOKi9...J....4| +00000040 4e f2 7f ac a0 00 |N.....|" +"2019-05-02 09:28:13.710 UTC [cauthdsl] func2 -> DEBU 3b57 0xc0041bcfb0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:13.710 UTC [cauthdsl] func1 -> DEBU 3b58 0xc0041bcfb0 gate 1556789293707387900 evaluation succeeds" +"2019-05-02 09:28:13.710 UTC [policies] Evaluate -> DEBU 3b59 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:13.710 UTC [policies] Evaluate -> DEBU 3b5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:13.711 UTC [policies] Evaluate -> DEBU 3b5b Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:13.711 UTC [policies] Evaluate -> DEBU 3b5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:13.711 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b5d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b5e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b5f updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 " +"2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b60 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 " +"2019-05-02 09:28:13.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b61 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:13.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b62 Exiting" +"2019-05-02 09:28:13.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b63 Exiting" +"2019-05-02 09:28:13.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b64 Exiting" +"2019-05-02 09:28:13.714 UTC [gossip.discovery] sendMemResponse -> DEBU 3b65 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:13.714 UTC [msp] DeserializeIdentity -> DEBU 3b66 Obtaining identity" +"2019-05-02 09:28:13.716 UTC [msp] DeserializeIdentity -> DEBU 3b67 Obtaining identity" +"2019-05-02 09:28:13.717 UTC [msp] DeserializeIdentity -> DEBU 3b68 Obtaining identity" +"2019-05-02 09:28:13.717 UTC [gossip.comm] Send -> DEBU 3b69 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:13.717 UTC [gossip.discovery] sendMemResponse -> DEBU 3b6a Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:13.718 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.718 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6c Exiting" +"2019-05-02 09:28:13.719 UTC [gossip.discovery] sendMemResponse -> DEBU 3b6d Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:13.719 UTC [msp] DeserializeIdentity -> DEBU 3b6e Obtaining identity" +"2019-05-02 09:28:13.719 UTC [msp] DeserializeIdentity -> DEBU 3b6f Obtaining identity" +"2019-05-02 09:28:13.720 UTC [gossip.comm] Send -> DEBU 3b70 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:13.720 UTC [gossip.discovery] sendMemResponse -> DEBU 3b71 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:28:13.721 UTC [gossip.comm] sendToEndpoint -> DEBU 3b72 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.721 UTC [gossip.comm] sendToEndpoint -> DEBU 3b73 Exiting" +"2019-05-02 09:28:13.721 UTC [gossip.gossip] handleMessage -> DEBU 3b74 Exiting" +"2019-05-02 09:28:13.721 UTC [gossip.gossip] handleMessage -> DEBU 3b75 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.722 UTC [gossip.gossip] handleMessage -> DEBU 3b76 Exiting" +"2019-05-02 09:28:13.722 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b77 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.722 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b78 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:13.723 UTC [msp.identity] Verify -> DEBU 3b79 Verify: digest = 00000000 f0 5b 31 3f 24 12 65 15 c1 71 ac 32 d2 c4 1d 01 |.[1?$.e..q.2....| +00000010 12 11 8c 5d 6b 11 1d c1 67 60 46 49 df b7 2f 26 |...]k...g`FI../&|" +"2019-05-02 09:28:13.724 UTC [msp.identity] Verify -> DEBU 3b7a Verify: sig = 00000000 30 44 02 20 3a ff 2b b9 d3 c7 c6 ff 28 81 90 13 |0D. :.+.....(...| +00000010 9d 67 c7 df bd c2 19 f6 f0 92 38 b8 ff a1 50 60 |.g........8...P`| +00000020 91 17 83 23 02 20 66 83 d1 4c d8 91 98 bb cb 35 |...#. f..L.....5| +00000030 d3 a1 20 02 5b 0e a4 6d d1 10 80 69 79 65 b3 c0 |.. .[..m...iye..| +00000040 8c c5 3b ea 75 cb |..;.u.|" +"2019-05-02 09:28:13.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b7b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.725 UTC [gossip.discovery] isSentByMe -> DEBU 3b7c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.725 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b7d Exiting" +"2019-05-02 09:28:13.726 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b7e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:13.726 UTC [msp.identity] Verify -> DEBU 3b7f Verify: digest = 00000000 91 b3 1b f5 b1 b2 4f c1 f7 e1 40 3c dc d4 54 5b |......O...@<..T[| +00000010 5c ba 89 2f 8b 8a 44 49 0d 0a a2 d0 a5 71 10 fb |\../..DI.....q..|" +"2019-05-02 09:28:13.727 UTC [msp.identity] Verify -> DEBU 3b80 Verify: sig = 00000000 30 44 02 20 56 13 31 da c5 76 11 81 ec 10 04 18 |0D. V.1..v......| +00000010 ea 18 97 5f cb 95 c1 bc 49 bd 31 03 3b a8 d8 a1 |..._....I.1.;...| +00000020 10 16 9b 84 02 20 09 21 29 ff b1 9c 95 20 01 94 |..... .!).... ..| +00000030 4e 28 c8 00 18 45 e1 3f ee 64 e6 5b 54 36 8b 03 |N(...E.?.d.[T6..| +00000040 6c 80 78 51 9f 1c |l.xQ..|" +"2019-05-02 09:28:13.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b81 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.728 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b82 Exiting" +"2019-05-02 09:28:13.728 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b83 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:13.728 UTC [msp] DeserializeIdentity -> DEBU 3b84 Obtaining identity" +"2019-05-02 09:28:13.729 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:13.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b86 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:13.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b87 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:13.730 UTC [policies] Evaluate -> DEBU 3b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:13.730 UTC [policies] Evaluate -> DEBU 3b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:13.730 UTC [policies] Evaluate -> DEBU 3b8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:13.730 UTC [cauthdsl] func1 -> DEBU 3b8b 0xc00430dbc0 gate 1556789293730955800 evaluation starts" +"2019-05-02 09:28:13.731 UTC [cauthdsl] func2 -> DEBU 3b8c 0xc00430dbc0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:13.731 UTC [cauthdsl] func2 -> DEBU 3b8d 0xc00430dbc0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:13.731 UTC [cauthdsl] func2 -> DEBU 3b8e 0xc00430dbc0 principal matched by identity 0" +"2019-05-02 09:28:13.731 UTC [msp.identity] Verify -> DEBU 3b8f Verify: digest = 00000000 0e 29 48 69 64 4d 5a af aa 6d bb 6b 10 44 7e 56 |.)HidMZ..m.k.D~V| +00000010 7a 70 1a be 8c b2 0a 0e 1f 17 ab 53 d8 78 66 09 |zp.........S.xf.|" +"2019-05-02 09:28:13.732 UTC [msp.identity] Verify -> DEBU 3b90 Verify: sig = 00000000 30 44 02 20 5f f9 d1 54 69 54 25 9a 74 b0 ca 5b |0D. _..TiT%.t..[| +00000010 b1 87 6e 0a e7 81 70 06 14 b4 95 a0 09 40 69 6c |..n...p......@il| +00000020 f0 bc d4 d9 02 20 40 16 78 ad 52 04 4a 36 ce 00 |..... @.x.R.J6..| +00000030 bc 69 81 c9 a3 df 04 1a fd c7 65 c6 3c 7d f6 54 |.i........e.<}.T| +00000040 89 bb 53 c5 4e 51 |..S.NQ|" +"2019-05-02 09:28:13.732 UTC [cauthdsl] func2 -> DEBU 3b91 0xc00430dbc0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:13.732 UTC [cauthdsl] func1 -> DEBU 3b92 0xc00430dbc0 gate 1556789293730955800 evaluation succeeds" +"2019-05-02 09:28:13.732 UTC [policies] Evaluate -> DEBU 3b93 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:13.733 UTC [policies] Evaluate -> DEBU 3b94 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:13.733 UTC [policies] Evaluate -> DEBU 3b95 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:13.733 UTC [policies] Evaluate -> DEBU 3b96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:13.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b97 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b98 Exiting" +"2019-05-02 09:28:13.734 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b99 Exiting" +"2019-05-02 09:28:13.735 UTC [msp] DeserializeIdentity -> DEBU 3b9a Obtaining identity" +"2019-05-02 09:28:13.735 UTC [msp] DeserializeIdentity -> DEBU 3b9b Obtaining identity" +"2019-05-02 09:28:13.736 UTC [gossip.pull] Hello -> DEBU 3b9c Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:28:13.736 UTC [msp] DeserializeIdentity -> DEBU 3b9d Obtaining identity" +"2019-05-02 09:28:13.736 UTC [msp] DeserializeIdentity -> DEBU 3b9e Obtaining identity" +"2019-05-02 09:28:13.737 UTC [gossip.comm] Send -> DEBU 3b9f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:13.737 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.738 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba1 Exiting" +"2019-05-02 09:28:13.741 UTC [gossip.pull] Hello -> DEBU 3ba2 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:28:13.741 UTC [gossip.comm] Send -> DEBU 3ba3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:13.742 UTC [gossip.pull] Hello -> DEBU 3ba4 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:28:13.742 UTC [gossip.comm] Send -> DEBU 3ba5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:13.742 UTC [gossip.pull] Hello -> DEBU 3ba6 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:28:13.743 UTC [gossip.comm] Send -> DEBU 3ba7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba9 Exiting" +"2019-05-02 09:28:13.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3baa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.745 UTC [gossip.comm] sendToEndpoint -> DEBU 3bab Exiting" +"2019-05-02 09:28:13.746 UTC [gossip.comm] sendToEndpoint -> DEBU 3bac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.746 UTC [gossip.comm] sendToEndpoint -> DEBU 3bad Exiting" +"2019-05-02 09:28:13.749 UTC [gossip.comm] func1 -> DEBU 3bae Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8087694384524145658 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.750 UTC [gossip.comm] func1 -> DEBU 3baf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10522915394422428203 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.750 UTC [gossip.gossip] handleMessage -> DEBU 3bb0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8087694384524145658 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.751 UTC [gossip.pull] HandleMessage -> DEBU 3bb1 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8087694384524145658 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.751 UTC [gossip.gossip] handleMessage -> DEBU 3bb2 Exiting" +"2019-05-02 09:28:13.751 UTC [gossip.gossip] handleMessage -> DEBU 3bb3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10522915394422428203 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.752 UTC [gossip.pull] HandleMessage -> DEBU 3bb4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10522915394422428203 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.752 UTC [gossip.gossip] handleMessage -> DEBU 3bb5 Exiting" +"2019-05-02 09:28:13.753 UTC [gossip.comm] func1 -> DEBU 3bb6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10722611922427056407 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.753 UTC [gossip.gossip] handleMessage -> DEBU 3bb7 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10722611922427056407 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.753 UTC [gossip.comm] func1 -> DEBU 3bb8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5211070648313222613 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.755 UTC [gossip.pull] HandleMessage -> DEBU 3bb9 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10722611922427056407 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.755 UTC [gossip.gossip] handleMessage -> DEBU 3bba Exiting" +"2019-05-02 09:28:13.756 UTC [gossip.gossip] handleMessage -> DEBU 3bbb Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5211070648313222613 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.756 UTC [gossip.pull] HandleMessage -> DEBU 3bbc GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5211070648313222613 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:13.756 UTC [gossip.gossip] handleMessage -> DEBU 3bbd Exiting" +"2019-05-02 09:28:13.783 UTC [gossip.comm] func1 -> DEBU 3bbe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.783 UTC [gossip.gossip] handleMessage -> DEBU 3bbf Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.783 UTC [gossip.gossip] handleMessage -> DEBU 3bc0 Exiting" +"2019-05-02 09:28:13.784 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bc1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.785 UTC [gossip.comm] func1 -> DEBU 3bc2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.785 UTC [gossip.gossip] handleMessage -> DEBU 3bc3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.784 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bc4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:13.787 UTC [gossip.comm] func1 -> DEBU 3bc5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.788 UTC [msp] DeserializeIdentity -> DEBU 3bc6 Obtaining identity" +"2019-05-02 09:28:13.789 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3bc7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:13.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:13.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bc9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:13.790 UTC [policies] Evaluate -> DEBU 3bca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:13.791 UTC [policies] Evaluate -> DEBU 3bcb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:13.791 UTC [policies] Evaluate -> DEBU 3bcc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:13.791 UTC [cauthdsl] func1 -> DEBU 3bcd 0xc0034e2690 gate 1556789293791713300 evaluation starts" +"2019-05-02 09:28:13.791 UTC [cauthdsl] func2 -> DEBU 3bce 0xc0034e2690 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:13.792 UTC [cauthdsl] func2 -> DEBU 3bcf 0xc0034e2690 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:13.792 UTC [cauthdsl] func2 -> DEBU 3bd0 0xc0034e2690 principal matched by identity 0" +"2019-05-02 09:28:13.793 UTC [msp.identity] Verify -> DEBU 3bd1 Verify: digest = 00000000 5c 09 0d 2f 46 d3 15 b5 71 aa 4d f5 f3 f8 43 e2 |\../F...q.M...C.| +00000010 8f e8 22 ed b6 54 2c f6 18 52 aa c2 60 f9 ac c2 |.."..T,..R..`...|" +"2019-05-02 09:28:13.794 UTC [msp.identity] Verify -> DEBU 3bd2 Verify: sig = 00000000 30 44 02 20 77 00 11 eb 8b 44 14 88 fa 2a 1a 67 |0D. w....D...*.g| +00000010 0a fb 8b 0d de 91 7d 63 22 77 db 4e 35 2e 9a 84 |......}c"w.N5...| +00000020 29 e3 a3 7c 02 20 68 fd cb 4e 05 29 b2 8b 4a 1d |)..|. h..N.)..J.| +00000030 19 d6 17 3f 26 1f e9 16 5a 48 48 88 ed ac 2f 07 |...?&...ZHH.../.| +00000040 31 42 15 d6 c2 ff |1B....|" +"2019-05-02 09:28:13.795 UTC [cauthdsl] func2 -> DEBU 3bd3 0xc0034e2690 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:13.795 UTC [cauthdsl] func1 -> DEBU 3bd4 0xc0034e2690 gate 1556789293791713300 evaluation succeeds" +"2019-05-02 09:28:13.795 UTC [policies] Evaluate -> DEBU 3bd5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:13.796 UTC [policies] Evaluate -> DEBU 3bd6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:13.796 UTC [policies] Evaluate -> DEBU 3bd7 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:13.797 UTC [policies] Evaluate -> DEBU 3bd8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:13.797 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bda Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:13.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bdb updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 " +"2019-05-02 09:28:13.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bdc Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 " +"2019-05-02 09:28:13.799 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bdd Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:13.799 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bde Exiting" +"2019-05-02 09:28:13.800 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bdf Exiting" +"2019-05-02 09:28:13.800 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be0 Exiting" +"2019-05-02 09:28:13.801 UTC [gossip.gossip] handleMessage -> DEBU 3be1 Exiting" +"2019-05-02 09:28:13.801 UTC [gossip.gossip] handleMessage -> DEBU 3be2 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be4 Exiting" +"2019-05-02 09:28:13.802 UTC [gossip.gossip] handleMessage -> DEBU 3be5 Exiting" +"2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3be7 Obtaining identity" +"2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3be8 Obtaining identity" +"2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bea Obtaining identity" +"2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3beb Obtaining identity" +"2019-05-02 09:28:13.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be9 Exiting" +"2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bec Obtaining identity" +"2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bed Obtaining identity" +"2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bee Obtaining identity" +"2019-05-02 09:28:13.803 UTC [gossip.comm] Send -> DEBU 3bef Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:13.803 UTC [msp] DeserializeIdentity -> DEBU 3bf0 Obtaining identity" +"2019-05-02 09:28:13.804 UTC [gossip.comm] Send -> DEBU 3bf1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:13.804 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.804 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf3 Exiting" +"2019-05-02 09:28:13.804 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:13.806 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf5 Exiting" +"2019-05-02 09:28:14.021 UTC [msp.identity] Sign -> DEBU 3bf6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102C " +"2019-05-02 09:28:14.021 UTC [msp.identity] Sign -> DEBU 3bf7 Sign: digest: BCFC79A684F20A2FECB5877BB67D925313B55CDC2738C810E34B07D6C1EEAFCB " +"2019-05-02 09:28:14.022 UTC [msp.identity] Sign -> DEBU 3bf8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:28:14.022 UTC [msp.identity] Sign -> DEBU 3bf9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:28:14.022 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3bfa Sleeping 5s" +"2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bfb Obtaining identity" +"2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bfc Obtaining identity" +"2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bfd Obtaining identity" +"2019-05-02 09:28:14.029 UTC [gossip.comm] Send -> DEBU 3bfe Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:14.029 UTC [msp] DeserializeIdentity -> DEBU 3bff Obtaining identity" +"2019-05-02 09:28:14.029 UTC [gossip.comm] Send -> DEBU 3c00 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:14.029 UTC [gossip.comm] Send -> DEBU 3c01 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c02 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c03 Exiting" +"2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c05 Exiting" +"2019-05-02 09:28:14.029 UTC [gossip.comm] sendToEndpoint -> DEBU 3c06 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:14.030 UTC [gossip.comm] sendToEndpoint -> DEBU 3c07 Exiting" +"2019-05-02 09:28:14.065 UTC [gossip.comm] func1 -> DEBU 3c08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:14.065 UTC [gossip.gossip] handleMessage -> DEBU 3c09 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:14.065 UTC [gossip.gossip] handleMessage -> DEBU 3c0a Exiting" +"2019-05-02 09:28:14.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c0b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:14.065 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c0c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c0d Verify: digest = 00000000 18 7c fa c5 c5 fc a0 86 5b f1 ab f9 1a ad 89 97 |.|......[.......| +00000010 86 c3 4c 2d 8e bf 9d ec 46 4e a6 62 bb 46 3e 23 |..L-....FN.b.F>#|" +"2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c0e Verify: sig = 00000000 30 45 02 21 00 ef 73 c4 c5 33 6d f2 24 63 29 f7 |0E.!..s..3m.$c).| +00000010 87 43 0e 02 07 4e d5 c5 64 02 95 e3 c6 f2 ed b4 |.C...N..d.......| +00000020 d6 6d 98 46 29 02 20 1f 7f 79 3c ad bf e7 d4 06 |.m.F). ..y<.....| +00000030 b0 ae 4e c9 aa 0c 2f 45 53 ba 35 72 39 bc 86 4d |..N.../ES.5r9..M| +00000040 38 11 16 0b 84 29 32 |8....)2|" +"2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c0f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-05-02 01:31:49.462 UTC [msp.identity] Verify -> DEBU 40e2 Verify: sig = 00000000 30 44 02 20 42 0b 78 74 78 63 8b af 82 72 7e 38 |0D. B.xtxc...r~8| -00000010 ca c5 bd 0e 83 a2 15 0f d5 08 83 78 d8 9f a7 36 |...........x...6| -00000020 a9 2b 0a 1d 02 20 39 82 45 98 5e 83 c3 b8 7f 0c |.+... 9.E.^.....| -00000030 aa 66 6a 3f 7d 57 4d 59 34 38 bd 0d 3d ee 3d 87 |.fj?}WMY48..=.=.| -00000040 b5 8a 4d b2 0f 2d |..M..-|" -"2019-05-02 01:31:49.462 UTC [gossip.discovery] handleAliveMessage -> DEBU 40e3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-05-02 01:31:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 40e4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-05-02 01:31:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 40e5 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 " -"2019-05-02 01:31:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 40e6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 " -"2019-05-02 01:31:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 40e7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:49.462 UTC [gossip.discovery] learnExistingMembers -> DEBU 40e8 Exiting" -"2019-05-02 01:31:49.462 UTC [gossip.discovery] handleAliveMessage -> DEBU 40e9 Exiting" -"2019-05-02 01:31:49.462 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40ea Exiting" -"2019-05-02 01:31:49.462 UTC [gossip.discovery] sendMemResponse -> DEBU 40eb Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-05-02 01:31:49.463 UTC [msp] DeserializeIdentity -> DEBU 40ec Obtaining identity" -"2019-05-02 01:31:49.463 UTC [msp] DeserializeIdentity -> DEBU 40ed Obtaining identity" -"2019-05-02 01:31:49.463 UTC [gossip.comm] Send -> DEBU 40ee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:49.463 UTC [gossip.discovery] sendMemResponse -> DEBU 40ef Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" -"2019-05-02 01:31:49.463 UTC [gossip.comm] sendToEndpoint -> DEBU 40f0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.463 UTC [gossip.comm] sendToEndpoint -> DEBU 40f1 Exiting" -"2019-05-02 01:31:49.506 UTC [gossip.comm] func1 -> DEBU 40f2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.506 UTC [gossip.gossip] handleMessage -> DEBU 40f3 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.506 UTC [gossip.pull] HandleMessage -> DEBU 40f4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.506 UTC [msp] DeserializeIdentity -> DEBU 40f5 Obtaining identity" -"2019-05-02 01:31:49.507 UTC [msp] DeserializeIdentity -> DEBU 40f6 Obtaining identity" -"2019-05-02 01:31:49.507 UTC [msp] DeserializeIdentity -> DEBU 40f7 Obtaining identity" -"2019-05-02 01:31:49.507 UTC [msp] DeserializeIdentity -> DEBU 40f8 Obtaining identity" -"2019-05-02 01:31:49.507 UTC [msp] DeserializeIdentity -> DEBU 40f9 Obtaining identity" -"2019-05-02 01:31:49.508 UTC [msp] DeserializeIdentity -> DEBU 40fa Obtaining identity" -"2019-05-02 01:31:49.509 UTC [gossip.pull] SendDigest -> DEBU 40fb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:49.509 UTC [gossip.gossip] handleMessage -> DEBU 40fc Exiting" -"2019-05-02 01:31:49.528 UTC [gossip.comm] func1 -> DEBU 40fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.529 UTC [gossip.gossip] handleMessage -> DEBU 40fe Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.529 UTC [gossip.gossip] handleMessage -> DEBU 40ff Exiting" -"2019-05-02 01:31:49.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4100 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.529 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4101 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:49.529 UTC [msp] DeserializeIdentity -> DEBU 4102 Obtaining identity" -"2019-05-02 01:31:49.529 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4103 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:49.529 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4104 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:49.529 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4105 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:49.529 UTC [policies] Evaluate -> DEBU 4106 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:49.529 UTC [policies] Evaluate -> DEBU 4107 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:49.529 UTC [policies] Evaluate -> DEBU 4108 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:49.529 UTC [cauthdsl] func1 -> DEBU 4109 0xc002db40c0 gate 1556760709529809600 evaluation starts" -"2019-05-02 01:31:49.529 UTC [cauthdsl] func2 -> DEBU 410a 0xc002db40c0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:49.529 UTC [cauthdsl] func2 -> DEBU 410b 0xc002db40c0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:49.529 UTC [cauthdsl] func2 -> DEBU 410c 0xc002db40c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:49.530 UTC [cauthdsl] func2 -> DEBU 410d 0xc002db40c0 principal evaluation fails" -"2019-05-02 01:31:49.530 UTC [cauthdsl] func1 -> DEBU 410e 0xc002db40c0 gate 1556760709529809600 evaluation fails" -"2019-05-02 01:31:49.530 UTC [policies] Evaluate -> DEBU 410f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:49.530 UTC [policies] Evaluate -> DEBU 4110 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:49.530 UTC [policies] Evaluate -> DEBU 4111 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:49.530 UTC [cauthdsl] func1 -> DEBU 4112 0xc002db4900 gate 1556760709530414500 evaluation starts" -"2019-05-02 01:31:49.530 UTC [cauthdsl] func2 -> DEBU 4113 0xc002db4900 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:49.530 UTC [cauthdsl] func2 -> DEBU 4114 0xc002db4900 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:49.530 UTC [cauthdsl] func2 -> DEBU 4115 0xc002db4900 principal matched by identity 0" -"2019-05-02 01:31:49.530 UTC [msp.identity] Verify -> DEBU 4116 Verify: digest = 00000000 de 09 8f 01 3a cd ca 09 fb 79 7e 27 91 89 a1 bd |....:....y~'....| -00000010 a6 35 9c de e8 1e f6 4c 74 66 22 e6 37 45 0d a3 |.5.....Ltf".7E..|" -"2019-05-02 01:31:49.530 UTC [msp.identity] Verify -> DEBU 4117 Verify: sig = 00000000 30 44 02 20 3b fd e7 76 22 57 40 76 05 0f 95 0f |0D. ;..v"W@v....| -00000010 6e d8 80 8e 74 a2 eb 95 7e 02 75 de dc 18 73 d6 |n...t...~.u...s.| -00000020 54 07 9f bd 02 20 69 4f 8d 6f 05 09 aa 42 62 69 |T.... iO.o...Bbi| -00000030 ce cf 6f 7f 77 07 aa 85 64 fe e7 49 4e 52 cc ad |..o.w...d..INR..| -00000040 f5 cd d9 ba b4 0f |......|" -"2019-05-02 01:31:49.530 UTC [cauthdsl] func2 -> DEBU 4118 0xc002db4900 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:49.530 UTC [cauthdsl] func1 -> DEBU 4119 0xc002db4900 gate 1556760709530414500 evaluation succeeds" -"2019-05-02 01:31:49.531 UTC [policies] Evaluate -> DEBU 411a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:49.531 UTC [policies] Evaluate -> DEBU 411b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:49.531 UTC [policies] Evaluate -> DEBU 411c Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:49.531 UTC [policies] Evaluate -> DEBU 411d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:49.531 UTC [gossip.discovery] handleAliveMessage -> DEBU 411e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:49.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 411f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:49.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 4120 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 " -"2019-05-02 01:31:49.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 4121 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 " -"2019-05-02 01:31:49.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 4122 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-05-02 01:31:49.531 UTC [gossip.discovery] learnExistingMembers -> DEBU 4123 Exiting" -"2019-05-02 01:31:49.531 UTC [gossip.discovery] handleAliveMessage -> DEBU 4124 Exiting" -"2019-05-02 01:31:49.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4125 Exiting" -"2019-05-02 01:31:49.531 UTC [gossip.discovery] sendMemResponse -> DEBU 4126 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-05-02 01:31:49.531 UTC [msp] DeserializeIdentity -> DEBU 4127 Obtaining identity" -"2019-05-02 01:31:49.531 UTC [msp] DeserializeIdentity -> DEBU 4128 Obtaining identity" -"2019-05-02 01:31:49.531 UTC [msp] DeserializeIdentity -> DEBU 4129 Obtaining identity" -"2019-05-02 01:31:49.531 UTC [gossip.comm] Send -> DEBU 412a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:49.532 UTC [gossip.discovery] sendMemResponse -> DEBU 412b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:49.532 UTC [gossip.comm] sendToEndpoint -> DEBU 412c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.532 UTC [gossip.comm] sendToEndpoint -> DEBU 412d Exiting" -"2019-05-02 01:31:49.537 UTC [gossip.comm] func1 -> DEBU 412e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.545 UTC [gossip.gossip] handleMessage -> DEBU 412f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.546 UTC [msp] DeserializeIdentity -> DEBU 4130 Obtaining identity" -"2019-05-02 01:31:49.546 UTC [msp] DeserializeIdentity -> DEBU 4131 Obtaining identity" -"2019-05-02 01:31:49.546 UTC [msp] DeserializeIdentity -> DEBU 4132 Obtaining identity" -"2019-05-02 01:31:49.546 UTC [gossip.gossip] handleMessage -> DEBU 4133 Exiting" -"2019-05-02 01:31:49.727 UTC [gossip.comm] func1 -> DEBU 4134 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.727 UTC [gossip.gossip] handleMessage -> DEBU 4135 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.727 UTC [gossip.pull] HandleMessage -> DEBU 4136 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 4137 Obtaining identity" -"2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 4138 Obtaining identity" -"2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 4139 Obtaining identity" -"2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 413a Obtaining identity" -"2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 413b Obtaining identity" -"2019-05-02 01:31:49.727 UTC [msp] DeserializeIdentity -> DEBU 413c Obtaining identity" -"2019-05-02 01:31:49.728 UTC [gossip.pull] SendDigest -> DEBU 413d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:49.728 UTC [gossip.gossip] handleMessage -> DEBU 413e Exiting" -"2019-05-02 01:31:49.822 UTC [gossip.pull] Hello -> DEBU 413f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:49.823 UTC [gossip.comm] Send -> DEBU 4140 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:49.823 UTC [gossip.pull] Hello -> DEBU 4141 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-05-02 01:31:49.823 UTC [gossip.comm] Send -> DEBU 4142 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:49.823 UTC [gossip.pull] Hello -> DEBU 4143 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-05-02 01:31:49.823 UTC [gossip.comm] Send -> DEBU 4144 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4145 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4146 Exiting" -"2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4147 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4148 Exiting" -"2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4149 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.823 UTC [gossip.comm] sendToEndpoint -> DEBU 414a Exiting" -"2019-05-02 01:31:49.824 UTC [gossip.comm] func1 -> DEBU 414b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4387236346447735438 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.824 UTC [gossip.gossip] handleMessage -> DEBU 414c Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4387236346447735438 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.824 UTC [gossip.pull] HandleMessage -> DEBU 414d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4387236346447735438 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.824 UTC [gossip.gossip] handleMessage -> DEBU 414e Exiting" -"2019-05-02 01:31:49.826 UTC [gossip.comm] func1 -> DEBU 414f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15994013751313223387 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.826 UTC [gossip.gossip] handleMessage -> DEBU 4150 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15994013751313223387 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.826 UTC [gossip.pull] HandleMessage -> DEBU 4151 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15994013751313223387 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.826 UTC [gossip.gossip] handleMessage -> DEBU 4152 Exiting" -"2019-05-02 01:31:49.827 UTC [gossip.comm] func1 -> DEBU 4153 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2107182319970799500 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.827 UTC [gossip.gossip] handleMessage -> DEBU 4154 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2107182319970799500 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.827 UTC [gossip.pull] HandleMessage -> DEBU 4155 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2107182319970799500 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.827 UTC [gossip.gossip] handleMessage -> DEBU 4156 Exiting" -"2019-05-02 01:31:49.876 UTC [gossip.comm] func1 -> DEBU 4157 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.876 UTC [gossip.gossip] handleMessage -> DEBU 4158 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.876 UTC [gossip.gossip] handleMessage -> DEBU 4159 Exiting" -"2019-05-02 01:31:49.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 415a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.876 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 415b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:49.876 UTC [msp] DeserializeIdentity -> DEBU 415c Obtaining identity" -"2019-05-02 01:31:49.876 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 415d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:49.876 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 415e Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:49.876 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 415f Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:49.876 UTC [policies] Evaluate -> DEBU 4160 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:49.876 UTC [policies] Evaluate -> DEBU 4161 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:49.876 UTC [policies] Evaluate -> DEBU 4162 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:49.876 UTC [cauthdsl] func1 -> DEBU 4163 0xc002e8ce40 gate 1556760709876835800 evaluation starts" -"2019-05-02 01:31:49.876 UTC [cauthdsl] func2 -> DEBU 4164 0xc002e8ce40 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:49.876 UTC [cauthdsl] func2 -> DEBU 4165 0xc002e8ce40 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:49.876 UTC [cauthdsl] func2 -> DEBU 4166 0xc002e8ce40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:49.877 UTC [cauthdsl] func2 -> DEBU 4167 0xc002e8ce40 principal evaluation fails" -"2019-05-02 01:31:49.877 UTC [cauthdsl] func1 -> DEBU 4168 0xc002e8ce40 gate 1556760709876835800 evaluation fails" -"2019-05-02 01:31:49.877 UTC [policies] Evaluate -> DEBU 4169 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:49.877 UTC [policies] Evaluate -> DEBU 416a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:49.877 UTC [policies] Evaluate -> DEBU 416b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:49.877 UTC [cauthdsl] func1 -> DEBU 416c 0xc002e8d730 gate 1556760709877180400 evaluation starts" -"2019-05-02 01:31:49.877 UTC [cauthdsl] func2 -> DEBU 416d 0xc002e8d730 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:49.877 UTC [cauthdsl] func2 -> DEBU 416e 0xc002e8d730 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:49.877 UTC [cauthdsl] func2 -> DEBU 416f 0xc002e8d730 principal matched by identity 0" -"2019-05-02 01:31:49.877 UTC [msp.identity] Verify -> DEBU 4170 Verify: digest = 00000000 cc 7d 1c b7 83 49 b3 1e 12 82 b5 98 1c 78 a0 44 |.}...I.......x.D| -00000010 49 c8 a6 29 38 12 d1 0b b9 db 8a f8 41 5d 88 1b |I..)8.......A]..|" -"2019-05-02 01:31:49.878 UTC [msp.identity] Verify -> DEBU 4171 Verify: sig = 00000000 30 44 02 20 01 00 5c 8b 0b 5d e6 4d 9a 64 c6 59 |0D. ..\..].M.d.Y| -00000010 fe 6f 95 b8 08 18 e8 f2 0a dc 9e 67 48 b3 14 d2 |.o.........gH...| -00000020 4f 17 35 a9 02 20 38 bd e4 f0 b4 c8 c7 7c 67 a6 |O.5.. 8......|g.| -00000030 0b 4b 77 07 0e 99 97 9c cf a7 e5 eb 73 f9 7a ce |.Kw.........s.z.| -00000040 a7 ca aa 01 8b d5 |......|" -"2019-05-02 01:31:49.878 UTC [cauthdsl] func2 -> DEBU 4172 0xc002e8d730 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:49.878 UTC [cauthdsl] func1 -> DEBU 4173 0xc002e8d730 gate 1556760709877180400 evaluation succeeds" -"2019-05-02 01:31:49.878 UTC [policies] Evaluate -> DEBU 4174 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:49.878 UTC [policies] Evaluate -> DEBU 4175 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:49.878 UTC [policies] Evaluate -> DEBU 4176 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:49.878 UTC [policies] Evaluate -> DEBU 4177 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:49.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 4178 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:49.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 4179 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-05-02 01:31:49.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 417a updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 " -"2019-05-02 01:31:49.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 417b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 " -"2019-05-02 01:31:49.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 417c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-05-02 01:31:49.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 417d Exiting" -"2019-05-02 01:31:49.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 417e Exiting" -"2019-05-02 01:31:49.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 417f Exiting" -"2019-05-02 01:31:49.879 UTC [gossip.discovery] sendMemResponse -> DEBU 4180 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-05-02 01:31:49.879 UTC [msp] DeserializeIdentity -> DEBU 4181 Obtaining identity" -"2019-05-02 01:31:49.879 UTC [msp] DeserializeIdentity -> DEBU 4182 Obtaining identity" -"2019-05-02 01:31:49.879 UTC [msp] DeserializeIdentity -> DEBU 4183 Obtaining identity" -"2019-05-02 01:31:49.879 UTC [gossip.comm] Send -> DEBU 4184 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:49.879 UTC [gossip.discovery] sendMemResponse -> DEBU 4185 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" -"2019-05-02 01:31:49.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4186 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-05-02 01:31:49.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4187 Exiting" -"2019-05-02 01:31:50.160 UTC [msp.identity] Sign -> DEBU 4188 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B0D4C9B6C5B1AECD151031 " -"2019-05-02 01:31:50.161 UTC [msp.identity] Sign -> DEBU 4189 Sign: digest: DD14DBD5976CB835A3176C7CA3C4F19CB8296A075155C2CEE2EE70FC620FF0DB " -"2019-05-02 01:31:50.161 UTC [msp.identity] Sign -> DEBU 418a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-05-02 01:31:50.161 UTC [msp.identity] Sign -> DEBU 418b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-05-02 01:31:50.161 UTC [msp] DeserializeIdentity -> DEBU 418c Obtaining identity" -"2019-05-02 01:31:50.162 UTC [gossip.comm] Send -> DEBU 418d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:50.162 UTC [gossip.comm] Send -> DEBU 418e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:50.162 UTC [msp] DeserializeIdentity -> DEBU 418f Obtaining identity" -"2019-05-02 01:31:50.162 UTC [gossip.comm] Send -> DEBU 4190 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4191 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4192 Exiting" -"2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4193 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4194 Exiting" -"2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4195 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.162 UTC [gossip.comm] sendToEndpoint -> DEBU 4196 Exiting" -"2019-05-02 01:31:50.165 UTC [gossip.comm] func1 -> DEBU 4197 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.166 UTC [gossip.gossip] handleMessage -> DEBU 4198 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.166 UTC [gossip.gossip] handleMessage -> DEBU 4199 Exiting" -"2019-05-02 01:31:50.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 419a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 419b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:50.166 UTC [msp.identity] Verify -> DEBU 419c Verify: digest = 00000000 dd 14 db d5 97 6c b8 35 a3 17 6c 7c a3 c4 f1 9c |.....l.5..l|....| -00000010 b8 29 6a 07 51 55 c2 ce e2 ee 70 fc 62 0f f0 db |.)j.QU....p.b...|" -"2019-05-02 01:31:50.166 UTC [msp.identity] Verify -> DEBU 419d Verify: sig = 00000000 30 45 02 21 00 ba 03 89 e3 75 f3 ad 88 45 cb a3 |0E.!.....u...E..| -00000010 f8 a4 68 e6 83 8a 05 44 41 32 d0 ab 30 07 26 a7 |..h....DA2..0.&.| -00000020 19 bc a3 c4 50 02 20 47 be 23 ab 16 1d 40 23 39 |....P. G.#...@#9| -00000030 6d 36 f6 9e db a4 f3 6b 80 58 72 b5 d8 af 32 12 |m6.....k.Xr...2.| -00000040 d1 28 ab 2f f2 2a 1b |.(./.*.|" -"2019-05-02 01:31:50.166 UTC [gossip.comm] func1 -> DEBU 419e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.167 UTC [gossip.gossip] handleMessage -> DEBU 419f Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.167 UTC [msp.identity] Verify -> DEBU 41a0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-05-02 09:28:14.065 UTC [msp.identity] Verify -> DEBU 3c10 Verify: sig = 00000000 30 44 02 20 3a 06 a4 d6 15 25 4a 5d 27 e7 ad aa |0D. :....%J]'...| +00000010 fb 31 b0 0c 27 49 51 ae 65 59 92 6e 5c 59 f9 07 |.1..'IQ.eY.n\Y..| +00000020 cf 37 b3 73 02 20 54 d5 a5 4f ee 83 d6 03 67 ad |.7.s. T..O....g.| +00000030 14 70 5c 17 c9 31 7d 0f 62 6d fa 3c 85 c1 fe d7 |.p\..1}.bm.<....| +00000040 3b db de 03 0e ac |;.....|" +"2019-05-02 09:28:14.065 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:14.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c12 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:28:14.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c13 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 " +"2019-05-02 09:28:14.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c14 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 " +"2019-05-02 09:28:14.066 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c15 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:14.066 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c16 Exiting" +"2019-05-02 09:28:14.066 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c17 Exiting" +"2019-05-02 09:28:14.066 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c18 Exiting" +"2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c19 Obtaining identity" +"2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c1a Obtaining identity" +"2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c1b Obtaining identity" +"2019-05-02 09:28:14.073 UTC [gossip.comm] Send -> DEBU 3c1c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:14.073 UTC [msp] DeserializeIdentity -> DEBU 3c1d Obtaining identity" +"2019-05-02 09:28:14.073 UTC [gossip.comm] Send -> DEBU 3c1e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c1f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c20 Exiting" +"2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c21 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:14.073 UTC [gossip.comm] sendToEndpoint -> DEBU 3c22 Exiting" +"2019-05-02 09:28:14.075 UTC [gossip.comm] func1 -> DEBU 3c23 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:14.076 UTC [gossip.gossip] handleMessage -> DEBU 3c24 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:14.076 UTC [gossip.gossip] handleMessage -> DEBU 3c25 Exiting" +"2019-05-02 09:28:14.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:14.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c27 Exiting" +"2019-05-02 09:28:14.079 UTC [gossip.comm] func1 -> DEBU 3c28 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:14.079 UTC [gossip.gossip] handleMessage -> DEBU 3c29 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:14.079 UTC [gossip.gossip] handleMessage -> DEBU 3c2a Exiting" +"2019-05-02 09:28:14.079 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c2b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:14.079 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c2c Exiting" +"2019-05-02 09:28:14.148 UTC [gossip.comm] func1 -> DEBU 3c2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.148 UTC [gossip.gossip] handleMessage -> DEBU 3c2e Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.148 UTC [gossip.gossip] handleMessage -> DEBU 3c2f Exiting" +"2019-05-02 09:28:14.148 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.148 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c31 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:14.148 UTC [msp] DeserializeIdentity -> DEBU 3c32 Obtaining identity" +"2019-05-02 09:28:14.148 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:14.148 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c34 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:14.149 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c35 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:14.149 UTC [policies] Evaluate -> DEBU 3c36 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:14.149 UTC [policies] Evaluate -> DEBU 3c37 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:14.149 UTC [policies] Evaluate -> DEBU 3c38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:14.149 UTC [cauthdsl] func1 -> DEBU 3c39 0xc0042afd40 gate 1556789294149285000 evaluation starts" +"2019-05-02 09:28:14.149 UTC [cauthdsl] func2 -> DEBU 3c3a 0xc0042afd40 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:14.149 UTC [cauthdsl] func2 -> DEBU 3c3b 0xc0042afd40 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:14.149 UTC [cauthdsl] func2 -> DEBU 3c3c 0xc0042afd40 principal matched by identity 0" +"2019-05-02 09:28:14.150 UTC [msp.identity] Verify -> DEBU 3c3d Verify: digest = 00000000 05 dc ff 52 2e 71 34 e1 f1 a6 f3 d0 ab 80 7d 1d |...R.q4.......}.| +00000010 b2 c3 46 46 75 b5 c6 53 1c 82 8a 2d 6f 15 10 1b |..FFu..S...-o...|" +"2019-05-02 09:28:14.150 UTC [msp.identity] Verify -> DEBU 3c3e Verify: sig = 00000000 30 44 02 20 02 4a d8 7b 18 45 cd 55 d9 25 ad 1a |0D. .J.{.E.U.%..| +00000010 0a 9a da 2f a8 28 1c 83 11 31 34 ee 00 c6 33 ad |.../.(...14...3.| +00000020 ce 7d cc 96 02 20 75 d6 99 d9 cc b3 64 ee c4 a3 |.}... u.....d...| +00000030 2b f7 db 2d 1c 9c 2a 36 7d d4 4c 4d df 18 8f e7 |+..-..*6}.LM....| +00000040 07 18 f8 7b d6 0b |...{..|" +"2019-05-02 09:28:14.150 UTC [cauthdsl] func2 -> DEBU 3c3f 0xc0042afd40 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:14.150 UTC [cauthdsl] func1 -> DEBU 3c40 0xc0042afd40 gate 1556789294149285000 evaluation succeeds" +"2019-05-02 09:28:14.152 UTC [policies] Evaluate -> DEBU 3c41 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:14.159 UTC [policies] Evaluate -> DEBU 3c42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:14.162 UTC [policies] Evaluate -> DEBU 3c43 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:14.170 UTC [policies] Evaluate -> DEBU 3c44 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:14.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c45 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c46 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:14.180 UTC [gossip.comm] func1 -> DEBU 3c47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.180 UTC [gossip.gossip] handleMessage -> DEBU 3c48 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c49 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 " +"2019-05-02 09:28:14.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c4a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 " +"2019-05-02 09:28:14.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c4b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:14.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c4c Exiting" +"2019-05-02 09:28:14.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c4d Exiting" +"2019-05-02 09:28:14.182 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c4e Exiting" +"2019-05-02 09:28:14.193 UTC [gossip.comm] func1 -> DEBU 3c4f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.195 UTC [msp] DeserializeIdentity -> DEBU 3c50 Obtaining identity" +"2019-05-02 09:28:14.195 UTC [msp] DeserializeIdentity -> DEBU 3c51 Obtaining identity" +"2019-05-02 09:28:14.196 UTC [msp] DeserializeIdentity -> DEBU 3c52 Obtaining identity" +"2019-05-02 09:28:14.197 UTC [msp] DeserializeIdentity -> DEBU 3c53 Obtaining identity" +"2019-05-02 09:28:14.197 UTC [msp] DeserializeIdentity -> DEBU 3c54 Obtaining identity" +"2019-05-02 09:28:14.197 UTC [msp] DeserializeIdentity -> DEBU 3c55 Obtaining identity" +"2019-05-02 09:28:14.198 UTC [gossip.comm] Send -> DEBU 3c56 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:14.198 UTC [msp] DeserializeIdentity -> DEBU 3c57 Obtaining identity" +"2019-05-02 09:28:14.198 UTC [msp] DeserializeIdentity -> DEBU 3c58 Obtaining identity" +"2019-05-02 09:28:14.198 UTC [gossip.comm] Send -> DEBU 3c59 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:14.199 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.199 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5b Exiting" +"2019-05-02 09:28:14.203 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.203 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5d Exiting" +"2019-05-02 09:28:14.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c5e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c5f Exiting" +"2019-05-02 09:28:14.208 UTC [gossip.gossip] handleMessage -> DEBU 3c60 Exiting" +"2019-05-02 09:28:14.209 UTC [gossip.gossip] handleMessage -> DEBU 3c61 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.210 UTC [gossip.gossip] handleMessage -> DEBU 3c62 Exiting" +"2019-05-02 09:28:14.211 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c63 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:14.212 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c64 Exiting" +"2019-05-02 09:28:16.213 UTC [msp] DeserializeIdentity -> DEBU 3c65 Obtaining identity" +"2019-05-02 09:28:16.214 UTC [msp] DeserializeIdentity -> DEBU 3c66 Obtaining identity" +"2019-05-02 09:28:16.214 UTC [gossip.comm] Send -> DEBU 3c67 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c68 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c69 Exiting" +"2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6b Exiting" +"2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.214 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6d Exiting" +"2019-05-02 09:28:16.216 UTC [gossip.comm] func1 -> DEBU 3c6e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.216 UTC [gossip.gossip] handleMessage -> DEBU 3c6f Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.217 UTC [gossip.comm] func1 -> DEBU 3c70 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.217 UTC [msp] DeserializeIdentity -> DEBU 3c71 Obtaining identity" +"2019-05-02 09:28:16.218 UTC [msp] DeserializeIdentity -> DEBU 3c72 Obtaining identity" +"2019-05-02 09:28:16.218 UTC [msp] DeserializeIdentity -> DEBU 3c73 Obtaining identity" +"2019-05-02 09:28:16.218 UTC [gossip.comm] func1 -> DEBU 3c74 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.218 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:16.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c76 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c77 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.220 UTC [policies] Evaluate -> DEBU 3c78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:16.220 UTC [policies] Evaluate -> DEBU 3c79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:16.220 UTC [policies] Evaluate -> DEBU 3c7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:16.221 UTC [cauthdsl] func1 -> DEBU 3c7b 0xc00239d000 gate 1556789296221442800 evaluation starts" +"2019-05-02 09:28:16.221 UTC [cauthdsl] func2 -> DEBU 3c7c 0xc00239d000 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:16.221 UTC [cauthdsl] func2 -> DEBU 3c7d 0xc00239d000 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:16.222 UTC [cauthdsl] func2 -> DEBU 3c7e 0xc00239d000 principal matched by identity 0" +"2019-05-02 09:28:16.222 UTC [msp.identity] Verify -> DEBU 3c7f Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:16.223 UTC [msp.identity] Verify -> DEBU 3c80 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:16.224 UTC [cauthdsl] func2 -> DEBU 3c81 0xc00239d000 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:16.224 UTC [cauthdsl] func1 -> DEBU 3c82 0xc00239d000 gate 1556789296221442800 evaluation succeeds" +"2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c85 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:16.225 UTC [policies] Evaluate -> DEBU 3c86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:16.226 UTC [msp.identity] Verify -> DEBU 3c87 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:16.227 UTC [msp.identity] Verify -> DEBU 3c88 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:16.227 UTC [msp] DeserializeIdentity -> DEBU 3c89 Obtaining identity" +"2019-05-02 09:28:16.228 UTC [msp] DeserializeIdentity -> DEBU 3c8a Obtaining identity" +"2019-05-02 09:28:16.228 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:16.229 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c8c Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.229 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c8d Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.229 UTC [policies] Evaluate -> DEBU 3c8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:16.229 UTC [policies] Evaluate -> DEBU 3c8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:16.230 UTC [policies] Evaluate -> DEBU 3c90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:16.230 UTC [cauthdsl] func1 -> DEBU 3c91 0xc0026daef0 gate 1556789296230552000 evaluation starts" +"2019-05-02 09:28:16.231 UTC [cauthdsl] func2 -> DEBU 3c92 0xc0026daef0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:16.231 UTC [cauthdsl] func2 -> DEBU 3c93 0xc0026daef0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:16.231 UTC [cauthdsl] func2 -> DEBU 3c94 0xc0026daef0 principal matched by identity 0" +"2019-05-02 09:28:16.232 UTC [msp.identity] Verify -> DEBU 3c95 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:16.232 UTC [msp.identity] Verify -> DEBU 3c96 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:16.232 UTC [cauthdsl] func2 -> DEBU 3c97 0xc0026daef0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:16.233 UTC [cauthdsl] func1 -> DEBU 3c98 0xc0026daef0 gate 1556789296230552000 evaluation succeeds" +"2019-05-02 09:28:16.233 UTC [policies] Evaluate -> DEBU 3c99 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.234 UTC [policies] Evaluate -> DEBU 3c9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.234 UTC [policies] Evaluate -> DEBU 3c9b Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:16.234 UTC [policies] Evaluate -> DEBU 3c9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:16.235 UTC [msp.identity] Verify -> DEBU 3c9d Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +"2019-05-02 09:28:16.235 UTC [msp.identity] Verify -> DEBU 3c9e Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +00000040 b0 a3 de d0 53 b0 |....S.|" +"2019-05-02 09:28:16.235 UTC [gossip.gossip] handleMessage -> DEBU 3c9f Exiting" +"2019-05-02 09:28:16.236 UTC [gossip.gossip] handleMessage -> DEBU 3ca0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.236 UTC [msp.identity] Verify -> DEBU 3ca1 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:16.236 UTC [msp.identity] Verify -> DEBU 3ca2 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:16.237 UTC [msp] DeserializeIdentity -> DEBU 3ca3 Obtaining identity" +"2019-05-02 09:28:16.237 UTC [msp] DeserializeIdentity -> DEBU 3ca4 Obtaining identity" +"2019-05-02 09:28:16.238 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ca5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:16.238 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ca6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.238 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ca7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.238 UTC [policies] Evaluate -> DEBU 3ca8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:16.238 UTC [policies] Evaluate -> DEBU 3ca9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:16.239 UTC [policies] Evaluate -> DEBU 3caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:16.239 UTC [cauthdsl] func1 -> DEBU 3cab 0xc0035a7740 gate 1556789296239233500 evaluation starts" +"2019-05-02 09:28:16.239 UTC [cauthdsl] func2 -> DEBU 3cac 0xc0035a7740 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:16.239 UTC [cauthdsl] func2 -> DEBU 3cad 0xc0035a7740 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:16.239 UTC [cauthdsl] func2 -> DEBU 3cae 0xc0035a7740 principal matched by identity 0" +"2019-05-02 09:28:16.240 UTC [msp.identity] Verify -> DEBU 3caf Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:16.240 UTC [msp.identity] Verify -> DEBU 3cb0 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:16.241 UTC [cauthdsl] func2 -> DEBU 3cb1 0xc0035a7740 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:16.241 UTC [cauthdsl] func1 -> DEBU 3cb2 0xc0035a7740 gate 1556789296239233500 evaluation succeeds" +"2019-05-02 09:28:16.241 UTC [policies] Evaluate -> DEBU 3cb3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.241 UTC [policies] Evaluate -> DEBU 3cb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.242 UTC [policies] Evaluate -> DEBU 3cb5 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:16.242 UTC [policies] Evaluate -> DEBU 3cb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:16.243 UTC [msp.identity] Verify -> DEBU 3cb7 Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +"2019-05-02 09:28:16.244 UTC [msp.identity] Verify -> DEBU 3cb8 Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +00000040 b0 a3 de d0 53 b0 |....S.|" +"2019-05-02 09:28:16.245 UTC [msp] DeserializeIdentity -> DEBU 3cb9 Obtaining identity" +"2019-05-02 09:28:16.245 UTC [msp] DeserializeIdentity -> DEBU 3cbb Obtaining identity" +"2019-05-02 09:28:16.245 UTC [gossip.privdata] run -> DEBU 3cba Start reconcile missing private info" +"2019-05-02 09:28:16.246 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:16.246 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cbd Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.246 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cbe Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.247 UTC [policies] Evaluate -> DEBU 3cbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:16.247 UTC [policies] Evaluate -> DEBU 3cc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:16.247 UTC [policies] Evaluate -> DEBU 3cc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:16.247 UTC [cauthdsl] func1 -> DEBU 3cc2 0xc003e47630 gate 1556789296247325900 evaluation starts" +"2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc3 0xc003e47630 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc4 0xc003e47630 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc5 0xc003e47630 principal matched by identity 0" +"2019-05-02 09:28:16.247 UTC [msp.identity] Verify -> DEBU 3cc6 Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:16.247 UTC [msp.identity] Verify -> DEBU 3cc7 Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:16.247 UTC [cauthdsl] func2 -> DEBU 3cc8 0xc003e47630 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:16.247 UTC [cauthdsl] func1 -> DEBU 3cc9 0xc003e47630 gate 1556789296247325900 evaluation succeeds" +"2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3cca Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3ccb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3ccc Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:16.248 UTC [policies] Evaluate -> DEBU 3ccd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:16.248 UTC [gossip.gossip] handleMessage -> DEBU 3cce Exiting" +"2019-05-02 09:28:16.248 UTC [gossip.gossip] handleMessage -> DEBU 3ccf Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.248 UTC [msp] DeserializeIdentity -> DEBU 3cd0 Obtaining identity" +"2019-05-02 09:28:16.248 UTC [msp] DeserializeIdentity -> DEBU 3cd1 Obtaining identity" +"2019-05-02 09:28:16.248 UTC [msp] DeserializeIdentity -> DEBU 3cd2 Obtaining identity" +"2019-05-02 09:28:16.248 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cd3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:16.249 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.249 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.249 UTC [policies] Evaluate -> DEBU 3cd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:16.249 UTC [policies] Evaluate -> DEBU 3cd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:16.249 UTC [policies] Evaluate -> DEBU 3cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:16.249 UTC [cauthdsl] func1 -> DEBU 3cd9 0xc00438b140 gate 1556789296249519400 evaluation starts" +"2019-05-02 09:28:16.249 UTC [cauthdsl] func2 -> DEBU 3cda 0xc00438b140 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:16.249 UTC [cauthdsl] func2 -> DEBU 3cdb 0xc00438b140 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:16.249 UTC [cauthdsl] func2 -> DEBU 3cdc 0xc00438b140 principal matched by identity 0" +"2019-05-02 09:28:16.249 UTC [msp.identity] Verify -> DEBU 3cdd Verify: digest = 00000000 bd 07 23 c4 7e 2d a2 a7 1c 43 6c 9f 6c e0 5c ae |..#.~-...Cl.l.\.| +00000010 49 33 7b 0d ec 10 c8 a7 a3 15 a1 97 a7 ec d2 b0 |I3{.............|" +"2019-05-02 09:28:16.249 UTC [msp.identity] Verify -> DEBU 3cde Verify: sig = 00000000 30 45 02 21 00 81 97 f7 73 82 7f 2f ba 4a 58 29 |0E.!....s../.JX)| +00000010 db 36 55 9b 37 6c 84 2f 65 a7 7a cd 54 d8 cb 6c |.6U.7l./e.z.T..l| +00000020 c9 65 49 40 1f 02 20 03 36 9f 10 3e 49 f8 1f 6c |.eI@.. .6..>I..l| +00000030 db cc 6b cd 8b 48 9f 4a df 99 a5 55 d0 ac b5 65 |..k..H.J...U...e| +00000040 37 dc 37 96 5f ce 7f |7.7._..|" +"2019-05-02 09:28:16.250 UTC [cauthdsl] func2 -> DEBU 3cdf 0xc00438b140 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:16.250 UTC [cauthdsl] func1 -> DEBU 3ce0 0xc00438b140 gate 1556789296249519400 evaluation succeeds" +"2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce3 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:16.250 UTC [policies] Evaluate -> DEBU 3ce4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:16.250 UTC [msp.identity] Verify -> DEBU 3ce5 Verify: digest = 00000000 d1 2a 9b 65 a5 6e bb 97 a2 eb db 84 d4 cf 55 6c |.*.e.n........Ul| +00000010 b7 8c 35 1e 6b be ab f6 c9 1f 8d 03 9d cc 04 17 |..5.k...........|" +"2019-05-02 09:28:16.251 UTC [msp.identity] Verify -> DEBU 3ce6 Verify: sig = 00000000 30 45 02 21 00 d8 76 41 95 01 f7 0b 18 48 b3 4e |0E.!..vA.....H.N| +00000010 c4 64 a3 d4 ec cc da 2c 29 06 c6 c7 fd c3 93 eb |.d.....,).......| +00000020 ac de 96 e8 82 02 20 6b 08 3e aa 7e 72 3a 90 dd |...... k.>.~r:..| +00000030 9f 06 b8 1b e0 4f 00 91 51 30 3a 37 0e 89 20 c1 |.....O..Q0:7.. .| +00000040 2a fb 38 f2 4b d3 75 |*.8.K.u|" +"2019-05-02 09:28:16.251 UTC [msp] DeserializeIdentity -> DEBU 3ce7 Obtaining identity" +"2019-05-02 09:28:16.251 UTC [msp] DeserializeIdentity -> DEBU 3ce8 Obtaining identity" +"2019-05-02 09:28:16.251 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ce9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:16.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cea Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ceb Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:16.251 UTC [policies] Evaluate -> DEBU 3cec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:16.251 UTC [policies] Evaluate -> DEBU 3ced This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:16.251 UTC [policies] Evaluate -> DEBU 3cee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:16.252 UTC [cauthdsl] func1 -> DEBU 3cef 0xc002763030 gate 1556789296252069200 evaluation starts" +"2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf0 0xc002763030 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf1 0xc002763030 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf2 0xc002763030 principal matched by identity 0" +"2019-05-02 09:28:16.252 UTC [msp.identity] Verify -> DEBU 3cf3 Verify: digest = 00000000 4e b1 f7 eb 36 90 ea 02 b0 f6 3d a2 ff ce af 8a |N...6.....=.....| +00000010 e9 d1 a3 b2 f1 db e9 af ad 88 46 4d cf 63 1d b6 |..........FM.c..|" +"2019-05-02 09:28:16.252 UTC [msp.identity] Verify -> DEBU 3cf4 Verify: sig = 00000000 30 45 02 21 00 86 da 2c 35 d0 48 7c 7c 74 8f 57 |0E.!...,5.H||t.W| +00000010 59 84 cf 2a 9d a0 43 4a 30 14 a3 19 39 b1 67 2f |Y..*..CJ0...9.g/| +00000020 ef ae b9 f4 21 02 20 3e 01 30 3e 77 71 0a c3 0f |....!. >.0>wq...| +00000030 3d 90 dc 50 c1 9e 6f 6b 3f bc ef 3d c8 43 57 ab |=..P..ok?..=.CW.| +00000040 aa b5 50 07 8c 16 c0 |..P....|" +"2019-05-02 09:28:16.252 UTC [cauthdsl] func2 -> DEBU 3cf5 0xc002763030 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:16.252 UTC [cauthdsl] func1 -> DEBU 3cf6 0xc002763030 gate 1556789296252069200 evaluation succeeds" +"2019-05-02 09:28:16.252 UTC [policies] Evaluate -> DEBU 3cf7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.252 UTC [policies] Evaluate -> DEBU 3cf8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:16.253 UTC [policies] Evaluate -> DEBU 3cf9 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:16.253 UTC [policies] Evaluate -> DEBU 3cfa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:16.253 UTC [msp.identity] Verify -> DEBU 3cfb Verify: digest = 00000000 5a 6a dc 83 e8 9f a0 29 9a 69 97 39 cd 6e 79 aa |Zj.....).i.9.ny.| +00000010 a8 04 86 e8 af ea 08 e4 4b 48 f1 b1 f8 a0 a2 ad |........KH......|" +"2019-05-02 09:28:16.253 UTC [msp.identity] Verify -> DEBU 3cfc Verify: sig = 00000000 30 44 02 20 79 1c 8b d6 66 94 c7 97 bc e9 02 f2 |0D. y...f.......| +00000010 57 35 2d fb 8b c1 b5 cd 77 fe 91 c1 1a 81 18 a6 |W5-.....w.......| +00000020 37 a1 f1 d3 02 20 5b 02 8d d1 a6 07 7d 5e ca 52 |7.... [.....}^.R| +00000030 ae 66 f3 d5 cd 64 95 61 d3 24 15 82 66 31 f1 ab |.f...d.a.$..f1..| +00000040 b0 a3 de d0 53 b0 |....S.|" +"2019-05-02 09:28:16.253 UTC [gossip.gossip] handleMessage -> DEBU 3cfd Exiting" +"2019-05-02 09:28:16.246 UTC [leveldbhelper] GetIterator -> DEBU 3cfe Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xf6}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +"2019-05-02 09:28:16.254 UTC [gossip.privdata] reconcile -> DEBU 3cff Reconciliation cycle finished successfully. no items to reconcile" +"2019-05-02 09:28:16.470 UTC [gossip.comm] func1 -> DEBU 3d00 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.471 UTC [gossip.gossip] handleMessage -> DEBU 3d01 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.471 UTC [msp] DeserializeIdentity -> DEBU 3d02 Obtaining identity" +"2019-05-02 09:28:16.471 UTC [msp] DeserializeIdentity -> DEBU 3d03 Obtaining identity" +"2019-05-02 09:28:16.471 UTC [gossip.gossip] handleMessage -> DEBU 3d04 Exiting" +"2019-05-02 09:28:16.544 UTC [gossip.comm] func1 -> DEBU 3d05 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.544 UTC [gossip.gossip] handleMessage -> DEBU 3d06 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.545 UTC [gossip.pull] HandleMessage -> DEBU 3d07 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.545 UTC [gossip.pull] SendDigest -> DEBU 3d08 Sending BLOCK_MSG digest: [6 7 8 1 2 3 4 5 9] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:16.546 UTC [gossip.gossip] handleMessage -> DEBU 3d09 Exiting" +"2019-05-02 09:28:16.716 UTC [gossip.comm] func1 -> DEBU 3d0a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.716 UTC [gossip.gossip] handleMessage -> DEBU 3d0b Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.717 UTC [msp] DeserializeIdentity -> DEBU 3d0c Obtaining identity" +"2019-05-02 09:28:16.717 UTC [msp] DeserializeIdentity -> DEBU 3d0d Obtaining identity" +"2019-05-02 09:28:16.717 UTC [msp] DeserializeIdentity -> DEBU 3d0e Obtaining identity" +"2019-05-02 09:28:16.717 UTC [gossip.gossip] handleMessage -> DEBU 3d0f Exiting" +"2019-05-02 09:28:16.951 UTC [gossip.comm] func1 -> DEBU 3d10 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.951 UTC [gossip.gossip] handleMessage -> DEBU 3d11 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-05-02 09:28:16.952 UTC [msp] DeserializeIdentity -> DEBU 3d12 Obtaining identity" +"2019-05-02 09:28:16.959 UTC [msp] DeserializeIdentity -> DEBU 3d13 Obtaining identity" +"2019-05-02 09:28:16.960 UTC [msp] DeserializeIdentity -> DEBU 3d14 Obtaining identity" +"2019-05-02 09:28:16.961 UTC [gossip.gossip] handleMessage -> DEBU 3d15 Exiting" +"2019-05-02 09:28:17.296 UTC [gossip.election] waitForInterrupt -> DEBU 3d16 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-05-02 09:28:17.296 UTC [gossip.election] IsLeader -> DEBU 3d17 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-05-02 09:28:17.296 UTC [msp.identity] Sign -> DEBU 3d18 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08BCA7ABE8FEF1B4CD15100D1801 " +"2019-05-02 09:28:17.296 UTC [msp.identity] Sign -> DEBU 3d19 Sign: digest: EA9514E5B5DE87377206684C8235829BFEC895424EB23EE05ABC0126D9AD2AC3 " +"2019-05-02 09:28:17.296 UTC [gossip.election] waitForInterrupt -> DEBU 3d1a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1b Obtaining identity" +"2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1c Obtaining identity" +"2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1d Obtaining identity" +"2019-05-02 09:28:17.297 UTC [msp] DeserializeIdentity -> DEBU 3d1e Obtaining identity" +"2019-05-02 09:28:17.298 UTC [gossip.comm] Send -> DEBU 3d1f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:17.298 UTC [msp] DeserializeIdentity -> DEBU 3d20 Obtaining identity" +"2019-05-02 09:28:17.298 UTC [msp] DeserializeIdentity -> DEBU 3d21 Obtaining identity" +"2019-05-02 09:28:17.298 UTC [gossip.comm] sendToEndpoint -> DEBU 3d22 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556789236320621500 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-05-02 09:28:17.298 UTC [gossip.comm] sendToEndpoint -> DEBU 3d23 Exiting" +"2019-05-02 09:28:17.594 UTC [gossip.comm] func1 -> DEBU 3d24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.594 UTC [gossip.gossip] handleMessage -> DEBU 3d25 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.594 UTC [gossip.gossip] handleMessage -> DEBU 3d26 Exiting" +"2019-05-02 09:28:17.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.600 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d28 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:17.601 UTC [msp] DeserializeIdentity -> DEBU 3d29 Obtaining identity" +"2019-05-02 09:28:17.603 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d2a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:17.605 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d2b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:17.606 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d2c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:17.606 UTC [policies] Evaluate -> DEBU 3d2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:17.606 UTC [policies] Evaluate -> DEBU 3d2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:17.606 UTC [policies] Evaluate -> DEBU 3d2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:17.607 UTC [cauthdsl] func1 -> DEBU 3d30 0xc004374b80 gate 1556789297607083900 evaluation starts" +"2019-05-02 09:28:17.607 UTC [cauthdsl] func2 -> DEBU 3d31 0xc004374b80 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:17.607 UTC [cauthdsl] func2 -> DEBU 3d32 0xc004374b80 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:17.607 UTC [cauthdsl] func2 -> DEBU 3d33 0xc004374b80 principal matched by identity 0" +"2019-05-02 09:28:17.613 UTC [gossip.comm] func1 -> DEBU 3d34 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.619 UTC [gossip.gossip] handleMessage -> DEBU 3d35 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.619 UTC [gossip.pull] HandleMessage -> DEBU 3d36 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.619 UTC [msp] DeserializeIdentity -> DEBU 3d37 Obtaining identity" +"2019-05-02 09:28:17.621 UTC [msp] DeserializeIdentity -> DEBU 3d38 Obtaining identity" +"2019-05-02 09:28:17.624 UTC [msp] DeserializeIdentity -> DEBU 3d39 Obtaining identity" +"2019-05-02 09:28:17.624 UTC [msp] DeserializeIdentity -> DEBU 3d3a Obtaining identity" +"2019-05-02 09:28:17.625 UTC [msp] DeserializeIdentity -> DEBU 3d3b Obtaining identity" +"2019-05-02 09:28:17.625 UTC [msp] DeserializeIdentity -> DEBU 3d3c Obtaining identity" +"2019-05-02 09:28:17.626 UTC [gossip.pull] SendDigest -> DEBU 3d3d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:17.627 UTC [gossip.gossip] handleMessage -> DEBU 3d3e Exiting" +"2019-05-02 09:28:17.613 UTC [msp.identity] Verify -> DEBU 3d3f Verify: digest = 00000000 63 a3 9c e0 f3 5a 8d c4 d0 1b 35 e5 70 45 98 5f |c....Z....5.pE._| +00000010 fc f0 da b3 86 fd a4 2c 9f 0e 3e a1 c4 e8 78 55 |.......,..>...xU|" +"2019-05-02 09:28:17.643 UTC [msp.identity] Sign -> DEBU 3d40 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102D " +"2019-05-02 09:28:17.650 UTC [msp.identity] Sign -> DEBU 3d41 Sign: digest: 8B923E02083CAF7B287C02E755358EE8E03BBC263E640CB3BA4223F63DD9973B " +"2019-05-02 09:28:17.641 UTC [msp.identity] Verify -> DEBU 3d42 Verify: sig = 00000000 30 44 02 20 68 28 7c aa bf ee 30 b2 ca db bf 62 |0D. h(|...0....b| +00000010 6a a4 68 3b 45 af ee 39 df 2b d9 29 b1 28 c0 cd |j.h;E..9.+.).(..| +00000020 ba 84 f7 45 02 20 43 d2 36 59 12 b0 15 ef d6 4a |...E. C.6Y.....J| +00000030 9b 17 3e bc 5a 7c 04 27 2b 10 74 fb 75 3e 0b 64 |..>.Z|.'+.t.u>.d| +00000040 74 33 4c ce 78 21 |t3L.x!|" +"2019-05-02 09:28:17.670 UTC [cauthdsl] func2 -> DEBU 3d43 0xc004374b80 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:17.670 UTC [cauthdsl] func1 -> DEBU 3d44 0xc004374b80 gate 1556789297607083900 evaluation succeeds" +"2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d45 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d47 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:17.670 UTC [policies] Evaluate -> DEBU 3d48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:17.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d49 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:17.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:17.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 " +"2019-05-02 09:28:17.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 " +"2019-05-02 09:28:17.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:17.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d4e Exiting" +"2019-05-02 09:28:17.671 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d4f Exiting" +"2019-05-02 09:28:17.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d50 Exiting" +"2019-05-02 09:28:17.671 UTC [gossip.discovery] sendMemResponse -> DEBU 3d51 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-05-02 09:28:17.671 UTC [msp] DeserializeIdentity -> DEBU 3d52 Obtaining identity" +"2019-05-02 09:28:17.671 UTC [msp] DeserializeIdentity -> DEBU 3d53 Obtaining identity" +"2019-05-02 09:28:17.671 UTC [msp] DeserializeIdentity -> DEBU 3d54 Obtaining identity" +"2019-05-02 09:28:17.671 UTC [gossip.comm] Send -> DEBU 3d55 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:17.671 UTC [gossip.discovery] sendMemResponse -> DEBU 3d56 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:17.671 UTC [gossip.comm] sendToEndpoint -> DEBU 3d57 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.671 UTC [gossip.comm] sendToEndpoint -> DEBU 3d58 Exiting" +"2019-05-02 09:28:17.687 UTC [msp.identity] Sign -> DEBU 3d59 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:28:17.688 UTC [msp.identity] Sign -> DEBU 3d5a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:28:17.688 UTC [gossip.comm] Send -> DEBU 3d5b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:17.688 UTC [msp] DeserializeIdentity -> DEBU 3d5c Obtaining identity" +"2019-05-02 09:28:17.688 UTC [gossip.comm] Send -> DEBU 3d5d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:17.688 UTC [msp] DeserializeIdentity -> DEBU 3d5e Obtaining identity" +"2019-05-02 09:28:17.688 UTC [gossip.comm] Send -> DEBU 3d5f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:17.688 UTC [gossip.comm] sendToEndpoint -> DEBU 3d60 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.688 UTC [gossip.comm] sendToEndpoint -> DEBU 3d61 Exiting" +"2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d62 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d63 Exiting" +"2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d64 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.689 UTC [gossip.comm] sendToEndpoint -> DEBU 3d65 Exiting" +"2019-05-02 09:28:17.689 UTC [gossip.comm] func1 -> DEBU 3d66 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.689 UTC [gossip.comm] func1 -> DEBU 3d67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.689 UTC [gossip.gossip] handleMessage -> DEBU 3d68 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.689 UTC [gossip.pull] HandleMessage -> DEBU 3d69 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6a Obtaining identity" +"2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6b Obtaining identity" +"2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6c Obtaining identity" +"2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6d Obtaining identity" +"2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6e Obtaining identity" +"2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d6f Obtaining identity" +"2019-05-02 09:28:17.690 UTC [gossip.pull] SendDigest -> DEBU 3d70 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:17.690 UTC [gossip.gossip] handleMessage -> DEBU 3d71 Exiting" +"2019-05-02 09:28:17.690 UTC [gossip.gossip] handleMessage -> DEBU 3d72 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.690 UTC [gossip.gossip] handleMessage -> DEBU 3d73 Exiting" +"2019-05-02 09:28:17.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d74 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.690 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d75 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:17.690 UTC [msp] DeserializeIdentity -> DEBU 3d76 Obtaining identity" +"2019-05-02 09:28:17.690 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d77 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:17.690 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d78 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:17.690 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d79 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d7a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d7b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:17.691 UTC [cauthdsl] func1 -> DEBU 3d7d 0xc003cfc600 gate 1556789297691143400 evaluation starts" +"2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d7e 0xc003cfc600 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d7f 0xc003cfc600 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d80 0xc003cfc600 principal matched by identity 0" +"2019-05-02 09:28:17.691 UTC [msp.identity] Verify -> DEBU 3d81 Verify: digest = 00000000 91 71 e7 69 4d 05 60 f4 ad 9a 04 6f 8c aa 09 21 |.q.iM.`....o...!| +00000010 95 92 a2 0a 63 59 a0 96 d8 48 4b 69 a3 0d cd fc |....cY...HKi....|" +"2019-05-02 09:28:17.691 UTC [msp.identity] Verify -> DEBU 3d82 Verify: sig = 00000000 30 45 02 21 00 b6 67 d5 d9 f0 33 11 7f 78 ef 7b |0E.!..g...3..x.{| +00000010 1a d2 d3 bb 5e d3 39 01 ce 6b 07 55 c4 cc 2d ad |....^.9..k.U..-.| +00000020 d0 b7 74 29 18 02 20 53 17 12 11 89 8b 0c 5b 3c |..t).. S......[<| +00000030 c9 97 e8 32 45 6c af 1a be fb bb d1 2c 47 3f 78 |...2El......,G?x| +00000040 05 3c ed e4 b2 b5 8a |.<.....|" +"2019-05-02 09:28:17.691 UTC [cauthdsl] func2 -> DEBU 3d83 0xc003cfc600 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:17.691 UTC [cauthdsl] func1 -> DEBU 3d84 0xc003cfc600 gate 1556789297691143400 evaluation succeeds" +"2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d87 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:17.691 UTC [policies] Evaluate -> DEBU 3d88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:17.691 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d89 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:17.696 UTC [gossip.comm] func1 -> DEBU 3d8a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.696 UTC [gossip.gossip] handleMessage -> DEBU 3d8b Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.701 UTC [gossip.comm] func1 -> DEBU 3d8c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d8d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-05-02 09:28:17.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d8e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 " +"2019-05-02 09:28:17.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d8f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 " +"2019-05-02 09:28:17.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d90 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:17.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d91 Exiting" +"2019-05-02 09:28:17.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d92 Exiting" +"2019-05-02 09:28:17.704 UTC [gossip.discovery] sendMemResponse -> DEBU 3d93 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-05-02 09:28:17.704 UTC [msp] DeserializeIdentity -> DEBU 3d94 Obtaining identity" +"2019-05-02 09:28:17.705 UTC [msp] DeserializeIdentity -> DEBU 3d95 Obtaining identity" +"2019-05-02 09:28:17.705 UTC [msp] DeserializeIdentity -> DEBU 3d96 Obtaining identity" +"2019-05-02 09:28:17.705 UTC [gossip.comm] Send -> DEBU 3d97 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:17.705 UTC [gossip.discovery] sendMemResponse -> DEBU 3d98 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-05-02 09:28:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3d99 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.706 UTC [gossip.comm] sendToEndpoint -> DEBU 3d9a Exiting" +"2019-05-02 09:28:17.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d9b Exiting" +"2019-05-02 09:28:17.708 UTC [gossip.gossip] handleMessage -> DEBU 3d9c Exiting" +"2019-05-02 09:28:17.708 UTC [gossip.gossip] handleMessage -> DEBU 3d9d Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d9e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.708 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d9f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:17.709 UTC [msp] DeserializeIdentity -> DEBU 3da0 Obtaining identity" +"2019-05-02 09:28:17.709 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3da1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:17.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3da2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:17.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3da3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:17.710 UTC [policies] Evaluate -> DEBU 3da4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:17.710 UTC [policies] Evaluate -> DEBU 3da5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:17.711 UTC [policies] Evaluate -> DEBU 3da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:17.711 UTC [cauthdsl] func1 -> DEBU 3da7 0xc0020e8850 gate 1556789297711225300 evaluation starts" +"2019-05-02 09:28:17.711 UTC [cauthdsl] func2 -> DEBU 3da8 0xc0020e8850 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:17.711 UTC [cauthdsl] func2 -> DEBU 3da9 0xc0020e8850 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:17.712 UTC [cauthdsl] func2 -> DEBU 3daa 0xc0020e8850 principal matched by identity 0" +"2019-05-02 09:28:17.712 UTC [msp.identity] Verify -> DEBU 3dab Verify: digest = 00000000 63 a3 9c e0 f3 5a 8d c4 d0 1b 35 e5 70 45 98 5f |c....Z....5.pE._| +00000010 fc f0 da b3 86 fd a4 2c 9f 0e 3e a1 c4 e8 78 55 |.......,..>...xU|" +"2019-05-02 09:28:17.713 UTC [msp.identity] Verify -> DEBU 3dac Verify: sig = 00000000 30 44 02 20 68 28 7c aa bf ee 30 b2 ca db bf 62 |0D. h(|...0....b| +00000010 6a a4 68 3b 45 af ee 39 df 2b d9 29 b1 28 c0 cd |j.h;E..9.+.).(..| +00000020 ba 84 f7 45 02 20 43 d2 36 59 12 b0 15 ef d6 4a |...E. C.6Y.....J| +00000030 9b 17 3e bc 5a 7c 04 27 2b 10 74 fb 75 3e 0b 64 |..>.Z|.'+.t.u>.d| +00000040 74 33 4c ce 78 21 |t3L.x!|" +"2019-05-02 09:28:17.713 UTC [cauthdsl] func2 -> DEBU 3dad 0xc0020e8850 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:17.713 UTC [cauthdsl] func1 -> DEBU 3dae 0xc0020e8850 gate 1556789297711225300 evaluation succeeds" +"2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3daf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3db0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3db1 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:17.714 UTC [policies] Evaluate -> DEBU 3db2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:17.714 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:17.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db4 Exiting" +"2019-05-02 09:28:17.715 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3db5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:17.715 UTC [msp.identity] Verify -> DEBU 3db6 Verify: digest = 00000000 8b 92 3e 02 08 3c af 7b 28 7c 02 e7 55 35 8e e8 |..>..<.{(|..U5..| +00000010 e0 3b bc 26 3e 64 0c b3 ba 42 23 f6 3d d9 97 3b |.;.&>d...B#.=..;|" +"2019-05-02 09:28:17.715 UTC [msp.identity] Verify -> DEBU 3db7 Verify: sig = 00000000 30 45 02 21 00 91 5c bb b3 49 b0 11 04 7e 2f 39 |0E.!..\..I...~/9| +00000010 bf 32 9f 8b 0e e9 d1 25 9d 05 e6 8e 53 51 5a fb |.2.....%....SQZ.| +00000020 ef ce 3f c6 fa 02 20 1b a5 38 d9 02 7c bc fd 87 |..?... ..8..|...| +00000030 56 42 05 6b 4b 82 71 12 29 9a 4e 29 4b aa 90 02 |VB.kK.q.).N)K...| +00000040 29 c1 24 27 fe df fc |).$'...|" +"2019-05-02 09:28:17.716 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:17.716 UTC [gossip.discovery] isSentByMe -> DEBU 3db9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:17.716 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dba Exiting" +"2019-05-02 09:28:17.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dbb Exiting" +"2019-05-02 09:28:17.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dbc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.716 UTC [gossip.gossip] handleMessage -> DEBU 3dbd Exiting" +"2019-05-02 09:28:17.717 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dbe Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:17.717 UTC [msp.identity] Verify -> DEBU 3dbf Verify: digest = 00000000 8b 92 3e 02 08 3c af 7b 28 7c 02 e7 55 35 8e e8 |..>..<.{(|..U5..| +00000010 e0 3b bc 26 3e 64 0c b3 ba 42 23 f6 3d d9 97 3b |.;.&>d...B#.=..;|" +"2019-05-02 09:28:17.717 UTC [msp.identity] Verify -> DEBU 3dc0 Verify: sig = 00000000 30 45 02 21 00 91 5c bb b3 49 b0 11 04 7e 2f 39 |0E.!..\..I...~/9| +00000010 bf 32 9f 8b 0e e9 d1 25 9d 05 e6 8e 53 51 5a fb |.2.....%....SQZ.| +00000020 ef ce 3f c6 fa 02 20 1b a5 38 d9 02 7c bc fd 87 |..?... ..8..|...| +00000030 56 42 05 6b 4b 82 71 12 29 9a 4e 29 4b aa 90 02 |VB.kK.q.).N)K...| +00000040 29 c1 24 27 fe df fc |).$'...|" +"2019-05-02 09:28:17.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:17.718 UTC [gossip.discovery] isSentByMe -> DEBU 3dc2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:17.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc3 Exiting" +"2019-05-02 09:28:17.718 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dc4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:17.718 UTC [msp] DeserializeIdentity -> DEBU 3dc5 Obtaining identity" +"2019-05-02 09:28:17.719 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dc6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:17.719 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dc7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:17.719 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dc8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:17.719 UTC [policies] Evaluate -> DEBU 3dc9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:17.719 UTC [policies] Evaluate -> DEBU 3dca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:17.719 UTC [policies] Evaluate -> DEBU 3dcb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:17.719 UTC [cauthdsl] func1 -> DEBU 3dcc 0xc00304dc90 gate 1556789297719537500 evaluation starts" +"2019-05-02 09:28:17.719 UTC [cauthdsl] func2 -> DEBU 3dcd 0xc00304dc90 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:17.720 UTC [cauthdsl] func2 -> DEBU 3dce 0xc00304dc90 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:17.720 UTC [cauthdsl] func2 -> DEBU 3dcf 0xc00304dc90 principal matched by identity 0" +"2019-05-02 09:28:17.720 UTC [msp.identity] Verify -> DEBU 3dd0 Verify: digest = 00000000 91 71 e7 69 4d 05 60 f4 ad 9a 04 6f 8c aa 09 21 |.q.iM.`....o...!| +00000010 95 92 a2 0a 63 59 a0 96 d8 48 4b 69 a3 0d cd fc |....cY...HKi....|" +"2019-05-02 09:28:17.720 UTC [msp.identity] Verify -> DEBU 3dd1 Verify: sig = 00000000 30 45 02 21 00 b6 67 d5 d9 f0 33 11 7f 78 ef 7b |0E.!..g...3..x.{| +00000010 1a d2 d3 bb 5e d3 39 01 ce 6b 07 55 c4 cc 2d ad |....^.9..k.U..-.| +00000020 d0 b7 74 29 18 02 20 53 17 12 11 89 8b 0c 5b 3c |..t).. S......[<| +00000030 c9 97 e8 32 45 6c af 1a be fb bb d1 2c 47 3f 78 |...2El......,G?x| +00000040 05 3c ed e4 b2 b5 8a |.<.....|" +"2019-05-02 09:28:17.720 UTC [cauthdsl] func2 -> DEBU 3dd2 0xc00304dc90 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:17.721 UTC [cauthdsl] func1 -> DEBU 3dd3 0xc00304dc90 gate 1556789297719537500 evaluation succeeds" +"2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd6 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:17.721 UTC [policies] Evaluate -> DEBU 3dd7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:17.721 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dd8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:17.721 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dd9 Exiting" +"2019-05-02 09:28:17.721 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dda Exiting" +"2019-05-02 09:28:17.732 UTC [gossip.comm] func1 -> DEBU 3ddb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.733 UTC [gossip.comm] func1 -> DEBU 3ddc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.733 UTC [gossip.gossip] handleMessage -> DEBU 3ddd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.733 UTC [gossip.gossip] handleMessage -> DEBU 3dde Exiting" +"2019-05-02 09:28:17.734 UTC [gossip.gossip] handleMessage -> DEBU 3ddf Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.734 UTC [gossip.pull] HandleMessage -> DEBU 3de0 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.734 UTC [gossip.pull] SendDigest -> DEBU 3de1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:17.735 UTC [gossip.gossip] handleMessage -> DEBU 3de2 Exiting" +"2019-05-02 09:28:17.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3de3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.735 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3de4 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:17.736 UTC [msp.identity] Verify -> DEBU 3de5 Verify: digest = 00000000 8e 00 7c a6 60 fd 6e e1 31 88 5b d1 e3 ca fb 8c |..|.`.n.1.[.....| +00000010 26 3e d1 3c 81 fb 8f fa c6 75 e9 ad c1 74 13 cd |&>.<.....u...t..|" +"2019-05-02 09:28:17.736 UTC [msp.identity] Verify -> DEBU 3de6 Verify: sig = 00000000 30 44 02 20 2d ae 71 0f 53 f8 6a bc f4 fa 0e 6a |0D. -.q.S.j....j| +00000010 23 c8 87 57 43 5d 0d cb ce e7 55 14 1b 26 58 1b |#..WC]....U..&X.| +00000020 78 8a da 03 02 20 02 59 9e d5 19 cf 66 a4 17 a2 |x.... .Y....f...| +00000030 ef 65 90 bf 38 a8 e7 53 b4 a8 be 5a 1f 58 39 38 |.e..8..S...Z.X98| +00000040 9c fc 08 f7 62 39 |....b9|" +"2019-05-02 09:28:17.737 UTC [msp.identity] Verify -> DEBU 3de7 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:28:17.737 UTC [msp.identity] Verify -> DEBU 3de8 Verify: sig = 00000000 30 44 02 20 75 11 61 e0 d6 ff 84 46 32 08 f6 13 |0D. u.a....F2...| +00000010 66 02 da 65 df 5e 2c 63 0a 6a 2c 52 45 b8 61 8e |f..e.^,c.j,RE.a.| +00000020 92 cd 62 7d 02 20 6f 8b af 48 1b 28 26 11 ca 2d |..b}. o..H.(&..-| +00000030 34 b1 ab 64 e6 12 1b 5b ea 92 d8 79 14 07 ea 64 |4..d...[...y...d| +00000040 cb b2 24 50 47 2f |..$PG/|" +"2019-05-02 09:28:17.738 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:17.738 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dea Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-05-02 09:28:17.738 UTC [gossip.discovery] learnExistingMembers -> DEBU 3deb updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 " +"2019-05-02 09:28:17.738 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dec Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 " +"2019-05-02 09:28:17.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ded Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:17.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dee Exiting" +"2019-05-02 09:28:17.739 UTC [gossip.discovery] handleAliveMessage -> DEBU 3def Exiting" +"2019-05-02 09:28:17.740 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3df0 Exiting" +"2019-05-02 09:28:17.740 UTC [gossip.discovery] sendMemResponse -> DEBU 3df1 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-05-02 09:28:17.740 UTC [msp] DeserializeIdentity -> DEBU 3df2 Obtaining identity" +"2019-05-02 09:28:17.741 UTC [msp] DeserializeIdentity -> DEBU 3df3 Obtaining identity" +"2019-05-02 09:28:17.741 UTC [gossip.comm] Send -> DEBU 3df4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:17.741 UTC [gossip.discovery] sendMemResponse -> DEBU 3df5 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-05-02 09:28:17.742 UTC [gossip.comm] sendToEndpoint -> DEBU 3df6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.742 UTC [gossip.comm] sendToEndpoint -> DEBU 3df7 Exiting" +"2019-05-02 09:28:17.771 UTC [gossip.comm] func1 -> DEBU 3df8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.772 UTC [gossip.gossip] handleMessage -> DEBU 3df9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.772 UTC [gossip.gossip] handleMessage -> DEBU 3dfa Exiting" +"2019-05-02 09:28:17.773 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dfb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.773 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dfc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:17.774 UTC [msp.identity] Verify -> DEBU 3dfd Verify: digest = 00000000 8b 92 3e 02 08 3c af 7b 28 7c 02 e7 55 35 8e e8 |..>..<.{(|..U5..| +00000010 e0 3b bc 26 3e 64 0c b3 ba 42 23 f6 3d d9 97 3b |.;.&>d...B#.=..;|" +"2019-05-02 09:28:17.774 UTC [msp.identity] Verify -> DEBU 3dfe Verify: sig = 00000000 30 45 02 21 00 91 5c bb b3 49 b0 11 04 7e 2f 39 |0E.!..\..I...~/9| +00000010 bf 32 9f 8b 0e e9 d1 25 9d 05 e6 8e 53 51 5a fb |.2.....%....SQZ.| +00000020 ef ce 3f c6 fa 02 20 1b a5 38 d9 02 7c bc fd 87 |..?... ..8..|...| +00000030 56 42 05 6b 4b 82 71 12 29 9a 4e 29 4b aa 90 02 |VB.kK.q.).N)K...| +00000040 29 c1 24 27 fe df fc |).$'...|" +"2019-05-02 09:28:17.775 UTC [msp.identity] Verify -> DEBU 3dff Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-05-02 01:31:50.167 UTC [msp.identity] Verify -> DEBU 41a1 Verify: sig = 00000000 30 45 02 21 00 ae 91 e7 bf ff a8 1e 8c 93 fd 5e |0E.!...........^| -00000010 c8 89 5f ba 1b 14 17 fc 5b 46 7d df 5c b2 e9 42 |.._.....[F}.\..B| -00000020 19 cb d3 92 dd 02 20 10 c4 a5 e4 3d 5e 7b f5 92 |...... ....=^{..| -00000030 6a 02 dd bd 6a fd 98 ae 76 c1 a0 37 a8 0a be 62 |j...j...v..7...b| -00000040 69 e7 5a fb 74 88 80 |i.Z.t..|" -"2019-05-02 01:31:50.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 41a2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:50.167 UTC [gossip.discovery] isSentByMe -> DEBU 41a3 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-05-02 01:31:50.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 41a4 Exiting" -"2019-05-02 01:31:50.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41a5 Exiting" -"2019-05-02 01:31:50.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.172 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41a7 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" -"2019-05-02 01:31:50.172 UTC [msp] DeserializeIdentity -> DEBU 41a8 Obtaining identity" -"2019-05-02 01:31:50.173 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:50.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41aa Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:50.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ab Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:50.173 UTC [cauthdsl] func1 -> DEBU 41af 0xc002f4d1e0 gate 1556760710173422500 evaluation starts" -"2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41b0 0xc002f4d1e0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41b1 0xc002f4d1e0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41b2 0xc002f4d1e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41b3 0xc002f4d1e0 principal evaluation fails" -"2019-05-02 01:31:50.173 UTC [cauthdsl] func1 -> DEBU 41b4 0xc002f4d1e0 gate 1556760710173422500 evaluation fails" -"2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41b5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:50.173 UTC [policies] Evaluate -> DEBU 41b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:50.173 UTC [cauthdsl] func1 -> DEBU 41b8 0xc002f4da60 gate 1556760710173846700 evaluation starts" -"2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41b9 0xc002f4da60 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:50.173 UTC [cauthdsl] func2 -> DEBU 41ba 0xc002f4da60 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:50.174 UTC [cauthdsl] func2 -> DEBU 41bb 0xc002f4da60 principal matched by identity 0" -"2019-05-02 01:31:50.174 UTC [msp.identity] Verify -> DEBU 41bc Verify: digest = 00000000 de 09 8f 01 3a cd ca 09 fb 79 7e 27 91 89 a1 bd |....:....y~'....| -00000010 a6 35 9c de e8 1e f6 4c 74 66 22 e6 37 45 0d a3 |.5.....Ltf".7E..|" -"2019-05-02 01:31:50.174 UTC [msp.identity] Verify -> DEBU 41bd Verify: sig = 00000000 30 44 02 20 3b fd e7 76 22 57 40 76 05 0f 95 0f |0D. ;..v"W@v....| -00000010 6e d8 80 8e 74 a2 eb 95 7e 02 75 de dc 18 73 d6 |n...t...~.u...s.| -00000020 54 07 9f bd 02 20 69 4f 8d 6f 05 09 aa 42 62 69 |T.... iO.o...Bbi| -00000030 ce cf 6f 7f 77 07 aa 85 64 fe e7 49 4e 52 cc ad |..o.w...d..INR..| -00000040 f5 cd d9 ba b4 0f |......|" -"2019-05-02 01:31:50.174 UTC [cauthdsl] func2 -> DEBU 41be 0xc002f4da60 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:50.174 UTC [gossip.gossip] handleMessage -> DEBU 41bf Exiting" -"2019-05-02 01:31:50.174 UTC [gossip.comm] func1 -> DEBU 41c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.174 UTC [gossip.gossip] handleMessage -> DEBU 41c1 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.174 UTC [cauthdsl] func1 -> DEBU 41c2 0xc002f4da60 gate 1556760710173846700 evaluation succeeds" -"2019-05-02 01:31:50.175 UTC [policies] Evaluate -> DEBU 41c3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:50.175 UTC [policies] Evaluate -> DEBU 41c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:50.175 UTC [policies] Evaluate -> DEBU 41c5 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:50.175 UTC [policies] Evaluate -> DEBU 41c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:50.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 41c7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556760633527025900 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:50.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 41c8 Exiting" -"2019-05-02 01:31:50.176 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41c9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:50.182 UTC [msp.identity] Verify -> DEBU 41ca Verify: digest = 00000000 dd 14 db d5 97 6c b8 35 a3 17 6c 7c a3 c4 f1 9c |.....l.5..l|....| -00000010 b8 29 6a 07 51 55 c2 ce e2 ee 70 fc 62 0f f0 db |.)j.QU....p.b...|" -"2019-05-02 01:31:50.182 UTC [msp.identity] Verify -> DEBU 41cb Verify: sig = 00000000 30 45 02 21 00 ba 03 89 e3 75 f3 ad 88 45 cb a3 |0E.!.....u...E..| -00000010 f8 a4 68 e6 83 8a 05 44 41 32 d0 ab 30 07 26 a7 |..h....DA2..0.&.| -00000020 19 bc a3 c4 50 02 20 47 be 23 ab 16 1d 40 23 39 |....P. G.#...@#9| -00000030 6d 36 f6 9e db a4 f3 6b 80 58 72 b5 d8 af 32 12 |m6.....k.Xr...2.| -00000040 d1 28 ab 2f f2 2a 1b |.(./.*.|" -"2019-05-02 01:31:50.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 41cc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:50.183 UTC [gossip.discovery] isSentByMe -> DEBU 41cd Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:50.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 41ce Exiting" -"2019-05-02 01:31:50.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41cf Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:50.183 UTC [msp.identity] Verify -> DEBU 41d0 Verify: digest = 00000000 1e 39 81 c1 ec ca e7 23 8e 01 5e 62 9f 7c d0 4e |.9.....#..^b.|.N| -00000010 e3 17 0a 6f a7 a7 d9 7e 59 c8 f5 dd 63 85 3d 1e |...o...~Y...c.=.|" -"2019-05-02 01:31:50.183 UTC [msp.identity] Verify -> DEBU 41d1 Verify: sig = 00000000 30 44 02 20 53 2d af 96 8b 4e 76 73 31 bd eb 4e |0D. S-...Nvs1..N| -00000010 83 6a 14 c8 c7 84 3d c5 56 1e 1f 26 4a c9 4b 5a |.j....=.V..&J.KZ| -00000020 48 0f 5d 13 02 20 08 cb a3 7f 67 34 e8 2f f1 c2 |H.].. ....g4./..| -00000030 4b b4 04 df d9 62 75 c8 d1 5b d2 c9 48 05 4a 2a |K....bu..[..H.J*| -00000040 53 2b b7 f6 7b 98 |S+..{.|" -"2019-05-02 01:31:50.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 41d2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:50.184 UTC [gossip.discovery] handleAliveMessage -> DEBU 41d3 Exiting" -"2019-05-02 01:31:50.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41d4 Exiting" -"2019-05-02 01:31:50.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41d5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-05-02 01:31:50.184 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41d6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" -"2019-05-02 01:31:50.184 UTC [gossip.gossip] handleMessage -> DEBU 41d7 Exiting" -"2019-05-02 01:31:50.185 UTC [msp.identity] Verify -> DEBU 41d8 Verify: digest = 00000000 dd 14 db d5 97 6c b8 35 a3 17 6c 7c a3 c4 f1 9c |.....l.5..l|....| -00000010 b8 29 6a 07 51 55 c2 ce e2 ee 70 fc 62 0f f0 db |.)j.QU....p.b...|" -"2019-05-02 01:31:50.185 UTC [msp.identity] Verify -> DEBU 41d9 Verify: sig = 00000000 30 45 02 21 00 ba 03 89 e3 75 f3 ad 88 45 cb a3 |0E.!.....u...E..| -00000010 f8 a4 68 e6 83 8a 05 44 41 32 d0 ab 30 07 26 a7 |..h....DA2..0.&.| -00000020 19 bc a3 c4 50 02 20 47 be 23 ab 16 1d 40 23 39 |....P. G.#...@#9| -00000030 6d 36 f6 9e db a4 f3 6b 80 58 72 b5 d8 af 32 12 |m6.....k.Xr...2.| -00000040 d1 28 ab 2f f2 2a 1b |.(./.*.|" -"2019-05-02 01:31:50.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 41da Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:50.185 UTC [gossip.discovery] isSentByMe -> DEBU 41db Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556760633613118000 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" -"2019-05-02 01:31:50.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 41dc Exiting" -"2019-05-02 01:31:50.186 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41dd Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" -"2019-05-02 01:31:50.186 UTC [msp.identity] Verify -> DEBU 41de Verify: digest = 00000000 1e 39 81 c1 ec ca e7 23 8e 01 5e 62 9f 7c d0 4e |.9.....#..^b.|.N| -00000010 e3 17 0a 6f a7 a7 d9 7e 59 c8 f5 dd 63 85 3d 1e |...o...~Y...c.=.|" -"2019-05-02 01:31:50.186 UTC [msp.identity] Verify -> DEBU 41df Verify: sig = 00000000 30 44 02 20 53 2d af 96 8b 4e 76 73 31 bd eb 4e |0D. S-...Nvs1..N| -00000010 83 6a 14 c8 c7 84 3d c5 56 1e 1f 26 4a c9 4b 5a |.j....=.V..&J.KZ| -00000020 48 0f 5d 13 02 20 08 cb a3 7f 67 34 e8 2f f1 c2 |H.].. ....g4./..| -00000030 4b b4 04 df d9 62 75 c8 d1 5b d2 c9 48 05 4a 2a |K....bu..[..H.J*| -00000040 53 2b b7 f6 7b 98 |S+..{.|" -"2019-05-02 01:31:50.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 41e0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556760633448248700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:50.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 41e1 Exiting" -"2019-05-02 01:31:50.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41e2 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" -"2019-05-02 01:31:50.187 UTC [msp] DeserializeIdentity -> DEBU 41e3 Obtaining identity" -"2019-05-02 01:31:50.188 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41e4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:50.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41e5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:50.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41e6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:50.190 UTC [policies] Evaluate -> DEBU 41e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:50.190 UTC [policies] Evaluate -> DEBU 41e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:50.191 UTC [policies] Evaluate -> DEBU 41e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:50.191 UTC [cauthdsl] func1 -> DEBU 41ea 0xc0030de470 gate 1556760710191303400 evaluation starts" -"2019-05-02 01:31:50.191 UTC [cauthdsl] func2 -> DEBU 41eb 0xc0030de470 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:50.191 UTC [cauthdsl] func2 -> DEBU 41ec 0xc0030de470 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:50.191 UTC [cauthdsl] func2 -> DEBU 41ed 0xc0030de470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:50.191 UTC [cauthdsl] func2 -> DEBU 41ee 0xc0030de470 principal evaluation fails" -"2019-05-02 01:31:50.191 UTC [cauthdsl] func1 -> DEBU 41ef 0xc0030de470 gate 1556760710191303400 evaluation fails" -"2019-05-02 01:31:50.192 UTC [policies] Evaluate -> DEBU 41f0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:50.192 UTC [policies] Evaluate -> DEBU 41f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:50.192 UTC [policies] Evaluate -> DEBU 41f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:50.192 UTC [cauthdsl] func1 -> DEBU 41f3 0xc0030decb0 gate 1556760710192702400 evaluation starts" -"2019-05-02 01:31:50.193 UTC [cauthdsl] func2 -> DEBU 41f4 0xc0030decb0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:50.193 UTC [cauthdsl] func2 -> DEBU 41f5 0xc0030decb0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:50.193 UTC [cauthdsl] func2 -> DEBU 41f6 0xc0030decb0 principal matched by identity 0" -"2019-05-02 01:31:50.194 UTC [msp.identity] Verify -> DEBU 41f7 Verify: digest = 00000000 cc 7d 1c b7 83 49 b3 1e 12 82 b5 98 1c 78 a0 44 |.}...I.......x.D| -00000010 49 c8 a6 29 38 12 d1 0b b9 db 8a f8 41 5d 88 1b |I..)8.......A]..|" -"2019-05-02 01:31:50.194 UTC [msp.identity] Verify -> DEBU 41f8 Verify: sig = 00000000 30 44 02 20 01 00 5c 8b 0b 5d e6 4d 9a 64 c6 59 |0D. ..\..].M.d.Y| -00000010 fe 6f 95 b8 08 18 e8 f2 0a dc 9e 67 48 b3 14 d2 |.o.........gH...| -00000020 4f 17 35 a9 02 20 38 bd e4 f0 b4 c8 c7 7c 67 a6 |O.5.. 8......|g.| -00000030 0b 4b 77 07 0e 99 97 9c cf a7 e5 eb 73 f9 7a ce |.Kw.........s.z.| -00000040 a7 ca aa 01 8b d5 |......|" -"2019-05-02 01:31:50.194 UTC [cauthdsl] func2 -> DEBU 41f9 0xc0030decb0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:50.194 UTC [cauthdsl] func1 -> DEBU 41fa 0xc0030decb0 gate 1556760710192702400 evaluation succeeds" -"2019-05-02 01:31:50.194 UTC [policies] Evaluate -> DEBU 41fb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:50.194 UTC [policies] Evaluate -> DEBU 41fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:50.194 UTC [policies] Evaluate -> DEBU 41fd Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:50.194 UTC [policies] Evaluate -> DEBU 41fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:50.194 UTC [gossip.discovery] handleAliveMessage -> DEBU 41ff Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556760633753242000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" -"2019-05-02 01:31:50.194 UTC [gossip.discovery] handleAliveMessage -> DEBU 4200 Exiting" -"2019-05-02 01:31:50.196 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4201 Exiting" -"2019-05-02 01:31:51.512 UTC [endorser] ProcessProposal -> DEBU 4202 Entering: request from 192.168.240.9:41476" -"2019-05-02 01:31:51.512 UTC [protoutils] ValidateProposalMessage -> DEBU 4203 ValidateProposalMessage starts for signed proposal 0xc000221a40" -"2019-05-02 01:31:51.513 UTC [protoutils] validateChannelHeader -> DEBU 4204 validateChannelHeader info: header type 3" -"2019-05-02 01:31:51.513 UTC [protoutils] checkSignatureFromCreator -> DEBU 4205 begin" -"2019-05-02 01:31:51.513 UTC [protoutils] checkSignatureFromCreator -> DEBU 4206 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:51.514 UTC [protoutils] checkSignatureFromCreator -> DEBU 4207 creator is valid" -"2019-05-02 01:31:51.515 UTC [msp.identity] Verify -> DEBU 4208 Verify: digest = 00000000 ff b0 f3 3d 54 db f5 a9 d3 09 b2 d0 c1 3a 3d 10 |...=T........:=.| -00000010 1f df f6 e9 1a f1 d4 1a dd 43 b9 f0 a3 3b 03 ed |.........C...;..|" -"2019-05-02 01:31:51.515 UTC [msp.identity] Verify -> DEBU 4209 Verify: sig = 00000000 30 45 02 21 00 cc 96 d9 36 e5 ec 0d bc 9b b0 6c |0E.!....6......l| -00000010 8a 01 d6 73 2f 1a d1 3b 8d ca 16 b0 c5 a2 04 f1 |...s/..;........| -00000020 37 5e fc c9 40 02 20 4b b8 c6 73 d9 5a 17 f6 28 |7^..@. K..s.Z..(| -00000030 ab 1c fc 66 1c a9 8c 63 a3 0f 6e 09 b2 0d 57 d7 |...f...c..n...W.| -00000040 04 4e f5 99 b4 0c 13 |.N.....|" -"2019-05-02 01:31:51.516 UTC [protoutils] checkSignatureFromCreator -> DEBU 420a exits successfully" -"2019-05-02 01:31:51.516 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 420b validateChaincodeProposalMessage starts for proposal 0xc00250f730, header 0xc000221ef0" -"2019-05-02 01:31:51.516 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 420c validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-05-02 01:31:51.517 UTC [endorser] preProcess -> DEBU 420d [][af15c022] processing txid: af15c022d4a12b6b8096b31879eaeb693027c4c8f920c7a96305b85df4ae3f8f" -"2019-05-02 01:31:51.517 UTC [endorser] SimulateProposal -> DEBU 420e [][af15c022] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:51.518 UTC [endorser] callChaincode -> INFO 420f [][af15c022] Entry chaincode: name:"cscc" " -"2019-05-02 01:31:51.518 UTC [chaincode] Execute -> DEBU 4210 Entry" -"2019-05-02 01:31:51.519 UTC [cscc] Invoke -> DEBU 4211 Invoke function: GetChannels" -"2019-05-02 01:31:51.519 UTC [msp.identity] Verify -> DEBU 4212 Verify: digest = 00000000 ff b0 f3 3d 54 db f5 a9 d3 09 b2 d0 c1 3a 3d 10 |...=T........:=.| -00000010 1f df f6 e9 1a f1 d4 1a dd 43 b9 f0 a3 3b 03 ed |.........C...;..|" -"2019-05-02 01:31:51.519 UTC [msp.identity] Verify -> DEBU 4213 Verify: sig = 00000000 30 45 02 21 00 cc 96 d9 36 e5 ec 0d bc 9b b0 6c |0E.!....6......l| -00000010 8a 01 d6 73 2f 1a d1 3b 8d ca 16 b0 c5 a2 04 f1 |...s/..;........| -00000020 37 5e fc c9 40 02 20 4b b8 c6 73 d9 5a 17 f6 28 |7^..@. K..s.Z..(| -00000030 ab 1c fc 66 1c a9 8c 63 a3 0f 6e 09 b2 0d 57 d7 |...f...c..n...W.| -00000040 04 4e f5 99 b4 0c 13 |.N.....|" -"2019-05-02 01:31:51.520 UTC [chaincode] handleMessage -> DEBU 4214 [af15c022] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:51.520 UTC [chaincode] Notify -> DEBU 4215 [af15c022] notifying Txid:af15c022d4a12b6b8096b31879eaeb693027c4c8f920c7a96305b85df4ae3f8f, channelID:" -"2019-05-02 01:31:51.521 UTC [chaincode] Execute -> DEBU 4216 Exit" -"2019-05-02 01:31:51.521 UTC [endorser] callChaincode -> INFO 4217 [][af15c022] Exit chaincode: name:"cscc" (3ms)" -"2019-05-02 01:31:51.522 UTC [endorser] SimulateProposal -> DEBU 4218 [][af15c022] Exit" -"2019-05-02 01:31:51.522 UTC [endorser] func1 -> DEBU 4219 Exit: request from 192.168.240.9:41476" -"2019-05-02 01:31:51.522 UTC [comm.grpc.server] 1 -> INFO 421a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41476 grpc.code=OK grpc.call_duration=10.843ms -"2019-05-02 01:31:51.527 UTC [grpc] warningf -> DEBU 421b transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.240.7:7051->192.168.240.9:41476: read: connection reset by peer" -"2019-05-02 01:31:51.528 UTC [grpc] infof -> DEBU 421c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:51.960 UTC [gossip.election] waitForInterrupt -> DEBU 421d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-05-02 01:31:51.960 UTC [gossip.election] IsLeader -> DEBU 421e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-05-02 01:31:51.960 UTC [msp.identity] Sign -> DEBU 421f Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B0E7B8C7E0B1AECD15100F1801 " -"2019-05-02 01:31:51.960 UTC [msp.identity] Sign -> DEBU 4220 Sign: digest: 94E39DE12A2D07B6D6FBE3153788EBF37E3CFC28735E80DE70F69E5F604A7DBC " -"2019-05-02 01:31:51.960 UTC [gossip.election] waitForInterrupt -> DEBU 4221 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-05-02 01:31:51.968 UTC [msp] DeserializeIdentity -> DEBU 4222 Obtaining identity" -"2019-05-02 01:31:51.968 UTC [msp] DeserializeIdentity -> DEBU 4223 Obtaining identity" -"2019-05-02 01:31:51.968 UTC [msp] DeserializeIdentity -> DEBU 4224 Obtaining identity" -"2019-05-02 01:31:51.968 UTC [msp] DeserializeIdentity -> DEBU 4225 Obtaining identity" -"2019-05-02 01:31:51.969 UTC [gossip.comm] Send -> DEBU 4226 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-05-02 01:31:51.969 UTC [gossip.comm] sendToEndpoint -> DEBU 4227 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1556760640896250800 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" -"2019-05-02 01:31:51.969 UTC [gossip.comm] sendToEndpoint -> DEBU 4228 Exiting" -"2019-05-02 01:31:51.969 UTC [msp] DeserializeIdentity -> DEBU 4229 Obtaining identity" -"2019-05-02 01:31:51.970 UTC [msp] DeserializeIdentity -> DEBU 422a Obtaining identity" -"2019-05-02 01:31:52.363 UTC [endorser] ProcessProposal -> DEBU 422b Entering: request from 192.168.240.9:41484" -"2019-05-02 01:31:52.364 UTC [protoutils] ValidateProposalMessage -> DEBU 422c ValidateProposalMessage starts for signed proposal 0xc0025298b0" -"2019-05-02 01:31:52.364 UTC [protoutils] validateChannelHeader -> DEBU 422d validateChannelHeader info: header type 3" -"2019-05-02 01:31:52.365 UTC [protoutils] checkSignatureFromCreator -> DEBU 422e begin" -"2019-05-02 01:31:52.365 UTC [protoutils] checkSignatureFromCreator -> DEBU 422f creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-05-02 01:31:52.366 UTC [protoutils] checkSignatureFromCreator -> DEBU 4230 creator is valid" -"2019-05-02 01:31:52.366 UTC [msp.identity] Verify -> DEBU 4231 Verify: digest = 00000000 ba b7 4a 61 a1 7b 2d aa 77 57 7a d7 29 d2 42 4d |..Ja.{-.wWz.).BM| -00000010 83 6d 33 15 6f bf d0 04 45 56 ee 8d b9 cb 0c 63 |.m3.o...EV.....c|" -"2019-05-02 01:31:52.367 UTC [msp.identity] Verify -> DEBU 4232 Verify: sig = 00000000 30 45 02 21 00 a8 2e 14 c1 c8 9e 43 8b e5 52 a4 |0E.!.......C..R.| -00000010 1c 47 47 c9 b3 19 b6 90 1a 0a b7 fe cc 3a 64 9e |.GG..........:d.| -00000020 fe c5 65 6a 32 02 20 31 75 8b 98 27 94 78 e2 af |..ej2. 1u..'.x..| -00000030 6f cc 1b 78 c3 01 89 69 f7 34 53 fc a8 2c 9c 5b |o..x...i.4S..,.[| -00000040 26 c4 e7 63 07 8e 0d |&..c...|" -"2019-05-02 01:31:52.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 4233 exits successfully" -"2019-05-02 01:31:52.368 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4234 validateChaincodeProposalMessage starts for proposal 0xc00261a310, header 0xc002529d10" -"2019-05-02 01:31:52.368 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4235 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -"2019-05-02 01:31:52.369 UTC [endorser] preProcess -> DEBU 4236 [][d840b7d0] processing txid: d840b7d0d97dc9b40ee14cf4f849c5190c9285a2da87b394cd8e371e51aad756" -"2019-05-02 01:31:52.370 UTC [endorser] SimulateProposal -> DEBU 4237 [][d840b7d0] Entry chaincode: name:"qscc" " -"2019-05-02 01:31:52.370 UTC [endorser] callChaincode -> INFO 4238 [][d840b7d0] Entry chaincode: name:"qscc" " -"2019-05-02 01:31:52.370 UTC [chaincode] Execute -> DEBU 4239 Entry" -"2019-05-02 01:31:52.371 UTC [qscc] Invoke -> DEBU 423a Invoke function: GetChainInfo on chain: businesschannel" -"2019-05-02 01:31:52.371 UTC [aclmgmt] CheckACL -> DEBU 423b acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -"2019-05-02 01:31:52.372 UTC [aclmgmt] CheckACL -> DEBU 423c acl check(/Channel/Application/Readers)" -"2019-05-02 01:31:52.372 UTC [policies] Evaluate -> DEBU 423d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:52.372 UTC [policies] Evaluate -> DEBU 423e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:52.372 UTC [policies] Evaluate -> DEBU 423f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:52.373 UTC [msp] DeserializeIdentity -> DEBU 4240 Obtaining identity" -"2019-05-02 01:31:52.373 UTC [msp.identity] newIdentity -> DEBU 4241 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-05-02 09:28:17.775 UTC [msp.identity] Verify -> DEBU 3e00 Verify: sig = 00000000 30 44 02 20 14 83 93 06 29 d9 29 65 89 e2 e3 0c |0D. ....).)e....| +00000010 45 fe d5 31 d5 a7 ef 7d f8 07 fd b3 0e fe 12 4a |E..1...}.......J| +00000020 2f 2d 40 09 02 20 4d 3b 62 8d 9d 1b a0 5f 38 0c |/-@.. M;b...._8.| +00000030 2c 7b ab 8d fa ed 0e 9c e1 60 b7 58 f2 9e fe 2d |,{.......`.X...-| +00000040 c8 f4 47 4c 33 a0 |..GL3.|" +"2019-05-02 09:28:17.775 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e01 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:17.776 UTC [gossip.discovery] isSentByMe -> DEBU 3e02 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:17.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e03 Exiting" +"2019-05-02 09:28:17.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e04 Exiting" +"2019-05-02 09:28:17.839 UTC [gossip.pull] Hello -> DEBU 3e05 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:28:17.839 UTC [msp] DeserializeIdentity -> DEBU 3e06 Obtaining identity" +"2019-05-02 09:28:17.840 UTC [msp] DeserializeIdentity -> DEBU 3e08 Obtaining identity" +"2019-05-02 09:28:17.839 UTC [gossip.comm] Send -> DEBU 3e07 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:17.840 UTC [gossip.pull] Hello -> DEBU 3e09 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-05-02 09:28:17.840 UTC [gossip.comm] Send -> DEBU 3e0a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:17.840 UTC [gossip.pull] Hello -> DEBU 3e0b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-05-02 09:28:17.840 UTC [gossip.comm] Send -> DEBU 3e0c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:17.840 UTC [gossip.pull] Hello -> DEBU 3e0d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-05-02 09:28:17.840 UTC [gossip.comm] sendToEndpoint -> DEBU 3e0e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.841 UTC [gossip.comm] sendToEndpoint -> DEBU 3e0f Exiting" +"2019-05-02 09:28:17.841 UTC [msp] DeserializeIdentity -> DEBU 3e10 Obtaining identity" +"2019-05-02 09:28:17.841 UTC [msp] DeserializeIdentity -> DEBU 3e11 Obtaining identity" +"2019-05-02 09:28:17.841 UTC [gossip.comm] sendToEndpoint -> DEBU 3e12 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.841 UTC [gossip.comm] sendToEndpoint -> DEBU 3e13 Exiting" +"2019-05-02 09:28:17.841 UTC [gossip.comm] Send -> DEBU 3e14 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e15 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e16 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e17 Exiting" +"2019-05-02 09:28:17.842 UTC [gossip.comm] sendToEndpoint -> DEBU 3e18 Exiting" +"2019-05-02 09:28:17.847 UTC [gossip.comm] func1 -> DEBU 3e19 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3024106290083695586 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.847 UTC [gossip.comm] func1 -> DEBU 3e1a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6290708047405863089 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e1b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3024106290083695586 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.847 UTC [gossip.pull] HandleMessage -> DEBU 3e1c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3024106290083695586 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e1d Exiting" +"2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e1e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6290708047405863089 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.847 UTC [gossip.pull] HandleMessage -> DEBU 3e1f GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6290708047405863089 , Msg_type: BLOCK_MSG, digests: [1 3 5 7 9 2 4 6 8], Envelope: 60 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.847 UTC [gossip.gossip] handleMessage -> DEBU 3e20 Exiting" +"2019-05-02 09:28:17.848 UTC [gossip.comm] func1 -> DEBU 3e21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10570254373589169019 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.848 UTC [gossip.gossip] handleMessage -> DEBU 3e22 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10570254373589169019 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.849 UTC [gossip.pull] HandleMessage -> DEBU 3e23 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10570254373589169019 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.849 UTC [gossip.gossip] handleMessage -> DEBU 3e24 Exiting" +"2019-05-02 09:28:17.850 UTC [gossip.comm] func1 -> DEBU 3e25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6643126557587392879 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.850 UTC [gossip.gossip] handleMessage -> DEBU 3e26 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6643126557587392879 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.851 UTC [gossip.pull] HandleMessage -> DEBU 3e27 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6643126557587392879 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-05-02 09:28:17.851 UTC [gossip.gossip] handleMessage -> DEBU 3e28 Exiting" +"2019-05-02 09:28:18.251 UTC [endorser] ProcessProposal -> DEBU 3e29 Entering: request from 172.18.0.8:57486" +"2019-05-02 09:28:18.252 UTC [protoutils] ValidateProposalMessage -> DEBU 3e2a ValidateProposalMessage starts for signed proposal 0xc00305e5f0" +"2019-05-02 09:28:18.252 UTC [protoutils] validateChannelHeader -> DEBU 3e2b validateChannelHeader info: header type 3" +"2019-05-02 09:28:18.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e2c begin" +"2019-05-02 09:28:18.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e2d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:28:18.254 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e2e creator is valid" +"2019-05-02 09:28:18.254 UTC [msp.identity] Verify -> DEBU 3e2f Verify: digest = 00000000 eb 9e cf df f1 ea 39 fa fd f0 34 6f 1b f0 61 ae |......9...4o..a.| +00000010 a9 eb 49 59 06 27 37 0a 65 2a c1 73 c8 95 cc 62 |..IY.'7.e*.s...b|" +"2019-05-02 09:28:18.255 UTC [msp.identity] Verify -> DEBU 3e30 Verify: sig = 00000000 30 45 02 21 00 e7 4c 61 a9 0f ed 1b e2 c0 5d 30 |0E.!..La......]0| +00000010 b4 6b 94 5d 20 d7 e5 c7 5e 0c d9 33 de 72 b2 b7 |.k.] ...^..3.r..| +00000020 03 b2 60 27 da 02 20 53 a2 f2 ea 56 b8 03 9d 97 |..`'.. S...V....| +00000030 19 1d 31 a9 ef 8e f9 f2 ce c5 41 7f e4 d2 ca a8 |..1.......A.....| +00000040 e3 c1 76 f7 71 37 3f |..v.q7?|" +"2019-05-02 09:28:18.255 UTC [protoutils] checkSignatureFromCreator -> DEBU 3e31 exits successfully" +"2019-05-02 09:28:18.256 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3e32 validateChaincodeProposalMessage starts for proposal 0xc002643e30, header 0xc00305ea00" +"2019-05-02 09:28:18.256 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3e33 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-05-02 09:28:18.257 UTC [endorser] preProcess -> DEBU 3e34 [][6092491a] processing txid: 6092491a779b4758505b08c78c6187f7e99639ee0f42a5786dfc6d5a1f1a82d8" +"2019-05-02 09:28:18.257 UTC [endorser] SimulateProposal -> DEBU 3e35 [][6092491a] Entry chaincode: name:"cscc" " +"2019-05-02 09:28:18.257 UTC [endorser] callChaincode -> INFO 3e36 [][6092491a] Entry chaincode: name:"cscc" " +"2019-05-02 09:28:18.258 UTC [chaincode] Execute -> DEBU 3e37 Entry" +"2019-05-02 09:28:18.259 UTC [cscc] Invoke -> DEBU 3e38 Invoke function: GetChannels" +"2019-05-02 09:28:18.260 UTC [msp.identity] Verify -> DEBU 3e39 Verify: digest = 00000000 eb 9e cf df f1 ea 39 fa fd f0 34 6f 1b f0 61 ae |......9...4o..a.| +00000010 a9 eb 49 59 06 27 37 0a 65 2a c1 73 c8 95 cc 62 |..IY.'7.e*.s...b|" +"2019-05-02 09:28:18.261 UTC [msp.identity] Verify -> DEBU 3e3a Verify: sig = 00000000 30 45 02 21 00 e7 4c 61 a9 0f ed 1b e2 c0 5d 30 |0E.!..La......]0| +00000010 b4 6b 94 5d 20 d7 e5 c7 5e 0c d9 33 de 72 b2 b7 |.k.] ...^..3.r..| +00000020 03 b2 60 27 da 02 20 53 a2 f2 ea 56 b8 03 9d 97 |..`'.. S...V....| +00000030 19 1d 31 a9 ef 8e f9 f2 ce c5 41 7f e4 d2 ca a8 |..1.......A.....| +00000040 e3 c1 76 f7 71 37 3f |..v.q7?|" +"2019-05-02 09:28:18.262 UTC [chaincode] handleMessage -> DEBU 3e3b [6092491a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:28:18.263 UTC [chaincode] Notify -> DEBU 3e3c [6092491a] notifying Txid:6092491a779b4758505b08c78c6187f7e99639ee0f42a5786dfc6d5a1f1a82d8, channelID:" +"2019-05-02 09:28:18.263 UTC [chaincode] Execute -> DEBU 3e3d Exit" +"2019-05-02 09:28:18.264 UTC [endorser] callChaincode -> INFO 3e3e [][6092491a] Exit chaincode: name:"cscc" (6ms)" +"2019-05-02 09:28:18.264 UTC [endorser] SimulateProposal -> DEBU 3e3f [][6092491a] Exit" +"2019-05-02 09:28:18.264 UTC [endorser] func1 -> DEBU 3e40 Exit: request from 172.18.0.8:57486" +"2019-05-02 09:28:18.266 UTC [comm.grpc.server] 1 -> INFO 3e41 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57486 grpc.code=OK grpc.call_duration=15.8301ms +"2019-05-02 09:28:18.270 UTC [grpc] warningf -> DEBU 3e42 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.8:57486: read: connection reset by peer" +"2019-05-02 09:28:18.270 UTC [grpc] infof -> DEBU 3e43 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-05-02 09:28:18.801 UTC [gossip.comm] func1 -> DEBU 3e44 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.802 UTC [gossip.gossip] handleMessage -> DEBU 3e45 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.802 UTC [gossip.gossip] handleMessage -> DEBU 3e46 Exiting" +"2019-05-02 09:28:18.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.802 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e48 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-05-02 09:28:18.802 UTC [msp] DeserializeIdentity -> DEBU 3e49 Obtaining identity" +"2019-05-02 09:28:18.802 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:18.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e4b Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:18.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e4c Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:18.802 UTC [policies] Evaluate -> DEBU 3e4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:18.803 UTC [policies] Evaluate -> DEBU 3e4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:18.803 UTC [policies] Evaluate -> DEBU 3e4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:18.803 UTC [cauthdsl] func1 -> DEBU 3e50 0xc002730e00 gate 1556789298803173000 evaluation starts" +"2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e51 0xc002730e00 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e52 0xc002730e00 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e53 0xc002730e00 principal matched by identity 0" +"2019-05-02 09:28:18.803 UTC [msp.identity] Verify -> DEBU 3e54 Verify: digest = 00000000 97 7a 0d 86 07 b9 17 2e 1f 9b 1f 27 34 3c 69 8f |.z.........'4 DEBU 3e55 Verify: sig = 00000000 30 44 02 20 5d 7d 2a fa ac dd 0a bb 81 48 9c dc |0D. ]}*......H..| +00000010 cc 4c 86 14 42 37 07 06 e5 45 62 e4 10 58 44 23 |.L..B7...Eb..XD#| +00000020 91 25 8c 4f 02 20 60 56 59 8a 33 4d 42 a3 9e d9 |.%.O. `VY.3MB...| +00000030 68 dd 77 3a f0 f9 20 81 39 f0 7e bd 49 e2 50 18 |h.w:.. .9.~.I.P.| +00000040 67 fc be 09 53 90 |g...S.|" +"2019-05-02 09:28:18.803 UTC [cauthdsl] func2 -> DEBU 3e56 0xc002730e00 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:18.803 UTC [cauthdsl] func1 -> DEBU 3e57 0xc002730e00 gate 1556789298803173000 evaluation succeeds" +"2019-05-02 09:28:18.803 UTC [policies] Evaluate -> DEBU 3e58 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:18.804 UTC [policies] Evaluate -> DEBU 3e59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:18.804 UTC [policies] Evaluate -> DEBU 3e5a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:18.804 UTC [policies] Evaluate -> DEBU 3e5b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:18.804 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e5c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.804 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:18.804 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 " +"2019-05-02 09:28:18.804 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 " +"2019-05-02 09:28:18.805 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e60 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-05-02 09:28:18.805 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e61 Exiting" +"2019-05-02 09:28:18.805 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e62 Exiting" +"2019-05-02 09:28:18.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e63 Exiting" +"2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e64 Obtaining identity" +"2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e65 Obtaining identity" +"2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e66 Obtaining identity" +"2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e67 Obtaining identity" +"2019-05-02 09:28:18.806 UTC [msp] DeserializeIdentity -> DEBU 3e68 Obtaining identity" +"2019-05-02 09:28:18.807 UTC [msp] DeserializeIdentity -> DEBU 3e69 Obtaining identity" +"2019-05-02 09:28:18.807 UTC [msp] DeserializeIdentity -> DEBU 3e6a Obtaining identity" +"2019-05-02 09:28:18.807 UTC [gossip.comm] Send -> DEBU 3e6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:18.807 UTC [msp] DeserializeIdentity -> DEBU 3e6c Obtaining identity" +"2019-05-02 09:28:18.807 UTC [gossip.comm] Send -> DEBU 3e6d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:18.807 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6f Exiting" +"2019-05-02 09:28:18.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3e70 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3e71 Exiting" +"2019-05-02 09:28:18.842 UTC [gossip.comm] func1 -> DEBU 3e72 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.842 UTC [gossip.gossip] handleMessage -> DEBU 3e73 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.842 UTC [gossip.gossip] handleMessage -> DEBU 3e74 Exiting" +"2019-05-02 09:28:18.879 UTC [gossip.comm] func1 -> DEBU 3e75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e76 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.879 UTC [gossip.gossip] handleMessage -> DEBU 3e77 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e78 Exiting" +"2019-05-02 09:28:18.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e79 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1556789228856010200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:18.882 UTC [gossip.gossip] handleMessage -> DEBU 3e7a Exiting" +"2019-05-02 09:28:18.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e7b Exiting" +"2019-05-02 09:28:19.035 UTC [msp.identity] Sign -> DEBU 3e7c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0D192F0E3F1B4CD15102E " +"2019-05-02 09:28:19.035 UTC [msp.identity] Sign -> DEBU 3e7d Sign: digest: F153887618E2AD95BAF15F5BF692723AC67F3474ED1DB640E00C678916A5E4A7 " +"2019-05-02 09:28:19.037 UTC [msp.identity] Sign -> DEBU 3e7e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-05-02 09:28:19.037 UTC [msp.identity] Sign -> DEBU 3e7f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-05-02 09:28:19.037 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3e80 Sleeping 5s" +"2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e81 Obtaining identity" +"2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e82 Obtaining identity" +"2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e83 Obtaining identity" +"2019-05-02 09:28:19.038 UTC [gossip.comm] Send -> DEBU 3e84 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:19.038 UTC [msp] DeserializeIdentity -> DEBU 3e85 Obtaining identity" +"2019-05-02 09:28:19.038 UTC [gossip.comm] Send -> DEBU 3e86 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:19.041 UTC [gossip.comm] Send -> DEBU 3e87 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:19.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3e88 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e89 Exiting" +"2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8b Exiting" +"2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8d Exiting" +"2019-05-02 09:28:19.071 UTC [gossip.comm] func1 -> DEBU 3e8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:19.071 UTC [gossip.gossip] handleMessage -> DEBU 3e8f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:19.071 UTC [gossip.gossip] handleMessage -> DEBU 3e90 Exiting" +"2019-05-02 09:28:19.072 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e91 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:19.072 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e92 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-05-02 09:28:19.072 UTC [msp.identity] Verify -> DEBU 3e93 Verify: digest = 00000000 2a 5d 7a af 95 62 13 10 82 f3 f0 d2 58 8f 7f 06 |*]z..b......X...| +00000010 1c 71 1c cb 56 4b 76 b7 98 5e fa 36 0d 3e 6e 57 |.q..VKv..^.6.>nW|" +"2019-05-02 09:28:19.072 UTC [msp.identity] Verify -> DEBU 3e94 Verify: sig = 00000000 30 45 02 21 00 f3 b3 a2 ee 9e 9e 39 c4 35 68 59 |0E.!.......9.5hY| +00000010 8d 0e 5c c4 f9 92 d8 54 bb 14 50 4c 45 3a d7 8a |..\....T..PLE:..| +00000020 03 a5 48 a9 0d 02 20 61 1f 8c 5d c5 ba a1 f2 19 |..H... a..].....| +00000030 fb 46 d5 89 e7 6c b4 28 3b be 27 57 8b 77 32 c8 |.F...l.(;.'W.w2.| +00000040 e3 c8 9c c6 e5 6d d2 |.....m.|" +"2019-05-02 09:28:19.073 UTC [msp.identity] Verify -> DEBU 3e95 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-05-02 09:28:19.073 UTC [msp.identity] Verify -> DEBU 3e96 Verify: sig = 00000000 30 45 02 21 00 cc 7e 7b 1c b4 a2 32 09 73 fb ef |0E.!..~{...2.s..| +00000010 d6 65 9b ef 54 56 3b 50 b4 5b b7 88 93 46 2a ea |.e..TV;P.[...F*.| +00000020 a9 c9 ef 75 b6 02 20 59 f2 eb c1 77 76 2a 6d 64 |...u.. Y...wv*md| +00000030 54 18 90 2c aa df 1c 4c 1d 73 4f d8 fb d3 d3 71 |T..,...L.sO....q| +00000040 e5 b4 d6 db ea ac 9e |.......|" +"2019-05-02 09:28:19.073 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e97 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-05-02 09:28:19.073 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e98 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-05-02 09:28:19.073 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e99 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 " +"2019-05-02 09:28:19.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 " +"2019-05-02 09:28:19.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:19.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e9c Exiting" +"2019-05-02 09:28:19.074 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e9d Exiting" +"2019-05-02 09:28:19.074 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e9e Exiting" +"2019-05-02 09:28:19.080 UTC [gossip.comm] func1 -> DEBU 3e9f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.080 UTC [gossip.gossip] handleMessage -> DEBU 3ea0 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.081 UTC [gossip.gossip] handleMessage -> DEBU 3ea1 Exiting" +"2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea2 Obtaining identity" +"2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea3 Obtaining identity" +"2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea4 Obtaining identity" +"2019-05-02 09:28:19.081 UTC [gossip.comm] Send -> DEBU 3ea5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:19.081 UTC [msp] DeserializeIdentity -> DEBU 3ea6 Obtaining identity" +"2019-05-02 09:28:19.081 UTC [gossip.comm] Send -> DEBU 3ea7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea9 Exiting" +"2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3eaa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:19.082 UTC [gossip.comm] sendToEndpoint -> DEBU 3eab Exiting" +"2019-05-02 09:28:19.081 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.083 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ead Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-05-02 09:28:19.084 UTC [msp.identity] Verify -> DEBU 3eae Verify: digest = 00000000 f1 53 88 76 18 e2 ad 95 ba f1 5f 5b f6 92 72 3a |.S.v......_[..r:| +00000010 c6 7f 34 74 ed 1d b6 40 e0 0c 67 89 16 a5 e4 a7 |..4t...@..g.....|" +"2019-05-02 09:28:19.084 UTC [msp.identity] Verify -> DEBU 3eaf Verify: sig = 00000000 30 44 02 20 6a b2 f8 a0 c7 ac f2 13 0f 93 6e 70 |0D. j.........np| +00000010 e1 5f 66 c7 88 7a ba 24 c9 4d d0 0e 72 df 12 89 |._f..z.$.M..r...| +00000020 46 77 87 fe 02 20 75 b4 73 1a bc df 53 8e cc c6 |Fw... u.s...S...| +00000030 e5 85 58 0e a9 c2 05 73 bf fd 40 9c ac 86 34 a7 |..X....s..@...4.| +00000040 a8 35 af fb b6 a1 |.5....|" +"2019-05-02 09:28:19.088 UTC [gossip.comm] func1 -> DEBU 3eb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:19.088 UTC [gossip.gossip] handleMessage -> DEBU 3eb1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:19.089 UTC [gossip.discovery] isSentByMe -> DEBU 3eb2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1556789229089237200 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.089 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb3 Exiting" +"2019-05-02 09:28:19.090 UTC [gossip.gossip] handleMessage -> DEBU 3eb4 Exiting" +"2019-05-02 09:28:19.090 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:19.090 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb6 Exiting" +"2019-05-02 09:28:19.105 UTC [gossip.comm] func1 -> DEBU 3eb7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:19.106 UTC [gossip.gossip] handleMessage -> DEBU 3eb8 Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:19.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eb9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1556789229135374800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-05-02 09:28:19.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eba Exiting" +"2019-05-02 09:28:19.106 UTC [gossip.gossip] handleMessage -> DEBU 3ebb Exiting" +"2019-05-02 09:28:19.149 UTC [gossip.comm] func1 -> DEBU 3ebc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.149 UTC [gossip.gossip] handleMessage -> DEBU 3ebd Entering, 172.18.0.9:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.149 UTC [gossip.gossip] handleMessage -> DEBU 3ebe Exiting" +"2019-05-02 09:28:19.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ebf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.152 UTC [gossip.comm] func1 -> DEBU 3ec0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.152 UTC [gossip.gossip] handleMessage -> DEBU 3ec1 Entering, 172.18.0.5:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ec2 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-05-02 09:28:19.157 UTC [msp] DeserializeIdentity -> DEBU 3ec3 Obtaining identity" +"2019-05-02 09:28:19.157 UTC [gossip.comm] func1 -> DEBU 3ec4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.159 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ec5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-05-02 09:28:19.159 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ec6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:19.159 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ec7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-05-02 09:28:19.159 UTC [policies] Evaluate -> DEBU 3ec8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:19.159 UTC [policies] Evaluate -> DEBU 3ec9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:19.159 UTC [policies] Evaluate -> DEBU 3eca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:19.159 UTC [cauthdsl] func1 -> DEBU 3ecb 0xc003a60850 gate 1556789299159529300 evaluation starts" +"2019-05-02 09:28:19.159 UTC [cauthdsl] func2 -> DEBU 3ecc 0xc003a60850 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:19.159 UTC [cauthdsl] func2 -> DEBU 3ecd 0xc003a60850 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:19.159 UTC [cauthdsl] func2 -> DEBU 3ece 0xc003a60850 principal matched by identity 0" +"2019-05-02 09:28:19.159 UTC [msp.identity] Verify -> DEBU 3ecf Verify: digest = 00000000 c2 1c 0f 8d 4d a4 35 c6 43 ca 3b 2a bf 8e 8c 21 |....M.5.C.;*...!| +00000010 7e ae 71 d4 16 1d 50 0a 14 59 da 9b 92 7b 2e 91 |~.q...P..Y...{..|" +"2019-05-02 09:28:19.159 UTC [msp.identity] Verify -> DEBU 3ed0 Verify: sig = 00000000 30 44 02 21 00 8c 0c ef 6e 8f b1 23 3f 6f 0e 99 |0D.!....n..#?o..| +00000010 47 c3 ef b0 eb 51 27 ec e2 ba de 49 83 9f 80 de |G....Q'....I....| +00000020 67 97 2e 00 89 02 1f 52 5b 4b db ca ec 2b 3e a2 |g......R[K...+>.| +00000030 e1 ab e0 3a 52 b0 76 2a 1e 2c df 5c 89 ab 7c 28 |...:R.v*.,.\..|(| +00000040 03 83 b5 47 6c d2 |...Gl.|" +"2019-05-02 09:28:19.160 UTC [cauthdsl] func2 -> DEBU 3ed1 0xc003a60850 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:19.160 UTC [cauthdsl] func1 -> DEBU 3ed2 0xc003a60850 gate 1556789299159529300 evaluation succeeds" +"2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed5 Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:19.160 UTC [policies] Evaluate -> DEBU 3ed6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:19.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed9 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 " +"2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3eda Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 " +"2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3edb Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-05-02 09:28:19.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3edc Exiting" +"2019-05-02 09:28:19.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 3edd Exiting" +"2019-05-02 09:28:19.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ede Exiting" +"2019-05-02 09:28:19.161 UTC [gossip.gossip] handleMessage -> DEBU 3edf Exiting" +"2019-05-02 09:28:19.161 UTC [gossip.gossip] handleMessage -> DEBU 3ee0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee2 Exiting" +"2019-05-02 09:28:19.161 UTC [gossip.gossip] handleMessage -> DEBU 3ee3 Exiting" +"2019-05-02 09:28:19.161 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ee5 Exiting" +"2019-05-02 09:28:19.167 UTC [msp] DeserializeIdentity -> DEBU 3ee6 Obtaining identity" +"2019-05-02 09:28:19.167 UTC [msp] DeserializeIdentity -> DEBU 3ee7 Obtaining identity" +"2019-05-02 09:28:19.167 UTC [msp] DeserializeIdentity -> DEBU 3ee8 Obtaining identity" +"2019-05-02 09:28:19.168 UTC [msp] DeserializeIdentity -> DEBU 3ee9 Obtaining identity" +"2019-05-02 09:28:19.168 UTC [msp] DeserializeIdentity -> DEBU 3eea Obtaining identity" +"2019-05-02 09:28:19.170 UTC [msp] DeserializeIdentity -> DEBU 3eeb Obtaining identity" +"2019-05-02 09:28:19.171 UTC [gossip.comm] Send -> DEBU 3eec Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:19.171 UTC [msp] DeserializeIdentity -> DEBU 3eed Obtaining identity" +"2019-05-02 09:28:19.171 UTC [msp] DeserializeIdentity -> DEBU 3eee Obtaining identity" +"2019-05-02 09:28:19.171 UTC [gossip.comm] Send -> DEBU 3eef Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-05-02 09:28:19.177 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef2 Exiting" +"2019-05-02 09:28:19.172 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1556789229213781100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-05-02 09:28:19.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef3 Exiting" +"2019-05-02 09:28:19.464 UTC [endorser] ProcessProposal -> DEBU 3ef4 Entering: request from 172.18.0.8:57494" +"2019-05-02 09:28:19.465 UTC [protoutils] ValidateProposalMessage -> DEBU 3ef5 ValidateProposalMessage starts for signed proposal 0xc003cc9a90" +"2019-05-02 09:28:19.466 UTC [protoutils] validateChannelHeader -> DEBU 3ef6 validateChannelHeader info: header type 3" +"2019-05-02 09:28:19.466 UTC [protoutils] checkSignatureFromCreator -> DEBU 3ef7 begin" +"2019-05-02 09:28:19.467 UTC [protoutils] checkSignatureFromCreator -> DEBU 3ef8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-05-02 09:28:19.467 UTC [protoutils] checkSignatureFromCreator -> DEBU 3ef9 creator is valid" +"2019-05-02 09:28:19.467 UTC [msp.identity] Verify -> DEBU 3efa Verify: digest = 00000000 a1 68 bc 87 72 fa 5d 06 e0 ef eb 6e fe bc 2a 08 |.h..r.]....n..*.| +00000010 fe a6 2d c6 d5 bb 2d 70 c0 46 7f 4f c3 44 23 97 |..-...-p.F.O.D#.|" +"2019-05-02 09:28:19.468 UTC [msp.identity] Verify -> DEBU 3efb Verify: sig = 00000000 30 44 02 20 61 bc a2 db c9 41 1d 46 80 68 1f 4d |0D. a....A.F.h.M| +00000010 cb 89 29 7e 47 c8 17 41 38 47 ca a0 6f b7 4c a5 |..)~G..A8G..o.L.| +00000020 a6 53 af 09 02 20 1a 98 c3 f7 a7 62 b9 98 d9 49 |.S... .....b...I| +00000030 d9 3c 56 38 95 6f f8 f1 bf 4e 99 ef aa ad a8 9b |. DEBU 3efc exits successfully" +"2019-05-02 09:28:19.469 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3efd validateChaincodeProposalMessage starts for proposal 0xc0024b6150, header 0xc003cc9ea0" +"2019-05-02 09:28:19.470 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3efe validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-05-02 09:28:19.470 UTC [endorser] preProcess -> DEBU 3eff [][9995e49a] processing txid: 9995e49aff838e8113f46d3da64294278625ae0f28f3107ace201c8bd57d1b63" +"2019-05-02 09:28:19.471 UTC [endorser] SimulateProposal -> DEBU 3f00 [][9995e49a] Entry chaincode: name:"qscc" " +"2019-05-02 09:28:19.471 UTC [endorser] callChaincode -> INFO 3f01 [][9995e49a] Entry chaincode: name:"qscc" " +"2019-05-02 09:28:19.472 UTC [chaincode] Execute -> DEBU 3f02 Entry" +"2019-05-02 09:28:19.473 UTC [qscc] Invoke -> DEBU 3f03 Invoke function: GetChainInfo on chain: businesschannel" +"2019-05-02 09:28:19.473 UTC [aclmgmt] CheckACL -> DEBU 3f04 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-05-02 09:28:19.473 UTC [aclmgmt] CheckACL -> DEBU 3f05 acl check(/Channel/Application/Readers)" +"2019-05-02 09:28:19.474 UTC [policies] Evaluate -> DEBU 3f06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-05-02 09:28:19.474 UTC [policies] Evaluate -> DEBU 3f07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-05-02 09:28:19.475 UTC [policies] Evaluate -> DEBU 3f08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-05-02 09:28:19.475 UTC [msp] DeserializeIdentity -> DEBU 3f09 Obtaining identity" +"2019-05-02 09:28:19.476 UTC [msp.identity] newIdentity -> DEBU 3f0a Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -21673,309 +20449,49 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-05-02 01:31:52.374 UTC [cauthdsl] func1 -> DEBU 4242 0xc003300da0 gate 1556760712374671300 evaluation starts" -"2019-05-02 01:31:52.374 UTC [cauthdsl] func2 -> DEBU 4243 0xc003300da0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.374 UTC [cauthdsl] func2 -> DEBU 4244 0xc003300da0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.374 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4245 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-05-02 01:31:52.374 UTC [msp] Validate -> DEBU 4246 MSP Org1MSP validating identity" -"2019-05-02 01:31:52.374 UTC [msp] getCertificationChain -> DEBU 4247 MSP Org1MSP getting certification chain" -"2019-05-02 01:31:52.375 UTC [cauthdsl] func2 -> DEBU 4248 0xc003300da0 principal matched by identity 0" -"2019-05-02 01:31:52.375 UTC [msp.identity] Verify -> DEBU 4249 Verify: digest = 00000000 ba b7 4a 61 a1 7b 2d aa 77 57 7a d7 29 d2 42 4d |..Ja.{-.wWz.).BM| -00000010 83 6d 33 15 6f bf d0 04 45 56 ee 8d b9 cb 0c 63 |.m3.o...EV.....c|" -"2019-05-02 01:31:52.375 UTC [msp.identity] Verify -> DEBU 424a Verify: sig = 00000000 30 45 02 21 00 a8 2e 14 c1 c8 9e 43 8b e5 52 a4 |0E.!.......C..R.| -00000010 1c 47 47 c9 b3 19 b6 90 1a 0a b7 fe cc 3a 64 9e |.GG..........:d.| -00000020 fe c5 65 6a 32 02 20 31 75 8b 98 27 94 78 e2 af |..ej2. 1u..'.x..| -00000030 6f cc 1b 78 c3 01 89 69 f7 34 53 fc a8 2c 9c 5b |o..x...i.4S..,.[| -00000040 26 c4 e7 63 07 8e 0d |&..c...|" -"2019-05-02 01:31:52.375 UTC [cauthdsl] func2 -> DEBU 424b 0xc003300da0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:52.375 UTC [cauthdsl] func1 -> DEBU 424c 0xc003300da0 gate 1556760712374671300 evaluation succeeds" -"2019-05-02 01:31:52.375 UTC [policies] Evaluate -> DEBU 424d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.375 UTC [policies] Evaluate -> DEBU 424e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.375 UTC [policies] Evaluate -> DEBU 424f Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:52.375 UTC [policies] Evaluate -> DEBU 4250 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:52.375 UTC [chaincode] handleMessage -> DEBU 4251 [d840b7d0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-05-02 01:31:52.375 UTC [chaincode] Notify -> DEBU 4252 [d840b7d0] notifying Txid:d840b7d0d97dc9b40ee14cf4f849c5190c9285a2da87b394cd8e371e51aad756, channelID:" -"2019-05-02 01:31:52.377 UTC [chaincode] Execute -> DEBU 4253 Exit" -"2019-05-02 01:31:52.378 UTC [endorser] callChaincode -> INFO 4254 [][d840b7d0] Exit chaincode: name:"qscc" (8ms)" -"2019-05-02 01:31:52.378 UTC [endorser] SimulateProposal -> DEBU 4255 [][d840b7d0] Exit" -"2019-05-02 01:31:52.378 UTC [endorser] func1 -> DEBU 4256 Exit: request from 192.168.240.9:41484" -"2019-05-02 01:31:52.379 UTC [comm.grpc.server] 1 -> INFO 4257 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.240.9:41484 grpc.code=OK grpc.call_duration=16.3369ms -"2019-05-02 01:31:52.384 UTC [grpc] infof -> DEBU 4258 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-05-02 01:31:52.786 UTC [msp] DeserializeIdentity -> DEBU 4259 Obtaining identity" -"2019-05-02 01:31:52.786 UTC [msp] DeserializeIdentity -> DEBU 425a Obtaining identity" -"2019-05-02 01:31:52.787 UTC [gossip.comm] Send -> DEBU 425b Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-05-02 01:31:52.787 UTC [gossip.comm] sendToEndpoint -> DEBU 425c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.788 UTC [gossip.comm] sendToEndpoint -> DEBU 425f Exiting" -"2019-05-02 01:31:52.788 UTC [gossip.comm] sendToEndpoint -> DEBU 425d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.790 UTC [gossip.comm] sendToEndpoint -> DEBU 4260 Exiting" -"2019-05-02 01:31:52.790 UTC [gossip.comm] func1 -> DEBU 4261 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.791 UTC [gossip.gossip] handleMessage -> DEBU 4262 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.788 UTC [gossip.comm] sendToEndpoint -> DEBU 425e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.793 UTC [gossip.comm] sendToEndpoint -> DEBU 4263 Exiting" -"2019-05-02 01:31:52.793 UTC [msp.identity] Verify -> DEBU 4264 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:52.795 UTC [gossip.comm] func1 -> DEBU 4265 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.795 UTC [gossip.comm] func1 -> DEBU 4266 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.796 UTC [msp.identity] Verify -> DEBU 4267 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:52.798 UTC [msp.identity] Verify -> DEBU 4268 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:52.798 UTC [msp.identity] Verify -> DEBU 4269 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:52.799 UTC [msp] DeserializeIdentity -> DEBU 426a Obtaining identity" -"2019-05-02 01:31:52.800 UTC [msp] DeserializeIdentity -> DEBU 426b Obtaining identity" -"2019-05-02 01:31:52.801 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 426c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:52.801 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 426d Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 426e Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.802 UTC [policies] Evaluate -> DEBU 426f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:52.803 UTC [policies] Evaluate -> DEBU 4270 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:52.803 UTC [policies] Evaluate -> DEBU 4271 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:52.804 UTC [cauthdsl] func1 -> DEBU 4272 0xc0033a2330 gate 1556760712804145100 evaluation starts" -"2019-05-02 01:31:52.804 UTC [cauthdsl] func2 -> DEBU 4273 0xc0033a2330 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.805 UTC [cauthdsl] func2 -> DEBU 4274 0xc0033a2330 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.805 UTC [cauthdsl] func2 -> DEBU 4275 0xc0033a2330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:52.806 UTC [cauthdsl] func2 -> DEBU 4276 0xc0033a2330 principal evaluation fails" -"2019-05-02 01:31:52.808 UTC [cauthdsl] func1 -> DEBU 4277 0xc0033a2330 gate 1556760712804145100 evaluation fails" -"2019-05-02 01:31:52.809 UTC [policies] Evaluate -> DEBU 4278 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.809 UTC [policies] Evaluate -> DEBU 4279 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.809 UTC [policies] Evaluate -> DEBU 427a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:52.809 UTC [cauthdsl] func1 -> DEBU 427b 0xc0033a2b70 gate 1556760712809832000 evaluation starts" -"2019-05-02 01:31:52.810 UTC [cauthdsl] func2 -> DEBU 427c 0xc0033a2b70 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.810 UTC [cauthdsl] func2 -> DEBU 427d 0xc0033a2b70 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.810 UTC [cauthdsl] func2 -> DEBU 427e 0xc0033a2b70 principal matched by identity 0" -"2019-05-02 01:31:52.810 UTC [msp.identity] Verify -> DEBU 427f Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:52.811 UTC [msp.identity] Verify -> DEBU 4280 Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:52.811 UTC [cauthdsl] func2 -> DEBU 4281 0xc0033a2b70 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:52.812 UTC [cauthdsl] func1 -> DEBU 4282 0xc0033a2b70 gate 1556760712809832000 evaluation succeeds" -"2019-05-02 01:31:52.812 UTC [policies] Evaluate -> DEBU 4283 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.812 UTC [policies] Evaluate -> DEBU 4284 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.812 UTC [policies] Evaluate -> DEBU 4285 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:52.813 UTC [policies] Evaluate -> DEBU 4286 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:52.813 UTC [msp] DeserializeIdentity -> DEBU 4287 Obtaining identity" -"2019-05-02 01:31:52.813 UTC [msp] DeserializeIdentity -> DEBU 4288 Obtaining identity" -"2019-05-02 01:31:52.814 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4289 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:52.814 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 428a Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.814 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 428b Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.815 UTC [policies] Evaluate -> DEBU 428c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:52.815 UTC [policies] Evaluate -> DEBU 428d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:52.815 UTC [policies] Evaluate -> DEBU 428e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:52.816 UTC [cauthdsl] func1 -> DEBU 428f 0xc00342c360 gate 1556760712816233000 evaluation starts" -"2019-05-02 01:31:52.816 UTC [cauthdsl] func2 -> DEBU 4290 0xc00342c360 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.817 UTC [cauthdsl] func2 -> DEBU 4291 0xc00342c360 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.818 UTC [cauthdsl] func2 -> DEBU 4292 0xc00342c360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:52.819 UTC [cauthdsl] func2 -> DEBU 4293 0xc00342c360 principal evaluation fails" -"2019-05-02 01:31:52.821 UTC [cauthdsl] func1 -> DEBU 4294 0xc00342c360 gate 1556760712816233000 evaluation fails" -"2019-05-02 01:31:52.823 UTC [policies] Evaluate -> DEBU 4295 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.823 UTC [policies] Evaluate -> DEBU 4296 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.823 UTC [policies] Evaluate -> DEBU 4297 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:52.824 UTC [cauthdsl] func1 -> DEBU 4298 0xc00342cba0 gate 1556760712823997800 evaluation starts" -"2019-05-02 01:31:52.824 UTC [cauthdsl] func2 -> DEBU 4299 0xc00342cba0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.824 UTC [cauthdsl] func2 -> DEBU 429a 0xc00342cba0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.825 UTC [cauthdsl] func2 -> DEBU 429b 0xc00342cba0 principal matched by identity 0" -"2019-05-02 01:31:52.825 UTC [msp.identity] Verify -> DEBU 429c Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:52.825 UTC [msp.identity] Verify -> DEBU 429d Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:52.826 UTC [cauthdsl] func2 -> DEBU 429e 0xc00342cba0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:52.826 UTC [cauthdsl] func1 -> DEBU 429f 0xc00342cba0 gate 1556760712823997800 evaluation succeeds" -"2019-05-02 01:31:52.827 UTC [policies] Evaluate -> DEBU 42a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.827 UTC [policies] Evaluate -> DEBU 42a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.828 UTC [policies] Evaluate -> DEBU 42a2 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:52.828 UTC [policies] Evaluate -> DEBU 42a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:52.828 UTC [gossip.gossip] handleMessage -> DEBU 42a4 Exiting" -"2019-05-02 01:31:52.829 UTC [gossip.gossip] handleMessage -> DEBU 42a5 Entering, 192.168.240.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.829 UTC [msp] DeserializeIdentity -> DEBU 42a6 Obtaining identity" -"2019-05-02 01:31:52.830 UTC [msp] DeserializeIdentity -> DEBU 42a7 Obtaining identity" -"2019-05-02 01:31:52.832 UTC [msp] DeserializeIdentity -> DEBU 42a8 Obtaining identity" -"2019-05-02 01:31:52.832 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:52.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42aa Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.834 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42ab Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.834 UTC [policies] Evaluate -> DEBU 42ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:52.835 UTC [policies] Evaluate -> DEBU 42ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:52.835 UTC [policies] Evaluate -> DEBU 42ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:52.836 UTC [cauthdsl] func1 -> DEBU 42af 0xc0034b46b0 gate 1556760712835981600 evaluation starts" -"2019-05-02 01:31:52.836 UTC [cauthdsl] func2 -> DEBU 42b0 0xc0034b46b0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.836 UTC [cauthdsl] func2 -> DEBU 42b1 0xc0034b46b0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.836 UTC [cauthdsl] func2 -> DEBU 42b2 0xc0034b46b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:52.836 UTC [cauthdsl] func2 -> DEBU 42b3 0xc0034b46b0 principal evaluation fails" -"2019-05-02 01:31:52.837 UTC [cauthdsl] func1 -> DEBU 42b4 0xc0034b46b0 gate 1556760712835981600 evaluation fails" -"2019-05-02 01:31:52.837 UTC [policies] Evaluate -> DEBU 42b5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.837 UTC [policies] Evaluate -> DEBU 42b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.837 UTC [policies] Evaluate -> DEBU 42b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:52.838 UTC [cauthdsl] func1 -> DEBU 42b8 0xc0034b4ef0 gate 1556760712838264200 evaluation starts" -"2019-05-02 01:31:52.839 UTC [cauthdsl] func2 -> DEBU 42b9 0xc0034b4ef0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.839 UTC [cauthdsl] func2 -> DEBU 42ba 0xc0034b4ef0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.839 UTC [cauthdsl] func2 -> DEBU 42bb 0xc0034b4ef0 principal matched by identity 0" -"2019-05-02 01:31:52.840 UTC [msp.identity] Verify -> DEBU 42bc Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:52.841 UTC [msp.identity] Verify -> DEBU 42bd Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:52.842 UTC [cauthdsl] func2 -> DEBU 42be 0xc0034b4ef0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:52.842 UTC [cauthdsl] func1 -> DEBU 42bf 0xc0034b4ef0 gate 1556760712838264200 evaluation succeeds" -"2019-05-02 01:31:52.843 UTC [policies] Evaluate -> DEBU 42c0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.843 UTC [policies] Evaluate -> DEBU 42c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.843 UTC [policies] Evaluate -> DEBU 42c2 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:52.850 UTC [policies] Evaluate -> DEBU 42c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:52.851 UTC [msp.identity] Verify -> DEBU 42c4 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:52.851 UTC [msp.identity] Verify -> DEBU 42c5 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:52.852 UTC [msp.identity] Verify -> DEBU 42c6 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:52.852 UTC [msp.identity] Verify -> DEBU 42c7 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:52.853 UTC [msp] DeserializeIdentity -> DEBU 42c8 Obtaining identity" -"2019-05-02 01:31:52.853 UTC [msp] DeserializeIdentity -> DEBU 42c9 Obtaining identity" -"2019-05-02 01:31:52.854 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42ca Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:52.854 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42cb Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.854 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42cc Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.854 UTC [policies] Evaluate -> DEBU 42cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:52.854 UTC [policies] Evaluate -> DEBU 42ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:52.854 UTC [policies] Evaluate -> DEBU 42cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:52.855 UTC [cauthdsl] func1 -> DEBU 42d0 0xc0034dd580 gate 1556760712855331500 evaluation starts" -"2019-05-02 01:31:52.856 UTC [cauthdsl] func2 -> DEBU 42d1 0xc0034dd580 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.856 UTC [cauthdsl] func2 -> DEBU 42d2 0xc0034dd580 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.857 UTC [cauthdsl] func2 -> DEBU 42d3 0xc0034dd580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:52.857 UTC [cauthdsl] func2 -> DEBU 42d4 0xc0034dd580 principal evaluation fails" -"2019-05-02 01:31:52.857 UTC [cauthdsl] func1 -> DEBU 42d5 0xc0034dd580 gate 1556760712855331500 evaluation fails" -"2019-05-02 01:31:52.857 UTC [policies] Evaluate -> DEBU 42d6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.857 UTC [policies] Evaluate -> DEBU 42d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.858 UTC [policies] Evaluate -> DEBU 42d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:52.867 UTC [cauthdsl] func1 -> DEBU 42d9 0xc0034ddde0 gate 1556760712859489800 evaluation starts" -"2019-05-02 01:31:52.867 UTC [cauthdsl] func2 -> DEBU 42da 0xc0034ddde0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.867 UTC [cauthdsl] func2 -> DEBU 42db 0xc0034ddde0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.868 UTC [cauthdsl] func2 -> DEBU 42dc 0xc0034ddde0 principal matched by identity 0" -"2019-05-02 01:31:52.868 UTC [msp.identity] Verify -> DEBU 42dd Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:52.868 UTC [msp.identity] Verify -> DEBU 42de Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:52.869 UTC [cauthdsl] func2 -> DEBU 42df 0xc0034ddde0 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:52.869 UTC [cauthdsl] func1 -> DEBU 42e0 0xc0034ddde0 gate 1556760712859489800 evaluation succeeds" -"2019-05-02 01:31:52.869 UTC [policies] Evaluate -> DEBU 42e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.869 UTC [policies] Evaluate -> DEBU 42e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.870 UTC [policies] Evaluate -> DEBU 42e3 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:52.870 UTC [policies] Evaluate -> DEBU 42e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:52.870 UTC [gossip.gossip] handleMessage -> DEBU 42e5 Exiting" -"2019-05-02 01:31:52.870 UTC [gossip.gossip] handleMessage -> DEBU 42e6 Entering, 192.168.240.5:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.871 UTC [msp] DeserializeIdentity -> DEBU 42e7 Obtaining identity" -"2019-05-02 01:31:52.878 UTC [msp] DeserializeIdentity -> DEBU 42e8 Obtaining identity" -"2019-05-02 01:31:52.878 UTC [msp] DeserializeIdentity -> DEBU 42e9 Obtaining identity" -"2019-05-02 01:31:52.878 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:52.878 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42eb Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.878 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42ec Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.878 UTC [policies] Evaluate -> DEBU 42ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:52.878 UTC [policies] Evaluate -> DEBU 42ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:52.878 UTC [policies] Evaluate -> DEBU 42ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:52.878 UTC [cauthdsl] func1 -> DEBU 42f0 0xc0033a1950 gate 1556760712878767400 evaluation starts" -"2019-05-02 01:31:52.878 UTC [cauthdsl] func2 -> DEBU 42f1 0xc0033a1950 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.878 UTC [cauthdsl] func2 -> DEBU 42f2 0xc0033a1950 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.878 UTC [cauthdsl] func2 -> DEBU 42f3 0xc0033a1950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:52.878 UTC [cauthdsl] func2 -> DEBU 42f4 0xc0033a1950 principal evaluation fails" -"2019-05-02 01:31:52.878 UTC [cauthdsl] func1 -> DEBU 42f5 0xc0033a1950 gate 1556760712878767400 evaluation fails" -"2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 42f6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 42f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 42f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:52.879 UTC [cauthdsl] func1 -> DEBU 42f9 0xc004414190 gate 1556760712879172800 evaluation starts" -"2019-05-02 01:31:52.879 UTC [cauthdsl] func2 -> DEBU 42fa 0xc004414190 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.879 UTC [cauthdsl] func2 -> DEBU 42fb 0xc004414190 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.879 UTC [cauthdsl] func2 -> DEBU 42fc 0xc004414190 principal matched by identity 0" -"2019-05-02 01:31:52.879 UTC [msp.identity] Verify -> DEBU 42fd Verify: digest = 00000000 89 65 07 aa 40 fd 09 d3 72 ea da 1c 9c 45 c8 ce |.e..@...r....E..| -00000010 64 2d 0f c5 65 32 29 f9 aa f3 16 fd 39 83 df db |d-..e2).....9...|" -"2019-05-02 01:31:52.879 UTC [msp.identity] Verify -> DEBU 42fe Verify: sig = 00000000 30 44 02 20 30 12 90 60 01 7a 13 de e8 0f 9b 0b |0D. 0..`.z......| -00000010 a5 59 ea 4c ee b4 e4 e2 ef 61 13 e6 fc 03 dd 47 |.Y.L.....a.....G| -00000020 77 f3 a1 19 02 20 19 78 4c 17 35 2d de b2 c2 b1 |w.... .xL.5-....| -00000030 5e 36 86 8e e6 22 f5 38 92 fb 06 d7 16 15 de 39 |^6...".8.......9| -00000040 23 bc fd 95 3a 13 |#...:.|" -"2019-05-02 01:31:52.879 UTC [cauthdsl] func2 -> DEBU 42ff 0xc004414190 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:52.879 UTC [cauthdsl] func1 -> DEBU 4300 0xc004414190 gate 1556760712879172800 evaluation succeeds" -"2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 4301 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 4302 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 4303 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:52.879 UTC [policies] Evaluate -> DEBU 4304 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:52.880 UTC [msp.identity] Verify -> DEBU 4305 Verify: digest = 00000000 66 be 25 89 28 47 7a 11 d9 49 b0 d6 7c 97 9b 00 |f.%.(Gz..I..|...| -00000010 d9 29 be 7b dc 6e 1d f6 83 57 11 01 22 4b d9 61 |.).{.n...W.."K.a|" -"2019-05-02 01:31:52.880 UTC [msp.identity] Verify -> DEBU 4306 Verify: sig = 00000000 30 45 02 21 00 ab 44 92 e3 eb 5e 59 2c 13 35 f7 |0E.!..D...^Y,.5.| -00000010 37 c2 86 70 37 e4 65 77 0c f8 dc ea 03 49 7d ef |7..p7.ew.....I}.| -00000020 8a 04 ba e1 a1 02 20 26 14 e0 d4 da 33 e1 2a a5 |...... &....3.*.| -00000030 21 b0 07 9d ff 64 97 96 80 2e ff b0 df ed 7b 44 |!....d........{D| -00000040 1e 57 61 23 4a 83 34 |.Wa#J.4|" -"2019-05-02 01:31:52.880 UTC [msp] DeserializeIdentity -> DEBU 4307 Obtaining identity" -"2019-05-02 01:31:52.880 UTC [msp] DeserializeIdentity -> DEBU 4308 Obtaining identity" -"2019-05-02 01:31:52.880 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4309 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-05-02 01:31:52.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 430a Got policy manager for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 430b Got reader policy for channel [businesschannel] with flag [true]" -"2019-05-02 01:31:52.880 UTC [policies] Evaluate -> DEBU 430c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-05-02 01:31:52.880 UTC [policies] Evaluate -> DEBU 430d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-05-02 01:31:52.881 UTC [policies] Evaluate -> DEBU 430e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func1 -> DEBU 430f 0xc00419e0d0 gate 1556760712881057200 evaluation starts" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 4310 0xc00419e0d0 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 4311 0xc00419e0d0 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 4312 0xc00419e0d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 4313 0xc00419e0d0 principal evaluation fails" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func1 -> DEBU 4314 0xc00419e0d0 gate 1556760712881057200 evaluation fails" -"2019-05-02 01:31:52.881 UTC [policies] Evaluate -> DEBU 4315 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.881 UTC [policies] Evaluate -> DEBU 4316 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-05-02 01:31:52.881 UTC [policies] Evaluate -> DEBU 4317 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func1 -> DEBU 4318 0xc00419e910 gate 1556760712881448900 evaluation starts" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 4319 0xc00419e910 signed by 0 principal evaluation starts (used [false])" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 431a 0xc00419e910 processing identity 0 with bytes of 10fffc0" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 431b 0xc00419e910 principal matched by identity 0" -"2019-05-02 01:31:52.881 UTC [msp.identity] Verify -> DEBU 431c Verify: digest = 00000000 4b f8 02 fc 00 69 b1 75 e8 d3 96 c3 00 da 7b fc |K....i.u......{.| -00000010 76 33 34 ce cb 6a 0c e4 59 7b 99 15 04 25 b0 0b |v34..j..Y{...%..|" -"2019-05-02 01:31:52.881 UTC [msp.identity] Verify -> DEBU 431d Verify: sig = 00000000 30 44 02 20 7f c6 4a 26 b3 63 c4 76 2a 25 91 1b |0D. ..J&.c.v*%..| -00000010 50 af f1 bb 0a aa 49 67 d5 7f 7a a0 6b 24 34 7a |P.....Ig..z.k$4z| -00000020 71 76 06 22 02 20 05 ad 1d 0e 58 c8 a3 89 51 b6 |qv.". ....X...Q.| -00000030 08 bd 85 aa f3 1c 94 6a 21 13 c5 1a 01 7c 75 5d |.......j!....|u]| -00000040 15 5e 2d 74 49 ed |.^-tI.|" -"2019-05-02 01:31:52.881 UTC [cauthdsl] func2 -> DEBU 431e 0xc00419e910 principal evaluation succeeds for identity 0" -"2019-05-02 01:31:52.886 UTC [cauthdsl] func1 -> DEBU 431f 0xc00419e910 gate 1556760712881448900 evaluation succeeds" -"2019-05-02 01:31:52.887 UTC [policies] Evaluate -> DEBU 4320 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.887 UTC [policies] Evaluate -> DEBU 4321 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-05-02 01:31:52.887 UTC [policies] Evaluate -> DEBU 4322 Signature set satisfies policy /Channel/Application/Readers" -"2019-05-02 01:31:52.887 UTC [policies] Evaluate -> DEBU 4323 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-05-02 01:31:52.891 UTC [msp.identity] Verify -> DEBU 4324 Verify: digest = 00000000 47 98 69 97 87 50 55 11 a0 6b 1a 13 1a a0 cf 0f |G.i..PU..k......| -00000010 36 27 08 71 74 0d 4f 58 cc 4d ae b6 cd c4 58 12 |6'.qt.OX.M....X.|" -"2019-05-02 01:31:52.891 UTC [msp.identity] Verify -> DEBU 4325 Verify: sig = 00000000 30 44 02 20 56 1a dd 47 8c f3 b8 b5 f4 45 ed f9 |0D. V..G.....E..| -00000010 5c 2b 3a ed f2 93 f3 cc 2c 3a 82 f1 26 a2 d3 62 |\+:.....,:..&..b| -00000020 4f cb a1 2c 02 20 7b f6 58 a6 35 c4 6b db a5 d4 |O..,. {.X.5.k...| -00000030 c0 68 b9 71 0f e0 ab e0 1a 30 89 15 aa ac f6 cc |.h.q.....0......| -00000040 a5 88 0c d4 5a 7c |....Z||" -"2019-05-02 01:31:52.891 UTC [gossip.gossip] handleMessage -> DEBU 4326 Exiting" -"2019-05-02 01:31:52.921 UTC [msp] DeserializeIdentity -> DEBU 4327 Obtaining identity" -"2019-05-02 01:31:52.922 UTC [msp] DeserializeIdentity -> DEBU 4328 Obtaining identity" -"2019-05-02 01:31:52.922 UTC [gossip.pull] Hello -> DEBU 4329 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-05-02 01:31:52.922 UTC [msp] DeserializeIdentity -> DEBU 432a Obtaining identity" -"2019-05-02 01:31:52.922 UTC [msp] DeserializeIdentity -> DEBU 432b Obtaining identity" -"2019-05-02 01:31:52.922 UTC [gossip.comm] Send -> DEBU 432c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-05-02 01:31:52.922 UTC [gossip.comm] sendToEndpoint -> DEBU 432d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.922 UTC [gossip.comm] sendToEndpoint -> DEBU 432e Exiting" -"2019-05-02 01:31:52.927 UTC [gossip.comm] func1 -> DEBU 432f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1224047953124857061 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 60 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.928 UTC [gossip.gossip] handleMessage -> DEBU 4330 Entering, 192.168.240.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1224047953124857061 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 60 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.928 UTC [gossip.pull] HandleMessage -> DEBU 4331 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1224047953124857061 , Msg_type: BLOCK_MSG, digests: [4 7 1 2 3 5 6 8 9], Envelope: 60 bytes, Signature: 0 bytes" -"2019-05-02 01:31:52.928 UTC [gossip.gossip] handleMessage -> DEBU 4332 Exiting" +"2019-05-02 09:28:19.478 UTC [cauthdsl] func1 -> DEBU 3f0b 0xc0040ae7f0 gate 1556789299478061900 evaluation starts" +"2019-05-02 09:28:19.478 UTC [cauthdsl] func2 -> DEBU 3f0c 0xc0040ae7f0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:19.478 UTC [cauthdsl] func2 -> DEBU 3f0d 0xc0040ae7f0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:19.479 UTC [cauthdsl] func2 -> DEBU 3f0e 0xc0040ae7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-05-02 09:28:19.480 UTC [cauthdsl] func2 -> DEBU 3f0f 0xc0040ae7f0 principal evaluation fails" +"2019-05-02 09:28:19.480 UTC [cauthdsl] func1 -> DEBU 3f10 0xc0040ae7f0 gate 1556789299478061900 evaluation fails" +"2019-05-02 09:28:19.480 UTC [policies] Evaluate -> DEBU 3f11 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:19.481 UTC [policies] Evaluate -> DEBU 3f12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-05-02 09:28:19.481 UTC [policies] Evaluate -> DEBU 3f13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-05-02 09:28:19.482 UTC [cauthdsl] func1 -> DEBU 3f14 0xc0040af970 gate 1556789299481981100 evaluation starts" +"2019-05-02 09:28:19.482 UTC [cauthdsl] func2 -> DEBU 3f15 0xc0040af970 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:19.482 UTC [cauthdsl] func2 -> DEBU 3f16 0xc0040af970 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:19.483 UTC [cauthdsl] func2 -> DEBU 3f17 0xc0040af970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +"2019-05-02 09:28:19.483 UTC [cauthdsl] func2 -> DEBU 3f18 0xc0040af970 principal evaluation fails" +"2019-05-02 09:28:19.483 UTC [cauthdsl] func1 -> DEBU 3f19 0xc0040af970 gate 1556789299481981100 evaluation fails" +"2019-05-02 09:28:19.484 UTC [policies] Evaluate -> DEBU 3f1a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:19.484 UTC [policies] Evaluate -> DEBU 3f1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-05-02 09:28:19.484 UTC [policies] Evaluate -> DEBU 3f1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-05-02 09:28:19.485 UTC [cauthdsl] func1 -> DEBU 3f1d 0xc0040c21d0 gate 1556789299485203300 evaluation starts" +"2019-05-02 09:28:19.485 UTC [cauthdsl] func2 -> DEBU 3f1e 0xc0040c21d0 signed by 0 principal evaluation starts (used [false])" +"2019-05-02 09:28:19.485 UTC [cauthdsl] func2 -> DEBU 3f1f 0xc0040c21d0 processing identity 0 with bytes of 10fffc0" +"2019-05-02 09:28:19.486 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3f20 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-05-02 09:28:19.487 UTC [msp] Validate -> DEBU 3f21 MSP Org1MSP validating identity" +"2019-05-02 09:28:19.488 UTC [msp] getCertificationChain -> DEBU 3f22 MSP Org1MSP getting certification chain" +"2019-05-02 09:28:19.488 UTC [cauthdsl] func2 -> DEBU 3f23 0xc0040c21d0 principal matched by identity 0" +"2019-05-02 09:28:19.489 UTC [msp.identity] Verify -> DEBU 3f24 Verify: digest = 00000000 a1 68 bc 87 72 fa 5d 06 e0 ef eb 6e fe bc 2a 08 |.h..r.]....n..*.| +00000010 fe a6 2d c6 d5 bb 2d 70 c0 46 7f 4f c3 44 23 97 |..-...-p.F.O.D#.|" +"2019-05-02 09:28:19.489 UTC [msp.identity] Verify -> DEBU 3f25 Verify: sig = 00000000 30 44 02 20 61 bc a2 db c9 41 1d 46 80 68 1f 4d |0D. a....A.F.h.M| +00000010 cb 89 29 7e 47 c8 17 41 38 47 ca a0 6f b7 4c a5 |..)~G..A8G..o.L.| +00000020 a6 53 af 09 02 20 1a 98 c3 f7 a7 62 b9 98 d9 49 |.S... .....b...I| +00000030 d9 3c 56 38 95 6f f8 f1 bf 4e 99 ef aa ad a8 9b |. DEBU 3f26 0xc0040c21d0 principal evaluation succeeds for identity 0" +"2019-05-02 09:28:19.490 UTC [cauthdsl] func1 -> DEBU 3f27 0xc0040c21d0 gate 1556789299485203300 evaluation succeeds" +"2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f28 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f2a Signature set satisfies policy /Channel/Application/Readers" +"2019-05-02 09:28:19.490 UTC [policies] Evaluate -> DEBU 3f2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-05-02 09:28:19.490 UTC [chaincode] handleMessage -> DEBU 3f2c [9995e49a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-05-02 09:28:19.490 UTC [chaincode] Notify -> DEBU 3f2d [9995e49a] notifying Txid:9995e49aff838e8113f46d3da64294278625ae0f28f3107ace201c8bd57d1b63, channelID:" +"2019-05-02 09:28:19.490 UTC [chaincode] Execute -> DEBU 3f2e Exit" +"2019-05-02 09:28:19.490 UTC [endorser] callChaincode -> INFO 3f2f [][9995e49a] Exit chaincode: name:"qscc" (19ms)" +"2019-05-02 09:28:19.490 UTC [endorser] SimulateProposal -> DEBU 3f30 [][9995e49a] Exit" +"2019-05-02 09:28:19.491 UTC [endorser] func1 -> DEBU 3f31 Exit: request from 172.18.0.8:57494" +"2019-05-02 09:28:19.491 UTC [comm.grpc.server] 1 -> INFO 3f32 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.8:57494 grpc.code=OK grpc.call_duration=26.9711ms +"2019-05-02 09:28:19.495 UTC [grpc] infof -> DEBU 3f33 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" diff --git a/hyperledger_fabric/latest/scripts/func.sh b/hyperledger_fabric/latest/scripts/func.sh index e72c8070..775c19bc 100644 --- a/hyperledger_fabric/latest/scripts/func.sh +++ b/hyperledger_fabric/latest/scripts/func.sh @@ -39,8 +39,8 @@ verifyResult () { # set env to use orderOrg's identity setOrdererEnvs () { export CORE_PEER_LOCALMSPID="OrdererMSP" - export CORE_PEER_MSPCONFIGPATH=${ORDERER_ADMIN_MSP} - export CORE_PEER_TLS_ROOTCERT_FILE=${ORDERER_TLS_ROOTCERT} + export CORE_PEER_MSPCONFIGPATH=${ORDERER0_ADMIN_MSP} + export CORE_PEER_TLS_ROOTCERT_FILE=${ORDERER0_TLS_ROOTCERT} #t="\${ORG${org}_PEER${peer}_URL}" && CORE_PEER_ADDRESS=`eval echo $t` } @@ -70,71 +70,41 @@ setEnvs () { #env |grep CORE } -checkOSNAvailability() { - #Use orderer's MSP for fetching system channel config block - export CORE_PEER_LOCALMSPID="OrdererMSP" - export CORE_PEER_TLS_ROOTCERT_FILE=${ORDERER_TLS_CA} - export CORE_PEER_MSPCONFIGPATH=${ORDERER_MSP} - - local rc=1 - local starttime=$(date +%s) - - # continue to poll - # we either get a successful response, or reach TIMEOUT - while test "$(($(date +%s)-starttime))" -lt "$TIMEOUT" -a $rc -ne 0 - do - sleep 3 - echo "Attempting to fetch system channel ...$(($(date +%s)-starttime)) secs" - if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then - peer channel fetch 0 -o ${ORDERER_URL} -c "testchainid" >&log.txt - else - peer channel fetch 0 -o ${ORDERER_URL} -c "testchainid" --tls --cafile ${ORDERER_TLS_CA} >&log.txt - fi - test $? -eq 0 && VALUE=$(cat log.txt | awk '/Received block/ {print $NF}') - test "$VALUE" = "0" && let rc=0 - done - [ $rc -ne 0 ] && cat log.txt - verifyResult $rc "Ordering Service is not available, Please try again ..." - echo "=== Ordering Service is up and running === " - echo -} - # Internal func called by channelCreate +# channelCreateAction channel tx orderer_url orderer_tls_rootcert channelCreateAction(){ local channel=$1 local channel_tx=$2 local orderer_url=$3 - [ -z $orderer_url ] && orderer_url=${ORDERER_URL} + local orderer_tls_rootcert=$4 if [ -z "$CORE_PEER_TLS_ENABLED" ] || [ "$CORE_PEER_TLS_ENABLED" = "false" ]; then peer channel create \ - -o ${orderer_url} \ -c ${channel} \ + -o ${orderer_url} \ -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ - --timeout "${TIMEOUT}s" \ - >&log.txt + --timeout "${TIMEOUT}s" else peer channel create \ - -o ${orderer_url} \ -c ${channel} \ + -o ${orderer_url} \ -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ --timeout "${TIMEOUT}s" \ --tls \ - --cafile ${ORDERER_TLS_CA} \ - >&log.txt + --cafile ${orderer_tls_rootcert} fi return $? } -# Use peer0/org1 to create a channel -# channelCreate APP_CHANNEL APP_CHANNEL.tx org peer [orderer] +# Use peer0/org1's identity to create a channel +# channelCreate APP_CHANNEL APP_CHANNEL.tx org peer orderer_url orderer_tls_rootcert channelCreate() { local channel=$1 local tx=$2 local org=$3 local peer=$4 local orderer_url=$5 - [ -z $orderer_url ] && orderer_url=${ORDERER_URL} + local orderer_tls_rootcert=$6 [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 @@ -143,7 +113,7 @@ channelCreate() { local rc=1 local counter=0 while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do - channelCreateAction "${channel}" "${tx}" "${orderer_url}" + channelCreateAction ${channel} ${tx} ${orderer_url} ${orderer_tls_rootcert} rc=$? let counter=${counter}+1 #COUNTER=` expr $COUNTER + 1` @@ -241,28 +211,30 @@ channelGetInfo () { } # Fetch all blocks for a channel -# Usage: channelFetchAll channel org peer +# Usage: channelFetchAll channel org peer orderer_url orderer_tls_rootcert channelFetchAll () { local channel=$1 local org=$2 local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 echo "=== Fetch all block for channel $channel === " local block_file=/tmp/${channel}_newest.block - channelFetch ${channel} $org $peer "newest" ${block_file} + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "newest" ${block_file} [ $? -ne 0 ] && exit 1 newest_block_shasum=$(getShasum ${block_file}) echo "fetch newest block ${block_file} with shasum=${newest_block_shasum}" block_file=${CHANNEL_ARTIFACTS}/${channel}_config.block - channelFetch ${channel} $org $peer "config" ${block_file} + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "config" ${block_file} [ $? -ne 0 ] && exit 1 echo "fetch config block ${block_file}" for i in $(seq 0 16); do # we at most fetch 16 blocks block_file=${CHANNEL_ARTIFACTS}/${channel}_${i}.block - channelFetch ${channel} $org $peer $i ${block_file} + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} $i ${block_file} [ $? -ne 0 ] && exit 1 [ -f $block_file ] || break echo "fetch block $i and saved into ${block_file}" @@ -271,13 +243,16 @@ channelFetchAll () { done } -# Fetch some block from a given channel: channel, peer, blockNum +# Fetch some block from a given channel +# channelFetch channel org peer orderer_url blockNum block_file channelFetch () { local channel=$1 local org=$2 local peer=$3 - local num=$4 - local block_file=$5 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local num=$6 + local block_file=$7 echo "=== Fetch block $num of channel $channel === " #setEnvs $org $peer @@ -286,15 +261,15 @@ channelFetch () { # lets supply it directly as we know it using the "-o" option if [ -z "${CORE_PEER_TLS_ENABLED}" ] || [ "${CORE_PEER_TLS_ENABLED}" = "false" ]; then peer channel fetch $num ${block_file} \ - -o ${ORDERER_URL} \ + -o ${orderer_url} \ -c ${channel} \ >&log.txt else peer channel fetch $num ${block_file} \ - -o ${ORDERER_URL} \ + -o ${orderer_url} \ -c ${channel} \ --tls \ - --cafile ${ORDERER_TLS_CA} \ + --cafile ${orderer_tls_rootcert} \ >&log.txt fi if [ $? -ne 0 ]; then @@ -331,12 +306,14 @@ channelSignConfigTx () { } # Update a channel config -# Usage: channelUpdate channel org peer transaction_file +# Usage: channelUpdate channel org peer orderer_url orderer_tls_rootcert transaction_file channelUpdate() { local channel=$1 local org=$2 local peer=$3 - local tx=$4 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local tx=$6 [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 setEnvs $org $peer @@ -344,17 +321,17 @@ channelUpdate() { [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then peer channel update \ - -o ${ORDERER_URL} \ -c ${channel} \ + -o ${orderer_url} \ -f ${CHANNEL_ARTIFACTS}/${tx} \ >&log.txt else peer channel update \ - -o ${ORDERER_URL} \ -c ${channel} \ + -o ${orderer_url} \ -f ${CHANNEL_ARTIFACTS}/${tx} \ --tls \ - --cafile ${ORDERER_TLS_CA} \ + --cafile ${orderer_tls_rootcert} \ >&log.txt fi rc=$? @@ -409,9 +386,9 @@ chaincodeInstall () { } # Approve the chaincode definition -# chaincodeApprove channel org peer name version +# chaincodeApprove channel org peer peer_url peer_tls_root_cert orderer_url orderer_tls_rootcert channel name version chaincodeApprove () { - if [ "$#" -ne 7 -a "$#" -ne 9 ]; then + if [ "$#" -ne 9 -a "$#" -ne 11 ]; then echo_r "Wrong param number for chaincode approve" exit -1 fi @@ -419,18 +396,20 @@ chaincodeApprove () { local peer=$2 local peer_url=$3 local peer_tls_root_cert=$4 - local channel=$5 - local name=$6 - local version=$7 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + local channel=$7 + local name=$8 + local version=$9 local collection_config="" # collection config file path for sideDB local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy - if [ ! -z "$8" ]; then - collection_config=$8 + if [ ! -z "${10}" ]; then + collection_config=${10} fi - if [ ! -z "$9" ]; then - policy=$9 + if [ ! -z "${11}" ]; then + policy=${12} fi setEnvs $org $peer @@ -445,7 +424,6 @@ chaincodeApprove () { if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then peer lifecycle chaincode approveformyorg \ --peerAddresses ${peer_url} \ - --tlsRootCertFiles ${peer_tls_root_cert} \ --channelID ${channel} \ --name ${name} \ --version ${version} \ @@ -453,7 +431,8 @@ chaincodeApprove () { --package-id ${package_id} \ --sequence 1 \ --signature-policy "${policy}" \ - --waitForEvent >&log.txt + --waitForEvent \ + --orderer ${orderer_url} >&log.txt else peer lifecycle chaincode approveformyorg \ --peerAddresses ${peer_url} \ @@ -466,8 +445,9 @@ chaincodeApprove () { --sequence 1 \ --signature-policy "${policy}" \ --waitForEvent \ + --orderer ${orderer_url} \ --tls true \ - --cafile ${ORDERER_TLS_CA} >&log.txt + --cafile ${orderer_tls_rootcert} >&log.txt fi rc=$? @@ -506,27 +486,28 @@ chaincodeQueryApprove () { } # Anyone can commit the chaincode definition once it's approved by major -# chaincodeCommit org peer channel orderer name version [collection-config] [endorse-policy] +# chaincodeCommit org peer channel orderer_url orderer_tls_rootcert name version [collection-config] [endorse-policy] chaincodeCommit () { - if [ "$#" -ne 6 -a "$#" -ne 8 ]; then + if [ "$#" -ne 7 -a "$#" -ne 9 ]; then echo_r "Wrong param number for chaincode commit" exit -1 fi local org=$1 local peer=$2 local channel=$3 - local orderer=$4 - local name=$5 - local version=$6 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local name=$6 + local version=$7 local collection_config="" # collection config file path for sideDB local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy - if [ ! -z "$7" ]; then - collection_config=$7 + if [ ! -z "$8" ]; then + collection_config=$8 fi - if [ ! -z "$8" ]; then - policy=$8 # chaincode endorsement policy + if [ ! -z "$9" ]; then + policy=$9 # chaincode endorsement policy fi setEnvs $org $peer @@ -539,7 +520,7 @@ chaincodeCommit () { # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then peer lifecycle chaincode commit \ - -o ${orderer} \ + -o ${orderer_url} \ --channelID ${channel} \ --name ${name} \ --version ${version} \ @@ -554,7 +535,7 @@ chaincodeCommit () { --signature-policy "${policy}" else peer lifecycle chaincode commit \ - -o ${orderer} \ + -o ${orderer_url} \ --channelID ${channel} \ --name ${name} \ --version ${version} \ @@ -568,7 +549,7 @@ chaincodeCommit () { --collections-config "${collection_config}" \ --signature-policy "${policy}" \ --tls true \ - --cafile ${ORDERER_TLS_CA} + --cafile ${orderer_tls_rootcert} >&log.txt fi rc=$? [ $rc -ne 0 ] && cat log.txt @@ -605,27 +586,28 @@ chaincodeQueryCommit () { # Instantiate chaincode on specifized peer node -# chaincodeInstantiate channel org peer name version args +# chaincodeInstantiate channel org peer orderer_url name version args chaincodeInstantiate () { - if [ "$#" -gt 8 -a "$#" -lt 6 ]; then + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then echo_r "Wrong param number for chaincode instantaite" exit -1 fi local channel=$1 local org=$2 local peer=$3 - local name=$4 - local version=$5 - local args=$6 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 local collection_config="" # collection config file path for sideDB local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy - if [ ! -z "$7" ]; then - collection_config=$7 + if [ ! -z "$8" ]; then + collection_config=$8 fi - if [ ! -z "$8" ]; then - policy=$8 + if [ ! -z "$9" ]; then + policy=$9 fi setEnvs $org $peer @@ -635,7 +617,7 @@ chaincodeInstantiate () { # lets supply it directly as we know it using the "-o" option if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then peer chaincode instantiate \ - -o ${ORDERER_URL} \ + -o ${orderer_url} \ -C ${channel} \ -n ${name} \ -v ${version} \ @@ -645,7 +627,7 @@ chaincodeInstantiate () { >&log.txt else peer chaincode instantiate \ - -o ${ORDERER_URL} \ + -o ${orderer_url} \ -C ${channel} \ -n ${name} \ -v ${version} \ @@ -653,7 +635,7 @@ chaincodeInstantiate () { -P "${policy}" \ --collections-config "${collection_config}" \ --tls \ - --cafile ${ORDERER_TLS_CA} \ + --cafile ${ORDERER0_TLS_CA} \ >&log.txt fi rc=$? @@ -704,7 +686,7 @@ chaincodeInit () { --isInit \ -c ${args} \ --tls \ - --cafile ${ORDERER_TLS_CA} \ + --cafile ${ORDERER0_TLS_CA} \ >&log.txt fi rc=$? @@ -715,7 +697,7 @@ chaincodeInit () { # Usage: chaincodeInvoke org peer channel orderer name args peer_url peer_org_tlsca chaincodeInvoke () { - if [ "$#" -ne 8 ]; then + if [ "$#" -ne 9 ]; then echo_r "Wrong param number for chaincode Invoke" exit -1 fi @@ -724,9 +706,10 @@ chaincodeInvoke () { local peer_url=$3 local peer_org_tlsca=$4 local channel=$5 - local orderer=$6 - local name=$7 - local args=$8 + local orderer_url=$6 + local orderer_tls_rootcert=$7 + local name=$8 + local args=$9 [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 echo "=== chaincodeInvoke to orderer by id of org${org}/peer${peer} === " @@ -736,7 +719,7 @@ chaincodeInvoke () { # lets supply it directly as we know it using the "-o" option if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then peer chaincode invoke \ - -o ${orderer} \ + -o ${orderer_url} \ --channelID ${channel} \ --name ${name} \ --peerAddresses ${peer_url} \ @@ -745,14 +728,14 @@ chaincodeInvoke () { >&log.txt else peer chaincode invoke \ - -o ${orderer} \ + -o ${orderer_url} \ --channelID ${channel} \ --name ${name} \ --peerAddresses ${peer_url} \ --tlsRootCertFiles ${peer_org_tlsca} \ -c ${args} \ --tls \ - --cafile ${ORDERER_TLS_CA} \ + --cafile ${orderer_tls_rootcert} \ >&log.txt fi rc=$? @@ -870,18 +853,19 @@ chaincodeStartDev () { echo "=== Chaincode started in dev mode === " } -# chaincodeUpgrade channel peer name version args +# chaincodeUpgrade channel org peer orderer_url name version args chaincodeUpgrade () { - if [ "$#" -gt 8 -a "$#" -lt 6 ]; then + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then echo_r "Wrong param number for chaincode instantaite" exit -1 fi local channel=$1 local org=$2 local peer=$3 - local name=$4 - local version=$5 - local args=$6 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 local collection_config="" # collection config file path for sideDB local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy @@ -893,7 +877,7 @@ chaincodeUpgrade () { # lets supply it directly as we know it using the "-o" option if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then peer chaincode upgrade \ - -o ${ORDERER_URL} \ + -o ${orderer_url} \ -C ${channel} \ -n ${name} \ -v ${version} \ @@ -903,7 +887,7 @@ chaincodeUpgrade () { >&log.txt else peer chaincode upgrade \ - -o ${ORDERER_URL} \ + -o ${orderer_url} \ -C ${channel} \ -n ${name} \ -v ${version} \ @@ -911,7 +895,7 @@ chaincodeUpgrade () { -P "${policy}" \ --collections-config "${collection_config}" \ --tls \ - --cafile ${ORDERER_TLS_CA} \ + --cafile ${ORDERER0_TLS_CA} \ >&log.txt fi rc=$? diff --git a/hyperledger_fabric/latest/scripts/gen_channelArtifacts.sh b/hyperledger_fabric/latest/scripts/gen_channelArtifacts.sh index c54d94de..052d1e2b 100644 --- a/hyperledger_fabric/latest/scripts/gen_channelArtifacts.sh +++ b/hyperledger_fabric/latest/scripts/gen_channelArtifacts.sh @@ -18,15 +18,16 @@ fi cd /tmp/${CHANNEL_ARTIFACTS} # all generated materials will be put under /tmp/$CHANNEL_ARTIFACTS -echo "Generate genesis block for system channel using configtx.yaml" -[ ! -f ${ORDERER_GENESIS} ] && \ +echo "Generate genesis block of system channel using configtx.yaml" +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && \ configtxgen \ -configPath /tmp \ -channelID ${SYS_CHANNEL} \ -profile ${ORDERER_GENESIS_PROFILE} \ - -outputBlock ${ORDERER_GENESIS} - -[ ! -f ${ORDERER_GENESIS} ] && echo "Fail to generate genesis block for system channel" && exit -1 + -outputBlock ${ORDERER0_GENESIS_BLOCK} +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && echo "Fail to generate genesis block ${ORDERER0_GENESIS_BLOCK}" && exit -1 +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER1_GENESIS_BLOCK} +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER2_GENESIS_BLOCK} #for (( i=1; i<150; i++ )); #do @@ -39,7 +40,6 @@ configtxgen \ -profile ${APP_CHANNEL_PROFILE} \ -channelID ${APP_CHANNEL} \ -outputCreateChannelTx ${APP_CHANNEL_TX} - [ ! -f ${APP_CHANNEL_TX} ] && echo "Fail to generate app channel tx file" && exit -1 #done @@ -69,17 +69,13 @@ configtxgen \ [ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 echo "Output the json for org1, org2 and org3" -[ ! -f ${ORG1MSP}.json ] && \ +declare -a msps=("${ORG1MSP}" + "${ORG2MSP}" + "${ORG3MSP}") +for msp in "${msps[@]}" +do +[ ! -f ${msp}.json ] && \ configtxgen \ -configPath /tmp \ - -printOrg ${ORG1MSP} >${ORG1MSP}.json - -[ ! -f ${ORG2MSP}.json ] && \ -configtxgen \ - -configPath /tmp \ - -printOrg ${ORG2MSP} >${ORG2MSP}.json - -[ ! -f ${ORG3MSP}.json ] && \ -configtxgen \ - -configPath /tmp/org3/ \ - -printOrg ${ORG3MSP} >${ORG3MSP}.json + -printOrg ${msp} >${msp}.json +done diff --git a/hyperledger_fabric/latest/scripts/init_chaincode_dev.sh b/hyperledger_fabric/latest/scripts/init_chaincode_dev.sh index c7c52df6..006645a5 100644 --- a/hyperledger_fabric/latest/scripts/init_chaincode_dev.sh +++ b/hyperledger_fabric/latest/scripts/init_chaincode_dev.sh @@ -21,7 +21,7 @@ echo_b "Channel name: "${APP_CHANNEL} ## Create channel echo_b "Creating channel..." -channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} sleep 1 diff --git a/hyperledger_fabric/latest/scripts/initialize_peer0.sh b/hyperledger_fabric/latest/scripts/initialize_peer0.sh index 00d6392e..c575e294 100644 --- a/hyperledger_fabric/latest/scripts/initialize_peer0.sh +++ b/hyperledger_fabric/latest/scripts/initialize_peer0.sh @@ -11,7 +11,7 @@ echo_b " ========== Network initialization start ========== " ## Create channel echo_b "Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}..." -channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} sleep 1 @@ -21,7 +21,7 @@ channelJoin ${APP_CHANNEL} 0 ## Set the anchor peers for each org in the channel echo_b "Updating anchor peers for peer0/org1... no use for only single channel" -channelUpdate ${APP_CHANNEL} 1 0 Org1MSPanchors.tx +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx ## Install chaincode on all peers CC_NAME=${CC_02_NAME} diff --git a/hyperledger_fabric/latest/scripts/test_cc_approve.sh b/hyperledger_fabric/latest/scripts/test_cc_approve.sh index e4c4b540..2b1c227e 100644 --- a/hyperledger_fabric/latest/scripts/test_cc_approve.sh +++ b/hyperledger_fabric/latest/scripts/test_cc_approve.sh @@ -17,7 +17,7 @@ for org in "${ORGS[@]}" do t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` - chaincodeApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} + chaincodeApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} done echo_g "=== Approve chaincode done ===" diff --git a/hyperledger_fabric/latest/scripts/test_cc_commit.sh b/hyperledger_fabric/latest/scripts/test_cc_commit.sh index 275071b3..7c7fc520 100644 --- a/hyperledger_fabric/latest/scripts/test_cc_commit.sh +++ b/hyperledger_fabric/latest/scripts/test_cc_commit.sh @@ -16,7 +16,7 @@ CC_NAME=${CC_NAME:-$CC_02_NAME} echo_b "=== Commit chaincode definition ${CC_NAME} to channel ${APP_CHANNEL} ... ===" -chaincodeCommit "${ORGS[0]}" "${PEERS[0]}" "${APP_CHANNEL}" "${ORDERER_URL}" ${CC_NAME} ${CC_INIT_VERSION} +chaincodeCommit "${ORGS[0]}" "${PEERS[0]}" "${APP_CHANNEL}" "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INIT_VERSION} echo_g "=== Commit Chaincode done, now you can invoke chaincode to start the container ===" diff --git a/hyperledger_fabric/latest/scripts/test_cc_instantiate.sh b/hyperledger_fabric/latest/scripts/test_cc_instantiate.sh index f8243e9c..f15d658b 100644 --- a/hyperledger_fabric/latest/scripts/test_cc_instantiate.sh +++ b/hyperledger_fabric/latest/scripts/test_cc_instantiate.sh @@ -15,8 +15,8 @@ CC_INIT_ARGS=${CC_INIT_ARGS:-$CC_02_INIT_ARGS} echo_b "=== Instantiating chaincode on channel ${APP_CHANNEL}... ===" # Instantiate at org1.peer0 and org2.peer0, actually it can be triggered once per channel -chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} -#chaincodeInstantiate "${APP_CHANNEL}" 2 0 ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} +#chaincodeInstantiate "${APP_CHANNEL}" 2 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} echo_g "=== Instantiate chaincode on channel ${APP_CHANNEL} done ===" diff --git a/hyperledger_fabric/latest/scripts/test_cc_invoke_query.sh b/hyperledger_fabric/latest/scripts/test_cc_invoke_query.sh index e3806be7..78614be4 100644 --- a/hyperledger_fabric/latest/scripts/test_cc_invoke_query.sh +++ b/hyperledger_fabric/latest/scripts/test_cc_invoke_query.sh @@ -16,7 +16,7 @@ echo_b "=== Testing Chaincode invoke/query ===" #Invoke on chaincode on Peer0/Org1 echo_b "Init chaincode by org1/peer0..." -chaincodeInit 1 0 ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INIT_ARGS} "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" +chaincodeInit 1 0 ${APP_CHANNEL} "${ORDERER0_URL}" ${CC_NAME} ${CC_INIT_ARGS} "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" sleep 5 # wait for chaincode is up @@ -26,7 +26,7 @@ chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNE #Invoke on chaincode on Peer0/Org1 echo_b "Invoke transaction (transfer 10) by org1/peer0..." -chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} #Query on chaincode on Peer1/Org2, check if the result is 90 echo_b "Query chaincode on org2/peer1..." @@ -34,7 +34,7 @@ chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNE #Invoke on chaincode on Peer1/Org2 echo_b "Send invoke transaction on org2/peer1..." -chaincodeInvoke 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} +chaincodeInvoke 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} #Query on chaincode on Peer1/Org2, check if the result is 80 echo_b "Query chaincode on org1/peer0 4peers..." diff --git a/hyperledger_fabric/latest/scripts/test_cc_upgrade.sh b/hyperledger_fabric/latest/scripts/test_cc_upgrade.sh index 3f26c90c..fb42b2b8 100644 --- a/hyperledger_fabric/latest/scripts/test_cc_upgrade.sh +++ b/hyperledger_fabric/latest/scripts/test_cc_upgrade.sh @@ -21,7 +21,7 @@ chaincodeInstall 2 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" chaincodeInstall 2 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" # Upgrade on one peer of the channel will update all -chaincodeUpgrade ${APP_CHANNEL} 1 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_UPGRADE_ARGS}" +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_UPGRADE_ARGS}" # Query new value, should refresh through all peers in the channel chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 diff --git a/hyperledger_fabric/latest/scripts/test_channel_create.sh b/hyperledger_fabric/latest/scripts/test_channel_create.sh index 3430c310..0121957c 100644 --- a/hyperledger_fabric/latest/scripts/test_channel_create.sh +++ b/hyperledger_fabric/latest/scripts/test_channel_create.sh @@ -14,7 +14,7 @@ echo_b "=== Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}... ===" #do #APP_CHANNEL="channel"$i #APP_CHANNEL_TX=${APP_CHANNEL}".tx" -channelCreate "${APP_CHANNEL}" "${APP_CHANNEL_TX}" 1 0 +channelCreate "${APP_CHANNEL}" "${APP_CHANNEL_TX}" 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} #done echo_g "=== Created channel ${APP_CHANNEL} with ${APP_CHANNEL_TX} ===" diff --git a/hyperledger_fabric/latest/scripts/test_channel_update.sh b/hyperledger_fabric/latest/scripts/test_channel_update.sh index 15cbeec5..014fb00f 100644 --- a/hyperledger_fabric/latest/scripts/test_channel_update.sh +++ b/hyperledger_fabric/latest/scripts/test_channel_update.sh @@ -14,14 +14,14 @@ echo_b "Sign the channel update tx by Org1/Peer0 and Org2/Peer0" channelSignConfigTx ${APP_CHANNEL} "1" "0" "${CFG_DELTA_ENV_PB}" channelSignConfigTx ${APP_CHANNEL} "2" "0" "${CFG_DELTA_ENV_PB}" -channelUpdate ${APP_CHANNEL} "1" "0" ${CFG_DELTA_ENV_PB} +channelUpdate ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} ${CFG_DELTA_ENV_PB} newest_block_file1=/tmp/${APP_CHANNEL}_newest1.block -channelFetch ${APP_CHANNEL} "1" "0" "newest" ${newest_block_file1} +channelFetch ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file1} [ -f ${newest_block_file1} ] || exit 1 newest_block_file2=/tmp/${APP_CHANNEL}_newest2.block -channelFetch ${APP_CHANNEL} "3" "0" "newest" ${newest_block_file2} +channelFetch ${APP_CHANNEL} "3" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file2} [ -f ${newest_block_file2} ] || exit 1 if [ $(getShasum ${newest_block_file1}) = $(getShasum ${newest_block_file2}) ]; then diff --git a/hyperledger_fabric/latest/scripts/test_configtxlator.sh b/hyperledger_fabric/latest/scripts/test_configtxlator.sh index f031bea3..2faa1dfa 100644 --- a/hyperledger_fabric/latest/scripts/test_configtxlator.sh +++ b/hyperledger_fabric/latest/scripts/test_configtxlator.sh @@ -39,23 +39,23 @@ docker run \ sleep 1 echo_b "Convert all block files into json" -for BLOCK_FILE in *.block; do - [ -f ${BLOCK_FILE}.json ] || configtxlatorDecode "common.Block" ${BLOCK_FILE} ${BLOCK_FILE}.json +for block_file in *.block; do + [ -f ${block_file}.json ] || configtxlatorDecode "common.Block" ${block_file} ${block_file}.json decode_result=$? #echo_b "Parse payload..." - #[ ${decode_result} -eq 0 ] && jq "$PAYLOAD_PATH" ${BLOCK_FILE}.json > ${BLOCK_FILE}_payload.json + #[ ${decode_result} -eq 0 ] && jq "$PAYLOAD_PATH" ${block_file}.json > ${block_file}_payload.json done echo_b "Update the content of orderer genesis file" -if [ -f ${ORDERER_GENESIS} ]; then +if [ -f ${ORDERER0_GENESIS_BLOCK} ]; then echo_b "Checking existing Orderer.BatchSize.max_message_count in the genesis json" - jq "$MAX_BATCH_SIZE_PATH" ${ORDERER_GENESIS_JSON} + jq "$MAX_BATCH_SIZE_PATH" ${ORDERER0_GENESIS}.json echo_b "Creating new genesis json with updated Orderer.BatchSize.max_message_count" - jq "$MAX_BATCH_SIZE_PATH=20" ${ORDERER_GENESIS_JSON} > ${ORDERER_GENESIS_UPDATED_JSON} + jq "$MAX_BATCH_SIZE_PATH=20" ${ORDERER0_GENESIS}.json > ${ORDERER0_GENESIS}_update.json echo_b "Re-Encoding the orderer genesis json to block" - configtxlatorEncode "common.Block" ${ORDERER_GENESIS_UPDATED_JSON} ${ORDERER_GENESIS_UPDATED_BLOCK} + configtxlatorEncode "common.Block" ${ORDERER0_GENESIS}_updated.json ${ORDERER0_GENESIS}_update.block fi echo_b "Stop configtxlator service" diff --git a/hyperledger_fabric/latest/scripts/test_fetch_blocks.sh b/hyperledger_fabric/latest/scripts/test_fetch_blocks.sh index 1826b3d4..97006a48 100644 --- a/hyperledger_fabric/latest/scripts/test_fetch_blocks.sh +++ b/hyperledger_fabric/latest/scripts/test_fetch_blocks.sh @@ -14,9 +14,9 @@ peer=0 echo_b "=== Fetching blocks of channel ${APP_CHANNEL} and ${SYS_CHANNEL} ===" -channelFetchAll ${APP_CHANNEL} $org $peer +channelFetchAll ${APP_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} -channelFetchAll ${SYS_CHANNEL} $org $peer +channelFetchAll ${SYS_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} echo_g "=== Fetched Blocks from channels done! ===" diff --git a/hyperledger_fabric/latest/scripts/test_sideDB.sh b/hyperledger_fabric/latest/scripts/test_sideDB.sh index d2339ab7..8bee8fde 100644 --- a/hyperledger_fabric/latest/scripts/test_sideDB.sh +++ b/hyperledger_fabric/latest/scripts/test_sideDB.sh @@ -27,7 +27,7 @@ done echo_g "=== Install chaincode done ===" # test sideDB feature -chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} echo_g "=== Instantiate chaincode done ===" sleep 2 @@ -57,7 +57,7 @@ done echo_g "Install chaincode with new collection config done" echo_b "Update chaincode with new collection on org1/peer0" -chaincodeUpgrade ${APP_CHANNEL} 1 0 ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG_NEW} +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG_NEW} echo_g "Update chaincode with new collection on org1/peer0 done" echo_b "Invoke chaincode with new key and new collection on org1/peer0" diff --git a/hyperledger_fabric/latest/scripts/test_update_anchors.sh b/hyperledger_fabric/latest/scripts/test_update_anchors.sh index dd4dc1c8..239b983d 100644 --- a/hyperledger_fabric/latest/scripts/test_update_anchors.sh +++ b/hyperledger_fabric/latest/scripts/test_update_anchors.sh @@ -9,10 +9,10 @@ fi ## Set the anchor peers for each org in the channel echo_b "=== Updating anchor peers to peer0 for org1... ===" -channelUpdate ${APP_CHANNEL} 1 0 Org1MSPanchors.tx +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx echo_b "=== Updating anchor peers to peer0 for org2... ===" -channelUpdate ${APP_CHANNEL} 2 0 Org2MSPanchors.tx +channelUpdate ${APP_CHANNEL} 2 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org2MSPanchors.tx echo_b "=== Updated anchor peers ===" diff --git a/hyperledger_fabric/latest/scripts/variables.sh b/hyperledger_fabric/latest/scripts/variables.sh index 04870853..f3edea61 100644 --- a/hyperledger_fabric/latest/scripts/variables.sh +++ b/hyperledger_fabric/latest/scripts/variables.sh @@ -16,6 +16,8 @@ PROJECT_VERSION=2.0.0 # Name of app channel, need to align with the gen_artifacts.sh SYS_CHANNEL="testchainid" APP_CHANNEL="businesschannel" +APP_CHANNEL1="businesschannel1" +APP_CHANNEL2="businesschannel2" # Client cmd execute timeout and retry times TIMEOUT="90" @@ -31,26 +33,27 @@ ORG1MSP="Org1MSP" ORG2MSP="Org2MSP" ORG3MSP="Org3MSP" -# MSP related paths -ORDERER_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp -ORDERER_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp +# Orderer0 related paths +ORDERER0_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp +ORDERER0_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp +ORDERER0_TLS_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem +ORDERER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt + +# Org1 related path ORG1_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp ORG1_PEER0_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.Org1.example.com/msp -ORG2_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp - -# cert related path -ORDERER_TLS_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem -ORDERER_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt ORG1_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt ORG1_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt ORG1_ADMIN_TLS_CLIENT_KEY=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.key ORG1_ADMIN_TLS_CLIENT_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.crt ORG1_ADMIN_TLS_CA_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/ca.crt + +# Org2 related path +ORG2_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp ORG2_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt ORG2_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt # Node URLS -ORDERER_URL="orderer0.example.com:7050" ORDERER0_URL="orderer0.example.com:7050" ORDERER1_URL="orderer1.example.com:7050" ORDERER2_URL="orderer2.example.com:7050" @@ -105,9 +108,12 @@ GEN_CONTAINER=generator FABRIC_CFG_PATH=/etc/hyperledger/fabric CHANNEL_ARTIFACTS=channel-artifacts CRYPTO_CONFIG=crypto-config -ORDERER0_GENESIS=orderer0.genesis.block -ORDERER1_GENESIS=orderer1.genesis.block -ORDERER_GENESIS=${ORDERER1_GENESIS} +ORDERER0_GENESIS=orderer0.genesis +ORDERER1_GENESIS=orderer1.genesis +ORDERER2_GENESIS=orderer2.genesis +ORDERER0_GENESIS_BLOCK=${ORDERER0_GENESIS}.block +ORDERER1_GENESIS_BLOCK=${ORDERER1_GENESIS}.block +ORDERER2_GENESIS_BLOCK=${ORDERER2_GENESIS}.block ORDERER_GENESIS_PROFILE=TwoOrgsOrdererGenesis APP_CHANNEL_PROFILE=TwoOrgsChannel APP_CHANNEL_TX=${APP_CHANNEL}.tx @@ -124,10 +130,6 @@ CTL_ENCODE_URL=${CTL_BASE_URL}/protolator/encode CTL_DECODE_URL=${CTL_BASE_URL}/protolator/decode CTL_COMPARE_URL=${CTL_BASE_URL}/configtxlator/compute/update-from-configs -ORDERER_GENESIS_JSON=${ORDERER_GENESIS}.json -ORDERER_GENESIS_PAYLOAD_JSON=${ORDERER_GENESIS}_payload.json -ORDERER_GENESIS_UPDATED_BLOCK=orderer.genesis.updated.block -ORDERER_GENESIS_UPDATED_JSON=${ORDERER_GENESIS_UPDATED_BLOCK}.json PAYLOAD_PATH=".data.data[0].payload" PAYLOAD_CFG_PATH=".data.data[0].payload.data.config" MAX_BATCH_SIZE_PATH=".data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count"